Releases: eth-cscs/firecrest
FirecREST version 1.8.1
- Storage
- support for private and public object storage URLs
- Compute
- added SLURM
account
optional parameter for job submission
- added SLURM
- API
- fixed
tasks
specification for all possible outputs
- fixed
- Tracing
- added
jaeger
plugin in Kong and microservices
- added
FirecREST version 1.7.7
In this release:
- sanitize user input used for cluster commands
- ssh wrapper: include cat and touch for timeout
FirecREST version 1.7.6
In this release:
- fix log on successful utilities/download calls
- add specific timeout for Reservations
FirecREST version 1.7.5
In this release
- API
- Added check for token validation in all SWIFT Object Storage API calls for
storage/xfer-external/upload
- Demo environment
- Updated SLURM version to
20.11.4
- Updated
rsvmgnt
tool to match with new SLURM version - Updated tests over
reservation
API
- Updated SLURM version to
FirecREST version 1.7.4
In this release:
- Includes SLURM spank plugin selection in
compute
microservice API:- Used as a customized and optional option to run SLURM jobs with
sbatch
(ie:sbatch --spank-plugin-option job.sh
) - Environment variable
F7T_USE_SPANK_PLUGIN
is a list of boolean values. The position of each value corresponds with the position inF7T_SYSTEMS_PUBLIC
var.True
means that the plugin is activated in that system. - Added env var
F7T_SPANK_PLUGIN_OPTION
in which the value of the spank plugin is set (by default--nohome
) --nohome
plugin is already installed indemo
cluster, it prevents$HOME
to be mounted when usingPOST compute/jobs/*
endpoints, thus if FirecREST is used with a service account cluster user, some external user might inject SSH public keys and access the cluster via SSH with private/public key pairs.
- Used as a customized and optional option to run SLURM jobs with
FirecREST version 1.7.3
This release fixes an issue when storage/xfer-external/download
was executed and the targetPath
file was uploaded from server filesystem to the staging area using curl
command. This command wrote the stderr
buffer with the same information that in stdout
and FirecREST was catching it as an error.
Now curl
is executed with --silent --show-error
options so no output is written on stderr
buffer unless there's an error.
FirecREST version 1.7.2
In this version, the following issues are fixed
storage
API- New OIDC Keystone authentication method for SWIFT object storage
- Also it continues accepting SAML authentication
FirecREST version 1.7.1
In this version, the following issues are fixed
compute
API- Fixed issue in
scontrol
command for new version of SLURM (v20.11.4
) when usingPOST compute/jobs
API
- Fixed issue in
storage
API- SWIFT objects now are deleted by using
X-Delete-At
instead ofX-Delete-After
UTILITIES
system is used to check files or directories to be operated withPOST storage/xfer-internal
API.
- SWIFT objects now are deleted by using
- General
boolean
environment variables now accept values such asyes
,1
orTRUE
- Dependencies
- Cryptography package was updated from
2.8
to3.4.6
- Cryptography package was updated from
FirecREST version 1.7.0
New features
reservations
API
firecrest_url/reservations
Allows to reserve SLURM nodes for a particular SLURM account by interfacing with rsvmgmt
command on a specific system.
PyFirecREST
- Added
pyfirecrest
submodule to be used as a Pyhton3 client to use FirecREST
SSL encryption
HTTPS can be set (optionally) to all microservices requests
Updates
Demo cluster
- Now SSH log and filter script uses
logger
command andrsyslog
rsvmgmt
tool installed
Compute
- reformatted output of
DELETE compute/jobs/
in order to avoidscancel
standard error output - fixed
targetPath
check inPOST compute/jobs/upload
call
storage
API
- on
/storage/xfer-internal
now it checks whether the file or directoy is available in target systems before executing the sbatch job. - removed
wget
command and replaced bycurl
commands - output of
tasks
microservice whenstorage/xfer-external/upload
is called is formatted in a way that fields can be easily parsed to arequests
library
CI/CD pipeline
- New CI/CD pipeline for
dev
(calls directly passes to the microservice with a specific OIDC token) andpre-prod
(using a demo OIDC Keycloak server and a demo gateway) - Added more tests (specially for
reservations
microservice)