Skip to content
This repository was archived by the owner on Sep 13, 2024. It is now read-only.

Commit 5512806

Browse files
authored
Merge pull request #512 from fierlion/v1.62.0-1-stage
V1.62.0 1 stage
2 parents 4e31176 + 524f634 commit 5512806

File tree

11 files changed

+55
-55
lines changed

11 files changed

+55
-55
lines changed

CHANGELOG.md

+3
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,8 @@
11
# Changelog
22

3+
## 1.62.0-1
4+
* Update golang version 1.18.3
5+
36
## 1.61.3-1
47
* Cache Agent version 1.61.3
58

ecs-init/ECSVERSION

+1-1
Original file line numberDiff line numberDiff line change
@@ -1 +1 @@
1-
1.61.3
1+
1.62.0

ecs-init/config/common.go

+1-1
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@ const (
4646
// DefaultAgentVersion is the version of the agent that will be
4747
// fetched if required. This should look like v1.2.3 or an
4848
// 8-character sha, as is downloadable from S3.
49-
DefaultAgentVersion = "v1.61.3"
49+
DefaultAgentVersion = "v1.62.0"
5050

5151
// AgentPartitionBucketName is the name of the paritional s3 bucket that stores the agent
5252
AgentPartitionBucketName = "amazon-ecs-agent"

ecs-init/docker/docker.go

+16-20
Original file line numberDiff line numberDiff line change
@@ -79,6 +79,11 @@ const (
7979
// For more information on setns, please read this manpage:
8080
// http://man7.org/linux/man-pages/man2/setns.2.html
8181
CapSysAdmin = "SYS_ADMIN"
82+
// CapChown to start agent with CAP_CHOWN capability
83+
// This is needed for the ECS Agent to invoke the chown call when
84+
// configuring the files for configuration or administration.
85+
// http://man7.org/linux/man-pages/man2/chown.2.html
86+
CapChown = "CAP_CHOWN"
8287
// DefaultCgroupMountpoint is the default mount point for the cgroup subsystem
8388
DefaultCgroupMountpoint = "/sys/fs/cgroup"
8489
// pluginSocketFilesDir specifies the location of UNIX domain socket files of
@@ -117,9 +122,7 @@ const (
117122
containerResourcesRootDir = "/managed-agents"
118123

119124
execCapabilityName = "execute-command"
120-
execBinRelativePath = "bin"
121125
execConfigRelativePath = "config"
122-
execCertsRelativePath = "certs"
123126

124127
execAgentLogRelativePath = "/exec"
125128
)
@@ -432,7 +435,7 @@ func (c *client) getHostConfig(envVarsFromFiles map[string]string) *godocker.Hos
432435
binds = append(binds, getDockerPluginDirBinds()...)
433436

434437
// only add bind mounts when the src file/directory exists on host; otherwise docker API create an empty directory on host
435-
binds = append(binds, getCapabilityExecBinds()...)
438+
binds = append(binds, getCapabilityBinds()...)
436439

437440
return createHostConfig(binds)
438441
}
@@ -468,31 +471,24 @@ func getDockerPluginDirBinds() []string {
468471
return pluginBinds
469472
}
470473

471-
func getCapabilityExecBinds() []string {
472-
hostResourcesDir := filepath.Join(hostResourcesRootDir, execCapabilityName)
473-
containerResourcesDir := filepath.Join(containerResourcesRootDir, execCapabilityName)
474+
func getCapabilityBinds() []string {
475+
var binds = []string{}
474476

475-
var binds []string
476-
477-
// bind mount the entire /host/dependency/path/execute-command/bin folder
478-
hostBinDir := filepath.Join(hostResourcesDir, execBinRelativePath)
479-
if isPathValid(hostBinDir, true) {
477+
// bind mount the entire /host/dependency/path/ folder
478+
// as readonly to support all managed dependencies
479+
if isPathValid(hostResourcesRootDir, true) {
480480
binds = append(binds,
481-
hostBinDir+":"+filepath.Join(containerResourcesDir, execBinRelativePath)+readOnly)
481+
hostResourcesRootDir+":"+containerResourcesRootDir+readOnly)
482482
}
483483

484484
// bind mount the entire /host/dependency/path/execute-command/config folder
485485
// in read-write mode to allow ecs-agent to write config files to host file system
486486
// (docker will) create the config folder if it does not exist
487-
hostConfigDir := filepath.Join(hostResourcesDir, execConfigRelativePath)
488-
binds = append(binds,
489-
hostConfigDir+":"+filepath.Join(containerResourcesDir, execConfigRelativePath))
490-
491-
// bind mount the entire /host/dependency/path/execute-command/certs folder
492-
hostCertsDir := filepath.Join(hostResourcesDir, execCertsRelativePath)
493-
if isPathValid(hostCertsDir, true) {
487+
hostConfigDir := filepath.Join(hostResourcesRootDir, execCapabilityName, execConfigRelativePath)
488+
// Check that execute-command folder is present not config folder
489+
if isPathValid(filepath.Dir(hostConfigDir), true) {
494490
binds = append(binds,
495-
hostCertsDir+":"+filepath.Join(containerResourcesDir, execCertsRelativePath)+readOnly)
491+
hostConfigDir+":"+filepath.Join(containerResourcesRootDir, execCapabilityName, execConfigRelativePath))
496492
}
497493

498494
return binds

ecs-init/docker/docker_config.go

+1-1
Original file line numberDiff line numberDiff line change
@@ -49,7 +49,7 @@ func createHostConfig(binds []string) *godocker.HostConfig {
4949
// CapNetAdmin and CapSysAdmin are needed for running task in awsvpc network mode.
5050
// This network mode is (at least currently) not supported in external environment,
5151
// hence not adding them in that case.
52-
caps = []string{CapNetAdmin, CapSysAdmin}
52+
caps = []string{CapNetAdmin, CapSysAdmin, CapChown}
5353
}
5454

5555
hostConfig := &godocker.HostConfig{

ecs-init/docker/docker_test.go

+10-30
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ import (
3333
const (
3434
testTempDirPrefix = "init-docker-test-"
3535

36-
expectedAgentBindsUnspecifiedPlatform = 21
36+
expectedAgentBindsUnspecifiedPlatform = 20
3737
expectedAgentBindsSuseUbuntuPlatform = 18
3838
)
3939

@@ -288,7 +288,7 @@ func validateCommonCreateContainerOptions(opts godocker.CreateContainerOptions,
288288
t.Errorf("Expected network mode to be %s, got %s", networkMode, hostCfg.NetworkMode)
289289
}
290290

291-
if len(hostCfg.CapAdd) != 2 {
291+
if len(hostCfg.CapAdd) != 3 {
292292
t.Error("Mismatch detected in added host config capabilities")
293293
}
294294

@@ -827,21 +827,13 @@ func TestStartAgentWithExecBinds(t *testing.T) {
827827
hostCapabilityExecResourcesDir := filepath.Join(hostResourcesRootDir, execCapabilityName)
828828
containerCapabilityExecResourcesDir := filepath.Join(containerResourcesRootDir, execCapabilityName)
829829

830-
// binaries
831-
hostBinDir := filepath.Join(hostCapabilityExecResourcesDir, execBinRelativePath)
832-
containerBinDir := filepath.Join(containerCapabilityExecResourcesDir, execBinRelativePath)
833-
834830
// config
835831
hostConfigDir := filepath.Join(hostCapabilityExecResourcesDir, execConfigRelativePath)
836832
containerConfigDir := filepath.Join(containerCapabilityExecResourcesDir, execConfigRelativePath)
837833

838-
// certs
839-
hostCertsDir := filepath.Join(hostCapabilityExecResourcesDir, execCertsRelativePath)
840-
containerCertsDir := filepath.Join(containerCapabilityExecResourcesDir, execCertsRelativePath)
841-
842834
expectedExecBinds := []string{
843-
hostBinDir + ":" + containerBinDir + readOnly,
844-
hostCertsDir + ":" + containerCertsDir + readOnly,
835+
hostResourcesRootDir + ":" + containerResourcesRootDir + readOnly,
836+
hostConfigDir + ":" + containerConfigDir,
845837
}
846838
expectedAgentBinds += len(expectedExecBinds)
847839

@@ -884,18 +876,10 @@ func TestGetCapabilityExecBinds(t *testing.T) {
884876
hostCapabilityExecResourcesDir := filepath.Join(hostResourcesRootDir, execCapabilityName)
885877
containerCapabilityExecResourcesDir := filepath.Join(containerResourcesRootDir, execCapabilityName)
886878

887-
// binaries
888-
hostBinDir := filepath.Join(hostCapabilityExecResourcesDir, execBinRelativePath)
889-
containerBinDir := filepath.Join(containerCapabilityExecResourcesDir, execBinRelativePath)
890-
891879
// config
892880
hostConfigDir := filepath.Join(hostCapabilityExecResourcesDir, execConfigRelativePath)
893881
containerConfigDir := filepath.Join(containerCapabilityExecResourcesDir, execConfigRelativePath)
894882

895-
// certs
896-
hostCertsDir := filepath.Join(hostCapabilityExecResourcesDir, execCertsRelativePath)
897-
containerCertsDir := filepath.Join(containerCapabilityExecResourcesDir, execCertsRelativePath)
898-
899883
testCases := []struct {
900884
name string
901885
testIsPathValid func(string, bool) bool
@@ -907,35 +891,31 @@ func TestGetCapabilityExecBinds(t *testing.T) {
907891
return true
908892
},
909893
expectedBinds: []string{
910-
hostBinDir + ":" + containerBinDir + readOnly,
894+
hostResourcesRootDir + ":" + containerResourcesRootDir + readOnly,
911895
hostConfigDir + ":" + containerConfigDir,
912-
hostCertsDir + ":" + containerCertsDir + readOnly,
913896
},
914897
},
915898
{
916-
name: "only ssm-agent bin path valid",
899+
name: "managed-agents path valid, no execute-command",
917900
testIsPathValid: func(path string, isDir bool) bool {
918-
return path == hostBinDir
901+
return path == hostResourcesRootDir
919902
},
920903
expectedBinds: []string{
921-
hostBinDir + ":" + containerBinDir + readOnly,
922-
hostConfigDir + ":" + containerConfigDir,
904+
hostResourcesRootDir + ":" + containerResourcesRootDir + readOnly,
923905
},
924906
},
925907
{
926908
name: "no path valid",
927909
testIsPathValid: func(path string, isDir bool) bool {
928910
return false
929911
},
930-
expectedBinds: []string{
931-
hostConfigDir + ":" + containerConfigDir,
932-
},
912+
expectedBinds: []string{},
933913
},
934914
}
935915
for _, tc := range testCases {
936916
t.Run(tc.name, func(t *testing.T) {
937917
isPathValid = tc.testIsPathValid
938-
binds := getCapabilityExecBinds()
918+
binds := getCapabilityBinds()
939919
assert.Equal(t, tc.expectedBinds, binds)
940920
})
941921
}

packaging/amazon-linux-ami/ecs-init.spec

+4-1
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@
3333
%endif
3434

3535
Name: ecs-init
36-
Version: 1.61.3
36+
Version: 1.62.0
3737
Release: 1%{?dist}
3838
License: Apache 2.0
3939
Summary: Amazon Elastic Container Service initialization application
@@ -279,6 +279,9 @@ fi
279279
%endif
280280

281281
%changelog
282+
* Wed Jul 27 2022 Ray Allan <[email protected]> - 1.62.0-1
283+
- Update golang version 1.18.3
284+
282285
* Wed Jun 15 2022 Mythri Garaga Manjunatha <[email protected]> - 1.61.3-1
283286
- Cache Agent version 1.61.3
284287

packaging/generic-deb/debian/changelog

+6
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,9 @@
1+
amazon-ecs-init (1.62.0-1) stable; urgency=medium
2+
3+
* Update golang version 1.18.3
4+
5+
-- Ray Allan <[email protected]> Wed, 27 Jul 2022 18:00:00 +0000
6+
17
amazon-ecs-init (1.61.3-1) stable; urgency=medium
28

39
* Cache Agent version 1.61.3

packaging/generic-rpm/amazon-ecs-init.spec

+4-1
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@
2626
%endif
2727

2828
Name: amazon-ecs-init
29-
Version: 1.61.3
29+
Version: 1.62.0
3030
Release: 1
3131
License: Apache 2.0
3232
Summary: Amazon Elastic Container Service initialization application
@@ -105,6 +105,9 @@ ln -sf %{basename:%{agent_image}} %{_cachedir}/ecs/ecs-agent.tar
105105
%systemd_postun_with_restart amazon-ecs-volume-plugin
106106

107107
%changelog
108+
* Wed Jul 27 2022 Ray Allan <[email protected]> - 1.62.0-1
109+
- Update golang version 1.18.3
110+
108111
* Wed Jun 15 2022 Mythri Garaga Manjunatha <[email protected]> - 1.61.3-1
109112
- Cache Agent version 1.61.3
110113

packaging/suse/amazon-ecs-init.changes

+4
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,8 @@
11
-------------------------------------------------------------------
2+
Wed Jul 27, 18:00:00 UTC 2022 - [email protected] - 1.62.0-1
3+
4+
- Update golang version 1.18.3
5+
-------------------------------------------------------------------
26
Wed Jun 15, 18:00:00 UTC 2022 - [email protected] - 1.61.3-1
37

48
- Cache Agent version 1.61.3

scripts/changelog/CHANGELOG_MASTER

+5
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,8 @@
1+
1.62.0-1
2+
Ray Allan <[email protected]>
3+
2022-07-27T10:00:00-08:00
4+
Update golang version 1.18.3
5+
16
1.61.3-1
27
Mythri Garaga Manjunatha <[email protected]>
38
2022-06-15T10:00:00-08:00

0 commit comments

Comments
 (0)