Skip to content

test-execute fails under lxc #9700

@mbiebl

Description

@mbiebl

systemd version the issue has been seen with

v239

Used distribution

Debian sid

AppArmor confinement is enabled for the LXC container, lxc is version 2.0.9

Running test-execute under lxc via autopkgtest, I get:

root@autopkgtest-lxc-drpooy:/tmp/autopkgtest-lxc.dbckoweu/downtmp/build.439/src# /usr/lib/systemd/tests/test-execute
Found cgroup on /sys/fs/cgroup/systemd, legacy hierarchy
Found cgroup on /sys/fs/cgroup/systemd, legacy hierarchy
Using cgroup controller name=systemd. File system hierarchy is at /sys/fs/cgroup/systemd/e33f2c8956e4d33c.
Controller 'cpu' supported: yes
Controller 'cpuacct' supported: yes
Controller 'io' supported: no
Controller 'blkio' supported: yes
Controller 'memory' supported: yes
Controller 'devices' supported: yes
Controller 'pids' supported: yes
Looking for unit files in (higher priority first):
	/usr/lib/systemd/tests/testdata/test-execute
Unit type .device is not supported on this system.
Unit type .automount is not supported on this system.
Found container virtualization lxc.
Unit type .swap is not supported on this system.
Unit type .device is not supported on this system.
Unit type .automount is not supported on this system.
Unit type .swap is not supported on this system.
root.mount: Failed to load configuration: No such file or directory
dev.mount: Failed to load configuration: No such file or directory
proc.mount: Failed to load configuration: No such file or directory
tmp.mount: Failed to load configuration: No such file or directory
sys.mount: Failed to load configuration: No such file or directory
sys-fs.mount: Failed to load configuration: No such file or directory
sys-fs-fuse.mount: Failed to load configuration: No such file or directory
sys-devices.mount: Failed to load configuration: No such file or directory
sys-devices-virtual.mount: Failed to load configuration: No such file or directory
proc-sys.mount: Failed to load configuration: No such file or directory
Successfully created private D-Bus server.
Bus bus-system: changing state UNSET → OPENING
Bus bus-system: changing state OPENING → AUTHENTICATING
Successfully connected to system bus.
Invoking unit coldplug() handlers…
dev-hugepages.mount: Changed dead -> mounted
proc-uptime.mount: Changed dead -> mounted
dev-mqueue.mount: Changed dead -> mounted
dev-tty2.mount: Changed dead -> mounted
proc-sysrq\x2dtrigger.mount: Changed dead -> mounted
-.mount: Changed dead -> mounted
dev-tty1.mount: Changed dead -> mounted
init.scope changed dead -> running
proc-meminfo.mount: Changed dead -> mounted
proc-cpuinfo.mount: Changed dead -> mounted
dev-tty4.mount: Changed dead -> mounted
proc-sys-net.mount: Changed dead -> mounted
dev-tty3.mount: Changed dead -> mounted
proc-stat.mount: Changed dead -> mounted
sys-fs-fuse-connections.mount: Changed dead -> mounted
dev-ptmx.mount: Changed dead -> mounted
tmp-autopkgtest\x2dlxc.dbckoweu.mount: Changed dead -> mounted
-.slice changed dead -> active
sys-devices-virtual-net.mount: Changed dead -> mounted
proc-swaps.mount: Changed dead -> mounted
proc-diskstats.mount: Changed dead -> mounted
Invoking unit catchup() handlers…
shutdown.target: Failed to load configuration: No such file or directory
basic.target: Failed to load configuration: No such file or directory
Not running with unified cgroups, BPF firewalling is not supported.
BPF firewalling not supported on this manager, proceeding without.
BPF firewalling not supported on this manager, proceeding without.
exec-basic.service: Passing 0 fds to service
exec-basic.service: About to execute: /usr/bin/touch /tmp/a
exec-basic.service: Forked /usr/bin/touch as 1747
exec-basic.service: Changed dead -> start
exec-basic.service
	UMask: 0022
	WorkingDirectory: /root
	RootDirectory: /
	NonBlocking: no
	PrivateTmp: yes
	PrivateDevices: no
	ProtectKernelTunables: no
	ProtectKernelModules: no
	ProtectControlGroups: no
	PrivateNetwork: no
	PrivateUsers: no
	ProtectHome: no
	ProtectSystem: no
	MountAPIVFS: no
	IgnoreSIGPIPE: yes
	MemoryDenyWriteExecute: no
	RestrictRealtime: no
	KeyringMode: inherit
	RuntimeDirectoryPreserve: no
	RuntimeDirectoryMode: 0755
	StateDirectoryMode: 0755
	CacheDirectoryMode: 0755
	LogsDirectoryMode: 0755
	ConfigurationDirectoryMode: 0755
	StandardInput: null
	StandardOutput: inherit
	StandardError: inherit
	DynamicUser: no
	LockPersonality: no
Bus bus-system: changing state AUTHENTICATING → HELLO
Sent message type=method_call sender=n/a destination=org.freedesktop.DBus path=/org/freedesktop/DBus interface=org.freedesktop.DBus member=Hello cookie=1 reply_cookie=0 signature=n/a error-name=n/a error-message=n/a
Sent message type=method_call sender=n/a destination=org.freedesktop.DBus path=/org/freedesktop/DBus interface=org.freedesktop.DBus member=AddMatch cookie=2 reply_cookie=0 signature=s error-name=n/a error-message=n/a
exec-basic.service: Failed to set up namespace, assuming containerized execution, ignoring: Permission denied
Got message type=method_return sender=org.freedesktop.DBus destination=:1.27 path=n/a interface=n/a member=n/a cookie=1 reply_cookie=1 signature=s error-name=n/a error-message=n/a
Bus bus-system: changing state HELLO → RUNNING
exec-basic.service: Executing: /usr/bin/touch /tmp/aGot message type=signal sender=org.freedesktop.DBus destination=:1.27 path=/org/freedesktop/DBus interface=org.freedesktop.DBus member=NameAcquired cookie=2 reply_cookie=0 signature=s error-name=n/a error-message=n/a

Got message type=method_return sender=org.freedesktop.DBus destination=:1.27 path=n/a interface=n/a member=n/a cookie=3 reply_cookie=2 signature=n/a error-name=n/a error-message=n/a
Match type='signal',path='/org/freedesktop/systemd1/agent',interface='org.freedesktop.systemd1.Agent',member='Released' successfully installed.
Received SIGCHLD from PID 1747 (touch).
Child 1747 (touch) died (code=exited, status=0/SUCCESS)
exec-basic.service: Child 1747 belongs to exec-basic.service.
exec-basic.service: Main process exited, code=exited, status=0/SUCCESS
exec-basic.service: Running next main command for state start.
exec-basic.service: Passing 0 fds to service
exec-basic.service: About to execute: /bin/touch /tmp/b
exec-basic.service: Forked /bin/touch as 1748
exec-basic.service: Failed to set up namespace, assuming containerized execution, ignoring: Permission denied
exec-basic.service: Executing: /bin/touch /tmp/b
Received SIGCHLD from PID 1748 (touch).
Child 1748 (touch) died (code=exited, status=0/SUCCESS)
exec-basic.service: Child 1748 belongs to exec-basic.service.
exec-basic.service: Main process exited, code=exited, status=0/SUCCESS
exec-basic.service: Running next main command for state start.
exec-basic.service: Passing 0 fds to service
exec-basic.service: About to execute: /usr/bin/touch /tmp/c
exec-basic.service: Forked /usr/bin/touch as 1749
exec-basic.service: Failed to set up namespace, assuming containerized execution, ignoring: Permission denied
exec-basic.service: Executing: /usr/bin/touch /tmp/c
Received SIGCHLD from PID 1749 (touch).
Child 1749 (touch) died (code=exited, status=0/SUCCESS)
exec-basic.service: Child 1749 belongs to exec-basic.service.
exec-basic.service: Main process exited, code=exited, status=0/SUCCESS
exec-basic.service: Running next main command for state start.
exec-basic.service: Passing 0 fds to service
exec-basic.service: About to execute: /usr/bin/test -f /tmp/a
exec-basic.service: Forked /usr/bin/test as 1750
exec-basic.service: Failed to set up namespace, assuming containerized execution, ignoring: Permission denied
exec-basic.service: Executing: /usr/bin/test -f /tmp/a
Received SIGCHLD from PID 1750 (test).
Child 1750 (test) died (code=exited, status=0/SUCCESS)
exec-basic.service: Child 1750 belongs to exec-basic.service.
exec-basic.service: Main process exited, code=exited, status=0/SUCCESS
exec-basic.service: Running next main command for state start.
exec-basic.service: Passing 0 fds to service
exec-basic.service: About to execute: /usr/bin/test -f /tmp/b
exec-basic.service: Forked /usr/bin/test as 1751
exec-basic.service: Failed to set up namespace, assuming containerized execution, ignoring: Permission denied
exec-basic.service: Executing: /usr/bin/test -f /tmp/b
Received SIGCHLD from PID 1751 (test).
Child 1751 (test) died (code=exited, status=0/SUCCESS)
exec-basic.service: Child 1751 belongs to exec-basic.service.
exec-basic.service: Main process exited, code=exited, status=0/SUCCESS
exec-basic.service: Running next main command for state start.
exec-basic.service: Passing 0 fds to service
exec-basic.service: About to execute: /usr/bin/test -f /tmp/c
exec-basic.service: Forked /usr/bin/test as 1752
exec-basic.service: Failed to set up namespace, assuming containerized execution, ignoring: Permission denied
exec-basic.service: Executing: /usr/bin/test -f /tmp/c
Received SIGCHLD from PID 1752 (test).
Child 1752 (test) died (code=exited, status=0/SUCCESS)
exec-basic.service: Child 1752 belongs to exec-basic.service.
exec-basic.service: Main process exited, code=exited, status=0/SUCCESS
exec-basic.service: Running next main command for state start.
exec-basic.service: Passing 0 fds to service
exec-basic.service: About to execute: /usr/bin/test -f /tmp/c
exec-basic.service: Forked /usr/bin/test as 1753
exec-basic.service: Failed to set up namespace, assuming containerized execution, ignoring: Permission denied
exec-basic.service: Executing: /usr/bin/test -f /tmp/c
Received SIGCHLD from PID 1753 (test).
Child 1753 (test) died (code=exited, status=0/SUCCESS)
exec-basic.service: Child 1753 belongs to exec-basic.service.
exec-basic.service: Main process exited, code=exited, status=0/SUCCESS
exec-basic.service: About to execute: /usr/bin/rm /tmp/a /tmp/b /tmp/c
exec-basic.service: Forked /usr/bin/rm as 1754
exec-basic.service: Changed start -> start-post
exec-basic.service: Failed to set up namespace, assuming containerized execution, ignoring: Permission denied
exec-basic.service: Executing: /usr/bin/rm /tmp/a /tmp/b /tmp/c
Received SIGCHLD from PID 1754 (rm).
Child 1754 (rm) died (code=exited, status=0/SUCCESS)
exec-basic.service: Child 1754 belongs to exec-basic.service.
exec-basic.service: Control process exited, code=exited status=0
exec-basic.service: Got final SIGCHLD for state start-post.
exec-basic.service: Changed start-post -> dead
Spawning thread to nuke /tmp/systemd-private-b6066afb81864af6824257068880184c-exec-basic.service-dnnXjH
Spawning thread to nuke /var/tmp/systemd-private-b6066afb81864af6824257068880184c-exec-basic.service-vG1Anr
	PID: 1753
	Start Timestamp: Mon 2018-07-23 15:03:43 UTC
	Exit Timestamp: Mon 2018-07-23 15:03:43 UTC
	Exit Code: exited
	Exit Status: 0
BPF firewalling not supported on this manager, proceeding without.
exec-ambientcapabilities.service: Passing 0 fds to service
exec-ambientcapabilities.service: About to execute: /bin/sh -x -c 'c=$$(grep "CapAmb:" /proc/self/status); test "$$c" = "CapAmb:	0000000000002001"'
exec-ambientcapabilities.service: Forked /bin/sh as 1757
exec-ambientcapabilities.service: Changed dead -> start
exec-ambientcapabilities.service
	UMask: 0022
	WorkingDirectory: /root
	RootDirectory: /
	NonBlocking: no
	PrivateTmp: no
	PrivateDevices: no
	ProtectKernelTunables: no
	ProtectKernelModules: no
	ProtectControlGroups: no
	PrivateNetwork: no
	PrivateUsers: no
	ProtectHome: no
	ProtectSystem: no
	MountAPIVFS: no
	IgnoreSIGPIPE: yes
	MemoryDenyWriteExecute: no
	RestrictRealtime: no
	KeyringMode: inherit
	RuntimeDirectoryPreserve: no
	RuntimeDirectoryMode: 0755
	StateDirectoryMode: 0755
	CacheDirectoryMode: 0755
	LogsDirectoryMode: 0755
	ConfigurationDirectoryMode: 0755
	StandardInput: null
	StandardOutput: inherit
	StandardError: inherit
	AmbientCapabilities: cap_chown cap_net_raw
	User: daemon
	DynamicUser: no
	LockPersonality: no
exec-ambientcapabilities.service: User lookup succeeded: uid=1 gid=1
exec-ambientcapabilities.service: Executing: /bin/sh -x -c 'c=$(grep "CapAmb:" /proc/self/status); test "$c" = "CapAmb:	0000000000002001"'
+ grep CapAmb: /proc/self/status
+ c=CapAmb:	0000000000002001
+ test CapAmb:	0000000000002001 = CapAmb:	0000000000002001
Received SIGCHLD from PID 1757 (sh).
Child 1757 (sh) died (code=exited, status=0/SUCCESS)
exec-ambientcapabilities.service: Child 1757 belongs to exec-ambientcapabilities.service.
exec-ambientcapabilities.service: Main process exited, code=exited, status=0/SUCCESS
exec-ambientcapabilities.service: Changed start -> dead
	PID: 1757
	Start Timestamp: Mon 2018-07-23 15:03:43 UTC
	Exit Timestamp: Mon 2018-07-23 15:03:43 UTC
	Exit Code: exited
	Exit Status: 0
BPF firewalling not supported on this manager, proceeding without.
exec-ambientcapabilities-merge.service: Passing 0 fds to service
exec-ambientcapabilities-merge.service: About to execute: /bin/sh -x -c 'c=$$(grep "CapAmb:" /proc/self/status); test "$$c" = "CapAmb:	0000000000002001"'
exec-ambientcapabilities-merge.service: Forked /bin/sh as 1759
exec-ambientcapabilities-merge.service: Changed dead -> start
exec-ambientcapabilities-merge.service
	UMask: 0022
	WorkingDirectory: /root
	RootDirectory: /
	NonBlocking: no
	PrivateTmp: no
	PrivateDevices: no
	ProtectKernelTunables: no
	ProtectKernelModules: no
	ProtectControlGroups: no
	PrivateNetwork: no
	PrivateUsers: no
	ProtectHome: no
	ProtectSystem: no
	MountAPIVFS: no
	IgnoreSIGPIPE: yes
	MemoryDenyWriteExecute: no
	RestrictRealtime: no
	KeyringMode: inherit
	RuntimeDirectoryPreserve: no
	RuntimeDirectoryMode: 0755
	StateDirectoryMode: 0755
	CacheDirectoryMode: 0755
	LogsDirectoryMode: 0755
	ConfigurationDirectoryMode: 0755
	StandardInput: null
	StandardOutput: inherit
	StandardError: inherit
	AmbientCapabilities: cap_chown cap_net_raw
	User: daemon
	DynamicUser: no
	LockPersonality: no
exec-ambientcapabilities-merge.service: User lookup succeeded: uid=1 gid=1
exec-ambientcapabilities-merge.service: Executing: /bin/sh -x -c 'c=$(grep "CapAmb:" /proc/self/status); test "$c" = "CapAmb:	0000000000002001"'
+ grep CapAmb: /proc/self/status
+ c=CapAmb:	0000000000002001
+ test CapAmb:	0000000000002001 = CapAmb:	0000000000002001
Received SIGCHLD from PID 1759 (sh).
Child 1759 (sh) died (code=exited, status=0/SUCCESS)
exec-ambientcapabilities-merge.service: Child 1759 belongs to exec-ambientcapabilities-merge.service.
exec-ambientcapabilities-merge.service: Main process exited, code=exited, status=0/SUCCESS
exec-ambientcapabilities-merge.service: Changed start -> dead
	PID: 1759
	Start Timestamp: Mon 2018-07-23 15:03:43 UTC
	Exit Timestamp: Mon 2018-07-23 15:03:43 UTC
	Exit Code: exited
	Exit Status: 0
BPF firewalling not supported on this manager, proceeding without.
exec-ambientcapabilities-nobody.service: Passing 0 fds to service
exec-ambientcapabilities-nobody.service: About to execute: /bin/sh -x -c 'c=$$(grep "CapAmb:" /proc/self/status); test "$$c" = "CapAmb:	0000000000002001"'
exec-ambientcapabilities-nobody.service: Forked /bin/sh as 1761
exec-ambientcapabilities-nobody.service: Changed dead -> start
exec-ambientcapabilities-nobody.service
	UMask: 0022
	WorkingDirectory: /root
	RootDirectory: /
	NonBlocking: no
	PrivateTmp: no
	PrivateDevices: no
	ProtectKernelTunables: no
	ProtectKernelModules: no
	ProtectControlGroups: no
	PrivateNetwork: no
	PrivateUsers: no
	ProtectHome: no
	ProtectSystem: no
	MountAPIVFS: no
	IgnoreSIGPIPE: yes
	MemoryDenyWriteExecute: no
	RestrictRealtime: no
	KeyringMode: inherit
	RuntimeDirectoryPreserve: no
	RuntimeDirectoryMode: 0755
	StateDirectoryMode: 0755
	CacheDirectoryMode: 0755
	LogsDirectoryMode: 0755
	ConfigurationDirectoryMode: 0755
	StandardInput: null
	StandardOutput: inherit
	StandardError: inherit
	AmbientCapabilities: cap_chown cap_net_raw
	User: nobody
	DynamicUser: no
	LockPersonality: no
exec-ambientcapabilities-nobody.service: User lookup succeeded: uid=65534 gid=65534
exec-ambientcapabilities-nobody.service: Executing: /bin/sh -x -c 'c=$(grep "CapAmb:" /proc/self/status); test "$c" = "CapAmb:	0000000000002001"'
+ grep CapAmb: /proc/self/status
+ c=CapAmb:	0000000000002001
+ test CapAmb:	0000000000002001 = CapAmb:	0000000000002001
Received SIGCHLD from PID 1761 (sh).
Child 1761 (sh) died (code=exited, status=0/SUCCESS)
exec-ambientcapabilities-nobody.service: Child 1761 belongs to exec-ambientcapabilities-nobody.service.
exec-ambientcapabilities-nobody.service: Main process exited, code=exited, status=0/SUCCESS
exec-ambientcapabilities-nobody.service: Changed start -> dead
	PID: 1761
	Start Timestamp: Mon 2018-07-23 15:03:43 UTC
	Exit Timestamp: Mon 2018-07-23 15:03:43 UTC
	Exit Code: exited
	Exit Status: 0
BPF firewalling not supported on this manager, proceeding without.
exec-ambientcapabilities-merge-nobody.service: Passing 0 fds to service
exec-ambientcapabilities-merge-nobody.service: About to execute: /bin/sh -x -c 'c=$$(grep "CapAmb:" /proc/self/status); test "$$c" = "CapAmb:	0000000000002001"'
exec-ambientcapabilities-merge-nobody.service: Forked /bin/sh as 1763
exec-ambientcapabilities-merge-nobody.service: Changed dead -> start
exec-ambientcapabilities-merge-nobody.service
	UMask: 0022
	WorkingDirectory: /root
	RootDirectory: /
	NonBlocking: no
	PrivateTmp: no
	PrivateDevices: no
	ProtectKernelTunables: no
	ProtectKernelModules: no
	ProtectControlGroups: no
	PrivateNetwork: no
	PrivateUsers: no
	ProtectHome: no
	ProtectSystem: no
	MountAPIVFS: no
	IgnoreSIGPIPE: yes
	MemoryDenyWriteExecute: no
	RestrictRealtime: no
	KeyringMode: inherit
	RuntimeDirectoryPreserve: no
	RuntimeDirectoryMode: 0755
	StateDirectoryMode: 0755
	CacheDirectoryMode: 0755
	LogsDirectoryMode: 0755
	ConfigurationDirectoryMode: 0755
	StandardInput: null
	StandardOutput: inherit
	StandardError: inherit
	AmbientCapabilities: cap_chown cap_net_raw
	User: nobody
	DynamicUser: no
	LockPersonality: no
exec-ambientcapabilities-merge-nobody.service: User lookup succeeded: uid=65534 gid=65534
exec-ambientcapabilities-merge-nobody.service: Executing: /bin/sh -x -c 'c=$(grep "CapAmb:" /proc/self/status); test "$c" = "CapAmb:	0000000000002001"'
+ grep CapAmb: /proc/self/status
+ c=CapAmb:	0000000000002001
+ test CapAmb:	0000000000002001 = CapAmb:	0000000000002001
Received SIGCHLD from PID 1763 (sh).
Child 1763 (sh) died (code=exited, status=0/SUCCESS)
exec-ambientcapabilities-merge-nobody.service: Child 1763 belongs to exec-ambientcapabilities-merge-nobody.service.
exec-ambientcapabilities-merge-nobody.service: Main process exited, code=exited, status=0/SUCCESS
exec-ambientcapabilities-merge-nobody.service: Changed start -> dead
	PID: 1763
	Start Timestamp: Mon 2018-07-23 15:03:43 UTC
	Exit Timestamp: Mon 2018-07-23 15:03:43 UTC
	Exit Code: exited
	Exit Status: 0
BPF firewalling not supported on this manager, proceeding without.
exec-bindpaths.service: Passing 0 fds to service
exec-bindpaths.service: About to execute: /usr/bin/touch /tmp/test-exec-bindpaths/thisisasimpletest
exec-bindpaths.service: Forked /usr/bin/touch as 1765
exec-bindpaths.service: Changed dead -> start
exec-bindpaths.service
	UMask: 0022
	WorkingDirectory: /root
	RootDirectory: /
	NonBlocking: no
	PrivateTmp: no
	PrivateDevices: no
	ProtectKernelTunables: no
	ProtectKernelModules: no
	ProtectControlGroups: no
	PrivateNetwork: no
	PrivateUsers: no
	ProtectHome: no
	ProtectSystem: no
	MountAPIVFS: no
	IgnoreSIGPIPE: yes
	MemoryDenyWriteExecute: no
	RestrictRealtime: no
	KeyringMode: inherit
	RuntimeDirectoryPreserve: no
	RuntimeDirectoryMode: 0755
	StateDirectoryMode: 0755
	CacheDirectoryMode: 0755
	LogsDirectoryMode: 0755
	ConfigurationDirectoryMode: 0755
	StandardInput: null
	StandardOutput: inherit
	StandardError: inherit
	DynamicUser: no
	BindPaths: /tmp:/tmp/test-exec-bindpaths:rbind
	BindReadOnlyPaths: /tmp:/tmp/test-exec-bindreadonlypaths:rbind
	LockPersonality: no
exec-bindpaths.service: Failed to set up namespace, assuming containerized execution, ignoring: Permission denied
exec-bindpaths.service: Executing: /usr/bin/touch /tmp/test-exec-bindpaths/thisisasimpletest
Received SIGCHLD from PID 1765 (touch).
Child 1765 (touch) died (code=exited, status=0/SUCCESS)
exec-bindpaths.service: Child 1765 belongs to exec-bindpaths.service.
exec-bindpaths.service: Main process exited, code=exited, status=0/SUCCESS
exec-bindpaths.service: Running next main command for state start.
exec-bindpaths.service: Passing 0 fds to service
exec-bindpaths.service: About to execute: /usr/bin/test -f /tmp/thisisasimpletest
exec-bindpaths.service: Forked /usr/bin/test as 1766
exec-bindpaths.service: Failed to set up namespace, assuming containerized execution, ignoring: Permission denied
exec-bindpaths.service: Executing: /usr/bin/test -f /tmp/thisisasimpletest
Received SIGCHLD from PID 1766 (test).
Child 1766 (test) died (code=exited, status=1/FAILURE)
exec-bindpaths.service: Child 1766 belongs to exec-bindpaths.service.
exec-bindpaths.service: Main process exited, code=exited, status=1/FAILURE
exec-bindpaths.service: Failed with result 'exit-code'.
exec-bindpaths.service: Changed start -> failed
exec-bindpaths.service: Unit entered failed state.
	PID: 1766
	Start Timestamp: Mon 2018-07-23 15:03:43 UTC
	Exit Timestamp: Mon 2018-07-23 15:03:43 UTC
	Exit Code: exited
	Exit Status: 1
Assertion 'service->main_exec_status.status == status_expected' failed at ../src/test/test-execute.c:59, function check(). Aborting.
Aborted

Metadata

Metadata

Assignees

No one assigned

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions