Skip to content
This repository has been archived by the owner on Feb 24, 2020. It is now read-only.

sandbox/app-add: fix mount targets with absolute symlink targets #3490

Merged
merged 6 commits into from
Jan 19, 2017

Conversation

s-urbaniak
Copy link
Contributor

@s-urbaniak s-urbaniak commented Dec 19, 2016

Currently the sandbox operates on the stage2 rootfs within the
stage1 mount namespaces.

In cases where the stage2 rootfs includes absolute symlink targets (i.e.
/var/run -> /run in Debian images) this scheme currently fails.

This introduces another step in the mount propagation to stage2. In
addition to performing a move mount to stage1, another bind mount and
chroot into stage2 has to be done in order to retain absolute symlinks.

Fixes #3483

TODOs:

  • document the mount move/bind logic

@squeed
Copy link
Contributor

squeed commented Dec 19, 2016

Hmm.
Why not just rewrite the mount destination when doing the final move?

// https://github.com/systemd/systemd/blob/v231/src/core/mount-setup.c#L392
// We set up the temporary playground as a slave bind mount to avoid this
// limitation.
func addMountStage0(
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

What's the reasoning behind moving this out of common? It really seems like library code, not main code.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

It is used only in app-add and very specific to systemd stage1.

@s-urbaniak
Copy link
Contributor Author

@squeed I don't quite understand the question. What do you mean by rewrite? The problem is that the stage2 rootfs may contain absolute symlinks so we have to chroot into that environment.

@squeed
Copy link
Contributor

squeed commented Dec 19, 2016

Let me make sure I understand the problem: You bind mount something with a destination of /a, which is a symlink to /b. Because this is an absolute symlink, it is of course only really valid in the stage2's rootfs. So, what I'm wondering is if you can just change the mount --move ... /a to mount --move ... /b?

@s-urbaniak
Copy link
Contributor Author

@squeed that is the problem, yes and EvaluateSymlinksInsideApp tries to solve it but does not catch all the cases currently like multiple symlink hops, i.e. /var/run -> /run -> /boom.

So for the previous example we actually have a bug in EvaluateSymlinksInsideApp and the question is whether it is not better to ask the kernel to do the symlink resolving as stated in systemd/systemd#3327 (comment).

I can change this PR to use EvaluateSymlinksInsideApp (and fix the above mentioned edge case) instead but I am unsure if it will catch all the edge cases.

@s-urbaniak
Copy link
Contributor Author

Regarding your comment to do a double mount --move ... /a to mount --move ... /b.

This is not so easily possible since the incoming directory inside stage1 is of type MS_SHARED. We'd need to create a playground again as we do on the host.

@s-urbaniak
Copy link
Contributor Author

I need to reiterate on this code anyways, and we still are discussing alternative implementations.

@squeed
Copy link
Contributor

squeed commented Dec 19, 2016

I don't mean a double mount --move. I'm just suggesting changing the destination of the mount --move to /b

case 1:
err = appAddStage1(appName, uuid, flagTarget)
default:
log.Fatalf("unkown stage %d", flagStage)
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

unknown


mounts, err := stage1init.GenerateMounts(ra, p.Manifest.Volumes, stage1init.ConvertedFromDocker(imageManifest))
if err != nil {
return errwrap.Wrapf("Cou not generate mounts", err)
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

could

// symlinks will be wrong.
mntPath, err := stage1init.EvaluateSymlinksInsideApp(appRootfs, m.Mount.Path)
if err != nil {
return errwrap.Wrap(fmt.Errorf("Could not evaluate path %v", m.Mount.Path), err)
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Wrapf, could


err = mnt.Mount(src, pg.Playground(), "bind", syscall.MS_BIND, "")
if err != nil {
return errwrap.Wrapf("mount move src to rkt.propagate.stage1/mount failed", err)
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

this isn't really a move yet?

// this function behaves like `readlink -m`.
//
// Unlike `readlink` EvalSymlinksAlways might return a relative path.
func EvalSymlinksAlways(path string) (string, error) {
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Concern from my side: This is from the Go stdlib: https://godoc.org/path/filepath#EvalSymlinks. The problem with the stdlib-EvalSymlinks method is, that it err's in case the target link doesn't exist (readlink -e behavior).

We need readlink -m behavior, where path components do not need to exist, because we create the directories after all.

We could introduce a mkdir -p behavior in the symlink evaluation method before invoking Go's stdlib EvalSymlinks , but this would require yet more bigger refactorings, because currently rkt implements those two concerns "evaluating symlinks" and "ensuring the target exists" separately, hence this is (currently) the lesser evil.

@s-urbaniak
Copy link
Contributor Author

gah, I hit some regression :-(

@s-urbaniak
Copy link
Contributor Author

Fortunately not a regression, two quite old unit tests TestAppToNspawnArgsRecursive and TestAppToNspawnArgsOverridesImageManifestReadOnly are broken now, because:

  1. We chroot in EvaluateSymlinksInsideApp now; unit tests lack that permission.
  2. EvaluateSymlinksInsideApp expects the appRootfs to be present.

Violation of Invariant 2. was easy to fix but 1. not.

Both tests check if nspawn args were generated correctly using a regex: https://github.com/coreos/rkt/blob/v1.22.0/stage1/init/common/pod_test.go#L171

I made a quick pass on the functional test suite and saw we do some read-only mount tests there and I think the unit tests above are questionable per se.

I disabled the tests in a separate commit to assert, if there are more failures.

@@ -778,3 +758,61 @@ func protectKernelTunables(opts []*unit.UnitOption, appName types.ACName, system

return opts
}

// chroot is the struct that represents a chroot environment
type chroot struct {
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

maybe move this to pkg too?

@s-urbaniak
Copy link
Contributor Author

Oh well, we introduced sandbox mount tests, and they apparently fail consistently on semaphore:

	rkt_app_sandbox_test.go:476: Running [/home/runner/rkt/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/rkt --dir=/tmp/datadir-273341127 --local-config=/tmp/localdir-087789434 --system-config=/tmp/systemdir-883721873 --user-config=/tmp/userdir-779321020 app add --debug 6dfe82d8-0a41-438c-8ff8-15a6bde4b9ad coreos.com/rkt-inspect/mounter --name=mounter --environment=FILE=/dir2/test --mnt-volume=name=test,kind=host,source=/tmp/rkt-mount-test-007081229,target=/dir2]
	rkt_app_sandbox_test.go:480: exit status 254 output stage0: locking pod manifest
		stage0: Loading image sha512-d9e34aa961e132119e77a835f4959ea0f1c629dfd046834e41ca289d6d29a196
		stage0: Writing image manifest
		stage0: adding app to sandbox
		stage0: stage0: app-add: mounting source "/tmp/rkt.propagate.stage1.675181510" target "/tmp/rkt.propagate.stage1.675181510" fstype "bind" flags MS_BIND data ""
		stage0: app-add: mounting source "" target "/tmp/rkt.propagate.stage1.675181510" fstype "none" flags MS_SLAVE data ""
		stage0: app-add: mounting source "/tmp/rkt-mount-test-007081229" target "/tmp/rkt.propagate.stage1.675181510/playground" fstype "bind" flags MS_BIND data ""
		stage0: app-add: mounting source "/tmp/rkt.propagate.stage1.675181510/playground" target "/run/systemd/nspawn/propagate/rkt-6dfe82d8-0a41-438c-8ff8-15a6bde4b9ad/rkt.mount" fstype "" flags MS_MOVE data ""
		stage0: app-add: entering stage1 ["/tmp/datadir-273341127/pods/run/6dfe82d8-0a41-438c-8ff8-15a6bde4b9ad/stage1/rootfs/enter" "--pid=27299" "--" "/app_add" "-stage=1" "-debug=true" "-uuid=6dfe82d8-0a41-438c-8ff8-15a6bde4b9ad" "-app=mounter" "-target=/dir2"]
		stage0: app-add: stage1 output:
		stage1: app-add: mounting source "/run/systemd/nspawn/incoming/rkt.mount" target "/opt/stage2/mounter/rootfs/dir2" fstype "" flags MS_MOVE data ""
		stage1: app-add: app add failed
		  └─mount move /run/systemd/nspawn/incoming/rkt.mount to /opt/stage2/mounter/rootfs/dir2 failed
		    └─invalid argument
		
		stage0: app-add: unmounting target "/run/systemd/nspawn/propagate/rkt-6dfe82d8-0a41-438c-8ff8-15a6bde4b9ad/rkt.mount" flags 
		stage0: app-add: unmounting target "/tmp/rkt.propagate.stage1.675181510" flags 
		stage0: app-add: app add failed
		  └─adding mounts failed
		    └─error adding mount volume test path /dir2
		      └─app-add in stage1 failed
		        └─exit status 254
		
		add: error adding app to pod
		  └─error executing stage1 entrypoint
		    └─exit status 254

I can't reproduce this locally so I'll have to research on semaphore directly :-/

case dir == "":
newpath, _, err := walkLink(file, linksWalked)
return newpath, err
case file == "":
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Hah. I hate this behavior of Split so much.

link = filepath.Join(link, p)
continue
}
chroot, err := newChroot(appRootfs)
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

does it make sense to defer chroot.Escape() here? So our root is where we want it to be if we error out?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

good point, I was thinking of it myself. But if Escape() fails, we're in a limbo state, no?

@s-urbaniak
Copy link
Contributor Author

make clean target failures: I guess my absolute links to / in the functional image confuse it.

Sergiusz Urbaniak added 4 commits January 17, 2017 06:36
This adds a new method for resolving symlinks.

This is needed for rkt#3483
Currently resolving symlinks in stage1 is broken for a couple of edge
cases, most prominently absolute symlinks which escape the stage2
rootfs.

This fixes it by evaluating symlinks in chroot'ed environment in the
stage2 rootfs.

Fixes rkt#3483
This renames the above function to be more idiomatic.
Since EvaluateSymlinksInsideApp requires chroot now, these tests fail.
This disables them.
@s-urbaniak s-urbaniak force-pushed the app-add-mount-3483 branch 2 times, most recently from 3b52941 to 91cc9cf Compare January 17, 2017 13:55
@s-urbaniak
Copy link
Contributor Author

current strategy: disable the TestAppSandboxMount functional test in Semaphore using an env var.

Semaphore doesn't obey my env var, hence investigating. Maybe there's a missing -E in sudo somewhere in our test suite.

This test fails on semaphore due to an old kernel and thus is disabled
there via an env variable.
if !strings.HasPrefix(link, appRootfs) {
return "", fmt.Errorf("symlink %q escapes app's root with value %q", next, target)
}
if err := chroot.escape(); err != nil {
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Related to @squeed concern above, better to move this right up after EvalSymlinksAlways and do error checking and early returning only after it.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

If I move this right after EvalSymlinksAlways, then filepath.Abs will be invoked in the outer rootfs.

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Then nevermind, my previous comment is wrong. i thought FS-related operation were confined to EvalSymlinksAlways.

@lucab
Copy link
Member

lucab commented Jan 18, 2017

LGTM. I re-triggered jenkins for the flake.

@s-urbaniak
Copy link
Contributor Author

The debian-testing, coreos failure has been seen before in #3224 (comment).

The logs for the current failure are here. Relevant output:

=== RUN   TestCapsSeveralAppWithFlags
--- FAIL: TestCapsSeveralAppWithFlags (53.41s)
	rkt_caps_test.go:359: Built image "/home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/test-tmp/image-none.aci"
	rkt_caps_test.go:359: Built image "/home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/test-tmp/image-only-one-cap.aci"
	rkt_caps_test.go:359: Built image "/home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/test-tmp/image-only-one-cap-old.aci"
	rkt_caps_test.go:359: Built image "/home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/test-tmp/image-only-one-cap-from-default.aci"
	rkt_caps_test.go:359: Built image "/home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/test-tmp/image-some-caps.aci"
	rkt_caps_test.go:359: Built image "/home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/test-tmp/image-caps-from-nspawn-default.aci"
	rkt_caps_test.go:359: Built image "/home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/test-tmp/image-remove-one-from-default.aci"
	rkt_caps_test.go:359: Built image "/home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/test-tmp/image-remove-one-from-default-old.aci"
	rkt_caps_test.go:359: Built image "/home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/test-tmp/image-remove-one-already-removed.aci"
	rkt_caps_test.go:359: Built image "/home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/test-tmp/image-remove-two.aci"
	rkt_caps_test.go:359: Built image "/home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/test-tmp/image-remove-all.aci"
	rkt_caps_test.go:359: Built image "/home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/test-tmp/image-remove-all-but-one.aci"
	rkt_caps_test.go:359: Built image "/home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/test-tmp/image-remove-all-plus-one.aci"
	rkt_caps_test.go:300: Checking caps for "image-none"
	rkt_tests.go:119: Spawning command: /home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/rkt --dir=/tmp/datadir-437604756 --local-config=/tmp/localdir-300354531 --system-config=/tmp/systemdir-395961318 --user-config=/tmp/userdir-233907725 --insecure-options=image run  /home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/test-tmp/image-none.aci /home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/test-tmp/image-only-one-cap.aci --caps-retain=CAP_NET_ADMIN /home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/test-tmp/image-only-one-cap-old.aci --cap-retain=CAP_NET_ADMIN /home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/test-tmp/image-only-one-cap-from-default.aci --caps-retain=CAP_CHOWN /home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/test-tmp/image-some-caps.aci --caps-retain=CAP_CHOWN,CAP_FOWNER,CAP_SYS_ADMIN,CAP_NET_ADMIN /home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/test-tmp/image-caps-from-nspawn-default.aci --caps-retain=CAP_CHOWN,CAP_DAC_OVERRIDE,CAP_DAC_READ_SEARCH,CAP_FOWNER,CAP_FSETID,CAP_IPC_OWNER,CAP_KILL,CAP_LEASE,CAP_LINUX_IMMUTABLE,CAP_NET_BIND_SERVICE,CAP_NET_BROADCAST,CAP_NET_RAW,CAP_SETGID,CAP_SETFCAP,CAP_SETPCAP,CAP_SETUID,CAP_SYS_ADMIN,CAP_SYS_CHROOT,CAP_SYS_NICE,CAP_SYS_PTRACE,CAP_SYS_TTY_CONFIG,CAP_SYS_RESOURCE,CAP_SYS_BOOT,CAP_AUDIT_WRITE,CAP_AUDIT_CONTROL /home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/test-tmp/image-remove-one-from-default.aci --caps-remove=CAP_CHOWN /home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/test-tmp/image-remove-one-from-default-old.aci --cap-remove=CAP_CHOWN /home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/test-tmp/image-remove-one-already-removed.aci --caps-remove=CAP_SYS_ADMIN /home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/test-tmp/image-remove-two.aci --caps-remove=CAP_CHOWN,CAP_SYS_ADMIN /home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/test-tmp/image-remove-all.aci --caps-remove=CAP_AUDIT_WRITE,CAP_CHOWN,CAP_DAC_OVERRIDE,CAP_FSETID,CAP_FOWNER,CAP_KILL,CAP_MKNOD,CAP_NET_RAW,CAP_NET_BIND_SERVICE,CAP_SETUID,CAP_SETGID,CAP_SETPCAP,CAP_SETFCAP,CAP_SYS_CHROOT /home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/test-tmp/image-remove-all-but-one.aci --caps-remove=CAP_AUDIT_WRITE,CAP_CHOWN,CAP_DAC_OVERRIDE,CAP_FSETID,CAP_FOWNER,CAP_KILL,CAP_MKNOD,CAP_NET_RAW,CAP_NET_BIND_SERVICE,CAP_SETUID,CAP_SETGID,CAP_SETPCAP,CAP_SETFCAP /home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/test-tmp/image-remove-all-plus-one.aci --caps-remove=CAP_AUDIT_WRITE,CAP_CHOWN,CAP_DAC_OVERRIDE,CAP_FSETID,CAP_FOWNER,CAP_KILL,CAP_MKNOD,CAP_NET_RAW,CAP_NET_BIND_SERVICE,CAP_SETUID,CAP_SETGID,CAP_SETPCAP,CAP_SETFCAP,CAP_SYS_CHROOT,CAP_SYS_ADMIN
	rkt_caps_test.go:300: Checking caps for "image-only-one-cap"
	rkt_tests.go:119: Spawning command: /home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/rkt --dir=/tmp/datadir-437604756 --local-config=/tmp/localdir-300354531 --system-config=/tmp/systemdir-395961318 --user-config=/tmp/userdir-233907725 --insecure-options=image run  /home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/test-tmp/image-none.aci /home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/test-tmp/image-only-one-cap.aci --caps-retain=CAP_NET_ADMIN /home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/test-tmp/image-only-one-cap-old.aci --cap-retain=CAP_NET_ADMIN /home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/test-tmp/image-only-one-cap-from-default.aci --caps-retain=CAP_CHOWN /home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/test-tmp/image-some-caps.aci --caps-retain=CAP_CHOWN,CAP_FOWNER,CAP_SYS_ADMIN,CAP_NET_ADMIN /home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/test-tmp/image-caps-from-nspawn-default.aci --caps-retain=CAP_CHOWN,CAP_DAC_OVERRIDE,CAP_DAC_READ_SEARCH,CAP_FOWNER,CAP_FSETID,CAP_IPC_OWNER,CAP_KILL,CAP_LEASE,CAP_LINUX_IMMUTABLE,CAP_NET_BIND_SERVICE,CAP_NET_BROADCAST,CAP_NET_RAW,CAP_SETGID,CAP_SETFCAP,CAP_SETPCAP,CAP_SETUID,CAP_SYS_ADMIN,CAP_SYS_CHROOT,CAP_SYS_NICE,CAP_SYS_PTRACE,CAP_SYS_TTY_CONFIG,CAP_SYS_RESOURCE,CAP_SYS_BOOT,CAP_AUDIT_WRITE,CAP_AUDIT_CONTROL /home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/test-tmp/image-remove-one-from-default.aci --caps-remove=CAP_CHOWN /home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/test-tmp/image-remove-one-from-default-old.aci --cap-remove=CAP_CHOWN /home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/test-tmp/image-remove-one-already-removed.aci --caps-remove=CAP_SYS_ADMIN /home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/test-tmp/image-remove-two.aci --caps-remove=CAP_CHOWN,CAP_SYS_ADMIN /home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/test-tmp/image-remove-all.aci --caps-remove=CAP_AUDIT_WRITE,CAP_CHOWN,CAP_DAC_OVERRIDE,CAP_FSETID,CAP_FOWNER,CAP_KILL,CAP_MKNOD,CAP_NET_RAW,CAP_NET_BIND_SERVICE,CAP_SETUID,CAP_SETGID,CAP_SETPCAP,CAP_SETFCAP,CAP_SYS_CHROOT /home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/test-tmp/image-remove-all-but-one.aci --caps-remove=CAP_AUDIT_WRITE,CAP_CHOWN,CAP_DAC_OVERRIDE,CAP_FSETID,CAP_FOWNER,CAP_KILL,CAP_MKNOD,CAP_NET_RAW,CAP_NET_BIND_SERVICE,CAP_SETUID,CAP_SETGID,CAP_SETPCAP,CAP_SETFCAP /home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/test-tmp/image-remove-all-plus-one.aci --caps-remove=CAP_AUDIT_WRITE,CAP_CHOWN,CAP_DAC_OVERRIDE,CAP_FSETID,CAP_FOWNER,CAP_KILL,CAP_MKNOD,CAP_NET_RAW,CAP_NET_BIND_SERVICE,CAP_SETUID,CAP_SETGID,CAP_SETPCAP,CAP_SETFCAP,CAP_SYS_CHROOT,CAP_SYS_ADMIN
	rkt_caps_test.go:300: Checking caps for "image-only-one-cap-old"
	rkt_tests.go:119: Spawning command: /home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/rkt --dir=/tmp/datadir-437604756 --local-config=/tmp/localdir-300354531 --system-config=/tmp/systemdir-395961318 --user-config=/tmp/userdir-233907725 --insecure-options=image run  /home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/test-tmp/image-none.aci /home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/test-tmp/image-only-one-cap.aci --caps-retain=CAP_NET_ADMIN /home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/test-tmp/image-only-one-cap-old.aci --cap-retain=CAP_NET_ADMIN /home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/test-tmp/image-only-one-cap-from-default.aci --caps-retain=CAP_CHOWN /home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/test-tmp/image-some-caps.aci --caps-retain=CAP_CHOWN,CAP_FOWNER,CAP_SYS_ADMIN,CAP_NET_ADMIN /home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/test-tmp/image-caps-from-nspawn-default.aci --caps-retain=CAP_CHOWN,CAP_DAC_OVERRIDE,CAP_DAC_READ_SEARCH,CAP_FOWNER,CAP_FSETID,CAP_IPC_OWNER,CAP_KILL,CAP_LEASE,CAP_LINUX_IMMUTABLE,CAP_NET_BIND_SERVICE,CAP_NET_BROADCAST,CAP_NET_RAW,CAP_SETGID,CAP_SETFCAP,CAP_SETPCAP,CAP_SETUID,CAP_SYS_ADMIN,CAP_SYS_CHROOT,CAP_SYS_NICE,CAP_SYS_PTRACE,CAP_SYS_TTY_CONFIG,CAP_SYS_RESOURCE,CAP_SYS_BOOT,CAP_AUDIT_WRITE,CAP_AUDIT_CONTROL /home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/test-tmp/image-remove-one-from-default.aci --caps-remove=CAP_CHOWN /home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/test-tmp/image-remove-one-from-default-old.aci --cap-remove=CAP_CHOWN /home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/test-tmp/image-remove-one-already-removed.aci --caps-remove=CAP_SYS_ADMIN /home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/test-tmp/image-remove-two.aci --caps-remove=CAP_CHOWN,CAP_SYS_ADMIN /home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/test-tmp/image-remove-all.aci --caps-remove=CAP_AUDIT_WRITE,CAP_CHOWN,CAP_DAC_OVERRIDE,CAP_FSETID,CAP_FOWNER,CAP_KILL,CAP_MKNOD,CAP_NET_RAW,CAP_NET_BIND_SERVICE,CAP_SETUID,CAP_SETGID,CAP_SETPCAP,CAP_SETFCAP,CAP_SYS_CHROOT /home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/test-tmp/image-remove-all-but-one.aci --caps-remove=CAP_AUDIT_WRITE,CAP_CHOWN,CAP_DAC_OVERRIDE,CAP_FSETID,CAP_FOWNER,CAP_KILL,CAP_MKNOD,CAP_NET_RAW,CAP_NET_BIND_SERVICE,CAP_SETUID,CAP_SETGID,CAP_SETPCAP,CAP_SETFCAP /home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/test-tmp/image-remove-all-plus-one.aci --caps-remove=CAP_AUDIT_WRITE,CAP_CHOWN,CAP_DAC_OVERRIDE,CAP_FSETID,CAP_FOWNER,CAP_KILL,CAP_MKNOD,CAP_NET_RAW,CAP_NET_BIND_SERVICE,CAP_SETUID,CAP_SETGID,CAP_SETPCAP,CAP_SETFCAP,CAP_SYS_CHROOT,CAP_SYS_ADMIN
	rkt_caps_test.go:300: Checking caps for "image-only-one-cap-from-default"
	rkt_tests.go:119: Spawning command: /home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/rkt --dir=/tmp/datadir-437604756 --local-config=/tmp/localdir-300354531 --system-config=/tmp/systemdir-395961318 --user-config=/tmp/userdir-233907725 --insecure-options=image run  /home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/test-tmp/image-none.aci /home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/test-tmp/image-only-one-cap.aci --caps-retain=CAP_NET_ADMIN /home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/test-tmp/image-only-one-cap-old.aci --cap-retain=CAP_NET_ADMIN /home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/test-tmp/image-only-one-cap-from-default.aci --caps-retain=CAP_CHOWN /home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/test-tmp/image-some-caps.aci --caps-retain=CAP_CHOWN,CAP_FOWNER,CAP_SYS_ADMIN,CAP_NET_ADMIN /home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/test-tmp/image-caps-from-nspawn-default.aci --caps-retain=CAP_CHOWN,CAP_DAC_OVERRIDE,CAP_DAC_READ_SEARCH,CAP_FOWNER,CAP_FSETID,CAP_IPC_OWNER,CAP_KILL,CAP_LEASE,CAP_LINUX_IMMUTABLE,CAP_NET_BIND_SERVICE,CAP_NET_BROADCAST,CAP_NET_RAW,CAP_SETGID,CAP_SETFCAP,CAP_SETPCAP,CAP_SETUID,CAP_SYS_ADMIN,CAP_SYS_CHROOT,CAP_SYS_NICE,CAP_SYS_PTRACE,CAP_SYS_TTY_CONFIG,CAP_SYS_RESOURCE,CAP_SYS_BOOT,CAP_AUDIT_WRITE,CAP_AUDIT_CONTROL /home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/test-tmp/image-remove-one-from-default.aci --caps-remove=CAP_CHOWN /home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/test-tmp/image-remove-one-from-default-old.aci --cap-remove=CAP_CHOWN /home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/test-tmp/image-remove-one-already-removed.aci --caps-remove=CAP_SYS_ADMIN /home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/test-tmp/image-remove-two.aci --caps-remove=CAP_CHOWN,CAP_SYS_ADMIN /home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/test-tmp/image-remove-all.aci --caps-remove=CAP_AUDIT_WRITE,CAP_CHOWN,CAP_DAC_OVERRIDE,CAP_FSETID,CAP_FOWNER,CAP_KILL,CAP_MKNOD,CAP_NET_RAW,CAP_NET_BIND_SERVICE,CAP_SETUID,CAP_SETGID,CAP_SETPCAP,CAP_SETFCAP,CAP_SYS_CHROOT /home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/test-tmp/image-remove-all-but-one.aci --caps-remove=CAP_AUDIT_WRITE,CAP_CHOWN,CAP_DAC_OVERRIDE,CAP_FSETID,CAP_FOWNER,CAP_KILL,CAP_MKNOD,CAP_NET_RAW,CAP_NET_BIND_SERVICE,CAP_SETUID,CAP_SETGID,CAP_SETPCAP,CAP_SETFCAP /home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/test-tmp/image-remove-all-plus-one.aci --caps-remove=CAP_AUDIT_WRITE,CAP_CHOWN,CAP_DAC_OVERRIDE,CAP_FSETID,CAP_FOWNER,CAP_KILL,CAP_MKNOD,CAP_NET_RAW,CAP_NET_BIND_SERVICE,CAP_SETUID,CAP_SETGID,CAP_SETPCAP,CAP_SETFCAP,CAP_SYS_CHROOT,CAP_SYS_ADMIN
	rkt_caps_test.go:300: Checking caps for "image-some-caps"
	rkt_tests.go:119: Spawning command: /home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/rkt --dir=/tmp/datadir-437604756 --local-config=/tmp/localdir-300354531 --system-config=/tmp/systemdir-395961318 --user-config=/tmp/userdir-233907725 --insecure-options=image run  /home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/test-tmp/image-none.aci /home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/test-tmp/image-only-one-cap.aci --caps-retain=CAP_NET_ADMIN /home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/test-tmp/image-only-one-cap-old.aci --cap-retain=CAP_NET_ADMIN /home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/test-tmp/image-only-one-cap-from-default.aci --caps-retain=CAP_CHOWN /home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/test-tmp/image-some-caps.aci --caps-retain=CAP_CHOWN,CAP_FOWNER,CAP_SYS_ADMIN,CAP_NET_ADMIN /home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/test-tmp/image-caps-from-nspawn-default.aci --caps-retain=CAP_CHOWN,CAP_DAC_OVERRIDE,CAP_DAC_READ_SEARCH,CAP_FOWNER,CAP_FSETID,CAP_IPC_OWNER,CAP_KILL,CAP_LEASE,CAP_LINUX_IMMUTABLE,CAP_NET_BIND_SERVICE,CAP_NET_BROADCAST,CAP_NET_RAW,CAP_SETGID,CAP_SETFCAP,CAP_SETPCAP,CAP_SETUID,CAP_SYS_ADMIN,CAP_SYS_CHROOT,CAP_SYS_NICE,CAP_SYS_PTRACE,CAP_SYS_TTY_CONFIG,CAP_SYS_RESOURCE,CAP_SYS_BOOT,CAP_AUDIT_WRITE,CAP_AUDIT_CONTROL /home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/test-tmp/image-remove-one-from-default.aci --caps-remove=CAP_CHOWN /home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/test-tmp/image-remove-one-from-default-old.aci --cap-remove=CAP_CHOWN /home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/test-tmp/image-remove-one-already-removed.aci --caps-remove=CAP_SYS_ADMIN /home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/test-tmp/image-remove-two.aci --caps-remove=CAP_CHOWN,CAP_SYS_ADMIN /home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/test-tmp/image-remove-all.aci --caps-remove=CAP_AUDIT_WRITE,CAP_CHOWN,CAP_DAC_OVERRIDE,CAP_FSETID,CAP_FOWNER,CAP_KILL,CAP_MKNOD,CAP_NET_RAW,CAP_NET_BIND_SERVICE,CAP_SETUID,CAP_SETGID,CAP_SETPCAP,CAP_SETFCAP,CAP_SYS_CHROOT /home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/test-tmp/image-remove-all-but-one.aci --caps-remove=CAP_AUDIT_WRITE,CAP_CHOWN,CAP_DAC_OVERRIDE,CAP_FSETID,CAP_FOWNER,CAP_KILL,CAP_MKNOD,CAP_NET_RAW,CAP_NET_BIND_SERVICE,CAP_SETUID,CAP_SETGID,CAP_SETPCAP,CAP_SETFCAP /home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/test-tmp/image-remove-all-plus-one.aci --caps-remove=CAP_AUDIT_WRITE,CAP_CHOWN,CAP_DAC_OVERRIDE,CAP_FSETID,CAP_FOWNER,CAP_KILL,CAP_MKNOD,CAP_NET_RAW,CAP_NET_BIND_SERVICE,CAP_SETUID,CAP_SETGID,CAP_SETPCAP,CAP_SETFCAP,CAP_SYS_CHROOT,CAP_SYS_ADMIN
	rkt_caps_test.go:300: Checking caps for "image-caps-from-nspawn-default"
	rkt_tests.go:119: Spawning command: /home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/rkt --dir=/tmp/datadir-437604756 --local-config=/tmp/localdir-300354531 --system-config=/tmp/systemdir-395961318 --user-config=/tmp/userdir-233907725 --insecure-options=image run  /home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/test-tmp/image-none.aci /home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/test-tmp/image-only-one-cap.aci --caps-retain=CAP_NET_ADMIN /home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/test-tmp/image-only-one-cap-old.aci --cap-retain=CAP_NET_ADMIN /home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/test-tmp/image-only-one-cap-from-default.aci --caps-retain=CAP_CHOWN /home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/test-tmp/image-some-caps.aci --caps-retain=CAP_CHOWN,CAP_FOWNER,CAP_SYS_ADMIN,CAP_NET_ADMIN /home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/test-tmp/image-caps-from-nspawn-default.aci --caps-retain=CAP_CHOWN,CAP_DAC_OVERRIDE,CAP_DAC_READ_SEARCH,CAP_FOWNER,CAP_FSETID,CAP_IPC_OWNER,CAP_KILL,CAP_LEASE,CAP_LINUX_IMMUTABLE,CAP_NET_BIND_SERVICE,CAP_NET_BROADCAST,CAP_NET_RAW,CAP_SETGID,CAP_SETFCAP,CAP_SETPCAP,CAP_SETUID,CAP_SYS_ADMIN,CAP_SYS_CHROOT,CAP_SYS_NICE,CAP_SYS_PTRACE,CAP_SYS_TTY_CONFIG,CAP_SYS_RESOURCE,CAP_SYS_BOOT,CAP_AUDIT_WRITE,CAP_AUDIT_CONTROL /home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/test-tmp/image-remove-one-from-default.aci --caps-remove=CAP_CHOWN /home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/test-tmp/image-remove-one-from-default-old.aci --cap-remove=CAP_CHOWN /home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/test-tmp/image-remove-one-already-removed.aci --caps-remove=CAP_SYS_ADMIN /home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/test-tmp/image-remove-two.aci --caps-remove=CAP_CHOWN,CAP_SYS_ADMIN /home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/test-tmp/image-remove-all.aci --caps-remove=CAP_AUDIT_WRITE,CAP_CHOWN,CAP_DAC_OVERRIDE,CAP_FSETID,CAP_FOWNER,CAP_KILL,CAP_MKNOD,CAP_NET_RAW,CAP_NET_BIND_SERVICE,CAP_SETUID,CAP_SETGID,CAP_SETPCAP,CAP_SETFCAP,CAP_SYS_CHROOT /home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/test-tmp/image-remove-all-but-one.aci --caps-remove=CAP_AUDIT_WRITE,CAP_CHOWN,CAP_DAC_OVERRIDE,CAP_FSETID,CAP_FOWNER,CAP_KILL,CAP_MKNOD,CAP_NET_RAW,CAP_NET_BIND_SERVICE,CAP_SETUID,CAP_SETGID,CAP_SETPCAP,CAP_SETFCAP /home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/test-tmp/image-remove-all-plus-one.aci --caps-remove=CAP_AUDIT_WRITE,CAP_CHOWN,CAP_DAC_OVERRIDE,CAP_FSETID,CAP_FOWNER,CAP_KILL,CAP_MKNOD,CAP_NET_RAW,CAP_NET_BIND_SERVICE,CAP_SETUID,CAP_SETGID,CAP_SETPCAP,CAP_SETFCAP,CAP_SYS_CHROOT,CAP_SYS_ADMIN
	rkt_caps_test.go:300: Checking caps for "image-remove-one-from-default"
	rkt_tests.go:119: Spawning command: /home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/rkt --dir=/tmp/datadir-437604756 --local-config=/tmp/localdir-300354531 --system-config=/tmp/systemdir-395961318 --user-config=/tmp/userdir-233907725 --insecure-options=image run  /home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/test-tmp/image-none.aci /home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/test-tmp/image-only-one-cap.aci --caps-retain=CAP_NET_ADMIN /home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/test-tmp/image-only-one-cap-old.aci --cap-retain=CAP_NET_ADMIN /home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/test-tmp/image-only-one-cap-from-default.aci --caps-retain=CAP_CHOWN /home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/test-tmp/image-some-caps.aci --caps-retain=CAP_CHOWN,CAP_FOWNER,CAP_SYS_ADMIN,CAP_NET_ADMIN /home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/test-tmp/image-caps-from-nspawn-default.aci --caps-retain=CAP_CHOWN,CAP_DAC_OVERRIDE,CAP_DAC_READ_SEARCH,CAP_FOWNER,CAP_FSETID,CAP_IPC_OWNER,CAP_KILL,CAP_LEASE,CAP_LINUX_IMMUTABLE,CAP_NET_BIND_SERVICE,CAP_NET_BROADCAST,CAP_NET_RAW,CAP_SETGID,CAP_SETFCAP,CAP_SETPCAP,CAP_SETUID,CAP_SYS_ADMIN,CAP_SYS_CHROOT,CAP_SYS_NICE,CAP_SYS_PTRACE,CAP_SYS_TTY_CONFIG,CAP_SYS_RESOURCE,CAP_SYS_BOOT,CAP_AUDIT_WRITE,CAP_AUDIT_CONTROL /home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/test-tmp/image-remove-one-from-default.aci --caps-remove=CAP_CHOWN /home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/test-tmp/image-remove-one-from-default-old.aci --cap-remove=CAP_CHOWN /home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/test-tmp/image-remove-one-already-removed.aci --caps-remove=CAP_SYS_ADMIN /home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/test-tmp/image-remove-two.aci --caps-remove=CAP_CHOWN,CAP_SYS_ADMIN /home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/test-tmp/image-remove-all.aci --caps-remove=CAP_AUDIT_WRITE,CAP_CHOWN,CAP_DAC_OVERRIDE,CAP_FSETID,CAP_FOWNER,CAP_KILL,CAP_MKNOD,CAP_NET_RAW,CAP_NET_BIND_SERVICE,CAP_SETUID,CAP_SETGID,CAP_SETPCAP,CAP_SETFCAP,CAP_SYS_CHROOT /home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/test-tmp/image-remove-all-but-one.aci --caps-remove=CAP_AUDIT_WRITE,CAP_CHOWN,CAP_DAC_OVERRIDE,CAP_FSETID,CAP_FOWNER,CAP_KILL,CAP_MKNOD,CAP_NET_RAW,CAP_NET_BIND_SERVICE,CAP_SETUID,CAP_SETGID,CAP_SETPCAP,CAP_SETFCAP /home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/test-tmp/image-remove-all-plus-one.aci --caps-remove=CAP_AUDIT_WRITE,CAP_CHOWN,CAP_DAC_OVERRIDE,CAP_FSETID,CAP_FOWNER,CAP_KILL,CAP_MKNOD,CAP_NET_RAW,CAP_NET_BIND_SERVICE,CAP_SETUID,CAP_SETGID,CAP_SETPCAP,CAP_SETFCAP,CAP_SYS_CHROOT,CAP_SYS_ADMIN
	rkt_caps_test.go:300: Checking caps for "image-remove-one-from-default-old"
	rkt_tests.go:119: Spawning command: /home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/rkt --dir=/tmp/datadir-437604756 --local-config=/tmp/localdir-300354531 --system-config=/tmp/systemdir-395961318 --user-config=/tmp/userdir-233907725 --insecure-options=image run  /home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/test-tmp/image-none.aci /home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/test-tmp/image-only-one-cap.aci --caps-retain=CAP_NET_ADMIN /home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/test-tmp/image-only-one-cap-old.aci --cap-retain=CAP_NET_ADMIN /home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/test-tmp/image-only-one-cap-from-default.aci --caps-retain=CAP_CHOWN /home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/test-tmp/image-some-caps.aci --caps-retain=CAP_CHOWN,CAP_FOWNER,CAP_SYS_ADMIN,CAP_NET_ADMIN /home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/test-tmp/image-caps-from-nspawn-default.aci --caps-retain=CAP_CHOWN,CAP_DAC_OVERRIDE,CAP_DAC_READ_SEARCH,CAP_FOWNER,CAP_FSETID,CAP_IPC_OWNER,CAP_KILL,CAP_LEASE,CAP_LINUX_IMMUTABLE,CAP_NET_BIND_SERVICE,CAP_NET_BROADCAST,CAP_NET_RAW,CAP_SETGID,CAP_SETFCAP,CAP_SETPCAP,CAP_SETUID,CAP_SYS_ADMIN,CAP_SYS_CHROOT,CAP_SYS_NICE,CAP_SYS_PTRACE,CAP_SYS_TTY_CONFIG,CAP_SYS_RESOURCE,CAP_SYS_BOOT,CAP_AUDIT_WRITE,CAP_AUDIT_CONTROL /home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/test-tmp/image-remove-one-from-default.aci --caps-remove=CAP_CHOWN /home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/test-tmp/image-remove-one-from-default-old.aci --cap-remove=CAP_CHOWN /home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/test-tmp/image-remove-one-already-removed.aci --caps-remove=CAP_SYS_ADMIN /home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/test-tmp/image-remove-two.aci --caps-remove=CAP_CHOWN,CAP_SYS_ADMIN /home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/test-tmp/image-remove-all.aci --caps-remove=CAP_AUDIT_WRITE,CAP_CHOWN,CAP_DAC_OVERRIDE,CAP_FSETID,CAP_FOWNER,CAP_KILL,CAP_MKNOD,CAP_NET_RAW,CAP_NET_BIND_SERVICE,CAP_SETUID,CAP_SETGID,CAP_SETPCAP,CAP_SETFCAP,CAP_SYS_CHROOT /home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/test-tmp/image-remove-all-but-one.aci --caps-remove=CAP_AUDIT_WRITE,CAP_CHOWN,CAP_DAC_OVERRIDE,CAP_FSETID,CAP_FOWNER,CAP_KILL,CAP_MKNOD,CAP_NET_RAW,CAP_NET_BIND_SERVICE,CAP_SETUID,CAP_SETGID,CAP_SETPCAP,CAP_SETFCAP /home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/test-tmp/image-remove-all-plus-one.aci --caps-remove=CAP_AUDIT_WRITE,CAP_CHOWN,CAP_DAC_OVERRIDE,CAP_FSETID,CAP_FOWNER,CAP_KILL,CAP_MKNOD,CAP_NET_RAW,CAP_NET_BIND_SERVICE,CAP_SETUID,CAP_SETGID,CAP_SETPCAP,CAP_SETFCAP,CAP_SYS_CHROOT,CAP_SYS_ADMIN
	rkt_caps_test.go:300: Checking caps for "image-remove-one-already-removed"
	rkt_tests.go:119: Spawning command: /home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/rkt --dir=/tmp/datadir-437604756 --local-config=/tmp/localdir-300354531 --system-config=/tmp/systemdir-395961318 --user-config=/tmp/userdir-233907725 --insecure-options=image run  /home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/test-tmp/image-none.aci /home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/test-tmp/image-only-one-cap.aci --caps-retain=CAP_NET_ADMIN /home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/test-tmp/image-only-one-cap-old.aci --cap-retain=CAP_NET_ADMIN /home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/test-tmp/image-only-one-cap-from-default.aci --caps-retain=CAP_CHOWN /home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/test-tmp/image-some-caps.aci --caps-retain=CAP_CHOWN,CAP_FOWNER,CAP_SYS_ADMIN,CAP_NET_ADMIN /home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/test-tmp/image-caps-from-nspawn-default.aci --caps-retain=CAP_CHOWN,CAP_DAC_OVERRIDE,CAP_DAC_READ_SEARCH,CAP_FOWNER,CAP_FSETID,CAP_IPC_OWNER,CAP_KILL,CAP_LEASE,CAP_LINUX_IMMUTABLE,CAP_NET_BIND_SERVICE,CAP_NET_BROADCAST,CAP_NET_RAW,CAP_SETGID,CAP_SETFCAP,CAP_SETPCAP,CAP_SETUID,CAP_SYS_ADMIN,CAP_SYS_CHROOT,CAP_SYS_NICE,CAP_SYS_PTRACE,CAP_SYS_TTY_CONFIG,CAP_SYS_RESOURCE,CAP_SYS_BOOT,CAP_AUDIT_WRITE,CAP_AUDIT_CONTROL /home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/test-tmp/image-remove-one-from-default.aci --caps-remove=CAP_CHOWN /home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/test-tmp/image-remove-one-from-default-old.aci --cap-remove=CAP_CHOWN /home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/test-tmp/image-remove-one-already-removed.aci --caps-remove=CAP_SYS_ADMIN /home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/test-tmp/image-remove-two.aci --caps-remove=CAP_CHOWN,CAP_SYS_ADMIN /home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/test-tmp/image-remove-all.aci --caps-remove=CAP_AUDIT_WRITE,CAP_CHOWN,CAP_DAC_OVERRIDE,CAP_FSETID,CAP_FOWNER,CAP_KILL,CAP_MKNOD,CAP_NET_RAW,CAP_NET_BIND_SERVICE,CAP_SETUID,CAP_SETGID,CAP_SETPCAP,CAP_SETFCAP,CAP_SYS_CHROOT /home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/test-tmp/image-remove-all-but-one.aci --caps-remove=CAP_AUDIT_WRITE,CAP_CHOWN,CAP_DAC_OVERRIDE,CAP_FSETID,CAP_FOWNER,CAP_KILL,CAP_MKNOD,CAP_NET_RAW,CAP_NET_BIND_SERVICE,CAP_SETUID,CAP_SETGID,CAP_SETPCAP,CAP_SETFCAP /home/admin/workspace/rkt-github-ci/os_type/debian-testing/stage1_flavor/coreos/builds/build-rkt-coreos/build-rkt-1.22.0+git/tmp/functional/test-tmp/image-remove-all-plus-one.aci --caps-remove=CAP_AUDIT_WRITE,CAP_CHOWN,CAP_DAC_OVERRIDE,CAP_FSETID,CAP_FOWNER,CAP_KILL,CAP_MKNOD,CAP_NET_RAW,CAP_NET_BIND_SERVICE,CAP_SETUID,CAP_SETGID,CAP_SETPCAP,CAP_SETFCAP,CAP_SYS_CHROOT,CAP_SYS_ADMIN
	rkt_caps_test.go:306: Expected "Capability set: bounding: chown, dac_override, fowner, fsetid, kill, setgid, setuid, setpcap, net_bind_service, net_raw, sys_chroot, mknod, audit_write, setfcap (image-remove-one-already-removed)" but not found: Flag --cap-retain has been deprecated, use --caps-retain instead
		Flag --cap-remove has been deprecated, use --caps-remove instead

I believe this is unlreated to this PR since it was already green in a previous run for this flavor, but I retriggered the build.

@s-urbaniak
Copy link
Contributor Author

retriggered build is green, hence merging.

@s-urbaniak s-urbaniak merged commit 6f79363 into rkt:master Jan 19, 2017
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants