Skip to content

Commit fbed833

Browse files
committed
add history
1 parent fb63867 commit fbed833

File tree

2 files changed

+3
-63
lines changed

2 files changed

+3
-63
lines changed

src/k8s-runtime/HISTORY.rst

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,9 @@ Release History
55

66
2.0.0
77
++++++
8-
* Use stable ARM API version `2024-08-01` *
8+
* Use stable ARM API version `2024-08-01`
9+
* Remove the deprecated `storage class` command set. It is only used internally, and thus should not affect customers.
10+
* Add `update` command to the `load balancer` command set.
911

1012
1.0.4
1113
++++++

src/k8s-runtime/azext_k8s_runtime/tests/latest/test_k8s_runtime.py

Lines changed: 0 additions & 62 deletions
Original file line numberDiff line numberDiff line change
@@ -47,68 +47,6 @@ def create_connected_cluster(self, resource_group):
4747
"resource_uri": connected_cluster_resource_uri,
4848
})
4949

50-
@live_only()
51-
@ResourceGroupPreparer(name_prefix='k8srttest', random_name_length=16)
52-
def test_storage_class_enable_disable(self, resource_group):
53-
self.create_connected_cluster(resource_group)
54-
55-
enable_result = self.cmd("az k8s-runtime storage-class enable --resource-uri {resource_uri}", checks=[
56-
self.check("extension.name", sc.STORAGE_CLASS_EXTENSION_NAME),
57-
self.check("extension.extensionType", sc.STORAGE_CLASS_EXTENSION_TYPE),
58-
self.check("extension.provisioningState", "Succeeded"),
59-
self.check("extension.identity.type", "SystemAssigned"),
60-
]).get_output_in_json()
61-
62-
assert enable_result["extension"]["identity"]["principalId"] == enable_result["storage_class_contributor_role_assignment"]["principalId"]
63-
64-
k8s_ext_contrib_role_assignment = enable_result["kubernetes_extension_contributor_role_assignment"]
65-
66-
assert k8s_ext_contrib_role_assignment["id"].startswith(self.kwargs["resource_uri"] + "/providers/Microsoft.Authorization/roleAssignments/")
67-
assert k8s_ext_contrib_role_assignment["roleDefinitionId"].endswith(sc.KUBERNETES_EXTENSION_CONTRIBUTOR_ROLE_ID)
68-
assert k8s_ext_contrib_role_assignment["principalId"] == sc.KUBERNETES_RUNTIME_FPA_APP_ID
69-
70-
self.cmd("az k8s-runtime storage-class disable --resource-uri {resource_uri}", checks=[
71-
self.check("extension.id", enable_result["extension"]["id"]),
72-
self.check("storage_class_contributor_role_assignment.id",
73-
enable_result["storage_class_contributor_role_assignment"]["id"]),
74-
self.check("kubernetes_extension_contributor_role_assignment.id",
75-
enable_result["kubernetes_extension_contributor_role_assignment"]["id"]),
76-
])
77-
78-
os.remove(self.kwargs["kubeconfig"])
79-
80-
def test_storage_class_enable_disable_only_connected_cluster(self):
81-
self.kwargs["resource_uri"] = "/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/rg/providers/Microsoft.Kubernetes/managedClusters/cluster"
82-
83-
self.cmd("az k8s-runtime storage-class enable --resource-uri {resource_uri}", expect_failure=True)
84-
self.cmd("az k8s-runtime storage-class disable --resource-uri {resource_uri}", expect_failure=True)
85-
86-
@live_only()
87-
@ResourceGroupPreparer(name_prefix='k8srttest', random_name_length=16)
88-
def test_storage_class_delete_storage_class(self, resource_group):
89-
self.create_connected_cluster(resource_group)
90-
91-
self.cmd("az k8s-runtime storage-class enable --resource-uri {resource_uri}", checks=[
92-
self.check("extension.provisioningState", "Succeeded"),
93-
])
94-
95-
test_sc = "rwx-test"
96-
self.kwargs.update({"test_sc": test_sc})
97-
98-
# The default storage classes of AKS cannot be deleted.
99-
# Has to create a new one and delete it.
100-
self.cmd("az k8s-runtime storage-class create --resource-uri {resource_uri} --storage-class-name {test_sc} --type-properties rwx.backing-storage-class-name=managed")
101-
102-
self.cmd("az k8s-runtime storage-class delete --yes --resource-uri {resource_uri} --storage-class-name {test_sc}")
103-
104-
self.failIf(
105-
subprocess.call(f"kubectl get storageclass {test_sc} --kubeconfig {self.kwargs.get('kubeconfig')}") == 0,
106-
"Storage class {test_sc} is not deleted in the AKS cluster"
107-
)
108-
self.cmd("az k8s-runtime storage-class show --resource-uri {resource_uri} --storage-class-name {test_sc}", expect_failure=True)
109-
110-
os.remove(self.kwargs["kubeconfig"])
111-
11250
@live_only()
11351
@ResourceGroupPreparer(name_prefix='k8srttest', random_name_length=16)
11452
def test_load_balancer_enable_disable(self, resource_group):

0 commit comments

Comments
 (0)