No description
Find a file
Achilleas Koutsou 778b2de3c0 worker: test mixed new and old jobs in jobqueue
Two new tests, one for OSBuild and one for Koji jobs. Both follow the
same flow:
- Enqueue a job that doesn't specify PipelineNames (oldJob)
- Enqueue a job that does specify PipelineNames (newJob)
- Read the job data for the oldJob and check that the default
  PipelineNames were added
- Read the job data for the newJob and check that it's unchanged
- Finish oldJob and add results without specifying PipelineNames
- Finish newJob and add results with PipelineNames
- Read the oldJob result and check that the default PipelineNames were
  added
- Read the newJob result and check that it's unchanged

This is meant to test several scenarios that can occur when upgrading
the service:
1. The existing jobqueue has old jobs in it that were queued before the
   PipelineNames were part of the data structure. The worker should be
   able to read these and add the fallback data.
2. New jobs are added while old jobs still exist in the queue and the
   worker can read both types.
3. The existing jobqueue has old finished jobs in it that were finished
   and had results written before the PipelineNames were part of the
   result data structure. The worker should be able to read these and
   add the fallback data.
4. New jobs are finished and results are written while old jobs still
   exist in the queue and the worker can read both result types.
2021-11-16 09:49:37 +01:00
.devcontainer devcontainer: run container with privileges 2021-08-28 09:20:19 +02:00
.github ci: Send results to Coverity Scan daily 2021-11-12 14:20:15 +01:00
cmd osbuild-worker: attach pipeline names to jobs 2021-11-16 09:49:37 +01:00
containers containers: mock oauth container 2021-11-12 14:07:13 +01:00
distribution containers: mock oauth container 2021-11-12 14:07:13 +01:00
docs Switch to simple upstream releases 2021-10-27 13:03:53 +02:00
image-types image-types: Update RHEL8 Amazon EC2 image information 2021-01-15 17:48:19 +01:00
internal worker: test mixed new and old jobs in jobqueue 2021-11-16 09:49:37 +01:00
repositories distro: introduce Fedora 36 alias 2021-09-03 15:05:00 +02:00
schutzbot schuzbot: clean aws unused resources 2021-11-11 15:42:32 +01:00
templates Revert "templates: Add prometheus scrape annotations to composer-api" 2021-11-10 15:24:24 +01:00
test test: Use YAML as Ansible output format 2021-11-12 14:43:55 +01:00
tools tools: update distro-arch-imagetype-map for RHEL 9.0 types 2021-11-10 14:54:31 +01:00
vendor build(deps): bump github.com/openshift-online/ocm-sdk-go 2021-10-28 19:15:16 +01:00
.gitignore gitignore: add config and OSX metadata 2021-02-20 14:53:49 +01:00
.gitlab-ci.yml distro/rhel90: disable edge-simplified-installer image type 2021-11-10 14:54:31 +01:00
.gitleaks.toml gitleaks: add allow list for test passwords and keys 2021-10-01 16:56:26 +02:00
.golangci.yml ci/lint: add integration tag 2020-03-17 20:36:58 +01:00
.packit.yaml packit: Use upstream github release description 2021-11-12 08:48:47 +01:00
codecov.yml codevoc: fix threshold 2020-05-17 10:12:06 +02:00
CONTRIBUTING.md Drop RELEASING.md and point to dev guide 2021-09-20 10:51:36 +02:00
DEPLOYING.md Add DEPLOYING.md 2020-10-20 15:43:30 +02:00
dnf-json dnf-json: expire metadata by default 2021-10-04 16:02:31 +02:00
go.mod build(deps): bump github.com/openshift-online/ocm-sdk-go 2021-10-28 19:15:16 +01:00
go.sum build(deps): bump github.com/openshift-online/ocm-sdk-go 2021-10-28 19:15:16 +01:00
HACKING.md templates: Composer OSD template 2021-10-05 16:45:55 +02:00
krb5.conf upload/koji: add support for GSSAPI/Kerberos auth 2020-08-27 17:29:57 +01:00
LICENSE Revert "Fill in the license template" 2019-11-15 15:26:51 +01:00
Makefile Switch to simple upstream releases 2021-10-27 13:03:53 +02:00
osbuild-composer.spec Post release version bump 2021-11-10 16:37:05 +00:00
README.md Switch to simple upstream releases 2021-10-27 13:03:53 +02:00
Schutzfile Schutzfile: remove osbuild version pin for RHEL 9.0 2021-11-10 14:54:31 +01:00

OSBuild Composer

Operating System Image Composition Services

The composer project is a set of HTTP services for composing operating system images. It builds on the pipeline execution engine of osbuild and defines its own class of images that it supports building.

Multiple APIs are available to access a composer service. This includes support for the lorax-composer API, and as such can serve as drop-in replacement for lorax-composer.

You can control a composer instance either directly via the provided APIs, or through higher-level user-interfaces from external projects. This, for instance, includes a Cockpit Module or using the composer-cli command-line tool.

Project

Contributing

Please refer to the developer guide to learn about our workflow, code style and more.

About

Composer is a middleman between the workhorses from osbuild and the user-interfaces like cockpit-composer, composer-cli, or others. It defines a set of high-level image compositions that it supports building. Builds of these compositions can be requested via the different APIs of Composer, which will then translate the requests into pipeline-descriptions for osbuild. The pipeline output is then either provided back to the user, or uploaded to a user specified target.

The following image visualizes the overall architecture of the OSBuild infrastructure and the place that Composer takes:

overview

Consult the osbuild-composer(7) man-page for an introduction into composer, information on running your own composer instance, as well as details on the provided infrastructure and services.

Requirements

The requirements for this project are:

  • osbuild >= 26
  • systemd >= 244

At build-time, the following software is required:

  • go >= 1.15
  • python-docutils >= 0.13

Build

The standard go package system is used. Consult upstream documentation for detailed help. In most situations the following commands are sufficient to build and install from source:

mkdir build
go build -o build ./...

The man-pages require python-docutils and can be built via:

make man

Repository:

Pull request gating

Each pull request against osbuild-composer starts a series of automated tests. Tests run via GitHub Actions and Jenkins. Each push to the pull request will launch theses tests automatically.

Jenkins only tests pull requests from members of the osbuild organization in GitHub. A member of the osbuild organization must say ok to test in a pull request comment to approve testing. Anyone can ask for testing to run by saying the bot's favorite word, schutzbot, in a pull request comment. Testing will begin shortly after the comment is posted.

Test results in Jenkins are available by clicking the Details link on the right side of the Schutzbot check in the pull request page.

License:

  • Apache-2.0
  • See LICENSE file for details.