-
Notifications
You must be signed in to change notification settings - Fork 169
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Merge branch 'master' into feature/guardrails-policy-m2
- Loading branch information
Showing
12,524 changed files
with
1,618,019 additions
and
33,758 deletions.
The diff you're trying to view is too large. We only load the first 3000 changed files.
There are no files selected for viewing
Large diffs are not rendered by default.
Oops, something went wrong.
Validating CODEOWNERS rules …
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1 +1 @@ | ||
* @jewzaam @bennerv @hawkowl @rogbas @petrkotas @jharrington22 @cblecker @facchettos @cadenmarchese @ulrichschlueter @s-amann @SudoBrendan @ellis-johnson | ||
* @jewzaam @bennerv @hawkowl @rogbas @petrkotas @jharrington22 @cblecker @facchettos @cadenmarchese @ulrichschlueter @s-amann @SudoBrendan @ellis-johnson @yjst2012 @anshulvermapatel |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,36 @@ | ||
parameters: | ||
- name: language | ||
type: string | ||
values: | ||
# Based on "codeql resolve languages" | ||
- cpp | ||
- csharp | ||
- csv | ||
- go | ||
- html | ||
- java | ||
- javascript | ||
- properties | ||
- python | ||
- ruby | ||
- xml | ||
- name: target | ||
type: string | ||
default: host | ||
- name: github_token | ||
type: string | ||
|
||
# Based on "Use CodeQL in CI system" documentation: | ||
# https://docs.github.com/en/code-security/code-scanning/using-codeql-code-scanning-with-your-existing-ci-system/about-codeql-code-scanning-in-your-ci-system | ||
steps: | ||
- script: | | ||
set -xe | ||
sarif_file=codeql-results-${{ parameters.language }}.sarif | ||
wget --quiet --output-document=- https://github.com/github/codeql-action/releases/latest/download/codeql-bundle-linux64.tar.gz | tar --extract --gunzip | ||
./codeql/codeql database create ./codeql-db --language=${{ parameters.language }} | ||
./codeql/codeql database analyze ./codeql-db --format=sarif-latest --sarif-category=no --output=${sarif_file} | ||
./codeql/codeql github upload-results --sarif=${sarif_file} --ref=$(Build.SourceBranch) | ||
env: | ||
GITHUB_TOKEN: ${{ parameters.github_token }} | ||
displayName: ⚙️ CodeQL Analysis (${{ parameters.language }}) | ||
target: ${{ parameters.target }} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -3,14 +3,17 @@ TAG ?= $(shell git describe --exact-match 2>/dev/null) | |
COMMIT = $(shell git rev-parse --short=7 HEAD)$(shell [[ $$(git status --porcelain) = "" ]] || echo -dirty) | ||
ARO_IMAGE_BASE = ${RP_IMAGE_ACR}.azurecr.io/aro | ||
E2E_FLAGS ?= -test.v --ginkgo.v --ginkgo.timeout 180m --ginkgo.flake-attempts=2 --ginkgo.junit-report=e2e-report.xml | ||
GO_FLAGS ?= -tags=aro,containers_image_openpgp,exclude_graphdriver_btrfs,exclude_graphdriver_devicemapper | ||
|
||
export GOFLAGS=$(GO_FLAGS) | ||
|
||
# fluentbit version must also be updated in RP code, see pkg/util/version/const.go | ||
MARINER_VERSION = 20230321 | ||
FLUENTBIT_VERSION = 1.9.10 | ||
FLUENTBIT_IMAGE ?= ${RP_IMAGE_ACR}.azurecr.io/fluentbit:$(FLUENTBIT_VERSION)-cm$(MARINER_VERSION) | ||
AUTOREST_VERSION = 3.6.3 | ||
AUTOREST_IMAGE = quay.io/openshift-on-azure/autorest:${AUTOREST_VERSION} | ||
GATEKEEPER_VERSION = 3.10.0 | ||
GATEKEEPER_VERSION = v3.10.0 | ||
GATEKEEPER_IMAGE ?= ${RP_IMAGE_ACR}.azurecr.io/gatekeeper:$(GATEKEEPER_VERSION) | ||
|
||
ifneq ($(shell uname -s),Darwin) | ||
|
@@ -47,13 +50,13 @@ endif | |
endif | ||
|
||
build-all: | ||
go build -tags aro,containers_image_openpgp ./... | ||
go build ./... | ||
|
||
aro: check-release generate | ||
go build -tags aro,containers_image_openpgp,codec.safe -ldflags "-X github.com/Azure/ARO-RP/pkg/util/version.GitCommit=$(VERSION)" ./cmd/aro | ||
go build -ldflags "-X github.com/Azure/ARO-RP/pkg/util/version.GitCommit=$(VERSION)" ./cmd/aro | ||
|
||
runlocal-rp: | ||
go run -tags aro,containers_image_openpgp -ldflags "-X github.com/Azure/ARO-RP/pkg/util/version.GitCommit=$(VERSION)" ./cmd/aro rp | ||
go run -ldflags "-X github.com/Azure/ARO-RP/pkg/util/version.GitCommit=$(VERSION)" ./cmd/aro rp | ||
|
||
az: pyenv | ||
. pyenv/bin/activate && \ | ||
|
@@ -69,12 +72,12 @@ clean: | |
find -type d -name 'gomock_reflect_[0-9]*' -exec rm -rf {} \+ 2>/dev/null | ||
|
||
client: generate | ||
hack/build-client.sh "${AUTOREST_IMAGE}" 2020-04-30 2021-09-01-preview 2022-04-01 2022-09-04 2023-04-01 | ||
hack/build-client.sh "${AUTOREST_IMAGE}" 2020-04-30 2021-09-01-preview 2022-04-01 2022-09-04 2023-04-01 2023-07-01-preview | ||
|
||
# TODO: hard coding dev-config.yaml is clunky; it is also probably convenient to | ||
# override COMMIT. | ||
deploy: | ||
go run -tags aro,containers_image_openpgp -ldflags "-X github.com/Azure/ARO-RP/pkg/util/version.GitCommit=$(VERSION)" ./cmd/aro deploy dev-config.yaml ${LOCATION} | ||
go run -ldflags "-X github.com/Azure/ARO-RP/pkg/util/version.GitCommit=$(VERSION)" ./cmd/aro deploy dev-config.yaml ${LOCATION} | ||
|
||
dev-config.yaml: | ||
go run ./hack/gendevconfig >dev-config.yaml | ||
|
@@ -149,7 +152,7 @@ proxy: | |
CGO_ENABLED=0 go build -ldflags "-X github.com/Azure/ARO-RP/pkg/util/version.GitCommit=$(VERSION)" ./hack/proxy | ||
|
||
run-portal: | ||
go run -tags aro,containers_image_openpgp -ldflags "-X github.com/Azure/ARO-RP/pkg/util/version.GitCommit=$(VERSION)" ./cmd/aro portal | ||
go run -ldflags "-X github.com/Azure/ARO-RP/pkg/util/version.GitCommit=$(VERSION)" ./cmd/aro portal | ||
|
||
build-portal: | ||
cd portal/v1 && npm install && npm run build && cd ../v2 && npm install && npm run build | ||
|
@@ -202,7 +205,7 @@ validate-go: | |
go test -tags e2e -run ^$$ ./test/e2e/... | ||
|
||
validate-go-action: | ||
go run ./hack/licenses -validate -ignored-go vendor,pkg/client,.git -ignored-python python/client,vendor,.git | ||
go run ./hack/licenses -validate -ignored-go vendor,pkg/client,.git -ignored-python python/client,python/az/aro/azext_aro/aaz,vendor,.git | ||
go run ./hack/validate-imports cmd hack pkg test | ||
@[ -z "$$(ls pkg/util/*.go 2>/dev/null)" ] || (echo error: go files are not allowed in pkg/util, use a subpackage; exit 1) | ||
@[ -z "$$(find -name "*:*")" ] || (echo error: filenames with colons are not allowed on Windows, please rename; exit 1) | ||
|
@@ -212,10 +215,10 @@ validate-fips: | |
hack/fips/validate-fips.sh | ||
|
||
unit-test-go: | ||
go run gotest.tools/[email protected] --format pkgname --junitfile report.xml -- -tags=aro,containers_image_openpgp -coverprofile=cover.out ./... | ||
go run gotest.tools/[email protected] --format pkgname --junitfile report.xml -- -coverprofile=cover.out ./... | ||
|
||
unit-test-go-coverpkg: | ||
go run gotest.tools/[email protected] --format pkgname --junitfile report.xml -- -tags=aro,containers_image_openpgp -coverpkg=./... -coverprofile=cover_coverpkg.out ./... | ||
go run gotest.tools/[email protected] --format pkgname --junitfile report.xml -- -coverpkg=./... -coverprofile=cover_coverpkg.out ./... | ||
|
||
lint-go: | ||
hack/lint-go.sh | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,11 @@ | ||
package main | ||
|
||
// Copyright (c) Microsoft Corporation. | ||
// Licensed under the Apache License 2.0. | ||
|
||
const ( | ||
DatabaseName = "DATABASE_NAME" | ||
DatabaseAccountName = "DATABASE_ACCOUNT_NAME" | ||
KeyVaultPrefix = "KEYVAULT_PREFIX" | ||
DBTokenUrl = "DBTOKEN_URL" | ||
) |
Oops, something went wrong.