-
Notifications
You must be signed in to change notification settings - Fork 2.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
system tests: new tests #7687
system tests: new tests #7687
Conversation
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: edsantiago The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM, nice work!
Sigh, I was afraid of that. I'll have to get back to this on Monday. ITM, any suggestions on how to test for a safe rfc1918 subnet? |
I believe there's a file somewhere in the repo that we use to give Cirrus VMs a list of unusable subnets for |
Unfortunately that doesn't help when running tests in the Fedora or RHEL gating environments. I need a bulletproof way to check the local environment. |
- podman network create: new test - podman pull by-sha + podman images -a (containers#7651) - podman image mount: new test - podman pod: --infra-image and --infra-command (containers#7167) For convenience and robustness, build a new testimage containing a custom file /home/podman/testimage-id with contents YYYYMMDD (same as image tag). The image-mount test checks that this file exists and has the desired content. New testimage also includes a dummy 'pause' executable, for testing pod infra. Updates from testimage:20200902 to :20200917 Signed-off-by: Ed Santiago <[email protected]>
Looking at contrib/cirrus/99-do-not-use-google-subnets.conflist I found that the whole I considered adding retries, detecting "being used by a cni configuration" and rerunning the random_rfc1918 loop, but that's still fragile and introduces its own risk. I considered parsing the output of Any better ideas? |
We can refine if network selection becomes an issue /lgtm |
podman network create: new test
podman pull by-sha + podman images -a (
podman images -a
breaks after pulling <image>@<digest> #7651)podman image mount: new test
podman pod: --infra-image and --infra-command ('--infra-command' parameter in pod create not working as expected #7167)
For convenience and robustness, build a new testimage
containing a custom file /home/podman/testimage-id
with contents YYYYMMDD (same as image tag). The
image-mount test checks that this file exists and
has the desired content. New testimage also includes
a dummy 'pause' executable, for testing pod infra.
Updates from testimage:20200902 to :20200917
Signed-off-by: Ed Santiago [email protected]