
For ease of running the entire tests locally ``` cd contrib docker build -t containerd-test -f Dockerfile.test --target integration .. docker run --privileged containerd-test docker build -t containerd-test -f Dockerfile.test --target cri-integration .. docker run --privileged --sysctl net.ipv6.conf.all.disable_ipv6=0 containerd-test docker build -t containerd-test -f Dockerfile.test --target critest .. docker run --privileged --sysctl net.ipv6.conf.all.disable_ipv6=0 containerd-test ``` Tested on Ubuntu 22.10 (amd64, cgroup v2). Known issues: - cri-integration and critest: require `--sysctl net.ipv6.conf.all.disable_ipv6=0` to avoid errors like `failed to set bridge addr: could not add IP address to "cni0": permission denied` - critest: Often fails due to Docker Hub rate limits. Fix is coming in kubernetes-sigs/cri-tools PR 1053 Signed-off-by: Akihiro Suda <akihiro.suda.cz@hco.ntt.co.jp>
29 lines
1022 B
Bash
Executable File
29 lines
1022 B
Bash
Executable File
#!/bin/bash
|
|
|
|
# Copyright The containerd Authors.
|
|
|
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
# you may not use this file except in compliance with the License.
|
|
# You may obtain a copy of the License at
|
|
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
# See the License for the specific language governing permissions and
|
|
# limitations under the License.
|
|
|
|
set -eu -o pipefail
|
|
|
|
if [ -f "/sys/fs/cgroup/cgroup.controllers" ]; then
|
|
echo >&2 "Enabling cgroup v2 nesting"
|
|
# https://github.com/moby/moby/blob/v20.10.7/hack/dind#L28-L38
|
|
mkdir -p /sys/fs/cgroup/init
|
|
xargs -rn1 </sys/fs/cgroup/cgroup.procs >/sys/fs/cgroup/init/cgroup.procs || :
|
|
sed -e 's/ / +/g' -e 's/^/+/' </sys/fs/cgroup/cgroup.controllers \
|
|
>/sys/fs/cgroup/cgroup.subtree_control
|
|
fi
|
|
|
|
exec "$@"
|