From e598bcafb8bfbd2b7fc62dbe3ae70822bef35a3b Mon Sep 17 00:00:00 2001 From: Paul Holzinger Date: Tue, 3 Sep 2024 12:53:39 +0200 Subject: [PATCH 1/5] cirrus: prebuild use f40 for extra tests This check has a condition on the distro name to only run once, however the prior fedora version doesn't have to exists necessarily as we might have to drop support there due the outdated golang version. The current fedora version should alway exists so this seems safer. Signed-off-by: Paul Holzinger --- contrib/cirrus/prebuild.sh | 8 +++++--- 1 file changed, 5 insertions(+), 3 deletions(-) diff --git a/contrib/cirrus/prebuild.sh b/contrib/cirrus/prebuild.sh index e475d93442..934d0f8518 100755 --- a/contrib/cirrus/prebuild.sh +++ b/contrib/cirrus/prebuild.sh @@ -43,11 +43,13 @@ get_env_key() { python -c "$script" } -# Only need to check CI-stuffs on a single build-task, there's only ever -# one prior-fedora task so use that one. +# Only need to check CI-stuffs on a single build-task, there's +# generally one latest fedora task so use that one. In some cases +# when we have to drop testing for the prior fedora task we may +# run twice on current fedora but this is not a problem. # Envars all defined by CI config. # shellcheck disable=SC2154 -if [[ "${DISTRO_NV}" == "$PRIOR_FEDORA_NAME" ]]; then +if [[ "${DISTRO_NV}" == "$FEDORA_NAME" ]]; then msg "Checking shell scripts" showrun ooe.sh dnf install -y ShellCheck # small/quick addition showrun shellcheck --format=tty \ From 2ca4efb9f4d639143e0c275fd3fdd9ffd775e16d Mon Sep 17 00:00:00 2001 From: Paul Holzinger Date: Tue, 3 Sep 2024 13:13:11 +0200 Subject: [PATCH 2/5] cirrus: remove CI_DESIRED_NETWORK reference Since commit 26cd01ee51 we only test netavark and cni support was dropped. Remove the leftover CI_DESIRED_NETWORK reference. Signed-off-by: Paul Holzinger --- .cirrus.yml | 1 - 1 file changed, 1 deletion(-) diff --git a/.cirrus.yml b/.cirrus.yml index 37805bc69c..36ae522ef8 100644 --- a/.cirrus.yml +++ b/.cirrus.yml @@ -160,7 +160,6 @@ build_task: - env: DISTRO_NV: ${DEBIAN_NAME} VM_IMAGE_NAME: ${DEBIAN_CACHE_IMAGE_NAME} - CI_DESIRED_NETWORK: netavark env: TEST_FLAVOR: build clone_script: *full_clone From d03e8ffc56e4337d6b14e9b4d0569555b0aadb3d Mon Sep 17 00:00:00 2001 From: Paul Holzinger Date: Tue, 3 Sep 2024 13:19:37 +0200 Subject: [PATCH 3/5] cirrus: test only on f40/rawhide We want to update to golang 1.22 but f39 only ships 1.21. This means we can no longer build on f39 once the update is done. Given we do not ship podman 5.0 on f39 anyway this is not a problem. So drop the f39 tasks but given we use them to test different db/storage drivers we cannot just remove them. Instead we now test f40 twice with the different db/storage drivers to ensure we keep full coverage. It do however drop it from the container int task. I really do not see the value there to test a different db backend as this doesn't depend on anything in the container. Signed-off-by: Paul Holzinger --- .cirrus.yml | 19 ++++++------------- 1 file changed, 6 insertions(+), 13 deletions(-) diff --git a/.cirrus.yml b/.cirrus.yml index 36ae522ef8..24c072c39b 100644 --- a/.cirrus.yml +++ b/.cirrus.yml @@ -146,9 +146,11 @@ build_task: VM_IMAGE_NAME: ${FEDORA_CACHE_IMAGE_NAME} CTR_FQIN: ${FEDORA_CONTAINER_FQIN} - env: - DISTRO_NV: ${PRIOR_FEDORA_NAME} - VM_IMAGE_NAME: ${PRIOR_FEDORA_CACHE_IMAGE_NAME} - CTR_FQIN: ${PRIOR_FEDORA_CONTAINER_FQIN} + # Note, this is changed to FEDORA_NAME temporarily as f39 contains a to old golang + # Once we bump our images to f41/40 this must be turned back to PRIOR_FEDORA_NAME + DISTRO_NV: ${FEDORA_NAME} + VM_IMAGE_NAME: ${FEDORA_CACHE_IMAGE_NAME} + CTR_FQIN: ${FEDORA_CONTAINER_FQIN} CI_DESIRED_DATABASE: boltdb CI_DESIRED_STORAGE: vfs - env: @@ -655,18 +657,9 @@ container_integration_test_task: # Docs: ./contrib/cirrus/CIModes.md only_if: *only_if_int_test depends_on: *build - matrix: &fedora_vm_axis - - env: - DISTRO_NV: ${FEDORA_NAME} - VM_IMAGE_NAME: ${FEDORA_CACHE_IMAGE_NAME} - CTR_FQIN: ${FEDORA_CONTAINER_FQIN} - - env: - DISTRO_NV: ${PRIOR_FEDORA_NAME} - VM_IMAGE_NAME: ${PRIOR_FEDORA_CACHE_IMAGE_NAME} - CTR_FQIN: ${PRIOR_FEDORA_CONTAINER_FQIN} - CI_DESIRED_DATABASE: boltdb gce_instance: *fastvm env: + <<: *stdenvars TEST_FLAVOR: int TEST_ENVIRON: container clone_script: *get_gosrc From f93fcf7deef4eab0767b9dbc65b33e34a723b920 Mon Sep 17 00:00:00 2001 From: Paul Holzinger Date: Tue, 3 Sep 2024 13:41:53 +0200 Subject: [PATCH 4/5] bump go to 1.22 Many dependencies started using go 1.22 which means we have to follow in order to update. Disable the now depracted exportloopref linter as it was replaced by copyloopvar as go fixed the loop copy problem in 1.22[1] Another new chnage in go 1.22 is the for loop syntax over ints, the intrange linter chacks for this but there a lot of loops that have to be converted so I didn't do it here and disable th elinter for now, th eold syntax is still fine. [1] https://go.dev/blog/loopvar-preview Signed-off-by: Paul Holzinger --- .golangci.yml | 2 ++ go.mod | 2 +- libpod/container_internal.go | 1 - libpod/kube.go | 1 - libpod/logs/log_test.go | 1 - libpod/networking_linux_test.go | 1 - pkg/domain/infra/abi/play_test.go | 3 --- pkg/errorhandling/errorhandling_test.go | 1 - pkg/farm/farm.go | 6 ------ pkg/farm/list_builder.go | 2 -- pkg/machine/define/vmfile_test.go | 1 - pkg/specgen/generate/kube/play_test.go | 5 ----- pkg/specgen/generate/ports.go | 1 - pkg/specgen/generate/ports_test.go | 4 ---- pkg/specgen/namespaces_test.go | 1 - pkg/util/filters_test.go | 1 - test/e2e/checkpoint_test.go | 3 --- test/e2e/healthcheck_run_test.go | 1 - test/e2e/logs_test.go | 2 -- test/e2e/network_test.go | 1 - test/e2e/pod_infra_container_test.go | 1 - test/e2e/run_memory_test.go | 1 - test/e2e/run_networking_test.go | 1 - 23 files changed, 3 insertions(+), 40 deletions(-) diff --git a/.golangci.yml b/.golangci.yml index 33bf0c5bf6..3021cab9d0 100644 --- a/.golangci.yml +++ b/.golangci.yml @@ -8,6 +8,7 @@ linters: disable: # too many reports but requires attention - depguard + - intrange # should be turned on but we have to convert each place manually as there is no auto fix function - tagalign - perfsprint - typecheck @@ -62,6 +63,7 @@ linters: - exhaustruct # deprecated linters - execinquery + - exportloopref linters-settings: errcheck: check-blank: false diff --git a/go.mod b/go.mod index cf6cba720a..0b71115f8d 100644 --- a/go.mod +++ b/go.mod @@ -2,7 +2,7 @@ module github.com/containers/podman/v5 // Warning: Ensure the "go" and "toolchain" versions match exactly to prevent unwanted auto-updates -go 1.21.0 +go 1.22.0 require ( github.com/BurntSushi/toml v1.4.0 diff --git a/libpod/container_internal.go b/libpod/container_internal.go index 51a0793bb7..2839e02433 100644 --- a/libpod/container_internal.go +++ b/libpod/container_internal.go @@ -2227,7 +2227,6 @@ func (c *Container) postDeleteHooks(ctx context.Context) error { return err } for i, hook := range extensionHooks { - hook := hook logrus.Debugf("container %s: invoke poststop hook %d, path %s", c.ID(), i, hook.Path) var stderr, stdout bytes.Buffer hookErr, err := exec.RunWithOptions( diff --git a/libpod/kube.go b/libpod/kube.go index e841419153..d20aa90167 100644 --- a/libpod/kube.go +++ b/libpod/kube.go @@ -596,7 +596,6 @@ func (p *Pod) podWithContainers(ctx context.Context, containers []*Container, po // Deduplicate volumes, so if containers in the pod share a volume, it's only // listed in the volumes section once for _, vol := range volumes { - vol := vol deDupPodVolumes[vol.Name] = &vol } } diff --git a/libpod/logs/log_test.go b/libpod/logs/log_test.go index 5ec0e25069..63d6135f74 100644 --- a/libpod/logs/log_test.go +++ b/libpod/logs/log_test.go @@ -93,7 +93,6 @@ func TestGetTailLog(t *testing.T) { }, } for _, tt := range tests { - tt := tt t.Run(tt.name, func(t *testing.T) { dir := t.TempDir() file := filepath.Join(dir, "log") diff --git a/libpod/networking_linux_test.go b/libpod/networking_linux_test.go index bfa0d1135d..51f8bc724b 100644 --- a/libpod/networking_linux_test.go +++ b/libpod/networking_linux_test.go @@ -232,7 +232,6 @@ func Test_ocicniPortsToNetTypesPorts(t *testing.T) { }, } for _, tt := range tests { - tt := tt t.Run(tt.name, func(t *testing.T) { result := ocicniPortsToNetTypesPorts(tt.arg) assert.Equal(t, tt.want, result, "ports do not match") diff --git a/pkg/domain/infra/abi/play_test.go b/pkg/domain/infra/abi/play_test.go index ef6207f127..664d68a02c 100644 --- a/pkg/domain/infra/abi/play_test.go +++ b/pkg/domain/infra/abi/play_test.go @@ -150,7 +150,6 @@ data: } for _, test := range tests { - test := test t.Run(test.name, func(t *testing.T) { buf := bytes.NewReader([]byte(test.configMapContent)) cm, err := readConfigMapFromFile(buf) @@ -196,7 +195,6 @@ kind: Pod } for _, test := range tests { - test := test t.Run(test.name, func(t *testing.T) { kind, err := getKubeKind([]byte(test.kubeYAML)) if test.expectError { @@ -268,7 +266,6 @@ items: } for _, test := range tests { - test := test t.Run(test.name, func(t *testing.T) { docs, err := splitMultiDocYAML([]byte(test.kubeYAML)) if test.expectError { diff --git a/pkg/errorhandling/errorhandling_test.go b/pkg/errorhandling/errorhandling_test.go index ec720c5e7c..0f4ca3fc57 100644 --- a/pkg/errorhandling/errorhandling_test.go +++ b/pkg/errorhandling/errorhandling_test.go @@ -43,7 +43,6 @@ func TestCause(t *testing.T) { expectedErr: fmt.Errorf("0: %w", errors.New("error")), }, } { - tc := tc t.Run(tc.name, func(t *testing.T) { t.Parallel() err := Cause(tc.err()) diff --git a/pkg/farm/farm.go b/pkg/farm/farm.go index cc8d803fb2..f9b9530c14 100644 --- a/pkg/farm/farm.go +++ b/pkg/farm/farm.go @@ -44,7 +44,6 @@ func newFarmWithBuilders(_ context.Context, name string, cons []config.Connectio ) // Set up the remote connections to handle the builds for _, con := range cons { - con := con builderGroup.Go(func() error { fmt.Printf("Connecting to %q\n", con.Name) engine, err := infra.NewImageEngine(&entities.PodmanConfig{ @@ -115,7 +114,6 @@ func (f *Farm) Status(ctx context.Context) (map[string]error, error) { statusGroup multierror.Group ) for _, engine := range f.builders { - engine := engine statusGroup.Go(func() error { logrus.Debugf("getting status of %q", engine.FarmNodeName(ctx)) defer logrus.Debugf("got status of %q", engine.FarmNodeName(ctx)) @@ -159,7 +157,6 @@ func (f *Farm) NativePlatforms(ctx context.Context) ([]string, error) { nativeGroup multierror.Group ) for _, engine := range f.builders { - engine := engine nativeGroup.Go(func() error { logrus.Debugf("getting native platform of %q\n", engine.FarmNodeName(ctx)) defer logrus.Debugf("got native platform of %q", engine.FarmNodeName(ctx)) @@ -199,7 +196,6 @@ func (f *Farm) EmulatedPlatforms(ctx context.Context) ([]string, error) { emulatedGroup multierror.Group ) for _, engine := range f.builders { - engine := engine emulatedGroup.Go(func() error { logrus.Debugf("getting emulated platforms of %q", engine.FarmNodeName(ctx)) defer logrus.Debugf("got emulated platforms of %q", engine.FarmNodeName(ctx)) @@ -260,7 +256,6 @@ func (f *Farm) Schedule(ctx context.Context, platforms []string) (Schedule, erro // Make notes of which platforms we can build for natively, and which // ones we can build for using emulation. for name, engine := range f.builders { - name, engine := name, engine infoGroup.Go(func() error { inspect, err := engine.FarmNodeInspect(ctx) if err != nil { @@ -377,7 +372,6 @@ func (f *Farm) Build(ctx context.Context, schedule Schedule, options entities.Bu builder entities.ImageEngine } for platform, builder := range schedule.platformBuilders { - platform, builder := platform, builder outReader, outWriter := io.Pipe() errReader, errWriter := io.Pipe() go func() { diff --git a/pkg/farm/list_builder.go b/pkg/farm/list_builder.go index d8fce5e32f..79cf2f5ce9 100644 --- a/pkg/farm/list_builder.go +++ b/pkg/farm/list_builder.go @@ -64,7 +64,6 @@ func (l *listLocal) build(ctx context.Context, images map[entities.BuildReport]e ) refs := []string{} for image, engine := range images { - image, engine := image, engine pushGroup.Go(func() error { logrus.Infof("pushing image %s", image.ID) defer logrus.Infof("pushed image %s", image.ID) @@ -91,7 +90,6 @@ func (l *listLocal) build(ctx context.Context, images map[entities.BuildReport]e if engine.FarmNodeName(ctx) == entities.LocalFarmImageBuilderName { continue } - image, engine := image, engine rmGroup.Go(func() error { _, err := engine.Remove(ctx, []string{image.ID}, entities.ImageRemoveOptions{}) if len(err) > 0 { diff --git a/pkg/machine/define/vmfile_test.go b/pkg/machine/define/vmfile_test.go index 4c2cc8f59d..48a7cad86a 100644 --- a/pkg/machine/define/vmfile_test.go +++ b/pkg/machine/define/vmfile_test.go @@ -119,7 +119,6 @@ func TestNewMachineFile(t *testing.T) { }, } for _, tt := range tests { - tt := tt t.Run(tt.name, func(t *testing.T) { got, err := NewMachineFile(tt.args.path, tt.args.symlink) if (err != nil) != tt.wantErr { diff --git a/pkg/specgen/generate/kube/play_test.go b/pkg/specgen/generate/kube/play_test.go index f16d3343da..d8688a847d 100644 --- a/pkg/specgen/generate/kube/play_test.go +++ b/pkg/specgen/generate/kube/play_test.go @@ -224,7 +224,6 @@ func TestConfigMapVolumes(t *testing.T) { } for _, test := range tests { - test := test t.Run(test.name, func(t *testing.T) { result, err := VolumeFromConfigMap(test.volume.ConfigMap, test.configmaps) if test.errorMessage == "" { @@ -434,7 +433,6 @@ func TestEnvVarsFrom(t *testing.T) { } for _, test := range tests { - test := test t.Run(test.name, func(t *testing.T) { result, err := envVarsFrom(test.envFrom, &test.options) assert.Equal(t, err == nil, test.succeed) @@ -1027,7 +1025,6 @@ func TestEnvVarValue(t *testing.T) { } for _, test := range tests { - test := test t.Run(test.name, func(t *testing.T) { result, err := envVarValue(test.envVar, &test.options) assert.Equal(t, err == nil, test.succeed) @@ -1270,7 +1267,6 @@ func TestHttpLivenessProbe(t *testing.T) { } for _, test := range tests { - test := test t.Run(test.name, func(t *testing.T) { err := setupLivenessProbe(&test.specGenerator, test.container, test.restartPolicy) if err == nil { @@ -1393,7 +1389,6 @@ func TestTCPLivenessProbe(t *testing.T) { } for _, test := range tests { - test := test t.Run(test.name, func(t *testing.T) { err := setupLivenessProbe(&test.specGenerator, test.container, test.restartPolicy) assert.Equal(t, err == nil, test.succeed) diff --git a/pkg/specgen/generate/ports.go b/pkg/specgen/generate/ports.go index 0575fc7c5e..9caefac367 100644 --- a/pkg/specgen/generate/ports.go +++ b/pkg/specgen/generate/ports.go @@ -212,7 +212,6 @@ func ParsePortMapping(portMappings []types.PortMapping, exposePorts map[uint16][ for hostIP, protoMap := range portMap { for protocol, ports := range protoMap { - ports := ports if len(ports) == 0 { continue } diff --git a/pkg/specgen/generate/ports_test.go b/pkg/specgen/generate/ports_test.go index cbee852f29..e94d0ad94d 100644 --- a/pkg/specgen/generate/ports_test.go +++ b/pkg/specgen/generate/ports_test.go @@ -433,7 +433,6 @@ func TestParsePortMappingWithHostPort(t *testing.T) { }, } for _, tt := range tests { - tt := tt t.Run(tt.name, func(t *testing.T) { got, err := ParsePortMapping(tt.arg, tt.arg2) assert.NoError(t, err, "error is not nil") @@ -668,7 +667,6 @@ func TestParsePortMappingWithoutHostPort(t *testing.T) { }, } for _, tt := range tests { - tt := tt t.Run(tt.name, func(t *testing.T) { got, err := ParsePortMapping(tt.arg, tt.arg2) assert.NoError(t, err, "error is not nil") @@ -847,7 +845,6 @@ func TestParsePortMappingMixedHostPort(t *testing.T) { }, } for _, tt := range tests { - tt := tt t.Run(tt.name, func(t *testing.T) { got, err := ParsePortMapping(tt.arg, nil) assert.NoError(t, err, "error is not nil") @@ -982,7 +979,6 @@ func TestParsePortMappingError(t *testing.T) { }, } for _, tt := range tests { - tt := tt t.Run(tt.name, func(t *testing.T) { _, err := ParsePortMapping(tt.arg, nil) assert.EqualError(t, err, tt.err, "error does not match") diff --git a/pkg/specgen/namespaces_test.go b/pkg/specgen/namespaces_test.go index d03a6d0321..03e51ab248 100644 --- a/pkg/specgen/namespaces_test.go +++ b/pkg/specgen/namespaces_test.go @@ -239,7 +239,6 @@ func TestParseNetworkFlag(t *testing.T) { } for _, tt := range tests { - tt := tt t.Run(tt.name, func(t *testing.T) { got, got1, got2, err := ParseNetworkFlag(tt.args) if tt.err != "" { diff --git a/pkg/util/filters_test.go b/pkg/util/filters_test.go index 659c5a868c..03f90748ab 100644 --- a/pkg/util/filters_test.go +++ b/pkg/util/filters_test.go @@ -71,7 +71,6 @@ func TestMatchLabelFilters(t *testing.T) { }, } for _, tt := range tests { - tt := tt t.Run(tt.name, func(t *testing.T) { if got := filters.MatchLabelFilters(tt.args.filterValues, tt.args.labels); got != tt.want { t.Errorf("MatchLabelFilters() = %v, want %v", got, tt.want) diff --git a/test/e2e/checkpoint_test.go b/test/e2e/checkpoint_test.go index 8b2f13e55e..b968a35373 100644 --- a/test/e2e/checkpoint_test.go +++ b/test/e2e/checkpoint_test.go @@ -1118,9 +1118,6 @@ var _ = Describe("Podman checkpoint", func() { share, ) - share := share // copy into local scope, for use inside function - index := index - It(testName, func() { podName := "test_pod" diff --git a/test/e2e/healthcheck_run_test.go b/test/e2e/healthcheck_run_test.go index 5a9e444eef..b65419569f 100644 --- a/test/e2e/healthcheck_run_test.go +++ b/test/e2e/healthcheck_run_test.go @@ -217,7 +217,6 @@ var _ = Describe("Podman healthcheck run", func() { // Run this test with and without healthcheck events, even without events // podman inspect and ps should still show accurate healthcheck results. for _, hcEvent := range []bool{true, false} { - hcEvent := hcEvent testName := "hc_events=" + strconv.FormatBool(hcEvent) It("podman healthcheck single healthy result changes failed to healthy "+testName, func() { if !hcEvent { diff --git a/test/e2e/logs_test.go b/test/e2e/logs_test.go index 1dc0eb2887..9d2d551065 100644 --- a/test/e2e/logs_test.go +++ b/test/e2e/logs_test.go @@ -35,8 +35,6 @@ var _ = Describe("Podman logs", func() { }) for _, log := range []string{"k8s-file", "journald", "json-file"} { - // This is important to move the 'log' var to the correct scope under Ginkgo flow. - log := log // Flake prevention: journalctl makes no timeliness guarantees logTimeout := time.Millisecond diff --git a/test/e2e/network_test.go b/test/e2e/network_test.go index 8ce85305cb..450ceba71e 100644 --- a/test/e2e/network_test.go +++ b/test/e2e/network_test.go @@ -549,7 +549,6 @@ var _ = Describe("Podman network", func() { }) for _, opt := range []string{"-o=parent=lo", "--interface-name=lo"} { - opt := opt It(fmt.Sprintf("podman network create/remove macvlan as driver (-d) with %s", opt), func() { net := "macvlan" + stringid.GenerateRandomID() nc := podmanTest.Podman([]string{"network", "create", "-d", "macvlan", opt, net}) diff --git a/test/e2e/pod_infra_container_test.go b/test/e2e/pod_infra_container_test.go index 83aff3680b..c76da6cd7b 100644 --- a/test/e2e/pod_infra_container_test.go +++ b/test/e2e/pod_infra_container_test.go @@ -417,7 +417,6 @@ var _ = Describe("Podman pod create", func() { tests := []string{"", "none"} for _, test := range tests { - test := test It("podman pod create --share="+test+" should not create an infra ctr", func() { session := podmanTest.Podman([]string{"pod", "create", "--share", test}) session.WaitWithDefaultTimeout() diff --git a/test/e2e/run_memory_test.go b/test/e2e/run_memory_test.go index 77cc748c58..4e9cf5c32a 100644 --- a/test/e2e/run_memory_test.go +++ b/test/e2e/run_memory_test.go @@ -62,7 +62,6 @@ var _ = Describe("Podman run memory", func() { }) for _, limit := range []string{"0", "15", "100"} { - limit := limit // Keep this value in a proper scope testName := fmt.Sprintf("podman run memory-swappiness test(%s)", limit) It(testName, func() { SkipIfCgroupV2("memory-swappiness not supported on cgroupV2") diff --git a/test/e2e/run_networking_test.go b/test/e2e/run_networking_test.go index 010c8f17c6..22a64eb531 100644 --- a/test/e2e/run_networking_test.go +++ b/test/e2e/run_networking_test.go @@ -548,7 +548,6 @@ EXPOSE 2004-2005/tcp`, ALPINE) }) for _, local := range []bool{true, false} { - local := local testName := "HostIP" if local { testName = "127.0.0.1" From 54b8c4fb64e9d362eeb434999735c2e99944f555 Mon Sep 17 00:00:00 2001 From: Paul Holzinger Date: Tue, 3 Sep 2024 15:07:48 +0200 Subject: [PATCH 5/5] packit: update fedora and epel targets f39 doesn't container go 1.22 so we can no longer build there. epel 9 has the same issue although it is likely that go will be updated there at one point. Signed-off-by: Paul Holzinger --- .packit.yaml | 25 +++++++++++++++---------- 1 file changed, 15 insertions(+), 10 deletions(-) diff --git a/.packit.yaml b/.packit.yaml index e840b9e025..554bf1edff 100644 --- a/.packit.yaml +++ b/.packit.yaml @@ -32,8 +32,12 @@ jobs: message: "Ephemeral COPR build failed. @containers/packit-build please check." enable_net: true targets: - fedora-all-x86_64: {} - fedora-all-aarch64: {} + fedora-development-x86_64: {} + fedora-development-aarch64: {} + fedora-latest-x86_64: {} + fedora-latest-aarch64: {} + fedora-latest-stable-x86_64: {} + fedora-latest-stable-aarch64: {} fedora-eln-x86_64: additional_repos: - "https://kojipkgs.fedoraproject.org/repos/eln-build/latest/x86_64/" @@ -52,14 +56,15 @@ jobs: - centos-stream-10-x86_64 - centos-stream-10-aarch64 - - job: copr_build - trigger: pull_request - packages: [podman-rhel] - notifications: *packit_build_failure_notification - enable_net: true - targets: - - epel-9-x86_64 - - epel-9-aarch64 + # Disabled until there is go 1.22 in epel-9 + # - job: copr_build + # trigger: pull_request + # packages: [podman-rhel] + # notifications: *packit_build_failure_notification + # enable_net: true + # targets: + # - epel-9-x86_64 + # - epel-9-aarch64 # Run on commit to main branch - job: copr_build