-
Notifications
You must be signed in to change notification settings - Fork 34
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Update host-ctr Go dependencies #337
Conversation
81476a8
to
8b5b098
Compare
go 1.22.0 | ||
go 1.23.0 | ||
|
||
toolchain go1.22.2 | ||
toolchain go1.23.3 |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Sorry, but I'm a Golang toolchain novice. Do we actually want to bump the version of the go compiler used here?
Are these values informed by requirements of our dependencies, or do we get to control them?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I am a novice too. But I can explain the reason why I did that.
I installed golang version 1.22.x in my system. Then ran,
go get -u github.com/containerd/containerd@v1.7.22 ./...
go mod tidy
go mod vendor
With golang 1.22 none of the packages were updates but I did get a lot of warnings saying 1.23.0+ version is required. Upgrading golang to 1.23 and running the above commands updated the versions of the required packages. I was able to force update a required package with golang 1.22 by running go get -u xxxxxx
but since the package in question is an indirect package I opted for the other method (also golang 1.23 is available in sdk which made me more confident).
To make sure, I ran all the required tests and everything worked as expected. The logs are attached.
The current containerd version that we ship is |
f6c9a29
to
a426cfd
Compare
a426cfd
to
f890651
Compare
Description of changes:
Updated Go dependencies with:
I manually held back
github.com/containerd/errdefs
since v0.2.0 changes the interfaces and breaks builds for the vendor code as referenced in #146.Testing done:
Built aws-k8s-1.30 for aarch64 and x86_64 and validated that host containers where pulled with no errors in the logs. Both control and admin container pulled and I was able to SSM and check the journal on both.
For x86_64, aws-k8s-1.30
For aarch64, aws-k8s-1.30
Terms of contribution:
By submitting this pull request, I agree that this contribution is dual-licensed under the terms of both the Apache License, version 2.0, and the MIT license.