Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

.NET 9 RC 1 #149

Merged
merged 3 commits into from
Sep 11, 2024
Merged

.NET 9 RC 1 #149

merged 3 commits into from
Sep 11, 2024

Conversation

mathieu-benoit
Copy link
Owner

@mathieu-benoit mathieu-benoit commented Sep 3, 2024

.NET 9 RC 1 is out https://devblogs.microsoft.com/dotnet/dotnet-9-release-candidate-1-is-now-available/. You can also find information about the performance improvements in .NET 9: https://devblogs.microsoft.com/dotnet/performance-improvements-in-net-9/.

Couple of notes below with some comparisons between .NET 9 and .NET 8, in terms of distroless container images, focused on the dotnet-runtime-deps (for self-contained or AOT apps):

  • -noble-chiseled-aot and -azurelinux3.0-distroless-aot are still not officially supported in the GA registry, so I'm still using the Preview/Nightly registry.
  • -jammy-chiseled (Ubuntu 22.04) is not anymore supported but -noble-chiseled (Ubuntu 24.04) is still supported.
  • -azurelinux3.0-distroless is still supported.
  • -cbl-mariner2.0-distroless is not anymore supported. Actually, the new name of cbl-mariner is now azurelinux.
  • Side note: not yet supported in the Red Hat catalog as ubi8-minimal. And dotnet/runtime-deps is still not supported there.
  • Side note: not yet supported in the Chainguard catalog. And dotnet/runtime-deps is still not supported there.
  • Side note: not yet supported in the SUSE LE BCI catalog. And dotnet/runtime-deps is still not supported there.

--> tl,dr: I'm still using -noble-chiseled-aot but I'm really wondering if I should switch to -azurelinux3.0-distroless-aot.<--

Container images sizes

REPOSITORY                                          TAG                                       IMAGE ID       CREATED        SIZE
aquasec/trivy                                       0.55.1                                    c81e0159d3bf   35 hours ago   148MB
registry.suse.com/bci/dotnet-runtime                8.0                                       8328ff21f58d   2 days ago     244MB
mcr.microsoft.com/dotnet/runtime-deps               9.0.0-rc.1-noble-chiseled                 a8616d8e90be   3 days ago     14.2MB
mcr.microsoft.com/dotnet/runtime-deps               9.0.0-rc.1-azurelinux3.0-distroless       b78050be5444   3 days ago     24.3MB
mcr.microsoft.com/dotnet/runtime-deps               8.0.8-noble-chiseled                      0caa444b9553   3 days ago     14.3MB
mcr.microsoft.com/dotnet/runtime-deps               8.0.8-azurelinux3.0-distroless            6007b1ea9aec   3 days ago     24.4MB
cgr.dev/chainguard/dotnet-runtime                   latest                                    9dc024decfc3   8 days ago     133MB
mcr.microsoft.com/dotnet/nightly/runtime-deps       8.0.8-azurelinux3.0-distroless-aot        493b331db7de   2 weeks ago    21.5MB
mcr.microsoft.com/dotnet/nightly/runtime-deps       9.0.0-rc.1-azurelinux3.0-distroless-aot   271abd3aab14   2 weeks ago    21.4MB
mcr.microsoft.com/dotnet/nightly/runtime-deps       9.0.0-rc.1-noble-chiseled-aot             5f816c15f7c7   3 weeks ago    11.6MB
registry.access.redhat.com/ubi8/dotnet-80-runtime   latest                                    4fdf4a79a915   4 weeks ago    234MB
mcr.microsoft.com/dotnet/nightly/runtime-deps       8.0.8-noble-chiseled-aot                  f53e7500fa8f   7 weeks ago    11.9MB

--> 0.3MB on disk have been saved for the -noble-chiseled-aot and -azurelinux3.0-distroless-aot while just 0.1MB has been saved for the -noble-chiseled and -azurelinux3.0-distroless <--

In terms of comparing the size between the images, here is the list from the smaller to the bigger in this list:

  1. mcr.microsoft.com/dotnet/nightly/runtime-deps:9.0.0-rc.1-noble-chiseled-aot: 11.6MB
  2. mcr.microsoft.com/dotnet/runtime-deps:9.0.0-rc.1-azurelinux3.0-distroless-aot: 21.4MB
  3. cgr.dev/chainguard/dotnet-runtime: 133MB
  4. registry.access.redhat.com/ubi8/dotnet-80-runtime: 234MB
  5. registry.suse.com/bci/dotnet-runtime: 244MB

List of packages

syft mcr.microsoft.com/dotnet/nightly/runtime-deps:8.0.8-noble-chiseled-aot:

   ├── ✔ Packages                        [8 packages]  
   └── ✔ Executables                     [28 executables]  
NAME             VERSION                TYPE   
base-files       13ubuntu10             deb     
ca-certificates  20240203               deb     
gcc-14-base      14-20240412-0ubuntu1   deb     
libc6            2.39-0ubuntu8.2        deb     
libgcc-s1        14-20240412-0ubuntu1   deb     
libssl3t64       3.0.13-0ubuntu3.1      deb     
openssl          3.0.13-0ubuntu3.1      deb     
zlib1g           1:1.3.dfsg-3.1ubuntu2  deb

syft mcr.microsoft.com/dotnet/nightly/runtime-deps:9.0.0-rc.1-noble-chiseled-aot:

   ├── ✔ Packages                        [7 packages]  
   └── ✔ Executables                     [27 executables]  
NAME             VERSION               TYPE   
base-files       13ubuntu10            deb     
ca-certificates  20240203              deb     
gcc-14-base      14-20240412-0ubuntu1  deb     
libc6            2.39-0ubuntu8.2       deb     
libgcc-s1        14-20240412-0ubuntu1  deb     
libssl3t64       3.0.13-0ubuntu3.2     deb     
openssl          3.0.13-0ubuntu3.2     deb

--> 1 package has been removed: zlib1g for the -noble-chiseled-aot <--

syft mcr.microsoft.com/dotnet/runtime-deps:8.0.8-noble-chiseled:

   ├── ✔ Packages                        [9 packages]  
   └── ✔ Executables                     [29 executables]  
NAME             VERSION                  TYPE   
base-files       13ubuntu10.1             deb     
ca-certificates  20240203                 deb     
gcc-14-base      14-20240412-0ubuntu1     deb     
libc6            2.39-0ubuntu8.3          deb     
libgcc-s1        14-20240412-0ubuntu1     deb     
libssl3t64       3.0.13-0ubuntu3.4        deb     
libstdc++6       14-20240412-0ubuntu1     deb     
openssl          3.0.13-0ubuntu3.4        deb     
zlib1g           1:1.3.dfsg-3.1ubuntu2.1  deb

syft mcr.microsoft.com/dotnet/runtime-deps:9.0.0-rc.1-noble-chiseled:

   ├── ✔ Packages                        [8 packages]  
   └── ✔ Executables                     [28 executables]  
NAME             VERSION               TYPE   
base-files       13ubuntu10.1          deb     
ca-certificates  20240203              deb     
gcc-14-base      14-20240412-0ubuntu1  deb     
libc6            2.39-0ubuntu8.3       deb     
libgcc-s1        14-20240412-0ubuntu1  deb     
libssl3t64       3.0.13-0ubuntu3.4     deb     
libstdc++6       14-20240412-0ubuntu1  deb     
openssl          3.0.13-0ubuntu3.4     deb

--> 1 package has been removed: zlib1g for the -noble-chiseled <--

syft mcr.microsoft.com/dotnet/runtime-deps:8.0.8-azurelinux3.0-distroless:

   ├── ✔ Packages                        [13 packages]  
   └── ✔ Executables                     [43 executables]  
NAME                         VERSION               TYPE   
azurelinux-release           3.0-18.azl3           rpm     
distroless-packages-minimal  3.0-5.azl3            rpm     
filesystem                   1.1-21.azl3           rpm     
glibc                        2.38                  rpm     
glibc                        2.38-7.azl3           rpm     
libgcc                       13.2.0-7.azl3         rpm     
libstdc++                    13.2.0-7.azl3         rpm     
openssl                      3.3.0                 rpm     
openssl-libs                 3.3.0-2.azl3          rpm     
prebuilt-ca-certificates     2501981:3.0.0-7.azl3  rpm     
tzdata                       2024a-1.azl3          rpm     
zlib                         1.3.1                 rpm     
zlib                         1.3.1-1.azl3          rpm

syft mcr.microsoft.com/dotnet/runtime-deps:9.0.0-rc.1-azurelinux3.0-distroless:

   ├── ✔ Packages                        [11 packages]  
   └── ✔ Executables                     [42 executables]  
NAME                         VERSION               TYPE   
azurelinux-release           3.0-18.azl3           rpm     
distroless-packages-minimal  3.0-5.azl3            rpm     
filesystem                   1.1-21.azl3           rpm     
glibc                        2.38                  rpm     
glibc                        2.38-7.azl3           rpm     
libgcc                       13.2.0-7.azl3         rpm     
libstdc++                    13.2.0-7.azl3         rpm     
openssl                      3.3.0                 rpm     
openssl-libs                 3.3.0-2.azl3          rpm     
prebuilt-ca-certificates     2501981:3.0.0-7.azl3  rpm     
tzdata                       2024a-1.azl3          rpm

1 package has been removed: zlib for the -azurelinux3.0-distroless <--

syft mcr.microsoft.com/dotnet/nightly/runtime-deps:8.0.8-azurelinux3.0-distroless-aot:

   ├── ✔ Packages                        [12 packages]  
   └── ✔ Executables                     [42 executables]  
NAME                         VERSION               TYPE   
azurelinux-release           3.0-18.azl3           rpm     
distroless-packages-minimal  3.0-5.azl3            rpm     
filesystem                   1.1-21.azl3           rpm     
glibc                        2.38                  rpm     
glibc                        2.38-7.azl3           rpm     
libgcc                       13.2.0-7.azl3         rpm     
openssl                      3.3.0                 rpm     
openssl-libs                 3.3.0-2.azl3          rpm     
prebuilt-ca-certificates     2501981:3.0.0-7.azl3  rpm     
tzdata                       2024a-1.azl3          rpm     
zlib                         1.3.1                 rpm     
zlib                         1.3.1-1.azl3          rpm

syft mcr.microsoft.com/dotnet/nightly/runtime-deps:9.0.0-rc.1-azurelinux3.0-distroless-aot:

   ├── ✔ Packages                        [10 packages]  
   └── ✔ Executables                     [41 executables]  
NAME                         VERSION               TYPE   
azurelinux-release           3.0-18.azl3           rpm     
distroless-packages-minimal  3.0-5.azl3            rpm     
filesystem                   1.1-21.azl3           rpm     
glibc                        2.38                  rpm     
glibc                        2.38-7.azl3           rpm     
libgcc                       13.2.0-7.azl3         rpm     
openssl                      3.3.0                 rpm     
openssl-libs                 3.3.0-2.azl3          rpm     
prebuilt-ca-certificates     2501981:3.0.0-7.azl3  rpm     
tzdata                       2024a-1.azl3          rpm

2 packages have been removed: zlib for the -azurelinux3.0-distroless-aot <--

syft registry.access.redhat.com/ubi8/dotnet-80-runtime:

   ├── ✔ Packages                        [420 packages]  
   ├── ✔ File digests                    [2,499 files]  
   ├── ✔ File metadata                   [2,499 locations]  
   └── ✔ Executables                     [604 executables] 
... redacted because not using `runtime-deps`...

syft cgr.dev/chainguard/dotnet-runtime:

   ├── ✔ Packages                        [185 packages]  
   ├── ✔ File digests                    [351 files]  
   ├── ✔ File metadata                   [351 locations]  
   └── ✔ Executables                     [241 executables]
... redacted because not using `runtime-deps`...

syft registry.suse.com/bci/dotnet-runtime:8.0:

   ├── ✔ Packages                        [325 packages]  
   ├── ✔ File digests                    [2,401 files]  
   ├── ✔ File metadata                   [2,401 locations]  
   └── ✔ Executables                     [721 executables] 
... redacted because not using `runtime-deps`...

Current CVEs (as of 2024-09-13)

trivy image mcr.microsoft.com/dotnet/nightly/runtime-deps:8.0.8-noble-chiseled-aot:

Total: 13 (UNKNOWN: 0, LOW: 9, MEDIUM: 4, HIGH: 0, CRITICAL: 0)

┌────────────┬────────────────┬──────────┬──────────┬───────────────────┬───────────────────┬─────────────────────────────────────────────────────────────┐
│  Library   │ Vulnerability  │ Severity │  Status  │ Installed Version │   Fixed Version   │                            Title                            │
├────────────┼────────────────┼──────────┼──────────┼───────────────────┼───────────────────┼─────────────────────────────────────────────────────────────┤
│ libc6      │ CVE-2016-20013 │ LOW      │ affected │ 2.39-0ubuntu8.2   │                   │ sha256crypt and sha512crypt through 0.6 allow attackers to  │
│            │                │          │          │                   │                   │ cause a denial of...                                        │
│            │                │          │          │                   │                   │ https://avd.aquasec.com/nvd/cve-2016-20013                  │
├────────────┼────────────────┼──────────┤          ├───────────────────┼───────────────────┼─────────────────────────────────────────────────────────────┤
│ libssl3t64 │ CVE-2024-41996 │ MEDIUM   │          │ 3.0.13-0ubuntu3.1 │                   │ openssl: remote attackers (from the client side) to trigger │
│            │                │          │          │                   │                   │ unnecessarily expensive server-side...                      │
│            │                │          │          │                   │                   │ https://avd.aquasec.com/nvd/cve-2024-41996                  │
│            ├────────────────┤          ├──────────┤                   ├───────────────────┼─────────────────────────────────────────────────────────────┤
│            │ CVE-2024-6119  │          │ fixed    │                   │ 3.0.13-0ubuntu3.4 │ openssl: Possible denial of service in X.509 name checks    │
│            │                │          │          │                   │                   │ https://avd.aquasec.com/nvd/cve-2024-6119                   │
│            ├────────────────┼──────────┤          │                   ├───────────────────┼─────────────────────────────────────────────────────────────┤
│            │ CVE-2024-2511  │ LOW      │          │                   │ 3.0.13-0ubuntu3.2 │ openssl: Unbounded memory growth with session handling in   │
│            │                │          │          │                   │                   │ TLSv1.3                                                     │
│            │                │          │          │                   │                   │ https://avd.aquasec.com/nvd/cve-2024-2511                   │
│            ├────────────────┤          │          │                   │                   ├─────────────────────────────────────────────────────────────┤
│            │ CVE-2024-4603  │          │          │                   │                   │ openssl: Excessive time spent checking DSA keys and         │
│            │                │          │          │                   │                   │ parameters                                                  │
│            │                │          │          │                   │                   │ https://avd.aquasec.com/nvd/cve-2024-4603                   │
│            ├────────────────┤          │          │                   │                   ├─────────────────────────────────────────────────────────────┤
│            │ CVE-2024-4741  │          │          │                   │                   │ openssl: Use After Free with SSL_free_buffers               │
│            │                │          │          │                   │                   │ https://avd.aquasec.com/nvd/cve-2024-4741                   │
│            ├────────────────┤          │          │                   │                   ├─────────────────────────────────────────────────────────────┤
│            │ CVE-2024-5535  │          │          │                   │                   │ openssl: SSL_select_next_proto buffer overread              │
│            │                │          │          │                   │                   │ https://avd.aquasec.com/nvd/cve-2024-5535                   │
├────────────┼────────────────┼──────────┼──────────┤                   ├───────────────────┼─────────────────────────────────────────────────────────────┤
│ openssl    │ CVE-2024-41996 │ MEDIUM   │ affected │                   │                   │ openssl: remote attackers (from the client side) to trigger │
│            │                │          │          │                   │                   │ unnecessarily expensive server-side...                      │
│            │                │          │          │                   │                   │ https://avd.aquasec.com/nvd/cve-2024-41996                  │
│            ├────────────────┤          ├──────────┤                   ├───────────────────┼─────────────────────────────────────────────────────────────┤
│            │ CVE-2024-6119  │          │ fixed    │                   │ 3.0.13-0ubuntu3.4 │ openssl: Possible denial of service in X.509 name checks    │
│            │                │          │          │                   │                   │ https://avd.aquasec.com/nvd/cve-2024-6119                   │
│            ├────────────────┼──────────┤          │                   ├───────────────────┼─────────────────────────────────────────────────────────────┤
│            │ CVE-2024-2511  │ LOW      │          │                   │ 3.0.13-0ubuntu3.2 │ openssl: Unbounded memory growth with session handling in   │
│            │                │          │          │                   │                   │ TLSv1.3                                                     │
│            │                │          │          │                   │                   │ https://avd.aquasec.com/nvd/cve-2024-2511                   │
│            ├────────────────┤          │          │                   │                   ├─────────────────────────────────────────────────────────────┤
│            │ CVE-2024-4603  │          │          │                   │                   │ openssl: Excessive time spent checking DSA keys and         │
│            │                │          │          │                   │                   │ parameters                                                  │
│            │                │          │          │                   │                   │ https://avd.aquasec.com/nvd/cve-2024-4603                   │
│            ├────────────────┤          │          │                   │                   ├─────────────────────────────────────────────────────────────┤
│            │ CVE-2024-4741  │          │          │                   │                   │ openssl: Use After Free with SSL_free_buffers               │
│            │                │          │          │                   │                   │ https://avd.aquasec.com/nvd/cve-2024-4741                   │
│            ├────────────────┤          │          │                   │                   ├─────────────────────────────────────────────────────────────┤
│            │ CVE-2024-5535  │          │          │                   │                   │ openssl: SSL_select_next_proto buffer overread              │
│            │                │          │          │                   │                   │ https://avd.aquasec.com/nvd/cve-2024-5535                   │
└────────────┴────────────────┴──────────┴──────────┴───────────────────┴───────────────────┴─────────────────────────────────────────────────────────────┘

trivy image mcr.microsoft.com/dotnet/nightly/runtime-deps:9.0.0-rc.1-noble-chiseled-aot:

Total: 5 (UNKNOWN: 0, LOW: 1, MEDIUM: 4, HIGH: 0, CRITICAL: 0)

┌────────────┬────────────────┬──────────┬──────────┬───────────────────┬───────────────────┬─────────────────────────────────────────────────────────────┐
│  Library   │ Vulnerability  │ Severity │  Status  │ Installed Version │   Fixed Version   │                            Title                            │
├────────────┼────────────────┼──────────┼──────────┼───────────────────┼───────────────────┼─────────────────────────────────────────────────────────────┤
│ libc6      │ CVE-2016-20013 │ LOW      │ affected │ 2.39-0ubuntu8.2   │                   │ sha256crypt and sha512crypt through 0.6 allow attackers to  │
│            │                │          │          │                   │                   │ cause a denial of...                                        │
│            │                │          │          │                   │                   │ https://avd.aquasec.com/nvd/cve-2016-20013                  │
├────────────┼────────────────┼──────────┤          ├───────────────────┼───────────────────┼─────────────────────────────────────────────────────────────┤
│ libssl3t64 │ CVE-2024-41996 │ MEDIUM   │          │ 3.0.13-0ubuntu3.2 │                   │ openssl: remote attackers (from the client side) to trigger │
│            │                │          │          │                   │                   │ unnecessarily expensive server-side...                      │
│            │                │          │          │                   │                   │ https://avd.aquasec.com/nvd/cve-2024-41996                  │
│            ├────────────────┤          ├──────────┤                   ├───────────────────┼─────────────────────────────────────────────────────────────┤
│            │ CVE-2024-6119  │          │ fixed    │                   │ 3.0.13-0ubuntu3.4 │ openssl: Possible denial of service in X.509 name checks    │
│            │                │          │          │                   │                   │ https://avd.aquasec.com/nvd/cve-2024-6119                   │
├────────────┼────────────────┤          ├──────────┤                   ├───────────────────┼─────────────────────────────────────────────────────────────┤
│ openssl    │ CVE-2024-41996 │          │ affected │                   │                   │ openssl: remote attackers (from the client side) to trigger │
│            │                │          │          │                   │                   │ unnecessarily expensive server-side...                      │
│            │                │          │          │                   │                   │ https://avd.aquasec.com/nvd/cve-2024-41996                  │
│            ├────────────────┤          ├──────────┤                   ├───────────────────┼─────────────────────────────────────────────────────────────┤
│            │ CVE-2024-6119  │          │ fixed    │                   │ 3.0.13-0ubuntu3.4 │ openssl: Possible denial of service in X.509 name checks    │
│            │                │          │          │                   │                   │ https://avd.aquasec.com/nvd/cve-2024-6119                   │
└────────────┴────────────────┴──────────┴──────────┴───────────────────┴───────────────────┴─────────────────────────────────────────────────────────────┘

trivy image mcr.microsoft.com/dotnet/runtime-deps:9.0.0-rc.1-azurelinux3.0-distroless:

Total: 0 (UNKNOWN: 0, LOW: 0, MEDIUM: 0, HIGH: 0, CRITICAL: 0)

trivy image mcr.microsoft.com/dotnet/runtime-deps:8.0.8-azurelinux3.0-distroless:

Total: 0 (UNKNOWN: 0, LOW: 0, MEDIUM: 0, HIGH: 0, CRITICAL: 0)

trivy image registry.access.redhat.com/ubi8/dotnet-80-runtime:

Total: 88 (UNKNOWN: 0, LOW: 71, MEDIUM: 17, HIGH: 0, CRITICAL: 0)
...redacted for brevity...

trivy image cgr.dev/chainguard/dotnet-runtime:

Total: 0 (UNKNOWN: 0, LOW: 0, MEDIUM: 0, HIGH: 0, CRITICAL: 0)

trivy image registry.suse.com/bci/dotnet-runtime:8.0:

Total: 0 (UNKNOWN: 0, LOW: 0, MEDIUM: 0, HIGH: 0, CRITICAL: 0)

--> mcr.microsoft.com/dotnet/nightly/runtime-deps:9.0.0-rc.1-noble-chiseled-aot has 5 CVEs (1 LOW and 4 MEDIUM) while chainguard/dotnet-runtime, -azurelinux3.0-distroless and registry.suse.com/bci/dotnet-runtime have 0 CVEs, that's their strength, that's for sure. registry.access.redhat.com/ubi8/dotnet-80-runtime has 88 CVEs though. <--

Conclusion

I'm still using -noble-chiseled-aot but I'm really wondering if I should switch to -azurelinux3.0-distroless-aot, for different reasons:

  • They both support dotnet/runtime-deps (for self-contained or AOT apps);
  • They both support .NET 9 RC-1 (yeah, I know, not LTS yet);
  • They both support AOT;
  • They both have less packages: just 8 for -noble-chiseled-aot and 11 for -azurelinux3.0-distroless-aot;
  • They both have a small size: just 11.6MB for -noble-chiseled-aot and 21.4MB for -azurelinux3.0-distroless-aot (just 9.8MB between both, that's nothing);
  • -noble-chiseled-aot has 5 CVEs (1 LOW and 4 MEDIUM) while chainguard/dotnet-runtime, -azurelinux3.0-distroless, -azurelinux3.0-distroless-aot and registry.suse.com/bci/dotnet-runtime have 0 CVEs.

With all of that being said, and knowing that both are the two official distroless of the .NET container images, I think -azurelinux3.0-distroless-aot is the most appealing here. That's why I think I will soon move to -azurelinux3.0-distroless-aot from -noble-chiseled-aot.

@mathieu-benoit mathieu-benoit changed the title Update Dockerfile - 9.0.100-rc.1 .NET 9 Sep 3, 2024
@mathieu-benoit mathieu-benoit marked this pull request as draft September 3, 2024 23:32
@mathieu-benoit
Copy link
Owner Author

mathieu-benoit commented Sep 3, 2024

Getting this error:

#11 0.878   Determining projects to restore...
#11 1.731 /app/my-sample-app.csproj : error NU1102: Unable to find package Microsoft.DotNet.ILCompiler with version (>= 9.0.0-rc.1.24421.1)
#11 1.731 /app/my-sample-app.csproj : error NU1102:   - Found 53 version(s) in nuget.org [ Nearest version: 9.0.0-preview.7.24405.7 ]
#11 1.731 /app/my-sample-app.csproj : error NU1102: Unable to find package Microsoft.NET.ILLink.Tasks with version (>= 9.0.0-rc.1.24421.1)
#11 1.731 /app/my-sample-app.csproj : error NU1102:   - Found 30 version(s) in nuget.org [ Nearest version: 9.0.0-preview.7.24405.7 ]
#11 1.732 /app/my-sample-app.csproj : error NU1102: Unable to find package Microsoft.NETCore.App.Runtime.linux-x64 with version (= 9.0.0-rc.1.24421.1)
#11 1.732 /app/my-sample-app.csproj : error NU1102:   - Found 170 version(s) in nuget.org [ Nearest version: 9.0.0-preview.7.24405.7 ]
#11 1.732 /app/my-sample-app.csproj : error NU1102: Unable to find package runtime.linux-x64.Microsoft.DotNet.ILCompiler with version (= 9.0.0-rc.1.24421.1)
#11 1.732 /app/my-sample-app.csproj : error NU1102:   - Found 53 version(s) in nuget.org [ Nearest version: 9.0.0-preview.7.24405.7 ]
#11 1.732 /app/my-sample-app.csproj : error NU1102: Unable to find package Microsoft.AspNetCore.App.Runtime.linux-x64 with version (= 9.0.0-rc.1.24416.6)
#11 1.732 /app/my-sample-app.csproj : error NU1102:   - Found 170 version(s) in nuget.org [ Nearest version: 9.0.0-preview.7.24406.2 ]
#11 1.762   Failed to restore /app/my-sample-app.csproj (in 564 ms).
#11 ERROR: process "/bin/sh -c dotnet restore my-sample-app.csproj     -r linux-x64" did not complete successfully: exit code: 1
failed to solve: process "/bin/sh -c dotnet restore my-sample-app.csproj     -r linux-x64" did not complete successfully: exit code: 1
------
 > [my-sample-workload-my-sample-container builder 4/6] RUN dotnet restore my-sample-app.csproj     -r linux-x64:
1.731 /app/my-sample-app.csproj : error NU1102:   - Found 53 version(s) in nuget.org [ Nearest version: 9.0.0-preview.7.24405.7 ]
1.731 /app/my-sample-app.csproj : error NU1102: Unable to find package Microsoft.NET.ILLink.Tasks with version (>= 9.0.0-rc.1.24421.1)
1.731 /app/my-sample-app.csproj : error NU1102:   - Found 30 version(s) in nuget.org [ Nearest version: 9.0.0-preview.7.24405.7 ]
1.732 /app/my-sample-app.csproj : error NU1102: Unable to find package Microsoft.NETCore.App.Runtime.linux-x64 with version (= 9.0.0-rc.1.24421.1)
1.732 /app/my-sample-app.csproj : error NU1102:   - Found 170 version(s) in nuget.org [ Nearest version: 9.0.0-preview.7.24405.7 ]
1.732 /app/my-sample-app.csproj : error NU1102: Unable to find package runtime.linux-x64.Microsoft.DotNet.ILCompiler with version (= 9.0.0-rc.1.24421.1)
1.732 /app/my-sample-app.csproj : error NU1102:   - Found 53 version(s) in nuget.org [ Nearest version: 9.0.0-preview.7.24405.7 ]
1.732 /app/my-sample-app.csproj : error NU1102: Unable to find package Microsoft.AspNetCore.App.Runtime.linux-x64 with version (= 9.0.0-rc.1.24416.6)
1.732 /app/my-sample-app.csproj : error NU1102:   - Found 170 version(s) in nuget.org [ Nearest version: 9.0.0-preview.7.24406.2 ]
1.762   Failed to restore /app/my-sample-app.csproj (in 564 ms).

RC-1 is not yet official, so let's use Preview-7 for now?

@mathieu-benoit mathieu-benoit changed the title .NET 9 .NET 9 RC 1 Sep 11, 2024
@mathieu-benoit
Copy link
Owner Author

mathieu-benoit commented Sep 11, 2024

RC 1 is now official: https://devblogs.microsoft.com/dotnet/dotnet-9-release-candidate-1-is-now-available/, fixing the previous issue.

Copy link

Deployment successfully completed for PR-149! 🎉

View in Humanitec

Deployment ID: 17f453a59a51a9e3

URLs:

my-sample-workload: helloworld-preview.endpoints.mathieu-benoit-gcp.cloud.goog

Deployment diff

Deployment diff:

{
  "modules": {
    "add": null,
    "remove": [],
    "update": {
      "my-sample-workload": [
        {
          "from": "",
          "op": "replace",
          "path": "/spec/containers/my-sample-container/image",
          "value": "us-east4-docker.pkg.dev/mathieu-benoit-gcp/containers/my-sample-workload@sha256:7524e6a556784eb1f181867b2946e181922fd08332d89296758d687f2d01f7ff"
        },
        {
          "from": "",
          "op": "replace",
          "path": "/spec/annotations/humanitec.io~1workload-source",
          "value": "https://github.com/mathieu-benoit/sail-sharp/blob/mathieu-benoit-patch-1/score/score.yaml"
        }
      ]
    }
  },
  "shared": null
}
Active Resources Usage

Active Resources Usage:


ResType            	Class  	ResID                                     	Usage         	Last referencing deployment	Last referencing deployment created ago
agent              	default	agent                                     	current deploy	17f453a59a51a9e3           	43.988529493s                          
base-env           	default	base-env                                  	current deploy	17f453a59a51a9e3           	43.988532639s                          
k8s-cluster        	default	k8s-cluster                               	current deploy	17f453a59a51a9e3           	43.988534903s                          
k8s-namespace      	default	k8s-namespace                             	current deploy	17f453a59a51a9e3           	43.988536877s                          
logging            	default	logging                                   	current deploy	17f453a59a51a9e3           	43.98853861s                           
k8s-service-account	default	modules.my-sample-workload                	current deploy	17f453a59a51a9e3           	43.988540373s                          
workload           	default	modules.my-sample-workload                	current deploy	17f453a59a51a9e3           	43.988542177s                          
dns                	default	modules.my-sample-workload.externals.dns  	current deploy	17f453a59a51a9e3           	43.98854391s                           
ingress            	default	modules.my-sample-workload.externals.dns  	current deploy	17f453a59a51a9e3           	43.988545733s                          
tls-cert           	default	modules.my-sample-workload.externals.dns  	current deploy	17f453a59a51a9e3           	43.988547376s                          
route              	default	modules.my-sample-workload.externals.route	current deploy	17f453a59a51a9e3           	43.98854925s                           

Resources Graph

Resources Graph:

Use a Graphviz viewer for a visual representation.


strict digraph {

	label="Resource Graph
app: my-sample-app, env: pr-149

green: virtual nodes (environment, workloads), blue: active resources

";

	labelloc="t";

	overlap="false";

	splines="true";


	"my-sample-workload" [ color="2", colorscheme="greens3", fillcolor="1", label="workload.my-sample-workload", style="filled",  weight=0 ];

	"my-sample-workload" -> "base" [  weight=0 ];

	"my-sample-workload" -> "4ade3e26822e7beffda0f3102e193bc2308ad029" [  weight=0 ];

	"1b1a0eb26ef099f230ed0ca03b8ff8344e46f680" [ color="2", colorscheme="blues3", fillcolor="1", label="id: base-env
type: base-env
class: default
provision time: 16.445948s", style="filled", tooltip="guresid: 1b1a0eb26ef099f230ed0ca03b8ff8344e46f680",  weight=0 ];

	"9a224c2a03f357fd6121bfc0e8f3efa20f8c117f" [ color="2", colorscheme="blues3", fillcolor="1", label="id: modules.my-sample-workload.externals.route
type: route
class: default
provision time: 12.951354s", style="filled", tooltip="guresid: 9a224c2a03f357fd6121bfc0e8f3efa20f8c117f",  weight=0 ];

	"155de896cfd07b00f1f4ca3c34b45b99dec74812" [ color="2", colorscheme="blues3", fillcolor="1", label="id: modules.my-sample-workload
type: k8s-service-account
class: default
provision time: 7.963703s", style="filled", tooltip="guresid: 155de896cfd07b00f1f4ca3c34b45b99dec74812",  weight=0 ];

	"base" [ color="2", colorscheme="greens3", fillcolor="1", label="base", style="filled",  weight=0 ];

	"base" -> "1b1a0eb26ef099f230ed0ca03b8ff8344e46f680" [  weight=0 ];

	"4ade3e26822e7beffda0f3102e193bc2308ad029" [ color="2", colorscheme="blues3", fillcolor="1", label="id: modules.my-sample-workload
type: workload
class: default
provision time: 3.672253s", style="filled", tooltip="guresid: 4ade3e26822e7beffda0f3102e193bc2308ad029",  weight=0 ];

	"4ade3e26822e7beffda0f3102e193bc2308ad029" -> "155de896cfd07b00f1f4ca3c34b45b99dec74812" [  weight=0 ];

	"4ade3e26822e7beffda0f3102e193bc2308ad029" -> "9a224c2a03f357fd6121bfc0e8f3efa20f8c117f" [  weight=0 ];

	"4ade3e26822e7beffda0f3102e193bc2308ad029" -> "a8859b9f02de2ac6160cc56a5180b288ba8b30c7" [  weight=0 ];

	"f66b7e820bfc3a8efa481eac48c9c0029c790cb9" [ color="2", colorscheme="blues3", fillcolor="1", label="id: modules.my-sample-workload.externals.dns
type: ingress
class: default
provision time: 803.784ms", style="filled", tooltip="guresid: f66b7e820bfc3a8efa481eac48c9c0029c790cb9",  weight=0 ];

	"f66b7e820bfc3a8efa481eac48c9c0029c790cb9" -> "3ef29de7337ac9a5142ffb43b00637ec820a6e12" [  weight=0 ];

	"f66b7e820bfc3a8efa481eac48c9c0029c790cb9" -> "a8859b9f02de2ac6160cc56a5180b288ba8b30c7" [  weight=0 ];

	"a8859b9f02de2ac6160cc56a5180b288ba8b30c7" [ color="2", colorscheme="blues3", fillcolor="1", label="id: modules.my-sample-workload.externals.dns
type: dns
class: default
provision time: 9.157295s", style="filled", tooltip="guresid: a8859b9f02de2ac6160cc56a5180b288ba8b30c7",  weight=0 ];

	"3ef29de7337ac9a5142ffb43b00637ec820a6e12" [ color="2", colorscheme="blues3", fillcolor="1", label="id: modules.my-sample-workload.externals.dns
type: tls-cert
class: default
provision time: 3.620601s", style="filled", tooltip="guresid: 3ef29de7337ac9a5142ffb43b00637ec820a6e12",  weight=0 ];

	"3ef29de7337ac9a5142ffb43b00637ec820a6e12" -> "a8859b9f02de2ac6160cc56a5180b288ba8b30c7" [  weight=0 ];

}


@mathieu-benoit mathieu-benoit marked this pull request as ready for review September 11, 2024 23:17
@mathieu-benoit mathieu-benoit merged commit ffd7a66 into main Sep 11, 2024
2 checks passed
@mathieu-benoit mathieu-benoit deleted the mathieu-benoit-patch-1 branch September 11, 2024 23:23
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant