mathieu-benoit / sail-sharp

Sail Sharp - Security best practices with .NET Core & Kubernetes
https://medium.com/p/c68ba253844a
3 stars 0 forks source link

.NET 9 RC 1 #149

Closed mathieu-benoit closed 1 month ago

mathieu-benoit commented 2 months ago

.NET 9 RC 1 is out https://devblogs.microsoft.com/dotnet/dotnet-9-release-candidate-1-is-now-available/. You can also find information about the performance improvements in .NET 9: https://devblogs.microsoft.com/dotnet/performance-improvements-in-net-9/.

Couple of notes below with some comparisons between .NET 9 and .NET 8, in terms of distroless container images, focused on the dotnet-runtime-deps (for self-contained or AOT apps):

--> tl,dr: I'm still using -noble-chiseled-aot but I'm really wondering if I should switch to -azurelinux3.0-distroless-aot.<--

Container images sizes

REPOSITORY                                          TAG                                       IMAGE ID       CREATED        SIZE
aquasec/trivy                                       0.55.1                                    c81e0159d3bf   35 hours ago   148MB
registry.suse.com/bci/dotnet-runtime                8.0                                       8328ff21f58d   2 days ago     244MB
mcr.microsoft.com/dotnet/runtime-deps               9.0.0-rc.1-noble-chiseled                 a8616d8e90be   3 days ago     14.2MB
mcr.microsoft.com/dotnet/runtime-deps               9.0.0-rc.1-azurelinux3.0-distroless       b78050be5444   3 days ago     24.3MB
mcr.microsoft.com/dotnet/runtime-deps               8.0.8-noble-chiseled                      0caa444b9553   3 days ago     14.3MB
mcr.microsoft.com/dotnet/runtime-deps               8.0.8-azurelinux3.0-distroless            6007b1ea9aec   3 days ago     24.4MB
cgr.dev/chainguard/dotnet-runtime                   latest                                    9dc024decfc3   8 days ago     133MB
mcr.microsoft.com/dotnet/nightly/runtime-deps       8.0.8-azurelinux3.0-distroless-aot        493b331db7de   2 weeks ago    21.5MB
mcr.microsoft.com/dotnet/nightly/runtime-deps       9.0.0-rc.1-azurelinux3.0-distroless-aot   271abd3aab14   2 weeks ago    21.4MB
mcr.microsoft.com/dotnet/nightly/runtime-deps       9.0.0-rc.1-noble-chiseled-aot             5f816c15f7c7   3 weeks ago    11.6MB
registry.access.redhat.com/ubi8/dotnet-80-runtime   latest                                    4fdf4a79a915   4 weeks ago    234MB
mcr.microsoft.com/dotnet/nightly/runtime-deps       8.0.8-noble-chiseled-aot                  f53e7500fa8f   7 weeks ago    11.9MB

--> 0.3MB on disk have been saved for the -noble-chiseled-aot and -azurelinux3.0-distroless-aot while just 0.1MB has been saved for the -noble-chiseled and -azurelinux3.0-distroless <--

In terms of comparing the size between the images, here is the list from the smaller to the bigger in this list:

  1. mcr.microsoft.com/dotnet/nightly/runtime-deps:9.0.0-rc.1-noble-chiseled-aot: 11.6MB
  2. mcr.microsoft.com/dotnet/runtime-deps:9.0.0-rc.1-azurelinux3.0-distroless-aot: 21.4MB
  3. cgr.dev/chainguard/dotnet-runtime: 133MB
  4. registry.access.redhat.com/ubi8/dotnet-80-runtime: 234MB
  5. registry.suse.com/bci/dotnet-runtime: 244MB

List of packages

syft mcr.microsoft.com/dotnet/nightly/runtime-deps:8.0.8-noble-chiseled-aot:

   ├── ✔ Packages                        [8 packages]  
   └── ✔ Executables                     [28 executables]  
NAME             VERSION                TYPE   
base-files       13ubuntu10             deb     
ca-certificates  20240203               deb     
gcc-14-base      14-20240412-0ubuntu1   deb     
libc6            2.39-0ubuntu8.2        deb     
libgcc-s1        14-20240412-0ubuntu1   deb     
libssl3t64       3.0.13-0ubuntu3.1      deb     
openssl          3.0.13-0ubuntu3.1      deb     
zlib1g           1:1.3.dfsg-3.1ubuntu2  deb

syft mcr.microsoft.com/dotnet/nightly/runtime-deps:9.0.0-rc.1-noble-chiseled-aot:

   ├── ✔ Packages                        [7 packages]  
   └── ✔ Executables                     [27 executables]  
NAME             VERSION               TYPE   
base-files       13ubuntu10            deb     
ca-certificates  20240203              deb     
gcc-14-base      14-20240412-0ubuntu1  deb     
libc6            2.39-0ubuntu8.2       deb     
libgcc-s1        14-20240412-0ubuntu1  deb     
libssl3t64       3.0.13-0ubuntu3.2     deb     
openssl          3.0.13-0ubuntu3.2     deb

--> 1 package has been removed: zlib1g for the -noble-chiseled-aot <--

syft mcr.microsoft.com/dotnet/runtime-deps:8.0.8-noble-chiseled:

   ├── ✔ Packages                        [9 packages]  
   └── ✔ Executables                     [29 executables]  
NAME             VERSION                  TYPE   
base-files       13ubuntu10.1             deb     
ca-certificates  20240203                 deb     
gcc-14-base      14-20240412-0ubuntu1     deb     
libc6            2.39-0ubuntu8.3          deb     
libgcc-s1        14-20240412-0ubuntu1     deb     
libssl3t64       3.0.13-0ubuntu3.4        deb     
libstdc++6       14-20240412-0ubuntu1     deb     
openssl          3.0.13-0ubuntu3.4        deb     
zlib1g           1:1.3.dfsg-3.1ubuntu2.1  deb

syft mcr.microsoft.com/dotnet/runtime-deps:9.0.0-rc.1-noble-chiseled:

   ├── ✔ Packages                        [8 packages]  
   └── ✔ Executables                     [28 executables]  
NAME             VERSION               TYPE   
base-files       13ubuntu10.1          deb     
ca-certificates  20240203              deb     
gcc-14-base      14-20240412-0ubuntu1  deb     
libc6            2.39-0ubuntu8.3       deb     
libgcc-s1        14-20240412-0ubuntu1  deb     
libssl3t64       3.0.13-0ubuntu3.4     deb     
libstdc++6       14-20240412-0ubuntu1  deb     
openssl          3.0.13-0ubuntu3.4     deb

--> 1 package has been removed: zlib1g for the -noble-chiseled <--

syft mcr.microsoft.com/dotnet/runtime-deps:8.0.8-azurelinux3.0-distroless:

   ├── ✔ Packages                        [13 packages]  
   └── ✔ Executables                     [43 executables]  
NAME                         VERSION               TYPE   
azurelinux-release           3.0-18.azl3           rpm     
distroless-packages-minimal  3.0-5.azl3            rpm     
filesystem                   1.1-21.azl3           rpm     
glibc                        2.38                  rpm     
glibc                        2.38-7.azl3           rpm     
libgcc                       13.2.0-7.azl3         rpm     
libstdc++                    13.2.0-7.azl3         rpm     
openssl                      3.3.0                 rpm     
openssl-libs                 3.3.0-2.azl3          rpm     
prebuilt-ca-certificates     2501981:3.0.0-7.azl3  rpm     
tzdata                       2024a-1.azl3          rpm     
zlib                         1.3.1                 rpm     
zlib                         1.3.1-1.azl3          rpm

syft mcr.microsoft.com/dotnet/runtime-deps:9.0.0-rc.1-azurelinux3.0-distroless:

   ├── ✔ Packages                        [11 packages]  
   └── ✔ Executables                     [42 executables]  
NAME                         VERSION               TYPE   
azurelinux-release           3.0-18.azl3           rpm     
distroless-packages-minimal  3.0-5.azl3            rpm     
filesystem                   1.1-21.azl3           rpm     
glibc                        2.38                  rpm     
glibc                        2.38-7.azl3           rpm     
libgcc                       13.2.0-7.azl3         rpm     
libstdc++                    13.2.0-7.azl3         rpm     
openssl                      3.3.0                 rpm     
openssl-libs                 3.3.0-2.azl3          rpm     
prebuilt-ca-certificates     2501981:3.0.0-7.azl3  rpm     
tzdata                       2024a-1.azl3          rpm

1 package has been removed: zlib for the -azurelinux3.0-distroless <--

syft mcr.microsoft.com/dotnet/nightly/runtime-deps:8.0.8-azurelinux3.0-distroless-aot:

   ├── ✔ Packages                        [12 packages]  
   └── ✔ Executables                     [42 executables]  
NAME                         VERSION               TYPE   
azurelinux-release           3.0-18.azl3           rpm     
distroless-packages-minimal  3.0-5.azl3            rpm     
filesystem                   1.1-21.azl3           rpm     
glibc                        2.38                  rpm     
glibc                        2.38-7.azl3           rpm     
libgcc                       13.2.0-7.azl3         rpm     
openssl                      3.3.0                 rpm     
openssl-libs                 3.3.0-2.azl3          rpm     
prebuilt-ca-certificates     2501981:3.0.0-7.azl3  rpm     
tzdata                       2024a-1.azl3          rpm     
zlib                         1.3.1                 rpm     
zlib                         1.3.1-1.azl3          rpm

syft mcr.microsoft.com/dotnet/nightly/runtime-deps:9.0.0-rc.1-azurelinux3.0-distroless-aot:

   ├── ✔ Packages                        [10 packages]  
   └── ✔ Executables                     [41 executables]  
NAME                         VERSION               TYPE   
azurelinux-release           3.0-18.azl3           rpm     
distroless-packages-minimal  3.0-5.azl3            rpm     
filesystem                   1.1-21.azl3           rpm     
glibc                        2.38                  rpm     
glibc                        2.38-7.azl3           rpm     
libgcc                       13.2.0-7.azl3         rpm     
openssl                      3.3.0                 rpm     
openssl-libs                 3.3.0-2.azl3          rpm     
prebuilt-ca-certificates     2501981:3.0.0-7.azl3  rpm     
tzdata                       2024a-1.azl3          rpm

2 packages have been removed: zlib for the -azurelinux3.0-distroless-aot <--

syft registry.access.redhat.com/ubi8/dotnet-80-runtime:

   ├── ✔ Packages                        [420 packages]  
   ├── ✔ File digests                    [2,499 files]  
   ├── ✔ File metadata                   [2,499 locations]  
   └── ✔ Executables                     [604 executables] 
... redacted because not using `runtime-deps`...

syft cgr.dev/chainguard/dotnet-runtime:

   ├── ✔ Packages                        [185 packages]  
   ├── ✔ File digests                    [351 files]  
   ├── ✔ File metadata                   [351 locations]  
   └── ✔ Executables                     [241 executables]
... redacted because not using `runtime-deps`...

syft registry.suse.com/bci/dotnet-runtime:8.0:

   ├── ✔ Packages                        [325 packages]  
   ├── ✔ File digests                    [2,401 files]  
   ├── ✔ File metadata                   [2,401 locations]  
   └── ✔ Executables                     [721 executables] 
... redacted because not using `runtime-deps`...

Current CVEs (as of 2024-09-13)

trivy image mcr.microsoft.com/dotnet/nightly/runtime-deps:8.0.8-noble-chiseled-aot:

Total: 13 (UNKNOWN: 0, LOW: 9, MEDIUM: 4, HIGH: 0, CRITICAL: 0)

┌────────────┬────────────────┬──────────┬──────────┬───────────────────┬───────────────────┬─────────────────────────────────────────────────────────────┐
│  Library   │ Vulnerability  │ Severity │  Status  │ Installed Version │   Fixed Version   │                            Title                            │
├────────────┼────────────────┼──────────┼──────────┼───────────────────┼───────────────────┼─────────────────────────────────────────────────────────────┤
│ libc6      │ CVE-2016-20013 │ LOW      │ affected │ 2.39-0ubuntu8.2   │                   │ sha256crypt and sha512crypt through 0.6 allow attackers to  │
│            │                │          │          │                   │                   │ cause a denial of...                                        │
│            │                │          │          │                   │                   │ https://avd.aquasec.com/nvd/cve-2016-20013                  │
├────────────┼────────────────┼──────────┤          ├───────────────────┼───────────────────┼─────────────────────────────────────────────────────────────┤
│ libssl3t64 │ CVE-2024-41996 │ MEDIUM   │          │ 3.0.13-0ubuntu3.1 │                   │ openssl: remote attackers (from the client side) to trigger │
│            │                │          │          │                   │                   │ unnecessarily expensive server-side...                      │
│            │                │          │          │                   │                   │ https://avd.aquasec.com/nvd/cve-2024-41996                  │
│            ├────────────────┤          ├──────────┤                   ├───────────────────┼─────────────────────────────────────────────────────────────┤
│            │ CVE-2024-6119  │          │ fixed    │                   │ 3.0.13-0ubuntu3.4 │ openssl: Possible denial of service in X.509 name checks    │
│            │                │          │          │                   │                   │ https://avd.aquasec.com/nvd/cve-2024-6119                   │
│            ├────────────────┼──────────┤          │                   ├───────────────────┼─────────────────────────────────────────────────────────────┤
│            │ CVE-2024-2511  │ LOW      │          │                   │ 3.0.13-0ubuntu3.2 │ openssl: Unbounded memory growth with session handling in   │
│            │                │          │          │                   │                   │ TLSv1.3                                                     │
│            │                │          │          │                   │                   │ https://avd.aquasec.com/nvd/cve-2024-2511                   │
│            ├────────────────┤          │          │                   │                   ├─────────────────────────────────────────────────────────────┤
│            │ CVE-2024-4603  │          │          │                   │                   │ openssl: Excessive time spent checking DSA keys and         │
│            │                │          │          │                   │                   │ parameters                                                  │
│            │                │          │          │                   │                   │ https://avd.aquasec.com/nvd/cve-2024-4603                   │
│            ├────────────────┤          │          │                   │                   ├─────────────────────────────────────────────────────────────┤
│            │ CVE-2024-4741  │          │          │                   │                   │ openssl: Use After Free with SSL_free_buffers               │
│            │                │          │          │                   │                   │ https://avd.aquasec.com/nvd/cve-2024-4741                   │
│            ├────────────────┤          │          │                   │                   ├─────────────────────────────────────────────────────────────┤
│            │ CVE-2024-5535  │          │          │                   │                   │ openssl: SSL_select_next_proto buffer overread              │
│            │                │          │          │                   │                   │ https://avd.aquasec.com/nvd/cve-2024-5535                   │
├────────────┼────────────────┼──────────┼──────────┤                   ├───────────────────┼─────────────────────────────────────────────────────────────┤
│ openssl    │ CVE-2024-41996 │ MEDIUM   │ affected │                   │                   │ openssl: remote attackers (from the client side) to trigger │
│            │                │          │          │                   │                   │ unnecessarily expensive server-side...                      │
│            │                │          │          │                   │                   │ https://avd.aquasec.com/nvd/cve-2024-41996                  │
│            ├────────────────┤          ├──────────┤                   ├───────────────────┼─────────────────────────────────────────────────────────────┤
│            │ CVE-2024-6119  │          │ fixed    │                   │ 3.0.13-0ubuntu3.4 │ openssl: Possible denial of service in X.509 name checks    │
│            │                │          │          │                   │                   │ https://avd.aquasec.com/nvd/cve-2024-6119                   │
│            ├────────────────┼──────────┤          │                   ├───────────────────┼─────────────────────────────────────────────────────────────┤
│            │ CVE-2024-2511  │ LOW      │          │                   │ 3.0.13-0ubuntu3.2 │ openssl: Unbounded memory growth with session handling in   │
│            │                │          │          │                   │                   │ TLSv1.3                                                     │
│            │                │          │          │                   │                   │ https://avd.aquasec.com/nvd/cve-2024-2511                   │
│            ├────────────────┤          │          │                   │                   ├─────────────────────────────────────────────────────────────┤
│            │ CVE-2024-4603  │          │          │                   │                   │ openssl: Excessive time spent checking DSA keys and         │
│            │                │          │          │                   │                   │ parameters                                                  │
│            │                │          │          │                   │                   │ https://avd.aquasec.com/nvd/cve-2024-4603                   │
│            ├────────────────┤          │          │                   │                   ├─────────────────────────────────────────────────────────────┤
│            │ CVE-2024-4741  │          │          │                   │                   │ openssl: Use After Free with SSL_free_buffers               │
│            │                │          │          │                   │                   │ https://avd.aquasec.com/nvd/cve-2024-4741                   │
│            ├────────────────┤          │          │                   │                   ├─────────────────────────────────────────────────────────────┤
│            │ CVE-2024-5535  │          │          │                   │                   │ openssl: SSL_select_next_proto buffer overread              │
│            │                │          │          │                   │                   │ https://avd.aquasec.com/nvd/cve-2024-5535                   │
└────────────┴────────────────┴──────────┴──────────┴───────────────────┴───────────────────┴─────────────────────────────────────────────────────────────┘

trivy image mcr.microsoft.com/dotnet/nightly/runtime-deps:9.0.0-rc.1-noble-chiseled-aot:

Total: 5 (UNKNOWN: 0, LOW: 1, MEDIUM: 4, HIGH: 0, CRITICAL: 0)

┌────────────┬────────────────┬──────────┬──────────┬───────────────────┬───────────────────┬─────────────────────────────────────────────────────────────┐
│  Library   │ Vulnerability  │ Severity │  Status  │ Installed Version │   Fixed Version   │                            Title                            │
├────────────┼────────────────┼──────────┼──────────┼───────────────────┼───────────────────┼─────────────────────────────────────────────────────────────┤
│ libc6      │ CVE-2016-20013 │ LOW      │ affected │ 2.39-0ubuntu8.2   │                   │ sha256crypt and sha512crypt through 0.6 allow attackers to  │
│            │                │          │          │                   │                   │ cause a denial of...                                        │
│            │                │          │          │                   │                   │ https://avd.aquasec.com/nvd/cve-2016-20013                  │
├────────────┼────────────────┼──────────┤          ├───────────────────┼───────────────────┼─────────────────────────────────────────────────────────────┤
│ libssl3t64 │ CVE-2024-41996 │ MEDIUM   │          │ 3.0.13-0ubuntu3.2 │                   │ openssl: remote attackers (from the client side) to trigger │
│            │                │          │          │                   │                   │ unnecessarily expensive server-side...                      │
│            │                │          │          │                   │                   │ https://avd.aquasec.com/nvd/cve-2024-41996                  │
│            ├────────────────┤          ├──────────┤                   ├───────────────────┼─────────────────────────────────────────────────────────────┤
│            │ CVE-2024-6119  │          │ fixed    │                   │ 3.0.13-0ubuntu3.4 │ openssl: Possible denial of service in X.509 name checks    │
│            │                │          │          │                   │                   │ https://avd.aquasec.com/nvd/cve-2024-6119                   │
├────────────┼────────────────┤          ├──────────┤                   ├───────────────────┼─────────────────────────────────────────────────────────────┤
│ openssl    │ CVE-2024-41996 │          │ affected │                   │                   │ openssl: remote attackers (from the client side) to trigger │
│            │                │          │          │                   │                   │ unnecessarily expensive server-side...                      │
│            │                │          │          │                   │                   │ https://avd.aquasec.com/nvd/cve-2024-41996                  │
│            ├────────────────┤          ├──────────┤                   ├───────────────────┼─────────────────────────────────────────────────────────────┤
│            │ CVE-2024-6119  │          │ fixed    │                   │ 3.0.13-0ubuntu3.4 │ openssl: Possible denial of service in X.509 name checks    │
│            │                │          │          │                   │                   │ https://avd.aquasec.com/nvd/cve-2024-6119                   │
└────────────┴────────────────┴──────────┴──────────┴───────────────────┴───────────────────┴─────────────────────────────────────────────────────────────┘

trivy image mcr.microsoft.com/dotnet/runtime-deps:9.0.0-rc.1-azurelinux3.0-distroless:

Total: 0 (UNKNOWN: 0, LOW: 0, MEDIUM: 0, HIGH: 0, CRITICAL: 0)

trivy image mcr.microsoft.com/dotnet/runtime-deps:8.0.8-azurelinux3.0-distroless:

Total: 0 (UNKNOWN: 0, LOW: 0, MEDIUM: 0, HIGH: 0, CRITICAL: 0)

trivy image registry.access.redhat.com/ubi8/dotnet-80-runtime:

Total: 88 (UNKNOWN: 0, LOW: 71, MEDIUM: 17, HIGH: 0, CRITICAL: 0)
...redacted for brevity...

trivy image cgr.dev/chainguard/dotnet-runtime:

Total: 0 (UNKNOWN: 0, LOW: 0, MEDIUM: 0, HIGH: 0, CRITICAL: 0)

trivy image registry.suse.com/bci/dotnet-runtime:8.0:

Total: 0 (UNKNOWN: 0, LOW: 0, MEDIUM: 0, HIGH: 0, CRITICAL: 0)

--> mcr.microsoft.com/dotnet/nightly/runtime-deps:9.0.0-rc.1-noble-chiseled-aot has 5 CVEs (1 LOW and 4 MEDIUM) while chainguard/dotnet-runtime, -azurelinux3.0-distroless and registry.suse.com/bci/dotnet-runtime have 0 CVEs, that's their strength, that's for sure. registry.access.redhat.com/ubi8/dotnet-80-runtime has 88 CVEs though. <--

Conclusion

I'm still using -noble-chiseled-aot but I'm really wondering if I should switch to -azurelinux3.0-distroless-aot, for different reasons:

With all of that being said, and knowing that both are the two official distroless of the .NET container images, I think -azurelinux3.0-distroless-aot is the most appealing here. That's why I think I will soon move to -azurelinux3.0-distroless-aot from -noble-chiseled-aot.

mathieu-benoit commented 2 months ago

Getting this error:

#11 0.878   Determining projects to restore...
#11 1.731 /app/my-sample-app.csproj : error NU1102: Unable to find package Microsoft.DotNet.ILCompiler with version (>= 9.0.0-rc.1.24421.1)
#11 1.731 /app/my-sample-app.csproj : error NU1102:   - Found 53 version(s) in nuget.org [ Nearest version: 9.0.0-preview.7.24405.7 ]
#11 1.731 /app/my-sample-app.csproj : error NU1102: Unable to find package Microsoft.NET.ILLink.Tasks with version (>= 9.0.0-rc.1.24421.1)
#11 1.731 /app/my-sample-app.csproj : error NU1102:   - Found 30 version(s) in nuget.org [ Nearest version: 9.0.0-preview.7.24405.7 ]
#11 1.732 /app/my-sample-app.csproj : error NU1102: Unable to find package Microsoft.NETCore.App.Runtime.linux-x64 with version (= 9.0.0-rc.1.24421.1)
#11 1.732 /app/my-sample-app.csproj : error NU1102:   - Found 170 version(s) in nuget.org [ Nearest version: 9.0.0-preview.7.24405.7 ]
#11 1.732 /app/my-sample-app.csproj : error NU1102: Unable to find package runtime.linux-x64.Microsoft.DotNet.ILCompiler with version (= 9.0.0-rc.1.24421.1)
#11 1.732 /app/my-sample-app.csproj : error NU1102:   - Found 53 version(s) in nuget.org [ Nearest version: 9.0.0-preview.7.24405.7 ]
#11 1.732 /app/my-sample-app.csproj : error NU1102: Unable to find package Microsoft.AspNetCore.App.Runtime.linux-x64 with version (= 9.0.0-rc.1.24416.6)
#11 1.732 /app/my-sample-app.csproj : error NU1102:   - Found 170 version(s) in nuget.org [ Nearest version: 9.0.0-preview.7.24406.2 ]
#11 1.762   Failed to restore /app/my-sample-app.csproj (in 564 ms).
#11 ERROR: process "/bin/sh -c dotnet restore my-sample-app.csproj     -r linux-x64" did not complete successfully: exit code: 1
failed to solve: process "/bin/sh -c dotnet restore my-sample-app.csproj     -r linux-x64" did not complete successfully: exit code: 1
------
 > [my-sample-workload-my-sample-container builder 4/6] RUN dotnet restore my-sample-app.csproj     -r linux-x64:
1.731 /app/my-sample-app.csproj : error NU1102:   - Found 53 version(s) in nuget.org [ Nearest version: 9.0.0-preview.7.24405.7 ]
1.731 /app/my-sample-app.csproj : error NU1102: Unable to find package Microsoft.NET.ILLink.Tasks with version (>= 9.0.0-rc.1.24421.1)
1.731 /app/my-sample-app.csproj : error NU1102:   - Found 30 version(s) in nuget.org [ Nearest version: 9.0.0-preview.7.24405.7 ]
1.732 /app/my-sample-app.csproj : error NU1102: Unable to find package Microsoft.NETCore.App.Runtime.linux-x64 with version (= 9.0.0-rc.1.24421.1)
1.732 /app/my-sample-app.csproj : error NU1102:   - Found 170 version(s) in nuget.org [ Nearest version: 9.0.0-preview.7.24405.7 ]
1.732 /app/my-sample-app.csproj : error NU1102: Unable to find package runtime.linux-x64.Microsoft.DotNet.ILCompiler with version (= 9.0.0-rc.1.24421.1)
1.732 /app/my-sample-app.csproj : error NU1102:   - Found 53 version(s) in nuget.org [ Nearest version: 9.0.0-preview.7.24405.7 ]
1.732 /app/my-sample-app.csproj : error NU1102: Unable to find package Microsoft.AspNetCore.App.Runtime.linux-x64 with version (= 9.0.0-rc.1.24416.6)
1.732 /app/my-sample-app.csproj : error NU1102:   - Found 170 version(s) in nuget.org [ Nearest version: 9.0.0-preview.7.24406.2 ]
1.762   Failed to restore /app/my-sample-app.csproj (in 564 ms).

RC-1 is not yet official, so let's use Preview-7 for now?

mathieu-benoit commented 1 month ago

RC 1 is now official: https://devblogs.microsoft.com/dotnet/dotnet-9-release-candidate-1-is-now-available/, fixing the previous issue.

github-actions[bot] commented 1 month ago

Deployment successfully completed for PR-149! :tada:

View in Humanitec

Deployment ID: 17f453a59a51a9e3

URLs:

my-sample-workload: helloworld-preview.endpoints.mathieu-benoit-gcp.cloud.goog

Deployment diff ### Deployment diff: ```json { "modules": { "add": null, "remove": [], "update": { "my-sample-workload": [ { "from": "", "op": "replace", "path": "/spec/containers/my-sample-container/image", "value": "us-east4-docker.pkg.dev/mathieu-benoit-gcp/containers/my-sample-workload@sha256:7524e6a556784eb1f181867b2946e181922fd08332d89296758d687f2d01f7ff" }, { "from": "", "op": "replace", "path": "/spec/annotations/humanitec.io~1workload-source", "value": "https://github.com/mathieu-benoit/sail-sharp/blob/mathieu-benoit-patch-1/score/score.yaml" } ] } }, "shared": null } ```
Active Resources Usage ### Active Resources Usage: ```none ResType Class ResID Usage Last referencing deployment Last referencing deployment created ago agent default agent current deploy 17f453a59a51a9e3 43.988529493s base-env default base-env current deploy 17f453a59a51a9e3 43.988532639s k8s-cluster default k8s-cluster current deploy 17f453a59a51a9e3 43.988534903s k8s-namespace default k8s-namespace current deploy 17f453a59a51a9e3 43.988536877s logging default logging current deploy 17f453a59a51a9e3 43.98853861s k8s-service-account default modules.my-sample-workload current deploy 17f453a59a51a9e3 43.988540373s workload default modules.my-sample-workload current deploy 17f453a59a51a9e3 43.988542177s dns default modules.my-sample-workload.externals.dns current deploy 17f453a59a51a9e3 43.98854391s ingress default modules.my-sample-workload.externals.dns current deploy 17f453a59a51a9e3 43.988545733s tls-cert default modules.my-sample-workload.externals.dns current deploy 17f453a59a51a9e3 43.988547376s route default modules.my-sample-workload.externals.route current deploy 17f453a59a51a9e3 43.98854925s ```
Resources Graph ### Resources Graph: Use a [Graphviz](https://graphviz.org) viewer for a visual representation. ```none strict digraph { label="Resource Graph app: my-sample-app, env: pr-149 green: virtual nodes (environment, workloads), blue: active resources "; labelloc="t"; overlap="false"; splines="true"; "my-sample-workload" [ color="2", colorscheme="greens3", fillcolor="1", label="workload.my-sample-workload", style="filled", weight=0 ]; "my-sample-workload" -> "base" [ weight=0 ]; "my-sample-workload" -> "4ade3e26822e7beffda0f3102e193bc2308ad029" [ weight=0 ]; "1b1a0eb26ef099f230ed0ca03b8ff8344e46f680" [ color="2", colorscheme="blues3", fillcolor="1", label="id: base-env type: base-env class: default provision time: 16.445948s", style="filled", tooltip="guresid: 1b1a0eb26ef099f230ed0ca03b8ff8344e46f680", weight=0 ]; "9a224c2a03f357fd6121bfc0e8f3efa20f8c117f" [ color="2", colorscheme="blues3", fillcolor="1", label="id: modules.my-sample-workload.externals.route type: route class: default provision time: 12.951354s", style="filled", tooltip="guresid: 9a224c2a03f357fd6121bfc0e8f3efa20f8c117f", weight=0 ]; "155de896cfd07b00f1f4ca3c34b45b99dec74812" [ color="2", colorscheme="blues3", fillcolor="1", label="id: modules.my-sample-workload type: k8s-service-account class: default provision time: 7.963703s", style="filled", tooltip="guresid: 155de896cfd07b00f1f4ca3c34b45b99dec74812", weight=0 ]; "base" [ color="2", colorscheme="greens3", fillcolor="1", label="base", style="filled", weight=0 ]; "base" -> "1b1a0eb26ef099f230ed0ca03b8ff8344e46f680" [ weight=0 ]; "4ade3e26822e7beffda0f3102e193bc2308ad029" [ color="2", colorscheme="blues3", fillcolor="1", label="id: modules.my-sample-workload type: workload class: default provision time: 3.672253s", style="filled", tooltip="guresid: 4ade3e26822e7beffda0f3102e193bc2308ad029", weight=0 ]; "4ade3e26822e7beffda0f3102e193bc2308ad029" -> "155de896cfd07b00f1f4ca3c34b45b99dec74812" [ weight=0 ]; "4ade3e26822e7beffda0f3102e193bc2308ad029" -> "9a224c2a03f357fd6121bfc0e8f3efa20f8c117f" [ weight=0 ]; "4ade3e26822e7beffda0f3102e193bc2308ad029" -> "a8859b9f02de2ac6160cc56a5180b288ba8b30c7" [ weight=0 ]; "f66b7e820bfc3a8efa481eac48c9c0029c790cb9" [ color="2", colorscheme="blues3", fillcolor="1", label="id: modules.my-sample-workload.externals.dns type: ingress class: default provision time: 803.784ms", style="filled", tooltip="guresid: f66b7e820bfc3a8efa481eac48c9c0029c790cb9", weight=0 ]; "f66b7e820bfc3a8efa481eac48c9c0029c790cb9" -> "3ef29de7337ac9a5142ffb43b00637ec820a6e12" [ weight=0 ]; "f66b7e820bfc3a8efa481eac48c9c0029c790cb9" -> "a8859b9f02de2ac6160cc56a5180b288ba8b30c7" [ weight=0 ]; "a8859b9f02de2ac6160cc56a5180b288ba8b30c7" [ color="2", colorscheme="blues3", fillcolor="1", label="id: modules.my-sample-workload.externals.dns type: dns class: default provision time: 9.157295s", style="filled", tooltip="guresid: a8859b9f02de2ac6160cc56a5180b288ba8b30c7", weight=0 ]; "3ef29de7337ac9a5142ffb43b00637ec820a6e12" [ color="2", colorscheme="blues3", fillcolor="1", label="id: modules.my-sample-workload.externals.dns type: tls-cert class: default provision time: 3.620601s", style="filled", tooltip="guresid: 3ef29de7337ac9a5142ffb43b00637ec820a6e12", weight=0 ]; "3ef29de7337ac9a5142ffb43b00637ec820a6e12" -> "a8859b9f02de2ac6160cc56a5180b288ba8b30c7" [ weight=0 ]; } ```