Please create loopabull_ociimage automation user created for automation tasks related to oc image management/syncing actions #5943
Labels
No labels
announcement
anubis
authentication
aws
backlog
blocked
bodhi
ci
cloud
communishift
copr
database
day-to-day
dc-move
deprecated
dev
discourse
dns
downloads
easyfix
epel
firmitas
forgejo_migration
Gain
High
Gain
Low
Gain
Medium
gitlab
greenwave
hardware
help wanted
high-trouble
koji
koschei
lists
low-trouble
medium-trouble
mirrorlists
monitoring
Needs investigation
odcs
OpenShift
ops
outage
packager_workflow_blocker
pagure
permissions
Priority
Needs Review
Priority
Next Meeting
Priority
🔥 URGENT 🔥
Priority
Waiting on Assignee
Priority
Waiting on External
Priority
Waiting on Reporter
rabbitmq
release-monitoring
releng
request-for-resources
s390x
security
SMTP
sprint-0
sprint-1
src.fp.o
staging
unfreeze
waiverdb
websites-general
wiki
Backlog Status
Needs Review
Backlog Status
Ready
chore
documentation
points
01
points
02
points
03
points
05
points
08
points
13
Priority
High
Priority
Low
Priority
Medium
Sprint Status
Blocked
Sprint Status
Done
Sprint Status
In Progress
Sprint Status
Review
Sprint Status
To Do
Technical Debt
Work Item
Bug
Work Item
Epic
Work Item
Spike
Work Item
Task
Work Item
User Story
No milestone
No project
No assignees
5 participants
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
infra/tickets#5943
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
I'm open to other names for the automation user account, but I'll use the one in the title through out the ticket for now.
I would like to request the loopabull_ociimage user be created such that it can ssh from loopabull01.stg to composer.stg in order to perform skopeo actions to manage docker and other oci compliant images (in the future this will likely include flatpaks).
Sudo permissions:
This is for use with RelEng Automation[0].
[0] - https://pagure.io/releng-automation
I guess this is going to taken over by @puiterwijk now.
I'd say we should create these users in the playbook locally, but we also need to blacklist them in fas so they could never exist there. Or should we just allow loopabull to run these things as root?
Metadata Update from @kevin:
Since loopabull is no longer pointed to that git repo I think we can close this ticket and re-consider this if someone wants to take back this work
@cverna @mohanboddu this may be something that interest you, if so feel free to ping me, I'll help you get familiar with the new setup :)
@pingou I am interested in understanding the new setup.
Lets get together sometime and go over it.
Sure :)
Is this still being worked on by @mohanboddu and @pingou or can we close this?
I am not working on it, happy to help if someone wants some insight in our loopabull deployment though :)
I'm going to just close this for now, please file a new ticket if there's something we need to do.
🕣
Metadata Update from @kevin: