mirror of
https://github.com/edgelesssys/constellation.git
synced 2025-04-19 06:55:58 -04:00
Compare commits
225 Commits
Author | SHA1 | Date | |
---|---|---|---|
![]() |
0fb43e03b1 | ||
![]() |
d6567ec52d | ||
![]() |
a5a7cec11b | ||
![]() |
3489b6d772 | ||
![]() |
532f39755e | ||
![]() |
abac61b577 | ||
![]() |
4a93870d1d | ||
![]() |
19b8705a01 | ||
![]() |
129d745fc4 | ||
![]() |
69e9e54ae3 | ||
![]() |
36049f9a5d | ||
![]() |
54876024c3 | ||
![]() |
5ea950305c | ||
![]() |
e46726cf13 | ||
![]() |
97a313ae0d | ||
![]() |
9efaf7efe1 | ||
![]() |
620b4c7da4 | ||
![]() |
4db767d89a | ||
![]() |
db63cd1659 | ||
![]() |
55ffe967e4 | ||
![]() |
8e6c934741 | ||
![]() |
667da042bc | ||
![]() |
4e5c213b4d | ||
![]() |
a7f9561a3d | ||
![]() |
bfab84ce1c | ||
![]() |
2fdb533798 | ||
![]() |
518070ee78 | ||
![]() |
934c6339ee | ||
![]() |
ad250ac78f | ||
![]() |
819ec9a22c | ||
![]() |
e5d22ebcaf | ||
![]() |
0926b82a65 | ||
![]() |
d742243cdc | ||
![]() |
ae50f8b500 | ||
![]() |
ba0865706e | ||
![]() |
1079fba200 | ||
![]() |
fa21c55f5d | ||
![]() |
88ca92509c | ||
![]() |
b52639d2b8 | ||
![]() |
ebc962ad68 | ||
![]() |
5ab11ab996 | ||
![]() |
c4d8fe3741 | ||
![]() |
700eb60614 | ||
![]() |
810c8448d9 | ||
![]() |
3e6777c3e5 | ||
![]() |
7b550bbf09 | ||
![]() |
accfd4e041 | ||
![]() |
67efbd43a5 | ||
![]() |
4dab6759bb | ||
![]() |
5a1b7b7944 | ||
![]() |
be146cdb22 | ||
![]() |
f5cd6a9d0b | ||
![]() |
18e67e7deb | ||
![]() |
66815a4a47 | ||
![]() |
83e08e3e37 | ||
![]() |
3cc930fa97 | ||
![]() |
c7369fa2a7 | ||
![]() |
ec46c97d4c | ||
![]() |
4a9d265579 | ||
![]() |
906e93b95c | ||
![]() |
41396b21e5 | ||
![]() |
ddff16badb | ||
![]() |
53c3d12feb | ||
![]() |
e001a8ec8f | ||
![]() |
be9f78cdc7 | ||
![]() |
3ccc7910aa | ||
![]() |
f4840de69e | ||
![]() |
b42f9dfb4f | ||
![]() |
b0a22270f8 | ||
![]() |
a67818f447 | ||
![]() |
0de14a2e60 | ||
![]() |
f64dc96e7a | ||
![]() |
7f52752cbd | ||
![]() |
dbb7c5b0fd | ||
![]() |
cf2e83c723 | ||
![]() |
df06022e9e | ||
![]() |
eb9dc01425 | ||
![]() |
368b52a4dd | ||
![]() |
b08bfd327d | ||
![]() |
fa8b0bab79 | ||
![]() |
e5d1aab7d8 | ||
![]() |
39bca12491 | ||
![]() |
4b9b101378 | ||
![]() |
a491cac57a | ||
![]() |
a1e24742a9 | ||
![]() |
b4b6df2676 | ||
![]() |
f56693c139 | ||
![]() |
f66c03e0c8 | ||
![]() |
ddbcda848b | ||
![]() |
fab1c8e149 | ||
![]() |
494eb265c6 | ||
![]() |
810a6ecac5 | ||
![]() |
08f740d5db | ||
![]() |
84075ca052 | ||
![]() |
7fdece4d6c | ||
![]() |
6225d910de | ||
![]() |
44d20385d2 | ||
![]() |
c5b9208472 | ||
![]() |
ca6cc22beb | ||
![]() |
60663ebe75 | ||
![]() |
60604fdc5e | ||
![]() |
e95c60c3fc | ||
![]() |
10e39c4d7c | ||
![]() |
9e1578aca1 | ||
![]() |
0ccaa00026 | ||
![]() |
473b04abd5 | ||
![]() |
fb609b23b0 | ||
![]() |
d97e60fea5 | ||
![]() |
144d5e9d06 | ||
![]() |
a65176ee06 | ||
![]() |
159e60d8bb | ||
![]() |
148cb1e150 | ||
![]() |
99a81cd246 | ||
![]() |
f8a95de174 | ||
![]() |
758191ad42 | ||
![]() |
28ae7de4ea | ||
![]() |
d208251df1 | ||
![]() |
0abd06053c | ||
![]() |
b204b3c59b | ||
![]() |
df2383ab09 | ||
![]() |
28e92b9732 | ||
![]() |
1551f8884e | ||
![]() |
c39ecc8a82 | ||
![]() |
571c81cfd5 | ||
![]() |
4d79ce2773 | ||
![]() |
cb77e7bb0d | ||
![]() |
3fa29a5ee8 | ||
![]() |
f81c357f51 | ||
![]() |
6d42d9b40e | ||
![]() |
f41c7619e1 | ||
![]() |
f1e30863c1 | ||
![]() |
245700ee54 | ||
![]() |
76b642baf9 | ||
![]() |
ad364f2089 | ||
![]() |
681a341b8f | ||
![]() |
0e4f3a0716 | ||
![]() |
706d1dff15 | ||
![]() |
e6048e093b | ||
![]() |
1faf2dd1b8 | ||
![]() |
bb994d5a01 | ||
![]() |
7242a1eb74 | ||
![]() |
8da08bec8d | ||
![]() |
8e8c44e35a | ||
![]() |
148b82e32c | ||
![]() |
e44adf85d4 | ||
![]() |
3af498fbfe | ||
![]() |
bda3d802dc | ||
![]() |
808631f530 | ||
![]() |
3f702ecda9 | ||
![]() |
12cfd7006b | ||
![]() |
caa80783eb | ||
![]() |
501d1779ed | ||
![]() |
bea2f33efc | ||
![]() |
92d7fc5385 | ||
![]() |
e9a6513346 | ||
![]() |
ebbe61727c | ||
![]() |
44e898e187 | ||
![]() |
f048ebb8e8 | ||
![]() |
f789b8efc7 | ||
![]() |
c6db8bd46b | ||
![]() |
2216098a9b | ||
![]() |
679edd79d4 | ||
![]() |
22d093cc6f | ||
![]() |
53e937522f | ||
![]() |
40754753a2 | ||
![]() |
56b061e84b | ||
![]() |
576add30d1 | ||
![]() |
c24e149b12 | ||
![]() |
3a898e9cff | ||
![]() |
b996a4cbae | ||
![]() |
9a969548e4 | ||
![]() |
cef2436065 | ||
![]() |
188e51bba1 | ||
![]() |
4cffde5036 | ||
![]() |
405d0c6154 | ||
![]() |
1459ab96fe | ||
![]() |
6ba47d5634 | ||
![]() |
0272e7dd15 | ||
![]() |
99c8a1eb11 | ||
![]() |
e3f29ecf4d | ||
![]() |
f10376fd44 | ||
![]() |
e8771e2dab | ||
![]() |
d9ab8c76e0 | ||
![]() |
126dbd69d9 | ||
![]() |
0d2bedbca3 | ||
![]() |
2fad395bb5 | ||
![]() |
2ba6b66cee | ||
![]() |
9f59990c7d | ||
![]() |
91ffc68189 | ||
![]() |
094f5e87a6 | ||
![]() |
40e25c3046 | ||
![]() |
88f26bc161 | ||
![]() |
7dd743b69e | ||
![]() |
19e54a0174 | ||
![]() |
44612b1d93 | ||
![]() |
3d9d386538 | ||
![]() |
fcf778e73c | ||
![]() |
c467ff603b | ||
![]() |
50ab77e37a | ||
![]() |
ba0b2521ab | ||
![]() |
abe54a2f7a | ||
![]() |
4b4afffee7 | ||
![]() |
1b050a636f | ||
![]() |
8496b4ce46 | ||
![]() |
2da6c7d911 | ||
![]() |
2da0ed6da0 | ||
![]() |
1495a7f6dd | ||
![]() |
7d0aca054b | ||
![]() |
be1deb7d4b | ||
![]() |
37e21b2ff0 | ||
![]() |
54878ddc56 | ||
![]() |
7a7b6b3655 | ||
![]() |
eb08fe1025 | ||
![]() |
2596d7c1c2 | ||
![]() |
64b395dba8 | ||
![]() |
59b9d54c44 | ||
![]() |
23354f23a5 | ||
![]() |
cdb3e461bb | ||
![]() |
d346848aac | ||
![]() |
469cae4658 | ||
![]() |
d7728fe3ba | ||
![]() |
36f8c6d540 | ||
![]() |
4bf607529b | ||
![]() |
224e6e397c | ||
![]() |
ab2782a2a2 |
@ -1 +1 @@
|
||||
7.3.2
|
||||
7.6.0
|
||||
|
2
.github/actions/artifact_download/action.yml
vendored
2
.github/actions/artifact_download/action.yml
vendored
@ -28,7 +28,7 @@ runs:
|
||||
run: echo "directory=$(mktemp -d)" >> "$GITHUB_OUTPUT"
|
||||
|
||||
- name: Download the artifact
|
||||
uses: actions/download-artifact@fa0a91b85d4f404e444e00e005971372dc801d16 # v4.1.8
|
||||
uses: actions/download-artifact@95815c38cf2ff2164869cbab79da8d1f422bc89e # v4.2.1
|
||||
with:
|
||||
name: ${{ inputs.name }}
|
||||
path: ${{ steps.tempdir.outputs.directory }}
|
||||
|
2
.github/actions/artifact_upload/action.yml
vendored
2
.github/actions/artifact_upload/action.yml
vendored
@ -69,7 +69,7 @@ runs:
|
||||
done
|
||||
|
||||
- name: Upload archive as artifact
|
||||
uses: actions/upload-artifact@b4b15b8c7c6ac21ea08fcf65892d2ee8f75cf882 # v4.4.3
|
||||
uses: actions/upload-artifact@ea165f8d65b6e75b540449e92b4886f43607fa02 # v4.6.2
|
||||
with:
|
||||
name: ${{ inputs.name }}
|
||||
path: ${{ steps.tempdir.outputs.directory }}/archive.7z
|
||||
|
2
.github/actions/build_cli/action.yml
vendored
2
.github/actions/build_cli/action.yml
vendored
@ -79,7 +79,7 @@ runs:
|
||||
# once it has the functionality
|
||||
- name: Install Cosign
|
||||
if: inputs.cosignPublicKey != '' && inputs.cosignPrivateKey != '' && inputs.cosignPassword != ''
|
||||
uses: sigstore/cosign-installer@dc72c7d5c4d10cd6bcb8cf6e3fd625a9e5e537da # v3.7.0
|
||||
uses: sigstore/cosign-installer@d7d6bc7722e3daa8354c50bcb52f4837da5e9b6a # v3.8.1
|
||||
|
||||
- name: Install Rekor
|
||||
if: inputs.cosignPublicKey != '' && inputs.cosignPrivateKey != '' && inputs.cosignPassword != ''
|
||||
|
@ -42,7 +42,7 @@ runs:
|
||||
|
||||
- name: Docker metadata
|
||||
id: meta
|
||||
uses: docker/metadata-action@369eb591f429131d6889c46b94e711f089e6ca96 # v5.6.1
|
||||
uses: docker/metadata-action@902fa8ec7d6ecbf8d84d538b9b233a880e428804 # v5.7.0
|
||||
with:
|
||||
images: |
|
||||
ghcr.io/${{ github.repository }}/${{ inputs.name }}
|
||||
@ -62,7 +62,7 @@ runs:
|
||||
|
||||
- name: Build and push container image
|
||||
id: build-micro-service
|
||||
uses: docker/build-push-action@48aba3b46d1b1fec4febb7c5d0c644b249a11355 # v6.10.0
|
||||
uses: docker/build-push-action@471d1dc4e07e5cdedd4c2171150001c434f0b7a4 # v6.15.0
|
||||
with:
|
||||
context: .
|
||||
file: ${{ inputs.dockerfile }}
|
||||
|
4
.github/actions/cdbg_deploy/action.yml
vendored
4
.github/actions/cdbg_deploy/action.yml
vendored
@ -61,7 +61,7 @@ runs:
|
||||
|
||||
- name: Login to AWS (IAM service principal)
|
||||
if: inputs.cloudProvider == 'aws'
|
||||
uses: aws-actions/configure-aws-credentials@e3dd6a429d7300a6a4c196c26e071d42e0343502 # v4.0.2
|
||||
uses: aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1.0
|
||||
with:
|
||||
role-to-assume: arn:aws:iam::795746500882:role/GithubActionsE2EIAM
|
||||
aws-region: eu-central-1
|
||||
@ -80,7 +80,7 @@ runs:
|
||||
|
||||
- name: Login to AWS (Cluster service principal)
|
||||
if: inputs.cloudProvider == 'aws'
|
||||
uses: aws-actions/configure-aws-credentials@e3dd6a429d7300a6a4c196c26e071d42e0343502 # v4.0.2
|
||||
uses: aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1.0
|
||||
with:
|
||||
role-to-assume: arn:aws:iam::795746500882:role/GithubActionsE2ECluster
|
||||
aws-region: eu-central-1
|
||||
|
64
.github/actions/check_measurements_reproducibility/action.yml
vendored
Normal file
64
.github/actions/check_measurements_reproducibility/action.yml
vendored
Normal file
@ -0,0 +1,64 @@
|
||||
name: Check measurements reproducibility
|
||||
description: Check if the measurements of a given release are reproducible.
|
||||
|
||||
inputs:
|
||||
version:
|
||||
type: string
|
||||
description: The version of the measurements that are downloaded from the CDN.
|
||||
required: true
|
||||
ref:
|
||||
type: string
|
||||
description: The git ref to check out. You probably want this to be the tag of the release you are testing.
|
||||
required: true
|
||||
|
||||
runs:
|
||||
using: "composite"
|
||||
steps:
|
||||
- name: Checkout
|
||||
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
|
||||
with:
|
||||
ref: ${{ inputs.ref }}
|
||||
path: ./release
|
||||
|
||||
- name: Set up bazel
|
||||
uses: ./.github/actions/setup_bazel_nix
|
||||
with:
|
||||
useCache: "false"
|
||||
nixTools: |
|
||||
systemdUkify
|
||||
jq
|
||||
jd-diff-patch
|
||||
moreutils
|
||||
|
||||
- name: Allow unrestricted user namespaces
|
||||
shell: bash
|
||||
run: |
|
||||
sudo sysctl --ignore --write kernel.apparmor_restrict_unprivileged_unconfined=0
|
||||
sudo sysctl --ignore --write kernel.apparmor_restrict_unprivileged_userns=0
|
||||
|
||||
- name: Build images
|
||||
id: build-images
|
||||
shell: bash
|
||||
run: |
|
||||
set -euo pipefail
|
||||
|
||||
# Build required binaries
|
||||
pushd release
|
||||
bazel build //image/system:stable
|
||||
echo "buildPath=$PWD/bazel-bin/image" | tee -a "$GITHUB_OUTPUT"
|
||||
popd
|
||||
|
||||
- name: Download measurements
|
||||
shell: bash
|
||||
run: |
|
||||
curl -fsLO https://cdn.confidential.cloud/constellation/v2/ref/-/stream/stable/${{ inputs.version }}/image/measurements.json
|
||||
|
||||
- name: Cleanup release measurements and generate our own
|
||||
shell: bash
|
||||
run: |
|
||||
${{ github.action_path }}/create_measurements.sh "${{ steps.build-images.outputs.buildPath }}"
|
||||
|
||||
- name: Compare measurements
|
||||
shell: bash
|
||||
run: |
|
||||
${{ github.action_path }}/compare_measurements.sh "${{ steps.build-images.outputs.buildPath }}"
|
31
.github/actions/check_measurements_reproducibility/compare_measurements.sh
vendored
Executable file
31
.github/actions/check_measurements_reproducibility/compare_measurements.sh
vendored
Executable file
@ -0,0 +1,31 @@
|
||||
#!/usr/bin/env bash
|
||||
# no -e since we need to collect errors later
|
||||
# no -u since it interferes with checking associative arrays
|
||||
set -o pipefail
|
||||
shopt -s extglob
|
||||
|
||||
declare -A errors
|
||||
|
||||
for directory in "$1"/system/!(mkosi_wrapper.sh); do
|
||||
dirname="$(basename "$directory")"
|
||||
attestationVariant="$(echo "$dirname" | cut -d_ -f2)"
|
||||
|
||||
echo "Their measurements for $attestationVariant:"
|
||||
ts " " < "$attestationVariant"_their-measurements.json
|
||||
echo "Own measurements for $attestationVariant:"
|
||||
ts " " < "$attestationVariant"_own-measurements.json
|
||||
|
||||
diff="$(jd ./"$attestationVariant"_their-measurements.json ./"$attestationVariant"_own-measurements.json)"
|
||||
if [[ -n $diff ]]; then
|
||||
errors["$attestationVariant"]="$diff"
|
||||
fi
|
||||
done
|
||||
|
||||
for attestationVariant in "${!errors[@]}"; do
|
||||
echo "Failed to reproduce measurements for $attestationVariant:"
|
||||
echo "${errors["$attestationVariant"]}" | ts " "
|
||||
done
|
||||
|
||||
if [[ ${#errors[@]} -ne 0 ]]; then
|
||||
exit 1
|
||||
fi
|
28
.github/actions/check_measurements_reproducibility/create_measurements.sh
vendored
Executable file
28
.github/actions/check_measurements_reproducibility/create_measurements.sh
vendored
Executable file
@ -0,0 +1,28 @@
|
||||
#!/usr/bin/env bash
|
||||
set -euo pipefail
|
||||
shopt -s extglob
|
||||
|
||||
for directory in "$1"/system/!(mkosi_wrapper.sh); do
|
||||
dirname="$(basename "$directory")"
|
||||
csp="$(echo "$dirname" | cut -d_ -f1)"
|
||||
attestationVariant="$(echo "$dirname" | cut -d_ -f2)"
|
||||
|
||||
# This jq filter selects the measurements for the correct CSP and attestation variant
|
||||
# and then removes all `warnOnly: true` measurements.
|
||||
jq --arg attestation_variant "$attestationVariant" --arg csp "$csp" \
|
||||
'
|
||||
.list.[]
|
||||
| select(
|
||||
.attestationVariant == $attestation_variant
|
||||
and (.csp | ascii_downcase) == $csp
|
||||
)
|
||||
| .measurements
|
||||
| to_entries
|
||||
| map(select(.value.warnOnly | not))
|
||||
| from_entries
|
||||
| del(.[] .warnOnly)
|
||||
' \
|
||||
measurements.json > "$attestationVariant"_their-measurements.json
|
||||
|
||||
bazel run --run_under "sudo --preserve-env" //image/measured-boot/cmd -- "$directory/constellation" /dev/stdout | jq '.measurements' > ./"$attestationVariant"_own-measurements.json
|
||||
done
|
13
.github/actions/constellation_create/action.yml
vendored
13
.github/actions/constellation_create/action.yml
vendored
@ -257,9 +257,9 @@ runs:
|
||||
continue-on-error: true
|
||||
uses: ./.github/actions/artifact_upload
|
||||
with:
|
||||
name: serial-logs-${{ inputs.artifactNameSuffix }}
|
||||
path: >
|
||||
!(terraform).log
|
||||
name: debug-logs-${{ inputs.artifactNameSuffix }}
|
||||
path: |
|
||||
*.log
|
||||
encryptionSecret: ${{ inputs.encryptionSecret }}
|
||||
|
||||
- name: Prepare terraform state folders
|
||||
@ -268,9 +268,12 @@ runs:
|
||||
run: |
|
||||
mkdir to-zip
|
||||
cp -r constellation-terraform to-zip
|
||||
cp -r constellation-iam-terraform to-zip
|
||||
# constellation-iam-terraform is optional
|
||||
if [ -d constellation-iam-terraform ]; then
|
||||
cp -r constellation-iam-terraform to-zip
|
||||
fi
|
||||
rm -f to-zip/constellation-terraform/plan.zip
|
||||
rm -rf to-zip/constellation-terraform/.terraform to-zip/constellation-iam-terraform/.terraform
|
||||
rm -rf to-zip/*/.terraform
|
||||
|
||||
- name: Upload terraform state
|
||||
if: always()
|
||||
|
@ -67,7 +67,7 @@ runs:
|
||||
|
||||
- name: Login to AWS (Cluster role)
|
||||
if: inputs.cloudProvider == 'aws'
|
||||
uses: aws-actions/configure-aws-credentials@e3dd6a429d7300a6a4c196c26e071d42e0343502 # v4.0.2
|
||||
uses: aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1.0
|
||||
with:
|
||||
role-to-assume: arn:aws:iam::795746500882:role/GithubActionsE2ECluster
|
||||
aws-region: eu-central-1
|
||||
|
@ -42,6 +42,15 @@ inputs:
|
||||
gcpZone:
|
||||
description: "The GCP zone to deploy Constellation in."
|
||||
required: false
|
||||
#
|
||||
# STACKIT specific inputs
|
||||
#
|
||||
stackitZone:
|
||||
description: "The STACKIT zone to deploy Constellation in."
|
||||
required: false
|
||||
stackitProjectID:
|
||||
description: "The STACKIT project ID to deploy Constellation in."
|
||||
required: false
|
||||
|
||||
runs:
|
||||
using: "composite"
|
||||
@ -93,6 +102,7 @@ runs:
|
||||
--tf-log=DEBUG \
|
||||
--yes ${extraFlags}
|
||||
|
||||
# TODO(@3u13r): Replace deprecated --serviceAccountID with --prefix
|
||||
- name: Constellation iam create gcp
|
||||
shell: bash
|
||||
if: inputs.cloudProvider == 'gcp'
|
||||
@ -104,3 +114,13 @@ runs:
|
||||
--update-config \
|
||||
--tf-log=DEBUG \
|
||||
--yes
|
||||
|
||||
- name: Set STACKIT-specific configuration
|
||||
shell: bash
|
||||
if: inputs.cloudProvider == 'stackit'
|
||||
env:
|
||||
STACKIT_PROJECT_ID: ${{ inputs.stackitProjectID }}
|
||||
run: |
|
||||
yq eval -i "(.provider.openstack.stackitProjectID) = \"${STACKIT_PROJECT_ID}\"" constellation-conf.yaml
|
||||
yq eval -i "(.provider.openstack.availabilityZone) = \"${{ inputs.stackitZone }}\"" constellation-conf.yaml
|
||||
yq eval -i "(.nodeGroups.[].zone) = \"${{ inputs.stackitZone }}\"" constellation-conf.yaml
|
||||
|
@ -23,7 +23,7 @@ runs:
|
||||
|
||||
- name: Login to AWS (IAM role)
|
||||
if: inputs.cloudProvider == 'aws'
|
||||
uses: aws-actions/configure-aws-credentials@e3dd6a429d7300a6a4c196c26e071d42e0343502 # v4.0.2
|
||||
uses: aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1.0
|
||||
with:
|
||||
role-to-assume: arn:aws:iam::795746500882:role/GithubActionsE2EIAM
|
||||
aws-region: eu-central-1
|
||||
|
@ -17,7 +17,7 @@ runs:
|
||||
steps:
|
||||
- name: Use docker for logging in
|
||||
if: runner.os != 'macOS'
|
||||
uses: docker/login-action@9780b0c442fbb1117ed29e0efdff1e18412f7567 # v3.3.0
|
||||
uses: docker/login-action@74a5d142397b4f367a81961eba4e8cd7edddf772 # v3.4.0
|
||||
with:
|
||||
registry: ${{ inputs.registry }}
|
||||
username: ${{ inputs.username }}
|
||||
|
2
.github/actions/container_sbom/action.yml
vendored
2
.github/actions/container_sbom/action.yml
vendored
@ -19,7 +19,7 @@ runs:
|
||||
steps:
|
||||
- name: Install Cosign
|
||||
if: inputs.cosignPublicKey != '' && inputs.cosignPrivateKey != '' && inputs.cosignPassword != ''
|
||||
uses: sigstore/cosign-installer@dc72c7d5c4d10cd6bcb8cf6e3fd625a9e5e537da # v3.7.0
|
||||
uses: sigstore/cosign-installer@d7d6bc7722e3daa8354c50bcb52f4837da5e9b6a # v3.8.1
|
||||
|
||||
- name: Download Syft & Grype
|
||||
uses: ./.github/actions/install_syft_grype
|
||||
|
@ -67,7 +67,7 @@ runs:
|
||||
# Make sure that helm is installed
|
||||
# This is not always the case, e.g. on MacOS runners
|
||||
- name: Install Helm
|
||||
uses: azure/setup-helm@fe7b79cd5ee1e45176fcad797de68ecaf3ca4814 # v4.2.0
|
||||
uses: azure/setup-helm@b9e51907a09c216f16ebe8536097933489208112 # v4.3.0
|
||||
with:
|
||||
version: v3.9.0
|
||||
|
||||
|
@ -5,51 +5,51 @@ runs:
|
||||
using: "composite"
|
||||
steps:
|
||||
- name: Download CLI binaries darwin-amd64
|
||||
uses: actions/download-artifact@fa0a91b85d4f404e444e00e005971372dc801d16 # v4.1.8
|
||||
uses: actions/download-artifact@95815c38cf2ff2164869cbab79da8d1f422bc89e # v4.2.1
|
||||
with:
|
||||
name: constellation-darwin-amd64
|
||||
|
||||
- name: Download CLI binaries darwin-arm64
|
||||
uses: actions/download-artifact@fa0a91b85d4f404e444e00e005971372dc801d16 # v4.1.8
|
||||
uses: actions/download-artifact@95815c38cf2ff2164869cbab79da8d1f422bc89e # v4.2.1
|
||||
with:
|
||||
name: constellation-darwin-arm64
|
||||
|
||||
- name: Download CLI binaries linux-amd64
|
||||
uses: actions/download-artifact@fa0a91b85d4f404e444e00e005971372dc801d16 # v4.1.8
|
||||
uses: actions/download-artifact@95815c38cf2ff2164869cbab79da8d1f422bc89e # v4.2.1
|
||||
with:
|
||||
name: constellation-linux-amd64
|
||||
|
||||
- name: Download CLI binaries linux-arm64
|
||||
uses: actions/download-artifact@fa0a91b85d4f404e444e00e005971372dc801d16 # v4.1.8
|
||||
uses: actions/download-artifact@95815c38cf2ff2164869cbab79da8d1f422bc89e # v4.2.1
|
||||
with:
|
||||
name: constellation-linux-arm64
|
||||
|
||||
- name: Download CLI binaries windows-amd64
|
||||
uses: actions/download-artifact@fa0a91b85d4f404e444e00e005971372dc801d16 # v4.1.8
|
||||
uses: actions/download-artifact@95815c38cf2ff2164869cbab79da8d1f422bc89e # v4.2.1
|
||||
with:
|
||||
name: constellation-windows-amd64
|
||||
|
||||
- name: Download Terraform module
|
||||
uses: actions/download-artifact@fa0a91b85d4f404e444e00e005971372dc801d16 # v4.1.8
|
||||
uses: actions/download-artifact@95815c38cf2ff2164869cbab79da8d1f422bc89e # v4.2.1
|
||||
with:
|
||||
name: terraform-module
|
||||
|
||||
- name: Download Terraform provider binary darwin-amd64
|
||||
uses: actions/download-artifact@fa0a91b85d4f404e444e00e005971372dc801d16 # v4.1.8
|
||||
uses: actions/download-artifact@95815c38cf2ff2164869cbab79da8d1f422bc89e # v4.2.1
|
||||
with:
|
||||
name: terraform-provider-constellation-darwin-amd64
|
||||
|
||||
- name: Download Terraform provider binary darwin-arm64
|
||||
uses: actions/download-artifact@fa0a91b85d4f404e444e00e005971372dc801d16 # v4.1.8
|
||||
uses: actions/download-artifact@95815c38cf2ff2164869cbab79da8d1f422bc89e # v4.2.1
|
||||
with:
|
||||
name: terraform-provider-constellation-darwin-arm64
|
||||
|
||||
- name: Download Terraform provider binary linux-amd64
|
||||
uses: actions/download-artifact@fa0a91b85d4f404e444e00e005971372dc801d16 # v4.1.8
|
||||
uses: actions/download-artifact@95815c38cf2ff2164869cbab79da8d1f422bc89e # v4.2.1
|
||||
with:
|
||||
name: terraform-provider-constellation-linux-amd64
|
||||
|
||||
- name: Download Terraform provider binary linux-arm64
|
||||
uses: actions/download-artifact@fa0a91b85d4f404e444e00e005971372dc801d16 # v4.1.8
|
||||
uses: actions/download-artifact@95815c38cf2ff2164869cbab79da8d1f422bc89e # v4.2.1
|
||||
with:
|
||||
name: terraform-provider-constellation-linux-arm64
|
||||
|
@ -19,7 +19,7 @@ runs:
|
||||
uses: ./.github/actions/setup_bazel_nix
|
||||
|
||||
- name: Login to AWS
|
||||
uses: aws-actions/configure-aws-credentials@e3dd6a429d7300a6a4c196c26e071d42e0343502 # v4.0.2
|
||||
uses: aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1.0
|
||||
with:
|
||||
role-to-assume: arn:aws:iam::795746500882:role/GithubTestResourceAPI
|
||||
aws-region: eu-west-1
|
||||
|
6
.github/actions/e2e_benchmark/action.yml
vendored
6
.github/actions/e2e_benchmark/action.yml
vendored
@ -32,9 +32,9 @@ runs:
|
||||
|
||||
steps:
|
||||
- name: Setup python
|
||||
uses: actions/setup-python@0b93645e9fea7318ecaed2b359559ac225c90a2b # v5.3.0
|
||||
uses: actions/setup-python@8d9ed9ac5c53483de85588cdf95a591a75ab9f55 # v5.5.0
|
||||
with:
|
||||
python-version: "3.10"
|
||||
python-version: "3.13"
|
||||
|
||||
- name: Install kubestr
|
||||
shell: bash
|
||||
@ -166,7 +166,7 @@ runs:
|
||||
encryptionSecret: ${{ inputs.encryptionSecret }}
|
||||
|
||||
- name: Assume AWS role to retrieve and update benchmarks in S3
|
||||
uses: aws-actions/configure-aws-credentials@e3dd6a429d7300a6a4c196c26e071d42e0343502 # v4.0.2
|
||||
uses: aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1.0
|
||||
with:
|
||||
role-to-assume: arn:aws:iam::795746500882:role/GithubActionUpdateBenchmarks
|
||||
aws-region: us-east-2
|
||||
|
@ -1,3 +1,3 @@
|
||||
numpy ==1.26.4
|
||||
matplotlib ==3.8.3
|
||||
Pillow ==10.3.0
|
||||
numpy ==2.2.4
|
||||
matplotlib ==3.10.1
|
||||
Pillow ==11.2.1
|
18
.github/actions/e2e_cleanup_timeframe/action.yml
vendored
18
.github/actions/e2e_cleanup_timeframe/action.yml
vendored
@ -11,12 +11,18 @@ inputs:
|
||||
azure_credentials:
|
||||
description: "Credentials authorized to create Constellation on Azure."
|
||||
required: true
|
||||
openStackCloudsYaml:
|
||||
description: "The contents of ~/.config/openstack/clouds.yaml"
|
||||
required: false
|
||||
stackitUat:
|
||||
description: "The UAT for STACKIT"
|
||||
required: false
|
||||
|
||||
runs:
|
||||
using: "composite"
|
||||
steps:
|
||||
- name: Authenticate AWS
|
||||
uses: aws-actions/configure-aws-credentials@e3dd6a429d7300a6a4c196c26e071d42e0343502 # v4.0.2
|
||||
uses: aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1.0
|
||||
with:
|
||||
role-to-assume: arn:aws:iam::795746500882:role/GithubActionsE2EDestroy
|
||||
aws-region: eu-central-1
|
||||
@ -31,6 +37,16 @@ runs:
|
||||
with:
|
||||
service_account: "destroy-e2e@constellation-e2e.iam.gserviceaccount.com"
|
||||
|
||||
- name: Login to OpenStack
|
||||
uses: ./.github/actions/login_openstack
|
||||
with:
|
||||
clouds_yaml: ${{ inputs.openStackCloudsYaml }}
|
||||
|
||||
- name: Login to STACKIT
|
||||
uses: ./.github/actions/login_stackit
|
||||
with:
|
||||
serviceAccountToken: ${{ inputs.stackitUat }}
|
||||
|
||||
- name: Install tools
|
||||
uses: ./.github/actions/setup_bazel_nix
|
||||
with:
|
||||
|
68
.github/actions/e2e_emergency_ssh/action.yml
vendored
Normal file
68
.github/actions/e2e_emergency_ssh/action.yml
vendored
Normal file
@ -0,0 +1,68 @@
|
||||
name: Emergency ssh
|
||||
description: "Verify that an emergency ssh connection can be established."
|
||||
|
||||
inputs:
|
||||
kubeconfig:
|
||||
description: "The kubeconfig file for the cluster."
|
||||
required: true
|
||||
|
||||
runs:
|
||||
using: "composite"
|
||||
steps:
|
||||
- name: Test emergency ssh
|
||||
shell: bash
|
||||
env:
|
||||
KUBECONFIG: ${{ inputs.kubeconfig }}
|
||||
run: |
|
||||
set -euo pipefail
|
||||
|
||||
# Activate emergency ssh access to the cluster
|
||||
pushd ./constellation-terraform
|
||||
echo "emergency_ssh = true" >> terraform.tfvars
|
||||
terraform apply -auto-approve
|
||||
lb="$(terraform output -raw loadbalancer_address)"
|
||||
popd
|
||||
|
||||
# write ssh config
|
||||
cat > ssh_config <<EOF
|
||||
Host $lb
|
||||
ProxyJump none
|
||||
|
||||
Host *
|
||||
StrictHostKeyChecking no
|
||||
UserKnownHostsFile=/dev/null
|
||||
IdentityFile ./access-key
|
||||
PreferredAuthentications publickey
|
||||
CertificateFile=constellation_cert.pub
|
||||
User root
|
||||
ProxyJump $lb
|
||||
EOF
|
||||
|
||||
for i in {1..26}; do
|
||||
if [[ "$i" -eq 26 ]]; then
|
||||
echo "Port 22 never became reachable"
|
||||
exit 1
|
||||
fi
|
||||
echo "Waiting until port 22 is reachable: $i/25"
|
||||
if nc -z -w 25 "$lb" 22; then
|
||||
break
|
||||
fi
|
||||
done
|
||||
|
||||
# generate and try keypair
|
||||
ssh-keygen -t ecdsa -q -N "" -f ./access-key
|
||||
constellation ssh --debug --key ./access-key.pub
|
||||
internalIPs="$(kubectl get nodes -o=jsonpath='{.items[*].status.addresses}' | jq -r '.[] | select(.type == "InternalIP") | .address')"
|
||||
for ip in $internalIPs; do
|
||||
for i in {1..26}; do
|
||||
if [[ "$i" -eq 26 ]]; then
|
||||
echo "Failed to connect to $ip over $lb"
|
||||
exit 1
|
||||
fi
|
||||
echo "Trying connection to $ip over $lb: $i/25"
|
||||
if ssh -F ssh_config -o BatchMode=yes $ip true; then
|
||||
echo "Connected to $ip successfully"
|
||||
break
|
||||
fi
|
||||
done
|
||||
done
|
2
.github/actions/e2e_sonobuoy/action.yml
vendored
2
.github/actions/e2e_sonobuoy/action.yml
vendored
@ -70,7 +70,7 @@ runs:
|
||||
|
||||
- name: Publish test results
|
||||
if: (!env.ACT) && contains(inputs.sonobuoyTestSuiteCmd, '--plugin e2e')
|
||||
uses: mikepenz/action-junit-report@db71d41eb79864e25ab0337e395c352e84523afe # v4.3.1
|
||||
uses: mikepenz/action-junit-report@cf701569b05ccdd861a76b8607a66d76f6fd4857 # v5.5.1
|
||||
with:
|
||||
report_paths: "**/junit_01.xml"
|
||||
fail_on_failure: true
|
||||
|
47
.github/actions/e2e_test/action.yml
vendored
47
.github/actions/e2e_test/action.yml
vendored
@ -56,7 +56,7 @@ inputs:
|
||||
description: "Azure credentials authorized to create an IAM configuration."
|
||||
required: true
|
||||
test:
|
||||
description: "The test to run. Can currently be one of [sonobuoy full, sonobuoy quick, sonobuoy conformance, autoscaling, lb, perf-bench, verify, recover, malicious join, nop, upgrade]."
|
||||
description: "The test to run. Can currently be one of [sonobuoy full, sonobuoy quick, sonobuoy conformance, autoscaling, lb, perf-bench, verify, recover, malicious join, nop, upgrade, emergency ssh]."
|
||||
required: true
|
||||
sonobuoyTestSuiteCmd:
|
||||
description: "The sonobuoy test suite to run."
|
||||
@ -93,6 +93,15 @@ inputs:
|
||||
encryptionSecret:
|
||||
description: "The secret to use for decrypting the artifact."
|
||||
required: true
|
||||
openStackCloudsYaml:
|
||||
description: "The contents of ~/.config/openstack/clouds.yaml"
|
||||
required: false
|
||||
stackitUat:
|
||||
description: "The UAT for STACKIT"
|
||||
required: false
|
||||
stackitProjectID:
|
||||
description: "The STACKIT project ID to deploy Constellation in."
|
||||
required: false
|
||||
|
||||
outputs:
|
||||
kubeconfig:
|
||||
@ -106,7 +115,7 @@ runs:
|
||||
using: "composite"
|
||||
steps:
|
||||
- name: Check input
|
||||
if: (!contains(fromJson('["sonobuoy full", "sonobuoy quick", "sonobuoy conformance", "autoscaling", "perf-bench", "verify", "lb", "recover", "malicious join", "s3proxy", "nop", "upgrade"]'), inputs.test))
|
||||
if: (!contains(fromJson('["sonobuoy full", "sonobuoy quick", "sonobuoy conformance", "autoscaling", "perf-bench", "verify", "lb", "recover", "malicious join", "s3proxy", "nop", "upgrade", "emergency ssh"]'), inputs.test))
|
||||
shell: bash
|
||||
run: |
|
||||
echo "::error::Invalid input for test field: ${{ inputs.test }}"
|
||||
@ -140,6 +149,8 @@ runs:
|
||||
|
||||
- name: Setup bazel
|
||||
uses: ./.github/actions/setup_bazel_nix
|
||||
with:
|
||||
nixTools: terraform
|
||||
|
||||
- name: Log in to the Container registry
|
||||
uses: ./.github/actions/container_registry_login
|
||||
@ -216,7 +227,7 @@ runs:
|
||||
|
||||
- name: Login to AWS (IAM role)
|
||||
if: inputs.cloudProvider == 'aws'
|
||||
uses: aws-actions/configure-aws-credentials@e3dd6a429d7300a6a4c196c26e071d42e0343502 # v4.0.2
|
||||
uses: aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1.0
|
||||
with:
|
||||
role-to-assume: arn:aws:iam::795746500882:role/GithubActionsE2EIAM
|
||||
aws-region: eu-central-1
|
||||
@ -229,12 +240,30 @@ runs:
|
||||
with:
|
||||
azure_credentials: ${{ inputs.azureIAMCreateCredentials }}
|
||||
|
||||
- name: Login to OpenStack
|
||||
if: inputs.cloudProvider == 'stackit'
|
||||
uses: ./.github/actions/login_openstack
|
||||
with:
|
||||
clouds_yaml: ${{inputs.openStackCloudsYaml }}
|
||||
|
||||
- name: Login to STACKIT
|
||||
if: inputs.cloudProvider == 'stackit'
|
||||
uses: ./.github/actions/login_stackit
|
||||
with:
|
||||
serviceAccountToken: ${{ inputs.stackitUat }}
|
||||
|
||||
- name: Create prefix
|
||||
id: create-prefix
|
||||
shell: bash
|
||||
run: |
|
||||
uuid=$(uuidgen | tr "[:upper:]" "[:lower:]")
|
||||
uuid=${uuid%%-*}
|
||||
|
||||
# GCP has a 6 character limit the additional uuid prefix since the full prefix length has a maximum of 24
|
||||
if [[ ${{ inputs.cloudProvider }} == 'gcp' ]]; then
|
||||
uuid=${uuid:0:6}
|
||||
fi
|
||||
|
||||
echo "uuid=${uuid}" | tee -a $GITHUB_OUTPUT
|
||||
echo "prefix=e2e-${{ github.run_id }}-${{ github.run_attempt }}-${uuid}" | tee -a $GITHUB_OUTPUT
|
||||
|
||||
@ -244,7 +273,7 @@ runs:
|
||||
with:
|
||||
attestationVariant: ${{ inputs.attestationVariant }}
|
||||
|
||||
- name: Create IAM configuration
|
||||
- name: Create Constellation config and IAM
|
||||
id: constellation-iam-create
|
||||
uses: ./.github/actions/constellation_iam_create
|
||||
with:
|
||||
@ -256,6 +285,8 @@ runs:
|
||||
azureRegion: ${{ inputs.regionZone || steps.pick-az-region.outputs.region }}
|
||||
gcpProjectID: ${{ inputs.gcpProject }}
|
||||
gcpZone: ${{ inputs.regionZone || 'europe-west3-b' }}
|
||||
stackitZone: ${{ inputs.regionZone || 'eu01-2' }}
|
||||
stackitProjectID: ${{ inputs.stackitProjectID }}
|
||||
kubernetesVersion: ${{ inputs.kubernetesVersion }}
|
||||
additionalTags: "workflow=${{ github.run_id }}"
|
||||
|
||||
@ -267,7 +298,7 @@ runs:
|
||||
|
||||
- name: Login to AWS (Cluster role)
|
||||
if: inputs.cloudProvider == 'aws'
|
||||
uses: aws-actions/configure-aws-credentials@e3dd6a429d7300a6a4c196c26e071d42e0343502 # v4.0.2
|
||||
uses: aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1.0
|
||||
with:
|
||||
role-to-assume: arn:aws:iam::795746500882:role/GithubActionsE2ECluster
|
||||
aws-region: eu-central-1
|
||||
@ -421,3 +452,9 @@ runs:
|
||||
s3AccessKey: ${{ inputs.s3AccessKey }}
|
||||
s3SecretKey: ${{ inputs.s3SecretKey }}
|
||||
githubToken: ${{ inputs.githubToken }}
|
||||
|
||||
- name: Run emergency ssh test
|
||||
if: inputs.test == 'emergency ssh'
|
||||
uses: ./.github/actions/e2e_emergency_ssh
|
||||
with:
|
||||
kubeconfig: ${{ steps.constellation-create.outputs.kubeconfig }}
|
||||
|
2
.github/actions/e2e_verify/action.yml
vendored
2
.github/actions/e2e_verify/action.yml
vendored
@ -82,7 +82,7 @@ runs:
|
||||
|
||||
- name: Login to AWS
|
||||
if: github.ref_name == 'main'
|
||||
uses: aws-actions/configure-aws-credentials@e3dd6a429d7300a6a4c196c26e071d42e0343502 # v4.0.2
|
||||
uses: aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1.0
|
||||
with:
|
||||
role-to-assume: arn:aws:iam::795746500882:role/GitHubConstellationImagePipeline
|
||||
aws-region: eu-central-1
|
||||
|
2
.github/actions/find_latest_image/action.yml
vendored
2
.github/actions/find_latest_image/action.yml
vendored
@ -38,7 +38,7 @@ runs:
|
||||
|
||||
- name: Login to AWS
|
||||
if: inputs.imageVersion == ''
|
||||
uses: aws-actions/configure-aws-credentials@e3dd6a429d7300a6a4c196c26e071d42e0343502 # v4.0.2
|
||||
uses: aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1.0
|
||||
with:
|
||||
role-to-assume: arn:aws:iam::795746500882:role/GithubConstellationVersionsAPIRead
|
||||
aws-region: eu-central-1
|
||||
|
2
.github/actions/login_azure/action.yml
vendored
2
.github/actions/login_azure/action.yml
vendored
@ -10,6 +10,6 @@ runs:
|
||||
# As described at:
|
||||
# https://github.com/Azure/login#configure-deployment-credentials
|
||||
- name: Login to Azure
|
||||
uses: azure/login@a65d910e8af852a8061c627c456678983e180302 # v2.2.0
|
||||
uses: azure/login@a457da9ea143d694b1b9c7c869ebb04ebe844ef5 # v2.3.0
|
||||
with:
|
||||
creds: ${{ inputs.azure_credentials }}
|
||||
|
4
.github/actions/login_gcp/action.yml
vendored
4
.github/actions/login_gcp/action.yml
vendored
@ -20,11 +20,11 @@ runs:
|
||||
echo "GOOGLE_CLOUD_PROJECT=" >> "$GITHUB_ENV"
|
||||
|
||||
- name: Authorize GCP access
|
||||
uses: google-github-actions/auth@6fc4af4b145ae7821d527454aa9bd537d1f2dc5f # v2.1.7
|
||||
uses: google-github-actions/auth@71f986410dfbc7added4569d411d040a91dc6935 # v2.1.8
|
||||
with:
|
||||
workload_identity_provider: projects/1052692473304/locations/global/workloadIdentityPools/constellation-ci-pool/providers/constellation-ci-provider
|
||||
service_account: ${{ inputs.service_account }}
|
||||
|
||||
# Even if preinstalled in Github Actions runner image, this setup does some magic authentication required for gsutil.
|
||||
- name: Set up Cloud SDK
|
||||
uses: google-github-actions/setup-gcloud@6189d56e4096ee891640bb02ac264be376592d6a # v2.1.2
|
||||
uses: google-github-actions/setup-gcloud@77e7a554d41e2ee56fc945c52dfd3f33d12def9a # v2.1.4
|
||||
|
16
.github/actions/login_stackit/action.yml
vendored
Normal file
16
.github/actions/login_stackit/action.yml
vendored
Normal file
@ -0,0 +1,16 @@
|
||||
name: STACKIT login
|
||||
description: "Login to STACKIT"
|
||||
inputs:
|
||||
serviceAccountToken:
|
||||
description: "Credentials authorized to create Constellation on STACKIT."
|
||||
required: true
|
||||
runs:
|
||||
using: "composite"
|
||||
steps:
|
||||
- name: Login to STACKIT
|
||||
env:
|
||||
UAT: ${{ inputs.serviceAccountToken }}
|
||||
shell: bash
|
||||
run: |
|
||||
mkdir -p ~/.stackit
|
||||
echo "${UAT}" > ~/.stackit/credentials.json
|
19
.github/actions/notify_stackit/action.yml
vendored
Normal file
19
.github/actions/notify_stackit/action.yml
vendored
Normal file
@ -0,0 +1,19 @@
|
||||
name: Notify STACKIT
|
||||
description: "Notify STACKIT about test failure"
|
||||
inputs:
|
||||
slackToken:
|
||||
description: "Slack access token."
|
||||
required: true
|
||||
runs:
|
||||
using: "composite"
|
||||
steps:
|
||||
- name: Notify STACKIT
|
||||
env:
|
||||
SLACK_TOKEN: ${{ inputs.slackToken }}
|
||||
shell: bash
|
||||
run: |
|
||||
curl -X POST \
|
||||
-H "Authorization: Bearer $SLACK_TOKEN" \
|
||||
-H "Content-type: application/json; charset=utf-8" \
|
||||
-d "{\"channel\":\"C0827BT59SM\",\"text\":\"E2E test failed: $GITHUB_SERVER_URL/$GITHUB_REPOSITORY/actions/runs/$GITHUB_RUN_ID\"}" \
|
||||
https://slack.com/api/chat.postMessage
|
2
.github/actions/publish_helmchart/action.yml
vendored
2
.github/actions/publish_helmchart/action.yml
vendored
@ -29,7 +29,7 @@ runs:
|
||||
echo version=$(yq eval ".version" ${{ inputs.chartPath }}/Chart.yaml) | tee -a $GITHUB_OUTPUT
|
||||
|
||||
- name: Create pull request
|
||||
uses: peter-evans/create-pull-request@5e914681df9dc83aa4e4905692ca88beb2f9e91f # v7.0.5
|
||||
uses: peter-evans/create-pull-request@271a8d0340265f705b14b6d32b9829c1cb33d45e # v7.0.8
|
||||
with:
|
||||
path: helm
|
||||
branch: "release/s3proxy/${{ steps.update-chart-version.outputs.version }}"
|
||||
|
2
.github/actions/select_image/action.yml
vendored
2
.github/actions/select_image/action.yml
vendored
@ -18,7 +18,7 @@ runs:
|
||||
using: "composite"
|
||||
steps:
|
||||
- name: Login to AWS
|
||||
uses: aws-actions/configure-aws-credentials@e3dd6a429d7300a6a4c196c26e071d42e0343502 # v4.0.2
|
||||
uses: aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1.0
|
||||
with:
|
||||
role-to-assume: arn:aws:iam::795746500882:role/GithubConstellationVersionsAPIRead
|
||||
aws-region: eu-central-1
|
||||
|
7
.github/actions/setup_bazel_nix/action.yml
vendored
7
.github/actions/setup_bazel_nix/action.yml
vendored
@ -75,6 +75,7 @@ runs:
|
||||
echo "$RUNNER_ARCH not supported"
|
||||
exit 1
|
||||
fi
|
||||
echo "nixVersion=$(cat "${{ github.workspace }}/.nixversion")" | tee -a "$GITHUB_OUTPUT"
|
||||
echo "::endgroup::"
|
||||
|
||||
- name: Install current Bash on macOS
|
||||
@ -113,9 +114,9 @@ runs:
|
||||
|
||||
- name: Install nix
|
||||
if: steps.check_inputs.outputs.nixPreinstalled == 'false'
|
||||
uses: cachix/install-nix-action@08dcb3a5e62fa31e2da3d490afc4176ef55ecd72 # v30
|
||||
uses: cachix/install-nix-action@d1ca217b388ee87b2507a9a93bf01368bde7cec2 # v31
|
||||
with:
|
||||
install_url: "https://releases.nixos.org/nix/nix-2.25.2/install"
|
||||
install_url: "https://releases.nixos.org/nix/nix-${{ steps.check_inputs.outputs.nixVersion }}/install"
|
||||
|
||||
- name: Set $USER if not set
|
||||
shell: bash
|
||||
@ -220,7 +221,7 @@ runs:
|
||||
{ tools, repository, rev }:
|
||||
let
|
||||
repoFlake = builtins.getFlake ("github:" + repository + "/" + rev);
|
||||
nixpkgs = repoFlake.inputs.nixpkgsUnstable;
|
||||
nixpkgs = repoFlake.inputs.nixpkgs;
|
||||
pkgs = import nixpkgs { system = builtins.currentSystem; };
|
||||
toolPkgs = map (p: pkgs.${p}) tools;
|
||||
in
|
||||
|
15
.github/actions/terraform_apply/action.yml
vendored
15
.github/actions/terraform_apply/action.yml
vendored
@ -29,6 +29,9 @@ runs:
|
||||
"gcpSEVSNP")
|
||||
attestationVariant="gcp-sev-snp"
|
||||
;;
|
||||
"qemuVTPM")
|
||||
attestationVariant="qemu-vtpm"
|
||||
;;
|
||||
*)
|
||||
echo "Unknown attestation variant: $(yq '.attestation | keys | .[0]' constellation-conf.yaml)"
|
||||
exit 1
|
||||
@ -44,7 +47,7 @@ runs:
|
||||
}
|
||||
random = {
|
||||
source = "hashicorp/random"
|
||||
version = "3.6.3"
|
||||
version = "3.7.1"
|
||||
}
|
||||
}
|
||||
}
|
||||
@ -106,6 +109,16 @@ runs:
|
||||
project_id = "$(yq '.infrastructure.gcp.projectID' constellation-state.yaml)"
|
||||
service_account_key = sensitive("$(cat $(yq '.provider.gcp.serviceAccountKeyPath' constellation-conf.yaml) | base64 -w0)")
|
||||
}
|
||||
openstack = {
|
||||
cloud = "stackit"
|
||||
clouds_yaml_path = "~/.config/openstack/clouds.yaml"
|
||||
floating_ip_pool_id = "970ace5c-458f-484a-a660-0903bcfd91ad"
|
||||
deploy_yawol_load_balancer = true
|
||||
yawol_image_id = "bcd6c13e-75d1-4c3f-bf0f-8f83580cc1be"
|
||||
yawol_flavor_id = "3b11b27e-6c73-470d-b595-1d85b95a8cdf"
|
||||
network_id = "$(yq '.infrastructure.networkID' constellation-state.yaml)"
|
||||
subnet_id = "$(yq '.infrastructure.subnetID' constellation-state.yaml)"
|
||||
}
|
||||
network_config = {
|
||||
ip_cidr_node = "$(yq '.infrastructure.ipCidrNode' constellation-state.yaml)"
|
||||
ip_cidr_service = "$(yq '.serviceCIDR' constellation-conf.yaml)"
|
||||
|
@ -15,7 +15,7 @@ runs:
|
||||
zip -r terraform-module.zip terraform-module
|
||||
|
||||
- name: Upload artifact
|
||||
uses: actions/upload-artifact@b4b15b8c7c6ac21ea08fcf65892d2ee8f75cf882 # v4.4.3
|
||||
uses: actions/upload-artifact@ea165f8d65b6e75b540449e92b4886f43607fa02 # v4.6.2
|
||||
with:
|
||||
name: terraform-module
|
||||
path: terraform-module.zip
|
||||
|
@ -17,11 +17,11 @@ jobs:
|
||||
path: constellation
|
||||
|
||||
- name: Install Nix
|
||||
uses: cachix/install-nix-action@08dcb3a5e62fa31e2da3d490afc4176ef55ecd72 # v30
|
||||
uses: cachix/install-nix-action@d1ca217b388ee87b2507a9a93bf01368bde7cec2 # v31
|
||||
|
||||
- name: Download Firmware release
|
||||
id: download-firmware
|
||||
uses: robinraju/release-downloader@a96f54c1b5f5e09e47d9504526e96febd949d4c2 # v1.11
|
||||
uses: robinraju/release-downloader@daf26c55d821e836577a15f77d86ddc078948b05 # v1.12
|
||||
with:
|
||||
repository: aws/uefi
|
||||
latest: true
|
||||
|
8
.github/workflows/build-ccm-gcp.yml
vendored
8
.github/workflows/build-ccm-gcp.yml
vendored
@ -29,9 +29,9 @@ jobs:
|
||||
fetch-depth: 0
|
||||
|
||||
- name: Setup Go environment
|
||||
uses: actions/setup-go@41dfa10bad2bb2ae585af6ee5bb4d7d973ad74ed # v5.1.0
|
||||
uses: actions/setup-go@0aaccfd150d50ccaeb58ebd88d36e91967a5f35b # v5.4.0
|
||||
with:
|
||||
go-version: "1.23.2"
|
||||
go-version: "1.24.2"
|
||||
cache: false
|
||||
|
||||
- name: Install Crane
|
||||
@ -76,7 +76,7 @@ jobs:
|
||||
|
||||
- name: Docker meta
|
||||
id: meta
|
||||
uses: docker/metadata-action@369eb591f429131d6889c46b94e711f089e6ca96 # v5.6.1
|
||||
uses: docker/metadata-action@902fa8ec7d6ecbf8d84d538b9b233a880e428804 # v5.7.0
|
||||
with:
|
||||
images: |
|
||||
ghcr.io/edgelesssys/cloud-provider-gcp
|
||||
@ -113,7 +113,7 @@ jobs:
|
||||
|
||||
- name: Build and push container image
|
||||
id: build
|
||||
uses: docker/build-push-action@48aba3b46d1b1fec4febb7c5d0c644b249a11355 # v6.10.0
|
||||
uses: docker/build-push-action@471d1dc4e07e5cdedd4c2171150001c434f0b7a4 # v6.15.0
|
||||
with:
|
||||
context: ./cloud-provider-gcp
|
||||
push: ${{ github.ref_name == 'main' }}
|
||||
|
4
.github/workflows/build-gcp-guest-agent.yml
vendored
4
.github/workflows/build-gcp-guest-agent.yml
vendored
@ -85,7 +85,7 @@ jobs:
|
||||
- name: Docker meta
|
||||
id: meta
|
||||
if: steps.needs-build.outputs.out == 'true'
|
||||
uses: docker/metadata-action@369eb591f429131d6889c46b94e711f089e6ca96 # v5.6.1
|
||||
uses: docker/metadata-action@902fa8ec7d6ecbf8d84d538b9b233a880e428804 # v5.7.0
|
||||
with:
|
||||
images: |
|
||||
${{ env.REGISTRY }}/edgelesssys/gcp-guest-agent
|
||||
@ -114,7 +114,7 @@ jobs:
|
||||
- name: Build and push container image
|
||||
if: steps.needs-build.outputs.out == 'true'
|
||||
id: build
|
||||
uses: docker/build-push-action@48aba3b46d1b1fec4febb7c5d0c644b249a11355 # v6.10.0
|
||||
uses: docker/build-push-action@471d1dc4e07e5cdedd4c2171150001c434f0b7a4 # v6.15.0
|
||||
with:
|
||||
context: ./guest-agent
|
||||
file: ./constellation/3rdparty/gcp-guest-agent/Dockerfile
|
||||
|
@ -65,9 +65,9 @@ jobs:
|
||||
token: ${{ secrets.CI_COMMIT_PUSH_PR }}
|
||||
|
||||
- name: Setup Go environment
|
||||
uses: actions/setup-go@41dfa10bad2bb2ae585af6ee5bb4d7d973ad74ed # v5.1.0
|
||||
uses: actions/setup-go@0aaccfd150d50ccaeb58ebd88d36e91967a5f35b # v5.4.0
|
||||
with:
|
||||
go-version: "1.23.2"
|
||||
go-version: "1.24.2"
|
||||
cache: false
|
||||
|
||||
- name: Determine version
|
||||
@ -97,7 +97,7 @@ jobs:
|
||||
run: rm -f internal/attestation/measurements/measurement-generator/generate
|
||||
|
||||
- name: Create pull request
|
||||
uses: peter-evans/create-pull-request@5e914681df9dc83aa4e4905692ca88beb2f9e91f # v7.0.5
|
||||
uses: peter-evans/create-pull-request@271a8d0340265f705b14b6d32b9829c1cb33d45e # v7.0.8
|
||||
with:
|
||||
branch: "image/automated/update-measurements-${{ github.run_number }}"
|
||||
base: main
|
||||
|
8
.github/workflows/build-os-image.yml
vendored
8
.github/workflows/build-os-image.yml
vendored
@ -147,7 +147,7 @@ jobs:
|
||||
useCache: "false"
|
||||
|
||||
- name: Login to AWS
|
||||
uses: aws-actions/configure-aws-credentials@e3dd6a429d7300a6a4c196c26e071d42e0343502 # v4.0.2
|
||||
uses: aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1.0
|
||||
with:
|
||||
role-to-assume: arn:aws:iam::795746500882:role/GitHubConstellationImagePipeline
|
||||
aws-region: eu-central-1
|
||||
@ -167,6 +167,12 @@ jobs:
|
||||
with:
|
||||
clouds_yaml: ${{ secrets.STACKIT_IMAGE_UPLOAD_CLOUDS_YAML }}
|
||||
|
||||
- name: Allow unrestricted user namespaces
|
||||
shell: bash
|
||||
run: |
|
||||
sudo sysctl --ignore --write kernel.apparmor_restrict_unprivileged_unconfined=0
|
||||
sudo sysctl --ignore --write kernel.apparmor_restrict_unprivileged_userns=0
|
||||
|
||||
- name: Build and upload
|
||||
id: build
|
||||
shell: bash
|
||||
|
2
.github/workflows/check-links.yml
vendored
2
.github/workflows/check-links.yml
vendored
@ -25,7 +25,7 @@ jobs:
|
||||
ref: ${{ !github.event.pull_request.head.repo.fork && github.head_ref || '' }}
|
||||
|
||||
- name: Link Checker
|
||||
uses: lycheeverse/lychee-action@f81112d0d2814ded911bd23e3beaa9dda9093915 # v2.1.0
|
||||
uses: lycheeverse/lychee-action@1d97d84f0bc547f7b25f4c2170d87d810dc2fb2c # v2.4.0
|
||||
with:
|
||||
args: "--config ./.lychee.toml './**/*.md' './**/*.html'"
|
||||
fail: true
|
||||
|
25
.github/workflows/check-measurements-reproducibility.yml
vendored
Normal file
25
.github/workflows/check-measurements-reproducibility.yml
vendored
Normal file
@ -0,0 +1,25 @@
|
||||
name: Check measurements reproducibility
|
||||
on:
|
||||
workflow_dispatch:
|
||||
inputs:
|
||||
version:
|
||||
type: string
|
||||
description: The version of the measurements that are downloaded from the CDN.
|
||||
required: true
|
||||
ref:
|
||||
type: string
|
||||
description: The git ref to check out. You probably want this to be the tag of the release you are testing.
|
||||
required: true
|
||||
|
||||
jobs:
|
||||
check-reproducibility:
|
||||
runs-on: ubuntu-24.04
|
||||
steps:
|
||||
- name: Checkout
|
||||
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
|
||||
|
||||
- name: Check reproducibility
|
||||
uses: ./.github/actions/check_measurements_reproducibility
|
||||
with:
|
||||
version: ${{ github.event.inputs.version }}
|
||||
ref: ${{ github.event.inputs.ref }}
|
8
.github/workflows/codeql.yml
vendored
8
.github/workflows/codeql.yml
vendored
@ -38,13 +38,13 @@ jobs:
|
||||
|
||||
- name: Setup Go environment
|
||||
if: matrix.language == 'go'
|
||||
uses: actions/setup-go@41dfa10bad2bb2ae585af6ee5bb4d7d973ad74ed # v5.1.0
|
||||
uses: actions/setup-go@0aaccfd150d50ccaeb58ebd88d36e91967a5f35b # v5.4.0
|
||||
with:
|
||||
go-version: "1.23.2"
|
||||
go-version: "1.24.2"
|
||||
cache: false
|
||||
|
||||
- name: Initialize CodeQL
|
||||
uses: github/codeql-action/init@f09c1c0a94de965c15400f5634aa42fac8fb8f88 # v3.27.5
|
||||
uses: github/codeql-action/init@45775bd8235c68ba998cffa5171334d58593da47 # v3.28.15
|
||||
with:
|
||||
languages: ${{ matrix.language }}
|
||||
|
||||
@ -63,6 +63,6 @@ jobs:
|
||||
echo "::endgroup::"
|
||||
|
||||
- name: Perform CodeQL Analysis
|
||||
uses: github/codeql-action/analyze@f09c1c0a94de965c15400f5634aa42fac8fb8f88 # v3.27.5
|
||||
uses: github/codeql-action/analyze@45775bd8235c68ba998cffa5171334d58593da47 # v3.28.15
|
||||
with:
|
||||
category: "/language:${{ matrix.language }}"
|
||||
|
1
.github/workflows/docs-vale.yml
vendored
1
.github/workflows/docs-vale.yml
vendored
@ -29,3 +29,4 @@ jobs:
|
||||
with:
|
||||
files: docs/docs
|
||||
fail_on_error: true
|
||||
version: 3.9.3
|
||||
|
42
.github/workflows/draft-release.yml
vendored
42
.github/workflows/draft-release.yml
vendored
@ -92,8 +92,8 @@ jobs:
|
||||
cosignPassword: ${{ inputs.key == 'release' && secrets.COSIGN_PASSWORD || secrets.COSIGN_DEV_PASSWORD }}
|
||||
|
||||
- name: Upload CLI as artifact (unix)
|
||||
uses: actions/upload-artifact@b4b15b8c7c6ac21ea08fcf65892d2ee8f75cf882 # v4.4.3
|
||||
if : ${{ matrix.os != 'windows' }}
|
||||
uses: actions/upload-artifact@ea165f8d65b6e75b540449e92b4886f43607fa02 # v4.6.2
|
||||
if: ${{ matrix.os != 'windows' }}
|
||||
with:
|
||||
name: constellation-${{ matrix.os }}-${{ matrix.arch }}
|
||||
path: |
|
||||
@ -101,8 +101,8 @@ jobs:
|
||||
build/constellation-${{ matrix.os }}-${{ matrix.arch }}.sig
|
||||
|
||||
- name: Upload CLI as artifact (windows)
|
||||
uses: actions/upload-artifact@b4b15b8c7c6ac21ea08fcf65892d2ee8f75cf882 # v4.4.3
|
||||
if : ${{ matrix.os == 'windows' }}
|
||||
uses: actions/upload-artifact@ea165f8d65b6e75b540449e92b4886f43607fa02 # v4.6.2
|
||||
if: ${{ matrix.os == 'windows' }}
|
||||
with:
|
||||
name: constellation-${{ matrix.os }}-${{ matrix.arch }}
|
||||
path: |
|
||||
@ -149,16 +149,16 @@ jobs:
|
||||
targetArch: ${{ matrix.arch }}
|
||||
|
||||
- name: Upload Terraform Provider Binary as artifact (unix)
|
||||
uses: actions/upload-artifact@b4b15b8c7c6ac21ea08fcf65892d2ee8f75cf882 # v4.4.3
|
||||
if : ${{ matrix.os != 'windows' }}
|
||||
uses: actions/upload-artifact@ea165f8d65b6e75b540449e92b4886f43607fa02 # v4.6.2
|
||||
if: ${{ matrix.os != 'windows' }}
|
||||
with:
|
||||
name: terraform-provider-constellation-${{ matrix.os }}-${{ matrix.arch }}
|
||||
path: |
|
||||
build/terraform-provider-constellation-${{ matrix.os }}-${{ matrix.arch }}
|
||||
|
||||
- name: Upload Terraform Provider Binary as artifact (windows)
|
||||
uses: actions/upload-artifact@b4b15b8c7c6ac21ea08fcf65892d2ee8f75cf882 # v4.4.3
|
||||
if : ${{ matrix.os == 'windows' }}
|
||||
uses: actions/upload-artifact@ea165f8d65b6e75b540449e92b4886f43607fa02 # v4.6.2
|
||||
if: ${{ matrix.os == 'windows' }}
|
||||
with:
|
||||
name: terraform-provider-constellation-${{ matrix.os }}-${{ matrix.arch }}
|
||||
path: |
|
||||
@ -227,7 +227,7 @@ jobs:
|
||||
uses: ./.github/actions/download_release_binaries
|
||||
|
||||
- name: Download CLI SBOM
|
||||
uses: actions/download-artifact@fa0a91b85d4f404e444e00e005971372dc801d16 # v4.1.8
|
||||
uses: actions/download-artifact@95815c38cf2ff2164869cbab79da8d1f422bc89e # v4.2.1
|
||||
with:
|
||||
name: constellation.spdx.sbom
|
||||
|
||||
@ -261,7 +261,7 @@ jobs:
|
||||
ref: ${{ inputs.ref || github.head_ref }}
|
||||
|
||||
- name: Install Cosign
|
||||
uses: sigstore/cosign-installer@dc72c7d5c4d10cd6bcb8cf6e3fd625a9e5e537da # v3.7.0
|
||||
uses: sigstore/cosign-installer@d7d6bc7722e3daa8354c50bcb52f4837da5e9b6a # v3.8.1
|
||||
|
||||
- name: Download Syft & Grype
|
||||
uses: ./.github/actions/install_syft_grype
|
||||
@ -296,13 +296,13 @@ jobs:
|
||||
COSIGN_PASSWORD: ${{ inputs.key == 'release' && secrets.COSIGN_PASSWORD || secrets.COSIGN_DEV_PASSWORD }}
|
||||
|
||||
- name: Upload Constellation CLI SBOM
|
||||
uses: actions/upload-artifact@b4b15b8c7c6ac21ea08fcf65892d2ee8f75cf882 # v4.4.3
|
||||
uses: actions/upload-artifact@ea165f8d65b6e75b540449e92b4886f43607fa02 # v4.6.2
|
||||
with:
|
||||
name: constellation.spdx.sbom
|
||||
path: constellation.spdx.sbom
|
||||
|
||||
- name: Upload Constellation CLI SBOM's signature
|
||||
uses: actions/upload-artifact@b4b15b8c7c6ac21ea08fcf65892d2ee8f75cf882 # v4.4.3
|
||||
uses: actions/upload-artifact@ea165f8d65b6e75b540449e92b4886f43607fa02 # v4.6.2
|
||||
with:
|
||||
name: constellation.spdx.sbom.sig
|
||||
path: constellation.spdx.sbom.sig
|
||||
@ -316,14 +316,14 @@ jobs:
|
||||
- provenance-subjects
|
||||
# This must not be pinned to digest. See:
|
||||
# https://github.com/slsa-framework/slsa-github-generator#referencing-slsa-builders-and-generators
|
||||
uses: slsa-framework/slsa-github-generator/.github/workflows/generator_generic_slsa3.yml@v2.0.0
|
||||
uses: slsa-framework/slsa-github-generator/.github/workflows/generator_generic_slsa3.yml@v2.1.0
|
||||
with:
|
||||
base64-subjects: "${{ needs.provenance-subjects.outputs.provenance-subjects }}"
|
||||
|
||||
provenance-verify:
|
||||
runs-on: ubuntu-24.04
|
||||
env:
|
||||
SLSA_VERIFIER_VERSION: "2.5.1"
|
||||
SLSA_VERIFIER_VERSION: "2.7.0"
|
||||
needs:
|
||||
- build-cli
|
||||
- provenance
|
||||
@ -340,12 +340,12 @@ jobs:
|
||||
uses: ./.github/actions/download_release_binaries
|
||||
|
||||
- name: Download CLI SBOM
|
||||
uses: actions/download-artifact@fa0a91b85d4f404e444e00e005971372dc801d16 # v4.1.8
|
||||
uses: actions/download-artifact@95815c38cf2ff2164869cbab79da8d1f422bc89e # v4.2.1
|
||||
with:
|
||||
name: constellation.spdx.sbom
|
||||
|
||||
- name: Download provenance
|
||||
uses: actions/download-artifact@fa0a91b85d4f404e444e00e005971372dc801d16 # v4.1.8
|
||||
uses: actions/download-artifact@95815c38cf2ff2164869cbab79da8d1f422bc89e # v4.2.1
|
||||
with:
|
||||
name: ${{ needs.provenance.outputs.provenance-name }}
|
||||
|
||||
@ -418,17 +418,17 @@ jobs:
|
||||
uses: ./.github/actions/download_release_binaries
|
||||
|
||||
- name: Download CLI SBOM
|
||||
uses: actions/download-artifact@fa0a91b85d4f404e444e00e005971372dc801d16 # v4.1.8
|
||||
uses: actions/download-artifact@95815c38cf2ff2164869cbab79da8d1f422bc89e # v4.2.1
|
||||
with:
|
||||
name: constellation.spdx.sbom
|
||||
|
||||
- name: Download Constellation CLI SBOM's signature
|
||||
uses: actions/download-artifact@fa0a91b85d4f404e444e00e005971372dc801d16 # v4.1.8
|
||||
uses: actions/download-artifact@95815c38cf2ff2164869cbab79da8d1f422bc89e # v4.2.1
|
||||
with:
|
||||
name: constellation.spdx.sbom.sig
|
||||
|
||||
- name: Download Constellation provenance
|
||||
uses: actions/download-artifact@fa0a91b85d4f404e444e00e005971372dc801d16 # v4.1.8
|
||||
uses: actions/download-artifact@95815c38cf2ff2164869cbab79da8d1f422bc89e # v4.2.1
|
||||
with:
|
||||
name: ${{ needs.provenance.outputs.provenance-name }}
|
||||
|
||||
@ -472,7 +472,7 @@ jobs:
|
||||
- name: Create release with artifacts
|
||||
id: create-release
|
||||
# GitHub endorsed release project. See: https://github.com/actions/create-release
|
||||
uses: softprops/action-gh-release@01570a1f39cb168c169c802c3bceb9e93fb10974 # v2.1.0
|
||||
uses: softprops/action-gh-release@c95fe1489396fe8a9eb87c0abf8aa5b2ef267fda # v2.2.1
|
||||
with:
|
||||
draft: true
|
||||
generate_release_notes: true
|
||||
@ -487,7 +487,7 @@ jobs:
|
||||
terraform-module.zip
|
||||
|
||||
- name: Create Terraform provider release with artifcats
|
||||
uses: softprops/action-gh-release@01570a1f39cb168c169c802c3bceb9e93fb10974 # v2.1.0
|
||||
uses: softprops/action-gh-release@c95fe1489396fe8a9eb87c0abf8aa5b2ef267fda # v2.2.1
|
||||
with:
|
||||
draft: true
|
||||
generate_release_notes: false
|
||||
|
4
.github/workflows/e2e-cleanup-weekly.yml
vendored
4
.github/workflows/e2e-cleanup-weekly.yml
vendored
@ -4,7 +4,7 @@ on:
|
||||
schedule:
|
||||
- cron: "0 0 * * 0" # At 00:00 every Sunday UTC
|
||||
workflow_dispatch:
|
||||
|
||||
|
||||
|
||||
jobs:
|
||||
cleanup:
|
||||
@ -22,3 +22,5 @@ jobs:
|
||||
ghToken: ${{ secrets.GITHUB_TOKEN }}
|
||||
encryptionSecret: ${{ secrets.ARTIFACT_ENCRYPT_PASSWD }}
|
||||
azure_credentials: ${{ secrets.AZURE_E2E_DESTROY_CREDENTIALS }}
|
||||
openStackCloudsYaml: ${{ secrets.STACKIT_CI_CLOUDS_YAML }}
|
||||
stackitUat: ${{ secrets.STACKIT_CI_UAT }}
|
||||
|
2
.github/workflows/e2e-mini.yml
vendored
2
.github/workflows/e2e-mini.yml
vendored
@ -34,7 +34,7 @@ jobs:
|
||||
ref: ${{ inputs.ref || github.event.workflow_run.head_branch || github.head_ref }}
|
||||
|
||||
- name: Azure login OIDC
|
||||
uses: azure/login@a65d910e8af852a8061c627c456678983e180302 # v2.2.0
|
||||
uses: azure/login@a457da9ea143d694b1b9c7c869ebb04ebe844ef5 # v2.3.0
|
||||
with:
|
||||
client-id: ${{ secrets.AZURE_E2E_MINI_CLIENT_ID }}
|
||||
tenant-id: ${{ secrets.AZURE_TENANT_ID }}
|
||||
|
4
.github/workflows/e2e-test-daily.yml
vendored
4
.github/workflows/e2e-test-daily.yml
vendored
@ -45,7 +45,7 @@ jobs:
|
||||
fail-fast: false
|
||||
max-parallel: 5
|
||||
matrix:
|
||||
kubernetesVersion: ["1.28"] # should be default
|
||||
kubernetesVersion: ["1.30"] # This should correspond to the current default k8s minor.
|
||||
attestationVariant: ["gcp-sev-es", "gcp-sev-snp", "azure-sev-snp", "azure-tdx", "aws-sev-snp"]
|
||||
refStream: ["ref/main/stream/debug/?", "ref/release/stream/stable/?"]
|
||||
test: ["sonobuoy quick"]
|
||||
@ -164,7 +164,7 @@ jobs:
|
||||
ref: ${{ !github.event.pull_request.head.repo.fork && github.head_ref || '' }}
|
||||
|
||||
- name: Azure login OIDC
|
||||
uses: azure/login@a65d910e8af852a8061c627c456678983e180302 # v2.2.0
|
||||
uses: azure/login@a457da9ea143d694b1b9c7c869ebb04ebe844ef5 # v2.3.0
|
||||
with:
|
||||
client-id: ${{ secrets.AZURE_E2E_MINI_CLIENT_ID }}
|
||||
tenant-id: ${{ secrets.AZURE_TENANT_ID }}
|
||||
|
3
.github/workflows/e2e-test-internal-lb.yml
vendored
3
.github/workflows/e2e-test-internal-lb.yml
vendored
@ -23,7 +23,7 @@ on:
|
||||
type: choice
|
||||
options:
|
||||
- "ubuntu-24.04"
|
||||
- "macos-12"
|
||||
- "macos-latest"
|
||||
default: "ubuntu-24.04"
|
||||
test:
|
||||
description: "The test to run."
|
||||
@ -41,7 +41,6 @@ on:
|
||||
required: true
|
||||
kubernetesVersion:
|
||||
description: "Kubernetes version to create the cluster from."
|
||||
default: "1.28"
|
||||
required: true
|
||||
cliVersion:
|
||||
description: "Version of a released CLI to download. Leave empty to build the CLI from the checked out ref."
|
||||
|
@ -23,7 +23,7 @@ on:
|
||||
type: choice
|
||||
options:
|
||||
- "ubuntu-24.04"
|
||||
- "macos-12"
|
||||
- "macos-latest"
|
||||
default: "ubuntu-24.04"
|
||||
test:
|
||||
description: "The test to run."
|
||||
@ -41,7 +41,6 @@ on:
|
||||
required: true
|
||||
kubernetesVersion:
|
||||
description: "Kubernetes version to create the cluster from."
|
||||
default: "1.28"
|
||||
required: true
|
||||
cliVersion:
|
||||
description: "Version of a released CLI to download. Leave empty to build the CLI from the checked out ref."
|
||||
|
@ -154,7 +154,7 @@ jobs:
|
||||
|
||||
- name: Login to AWS (IAM + Cluster role)
|
||||
if: steps.determine.outputs.cloudProvider == 'aws'
|
||||
uses: aws-actions/configure-aws-credentials@e3dd6a429d7300a6a4c196c26e071d42e0343502 # v4.0.2
|
||||
uses: aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1.0
|
||||
with:
|
||||
role-to-assume: arn:aws:iam::795746500882:role/GithubActionsE2ETerraform
|
||||
aws-region: eu-central-1
|
||||
|
28
.github/workflows/e2e-test-release.yml
vendored
28
.github/workflows/e2e-test-release.yml
vendored
@ -73,53 +73,53 @@ jobs:
|
||||
|
||||
- test: "sonobuoy full"
|
||||
attestationVariant: "gcp-sev-es"
|
||||
kubernetes-version: "v1.29"
|
||||
kubernetes-version: "v1.30"
|
||||
runner: "ubuntu-24.04"
|
||||
clusterCreation: "cli"
|
||||
- test: "sonobuoy full"
|
||||
attestationVariant: "gcp-sev-snp"
|
||||
kubernetes-version: "v1.29"
|
||||
kubernetes-version: "v1.30"
|
||||
runner: "ubuntu-24.04"
|
||||
clusterCreation: "cli"
|
||||
- test: "sonobuoy full"
|
||||
attestationVariant: "azure-sev-snp"
|
||||
kubernetes-version: "v1.29"
|
||||
kubernetes-version: "v1.30"
|
||||
runner: "ubuntu-24.04"
|
||||
clusterCreation: "cli"
|
||||
- test: "sonobuoy full"
|
||||
attestationVariant: "azure-tdx"
|
||||
kubernetes-version: "v1.29"
|
||||
kubernetes-version: "v1.30"
|
||||
runner: "ubuntu-24.04"
|
||||
clusterCreation: "cli"
|
||||
- test: "sonobuoy full"
|
||||
attestationVariant: "aws-sev-snp"
|
||||
kubernetes-version: "v1.29"
|
||||
kubernetes-version: "v1.30"
|
||||
runner: "ubuntu-24.04"
|
||||
clusterCreation: "cli"
|
||||
|
||||
- test: "sonobuoy full"
|
||||
attestationVariant: "gcp-sev-es"
|
||||
kubernetes-version: "v1.28"
|
||||
kubernetes-version: "v1.29"
|
||||
runner: "ubuntu-24.04"
|
||||
clusterCreation: "cli"
|
||||
- test: "sonobuoy full"
|
||||
attestationVariant: "gcp-sev-snp"
|
||||
kubernetes-version: "v1.28"
|
||||
kubernetes-version: "v1.29"
|
||||
runner: "ubuntu-24.04"
|
||||
clusterCreation: "cli"
|
||||
- test: "sonobuoy full"
|
||||
attestationVariant: "azure-sev-snp"
|
||||
kubernetes-version: "v1.28"
|
||||
kubernetes-version: "v1.29"
|
||||
runner: "ubuntu-24.04"
|
||||
clusterCreation: "cli"
|
||||
- test: "sonobuoy full"
|
||||
attestationVariant: "azure-tdx"
|
||||
kubernetes-version: "v1.28"
|
||||
kubernetes-version: "v1.29"
|
||||
runner: "ubuntu-24.04"
|
||||
clusterCreation: "cli"
|
||||
- test: "sonobuoy full"
|
||||
attestationVariant: "aws-sev-snp"
|
||||
kubernetes-version: "v1.28"
|
||||
kubernetes-version: "v1.29"
|
||||
runner: "ubuntu-24.04"
|
||||
clusterCreation: "cli"
|
||||
|
||||
@ -306,11 +306,11 @@ jobs:
|
||||
# - test: "verify"
|
||||
# attestationVariant: "azure-sev-snp"
|
||||
# kubernetes-version: "v1.30"
|
||||
# runner: "macos-12"
|
||||
# runner: "macos-latest"
|
||||
- test: "recover"
|
||||
attestationVariant: "gcp-sev-es"
|
||||
kubernetes-version: "v1.30"
|
||||
runner: "macos-12"
|
||||
runner: "macos-latest"
|
||||
clusterCreation: "cli"
|
||||
runs-on: ${{ matrix.runner }}
|
||||
permissions:
|
||||
@ -342,7 +342,7 @@ jobs:
|
||||
|
||||
- name: Set up gcloud CLI (macOS)
|
||||
if: steps.split-attestationVariant.outputs.provider == 'gcp' && runner.os == 'macOS'
|
||||
uses: google-github-actions/setup-gcloud@6189d56e4096ee891640bb02ac264be376592d6a # v2.1.2
|
||||
uses: google-github-actions/setup-gcloud@77e7a554d41e2ee56fc945c52dfd3f33d12def9a # v2.1.4
|
||||
|
||||
- name: Run E2E test
|
||||
id: e2e_test
|
||||
@ -409,7 +409,7 @@ jobs:
|
||||
fail-fast: false
|
||||
max-parallel: 1
|
||||
matrix:
|
||||
fromVersion: ["v2.19.3"]
|
||||
fromVersion: ["v2.22.0"]
|
||||
attestationVariant: ["gcp-sev-snp", "azure-sev-snp", "azure-tdx", "aws-sev-snp"]
|
||||
name: Run upgrade tests
|
||||
secrets: inherit
|
||||
|
153
.github/workflows/e2e-test-stackit.yml
vendored
Normal file
153
.github/workflows/e2e-test-stackit.yml
vendored
Normal file
@ -0,0 +1,153 @@
|
||||
name: e2e test STACKIT
|
||||
|
||||
on:
|
||||
workflow_dispatch:
|
||||
schedule:
|
||||
- cron: "0 0 * * *" # Every day at midnight.
|
||||
|
||||
jobs:
|
||||
find-latest-image:
|
||||
name: Find latest image
|
||||
runs-on: ubuntu-24.04
|
||||
permissions:
|
||||
id-token: write
|
||||
contents: read
|
||||
outputs:
|
||||
image-release-stable: ${{ steps.relabel-output.outputs.image-release-stable }}
|
||||
steps:
|
||||
- name: Checkout
|
||||
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
|
||||
with:
|
||||
ref: ${{ !github.event.pull_request.head.repo.fork && github.head_ref || '' }}
|
||||
|
||||
- name: Select relevant image
|
||||
id: select-image-action
|
||||
uses: ./.github/actions/select_image
|
||||
with:
|
||||
osImage: "ref/release/stream/stable/?"
|
||||
|
||||
- name: Relabel output
|
||||
id: relabel-output
|
||||
shell: bash
|
||||
run: |
|
||||
ref=$(echo 'ref/release/stream/stable/?' | cut -d/ -f2)
|
||||
stream=$(echo 'ref/release/stream/stable/?' | cut -d/ -f4)
|
||||
|
||||
echo "image-$ref-$stream=${{ steps.select-image-action.outputs.osImage }}" | tee -a "$GITHUB_OUTPUT"
|
||||
|
||||
e2e-stackit:
|
||||
strategy:
|
||||
fail-fast: false
|
||||
max-parallel: 6
|
||||
matrix:
|
||||
kubernetesVersion: [ "1.29", "1.30", "1.31" ]
|
||||
clusterCreation: [ "cli", "terraform" ]
|
||||
test: [ "sonobuoy quick" ]
|
||||
runs-on: ubuntu-24.04
|
||||
permissions:
|
||||
id-token: write
|
||||
checks: write
|
||||
contents: read
|
||||
packages: write
|
||||
actions: write
|
||||
needs: [find-latest-image]
|
||||
steps:
|
||||
- name: Check out repository
|
||||
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
|
||||
with:
|
||||
fetch-depth: 0
|
||||
ref: ${{ !github.event.pull_request.head.repo.fork && github.head_ref || '' }}
|
||||
|
||||
- name: Setup bazel
|
||||
uses: ./.github/actions/setup_bazel_nix
|
||||
with:
|
||||
nixTools: terraform
|
||||
|
||||
- name: Run E2E test
|
||||
id: e2e_test
|
||||
uses: ./.github/actions/e2e_test
|
||||
with:
|
||||
workerNodesCount: "1"
|
||||
controlNodesCount: "1"
|
||||
cloudProvider: stackit
|
||||
attestationVariant: qemu-vtpm
|
||||
osImage: ${{ needs.find-latest-image.outputs.image-release-stable }}
|
||||
isDebugImage: false
|
||||
cliVersion: ${{ needs.find-latest-image.outputs.image-release-stable || '' }}
|
||||
kubernetesVersion: ${{ matrix.kubernetesVersion }}
|
||||
awsOpenSearchDomain: ${{ secrets.AWS_OPENSEARCH_DOMAIN }}
|
||||
awsOpenSearchUsers: ${{ secrets.AWS_OPENSEARCH_USER }}
|
||||
awsOpenSearchPwd: ${{ secrets.AWS_OPENSEARCH_PWD }}
|
||||
gcpProject: constellation-e2e
|
||||
gcpClusterCreateServiceAccount: "infrastructure-e2e@constellation-e2e.iam.gserviceaccount.com"
|
||||
gcpIAMCreateServiceAccount: "iam-e2e@constellation-e2e.iam.gserviceaccount.com"
|
||||
test: ${{ matrix.test }}
|
||||
azureSubscriptionID: ${{ secrets.AZURE_SUBSCRIPTION_ID }}
|
||||
azureClusterCreateCredentials: ${{ secrets.AZURE_E2E_CLUSTER_CREDENTIALS }}
|
||||
azureIAMCreateCredentials: ${{ secrets.AZURE_E2E_IAM_CREDENTIALS }}
|
||||
registry: ghcr.io
|
||||
githubToken: ${{ secrets.GITHUB_TOKEN }}
|
||||
cosignPassword: ${{ secrets.COSIGN_PASSWORD }}
|
||||
cosignPrivateKey: ${{ secrets.COSIGN_PRIVATE_KEY }}
|
||||
fetchMeasurements: false
|
||||
clusterCreation: ${{ matrix.clusterCreation }}
|
||||
s3AccessKey: ${{ secrets.AWS_ACCESS_KEY_ID_S3PROXY }}
|
||||
s3SecretKey: ${{ secrets.AWS_SECRET_ACCESS_KEY_S3PROXY }}
|
||||
encryptionSecret: ${{ secrets.ARTIFACT_ENCRYPT_PASSWD }}
|
||||
openStackCloudsYaml: ${{ secrets.STACKIT_CI_CLOUDS_YAML }}
|
||||
stackitUat: ${{ secrets.STACKIT_CI_UAT }}
|
||||
stackitProjectID: ${{ secrets.STACKIT_CI_PROJECT_ID }}
|
||||
|
||||
- name: Always terminate cluster
|
||||
if: always()
|
||||
uses: ./.github/actions/constellation_destroy
|
||||
with:
|
||||
kubeconfig: ${{ steps.e2e_test.outputs.kubeconfig }}
|
||||
clusterCreation: ${{ matrix.clusterCreation }}
|
||||
cloudProvider: stackit
|
||||
azureClusterDeleteCredentials: ${{ secrets.AZURE_E2E_CLUSTER_CREDENTIALS }}
|
||||
gcpClusterDeleteServiceAccount: "infrastructure-e2e@constellation-e2e.iam.gserviceaccount.com"
|
||||
|
||||
- name: Always delete IAM configuration
|
||||
if: always()
|
||||
uses: ./.github/actions/constellation_iam_destroy
|
||||
with:
|
||||
cloudProvider: stackit
|
||||
azureCredentials: ${{ secrets.AZURE_E2E_IAM_CREDENTIALS }}
|
||||
gcpServiceAccount: "iam-e2e@constellation-e2e.iam.gserviceaccount.com"
|
||||
|
||||
- name: Update tfstate
|
||||
if: always()
|
||||
env:
|
||||
GH_TOKEN: ${{ github.token }}
|
||||
uses: ./.github/actions/update_tfstate
|
||||
with:
|
||||
name: terraform-state-${{ steps.e2e_test.outputs.namePrefix }}
|
||||
runID: ${{ github.run_id }}
|
||||
encryptionSecret: ${{ secrets.ARTIFACT_ENCRYPT_PASSWD }}
|
||||
|
||||
- name: Notify about failure
|
||||
if: |
|
||||
failure() &&
|
||||
github.ref == 'refs/heads/main' &&
|
||||
github.event_name == 'schedule'
|
||||
continue-on-error: true
|
||||
uses: ./.github/actions/notify_e2e_failure
|
||||
with:
|
||||
projectWriteToken: ${{ secrets.PROJECT_WRITE_TOKEN }}
|
||||
refStream: "ref/release/stream/stable/?"
|
||||
test: ${{ matrix.test }}
|
||||
kubernetesVersion: ${{ matrix.kubernetesVersion }}
|
||||
provider: stackit
|
||||
attestationVariant: qemu-vtpm
|
||||
clusterCreation: ${{ matrix.clusterCreation }}
|
||||
|
||||
- name: Notify STACKIT
|
||||
if: |
|
||||
failure() &&
|
||||
github.ref == 'refs/heads/main' &&
|
||||
github.event_name == 'schedule'
|
||||
continue-on-error: true
|
||||
uses: ./.github/actions/notify_stackit
|
||||
with:
|
||||
slackToken: ${{ secrets.SLACK_TOKEN }}
|
@ -23,7 +23,7 @@ on:
|
||||
type: choice
|
||||
options:
|
||||
- "ubuntu-24.04"
|
||||
- "macos-12"
|
||||
- "macos-latest"
|
||||
default: "ubuntu-24.04"
|
||||
test:
|
||||
description: "The test to run."
|
||||
@ -41,7 +41,6 @@ on:
|
||||
required: true
|
||||
kubernetesVersion:
|
||||
description: "Kubernetes version to create the cluster from."
|
||||
default: "1.28"
|
||||
required: true
|
||||
releaseVersion:
|
||||
description: "Version of a released provider to download. Leave empty to build the provider from the checked out ref."
|
||||
|
64
.github/workflows/e2e-test-weekly.yml
vendored
64
.github/workflows/e2e-test-weekly.yml
vendored
@ -10,7 +10,7 @@ jobs:
|
||||
strategy:
|
||||
fail-fast: false
|
||||
matrix:
|
||||
refStream: ["ref/main/stream/nightly/?","ref/main/stream/debug/?", "ref/release/stream/stable/?"]
|
||||
refStream: ["ref/main/stream/nightly/?", "ref/main/stream/debug/?", "ref/release/stream/stable/?"]
|
||||
name: Find latest image
|
||||
runs-on: ubuntu-24.04
|
||||
permissions:
|
||||
@ -51,6 +51,33 @@ jobs:
|
||||
# Tests on main-debug refStream
|
||||
#
|
||||
|
||||
# Emergency SSH test on latest k8s version
|
||||
- test: "emergency ssh"
|
||||
refStream: "ref/main/stream/debug/?"
|
||||
attestationVariant: "gcp-sev-es"
|
||||
kubernetes-version: "v1.30"
|
||||
clusterCreation: "cli"
|
||||
- test: "emergency ssh"
|
||||
refStream: "ref/main/stream/debug/?"
|
||||
attestationVariant: "gcp-sev-snp"
|
||||
kubernetes-version: "v1.30"
|
||||
clusterCreation: "cli"
|
||||
- test: "emergency ssh"
|
||||
refStream: "ref/main/stream/debug/?"
|
||||
attestationVariant: "azure-sev-snp"
|
||||
kubernetes-version: "v1.30"
|
||||
clusterCreation: "cli"
|
||||
- test: "emergency ssh"
|
||||
refStream: "ref/main/stream/debug/?"
|
||||
attestationVariant: "azure-tdx"
|
||||
kubernetes-version: "v1.30"
|
||||
clusterCreation: "cli"
|
||||
- test: "emergency ssh"
|
||||
refStream: "ref/main/stream/debug/?"
|
||||
attestationVariant: "aws-sev-snp"
|
||||
kubernetes-version: "v1.30"
|
||||
clusterCreation: "cli"
|
||||
|
||||
# Sonobuoy full test on latest k8s version
|
||||
- test: "sonobuoy full"
|
||||
refStream: "ref/main/stream/debug/?"
|
||||
@ -89,56 +116,55 @@ jobs:
|
||||
- test: "sonobuoy quick"
|
||||
refStream: "ref/main/stream/debug/?"
|
||||
attestationVariant: "gcp-sev-es"
|
||||
kubernetes-version: "v1.29"
|
||||
kubernetes-version: "v1.30"
|
||||
clusterCreation: "cli"
|
||||
- test: "sonobuoy quick"
|
||||
refStream: "ref/main/stream/debug/?"
|
||||
attestationVariant: "gcp-sev-snp"
|
||||
kubernetes-version: "v1.29"
|
||||
kubernetes-version: "v1.30"
|
||||
clusterCreation: "cli"
|
||||
- test: "sonobuoy quick"
|
||||
refStream: "ref/main/stream/debug/?"
|
||||
attestationVariant: "azure-sev-snp"
|
||||
kubernetes-version: "v1.29"
|
||||
kubernetes-version: "v1.30"
|
||||
clusterCreation: "cli"
|
||||
- test: "sonobuoy quick"
|
||||
refStream: "ref/main/stream/debug/?"
|
||||
attestationVariant: "azure-tdx"
|
||||
kubernetes-version: "v1.29"
|
||||
kubernetes-version: "v1.30"
|
||||
clusterCreation: "cli"
|
||||
- test: "sonobuoy quick"
|
||||
refStream: "ref/main/stream/debug/?"
|
||||
attestationVariant: "aws-sev-snp"
|
||||
kubernetes-version: "v1.29"
|
||||
kubernetes-version: "v1.30"
|
||||
clusterCreation: "cli"
|
||||
|
||||
- test: "sonobuoy quick"
|
||||
refStream: "ref/main/stream/debug/?"
|
||||
attestationVariant: "gcp-sev-es"
|
||||
kubernetes-version: "v1.28"
|
||||
kubernetes-version: "v1.29"
|
||||
clusterCreation: "cli"
|
||||
- test: "sonobuoy quick"
|
||||
refStream: "ref/main/stream/debug/?"
|
||||
attestationVariant: "gcp-sev-snp"
|
||||
kubernetes-version: "v1.28"
|
||||
kubernetes-version: "v1.29"
|
||||
clusterCreation: "cli"
|
||||
- test: "sonobuoy quick"
|
||||
refStream: "ref/main/stream/debug/?"
|
||||
attestationVariant: "azure-sev-snp"
|
||||
kubernetes-version: "v1.28"
|
||||
kubernetes-version: "v1.29"
|
||||
clusterCreation: "cli"
|
||||
- test: "sonobuoy quick"
|
||||
refStream: "ref/main/stream/debug/?"
|
||||
attestationVariant: "azure-tdx"
|
||||
kubernetes-version: "v1.28"
|
||||
kubernetes-version: "v1.29"
|
||||
clusterCreation: "cli"
|
||||
- test: "sonobuoy quick"
|
||||
refStream: "ref/main/stream/debug/?"
|
||||
attestationVariant: "aws-sev-snp"
|
||||
kubernetes-version: "v1.28"
|
||||
kubernetes-version: "v1.29"
|
||||
clusterCreation: "cli"
|
||||
|
||||
|
||||
# verify test on latest k8s version
|
||||
- test: "verify"
|
||||
refStream: "ref/main/stream/debug/?"
|
||||
@ -290,27 +316,27 @@ jobs:
|
||||
- test: "verify"
|
||||
refStream: "ref/release/stream/stable/?"
|
||||
attestationVariant: "gcp-sev-es"
|
||||
kubernetes-version: "v1.29"
|
||||
kubernetes-version: "v1.30"
|
||||
clusterCreation: "cli"
|
||||
- test: "verify"
|
||||
refStream: "ref/release/stream/stable/?"
|
||||
attestationVariant: "gcp-sev-snp"
|
||||
kubernetes-version: "v1.29"
|
||||
kubernetes-version: "v1.30"
|
||||
clusterCreation: "cli"
|
||||
- test: "verify"
|
||||
refStream: "ref/release/stream/stable/?"
|
||||
attestationVariant: "azure-sev-snp"
|
||||
kubernetes-version: "v1.29"
|
||||
kubernetes-version: "v1.30"
|
||||
clusterCreation: "cli"
|
||||
- test: "verify"
|
||||
refStream: "ref/release/stream/stable/?"
|
||||
attestationVariant: "azure-tdx"
|
||||
kubernetes-version: "v1.29"
|
||||
kubernetes-version: "v1.30"
|
||||
clusterCreation: "cli"
|
||||
- test: "verify"
|
||||
refStream: "ref/release/stream/stable/?"
|
||||
attestationVariant: "aws-sev-snp"
|
||||
kubernetes-version: "v1.29"
|
||||
kubernetes-version: "v1.30"
|
||||
clusterCreation: "cli"
|
||||
|
||||
runs-on: ubuntu-24.04
|
||||
@ -420,7 +446,7 @@ jobs:
|
||||
fail-fast: false
|
||||
max-parallel: 1
|
||||
matrix:
|
||||
fromVersion: ["v2.19.3"]
|
||||
fromVersion: ["v2.22.0"]
|
||||
attestationVariant: ["gcp-sev-snp", "azure-sev-snp", "azure-tdx", "aws-sev-snp"]
|
||||
name: Run upgrade tests
|
||||
secrets: inherit
|
||||
@ -453,7 +479,7 @@ jobs:
|
||||
ref: ${{ !github.event.pull_request.head.repo.fork && github.head_ref || '' }}
|
||||
|
||||
- name: Azure login OIDC
|
||||
uses: azure/login@a65d910e8af852a8061c627c456678983e180302 # v2.2.0
|
||||
uses: azure/login@a457da9ea143d694b1b9c7c869ebb04ebe844ef5 # v2.3.0
|
||||
with:
|
||||
client-id: ${{ secrets.AZURE_E2E_MINI_CLIENT_ID }}
|
||||
tenant-id: ${{ secrets.AZURE_TENANT_ID }}
|
||||
|
20
.github/workflows/e2e-test.yml
vendored
20
.github/workflows/e2e-test.yml
vendored
@ -16,6 +16,7 @@ on:
|
||||
- "azure-sev-snp"
|
||||
- "azure-tdx"
|
||||
- "aws-sev-snp"
|
||||
- "stackit-qemu-vtpm"
|
||||
default: "azure-sev-snp"
|
||||
required: true
|
||||
runner:
|
||||
@ -23,7 +24,7 @@ on:
|
||||
type: choice
|
||||
options:
|
||||
- "ubuntu-24.04"
|
||||
- "macos-12"
|
||||
- "macos-latest"
|
||||
default: "ubuntu-24.04"
|
||||
test:
|
||||
description: "The test to run. The conformance test is only supported for clusterCreation=cli."
|
||||
@ -39,11 +40,12 @@ on:
|
||||
- "recover"
|
||||
- "malicious join"
|
||||
- "s3proxy"
|
||||
- "emergency ssh"
|
||||
- "nop"
|
||||
required: true
|
||||
kubernetesVersion:
|
||||
description: "Kubernetes version to create the cluster from."
|
||||
default: "1.29"
|
||||
default: "1.30"
|
||||
required: true
|
||||
cliVersion:
|
||||
description: "Version of a released CLI to download. Leave empty to build the CLI from the checked out ref."
|
||||
@ -137,6 +139,7 @@ jobs:
|
||||
workerNodes: ${{ steps.split-nodeCount.outputs.workerNodes }}
|
||||
controlPlaneNodes: ${{ steps.split-nodeCount.outputs.controlPlaneNodes }}
|
||||
cloudProvider: ${{ steps.split-attestationVariant.outputs.cloudProvider }}
|
||||
attestationVariant: ${{ steps.split-attestationVariant.outputs.attestationVariant }}
|
||||
steps:
|
||||
- name: Split nodeCount
|
||||
id: split-nodeCount
|
||||
@ -161,6 +164,12 @@ jobs:
|
||||
attestationVariant="${{ inputs.attestationVariant }}"
|
||||
cloudProvider="${attestationVariant%%-*}"
|
||||
|
||||
# special case for STACKIT, as there's no special attestation variant for it
|
||||
if [[ "${cloudProvider}" == "stackit" ]]; then
|
||||
attestationVariant="qemu-vtpm"
|
||||
fi
|
||||
|
||||
echo "attestationVariant=${attestationVariant}" | tee -a "$GITHUB_OUTPUT"
|
||||
echo "cloudProvider=${cloudProvider}" | tee -a "$GITHUB_OUTPUT"
|
||||
|
||||
find-latest-image:
|
||||
@ -224,7 +233,7 @@ jobs:
|
||||
|
||||
- name: Set up gcloud CLI (macOS)
|
||||
if: needs.generate-input-parameters.outputs.cloudProvider == 'gcp' && runner.os == 'macOS'
|
||||
uses: google-github-actions/setup-gcloud@6189d56e4096ee891640bb02ac264be376592d6a # v2.1.2
|
||||
uses: google-github-actions/setup-gcloud@77e7a554d41e2ee56fc945c52dfd3f33d12def9a # v2.1.4
|
||||
|
||||
- name: Run manual E2E test
|
||||
id: e2e_test
|
||||
@ -233,7 +242,7 @@ jobs:
|
||||
workerNodesCount: ${{ needs.generate-input-parameters.outputs.workerNodes }}
|
||||
controlNodesCount: ${{ needs.generate-input-parameters.outputs.controlPlaneNodes }}
|
||||
cloudProvider: ${{ needs.generate-input-parameters.outputs.cloudProvider }}
|
||||
attestationVariant: ${{ inputs.attestationVariant }}
|
||||
attestationVariant: ${{ needs.generate-input-parameters.outputs.attestationVariant }}
|
||||
machineType: ${{ inputs.machineType }}
|
||||
regionZone: ${{ inputs.regionZone }}
|
||||
gcpProject: constellation-e2e
|
||||
@ -262,6 +271,9 @@ jobs:
|
||||
marketplaceImageVersion: ${{ inputs.marketplaceImageVersion }}
|
||||
force: ${{ inputs.force }}
|
||||
encryptionSecret: ${{ secrets.ARTIFACT_ENCRYPT_PASSWD }}
|
||||
openStackCloudsYaml: ${{ secrets.STACKIT_CI_CLOUDS_YAML }}
|
||||
stackitUat: ${{ secrets.STACKIT_CI_UAT }}
|
||||
stackitProjectID: ${{ secrets.STACKIT_CI_PROJECT_ID }}
|
||||
|
||||
- name: Always terminate cluster
|
||||
if: always()
|
||||
|
10
.github/workflows/e2e-upgrade.yml
vendored
10
.github/workflows/e2e-upgrade.yml
vendored
@ -268,13 +268,13 @@ jobs:
|
||||
push: true
|
||||
|
||||
- name: Upload CLI binary # is needed for the cleanup step
|
||||
uses: actions/upload-artifact@b4b15b8c7c6ac21ea08fcf65892d2ee8f75cf882 # v4.4.3
|
||||
uses: actions/upload-artifact@ea165f8d65b6e75b540449e92b4886f43607fa02 # v4.6.2
|
||||
with:
|
||||
name: constellation-upgrade-${{ inputs.attestationVariant }}
|
||||
path: build/constellation
|
||||
|
||||
- name: Login to AWS
|
||||
uses: aws-actions/configure-aws-credentials@e3dd6a429d7300a6a4c196c26e071d42e0343502 # v4.0.2
|
||||
uses: aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1.0
|
||||
with:
|
||||
role-to-assume: arn:aws:iam::795746500882:role/GithubConstellationVersionsAPIRead
|
||||
aws-region: eu-central-1
|
||||
@ -296,7 +296,7 @@ jobs:
|
||||
|
||||
- name: Login to AWS (IAM role)
|
||||
if: needs.generate-input-parameters.outputs.cloudProvider == 'aws'
|
||||
uses: aws-actions/configure-aws-credentials@e3dd6a429d7300a6a4c196c26e071d42e0343502 # v4.0.2
|
||||
uses: aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1.0
|
||||
with:
|
||||
role-to-assume: arn:aws:iam::795746500882:role/GithubActionsE2EIAM
|
||||
aws-region: eu-central-1
|
||||
@ -347,7 +347,7 @@ jobs:
|
||||
|
||||
- name: Login to AWS (Cluster role)
|
||||
if: always() && needs.generate-input-parameters.outputs.cloudProvider == 'aws'
|
||||
uses: aws-actions/configure-aws-credentials@e3dd6a429d7300a6a4c196c26e071d42e0343502 # v4.0.2
|
||||
uses: aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1.0
|
||||
with:
|
||||
role-to-assume: arn:aws:iam::795746500882:role/GithubActionsE2ECluster
|
||||
aws-region: eu-central-1
|
||||
@ -424,7 +424,7 @@ jobs:
|
||||
ref: ${{ inputs.gitRef }}
|
||||
|
||||
- name: Download CLI
|
||||
uses: actions/download-artifact@fa0a91b85d4f404e444e00e005971372dc801d16 # v4.1.8
|
||||
uses: actions/download-artifact@95815c38cf2ff2164869cbab79da8d1f422bc89e # v4.2.1
|
||||
with:
|
||||
name: constellation-upgrade-${{ inputs.attestationVariant }}
|
||||
path: build
|
||||
|
6
.github/workflows/e2e-windows.yml
vendored
6
.github/workflows/e2e-windows.yml
vendored
@ -45,14 +45,14 @@ jobs:
|
||||
push: true
|
||||
|
||||
- name: Upload CLI artifact
|
||||
uses: actions/upload-artifact@b4b15b8c7c6ac21ea08fcf65892d2ee8f75cf882 # v4.4.3
|
||||
uses: actions/upload-artifact@ea165f8d65b6e75b540449e92b4886f43607fa02 # v4.6.2
|
||||
with:
|
||||
path: build/constellation.exe
|
||||
name: "constell-exe"
|
||||
|
||||
e2e-test:
|
||||
name: E2E Test Windows
|
||||
runs-on: windows-2022
|
||||
runs-on: windows-2025
|
||||
needs: build-cli
|
||||
steps:
|
||||
- name: Checkout
|
||||
@ -61,7 +61,7 @@ jobs:
|
||||
ref: ${{ !github.event.pull_request.head.repo.fork && github.head_ref || '' }}
|
||||
|
||||
- name: Download CLI artifact
|
||||
uses: actions/download-artifact@fa0a91b85d4f404e444e00e005971372dc801d16 # v4.1.8
|
||||
uses: actions/download-artifact@95815c38cf2ff2164869cbab79da8d1f422bc89e # v4.2.1
|
||||
with:
|
||||
name: "constell-exe"
|
||||
|
||||
|
2
.github/workflows/on-release.yml
vendored
2
.github/workflows/on-release.yml
vendored
@ -142,7 +142,7 @@ jobs:
|
||||
- uses: ./.github/actions/setup_bazel_nix
|
||||
|
||||
- name: Login to AWS
|
||||
uses: aws-actions/configure-aws-credentials@e3dd6a429d7300a6a4c196c26e071d42e0343502 # v4.0.2
|
||||
uses: aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1.0
|
||||
with:
|
||||
role-to-assume: arn:aws:iam::795746500882:role/GitHubConstellationImagePipeline
|
||||
aws-region: eu-central-1
|
||||
|
2
.github/workflows/purge-main.yml
vendored
2
.github/workflows/purge-main.yml
vendored
@ -23,7 +23,7 @@ jobs:
|
||||
ref: ${{ github.head_ref }}
|
||||
|
||||
- name: Login to AWS
|
||||
uses: aws-actions/configure-aws-credentials@e3dd6a429d7300a6a4c196c26e071d42e0343502 # v4.0.2
|
||||
uses: aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1.0
|
||||
with:
|
||||
role-to-assume: arn:aws:iam::795746500882:role/GithubConstellationVersionsAPIRead
|
||||
aws-region: eu-central-1
|
||||
|
17
.github/workflows/release.yml
vendored
17
.github/workflows/release.yml
vendored
@ -118,7 +118,7 @@ jobs:
|
||||
sed -i 's/fromVersion: \["[^"]*"\]/fromVersion: ["${{ inputs.version }}"]/g' .github/workflows/e2e-test-weekly.yml
|
||||
|
||||
- name: Create docs pull request
|
||||
uses: peter-evans/create-pull-request@5e914681df9dc83aa4e4905692ca88beb2f9e91f # v7.0.5
|
||||
uses: peter-evans/create-pull-request@271a8d0340265f705b14b6d32b9829c1cb33d45e # v7.0.8
|
||||
with:
|
||||
branch: ${{ env.BRANCH }}
|
||||
base: main
|
||||
@ -239,6 +239,17 @@ jobs:
|
||||
stream: "stable"
|
||||
ref: ${{ needs.verify-inputs.outputs.WORKING_BRANCH }}
|
||||
|
||||
check-measurements-reproducibility:
|
||||
name: Check measurements reproducibility
|
||||
needs: [verify-inputs, os-image]
|
||||
runs-on: ubuntu-24.04
|
||||
steps:
|
||||
- name: Check reproducibility
|
||||
uses: ./.github/actions/check_measurements_reproducibility
|
||||
with:
|
||||
version: ${{ inputs.version }}
|
||||
ref: ${{ needs.verify-inputs.outputs.WORKING_BRANCH }}
|
||||
|
||||
update-hardcoded-measurements:
|
||||
name: Update hardcoded measurements (in the CLI)
|
||||
needs: [verify-inputs, os-image]
|
||||
@ -255,9 +266,9 @@ jobs:
|
||||
ref: ${{ needs.verify-inputs.outputs.WORKING_BRANCH }}
|
||||
|
||||
- name: Setup Go environment
|
||||
uses: actions/setup-go@41dfa10bad2bb2ae585af6ee5bb4d7d973ad74ed # v5.1.0
|
||||
uses: actions/setup-go@0aaccfd150d50ccaeb58ebd88d36e91967a5f35b # v5.4.0
|
||||
with:
|
||||
go-version: "1.23.2"
|
||||
go-version: "1.24.2"
|
||||
cache: true
|
||||
|
||||
- name: Build generateMeasurements tool
|
||||
|
24
.github/workflows/reproducible-builds.yml
vendored
24
.github/workflows/reproducible-builds.yml
vendored
@ -13,6 +13,9 @@ on:
|
||||
workflow_dispatch:
|
||||
schedule:
|
||||
- cron: "45 06 * * 1" # Every Monday at 6:45am
|
||||
pull_request:
|
||||
paths:
|
||||
- .github/workflows/reproducible-builds.yml
|
||||
|
||||
jobs:
|
||||
build-binaries:
|
||||
@ -48,15 +51,16 @@ jobs:
|
||||
- name: Setup dependencies (eccentric)
|
||||
if: matrix.deps == 'eccentric'
|
||||
run: |
|
||||
version=$(cat .bazelversion)
|
||||
bazelVersion=$(cat .bazelversion)
|
||||
mkdir -p "$HOME/.local/bin"
|
||||
curl -fsSL -o "$HOME/.local/bin/bazel" "https://github.com/bazelbuild/bazel/releases/download/$version/bazel-$version-linux-x86_64"
|
||||
curl -fsSL -o "$HOME/.local/bin/bazel" "https://github.com/bazelbuild/bazel/releases/download/$bazelVersion/bazel-$bazelVersion-linux-x86_64"
|
||||
chmod a+x "$HOME/.local/bin/bazel"
|
||||
echo "$HOME/.local/bin" >> "$GITHUB_PATH"
|
||||
|
||||
curl -fsSL -o "$HOME/.local/bin/nix-installer" https://github.com/DeterminateSystems/nix-installer/releases/download/v0.26.3/nix-installer-x86_64-linux # renovate:github-release
|
||||
curl -fsSL -o "$HOME/.local/bin/nix-installer" https://github.com/DeterminateSystems/nix-installer/releases/download/v3.2.1/nix-installer-x86_64-linux # renovate:github-release
|
||||
nixVersion=$(cat .nixversion)
|
||||
chmod a+x "$HOME/.local/bin/nix-installer"
|
||||
"$HOME/.local/bin/nix-installer" install --no-confirm
|
||||
"$HOME/.local/bin/nix-installer" install --no-confirm --nix-package-url "https://releases.nixos.org/nix/nix-$nixVersion/nix-$nixVersion-x86_64-linux.tar.xz"
|
||||
|
||||
- name: Build
|
||||
shell: bash
|
||||
@ -77,13 +81,13 @@ jobs:
|
||||
run: shasum -a 256 "${binary}" | tee "${binary}.sha256"
|
||||
|
||||
- name: Upload binary artifact
|
||||
uses: actions/upload-artifact@b4b15b8c7c6ac21ea08fcf65892d2ee8f75cf882 # v4.4.3
|
||||
uses: actions/upload-artifact@ea165f8d65b6e75b540449e92b4886f43607fa02 # v4.6.2
|
||||
with:
|
||||
name: "binaries-${{ matrix.target }}-${{ matrix.runner }}-${{ matrix.deps }}"
|
||||
path: "${{ env.binary }}"
|
||||
|
||||
- name: Upload hash artifact
|
||||
uses: actions/upload-artifact@b4b15b8c7c6ac21ea08fcf65892d2ee8f75cf882 # v4.4.3
|
||||
uses: actions/upload-artifact@ea165f8d65b6e75b540449e92b4886f43607fa02 # v4.6.2
|
||||
with:
|
||||
name: "sha256sums-${{ matrix.target }}-${{ matrix.runner }}-${{ matrix.deps }}"
|
||||
path: "${{ env.binary }}.sha256"
|
||||
@ -142,13 +146,13 @@ jobs:
|
||||
run: shasum -a 256 "${binary}" | tee "${binary}.sha256"
|
||||
|
||||
- name: Upload binary artifact
|
||||
uses: actions/upload-artifact@b4b15b8c7c6ac21ea08fcf65892d2ee8f75cf882 # v4.4.3
|
||||
uses: actions/upload-artifact@ea165f8d65b6e75b540449e92b4886f43607fa02 # v4.6.2
|
||||
with:
|
||||
name: "osimages-${{ matrix.target }}-${{ matrix.runner }}"
|
||||
path: "${{ env.binary }}"
|
||||
|
||||
- name: Upload hash artifact
|
||||
uses: actions/upload-artifact@b4b15b8c7c6ac21ea08fcf65892d2ee8f75cf882 # v4.4.3
|
||||
uses: actions/upload-artifact@ea165f8d65b6e75b540449e92b4886f43607fa02 # v4.6.2
|
||||
with:
|
||||
name: "sha256sums-${{ matrix.target }}-${{ matrix.runner }}"
|
||||
path: "${{ env.binary }}.sha256"
|
||||
@ -171,7 +175,7 @@ jobs:
|
||||
ref: ${{ !github.event.pull_request.head.repo.fork && github.head_ref || '' }}
|
||||
|
||||
- name: Download binaries
|
||||
uses: actions/download-artifact@fa0a91b85d4f404e444e00e005971372dc801d16 # v4.1.8
|
||||
uses: actions/download-artifact@95815c38cf2ff2164869cbab79da8d1f422bc89e # v4.2.1
|
||||
with:
|
||||
pattern: "binaries-${{ matrix.target }}-*"
|
||||
merge-multiple: true
|
||||
@ -205,7 +209,7 @@ jobs:
|
||||
ref: ${{ !github.event.pull_request.head.repo.fork && github.head_ref || '' }}
|
||||
|
||||
- name: Download os images
|
||||
uses: actions/download-artifact@fa0a91b85d4f404e444e00e005971372dc801d16 # v4.1.8
|
||||
uses: actions/download-artifact@95815c38cf2ff2164869cbab79da8d1f422bc89e # v4.2.1
|
||||
with:
|
||||
pattern: "osimages-${{ matrix.target }}-*"
|
||||
merge-multiple: true
|
||||
|
6
.github/workflows/scorecard.yml
vendored
6
.github/workflows/scorecard.yml
vendored
@ -23,20 +23,20 @@ jobs:
|
||||
persist-credentials: false
|
||||
|
||||
- name: Run analysis
|
||||
uses: ossf/scorecard-action@62b2cac7ed8198b15735ed49ab1e5cf35480ba46 # v2.4.0
|
||||
uses: ossf/scorecard-action@f49aabe0b5af0936a0987cfb85d86b75731b0186 # v2.4.1
|
||||
with:
|
||||
results_file: results.sarif
|
||||
results_format: sarif
|
||||
publish_results: true
|
||||
|
||||
- name: Upload artifact
|
||||
uses: actions/upload-artifact@b4b15b8c7c6ac21ea08fcf65892d2ee8f75cf882 # v4.4.3
|
||||
uses: actions/upload-artifact@ea165f8d65b6e75b540449e92b4886f43607fa02 # v4.6.2
|
||||
with:
|
||||
name: SARIF file
|
||||
path: results.sarif
|
||||
retention-days: 5
|
||||
|
||||
- name: Upload to code-scanning
|
||||
uses: github/codeql-action/upload-sarif@f09c1c0a94de965c15400f5634aa42fac8fb8f88 # v3.27.5
|
||||
uses: github/codeql-action/upload-sarif@45775bd8235c68ba998cffa5171334d58593da47 # v3.28.15
|
||||
with:
|
||||
sarif_file: results.sarif
|
||||
|
2
.github/workflows/sync-terraform-docs.yml
vendored
2
.github/workflows/sync-terraform-docs.yml
vendored
@ -40,7 +40,7 @@ jobs:
|
||||
|
||||
- name: Create pull request
|
||||
id: create-pull-request
|
||||
uses: peter-evans/create-pull-request@5e914681df9dc83aa4e4905692ca88beb2f9e91f # v7.0.5
|
||||
uses: peter-evans/create-pull-request@271a8d0340265f705b14b6d32b9829c1cb33d45e # v7.0.8
|
||||
with:
|
||||
path: terraform-provider-constellation
|
||||
branch: "feat/docs/update"
|
||||
|
4
.github/workflows/test-operator-codegen.yml
vendored
4
.github/workflows/test-operator-codegen.yml
vendored
@ -26,9 +26,9 @@ jobs:
|
||||
ref: ${{ !github.event.pull_request.head.repo.fork && github.head_ref || '' }}
|
||||
|
||||
- name: Setup Go environment
|
||||
uses: actions/setup-go@41dfa10bad2bb2ae585af6ee5bb4d7d973ad74ed # v5.1.0
|
||||
uses: actions/setup-go@0aaccfd150d50ccaeb58ebd88d36e91967a5f35b # v5.4.0
|
||||
with:
|
||||
go-version: "1.23.2"
|
||||
go-version: "1.24.2"
|
||||
cache: true
|
||||
|
||||
- name: Run code generation
|
||||
|
2
.github/workflows/test-tidy.yml
vendored
2
.github/workflows/test-tidy.yml
vendored
@ -37,7 +37,7 @@ jobs:
|
||||
|
||||
- name: Assume AWS role to upload Bazel dependencies to S3
|
||||
if: startsWith(github.head_ref, 'renovate/')
|
||||
uses: aws-actions/configure-aws-credentials@e3dd6a429d7300a6a4c196c26e071d42e0343502 # v4.0.2
|
||||
uses: aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1.0
|
||||
with:
|
||||
role-to-assume: arn:aws:iam::795746500882:role/GithubConstellationMirrorWrite
|
||||
aws-region: eu-central-1
|
||||
|
4
.github/workflows/test-unittest.yml
vendored
4
.github/workflows/test-unittest.yml
vendored
@ -49,7 +49,7 @@ jobs:
|
||||
rm -rf awscliv2.zip aws
|
||||
|
||||
- name: Login to AWS (IAM role)
|
||||
uses: aws-actions/configure-aws-credentials@e3dd6a429d7300a6a4c196c26e071d42e0343502 # v4.0.2
|
||||
uses: aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1.0
|
||||
with:
|
||||
role-to-assume: arn:aws:iam::795746500882:role/GithubActionGocoverage
|
||||
aws-region: eu-central-1
|
||||
@ -69,7 +69,7 @@ jobs:
|
||||
|
||||
- name: Comment coverage
|
||||
if: steps.coverage.outputs.uploadable == 'true' && github.event_name == 'pull_request'
|
||||
uses: marocchino/sticky-pull-request-comment@331f8f5b4215f0445d3c07b4967662a32a2d3e31 # v2.9.0
|
||||
uses: marocchino/sticky-pull-request-comment@67d0dec7b07ed060a405f9b2a64b8ab319fdd7db # v2.9.2
|
||||
with:
|
||||
header: coverage
|
||||
path: coverage_diff.md
|
||||
|
4
.github/workflows/update-rpms.yml
vendored
4
.github/workflows/update-rpms.yml
vendored
@ -18,7 +18,7 @@ jobs:
|
||||
token: ${{ secrets.CI_COMMIT_PUSH_PR }}
|
||||
|
||||
- name: Assume AWS role to upload Bazel dependencies to S3
|
||||
uses: aws-actions/configure-aws-credentials@e3dd6a429d7300a6a4c196c26e071d42e0343502 # v4.0.2
|
||||
uses: aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1.0
|
||||
with:
|
||||
role-to-assume: arn:aws:iam::795746500882:role/GithubConstellationMirrorWrite
|
||||
aws-region: eu-central-1
|
||||
@ -39,7 +39,7 @@ jobs:
|
||||
fi
|
||||
|
||||
- name: Create pull request
|
||||
uses: peter-evans/create-pull-request@5e914681df9dc83aa4e4905692ca88beb2f9e91f # v7.0.5
|
||||
uses: peter-evans/create-pull-request@271a8d0340265f705b14b6d32b9829c1cb33d45e # v7.0.8
|
||||
with:
|
||||
branch: "image/automated/update-rpms-${{ github.run_number }}"
|
||||
base: main
|
||||
|
6
.github/workflows/versionsapi.yml
vendored
6
.github/workflows/versionsapi.yml
vendored
@ -149,21 +149,21 @@ jobs:
|
||||
|
||||
- name: Login to AWS without write access
|
||||
if: steps.check-rights.outputs.write == 'false'
|
||||
uses: aws-actions/configure-aws-credentials@e3dd6a429d7300a6a4c196c26e071d42e0343502 # v4.0.2
|
||||
uses: aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1.0
|
||||
with:
|
||||
role-to-assume: arn:aws:iam::795746500882:role/GithubConstellationVersionsAPIRead
|
||||
aws-region: eu-central-1
|
||||
|
||||
- name: Login to AWS with write access
|
||||
if: steps.check-rights.outputs.write == 'true' && steps.check-rights.outputs.auth == 'false'
|
||||
uses: aws-actions/configure-aws-credentials@e3dd6a429d7300a6a4c196c26e071d42e0343502 # v4.0.2
|
||||
uses: aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1.0
|
||||
with:
|
||||
role-to-assume: arn:aws:iam::795746500882:role/GithubConstellationVersionsAPIWrite
|
||||
aws-region: eu-central-1
|
||||
|
||||
- name: Login to AWS with write and image remove access
|
||||
if: steps.check-rights.outputs.write == 'true' && steps.check-rights.outputs.auth == 'true'
|
||||
uses: aws-actions/configure-aws-credentials@e3dd6a429d7300a6a4c196c26e071d42e0343502 # v4.0.2
|
||||
uses: aws-actions/configure-aws-credentials@ececac1a45f3b08a01d2dd070d28d111c5fe6722 # v4.1.0
|
||||
with:
|
||||
role-to-assume: arn:aws:iam::795746500882:role/GithubConstellationVersionsAPIRemove
|
||||
aws-region: eu-central-1
|
||||
|
@ -1,53 +1,65 @@
|
||||
version: "2"
|
||||
run:
|
||||
timeout: 10m
|
||||
build-tags:
|
||||
- integration
|
||||
- e2e
|
||||
modules-download-mode: readonly
|
||||
|
||||
output:
|
||||
formats:
|
||||
- format: tab
|
||||
tab:
|
||||
path: stdout
|
||||
sort-results: true
|
||||
|
||||
colors: false
|
||||
linters:
|
||||
enable:
|
||||
# Default linters
|
||||
- errcheck
|
||||
- gosimple
|
||||
- govet
|
||||
- ineffassign
|
||||
- staticcheck
|
||||
- typecheck
|
||||
- unused
|
||||
# Additional linters
|
||||
- bodyclose
|
||||
- errname
|
||||
- copyloopvar
|
||||
- errname
|
||||
- godot
|
||||
- gofmt
|
||||
- gofumpt
|
||||
- misspell
|
||||
- noctx
|
||||
- revive
|
||||
- tenv
|
||||
- unconvert
|
||||
- unparam
|
||||
- usetesting
|
||||
settings:
|
||||
errcheck:
|
||||
exclude-functions:
|
||||
- (*go.uber.org/zap.Logger).Sync
|
||||
- (*google.golang.org/grpc.Server).Serve
|
||||
exclusions:
|
||||
generated: lax
|
||||
presets:
|
||||
- common-false-positives
|
||||
- legacy
|
||||
- std-error-handling
|
||||
paths:
|
||||
- 3rdparty/node-maintenance-operator
|
||||
rules:
|
||||
# TODO(burgerdev): these exclusions have been added to ease migration to v2 and should eventually be addressed.
|
||||
- linters: ["staticcheck"]
|
||||
text: "QF1008: could remove embedded field"
|
||||
- linters: ["staticcheck"]
|
||||
text: "QF1001: could apply De Morgan's law"
|
||||
- linters: ["staticcheck"]
|
||||
text: "ST1005: error strings should not be capitalized"
|
||||
- linters: ["revive"]
|
||||
text: "package-comments: package comment should be of the form"
|
||||
- linters: ["revive"]
|
||||
text: "package-comments: should have a package comment"
|
||||
- linters: ["staticcheck"]
|
||||
text: "QF1012: Use fmt.Fprintf"
|
||||
- linters: ["staticcheck"]
|
||||
text: "ST1019"
|
||||
|
||||
|
||||
issues:
|
||||
max-issues-per-linter: 0
|
||||
max-same-issues: 20
|
||||
exclude-dirs:
|
||||
- 3rdparty/node-maintenance-operator
|
||||
include:
|
||||
- EXC0012
|
||||
- EXC0014
|
||||
|
||||
linters-settings:
|
||||
errcheck:
|
||||
# List of functions to exclude from checking, where each entry is a single function to exclude.
|
||||
# See https://github.com/kisielk/errcheck#excluding-functions for details.
|
||||
exclude-functions:
|
||||
- (*go.uber.org/zap.Logger).Sync
|
||||
- (*google.golang.org/grpc.Server).Serve
|
||||
formatters:
|
||||
enable:
|
||||
- gofmt
|
||||
- gofumpt
|
||||
exclusions:
|
||||
generated: lax
|
||||
paths:
|
||||
- 3rdparty/node-maintenance-operator
|
||||
|
1
.nixversion
Normal file
1
.nixversion
Normal file
@ -0,0 +1 @@
|
||||
2.25.2
|
13
3rdparty/bazel/com_github_kubernetes_sigs_aws_load_balancer_controller/BUILD.bazel
vendored
Normal file
13
3rdparty/bazel/com_github_kubernetes_sigs_aws_load_balancer_controller/BUILD.bazel
vendored
Normal file
@ -0,0 +1,13 @@
|
||||
load("//bazel/sh:def.bzl", "sh_template")
|
||||
|
||||
sh_template(
|
||||
name = "pull_files",
|
||||
data = [
|
||||
"@com_github_kubernetes_sigs_aws_load_balancer_controller//:lb_policy",
|
||||
],
|
||||
substitutions = {
|
||||
"@@POLICY_SRC@@": "$(rootpath @com_github_kubernetes_sigs_aws_load_balancer_controller//:lb_policy)",
|
||||
},
|
||||
template = "pull_files.sh",
|
||||
visibility = ["//visibility:public"],
|
||||
)
|
24
3rdparty/bazel/com_github_kubernetes_sigs_aws_load_balancer_controller/pull_files.sh
vendored
Normal file
24
3rdparty/bazel/com_github_kubernetes_sigs_aws_load_balancer_controller/pull_files.sh
vendored
Normal file
@ -0,0 +1,24 @@
|
||||
#!/usr/bin/env bash
|
||||
|
||||
###### script header ######
|
||||
|
||||
lib=$(realpath @@BASE_LIB@@) || exit 1
|
||||
stat "${lib}" >> /dev/null || exit 1
|
||||
|
||||
# shellcheck source=../../../bazel/sh/lib.bash
|
||||
if ! source "${lib}"; then
|
||||
echo "Error: could not find import"
|
||||
exit 1
|
||||
fi
|
||||
|
||||
controller_policy_source="@@POLICY_SRC@@"
|
||||
|
||||
###### script body ######
|
||||
|
||||
controller_policy_real_source=$(realpath "${controller_policy_source}")
|
||||
|
||||
cd "${BUILD_WORKSPACE_DIRECTORY}" # needs to be done after realpath
|
||||
|
||||
targetDir="terraform/infrastructure/iam/aws/alb_policy.json"
|
||||
|
||||
cp "${controller_policy_real_source}" "${targetDir}"
|
22
3rdparty/bazel/com_github_kubernetes_sigs_aws_load_balancer_controller/source.bzl
vendored
Normal file
22
3rdparty/bazel/com_github_kubernetes_sigs_aws_load_balancer_controller/source.bzl
vendored
Normal file
@ -0,0 +1,22 @@
|
||||
"""A module defining the source of the AWS load balancer controller."""
|
||||
|
||||
load("@bazel_tools//tools/build_defs/repo:http.bzl", "http_archive")
|
||||
|
||||
def aws_load_balancer_controller_deps():
|
||||
http_archive(
|
||||
name = "com_github_kubernetes_sigs_aws_load_balancer_controller",
|
||||
urls = [
|
||||
"https://cdn.confidential.cloud/constellation/cas/sha256/422af7c03ebc73e1be6aea563475ec9ea6396071fa03158b9a3984aa621b8cb1",
|
||||
"https://github.com/kubernetes-sigs/aws-load-balancer-controller/archive/refs/tags/v2.12.0.tar.gz",
|
||||
],
|
||||
strip_prefix = "aws-load-balancer-controller-2.12.0",
|
||||
build_file_content = """
|
||||
filegroup(
|
||||
srcs = ["docs/install/iam_policy.json"],
|
||||
name = "lb_policy",
|
||||
visibility = ["//visibility:public"],
|
||||
)
|
||||
""",
|
||||
type = "tar.gz",
|
||||
sha256 = "422af7c03ebc73e1be6aea563475ec9ea6396071fa03158b9a3984aa621b8cb1",
|
||||
)
|
4
3rdparty/gcp-guest-agent/Dockerfile
vendored
4
3rdparty/gcp-guest-agent/Dockerfile
vendored
@ -1,4 +1,4 @@
|
||||
FROM ubuntu:22.04@sha256:0e5e4a57c2499249aafc3b40fcd541e9a456aab7296681a3994d631587203f97 as build
|
||||
FROM ubuntu:24.04@sha256:1e622c5f073b4f6bfad6632f2616c7f59ef256e96fe78bf6a595d1dc4376ac02 as build
|
||||
|
||||
# Install packages
|
||||
RUN apt-get update && apt-get install -y \
|
||||
@ -6,7 +6,7 @@ RUN apt-get update && apt-get install -y \
|
||||
git
|
||||
|
||||
# Install Go
|
||||
ARG GO_VER=1.22.3
|
||||
ARG GO_VER=1.24.2
|
||||
RUN wget -q https://go.dev/dl/go${GO_VER}.linux-amd64.tar.gz && \
|
||||
tar -C /usr/local -xzf go${GO_VER}.linux-amd64.tar.gz && \
|
||||
rm go${GO_VER}.linux-amd64.tar.gz
|
||||
|
20
MODULE.bazel
20
MODULE.bazel
@ -1,6 +1,6 @@
|
||||
module(name = "constellation")
|
||||
|
||||
bazel_dep(name = "aspect_bazel_lib", version = "2.9.4")
|
||||
bazel_dep(name = "aspect_bazel_lib", version = "2.14.0")
|
||||
|
||||
bazel_lib = use_extension("@aspect_bazel_lib//lib:extensions.bzl", "toolchains")
|
||||
bazel_lib.yq()
|
||||
@ -8,21 +8,21 @@ use_repo(bazel_lib, "jq_toolchains")
|
||||
use_repo(bazel_lib, "yq_toolchains")
|
||||
|
||||
bazel_dep(name = "bazel_skylib", version = "1.7.1")
|
||||
bazel_dep(name = "gazelle", version = "0.39.1")
|
||||
bazel_dep(name = "hermetic_cc_toolchain", version = "3.1.1")
|
||||
bazel_dep(name = "rules_cc", version = "0.1.0")
|
||||
bazel_dep(name = "rules_go", version = "0.50.1", repo_name = "io_bazel_rules_go")
|
||||
bazel_dep(name = "rules_pkg", version = "0.10.1")
|
||||
bazel_dep(name = "rules_proto", version = "6.0.2")
|
||||
bazel_dep(name = "rules_python", version = "0.40.0")
|
||||
bazel_dep(name = "gazelle", version = "0.42.0")
|
||||
bazel_dep(name = "hermetic_cc_toolchain", version = "3.2.0")
|
||||
bazel_dep(name = "rules_cc", version = "0.1.1")
|
||||
bazel_dep(name = "rules_go", version = "0.53.0", repo_name = "io_bazel_rules_go")
|
||||
bazel_dep(name = "rules_pkg", version = "1.1.0")
|
||||
bazel_dep(name = "rules_proto", version = "7.1.0")
|
||||
bazel_dep(name = "rules_python", version = "1.3.0")
|
||||
|
||||
bazel_dep(name = "buildifier_prebuilt", version = "6.4.0", dev_dependency = True)
|
||||
bazel_dep(name = "buildifier_prebuilt", version = "8.0.1", dev_dependency = True)
|
||||
|
||||
go_sdk = use_extension("@io_bazel_rules_go//go:extensions.bzl", "go_sdk")
|
||||
go_sdk.download(
|
||||
name = "go_sdk",
|
||||
patches = ["//3rdparty/bazel/org_golang:go_tls_max_handshake_size.patch"],
|
||||
version = "1.23.2",
|
||||
version = "1.24.2",
|
||||
)
|
||||
|
||||
python = use_extension("@rules_python//python/extensions:python.bzl", "python")
|
||||
|
4329
MODULE.bazel.lock
generated
4329
MODULE.bazel.lock
generated
File diff suppressed because it is too large
Load Diff
@ -234,6 +234,10 @@ load("//3rdparty/bazel/com_github_medik8s_node_maintainance_operator:source.bzl"
|
||||
|
||||
node_maintainance_operator_deps()
|
||||
|
||||
load("//3rdparty/bazel/com_github_kubernetes_sigs_aws_load_balancer_controller:source.bzl", "aws_load_balancer_controller_deps")
|
||||
|
||||
aws_load_balancer_controller_deps()
|
||||
|
||||
# CI deps
|
||||
load("//bazel/toolchains:ci_deps.bzl", "ci_deps")
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
load("@buildifier_prebuilt//:rules.bzl", "buildifier", "buildifier_test")
|
||||
load("@com_github_ash2k_bazel_tools//multirun:def.bzl", "multirun")
|
||||
load("@gazelle//:def.bzl", "gazelle")
|
||||
load("@io_bazel_rules_go//go/private/rules:go_bin_for_host.bzl", "go_bin_for_host")
|
||||
load("//bazel/ci:go_bin_for_host.bzl", "go_bin_for_host")
|
||||
load("//bazel/ci:proto_targets.bzl", "proto_targets")
|
||||
load("//bazel/sh:def.bzl", "noop_warn", "repo_command", "sh_template")
|
||||
|
||||
@ -558,6 +558,7 @@ multirun(
|
||||
commands = [
|
||||
":terraform_gen",
|
||||
"//3rdparty/bazel/com_github_medik8s_node_maintainance_operator:pull_files",
|
||||
"//3rdparty/bazel/com_github_kubernetes_sigs_aws_load_balancer_controller:pull_files",
|
||||
":go_generate",
|
||||
":proto_generate",
|
||||
],
|
||||
|
29
bazel/ci/go_bin_for_host.bzl
Normal file
29
bazel/ci/go_bin_for_host.bzl
Normal file
@ -0,0 +1,29 @@
|
||||
"""
|
||||
Go toolchain for the host platformS
|
||||
Inspired by https://github.com/bazel-contrib/rules_go/blob/6e4fdcfeb1a333b54ab39ae3413d4ded46d8958d/go/private/rules/go_bin_for_host.bzl
|
||||
"""
|
||||
|
||||
load("@local_config_platform//:constraints.bzl", "HOST_CONSTRAINTS")
|
||||
|
||||
GO_TOOLCHAIN = "@io_bazel_rules_go//go:toolchain"
|
||||
|
||||
def _ensure_target_cfg(ctx):
|
||||
if "-exec" in ctx.bin_dir.path or "/host/" in ctx.bin_dir.path:
|
||||
fail("exec not found")
|
||||
|
||||
def _go_bin_for_host_impl(ctx):
|
||||
_ensure_target_cfg(ctx)
|
||||
sdk = ctx.toolchains[GO_TOOLCHAIN].sdk
|
||||
sdk_files = ctx.runfiles([sdk.go] + sdk.headers.to_list() + sdk.libs.to_list() + sdk.srcs.to_list() + sdk.tools.to_list())
|
||||
return [
|
||||
DefaultInfo(
|
||||
files = depset([sdk.go]),
|
||||
runfiles = sdk_files,
|
||||
),
|
||||
]
|
||||
|
||||
go_bin_for_host = rule(
|
||||
implementation = _go_bin_for_host_impl,
|
||||
toolchains = [GO_TOOLCHAIN],
|
||||
exec_compatible_with = HOST_CONSTRAINTS,
|
||||
)
|
@ -63,6 +63,8 @@ license_report() {
|
||||
|
||||
github.com/edgelesssys/constellation/v2/operators/constellation-node-operator/api) ;;
|
||||
|
||||
github.com/edgelesssys/go-tdx-qpl) ;;
|
||||
|
||||
*)
|
||||
not_allowed
|
||||
;;
|
||||
@ -71,8 +73,6 @@ license_report() {
|
||||
|
||||
Unknown)
|
||||
case ${pkg} in
|
||||
github.com/edgelesssys/go-tdx-qpl/*) ;;
|
||||
|
||||
*)
|
||||
not_allowed
|
||||
;;
|
||||
|
@ -27,11 +27,16 @@ submodules=$(${go} list -f '{{.Dir}}' -m)
|
||||
PATH=$(dirname "${go}"):${PATH}
|
||||
|
||||
check_module() {
|
||||
excluded_osvs=(
|
||||
"GO-2025-3521" # Kubernetes GitRepo Volume Inadvertent Local Repository Access
|
||||
"GO-2025-3547" # Kubernetes kube-apiserver Vulnerable to Race Condition
|
||||
)
|
||||
|
||||
# shellcheck disable=SC2016 # The $ sign in the single quoted string is correct.
|
||||
CGO_ENABLED=0 ${govulncheck} -C "$1" -format json "./..." |
|
||||
"${jq}" -sr '
|
||||
"${jq}" --argjson excluded "$(printf '"%s"\n' "${excluded_osvs[@]}" | jq -s)" -sr '
|
||||
(map(select(.osv) | {"key": .osv.id, "value": .osv.summary}) | from_entries) as $osvs |
|
||||
map(select( .finding and .finding.osv != "GO-2024-3166" ) | .finding | select( .trace[-1].module | startswith("github.com/edgelesssys/") )) |
|
||||
map(select( .finding and all($excluded[] != .finding.osv; .) ) | .finding | select( .trace[-1].module | startswith("github.com/edgelesssys/") )) |
|
||||
group_by(.osv) |
|
||||
map( {"osv": .[0].osv, "summary": $osvs[.[0].osv], "traces": [.[] | [.trace[] | .module]]} ) |
|
||||
if length > 0 then halt_error(1) else .[] end'
|
||||
|
@ -46,7 +46,6 @@ excludeDirs=(
|
||||
excludeLockDirs=(
|
||||
"build"
|
||||
"terraform-provider-constellation"
|
||||
"terraform/legacy-module"
|
||||
)
|
||||
|
||||
excludeCheckDirs=(
|
||||
|
@ -5,17 +5,14 @@ based on https://github.com/bazelbuild/rules_go/issues/2111#issuecomment-1355927
|
||||
"""
|
||||
|
||||
load("@aspect_bazel_lib//lib:write_source_files.bzl", "write_source_files")
|
||||
load("@io_bazel_rules_go//go:def.bzl", "GoLibrary", "go_context")
|
||||
load("@io_bazel_rules_go//go:def.bzl", "GoInfo")
|
||||
load("@io_bazel_rules_go//proto:compiler.bzl", "GoProtoCompiler")
|
||||
|
||||
def _output_go_library_srcs_impl(ctx):
|
||||
go = go_context(ctx)
|
||||
|
||||
srcs_of_library = []
|
||||
importpath = ""
|
||||
for src in ctx.attr.deps:
|
||||
lib = src[GoLibrary]
|
||||
go_src = go.library_to_source(go, ctx.attr, lib, False)
|
||||
lib = src[GoInfo]
|
||||
if importpath and lib.importpath != importpath:
|
||||
fail(
|
||||
"importpath of all deps must match, got {} and {}",
|
||||
@ -23,7 +20,7 @@ def _output_go_library_srcs_impl(ctx):
|
||||
lib.importpath,
|
||||
)
|
||||
importpath = lib.importpath
|
||||
srcs_of_library.extend(go_src.srcs)
|
||||
srcs_of_library.extend(lib.srcs)
|
||||
|
||||
if len(srcs_of_library) != 1:
|
||||
fail("expected exactly one src for library, got {}", len(srcs_of_library))
|
||||
@ -54,7 +51,7 @@ output_go_library_srcs = rule(
|
||||
default = "@io_bazel_rules_go//proto:go_proto",
|
||||
),
|
||||
"deps": attr.label_list(
|
||||
providers = [GoLibrary],
|
||||
providers = [GoInfo],
|
||||
aspects = [],
|
||||
),
|
||||
"out": attr.output(
|
||||
|
@ -70,5 +70,5 @@ go_test(
|
||||
env = platform_container_sums_paths | platform_clis_paths,
|
||||
# keep
|
||||
x_defs = {"runsUnder": "bazel"},
|
||||
deps = ["@io_bazel_rules_go//go/runfiles:go_default_library"],
|
||||
deps = ["@io_bazel_rules_go//go/runfiles"],
|
||||
)
|
||||
|
@ -97,83 +97,83 @@ def _actionlint_deps():
|
||||
name = "com_github_rhysd_actionlint_linux_amd64",
|
||||
build_file_content = """exports_files(["actionlint"], visibility = ["//visibility:public"])""",
|
||||
urls = [
|
||||
"https://cdn.confidential.cloud/constellation/cas/sha256/fc0a6886bbb9a23a39eeec4b176193cadb54ddbe77cdbb19b637933919545395",
|
||||
"https://github.com/rhysd/actionlint/releases/download/v1.7.4/actionlint_1.7.4_linux_amd64.tar.gz",
|
||||
"https://cdn.confidential.cloud/constellation/cas/sha256/023070a287cd8cccd71515fedc843f1985bf96c436b7effaecce67290e7e0757",
|
||||
"https://github.com/rhysd/actionlint/releases/download/v1.7.7/actionlint_1.7.7_linux_amd64.tar.gz",
|
||||
],
|
||||
type = "tar.gz",
|
||||
sha256 = "fc0a6886bbb9a23a39eeec4b176193cadb54ddbe77cdbb19b637933919545395",
|
||||
sha256 = "023070a287cd8cccd71515fedc843f1985bf96c436b7effaecce67290e7e0757",
|
||||
)
|
||||
http_archive(
|
||||
name = "com_github_rhysd_actionlint_linux_arm64",
|
||||
build_file_content = """exports_files(["actionlint"], visibility = ["//visibility:public"])""",
|
||||
urls = [
|
||||
"https://cdn.confidential.cloud/constellation/cas/sha256/ede03682dc955381d057dde95bb85ce9ca418122209a8a313b617d4adec56416",
|
||||
"https://github.com/rhysd/actionlint/releases/download/v1.7.4/actionlint_1.7.4_linux_arm64.tar.gz",
|
||||
"https://cdn.confidential.cloud/constellation/cas/sha256/401942f9c24ed71e4fe71b76c7d638f66d8633575c4016efd2977ce7c28317d0",
|
||||
"https://github.com/rhysd/actionlint/releases/download/v1.7.7/actionlint_1.7.7_linux_arm64.tar.gz",
|
||||
],
|
||||
type = "tar.gz",
|
||||
sha256 = "ede03682dc955381d057dde95bb85ce9ca418122209a8a313b617d4adec56416",
|
||||
sha256 = "401942f9c24ed71e4fe71b76c7d638f66d8633575c4016efd2977ce7c28317d0",
|
||||
)
|
||||
http_archive(
|
||||
name = "com_github_rhysd_actionlint_darwin_amd64",
|
||||
build_file_content = """exports_files(["actionlint"], visibility = ["//visibility:public"])""",
|
||||
urls = [
|
||||
"https://cdn.confidential.cloud/constellation/cas/sha256/63a3ba90ee2325afad3ff2e64a4d80688c261e6c68be8e6ab91214637bf936b8",
|
||||
"https://github.com/rhysd/actionlint/releases/download/v1.7.4/actionlint_1.7.4_darwin_amd64.tar.gz",
|
||||
"https://cdn.confidential.cloud/constellation/cas/sha256/28e5de5a05fc558474f638323d736d822fff183d2d492f0aecb2b73cc44584f5",
|
||||
"https://github.com/rhysd/actionlint/releases/download/v1.7.7/actionlint_1.7.7_darwin_amd64.tar.gz",
|
||||
],
|
||||
type = "tar.gz",
|
||||
sha256 = "63a3ba90ee2325afad3ff2e64a4d80688c261e6c68be8e6ab91214637bf936b8",
|
||||
sha256 = "28e5de5a05fc558474f638323d736d822fff183d2d492f0aecb2b73cc44584f5",
|
||||
)
|
||||
http_archive(
|
||||
name = "com_github_rhysd_actionlint_darwin_arm64",
|
||||
build_file_content = """exports_files(["actionlint"], visibility = ["//visibility:public"])""",
|
||||
urls = [
|
||||
"https://cdn.confidential.cloud/constellation/cas/sha256/cbd193bb490f598d77e179261d7b76dfebd049dddede5803ba21cbf6a469aeee",
|
||||
"https://github.com/rhysd/actionlint/releases/download/v1.7.4/actionlint_1.7.4_darwin_arm64.tar.gz",
|
||||
"https://cdn.confidential.cloud/constellation/cas/sha256/2693315b9093aeacb4ebd91a993fea54fc215057bf0da2659056b4bc033873db",
|
||||
"https://github.com/rhysd/actionlint/releases/download/v1.7.7/actionlint_1.7.7_darwin_arm64.tar.gz",
|
||||
],
|
||||
type = "tar.gz",
|
||||
sha256 = "cbd193bb490f598d77e179261d7b76dfebd049dddede5803ba21cbf6a469aeee",
|
||||
sha256 = "2693315b9093aeacb4ebd91a993fea54fc215057bf0da2659056b4bc033873db",
|
||||
)
|
||||
|
||||
def _gofumpt_deps():
|
||||
http_file(
|
||||
name = "com_github_mvdan_gofumpt_linux_amd64",
|
||||
urls = [
|
||||
"https://cdn.confidential.cloud/constellation/cas/sha256/6ff459c1dcae3b0b00844c1a5a4a5b0f547237d8a4f3624aaea8d424aeef24c6",
|
||||
"https://github.com/mvdan/gofumpt/releases/download/v0.7.0/gofumpt_v0.7.0_linux_amd64",
|
||||
"https://cdn.confidential.cloud/constellation/cas/sha256/11604bbaf7321abcc2fca2c6a37b7e9198bb1e76e5a86f297c07201e8ab1fda9",
|
||||
"https://github.com/mvdan/gofumpt/releases/download/v0.8.0/gofumpt_v0.8.0_linux_amd64",
|
||||
],
|
||||
executable = True,
|
||||
downloaded_file_path = "gofumpt",
|
||||
sha256 = "6ff459c1dcae3b0b00844c1a5a4a5b0f547237d8a4f3624aaea8d424aeef24c6",
|
||||
sha256 = "11604bbaf7321abcc2fca2c6a37b7e9198bb1e76e5a86f297c07201e8ab1fda9",
|
||||
)
|
||||
http_file(
|
||||
name = "com_github_mvdan_gofumpt_linux_arm64",
|
||||
urls = [
|
||||
"https://cdn.confidential.cloud/constellation/cas/sha256/00c18c88ef50437629626ba20d677f4648684cb280952814cdd887677d42cbd3",
|
||||
"https://github.com/mvdan/gofumpt/releases/download/v0.7.0/gofumpt_v0.7.0_linux_arm64",
|
||||
"https://cdn.confidential.cloud/constellation/cas/sha256/787c1d3d4d20e6fe2b0bf06a5a913ac0f50343dbf9a71540724a2b8092a0e6ca",
|
||||
"https://github.com/mvdan/gofumpt/releases/download/v0.8.0/gofumpt_v0.8.0_linux_arm64",
|
||||
],
|
||||
executable = True,
|
||||
downloaded_file_path = "gofumpt",
|
||||
sha256 = "00c18c88ef50437629626ba20d677f4648684cb280952814cdd887677d42cbd3",
|
||||
sha256 = "787c1d3d4d20e6fe2b0bf06a5a913ac0f50343dbf9a71540724a2b8092a0e6ca",
|
||||
)
|
||||
http_file(
|
||||
name = "com_github_mvdan_gofumpt_darwin_amd64",
|
||||
urls = [
|
||||
"https://cdn.confidential.cloud/constellation/cas/sha256/b7d05e092da45c5ec96344ab635b1d6547c3e27c840ba39bc76989934efd7ce3",
|
||||
"https://github.com/mvdan/gofumpt/releases/download/v0.7.0/gofumpt_v0.7.0_darwin_amd64",
|
||||
"https://cdn.confidential.cloud/constellation/cas/sha256/0dda6600cf263b703a5ad93e792b06180c36afdee9638617a91dd552f2c6fb3e",
|
||||
"https://github.com/mvdan/gofumpt/releases/download/v0.8.0/gofumpt_v0.8.0_darwin_amd64",
|
||||
],
|
||||
executable = True,
|
||||
downloaded_file_path = "gofumpt",
|
||||
sha256 = "b7d05e092da45c5ec96344ab635b1d6547c3e27c840ba39bc76989934efd7ce3",
|
||||
sha256 = "0dda6600cf263b703a5ad93e792b06180c36afdee9638617a91dd552f2c6fb3e",
|
||||
)
|
||||
http_file(
|
||||
name = "com_github_mvdan_gofumpt_darwin_arm64",
|
||||
urls = [
|
||||
"https://cdn.confidential.cloud/constellation/cas/sha256/08f23114760a090b090706d92b8c52b9875b9eb352d76c77aa354d6aa20b045a",
|
||||
"https://github.com/mvdan/gofumpt/releases/download/v0.7.0/gofumpt_v0.7.0_darwin_arm64",
|
||||
"https://cdn.confidential.cloud/constellation/cas/sha256/7e66e92b7a67d1d12839ab030fb7ae38e5e2273474af3762e67bc7fe9471fcd9",
|
||||
"https://github.com/mvdan/gofumpt/releases/download/v0.8.0/gofumpt_v0.8.0_darwin_arm64",
|
||||
],
|
||||
executable = True,
|
||||
downloaded_file_path = "gofumpt",
|
||||
sha256 = "08f23114760a090b090706d92b8c52b9875b9eb352d76c77aa354d6aa20b045a",
|
||||
sha256 = "7e66e92b7a67d1d12839ab030fb7ae38e5e2273474af3762e67bc7fe9471fcd9",
|
||||
)
|
||||
|
||||
def _tfsec_deps():
|
||||
@ -181,41 +181,41 @@ def _tfsec_deps():
|
||||
name = "com_github_aquasecurity_tfsec_linux_amd64",
|
||||
build_file_content = """exports_files(["tfsec"], visibility = ["//visibility:public"])""",
|
||||
urls = [
|
||||
"https://cdn.confidential.cloud/constellation/cas/sha256/9d783fa225a570f034000136973afba86a1708c919a539b72b3ea954a198289c",
|
||||
"https://github.com/aquasecurity/tfsec/releases/download/v1.28.11/tfsec_1.28.11_linux_amd64.tar.gz",
|
||||
"https://cdn.confidential.cloud/constellation/cas/sha256/f643c390e6eabdf4bd64e807ff63abfe977d4f027c0b535eefe7a5c9f391fc28",
|
||||
"https://github.com/aquasecurity/tfsec/releases/download/v1.28.13/tfsec_1.28.13_linux_amd64.tar.gz",
|
||||
],
|
||||
type = "tar.gz",
|
||||
sha256 = "9d783fa225a570f034000136973afba86a1708c919a539b72b3ea954a198289c",
|
||||
sha256 = "f643c390e6eabdf4bd64e807ff63abfe977d4f027c0b535eefe7a5c9f391fc28",
|
||||
)
|
||||
http_archive(
|
||||
name = "com_github_aquasecurity_tfsec_linux_arm64",
|
||||
build_file_content = """exports_files(["tfsec"], visibility = ["//visibility:public"])""",
|
||||
urls = [
|
||||
"https://cdn.confidential.cloud/constellation/cas/sha256/68b5c4f6b7c459dd890ecff94b0732e456ef45974894f58bbb90fbb4816f3e52",
|
||||
"https://github.com/aquasecurity/tfsec/releases/download/v1.28.11/tfsec_1.28.11_linux_arm64.tar.gz",
|
||||
"https://cdn.confidential.cloud/constellation/cas/sha256/4aed1b122f817b684cc48da9cdc4b98b891808969441914570c089883c85ac50",
|
||||
"https://github.com/aquasecurity/tfsec/releases/download/v1.28.13/tfsec_1.28.13_linux_arm64.tar.gz",
|
||||
],
|
||||
type = "tar.gz",
|
||||
sha256 = "68b5c4f6b7c459dd890ecff94b0732e456ef45974894f58bbb90fbb4816f3e52",
|
||||
sha256 = "4aed1b122f817b684cc48da9cdc4b98b891808969441914570c089883c85ac50",
|
||||
)
|
||||
http_archive(
|
||||
name = "com_github_aquasecurity_tfsec_darwin_amd64",
|
||||
build_file_content = """exports_files(["tfsec"], visibility = ["//visibility:public"])""",
|
||||
urls = [
|
||||
"https://cdn.confidential.cloud/constellation/cas/sha256/d377597f2fd4e6956bb7beb711d627b0e0204c421c17e2cd062213222c2f3001",
|
||||
"https://github.com/aquasecurity/tfsec/releases/download/v1.28.11/tfsec_1.28.11_darwin_amd64.tar.gz",
|
||||
"https://cdn.confidential.cloud/constellation/cas/sha256/966c7656f797c120dceb56a208a50dbf6a363c30876662a28e1c65505afca10d",
|
||||
"https://github.com/aquasecurity/tfsec/releases/download/v1.28.13/tfsec_1.28.13_darwin_amd64.tar.gz",
|
||||
],
|
||||
type = "tar.gz",
|
||||
sha256 = "d377597f2fd4e6956bb7beb711d627b0e0204c421c17e2cd062213222c2f3001",
|
||||
sha256 = "966c7656f797c120dceb56a208a50dbf6a363c30876662a28e1c65505afca10d",
|
||||
)
|
||||
http_archive(
|
||||
name = "com_github_aquasecurity_tfsec_darwin_arm64",
|
||||
build_file_content = """exports_files(["tfsec"], visibility = ["//visibility:public"])""",
|
||||
urls = [
|
||||
"https://cdn.confidential.cloud/constellation/cas/sha256/14db6b40049226ebc779789196f99eb4977bb93c99fa51c8b72b603e6cdf44e7",
|
||||
"https://github.com/aquasecurity/tfsec/releases/download/v1.28.11/tfsec_1.28.11_darwin_arm64.tar.gz",
|
||||
"https://cdn.confidential.cloud/constellation/cas/sha256/a381580c81d3413bb3fe07aa91ab89e51c1bbbd33c848194a2b43e9be3729c16",
|
||||
"https://github.com/aquasecurity/tfsec/releases/download/v1.28.13/tfsec_1.28.13_darwin_arm64.tar.gz",
|
||||
],
|
||||
type = "tar.gz",
|
||||
sha256 = "14db6b40049226ebc779789196f99eb4977bb93c99fa51c8b72b603e6cdf44e7",
|
||||
sha256 = "a381580c81d3413bb3fe07aa91ab89e51c1bbbd33c848194a2b43e9be3729c16",
|
||||
)
|
||||
|
||||
def _golangci_lint_deps():
|
||||
@ -223,45 +223,45 @@ def _golangci_lint_deps():
|
||||
name = "com_github_golangci_golangci_lint_linux_amd64",
|
||||
build_file = "//bazel/toolchains:BUILD.golangci.bazel",
|
||||
urls = [
|
||||
"https://cdn.confidential.cloud/constellation/cas/sha256/5101292b7925a6a14b49c5c3d845c5021399698ffd2f41bcfab8a111b5669939",
|
||||
"https://github.com/golangci/golangci-lint/releases/download/v1.62.2/golangci-lint-1.62.2-linux-amd64.tar.gz",
|
||||
"https://cdn.confidential.cloud/constellation/cas/sha256/bc16fd1ef25bce2c600de0122600100ab26d6d75388cc5369c5bb916cb2b82e3",
|
||||
"https://github.com/golangci/golangci-lint/releases/download/v2.1.2/golangci-lint-2.1.2-linux-amd64.tar.gz",
|
||||
],
|
||||
strip_prefix = "golangci-lint-1.62.2-linux-amd64",
|
||||
strip_prefix = "golangci-lint-2.1.2-linux-amd64",
|
||||
type = "tar.gz",
|
||||
sha256 = "5101292b7925a6a14b49c5c3d845c5021399698ffd2f41bcfab8a111b5669939",
|
||||
sha256 = "bc16fd1ef25bce2c600de0122600100ab26d6d75388cc5369c5bb916cb2b82e3",
|
||||
)
|
||||
http_archive(
|
||||
name = "com_github_golangci_golangci_lint_linux_arm64",
|
||||
build_file = "//bazel/toolchains:BUILD.golangci.bazel",
|
||||
urls = [
|
||||
"https://cdn.confidential.cloud/constellation/cas/sha256/10b6f5bd8483bd9e85a82f6119ed08f95609f42b86dc344b5dc15703c74d5b85",
|
||||
"https://github.com/golangci/golangci-lint/releases/download/v1.62.2/golangci-lint-1.62.2-linux-arm64.tar.gz",
|
||||
"https://cdn.confidential.cloud/constellation/cas/sha256/46e86f1c4a94236e4d0bb35252c72939bed9f749897aaad54b576d430b1bb6d4",
|
||||
"https://github.com/golangci/golangci-lint/releases/download/v2.1.2/golangci-lint-2.1.2-linux-arm64.tar.gz",
|
||||
],
|
||||
strip_prefix = "golangci-lint-1.62.2-linux-arm64",
|
||||
strip_prefix = "golangci-lint-2.1.2-linux-arm64",
|
||||
type = "tar.gz",
|
||||
sha256 = "10b6f5bd8483bd9e85a82f6119ed08f95609f42b86dc344b5dc15703c74d5b85",
|
||||
sha256 = "46e86f1c4a94236e4d0bb35252c72939bed9f749897aaad54b576d430b1bb6d4",
|
||||
)
|
||||
http_archive(
|
||||
name = "com_github_golangci_golangci_lint_darwin_amd64",
|
||||
build_file = "//bazel/toolchains:BUILD.golangci.bazel",
|
||||
urls = [
|
||||
"https://cdn.confidential.cloud/constellation/cas/sha256/6c9ffd05896f0638d5c37152ac4ae337c2d301ba6c9dadf49c04e6d639f10f91",
|
||||
"https://github.com/golangci/golangci-lint/releases/download/v1.62.2/golangci-lint-1.62.2-darwin-amd64.tar.gz",
|
||||
"https://cdn.confidential.cloud/constellation/cas/sha256/ed02ba3ad28466d61d2ae2b80cc95671713fa842c353da37842b1b89e36cb3ce",
|
||||
"https://github.com/golangci/golangci-lint/releases/download/v2.1.2/golangci-lint-2.1.2-darwin-amd64.tar.gz",
|
||||
],
|
||||
strip_prefix = "golangci-lint-1.62.2-darwin-amd64",
|
||||
strip_prefix = "golangci-lint-2.1.2-darwin-amd64",
|
||||
type = "tar.gz",
|
||||
sha256 = "6c9ffd05896f0638d5c37152ac4ae337c2d301ba6c9dadf49c04e6d639f10f91",
|
||||
sha256 = "ed02ba3ad28466d61d2ae2b80cc95671713fa842c353da37842b1b89e36cb3ce",
|
||||
)
|
||||
http_archive(
|
||||
name = "com_github_golangci_golangci_lint_darwin_arm64",
|
||||
build_file = "//bazel/toolchains:BUILD.golangci.bazel",
|
||||
urls = [
|
||||
"https://cdn.confidential.cloud/constellation/cas/sha256/6c76f54467ba471f7bdcd5df0f27c3fa3dbe530b771a10d384c3d8c7178f5e89",
|
||||
"https://github.com/golangci/golangci-lint/releases/download/v1.62.2/golangci-lint-1.62.2-darwin-arm64.tar.gz",
|
||||
"https://cdn.confidential.cloud/constellation/cas/sha256/1cff60651d7c95a4248fa72f0dd020bffed1d2dc4dd8c2c77aee89a0731fa615",
|
||||
"https://github.com/golangci/golangci-lint/releases/download/v2.1.2/golangci-lint-2.1.2-darwin-arm64.tar.gz",
|
||||
],
|
||||
strip_prefix = "golangci-lint-1.62.2-darwin-arm64",
|
||||
strip_prefix = "golangci-lint-2.1.2-darwin-arm64",
|
||||
type = "tar.gz",
|
||||
sha256 = "6c76f54467ba471f7bdcd5df0f27c3fa3dbe530b771a10d384c3d8c7178f5e89",
|
||||
sha256 = "1cff60651d7c95a4248fa72f0dd020bffed1d2dc4dd8c2c77aee89a0731fa615",
|
||||
)
|
||||
|
||||
def _buf_deps():
|
||||
@ -270,44 +270,44 @@ def _buf_deps():
|
||||
strip_prefix = "buf/bin",
|
||||
build_file_content = """exports_files(["buf"], visibility = ["//visibility:public"])""",
|
||||
urls = [
|
||||
"https://cdn.confidential.cloud/constellation/cas/sha256/deebd48a6bf85b073d7c7800c17b330376487e86852d4905c76a205b6fd795d4",
|
||||
"https://github.com/bufbuild/buf/releases/download/v1.45.0/buf-Linux-x86_64.tar.gz",
|
||||
"https://cdn.confidential.cloud/constellation/cas/sha256/ce439b98c0e655ba1821fc529442f677135a9a44206a85cf2081a445bde02554",
|
||||
"https://github.com/bufbuild/buf/releases/download/v1.52.1/buf-Linux-x86_64.tar.gz",
|
||||
],
|
||||
type = "tar.gz",
|
||||
sha256 = "deebd48a6bf85b073d7c7800c17b330376487e86852d4905c76a205b6fd795d4",
|
||||
sha256 = "ce439b98c0e655ba1821fc529442f677135a9a44206a85cf2081a445bde02554",
|
||||
)
|
||||
http_archive(
|
||||
name = "com_github_bufbuild_buf_linux_arm64",
|
||||
strip_prefix = "buf/bin",
|
||||
build_file_content = """exports_files(["buf"], visibility = ["//visibility:public"])""",
|
||||
urls = [
|
||||
"https://cdn.confidential.cloud/constellation/cas/sha256/2d3ebfed036881d0615e5b24288cf788791b45848f26e915e3efe7ee9c10735d",
|
||||
"https://github.com/bufbuild/buf/releases/download/v1.45.0/buf-Linux-aarch64.tar.gz",
|
||||
"https://cdn.confidential.cloud/constellation/cas/sha256/fb980e62f55a0d705f555124b5b250a6234deae67b3a493b1844fed8cb48f012",
|
||||
"https://github.com/bufbuild/buf/releases/download/v1.52.1/buf-Linux-aarch64.tar.gz",
|
||||
],
|
||||
type = "tar.gz",
|
||||
sha256 = "2d3ebfed036881d0615e5b24288cf788791b45848f26e915e3efe7ee9c10735d",
|
||||
sha256 = "fb980e62f55a0d705f555124b5b250a6234deae67b3a493b1844fed8cb48f012",
|
||||
)
|
||||
http_archive(
|
||||
name = "com_github_bufbuild_buf_darwin_amd64",
|
||||
strip_prefix = "buf/bin",
|
||||
build_file_content = """exports_files(["buf"], visibility = ["//visibility:public"])""",
|
||||
urls = [
|
||||
"https://cdn.confidential.cloud/constellation/cas/sha256/7fef3c482ac440cc09c40864498ef1f44745fde82428ddf52edd2012d3a036a4",
|
||||
"https://github.com/bufbuild/buf/releases/download/v1.45.0/buf-Darwin-x86_64.tar.gz",
|
||||
"https://cdn.confidential.cloud/constellation/cas/sha256/ff3aedaa8bf53c3ae53bf863bb6141a23ef9e2ef750016ab217b0466ab3e89be",
|
||||
"https://github.com/bufbuild/buf/releases/download/v1.52.1/buf-Darwin-x86_64.tar.gz",
|
||||
],
|
||||
type = "tar.gz",
|
||||
sha256 = "7fef3c482ac440cc09c40864498ef1f44745fde82428ddf52edd2012d3a036a4",
|
||||
sha256 = "ff3aedaa8bf53c3ae53bf863bb6141a23ef9e2ef750016ab217b0466ab3e89be",
|
||||
)
|
||||
http_archive(
|
||||
name = "com_github_bufbuild_buf_darwin_arm64",
|
||||
strip_prefix = "buf/bin",
|
||||
build_file_content = """exports_files(["buf"], visibility = ["//visibility:public"])""",
|
||||
urls = [
|
||||
"https://cdn.confidential.cloud/constellation/cas/sha256/e5309c70c7bb4a06d799ab7c7601c0d647c704085593d5cd981db29f986e469b",
|
||||
"https://github.com/bufbuild/buf/releases/download/v1.45.0/buf-Darwin-arm64.tar.gz",
|
||||
"https://cdn.confidential.cloud/constellation/cas/sha256/b11d5afda7f58a44a6520b798902b1263aba921b0989cb156ecf2acc8eb1ce31",
|
||||
"https://github.com/bufbuild/buf/releases/download/v1.52.1/buf-Darwin-arm64.tar.gz",
|
||||
],
|
||||
type = "tar.gz",
|
||||
sha256 = "e5309c70c7bb4a06d799ab7c7601c0d647c704085593d5cd981db29f986e469b",
|
||||
sha256 = "b11d5afda7f58a44a6520b798902b1263aba921b0989cb156ecf2acc8eb1ce31",
|
||||
)
|
||||
|
||||
def _talos_docgen_deps():
|
||||
|
@ -7,7 +7,7 @@ load("@rules_oci//oci:pull.bzl", "oci_pull")
|
||||
def containter_image_deps():
|
||||
oci_pull(
|
||||
name = "distroless_static",
|
||||
digest = "sha256:f4a57e8ffd7ba407bdd0eb315bb54ef1f21a2100a7f032e9102e4da34fe7c196",
|
||||
digest = "sha256:3d0f463de06b7ddff27684ec3bfd0b54a425149d0f8685308b1fdf297b0265e9",
|
||||
image = "gcr.io/distroless/static",
|
||||
platforms = [
|
||||
"linux/amd64",
|
||||
@ -16,6 +16,6 @@ def containter_image_deps():
|
||||
)
|
||||
oci_pull(
|
||||
name = "libvirtd_base",
|
||||
digest = "sha256:99dbf3cf69b3f97cb0158bde152c9bc7c2a96458cf462527ee80b75754f572a7",
|
||||
digest = "sha256:f23e0f587860c841adde25b1b4f0d99aa4fbce1c92b01b5b46ab5fa35980a135",
|
||||
image = "ghcr.io/edgelesssys/constellation/libvirtd-base",
|
||||
)
|
||||
|
@ -9,38 +9,38 @@ def kernel_rpms():
|
||||
http_file(
|
||||
name = "kernel_lts",
|
||||
urls = [
|
||||
"https://cdn.confidential.cloud/constellation/cas/sha256/c87995e19c04e2f033e6db5e92bfcb845ac015722e776c09a7af4c82c86cd273",
|
||||
"https://cdn.confidential.cloud/constellation/kernel/6.6.30-100.constellation/kernel-6.6.30-100.constellation.fc40.x86_64.rpm",
|
||||
"https://cdn.confidential.cloud/constellation/cas/sha256/7834bc4bc7e088c98505956382884bdc670ab9a9283288b7fef04a43df31356e",
|
||||
"https://cdn.confidential.cloud/constellation/kernel/6.6.87-100.constellation/kernel-6.6.87-100.constellation.fc40.x86_64.rpm",
|
||||
],
|
||||
downloaded_file_path = "kernel-lts.rpm",
|
||||
sha256 = "c87995e19c04e2f033e6db5e92bfcb845ac015722e776c09a7af4c82c86cd273",
|
||||
sha256 = "7834bc4bc7e088c98505956382884bdc670ab9a9283288b7fef04a43df31356e",
|
||||
)
|
||||
http_file(
|
||||
name = "kernel_core_lts",
|
||||
urls = [
|
||||
"https://cdn.confidential.cloud/constellation/cas/sha256/5692d862b0cc0c442c581e5f3dc9f3c36cabda0c29d3f62e9b6313a6ec88b140",
|
||||
"https://cdn.confidential.cloud/constellation/kernel/6.6.30-100.constellation/kernel-core-6.6.30-100.constellation.fc40.x86_64.rpm",
|
||||
"https://cdn.confidential.cloud/constellation/cas/sha256/2763c699d1e2f9810421ac7af2e9c94c6f98533e83f2938c26f1d824e3559b97",
|
||||
"https://cdn.confidential.cloud/constellation/kernel/6.6.87-100.constellation/kernel-core-6.6.87-100.constellation.fc40.x86_64.rpm",
|
||||
],
|
||||
downloaded_file_path = "kernel-core-lts.rpm",
|
||||
sha256 = "5692d862b0cc0c442c581e5f3dc9f3c36cabda0c29d3f62e9b6313a6ec88b140",
|
||||
sha256 = "2763c699d1e2f9810421ac7af2e9c94c6f98533e83f2938c26f1d824e3559b97",
|
||||
)
|
||||
http_file(
|
||||
name = "kernel_modules_lts",
|
||||
urls = [
|
||||
"https://cdn.confidential.cloud/constellation/cas/sha256/e1b697343b4f8ed8e992cd92860208dc1c28eb8b25a88f42f426326a0bbc307f",
|
||||
"https://cdn.confidential.cloud/constellation/kernel/6.6.30-100.constellation/kernel-modules-6.6.30-100.constellation.fc40.x86_64.rpm",
|
||||
"https://cdn.confidential.cloud/constellation/cas/sha256/a7604eec263f190db573d809d20336bbf75e46c51f5977f5db95bb88bfec56d3",
|
||||
"https://cdn.confidential.cloud/constellation/kernel/6.6.87-100.constellation/kernel-modules-6.6.87-100.constellation.fc40.x86_64.rpm",
|
||||
],
|
||||
downloaded_file_path = "kernel-modules-lts.rpm",
|
||||
sha256 = "e1b697343b4f8ed8e992cd92860208dc1c28eb8b25a88f42f426326a0bbc307f",
|
||||
sha256 = "a7604eec263f190db573d809d20336bbf75e46c51f5977f5db95bb88bfec56d3",
|
||||
)
|
||||
http_file(
|
||||
name = "kernel_modules_core_lts",
|
||||
urls = [
|
||||
"https://cdn.confidential.cloud/constellation/cas/sha256/448c6b10d9ed02aed078ff77223f5e495b2041be12d92eb0e5ca5726a08e0626",
|
||||
"https://cdn.confidential.cloud/constellation/kernel/6.6.30-100.constellation/kernel-modules-core-6.6.30-100.constellation.fc40.x86_64.rpm",
|
||||
"https://cdn.confidential.cloud/constellation/cas/sha256/648fd503d7d54608fbd62ace87c4da098f72abbaac1ab7e343327fc24ccef7f8",
|
||||
"https://cdn.confidential.cloud/constellation/kernel/6.6.87-100.constellation/kernel-modules-core-6.6.87-100.constellation.fc40.x86_64.rpm",
|
||||
],
|
||||
downloaded_file_path = "kernel-modules-core-lts.rpm",
|
||||
sha256 = "448c6b10d9ed02aed078ff77223f5e495b2041be12d92eb0e5ca5726a08e0626",
|
||||
sha256 = "648fd503d7d54608fbd62ace87c4da098f72abbaac1ab7e343327fc24ccef7f8",
|
||||
)
|
||||
|
||||
# mainline kernel
|
||||
|
@ -5,11 +5,11 @@ load("@bazel_tools//tools/build_defs/repo:http.bzl", "http_archive")
|
||||
def nixpkgs_deps():
|
||||
http_archive(
|
||||
name = "io_tweag_rules_nixpkgs",
|
||||
sha256 = "1ce13c13a2f354fd37016d9fb333efeddcb308e89db9b3a8f45eafce57746f49",
|
||||
strip_prefix = "rules_nixpkgs-668609f0b3627751651cb325166d0e95062be3f7",
|
||||
sha256 = "30271f7bd380e4e20e4d7132c324946c4fdbc31ebe0bbb6638a0f61a37e74397",
|
||||
strip_prefix = "rules_nixpkgs-0.13.0",
|
||||
urls = [
|
||||
"https://cdn.confidential.cloud/constellation/cas/sha256/1ce13c13a2f354fd37016d9fb333efeddcb308e89db9b3a8f45eafce57746f49",
|
||||
"https://github.com/tweag/rules_nixpkgs/archive/668609f0b3627751651cb325166d0e95062be3f7.tar.gz",
|
||||
"https://cdn.confidential.cloud/constellation/cas/sha256/30271f7bd380e4e20e4d7132c324946c4fdbc31ebe0bbb6638a0f61a37e74397",
|
||||
"https://github.com/tweag/rules_nixpkgs/releases/download/v0.13.0/rules_nixpkgs-0.13.0.tar.gz",
|
||||
],
|
||||
type = "tar.gz",
|
||||
)
|
||||
|
@ -7,14 +7,13 @@ def oci_deps():
|
||||
# Remove this override once https://github.com/bazel-contrib/rules_oci/issues/420 is fixed.
|
||||
http_archive(
|
||||
name = "rules_oci",
|
||||
strip_prefix = "rules_oci-2.0.1",
|
||||
strip_prefix = "rules_oci-2.2.5",
|
||||
type = "tar.gz",
|
||||
urls = [
|
||||
"https://cdn.confidential.cloud/constellation/cas/sha256/acbf8f40e062f707f8754e914dcb0013803c6e5e3679d3e05b571a9f5c7e0b43",
|
||||
"https://cdn.confidential.cloud/constellation/cas/sha256/f70f07f9d0d6c275d7ec7d3c7f236d9b552ba3205e8f37df9c1125031cf967cc",
|
||||
"https://github.com/bazel-contrib/rules_oci/releases/download/v2.0.1/rules_oci-v2.0.1.tar.gz",
|
||||
"https://cdn.confidential.cloud/constellation/cas/sha256/361c417e8c95cd7c3d8b5cf4b202e76bac8d41532131534ff8e6fa43aa161142",
|
||||
"https://github.com/bazel-contrib/rules_oci/releases/download/v2.2.5/rules_oci-v2.2.5.tar.gz",
|
||||
],
|
||||
sha256 = "acbf8f40e062f707f8754e914dcb0013803c6e5e3679d3e05b571a9f5c7e0b43",
|
||||
sha256 = "361c417e8c95cd7c3d8b5cf4b202e76bac8d41532131534ff8e6fa43aa161142",
|
||||
patches = ["//bazel/toolchains:0001-disable-Windows-support.patch"],
|
||||
patch_args = ["-p1"],
|
||||
)
|
||||
|
@ -1,7 +1,7 @@
|
||||
// Code generated by protoc-gen-go. DO NOT EDIT.
|
||||
// versions:
|
||||
// protoc-gen-go v1.35.2
|
||||
// protoc v5.29.0--rc2
|
||||
// protoc-gen-go v1.36.6
|
||||
// protoc v5.29.1
|
||||
// source: bootstrapper/initproto/init.proto
|
||||
|
||||
package initproto
|
||||
@ -16,6 +16,7 @@ import (
|
||||
protoimpl "google.golang.org/protobuf/runtime/protoimpl"
|
||||
reflect "reflect"
|
||||
sync "sync"
|
||||
unsafe "unsafe"
|
||||
)
|
||||
|
||||
const (
|
||||
@ -26,10 +27,7 @@ const (
|
||||
)
|
||||
|
||||
type InitRequest struct {
|
||||
state protoimpl.MessageState
|
||||
sizeCache protoimpl.SizeCache
|
||||
unknownFields protoimpl.UnknownFields
|
||||
|
||||
state protoimpl.MessageState `protogen:"open.v1"`
|
||||
KmsUri string `protobuf:"bytes,1,opt,name=kms_uri,json=kmsUri,proto3" json:"kms_uri,omitempty"`
|
||||
StorageUri string `protobuf:"bytes,2,opt,name=storage_uri,json=storageUri,proto3" json:"storage_uri,omitempty"`
|
||||
MeasurementSalt []byte `protobuf:"bytes,3,opt,name=measurement_salt,json=measurementSalt,proto3" json:"measurement_salt,omitempty"`
|
||||
@ -40,6 +38,8 @@ type InitRequest struct {
|
||||
ClusterName string `protobuf:"bytes,9,opt,name=cluster_name,json=clusterName,proto3" json:"cluster_name,omitempty"`
|
||||
ApiserverCertSans []string `protobuf:"bytes,10,rep,name=apiserver_cert_sans,json=apiserverCertSans,proto3" json:"apiserver_cert_sans,omitempty"`
|
||||
ServiceCidr string `protobuf:"bytes,11,opt,name=service_cidr,json=serviceCidr,proto3" json:"service_cidr,omitempty"`
|
||||
unknownFields protoimpl.UnknownFields
|
||||
sizeCache protoimpl.SizeCache
|
||||
}
|
||||
|
||||
func (x *InitRequest) Reset() {
|
||||
@ -143,16 +143,15 @@ func (x *InitRequest) GetServiceCidr() string {
|
||||
}
|
||||
|
||||
type InitResponse struct {
|
||||
state protoimpl.MessageState
|
||||
sizeCache protoimpl.SizeCache
|
||||
unknownFields protoimpl.UnknownFields
|
||||
|
||||
// Types that are assignable to Kind:
|
||||
state protoimpl.MessageState `protogen:"open.v1"`
|
||||
// Types that are valid to be assigned to Kind:
|
||||
//
|
||||
// *InitResponse_InitSuccess
|
||||
// *InitResponse_InitFailure
|
||||
// *InitResponse_Log
|
||||
Kind isInitResponse_Kind `protobuf_oneof:"kind"`
|
||||
Kind isInitResponse_Kind `protobuf_oneof:"kind"`
|
||||
unknownFields protoimpl.UnknownFields
|
||||
sizeCache protoimpl.SizeCache
|
||||
}
|
||||
|
||||
func (x *InitResponse) Reset() {
|
||||
@ -185,30 +184,36 @@ func (*InitResponse) Descriptor() ([]byte, []int) {
|
||||
return file_bootstrapper_initproto_init_proto_rawDescGZIP(), []int{1}
|
||||
}
|
||||
|
||||
func (m *InitResponse) GetKind() isInitResponse_Kind {
|
||||
if m != nil {
|
||||
return m.Kind
|
||||
func (x *InitResponse) GetKind() isInitResponse_Kind {
|
||||
if x != nil {
|
||||
return x.Kind
|
||||
}
|
||||
return nil
|
||||
}
|
||||
|
||||
func (x *InitResponse) GetInitSuccess() *InitSuccessResponse {
|
||||
if x, ok := x.GetKind().(*InitResponse_InitSuccess); ok {
|
||||
return x.InitSuccess
|
||||
if x != nil {
|
||||
if x, ok := x.Kind.(*InitResponse_InitSuccess); ok {
|
||||
return x.InitSuccess
|
||||
}
|
||||
}
|
||||
return nil
|
||||
}
|
||||
|
||||
func (x *InitResponse) GetInitFailure() *InitFailureResponse {
|
||||
if x, ok := x.GetKind().(*InitResponse_InitFailure); ok {
|
||||
return x.InitFailure
|
||||
if x != nil {
|
||||
if x, ok := x.Kind.(*InitResponse_InitFailure); ok {
|
||||
return x.InitFailure
|
||||
}
|
||||
}
|
||||
return nil
|
||||
}
|
||||
|
||||
func (x *InitResponse) GetLog() *LogResponseType {
|
||||
if x, ok := x.GetKind().(*InitResponse_Log); ok {
|
||||
return x.Log
|
||||
if x != nil {
|
||||
if x, ok := x.Kind.(*InitResponse_Log); ok {
|
||||
return x.Log
|
||||
}
|
||||
}
|
||||
return nil
|
||||
}
|
||||
@ -236,13 +241,12 @@ func (*InitResponse_InitFailure) isInitResponse_Kind() {}
|
||||
func (*InitResponse_Log) isInitResponse_Kind() {}
|
||||
|
||||
type InitSuccessResponse struct {
|
||||
state protoimpl.MessageState
|
||||
sizeCache protoimpl.SizeCache
|
||||
state protoimpl.MessageState `protogen:"open.v1"`
|
||||
Kubeconfig []byte `protobuf:"bytes,1,opt,name=kubeconfig,proto3" json:"kubeconfig,omitempty"`
|
||||
OwnerId []byte `protobuf:"bytes,2,opt,name=owner_id,json=ownerId,proto3" json:"owner_id,omitempty"`
|
||||
ClusterId []byte `protobuf:"bytes,3,opt,name=cluster_id,json=clusterId,proto3" json:"cluster_id,omitempty"`
|
||||
unknownFields protoimpl.UnknownFields
|
||||
|
||||
Kubeconfig []byte `protobuf:"bytes,1,opt,name=kubeconfig,proto3" json:"kubeconfig,omitempty"`
|
||||
OwnerId []byte `protobuf:"bytes,2,opt,name=owner_id,json=ownerId,proto3" json:"owner_id,omitempty"`
|
||||
ClusterId []byte `protobuf:"bytes,3,opt,name=cluster_id,json=clusterId,proto3" json:"cluster_id,omitempty"`
|
||||
sizeCache protoimpl.SizeCache
|
||||
}
|
||||
|
||||
func (x *InitSuccessResponse) Reset() {
|
||||
@ -297,11 +301,10 @@ func (x *InitSuccessResponse) GetClusterId() []byte {
|
||||
}
|
||||
|
||||
type InitFailureResponse struct {
|
||||
state protoimpl.MessageState
|
||||
sizeCache protoimpl.SizeCache
|
||||
state protoimpl.MessageState `protogen:"open.v1"`
|
||||
Error string `protobuf:"bytes,1,opt,name=error,proto3" json:"error,omitempty"`
|
||||
unknownFields protoimpl.UnknownFields
|
||||
|
||||
Error string `protobuf:"bytes,1,opt,name=error,proto3" json:"error,omitempty"`
|
||||
sizeCache protoimpl.SizeCache
|
||||
}
|
||||
|
||||
func (x *InitFailureResponse) Reset() {
|
||||
@ -342,11 +345,10 @@ func (x *InitFailureResponse) GetError() string {
|
||||
}
|
||||
|
||||
type LogResponseType struct {
|
||||
state protoimpl.MessageState
|
||||
sizeCache protoimpl.SizeCache
|
||||
state protoimpl.MessageState `protogen:"open.v1"`
|
||||
Log []byte `protobuf:"bytes,1,opt,name=log,proto3" json:"log,omitempty"`
|
||||
unknownFields protoimpl.UnknownFields
|
||||
|
||||
Log []byte `protobuf:"bytes,1,opt,name=log,proto3" json:"log,omitempty"`
|
||||
sizeCache protoimpl.SizeCache
|
||||
}
|
||||
|
||||
func (x *LogResponseType) Reset() {
|
||||
@ -387,14 +389,13 @@ func (x *LogResponseType) GetLog() []byte {
|
||||
}
|
||||
|
||||
type KubernetesComponent struct {
|
||||
state protoimpl.MessageState
|
||||
sizeCache protoimpl.SizeCache
|
||||
state protoimpl.MessageState `protogen:"open.v1"`
|
||||
Url string `protobuf:"bytes,1,opt,name=url,proto3" json:"url,omitempty"`
|
||||
Hash string `protobuf:"bytes,2,opt,name=hash,proto3" json:"hash,omitempty"`
|
||||
InstallPath string `protobuf:"bytes,3,opt,name=install_path,json=installPath,proto3" json:"install_path,omitempty"`
|
||||
Extract bool `protobuf:"varint,4,opt,name=extract,proto3" json:"extract,omitempty"`
|
||||
unknownFields protoimpl.UnknownFields
|
||||
|
||||
Url string `protobuf:"bytes,1,opt,name=url,proto3" json:"url,omitempty"`
|
||||
Hash string `protobuf:"bytes,2,opt,name=hash,proto3" json:"hash,omitempty"`
|
||||
InstallPath string `protobuf:"bytes,3,opt,name=install_path,json=installPath,proto3" json:"install_path,omitempty"`
|
||||
Extract bool `protobuf:"varint,4,opt,name=extract,proto3" json:"extract,omitempty"`
|
||||
sizeCache protoimpl.SizeCache
|
||||
}
|
||||
|
||||
func (x *KubernetesComponent) Reset() {
|
||||
@ -457,92 +458,55 @@ func (x *KubernetesComponent) GetExtract() bool {
|
||||
|
||||
var File_bootstrapper_initproto_init_proto protoreflect.FileDescriptor
|
||||
|
||||
var file_bootstrapper_initproto_init_proto_rawDesc = []byte{
|
||||
0x0a, 0x21, 0x62, 0x6f, 0x6f, 0x74, 0x73, 0x74, 0x72, 0x61, 0x70, 0x70, 0x65, 0x72, 0x2f, 0x69,
|
||||
0x6e, 0x69, 0x74, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x2f, 0x69, 0x6e, 0x69, 0x74, 0x2e, 0x70, 0x72,
|
||||
0x6f, 0x74, 0x6f, 0x12, 0x04, 0x69, 0x6e, 0x69, 0x74, 0x1a, 0x2d, 0x69, 0x6e, 0x74, 0x65, 0x72,
|
||||
0x6e, 0x61, 0x6c, 0x2f, 0x76, 0x65, 0x72, 0x73, 0x69, 0x6f, 0x6e, 0x73, 0x2f, 0x63, 0x6f, 0x6d,
|
||||
0x70, 0x6f, 0x6e, 0x65, 0x6e, 0x74, 0x73, 0x2f, 0x63, 0x6f, 0x6d, 0x70, 0x6f, 0x6e, 0x65, 0x6e,
|
||||
0x74, 0x73, 0x2e, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x22, 0xd0, 0x03, 0x0a, 0x0b, 0x49, 0x6e, 0x69,
|
||||
0x74, 0x52, 0x65, 0x71, 0x75, 0x65, 0x73, 0x74, 0x12, 0x17, 0x0a, 0x07, 0x6b, 0x6d, 0x73, 0x5f,
|
||||
0x75, 0x72, 0x69, 0x18, 0x01, 0x20, 0x01, 0x28, 0x09, 0x52, 0x06, 0x6b, 0x6d, 0x73, 0x55, 0x72,
|
||||
0x69, 0x12, 0x1f, 0x0a, 0x0b, 0x73, 0x74, 0x6f, 0x72, 0x61, 0x67, 0x65, 0x5f, 0x75, 0x72, 0x69,
|
||||
0x18, 0x02, 0x20, 0x01, 0x28, 0x09, 0x52, 0x0a, 0x73, 0x74, 0x6f, 0x72, 0x61, 0x67, 0x65, 0x55,
|
||||
0x72, 0x69, 0x12, 0x29, 0x0a, 0x10, 0x6d, 0x65, 0x61, 0x73, 0x75, 0x72, 0x65, 0x6d, 0x65, 0x6e,
|
||||
0x74, 0x5f, 0x73, 0x61, 0x6c, 0x74, 0x18, 0x03, 0x20, 0x01, 0x28, 0x0c, 0x52, 0x0f, 0x6d, 0x65,
|
||||
0x61, 0x73, 0x75, 0x72, 0x65, 0x6d, 0x65, 0x6e, 0x74, 0x53, 0x61, 0x6c, 0x74, 0x12, 0x2d, 0x0a,
|
||||
0x12, 0x6b, 0x75, 0x62, 0x65, 0x72, 0x6e, 0x65, 0x74, 0x65, 0x73, 0x5f, 0x76, 0x65, 0x72, 0x73,
|
||||
0x69, 0x6f, 0x6e, 0x18, 0x05, 0x20, 0x01, 0x28, 0x09, 0x52, 0x11, 0x6b, 0x75, 0x62, 0x65, 0x72,
|
||||
0x6e, 0x65, 0x74, 0x65, 0x73, 0x56, 0x65, 0x72, 0x73, 0x69, 0x6f, 0x6e, 0x12, 0x29, 0x0a, 0x10,
|
||||
0x63, 0x6f, 0x6e, 0x66, 0x6f, 0x72, 0x6d, 0x61, 0x6e, 0x63, 0x65, 0x5f, 0x6d, 0x6f, 0x64, 0x65,
|
||||
0x18, 0x06, 0x20, 0x01, 0x28, 0x08, 0x52, 0x0f, 0x63, 0x6f, 0x6e, 0x66, 0x6f, 0x72, 0x6d, 0x61,
|
||||
0x6e, 0x63, 0x65, 0x4d, 0x6f, 0x64, 0x65, 0x12, 0x4a, 0x0a, 0x15, 0x6b, 0x75, 0x62, 0x65, 0x72,
|
||||
0x6e, 0x65, 0x74, 0x65, 0x73, 0x5f, 0x63, 0x6f, 0x6d, 0x70, 0x6f, 0x6e, 0x65, 0x6e, 0x74, 0x73,
|
||||
0x18, 0x07, 0x20, 0x03, 0x28, 0x0b, 0x32, 0x15, 0x2e, 0x63, 0x6f, 0x6d, 0x70, 0x6f, 0x6e, 0x65,
|
||||
0x6e, 0x74, 0x73, 0x2e, 0x43, 0x6f, 0x6d, 0x70, 0x6f, 0x6e, 0x65, 0x6e, 0x74, 0x52, 0x14, 0x6b,
|
||||
0x75, 0x62, 0x65, 0x72, 0x6e, 0x65, 0x74, 0x65, 0x73, 0x43, 0x6f, 0x6d, 0x70, 0x6f, 0x6e, 0x65,
|
||||
0x6e, 0x74, 0x73, 0x12, 0x1f, 0x0a, 0x0b, 0x69, 0x6e, 0x69, 0x74, 0x5f, 0x73, 0x65, 0x63, 0x72,
|
||||
0x65, 0x74, 0x18, 0x08, 0x20, 0x01, 0x28, 0x0c, 0x52, 0x0a, 0x69, 0x6e, 0x69, 0x74, 0x53, 0x65,
|
||||
0x63, 0x72, 0x65, 0x74, 0x12, 0x21, 0x0a, 0x0c, 0x63, 0x6c, 0x75, 0x73, 0x74, 0x65, 0x72, 0x5f,
|
||||
0x6e, 0x61, 0x6d, 0x65, 0x18, 0x09, 0x20, 0x01, 0x28, 0x09, 0x52, 0x0b, 0x63, 0x6c, 0x75, 0x73,
|
||||
0x74, 0x65, 0x72, 0x4e, 0x61, 0x6d, 0x65, 0x12, 0x2e, 0x0a, 0x13, 0x61, 0x70, 0x69, 0x73, 0x65,
|
||||
0x72, 0x76, 0x65, 0x72, 0x5f, 0x63, 0x65, 0x72, 0x74, 0x5f, 0x73, 0x61, 0x6e, 0x73, 0x18, 0x0a,
|
||||
0x20, 0x03, 0x28, 0x09, 0x52, 0x11, 0x61, 0x70, 0x69, 0x73, 0x65, 0x72, 0x76, 0x65, 0x72, 0x43,
|
||||
0x65, 0x72, 0x74, 0x53, 0x61, 0x6e, 0x73, 0x12, 0x21, 0x0a, 0x0c, 0x73, 0x65, 0x72, 0x76, 0x69,
|
||||
0x63, 0x65, 0x5f, 0x63, 0x69, 0x64, 0x72, 0x18, 0x0b, 0x20, 0x01, 0x28, 0x09, 0x52, 0x0b, 0x73,
|
||||
0x65, 0x72, 0x76, 0x69, 0x63, 0x65, 0x43, 0x69, 0x64, 0x72, 0x4a, 0x04, 0x08, 0x04, 0x10, 0x05,
|
||||
0x52, 0x19, 0x63, 0x6c, 0x6f, 0x75, 0x64, 0x5f, 0x73, 0x65, 0x72, 0x76, 0x69, 0x63, 0x65, 0x5f,
|
||||
0x61, 0x63, 0x63, 0x6f, 0x75, 0x6e, 0x74, 0x5f, 0x75, 0x72, 0x69, 0x22, 0xc1, 0x01, 0x0a, 0x0c,
|
||||
0x49, 0x6e, 0x69, 0x74, 0x52, 0x65, 0x73, 0x70, 0x6f, 0x6e, 0x73, 0x65, 0x12, 0x3e, 0x0a, 0x0c,
|
||||
0x69, 0x6e, 0x69, 0x74, 0x5f, 0x73, 0x75, 0x63, 0x63, 0x65, 0x73, 0x73, 0x18, 0x01, 0x20, 0x01,
|
||||
0x28, 0x0b, 0x32, 0x19, 0x2e, 0x69, 0x6e, 0x69, 0x74, 0x2e, 0x49, 0x6e, 0x69, 0x74, 0x53, 0x75,
|
||||
0x63, 0x63, 0x65, 0x73, 0x73, 0x52, 0x65, 0x73, 0x70, 0x6f, 0x6e, 0x73, 0x65, 0x48, 0x00, 0x52,
|
||||
0x0b, 0x69, 0x6e, 0x69, 0x74, 0x53, 0x75, 0x63, 0x63, 0x65, 0x73, 0x73, 0x12, 0x3e, 0x0a, 0x0c,
|
||||
0x69, 0x6e, 0x69, 0x74, 0x5f, 0x66, 0x61, 0x69, 0x6c, 0x75, 0x72, 0x65, 0x18, 0x02, 0x20, 0x01,
|
||||
0x28, 0x0b, 0x32, 0x19, 0x2e, 0x69, 0x6e, 0x69, 0x74, 0x2e, 0x49, 0x6e, 0x69, 0x74, 0x46, 0x61,
|
||||
0x69, 0x6c, 0x75, 0x72, 0x65, 0x52, 0x65, 0x73, 0x70, 0x6f, 0x6e, 0x73, 0x65, 0x48, 0x00, 0x52,
|
||||
0x0b, 0x69, 0x6e, 0x69, 0x74, 0x46, 0x61, 0x69, 0x6c, 0x75, 0x72, 0x65, 0x12, 0x29, 0x0a, 0x03,
|
||||
0x6c, 0x6f, 0x67, 0x18, 0x03, 0x20, 0x01, 0x28, 0x0b, 0x32, 0x15, 0x2e, 0x69, 0x6e, 0x69, 0x74,
|
||||
0x2e, 0x4c, 0x6f, 0x67, 0x52, 0x65, 0x73, 0x70, 0x6f, 0x6e, 0x73, 0x65, 0x54, 0x79, 0x70, 0x65,
|
||||
0x48, 0x00, 0x52, 0x03, 0x6c, 0x6f, 0x67, 0x42, 0x06, 0x0a, 0x04, 0x6b, 0x69, 0x6e, 0x64, 0x22,
|
||||
0x6f, 0x0a, 0x13, 0x49, 0x6e, 0x69, 0x74, 0x53, 0x75, 0x63, 0x63, 0x65, 0x73, 0x73, 0x52, 0x65,
|
||||
0x73, 0x70, 0x6f, 0x6e, 0x73, 0x65, 0x12, 0x1e, 0x0a, 0x0a, 0x6b, 0x75, 0x62, 0x65, 0x63, 0x6f,
|
||||
0x6e, 0x66, 0x69, 0x67, 0x18, 0x01, 0x20, 0x01, 0x28, 0x0c, 0x52, 0x0a, 0x6b, 0x75, 0x62, 0x65,
|
||||
0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x12, 0x19, 0x0a, 0x08, 0x6f, 0x77, 0x6e, 0x65, 0x72, 0x5f,
|
||||
0x69, 0x64, 0x18, 0x02, 0x20, 0x01, 0x28, 0x0c, 0x52, 0x07, 0x6f, 0x77, 0x6e, 0x65, 0x72, 0x49,
|
||||
0x64, 0x12, 0x1d, 0x0a, 0x0a, 0x63, 0x6c, 0x75, 0x73, 0x74, 0x65, 0x72, 0x5f, 0x69, 0x64, 0x18,
|
||||
0x03, 0x20, 0x01, 0x28, 0x0c, 0x52, 0x09, 0x63, 0x6c, 0x75, 0x73, 0x74, 0x65, 0x72, 0x49, 0x64,
|
||||
0x22, 0x2b, 0x0a, 0x13, 0x49, 0x6e, 0x69, 0x74, 0x46, 0x61, 0x69, 0x6c, 0x75, 0x72, 0x65, 0x52,
|
||||
0x65, 0x73, 0x70, 0x6f, 0x6e, 0x73, 0x65, 0x12, 0x14, 0x0a, 0x05, 0x65, 0x72, 0x72, 0x6f, 0x72,
|
||||
0x18, 0x01, 0x20, 0x01, 0x28, 0x09, 0x52, 0x05, 0x65, 0x72, 0x72, 0x6f, 0x72, 0x22, 0x23, 0x0a,
|
||||
0x0f, 0x4c, 0x6f, 0x67, 0x52, 0x65, 0x73, 0x70, 0x6f, 0x6e, 0x73, 0x65, 0x54, 0x79, 0x70, 0x65,
|
||||
0x12, 0x10, 0x0a, 0x03, 0x6c, 0x6f, 0x67, 0x18, 0x01, 0x20, 0x01, 0x28, 0x0c, 0x52, 0x03, 0x6c,
|
||||
0x6f, 0x67, 0x22, 0x78, 0x0a, 0x13, 0x4b, 0x75, 0x62, 0x65, 0x72, 0x6e, 0x65, 0x74, 0x65, 0x73,
|
||||
0x43, 0x6f, 0x6d, 0x70, 0x6f, 0x6e, 0x65, 0x6e, 0x74, 0x12, 0x10, 0x0a, 0x03, 0x75, 0x72, 0x6c,
|
||||
0x18, 0x01, 0x20, 0x01, 0x28, 0x09, 0x52, 0x03, 0x75, 0x72, 0x6c, 0x12, 0x12, 0x0a, 0x04, 0x68,
|
||||
0x61, 0x73, 0x68, 0x18, 0x02, 0x20, 0x01, 0x28, 0x09, 0x52, 0x04, 0x68, 0x61, 0x73, 0x68, 0x12,
|
||||
0x21, 0x0a, 0x0c, 0x69, 0x6e, 0x73, 0x74, 0x61, 0x6c, 0x6c, 0x5f, 0x70, 0x61, 0x74, 0x68, 0x18,
|
||||
0x03, 0x20, 0x01, 0x28, 0x09, 0x52, 0x0b, 0x69, 0x6e, 0x73, 0x74, 0x61, 0x6c, 0x6c, 0x50, 0x61,
|
||||
0x74, 0x68, 0x12, 0x18, 0x0a, 0x07, 0x65, 0x78, 0x74, 0x72, 0x61, 0x63, 0x74, 0x18, 0x04, 0x20,
|
||||
0x01, 0x28, 0x08, 0x52, 0x07, 0x65, 0x78, 0x74, 0x72, 0x61, 0x63, 0x74, 0x32, 0x36, 0x0a, 0x03,
|
||||
0x41, 0x50, 0x49, 0x12, 0x2f, 0x0a, 0x04, 0x49, 0x6e, 0x69, 0x74, 0x12, 0x11, 0x2e, 0x69, 0x6e,
|
||||
0x69, 0x74, 0x2e, 0x49, 0x6e, 0x69, 0x74, 0x52, 0x65, 0x71, 0x75, 0x65, 0x73, 0x74, 0x1a, 0x12,
|
||||
0x2e, 0x69, 0x6e, 0x69, 0x74, 0x2e, 0x49, 0x6e, 0x69, 0x74, 0x52, 0x65, 0x73, 0x70, 0x6f, 0x6e,
|
||||
0x73, 0x65, 0x30, 0x01, 0x42, 0x40, 0x5a, 0x3e, 0x67, 0x69, 0x74, 0x68, 0x75, 0x62, 0x2e, 0x63,
|
||||
0x6f, 0x6d, 0x2f, 0x65, 0x64, 0x67, 0x65, 0x6c, 0x65, 0x73, 0x73, 0x73, 0x79, 0x73, 0x2f, 0x63,
|
||||
0x6f, 0x6e, 0x73, 0x74, 0x65, 0x6c, 0x6c, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x2f, 0x76, 0x32, 0x2f,
|
||||
0x62, 0x6f, 0x6f, 0x74, 0x73, 0x74, 0x72, 0x61, 0x70, 0x70, 0x65, 0x72, 0x2f, 0x69, 0x6e, 0x69,
|
||||
0x74, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x62, 0x06, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x33,
|
||||
}
|
||||
const file_bootstrapper_initproto_init_proto_rawDesc = "" +
|
||||
"\n" +
|
||||
"!bootstrapper/initproto/init.proto\x12\x04init\x1a-internal/versions/components/components.proto\"\xd0\x03\n" +
|
||||
"\vInitRequest\x12\x17\n" +
|
||||
"\akms_uri\x18\x01 \x01(\tR\x06kmsUri\x12\x1f\n" +
|
||||
"\vstorage_uri\x18\x02 \x01(\tR\n" +
|
||||
"storageUri\x12)\n" +
|
||||
"\x10measurement_salt\x18\x03 \x01(\fR\x0fmeasurementSalt\x12-\n" +
|
||||
"\x12kubernetes_version\x18\x05 \x01(\tR\x11kubernetesVersion\x12)\n" +
|
||||
"\x10conformance_mode\x18\x06 \x01(\bR\x0fconformanceMode\x12J\n" +
|
||||
"\x15kubernetes_components\x18\a \x03(\v2\x15.components.ComponentR\x14kubernetesComponents\x12\x1f\n" +
|
||||
"\vinit_secret\x18\b \x01(\fR\n" +
|
||||
"initSecret\x12!\n" +
|
||||
"\fcluster_name\x18\t \x01(\tR\vclusterName\x12.\n" +
|
||||
"\x13apiserver_cert_sans\x18\n" +
|
||||
" \x03(\tR\x11apiserverCertSans\x12!\n" +
|
||||
"\fservice_cidr\x18\v \x01(\tR\vserviceCidrJ\x04\b\x04\x10\x05R\x19cloud_service_account_uri\"\xc1\x01\n" +
|
||||
"\fInitResponse\x12>\n" +
|
||||
"\finit_success\x18\x01 \x01(\v2\x19.init.InitSuccessResponseH\x00R\vinitSuccess\x12>\n" +
|
||||
"\finit_failure\x18\x02 \x01(\v2\x19.init.InitFailureResponseH\x00R\vinitFailure\x12)\n" +
|
||||
"\x03log\x18\x03 \x01(\v2\x15.init.LogResponseTypeH\x00R\x03logB\x06\n" +
|
||||
"\x04kind\"o\n" +
|
||||
"\x13InitSuccessResponse\x12\x1e\n" +
|
||||
"\n" +
|
||||
"kubeconfig\x18\x01 \x01(\fR\n" +
|
||||
"kubeconfig\x12\x19\n" +
|
||||
"\bowner_id\x18\x02 \x01(\fR\aownerId\x12\x1d\n" +
|
||||
"\n" +
|
||||
"cluster_id\x18\x03 \x01(\fR\tclusterId\"+\n" +
|
||||
"\x13InitFailureResponse\x12\x14\n" +
|
||||
"\x05error\x18\x01 \x01(\tR\x05error\"#\n" +
|
||||
"\x0fLogResponseType\x12\x10\n" +
|
||||
"\x03log\x18\x01 \x01(\fR\x03log\"x\n" +
|
||||
"\x13KubernetesComponent\x12\x10\n" +
|
||||
"\x03url\x18\x01 \x01(\tR\x03url\x12\x12\n" +
|
||||
"\x04hash\x18\x02 \x01(\tR\x04hash\x12!\n" +
|
||||
"\finstall_path\x18\x03 \x01(\tR\vinstallPath\x12\x18\n" +
|
||||
"\aextract\x18\x04 \x01(\bR\aextract26\n" +
|
||||
"\x03API\x12/\n" +
|
||||
"\x04Init\x12\x11.init.InitRequest\x1a\x12.init.InitResponse0\x01B@Z>github.com/edgelesssys/constellation/v2/bootstrapper/initprotob\x06proto3"
|
||||
|
||||
var (
|
||||
file_bootstrapper_initproto_init_proto_rawDescOnce sync.Once
|
||||
file_bootstrapper_initproto_init_proto_rawDescData = file_bootstrapper_initproto_init_proto_rawDesc
|
||||
file_bootstrapper_initproto_init_proto_rawDescData []byte
|
||||
)
|
||||
|
||||
func file_bootstrapper_initproto_init_proto_rawDescGZIP() []byte {
|
||||
file_bootstrapper_initproto_init_proto_rawDescOnce.Do(func() {
|
||||
file_bootstrapper_initproto_init_proto_rawDescData = protoimpl.X.CompressGZIP(file_bootstrapper_initproto_init_proto_rawDescData)
|
||||
file_bootstrapper_initproto_init_proto_rawDescData = protoimpl.X.CompressGZIP(unsafe.Slice(unsafe.StringData(file_bootstrapper_initproto_init_proto_rawDesc), len(file_bootstrapper_initproto_init_proto_rawDesc)))
|
||||
})
|
||||
return file_bootstrapper_initproto_init_proto_rawDescData
|
||||
}
|
||||
@ -585,7 +549,7 @@ func file_bootstrapper_initproto_init_proto_init() {
|
||||
out := protoimpl.TypeBuilder{
|
||||
File: protoimpl.DescBuilder{
|
||||
GoPackagePath: reflect.TypeOf(x{}).PkgPath(),
|
||||
RawDescriptor: file_bootstrapper_initproto_init_proto_rawDesc,
|
||||
RawDescriptor: unsafe.Slice(unsafe.StringData(file_bootstrapper_initproto_init_proto_rawDesc), len(file_bootstrapper_initproto_init_proto_rawDesc)),
|
||||
NumEnums: 0,
|
||||
NumMessages: 6,
|
||||
NumExtensions: 0,
|
||||
@ -596,7 +560,6 @@ func file_bootstrapper_initproto_init_proto_init() {
|
||||
MessageInfos: file_bootstrapper_initproto_init_proto_msgTypes,
|
||||
}.Build()
|
||||
File_bootstrapper_initproto_init_proto = out.File
|
||||
file_bootstrapper_initproto_init_proto_rawDesc = nil
|
||||
file_bootstrapper_initproto_init_proto_goTypes = nil
|
||||
file_bootstrapper_initproto_init_proto_depIdxs = nil
|
||||
}
|
||||
|
@ -11,6 +11,7 @@ go_library(
|
||||
"//bootstrapper/internal/journald",
|
||||
"//internal/atls",
|
||||
"//internal/attestation",
|
||||
"//internal/constants",
|
||||
"//internal/crypto",
|
||||
"//internal/file",
|
||||
"//internal/grpc/atlscredentials",
|
||||
@ -26,6 +27,7 @@ go_library(
|
||||
"@org_golang_google_grpc//keepalive",
|
||||
"@org_golang_google_grpc//status",
|
||||
"@org_golang_x_crypto//bcrypt",
|
||||
"@org_golang_x_crypto//ssh",
|
||||
],
|
||||
)
|
||||
|
||||
|
@ -20,6 +20,7 @@ package initserver
|
||||
import (
|
||||
"bufio"
|
||||
"context"
|
||||
"crypto/ed25519"
|
||||
"errors"
|
||||
"fmt"
|
||||
"io"
|
||||
@ -33,6 +34,7 @@ import (
|
||||
"github.com/edgelesssys/constellation/v2/bootstrapper/internal/journald"
|
||||
"github.com/edgelesssys/constellation/v2/internal/atls"
|
||||
"github.com/edgelesssys/constellation/v2/internal/attestation"
|
||||
"github.com/edgelesssys/constellation/v2/internal/constants"
|
||||
"github.com/edgelesssys/constellation/v2/internal/crypto"
|
||||
"github.com/edgelesssys/constellation/v2/internal/file"
|
||||
"github.com/edgelesssys/constellation/v2/internal/grpc/atlscredentials"
|
||||
@ -44,6 +46,7 @@ import (
|
||||
"github.com/edgelesssys/constellation/v2/internal/role"
|
||||
"github.com/edgelesssys/constellation/v2/internal/versions/components"
|
||||
"golang.org/x/crypto/bcrypt"
|
||||
"golang.org/x/crypto/ssh"
|
||||
"google.golang.org/grpc"
|
||||
"google.golang.org/grpc/codes"
|
||||
"google.golang.org/grpc/keepalive"
|
||||
@ -222,6 +225,28 @@ func (s *Server) Init(req *initproto.InitRequest, stream initproto.API_InitServe
|
||||
return err
|
||||
}
|
||||
|
||||
// Derive the emergency ssh CA key
|
||||
key, err := cloudKms.GetDEK(stream.Context(), crypto.DEKPrefix+constants.SSHCAKeySuffix, ed25519.SeedSize)
|
||||
if err != nil {
|
||||
if e := s.sendLogsWithMessage(stream, status.Errorf(codes.Internal, "retrieving DEK for key derivation: %s", err)); e != nil {
|
||||
err = errors.Join(err, e)
|
||||
}
|
||||
return err
|
||||
}
|
||||
ca, err := crypto.GenerateEmergencySSHCAKey(key)
|
||||
if err != nil {
|
||||
if e := s.sendLogsWithMessage(stream, status.Errorf(codes.Internal, "generating emergency SSH CA key: %s", err)); e != nil {
|
||||
err = errors.Join(err, e)
|
||||
}
|
||||
return err
|
||||
}
|
||||
if err := s.fileHandler.Write(constants.SSHCAKeyPath, ssh.MarshalAuthorizedKey(ca.PublicKey()), file.OptMkdirAll); err != nil {
|
||||
if e := s.sendLogsWithMessage(stream, status.Errorf(codes.Internal, "writing ssh CA pubkey: %s", err)); e != nil {
|
||||
err = errors.Join(err, e)
|
||||
}
|
||||
return err
|
||||
}
|
||||
|
||||
clusterName := req.ClusterName
|
||||
if clusterName == "" {
|
||||
clusterName = "constellation"
|
||||
|
@ -67,7 +67,7 @@ func TestNew(t *testing.T) {
|
||||
assert := assert.New(t)
|
||||
|
||||
server, err := New(
|
||||
context.TODO(), newFakeLock(), &stubClusterInitializer{}, atls.NewFakeIssuer(variant.Dummy{}),
|
||||
t.Context(), newFakeLock(), &stubClusterInitializer{}, atls.NewFakeIssuer(variant.Dummy{}),
|
||||
&stubDisk{}, fh, &tc.metadata, logger.NewTest(t),
|
||||
)
|
||||
if tc.wantErr {
|
||||
@ -352,9 +352,9 @@ func TestSetupDisk(t *testing.T) {
|
||||
|
||||
masterSecret := uri.MasterSecret{Key: tc.masterKey, Salt: tc.salt}
|
||||
|
||||
cloudKms, err := kmssetup.KMS(context.Background(), uri.NoStoreURI, masterSecret.EncodeToURI())
|
||||
cloudKms, err := kmssetup.KMS(t.Context(), uri.NoStoreURI, masterSecret.EncodeToURI())
|
||||
require.NoError(err)
|
||||
assert.NoError(server.setupDisk(context.Background(), cloudKms))
|
||||
assert.NoError(server.setupDisk(t.Context(), cloudKms))
|
||||
})
|
||||
}
|
||||
}
|
||||
|
@ -271,6 +271,10 @@ func (c *JoinClient) startNodeAndJoin(ticket *joinproto.IssueJoinTicketResponse,
|
||||
return fmt.Errorf("writing kubelet key: %w", err)
|
||||
}
|
||||
|
||||
if err := c.fileHandler.Write(constants.SSHCAKeyPath, ticket.AuthorizedCaPublicKey, file.OptMkdirAll); err != nil {
|
||||
return fmt.Errorf("writing ssh ca key: %w", err)
|
||||
}
|
||||
|
||||
state := nodestate.NodeState{
|
||||
Role: c.role,
|
||||
MeasurementSalt: ticket.MeasurementSalt,
|
||||
|
@ -50,6 +50,8 @@ func TestClient(t *testing.T) {
|
||||
{Role: role.ControlPlane, Name: "node-4", VPCIP: "192.0.2.2"},
|
||||
{Role: role.ControlPlane, Name: "node-5", VPCIP: "192.0.2.3"},
|
||||
}
|
||||
caDerivationKey := make([]byte, 256)
|
||||
respCaKey := &joinproto.IssueJoinTicketResponse{AuthorizedCaPublicKey: caDerivationKey}
|
||||
|
||||
testCases := map[string]struct {
|
||||
role role.Role
|
||||
@ -69,7 +71,7 @@ func TestClient(t *testing.T) {
|
||||
selfAnswer{err: assert.AnError},
|
||||
selfAnswer{instance: workerSelf},
|
||||
listAnswer{instances: peers},
|
||||
issueJoinTicketAnswer{},
|
||||
issueJoinTicketAnswer{resp: respCaKey},
|
||||
},
|
||||
clusterJoiner: &stubClusterJoiner{},
|
||||
nodeLock: newFakeLock(),
|
||||
@ -85,7 +87,7 @@ func TestClient(t *testing.T) {
|
||||
selfAnswer{instance: metadata.InstanceMetadata{Name: "node-1"}},
|
||||
selfAnswer{instance: workerSelf},
|
||||
listAnswer{instances: peers},
|
||||
issueJoinTicketAnswer{},
|
||||
issueJoinTicketAnswer{resp: respCaKey},
|
||||
},
|
||||
clusterJoiner: &stubClusterJoiner{},
|
||||
nodeLock: newFakeLock(),
|
||||
@ -101,7 +103,7 @@ func TestClient(t *testing.T) {
|
||||
listAnswer{err: assert.AnError},
|
||||
listAnswer{err: assert.AnError},
|
||||
listAnswer{instances: peers},
|
||||
issueJoinTicketAnswer{},
|
||||
issueJoinTicketAnswer{resp: respCaKey},
|
||||
},
|
||||
clusterJoiner: &stubClusterJoiner{},
|
||||
nodeLock: newFakeLock(),
|
||||
@ -117,7 +119,7 @@ func TestClient(t *testing.T) {
|
||||
listAnswer{},
|
||||
listAnswer{},
|
||||
listAnswer{instances: peers},
|
||||
issueJoinTicketAnswer{},
|
||||
issueJoinTicketAnswer{resp: respCaKey},
|
||||
},
|
||||
clusterJoiner: &stubClusterJoiner{},
|
||||
nodeLock: newFakeLock(),
|
||||
@ -134,7 +136,7 @@ func TestClient(t *testing.T) {
|
||||
listAnswer{instances: peers},
|
||||
issueJoinTicketAnswer{err: assert.AnError},
|
||||
listAnswer{instances: peers},
|
||||
issueJoinTicketAnswer{},
|
||||
issueJoinTicketAnswer{resp: respCaKey},
|
||||
},
|
||||
clusterJoiner: &stubClusterJoiner{},
|
||||
nodeLock: newFakeLock(),
|
||||
@ -151,7 +153,7 @@ func TestClient(t *testing.T) {
|
||||
listAnswer{instances: peers},
|
||||
issueJoinTicketAnswer{err: assert.AnError},
|
||||
listAnswer{instances: peers},
|
||||
issueJoinTicketAnswer{},
|
||||
issueJoinTicketAnswer{resp: respCaKey},
|
||||
},
|
||||
clusterJoiner: &stubClusterJoiner{},
|
||||
nodeLock: newFakeLock(),
|
||||
@ -164,7 +166,7 @@ func TestClient(t *testing.T) {
|
||||
apiAnswers: []any{
|
||||
selfAnswer{instance: controlSelf},
|
||||
listAnswer{instances: peers},
|
||||
issueJoinTicketAnswer{},
|
||||
issueJoinTicketAnswer{resp: respCaKey},
|
||||
},
|
||||
clusterJoiner: &stubClusterJoiner{numBadCalls: -1, joinClusterErr: assert.AnError},
|
||||
nodeLock: newFakeLock(),
|
||||
@ -177,7 +179,7 @@ func TestClient(t *testing.T) {
|
||||
apiAnswers: []any{
|
||||
selfAnswer{instance: controlSelf},
|
||||
listAnswer{instances: peers},
|
||||
issueJoinTicketAnswer{},
|
||||
issueJoinTicketAnswer{resp: respCaKey},
|
||||
},
|
||||
clusterJoiner: &stubClusterJoiner{numBadCalls: 1, joinClusterErr: assert.AnError},
|
||||
nodeLock: newFakeLock(),
|
||||
@ -191,7 +193,7 @@ func TestClient(t *testing.T) {
|
||||
apiAnswers: []any{
|
||||
selfAnswer{instance: controlSelf},
|
||||
listAnswer{instances: peers},
|
||||
issueJoinTicketAnswer{},
|
||||
issueJoinTicketAnswer{resp: respCaKey},
|
||||
},
|
||||
clusterJoiner: &stubClusterJoiner{},
|
||||
nodeLock: lockedLock,
|
||||
|
@ -28,6 +28,7 @@ go_library(
|
||||
"@io_k8s_kubelet//config/v1beta1",
|
||||
"@io_k8s_kubernetes//cmd/kubeadm/app/apis/kubeadm/v1beta3",
|
||||
"@io_k8s_kubernetes//cmd/kubeadm/app/constants",
|
||||
"@org_golang_x_mod//semver",
|
||||
],
|
||||
)
|
||||
|
||||
|
@ -12,6 +12,7 @@ import (
|
||||
"github.com/edgelesssys/constellation/v2/bootstrapper/internal/certificate"
|
||||
"github.com/edgelesssys/constellation/v2/internal/constants"
|
||||
"github.com/edgelesssys/constellation/v2/internal/kubernetes"
|
||||
"golang.org/x/mod/semver"
|
||||
corev1 "k8s.io/api/core/v1"
|
||||
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||
kubeletconf "k8s.io/kubelet/config/v1beta1"
|
||||
@ -38,7 +39,7 @@ func (c *KubdeadmConfiguration) InitConfiguration(externalCloudProvider bool, cl
|
||||
cloudProvider = "external"
|
||||
}
|
||||
|
||||
return KubeadmInitYAML{
|
||||
initConfig := KubeadmInitYAML{
|
||||
InitConfiguration: kubeadm.InitConfiguration{
|
||||
TypeMeta: metav1.TypeMeta{
|
||||
APIVersion: kubeadm.SchemeGroupVersion.String(),
|
||||
@ -157,6 +158,11 @@ func (c *KubdeadmConfiguration) InitConfiguration(externalCloudProvider bool, cl
|
||||
TLSPrivateKeyFile: certificate.KeyFilename,
|
||||
},
|
||||
}
|
||||
|
||||
if semver.Compare(clusterVersion, "v1.31.0") >= 0 {
|
||||
initConfig.ClusterConfiguration.FeatureGates = map[string]bool{"ControlPlaneKubeletLocalMode": true}
|
||||
}
|
||||
return initConfig
|
||||
}
|
||||
|
||||
// JoinConfiguration returns a new kubeadm join configuration.
|
||||
|
@ -201,7 +201,7 @@ func TestInitCluster(t *testing.T) {
|
||||
}
|
||||
|
||||
_, err := kube.InitCluster(
|
||||
context.Background(), string(tc.k8sVersion), "kubernetes",
|
||||
t.Context(), string(tc.k8sVersion), "kubernetes",
|
||||
false, nil, nil, "",
|
||||
)
|
||||
|
||||
@ -384,7 +384,7 @@ func TestJoinCluster(t *testing.T) {
|
||||
log: logger.NewTest(t),
|
||||
}
|
||||
|
||||
err := kube.JoinCluster(context.Background(), joinCommand, tc.role, tc.k8sComponents)
|
||||
err := kube.JoinCluster(t.Context(), joinCommand, tc.role, tc.k8sComponents)
|
||||
if tc.wantErr {
|
||||
assert.Error(err)
|
||||
return
|
||||
|
@ -39,7 +39,7 @@ func TestCloudKubeAPIWaiter(t *testing.T) {
|
||||
require := require.New(t)
|
||||
|
||||
waiter := &CloudKubeAPIWaiter{}
|
||||
ctx, cancel := context.WithTimeout(context.Background(), 0)
|
||||
ctx, cancel := context.WithTimeout(t.Context(), 0)
|
||||
defer cancel()
|
||||
err := waiter.Wait(ctx, tc.kubeClient)
|
||||
if tc.wantErr {
|
||||
|
Some files were not shown because too many files have changed in this diff Show More
Loading…
x
Reference in New Issue
Block a user