diff --git a/.drone.yml b/.drone.yml index 83c6d0e744a9..ba582d576b80 100644 --- a/.drone.yml +++ b/.drone.yml @@ -1,205 +1,14 @@ --- kind: pipeline -name: amd64 +name: riscv64 platform: os: linux arch: amd64 -trigger: - event: - exclude: - - cron - -clone: - retries: 3 - -steps: -- name: skipfiles - image: plugins/git - commands: - - export NAME=$(test $DRONE_BUILD_EVENT = pull_request && echo remotes/origin/${DRONE_COMMIT_BRANCH:-master} || echo ${DRONE_COMMIT_SHA}~) - - export DIFF=$(git --no-pager diff --name-only $NAME | grep -v -f .droneignore); - - if [ -z "$DIFF" ]; then - echo "All files in PR are on ignore list"; - exit 78; - else - echo "Some files in PR are not ignored, $DIFF"; - fi; - when: - event: - - pull_request - -- name: build - image: rancher/dapper:v0.5.0 - secrets: [ AWS_SECRET_ACCESS_KEY-k3s-ci-uploader, AWS_ACCESS_KEY_ID-k3s-ci-uploader, unprivileged_github_token ] - environment: - GITHUB_TOKEN: - from_secret: unprivileged_github_token - AWS_SECRET_ACCESS_KEY: - from_secret: AWS_SECRET_ACCESS_KEY-k3s-ci-uploader - AWS_ACCESS_KEY_ID: - from_secret: AWS_ACCESS_KEY_ID-k3s-ci-uploader - commands: - - dapper ci - - echo "${DRONE_TAG}-amd64" | sed -e 's/+/-/g' >.tags - volumes: - - name: docker - path: /var/run/docker.sock - -- name: validate-cross-compilation - image: rancher/dapper:v0.5.0 - commands: - - dapper validate-cross-compilation - volumes: - - name: docker - path: /var/run/docker.sock - -- name: fossa - image: rancher/drone-fossa:latest - failure: ignore - settings: - api_key: - from_secret: FOSSA_API_KEY - when: - instance: - - drone-publish.k3s.io - ref: - include: - - "refs/heads/master" - - "refs/heads/release-*" - event: - - push - - tag - -- name: github_binary_release - image: ibuildthecloud/github-release:v0.0.1 - settings: - api_key: - from_secret: github_token - prerelease: true - checksum: - - sha256 - checksum_file: CHECKSUMsum-amd64.txt - checksum_flatten: true - files: - - "dist/artifacts/*" - when: - instance: - - drone-publish.k3s.io - ref: - - refs/head/master - - refs/tags/* - event: - - tag - -- name: docker-publish - image: plugins/docker - settings: - dockerfile: package/Dockerfile - password: - from_secret: docker_password - repo: "rancher/k3s" - username: - from_secret: docker_username - when: - instance: - - drone-publish.k3s.io - ref: - - refs/head/master - - refs/tags/* - event: - - tag - -- name: test - image: rancher/dapper:v0.5.0 - secrets: [ AWS_SECRET_ACCESS_KEY-k3s-ci-uploader, AWS_ACCESS_KEY_ID-k3s-ci-uploader ] - environment: - ENABLE_REGISTRY: 'true' - AWS_SECRET_ACCESS_KEY: - from_secret: AWS_SECRET_ACCESS_KEY-k3s-ci-uploader - AWS_ACCESS_KEY_ID: - from_secret: AWS_ACCESS_KEY_ID-k3s-ci-uploader - commands: - - docker build --target test-k3s -t k3s:test-${DRONE_STAGE_ARCH}-${DRONE_COMMIT} -f Dockerfile.test . - - > - docker run -i -e REPO -e TAG -e DRONE_TAG -e DRONE_BUILD_EVENT -e IMAGE_NAME -e AWS_SECRET_ACCESS_KEY -e AWS_ACCESS_KEY_ID -e SONOBUOY_VERSION -e ENABLE_REGISTRY - -v /var/run/docker.sock:/var/run/docker.sock --privileged --network host -v /tmp:/tmp k3s:test-${DRONE_STAGE_ARCH}-${DRONE_COMMIT} - volumes: - - name: docker - path: /var/run/docker.sock - -- name: github_e2e_logs_release - image: ibuildthecloud/github-release:v0.0.1 - settings: - api_key: - from_secret: github_token - prerelease: true - files: - - "dist/artifacts/e2e-*.log" - when: - instance: - - drone-publish.k3s.io - ref: - - refs/head/master - - refs/tags/* - event: - - tag - -volumes: -- name: docker - host: - path: /var/run/docker.sock - ---- -kind: pipeline -name: conformance - -platform: - os: linux - arch: amd64 - -trigger: - event: - - cron - cron: - - nightly - -steps: -- name: build - image: rancher/dapper:v0.5.0 - commands: - - dapper ci - - echo "${DRONE_TAG}-amd64" | sed -e 's/+/-/g' >.tags - volumes: - - name: docker - path: /var/run/docker.sock - -- name: test - image: rancher/dapper:v0.5.0 - environment: - ENABLE_REGISTRY: 'true' - commands: - - docker build --target test-k3s -t k3s:test-${DRONE_STAGE_ARCH}-${DRONE_COMMIT} -f Dockerfile.test . - - > - docker run -i -e REPO -e TAG -e DRONE_TAG -e DRONE_BUILD_EVENT -e IMAGE_NAME -e SONOBUOY_VERSION -e ENABLE_REGISTRY - -v /var/run/docker.sock:/var/run/docker.sock --privileged --network host -v /tmp:/tmp k3s:test-${DRONE_STAGE_ARCH}-${DRONE_COMMIT} - volumes: - - name: docker - path: /var/run/docker.sock - -volumes: -- name: docker - host: - path: /var/run/docker.sock - ---- -kind: pipeline -name: arm64 - -platform: - os: linux - arch: arm64 +# Hack needed for riscv64: https://gist.github.com/colstrom/c2f359f72658aaabb44150ac20b16d7c#gistcomment-3858388 +node: + arch: riscv64 trigger: event: @@ -226,7 +35,7 @@ steps: - pull_request - name: build - image: rancher/dapper:v0.5.0 + image: rancher/dapper:v0.6.0 secrets: [ AWS_SECRET_ACCESS_KEY-k3s-ci-uploader, AWS_ACCESS_KEY_ID-k3s-ci-uploader ] environment: AWS_SECRET_ACCESS_KEY: @@ -235,20 +44,20 @@ steps: from_secret: AWS_ACCESS_KEY_ID-k3s-ci-uploader commands: - dapper ci - - echo "${DRONE_TAG}-arm64" | sed -e 's/+/-/g' >.tags + - echo "${DRONE_TAG}-riscv64" | sed -e 's/+/-/g' >.tags volumes: - name: docker path: /var/run/docker.sock - name: github_binary_release - image: ibuildthecloud/github-release:v0.0.1 + image: plugins/github-release settings: api_key: from_secret: github_token prerelease: true checksum: - sha256 - checksum_file: CHECKSUMsum-arm64.txt + checksum_file: CHECKSUMsum-riscv64.txt checksum_flatten: true files: - "dist/artifacts/*" @@ -280,7 +89,7 @@ steps: - tag - name: test - image: rancher/dapper:v0.5.0 + image: rancher/dapper:v0.6.0 secrets: [ AWS_SECRET_ACCESS_KEY-k3s-ci-uploader, AWS_ACCESS_KEY_ID-k3s-ci-uploader ] environment: ENABLE_REGISTRY: 'true' @@ -301,534 +110,3 @@ volumes: - name: docker host: path: /var/run/docker.sock - ---- -kind: pipeline -name: arm - -platform: - os: linux - arch: arm - -trigger: - event: - exclude: - - cron - -clone: - retries: 3 - -steps: -- name: skipfiles - image: plugins/git - commands: - - export NAME=$(test $DRONE_BUILD_EVENT = pull_request && echo remotes/origin/${DRONE_COMMIT_BRANCH:-master} || echo ${DRONE_COMMIT_SHA}~) - - export DIFF=$(git --no-pager diff --name-only $NAME | grep -v -f .droneignore); - - if [ -z "$DIFF" ]; then - echo "All files in PR are on ignore list"; - exit 78; - else - echo "Some files in PR are not ignored, $DIFF"; - fi; - when: - event: - - pull_request - -- name: build - image: rancher/dapper:v0.5.0 - secrets: [ AWS_SECRET_ACCESS_KEY-k3s-ci-uploader, AWS_ACCESS_KEY_ID-k3s-ci-uploader ] - environment: - AWS_SECRET_ACCESS_KEY: - from_secret: AWS_SECRET_ACCESS_KEY-k3s-ci-uploader - AWS_ACCESS_KEY_ID: - from_secret: AWS_ACCESS_KEY_ID-k3s-ci-uploader - commands: - - dapper ci - - echo "${DRONE_TAG}-arm" | sed -e 's/+/-/g' >.tags - volumes: - - name: docker - path: /var/run/docker.sock - -- name: github_binary_release - image: ibuildthecloud/github-release:v0.0.1 - settings: - api_key: - from_secret: github_token - prerelease: true - checksum: - - sha256 - checksum_file: CHECKSUMsum-arm.txt - checksum_flatten: true - files: - - "dist/artifacts/*" - when: - instance: - - drone-publish.k3s.io - ref: - - refs/head/master - - refs/tags/* - event: - - tag - -- name: docker-publish - image: plugins/docker:linux-arm - settings: - dockerfile: package/Dockerfile - password: - from_secret: docker_password - repo: "rancher/k3s" - username: - from_secret: docker_username - when: - instance: - - drone-publish.k3s.io - ref: - - refs/head/master - - refs/tags/* - event: - - tag - -- name: test - image: rancher/dapper:v0.5.0 - secrets: [ AWS_SECRET_ACCESS_KEY-k3s-ci-uploader, AWS_ACCESS_KEY_ID-k3s-ci-uploader ] - environment: - ENABLE_REGISTRY: 'true' - AWS_SECRET_ACCESS_KEY: - from_secret: AWS_SECRET_ACCESS_KEY-k3s-ci-uploader - AWS_ACCESS_KEY_ID: - from_secret: AWS_ACCESS_KEY_ID-k3s-ci-uploader - commands: - - docker build --target test-k3s -t k3s:test-${DRONE_STAGE_ARCH}-${DRONE_COMMIT} -f Dockerfile.test . - - > - docker run -i -e REPO -e TAG -e DRONE_TAG -e DRONE_BUILD_EVENT -e IMAGE_NAME -e AWS_SECRET_ACCESS_KEY -e AWS_ACCESS_KEY_ID -e SONOBUOY_VERSION -e ENABLE_REGISTRY - -v /var/run/docker.sock:/var/run/docker.sock --privileged --network host -v /tmp:/tmp k3s:test-${DRONE_STAGE_ARCH}-${DRONE_COMMIT} - volumes: - - name: docker - path: /var/run/docker.sock - -volumes: -- name: docker - host: - path: /var/run/docker.sock - ---- -kind: pipeline -name: s390x - -platform: - os: linux - arch: amd64 - -# Hack needed for s390x: https://gist.github.com/colstrom/c2f359f72658aaabb44150ac20b16d7c#gistcomment-3858388 -node: - arch: s390x - -trigger: - event: - exclude: - - cron - -clone: - disable: true - -steps: -- name: clone - image: alpine/git:v2.30.2-s390x - commands: - - git clone $DRONE_GIT_HTTP_URL . - - git fetch origin $DRONE_COMMIT_REF - - git checkout $DRONE_COMMIT -b origin/$DRONE_TARGET_BRANCH - retry: - max: 3 - delay: 5s - - -- name: skipfiles - image: alpine/git:v2.30.2-s390x - commands: - - export NAME=$(test $DRONE_BUILD_EVENT = pull_request && echo remotes/origin/${DRONE_COMMIT_BRANCH:-master} || echo ${DRONE_COMMIT_SHA}~) - - export DIFF=$(git --no-pager diff --name-only $NAME | grep -v -f .droneignore); - - if [ -z "$DIFF" ]; then - echo "All files in PR are on ignore list"; - exit 78; - else - echo "Some files in PR are not ignored, $DIFF"; - fi; - when: - event: - - pull_request - -- name: build - image: rancher/dapper:v0.5.8 - secrets: [ AWS_SECRET_ACCESS_KEY-k3s-ci-uploader, AWS_ACCESS_KEY_ID-k3s-ci-uploader ] - environment: - AWS_SECRET_ACCESS_KEY: - from_secret: AWS_SECRET_ACCESS_KEY-k3s-ci-uploader - AWS_ACCESS_KEY_ID: - from_secret: AWS_ACCESS_KEY_ID-k3s-ci-uploader - commands: - - dapper ci - - echo "${DRONE_TAG}-s390x" | sed -e 's/+/-/g' >.tags - volumes: - - name: docker - path: /var/run/docker.sock - -- name: github_binary_release - image: rancher/drone-images:github-release-s390x - settings: - api_key: - from_secret: github_token - prerelease: true - checksum: - - sha256 - checksum_file: CHECKSUMsum-s390x.txt - checksum_flatten: true - files: - - "dist/artifacts/*" - when: - instance: - - drone-publish.k3s.io - ref: - - refs/head/master - - refs/tags/* - event: - - tag - -- name: docker-publish - image: rancher/drone-images:docker-s390x - volumes: - - name: docker - path: /var/run/docker.sock - settings: - dockerfile: package/Dockerfile - password: - from_secret: docker_password - repo: "rancher/k3s" - username: - from_secret: docker_username - when: - instance: - - drone-publish.k3s.io - ref: - - refs/head/master - - refs/tags/* - event: - - tag - -- name: test - image: rancher/dapper:v0.5.8 - secrets: [ AWS_SECRET_ACCESS_KEY-k3s-ci-uploader, AWS_ACCESS_KEY_ID-k3s-ci-uploader ] - environment: - ENABLE_REGISTRY: 'true' - AWS_SECRET_ACCESS_KEY: - from_secret: AWS_SECRET_ACCESS_KEY-k3s-ci-uploader - AWS_ACCESS_KEY_ID: - from_secret: AWS_ACCESS_KEY_ID-k3s-ci-uploader - commands: - # we hardcode s390x as the arch because DRONE_STAGE_ARCH is set to amd64 - - docker build --target test-k3s -t k3s:test-s390x-${DRONE_COMMIT} -f Dockerfile.test . - - > - docker run -i -e REPO -e TAG -e DRONE_TAG -e DRONE_BUILD_EVENT -e IMAGE_NAME -e AWS_SECRET_ACCESS_KEY -e AWS_ACCESS_KEY_ID -e SONOBUOY_VERSION -e ENABLE_REGISTRY - -v /var/run/docker.sock:/var/run/docker.sock --privileged --network host -v /tmp:/tmp k3s:test-s390x-${DRONE_COMMIT} - volumes: - - name: docker - path: /var/run/docker.sock - -volumes: -- name: docker - host: - path: /var/run/docker.sock - ---- -kind: pipeline -name: validate_go_mods - -platform: - os: linux - arch: amd64 - -trigger: - event: - exclude: - - cron - -steps: -- name: skipfiles - image: plugins/git - commands: - - export NAME=$(test $DRONE_BUILD_EVENT = pull_request && echo remotes/origin/${DRONE_COMMIT_BRANCH:-master} || echo ${DRONE_COMMIT_SHA}~) - - export DIFF=$(git --no-pager diff --name-only $NAME | grep -v -f .droneignore); - - if [ -z "$DIFF" ]; then - echo "All files in PR are on ignore list"; - exit 78; - else - echo "Some files in PR are not ignored, $DIFF"; - fi; - when: - event: - - push - - pull_request - -- name: validate_go_mods - image: rancher/dapper:v0.5.0 - commands: - - docker build --target test-mods -t k3s:mod -f Dockerfile.test . - - docker run -i k3s:mod - - volumes: - - name: docker - path: /var/run/docker.sock - -volumes: -- name: docker - host: - path: /var/run/docker.sock - ---- -kind: pipeline -name: manifest - -platform: - os: linux - arch: amd64 - -steps: -- name: skipfiles - image: plugins/git - commands: - - export NAME=$(test $DRONE_BUILD_EVENT = pull_request && echo remotes/origin/${DRONE_COMMIT_BRANCH:-master} || echo ${DRONE_COMMIT_SHA}~) - - export DIFF=$(git --no-pager diff --name-only $NAME | grep -v -f .droneignore); - - if [ -z "$DIFF" ]; then - echo "All files in PR are on ignore list"; - exit 78; - else - echo "Some files in PR are not ignored, $DIFF"; - fi; - when: - event: - - push - - pull_request - -- name: manifest - image: plugins/docker - environment: - DOCKER_USERNAME: - from_secret: docker_username - DOCKER_PASSWORD: - from_secret: docker_password - settings: - dry_run: true - dockerfile: Dockerfile.manifest - repo: "rancher/k3s-manifest" - build_args_from_env: - - DOCKER_USERNAME - - DOCKER_PASSWORD - - DRONE_TAG - -trigger: - instance: - - drone-publish.k3s.io - ref: - - refs/head/master - - refs/tags/* - event: - include: - - tag - exclude: - - cron - -depends_on: -- amd64 -- arm64 -- s390x -- arm - ---- -kind: pipeline -name: dispatch - -platform: - os: linux - arch: amd64 - -clone: - retries: 3 - -steps: -- name: skipfiles - image: plugins/git - commands: - - export NAME=$(test $DRONE_BUILD_EVENT = pull_request && echo remotes/origin/${DRONE_COMMIT_BRANCH:-master} || echo ${DRONE_COMMIT_SHA}~) - - export DIFF=$(git --no-pager diff --name-only $NAME | grep -v -f .droneignore); - - if [ -z "$DIFF" ]; then - echo "All files in PR are on ignore list"; - exit 78; - else - echo "Some files in PR are not ignored, $DIFF"; - fi; - when: - event: - - push - - pull_request - -- name: dispatch - image: curlimages/curl:7.74.0 - secrets: [ pat_username, github_token, release_token_k3s ] - user: root - environment: - PAT_USERNAME: - from_secret: pat_username - PAT_TOKEN: - from_secret: github_token - K3S_RELEASE_TOKEN: - from_secret: release_token_k3s - commands: - - apk -U --no-cache add bash - - scripts/dispatch - -trigger: - instance: - - drone-publish.k3s.io - ref: - - refs/head/master - - refs/tags/* - event: - - tag - -depends_on: -- manifest - ---- -kind: pipeline -name: e2e -type: docker - -platform: - os: linux - arch: amd64 - -clone: - retries: 3 - -depends_on: -- amd64 - -steps: -- name: skipfiles - image: plugins/git - commands: - - export NAME=$(test $DRONE_BUILD_EVENT = pull_request && echo remotes/origin/${DRONE_COMMIT_BRANCH:-master} || echo ${DRONE_COMMIT_SHA}~) - - export DIFF=$(git --no-pager diff --name-only $NAME | grep -v -f .droneignore); - - if [ -z "$DIFF" ]; then - echo "All files in PR are on ignore list"; - exit 78; - else - echo "Some files in PR are not ignored, $DIFF"; - fi; - when: - event: - - push - - pull_request - -- name: build-e2e-image - image: rancher/dapper:v0.5.0 - commands: - - DOCKER_BUILDKIT=1 docker build --target test-e2e -t test-e2e -f Dockerfile.test . - - SKIP_VALIDATE=true SKIP_AIRGAP=true GOCOVER=1 dapper ci - - cp dist/artifacts/* /tmp/artifacts/ - volumes: - - name: cache - path: /tmp/artifacts - - name: docker - path: /var/run/docker.sock - -- name: test-e2e - image: test-e2e - pull: never - resources: - cpu: 6000 - memory: 10Gi - environment: - E2E_REGISTRY: 'true' - E2E_GOCOVER: 'true' - commands: - - mkdir -p dist/artifacts - - cp /tmp/artifacts/* dist/artifacts/ - - docker stop registry && docker rm registry - # Cleanup VMs running, happens if a previous test panics - # Cleanup inactive domains, happens if previous test is canceled - - | - VMS=$(virsh list --name | grep '_server-\|_agent-' || true) - if [ -n "$VMS" ]; then - for vm in $VMS - do - virsh destroy $vm - virsh undefine $vm --remove-all-storage - done - fi - VMS=$(virsh list --name --inactive | grep '_server-\|_agent-' || true) - if [ -n "$VMS" ]; then - for vm in $VMS - do - virsh undefine $vm - done - fi - - docker run -d -p 5000:5000 -e REGISTRY_PROXY_REMOTEURL=https://registry-1.docker.io --name registry registry:2 - - cd tests/e2e/validatecluster - - vagrant destroy -f - - go test -v -timeout=45m ./validatecluster_test.go -ci -local - - cp ./coverage.out /tmp/artifacts/validate-coverage.out - - cd ../secretsencryption - - vagrant destroy -f - - go test -v -timeout=30m ./secretsencryption_test.go -ci -local - - cp ./coverage.out /tmp/artifacts/se-coverage.out - - cd ../startup - - vagrant destroy -f - - go test -v -timeout=30m ./startup_test.go -ci -local - - cp ./coverage.out /tmp/artifacts/startup-coverage.out - - | - if [ "$DRONE_BUILD_EVENT" = "pull_request" ]; then - cd ../upgradecluster - vagrant destroy -f - E2E_RELEASE_CHANNEL="latest" go test -v -timeout=45m ./upgradecluster_test.go -ci -local - cp ./coverage.out /tmp/artifacts/upgrade-coverage.out - fi - - docker stop registry && docker rm registry - - volumes: - - name: libvirt - path: /var/run/libvirt/ - - name: docker - path: /var/run/docker.sock - - name: cache - path: /tmp/artifacts - -- name: upload to codecov - image: robertstettner/drone-codecov - settings: - token: - from_secret: codecov_token - files: - - /tmp/artifacts/validate-coverage.out - - /tmp/artifacts/se-coverage.out - - /tmp/artifacts/startup-coverage.out - - /tmp/artifacts/upgrade-coverage.out - flags: - - e2etests - when: - event: - - pull_request - - volumes: - - name: cache - path: /tmp/artifacts - -volumes: -- name: docker - host: - path: /var/run/docker.sock -- name: libvirt - host: - path: /var/run/libvirt/ -- name: cache - temp: {} diff --git a/Dockerfile.dapper b/Dockerfile.dapper index 871f49e05d46..eaccfc8f44d5 100644 --- a/Dockerfile.dapper +++ b/Dockerfile.dapper @@ -11,16 +11,17 @@ ENV no_proxy=$no_proxy RUN apk -U --no-cache add bash git gcc musl-dev docker vim less file curl wget ca-certificates jq linux-headers \ zlib-dev tar zip squashfs-tools npm coreutils python3 py3-pip openssl-dev libffi-dev libseccomp libseccomp-dev \ libseccomp-static make libuv-static sqlite-dev sqlite-static libselinux libselinux-dev zlib-dev zlib-static \ - zstd pigz alpine-sdk binutils-gold btrfs-progs-dev btrfs-progs-static gawk yq \ - && \ - if [ "$(go env GOARCH)" = "amd64" ]; then \ + zstd pigz alpine-sdk btrfs-progs-dev btrfs-progs-static gawk yq && \ + if [ "$(go env GOARCH)" = "arm64" ] || [ "$(go env GOARCH)" = "arm" ]; then \ + apk -U --no-cache add binutils-gold; \ + elif [ "$(go env GOARCH)" = "amd64" ]; then \ apk -U --no-cache add mingw-w64-gcc; \ fi -RUN python3 -m pip install awscli +RUN python3 -m pip install --break-system-packages awscli RUN TRIVY_VERSION="0.46.1" && \ - if [ "$(go env GOARCH)" != "arm" ] && [ "$(go env GOARCH)" != "386" ]; then \ + if [ "$(go env GOARCH)" != "arm" ] && [ "$(go env GOARCH)" != "riscv64" ]; then \ if [ "$(go env GOARCH)" = "arm64" ]; then \ # Turn arm64 into uppercase ARM64 for Trivy's download TRIVY_ARCH=$(go env GOARCH | tr "[:lower:]" "[:upper:]") && \ diff --git a/Dockerfile.local b/Dockerfile.local index 0be842549c19..2cea09510b87 100644 --- a/Dockerfile.local +++ b/Dockerfile.local @@ -17,7 +17,7 @@ RUN apk -U --no-cache add bash git gcc musl-dev docker vim less file curl wget c apk -U --no-cache add mingw-w64-gcc; \ fi -RUN python3 -m pip install awscli +RUN python3 -m pip install --break-system-packages awscli # this works for both go 1.17 and 1.18 RUN GOPROXY=direct go install golang.org/x/tools/cmd/goimports@gopls/v0.11.0 diff --git a/Dockerfile.test b/Dockerfile.test index 19485f0017f0..c6bade7a8d56 100644 --- a/Dockerfile.test +++ b/Dockerfile.test @@ -16,7 +16,7 @@ FROM test-base as test-k3s RUN apk -U --no-cache add git gcc musl-dev docker curl coreutils python3 openssl py3-pip procps findutils -RUN python3 -m pip install awscli +RUN python3 -m pip install --break-system-packages awscli ENV SONOBUOY_VERSION 0.57.0 diff --git a/go.mod b/go.mod index b30c638166b3..63038c5ae1f3 100644 --- a/go.mod +++ b/go.mod @@ -42,9 +42,9 @@ replace ( go.opentelemetry.io/otel/sdk => go.opentelemetry.io/otel/sdk v1.13.0 go.opentelemetry.io/otel/trace => go.opentelemetry.io/otel/trace v1.13.0 go.opentelemetry.io/proto/otlp => go.opentelemetry.io/proto/otlp v0.19.0 - golang.org/x/crypto => golang.org/x/crypto v0.1.0 - golang.org/x/net => golang.org/x/net v0.17.0 - golang.org/x/sys => golang.org/x/sys v0.6.0 + golang.org/x/crypto => golang.org/x/crypto v0.15.0 + golang.org/x/net => golang.org/x/net v0.18.0 + golang.org/x/sys => golang.org/x/sys v0.14.0 google.golang.org/genproto => google.golang.org/genproto v0.0.0-20230525234035-dd9d682886f9 google.golang.org/grpc => google.golang.org/grpc v1.58.3 gopkg.in/square/go-jose.v2 => gopkg.in/square/go-jose.v2 v2.6.0 @@ -142,10 +142,10 @@ require ( go.etcd.io/etcd/etcdutl/v3 v3.5.9 go.etcd.io/etcd/server/v3 v3.5.9 go.uber.org/zap v1.24.0 - golang.org/x/crypto v0.14.0 + golang.org/x/crypto v0.15.0 golang.org/x/net v0.17.0 golang.org/x/sync v0.3.0 - golang.org/x/sys v0.13.0 + golang.org/x/sys v0.14.0 google.golang.org/grpc v1.57.0 gopkg.in/yaml.v2 v2.4.0 inet.af/tcpproxy v0.0.0-20200125044825-b6bb9b5b8252 @@ -386,8 +386,8 @@ require ( golang.org/x/exp v0.0.0-20230307190834-24139beb5833 // indirect golang.org/x/mod v0.11.0 // indirect golang.org/x/oauth2 v0.11.0 // indirect - golang.org/x/term v0.13.0 // indirect - golang.org/x/text v0.13.0 // indirect + golang.org/x/term v0.14.0 // indirect + golang.org/x/text v0.14.0 // indirect golang.org/x/time v0.3.0 // indirect golang.org/x/tools v0.10.0 // indirect golang.zx2c4.com/wireguard v0.0.0-20230325221338-052af4a8072b // indirect diff --git a/go.sum b/go.sum index ff4cc0b10b34..a2a3251a6b81 100644 --- a/go.sum +++ b/go.sum @@ -1516,8 +1516,8 @@ go.uber.org/zap v1.17.0/go.mod h1:MXVU+bhUf/A7Xi2HNOnopQOrmycQ5Ih87HtOu4q5SSo= go.uber.org/zap v1.19.0/go.mod h1:xg/QME4nWcxGxrpdeYfq7UvYrLh66cuVKdrbD1XF/NI= go.uber.org/zap v1.24.0 h1:FiJd5l1UOLj0wCgbSE0rwwXHzEdAZS6hiiSnxJN/D60= go.uber.org/zap v1.24.0/go.mod h1:2kMP+WWQ8aoFoedH3T2sq6iJ2yDWpHbP0f6MQbS9Gkg= -golang.org/x/crypto v0.1.0 h1:MDRAIl0xIo9Io2xV565hzXHw3zVseKrJKodhohM5CjU= -golang.org/x/crypto v0.1.0/go.mod h1:RecgLatLF4+eUMCP1PoPZQb+cVrJcOPbHkTkbkB9sbw= +golang.org/x/crypto v0.15.0 h1:frVn1TEaCEaZcn3Tmd7Y2b5KKPaZ+I32Q2OA3kYp5TA= +golang.org/x/crypto v0.15.0/go.mod h1:4ChreQoLWfG3xLDer1WdlH5NdlQ3+mwnQq1YTKY+72g= golang.org/x/exp v0.0.0-20180321215751-8460e604b9de/go.mod h1:CJ0aWSM057203Lf6IL+f9T1iT9GByDxfZKAQTCR3kQA= golang.org/x/exp v0.0.0-20180807140117-3d87b88a115f/go.mod h1:CJ0aWSM057203Lf6IL+f9T1iT9GByDxfZKAQTCR3kQA= golang.org/x/exp v0.0.0-20190121172915-509febef88a4/go.mod h1:CJ0aWSM057203Lf6IL+f9T1iT9GByDxfZKAQTCR3kQA= @@ -1580,8 +1580,8 @@ golang.org/x/mod v0.9.0/go.mod h1:iBbtSCu2XBx23ZKBPSOrRkjjQPZFPuis4dIYUhu/chs= golang.org/x/mod v0.10.0/go.mod h1:iBbtSCu2XBx23ZKBPSOrRkjjQPZFPuis4dIYUhu/chs= golang.org/x/mod v0.11.0 h1:bUO06HqtnRcc/7l71XBe4WcqTZ+3AH1J59zWDDwLKgU= golang.org/x/mod v0.11.0/go.mod h1:iBbtSCu2XBx23ZKBPSOrRkjjQPZFPuis4dIYUhu/chs= -golang.org/x/net v0.17.0 h1:pVaXccu2ozPjCXewfr1S7xza/zcXTity9cCdXQYSjIM= -golang.org/x/net v0.17.0/go.mod h1:NxSsAGuq816PNPmqtQdLE42eU2Fs7NoRIZrHJAlaCOE= +golang.org/x/net v0.18.0 h1:mIYleuAkSbHh0tCv7RvjL3F6ZVbLjq4+R7zbOn3Kokg= +golang.org/x/net v0.18.0/go.mod h1:/czyP5RqHAH4odGYxBJ1qz0+CE5WZ+2j1YgoEo8F2jQ= golang.org/x/oauth2 v0.0.0-20180821212333-d2e6202438be/go.mod h1:N/0e6XlmueqKjAGxoOufVs8QHGRruUQn6yWY3a++T0U= golang.org/x/oauth2 v0.0.0-20190226205417-e64efc72b421/go.mod h1:gOpvHmFTYa4IltrdGE7lF6nIHvwfUNPOp7c8zoXwtLw= golang.org/x/oauth2 v0.0.0-20190604053449-0f29369cfe45/go.mod h1:gOpvHmFTYa4IltrdGE7lF6nIHvwfUNPOp7c8zoXwtLw= @@ -1635,14 +1635,14 @@ golang.org/x/sync v0.1.0/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM= golang.org/x/sync v0.2.0/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM= golang.org/x/sync v0.3.0 h1:ftCYgMx6zT/asHUrPw8BLLscYtGznsLAnjq5RH9P66E= golang.org/x/sync v0.3.0/go.mod h1:FU7BRWz2tNW+3quACPkgCx/L+uEAv1htQ0V83Z9Rj+Y= -golang.org/x/sys v0.6.0 h1:MVltZSvRTcU2ljQOhs94SXPftV6DCNnZViHeQps87pQ= -golang.org/x/sys v0.6.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg= +golang.org/x/sys v0.14.0 h1:Vz7Qs629MkJkGyHxUlRHizWJRG2j8fbQKjELVSNhy7Q= +golang.org/x/sys v0.14.0/go.mod h1:/VUhepiaJMQUp4+oa/7Zr1D23ma6VTLIYjOOTFZPUcA= golang.org/x/term v0.0.0-20201126162022-7de9c90e9dd1/go.mod h1:bj7SfCRtBDWHUb9snDiAeCFNEtKQo2Wmx5Cou7ajbmo= golang.org/x/term v0.0.0-20220526004731-065cf7ba2467/go.mod h1:jbD1KX2456YbFQfuXm/mYQcufACuNUgVhRMnK/tPxf8= -golang.org/x/term v0.1.0/go.mod h1:jbD1KX2456YbFQfuXm/mYQcufACuNUgVhRMnK/tPxf8= golang.org/x/term v0.10.0/go.mod h1:lpqdcUyK/oCiQxvxVrppt5ggO2KCZ5QblwqPnfZ6d5o= -golang.org/x/term v0.13.0 h1:bb+I9cTfFazGW51MZqBVmZy7+JEJMouUHTUSKVQLBek= golang.org/x/term v0.13.0/go.mod h1:LTmsnFJwVN6bCy1rVCoS+qHT1HhALEFxKncY3WNNh4U= +golang.org/x/term v0.14.0 h1:LGK9IlZ8T9jvdy6cTdfKUCltatMFOehAQo9SRC46UQ8= +golang.org/x/term v0.14.0/go.mod h1:TySc+nGkYR6qt8km8wUhuFRTVSMIX3XPR58y2lC8vww= golang.org/x/text v0.0.0-20170915032832-14c0d48ead0c/go.mod h1:NqM8EUOU14njkJ3fqMW+pc6Ldnwhi/IjpwHt7yyuwOQ= golang.org/x/text v0.3.0/go.mod h1:NqM8EUOU14njkJ3fqMW+pc6Ldnwhi/IjpwHt7yyuwOQ= golang.org/x/text v0.3.1-0.20180807135948-17ff2d5776d2/go.mod h1:NqM8EUOU14njkJ3fqMW+pc6Ldnwhi/IjpwHt7yyuwOQ= @@ -1661,8 +1661,9 @@ golang.org/x/text v0.8.0/go.mod h1:e1OnstbJyHTd6l/uOt8jFFHp6TRDWZR/bV3emEE/zU8= golang.org/x/text v0.9.0/go.mod h1:e1OnstbJyHTd6l/uOt8jFFHp6TRDWZR/bV3emEE/zU8= golang.org/x/text v0.10.0/go.mod h1:TvPlkZtksWOMsz7fbANvkp4WM8x/WCo/om8BMLbz+aE= golang.org/x/text v0.11.0/go.mod h1:TvPlkZtksWOMsz7fbANvkp4WM8x/WCo/om8BMLbz+aE= -golang.org/x/text v0.13.0 h1:ablQoSUd0tRdKxZewP80B+BaqeKJuVhuRxj/dkrun3k= golang.org/x/text v0.13.0/go.mod h1:TvPlkZtksWOMsz7fbANvkp4WM8x/WCo/om8BMLbz+aE= +golang.org/x/text v0.14.0 h1:ScX5w1eTa3QqT8oi6+ziP7dTV1S2+ALU0bI+0zXKWiQ= +golang.org/x/text v0.14.0/go.mod h1:18ZOQIKpY8NJVqYksKHtTdi31H5itFRjB5/qKTNYzSU= golang.org/x/time v0.0.0-20181108054448-85acf8d2951c/go.mod h1:tRJNPiyCQ0inRvYxbN9jk5I+vvW/OXSQhTDSoE431IQ= golang.org/x/time v0.0.0-20190308202827-9d24e82272b4/go.mod h1:tRJNPiyCQ0inRvYxbN9jk5I+vvW/OXSQhTDSoE431IQ= golang.org/x/time v0.0.0-20191024005414-555d28b269f0/go.mod h1:tRJNPiyCQ0inRvYxbN9jk5I+vvW/OXSQhTDSoE431IQ= diff --git a/scripts/version.sh b/scripts/version.sh index 9fbaf3cd93d8..17dc2c678124 100755 --- a/scripts/version.sh +++ b/scripts/version.sh @@ -75,7 +75,7 @@ if [ -z "$VERSION_KUBE_ROUTER" ]; then VERSION_KUBE_ROUTER="v0.0.0" fi -VERSION_ROOT="v0.12.2" +VERSION_ROOT="v0.13.0" if [[ -n "$GIT_TAG" ]]; then if [[ ! "$GIT_TAG" =~ ^"$VERSION_K8S"[+-] ]]; then @@ -91,4 +91,4 @@ VERSION_TAG="$(sed -e 's/+/-/g' <<< "$VERSION")" BINARY_POSTFIX= if [ ${OS} = windows ]; then BINARY_POSTFIX=.exe -fi \ No newline at end of file +fi