Skip to content

Commit 7079435

Browse files
authored
Merge branch 'main' into jizen/create_machine_clipreview
2 parents 5a073c0 + 917ba68 commit 7079435

File tree

85 files changed

+11875
-3898
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

85 files changed

+11875
-3898
lines changed

linter_exclusions.yml

Lines changed: 40 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -3402,3 +3402,43 @@ eventgrid namespace topic update:
34023402
event_retention_in_days:
34033403
rule_exclusions:
34043404
- option_length_too_long
3405+
3406+
neon postgres endpoint create:
3407+
rule_exclusions:
3408+
- missing_command_example
3409+
3410+
neon postgres neon-role create:
3411+
rule_exclusions:
3412+
- missing_command_example
3413+
3414+
neon postgres neon-database create:
3415+
rule_exclusions:
3416+
- missing_command_example
3417+
3418+
neon postgres get-postgres-version:
3419+
rule_exclusions:
3420+
- missing_command_example
3421+
3422+
neon postgres branch:
3423+
rule_exclusions:
3424+
- require_wait_command_if_no_wait
3425+
3426+
neon postgres endpoint:
3427+
rule_exclusions:
3428+
- require_wait_command_if_no_wait
3429+
3430+
neon postgres neon-database:
3431+
rule_exclusions:
3432+
- require_wait_command_if_no_wait
3433+
3434+
neon postgres neon-role:
3435+
rule_exclusions:
3436+
- require_wait_command_if_no_wait
3437+
3438+
neon postgres organization:
3439+
rule_exclusions:
3440+
- require_wait_command_if_no_wait
3441+
3442+
neon postgres project:
3443+
rule_exclusions:
3444+
- require_wait_command_if_no_wait

src/aks-preview/HISTORY.rst

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,10 +11,11 @@ To release a new version, please select a new version number (usually plus 1 to
1111

1212
Pending
1313
+++++++
14+
* Add machine command `az aks machine add` to add a machine to an existing machine pool.
1415

1516
18.0.0b36
1617
+++++++
17-
* Add machine command `az aks machine add` to add a machine to an existing machine pool.
18+
* Add option `AzureLinux3` to `--os-sku` for `az aks nodepool add` and `az aks nodepool update`.
1819

1920
18.0.0b35
2021
+++++++

src/aks-preview/azext_aks_preview/_consts.py

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -38,6 +38,7 @@
3838
CONST_OS_SKU_WINDOWS2022 = "Windows2022"
3939
CONST_OS_SKU_WINDOWSANNUAL = "WindowsAnnual"
4040
CONST_OS_SKU_AZURELINUX = "AzureLinux"
41+
CONST_OS_SKU_AZURELINUX3 = "AzureLinux3"
4142
CONST_OS_SKU_UBUNTU2204 = "Ubuntu2204"
4243
CONST_OS_SKU_UBUNTU2404 = "Ubuntu2404"
4344

src/aks-preview/azext_aks_preview/_help.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1922,7 +1922,7 @@
19221922
short-summary: The OS Type. Linux or Windows. Windows not supported yet for "VirtualMachines" VM set type.
19231923
- name: --os-sku
19241924
type: string
1925-
short-summary: The os-sku of the agent node pool. Ubuntu, CBLMariner, Ubuntu2204 or Ubuntu2404 when os-type is Linux, default is Ubuntu if not set; Windows2019, Windows2022 or WindowsAnnual when os-type is Windows, the current default is Windows2022 if not set.
1925+
short-summary: The os-sku of the agent node pool. Ubuntu, Ubuntu2204, Ubuntu2404, CBLMariner, AzureLinux or AzureLinux3 when os-type is Linux, default is Ubuntu if not set; Windows2019, Windows2022 or WindowsAnnual when os-type is Windows, the current default is Windows2022 if not set.
19261926
- name: --enable-fips-image
19271927
type: bool
19281928
short-summary: Use FIPS-enabled OS on agent nodes.

src/aks-preview/azext_aks_preview/_params.py

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -92,6 +92,7 @@
9292
CONST_OS_DISK_TYPE_EPHEMERAL,
9393
CONST_OS_DISK_TYPE_MANAGED,
9494
CONST_OS_SKU_AZURELINUX,
95+
CONST_OS_SKU_AZURELINUX3,
9596
CONST_OS_SKU_CBLMARINER,
9697
CONST_OS_SKU_MARINER,
9798
CONST_OS_SKU_UBUNTU,
@@ -270,6 +271,7 @@
270271
]
271272
node_os_skus_create = [
272273
CONST_OS_SKU_AZURELINUX,
274+
CONST_OS_SKU_AZURELINUX3,
273275
CONST_OS_SKU_UBUNTU,
274276
CONST_OS_SKU_CBLMARINER,
275277
CONST_OS_SKU_MARINER,
@@ -283,6 +285,7 @@
283285
]
284286
node_os_skus_update = [
285287
CONST_OS_SKU_AZURELINUX,
288+
CONST_OS_SKU_AZURELINUX3,
286289
CONST_OS_SKU_UBUNTU,
287290
CONST_OS_SKU_UBUNTU2204,
288291
CONST_OS_SKU_UBUNTU2404,

src/aks-preview/azext_aks_preview/tests/latest/recordings/test_aks_nodepool_add_with_ossku_azurelinux3.yaml

Lines changed: 1518 additions & 0 deletions
Large diffs are not rendered by default.

src/aks-preview/azext_aks_preview/tests/latest/test_aks_commands.py

Lines changed: 36 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2924,6 +2924,42 @@ def test_aks_nodepool_add_with_ossku_ubuntu2204(self, resource_group, resource_g
29242924
self.cmd(
29252925
'aks delete -g {resource_group} -n {name} --yes --no-wait', checks=[self.is_empty()])
29262926

2927+
@AllowLargeResponse()
2928+
@AKSCustomResourceGroupPreparer(random_name_length=17, name_prefix='clitest', location='eastus2euap')
2929+
def test_aks_nodepool_add_with_ossku_azurelinux3(self, resource_group, resource_group_location):
2930+
aks_name = self.create_random_name('cliakstest', 16)
2931+
node_pool_name = self.create_random_name('c', 6)
2932+
node_pool_name_second = self.create_random_name('c', 6)
2933+
self.kwargs.update({
2934+
'resource_group': resource_group,
2935+
'name': aks_name,
2936+
'node_pool_name': node_pool_name,
2937+
'node_pool_name_second': node_pool_name_second,
2938+
'ssh_key_value': self.generate_ssh_keys()
2939+
})
2940+
2941+
create_cmd = 'aks create --resource-group={resource_group} --name={name} ' \
2942+
'--nodepool-name {node_pool_name} -c 1 ' \
2943+
'--ssh-key-value={ssh_key_value}'
2944+
self.cmd(create_cmd, checks=[
2945+
self.check('provisioningState', 'Succeeded'),
2946+
])
2947+
2948+
# nodepool get-upgrades
2949+
self.cmd('aks nodepool add '
2950+
'--resource-group={resource_group} '
2951+
'--cluster-name={name} '
2952+
'--name={node_pool_name_second} '
2953+
'--os-sku AzureLinux3',
2954+
checks=[
2955+
self.check('provisioningState', 'Succeeded'),
2956+
self.check('osSku', 'AzureLinux3'),
2957+
])
2958+
2959+
# delete
2960+
self.cmd(
2961+
'aks delete -g {resource_group} -n {name} --yes --no-wait', checks=[self.is_empty()])
2962+
29272963
@AllowLargeResponse()
29282964
@AKSCustomResourceGroupPreparer(
29292965
random_name_length=17, name_prefix="clitest", location="westus2"

src/confcom/HISTORY.rst

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,13 @@
33
Release History
44
===============
55

6+
1.2.7
7+
++++++
8+
* bugfix making it so that oras discover function doesn't error when no fragments are found in the remote repository
9+
* splitting out documentation into command-specific files and adding info about --input flag
10+
* adding standalone fragment support
11+
* bugfix for oras pulling fragments when offline
12+
613
1.2.6
714
++++++
815
* bugfix making it so the fields in the --input format are case-insensitive

src/confcom/azext_confcom/README.md

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -866,6 +866,18 @@ Using the same command, the default mounts and environment variables used by VN2
866866
az confcom acifragmentgen --input ./fragment_config.json --svn 1 --namespace contoso
867867
```
868868

869+
Example 6: Create an import statement from a signed fragment in a remote repo:
870+
871+
```bash
872+
az confcom acifragmentgen --generate-import --fragment-path contoso.azurecr.io/<my-fragment>:v1 --minimum-svn 1
873+
```
874+
875+
This is assuming there is a standalone fragment present at the specified location of `contoso.azurecr.io/<my-fragment>:v1`. Fragment imports can also be created using local paths to signed fragment files such as:
876+
877+
```bash
878+
az confcom acifragmentgen --generate-import --fragment-path ./contoso.rego.cose --minimum-svn 1
879+
```
880+
869881
## Microsoft Azure CLI 'confcom katapolicygen' Extension Examples
870882

871883
Run `az confcom katapolicygen --help` to see a list of supported arguments along with explanations. The following commands demonstrate the usage of different arguments to generate confidential computing security policies.

src/confcom/azext_confcom/_help.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -165,7 +165,7 @@
165165
166166
- name: --fragment-path -p
167167
type: string
168-
short-summary: 'Path to an existing policy fragment file to be used with --generate-import. This option allows you to create import statements for the specified fragment without needing to pull it from an OCI registry'
168+
short-summary: 'Path to an existing signed policy fragment file to be used with --generate-import. This option allows you to create import statements for the specified fragment without needing to explicitly pull it from an OCI registry. This can either be a local path or an OCI registry reference. For local fragments, the file will remain in the same location. For remote fragments, the file will be downloaded and cleaned up after processing'
169169
170170
- name: --omit-id
171171
type: boolean

0 commit comments

Comments
 (0)