miampf
f16ccf5679
rewrote packages
...
keyservice
joinservice
upgrade-agent
measurement-reader
debugd
disk-mapper
rewrote joinservice main
rewrote some unit tests
rewrote upgrade-agent + some grpc functions
rewrote measurement-reader
rewrote debugd
removed unused import
removed forgotten zap reference in measurements reader
rewrote disk-mapper + tests
rewrote packages
verify
disk-mapper
malicious join
bootstrapper
attestationconfigapi
versionapi
internal/cloud/azure
disk-mapper tests
image/upload/internal/cmd
rewrote verify (WIP with loglevel increase)
rewrote forgotten zap references in disk-mapper
rewrote malicious join
rewrote bootstrapper
rewrote parts of internal/
rewrote attestationconfigapi (WIP)
rewrote versionapi cli
rewrote internal/cloud/azure
rewrote disk-mapper tests (untested by me rn)
rewrote image/upload/internal/cmd
removed forgotten zap references in verify/cmd
rewrote packages
hack/oci-pin
hack/qemu-metadata-api
debugd/internal/debugd/deploy
hack/bazel-deps-mirror
cli/internal/cmd
cli-k8s-compatibility
rewrote hack/qemu-metadata-api/server
rewrote debugd/internal/debugd/deploy
rewrote hack/bazel-deps-mirror
rewrote rest of hack/qemu-metadata-api
rewrote forgotten zap references in joinservice server
rewrote cli/internal/cmd
rewrote cli-k8s-compatibility
rewrote packages
internal/staticupload
e2d/internal/upgrade
internal/constellation/helm
internal/attestation/aws/snp
internal/attestation/azure/trustedlaunch
joinservice/internal/certcache/amkds
some missed unit tests
rewrote e2e/internal/upgrade
rewrote internal/constellation/helm
internal/attestation/aws/snp
internal/attestation/azure/trustedlaunch
joinservice/internal/certcache/amkds
search and replace test logging over all left *_test.go
2024-02-08 13:14:14 +01:00
Malte Poll
3a5753045e
goleak: ignore rules_go SIGTERM handler
...
rules_go added a SIGTERM handler that has a goroutine that survives the scope of the goleak check.
Currently, the best known workaround is to ignore this goroutine.
https://github.com/uber-go/goleak/issues/119
https://github.com/bazelbuild/rules_go/pull/3749
https://github.com/bazelbuild/rules_go/pull/3827#issuecomment-1894002120
2024-01-22 13:11:58 +01:00
Otto Bittner
97dc15b1d1
staticupload: correctly set invalidation timeout
...
Previously the timeout was not set in the client's constructor, thus the
zero value was used. The client did not wait for invalidation.
To prevent this in the future a warning is logged if wait is disabled.
Co-authored-by: Daniel Weiße <dw@edgeless.systems>
2023-09-04 11:20:13 +02:00
Daniel Weiße
d95ddd01d3
helm: fix upgrade command unintentionally skipping all service upgrades ( #1992 )
...
* Fix usage of errors.As in upgrade command implementation
* Use struct pointers when working with custom errors
---------
Signed-off-by: Daniel Weiße <dw@edgeless.systems>
2023-06-30 16:46:05 +02:00
Otto Bittner
fa01569cc6
staticupload: don't request empty invalidation ( #1870 )
...
If no files have been touched, do not initiate an invalidation.
2023-06-05 15:47:33 +02:00
Malte Poll
e1d3afe8d4
ci: use aws s3 client that invalidates cloudfront cache for places that modify Constellation api ( #1839 )
2023-06-02 11:20:01 +02:00
Adrian Stobbe
b51cc52945
config: sign Azure versions on upload & verify on fetch ( #1836 )
...
* add SignContent() + integrate into configAPI
* use static client for upload versions tool; fix staticupload calleeReference bug
* use version to get proper cosign pub key.
* mock fetcher in CLI tests
* only provide config.New constructor with fetcher
Co-authored-by: Otto Bittner <cobittner@posteo.net>
Co-authored-by: Daniel Weiße <66256922+daniel-weisse@users.noreply.github.com>
2023-06-01 13:55:46 +02:00
Malte Poll
29b93065b3
ci: static file uploader with automatic cache invalidation ( #1833 )
2023-05-30 13:48:29 +02:00