@@ -65,12 +65,10 @@ jobs:
6565 id : job-started
6666 run : echo "job-started=true" >> $GITHUB_OUTPUT
6767
68- # TODO: Put back namespace
6968 - name : Generate testing id and sample app namespace
7069 run : |
7170 echo TESTING_ID="${{ github.job }}-${{ github.run_id }}-${{ github.run_number }}-${{ github.run_attempt }}" >> $GITHUB_ENV
72- echo SAMPLE_APP_NAMESPACE="default" >> $GITHUB_ENV
73- # echo SAMPLE_APP_NAMESPACE="ns-${{ github.run_id }}-${{ github.run_number }}" >> $GITHUB_ENV
71+ echo SAMPLE_APP_NAMESPACE="ns-${{ github.run_id }}-${{ github.run_number }}" >> $GITHUB_ENV
7472
7573 - uses : actions/checkout@v4
7674 with :
@@ -141,20 +139,21 @@ jobs:
141139 run : kubectl get namespace | awk '/^ns-[0-9]+-[0-9]+/{print $1}' | xargs --no-run-if-empty kubectl delete namespace
142140
143141 # Set up App Signals permissions and resources
142+ # Renamed `service-account` to `SA` to get under 128 character limit for CFN stack names, which includes the namespace
144143 - name : Create role for AWS access from the sample app
145144 id : create_service_account
146145 uses : ./.github/workflows/actions/execute_and_retry
147146 with :
148147 command : " eksctl create iamserviceaccount \
149- --name service-account -${{ env.TESTING_ID }} \
148+ --name SA -${{ env.TESTING_ID }} \
150149 --namespace ${{ env.SAMPLE_APP_NAMESPACE }} \
151150 --cluster ${{ env.CLUSTER_NAME }} \
152151 --role-name eks-s3-access-${{ env.TESTING_ID }} \
153152 --attach-policy-arn arn:aws:iam::aws:policy/AmazonS3ReadOnlyAccess \
154153 --region ${{ env.E2E_TEST_AWS_REGION }} \
155154 --approve"
156155 cleanup : " eksctl delete iamserviceaccount \
157- --name service-account -${{ env.TESTING_ID }} \
156+ --name SA -${{ env.TESTING_ID }} \
158157 --namespace ${{ env.SAMPLE_APP_NAMESPACE }} \
159158 --cluster ${{ env.CLUSTER_NAME }} \
160159 --region ${{ env.E2E_TEST_AWS_REGION }}"
@@ -196,6 +195,7 @@ jobs:
196195 with :
197196 command : " cd ${{ env.TEST_RESOURCES_FOLDER }}/terraform/java/eks-otlp-ocb/util && \
198197 sed -i -e 's/${E2E_TEST_AWS_REGION}/${{ env.E2E_TEST_AWS_REGION }}/g' ./appsignals-collector.yaml && \
198+ sed -i -e 's/${SAMPLE_APP_NAMESPACE}/${{ env.SAMPLE_APP_NAMESPACE }}/g' ./appsignals-collector.yaml && \
199199 kubectl apply -f ./appsignals-collector.yaml -n ${{ env.SAMPLE_APP_NAMESPACE }}"
200200 cleanup : " kubectl delete -f ./appsignals-collector.yaml -n ${{ env.SAMPLE_APP_NAMESPACE }} && \
201201 aws eks update-kubeconfig --name ${{ env.CLUSTER_NAME }} --region ${{ env.E2E_TEST_AWS_REGION }}"
@@ -214,7 +214,7 @@ jobs:
214214 -var=\" eks_cluster_name=${{ env.CLUSTER_NAME }}\" \
215215 -var=\" eks_cluster_context_name=$(kubectl config current-context)\" \
216216 -var=\" test_namespace=${{ env.SAMPLE_APP_NAMESPACE }}\" \
217- -var=\" service_account_aws_access=service-account -${{ env.TESTING_ID }}\" \
217+ -var=\" service_account_aws_access=SA -${{ env.TESTING_ID }}\" \
218218 -var=\" sample_app_image=${{ env.MAIN_SAMPLE_APP_IMAGE_ARN }}\" \
219219 -var=\" sample_remote_app_image=${{ env.REMOTE_SAMPLE_APP_IMAGE_ARN }}\" \
220220 -var='account_id=${{ env.ACCOUNT_ID }}'"
@@ -224,7 +224,7 @@ jobs:
224224 -var=\" kube_directory_path=${{ github.workspace }}/.kube\" \
225225 -var=\" eks_cluster_name=${{ env.CLUSTER_NAME }}\" \
226226 -var=\" test_namespace=${{ env.SAMPLE_APP_NAMESPACE }}\" \
227- -var=\" service_account_aws_access=service-account -${{ env.TESTING_ID }}\" \
227+ -var=\" service_account_aws_access=SA -${{ env.TESTING_ID }}\" \
228228 -var=\" sample_app_image=${{ env.MAIN_SAMPLE_APP_IMAGE_ARN }}\" \
229229 -var=\" sample_remote_app_image=${{ env.REMOTE_SAMPLE_APP_IMAGE_ARN }}\" "
230230 max_retry : 2
@@ -331,8 +331,6 @@ jobs:
331331 echo "validation-result=failure" >> $GITHUB_OUTPUT
332332 fi
333333
334- # TODO: Simplify cleanup
335- # Can just use `kubectl delete ns -n ${{ env.SAMPLE_APP_NAMESPACE }}` once the namespace is no longer hardcoded
336334 - name : Clean up
337335 if : always()
338336 continue-on-error : true
@@ -341,11 +339,8 @@ jobs:
341339 run : |
342340 aws eks update-kubeconfig --name ${{ env.CLUSTER_NAME }} --region ${{ env.E2E_TEST_AWS_REGION }}
343341 eksctl delete iamserviceaccount --name cloudwatch-agent --namespace amazon-cloudwatch --cluster ${{ env.CLUSTER_NAME }} --region ${{ env.E2E_TEST_AWS_REGION }}
344- kubectl delete -f ./appsignals-collector.yaml -n ${{ env.SAMPLE_APP_NAMESPACE }}
345342 kubectl delete ns opentelemetry-operator-system
346- kubectl delete deploy --all -n ${{ env.SAMPLE_APP_NAMESPACE }}
347- kubectl delete service sample-remote-app-service -n ${{ env.SAMPLE_APP_NAMESPACE }}
348- kubectl delete service sample-app-service -n ${{ env.SAMPLE_APP_NAMESPACE }}
343+ kubectl delete ns -n ${{ env.SAMPLE_APP_NAMESPACE }}
349344 aws eks update-kubeconfig --name ${{ env.CLUSTER_NAME }} --region ${{ env.E2E_TEST_AWS_REGION }}
350345
351346 - name : Terraform destroy
@@ -360,7 +355,7 @@ jobs:
360355 -var="kube_directory_path=${{ github.workspace }}/.kube" \
361356 -var="eks_cluster_name=${{ env.CLUSTER_NAME }}" \
362357 -var="test_namespace=${{ env.SAMPLE_APP_NAMESPACE }}" \
363- -var="service_account_aws_access=service-account -${{ env.TESTING_ID }}" \
358+ -var="service_account_aws_access=SA -${{ env.TESTING_ID }}" \
364359 -var="sample_app_image=${{ env.MAIN_SAMPLE_APP_IMAGE_ARN }}" \
365360 -var="sample_remote_app_image=${{ env.REMOTE_SAMPLE_APP_IMAGE_ARN }}"
366361
@@ -369,7 +364,7 @@ jobs:
369364 continue-on-error : true
370365 run : |
371366 eksctl delete iamserviceaccount \
372- --name service-account -${{ env.TESTING_ID }} \
367+ --name SA -${{ env.TESTING_ID }} \
373368 --namespace ${{ env.SAMPLE_APP_NAMESPACE }} \
374369 --cluster ${{ env.CLUSTER_NAME }} \
375370 --region ${{ env.E2E_TEST_AWS_REGION }}
0 commit comments