From 377180c95b297c8cb7d0c29aeea535ba1ce8544b Mon Sep 17 00:00:00 2001 From: "github-actions[bot]" <41898282+github-actions[bot]@users.noreply.github.com> Date: Tue, 27 Feb 2024 09:05:15 +0000 Subject: [PATCH] Updates: runner to v2.314.0 --- Makefile | 2 +- runner/Makefile | 2 +- runner/VERSION | 2 +- test/e2e/e2e_test.go | 10 +++++----- 4 files changed, 8 insertions(+), 8 deletions(-) diff --git a/Makefile b/Makefile index c505a95f..a053e9f7 100644 --- a/Makefile +++ b/Makefile @@ -6,7 +6,7 @@ endif DOCKER_USER ?= $(shell echo ${DOCKER_IMAGE_NAME} | cut -d / -f1) VERSION ?= dev COMMIT_SHA = $(shell git rev-parse HEAD) -RUNNER_VERSION ?= 2.313.0 +RUNNER_VERSION ?= 2.314.0 TARGETPLATFORM ?= $(shell arch) RUNNER_NAME ?= ${DOCKER_USER}/actions-runner RUNNER_TAG ?= ${VERSION} diff --git a/runner/Makefile b/runner/Makefile index f0510517..cfec0a99 100644 --- a/runner/Makefile +++ b/runner/Makefile @@ -6,7 +6,7 @@ DIND_ROOTLESS_RUNNER_NAME ?= ${DOCKER_USER}/actions-runner-dind-rootless OS_IMAGE ?= ubuntu-22.04 TARGETPLATFORM ?= $(shell arch) -RUNNER_VERSION ?= 2.313.0 +RUNNER_VERSION ?= 2.314.0 RUNNER_CONTAINER_HOOKS_VERSION ?= 0.5.1 DOCKER_VERSION ?= 24.0.7 diff --git a/runner/VERSION b/runner/VERSION index 2d34443a..2390abc3 100644 --- a/runner/VERSION +++ b/runner/VERSION @@ -1,2 +1,2 @@ -RUNNER_VERSION=2.313.0 +RUNNER_VERSION=2.314.0 RUNNER_CONTAINER_HOOKS_VERSION=0.5.1 \ No newline at end of file diff --git a/test/e2e/e2e_test.go b/test/e2e/e2e_test.go index ca2df6b7..a207a6a7 100644 --- a/test/e2e/e2e_test.go +++ b/test/e2e/e2e_test.go @@ -36,7 +36,7 @@ var ( testResultCMNamePrefix = "test-result-" - RunnerVersion = "2.313.0" + RunnerVersion = "2.314.0" RunnerContainerHooksVersion = "0.5.1" ) @@ -1076,7 +1076,7 @@ func installActionsWorkflow(t *testing.T, testName, runnerLabel, testResultCMNam steps = append(steps, testing.Step{ // This might be the easiest way to handle permissions without use of securityContext - // https://stackoverflow.com/questions/50156124/kubernetes-nfs-persistent-volumes-permission-denied#comment107483717_53186320 + // https://stackoverflow.com/questions/50.5.124/kubernetes-nfs-persistent-volumes-permission-denied#comment107483717_53186320 Run: sudo + "mkdir -p \"/var/lib/docker\"", }, ) @@ -1087,7 +1087,7 @@ func installActionsWorkflow(t *testing.T, testName, runnerLabel, testResultCMNam steps = append(steps, testing.Step{ // This might be the easiest way to handle permissions without use of securityContext - // https://stackoverflow.com/questions/50156124/kubernetes-nfs-persistent-volumes-permission-denied#comment107483717_53186320 + // https://stackoverflow.com/questions/50.5.124/kubernetes-nfs-persistent-volumes-permission-denied#comment107483717_53186320 Run: sudo + "chmod 777 -R \"${RUNNER_TOOL_CACHE}\" \"${HOME}/.cache\"", }, testing.Step{ @@ -1095,12 +1095,12 @@ func installActionsWorkflow(t *testing.T, testName, runnerLabel, testResultCMNam }, testing.Step{ // This might be the easiest way to handle permissions without use of securityContext - // https://stackoverflow.com/questions/50156124/kubernetes-nfs-persistent-volumes-permission-denied#comment107483717_53186320 + // https://stackoverflow.com/questions/50.5.124/kubernetes-nfs-persistent-volumes-permission-denied#comment107483717_53186320 Run: "ls -lah \"${RUNNER_TOOL_CACHE}\" \"${HOME}/.cache\"", }, testing.Step{ // This might be the easiest way to handle permissions without use of securityContext - // https://stackoverflow.com/questions/50156124/kubernetes-nfs-persistent-volumes-permission-denied#comment107483717_53186320 + // https://stackoverflow.com/questions/50.5.124/kubernetes-nfs-persistent-volumes-permission-denied#comment107483717_53186320 Run: "ls -lah \"/var/lib/docker\" || echo ls failed.", }, )