Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update Kubernetes to v1.29.0+k3s1 #9052

Merged
merged 14 commits into from Dec 19, 2023

Conversation

galal-hussein
Copy link
Contributor

Proposed Changes

Types of Changes

Verification

Testing

Linked Issues

User-Facing Change


Further Comments

@galal-hussein galal-hussein requested a review from a team as a code owner December 13, 2023 19:27
go.mod Outdated Show resolved Hide resolved
pkg/cli/cmds/log.go Outdated Show resolved Hide resolved
scripts/test Outdated Show resolved Hide resolved
Comment on lines +51 to +53
#echo Running: golangci-lint
## https://github.com/golangci/golangci-lint/issues/2788
#CGO_ENABLED=0 golangci-lint run -v
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

why are you commenting this test?

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Discussed in SU. This will be contributed later in a different PR because it is currently breaking

tests/e2e/testutils.go Outdated Show resolved Hide resolved
@brandond
Copy link
Contributor

The new one-shot secrets encryption support was broken in v1.29 - as part of moving the feature to GA, it was also refactored to poll the config at 1 minute intervals, instead of using inotify as it did while alpha in v1.28. I'm not sure why upstream permitted a major rework as part of GA promotion, but that's what happened. There is no audit trail for this, as the issue justifying the change literally has no description.

Ref:

galal-hussein and others added 14 commits December 19, 2023 04:31
Signed-off-by: galal-hussein <hussein.galal.ahmed.11@gmail.com>
Signed-off-by: galal-hussein <hussein.galal.ahmed.11@gmail.com>
Signed-off-by: galal-hussein <hussein.galal.ahmed.11@gmail.com>
Signed-off-by: galal-hussein <hussein.galal.ahmed.11@gmail.com>
This update uses k3s' fork of flannel to allow the removal of
multicluster cidr flag logic from the code

Signed-off-by: galal-hussein <hussein.galal.ahmed.11@gmail.com>
Signed-off-by: galal-hussein <hussein.galal.ahmed.11@gmail.com>
Signed-off-by: galal-hussein <hussein.galal.ahmed.11@gmail.com>
Signed-off-by: galal-hussein <hussein.galal.ahmed.11@gmail.com>
Signed-off-by: galal-hussein <hussein.galal.ahmed.11@gmail.com>
Signed-off-by: galal-hussein <hussein.galal.ahmed.11@gmail.com>
Signed-off-by: galal-hussein <hussein.galal.ahmed.11@gmail.com>
Signed-off-by: galal-hussein <hussein.galal.ahmed.11@gmail.com>
Signed-off-by: Brad Davidson <brad@oatmail.org>
Signed-off-by: galal-hussein <hussein.galal.ahmed.11@gmail.com>
Copy link

codecov bot commented Dec 19, 2023

Codecov Report

Attention: 42 lines in your changes are missing coverage. Please review.

Comparison is base (bf3f29f) 50.24% compared to head (408b046) 41.62%.

Files Patch % Lines
pkg/daemons/control/server.go 0.00% 16 Missing and 8 partials ⚠️
pkg/daemons/agent/agent_linux.go 0.00% 12 Missing and 6 partials ⚠️
Additional details and impacted files
@@            Coverage Diff             @@
##           master    #9052      +/-   ##
==========================================
- Coverage   50.24%   41.62%   -8.62%     
==========================================
  Files         148      148              
  Lines       15881    15924      +43     
==========================================
- Hits         7979     6628    -1351     
- Misses       6642     8162    +1520     
+ Partials     1260     1134     -126     
Flag Coverage Δ
e2etests ?
inttests 38.84% <14.28%> (-5.69%) ⬇️
unittests 18.34% <0.00%> (+0.01%) ⬆️

Flags with carried forward coverage won't be shown. Click here to find out more.

☔ View full report in Codecov by Sentry.
📢 Have feedback on the report? Share it here.

@galal-hussein galal-hussein merged commit 7101af3 into k3s-io:master Dec 19, 2023
15 checks passed
pierre-az pushed a commit to pierre-az/k3s that referenced this pull request Dec 19, 2023
* Update to v1.29.0

Signed-off-by: galal-hussein <hussein.galal.ahmed.11@gmail.com>

* Update to v1.29.0

Signed-off-by: galal-hussein <hussein.galal.ahmed.11@gmail.com>

* Update go to 1.21.5

Signed-off-by: galal-hussein <hussein.galal.ahmed.11@gmail.com>

* update golangci-lint

Signed-off-by: galal-hussein <hussein.galal.ahmed.11@gmail.com>

* update flannel to 0.23.0-k3s1

This update uses k3s' fork of flannel to allow the removal of
multicluster cidr flag logic from the code

Signed-off-by: galal-hussein <hussein.galal.ahmed.11@gmail.com>

* fix flannel calls

Signed-off-by: galal-hussein <hussein.galal.ahmed.11@gmail.com>

* update cri-tools to version v1.29.0-k3s1

Signed-off-by: galal-hussein <hussein.galal.ahmed.11@gmail.com>

* Remove GOEXPERIMENT=nounified from arm builds

Signed-off-by: galal-hussein <hussein.galal.ahmed.11@gmail.com>

* Skip golangci-lint

Signed-off-by: galal-hussein <hussein.galal.ahmed.11@gmail.com>

* Fix setup logging with newer go version

Signed-off-by: galal-hussein <hussein.galal.ahmed.11@gmail.com>

* Move logging flags to components arguments

Signed-off-by: galal-hussein <hussein.galal.ahmed.11@gmail.com>

* add sysctl commands to the test script

Signed-off-by: galal-hussein <hussein.galal.ahmed.11@gmail.com>

* Update scripts/test

Signed-off-by: Brad Davidson <brad@oatmail.org>

* disable secretsencryption tests

Signed-off-by: galal-hussein <hussein.galal.ahmed.11@gmail.com>

---------

Signed-off-by: galal-hussein <hussein.galal.ahmed.11@gmail.com>
Signed-off-by: Brad Davidson <brad@oatmail.org>
Co-authored-by: Brad Davidson <brad@oatmail.org>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

3 participants