Skip to content

Commit 9a986e0

Browse files
authored
Merge pull request #660 from aojea/fix_providerid
Bumb kubernetes to 1.30
2 parents 25e5dcc + 8c75fab commit 9a986e0

File tree

1,361 files changed

+63393
-25157
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,361 files changed

+63393
-25157
lines changed

WORKSPACE

Lines changed: 14 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -5,22 +5,23 @@ load("@bazel_tools//tools/build_defs/repo:git.bzl", "git_repository")
55

66
http_archive(
77
name = "io_bazel_rules_go",
8-
sha256 = "19ef30b21eae581177e0028f6f4b1f54c66467017be33d211ab6fc81da01ea4d",
8+
integrity = "sha256-fHbWI2so/2laoozzX5XeMXqUcv0fsUrHl8m/aE8Js3w=",
99
urls = [
10-
"https://mirror.bazel.build/github.com/bazelbuild/rules_go/releases/download/v0.38.0/rules_go-v0.38.0.zip",
11-
"https://github.com/bazelbuild/rules_go/releases/download/v0.38.0/rules_go-v0.38.0.zip",
10+
"https://mirror.bazel.build/github.com/bazelbuild/rules_go/releases/download/v0.44.2/rules_go-v0.44.2.zip",
11+
"https://github.com/bazelbuild/rules_go/releases/download/v0.44.2/rules_go-v0.44.2.zip",
1212
],
1313
)
1414

1515
http_archive(
1616
name = "bazel_gazelle",
17-
sha256 = "727f3e4edd96ea20c29e8c2ca9e8d2af724d8c7778e7923a854b2c80952bc405",
17+
integrity = "sha256-MpOL2hbmcABjA1R5Bj2dJMYO2o15/Uc5Vj9Q0zHLMgk=",
1818
urls = [
19-
"https://mirror.bazel.build/github.com/bazelbuild/bazel-gazelle/releases/download/v0.30.0/bazel-gazelle-v0.30.0.tar.gz",
20-
"https://github.com/bazelbuild/bazel-gazelle/releases/download/v0.30.0/bazel-gazelle-v0.30.0.tar.gz",
19+
"https://mirror.bazel.build/github.com/bazelbuild/bazel-gazelle/releases/download/v0.35.0/bazel-gazelle-v0.35.0.tar.gz",
20+
"https://github.com/bazelbuild/bazel-gazelle/releases/download/v0.35.0/bazel-gazelle-v0.35.0.tar.gz",
2121
],
2222
)
2323

24+
2425
http_archive(
2526
name = "bazel_skylib",
2627
sha256 = "f7be3474d42aae265405a592bb7da8e171919d74c16f082a5457840f06054728",
@@ -47,7 +48,7 @@ go_rules_dependencies()
4748

4849
go_download_sdk(
4950
name = "go_sdk",
50-
version = "1.20.12",
51+
version = "1.21.7",
5152
)
5253

5354
go_register_toolchains()
@@ -82,7 +83,7 @@ container_pull(
8283
registry = "registry.k8s.io",
8384
repository = "build-image/go-runner",
8485
# 'tag' is also supported, but digest is encouraged for reproducibility.
85-
tag = "v2.3.1-go1.20.12-bullseye.0",
86+
tag = "v2.3.1-go1.21.7-bullseye.0",
8687
)
8788

8889
load("@bazel_gazelle//:deps.bzl", "gazelle_dependencies")
@@ -100,10 +101,10 @@ load("//defs:repo_rules.bzl", "fetch_kube_release")
100101
fetch_kube_release(
101102
name = "io_k8s_release",
102103
archives = {
103-
"kubernetes-server-linux-amd64.tar.gz": "747eed461b39c5b1c313e33204f87c5f24d8366ab4b8263607347dd3492f7db7",
104-
"kubernetes-manifests.tar.gz": "f17a4b6c30df7e8615e93135f0e728a5cf2492a5f7c73a0f3be2ad5729ecf6ba",
105-
"kubernetes-node-linux-amd64.tar.gz": "88951491c2465c082d102640059cc07eb022fcc419dc556e39be9945e95dc7c2",
106-
"kubernetes-node-windows-amd64.tar.gz": "0f95edc363a90b97fce3fd9a2a9a97aca9cb13be56141f6dd312185233304218",
104+
"kubernetes-node-linux-amd64.tar.gz": "1870c8ec9a38af4d2e86d2ed22c3a4840e1bfe12aa08e7c70c9a86d21f04c375",
105+
"kubernetes-manifests.tar.gz": "4bdcbde160458bb664bf682aad25f37a19cd1a2b2baa5a0f7bab216a11513d7d",
106+
"kubernetes-server-linux-amd64.tar.gz": "aced340e01320ee9ae488bf7ad3ccb4853185316aa290597ca195754146d08af",
107+
"kubernetes-node-windows-amd64.tar.gz": "c9b8e681ff5b2633e6ac0cfe66b1d0795b22b6daf51ec029f5793009c82fcd8c",
107108
},
108-
version = "v1.28.2",
109+
version = "v1.30.0",
109110
)

cloudbuild.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ timeout: 3600s
44
options:
55
substitution_option: ALLOW_LOOSE
66
steps:
7-
- name: 'golang:1.20.12'
7+
- name: 'golang:1.22.2'
88
env:
99
- IMAGE_REPO=${_IMAGE_REPO}
1010
- IMAGE_TAG=${_PULL_BASE_REF}

cluster/addons/addon-manager/CHANGELOG.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,7 @@
1+
### Version 9.1.7 (Thu May 15 2023 Paco Xu <[email protected]>)
2+
- Update kubectl to v1.27.1.
3+
- Use `--prune-allowlist` instead of deprecated `--prune-whitelist`.
4+
15
### Version 9.1.6 (Thu February 24 2022 Shihang Zhang <[email protected]>)
26
- Clean up the wait check for service account (https://github.com/kubernetes/kubernetes/pull/108313)
37

cluster/addons/addon-manager/Makefile

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,8 +15,8 @@
1515
IMAGE=gcr.io/k8s-staging-addon-manager/kube-addon-manager
1616
ARCH?=amd64
1717
TEMP_DIR:=$(shell mktemp -d)
18-
VERSION=v9.1.6
19-
KUBECTL_VERSION?=v1.20.2
18+
VERSION=v9.1.7
19+
KUBECTL_VERSION?=v1.27.1
2020

2121
BASEIMAGE=registry.k8s.io/debian-base-$(ARCH):v1.0.1
2222

cluster/addons/addon-manager/kube-addons.sh

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -114,28 +114,28 @@ function log() {
114114
esac
115115
}
116116

117-
# Generate kubectl prune-whitelist flags from provided resource list.
118-
function generate_prune_whitelist_flags() {
117+
# Generate kubectl prune-allowlist flags from provided resource list.
118+
function generate_prune_allowlist_flags() {
119119
local -r resources=( "$@" )
120120
for resource in "${resources[@]}"; do
121121
# Check if $resource isn't composed just of whitespaces by replacing ' '
122122
# with '' and checking whether the resulting string is not empty.
123123
if [[ -n "${resource// /}" ]]; then
124-
printf "%s" "--prune-whitelist ${resource} "
124+
printf "%s" "--prune-allowlist ${resource} "
125125
fi
126126
done
127127
}
128128

129-
# KUBECTL_EXTRA_PRUNE_WHITELIST is a list of extra whitelisted resources
129+
# KUBECTL_EXTRA_PRUNE_WHITELIST is a list of extra allowed resources
130130
# besides the default ones.
131-
extra_prune_whitelist=
131+
extra_prune_allowlist=
132132
if [ -n "${KUBECTL_EXTRA_PRUNE_WHITELIST:-}" ]; then
133-
read -ra extra_prune_whitelist <<< "${KUBECTL_EXTRA_PRUNE_WHITELIST}"
133+
read -ra extra_prune_allowlist <<< "${KUBECTL_EXTRA_PRUNE_WHITELIST}"
134134
fi
135-
prune_whitelist=( "${KUBECTL_PRUNE_WHITELIST[@]}" "${extra_prune_whitelist[@]}" )
136-
prune_whitelist_flags=$(generate_prune_whitelist_flags "${prune_whitelist[@]}")
135+
prune_allowlist=( "${KUBECTL_PRUNE_WHITELIST[@]}" "${extra_prune_allowlist[@]}" )
136+
prune_allowlist_flags=$(generate_prune_allowlist_flags "${prune_allowlist[@]}")
137137

138-
log INFO "== Generated kubectl prune whitelist flags: $prune_whitelist_flags =="
138+
log INFO "== Generated kubectl prune allowlist flags: $prune_allowlist_flags =="
139139

140140
# $1 filename of addon to start.
141141
# $2 count of tries to start the addon.
@@ -240,14 +240,14 @@ function reconcile_addons() {
240240
# Disabling because "${KUBECTL_OPTS}" needs to allow for expansion here
241241
${KUBECTL} ${KUBECTL_OPTS} apply -f ${ADDON_PATH} \
242242
-l ${CLUSTER_SERVICE_LABEL}=true,${ADDON_MANAGER_LABEL}!=EnsureExists \
243-
--prune=true ${prune_whitelist_flags} --recursive | grep -v configured
243+
--prune=true ${prune_allowlist_flags} --recursive | grep -v configured
244244

245245
log INFO "== Reconciling with addon-manager label =="
246246
# shellcheck disable=SC2086
247247
# Disabling because "${KUBECTL_OPTS}" needs to allow for expansion here
248248
${KUBECTL} ${KUBECTL_OPTS} apply -f ${ADDON_PATH} \
249249
-l ${CLUSTER_SERVICE_LABEL}!=true,${ADDON_MANAGER_LABEL}=Reconcile \
250-
--prune=true ${prune_whitelist_flags} --recursive | grep -v configured
250+
--prune=true ${prune_allowlist_flags} --recursive | grep -v configured
251251

252252
log INFO "== Kubernetes addon reconcile completed at $(date -Is) =="
253253
}

cluster/addons/cloud-controller-manager/cloud-node-controller-role.yaml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -44,6 +44,7 @@ rules:
4444
- nodes
4545
verbs:
4646
- get
47+
- patch
4748
- update
4849
- apiGroups:
4950
- ""

cluster/addons/dns/coredns/coredns.yaml.base

Lines changed: 2 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -27,12 +27,6 @@ rules:
2727
verbs:
2828
- list
2929
- watch
30-
- apiGroups:
31-
- ""
32-
resources:
33-
- nodes
34-
verbs:
35-
- get
3630
- apiGroups:
3731
- discovery.k8s.io
3832
resources:
@@ -139,7 +133,7 @@ spec:
139133
kubernetes.io/os: linux
140134
containers:
141135
- name: coredns
142-
image: registry.k8s.io/coredns/coredns:v1.9.3
136+
image: registry.k8s.io/coredns/coredns:v1.11.1
143137
imagePullPolicy: IfNotPresent
144138
resources:
145139
limits:
@@ -182,7 +176,7 @@ spec:
182176
add:
183177
- NET_BIND_SERVICE
184178
drop:
185-
- all
179+
- ALL
186180
readOnlyRootFilesystem: true
187181
dnsPolicy: Default
188182
volumes:

cluster/addons/dns/coredns/coredns.yaml.in

Lines changed: 2 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -27,12 +27,6 @@ rules:
2727
verbs:
2828
- list
2929
- watch
30-
- apiGroups:
31-
- ""
32-
resources:
33-
- nodes
34-
verbs:
35-
- get
3630
- apiGroups:
3731
- discovery.k8s.io
3832
resources:
@@ -139,7 +133,7 @@ spec:
139133
kubernetes.io/os: linux
140134
containers:
141135
- name: coredns
142-
image: registry.k8s.io/coredns/coredns:v1.9.3
136+
image: registry.k8s.io/coredns/coredns:v1.11.1
143137
imagePullPolicy: IfNotPresent
144138
resources:
145139
limits:
@@ -182,7 +176,7 @@ spec:
182176
add:
183177
- NET_BIND_SERVICE
184178
drop:
185-
- all
179+
- ALL
186180
readOnlyRootFilesystem: true
187181
dnsPolicy: Default
188182
volumes:

cluster/addons/dns/coredns/coredns.yaml.sed

Lines changed: 2 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -27,12 +27,6 @@ rules:
2727
verbs:
2828
- list
2929
- watch
30-
- apiGroups:
31-
- ""
32-
resources:
33-
- nodes
34-
verbs:
35-
- get
3630
- apiGroups:
3731
- discovery.k8s.io
3832
resources:
@@ -139,7 +133,7 @@ spec:
139133
kubernetes.io/os: linux
140134
containers:
141135
- name: coredns
142-
image: registry.k8s.io/coredns/coredns:v1.9.3
136+
image: registry.k8s.io/coredns/coredns:v1.11.1
143137
imagePullPolicy: IfNotPresent
144138
resources:
145139
limits:
@@ -182,7 +176,7 @@ spec:
182176
add:
183177
- NET_BIND_SERVICE
184178
drop:
185-
- all
179+
- ALL
186180
readOnlyRootFilesystem: true
187181
dnsPolicy: Default
188182
volumes:

cluster/addons/dns/kube-dns/kube-dns.yaml.base

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -114,7 +114,7 @@ spec:
114114
kubernetes.io/os: linux
115115
containers:
116116
- name: kubedns
117-
image: registry.k8s.io/dns/k8s-dns-kube-dns:1.22.13
117+
image: registry.k8s.io/dns/k8s-dns-kube-dns:1.22.28
118118
resources:
119119
# TODO: Set memory limits when we've profiled the container for large
120120
# clusters, then set request = limit to keep this container in
@@ -170,7 +170,7 @@ spec:
170170
runAsUser: 1001
171171
runAsGroup: 1001
172172
- name: dnsmasq
173-
image: registry.k8s.io/dns/k8s-dns-dnsmasq-nanny:1.22.13
173+
image: registry.k8s.io/dns/k8s-dns-dnsmasq-nanny:1.22.28
174174
livenessProbe:
175175
httpGet:
176176
path: /healthcheck/dnsmasq
@@ -217,7 +217,7 @@ spec:
217217
- NET_BIND_SERVICE
218218
- SETGID
219219
- name: sidecar
220-
image: registry.k8s.io/dns/k8s-dns-sidecar:1.22.13
220+
image: registry.k8s.io/dns/k8s-dns-sidecar:1.22.28
221221
livenessProbe:
222222
httpGet:
223223
path: /metrics

0 commit comments

Comments
 (0)