Skip to content

Commit b8e1155

Browse files
authored
Merge branch 'main' into safeguards-pss-aaz
2 parents ebfa124 + fde1dbf commit b8e1155

15 files changed

+5641
-17
lines changed

src/aks-agent/HISTORY.rst

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -12,6 +12,10 @@ To release a new version, please select a new version number (usually plus 1 to
1212
Pending
1313
+++++++
1414

15+
1.0.0b10
16+
++++++++
17+
* pin supabase==2.8.0 to avoid "ModuleNotFoundError: No module named 'supabase_auth.http_clients'"
18+
1519
1.0.0b9
1620
+++++++
1721
* agent-init: replace model name with deployment name for Azure OpenAI service.

src/aks-agent/setup.py

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@
99

1010
from setuptools import find_packages, setup
1111

12-
VERSION = "1.0.0b9"
12+
VERSION = "1.0.0b10"
1313

1414
CLASSIFIERS = [
1515
"Development Status :: 4 - Beta",
@@ -25,6 +25,7 @@
2525

2626
DEPENDENCIES = [
2727
"rich==13.9.4",
28+
"supabase==2.8.0",
2829
"holmesgpt==0.15.0; python_version >= '3.10'",
2930
]
3031

src/aks-preview/HISTORY.rst

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,10 +12,18 @@ To release a new version, please select a new version number (usually plus 1 to
1212
Pending
1313
+++++++
1414

15-
19.0.0b12
15+
19.0.0b14
1616
+++++++
1717
* `az aks safeguards`: Add support for Deployment Safeguards with Pod Security Standards (PSS). New `--pss-level` parameter allows setting PSS enforcement level to Privileged, Baseline, or Restricted. Commands now support both `-g/-n` and `--cluster` argument patterns.
1818

19+
19.0.0b13
20+
+++++++
21+
* `az aks update`: Set CMK property "enabled" to false and reserve other CMK properties for a PMK-enabled and CMK-disabled cluster.
22+
23+
19.0.0b12
24+
+++++++
25+
* `az aks create --workload-runtime KataVmIsolation`: Added the KataVmIsolation workload runtime value.
26+
1927
19.0.0b11
2028
+++++++
2129
* Remove PMK validation for `--azure-keyvault-kms-key-id` parameter.

src/aks-preview/azext_aks_preview/_consts.py

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -61,7 +61,8 @@
6161
# workload runtime
6262
CONST_WORKLOAD_RUNTIME_OCI_CONTAINER = "OCIContainer"
6363
CONST_WORKLOAD_RUNTIME_WASM_WASI = "WasmWasi"
64-
CONST_WORKLOAD_RUNTIME_KATA_MSHV_VM_ISOLATION = "KataMshvVmIsolation"
64+
CONST_WORKLOAD_RUNTIME_KATA_VM_ISOLATION = "KataVmIsolation"
65+
CONST_WORKLOAD_RUNTIME_OLD_KATA_VM_ISOLATION = "KataMshvVmIsolation"
6566
CONST_WORKLOAD_RUNTIME_KATA_CC_ISOLATION = "KataCcIsolation"
6667

6768
# gpu instance

src/aks-preview/azext_aks_preview/_params.py

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -127,7 +127,8 @@
127127
CONST_WEEKINDEX_SECOND,
128128
CONST_WEEKINDEX_THIRD,
129129
CONST_WEEKLY_MAINTENANCE_SCHEDULE,
130-
CONST_WORKLOAD_RUNTIME_KATA_MSHV_VM_ISOLATION,
130+
CONST_WORKLOAD_RUNTIME_KATA_VM_ISOLATION,
131+
CONST_WORKLOAD_RUNTIME_OLD_KATA_VM_ISOLATION,
131132
CONST_WORKLOAD_RUNTIME_KATA_CC_ISOLATION,
132133
CONST_WORKLOAD_RUNTIME_OCI_CONTAINER,
133134
CONST_WORKLOAD_RUNTIME_WASM_WASI,
@@ -314,7 +315,8 @@
314315
workload_runtimes = [
315316
CONST_WORKLOAD_RUNTIME_OCI_CONTAINER,
316317
CONST_WORKLOAD_RUNTIME_WASM_WASI,
317-
CONST_WORKLOAD_RUNTIME_KATA_MSHV_VM_ISOLATION,
318+
CONST_WORKLOAD_RUNTIME_KATA_VM_ISOLATION,
319+
CONST_WORKLOAD_RUNTIME_OLD_KATA_VM_ISOLATION,
318320
CONST_WORKLOAD_RUNTIME_KATA_CC_ISOLATION,
319321
]
320322
gpu_instance_profiles = [

src/aks-preview/azext_aks_preview/managed_cluster_decorator.py

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6026,7 +6026,6 @@ def update_kms_pmk_cmk(self, mc: ManagedCluster) -> ManagedCluster:
60266026
if self.context.get_disable_azure_keyvault_kms() or cmk_disabled_on_existing_cluster:
60276027
if mc.security_profile is None:
60286028
mc.security_profile = self.models.ManagedClusterSecurityProfile()
6029-
mc.security_profile.azure_key_vault_kms = self.models.AzureKeyVaultKms()
60306029
# set enabled to False
60316030
mc.security_profile.azure_key_vault_kms.enabled = False
60326031

src/aks-preview/azext_aks_preview/tests/latest/recordings/test_aks_cluster_kata.yaml

Lines changed: 986 additions & 0 deletions
Large diffs are not rendered by default.

src/aks-preview/azext_aks_preview/tests/latest/recordings/test_aks_cluster_kata_mshv_vm_isolation.yaml

Lines changed: 986 additions & 0 deletions
Large diffs are not rendered by default.

src/aks-preview/azext_aks_preview/tests/latest/recordings/test_aks_nodepool_add_with_kata.yaml

Lines changed: 1566 additions & 0 deletions
Large diffs are not rendered by default.

src/aks-preview/azext_aks_preview/tests/latest/recordings/test_aks_nodepool_add_with_kata_mshv_vm_isolation.yaml

Lines changed: 1664 additions & 0 deletions
Large diffs are not rendered by default.

0 commit comments

Comments
 (0)