aboutsummaryrefslogtreecommitdiff
path: root/contrib/cirrus/runner.sh
diff options
context:
space:
mode:
authorChris Evich <cevich@redhat.com>2022-02-28 12:33:33 -0500
committerChris Evich <cevich@redhat.com>2022-04-27 12:13:54 -0400
commitcd7cff6bb5da22c30abf2137d4beb8a956aa5b59 (patch)
treebaf9fd183dec60725d2f89f753b1395fd1f4fb69 /contrib/cirrus/runner.sh
parent3a07fc446e2dffbcef51b02b946cd04d36fa2805 (diff)
downloadpodman-cd7cff6bb5da22c30abf2137d4beb8a956aa5b59.tar.gz
podman-cd7cff6bb5da22c30abf2137d4beb8a956aa5b59.tar.bz2
podman-cd7cff6bb5da22c30abf2137d4beb8a956aa5b59.zip
Cirrus: Test w/ netavark/aardvark-dns in F36+
Now that netavark and aardvark are packaged and default in F36, support CNI-based testing in F35 and Ubuntu. * Remove the temporary/special `$TEST_ENVIRON=host-netavark` construct. * Remove dedicated/special integration and system testing tasks. * Update test-config setup to properly handle CNI vs netavark/aardvark environments. * Update package-version logging to operate based on installed packages (along with some other minor script cleanups). * Update global environment setup to force `$NETWORK_BACKEND=netavark` in F36 and later. Except when `upgrade_test` task runs. * Discontinue installing netavark and aardvark-dns binaries from upstream build artifacts. * Drop CGV1-vs-2 policy check. Ubuntu VMs now exclusively test CGv1, Fedora VMs test CGv2, with F35 testing CNI and F36 testing Netavark. Signed-off-by: Chris Evich <cevich@redhat.com>
Diffstat (limited to 'contrib/cirrus/runner.sh')
-rwxr-xr-xcontrib/cirrus/runner.sh2
1 files changed, 1 insertions, 1 deletions
diff --git a/contrib/cirrus/runner.sh b/contrib/cirrus/runner.sh
index 5d6ba9921..832339d07 100755
--- a/contrib/cirrus/runner.sh
+++ b/contrib/cirrus/runner.sh
@@ -12,7 +12,7 @@ set -eo pipefail
# most notably:
#
# PODBIN_NAME : "podman" (i.e. local) or "remote"
-# TEST_ENVIRON : 'host', 'host-netavark', or 'container'; desired environment in which to run
+# TEST_ENVIRON : 'host', or 'container'; desired environment in which to run
# CONTAINER : 1 if *currently* running inside a container, 0 if host
#