Commit Graph

79 Commits

Author SHA1 Message Date
43440f31c1 fix deployment using client_id (#898) 2021-05-17 11:53:35 -04:00
255271a2b3 Single tenant auth, issuer url fix (#872)
## Info on Pull Request
The deploy.py is only able to set the issuer url to the redmond tenant in the case of single tenant auth. For multi tenant, since the the tenant_domain is provided specifically, it works fine. In the case of single tenant, if the instance is not in the redmond tenant, the cli is unable to authenticate itself.

_What does this include?_

## Validation Steps Performed
A test instance was deployed in the PME instance and it was verified that the cli could authenticate with the instance.
2021-05-17 13:44:39 +00:00
c01c30fa7a adding option to only deploy the rbac resources (#818)
adds option to only deploy the rbac resources
closes #814
2021-05-06 17:44:51 +00:00
358d85ef82 fix cli client registration (#825)
- The CLIClient approle was not assigned to the cli registration created byt he registration.py script
2021-04-26 20:35:34 +00:00
88af5f4dd3 allow deployment to non-default subscriptions (#774) 2021-04-06 13:06:35 -04:00
7e5cf780a6 Added support for multi tenant authentication (#746)
## Summary of the Pull Request

_What is this about?_

## PR Checklist
* [x] Applies to work item: #562 
* [x] CLA signed. If not, go over [here](https://cla.opensource.microsoft.com/microsoft/onefuzz) and sign the CLI.
* [x] Tests added/passed
* [ ] Requires documentation to be updated
* [x] I've discussed this with core contributors already. If not checked, I'm ready to accept this work might be rejected in favor of a different grand plan. Issue number where discussion took place: #xxx

## Info on Pull Request

The end-to-end changes needed to have onefuzz deployed with multi-tenant authentication.

## Validation Steps Performed

_How does someone test & validate?_
2021-04-02 14:39:20 +00:00
de5c843eb5 work around AAD service principal race condition (#716)
This works around an issue in AAD service principal creation.  The race condition in AAD shows up as:

```
INFO:deploy:checking if RBAC already exists
INFO:deploy:creating Application registration
INFO:deploy:creating service principal
Traceback (most recent call last):
  File "deploy.py", line 926, in <module>
    main()
  File "deploy.py", line 920, in main
    state[1](client)
  File "deploy.py", line 303, in setup_rbac
    client.service_principals.create(service_principal_params)
  File "/tmp/tmpp2x7ybfg/deploy-venv/lib/python3.8/site-packages/azure/graphrbac/operations/service_principals_operations.py", line 87, in create
    raise models.GraphErrorException(self._deserialize, response)
azure.graphrbac.models.graph_error_py3.GraphErrorException: When using this permission, the backing application of the service principal being created must in the local tenant
```

The azure-cli has the same issue, as seen in https://github.com/Azure/azure-cli/issues/14767
2021-03-23 21:02:36 +00:00
e7fe099f25 handle delayed AAD resources in deployments (#585) 2021-02-22 19:40:07 -05:00
cc1c79b27d Fix bug when checking if the default cli application exists (#488) 2021-01-29 15:32:17 -05:00
ec982c68c5 Update the registration logic to print manual steps when adal authentication fails (#447)
Mitigate the deployment issue related to the conditional access policy.
The registration logic is updated to use the old rbac python library when possible. 
The deployment will print some manual step for operations that cannot be automated
2021-01-22 22:21:43 +00:00
5092f96af4 Fix deployment of backdated versions of OneFuzz (#347)
When running automated deployments, 'tools' were not being properly replaced with the updated versions if the deployment was created _prior_ to the original instance deployment.
2020-12-01 10:59:43 +00:00
905dc7c0d6 Re-enable the retry logic for App Password creation (#338) 2020-11-24 08:00:31 -05:00
3ddb756504 Add linting to deployment tools (#332) 2020-11-20 13:00:19 -05:00
3974d680ef Support retry during function deploy (#330)
Starting earlier today, I saw roughly 1 in 3 deployments fail with the error `Azure.Functions.Cli.Common.CliException: Timed out waiting for SCM to update the Environment Settings`.  Redeploying the application resolves the issue.  New builds and past releases alike hit this exception.

According to https://github.com/Azure/azure-functions-core-tools/issues/1863, function app deployments may fail due to timeouts related to cold-start.

This PR executes the deploy in a loop with a delay in the case of failure.
2020-11-19 20:04:18 +00:00
31f099d3d4 Event based webhooks (#296) 2020-11-12 17:44:42 -05:00
81a04ed81d Make the role assignment step optional in the deployment (#271) 2020-11-10 09:11:34 -05:00
15a783cf0f fix reading instance_id on follow-on deploy (#253) 2020-11-02 19:15:44 -05:00
6c598773dd add instance_id generated at install time (#245) 2020-11-02 14:27:51 -05:00
e026e50582 Provide the ability to create a new cli application registration (#236) 2020-11-02 12:44:07 -05:00
154be220ae Enable User assigned managed identity for scalesets (#219) 2020-10-29 13:53:11 -04:00
e76064b340 assign scaleset to a role (#185) 2020-10-28 15:13:31 -04:00
3450ee7bab Extend AAD password creation timeout and optionally log said password (#214) 2020-10-28 12:23:47 -04:00
85f9ecc496 handle nested exceptions during cleanup on function deploy failures (#172) 2020-10-19 18:31:11 -04:00
09326694e2 address initial deploy errors (#167) 2020-10-16 17:34:43 -04:00
fa25823342 split node and task heartbeats in two nodes (#163) 2020-10-15 21:30:03 -04:00
f43c44e55c use installed azcopy if we can't use our own (#126) 2020-10-09 12:39:12 -04:00
16331fca2e add the ability to configure app-insights export (#102) 2020-10-07 10:32:26 -04:00
1dedcc8c61 data migration in the deployment script (#12) 2020-09-21 16:00:57 -04:00
d3a0b292e6 initial public release 2020-09-18 12:21:04 -04:00