mirror of
https://github.com/edgelesssys/constellation.git
synced 2025-04-25 01:29:14 -04:00
Compare commits
3 Commits
Author | SHA1 | Date | |
---|---|---|---|
![]() |
e3968fc3d5 | ||
![]() |
934751e8da | ||
![]() |
bc81fb8d46 |
@ -1 +1 @@
|
|||||||
7.6.0
|
7.3.2
|
||||||
|
2
.github/actions/artifact_download/action.yml
vendored
2
.github/actions/artifact_download/action.yml
vendored
@ -28,7 +28,7 @@ runs:
|
|||||||
run: echo "directory=$(mktemp -d)" >> "$GITHUB_OUTPUT"
|
run: echo "directory=$(mktemp -d)" >> "$GITHUB_OUTPUT"
|
||||||
|
|
||||||
- name: Download the artifact
|
- name: Download the artifact
|
||||||
uses: actions/download-artifact@95815c38cf2ff2164869cbab79da8d1f422bc89e # v4.2.1
|
uses: actions/download-artifact@fa0a91b85d4f404e444e00e005971372dc801d16 # v4.1.8
|
||||||
with:
|
with:
|
||||||
name: ${{ inputs.name }}
|
name: ${{ inputs.name }}
|
||||||
path: ${{ steps.tempdir.outputs.directory }}
|
path: ${{ steps.tempdir.outputs.directory }}
|
||||||
|
2
.github/actions/artifact_upload/action.yml
vendored
2
.github/actions/artifact_upload/action.yml
vendored
@ -69,7 +69,7 @@ runs:
|
|||||||
done
|
done
|
||||||
|
|
||||||
- name: Upload archive as artifact
|
- name: Upload archive as artifact
|
||||||
uses: actions/upload-artifact@ea165f8d65b6e75b540449e92b4886f43607fa02 # v4.6.2
|
uses: actions/upload-artifact@b4b15b8c7c6ac21ea08fcf65892d2ee8f75cf882 # v4.4.3
|
||||||
with:
|
with:
|
||||||
name: ${{ inputs.name }}
|
name: ${{ inputs.name }}
|
||||||
path: ${{ steps.tempdir.outputs.directory }}/archive.7z
|
path: ${{ steps.tempdir.outputs.directory }}/archive.7z
|
||||||
|
2
.github/actions/build_cli/action.yml
vendored
2
.github/actions/build_cli/action.yml
vendored
@ -79,7 +79,7 @@ runs:
|
|||||||
# once it has the functionality
|
# once it has the functionality
|
||||||
- name: Install Cosign
|
- name: Install Cosign
|
||||||
if: inputs.cosignPublicKey != '' && inputs.cosignPrivateKey != '' && inputs.cosignPassword != ''
|
if: inputs.cosignPublicKey != '' && inputs.cosignPrivateKey != '' && inputs.cosignPassword != ''
|
||||||
uses: sigstore/cosign-installer@d7d6bc7722e3daa8354c50bcb52f4837da5e9b6a # v3.8.1
|
uses: sigstore/cosign-installer@dc72c7d5c4d10cd6bcb8cf6e3fd625a9e5e537da # v3.7.0
|
||||||
|
|
||||||
- name: Install Rekor
|
- name: Install Rekor
|
||||||
if: inputs.cosignPublicKey != '' && inputs.cosignPrivateKey != '' && inputs.cosignPassword != ''
|
if: inputs.cosignPublicKey != '' && inputs.cosignPrivateKey != '' && inputs.cosignPassword != ''
|
||||||
|
@ -42,7 +42,7 @@ runs:
|
|||||||
|
|
||||||
- name: Docker metadata
|
- name: Docker metadata
|
||||||
id: meta
|
id: meta
|
||||||
uses: docker/metadata-action@902fa8ec7d6ecbf8d84d538b9b233a880e428804 # v5.7.0
|
uses: docker/metadata-action@369eb591f429131d6889c46b94e711f089e6ca96 # v5.6.1
|
||||||
with:
|
with:
|
||||||
images: |
|
images: |
|
||||||
ghcr.io/${{ github.repository }}/${{ inputs.name }}
|
ghcr.io/${{ github.repository }}/${{ inputs.name }}
|
||||||
@ -62,7 +62,7 @@ runs:
|
|||||||
|
|
||||||
- name: Build and push container image
|
- name: Build and push container image
|
||||||
id: build-micro-service
|
id: build-micro-service
|
||||||
uses: docker/build-push-action@471d1dc4e07e5cdedd4c2171150001c434f0b7a4 # v6.15.0
|
uses: docker/build-push-action@48aba3b46d1b1fec4febb7c5d0c644b249a11355 # v6.10.0
|
||||||
with:
|
with:
|
||||||
context: .
|
context: .
|
||||||
file: ${{ inputs.dockerfile }}
|
file: ${{ inputs.dockerfile }}
|
||||||
|
4
.github/actions/cdbg_deploy/action.yml
vendored
4
.github/actions/cdbg_deploy/action.yml
vendored
@ -61,7 +61,7 @@ runs:
|
|||||||
|
|
||||||
- name: Login to AWS (IAM service principal)
|
- name: Login to AWS (IAM service principal)
|
||||||
if: inputs.cloudProvider == 'aws'
|
if: inputs.cloudProvider == 'aws'
|
||||||
uses: aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1.0
|
uses: aws-actions/configure-aws-credentials@e3dd6a429d7300a6a4c196c26e071d42e0343502 # v4.0.2
|
||||||
with:
|
with:
|
||||||
role-to-assume: arn:aws:iam::795746500882:role/GithubActionsE2EIAM
|
role-to-assume: arn:aws:iam::795746500882:role/GithubActionsE2EIAM
|
||||||
aws-region: eu-central-1
|
aws-region: eu-central-1
|
||||||
@ -80,7 +80,7 @@ runs:
|
|||||||
|
|
||||||
- name: Login to AWS (Cluster service principal)
|
- name: Login to AWS (Cluster service principal)
|
||||||
if: inputs.cloudProvider == 'aws'
|
if: inputs.cloudProvider == 'aws'
|
||||||
uses: aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1.0
|
uses: aws-actions/configure-aws-credentials@e3dd6a429d7300a6a4c196c26e071d42e0343502 # v4.0.2
|
||||||
with:
|
with:
|
||||||
role-to-assume: arn:aws:iam::795746500882:role/GithubActionsE2ECluster
|
role-to-assume: arn:aws:iam::795746500882:role/GithubActionsE2ECluster
|
||||||
aws-region: eu-central-1
|
aws-region: eu-central-1
|
||||||
|
@ -1,64 +0,0 @@
|
|||||||
name: Check measurements reproducibility
|
|
||||||
description: Check if the measurements of a given release are reproducible.
|
|
||||||
|
|
||||||
inputs:
|
|
||||||
version:
|
|
||||||
type: string
|
|
||||||
description: The version of the measurements that are downloaded from the CDN.
|
|
||||||
required: true
|
|
||||||
ref:
|
|
||||||
type: string
|
|
||||||
description: The git ref to check out. You probably want this to be the tag of the release you are testing.
|
|
||||||
required: true
|
|
||||||
|
|
||||||
runs:
|
|
||||||
using: "composite"
|
|
||||||
steps:
|
|
||||||
- name: Checkout
|
|
||||||
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
|
|
||||||
with:
|
|
||||||
ref: ${{ inputs.ref }}
|
|
||||||
path: ./release
|
|
||||||
|
|
||||||
- name: Set up bazel
|
|
||||||
uses: ./.github/actions/setup_bazel_nix
|
|
||||||
with:
|
|
||||||
useCache: "false"
|
|
||||||
nixTools: |
|
|
||||||
systemdUkify
|
|
||||||
jq
|
|
||||||
jd-diff-patch
|
|
||||||
moreutils
|
|
||||||
|
|
||||||
- name: Allow unrestricted user namespaces
|
|
||||||
shell: bash
|
|
||||||
run: |
|
|
||||||
sudo sysctl --ignore --write kernel.apparmor_restrict_unprivileged_unconfined=0
|
|
||||||
sudo sysctl --ignore --write kernel.apparmor_restrict_unprivileged_userns=0
|
|
||||||
|
|
||||||
- name: Build images
|
|
||||||
id: build-images
|
|
||||||
shell: bash
|
|
||||||
run: |
|
|
||||||
set -euo pipefail
|
|
||||||
|
|
||||||
# Build required binaries
|
|
||||||
pushd release
|
|
||||||
bazel build //image/system:stable
|
|
||||||
echo "buildPath=$PWD/bazel-bin/image" | tee -a "$GITHUB_OUTPUT"
|
|
||||||
popd
|
|
||||||
|
|
||||||
- name: Download measurements
|
|
||||||
shell: bash
|
|
||||||
run: |
|
|
||||||
curl -fsLO https://cdn.confidential.cloud/constellation/v2/ref/-/stream/stable/${{ inputs.version }}/image/measurements.json
|
|
||||||
|
|
||||||
- name: Cleanup release measurements and generate our own
|
|
||||||
shell: bash
|
|
||||||
run: |
|
|
||||||
${{ github.action_path }}/create_measurements.sh "${{ steps.build-images.outputs.buildPath }}"
|
|
||||||
|
|
||||||
- name: Compare measurements
|
|
||||||
shell: bash
|
|
||||||
run: |
|
|
||||||
${{ github.action_path }}/compare_measurements.sh "${{ steps.build-images.outputs.buildPath }}"
|
|
@ -1,31 +0,0 @@
|
|||||||
#!/usr/bin/env bash
|
|
||||||
# no -e since we need to collect errors later
|
|
||||||
# no -u since it interferes with checking associative arrays
|
|
||||||
set -o pipefail
|
|
||||||
shopt -s extglob
|
|
||||||
|
|
||||||
declare -A errors
|
|
||||||
|
|
||||||
for directory in "$1"/system/!(mkosi_wrapper.sh); do
|
|
||||||
dirname="$(basename "$directory")"
|
|
||||||
attestationVariant="$(echo "$dirname" | cut -d_ -f2)"
|
|
||||||
|
|
||||||
echo "Their measurements for $attestationVariant:"
|
|
||||||
ts " " < "$attestationVariant"_their-measurements.json
|
|
||||||
echo "Own measurements for $attestationVariant:"
|
|
||||||
ts " " < "$attestationVariant"_own-measurements.json
|
|
||||||
|
|
||||||
diff="$(jd ./"$attestationVariant"_their-measurements.json ./"$attestationVariant"_own-measurements.json)"
|
|
||||||
if [[ -n $diff ]]; then
|
|
||||||
errors["$attestationVariant"]="$diff"
|
|
||||||
fi
|
|
||||||
done
|
|
||||||
|
|
||||||
for attestationVariant in "${!errors[@]}"; do
|
|
||||||
echo "Failed to reproduce measurements for $attestationVariant:"
|
|
||||||
echo "${errors["$attestationVariant"]}" | ts " "
|
|
||||||
done
|
|
||||||
|
|
||||||
if [[ ${#errors[@]} -ne 0 ]]; then
|
|
||||||
exit 1
|
|
||||||
fi
|
|
@ -1,28 +0,0 @@
|
|||||||
#!/usr/bin/env bash
|
|
||||||
set -euo pipefail
|
|
||||||
shopt -s extglob
|
|
||||||
|
|
||||||
for directory in "$1"/system/!(mkosi_wrapper.sh); do
|
|
||||||
dirname="$(basename "$directory")"
|
|
||||||
csp="$(echo "$dirname" | cut -d_ -f1)"
|
|
||||||
attestationVariant="$(echo "$dirname" | cut -d_ -f2)"
|
|
||||||
|
|
||||||
# This jq filter selects the measurements for the correct CSP and attestation variant
|
|
||||||
# and then removes all `warnOnly: true` measurements.
|
|
||||||
jq --arg attestation_variant "$attestationVariant" --arg csp "$csp" \
|
|
||||||
'
|
|
||||||
.list.[]
|
|
||||||
| select(
|
|
||||||
.attestationVariant == $attestation_variant
|
|
||||||
and (.csp | ascii_downcase) == $csp
|
|
||||||
)
|
|
||||||
| .measurements
|
|
||||||
| to_entries
|
|
||||||
| map(select(.value.warnOnly | not))
|
|
||||||
| from_entries
|
|
||||||
| del(.[] .warnOnly)
|
|
||||||
' \
|
|
||||||
measurements.json > "$attestationVariant"_their-measurements.json
|
|
||||||
|
|
||||||
bazel run --run_under "sudo --preserve-env" //image/measured-boot/cmd -- "$directory/constellation" /dev/stdout | jq '.measurements' > ./"$attestationVariant"_own-measurements.json
|
|
||||||
done
|
|
13
.github/actions/constellation_create/action.yml
vendored
13
.github/actions/constellation_create/action.yml
vendored
@ -257,9 +257,9 @@ runs:
|
|||||||
continue-on-error: true
|
continue-on-error: true
|
||||||
uses: ./.github/actions/artifact_upload
|
uses: ./.github/actions/artifact_upload
|
||||||
with:
|
with:
|
||||||
name: debug-logs-${{ inputs.artifactNameSuffix }}
|
name: serial-logs-${{ inputs.artifactNameSuffix }}
|
||||||
path: |
|
path: >
|
||||||
*.log
|
!(terraform).log
|
||||||
encryptionSecret: ${{ inputs.encryptionSecret }}
|
encryptionSecret: ${{ inputs.encryptionSecret }}
|
||||||
|
|
||||||
- name: Prepare terraform state folders
|
- name: Prepare terraform state folders
|
||||||
@ -268,12 +268,9 @@ runs:
|
|||||||
run: |
|
run: |
|
||||||
mkdir to-zip
|
mkdir to-zip
|
||||||
cp -r constellation-terraform to-zip
|
cp -r constellation-terraform to-zip
|
||||||
# constellation-iam-terraform is optional
|
cp -r constellation-iam-terraform to-zip
|
||||||
if [ -d constellation-iam-terraform ]; then
|
|
||||||
cp -r constellation-iam-terraform to-zip
|
|
||||||
fi
|
|
||||||
rm -f to-zip/constellation-terraform/plan.zip
|
rm -f to-zip/constellation-terraform/plan.zip
|
||||||
rm -rf to-zip/*/.terraform
|
rm -rf to-zip/constellation-terraform/.terraform to-zip/constellation-iam-terraform/.terraform
|
||||||
|
|
||||||
- name: Upload terraform state
|
- name: Upload terraform state
|
||||||
if: always()
|
if: always()
|
||||||
|
@ -67,7 +67,7 @@ runs:
|
|||||||
|
|
||||||
- name: Login to AWS (Cluster role)
|
- name: Login to AWS (Cluster role)
|
||||||
if: inputs.cloudProvider == 'aws'
|
if: inputs.cloudProvider == 'aws'
|
||||||
uses: aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1.0
|
uses: aws-actions/configure-aws-credentials@e3dd6a429d7300a6a4c196c26e071d42e0343502 # v4.0.2
|
||||||
with:
|
with:
|
||||||
role-to-assume: arn:aws:iam::795746500882:role/GithubActionsE2ECluster
|
role-to-assume: arn:aws:iam::795746500882:role/GithubActionsE2ECluster
|
||||||
aws-region: eu-central-1
|
aws-region: eu-central-1
|
||||||
|
@ -42,15 +42,6 @@ inputs:
|
|||||||
gcpZone:
|
gcpZone:
|
||||||
description: "The GCP zone to deploy Constellation in."
|
description: "The GCP zone to deploy Constellation in."
|
||||||
required: false
|
required: false
|
||||||
#
|
|
||||||
# STACKIT specific inputs
|
|
||||||
#
|
|
||||||
stackitZone:
|
|
||||||
description: "The STACKIT zone to deploy Constellation in."
|
|
||||||
required: false
|
|
||||||
stackitProjectID:
|
|
||||||
description: "The STACKIT project ID to deploy Constellation in."
|
|
||||||
required: false
|
|
||||||
|
|
||||||
runs:
|
runs:
|
||||||
using: "composite"
|
using: "composite"
|
||||||
@ -102,7 +93,6 @@ runs:
|
|||||||
--tf-log=DEBUG \
|
--tf-log=DEBUG \
|
||||||
--yes ${extraFlags}
|
--yes ${extraFlags}
|
||||||
|
|
||||||
# TODO(@3u13r): Replace deprecated --serviceAccountID with --prefix
|
|
||||||
- name: Constellation iam create gcp
|
- name: Constellation iam create gcp
|
||||||
shell: bash
|
shell: bash
|
||||||
if: inputs.cloudProvider == 'gcp'
|
if: inputs.cloudProvider == 'gcp'
|
||||||
@ -114,13 +104,3 @@ runs:
|
|||||||
--update-config \
|
--update-config \
|
||||||
--tf-log=DEBUG \
|
--tf-log=DEBUG \
|
||||||
--yes
|
--yes
|
||||||
|
|
||||||
- name: Set STACKIT-specific configuration
|
|
||||||
shell: bash
|
|
||||||
if: inputs.cloudProvider == 'stackit'
|
|
||||||
env:
|
|
||||||
STACKIT_PROJECT_ID: ${{ inputs.stackitProjectID }}
|
|
||||||
run: |
|
|
||||||
yq eval -i "(.provider.openstack.stackitProjectID) = \"${STACKIT_PROJECT_ID}\"" constellation-conf.yaml
|
|
||||||
yq eval -i "(.provider.openstack.availabilityZone) = \"${{ inputs.stackitZone }}\"" constellation-conf.yaml
|
|
||||||
yq eval -i "(.nodeGroups.[].zone) = \"${{ inputs.stackitZone }}\"" constellation-conf.yaml
|
|
||||||
|
@ -23,7 +23,7 @@ runs:
|
|||||||
|
|
||||||
- name: Login to AWS (IAM role)
|
- name: Login to AWS (IAM role)
|
||||||
if: inputs.cloudProvider == 'aws'
|
if: inputs.cloudProvider == 'aws'
|
||||||
uses: aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1.0
|
uses: aws-actions/configure-aws-credentials@e3dd6a429d7300a6a4c196c26e071d42e0343502 # v4.0.2
|
||||||
with:
|
with:
|
||||||
role-to-assume: arn:aws:iam::795746500882:role/GithubActionsE2EIAM
|
role-to-assume: arn:aws:iam::795746500882:role/GithubActionsE2EIAM
|
||||||
aws-region: eu-central-1
|
aws-region: eu-central-1
|
||||||
|
@ -17,7 +17,7 @@ runs:
|
|||||||
steps:
|
steps:
|
||||||
- name: Use docker for logging in
|
- name: Use docker for logging in
|
||||||
if: runner.os != 'macOS'
|
if: runner.os != 'macOS'
|
||||||
uses: docker/login-action@74a5d142397b4f367a81961eba4e8cd7edddf772 # v3.4.0
|
uses: docker/login-action@9780b0c442fbb1117ed29e0efdff1e18412f7567 # v3.3.0
|
||||||
with:
|
with:
|
||||||
registry: ${{ inputs.registry }}
|
registry: ${{ inputs.registry }}
|
||||||
username: ${{ inputs.username }}
|
username: ${{ inputs.username }}
|
||||||
|
2
.github/actions/container_sbom/action.yml
vendored
2
.github/actions/container_sbom/action.yml
vendored
@ -19,7 +19,7 @@ runs:
|
|||||||
steps:
|
steps:
|
||||||
- name: Install Cosign
|
- name: Install Cosign
|
||||||
if: inputs.cosignPublicKey != '' && inputs.cosignPrivateKey != '' && inputs.cosignPassword != ''
|
if: inputs.cosignPublicKey != '' && inputs.cosignPrivateKey != '' && inputs.cosignPassword != ''
|
||||||
uses: sigstore/cosign-installer@d7d6bc7722e3daa8354c50bcb52f4837da5e9b6a # v3.8.1
|
uses: sigstore/cosign-installer@dc72c7d5c4d10cd6bcb8cf6e3fd625a9e5e537da # v3.7.0
|
||||||
|
|
||||||
- name: Download Syft & Grype
|
- name: Download Syft & Grype
|
||||||
uses: ./.github/actions/install_syft_grype
|
uses: ./.github/actions/install_syft_grype
|
||||||
|
@ -67,7 +67,7 @@ runs:
|
|||||||
# Make sure that helm is installed
|
# Make sure that helm is installed
|
||||||
# This is not always the case, e.g. on MacOS runners
|
# This is not always the case, e.g. on MacOS runners
|
||||||
- name: Install Helm
|
- name: Install Helm
|
||||||
uses: azure/setup-helm@b9e51907a09c216f16ebe8536097933489208112 # v4.3.0
|
uses: azure/setup-helm@fe7b79cd5ee1e45176fcad797de68ecaf3ca4814 # v4.2.0
|
||||||
with:
|
with:
|
||||||
version: v3.9.0
|
version: v3.9.0
|
||||||
|
|
||||||
|
@ -5,51 +5,51 @@ runs:
|
|||||||
using: "composite"
|
using: "composite"
|
||||||
steps:
|
steps:
|
||||||
- name: Download CLI binaries darwin-amd64
|
- name: Download CLI binaries darwin-amd64
|
||||||
uses: actions/download-artifact@95815c38cf2ff2164869cbab79da8d1f422bc89e # v4.2.1
|
uses: actions/download-artifact@fa0a91b85d4f404e444e00e005971372dc801d16 # v4.1.8
|
||||||
with:
|
with:
|
||||||
name: constellation-darwin-amd64
|
name: constellation-darwin-amd64
|
||||||
|
|
||||||
- name: Download CLI binaries darwin-arm64
|
- name: Download CLI binaries darwin-arm64
|
||||||
uses: actions/download-artifact@95815c38cf2ff2164869cbab79da8d1f422bc89e # v4.2.1
|
uses: actions/download-artifact@fa0a91b85d4f404e444e00e005971372dc801d16 # v4.1.8
|
||||||
with:
|
with:
|
||||||
name: constellation-darwin-arm64
|
name: constellation-darwin-arm64
|
||||||
|
|
||||||
- name: Download CLI binaries linux-amd64
|
- name: Download CLI binaries linux-amd64
|
||||||
uses: actions/download-artifact@95815c38cf2ff2164869cbab79da8d1f422bc89e # v4.2.1
|
uses: actions/download-artifact@fa0a91b85d4f404e444e00e005971372dc801d16 # v4.1.8
|
||||||
with:
|
with:
|
||||||
name: constellation-linux-amd64
|
name: constellation-linux-amd64
|
||||||
|
|
||||||
- name: Download CLI binaries linux-arm64
|
- name: Download CLI binaries linux-arm64
|
||||||
uses: actions/download-artifact@95815c38cf2ff2164869cbab79da8d1f422bc89e # v4.2.1
|
uses: actions/download-artifact@fa0a91b85d4f404e444e00e005971372dc801d16 # v4.1.8
|
||||||
with:
|
with:
|
||||||
name: constellation-linux-arm64
|
name: constellation-linux-arm64
|
||||||
|
|
||||||
- name: Download CLI binaries windows-amd64
|
- name: Download CLI binaries windows-amd64
|
||||||
uses: actions/download-artifact@95815c38cf2ff2164869cbab79da8d1f422bc89e # v4.2.1
|
uses: actions/download-artifact@fa0a91b85d4f404e444e00e005971372dc801d16 # v4.1.8
|
||||||
with:
|
with:
|
||||||
name: constellation-windows-amd64
|
name: constellation-windows-amd64
|
||||||
|
|
||||||
- name: Download Terraform module
|
- name: Download Terraform module
|
||||||
uses: actions/download-artifact@95815c38cf2ff2164869cbab79da8d1f422bc89e # v4.2.1
|
uses: actions/download-artifact@fa0a91b85d4f404e444e00e005971372dc801d16 # v4.1.8
|
||||||
with:
|
with:
|
||||||
name: terraform-module
|
name: terraform-module
|
||||||
|
|
||||||
- name: Download Terraform provider binary darwin-amd64
|
- name: Download Terraform provider binary darwin-amd64
|
||||||
uses: actions/download-artifact@95815c38cf2ff2164869cbab79da8d1f422bc89e # v4.2.1
|
uses: actions/download-artifact@fa0a91b85d4f404e444e00e005971372dc801d16 # v4.1.8
|
||||||
with:
|
with:
|
||||||
name: terraform-provider-constellation-darwin-amd64
|
name: terraform-provider-constellation-darwin-amd64
|
||||||
|
|
||||||
- name: Download Terraform provider binary darwin-arm64
|
- name: Download Terraform provider binary darwin-arm64
|
||||||
uses: actions/download-artifact@95815c38cf2ff2164869cbab79da8d1f422bc89e # v4.2.1
|
uses: actions/download-artifact@fa0a91b85d4f404e444e00e005971372dc801d16 # v4.1.8
|
||||||
with:
|
with:
|
||||||
name: terraform-provider-constellation-darwin-arm64
|
name: terraform-provider-constellation-darwin-arm64
|
||||||
|
|
||||||
- name: Download Terraform provider binary linux-amd64
|
- name: Download Terraform provider binary linux-amd64
|
||||||
uses: actions/download-artifact@95815c38cf2ff2164869cbab79da8d1f422bc89e # v4.2.1
|
uses: actions/download-artifact@fa0a91b85d4f404e444e00e005971372dc801d16 # v4.1.8
|
||||||
with:
|
with:
|
||||||
name: terraform-provider-constellation-linux-amd64
|
name: terraform-provider-constellation-linux-amd64
|
||||||
|
|
||||||
- name: Download Terraform provider binary linux-arm64
|
- name: Download Terraform provider binary linux-arm64
|
||||||
uses: actions/download-artifact@95815c38cf2ff2164869cbab79da8d1f422bc89e # v4.2.1
|
uses: actions/download-artifact@fa0a91b85d4f404e444e00e005971372dc801d16 # v4.1.8
|
||||||
with:
|
with:
|
||||||
name: terraform-provider-constellation-linux-arm64
|
name: terraform-provider-constellation-linux-arm64
|
||||||
|
@ -19,7 +19,7 @@ runs:
|
|||||||
uses: ./.github/actions/setup_bazel_nix
|
uses: ./.github/actions/setup_bazel_nix
|
||||||
|
|
||||||
- name: Login to AWS
|
- name: Login to AWS
|
||||||
uses: aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1.0
|
uses: aws-actions/configure-aws-credentials@e3dd6a429d7300a6a4c196c26e071d42e0343502 # v4.0.2
|
||||||
with:
|
with:
|
||||||
role-to-assume: arn:aws:iam::795746500882:role/GithubTestResourceAPI
|
role-to-assume: arn:aws:iam::795746500882:role/GithubTestResourceAPI
|
||||||
aws-region: eu-west-1
|
aws-region: eu-west-1
|
||||||
|
6
.github/actions/e2e_benchmark/action.yml
vendored
6
.github/actions/e2e_benchmark/action.yml
vendored
@ -32,9 +32,9 @@ runs:
|
|||||||
|
|
||||||
steps:
|
steps:
|
||||||
- name: Setup python
|
- name: Setup python
|
||||||
uses: actions/setup-python@8d9ed9ac5c53483de85588cdf95a591a75ab9f55 # v5.5.0
|
uses: actions/setup-python@0b93645e9fea7318ecaed2b359559ac225c90a2b # v5.3.0
|
||||||
with:
|
with:
|
||||||
python-version: "3.13"
|
python-version: "3.10"
|
||||||
|
|
||||||
- name: Install kubestr
|
- name: Install kubestr
|
||||||
shell: bash
|
shell: bash
|
||||||
@ -166,7 +166,7 @@ runs:
|
|||||||
encryptionSecret: ${{ inputs.encryptionSecret }}
|
encryptionSecret: ${{ inputs.encryptionSecret }}
|
||||||
|
|
||||||
- name: Assume AWS role to retrieve and update benchmarks in S3
|
- name: Assume AWS role to retrieve and update benchmarks in S3
|
||||||
uses: aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1.0
|
uses: aws-actions/configure-aws-credentials@e3dd6a429d7300a6a4c196c26e071d42e0343502 # v4.0.2
|
||||||
with:
|
with:
|
||||||
role-to-assume: arn:aws:iam::795746500882:role/GithubActionUpdateBenchmarks
|
role-to-assume: arn:aws:iam::795746500882:role/GithubActionUpdateBenchmarks
|
||||||
aws-region: us-east-2
|
aws-region: us-east-2
|
||||||
|
@ -1,3 +1,3 @@
|
|||||||
numpy ==2.2.4
|
numpy ==1.26.4
|
||||||
matplotlib ==3.10.1
|
matplotlib ==3.8.3
|
||||||
Pillow ==11.2.1
|
Pillow ==10.3.0
|
18
.github/actions/e2e_cleanup_timeframe/action.yml
vendored
18
.github/actions/e2e_cleanup_timeframe/action.yml
vendored
@ -11,18 +11,12 @@ inputs:
|
|||||||
azure_credentials:
|
azure_credentials:
|
||||||
description: "Credentials authorized to create Constellation on Azure."
|
description: "Credentials authorized to create Constellation on Azure."
|
||||||
required: true
|
required: true
|
||||||
openStackCloudsYaml:
|
|
||||||
description: "The contents of ~/.config/openstack/clouds.yaml"
|
|
||||||
required: false
|
|
||||||
stackitUat:
|
|
||||||
description: "The UAT for STACKIT"
|
|
||||||
required: false
|
|
||||||
|
|
||||||
runs:
|
runs:
|
||||||
using: "composite"
|
using: "composite"
|
||||||
steps:
|
steps:
|
||||||
- name: Authenticate AWS
|
- name: Authenticate AWS
|
||||||
uses: aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1.0
|
uses: aws-actions/configure-aws-credentials@e3dd6a429d7300a6a4c196c26e071d42e0343502 # v4.0.2
|
||||||
with:
|
with:
|
||||||
role-to-assume: arn:aws:iam::795746500882:role/GithubActionsE2EDestroy
|
role-to-assume: arn:aws:iam::795746500882:role/GithubActionsE2EDestroy
|
||||||
aws-region: eu-central-1
|
aws-region: eu-central-1
|
||||||
@ -37,16 +31,6 @@ runs:
|
|||||||
with:
|
with:
|
||||||
service_account: "destroy-e2e@constellation-e2e.iam.gserviceaccount.com"
|
service_account: "destroy-e2e@constellation-e2e.iam.gserviceaccount.com"
|
||||||
|
|
||||||
- name: Login to OpenStack
|
|
||||||
uses: ./.github/actions/login_openstack
|
|
||||||
with:
|
|
||||||
clouds_yaml: ${{ inputs.openStackCloudsYaml }}
|
|
||||||
|
|
||||||
- name: Login to STACKIT
|
|
||||||
uses: ./.github/actions/login_stackit
|
|
||||||
with:
|
|
||||||
serviceAccountToken: ${{ inputs.stackitUat }}
|
|
||||||
|
|
||||||
- name: Install tools
|
- name: Install tools
|
||||||
uses: ./.github/actions/setup_bazel_nix
|
uses: ./.github/actions/setup_bazel_nix
|
||||||
with:
|
with:
|
||||||
|
68
.github/actions/e2e_emergency_ssh/action.yml
vendored
68
.github/actions/e2e_emergency_ssh/action.yml
vendored
@ -1,68 +0,0 @@
|
|||||||
name: Emergency ssh
|
|
||||||
description: "Verify that an emergency ssh connection can be established."
|
|
||||||
|
|
||||||
inputs:
|
|
||||||
kubeconfig:
|
|
||||||
description: "The kubeconfig file for the cluster."
|
|
||||||
required: true
|
|
||||||
|
|
||||||
runs:
|
|
||||||
using: "composite"
|
|
||||||
steps:
|
|
||||||
- name: Test emergency ssh
|
|
||||||
shell: bash
|
|
||||||
env:
|
|
||||||
KUBECONFIG: ${{ inputs.kubeconfig }}
|
|
||||||
run: |
|
|
||||||
set -euo pipefail
|
|
||||||
|
|
||||||
# Activate emergency ssh access to the cluster
|
|
||||||
pushd ./constellation-terraform
|
|
||||||
echo "emergency_ssh = true" >> terraform.tfvars
|
|
||||||
terraform apply -auto-approve
|
|
||||||
lb="$(terraform output -raw loadbalancer_address)"
|
|
||||||
popd
|
|
||||||
|
|
||||||
# write ssh config
|
|
||||||
cat > ssh_config <<EOF
|
|
||||||
Host $lb
|
|
||||||
ProxyJump none
|
|
||||||
|
|
||||||
Host *
|
|
||||||
StrictHostKeyChecking no
|
|
||||||
UserKnownHostsFile=/dev/null
|
|
||||||
IdentityFile ./access-key
|
|
||||||
PreferredAuthentications publickey
|
|
||||||
CertificateFile=constellation_cert.pub
|
|
||||||
User root
|
|
||||||
ProxyJump $lb
|
|
||||||
EOF
|
|
||||||
|
|
||||||
for i in {1..26}; do
|
|
||||||
if [[ "$i" -eq 26 ]]; then
|
|
||||||
echo "Port 22 never became reachable"
|
|
||||||
exit 1
|
|
||||||
fi
|
|
||||||
echo "Waiting until port 22 is reachable: $i/25"
|
|
||||||
if nc -z -w 25 "$lb" 22; then
|
|
||||||
break
|
|
||||||
fi
|
|
||||||
done
|
|
||||||
|
|
||||||
# generate and try keypair
|
|
||||||
ssh-keygen -t ecdsa -q -N "" -f ./access-key
|
|
||||||
constellation ssh --debug --key ./access-key.pub
|
|
||||||
internalIPs="$(kubectl get nodes -o=jsonpath='{.items[*].status.addresses}' | jq -r '.[] | select(.type == "InternalIP") | .address')"
|
|
||||||
for ip in $internalIPs; do
|
|
||||||
for i in {1..26}; do
|
|
||||||
if [[ "$i" -eq 26 ]]; then
|
|
||||||
echo "Failed to connect to $ip over $lb"
|
|
||||||
exit 1
|
|
||||||
fi
|
|
||||||
echo "Trying connection to $ip over $lb: $i/25"
|
|
||||||
if ssh -F ssh_config -o BatchMode=yes $ip true; then
|
|
||||||
echo "Connected to $ip successfully"
|
|
||||||
break
|
|
||||||
fi
|
|
||||||
done
|
|
||||||
done
|
|
2
.github/actions/e2e_sonobuoy/action.yml
vendored
2
.github/actions/e2e_sonobuoy/action.yml
vendored
@ -70,7 +70,7 @@ runs:
|
|||||||
|
|
||||||
- name: Publish test results
|
- name: Publish test results
|
||||||
if: (!env.ACT) && contains(inputs.sonobuoyTestSuiteCmd, '--plugin e2e')
|
if: (!env.ACT) && contains(inputs.sonobuoyTestSuiteCmd, '--plugin e2e')
|
||||||
uses: mikepenz/action-junit-report@cf701569b05ccdd861a76b8607a66d76f6fd4857 # v5.5.1
|
uses: mikepenz/action-junit-report@db71d41eb79864e25ab0337e395c352e84523afe # v4.3.1
|
||||||
with:
|
with:
|
||||||
report_paths: "**/junit_01.xml"
|
report_paths: "**/junit_01.xml"
|
||||||
fail_on_failure: true
|
fail_on_failure: true
|
||||||
|
47
.github/actions/e2e_test/action.yml
vendored
47
.github/actions/e2e_test/action.yml
vendored
@ -56,7 +56,7 @@ inputs:
|
|||||||
description: "Azure credentials authorized to create an IAM configuration."
|
description: "Azure credentials authorized to create an IAM configuration."
|
||||||
required: true
|
required: true
|
||||||
test:
|
test:
|
||||||
description: "The test to run. Can currently be one of [sonobuoy full, sonobuoy quick, sonobuoy conformance, autoscaling, lb, perf-bench, verify, recover, malicious join, nop, upgrade, emergency ssh]."
|
description: "The test to run. Can currently be one of [sonobuoy full, sonobuoy quick, sonobuoy conformance, autoscaling, lb, perf-bench, verify, recover, malicious join, nop, upgrade]."
|
||||||
required: true
|
required: true
|
||||||
sonobuoyTestSuiteCmd:
|
sonobuoyTestSuiteCmd:
|
||||||
description: "The sonobuoy test suite to run."
|
description: "The sonobuoy test suite to run."
|
||||||
@ -93,15 +93,6 @@ inputs:
|
|||||||
encryptionSecret:
|
encryptionSecret:
|
||||||
description: "The secret to use for decrypting the artifact."
|
description: "The secret to use for decrypting the artifact."
|
||||||
required: true
|
required: true
|
||||||
openStackCloudsYaml:
|
|
||||||
description: "The contents of ~/.config/openstack/clouds.yaml"
|
|
||||||
required: false
|
|
||||||
stackitUat:
|
|
||||||
description: "The UAT for STACKIT"
|
|
||||||
required: false
|
|
||||||
stackitProjectID:
|
|
||||||
description: "The STACKIT project ID to deploy Constellation in."
|
|
||||||
required: false
|
|
||||||
|
|
||||||
outputs:
|
outputs:
|
||||||
kubeconfig:
|
kubeconfig:
|
||||||
@ -115,7 +106,7 @@ runs:
|
|||||||
using: "composite"
|
using: "composite"
|
||||||
steps:
|
steps:
|
||||||
- name: Check input
|
- name: Check input
|
||||||
if: (!contains(fromJson('["sonobuoy full", "sonobuoy quick", "sonobuoy conformance", "autoscaling", "perf-bench", "verify", "lb", "recover", "malicious join", "s3proxy", "nop", "upgrade", "emergency ssh"]'), inputs.test))
|
if: (!contains(fromJson('["sonobuoy full", "sonobuoy quick", "sonobuoy conformance", "autoscaling", "perf-bench", "verify", "lb", "recover", "malicious join", "s3proxy", "nop", "upgrade"]'), inputs.test))
|
||||||
shell: bash
|
shell: bash
|
||||||
run: |
|
run: |
|
||||||
echo "::error::Invalid input for test field: ${{ inputs.test }}"
|
echo "::error::Invalid input for test field: ${{ inputs.test }}"
|
||||||
@ -149,8 +140,6 @@ runs:
|
|||||||
|
|
||||||
- name: Setup bazel
|
- name: Setup bazel
|
||||||
uses: ./.github/actions/setup_bazel_nix
|
uses: ./.github/actions/setup_bazel_nix
|
||||||
with:
|
|
||||||
nixTools: terraform
|
|
||||||
|
|
||||||
- name: Log in to the Container registry
|
- name: Log in to the Container registry
|
||||||
uses: ./.github/actions/container_registry_login
|
uses: ./.github/actions/container_registry_login
|
||||||
@ -227,7 +216,7 @@ runs:
|
|||||||
|
|
||||||
- name: Login to AWS (IAM role)
|
- name: Login to AWS (IAM role)
|
||||||
if: inputs.cloudProvider == 'aws'
|
if: inputs.cloudProvider == 'aws'
|
||||||
uses: aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1.0
|
uses: aws-actions/configure-aws-credentials@e3dd6a429d7300a6a4c196c26e071d42e0343502 # v4.0.2
|
||||||
with:
|
with:
|
||||||
role-to-assume: arn:aws:iam::795746500882:role/GithubActionsE2EIAM
|
role-to-assume: arn:aws:iam::795746500882:role/GithubActionsE2EIAM
|
||||||
aws-region: eu-central-1
|
aws-region: eu-central-1
|
||||||
@ -240,30 +229,12 @@ runs:
|
|||||||
with:
|
with:
|
||||||
azure_credentials: ${{ inputs.azureIAMCreateCredentials }}
|
azure_credentials: ${{ inputs.azureIAMCreateCredentials }}
|
||||||
|
|
||||||
- name: Login to OpenStack
|
|
||||||
if: inputs.cloudProvider == 'stackit'
|
|
||||||
uses: ./.github/actions/login_openstack
|
|
||||||
with:
|
|
||||||
clouds_yaml: ${{inputs.openStackCloudsYaml }}
|
|
||||||
|
|
||||||
- name: Login to STACKIT
|
|
||||||
if: inputs.cloudProvider == 'stackit'
|
|
||||||
uses: ./.github/actions/login_stackit
|
|
||||||
with:
|
|
||||||
serviceAccountToken: ${{ inputs.stackitUat }}
|
|
||||||
|
|
||||||
- name: Create prefix
|
- name: Create prefix
|
||||||
id: create-prefix
|
id: create-prefix
|
||||||
shell: bash
|
shell: bash
|
||||||
run: |
|
run: |
|
||||||
uuid=$(uuidgen | tr "[:upper:]" "[:lower:]")
|
uuid=$(uuidgen | tr "[:upper:]" "[:lower:]")
|
||||||
uuid=${uuid%%-*}
|
uuid=${uuid%%-*}
|
||||||
|
|
||||||
# GCP has a 6 character limit the additional uuid prefix since the full prefix length has a maximum of 24
|
|
||||||
if [[ ${{ inputs.cloudProvider }} == 'gcp' ]]; then
|
|
||||||
uuid=${uuid:0:6}
|
|
||||||
fi
|
|
||||||
|
|
||||||
echo "uuid=${uuid}" | tee -a $GITHUB_OUTPUT
|
echo "uuid=${uuid}" | tee -a $GITHUB_OUTPUT
|
||||||
echo "prefix=e2e-${{ github.run_id }}-${{ github.run_attempt }}-${uuid}" | tee -a $GITHUB_OUTPUT
|
echo "prefix=e2e-${{ github.run_id }}-${{ github.run_attempt }}-${uuid}" | tee -a $GITHUB_OUTPUT
|
||||||
|
|
||||||
@ -273,7 +244,7 @@ runs:
|
|||||||
with:
|
with:
|
||||||
attestationVariant: ${{ inputs.attestationVariant }}
|
attestationVariant: ${{ inputs.attestationVariant }}
|
||||||
|
|
||||||
- name: Create Constellation config and IAM
|
- name: Create IAM configuration
|
||||||
id: constellation-iam-create
|
id: constellation-iam-create
|
||||||
uses: ./.github/actions/constellation_iam_create
|
uses: ./.github/actions/constellation_iam_create
|
||||||
with:
|
with:
|
||||||
@ -285,8 +256,6 @@ runs:
|
|||||||
azureRegion: ${{ inputs.regionZone || steps.pick-az-region.outputs.region }}
|
azureRegion: ${{ inputs.regionZone || steps.pick-az-region.outputs.region }}
|
||||||
gcpProjectID: ${{ inputs.gcpProject }}
|
gcpProjectID: ${{ inputs.gcpProject }}
|
||||||
gcpZone: ${{ inputs.regionZone || 'europe-west3-b' }}
|
gcpZone: ${{ inputs.regionZone || 'europe-west3-b' }}
|
||||||
stackitZone: ${{ inputs.regionZone || 'eu01-2' }}
|
|
||||||
stackitProjectID: ${{ inputs.stackitProjectID }}
|
|
||||||
kubernetesVersion: ${{ inputs.kubernetesVersion }}
|
kubernetesVersion: ${{ inputs.kubernetesVersion }}
|
||||||
additionalTags: "workflow=${{ github.run_id }}"
|
additionalTags: "workflow=${{ github.run_id }}"
|
||||||
|
|
||||||
@ -298,7 +267,7 @@ runs:
|
|||||||
|
|
||||||
- name: Login to AWS (Cluster role)
|
- name: Login to AWS (Cluster role)
|
||||||
if: inputs.cloudProvider == 'aws'
|
if: inputs.cloudProvider == 'aws'
|
||||||
uses: aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1.0
|
uses: aws-actions/configure-aws-credentials@e3dd6a429d7300a6a4c196c26e071d42e0343502 # v4.0.2
|
||||||
with:
|
with:
|
||||||
role-to-assume: arn:aws:iam::795746500882:role/GithubActionsE2ECluster
|
role-to-assume: arn:aws:iam::795746500882:role/GithubActionsE2ECluster
|
||||||
aws-region: eu-central-1
|
aws-region: eu-central-1
|
||||||
@ -452,9 +421,3 @@ runs:
|
|||||||
s3AccessKey: ${{ inputs.s3AccessKey }}
|
s3AccessKey: ${{ inputs.s3AccessKey }}
|
||||||
s3SecretKey: ${{ inputs.s3SecretKey }}
|
s3SecretKey: ${{ inputs.s3SecretKey }}
|
||||||
githubToken: ${{ inputs.githubToken }}
|
githubToken: ${{ inputs.githubToken }}
|
||||||
|
|
||||||
- name: Run emergency ssh test
|
|
||||||
if: inputs.test == 'emergency ssh'
|
|
||||||
uses: ./.github/actions/e2e_emergency_ssh
|
|
||||||
with:
|
|
||||||
kubeconfig: ${{ steps.constellation-create.outputs.kubeconfig }}
|
|
||||||
|
2
.github/actions/e2e_verify/action.yml
vendored
2
.github/actions/e2e_verify/action.yml
vendored
@ -82,7 +82,7 @@ runs:
|
|||||||
|
|
||||||
- name: Login to AWS
|
- name: Login to AWS
|
||||||
if: github.ref_name == 'main'
|
if: github.ref_name == 'main'
|
||||||
uses: aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1.0
|
uses: aws-actions/configure-aws-credentials@e3dd6a429d7300a6a4c196c26e071d42e0343502 # v4.0.2
|
||||||
with:
|
with:
|
||||||
role-to-assume: arn:aws:iam::795746500882:role/GitHubConstellationImagePipeline
|
role-to-assume: arn:aws:iam::795746500882:role/GitHubConstellationImagePipeline
|
||||||
aws-region: eu-central-1
|
aws-region: eu-central-1
|
||||||
|
2
.github/actions/find_latest_image/action.yml
vendored
2
.github/actions/find_latest_image/action.yml
vendored
@ -38,7 +38,7 @@ runs:
|
|||||||
|
|
||||||
- name: Login to AWS
|
- name: Login to AWS
|
||||||
if: inputs.imageVersion == ''
|
if: inputs.imageVersion == ''
|
||||||
uses: aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1.0
|
uses: aws-actions/configure-aws-credentials@e3dd6a429d7300a6a4c196c26e071d42e0343502 # v4.0.2
|
||||||
with:
|
with:
|
||||||
role-to-assume: arn:aws:iam::795746500882:role/GithubConstellationVersionsAPIRead
|
role-to-assume: arn:aws:iam::795746500882:role/GithubConstellationVersionsAPIRead
|
||||||
aws-region: eu-central-1
|
aws-region: eu-central-1
|
||||||
|
2
.github/actions/login_azure/action.yml
vendored
2
.github/actions/login_azure/action.yml
vendored
@ -10,6 +10,6 @@ runs:
|
|||||||
# As described at:
|
# As described at:
|
||||||
# https://github.com/Azure/login#configure-deployment-credentials
|
# https://github.com/Azure/login#configure-deployment-credentials
|
||||||
- name: Login to Azure
|
- name: Login to Azure
|
||||||
uses: azure/login@a457da9ea143d694b1b9c7c869ebb04ebe844ef5 # v2.3.0
|
uses: azure/login@a65d910e8af852a8061c627c456678983e180302 # v2.2.0
|
||||||
with:
|
with:
|
||||||
creds: ${{ inputs.azure_credentials }}
|
creds: ${{ inputs.azure_credentials }}
|
||||||
|
4
.github/actions/login_gcp/action.yml
vendored
4
.github/actions/login_gcp/action.yml
vendored
@ -20,11 +20,11 @@ runs:
|
|||||||
echo "GOOGLE_CLOUD_PROJECT=" >> "$GITHUB_ENV"
|
echo "GOOGLE_CLOUD_PROJECT=" >> "$GITHUB_ENV"
|
||||||
|
|
||||||
- name: Authorize GCP access
|
- name: Authorize GCP access
|
||||||
uses: google-github-actions/auth@71f986410dfbc7added4569d411d040a91dc6935 # v2.1.8
|
uses: google-github-actions/auth@6fc4af4b145ae7821d527454aa9bd537d1f2dc5f # v2.1.7
|
||||||
with:
|
with:
|
||||||
workload_identity_provider: projects/1052692473304/locations/global/workloadIdentityPools/constellation-ci-pool/providers/constellation-ci-provider
|
workload_identity_provider: projects/1052692473304/locations/global/workloadIdentityPools/constellation-ci-pool/providers/constellation-ci-provider
|
||||||
service_account: ${{ inputs.service_account }}
|
service_account: ${{ inputs.service_account }}
|
||||||
|
|
||||||
# Even if preinstalled in Github Actions runner image, this setup does some magic authentication required for gsutil.
|
# Even if preinstalled in Github Actions runner image, this setup does some magic authentication required for gsutil.
|
||||||
- name: Set up Cloud SDK
|
- name: Set up Cloud SDK
|
||||||
uses: google-github-actions/setup-gcloud@77e7a554d41e2ee56fc945c52dfd3f33d12def9a # v2.1.4
|
uses: google-github-actions/setup-gcloud@6189d56e4096ee891640bb02ac264be376592d6a # v2.1.2
|
||||||
|
16
.github/actions/login_stackit/action.yml
vendored
16
.github/actions/login_stackit/action.yml
vendored
@ -1,16 +0,0 @@
|
|||||||
name: STACKIT login
|
|
||||||
description: "Login to STACKIT"
|
|
||||||
inputs:
|
|
||||||
serviceAccountToken:
|
|
||||||
description: "Credentials authorized to create Constellation on STACKIT."
|
|
||||||
required: true
|
|
||||||
runs:
|
|
||||||
using: "composite"
|
|
||||||
steps:
|
|
||||||
- name: Login to STACKIT
|
|
||||||
env:
|
|
||||||
UAT: ${{ inputs.serviceAccountToken }}
|
|
||||||
shell: bash
|
|
||||||
run: |
|
|
||||||
mkdir -p ~/.stackit
|
|
||||||
echo "${UAT}" > ~/.stackit/credentials.json
|
|
19
.github/actions/notify_stackit/action.yml
vendored
19
.github/actions/notify_stackit/action.yml
vendored
@ -1,19 +0,0 @@
|
|||||||
name: Notify STACKIT
|
|
||||||
description: "Notify STACKIT about test failure"
|
|
||||||
inputs:
|
|
||||||
slackToken:
|
|
||||||
description: "Slack access token."
|
|
||||||
required: true
|
|
||||||
runs:
|
|
||||||
using: "composite"
|
|
||||||
steps:
|
|
||||||
- name: Notify STACKIT
|
|
||||||
env:
|
|
||||||
SLACK_TOKEN: ${{ inputs.slackToken }}
|
|
||||||
shell: bash
|
|
||||||
run: |
|
|
||||||
curl -X POST \
|
|
||||||
-H "Authorization: Bearer $SLACK_TOKEN" \
|
|
||||||
-H "Content-type: application/json; charset=utf-8" \
|
|
||||||
-d "{\"channel\":\"C0827BT59SM\",\"text\":\"E2E test failed: $GITHUB_SERVER_URL/$GITHUB_REPOSITORY/actions/runs/$GITHUB_RUN_ID\"}" \
|
|
||||||
https://slack.com/api/chat.postMessage
|
|
2
.github/actions/publish_helmchart/action.yml
vendored
2
.github/actions/publish_helmchart/action.yml
vendored
@ -29,7 +29,7 @@ runs:
|
|||||||
echo version=$(yq eval ".version" ${{ inputs.chartPath }}/Chart.yaml) | tee -a $GITHUB_OUTPUT
|
echo version=$(yq eval ".version" ${{ inputs.chartPath }}/Chart.yaml) | tee -a $GITHUB_OUTPUT
|
||||||
|
|
||||||
- name: Create pull request
|
- name: Create pull request
|
||||||
uses: peter-evans/create-pull-request@271a8d0340265f705b14b6d32b9829c1cb33d45e # v7.0.8
|
uses: peter-evans/create-pull-request@5e914681df9dc83aa4e4905692ca88beb2f9e91f # v7.0.5
|
||||||
with:
|
with:
|
||||||
path: helm
|
path: helm
|
||||||
branch: "release/s3proxy/${{ steps.update-chart-version.outputs.version }}"
|
branch: "release/s3proxy/${{ steps.update-chart-version.outputs.version }}"
|
||||||
|
2
.github/actions/select_image/action.yml
vendored
2
.github/actions/select_image/action.yml
vendored
@ -18,7 +18,7 @@ runs:
|
|||||||
using: "composite"
|
using: "composite"
|
||||||
steps:
|
steps:
|
||||||
- name: Login to AWS
|
- name: Login to AWS
|
||||||
uses: aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1.0
|
uses: aws-actions/configure-aws-credentials@e3dd6a429d7300a6a4c196c26e071d42e0343502 # v4.0.2
|
||||||
with:
|
with:
|
||||||
role-to-assume: arn:aws:iam::795746500882:role/GithubConstellationVersionsAPIRead
|
role-to-assume: arn:aws:iam::795746500882:role/GithubConstellationVersionsAPIRead
|
||||||
aws-region: eu-central-1
|
aws-region: eu-central-1
|
||||||
|
7
.github/actions/setup_bazel_nix/action.yml
vendored
7
.github/actions/setup_bazel_nix/action.yml
vendored
@ -75,7 +75,6 @@ runs:
|
|||||||
echo "$RUNNER_ARCH not supported"
|
echo "$RUNNER_ARCH not supported"
|
||||||
exit 1
|
exit 1
|
||||||
fi
|
fi
|
||||||
echo "nixVersion=$(cat "${{ github.workspace }}/.nixversion")" | tee -a "$GITHUB_OUTPUT"
|
|
||||||
echo "::endgroup::"
|
echo "::endgroup::"
|
||||||
|
|
||||||
- name: Install current Bash on macOS
|
- name: Install current Bash on macOS
|
||||||
@ -114,9 +113,9 @@ runs:
|
|||||||
|
|
||||||
- name: Install nix
|
- name: Install nix
|
||||||
if: steps.check_inputs.outputs.nixPreinstalled == 'false'
|
if: steps.check_inputs.outputs.nixPreinstalled == 'false'
|
||||||
uses: cachix/install-nix-action@d1ca217b388ee87b2507a9a93bf01368bde7cec2 # v31
|
uses: cachix/install-nix-action@08dcb3a5e62fa31e2da3d490afc4176ef55ecd72 # v30
|
||||||
with:
|
with:
|
||||||
install_url: "https://releases.nixos.org/nix/nix-${{ steps.check_inputs.outputs.nixVersion }}/install"
|
install_url: "https://releases.nixos.org/nix/nix-2.25.2/install"
|
||||||
|
|
||||||
- name: Set $USER if not set
|
- name: Set $USER if not set
|
||||||
shell: bash
|
shell: bash
|
||||||
@ -221,7 +220,7 @@ runs:
|
|||||||
{ tools, repository, rev }:
|
{ tools, repository, rev }:
|
||||||
let
|
let
|
||||||
repoFlake = builtins.getFlake ("github:" + repository + "/" + rev);
|
repoFlake = builtins.getFlake ("github:" + repository + "/" + rev);
|
||||||
nixpkgs = repoFlake.inputs.nixpkgs;
|
nixpkgs = repoFlake.inputs.nixpkgsUnstable;
|
||||||
pkgs = import nixpkgs { system = builtins.currentSystem; };
|
pkgs = import nixpkgs { system = builtins.currentSystem; };
|
||||||
toolPkgs = map (p: pkgs.${p}) tools;
|
toolPkgs = map (p: pkgs.${p}) tools;
|
||||||
in
|
in
|
||||||
|
15
.github/actions/terraform_apply/action.yml
vendored
15
.github/actions/terraform_apply/action.yml
vendored
@ -29,9 +29,6 @@ runs:
|
|||||||
"gcpSEVSNP")
|
"gcpSEVSNP")
|
||||||
attestationVariant="gcp-sev-snp"
|
attestationVariant="gcp-sev-snp"
|
||||||
;;
|
;;
|
||||||
"qemuVTPM")
|
|
||||||
attestationVariant="qemu-vtpm"
|
|
||||||
;;
|
|
||||||
*)
|
*)
|
||||||
echo "Unknown attestation variant: $(yq '.attestation | keys | .[0]' constellation-conf.yaml)"
|
echo "Unknown attestation variant: $(yq '.attestation | keys | .[0]' constellation-conf.yaml)"
|
||||||
exit 1
|
exit 1
|
||||||
@ -47,7 +44,7 @@ runs:
|
|||||||
}
|
}
|
||||||
random = {
|
random = {
|
||||||
source = "hashicorp/random"
|
source = "hashicorp/random"
|
||||||
version = "3.7.2"
|
version = "3.6.3"
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@ -109,16 +106,6 @@ runs:
|
|||||||
project_id = "$(yq '.infrastructure.gcp.projectID' constellation-state.yaml)"
|
project_id = "$(yq '.infrastructure.gcp.projectID' constellation-state.yaml)"
|
||||||
service_account_key = sensitive("$(cat $(yq '.provider.gcp.serviceAccountKeyPath' constellation-conf.yaml) | base64 -w0)")
|
service_account_key = sensitive("$(cat $(yq '.provider.gcp.serviceAccountKeyPath' constellation-conf.yaml) | base64 -w0)")
|
||||||
}
|
}
|
||||||
openstack = {
|
|
||||||
cloud = "stackit"
|
|
||||||
clouds_yaml_path = "~/.config/openstack/clouds.yaml"
|
|
||||||
floating_ip_pool_id = "970ace5c-458f-484a-a660-0903bcfd91ad"
|
|
||||||
deploy_yawol_load_balancer = true
|
|
||||||
yawol_image_id = "bcd6c13e-75d1-4c3f-bf0f-8f83580cc1be"
|
|
||||||
yawol_flavor_id = "3b11b27e-6c73-470d-b595-1d85b95a8cdf"
|
|
||||||
network_id = "$(yq '.infrastructure.networkID' constellation-state.yaml)"
|
|
||||||
subnet_id = "$(yq '.infrastructure.subnetID' constellation-state.yaml)"
|
|
||||||
}
|
|
||||||
network_config = {
|
network_config = {
|
||||||
ip_cidr_node = "$(yq '.infrastructure.ipCidrNode' constellation-state.yaml)"
|
ip_cidr_node = "$(yq '.infrastructure.ipCidrNode' constellation-state.yaml)"
|
||||||
ip_cidr_service = "$(yq '.serviceCIDR' constellation-conf.yaml)"
|
ip_cidr_service = "$(yq '.serviceCIDR' constellation-conf.yaml)"
|
||||||
|
@ -15,7 +15,7 @@ runs:
|
|||||||
zip -r terraform-module.zip terraform-module
|
zip -r terraform-module.zip terraform-module
|
||||||
|
|
||||||
- name: Upload artifact
|
- name: Upload artifact
|
||||||
uses: actions/upload-artifact@ea165f8d65b6e75b540449e92b4886f43607fa02 # v4.6.2
|
uses: actions/upload-artifact@b4b15b8c7c6ac21ea08fcf65892d2ee8f75cf882 # v4.4.3
|
||||||
with:
|
with:
|
||||||
name: terraform-module
|
name: terraform-module
|
||||||
path: terraform-module.zip
|
path: terraform-module.zip
|
||||||
|
@ -17,11 +17,11 @@ jobs:
|
|||||||
path: constellation
|
path: constellation
|
||||||
|
|
||||||
- name: Install Nix
|
- name: Install Nix
|
||||||
uses: cachix/install-nix-action@d1ca217b388ee87b2507a9a93bf01368bde7cec2 # v31
|
uses: cachix/install-nix-action@08dcb3a5e62fa31e2da3d490afc4176ef55ecd72 # v30
|
||||||
|
|
||||||
- name: Download Firmware release
|
- name: Download Firmware release
|
||||||
id: download-firmware
|
id: download-firmware
|
||||||
uses: robinraju/release-downloader@daf26c55d821e836577a15f77d86ddc078948b05 # v1.12
|
uses: robinraju/release-downloader@a96f54c1b5f5e09e47d9504526e96febd949d4c2 # v1.11
|
||||||
with:
|
with:
|
||||||
repository: aws/uefi
|
repository: aws/uefi
|
||||||
latest: true
|
latest: true
|
||||||
|
8
.github/workflows/build-ccm-gcp.yml
vendored
8
.github/workflows/build-ccm-gcp.yml
vendored
@ -29,9 +29,9 @@ jobs:
|
|||||||
fetch-depth: 0
|
fetch-depth: 0
|
||||||
|
|
||||||
- name: Setup Go environment
|
- name: Setup Go environment
|
||||||
uses: actions/setup-go@0aaccfd150d50ccaeb58ebd88d36e91967a5f35b # v5.4.0
|
uses: actions/setup-go@41dfa10bad2bb2ae585af6ee5bb4d7d973ad74ed # v5.1.0
|
||||||
with:
|
with:
|
||||||
go-version: "1.24.2"
|
go-version: "1.23.2"
|
||||||
cache: false
|
cache: false
|
||||||
|
|
||||||
- name: Install Crane
|
- name: Install Crane
|
||||||
@ -76,7 +76,7 @@ jobs:
|
|||||||
|
|
||||||
- name: Docker meta
|
- name: Docker meta
|
||||||
id: meta
|
id: meta
|
||||||
uses: docker/metadata-action@902fa8ec7d6ecbf8d84d538b9b233a880e428804 # v5.7.0
|
uses: docker/metadata-action@369eb591f429131d6889c46b94e711f089e6ca96 # v5.6.1
|
||||||
with:
|
with:
|
||||||
images: |
|
images: |
|
||||||
ghcr.io/edgelesssys/cloud-provider-gcp
|
ghcr.io/edgelesssys/cloud-provider-gcp
|
||||||
@ -113,7 +113,7 @@ jobs:
|
|||||||
|
|
||||||
- name: Build and push container image
|
- name: Build and push container image
|
||||||
id: build
|
id: build
|
||||||
uses: docker/build-push-action@471d1dc4e07e5cdedd4c2171150001c434f0b7a4 # v6.15.0
|
uses: docker/build-push-action@48aba3b46d1b1fec4febb7c5d0c644b249a11355 # v6.10.0
|
||||||
with:
|
with:
|
||||||
context: ./cloud-provider-gcp
|
context: ./cloud-provider-gcp
|
||||||
push: ${{ github.ref_name == 'main' }}
|
push: ${{ github.ref_name == 'main' }}
|
||||||
|
4
.github/workflows/build-gcp-guest-agent.yml
vendored
4
.github/workflows/build-gcp-guest-agent.yml
vendored
@ -85,7 +85,7 @@ jobs:
|
|||||||
- name: Docker meta
|
- name: Docker meta
|
||||||
id: meta
|
id: meta
|
||||||
if: steps.needs-build.outputs.out == 'true'
|
if: steps.needs-build.outputs.out == 'true'
|
||||||
uses: docker/metadata-action@902fa8ec7d6ecbf8d84d538b9b233a880e428804 # v5.7.0
|
uses: docker/metadata-action@369eb591f429131d6889c46b94e711f089e6ca96 # v5.6.1
|
||||||
with:
|
with:
|
||||||
images: |
|
images: |
|
||||||
${{ env.REGISTRY }}/edgelesssys/gcp-guest-agent
|
${{ env.REGISTRY }}/edgelesssys/gcp-guest-agent
|
||||||
@ -114,7 +114,7 @@ jobs:
|
|||||||
- name: Build and push container image
|
- name: Build and push container image
|
||||||
if: steps.needs-build.outputs.out == 'true'
|
if: steps.needs-build.outputs.out == 'true'
|
||||||
id: build
|
id: build
|
||||||
uses: docker/build-push-action@471d1dc4e07e5cdedd4c2171150001c434f0b7a4 # v6.15.0
|
uses: docker/build-push-action@48aba3b46d1b1fec4febb7c5d0c644b249a11355 # v6.10.0
|
||||||
with:
|
with:
|
||||||
context: ./guest-agent
|
context: ./guest-agent
|
||||||
file: ./constellation/3rdparty/gcp-guest-agent/Dockerfile
|
file: ./constellation/3rdparty/gcp-guest-agent/Dockerfile
|
||||||
|
@ -65,9 +65,9 @@ jobs:
|
|||||||
token: ${{ secrets.CI_COMMIT_PUSH_PR }}
|
token: ${{ secrets.CI_COMMIT_PUSH_PR }}
|
||||||
|
|
||||||
- name: Setup Go environment
|
- name: Setup Go environment
|
||||||
uses: actions/setup-go@0aaccfd150d50ccaeb58ebd88d36e91967a5f35b # v5.4.0
|
uses: actions/setup-go@41dfa10bad2bb2ae585af6ee5bb4d7d973ad74ed # v5.1.0
|
||||||
with:
|
with:
|
||||||
go-version: "1.24.2"
|
go-version: "1.23.2"
|
||||||
cache: false
|
cache: false
|
||||||
|
|
||||||
- name: Determine version
|
- name: Determine version
|
||||||
@ -97,7 +97,7 @@ jobs:
|
|||||||
run: rm -f internal/attestation/measurements/measurement-generator/generate
|
run: rm -f internal/attestation/measurements/measurement-generator/generate
|
||||||
|
|
||||||
- name: Create pull request
|
- name: Create pull request
|
||||||
uses: peter-evans/create-pull-request@271a8d0340265f705b14b6d32b9829c1cb33d45e # v7.0.8
|
uses: peter-evans/create-pull-request@5e914681df9dc83aa4e4905692ca88beb2f9e91f # v7.0.5
|
||||||
with:
|
with:
|
||||||
branch: "image/automated/update-measurements-${{ github.run_number }}"
|
branch: "image/automated/update-measurements-${{ github.run_number }}"
|
||||||
base: main
|
base: main
|
||||||
|
8
.github/workflows/build-os-image.yml
vendored
8
.github/workflows/build-os-image.yml
vendored
@ -147,7 +147,7 @@ jobs:
|
|||||||
useCache: "false"
|
useCache: "false"
|
||||||
|
|
||||||
- name: Login to AWS
|
- name: Login to AWS
|
||||||
uses: aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1.0
|
uses: aws-actions/configure-aws-credentials@e3dd6a429d7300a6a4c196c26e071d42e0343502 # v4.0.2
|
||||||
with:
|
with:
|
||||||
role-to-assume: arn:aws:iam::795746500882:role/GitHubConstellationImagePipeline
|
role-to-assume: arn:aws:iam::795746500882:role/GitHubConstellationImagePipeline
|
||||||
aws-region: eu-central-1
|
aws-region: eu-central-1
|
||||||
@ -167,12 +167,6 @@ jobs:
|
|||||||
with:
|
with:
|
||||||
clouds_yaml: ${{ secrets.STACKIT_IMAGE_UPLOAD_CLOUDS_YAML }}
|
clouds_yaml: ${{ secrets.STACKIT_IMAGE_UPLOAD_CLOUDS_YAML }}
|
||||||
|
|
||||||
- name: Allow unrestricted user namespaces
|
|
||||||
shell: bash
|
|
||||||
run: |
|
|
||||||
sudo sysctl --ignore --write kernel.apparmor_restrict_unprivileged_unconfined=0
|
|
||||||
sudo sysctl --ignore --write kernel.apparmor_restrict_unprivileged_userns=0
|
|
||||||
|
|
||||||
- name: Build and upload
|
- name: Build and upload
|
||||||
id: build
|
id: build
|
||||||
shell: bash
|
shell: bash
|
||||||
|
2
.github/workflows/check-links.yml
vendored
2
.github/workflows/check-links.yml
vendored
@ -25,7 +25,7 @@ jobs:
|
|||||||
ref: ${{ !github.event.pull_request.head.repo.fork && github.head_ref || '' }}
|
ref: ${{ !github.event.pull_request.head.repo.fork && github.head_ref || '' }}
|
||||||
|
|
||||||
- name: Link Checker
|
- name: Link Checker
|
||||||
uses: lycheeverse/lychee-action@1d97d84f0bc547f7b25f4c2170d87d810dc2fb2c # v2.4.0
|
uses: lycheeverse/lychee-action@f81112d0d2814ded911bd23e3beaa9dda9093915 # v2.1.0
|
||||||
with:
|
with:
|
||||||
args: "--config ./.lychee.toml './**/*.md' './**/*.html'"
|
args: "--config ./.lychee.toml './**/*.md' './**/*.html'"
|
||||||
fail: true
|
fail: true
|
||||||
|
@ -1,25 +0,0 @@
|
|||||||
name: Check measurements reproducibility
|
|
||||||
on:
|
|
||||||
workflow_dispatch:
|
|
||||||
inputs:
|
|
||||||
version:
|
|
||||||
type: string
|
|
||||||
description: The version of the measurements that are downloaded from the CDN.
|
|
||||||
required: true
|
|
||||||
ref:
|
|
||||||
type: string
|
|
||||||
description: The git ref to check out. You probably want this to be the tag of the release you are testing.
|
|
||||||
required: true
|
|
||||||
|
|
||||||
jobs:
|
|
||||||
check-reproducibility:
|
|
||||||
runs-on: ubuntu-24.04
|
|
||||||
steps:
|
|
||||||
- name: Checkout
|
|
||||||
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
|
|
||||||
|
|
||||||
- name: Check reproducibility
|
|
||||||
uses: ./.github/actions/check_measurements_reproducibility
|
|
||||||
with:
|
|
||||||
version: ${{ github.event.inputs.version }}
|
|
||||||
ref: ${{ github.event.inputs.ref }}
|
|
8
.github/workflows/codeql.yml
vendored
8
.github/workflows/codeql.yml
vendored
@ -38,13 +38,13 @@ jobs:
|
|||||||
|
|
||||||
- name: Setup Go environment
|
- name: Setup Go environment
|
||||||
if: matrix.language == 'go'
|
if: matrix.language == 'go'
|
||||||
uses: actions/setup-go@0aaccfd150d50ccaeb58ebd88d36e91967a5f35b # v5.4.0
|
uses: actions/setup-go@41dfa10bad2bb2ae585af6ee5bb4d7d973ad74ed # v5.1.0
|
||||||
with:
|
with:
|
||||||
go-version: "1.24.2"
|
go-version: "1.23.2"
|
||||||
cache: false
|
cache: false
|
||||||
|
|
||||||
- name: Initialize CodeQL
|
- name: Initialize CodeQL
|
||||||
uses: github/codeql-action/init@45775bd8235c68ba998cffa5171334d58593da47 # v3.28.15
|
uses: github/codeql-action/init@f09c1c0a94de965c15400f5634aa42fac8fb8f88 # v3.27.5
|
||||||
with:
|
with:
|
||||||
languages: ${{ matrix.language }}
|
languages: ${{ matrix.language }}
|
||||||
|
|
||||||
@ -63,6 +63,6 @@ jobs:
|
|||||||
echo "::endgroup::"
|
echo "::endgroup::"
|
||||||
|
|
||||||
- name: Perform CodeQL Analysis
|
- name: Perform CodeQL Analysis
|
||||||
uses: github/codeql-action/analyze@45775bd8235c68ba998cffa5171334d58593da47 # v3.28.15
|
uses: github/codeql-action/analyze@f09c1c0a94de965c15400f5634aa42fac8fb8f88 # v3.27.5
|
||||||
with:
|
with:
|
||||||
category: "/language:${{ matrix.language }}"
|
category: "/language:${{ matrix.language }}"
|
||||||
|
1
.github/workflows/docs-vale.yml
vendored
1
.github/workflows/docs-vale.yml
vendored
@ -29,4 +29,3 @@ jobs:
|
|||||||
with:
|
with:
|
||||||
files: docs/docs
|
files: docs/docs
|
||||||
fail_on_error: true
|
fail_on_error: true
|
||||||
version: 3.9.3
|
|
||||||
|
42
.github/workflows/draft-release.yml
vendored
42
.github/workflows/draft-release.yml
vendored
@ -92,8 +92,8 @@ jobs:
|
|||||||
cosignPassword: ${{ inputs.key == 'release' && secrets.COSIGN_PASSWORD || secrets.COSIGN_DEV_PASSWORD }}
|
cosignPassword: ${{ inputs.key == 'release' && secrets.COSIGN_PASSWORD || secrets.COSIGN_DEV_PASSWORD }}
|
||||||
|
|
||||||
- name: Upload CLI as artifact (unix)
|
- name: Upload CLI as artifact (unix)
|
||||||
uses: actions/upload-artifact@ea165f8d65b6e75b540449e92b4886f43607fa02 # v4.6.2
|
uses: actions/upload-artifact@b4b15b8c7c6ac21ea08fcf65892d2ee8f75cf882 # v4.4.3
|
||||||
if: ${{ matrix.os != 'windows' }}
|
if : ${{ matrix.os != 'windows' }}
|
||||||
with:
|
with:
|
||||||
name: constellation-${{ matrix.os }}-${{ matrix.arch }}
|
name: constellation-${{ matrix.os }}-${{ matrix.arch }}
|
||||||
path: |
|
path: |
|
||||||
@ -101,8 +101,8 @@ jobs:
|
|||||||
build/constellation-${{ matrix.os }}-${{ matrix.arch }}.sig
|
build/constellation-${{ matrix.os }}-${{ matrix.arch }}.sig
|
||||||
|
|
||||||
- name: Upload CLI as artifact (windows)
|
- name: Upload CLI as artifact (windows)
|
||||||
uses: actions/upload-artifact@ea165f8d65b6e75b540449e92b4886f43607fa02 # v4.6.2
|
uses: actions/upload-artifact@b4b15b8c7c6ac21ea08fcf65892d2ee8f75cf882 # v4.4.3
|
||||||
if: ${{ matrix.os == 'windows' }}
|
if : ${{ matrix.os == 'windows' }}
|
||||||
with:
|
with:
|
||||||
name: constellation-${{ matrix.os }}-${{ matrix.arch }}
|
name: constellation-${{ matrix.os }}-${{ matrix.arch }}
|
||||||
path: |
|
path: |
|
||||||
@ -149,16 +149,16 @@ jobs:
|
|||||||
targetArch: ${{ matrix.arch }}
|
targetArch: ${{ matrix.arch }}
|
||||||
|
|
||||||
- name: Upload Terraform Provider Binary as artifact (unix)
|
- name: Upload Terraform Provider Binary as artifact (unix)
|
||||||
uses: actions/upload-artifact@ea165f8d65b6e75b540449e92b4886f43607fa02 # v4.6.2
|
uses: actions/upload-artifact@b4b15b8c7c6ac21ea08fcf65892d2ee8f75cf882 # v4.4.3
|
||||||
if: ${{ matrix.os != 'windows' }}
|
if : ${{ matrix.os != 'windows' }}
|
||||||
with:
|
with:
|
||||||
name: terraform-provider-constellation-${{ matrix.os }}-${{ matrix.arch }}
|
name: terraform-provider-constellation-${{ matrix.os }}-${{ matrix.arch }}
|
||||||
path: |
|
path: |
|
||||||
build/terraform-provider-constellation-${{ matrix.os }}-${{ matrix.arch }}
|
build/terraform-provider-constellation-${{ matrix.os }}-${{ matrix.arch }}
|
||||||
|
|
||||||
- name: Upload Terraform Provider Binary as artifact (windows)
|
- name: Upload Terraform Provider Binary as artifact (windows)
|
||||||
uses: actions/upload-artifact@ea165f8d65b6e75b540449e92b4886f43607fa02 # v4.6.2
|
uses: actions/upload-artifact@b4b15b8c7c6ac21ea08fcf65892d2ee8f75cf882 # v4.4.3
|
||||||
if: ${{ matrix.os == 'windows' }}
|
if : ${{ matrix.os == 'windows' }}
|
||||||
with:
|
with:
|
||||||
name: terraform-provider-constellation-${{ matrix.os }}-${{ matrix.arch }}
|
name: terraform-provider-constellation-${{ matrix.os }}-${{ matrix.arch }}
|
||||||
path: |
|
path: |
|
||||||
@ -227,7 +227,7 @@ jobs:
|
|||||||
uses: ./.github/actions/download_release_binaries
|
uses: ./.github/actions/download_release_binaries
|
||||||
|
|
||||||
- name: Download CLI SBOM
|
- name: Download CLI SBOM
|
||||||
uses: actions/download-artifact@95815c38cf2ff2164869cbab79da8d1f422bc89e # v4.2.1
|
uses: actions/download-artifact@fa0a91b85d4f404e444e00e005971372dc801d16 # v4.1.8
|
||||||
with:
|
with:
|
||||||
name: constellation.spdx.sbom
|
name: constellation.spdx.sbom
|
||||||
|
|
||||||
@ -261,7 +261,7 @@ jobs:
|
|||||||
ref: ${{ inputs.ref || github.head_ref }}
|
ref: ${{ inputs.ref || github.head_ref }}
|
||||||
|
|
||||||
- name: Install Cosign
|
- name: Install Cosign
|
||||||
uses: sigstore/cosign-installer@d7d6bc7722e3daa8354c50bcb52f4837da5e9b6a # v3.8.1
|
uses: sigstore/cosign-installer@dc72c7d5c4d10cd6bcb8cf6e3fd625a9e5e537da # v3.7.0
|
||||||
|
|
||||||
- name: Download Syft & Grype
|
- name: Download Syft & Grype
|
||||||
uses: ./.github/actions/install_syft_grype
|
uses: ./.github/actions/install_syft_grype
|
||||||
@ -296,13 +296,13 @@ jobs:
|
|||||||
COSIGN_PASSWORD: ${{ inputs.key == 'release' && secrets.COSIGN_PASSWORD || secrets.COSIGN_DEV_PASSWORD }}
|
COSIGN_PASSWORD: ${{ inputs.key == 'release' && secrets.COSIGN_PASSWORD || secrets.COSIGN_DEV_PASSWORD }}
|
||||||
|
|
||||||
- name: Upload Constellation CLI SBOM
|
- name: Upload Constellation CLI SBOM
|
||||||
uses: actions/upload-artifact@ea165f8d65b6e75b540449e92b4886f43607fa02 # v4.6.2
|
uses: actions/upload-artifact@b4b15b8c7c6ac21ea08fcf65892d2ee8f75cf882 # v4.4.3
|
||||||
with:
|
with:
|
||||||
name: constellation.spdx.sbom
|
name: constellation.spdx.sbom
|
||||||
path: constellation.spdx.sbom
|
path: constellation.spdx.sbom
|
||||||
|
|
||||||
- name: Upload Constellation CLI SBOM's signature
|
- name: Upload Constellation CLI SBOM's signature
|
||||||
uses: actions/upload-artifact@ea165f8d65b6e75b540449e92b4886f43607fa02 # v4.6.2
|
uses: actions/upload-artifact@b4b15b8c7c6ac21ea08fcf65892d2ee8f75cf882 # v4.4.3
|
||||||
with:
|
with:
|
||||||
name: constellation.spdx.sbom.sig
|
name: constellation.spdx.sbom.sig
|
||||||
path: constellation.spdx.sbom.sig
|
path: constellation.spdx.sbom.sig
|
||||||
@ -316,14 +316,14 @@ jobs:
|
|||||||
- provenance-subjects
|
- provenance-subjects
|
||||||
# This must not be pinned to digest. See:
|
# This must not be pinned to digest. See:
|
||||||
# https://github.com/slsa-framework/slsa-github-generator#referencing-slsa-builders-and-generators
|
# https://github.com/slsa-framework/slsa-github-generator#referencing-slsa-builders-and-generators
|
||||||
uses: slsa-framework/slsa-github-generator/.github/workflows/generator_generic_slsa3.yml@v2.1.0
|
uses: slsa-framework/slsa-github-generator/.github/workflows/generator_generic_slsa3.yml@v2.0.0
|
||||||
with:
|
with:
|
||||||
base64-subjects: "${{ needs.provenance-subjects.outputs.provenance-subjects }}"
|
base64-subjects: "${{ needs.provenance-subjects.outputs.provenance-subjects }}"
|
||||||
|
|
||||||
provenance-verify:
|
provenance-verify:
|
||||||
runs-on: ubuntu-24.04
|
runs-on: ubuntu-24.04
|
||||||
env:
|
env:
|
||||||
SLSA_VERIFIER_VERSION: "2.7.0"
|
SLSA_VERIFIER_VERSION: "2.5.1"
|
||||||
needs:
|
needs:
|
||||||
- build-cli
|
- build-cli
|
||||||
- provenance
|
- provenance
|
||||||
@ -340,12 +340,12 @@ jobs:
|
|||||||
uses: ./.github/actions/download_release_binaries
|
uses: ./.github/actions/download_release_binaries
|
||||||
|
|
||||||
- name: Download CLI SBOM
|
- name: Download CLI SBOM
|
||||||
uses: actions/download-artifact@95815c38cf2ff2164869cbab79da8d1f422bc89e # v4.2.1
|
uses: actions/download-artifact@fa0a91b85d4f404e444e00e005971372dc801d16 # v4.1.8
|
||||||
with:
|
with:
|
||||||
name: constellation.spdx.sbom
|
name: constellation.spdx.sbom
|
||||||
|
|
||||||
- name: Download provenance
|
- name: Download provenance
|
||||||
uses: actions/download-artifact@95815c38cf2ff2164869cbab79da8d1f422bc89e # v4.2.1
|
uses: actions/download-artifact@fa0a91b85d4f404e444e00e005971372dc801d16 # v4.1.8
|
||||||
with:
|
with:
|
||||||
name: ${{ needs.provenance.outputs.provenance-name }}
|
name: ${{ needs.provenance.outputs.provenance-name }}
|
||||||
|
|
||||||
@ -418,17 +418,17 @@ jobs:
|
|||||||
uses: ./.github/actions/download_release_binaries
|
uses: ./.github/actions/download_release_binaries
|
||||||
|
|
||||||
- name: Download CLI SBOM
|
- name: Download CLI SBOM
|
||||||
uses: actions/download-artifact@95815c38cf2ff2164869cbab79da8d1f422bc89e # v4.2.1
|
uses: actions/download-artifact@fa0a91b85d4f404e444e00e005971372dc801d16 # v4.1.8
|
||||||
with:
|
with:
|
||||||
name: constellation.spdx.sbom
|
name: constellation.spdx.sbom
|
||||||
|
|
||||||
- name: Download Constellation CLI SBOM's signature
|
- name: Download Constellation CLI SBOM's signature
|
||||||
uses: actions/download-artifact@95815c38cf2ff2164869cbab79da8d1f422bc89e # v4.2.1
|
uses: actions/download-artifact@fa0a91b85d4f404e444e00e005971372dc801d16 # v4.1.8
|
||||||
with:
|
with:
|
||||||
name: constellation.spdx.sbom.sig
|
name: constellation.spdx.sbom.sig
|
||||||
|
|
||||||
- name: Download Constellation provenance
|
- name: Download Constellation provenance
|
||||||
uses: actions/download-artifact@95815c38cf2ff2164869cbab79da8d1f422bc89e # v4.2.1
|
uses: actions/download-artifact@fa0a91b85d4f404e444e00e005971372dc801d16 # v4.1.8
|
||||||
with:
|
with:
|
||||||
name: ${{ needs.provenance.outputs.provenance-name }}
|
name: ${{ needs.provenance.outputs.provenance-name }}
|
||||||
|
|
||||||
@ -472,7 +472,7 @@ jobs:
|
|||||||
- name: Create release with artifacts
|
- name: Create release with artifacts
|
||||||
id: create-release
|
id: create-release
|
||||||
# GitHub endorsed release project. See: https://github.com/actions/create-release
|
# GitHub endorsed release project. See: https://github.com/actions/create-release
|
||||||
uses: softprops/action-gh-release@c95fe1489396fe8a9eb87c0abf8aa5b2ef267fda # v2.2.1
|
uses: softprops/action-gh-release@01570a1f39cb168c169c802c3bceb9e93fb10974 # v2.1.0
|
||||||
with:
|
with:
|
||||||
draft: true
|
draft: true
|
||||||
generate_release_notes: true
|
generate_release_notes: true
|
||||||
@ -487,7 +487,7 @@ jobs:
|
|||||||
terraform-module.zip
|
terraform-module.zip
|
||||||
|
|
||||||
- name: Create Terraform provider release with artifcats
|
- name: Create Terraform provider release with artifcats
|
||||||
uses: softprops/action-gh-release@c95fe1489396fe8a9eb87c0abf8aa5b2ef267fda # v2.2.1
|
uses: softprops/action-gh-release@01570a1f39cb168c169c802c3bceb9e93fb10974 # v2.1.0
|
||||||
with:
|
with:
|
||||||
draft: true
|
draft: true
|
||||||
generate_release_notes: false
|
generate_release_notes: false
|
||||||
|
4
.github/workflows/e2e-cleanup-weekly.yml
vendored
4
.github/workflows/e2e-cleanup-weekly.yml
vendored
@ -4,7 +4,7 @@ on:
|
|||||||
schedule:
|
schedule:
|
||||||
- cron: "0 0 * * 0" # At 00:00 every Sunday UTC
|
- cron: "0 0 * * 0" # At 00:00 every Sunday UTC
|
||||||
workflow_dispatch:
|
workflow_dispatch:
|
||||||
|
|
||||||
|
|
||||||
jobs:
|
jobs:
|
||||||
cleanup:
|
cleanup:
|
||||||
@ -22,5 +22,3 @@ jobs:
|
|||||||
ghToken: ${{ secrets.GITHUB_TOKEN }}
|
ghToken: ${{ secrets.GITHUB_TOKEN }}
|
||||||
encryptionSecret: ${{ secrets.ARTIFACT_ENCRYPT_PASSWD }}
|
encryptionSecret: ${{ secrets.ARTIFACT_ENCRYPT_PASSWD }}
|
||||||
azure_credentials: ${{ secrets.AZURE_E2E_DESTROY_CREDENTIALS }}
|
azure_credentials: ${{ secrets.AZURE_E2E_DESTROY_CREDENTIALS }}
|
||||||
openStackCloudsYaml: ${{ secrets.STACKIT_CI_CLOUDS_YAML }}
|
|
||||||
stackitUat: ${{ secrets.STACKIT_CI_UAT }}
|
|
||||||
|
2
.github/workflows/e2e-mini.yml
vendored
2
.github/workflows/e2e-mini.yml
vendored
@ -34,7 +34,7 @@ jobs:
|
|||||||
ref: ${{ inputs.ref || github.event.workflow_run.head_branch || github.head_ref }}
|
ref: ${{ inputs.ref || github.event.workflow_run.head_branch || github.head_ref }}
|
||||||
|
|
||||||
- name: Azure login OIDC
|
- name: Azure login OIDC
|
||||||
uses: azure/login@a457da9ea143d694b1b9c7c869ebb04ebe844ef5 # v2.3.0
|
uses: azure/login@a65d910e8af852a8061c627c456678983e180302 # v2.2.0
|
||||||
with:
|
with:
|
||||||
client-id: ${{ secrets.AZURE_E2E_MINI_CLIENT_ID }}
|
client-id: ${{ secrets.AZURE_E2E_MINI_CLIENT_ID }}
|
||||||
tenant-id: ${{ secrets.AZURE_TENANT_ID }}
|
tenant-id: ${{ secrets.AZURE_TENANT_ID }}
|
||||||
|
4
.github/workflows/e2e-test-daily.yml
vendored
4
.github/workflows/e2e-test-daily.yml
vendored
@ -45,7 +45,7 @@ jobs:
|
|||||||
fail-fast: false
|
fail-fast: false
|
||||||
max-parallel: 5
|
max-parallel: 5
|
||||||
matrix:
|
matrix:
|
||||||
kubernetesVersion: ["1.30"] # This should correspond to the current default k8s minor.
|
kubernetesVersion: ["1.28"] # should be default
|
||||||
attestationVariant: ["gcp-sev-es", "gcp-sev-snp", "azure-sev-snp", "azure-tdx", "aws-sev-snp"]
|
attestationVariant: ["gcp-sev-es", "gcp-sev-snp", "azure-sev-snp", "azure-tdx", "aws-sev-snp"]
|
||||||
refStream: ["ref/main/stream/debug/?", "ref/release/stream/stable/?"]
|
refStream: ["ref/main/stream/debug/?", "ref/release/stream/stable/?"]
|
||||||
test: ["sonobuoy quick"]
|
test: ["sonobuoy quick"]
|
||||||
@ -164,7 +164,7 @@ jobs:
|
|||||||
ref: ${{ !github.event.pull_request.head.repo.fork && github.head_ref || '' }}
|
ref: ${{ !github.event.pull_request.head.repo.fork && github.head_ref || '' }}
|
||||||
|
|
||||||
- name: Azure login OIDC
|
- name: Azure login OIDC
|
||||||
uses: azure/login@a457da9ea143d694b1b9c7c869ebb04ebe844ef5 # v2.3.0
|
uses: azure/login@a65d910e8af852a8061c627c456678983e180302 # v2.2.0
|
||||||
with:
|
with:
|
||||||
client-id: ${{ secrets.AZURE_E2E_MINI_CLIENT_ID }}
|
client-id: ${{ secrets.AZURE_E2E_MINI_CLIENT_ID }}
|
||||||
tenant-id: ${{ secrets.AZURE_TENANT_ID }}
|
tenant-id: ${{ secrets.AZURE_TENANT_ID }}
|
||||||
|
3
.github/workflows/e2e-test-internal-lb.yml
vendored
3
.github/workflows/e2e-test-internal-lb.yml
vendored
@ -23,7 +23,7 @@ on:
|
|||||||
type: choice
|
type: choice
|
||||||
options:
|
options:
|
||||||
- "ubuntu-24.04"
|
- "ubuntu-24.04"
|
||||||
- "macos-latest"
|
- "macos-12"
|
||||||
default: "ubuntu-24.04"
|
default: "ubuntu-24.04"
|
||||||
test:
|
test:
|
||||||
description: "The test to run."
|
description: "The test to run."
|
||||||
@ -41,6 +41,7 @@ on:
|
|||||||
required: true
|
required: true
|
||||||
kubernetesVersion:
|
kubernetesVersion:
|
||||||
description: "Kubernetes version to create the cluster from."
|
description: "Kubernetes version to create the cluster from."
|
||||||
|
default: "1.28"
|
||||||
required: true
|
required: true
|
||||||
cliVersion:
|
cliVersion:
|
||||||
description: "Version of a released CLI to download. Leave empty to build the CLI from the checked out ref."
|
description: "Version of a released CLI to download. Leave empty to build the CLI from the checked out ref."
|
||||||
|
@ -23,7 +23,7 @@ on:
|
|||||||
type: choice
|
type: choice
|
||||||
options:
|
options:
|
||||||
- "ubuntu-24.04"
|
- "ubuntu-24.04"
|
||||||
- "macos-latest"
|
- "macos-12"
|
||||||
default: "ubuntu-24.04"
|
default: "ubuntu-24.04"
|
||||||
test:
|
test:
|
||||||
description: "The test to run."
|
description: "The test to run."
|
||||||
@ -41,6 +41,7 @@ on:
|
|||||||
required: true
|
required: true
|
||||||
kubernetesVersion:
|
kubernetesVersion:
|
||||||
description: "Kubernetes version to create the cluster from."
|
description: "Kubernetes version to create the cluster from."
|
||||||
|
default: "1.28"
|
||||||
required: true
|
required: true
|
||||||
cliVersion:
|
cliVersion:
|
||||||
description: "Version of a released CLI to download. Leave empty to build the CLI from the checked out ref."
|
description: "Version of a released CLI to download. Leave empty to build the CLI from the checked out ref."
|
||||||
|
@ -154,7 +154,7 @@ jobs:
|
|||||||
|
|
||||||
- name: Login to AWS (IAM + Cluster role)
|
- name: Login to AWS (IAM + Cluster role)
|
||||||
if: steps.determine.outputs.cloudProvider == 'aws'
|
if: steps.determine.outputs.cloudProvider == 'aws'
|
||||||
uses: aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1.0
|
uses: aws-actions/configure-aws-credentials@e3dd6a429d7300a6a4c196c26e071d42e0343502 # v4.0.2
|
||||||
with:
|
with:
|
||||||
role-to-assume: arn:aws:iam::795746500882:role/GithubActionsE2ETerraform
|
role-to-assume: arn:aws:iam::795746500882:role/GithubActionsE2ETerraform
|
||||||
aws-region: eu-central-1
|
aws-region: eu-central-1
|
||||||
|
28
.github/workflows/e2e-test-release.yml
vendored
28
.github/workflows/e2e-test-release.yml
vendored
@ -73,53 +73,53 @@ jobs:
|
|||||||
|
|
||||||
- test: "sonobuoy full"
|
- test: "sonobuoy full"
|
||||||
attestationVariant: "gcp-sev-es"
|
attestationVariant: "gcp-sev-es"
|
||||||
kubernetes-version: "v1.30"
|
kubernetes-version: "v1.29"
|
||||||
runner: "ubuntu-24.04"
|
runner: "ubuntu-24.04"
|
||||||
clusterCreation: "cli"
|
clusterCreation: "cli"
|
||||||
- test: "sonobuoy full"
|
- test: "sonobuoy full"
|
||||||
attestationVariant: "gcp-sev-snp"
|
attestationVariant: "gcp-sev-snp"
|
||||||
kubernetes-version: "v1.30"
|
kubernetes-version: "v1.29"
|
||||||
runner: "ubuntu-24.04"
|
runner: "ubuntu-24.04"
|
||||||
clusterCreation: "cli"
|
clusterCreation: "cli"
|
||||||
- test: "sonobuoy full"
|
- test: "sonobuoy full"
|
||||||
attestationVariant: "azure-sev-snp"
|
attestationVariant: "azure-sev-snp"
|
||||||
kubernetes-version: "v1.30"
|
kubernetes-version: "v1.29"
|
||||||
runner: "ubuntu-24.04"
|
runner: "ubuntu-24.04"
|
||||||
clusterCreation: "cli"
|
clusterCreation: "cli"
|
||||||
- test: "sonobuoy full"
|
- test: "sonobuoy full"
|
||||||
attestationVariant: "azure-tdx"
|
attestationVariant: "azure-tdx"
|
||||||
kubernetes-version: "v1.30"
|
kubernetes-version: "v1.29"
|
||||||
runner: "ubuntu-24.04"
|
runner: "ubuntu-24.04"
|
||||||
clusterCreation: "cli"
|
clusterCreation: "cli"
|
||||||
- test: "sonobuoy full"
|
- test: "sonobuoy full"
|
||||||
attestationVariant: "aws-sev-snp"
|
attestationVariant: "aws-sev-snp"
|
||||||
kubernetes-version: "v1.30"
|
kubernetes-version: "v1.29"
|
||||||
runner: "ubuntu-24.04"
|
runner: "ubuntu-24.04"
|
||||||
clusterCreation: "cli"
|
clusterCreation: "cli"
|
||||||
|
|
||||||
- test: "sonobuoy full"
|
- test: "sonobuoy full"
|
||||||
attestationVariant: "gcp-sev-es"
|
attestationVariant: "gcp-sev-es"
|
||||||
kubernetes-version: "v1.29"
|
kubernetes-version: "v1.28"
|
||||||
runner: "ubuntu-24.04"
|
runner: "ubuntu-24.04"
|
||||||
clusterCreation: "cli"
|
clusterCreation: "cli"
|
||||||
- test: "sonobuoy full"
|
- test: "sonobuoy full"
|
||||||
attestationVariant: "gcp-sev-snp"
|
attestationVariant: "gcp-sev-snp"
|
||||||
kubernetes-version: "v1.29"
|
kubernetes-version: "v1.28"
|
||||||
runner: "ubuntu-24.04"
|
runner: "ubuntu-24.04"
|
||||||
clusterCreation: "cli"
|
clusterCreation: "cli"
|
||||||
- test: "sonobuoy full"
|
- test: "sonobuoy full"
|
||||||
attestationVariant: "azure-sev-snp"
|
attestationVariant: "azure-sev-snp"
|
||||||
kubernetes-version: "v1.29"
|
kubernetes-version: "v1.28"
|
||||||
runner: "ubuntu-24.04"
|
runner: "ubuntu-24.04"
|
||||||
clusterCreation: "cli"
|
clusterCreation: "cli"
|
||||||
- test: "sonobuoy full"
|
- test: "sonobuoy full"
|
||||||
attestationVariant: "azure-tdx"
|
attestationVariant: "azure-tdx"
|
||||||
kubernetes-version: "v1.29"
|
kubernetes-version: "v1.28"
|
||||||
runner: "ubuntu-24.04"
|
runner: "ubuntu-24.04"
|
||||||
clusterCreation: "cli"
|
clusterCreation: "cli"
|
||||||
- test: "sonobuoy full"
|
- test: "sonobuoy full"
|
||||||
attestationVariant: "aws-sev-snp"
|
attestationVariant: "aws-sev-snp"
|
||||||
kubernetes-version: "v1.29"
|
kubernetes-version: "v1.28"
|
||||||
runner: "ubuntu-24.04"
|
runner: "ubuntu-24.04"
|
||||||
clusterCreation: "cli"
|
clusterCreation: "cli"
|
||||||
|
|
||||||
@ -306,11 +306,11 @@ jobs:
|
|||||||
# - test: "verify"
|
# - test: "verify"
|
||||||
# attestationVariant: "azure-sev-snp"
|
# attestationVariant: "azure-sev-snp"
|
||||||
# kubernetes-version: "v1.30"
|
# kubernetes-version: "v1.30"
|
||||||
# runner: "macos-latest"
|
# runner: "macos-12"
|
||||||
- test: "recover"
|
- test: "recover"
|
||||||
attestationVariant: "gcp-sev-es"
|
attestationVariant: "gcp-sev-es"
|
||||||
kubernetes-version: "v1.30"
|
kubernetes-version: "v1.30"
|
||||||
runner: "macos-latest"
|
runner: "macos-12"
|
||||||
clusterCreation: "cli"
|
clusterCreation: "cli"
|
||||||
runs-on: ${{ matrix.runner }}
|
runs-on: ${{ matrix.runner }}
|
||||||
permissions:
|
permissions:
|
||||||
@ -342,7 +342,7 @@ jobs:
|
|||||||
|
|
||||||
- name: Set up gcloud CLI (macOS)
|
- name: Set up gcloud CLI (macOS)
|
||||||
if: steps.split-attestationVariant.outputs.provider == 'gcp' && runner.os == 'macOS'
|
if: steps.split-attestationVariant.outputs.provider == 'gcp' && runner.os == 'macOS'
|
||||||
uses: google-github-actions/setup-gcloud@77e7a554d41e2ee56fc945c52dfd3f33d12def9a # v2.1.4
|
uses: google-github-actions/setup-gcloud@6189d56e4096ee891640bb02ac264be376592d6a # v2.1.2
|
||||||
|
|
||||||
- name: Run E2E test
|
- name: Run E2E test
|
||||||
id: e2e_test
|
id: e2e_test
|
||||||
@ -409,7 +409,7 @@ jobs:
|
|||||||
fail-fast: false
|
fail-fast: false
|
||||||
max-parallel: 1
|
max-parallel: 1
|
||||||
matrix:
|
matrix:
|
||||||
fromVersion: ["v2.22.0"]
|
fromVersion: ["v2.19.3"]
|
||||||
attestationVariant: ["gcp-sev-snp", "azure-sev-snp", "azure-tdx", "aws-sev-snp"]
|
attestationVariant: ["gcp-sev-snp", "azure-sev-snp", "azure-tdx", "aws-sev-snp"]
|
||||||
name: Run upgrade tests
|
name: Run upgrade tests
|
||||||
secrets: inherit
|
secrets: inherit
|
||||||
|
153
.github/workflows/e2e-test-stackit.yml
vendored
153
.github/workflows/e2e-test-stackit.yml
vendored
@ -1,153 +0,0 @@
|
|||||||
name: e2e test STACKIT
|
|
||||||
|
|
||||||
on:
|
|
||||||
workflow_dispatch:
|
|
||||||
schedule:
|
|
||||||
- cron: "0 0 * * *" # Every day at midnight.
|
|
||||||
|
|
||||||
jobs:
|
|
||||||
find-latest-image:
|
|
||||||
name: Find latest image
|
|
||||||
runs-on: ubuntu-24.04
|
|
||||||
permissions:
|
|
||||||
id-token: write
|
|
||||||
contents: read
|
|
||||||
outputs:
|
|
||||||
image-release-stable: ${{ steps.relabel-output.outputs.image-release-stable }}
|
|
||||||
steps:
|
|
||||||
- name: Checkout
|
|
||||||
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
|
|
||||||
with:
|
|
||||||
ref: ${{ !github.event.pull_request.head.repo.fork && github.head_ref || '' }}
|
|
||||||
|
|
||||||
- name: Select relevant image
|
|
||||||
id: select-image-action
|
|
||||||
uses: ./.github/actions/select_image
|
|
||||||
with:
|
|
||||||
osImage: "ref/release/stream/stable/?"
|
|
||||||
|
|
||||||
- name: Relabel output
|
|
||||||
id: relabel-output
|
|
||||||
shell: bash
|
|
||||||
run: |
|
|
||||||
ref=$(echo 'ref/release/stream/stable/?' | cut -d/ -f2)
|
|
||||||
stream=$(echo 'ref/release/stream/stable/?' | cut -d/ -f4)
|
|
||||||
|
|
||||||
echo "image-$ref-$stream=${{ steps.select-image-action.outputs.osImage }}" | tee -a "$GITHUB_OUTPUT"
|
|
||||||
|
|
||||||
e2e-stackit:
|
|
||||||
strategy:
|
|
||||||
fail-fast: false
|
|
||||||
max-parallel: 6
|
|
||||||
matrix:
|
|
||||||
kubernetesVersion: [ "1.29", "1.30", "1.31" ]
|
|
||||||
clusterCreation: [ "cli", "terraform" ]
|
|
||||||
test: [ "sonobuoy quick" ]
|
|
||||||
runs-on: ubuntu-24.04
|
|
||||||
permissions:
|
|
||||||
id-token: write
|
|
||||||
checks: write
|
|
||||||
contents: read
|
|
||||||
packages: write
|
|
||||||
actions: write
|
|
||||||
needs: [find-latest-image]
|
|
||||||
steps:
|
|
||||||
- name: Check out repository
|
|
||||||
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
|
|
||||||
with:
|
|
||||||
fetch-depth: 0
|
|
||||||
ref: ${{ !github.event.pull_request.head.repo.fork && github.head_ref || '' }}
|
|
||||||
|
|
||||||
- name: Setup bazel
|
|
||||||
uses: ./.github/actions/setup_bazel_nix
|
|
||||||
with:
|
|
||||||
nixTools: terraform
|
|
||||||
|
|
||||||
- name: Run E2E test
|
|
||||||
id: e2e_test
|
|
||||||
uses: ./.github/actions/e2e_test
|
|
||||||
with:
|
|
||||||
workerNodesCount: "1"
|
|
||||||
controlNodesCount: "1"
|
|
||||||
cloudProvider: stackit
|
|
||||||
attestationVariant: qemu-vtpm
|
|
||||||
osImage: ${{ needs.find-latest-image.outputs.image-release-stable }}
|
|
||||||
isDebugImage: false
|
|
||||||
cliVersion: ${{ needs.find-latest-image.outputs.image-release-stable || '' }}
|
|
||||||
kubernetesVersion: ${{ matrix.kubernetesVersion }}
|
|
||||||
awsOpenSearchDomain: ${{ secrets.AWS_OPENSEARCH_DOMAIN }}
|
|
||||||
awsOpenSearchUsers: ${{ secrets.AWS_OPENSEARCH_USER }}
|
|
||||||
awsOpenSearchPwd: ${{ secrets.AWS_OPENSEARCH_PWD }}
|
|
||||||
gcpProject: constellation-e2e
|
|
||||||
gcpClusterCreateServiceAccount: "infrastructure-e2e@constellation-e2e.iam.gserviceaccount.com"
|
|
||||||
gcpIAMCreateServiceAccount: "iam-e2e@constellation-e2e.iam.gserviceaccount.com"
|
|
||||||
test: ${{ matrix.test }}
|
|
||||||
azureSubscriptionID: ${{ secrets.AZURE_SUBSCRIPTION_ID }}
|
|
||||||
azureClusterCreateCredentials: ${{ secrets.AZURE_E2E_CLUSTER_CREDENTIALS }}
|
|
||||||
azureIAMCreateCredentials: ${{ secrets.AZURE_E2E_IAM_CREDENTIALS }}
|
|
||||||
registry: ghcr.io
|
|
||||||
githubToken: ${{ secrets.GITHUB_TOKEN }}
|
|
||||||
cosignPassword: ${{ secrets.COSIGN_PASSWORD }}
|
|
||||||
cosignPrivateKey: ${{ secrets.COSIGN_PRIVATE_KEY }}
|
|
||||||
fetchMeasurements: false
|
|
||||||
clusterCreation: ${{ matrix.clusterCreation }}
|
|
||||||
s3AccessKey: ${{ secrets.AWS_ACCESS_KEY_ID_S3PROXY }}
|
|
||||||
s3SecretKey: ${{ secrets.AWS_SECRET_ACCESS_KEY_S3PROXY }}
|
|
||||||
encryptionSecret: ${{ secrets.ARTIFACT_ENCRYPT_PASSWD }}
|
|
||||||
openStackCloudsYaml: ${{ secrets.STACKIT_CI_CLOUDS_YAML }}
|
|
||||||
stackitUat: ${{ secrets.STACKIT_CI_UAT }}
|
|
||||||
stackitProjectID: ${{ secrets.STACKIT_CI_PROJECT_ID }}
|
|
||||||
|
|
||||||
- name: Always terminate cluster
|
|
||||||
if: always()
|
|
||||||
uses: ./.github/actions/constellation_destroy
|
|
||||||
with:
|
|
||||||
kubeconfig: ${{ steps.e2e_test.outputs.kubeconfig }}
|
|
||||||
clusterCreation: ${{ matrix.clusterCreation }}
|
|
||||||
cloudProvider: stackit
|
|
||||||
azureClusterDeleteCredentials: ${{ secrets.AZURE_E2E_CLUSTER_CREDENTIALS }}
|
|
||||||
gcpClusterDeleteServiceAccount: "infrastructure-e2e@constellation-e2e.iam.gserviceaccount.com"
|
|
||||||
|
|
||||||
- name: Always delete IAM configuration
|
|
||||||
if: always()
|
|
||||||
uses: ./.github/actions/constellation_iam_destroy
|
|
||||||
with:
|
|
||||||
cloudProvider: stackit
|
|
||||||
azureCredentials: ${{ secrets.AZURE_E2E_IAM_CREDENTIALS }}
|
|
||||||
gcpServiceAccount: "iam-e2e@constellation-e2e.iam.gserviceaccount.com"
|
|
||||||
|
|
||||||
- name: Update tfstate
|
|
||||||
if: always()
|
|
||||||
env:
|
|
||||||
GH_TOKEN: ${{ github.token }}
|
|
||||||
uses: ./.github/actions/update_tfstate
|
|
||||||
with:
|
|
||||||
name: terraform-state-${{ steps.e2e_test.outputs.namePrefix }}
|
|
||||||
runID: ${{ github.run_id }}
|
|
||||||
encryptionSecret: ${{ secrets.ARTIFACT_ENCRYPT_PASSWD }}
|
|
||||||
|
|
||||||
- name: Notify about failure
|
|
||||||
if: |
|
|
||||||
failure() &&
|
|
||||||
github.ref == 'refs/heads/main' &&
|
|
||||||
github.event_name == 'schedule'
|
|
||||||
continue-on-error: true
|
|
||||||
uses: ./.github/actions/notify_e2e_failure
|
|
||||||
with:
|
|
||||||
projectWriteToken: ${{ secrets.PROJECT_WRITE_TOKEN }}
|
|
||||||
refStream: "ref/release/stream/stable/?"
|
|
||||||
test: ${{ matrix.test }}
|
|
||||||
kubernetesVersion: ${{ matrix.kubernetesVersion }}
|
|
||||||
provider: stackit
|
|
||||||
attestationVariant: qemu-vtpm
|
|
||||||
clusterCreation: ${{ matrix.clusterCreation }}
|
|
||||||
|
|
||||||
- name: Notify STACKIT
|
|
||||||
if: |
|
|
||||||
failure() &&
|
|
||||||
github.ref == 'refs/heads/main' &&
|
|
||||||
github.event_name == 'schedule'
|
|
||||||
continue-on-error: true
|
|
||||||
uses: ./.github/actions/notify_stackit
|
|
||||||
with:
|
|
||||||
slackToken: ${{ secrets.SLACK_TOKEN }}
|
|
@ -23,7 +23,7 @@ on:
|
|||||||
type: choice
|
type: choice
|
||||||
options:
|
options:
|
||||||
- "ubuntu-24.04"
|
- "ubuntu-24.04"
|
||||||
- "macos-latest"
|
- "macos-12"
|
||||||
default: "ubuntu-24.04"
|
default: "ubuntu-24.04"
|
||||||
test:
|
test:
|
||||||
description: "The test to run."
|
description: "The test to run."
|
||||||
@ -41,6 +41,7 @@ on:
|
|||||||
required: true
|
required: true
|
||||||
kubernetesVersion:
|
kubernetesVersion:
|
||||||
description: "Kubernetes version to create the cluster from."
|
description: "Kubernetes version to create the cluster from."
|
||||||
|
default: "1.28"
|
||||||
required: true
|
required: true
|
||||||
releaseVersion:
|
releaseVersion:
|
||||||
description: "Version of a released provider to download. Leave empty to build the provider from the checked out ref."
|
description: "Version of a released provider to download. Leave empty to build the provider from the checked out ref."
|
||||||
|
64
.github/workflows/e2e-test-weekly.yml
vendored
64
.github/workflows/e2e-test-weekly.yml
vendored
@ -10,7 +10,7 @@ jobs:
|
|||||||
strategy:
|
strategy:
|
||||||
fail-fast: false
|
fail-fast: false
|
||||||
matrix:
|
matrix:
|
||||||
refStream: ["ref/main/stream/nightly/?", "ref/main/stream/debug/?", "ref/release/stream/stable/?"]
|
refStream: ["ref/main/stream/nightly/?","ref/main/stream/debug/?", "ref/release/stream/stable/?"]
|
||||||
name: Find latest image
|
name: Find latest image
|
||||||
runs-on: ubuntu-24.04
|
runs-on: ubuntu-24.04
|
||||||
permissions:
|
permissions:
|
||||||
@ -51,33 +51,6 @@ jobs:
|
|||||||
# Tests on main-debug refStream
|
# Tests on main-debug refStream
|
||||||
#
|
#
|
||||||
|
|
||||||
# Emergency SSH test on latest k8s version
|
|
||||||
- test: "emergency ssh"
|
|
||||||
refStream: "ref/main/stream/debug/?"
|
|
||||||
attestationVariant: "gcp-sev-es"
|
|
||||||
kubernetes-version: "v1.30"
|
|
||||||
clusterCreation: "cli"
|
|
||||||
- test: "emergency ssh"
|
|
||||||
refStream: "ref/main/stream/debug/?"
|
|
||||||
attestationVariant: "gcp-sev-snp"
|
|
||||||
kubernetes-version: "v1.30"
|
|
||||||
clusterCreation: "cli"
|
|
||||||
- test: "emergency ssh"
|
|
||||||
refStream: "ref/main/stream/debug/?"
|
|
||||||
attestationVariant: "azure-sev-snp"
|
|
||||||
kubernetes-version: "v1.30"
|
|
||||||
clusterCreation: "cli"
|
|
||||||
- test: "emergency ssh"
|
|
||||||
refStream: "ref/main/stream/debug/?"
|
|
||||||
attestationVariant: "azure-tdx"
|
|
||||||
kubernetes-version: "v1.30"
|
|
||||||
clusterCreation: "cli"
|
|
||||||
- test: "emergency ssh"
|
|
||||||
refStream: "ref/main/stream/debug/?"
|
|
||||||
attestationVariant: "aws-sev-snp"
|
|
||||||
kubernetes-version: "v1.30"
|
|
||||||
clusterCreation: "cli"
|
|
||||||
|
|
||||||
# Sonobuoy full test on latest k8s version
|
# Sonobuoy full test on latest k8s version
|
||||||
- test: "sonobuoy full"
|
- test: "sonobuoy full"
|
||||||
refStream: "ref/main/stream/debug/?"
|
refStream: "ref/main/stream/debug/?"
|
||||||
@ -116,55 +89,56 @@ jobs:
|
|||||||
- test: "sonobuoy quick"
|
- test: "sonobuoy quick"
|
||||||
refStream: "ref/main/stream/debug/?"
|
refStream: "ref/main/stream/debug/?"
|
||||||
attestationVariant: "gcp-sev-es"
|
attestationVariant: "gcp-sev-es"
|
||||||
kubernetes-version: "v1.30"
|
kubernetes-version: "v1.29"
|
||||||
clusterCreation: "cli"
|
clusterCreation: "cli"
|
||||||
- test: "sonobuoy quick"
|
- test: "sonobuoy quick"
|
||||||
refStream: "ref/main/stream/debug/?"
|
refStream: "ref/main/stream/debug/?"
|
||||||
attestationVariant: "gcp-sev-snp"
|
attestationVariant: "gcp-sev-snp"
|
||||||
kubernetes-version: "v1.30"
|
kubernetes-version: "v1.29"
|
||||||
clusterCreation: "cli"
|
clusterCreation: "cli"
|
||||||
- test: "sonobuoy quick"
|
- test: "sonobuoy quick"
|
||||||
refStream: "ref/main/stream/debug/?"
|
refStream: "ref/main/stream/debug/?"
|
||||||
attestationVariant: "azure-sev-snp"
|
attestationVariant: "azure-sev-snp"
|
||||||
kubernetes-version: "v1.30"
|
kubernetes-version: "v1.29"
|
||||||
clusterCreation: "cli"
|
clusterCreation: "cli"
|
||||||
- test: "sonobuoy quick"
|
- test: "sonobuoy quick"
|
||||||
refStream: "ref/main/stream/debug/?"
|
refStream: "ref/main/stream/debug/?"
|
||||||
attestationVariant: "azure-tdx"
|
attestationVariant: "azure-tdx"
|
||||||
kubernetes-version: "v1.30"
|
kubernetes-version: "v1.29"
|
||||||
clusterCreation: "cli"
|
clusterCreation: "cli"
|
||||||
- test: "sonobuoy quick"
|
- test: "sonobuoy quick"
|
||||||
refStream: "ref/main/stream/debug/?"
|
refStream: "ref/main/stream/debug/?"
|
||||||
attestationVariant: "aws-sev-snp"
|
attestationVariant: "aws-sev-snp"
|
||||||
kubernetes-version: "v1.30"
|
kubernetes-version: "v1.29"
|
||||||
clusterCreation: "cli"
|
clusterCreation: "cli"
|
||||||
|
|
||||||
- test: "sonobuoy quick"
|
- test: "sonobuoy quick"
|
||||||
refStream: "ref/main/stream/debug/?"
|
refStream: "ref/main/stream/debug/?"
|
||||||
attestationVariant: "gcp-sev-es"
|
attestationVariant: "gcp-sev-es"
|
||||||
kubernetes-version: "v1.29"
|
kubernetes-version: "v1.28"
|
||||||
clusterCreation: "cli"
|
clusterCreation: "cli"
|
||||||
- test: "sonobuoy quick"
|
- test: "sonobuoy quick"
|
||||||
refStream: "ref/main/stream/debug/?"
|
refStream: "ref/main/stream/debug/?"
|
||||||
attestationVariant: "gcp-sev-snp"
|
attestationVariant: "gcp-sev-snp"
|
||||||
kubernetes-version: "v1.29"
|
kubernetes-version: "v1.28"
|
||||||
clusterCreation: "cli"
|
clusterCreation: "cli"
|
||||||
- test: "sonobuoy quick"
|
- test: "sonobuoy quick"
|
||||||
refStream: "ref/main/stream/debug/?"
|
refStream: "ref/main/stream/debug/?"
|
||||||
attestationVariant: "azure-sev-snp"
|
attestationVariant: "azure-sev-snp"
|
||||||
kubernetes-version: "v1.29"
|
kubernetes-version: "v1.28"
|
||||||
clusterCreation: "cli"
|
clusterCreation: "cli"
|
||||||
- test: "sonobuoy quick"
|
- test: "sonobuoy quick"
|
||||||
refStream: "ref/main/stream/debug/?"
|
refStream: "ref/main/stream/debug/?"
|
||||||
attestationVariant: "azure-tdx"
|
attestationVariant: "azure-tdx"
|
||||||
kubernetes-version: "v1.29"
|
kubernetes-version: "v1.28"
|
||||||
clusterCreation: "cli"
|
clusterCreation: "cli"
|
||||||
- test: "sonobuoy quick"
|
- test: "sonobuoy quick"
|
||||||
refStream: "ref/main/stream/debug/?"
|
refStream: "ref/main/stream/debug/?"
|
||||||
attestationVariant: "aws-sev-snp"
|
attestationVariant: "aws-sev-snp"
|
||||||
kubernetes-version: "v1.29"
|
kubernetes-version: "v1.28"
|
||||||
clusterCreation: "cli"
|
clusterCreation: "cli"
|
||||||
|
|
||||||
|
|
||||||
# verify test on latest k8s version
|
# verify test on latest k8s version
|
||||||
- test: "verify"
|
- test: "verify"
|
||||||
refStream: "ref/main/stream/debug/?"
|
refStream: "ref/main/stream/debug/?"
|
||||||
@ -316,27 +290,27 @@ jobs:
|
|||||||
- test: "verify"
|
- test: "verify"
|
||||||
refStream: "ref/release/stream/stable/?"
|
refStream: "ref/release/stream/stable/?"
|
||||||
attestationVariant: "gcp-sev-es"
|
attestationVariant: "gcp-sev-es"
|
||||||
kubernetes-version: "v1.30"
|
kubernetes-version: "v1.29"
|
||||||
clusterCreation: "cli"
|
clusterCreation: "cli"
|
||||||
- test: "verify"
|
- test: "verify"
|
||||||
refStream: "ref/release/stream/stable/?"
|
refStream: "ref/release/stream/stable/?"
|
||||||
attestationVariant: "gcp-sev-snp"
|
attestationVariant: "gcp-sev-snp"
|
||||||
kubernetes-version: "v1.30"
|
kubernetes-version: "v1.29"
|
||||||
clusterCreation: "cli"
|
clusterCreation: "cli"
|
||||||
- test: "verify"
|
- test: "verify"
|
||||||
refStream: "ref/release/stream/stable/?"
|
refStream: "ref/release/stream/stable/?"
|
||||||
attestationVariant: "azure-sev-snp"
|
attestationVariant: "azure-sev-snp"
|
||||||
kubernetes-version: "v1.30"
|
kubernetes-version: "v1.29"
|
||||||
clusterCreation: "cli"
|
clusterCreation: "cli"
|
||||||
- test: "verify"
|
- test: "verify"
|
||||||
refStream: "ref/release/stream/stable/?"
|
refStream: "ref/release/stream/stable/?"
|
||||||
attestationVariant: "azure-tdx"
|
attestationVariant: "azure-tdx"
|
||||||
kubernetes-version: "v1.30"
|
kubernetes-version: "v1.29"
|
||||||
clusterCreation: "cli"
|
clusterCreation: "cli"
|
||||||
- test: "verify"
|
- test: "verify"
|
||||||
refStream: "ref/release/stream/stable/?"
|
refStream: "ref/release/stream/stable/?"
|
||||||
attestationVariant: "aws-sev-snp"
|
attestationVariant: "aws-sev-snp"
|
||||||
kubernetes-version: "v1.30"
|
kubernetes-version: "v1.29"
|
||||||
clusterCreation: "cli"
|
clusterCreation: "cli"
|
||||||
|
|
||||||
runs-on: ubuntu-24.04
|
runs-on: ubuntu-24.04
|
||||||
@ -446,7 +420,7 @@ jobs:
|
|||||||
fail-fast: false
|
fail-fast: false
|
||||||
max-parallel: 1
|
max-parallel: 1
|
||||||
matrix:
|
matrix:
|
||||||
fromVersion: ["v2.22.0"]
|
fromVersion: ["v2.19.3"]
|
||||||
attestationVariant: ["gcp-sev-snp", "azure-sev-snp", "azure-tdx", "aws-sev-snp"]
|
attestationVariant: ["gcp-sev-snp", "azure-sev-snp", "azure-tdx", "aws-sev-snp"]
|
||||||
name: Run upgrade tests
|
name: Run upgrade tests
|
||||||
secrets: inherit
|
secrets: inherit
|
||||||
@ -479,7 +453,7 @@ jobs:
|
|||||||
ref: ${{ !github.event.pull_request.head.repo.fork && github.head_ref || '' }}
|
ref: ${{ !github.event.pull_request.head.repo.fork && github.head_ref || '' }}
|
||||||
|
|
||||||
- name: Azure login OIDC
|
- name: Azure login OIDC
|
||||||
uses: azure/login@a457da9ea143d694b1b9c7c869ebb04ebe844ef5 # v2.3.0
|
uses: azure/login@a65d910e8af852a8061c627c456678983e180302 # v2.2.0
|
||||||
with:
|
with:
|
||||||
client-id: ${{ secrets.AZURE_E2E_MINI_CLIENT_ID }}
|
client-id: ${{ secrets.AZURE_E2E_MINI_CLIENT_ID }}
|
||||||
tenant-id: ${{ secrets.AZURE_TENANT_ID }}
|
tenant-id: ${{ secrets.AZURE_TENANT_ID }}
|
||||||
|
20
.github/workflows/e2e-test.yml
vendored
20
.github/workflows/e2e-test.yml
vendored
@ -16,7 +16,6 @@ on:
|
|||||||
- "azure-sev-snp"
|
- "azure-sev-snp"
|
||||||
- "azure-tdx"
|
- "azure-tdx"
|
||||||
- "aws-sev-snp"
|
- "aws-sev-snp"
|
||||||
- "stackit-qemu-vtpm"
|
|
||||||
default: "azure-sev-snp"
|
default: "azure-sev-snp"
|
||||||
required: true
|
required: true
|
||||||
runner:
|
runner:
|
||||||
@ -24,7 +23,7 @@ on:
|
|||||||
type: choice
|
type: choice
|
||||||
options:
|
options:
|
||||||
- "ubuntu-24.04"
|
- "ubuntu-24.04"
|
||||||
- "macos-latest"
|
- "macos-12"
|
||||||
default: "ubuntu-24.04"
|
default: "ubuntu-24.04"
|
||||||
test:
|
test:
|
||||||
description: "The test to run. The conformance test is only supported for clusterCreation=cli."
|
description: "The test to run. The conformance test is only supported for clusterCreation=cli."
|
||||||
@ -40,12 +39,11 @@ on:
|
|||||||
- "recover"
|
- "recover"
|
||||||
- "malicious join"
|
- "malicious join"
|
||||||
- "s3proxy"
|
- "s3proxy"
|
||||||
- "emergency ssh"
|
|
||||||
- "nop"
|
- "nop"
|
||||||
required: true
|
required: true
|
||||||
kubernetesVersion:
|
kubernetesVersion:
|
||||||
description: "Kubernetes version to create the cluster from."
|
description: "Kubernetes version to create the cluster from."
|
||||||
default: "1.30"
|
default: "1.29"
|
||||||
required: true
|
required: true
|
||||||
cliVersion:
|
cliVersion:
|
||||||
description: "Version of a released CLI to download. Leave empty to build the CLI from the checked out ref."
|
description: "Version of a released CLI to download. Leave empty to build the CLI from the checked out ref."
|
||||||
@ -139,7 +137,6 @@ jobs:
|
|||||||
workerNodes: ${{ steps.split-nodeCount.outputs.workerNodes }}
|
workerNodes: ${{ steps.split-nodeCount.outputs.workerNodes }}
|
||||||
controlPlaneNodes: ${{ steps.split-nodeCount.outputs.controlPlaneNodes }}
|
controlPlaneNodes: ${{ steps.split-nodeCount.outputs.controlPlaneNodes }}
|
||||||
cloudProvider: ${{ steps.split-attestationVariant.outputs.cloudProvider }}
|
cloudProvider: ${{ steps.split-attestationVariant.outputs.cloudProvider }}
|
||||||
attestationVariant: ${{ steps.split-attestationVariant.outputs.attestationVariant }}
|
|
||||||
steps:
|
steps:
|
||||||
- name: Split nodeCount
|
- name: Split nodeCount
|
||||||
id: split-nodeCount
|
id: split-nodeCount
|
||||||
@ -164,12 +161,6 @@ jobs:
|
|||||||
attestationVariant="${{ inputs.attestationVariant }}"
|
attestationVariant="${{ inputs.attestationVariant }}"
|
||||||
cloudProvider="${attestationVariant%%-*}"
|
cloudProvider="${attestationVariant%%-*}"
|
||||||
|
|
||||||
# special case for STACKIT, as there's no special attestation variant for it
|
|
||||||
if [[ "${cloudProvider}" == "stackit" ]]; then
|
|
||||||
attestationVariant="qemu-vtpm"
|
|
||||||
fi
|
|
||||||
|
|
||||||
echo "attestationVariant=${attestationVariant}" | tee -a "$GITHUB_OUTPUT"
|
|
||||||
echo "cloudProvider=${cloudProvider}" | tee -a "$GITHUB_OUTPUT"
|
echo "cloudProvider=${cloudProvider}" | tee -a "$GITHUB_OUTPUT"
|
||||||
|
|
||||||
find-latest-image:
|
find-latest-image:
|
||||||
@ -233,7 +224,7 @@ jobs:
|
|||||||
|
|
||||||
- name: Set up gcloud CLI (macOS)
|
- name: Set up gcloud CLI (macOS)
|
||||||
if: needs.generate-input-parameters.outputs.cloudProvider == 'gcp' && runner.os == 'macOS'
|
if: needs.generate-input-parameters.outputs.cloudProvider == 'gcp' && runner.os == 'macOS'
|
||||||
uses: google-github-actions/setup-gcloud@77e7a554d41e2ee56fc945c52dfd3f33d12def9a # v2.1.4
|
uses: google-github-actions/setup-gcloud@6189d56e4096ee891640bb02ac264be376592d6a # v2.1.2
|
||||||
|
|
||||||
- name: Run manual E2E test
|
- name: Run manual E2E test
|
||||||
id: e2e_test
|
id: e2e_test
|
||||||
@ -242,7 +233,7 @@ jobs:
|
|||||||
workerNodesCount: ${{ needs.generate-input-parameters.outputs.workerNodes }}
|
workerNodesCount: ${{ needs.generate-input-parameters.outputs.workerNodes }}
|
||||||
controlNodesCount: ${{ needs.generate-input-parameters.outputs.controlPlaneNodes }}
|
controlNodesCount: ${{ needs.generate-input-parameters.outputs.controlPlaneNodes }}
|
||||||
cloudProvider: ${{ needs.generate-input-parameters.outputs.cloudProvider }}
|
cloudProvider: ${{ needs.generate-input-parameters.outputs.cloudProvider }}
|
||||||
attestationVariant: ${{ needs.generate-input-parameters.outputs.attestationVariant }}
|
attestationVariant: ${{ inputs.attestationVariant }}
|
||||||
machineType: ${{ inputs.machineType }}
|
machineType: ${{ inputs.machineType }}
|
||||||
regionZone: ${{ inputs.regionZone }}
|
regionZone: ${{ inputs.regionZone }}
|
||||||
gcpProject: constellation-e2e
|
gcpProject: constellation-e2e
|
||||||
@ -271,9 +262,6 @@ jobs:
|
|||||||
marketplaceImageVersion: ${{ inputs.marketplaceImageVersion }}
|
marketplaceImageVersion: ${{ inputs.marketplaceImageVersion }}
|
||||||
force: ${{ inputs.force }}
|
force: ${{ inputs.force }}
|
||||||
encryptionSecret: ${{ secrets.ARTIFACT_ENCRYPT_PASSWD }}
|
encryptionSecret: ${{ secrets.ARTIFACT_ENCRYPT_PASSWD }}
|
||||||
openStackCloudsYaml: ${{ secrets.STACKIT_CI_CLOUDS_YAML }}
|
|
||||||
stackitUat: ${{ secrets.STACKIT_CI_UAT }}
|
|
||||||
stackitProjectID: ${{ secrets.STACKIT_CI_PROJECT_ID }}
|
|
||||||
|
|
||||||
- name: Always terminate cluster
|
- name: Always terminate cluster
|
||||||
if: always()
|
if: always()
|
||||||
|
10
.github/workflows/e2e-upgrade.yml
vendored
10
.github/workflows/e2e-upgrade.yml
vendored
@ -268,13 +268,13 @@ jobs:
|
|||||||
push: true
|
push: true
|
||||||
|
|
||||||
- name: Upload CLI binary # is needed for the cleanup step
|
- name: Upload CLI binary # is needed for the cleanup step
|
||||||
uses: actions/upload-artifact@ea165f8d65b6e75b540449e92b4886f43607fa02 # v4.6.2
|
uses: actions/upload-artifact@b4b15b8c7c6ac21ea08fcf65892d2ee8f75cf882 # v4.4.3
|
||||||
with:
|
with:
|
||||||
name: constellation-upgrade-${{ inputs.attestationVariant }}
|
name: constellation-upgrade-${{ inputs.attestationVariant }}
|
||||||
path: build/constellation
|
path: build/constellation
|
||||||
|
|
||||||
- name: Login to AWS
|
- name: Login to AWS
|
||||||
uses: aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1.0
|
uses: aws-actions/configure-aws-credentials@e3dd6a429d7300a6a4c196c26e071d42e0343502 # v4.0.2
|
||||||
with:
|
with:
|
||||||
role-to-assume: arn:aws:iam::795746500882:role/GithubConstellationVersionsAPIRead
|
role-to-assume: arn:aws:iam::795746500882:role/GithubConstellationVersionsAPIRead
|
||||||
aws-region: eu-central-1
|
aws-region: eu-central-1
|
||||||
@ -296,7 +296,7 @@ jobs:
|
|||||||
|
|
||||||
- name: Login to AWS (IAM role)
|
- name: Login to AWS (IAM role)
|
||||||
if: needs.generate-input-parameters.outputs.cloudProvider == 'aws'
|
if: needs.generate-input-parameters.outputs.cloudProvider == 'aws'
|
||||||
uses: aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1.0
|
uses: aws-actions/configure-aws-credentials@e3dd6a429d7300a6a4c196c26e071d42e0343502 # v4.0.2
|
||||||
with:
|
with:
|
||||||
role-to-assume: arn:aws:iam::795746500882:role/GithubActionsE2EIAM
|
role-to-assume: arn:aws:iam::795746500882:role/GithubActionsE2EIAM
|
||||||
aws-region: eu-central-1
|
aws-region: eu-central-1
|
||||||
@ -347,7 +347,7 @@ jobs:
|
|||||||
|
|
||||||
- name: Login to AWS (Cluster role)
|
- name: Login to AWS (Cluster role)
|
||||||
if: always() && needs.generate-input-parameters.outputs.cloudProvider == 'aws'
|
if: always() && needs.generate-input-parameters.outputs.cloudProvider == 'aws'
|
||||||
uses: aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1.0
|
uses: aws-actions/configure-aws-credentials@e3dd6a429d7300a6a4c196c26e071d42e0343502 # v4.0.2
|
||||||
with:
|
with:
|
||||||
role-to-assume: arn:aws:iam::795746500882:role/GithubActionsE2ECluster
|
role-to-assume: arn:aws:iam::795746500882:role/GithubActionsE2ECluster
|
||||||
aws-region: eu-central-1
|
aws-region: eu-central-1
|
||||||
@ -424,7 +424,7 @@ jobs:
|
|||||||
ref: ${{ inputs.gitRef }}
|
ref: ${{ inputs.gitRef }}
|
||||||
|
|
||||||
- name: Download CLI
|
- name: Download CLI
|
||||||
uses: actions/download-artifact@95815c38cf2ff2164869cbab79da8d1f422bc89e # v4.2.1
|
uses: actions/download-artifact@fa0a91b85d4f404e444e00e005971372dc801d16 # v4.1.8
|
||||||
with:
|
with:
|
||||||
name: constellation-upgrade-${{ inputs.attestationVariant }}
|
name: constellation-upgrade-${{ inputs.attestationVariant }}
|
||||||
path: build
|
path: build
|
||||||
|
6
.github/workflows/e2e-windows.yml
vendored
6
.github/workflows/e2e-windows.yml
vendored
@ -45,14 +45,14 @@ jobs:
|
|||||||
push: true
|
push: true
|
||||||
|
|
||||||
- name: Upload CLI artifact
|
- name: Upload CLI artifact
|
||||||
uses: actions/upload-artifact@ea165f8d65b6e75b540449e92b4886f43607fa02 # v4.6.2
|
uses: actions/upload-artifact@b4b15b8c7c6ac21ea08fcf65892d2ee8f75cf882 # v4.4.3
|
||||||
with:
|
with:
|
||||||
path: build/constellation.exe
|
path: build/constellation.exe
|
||||||
name: "constell-exe"
|
name: "constell-exe"
|
||||||
|
|
||||||
e2e-test:
|
e2e-test:
|
||||||
name: E2E Test Windows
|
name: E2E Test Windows
|
||||||
runs-on: windows-2025
|
runs-on: windows-2022
|
||||||
needs: build-cli
|
needs: build-cli
|
||||||
steps:
|
steps:
|
||||||
- name: Checkout
|
- name: Checkout
|
||||||
@ -61,7 +61,7 @@ jobs:
|
|||||||
ref: ${{ !github.event.pull_request.head.repo.fork && github.head_ref || '' }}
|
ref: ${{ !github.event.pull_request.head.repo.fork && github.head_ref || '' }}
|
||||||
|
|
||||||
- name: Download CLI artifact
|
- name: Download CLI artifact
|
||||||
uses: actions/download-artifact@95815c38cf2ff2164869cbab79da8d1f422bc89e # v4.2.1
|
uses: actions/download-artifact@fa0a91b85d4f404e444e00e005971372dc801d16 # v4.1.8
|
||||||
with:
|
with:
|
||||||
name: "constell-exe"
|
name: "constell-exe"
|
||||||
|
|
||||||
|
2
.github/workflows/on-release.yml
vendored
2
.github/workflows/on-release.yml
vendored
@ -142,7 +142,7 @@ jobs:
|
|||||||
- uses: ./.github/actions/setup_bazel_nix
|
- uses: ./.github/actions/setup_bazel_nix
|
||||||
|
|
||||||
- name: Login to AWS
|
- name: Login to AWS
|
||||||
uses: aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1.0
|
uses: aws-actions/configure-aws-credentials@e3dd6a429d7300a6a4c196c26e071d42e0343502 # v4.0.2
|
||||||
with:
|
with:
|
||||||
role-to-assume: arn:aws:iam::795746500882:role/GitHubConstellationImagePipeline
|
role-to-assume: arn:aws:iam::795746500882:role/GitHubConstellationImagePipeline
|
||||||
aws-region: eu-central-1
|
aws-region: eu-central-1
|
||||||
|
2
.github/workflows/purge-main.yml
vendored
2
.github/workflows/purge-main.yml
vendored
@ -23,7 +23,7 @@ jobs:
|
|||||||
ref: ${{ github.head_ref }}
|
ref: ${{ github.head_ref }}
|
||||||
|
|
||||||
- name: Login to AWS
|
- name: Login to AWS
|
||||||
uses: aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1.0
|
uses: aws-actions/configure-aws-credentials@e3dd6a429d7300a6a4c196c26e071d42e0343502 # v4.0.2
|
||||||
with:
|
with:
|
||||||
role-to-assume: arn:aws:iam::795746500882:role/GithubConstellationVersionsAPIRead
|
role-to-assume: arn:aws:iam::795746500882:role/GithubConstellationVersionsAPIRead
|
||||||
aws-region: eu-central-1
|
aws-region: eu-central-1
|
||||||
|
17
.github/workflows/release.yml
vendored
17
.github/workflows/release.yml
vendored
@ -118,7 +118,7 @@ jobs:
|
|||||||
sed -i 's/fromVersion: \["[^"]*"\]/fromVersion: ["${{ inputs.version }}"]/g' .github/workflows/e2e-test-weekly.yml
|
sed -i 's/fromVersion: \["[^"]*"\]/fromVersion: ["${{ inputs.version }}"]/g' .github/workflows/e2e-test-weekly.yml
|
||||||
|
|
||||||
- name: Create docs pull request
|
- name: Create docs pull request
|
||||||
uses: peter-evans/create-pull-request@271a8d0340265f705b14b6d32b9829c1cb33d45e # v7.0.8
|
uses: peter-evans/create-pull-request@5e914681df9dc83aa4e4905692ca88beb2f9e91f # v7.0.5
|
||||||
with:
|
with:
|
||||||
branch: ${{ env.BRANCH }}
|
branch: ${{ env.BRANCH }}
|
||||||
base: main
|
base: main
|
||||||
@ -239,17 +239,6 @@ jobs:
|
|||||||
stream: "stable"
|
stream: "stable"
|
||||||
ref: ${{ needs.verify-inputs.outputs.WORKING_BRANCH }}
|
ref: ${{ needs.verify-inputs.outputs.WORKING_BRANCH }}
|
||||||
|
|
||||||
check-measurements-reproducibility:
|
|
||||||
name: Check measurements reproducibility
|
|
||||||
needs: [verify-inputs, os-image]
|
|
||||||
runs-on: ubuntu-24.04
|
|
||||||
steps:
|
|
||||||
- name: Check reproducibility
|
|
||||||
uses: ./.github/actions/check_measurements_reproducibility
|
|
||||||
with:
|
|
||||||
version: ${{ inputs.version }}
|
|
||||||
ref: ${{ needs.verify-inputs.outputs.WORKING_BRANCH }}
|
|
||||||
|
|
||||||
update-hardcoded-measurements:
|
update-hardcoded-measurements:
|
||||||
name: Update hardcoded measurements (in the CLI)
|
name: Update hardcoded measurements (in the CLI)
|
||||||
needs: [verify-inputs, os-image]
|
needs: [verify-inputs, os-image]
|
||||||
@ -266,9 +255,9 @@ jobs:
|
|||||||
ref: ${{ needs.verify-inputs.outputs.WORKING_BRANCH }}
|
ref: ${{ needs.verify-inputs.outputs.WORKING_BRANCH }}
|
||||||
|
|
||||||
- name: Setup Go environment
|
- name: Setup Go environment
|
||||||
uses: actions/setup-go@0aaccfd150d50ccaeb58ebd88d36e91967a5f35b # v5.4.0
|
uses: actions/setup-go@41dfa10bad2bb2ae585af6ee5bb4d7d973ad74ed # v5.1.0
|
||||||
with:
|
with:
|
||||||
go-version: "1.24.2"
|
go-version: "1.23.2"
|
||||||
cache: true
|
cache: true
|
||||||
|
|
||||||
- name: Build generateMeasurements tool
|
- name: Build generateMeasurements tool
|
||||||
|
24
.github/workflows/reproducible-builds.yml
vendored
24
.github/workflows/reproducible-builds.yml
vendored
@ -13,9 +13,6 @@ on:
|
|||||||
workflow_dispatch:
|
workflow_dispatch:
|
||||||
schedule:
|
schedule:
|
||||||
- cron: "45 06 * * 1" # Every Monday at 6:45am
|
- cron: "45 06 * * 1" # Every Monday at 6:45am
|
||||||
pull_request:
|
|
||||||
paths:
|
|
||||||
- .github/workflows/reproducible-builds.yml
|
|
||||||
|
|
||||||
jobs:
|
jobs:
|
||||||
build-binaries:
|
build-binaries:
|
||||||
@ -51,16 +48,15 @@ jobs:
|
|||||||
- name: Setup dependencies (eccentric)
|
- name: Setup dependencies (eccentric)
|
||||||
if: matrix.deps == 'eccentric'
|
if: matrix.deps == 'eccentric'
|
||||||
run: |
|
run: |
|
||||||
bazelVersion=$(cat .bazelversion)
|
version=$(cat .bazelversion)
|
||||||
mkdir -p "$HOME/.local/bin"
|
mkdir -p "$HOME/.local/bin"
|
||||||
curl -fsSL -o "$HOME/.local/bin/bazel" "https://github.com/bazelbuild/bazel/releases/download/$bazelVersion/bazel-$bazelVersion-linux-x86_64"
|
curl -fsSL -o "$HOME/.local/bin/bazel" "https://github.com/bazelbuild/bazel/releases/download/$version/bazel-$version-linux-x86_64"
|
||||||
chmod a+x "$HOME/.local/bin/bazel"
|
chmod a+x "$HOME/.local/bin/bazel"
|
||||||
echo "$HOME/.local/bin" >> "$GITHUB_PATH"
|
echo "$HOME/.local/bin" >> "$GITHUB_PATH"
|
||||||
|
|
||||||
curl -fsSL -o "$HOME/.local/bin/nix-installer" https://github.com/DeterminateSystems/nix-installer/releases/download/v3.2.1/nix-installer-x86_64-linux # renovate:github-release
|
curl -fsSL -o "$HOME/.local/bin/nix-installer" https://github.com/DeterminateSystems/nix-installer/releases/download/v0.26.3/nix-installer-x86_64-linux # renovate:github-release
|
||||||
nixVersion=$(cat .nixversion)
|
|
||||||
chmod a+x "$HOME/.local/bin/nix-installer"
|
chmod a+x "$HOME/.local/bin/nix-installer"
|
||||||
"$HOME/.local/bin/nix-installer" install --no-confirm --nix-package-url "https://releases.nixos.org/nix/nix-$nixVersion/nix-$nixVersion-x86_64-linux.tar.xz"
|
"$HOME/.local/bin/nix-installer" install --no-confirm
|
||||||
|
|
||||||
- name: Build
|
- name: Build
|
||||||
shell: bash
|
shell: bash
|
||||||
@ -81,13 +77,13 @@ jobs:
|
|||||||
run: shasum -a 256 "${binary}" | tee "${binary}.sha256"
|
run: shasum -a 256 "${binary}" | tee "${binary}.sha256"
|
||||||
|
|
||||||
- name: Upload binary artifact
|
- name: Upload binary artifact
|
||||||
uses: actions/upload-artifact@ea165f8d65b6e75b540449e92b4886f43607fa02 # v4.6.2
|
uses: actions/upload-artifact@b4b15b8c7c6ac21ea08fcf65892d2ee8f75cf882 # v4.4.3
|
||||||
with:
|
with:
|
||||||
name: "binaries-${{ matrix.target }}-${{ matrix.runner }}-${{ matrix.deps }}"
|
name: "binaries-${{ matrix.target }}-${{ matrix.runner }}-${{ matrix.deps }}"
|
||||||
path: "${{ env.binary }}"
|
path: "${{ env.binary }}"
|
||||||
|
|
||||||
- name: Upload hash artifact
|
- name: Upload hash artifact
|
||||||
uses: actions/upload-artifact@ea165f8d65b6e75b540449e92b4886f43607fa02 # v4.6.2
|
uses: actions/upload-artifact@b4b15b8c7c6ac21ea08fcf65892d2ee8f75cf882 # v4.4.3
|
||||||
with:
|
with:
|
||||||
name: "sha256sums-${{ matrix.target }}-${{ matrix.runner }}-${{ matrix.deps }}"
|
name: "sha256sums-${{ matrix.target }}-${{ matrix.runner }}-${{ matrix.deps }}"
|
||||||
path: "${{ env.binary }}.sha256"
|
path: "${{ env.binary }}.sha256"
|
||||||
@ -146,13 +142,13 @@ jobs:
|
|||||||
run: shasum -a 256 "${binary}" | tee "${binary}.sha256"
|
run: shasum -a 256 "${binary}" | tee "${binary}.sha256"
|
||||||
|
|
||||||
- name: Upload binary artifact
|
- name: Upload binary artifact
|
||||||
uses: actions/upload-artifact@ea165f8d65b6e75b540449e92b4886f43607fa02 # v4.6.2
|
uses: actions/upload-artifact@b4b15b8c7c6ac21ea08fcf65892d2ee8f75cf882 # v4.4.3
|
||||||
with:
|
with:
|
||||||
name: "osimages-${{ matrix.target }}-${{ matrix.runner }}"
|
name: "osimages-${{ matrix.target }}-${{ matrix.runner }}"
|
||||||
path: "${{ env.binary }}"
|
path: "${{ env.binary }}"
|
||||||
|
|
||||||
- name: Upload hash artifact
|
- name: Upload hash artifact
|
||||||
uses: actions/upload-artifact@ea165f8d65b6e75b540449e92b4886f43607fa02 # v4.6.2
|
uses: actions/upload-artifact@b4b15b8c7c6ac21ea08fcf65892d2ee8f75cf882 # v4.4.3
|
||||||
with:
|
with:
|
||||||
name: "sha256sums-${{ matrix.target }}-${{ matrix.runner }}"
|
name: "sha256sums-${{ matrix.target }}-${{ matrix.runner }}"
|
||||||
path: "${{ env.binary }}.sha256"
|
path: "${{ env.binary }}.sha256"
|
||||||
@ -175,7 +171,7 @@ jobs:
|
|||||||
ref: ${{ !github.event.pull_request.head.repo.fork && github.head_ref || '' }}
|
ref: ${{ !github.event.pull_request.head.repo.fork && github.head_ref || '' }}
|
||||||
|
|
||||||
- name: Download binaries
|
- name: Download binaries
|
||||||
uses: actions/download-artifact@95815c38cf2ff2164869cbab79da8d1f422bc89e # v4.2.1
|
uses: actions/download-artifact@fa0a91b85d4f404e444e00e005971372dc801d16 # v4.1.8
|
||||||
with:
|
with:
|
||||||
pattern: "binaries-${{ matrix.target }}-*"
|
pattern: "binaries-${{ matrix.target }}-*"
|
||||||
merge-multiple: true
|
merge-multiple: true
|
||||||
@ -209,7 +205,7 @@ jobs:
|
|||||||
ref: ${{ !github.event.pull_request.head.repo.fork && github.head_ref || '' }}
|
ref: ${{ !github.event.pull_request.head.repo.fork && github.head_ref || '' }}
|
||||||
|
|
||||||
- name: Download os images
|
- name: Download os images
|
||||||
uses: actions/download-artifact@95815c38cf2ff2164869cbab79da8d1f422bc89e # v4.2.1
|
uses: actions/download-artifact@fa0a91b85d4f404e444e00e005971372dc801d16 # v4.1.8
|
||||||
with:
|
with:
|
||||||
pattern: "osimages-${{ matrix.target }}-*"
|
pattern: "osimages-${{ matrix.target }}-*"
|
||||||
merge-multiple: true
|
merge-multiple: true
|
||||||
|
6
.github/workflows/scorecard.yml
vendored
6
.github/workflows/scorecard.yml
vendored
@ -23,20 +23,20 @@ jobs:
|
|||||||
persist-credentials: false
|
persist-credentials: false
|
||||||
|
|
||||||
- name: Run analysis
|
- name: Run analysis
|
||||||
uses: ossf/scorecard-action@f49aabe0b5af0936a0987cfb85d86b75731b0186 # v2.4.1
|
uses: ossf/scorecard-action@62b2cac7ed8198b15735ed49ab1e5cf35480ba46 # v2.4.0
|
||||||
with:
|
with:
|
||||||
results_file: results.sarif
|
results_file: results.sarif
|
||||||
results_format: sarif
|
results_format: sarif
|
||||||
publish_results: true
|
publish_results: true
|
||||||
|
|
||||||
- name: Upload artifact
|
- name: Upload artifact
|
||||||
uses: actions/upload-artifact@ea165f8d65b6e75b540449e92b4886f43607fa02 # v4.6.2
|
uses: actions/upload-artifact@b4b15b8c7c6ac21ea08fcf65892d2ee8f75cf882 # v4.4.3
|
||||||
with:
|
with:
|
||||||
name: SARIF file
|
name: SARIF file
|
||||||
path: results.sarif
|
path: results.sarif
|
||||||
retention-days: 5
|
retention-days: 5
|
||||||
|
|
||||||
- name: Upload to code-scanning
|
- name: Upload to code-scanning
|
||||||
uses: github/codeql-action/upload-sarif@45775bd8235c68ba998cffa5171334d58593da47 # v3.28.15
|
uses: github/codeql-action/upload-sarif@f09c1c0a94de965c15400f5634aa42fac8fb8f88 # v3.27.5
|
||||||
with:
|
with:
|
||||||
sarif_file: results.sarif
|
sarif_file: results.sarif
|
||||||
|
2
.github/workflows/sync-terraform-docs.yml
vendored
2
.github/workflows/sync-terraform-docs.yml
vendored
@ -40,7 +40,7 @@ jobs:
|
|||||||
|
|
||||||
- name: Create pull request
|
- name: Create pull request
|
||||||
id: create-pull-request
|
id: create-pull-request
|
||||||
uses: peter-evans/create-pull-request@271a8d0340265f705b14b6d32b9829c1cb33d45e # v7.0.8
|
uses: peter-evans/create-pull-request@5e914681df9dc83aa4e4905692ca88beb2f9e91f # v7.0.5
|
||||||
with:
|
with:
|
||||||
path: terraform-provider-constellation
|
path: terraform-provider-constellation
|
||||||
branch: "feat/docs/update"
|
branch: "feat/docs/update"
|
||||||
|
4
.github/workflows/test-operator-codegen.yml
vendored
4
.github/workflows/test-operator-codegen.yml
vendored
@ -26,9 +26,9 @@ jobs:
|
|||||||
ref: ${{ !github.event.pull_request.head.repo.fork && github.head_ref || '' }}
|
ref: ${{ !github.event.pull_request.head.repo.fork && github.head_ref || '' }}
|
||||||
|
|
||||||
- name: Setup Go environment
|
- name: Setup Go environment
|
||||||
uses: actions/setup-go@0aaccfd150d50ccaeb58ebd88d36e91967a5f35b # v5.4.0
|
uses: actions/setup-go@41dfa10bad2bb2ae585af6ee5bb4d7d973ad74ed # v5.1.0
|
||||||
with:
|
with:
|
||||||
go-version: "1.24.2"
|
go-version: "1.23.2"
|
||||||
cache: true
|
cache: true
|
||||||
|
|
||||||
- name: Run code generation
|
- name: Run code generation
|
||||||
|
2
.github/workflows/test-tidy.yml
vendored
2
.github/workflows/test-tidy.yml
vendored
@ -37,7 +37,7 @@ jobs:
|
|||||||
|
|
||||||
- name: Assume AWS role to upload Bazel dependencies to S3
|
- name: Assume AWS role to upload Bazel dependencies to S3
|
||||||
if: startsWith(github.head_ref, 'renovate/')
|
if: startsWith(github.head_ref, 'renovate/')
|
||||||
uses: aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1.0
|
uses: aws-actions/configure-aws-credentials@e3dd6a429d7300a6a4c196c26e071d42e0343502 # v4.0.2
|
||||||
with:
|
with:
|
||||||
role-to-assume: arn:aws:iam::795746500882:role/GithubConstellationMirrorWrite
|
role-to-assume: arn:aws:iam::795746500882:role/GithubConstellationMirrorWrite
|
||||||
aws-region: eu-central-1
|
aws-region: eu-central-1
|
||||||
|
4
.github/workflows/test-unittest.yml
vendored
4
.github/workflows/test-unittest.yml
vendored
@ -49,7 +49,7 @@ jobs:
|
|||||||
rm -rf awscliv2.zip aws
|
rm -rf awscliv2.zip aws
|
||||||
|
|
||||||
- name: Login to AWS (IAM role)
|
- name: Login to AWS (IAM role)
|
||||||
uses: aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1.0
|
uses: aws-actions/configure-aws-credentials@e3dd6a429d7300a6a4c196c26e071d42e0343502 # v4.0.2
|
||||||
with:
|
with:
|
||||||
role-to-assume: arn:aws:iam::795746500882:role/GithubActionGocoverage
|
role-to-assume: arn:aws:iam::795746500882:role/GithubActionGocoverage
|
||||||
aws-region: eu-central-1
|
aws-region: eu-central-1
|
||||||
@ -69,7 +69,7 @@ jobs:
|
|||||||
|
|
||||||
- name: Comment coverage
|
- name: Comment coverage
|
||||||
if: steps.coverage.outputs.uploadable == 'true' && github.event_name == 'pull_request'
|
if: steps.coverage.outputs.uploadable == 'true' && github.event_name == 'pull_request'
|
||||||
uses: marocchino/sticky-pull-request-comment@67d0dec7b07ed060a405f9b2a64b8ab319fdd7db # v2.9.2
|
uses: marocchino/sticky-pull-request-comment@331f8f5b4215f0445d3c07b4967662a32a2d3e31 # v2.9.0
|
||||||
with:
|
with:
|
||||||
header: coverage
|
header: coverage
|
||||||
path: coverage_diff.md
|
path: coverage_diff.md
|
||||||
|
4
.github/workflows/update-rpms.yml
vendored
4
.github/workflows/update-rpms.yml
vendored
@ -18,7 +18,7 @@ jobs:
|
|||||||
token: ${{ secrets.CI_COMMIT_PUSH_PR }}
|
token: ${{ secrets.CI_COMMIT_PUSH_PR }}
|
||||||
|
|
||||||
- name: Assume AWS role to upload Bazel dependencies to S3
|
- name: Assume AWS role to upload Bazel dependencies to S3
|
||||||
uses: aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1.0
|
uses: aws-actions/configure-aws-credentials@e3dd6a429d7300a6a4c196c26e071d42e0343502 # v4.0.2
|
||||||
with:
|
with:
|
||||||
role-to-assume: arn:aws:iam::795746500882:role/GithubConstellationMirrorWrite
|
role-to-assume: arn:aws:iam::795746500882:role/GithubConstellationMirrorWrite
|
||||||
aws-region: eu-central-1
|
aws-region: eu-central-1
|
||||||
@ -39,7 +39,7 @@ jobs:
|
|||||||
fi
|
fi
|
||||||
|
|
||||||
- name: Create pull request
|
- name: Create pull request
|
||||||
uses: peter-evans/create-pull-request@271a8d0340265f705b14b6d32b9829c1cb33d45e # v7.0.8
|
uses: peter-evans/create-pull-request@5e914681df9dc83aa4e4905692ca88beb2f9e91f # v7.0.5
|
||||||
with:
|
with:
|
||||||
branch: "image/automated/update-rpms-${{ github.run_number }}"
|
branch: "image/automated/update-rpms-${{ github.run_number }}"
|
||||||
base: main
|
base: main
|
||||||
|
6
.github/workflows/versionsapi.yml
vendored
6
.github/workflows/versionsapi.yml
vendored
@ -149,21 +149,21 @@ jobs:
|
|||||||
|
|
||||||
- name: Login to AWS without write access
|
- name: Login to AWS without write access
|
||||||
if: steps.check-rights.outputs.write == 'false'
|
if: steps.check-rights.outputs.write == 'false'
|
||||||
uses: aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1.0
|
uses: aws-actions/configure-aws-credentials@e3dd6a429d7300a6a4c196c26e071d42e0343502 # v4.0.2
|
||||||
with:
|
with:
|
||||||
role-to-assume: arn:aws:iam::795746500882:role/GithubConstellationVersionsAPIRead
|
role-to-assume: arn:aws:iam::795746500882:role/GithubConstellationVersionsAPIRead
|
||||||
aws-region: eu-central-1
|
aws-region: eu-central-1
|
||||||
|
|
||||||
- name: Login to AWS with write access
|
- name: Login to AWS with write access
|
||||||
if: steps.check-rights.outputs.write == 'true' && steps.check-rights.outputs.auth == 'false'
|
if: steps.check-rights.outputs.write == 'true' && steps.check-rights.outputs.auth == 'false'
|
||||||
uses: aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1.0
|
uses: aws-actions/configure-aws-credentials@e3dd6a429d7300a6a4c196c26e071d42e0343502 # v4.0.2
|
||||||
with:
|
with:
|
||||||
role-to-assume: arn:aws:iam::795746500882:role/GithubConstellationVersionsAPIWrite
|
role-to-assume: arn:aws:iam::795746500882:role/GithubConstellationVersionsAPIWrite
|
||||||
aws-region: eu-central-1
|
aws-region: eu-central-1
|
||||||
|
|
||||||
- name: Login to AWS with write and image remove access
|
- name: Login to AWS with write and image remove access
|
||||||
if: steps.check-rights.outputs.write == 'true' && steps.check-rights.outputs.auth == 'true'
|
if: steps.check-rights.outputs.write == 'true' && steps.check-rights.outputs.auth == 'true'
|
||||||
uses: aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1.0
|
uses: aws-actions/configure-aws-credentials@e3dd6a429d7300a6a4c196c26e071d42e0343502 # v4.0.2
|
||||||
with:
|
with:
|
||||||
role-to-assume: arn:aws:iam::795746500882:role/GithubConstellationVersionsAPIRemove
|
role-to-assume: arn:aws:iam::795746500882:role/GithubConstellationVersionsAPIRemove
|
||||||
aws-region: eu-central-1
|
aws-region: eu-central-1
|
||||||
|
@ -1,65 +1,53 @@
|
|||||||
version: "2"
|
|
||||||
run:
|
run:
|
||||||
|
timeout: 10m
|
||||||
build-tags:
|
build-tags:
|
||||||
- integration
|
- integration
|
||||||
- e2e
|
- e2e
|
||||||
modules-download-mode: readonly
|
modules-download-mode: readonly
|
||||||
|
|
||||||
output:
|
output:
|
||||||
formats:
|
formats:
|
||||||
tab:
|
- format: tab
|
||||||
path: stdout
|
path: stdout
|
||||||
colors: false
|
sort-results: true
|
||||||
|
|
||||||
linters:
|
linters:
|
||||||
enable:
|
enable:
|
||||||
|
# Default linters
|
||||||
|
- errcheck
|
||||||
|
- gosimple
|
||||||
|
- govet
|
||||||
|
- ineffassign
|
||||||
|
- staticcheck
|
||||||
|
- typecheck
|
||||||
|
- unused
|
||||||
|
# Additional linters
|
||||||
- bodyclose
|
- bodyclose
|
||||||
- copyloopvar
|
|
||||||
- errname
|
- errname
|
||||||
|
- copyloopvar
|
||||||
- godot
|
- godot
|
||||||
|
- gofmt
|
||||||
|
- gofumpt
|
||||||
- misspell
|
- misspell
|
||||||
- noctx
|
- noctx
|
||||||
- revive
|
- revive
|
||||||
|
- tenv
|
||||||
- unconvert
|
- unconvert
|
||||||
- unparam
|
- unparam
|
||||||
- usetesting
|
|
||||||
settings:
|
|
||||||
errcheck:
|
|
||||||
exclude-functions:
|
|
||||||
- (*go.uber.org/zap.Logger).Sync
|
|
||||||
- (*google.golang.org/grpc.Server).Serve
|
|
||||||
exclusions:
|
|
||||||
generated: lax
|
|
||||||
presets:
|
|
||||||
- common-false-positives
|
|
||||||
- legacy
|
|
||||||
- std-error-handling
|
|
||||||
paths:
|
|
||||||
- 3rdparty/node-maintenance-operator
|
|
||||||
rules:
|
|
||||||
# TODO(burgerdev): these exclusions have been added to ease migration to v2 and should eventually be addressed.
|
|
||||||
- linters: ["staticcheck"]
|
|
||||||
text: "QF1008: could remove embedded field"
|
|
||||||
- linters: ["staticcheck"]
|
|
||||||
text: "QF1001: could apply De Morgan's law"
|
|
||||||
- linters: ["staticcheck"]
|
|
||||||
text: "ST1005: error strings should not be capitalized"
|
|
||||||
- linters: ["revive"]
|
|
||||||
text: "package-comments: package comment should be of the form"
|
|
||||||
- linters: ["revive"]
|
|
||||||
text: "package-comments: should have a package comment"
|
|
||||||
- linters: ["staticcheck"]
|
|
||||||
text: "QF1012: Use fmt.Fprintf"
|
|
||||||
- linters: ["staticcheck"]
|
|
||||||
text: "ST1019"
|
|
||||||
|
|
||||||
|
|
||||||
issues:
|
issues:
|
||||||
max-issues-per-linter: 0
|
max-issues-per-linter: 0
|
||||||
max-same-issues: 20
|
max-same-issues: 20
|
||||||
formatters:
|
exclude-dirs:
|
||||||
enable:
|
- 3rdparty/node-maintenance-operator
|
||||||
- gofmt
|
include:
|
||||||
- gofumpt
|
- EXC0012
|
||||||
exclusions:
|
- EXC0014
|
||||||
generated: lax
|
|
||||||
paths:
|
linters-settings:
|
||||||
- 3rdparty/node-maintenance-operator
|
errcheck:
|
||||||
|
# List of functions to exclude from checking, where each entry is a single function to exclude.
|
||||||
|
# See https://github.com/kisielk/errcheck#excluding-functions for details.
|
||||||
|
exclude-functions:
|
||||||
|
- (*go.uber.org/zap.Logger).Sync
|
||||||
|
- (*google.golang.org/grpc.Server).Serve
|
||||||
|
@ -1 +0,0 @@
|
|||||||
2.25.2
|
|
@ -1,13 +0,0 @@
|
|||||||
load("//bazel/sh:def.bzl", "sh_template")
|
|
||||||
|
|
||||||
sh_template(
|
|
||||||
name = "pull_files",
|
|
||||||
data = [
|
|
||||||
"@com_github_kubernetes_sigs_aws_load_balancer_controller//:lb_policy",
|
|
||||||
],
|
|
||||||
substitutions = {
|
|
||||||
"@@POLICY_SRC@@": "$(rootpath @com_github_kubernetes_sigs_aws_load_balancer_controller//:lb_policy)",
|
|
||||||
},
|
|
||||||
template = "pull_files.sh",
|
|
||||||
visibility = ["//visibility:public"],
|
|
||||||
)
|
|
@ -1,24 +0,0 @@
|
|||||||
#!/usr/bin/env bash
|
|
||||||
|
|
||||||
###### script header ######
|
|
||||||
|
|
||||||
lib=$(realpath @@BASE_LIB@@) || exit 1
|
|
||||||
stat "${lib}" >> /dev/null || exit 1
|
|
||||||
|
|
||||||
# shellcheck source=../../../bazel/sh/lib.bash
|
|
||||||
if ! source "${lib}"; then
|
|
||||||
echo "Error: could not find import"
|
|
||||||
exit 1
|
|
||||||
fi
|
|
||||||
|
|
||||||
controller_policy_source="@@POLICY_SRC@@"
|
|
||||||
|
|
||||||
###### script body ######
|
|
||||||
|
|
||||||
controller_policy_real_source=$(realpath "${controller_policy_source}")
|
|
||||||
|
|
||||||
cd "${BUILD_WORKSPACE_DIRECTORY}" # needs to be done after realpath
|
|
||||||
|
|
||||||
targetDir="terraform/infrastructure/iam/aws/alb_policy.json"
|
|
||||||
|
|
||||||
cp "${controller_policy_real_source}" "${targetDir}"
|
|
@ -1,22 +0,0 @@
|
|||||||
"""A module defining the source of the AWS load balancer controller."""
|
|
||||||
|
|
||||||
load("@bazel_tools//tools/build_defs/repo:http.bzl", "http_archive")
|
|
||||||
|
|
||||||
def aws_load_balancer_controller_deps():
|
|
||||||
http_archive(
|
|
||||||
name = "com_github_kubernetes_sigs_aws_load_balancer_controller",
|
|
||||||
urls = [
|
|
||||||
"https://cdn.confidential.cloud/constellation/cas/sha256/422af7c03ebc73e1be6aea563475ec9ea6396071fa03158b9a3984aa621b8cb1",
|
|
||||||
"https://github.com/kubernetes-sigs/aws-load-balancer-controller/archive/refs/tags/v2.12.0.tar.gz",
|
|
||||||
],
|
|
||||||
strip_prefix = "aws-load-balancer-controller-2.12.0",
|
|
||||||
build_file_content = """
|
|
||||||
filegroup(
|
|
||||||
srcs = ["docs/install/iam_policy.json"],
|
|
||||||
name = "lb_policy",
|
|
||||||
visibility = ["//visibility:public"],
|
|
||||||
)
|
|
||||||
""",
|
|
||||||
type = "tar.gz",
|
|
||||||
sha256 = "422af7c03ebc73e1be6aea563475ec9ea6396071fa03158b9a3984aa621b8cb1",
|
|
||||||
)
|
|
4
3rdparty/gcp-guest-agent/Dockerfile
vendored
4
3rdparty/gcp-guest-agent/Dockerfile
vendored
@ -1,4 +1,4 @@
|
|||||||
FROM ubuntu:24.04@sha256:1e622c5f073b4f6bfad6632f2616c7f59ef256e96fe78bf6a595d1dc4376ac02 as build
|
FROM ubuntu:22.04@sha256:0e5e4a57c2499249aafc3b40fcd541e9a456aab7296681a3994d631587203f97 as build
|
||||||
|
|
||||||
# Install packages
|
# Install packages
|
||||||
RUN apt-get update && apt-get install -y \
|
RUN apt-get update && apt-get install -y \
|
||||||
@ -6,7 +6,7 @@ RUN apt-get update && apt-get install -y \
|
|||||||
git
|
git
|
||||||
|
|
||||||
# Install Go
|
# Install Go
|
||||||
ARG GO_VER=1.24.2
|
ARG GO_VER=1.22.3
|
||||||
RUN wget -q https://go.dev/dl/go${GO_VER}.linux-amd64.tar.gz && \
|
RUN wget -q https://go.dev/dl/go${GO_VER}.linux-amd64.tar.gz && \
|
||||||
tar -C /usr/local -xzf go${GO_VER}.linux-amd64.tar.gz && \
|
tar -C /usr/local -xzf go${GO_VER}.linux-amd64.tar.gz && \
|
||||||
rm go${GO_VER}.linux-amd64.tar.gz
|
rm go${GO_VER}.linux-amd64.tar.gz
|
||||||
|
20
MODULE.bazel
20
MODULE.bazel
@ -1,6 +1,6 @@
|
|||||||
module(name = "constellation")
|
module(name = "constellation")
|
||||||
|
|
||||||
bazel_dep(name = "aspect_bazel_lib", version = "2.14.0")
|
bazel_dep(name = "aspect_bazel_lib", version = "2.9.4")
|
||||||
|
|
||||||
bazel_lib = use_extension("@aspect_bazel_lib//lib:extensions.bzl", "toolchains")
|
bazel_lib = use_extension("@aspect_bazel_lib//lib:extensions.bzl", "toolchains")
|
||||||
bazel_lib.yq()
|
bazel_lib.yq()
|
||||||
@ -8,21 +8,21 @@ use_repo(bazel_lib, "jq_toolchains")
|
|||||||
use_repo(bazel_lib, "yq_toolchains")
|
use_repo(bazel_lib, "yq_toolchains")
|
||||||
|
|
||||||
bazel_dep(name = "bazel_skylib", version = "1.7.1")
|
bazel_dep(name = "bazel_skylib", version = "1.7.1")
|
||||||
bazel_dep(name = "gazelle", version = "0.42.0")
|
bazel_dep(name = "gazelle", version = "0.39.1")
|
||||||
bazel_dep(name = "hermetic_cc_toolchain", version = "3.2.0")
|
bazel_dep(name = "hermetic_cc_toolchain", version = "3.1.1")
|
||||||
bazel_dep(name = "rules_cc", version = "0.1.1")
|
bazel_dep(name = "rules_cc", version = "0.1.0")
|
||||||
bazel_dep(name = "rules_go", version = "0.53.0", repo_name = "io_bazel_rules_go")
|
bazel_dep(name = "rules_go", version = "0.50.1", repo_name = "io_bazel_rules_go")
|
||||||
bazel_dep(name = "rules_pkg", version = "1.1.0")
|
bazel_dep(name = "rules_pkg", version = "0.10.1")
|
||||||
bazel_dep(name = "rules_proto", version = "7.1.0")
|
bazel_dep(name = "rules_proto", version = "6.0.2")
|
||||||
bazel_dep(name = "rules_python", version = "1.3.0")
|
bazel_dep(name = "rules_python", version = "0.40.0")
|
||||||
|
|
||||||
bazel_dep(name = "buildifier_prebuilt", version = "8.0.1", dev_dependency = True)
|
bazel_dep(name = "buildifier_prebuilt", version = "6.4.0", dev_dependency = True)
|
||||||
|
|
||||||
go_sdk = use_extension("@io_bazel_rules_go//go:extensions.bzl", "go_sdk")
|
go_sdk = use_extension("@io_bazel_rules_go//go:extensions.bzl", "go_sdk")
|
||||||
go_sdk.download(
|
go_sdk.download(
|
||||||
name = "go_sdk",
|
name = "go_sdk",
|
||||||
patches = ["//3rdparty/bazel/org_golang:go_tls_max_handshake_size.patch"],
|
patches = ["//3rdparty/bazel/org_golang:go_tls_max_handshake_size.patch"],
|
||||||
version = "1.24.2",
|
version = "1.23.2",
|
||||||
)
|
)
|
||||||
|
|
||||||
python = use_extension("@rules_python//python/extensions:python.bzl", "python")
|
python = use_extension("@rules_python//python/extensions:python.bzl", "python")
|
||||||
|
4525
MODULE.bazel.lock
generated
4525
MODULE.bazel.lock
generated
File diff suppressed because it is too large
Load Diff
@ -234,10 +234,6 @@ load("//3rdparty/bazel/com_github_medik8s_node_maintainance_operator:source.bzl"
|
|||||||
|
|
||||||
node_maintainance_operator_deps()
|
node_maintainance_operator_deps()
|
||||||
|
|
||||||
load("//3rdparty/bazel/com_github_kubernetes_sigs_aws_load_balancer_controller:source.bzl", "aws_load_balancer_controller_deps")
|
|
||||||
|
|
||||||
aws_load_balancer_controller_deps()
|
|
||||||
|
|
||||||
# CI deps
|
# CI deps
|
||||||
load("//bazel/toolchains:ci_deps.bzl", "ci_deps")
|
load("//bazel/toolchains:ci_deps.bzl", "ci_deps")
|
||||||
|
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
load("@buildifier_prebuilt//:rules.bzl", "buildifier", "buildifier_test")
|
load("@buildifier_prebuilt//:rules.bzl", "buildifier", "buildifier_test")
|
||||||
load("@com_github_ash2k_bazel_tools//multirun:def.bzl", "multirun")
|
load("@com_github_ash2k_bazel_tools//multirun:def.bzl", "multirun")
|
||||||
load("@gazelle//:def.bzl", "gazelle")
|
load("@gazelle//:def.bzl", "gazelle")
|
||||||
load("//bazel/ci:go_bin_for_host.bzl", "go_bin_for_host")
|
load("@io_bazel_rules_go//go/private/rules:go_bin_for_host.bzl", "go_bin_for_host")
|
||||||
load("//bazel/ci:proto_targets.bzl", "proto_targets")
|
load("//bazel/ci:proto_targets.bzl", "proto_targets")
|
||||||
load("//bazel/sh:def.bzl", "noop_warn", "repo_command", "sh_template")
|
load("//bazel/sh:def.bzl", "noop_warn", "repo_command", "sh_template")
|
||||||
|
|
||||||
@ -558,7 +558,6 @@ multirun(
|
|||||||
commands = [
|
commands = [
|
||||||
":terraform_gen",
|
":terraform_gen",
|
||||||
"//3rdparty/bazel/com_github_medik8s_node_maintainance_operator:pull_files",
|
"//3rdparty/bazel/com_github_medik8s_node_maintainance_operator:pull_files",
|
||||||
"//3rdparty/bazel/com_github_kubernetes_sigs_aws_load_balancer_controller:pull_files",
|
|
||||||
":go_generate",
|
":go_generate",
|
||||||
":proto_generate",
|
":proto_generate",
|
||||||
],
|
],
|
||||||
|
@ -1,29 +0,0 @@
|
|||||||
"""
|
|
||||||
Go toolchain for the host platformS
|
|
||||||
Inspired by https://github.com/bazel-contrib/rules_go/blob/6e4fdcfeb1a333b54ab39ae3413d4ded46d8958d/go/private/rules/go_bin_for_host.bzl
|
|
||||||
"""
|
|
||||||
|
|
||||||
load("@local_config_platform//:constraints.bzl", "HOST_CONSTRAINTS")
|
|
||||||
|
|
||||||
GO_TOOLCHAIN = "@io_bazel_rules_go//go:toolchain"
|
|
||||||
|
|
||||||
def _ensure_target_cfg(ctx):
|
|
||||||
if "-exec" in ctx.bin_dir.path or "/host/" in ctx.bin_dir.path:
|
|
||||||
fail("exec not found")
|
|
||||||
|
|
||||||
def _go_bin_for_host_impl(ctx):
|
|
||||||
_ensure_target_cfg(ctx)
|
|
||||||
sdk = ctx.toolchains[GO_TOOLCHAIN].sdk
|
|
||||||
sdk_files = ctx.runfiles([sdk.go] + sdk.headers.to_list() + sdk.libs.to_list() + sdk.srcs.to_list() + sdk.tools.to_list())
|
|
||||||
return [
|
|
||||||
DefaultInfo(
|
|
||||||
files = depset([sdk.go]),
|
|
||||||
runfiles = sdk_files,
|
|
||||||
),
|
|
||||||
]
|
|
||||||
|
|
||||||
go_bin_for_host = rule(
|
|
||||||
implementation = _go_bin_for_host_impl,
|
|
||||||
toolchains = [GO_TOOLCHAIN],
|
|
||||||
exec_compatible_with = HOST_CONSTRAINTS,
|
|
||||||
)
|
|
@ -63,8 +63,6 @@ license_report() {
|
|||||||
|
|
||||||
github.com/edgelesssys/constellation/v2/operators/constellation-node-operator/api) ;;
|
github.com/edgelesssys/constellation/v2/operators/constellation-node-operator/api) ;;
|
||||||
|
|
||||||
github.com/edgelesssys/go-tdx-qpl) ;;
|
|
||||||
|
|
||||||
*)
|
*)
|
||||||
not_allowed
|
not_allowed
|
||||||
;;
|
;;
|
||||||
@ -73,6 +71,8 @@ license_report() {
|
|||||||
|
|
||||||
Unknown)
|
Unknown)
|
||||||
case ${pkg} in
|
case ${pkg} in
|
||||||
|
github.com/edgelesssys/go-tdx-qpl/*) ;;
|
||||||
|
|
||||||
*)
|
*)
|
||||||
not_allowed
|
not_allowed
|
||||||
;;
|
;;
|
||||||
|
@ -27,16 +27,11 @@ submodules=$(${go} list -f '{{.Dir}}' -m)
|
|||||||
PATH=$(dirname "${go}"):${PATH}
|
PATH=$(dirname "${go}"):${PATH}
|
||||||
|
|
||||||
check_module() {
|
check_module() {
|
||||||
excluded_osvs=(
|
|
||||||
"GO-2025-3521" # Kubernetes GitRepo Volume Inadvertent Local Repository Access
|
|
||||||
"GO-2025-3547" # Kubernetes kube-apiserver Vulnerable to Race Condition
|
|
||||||
)
|
|
||||||
|
|
||||||
# shellcheck disable=SC2016 # The $ sign in the single quoted string is correct.
|
# shellcheck disable=SC2016 # The $ sign in the single quoted string is correct.
|
||||||
CGO_ENABLED=0 ${govulncheck} -C "$1" -format json "./..." |
|
CGO_ENABLED=0 ${govulncheck} -C "$1" -format json "./..." |
|
||||||
"${jq}" --argjson excluded "$(printf '"%s"\n' "${excluded_osvs[@]}" | jq -s)" -sr '
|
"${jq}" -sr '
|
||||||
(map(select(.osv) | {"key": .osv.id, "value": .osv.summary}) | from_entries) as $osvs |
|
(map(select(.osv) | {"key": .osv.id, "value": .osv.summary}) | from_entries) as $osvs |
|
||||||
map(select( .finding and all($excluded[] != .finding.osv; .) ) | .finding | select( .trace[-1].module | startswith("github.com/edgelesssys/") )) |
|
map(select( .finding and .finding.osv != "GO-2024-3166" ) | .finding | select( .trace[-1].module | startswith("github.com/edgelesssys/") )) |
|
||||||
group_by(.osv) |
|
group_by(.osv) |
|
||||||
map( {"osv": .[0].osv, "summary": $osvs[.[0].osv], "traces": [.[] | [.trace[] | .module]]} ) |
|
map( {"osv": .[0].osv, "summary": $osvs[.[0].osv], "traces": [.[] | [.trace[] | .module]]} ) |
|
||||||
if length > 0 then halt_error(1) else .[] end'
|
if length > 0 then halt_error(1) else .[] end'
|
||||||
|
@ -46,6 +46,7 @@ excludeDirs=(
|
|||||||
excludeLockDirs=(
|
excludeLockDirs=(
|
||||||
"build"
|
"build"
|
||||||
"terraform-provider-constellation"
|
"terraform-provider-constellation"
|
||||||
|
"terraform/legacy-module"
|
||||||
)
|
)
|
||||||
|
|
||||||
excludeCheckDirs=(
|
excludeCheckDirs=(
|
||||||
|
@ -5,14 +5,17 @@ based on https://github.com/bazelbuild/rules_go/issues/2111#issuecomment-1355927
|
|||||||
"""
|
"""
|
||||||
|
|
||||||
load("@aspect_bazel_lib//lib:write_source_files.bzl", "write_source_files")
|
load("@aspect_bazel_lib//lib:write_source_files.bzl", "write_source_files")
|
||||||
load("@io_bazel_rules_go//go:def.bzl", "GoInfo")
|
load("@io_bazel_rules_go//go:def.bzl", "GoLibrary", "go_context")
|
||||||
load("@io_bazel_rules_go//proto:compiler.bzl", "GoProtoCompiler")
|
load("@io_bazel_rules_go//proto:compiler.bzl", "GoProtoCompiler")
|
||||||
|
|
||||||
def _output_go_library_srcs_impl(ctx):
|
def _output_go_library_srcs_impl(ctx):
|
||||||
|
go = go_context(ctx)
|
||||||
|
|
||||||
srcs_of_library = []
|
srcs_of_library = []
|
||||||
importpath = ""
|
importpath = ""
|
||||||
for src in ctx.attr.deps:
|
for src in ctx.attr.deps:
|
||||||
lib = src[GoInfo]
|
lib = src[GoLibrary]
|
||||||
|
go_src = go.library_to_source(go, ctx.attr, lib, False)
|
||||||
if importpath and lib.importpath != importpath:
|
if importpath and lib.importpath != importpath:
|
||||||
fail(
|
fail(
|
||||||
"importpath of all deps must match, got {} and {}",
|
"importpath of all deps must match, got {} and {}",
|
||||||
@ -20,7 +23,7 @@ def _output_go_library_srcs_impl(ctx):
|
|||||||
lib.importpath,
|
lib.importpath,
|
||||||
)
|
)
|
||||||
importpath = lib.importpath
|
importpath = lib.importpath
|
||||||
srcs_of_library.extend(lib.srcs)
|
srcs_of_library.extend(go_src.srcs)
|
||||||
|
|
||||||
if len(srcs_of_library) != 1:
|
if len(srcs_of_library) != 1:
|
||||||
fail("expected exactly one src for library, got {}", len(srcs_of_library))
|
fail("expected exactly one src for library, got {}", len(srcs_of_library))
|
||||||
@ -51,7 +54,7 @@ output_go_library_srcs = rule(
|
|||||||
default = "@io_bazel_rules_go//proto:go_proto",
|
default = "@io_bazel_rules_go//proto:go_proto",
|
||||||
),
|
),
|
||||||
"deps": attr.label_list(
|
"deps": attr.label_list(
|
||||||
providers = [GoInfo],
|
providers = [GoLibrary],
|
||||||
aspects = [],
|
aspects = [],
|
||||||
),
|
),
|
||||||
"out": attr.output(
|
"out": attr.output(
|
||||||
|
@ -70,5 +70,5 @@ go_test(
|
|||||||
env = platform_container_sums_paths | platform_clis_paths,
|
env = platform_container_sums_paths | platform_clis_paths,
|
||||||
# keep
|
# keep
|
||||||
x_defs = {"runsUnder": "bazel"},
|
x_defs = {"runsUnder": "bazel"},
|
||||||
deps = ["@io_bazel_rules_go//go/runfiles"],
|
deps = ["@io_bazel_rules_go//go/runfiles:go_default_library"],
|
||||||
)
|
)
|
||||||
|
@ -97,83 +97,83 @@ def _actionlint_deps():
|
|||||||
name = "com_github_rhysd_actionlint_linux_amd64",
|
name = "com_github_rhysd_actionlint_linux_amd64",
|
||||||
build_file_content = """exports_files(["actionlint"], visibility = ["//visibility:public"])""",
|
build_file_content = """exports_files(["actionlint"], visibility = ["//visibility:public"])""",
|
||||||
urls = [
|
urls = [
|
||||||
"https://cdn.confidential.cloud/constellation/cas/sha256/023070a287cd8cccd71515fedc843f1985bf96c436b7effaecce67290e7e0757",
|
"https://cdn.confidential.cloud/constellation/cas/sha256/fc0a6886bbb9a23a39eeec4b176193cadb54ddbe77cdbb19b637933919545395",
|
||||||
"https://github.com/rhysd/actionlint/releases/download/v1.7.7/actionlint_1.7.7_linux_amd64.tar.gz",
|
"https://github.com/rhysd/actionlint/releases/download/v1.7.4/actionlint_1.7.4_linux_amd64.tar.gz",
|
||||||
],
|
],
|
||||||
type = "tar.gz",
|
type = "tar.gz",
|
||||||
sha256 = "023070a287cd8cccd71515fedc843f1985bf96c436b7effaecce67290e7e0757",
|
sha256 = "fc0a6886bbb9a23a39eeec4b176193cadb54ddbe77cdbb19b637933919545395",
|
||||||
)
|
)
|
||||||
http_archive(
|
http_archive(
|
||||||
name = "com_github_rhysd_actionlint_linux_arm64",
|
name = "com_github_rhysd_actionlint_linux_arm64",
|
||||||
build_file_content = """exports_files(["actionlint"], visibility = ["//visibility:public"])""",
|
build_file_content = """exports_files(["actionlint"], visibility = ["//visibility:public"])""",
|
||||||
urls = [
|
urls = [
|
||||||
"https://cdn.confidential.cloud/constellation/cas/sha256/401942f9c24ed71e4fe71b76c7d638f66d8633575c4016efd2977ce7c28317d0",
|
"https://cdn.confidential.cloud/constellation/cas/sha256/ede03682dc955381d057dde95bb85ce9ca418122209a8a313b617d4adec56416",
|
||||||
"https://github.com/rhysd/actionlint/releases/download/v1.7.7/actionlint_1.7.7_linux_arm64.tar.gz",
|
"https://github.com/rhysd/actionlint/releases/download/v1.7.4/actionlint_1.7.4_linux_arm64.tar.gz",
|
||||||
],
|
],
|
||||||
type = "tar.gz",
|
type = "tar.gz",
|
||||||
sha256 = "401942f9c24ed71e4fe71b76c7d638f66d8633575c4016efd2977ce7c28317d0",
|
sha256 = "ede03682dc955381d057dde95bb85ce9ca418122209a8a313b617d4adec56416",
|
||||||
)
|
)
|
||||||
http_archive(
|
http_archive(
|
||||||
name = "com_github_rhysd_actionlint_darwin_amd64",
|
name = "com_github_rhysd_actionlint_darwin_amd64",
|
||||||
build_file_content = """exports_files(["actionlint"], visibility = ["//visibility:public"])""",
|
build_file_content = """exports_files(["actionlint"], visibility = ["//visibility:public"])""",
|
||||||
urls = [
|
urls = [
|
||||||
"https://cdn.confidential.cloud/constellation/cas/sha256/28e5de5a05fc558474f638323d736d822fff183d2d492f0aecb2b73cc44584f5",
|
"https://cdn.confidential.cloud/constellation/cas/sha256/63a3ba90ee2325afad3ff2e64a4d80688c261e6c68be8e6ab91214637bf936b8",
|
||||||
"https://github.com/rhysd/actionlint/releases/download/v1.7.7/actionlint_1.7.7_darwin_amd64.tar.gz",
|
"https://github.com/rhysd/actionlint/releases/download/v1.7.4/actionlint_1.7.4_darwin_amd64.tar.gz",
|
||||||
],
|
],
|
||||||
type = "tar.gz",
|
type = "tar.gz",
|
||||||
sha256 = "28e5de5a05fc558474f638323d736d822fff183d2d492f0aecb2b73cc44584f5",
|
sha256 = "63a3ba90ee2325afad3ff2e64a4d80688c261e6c68be8e6ab91214637bf936b8",
|
||||||
)
|
)
|
||||||
http_archive(
|
http_archive(
|
||||||
name = "com_github_rhysd_actionlint_darwin_arm64",
|
name = "com_github_rhysd_actionlint_darwin_arm64",
|
||||||
build_file_content = """exports_files(["actionlint"], visibility = ["//visibility:public"])""",
|
build_file_content = """exports_files(["actionlint"], visibility = ["//visibility:public"])""",
|
||||||
urls = [
|
urls = [
|
||||||
"https://cdn.confidential.cloud/constellation/cas/sha256/2693315b9093aeacb4ebd91a993fea54fc215057bf0da2659056b4bc033873db",
|
"https://cdn.confidential.cloud/constellation/cas/sha256/cbd193bb490f598d77e179261d7b76dfebd049dddede5803ba21cbf6a469aeee",
|
||||||
"https://github.com/rhysd/actionlint/releases/download/v1.7.7/actionlint_1.7.7_darwin_arm64.tar.gz",
|
"https://github.com/rhysd/actionlint/releases/download/v1.7.4/actionlint_1.7.4_darwin_arm64.tar.gz",
|
||||||
],
|
],
|
||||||
type = "tar.gz",
|
type = "tar.gz",
|
||||||
sha256 = "2693315b9093aeacb4ebd91a993fea54fc215057bf0da2659056b4bc033873db",
|
sha256 = "cbd193bb490f598d77e179261d7b76dfebd049dddede5803ba21cbf6a469aeee",
|
||||||
)
|
)
|
||||||
|
|
||||||
def _gofumpt_deps():
|
def _gofumpt_deps():
|
||||||
http_file(
|
http_file(
|
||||||
name = "com_github_mvdan_gofumpt_linux_amd64",
|
name = "com_github_mvdan_gofumpt_linux_amd64",
|
||||||
urls = [
|
urls = [
|
||||||
"https://cdn.confidential.cloud/constellation/cas/sha256/11604bbaf7321abcc2fca2c6a37b7e9198bb1e76e5a86f297c07201e8ab1fda9",
|
"https://cdn.confidential.cloud/constellation/cas/sha256/6ff459c1dcae3b0b00844c1a5a4a5b0f547237d8a4f3624aaea8d424aeef24c6",
|
||||||
"https://github.com/mvdan/gofumpt/releases/download/v0.8.0/gofumpt_v0.8.0_linux_amd64",
|
"https://github.com/mvdan/gofumpt/releases/download/v0.7.0/gofumpt_v0.7.0_linux_amd64",
|
||||||
],
|
],
|
||||||
executable = True,
|
executable = True,
|
||||||
downloaded_file_path = "gofumpt",
|
downloaded_file_path = "gofumpt",
|
||||||
sha256 = "11604bbaf7321abcc2fca2c6a37b7e9198bb1e76e5a86f297c07201e8ab1fda9",
|
sha256 = "6ff459c1dcae3b0b00844c1a5a4a5b0f547237d8a4f3624aaea8d424aeef24c6",
|
||||||
)
|
)
|
||||||
http_file(
|
http_file(
|
||||||
name = "com_github_mvdan_gofumpt_linux_arm64",
|
name = "com_github_mvdan_gofumpt_linux_arm64",
|
||||||
urls = [
|
urls = [
|
||||||
"https://cdn.confidential.cloud/constellation/cas/sha256/787c1d3d4d20e6fe2b0bf06a5a913ac0f50343dbf9a71540724a2b8092a0e6ca",
|
"https://cdn.confidential.cloud/constellation/cas/sha256/00c18c88ef50437629626ba20d677f4648684cb280952814cdd887677d42cbd3",
|
||||||
"https://github.com/mvdan/gofumpt/releases/download/v0.8.0/gofumpt_v0.8.0_linux_arm64",
|
"https://github.com/mvdan/gofumpt/releases/download/v0.7.0/gofumpt_v0.7.0_linux_arm64",
|
||||||
],
|
],
|
||||||
executable = True,
|
executable = True,
|
||||||
downloaded_file_path = "gofumpt",
|
downloaded_file_path = "gofumpt",
|
||||||
sha256 = "787c1d3d4d20e6fe2b0bf06a5a913ac0f50343dbf9a71540724a2b8092a0e6ca",
|
sha256 = "00c18c88ef50437629626ba20d677f4648684cb280952814cdd887677d42cbd3",
|
||||||
)
|
)
|
||||||
http_file(
|
http_file(
|
||||||
name = "com_github_mvdan_gofumpt_darwin_amd64",
|
name = "com_github_mvdan_gofumpt_darwin_amd64",
|
||||||
urls = [
|
urls = [
|
||||||
"https://cdn.confidential.cloud/constellation/cas/sha256/0dda6600cf263b703a5ad93e792b06180c36afdee9638617a91dd552f2c6fb3e",
|
"https://cdn.confidential.cloud/constellation/cas/sha256/b7d05e092da45c5ec96344ab635b1d6547c3e27c840ba39bc76989934efd7ce3",
|
||||||
"https://github.com/mvdan/gofumpt/releases/download/v0.8.0/gofumpt_v0.8.0_darwin_amd64",
|
"https://github.com/mvdan/gofumpt/releases/download/v0.7.0/gofumpt_v0.7.0_darwin_amd64",
|
||||||
],
|
],
|
||||||
executable = True,
|
executable = True,
|
||||||
downloaded_file_path = "gofumpt",
|
downloaded_file_path = "gofumpt",
|
||||||
sha256 = "0dda6600cf263b703a5ad93e792b06180c36afdee9638617a91dd552f2c6fb3e",
|
sha256 = "b7d05e092da45c5ec96344ab635b1d6547c3e27c840ba39bc76989934efd7ce3",
|
||||||
)
|
)
|
||||||
http_file(
|
http_file(
|
||||||
name = "com_github_mvdan_gofumpt_darwin_arm64",
|
name = "com_github_mvdan_gofumpt_darwin_arm64",
|
||||||
urls = [
|
urls = [
|
||||||
"https://cdn.confidential.cloud/constellation/cas/sha256/7e66e92b7a67d1d12839ab030fb7ae38e5e2273474af3762e67bc7fe9471fcd9",
|
"https://cdn.confidential.cloud/constellation/cas/sha256/08f23114760a090b090706d92b8c52b9875b9eb352d76c77aa354d6aa20b045a",
|
||||||
"https://github.com/mvdan/gofumpt/releases/download/v0.8.0/gofumpt_v0.8.0_darwin_arm64",
|
"https://github.com/mvdan/gofumpt/releases/download/v0.7.0/gofumpt_v0.7.0_darwin_arm64",
|
||||||
],
|
],
|
||||||
executable = True,
|
executable = True,
|
||||||
downloaded_file_path = "gofumpt",
|
downloaded_file_path = "gofumpt",
|
||||||
sha256 = "7e66e92b7a67d1d12839ab030fb7ae38e5e2273474af3762e67bc7fe9471fcd9",
|
sha256 = "08f23114760a090b090706d92b8c52b9875b9eb352d76c77aa354d6aa20b045a",
|
||||||
)
|
)
|
||||||
|
|
||||||
def _tfsec_deps():
|
def _tfsec_deps():
|
||||||
@ -181,41 +181,41 @@ def _tfsec_deps():
|
|||||||
name = "com_github_aquasecurity_tfsec_linux_amd64",
|
name = "com_github_aquasecurity_tfsec_linux_amd64",
|
||||||
build_file_content = """exports_files(["tfsec"], visibility = ["//visibility:public"])""",
|
build_file_content = """exports_files(["tfsec"], visibility = ["//visibility:public"])""",
|
||||||
urls = [
|
urls = [
|
||||||
"https://cdn.confidential.cloud/constellation/cas/sha256/f643c390e6eabdf4bd64e807ff63abfe977d4f027c0b535eefe7a5c9f391fc28",
|
"https://cdn.confidential.cloud/constellation/cas/sha256/9d783fa225a570f034000136973afba86a1708c919a539b72b3ea954a198289c",
|
||||||
"https://github.com/aquasecurity/tfsec/releases/download/v1.28.13/tfsec_1.28.13_linux_amd64.tar.gz",
|
"https://github.com/aquasecurity/tfsec/releases/download/v1.28.11/tfsec_1.28.11_linux_amd64.tar.gz",
|
||||||
],
|
],
|
||||||
type = "tar.gz",
|
type = "tar.gz",
|
||||||
sha256 = "f643c390e6eabdf4bd64e807ff63abfe977d4f027c0b535eefe7a5c9f391fc28",
|
sha256 = "9d783fa225a570f034000136973afba86a1708c919a539b72b3ea954a198289c",
|
||||||
)
|
)
|
||||||
http_archive(
|
http_archive(
|
||||||
name = "com_github_aquasecurity_tfsec_linux_arm64",
|
name = "com_github_aquasecurity_tfsec_linux_arm64",
|
||||||
build_file_content = """exports_files(["tfsec"], visibility = ["//visibility:public"])""",
|
build_file_content = """exports_files(["tfsec"], visibility = ["//visibility:public"])""",
|
||||||
urls = [
|
urls = [
|
||||||
"https://cdn.confidential.cloud/constellation/cas/sha256/4aed1b122f817b684cc48da9cdc4b98b891808969441914570c089883c85ac50",
|
"https://cdn.confidential.cloud/constellation/cas/sha256/68b5c4f6b7c459dd890ecff94b0732e456ef45974894f58bbb90fbb4816f3e52",
|
||||||
"https://github.com/aquasecurity/tfsec/releases/download/v1.28.13/tfsec_1.28.13_linux_arm64.tar.gz",
|
"https://github.com/aquasecurity/tfsec/releases/download/v1.28.11/tfsec_1.28.11_linux_arm64.tar.gz",
|
||||||
],
|
],
|
||||||
type = "tar.gz",
|
type = "tar.gz",
|
||||||
sha256 = "4aed1b122f817b684cc48da9cdc4b98b891808969441914570c089883c85ac50",
|
sha256 = "68b5c4f6b7c459dd890ecff94b0732e456ef45974894f58bbb90fbb4816f3e52",
|
||||||
)
|
)
|
||||||
http_archive(
|
http_archive(
|
||||||
name = "com_github_aquasecurity_tfsec_darwin_amd64",
|
name = "com_github_aquasecurity_tfsec_darwin_amd64",
|
||||||
build_file_content = """exports_files(["tfsec"], visibility = ["//visibility:public"])""",
|
build_file_content = """exports_files(["tfsec"], visibility = ["//visibility:public"])""",
|
||||||
urls = [
|
urls = [
|
||||||
"https://cdn.confidential.cloud/constellation/cas/sha256/966c7656f797c120dceb56a208a50dbf6a363c30876662a28e1c65505afca10d",
|
"https://cdn.confidential.cloud/constellation/cas/sha256/d377597f2fd4e6956bb7beb711d627b0e0204c421c17e2cd062213222c2f3001",
|
||||||
"https://github.com/aquasecurity/tfsec/releases/download/v1.28.13/tfsec_1.28.13_darwin_amd64.tar.gz",
|
"https://github.com/aquasecurity/tfsec/releases/download/v1.28.11/tfsec_1.28.11_darwin_amd64.tar.gz",
|
||||||
],
|
],
|
||||||
type = "tar.gz",
|
type = "tar.gz",
|
||||||
sha256 = "966c7656f797c120dceb56a208a50dbf6a363c30876662a28e1c65505afca10d",
|
sha256 = "d377597f2fd4e6956bb7beb711d627b0e0204c421c17e2cd062213222c2f3001",
|
||||||
)
|
)
|
||||||
http_archive(
|
http_archive(
|
||||||
name = "com_github_aquasecurity_tfsec_darwin_arm64",
|
name = "com_github_aquasecurity_tfsec_darwin_arm64",
|
||||||
build_file_content = """exports_files(["tfsec"], visibility = ["//visibility:public"])""",
|
build_file_content = """exports_files(["tfsec"], visibility = ["//visibility:public"])""",
|
||||||
urls = [
|
urls = [
|
||||||
"https://cdn.confidential.cloud/constellation/cas/sha256/a381580c81d3413bb3fe07aa91ab89e51c1bbbd33c848194a2b43e9be3729c16",
|
"https://cdn.confidential.cloud/constellation/cas/sha256/14db6b40049226ebc779789196f99eb4977bb93c99fa51c8b72b603e6cdf44e7",
|
||||||
"https://github.com/aquasecurity/tfsec/releases/download/v1.28.13/tfsec_1.28.13_darwin_arm64.tar.gz",
|
"https://github.com/aquasecurity/tfsec/releases/download/v1.28.11/tfsec_1.28.11_darwin_arm64.tar.gz",
|
||||||
],
|
],
|
||||||
type = "tar.gz",
|
type = "tar.gz",
|
||||||
sha256 = "a381580c81d3413bb3fe07aa91ab89e51c1bbbd33c848194a2b43e9be3729c16",
|
sha256 = "14db6b40049226ebc779789196f99eb4977bb93c99fa51c8b72b603e6cdf44e7",
|
||||||
)
|
)
|
||||||
|
|
||||||
def _golangci_lint_deps():
|
def _golangci_lint_deps():
|
||||||
@ -223,45 +223,45 @@ def _golangci_lint_deps():
|
|||||||
name = "com_github_golangci_golangci_lint_linux_amd64",
|
name = "com_github_golangci_golangci_lint_linux_amd64",
|
||||||
build_file = "//bazel/toolchains:BUILD.golangci.bazel",
|
build_file = "//bazel/toolchains:BUILD.golangci.bazel",
|
||||||
urls = [
|
urls = [
|
||||||
"https://cdn.confidential.cloud/constellation/cas/sha256/bc16fd1ef25bce2c600de0122600100ab26d6d75388cc5369c5bb916cb2b82e3",
|
"https://cdn.confidential.cloud/constellation/cas/sha256/5101292b7925a6a14b49c5c3d845c5021399698ffd2f41bcfab8a111b5669939",
|
||||||
"https://github.com/golangci/golangci-lint/releases/download/v2.1.2/golangci-lint-2.1.2-linux-amd64.tar.gz",
|
"https://github.com/golangci/golangci-lint/releases/download/v1.62.2/golangci-lint-1.62.2-linux-amd64.tar.gz",
|
||||||
],
|
],
|
||||||
strip_prefix = "golangci-lint-2.1.2-linux-amd64",
|
strip_prefix = "golangci-lint-1.62.2-linux-amd64",
|
||||||
type = "tar.gz",
|
type = "tar.gz",
|
||||||
sha256 = "bc16fd1ef25bce2c600de0122600100ab26d6d75388cc5369c5bb916cb2b82e3",
|
sha256 = "5101292b7925a6a14b49c5c3d845c5021399698ffd2f41bcfab8a111b5669939",
|
||||||
)
|
)
|
||||||
http_archive(
|
http_archive(
|
||||||
name = "com_github_golangci_golangci_lint_linux_arm64",
|
name = "com_github_golangci_golangci_lint_linux_arm64",
|
||||||
build_file = "//bazel/toolchains:BUILD.golangci.bazel",
|
build_file = "//bazel/toolchains:BUILD.golangci.bazel",
|
||||||
urls = [
|
urls = [
|
||||||
"https://cdn.confidential.cloud/constellation/cas/sha256/46e86f1c4a94236e4d0bb35252c72939bed9f749897aaad54b576d430b1bb6d4",
|
"https://cdn.confidential.cloud/constellation/cas/sha256/10b6f5bd8483bd9e85a82f6119ed08f95609f42b86dc344b5dc15703c74d5b85",
|
||||||
"https://github.com/golangci/golangci-lint/releases/download/v2.1.2/golangci-lint-2.1.2-linux-arm64.tar.gz",
|
"https://github.com/golangci/golangci-lint/releases/download/v1.62.2/golangci-lint-1.62.2-linux-arm64.tar.gz",
|
||||||
],
|
],
|
||||||
strip_prefix = "golangci-lint-2.1.2-linux-arm64",
|
strip_prefix = "golangci-lint-1.62.2-linux-arm64",
|
||||||
type = "tar.gz",
|
type = "tar.gz",
|
||||||
sha256 = "46e86f1c4a94236e4d0bb35252c72939bed9f749897aaad54b576d430b1bb6d4",
|
sha256 = "10b6f5bd8483bd9e85a82f6119ed08f95609f42b86dc344b5dc15703c74d5b85",
|
||||||
)
|
)
|
||||||
http_archive(
|
http_archive(
|
||||||
name = "com_github_golangci_golangci_lint_darwin_amd64",
|
name = "com_github_golangci_golangci_lint_darwin_amd64",
|
||||||
build_file = "//bazel/toolchains:BUILD.golangci.bazel",
|
build_file = "//bazel/toolchains:BUILD.golangci.bazel",
|
||||||
urls = [
|
urls = [
|
||||||
"https://cdn.confidential.cloud/constellation/cas/sha256/ed02ba3ad28466d61d2ae2b80cc95671713fa842c353da37842b1b89e36cb3ce",
|
"https://cdn.confidential.cloud/constellation/cas/sha256/6c9ffd05896f0638d5c37152ac4ae337c2d301ba6c9dadf49c04e6d639f10f91",
|
||||||
"https://github.com/golangci/golangci-lint/releases/download/v2.1.2/golangci-lint-2.1.2-darwin-amd64.tar.gz",
|
"https://github.com/golangci/golangci-lint/releases/download/v1.62.2/golangci-lint-1.62.2-darwin-amd64.tar.gz",
|
||||||
],
|
],
|
||||||
strip_prefix = "golangci-lint-2.1.2-darwin-amd64",
|
strip_prefix = "golangci-lint-1.62.2-darwin-amd64",
|
||||||
type = "tar.gz",
|
type = "tar.gz",
|
||||||
sha256 = "ed02ba3ad28466d61d2ae2b80cc95671713fa842c353da37842b1b89e36cb3ce",
|
sha256 = "6c9ffd05896f0638d5c37152ac4ae337c2d301ba6c9dadf49c04e6d639f10f91",
|
||||||
)
|
)
|
||||||
http_archive(
|
http_archive(
|
||||||
name = "com_github_golangci_golangci_lint_darwin_arm64",
|
name = "com_github_golangci_golangci_lint_darwin_arm64",
|
||||||
build_file = "//bazel/toolchains:BUILD.golangci.bazel",
|
build_file = "//bazel/toolchains:BUILD.golangci.bazel",
|
||||||
urls = [
|
urls = [
|
||||||
"https://cdn.confidential.cloud/constellation/cas/sha256/1cff60651d7c95a4248fa72f0dd020bffed1d2dc4dd8c2c77aee89a0731fa615",
|
"https://cdn.confidential.cloud/constellation/cas/sha256/6c76f54467ba471f7bdcd5df0f27c3fa3dbe530b771a10d384c3d8c7178f5e89",
|
||||||
"https://github.com/golangci/golangci-lint/releases/download/v2.1.2/golangci-lint-2.1.2-darwin-arm64.tar.gz",
|
"https://github.com/golangci/golangci-lint/releases/download/v1.62.2/golangci-lint-1.62.2-darwin-arm64.tar.gz",
|
||||||
],
|
],
|
||||||
strip_prefix = "golangci-lint-2.1.2-darwin-arm64",
|
strip_prefix = "golangci-lint-1.62.2-darwin-arm64",
|
||||||
type = "tar.gz",
|
type = "tar.gz",
|
||||||
sha256 = "1cff60651d7c95a4248fa72f0dd020bffed1d2dc4dd8c2c77aee89a0731fa615",
|
sha256 = "6c76f54467ba471f7bdcd5df0f27c3fa3dbe530b771a10d384c3d8c7178f5e89",
|
||||||
)
|
)
|
||||||
|
|
||||||
def _buf_deps():
|
def _buf_deps():
|
||||||
@ -270,44 +270,44 @@ def _buf_deps():
|
|||||||
strip_prefix = "buf/bin",
|
strip_prefix = "buf/bin",
|
||||||
build_file_content = """exports_files(["buf"], visibility = ["//visibility:public"])""",
|
build_file_content = """exports_files(["buf"], visibility = ["//visibility:public"])""",
|
||||||
urls = [
|
urls = [
|
||||||
"https://cdn.confidential.cloud/constellation/cas/sha256/ce439b98c0e655ba1821fc529442f677135a9a44206a85cf2081a445bde02554",
|
"https://cdn.confidential.cloud/constellation/cas/sha256/deebd48a6bf85b073d7c7800c17b330376487e86852d4905c76a205b6fd795d4",
|
||||||
"https://github.com/bufbuild/buf/releases/download/v1.52.1/buf-Linux-x86_64.tar.gz",
|
"https://github.com/bufbuild/buf/releases/download/v1.45.0/buf-Linux-x86_64.tar.gz",
|
||||||
],
|
],
|
||||||
type = "tar.gz",
|
type = "tar.gz",
|
||||||
sha256 = "ce439b98c0e655ba1821fc529442f677135a9a44206a85cf2081a445bde02554",
|
sha256 = "deebd48a6bf85b073d7c7800c17b330376487e86852d4905c76a205b6fd795d4",
|
||||||
)
|
)
|
||||||
http_archive(
|
http_archive(
|
||||||
name = "com_github_bufbuild_buf_linux_arm64",
|
name = "com_github_bufbuild_buf_linux_arm64",
|
||||||
strip_prefix = "buf/bin",
|
strip_prefix = "buf/bin",
|
||||||
build_file_content = """exports_files(["buf"], visibility = ["//visibility:public"])""",
|
build_file_content = """exports_files(["buf"], visibility = ["//visibility:public"])""",
|
||||||
urls = [
|
urls = [
|
||||||
"https://cdn.confidential.cloud/constellation/cas/sha256/fb980e62f55a0d705f555124b5b250a6234deae67b3a493b1844fed8cb48f012",
|
"https://cdn.confidential.cloud/constellation/cas/sha256/2d3ebfed036881d0615e5b24288cf788791b45848f26e915e3efe7ee9c10735d",
|
||||||
"https://github.com/bufbuild/buf/releases/download/v1.52.1/buf-Linux-aarch64.tar.gz",
|
"https://github.com/bufbuild/buf/releases/download/v1.45.0/buf-Linux-aarch64.tar.gz",
|
||||||
],
|
],
|
||||||
type = "tar.gz",
|
type = "tar.gz",
|
||||||
sha256 = "fb980e62f55a0d705f555124b5b250a6234deae67b3a493b1844fed8cb48f012",
|
sha256 = "2d3ebfed036881d0615e5b24288cf788791b45848f26e915e3efe7ee9c10735d",
|
||||||
)
|
)
|
||||||
http_archive(
|
http_archive(
|
||||||
name = "com_github_bufbuild_buf_darwin_amd64",
|
name = "com_github_bufbuild_buf_darwin_amd64",
|
||||||
strip_prefix = "buf/bin",
|
strip_prefix = "buf/bin",
|
||||||
build_file_content = """exports_files(["buf"], visibility = ["//visibility:public"])""",
|
build_file_content = """exports_files(["buf"], visibility = ["//visibility:public"])""",
|
||||||
urls = [
|
urls = [
|
||||||
"https://cdn.confidential.cloud/constellation/cas/sha256/ff3aedaa8bf53c3ae53bf863bb6141a23ef9e2ef750016ab217b0466ab3e89be",
|
"https://cdn.confidential.cloud/constellation/cas/sha256/7fef3c482ac440cc09c40864498ef1f44745fde82428ddf52edd2012d3a036a4",
|
||||||
"https://github.com/bufbuild/buf/releases/download/v1.52.1/buf-Darwin-x86_64.tar.gz",
|
"https://github.com/bufbuild/buf/releases/download/v1.45.0/buf-Darwin-x86_64.tar.gz",
|
||||||
],
|
],
|
||||||
type = "tar.gz",
|
type = "tar.gz",
|
||||||
sha256 = "ff3aedaa8bf53c3ae53bf863bb6141a23ef9e2ef750016ab217b0466ab3e89be",
|
sha256 = "7fef3c482ac440cc09c40864498ef1f44745fde82428ddf52edd2012d3a036a4",
|
||||||
)
|
)
|
||||||
http_archive(
|
http_archive(
|
||||||
name = "com_github_bufbuild_buf_darwin_arm64",
|
name = "com_github_bufbuild_buf_darwin_arm64",
|
||||||
strip_prefix = "buf/bin",
|
strip_prefix = "buf/bin",
|
||||||
build_file_content = """exports_files(["buf"], visibility = ["//visibility:public"])""",
|
build_file_content = """exports_files(["buf"], visibility = ["//visibility:public"])""",
|
||||||
urls = [
|
urls = [
|
||||||
"https://cdn.confidential.cloud/constellation/cas/sha256/b11d5afda7f58a44a6520b798902b1263aba921b0989cb156ecf2acc8eb1ce31",
|
"https://cdn.confidential.cloud/constellation/cas/sha256/e5309c70c7bb4a06d799ab7c7601c0d647c704085593d5cd981db29f986e469b",
|
||||||
"https://github.com/bufbuild/buf/releases/download/v1.52.1/buf-Darwin-arm64.tar.gz",
|
"https://github.com/bufbuild/buf/releases/download/v1.45.0/buf-Darwin-arm64.tar.gz",
|
||||||
],
|
],
|
||||||
type = "tar.gz",
|
type = "tar.gz",
|
||||||
sha256 = "b11d5afda7f58a44a6520b798902b1263aba921b0989cb156ecf2acc8eb1ce31",
|
sha256 = "e5309c70c7bb4a06d799ab7c7601c0d647c704085593d5cd981db29f986e469b",
|
||||||
)
|
)
|
||||||
|
|
||||||
def _talos_docgen_deps():
|
def _talos_docgen_deps():
|
||||||
|
@ -7,7 +7,7 @@ load("@rules_oci//oci:pull.bzl", "oci_pull")
|
|||||||
def containter_image_deps():
|
def containter_image_deps():
|
||||||
oci_pull(
|
oci_pull(
|
||||||
name = "distroless_static",
|
name = "distroless_static",
|
||||||
digest = "sha256:3d0f463de06b7ddff27684ec3bfd0b54a425149d0f8685308b1fdf297b0265e9",
|
digest = "sha256:f4a57e8ffd7ba407bdd0eb315bb54ef1f21a2100a7f032e9102e4da34fe7c196",
|
||||||
image = "gcr.io/distroless/static",
|
image = "gcr.io/distroless/static",
|
||||||
platforms = [
|
platforms = [
|
||||||
"linux/amd64",
|
"linux/amd64",
|
||||||
@ -16,6 +16,6 @@ def containter_image_deps():
|
|||||||
)
|
)
|
||||||
oci_pull(
|
oci_pull(
|
||||||
name = "libvirtd_base",
|
name = "libvirtd_base",
|
||||||
digest = "sha256:f23e0f587860c841adde25b1b4f0d99aa4fbce1c92b01b5b46ab5fa35980a135",
|
digest = "sha256:99dbf3cf69b3f97cb0158bde152c9bc7c2a96458cf462527ee80b75754f572a7",
|
||||||
image = "ghcr.io/edgelesssys/constellation/libvirtd-base",
|
image = "ghcr.io/edgelesssys/constellation/libvirtd-base",
|
||||||
)
|
)
|
||||||
|
@ -9,38 +9,38 @@ def kernel_rpms():
|
|||||||
http_file(
|
http_file(
|
||||||
name = "kernel_lts",
|
name = "kernel_lts",
|
||||||
urls = [
|
urls = [
|
||||||
"https://cdn.confidential.cloud/constellation/cas/sha256/7834bc4bc7e088c98505956382884bdc670ab9a9283288b7fef04a43df31356e",
|
"https://cdn.confidential.cloud/constellation/cas/sha256/c87995e19c04e2f033e6db5e92bfcb845ac015722e776c09a7af4c82c86cd273",
|
||||||
"https://cdn.confidential.cloud/constellation/kernel/6.6.87-100.constellation/kernel-6.6.87-100.constellation.fc40.x86_64.rpm",
|
"https://cdn.confidential.cloud/constellation/kernel/6.6.30-100.constellation/kernel-6.6.30-100.constellation.fc40.x86_64.rpm",
|
||||||
],
|
],
|
||||||
downloaded_file_path = "kernel-lts.rpm",
|
downloaded_file_path = "kernel-lts.rpm",
|
||||||
sha256 = "7834bc4bc7e088c98505956382884bdc670ab9a9283288b7fef04a43df31356e",
|
sha256 = "c87995e19c04e2f033e6db5e92bfcb845ac015722e776c09a7af4c82c86cd273",
|
||||||
)
|
)
|
||||||
http_file(
|
http_file(
|
||||||
name = "kernel_core_lts",
|
name = "kernel_core_lts",
|
||||||
urls = [
|
urls = [
|
||||||
"https://cdn.confidential.cloud/constellation/cas/sha256/2763c699d1e2f9810421ac7af2e9c94c6f98533e83f2938c26f1d824e3559b97",
|
"https://cdn.confidential.cloud/constellation/cas/sha256/5692d862b0cc0c442c581e5f3dc9f3c36cabda0c29d3f62e9b6313a6ec88b140",
|
||||||
"https://cdn.confidential.cloud/constellation/kernel/6.6.87-100.constellation/kernel-core-6.6.87-100.constellation.fc40.x86_64.rpm",
|
"https://cdn.confidential.cloud/constellation/kernel/6.6.30-100.constellation/kernel-core-6.6.30-100.constellation.fc40.x86_64.rpm",
|
||||||
],
|
],
|
||||||
downloaded_file_path = "kernel-core-lts.rpm",
|
downloaded_file_path = "kernel-core-lts.rpm",
|
||||||
sha256 = "2763c699d1e2f9810421ac7af2e9c94c6f98533e83f2938c26f1d824e3559b97",
|
sha256 = "5692d862b0cc0c442c581e5f3dc9f3c36cabda0c29d3f62e9b6313a6ec88b140",
|
||||||
)
|
)
|
||||||
http_file(
|
http_file(
|
||||||
name = "kernel_modules_lts",
|
name = "kernel_modules_lts",
|
||||||
urls = [
|
urls = [
|
||||||
"https://cdn.confidential.cloud/constellation/cas/sha256/a7604eec263f190db573d809d20336bbf75e46c51f5977f5db95bb88bfec56d3",
|
"https://cdn.confidential.cloud/constellation/cas/sha256/e1b697343b4f8ed8e992cd92860208dc1c28eb8b25a88f42f426326a0bbc307f",
|
||||||
"https://cdn.confidential.cloud/constellation/kernel/6.6.87-100.constellation/kernel-modules-6.6.87-100.constellation.fc40.x86_64.rpm",
|
"https://cdn.confidential.cloud/constellation/kernel/6.6.30-100.constellation/kernel-modules-6.6.30-100.constellation.fc40.x86_64.rpm",
|
||||||
],
|
],
|
||||||
downloaded_file_path = "kernel-modules-lts.rpm",
|
downloaded_file_path = "kernel-modules-lts.rpm",
|
||||||
sha256 = "a7604eec263f190db573d809d20336bbf75e46c51f5977f5db95bb88bfec56d3",
|
sha256 = "e1b697343b4f8ed8e992cd92860208dc1c28eb8b25a88f42f426326a0bbc307f",
|
||||||
)
|
)
|
||||||
http_file(
|
http_file(
|
||||||
name = "kernel_modules_core_lts",
|
name = "kernel_modules_core_lts",
|
||||||
urls = [
|
urls = [
|
||||||
"https://cdn.confidential.cloud/constellation/cas/sha256/648fd503d7d54608fbd62ace87c4da098f72abbaac1ab7e343327fc24ccef7f8",
|
"https://cdn.confidential.cloud/constellation/cas/sha256/448c6b10d9ed02aed078ff77223f5e495b2041be12d92eb0e5ca5726a08e0626",
|
||||||
"https://cdn.confidential.cloud/constellation/kernel/6.6.87-100.constellation/kernel-modules-core-6.6.87-100.constellation.fc40.x86_64.rpm",
|
"https://cdn.confidential.cloud/constellation/kernel/6.6.30-100.constellation/kernel-modules-core-6.6.30-100.constellation.fc40.x86_64.rpm",
|
||||||
],
|
],
|
||||||
downloaded_file_path = "kernel-modules-core-lts.rpm",
|
downloaded_file_path = "kernel-modules-core-lts.rpm",
|
||||||
sha256 = "648fd503d7d54608fbd62ace87c4da098f72abbaac1ab7e343327fc24ccef7f8",
|
sha256 = "448c6b10d9ed02aed078ff77223f5e495b2041be12d92eb0e5ca5726a08e0626",
|
||||||
)
|
)
|
||||||
|
|
||||||
# mainline kernel
|
# mainline kernel
|
||||||
|
@ -5,11 +5,11 @@ load("@bazel_tools//tools/build_defs/repo:http.bzl", "http_archive")
|
|||||||
def nixpkgs_deps():
|
def nixpkgs_deps():
|
||||||
http_archive(
|
http_archive(
|
||||||
name = "io_tweag_rules_nixpkgs",
|
name = "io_tweag_rules_nixpkgs",
|
||||||
sha256 = "30271f7bd380e4e20e4d7132c324946c4fdbc31ebe0bbb6638a0f61a37e74397",
|
sha256 = "1ce13c13a2f354fd37016d9fb333efeddcb308e89db9b3a8f45eafce57746f49",
|
||||||
strip_prefix = "rules_nixpkgs-0.13.0",
|
strip_prefix = "rules_nixpkgs-668609f0b3627751651cb325166d0e95062be3f7",
|
||||||
urls = [
|
urls = [
|
||||||
"https://cdn.confidential.cloud/constellation/cas/sha256/30271f7bd380e4e20e4d7132c324946c4fdbc31ebe0bbb6638a0f61a37e74397",
|
"https://cdn.confidential.cloud/constellation/cas/sha256/1ce13c13a2f354fd37016d9fb333efeddcb308e89db9b3a8f45eafce57746f49",
|
||||||
"https://github.com/tweag/rules_nixpkgs/releases/download/v0.13.0/rules_nixpkgs-0.13.0.tar.gz",
|
"https://github.com/tweag/rules_nixpkgs/archive/668609f0b3627751651cb325166d0e95062be3f7.tar.gz",
|
||||||
],
|
],
|
||||||
type = "tar.gz",
|
type = "tar.gz",
|
||||||
)
|
)
|
||||||
|
@ -7,13 +7,14 @@ def oci_deps():
|
|||||||
# Remove this override once https://github.com/bazel-contrib/rules_oci/issues/420 is fixed.
|
# Remove this override once https://github.com/bazel-contrib/rules_oci/issues/420 is fixed.
|
||||||
http_archive(
|
http_archive(
|
||||||
name = "rules_oci",
|
name = "rules_oci",
|
||||||
strip_prefix = "rules_oci-2.2.5",
|
strip_prefix = "rules_oci-2.0.1",
|
||||||
type = "tar.gz",
|
type = "tar.gz",
|
||||||
urls = [
|
urls = [
|
||||||
"https://cdn.confidential.cloud/constellation/cas/sha256/361c417e8c95cd7c3d8b5cf4b202e76bac8d41532131534ff8e6fa43aa161142",
|
"https://cdn.confidential.cloud/constellation/cas/sha256/acbf8f40e062f707f8754e914dcb0013803c6e5e3679d3e05b571a9f5c7e0b43",
|
||||||
"https://github.com/bazel-contrib/rules_oci/releases/download/v2.2.5/rules_oci-v2.2.5.tar.gz",
|
"https://cdn.confidential.cloud/constellation/cas/sha256/f70f07f9d0d6c275d7ec7d3c7f236d9b552ba3205e8f37df9c1125031cf967cc",
|
||||||
|
"https://github.com/bazel-contrib/rules_oci/releases/download/v2.0.1/rules_oci-v2.0.1.tar.gz",
|
||||||
],
|
],
|
||||||
sha256 = "361c417e8c95cd7c3d8b5cf4b202e76bac8d41532131534ff8e6fa43aa161142",
|
sha256 = "acbf8f40e062f707f8754e914dcb0013803c6e5e3679d3e05b571a9f5c7e0b43",
|
||||||
patches = ["//bazel/toolchains:0001-disable-Windows-support.patch"],
|
patches = ["//bazel/toolchains:0001-disable-Windows-support.patch"],
|
||||||
patch_args = ["-p1"],
|
patch_args = ["-p1"],
|
||||||
)
|
)
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
// Code generated by protoc-gen-go. DO NOT EDIT.
|
// Code generated by protoc-gen-go. DO NOT EDIT.
|
||||||
// versions:
|
// versions:
|
||||||
// protoc-gen-go v1.36.6
|
// protoc-gen-go v1.35.2
|
||||||
// protoc v5.29.1
|
// protoc v5.29.0--rc2
|
||||||
// source: bootstrapper/initproto/init.proto
|
// source: bootstrapper/initproto/init.proto
|
||||||
|
|
||||||
package initproto
|
package initproto
|
||||||
@ -16,7 +16,6 @@ import (
|
|||||||
protoimpl "google.golang.org/protobuf/runtime/protoimpl"
|
protoimpl "google.golang.org/protobuf/runtime/protoimpl"
|
||||||
reflect "reflect"
|
reflect "reflect"
|
||||||
sync "sync"
|
sync "sync"
|
||||||
unsafe "unsafe"
|
|
||||||
)
|
)
|
||||||
|
|
||||||
const (
|
const (
|
||||||
@ -27,7 +26,10 @@ const (
|
|||||||
)
|
)
|
||||||
|
|
||||||
type InitRequest struct {
|
type InitRequest struct {
|
||||||
state protoimpl.MessageState `protogen:"open.v1"`
|
state protoimpl.MessageState
|
||||||
|
sizeCache protoimpl.SizeCache
|
||||||
|
unknownFields protoimpl.UnknownFields
|
||||||
|
|
||||||
KmsUri string `protobuf:"bytes,1,opt,name=kms_uri,json=kmsUri,proto3" json:"kms_uri,omitempty"`
|
KmsUri string `protobuf:"bytes,1,opt,name=kms_uri,json=kmsUri,proto3" json:"kms_uri,omitempty"`
|
||||||
StorageUri string `protobuf:"bytes,2,opt,name=storage_uri,json=storageUri,proto3" json:"storage_uri,omitempty"`
|
StorageUri string `protobuf:"bytes,2,opt,name=storage_uri,json=storageUri,proto3" json:"storage_uri,omitempty"`
|
||||||
MeasurementSalt []byte `protobuf:"bytes,3,opt,name=measurement_salt,json=measurementSalt,proto3" json:"measurement_salt,omitempty"`
|
MeasurementSalt []byte `protobuf:"bytes,3,opt,name=measurement_salt,json=measurementSalt,proto3" json:"measurement_salt,omitempty"`
|
||||||
@ -38,8 +40,6 @@ type InitRequest struct {
|
|||||||
ClusterName string `protobuf:"bytes,9,opt,name=cluster_name,json=clusterName,proto3" json:"cluster_name,omitempty"`
|
ClusterName string `protobuf:"bytes,9,opt,name=cluster_name,json=clusterName,proto3" json:"cluster_name,omitempty"`
|
||||||
ApiserverCertSans []string `protobuf:"bytes,10,rep,name=apiserver_cert_sans,json=apiserverCertSans,proto3" json:"apiserver_cert_sans,omitempty"`
|
ApiserverCertSans []string `protobuf:"bytes,10,rep,name=apiserver_cert_sans,json=apiserverCertSans,proto3" json:"apiserver_cert_sans,omitempty"`
|
||||||
ServiceCidr string `protobuf:"bytes,11,opt,name=service_cidr,json=serviceCidr,proto3" json:"service_cidr,omitempty"`
|
ServiceCidr string `protobuf:"bytes,11,opt,name=service_cidr,json=serviceCidr,proto3" json:"service_cidr,omitempty"`
|
||||||
unknownFields protoimpl.UnknownFields
|
|
||||||
sizeCache protoimpl.SizeCache
|
|
||||||
}
|
}
|
||||||
|
|
||||||
func (x *InitRequest) Reset() {
|
func (x *InitRequest) Reset() {
|
||||||
@ -143,15 +143,16 @@ func (x *InitRequest) GetServiceCidr() string {
|
|||||||
}
|
}
|
||||||
|
|
||||||
type InitResponse struct {
|
type InitResponse struct {
|
||||||
state protoimpl.MessageState `protogen:"open.v1"`
|
state protoimpl.MessageState
|
||||||
// Types that are valid to be assigned to Kind:
|
sizeCache protoimpl.SizeCache
|
||||||
|
unknownFields protoimpl.UnknownFields
|
||||||
|
|
||||||
|
// Types that are assignable to Kind:
|
||||||
//
|
//
|
||||||
// *InitResponse_InitSuccess
|
// *InitResponse_InitSuccess
|
||||||
// *InitResponse_InitFailure
|
// *InitResponse_InitFailure
|
||||||
// *InitResponse_Log
|
// *InitResponse_Log
|
||||||
Kind isInitResponse_Kind `protobuf_oneof:"kind"`
|
Kind isInitResponse_Kind `protobuf_oneof:"kind"`
|
||||||
unknownFields protoimpl.UnknownFields
|
|
||||||
sizeCache protoimpl.SizeCache
|
|
||||||
}
|
}
|
||||||
|
|
||||||
func (x *InitResponse) Reset() {
|
func (x *InitResponse) Reset() {
|
||||||
@ -184,36 +185,30 @@ func (*InitResponse) Descriptor() ([]byte, []int) {
|
|||||||
return file_bootstrapper_initproto_init_proto_rawDescGZIP(), []int{1}
|
return file_bootstrapper_initproto_init_proto_rawDescGZIP(), []int{1}
|
||||||
}
|
}
|
||||||
|
|
||||||
func (x *InitResponse) GetKind() isInitResponse_Kind {
|
func (m *InitResponse) GetKind() isInitResponse_Kind {
|
||||||
if x != nil {
|
if m != nil {
|
||||||
return x.Kind
|
return m.Kind
|
||||||
}
|
}
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func (x *InitResponse) GetInitSuccess() *InitSuccessResponse {
|
func (x *InitResponse) GetInitSuccess() *InitSuccessResponse {
|
||||||
if x != nil {
|
if x, ok := x.GetKind().(*InitResponse_InitSuccess); ok {
|
||||||
if x, ok := x.Kind.(*InitResponse_InitSuccess); ok {
|
return x.InitSuccess
|
||||||
return x.InitSuccess
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func (x *InitResponse) GetInitFailure() *InitFailureResponse {
|
func (x *InitResponse) GetInitFailure() *InitFailureResponse {
|
||||||
if x != nil {
|
if x, ok := x.GetKind().(*InitResponse_InitFailure); ok {
|
||||||
if x, ok := x.Kind.(*InitResponse_InitFailure); ok {
|
return x.InitFailure
|
||||||
return x.InitFailure
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func (x *InitResponse) GetLog() *LogResponseType {
|
func (x *InitResponse) GetLog() *LogResponseType {
|
||||||
if x != nil {
|
if x, ok := x.GetKind().(*InitResponse_Log); ok {
|
||||||
if x, ok := x.Kind.(*InitResponse_Log); ok {
|
return x.Log
|
||||||
return x.Log
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
@ -241,12 +236,13 @@ func (*InitResponse_InitFailure) isInitResponse_Kind() {}
|
|||||||
func (*InitResponse_Log) isInitResponse_Kind() {}
|
func (*InitResponse_Log) isInitResponse_Kind() {}
|
||||||
|
|
||||||
type InitSuccessResponse struct {
|
type InitSuccessResponse struct {
|
||||||
state protoimpl.MessageState `protogen:"open.v1"`
|
state protoimpl.MessageState
|
||||||
Kubeconfig []byte `protobuf:"bytes,1,opt,name=kubeconfig,proto3" json:"kubeconfig,omitempty"`
|
|
||||||
OwnerId []byte `protobuf:"bytes,2,opt,name=owner_id,json=ownerId,proto3" json:"owner_id,omitempty"`
|
|
||||||
ClusterId []byte `protobuf:"bytes,3,opt,name=cluster_id,json=clusterId,proto3" json:"cluster_id,omitempty"`
|
|
||||||
unknownFields protoimpl.UnknownFields
|
|
||||||
sizeCache protoimpl.SizeCache
|
sizeCache protoimpl.SizeCache
|
||||||
|
unknownFields protoimpl.UnknownFields
|
||||||
|
|
||||||
|
Kubeconfig []byte `protobuf:"bytes,1,opt,name=kubeconfig,proto3" json:"kubeconfig,omitempty"`
|
||||||
|
OwnerId []byte `protobuf:"bytes,2,opt,name=owner_id,json=ownerId,proto3" json:"owner_id,omitempty"`
|
||||||
|
ClusterId []byte `protobuf:"bytes,3,opt,name=cluster_id,json=clusterId,proto3" json:"cluster_id,omitempty"`
|
||||||
}
|
}
|
||||||
|
|
||||||
func (x *InitSuccessResponse) Reset() {
|
func (x *InitSuccessResponse) Reset() {
|
||||||
@ -301,10 +297,11 @@ func (x *InitSuccessResponse) GetClusterId() []byte {
|
|||||||
}
|
}
|
||||||
|
|
||||||
type InitFailureResponse struct {
|
type InitFailureResponse struct {
|
||||||
state protoimpl.MessageState `protogen:"open.v1"`
|
state protoimpl.MessageState
|
||||||
Error string `protobuf:"bytes,1,opt,name=error,proto3" json:"error,omitempty"`
|
|
||||||
unknownFields protoimpl.UnknownFields
|
|
||||||
sizeCache protoimpl.SizeCache
|
sizeCache protoimpl.SizeCache
|
||||||
|
unknownFields protoimpl.UnknownFields
|
||||||
|
|
||||||
|
Error string `protobuf:"bytes,1,opt,name=error,proto3" json:"error,omitempty"`
|
||||||
}
|
}
|
||||||
|
|
||||||
func (x *InitFailureResponse) Reset() {
|
func (x *InitFailureResponse) Reset() {
|
||||||
@ -345,10 +342,11 @@ func (x *InitFailureResponse) GetError() string {
|
|||||||
}
|
}
|
||||||
|
|
||||||
type LogResponseType struct {
|
type LogResponseType struct {
|
||||||
state protoimpl.MessageState `protogen:"open.v1"`
|
state protoimpl.MessageState
|
||||||
Log []byte `protobuf:"bytes,1,opt,name=log,proto3" json:"log,omitempty"`
|
|
||||||
unknownFields protoimpl.UnknownFields
|
|
||||||
sizeCache protoimpl.SizeCache
|
sizeCache protoimpl.SizeCache
|
||||||
|
unknownFields protoimpl.UnknownFields
|
||||||
|
|
||||||
|
Log []byte `protobuf:"bytes,1,opt,name=log,proto3" json:"log,omitempty"`
|
||||||
}
|
}
|
||||||
|
|
||||||
func (x *LogResponseType) Reset() {
|
func (x *LogResponseType) Reset() {
|
||||||
@ -389,13 +387,14 @@ func (x *LogResponseType) GetLog() []byte {
|
|||||||
}
|
}
|
||||||
|
|
||||||
type KubernetesComponent struct {
|
type KubernetesComponent struct {
|
||||||
state protoimpl.MessageState `protogen:"open.v1"`
|
state protoimpl.MessageState
|
||||||
Url string `protobuf:"bytes,1,opt,name=url,proto3" json:"url,omitempty"`
|
|
||||||
Hash string `protobuf:"bytes,2,opt,name=hash,proto3" json:"hash,omitempty"`
|
|
||||||
InstallPath string `protobuf:"bytes,3,opt,name=install_path,json=installPath,proto3" json:"install_path,omitempty"`
|
|
||||||
Extract bool `protobuf:"varint,4,opt,name=extract,proto3" json:"extract,omitempty"`
|
|
||||||
unknownFields protoimpl.UnknownFields
|
|
||||||
sizeCache protoimpl.SizeCache
|
sizeCache protoimpl.SizeCache
|
||||||
|
unknownFields protoimpl.UnknownFields
|
||||||
|
|
||||||
|
Url string `protobuf:"bytes,1,opt,name=url,proto3" json:"url,omitempty"`
|
||||||
|
Hash string `protobuf:"bytes,2,opt,name=hash,proto3" json:"hash,omitempty"`
|
||||||
|
InstallPath string `protobuf:"bytes,3,opt,name=install_path,json=installPath,proto3" json:"install_path,omitempty"`
|
||||||
|
Extract bool `protobuf:"varint,4,opt,name=extract,proto3" json:"extract,omitempty"`
|
||||||
}
|
}
|
||||||
|
|
||||||
func (x *KubernetesComponent) Reset() {
|
func (x *KubernetesComponent) Reset() {
|
||||||
@ -458,55 +457,92 @@ func (x *KubernetesComponent) GetExtract() bool {
|
|||||||
|
|
||||||
var File_bootstrapper_initproto_init_proto protoreflect.FileDescriptor
|
var File_bootstrapper_initproto_init_proto protoreflect.FileDescriptor
|
||||||
|
|
||||||
const file_bootstrapper_initproto_init_proto_rawDesc = "" +
|
var file_bootstrapper_initproto_init_proto_rawDesc = []byte{
|
||||||
"\n" +
|
0x0a, 0x21, 0x62, 0x6f, 0x6f, 0x74, 0x73, 0x74, 0x72, 0x61, 0x70, 0x70, 0x65, 0x72, 0x2f, 0x69,
|
||||||
"!bootstrapper/initproto/init.proto\x12\x04init\x1a-internal/versions/components/components.proto\"\xd0\x03\n" +
|
0x6e, 0x69, 0x74, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x2f, 0x69, 0x6e, 0x69, 0x74, 0x2e, 0x70, 0x72,
|
||||||
"\vInitRequest\x12\x17\n" +
|
0x6f, 0x74, 0x6f, 0x12, 0x04, 0x69, 0x6e, 0x69, 0x74, 0x1a, 0x2d, 0x69, 0x6e, 0x74, 0x65, 0x72,
|
||||||
"\akms_uri\x18\x01 \x01(\tR\x06kmsUri\x12\x1f\n" +
|
0x6e, 0x61, 0x6c, 0x2f, 0x76, 0x65, 0x72, 0x73, 0x69, 0x6f, 0x6e, 0x73, 0x2f, 0x63, 0x6f, 0x6d,
|
||||||
"\vstorage_uri\x18\x02 \x01(\tR\n" +
|
0x70, 0x6f, 0x6e, 0x65, 0x6e, 0x74, 0x73, 0x2f, 0x63, 0x6f, 0x6d, 0x70, 0x6f, 0x6e, 0x65, 0x6e,
|
||||||
"storageUri\x12)\n" +
|
0x74, 0x73, 0x2e, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x22, 0xd0, 0x03, 0x0a, 0x0b, 0x49, 0x6e, 0x69,
|
||||||
"\x10measurement_salt\x18\x03 \x01(\fR\x0fmeasurementSalt\x12-\n" +
|
0x74, 0x52, 0x65, 0x71, 0x75, 0x65, 0x73, 0x74, 0x12, 0x17, 0x0a, 0x07, 0x6b, 0x6d, 0x73, 0x5f,
|
||||||
"\x12kubernetes_version\x18\x05 \x01(\tR\x11kubernetesVersion\x12)\n" +
|
0x75, 0x72, 0x69, 0x18, 0x01, 0x20, 0x01, 0x28, 0x09, 0x52, 0x06, 0x6b, 0x6d, 0x73, 0x55, 0x72,
|
||||||
"\x10conformance_mode\x18\x06 \x01(\bR\x0fconformanceMode\x12J\n" +
|
0x69, 0x12, 0x1f, 0x0a, 0x0b, 0x73, 0x74, 0x6f, 0x72, 0x61, 0x67, 0x65, 0x5f, 0x75, 0x72, 0x69,
|
||||||
"\x15kubernetes_components\x18\a \x03(\v2\x15.components.ComponentR\x14kubernetesComponents\x12\x1f\n" +
|
0x18, 0x02, 0x20, 0x01, 0x28, 0x09, 0x52, 0x0a, 0x73, 0x74, 0x6f, 0x72, 0x61, 0x67, 0x65, 0x55,
|
||||||
"\vinit_secret\x18\b \x01(\fR\n" +
|
0x72, 0x69, 0x12, 0x29, 0x0a, 0x10, 0x6d, 0x65, 0x61, 0x73, 0x75, 0x72, 0x65, 0x6d, 0x65, 0x6e,
|
||||||
"initSecret\x12!\n" +
|
0x74, 0x5f, 0x73, 0x61, 0x6c, 0x74, 0x18, 0x03, 0x20, 0x01, 0x28, 0x0c, 0x52, 0x0f, 0x6d, 0x65,
|
||||||
"\fcluster_name\x18\t \x01(\tR\vclusterName\x12.\n" +
|
0x61, 0x73, 0x75, 0x72, 0x65, 0x6d, 0x65, 0x6e, 0x74, 0x53, 0x61, 0x6c, 0x74, 0x12, 0x2d, 0x0a,
|
||||||
"\x13apiserver_cert_sans\x18\n" +
|
0x12, 0x6b, 0x75, 0x62, 0x65, 0x72, 0x6e, 0x65, 0x74, 0x65, 0x73, 0x5f, 0x76, 0x65, 0x72, 0x73,
|
||||||
" \x03(\tR\x11apiserverCertSans\x12!\n" +
|
0x69, 0x6f, 0x6e, 0x18, 0x05, 0x20, 0x01, 0x28, 0x09, 0x52, 0x11, 0x6b, 0x75, 0x62, 0x65, 0x72,
|
||||||
"\fservice_cidr\x18\v \x01(\tR\vserviceCidrJ\x04\b\x04\x10\x05R\x19cloud_service_account_uri\"\xc1\x01\n" +
|
0x6e, 0x65, 0x74, 0x65, 0x73, 0x56, 0x65, 0x72, 0x73, 0x69, 0x6f, 0x6e, 0x12, 0x29, 0x0a, 0x10,
|
||||||
"\fInitResponse\x12>\n" +
|
0x63, 0x6f, 0x6e, 0x66, 0x6f, 0x72, 0x6d, 0x61, 0x6e, 0x63, 0x65, 0x5f, 0x6d, 0x6f, 0x64, 0x65,
|
||||||
"\finit_success\x18\x01 \x01(\v2\x19.init.InitSuccessResponseH\x00R\vinitSuccess\x12>\n" +
|
0x18, 0x06, 0x20, 0x01, 0x28, 0x08, 0x52, 0x0f, 0x63, 0x6f, 0x6e, 0x66, 0x6f, 0x72, 0x6d, 0x61,
|
||||||
"\finit_failure\x18\x02 \x01(\v2\x19.init.InitFailureResponseH\x00R\vinitFailure\x12)\n" +
|
0x6e, 0x63, 0x65, 0x4d, 0x6f, 0x64, 0x65, 0x12, 0x4a, 0x0a, 0x15, 0x6b, 0x75, 0x62, 0x65, 0x72,
|
||||||
"\x03log\x18\x03 \x01(\v2\x15.init.LogResponseTypeH\x00R\x03logB\x06\n" +
|
0x6e, 0x65, 0x74, 0x65, 0x73, 0x5f, 0x63, 0x6f, 0x6d, 0x70, 0x6f, 0x6e, 0x65, 0x6e, 0x74, 0x73,
|
||||||
"\x04kind\"o\n" +
|
0x18, 0x07, 0x20, 0x03, 0x28, 0x0b, 0x32, 0x15, 0x2e, 0x63, 0x6f, 0x6d, 0x70, 0x6f, 0x6e, 0x65,
|
||||||
"\x13InitSuccessResponse\x12\x1e\n" +
|
0x6e, 0x74, 0x73, 0x2e, 0x43, 0x6f, 0x6d, 0x70, 0x6f, 0x6e, 0x65, 0x6e, 0x74, 0x52, 0x14, 0x6b,
|
||||||
"\n" +
|
0x75, 0x62, 0x65, 0x72, 0x6e, 0x65, 0x74, 0x65, 0x73, 0x43, 0x6f, 0x6d, 0x70, 0x6f, 0x6e, 0x65,
|
||||||
"kubeconfig\x18\x01 \x01(\fR\n" +
|
0x6e, 0x74, 0x73, 0x12, 0x1f, 0x0a, 0x0b, 0x69, 0x6e, 0x69, 0x74, 0x5f, 0x73, 0x65, 0x63, 0x72,
|
||||||
"kubeconfig\x12\x19\n" +
|
0x65, 0x74, 0x18, 0x08, 0x20, 0x01, 0x28, 0x0c, 0x52, 0x0a, 0x69, 0x6e, 0x69, 0x74, 0x53, 0x65,
|
||||||
"\bowner_id\x18\x02 \x01(\fR\aownerId\x12\x1d\n" +
|
0x63, 0x72, 0x65, 0x74, 0x12, 0x21, 0x0a, 0x0c, 0x63, 0x6c, 0x75, 0x73, 0x74, 0x65, 0x72, 0x5f,
|
||||||
"\n" +
|
0x6e, 0x61, 0x6d, 0x65, 0x18, 0x09, 0x20, 0x01, 0x28, 0x09, 0x52, 0x0b, 0x63, 0x6c, 0x75, 0x73,
|
||||||
"cluster_id\x18\x03 \x01(\fR\tclusterId\"+\n" +
|
0x74, 0x65, 0x72, 0x4e, 0x61, 0x6d, 0x65, 0x12, 0x2e, 0x0a, 0x13, 0x61, 0x70, 0x69, 0x73, 0x65,
|
||||||
"\x13InitFailureResponse\x12\x14\n" +
|
0x72, 0x76, 0x65, 0x72, 0x5f, 0x63, 0x65, 0x72, 0x74, 0x5f, 0x73, 0x61, 0x6e, 0x73, 0x18, 0x0a,
|
||||||
"\x05error\x18\x01 \x01(\tR\x05error\"#\n" +
|
0x20, 0x03, 0x28, 0x09, 0x52, 0x11, 0x61, 0x70, 0x69, 0x73, 0x65, 0x72, 0x76, 0x65, 0x72, 0x43,
|
||||||
"\x0fLogResponseType\x12\x10\n" +
|
0x65, 0x72, 0x74, 0x53, 0x61, 0x6e, 0x73, 0x12, 0x21, 0x0a, 0x0c, 0x73, 0x65, 0x72, 0x76, 0x69,
|
||||||
"\x03log\x18\x01 \x01(\fR\x03log\"x\n" +
|
0x63, 0x65, 0x5f, 0x63, 0x69, 0x64, 0x72, 0x18, 0x0b, 0x20, 0x01, 0x28, 0x09, 0x52, 0x0b, 0x73,
|
||||||
"\x13KubernetesComponent\x12\x10\n" +
|
0x65, 0x72, 0x76, 0x69, 0x63, 0x65, 0x43, 0x69, 0x64, 0x72, 0x4a, 0x04, 0x08, 0x04, 0x10, 0x05,
|
||||||
"\x03url\x18\x01 \x01(\tR\x03url\x12\x12\n" +
|
0x52, 0x19, 0x63, 0x6c, 0x6f, 0x75, 0x64, 0x5f, 0x73, 0x65, 0x72, 0x76, 0x69, 0x63, 0x65, 0x5f,
|
||||||
"\x04hash\x18\x02 \x01(\tR\x04hash\x12!\n" +
|
0x61, 0x63, 0x63, 0x6f, 0x75, 0x6e, 0x74, 0x5f, 0x75, 0x72, 0x69, 0x22, 0xc1, 0x01, 0x0a, 0x0c,
|
||||||
"\finstall_path\x18\x03 \x01(\tR\vinstallPath\x12\x18\n" +
|
0x49, 0x6e, 0x69, 0x74, 0x52, 0x65, 0x73, 0x70, 0x6f, 0x6e, 0x73, 0x65, 0x12, 0x3e, 0x0a, 0x0c,
|
||||||
"\aextract\x18\x04 \x01(\bR\aextract26\n" +
|
0x69, 0x6e, 0x69, 0x74, 0x5f, 0x73, 0x75, 0x63, 0x63, 0x65, 0x73, 0x73, 0x18, 0x01, 0x20, 0x01,
|
||||||
"\x03API\x12/\n" +
|
0x28, 0x0b, 0x32, 0x19, 0x2e, 0x69, 0x6e, 0x69, 0x74, 0x2e, 0x49, 0x6e, 0x69, 0x74, 0x53, 0x75,
|
||||||
"\x04Init\x12\x11.init.InitRequest\x1a\x12.init.InitResponse0\x01B@Z>github.com/edgelesssys/constellation/v2/bootstrapper/initprotob\x06proto3"
|
0x63, 0x63, 0x65, 0x73, 0x73, 0x52, 0x65, 0x73, 0x70, 0x6f, 0x6e, 0x73, 0x65, 0x48, 0x00, 0x52,
|
||||||
|
0x0b, 0x69, 0x6e, 0x69, 0x74, 0x53, 0x75, 0x63, 0x63, 0x65, 0x73, 0x73, 0x12, 0x3e, 0x0a, 0x0c,
|
||||||
|
0x69, 0x6e, 0x69, 0x74, 0x5f, 0x66, 0x61, 0x69, 0x6c, 0x75, 0x72, 0x65, 0x18, 0x02, 0x20, 0x01,
|
||||||
|
0x28, 0x0b, 0x32, 0x19, 0x2e, 0x69, 0x6e, 0x69, 0x74, 0x2e, 0x49, 0x6e, 0x69, 0x74, 0x46, 0x61,
|
||||||
|
0x69, 0x6c, 0x75, 0x72, 0x65, 0x52, 0x65, 0x73, 0x70, 0x6f, 0x6e, 0x73, 0x65, 0x48, 0x00, 0x52,
|
||||||
|
0x0b, 0x69, 0x6e, 0x69, 0x74, 0x46, 0x61, 0x69, 0x6c, 0x75, 0x72, 0x65, 0x12, 0x29, 0x0a, 0x03,
|
||||||
|
0x6c, 0x6f, 0x67, 0x18, 0x03, 0x20, 0x01, 0x28, 0x0b, 0x32, 0x15, 0x2e, 0x69, 0x6e, 0x69, 0x74,
|
||||||
|
0x2e, 0x4c, 0x6f, 0x67, 0x52, 0x65, 0x73, 0x70, 0x6f, 0x6e, 0x73, 0x65, 0x54, 0x79, 0x70, 0x65,
|
||||||
|
0x48, 0x00, 0x52, 0x03, 0x6c, 0x6f, 0x67, 0x42, 0x06, 0x0a, 0x04, 0x6b, 0x69, 0x6e, 0x64, 0x22,
|
||||||
|
0x6f, 0x0a, 0x13, 0x49, 0x6e, 0x69, 0x74, 0x53, 0x75, 0x63, 0x63, 0x65, 0x73, 0x73, 0x52, 0x65,
|
||||||
|
0x73, 0x70, 0x6f, 0x6e, 0x73, 0x65, 0x12, 0x1e, 0x0a, 0x0a, 0x6b, 0x75, 0x62, 0x65, 0x63, 0x6f,
|
||||||
|
0x6e, 0x66, 0x69, 0x67, 0x18, 0x01, 0x20, 0x01, 0x28, 0x0c, 0x52, 0x0a, 0x6b, 0x75, 0x62, 0x65,
|
||||||
|
0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x12, 0x19, 0x0a, 0x08, 0x6f, 0x77, 0x6e, 0x65, 0x72, 0x5f,
|
||||||
|
0x69, 0x64, 0x18, 0x02, 0x20, 0x01, 0x28, 0x0c, 0x52, 0x07, 0x6f, 0x77, 0x6e, 0x65, 0x72, 0x49,
|
||||||
|
0x64, 0x12, 0x1d, 0x0a, 0x0a, 0x63, 0x6c, 0x75, 0x73, 0x74, 0x65, 0x72, 0x5f, 0x69, 0x64, 0x18,
|
||||||
|
0x03, 0x20, 0x01, 0x28, 0x0c, 0x52, 0x09, 0x63, 0x6c, 0x75, 0x73, 0x74, 0x65, 0x72, 0x49, 0x64,
|
||||||
|
0x22, 0x2b, 0x0a, 0x13, 0x49, 0x6e, 0x69, 0x74, 0x46, 0x61, 0x69, 0x6c, 0x75, 0x72, 0x65, 0x52,
|
||||||
|
0x65, 0x73, 0x70, 0x6f, 0x6e, 0x73, 0x65, 0x12, 0x14, 0x0a, 0x05, 0x65, 0x72, 0x72, 0x6f, 0x72,
|
||||||
|
0x18, 0x01, 0x20, 0x01, 0x28, 0x09, 0x52, 0x05, 0x65, 0x72, 0x72, 0x6f, 0x72, 0x22, 0x23, 0x0a,
|
||||||
|
0x0f, 0x4c, 0x6f, 0x67, 0x52, 0x65, 0x73, 0x70, 0x6f, 0x6e, 0x73, 0x65, 0x54, 0x79, 0x70, 0x65,
|
||||||
|
0x12, 0x10, 0x0a, 0x03, 0x6c, 0x6f, 0x67, 0x18, 0x01, 0x20, 0x01, 0x28, 0x0c, 0x52, 0x03, 0x6c,
|
||||||
|
0x6f, 0x67, 0x22, 0x78, 0x0a, 0x13, 0x4b, 0x75, 0x62, 0x65, 0x72, 0x6e, 0x65, 0x74, 0x65, 0x73,
|
||||||
|
0x43, 0x6f, 0x6d, 0x70, 0x6f, 0x6e, 0x65, 0x6e, 0x74, 0x12, 0x10, 0x0a, 0x03, 0x75, 0x72, 0x6c,
|
||||||
|
0x18, 0x01, 0x20, 0x01, 0x28, 0x09, 0x52, 0x03, 0x75, 0x72, 0x6c, 0x12, 0x12, 0x0a, 0x04, 0x68,
|
||||||
|
0x61, 0x73, 0x68, 0x18, 0x02, 0x20, 0x01, 0x28, 0x09, 0x52, 0x04, 0x68, 0x61, 0x73, 0x68, 0x12,
|
||||||
|
0x21, 0x0a, 0x0c, 0x69, 0x6e, 0x73, 0x74, 0x61, 0x6c, 0x6c, 0x5f, 0x70, 0x61, 0x74, 0x68, 0x18,
|
||||||
|
0x03, 0x20, 0x01, 0x28, 0x09, 0x52, 0x0b, 0x69, 0x6e, 0x73, 0x74, 0x61, 0x6c, 0x6c, 0x50, 0x61,
|
||||||
|
0x74, 0x68, 0x12, 0x18, 0x0a, 0x07, 0x65, 0x78, 0x74, 0x72, 0x61, 0x63, 0x74, 0x18, 0x04, 0x20,
|
||||||
|
0x01, 0x28, 0x08, 0x52, 0x07, 0x65, 0x78, 0x74, 0x72, 0x61, 0x63, 0x74, 0x32, 0x36, 0x0a, 0x03,
|
||||||
|
0x41, 0x50, 0x49, 0x12, 0x2f, 0x0a, 0x04, 0x49, 0x6e, 0x69, 0x74, 0x12, 0x11, 0x2e, 0x69, 0x6e,
|
||||||
|
0x69, 0x74, 0x2e, 0x49, 0x6e, 0x69, 0x74, 0x52, 0x65, 0x71, 0x75, 0x65, 0x73, 0x74, 0x1a, 0x12,
|
||||||
|
0x2e, 0x69, 0x6e, 0x69, 0x74, 0x2e, 0x49, 0x6e, 0x69, 0x74, 0x52, 0x65, 0x73, 0x70, 0x6f, 0x6e,
|
||||||
|
0x73, 0x65, 0x30, 0x01, 0x42, 0x40, 0x5a, 0x3e, 0x67, 0x69, 0x74, 0x68, 0x75, 0x62, 0x2e, 0x63,
|
||||||
|
0x6f, 0x6d, 0x2f, 0x65, 0x64, 0x67, 0x65, 0x6c, 0x65, 0x73, 0x73, 0x73, 0x79, 0x73, 0x2f, 0x63,
|
||||||
|
0x6f, 0x6e, 0x73, 0x74, 0x65, 0x6c, 0x6c, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x2f, 0x76, 0x32, 0x2f,
|
||||||
|
0x62, 0x6f, 0x6f, 0x74, 0x73, 0x74, 0x72, 0x61, 0x70, 0x70, 0x65, 0x72, 0x2f, 0x69, 0x6e, 0x69,
|
||||||
|
0x74, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x62, 0x06, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x33,
|
||||||
|
}
|
||||||
|
|
||||||
var (
|
var (
|
||||||
file_bootstrapper_initproto_init_proto_rawDescOnce sync.Once
|
file_bootstrapper_initproto_init_proto_rawDescOnce sync.Once
|
||||||
file_bootstrapper_initproto_init_proto_rawDescData []byte
|
file_bootstrapper_initproto_init_proto_rawDescData = file_bootstrapper_initproto_init_proto_rawDesc
|
||||||
)
|
)
|
||||||
|
|
||||||
func file_bootstrapper_initproto_init_proto_rawDescGZIP() []byte {
|
func file_bootstrapper_initproto_init_proto_rawDescGZIP() []byte {
|
||||||
file_bootstrapper_initproto_init_proto_rawDescOnce.Do(func() {
|
file_bootstrapper_initproto_init_proto_rawDescOnce.Do(func() {
|
||||||
file_bootstrapper_initproto_init_proto_rawDescData = protoimpl.X.CompressGZIP(unsafe.Slice(unsafe.StringData(file_bootstrapper_initproto_init_proto_rawDesc), len(file_bootstrapper_initproto_init_proto_rawDesc)))
|
file_bootstrapper_initproto_init_proto_rawDescData = protoimpl.X.CompressGZIP(file_bootstrapper_initproto_init_proto_rawDescData)
|
||||||
})
|
})
|
||||||
return file_bootstrapper_initproto_init_proto_rawDescData
|
return file_bootstrapper_initproto_init_proto_rawDescData
|
||||||
}
|
}
|
||||||
@ -549,7 +585,7 @@ func file_bootstrapper_initproto_init_proto_init() {
|
|||||||
out := protoimpl.TypeBuilder{
|
out := protoimpl.TypeBuilder{
|
||||||
File: protoimpl.DescBuilder{
|
File: protoimpl.DescBuilder{
|
||||||
GoPackagePath: reflect.TypeOf(x{}).PkgPath(),
|
GoPackagePath: reflect.TypeOf(x{}).PkgPath(),
|
||||||
RawDescriptor: unsafe.Slice(unsafe.StringData(file_bootstrapper_initproto_init_proto_rawDesc), len(file_bootstrapper_initproto_init_proto_rawDesc)),
|
RawDescriptor: file_bootstrapper_initproto_init_proto_rawDesc,
|
||||||
NumEnums: 0,
|
NumEnums: 0,
|
||||||
NumMessages: 6,
|
NumMessages: 6,
|
||||||
NumExtensions: 0,
|
NumExtensions: 0,
|
||||||
@ -560,6 +596,7 @@ func file_bootstrapper_initproto_init_proto_init() {
|
|||||||
MessageInfos: file_bootstrapper_initproto_init_proto_msgTypes,
|
MessageInfos: file_bootstrapper_initproto_init_proto_msgTypes,
|
||||||
}.Build()
|
}.Build()
|
||||||
File_bootstrapper_initproto_init_proto = out.File
|
File_bootstrapper_initproto_init_proto = out.File
|
||||||
|
file_bootstrapper_initproto_init_proto_rawDesc = nil
|
||||||
file_bootstrapper_initproto_init_proto_goTypes = nil
|
file_bootstrapper_initproto_init_proto_goTypes = nil
|
||||||
file_bootstrapper_initproto_init_proto_depIdxs = nil
|
file_bootstrapper_initproto_init_proto_depIdxs = nil
|
||||||
}
|
}
|
||||||
|
@ -11,7 +11,6 @@ go_library(
|
|||||||
"//bootstrapper/internal/journald",
|
"//bootstrapper/internal/journald",
|
||||||
"//internal/atls",
|
"//internal/atls",
|
||||||
"//internal/attestation",
|
"//internal/attestation",
|
||||||
"//internal/constants",
|
|
||||||
"//internal/crypto",
|
"//internal/crypto",
|
||||||
"//internal/file",
|
"//internal/file",
|
||||||
"//internal/grpc/atlscredentials",
|
"//internal/grpc/atlscredentials",
|
||||||
@ -27,7 +26,6 @@ go_library(
|
|||||||
"@org_golang_google_grpc//keepalive",
|
"@org_golang_google_grpc//keepalive",
|
||||||
"@org_golang_google_grpc//status",
|
"@org_golang_google_grpc//status",
|
||||||
"@org_golang_x_crypto//bcrypt",
|
"@org_golang_x_crypto//bcrypt",
|
||||||
"@org_golang_x_crypto//ssh",
|
|
||||||
],
|
],
|
||||||
)
|
)
|
||||||
|
|
||||||
|
@ -20,7 +20,6 @@ package initserver
|
|||||||
import (
|
import (
|
||||||
"bufio"
|
"bufio"
|
||||||
"context"
|
"context"
|
||||||
"crypto/ed25519"
|
|
||||||
"errors"
|
"errors"
|
||||||
"fmt"
|
"fmt"
|
||||||
"io"
|
"io"
|
||||||
@ -34,7 +33,6 @@ import (
|
|||||||
"github.com/edgelesssys/constellation/v2/bootstrapper/internal/journald"
|
"github.com/edgelesssys/constellation/v2/bootstrapper/internal/journald"
|
||||||
"github.com/edgelesssys/constellation/v2/internal/atls"
|
"github.com/edgelesssys/constellation/v2/internal/atls"
|
||||||
"github.com/edgelesssys/constellation/v2/internal/attestation"
|
"github.com/edgelesssys/constellation/v2/internal/attestation"
|
||||||
"github.com/edgelesssys/constellation/v2/internal/constants"
|
|
||||||
"github.com/edgelesssys/constellation/v2/internal/crypto"
|
"github.com/edgelesssys/constellation/v2/internal/crypto"
|
||||||
"github.com/edgelesssys/constellation/v2/internal/file"
|
"github.com/edgelesssys/constellation/v2/internal/file"
|
||||||
"github.com/edgelesssys/constellation/v2/internal/grpc/atlscredentials"
|
"github.com/edgelesssys/constellation/v2/internal/grpc/atlscredentials"
|
||||||
@ -46,7 +44,6 @@ import (
|
|||||||
"github.com/edgelesssys/constellation/v2/internal/role"
|
"github.com/edgelesssys/constellation/v2/internal/role"
|
||||||
"github.com/edgelesssys/constellation/v2/internal/versions/components"
|
"github.com/edgelesssys/constellation/v2/internal/versions/components"
|
||||||
"golang.org/x/crypto/bcrypt"
|
"golang.org/x/crypto/bcrypt"
|
||||||
"golang.org/x/crypto/ssh"
|
|
||||||
"google.golang.org/grpc"
|
"google.golang.org/grpc"
|
||||||
"google.golang.org/grpc/codes"
|
"google.golang.org/grpc/codes"
|
||||||
"google.golang.org/grpc/keepalive"
|
"google.golang.org/grpc/keepalive"
|
||||||
@ -225,28 +222,6 @@ func (s *Server) Init(req *initproto.InitRequest, stream initproto.API_InitServe
|
|||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
|
|
||||||
// Derive the emergency ssh CA key
|
|
||||||
key, err := cloudKms.GetDEK(stream.Context(), crypto.DEKPrefix+constants.SSHCAKeySuffix, ed25519.SeedSize)
|
|
||||||
if err != nil {
|
|
||||||
if e := s.sendLogsWithMessage(stream, status.Errorf(codes.Internal, "retrieving DEK for key derivation: %s", err)); e != nil {
|
|
||||||
err = errors.Join(err, e)
|
|
||||||
}
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
ca, err := crypto.GenerateEmergencySSHCAKey(key)
|
|
||||||
if err != nil {
|
|
||||||
if e := s.sendLogsWithMessage(stream, status.Errorf(codes.Internal, "generating emergency SSH CA key: %s", err)); e != nil {
|
|
||||||
err = errors.Join(err, e)
|
|
||||||
}
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
if err := s.fileHandler.Write(constants.SSHCAKeyPath, ssh.MarshalAuthorizedKey(ca.PublicKey()), file.OptMkdirAll); err != nil {
|
|
||||||
if e := s.sendLogsWithMessage(stream, status.Errorf(codes.Internal, "writing ssh CA pubkey: %s", err)); e != nil {
|
|
||||||
err = errors.Join(err, e)
|
|
||||||
}
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
|
|
||||||
clusterName := req.ClusterName
|
clusterName := req.ClusterName
|
||||||
if clusterName == "" {
|
if clusterName == "" {
|
||||||
clusterName = "constellation"
|
clusterName = "constellation"
|
||||||
|
@ -67,7 +67,7 @@ func TestNew(t *testing.T) {
|
|||||||
assert := assert.New(t)
|
assert := assert.New(t)
|
||||||
|
|
||||||
server, err := New(
|
server, err := New(
|
||||||
t.Context(), newFakeLock(), &stubClusterInitializer{}, atls.NewFakeIssuer(variant.Dummy{}),
|
context.TODO(), newFakeLock(), &stubClusterInitializer{}, atls.NewFakeIssuer(variant.Dummy{}),
|
||||||
&stubDisk{}, fh, &tc.metadata, logger.NewTest(t),
|
&stubDisk{}, fh, &tc.metadata, logger.NewTest(t),
|
||||||
)
|
)
|
||||||
if tc.wantErr {
|
if tc.wantErr {
|
||||||
@ -352,9 +352,9 @@ func TestSetupDisk(t *testing.T) {
|
|||||||
|
|
||||||
masterSecret := uri.MasterSecret{Key: tc.masterKey, Salt: tc.salt}
|
masterSecret := uri.MasterSecret{Key: tc.masterKey, Salt: tc.salt}
|
||||||
|
|
||||||
cloudKms, err := kmssetup.KMS(t.Context(), uri.NoStoreURI, masterSecret.EncodeToURI())
|
cloudKms, err := kmssetup.KMS(context.Background(), uri.NoStoreURI, masterSecret.EncodeToURI())
|
||||||
require.NoError(err)
|
require.NoError(err)
|
||||||
assert.NoError(server.setupDisk(t.Context(), cloudKms))
|
assert.NoError(server.setupDisk(context.Background(), cloudKms))
|
||||||
})
|
})
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -271,10 +271,6 @@ func (c *JoinClient) startNodeAndJoin(ticket *joinproto.IssueJoinTicketResponse,
|
|||||||
return fmt.Errorf("writing kubelet key: %w", err)
|
return fmt.Errorf("writing kubelet key: %w", err)
|
||||||
}
|
}
|
||||||
|
|
||||||
if err := c.fileHandler.Write(constants.SSHCAKeyPath, ticket.AuthorizedCaPublicKey, file.OptMkdirAll); err != nil {
|
|
||||||
return fmt.Errorf("writing ssh ca key: %w", err)
|
|
||||||
}
|
|
||||||
|
|
||||||
state := nodestate.NodeState{
|
state := nodestate.NodeState{
|
||||||
Role: c.role,
|
Role: c.role,
|
||||||
MeasurementSalt: ticket.MeasurementSalt,
|
MeasurementSalt: ticket.MeasurementSalt,
|
||||||
|
@ -50,8 +50,6 @@ func TestClient(t *testing.T) {
|
|||||||
{Role: role.ControlPlane, Name: "node-4", VPCIP: "192.0.2.2"},
|
{Role: role.ControlPlane, Name: "node-4", VPCIP: "192.0.2.2"},
|
||||||
{Role: role.ControlPlane, Name: "node-5", VPCIP: "192.0.2.3"},
|
{Role: role.ControlPlane, Name: "node-5", VPCIP: "192.0.2.3"},
|
||||||
}
|
}
|
||||||
caDerivationKey := make([]byte, 256)
|
|
||||||
respCaKey := &joinproto.IssueJoinTicketResponse{AuthorizedCaPublicKey: caDerivationKey}
|
|
||||||
|
|
||||||
testCases := map[string]struct {
|
testCases := map[string]struct {
|
||||||
role role.Role
|
role role.Role
|
||||||
@ -71,7 +69,7 @@ func TestClient(t *testing.T) {
|
|||||||
selfAnswer{err: assert.AnError},
|
selfAnswer{err: assert.AnError},
|
||||||
selfAnswer{instance: workerSelf},
|
selfAnswer{instance: workerSelf},
|
||||||
listAnswer{instances: peers},
|
listAnswer{instances: peers},
|
||||||
issueJoinTicketAnswer{resp: respCaKey},
|
issueJoinTicketAnswer{},
|
||||||
},
|
},
|
||||||
clusterJoiner: &stubClusterJoiner{},
|
clusterJoiner: &stubClusterJoiner{},
|
||||||
nodeLock: newFakeLock(),
|
nodeLock: newFakeLock(),
|
||||||
@ -87,7 +85,7 @@ func TestClient(t *testing.T) {
|
|||||||
selfAnswer{instance: metadata.InstanceMetadata{Name: "node-1"}},
|
selfAnswer{instance: metadata.InstanceMetadata{Name: "node-1"}},
|
||||||
selfAnswer{instance: workerSelf},
|
selfAnswer{instance: workerSelf},
|
||||||
listAnswer{instances: peers},
|
listAnswer{instances: peers},
|
||||||
issueJoinTicketAnswer{resp: respCaKey},
|
issueJoinTicketAnswer{},
|
||||||
},
|
},
|
||||||
clusterJoiner: &stubClusterJoiner{},
|
clusterJoiner: &stubClusterJoiner{},
|
||||||
nodeLock: newFakeLock(),
|
nodeLock: newFakeLock(),
|
||||||
@ -103,7 +101,7 @@ func TestClient(t *testing.T) {
|
|||||||
listAnswer{err: assert.AnError},
|
listAnswer{err: assert.AnError},
|
||||||
listAnswer{err: assert.AnError},
|
listAnswer{err: assert.AnError},
|
||||||
listAnswer{instances: peers},
|
listAnswer{instances: peers},
|
||||||
issueJoinTicketAnswer{resp: respCaKey},
|
issueJoinTicketAnswer{},
|
||||||
},
|
},
|
||||||
clusterJoiner: &stubClusterJoiner{},
|
clusterJoiner: &stubClusterJoiner{},
|
||||||
nodeLock: newFakeLock(),
|
nodeLock: newFakeLock(),
|
||||||
@ -119,7 +117,7 @@ func TestClient(t *testing.T) {
|
|||||||
listAnswer{},
|
listAnswer{},
|
||||||
listAnswer{},
|
listAnswer{},
|
||||||
listAnswer{instances: peers},
|
listAnswer{instances: peers},
|
||||||
issueJoinTicketAnswer{resp: respCaKey},
|
issueJoinTicketAnswer{},
|
||||||
},
|
},
|
||||||
clusterJoiner: &stubClusterJoiner{},
|
clusterJoiner: &stubClusterJoiner{},
|
||||||
nodeLock: newFakeLock(),
|
nodeLock: newFakeLock(),
|
||||||
@ -136,7 +134,7 @@ func TestClient(t *testing.T) {
|
|||||||
listAnswer{instances: peers},
|
listAnswer{instances: peers},
|
||||||
issueJoinTicketAnswer{err: assert.AnError},
|
issueJoinTicketAnswer{err: assert.AnError},
|
||||||
listAnswer{instances: peers},
|
listAnswer{instances: peers},
|
||||||
issueJoinTicketAnswer{resp: respCaKey},
|
issueJoinTicketAnswer{},
|
||||||
},
|
},
|
||||||
clusterJoiner: &stubClusterJoiner{},
|
clusterJoiner: &stubClusterJoiner{},
|
||||||
nodeLock: newFakeLock(),
|
nodeLock: newFakeLock(),
|
||||||
@ -153,7 +151,7 @@ func TestClient(t *testing.T) {
|
|||||||
listAnswer{instances: peers},
|
listAnswer{instances: peers},
|
||||||
issueJoinTicketAnswer{err: assert.AnError},
|
issueJoinTicketAnswer{err: assert.AnError},
|
||||||
listAnswer{instances: peers},
|
listAnswer{instances: peers},
|
||||||
issueJoinTicketAnswer{resp: respCaKey},
|
issueJoinTicketAnswer{},
|
||||||
},
|
},
|
||||||
clusterJoiner: &stubClusterJoiner{},
|
clusterJoiner: &stubClusterJoiner{},
|
||||||
nodeLock: newFakeLock(),
|
nodeLock: newFakeLock(),
|
||||||
@ -166,7 +164,7 @@ func TestClient(t *testing.T) {
|
|||||||
apiAnswers: []any{
|
apiAnswers: []any{
|
||||||
selfAnswer{instance: controlSelf},
|
selfAnswer{instance: controlSelf},
|
||||||
listAnswer{instances: peers},
|
listAnswer{instances: peers},
|
||||||
issueJoinTicketAnswer{resp: respCaKey},
|
issueJoinTicketAnswer{},
|
||||||
},
|
},
|
||||||
clusterJoiner: &stubClusterJoiner{numBadCalls: -1, joinClusterErr: assert.AnError},
|
clusterJoiner: &stubClusterJoiner{numBadCalls: -1, joinClusterErr: assert.AnError},
|
||||||
nodeLock: newFakeLock(),
|
nodeLock: newFakeLock(),
|
||||||
@ -179,7 +177,7 @@ func TestClient(t *testing.T) {
|
|||||||
apiAnswers: []any{
|
apiAnswers: []any{
|
||||||
selfAnswer{instance: controlSelf},
|
selfAnswer{instance: controlSelf},
|
||||||
listAnswer{instances: peers},
|
listAnswer{instances: peers},
|
||||||
issueJoinTicketAnswer{resp: respCaKey},
|
issueJoinTicketAnswer{},
|
||||||
},
|
},
|
||||||
clusterJoiner: &stubClusterJoiner{numBadCalls: 1, joinClusterErr: assert.AnError},
|
clusterJoiner: &stubClusterJoiner{numBadCalls: 1, joinClusterErr: assert.AnError},
|
||||||
nodeLock: newFakeLock(),
|
nodeLock: newFakeLock(),
|
||||||
@ -193,7 +191,7 @@ func TestClient(t *testing.T) {
|
|||||||
apiAnswers: []any{
|
apiAnswers: []any{
|
||||||
selfAnswer{instance: controlSelf},
|
selfAnswer{instance: controlSelf},
|
||||||
listAnswer{instances: peers},
|
listAnswer{instances: peers},
|
||||||
issueJoinTicketAnswer{resp: respCaKey},
|
issueJoinTicketAnswer{},
|
||||||
},
|
},
|
||||||
clusterJoiner: &stubClusterJoiner{},
|
clusterJoiner: &stubClusterJoiner{},
|
||||||
nodeLock: lockedLock,
|
nodeLock: lockedLock,
|
||||||
|
@ -28,7 +28,6 @@ go_library(
|
|||||||
"@io_k8s_kubelet//config/v1beta1",
|
"@io_k8s_kubelet//config/v1beta1",
|
||||||
"@io_k8s_kubernetes//cmd/kubeadm/app/apis/kubeadm/v1beta3",
|
"@io_k8s_kubernetes//cmd/kubeadm/app/apis/kubeadm/v1beta3",
|
||||||
"@io_k8s_kubernetes//cmd/kubeadm/app/constants",
|
"@io_k8s_kubernetes//cmd/kubeadm/app/constants",
|
||||||
"@org_golang_x_mod//semver",
|
|
||||||
],
|
],
|
||||||
)
|
)
|
||||||
|
|
||||||
|
@ -12,7 +12,6 @@ import (
|
|||||||
"github.com/edgelesssys/constellation/v2/bootstrapper/internal/certificate"
|
"github.com/edgelesssys/constellation/v2/bootstrapper/internal/certificate"
|
||||||
"github.com/edgelesssys/constellation/v2/internal/constants"
|
"github.com/edgelesssys/constellation/v2/internal/constants"
|
||||||
"github.com/edgelesssys/constellation/v2/internal/kubernetes"
|
"github.com/edgelesssys/constellation/v2/internal/kubernetes"
|
||||||
"golang.org/x/mod/semver"
|
|
||||||
corev1 "k8s.io/api/core/v1"
|
corev1 "k8s.io/api/core/v1"
|
||||||
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||||
kubeletconf "k8s.io/kubelet/config/v1beta1"
|
kubeletconf "k8s.io/kubelet/config/v1beta1"
|
||||||
@ -39,7 +38,7 @@ func (c *KubdeadmConfiguration) InitConfiguration(externalCloudProvider bool, cl
|
|||||||
cloudProvider = "external"
|
cloudProvider = "external"
|
||||||
}
|
}
|
||||||
|
|
||||||
initConfig := KubeadmInitYAML{
|
return KubeadmInitYAML{
|
||||||
InitConfiguration: kubeadm.InitConfiguration{
|
InitConfiguration: kubeadm.InitConfiguration{
|
||||||
TypeMeta: metav1.TypeMeta{
|
TypeMeta: metav1.TypeMeta{
|
||||||
APIVersion: kubeadm.SchemeGroupVersion.String(),
|
APIVersion: kubeadm.SchemeGroupVersion.String(),
|
||||||
@ -158,11 +157,6 @@ func (c *KubdeadmConfiguration) InitConfiguration(externalCloudProvider bool, cl
|
|||||||
TLSPrivateKeyFile: certificate.KeyFilename,
|
TLSPrivateKeyFile: certificate.KeyFilename,
|
||||||
},
|
},
|
||||||
}
|
}
|
||||||
|
|
||||||
if semver.Compare(clusterVersion, "v1.31.0") >= 0 {
|
|
||||||
initConfig.ClusterConfiguration.FeatureGates = map[string]bool{"ControlPlaneKubeletLocalMode": true}
|
|
||||||
}
|
|
||||||
return initConfig
|
|
||||||
}
|
}
|
||||||
|
|
||||||
// JoinConfiguration returns a new kubeadm join configuration.
|
// JoinConfiguration returns a new kubeadm join configuration.
|
||||||
|
@ -201,7 +201,7 @@ func TestInitCluster(t *testing.T) {
|
|||||||
}
|
}
|
||||||
|
|
||||||
_, err := kube.InitCluster(
|
_, err := kube.InitCluster(
|
||||||
t.Context(), string(tc.k8sVersion), "kubernetes",
|
context.Background(), string(tc.k8sVersion), "kubernetes",
|
||||||
false, nil, nil, "",
|
false, nil, nil, "",
|
||||||
)
|
)
|
||||||
|
|
||||||
@ -384,7 +384,7 @@ func TestJoinCluster(t *testing.T) {
|
|||||||
log: logger.NewTest(t),
|
log: logger.NewTest(t),
|
||||||
}
|
}
|
||||||
|
|
||||||
err := kube.JoinCluster(t.Context(), joinCommand, tc.role, tc.k8sComponents)
|
err := kube.JoinCluster(context.Background(), joinCommand, tc.role, tc.k8sComponents)
|
||||||
if tc.wantErr {
|
if tc.wantErr {
|
||||||
assert.Error(err)
|
assert.Error(err)
|
||||||
return
|
return
|
||||||
|
@ -39,7 +39,7 @@ func TestCloudKubeAPIWaiter(t *testing.T) {
|
|||||||
require := require.New(t)
|
require := require.New(t)
|
||||||
|
|
||||||
waiter := &CloudKubeAPIWaiter{}
|
waiter := &CloudKubeAPIWaiter{}
|
||||||
ctx, cancel := context.WithTimeout(t.Context(), 0)
|
ctx, cancel := context.WithTimeout(context.Background(), 0)
|
||||||
defer cancel()
|
defer cancel()
|
||||||
err := waiter.Wait(ctx, tc.kubeClient)
|
err := waiter.Wait(ctx, tc.kubeClient)
|
||||||
if tc.wantErr {
|
if tc.wantErr {
|
||||||
|
Some files were not shown because too many files have changed in this diff Show More
Loading…
x
Reference in New Issue
Block a user