-
Notifications
You must be signed in to change notification settings - Fork 176
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[8.0] feat: SingularityCE: looking for the platform-aware image in CVMFS lo… #7589
base: rel-v8r0
Are you sure you want to change the base?
Conversation
2fc2b4f
to
ff5bdd0
Compare
@@ -0,0 +1,84 @@ | |||
""" Starts a DIRAC command inside an apptainer container. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This is a great idea!
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I pushed this the other day but have yet to do a single test with it.
Anyway, a use case for this is clearly running, from the pilot, the dirac-platfom
(dirac-architecture
) script.
c2fc3c2
to
29b5e71
Compare
3017a3b
to
0607a20
Compare
0607a20
to
7743c8a
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This still contains the LHCb specific stuff?
79acb75
to
9ddc28f
Compare
To summarise some of the thingsI just said in person:
I really think the layout should just be:
Then installations can do whatever they want with For the It's then nice and simple, there are just two options for
Then the question is what the default image for vanilla DIRAC should be... |
9ddc28f
to
6475951
Compare
I pushed (just before your comment) something close to what you are suggesting. |
|
||
def getEnv(): | ||
"""Gets the environment for use within the container. | ||
We blank almost everything to prevent contamination from the host system. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I'm struggling to reconcile the docstring with the implementation...it doesn't clear anything at the moment?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This was just a copy-paste. I will fix it once I can test this script.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I'm pretty sure we should clean the environment and apply the allow list that is in SingularityCE.
src/DIRAC/Core/Utilities/Os.py
Outdated
return None | ||
|
||
CVMFS_locations = DIRAC.gConfig.getValue( | ||
"LocalSite/CVMFS_locations", Operations().getValue("Pilot/CVMFS_locations", []) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
What is the point of CVMFS_locations
here?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
These locations can be VO dependant.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
How is that helpful in this context?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
A VO might want to /cvmfs/unpacked.cern.ch
and another cvmfs/dirac.egi.eu
, and so on...
In any case there is always a default.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
But continer_root
will basically never make sense on another CVMFS location...
Even if it did, it would be really weird for a VO to set up something different at the same path to try and change the behavior.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Ping @fstagni
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
container_root
IMHO should make sense on any CVMFS location.
c3c0635
to
6b517e7
Compare
6b517e7
to
b82fb28
Compare
b82fb28
to
9fc4830
Compare
…cation
15th Jul Converted to draft, waiting if https://mattermost.web.cern.ch/cernvm/pl/djgirmur8tn33rkpu3px8dm6ao is implemented (multi-arch images)
BEGINRELEASENOTES
*Resources
CHANGE: SingularityCE can find at runtime which image to use, based on the local platform
ENDRELEASENOTES