-
Notifications
You must be signed in to change notification settings - Fork 5
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
CASMHMS-6073 part2 #121
CASMHMS-6073 part2 #121
Conversation
👋 Hey! Here is the image we built for you (Artifactory Link): artifactory.algol60.net/csm-docker/unstable/cray-smd-hmth-test:2.13.0-20230905201843.240dce0 Use podman or docker to pull it down and inspect locally: podman pull artifactory.algol60.net/csm-docker/unstable/cray-smd-hmth-test:2.13.0-20230905201843.240dce0 Or, use this script to pull the image from the build server to a dev system: Dev System Pull Script
#!/usr/bin/env bash
IMAGE=artifactory.algol60.net/csm-docker/unstable/cray-smd-hmth-test:2.13.0-20230905201843.240dce0
podman run --rm --network host \
quay.io/skopeo/stable copy \
--src-tls-verify=false \
--dest-tls-verify=false \
--dest-username "$(kubectl -n nexus get secret nexus-admin-credential -o json | jq -r '.data.username | @base64d')" \
--dest-password "$(kubectl -n nexus get secret nexus-admin-credential -o json | jq -r '.data.password | @base64d')" \
docker://$IMAGE \
docker://registry.local/$IMAGE Snyk ReportComing soon Software Bill of Materialscosign download sbom artifactory.algol60.net/csm-docker/unstable/cray-smd-hmth-test:2.13.0-20230905201843.240dce0 > container_image.spdx If you don't have cosign, then you can get it here. Note: this SHA is the merge of d9d6eec and the PR base branch. Good luck and make rocket go now! 🌮 🚀 |
👋 Hey! Here is the image we built for you (Artifactory Link): artifactory.algol60.net/csm-docker/unstable/cray-smd:2.13.0-20230905201857.240dce0 Use podman or docker to pull it down and inspect locally: podman pull artifactory.algol60.net/csm-docker/unstable/cray-smd:2.13.0-20230905201857.240dce0 Or, use this script to pull the image from the build server to a dev system: Dev System Pull Script
#!/usr/bin/env bash
IMAGE=artifactory.algol60.net/csm-docker/unstable/cray-smd:2.13.0-20230905201857.240dce0
podman run --rm --network host \
quay.io/skopeo/stable copy \
--src-tls-verify=false \
--dest-tls-verify=false \
--dest-username "$(kubectl -n nexus get secret nexus-admin-credential -o json | jq -r '.data.username | @base64d')" \
--dest-password "$(kubectl -n nexus get secret nexus-admin-credential -o json | jq -r '.data.password | @base64d')" \
docker://$IMAGE \
docker://registry.local/$IMAGE Snyk ReportComing soon Software Bill of Materialscosign download sbom artifactory.algol60.net/csm-docker/unstable/cray-smd:2.13.0-20230905201857.240dce0 > container_image.spdx If you don't have cosign, then you can get it here. Note: this SHA is the merge of d9d6eec and the PR base branch. Good luck and make rocket go now! 🌮 🚀 |
Summary and Scope
Summarize what has changed. Explain why this PR is necessary. What is impacted? Is this a new feature, critical bug fix, etc?
GetCompDefaults
is now used for both Nodes and VirtualNodes.docker-compose.test.ct.yaml
3-disruptive/test_nodemaps_negative.tavern.yaml
to test both Node and VirtualNode typesIs this change backwards incompatible, backwards compatible, or a backwards compatible bugfix?
Backwards compatible
Issues and Related PRs
List and characterize relationship to Jira/Github issues and other pull requests. Be sure to list dependencies.
Testing
List the environments in which these changes were tested.
Tested on:
Test description:
How were the changes tested and success verified? If schema changes were part of this change, how were those handled in your upgrade/downgrade testing?
Local Testing
I ran the HSM docker images locally against the nightly integration environment. All of the tavern tests from the other HMS services were ran against their respective services alongside a modified state manager from this PR. All tests passed.
Virtual Shasta Testing
Performed upgrade and downgrade testing with the version of HSM from this PR.
The HMS CT tests ran successfully after deploying the new version of HSM.
Risks and Mitigations
Are there known issues with these changes? Any other special considerations?
No known issues.
Pull Request Checklist