Bugzilla – Bug 1220568
Missing cni-plugins in buildah
Last modified: 2024-04-29 14:37:45 UTC
After test changes in our buildah test runs we see openQA failures on JeOS 15-SP3 due to missing cni-plugins when using buildah together with docker openQA test in scenario sle-15-SP3-JeOS-for-kvm-and-xen-Updates-aarch64-jeos-containers-docker@aarch64 fails in [buildah_docker](https://openqa.suse.de/tests/13620914/modules/buildah_docker/steps/108) ## Reproducer: > nydos:~ # zypper in docker buildah > ... > nydos:~ # buildah from registry.opensuse.org/opensuse/tumbleweed:latest > ... > nydos:~ # buildah run tumbleweed-working-container -- cat /etc/os-release > WARN[0003] Path "/etc/SUSEConnect" from "/etc/containers/mounts.conf" doesn't exist, skipping > WARN[0005] Failed to load cached network config: network podman not found in CNI cache, falling back to loading network podman from disk > WARN[0005] 1 error occurred: > * plugin type="tuning" failed (delete): failed to find plugin "tuning" in path [/usr/lib/cni] > > error running container: did not get container start message from parent: EOF > Error: setup network: plugin type="bridge" failed (add): failed to find plugin "bridge" in path [/usr/lib/cni] After installing `cni-plugins` the issue is resolved. The issue is present on aarch64 and x86_64.
This is an autogenerated message for OBS integration: This bug (1220568) was mentioned in https://build.opensuse.org/request/show/1153433 Factory / buildah
This is also affecting SP5 QR and sp6 builds
SP6 failure: https://openqa.suse.de/tests/13713265#step/buildah_docker/108
Workaround added https://github.com/os-autoinst/os-autoinst-distri-opensuse/pull/18805
SUSE-SU-2024:1145-1: An update that solves one vulnerability and has two security fixes can now be installed. Category: security (important) Bug References: 1219563, 1220568, 1221677 CVE References: CVE-2024-1753 Maintenance Incident: [SUSE:Maintenance:32911](https://smelt.suse.de/incident/32911/) Sources used: openSUSE Leap 15.3 (src): buildah-1.34.1-150300.8.22.1 SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (src): buildah-1.34.1-150300.8.22.1 SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (src): buildah-1.34.1-150300.8.22.1 SUSE Linux Enterprise Server for SAP Applications 15 SP3 (src): buildah-1.34.1-150300.8.22.1 SUSE Enterprise Storage 7.1 (src): buildah-1.34.1-150300.8.22.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2024:1144-1: An update that solves one vulnerability and has two security fixes can now be installed. Category: security (important) Bug References: 1219563, 1220568, 1221677 CVE References: CVE-2024-1753 Maintenance Incident: [SUSE:Maintenance:32912](https://smelt.suse.de/incident/32912/) Sources used: openSUSE Leap 15.4 (src): buildah-1.34.1-150400.3.27.1 openSUSE Leap Micro 5.3 (src): cni-plugins-0.8.6-150100.3.22.3, cni-0.7.1-150100.3.18.1 openSUSE Leap Micro 5.4 (src): cni-plugins-0.8.6-150100.3.22.3, cni-0.7.1-150100.3.18.1 SUSE Linux Enterprise Micro for Rancher 5.3 (src): cni-plugins-0.8.6-150100.3.22.3, cni-0.7.1-150100.3.18.1 SUSE Linux Enterprise Micro 5.3 (src): cni-plugins-0.8.6-150100.3.22.3, cni-0.7.1-150100.3.18.1 SUSE Linux Enterprise Micro for Rancher 5.4 (src): cni-plugins-0.8.6-150100.3.22.3, cni-0.7.1-150100.3.18.1 SUSE Linux Enterprise Micro 5.4 (src): cni-plugins-0.8.6-150100.3.22.3, cni-0.7.1-150100.3.18.1 Public Cloud Module 15-SP2 (src): cni-plugins-0.8.6-150100.3.22.3, cni-0.7.1-150100.3.18.1 SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (src): cni-plugins-0.8.6-150100.3.22.3, cni-0.7.1-150100.3.18.1 SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (src): cni-plugins-0.8.6-150100.3.22.3, cni-0.7.1-150100.3.18.1 SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (src): cni-plugins-0.8.6-150100.3.22.3, cni-0.7.1-150100.3.18.1, buildah-1.34.1-150400.3.27.1 SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (src): cni-plugins-0.8.6-150100.3.22.3, cni-0.7.1-150100.3.18.1, buildah-1.34.1-150400.3.27.1 SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (src): cni-plugins-0.8.6-150100.3.22.3, cni-0.7.1-150100.3.18.1 SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (src): cni-plugins-0.8.6-150100.3.22.3, cni-0.7.1-150100.3.18.1 SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (src): cni-plugins-0.8.6-150100.3.22.3, cni-0.7.1-150100.3.18.1, buildah-1.34.1-150400.3.27.1 SUSE Linux Enterprise Server for SAP Applications 15 SP2 (src): cni-plugins-0.8.6-150100.3.22.3, cni-0.7.1-150100.3.18.1 SUSE Linux Enterprise Server for SAP Applications 15 SP3 (src): cni-plugins-0.8.6-150100.3.22.3, cni-0.7.1-150100.3.18.1 SUSE Linux Enterprise Server for SAP Applications 15 SP4 (src): cni-plugins-0.8.6-150100.3.22.3, cni-0.7.1-150100.3.18.1, buildah-1.34.1-150400.3.27.1 SUSE Enterprise Storage 7.1 (src): cni-plugins-0.8.6-150100.3.22.3, cni-0.7.1-150100.3.18.1 SUSE Linux Enterprise Micro 5.1 (src): cni-plugins-0.8.6-150100.3.22.3, cni-0.7.1-150100.3.18.1 SUSE Linux Enterprise Micro 5.2 (src): cni-plugins-0.8.6-150100.3.22.3, cni-0.7.1-150100.3.18.1 SUSE Linux Enterprise Micro for Rancher 5.2 (src): cni-plugins-0.8.6-150100.3.22.3, cni-0.7.1-150100.3.18.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2024:1143-1: An update that solves one vulnerability and has two security fixes can now be installed. Category: security (important) Bug References: 1219563, 1220568, 1221677 CVE References: CVE-2024-1753 Maintenance Incident: [SUSE:Maintenance:32913](https://smelt.suse.de/incident/32913/) Sources used: openSUSE Leap 15.5 (src): buildah-1.34.1-150500.3.7.1 Containers Module 15-SP5 (src): buildah-1.34.1-150500.3.7.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
This should be fixed now