-
Notifications
You must be signed in to change notification settings - Fork 2.8k
Closed
Labels
flakesFlakes from Continuous IntegrationFlakes from Continuous Integrationlocked - please file new issue/PRAssist humans wanting to comment on an old issue or PR with locked comments.Assist humans wanting to comment on an old issue or PR with locked comments.
Description
Placeholder for a known flake wherein network namespaces are being leaked at the end of a system test run, even when all tests pass:
# +netns-UUID
#
# ^^^^^ Leaks found in /run/netns ^^^^^
All podman network create
commands use safename, AFAICT, so this is a difficult one to track down.
- debian-13 : sys podman debian-13 root host sqlite
- PR CI: format test: use local registry if available #24041
- 09-23 10:26 in [sys] teardown_suite
- PR WIP: system test parallelization: two-pass approach #23275
- 09-18 16:19 in [sys] teardown_suite
- PR CI: format test: use local registry if available #24041
- fedora-40 : sys podman fedora-40 rootless host boltdb
- PR CI: system tests: various small cleanups #24007
- 09-18 14:54 in [sys] teardown_suite
- PR CI: system tests: various small cleanups #24007
- fedora-40-aarch64 : sys podman fedora-40-aarch64 root host sqlite
- PR CI: Quadlet rootfs test: use container image as rootfs #24019
- 09-19 17:46 in [sys] teardown_suite
- PR CI: Quadlet rootfs test: use container image as rootfs #24019
x | x | x | x | x | x |
---|---|---|---|---|---|
sys(4) | podman(4) | debian-13(2) | root(3) | host(4) | sqlite(3) |
fedora-40-aarch64(1) | rootless(1) | boltdb(1) | |||
fedora-40(1) |
Metadata
Metadata
Assignees
Labels
flakesFlakes from Continuous IntegrationFlakes from Continuous Integrationlocked - please file new issue/PRAssist humans wanting to comment on an old issue or PR with locked comments.Assist humans wanting to comment on an old issue or PR with locked comments.