Compare commits

..

3 Commits

Author SHA1 Message Date
edgelessci
e3968fc3d5 attestation: hardcode measurements for v2.20.0 2024-12-03 22:24:06 +00:00
edgelessci
934751e8da deps: update versions to v2.20.0 2024-12-03 21:47:48 +00:00
edgelessci
bc81fb8d46 chore: update version.txt to v2.20.0 2024-12-03 21:47:34 +00:00
676 changed files with 9710 additions and 33503 deletions

View File

@ -1 +1 @@
7.6.0 7.3.2

View File

@ -28,7 +28,7 @@ runs:
run: echo "directory=$(mktemp -d)" >> "$GITHUB_OUTPUT" run: echo "directory=$(mktemp -d)" >> "$GITHUB_OUTPUT"
- name: Download the artifact - name: Download the artifact
uses: actions/download-artifact@95815c38cf2ff2164869cbab79da8d1f422bc89e # v4.2.1 uses: actions/download-artifact@fa0a91b85d4f404e444e00e005971372dc801d16 # v4.1.8
with: with:
name: ${{ inputs.name }} name: ${{ inputs.name }}
path: ${{ steps.tempdir.outputs.directory }} path: ${{ steps.tempdir.outputs.directory }}

View File

@ -69,7 +69,7 @@ runs:
done done
- name: Upload archive as artifact - name: Upload archive as artifact
uses: actions/upload-artifact@ea165f8d65b6e75b540449e92b4886f43607fa02 # v4.6.2 uses: actions/upload-artifact@b4b15b8c7c6ac21ea08fcf65892d2ee8f75cf882 # v4.4.3
with: with:
name: ${{ inputs.name }} name: ${{ inputs.name }}
path: ${{ steps.tempdir.outputs.directory }}/archive.7z path: ${{ steps.tempdir.outputs.directory }}/archive.7z

View File

@ -79,7 +79,7 @@ runs:
# once it has the functionality # once it has the functionality
- name: Install Cosign - name: Install Cosign
if: inputs.cosignPublicKey != '' && inputs.cosignPrivateKey != '' && inputs.cosignPassword != '' if: inputs.cosignPublicKey != '' && inputs.cosignPrivateKey != '' && inputs.cosignPassword != ''
uses: sigstore/cosign-installer@d7d6bc7722e3daa8354c50bcb52f4837da5e9b6a # v3.8.1 uses: sigstore/cosign-installer@dc72c7d5c4d10cd6bcb8cf6e3fd625a9e5e537da # v3.7.0
- name: Install Rekor - name: Install Rekor
if: inputs.cosignPublicKey != '' && inputs.cosignPrivateKey != '' && inputs.cosignPassword != '' if: inputs.cosignPublicKey != '' && inputs.cosignPrivateKey != '' && inputs.cosignPassword != ''

View File

@ -42,7 +42,7 @@ runs:
- name: Docker metadata - name: Docker metadata
id: meta id: meta
uses: docker/metadata-action@902fa8ec7d6ecbf8d84d538b9b233a880e428804 # v5.7.0 uses: docker/metadata-action@369eb591f429131d6889c46b94e711f089e6ca96 # v5.6.1
with: with:
images: | images: |
ghcr.io/${{ github.repository }}/${{ inputs.name }} ghcr.io/${{ github.repository }}/${{ inputs.name }}
@ -62,7 +62,7 @@ runs:
- name: Build and push container image - name: Build and push container image
id: build-micro-service id: build-micro-service
uses: docker/build-push-action@471d1dc4e07e5cdedd4c2171150001c434f0b7a4 # v6.15.0 uses: docker/build-push-action@48aba3b46d1b1fec4febb7c5d0c644b249a11355 # v6.10.0
with: with:
context: . context: .
file: ${{ inputs.dockerfile }} file: ${{ inputs.dockerfile }}

View File

@ -61,7 +61,7 @@ runs:
- name: Login to AWS (IAM service principal) - name: Login to AWS (IAM service principal)
if: inputs.cloudProvider == 'aws' if: inputs.cloudProvider == 'aws'
uses: aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1.0 uses: aws-actions/configure-aws-credentials@e3dd6a429d7300a6a4c196c26e071d42e0343502 # v4.0.2
with: with:
role-to-assume: arn:aws:iam::795746500882:role/GithubActionsE2EIAM role-to-assume: arn:aws:iam::795746500882:role/GithubActionsE2EIAM
aws-region: eu-central-1 aws-region: eu-central-1
@ -80,7 +80,7 @@ runs:
- name: Login to AWS (Cluster service principal) - name: Login to AWS (Cluster service principal)
if: inputs.cloudProvider == 'aws' if: inputs.cloudProvider == 'aws'
uses: aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1.0 uses: aws-actions/configure-aws-credentials@e3dd6a429d7300a6a4c196c26e071d42e0343502 # v4.0.2
with: with:
role-to-assume: arn:aws:iam::795746500882:role/GithubActionsE2ECluster role-to-assume: arn:aws:iam::795746500882:role/GithubActionsE2ECluster
aws-region: eu-central-1 aws-region: eu-central-1

View File

@ -1,64 +0,0 @@
name: Check measurements reproducibility
description: Check if the measurements of a given release are reproducible.
inputs:
version:
type: string
description: The version of the measurements that are downloaded from the CDN.
required: true
ref:
type: string
description: The git ref to check out. You probably want this to be the tag of the release you are testing.
required: true
runs:
using: "composite"
steps:
- name: Checkout
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
with:
ref: ${{ inputs.ref }}
path: ./release
- name: Set up bazel
uses: ./.github/actions/setup_bazel_nix
with:
useCache: "false"
nixTools: |
systemdUkify
jq
jd-diff-patch
moreutils
- name: Allow unrestricted user namespaces
shell: bash
run: |
sudo sysctl --ignore --write kernel.apparmor_restrict_unprivileged_unconfined=0
sudo sysctl --ignore --write kernel.apparmor_restrict_unprivileged_userns=0
- name: Build images
id: build-images
shell: bash
run: |
set -euo pipefail
# Build required binaries
pushd release
bazel build //image/system:stable
echo "buildPath=$PWD/bazel-bin/image" | tee -a "$GITHUB_OUTPUT"
popd
- name: Download measurements
shell: bash
run: |
curl -fsLO https://cdn.confidential.cloud/constellation/v2/ref/-/stream/stable/${{ inputs.version }}/image/measurements.json
- name: Cleanup release measurements and generate our own
shell: bash
run: |
${{ github.action_path }}/create_measurements.sh "${{ steps.build-images.outputs.buildPath }}"
- name: Compare measurements
shell: bash
run: |
${{ github.action_path }}/compare_measurements.sh "${{ steps.build-images.outputs.buildPath }}"

View File

@ -1,31 +0,0 @@
#!/usr/bin/env bash
# no -e since we need to collect errors later
# no -u since it interferes with checking associative arrays
set -o pipefail
shopt -s extglob
declare -A errors
for directory in "$1"/system/!(mkosi_wrapper.sh); do
dirname="$(basename "$directory")"
attestationVariant="$(echo "$dirname" | cut -d_ -f2)"
echo "Their measurements for $attestationVariant:"
ts " " < "$attestationVariant"_their-measurements.json
echo "Own measurements for $attestationVariant:"
ts " " < "$attestationVariant"_own-measurements.json
diff="$(jd ./"$attestationVariant"_their-measurements.json ./"$attestationVariant"_own-measurements.json)"
if [[ -n $diff ]]; then
errors["$attestationVariant"]="$diff"
fi
done
for attestationVariant in "${!errors[@]}"; do
echo "Failed to reproduce measurements for $attestationVariant:"
echo "${errors["$attestationVariant"]}" | ts " "
done
if [[ ${#errors[@]} -ne 0 ]]; then
exit 1
fi

View File

@ -1,28 +0,0 @@
#!/usr/bin/env bash
set -euo pipefail
shopt -s extglob
for directory in "$1"/system/!(mkosi_wrapper.sh); do
dirname="$(basename "$directory")"
csp="$(echo "$dirname" | cut -d_ -f1)"
attestationVariant="$(echo "$dirname" | cut -d_ -f2)"
# This jq filter selects the measurements for the correct CSP and attestation variant
# and then removes all `warnOnly: true` measurements.
jq --arg attestation_variant "$attestationVariant" --arg csp "$csp" \
'
.list.[]
| select(
.attestationVariant == $attestation_variant
and (.csp | ascii_downcase) == $csp
)
| .measurements
| to_entries
| map(select(.value.warnOnly | not))
| from_entries
| del(.[] .warnOnly)
' \
measurements.json > "$attestationVariant"_their-measurements.json
bazel run --run_under "sudo --preserve-env" //image/measured-boot/cmd -- "$directory/constellation" /dev/stdout | jq '.measurements' > ./"$attestationVariant"_own-measurements.json
done

View File

@ -257,9 +257,9 @@ runs:
continue-on-error: true continue-on-error: true
uses: ./.github/actions/artifact_upload uses: ./.github/actions/artifact_upload
with: with:
name: debug-logs-${{ inputs.artifactNameSuffix }} name: serial-logs-${{ inputs.artifactNameSuffix }}
path: | path: >
*.log !(terraform).log
encryptionSecret: ${{ inputs.encryptionSecret }} encryptionSecret: ${{ inputs.encryptionSecret }}
- name: Prepare terraform state folders - name: Prepare terraform state folders
@ -268,12 +268,9 @@ runs:
run: | run: |
mkdir to-zip mkdir to-zip
cp -r constellation-terraform to-zip cp -r constellation-terraform to-zip
# constellation-iam-terraform is optional cp -r constellation-iam-terraform to-zip
if [ -d constellation-iam-terraform ]; then
cp -r constellation-iam-terraform to-zip
fi
rm -f to-zip/constellation-terraform/plan.zip rm -f to-zip/constellation-terraform/plan.zip
rm -rf to-zip/*/.terraform rm -rf to-zip/constellation-terraform/.terraform to-zip/constellation-iam-terraform/.terraform
- name: Upload terraform state - name: Upload terraform state
if: always() if: always()

View File

@ -67,7 +67,7 @@ runs:
- name: Login to AWS (Cluster role) - name: Login to AWS (Cluster role)
if: inputs.cloudProvider == 'aws' if: inputs.cloudProvider == 'aws'
uses: aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1.0 uses: aws-actions/configure-aws-credentials@e3dd6a429d7300a6a4c196c26e071d42e0343502 # v4.0.2
with: with:
role-to-assume: arn:aws:iam::795746500882:role/GithubActionsE2ECluster role-to-assume: arn:aws:iam::795746500882:role/GithubActionsE2ECluster
aws-region: eu-central-1 aws-region: eu-central-1

View File

@ -42,15 +42,6 @@ inputs:
gcpZone: gcpZone:
description: "The GCP zone to deploy Constellation in." description: "The GCP zone to deploy Constellation in."
required: false required: false
#
# STACKIT specific inputs
#
stackitZone:
description: "The STACKIT zone to deploy Constellation in."
required: false
stackitProjectID:
description: "The STACKIT project ID to deploy Constellation in."
required: false
runs: runs:
using: "composite" using: "composite"
@ -102,7 +93,6 @@ runs:
--tf-log=DEBUG \ --tf-log=DEBUG \
--yes ${extraFlags} --yes ${extraFlags}
# TODO(@3u13r): Replace deprecated --serviceAccountID with --prefix
- name: Constellation iam create gcp - name: Constellation iam create gcp
shell: bash shell: bash
if: inputs.cloudProvider == 'gcp' if: inputs.cloudProvider == 'gcp'
@ -114,13 +104,3 @@ runs:
--update-config \ --update-config \
--tf-log=DEBUG \ --tf-log=DEBUG \
--yes --yes
- name: Set STACKIT-specific configuration
shell: bash
if: inputs.cloudProvider == 'stackit'
env:
STACKIT_PROJECT_ID: ${{ inputs.stackitProjectID }}
run: |
yq eval -i "(.provider.openstack.stackitProjectID) = \"${STACKIT_PROJECT_ID}\"" constellation-conf.yaml
yq eval -i "(.provider.openstack.availabilityZone) = \"${{ inputs.stackitZone }}\"" constellation-conf.yaml
yq eval -i "(.nodeGroups.[].zone) = \"${{ inputs.stackitZone }}\"" constellation-conf.yaml

View File

@ -23,7 +23,7 @@ runs:
- name: Login to AWS (IAM role) - name: Login to AWS (IAM role)
if: inputs.cloudProvider == 'aws' if: inputs.cloudProvider == 'aws'
uses: aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1.0 uses: aws-actions/configure-aws-credentials@e3dd6a429d7300a6a4c196c26e071d42e0343502 # v4.0.2
with: with:
role-to-assume: arn:aws:iam::795746500882:role/GithubActionsE2EIAM role-to-assume: arn:aws:iam::795746500882:role/GithubActionsE2EIAM
aws-region: eu-central-1 aws-region: eu-central-1

View File

@ -17,7 +17,7 @@ runs:
steps: steps:
- name: Use docker for logging in - name: Use docker for logging in
if: runner.os != 'macOS' if: runner.os != 'macOS'
uses: docker/login-action@74a5d142397b4f367a81961eba4e8cd7edddf772 # v3.4.0 uses: docker/login-action@9780b0c442fbb1117ed29e0efdff1e18412f7567 # v3.3.0
with: with:
registry: ${{ inputs.registry }} registry: ${{ inputs.registry }}
username: ${{ inputs.username }} username: ${{ inputs.username }}

View File

@ -19,7 +19,7 @@ runs:
steps: steps:
- name: Install Cosign - name: Install Cosign
if: inputs.cosignPublicKey != '' && inputs.cosignPrivateKey != '' && inputs.cosignPassword != '' if: inputs.cosignPublicKey != '' && inputs.cosignPrivateKey != '' && inputs.cosignPassword != ''
uses: sigstore/cosign-installer@d7d6bc7722e3daa8354c50bcb52f4837da5e9b6a # v3.8.1 uses: sigstore/cosign-installer@dc72c7d5c4d10cd6bcb8cf6e3fd625a9e5e537da # v3.7.0
- name: Download Syft & Grype - name: Download Syft & Grype
uses: ./.github/actions/install_syft_grype uses: ./.github/actions/install_syft_grype

View File

@ -67,7 +67,7 @@ runs:
# Make sure that helm is installed # Make sure that helm is installed
# This is not always the case, e.g. on MacOS runners # This is not always the case, e.g. on MacOS runners
- name: Install Helm - name: Install Helm
uses: azure/setup-helm@b9e51907a09c216f16ebe8536097933489208112 # v4.3.0 uses: azure/setup-helm@fe7b79cd5ee1e45176fcad797de68ecaf3ca4814 # v4.2.0
with: with:
version: v3.9.0 version: v3.9.0

View File

@ -5,51 +5,51 @@ runs:
using: "composite" using: "composite"
steps: steps:
- name: Download CLI binaries darwin-amd64 - name: Download CLI binaries darwin-amd64
uses: actions/download-artifact@95815c38cf2ff2164869cbab79da8d1f422bc89e # v4.2.1 uses: actions/download-artifact@fa0a91b85d4f404e444e00e005971372dc801d16 # v4.1.8
with: with:
name: constellation-darwin-amd64 name: constellation-darwin-amd64
- name: Download CLI binaries darwin-arm64 - name: Download CLI binaries darwin-arm64
uses: actions/download-artifact@95815c38cf2ff2164869cbab79da8d1f422bc89e # v4.2.1 uses: actions/download-artifact@fa0a91b85d4f404e444e00e005971372dc801d16 # v4.1.8
with: with:
name: constellation-darwin-arm64 name: constellation-darwin-arm64
- name: Download CLI binaries linux-amd64 - name: Download CLI binaries linux-amd64
uses: actions/download-artifact@95815c38cf2ff2164869cbab79da8d1f422bc89e # v4.2.1 uses: actions/download-artifact@fa0a91b85d4f404e444e00e005971372dc801d16 # v4.1.8
with: with:
name: constellation-linux-amd64 name: constellation-linux-amd64
- name: Download CLI binaries linux-arm64 - name: Download CLI binaries linux-arm64
uses: actions/download-artifact@95815c38cf2ff2164869cbab79da8d1f422bc89e # v4.2.1 uses: actions/download-artifact@fa0a91b85d4f404e444e00e005971372dc801d16 # v4.1.8
with: with:
name: constellation-linux-arm64 name: constellation-linux-arm64
- name: Download CLI binaries windows-amd64 - name: Download CLI binaries windows-amd64
uses: actions/download-artifact@95815c38cf2ff2164869cbab79da8d1f422bc89e # v4.2.1 uses: actions/download-artifact@fa0a91b85d4f404e444e00e005971372dc801d16 # v4.1.8
with: with:
name: constellation-windows-amd64 name: constellation-windows-amd64
- name: Download Terraform module - name: Download Terraform module
uses: actions/download-artifact@95815c38cf2ff2164869cbab79da8d1f422bc89e # v4.2.1 uses: actions/download-artifact@fa0a91b85d4f404e444e00e005971372dc801d16 # v4.1.8
with: with:
name: terraform-module name: terraform-module
- name: Download Terraform provider binary darwin-amd64 - name: Download Terraform provider binary darwin-amd64
uses: actions/download-artifact@95815c38cf2ff2164869cbab79da8d1f422bc89e # v4.2.1 uses: actions/download-artifact@fa0a91b85d4f404e444e00e005971372dc801d16 # v4.1.8
with: with:
name: terraform-provider-constellation-darwin-amd64 name: terraform-provider-constellation-darwin-amd64
- name: Download Terraform provider binary darwin-arm64 - name: Download Terraform provider binary darwin-arm64
uses: actions/download-artifact@95815c38cf2ff2164869cbab79da8d1f422bc89e # v4.2.1 uses: actions/download-artifact@fa0a91b85d4f404e444e00e005971372dc801d16 # v4.1.8
with: with:
name: terraform-provider-constellation-darwin-arm64 name: terraform-provider-constellation-darwin-arm64
- name: Download Terraform provider binary linux-amd64 - name: Download Terraform provider binary linux-amd64
uses: actions/download-artifact@95815c38cf2ff2164869cbab79da8d1f422bc89e # v4.2.1 uses: actions/download-artifact@fa0a91b85d4f404e444e00e005971372dc801d16 # v4.1.8
with: with:
name: terraform-provider-constellation-linux-amd64 name: terraform-provider-constellation-linux-amd64
- name: Download Terraform provider binary linux-arm64 - name: Download Terraform provider binary linux-arm64
uses: actions/download-artifact@95815c38cf2ff2164869cbab79da8d1f422bc89e # v4.2.1 uses: actions/download-artifact@fa0a91b85d4f404e444e00e005971372dc801d16 # v4.1.8
with: with:
name: terraform-provider-constellation-linux-arm64 name: terraform-provider-constellation-linux-arm64

View File

@ -19,7 +19,7 @@ runs:
uses: ./.github/actions/setup_bazel_nix uses: ./.github/actions/setup_bazel_nix
- name: Login to AWS - name: Login to AWS
uses: aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1.0 uses: aws-actions/configure-aws-credentials@e3dd6a429d7300a6a4c196c26e071d42e0343502 # v4.0.2
with: with:
role-to-assume: arn:aws:iam::795746500882:role/GithubTestResourceAPI role-to-assume: arn:aws:iam::795746500882:role/GithubTestResourceAPI
aws-region: eu-west-1 aws-region: eu-west-1

View File

@ -32,9 +32,9 @@ runs:
steps: steps:
- name: Setup python - name: Setup python
uses: actions/setup-python@8d9ed9ac5c53483de85588cdf95a591a75ab9f55 # v5.5.0 uses: actions/setup-python@0b93645e9fea7318ecaed2b359559ac225c90a2b # v5.3.0
with: with:
python-version: "3.13" python-version: "3.10"
- name: Install kubestr - name: Install kubestr
shell: bash shell: bash
@ -166,7 +166,7 @@ runs:
encryptionSecret: ${{ inputs.encryptionSecret }} encryptionSecret: ${{ inputs.encryptionSecret }}
- name: Assume AWS role to retrieve and update benchmarks in S3 - name: Assume AWS role to retrieve and update benchmarks in S3
uses: aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1.0 uses: aws-actions/configure-aws-credentials@e3dd6a429d7300a6a4c196c26e071d42e0343502 # v4.0.2
with: with:
role-to-assume: arn:aws:iam::795746500882:role/GithubActionUpdateBenchmarks role-to-assume: arn:aws:iam::795746500882:role/GithubActionUpdateBenchmarks
aws-region: us-east-2 aws-region: us-east-2

View File

@ -1,3 +1,3 @@
numpy ==2.2.4 numpy ==1.26.4
matplotlib ==3.10.1 matplotlib ==3.8.3
Pillow ==11.2.1 Pillow ==10.3.0

View File

@ -11,18 +11,12 @@ inputs:
azure_credentials: azure_credentials:
description: "Credentials authorized to create Constellation on Azure." description: "Credentials authorized to create Constellation on Azure."
required: true required: true
openStackCloudsYaml:
description: "The contents of ~/.config/openstack/clouds.yaml"
required: false
stackitUat:
description: "The UAT for STACKIT"
required: false
runs: runs:
using: "composite" using: "composite"
steps: steps:
- name: Authenticate AWS - name: Authenticate AWS
uses: aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1.0 uses: aws-actions/configure-aws-credentials@e3dd6a429d7300a6a4c196c26e071d42e0343502 # v4.0.2
with: with:
role-to-assume: arn:aws:iam::795746500882:role/GithubActionsE2EDestroy role-to-assume: arn:aws:iam::795746500882:role/GithubActionsE2EDestroy
aws-region: eu-central-1 aws-region: eu-central-1
@ -37,16 +31,6 @@ runs:
with: with:
service_account: "destroy-e2e@constellation-e2e.iam.gserviceaccount.com" service_account: "destroy-e2e@constellation-e2e.iam.gserviceaccount.com"
- name: Login to OpenStack
uses: ./.github/actions/login_openstack
with:
clouds_yaml: ${{ inputs.openStackCloudsYaml }}
- name: Login to STACKIT
uses: ./.github/actions/login_stackit
with:
serviceAccountToken: ${{ inputs.stackitUat }}
- name: Install tools - name: Install tools
uses: ./.github/actions/setup_bazel_nix uses: ./.github/actions/setup_bazel_nix
with: with:

View File

@ -1,68 +0,0 @@
name: Emergency ssh
description: "Verify that an emergency ssh connection can be established."
inputs:
kubeconfig:
description: "The kubeconfig file for the cluster."
required: true
runs:
using: "composite"
steps:
- name: Test emergency ssh
shell: bash
env:
KUBECONFIG: ${{ inputs.kubeconfig }}
run: |
set -euo pipefail
# Activate emergency ssh access to the cluster
pushd ./constellation-terraform
echo "emergency_ssh = true" >> terraform.tfvars
terraform apply -auto-approve
lb="$(terraform output -raw loadbalancer_address)"
popd
# write ssh config
cat > ssh_config <<EOF
Host $lb
ProxyJump none
Host *
StrictHostKeyChecking no
UserKnownHostsFile=/dev/null
IdentityFile ./access-key
PreferredAuthentications publickey
CertificateFile=constellation_cert.pub
User root
ProxyJump $lb
EOF
for i in {1..26}; do
if [[ "$i" -eq 26 ]]; then
echo "Port 22 never became reachable"
exit 1
fi
echo "Waiting until port 22 is reachable: $i/25"
if nc -z -w 25 "$lb" 22; then
break
fi
done
# generate and try keypair
ssh-keygen -t ecdsa -q -N "" -f ./access-key
constellation ssh --debug --key ./access-key.pub
internalIPs="$(kubectl get nodes -o=jsonpath='{.items[*].status.addresses}' | jq -r '.[] | select(.type == "InternalIP") | .address')"
for ip in $internalIPs; do
for i in {1..26}; do
if [[ "$i" -eq 26 ]]; then
echo "Failed to connect to $ip over $lb"
exit 1
fi
echo "Trying connection to $ip over $lb: $i/25"
if ssh -F ssh_config -o BatchMode=yes $ip true; then
echo "Connected to $ip successfully"
break
fi
done
done

View File

@ -70,7 +70,7 @@ runs:
- name: Publish test results - name: Publish test results
if: (!env.ACT) && contains(inputs.sonobuoyTestSuiteCmd, '--plugin e2e') if: (!env.ACT) && contains(inputs.sonobuoyTestSuiteCmd, '--plugin e2e')
uses: mikepenz/action-junit-report@cf701569b05ccdd861a76b8607a66d76f6fd4857 # v5.5.1 uses: mikepenz/action-junit-report@db71d41eb79864e25ab0337e395c352e84523afe # v4.3.1
with: with:
report_paths: "**/junit_01.xml" report_paths: "**/junit_01.xml"
fail_on_failure: true fail_on_failure: true

View File

@ -56,7 +56,7 @@ inputs:
description: "Azure credentials authorized to create an IAM configuration." description: "Azure credentials authorized to create an IAM configuration."
required: true required: true
test: test:
description: "The test to run. Can currently be one of [sonobuoy full, sonobuoy quick, sonobuoy conformance, autoscaling, lb, perf-bench, verify, recover, malicious join, nop, upgrade, emergency ssh]." description: "The test to run. Can currently be one of [sonobuoy full, sonobuoy quick, sonobuoy conformance, autoscaling, lb, perf-bench, verify, recover, malicious join, nop, upgrade]."
required: true required: true
sonobuoyTestSuiteCmd: sonobuoyTestSuiteCmd:
description: "The sonobuoy test suite to run." description: "The sonobuoy test suite to run."
@ -93,15 +93,6 @@ inputs:
encryptionSecret: encryptionSecret:
description: "The secret to use for decrypting the artifact." description: "The secret to use for decrypting the artifact."
required: true required: true
openStackCloudsYaml:
description: "The contents of ~/.config/openstack/clouds.yaml"
required: false
stackitUat:
description: "The UAT for STACKIT"
required: false
stackitProjectID:
description: "The STACKIT project ID to deploy Constellation in."
required: false
outputs: outputs:
kubeconfig: kubeconfig:
@ -115,7 +106,7 @@ runs:
using: "composite" using: "composite"
steps: steps:
- name: Check input - name: Check input
if: (!contains(fromJson('["sonobuoy full", "sonobuoy quick", "sonobuoy conformance", "autoscaling", "perf-bench", "verify", "lb", "recover", "malicious join", "s3proxy", "nop", "upgrade", "emergency ssh"]'), inputs.test)) if: (!contains(fromJson('["sonobuoy full", "sonobuoy quick", "sonobuoy conformance", "autoscaling", "perf-bench", "verify", "lb", "recover", "malicious join", "s3proxy", "nop", "upgrade"]'), inputs.test))
shell: bash shell: bash
run: | run: |
echo "::error::Invalid input for test field: ${{ inputs.test }}" echo "::error::Invalid input for test field: ${{ inputs.test }}"
@ -149,8 +140,6 @@ runs:
- name: Setup bazel - name: Setup bazel
uses: ./.github/actions/setup_bazel_nix uses: ./.github/actions/setup_bazel_nix
with:
nixTools: terraform
- name: Log in to the Container registry - name: Log in to the Container registry
uses: ./.github/actions/container_registry_login uses: ./.github/actions/container_registry_login
@ -227,7 +216,7 @@ runs:
- name: Login to AWS (IAM role) - name: Login to AWS (IAM role)
if: inputs.cloudProvider == 'aws' if: inputs.cloudProvider == 'aws'
uses: aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1.0 uses: aws-actions/configure-aws-credentials@e3dd6a429d7300a6a4c196c26e071d42e0343502 # v4.0.2
with: with:
role-to-assume: arn:aws:iam::795746500882:role/GithubActionsE2EIAM role-to-assume: arn:aws:iam::795746500882:role/GithubActionsE2EIAM
aws-region: eu-central-1 aws-region: eu-central-1
@ -240,30 +229,12 @@ runs:
with: with:
azure_credentials: ${{ inputs.azureIAMCreateCredentials }} azure_credentials: ${{ inputs.azureIAMCreateCredentials }}
- name: Login to OpenStack
if: inputs.cloudProvider == 'stackit'
uses: ./.github/actions/login_openstack
with:
clouds_yaml: ${{inputs.openStackCloudsYaml }}
- name: Login to STACKIT
if: inputs.cloudProvider == 'stackit'
uses: ./.github/actions/login_stackit
with:
serviceAccountToken: ${{ inputs.stackitUat }}
- name: Create prefix - name: Create prefix
id: create-prefix id: create-prefix
shell: bash shell: bash
run: | run: |
uuid=$(uuidgen | tr "[:upper:]" "[:lower:]") uuid=$(uuidgen | tr "[:upper:]" "[:lower:]")
uuid=${uuid%%-*} uuid=${uuid%%-*}
# GCP has a 6 character limit the additional uuid prefix since the full prefix length has a maximum of 24
if [[ ${{ inputs.cloudProvider }} == 'gcp' ]]; then
uuid=${uuid:0:6}
fi
echo "uuid=${uuid}" | tee -a $GITHUB_OUTPUT echo "uuid=${uuid}" | tee -a $GITHUB_OUTPUT
echo "prefix=e2e-${{ github.run_id }}-${{ github.run_attempt }}-${uuid}" | tee -a $GITHUB_OUTPUT echo "prefix=e2e-${{ github.run_id }}-${{ github.run_attempt }}-${uuid}" | tee -a $GITHUB_OUTPUT
@ -273,7 +244,7 @@ runs:
with: with:
attestationVariant: ${{ inputs.attestationVariant }} attestationVariant: ${{ inputs.attestationVariant }}
- name: Create Constellation config and IAM - name: Create IAM configuration
id: constellation-iam-create id: constellation-iam-create
uses: ./.github/actions/constellation_iam_create uses: ./.github/actions/constellation_iam_create
with: with:
@ -285,8 +256,6 @@ runs:
azureRegion: ${{ inputs.regionZone || steps.pick-az-region.outputs.region }} azureRegion: ${{ inputs.regionZone || steps.pick-az-region.outputs.region }}
gcpProjectID: ${{ inputs.gcpProject }} gcpProjectID: ${{ inputs.gcpProject }}
gcpZone: ${{ inputs.regionZone || 'europe-west3-b' }} gcpZone: ${{ inputs.regionZone || 'europe-west3-b' }}
stackitZone: ${{ inputs.regionZone || 'eu01-2' }}
stackitProjectID: ${{ inputs.stackitProjectID }}
kubernetesVersion: ${{ inputs.kubernetesVersion }} kubernetesVersion: ${{ inputs.kubernetesVersion }}
additionalTags: "workflow=${{ github.run_id }}" additionalTags: "workflow=${{ github.run_id }}"
@ -298,7 +267,7 @@ runs:
- name: Login to AWS (Cluster role) - name: Login to AWS (Cluster role)
if: inputs.cloudProvider == 'aws' if: inputs.cloudProvider == 'aws'
uses: aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1.0 uses: aws-actions/configure-aws-credentials@e3dd6a429d7300a6a4c196c26e071d42e0343502 # v4.0.2
with: with:
role-to-assume: arn:aws:iam::795746500882:role/GithubActionsE2ECluster role-to-assume: arn:aws:iam::795746500882:role/GithubActionsE2ECluster
aws-region: eu-central-1 aws-region: eu-central-1
@ -452,9 +421,3 @@ runs:
s3AccessKey: ${{ inputs.s3AccessKey }} s3AccessKey: ${{ inputs.s3AccessKey }}
s3SecretKey: ${{ inputs.s3SecretKey }} s3SecretKey: ${{ inputs.s3SecretKey }}
githubToken: ${{ inputs.githubToken }} githubToken: ${{ inputs.githubToken }}
- name: Run emergency ssh test
if: inputs.test == 'emergency ssh'
uses: ./.github/actions/e2e_emergency_ssh
with:
kubeconfig: ${{ steps.constellation-create.outputs.kubeconfig }}

View File

@ -82,7 +82,7 @@ runs:
- name: Login to AWS - name: Login to AWS
if: github.ref_name == 'main' if: github.ref_name == 'main'
uses: aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1.0 uses: aws-actions/configure-aws-credentials@e3dd6a429d7300a6a4c196c26e071d42e0343502 # v4.0.2
with: with:
role-to-assume: arn:aws:iam::795746500882:role/GitHubConstellationImagePipeline role-to-assume: arn:aws:iam::795746500882:role/GitHubConstellationImagePipeline
aws-region: eu-central-1 aws-region: eu-central-1

View File

@ -38,7 +38,7 @@ runs:
- name: Login to AWS - name: Login to AWS
if: inputs.imageVersion == '' if: inputs.imageVersion == ''
uses: aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1.0 uses: aws-actions/configure-aws-credentials@e3dd6a429d7300a6a4c196c26e071d42e0343502 # v4.0.2
with: with:
role-to-assume: arn:aws:iam::795746500882:role/GithubConstellationVersionsAPIRead role-to-assume: arn:aws:iam::795746500882:role/GithubConstellationVersionsAPIRead
aws-region: eu-central-1 aws-region: eu-central-1

View File

@ -10,6 +10,6 @@ runs:
# As described at: # As described at:
# https://github.com/Azure/login#configure-deployment-credentials # https://github.com/Azure/login#configure-deployment-credentials
- name: Login to Azure - name: Login to Azure
uses: azure/login@a457da9ea143d694b1b9c7c869ebb04ebe844ef5 # v2.3.0 uses: azure/login@a65d910e8af852a8061c627c456678983e180302 # v2.2.0
with: with:
creds: ${{ inputs.azure_credentials }} creds: ${{ inputs.azure_credentials }}

View File

@ -20,11 +20,11 @@ runs:
echo "GOOGLE_CLOUD_PROJECT=" >> "$GITHUB_ENV" echo "GOOGLE_CLOUD_PROJECT=" >> "$GITHUB_ENV"
- name: Authorize GCP access - name: Authorize GCP access
uses: google-github-actions/auth@71f986410dfbc7added4569d411d040a91dc6935 # v2.1.8 uses: google-github-actions/auth@6fc4af4b145ae7821d527454aa9bd537d1f2dc5f # v2.1.7
with: with:
workload_identity_provider: projects/1052692473304/locations/global/workloadIdentityPools/constellation-ci-pool/providers/constellation-ci-provider workload_identity_provider: projects/1052692473304/locations/global/workloadIdentityPools/constellation-ci-pool/providers/constellation-ci-provider
service_account: ${{ inputs.service_account }} service_account: ${{ inputs.service_account }}
# Even if preinstalled in Github Actions runner image, this setup does some magic authentication required for gsutil. # Even if preinstalled in Github Actions runner image, this setup does some magic authentication required for gsutil.
- name: Set up Cloud SDK - name: Set up Cloud SDK
uses: google-github-actions/setup-gcloud@77e7a554d41e2ee56fc945c52dfd3f33d12def9a # v2.1.4 uses: google-github-actions/setup-gcloud@6189d56e4096ee891640bb02ac264be376592d6a # v2.1.2

View File

@ -1,16 +0,0 @@
name: STACKIT login
description: "Login to STACKIT"
inputs:
serviceAccountToken:
description: "Credentials authorized to create Constellation on STACKIT."
required: true
runs:
using: "composite"
steps:
- name: Login to STACKIT
env:
UAT: ${{ inputs.serviceAccountToken }}
shell: bash
run: |
mkdir -p ~/.stackit
echo "${UAT}" > ~/.stackit/credentials.json

View File

@ -1,19 +0,0 @@
name: Notify STACKIT
description: "Notify STACKIT about test failure"
inputs:
slackToken:
description: "Slack access token."
required: true
runs:
using: "composite"
steps:
- name: Notify STACKIT
env:
SLACK_TOKEN: ${{ inputs.slackToken }}
shell: bash
run: |
curl -X POST \
-H "Authorization: Bearer $SLACK_TOKEN" \
-H "Content-type: application/json; charset=utf-8" \
-d "{\"channel\":\"C0827BT59SM\",\"text\":\"E2E test failed: $GITHUB_SERVER_URL/$GITHUB_REPOSITORY/actions/runs/$GITHUB_RUN_ID\"}" \
https://slack.com/api/chat.postMessage

View File

@ -29,7 +29,7 @@ runs:
echo version=$(yq eval ".version" ${{ inputs.chartPath }}/Chart.yaml) | tee -a $GITHUB_OUTPUT echo version=$(yq eval ".version" ${{ inputs.chartPath }}/Chart.yaml) | tee -a $GITHUB_OUTPUT
- name: Create pull request - name: Create pull request
uses: peter-evans/create-pull-request@271a8d0340265f705b14b6d32b9829c1cb33d45e # v7.0.8 uses: peter-evans/create-pull-request@5e914681df9dc83aa4e4905692ca88beb2f9e91f # v7.0.5
with: with:
path: helm path: helm
branch: "release/s3proxy/${{ steps.update-chart-version.outputs.version }}" branch: "release/s3proxy/${{ steps.update-chart-version.outputs.version }}"

View File

@ -18,7 +18,7 @@ runs:
using: "composite" using: "composite"
steps: steps:
- name: Login to AWS - name: Login to AWS
uses: aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1.0 uses: aws-actions/configure-aws-credentials@e3dd6a429d7300a6a4c196c26e071d42e0343502 # v4.0.2
with: with:
role-to-assume: arn:aws:iam::795746500882:role/GithubConstellationVersionsAPIRead role-to-assume: arn:aws:iam::795746500882:role/GithubConstellationVersionsAPIRead
aws-region: eu-central-1 aws-region: eu-central-1

View File

@ -75,7 +75,6 @@ runs:
echo "$RUNNER_ARCH not supported" echo "$RUNNER_ARCH not supported"
exit 1 exit 1
fi fi
echo "nixVersion=$(cat "${{ github.workspace }}/.nixversion")" | tee -a "$GITHUB_OUTPUT"
echo "::endgroup::" echo "::endgroup::"
- name: Install current Bash on macOS - name: Install current Bash on macOS
@ -114,9 +113,9 @@ runs:
- name: Install nix - name: Install nix
if: steps.check_inputs.outputs.nixPreinstalled == 'false' if: steps.check_inputs.outputs.nixPreinstalled == 'false'
uses: cachix/install-nix-action@d1ca217b388ee87b2507a9a93bf01368bde7cec2 # v31 uses: cachix/install-nix-action@08dcb3a5e62fa31e2da3d490afc4176ef55ecd72 # v30
with: with:
install_url: "https://releases.nixos.org/nix/nix-${{ steps.check_inputs.outputs.nixVersion }}/install" install_url: "https://releases.nixos.org/nix/nix-2.25.2/install"
- name: Set $USER if not set - name: Set $USER if not set
shell: bash shell: bash
@ -221,7 +220,7 @@ runs:
{ tools, repository, rev }: { tools, repository, rev }:
let let
repoFlake = builtins.getFlake ("github:" + repository + "/" + rev); repoFlake = builtins.getFlake ("github:" + repository + "/" + rev);
nixpkgs = repoFlake.inputs.nixpkgs; nixpkgs = repoFlake.inputs.nixpkgsUnstable;
pkgs = import nixpkgs { system = builtins.currentSystem; }; pkgs = import nixpkgs { system = builtins.currentSystem; };
toolPkgs = map (p: pkgs.${p}) tools; toolPkgs = map (p: pkgs.${p}) tools;
in in

View File

@ -29,9 +29,6 @@ runs:
"gcpSEVSNP") "gcpSEVSNP")
attestationVariant="gcp-sev-snp" attestationVariant="gcp-sev-snp"
;; ;;
"qemuVTPM")
attestationVariant="qemu-vtpm"
;;
*) *)
echo "Unknown attestation variant: $(yq '.attestation | keys | .[0]' constellation-conf.yaml)" echo "Unknown attestation variant: $(yq '.attestation | keys | .[0]' constellation-conf.yaml)"
exit 1 exit 1
@ -47,7 +44,7 @@ runs:
} }
random = { random = {
source = "hashicorp/random" source = "hashicorp/random"
version = "3.7.2" version = "3.6.3"
} }
} }
} }
@ -109,16 +106,6 @@ runs:
project_id = "$(yq '.infrastructure.gcp.projectID' constellation-state.yaml)" project_id = "$(yq '.infrastructure.gcp.projectID' constellation-state.yaml)"
service_account_key = sensitive("$(cat $(yq '.provider.gcp.serviceAccountKeyPath' constellation-conf.yaml) | base64 -w0)") service_account_key = sensitive("$(cat $(yq '.provider.gcp.serviceAccountKeyPath' constellation-conf.yaml) | base64 -w0)")
} }
openstack = {
cloud = "stackit"
clouds_yaml_path = "~/.config/openstack/clouds.yaml"
floating_ip_pool_id = "970ace5c-458f-484a-a660-0903bcfd91ad"
deploy_yawol_load_balancer = true
yawol_image_id = "bcd6c13e-75d1-4c3f-bf0f-8f83580cc1be"
yawol_flavor_id = "3b11b27e-6c73-470d-b595-1d85b95a8cdf"
network_id = "$(yq '.infrastructure.networkID' constellation-state.yaml)"
subnet_id = "$(yq '.infrastructure.subnetID' constellation-state.yaml)"
}
network_config = { network_config = {
ip_cidr_node = "$(yq '.infrastructure.ipCidrNode' constellation-state.yaml)" ip_cidr_node = "$(yq '.infrastructure.ipCidrNode' constellation-state.yaml)"
ip_cidr_service = "$(yq '.serviceCIDR' constellation-conf.yaml)" ip_cidr_service = "$(yq '.serviceCIDR' constellation-conf.yaml)"

View File

@ -15,7 +15,7 @@ runs:
zip -r terraform-module.zip terraform-module zip -r terraform-module.zip terraform-module
- name: Upload artifact - name: Upload artifact
uses: actions/upload-artifact@ea165f8d65b6e75b540449e92b4886f43607fa02 # v4.6.2 uses: actions/upload-artifact@b4b15b8c7c6ac21ea08fcf65892d2ee8f75cf882 # v4.4.3
with: with:
name: terraform-module name: terraform-module
path: terraform-module.zip path: terraform-module.zip

View File

@ -17,11 +17,11 @@ jobs:
path: constellation path: constellation
- name: Install Nix - name: Install Nix
uses: cachix/install-nix-action@d1ca217b388ee87b2507a9a93bf01368bde7cec2 # v31 uses: cachix/install-nix-action@08dcb3a5e62fa31e2da3d490afc4176ef55ecd72 # v30
- name: Download Firmware release - name: Download Firmware release
id: download-firmware id: download-firmware
uses: robinraju/release-downloader@daf26c55d821e836577a15f77d86ddc078948b05 # v1.12 uses: robinraju/release-downloader@a96f54c1b5f5e09e47d9504526e96febd949d4c2 # v1.11
with: with:
repository: aws/uefi repository: aws/uefi
latest: true latest: true

View File

@ -29,9 +29,9 @@ jobs:
fetch-depth: 0 fetch-depth: 0
- name: Setup Go environment - name: Setup Go environment
uses: actions/setup-go@0aaccfd150d50ccaeb58ebd88d36e91967a5f35b # v5.4.0 uses: actions/setup-go@41dfa10bad2bb2ae585af6ee5bb4d7d973ad74ed # v5.1.0
with: with:
go-version: "1.24.2" go-version: "1.23.2"
cache: false cache: false
- name: Install Crane - name: Install Crane
@ -76,7 +76,7 @@ jobs:
- name: Docker meta - name: Docker meta
id: meta id: meta
uses: docker/metadata-action@902fa8ec7d6ecbf8d84d538b9b233a880e428804 # v5.7.0 uses: docker/metadata-action@369eb591f429131d6889c46b94e711f089e6ca96 # v5.6.1
with: with:
images: | images: |
ghcr.io/edgelesssys/cloud-provider-gcp ghcr.io/edgelesssys/cloud-provider-gcp
@ -113,7 +113,7 @@ jobs:
- name: Build and push container image - name: Build and push container image
id: build id: build
uses: docker/build-push-action@471d1dc4e07e5cdedd4c2171150001c434f0b7a4 # v6.15.0 uses: docker/build-push-action@48aba3b46d1b1fec4febb7c5d0c644b249a11355 # v6.10.0
with: with:
context: ./cloud-provider-gcp context: ./cloud-provider-gcp
push: ${{ github.ref_name == 'main' }} push: ${{ github.ref_name == 'main' }}

View File

@ -85,7 +85,7 @@ jobs:
- name: Docker meta - name: Docker meta
id: meta id: meta
if: steps.needs-build.outputs.out == 'true' if: steps.needs-build.outputs.out == 'true'
uses: docker/metadata-action@902fa8ec7d6ecbf8d84d538b9b233a880e428804 # v5.7.0 uses: docker/metadata-action@369eb591f429131d6889c46b94e711f089e6ca96 # v5.6.1
with: with:
images: | images: |
${{ env.REGISTRY }}/edgelesssys/gcp-guest-agent ${{ env.REGISTRY }}/edgelesssys/gcp-guest-agent
@ -114,7 +114,7 @@ jobs:
- name: Build and push container image - name: Build and push container image
if: steps.needs-build.outputs.out == 'true' if: steps.needs-build.outputs.out == 'true'
id: build id: build
uses: docker/build-push-action@471d1dc4e07e5cdedd4c2171150001c434f0b7a4 # v6.15.0 uses: docker/build-push-action@48aba3b46d1b1fec4febb7c5d0c644b249a11355 # v6.10.0
with: with:
context: ./guest-agent context: ./guest-agent
file: ./constellation/3rdparty/gcp-guest-agent/Dockerfile file: ./constellation/3rdparty/gcp-guest-agent/Dockerfile

View File

@ -65,9 +65,9 @@ jobs:
token: ${{ secrets.CI_COMMIT_PUSH_PR }} token: ${{ secrets.CI_COMMIT_PUSH_PR }}
- name: Setup Go environment - name: Setup Go environment
uses: actions/setup-go@0aaccfd150d50ccaeb58ebd88d36e91967a5f35b # v5.4.0 uses: actions/setup-go@41dfa10bad2bb2ae585af6ee5bb4d7d973ad74ed # v5.1.0
with: with:
go-version: "1.24.2" go-version: "1.23.2"
cache: false cache: false
- name: Determine version - name: Determine version
@ -97,7 +97,7 @@ jobs:
run: rm -f internal/attestation/measurements/measurement-generator/generate run: rm -f internal/attestation/measurements/measurement-generator/generate
- name: Create pull request - name: Create pull request
uses: peter-evans/create-pull-request@271a8d0340265f705b14b6d32b9829c1cb33d45e # v7.0.8 uses: peter-evans/create-pull-request@5e914681df9dc83aa4e4905692ca88beb2f9e91f # v7.0.5
with: with:
branch: "image/automated/update-measurements-${{ github.run_number }}" branch: "image/automated/update-measurements-${{ github.run_number }}"
base: main base: main

View File

@ -147,7 +147,7 @@ jobs:
useCache: "false" useCache: "false"
- name: Login to AWS - name: Login to AWS
uses: aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1.0 uses: aws-actions/configure-aws-credentials@e3dd6a429d7300a6a4c196c26e071d42e0343502 # v4.0.2
with: with:
role-to-assume: arn:aws:iam::795746500882:role/GitHubConstellationImagePipeline role-to-assume: arn:aws:iam::795746500882:role/GitHubConstellationImagePipeline
aws-region: eu-central-1 aws-region: eu-central-1
@ -167,12 +167,6 @@ jobs:
with: with:
clouds_yaml: ${{ secrets.STACKIT_IMAGE_UPLOAD_CLOUDS_YAML }} clouds_yaml: ${{ secrets.STACKIT_IMAGE_UPLOAD_CLOUDS_YAML }}
- name: Allow unrestricted user namespaces
shell: bash
run: |
sudo sysctl --ignore --write kernel.apparmor_restrict_unprivileged_unconfined=0
sudo sysctl --ignore --write kernel.apparmor_restrict_unprivileged_userns=0
- name: Build and upload - name: Build and upload
id: build id: build
shell: bash shell: bash

View File

@ -25,7 +25,7 @@ jobs:
ref: ${{ !github.event.pull_request.head.repo.fork && github.head_ref || '' }} ref: ${{ !github.event.pull_request.head.repo.fork && github.head_ref || '' }}
- name: Link Checker - name: Link Checker
uses: lycheeverse/lychee-action@1d97d84f0bc547f7b25f4c2170d87d810dc2fb2c # v2.4.0 uses: lycheeverse/lychee-action@f81112d0d2814ded911bd23e3beaa9dda9093915 # v2.1.0
with: with:
args: "--config ./.lychee.toml './**/*.md' './**/*.html'" args: "--config ./.lychee.toml './**/*.md' './**/*.html'"
fail: true fail: true

View File

@ -1,25 +0,0 @@
name: Check measurements reproducibility
on:
workflow_dispatch:
inputs:
version:
type: string
description: The version of the measurements that are downloaded from the CDN.
required: true
ref:
type: string
description: The git ref to check out. You probably want this to be the tag of the release you are testing.
required: true
jobs:
check-reproducibility:
runs-on: ubuntu-24.04
steps:
- name: Checkout
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
- name: Check reproducibility
uses: ./.github/actions/check_measurements_reproducibility
with:
version: ${{ github.event.inputs.version }}
ref: ${{ github.event.inputs.ref }}

View File

@ -38,13 +38,13 @@ jobs:
- name: Setup Go environment - name: Setup Go environment
if: matrix.language == 'go' if: matrix.language == 'go'
uses: actions/setup-go@0aaccfd150d50ccaeb58ebd88d36e91967a5f35b # v5.4.0 uses: actions/setup-go@41dfa10bad2bb2ae585af6ee5bb4d7d973ad74ed # v5.1.0
with: with:
go-version: "1.24.2" go-version: "1.23.2"
cache: false cache: false
- name: Initialize CodeQL - name: Initialize CodeQL
uses: github/codeql-action/init@45775bd8235c68ba998cffa5171334d58593da47 # v3.28.15 uses: github/codeql-action/init@f09c1c0a94de965c15400f5634aa42fac8fb8f88 # v3.27.5
with: with:
languages: ${{ matrix.language }} languages: ${{ matrix.language }}
@ -63,6 +63,6 @@ jobs:
echo "::endgroup::" echo "::endgroup::"
- name: Perform CodeQL Analysis - name: Perform CodeQL Analysis
uses: github/codeql-action/analyze@45775bd8235c68ba998cffa5171334d58593da47 # v3.28.15 uses: github/codeql-action/analyze@f09c1c0a94de965c15400f5634aa42fac8fb8f88 # v3.27.5
with: with:
category: "/language:${{ matrix.language }}" category: "/language:${{ matrix.language }}"

View File

@ -29,4 +29,3 @@ jobs:
with: with:
files: docs/docs files: docs/docs
fail_on_error: true fail_on_error: true
version: 3.9.3

View File

@ -92,8 +92,8 @@ jobs:
cosignPassword: ${{ inputs.key == 'release' && secrets.COSIGN_PASSWORD || secrets.COSIGN_DEV_PASSWORD }} cosignPassword: ${{ inputs.key == 'release' && secrets.COSIGN_PASSWORD || secrets.COSIGN_DEV_PASSWORD }}
- name: Upload CLI as artifact (unix) - name: Upload CLI as artifact (unix)
uses: actions/upload-artifact@ea165f8d65b6e75b540449e92b4886f43607fa02 # v4.6.2 uses: actions/upload-artifact@b4b15b8c7c6ac21ea08fcf65892d2ee8f75cf882 # v4.4.3
if: ${{ matrix.os != 'windows' }} if : ${{ matrix.os != 'windows' }}
with: with:
name: constellation-${{ matrix.os }}-${{ matrix.arch }} name: constellation-${{ matrix.os }}-${{ matrix.arch }}
path: | path: |
@ -101,8 +101,8 @@ jobs:
build/constellation-${{ matrix.os }}-${{ matrix.arch }}.sig build/constellation-${{ matrix.os }}-${{ matrix.arch }}.sig
- name: Upload CLI as artifact (windows) - name: Upload CLI as artifact (windows)
uses: actions/upload-artifact@ea165f8d65b6e75b540449e92b4886f43607fa02 # v4.6.2 uses: actions/upload-artifact@b4b15b8c7c6ac21ea08fcf65892d2ee8f75cf882 # v4.4.3
if: ${{ matrix.os == 'windows' }} if : ${{ matrix.os == 'windows' }}
with: with:
name: constellation-${{ matrix.os }}-${{ matrix.arch }} name: constellation-${{ matrix.os }}-${{ matrix.arch }}
path: | path: |
@ -149,16 +149,16 @@ jobs:
targetArch: ${{ matrix.arch }} targetArch: ${{ matrix.arch }}
- name: Upload Terraform Provider Binary as artifact (unix) - name: Upload Terraform Provider Binary as artifact (unix)
uses: actions/upload-artifact@ea165f8d65b6e75b540449e92b4886f43607fa02 # v4.6.2 uses: actions/upload-artifact@b4b15b8c7c6ac21ea08fcf65892d2ee8f75cf882 # v4.4.3
if: ${{ matrix.os != 'windows' }} if : ${{ matrix.os != 'windows' }}
with: with:
name: terraform-provider-constellation-${{ matrix.os }}-${{ matrix.arch }} name: terraform-provider-constellation-${{ matrix.os }}-${{ matrix.arch }}
path: | path: |
build/terraform-provider-constellation-${{ matrix.os }}-${{ matrix.arch }} build/terraform-provider-constellation-${{ matrix.os }}-${{ matrix.arch }}
- name: Upload Terraform Provider Binary as artifact (windows) - name: Upload Terraform Provider Binary as artifact (windows)
uses: actions/upload-artifact@ea165f8d65b6e75b540449e92b4886f43607fa02 # v4.6.2 uses: actions/upload-artifact@b4b15b8c7c6ac21ea08fcf65892d2ee8f75cf882 # v4.4.3
if: ${{ matrix.os == 'windows' }} if : ${{ matrix.os == 'windows' }}
with: with:
name: terraform-provider-constellation-${{ matrix.os }}-${{ matrix.arch }} name: terraform-provider-constellation-${{ matrix.os }}-${{ matrix.arch }}
path: | path: |
@ -227,7 +227,7 @@ jobs:
uses: ./.github/actions/download_release_binaries uses: ./.github/actions/download_release_binaries
- name: Download CLI SBOM - name: Download CLI SBOM
uses: actions/download-artifact@95815c38cf2ff2164869cbab79da8d1f422bc89e # v4.2.1 uses: actions/download-artifact@fa0a91b85d4f404e444e00e005971372dc801d16 # v4.1.8
with: with:
name: constellation.spdx.sbom name: constellation.spdx.sbom
@ -261,7 +261,7 @@ jobs:
ref: ${{ inputs.ref || github.head_ref }} ref: ${{ inputs.ref || github.head_ref }}
- name: Install Cosign - name: Install Cosign
uses: sigstore/cosign-installer@d7d6bc7722e3daa8354c50bcb52f4837da5e9b6a # v3.8.1 uses: sigstore/cosign-installer@dc72c7d5c4d10cd6bcb8cf6e3fd625a9e5e537da # v3.7.0
- name: Download Syft & Grype - name: Download Syft & Grype
uses: ./.github/actions/install_syft_grype uses: ./.github/actions/install_syft_grype
@ -296,13 +296,13 @@ jobs:
COSIGN_PASSWORD: ${{ inputs.key == 'release' && secrets.COSIGN_PASSWORD || secrets.COSIGN_DEV_PASSWORD }} COSIGN_PASSWORD: ${{ inputs.key == 'release' && secrets.COSIGN_PASSWORD || secrets.COSIGN_DEV_PASSWORD }}
- name: Upload Constellation CLI SBOM - name: Upload Constellation CLI SBOM
uses: actions/upload-artifact@ea165f8d65b6e75b540449e92b4886f43607fa02 # v4.6.2 uses: actions/upload-artifact@b4b15b8c7c6ac21ea08fcf65892d2ee8f75cf882 # v4.4.3
with: with:
name: constellation.spdx.sbom name: constellation.spdx.sbom
path: constellation.spdx.sbom path: constellation.spdx.sbom
- name: Upload Constellation CLI SBOM's signature - name: Upload Constellation CLI SBOM's signature
uses: actions/upload-artifact@ea165f8d65b6e75b540449e92b4886f43607fa02 # v4.6.2 uses: actions/upload-artifact@b4b15b8c7c6ac21ea08fcf65892d2ee8f75cf882 # v4.4.3
with: with:
name: constellation.spdx.sbom.sig name: constellation.spdx.sbom.sig
path: constellation.spdx.sbom.sig path: constellation.spdx.sbom.sig
@ -316,14 +316,14 @@ jobs:
- provenance-subjects - provenance-subjects
# This must not be pinned to digest. See: # This must not be pinned to digest. See:
# https://github.com/slsa-framework/slsa-github-generator#referencing-slsa-builders-and-generators # https://github.com/slsa-framework/slsa-github-generator#referencing-slsa-builders-and-generators
uses: slsa-framework/slsa-github-generator/.github/workflows/generator_generic_slsa3.yml@v2.1.0 uses: slsa-framework/slsa-github-generator/.github/workflows/generator_generic_slsa3.yml@v2.0.0
with: with:
base64-subjects: "${{ needs.provenance-subjects.outputs.provenance-subjects }}" base64-subjects: "${{ needs.provenance-subjects.outputs.provenance-subjects }}"
provenance-verify: provenance-verify:
runs-on: ubuntu-24.04 runs-on: ubuntu-24.04
env: env:
SLSA_VERIFIER_VERSION: "2.7.0" SLSA_VERIFIER_VERSION: "2.5.1"
needs: needs:
- build-cli - build-cli
- provenance - provenance
@ -340,12 +340,12 @@ jobs:
uses: ./.github/actions/download_release_binaries uses: ./.github/actions/download_release_binaries
- name: Download CLI SBOM - name: Download CLI SBOM
uses: actions/download-artifact@95815c38cf2ff2164869cbab79da8d1f422bc89e # v4.2.1 uses: actions/download-artifact@fa0a91b85d4f404e444e00e005971372dc801d16 # v4.1.8
with: with:
name: constellation.spdx.sbom name: constellation.spdx.sbom
- name: Download provenance - name: Download provenance
uses: actions/download-artifact@95815c38cf2ff2164869cbab79da8d1f422bc89e # v4.2.1 uses: actions/download-artifact@fa0a91b85d4f404e444e00e005971372dc801d16 # v4.1.8
with: with:
name: ${{ needs.provenance.outputs.provenance-name }} name: ${{ needs.provenance.outputs.provenance-name }}
@ -418,17 +418,17 @@ jobs:
uses: ./.github/actions/download_release_binaries uses: ./.github/actions/download_release_binaries
- name: Download CLI SBOM - name: Download CLI SBOM
uses: actions/download-artifact@95815c38cf2ff2164869cbab79da8d1f422bc89e # v4.2.1 uses: actions/download-artifact@fa0a91b85d4f404e444e00e005971372dc801d16 # v4.1.8
with: with:
name: constellation.spdx.sbom name: constellation.spdx.sbom
- name: Download Constellation CLI SBOM's signature - name: Download Constellation CLI SBOM's signature
uses: actions/download-artifact@95815c38cf2ff2164869cbab79da8d1f422bc89e # v4.2.1 uses: actions/download-artifact@fa0a91b85d4f404e444e00e005971372dc801d16 # v4.1.8
with: with:
name: constellation.spdx.sbom.sig name: constellation.spdx.sbom.sig
- name: Download Constellation provenance - name: Download Constellation provenance
uses: actions/download-artifact@95815c38cf2ff2164869cbab79da8d1f422bc89e # v4.2.1 uses: actions/download-artifact@fa0a91b85d4f404e444e00e005971372dc801d16 # v4.1.8
with: with:
name: ${{ needs.provenance.outputs.provenance-name }} name: ${{ needs.provenance.outputs.provenance-name }}
@ -472,7 +472,7 @@ jobs:
- name: Create release with artifacts - name: Create release with artifacts
id: create-release id: create-release
# GitHub endorsed release project. See: https://github.com/actions/create-release # GitHub endorsed release project. See: https://github.com/actions/create-release
uses: softprops/action-gh-release@c95fe1489396fe8a9eb87c0abf8aa5b2ef267fda # v2.2.1 uses: softprops/action-gh-release@01570a1f39cb168c169c802c3bceb9e93fb10974 # v2.1.0
with: with:
draft: true draft: true
generate_release_notes: true generate_release_notes: true
@ -487,7 +487,7 @@ jobs:
terraform-module.zip terraform-module.zip
- name: Create Terraform provider release with artifcats - name: Create Terraform provider release with artifcats
uses: softprops/action-gh-release@c95fe1489396fe8a9eb87c0abf8aa5b2ef267fda # v2.2.1 uses: softprops/action-gh-release@01570a1f39cb168c169c802c3bceb9e93fb10974 # v2.1.0
with: with:
draft: true draft: true
generate_release_notes: false generate_release_notes: false

View File

@ -22,5 +22,3 @@ jobs:
ghToken: ${{ secrets.GITHUB_TOKEN }} ghToken: ${{ secrets.GITHUB_TOKEN }}
encryptionSecret: ${{ secrets.ARTIFACT_ENCRYPT_PASSWD }} encryptionSecret: ${{ secrets.ARTIFACT_ENCRYPT_PASSWD }}
azure_credentials: ${{ secrets.AZURE_E2E_DESTROY_CREDENTIALS }} azure_credentials: ${{ secrets.AZURE_E2E_DESTROY_CREDENTIALS }}
openStackCloudsYaml: ${{ secrets.STACKIT_CI_CLOUDS_YAML }}
stackitUat: ${{ secrets.STACKIT_CI_UAT }}

View File

@ -34,7 +34,7 @@ jobs:
ref: ${{ inputs.ref || github.event.workflow_run.head_branch || github.head_ref }} ref: ${{ inputs.ref || github.event.workflow_run.head_branch || github.head_ref }}
- name: Azure login OIDC - name: Azure login OIDC
uses: azure/login@a457da9ea143d694b1b9c7c869ebb04ebe844ef5 # v2.3.0 uses: azure/login@a65d910e8af852a8061c627c456678983e180302 # v2.2.0
with: with:
client-id: ${{ secrets.AZURE_E2E_MINI_CLIENT_ID }} client-id: ${{ secrets.AZURE_E2E_MINI_CLIENT_ID }}
tenant-id: ${{ secrets.AZURE_TENANT_ID }} tenant-id: ${{ secrets.AZURE_TENANT_ID }}

View File

@ -45,7 +45,7 @@ jobs:
fail-fast: false fail-fast: false
max-parallel: 5 max-parallel: 5
matrix: matrix:
kubernetesVersion: ["1.30"] # This should correspond to the current default k8s minor. kubernetesVersion: ["1.28"] # should be default
attestationVariant: ["gcp-sev-es", "gcp-sev-snp", "azure-sev-snp", "azure-tdx", "aws-sev-snp"] attestationVariant: ["gcp-sev-es", "gcp-sev-snp", "azure-sev-snp", "azure-tdx", "aws-sev-snp"]
refStream: ["ref/main/stream/debug/?", "ref/release/stream/stable/?"] refStream: ["ref/main/stream/debug/?", "ref/release/stream/stable/?"]
test: ["sonobuoy quick"] test: ["sonobuoy quick"]
@ -164,7 +164,7 @@ jobs:
ref: ${{ !github.event.pull_request.head.repo.fork && github.head_ref || '' }} ref: ${{ !github.event.pull_request.head.repo.fork && github.head_ref || '' }}
- name: Azure login OIDC - name: Azure login OIDC
uses: azure/login@a457da9ea143d694b1b9c7c869ebb04ebe844ef5 # v2.3.0 uses: azure/login@a65d910e8af852a8061c627c456678983e180302 # v2.2.0
with: with:
client-id: ${{ secrets.AZURE_E2E_MINI_CLIENT_ID }} client-id: ${{ secrets.AZURE_E2E_MINI_CLIENT_ID }}
tenant-id: ${{ secrets.AZURE_TENANT_ID }} tenant-id: ${{ secrets.AZURE_TENANT_ID }}

View File

@ -23,7 +23,7 @@ on:
type: choice type: choice
options: options:
- "ubuntu-24.04" - "ubuntu-24.04"
- "macos-latest" - "macos-12"
default: "ubuntu-24.04" default: "ubuntu-24.04"
test: test:
description: "The test to run." description: "The test to run."
@ -41,6 +41,7 @@ on:
required: true required: true
kubernetesVersion: kubernetesVersion:
description: "Kubernetes version to create the cluster from." description: "Kubernetes version to create the cluster from."
default: "1.28"
required: true required: true
cliVersion: cliVersion:
description: "Version of a released CLI to download. Leave empty to build the CLI from the checked out ref." description: "Version of a released CLI to download. Leave empty to build the CLI from the checked out ref."

View File

@ -23,7 +23,7 @@ on:
type: choice type: choice
options: options:
- "ubuntu-24.04" - "ubuntu-24.04"
- "macos-latest" - "macos-12"
default: "ubuntu-24.04" default: "ubuntu-24.04"
test: test:
description: "The test to run." description: "The test to run."
@ -41,6 +41,7 @@ on:
required: true required: true
kubernetesVersion: kubernetesVersion:
description: "Kubernetes version to create the cluster from." description: "Kubernetes version to create the cluster from."
default: "1.28"
required: true required: true
cliVersion: cliVersion:
description: "Version of a released CLI to download. Leave empty to build the CLI from the checked out ref." description: "Version of a released CLI to download. Leave empty to build the CLI from the checked out ref."

View File

@ -154,7 +154,7 @@ jobs:
- name: Login to AWS (IAM + Cluster role) - name: Login to AWS (IAM + Cluster role)
if: steps.determine.outputs.cloudProvider == 'aws' if: steps.determine.outputs.cloudProvider == 'aws'
uses: aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1.0 uses: aws-actions/configure-aws-credentials@e3dd6a429d7300a6a4c196c26e071d42e0343502 # v4.0.2
with: with:
role-to-assume: arn:aws:iam::795746500882:role/GithubActionsE2ETerraform role-to-assume: arn:aws:iam::795746500882:role/GithubActionsE2ETerraform
aws-region: eu-central-1 aws-region: eu-central-1

View File

@ -73,53 +73,53 @@ jobs:
- test: "sonobuoy full" - test: "sonobuoy full"
attestationVariant: "gcp-sev-es" attestationVariant: "gcp-sev-es"
kubernetes-version: "v1.30" kubernetes-version: "v1.29"
runner: "ubuntu-24.04" runner: "ubuntu-24.04"
clusterCreation: "cli" clusterCreation: "cli"
- test: "sonobuoy full" - test: "sonobuoy full"
attestationVariant: "gcp-sev-snp" attestationVariant: "gcp-sev-snp"
kubernetes-version: "v1.30" kubernetes-version: "v1.29"
runner: "ubuntu-24.04" runner: "ubuntu-24.04"
clusterCreation: "cli" clusterCreation: "cli"
- test: "sonobuoy full" - test: "sonobuoy full"
attestationVariant: "azure-sev-snp" attestationVariant: "azure-sev-snp"
kubernetes-version: "v1.30" kubernetes-version: "v1.29"
runner: "ubuntu-24.04" runner: "ubuntu-24.04"
clusterCreation: "cli" clusterCreation: "cli"
- test: "sonobuoy full" - test: "sonobuoy full"
attestationVariant: "azure-tdx" attestationVariant: "azure-tdx"
kubernetes-version: "v1.30" kubernetes-version: "v1.29"
runner: "ubuntu-24.04" runner: "ubuntu-24.04"
clusterCreation: "cli" clusterCreation: "cli"
- test: "sonobuoy full" - test: "sonobuoy full"
attestationVariant: "aws-sev-snp" attestationVariant: "aws-sev-snp"
kubernetes-version: "v1.30" kubernetes-version: "v1.29"
runner: "ubuntu-24.04" runner: "ubuntu-24.04"
clusterCreation: "cli" clusterCreation: "cli"
- test: "sonobuoy full" - test: "sonobuoy full"
attestationVariant: "gcp-sev-es" attestationVariant: "gcp-sev-es"
kubernetes-version: "v1.29" kubernetes-version: "v1.28"
runner: "ubuntu-24.04" runner: "ubuntu-24.04"
clusterCreation: "cli" clusterCreation: "cli"
- test: "sonobuoy full" - test: "sonobuoy full"
attestationVariant: "gcp-sev-snp" attestationVariant: "gcp-sev-snp"
kubernetes-version: "v1.29" kubernetes-version: "v1.28"
runner: "ubuntu-24.04" runner: "ubuntu-24.04"
clusterCreation: "cli" clusterCreation: "cli"
- test: "sonobuoy full" - test: "sonobuoy full"
attestationVariant: "azure-sev-snp" attestationVariant: "azure-sev-snp"
kubernetes-version: "v1.29" kubernetes-version: "v1.28"
runner: "ubuntu-24.04" runner: "ubuntu-24.04"
clusterCreation: "cli" clusterCreation: "cli"
- test: "sonobuoy full" - test: "sonobuoy full"
attestationVariant: "azure-tdx" attestationVariant: "azure-tdx"
kubernetes-version: "v1.29" kubernetes-version: "v1.28"
runner: "ubuntu-24.04" runner: "ubuntu-24.04"
clusterCreation: "cli" clusterCreation: "cli"
- test: "sonobuoy full" - test: "sonobuoy full"
attestationVariant: "aws-sev-snp" attestationVariant: "aws-sev-snp"
kubernetes-version: "v1.29" kubernetes-version: "v1.28"
runner: "ubuntu-24.04" runner: "ubuntu-24.04"
clusterCreation: "cli" clusterCreation: "cli"
@ -306,11 +306,11 @@ jobs:
# - test: "verify" # - test: "verify"
# attestationVariant: "azure-sev-snp" # attestationVariant: "azure-sev-snp"
# kubernetes-version: "v1.30" # kubernetes-version: "v1.30"
# runner: "macos-latest" # runner: "macos-12"
- test: "recover" - test: "recover"
attestationVariant: "gcp-sev-es" attestationVariant: "gcp-sev-es"
kubernetes-version: "v1.30" kubernetes-version: "v1.30"
runner: "macos-latest" runner: "macos-12"
clusterCreation: "cli" clusterCreation: "cli"
runs-on: ${{ matrix.runner }} runs-on: ${{ matrix.runner }}
permissions: permissions:
@ -342,7 +342,7 @@ jobs:
- name: Set up gcloud CLI (macOS) - name: Set up gcloud CLI (macOS)
if: steps.split-attestationVariant.outputs.provider == 'gcp' && runner.os == 'macOS' if: steps.split-attestationVariant.outputs.provider == 'gcp' && runner.os == 'macOS'
uses: google-github-actions/setup-gcloud@77e7a554d41e2ee56fc945c52dfd3f33d12def9a # v2.1.4 uses: google-github-actions/setup-gcloud@6189d56e4096ee891640bb02ac264be376592d6a # v2.1.2
- name: Run E2E test - name: Run E2E test
id: e2e_test id: e2e_test
@ -409,7 +409,7 @@ jobs:
fail-fast: false fail-fast: false
max-parallel: 1 max-parallel: 1
matrix: matrix:
fromVersion: ["v2.22.0"] fromVersion: ["v2.19.3"]
attestationVariant: ["gcp-sev-snp", "azure-sev-snp", "azure-tdx", "aws-sev-snp"] attestationVariant: ["gcp-sev-snp", "azure-sev-snp", "azure-tdx", "aws-sev-snp"]
name: Run upgrade tests name: Run upgrade tests
secrets: inherit secrets: inherit

View File

@ -1,153 +0,0 @@
name: e2e test STACKIT
on:
workflow_dispatch:
schedule:
- cron: "0 0 * * *" # Every day at midnight.
jobs:
find-latest-image:
name: Find latest image
runs-on: ubuntu-24.04
permissions:
id-token: write
contents: read
outputs:
image-release-stable: ${{ steps.relabel-output.outputs.image-release-stable }}
steps:
- name: Checkout
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
with:
ref: ${{ !github.event.pull_request.head.repo.fork && github.head_ref || '' }}
- name: Select relevant image
id: select-image-action
uses: ./.github/actions/select_image
with:
osImage: "ref/release/stream/stable/?"
- name: Relabel output
id: relabel-output
shell: bash
run: |
ref=$(echo 'ref/release/stream/stable/?' | cut -d/ -f2)
stream=$(echo 'ref/release/stream/stable/?' | cut -d/ -f4)
echo "image-$ref-$stream=${{ steps.select-image-action.outputs.osImage }}" | tee -a "$GITHUB_OUTPUT"
e2e-stackit:
strategy:
fail-fast: false
max-parallel: 6
matrix:
kubernetesVersion: [ "1.29", "1.30", "1.31" ]
clusterCreation: [ "cli", "terraform" ]
test: [ "sonobuoy quick" ]
runs-on: ubuntu-24.04
permissions:
id-token: write
checks: write
contents: read
packages: write
actions: write
needs: [find-latest-image]
steps:
- name: Check out repository
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
with:
fetch-depth: 0
ref: ${{ !github.event.pull_request.head.repo.fork && github.head_ref || '' }}
- name: Setup bazel
uses: ./.github/actions/setup_bazel_nix
with:
nixTools: terraform
- name: Run E2E test
id: e2e_test
uses: ./.github/actions/e2e_test
with:
workerNodesCount: "1"
controlNodesCount: "1"
cloudProvider: stackit
attestationVariant: qemu-vtpm
osImage: ${{ needs.find-latest-image.outputs.image-release-stable }}
isDebugImage: false
cliVersion: ${{ needs.find-latest-image.outputs.image-release-stable || '' }}
kubernetesVersion: ${{ matrix.kubernetesVersion }}
awsOpenSearchDomain: ${{ secrets.AWS_OPENSEARCH_DOMAIN }}
awsOpenSearchUsers: ${{ secrets.AWS_OPENSEARCH_USER }}
awsOpenSearchPwd: ${{ secrets.AWS_OPENSEARCH_PWD }}
gcpProject: constellation-e2e
gcpClusterCreateServiceAccount: "infrastructure-e2e@constellation-e2e.iam.gserviceaccount.com"
gcpIAMCreateServiceAccount: "iam-e2e@constellation-e2e.iam.gserviceaccount.com"
test: ${{ matrix.test }}
azureSubscriptionID: ${{ secrets.AZURE_SUBSCRIPTION_ID }}
azureClusterCreateCredentials: ${{ secrets.AZURE_E2E_CLUSTER_CREDENTIALS }}
azureIAMCreateCredentials: ${{ secrets.AZURE_E2E_IAM_CREDENTIALS }}
registry: ghcr.io
githubToken: ${{ secrets.GITHUB_TOKEN }}
cosignPassword: ${{ secrets.COSIGN_PASSWORD }}
cosignPrivateKey: ${{ secrets.COSIGN_PRIVATE_KEY }}
fetchMeasurements: false
clusterCreation: ${{ matrix.clusterCreation }}
s3AccessKey: ${{ secrets.AWS_ACCESS_KEY_ID_S3PROXY }}
s3SecretKey: ${{ secrets.AWS_SECRET_ACCESS_KEY_S3PROXY }}
encryptionSecret: ${{ secrets.ARTIFACT_ENCRYPT_PASSWD }}
openStackCloudsYaml: ${{ secrets.STACKIT_CI_CLOUDS_YAML }}
stackitUat: ${{ secrets.STACKIT_CI_UAT }}
stackitProjectID: ${{ secrets.STACKIT_CI_PROJECT_ID }}
- name: Always terminate cluster
if: always()
uses: ./.github/actions/constellation_destroy
with:
kubeconfig: ${{ steps.e2e_test.outputs.kubeconfig }}
clusterCreation: ${{ matrix.clusterCreation }}
cloudProvider: stackit
azureClusterDeleteCredentials: ${{ secrets.AZURE_E2E_CLUSTER_CREDENTIALS }}
gcpClusterDeleteServiceAccount: "infrastructure-e2e@constellation-e2e.iam.gserviceaccount.com"
- name: Always delete IAM configuration
if: always()
uses: ./.github/actions/constellation_iam_destroy
with:
cloudProvider: stackit
azureCredentials: ${{ secrets.AZURE_E2E_IAM_CREDENTIALS }}
gcpServiceAccount: "iam-e2e@constellation-e2e.iam.gserviceaccount.com"
- name: Update tfstate
if: always()
env:
GH_TOKEN: ${{ github.token }}
uses: ./.github/actions/update_tfstate
with:
name: terraform-state-${{ steps.e2e_test.outputs.namePrefix }}
runID: ${{ github.run_id }}
encryptionSecret: ${{ secrets.ARTIFACT_ENCRYPT_PASSWD }}
- name: Notify about failure
if: |
failure() &&
github.ref == 'refs/heads/main' &&
github.event_name == 'schedule'
continue-on-error: true
uses: ./.github/actions/notify_e2e_failure
with:
projectWriteToken: ${{ secrets.PROJECT_WRITE_TOKEN }}
refStream: "ref/release/stream/stable/?"
test: ${{ matrix.test }}
kubernetesVersion: ${{ matrix.kubernetesVersion }}
provider: stackit
attestationVariant: qemu-vtpm
clusterCreation: ${{ matrix.clusterCreation }}
- name: Notify STACKIT
if: |
failure() &&
github.ref == 'refs/heads/main' &&
github.event_name == 'schedule'
continue-on-error: true
uses: ./.github/actions/notify_stackit
with:
slackToken: ${{ secrets.SLACK_TOKEN }}

View File

@ -23,7 +23,7 @@ on:
type: choice type: choice
options: options:
- "ubuntu-24.04" - "ubuntu-24.04"
- "macos-latest" - "macos-12"
default: "ubuntu-24.04" default: "ubuntu-24.04"
test: test:
description: "The test to run." description: "The test to run."
@ -41,6 +41,7 @@ on:
required: true required: true
kubernetesVersion: kubernetesVersion:
description: "Kubernetes version to create the cluster from." description: "Kubernetes version to create the cluster from."
default: "1.28"
required: true required: true
releaseVersion: releaseVersion:
description: "Version of a released provider to download. Leave empty to build the provider from the checked out ref." description: "Version of a released provider to download. Leave empty to build the provider from the checked out ref."

View File

@ -10,7 +10,7 @@ jobs:
strategy: strategy:
fail-fast: false fail-fast: false
matrix: matrix:
refStream: ["ref/main/stream/nightly/?", "ref/main/stream/debug/?", "ref/release/stream/stable/?"] refStream: ["ref/main/stream/nightly/?","ref/main/stream/debug/?", "ref/release/stream/stable/?"]
name: Find latest image name: Find latest image
runs-on: ubuntu-24.04 runs-on: ubuntu-24.04
permissions: permissions:
@ -51,33 +51,6 @@ jobs:
# Tests on main-debug refStream # Tests on main-debug refStream
# #
# Emergency SSH test on latest k8s version
- test: "emergency ssh"
refStream: "ref/main/stream/debug/?"
attestationVariant: "gcp-sev-es"
kubernetes-version: "v1.30"
clusterCreation: "cli"
- test: "emergency ssh"
refStream: "ref/main/stream/debug/?"
attestationVariant: "gcp-sev-snp"
kubernetes-version: "v1.30"
clusterCreation: "cli"
- test: "emergency ssh"
refStream: "ref/main/stream/debug/?"
attestationVariant: "azure-sev-snp"
kubernetes-version: "v1.30"
clusterCreation: "cli"
- test: "emergency ssh"
refStream: "ref/main/stream/debug/?"
attestationVariant: "azure-tdx"
kubernetes-version: "v1.30"
clusterCreation: "cli"
- test: "emergency ssh"
refStream: "ref/main/stream/debug/?"
attestationVariant: "aws-sev-snp"
kubernetes-version: "v1.30"
clusterCreation: "cli"
# Sonobuoy full test on latest k8s version # Sonobuoy full test on latest k8s version
- test: "sonobuoy full" - test: "sonobuoy full"
refStream: "ref/main/stream/debug/?" refStream: "ref/main/stream/debug/?"
@ -116,55 +89,56 @@ jobs:
- test: "sonobuoy quick" - test: "sonobuoy quick"
refStream: "ref/main/stream/debug/?" refStream: "ref/main/stream/debug/?"
attestationVariant: "gcp-sev-es" attestationVariant: "gcp-sev-es"
kubernetes-version: "v1.30" kubernetes-version: "v1.29"
clusterCreation: "cli" clusterCreation: "cli"
- test: "sonobuoy quick" - test: "sonobuoy quick"
refStream: "ref/main/stream/debug/?" refStream: "ref/main/stream/debug/?"
attestationVariant: "gcp-sev-snp" attestationVariant: "gcp-sev-snp"
kubernetes-version: "v1.30" kubernetes-version: "v1.29"
clusterCreation: "cli" clusterCreation: "cli"
- test: "sonobuoy quick" - test: "sonobuoy quick"
refStream: "ref/main/stream/debug/?" refStream: "ref/main/stream/debug/?"
attestationVariant: "azure-sev-snp" attestationVariant: "azure-sev-snp"
kubernetes-version: "v1.30" kubernetes-version: "v1.29"
clusterCreation: "cli" clusterCreation: "cli"
- test: "sonobuoy quick" - test: "sonobuoy quick"
refStream: "ref/main/stream/debug/?" refStream: "ref/main/stream/debug/?"
attestationVariant: "azure-tdx" attestationVariant: "azure-tdx"
kubernetes-version: "v1.30" kubernetes-version: "v1.29"
clusterCreation: "cli" clusterCreation: "cli"
- test: "sonobuoy quick" - test: "sonobuoy quick"
refStream: "ref/main/stream/debug/?" refStream: "ref/main/stream/debug/?"
attestationVariant: "aws-sev-snp" attestationVariant: "aws-sev-snp"
kubernetes-version: "v1.30" kubernetes-version: "v1.29"
clusterCreation: "cli" clusterCreation: "cli"
- test: "sonobuoy quick" - test: "sonobuoy quick"
refStream: "ref/main/stream/debug/?" refStream: "ref/main/stream/debug/?"
attestationVariant: "gcp-sev-es" attestationVariant: "gcp-sev-es"
kubernetes-version: "v1.29" kubernetes-version: "v1.28"
clusterCreation: "cli" clusterCreation: "cli"
- test: "sonobuoy quick" - test: "sonobuoy quick"
refStream: "ref/main/stream/debug/?" refStream: "ref/main/stream/debug/?"
attestationVariant: "gcp-sev-snp" attestationVariant: "gcp-sev-snp"
kubernetes-version: "v1.29" kubernetes-version: "v1.28"
clusterCreation: "cli" clusterCreation: "cli"
- test: "sonobuoy quick" - test: "sonobuoy quick"
refStream: "ref/main/stream/debug/?" refStream: "ref/main/stream/debug/?"
attestationVariant: "azure-sev-snp" attestationVariant: "azure-sev-snp"
kubernetes-version: "v1.29" kubernetes-version: "v1.28"
clusterCreation: "cli" clusterCreation: "cli"
- test: "sonobuoy quick" - test: "sonobuoy quick"
refStream: "ref/main/stream/debug/?" refStream: "ref/main/stream/debug/?"
attestationVariant: "azure-tdx" attestationVariant: "azure-tdx"
kubernetes-version: "v1.29" kubernetes-version: "v1.28"
clusterCreation: "cli" clusterCreation: "cli"
- test: "sonobuoy quick" - test: "sonobuoy quick"
refStream: "ref/main/stream/debug/?" refStream: "ref/main/stream/debug/?"
attestationVariant: "aws-sev-snp" attestationVariant: "aws-sev-snp"
kubernetes-version: "v1.29" kubernetes-version: "v1.28"
clusterCreation: "cli" clusterCreation: "cli"
# verify test on latest k8s version # verify test on latest k8s version
- test: "verify" - test: "verify"
refStream: "ref/main/stream/debug/?" refStream: "ref/main/stream/debug/?"
@ -316,27 +290,27 @@ jobs:
- test: "verify" - test: "verify"
refStream: "ref/release/stream/stable/?" refStream: "ref/release/stream/stable/?"
attestationVariant: "gcp-sev-es" attestationVariant: "gcp-sev-es"
kubernetes-version: "v1.30" kubernetes-version: "v1.29"
clusterCreation: "cli" clusterCreation: "cli"
- test: "verify" - test: "verify"
refStream: "ref/release/stream/stable/?" refStream: "ref/release/stream/stable/?"
attestationVariant: "gcp-sev-snp" attestationVariant: "gcp-sev-snp"
kubernetes-version: "v1.30" kubernetes-version: "v1.29"
clusterCreation: "cli" clusterCreation: "cli"
- test: "verify" - test: "verify"
refStream: "ref/release/stream/stable/?" refStream: "ref/release/stream/stable/?"
attestationVariant: "azure-sev-snp" attestationVariant: "azure-sev-snp"
kubernetes-version: "v1.30" kubernetes-version: "v1.29"
clusterCreation: "cli" clusterCreation: "cli"
- test: "verify" - test: "verify"
refStream: "ref/release/stream/stable/?" refStream: "ref/release/stream/stable/?"
attestationVariant: "azure-tdx" attestationVariant: "azure-tdx"
kubernetes-version: "v1.30" kubernetes-version: "v1.29"
clusterCreation: "cli" clusterCreation: "cli"
- test: "verify" - test: "verify"
refStream: "ref/release/stream/stable/?" refStream: "ref/release/stream/stable/?"
attestationVariant: "aws-sev-snp" attestationVariant: "aws-sev-snp"
kubernetes-version: "v1.30" kubernetes-version: "v1.29"
clusterCreation: "cli" clusterCreation: "cli"
runs-on: ubuntu-24.04 runs-on: ubuntu-24.04
@ -446,7 +420,7 @@ jobs:
fail-fast: false fail-fast: false
max-parallel: 1 max-parallel: 1
matrix: matrix:
fromVersion: ["v2.22.0"] fromVersion: ["v2.19.3"]
attestationVariant: ["gcp-sev-snp", "azure-sev-snp", "azure-tdx", "aws-sev-snp"] attestationVariant: ["gcp-sev-snp", "azure-sev-snp", "azure-tdx", "aws-sev-snp"]
name: Run upgrade tests name: Run upgrade tests
secrets: inherit secrets: inherit
@ -479,7 +453,7 @@ jobs:
ref: ${{ !github.event.pull_request.head.repo.fork && github.head_ref || '' }} ref: ${{ !github.event.pull_request.head.repo.fork && github.head_ref || '' }}
- name: Azure login OIDC - name: Azure login OIDC
uses: azure/login@a457da9ea143d694b1b9c7c869ebb04ebe844ef5 # v2.3.0 uses: azure/login@a65d910e8af852a8061c627c456678983e180302 # v2.2.0
with: with:
client-id: ${{ secrets.AZURE_E2E_MINI_CLIENT_ID }} client-id: ${{ secrets.AZURE_E2E_MINI_CLIENT_ID }}
tenant-id: ${{ secrets.AZURE_TENANT_ID }} tenant-id: ${{ secrets.AZURE_TENANT_ID }}

View File

@ -16,7 +16,6 @@ on:
- "azure-sev-snp" - "azure-sev-snp"
- "azure-tdx" - "azure-tdx"
- "aws-sev-snp" - "aws-sev-snp"
- "stackit-qemu-vtpm"
default: "azure-sev-snp" default: "azure-sev-snp"
required: true required: true
runner: runner:
@ -24,7 +23,7 @@ on:
type: choice type: choice
options: options:
- "ubuntu-24.04" - "ubuntu-24.04"
- "macos-latest" - "macos-12"
default: "ubuntu-24.04" default: "ubuntu-24.04"
test: test:
description: "The test to run. The conformance test is only supported for clusterCreation=cli." description: "The test to run. The conformance test is only supported for clusterCreation=cli."
@ -40,12 +39,11 @@ on:
- "recover" - "recover"
- "malicious join" - "malicious join"
- "s3proxy" - "s3proxy"
- "emergency ssh"
- "nop" - "nop"
required: true required: true
kubernetesVersion: kubernetesVersion:
description: "Kubernetes version to create the cluster from." description: "Kubernetes version to create the cluster from."
default: "1.30" default: "1.29"
required: true required: true
cliVersion: cliVersion:
description: "Version of a released CLI to download. Leave empty to build the CLI from the checked out ref." description: "Version of a released CLI to download. Leave empty to build the CLI from the checked out ref."
@ -139,7 +137,6 @@ jobs:
workerNodes: ${{ steps.split-nodeCount.outputs.workerNodes }} workerNodes: ${{ steps.split-nodeCount.outputs.workerNodes }}
controlPlaneNodes: ${{ steps.split-nodeCount.outputs.controlPlaneNodes }} controlPlaneNodes: ${{ steps.split-nodeCount.outputs.controlPlaneNodes }}
cloudProvider: ${{ steps.split-attestationVariant.outputs.cloudProvider }} cloudProvider: ${{ steps.split-attestationVariant.outputs.cloudProvider }}
attestationVariant: ${{ steps.split-attestationVariant.outputs.attestationVariant }}
steps: steps:
- name: Split nodeCount - name: Split nodeCount
id: split-nodeCount id: split-nodeCount
@ -164,12 +161,6 @@ jobs:
attestationVariant="${{ inputs.attestationVariant }}" attestationVariant="${{ inputs.attestationVariant }}"
cloudProvider="${attestationVariant%%-*}" cloudProvider="${attestationVariant%%-*}"
# special case for STACKIT, as there's no special attestation variant for it
if [[ "${cloudProvider}" == "stackit" ]]; then
attestationVariant="qemu-vtpm"
fi
echo "attestationVariant=${attestationVariant}" | tee -a "$GITHUB_OUTPUT"
echo "cloudProvider=${cloudProvider}" | tee -a "$GITHUB_OUTPUT" echo "cloudProvider=${cloudProvider}" | tee -a "$GITHUB_OUTPUT"
find-latest-image: find-latest-image:
@ -233,7 +224,7 @@ jobs:
- name: Set up gcloud CLI (macOS) - name: Set up gcloud CLI (macOS)
if: needs.generate-input-parameters.outputs.cloudProvider == 'gcp' && runner.os == 'macOS' if: needs.generate-input-parameters.outputs.cloudProvider == 'gcp' && runner.os == 'macOS'
uses: google-github-actions/setup-gcloud@77e7a554d41e2ee56fc945c52dfd3f33d12def9a # v2.1.4 uses: google-github-actions/setup-gcloud@6189d56e4096ee891640bb02ac264be376592d6a # v2.1.2
- name: Run manual E2E test - name: Run manual E2E test
id: e2e_test id: e2e_test
@ -242,7 +233,7 @@ jobs:
workerNodesCount: ${{ needs.generate-input-parameters.outputs.workerNodes }} workerNodesCount: ${{ needs.generate-input-parameters.outputs.workerNodes }}
controlNodesCount: ${{ needs.generate-input-parameters.outputs.controlPlaneNodes }} controlNodesCount: ${{ needs.generate-input-parameters.outputs.controlPlaneNodes }}
cloudProvider: ${{ needs.generate-input-parameters.outputs.cloudProvider }} cloudProvider: ${{ needs.generate-input-parameters.outputs.cloudProvider }}
attestationVariant: ${{ needs.generate-input-parameters.outputs.attestationVariant }} attestationVariant: ${{ inputs.attestationVariant }}
machineType: ${{ inputs.machineType }} machineType: ${{ inputs.machineType }}
regionZone: ${{ inputs.regionZone }} regionZone: ${{ inputs.regionZone }}
gcpProject: constellation-e2e gcpProject: constellation-e2e
@ -271,9 +262,6 @@ jobs:
marketplaceImageVersion: ${{ inputs.marketplaceImageVersion }} marketplaceImageVersion: ${{ inputs.marketplaceImageVersion }}
force: ${{ inputs.force }} force: ${{ inputs.force }}
encryptionSecret: ${{ secrets.ARTIFACT_ENCRYPT_PASSWD }} encryptionSecret: ${{ secrets.ARTIFACT_ENCRYPT_PASSWD }}
openStackCloudsYaml: ${{ secrets.STACKIT_CI_CLOUDS_YAML }}
stackitUat: ${{ secrets.STACKIT_CI_UAT }}
stackitProjectID: ${{ secrets.STACKIT_CI_PROJECT_ID }}
- name: Always terminate cluster - name: Always terminate cluster
if: always() if: always()

View File

@ -268,13 +268,13 @@ jobs:
push: true push: true
- name: Upload CLI binary # is needed for the cleanup step - name: Upload CLI binary # is needed for the cleanup step
uses: actions/upload-artifact@ea165f8d65b6e75b540449e92b4886f43607fa02 # v4.6.2 uses: actions/upload-artifact@b4b15b8c7c6ac21ea08fcf65892d2ee8f75cf882 # v4.4.3
with: with:
name: constellation-upgrade-${{ inputs.attestationVariant }} name: constellation-upgrade-${{ inputs.attestationVariant }}
path: build/constellation path: build/constellation
- name: Login to AWS - name: Login to AWS
uses: aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1.0 uses: aws-actions/configure-aws-credentials@e3dd6a429d7300a6a4c196c26e071d42e0343502 # v4.0.2
with: with:
role-to-assume: arn:aws:iam::795746500882:role/GithubConstellationVersionsAPIRead role-to-assume: arn:aws:iam::795746500882:role/GithubConstellationVersionsAPIRead
aws-region: eu-central-1 aws-region: eu-central-1
@ -296,7 +296,7 @@ jobs:
- name: Login to AWS (IAM role) - name: Login to AWS (IAM role)
if: needs.generate-input-parameters.outputs.cloudProvider == 'aws' if: needs.generate-input-parameters.outputs.cloudProvider == 'aws'
uses: aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1.0 uses: aws-actions/configure-aws-credentials@e3dd6a429d7300a6a4c196c26e071d42e0343502 # v4.0.2
with: with:
role-to-assume: arn:aws:iam::795746500882:role/GithubActionsE2EIAM role-to-assume: arn:aws:iam::795746500882:role/GithubActionsE2EIAM
aws-region: eu-central-1 aws-region: eu-central-1
@ -347,7 +347,7 @@ jobs:
- name: Login to AWS (Cluster role) - name: Login to AWS (Cluster role)
if: always() && needs.generate-input-parameters.outputs.cloudProvider == 'aws' if: always() && needs.generate-input-parameters.outputs.cloudProvider == 'aws'
uses: aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1.0 uses: aws-actions/configure-aws-credentials@e3dd6a429d7300a6a4c196c26e071d42e0343502 # v4.0.2
with: with:
role-to-assume: arn:aws:iam::795746500882:role/GithubActionsE2ECluster role-to-assume: arn:aws:iam::795746500882:role/GithubActionsE2ECluster
aws-region: eu-central-1 aws-region: eu-central-1
@ -424,7 +424,7 @@ jobs:
ref: ${{ inputs.gitRef }} ref: ${{ inputs.gitRef }}
- name: Download CLI - name: Download CLI
uses: actions/download-artifact@95815c38cf2ff2164869cbab79da8d1f422bc89e # v4.2.1 uses: actions/download-artifact@fa0a91b85d4f404e444e00e005971372dc801d16 # v4.1.8
with: with:
name: constellation-upgrade-${{ inputs.attestationVariant }} name: constellation-upgrade-${{ inputs.attestationVariant }}
path: build path: build

View File

@ -45,14 +45,14 @@ jobs:
push: true push: true
- name: Upload CLI artifact - name: Upload CLI artifact
uses: actions/upload-artifact@ea165f8d65b6e75b540449e92b4886f43607fa02 # v4.6.2 uses: actions/upload-artifact@b4b15b8c7c6ac21ea08fcf65892d2ee8f75cf882 # v4.4.3
with: with:
path: build/constellation.exe path: build/constellation.exe
name: "constell-exe" name: "constell-exe"
e2e-test: e2e-test:
name: E2E Test Windows name: E2E Test Windows
runs-on: windows-2025 runs-on: windows-2022
needs: build-cli needs: build-cli
steps: steps:
- name: Checkout - name: Checkout
@ -61,7 +61,7 @@ jobs:
ref: ${{ !github.event.pull_request.head.repo.fork && github.head_ref || '' }} ref: ${{ !github.event.pull_request.head.repo.fork && github.head_ref || '' }}
- name: Download CLI artifact - name: Download CLI artifact
uses: actions/download-artifact@95815c38cf2ff2164869cbab79da8d1f422bc89e # v4.2.1 uses: actions/download-artifact@fa0a91b85d4f404e444e00e005971372dc801d16 # v4.1.8
with: with:
name: "constell-exe" name: "constell-exe"

View File

@ -142,7 +142,7 @@ jobs:
- uses: ./.github/actions/setup_bazel_nix - uses: ./.github/actions/setup_bazel_nix
- name: Login to AWS - name: Login to AWS
uses: aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1.0 uses: aws-actions/configure-aws-credentials@e3dd6a429d7300a6a4c196c26e071d42e0343502 # v4.0.2
with: with:
role-to-assume: arn:aws:iam::795746500882:role/GitHubConstellationImagePipeline role-to-assume: arn:aws:iam::795746500882:role/GitHubConstellationImagePipeline
aws-region: eu-central-1 aws-region: eu-central-1

View File

@ -23,7 +23,7 @@ jobs:
ref: ${{ github.head_ref }} ref: ${{ github.head_ref }}
- name: Login to AWS - name: Login to AWS
uses: aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1.0 uses: aws-actions/configure-aws-credentials@e3dd6a429d7300a6a4c196c26e071d42e0343502 # v4.0.2
with: with:
role-to-assume: arn:aws:iam::795746500882:role/GithubConstellationVersionsAPIRead role-to-assume: arn:aws:iam::795746500882:role/GithubConstellationVersionsAPIRead
aws-region: eu-central-1 aws-region: eu-central-1

View File

@ -118,7 +118,7 @@ jobs:
sed -i 's/fromVersion: \["[^"]*"\]/fromVersion: ["${{ inputs.version }}"]/g' .github/workflows/e2e-test-weekly.yml sed -i 's/fromVersion: \["[^"]*"\]/fromVersion: ["${{ inputs.version }}"]/g' .github/workflows/e2e-test-weekly.yml
- name: Create docs pull request - name: Create docs pull request
uses: peter-evans/create-pull-request@271a8d0340265f705b14b6d32b9829c1cb33d45e # v7.0.8 uses: peter-evans/create-pull-request@5e914681df9dc83aa4e4905692ca88beb2f9e91f # v7.0.5
with: with:
branch: ${{ env.BRANCH }} branch: ${{ env.BRANCH }}
base: main base: main
@ -239,17 +239,6 @@ jobs:
stream: "stable" stream: "stable"
ref: ${{ needs.verify-inputs.outputs.WORKING_BRANCH }} ref: ${{ needs.verify-inputs.outputs.WORKING_BRANCH }}
check-measurements-reproducibility:
name: Check measurements reproducibility
needs: [verify-inputs, os-image]
runs-on: ubuntu-24.04
steps:
- name: Check reproducibility
uses: ./.github/actions/check_measurements_reproducibility
with:
version: ${{ inputs.version }}
ref: ${{ needs.verify-inputs.outputs.WORKING_BRANCH }}
update-hardcoded-measurements: update-hardcoded-measurements:
name: Update hardcoded measurements (in the CLI) name: Update hardcoded measurements (in the CLI)
needs: [verify-inputs, os-image] needs: [verify-inputs, os-image]
@ -266,9 +255,9 @@ jobs:
ref: ${{ needs.verify-inputs.outputs.WORKING_BRANCH }} ref: ${{ needs.verify-inputs.outputs.WORKING_BRANCH }}
- name: Setup Go environment - name: Setup Go environment
uses: actions/setup-go@0aaccfd150d50ccaeb58ebd88d36e91967a5f35b # v5.4.0 uses: actions/setup-go@41dfa10bad2bb2ae585af6ee5bb4d7d973ad74ed # v5.1.0
with: with:
go-version: "1.24.2" go-version: "1.23.2"
cache: true cache: true
- name: Build generateMeasurements tool - name: Build generateMeasurements tool

View File

@ -13,9 +13,6 @@ on:
workflow_dispatch: workflow_dispatch:
schedule: schedule:
- cron: "45 06 * * 1" # Every Monday at 6:45am - cron: "45 06 * * 1" # Every Monday at 6:45am
pull_request:
paths:
- .github/workflows/reproducible-builds.yml
jobs: jobs:
build-binaries: build-binaries:
@ -51,16 +48,15 @@ jobs:
- name: Setup dependencies (eccentric) - name: Setup dependencies (eccentric)
if: matrix.deps == 'eccentric' if: matrix.deps == 'eccentric'
run: | run: |
bazelVersion=$(cat .bazelversion) version=$(cat .bazelversion)
mkdir -p "$HOME/.local/bin" mkdir -p "$HOME/.local/bin"
curl -fsSL -o "$HOME/.local/bin/bazel" "https://github.com/bazelbuild/bazel/releases/download/$bazelVersion/bazel-$bazelVersion-linux-x86_64" curl -fsSL -o "$HOME/.local/bin/bazel" "https://github.com/bazelbuild/bazel/releases/download/$version/bazel-$version-linux-x86_64"
chmod a+x "$HOME/.local/bin/bazel" chmod a+x "$HOME/.local/bin/bazel"
echo "$HOME/.local/bin" >> "$GITHUB_PATH" echo "$HOME/.local/bin" >> "$GITHUB_PATH"
curl -fsSL -o "$HOME/.local/bin/nix-installer" https://github.com/DeterminateSystems/nix-installer/releases/download/v3.2.1/nix-installer-x86_64-linux # renovate:github-release curl -fsSL -o "$HOME/.local/bin/nix-installer" https://github.com/DeterminateSystems/nix-installer/releases/download/v0.26.3/nix-installer-x86_64-linux # renovate:github-release
nixVersion=$(cat .nixversion)
chmod a+x "$HOME/.local/bin/nix-installer" chmod a+x "$HOME/.local/bin/nix-installer"
"$HOME/.local/bin/nix-installer" install --no-confirm --nix-package-url "https://releases.nixos.org/nix/nix-$nixVersion/nix-$nixVersion-x86_64-linux.tar.xz" "$HOME/.local/bin/nix-installer" install --no-confirm
- name: Build - name: Build
shell: bash shell: bash
@ -81,13 +77,13 @@ jobs:
run: shasum -a 256 "${binary}" | tee "${binary}.sha256" run: shasum -a 256 "${binary}" | tee "${binary}.sha256"
- name: Upload binary artifact - name: Upload binary artifact
uses: actions/upload-artifact@ea165f8d65b6e75b540449e92b4886f43607fa02 # v4.6.2 uses: actions/upload-artifact@b4b15b8c7c6ac21ea08fcf65892d2ee8f75cf882 # v4.4.3
with: with:
name: "binaries-${{ matrix.target }}-${{ matrix.runner }}-${{ matrix.deps }}" name: "binaries-${{ matrix.target }}-${{ matrix.runner }}-${{ matrix.deps }}"
path: "${{ env.binary }}" path: "${{ env.binary }}"
- name: Upload hash artifact - name: Upload hash artifact
uses: actions/upload-artifact@ea165f8d65b6e75b540449e92b4886f43607fa02 # v4.6.2 uses: actions/upload-artifact@b4b15b8c7c6ac21ea08fcf65892d2ee8f75cf882 # v4.4.3
with: with:
name: "sha256sums-${{ matrix.target }}-${{ matrix.runner }}-${{ matrix.deps }}" name: "sha256sums-${{ matrix.target }}-${{ matrix.runner }}-${{ matrix.deps }}"
path: "${{ env.binary }}.sha256" path: "${{ env.binary }}.sha256"
@ -146,13 +142,13 @@ jobs:
run: shasum -a 256 "${binary}" | tee "${binary}.sha256" run: shasum -a 256 "${binary}" | tee "${binary}.sha256"
- name: Upload binary artifact - name: Upload binary artifact
uses: actions/upload-artifact@ea165f8d65b6e75b540449e92b4886f43607fa02 # v4.6.2 uses: actions/upload-artifact@b4b15b8c7c6ac21ea08fcf65892d2ee8f75cf882 # v4.4.3
with: with:
name: "osimages-${{ matrix.target }}-${{ matrix.runner }}" name: "osimages-${{ matrix.target }}-${{ matrix.runner }}"
path: "${{ env.binary }}" path: "${{ env.binary }}"
- name: Upload hash artifact - name: Upload hash artifact
uses: actions/upload-artifact@ea165f8d65b6e75b540449e92b4886f43607fa02 # v4.6.2 uses: actions/upload-artifact@b4b15b8c7c6ac21ea08fcf65892d2ee8f75cf882 # v4.4.3
with: with:
name: "sha256sums-${{ matrix.target }}-${{ matrix.runner }}" name: "sha256sums-${{ matrix.target }}-${{ matrix.runner }}"
path: "${{ env.binary }}.sha256" path: "${{ env.binary }}.sha256"
@ -175,7 +171,7 @@ jobs:
ref: ${{ !github.event.pull_request.head.repo.fork && github.head_ref || '' }} ref: ${{ !github.event.pull_request.head.repo.fork && github.head_ref || '' }}
- name: Download binaries - name: Download binaries
uses: actions/download-artifact@95815c38cf2ff2164869cbab79da8d1f422bc89e # v4.2.1 uses: actions/download-artifact@fa0a91b85d4f404e444e00e005971372dc801d16 # v4.1.8
with: with:
pattern: "binaries-${{ matrix.target }}-*" pattern: "binaries-${{ matrix.target }}-*"
merge-multiple: true merge-multiple: true
@ -209,7 +205,7 @@ jobs:
ref: ${{ !github.event.pull_request.head.repo.fork && github.head_ref || '' }} ref: ${{ !github.event.pull_request.head.repo.fork && github.head_ref || '' }}
- name: Download os images - name: Download os images
uses: actions/download-artifact@95815c38cf2ff2164869cbab79da8d1f422bc89e # v4.2.1 uses: actions/download-artifact@fa0a91b85d4f404e444e00e005971372dc801d16 # v4.1.8
with: with:
pattern: "osimages-${{ matrix.target }}-*" pattern: "osimages-${{ matrix.target }}-*"
merge-multiple: true merge-multiple: true

View File

@ -23,20 +23,20 @@ jobs:
persist-credentials: false persist-credentials: false
- name: Run analysis - name: Run analysis
uses: ossf/scorecard-action@f49aabe0b5af0936a0987cfb85d86b75731b0186 # v2.4.1 uses: ossf/scorecard-action@62b2cac7ed8198b15735ed49ab1e5cf35480ba46 # v2.4.0
with: with:
results_file: results.sarif results_file: results.sarif
results_format: sarif results_format: sarif
publish_results: true publish_results: true
- name: Upload artifact - name: Upload artifact
uses: actions/upload-artifact@ea165f8d65b6e75b540449e92b4886f43607fa02 # v4.6.2 uses: actions/upload-artifact@b4b15b8c7c6ac21ea08fcf65892d2ee8f75cf882 # v4.4.3
with: with:
name: SARIF file name: SARIF file
path: results.sarif path: results.sarif
retention-days: 5 retention-days: 5
- name: Upload to code-scanning - name: Upload to code-scanning
uses: github/codeql-action/upload-sarif@45775bd8235c68ba998cffa5171334d58593da47 # v3.28.15 uses: github/codeql-action/upload-sarif@f09c1c0a94de965c15400f5634aa42fac8fb8f88 # v3.27.5
with: with:
sarif_file: results.sarif sarif_file: results.sarif

View File

@ -40,7 +40,7 @@ jobs:
- name: Create pull request - name: Create pull request
id: create-pull-request id: create-pull-request
uses: peter-evans/create-pull-request@271a8d0340265f705b14b6d32b9829c1cb33d45e # v7.0.8 uses: peter-evans/create-pull-request@5e914681df9dc83aa4e4905692ca88beb2f9e91f # v7.0.5
with: with:
path: terraform-provider-constellation path: terraform-provider-constellation
branch: "feat/docs/update" branch: "feat/docs/update"

View File

@ -26,9 +26,9 @@ jobs:
ref: ${{ !github.event.pull_request.head.repo.fork && github.head_ref || '' }} ref: ${{ !github.event.pull_request.head.repo.fork && github.head_ref || '' }}
- name: Setup Go environment - name: Setup Go environment
uses: actions/setup-go@0aaccfd150d50ccaeb58ebd88d36e91967a5f35b # v5.4.0 uses: actions/setup-go@41dfa10bad2bb2ae585af6ee5bb4d7d973ad74ed # v5.1.0
with: with:
go-version: "1.24.2" go-version: "1.23.2"
cache: true cache: true
- name: Run code generation - name: Run code generation

View File

@ -37,7 +37,7 @@ jobs:
- name: Assume AWS role to upload Bazel dependencies to S3 - name: Assume AWS role to upload Bazel dependencies to S3
if: startsWith(github.head_ref, 'renovate/') if: startsWith(github.head_ref, 'renovate/')
uses: aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1.0 uses: aws-actions/configure-aws-credentials@e3dd6a429d7300a6a4c196c26e071d42e0343502 # v4.0.2
with: with:
role-to-assume: arn:aws:iam::795746500882:role/GithubConstellationMirrorWrite role-to-assume: arn:aws:iam::795746500882:role/GithubConstellationMirrorWrite
aws-region: eu-central-1 aws-region: eu-central-1

View File

@ -49,7 +49,7 @@ jobs:
rm -rf awscliv2.zip aws rm -rf awscliv2.zip aws
- name: Login to AWS (IAM role) - name: Login to AWS (IAM role)
uses: aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1.0 uses: aws-actions/configure-aws-credentials@e3dd6a429d7300a6a4c196c26e071d42e0343502 # v4.0.2
with: with:
role-to-assume: arn:aws:iam::795746500882:role/GithubActionGocoverage role-to-assume: arn:aws:iam::795746500882:role/GithubActionGocoverage
aws-region: eu-central-1 aws-region: eu-central-1
@ -69,7 +69,7 @@ jobs:
- name: Comment coverage - name: Comment coverage
if: steps.coverage.outputs.uploadable == 'true' && github.event_name == 'pull_request' if: steps.coverage.outputs.uploadable == 'true' && github.event_name == 'pull_request'
uses: marocchino/sticky-pull-request-comment@67d0dec7b07ed060a405f9b2a64b8ab319fdd7db # v2.9.2 uses: marocchino/sticky-pull-request-comment@331f8f5b4215f0445d3c07b4967662a32a2d3e31 # v2.9.0
with: with:
header: coverage header: coverage
path: coverage_diff.md path: coverage_diff.md

View File

@ -18,7 +18,7 @@ jobs:
token: ${{ secrets.CI_COMMIT_PUSH_PR }} token: ${{ secrets.CI_COMMIT_PUSH_PR }}
- name: Assume AWS role to upload Bazel dependencies to S3 - name: Assume AWS role to upload Bazel dependencies to S3
uses: aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1.0 uses: aws-actions/configure-aws-credentials@e3dd6a429d7300a6a4c196c26e071d42e0343502 # v4.0.2
with: with:
role-to-assume: arn:aws:iam::795746500882:role/GithubConstellationMirrorWrite role-to-assume: arn:aws:iam::795746500882:role/GithubConstellationMirrorWrite
aws-region: eu-central-1 aws-region: eu-central-1
@ -39,7 +39,7 @@ jobs:
fi fi
- name: Create pull request - name: Create pull request
uses: peter-evans/create-pull-request@271a8d0340265f705b14b6d32b9829c1cb33d45e # v7.0.8 uses: peter-evans/create-pull-request@5e914681df9dc83aa4e4905692ca88beb2f9e91f # v7.0.5
with: with:
branch: "image/automated/update-rpms-${{ github.run_number }}" branch: "image/automated/update-rpms-${{ github.run_number }}"
base: main base: main

View File

@ -149,21 +149,21 @@ jobs:
- name: Login to AWS without write access - name: Login to AWS without write access
if: steps.check-rights.outputs.write == 'false' if: steps.check-rights.outputs.write == 'false'
uses: aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1.0 uses: aws-actions/configure-aws-credentials@e3dd6a429d7300a6a4c196c26e071d42e0343502 # v4.0.2
with: with:
role-to-assume: arn:aws:iam::795746500882:role/GithubConstellationVersionsAPIRead role-to-assume: arn:aws:iam::795746500882:role/GithubConstellationVersionsAPIRead
aws-region: eu-central-1 aws-region: eu-central-1
- name: Login to AWS with write access - name: Login to AWS with write access
if: steps.check-rights.outputs.write == 'true' && steps.check-rights.outputs.auth == 'false' if: steps.check-rights.outputs.write == 'true' && steps.check-rights.outputs.auth == 'false'
uses: aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1.0 uses: aws-actions/configure-aws-credentials@e3dd6a429d7300a6a4c196c26e071d42e0343502 # v4.0.2
with: with:
role-to-assume: arn:aws:iam::795746500882:role/GithubConstellationVersionsAPIWrite role-to-assume: arn:aws:iam::795746500882:role/GithubConstellationVersionsAPIWrite
aws-region: eu-central-1 aws-region: eu-central-1
- name: Login to AWS with write and image remove access - name: Login to AWS with write and image remove access
if: steps.check-rights.outputs.write == 'true' && steps.check-rights.outputs.auth == 'true' if: steps.check-rights.outputs.write == 'true' && steps.check-rights.outputs.auth == 'true'
uses: aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1.0 uses: aws-actions/configure-aws-credentials@e3dd6a429d7300a6a4c196c26e071d42e0343502 # v4.0.2
with: with:
role-to-assume: arn:aws:iam::795746500882:role/GithubConstellationVersionsAPIRemove role-to-assume: arn:aws:iam::795746500882:role/GithubConstellationVersionsAPIRemove
aws-region: eu-central-1 aws-region: eu-central-1

View File

@ -1,65 +1,53 @@
version: "2"
run: run:
timeout: 10m
build-tags: build-tags:
- integration - integration
- e2e - e2e
modules-download-mode: readonly modules-download-mode: readonly
output: output:
formats: formats:
tab: - format: tab
path: stdout path: stdout
colors: false sort-results: true
linters: linters:
enable: enable:
# Default linters
- errcheck
- gosimple
- govet
- ineffassign
- staticcheck
- typecheck
- unused
# Additional linters
- bodyclose - bodyclose
- copyloopvar
- errname - errname
- copyloopvar
- godot - godot
- gofmt
- gofumpt
- misspell - misspell
- noctx - noctx
- revive - revive
- tenv
- unconvert - unconvert
- unparam - unparam
- usetesting
settings:
errcheck:
exclude-functions:
- (*go.uber.org/zap.Logger).Sync
- (*google.golang.org/grpc.Server).Serve
exclusions:
generated: lax
presets:
- common-false-positives
- legacy
- std-error-handling
paths:
- 3rdparty/node-maintenance-operator
rules:
# TODO(burgerdev): these exclusions have been added to ease migration to v2 and should eventually be addressed.
- linters: ["staticcheck"]
text: "QF1008: could remove embedded field"
- linters: ["staticcheck"]
text: "QF1001: could apply De Morgan's law"
- linters: ["staticcheck"]
text: "ST1005: error strings should not be capitalized"
- linters: ["revive"]
text: "package-comments: package comment should be of the form"
- linters: ["revive"]
text: "package-comments: should have a package comment"
- linters: ["staticcheck"]
text: "QF1012: Use fmt.Fprintf"
- linters: ["staticcheck"]
text: "ST1019"
issues: issues:
max-issues-per-linter: 0 max-issues-per-linter: 0
max-same-issues: 20 max-same-issues: 20
formatters: exclude-dirs:
enable: - 3rdparty/node-maintenance-operator
- gofmt include:
- gofumpt - EXC0012
exclusions: - EXC0014
generated: lax
paths: linters-settings:
- 3rdparty/node-maintenance-operator errcheck:
# List of functions to exclude from checking, where each entry is a single function to exclude.
# See https://github.com/kisielk/errcheck#excluding-functions for details.
exclude-functions:
- (*go.uber.org/zap.Logger).Sync
- (*google.golang.org/grpc.Server).Serve

View File

@ -1 +0,0 @@
2.25.2

View File

@ -1,13 +0,0 @@
load("//bazel/sh:def.bzl", "sh_template")
sh_template(
name = "pull_files",
data = [
"@com_github_kubernetes_sigs_aws_load_balancer_controller//:lb_policy",
],
substitutions = {
"@@POLICY_SRC@@": "$(rootpath @com_github_kubernetes_sigs_aws_load_balancer_controller//:lb_policy)",
},
template = "pull_files.sh",
visibility = ["//visibility:public"],
)

View File

@ -1,24 +0,0 @@
#!/usr/bin/env bash
###### script header ######
lib=$(realpath @@BASE_LIB@@) || exit 1
stat "${lib}" >> /dev/null || exit 1
# shellcheck source=../../../bazel/sh/lib.bash
if ! source "${lib}"; then
echo "Error: could not find import"
exit 1
fi
controller_policy_source="@@POLICY_SRC@@"
###### script body ######
controller_policy_real_source=$(realpath "${controller_policy_source}")
cd "${BUILD_WORKSPACE_DIRECTORY}" # needs to be done after realpath
targetDir="terraform/infrastructure/iam/aws/alb_policy.json"
cp "${controller_policy_real_source}" "${targetDir}"

View File

@ -1,22 +0,0 @@
"""A module defining the source of the AWS load balancer controller."""
load("@bazel_tools//tools/build_defs/repo:http.bzl", "http_archive")
def aws_load_balancer_controller_deps():
http_archive(
name = "com_github_kubernetes_sigs_aws_load_balancer_controller",
urls = [
"https://cdn.confidential.cloud/constellation/cas/sha256/422af7c03ebc73e1be6aea563475ec9ea6396071fa03158b9a3984aa621b8cb1",
"https://github.com/kubernetes-sigs/aws-load-balancer-controller/archive/refs/tags/v2.12.0.tar.gz",
],
strip_prefix = "aws-load-balancer-controller-2.12.0",
build_file_content = """
filegroup(
srcs = ["docs/install/iam_policy.json"],
name = "lb_policy",
visibility = ["//visibility:public"],
)
""",
type = "tar.gz",
sha256 = "422af7c03ebc73e1be6aea563475ec9ea6396071fa03158b9a3984aa621b8cb1",
)

View File

@ -1,4 +1,4 @@
FROM ubuntu:24.04@sha256:1e622c5f073b4f6bfad6632f2616c7f59ef256e96fe78bf6a595d1dc4376ac02 as build FROM ubuntu:22.04@sha256:0e5e4a57c2499249aafc3b40fcd541e9a456aab7296681a3994d631587203f97 as build
# Install packages # Install packages
RUN apt-get update && apt-get install -y \ RUN apt-get update && apt-get install -y \
@ -6,7 +6,7 @@ RUN apt-get update && apt-get install -y \
git git
# Install Go # Install Go
ARG GO_VER=1.24.2 ARG GO_VER=1.22.3
RUN wget -q https://go.dev/dl/go${GO_VER}.linux-amd64.tar.gz && \ RUN wget -q https://go.dev/dl/go${GO_VER}.linux-amd64.tar.gz && \
tar -C /usr/local -xzf go${GO_VER}.linux-amd64.tar.gz && \ tar -C /usr/local -xzf go${GO_VER}.linux-amd64.tar.gz && \
rm go${GO_VER}.linux-amd64.tar.gz rm go${GO_VER}.linux-amd64.tar.gz

View File

@ -1,6 +1,6 @@
module(name = "constellation") module(name = "constellation")
bazel_dep(name = "aspect_bazel_lib", version = "2.14.0") bazel_dep(name = "aspect_bazel_lib", version = "2.9.4")
bazel_lib = use_extension("@aspect_bazel_lib//lib:extensions.bzl", "toolchains") bazel_lib = use_extension("@aspect_bazel_lib//lib:extensions.bzl", "toolchains")
bazel_lib.yq() bazel_lib.yq()
@ -8,21 +8,21 @@ use_repo(bazel_lib, "jq_toolchains")
use_repo(bazel_lib, "yq_toolchains") use_repo(bazel_lib, "yq_toolchains")
bazel_dep(name = "bazel_skylib", version = "1.7.1") bazel_dep(name = "bazel_skylib", version = "1.7.1")
bazel_dep(name = "gazelle", version = "0.42.0") bazel_dep(name = "gazelle", version = "0.39.1")
bazel_dep(name = "hermetic_cc_toolchain", version = "3.2.0") bazel_dep(name = "hermetic_cc_toolchain", version = "3.1.1")
bazel_dep(name = "rules_cc", version = "0.1.1") bazel_dep(name = "rules_cc", version = "0.1.0")
bazel_dep(name = "rules_go", version = "0.53.0", repo_name = "io_bazel_rules_go") bazel_dep(name = "rules_go", version = "0.50.1", repo_name = "io_bazel_rules_go")
bazel_dep(name = "rules_pkg", version = "1.1.0") bazel_dep(name = "rules_pkg", version = "0.10.1")
bazel_dep(name = "rules_proto", version = "7.1.0") bazel_dep(name = "rules_proto", version = "6.0.2")
bazel_dep(name = "rules_python", version = "1.3.0") bazel_dep(name = "rules_python", version = "0.40.0")
bazel_dep(name = "buildifier_prebuilt", version = "8.0.1", dev_dependency = True) bazel_dep(name = "buildifier_prebuilt", version = "6.4.0", dev_dependency = True)
go_sdk = use_extension("@io_bazel_rules_go//go:extensions.bzl", "go_sdk") go_sdk = use_extension("@io_bazel_rules_go//go:extensions.bzl", "go_sdk")
go_sdk.download( go_sdk.download(
name = "go_sdk", name = "go_sdk",
patches = ["//3rdparty/bazel/org_golang:go_tls_max_handshake_size.patch"], patches = ["//3rdparty/bazel/org_golang:go_tls_max_handshake_size.patch"],
version = "1.24.2", version = "1.23.2",
) )
python = use_extension("@rules_python//python/extensions:python.bzl", "python") python = use_extension("@rules_python//python/extensions:python.bzl", "python")

4525
MODULE.bazel.lock generated

File diff suppressed because it is too large Load Diff

View File

@ -234,10 +234,6 @@ load("//3rdparty/bazel/com_github_medik8s_node_maintainance_operator:source.bzl"
node_maintainance_operator_deps() node_maintainance_operator_deps()
load("//3rdparty/bazel/com_github_kubernetes_sigs_aws_load_balancer_controller:source.bzl", "aws_load_balancer_controller_deps")
aws_load_balancer_controller_deps()
# CI deps # CI deps
load("//bazel/toolchains:ci_deps.bzl", "ci_deps") load("//bazel/toolchains:ci_deps.bzl", "ci_deps")

View File

@ -1,7 +1,7 @@
load("@buildifier_prebuilt//:rules.bzl", "buildifier", "buildifier_test") load("@buildifier_prebuilt//:rules.bzl", "buildifier", "buildifier_test")
load("@com_github_ash2k_bazel_tools//multirun:def.bzl", "multirun") load("@com_github_ash2k_bazel_tools//multirun:def.bzl", "multirun")
load("@gazelle//:def.bzl", "gazelle") load("@gazelle//:def.bzl", "gazelle")
load("//bazel/ci:go_bin_for_host.bzl", "go_bin_for_host") load("@io_bazel_rules_go//go/private/rules:go_bin_for_host.bzl", "go_bin_for_host")
load("//bazel/ci:proto_targets.bzl", "proto_targets") load("//bazel/ci:proto_targets.bzl", "proto_targets")
load("//bazel/sh:def.bzl", "noop_warn", "repo_command", "sh_template") load("//bazel/sh:def.bzl", "noop_warn", "repo_command", "sh_template")
@ -558,7 +558,6 @@ multirun(
commands = [ commands = [
":terraform_gen", ":terraform_gen",
"//3rdparty/bazel/com_github_medik8s_node_maintainance_operator:pull_files", "//3rdparty/bazel/com_github_medik8s_node_maintainance_operator:pull_files",
"//3rdparty/bazel/com_github_kubernetes_sigs_aws_load_balancer_controller:pull_files",
":go_generate", ":go_generate",
":proto_generate", ":proto_generate",
], ],

View File

@ -1,29 +0,0 @@
"""
Go toolchain for the host platformS
Inspired by https://github.com/bazel-contrib/rules_go/blob/6e4fdcfeb1a333b54ab39ae3413d4ded46d8958d/go/private/rules/go_bin_for_host.bzl
"""
load("@local_config_platform//:constraints.bzl", "HOST_CONSTRAINTS")
GO_TOOLCHAIN = "@io_bazel_rules_go//go:toolchain"
def _ensure_target_cfg(ctx):
if "-exec" in ctx.bin_dir.path or "/host/" in ctx.bin_dir.path:
fail("exec not found")
def _go_bin_for_host_impl(ctx):
_ensure_target_cfg(ctx)
sdk = ctx.toolchains[GO_TOOLCHAIN].sdk
sdk_files = ctx.runfiles([sdk.go] + sdk.headers.to_list() + sdk.libs.to_list() + sdk.srcs.to_list() + sdk.tools.to_list())
return [
DefaultInfo(
files = depset([sdk.go]),
runfiles = sdk_files,
),
]
go_bin_for_host = rule(
implementation = _go_bin_for_host_impl,
toolchains = [GO_TOOLCHAIN],
exec_compatible_with = HOST_CONSTRAINTS,
)

View File

@ -63,8 +63,6 @@ license_report() {
github.com/edgelesssys/constellation/v2/operators/constellation-node-operator/api) ;; github.com/edgelesssys/constellation/v2/operators/constellation-node-operator/api) ;;
github.com/edgelesssys/go-tdx-qpl) ;;
*) *)
not_allowed not_allowed
;; ;;
@ -73,6 +71,8 @@ license_report() {
Unknown) Unknown)
case ${pkg} in case ${pkg} in
github.com/edgelesssys/go-tdx-qpl/*) ;;
*) *)
not_allowed not_allowed
;; ;;

View File

@ -27,16 +27,11 @@ submodules=$(${go} list -f '{{.Dir}}' -m)
PATH=$(dirname "${go}"):${PATH} PATH=$(dirname "${go}"):${PATH}
check_module() { check_module() {
excluded_osvs=(
"GO-2025-3521" # Kubernetes GitRepo Volume Inadvertent Local Repository Access
"GO-2025-3547" # Kubernetes kube-apiserver Vulnerable to Race Condition
)
# shellcheck disable=SC2016 # The $ sign in the single quoted string is correct. # shellcheck disable=SC2016 # The $ sign in the single quoted string is correct.
CGO_ENABLED=0 ${govulncheck} -C "$1" -format json "./..." | CGO_ENABLED=0 ${govulncheck} -C "$1" -format json "./..." |
"${jq}" --argjson excluded "$(printf '"%s"\n' "${excluded_osvs[@]}" | jq -s)" -sr ' "${jq}" -sr '
(map(select(.osv) | {"key": .osv.id, "value": .osv.summary}) | from_entries) as $osvs | (map(select(.osv) | {"key": .osv.id, "value": .osv.summary}) | from_entries) as $osvs |
map(select( .finding and all($excluded[] != .finding.osv; .) ) | .finding | select( .trace[-1].module | startswith("github.com/edgelesssys/") )) | map(select( .finding and .finding.osv != "GO-2024-3166" ) | .finding | select( .trace[-1].module | startswith("github.com/edgelesssys/") )) |
group_by(.osv) | group_by(.osv) |
map( {"osv": .[0].osv, "summary": $osvs[.[0].osv], "traces": [.[] | [.trace[] | .module]]} ) | map( {"osv": .[0].osv, "summary": $osvs[.[0].osv], "traces": [.[] | [.trace[] | .module]]} ) |
if length > 0 then halt_error(1) else .[] end' if length > 0 then halt_error(1) else .[] end'

View File

@ -46,6 +46,7 @@ excludeDirs=(
excludeLockDirs=( excludeLockDirs=(
"build" "build"
"terraform-provider-constellation" "terraform-provider-constellation"
"terraform/legacy-module"
) )
excludeCheckDirs=( excludeCheckDirs=(

View File

@ -5,14 +5,17 @@ based on https://github.com/bazelbuild/rules_go/issues/2111#issuecomment-1355927
""" """
load("@aspect_bazel_lib//lib:write_source_files.bzl", "write_source_files") load("@aspect_bazel_lib//lib:write_source_files.bzl", "write_source_files")
load("@io_bazel_rules_go//go:def.bzl", "GoInfo") load("@io_bazel_rules_go//go:def.bzl", "GoLibrary", "go_context")
load("@io_bazel_rules_go//proto:compiler.bzl", "GoProtoCompiler") load("@io_bazel_rules_go//proto:compiler.bzl", "GoProtoCompiler")
def _output_go_library_srcs_impl(ctx): def _output_go_library_srcs_impl(ctx):
go = go_context(ctx)
srcs_of_library = [] srcs_of_library = []
importpath = "" importpath = ""
for src in ctx.attr.deps: for src in ctx.attr.deps:
lib = src[GoInfo] lib = src[GoLibrary]
go_src = go.library_to_source(go, ctx.attr, lib, False)
if importpath and lib.importpath != importpath: if importpath and lib.importpath != importpath:
fail( fail(
"importpath of all deps must match, got {} and {}", "importpath of all deps must match, got {} and {}",
@ -20,7 +23,7 @@ def _output_go_library_srcs_impl(ctx):
lib.importpath, lib.importpath,
) )
importpath = lib.importpath importpath = lib.importpath
srcs_of_library.extend(lib.srcs) srcs_of_library.extend(go_src.srcs)
if len(srcs_of_library) != 1: if len(srcs_of_library) != 1:
fail("expected exactly one src for library, got {}", len(srcs_of_library)) fail("expected exactly one src for library, got {}", len(srcs_of_library))
@ -51,7 +54,7 @@ output_go_library_srcs = rule(
default = "@io_bazel_rules_go//proto:go_proto", default = "@io_bazel_rules_go//proto:go_proto",
), ),
"deps": attr.label_list( "deps": attr.label_list(
providers = [GoInfo], providers = [GoLibrary],
aspects = [], aspects = [],
), ),
"out": attr.output( "out": attr.output(

View File

@ -70,5 +70,5 @@ go_test(
env = platform_container_sums_paths | platform_clis_paths, env = platform_container_sums_paths | platform_clis_paths,
# keep # keep
x_defs = {"runsUnder": "bazel"}, x_defs = {"runsUnder": "bazel"},
deps = ["@io_bazel_rules_go//go/runfiles"], deps = ["@io_bazel_rules_go//go/runfiles:go_default_library"],
) )

View File

@ -97,83 +97,83 @@ def _actionlint_deps():
name = "com_github_rhysd_actionlint_linux_amd64", name = "com_github_rhysd_actionlint_linux_amd64",
build_file_content = """exports_files(["actionlint"], visibility = ["//visibility:public"])""", build_file_content = """exports_files(["actionlint"], visibility = ["//visibility:public"])""",
urls = [ urls = [
"https://cdn.confidential.cloud/constellation/cas/sha256/023070a287cd8cccd71515fedc843f1985bf96c436b7effaecce67290e7e0757", "https://cdn.confidential.cloud/constellation/cas/sha256/fc0a6886bbb9a23a39eeec4b176193cadb54ddbe77cdbb19b637933919545395",
"https://github.com/rhysd/actionlint/releases/download/v1.7.7/actionlint_1.7.7_linux_amd64.tar.gz", "https://github.com/rhysd/actionlint/releases/download/v1.7.4/actionlint_1.7.4_linux_amd64.tar.gz",
], ],
type = "tar.gz", type = "tar.gz",
sha256 = "023070a287cd8cccd71515fedc843f1985bf96c436b7effaecce67290e7e0757", sha256 = "fc0a6886bbb9a23a39eeec4b176193cadb54ddbe77cdbb19b637933919545395",
) )
http_archive( http_archive(
name = "com_github_rhysd_actionlint_linux_arm64", name = "com_github_rhysd_actionlint_linux_arm64",
build_file_content = """exports_files(["actionlint"], visibility = ["//visibility:public"])""", build_file_content = """exports_files(["actionlint"], visibility = ["//visibility:public"])""",
urls = [ urls = [
"https://cdn.confidential.cloud/constellation/cas/sha256/401942f9c24ed71e4fe71b76c7d638f66d8633575c4016efd2977ce7c28317d0", "https://cdn.confidential.cloud/constellation/cas/sha256/ede03682dc955381d057dde95bb85ce9ca418122209a8a313b617d4adec56416",
"https://github.com/rhysd/actionlint/releases/download/v1.7.7/actionlint_1.7.7_linux_arm64.tar.gz", "https://github.com/rhysd/actionlint/releases/download/v1.7.4/actionlint_1.7.4_linux_arm64.tar.gz",
], ],
type = "tar.gz", type = "tar.gz",
sha256 = "401942f9c24ed71e4fe71b76c7d638f66d8633575c4016efd2977ce7c28317d0", sha256 = "ede03682dc955381d057dde95bb85ce9ca418122209a8a313b617d4adec56416",
) )
http_archive( http_archive(
name = "com_github_rhysd_actionlint_darwin_amd64", name = "com_github_rhysd_actionlint_darwin_amd64",
build_file_content = """exports_files(["actionlint"], visibility = ["//visibility:public"])""", build_file_content = """exports_files(["actionlint"], visibility = ["//visibility:public"])""",
urls = [ urls = [
"https://cdn.confidential.cloud/constellation/cas/sha256/28e5de5a05fc558474f638323d736d822fff183d2d492f0aecb2b73cc44584f5", "https://cdn.confidential.cloud/constellation/cas/sha256/63a3ba90ee2325afad3ff2e64a4d80688c261e6c68be8e6ab91214637bf936b8",
"https://github.com/rhysd/actionlint/releases/download/v1.7.7/actionlint_1.7.7_darwin_amd64.tar.gz", "https://github.com/rhysd/actionlint/releases/download/v1.7.4/actionlint_1.7.4_darwin_amd64.tar.gz",
], ],
type = "tar.gz", type = "tar.gz",
sha256 = "28e5de5a05fc558474f638323d736d822fff183d2d492f0aecb2b73cc44584f5", sha256 = "63a3ba90ee2325afad3ff2e64a4d80688c261e6c68be8e6ab91214637bf936b8",
) )
http_archive( http_archive(
name = "com_github_rhysd_actionlint_darwin_arm64", name = "com_github_rhysd_actionlint_darwin_arm64",
build_file_content = """exports_files(["actionlint"], visibility = ["//visibility:public"])""", build_file_content = """exports_files(["actionlint"], visibility = ["//visibility:public"])""",
urls = [ urls = [
"https://cdn.confidential.cloud/constellation/cas/sha256/2693315b9093aeacb4ebd91a993fea54fc215057bf0da2659056b4bc033873db", "https://cdn.confidential.cloud/constellation/cas/sha256/cbd193bb490f598d77e179261d7b76dfebd049dddede5803ba21cbf6a469aeee",
"https://github.com/rhysd/actionlint/releases/download/v1.7.7/actionlint_1.7.7_darwin_arm64.tar.gz", "https://github.com/rhysd/actionlint/releases/download/v1.7.4/actionlint_1.7.4_darwin_arm64.tar.gz",
], ],
type = "tar.gz", type = "tar.gz",
sha256 = "2693315b9093aeacb4ebd91a993fea54fc215057bf0da2659056b4bc033873db", sha256 = "cbd193bb490f598d77e179261d7b76dfebd049dddede5803ba21cbf6a469aeee",
) )
def _gofumpt_deps(): def _gofumpt_deps():
http_file( http_file(
name = "com_github_mvdan_gofumpt_linux_amd64", name = "com_github_mvdan_gofumpt_linux_amd64",
urls = [ urls = [
"https://cdn.confidential.cloud/constellation/cas/sha256/11604bbaf7321abcc2fca2c6a37b7e9198bb1e76e5a86f297c07201e8ab1fda9", "https://cdn.confidential.cloud/constellation/cas/sha256/6ff459c1dcae3b0b00844c1a5a4a5b0f547237d8a4f3624aaea8d424aeef24c6",
"https://github.com/mvdan/gofumpt/releases/download/v0.8.0/gofumpt_v0.8.0_linux_amd64", "https://github.com/mvdan/gofumpt/releases/download/v0.7.0/gofumpt_v0.7.0_linux_amd64",
], ],
executable = True, executable = True,
downloaded_file_path = "gofumpt", downloaded_file_path = "gofumpt",
sha256 = "11604bbaf7321abcc2fca2c6a37b7e9198bb1e76e5a86f297c07201e8ab1fda9", sha256 = "6ff459c1dcae3b0b00844c1a5a4a5b0f547237d8a4f3624aaea8d424aeef24c6",
) )
http_file( http_file(
name = "com_github_mvdan_gofumpt_linux_arm64", name = "com_github_mvdan_gofumpt_linux_arm64",
urls = [ urls = [
"https://cdn.confidential.cloud/constellation/cas/sha256/787c1d3d4d20e6fe2b0bf06a5a913ac0f50343dbf9a71540724a2b8092a0e6ca", "https://cdn.confidential.cloud/constellation/cas/sha256/00c18c88ef50437629626ba20d677f4648684cb280952814cdd887677d42cbd3",
"https://github.com/mvdan/gofumpt/releases/download/v0.8.0/gofumpt_v0.8.0_linux_arm64", "https://github.com/mvdan/gofumpt/releases/download/v0.7.0/gofumpt_v0.7.0_linux_arm64",
], ],
executable = True, executable = True,
downloaded_file_path = "gofumpt", downloaded_file_path = "gofumpt",
sha256 = "787c1d3d4d20e6fe2b0bf06a5a913ac0f50343dbf9a71540724a2b8092a0e6ca", sha256 = "00c18c88ef50437629626ba20d677f4648684cb280952814cdd887677d42cbd3",
) )
http_file( http_file(
name = "com_github_mvdan_gofumpt_darwin_amd64", name = "com_github_mvdan_gofumpt_darwin_amd64",
urls = [ urls = [
"https://cdn.confidential.cloud/constellation/cas/sha256/0dda6600cf263b703a5ad93e792b06180c36afdee9638617a91dd552f2c6fb3e", "https://cdn.confidential.cloud/constellation/cas/sha256/b7d05e092da45c5ec96344ab635b1d6547c3e27c840ba39bc76989934efd7ce3",
"https://github.com/mvdan/gofumpt/releases/download/v0.8.0/gofumpt_v0.8.0_darwin_amd64", "https://github.com/mvdan/gofumpt/releases/download/v0.7.0/gofumpt_v0.7.0_darwin_amd64",
], ],
executable = True, executable = True,
downloaded_file_path = "gofumpt", downloaded_file_path = "gofumpt",
sha256 = "0dda6600cf263b703a5ad93e792b06180c36afdee9638617a91dd552f2c6fb3e", sha256 = "b7d05e092da45c5ec96344ab635b1d6547c3e27c840ba39bc76989934efd7ce3",
) )
http_file( http_file(
name = "com_github_mvdan_gofumpt_darwin_arm64", name = "com_github_mvdan_gofumpt_darwin_arm64",
urls = [ urls = [
"https://cdn.confidential.cloud/constellation/cas/sha256/7e66e92b7a67d1d12839ab030fb7ae38e5e2273474af3762e67bc7fe9471fcd9", "https://cdn.confidential.cloud/constellation/cas/sha256/08f23114760a090b090706d92b8c52b9875b9eb352d76c77aa354d6aa20b045a",
"https://github.com/mvdan/gofumpt/releases/download/v0.8.0/gofumpt_v0.8.0_darwin_arm64", "https://github.com/mvdan/gofumpt/releases/download/v0.7.0/gofumpt_v0.7.0_darwin_arm64",
], ],
executable = True, executable = True,
downloaded_file_path = "gofumpt", downloaded_file_path = "gofumpt",
sha256 = "7e66e92b7a67d1d12839ab030fb7ae38e5e2273474af3762e67bc7fe9471fcd9", sha256 = "08f23114760a090b090706d92b8c52b9875b9eb352d76c77aa354d6aa20b045a",
) )
def _tfsec_deps(): def _tfsec_deps():
@ -181,41 +181,41 @@ def _tfsec_deps():
name = "com_github_aquasecurity_tfsec_linux_amd64", name = "com_github_aquasecurity_tfsec_linux_amd64",
build_file_content = """exports_files(["tfsec"], visibility = ["//visibility:public"])""", build_file_content = """exports_files(["tfsec"], visibility = ["//visibility:public"])""",
urls = [ urls = [
"https://cdn.confidential.cloud/constellation/cas/sha256/f643c390e6eabdf4bd64e807ff63abfe977d4f027c0b535eefe7a5c9f391fc28", "https://cdn.confidential.cloud/constellation/cas/sha256/9d783fa225a570f034000136973afba86a1708c919a539b72b3ea954a198289c",
"https://github.com/aquasecurity/tfsec/releases/download/v1.28.13/tfsec_1.28.13_linux_amd64.tar.gz", "https://github.com/aquasecurity/tfsec/releases/download/v1.28.11/tfsec_1.28.11_linux_amd64.tar.gz",
], ],
type = "tar.gz", type = "tar.gz",
sha256 = "f643c390e6eabdf4bd64e807ff63abfe977d4f027c0b535eefe7a5c9f391fc28", sha256 = "9d783fa225a570f034000136973afba86a1708c919a539b72b3ea954a198289c",
) )
http_archive( http_archive(
name = "com_github_aquasecurity_tfsec_linux_arm64", name = "com_github_aquasecurity_tfsec_linux_arm64",
build_file_content = """exports_files(["tfsec"], visibility = ["//visibility:public"])""", build_file_content = """exports_files(["tfsec"], visibility = ["//visibility:public"])""",
urls = [ urls = [
"https://cdn.confidential.cloud/constellation/cas/sha256/4aed1b122f817b684cc48da9cdc4b98b891808969441914570c089883c85ac50", "https://cdn.confidential.cloud/constellation/cas/sha256/68b5c4f6b7c459dd890ecff94b0732e456ef45974894f58bbb90fbb4816f3e52",
"https://github.com/aquasecurity/tfsec/releases/download/v1.28.13/tfsec_1.28.13_linux_arm64.tar.gz", "https://github.com/aquasecurity/tfsec/releases/download/v1.28.11/tfsec_1.28.11_linux_arm64.tar.gz",
], ],
type = "tar.gz", type = "tar.gz",
sha256 = "4aed1b122f817b684cc48da9cdc4b98b891808969441914570c089883c85ac50", sha256 = "68b5c4f6b7c459dd890ecff94b0732e456ef45974894f58bbb90fbb4816f3e52",
) )
http_archive( http_archive(
name = "com_github_aquasecurity_tfsec_darwin_amd64", name = "com_github_aquasecurity_tfsec_darwin_amd64",
build_file_content = """exports_files(["tfsec"], visibility = ["//visibility:public"])""", build_file_content = """exports_files(["tfsec"], visibility = ["//visibility:public"])""",
urls = [ urls = [
"https://cdn.confidential.cloud/constellation/cas/sha256/966c7656f797c120dceb56a208a50dbf6a363c30876662a28e1c65505afca10d", "https://cdn.confidential.cloud/constellation/cas/sha256/d377597f2fd4e6956bb7beb711d627b0e0204c421c17e2cd062213222c2f3001",
"https://github.com/aquasecurity/tfsec/releases/download/v1.28.13/tfsec_1.28.13_darwin_amd64.tar.gz", "https://github.com/aquasecurity/tfsec/releases/download/v1.28.11/tfsec_1.28.11_darwin_amd64.tar.gz",
], ],
type = "tar.gz", type = "tar.gz",
sha256 = "966c7656f797c120dceb56a208a50dbf6a363c30876662a28e1c65505afca10d", sha256 = "d377597f2fd4e6956bb7beb711d627b0e0204c421c17e2cd062213222c2f3001",
) )
http_archive( http_archive(
name = "com_github_aquasecurity_tfsec_darwin_arm64", name = "com_github_aquasecurity_tfsec_darwin_arm64",
build_file_content = """exports_files(["tfsec"], visibility = ["//visibility:public"])""", build_file_content = """exports_files(["tfsec"], visibility = ["//visibility:public"])""",
urls = [ urls = [
"https://cdn.confidential.cloud/constellation/cas/sha256/a381580c81d3413bb3fe07aa91ab89e51c1bbbd33c848194a2b43e9be3729c16", "https://cdn.confidential.cloud/constellation/cas/sha256/14db6b40049226ebc779789196f99eb4977bb93c99fa51c8b72b603e6cdf44e7",
"https://github.com/aquasecurity/tfsec/releases/download/v1.28.13/tfsec_1.28.13_darwin_arm64.tar.gz", "https://github.com/aquasecurity/tfsec/releases/download/v1.28.11/tfsec_1.28.11_darwin_arm64.tar.gz",
], ],
type = "tar.gz", type = "tar.gz",
sha256 = "a381580c81d3413bb3fe07aa91ab89e51c1bbbd33c848194a2b43e9be3729c16", sha256 = "14db6b40049226ebc779789196f99eb4977bb93c99fa51c8b72b603e6cdf44e7",
) )
def _golangci_lint_deps(): def _golangci_lint_deps():
@ -223,45 +223,45 @@ def _golangci_lint_deps():
name = "com_github_golangci_golangci_lint_linux_amd64", name = "com_github_golangci_golangci_lint_linux_amd64",
build_file = "//bazel/toolchains:BUILD.golangci.bazel", build_file = "//bazel/toolchains:BUILD.golangci.bazel",
urls = [ urls = [
"https://cdn.confidential.cloud/constellation/cas/sha256/bc16fd1ef25bce2c600de0122600100ab26d6d75388cc5369c5bb916cb2b82e3", "https://cdn.confidential.cloud/constellation/cas/sha256/5101292b7925a6a14b49c5c3d845c5021399698ffd2f41bcfab8a111b5669939",
"https://github.com/golangci/golangci-lint/releases/download/v2.1.2/golangci-lint-2.1.2-linux-amd64.tar.gz", "https://github.com/golangci/golangci-lint/releases/download/v1.62.2/golangci-lint-1.62.2-linux-amd64.tar.gz",
], ],
strip_prefix = "golangci-lint-2.1.2-linux-amd64", strip_prefix = "golangci-lint-1.62.2-linux-amd64",
type = "tar.gz", type = "tar.gz",
sha256 = "bc16fd1ef25bce2c600de0122600100ab26d6d75388cc5369c5bb916cb2b82e3", sha256 = "5101292b7925a6a14b49c5c3d845c5021399698ffd2f41bcfab8a111b5669939",
) )
http_archive( http_archive(
name = "com_github_golangci_golangci_lint_linux_arm64", name = "com_github_golangci_golangci_lint_linux_arm64",
build_file = "//bazel/toolchains:BUILD.golangci.bazel", build_file = "//bazel/toolchains:BUILD.golangci.bazel",
urls = [ urls = [
"https://cdn.confidential.cloud/constellation/cas/sha256/46e86f1c4a94236e4d0bb35252c72939bed9f749897aaad54b576d430b1bb6d4", "https://cdn.confidential.cloud/constellation/cas/sha256/10b6f5bd8483bd9e85a82f6119ed08f95609f42b86dc344b5dc15703c74d5b85",
"https://github.com/golangci/golangci-lint/releases/download/v2.1.2/golangci-lint-2.1.2-linux-arm64.tar.gz", "https://github.com/golangci/golangci-lint/releases/download/v1.62.2/golangci-lint-1.62.2-linux-arm64.tar.gz",
], ],
strip_prefix = "golangci-lint-2.1.2-linux-arm64", strip_prefix = "golangci-lint-1.62.2-linux-arm64",
type = "tar.gz", type = "tar.gz",
sha256 = "46e86f1c4a94236e4d0bb35252c72939bed9f749897aaad54b576d430b1bb6d4", sha256 = "10b6f5bd8483bd9e85a82f6119ed08f95609f42b86dc344b5dc15703c74d5b85",
) )
http_archive( http_archive(
name = "com_github_golangci_golangci_lint_darwin_amd64", name = "com_github_golangci_golangci_lint_darwin_amd64",
build_file = "//bazel/toolchains:BUILD.golangci.bazel", build_file = "//bazel/toolchains:BUILD.golangci.bazel",
urls = [ urls = [
"https://cdn.confidential.cloud/constellation/cas/sha256/ed02ba3ad28466d61d2ae2b80cc95671713fa842c353da37842b1b89e36cb3ce", "https://cdn.confidential.cloud/constellation/cas/sha256/6c9ffd05896f0638d5c37152ac4ae337c2d301ba6c9dadf49c04e6d639f10f91",
"https://github.com/golangci/golangci-lint/releases/download/v2.1.2/golangci-lint-2.1.2-darwin-amd64.tar.gz", "https://github.com/golangci/golangci-lint/releases/download/v1.62.2/golangci-lint-1.62.2-darwin-amd64.tar.gz",
], ],
strip_prefix = "golangci-lint-2.1.2-darwin-amd64", strip_prefix = "golangci-lint-1.62.2-darwin-amd64",
type = "tar.gz", type = "tar.gz",
sha256 = "ed02ba3ad28466d61d2ae2b80cc95671713fa842c353da37842b1b89e36cb3ce", sha256 = "6c9ffd05896f0638d5c37152ac4ae337c2d301ba6c9dadf49c04e6d639f10f91",
) )
http_archive( http_archive(
name = "com_github_golangci_golangci_lint_darwin_arm64", name = "com_github_golangci_golangci_lint_darwin_arm64",
build_file = "//bazel/toolchains:BUILD.golangci.bazel", build_file = "//bazel/toolchains:BUILD.golangci.bazel",
urls = [ urls = [
"https://cdn.confidential.cloud/constellation/cas/sha256/1cff60651d7c95a4248fa72f0dd020bffed1d2dc4dd8c2c77aee89a0731fa615", "https://cdn.confidential.cloud/constellation/cas/sha256/6c76f54467ba471f7bdcd5df0f27c3fa3dbe530b771a10d384c3d8c7178f5e89",
"https://github.com/golangci/golangci-lint/releases/download/v2.1.2/golangci-lint-2.1.2-darwin-arm64.tar.gz", "https://github.com/golangci/golangci-lint/releases/download/v1.62.2/golangci-lint-1.62.2-darwin-arm64.tar.gz",
], ],
strip_prefix = "golangci-lint-2.1.2-darwin-arm64", strip_prefix = "golangci-lint-1.62.2-darwin-arm64",
type = "tar.gz", type = "tar.gz",
sha256 = "1cff60651d7c95a4248fa72f0dd020bffed1d2dc4dd8c2c77aee89a0731fa615", sha256 = "6c76f54467ba471f7bdcd5df0f27c3fa3dbe530b771a10d384c3d8c7178f5e89",
) )
def _buf_deps(): def _buf_deps():
@ -270,44 +270,44 @@ def _buf_deps():
strip_prefix = "buf/bin", strip_prefix = "buf/bin",
build_file_content = """exports_files(["buf"], visibility = ["//visibility:public"])""", build_file_content = """exports_files(["buf"], visibility = ["//visibility:public"])""",
urls = [ urls = [
"https://cdn.confidential.cloud/constellation/cas/sha256/ce439b98c0e655ba1821fc529442f677135a9a44206a85cf2081a445bde02554", "https://cdn.confidential.cloud/constellation/cas/sha256/deebd48a6bf85b073d7c7800c17b330376487e86852d4905c76a205b6fd795d4",
"https://github.com/bufbuild/buf/releases/download/v1.52.1/buf-Linux-x86_64.tar.gz", "https://github.com/bufbuild/buf/releases/download/v1.45.0/buf-Linux-x86_64.tar.gz",
], ],
type = "tar.gz", type = "tar.gz",
sha256 = "ce439b98c0e655ba1821fc529442f677135a9a44206a85cf2081a445bde02554", sha256 = "deebd48a6bf85b073d7c7800c17b330376487e86852d4905c76a205b6fd795d4",
) )
http_archive( http_archive(
name = "com_github_bufbuild_buf_linux_arm64", name = "com_github_bufbuild_buf_linux_arm64",
strip_prefix = "buf/bin", strip_prefix = "buf/bin",
build_file_content = """exports_files(["buf"], visibility = ["//visibility:public"])""", build_file_content = """exports_files(["buf"], visibility = ["//visibility:public"])""",
urls = [ urls = [
"https://cdn.confidential.cloud/constellation/cas/sha256/fb980e62f55a0d705f555124b5b250a6234deae67b3a493b1844fed8cb48f012", "https://cdn.confidential.cloud/constellation/cas/sha256/2d3ebfed036881d0615e5b24288cf788791b45848f26e915e3efe7ee9c10735d",
"https://github.com/bufbuild/buf/releases/download/v1.52.1/buf-Linux-aarch64.tar.gz", "https://github.com/bufbuild/buf/releases/download/v1.45.0/buf-Linux-aarch64.tar.gz",
], ],
type = "tar.gz", type = "tar.gz",
sha256 = "fb980e62f55a0d705f555124b5b250a6234deae67b3a493b1844fed8cb48f012", sha256 = "2d3ebfed036881d0615e5b24288cf788791b45848f26e915e3efe7ee9c10735d",
) )
http_archive( http_archive(
name = "com_github_bufbuild_buf_darwin_amd64", name = "com_github_bufbuild_buf_darwin_amd64",
strip_prefix = "buf/bin", strip_prefix = "buf/bin",
build_file_content = """exports_files(["buf"], visibility = ["//visibility:public"])""", build_file_content = """exports_files(["buf"], visibility = ["//visibility:public"])""",
urls = [ urls = [
"https://cdn.confidential.cloud/constellation/cas/sha256/ff3aedaa8bf53c3ae53bf863bb6141a23ef9e2ef750016ab217b0466ab3e89be", "https://cdn.confidential.cloud/constellation/cas/sha256/7fef3c482ac440cc09c40864498ef1f44745fde82428ddf52edd2012d3a036a4",
"https://github.com/bufbuild/buf/releases/download/v1.52.1/buf-Darwin-x86_64.tar.gz", "https://github.com/bufbuild/buf/releases/download/v1.45.0/buf-Darwin-x86_64.tar.gz",
], ],
type = "tar.gz", type = "tar.gz",
sha256 = "ff3aedaa8bf53c3ae53bf863bb6141a23ef9e2ef750016ab217b0466ab3e89be", sha256 = "7fef3c482ac440cc09c40864498ef1f44745fde82428ddf52edd2012d3a036a4",
) )
http_archive( http_archive(
name = "com_github_bufbuild_buf_darwin_arm64", name = "com_github_bufbuild_buf_darwin_arm64",
strip_prefix = "buf/bin", strip_prefix = "buf/bin",
build_file_content = """exports_files(["buf"], visibility = ["//visibility:public"])""", build_file_content = """exports_files(["buf"], visibility = ["//visibility:public"])""",
urls = [ urls = [
"https://cdn.confidential.cloud/constellation/cas/sha256/b11d5afda7f58a44a6520b798902b1263aba921b0989cb156ecf2acc8eb1ce31", "https://cdn.confidential.cloud/constellation/cas/sha256/e5309c70c7bb4a06d799ab7c7601c0d647c704085593d5cd981db29f986e469b",
"https://github.com/bufbuild/buf/releases/download/v1.52.1/buf-Darwin-arm64.tar.gz", "https://github.com/bufbuild/buf/releases/download/v1.45.0/buf-Darwin-arm64.tar.gz",
], ],
type = "tar.gz", type = "tar.gz",
sha256 = "b11d5afda7f58a44a6520b798902b1263aba921b0989cb156ecf2acc8eb1ce31", sha256 = "e5309c70c7bb4a06d799ab7c7601c0d647c704085593d5cd981db29f986e469b",
) )
def _talos_docgen_deps(): def _talos_docgen_deps():

View File

@ -7,7 +7,7 @@ load("@rules_oci//oci:pull.bzl", "oci_pull")
def containter_image_deps(): def containter_image_deps():
oci_pull( oci_pull(
name = "distroless_static", name = "distroless_static",
digest = "sha256:3d0f463de06b7ddff27684ec3bfd0b54a425149d0f8685308b1fdf297b0265e9", digest = "sha256:f4a57e8ffd7ba407bdd0eb315bb54ef1f21a2100a7f032e9102e4da34fe7c196",
image = "gcr.io/distroless/static", image = "gcr.io/distroless/static",
platforms = [ platforms = [
"linux/amd64", "linux/amd64",
@ -16,6 +16,6 @@ def containter_image_deps():
) )
oci_pull( oci_pull(
name = "libvirtd_base", name = "libvirtd_base",
digest = "sha256:f23e0f587860c841adde25b1b4f0d99aa4fbce1c92b01b5b46ab5fa35980a135", digest = "sha256:99dbf3cf69b3f97cb0158bde152c9bc7c2a96458cf462527ee80b75754f572a7",
image = "ghcr.io/edgelesssys/constellation/libvirtd-base", image = "ghcr.io/edgelesssys/constellation/libvirtd-base",
) )

View File

@ -9,38 +9,38 @@ def kernel_rpms():
http_file( http_file(
name = "kernel_lts", name = "kernel_lts",
urls = [ urls = [
"https://cdn.confidential.cloud/constellation/cas/sha256/7834bc4bc7e088c98505956382884bdc670ab9a9283288b7fef04a43df31356e", "https://cdn.confidential.cloud/constellation/cas/sha256/c87995e19c04e2f033e6db5e92bfcb845ac015722e776c09a7af4c82c86cd273",
"https://cdn.confidential.cloud/constellation/kernel/6.6.87-100.constellation/kernel-6.6.87-100.constellation.fc40.x86_64.rpm", "https://cdn.confidential.cloud/constellation/kernel/6.6.30-100.constellation/kernel-6.6.30-100.constellation.fc40.x86_64.rpm",
], ],
downloaded_file_path = "kernel-lts.rpm", downloaded_file_path = "kernel-lts.rpm",
sha256 = "7834bc4bc7e088c98505956382884bdc670ab9a9283288b7fef04a43df31356e", sha256 = "c87995e19c04e2f033e6db5e92bfcb845ac015722e776c09a7af4c82c86cd273",
) )
http_file( http_file(
name = "kernel_core_lts", name = "kernel_core_lts",
urls = [ urls = [
"https://cdn.confidential.cloud/constellation/cas/sha256/2763c699d1e2f9810421ac7af2e9c94c6f98533e83f2938c26f1d824e3559b97", "https://cdn.confidential.cloud/constellation/cas/sha256/5692d862b0cc0c442c581e5f3dc9f3c36cabda0c29d3f62e9b6313a6ec88b140",
"https://cdn.confidential.cloud/constellation/kernel/6.6.87-100.constellation/kernel-core-6.6.87-100.constellation.fc40.x86_64.rpm", "https://cdn.confidential.cloud/constellation/kernel/6.6.30-100.constellation/kernel-core-6.6.30-100.constellation.fc40.x86_64.rpm",
], ],
downloaded_file_path = "kernel-core-lts.rpm", downloaded_file_path = "kernel-core-lts.rpm",
sha256 = "2763c699d1e2f9810421ac7af2e9c94c6f98533e83f2938c26f1d824e3559b97", sha256 = "5692d862b0cc0c442c581e5f3dc9f3c36cabda0c29d3f62e9b6313a6ec88b140",
) )
http_file( http_file(
name = "kernel_modules_lts", name = "kernel_modules_lts",
urls = [ urls = [
"https://cdn.confidential.cloud/constellation/cas/sha256/a7604eec263f190db573d809d20336bbf75e46c51f5977f5db95bb88bfec56d3", "https://cdn.confidential.cloud/constellation/cas/sha256/e1b697343b4f8ed8e992cd92860208dc1c28eb8b25a88f42f426326a0bbc307f",
"https://cdn.confidential.cloud/constellation/kernel/6.6.87-100.constellation/kernel-modules-6.6.87-100.constellation.fc40.x86_64.rpm", "https://cdn.confidential.cloud/constellation/kernel/6.6.30-100.constellation/kernel-modules-6.6.30-100.constellation.fc40.x86_64.rpm",
], ],
downloaded_file_path = "kernel-modules-lts.rpm", downloaded_file_path = "kernel-modules-lts.rpm",
sha256 = "a7604eec263f190db573d809d20336bbf75e46c51f5977f5db95bb88bfec56d3", sha256 = "e1b697343b4f8ed8e992cd92860208dc1c28eb8b25a88f42f426326a0bbc307f",
) )
http_file( http_file(
name = "kernel_modules_core_lts", name = "kernel_modules_core_lts",
urls = [ urls = [
"https://cdn.confidential.cloud/constellation/cas/sha256/648fd503d7d54608fbd62ace87c4da098f72abbaac1ab7e343327fc24ccef7f8", "https://cdn.confidential.cloud/constellation/cas/sha256/448c6b10d9ed02aed078ff77223f5e495b2041be12d92eb0e5ca5726a08e0626",
"https://cdn.confidential.cloud/constellation/kernel/6.6.87-100.constellation/kernel-modules-core-6.6.87-100.constellation.fc40.x86_64.rpm", "https://cdn.confidential.cloud/constellation/kernel/6.6.30-100.constellation/kernel-modules-core-6.6.30-100.constellation.fc40.x86_64.rpm",
], ],
downloaded_file_path = "kernel-modules-core-lts.rpm", downloaded_file_path = "kernel-modules-core-lts.rpm",
sha256 = "648fd503d7d54608fbd62ace87c4da098f72abbaac1ab7e343327fc24ccef7f8", sha256 = "448c6b10d9ed02aed078ff77223f5e495b2041be12d92eb0e5ca5726a08e0626",
) )
# mainline kernel # mainline kernel

View File

@ -5,11 +5,11 @@ load("@bazel_tools//tools/build_defs/repo:http.bzl", "http_archive")
def nixpkgs_deps(): def nixpkgs_deps():
http_archive( http_archive(
name = "io_tweag_rules_nixpkgs", name = "io_tweag_rules_nixpkgs",
sha256 = "30271f7bd380e4e20e4d7132c324946c4fdbc31ebe0bbb6638a0f61a37e74397", sha256 = "1ce13c13a2f354fd37016d9fb333efeddcb308e89db9b3a8f45eafce57746f49",
strip_prefix = "rules_nixpkgs-0.13.0", strip_prefix = "rules_nixpkgs-668609f0b3627751651cb325166d0e95062be3f7",
urls = [ urls = [
"https://cdn.confidential.cloud/constellation/cas/sha256/30271f7bd380e4e20e4d7132c324946c4fdbc31ebe0bbb6638a0f61a37e74397", "https://cdn.confidential.cloud/constellation/cas/sha256/1ce13c13a2f354fd37016d9fb333efeddcb308e89db9b3a8f45eafce57746f49",
"https://github.com/tweag/rules_nixpkgs/releases/download/v0.13.0/rules_nixpkgs-0.13.0.tar.gz", "https://github.com/tweag/rules_nixpkgs/archive/668609f0b3627751651cb325166d0e95062be3f7.tar.gz",
], ],
type = "tar.gz", type = "tar.gz",
) )

View File

@ -7,13 +7,14 @@ def oci_deps():
# Remove this override once https://github.com/bazel-contrib/rules_oci/issues/420 is fixed. # Remove this override once https://github.com/bazel-contrib/rules_oci/issues/420 is fixed.
http_archive( http_archive(
name = "rules_oci", name = "rules_oci",
strip_prefix = "rules_oci-2.2.5", strip_prefix = "rules_oci-2.0.1",
type = "tar.gz", type = "tar.gz",
urls = [ urls = [
"https://cdn.confidential.cloud/constellation/cas/sha256/361c417e8c95cd7c3d8b5cf4b202e76bac8d41532131534ff8e6fa43aa161142", "https://cdn.confidential.cloud/constellation/cas/sha256/acbf8f40e062f707f8754e914dcb0013803c6e5e3679d3e05b571a9f5c7e0b43",
"https://github.com/bazel-contrib/rules_oci/releases/download/v2.2.5/rules_oci-v2.2.5.tar.gz", "https://cdn.confidential.cloud/constellation/cas/sha256/f70f07f9d0d6c275d7ec7d3c7f236d9b552ba3205e8f37df9c1125031cf967cc",
"https://github.com/bazel-contrib/rules_oci/releases/download/v2.0.1/rules_oci-v2.0.1.tar.gz",
], ],
sha256 = "361c417e8c95cd7c3d8b5cf4b202e76bac8d41532131534ff8e6fa43aa161142", sha256 = "acbf8f40e062f707f8754e914dcb0013803c6e5e3679d3e05b571a9f5c7e0b43",
patches = ["//bazel/toolchains:0001-disable-Windows-support.patch"], patches = ["//bazel/toolchains:0001-disable-Windows-support.patch"],
patch_args = ["-p1"], patch_args = ["-p1"],
) )

View File

@ -1,7 +1,7 @@
// Code generated by protoc-gen-go. DO NOT EDIT. // Code generated by protoc-gen-go. DO NOT EDIT.
// versions: // versions:
// protoc-gen-go v1.36.6 // protoc-gen-go v1.35.2
// protoc v5.29.1 // protoc v5.29.0--rc2
// source: bootstrapper/initproto/init.proto // source: bootstrapper/initproto/init.proto
package initproto package initproto
@ -16,7 +16,6 @@ import (
protoimpl "google.golang.org/protobuf/runtime/protoimpl" protoimpl "google.golang.org/protobuf/runtime/protoimpl"
reflect "reflect" reflect "reflect"
sync "sync" sync "sync"
unsafe "unsafe"
) )
const ( const (
@ -27,7 +26,10 @@ const (
) )
type InitRequest struct { type InitRequest struct {
state protoimpl.MessageState `protogen:"open.v1"` state protoimpl.MessageState
sizeCache protoimpl.SizeCache
unknownFields protoimpl.UnknownFields
KmsUri string `protobuf:"bytes,1,opt,name=kms_uri,json=kmsUri,proto3" json:"kms_uri,omitempty"` KmsUri string `protobuf:"bytes,1,opt,name=kms_uri,json=kmsUri,proto3" json:"kms_uri,omitempty"`
StorageUri string `protobuf:"bytes,2,opt,name=storage_uri,json=storageUri,proto3" json:"storage_uri,omitempty"` StorageUri string `protobuf:"bytes,2,opt,name=storage_uri,json=storageUri,proto3" json:"storage_uri,omitempty"`
MeasurementSalt []byte `protobuf:"bytes,3,opt,name=measurement_salt,json=measurementSalt,proto3" json:"measurement_salt,omitempty"` MeasurementSalt []byte `protobuf:"bytes,3,opt,name=measurement_salt,json=measurementSalt,proto3" json:"measurement_salt,omitempty"`
@ -38,8 +40,6 @@ type InitRequest struct {
ClusterName string `protobuf:"bytes,9,opt,name=cluster_name,json=clusterName,proto3" json:"cluster_name,omitempty"` ClusterName string `protobuf:"bytes,9,opt,name=cluster_name,json=clusterName,proto3" json:"cluster_name,omitempty"`
ApiserverCertSans []string `protobuf:"bytes,10,rep,name=apiserver_cert_sans,json=apiserverCertSans,proto3" json:"apiserver_cert_sans,omitempty"` ApiserverCertSans []string `protobuf:"bytes,10,rep,name=apiserver_cert_sans,json=apiserverCertSans,proto3" json:"apiserver_cert_sans,omitempty"`
ServiceCidr string `protobuf:"bytes,11,opt,name=service_cidr,json=serviceCidr,proto3" json:"service_cidr,omitempty"` ServiceCidr string `protobuf:"bytes,11,opt,name=service_cidr,json=serviceCidr,proto3" json:"service_cidr,omitempty"`
unknownFields protoimpl.UnknownFields
sizeCache protoimpl.SizeCache
} }
func (x *InitRequest) Reset() { func (x *InitRequest) Reset() {
@ -143,15 +143,16 @@ func (x *InitRequest) GetServiceCidr() string {
} }
type InitResponse struct { type InitResponse struct {
state protoimpl.MessageState `protogen:"open.v1"` state protoimpl.MessageState
// Types that are valid to be assigned to Kind: sizeCache protoimpl.SizeCache
unknownFields protoimpl.UnknownFields
// Types that are assignable to Kind:
// //
// *InitResponse_InitSuccess // *InitResponse_InitSuccess
// *InitResponse_InitFailure // *InitResponse_InitFailure
// *InitResponse_Log // *InitResponse_Log
Kind isInitResponse_Kind `protobuf_oneof:"kind"` Kind isInitResponse_Kind `protobuf_oneof:"kind"`
unknownFields protoimpl.UnknownFields
sizeCache protoimpl.SizeCache
} }
func (x *InitResponse) Reset() { func (x *InitResponse) Reset() {
@ -184,36 +185,30 @@ func (*InitResponse) Descriptor() ([]byte, []int) {
return file_bootstrapper_initproto_init_proto_rawDescGZIP(), []int{1} return file_bootstrapper_initproto_init_proto_rawDescGZIP(), []int{1}
} }
func (x *InitResponse) GetKind() isInitResponse_Kind { func (m *InitResponse) GetKind() isInitResponse_Kind {
if x != nil { if m != nil {
return x.Kind return m.Kind
} }
return nil return nil
} }
func (x *InitResponse) GetInitSuccess() *InitSuccessResponse { func (x *InitResponse) GetInitSuccess() *InitSuccessResponse {
if x != nil { if x, ok := x.GetKind().(*InitResponse_InitSuccess); ok {
if x, ok := x.Kind.(*InitResponse_InitSuccess); ok { return x.InitSuccess
return x.InitSuccess
}
} }
return nil return nil
} }
func (x *InitResponse) GetInitFailure() *InitFailureResponse { func (x *InitResponse) GetInitFailure() *InitFailureResponse {
if x != nil { if x, ok := x.GetKind().(*InitResponse_InitFailure); ok {
if x, ok := x.Kind.(*InitResponse_InitFailure); ok { return x.InitFailure
return x.InitFailure
}
} }
return nil return nil
} }
func (x *InitResponse) GetLog() *LogResponseType { func (x *InitResponse) GetLog() *LogResponseType {
if x != nil { if x, ok := x.GetKind().(*InitResponse_Log); ok {
if x, ok := x.Kind.(*InitResponse_Log); ok { return x.Log
return x.Log
}
} }
return nil return nil
} }
@ -241,12 +236,13 @@ func (*InitResponse_InitFailure) isInitResponse_Kind() {}
func (*InitResponse_Log) isInitResponse_Kind() {} func (*InitResponse_Log) isInitResponse_Kind() {}
type InitSuccessResponse struct { type InitSuccessResponse struct {
state protoimpl.MessageState `protogen:"open.v1"` state protoimpl.MessageState
Kubeconfig []byte `protobuf:"bytes,1,opt,name=kubeconfig,proto3" json:"kubeconfig,omitempty"`
OwnerId []byte `protobuf:"bytes,2,opt,name=owner_id,json=ownerId,proto3" json:"owner_id,omitempty"`
ClusterId []byte `protobuf:"bytes,3,opt,name=cluster_id,json=clusterId,proto3" json:"cluster_id,omitempty"`
unknownFields protoimpl.UnknownFields
sizeCache protoimpl.SizeCache sizeCache protoimpl.SizeCache
unknownFields protoimpl.UnknownFields
Kubeconfig []byte `protobuf:"bytes,1,opt,name=kubeconfig,proto3" json:"kubeconfig,omitempty"`
OwnerId []byte `protobuf:"bytes,2,opt,name=owner_id,json=ownerId,proto3" json:"owner_id,omitempty"`
ClusterId []byte `protobuf:"bytes,3,opt,name=cluster_id,json=clusterId,proto3" json:"cluster_id,omitempty"`
} }
func (x *InitSuccessResponse) Reset() { func (x *InitSuccessResponse) Reset() {
@ -301,10 +297,11 @@ func (x *InitSuccessResponse) GetClusterId() []byte {
} }
type InitFailureResponse struct { type InitFailureResponse struct {
state protoimpl.MessageState `protogen:"open.v1"` state protoimpl.MessageState
Error string `protobuf:"bytes,1,opt,name=error,proto3" json:"error,omitempty"`
unknownFields protoimpl.UnknownFields
sizeCache protoimpl.SizeCache sizeCache protoimpl.SizeCache
unknownFields protoimpl.UnknownFields
Error string `protobuf:"bytes,1,opt,name=error,proto3" json:"error,omitempty"`
} }
func (x *InitFailureResponse) Reset() { func (x *InitFailureResponse) Reset() {
@ -345,10 +342,11 @@ func (x *InitFailureResponse) GetError() string {
} }
type LogResponseType struct { type LogResponseType struct {
state protoimpl.MessageState `protogen:"open.v1"` state protoimpl.MessageState
Log []byte `protobuf:"bytes,1,opt,name=log,proto3" json:"log,omitempty"`
unknownFields protoimpl.UnknownFields
sizeCache protoimpl.SizeCache sizeCache protoimpl.SizeCache
unknownFields protoimpl.UnknownFields
Log []byte `protobuf:"bytes,1,opt,name=log,proto3" json:"log,omitempty"`
} }
func (x *LogResponseType) Reset() { func (x *LogResponseType) Reset() {
@ -389,13 +387,14 @@ func (x *LogResponseType) GetLog() []byte {
} }
type KubernetesComponent struct { type KubernetesComponent struct {
state protoimpl.MessageState `protogen:"open.v1"` state protoimpl.MessageState
Url string `protobuf:"bytes,1,opt,name=url,proto3" json:"url,omitempty"`
Hash string `protobuf:"bytes,2,opt,name=hash,proto3" json:"hash,omitempty"`
InstallPath string `protobuf:"bytes,3,opt,name=install_path,json=installPath,proto3" json:"install_path,omitempty"`
Extract bool `protobuf:"varint,4,opt,name=extract,proto3" json:"extract,omitempty"`
unknownFields protoimpl.UnknownFields
sizeCache protoimpl.SizeCache sizeCache protoimpl.SizeCache
unknownFields protoimpl.UnknownFields
Url string `protobuf:"bytes,1,opt,name=url,proto3" json:"url,omitempty"`
Hash string `protobuf:"bytes,2,opt,name=hash,proto3" json:"hash,omitempty"`
InstallPath string `protobuf:"bytes,3,opt,name=install_path,json=installPath,proto3" json:"install_path,omitempty"`
Extract bool `protobuf:"varint,4,opt,name=extract,proto3" json:"extract,omitempty"`
} }
func (x *KubernetesComponent) Reset() { func (x *KubernetesComponent) Reset() {
@ -458,55 +457,92 @@ func (x *KubernetesComponent) GetExtract() bool {
var File_bootstrapper_initproto_init_proto protoreflect.FileDescriptor var File_bootstrapper_initproto_init_proto protoreflect.FileDescriptor
const file_bootstrapper_initproto_init_proto_rawDesc = "" + var file_bootstrapper_initproto_init_proto_rawDesc = []byte{
"\n" + 0x0a, 0x21, 0x62, 0x6f, 0x6f, 0x74, 0x73, 0x74, 0x72, 0x61, 0x70, 0x70, 0x65, 0x72, 0x2f, 0x69,
"!bootstrapper/initproto/init.proto\x12\x04init\x1a-internal/versions/components/components.proto\"\xd0\x03\n" + 0x6e, 0x69, 0x74, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x2f, 0x69, 0x6e, 0x69, 0x74, 0x2e, 0x70, 0x72,
"\vInitRequest\x12\x17\n" + 0x6f, 0x74, 0x6f, 0x12, 0x04, 0x69, 0x6e, 0x69, 0x74, 0x1a, 0x2d, 0x69, 0x6e, 0x74, 0x65, 0x72,
"\akms_uri\x18\x01 \x01(\tR\x06kmsUri\x12\x1f\n" + 0x6e, 0x61, 0x6c, 0x2f, 0x76, 0x65, 0x72, 0x73, 0x69, 0x6f, 0x6e, 0x73, 0x2f, 0x63, 0x6f, 0x6d,
"\vstorage_uri\x18\x02 \x01(\tR\n" + 0x70, 0x6f, 0x6e, 0x65, 0x6e, 0x74, 0x73, 0x2f, 0x63, 0x6f, 0x6d, 0x70, 0x6f, 0x6e, 0x65, 0x6e,
"storageUri\x12)\n" + 0x74, 0x73, 0x2e, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x22, 0xd0, 0x03, 0x0a, 0x0b, 0x49, 0x6e, 0x69,
"\x10measurement_salt\x18\x03 \x01(\fR\x0fmeasurementSalt\x12-\n" + 0x74, 0x52, 0x65, 0x71, 0x75, 0x65, 0x73, 0x74, 0x12, 0x17, 0x0a, 0x07, 0x6b, 0x6d, 0x73, 0x5f,
"\x12kubernetes_version\x18\x05 \x01(\tR\x11kubernetesVersion\x12)\n" + 0x75, 0x72, 0x69, 0x18, 0x01, 0x20, 0x01, 0x28, 0x09, 0x52, 0x06, 0x6b, 0x6d, 0x73, 0x55, 0x72,
"\x10conformance_mode\x18\x06 \x01(\bR\x0fconformanceMode\x12J\n" + 0x69, 0x12, 0x1f, 0x0a, 0x0b, 0x73, 0x74, 0x6f, 0x72, 0x61, 0x67, 0x65, 0x5f, 0x75, 0x72, 0x69,
"\x15kubernetes_components\x18\a \x03(\v2\x15.components.ComponentR\x14kubernetesComponents\x12\x1f\n" + 0x18, 0x02, 0x20, 0x01, 0x28, 0x09, 0x52, 0x0a, 0x73, 0x74, 0x6f, 0x72, 0x61, 0x67, 0x65, 0x55,
"\vinit_secret\x18\b \x01(\fR\n" + 0x72, 0x69, 0x12, 0x29, 0x0a, 0x10, 0x6d, 0x65, 0x61, 0x73, 0x75, 0x72, 0x65, 0x6d, 0x65, 0x6e,
"initSecret\x12!\n" + 0x74, 0x5f, 0x73, 0x61, 0x6c, 0x74, 0x18, 0x03, 0x20, 0x01, 0x28, 0x0c, 0x52, 0x0f, 0x6d, 0x65,
"\fcluster_name\x18\t \x01(\tR\vclusterName\x12.\n" + 0x61, 0x73, 0x75, 0x72, 0x65, 0x6d, 0x65, 0x6e, 0x74, 0x53, 0x61, 0x6c, 0x74, 0x12, 0x2d, 0x0a,
"\x13apiserver_cert_sans\x18\n" + 0x12, 0x6b, 0x75, 0x62, 0x65, 0x72, 0x6e, 0x65, 0x74, 0x65, 0x73, 0x5f, 0x76, 0x65, 0x72, 0x73,
" \x03(\tR\x11apiserverCertSans\x12!\n" + 0x69, 0x6f, 0x6e, 0x18, 0x05, 0x20, 0x01, 0x28, 0x09, 0x52, 0x11, 0x6b, 0x75, 0x62, 0x65, 0x72,
"\fservice_cidr\x18\v \x01(\tR\vserviceCidrJ\x04\b\x04\x10\x05R\x19cloud_service_account_uri\"\xc1\x01\n" + 0x6e, 0x65, 0x74, 0x65, 0x73, 0x56, 0x65, 0x72, 0x73, 0x69, 0x6f, 0x6e, 0x12, 0x29, 0x0a, 0x10,
"\fInitResponse\x12>\n" + 0x63, 0x6f, 0x6e, 0x66, 0x6f, 0x72, 0x6d, 0x61, 0x6e, 0x63, 0x65, 0x5f, 0x6d, 0x6f, 0x64, 0x65,
"\finit_success\x18\x01 \x01(\v2\x19.init.InitSuccessResponseH\x00R\vinitSuccess\x12>\n" + 0x18, 0x06, 0x20, 0x01, 0x28, 0x08, 0x52, 0x0f, 0x63, 0x6f, 0x6e, 0x66, 0x6f, 0x72, 0x6d, 0x61,
"\finit_failure\x18\x02 \x01(\v2\x19.init.InitFailureResponseH\x00R\vinitFailure\x12)\n" + 0x6e, 0x63, 0x65, 0x4d, 0x6f, 0x64, 0x65, 0x12, 0x4a, 0x0a, 0x15, 0x6b, 0x75, 0x62, 0x65, 0x72,
"\x03log\x18\x03 \x01(\v2\x15.init.LogResponseTypeH\x00R\x03logB\x06\n" + 0x6e, 0x65, 0x74, 0x65, 0x73, 0x5f, 0x63, 0x6f, 0x6d, 0x70, 0x6f, 0x6e, 0x65, 0x6e, 0x74, 0x73,
"\x04kind\"o\n" + 0x18, 0x07, 0x20, 0x03, 0x28, 0x0b, 0x32, 0x15, 0x2e, 0x63, 0x6f, 0x6d, 0x70, 0x6f, 0x6e, 0x65,
"\x13InitSuccessResponse\x12\x1e\n" + 0x6e, 0x74, 0x73, 0x2e, 0x43, 0x6f, 0x6d, 0x70, 0x6f, 0x6e, 0x65, 0x6e, 0x74, 0x52, 0x14, 0x6b,
"\n" + 0x75, 0x62, 0x65, 0x72, 0x6e, 0x65, 0x74, 0x65, 0x73, 0x43, 0x6f, 0x6d, 0x70, 0x6f, 0x6e, 0x65,
"kubeconfig\x18\x01 \x01(\fR\n" + 0x6e, 0x74, 0x73, 0x12, 0x1f, 0x0a, 0x0b, 0x69, 0x6e, 0x69, 0x74, 0x5f, 0x73, 0x65, 0x63, 0x72,
"kubeconfig\x12\x19\n" + 0x65, 0x74, 0x18, 0x08, 0x20, 0x01, 0x28, 0x0c, 0x52, 0x0a, 0x69, 0x6e, 0x69, 0x74, 0x53, 0x65,
"\bowner_id\x18\x02 \x01(\fR\aownerId\x12\x1d\n" + 0x63, 0x72, 0x65, 0x74, 0x12, 0x21, 0x0a, 0x0c, 0x63, 0x6c, 0x75, 0x73, 0x74, 0x65, 0x72, 0x5f,
"\n" + 0x6e, 0x61, 0x6d, 0x65, 0x18, 0x09, 0x20, 0x01, 0x28, 0x09, 0x52, 0x0b, 0x63, 0x6c, 0x75, 0x73,
"cluster_id\x18\x03 \x01(\fR\tclusterId\"+\n" + 0x74, 0x65, 0x72, 0x4e, 0x61, 0x6d, 0x65, 0x12, 0x2e, 0x0a, 0x13, 0x61, 0x70, 0x69, 0x73, 0x65,
"\x13InitFailureResponse\x12\x14\n" + 0x72, 0x76, 0x65, 0x72, 0x5f, 0x63, 0x65, 0x72, 0x74, 0x5f, 0x73, 0x61, 0x6e, 0x73, 0x18, 0x0a,
"\x05error\x18\x01 \x01(\tR\x05error\"#\n" + 0x20, 0x03, 0x28, 0x09, 0x52, 0x11, 0x61, 0x70, 0x69, 0x73, 0x65, 0x72, 0x76, 0x65, 0x72, 0x43,
"\x0fLogResponseType\x12\x10\n" + 0x65, 0x72, 0x74, 0x53, 0x61, 0x6e, 0x73, 0x12, 0x21, 0x0a, 0x0c, 0x73, 0x65, 0x72, 0x76, 0x69,
"\x03log\x18\x01 \x01(\fR\x03log\"x\n" + 0x63, 0x65, 0x5f, 0x63, 0x69, 0x64, 0x72, 0x18, 0x0b, 0x20, 0x01, 0x28, 0x09, 0x52, 0x0b, 0x73,
"\x13KubernetesComponent\x12\x10\n" + 0x65, 0x72, 0x76, 0x69, 0x63, 0x65, 0x43, 0x69, 0x64, 0x72, 0x4a, 0x04, 0x08, 0x04, 0x10, 0x05,
"\x03url\x18\x01 \x01(\tR\x03url\x12\x12\n" + 0x52, 0x19, 0x63, 0x6c, 0x6f, 0x75, 0x64, 0x5f, 0x73, 0x65, 0x72, 0x76, 0x69, 0x63, 0x65, 0x5f,
"\x04hash\x18\x02 \x01(\tR\x04hash\x12!\n" + 0x61, 0x63, 0x63, 0x6f, 0x75, 0x6e, 0x74, 0x5f, 0x75, 0x72, 0x69, 0x22, 0xc1, 0x01, 0x0a, 0x0c,
"\finstall_path\x18\x03 \x01(\tR\vinstallPath\x12\x18\n" + 0x49, 0x6e, 0x69, 0x74, 0x52, 0x65, 0x73, 0x70, 0x6f, 0x6e, 0x73, 0x65, 0x12, 0x3e, 0x0a, 0x0c,
"\aextract\x18\x04 \x01(\bR\aextract26\n" + 0x69, 0x6e, 0x69, 0x74, 0x5f, 0x73, 0x75, 0x63, 0x63, 0x65, 0x73, 0x73, 0x18, 0x01, 0x20, 0x01,
"\x03API\x12/\n" + 0x28, 0x0b, 0x32, 0x19, 0x2e, 0x69, 0x6e, 0x69, 0x74, 0x2e, 0x49, 0x6e, 0x69, 0x74, 0x53, 0x75,
"\x04Init\x12\x11.init.InitRequest\x1a\x12.init.InitResponse0\x01B@Z>github.com/edgelesssys/constellation/v2/bootstrapper/initprotob\x06proto3" 0x63, 0x63, 0x65, 0x73, 0x73, 0x52, 0x65, 0x73, 0x70, 0x6f, 0x6e, 0x73, 0x65, 0x48, 0x00, 0x52,
0x0b, 0x69, 0x6e, 0x69, 0x74, 0x53, 0x75, 0x63, 0x63, 0x65, 0x73, 0x73, 0x12, 0x3e, 0x0a, 0x0c,
0x69, 0x6e, 0x69, 0x74, 0x5f, 0x66, 0x61, 0x69, 0x6c, 0x75, 0x72, 0x65, 0x18, 0x02, 0x20, 0x01,
0x28, 0x0b, 0x32, 0x19, 0x2e, 0x69, 0x6e, 0x69, 0x74, 0x2e, 0x49, 0x6e, 0x69, 0x74, 0x46, 0x61,
0x69, 0x6c, 0x75, 0x72, 0x65, 0x52, 0x65, 0x73, 0x70, 0x6f, 0x6e, 0x73, 0x65, 0x48, 0x00, 0x52,
0x0b, 0x69, 0x6e, 0x69, 0x74, 0x46, 0x61, 0x69, 0x6c, 0x75, 0x72, 0x65, 0x12, 0x29, 0x0a, 0x03,
0x6c, 0x6f, 0x67, 0x18, 0x03, 0x20, 0x01, 0x28, 0x0b, 0x32, 0x15, 0x2e, 0x69, 0x6e, 0x69, 0x74,
0x2e, 0x4c, 0x6f, 0x67, 0x52, 0x65, 0x73, 0x70, 0x6f, 0x6e, 0x73, 0x65, 0x54, 0x79, 0x70, 0x65,
0x48, 0x00, 0x52, 0x03, 0x6c, 0x6f, 0x67, 0x42, 0x06, 0x0a, 0x04, 0x6b, 0x69, 0x6e, 0x64, 0x22,
0x6f, 0x0a, 0x13, 0x49, 0x6e, 0x69, 0x74, 0x53, 0x75, 0x63, 0x63, 0x65, 0x73, 0x73, 0x52, 0x65,
0x73, 0x70, 0x6f, 0x6e, 0x73, 0x65, 0x12, 0x1e, 0x0a, 0x0a, 0x6b, 0x75, 0x62, 0x65, 0x63, 0x6f,
0x6e, 0x66, 0x69, 0x67, 0x18, 0x01, 0x20, 0x01, 0x28, 0x0c, 0x52, 0x0a, 0x6b, 0x75, 0x62, 0x65,
0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x12, 0x19, 0x0a, 0x08, 0x6f, 0x77, 0x6e, 0x65, 0x72, 0x5f,
0x69, 0x64, 0x18, 0x02, 0x20, 0x01, 0x28, 0x0c, 0x52, 0x07, 0x6f, 0x77, 0x6e, 0x65, 0x72, 0x49,
0x64, 0x12, 0x1d, 0x0a, 0x0a, 0x63, 0x6c, 0x75, 0x73, 0x74, 0x65, 0x72, 0x5f, 0x69, 0x64, 0x18,
0x03, 0x20, 0x01, 0x28, 0x0c, 0x52, 0x09, 0x63, 0x6c, 0x75, 0x73, 0x74, 0x65, 0x72, 0x49, 0x64,
0x22, 0x2b, 0x0a, 0x13, 0x49, 0x6e, 0x69, 0x74, 0x46, 0x61, 0x69, 0x6c, 0x75, 0x72, 0x65, 0x52,
0x65, 0x73, 0x70, 0x6f, 0x6e, 0x73, 0x65, 0x12, 0x14, 0x0a, 0x05, 0x65, 0x72, 0x72, 0x6f, 0x72,
0x18, 0x01, 0x20, 0x01, 0x28, 0x09, 0x52, 0x05, 0x65, 0x72, 0x72, 0x6f, 0x72, 0x22, 0x23, 0x0a,
0x0f, 0x4c, 0x6f, 0x67, 0x52, 0x65, 0x73, 0x70, 0x6f, 0x6e, 0x73, 0x65, 0x54, 0x79, 0x70, 0x65,
0x12, 0x10, 0x0a, 0x03, 0x6c, 0x6f, 0x67, 0x18, 0x01, 0x20, 0x01, 0x28, 0x0c, 0x52, 0x03, 0x6c,
0x6f, 0x67, 0x22, 0x78, 0x0a, 0x13, 0x4b, 0x75, 0x62, 0x65, 0x72, 0x6e, 0x65, 0x74, 0x65, 0x73,
0x43, 0x6f, 0x6d, 0x70, 0x6f, 0x6e, 0x65, 0x6e, 0x74, 0x12, 0x10, 0x0a, 0x03, 0x75, 0x72, 0x6c,
0x18, 0x01, 0x20, 0x01, 0x28, 0x09, 0x52, 0x03, 0x75, 0x72, 0x6c, 0x12, 0x12, 0x0a, 0x04, 0x68,
0x61, 0x73, 0x68, 0x18, 0x02, 0x20, 0x01, 0x28, 0x09, 0x52, 0x04, 0x68, 0x61, 0x73, 0x68, 0x12,
0x21, 0x0a, 0x0c, 0x69, 0x6e, 0x73, 0x74, 0x61, 0x6c, 0x6c, 0x5f, 0x70, 0x61, 0x74, 0x68, 0x18,
0x03, 0x20, 0x01, 0x28, 0x09, 0x52, 0x0b, 0x69, 0x6e, 0x73, 0x74, 0x61, 0x6c, 0x6c, 0x50, 0x61,
0x74, 0x68, 0x12, 0x18, 0x0a, 0x07, 0x65, 0x78, 0x74, 0x72, 0x61, 0x63, 0x74, 0x18, 0x04, 0x20,
0x01, 0x28, 0x08, 0x52, 0x07, 0x65, 0x78, 0x74, 0x72, 0x61, 0x63, 0x74, 0x32, 0x36, 0x0a, 0x03,
0x41, 0x50, 0x49, 0x12, 0x2f, 0x0a, 0x04, 0x49, 0x6e, 0x69, 0x74, 0x12, 0x11, 0x2e, 0x69, 0x6e,
0x69, 0x74, 0x2e, 0x49, 0x6e, 0x69, 0x74, 0x52, 0x65, 0x71, 0x75, 0x65, 0x73, 0x74, 0x1a, 0x12,
0x2e, 0x69, 0x6e, 0x69, 0x74, 0x2e, 0x49, 0x6e, 0x69, 0x74, 0x52, 0x65, 0x73, 0x70, 0x6f, 0x6e,
0x73, 0x65, 0x30, 0x01, 0x42, 0x40, 0x5a, 0x3e, 0x67, 0x69, 0x74, 0x68, 0x75, 0x62, 0x2e, 0x63,
0x6f, 0x6d, 0x2f, 0x65, 0x64, 0x67, 0x65, 0x6c, 0x65, 0x73, 0x73, 0x73, 0x79, 0x73, 0x2f, 0x63,
0x6f, 0x6e, 0x73, 0x74, 0x65, 0x6c, 0x6c, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x2f, 0x76, 0x32, 0x2f,
0x62, 0x6f, 0x6f, 0x74, 0x73, 0x74, 0x72, 0x61, 0x70, 0x70, 0x65, 0x72, 0x2f, 0x69, 0x6e, 0x69,
0x74, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x62, 0x06, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x33,
}
var ( var (
file_bootstrapper_initproto_init_proto_rawDescOnce sync.Once file_bootstrapper_initproto_init_proto_rawDescOnce sync.Once
file_bootstrapper_initproto_init_proto_rawDescData []byte file_bootstrapper_initproto_init_proto_rawDescData = file_bootstrapper_initproto_init_proto_rawDesc
) )
func file_bootstrapper_initproto_init_proto_rawDescGZIP() []byte { func file_bootstrapper_initproto_init_proto_rawDescGZIP() []byte {
file_bootstrapper_initproto_init_proto_rawDescOnce.Do(func() { file_bootstrapper_initproto_init_proto_rawDescOnce.Do(func() {
file_bootstrapper_initproto_init_proto_rawDescData = protoimpl.X.CompressGZIP(unsafe.Slice(unsafe.StringData(file_bootstrapper_initproto_init_proto_rawDesc), len(file_bootstrapper_initproto_init_proto_rawDesc))) file_bootstrapper_initproto_init_proto_rawDescData = protoimpl.X.CompressGZIP(file_bootstrapper_initproto_init_proto_rawDescData)
}) })
return file_bootstrapper_initproto_init_proto_rawDescData return file_bootstrapper_initproto_init_proto_rawDescData
} }
@ -549,7 +585,7 @@ func file_bootstrapper_initproto_init_proto_init() {
out := protoimpl.TypeBuilder{ out := protoimpl.TypeBuilder{
File: protoimpl.DescBuilder{ File: protoimpl.DescBuilder{
GoPackagePath: reflect.TypeOf(x{}).PkgPath(), GoPackagePath: reflect.TypeOf(x{}).PkgPath(),
RawDescriptor: unsafe.Slice(unsafe.StringData(file_bootstrapper_initproto_init_proto_rawDesc), len(file_bootstrapper_initproto_init_proto_rawDesc)), RawDescriptor: file_bootstrapper_initproto_init_proto_rawDesc,
NumEnums: 0, NumEnums: 0,
NumMessages: 6, NumMessages: 6,
NumExtensions: 0, NumExtensions: 0,
@ -560,6 +596,7 @@ func file_bootstrapper_initproto_init_proto_init() {
MessageInfos: file_bootstrapper_initproto_init_proto_msgTypes, MessageInfos: file_bootstrapper_initproto_init_proto_msgTypes,
}.Build() }.Build()
File_bootstrapper_initproto_init_proto = out.File File_bootstrapper_initproto_init_proto = out.File
file_bootstrapper_initproto_init_proto_rawDesc = nil
file_bootstrapper_initproto_init_proto_goTypes = nil file_bootstrapper_initproto_init_proto_goTypes = nil
file_bootstrapper_initproto_init_proto_depIdxs = nil file_bootstrapper_initproto_init_proto_depIdxs = nil
} }

View File

@ -11,7 +11,6 @@ go_library(
"//bootstrapper/internal/journald", "//bootstrapper/internal/journald",
"//internal/atls", "//internal/atls",
"//internal/attestation", "//internal/attestation",
"//internal/constants",
"//internal/crypto", "//internal/crypto",
"//internal/file", "//internal/file",
"//internal/grpc/atlscredentials", "//internal/grpc/atlscredentials",
@ -27,7 +26,6 @@ go_library(
"@org_golang_google_grpc//keepalive", "@org_golang_google_grpc//keepalive",
"@org_golang_google_grpc//status", "@org_golang_google_grpc//status",
"@org_golang_x_crypto//bcrypt", "@org_golang_x_crypto//bcrypt",
"@org_golang_x_crypto//ssh",
], ],
) )

View File

@ -20,7 +20,6 @@ package initserver
import ( import (
"bufio" "bufio"
"context" "context"
"crypto/ed25519"
"errors" "errors"
"fmt" "fmt"
"io" "io"
@ -34,7 +33,6 @@ import (
"github.com/edgelesssys/constellation/v2/bootstrapper/internal/journald" "github.com/edgelesssys/constellation/v2/bootstrapper/internal/journald"
"github.com/edgelesssys/constellation/v2/internal/atls" "github.com/edgelesssys/constellation/v2/internal/atls"
"github.com/edgelesssys/constellation/v2/internal/attestation" "github.com/edgelesssys/constellation/v2/internal/attestation"
"github.com/edgelesssys/constellation/v2/internal/constants"
"github.com/edgelesssys/constellation/v2/internal/crypto" "github.com/edgelesssys/constellation/v2/internal/crypto"
"github.com/edgelesssys/constellation/v2/internal/file" "github.com/edgelesssys/constellation/v2/internal/file"
"github.com/edgelesssys/constellation/v2/internal/grpc/atlscredentials" "github.com/edgelesssys/constellation/v2/internal/grpc/atlscredentials"
@ -46,7 +44,6 @@ import (
"github.com/edgelesssys/constellation/v2/internal/role" "github.com/edgelesssys/constellation/v2/internal/role"
"github.com/edgelesssys/constellation/v2/internal/versions/components" "github.com/edgelesssys/constellation/v2/internal/versions/components"
"golang.org/x/crypto/bcrypt" "golang.org/x/crypto/bcrypt"
"golang.org/x/crypto/ssh"
"google.golang.org/grpc" "google.golang.org/grpc"
"google.golang.org/grpc/codes" "google.golang.org/grpc/codes"
"google.golang.org/grpc/keepalive" "google.golang.org/grpc/keepalive"
@ -225,28 +222,6 @@ func (s *Server) Init(req *initproto.InitRequest, stream initproto.API_InitServe
return err return err
} }
// Derive the emergency ssh CA key
key, err := cloudKms.GetDEK(stream.Context(), crypto.DEKPrefix+constants.SSHCAKeySuffix, ed25519.SeedSize)
if err != nil {
if e := s.sendLogsWithMessage(stream, status.Errorf(codes.Internal, "retrieving DEK for key derivation: %s", err)); e != nil {
err = errors.Join(err, e)
}
return err
}
ca, err := crypto.GenerateEmergencySSHCAKey(key)
if err != nil {
if e := s.sendLogsWithMessage(stream, status.Errorf(codes.Internal, "generating emergency SSH CA key: %s", err)); e != nil {
err = errors.Join(err, e)
}
return err
}
if err := s.fileHandler.Write(constants.SSHCAKeyPath, ssh.MarshalAuthorizedKey(ca.PublicKey()), file.OptMkdirAll); err != nil {
if e := s.sendLogsWithMessage(stream, status.Errorf(codes.Internal, "writing ssh CA pubkey: %s", err)); e != nil {
err = errors.Join(err, e)
}
return err
}
clusterName := req.ClusterName clusterName := req.ClusterName
if clusterName == "" { if clusterName == "" {
clusterName = "constellation" clusterName = "constellation"

View File

@ -67,7 +67,7 @@ func TestNew(t *testing.T) {
assert := assert.New(t) assert := assert.New(t)
server, err := New( server, err := New(
t.Context(), newFakeLock(), &stubClusterInitializer{}, atls.NewFakeIssuer(variant.Dummy{}), context.TODO(), newFakeLock(), &stubClusterInitializer{}, atls.NewFakeIssuer(variant.Dummy{}),
&stubDisk{}, fh, &tc.metadata, logger.NewTest(t), &stubDisk{}, fh, &tc.metadata, logger.NewTest(t),
) )
if tc.wantErr { if tc.wantErr {
@ -352,9 +352,9 @@ func TestSetupDisk(t *testing.T) {
masterSecret := uri.MasterSecret{Key: tc.masterKey, Salt: tc.salt} masterSecret := uri.MasterSecret{Key: tc.masterKey, Salt: tc.salt}
cloudKms, err := kmssetup.KMS(t.Context(), uri.NoStoreURI, masterSecret.EncodeToURI()) cloudKms, err := kmssetup.KMS(context.Background(), uri.NoStoreURI, masterSecret.EncodeToURI())
require.NoError(err) require.NoError(err)
assert.NoError(server.setupDisk(t.Context(), cloudKms)) assert.NoError(server.setupDisk(context.Background(), cloudKms))
}) })
} }
} }

View File

@ -271,10 +271,6 @@ func (c *JoinClient) startNodeAndJoin(ticket *joinproto.IssueJoinTicketResponse,
return fmt.Errorf("writing kubelet key: %w", err) return fmt.Errorf("writing kubelet key: %w", err)
} }
if err := c.fileHandler.Write(constants.SSHCAKeyPath, ticket.AuthorizedCaPublicKey, file.OptMkdirAll); err != nil {
return fmt.Errorf("writing ssh ca key: %w", err)
}
state := nodestate.NodeState{ state := nodestate.NodeState{
Role: c.role, Role: c.role,
MeasurementSalt: ticket.MeasurementSalt, MeasurementSalt: ticket.MeasurementSalt,

View File

@ -50,8 +50,6 @@ func TestClient(t *testing.T) {
{Role: role.ControlPlane, Name: "node-4", VPCIP: "192.0.2.2"}, {Role: role.ControlPlane, Name: "node-4", VPCIP: "192.0.2.2"},
{Role: role.ControlPlane, Name: "node-5", VPCIP: "192.0.2.3"}, {Role: role.ControlPlane, Name: "node-5", VPCIP: "192.0.2.3"},
} }
caDerivationKey := make([]byte, 256)
respCaKey := &joinproto.IssueJoinTicketResponse{AuthorizedCaPublicKey: caDerivationKey}
testCases := map[string]struct { testCases := map[string]struct {
role role.Role role role.Role
@ -71,7 +69,7 @@ func TestClient(t *testing.T) {
selfAnswer{err: assert.AnError}, selfAnswer{err: assert.AnError},
selfAnswer{instance: workerSelf}, selfAnswer{instance: workerSelf},
listAnswer{instances: peers}, listAnswer{instances: peers},
issueJoinTicketAnswer{resp: respCaKey}, issueJoinTicketAnswer{},
}, },
clusterJoiner: &stubClusterJoiner{}, clusterJoiner: &stubClusterJoiner{},
nodeLock: newFakeLock(), nodeLock: newFakeLock(),
@ -87,7 +85,7 @@ func TestClient(t *testing.T) {
selfAnswer{instance: metadata.InstanceMetadata{Name: "node-1"}}, selfAnswer{instance: metadata.InstanceMetadata{Name: "node-1"}},
selfAnswer{instance: workerSelf}, selfAnswer{instance: workerSelf},
listAnswer{instances: peers}, listAnswer{instances: peers},
issueJoinTicketAnswer{resp: respCaKey}, issueJoinTicketAnswer{},
}, },
clusterJoiner: &stubClusterJoiner{}, clusterJoiner: &stubClusterJoiner{},
nodeLock: newFakeLock(), nodeLock: newFakeLock(),
@ -103,7 +101,7 @@ func TestClient(t *testing.T) {
listAnswer{err: assert.AnError}, listAnswer{err: assert.AnError},
listAnswer{err: assert.AnError}, listAnswer{err: assert.AnError},
listAnswer{instances: peers}, listAnswer{instances: peers},
issueJoinTicketAnswer{resp: respCaKey}, issueJoinTicketAnswer{},
}, },
clusterJoiner: &stubClusterJoiner{}, clusterJoiner: &stubClusterJoiner{},
nodeLock: newFakeLock(), nodeLock: newFakeLock(),
@ -119,7 +117,7 @@ func TestClient(t *testing.T) {
listAnswer{}, listAnswer{},
listAnswer{}, listAnswer{},
listAnswer{instances: peers}, listAnswer{instances: peers},
issueJoinTicketAnswer{resp: respCaKey}, issueJoinTicketAnswer{},
}, },
clusterJoiner: &stubClusterJoiner{}, clusterJoiner: &stubClusterJoiner{},
nodeLock: newFakeLock(), nodeLock: newFakeLock(),
@ -136,7 +134,7 @@ func TestClient(t *testing.T) {
listAnswer{instances: peers}, listAnswer{instances: peers},
issueJoinTicketAnswer{err: assert.AnError}, issueJoinTicketAnswer{err: assert.AnError},
listAnswer{instances: peers}, listAnswer{instances: peers},
issueJoinTicketAnswer{resp: respCaKey}, issueJoinTicketAnswer{},
}, },
clusterJoiner: &stubClusterJoiner{}, clusterJoiner: &stubClusterJoiner{},
nodeLock: newFakeLock(), nodeLock: newFakeLock(),
@ -153,7 +151,7 @@ func TestClient(t *testing.T) {
listAnswer{instances: peers}, listAnswer{instances: peers},
issueJoinTicketAnswer{err: assert.AnError}, issueJoinTicketAnswer{err: assert.AnError},
listAnswer{instances: peers}, listAnswer{instances: peers},
issueJoinTicketAnswer{resp: respCaKey}, issueJoinTicketAnswer{},
}, },
clusterJoiner: &stubClusterJoiner{}, clusterJoiner: &stubClusterJoiner{},
nodeLock: newFakeLock(), nodeLock: newFakeLock(),
@ -166,7 +164,7 @@ func TestClient(t *testing.T) {
apiAnswers: []any{ apiAnswers: []any{
selfAnswer{instance: controlSelf}, selfAnswer{instance: controlSelf},
listAnswer{instances: peers}, listAnswer{instances: peers},
issueJoinTicketAnswer{resp: respCaKey}, issueJoinTicketAnswer{},
}, },
clusterJoiner: &stubClusterJoiner{numBadCalls: -1, joinClusterErr: assert.AnError}, clusterJoiner: &stubClusterJoiner{numBadCalls: -1, joinClusterErr: assert.AnError},
nodeLock: newFakeLock(), nodeLock: newFakeLock(),
@ -179,7 +177,7 @@ func TestClient(t *testing.T) {
apiAnswers: []any{ apiAnswers: []any{
selfAnswer{instance: controlSelf}, selfAnswer{instance: controlSelf},
listAnswer{instances: peers}, listAnswer{instances: peers},
issueJoinTicketAnswer{resp: respCaKey}, issueJoinTicketAnswer{},
}, },
clusterJoiner: &stubClusterJoiner{numBadCalls: 1, joinClusterErr: assert.AnError}, clusterJoiner: &stubClusterJoiner{numBadCalls: 1, joinClusterErr: assert.AnError},
nodeLock: newFakeLock(), nodeLock: newFakeLock(),
@ -193,7 +191,7 @@ func TestClient(t *testing.T) {
apiAnswers: []any{ apiAnswers: []any{
selfAnswer{instance: controlSelf}, selfAnswer{instance: controlSelf},
listAnswer{instances: peers}, listAnswer{instances: peers},
issueJoinTicketAnswer{resp: respCaKey}, issueJoinTicketAnswer{},
}, },
clusterJoiner: &stubClusterJoiner{}, clusterJoiner: &stubClusterJoiner{},
nodeLock: lockedLock, nodeLock: lockedLock,

View File

@ -28,7 +28,6 @@ go_library(
"@io_k8s_kubelet//config/v1beta1", "@io_k8s_kubelet//config/v1beta1",
"@io_k8s_kubernetes//cmd/kubeadm/app/apis/kubeadm/v1beta3", "@io_k8s_kubernetes//cmd/kubeadm/app/apis/kubeadm/v1beta3",
"@io_k8s_kubernetes//cmd/kubeadm/app/constants", "@io_k8s_kubernetes//cmd/kubeadm/app/constants",
"@org_golang_x_mod//semver",
], ],
) )

View File

@ -12,7 +12,6 @@ import (
"github.com/edgelesssys/constellation/v2/bootstrapper/internal/certificate" "github.com/edgelesssys/constellation/v2/bootstrapper/internal/certificate"
"github.com/edgelesssys/constellation/v2/internal/constants" "github.com/edgelesssys/constellation/v2/internal/constants"
"github.com/edgelesssys/constellation/v2/internal/kubernetes" "github.com/edgelesssys/constellation/v2/internal/kubernetes"
"golang.org/x/mod/semver"
corev1 "k8s.io/api/core/v1" corev1 "k8s.io/api/core/v1"
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
kubeletconf "k8s.io/kubelet/config/v1beta1" kubeletconf "k8s.io/kubelet/config/v1beta1"
@ -39,7 +38,7 @@ func (c *KubdeadmConfiguration) InitConfiguration(externalCloudProvider bool, cl
cloudProvider = "external" cloudProvider = "external"
} }
initConfig := KubeadmInitYAML{ return KubeadmInitYAML{
InitConfiguration: kubeadm.InitConfiguration{ InitConfiguration: kubeadm.InitConfiguration{
TypeMeta: metav1.TypeMeta{ TypeMeta: metav1.TypeMeta{
APIVersion: kubeadm.SchemeGroupVersion.String(), APIVersion: kubeadm.SchemeGroupVersion.String(),
@ -158,11 +157,6 @@ func (c *KubdeadmConfiguration) InitConfiguration(externalCloudProvider bool, cl
TLSPrivateKeyFile: certificate.KeyFilename, TLSPrivateKeyFile: certificate.KeyFilename,
}, },
} }
if semver.Compare(clusterVersion, "v1.31.0") >= 0 {
initConfig.ClusterConfiguration.FeatureGates = map[string]bool{"ControlPlaneKubeletLocalMode": true}
}
return initConfig
} }
// JoinConfiguration returns a new kubeadm join configuration. // JoinConfiguration returns a new kubeadm join configuration.

View File

@ -201,7 +201,7 @@ func TestInitCluster(t *testing.T) {
} }
_, err := kube.InitCluster( _, err := kube.InitCluster(
t.Context(), string(tc.k8sVersion), "kubernetes", context.Background(), string(tc.k8sVersion), "kubernetes",
false, nil, nil, "", false, nil, nil, "",
) )
@ -384,7 +384,7 @@ func TestJoinCluster(t *testing.T) {
log: logger.NewTest(t), log: logger.NewTest(t),
} }
err := kube.JoinCluster(t.Context(), joinCommand, tc.role, tc.k8sComponents) err := kube.JoinCluster(context.Background(), joinCommand, tc.role, tc.k8sComponents)
if tc.wantErr { if tc.wantErr {
assert.Error(err) assert.Error(err)
return return

View File

@ -39,7 +39,7 @@ func TestCloudKubeAPIWaiter(t *testing.T) {
require := require.New(t) require := require.New(t)
waiter := &CloudKubeAPIWaiter{} waiter := &CloudKubeAPIWaiter{}
ctx, cancel := context.WithTimeout(t.Context(), 0) ctx, cancel := context.WithTimeout(context.Background(), 0)
defer cancel() defer cancel()
err := waiter.Wait(ctx, tc.kubeClient) err := waiter.Wait(ctx, tc.kubeClient)
if tc.wantErr { if tc.wantErr {

Some files were not shown because too many files have changed in this diff Show More