18
18
gcp-service-account-key :
19
19
description : The GCP service account key to use.
20
20
required : true
21
- azure-client-id :
22
- description : The Azure client ID to use.
23
- required : true
24
- azure-client-secret :
25
- description : The Azure client secret to use.
26
- required : true
27
- azure-subscription-id :
28
- description : The Azure subscription to use.
29
- required : true
30
- azure-tenant-id :
31
- description : The Azure tenant ID to use.
32
- required : true
33
21
inputs :
34
22
image_name :
35
23
description : The image repository and name to use.
@@ -53,19 +41,10 @@ jobs:
53
41
permissions :
54
42
packages : read
55
43
outputs :
56
- aks-cluster-name : ${{ steps.aks-cluster-name.outputs.stdout }}
57
- aks-cluster-resource-group : ${{ steps.aks-cluster-resource-group.outputs.stdout }}
58
44
aws-opensearch-endpoint : ${{ steps.aws-opensearch-endpoint.outputs.stdout }}
59
45
gke-cluster-name : ${{ steps.gke-cluster-name.outputs.stdout }}
60
46
gke-cluster-region : ${{ steps.gke-cluster-region.outputs.stdout }}
61
47
gke-cluster-zone : ${{ steps.gke-cluster-zone.outputs.stdout }}
62
- env :
63
- # https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/guides/service_principal_client_secret
64
- # Note these have to be set in the Terraform Cloud workspace as well
65
- ARM_CLIENT_ID : ${{ secrets.azure-client-id }}
66
- ARM_CLIENT_SECRET : ${{ secrets.azure-client-secret }}
67
- ARM_SUBSCRIPTION_ID : ${{ secrets.azure-subscription-id }}
68
- ARM_TENANT_ID : ${{ secrets.azure-tenant-id }}
69
48
steps :
70
49
- uses : actions/checkout@v3
71
50
with :
91
70
sed -i -e "s|\$OPENSEARCH_AWS_SECRET_KEY|${{ secrets.opensearch_aws_secret_key }}|g" default.auto.tfvars
92
71
sed -i -e "s|\$OPENSEARCH_ADMIN_PASSWORD|${{ secrets.opensearch_admin_password }}|g" default.auto.tfvars
93
72
94
- sed -i -e "s|\$AZURE_CLIENT_ID|${{ secrets.azure-client-id }}|g" default.auto.tfvars
95
- sed -i -e "s|\$AZURE_CLIENT_SECRET|${{ secrets.azure-client-secret }}|g" default.auto.tfvars
96
- sed -i -e "s|\$AZURE_SUBSCRIPTION_ID|${{ secrets.azure-subscription-id }}|g" default.auto.tfvars
97
- sed -i -e "s|\$AZURE_TENANT_ID|${{ secrets.azure-tenant-id }}|g" default.auto.tfvars
98
-
99
73
cat <<EOT >> default.auto.tfvars
100
74
gcp_sa_key = <<-EOF
101
75
${{ secrets.gcp-service-account-key }}
@@ -184,16 +158,6 @@ jobs:
184
158
working-directory : terraform
185
159
shell : bash
186
160
187
- - id : aks-cluster-name
188
- run : terraform output -no-color -raw aks_cluster_name
189
- working-directory : terraform
190
- shell : bash
191
-
192
- - id : aks-cluster-resource-group
193
- run : terraform output -no-color -raw aks_resource_group
194
- working-directory : terraform
195
- shell : bash
196
-
197
161
call-run-integration-kind :
198
162
name : Run integration tests on KIND
199
163
needs :
@@ -266,7 +230,6 @@ jobs:
266
230
fail-fast : false
267
231
matrix :
268
232
cloud :
269
- - aks
270
233
- gke
271
234
env :
272
235
USE_GKE_GCLOUD_AUTH_PLUGIN : true
@@ -306,20 +269,6 @@ jobs:
306
269
cluster_name : ${{ needs.call-run-terraform-setup.outputs.gke-cluster-name }}
307
270
location : ${{ needs.call-run-terraform-setup.outputs.gke-cluster-zone }}
308
271
309
- - name : Get the AKS Kubeconfig
310
- if : matrix.cloud == 'aks'
311
- run : |
312
- az login --username="$ARM_CLIENT_ID" --password="$ARM_CLIENT_SECRET" --tenant="$ARM_TENANT_ID" --service-principal
313
- az aks get-credentials --name "$AKS_CLUSTER_NAME" --resource-group "$AKS_CLUSTER_RG" --admin
314
- shell : bash
315
- env :
316
- AKS_CLUSTER_NAME : ${{ needs.call-run-terraform-setup.outputs.aks-cluster-name }}
317
- AKS_CLUSTER_RG : ${{ needs.call-run-terraform-setup.outputs.aks-cluster-resource-group }}
318
- ARM_CLIENT_ID : ${{ secrets.azure-client-id }}
319
- ARM_CLIENT_SECRET : ${{ secrets.azure-client-secret }}
320
- ARM_SUBSCRIPTION_ID : ${{ secrets.azure-subscription-id }}
321
- ARM_TENANT_ID : ${{ secrets.azure-tenant-id }}
322
-
323
272
- name : Check Kubeconfig set up
324
273
run : |
325
274
kubectl cluster-info
0 commit comments