Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
1 change: 0 additions & 1 deletion .github/workflows/run-vsphere-tests.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -12,7 +12,6 @@ env:
VSPHERE_DATACENTER: ${{ secrets.VSPHERE_DATACENTER }}
VSPHERE_DATASTORE: ${{ secrets.VSPHERE_DATASTORE }}
VSPHERE_FOLDER: ${{ secrets.VSPHERE_FOLDER }}
VSPHERE_TEMPLATE: ${{ secrets.VSPHERE_TEMPLATE }}
VSPHERE_NETWORK: ${{ secrets.VSPHERE_NETWORK }}
VSPHERE_RESOURCE_POOL: ${{ secrets.VSPHERE_RESOURCE_POOL }}
VSPHERE_USERNAME: ${{ secrets.VSPHERE_USERNAME }}
Expand Down
2 changes: 1 addition & 1 deletion charts/rancher-turtles/Chart.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -14,7 +14,7 @@ keywords:
annotations:
catalog.cattle.io/certified: rancher
catalog.cattle.io/display-name: Rancher Turtles - the Cluster API Extension
catalog.cattle.io/kube-version: '>= 1.31.4-0 < 1.32.0-0'
catalog.cattle.io/kube-version: '>= 1.31.4-0 < 1.34.0-0'
catalog.cattle.io/namespace: rancher-turtles-system
catalog.cattle.io/os: linux
catalog.cattle.io/permits-os: linux
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -208,13 +208,6 @@ spec:
template:
spec:
kubeadmConfigSpec:
clusterConfiguration:
apiServer:
extraArgs:
cloud-provider: external
controllerManager:
extraArgs:
cloud-provider: external
initConfiguration:
nodeRegistration:
kubeletExtraArgs:
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -265,12 +265,10 @@ spec:
kubeadmConfigSpec:
clusterConfiguration:
apiServer:
extraArgs: {}
timeoutForControlPlane: 20m
controllerManager:
extraArgs:
allocate-node-cidrs: "false"
cloud-provider: external
cluster-name: "TO_BE_REPLACED_BY_PATCH"
etcd:
local:
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -194,11 +194,8 @@ spec:
clusterConfiguration:
apiServer:
timeoutForControlPlane: 20m
extraArgs:
cloud-provider: external
controllerManager:
extraArgs:
cloud-provider: external
allocate-node-cidrs: "false"
initConfiguration:
nodeRegistration:
Expand Down
2 changes: 1 addition & 1 deletion examples/go.mod
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
module github.com/rancher/turtles/examples

go 1.24.4
go 1.24.9

require (
github.com/agnivade/levenshtein v1.2.1
Expand Down
2 changes: 1 addition & 1 deletion exp/clusterclass/go.mod
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
module github.com/rancher/turtles/exp/clusterclass

go 1.24.4
go 1.24.9

require (
github.com/go-logr/logr v1.4.3
Expand Down
2 changes: 1 addition & 1 deletion exp/day2/go.mod
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
module github.com/rancher/turtles/exp/day2

go 1.24.4
go 1.24.9

replace github.com/rancher/turtles => ../..

Expand Down
2 changes: 1 addition & 1 deletion go.mod
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
module github.com/rancher/turtles

go 1.24.4
go 1.24.9

require (
github.com/blang/semver/v4 v4.0.0
Expand Down
24 changes: 16 additions & 8 deletions test/e2e/config/operator.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -38,34 +38,43 @@ variables:
SECRET_KEYS: "NGROK_AUTHTOKEN,NGROK_API_KEY,RANCHER_HOSTNAME,RANCHER_PASSWORD,CAPG_ENCODED_CREDS,AWS_ACCESS_KEY_ID,AWS_SECRET_ACCESS_KEY,AZURE_SUBSCRIPTION_ID,AZURE_CLIENT_ID,AZURE_CLIENT_SECRET,AZURE_TENANT_ID,GCP_PROJECT,GCP_NETWORK_NAME,GCP_IMAGE_ID,VSPHERE_TLS_THUMBPRINT,VSPHERE_SERVER,VSPHERE_DATACENTER,VSPHERE_DATASTORE,VSPHERE_FOLDER,VSPHERE_TEMPLATE,VSPHERE_NETWORK,VSPHERE_RESOURCE_POOL,VSPHERE_USERNAME,VSPHERE_PASSWORD,VSPHERE_KUBE_VIP_IP_KUBEADM,VSPHERE_KUBE_VIP_IP_RKE2,DOCKER_REGISTRY_TOKEN,DOCKER_REGISTRY_USERNAME,DOCKER_REGISTRY_CONFIG"

# Kubernetes Configuration
KUBERNETES_VERSION: "v1.31.4"
KUBERNETES_MANAGEMENT_VERSION: "v1.31.4"
RKE2_VERSION: "v1.31.7+rke2r1"
KUBERNETES_VERSION: "v1.33.5"
KUBERNETES_MANAGEMENT_VERSION: "v1.32.3"
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Due to listwatch problem this will have to stay 1.32

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Is it a CAPI problem or provider specific? It would be good to link to existing upstream issue if any or TODO on how to bump it in the future

Copy link
Contributor Author

@anmazzotti anmazzotti Nov 5, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

it's related to WatchList feature and CAAPF, see related PR: rancher/turtles-docs#385

only 1.33 is affected, not 1.32 or 1.34

RKE2_VERSION: "v1.33.5+rke2r1"
RKE2_CNI: "none"

# Azure Configuration
#
# Azure Kubeadm tests need specific k8s version.
# This is due to the limited availability of published AMIs.
# For example: https://portal.azure.com/#@suseazuredev.onmicrosoft.com/resource/providers/Microsoft.Compute/locations/FranceCentral/CommunityGalleries/ClusterAPI-f72ceb4f-5159-4c26-a0fe-2ea738f0d019/Images/capi-ubun2-2204/overview
AZURE_KUBERNETES_VERSION: "v1.31.1"
# For example: https://portal.azure.com/#view/Microsoft_Azure_ComputeHub/ComputeHubMenuBlade/~/communityImagesBrowse
# Filter `capi-ubun2-2404` images. Beware: not all versions are published on all regions.
AZURE_KUBERNETES_VERSION: "v1.33.5"
AZURE_AKS_KUBERNETES_VERSION: "v1.33.3"

# AWS Configuration
#
# AWS Kubeadm tests need specific k8s version.
# This is due to the limited availability of published AMIs.
# For a complete list, run: clusterawsadm ami list
AWS_KUBERNETES_VERSION: "v1.31.0"
# Alternatively, seach for `capa-ami` in https://eu-west-2.console.aws.amazon.com/ec2/home?region=eu-west-2#AMICatalog:
AWS_KUBERNETES_VERSION: "v1.33.5"
AWS_REGION: "eu-west-2"
KUBERNETES_MANAGEMENT_AWS_REGION: "eu-west-2"
AWS_CONTROL_PLANE_MACHINE_TYPE: "t3.large"
AWS_NODE_MACHINE_TYPE: "t3.large"
AWS_RKE2_CONTROL_PLANE_MACHINE_TYPE: "t3.xlarge"
AWS_RKE2_NODE_MACHINE_TYPE: "t3.xlarge"
AWS_AMI_ID: "ami-012e88f0aa221423a" # Public upstream AMI
AWS_AMI_ID: "ami-0cd9e4e7906f4c9dd" # Private AMI present only in eu-west-2

# GCP Configuration
GCP_MACHINE_TYPE: "n1-standard-2"

# vSphere Configuration
VSPHERE_TEMPLATE: "turtles-ci/ubuntu-2404-kube-v1.33.5"

# Docker Configuration
DOCKER_KUBERNETES_VERSION: "v1.33.4"

# CLI Tool Paths
CLUSTERCTL_BINARY_PATH: ""
Expand Down Expand Up @@ -97,7 +106,6 @@ variables:
CERT_MANAGER_REPO_NAME: "jetstack"
CERT_MANAGER_URL: "https://charts.jetstack.io"
CERT_MANAGER_PATH: "jetstack/cert-manager"
CPI_IMAGE_K8S_VERSION: "v1.31.0"

# Ingress Configuration (Ngrok)
NGROK_REPO_NAME: "ngrok"
Expand Down
10 changes: 6 additions & 4 deletions test/e2e/const.go
Original file line number Diff line number Diff line change
Expand Up @@ -159,10 +159,12 @@ const (

BootstrapClusterNameVar = "BOOTSTRAP_CLUSTER_NAME"

KubernetesVersionVar = "KUBERNETES_VERSION"
AWSKubernetesVersionVar = "AWS_KUBERNETES_VERSION"
AzureKubernetesVersionVar = "AZURE_KUBERNETES_VERSION"
RancherHostnameVar = "RANCHER_HOSTNAME"
KubernetesVersionVar = "KUBERNETES_VERSION"
AWSKubernetesVersionVar = "AWS_KUBERNETES_VERSION"
AzureKubernetesVersionVar = "AZURE_KUBERNETES_VERSION"
AzureAKSKubernetesVersionVar = "AZURE_AKS_KUBERNETES_VERSION"
DockerKubernetesVersionVar = "DOCKER_KUBERNETES_VERSION"
RancherHostnameVar = "RANCHER_HOSTNAME"

ArtifactsFolderVar = "ARTIFACTS_FOLDER"
UseExistingClusterVar = "USE_EXISTING_CLUSTER"
Expand Down
3 changes: 2 additions & 1 deletion test/e2e/data/cluster-templates/aws-eks-mmp.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -74,4 +74,5 @@ metadata:
namespace: "${NAMESPACE}"
annotations:
"helm.sh/resource-policy": keep
spec: {}
spec:
amiType: AL2023_x86_64_STANDARD
2 changes: 2 additions & 0 deletions test/e2e/data/cluster-templates/aws-kubeadm-topology.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -34,6 +34,8 @@ spec:
value: ${AWS_CONTROL_PLANE_MACHINE_TYPE}
- name: workerMachineType
value: ${AWS_NODE_MACHINE_TYPE}
- name: amiID
value: ${AWS_AMI_ID}
- name: awsClusterIdentityName
value: cluster-identity
version: ${AWS_KUBERNETES_VERSION}
Expand Down
3 changes: 3 additions & 0 deletions test/e2e/suites/chart-upgrade/chart_upgrade_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -114,6 +114,9 @@ var _ = Describe("Chart upgrade functionality should work", Ordered, Label(e2e.S
TopologyNamespace: topologyNamespace,
SkipCleanup: true,
SkipDeletionTest: true,
AdditionalTemplateVariables: map[string]string{
e2e.KubernetesVersionVar: e2e.LoadE2EConfig().GetVariableOrEmpty(e2e.DockerKubernetesVersionVar), // override the default k8s version
},
AdditionalFleetGitRepos: []framework.FleetCreateGitRepoInput{
{
Name: "docker-cluster-classes-regular",
Expand Down
9 changes: 9 additions & 0 deletions test/e2e/suites/import-gitops/import_gitops_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -55,6 +55,9 @@ var _ = Describe("[Docker] [Kubeadm] Create and delete CAPI cluster functionali
CapiClusterOwnerNamespaceLabel: e2e.CapiClusterOwnerNamespaceLabel,
OwnedLabelName: e2e.OwnedLabelName,
TopologyNamespace: topologyNamespace,
AdditionalTemplateVariables: map[string]string{
e2e.KubernetesVersionVar: e2e.LoadE2EConfig().GetVariableOrEmpty(e2e.DockerKubernetesVersionVar), // override the default k8s version
},
AdditionalFleetGitRepos: []turtlesframework.FleetCreateGitRepoInput{
{
Name: "docker-cluster-classes-regular",
Expand Down Expand Up @@ -100,6 +103,9 @@ var _ = Describe("[Docker] [RKE2] Create and delete CAPI cluster functionality s
CapiClusterOwnerNamespaceLabel: e2e.CapiClusterOwnerNamespaceLabel,
OwnedLabelName: e2e.OwnedLabelName,
TopologyNamespace: topologyNamespace,
AdditionalTemplateVariables: map[string]string{
e2e.KubernetesVersionVar: e2e.LoadE2EConfig().GetVariableOrEmpty(e2e.DockerKubernetesVersionVar), // override the default k8s version
},
AdditionalFleetGitRepos: []turtlesframework.FleetCreateGitRepoInput{
{
Name: "docker-cluster-classes-regular",
Expand Down Expand Up @@ -144,6 +150,9 @@ var _ = Describe("[Azure] [AKS] Create and delete CAPI cluster from cluster clas
CapiClusterOwnerNamespaceLabel: e2e.CapiClusterOwnerNamespaceLabel,
OwnedLabelName: e2e.OwnedLabelName,
TopologyNamespace: topologyNamespace,
AdditionalTemplateVariables: map[string]string{
e2e.KubernetesVersionVar: e2e.LoadE2EConfig().GetVariableOrEmpty(e2e.AzureAKSKubernetesVersionVar), // override the default k8s version
},
AdditionalFleetGitRepos: []turtlesframework.FleetCreateGitRepoInput{
{
Name: "azure-cluster-classes-aks",
Expand Down
2 changes: 1 addition & 1 deletion test/go.mod
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
module github.com/rancher/turtles/test

go 1.24.4
go 1.24.9

replace github.com/rancher/turtles => ../

Expand Down
2 changes: 1 addition & 1 deletion tilt/project/Tiltfile
Original file line number Diff line number Diff line change
Expand Up @@ -293,7 +293,7 @@ def get_port_forwards(debug):

tilt_helper_dockerfile_header = """
# Tilt image
FROM golang:1.24.4 as tilt-helper
FROM golang:1.24.9 as tilt-helper
# Support live reloading with Tilt
RUN go install github.com/go-delve/delve/cmd/dlv@latest
RUN wget --output-document /restart.sh --quiet https://raw.githubusercontent.com/tilt-dev/rerun-process-wrapper/master/restart.sh && \
Expand Down