Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

v1.14 Backports 2023-07-18 #26887

Merged
merged 10 commits into from Jul 19, 2023
Merged

v1.14 Backports 2023-07-18 #26887

merged 10 commits into from Jul 19, 2023

Conversation

gandro
Copy link
Member

@gandro gandro commented Jul 18, 2023

Once this PR is merged, you can update the PR labels via:

for pr in 26815 26653 26655 26840 26874 25509 26869 26812 26883; do contrib/backporting/set-labels.py $pr done 1.14; done

or with

make add-labels BRANCH=v1.14 ISSUES=26815,26653,26655,26840,26874,25509,26869,26812,26883

sayboras and others added 10 commits July 18, 2023 07:34
[ upstream commit 1543c46 ]

This is to include the fix for the below CVE.

CVE: GHSA-jfxv-29pc-x22r
GHA build: https://github.com/cilium/proxy/actions/runs/5548261876/jobs/10131017073

Signed-off-by: Tam Mach <tam.mach@cilium.io>
Signed-off-by: Sebastian Wicki <sebastian@isovalent.com>
[ upstream commit 1c18f5c ]

We recently dropped usage of Jenkins for the main CI workloads in the
Cilium repository in favour of running the same ginkgo jobs directly in
GitHub Actions workflows. Remove the documentation for the older Jenkins
systems.

Signed-off-by: Joe Stringer <joe@cilium.io>
Signed-off-by: Sebastian Wicki <sebastian@isovalent.com>
[ upstream commit 5f3e24c ]

Add an initial breakdown of the types of tests and how they are
triggered so that newer contributors can more easily understand what's
going on in CI and how to interact with it.

Signed-off-by: Joe Stringer <joe@cilium.io>
Signed-off-by: Sebastian Wicki <sebastian@isovalent.com>
[ upstream commit cfaa674 ]

This was functionally mostly provided by CiliumCIDRSet in v1.14.

Signed-off-by: Joe Stringer <joe@cilium.io>
Signed-off-by: Sebastian Wicki <sebastian@isovalent.com>
[ upstream commit 87cda2d ]

When using CILIUM_CLI_MODE=helm (which is the default as of cilium-cli
v0.15.0), the --rollback option is no longer available. Omit it from
commands.

Also include the already existing cilium-cli download and installation
instructions.

Signed-off-by: Tobias Klauser <tobias@cilium.io>
Signed-off-by: Sebastian Wicki <sebastian@isovalent.com>
[ upstream commit 04d48fe ]

Use this workaround until the issue gets fixed:

yaml/pyyaml#601 (comment)

Signed-off-by: Michi Mutsuzaki <michi@isovalent.com>
Signed-off-by: Sebastian Wicki <sebastian@isovalent.com>
[ upstream commit 0a9b289 ]

Signed-off-by: Nico Vibert <nicolas.vibert@isovalent.com>
Signed-off-by: André Martins <andre@cilium.io>
Signed-off-by: Sebastian Wicki <sebastian@isovalent.com>
[ upstream commit 98003d5 ]

As with all other `*-ci` images, we should not use check the digest when
pulling the image, as it is different for CI builds. On `main` this has
not been an issue, because `useDigest` already defaults to `false`, but
on release branches (such as `v1.14`), we do check the digest by
default. This caused failing workflows on the v1.14 branch which should
be fixed by this commit.

Reported-by: Joe Stringer <joe@cilium.io>
Signed-off-by: Sebastian Wicki <sebastian@isovalent.com>
Signed-off-by: Sebastian Wicki <sebastian@isovalent.com>
[ upstream commit 0bf7cc5 ]

Only configure GetClientCertificate if client keypair is configured,
allowing servers to Request ClientCertificates without requiring them.

In docs for `GetClientCertificate` it specifies:

>  GetClientCertificate must return a non-nil Certificate. If
>  Certificate.Certificate is empty then no certificate will be sent to the
>  server.

If a nil certificate is sent when the server requests a client
certificate, the client will return an error. Instead, only configure
GetClientCertificate if certificates are provided and the server may
choose to how to handle the lack of a client certificate.

This is needed primarily for when the server is using RequestClientCert,
which requests a certificate, but does not require the client to send
one.

Previously, you would see this log message:

```
transport: authentication handshake failed: mTLS client certificate requested, but not provided
```

Now, if a server requires a client certificate it should reject the TLS
connection and the client will receive the error from the server.

Signed-off-by: Chance Zibolski <chance.zibolski@gmail.com>
Signed-off-by: Sebastian Wicki <sebastian@isovalent.com>
[ upstream commit e06e70e ]

Revert commit 04d48fe, and pick up PyYAML 6.0.1.

Fixes: #26873

Signed-off-by: Michi Mutsuzaki <michi@isovalent.com>
Signed-off-by: Sebastian Wicki <sebastian@isovalent.com>
@gandro gandro requested review from a team as code owners July 18, 2023 08:50
@gandro gandro requested a review from christarazi July 18, 2023 08:50
@maintainer-s-little-helper maintainer-s-little-helper bot added backport/1.14 This PR represents a backport for Cilium 1.14.x of a PR that was merged to main. kind/backports This PR provides functionality previously merged into master. labels Jul 18, 2023
@gandro
Copy link
Member Author

gandro commented Jul 18, 2023

/test-backport-1.14

Copy link
Member

@joestringer joestringer left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Approving on behalf of my codeowners and for the backports of PRs I wrote.

@gandro
Copy link
Member Author

gandro commented Jul 18, 2023

Apparently we missed #26869 for ConformanceGKE 😞 It also needs useDigest=false.

Edit: Opened #26890 - this does not need to block this PR though, since the GKE workflow is not required

@gandro
Copy link
Member Author

gandro commented Jul 18, 2023

ci-ginko failed with provisioning error #26012 - restarting

Copy link
Contributor

@michi-covalent michi-covalent left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🥰

Copy link
Contributor

@nvibert nvibert left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

My Mutual Auth docs have been merged so I am happy!

@gandro gandro added the ready-to-merge This PR has passed all tests and received consensus from code owners to merge. label Jul 19, 2023
@gandro
Copy link
Member Author

gandro commented Jul 19, 2023

All reviews are in and CI is as green as it's going to get. Marking as ready to merge.

@gandro gandro merged commit 0006c92 into v1.14 Jul 19, 2023
223 of 228 checks passed
@gandro gandro deleted the pr/v1.14-backport-2023-07-18 branch July 19, 2023 07:54
@maintainer-s-little-helper maintainer-s-little-helper bot removed the ready-to-merge This PR has passed all tests and received consensus from code owners to merge. label Jul 19, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
backport/1.14 This PR represents a backport for Cilium 1.14.x of a PR that was merged to main. kind/backports This PR provides functionality previously merged into master.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

8 participants