Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
4 changes: 2 additions & 2 deletions .github/workflows/build.yml
Original file line number Diff line number Diff line change
Expand Up @@ -155,7 +155,7 @@
with:
key: clippy
cache-all-crates: "true"
# TODO (@Techassi): Remove this step (unmaintained action, kinda useless step anyway)

Check warning on line 158 in .github/workflows/build.yml

View workflow job for this annotation

GitHub Actions / pre-commit

158:9 [comments-indentation] comment not indented like content
- name: Run clippy action to produce annotations
uses: giraffate/clippy-action@13b9d32482f25d29ead141b79e7e04e7900281e0 # v1.0.1
env:
Expand All @@ -165,7 +165,7 @@
clippy_flags: --all-targets -- -D warnings
reporter: 'github-pr-review'
github_token: ${{ secrets.GITHUB_TOKEN }}
# TODO (@Techassi): Remove, done by pre-commit

Check warning on line 168 in .github/workflows/build.yml

View workflow job for this annotation

GitHub Actions / pre-commit

168:9 [comments-indentation] comment not indented like content
- name: Run clippy manually without annotations
env:
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
Expand Down Expand Up @@ -345,7 +345,7 @@
with:
toolchain: ${{ env.RUST_TOOLCHAIN_VERSION }}
components: rustfmt
# This step checks if the current run was triggered by a push to a pr (or a pr being created).

Check warning on line 348 in .github/workflows/build.yml

View workflow job for this annotation

GitHub Actions / pre-commit

348:9 [comments-indentation] comment not indented like content
# If this is the case it changes the version of this project in all Cargo.toml files to include the suffix
# "-pr<prnumber>" so that the published artifacts can be linked to this PR.
- uses: stackabletech/cargo-install-action@main
Expand Down Expand Up @@ -383,8 +383,8 @@
run: |
# Installing helm and yq on ubicloud-standard-8-arm only
if [ "$(arch)" = "aarch64" ]; then
curl https://baltocdn.com/helm/signing.asc | gpg --dearmor | sudo tee /usr/share/keyrings/helm.gpg > /dev/null
echo "deb [arch=$(dpkg --print-architecture) signed-by=/usr/share/keyrings/helm.gpg] https://baltocdn.com/helm/stable/debian/ all main" | sudo tee /etc/apt/sources.list.d/helm-stable-debian.list
curl -fsSL https://packages.buildkite.com/helm-linux/helm-debian/gpgkey | gpg --dearmor | sudo tee /usr/share/keyrings/helm.gpg > /dev/null
echo "deb [arch=$(dpkg --print-architecture) signed-by=/usr/share/keyrings/helm.gpg] https://packages.buildkite.com/helm-linux/helm-debian/any/ any main" | sudo tee /etc/apt/sources.list.d/helm-stable-debian.list
sudo apt-get -y update
sudo apt-get -y install helm
sudo wget https://github.com/mikefarah/yq/releases/latest/download/yq_linux_arm64 -O /usr/bin/yq && sudo chmod +x /usr/bin/yq
Expand Down
5 changes: 5 additions & 0 deletions tests/templates/kuttl/external-access/opensearch.yaml.j2
Original file line number Diff line number Diff line change
Expand Up @@ -70,6 +70,11 @@ spec:
# Disable memory mapping in this test; If memory mapping were activated, the kernel setting
# vm.max_map_count would have to be increased to 262144 on the node.
node.store.allow_mmap: "false"
# Disable the disk allocation decider in this test; Otherwise the test depends on the disk
# usage of the node and if the relative watermark set in
# `cluster.routing.allocation.disk.watermark.high` is reached then the security index could
# not be created even if enough disk space would be available.
cluster.routing.allocation.disk.threshold_enabled: "false"
plugins.security.allow_default_init_securityindex: "true"
plugins.security.ssl.transport.enabled: "true"
plugins.security.ssl.transport.pemcert_filepath: {{ test_scenario['values']['opensearch_home'] }}/config/tls/tls.crt
Expand Down
5 changes: 5 additions & 0 deletions tests/templates/kuttl/ldap/21-install-opensearch.yaml.j2
Original file line number Diff line number Diff line change
Expand Up @@ -27,6 +27,11 @@ spec:
# Disable memory mapping in this test; If memory mapping were activated, the kernel setting
# vm.max_map_count would have to be increased to 262144 on the node.
node.store.allow_mmap: "false"
# Disable the disk allocation decider in this test; Otherwise the test depends on the disk
# usage of the node and if the relative watermark set in
# `cluster.routing.allocation.disk.watermark.high` is reached then the security index could
# not be created even if enough disk space would be available.
cluster.routing.allocation.disk.threshold_enabled: "false"
plugins.security.allow_default_init_securityindex: "true"
plugins.security.ssl.transport.enabled: "true"
plugins.security.ssl.transport.pemcert_filepath: {{ test_scenario['values']['opensearch_home'] }}/config/tls/tls.crt
Expand Down
5 changes: 5 additions & 0 deletions tests/templates/kuttl/metrics/20-install-opensearch.yaml.j2
Original file line number Diff line number Diff line change
Expand Up @@ -29,6 +29,11 @@ spec:
# Disable memory mapping in this test; If memory mapping were activated, the kernel setting
# vm.max_map_count would have to be increased to 262144 on the node.
node.store.allow_mmap: "false"
# Disable the disk allocation decider in this test; Otherwise the test depends on the disk
# usage of the node and if the relative watermark set in
# `cluster.routing.allocation.disk.watermark.high` is reached then the security index could
# not be created even if enough disk space would be available.
cluster.routing.allocation.disk.threshold_enabled: "false"
plugins.security.allow_default_init_securityindex: "true"
plugins.security.ssl.transport.enabled: "true"
plugins.security.ssl.transport.pemcert_filepath: {{ test_scenario['values']['opensearch_home'] }}/config/tls/tls.crt
Expand Down
2 changes: 2 additions & 0 deletions tests/templates/kuttl/smoke/10-assert.yaml.j2
Original file line number Diff line number Diff line change
Expand Up @@ -399,6 +399,7 @@ metadata:
data:
opensearch.yml: |-
cluster.name: "opensearch"
cluster.routing.allocation.disk.threshold_enabled: "false"
discovery.type: "zen"
network.host: "0.0.0.0"
node.store.allow_mmap: "false"
Expand Down Expand Up @@ -433,6 +434,7 @@ metadata:
data:
opensearch.yml: |-
cluster.name: "opensearch"
cluster.routing.allocation.disk.threshold_enabled: "false"
discovery.type: "zen"
network.host: "0.0.0.0"
node.store.allow_mmap: "false"
Expand Down
5 changes: 5 additions & 0 deletions tests/templates/kuttl/smoke/10-install-opensearch.yaml.j2
Original file line number Diff line number Diff line change
Expand Up @@ -65,6 +65,11 @@ spec:
# Disable memory mapping in this test; If memory mapping were activated, the kernel setting
# vm.max_map_count would have to be increased to 262144 on the node.
node.store.allow_mmap: "false"
# Disable the disk allocation decider in this test; Otherwise the test depends on the disk
# usage of the node and if the relative watermark set in
# `cluster.routing.allocation.disk.watermark.high` is reached then the security index could
# not be created even if enough disk space would be available.
cluster.routing.allocation.disk.threshold_enabled: "false"
plugins.security.allow_default_init_securityindex: "true"
plugins.security.ssl.transport.enabled: "true"
plugins.security.ssl.transport.pemcert_filepath: {{ test_scenario['values']['opensearch_home'] }}/config/tls/tls.crt
Expand Down
Loading