Skip to content
This repository has been archived by the owner on Jul 26, 2024. It is now read-only.

January 2021 Update #128

Merged
merged 8 commits into from
Feb 1, 2021
Merged
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
4 changes: 3 additions & 1 deletion .devcontainer/docker-compose.yml
Original file line number Diff line number Diff line change
@@ -6,7 +6,7 @@
version: '3.7'
services:
rover:
image: aztfmod/rover:2012.1109
image: aztfmod/rover:2102.0100
user: vscode

labels:
@@ -17,6 +17,7 @@
# and the value of "workspaceFolder" in .devcontainer/devcontainer.json
- ..:/tf/caf
- volume-caf-vscode:/home/vscode
- volume-caf-vscode-bashhistory:/commandhistory
- ~/.ssh:/tmp/.ssh-localhost:ro
- /var/run/docker.sock:/var/run/docker.sock

@@ -27,3 +28,4 @@
volume-caf-vscode:
labels:
- "caf=Azure CAF"
volume-caf-vscode-bashhistory:
10 changes: 5 additions & 5 deletions .github/workflows/landingzones.yml
Original file line number Diff line number Diff line change
@@ -41,7 +41,7 @@ jobs:
random_length: ['5']

container:
image: aztfmod/rover:2012.1109
image: aztfmod/rover:2102.0100
options: --user 0

steps:
@@ -90,7 +90,7 @@ jobs:
]

container:
image: aztfmod/rover:2012.1109
image: aztfmod/rover:2102.0100
options: --user 0

steps:
@@ -134,7 +134,7 @@ jobs:
random_length: ['5']

container:
image: aztfmod/rover:2012.1109
image: aztfmod/rover:2102.0100
options: --user 0

steps:
@@ -181,7 +181,7 @@ jobs:
]

container:
image: aztfmod/rover:2012.1109
image: aztfmod/rover:2102.0100
options: --user 0

steps:
@@ -224,7 +224,7 @@ jobs:
random_length: ['5']

container:
image: aztfmod/rover:2012.1109
image: aztfmod/rover:2102.0100
options: --user 0

steps:
10 changes: 5 additions & 5 deletions CHANGELOG.md
Original file line number Diff line number Diff line change
@@ -2,7 +2,7 @@

BREAKING CHANGES:

* Iterating on our new key-based iterative model to simplify deployment and maintenance, this is a major refactoring that will bring compatibility with enterprise-scale landing zones and extensible platform for construction sets (solutions and applications) deployed on top of core landing zones.
* Iterating on our new key-based iterative model to simplify deployment and maintenance, this is a major refactoring that will bring compatibility with enterprise-scale landing zones and extensible platform for construction sets (solutions and applications) deployed on top of core landing zones.

FEATURES:
* **added support for azurerm 2.28 :** On all sample landing zones [azurerm provider](https://github.com/terraform-providers/terraform-provider-azurerm/releases/tag/v2.28.0)
@@ -125,21 +125,21 @@ FEATURES:
* **rover:** rollup upgrade to support workspaces [#15](https://github.com/aztfmod/landingzones/pull/15)
* **launchpad:** Support for launchpad destroy [#16](
https://github.com/aztfmod/level0/issues/16)
* **rover:** Upgrade to rover version 2002.0320 - Supporting: - Terraform 0.12.20 (https://github.com/hashicorp/terraform/releases/tag/v0.12.20)
* **rover:** Upgrade to rover version 2002.0320 - Supporting: - Terraform 0.12.20 (https://github.com/hashicorp/terraform/releases/tag/v0.12.20)
* **rover:** Using "4ops.terraform" extension for improved support of Terraform 0.12 syntax. [#16](https://github.com/aztfmod/landingzones/issues/16)

## v1.1.1912 (January 2020)

FEATURES:

* **landingzone_caf_foundations :** Major refactoring to support governance, security and accounting.
* **landingzone_caf_foundations :** Major refactoring to support governance, security and accounting.

IMPROVEMENTS:

* **rover:** Support for non root containers in Visual Studio Code Development Containers (>v1.40)
* **rover:** Support for non root containers in Visual Studio Code Development Containers (>v1.40)

* **rover:** Upgrade to rover version 2001.1006 - Supporting: - Terraform 0.12.19 (https://github.com/hashicorp/terraform/releases/tag/v0.12.19) - azurerm provider 1.40 (https://github.com/terraform-providers/terraform-provider-azurerm/blob/v1.40.0/CHANGELOG.md )

* **rover:** Restructured the folder hierarchy in landing zones to ease integration and development on standard landing zones.
* **rover:** Restructured the folder hierarchy in landing zones to ease integration and development on standard landing zones.

* **documentation:** Instructions on rover updates for non root container and Docker volumes cleanup.
2 changes: 1 addition & 1 deletion landingzones/caf_foundations/dynamic_secrets.tf
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@

module dynamic_keyvault_secrets {
source = "aztfmod/caf/azurerm//modules/security/dynamic_keyvault_secrets"
version = "~>4.21"
version = "~>5.1.0"

for_each = try(var.dynamic_keyvault_secrets, {})

2 changes: 1 addition & 1 deletion landingzones/caf_foundations/es_main.tf
Original file line number Diff line number Diff line change
@@ -2,7 +2,7 @@

module "enterprise_scale" {
source = "Azure/caf-enterprise-scale/azurerm"
version = "0.0.7-preview"
version = "0.0.8"

root_parent_id = data.azurerm_client_config.current.tenant_id

2 changes: 1 addition & 1 deletion landingzones/caf_foundations/landingzone.tf
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
module "foundations" {
source = "aztfmod/caf/azurerm"
version = "~>4.21"
version = "~>5.1.0"

current_landingzone_key = var.landingzone.key
tenant_id = var.tenant_id
4 changes: 2 additions & 2 deletions landingzones/caf_foundations/main.tf
Original file line number Diff line number Diff line change
@@ -1,8 +1,8 @@
terraform {
required_providers {
azurerm = {
source = "hashicorp/azurerm"
version = "2.40.0"
source = "hashicorp/azurerm"
version = "~> 2.43"
}
azuread = {
source = "hashicorp/azuread"
7 changes: 3 additions & 4 deletions landingzones/caf_foundations/output.tf
Original file line number Diff line number Diff line change
@@ -23,9 +23,8 @@ output tfstates {
sensitive = true
}
output keyvaults {
value = map(
var.landingzone.key,
try(module.foundations.keyvaults, {})
)
value = tomap({
(var.landingzone.key) = try(module.foundations.keyvaults, {})
})
sensitive = true
}
2 changes: 1 addition & 1 deletion landingzones/caf_launchpad/add-ons/azure_devops/azdo.tf
Original file line number Diff line number Diff line change
@@ -11,5 +11,5 @@ data "azurerm_key_vault_secret" "pat" {
}

data "azuredevops_project" "project" {
project_name = var.azure_devops.project
name = var.azure_devops.project
}
8 changes: 4 additions & 4 deletions landingzones/caf_launchpad/add-ons/azure_devops/main.tf
Original file line number Diff line number Diff line change
@@ -1,8 +1,8 @@
terraform {
required_providers {
azurerm = {
source = "hashicorp/azurerm"
version = "2.40.0"
source = "hashicorp/azurerm"
version = "~> 2.43"
}
azuread = {
source = "hashicorp/azuread"
@@ -21,8 +21,8 @@ terraform {
version = "~> 1.2.0"
}
azuredevops = {
source = "terraform-providers/azuredevops"
version = "~> 0.0.1"
source = "microsoft/azuredevops"
version = "~> 0.1.0"
}
tls = {
source = "hashicorp/tls"
Original file line number Diff line number Diff line change
@@ -3,59 +3,59 @@ parameters:
displayName: 'Timeout in minutes'
type: number
default: 60

variables:
- group: release-global

resources:
containers:
- container: rover
image: $(ROVER_IMAGE)
options: --user 0:0 -e TF_PLUGIN_CACHE_DIR="/home/$(HOME_FOLDER_USER)/plugin-cache" -e TF_DATA_DIR="/home/$(HOME_FOLDER_USER)"

trigger: none

jobs:
- job: CAF_Rover

displayName: Azure Landing Zone

pool: $(AGENT_POOL)

continueOnError: false

workspace:
clean: all

container: rover

timeoutInMinutes: ${{ parameters.timeoutInMinutes }}

steps:
- checkout: self

- bash: |
git clone --branch $(LANDINGZONE_BRANCH) https://github.com/Azure/caf-terraform-landingzones.git ${BUILD_REPOSITORY_LOCALPATH}/public 2>/dev/null

az login --identity -u $(msi-resource-id)

/tf/rover/rover.sh -lz ${BUILD_REPOSITORY_LOCALPATH}$(landingZonePath) \
-tfstate $(tfstateName) \
-var-folder ${BUILD_REPOSITORY_LOCALPATH}$(configPath) \
-parallelism=30 \
-level $(level) \
-a $(terraformAction) \
-env $(ENVIRONMENT)

condition: ne(variables['terraformAction'], 'destroy')
failOnStderr: true
displayName: 'Terraform $(terraformAction)'

- bash: |
git clone --branch $(LANDINGZONE_BRANCH) https://github.com/Azure/caf-terraform-landingzones.git ${BUILD_REPOSITORY_LOCALPATH}/public 2>/dev/null

az login --identity -u $(msi-resource-id)

/tf/rover/rover.sh -lz ${BUILD_REPOSITORY_LOCALPATH}$(landingZonePath) \
-tfstate $(tfstateName) \
-var-folder ${BUILD_REPOSITORY_LOCALPATH}$(configPath) \
@@ -64,8 +64,7 @@ parameters:
-a $(terraformAction) \
-auto-approve \
-env $(ENVIRONMENT)

condition: eq(variables['terraformAction'], 'destroy')
failOnStderr: true
displayName: 'Terraform destroy'

Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
module "caf" {
source = "aztfmod/caf/azurerm"
version = "~>4.21"
version = "~>5.1.0"

current_landingzone_key = var.landingzone.key
tenant_id = var.tenant_id
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@

module dynamic_keyvault_secrets {
source = "aztfmod/caf/azurerm//modules/security/dynamic_keyvault_secrets"
version = "~>4.21"
version = "~>5.0.0"

for_each = try(var.dynamic_keyvault_secrets, {})

8 changes: 4 additions & 4 deletions landingzones/caf_launchpad/add-ons/azure_devops_agent/main.tf
Original file line number Diff line number Diff line change
@@ -1,8 +1,8 @@
terraform {
required_providers {
azurerm = {
source = "hashicorp/azurerm"
version = "2.40.0"
source = "hashicorp/azurerm"
version = "~> 2.43"
}
azuread = {
source = "hashicorp/azuread"
@@ -21,8 +21,8 @@ terraform {
version = "~> 1.2.0"
}
azuredevops = {
source = "terraform-providers/azuredevops"
version = "~> 0.0.1"
source = "microsoft/azuredevops"
version = "~> 0.1.1"
}
tls = {
source = "hashicorp/tls"
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@

storage_accounts = {
# Is used to store the azure devops deployment script to setup the Azure Devops Selfhosted agents
# Is used to store the azure devops deployment script to setup the Azure Devops Selfhosted agents
scripts_region1 = {
name = "scriptsl0"
resource_group_key = "rg1"
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@

storage_accounts = {
# Is used to store the azure devops deployment script to setup the Azure Devops Selfhosted agents
# Is used to store the azure devops deployment script to setup the Azure Devops Selfhosted agents
scripts_region1 = {
name = "scriptsl1"
resource_group_key = "rg1"
Original file line number Diff line number Diff line change
@@ -89,7 +89,7 @@ for agent_num in $(seq 1 ${num_agent}); do
cd "$agent_dir"
echo "moving to $agent_dir"

cleanup
cleanup

name="${agent_prefix}-${agent_num}"
echo "installing agent $name"
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
module "caf" {
source = "aztfmod/caf/azurerm"
version = "~>4.21"
version = "~>5.1.0"

current_landingzone_key = var.landingzone.key
tenant_id = var.tenant_id
2 changes: 1 addition & 1 deletion landingzones/caf_launchpad/add-ons/terraform_cloud/main.tf
Original file line number Diff line number Diff line change
@@ -2,7 +2,7 @@ terraform {
required_providers {
azurerm = {
source = "hashicorp/azurerm"
version = "~> 2.40.0"
version = "~> 2.40"
}
azuread = {
source = "hashicorp/azuread"
2 changes: 1 addition & 1 deletion landingzones/caf_launchpad/dynamic_secrets.tf
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@

module dynamic_keyvault_secrets {
source = "aztfmod/caf/azurerm//modules/security/dynamic_keyvault_secrets"
version = "~>4.21"
version = "~>5.1.0"

for_each = try(var.dynamic_keyvault_secrets, {})

2 changes: 1 addition & 1 deletion landingzones/caf_launchpad/landingzone.tf
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
module "launchpad" {
source = "aztfmod/caf/azurerm"
version = "~>4.21"
version = "~>5.1.0"

current_landingzone_key = var.landingzone.key
tenant_id = var.tenant_id
4 changes: 2 additions & 2 deletions landingzones/caf_launchpad/main.tf
Original file line number Diff line number Diff line change
@@ -1,8 +1,8 @@
terraform {
required_providers {
azurerm = {
source = "hashicorp/azurerm"
version = "2.40.0"
source = "hashicorp/azurerm"
version = "~> 2.43"
}
azuread = {
source = "hashicorp/azuread"
Loading