зеркало из https://github.com/Azure/ARO-RP.git
Development subscription migration
This commit is contained in:
Родитель
17ff475d64
Коммит
8acace0bd4
8
Makefile
8
Makefile
|
@ -179,6 +179,14 @@ test-python: pyenv az
|
||||||
|
|
||||||
admin.kubeconfig:
|
admin.kubeconfig:
|
||||||
hack/get-admin-kubeconfig.sh /subscriptions/${AZURE_SUBSCRIPTION_ID}/resourceGroups/${RESOURCEGROUP}/providers/Microsoft.RedHatOpenShift/openShiftClusters/${CLUSTER} >admin.kubeconfig
|
hack/get-admin-kubeconfig.sh /subscriptions/${AZURE_SUBSCRIPTION_ID}/resourceGroups/${RESOURCEGROUP}/providers/Microsoft.RedHatOpenShift/openShiftClusters/${CLUSTER} >admin.kubeconfig
|
||||||
|
$(MAKE) update-admin.kubeconfig
|
||||||
|
|
||||||
|
# ! Temporary solution till dns can be migrated to new subscription
|
||||||
|
PUBLIC_IP_ADDR = $(shell az network dns record-set a show -g ${RESOURCEGROUP} --zone-name ${LOCATION}.${PARENT_DOMAIN_NAME} -n api.${CLUSTER} --query "aRecords[0].ipv4Address" -o tsv)
|
||||||
|
PUBLIC_IP_FQDN = $(shell az network dns record-set a show -g ${RESOURCEGROUP} --zone-name ${LOCATION}.${PARENT_DOMAIN_NAME} -n api.${CLUSTER} --query fqdn -o tsv)
|
||||||
|
update-admin.kubeconfig:
|
||||||
|
sudo -- sh -c -e "echo '$(PUBLIC_IP_ADDR) ${PUBLIC_IP_FQDN}' >> /etc/hosts";
|
||||||
|
|
||||||
|
|
||||||
vendor:
|
vendor:
|
||||||
# See comments in the script for background on why we need it
|
# See comments in the script for background on why we need it
|
||||||
|
|
|
@ -241,7 +241,7 @@
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "[concat(take(resourceGroup().name,15), '-sharedKV')]",
|
"name": "[concat(take(resourceGroup().name,10), '-dev-sharedKV')]",
|
||||||
"type": "Microsoft.KeyVault/vaults",
|
"type": "Microsoft.KeyVault/vaults",
|
||||||
"location": "[resourceGroup().location]",
|
"location": "[resourceGroup().location]",
|
||||||
"properties": {
|
"properties": {
|
||||||
|
@ -261,16 +261,16 @@
|
||||||
"kty": "RSA",
|
"kty": "RSA",
|
||||||
"keySize": 4096
|
"keySize": 4096
|
||||||
},
|
},
|
||||||
"name": "[concat(concat(take(resourceGroup().name,15), '-sharedKV'), '/', concat(resourceGroup().name, '-disk-encryption-key'))]",
|
"name": "[concat(concat(take(resourceGroup().name,10), '-dev-sharedKV'), '/', concat(resourceGroup().name, '-disk-encryption-key'))]",
|
||||||
"type": "Microsoft.KeyVault/vaults/keys",
|
"type": "Microsoft.KeyVault/vaults/keys",
|
||||||
"location": "[resourceGroup().location]",
|
"location": "[resourceGroup().location]",
|
||||||
"apiVersion": "2019-09-01",
|
"apiVersion": "2019-09-01",
|
||||||
"dependsOn": [
|
"dependsOn": [
|
||||||
"[resourceId('Microsoft.KeyVault/vaults', concat(take(resourceGroup().name,15), '-sharedKV'))]"
|
"[resourceId('Microsoft.KeyVault/vaults', concat(take(resourceGroup().name,10), '-dev-sharedKV'))]"
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "[concat(concat(take(resourceGroup().name,15), '-sharedKV'), '/add')]",
|
"name": "[concat(concat(take(resourceGroup().name,10), '-dev-sharedKV'), '/add')]",
|
||||||
"type": "Microsoft.KeyVault/vaults/accessPolicies",
|
"type": "Microsoft.KeyVault/vaults/accessPolicies",
|
||||||
"location": "[resourceGroup().location]",
|
"location": "[resourceGroup().location]",
|
||||||
"properties": {
|
"properties": {
|
||||||
|
@ -300,9 +300,9 @@
|
||||||
"properties": {
|
"properties": {
|
||||||
"activeKey": {
|
"activeKey": {
|
||||||
"sourceVault": {
|
"sourceVault": {
|
||||||
"id": "[resourceId('Microsoft.KeyVault/vaults', concat(take(resourceGroup().name,15), '-sharedKV'))]"
|
"id": "[resourceId('Microsoft.KeyVault/vaults', concat(take(resourceGroup().name,10), '-dev-sharedKV'))]"
|
||||||
},
|
},
|
||||||
"keyUrl": "[reference(resourceId('Microsoft.KeyVault/vaults/keys', concat(take(resourceGroup().name,15), '-sharedKV'), concat(resourceGroup().name, '-disk-encryption-key')), '2019-09-01', 'Full').properties.keyUriWithVersion]"
|
"keyUrl": "[reference(resourceId('Microsoft.KeyVault/vaults/keys', concat(take(resourceGroup().name,10), '-dev-sharedKV'), concat(resourceGroup().name, '-disk-encryption-key')), '2019-09-01', 'Full').properties.keyUriWithVersion]"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
"name": "[concat(resourceGroup().name, '-disk-encryption-set')]",
|
"name": "[concat(resourceGroup().name, '-disk-encryption-set')]",
|
||||||
|
@ -310,7 +310,7 @@
|
||||||
"location": "[resourceGroup().location]",
|
"location": "[resourceGroup().location]",
|
||||||
"apiVersion": "2020-12-01",
|
"apiVersion": "2020-12-01",
|
||||||
"dependsOn": [
|
"dependsOn": [
|
||||||
"[resourceId('Microsoft.KeyVault/vaults/keys', concat(take(resourceGroup().name,15), '-sharedKV'), concat(resourceGroup().name, '-disk-encryption-key'))]"
|
"[resourceId('Microsoft.KeyVault/vaults/keys', concat(take(resourceGroup().name,10), '-dev-sharedKV'), concat(resourceGroup().name, '-disk-encryption-key'))]"
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -46,7 +46,7 @@
|
||||||
shared development environment secrets and save them in `secrets`:
|
shared development environment secrets and save them in `secrets`:
|
||||||
|
|
||||||
```bash
|
```bash
|
||||||
SECRET_SA_ACCOUNT_NAME=rharosecrets make secrets
|
SECRET_SA_ACCOUNT_NAME=rharosecretsdev make secrets
|
||||||
```
|
```
|
||||||
|
|
||||||
1. Copy, edit (if necessary) and source your environment file. The required
|
1. Copy, edit (if necessary) and source your environment file. The required
|
||||||
|
|
Различия файлов скрыты, потому что одна или несколько строк слишком длинны
|
@ -509,11 +509,11 @@ rm cron
|
||||||
}
|
}
|
||||||
|
|
||||||
const (
|
const (
|
||||||
sharedKeyVaultName = "concat(take(resourceGroup().name,15), '" + SharedKeyVaultNameSuffix + "')"
|
sharedKeyVaultName = "concat(take(resourceGroup().name,10), '" + SharedKeyVaultNameSuffix + "')"
|
||||||
sharedDiskEncryptionSetName = "concat(resourceGroup().name, '" + SharedDiskEncryptionSetNameSuffix + "')"
|
sharedDiskEncryptionSetName = "concat(resourceGroup().name, '" + SharedDiskEncryptionSetNameSuffix + "')"
|
||||||
sharedDiskEncryptionKeyName = "concat(resourceGroup().name, '-disk-encryption-key')"
|
sharedDiskEncryptionKeyName = "concat(resourceGroup().name, '-disk-encryption-key')"
|
||||||
|
// Conflicts with current development subscription. cannot have two keyvaults with same name
|
||||||
SharedKeyVaultNameSuffix = "-sharedKV"
|
SharedKeyVaultNameSuffix = "-dev-sharedKV"
|
||||||
SharedDiskEncryptionSetNameSuffix = "-disk-encryption-set"
|
SharedDiskEncryptionSetNameSuffix = "-disk-encryption-set"
|
||||||
)
|
)
|
||||||
|
|
||||||
|
|
|
@ -178,10 +178,10 @@ func (c *Cluster) Create(ctx context.Context, vnetResourceGroup, clusterName str
|
||||||
}
|
}
|
||||||
|
|
||||||
var kvName string
|
var kvName string
|
||||||
if len(vnetResourceGroup) > 15 {
|
if len(vnetResourceGroup) > 10 {
|
||||||
// keyvault names need to have a maximum length of 24,
|
// keyvault names need to have a maximum length of 24,
|
||||||
// so we need to cut off some chars if the resource group name is too long
|
// so we need to cut off some chars if the resource group name is too long
|
||||||
kvName = vnetResourceGroup[:15] + generator.SharedKeyVaultNameSuffix
|
kvName = vnetResourceGroup[:10] + generator.SharedKeyVaultNameSuffix
|
||||||
} else {
|
} else {
|
||||||
kvName = vnetResourceGroup + generator.SharedKeyVaultNameSuffix
|
kvName = vnetResourceGroup + generator.SharedKeyVaultNameSuffix
|
||||||
}
|
}
|
||||||
|
|
Загрузка…
Ссылка в новой задаче