Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[packer-images] track Linux base images with updatecli #4365

Closed
4 tasks done
dduportal opened this issue Oct 24, 2024 · 6 comments
Closed
4 tasks done

[packer-images] track Linux base images with updatecli #4365

dduportal opened this issue Oct 24, 2024 · 6 comments

Comments

@dduportal
Copy link
Contributor

dduportal commented Oct 24, 2024

Service(s)

Other

Summary

In packer images, we recently introduced a new YAML file in which we specify and pin the base images for our system: https://github.com/jenkins-infra/packer-images/blob/main/images-versions.yaml.

We want to cover all cloud providers with this file (AWS, Azure, Docker) for all OSes (Linux, Windows) and all versions/architectures.

AWS

Note for Windows: not implemented for AWS yet so not needed in this issue (see #4318)

Azure

Docker

Reproduction steps

No response

@dduportal dduportal added the triage Incoming issues that need review label Oct 24, 2024
@dduportal dduportal added this to the infra-team-sync-2024-10-29 milestone Oct 24, 2024
@dduportal dduportal added packer updatecli and removed triage Incoming issues that need review labels Oct 24, 2024
@dduportal
Copy link
Contributor Author

@jayfranco999 works on the Linux AMi part

@jayfranco999
Copy link
Collaborator

Update:

jenkins-infra/packer-images#1475 and jenkins-infra/packer-images#1476
tracks the aws AMI ids for ubuntu_22.04, the solution works when tested locally but fails tests on infra.ci since we need an IAM user for updatecli.

Converted both PRs to draft until IAM updatecli user is created.

@jayfranco999
Copy link
Collaborator

jayfranco999 commented Oct 28, 2024

Update:

jenkins-infra/kubernetes-management#5837 and jenkins-infra/packer-images#1482 have been merged which adds the aws credentials for the newly created IAM user updatecli on infra.ci

jenkins-infra/packer-images#1475 and jenkins-infra/packer-images#1476 tracks the aws AMI ids for ubuntu_22.04 for both AMD64 and ARM64 respectively.

All checks have passed for tracking AWS ubuntu_22.04 AMI images

@jayfranco999
Copy link
Collaborator

Update:

jenkins-infra/packer-images#1507 now tracks and updates the latest AZ Ubuntu 22_04 AMD64 image

The manifest works as intended on infra.ci

(https://infra.ci.jenkins.io/job/updatecli/job/packer-images/job/PR-1507/32/pipeline-console/log?nodeId=18)

[2024-11-26T10:11:51.136Z] #################################################
[2024-11-26T10:11:51.136Z] # BUMP AZURE `UBUNTU 22.04` AMD64 IMAGE VERSION #
[2024-11-26T10:11:51.136Z] #################################################
[2024-11-26T10:11:51.136Z] 
[2024-11-26T10:11:51.136Z] source: source#lastReleaseVersion
[2024-11-26T10:11:51.136Z] -------------------------
[2024-11-26T10:12:23.134Z] The shell 🐚 command "/bin/sh /tmp/updatecli/bin/fe287e953d07bf4def15ea4f2d79cd182990dee39f04530a41f3a8f0e0944d01.sh" ran successfully with the following output:
[2024-11-26T10:12:23.134Z] ----
[2024-11-26T10:12:23.134Z] 22.04.202410020
[2024-11-26T10:12:23.134Z] ----
[2024-11-26T10:12:23.134Z] ✔ shell command executed successfully
[2024-11-26T10:12:23.134Z] 
[2024-11-26T10:12:23.134Z] target: target#updateVersion
[2024-11-26T10:12:23.134Z] --------------------
[2024-11-26T10:12:23.134Z] [transformers]
[2024-11-26T10:12:23.134Z] ✔ Result correctly transformed from "22.04.202410020" to "\"22.04.202410020"
[2024-11-26T10:12:23.134Z] ✔ Result correctly transformed from "\"22.04.202410020" to "\"22.04.202410020\""
[2024-11-26T10:12:23.134Z] 
[2024-11-26T10:12:23.134Z] **Dry Run enabled**
[2024-11-26T10:12:23.134Z] 
[2024-11-26T10:12:23.134Z] ⚠ - change detected:
[2024-11-26T10:12:23.134Z] 	* key "$.azure.ubuntu.'22.04'.amd64" should be updated from "\"latest\"" to "\"22.04.202410020\"", in file "./images-versions.yaml"
[2024-11-26T10:12:23.134Z] 

@jayfranco999
Copy link
Collaborator

Update:

jenkins-infra/packer-images#1507 and jenkins-infra/packer-images#1555 tracks the base ubuntu 22_04 AZ image version.

the manifest for tracking the latest AZ Ubuntu 22_04 ARM64 image has been tested successfully (https://infra.ci.jenkins.io/job/updatecli/job/packer-images/job/PR-1555/3/pipeline-console/log?nodeId=18)

16:24:39  #################################################
16:24:39  # BUMP AZURE UBUNTU `22.04` ARM64 IMAGE VERSION #
16:24:39  #################################################
16:24:39  
16:24:39  source: source#lastReleaseVersion
16:24:39  -------------------------
16:24:39  The shell 🐚 command "/bin/sh /tmp/updatecli/bin/ba82edf9297075691bee00f561354cfee2b3efc6326b9b47eb759164fa7c2721.sh" ran successfully with the following output:
16:24:39  ----
16:24:39  22.04.202410020
16:24:39  ----
16:24:39  ✔ shell command executed successfully
16:24:39  
16:24:39  target: target#updateVersion
16:24:39  --------------------
16:24:39  [transformers]
16:24:39  ✔ Result correctly transformed from "22.04.[202](https://infra.ci.jenkins.io/job/updatecli/job/packer-images/job/PR-1555/3/pipeline-console/?start-byte=0&selected-node=18#log-202)410020" to "\"22.04.202410020"
16:24:39  ✔ Result correctly transformed from "\"22.04.202410020" to "\"22.04.202410020\""
16:24:39  
16:24:39  **Dry Run enabled**
16:24:39  
16:24:39  ⚠ - change detected:
16:24:39  	* key "$.azure.ubuntu.'22.04'.arm64" should be updated from "\"latest\"" to "\"22.04.202410020\"", in file "./images-versions.yaml"
16:24:39

Since all Linux (amd64 &arm64) base images for AWS, Azure, and Docker are tracked with updatecli; we can close this issue.

@dduportal
Copy link
Contributor Author

LGTM! The PRs jenkins-infra/packer-images#1558 and jenkins-infra/packer-images#1556 were automatically opened, proving your work here is done!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

2 participants