On Thu, Dec 30, 2021 at 5:50 AM Amar Tumballi wrote:
> Any PR to suspect here?
>
The previous execution that passed was based on commit 12b44fe. This one is
based on commit b8e32c3. The only commit between them is b8e32c3, but it
seems unlikely that it may affect non SSL connections.
It seems
Any PR to suspect here?
On Thu, Dec 30, 2021 at 6:25 AM Gluster-jenkins
wrote:
> *Test details:*
> RPM Location: Upstream
> OS Version: Red-Hat-Enterprise-Linux 8.4-(Ootpa)
> Baseline Gluster version: glusterfs-10.0-1
> Current Gluster version: glusterfs-20211228.b8e32c3-0.0
> Intermediate
Current Threshold: 21. Coverity Warning Latest Count: 23
---
Community Meeting Calendar:
Schedule -
Every 2nd and 4th Tuesday at 14:30 IST / 09:00 UTC
Bridge: https://meet.google.com/cpu-eiue-hvk
Gluster-devel mailing list
Gluster-devel@gluster.org
Test details:
RPM Location: Upstream
OS Version: Red-Hat-Enterprise-Linux 8.4-(Ootpa)
Baseline Gluster version: glusterfs-10.0-1
Current Gluster version: glusterfs-20211228.b8e32c3-0.0
Intermediate Gluster version: No intermediate baseline
Test type: