-
Notifications
You must be signed in to change notification settings - Fork 2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
mgmt, azure migrate test proxy #36103
mgmt, azure migrate test proxy #36103
Conversation
API change check API changes are not detected in this pull request. |
private final String templateUri = "https://raw.githubusercontent.com/Azure/azure-quickstart-templates/master/quickstarts/microsoft.storage/storage-account-create/azuredeploy.json"; | ||
private final String parametersUri = "https://raw.githubusercontent.com/Azure/azure-quickstart-templates/master/quickstarts/microsoft.storage/storage-account-create/azuredeploy.parameters.json"; |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
use storage ARM template
.defineRequestRoutingRule("rule1") | ||
.fromPrivateFrontend() | ||
.fromPublicFrontend() |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
V1 deprecated
V2 only allow public endpoint
.withAzureActiveDirectoryGroup(group.id()) | ||
.disableLocalAccounts() |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
AKS requires having AAD when disable local accounts.
// // update private endpoint | ||
// StorageAccount storageAccount2 = azureResourceManager.storageAccounts().define(saName2) | ||
// .withRegion(region) | ||
// .withNewResourceGroup(rgName) | ||
// .create(); | ||
// | ||
// privateEndpoint.update() | ||
// .updatePrivateLinkServiceConnection(pecName) | ||
// .withRequestMessage("request2") | ||
// .parent() | ||
// .apply(); | ||
// | ||
// Assertions.assertEquals("Pending", privateEndpoint.privateLinkServiceConnections().get(pecName).state().status()); | ||
// Assertions.assertEquals("request2", privateEndpoint.privateLinkServiceConnections().get(pecName).requestMessage()); | ||
// | ||
// privateEndpoint.update() | ||
// .withoutPrivateLinkServiceConnection(pecName) | ||
// .definePrivateLinkServiceConnection(pecName2) | ||
// .withResource(storageAccount2) | ||
// .withSubResource(PrivateLinkSubResourceName.STORAGE_FILE) | ||
// .attach() | ||
// .apply(); | ||
// | ||
// Assertions.assertEquals(Collections.singletonList(PrivateLinkSubResourceName.STORAGE_FILE), privateEndpoint.privateLinkServiceConnections().get(pecName2).subResourceNames()); | ||
// Assertions.assertEquals("Approved", privateEndpoint.privateLinkServiceConnections().get(pecName2).state().status()); |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
this part "update a private endpoint connection" seems no longer allowed (or not allowed by storage). may do more investigation later.
// Start the creation... | ||
creationThread.start(); | ||
|
||
// ...But bail out after 30 sec, as it is enough to test the results | ||
creationThread.join(); |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
no idea why previously use thread...
config.put("StrictHostKeyChecking", "no"); | ||
// jsch.addIdentity(sshFile, filePassword); | ||
session = jsch.getSession("testuser", publicIpDnsLabel + "." + "eastus.cloudapp.azure.com", 22); | ||
session.setPassword(password); |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Delete this SSH part. No idea why create VM with SSH then use password to connect.
@Test | ||
public void testAppGatewaysPublicUrlPathBased() throws Exception { | ||
new TestApplicationGateway().new UrlPathBased(azureResourceManager.resourceGroups().manager().internalContext()) | ||
.runTest(azureResourceManager.applicationGateways(), azureResourceManager.resourceGroups()); | ||
} | ||
|
||
@Disabled("WAF_V2 currently does not support private endpoint, and we do not want to have accessible public IP on VM. Enable it after WAF_V2 supports private endpoint.") |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
should this have a link to a tracking github issue
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Sure. Issue logged #36122
There is a few tests take too long, or being too complex to get fixed in this PR.
Temporary skip the playback on them via
@DoNotRecord(skipInPlayback = true) // TODO(weidxu)
Include LoadBalancer and VirtualNetworkGateway.
Will re-enable them in following month.