From 5b5b82962a66b38b5fa8d588a91a2958d3d4de41 Mon Sep 17 00:00:00 2001 From: Alessio Pragliola Date: Thu, 9 May 2024 11:31:33 +0200 Subject: [PATCH] feat: prepare furyctl for new KFD releases --- README.md | 4 +- .../pre-distribution.sh.tpl | 0 .../pre-distribution.sh.tpl | 0 .../pre-distribution.sh.tpl | 0 .../1.27.6-1.28.1}/pre-distribution.sh.tpl | 0 .../1.28.0-1.28.1}/pre-distribution.sh.tpl | 0 .../1.28.1-1.29.1}/pre-distribution.sh.tpl | 0 .../1.29.0-1.29.1}/pre-distribution.sh.tpl | 0 .../pre-distribution.sh.tpl | 0 .../1.27.5-1.27.6}/pre-distribution.sh.tpl | 0 .../1.27.5-1.28.1/pre-distribution.sh.tpl | 10 +++ .../1.27.6-1.28.1/pre-distribution.sh.tpl | 10 +++ .../1.28.0-1.28.1/pre-distribution.sh.tpl | 10 +++ .../1.28.1-1.29.1/pre-distribution.sh.tpl | 10 +++ .../1.29.0-1.29.1/pre-distribution.sh.tpl | 10 +++ .../pre-distribution.sh.tpl | 0 .../pre-kubernetes.sh.tpl | 0 .../1.26.6-1.27.6/pre-distribution.sh.tpl | 10 +++ .../pre-kubernetes.sh.tpl | 0 .../pre-distribution.sh.tpl | 0 .../pre-kubernetes.sh.tpl | 0 .../1.27.5-1.27.6/pre-distribution.sh.tpl | 10 +++ .../pre-kubernetes.sh.tpl | 0 .../1.27.5-1.28.1/pre-distribution.sh.tpl | 10 +++ .../pre-kubernetes.sh.tpl | 0 .../1.27.6-1.28.1/pre-distribution.sh.tpl | 10 +++ .../1.27.6-1.28.1/pre-kubernetes.sh.tpl | 20 +++++ .../1.28.0-1.28.1/pre-distribution.sh.tpl | 10 +++ .../1.28.0-1.28.1/pre-kubernetes.sh.tpl | 20 +++++ .../1.28.1-1.29.1/pre-distribution.sh.tpl | 10 +++ .../1.28.1-1.29.1/pre-kubernetes.sh.tpl | 20 +++++ .../1.29.0-1.29.1/pre-distribution.sh.tpl | 10 +++ .../1.29.0-1.29.1/pre-kubernetes.sh.tpl | 20 +++++ docs/COMPATIBILITY_MATRIX.md | 28 +++--- go.mod | 2 +- go.sum | 2 + internal/distribution/compatibility.go | 18 ++-- internal/distribution/compatibility_test.go | 41 ++++----- test/expensive/ekscluster/furyctl_test.go | 9 +- .../furyctl-public-minimal.yaml.tpl | 86 +++++++++++++++++++ .../furyctl-public-minimal.yaml.tpl | 86 +++++++++++++++++++ .../furyctl-public-minimal.yaml.tpl | 86 +++++++++++++++++++ .../expensive/kfddistribution/furyctl_test.go | 14 ++- .../furyctl-minimal.yaml.tpl | 32 +++++++ .../kind-config.yml | 16 ++++ .../furyctl-minimal.yaml.tpl | 32 +++++++ .../kind-config.yml | 16 ++++ .../furyctl-minimal.yaml.tpl | 32 +++++++ .../kind-config.yml | 16 ++++ test/expensive/onpremises/furyctl_test.go | 14 +++ .../furyctl-minimal.yaml.tpl | 75 ++++++++++++++++ .../furyctl-minimal.yaml.tpl | 75 ++++++++++++++++ .../furyctl-minimal.yaml.tpl | 75 ++++++++++++++++ 53 files changed, 907 insertions(+), 52 deletions(-) rename configs/upgrades/ekscluster/{1.27.4-1.28.0 => 1.27.4-1.28.1}/pre-distribution.sh.tpl (100%) rename configs/upgrades/ekscluster/{1.27.5-1.28.0 => 1.27.5-1.27.6}/pre-distribution.sh.tpl (100%) rename configs/upgrades/ekscluster/{1.28.0-1.29.0 => 1.27.5-1.28.1}/pre-distribution.sh.tpl (100%) rename configs/upgrades/{kfddistribution/1.27.5-1.28.0 => ekscluster/1.27.6-1.28.1}/pre-distribution.sh.tpl (100%) rename configs/upgrades/{kfddistribution/1.28.0-1.29.0 => ekscluster/1.28.0-1.28.1}/pre-distribution.sh.tpl (100%) rename configs/upgrades/{onpremises/1.26.6-1.27.5 => ekscluster/1.28.1-1.29.1}/pre-distribution.sh.tpl (100%) rename configs/upgrades/{onpremises/1.27.5-1.28.0 => ekscluster/1.29.0-1.29.1}/pre-distribution.sh.tpl (100%) rename configs/upgrades/kfddistribution/{1.27.4-1.28.0 => 1.27.4-1.28.1}/pre-distribution.sh.tpl (100%) rename configs/upgrades/{onpremises/1.28.0-1.29.0 => kfddistribution/1.27.5-1.27.6}/pre-distribution.sh.tpl (100%) create mode 100644 configs/upgrades/kfddistribution/1.27.5-1.28.1/pre-distribution.sh.tpl create mode 100644 configs/upgrades/kfddistribution/1.27.6-1.28.1/pre-distribution.sh.tpl create mode 100644 configs/upgrades/kfddistribution/1.28.0-1.28.1/pre-distribution.sh.tpl create mode 100644 configs/upgrades/kfddistribution/1.28.1-1.29.1/pre-distribution.sh.tpl create mode 100644 configs/upgrades/kfddistribution/1.29.0-1.29.1/pre-distribution.sh.tpl rename configs/upgrades/onpremises/{1.26.5-1.27.5 => 1.26.5-1.27.6}/pre-distribution.sh.tpl (100%) rename configs/upgrades/onpremises/{1.26.5-1.27.5 => 1.26.5-1.27.6}/pre-kubernetes.sh.tpl (100%) create mode 100644 configs/upgrades/onpremises/1.26.6-1.27.6/pre-distribution.sh.tpl rename configs/upgrades/onpremises/{1.26.6-1.27.5 => 1.26.6-1.27.6}/pre-kubernetes.sh.tpl (100%) rename configs/upgrades/onpremises/{1.27.4-1.28.0 => 1.27.4-1.28.1}/pre-distribution.sh.tpl (100%) rename configs/upgrades/onpremises/{1.27.4-1.28.0 => 1.27.4-1.28.1}/pre-kubernetes.sh.tpl (100%) create mode 100644 configs/upgrades/onpremises/1.27.5-1.27.6/pre-distribution.sh.tpl rename configs/upgrades/onpremises/{1.27.5-1.28.0 => 1.27.5-1.27.6}/pre-kubernetes.sh.tpl (100%) create mode 100644 configs/upgrades/onpremises/1.27.5-1.28.1/pre-distribution.sh.tpl rename configs/upgrades/onpremises/{1.28.0-1.29.0 => 1.27.5-1.28.1}/pre-kubernetes.sh.tpl (100%) create mode 100644 configs/upgrades/onpremises/1.27.6-1.28.1/pre-distribution.sh.tpl create mode 100644 configs/upgrades/onpremises/1.27.6-1.28.1/pre-kubernetes.sh.tpl create mode 100644 configs/upgrades/onpremises/1.28.0-1.28.1/pre-distribution.sh.tpl create mode 100644 configs/upgrades/onpremises/1.28.0-1.28.1/pre-kubernetes.sh.tpl create mode 100644 configs/upgrades/onpremises/1.28.1-1.29.1/pre-distribution.sh.tpl create mode 100644 configs/upgrades/onpremises/1.28.1-1.29.1/pre-kubernetes.sh.tpl create mode 100644 configs/upgrades/onpremises/1.29.0-1.29.1/pre-distribution.sh.tpl create mode 100644 configs/upgrades/onpremises/1.29.0-1.29.1/pre-kubernetes.sh.tpl create mode 100644 test/expensive/ekscluster/testdata/ekscluster-v1-27-6-create-and-delete/furyctl-public-minimal.yaml.tpl create mode 100644 test/expensive/ekscluster/testdata/ekscluster-v1-28-1-create-and-delete/furyctl-public-minimal.yaml.tpl create mode 100644 test/expensive/ekscluster/testdata/ekscluster-v1-29-1-create-and-delete/furyctl-public-minimal.yaml.tpl create mode 100644 test/expensive/kfddistribution/testdata/kfddistribution-v1-27-6-create-and-delete/furyctl-minimal.yaml.tpl create mode 100644 test/expensive/kfddistribution/testdata/kfddistribution-v1-27-6-create-and-delete/kind-config.yml create mode 100644 test/expensive/kfddistribution/testdata/kfddistribution-v1-28-1-create-and-delete/furyctl-minimal.yaml.tpl create mode 100644 test/expensive/kfddistribution/testdata/kfddistribution-v1-28-1-create-and-delete/kind-config.yml create mode 100644 test/expensive/kfddistribution/testdata/kfddistribution-v1-29-1-create-and-delete/furyctl-minimal.yaml.tpl create mode 100644 test/expensive/kfddistribution/testdata/kfddistribution-v1-29-1-create-and-delete/kind-config.yml create mode 100644 test/expensive/onpremises/testdata/onpremises-v1-27-6-create-and-delete/furyctl-minimal.yaml.tpl create mode 100644 test/expensive/onpremises/testdata/onpremises-v1-28-1-create-and-delete/furyctl-minimal.yaml.tpl create mode 100644 test/expensive/onpremises/testdata/onpremises-v1-29-1-create-and-delete/furyctl-minimal.yaml.tpl diff --git a/README.md b/README.md index c2ca34283..11b0caec5 100644 --- a/README.md +++ b/README.md @@ -9,7 +9,7 @@ [![Build Status](https://ci.sighup.io/api/badges/sighupio/furyctl/status.svg)](https://ci.sighup.io/sighupio/furyctl) -![Release](https://img.shields.io/badge/furyctl-v0.29.0-blue) +![Release](https://img.shields.io/badge/furyctl-v0.29.1-blue) ![Slack](https://img.shields.io/badge/slack-@kubernetes/fury-yellow.svg?logo=slack) ![License](https://img.shields.io/github/license/sighupio/furyctl) [![Go Report Card](https://goreportcard.com/badge/github.com/sighupio/furyctl)](https://goreportcard.com/report/github.com/sighupio/furyctl) @@ -80,7 +80,7 @@ $ furyctl version ... goVersion: go1.22 osArch: amd64 -version: 0.29.0 +version: 0.29.1 ``` ### Installing from source diff --git a/configs/upgrades/ekscluster/1.27.4-1.28.0/pre-distribution.sh.tpl b/configs/upgrades/ekscluster/1.27.4-1.28.1/pre-distribution.sh.tpl similarity index 100% rename from configs/upgrades/ekscluster/1.27.4-1.28.0/pre-distribution.sh.tpl rename to configs/upgrades/ekscluster/1.27.4-1.28.1/pre-distribution.sh.tpl diff --git a/configs/upgrades/ekscluster/1.27.5-1.28.0/pre-distribution.sh.tpl b/configs/upgrades/ekscluster/1.27.5-1.27.6/pre-distribution.sh.tpl similarity index 100% rename from configs/upgrades/ekscluster/1.27.5-1.28.0/pre-distribution.sh.tpl rename to configs/upgrades/ekscluster/1.27.5-1.27.6/pre-distribution.sh.tpl diff --git a/configs/upgrades/ekscluster/1.28.0-1.29.0/pre-distribution.sh.tpl b/configs/upgrades/ekscluster/1.27.5-1.28.1/pre-distribution.sh.tpl similarity index 100% rename from configs/upgrades/ekscluster/1.28.0-1.29.0/pre-distribution.sh.tpl rename to configs/upgrades/ekscluster/1.27.5-1.28.1/pre-distribution.sh.tpl diff --git a/configs/upgrades/kfddistribution/1.27.5-1.28.0/pre-distribution.sh.tpl b/configs/upgrades/ekscluster/1.27.6-1.28.1/pre-distribution.sh.tpl similarity index 100% rename from configs/upgrades/kfddistribution/1.27.5-1.28.0/pre-distribution.sh.tpl rename to configs/upgrades/ekscluster/1.27.6-1.28.1/pre-distribution.sh.tpl diff --git a/configs/upgrades/kfddistribution/1.28.0-1.29.0/pre-distribution.sh.tpl b/configs/upgrades/ekscluster/1.28.0-1.28.1/pre-distribution.sh.tpl similarity index 100% rename from configs/upgrades/kfddistribution/1.28.0-1.29.0/pre-distribution.sh.tpl rename to configs/upgrades/ekscluster/1.28.0-1.28.1/pre-distribution.sh.tpl diff --git a/configs/upgrades/onpremises/1.26.6-1.27.5/pre-distribution.sh.tpl b/configs/upgrades/ekscluster/1.28.1-1.29.1/pre-distribution.sh.tpl similarity index 100% rename from configs/upgrades/onpremises/1.26.6-1.27.5/pre-distribution.sh.tpl rename to configs/upgrades/ekscluster/1.28.1-1.29.1/pre-distribution.sh.tpl diff --git a/configs/upgrades/onpremises/1.27.5-1.28.0/pre-distribution.sh.tpl b/configs/upgrades/ekscluster/1.29.0-1.29.1/pre-distribution.sh.tpl similarity index 100% rename from configs/upgrades/onpremises/1.27.5-1.28.0/pre-distribution.sh.tpl rename to configs/upgrades/ekscluster/1.29.0-1.29.1/pre-distribution.sh.tpl diff --git a/configs/upgrades/kfddistribution/1.27.4-1.28.0/pre-distribution.sh.tpl b/configs/upgrades/kfddistribution/1.27.4-1.28.1/pre-distribution.sh.tpl similarity index 100% rename from configs/upgrades/kfddistribution/1.27.4-1.28.0/pre-distribution.sh.tpl rename to configs/upgrades/kfddistribution/1.27.4-1.28.1/pre-distribution.sh.tpl diff --git a/configs/upgrades/onpremises/1.28.0-1.29.0/pre-distribution.sh.tpl b/configs/upgrades/kfddistribution/1.27.5-1.27.6/pre-distribution.sh.tpl similarity index 100% rename from configs/upgrades/onpremises/1.28.0-1.29.0/pre-distribution.sh.tpl rename to configs/upgrades/kfddistribution/1.27.5-1.27.6/pre-distribution.sh.tpl diff --git a/configs/upgrades/kfddistribution/1.27.5-1.28.1/pre-distribution.sh.tpl b/configs/upgrades/kfddistribution/1.27.5-1.28.1/pre-distribution.sh.tpl new file mode 100644 index 000000000..2eeeb36a4 --- /dev/null +++ b/configs/upgrades/kfddistribution/1.27.5-1.28.1/pre-distribution.sh.tpl @@ -0,0 +1,10 @@ +#!/usr/bin/env sh + +set -e + +kubectlbin="{{ .paths.kubectl }}" + +# Remove some validating webhooks during the upgrade +{{- if eq .spec.distribution.modules.policy.type "gatekeeper" }} +$kubectlbin delete --ignore-not-found=true validatingwebhookconfiguration gatekeeper-validating-webhook-configuration +{{- end }} diff --git a/configs/upgrades/kfddistribution/1.27.6-1.28.1/pre-distribution.sh.tpl b/configs/upgrades/kfddistribution/1.27.6-1.28.1/pre-distribution.sh.tpl new file mode 100644 index 000000000..2eeeb36a4 --- /dev/null +++ b/configs/upgrades/kfddistribution/1.27.6-1.28.1/pre-distribution.sh.tpl @@ -0,0 +1,10 @@ +#!/usr/bin/env sh + +set -e + +kubectlbin="{{ .paths.kubectl }}" + +# Remove some validating webhooks during the upgrade +{{- if eq .spec.distribution.modules.policy.type "gatekeeper" }} +$kubectlbin delete --ignore-not-found=true validatingwebhookconfiguration gatekeeper-validating-webhook-configuration +{{- end }} diff --git a/configs/upgrades/kfddistribution/1.28.0-1.28.1/pre-distribution.sh.tpl b/configs/upgrades/kfddistribution/1.28.0-1.28.1/pre-distribution.sh.tpl new file mode 100644 index 000000000..2eeeb36a4 --- /dev/null +++ b/configs/upgrades/kfddistribution/1.28.0-1.28.1/pre-distribution.sh.tpl @@ -0,0 +1,10 @@ +#!/usr/bin/env sh + +set -e + +kubectlbin="{{ .paths.kubectl }}" + +# Remove some validating webhooks during the upgrade +{{- if eq .spec.distribution.modules.policy.type "gatekeeper" }} +$kubectlbin delete --ignore-not-found=true validatingwebhookconfiguration gatekeeper-validating-webhook-configuration +{{- end }} diff --git a/configs/upgrades/kfddistribution/1.28.1-1.29.1/pre-distribution.sh.tpl b/configs/upgrades/kfddistribution/1.28.1-1.29.1/pre-distribution.sh.tpl new file mode 100644 index 000000000..2eeeb36a4 --- /dev/null +++ b/configs/upgrades/kfddistribution/1.28.1-1.29.1/pre-distribution.sh.tpl @@ -0,0 +1,10 @@ +#!/usr/bin/env sh + +set -e + +kubectlbin="{{ .paths.kubectl }}" + +# Remove some validating webhooks during the upgrade +{{- if eq .spec.distribution.modules.policy.type "gatekeeper" }} +$kubectlbin delete --ignore-not-found=true validatingwebhookconfiguration gatekeeper-validating-webhook-configuration +{{- end }} diff --git a/configs/upgrades/kfddistribution/1.29.0-1.29.1/pre-distribution.sh.tpl b/configs/upgrades/kfddistribution/1.29.0-1.29.1/pre-distribution.sh.tpl new file mode 100644 index 000000000..2eeeb36a4 --- /dev/null +++ b/configs/upgrades/kfddistribution/1.29.0-1.29.1/pre-distribution.sh.tpl @@ -0,0 +1,10 @@ +#!/usr/bin/env sh + +set -e + +kubectlbin="{{ .paths.kubectl }}" + +# Remove some validating webhooks during the upgrade +{{- if eq .spec.distribution.modules.policy.type "gatekeeper" }} +$kubectlbin delete --ignore-not-found=true validatingwebhookconfiguration gatekeeper-validating-webhook-configuration +{{- end }} diff --git a/configs/upgrades/onpremises/1.26.5-1.27.5/pre-distribution.sh.tpl b/configs/upgrades/onpremises/1.26.5-1.27.6/pre-distribution.sh.tpl similarity index 100% rename from configs/upgrades/onpremises/1.26.5-1.27.5/pre-distribution.sh.tpl rename to configs/upgrades/onpremises/1.26.5-1.27.6/pre-distribution.sh.tpl diff --git a/configs/upgrades/onpremises/1.26.5-1.27.5/pre-kubernetes.sh.tpl b/configs/upgrades/onpremises/1.26.5-1.27.6/pre-kubernetes.sh.tpl similarity index 100% rename from configs/upgrades/onpremises/1.26.5-1.27.5/pre-kubernetes.sh.tpl rename to configs/upgrades/onpremises/1.26.5-1.27.6/pre-kubernetes.sh.tpl diff --git a/configs/upgrades/onpremises/1.26.6-1.27.6/pre-distribution.sh.tpl b/configs/upgrades/onpremises/1.26.6-1.27.6/pre-distribution.sh.tpl new file mode 100644 index 000000000..2eeeb36a4 --- /dev/null +++ b/configs/upgrades/onpremises/1.26.6-1.27.6/pre-distribution.sh.tpl @@ -0,0 +1,10 @@ +#!/usr/bin/env sh + +set -e + +kubectlbin="{{ .paths.kubectl }}" + +# Remove some validating webhooks during the upgrade +{{- if eq .spec.distribution.modules.policy.type "gatekeeper" }} +$kubectlbin delete --ignore-not-found=true validatingwebhookconfiguration gatekeeper-validating-webhook-configuration +{{- end }} diff --git a/configs/upgrades/onpremises/1.26.6-1.27.5/pre-kubernetes.sh.tpl b/configs/upgrades/onpremises/1.26.6-1.27.6/pre-kubernetes.sh.tpl similarity index 100% rename from configs/upgrades/onpremises/1.26.6-1.27.5/pre-kubernetes.sh.tpl rename to configs/upgrades/onpremises/1.26.6-1.27.6/pre-kubernetes.sh.tpl diff --git a/configs/upgrades/onpremises/1.27.4-1.28.0/pre-distribution.sh.tpl b/configs/upgrades/onpremises/1.27.4-1.28.1/pre-distribution.sh.tpl similarity index 100% rename from configs/upgrades/onpremises/1.27.4-1.28.0/pre-distribution.sh.tpl rename to configs/upgrades/onpremises/1.27.4-1.28.1/pre-distribution.sh.tpl diff --git a/configs/upgrades/onpremises/1.27.4-1.28.0/pre-kubernetes.sh.tpl b/configs/upgrades/onpremises/1.27.4-1.28.1/pre-kubernetes.sh.tpl similarity index 100% rename from configs/upgrades/onpremises/1.27.4-1.28.0/pre-kubernetes.sh.tpl rename to configs/upgrades/onpremises/1.27.4-1.28.1/pre-kubernetes.sh.tpl diff --git a/configs/upgrades/onpremises/1.27.5-1.27.6/pre-distribution.sh.tpl b/configs/upgrades/onpremises/1.27.5-1.27.6/pre-distribution.sh.tpl new file mode 100644 index 000000000..2eeeb36a4 --- /dev/null +++ b/configs/upgrades/onpremises/1.27.5-1.27.6/pre-distribution.sh.tpl @@ -0,0 +1,10 @@ +#!/usr/bin/env sh + +set -e + +kubectlbin="{{ .paths.kubectl }}" + +# Remove some validating webhooks during the upgrade +{{- if eq .spec.distribution.modules.policy.type "gatekeeper" }} +$kubectlbin delete --ignore-not-found=true validatingwebhookconfiguration gatekeeper-validating-webhook-configuration +{{- end }} diff --git a/configs/upgrades/onpremises/1.27.5-1.28.0/pre-kubernetes.sh.tpl b/configs/upgrades/onpremises/1.27.5-1.27.6/pre-kubernetes.sh.tpl similarity index 100% rename from configs/upgrades/onpremises/1.27.5-1.28.0/pre-kubernetes.sh.tpl rename to configs/upgrades/onpremises/1.27.5-1.27.6/pre-kubernetes.sh.tpl diff --git a/configs/upgrades/onpremises/1.27.5-1.28.1/pre-distribution.sh.tpl b/configs/upgrades/onpremises/1.27.5-1.28.1/pre-distribution.sh.tpl new file mode 100644 index 000000000..2eeeb36a4 --- /dev/null +++ b/configs/upgrades/onpremises/1.27.5-1.28.1/pre-distribution.sh.tpl @@ -0,0 +1,10 @@ +#!/usr/bin/env sh + +set -e + +kubectlbin="{{ .paths.kubectl }}" + +# Remove some validating webhooks during the upgrade +{{- if eq .spec.distribution.modules.policy.type "gatekeeper" }} +$kubectlbin delete --ignore-not-found=true validatingwebhookconfiguration gatekeeper-validating-webhook-configuration +{{- end }} diff --git a/configs/upgrades/onpremises/1.28.0-1.29.0/pre-kubernetes.sh.tpl b/configs/upgrades/onpremises/1.27.5-1.28.1/pre-kubernetes.sh.tpl similarity index 100% rename from configs/upgrades/onpremises/1.28.0-1.29.0/pre-kubernetes.sh.tpl rename to configs/upgrades/onpremises/1.27.5-1.28.1/pre-kubernetes.sh.tpl diff --git a/configs/upgrades/onpremises/1.27.6-1.28.1/pre-distribution.sh.tpl b/configs/upgrades/onpremises/1.27.6-1.28.1/pre-distribution.sh.tpl new file mode 100644 index 000000000..2eeeb36a4 --- /dev/null +++ b/configs/upgrades/onpremises/1.27.6-1.28.1/pre-distribution.sh.tpl @@ -0,0 +1,10 @@ +#!/usr/bin/env sh + +set -e + +kubectlbin="{{ .paths.kubectl }}" + +# Remove some validating webhooks during the upgrade +{{- if eq .spec.distribution.modules.policy.type "gatekeeper" }} +$kubectlbin delete --ignore-not-found=true validatingwebhookconfiguration gatekeeper-validating-webhook-configuration +{{- end }} diff --git a/configs/upgrades/onpremises/1.27.6-1.28.1/pre-kubernetes.sh.tpl b/configs/upgrades/onpremises/1.27.6-1.28.1/pre-kubernetes.sh.tpl new file mode 100644 index 000000000..12e984f66 --- /dev/null +++ b/configs/upgrades/onpremises/1.27.6-1.28.1/pre-kubernetes.sh.tpl @@ -0,0 +1,20 @@ +#!/usr/bin/env sh + +set -e + +{{- if index .spec "kubernetes" }} + +## master upgrades - only one at a time +{{- range $h := .spec.kubernetes.masters.hosts }} +ansible-playbook 55.upgrade-control-plane.yml --limit "{{ $h.name }}" --become +{{- end }} + +{{- if ne .upgrade.skipNodesUpgrade true }} +{{- range $n := .spec.kubernetes.nodes }} + {{- range $h := $n.hosts }} +ansible-playbook 56.upgrade-worker-nodes.yml --limit "{{ $h.name }}" + {{- end }} +{{- end }} +{{- end }} + +{{- end }} diff --git a/configs/upgrades/onpremises/1.28.0-1.28.1/pre-distribution.sh.tpl b/configs/upgrades/onpremises/1.28.0-1.28.1/pre-distribution.sh.tpl new file mode 100644 index 000000000..2eeeb36a4 --- /dev/null +++ b/configs/upgrades/onpremises/1.28.0-1.28.1/pre-distribution.sh.tpl @@ -0,0 +1,10 @@ +#!/usr/bin/env sh + +set -e + +kubectlbin="{{ .paths.kubectl }}" + +# Remove some validating webhooks during the upgrade +{{- if eq .spec.distribution.modules.policy.type "gatekeeper" }} +$kubectlbin delete --ignore-not-found=true validatingwebhookconfiguration gatekeeper-validating-webhook-configuration +{{- end }} diff --git a/configs/upgrades/onpremises/1.28.0-1.28.1/pre-kubernetes.sh.tpl b/configs/upgrades/onpremises/1.28.0-1.28.1/pre-kubernetes.sh.tpl new file mode 100644 index 000000000..12e984f66 --- /dev/null +++ b/configs/upgrades/onpremises/1.28.0-1.28.1/pre-kubernetes.sh.tpl @@ -0,0 +1,20 @@ +#!/usr/bin/env sh + +set -e + +{{- if index .spec "kubernetes" }} + +## master upgrades - only one at a time +{{- range $h := .spec.kubernetes.masters.hosts }} +ansible-playbook 55.upgrade-control-plane.yml --limit "{{ $h.name }}" --become +{{- end }} + +{{- if ne .upgrade.skipNodesUpgrade true }} +{{- range $n := .spec.kubernetes.nodes }} + {{- range $h := $n.hosts }} +ansible-playbook 56.upgrade-worker-nodes.yml --limit "{{ $h.name }}" + {{- end }} +{{- end }} +{{- end }} + +{{- end }} diff --git a/configs/upgrades/onpremises/1.28.1-1.29.1/pre-distribution.sh.tpl b/configs/upgrades/onpremises/1.28.1-1.29.1/pre-distribution.sh.tpl new file mode 100644 index 000000000..2eeeb36a4 --- /dev/null +++ b/configs/upgrades/onpremises/1.28.1-1.29.1/pre-distribution.sh.tpl @@ -0,0 +1,10 @@ +#!/usr/bin/env sh + +set -e + +kubectlbin="{{ .paths.kubectl }}" + +# Remove some validating webhooks during the upgrade +{{- if eq .spec.distribution.modules.policy.type "gatekeeper" }} +$kubectlbin delete --ignore-not-found=true validatingwebhookconfiguration gatekeeper-validating-webhook-configuration +{{- end }} diff --git a/configs/upgrades/onpremises/1.28.1-1.29.1/pre-kubernetes.sh.tpl b/configs/upgrades/onpremises/1.28.1-1.29.1/pre-kubernetes.sh.tpl new file mode 100644 index 000000000..12e984f66 --- /dev/null +++ b/configs/upgrades/onpremises/1.28.1-1.29.1/pre-kubernetes.sh.tpl @@ -0,0 +1,20 @@ +#!/usr/bin/env sh + +set -e + +{{- if index .spec "kubernetes" }} + +## master upgrades - only one at a time +{{- range $h := .spec.kubernetes.masters.hosts }} +ansible-playbook 55.upgrade-control-plane.yml --limit "{{ $h.name }}" --become +{{- end }} + +{{- if ne .upgrade.skipNodesUpgrade true }} +{{- range $n := .spec.kubernetes.nodes }} + {{- range $h := $n.hosts }} +ansible-playbook 56.upgrade-worker-nodes.yml --limit "{{ $h.name }}" + {{- end }} +{{- end }} +{{- end }} + +{{- end }} diff --git a/configs/upgrades/onpremises/1.29.0-1.29.1/pre-distribution.sh.tpl b/configs/upgrades/onpremises/1.29.0-1.29.1/pre-distribution.sh.tpl new file mode 100644 index 000000000..2eeeb36a4 --- /dev/null +++ b/configs/upgrades/onpremises/1.29.0-1.29.1/pre-distribution.sh.tpl @@ -0,0 +1,10 @@ +#!/usr/bin/env sh + +set -e + +kubectlbin="{{ .paths.kubectl }}" + +# Remove some validating webhooks during the upgrade +{{- if eq .spec.distribution.modules.policy.type "gatekeeper" }} +$kubectlbin delete --ignore-not-found=true validatingwebhookconfiguration gatekeeper-validating-webhook-configuration +{{- end }} diff --git a/configs/upgrades/onpremises/1.29.0-1.29.1/pre-kubernetes.sh.tpl b/configs/upgrades/onpremises/1.29.0-1.29.1/pre-kubernetes.sh.tpl new file mode 100644 index 000000000..12e984f66 --- /dev/null +++ b/configs/upgrades/onpremises/1.29.0-1.29.1/pre-kubernetes.sh.tpl @@ -0,0 +1,20 @@ +#!/usr/bin/env sh + +set -e + +{{- if index .spec "kubernetes" }} + +## master upgrades - only one at a time +{{- range $h := .spec.kubernetes.masters.hosts }} +ansible-playbook 55.upgrade-control-plane.yml --limit "{{ $h.name }}" --become +{{- end }} + +{{- if ne .upgrade.skipNodesUpgrade true }} +{{- range $n := .spec.kubernetes.nodes }} + {{- range $h := $n.hosts }} +ansible-playbook 56.upgrade-worker-nodes.yml --limit "{{ $h.name }}" + {{- end }} +{{- end }} +{{- end }} + +{{- end }} diff --git a/docs/COMPATIBILITY_MATRIX.md b/docs/COMPATIBILITY_MATRIX.md index b057ae16e..0e1454951 100644 --- a/docs/COMPATIBILITY_MATRIX.md +++ b/docs/COMPATIBILITY_MATRIX.md @@ -4,24 +4,26 @@ Note: Always use the latest `furyctl` version, we make sure that is compatible w Warning: Versions < 0.27.5 do not work with the OnPremises provider, we fixed this issue in 0.27.5, so we recommend using this version or later. -| Furyctl / KFD | 1.29.0 | 1.28.0 | 1.27.5 | 1.27.4 | 1.27.3 | 1.27.2 | 1.27.1 | 1.27.0 | 1.26.6 | 1.26.5 | 1.26.4 | 1.26.3 | 1.25.10 | 1.25.9 | 1.25.8 | -| ------------- | ------------------ | ------------------ | ------------------ | ------------------ | ------------------ | ------------------ | ------------------ | ------------------ | ------------------ | ------------------ | ------------------ | ------------------ | ------------------ | ------------------ | ------------------ | -| 0.29.0 | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | -| 0.28.0 | | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | -| 0.27.8 | | | | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | -| 0.27.7 | | | | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | -| 0.27.6 | | | | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | -| 0.27.5 | | | | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | -| 0.27.4 | | | | :warning: | :warning: | :warning: | :warning: | :warning: | | :warning: | :warning: | :warning: | :warning: | :warning: | :warning: -| 0.27.3 | | | | :warning: | :warning: | :warning: | :warning: | :warning: | | :warning: | :warning: | :warning: | :warning: | :warning: | :warning: -| 0.27.2 | | | | | :warning: | :warning: | :warning: | | | :warning: | :warning: | | :warning: | :warning: | :warning: -| 0.27.1 | | | | | | :warning: | :warning: | | | :warning: | :warning: | | :warning: | :warning: | :warning: -| 0.27.0 | | | | | | :warning: | :warning: | | | :warning: | :warning: | | :warning: | :warning: | :warning: +| Furyctl / KFD | 1.29.1 | 1.29.0 | 1.28.1 | 1.28.0 | 1.27.6 | 1.27.5 | 1.27.4 | 1.27.3 | 1.27.2 | 1.27.1 | 1.27.0 | 1.26.6 | 1.26.5 | 1.26.4 | 1.26.3 | 1.25.10 | 1.25.9 | 1.25.8 | +| ------------- | ------------------ | ------------------ | ------------------ | ------------------ | ------------------ | ------------------ | ------------------ | ------------------ | ------------------ | ------------------ | ------------------ | ------------------ | ------------------ | ------------------ | ------------------ | ------------------ | ------------------ | ------------------ | +| 0.29.1 | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | +| 0.29.0 | | :white_check_mark: | | :white_check_mark: | | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | +| 0.28.0 | | | | :white_check_mark: | | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | +| 0.27.8 | | | | | | | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | +| 0.27.7 | | | | | | | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | +| 0.27.6 | | | | | | | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | +| 0.27.5 | | | | | | | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | +| 0.27.4 | | | | | | | :warning: | :warning: | :warning: | :warning: | :warning: | | :warning: | :warning: | :warning: | :warning: | :warning: | :warning: +| 0.27.3 | | | | | | | :warning: | :warning: | :warning: | :warning: | :warning: | | :warning: | :warning: | :warning: | :warning: | :warning: | :warning: +| 0.27.2 | | | | | | | | :warning: | :warning: | :warning: | | | :warning: | :warning: | | :warning: | :warning: | :warning: +| 0.27.1 | | | | | | | | | :warning: | :warning: | | | :warning: | :warning: | | :warning: | :warning: | :warning: +| 0.27.0 | | | | | | | | | :warning: | :warning: | | | :warning: | :warning: | | :warning: | :warning: | :warning: ## Furyctl and Providers compatibility | Furyctl / Providers | EKSCluster | KFDDistribution | OnPremises | | ------------------- | ------------------ | ------------------ | ------------------ | +| 0.29.1 | :white_check_mark: | :white_check_mark: | :white_check_mark: | | 0.29.0 | :white_check_mark: | :white_check_mark: | :white_check_mark: | | 0.28.0 | :white_check_mark: | :white_check_mark: | :white_check_mark: | | 0.27.8 | :white_check_mark: | :white_check_mark: | :white_check_mark: | diff --git a/go.mod b/go.mod index 6656730f3..1923c56c2 100644 --- a/go.mod +++ b/go.mod @@ -21,7 +21,7 @@ require ( github.com/r3labs/diff/v3 v3.0.1 github.com/santhosh-tekuri/jsonschema/v5 v5.3.1 github.com/shirou/gopsutil/v3 v3.24.1 - github.com/sighupio/fury-distribution v1.28.0 + github.com/sighupio/fury-distribution v1.29.1-0.20240508104617-fc37dd0a031f github.com/sirupsen/logrus v1.9.3 github.com/spf13/cobra v1.8.0 github.com/spf13/viper v1.18.2 diff --git a/go.sum b/go.sum index c3df722f9..86338e6bd 100644 --- a/go.sum +++ b/go.sum @@ -554,6 +554,8 @@ github.com/shopspring/decimal v1.3.1 h1:2Usl1nmF/WZucqkFZhnfFYxxxu8LG21F6nPQBE5g github.com/shopspring/decimal v1.3.1/go.mod h1:DKyhrW/HYNuLGql+MJL6WCR6knT2jwCFRcu2hWCYk4o= github.com/sighupio/fury-distribution v1.28.0 h1:L86HzVE1z10KcQF08SzOEcD4OLOZkT3r36Qdrt6B1ls= github.com/sighupio/fury-distribution v1.28.0/go.mod h1:iYBnl0N/6zGPz3j3L2X6nzFC3nzNQtIkAzmaPfnO0zA= +github.com/sighupio/fury-distribution v1.29.1-0.20240508104617-fc37dd0a031f h1:6kHGk0ozIwPoik5w5hd8ySS7qiLKnc9TrdLVXXmqXn0= +github.com/sighupio/fury-distribution v1.29.1-0.20240508104617-fc37dd0a031f/go.mod h1:iYBnl0N/6zGPz3j3L2X6nzFC3nzNQtIkAzmaPfnO0zA= github.com/sirupsen/logrus v1.9.3 h1:dueUQJ1C2q9oE3F7wvmSGAaVtTmUizReu6fjN8uqzbQ= github.com/sirupsen/logrus v1.9.3/go.mod h1:naHLuLoDiP4jHNo9R0sCBMtWGeIprob74mVsIT4qYEQ= github.com/sourcegraph/conc v0.3.0 h1:OQTbbt6P72L20UqAkXXuLOj79LfEanQ+YQFNpLA9ySo= diff --git a/internal/distribution/compatibility.go b/internal/distribution/compatibility.go index b0751d33e..407a72ec2 100644 --- a/internal/distribution/compatibility.go +++ b/internal/distribution/compatibility.go @@ -85,7 +85,7 @@ func (c *EKSClusterCheck) IsCompatible() bool { return false } - max12SevenVersion, err := semver.NewVersion("v1.27.5") + max12SevenVersion, err := semver.NewVersion("v1.27.6") if err != nil { return false } @@ -113,8 +113,8 @@ func (c *EKSClusterCheck) IsCompatible() bool { return (currentVersion.GreaterThanOrEqual(min125Version) && currentVersion.LessThanOrEqual(max125Version)) || (currentVersion.GreaterThanOrEqual(min126Version) && currentVersion.LessThanOrEqual(max126Version)) || (currentVersion.GreaterThanOrEqual(min12SevenVersion) && currentVersion.LessThanOrEqual(max12SevenVersion)) || - (currentVersion.GreaterThanOrEqual(min12EightVersion)) && currentVersion.LessThan(max12EightVersion) || - (currentVersion.GreaterThanOrEqual(min12NineVersion)) && currentVersion.LessThan(max12NineVersion) + (currentVersion.GreaterThanOrEqual(min12EightVersion)) && currentVersion.LessThanOrEqual(max12EightVersion) || + (currentVersion.GreaterThanOrEqual(min12NineVersion)) && currentVersion.LessThanOrEqual(max12NineVersion) } type KFDDistributionCheck struct { @@ -158,7 +158,7 @@ func (c *KFDDistributionCheck) IsCompatible() bool { return false } - max12SevenVersion, err := semver.NewVersion("v1.27.5") + max12SevenVersion, err := semver.NewVersion("v1.27.6") if err != nil { return false } @@ -186,8 +186,8 @@ func (c *KFDDistributionCheck) IsCompatible() bool { return (currentVersion.GreaterThanOrEqual(min125Version) && currentVersion.LessThanOrEqual(max125Version)) || (currentVersion.GreaterThanOrEqual(min126Version) && currentVersion.LessThanOrEqual(max126Version)) || (currentVersion.GreaterThanOrEqual(min12SevenVersion) && currentVersion.LessThanOrEqual(max12SevenVersion)) || - (currentVersion.GreaterThanOrEqual(min12EightVersion)) && currentVersion.LessThan(max12EightVersion) || - (currentVersion.GreaterThanOrEqual(min12NineVersion)) && currentVersion.LessThan(max12NineVersion) + (currentVersion.GreaterThanOrEqual(min12EightVersion)) && currentVersion.LessThanOrEqual(max12EightVersion) || + (currentVersion.GreaterThanOrEqual(min12NineVersion)) && currentVersion.LessThanOrEqual(max12NineVersion) } type OnPremisesCheck struct { @@ -231,7 +231,7 @@ func (c *OnPremisesCheck) IsCompatible() bool { return false } - max12SevenVersion, err := semver.NewVersion("v1.27.5") + max12SevenVersion, err := semver.NewVersion("v1.27.6") if err != nil { return false } @@ -259,6 +259,6 @@ func (c *OnPremisesCheck) IsCompatible() bool { return (currentVersion.GreaterThanOrEqual(min125Version) && currentVersion.LessThanOrEqual(max125Version)) || (currentVersion.GreaterThanOrEqual(min126Version) && currentVersion.LessThanOrEqual(max126Version)) || (currentVersion.GreaterThanOrEqual(min12SevenVersion) && currentVersion.LessThanOrEqual(max12SevenVersion)) || - (currentVersion.GreaterThanOrEqual(min12EightVersion)) && currentVersion.LessThan(max12EightVersion) || - (currentVersion.GreaterThanOrEqual(min12NineVersion)) && currentVersion.LessThan(max12NineVersion) + (currentVersion.GreaterThanOrEqual(min12EightVersion)) && currentVersion.LessThanOrEqual(max12EightVersion) || + (currentVersion.GreaterThanOrEqual(min12NineVersion)) && currentVersion.LessThanOrEqual(max12NineVersion) } diff --git a/internal/distribution/compatibility_test.go b/internal/distribution/compatibility_test.go index 4bbe42318..34c405a2b 100644 --- a/internal/distribution/compatibility_test.go +++ b/internal/distribution/compatibility_test.go @@ -51,18 +51,18 @@ func TestEKSClusterCheckIsCompatible(t *testing.T) { expected: false, }, { - name: "should return false if distribution version is greater than 1.27.5", - distributionVersion: "v1.27.6", + name: "should return false if distribution version is greater than 1.27.6", + distributionVersion: "v1.27.7", expected: false, }, { - name: "should return true if distribution version is equal to 1.28.0", - distributionVersion: "v1.28.0", + name: "should return true if distribution version is equal to 1.28.1", + distributionVersion: "v1.28.1", expected: true, }, { - name: "should return true if distribution version is equal to 1.29.0", - distributionVersion: "v1.29.0", + name: "should return true if distribution version is equal to 1.29.1", + distributionVersion: "v1.29.1", expected: true, }, } @@ -128,23 +128,18 @@ func TestKFDDistributionCheckIsCompatible(t *testing.T) { expected: true, }, { - name: "should return false if distribution version is greater than 1.27.5", - distributionVersion: "v1.27.6", + name: "should return false if distribution version is greater than 1.27.6", + distributionVersion: "v1.27.7", expected: false, }, { - name: "should return true if distribution version is equal to 1.28.0", - distributionVersion: "v1.28.0", + name: "should return true if distribution version is equal to 1.28.1", + distributionVersion: "v1.28.1", expected: true, }, { - name: "should return true if distribution version is equal to 1.28.0", - distributionVersion: "v1.28.0", - expected: true, - }, - { - name: "should return true if distribution version is equal to 1.29.0", - distributionVersion: "v1.29.0", + name: "should return true if distribution version is equal to 1.29.1", + distributionVersion: "v1.29.1", expected: true, }, } @@ -210,18 +205,18 @@ func TestOnPremisesCheckIsCompatible(t *testing.T) { expected: true, }, { - name: "should return false if distribution version is greater than 1.27.5", - distributionVersion: "v1.27.6", + name: "should return false if distribution version is greater than 1.27.6", + distributionVersion: "v1.27.7", expected: false, }, { - name: "should return true if distribution version is equal to 1.28.0", - distributionVersion: "v1.28.0", + name: "should return true if distribution version is equal to 1.28.1", + distributionVersion: "v1.28.1", expected: true, }, { - name: "should return true if distribution version is equal to 1.29.0", - distributionVersion: "v1.29.0", + name: "should return true if distribution version is equal to 1.29.1", + distributionVersion: "v1.29.1", expected: true, }, } diff --git a/test/expensive/ekscluster/furyctl_test.go b/test/expensive/ekscluster/furyctl_test.go index 20d83de75..8febc0e58 100644 --- a/test/expensive/ekscluster/furyctl_test.go +++ b/test/expensive/ekscluster/furyctl_test.go @@ -167,14 +167,17 @@ var ( _ = Describe("furyctl & distro v1.27.3 - public minimal", CreateAndDeleteTestScenario("1.27.3", false)) _ = Describe("furyctl & distro v1.27.4 - public minimal", CreateAndDeleteTestScenario("1.27.4", false)) _ = Describe("furyctl & distro v1.27.5 - public minimal", CreateAndDeleteTestScenario("1.27.5", false)) + _ = Describe("furyctl & distro v1.27.6 - public minimal", CreateAndDeleteTestScenario("1.27.6", false)) - _ = Describe("furyctl & distro v1.27.5 - public minimal - ephemeral", CreateAndDeleteTestScenario("1.27.5", true)) + _ = Describe("furyctl & distro v1.27.6 - public minimal - ephemeral", CreateAndDeleteTestScenario("1.27.6", true)) _ = Describe("furyctl & distro v1.28.0 - public minimal", CreateAndDeleteTestScenario("1.28.0", false)) + _ = Describe("furyctl & distro v1.28.1 - public minimal", CreateAndDeleteTestScenario("1.28.1", false)) - _ = Describe("furyctl & distro v1.28.0 - public minimal - ephemeral", CreateAndDeleteTestScenario("1.28.0", true)) + _ = Describe("furyctl & distro v1.28.1 - public minimal - ephemeral", CreateAndDeleteTestScenario("1.28.1", true)) _ = Describe("furyctl & distro v1.29.0 - public minimal", CreateAndDeleteTestScenario("1.29.0", false)) + _ = Describe("furyctl & distro v1.29.1 - public minimal", CreateAndDeleteTestScenario("1.29.1", false)) - _ = Describe("furyctl & distro v1.29.0 - public minimal - ephemeral", CreateAndDeleteTestScenario("1.29.0", true)) + _ = Describe("furyctl & distro v1.29.1 - public minimal - ephemeral", CreateAndDeleteTestScenario("1.29.1", true)) ) diff --git a/test/expensive/ekscluster/testdata/ekscluster-v1-27-6-create-and-delete/furyctl-public-minimal.yaml.tpl b/test/expensive/ekscluster/testdata/ekscluster-v1-27-6-create-and-delete/furyctl-public-minimal.yaml.tpl new file mode 100644 index 000000000..0629817c8 --- /dev/null +++ b/test/expensive/ekscluster/testdata/ekscluster-v1-27-6-create-and-delete/furyctl-public-minimal.yaml.tpl @@ -0,0 +1,86 @@ +# This file represents a minimal config for a public EKS cluster with 1.25.9 version +# and the least amount of modules enabled. +--- +apiVersion: kfd.sighup.io/v1alpha2 +kind: EKSCluster +metadata: + name: __CLUSTER_NAME__ +spec: + distributionVersion: v1.27.6 + toolsConfiguration: + terraform: + state: + s3: + bucketName: __CLUSTER_NAME__ + keyPrefix: swe-dev/__CLUSTER_NAME__ + region: eu-west-1 + region: eu-west-1 + tags: + env: "swe-dev" + k8s: "__CLUSTER_NAME__" + githubOrg: "sighupio" + githubRepo: "furyctl" + infrastructure: + vpc: + network: + cidr: 10.10.0.0/16 + subnetsCidrs: + private: + - 10.10.0.0/20 + - 10.10.16.0/20 + - 10.10.32.0/20 + - 10.10.48.0/20 + public: + - 10.10.192.0/24 + - 10.10.193.0/24 + - 10.10.194.0/24 + kubernetes: + apiServer: + privateAccess: false + publicAccess: true + privateAccessCidrs: ["0.0.0.0/0"] + publicAccessCidrs: ["0.0.0.0/0"] + nodeAllowedSshPublicKey: "{file://./id_ed25519.pub}" + nodePoolsLaunchKind: "launch_templates" + logRetentionDays: 1 + nodePools: + - name: workers + size: + min: 1 + max: 2 + instance: + type: t3.xlarge + spot: true + volumeSize: 50 + tags: + k8s.io/cluster-autoscaler/node-template/label/nodepool: "workers" + k8s.io/cluster-autoscaler/node-template/label/node.kubernetes.io/role: "workers" + distribution: + modules: + auth: + provider: + type: none + ingress: + baseDomain: internal.example.dev + nginx: + type: none + tls: + provider: none + certManager: + clusterIssuer: + name: letsencrypt-fury + email: engineering@sighup.io + type: http01 + dns: + public: + name: "example.dev" + create: true + private: + name: "internal.example.dev" + create: true + logging: + type: none + policy: + type: none + dr: + type: none diff --git a/test/expensive/ekscluster/testdata/ekscluster-v1-28-1-create-and-delete/furyctl-public-minimal.yaml.tpl b/test/expensive/ekscluster/testdata/ekscluster-v1-28-1-create-and-delete/furyctl-public-minimal.yaml.tpl new file mode 100644 index 000000000..f85885491 --- /dev/null +++ b/test/expensive/ekscluster/testdata/ekscluster-v1-28-1-create-and-delete/furyctl-public-minimal.yaml.tpl @@ -0,0 +1,86 @@ +# This file represents a minimal config for a public EKS cluster with 1.25.9 version +# and the least amount of modules enabled. +--- +apiVersion: kfd.sighup.io/v1alpha2 +kind: EKSCluster +metadata: + name: __CLUSTER_NAME__ +spec: + distributionVersion: v1.28.1 + toolsConfiguration: + terraform: + state: + s3: + bucketName: __CLUSTER_NAME__ + keyPrefix: swe-dev/__CLUSTER_NAME__ + region: eu-west-1 + region: eu-west-1 + tags: + env: "swe-dev" + k8s: "__CLUSTER_NAME__" + githubOrg: "sighupio" + githubRepo: "furyctl" + infrastructure: + vpc: + network: + cidr: 10.10.0.0/16 + subnetsCidrs: + private: + - 10.10.0.0/20 + - 10.10.16.0/20 + - 10.10.32.0/20 + - 10.10.48.0/20 + public: + - 10.10.192.0/24 + - 10.10.193.0/24 + - 10.10.194.0/24 + kubernetes: + apiServer: + privateAccess: false + publicAccess: true + privateAccessCidrs: ["0.0.0.0/0"] + publicAccessCidrs: ["0.0.0.0/0"] + nodeAllowedSshPublicKey: "{file://./id_ed25519.pub}" + nodePoolsLaunchKind: "launch_templates" + logRetentionDays: 1 + nodePools: + - name: workers + size: + min: 1 + max: 2 + instance: + type: t3.xlarge + spot: true + volumeSize: 50 + tags: + k8s.io/cluster-autoscaler/node-template/label/nodepool: "workers" + k8s.io/cluster-autoscaler/node-template/label/node.kubernetes.io/role: "workers" + distribution: + modules: + auth: + provider: + type: none + ingress: + baseDomain: internal.example.dev + nginx: + type: none + tls: + provider: none + certManager: + clusterIssuer: + name: letsencrypt-fury + email: engineering@sighup.io + type: http01 + dns: + public: + name: "example.dev" + create: true + private: + name: "internal.example.dev" + create: true + logging: + type: none + policy: + type: none + dr: + type: none diff --git a/test/expensive/ekscluster/testdata/ekscluster-v1-29-1-create-and-delete/furyctl-public-minimal.yaml.tpl b/test/expensive/ekscluster/testdata/ekscluster-v1-29-1-create-and-delete/furyctl-public-minimal.yaml.tpl new file mode 100644 index 000000000..8cc168b23 --- /dev/null +++ b/test/expensive/ekscluster/testdata/ekscluster-v1-29-1-create-and-delete/furyctl-public-minimal.yaml.tpl @@ -0,0 +1,86 @@ +# This file represents a minimal config for a public EKS cluster with 1.25.9 version +# and the least amount of modules enabled. +--- +apiVersion: kfd.sighup.io/v1alpha2 +kind: EKSCluster +metadata: + name: __CLUSTER_NAME__ +spec: + distributionVersion: v1.29.1 + toolsConfiguration: + terraform: + state: + s3: + bucketName: __CLUSTER_NAME__ + keyPrefix: swe-dev/__CLUSTER_NAME__ + region: eu-west-1 + region: eu-west-1 + tags: + env: "swe-dev" + k8s: "__CLUSTER_NAME__" + githubOrg: "sighupio" + githubRepo: "furyctl" + infrastructure: + vpc: + network: + cidr: 10.10.0.0/16 + subnetsCidrs: + private: + - 10.10.0.0/20 + - 10.10.16.0/20 + - 10.10.32.0/20 + - 10.10.48.0/20 + public: + - 10.10.192.0/24 + - 10.10.193.0/24 + - 10.10.194.0/24 + kubernetes: + apiServer: + privateAccess: false + publicAccess: true + privateAccessCidrs: ["0.0.0.0/0"] + publicAccessCidrs: ["0.0.0.0/0"] + nodeAllowedSshPublicKey: "{file://./id_ed25519.pub}" + nodePoolsLaunchKind: "launch_templates" + logRetentionDays: 1 + nodePools: + - name: workers + size: + min: 1 + max: 2 + instance: + type: t3.xlarge + spot: true + volumeSize: 50 + tags: + k8s.io/cluster-autoscaler/node-template/label/nodepool: "workers" + k8s.io/cluster-autoscaler/node-template/label/node.kubernetes.io/role: "workers" + distribution: + modules: + auth: + provider: + type: none + ingress: + baseDomain: internal.example.dev + nginx: + type: none + tls: + provider: none + certManager: + clusterIssuer: + name: letsencrypt-fury + email: engineering@sighup.io + type: http01 + dns: + public: + name: "example.dev" + create: true + private: + name: "internal.example.dev" + create: true + logging: + type: none + policy: + type: none + dr: + type: none diff --git a/test/expensive/kfddistribution/furyctl_test.go b/test/expensive/kfddistribution/furyctl_test.go index 60e91a269..7ef6d50b6 100644 --- a/test/expensive/kfddistribution/furyctl_test.go +++ b/test/expensive/kfddistribution/furyctl_test.go @@ -245,11 +245,17 @@ var ( _ = Describe("furyctl & distro v1.27.5 - minimal", Ordered, Serial, CreateAndDeleteTestScenario("1.27.5", "v1.27.10", false)) + _ = Describe("furyctl & distro v1.27.6 - minimal", Ordered, Serial, CreateAndDeleteTestScenario("1.27.6", "v1.27.10", false)) + _ = Describe("furyctl & distro v1.28.0 - minimal", Ordered, Serial, CreateAndDeleteTestScenario("1.28.0", "v1.28.6", false)) + _ = Describe("furyctl & distro v1.28.1 - minimal", Ordered, Serial, CreateAndDeleteTestScenario("1.28.1", "v1.28.6", false)) + _ = Describe("furyctl & distro v1.29.0 - minimal", Ordered, Serial, CreateAndDeleteTestScenario("1.29.0", "v1.29.2", false)) - _ = Describe("furyctl & distro v1.27.4 - minimal - ephemeral", Ordered, Serial, CreateAndDeleteTestScenario("1.27.4", "v1.27.3", true)) + _ = Describe("furyctl & distro v1.29.1 - minimal", Ordered, Serial, CreateAndDeleteTestScenario("1.29.1", "v1.29.2", false)) + + _ = Describe("furyctl & distro v1.29.1 - minimal - ephemeral", Ordered, Serial, CreateAndDeleteTestScenario("1.29.1", "v1.29.2", true)) _ = Describe("furyctl & distro v1.25.4 - minimal - by phase", Ordered, Serial, CreateAndDeleteByPhaseTestScenario("1.25.4", "v1.25.11", false)) @@ -289,7 +295,13 @@ var ( _ = Describe("furyctl & distro v1.27.5 - minimal - by phase", Ordered, Serial, CreateAndDeleteByPhaseTestScenario("1.27.5", "v1.27.10", false)) + _ = Describe("furyctl & distro v1.27.6 - minimal - by phase", Ordered, Serial, CreateAndDeleteByPhaseTestScenario("1.27.6", "v1.27.10", false)) + _ = Describe("furyctl & distro v1.28.0 - minimal - by phase", Ordered, Serial, CreateAndDeleteByPhaseTestScenario("1.28.0", "v1.28.6", false)) + _ = Describe("furyctl & distro v1.28.1 - minimal - by phase", Ordered, Serial, CreateAndDeleteByPhaseTestScenario("1.28.1", "v1.28.6", false)) + _ = Describe("furyctl & distro v1.29.0 - minimal - by phase", Ordered, Serial, CreateAndDeleteByPhaseTestScenario("1.29.0", "v1.29.2", false)) + + _ = Describe("furyctl & distro v1.29.1 - minimal - by phase", Ordered, Serial, CreateAndDeleteByPhaseTestScenario("1.29.1", "v1.29.2", false)) ) diff --git a/test/expensive/kfddistribution/testdata/kfddistribution-v1-27-6-create-and-delete/furyctl-minimal.yaml.tpl b/test/expensive/kfddistribution/testdata/kfddistribution-v1-27-6-create-and-delete/furyctl-minimal.yaml.tpl new file mode 100644 index 000000000..7b8022849 --- /dev/null +++ b/test/expensive/kfddistribution/testdata/kfddistribution-v1-27-6-create-and-delete/furyctl-minimal.yaml.tpl @@ -0,0 +1,32 @@ +# Copyright (c) 2017-present SIGHUP s.r.l All rights reserved. +# Use of this source code is governed by a BSD-style +# license that can be found in the LICENSE file. + +--- +apiVersion: kfd.sighup.io/v1alpha2 +kind: KFDDistribution +metadata: + name: __CLUSTER_NAME__ +spec: + distributionVersion: v1.27.6 + distribution: + kubeconfig: __KUBECONFIG__ + modules: + auth: + provider: + type: none + ingress: + baseDomain: internal.example.dev + nginx: + type: none + tls: + provider: none + logging: + type: none + networking: + type: calico + policy: + type: none + dr: + type: on-premises + velero: {} diff --git a/test/expensive/kfddistribution/testdata/kfddistribution-v1-27-6-create-and-delete/kind-config.yml b/test/expensive/kfddistribution/testdata/kfddistribution-v1-27-6-create-and-delete/kind-config.yml new file mode 100644 index 000000000..cdb5eadd0 --- /dev/null +++ b/test/expensive/kfddistribution/testdata/kfddistribution-v1-27-6-create-and-delete/kind-config.yml @@ -0,0 +1,16 @@ +# Copyright (c) 2017-present SIGHUP s.r.l All rights reserved. +# Use of this source code is governed by a BSD-style +# license that can be found in the LICENSE file. + +--- +apiVersion: kind.x-k8s.io/v1alpha4 +kind: Cluster +nodes: +- role: control-plane + extraPortMappings: + - containerPort: 30080 + hostPort: 80 + protocol: TCP + - containerPort: 30443 + hostPort: 443 + protocol: TCP diff --git a/test/expensive/kfddistribution/testdata/kfddistribution-v1-28-1-create-and-delete/furyctl-minimal.yaml.tpl b/test/expensive/kfddistribution/testdata/kfddistribution-v1-28-1-create-and-delete/furyctl-minimal.yaml.tpl new file mode 100644 index 000000000..7679934ab --- /dev/null +++ b/test/expensive/kfddistribution/testdata/kfddistribution-v1-28-1-create-and-delete/furyctl-minimal.yaml.tpl @@ -0,0 +1,32 @@ +# Copyright (c) 2017-present SIGHUP s.r.l All rights reserved. +# Use of this source code is governed by a BSD-style +# license that can be found in the LICENSE file. + +--- +apiVersion: kfd.sighup.io/v1alpha2 +kind: KFDDistribution +metadata: + name: __CLUSTER_NAME__ +spec: + distributionVersion: v1.28.1 + distribution: + kubeconfig: __KUBECONFIG__ + modules: + auth: + provider: + type: none + ingress: + baseDomain: internal.example.dev + nginx: + type: none + tls: + provider: none + logging: + type: none + networking: + type: calico + policy: + type: none + dr: + type: on-premises + velero: {} diff --git a/test/expensive/kfddistribution/testdata/kfddistribution-v1-28-1-create-and-delete/kind-config.yml b/test/expensive/kfddistribution/testdata/kfddistribution-v1-28-1-create-and-delete/kind-config.yml new file mode 100644 index 000000000..cdb5eadd0 --- /dev/null +++ b/test/expensive/kfddistribution/testdata/kfddistribution-v1-28-1-create-and-delete/kind-config.yml @@ -0,0 +1,16 @@ +# Copyright (c) 2017-present SIGHUP s.r.l All rights reserved. +# Use of this source code is governed by a BSD-style +# license that can be found in the LICENSE file. + +--- +apiVersion: kind.x-k8s.io/v1alpha4 +kind: Cluster +nodes: +- role: control-plane + extraPortMappings: + - containerPort: 30080 + hostPort: 80 + protocol: TCP + - containerPort: 30443 + hostPort: 443 + protocol: TCP diff --git a/test/expensive/kfddistribution/testdata/kfddistribution-v1-29-1-create-and-delete/furyctl-minimal.yaml.tpl b/test/expensive/kfddistribution/testdata/kfddistribution-v1-29-1-create-and-delete/furyctl-minimal.yaml.tpl new file mode 100644 index 000000000..4d8fe01e1 --- /dev/null +++ b/test/expensive/kfddistribution/testdata/kfddistribution-v1-29-1-create-and-delete/furyctl-minimal.yaml.tpl @@ -0,0 +1,32 @@ +# Copyright (c) 2017-present SIGHUP s.r.l All rights reserved. +# Use of this source code is governed by a BSD-style +# license that can be found in the LICENSE file. + +--- +apiVersion: kfd.sighup.io/v1alpha2 +kind: KFDDistribution +metadata: + name: __CLUSTER_NAME__ +spec: + distributionVersion: v1.29.1 + distribution: + kubeconfig: __KUBECONFIG__ + modules: + auth: + provider: + type: none + ingress: + baseDomain: internal.example.dev + nginx: + type: none + tls: + provider: none + logging: + type: none + networking: + type: calico + policy: + type: none + dr: + type: on-premises + velero: {} diff --git a/test/expensive/kfddistribution/testdata/kfddistribution-v1-29-1-create-and-delete/kind-config.yml b/test/expensive/kfddistribution/testdata/kfddistribution-v1-29-1-create-and-delete/kind-config.yml new file mode 100644 index 000000000..cdb5eadd0 --- /dev/null +++ b/test/expensive/kfddistribution/testdata/kfddistribution-v1-29-1-create-and-delete/kind-config.yml @@ -0,0 +1,16 @@ +# Copyright (c) 2017-present SIGHUP s.r.l All rights reserved. +# Use of this source code is governed by a BSD-style +# license that can be found in the LICENSE file. + +--- +apiVersion: kind.x-k8s.io/v1alpha4 +kind: Cluster +nodes: +- role: control-plane + extraPortMappings: + - containerPort: 30080 + hostPort: 80 + protocol: TCP + - containerPort: 30443 + hostPort: 443 + protocol: TCP diff --git a/test/expensive/onpremises/furyctl_test.go b/test/expensive/onpremises/furyctl_test.go index 9c3715695..03f8564d2 100644 --- a/test/expensive/onpremises/furyctl_test.go +++ b/test/expensive/onpremises/furyctl_test.go @@ -642,12 +642,20 @@ var ( _ = Describe("furyctl & distro v1.27.5 - minimal", Ordered, Serial, CreateAndDeleteTestScenario("1.27.5", false)) + _ = Describe("furyctl & distro v1.27.6 - minimal", Ordered, Serial, CreateAndDeleteTestScenario("1.27.6", false)) + _ = Describe("furyctl & distro v1.28.0 - minimal", Ordered, Serial, CreateAndDeleteTestScenario("1.28.0", false)) + _ = Describe("furyctl & distro v1.28.1 - minimal", Ordered, Serial, CreateAndDeleteTestScenario("1.28.1", false)) + _ = Describe("furyctl & distro v1.29.0 - minimal", Ordered, Serial, CreateAndDeleteTestScenario("1.29.0", false)) + _ = Describe("furyctl & distro v1.29.1 - minimal", Ordered, Serial, CreateAndDeleteTestScenario("1.29.1", false)) + _ = Describe("furyctl & distro v1.29.0 - minimal - ephemeral", Ordered, Serial, CreateAndDeleteTestScenario("1.29.0", true)) + _ = Describe("furyctl & distro v1.29.1 - minimal - ephemeral", Ordered, Serial, CreateAndDeleteTestScenario("1.29.1", true)) + _ = Describe("furyctl & distro v1.25.9 - minimal - by phase", Ordered, Serial, CreateAndDeleteByPhaseTestScenario("1.25.9", false)) _ = Describe("furyctl & distro v1.25.10 - minimal - by phase", Ordered, Serial, CreateAndDeleteByPhaseTestScenario("1.25.10", false)) @@ -674,7 +682,13 @@ var ( _ = Describe("furyctl & distro v1.27.5 - minimal - by phase", Ordered, Serial, CreateAndDeleteByPhaseTestScenario("1.27.5", false)) + _ = Describe("furyctl & distro v1.27.6 - minimal - by phase", Ordered, Serial, CreateAndDeleteByPhaseTestScenario("1.27.6", false)) + _ = Describe("furyctl & distro v1.28.0 - minimal - by phase", Ordered, Serial, CreateAndDeleteByPhaseTestScenario("1.28.0", false)) + _ = Describe("furyctl & distro v1.28.1 - minimal - by phase", Ordered, Serial, CreateAndDeleteByPhaseTestScenario("1.28.1", false)) + _ = Describe("furyctl & distro v1.29.0 - minimal - by phase", Ordered, Serial, CreateAndDeleteByPhaseTestScenario("1.29.0", false)) + + _ = Describe("furyctl & distro v1.29.1 - minimal - by phase", Ordered, Serial, CreateAndDeleteByPhaseTestScenario("1.29.1", false)) ) diff --git a/test/expensive/onpremises/testdata/onpremises-v1-27-6-create-and-delete/furyctl-minimal.yaml.tpl b/test/expensive/onpremises/testdata/onpremises-v1-27-6-create-and-delete/furyctl-minimal.yaml.tpl new file mode 100644 index 000000000..e24bb3c84 --- /dev/null +++ b/test/expensive/onpremises/testdata/onpremises-v1-27-6-create-and-delete/furyctl-minimal.yaml.tpl @@ -0,0 +1,75 @@ +# Copyright (c) 2017-present SIGHUP s.r.l All rights reserved. +# Use of this source code is governed by a BSD-style +# license that can be found in the LICENSE file. + +--- +apiVersion: kfd.sighup.io/v1alpha2 +kind: OnPremises +metadata: + name: __CLUSTER_NAME__ +spec: + distributionVersion: v1.27.6 + kubernetes: + pkiFolder: ./infra/secrets/pki + ssh: + username: ubuntu + keyPath: ./infra/secrets/ssh-private-key.pem + dnsZone: __CLUSTER_NAME__.internal + controlPlaneAddress: __CONTROL_PLANE_IP__:6443 + podCidr: 172.16.128.0/17 + svcCidr: 172.16.0.0/17 + loadBalancers: + enabled: false + hosts: + - name: haproxy1 + ip: 0.0.0.0 + keepalived: + enabled: false + interface: eth1 + ip: 192.168.1.201/24 + virtualRouterId: "201" + passphrase: "123aaaccc321" + stats: + username: admin + password: password + masters: + hosts: + - name: master1 + ip: __CONTROL_PLANE_IP__ + nodes: + - name: worker + hosts: + - name: worker1 + ip: __NODE_1_IP__ + - name: worker2 + ip: __NODE_2_IP__ + - name: worker3 + ip: __NODE_3_IP__ + distribution: + modules: + auth: + provider: + type: none + ingress: + baseDomain: internal.example.dev + nginx: + type: none + tls: + provider: none + certManager: + clusterIssuer: + name: letsencrypt-fury + email: engineering+fury-distribution@sighup.io + type: http01 + logging: + type: loki + networking: + type: calico + policy: + type: gatekeeper + gatekeeper: + enforcementAction: deny + installDefaultPolicies: true + dr: + type: on-premises + velero: {} diff --git a/test/expensive/onpremises/testdata/onpremises-v1-28-1-create-and-delete/furyctl-minimal.yaml.tpl b/test/expensive/onpremises/testdata/onpremises-v1-28-1-create-and-delete/furyctl-minimal.yaml.tpl new file mode 100644 index 000000000..845ba6ae5 --- /dev/null +++ b/test/expensive/onpremises/testdata/onpremises-v1-28-1-create-and-delete/furyctl-minimal.yaml.tpl @@ -0,0 +1,75 @@ +# Copyright (c) 2017-present SIGHUP s.r.l All rights reserved. +# Use of this source code is governed by a BSD-style +# license that can be found in the LICENSE file. + +--- +apiVersion: kfd.sighup.io/v1alpha2 +kind: OnPremises +metadata: + name: __CLUSTER_NAME__ +spec: + distributionVersion: v1.28.1 + kubernetes: + pkiFolder: ./infra/secrets/pki + ssh: + username: ubuntu + keyPath: ./infra/secrets/ssh-private-key.pem + dnsZone: __CLUSTER_NAME__.internal + controlPlaneAddress: __CONTROL_PLANE_IP__:6443 + podCidr: 172.16.128.0/17 + svcCidr: 172.16.0.0/17 + loadBalancers: + enabled: false + hosts: + - name: haproxy1 + ip: 0.0.0.0 + keepalived: + enabled: false + interface: eth1 + ip: 192.168.1.201/24 + virtualRouterId: "201" + passphrase: "123aaaccc321" + stats: + username: admin + password: password + masters: + hosts: + - name: master1 + ip: __CONTROL_PLANE_IP__ + nodes: + - name: worker + hosts: + - name: worker1 + ip: __NODE_1_IP__ + - name: worker2 + ip: __NODE_2_IP__ + - name: worker3 + ip: __NODE_3_IP__ + distribution: + modules: + auth: + provider: + type: none + ingress: + baseDomain: internal.example.dev + nginx: + type: none + tls: + provider: none + certManager: + clusterIssuer: + name: letsencrypt-fury + email: engineering+fury-distribution@sighup.io + type: http01 + logging: + type: loki + networking: + type: calico + policy: + type: gatekeeper + gatekeeper: + enforcementAction: deny + installDefaultPolicies: true + dr: + type: on-premises + velero: {} diff --git a/test/expensive/onpremises/testdata/onpremises-v1-29-1-create-and-delete/furyctl-minimal.yaml.tpl b/test/expensive/onpremises/testdata/onpremises-v1-29-1-create-and-delete/furyctl-minimal.yaml.tpl new file mode 100644 index 000000000..4dfabd1c9 --- /dev/null +++ b/test/expensive/onpremises/testdata/onpremises-v1-29-1-create-and-delete/furyctl-minimal.yaml.tpl @@ -0,0 +1,75 @@ +# Copyright (c) 2017-present SIGHUP s.r.l All rights reserved. +# Use of this source code is governed by a BSD-style +# license that can be found in the LICENSE file. + +--- +apiVersion: kfd.sighup.io/v1alpha2 +kind: OnPremises +metadata: + name: __CLUSTER_NAME__ +spec: + distributionVersion: v1.29.1 + kubernetes: + pkiFolder: ./infra/secrets/pki + ssh: + username: ubuntu + keyPath: ./infra/secrets/ssh-private-key.pem + dnsZone: __CLUSTER_NAME__.internal + controlPlaneAddress: __CONTROL_PLANE_IP__:6443 + podCidr: 172.16.128.0/17 + svcCidr: 172.16.0.0/17 + loadBalancers: + enabled: false + hosts: + - name: haproxy1 + ip: 0.0.0.0 + keepalived: + enabled: false + interface: eth1 + ip: 192.168.1.201/24 + virtualRouterId: "201" + passphrase: "123aaaccc321" + stats: + username: admin + password: password + masters: + hosts: + - name: master1 + ip: __CONTROL_PLANE_IP__ + nodes: + - name: worker + hosts: + - name: worker1 + ip: __NODE_1_IP__ + - name: worker2 + ip: __NODE_2_IP__ + - name: worker3 + ip: __NODE_3_IP__ + distribution: + modules: + auth: + provider: + type: none + ingress: + baseDomain: internal.example.dev + nginx: + type: none + tls: + provider: none + certManager: + clusterIssuer: + name: letsencrypt-fury + email: engineering+fury-distribution@sighup.io + type: http01 + logging: + type: loki + networking: + type: calico + policy: + type: gatekeeper + gatekeeper: + enforcementAction: deny + installDefaultPolicies: true + dr: + type: on-premises + velero: {}