-
Notifications
You must be signed in to change notification settings - Fork 68
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Chiac/svc #893
Chiac/svc #893
Changes from all commits
ab344c0
932803b
277d2c9
9968614
dd371b1
baddfb6
a6556c4
93ab15e
5ef6641
7ae593a
1d4391e
84a404d
a511680
1d4a8a6
a63e5c6
11eda6f
7b1abfa
17e9b32
3c1d4c5
ca5f79e
b9a2ce6
c18378f
0bcb743
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -231,42 +231,42 @@ module rpCosmosDb '../modules/rp-cosmos.bicep' = if (deployFrontendCosmos) { | |
output cosmosDBName string = deployFrontendCosmos ? rpCosmosDb.outputs.cosmosDBName : '' | ||
output frontend_mi_client_id string = frontendMI.uamiClientID | ||
|
||
// | ||
// M A E S T R O | ||
// | ||
|
||
module maestroServer '../modules/maestro/maestro-server.bicep' = { | ||
name: 'maestro-server' | ||
params: { | ||
maestroInfraResourceGroup: regionalResourceGroup | ||
maestroEventGridNamespaceName: maestroEventGridNamespacesName | ||
mqttClientName: maestroServerMqttClientName | ||
certKeyVaultName: serviceKeyVaultName | ||
certKeyVaultResourceGroup: serviceKeyVaultResourceGroup | ||
keyVaultOfficerManagedIdentityName: aroDevopsMsiId | ||
maestroCertificateDomain: maestroCertDomain | ||
deployPostgres: deployMaestroPostgres | ||
postgresServerName: maestroPostgresServerName | ||
postgresServerVersion: maestroPostgresServerVersion | ||
postgresServerMinTLSVersion: maestroPostgresServerMinTLSVersion | ||
postgresServerStorageSizeGB: maestroPostgresServerStorageSizeGB | ||
privateEndpointSubnetId: svcCluster.outputs.aksNodeSubnetId | ||
privateEndpointVnetId: svcCluster.outputs.aksVnetId | ||
postgresServerPrivate: maestroPostgresPrivate | ||
maestroServerManagedIdentityPrincipalId: filter( | ||
svcCluster.outputs.userAssignedIdentities, | ||
id => id.uamiName == 'maestro-server' | ||
)[0].uamiPrincipalID | ||
maestroServerManagedIdentityName: filter( | ||
svcCluster.outputs.userAssignedIdentities, | ||
id => id.uamiName == 'maestro-server' | ||
)[0].uamiName | ||
location: location | ||
} | ||
dependsOn: [ | ||
serviceKeyVault | ||
] | ||
} | ||
// // | ||
// // M A E S T R O | ||
// // | ||
|
||
// module maestroServer '../modules/maestro/maestro-server.bicep' = { | ||
// name: 'maestro-server' | ||
// params: { | ||
// maestroInfraResourceGroup: regionalResourceGroup | ||
// maestroEventGridNamespaceName: maestroEventGridNamespacesName | ||
// mqttClientName: maestroServerMqttClientName | ||
// certKeyVaultName: serviceKeyVaultName | ||
// certKeyVaultResourceGroup: serviceKeyVaultResourceGroup | ||
// keyVaultOfficerManagedIdentityName: aroDevopsMsiId | ||
// maestroCertificateDomain: maestroCertDomain | ||
// deployPostgres: deployMaestroPostgres | ||
// postgresServerName: maestroPostgresServerName | ||
// postgresServerVersion: maestroPostgresServerVersion | ||
// postgresServerMinTLSVersion: maestroPostgresServerMinTLSVersion | ||
// postgresServerStorageSizeGB: maestroPostgresServerStorageSizeGB | ||
// privateEndpointSubnetId: svcCluster.outputs.aksNodeSubnetId | ||
// privateEndpointVnetId: svcCluster.outputs.aksVnetId | ||
// postgresServerPrivate: maestroPostgresPrivate | ||
// maestroServerManagedIdentityPrincipalId: filter( | ||
// svcCluster.outputs.userAssignedIdentities, | ||
// id => id.uamiName == 'maestro-server' | ||
// )[0].uamiPrincipalID | ||
// maestroServerManagedIdentityName: filter( | ||
// svcCluster.outputs.userAssignedIdentities, | ||
// id => id.uamiName == 'maestro-server' | ||
// )[0].uamiName | ||
// location: location | ||
// } | ||
// dependsOn: [ | ||
// serviceKeyVault | ||
// ] | ||
// } | ||
|
||
// | ||
// K E Y V A U L T S | ||
|
@@ -320,7 +320,7 @@ module cs '../modules/cluster-service.bicep' = if (deployCsInfra) { | |
clusterServiceManagedIdentityName: clusterServiceMIName | ||
} | ||
dependsOn: [ | ||
maestroServer | ||
// maestroServer | ||
svcCluster | ||
] | ||
} | ||
|
@@ -371,60 +371,60 @@ module imageServiceKeyVaultAccess '../modules/keyvault/keyvault-secret-access.bi | |
] | ||
} | ||
|
||
resource imageSyncAcrResourceGroups 'Microsoft.Resources/resourceGroups@2023-07-01' existing = [ | ||
for rg in imageSyncAcrResourceGroupNames: { | ||
name: rg | ||
scope: subscription() | ||
} | ||
] | ||
|
||
module acrPushRole '../modules/acr-permissions.bicep' = [ | ||
for (_, i) in imageSyncAcrResourceGroupNames: { | ||
name: guid(imageSyncAcrResourceGroups[i].id, resourceGroup().name, 'image-sync', 'push') | ||
scope: imageSyncAcrResourceGroups[i] | ||
params: { | ||
principalId: imageSyncManagedIdentityPrincipalId | ||
grantPushAccess: true | ||
acrResourceGroupid: imageSyncAcrResourceGroups[i].id | ||
} | ||
} | ||
] | ||
|
||
resource clustersServiceAcrResourceGroups 'Microsoft.Resources/resourceGroups@2023-07-01' existing = [ | ||
for rg in clustersServiceAcrResourceGroupNames: { | ||
name: rg | ||
scope: subscription() | ||
} | ||
] | ||
|
||
module acrManageTokenRole '../modules/acr-permissions.bicep' = [ | ||
for (_, i) in clustersServiceAcrResourceGroupNames: { | ||
name: guid(clustersServiceAcrResourceGroups[i].id, resourceGroup().name, 'clusters-service', 'manage-tokens') | ||
scope: clustersServiceAcrResourceGroups[i] | ||
params: { | ||
principalId: csManagedIdentityPrincipalId | ||
grantManageTokenAccess: true | ||
acrResourceGroupid: clustersServiceAcrResourceGroups[i].id | ||
} | ||
} | ||
] | ||
|
||
// oidc | ||
|
||
module oidc '../modules/oidc/main.bicep' = { | ||
name: '${deployment().name}-oidc' | ||
params: { | ||
location: location | ||
storageAccountName: oidcStorageAccountName | ||
rpMsiName: clusterServiceMIName | ||
skuName: oidcStorageAccountSku | ||
aroDevopsMsiId: aroDevopsMsiId | ||
deploymentScriptLocation: location | ||
} | ||
dependsOn: [ | ||
svcCluster | ||
] | ||
} | ||
// resource imageSyncAcrResourceGroups 'Microsoft.Resources/resourceGroups@2023-07-01' existing = [ | ||
// for rg in imageSyncAcrResourceGroupNames: { | ||
// name: rg | ||
// scope: subscription() | ||
// } | ||
// ] | ||
|
||
// module acrPushRole '../modules/acr-permissions.bicep' = [ | ||
// for (_, i) in imageSyncAcrResourceGroupNames: { | ||
// name: guid(imageSyncAcrResourceGroups[i].id, resourceGroup().name, 'image-sync', 'push') | ||
// scope: imageSyncAcrResourceGroups[i] | ||
// params: { | ||
// principalId: imageSyncManagedIdentityPrincipalId | ||
// grantPushAccess: true | ||
// acrResourceGroupid: imageSyncAcrResourceGroups[i].id | ||
// } | ||
// } | ||
// ] | ||
Comment on lines
+374
to
+391
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. this has been removed from main #896 |
||
|
||
// resource clustersServiceAcrResourceGroups 'Microsoft.Resources/resourceGroups@2023-07-01' existing = [ | ||
// for rg in clustersServiceAcrResourceGroupNames: { | ||
// name: rg | ||
// scope: subscription() | ||
// } | ||
// ] | ||
|
||
// module acrManageTokenRole '../modules/acr-permissions.bicep' = [ | ||
// for (_, i) in clustersServiceAcrResourceGroupNames: { | ||
// name: guid(clustersServiceAcrResourceGroups[i].id, resourceGroup().name, 'clusters-service', 'manage-tokens') | ||
// scope: clustersServiceAcrResourceGroups[i] | ||
// params: { | ||
// principalId: csManagedIdentityPrincipalId | ||
// grantManageTokenAccess: true | ||
// acrResourceGroupid: clustersServiceAcrResourceGroups[i].id | ||
// } | ||
// } | ||
// ] | ||
Comment on lines
+393
to
+410
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. this code has been moved to |
||
|
||
// // oidc | ||
|
||
// module oidc '../modules/oidc/main.bicep' = { | ||
// name: '${deployment().name}-oidc' | ||
// params: { | ||
// location: location | ||
// storageAccountName: oidcStorageAccountName | ||
// rpMsiName: clusterServiceMIName | ||
// skuName: oidcStorageAccountSku | ||
// aroDevopsMsiId: aroDevopsMsiId | ||
// deploymentScriptLocation: location | ||
// } | ||
// dependsOn: [ | ||
// svcCluster | ||
// ] | ||
// } | ||
Comment on lines
+411
to
+427
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. the permission issue has been fixed in main - #897 |
||
|
||
// | ||
// E V E N T G R I D P R I V A T E E N D P O I N T C O N N E C T I O N | ||
|
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -21,7 +21,7 @@ func EV2Mapping(input config.Variables, prefix []string) (map[string]string, map | |
} | ||
replaced[key] = replacement | ||
} else { | ||
placeholder := fmt.Sprintf("__%s__", strings.ToUpper(strings.Join(nestedKey, "_"))) | ||
placeholder := fmt.Sprintf("__%s__", strings.Join(nestedKey, "_")) | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. fixed in main including the tests - #901 |
||
output[placeholder] = strings.Join(nestedKey, ".") | ||
replaced[key] = placeholder | ||
} | ||
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
hmm. this would try to delegate the regional zone into the regional zone as child zone and parent zone would be the same