Skip to content

Commit fde1dbf

Browse files
authored
[AKS] az aks update: Set CMK property "enabled" to false and reserve other CMK properties for a PMK-enabled and CMK-disabled cluster (#9398)
1 parent 1e7551c commit fde1dbf

File tree

4 files changed

+20
-8
lines changed

4 files changed

+20
-8
lines changed

src/aks-preview/HISTORY.rst

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,9 +12,12 @@ To release a new version, please select a new version number (usually plus 1 to
1212
Pending
1313
+++++++
1414

15-
19.0.0b12
15+
19.0.0b13
1616
+++++++
17+
* `az aks update`: Set CMK property "enabled" to false and reserve other CMK properties for a PMK-enabled and CMK-disabled cluster.
1718

19+
19.0.0b12
20+
+++++++
1821
* `az aks create --workload-runtime KataVmIsolation`: Added the KataVmIsolation workload runtime value.
1922

2023
19.0.0b11

src/aks-preview/azext_aks_preview/managed_cluster_decorator.py

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6026,7 +6026,6 @@ def update_kms_pmk_cmk(self, mc: ManagedCluster) -> ManagedCluster:
60266026
if self.context.get_disable_azure_keyvault_kms() or cmk_disabled_on_existing_cluster:
60276027
if mc.security_profile is None:
60286028
mc.security_profile = self.models.ManagedClusterSecurityProfile()
6029-
mc.security_profile.azure_key_vault_kms = self.models.AzureKeyVaultKms()
60306029
# set enabled to False
60316030
mc.security_profile.azure_key_vault_kms.enabled = False
60326031

src/aks-preview/azext_aks_preview/tests/latest/test_managed_cluster_decorator.py

Lines changed: 15 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -8726,6 +8726,7 @@ def test_update_kms_pmk_cmk(self):
87268726
ground_truth_azure_key_vault_kms_7 = self.models.AzureKeyVaultKms(
87278727
enabled=True,
87288728
key_id="https://test-keyvault.vault.azure.net/keys/test-key",
8729+
key_vault_network_access="Public",
87298730
key_vault_resource_id="/subscriptions/test-sub/resourceGroups/test-rg/providers/Microsoft.KeyVault/vaults/test-keyvault",
87308731
)
87318732
ground_truth_kube_resource_encryption_profile_7 = self.models.KubernetesResourceObjectEncryptionProfile(
@@ -8788,8 +8789,11 @@ def test_update_kms_pmk_cmk(self):
87888789
dec_mc_9 = dec_9.update_kms_pmk_cmk(mc_9)
87898790

87908791
# should disable existing Azure Key Vault KMS
8791-
ground_truth_azure_key_vault_kms_9 = self.models.AzureKeyVaultKms()
8792-
ground_truth_azure_key_vault_kms_9.enabled = False
8792+
ground_truth_azure_key_vault_kms_9 = self.models.AzureKeyVaultKms(
8793+
enabled=False,
8794+
key_id="https://test-keyvault.vault.azure.net/keys/test-key",
8795+
key_vault_resource_id="/subscriptions/test-sub/resourceGroups/test-rg/providers/Microsoft.KeyVault/vaults/test-keyvault",
8796+
)
87938797
ground_truth_kube_resource_encryption_profile_9 = self.models.KubernetesResourceObjectEncryptionProfile(
87948798
infrastructure_encryption="Enabled"
87958799
)
@@ -8827,6 +8831,7 @@ def test_update_kms_pmk_cmk(self):
88278831
ground_truth_azure_key_vault_kms_10 = self.models.AzureKeyVaultKms(
88288832
enabled=True,
88298833
key_id="https://test-keyvault.vault.azure.net/keys/test-key",
8834+
key_vault_network_access="Public",
88308835
key_vault_resource_id="/subscriptions/test-sub/resourceGroups/test-rg/providers/Microsoft.KeyVault/vaults/test-keyvault",
88318836
)
88328837
ground_truth_security_profile_10 = self.models.ManagedClusterSecurityProfile(
@@ -8839,7 +8844,7 @@ def test_update_kms_pmk_cmk(self):
88398844
)
88408845
self.assertEqual(dec_mc_10, ground_truth_mc_10)
88418846

8842-
# test enabling PMK on cluster with disabled CMK - should clear CMK properties
8847+
# test enabling PMK on cluster with disabled CMK
88438848
dec_11 = AKSPreviewManagedClusterUpdateDecorator(
88448849
self.cmd,
88458850
self.client,
@@ -8853,6 +8858,7 @@ def test_update_kms_pmk_cmk(self):
88538858
azure_key_vault_kms=self.models.AzureKeyVaultKms(
88548859
enabled=False,
88558860
key_id="https://test-keyvault.vault.azure.net/keys/test-key",
8861+
key_vault_network_access="Private",
88568862
key_vault_resource_id="/subscriptions/test-sub/resourceGroups/test-rg/providers/Microsoft.KeyVault/vaults/test-keyvault",
88578863
)
88588864
)
@@ -8864,8 +8870,12 @@ def test_update_kms_pmk_cmk(self):
88648870
dec_mc_11 = dec_11.update_kms_pmk_cmk(mc_11)
88658871

88668872
# should clear CMK properties and enable PMK
8867-
ground_truth_azure_key_vault_kms_11 = self.models.AzureKeyVaultKms()
8868-
ground_truth_azure_key_vault_kms_11.enabled = False
8873+
ground_truth_azure_key_vault_kms_11 = self.models.AzureKeyVaultKms(
8874+
enabled=False,
8875+
key_id="https://test-keyvault.vault.azure.net/keys/test-key",
8876+
key_vault_network_access="Private",
8877+
key_vault_resource_id="/subscriptions/test-sub/resourceGroups/test-rg/providers/Microsoft.KeyVault/vaults/test-keyvault",
8878+
)
88698879
ground_truth_kube_resource_encryption_profile_11 = self.models.KubernetesResourceObjectEncryptionProfile(
88708880
infrastructure_encryption="Enabled"
88718881
)

src/aks-preview/setup.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@
99

1010
from setuptools import find_packages, setup
1111

12-
VERSION = "19.0.0b12"
12+
VERSION = "19.0.0b13"
1313

1414
CLASSIFIERS = [
1515
"Development Status :: 4 - Beta",

0 commit comments

Comments
 (0)