mirror of
https://github.com/intel/intel-device-plugins-for-kubernetes.git
synced 2025-06-03 03:59:37 +00:00
Merge pull request #1460 from tkatila/release-0.27.1-prep
Release 0.27.1 prep
This commit is contained in:
commit
34c8adac88
6
Jenkinsfile
vendored
6
Jenkinsfile
vendored
@ -10,7 +10,7 @@ pipeline {
|
||||
REG="cloud-native-image-registry.westus.cloudapp.azure.com/"
|
||||
K8S_VERSION="1.27.1"
|
||||
GOLANGCI_LINT_VERSION="v1.52.2"
|
||||
GO_VERSION="1.20"
|
||||
GO_VERSION="1.20.5"
|
||||
GO_TAR="go${GO_VERSION}.linux-amd64.tar.gz"
|
||||
GOROOT="/usr/local/go"
|
||||
GOPATH="/tmp/go"
|
||||
@ -46,7 +46,7 @@ pipeline {
|
||||
echo -e 'unqualified-search-registries = ["docker.io"]' | sudo tee -a /etc/containers/registries.conf
|
||||
'''
|
||||
sh "sudo curl -L https://dl.k8s.io/release/v${K8S_VERSION}/bin/linux/amd64/kubectl -o /usr/bin/kubectl"
|
||||
sh "sudo chmod +x /usr/bin/kubectl"
|
||||
sh "sudo chmod +x /usr/bin/kubectl"
|
||||
}
|
||||
}
|
||||
stage("make go-mod-tidy") {
|
||||
@ -142,7 +142,7 @@ pipeline {
|
||||
stage('make test-with-kind') {
|
||||
steps {
|
||||
dir(path: "$REPO_DIR") {
|
||||
sh "make test-with-kind REG=intel/ TAG=0.27.0"
|
||||
sh "make test-with-kind REG=intel/ TAG=0.27.1"
|
||||
}
|
||||
}
|
||||
}
|
||||
|
2
Makefile
2
Makefile
@ -136,7 +136,7 @@ clean:
|
||||
|
||||
ORG?=intel
|
||||
REG?=$(ORG)/
|
||||
TAG?=0.27.0
|
||||
TAG?=0.27.1
|
||||
export TAG
|
||||
|
||||
e2e-fpga:
|
||||
|
@ -7,7 +7,7 @@ This repository contains a framework for developing plugins for the Kubernetes
|
||||
[device plugins framework](https://kubernetes.io/docs/concepts/extend-kubernetes/compute-storage-net/device-plugins/),
|
||||
along with a number of device plugin implementations utilizing that framework.
|
||||
|
||||
The [v0.27 release](https://github.com/intel/intel-device-plugins-for-kubernetes/releases/latest)
|
||||
The [v0.27.1 release](https://github.com/intel/intel-device-plugins-for-kubernetes/releases/latest)
|
||||
is the latest feature release with its documentation available [here](https://intel.github.io/intel-device-plugins-for-kubernetes/0.27/).
|
||||
|
||||
Table of Contents
|
||||
|
@ -56,7 +56,7 @@ FROM ${FINAL_BASE}
|
||||
COPY --from=builder /install_root /
|
||||
ENTRYPOINT ["/usr/local/bin/intel_deviceplugin_operator"]
|
||||
LABEL vendor='Intel®'
|
||||
LABEL version='0.27.0'
|
||||
LABEL version='0.27.1'
|
||||
LABEL release='1'
|
||||
LABEL name='intel-deviceplugin-operator'
|
||||
LABEL summary='Intel® device plugin operator for Kubernetes'
|
||||
|
@ -55,7 +55,7 @@ RUN curl -SL https://github.com/landley/toybox/archive/refs/tags/$TOYBOX_VERSION
|
||||
###
|
||||
FROM ${FINAL_BASE}
|
||||
LABEL vendor='Intel®'
|
||||
LABEL version='0.27.0'
|
||||
LABEL version='0.27.1'
|
||||
LABEL release='1'
|
||||
COPY --from=builder /install_root /
|
||||
COPY demo/dlb-init.sh /usr/local/bin/
|
||||
|
@ -56,7 +56,7 @@ FROM ${FINAL_BASE}
|
||||
COPY --from=builder /install_root /
|
||||
ENTRYPOINT ["/usr/local/bin/intel_dlb_device_plugin"]
|
||||
LABEL vendor='Intel®'
|
||||
LABEL version='0.27.0'
|
||||
LABEL version='0.27.1'
|
||||
LABEL release='1'
|
||||
LABEL name='intel-dlb-plugin'
|
||||
LABEL summary='Intel® DLB device plugin for Kubernetes'
|
||||
|
@ -56,7 +56,7 @@ FROM ${FINAL_BASE}
|
||||
COPY --from=builder /install_root /
|
||||
ENTRYPOINT ["/usr/local/bin/intel_dsa_device_plugin"]
|
||||
LABEL vendor='Intel®'
|
||||
LABEL version='0.27.0'
|
||||
LABEL version='0.27.1'
|
||||
LABEL release='1'
|
||||
LABEL name='intel-dsa-plugin'
|
||||
LABEL summary='Intel® DSA device plugin for Kubernetes'
|
||||
|
@ -56,7 +56,7 @@ FROM ${FINAL_BASE}
|
||||
COPY --from=builder /install_root /
|
||||
ENTRYPOINT ["/usr/local/bin/intel_fpga_admissionwebhook"]
|
||||
LABEL vendor='Intel®'
|
||||
LABEL version='0.27.0'
|
||||
LABEL version='0.27.1'
|
||||
LABEL release='1'
|
||||
LABEL name='intel-fpga-admissionwebhook'
|
||||
LABEL summary='Intel® FPGA admission controller webhook for Kubernetes'
|
||||
|
@ -86,7 +86,7 @@ RUN curl -SL https://github.com/landley/toybox/archive/refs/tags/$TOYBOX_VERSION
|
||||
###
|
||||
FROM ${FINAL_BASE}
|
||||
LABEL vendor='Intel®'
|
||||
LABEL version='0.27.0'
|
||||
LABEL version='0.27.1'
|
||||
LABEL release='1'
|
||||
LABEL name='intel-fpga-initcontainer'
|
||||
LABEL summary='Intel® FPGA programming CRI hook for Kubernetes'
|
||||
|
@ -56,7 +56,7 @@ FROM ${FINAL_BASE}
|
||||
COPY --from=builder /install_root /
|
||||
ENTRYPOINT ["/usr/local/bin/intel_fpga_device_plugin"]
|
||||
LABEL vendor='Intel®'
|
||||
LABEL version='0.27.0'
|
||||
LABEL version='0.27.1'
|
||||
LABEL release='1'
|
||||
LABEL name='intel-fpga-plugin'
|
||||
LABEL summary='Intel® FPGA device plugin for Kubernetes'
|
||||
|
@ -56,7 +56,7 @@ FROM ${FINAL_BASE}
|
||||
COPY --from=builder /install_root /
|
||||
ENTRYPOINT ["/usr/local/bin/intel_gpu_fakedev"]
|
||||
LABEL vendor='Intel®'
|
||||
LABEL version='0.27.0'
|
||||
LABEL version='0.27.1'
|
||||
LABEL release='1'
|
||||
LABEL name='intel-gpu-fakedev'
|
||||
LABEL summary='Fake device file generator for Intel® GPU plugin'
|
||||
|
@ -69,7 +69,7 @@ RUN curl -SL https://github.com/landley/toybox/archive/refs/tags/$TOYBOX_VERSION
|
||||
###
|
||||
FROM ${FINAL_BASE}
|
||||
LABEL vendor='Intel®'
|
||||
LABEL version='0.27.0'
|
||||
LABEL version='0.27.1'
|
||||
LABEL release='1'
|
||||
LABEL name='intel-gpu-initcontainer'
|
||||
LABEL summary='Intel® GPU NFD hook for Kubernetes'
|
||||
|
@ -56,7 +56,7 @@ FROM ${FINAL_BASE}
|
||||
COPY --from=builder /install_root /
|
||||
ENTRYPOINT ["/usr/local/bin/intel_gpu_device_plugin"]
|
||||
LABEL vendor='Intel®'
|
||||
LABEL version='0.27.0'
|
||||
LABEL version='0.27.1'
|
||||
LABEL release='1'
|
||||
LABEL name='intel-gpu-plugin'
|
||||
LABEL summary='Intel® GPU device plugin for Kubernetes'
|
||||
|
@ -56,7 +56,7 @@ FROM ${FINAL_BASE}
|
||||
COPY --from=builder /install_root /
|
||||
ENTRYPOINT ["/usr/local/bin/intel_iaa_device_plugin"]
|
||||
LABEL vendor='Intel®'
|
||||
LABEL version='0.27.0'
|
||||
LABEL version='0.27.1'
|
||||
LABEL release='1'
|
||||
LABEL name='intel-iaa-plugin'
|
||||
LABEL summary='Intel® IAA device plugin for Kubernetes'
|
||||
|
@ -55,7 +55,7 @@ RUN curl -SL https://github.com/landley/toybox/archive/refs/tags/$TOYBOX_VERSION
|
||||
###
|
||||
FROM ${FINAL_BASE}
|
||||
LABEL vendor='Intel®'
|
||||
LABEL version='0.27.0'
|
||||
LABEL version='0.27.1'
|
||||
LABEL release='1'
|
||||
LABEL name='intel-qat-initcontainer'
|
||||
LABEL summary='Intel® QAT initcontainer for Kubernetes'
|
||||
|
@ -57,7 +57,7 @@ RUN install -D ${DIR}/LICENSE /install_root/licenses/intel-device-plugins-for-ku
|
||||
else mkdir -p /install_root/licenses/$CMD/go-licenses/ && cd licenses/$CMD && cp -r * /install_root/licenses/$CMD/go-licenses/ ; fi
|
||||
FROM debian:unstable-slim
|
||||
LABEL vendor='Intel®'
|
||||
LABEL version='0.27.0'
|
||||
LABEL version='0.27.1'
|
||||
LABEL release='1'
|
||||
LABEL name='intel-qat-plugin-kerneldrv'
|
||||
LABEL summary='Intel® QAT device plugin kerneldrv for Kubernetes'
|
||||
|
@ -56,7 +56,7 @@ FROM ${FINAL_BASE}
|
||||
COPY --from=builder /install_root /
|
||||
ENTRYPOINT ["/usr/local/bin/intel_qat_device_plugin"]
|
||||
LABEL vendor='Intel®'
|
||||
LABEL version='0.27.0'
|
||||
LABEL version='0.27.1'
|
||||
LABEL release='1'
|
||||
LABEL name='intel-qat-plugin'
|
||||
LABEL summary='Intel® QAT device plugin for Kubernetes'
|
||||
|
@ -56,7 +56,7 @@ FROM ${FINAL_BASE}
|
||||
COPY --from=builder /install_root /
|
||||
ENTRYPOINT ["/usr/local/bin/intel_sgx_admissionwebhook"]
|
||||
LABEL vendor='Intel®'
|
||||
LABEL version='0.27.0'
|
||||
LABEL version='0.27.1'
|
||||
LABEL release='1'
|
||||
LABEL name='intel-sgx-admissionwebhook'
|
||||
LABEL summary='Intel® SGX admission controller webhook for Kubernetes'
|
||||
|
@ -69,7 +69,7 @@ RUN curl -SL https://github.com/landley/toybox/archive/refs/tags/$TOYBOX_VERSION
|
||||
###
|
||||
FROM ${FINAL_BASE}
|
||||
LABEL vendor='Intel®'
|
||||
LABEL version='0.27.0'
|
||||
LABEL version='0.27.1'
|
||||
LABEL release='1'
|
||||
LABEL name='intel-sgx-initcontainer'
|
||||
LABEL summary='Intel® SGX NFD hook for Kubernetes'
|
||||
|
@ -56,7 +56,7 @@ FROM ${FINAL_BASE}
|
||||
COPY --from=builder /install_root /
|
||||
ENTRYPOINT ["/usr/local/bin/intel_sgx_device_plugin"]
|
||||
LABEL vendor='Intel®'
|
||||
LABEL version='0.27.0'
|
||||
LABEL version='0.27.1'
|
||||
LABEL release='1'
|
||||
LABEL name='intel-sgx-plugin'
|
||||
LABEL summary='Intel® SGX device plugin for Kubernetes'
|
||||
|
@ -55,7 +55,7 @@ RUN install -D ${DIR}/LICENSE /install_root/licenses/intel-device-plugins-for-ku
|
||||
else mkdir -p /install_root/licenses/$CMD/go-licenses/ && cd licenses/$CMD && cp -r * /install_root/licenses/$CMD/go-licenses/ ; fi
|
||||
FROM debian:unstable-slim
|
||||
LABEL vendor='Intel®'
|
||||
LABEL version='0.27.0'
|
||||
LABEL version='0.27.1'
|
||||
LABEL release='1'
|
||||
LABEL name='intel-vpu-plugin'
|
||||
LABEL summary='Intel® VPU device plugin for Kubernetes'
|
||||
|
@ -56,7 +56,7 @@ FROM ${FINAL_BASE}
|
||||
COPY --from=builder /install_root /
|
||||
ENTRYPOINT ["/usr/local/bin/intel_xpumanager_sidecar"]
|
||||
LABEL vendor='Intel®'
|
||||
LABEL version='0.27.0'
|
||||
LABEL version='0.27.1'
|
||||
LABEL release='1'
|
||||
LABEL name='intel-xpumanager-sidecar'
|
||||
LABEL summary='Intel® xpumanager sidecar'
|
||||
|
@ -1,3 +1,3 @@
|
||||
LABEL vendor='Intel®'
|
||||
LABEL version='0.27.0'
|
||||
LABEL version='0.27.1'
|
||||
LABEL release='1'
|
||||
|
@ -21,6 +21,8 @@ Intel GPUs can be interconnected via an XeLink. In some workloads it is benefici
|
||||
| -interval | int | 10 | Interval for XeLink topology fetching and label writing (seconds, >= 1) |
|
||||
| -startup-delay | int | 10 | Startup delay before the first topology fetching (seconds, >= 0) |
|
||||
| -label-namespace | string | gpu.intel.com | Namespace or prefix for the labels. i.e. **gpu.intel.com**/xe-links |
|
||||
| -allow-subdeviceless-links | bool | false | Include xelinks that are not on subdevices |
|
||||
| -use-https | bool | false | Use HTTPS protocol when connecting to XPU-Manager |
|
||||
|
||||
The sidecar also accepts a number of other arguments. Please use the -h option to see the complete list of options.
|
||||
|
||||
|
@ -18,6 +18,7 @@ import (
|
||||
"bufio"
|
||||
"bytes"
|
||||
"context"
|
||||
"crypto/tls"
|
||||
"flag"
|
||||
"fmt"
|
||||
"io"
|
||||
@ -55,15 +56,17 @@ type xpuManagerTopologyMatrixCell struct {
|
||||
}
|
||||
|
||||
type xpuManagerSidecar struct {
|
||||
getMetricsData func() []byte
|
||||
tmpDirPrefix string
|
||||
dstFilePath string
|
||||
labelNamespace string
|
||||
url string
|
||||
interval uint64
|
||||
startDelay uint64
|
||||
xpumPort uint64
|
||||
laneCount uint64
|
||||
getMetricsData func() []byte
|
||||
tmpDirPrefix string
|
||||
dstFilePath string
|
||||
labelNamespace string
|
||||
url string
|
||||
interval uint64
|
||||
startDelay uint64
|
||||
xpumPort uint64
|
||||
laneCount uint64
|
||||
allowSubdevicelessLinks bool
|
||||
useHTTPS bool
|
||||
}
|
||||
|
||||
func (e *invalidEntryErr) Error() string {
|
||||
@ -75,6 +78,14 @@ func (xms *xpuManagerSidecar) getMetricsDataFromXPUM() []byte {
|
||||
Timeout: 5 * time.Second,
|
||||
}
|
||||
|
||||
if xms.useHTTPS {
|
||||
customTransport := http.DefaultTransport.(*http.Transport).Clone()
|
||||
//#nosec
|
||||
customTransport.TLSClientConfig = &tls.Config{InsecureSkipVerify: true}
|
||||
|
||||
client.Transport = customTransport
|
||||
}
|
||||
|
||||
ctx := context.Background()
|
||||
|
||||
req, err := http.NewRequestWithContext(ctx, http.MethodGet, xms.url, http.NoBody)
|
||||
@ -108,7 +119,7 @@ func (xms *xpuManagerSidecar) getMetricsDataFromXPUM() []byte {
|
||||
return resBody
|
||||
}
|
||||
|
||||
func processMetricsLabels(labels []*io_prometheus_client.LabelPair) (xpuManagerTopologyMatrixCell, error) {
|
||||
func processMetricsLabels(labels []*io_prometheus_client.LabelPair, allowNonSubdeviceLinks bool) (xpuManagerTopologyMatrixCell, error) {
|
||||
cell := createInvalidTopologyCell()
|
||||
|
||||
for _, label := range labels {
|
||||
@ -118,7 +129,7 @@ func processMetricsLabels(labels []*io_prometheus_client.LabelPair) (xpuManagerT
|
||||
klog.V(5).Info(name, " ", strVal)
|
||||
|
||||
// xelinks should always be on subdevices
|
||||
if name == "local_on_subdevice" && strVal != "true" {
|
||||
if !allowNonSubdeviceLinks && name == "local_on_subdevice" && strVal != "true" {
|
||||
return cell, &invalidEntryErr{}
|
||||
}
|
||||
|
||||
@ -193,7 +204,7 @@ func (xms *xpuManagerSidecar) GetTopologyFromXPUMMetrics(data []byte) (topologyI
|
||||
continue
|
||||
}
|
||||
|
||||
cell, err := processMetricsLabels(metric.Label)
|
||||
cell, err := processMetricsLabels(metric.Label, xms.allowSubdevicelessLinks)
|
||||
if err == nil {
|
||||
klog.V(5).Info("topology entry: ", cell)
|
||||
topologyInfos = append(topologyInfos, cell)
|
||||
@ -367,6 +378,8 @@ func main() {
|
||||
flag.StringVar(&xms.dstFilePath, "dst-file-path", "/etc/kubernetes/node-feature-discovery/features.d/xpum-sidecar-labels.txt", "label file destination")
|
||||
flag.Uint64Var(&xms.laneCount, "lane-count", 4, "minimum lane count for xelink")
|
||||
flag.StringVar(&xms.labelNamespace, "label-namespace", "gpu.intel.com", "namespace for the labels")
|
||||
flag.BoolVar(&xms.allowSubdevicelessLinks, "allow-subdeviceless-links", false, "allow xelinks that are not tied to subdevices (=1 tile GPUs)")
|
||||
flag.BoolVar(&xms.useHTTPS, "use-https", false, "Use HTTPS protocol to connect to xpumanager")
|
||||
klog.InitFlags(nil)
|
||||
|
||||
flag.Parse()
|
||||
@ -375,7 +388,12 @@ func main() {
|
||||
klog.Fatal("zero interval won't work, set it to at least 1")
|
||||
}
|
||||
|
||||
xms.url = fmt.Sprintf("http://127.0.0.1:%d/metrics", xms.xpumPort)
|
||||
protocol := "http"
|
||||
if xms.useHTTPS {
|
||||
protocol = "https"
|
||||
}
|
||||
|
||||
xms.url = fmt.Sprintf("%s://127.0.0.1:%d/metrics", protocol, xms.xpumPort)
|
||||
|
||||
keepIterating := true
|
||||
|
||||
|
@ -23,10 +23,11 @@ import (
|
||||
)
|
||||
|
||||
type testCase struct {
|
||||
name string
|
||||
metricsData []string
|
||||
expectedLabels []string
|
||||
minLaneCount int
|
||||
name string
|
||||
metricsData []string
|
||||
expectedLabels []string
|
||||
minLaneCount int
|
||||
allowSubdeviceless bool
|
||||
}
|
||||
|
||||
func createTestCases() []testCase {
|
||||
@ -59,12 +60,25 @@ func createTestCases() []testCase {
|
||||
metricsData: []string{
|
||||
`# HELP xpum_topology_link Connection type fo two GPU tiles`,
|
||||
`# TYPE xpum_topology_link gauge`,
|
||||
`xpum_topology_link{dev_file="card1",dev_name="Intel(R) Graphics [0x0bdb]",pci_bdf="0000:51:00.0",pci_dev="0xbdb",src="direct",uuid="01000000-0000-0000-0000-000000510000",vendor="Intel(R) Corporation",local_cpu_affinity="0-23,48-71",local_device_id="0",local_numa_index="0",local_on_subdevice="false",local_subdevice_id="0",remote_device_id="0",remote_subdevice_id="0"} 1`,
|
||||
`xpum_topology_link{dev_file="card1",dev_name="Intel(R) Graphics [0x0bdb]",pci_bdf="0000:51:00.0",pci_dev="0xbdb",src="direct",uuid="01000000-0000-0000-0000-000000510000",vendor="Intel(R) Corporation",local_cpu_affinity="0-23,48-71",local_device_id="0",local_numa_index="0",local_on_subdevice="false",local_subdevice_id="0",remote_device_id="1",remote_subdevice_id="0"} 1`,
|
||||
`xpum_topology_link{dev_file="card1",dev_name="Intel(R) Graphics [0x0bdb]",pci_bdf="0000:51:00.0",pci_dev="0xbdb",src="direct",uuid="01000000-0000-0000-0000-000000510000",vendor="Intel(R) Corporation",local_cpu_affinity="0-23,48-71",local_device_id="0",local_numa_index="0",local_on_subdevice="false",local_subdevice_id="0",remote_device_id="1",remote_subdevice_id="0",lane_count="4"} 1`,
|
||||
`xpum_topology_link{dev_file="card1",dev_name="Intel(R) Graphics [0x0bdb]",pci_bdf="0000:51:00.0",pci_dev="0xbdb",src="direct",uuid="01000000-0000-0000-0000-000000510000",vendor="Intel(R) Corporation",local_cpu_affinity="0-23,48-71",local_device_id="0",local_numa_index="0",local_on_subdevice="false",local_subdevice_id="0",remote_device_id="1",remote_subdevice_id="1",lane_count="4"} 1`,
|
||||
"",
|
||||
},
|
||||
expectedLabels: []string{"xpumanager.intel.com/xe-links="},
|
||||
},
|
||||
{
|
||||
name: "Xelinks not on sub devices when it's allowed",
|
||||
minLaneCount: 4,
|
||||
metricsData: []string{
|
||||
`# HELP xpum_topology_link Connection type fo two GPU tiles`,
|
||||
`# TYPE xpum_topology_link gauge`,
|
||||
`xpum_topology_link{dev_file="card1",dev_name="Intel(R) Graphics [0x0bdb]",pci_bdf="0000:51:00.0",pci_dev="0xbdb",src="direct",uuid="01000000-0000-0000-0000-000000510000",vendor="Intel(R) Corporation",local_cpu_affinity="0-23,48-71",local_device_id="0",local_numa_index="0",local_on_subdevice="false",local_subdevice_id="0",remote_device_id="1",remote_subdevice_id="0",lane_count="4"} 1`,
|
||||
`xpum_topology_link{dev_file="card1",dev_name="Intel(R) Graphics [0x0bdb]",pci_bdf="0000:51:00.0",pci_dev="0xbdb",src="direct",uuid="01000000-0000-0000-0000-000000510000",vendor="Intel(R) Corporation",local_cpu_affinity="0-23,48-71",local_device_id="0",local_numa_index="0",local_on_subdevice="false",local_subdevice_id="0",remote_device_id="1",remote_subdevice_id="1",lane_count="4"} 1`,
|
||||
"",
|
||||
},
|
||||
expectedLabels: []string{"xpumanager.intel.com/xe-links=0.0-1.0_0.0-1.1"},
|
||||
allowSubdeviceless: true,
|
||||
},
|
||||
{
|
||||
name: "Xelinks without lan counts",
|
||||
minLaneCount: 4,
|
||||
@ -208,6 +222,9 @@ func TestLabeling(t *testing.T) {
|
||||
for _, tc := range tcs {
|
||||
print("Testcase (labeling): ", tc.name, "\n")
|
||||
xms := tc.createFakeXMS(tc.metricsData, tc.minLaneCount)
|
||||
|
||||
xms.allowSubdevicelessLinks = tc.allowSubdeviceless
|
||||
|
||||
topologyInfos := xms.GetTopologyFromXPUMMetrics([]byte(strings.Join(tc.metricsData, "\n")))
|
||||
|
||||
labels := xms.createLabels(topologyInfos)
|
||||
@ -224,6 +241,8 @@ func TestIterate(t *testing.T) {
|
||||
print("Testcase (iterate): ", tc.name, "\n")
|
||||
xms := tc.createFakeXMS(tc.metricsData, tc.minLaneCount)
|
||||
|
||||
xms.allowSubdevicelessLinks = tc.allowSubdeviceless
|
||||
|
||||
root, err := os.MkdirTemp("", "test_new_xms")
|
||||
if err != nil {
|
||||
t.Fatalf("can't create temporary directory: %+v", err)
|
||||
|
@ -6,7 +6,7 @@ spec:
|
||||
restartPolicy: Never
|
||||
containers:
|
||||
- name: dlb-libdlb-demo-pf-pod
|
||||
image: intel/dlb-libdlb-demo:0.27.0
|
||||
image: intel/dlb-libdlb-demo:0.27.1
|
||||
imagePullPolicy: IfNotPresent
|
||||
resources:
|
||||
limits:
|
||||
|
@ -6,7 +6,7 @@ spec:
|
||||
restartPolicy: Never
|
||||
containers:
|
||||
- name: pf
|
||||
image: intel/dlb-libdlb-demo:0.27.0
|
||||
image: intel/dlb-libdlb-demo:0.27.1
|
||||
imagePullPolicy: IfNotPresent
|
||||
resources:
|
||||
limits:
|
||||
@ -18,7 +18,7 @@ spec:
|
||||
cpu: 1
|
||||
memory: 200Mi
|
||||
- name: vf
|
||||
image: intel/dlb-libdlb-demo:0.27.0
|
||||
image: intel/dlb-libdlb-demo:0.27.1
|
||||
imagePullPolicy: IfNotPresent
|
||||
resources:
|
||||
limits:
|
||||
|
@ -6,7 +6,7 @@ spec:
|
||||
restartPolicy: Never
|
||||
containers:
|
||||
- name: dlb-libdlb-demo-vf-pod
|
||||
image: intel/dlb-libdlb-demo:0.27.0
|
||||
image: intel/dlb-libdlb-demo:0.27.1
|
||||
command: [ "sh", "-c", "/usr/local/bin/dir_traffic -n 8 -w epoll -d $(ls /dev/dlb* | sed 's/\\/dev\\/dlb//')" ]
|
||||
imagePullPolicy: IfNotPresent
|
||||
resources:
|
||||
|
@ -7,7 +7,7 @@ metadata:
|
||||
spec:
|
||||
containers:
|
||||
- name: dsa-accel-config-demo
|
||||
image: intel/accel-config-demo:0.27.0
|
||||
image: intel/accel-config-demo:0.27.1
|
||||
imagePullPolicy: IfNotPresent
|
||||
resources:
|
||||
limits:
|
||||
|
@ -7,7 +7,7 @@ metadata:
|
||||
spec:
|
||||
containers:
|
||||
- name: iaa-accel-config-demo
|
||||
image: intel/accel-config-demo:0.27.0
|
||||
image: intel/accel-config-demo:0.27.1
|
||||
command: [ "/bin/bash", "-c", "cd /test && /bin/bash -e ./iaa_user_test_runner.sh" ]
|
||||
imagePullPolicy: IfNotPresent
|
||||
resources:
|
||||
|
@ -13,7 +13,7 @@ spec:
|
||||
restartPolicy: Never
|
||||
containers:
|
||||
- name: intelfpga-demo-job-1
|
||||
image: intel/opae-nlb-demo:0.27.0
|
||||
image: intel/opae-nlb-demo:0.27.1
|
||||
imagePullPolicy: IfNotPresent
|
||||
securityContext:
|
||||
capabilities:
|
||||
|
@ -5,7 +5,7 @@ metadata:
|
||||
spec:
|
||||
containers:
|
||||
- name: test-container
|
||||
image: intel/opae-nlb-demo:0.27.0
|
||||
image: intel/opae-nlb-demo:0.27.1
|
||||
imagePullPolicy: IfNotPresent
|
||||
securityContext:
|
||||
capabilities:
|
||||
|
@ -5,7 +5,7 @@ metadata:
|
||||
spec:
|
||||
containers:
|
||||
- name: test-container
|
||||
image: intel/opae-nlb-demo:0.27.0
|
||||
image: intel/opae-nlb-demo:0.27.1
|
||||
imagePullPolicy: IfNotPresent
|
||||
securityContext:
|
||||
capabilities:
|
||||
|
@ -21,7 +21,7 @@ spec:
|
||||
valueFrom:
|
||||
fieldRef:
|
||||
fieldPath: spec.nodeName
|
||||
image: intel/intel-dlb-plugin:0.27.0
|
||||
image: intel/intel-dlb-plugin:0.27.1
|
||||
imagePullPolicy: IfNotPresent
|
||||
securityContext:
|
||||
readOnlyRootFilesystem: true
|
||||
|
@ -7,7 +7,7 @@ spec:
|
||||
spec:
|
||||
initContainers:
|
||||
- name: intel-dlb-initcontainer
|
||||
image: intel/intel-dlb-initcontainer:0.27.0
|
||||
image: intel/intel-dlb-initcontainer:0.27.1
|
||||
securityContext:
|
||||
readOnlyRootFilesystem: true
|
||||
privileged: true
|
||||
|
@ -21,7 +21,7 @@ spec:
|
||||
valueFrom:
|
||||
fieldRef:
|
||||
fieldPath: spec.nodeName
|
||||
image: intel/intel-dsa-plugin:0.27.0
|
||||
image: intel/intel-dsa-plugin:0.27.1
|
||||
imagePullPolicy: IfNotPresent
|
||||
securityContext:
|
||||
readOnlyRootFilesystem: true
|
||||
|
@ -12,7 +12,7 @@ spec:
|
||||
valueFrom:
|
||||
fieldRef:
|
||||
fieldPath: spec.nodeName
|
||||
image: intel/intel-idxd-config-initcontainer:0.27.0
|
||||
image: intel/intel-idxd-config-initcontainer:0.27.1
|
||||
securityContext:
|
||||
readOnlyRootFilesystem: true
|
||||
privileged: true
|
||||
|
@ -16,7 +16,7 @@ spec:
|
||||
control-plane: controller-manager
|
||||
spec:
|
||||
containers:
|
||||
- image: intel/intel-fpga-admissionwebhook:0.27.0
|
||||
- image: intel/intel-fpga-admissionwebhook:0.27.1
|
||||
imagePullPolicy: IfNotPresent
|
||||
name: manager
|
||||
securityContext:
|
||||
|
@ -16,7 +16,7 @@ spec:
|
||||
spec:
|
||||
initContainers:
|
||||
- name: intel-fpga-initcontainer
|
||||
image: intel/intel-fpga-initcontainer:0.27.0
|
||||
image: intel/intel-fpga-initcontainer:0.27.1
|
||||
imagePullPolicy: IfNotPresent
|
||||
securityContext:
|
||||
readOnlyRootFilesystem: true
|
||||
@ -33,7 +33,7 @@ spec:
|
||||
valueFrom:
|
||||
fieldRef:
|
||||
fieldPath: spec.nodeName
|
||||
image: intel/intel-fpga-plugin:0.27.0
|
||||
image: intel/intel-fpga-plugin:0.27.1
|
||||
imagePullPolicy: IfNotPresent
|
||||
args:
|
||||
- -mode=af
|
||||
|
@ -15,7 +15,7 @@ spec:
|
||||
spec:
|
||||
initContainers:
|
||||
- name: intel-gpu-initcontainer
|
||||
image: intel/intel-gpu-initcontainer:0.27.0
|
||||
image: intel/intel-gpu-initcontainer:0.27.1
|
||||
imagePullPolicy: IfNotPresent
|
||||
securityContext:
|
||||
seLinuxOptions:
|
||||
@ -36,7 +36,7 @@ spec:
|
||||
valueFrom:
|
||||
fieldRef:
|
||||
fieldPath: status.hostIP
|
||||
image: intel/intel-gpu-plugin:0.27.0
|
||||
image: intel/intel-gpu-plugin:0.27.1
|
||||
imagePullPolicy: IfNotPresent
|
||||
securityContext:
|
||||
seLinuxOptions:
|
||||
|
@ -21,7 +21,7 @@ spec:
|
||||
valueFrom:
|
||||
fieldRef:
|
||||
fieldPath: spec.nodeName
|
||||
image: intel/intel-iaa-plugin:0.27.0
|
||||
image: intel/intel-iaa-plugin:0.27.1
|
||||
imagePullPolicy: IfNotPresent
|
||||
securityContext:
|
||||
readOnlyRootFilesystem: true
|
||||
|
@ -14,7 +14,7 @@ spec:
|
||||
fieldPath: spec.nodeName
|
||||
- name: DEVICE_TYPE
|
||||
value: "iaa"
|
||||
image: intel/intel-idxd-config-initcontainer:0.27.0
|
||||
image: intel/intel-idxd-config-initcontainer:0.27.1
|
||||
securityContext:
|
||||
readOnlyRootFilesystem: true
|
||||
privileged: true
|
||||
|
@ -23,7 +23,7 @@ spec:
|
||||
control-plane: controller-manager
|
||||
spec:
|
||||
containers:
|
||||
- image: docker.io/intel/intel-deviceplugin-operator:0.27.0
|
||||
- image: docker.io/intel/intel-deviceplugin-operator:0.27.1
|
||||
imagePullPolicy: IfNotPresent
|
||||
name: manager
|
||||
livenessProbe:
|
||||
|
@ -5,7 +5,7 @@ metadata:
|
||||
alm-examples: '[]'
|
||||
capabilities: Seamless Upgrades
|
||||
categories: Drivers and plugins
|
||||
containerImage: docker.io/intel/intel-deviceplugin-operator:0.27.0
|
||||
containerImage: docker.io/intel/intel-deviceplugin-operator:0.27.1
|
||||
createdAt: "2022-11-09"
|
||||
description: This operator is a Kubernetes custom controller whose goal is to
|
||||
serve the installation and lifecycle management of Intel device plugins for
|
||||
|
@ -9,8 +9,8 @@ metadata:
|
||||
# annotations:
|
||||
# container.apparmor.security.beta.kubernetes.io/intel-dlb-plugin: unconfined
|
||||
spec:
|
||||
image: intel/intel-dlb-plugin:0.27.0
|
||||
initImage: intel/intel-dlb-initcontainer:0.27.0
|
||||
image: intel/intel-dlb-plugin:0.27.1
|
||||
initImage: intel/intel-dlb-initcontainer:0.27.1
|
||||
logLevel: 4
|
||||
nodeSelector:
|
||||
intel.feature.node.kubernetes.io/dlb: 'true'
|
||||
|
@ -3,8 +3,8 @@ kind: DsaDevicePlugin
|
||||
metadata:
|
||||
name: dsadeviceplugin-sample
|
||||
spec:
|
||||
image: intel/intel-dsa-plugin:0.27.0
|
||||
initImage: intel/intel-idxd-config-initcontainer:0.27.0
|
||||
image: intel/intel-dsa-plugin:0.27.1
|
||||
initImage: intel/intel-idxd-config-initcontainer:0.27.1
|
||||
sharedDevNum: 10
|
||||
logLevel: 4
|
||||
nodeSelector:
|
||||
|
@ -3,8 +3,8 @@ kind: FpgaDevicePlugin
|
||||
metadata:
|
||||
name: fpgadeviceplugin-sample
|
||||
spec:
|
||||
image: intel/intel-fpga-plugin:0.27.0
|
||||
initImage: intel/intel-fpga-initcontainer:0.27.0
|
||||
image: intel/intel-fpga-plugin:0.27.1
|
||||
initImage: intel/intel-fpga-initcontainer:0.27.1
|
||||
mode: region
|
||||
logLevel: 4
|
||||
nodeSelector:
|
||||
|
@ -3,8 +3,8 @@ kind: GpuDevicePlugin
|
||||
metadata:
|
||||
name: gpudeviceplugin-sample
|
||||
spec:
|
||||
image: intel/intel-gpu-plugin:0.27.0
|
||||
initImage: intel/intel-gpu-initcontainer:0.27.0
|
||||
image: intel/intel-gpu-plugin:0.27.1
|
||||
initImage: intel/intel-gpu-initcontainer:0.27.1
|
||||
sharedDevNum: 10
|
||||
logLevel: 4
|
||||
nodeSelector:
|
||||
|
@ -3,8 +3,8 @@ kind: IaaDevicePlugin
|
||||
metadata:
|
||||
name: iaadeviceplugin-sample
|
||||
spec:
|
||||
image: intel/intel-iaa-plugin:0.27.0
|
||||
initImage: intel/intel-idxd-config-initcontainer:0.27.0
|
||||
image: intel/intel-iaa-plugin:0.27.1
|
||||
initImage: intel/intel-idxd-config-initcontainer:0.27.1
|
||||
sharedDevNum: 10
|
||||
logLevel: 4
|
||||
nodeSelector:
|
||||
|
@ -9,8 +9,8 @@ metadata:
|
||||
# annotations:
|
||||
# container.apparmor.security.beta.kubernetes.io/intel-qat-plugin: unconfined
|
||||
spec:
|
||||
image: intel/intel-qat-plugin:0.27.0
|
||||
initImage: intel/intel-qat-initcontainer:0.27.0
|
||||
image: intel/intel-qat-plugin:0.27.1
|
||||
initImage: intel/intel-qat-initcontainer:0.27.1
|
||||
dpdkDriver: vfio-pci
|
||||
kernelVfDrivers:
|
||||
- c6xxvf
|
||||
|
@ -3,7 +3,7 @@ kind: SgxDevicePlugin
|
||||
metadata:
|
||||
name: sgxdeviceplugin-sample
|
||||
spec:
|
||||
image: intel/intel-sgx-plugin:0.27.0
|
||||
image: intel/intel-sgx-plugin:0.27.1
|
||||
enclaveLimit: 110
|
||||
provisionLimit: 110
|
||||
logLevel: 4
|
||||
|
@ -5,7 +5,7 @@ metadata:
|
||||
spec:
|
||||
containers:
|
||||
- name: crypto-perf
|
||||
image: intel/crypto-perf:0.27.0
|
||||
image: intel/crypto-perf:0.27.1
|
||||
imagePullPolicy: IfNotPresent
|
||||
command: [ "/bin/bash", "-c", "--" ]
|
||||
args: [ "while true; do sleep 300000; done;" ]
|
||||
|
@ -19,7 +19,7 @@ spec:
|
||||
readOnlyRootFilesystem: true
|
||||
allowPrivilegeEscalation: false
|
||||
privileged: true
|
||||
image: intel/intel-qat-plugin:0.27.0
|
||||
image: intel/intel-qat-plugin:0.27.1
|
||||
imagePullPolicy: IfNotPresent
|
||||
args: ["-mode", "kernel"]
|
||||
volumeMounts:
|
||||
|
@ -21,7 +21,7 @@ spec:
|
||||
valueFrom:
|
||||
fieldRef:
|
||||
fieldPath: spec.nodeName
|
||||
image: intel/intel-qat-plugin:0.27.0
|
||||
image: intel/intel-qat-plugin:0.27.1
|
||||
securityContext:
|
||||
seLinuxOptions:
|
||||
type: "container_device_plugin_t"
|
||||
|
@ -12,7 +12,7 @@ spec:
|
||||
valueFrom:
|
||||
fieldRef:
|
||||
fieldPath: spec.nodeName
|
||||
image: intel/intel-qat-initcontainer:0.27.0
|
||||
image: intel/intel-qat-initcontainer:0.27.1
|
||||
securityContext:
|
||||
readOnlyRootFilesystem: true
|
||||
privileged: true
|
||||
|
@ -16,7 +16,7 @@ spec:
|
||||
control-plane: controller-manager
|
||||
spec:
|
||||
containers:
|
||||
- image: intel/intel-sgx-admissionwebhook:0.27.0
|
||||
- image: intel/intel-sgx-admissionwebhook:0.27.1
|
||||
imagePullPolicy: IfNotPresent
|
||||
name: manager
|
||||
securityContext:
|
||||
|
@ -16,7 +16,7 @@ spec:
|
||||
automountServiceAccountToken: false
|
||||
containers:
|
||||
- name: intel-sgx-plugin
|
||||
image: intel/intel-sgx-plugin:0.27.0
|
||||
image: intel/intel-sgx-plugin:0.27.1
|
||||
securityContext:
|
||||
seLinuxOptions:
|
||||
type: "container_device_plugin_t"
|
||||
|
@ -7,7 +7,7 @@ spec:
|
||||
spec:
|
||||
initContainers:
|
||||
- name: intel-sgx-initcontainer
|
||||
image: intel/intel-sgx-initcontainer:0.27.0
|
||||
image: intel/intel-sgx-initcontainer:0.27.1
|
||||
imagePullPolicy: IfNotPresent
|
||||
securityContext:
|
||||
readOnlyRootFilesystem: true
|
||||
|
@ -16,7 +16,7 @@ spec:
|
||||
serviceAccountName: sgx-plugin
|
||||
containers:
|
||||
- name: sgx-node-init
|
||||
image: intel/intel-sgx-initcontainer:0.27.0
|
||||
image: intel/intel-sgx-initcontainer:0.27.1
|
||||
imagePullPolicy: IfNotPresent
|
||||
command:
|
||||
- /usr/local/bin/sgx-sw/intel-sgx-epchook
|
||||
|
@ -21,7 +21,7 @@ spec:
|
||||
valueFrom:
|
||||
fieldRef:
|
||||
fieldPath: spec.nodeName
|
||||
image: intel/intel-vpu-plugin:0.27.0
|
||||
image: intel/intel-vpu-plugin:0.27.1
|
||||
imagePullPolicy: IfNotPresent
|
||||
securityContext:
|
||||
readOnlyRootFilesystem: true
|
||||
|
@ -13,7 +13,7 @@ spec:
|
||||
path: "/etc/kubernetes/node-feature-discovery/features.d/"
|
||||
containers:
|
||||
- name: xelink-sidecar
|
||||
image: intel/intel-xpumanager-sidecar:0.27.0
|
||||
image: intel/intel-xpumanager-sidecar:0.27.1
|
||||
imagePullPolicy: Always
|
||||
args:
|
||||
- -v=2
|
||||
|
78
go.mod
78
go.mod
@ -17,13 +17,13 @@ require (
|
||||
golang.org/x/sys v0.8.0
|
||||
golang.org/x/text v0.9.0
|
||||
google.golang.org/grpc v1.55.0
|
||||
k8s.io/api v0.27.2
|
||||
k8s.io/apimachinery v0.27.2
|
||||
k8s.io/client-go v0.27.2
|
||||
k8s.io/component-base v0.27.2
|
||||
k8s.io/api v0.27.3
|
||||
k8s.io/apimachinery v0.27.3
|
||||
k8s.io/client-go v0.27.3
|
||||
k8s.io/component-base v0.27.3
|
||||
k8s.io/klog/v2 v2.90.1
|
||||
k8s.io/kubelet v1.27.2
|
||||
k8s.io/kubernetes v1.27.2
|
||||
k8s.io/kubelet v1.27.3
|
||||
k8s.io/kubernetes v1.27.3
|
||||
k8s.io/pod-security-admission v0.0.0
|
||||
k8s.io/utils v0.0.0-20230209194617-a36077c30491
|
||||
sigs.k8s.io/controller-runtime v0.15.0
|
||||
@ -111,11 +111,11 @@ require (
|
||||
gopkg.in/yaml.v2 v2.4.0 // indirect
|
||||
gopkg.in/yaml.v3 v3.0.1 // indirect
|
||||
k8s.io/apiextensions-apiserver v0.27.2 // indirect
|
||||
k8s.io/apiserver v0.27.2 // indirect
|
||||
k8s.io/apiserver v0.27.3 // indirect
|
||||
k8s.io/cloud-provider v0.0.0 // indirect
|
||||
k8s.io/component-helpers v0.27.2 // indirect
|
||||
k8s.io/controller-manager v0.27.2 // indirect
|
||||
k8s.io/kms v0.27.2 // indirect
|
||||
k8s.io/component-helpers v0.27.3 // indirect
|
||||
k8s.io/controller-manager v0.27.3 // indirect
|
||||
k8s.io/kms v0.27.3 // indirect
|
||||
k8s.io/kube-openapi v0.0.0-20230501164219-8b0f38b5fd1f // indirect
|
||||
k8s.io/kubectl v0.0.0 // indirect
|
||||
sigs.k8s.io/apiserver-network-proxy/konnectivity-client v0.1.2 // indirect
|
||||
@ -124,33 +124,33 @@ require (
|
||||
)
|
||||
|
||||
replace (
|
||||
k8s.io/api => k8s.io/api v0.27.2
|
||||
k8s.io/apiextensions-apiserver => k8s.io/apiextensions-apiserver v0.27.2
|
||||
k8s.io/apimachinery => k8s.io/apimachinery v0.27.2
|
||||
k8s.io/apiserver => k8s.io/apiserver v0.27.2
|
||||
k8s.io/cli-runtime => k8s.io/cli-runtime v0.27.2
|
||||
k8s.io/client-go => k8s.io/client-go v0.27.2
|
||||
k8s.io/cloud-provider => k8s.io/cloud-provider v0.27.2
|
||||
k8s.io/cluster-bootstrap => k8s.io/cluster-bootstrap v0.27.2
|
||||
k8s.io/code-generator => k8s.io/code-generator v0.27.2
|
||||
k8s.io/component-base => k8s.io/component-base v0.27.2
|
||||
k8s.io/component-helpers => k8s.io/component-helpers v0.27.2
|
||||
k8s.io/controller-manager => k8s.io/controller-manager v0.27.2
|
||||
k8s.io/cri-api => k8s.io/cri-api v0.28.0-alpha.0
|
||||
k8s.io/csi-translation-lib => k8s.io/csi-translation-lib v0.27.2
|
||||
k8s.io/dynamic-resource-allocation => k8s.io/dynamic-resource-allocation v0.27.2
|
||||
k8s.io/kms => k8s.io/kms v0.27.2
|
||||
k8s.io/kube-aggregator => k8s.io/kube-aggregator v0.27.2
|
||||
k8s.io/kube-controller-manager => k8s.io/kube-controller-manager v0.27.2
|
||||
k8s.io/kube-proxy => k8s.io/kube-proxy v0.27.2
|
||||
k8s.io/kube-scheduler => k8s.io/kube-scheduler v0.27.2
|
||||
k8s.io/kubectl => k8s.io/kubectl v0.27.2
|
||||
k8s.io/kubelet => k8s.io/kubelet v0.27.2
|
||||
k8s.io/legacy-cloud-providers => k8s.io/legacy-cloud-providers v0.27.2
|
||||
k8s.io/metrics => k8s.io/metrics v0.27.2
|
||||
k8s.io/mount-utils => k8s.io/mount-utils v0.27.2
|
||||
k8s.io/pod-security-admission => k8s.io/pod-security-admission v0.27.2
|
||||
k8s.io/sample-apiserver => k8s.io/sample-apiserver v0.27.2
|
||||
k8s.io/sample-cli-plugin => k8s.io/sample-cli-plugin v0.27.2
|
||||
k8s.io/sample-controller => k8s.io/sample-controller v0.27.2
|
||||
k8s.io/api => k8s.io/api v0.27.3
|
||||
k8s.io/apiextensions-apiserver => k8s.io/apiextensions-apiserver v0.27.3
|
||||
k8s.io/apimachinery => k8s.io/apimachinery v0.27.3
|
||||
k8s.io/apiserver => k8s.io/apiserver v0.27.3
|
||||
k8s.io/cli-runtime => k8s.io/cli-runtime v0.27.3
|
||||
k8s.io/client-go => k8s.io/client-go v0.27.3
|
||||
k8s.io/cloud-provider => k8s.io/cloud-provider v0.27.3
|
||||
k8s.io/cluster-bootstrap => k8s.io/cluster-bootstrap v0.27.3
|
||||
k8s.io/code-generator => k8s.io/code-generator v0.27.3
|
||||
k8s.io/component-base => k8s.io/component-base v0.27.3
|
||||
k8s.io/component-helpers => k8s.io/component-helpers v0.27.3
|
||||
k8s.io/controller-manager => k8s.io/controller-manager v0.27.3
|
||||
k8s.io/cri-api => k8s.io/cri-api v0.27.3
|
||||
k8s.io/csi-translation-lib => k8s.io/csi-translation-lib v0.27.3
|
||||
k8s.io/dynamic-resource-allocation => k8s.io/dynamic-resource-allocation v0.27.3
|
||||
k8s.io/kms => k8s.io/kms v0.27.3
|
||||
k8s.io/kube-aggregator => k8s.io/kube-aggregator v0.27.3
|
||||
k8s.io/kube-controller-manager => k8s.io/kube-controller-manager v0.27.3
|
||||
k8s.io/kube-proxy => k8s.io/kube-proxy v0.27.3
|
||||
k8s.io/kube-scheduler => k8s.io/kube-scheduler v0.27.3
|
||||
k8s.io/kubectl => k8s.io/kubectl v0.27.3
|
||||
k8s.io/kubelet => k8s.io/kubelet v0.27.3
|
||||
k8s.io/legacy-cloud-providers => k8s.io/legacy-cloud-providers v0.27.3
|
||||
k8s.io/metrics => k8s.io/metrics v0.27.3
|
||||
k8s.io/mount-utils => k8s.io/mount-utils v0.27.3
|
||||
k8s.io/pod-security-admission => k8s.io/pod-security-admission v0.27.3
|
||||
k8s.io/sample-apiserver => k8s.io/sample-apiserver v0.27.3
|
||||
k8s.io/sample-cli-plugin => k8s.io/sample-cli-plugin v0.27.3
|
||||
k8s.io/sample-controller => k8s.io/sample-controller v0.27.3
|
||||
)
|
||||
|
56
go.sum
56
go.sum
@ -655,38 +655,38 @@ honnef.co/go/tools v0.0.0-20190523083050-ea95bdfd59fc/go.mod h1:rf3lG4BRIbNafJWh
|
||||
honnef.co/go/tools v0.0.1-2019.2.3/go.mod h1:a3bituU0lyd329TUQxRnasdCoJDkEUEAqEt0JzvZhAg=
|
||||
honnef.co/go/tools v0.0.1-2020.1.3/go.mod h1:X/FiERA/W4tHapMX5mGpAtMSVEeEUOyHaw9vFzvIQ3k=
|
||||
honnef.co/go/tools v0.0.1-2020.1.4/go.mod h1:X/FiERA/W4tHapMX5mGpAtMSVEeEUOyHaw9vFzvIQ3k=
|
||||
k8s.io/api v0.27.2 h1:+H17AJpUMvl+clT+BPnKf0E3ksMAzoBBg7CntpSuADo=
|
||||
k8s.io/api v0.27.2/go.mod h1:ENmbocXfBT2ADujUXcBhHV55RIT31IIEvkntP6vZKS4=
|
||||
k8s.io/apiextensions-apiserver v0.27.2 h1:iwhyoeS4xj9Y7v8YExhUwbVuBhMr3Q4bd/laClBV6Bo=
|
||||
k8s.io/apiextensions-apiserver v0.27.2/go.mod h1:Oz9UdvGguL3ULgRdY9QMUzL2RZImotgxvGjdWRq6ZXQ=
|
||||
k8s.io/apimachinery v0.27.2 h1:vBjGaKKieaIreI+oQwELalVG4d8f3YAMNpWLzDXkxeg=
|
||||
k8s.io/apimachinery v0.27.2/go.mod h1:XNfZ6xklnMCOGGFNqXG7bUrQCoR04dh/E7FprV6pb+E=
|
||||
k8s.io/apiserver v0.27.2 h1:p+tjwrcQEZDrEorCZV2/qE8osGTINPuS5ZNqWAvKm5E=
|
||||
k8s.io/apiserver v0.27.2/go.mod h1:EsOf39d75rMivgvvwjJ3OW/u9n1/BmUMK5otEOJrb1Y=
|
||||
k8s.io/client-go v0.27.2 h1:vDLSeuYvCHKeoQRhCXjxXO45nHVv2Ip4Fe0MfioMrhE=
|
||||
k8s.io/client-go v0.27.2/go.mod h1:tY0gVmUsHrAmjzHX9zs7eCjxcBsf8IiNe7KQ52biTcQ=
|
||||
k8s.io/cloud-provider v0.27.2 h1:IiQWyFtdzcPOqvrBZE9FCt0CDCx3GUcZhKkykEgKlM4=
|
||||
k8s.io/cloud-provider v0.27.2/go.mod h1:QnFa2fPMEWntkpU+kOAC9MZ6DKUB9WTQmMGA0MuYoj0=
|
||||
k8s.io/component-base v0.27.2 h1:neju+7s/r5O4x4/txeUONNTS9r1HsPbyoPBAtHsDCpo=
|
||||
k8s.io/component-base v0.27.2/go.mod h1:5UPk7EjfgrfgRIuDBFtsEFAe4DAvP3U+M8RTzoSJkpo=
|
||||
k8s.io/component-helpers v0.27.2 h1:i9TgWJ6TH8lQ9x4ExHOwhVitrRpBOr7Wn8aZLbBWxkc=
|
||||
k8s.io/component-helpers v0.27.2/go.mod h1:NwcpSKo1xzXtUtrUjj5NTSVWex84UPua/z0PYDcCzNo=
|
||||
k8s.io/controller-manager v0.27.2 h1:S7984FVb5ajp8YqMQGAm8zXEUEl0Omw6FJlOiQU2Ne8=
|
||||
k8s.io/controller-manager v0.27.2/go.mod h1:2HzIhmjKxSH5dJVjYLuJ7/v9HYluNDcHLh6ZyE6rT18=
|
||||
k8s.io/api v0.27.3 h1:yR6oQXXnUEBWEWcvPWS0jQL575KoAboQPfJAuKNrw5Y=
|
||||
k8s.io/api v0.27.3/go.mod h1:C4BNvZnQOF7JA/0Xed2S+aUyJSfTGkGFxLXz9MnpIpg=
|
||||
k8s.io/apiextensions-apiserver v0.27.3 h1:xAwC1iYabi+TDfpRhxh4Eapl14Hs2OftM2DN5MpgKX4=
|
||||
k8s.io/apiextensions-apiserver v0.27.3/go.mod h1:BH3wJ5NsB9XE1w+R6SSVpKmYNyIiyIz9xAmBl8Mb+84=
|
||||
k8s.io/apimachinery v0.27.3 h1:Ubye8oBufD04l9QnNtW05idcOe9Z3GQN8+7PqmuVcUM=
|
||||
k8s.io/apimachinery v0.27.3/go.mod h1:XNfZ6xklnMCOGGFNqXG7bUrQCoR04dh/E7FprV6pb+E=
|
||||
k8s.io/apiserver v0.27.3 h1:AxLvq9JYtveYWK+D/Dz/uoPCfz8JC9asR5z7+I/bbQ4=
|
||||
k8s.io/apiserver v0.27.3/go.mod h1:Y61+EaBMVWUBJtxD5//cZ48cHZbQD+yIyV/4iEBhhNA=
|
||||
k8s.io/client-go v0.27.3 h1:7dnEGHZEJld3lYwxvLl7WoehK6lAq7GvgjxpA3nv1E8=
|
||||
k8s.io/client-go v0.27.3/go.mod h1:2MBEKuTo6V1lbKy3z1euEGnhPfGZLKTS9tiJ2xodM48=
|
||||
k8s.io/cloud-provider v0.27.3 h1:YylqJpKCB3O2MRnNXshxSVOQTOZE4I0G+cnyOfLwkGA=
|
||||
k8s.io/cloud-provider v0.27.3/go.mod h1:+C4rgsL3O0pxXdjoxRDOjCzNTj4C6jYUmK2OyogK1Jw=
|
||||
k8s.io/component-base v0.27.3 h1:g078YmdcdTfrCE4fFobt7qmVXwS8J/3cI1XxRi/2+6k=
|
||||
k8s.io/component-base v0.27.3/go.mod h1:JNiKYcGImpQ44iwSYs6dysxzR9SxIIgQalk4HaCNVUY=
|
||||
k8s.io/component-helpers v0.27.3 h1:oK7+AlwBKsSUIIRC5Vv8/4HEtmgzXNQD+zLbsOUwVso=
|
||||
k8s.io/component-helpers v0.27.3/go.mod h1:uxhXqoWHh4eBVcPj+LKWjtQq0V/vP5ihn4xmf5xNZso=
|
||||
k8s.io/controller-manager v0.27.3 h1:tw1zoCi8ylYXoyImThlPkmdo9wQDtyhAojrjWdfBv/E=
|
||||
k8s.io/controller-manager v0.27.3/go.mod h1:dH5WQMqZOTHZdY8sTQRv1RkZRibaaDx7sncvejUUICc=
|
||||
k8s.io/klog/v2 v2.90.1 h1:m4bYOKall2MmOiRaR1J+We67Do7vm9KiQVlT96lnHUw=
|
||||
k8s.io/klog/v2 v2.90.1/go.mod h1:y1WjHnz7Dj687irZUWR/WLkLc5N1YHtjLdmgWjndZn0=
|
||||
k8s.io/kms v0.27.2 h1:wCdmPCa3kubcVd3AssOeaVjLQSu45k5g/vruJ3iqwDU=
|
||||
k8s.io/kms v0.27.2/go.mod h1:dahSqjI05J55Fo5qipzvHSRbm20d7llrSeQjjl86A7c=
|
||||
k8s.io/kms v0.27.3 h1:O6mZqi647ZLmxxkEv5Q9jMlmcXOh42CBD+A3MxI6zaQ=
|
||||
k8s.io/kms v0.27.3/go.mod h1:VDfnSIK0dk5J+jasbe+kKpb3CQVwlcDeBLyq59P2KyY=
|
||||
k8s.io/kube-openapi v0.0.0-20230501164219-8b0f38b5fd1f h1:2kWPakN3i/k81b0gvD5C5FJ2kxm1WrQFanWchyKuqGg=
|
||||
k8s.io/kube-openapi v0.0.0-20230501164219-8b0f38b5fd1f/go.mod h1:byini6yhqGC14c3ebc/QwanvYwhuMWF6yz2F8uwW8eg=
|
||||
k8s.io/kubectl v0.27.2 h1:sSBM2j94MHBFRWfHIWtEXWCicViQzZsb177rNsKBhZg=
|
||||
k8s.io/kubectl v0.27.2/go.mod h1:GCOODtxPcrjh+EC611MqREkU8RjYBh10ldQCQ6zpFKw=
|
||||
k8s.io/kubelet v0.27.2 h1:vpJnBkqQjxItEhehKG0toXoZ+G+tf4UXAOqtMJy6qgc=
|
||||
k8s.io/kubelet v0.27.2/go.mod h1:1SVrHaLnuw53nQJx8036k9HjE0teDXZtbN51cYC0HSc=
|
||||
k8s.io/kubernetes v1.27.2 h1:g4v9oY6u7vBUDEuq4FvC50Bbw2K7GZuvM00IIESWVf4=
|
||||
k8s.io/kubernetes v1.27.2/go.mod h1:U8ZXeKBAPxeb4J4/HOaxjw1A9K6WfSH+fY2SS7CR6IM=
|
||||
k8s.io/pod-security-admission v0.27.2 h1:dSGK0ftJwJNHSp5fMAwVuFIMMY1MlzW4k82mjar6G8I=
|
||||
k8s.io/pod-security-admission v0.27.2/go.mod h1:jWVYAoR3AwJxwJ6tTQSVBZBBe4u0tvmFhyhpAWcOlYY=
|
||||
k8s.io/kubectl v0.27.3 h1:HyC4o+8rCYheGDWrkcOQHGwDmyLKR5bxXFgpvF82BOw=
|
||||
k8s.io/kubectl v0.27.3/go.mod h1:g9OQNCC2zxT+LT3FS09ZYqnDhlvsKAfFq76oyarBcq4=
|
||||
k8s.io/kubelet v0.27.3 h1:5WhTV1iiBu9q/rr+gvy65LQ+K/e7dmgcaYjys5ipLqY=
|
||||
k8s.io/kubelet v0.27.3/go.mod h1:Mz42qgZZgWgPmOJEYaR5evmh+EoSwFzEvPBozA2y9mg=
|
||||
k8s.io/kubernetes v1.27.3 h1:gwufSj7y6X18Q2Gl8v4Ev+AJHdzWkG7A8VNFffS9vu0=
|
||||
k8s.io/kubernetes v1.27.3/go.mod h1:U8ZXeKBAPxeb4J4/HOaxjw1A9K6WfSH+fY2SS7CR6IM=
|
||||
k8s.io/pod-security-admission v0.27.3 h1:4iAjMK09XkCj2DMa1tqUoOQZD2gGnkhKApQGPAyq9gs=
|
||||
k8s.io/pod-security-admission v0.27.3/go.mod h1:IoCHgLURPt8wJyqsJ7H3+xvY23ps/c61/cTnq6pSOi0=
|
||||
k8s.io/utils v0.0.0-20230209194617-a36077c30491 h1:r0BAOLElQnnFhE/ApUsg3iHdVYYPBjNSSOMowRZxxsY=
|
||||
k8s.io/utils v0.0.0-20230209194617-a36077c30491/go.mod h1:OLgZIPagt7ERELqWJFomSt595RzquPNLL48iOWgYOg0=
|
||||
rsc.io/binaryregexp v0.2.0/go.mod h1:qTv7/COck+e2FymRvadv62gMdZztPaShugOCi3I+8D8=
|
||||
|
@ -181,7 +181,7 @@ func TestNewDaemonSetFPGA(t *testing.T) {
|
||||
|
||||
plugin := &devicepluginv1.FpgaDevicePlugin{
|
||||
Spec: devicepluginv1.FpgaDevicePluginSpec{
|
||||
InitImage: "intel/intel-fpga-initcontainer:0.27.0",
|
||||
InitImage: "intel/intel-fpga-initcontainer:0.27.1",
|
||||
},
|
||||
}
|
||||
|
||||
|
@ -199,7 +199,7 @@ func TestNewDamonSetGPU(t *testing.T) {
|
||||
}
|
||||
|
||||
if tc.isInitImage {
|
||||
plugin.Spec.InitImage = "intel/intel-gpu-initcontainer:0.27.0"
|
||||
plugin.Spec.InitImage = "intel/intel-gpu-initcontainer:0.27.1"
|
||||
}
|
||||
|
||||
t.Run(tc.name, func(t *testing.T) {
|
||||
|
@ -37,7 +37,7 @@ import (
|
||||
|
||||
var (
|
||||
bKeeper = &bookKeeper{}
|
||||
ImageMinVersion = versionutil.MustParseSemantic("0.27.0")
|
||||
ImageMinVersion = versionutil.MustParseSemantic("0.27.1")
|
||||
)
|
||||
|
||||
func init() {
|
||||
|
@ -102,7 +102,7 @@ func runTestCase(ctx context.Context, fmw *framework.Framework, pluginKustomizat
|
||||
}
|
||||
|
||||
resource = v1.ResourceName(podResource)
|
||||
image := "intel/opae-nlb-demo:0.27.0"
|
||||
image := "intel/opae-nlb-demo:0.27.1"
|
||||
|
||||
ginkgo.By("submitting a pod requesting correct FPGA resources")
|
||||
|
||||
|
@ -190,7 +190,7 @@ func runCpaSampleCode(ctx context.Context, f *framework.Framework, runTests int,
|
||||
Containers: []v1.Container{
|
||||
{
|
||||
Name: "openssl-qat-engine",
|
||||
Image: "intel/openssl-qat-engine:0.27.0",
|
||||
Image: "intel/openssl-qat-engine:0.27.1",
|
||||
ImagePullPolicy: "IfNotPresent",
|
||||
Command: []string{"cpa_sample_code", "runTests=" + strconv.Itoa(runTests), "signOfLife=1"},
|
||||
SecurityContext: &v1.SecurityContext{
|
||||
|
Loading…
Reference in New Issue
Block a user