-
Notifications
You must be signed in to change notification settings - Fork 95
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
libvirt/kcli: defaults to Ubuntu 22.04 #1594
libvirt/kcli: defaults to Ubuntu 22.04 #1594
Conversation
I tested it locally and all the tests passed! \o/ But unfortunately I lost results, so you will need to trust me :) |
Added the test_e2e_libvirt label just to check the current status of CI, I don't expect it to pass (podvm build for CentOS should fail). |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM
Thanks @wainersm , I notice failure when push the podvm image in PR check in https://github.com/confidential-containers/cloud-api-adaptor/actions/runs/6949012011/job/18906372542?pr=1594 , looks it's not related with the PR but a token expiration? or it's expected as the PR check is running in a fork without right token?
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM
@@ -100,11 +100,6 @@ jobs: | |||
[ -f ~/.ssh/id_rsa ] || \ | |||
ssh-keygen -t rsa -f ~/.ssh/id_rsa -N "" | |||
|
|||
# Newest version of kcli does not index old Ubuntu images like 20.04 |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Btw the newest kcli does index 20.04 again thanks to Fabiano ;-) (not that it'd be important for this PR)
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Code LGTM. I'll try and test it out later if I get the chance
I tested this locally - it was a bit slow, so a couple of times it timed out, but that's probably my VM. The tests all passed though once I had it set-up including nydus:
|
hmmm... interesting that the builder workflow was able to publish the container on quay.io. I might have introduced a bug on recent changes I made to the workflows or it might be an intermittent issue. Let me re-run the jobs to see what happens. |
Ubuntu 22.04 packages containerd 1.7 that is the mininum required version as of CoCo 0.8.0. Updated the libvirt/kcli_cluster.sh to install Ubuntu 22.04 instead of 20.04. There is needed to use a kcli version newer than the build of today (2023/11/22) that contains the fix to [1][2][3]. [1] karmab/kcli#619 [2] karmab/kcli#620 [3] karmab/kcli#622 Fixes confidential-containers#1593 Signed-off-by: Wainer dos Santos Moschetta <wainersm@redhat.com>
00771ce
to
7cb5588
Compare
Sending an updated version where I bumped the mininum kcli build date to 2023/11/22 to pick up @liudalibj's fixes. I re-ran the tests with kcli-99.0.0.git.202311221027.841a950-0 on x86_64, all passed, including nydus:
|
Ubuntu 22.04 packages containerd 1.7 that is the mininum required version as of CoCo 0.8.0. Updated the libvirt/kcli_cluster.sh to install Ubuntu 22.04 instead of 20.04.
There is needed to use a kcli version newer than the build of today (2023/11/21) that contains the fix to [1].
[1] karmab/kcli#619
Fixes #1593
Signed-off-by: Wainer dos Santos Moschetta wainersm@redhat.com