mirror of
https://github.com/containers/podman.git
synced 2025-05-21 17:16:22 +08:00
Semiperiodoc cleanup of obsolete FIXMEs
Some refer to issues that are closed. Remove them. Some are runc bugs that will never be fixed. Say so, and remove the FIXME. One (bps/iops) should probably be fixed. File an issue for it, and update comment to include the issue# so my find-obsolete-skips script can track it. And one (rootless mount with a "kernel bug?" comment) is still not fixed. Leave the skip, but add a comment documenting the symptom. Signed-off-by: Ed Santiago <santiago@redhat.com>
This commit is contained in:

committed by
Matthew Heon

parent
b339045db5
commit
64bc2ee97f
@ -120,8 +120,6 @@ var _ = Describe("Podman images", func() {
|
||||
// deleting hence image cannot be deleted until the container is deleted.
|
||||
_, errs = images.Remove(bt.conn, []string{alpine.shortName}, nil)
|
||||
code, _ = bindings.CheckResponseCode(errs[0])
|
||||
// FIXME FIXME FIXME: #12441: another invalid error
|
||||
// FIXME FIXME FIXME: this time msg="Image used by SHA: ..."
|
||||
Expect(code).To(BeNumerically("==", -1))
|
||||
|
||||
// Removing the image "alpine" where force = true
|
||||
|
@ -163,7 +163,7 @@ skip "does not work under podman" \
|
||||
# which we could and perhaps should fix in the buildah repo via:
|
||||
# - ... ${TESTSDIR}/bud/layers-squash/Dockerfile.hardlinks
|
||||
# + ... -f Dockerfile.hardlinks ${TESTSDIR}/bud/layers-squash
|
||||
skip "FIXME FIXME FIXME: argument-order incompatible with podman" \
|
||||
skip "argument-order incompatible with podman" \
|
||||
"bud-squash-hardlinks"
|
||||
|
||||
# Fails with "Error: context must be a directory: /path/to/Dockerfile"
|
||||
@ -231,7 +231,7 @@ skip_if_remote "FIXME FIXME FIXME: does this test make sense in remote?" \
|
||||
###############################################################################
|
||||
# BEGIN tests which are skipped due to actual podman or podman-remote bugs.
|
||||
|
||||
skip_if_remote "Podman #12838: different error messages" \
|
||||
skip_if_remote "different error messages between podman & podman-remote" \
|
||||
"bud with .dockerignore #2"
|
||||
|
||||
# These two tests, new in 2022-01, invoke podman (create, export) in ways
|
||||
|
@ -1452,11 +1452,6 @@ var _ = Describe("Podman checkpoint", func() {
|
||||
})
|
||||
|
||||
It("podman checkpoint and restore container with --file-locks", func() {
|
||||
if !strings.Contains(podmanTest.OCIRuntime, "runc") {
|
||||
// TODO: Enable test for crun when this feature has been released
|
||||
// https://github.com/containers/crun/pull/783
|
||||
Skip("FIXME: requires crun >= 1.4")
|
||||
}
|
||||
localRunString := getRunString([]string{"--name", "test_name", ALPINE, "flock", "test.lock", "sleep", "100"})
|
||||
session := podmanTest.Podman(localRunString)
|
||||
session.WaitWithDefaultTimeout()
|
||||
|
@ -535,7 +535,8 @@ var _ = Describe("Verify podman containers.conf usage", func() {
|
||||
|
||||
It("podman containers.conf cgroups=disabled", func() {
|
||||
if !strings.Contains(podmanTest.OCIRuntime, "crun") {
|
||||
Skip("FIXME: requires crun")
|
||||
// Assume this will never be fixed in runc
|
||||
Skip("NoCgroups requires crun")
|
||||
}
|
||||
|
||||
conffile := filepath.Join(podmanTest.TempDir, "container.conf")
|
||||
|
@ -714,8 +714,7 @@ USER bin`, BB)
|
||||
})
|
||||
|
||||
It("podman run device-read-bps test", func() {
|
||||
SkipIfRootless("FIXME: requested cgroup controller `io` is not available")
|
||||
SkipIfRootlessCgroupsV1("Setting device-read-bps not supported on cgroupv1 for rootless users")
|
||||
SkipIfRootless("Setting device-read-bps not supported for rootless users")
|
||||
|
||||
var session *PodmanSessionIntegration
|
||||
|
||||
@ -733,8 +732,7 @@ USER bin`, BB)
|
||||
})
|
||||
|
||||
It("podman run device-write-bps test", func() {
|
||||
SkipIfRootless("FIXME: requested cgroup controller `io` is not available")
|
||||
SkipIfRootlessCgroupsV1("Setting device-write-bps not supported on cgroupv1 for rootless users")
|
||||
SkipIfRootless("Setting device-write-bps not supported for rootless users")
|
||||
|
||||
var session *PodmanSessionIntegration
|
||||
|
||||
@ -751,8 +749,7 @@ USER bin`, BB)
|
||||
})
|
||||
|
||||
It("podman run device-read-iops test", func() {
|
||||
SkipIfRootless("FIXME: requested cgroup controller `io` is not available")
|
||||
SkipIfRootlessCgroupsV1("Setting device-read-iops not supported on cgroupv1 for rootless users")
|
||||
SkipIfRootless("Setting device-read-iops not supported for rootless users")
|
||||
var session *PodmanSessionIntegration
|
||||
|
||||
if CGROUPSV2 {
|
||||
@ -769,8 +766,7 @@ USER bin`, BB)
|
||||
})
|
||||
|
||||
It("podman run device-write-iops test", func() {
|
||||
SkipIfRootless("FIXME: requested cgroup controller `io` is not available")
|
||||
SkipIfRootlessCgroupsV1("Setting device-write-iops not supported on cgroupv1 for rootless users")
|
||||
SkipIfRootless("Setting device-write-iops not supported for rootless users")
|
||||
var session *PodmanSessionIntegration
|
||||
|
||||
if CGROUPSV2 {
|
||||
@ -1238,6 +1234,7 @@ USER mail`, BB)
|
||||
})
|
||||
|
||||
It("podman run --mount type=bind,bind-nonrecursive", func() {
|
||||
// crun: mount `/` to `/host`: Invalid argument
|
||||
SkipIfRootless("FIXME: rootless users are not allowed to mount bind-nonrecursive (Could this be a Kernel bug?")
|
||||
session := podmanTest.Podman([]string{"run", "--mount", "type=bind,bind-nonrecursive,slave,src=/,target=/host", fedoraMinimal, "findmnt", "-nR", "/host"})
|
||||
session.WaitWithDefaultTimeout()
|
||||
|
@ -12,7 +12,7 @@ function setup() {
|
||||
# could run to see if it's fixed, but it's way too complicated. Since
|
||||
# integration tests also skip checkpoint tests on Ubuntu, do the same here.
|
||||
if is_ubuntu; then
|
||||
skip "FIXME: checkpointing broken in Ubuntu 2004, 2104, 2110, ..."
|
||||
skip "FIXME: checkpointing broken in Ubuntu 2004, 2104, 2110, 2204, ..."
|
||||
fi
|
||||
|
||||
# None of these tests work rootless....
|
||||
|
Reference in New Issue
Block a user