Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

system tests: new tests #7687

Merged
merged 1 commit into from
Sep 25, 2020
Merged

Conversation

edsantiago
Copy link
Member

For convenience and robustness, build a new testimage
containing a custom file /home/podman/testimage-id
with contents YYYYMMDD (same as image tag). The
image-mount test checks that this file exists and
has the desired content. New testimage also includes
a dummy 'pause' executable, for testing pod infra.

Updates from testimage:20200902 to :20200917

Signed-off-by: Ed Santiago [email protected]

@openshift-ci-robot
Copy link
Collaborator

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: edsantiago

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@openshift-ci-robot openshift-ci-robot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Sep 18, 2020
Copy link
Member

@vrothberg vrothberg left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM, nice work!

@edsantiago
Copy link
Member Author

Error: network 10.254.134.0/24 is already being used by a cni configuration

Sigh, I was afraid of that. I'll have to get back to this on Monday. ITM, any suggestions on how to test for a safe rfc1918 subnet?

@mheon
Copy link
Member

mheon commented Sep 18, 2020

I believe there's a file somewhere in the repo that we use to give Cirrus VMs a list of unusable subnets for network create (nets already in use by GCP) - maybe consulting with that would help reduce the possibility of this?

@edsantiago
Copy link
Member Author

Unfortunately that doesn't help when running tests in the Fedora or RHEL gating environments. I need a bulletproof way to check the local environment.

- podman network create: new test

- podman pull by-sha + podman images -a (containers#7651)

- podman image mount: new test

- podman pod: --infra-image and --infra-command (containers#7167)

For convenience and robustness, build a new testimage
containing a custom file /home/podman/testimage-id
with contents YYYYMMDD (same as image tag). The
image-mount test checks that this file exists and
has the desired content. New testimage also includes
a dummy 'pause' executable, for testing pod infra.

Updates from testimage:20200902 to :20200917

Signed-off-by: Ed Santiago <[email protected]>
@edsantiago
Copy link
Member Author

Looking at contrib/cirrus/99-do-not-use-google-subnets.conflist I found that the whole 10.128-10.255 block is reserved for the Google environment. Since this may be subject to change without notice, I altered the network test to use the class B block (172.16-172.31) instead. This is less common, but still not any sort of guarantee that the subnet is free.

I considered adding retries, detecting "being used by a cni configuration" and rerunning the random_rfc1918 loop, but that's still fragile and introduces its own risk.

I considered parsing the output of podman network ls -> podman network inspect and, um, yeah, no.

Any better ideas?

@jwhonce
Copy link
Member

jwhonce commented Sep 25, 2020

We can refine if network selection becomes an issue

/lgtm

@openshift-ci-robot openshift-ci-robot added the lgtm Indicates that a PR is ready to be merged. label Sep 25, 2020
@openshift-merge-robot openshift-merge-robot merged commit b9d7779 into containers:master Sep 25, 2020
@github-actions github-actions bot added the locked - please file new issue/PR Assist humans wanting to comment on an old issue or PR with locked comments. label Sep 24, 2023
@github-actions github-actions bot locked as resolved and limited conversation to collaborators Sep 24, 2023
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
approved Indicates a PR has been approved by an approver from all required OWNERS files. lgtm Indicates that a PR is ready to be merged. locked - please file new issue/PR Assist humans wanting to comment on an old issue or PR with locked comments.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

6 participants