Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Upbound CrossPlane addon upgrade #1029

Merged
merged 15 commits into from
Jun 27, 2024
Merged

Upbound CrossPlane addon upgrade #1029

merged 15 commits into from
Jun 27, 2024

Conversation

elamaran11
Copy link
Collaborator

Issue #, if available:

Description of changes:

Upbound CrossPlane addon upgrade

By submitting this pull request, I confirm that you can use, modify, copy, and redistribute this contribution, under the terms of your choice.

@elamaran11
Copy link
Collaborator Author

/do-e2e-tests

@elamaran11
Copy link
Collaborator Author

@shapirov103 Please review and merge this. Lets get this to release.

Copy link
Collaborator

@shapirov103 shapirov103 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Nice work, appreciate the bias for action!
please check a few comments/questions i left

import {createNamespace, supportsALL} from '../../utils';
import { Policy, PolicyDocument} from 'aws-cdk-lib/aws-iam';
import * as cdk from 'aws-cdk-lib';
import {HelmAddOn, HelmAddOnProps, HelmAddOnUserProps} from "../helm-addon";
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Please run make lint

Copy link
Collaborator Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Done.

/*
* EKS MasterRole. `mastersRole` of blueprints should be passed to this parameter.
*/
eksMasterRole?: any;
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Why does it need this master role? I assume it needs role of the clusters that crossplane will manage, not the management cluster which runs crossplane.

Another question - why is type any as opposed to let's say IRole or string for arn?

Copy link
Collaborator Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I agree and im using String which can be used on the role name.

Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Can it be cross-account for real use cases? E.g. in a multi-account architecture, how do you see that role passed? We could make it IRole and allow customers either to create a role or look up role (supporting cross account).

If it is string, then no validation is applied upfront. They can pass anything, and until the attempt something later through crossplane they will see no failure.

Another option is for the string to be role arn (I can settle for this). The most generic option is role: IRole | string.

lib/addons/upbound-universal-crossplane/index.ts Outdated Show resolved Hide resolved
docs/addons/kubeflow.md Outdated Show resolved Hide resolved
docs/addons/upbound-universal-crossplane.md Outdated Show resolved Hide resolved
@elamaran11
Copy link
Collaborator Author

Nice work, appreciate the bias for action! please check a few comments/questions i left

@shapirov103 All comments are fixed, please check and run e2e.

@elamaran11
Copy link
Collaborator Author

@shapirov103 Please check te changes, currently doing local test with CXP. Will share details when im done testing.

Copy link
Collaborator

@shapirov103 shapirov103 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

one more comment

lib/addons/upbound-universal-crossplane/index.ts Outdated Show resolved Hide resolved
@shapirov103
Copy link
Collaborator

/do-e2e-tests

Copy link

@aws-ia-ci aws-ia-ci left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

end to end tests failed. A maintainer can provide more details.

@shapirov103
Copy link
Collaborator

/do-e2e-tests

Copy link

@aws-ia-ci aws-ia-ci left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

end to end tests failed. A maintainer can provide more details.

@shapirov103
Copy link
Collaborator

/do-e2e-tests

Copy link

@aws-ia-ci aws-ia-ci left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

end to end tests failed. A maintainer can provide more details.

@elamaran11
Copy link
Collaborator Author

/do-e2e-tests

Copy link

@aws-ia-ci aws-ia-ci left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

end to end tests passed

Copy link
Collaborator

@shapirov103 shapirov103 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM

@shapirov103 shapirov103 merged commit a1059a2 into main Jun 27, 2024
1 of 2 checks passed
@shapirov103 shapirov103 deleted the feature/cxpAddonUpgrade branch June 27, 2024 21:03
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants