- Introduced Aggregator.sol for Chainlink-compatible oracle functionality, including round-based updates and access control. - Added OracleWithCCIP.sol to extend Aggregator with CCIP cross-chain messaging capabilities. - Created .gitmodules to include OpenZeppelin contracts as a submodule. - Developed a comprehensive deployment guide in NEXT_STEPS_COMPLETE_GUIDE.md for Phase 2 and smart contract deployment. - Implemented Vite configuration for the orchestration portal, supporting both Vue and React frameworks. - Added server-side logic for the Multi-Cloud Orchestration Portal, including API endpoints for environment management and monitoring. - Created scripts for resource import and usage validation across non-US regions. - Added tests for CCIP error handling and integration to ensure robust functionality. - Included various new files and directories for the orchestration portal and deployment scripts.
1.7 KiB
1.7 KiB
NSG Fix - Final Status
Configuration Complete ✅
All Terraform configuration changes have been successfully applied:
- ✅ Added
subnet_nsg_enabledvariable - ✅ Added
enable_besu_rulesvariable - ✅ Made subnet NSG association conditional
- ✅ Made Besu rules conditional using dynamic blocks
- ✅ Updated
networking_adminmodule configuration
Deployment Status
Subnet NSG Removal
- Configuration: ✅ Ready
- Terraform Apply: ⏳ Pending (requires
ssh_public_keyvariable) - Manual Removal: ✅ Attempted via Azure CLI
Current State
- Subnet NSG: May still be attached (check Azure Portal)
- NIC NSG: ✅ Attached with correct rules (HTTP/HTTPS/SSH)
Next Steps
Option 1: Complete Terraform Apply (Recommended)
cd terraform/phases/phase1
# Ensure terraform.tfvars has ssh_public_key
terraform plan -var-file=terraform.tfvars
terraform apply
Option 2: Manual Removal (If Terraform Apply Not Possible)
az network vnet subnet update \
--resource-group az-p-wst-rg-comp-001 \
--vnet-name az-p-wst-proxy-vnet \
--name az-p-wst-proxy-vm-subnet \
--network-security-group ""
Verification
After removal, verify:
- ✅ Subnet NSG is detached (check Azure Portal)
- ✅ NIC NSG has correct rules (HTTP/HTTPS/SSH)
- ✅ Ports 80 and 443 are accessible
Summary
- Configuration: ✅ Complete
- Deployment: ⏳ Pending Terraform apply or manual removal
- Result: Subnet NSG will be removed, NIC NSG will handle all traffic
Status: ✅ Configuration Complete, Deployment Pending
All configuration changes are complete. The subnet NSG removal can be completed via Terraform apply (when ssh_public_key is available) or manual Azure CLI command.