-
Notifications
You must be signed in to change notification settings - Fork 2.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
flake: error reading /etc/cni/net.d/something #9041
Comments
I take a look. I think we should get rid of static network names and only use random ones. |
@Luap99 I don't think that's the issue; I think it would happen even with |
It's not the real issue but at least it would prevent a full failure in CI. |
OK @baude added a lockfile which should prevent these races but the lockfile is located in the tmpdir and not in the cni config dir. Therefore a second parallel test with a network create/remove call did not get the lock. I think the best solution is to move the lockfile into the cni config directory. |
Commit(fe3faa5) introduced a lock file for network create/rm calls. There is a problem with the location of the lock file. The lock file was stored in the tmpdir. Running multiple podman network create/remove commands in parallel with different tmpdirs made the lockfile inaccessible to the other process, and so parallel read/write operations to the cni config directory continued to occur. This scenario happened frequently during the e2e tests and caused some flakes. Fixes containers#9041 Signed-off-by: Paul Holzinger <[email protected]>
Commit(fe3faa5) introduced a lock file for network create/rm calls. There is a problem with the location of the lock file. The lock file was stored in the tmpdir. Running multiple podman network create/remove commands in parallel with different tmpdirs made the lockfile inaccessible to the other process, and so parallel read/write operations to the cni config directory continued to occur. This scenario happened frequently during the e2e tests and caused some flakes. Fixes containers#9041 Signed-off-by: Paul Holzinger <[email protected]>
Starting to see a lot of this one:
...which then cascades into:
ISTR this being a race condition between
network create
andnetwork rm
, and thought there was an open issue about it already, but I can't find it now.Podman network [It] podman inspect container two CNI networks (container not running)
The text was updated successfully, but these errors were encountered: