diff options
author | Chris Evich <cevich@redhat.com> | 2022-02-28 12:33:33 -0500 |
---|---|---|
committer | Chris Evich <cevich@redhat.com> | 2022-04-27 12:13:54 -0400 |
commit | cd7cff6bb5da22c30abf2137d4beb8a956aa5b59 (patch) | |
tree | baf9fd183dec60725d2f89f753b1395fd1f4fb69 /contrib/cirrus/runner.sh | |
parent | 3a07fc446e2dffbcef51b02b946cd04d36fa2805 (diff) | |
download | podman-cd7cff6bb5da22c30abf2137d4beb8a956aa5b59.tar.gz podman-cd7cff6bb5da22c30abf2137d4beb8a956aa5b59.tar.bz2 podman-cd7cff6bb5da22c30abf2137d4beb8a956aa5b59.zip |
Cirrus: Test w/ netavark/aardvark-dns in F36+
Now that netavark and aardvark are packaged and default in F36, support
CNI-based testing in F35 and Ubuntu.
* Remove the temporary/special `$TEST_ENVIRON=host-netavark` construct.
* Remove dedicated/special integration and system testing tasks.
* Update test-config setup to properly handle CNI vs netavark/aardvark
environments.
* Update package-version logging to operate based on installed packages
(along with some other minor script cleanups).
* Update global environment setup to force `$NETWORK_BACKEND=netavark`
in F36 and later. Except when `upgrade_test` task runs.
* Discontinue installing netavark and aardvark-dns binaries from
upstream build artifacts.
* Drop CGV1-vs-2 policy check. Ubuntu VMs now exclusively test CGv1,
Fedora VMs test CGv2, with F35 testing CNI and F36 testing Netavark.
Signed-off-by: Chris Evich <cevich@redhat.com>
Diffstat (limited to 'contrib/cirrus/runner.sh')
-rwxr-xr-x | contrib/cirrus/runner.sh | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/contrib/cirrus/runner.sh b/contrib/cirrus/runner.sh index 5d6ba9921..832339d07 100755 --- a/contrib/cirrus/runner.sh +++ b/contrib/cirrus/runner.sh @@ -12,7 +12,7 @@ set -eo pipefail # most notably: # # PODBIN_NAME : "podman" (i.e. local) or "remote" -# TEST_ENVIRON : 'host', 'host-netavark', or 'container'; desired environment in which to run +# TEST_ENVIRON : 'host', or 'container'; desired environment in which to run # CONTAINER : 1 if *currently* running inside a container, 0 if host # |