Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

CI: mark 320-system-df *NOT* parallel safe #23916

Merged
merged 1 commit into from
Sep 13, 2024

Conversation

edsantiago
Copy link
Member

...because it requires 100% control and knowledge of the
state of all images, containers, and volumes.

Use safename anyway, just in case we ever have a leak from here.
I'm finding safename sooooooo helpful when reading journal.

Signed-off-by: Ed Santiago [email protected]

None

...because it requires 100% control and knowledge of the
state of all images, containers, and volumes.

Use safename anyway, just in case we ever have a leak from here.
I'm finding safename sooooooo helpful when reading journal.

Signed-off-by: Ed Santiago <[email protected]>
Copy link
Contributor

openshift-ci bot commented Sep 10, 2024

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: edsantiago

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@openshift-ci openshift-ci bot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Sep 10, 2024
@rhatdan
Copy link
Member

rhatdan commented Sep 10, 2024

LGTM

@baude
Copy link
Member

baude commented Sep 13, 2024

/lgtm

@openshift-ci openshift-ci bot added the lgtm Indicates that a PR is ready to be merged. label Sep 13, 2024
@openshift-merge-bot openshift-merge-bot bot merged commit 29f7500 into containers:main Sep 13, 2024
56 checks passed
@edsantiago edsantiago deleted the safename-320 branch September 16, 2024 11:03
Comment on lines +12 to +15
run_podman pod rm -a -f
run_podman rm -f -a -t0
run_podman volume rm -a
run_podman image rm -f -a
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Doesn't this break the leak check for all prior tests basically? It seems we must check for leaks before this here.

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I'm sorry, I've tried a few times but still don't understand your concern. You mean the leak check in basic_teardown? I don't see how this could break that?

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Well basic_teardown doesn't do a leak_check by default since #22909.

The only leak check done is in teardown_suite, this means that if a test run before the systemd df tests leaked a container we will not catch it due this change. Granted there are other tests that actual test --all so they behave similar so maybe it is not that big of a deal. And we do use PODMAN_BATS_LEAK_CHECK in nightly runs to catch leaks hopefully anyways

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Oh I think I see. But: the whole reason for this change is that a pre-320 test did leak a container, and that caused this entire file to fail with lots of noisy and unhelpful errors. I don't remember if the final leak check also caught the leaks or not, because I only focused on the errors in order and probably never made it to the bottom of the log.

One ugly workaround could be to run leak_check here, before all the rms. It doesn't appeal to me, in the sense of separation of responsibilities (test code should not have to worry about infrastructure) and because a leak check failure would still be confusing to a reader, but probably less confusing than a bunch of system-df failures. Any ideas on how to do this better?

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Yeah I am afraid there is no good answer here... I can live with it but if there are leaks the nightly run should catch it already. So if you say you need this because of leaks then this seems to be a concern that we should address and then maybe remove the rm --all here?

@stale-locking-app stale-locking-app bot added the locked - please file new issue/PR Assist humans wanting to comment on an old issue or PR with locked comments. label Dec 17, 2024
@stale-locking-app stale-locking-app bot locked as resolved and limited conversation to collaborators Dec 17, 2024
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
approved Indicates a PR has been approved by an approver from all required OWNERS files. lgtm Indicates that a PR is ready to be merged. locked - please file new issue/PR Assist humans wanting to comment on an old issue or PR with locked comments. release-note-none
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants