generated from amazon-archives/__template_MIT-0
-
Notifications
You must be signed in to change notification settings - Fork 26
Riv25 evolution of the repository #252
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Draft
allamand
wants to merge
1,468
commits into
main
Choose a base branch
from
riv25
base: main
Could not load branches
Branch not found: {{ refName }}
Loading
Could not load tags
Nothing to show
Loading
Are you sure you want to change the base?
Some commits from the old base branch may be removed from the timeline,
and old review comments may become outdated.
Draft
Conversation
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
- Add kubevela-components: enabled: true to control-plane addons.yaml - This will create the ApplicationSet for KubeVela components deployment
Signed-off-by: Workshop User <[email protected]>
- Add provider-aws-iam and provider-aws-eks to providers.yaml - Required for KubeVela dp-service-account component to work - Fixes rust application service account creation issues
- Update dp-service-account, dynamodb-table, and component-iam-policy - Change from default ProviderConfig to provider-aws-config - Fixes Crossplane resource creation issues
- Add IAM role and pod identity association for provider-aws service account - Add cluster name to crossplane-aws valuesObject - Fixes AWS credentials issue for Crossplane providers
- Add crossplane_provider_aws_pod_identity module to pod-identity.tf - Add enable_crossplane to aws_addons local in main.tf - Enable crossplane in dev.tfvars - Creates IAM role and pod identity association for Crossplane providers - Fixes AWS credentials issue for Crossplane providers
- Remove ack_s3_pod_identity and ack_dynamodb_pod_identity modules - These controllers already have pod identities from the old approach in main.tf - Fixes ResourceInUseException conflicts during Terraform apply - Keeps only crossplane_provider_aws_pod_identity module
- Remove pod-identity.yaml from crossplane-aws chart - Use only Terraform-managed pod identity association - Fixes circular dependency issue where Crossplane tries to create its own pod identity
- Change from PowerUserAccess to AdministratorAccess policy - PowerUserAccess excludes IAM management permissions - Crossplane needs full IAM permissions to create roles and policies
- Change from modernengg-dev to peeks-spoke-dev - Fixes pod identity association creation error - ResourceNotFoundException: No cluster found for name: modernengg-dev
- Create ClusterSecretStore with consistent naming (matches hub cluster) - Uses external-secrets-sa service account with pod identity - Fixes ExternalSecret connectivity to AWS Secrets Manager - Applied at environment level for all dev clusters
- Create platform-manifests Helm chart with ClusterSecretStore template - Add platform-manifests section to addons.yaml with metadata annotations - Enable platform-manifests in control-plane environment - Creates aws-secrets-manager ClusterSecretStore for external-secrets
- Add enable_platform_manifests to addons_metadata in main.tf - Enable platform_manifests in dev.tfvars - This will create the ArgoCD application for platform-manifests
- Add enable_platform_manifests: 'true' to fleet-spoke-dev labels - This will trigger ApplicationSet to create platform-manifests application - Creates aws-secrets-manager ClusterSecretStore for external-secrets
…sitory - Use path pattern like other local charts (gitlab example) - Remove chartName and releaseName fields - Fixes template execution error for addonChartRepository
Signed-off-by: Workshop User <[email protected]>
- Add workload.type: autodetects for non-workload resources - Fixes 'spec.workload: Required value' validation error
- Create both aws-secrets-manager and secrets-manager-cs - Ensures compatibility with existing ExternalSecrets
Signed-off-by: Workshop User <[email protected]>
Signed-off-by: Pankaj Walke <[email protected]>
Signed-off-by: Pankaj Walke <[email protected]>
Signed-off-by: Pankaj Walke <[email protected]>
Signed-off-by: Pankaj Walke <[email protected]>
Signed-off-by: Pankaj Walke <[email protected]>
Signed-off-by: Pankaj Walke <[email protected]>
Signed-off-by: Pankaj Walke <[email protected]>
Signed-off-by: Pankaj Walke <[email protected]>
Signed-off-by: Pankaj Walke <[email protected]>
Signed-off-by: Pankaj Walke <[email protected]>
incfrease gitlab timeout in cloudfront
…ersion fix kyverno new version
Feature/gitlab cfn timeout
reduced gitlab timeout
Signed-off-by: Workshop User <[email protected]>
Signed-off-by: Sebastien Allamand <[email protected]> Co-authored-by: Sebastien Allamand <[email protected]>
Signed-off-by: Workshop User <[email protected]>
Signed-off-by: Workshop User <[email protected]>
Signed-off-by: Workshop User <[email protected]>
Signed-off-by: Workshop User <[email protected]>
Signed-off-by: user1 <[email protected]>
Signed-off-by: user1 <[email protected]>
Signed-off-by: Sébastien Allamand <[email protected]>
update 10/10
Signed-off-by: user1 <[email protected]>
Signed-off-by: Workshop User <[email protected]>
* recalculate argo url at each loop Signed-off-by: Sébastien Allamand <[email protected]> * fix: improve terraform robustness for gitlab service deployment - Add 15m timeouts to kubernetes_service resource - Implement exponential backoff retry logic - Reduce parallelism to prevent API rate limiting - Addresses timeout issues in CodeBuild environments * fix: restore parallelism=3 for cluster creation performance * clean repo Signed-off-by: Sébastien Allamand <[email protected]> --------- Signed-off-by: Sébastien Allamand <[email protected]> Co-authored-by: Hari Muthusamy <[email protected]>
Only 'create' timeout is supported for kubernetes_service resource
Prevents naming conflicts when deploying multiple stacks
Signed-off-by: Workshop User <[email protected]>
Fix/ekscluster
Signed-off-by: Pankaj Walke <[email protected]>
Fix terraform and add usage telemetry
Co-authored-by: user1 <[email protected]>
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This is Macro PR that will be used as a target for any changes needed to update workshop structure, with our RIV25 target.
When all work will be done, this PR could be then merged