Fix akv secrete provider update operation fail#9573
Fix akv secrete provider update operation fail#9573charleswool wants to merge 1 commit intoAzure:mainfrom
Conversation
…vider flags The AKSPreviewManagedClusterUpdateDecorator.update_addon_profiles() method was overriding the parent class method without calling super(), which caused the following flags to be silently ignored during 'az aks update': - --enable-secret-rotation - --disable-secret-rotation - --rotation-poll-interval This fix adds a call to super().update_addon_profiles(mc) to ensure the parent class logic for Azure Keyvault Secrets Provider addon profile updates is preserved.
️✔️Azure CLI Extensions Breaking Change Test
|
|
Hi @charleswool, |
|
Thank you for your contribution! We will review the pull request and get back to you soon. |
|
The git hooks are available for azure-cli and azure-cli-extensions repos. They could help you run required checks before creating the PR. Please sync the latest code with latest dev branch (for azure-cli) or main branch (for azure-cli-extensions). pip install azdev --upgrade
azdev setup -c <your azure-cli repo path> -r <your azure-cli-extensions repo path>
|
CodeGen Tools Feedback CollectionThank you for using our CodeGen tool. We value your feedback, and we would like to know how we can improve our product. Please take a few minutes to fill our codegen survey |
|
Hi @charleswool Release SuggestionsModule: aks-preview
Notes
|
There was a problem hiding this comment.
Pull request overview
This pull request fixes a bug in the AKS preview extension where Azure Keyvault Secrets Provider addon profile update flags were being silently ignored during az aks update operations.
Changes:
- Added a call to
super().update_addon_profiles(mc)in theAKSPreviewManagedClusterUpdateDecorator.update_addon_profiles()method to ensure parent class logic is executed - This fix ensures that the
--enable-secret-rotation,--disable-secret-rotation, and--rotation-poll-intervalflags are properly handled during cluster updates
|
/azp run |
|
Azure Pipelines successfully started running 2 pipeline(s). |
FumingZhang
left a comment
There was a problem hiding this comment.
Queued live test to validate the change
- test_aks_enable_addon_with_azurekeyvaultsecretsprovider
…vider flags
The AKSPreviewManagedClusterUpdateDecorator.update_addon_profiles() method was overriding the parent class method without calling super(), which caused the following flags to be silently ignored during 'az aks update':
This fix adds a call to super().update_addon_profiles(mc) to ensure the parent class logic for Azure Keyvault Secrets Provider addon profile updates is preserved.
This checklist is used to make sure that common guidelines for a pull request are followed.
Related command
General Guidelines
azdev style <YOUR_EXT>locally? (pip install azdevrequired)python scripts/ci/test_index.py -qlocally? (pip install wheel==0.30.0required)For new extensions:
About Extension Publish
There is a pipeline to automatically build, upload and publish extension wheels.
Once your pull request is merged into main branch, a new pull request will be created to update
src/index.jsonautomatically.You only need to update the version information in file setup.py and historical information in file HISTORY.rst in your PR but do not modify
src/index.json.