Skip to content

Commit 5526937

Browse files
authored
cleanup: removing all 1604/1804 logic (#6526)
1 parent ccbdd2a commit 5526937

File tree

1,827 files changed

+355
-2285894
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,827 files changed

+355
-2285894
lines changed

.github/README-RENOVATE.md

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -318,7 +318,6 @@ Depending on what kind of component you are going to onboard.
318318
Fore more details, you can refer to Readme-components linked at the beginning of this document.
319319

320320
- **Packages**: Now for datasource PMC (package.microsoft.com) we have 4 custom managers which will look up to the following 4 `defaultRegistryUrlTemplate`, based on different Ubuntu release, respectively.
321-
- https://packages.microsoft.com/ubuntu/18.04/prod/dists/bionic/main/binary-amd64/Packages
322321
- https://packages.microsoft.com/ubuntu/20.04/prod/dists/focal/main/binary-amd64/Packages
323322
- https://packages.microsoft.com/ubuntu/22.04/prod/dists/jammy/main/binary-amd64/Packages
324323
- https://packages.microsoft.com/ubuntu/24.04/prod/dists/noble/main/binary-amd64/Packages
@@ -536,7 +535,7 @@ PS C:\Users\devinwon\git\AgentBaker> npx renovate --platform=local --dry-run=tru
536535
You won't see any progress in the terminal because all the outputs are piped to the file. Just wait until the process completes.
537536
In the `output.txt` of my case, I found this,
538537
```
539-
"after": {"releases": {"version": "1.32.0-ubuntu18.04u3"}}
538+
"after": {"releases": {"version": "1.32.0-ubuntu24.04u3"}}
540539
DEBUG: Response has failed validation (repository=local)
541540
"err": {
542541
"message": "Schema error",
@@ -555,9 +554,9 @@ TRACE: Dependency lookup success (repository=local)
555554
]
556555
}
557556
```
558-
where `{"releases": {"version": "1.32.0-ubuntu18.04u3"}}` is not the format I want. The correct format should be
557+
where `{"releases": {"version": "1.32.0-ubuntu22.04u3"}}` is not the format I want. The correct format should be
559558
```
560-
{"releases": [{"version": "1.32.0-ubuntu18.04u3"}]}
559+
{"releases": [{"version": "1.32.0-ubuntu24.04u3"}]}
561560
```
562561
This demonstrates how to identify and debug issues in Renovate configurations.
563562

.pipelines/.vsts-Marketpalce-win.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@ name: $(Date:yyyyMMdd)$(Rev:.r)_$(Build.SourceBranchName)_$(BuildID)
22
trigger: none
33

44
pool:
5-
vmImage: ubuntu-18.04
5+
vmImage: ubuntu-24.04
66

77
variables:
88
CONTAINER_IMAGE: 'mcr.microsoft.com/oss/azcu/go-dev:v1.34.7'

aks-node-controller/parser/parser_test.go

Lines changed: 1 addition & 55 deletions
Original file line numberDiff line numberDiff line change
@@ -19,10 +19,6 @@ import (
1919
"github.com/stretchr/testify/require"
2020
)
2121

22-
// test certificate.
23-
const encodedTestCert = "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" //nolint:lll
24-
const testCertWithNewline = "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUgvVENDQmVXZ0F3SUJBZ0l\r\nRYUJZRTMvTTA4WEhZQ25OVm1jRkJjakFOQmdrcWhraUc5dzBCQVFzRkFEQnkKTVFzd0NRWURW\r\nUVFHRXdKVlV6RU9NQXdHQTFVRUNBd0ZWR1Y0WVhNeEVEQU9CZ05WQkFjTUIwaHZkWE4wYjI0\r\neApFVEFQQmdOVkJBb01DRk5UVENCRGIzSndNUzR3TEFZRFZRU\r\nUREQ1ZUVTB3dVkyOXRJRVZXSUZOVFRDQkpiblJsCmNtMWxaR2xoZEdVZ1EwRWdVbE5CSUZJek1CNFhEVEl3TURRd01UQXdOVGd6TTFvWERUSXhNRGN4TmpBd05UZ3oKTTFvd2diMHhDekFKQmdOVkJBWVRBbFZUTVE0d0RBWURWUVFJREFWVVpYaGhjekVRTUE0R0ExVUVCd3dIU0c5MQpjM1J2YmpFUk1BOEdBMVVFQ2d3SVUxTk1JRU52Y25BeEZqQVVCZ05WQkFVVERVNVdNakF3T0RFMk1UUXlORE14CkZEQVNCZ05WQkFNTUMzZDNkeTV6YzJ3dVkyOXRNUjB3R3dZRFZRUVBEQlJRY21sMllYUmxJRTl5WjJGdWFYcGgKZEdsdmJqRVhNQlVHQ3lzR0FRUUJnamM4QWdFQ0RBWk9aWFpoWkdFeEV6QVJCZ3NyQmdFRUFZSTNQQUlCQXhNQwpWVk13Z2dFaU1BMEdDU3FHU0liM0RRRUJBUVVBQTRJQkR3QXdnZ0VLQW9JQkFRREhoZVJrYmIxRkNjN3hSS3N0CndLMEpJR2FLWTh0N0piUzJiUTJiNllJSkRnbkh1SVlIcUJyQ1VWNzlvZWxpa2tva1JrRnZjdnBhS2luRkhEUUgKVXBXRUk2UlVFUlltU0NnM084V2k0MnVPY1YyQjVaYWJtWENrd2R4WTVFY2w1MUJiTThVbkdkb0FHYmRObWlSbQpTbVRqY3MrbGhNeGc0ZkZZNmxCcGlFVkZpR1VqR1JSKzYxUjY3THo2VTRLSmVMTmNDbTA3UXdGWUtCbXBpMDhnCmR5Z1N2UmRVdzU1Sm9wcmVkaitWR3RqVWtCNGhGVDRHUVgvZ2h0NjlSbHF6Lys4dTBkRVFraHVVdXVjcnFhbG0KU0d5NDNIUndCZkRLRndZZVdNN0NQTWQ1ZS9kTyt0MDh0OFBianpWVFR2NWhRRENzRVlJVjJUN0FGSTlTY054TQpraDcvQWdNQkFBR2pnZ05CTUlJRFBUQWZCZ05WSFNNRUdEQVdnQlMvd1ZxSC95ajZRVDM5dDAva0hhK2dZVmdwCnZUQi9CZ2dyQmdFRkJRY0JBUVJ6TUhFd1RRWUlLd1lCQlFVSE1BS0dRV2gwZEhBNkx5OTNkM2N1YzNOc0xtTnYKYlM5eVpYQnZjMmwwYjNKNUwxTlRUR052YlMxVGRXSkRRUzFGVmkxVFUwd3RVbE5CTFRRd09UWXRVak11WTNKMApNQ0FHQ0NzR0FRVUZCekFCaGhSb2RIUndPaTh2YjJOemNITXVjM05zTG1OdmJUQWZCZ05WSFJFRUdEQVdnZ3QzCmQzY3VjM05zTG1OdmJZSUhjM05zTG1OdmJUQmZCZ05WSFNBRVdEQldNQWNHQldlQkRBRUJNQTBHQ3lxRWFBR0cKOW5jQ0JRRUJNRHdHRENzR0FRUUJncWt3QVFNQkJEQXNNQ29HQ0NzR0FRVUZCd0lCRmg1b2RIUndjem92TDNkMwpkeTV6YzJ3dVkyOXRMM0psY0c5emFYUnZjbmt3SFFZRFZSMGxCQll3RkFZSUt3WUJCUVVIQXdJR0NDc0dBUVVGCkJ3TUJNRWdHQTFVZEh3UkJNRDh3UGFBN29EbUdOMmgwZEhBNkx5OWpjbXh6TG5OemJDNWpiMjB2VTFOTVkyOXQKTFZOMVlrTkJMVVZXTFZOVFRDMVNVMEV0TkRBNU5pMVNNeTVqY213d0hRWURWUjBPQkJZRUZBREFGVUlhenc1cgpaSUhhcG5SeElVbnB3K0dMTUE0R0ExVWREd0VCL3dRRUF3SUZvRENDQVgwR0Npc0dBUVFCMW5rQ0JBSUVnZ0Z0CkJJSUJhUUZuQUhjQTlseVVMOUYzTUNJVVZCZ0lNSlJXanVOTkV4a3p2OThNTHlBTHpFN3haT01BQUFGeE0waG8KYndBQUJBTUFTREJHQWlFQTZ4ZWxpTlI4R2svNjNwWWRuUy92T3gvQ2pwdEVNRXY4OVdXaDEvdXJXSUVDSVFEeQpCcmVIVTI1RHp3dWtRYVJRandXNjU1WkxrcUNueGJ4UVdSaU9lbWo5SkFCMUFKUWd2QjZPMVkxc2lITWZnb3NpCkxBM1IyazFlYkUrVVBXSGJUaTlZVGFMQ0FBQUJjVE5JYU53QUFBUURBRVl3UkFJZ0dSRTR3emFiTlJkRDhrcS8KdkZQM3RRZTJobTB4NW5YdWxvd2g0SWJ3M2xrQ0lGWWIvM2xTRHBsUzdBY1I0citYcFd0RUtTVEZXSm1OQ1JiYwpYSnVyMlJHQkFIVUE3c0NWN28xeVpBK1M0OE81RzhjU28ybHFDWHRMYWhvVU9PWkhzc3Z0eGZrQUFBRnhNMGhvCjh3QUFCQU1BUmpCRUFpQjZJdmJvV3NzM1I0SXRWd2plYmw3RDN5b0ZhWDBORGgyZFdoaGd3Q3hySHdJZ0NmcTcKb2NNQzV0KzFqaTVNNXhhTG1QQzRJK1dYM0kvQVJrV1N5aU83SVFjd0RRWUpLb1pJaHZjTkFRRUxCUUFEZ2dJQgpBQ2V1dXI0UW51anFtZ3VTckhVM21oZitjSm9kelRRTnFvNHRkZStQRDEvZUZkWUFFTHU4eEYrMEF0N3hKaVBZCmk1Ukt3aWx5UDU2diszaVkyVDlsdzdTOFRKMDQxVkxoYUlLcDE0TXpTVXpSeWVvT0FzSjdRQURNQ2xIS1VEbEgKVVUycE51bzg4WTZpZ292VDNic253Sk5pRVFOcXltU1NZaGt0dzB0YWR1b3FqcVhuMDZnc1Zpb1dUVkRYeXNkNQpxRXg0dDZzSWdJY01tMjZZSDF2SnBDUUVoS3BjMnkwN2dSa2tsQlpSdE1qVGh2NGNYeXlNWDd1VGNkVDdBSkJQCnVlaWZDb1YyNUp4WHVvOGQ1MTM5Z3dQMUJBZTdJQlZQeDJ1N0tOL1V5T1hkWm13TWYvVG1GR3dEZENmc3lIZi8KWnNCMndMSG96VFlvQVZtUTlGb1UxSkxnY1ZpdnFKK3ZObEJoSFhobHhNZE4wajgwUjlOejZFSWdsUWplSzNPOApJL2NGR20vQjgrNDJoT2xDSWQ5WmR0bmRKY1JKVmppMHdEMHF3ZXZDYWZBOWpKbEh2L2pzRStJOVV6NmNwQ3loCnN3K2xyRmR4VWdxVTU4YXhxZUs4OUZSK05vNHEwSUlPK0ppMXJKS3I5bmtTQjBCcVhvelZuRTFZQi9LTHZkSXMKdVlaSnVxYjJwS2t1K3p6VDZnVXdIVVRadkJpTk90WEw0Tnh3Yy9LVDdXek9TZDJ3UDEwUUk4REtnNHZmaU5EcwpIV21CMWM0S2ppNmdPZ0E1dVNVemFHbXEvdjRWbmNLNVVyK245TGJmbmZMYzI4SjVmdC9Hb3Rpbk15RGszaWFyCkYxMFlscWNPbWVYMXVGbUtiZGkvWG9yR2xrQ29NRjNURHg4cm1wOURCaUIvCi0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0=" //nolint:lll
25-
2622
func TestBuildCSECmd(t *testing.T) {
2723
tests := []struct {
2824
name string
@@ -199,56 +195,6 @@ oom_score = -999
199195
assert.Equal(t, "true", vars["NEEDS_CGROUPV2"])
200196
},
201197
},
202-
{
203-
name: "AKSUbuntu1804 with containerd and kubenet cni",
204-
folder: "AKSUbuntu1804+Containerd+Kubenet",
205-
k8sVersion: "1.19.13",
206-
aksNodeConfigUpdator: func(aksNodeConfig *aksnodeconfigv1.Configuration) {
207-
aksNodeConfig.NetworkConfig.NetworkPlugin = helpers.GetNetworkPluginType(helpers.NetworkPluginKubenet)
208-
},
209-
validator: func(cmd *exec.Cmd) {
210-
vars := environToMap(cmd.Env)
211-
assert.NotEmpty(t, vars["CONTAINERD_CONFIG_CONTENT"])
212-
assert.Equal(t, "kubenet", vars["NETWORK_PLUGIN"])
213-
},
214-
},
215-
{
216-
name: "AKSUbuntu1804 with http proxy config",
217-
folder: "AKSUbuntu1804+HTTPProxy",
218-
k8sVersion: "1.18.14",
219-
aksNodeConfigUpdator: func(aksNodeConfig *aksnodeconfigv1.Configuration) {
220-
aksNodeConfig.HttpProxyConfig = &aksnodeconfigv1.HttpProxyConfig{
221-
HttpProxy: "http://myproxy.server.com:8080/",
222-
HttpsProxy: "https://myproxy.server.com:8080/",
223-
NoProxyEntries: []string{
224-
"localhost",
225-
"127.0.0.1",
226-
},
227-
ProxyTrustedCa: testCertWithNewline,
228-
}
229-
},
230-
validator: func(cmd *exec.Cmd) {
231-
httpProxyStr := "export http_proxy=\"http://myproxy.server.com:8080/\""
232-
vars := environToMap(cmd.Env)
233-
assert.Contains(t, vars["PROXY_VARS"], httpProxyStr)
234-
assert.Equal(t, encodedTestCert, vars["HTTP_PROXY_TRUSTED_CA"])
235-
},
236-
},
237-
{
238-
name: "AKSUbuntu1804 with custom ca trust",
239-
folder: "AKSUbuntu1804+CustomCATrust",
240-
k8sVersion: "1.18.14",
241-
aksNodeConfigUpdator: func(aksNodeConfig *aksnodeconfigv1.Configuration) {
242-
aksNodeConfig.CustomCaCerts = []string{encodedTestCert, encodedTestCert, testCertWithNewline}
243-
},
244-
validator: func(cmd *exec.Cmd) {
245-
vars := environToMap(cmd.Env)
246-
assert.Equal(t, "3", vars["CUSTOM_CA_TRUST_COUNT"])
247-
assert.Equal(t, "true", vars["SHOULD_CONFIGURE_CUSTOM_CA_TRUST"])
248-
assert.Equal(t, encodedTestCert, vars["CUSTOM_CA_CERT_0"])
249-
assert.Equal(t, encodedTestCert, vars["CUSTOM_CA_CERT_2"])
250-
},
251-
},
252198
}
253199

254200
for _, tt := range tests {
@@ -273,7 +219,7 @@ oom_score = -999
273219
OSType: datamodel.Linux,
274220
VnetSubnetID: "/subscriptions/359833f5/resourceGroups/MC_rg/providers/Microsoft.Network/virtualNetworks/aks-vnet-07752737/subnet/subnet1",
275221
AvailabilityProfile: datamodel.VirtualMachineScaleSets,
276-
Distro: datamodel.AKSUbuntu1604,
222+
Distro: datamodel.AKSUbuntuContainerd2404,
277223
},
278224
},
279225
LinuxProfile: &datamodel.LinuxProfile{

aks-node-controller/parser/testdata/AKSUbuntu1804+Containerd+Kubenet/generatedCSECommand

Lines changed: 0 additions & 1 deletion
This file was deleted.

aks-node-controller/parser/testdata/AKSUbuntu1804+CustomCATrust/generatedCSECommand

Lines changed: 0 additions & 1 deletion
This file was deleted.

aks-node-controller/parser/testdata/AKSUbuntu1804+HTTPProxy/generatedCSECommand

Lines changed: 0 additions & 1 deletion
This file was deleted.

e2e/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -76,7 +76,7 @@ comma-separated and are case-insensitive. Check logs for test tags.
7676
Example:
7777

7878
```bash
79-
TAGS_TO_RUN="os=ubuntu,arch=amd64,wasm=false,gpu=false,imagename=1804gen2containerd" ./e2e-local.sh
79+
TAGS_TO_RUN="os=ubuntu,arch=amd64,wasm=false,gpu=false,imagename=2404gen2containerd" ./e2e-local.sh
8080
```
8181

8282
To exclude scenarios, use `TAGS_TO_SKIP=`. Scenarios with any specified tags will be skipped (this logic is different to

e2e/config/vhd.go

Lines changed: 0 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -50,14 +50,6 @@ var (
5050
)
5151

5252
var (
53-
VHDUbuntu1804Gen2Containerd = &Image{
54-
Name: "1804gen2containerd",
55-
OS: OSUbuntu,
56-
Arch: "amd64",
57-
Distro: datamodel.AKSUbuntuContainerd1804Gen2,
58-
Gallery: imageGalleryLinux,
59-
UnsupportedLocalDns: true,
60-
}
6153
VHDUbuntu2204Gen2Arm64Containerd = &Image{
6254
Name: "2204gen2arm64containerd",
6355
OS: OSUbuntu,

e2e/node_config.go

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ var baseKubeletConfig = &aksnodeconfigv1.KubeletConfig{
3030
"kubernetes.azure.com/agentpool": "nodepool2",
3131
"kubernetes.azure.com/cluster": "test-cluster",
3232
"kubernetes.azure.com/mode": "system",
33-
"kubernetes.azure.com/node-image-version": "AKSUbuntu-1804gen2containerd-2022.01.19",
33+
"kubernetes.azure.com/node-image-version": "AKSUbuntu-2404gen2containerd-2025.06.02",
3434
},
3535
KubeletConfigFileConfig: &aksnodeconfigv1.KubeletConfigFileConfig{
3636
Kind: "KubeletConfiguration",
@@ -356,11 +356,11 @@ func baseTemplateLinux(t testing.TB, location string, k8sVersion string, arch st
356356
AvailabilityProfile: "VirtualMachineScaleSets",
357357
StorageProfile: "ManagedDisks",
358358
VnetSubnetID: "",
359-
Distro: "aks-ubuntu-containerd-18.04-gen2",
359+
Distro: "aks-ubuntu-containerd-24.04-gen2",
360360
CustomNodeLabels: map[string]string{
361361
"kubernetes.azure.com/cluster": "test-cluster", // Some AKS daemonsets require that this exists, but the value doesn't matter.
362362
"kubernetes.azure.com/mode": "system",
363-
"kubernetes.azure.com/node-image-version": "AKSUbuntu-1804gen2containerd-2022.01.19",
363+
"kubernetes.azure.com/node-image-version": "AKSUbuntu-2404gen2containerd-2025.06.02",
364364
},
365365
PreprovisionExtension: nil,
366366
KubernetesConfig: &datamodel.KubernetesConfig{
@@ -565,11 +565,11 @@ func baseTemplateLinux(t testing.TB, location string, k8sVersion string, arch st
565565
AvailabilityProfile: "VirtualMachineScaleSets",
566566
StorageProfile: "ManagedDisks",
567567
VnetSubnetID: "",
568-
Distro: "aks-ubuntu-containerd-18.04-gen2",
568+
Distro: "aks-ubuntu-containerd-24.04-gen2",
569569
CustomNodeLabels: map[string]string{
570570
"kubernetes.azure.com/cluster": "test-cluster", // Some AKS daemonsets require that this exists, but the value doesn't matter.
571571
"kubernetes.azure.com/mode": "system",
572-
"kubernetes.azure.com/node-image-version": "AKSUbuntu-1804gen2containerd-2022.01.19",
572+
"kubernetes.azure.com/node-image-version": "AKSUbuntu-2404gen2containerd-2025.06.02",
573573
},
574574
PreprovisionExtension: nil,
575575
KubernetesConfig: &datamodel.KubernetesConfig{

e2e/validation.go

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,6 +9,7 @@ import (
99
"testing"
1010
"time"
1111

12+
"github.com/Azure/agentbaker/e2e/config"
1213
"github.com/Azure/agentbaker/e2e/toolkit"
1314
"github.com/Azure/agentbaker/pkg/agent"
1415
"github.com/Azure/azure-sdk-for-go/sdk/azcore/to"
@@ -129,9 +130,8 @@ func ValidateCommonLinux(ctx context.Context, s *Scenario) {
129130
ValidateKubeletNodeIP(ctx, s)
130131
}
131132

132-
// localdns is not supported on 1804, privatekube, VHDUbuntu2204Gen2ContainerdAirgappedK8sNotCached
133-
// and AzureLinuxV3OSGuard.
134-
if !s.VHD.UnsupportedLocalDns {
133+
// localdns is not supported on scriptless, privatekube and VHDUbuntu2204Gen2ContainerdAirgappedK8sNotCached.
134+
if s.Tags.Scriptless != true && s.VHD != config.VHDUbuntu2204Gen2ContainerdPrivateKubePkg && s.VHD != config.VHDUbuntu2204Gen2ContainerdAirgappedK8sNotCached {
135135
ValidateLocalDNSService(ctx, s, "enabled")
136136
ValidateLocalDNSResolution(ctx, s, "169.254.10.10")
137137
}

0 commit comments

Comments
 (0)