CORS-4336: Add CI jobs for AWS European Sovereign Cloud (EUSC)#75568
CORS-4336: Add CI jobs for AWS European Sovereign Cloud (EUSC)#75568liweinan wants to merge 1 commit intoopenshift:mainfrom
Conversation
|
@liweinan: This pull request references CORS-4336 which is a valid jira issue. DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository. |
|
@liweinan, Interacting with pj-rehearseComment: Once you are satisfied with the results of the rehearsals, comment: |
...t/openshift-tests-private/openshift-openshift-tests-private-release-4.22__amd64-nightly.yaml
Outdated
Show resolved
Hide resolved
...t/openshift-tests-private/openshift-openshift-tests-private-release-4.22__amd64-nightly.yaml
Outdated
Show resolved
Hide resolved
ci-operator/step-registry/cluster-profiles/cluster-profiles-config.yaml
Outdated
Show resolved
Hide resolved
...ipi/private/provision/cucushift-installer-rehearse-aws-eusc-ipi-private-provision-chain.yaml
Outdated
Show resolved
Hide resolved
...ipi/private/provision/cucushift-installer-rehearse-aws-eusc-ipi-private-provision-chain.yaml
Outdated
Show resolved
Hide resolved
...ipi/private/provision/cucushift-installer-rehearse-aws-eusc-ipi-private-provision-chain.yaml
Outdated
Show resolved
Hide resolved
ci-operator/step-registry/ipi/conf/aws/eusc-ami/ipi-conf-aws-eusc-ami-commands.sh
Outdated
Show resolved
Hide resolved
|
@liweinan as we discussed offline, for the new partition we need three types of cluster:
|
...t/openshift-tests-private/openshift-openshift-tests-private-release-4.22__amd64-nightly.yaml
Outdated
Show resolved
Hide resolved
|
@yunjiang29 Thanks for the review! I'll refactor this PR today. |
24fed80 to
de00d69
Compare
|
@liweinan, Interacting with pj-rehearseComment: Once you are satisfied with the results of the rehearsals, comment: |
|
@yunjiang29 Thanks for the detailed review! I'll update the PR recordingly. |
|
@liweinan, Interacting with pj-rehearseComment: Once you are satisfied with the results of the rehearsals, comment: |
Address yunfei's review comments on PR openshift#75568: 1. Job naming convention: - Rename jobs from -f60 to -f7 suffix (non-destructive tests) - Update cron schedule to standard f7 pattern: 7,14,23,30 2. Private cluster configuration: - Add complete private cluster setup with bastion host - Add VPC, security groups, and proxy configuration - Set PUBLISH=Internal for private cluster access - Add minimal IAM permission provisioning - Follow pattern from cucushift-installer-rehearse-aws-ipi-private-provision 3. AMI configuration fix: - Replace deprecated compute.platform.aws.amiID field - Use platform.aws.defaultMachinePlatform.amiID instead
4b73bfe to
7f83d83
Compare
|
@liweinan, Interacting with pj-rehearseComment: Once you are satisfied with the results of the rehearsals, comment: |
1. Job naming convention:
- Rename jobs from -f60 to -f7 suffix (non-destructive tests)
- Update cron schedule to standard f7 pattern: 7,14,23,30
2. Private cluster configuration:
- Add complete private cluster setup with bastion host
- Add VPC, security groups, and proxy configuration
- Set PUBLISH=Internal for private cluster access
- Add minimal IAM permission provisioning
- Follow pattern from cucushift-installer-rehearse-aws-ipi-private-provision
3. AMI configuration fix:
- Replace deprecated compute.platform.aws.amiID field
- Use platform.aws.defaultMachinePlatform.amiID instead
4. Generalize step registry components for reusability:
- Enhance ipi-conf-aws-custom-endpoints to support multiple AWS partitions
* Add AWS_DOMAIN_SUFFIX env var (defaults to amazonaws.com)
* Support amazonaws.eu for EUSC, amazonaws.com.cn for China
* Allow full URLs for maximum flexibility
- Make ipi-conf-aws-eusc-ami more generic
* Support AWS_CUSTOM_AMI_ID for general use
* Maintain AWS_EUSC_AMI_ID for backward compatibility
* Can be used for EUSC, China, GovCloud, or custom AMI scenarios
- Use generic steps in EUSC provision chain with partition-specific config
- Remove obsolete ipi-conf-aws-eusc-endpoints (replaced by generic version)
7f83d83 to
55daf83
Compare
|
@liweinan, Interacting with pj-rehearseComment: Once you are satisfied with the results of the rehearsals, comment: |
...erator/step-registry/ipi/conf/aws/custom-endpoints/ipi-conf-aws-custom-endpoints-commands.sh
Outdated
Show resolved
Hide resolved
1. Job naming convention:
- Rename jobs from -f60 to -f7 suffix (non-destructive tests)
- Update cron schedule to standard f7 pattern: 7,14,23,30
2. Private cluster configuration:
- Add complete private cluster setup with bastion host
- Add VPC, security groups, and proxy configuration
- Set PUBLISH=Internal for private cluster access
- Add minimal IAM permission provisioning
- Follow pattern from cucushift-installer-rehearse-aws-ipi-private-provision
3. Generalize step registry components for maximum reusability:
a) Enhance ipi-conf-aws-custom-endpoints for all AWS partitions:
- Add AWS_DOMAIN_SUFFIX env var (defaults to amazonaws.com)
- Support amazonaws.eu (EUSC), amazonaws.com.cn (China)
- Allow full URLs for maximum flexibility
- Remove obsolete ipi-conf-aws-eusc-endpoints step
b) Extend ipi-conf-aws to support custom AMI configuration:
- Add AWS_AMI_ID env var for custom RHCOS AMI
- Useful for EUSC, China, GovCloud, or any partition without public AMIs
- Fix deprecated amiID field -> defaultMachinePlatform.amiID
- Auto-detection still works for C2S/SC2S
- Remove obsolete ipi-conf-aws-eusc-ami step
c) EUSC provision chain now uses only generic steps with env config
This refactoring reduces code duplication (net -59 lines) and makes step
components reusable across all AWS partitions.
55daf83 to
c6c4827
Compare
|
@liweinan, Interacting with pj-rehearseComment: Once you are satisfied with the results of the rehearsals, comment: |
|
Relative PRs merged: #75441 / openshift/ci-tools#4973 |
|
cluster destroyed: vagrant@10:~/works$ ./openshift-install destroy cluster
INFO Credentials loaded from the AWS config using "SharedConfigCredentials: /home/vagrant/.aws/credentials" provider
INFO elbv2 endpoint is empty, using elb endpoint: https://elasticloadbalancing.eusc-de-east-1.amazonaws.eu
INFO Terminated instance=i-0027fb4f664a14756
INFO Deleted id=net/weli-eusc-s92nv-int/e62ff1a531385316/48eb2b4b76fb6b5b resourceType=listener
INFO Deleted id=apiserver-target-dvsq7/fc5408d474c9cb57 resourceType=targetgroup
INFO Deleted id=weli-eusc-s92nv-cloud-credential-operator-iam-ro-28fln policy=weli-eusc-s92nv-cloud-credential-operator-iam-ro-28fln-policy
INFO Deleted id=weli-eusc-s92nv-cloud-credential-operator-iam-ro-28fln
INFO Disassociated id=weli-eusc-s92nv-worker-profile name=weli-eusc-s92nv-worker-profile role=weli-eusc-s92nv-worker-role
INFO Deleted InstanceProfileName=weli-eusc-s92nv-worker-profile arn=arn:aws-eusc:iam::082250599274:instance-profile/weli-eusc-s92nv-worker-profile id=weli-eusc-s92nv-worker-profile
INFO Deleted id=weli-eusc-s92nv-openshift-machine-api-aws-7fg92 policy=weli-eusc-s92nv-openshift-machine-api-aws-7fg92-policy
INFO Deleted id=weli-eusc-s92nv-openshift-machine-api-aws-7fg92
INFO Deleted id=net/weli-eusc-s92nv-int/e62ff1a531385316 resourceType=loadbalancer
INFO Deleted id=weli-eusc-s92nv-openshift-cloud-network-config-contro-l85qw policy=weli-eusc-s92nv-openshift-cloud-network-config-contro-l85qw-policy
INFO Deleted id=weli-eusc-s92nv-openshift-cloud-network-config-contro-l85qw
INFO Deleted id=net/weli-eusc-s92nv-ext/e23a4a340de1c8b0 resourceType=loadbalancer
INFO Not found or already deleted id=net/weli-eusc-s92nv-ext/e23a4a340de1c8b0/d467a0b1f4d6fd63 resourceType=listener
INFO Deleted id=nat-0ab41a56f2a9286a9 resourceType=natgateway
INFO Deleted id=weli-eusc-s92nv-master-role name=weli-eusc-s92nv-master-role policy=weli-eusc-s92nv-master-policy
INFO Disassociated id=weli-eusc-s92nv-master-role name=weli-eusc-s92nv-master-profile role=weli-eusc-s92nv-master-role
INFO Deleted InstanceProfileName=weli-eusc-s92nv-master-profile arn=arn:aws-eusc:iam::082250599274:instance-profile/weli-eusc-s92nv-master-profile id=weli-eusc-s92nv-master-role name=weli-eusc-s92nv-master-role
INFO Deleted id=weli-eusc-s92nv-master-role name=weli-eusc-s92nv-master-role
INFO Deleted id=weli-eusc-s92nv-openshift-image-registry-bbqng policy=weli-eusc-s92nv-openshift-image-registry-bbqng-policy
INFO Deleted id=weli-eusc-s92nv-openshift-image-registry-bbqng
INFO Disassociated id=rtbassoc-09d02f92b6d4172e7 resourceType=route-table
INFO Deleted id=rtb-0fcb44fa352346c64 resourceType=route-table
INFO Deleted id=weli-eusc-s92nv-aws-ebs-csi-driver-operator-wfj2l policy=weli-eusc-s92nv-aws-ebs-csi-driver-operator-wfj2l-policy
INFO Deleted id=weli-eusc-s92nv-aws-ebs-csi-driver-operator-wfj2l
INFO Disassociated id=rtbassoc-0d9990447edbb515d resourceType=route-table
INFO Deleted id=rtb-029c5de9d3be5cd24 resourceType=route-table
INFO Not found or already deleted id=net/weli-eusc-s92nv-int/e62ff1a531385316/a936d3a16b432d3e resourceType=listener
INFO Deleted id=sg-0b3c4db8b7c06fa4d resourceType=security-group
INFO Deleted id=apiserver-target-r9flz/417b4a988db3dce4 resourceType=targetgroup
INFO Deleted id=weli-eusc-s92nv-openshift-ingress-vbxnn policy=weli-eusc-s92nv-openshift-ingress-vbxnn-policy
INFO Deleted id=weli-eusc-s92nv-openshift-ingress-vbxnn
INFO Deleted id=subnet-0016e00f58695ffac resourceType=subnet
INFO Deleted id=weli-eusc-s92nv-worker-role name=weli-eusc-s92nv-worker-role policy=weli-eusc-s92nv-worker-policy
INFO Deleted id=weli-eusc-s92nv-worker-role name=weli-eusc-s92nv-worker-role
INFO Deleted
INFO Deleted classic load balancer=a2028d926bfdf4d1c86ac8a24131ffc3 id=vpc-05f0a100aa18a5abe resourceType=vpc
INFO Deleted NAT gateway=nat-0ab41a56f2a9286a9 id=vpc-05f0a100aa18a5abe resourceType=vpc
INFO Deleted NAT gateway=nat-0187425548704793e id=vpc-05f0a100aa18a5abe resourceType=vpc
INFO Deleted id=sg-076c19d61a09ab930 resourceType=security-group
INFO Deleted id=rtb-0e40882cab21e13f6 resourceType=route-table
INFO Deleted id=subnet-0d46147c3e680416a resourceType=subnet
INFO Deleted id=nat-0187425548704793e resourceType=natgateway
INFO Deleted id=additional-listener-v9699/76c7b6bd09fb46d3 resourceType=targetgroup
INFO Disassociated id=rtbassoc-0326cc88c13d95250 resourceType=route-table
INFO Deleted id=rtb-057870fbf836380d9 resourceType=route-table
INFO Deleted id=a2028d926bfdf4d1c86ac8a24131ffc3 resourceType=loadbalancer
INFO Deleted id=vpce-02f160f39bedbac0e resourceType=vpc-endpoint
WARNING could not determine whether hosted zone is private hosted zone=weli-eusc.ci-eusc.devcluster.openshift.com. id=Z06024201CZSGSQHJJ3CY
INFO Deleted id=Z06024201CZSGSQHJJ3CY record set=A api-int.weli-eusc.ci-eusc.devcluster.openshift.com.
INFO Deleted id=Z06024201CZSGSQHJJ3CY public zone=/hostedzone/Z04057337TKVHDWNA7XB record set=A api.weli-eusc.ci-eusc.devcluster.openshift.com.
INFO Deleted id=Z06024201CZSGSQHJJ3CY public zone=/hostedzone/Z04057337TKVHDWNA7XB record set=A \052.apps.weli-eusc.ci-eusc.devcluster.openshift.com.
WARNING could not determine whether hosted zone is private hosted zone=weli-eusc.ci-eusc.devcluster.openshift.com. id=Z06024201CZSGSQHJJ3CY
INFO Deleted id=Z06024201CZSGSQHJJ3CY record set=A api.weli-eusc.ci-eusc.devcluster.openshift.com.
INFO Deleted id=Z06024201CZSGSQHJJ3CY record set=A \052.apps.weli-eusc.ci-eusc.devcluster.openshift.com.
INFO Deleted id=Z06024201CZSGSQHJJ3CY
INFO Released id=eipalloc-0ddd9a3d2e94b9df4 resourceType=elastic-ip
INFO Deleted id=subnet-0b806b5c7b9e2def9 resourceType=subnet
INFO Deleted id=sg-02738de8acbe8ca39 resourceType=security-group
INFO Deleted id=sg-0031209cdc8d80186 resourceType=security-group
INFO Deleted id=sg-0847162268706887c resourceType=security-group
INFO Deleted NAT gateway=nat-0ab41a56f2a9286a9 id=vpc-05f0a100aa18a5abe resourceType=vpc
INFO Deleted NAT gateway=nat-0187425548704793e id=vpc-05f0a100aa18a5abe resourceType=vpc
INFO Deleted id=vpc-05f0a100aa18a5abe resourceType=vpc subnet=subnet-0b0d11cbc3ee3e7f8
INFO Released id=eipalloc-0fc6a065c3622a91d resourceType=elastic-ip
INFO Deleted NAT gateway=nat-0ab41a56f2a9286a9 id=vpc-05f0a100aa18a5abe resourceType=vpc
INFO Deleted NAT gateway=nat-0187425548704793e id=vpc-05f0a100aa18a5abe resourceType=vpc
INFO Deleted id=igw-0ee6005c1878801f2 resourceType=internet-gateway
INFO Deleted NAT gateway=nat-0ab41a56f2a9286a9 id=vpc-05f0a100aa18a5abe resourceType=vpc
INFO Deleted NAT gateway=nat-0187425548704793e id=vpc-05f0a100aa18a5abe resourceType=vpc
INFO Deleted id=vpc-05f0a100aa18a5abe resourceType=vpc
INFO Time elapsed: 5m46s
INFO Uninstallation complete!
vagrant@10:~/works$ |
...t/openshift-tests-private/openshift-openshift-tests-private-release-4.23__multi-nightly.yaml
Outdated
Show resolved
Hide resolved
...t/openshift-tests-private/openshift-openshift-tests-private-release-4.23__multi-nightly.yaml
Outdated
Show resolved
Hide resolved
...ft/openshift-tests-private/openshift-openshift-tests-private-release-5.0__multi-nightly.yaml
Outdated
Show resolved
Hide resolved
...ft/openshift-tests-private/openshift-openshift-tests-private-release-5.0__multi-nightly.yaml
Outdated
Show resolved
Hide resolved
...t/openshift-tests-private/openshift-openshift-tests-private-release-4.22__multi-nightly.yaml
Outdated
Show resolved
Hide resolved
...t/openshift-tests-private/openshift-openshift-tests-private-release-4.22__multi-nightly.yaml
Outdated
Show resolved
Hide resolved
We can see |
|
After discussing with Yunfei locally, we decided to use the AMI noted here: #75568 (comment) |
This refactors the AWS European Sovereign Cloud (EUSC) CI configuration to maximize reuse of standard AWS workflows and reduce maintenance burden. Changes based on @yunjiang29's review feedback: - Reduced from 9 to 6 jobs following the pattern: 3 cluster types × 2 test types - Improved FIPS coverage from 1/9 (11%) to 2/6 (33%) jobs: * aws-eusc-ipi-fips-f7 (IPI + FIPS) * aws-eusc-ipi-private-sts-fips-f7 (Private + STS + FIPS) - Combined features across jobs: * aws-eusc-ipi-f28-destructive (destructive testing) * aws-eusc-ipi-private-mini-perm-f28 (Private + minimal permissions) * aws-eusc-ipi-disc-priv-kms-f7 (Disconnected + KMS) * aws-eusc-ipi-disc-priv-f28 (Disconnected destructive) - All jobs cover: FIPS, STS, KMS, minimal permissions across 3 cluster types - Deleted 15 EUSC-specific files, created 8 new ones (net reduction: -7 files) - Maximized reuse of standard AWS workflows: * Basic IPI: reuses cucushift-installer-rehearse-aws-ipi-deprovision * Private: reuses cucushift-installer-rehearse-aws-ipi-private-deprovision * Disconnected: reuses cucushift-installer-rehearse-aws-ipi-disconnected-private-provision * Private-STS: reuses cucushift-installer-rehearse-aws-ipi-private-cco-manual-security-token-service - EUSC-specific changes limited to: * Inserting ipi-conf-aws-custom-endpoints ref for service endpoint configuration * Custom provision chain for disconnected-private-kms (combines disconnected + KMS) - Deleted all EUSC-specific deprovision chains (reuse standard chains) - Removed unnecessary byo-kms and STS specific directory structures 1. Custom endpoints (ipi-conf-aws-custom-endpoints-commands.sh): - Removed auto-detection logic for AWS_DOMAIN_SUFFIX - Simplified to use environment variable or default to "amazonaws.com" - Removed Route53 endpoint configuration (global service) - Designed for easy removal when installer adds native EUSC support 2. AMI configuration (ipi-conf-aws-commands.sh): - Simplified from split variables (CONTROL_PLANE_AMI/COMPUTE_AMI) to single CONTROL_PLANE_AMI - Preserved C2S/SC2S auto-detection logic - Removed complex heredoc patching, kept simple approach - Updated documentation for clarity 1. **Minimize EUSC-specific code**: Only 8 workflow files vs 15 previously 2. **Maximize standard workflow reuse**: Follows USGov pattern, not C2S pattern 3. **Prepare for future evolution**: Custom endpoints easy to remove when installer supports EUSC natively 4. **FIPS coverage aligned with USGov**: 33% vs USGov's 18%, not C2S's 100% - make update completed successfully - All 6 jobs generated in ci-operator/jobs/.../periodics.yaml - Step registry validation passed Addresses: openshift#75568
66c8136 to
2faef2b
Compare
|
@yunjiang29 Thanks for the detailed review! I have updated the PR accordingly. @patrickdillon @tthvo As openshift/cluster-ingress-operator#1360 is verified locally: #75568 (comment), after that PR is merged, I guess we can use the job here for testing then. |
...nshift/openshift-tests-private/openshift-openshift-tests-private-release-4.22-periodics.yaml
Show resolved
Hide resolved
|
Rehearsal run shows that the credentials are not being found: |
1a90406 to
702e11a
Compare
This refactors the AWS European Sovereign Cloud (EUSC) CI configuration to maximize reuse of standard AWS workflows and reduce maintenance burden. Changes based on @yunjiang29's review feedback: - Reduced from 9 to 6 jobs following the pattern: 3 cluster types × 2 test types - Improved FIPS coverage from 1/9 (11%) to 2/6 (33%) jobs: * aws-eusc-ipi-fips-f7 (IPI + FIPS) * aws-eusc-ipi-private-sts-fips-f7 (Private + STS + FIPS) - Combined features across jobs: * aws-eusc-ipi-f28-destructive (destructive testing) * aws-eusc-ipi-private-mini-perm-f28 (Private + minimal permissions) * aws-eusc-ipi-disc-priv-kms-f7 (Disconnected + KMS) * aws-eusc-ipi-disc-priv-f28 (Disconnected destructive) - All jobs cover: FIPS, STS, KMS, minimal permissions across 3 cluster types - Deleted 15 EUSC-specific files, created 8 new ones (net reduction: -7 files) - Maximized reuse of standard AWS workflows: * Basic IPI: reuses cucushift-installer-rehearse-aws-ipi-deprovision * Private: reuses cucushift-installer-rehearse-aws-ipi-private-deprovision * Disconnected: reuses cucushift-installer-rehearse-aws-ipi-disconnected-private-provision * Private-STS: reuses cucushift-installer-rehearse-aws-ipi-private-cco-manual-security-token-service - EUSC-specific changes limited to: * Inserting ipi-conf-aws-custom-endpoints ref for service endpoint configuration * Custom provision chain for disconnected-private-kms (combines disconnected + KMS) - Deleted all EUSC-specific deprovision chains (reuse standard chains) - Removed unnecessary byo-kms and STS specific directory structures 1. Custom endpoints (ipi-conf-aws-custom-endpoints-commands.sh): - Removed auto-detection logic for AWS_DOMAIN_SUFFIX - Simplified to use environment variable or default to "amazonaws.com" - Removed Route53 endpoint configuration (global service) - Designed for easy removal when installer adds native EUSC support 2. AMI configuration (ipi-conf-aws-commands.sh): - Simplified from split variables (CONTROL_PLANE_AMI/COMPUTE_AMI) to single CONTROL_PLANE_AMI - Preserved C2S/SC2S auto-detection logic - Removed complex heredoc patching, kept simple approach - Updated documentation for clarity 1. **Minimize EUSC-specific code**: Only 8 workflow files vs 15 previously 2. **Maximize standard workflow reuse**: Follows USGov pattern, not C2S pattern 3. **Prepare for future evolution**: Custom endpoints easy to remove when installer supports EUSC natively 4. **FIPS coverage aligned with USGov**: 33% vs USGov's 18%, not C2S's 100% - make update completed successfully - All 6 jobs generated in ci-operator/jobs/.../periodics.yaml - Step registry validation passed Addresses: openshift#75568
@patrickdillon This change should have fixed the problem. I'll trigger a rehearse test to verify it. |
This refactors the AWS European Sovereign Cloud (EUSC) CI configuration to maximize reuse of standard AWS workflows and reduce maintenance burden. Changes based on @yunjiang29's review feedback: - Reduced from 9 to 6 jobs following the pattern: 3 cluster types × 2 test types - Improved FIPS coverage from 1/9 (11%) to 2/6 (33%) jobs: * aws-eusc-ipi-fips-f7 (IPI + FIPS) * aws-eusc-ipi-private-sts-fips-f7 (Private + STS + FIPS) - Combined features across jobs: * aws-eusc-ipi-f28-destructive (destructive testing) * aws-eusc-ipi-private-mini-perm-f28 (Private + minimal permissions) * aws-eusc-ipi-disc-priv-kms-f7 (Disconnected + KMS) * aws-eusc-ipi-disc-priv-f28 (Disconnected destructive) - All jobs cover: FIPS, STS, KMS, minimal permissions across 3 cluster types - Deleted 15 EUSC-specific files, created 8 new ones (net reduction: -7 files) - Maximized reuse of standard AWS workflows: * Basic IPI: reuses cucushift-installer-rehearse-aws-ipi-deprovision * Private: reuses cucushift-installer-rehearse-aws-ipi-private-deprovision * Disconnected: reuses cucushift-installer-rehearse-aws-ipi-disconnected-private-provision * Private-STS: reuses cucushift-installer-rehearse-aws-ipi-private-cco-manual-security-token-service - EUSC-specific changes limited to: * Inserting ipi-conf-aws-custom-endpoints ref for service endpoint configuration * Custom provision chain for disconnected-private-kms (combines disconnected + KMS) - Deleted all EUSC-specific deprovision chains (reuse standard chains) - Removed unnecessary byo-kms and STS specific directory structures 1. Custom endpoints (ipi-conf-aws-custom-endpoints-commands.sh): - Removed auto-detection logic for AWS_DOMAIN_SUFFIX - Simplified to use environment variable or default to "amazonaws.com" - Removed Route53 endpoint configuration (global service) - Designed for easy removal when installer adds native EUSC support 2. AMI configuration (ipi-conf-aws-commands.sh): - Simplified from split variables (CONTROL_PLANE_AMI/COMPUTE_AMI) to single CONTROL_PLANE_AMI - Preserved C2S/SC2S auto-detection logic - Removed complex heredoc patching, kept simple approach - Updated documentation for clarity 1. **Minimize EUSC-specific code**: Only 8 workflow files vs 15 previously 2. **Maximize standard workflow reuse**: Follows USGov pattern, not C2S pattern 3. **Prepare for future evolution**: Custom endpoints easy to remove when installer supports EUSC natively 4. **FIPS coverage aligned with USGov**: 33% vs USGov's 18%, not C2S's 100% - make update completed successfully - All 6 jobs generated in ci-operator/jobs/.../periodics.yaml - Step registry validation passed Addresses: openshift#75568
702e11a to
d16e42e
Compare
|
The previous conflicts are caused by the new commits in the main branch. I have rebased the PR for several rounds, and I'll rebase the branch after all the other issues are fixed. |
This PR adds comprehensive CI support for AWS EUSC (European Sovereign Cloud) partition, including: - Add aws-eusc cluster type support in install scripts: - ipi-install-install-aws-commands.sh - ipi-install-install-commands.sh - ipi-conf-aws-commands.sh - Add aws-eusc cluster profile configuration - Add EUSC periodic jobs for openshift-tests-private (4.22, 4.23, 5.0): - 8 EUSC IPI jobs per version with various configurations - Hash-based cron schedule distribution to avoid resource contention - AMI configuration: ami-0b78302f83217d149 - Custom DNS jobs with qe.gcp.devcluster.openshift.com domain - Add EUSC installer rehearse jobs (4.22, 4.23, 5.0, main): - IPI installation workflow - FEATURE_SET: TechPreviewNoUpgrade All generated job files updated via make update.
d16e42e to
179e3bc
Compare
|
[REHEARSALNOTIFIER]
A total of 32145 jobs have been affected by this change. The above listing is non-exhaustive and limited to 25 jobs. A full list of affected jobs can be found here Interacting with pj-rehearseComment: Once you are satisfied with the results of the rehearsals, comment: |
Implement continuous integration support for AWS EUSC partition (aws-eusc) in eusc-de-east-1 region. Includes cluster profile definition, service endpoints configuration, custom AMI handling, and periodic test jobs.
This enables OpenShift testing on AWS's new European Sovereign Cloud infrastructure, which requires explicit endpoint configuration and custom RHCOS AMIs not available in public regions.