Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Bump aks and eks operator versions #39745

Merged
merged 2 commits into from
Dec 7, 2022

Conversation

a-blender
Copy link
Contributor

rancherbot
rancherbot previously approved these changes Nov 30, 2022
Copy link
Collaborator

@rancherbot rancherbot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Approving pull request because all files are allowlisted for auto approval

@a-blender a-blender force-pushed the bump-aks-eks-operators branch 2 times, most recently from e42d35a to a0e51f6 Compare December 2, 2022 14:53
@a-blender a-blender marked this pull request as draft December 6, 2022 16:02
@a-blender a-blender marked this pull request as ready for review December 6, 2022 17:06
sbstp
sbstp previously approved these changes Dec 6, 2022
@sbstp sbstp requested a review from a team December 6, 2022 17:27
Copy link
Member

@jiaqiluo jiaqiluo left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Can we clean up the commit history, ie, combine the 2nd and 3rd into one?

jakefhyde
jakefhyde previously approved these changes Dec 6, 2022
Copy link
Member

@jiaqiluo jiaqiluo left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM, can be merged once the CI is passed :)

@a-blender a-blender merged commit 07fa2e5 into rancher:release/v2.7 Dec 7, 2022
jameson-mcghee added a commit to jameson-mcghee/rancher that referenced this pull request Dec 29, 2022
Added Windows Custom Cluster Tests

Resolving PR issues

Updated variable naming

Remove rc from webhook min version 0.3.0-rc5

Add extra parameter for source registry.

* Include an extra parameter for the source registry in both rancher-save-images and rancher-load-images scripts to allow relocation from a customized registry.

Update to Fleet 0.5.0

Signed-off-by: Matt Farina <matt.farina@suse.com>

Unrc rancher rke chart for v2.7.0

Update charts branch references to release-v2.7

Update system-charts branch references to release-v2.7

Update kdm branch references to release-v2.7

Update cli version to non-rc tag

Update ember ui version to non-rc tag

Update dashboard ui version to non-rc tag

adding modular helm repo install

Ensure GitHub Workflow to update README updates for 2.7 releases now

Revert "Merge pull request rancher#39581 from aiyengar2/final_rc_changes_2_7_0"

This reverts commit fe78be3, reversing
changes made to d1813a2.

Ensure that 2.6 README.md changes do not wipe out 2.7 changes

Ensure releases are only added if the latest or stable exists

Refactor logic for update README script to make it easier to add versions

Remove quotas from namespaces when they removed from project

Add the cluster-id to log messages during cluster creation

Adding validation for cluster owner and cluster member v1 endpoints

Signed-off-by: Anupama <38144301+anupama2501@users.noreply.github.com>

Clusyer owner/member for v27 branch

Signed-off-by: Anupama <38144301+anupama2501@users.noreply.github.com>

Update namespaces.go

Update namespaces.go

Delete namespaces.go

Signed-off-by: Anupama <38144301+anupama2501@users.noreply.github.com>

always allow creation of cloud credentials for AWS and Azure

Remove windows images from rancher-images.txt

add mirrored-dexidp-dex

Add airgap setup support, readme, and update assertions in validation charts tests

Revert "Update references to new 2.7.0 UI branches"

This reverts commit 6691905.

Updated embedded k3s version for rancher to 1.24.8+

Signed-off-by: PratikforCoding <kotalpratik@gmail.com>

ensure provV2 indexers are registered for all replicas if the feature is enabled

Bump rancher/shell version to v0.1.19-rc7

bump machine to 97

Add support for hardening K3s custom clusters

Omit GroupPrincipals if field is empty

Added omitempty to the defintion of the GroupPrincipals
field in the Token struct.  This will prevent that
field from showing GroupPrincipals: null when a token
is created without GroupPrincipals set.

Improved Azure login error handling

go get github.com/rancher/rke v1.4.1-rc2

Add post and pre upgrade resource validation tests

Adding additional test cases to the rbac suite

Signed-off-by: Anupama <38144301+anupama2501@users.noreply.github.com>

Randomize hostnamePrefix in test_node

chore: Bump Helm version (rancher#39764)

... ancher/Dockerfile.dapper"
Updated the content of the file "/tmp/updatecli/github/rancher/rancher/package/Dockerfile"

Made with ❤️️ by updatecli

Co-authored-by: github-actions[bot] <41898282+github-actions[bot]@users.noreply.github.com>

removed cis v1 related types and schemas

 Skip flaky tests that are no longer supported

k3s-flaky fixes

add PodSecurityAdmissionConfigurationTemplate CRD

go generate

Bump aks and eks operators versions (rancher#39745)

* Bump aks and eks operators
* Fix EKS tests in CI

Add logic to sync generated node role from EKS (rancher#38939)

Kubernetes version upgrade validation tests

Run agent cleanup pod with user id 1000 instead of root

The pod cannot run as root when the cluster is running in hardened mode

Add integration tests for catalog v2 cluster repos

Relocate clusterrepo type const

ensure node deletion even if drain fails to complete

enhance aksVmSizes path to include information on VM feature support

remove rancherd command and build steps

psact update

Updated AddProjectMember extension to have two extra checks to avoid failures in the TestCreateNamespaceProjectMember test case.

Add validation test for etcd backup and restore with k8s upgrade

Fixed variable issue with adminClient in extensions/users.go that was causing issues in the drone CI pipeline.

update nutanix driver to v3.3.0

add additional instantiation step for PodSecurityAdmissionConfigurationTemplate CRD

Set source to empty from "env"

Prior, when a setting was configured using an env var of the format
CATTLE_<setting-name>, the source was set to "env". That source
would then persist even when the env var was unset in the future.
This prevented users from ever changing a setting value through the
rancher API or UI. Now, unsetting the env var during an upgrade
will cause the source to be reset. This will allow users to change
the value again as long as the setting is no longer longer set by
an env var at setup.

Support empty string env var

Prior, if an empty string was set using an env var, getting the
setting from rancher api would return the empty value. However,
the value in ETCD would not be set. Once settings are interacted
with using anything besides norman, this will result in a change
of behavior where the value before the one last set is returned.
This is because norman is setting the value to be empty string.
Now, when the value is set to empty string, it will be set to
empty string in ETCD. This is valid since an empty string
indicates that the client should use the default value instead.

Add mocks to wrangler setting client with mockgen

Add tests

Add cgroups v2 evacuation to scripts/run for embedded k3s

This fix is specficially for linux distros that make use of cgroups v2,
which were previously unable to run `make test` and by extension,
`make ci`.

Updated v3_api/Jenksinfile to also include the Linode access token.

traefik ingress fixes

chore: Bump Kustomize version (rancher#39765)

Updated the content of the file "/tmp/updatecli/github/rancher/rancher/Dockerfile.dapper"

Made with ❤️️ by updatecli

Co-authored-by: github-actions[bot] <41898282+github-actions[bot]@users.noreply.github.com>

Add functions to find CAPI cluster from objects

use cronJob.batchV1 API instead of batchv1beta1

bump k8s packages to support 1.25

bump modules to support 1.25

fix broken types caused by the upstream API changes in k8s 1.25

go generate

bump module cluster-api to v1.2.7

fix broken testing caused by too long label value (k8s allows no more than 63 characters)

bump the embedded k3s version to 1.25.4

skip the broken tests caused by the remvoal of PSP

[2.7] SLE BCI update to 15.4 (rancher#39767)

* avoid bashisms in makefile

'[[' only exists in bash or bash-family shells like zsh. use posix
compatible '[' (which is test(1)) instead.

* Agent: Switch SLE BCI base image to 15.4

The 15.3 image is EOF on 2022-12-31

* Use vim-small in Rancher image

This avoids 7MB of dependencies, avoids perl and libgdbm

* Rancher: Switch SLE BCI base image to 15.4

The 15.3 image is EOF on 2022-12-31

introduce `aksVMSizesV2` endpoint with updated payload for azure feature support. Maintain old aksVmSizes endpoint for backwards compatability

Bump aks and eks operators to new branch tags

go get github.com/rancher/rke v1.4.3-rc1

Bump steve version

add debug mode for rancher machine with rke2

Adding custom verb for projects to cluster-owner for updating PSAs

Update to always install rancher-webhook in both local and downstream clusters

bump rancher machine to v0.15.0-98

Updated KubernetesVersion of the provisioningInput do distinguish between the different cluster types: rke1, rke2, and k3s. This is to facilicate cases when want to run provisioning tests across packages, one case being code coverage runs.

Bump steve version for counts-diff changes

Updated create_project_client in test_node_label to have an optional cleanup with the boolean flag RANCHER_CLEANUP_CLUSTER

Move trigger refresh logic to token handler

Before, a userattribute handler would check if the ExtraByProvider
field was null and trigger a refresh. ExtraByProvider contains
data that is available only on tokens. When there was no token
associated with the user corresponding to the userattribute, the
handler would fire endlessly. This happened because the field
continued to be null but the refresh process would update the
LastRefreshed field which would cause the userattribute handler
to execute again. Now, the ExtraByProvider check is done on a
token handler. The token handler is aware that the tokens
existence may make populating the field possible and the refresh
process, makes no changes to the token object. This avoids nonstop
firing of handlers.

Add tests

Fix handler returns

Add auth package comments

bumping chart apiVersion as its not helm2 compatibile

(cherry picked from commit 713da95)

Assign special error type to errors related to incompatible template versions

This special error type (`IncompatibleTemplateVersionErr`) can be used by other packages to identify whether the error returned by a call to one of the Catalog Manager's methods is tied to an real error with trying to execute a function call or the result of a successful call that returns that nothing is available to install.

In most cases, the consumer of this error will just emit the error and move on, but in certain cases (such as in `pkg/controllers/managementuserlegacy/systemimage/systemimage.go`), the fact that there is no compatible version results in a different action that needs to be taken (i.e. silently ignore and move on)

(cherry picked from commit 7944e81)

Avoid printing spammy logs when a Kubernetes version does not have legacy system tools available for install

Instead of continously emitting logs with the following format:

```log
2022/12/14 21:53:54 [ERROR] error syncing '${SOMETHING}': handler ${HANDLER}: ${SOME_ERROR}: template system-library-rancher-monitoring incompatible with rancher version or cluster's [${CLUSTER}] kubernetes version, requeuing
```

This PR ensures that not having a system tool like Monitoring available for download results in skipping adding that system tool to the System Project's `field.cattle.io/systemImageVersion` annotation.

Related Issue: rancher#37039

(cherry picked from commit 0def420)

only regenerate kubelet serving certificate when the agent requests we do so.

Add additional AKS tests

Do not apply manifests or blocks if they work with PSP's in K8s v1.25

chore: Bump Helm version (rancher#39903)

Made with ❤️️ by updatecli

Co-authored-by: github-actions[bot] <41898282+github-actions[bot]@users.noreply.github.com>

Adds chart option to configure the initialDelay and periodSeconds of probes

Adds readme on running helm chart tests locally

updating key for rke2. Allowing override of key and key name for rke2 in TF.

Disable optimizations and symbol stripping on debug builds

Signed-off-by: Silvio Moioli <silvio@moioli.net>

Updating to Fleet v0.6.0-rc.1

Add hardening config for rancher provisioned rke2 clusters

Signed-off-by: Anupama <38144301+anupama2501@users.noreply.github.com>

Add CAPI predicates to RKECluster

go generate

Bump rancher-webhook version to v0.3.2-rc4

Add missing cilium images to origins.go

add `nonNamespaced` generation attribute to PodSecurityAdmissionConfigurationTemplate

go generate

Bump required K8s version in Rancher chart

Detect if K3s PSPs are enabled in project creation

Bump csp-adapter

Bump CATTLE_RANCHER_WEBHOOK_MIN_VERSION to 2.0.2+up0.3.2-rc5

Do not register podsecuritypolicy controllers for clusters >= v1.25

Add logs for testing

QATASKS-151 adds setup and install script and windows worker tf

There was a bug with how the timeout in validate_cluster_state was being set causing an absurdly long timeout. Also there chances that an updating state happens after it is checked with this function, a conditional was added to not fail if the updating state is missed.
Also shorten the timeout, it doesn need to be that long for editing a node label.

Add system namespaces for Helm charts.

Empty commit to trigger CI.

Return the error which might come from the rancher-webhook. Previously, the error was not caught so a panic error happened.

bump the embedded k3s version to 1.25.5

Bump rancher-agent image to use v2.7-head
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

5 participants