Граф коммитов

7164 Коммитов

Автор SHA1 Сообщение Дата
Tanmay Satam 53565baeae
Move linting steps to GitHub Actions (#3869)
* Remove go build/unittest steps

These are performed in the ADO "CI" pipeline.

* Merge golint steps into ci-go workflow

* Add new ci-python workflow

This currently contains an equivalent copy of the Lint_Az_ARO_Extension step in the ADO CI pipeline.

* Remove Lint_Az_ARO_Extension from ADO CI pipeline

* Update build/test step in CI pipeline to reflect current steps

Co-authored-by: Kipp Morris <117932707+kimorris27@users.noreply.github.com>

---------

Co-authored-by: Kipp Morris <117932707+kimorris27@users.noreply.github.com>
2024-10-02 14:23:53 -04:00
Amber Brown 4cb12bb94b
Merge pull request #3875 from Azure/hawkowl/e2e-master-smoke-test
Don't run long-running regression tests on PRs
2024-10-02 09:15:49 +10:00
Amber Brown 24577b8c20
Merge pull request #3874 from Azure/hawkowl/e2e-no-chaining
Remove pipeline chaining from our E2E pipeline
2024-10-02 09:14:37 +10:00
Tanmay Satam 1365a79eb7 Update Hive Install process to put down boundSASigningKey secret if needed 2024-10-01 14:01:06 -04:00
Tanmay Satam be4a48a17e Add function to generate boundSASSigningKey Secret resource for Hive cluster deployment 2024-10-01 13:50:28 -04:00
Amber Brown 396adb0bc2 run regressiontests on CI (i.e. not PR runs) 2024-10-01 15:01:20 +10:00
Amber Brown f69705b7e1 add a regression test param which includes tests which we don't need to run every PR, but are still useful to run on master 2024-10-01 14:59:06 +10:00
Amber Brown 8beb68484f update to remove pipeline chaining from the CI, since it no longer auto-triggers and it duplicates all e2e builds 2024-10-01 13:44:13 +10:00
Hilliary Lipsig 817438f496
Merge pull request #3873 from fahlmant/add-tfahlman-code-owner
Add fahlmant as code owner! Hurray!
2024-09-30 13:28:00 -07:00
Taylor Fahlman eb88f75075 Add fahlmant as code owner 2024-09-30 10:12:37 -07:00
dependabot[bot] 851c9188ae
Bump rollup from 2.79.1 to 2.79.2 in /portal/v2 (#3868)
Bumps [rollup](https://github.com/rollup/rollup) from 2.79.1 to 2.79.2.
- [Release notes](https://github.com/rollup/rollup/releases)
- [Changelog](https://github.com/rollup/rollup/blob/master/CHANGELOG.md)
- [Commits](https://github.com/rollup/rollup/compare/v2.79.1...v2.79.2)

---
updated-dependencies:
- dependency-name: rollup
  dependency-type: indirect
...

Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-09-30 11:07:38 -04:00
Ayato Tokubi 84816de0e4
SDK2: Remove deprecated network sdk from e2e. (#3859)
* subnets
* remove deprecated security group usage from e2e setup
* remove deprecated interface sdk from e2e.
* remove deprecated loadbalancer sdk from e2e.
* remove deprecated virtual networks sdk from e2e.
* remove deprecated subnets sdk from e2e
2024-09-27 20:44:06 +02:00
Kipp Morris 7e77b101ce
Cluster MSI follow-up (#3864)
* Generate mocks for Azure clients added in cluster MSI PR

* Add other small changes in response to previous PR feedback:

- Get subscription ID from subscription doc instead of a platform MI
- Remove an unused mock controller
2024-09-26 16:35:08 -04:00
Hilliary Lipsig e985b50ffb
Merge pull request #3863 from Azure/kimorris27/ARO-4360-move-to-uber-mock-fork
Move to Uber mock/mockgen fork
2024-09-26 12:18:07 -07:00
Ben Vesel 7859644051
Remove podman network causing outbound latency (#3865) 2024-09-26 10:13:09 -04:00
kimorris27 7448b3db41 `make validate-go` to format stuff and make CI happy 2024-09-26 09:00:11 -05:00
kimorris27 d50158cd9c Properly generate mocks for two Azure cilents
Mocks for these interfaces were previously present, but if you remove them and make generate, they don't get replaced. I'm guessing that when they were added, the committer forgot to commit their changes to the generate.go files. This came to my attention as I was moving us over to the Uber fork because it caused errors while I was trying to get builds and unit tests working, so I codified the generation properly in this commit.
2024-09-26 09:00:11 -05:00
kimorris27 265d40155c Remove duplicated import of the Uber fork (leftover from the few minutes when we were using both repos at the same time 2024-09-26 09:00:11 -05:00
kimorris27 a06aa0a3d2 Use Go 1.21.13 instead of 1.21.11 (Uber mockgen needs >= 1.21.12) 2024-09-26 09:00:11 -05:00
kimorris27 086f532624 Replace all references to the golang mock repo with references to the
Uber fork, then `go mod tidy` and `go mod vendor`

Note the change to `deps.go`
2024-09-26 09:00:11 -05:00
kimorris27 c59263f816 Replace model.go dependency with Uber fork's version 2024-09-26 09:00:11 -05:00
kimorris27 c54b03cdb2 Have bingo install mockgen from the Uber fork 2024-09-26 09:00:11 -05:00
Shubhadapaithankar bfc155401d
Removed non-containerized stuff from the CI pipeline. (#3852)
* Removed non-containerized stuff from the CI pipeline.

* Kept the make generate check in the NotContainerized stage.

Kept the make generate check in the NotContainerized stage.

* removed the non-containerized Go block from the CI pipeline
2024-09-26 09:02:34 -04:00
Kipp Morris e3cec21b73
Lay groundwork for cluster MSI usage (#3757)
* Add a parameter for enabling Entra ID RBAC on key vaults
* Add an RP-level feature flag for determining whether to use the mock MSI RP
* Tweak the mock identity URL to play nicely with the mock MSI RP
* Add Azure SDK client wrappers for new clients (federated identity credentials control plane and key vault data plane)
* Vendor in new Azure SDK clients and update msi-dataplane

* Lay groundwork for use of cluster MSI...
- Initialize the MSI dataplane client, using the mock MSI RP/stub if
  appropriate
- Initialize key vault store client (for MSI certificates; functionality
  is implemented in MSI dataplane module)
- Create a cluster MSI certificate and store it in the key vault during
  cluster bootstrap
- Instantiate an Azure SDK FederatedIdentityCredential client using the
  cluster MSI certificate
- Delete the cluster MSI certificate as needed during cluster deletion

* Don't fail during cluster deletion if the cluster MSI certificate is
already gone from the key vault (or was potentially never created)

* Establish an RP-Config variable for the MSI RP endpoint

- Update doc comment for ensureClusterMsiCertificate
- Simplify conditional logic in MSI cert deletion

* Use pointer conversion functions that aren't deprecated

* Respond to PR comments (and fix some other things along the way)

- Move `clusterMsiResourceId` function to `OpenShiftCluster` type
- When persisting the MSI cert to KV, use the `NotAfter` returned by the MSI RP (for the stub, just use an arbitrary value)
- Move `getClientOptions` functionality to `AROEnvironment` type
- Move logic for determining cluster MSI key vault name to `pkg/env`
- Pull cloud name mapping stuff out to `AROEnvironment` type
- Update msi-dataplane module to include new changes and use `UserAssignedIdentities` type to get Azure credential in `pkg/cluster/clustermsi.go`
- Fix typo in https URL in comment in `pkg/cluster/delete.go`
- Implement suggestion to use `errors.As` instead of a type assertion in `pkg/cluster/delete.go`

* Update documentation with info about new feature flag

- Move new cluster MSI steps forward in bootstrap step order
- Move MSI dataplane client options stuff to pkg/env
- Explicitly check for a single cluster MSI in `ClusterMsiResourceId`
- Other small tweaks

* Vendor in msi-dataplane update that prevents a potential nil pointer dereference

* Add missing method to internal key vault client

* Make error messages more specific in ClusterMsiResourceId

* Add missing env vars to run-rp make target and uncomment dynamic validation bootstrap step

- In newly added Azure clients, return struct types instead of interface
  types
- Move cluster MSI certificate deletion to be after Azure resource
  deletion for safety just in case cx continues to use cluster that is
  in Failed/Deleting provisioning state

* Add new env vars for MIWI to env.example for clarity/completeness

* Turn check for nonzero number of user assigned identities into a utility function

* Use existing constant for key vault dns suffix
2024-09-24 08:14:56 -04:00
Ayato Tokubi e887b35655
[ARO-4665] SDK2: remove deprecated network SDK from purge.go (#3858)
* remove deprecated security group usage from purge

* remove deprecated private link services sdk from purge.go
2024-09-24 12:28:16 +10:00
Ayato Tokubi 35b2881aaa
Remove deprecated securityGroup client (#3853) 2024-09-20 18:26:16 +02:00
Ayato Tokubi b0518e7bb0
Update SDK to track2 in ensureGatewayCreate (#3616)
* use track2 sdk in ensureGatewayCreate
* delete unused fields in cluster
2024-09-20 17:42:00 +02:00
Ankur Singh dc2a28b1d2 Disable cosmosdb local auth 2024-09-20 13:04:56 +05:30
Shubhadapaithankar 0657f6aa5a
Shubhadapaithankar/aro-9323-cirp-mvp (#3799)
- Converted containerized CI process to use docker for ease of use in ADO
- Added stage to authenticate and push CI images to ACR
- Added support for extracting test results and coverage files from containerized build
2024-09-19 10:41:44 -06:00
Jory Horeman 68bc93250c
Scaffolding for CI environment setup in Azure (#3838)
* adding CI dev template files and scripts
2024-09-19 09:42:39 -06:00
Ayato Tokubi c75e175821
Merge pull request #3850 from Azure/hawkowl/fix-subscription-clean
Fix cleaning the gratis subscription
2024-09-19 17:29:34 +02:00
Amber Brown 4f583dd50e hopefully fix cleaning the subscription 2024-09-19 15:13:15 +10:00
Alex Chvatal 1a2096dfc4
ARO-9382 prevent updating existing platform identities (#3786)
* prevent updating existing platform identities

This adds a check to v20240812preview static validation that raises an
error if either the name or resource ID of an existing platform identity

* allow changing operator identity order

This allows changing the order of platform identities while still
preventing the resource ID and operator name from being changed

* additional platform identity update validation

This prevents removal of a platform identity or changing the identity's
OperatorName and ResourceID at the same time

* detect duplicate operator names in platform workload identity profiles

* use a map instead of a slice
2024-09-18 09:48:34 -04:00
Alex Chvatal bd47ae7abf
ARO-4639 update the operator master deployment to support workload identity (#3776)
* update the operator master deployment to support workload identity

This causes the spec for the operator master deployment to mount the
service account token as a volume, and maps the path to the environment
variable expected by Azure to support workload identities

* remove unused ExpectError value from test struct

* mount the token secret as a directory, not a file
2024-09-18 08:38:02 -04:00
Amber Brown 813de36fcb
Fix make aro build in onebranch (#3822)
* fix make aro build in onebranch
* add to bin
* fix it properly
* fix build properly by putting it in a pre-step
2024-09-18 13:32:36 +02:00
Ayato Tokubi c18b9244ae
Merge pull request #3839 from Azure/ehvs/troubleshooting-rp
Steps to resolve recurrent issues
2024-09-18 12:17:37 +02:00
Steven Fairchild aebd2bb504
Remove dnf cronjob (#3840)
* Remove dnf update cron job

Automatic OS Updates are configured. Updating packages via a cron job is no longer required.

* Remove certs arg from verify_role, Add/Remove comments

Certificate generation has been broken up into a named function for each VMSS role. This means it's no longer necessary to provide the certs=true argumenet when checking VMSS roles.

Add a comment for why AZURE_CLOUD_NAME returns an error if unset.
Remove az cli login comment from pull_container_images, it is no longer relevant after the last refactor.
2024-09-17 12:12:21 -07:00
Or Raz 8fdfa78b24
Fix env.example Default Values (#3827)
* Set Azure prefix and USER as optional at env.example

Follow up commit to use an Azure unique prefix for the Azure resources that ARO-RP is using instead of always fetching the USER. When AZURE_PREFIX env var is not set, then use the USER env var

* Use westeurope as default location

Don't override existed LOCATION env var when it is already set, and 'westeurope' as the default value
2024-09-17 09:17:45 -06:00
Rajdeep Chauhan 1e3f475416
ARO-4518 pass custom manifests(MIWI) to hive cluster deployment as secret (#3841)
* ARO-4518 pass custom manifests to hive cluster deployment as secret

* ARO-4518 add unit test cases
2024-09-17 10:30:45 -04:00
Shubhadapaithankar 4ba9270b2a
Remove loki/pipeline-swarm branch from pipeline and refactor for clarity (#3846) 2024-09-17 08:54:16 -04:00
Nont 87d18c11fb
[SFI] Fix CVE-2024-41110 (#3845)
* [SFI] Fix CVE-2024-41110
* Go mod verify with compat v1.21
2024-09-17 12:28:31 +10:00
Hilliary Lipsig 48ff446de4
Merge pull request #3837 from Azure/lranjbar/ARO-9990-etchosts-mimo-m0
ARO-9990: Update etchosts controller to use ForceReconcilation flag
2024-09-16 17:18:58 -07:00
Tanmay Satam 73bc5f68f3
MI/WI - Generate secrets for platform identities (#3802)
* Add secret location to PlatformWorkloadIdentityRoleSet

* Add generatePlatformWorkloadIdentitySecrets function

* Add mutable:true validate:required struct tags to SecretLocation fields on admin api

* Add functions for other required WI resources

* Remove redundant UsesWorkloadIdentity check from generatePlatformWorkloadIdentitySecrets

* Fix coordinates for static CCO secret; move static coordinate strings to const values

* Return resources as map (w/ filename as key) instead of list

* Explicitly set TypeMeta on workload identity resources

This is needed in order to easily serialize these resources to YAML,
e.g. when setting them as string values in a Secret map for Hive to use
as an install manifest. Not setting these values will result in them being
omitted from the resulting JSON/YAML.
2024-09-13 10:03:45 -04:00
Hevellyn ede36dfef2
Update docs/prepare-your-dev-environment.md
Co-authored-by: Ayato Tokubi <atokubi@redhat.com>
2024-09-13 15:31:12 +02:00
Hevellyn 2d640a81c2
Update docs/deploy-development-rp.md
Co-authored-by: Ayato Tokubi <atokubi@redhat.com>
2024-09-13 15:30:43 +02:00
Hevellyn b2bb4e18a4
Update docs/deploy-development-rp.md
Co-authored-by: Ayato Tokubi <atokubi@redhat.com>
2024-09-13 15:30:34 +02:00
Tony Schneider 9584d669b6
generalize secret storage deployment and update shared rp documentation (#3828)
* generalize secret storage account deployment template
* update secret storage deployment step
2024-09-13 18:14:38 +10:00
Hilliary Lipsig 9564d81f94
Merge pull request #3835 from stevekuznetsov/skuznets/bump-enumer
.bingo: use a fork of enumer for compat
2024-09-12 15:57:49 -07:00
Amber Brown 4d538c1503
Bump admin portal dependencies for Sept 24 (#3833)
* bump "send"

* update semver portal deps

* build portal
2024-09-12 13:58:30 -04:00
Ehvs 2fa480e7ed Steps to resolve recurrent issues 2024-09-12 18:59:23 +02:00