[Pkg-libvirt-commits] [Git][libvirt-team/libvirt][debian/latest] 12 commits: changelog: Create entry for 7.9.0-1
Andrea Bolognani (@abologna)
gitlab at salsa.debian.org
Tue Nov 30 20:14:34 GMT 2021
Andrea Bolognani pushed to branch debian/latest at Libvirt Packaging Team / libvirt
Commits:
bbc31dcc by Andrea Bolognani at 2021-11-25T19:00:10+01:00
changelog: Create entry for 7.9.0-1
Gbp-Dch: Ignore
- - - - -
6ca05a9e by Andrea Bolognani at 2021-11-25T19:00:10+01:00
patches: Update ZFS enablement patches
Replace
debian/Set-defaults-for-zfs-tools.patch
with
backport/meson-Enable-ZFS-storage-backend-even-more-often.patch
backport/meson-Stop-looking-up-ZFS-programs-at-build-time.patch
Thanks to recent upstream changes, we no longer need to carry
downstream changes in order to enable ZFS support without making
it a build time dependency.
- - - - -
32a1e7be by Andrea Bolognani at 2021-11-29T23:28:36+01:00
patches: Add backport/wireshark-Switch-to-tvb_bytes_to_str.patch
This is needed in order to build against Wireshark 3.6,
which was recently uploaded to sid.
- - - - -
b02f04f4 by Andrea Bolognani at 2021-11-29T23:28:36+01:00
patches: Refresh patches
Gbp-Dch: Ignore
- - - - -
5e0c0e11 by Andrea Bolognani at 2021-11-29T23:28:36+01:00
symbols: Bump symbol versions
libvirt 7.9.0 doesn't introduce any new symbols, but libvirt
7.7.0 and 7.8.0 did.
Gbp-Dch: Ignore
- - - - -
b0996bb9 by Andrea Bolognani at 2021-11-29T23:28:36+01:00
copyright: Drop entry for build-aux/vc-list-files
As of libvirt 7.7.0, the script no longer exists in the
upstream tarball. And since this entry was the only user of the
GPL-3.0+ license block, we can drop that one as well.
Gbp-Dch: Ignore
- - - - -
801cb31c by Andrea Bolognani at 2021-11-29T23:28:36+01:00
copyright: Update copyright
Gbp-Dch: Ignore
- - - - -
860aca40 by Andrea Bolognani at 2021-11-29T23:28:36+01:00
libvirt-daemon-system: Drop unnecessary backslashes
Gbp-Dch: Ignore
- - - - -
30fdaaee by Andrea Bolognani at 2021-11-29T23:28:36+01:00
libvirt-daemon-system: Make QEMU cache directory root-owned
In the past, this directory was used for things like domain
screenshot data, and so it needed to be writable by the user
under which the QEMU process runs.
As of libvirt 7.9.0, those files are now written in per-domain
directories and all that remains in this directory is the
capability cache for the QEMU driver, so the more open
permissions are no longer necessary.
- - - - -
b3027bb7 by Andrea Bolognani at 2021-11-29T23:39:54+01:00
libnss-libvirt: Adjust Lintian overrides
Lintian no longer reports package-name-doesnt-match-sonames as
an issue, and in fact reports the override itself as unused.
On the other hand, sharedobject-in-library-directory-missing-soname
is now being reported. Override it and explain in a comment why
it doesn't apply to us.
Gbp-Dch: Ignore
- - - - -
8c2f99b3 by Andrea Bolognani at 2021-11-29T23:39:54+01:00
tests: No longer skip smoke-lxc when cgroups v1&v2 are both present
libvirt 7.9.0 contains the fix for the issue that resulted in
this being necessary, so we can drop it now.
This reverts commit fbc728f8e4a2bcaa356eaf0570887904578d3da5
- - - - -
803bd5a3 by Andrea Bolognani at 2021-11-29T23:39:54+01:00
control: Bump Standards-Version to 4.6.0
No changes needed.
- - - - -
17 changed files:
- debian/changelog
- debian/control
- debian/copyright
- debian/libnss-libvirt.lintian-overrides
- debian/libvirt-daemon-system.postinst
- debian/libvirt0.symbols
- + debian/patches/backport/meson-Enable-ZFS-storage-backend-even-more-often.patch
- + debian/patches/backport/meson-Stop-looking-up-ZFS-programs-at-build-time.patch
- + debian/patches/backport/wireshark-Switch-to-tvb_bytes_to_str.patch
- − debian/patches/debian/Set-defaults-for-zfs-tools.patch
- debian/patches/debian/Use-sensible-editor-by-default.patch
- debian/patches/debian/apparmor_profiles_local_include.patch
- debian/patches/forward/Pass-GPG_TTY-env-var-to-the-ssh-binary.patch
- debian/patches/forward/Reduce-udevadm-settle-timeout-to-10-seconds.patch
- debian/patches/forward/Skip-vircgrouptest.patch
- debian/patches/series
- debian/tests/smoke-lxc
Changes:
=====================================
debian/changelog
=====================================
@@ -1,3 +1,12 @@
+libvirt (7.9.0-1) UNRELEASED; urgency=medium
+
+ * Team upload
+
+ * [2c54c68] New upstream version 7.9.0
+ - Closes: #994061, #997108
+
+ -- Andrea Bolognani <eof at kiyuko.org> Wed, 03 Nov 2021 00:51:22 +0100
+
libvirt (7.6.0-1) unstable; urgency=medium
* Team upload
=====================================
debian/control
=====================================
@@ -72,7 +72,7 @@ Build-Conflicts:
Vcs-Git: https://salsa.debian.org/libvirt-team/libvirt.git
Vcs-Browser: https://salsa.debian.org/libvirt-team/libvirt
Homepage: https://libvirt.org/
-Standards-Version: 4.5.1
+Standards-Version: 4.6.0
Rules-Requires-Root: no
Package: libvirt-clients
=====================================
debian/copyright
=====================================
@@ -35,6 +35,16 @@ License: AS-IS-I
MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE AUTHORS AND
CONTRIBUTORS ACCEPT NO RESPONSIBILITY IN ANY CONCEIVABLE MANNER.
+Files: src/util/virpcivpd.*
+ src/util/virpcivpdpriv.h
+ tests/virpcivpdtest.c
+Copyright: 2021 Canonical Ltd.
+License: LGPL-2.1+
+
+Files: tools/virt-host-validate-ch.*
+Copyright: 2020-2021 Microsoft Corp.
+License: LGPL-2.1+
+
Files: tests/pkix_asn1_tab.c
tests/virsh-cpuset
tests/virsh-optparse
@@ -48,10 +58,6 @@ Files: tests/pkix_asn1_tab.c
Copyright: 2008-2019 Red Hat, Inc.
License: GPL-2.0+
-Files: build-aux/vc-list-files
-Copyright: 1989-2019 Free Software Foundation, Inc.
-License: GPL-3.0+
-
Files: src/vbox/vbox*
Copyright: 2008-2009 Sun Microsystems, Inc.
2010-2014 Red Hat, Inc.
@@ -101,23 +107,6 @@ License: GPL-2.0+
On Debian systems, the complete text of the GNU General Public License
Version 2 can be found in `/usr/share/common-licenses/GPL-2'.
-License: GPL-3.0+
- This program is free software: you can redistribute it and/or modify
- it under the terms of the GNU General Public License as published by
- the Free Software Foundation; either version 3 of the License, or
- (at your option) any later version.
- .
- This program is distributed in the hope that it will be useful,
- but WITHOUT ANY WARRANTY; without even the implied warranty of
- MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
- GNU General Public License for more details.
- .
- You should have received a copy of the GNU General Public License
- along with this program. If not, see <https://www.gnu.org/licenses/>.
- .
- On Debian systems, the complete text of the GNU General Public License
- Version 3 can be found in `/usr/share/common-licenses/GPL-3'.
-
License: SIL-1.1
This Font Software is licensed under the SIL Open Font License,
Version 1.1.
=====================================
debian/libnss-libvirt.lintian-overrides
=====================================
@@ -1 +1,3 @@
-libnss-libvirt: package-name-doesnt-match-sonames
+# NSS plugins are not regular shared libraries that applications link against
+# and as such they don't need to have a SONAME
+libnss-libvirt: sharedobject-in-library-directory-missing-soname
=====================================
debian/libvirt-daemon-system.postinst
=====================================
@@ -65,17 +65,17 @@ add_users_groups()
add_statoverrides()
{
- ROOT_DIRS="\
- /var/lib/libvirt/images/ \
- /var/lib/libvirt/boot/ \
- /var/cache/libvirt/ \
+ ROOT_DIRS="
+ /var/lib/libvirt/images/
+ /var/lib/libvirt/boot/
+ /var/cache/libvirt/
+ /var/cache/libvirt/qemu/
"
- QEMU_DIRS="\
- /var/lib/libvirt/qemu/ \
- /var/cache/libvirt/qemu/ \
- /var/lib/libvirt/qemu/channel/ \
- /var/lib/libvirt/qemu/channel/target/ \
+ QEMU_DIRS="
+ /var/lib/libvirt/qemu/
+ /var/lib/libvirt/qemu/channel/
+ /var/lib/libvirt/qemu/channel/target/
"
SANLOCK_DIR="/var/lib/libvirt/sanlock"
=====================================
debian/libvirt0.symbols
=====================================
@@ -129,7 +129,9 @@ libvirt.so.0 libvirt0 #MINVER#
*@LIBVIRT_7.1.0 7.6.0
*@LIBVIRT_7.2.0 7.6.0
*@LIBVIRT_7.3.0 7.6.0
- *@LIBVIRT_PRIVATE_7.6.0 7.6.0
+ *@LIBVIRT_7.7.0 7.9.0
+ *@LIBVIRT_7.8.0 7.9.0
+ *@LIBVIRT_PRIVATE_7.9.0 7.9.0
libvirt-qemu.so.0 libvirt0 #MINVER#
*@LIBVIRT_QEMU_0.8.3 0.8.3
@@ -151,4 +153,4 @@ libvirt-admin.so.0 libvirt0 #MINVER#
*@LIBVIRT_ADMIN_1.3.0 1.2.18
*@LIBVIRT_ADMIN_2.0.0 2.0.0~rc1
*@LIBVIRT_ADMIN_3.0.0 3.0.0
- *@LIBVIRT_ADMIN_PRIVATE_7.6.0 7.6.0
+ *@LIBVIRT_ADMIN_PRIVATE_7.9.0 7.9.0
=====================================
debian/patches/backport/meson-Enable-ZFS-storage-backend-even-more-often.patch
=====================================
@@ -0,0 +1,36 @@
+From: Andrea Bolognani <abologna at redhat.com>
+Date: Wed, 3 Nov 2021 10:57:41 +0100
+Subject: meson: Enable ZFS storage backend even more often
+
+Commit 73a2ff36163e already improved the situation a lot. This
+pushes things even further.
+
+If the user or, more likely, the distro packager explicitly
+asked for ZFS support to be enabled, then we should comply with
+that request regardless of whether the necessary programs are
+available at build time.
+
+This is particularly important in the context of Debian, where
+ZFS cannot be a build dependency of libvirt due to licensing
+issues but it can still be an optional runtime dependency.
+
+Signed-off-by: Andrea Bolognani <abologna at redhat.com>
+Reviewed-by: Tim Wiederhake <twiederh at redhat.com>
+(cherry picked from commit ca4dc9613fb3be1012ef458d62cc5e406b8e1bf3)
+---
+ meson.build | 2 +-
+ 1 file changed, 1 insertion(+), 1 deletion(-)
+
+diff --git a/meson.build b/meson.build
+index ad41983..2dce8a1 100644
+--- a/meson.build
++++ b/meson.build
+@@ -1950,7 +1950,7 @@ if conf.has('WITH_LIBVIRTD')
+ foreach name : [ 'zfs', 'zpool' ]
+ set_variable(
+ '@0 at _prog'.format(name),
+- find_program(name, required: get_option('storage_zfs'), dirs: libvirt_sbin_path)
++ find_program(name, required: false, dirs: libvirt_sbin_path)
+ )
+ endforeach
+
=====================================
debian/patches/backport/meson-Stop-looking-up-ZFS-programs-at-build-time.patch
=====================================
@@ -0,0 +1,67 @@
+From: Andrea Bolognani <abologna at redhat.com>
+Date: Wed, 3 Nov 2021 10:32:14 +0100
+Subject: meson: Stop looking up ZFS programs at build time
+
+At this point, we're no longer using the availability of the
+ZFS programs at build time to decide whether to enable ZFS
+support, so the only purpose of these find_program() calls is
+to record their absolute paths.
+
+However, the virCommand facilities that we're ultimately using
+to run them are already capable of performing this lookup at
+runtime, and in fact that's exactly what we already do in the
+case of, for example, vstorage.
+
+Drop the build time lookups and always perform them at runtime.
+
+Signed-off-by: Andrea Bolognani <abologna at redhat.com>
+Reviewed-by: Tim Wiederhake <twiederh at redhat.com>
+(cherry picked from commit 506c3a39d6e645c8414c278ceaba97935f90cb95)
+---
+ meson.build | 16 ----------------
+ src/storage/storage_backend_zfs.c | 3 +++
+ 2 files changed, 3 insertions(+), 16 deletions(-)
+
+diff --git a/meson.build b/meson.build
+index 2dce8a1..5d299f2 100644
+--- a/meson.build
++++ b/meson.build
+@@ -1947,24 +1947,8 @@ if conf.has('WITH_LIBVIRTD')
+ endif
+
+ if not get_option('storage_zfs').disabled()
+- foreach name : [ 'zfs', 'zpool' ]
+- set_variable(
+- '@0 at _prog'.format(name),
+- find_program(name, required: false, dirs: libvirt_sbin_path)
+- )
+- endforeach
+-
+ use_storage = true
+ conf.set('WITH_STORAGE_ZFS', 1)
+- foreach name : [ 'zfs', 'zpool' ]
+- prog_var = get_variable('@0 at _prog'.format(name))
+- if prog_var.found()
+- prog_path = prog_var.path()
+- else
+- prog_path = name
+- endif
+- conf.set_quoted(name.to_upper(), prog_path)
+- endforeach
+ endif
+ endif
+
+diff --git a/src/storage/storage_backend_zfs.c b/src/storage/storage_backend_zfs.c
+index 6fabead..2a5d743 100644
+--- a/src/storage/storage_backend_zfs.c
++++ b/src/storage/storage_backend_zfs.c
+@@ -33,6 +33,9 @@
+
+ VIR_LOG_INIT("storage.storage_backend_zfs");
+
++#define ZFS "zfs"
++#define ZPOOL "zpool"
++
+ /*
+ * Some common flags of zfs and zpool commands we use:
+ * -H -- don't print headers and separate fields by tab
=====================================
debian/patches/backport/wireshark-Switch-to-tvb_bytes_to_str.patch
=====================================
@@ -0,0 +1,78 @@
+From: Michal Privoznik <mprivozn at redhat.com>
+Date: Mon, 29 Nov 2021 09:57:49 +0100
+Subject: wireshark: Switch to tvb_bytes_to_str()
+
+When the dissector sees a byte sequence that is either an opaque
+data (xdr_opaque) or a byte sequence (xdr_bytes) it formats the
+bytes as a hex numbers using our own implementation. But
+wireshark already provides a function for it: tvb_bytes_to_str().
+NB, the reason why it returns a const string is so that callers
+don't try to free it - the string is allocated using an allocator
+which will decide when to free it.
+
+The wireshark formatter was introduced in wireshark commit of
+v1.99.2~479 and thus is present in the version we require at
+least (2.6.0).
+
+Signed-off-by: Michal Privoznik <mprivozn at redhat.com>
+Reviewed-by: Jiri Denemark <jdenemar at redhat.com>
+(cherry picked from commit 7e299ba649b1288d529c7595c0e6060c9ae0ff2a)
+---
+ tools/wireshark/src/packet-libvirt.c | 30 ++++++++----------------------
+ 1 file changed, 8 insertions(+), 22 deletions(-)
+
+diff --git a/tools/wireshark/src/packet-libvirt.c b/tools/wireshark/src/packet-libvirt.c
+index f43919b..cb922b8 100644
+--- a/tools/wireshark/src/packet-libvirt.c
++++ b/tools/wireshark/src/packet-libvirt.c
+@@ -158,24 +158,6 @@ dissect_xdr_string(tvbuff_t *tvb, proto_tree *tree, XDR *xdrs, int hf,
+ }
+ }
+
+-static const gchar *
+-format_xdr_bytes(guint8 *bytes, guint32 length)
+-{
+- gchar *buf;
+- guint32 i;
+-
+- if (length == 0)
+- return "";
+- buf = wmem_alloc(wmem_packet_scope(), length*2 + 1);
+- for (i = 0; i < length; i++) {
+- /* We know that buf has enough size to contain
+- 2 * length + '\0' characters. */
+- g_snprintf(buf, 2*(length - i) + 1, "%02x", bytes[i]);
+- buf += 2;
+- }
+- return buf - length*2;
+-}
+-
+ static gboolean
+ dissect_xdr_opaque(tvbuff_t *tvb, proto_tree *tree, XDR *xdrs, int hf,
+ guint32 size)
+@@ -187,8 +169,10 @@ dissect_xdr_opaque(tvbuff_t *tvb, proto_tree *tree, XDR *xdrs, int hf,
+ val = g_malloc(size);
+ start = xdr_getpos(xdrs);
+ if ((rc = xdr_opaque(xdrs, (caddr_t)val, size))) {
+- proto_tree_add_bytes_format_value(tree, hf, tvb, start, xdr_getpos(xdrs) - start,
+- NULL, "%s", format_xdr_bytes(val, size));
++ gint len = xdr_getpos(xdrs) - start;
++ const char *s = tvb_bytes_to_str(wmem_packet_scope(), tvb, start, len);
++
++ proto_tree_add_bytes_format_value(tree, hf, tvb, start, len, NULL, "%s", s);
+ } else {
+ proto_tree_add_item(tree, hf_libvirt_unknown, tvb, start, -1, ENC_NA);
+ }
+@@ -207,8 +191,10 @@ dissect_xdr_bytes(tvbuff_t *tvb, proto_tree *tree, XDR *xdrs, int hf,
+
+ start = xdr_getpos(xdrs);
+ if (xdr_bytes(xdrs, (char **)&val, &length, maxlen)) {
+- proto_tree_add_bytes_format_value(tree, hf, tvb, start, xdr_getpos(xdrs) - start,
+- NULL, "%s", format_xdr_bytes(val, length));
++ gint len = xdr_getpos(xdrs) - start;
++ const char *s = tvb_bytes_to_str(wmem_packet_scope(), tvb, start, len);
++
++ proto_tree_add_bytes_format_value(tree, hf, tvb, start, len, NULL, "%s", s);
+ /* Seems I can't call xdr_free() for this case.
+ It will raises SEGV by referencing out of bounds call stack */
+ free(val);
=====================================
debian/patches/debian/Set-defaults-for-zfs-tools.patch deleted
=====================================
@@ -1,34 +0,0 @@
-From: =?utf-8?q?Guido_G=C3=BCnther?= <agx at sigxcpu.org>
-Date: Sun, 14 Aug 2016 15:27:48 +0200
-Subject: Set defaults for zfs tools
-
-so we don't have to build-depend on a program in contrib
----
- meson.build | 7 ++-----
- 1 file changed, 2 insertions(+), 5 deletions(-)
-
-diff --git a/meson.build b/meson.build
-index d4c142e..b8d2d46 100644
---- a/meson.build
-+++ b/meson.build
-@@ -1953,18 +1953,15 @@ if conf.has('WITH_LIBVIRTD')
- foreach name : [ 'zfs', 'zpool' ]
- set_variable(
- '@0 at _prog'.format(name),
-- find_program(name, required: get_option('storage_zfs'), dirs: libvirt_sbin_path)
-+ '/sbin' / name
- )
-- if not get_variable('@0 at _prog'.format(name)).found()
-- zfs_enable = false
-- endif
- endforeach
-
- if zfs_enable
- use_storage = true
- conf.set('WITH_STORAGE_ZFS', 1)
- foreach name : [ 'zfs', 'zpool' ]
-- conf.set_quoted(name.to_upper(), get_variable('@0 at _prog'.format(name)).path())
-+ conf.set_quoted(name.to_upper(), get_variable('@0 at _prog'.format(name)))
- endforeach
- endif
- endif
=====================================
debian/patches/debian/Use-sensible-editor-by-default.patch
=====================================
@@ -8,10 +8,10 @@ It is the reasonable default for Debian.
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/tools/vsh.c b/tools/vsh.c
-index 123284c..69b6d41 100644
+index ecb591f..96f4931 100644
--- a/tools/vsh.c
+++ b/tools/vsh.c
-@@ -2399,7 +2399,7 @@ vshEditWriteToTempFile(vshControl *ctl, const char *doc)
+@@ -2423,7 +2423,7 @@ vshEditWriteToTempFile(vshControl *ctl, const char *doc)
/* Hard-code default editor used as a fallback if not configured by
* VISUAL or EDITOR environment variables. */
=====================================
debian/patches/debian/apparmor_profiles_local_include.patch
=====================================
@@ -22,7 +22,7 @@ index 0c8b812..72278b5 100644
+ # Site-specific additions and overrides. See local/README for details..
+ #include <local/abstractions/libvirt-lxc>
diff --git a/src/security/apparmor/libvirt-qemu b/src/security/apparmor/libvirt-qemu
-index 4156428..8a49b21 100644
+index 8cd76d4..8210291 100644
--- a/src/security/apparmor/libvirt-qemu
+++ b/src/security/apparmor/libvirt-qemu
@@ -248,3 +248,6 @@
=====================================
debian/patches/forward/Pass-GPG_TTY-env-var-to-the-ssh-binary.patch
=====================================
@@ -13,10 +13,10 @@ require the 'TERM' environment variable to be set to the terminal type.
1 file changed, 2 insertions(+)
diff --git a/src/rpc/virnetsocket.c b/src/rpc/virnetsocket.c
-index 2120895..0f88864 100644
+index 943406c..4b737bc 100644
--- a/src/rpc/virnetsocket.c
+++ b/src/rpc/virnetsocket.c
-@@ -865,6 +865,8 @@ int virNetSocketNewConnectSSH(const char *nodename,
+@@ -855,6 +855,8 @@ int virNetSocketNewConnectSSH(const char *nodename,
virCommandAddEnvPass(cmd, "KRB5CCNAME");
virCommandAddEnvPass(cmd, "SSH_AUTH_SOCK");
virCommandAddEnvPass(cmd, "SSH_ASKPASS");
=====================================
debian/patches/forward/Reduce-udevadm-settle-timeout-to-10-seconds.patch
=====================================
@@ -10,10 +10,10 @@ Closes: #663931
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/src/util/virutil.c b/src/util/virutil.c
-index 00cd56e..4e29380 100644
+index e04f134..9534aea 100644
--- a/src/util/virutil.c
+++ b/src/util/virutil.c
-@@ -1296,7 +1296,7 @@ void virWaitForDevices(void)
+@@ -1291,7 +1291,7 @@ void virWaitForDevices(void)
if (!(udev = virFindFileInPath(UDEVADM)))
return;
=====================================
debian/patches/forward/Skip-vircgrouptest.patch
=====================================
@@ -9,7 +9,7 @@ without sysfs mounted.
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/tests/vircgrouptest.c b/tests/vircgrouptest.c
-index 1060f60..6557f29 100644
+index 7d54df1..83c68c6 100644
--- a/tests/vircgrouptest.c
+++ b/tests/vircgrouptest.c
@@ -20,7 +20,7 @@
=====================================
debian/patches/series
=====================================
@@ -1,3 +1,6 @@
+backport/meson-Enable-ZFS-storage-backend-even-more-often.patch
+backport/meson-Stop-looking-up-ZFS-programs-at-build-time.patch
+backport/wireshark-Switch-to-tvb_bytes_to_str.patch
forward/Skip-vircgrouptest.patch
forward/Reduce-udevadm-settle-timeout-to-10-seconds.patch
forward/Pass-GPG_TTY-env-var-to-the-ssh-binary.patch
@@ -5,5 +8,4 @@ debian/Debianize-libvirt-guests.patch
debian/Debianize-libvirtd.patch
debian/Debianize-systemd-service-files.patch
debian/apparmor_profiles_local_include.patch
-debian/Set-defaults-for-zfs-tools.patch
debian/Use-sensible-editor-by-default.patch
=====================================
debian/tests/smoke-lxc
=====================================
@@ -24,18 +24,6 @@ check_domain()
trap cleanup EXIT
-# This is an upstream bug due to combined cgroup v1/v2 handling
-# https://bugs.archlinux.org/task/70174
-# https://bugzilla.opensuse.org/show_bug.cgi?id=1183247
-# https://gitlab.com/libvirt/libvirt/-/issues/182
-# https://bugs.launchpad.net/ubuntu/+source/libvirt/+bug/1934966
-# Skip this test (until the upstream issue is resolved) in case v1&v2
-# cgroup are present in the test environment.
-if [ -n "$(findmnt -lnt cgroup)" ] && [ -n "$(findmnt -lnt cgroup2)" ]; then
- echo "Libvirt >=7.1.0 is known to fail LXC handling (issue 182) - skipping".
- exit 77
-fi
-
set -x
virt-host-validate lxc || exit 0
virsh capabilities
View it on GitLab: https://salsa.debian.org/libvirt-team/libvirt/-/compare/938db09cabcb6afaa01cfe28d63621063f7f04f8...803bd5a3cb50ad80004e2e7ea65517730ba515da
--
View it on GitLab: https://salsa.debian.org/libvirt-team/libvirt/-/compare/938db09cabcb6afaa01cfe28d63621063f7f04f8...803bd5a3cb50ad80004e2e7ea65517730ba515da
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/pkg-libvirt-commits/attachments/20211130/6be70242/attachment-0001.htm>
More information about the Pkg-libvirt-commits
mailing list