From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from shymkent.ilbers.de ([unix socket]) by shymkent (Cyrus 2.5.10-Debian-2.5.10-3+deb9u2) with LMTPA; Mon, 05 Aug 2024 09:20:24 +0200 X-Sieve: CMU Sieve 2.4 Received: from mail-lj1-f190.google.com (mail-lj1-f190.google.com [209.85.208.190]) by shymkent.ilbers.de (8.15.2/8.15.2/Debian-8+deb9u1) with ESMTPS id 4757KNBB001542 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT) for ; Mon, 5 Aug 2024 09:20:24 +0200 Received: by mail-lj1-f190.google.com with SMTP id 38308e7fff4ca-2ef24fb4412sf33634831fa.0 for ; Mon, 05 Aug 2024 00:20:24 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1722842418; cv=pass; d=google.com; s=arc-20160816; b=nR9+9RbdejD+xbuyhIC9bIUqydJH4+JDbSssLzo0dxpOnBoRZisRJHK6wk9XcVVsJO 5HiPsxs7XWIXqaQD4V2VEbYKmx4vqTzffwvpwGygJpdtk7K0S03cibnb3ecE0gEwp9kj CUyY0buNhqAV/97fAmjRQP/g8IwSopJxmEHgytMkJo4F5Emv/Ta47zYRgSapEr9ub14Z zkC7u9EThyR/p3Ycd1h1dMSdwlE9C9fbhq5sZgCxcdvRh9PHraXCAGqJxE56ZrhSdEp0 5+MzNyYCGVHkR0+MjI6hw3YSpAbPFrOzQeSGUhAvKOljVUdlnLPw91ThzyfQiW3Ea1qT n5/A== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-unsubscribe:list-subscribe:list-archive:list-help:list-post :list-id:mailing-list:precedence:mime-version:user-agent :content-transfer-encoding:autocrypt:references:in-reply-to:date:to :from:subject:message-id:sender:dkim-signature; bh=tXsh1XcMrkFdSEayyTigsciQ4GuIALEYLi5nmnpB68w=; fh=skuF7qU9R3/vRM15R6jm+0FNsyKB/KovICX5z+em8Jk=; b=WNKYt1k2ysvpMQVBoDMSYdqTomADXy0OZGVwUP2eyCW1pIRvk7uNslL/olkgtpUKYw U6tIhAhgZi9XjsLyFyhgwxLP+f65x+i8LUk9L1ksT9pK/3K34NJykKc90uyn3/0fu7ew wkVpstf4dBjBl4iy0SNOLJcObt1VDIx8nUzRFYC26QZsUcrjAVlA4SuT+QcefadtpkOW RHJDvn0XEOQWoliG8o1LS6QIqO1TrEabM9QhCb1aL/cGNmpO12O27UEnH6QwFIyCU6NQ P9qnSLs/Mjg/azBn1txrzSTRe49ghWEtgl2ZU8ajpj/kIAUqN1FBBeE3EmO4B6XHB6Gi CPtA==; darn=isar-build.org ARC-Authentication-Results: i=2; gmr-mx.google.com; spf=pass (google.com: domain of ubely@ilbers.de designates 85.214.156.166 as permitted sender) smtp.mailfrom=ubely@ilbers.de DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=googlegroups.com; s=20230601; t=1722842418; x=1723447218; darn=isar-build.org; h=list-unsubscribe:list-subscribe:list-archive:list-help:list-post :list-id:mailing-list:precedence:x-original-authentication-results :x-original-sender:mime-version:user-agent:content-transfer-encoding :autocrypt:references:in-reply-to:date:to:from:subject:message-id :sender:from:to:cc:subject:date:message-id:reply-to; bh=tXsh1XcMrkFdSEayyTigsciQ4GuIALEYLi5nmnpB68w=; b=n8ib5hCwg10Xh882Pl5HkwaV4gQAVHAZOP3v/PvUFpUORghtexiaEavinidXtGG1OZ aylDSERTHWFRUtyNbaxoC6IdIyIV85z5xyEFocQbXhM1+674NR1ZTZcVkOqytQdVSN2/ EooqtErzNVno4OBiyXKrM94AocsYnsUc5ngTYHi3e1ir3cPQff1ZpWgSTuU+ZrImCeEU x5bDl74FyjN/7wN4EWF3tiWnDEha2GFR+rHbNlHkUE0Pm4cY8GqWpB/etWSGgdghsC4U SWceslJ5n296nxr8OiWB2271B1hi+o1OngmBgPmT6aEMW8g85UtK4o31VP7j4vVXeFGZ lWYw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1722842418; x=1723447218; h=list-unsubscribe:list-subscribe:list-archive:list-help:list-post :x-spam-checked-in-group:list-id:mailing-list:precedence :x-original-authentication-results:x-original-sender:mime-version :user-agent:content-transfer-encoding:autocrypt:references :in-reply-to:date:to:from:subject:message-id:x-beenthere :x-gm-message-state:sender:from:to:cc:subject:date:message-id :reply-to; bh=tXsh1XcMrkFdSEayyTigsciQ4GuIALEYLi5nmnpB68w=; b=Eg0wqYZhJQf0h411vig2c8RYZ86byfsTHKl+WkgrQm4oX4ofwBJ/S2nVN8WGhI21E8 27zQaOdxH0rPGyuMOc8++/61ylPQI8p30WJAgdm8OSYSuKSqZ9D4Boy/Yl49c9JM1k6k 8GFDz7xpe9a6tpb0JQMjMOljndAEolckFEw1mIJfDDkCtDpRIDp91EeLJzvy1OQnveWG pFaASReEMhBwgmDZh9S+V5CIngoFJ/Ad9dKSyHiQfgBpk4lgElTe3LhwdIu1YTrgo9+W Ce+aTgeXSwEgIqu3U7Fe7UZQ4THwAbZ9eEyWqXEk0aj/CRJYMv7ybu5iq3FT/JcMOeZ6 /MlQ== Sender: isar-users@googlegroups.com X-Forwarded-Encrypted: i=2; AJvYcCUfnoJhKiwg6Tx/xRlzDNLWOt+4vAdZiNj4iBFG2eUZ8puwGKG48OegkoaJcaz3tNB0xt84PEGNZFnAQY8wIttTPbM= X-Gm-Message-State: AOJu0YwWMHYEy5Kv2ZNK0c+O9nbf556JmZjGuPSMp769QLxIu/SE2UHU xlBIdtlVoF6+SAoCEnivTTlbCcfQS+LbmRO3Bs1V8U1h8nGzQHmg X-Google-Smtp-Source: AGHT+IEWl6UofF8M9rTlwmKpVvpP7ihAGK1wxfLf89cJFtMEbPs6njhg2YRXRTqo+52ZXqV2zlBnww== X-Received: by 2002:a2e:bc26:0:b0:2f1:709f:cc77 with SMTP id 38308e7fff4ca-2f1709fcde7mr18038561fa.19.1722842416859; Mon, 05 Aug 2024 00:20:16 -0700 (PDT) X-BeenThere: isar-users@googlegroups.com Received: by 2002:a2e:311:0:b0:2ef:22c0:69b4 with SMTP id 38308e7fff4ca-2f16a60edd8ls2693981fa.2.-pod-prod-00-eu; Mon, 05 Aug 2024 00:20:14 -0700 (PDT) X-Forwarded-Encrypted: i=2; AJvYcCXN3r7DPjkUQKloHfx5W8VvHJqveMGmyU/Ls4H8t8vhFH6AGpm9X4wMhXJAaJ+9+qQiBl20jIcG9X1QmWdXYL+jti0n8yzFgAPF+Lw= X-Received: by 2002:a2e:1f11:0:b0:2ef:28ed:1ff5 with SMTP id 38308e7fff4ca-2f1576ca69fmr32758441fa.15.1722842414419; Mon, 05 Aug 2024 00:20:14 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1722842414; cv=none; d=google.com; s=arc-20160816; b=yI15Cl7y7cuiffl9g+CpXBO1d8KXzMANOpm+sljivC1xEuSMLRYCxD5QklQPegHgzR fLLLe/ZZ2govwjo4QRnHgc9StvTTZXz6w9f8XqI/vowawdlagtowMXk7lDzOZIWwX2Um V544QUHEHx1atn7mXIIFT+8oCCufqro5Xut1+1hcccLWVclBcsSW/HlCLHDqnZNwyTzU dtFVxBI1wXPhv+ZGTzDFlGRonC737aMaDq82YsxaNpkdb1q8CAyE+TJjbP1cLYwfewVS jQ8ds4Pocrh9Az3XCj2ppD9GefTZ4M/M8lRUHwUNmrgvXjFbulf6hSEPLFm0VbjE6MWi Q5yw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=mime-version:user-agent:content-transfer-encoding:autocrypt :references:in-reply-to:date:to:from:subject:message-id; bh=jqemxOg53dGO42BoNCpYdoXNLTeI8Od3brSQcHc8IaQ=; fh=toe3JxaqWj6CNLBodTC4VvYBkL4Sv5iCa6MroCGpkRg=; b=1EHZXHcJA+qZyIIuUdWZ+zuwxS6Fj8lvoqNVIeNKPd9sLTmjoMqDpKjBY6oB64xSmH /gH3mOpnrzTNmImjiGIexSlpHZHDcEQnpu/Pb3SCorpJZancq3UiVnWFfexBm6VYGGnx KWIJP1p9aFzX3605Z8qAWd1aeF4ej0GUzJHL0+2YrJ7FTRXO6K356m4Rx1kAQ3/gvlVJ J6vmqE1T8jwQfiYnjLJm8Tk2dzTgyVEX7N0TDZFAPcYL52LWCAlHQKq6Ev6iEA9p99nl XI9vV9hdCS2qFkxU9B7vgBuXAq38gFyMOiHA+JXxsBVhVO++HVIlkB3Ephqs+clJUciW 2pRg==; dara=google.com ARC-Authentication-Results: i=1; gmr-mx.google.com; spf=pass (google.com: domain of ubely@ilbers.de designates 85.214.156.166 as permitted sender) smtp.mailfrom=ubely@ilbers.de Received: from shymkent.ilbers.de (shymkent.ilbers.de. [85.214.156.166]) by gmr-mx.google.com with ESMTPS id 2adb3069b0e04-530bba2732bsi262678e87.8.2024.08.05.00.20.14 for (version=TLS1_2 cipher=ECDHE-ECDSA-CHACHA20-POLY1305 bits=256/256); Mon, 05 Aug 2024 00:20:14 -0700 (PDT) Received-SPF: pass (google.com: domain of ubely@ilbers.de designates 85.214.156.166 as permitted sender) client-ip=85.214.156.166; Received: from [IPv6:::1] (host-80-81-17-52.static.customer.m-online.net [80.81.17.52]) (authenticated bits=0) by shymkent.ilbers.de (8.15.2/8.15.2/Debian-8+deb9u1) with ESMTPSA id 4757KCuf001535 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Mon, 5 Aug 2024 09:20:13 +0200 Message-ID: Subject: Re: [PATCH v4 4/5] ci: Add test cases for container fetching and loading From: Uladzimir Bely To: Jan Kiszka , isar-users Date: Mon, 05 Aug 2024 10:20:11 +0300 In-Reply-To: <38ba708f-aacd-4f9b-a777-40a993335cc8@web.de> References: <3a0b76b54aca9cee33d249a2df73d233edf08708.1721407122.git.jan.kiszka@siemens.com> <624dbb193e9bfbaedbfb7e288b6b295bd9fe5a06.camel@ilbers.de> <38ba708f-aacd-4f9b-a777-40a993335cc8@web.de> Autocrypt: addr=ubely@ilbers.de; prefer-encrypt=mutual; keydata=mQENBGO2eUkBCACtT+T3OrPVSExBmqfgXT3lp9XcdxRzjYp26wezkgYjjBXaf36bxtaAf S471VoQtpar0RVeFfW7WDDdfX9ZclSj36zBQe+RVSJzoNoNQfjOXWuSHb5Z+cpAFtqBY4muxK4+ia IlLJd6CN3ejOsLHATtCeHHq8wi0z2T+KdLQO+wQRgo2hjj0Lp9pGTrKJry50HP/o7Vbdu14dOx2xq r8+wPc6SQbBIrcqaa4MqCQC00vQG7eXvo+k2MOw59FDdpMH0KR9mHgp3u/s4I+4YRBArukt9G9xz/ rsEFmxAIBC6N/a6Hzwg4puc91n7ABDsPg8Vp+X3MDraujN0dvR6OKVNtABEBAAG0IFVsYWR6aW1pc iBCZWx5IDx1YmVseUBpbGJlcnMuZGU+iQFOBBMBCAA4FiEEJqPNVhVGyk12Eh+PAUQYBM/2FkoFAm O2eUkCGwMFCwkIBwIGFQoJCAsCBBYCAwECHgECF4AACgkQAUQYBM/2FkprlAgAmuna8Hm9EyoEtTl DBGDg6Zm4ZLp5ffvZBE946h92jepDrteoxsJ7pSzJVC2HmDLa4iZUao7lLLbDsUj5x45/iLJcqBZK k3YnAxP2r6a+kI+1VVQY1pxdG1nlJAbdNzoojm/qmezNPSrqni61KVMQKsXBCWhIjSXDSM9CsBj21 a+9qaVqfxovJGTn9lgrZO+xzKQNMKZeOouJlscVuFj21P0ww3/YENiU/nMeTSuYypO76mDtAd08Jo nc3yuHa9MJGei5ixN3wT+IrGR2aL2hdw2M6NgH7sYbL2Zi4ugD6RXHJai1Bh2yvFSVqSQ+M6QOInT 4ud7wslm1XRB065dXtA== Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable User-Agent: Evolution 3.52.3 (by Flathub.org) MIME-Version: 1.0 X-Spam-Status: No, score=-4.6 required=5.0 tests=DKIMWL_WL_MED,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_EF,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,RCVD_IN_MSPIKE_H2,RCVD_IN_RP_CERTIFIED, RCVD_IN_RP_RNBL,RCVD_IN_RP_SAFE,SPF_PASS autolearn=unavailable autolearn_force=no version=3.4.2 X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on shymkent.ilbers.de X-Original-Sender: ubely@ilbers.de X-Original-Authentication-Results: gmr-mx.google.com; spf=pass (google.com: domain of ubely@ilbers.de designates 85.214.156.166 as permitted sender) smtp.mailfrom=ubely@ilbers.de Precedence: list Mailing-list: list isar-users@googlegroups.com; contact isar-users+owners@googlegroups.com List-ID: X-Spam-Checked-In-Group: isar-users@googlegroups.com X-Google-Group-Id: 914930254986 List-Post: , List-Help: , List-Archive: , List-Unsubscribe: , X-TUID: a6mSOZuO1AXg On Tue, 2024-07-30 at 23:45 +0200, Jan Kiszka wrote: > On 30.07.24 09:44, Uladzimir Bely wrote: > > On Fri, 2024-07-19 at 18:38 +0200, 'Jan Kiszka' via isar-users > > wrote: > > > From: Jan Kiszka > > >=20 > > > This plugs the two example recipes for loading container images > > > into > > > VM-based testing. The test consists of running 'true' in the > > > installed > > > alpine images. > > >=20 > > > Rather than enabling the ci user to do password-less sudo, this > > > uses > > > su > > > with the piped-in password. Another trick needed is to poll for > > > the > > > images because loading is performed asynchronously. > > >=20 > > > Signed-off-by: Jan Kiszka > > > --- > > > =C2=A0.../recipes-core/images/isar-image-ci.bb=C2=A0=C2=A0=C2=A0=C2= =A0=C2=A0 |=C2=A0 2 ++ > > > =C2=A0testsuite/citest.py=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0= =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2= =A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 | 21 > > > +++++++++++++++++++ > > > =C2=A02 files changed, 23 insertions(+) > > >=20 > > > diff --git a/meta-test/recipes-core/images/isar-image-ci.bb > > > b/meta- > > > test/recipes-core/images/isar-image-ci.bb > > > index e5d51e6e..9133da74 100644 > > > --- a/meta-test/recipes-core/images/isar-image-ci.bb > > > +++ b/meta-test/recipes-core/images/isar-image-ci.bb > > > @@ -16,6 +16,7 @@ IMAGE_INSTALL +=3D "sshd-regen-keys" > > > =C2=A0 > > > =C2=A0# qemuamd64-bookworm > > > =C2=A0WKS_FILE:qemuamd64:debian-bookworm ?=3D "multipart-efi.wks" > > > +IMAGE_INSTALL:append:qemuamd64:debian-bookworm =3D " prebuilt- > > > docker- > > > img prebuilt-podman-img" > > > =C2=A0 > > > =C2=A0# qemuamd64-bullseye > > > =C2=A0IMAGE_FSTYPES:append:qemuamd64:debian-bullseye ?=3D " cpio.gz > > > tar.gz" > > > @@ -51,3 +52,4 @@ IMAGER_INSTALL:append:qemuarm:debian-bookworm > > > ?=3D " > > > ${SYSTEMD_BOOTLOADER_INSTALL} > > > =C2=A0# qemuarm64-bookworm > > > =C2=A0IMAGE_FSTYPES:append:qemuarm64:debian-bookworm ?=3D " wic.xz" > > > =C2=A0IMAGER_INSTALL:append:qemuarm64:debian-bookworm ?=3D " > > > ${GRUB_BOOTLOADER_INSTALL}" > > > +IMAGE_INSTALL:append:qemuarm64:debian-bookworm =3D " prebuilt- > > > docker- > > > img prebuilt-podman-img" > > > diff --git a/testsuite/citest.py b/testsuite/citest.py > > > index 8dd907d0..539c9440 100755 > > > --- a/testsuite/citest.py > > > +++ b/testsuite/citest.py > > > @@ -522,3 +522,24 @@ class VmBootTestFull(CIBaseTest): > > > =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 self.init() > > > =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 self.vm_start('mipse= l','bookworm', image=3D'isar-image- > > > ci', > > > =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2= =A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 script=3D't= est_kernel_module.sh > > > example_module') > > > + > > > + > > > +=C2=A0=C2=A0=C2=A0 def test_amd64_bookworm_prebuilt_containers(self)= : > > > +=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 self.init() > > > +=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 self.vm_start('amd64', 'b= ookworm', image=3D'isar-image- > > > ci', > > > +=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0= =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 cmd=3D'echo ro= ot | su -c \'' \ > > > +=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0= =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2= =A0=C2=A0 'PATH=3D\$PATH:/usr/sbin;' \ > > > +=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0= =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2= =A0=C2=A0 'for n in \$(seq 30); do docker images > > > | > > > grep -q alpine && break; sleep 10; done;' \ > > > +=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0= =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2= =A0=C2=A0 'docker run --rm > > > quay.io/libpod/alpine:3.10.2 true && ' \ > > > +=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0= =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2= =A0=C2=A0 'for n in \$(seq 30); do podman images > > > | > > > grep -q alpine && break; sleep 10; done;' \ > > > +=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0= =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2= =A0=C2=A0 'podman run --rm > > > quay.io/libpod/alpine:latest true\'') > > > + > > > +=C2=A0=C2=A0=C2=A0 def test_arm64_bookworm_prebuilt_containers(self)= : > > > +=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 self.init() > > > +=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 self.vm_start('arm64', 'b= ookworm', image=3D'isar-image- > > > ci', > > > +=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0= =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 cmd=3D'echo ro= ot | su -c \'' \ > > > +=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0= =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2= =A0=C2=A0 'PATH=3D\$PATH:/usr/sbin;' \ > > > +=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0= =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2= =A0=C2=A0 'for n in \$(seq 30); do docker images > > > | > > > grep -q alpine && break; sleep 10; done;' \ > > > +=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0= =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2= =A0=C2=A0 'docker run --rm > > > quay.io/libpod/alpine:3.10.2 true && ' \ > > > +=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0= =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2= =A0=C2=A0 'for n in \$(seq 30); do podman images > > > | > > > grep -q alpine && break; sleep 10; done;' \ > > > +=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0= =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2= =A0=C2=A0 'podman run --rm > > > quay.io/libpod/alpine:latest true\'') > >=20 > > This appears to fail in CI: > >=20 > > [stdlog] 2024-07-30 07:29:37,721 avocado.app ERROR| qemu-system- > > aarch64: -drive > > file=3D/workspace/build/isar_ub_devel/49/build/tmp/deploy/images/qemu > > arm6 > > 4/isar-image-ci-debian-bookworm- > > qemuarm64.ext4,if=3Dnone,format=3Draw,id=3Dhd0: Could not open > > '/workspace/build/isar_ub_devel/49/build/tmp/deploy/images/qemuarm6 > > 4/is > > ar-image-ci-debian-bookworm-qemuarm64.ext4': No such file or > > directory > >=20 > > Should be either changed the bullseye here (not yet checked if it > > works). Or, we need to build arm64-bullseye image in build tests > > before. >=20 > bullseye is legacy. >=20 Hello. I rebased the patchset on top of "[PATCH] testsuite: Build bookworm arm64 image in no-cross test". So, now this test doesn't fail this way. But there were other issues related to the backslashed '\$'. I couldn't catch this until applied one more useful patch: "[PATCH] testsuite: Save ssh command stdout/stderr in case of failure" that allowed to see syntax error here. Also, flake8 appeared to recognize this as "W605 invalid escape sequence '\$'". I've just sent a replacement of the patch that fixes the issue and python style here. You could prepare pathset v5, or I could merge it as is after testing. > Unfortunately, the testsuite lacks a dependency model. Here, > VmBootTestFull depends on CrossTest and NoCrossTest - apparently this > was not the case so far. >=20 > I'm still wondering why we are using such an unhandy and non-standard > test framework if not even such basic things are expressed - or are > even > expressible? >=20 > Jan >=20 --=20 Best regards, Uladzimir. --=20 You received this message because you are subscribed to the Google Groups "= isar-users" group. To unsubscribe from this group and stop receiving emails from it, send an e= mail to isar-users+unsubscribe@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/= isar-users/ec827283af69b6564ae5915ada6e9def88f7ec6c.camel%40ilbers.de.