You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
* AWS, GCP, Azure Standardized Flow Secret Creation
Signed-off-by: Tiger Kaovilai <[email protected]>
Add make targets sts-flow testing
Signed-off-by: Tiger Kaovilai <[email protected]>
* Add BSL-specific patching for STS secrets
- Label STS-created secrets with "oadp.openshift.io/secret-type": "sts-credentials"
- Implement automatic region patching for AWS STS secrets from BSL configuration
- Implement automatic resource group patching for Azure STS secrets from BSL configuration
- Ensure only STS-created secrets are patched by checking for specific keys:
- AWS: "credentials" key with role_arn and web_identity_token_file content
- Azure: "azurekey" key with AZURE_CLIENT_ID but no AZURE_CLIENT_SECRET
- Add comprehensive test coverage for all patching scenarios
- Update documentation to reflect dynamic configuration capabilities
This enhancement allows the first BSL to automatically configure region (AWS) or
resource group (Azure) in STS secrets, eliminating manual configuration needs.
* Fix STS secret updates to preserve BSL patches │
The BSL controller patches AWS secrets with region information by
modifying the Data field directly, but the STS flow was completely
replacing StringData which caused region patches to be overridden.
This change preserves existing Data when updating STS secrets by
only updating specific StringData fields rather than clearing all
existing data.
* Add Azure workload identity support for Velero deployment and service account annotation
Signed-off-by: Tiger Kaovilai <[email protected]>
* Add Azure workload identity support to Velero deployment and tests
Signed-off-by: Tiger Kaovilai <[email protected]>
* Refactor Azure workload identity implementation in Velero: comment out label and annotation handling, update environment variable checks in tests
Signed-off-by: Tiger Kaovilai <[email protected]>
* fmt
Signed-off-by: Tiger Kaovilai <[email protected]>
* Remove Azure workload identity label handling from Velero deployment and tests
Signed-off-by: Tiger Kaovilai <[email protected]>
* Remove commented-out Azure workload identity annotations and clean up related tests
Signed-off-by: Tiger Kaovilai <[email protected]>
* Add Azure workload identity environment variable support to NodeAgent DaemonSet and corresponding tests
Signed-off-by: Tiger Kaovilai <[email protected]>
* Implement Azure workload identity secret management in DataProtectionApplication reconciler
Signed-off-by: Tiger Kaovilai <[email protected]>
* Enhance Azure workload identity secret reconciliation by adding tenant ID handling and updating related tests
Signed-off-by: Tiger Kaovilai <[email protected]>
* Remove unnecessary blank line in noDefaultCredentials function
Signed-off-by: Tiger Kaovilai <[email protected]>
* Apply suggestion from @Copilot
Co-authored-by: Copilot <[email protected]>
* Update pkg/bucket/client.go
Co-authored-by: Copilot <[email protected]>
---------
Signed-off-by: Tiger Kaovilai <[email protected]>
Co-authored-by: Copilot <[email protected]>
echo"AWS STS environment variable not set. Please set:";\
593
+
echo" AWS_ROLE_ARN";\
594
+
echo"";\
595
+
echo"Example:";\
596
+
echo" make deploy-olm-stsflow-aws AWS_ROLE_ARN=arn:aws:iam::123456789012:role/my-oadp-role";\
597
+
fi
598
+
599
+
.PHONY: deploy-olm-stsflow-azure
600
+
deploy-olm-stsflow-azure: deploy-olm-stsflow ## Deploy via OLM with Azure Workload Identity standardized flow and create subscription with Azure env vars
0 commit comments