Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[citest skip] workflows: Add integration-tests for Ubuntu 22.04 #68

Merged
merged 2 commits into from
Aug 19, 2022

Conversation

martinpitt
Copy link
Collaborator

@martinpitt martinpitt commented Jul 29, 2022

The current LTS 22.04 is the more interesting target. This detects bugs
like [1]. Keep 20.04 running as well for the time being.

[1] linux-system-roles/certificate#130


@martinpitt
Copy link
Collaborator Author

martinpitt commented Jul 29, 2022

aha, this needs fixing in lsr.certificate:

TASK [linux-system-roles.certificate : Ensure certificate role dependencies are installed] ***
task path: /home/runner/work/cockpit/cockpit/tests/roles/linux-system-roles.certificate/tasks/main.yml:5
fatal: [localhost]: FAILED! => {"changed": false, "msg": "No package matching 'python-pyasn1' is available"}

No python 2 any more!

I sent linux-system-roles/certificate#130 for that.

@martinpitt martinpitt changed the title workflows: Move integration-tests to Ubuntu 22.04 [citest skip] workflows: Move integration-tests to Ubuntu 22.04 Jul 29, 2022
The current LTS 22.04 is the more interesting target. This detects bugs
like [1]. Keep 20.04 running as well for the time being.

[1] linux-system-roles/certificate#130
@martinpitt martinpitt changed the title [citest skip] workflows: Move integration-tests to Ubuntu 22.04 [citest skip] workflows: Add integration-tests for Ubuntu 22.04 Jul 29, 2022
@richm
Copy link
Contributor

richm commented Aug 18, 2022

integration tests pass on ubuntu - does this mean the certificate role change is working?

@martinpitt
Copy link
Collaborator Author

@richm The blocking change landed. I suppose you retried the failing test afterwards? This needs rebasing now due to the conflict. I'm on PTO until Aug 30, I can't do that until then. Please feel free to resolve and force-push to my branch to get this out of the way! Otherwise I'll do that in 11 days. Thanks!

@richm richm marked this pull request as ready for review August 19, 2022 18:48
@richm
Copy link
Contributor

richm commented Aug 19, 2022

[citest]

@richm richm merged commit 9a3f3d4 into linux-system-roles:master Aug 19, 2022
@martinpitt martinpitt deleted the tests-u2204 branch August 19, 2022 19:23
richm added a commit to richm/linux-system-roles-cockpit that referenced this pull request Nov 1, 2022
[1.4.0] - 2022-11-01
--------------------

### New Features

- Use the firewall role and the selinux role from the cockpit role (linux-system-roles#76)

Since cockpit_port is a public api of the cockpit role, define it
in defaults/main.yml as null.

- Introduce cockpit_manage_firewall to use the firewall role to
  manage the cockpit service.
  Default to false - means the firewall role is not used.

- Add the test check task tasks/check_port.yml for verifying the
  ports status.

- Add meta/collection-requirements.yml.

- Introduce cockpit_manage_selinux to use the selinux role to
  manage the ports in the cockpit service.
  Assign websm_port_t to the cockpit service ports.
  Default to false - means the selinux role is not used.

- Use the certificate role to create the cert and the key (linux-system-roles#78)

- Introduce a variable cockpit_certificates to set the certificate_requests.

- Update README so that using the certificate role is recommended.

Add a check and README note for not supporting creating a self-signed
certificate on RHEL/CentOS-7.

### Bug Fixes

- none

### Other Changes

- workflows: Add integration-tests for Ubuntu 22.04 (linux-system-roles#68)

The current LTS 22.04 is the more interesting target. This detects bugs
like [1]. Keep 20.04 running as well for the time being.

[1] linux-system-roles/certificate#130

- Clone the certificate role in the temporary dir. (linux-system-roles#77)

Signed-off-by: Rich Megginson <[email protected]>
richm added a commit that referenced this pull request Nov 2, 2022
[1.4.0] - 2022-11-01
--------------------

### New Features

- Use the firewall role and the selinux role from the cockpit role (#76)

Since cockpit_port is a public api of the cockpit role, define it
in defaults/main.yml as null.

- Introduce cockpit_manage_firewall to use the firewall role to
  manage the cockpit service.
  Default to false - means the firewall role is not used.

- Add the test check task tasks/check_port.yml for verifying the
  ports status.

- Add meta/collection-requirements.yml.

- Introduce cockpit_manage_selinux to use the selinux role to
  manage the ports in the cockpit service.
  Assign websm_port_t to the cockpit service ports.
  Default to false - means the selinux role is not used.

- Use the certificate role to create the cert and the key (#78)

- Introduce a variable cockpit_certificates to set the certificate_requests.

- Update README so that using the certificate role is recommended.

Add a check and README note for not supporting creating a self-signed
certificate on RHEL/CentOS-7.

### Bug Fixes

- none

### Other Changes

- workflows: Add integration-tests for Ubuntu 22.04 (#68)

The current LTS 22.04 is the more interesting target. This detects bugs
like [1]. Keep 20.04 running as well for the time being.

[1] linux-system-roles/certificate#130

- Clone the certificate role in the temporary dir. (#77)

Signed-off-by: Rich Megginson <[email protected]>

Signed-off-by: Rich Megginson <[email protected]>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants