generated from amazon-archives/__template_Apache-2.0
-
Notifications
You must be signed in to change notification settings - Fork 23
[Dotnet] Implementation of Dotnet K8s E2E Test #220
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Merged
Merged
Changes from 28 commits
Commits
Show all changes
45 commits
Select commit
Hold shift + click to select a range
301cebe
dotnet k8s, not finished
XinRanZhAWS 5ac451c
dotnet k8s, not finished
XinRanZhAWS 1fe4159
update main
XinRanZhAWS 65fcd9e
update build script
XinRanZhAWS b266ac1
fix a few issue
XinRanZhAWS b733d26
Add dotnet to K8s infra create
XinRanZhAWS bfbdb06
deploy k8s infra for dotnet - one time run
XinRanZhAWS d08afba
Add K8s test template
XinRanZhAWS dfe279d
Revert "deploy k8s infra for dotnet - one time run"
XinRanZhAWS 07bacbc
Add K8s test template
XinRanZhAWS e459710
test dotnet k8s
XinRanZhAWS 2713633
Revert "Revert "deploy k8s infra for dotnet - one time run""
XinRanZhAWS c200339
Revert "test dotnet k8s"
XinRanZhAWS 561f614
test dotnet k8s
XinRanZhAWS 58c6181
improve to avoid workflow run clean up every time
XinRanZhAWS f6a730e
fix clean up script
XinRanZhAWS 9a3d1d1
fix patch os script
XinRanZhAWS e61cc7c
fix endpoint for k8s
XinRanZhAWS 10a14be
Merge branch 'main' into dotnet-k8s
XinRanZhAWS 133f7c6
test to valid if the env work
XinRanZhAWS dbec721
Merge branch 'main' into dotnet-k8s
XinRanZhAWS a3780ea
fix expect
XinRanZhAWS e643ecb
fix test define
XinRanZhAWS b20c1a2
fix service naming
XinRanZhAWS 634e928
fix log and trace
XinRanZhAWS 3124f46
rsd name is needed in emf log
XinRanZhAWS 9360858
modify patch tag
XinRanZhAWS 67701be
modify patch tag
XinRanZhAWS bea2448
fix based on comments
XinRanZhAWS b46a0e1
Fix based on comment - no verify status code
XinRanZhAWS 8921199
remove auto-plugin for k8s
XinRanZhAWS bfc9602
Update terraform/dotnet/k8s/deploy/main.tf
XinRanZhAWS da5fa2e
Fix expect based on latest
XinRanZhAWS e31e1ce
Merge branch 'main' into dotnet-k8s
XinRanZhAWS fc459d7
Update K8s Helm chart version
XinRanZhAWS a4f802b
Revert "Update K8s Helm chart version"
XinRanZhAWS 2284fd1
Revert "Fix expect based on latest"
XinRanZhAWS 67ea2fb
Put correct args on replacement
XinRanZhAWS 95bf66b
Prepare to merge
XinRanZhAWS 9109d05
update to use latest helm
XinRanZhAWS 612cf1d
Revert "Prepare to merge"
XinRanZhAWS 2e607e4
remove unneeded traffic-generator.zip
XinRanZhAWS 536d415
Revert "Revert "Prepare to merge""
XinRanZhAWS 4f1ed8c
Revert "Revert "Revert "Prepare to merge"""
XinRanZhAWS 665ee74
Revert "Revert "Revert "Revert "Prepare to merge""""
XinRanZhAWS File filter
Filter by extension
Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,29 @@ | ||
| ## Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. | ||
| ## SPDX-License-Identifier: Apache-2.0 | ||
|
|
||
| ## This workflow aims to run the Application Signals end-to-end tests as a canary to | ||
| ## test the artifacts for App Signals enablement. It will deploy the CloudWatch Agent | ||
| ## Operator and our sample app and remote service onto a native K8s cluster, call the | ||
| ## APIs, and validate the generated telemetry, including logs, metrics, and traces. | ||
| ## It will then clean up the cluster and EC2 instance it runs on for the next test run. | ||
| name: Dotnet K8s Enablement Canary Testing | ||
| on: | ||
| schedule: | ||
| - cron: '*/15 * * * *' # run the workflow every 15 minutes | ||
| workflow_dispatch: # be able to run the workflow on demand | ||
| push: | ||
| branches: | ||
| - "dotnet-k8s" | ||
|
|
||
| permissions: | ||
| id-token: write | ||
| contents: read | ||
|
|
||
| jobs: | ||
| k8s: | ||
| uses: ./.github/workflows/dotnet-k8s-retry.yml | ||
| secrets: inherit | ||
| with: | ||
| # To run in more regions, a cluster must be provisioned manually on EC2 instances in that region | ||
| aws-region: 'us-east-1' | ||
| caller-workflow-name: 'appsignals-e2e-dotnet-k8s-canary-test' |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,61 @@ | ||
| ## Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. | ||
| ## SPDX-License-Identifier: Apache-2.0 | ||
|
|
||
| # This is a reusable workflow for running the Enablement test for App Signals. | ||
| # It is meant to be called from another workflow. | ||
| # Read more about reusable workflows: https://docs.github.com/en/actions/using-workflows/reusing-workflows#overview | ||
| name: Dotnet K8s Retry | ||
| on: | ||
| workflow_call: | ||
| inputs: | ||
| aws-region: | ||
| required: true | ||
| type: string | ||
| caller-workflow-name: | ||
| required: true | ||
| type: string | ||
|
|
||
| concurrency: | ||
| group: 'dotnet-k8s-${{ inputs.aws-region }}-${{ github.ref_name }}' | ||
| cancel-in-progress: false | ||
|
|
||
| permissions: | ||
| id-token: write | ||
| contents: read | ||
|
|
||
| jobs: | ||
| dotnet-k8s-attempt-1: | ||
| uses: ./.github/workflows/dotnet-k8s-test.yml | ||
| secrets: inherit | ||
| with: | ||
| aws-region: ${{ inputs.aws-region }} | ||
| caller-workflow-name: ${{ inputs.caller-workflow-name }} | ||
|
|
||
| dotnet-k8s-attempt-2: | ||
| needs: [ dotnet-k8s-attempt-1 ] | ||
| if: ${{ needs.dotnet-k8s-attempt-1.outputs.job-started != 'true' }} | ||
| uses: ./.github/workflows/dotnet-k8s-test.yml | ||
| secrets: inherit | ||
| with: | ||
| aws-region: ${{ inputs.aws-region }} | ||
| caller-workflow-name: ${{ inputs.caller-workflow-name }} | ||
|
|
||
| publish-metric-attempt-1: | ||
| needs: [ dotnet-k8s-attempt-1, dotnet-k8s-attempt-2 ] | ||
| if: always() | ||
| uses: ./.github/workflows/enablement-test-publish-result.yml | ||
| secrets: inherit | ||
| with: | ||
| aws-region: ${{ inputs.aws-region }} | ||
| caller-workflow-name: ${{ inputs.caller-workflow-name }} | ||
| validation-result: ${{ needs.dotnet-k8s-attempt-1.outputs.validation-result || needs.dotnet-k8s-attempt-2.outputs.validation-result }} | ||
|
|
||
| publish-metric-attempt-2: | ||
| needs: [ dotnet-k8s-attempt-1, dotnet-k8s-attempt-2, publish-metric-attempt-1 ] | ||
| if: ${{ always() && needs.publish-metric-attempt-1.outputs.job-started != 'true' }} | ||
| uses: ./.github/workflows/enablement-test-publish-result.yml | ||
| secrets: inherit | ||
| with: | ||
| aws-region: ${{ inputs.aws-region }} | ||
| caller-workflow-name: ${{ inputs.caller-workflow-name }} | ||
| validation-result: ${{ needs.dotnet-k8s-attempt-1.outputs.validation-result || needs.dotnet-k8s-attempt-2.outputs.validation-result }} |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,285 @@ | ||
| ## Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. | ||
| ## SPDX-License-Identifier: Apache-2.0 | ||
|
|
||
| # This is a reusable workflow for running the Enablement test for App Signals. | ||
| # It is meant to be called from another workflow. | ||
| # Read more about reusable workflows: https://docs.github.com/en/actions/using-workflows/reusing-workflows#overview | ||
| name: Dotnet K8s on EC2 Use Case | ||
| on: | ||
| workflow_call: | ||
| inputs: | ||
| aws-region: | ||
| required: true | ||
| type: string | ||
| caller-workflow-name: | ||
| required: true | ||
| type: string | ||
| caller-repository: | ||
| required: false | ||
| type: string | ||
| adot-image-name: | ||
| required: false | ||
| type: string | ||
| cw-agent-operator-tag: | ||
| required: false | ||
| type: string | ||
| outputs: | ||
| job-started: | ||
| value: ${{ jobs.dotnet-k8s.outputs.job-started }} | ||
| validation-result: | ||
| value: ${{ jobs.dotnet-k8s.outputs.validation-result }} | ||
|
|
||
| permissions: | ||
| id-token: write | ||
| contents: read | ||
|
|
||
| env: | ||
| E2E_TEST_AWS_REGION: ${{ inputs.aws-region }} | ||
| CALLER_WORKFLOW_NAME: ${{ inputs.caller-workflow-name }} | ||
| CALLER_REPOSITORY: ${{ inputs.caller-repository }} | ||
| ADOT_IMAGE_NAME: ${{ inputs.adot-image-name }} | ||
| CW_AGENT_OPERATOR_TAG: ${{ inputs.cw-agent-operator-tag }} | ||
| E2E_TEST_ACCOUNT_ID: ${{ secrets.APPLICATION_SIGNALS_E2E_TEST_ACCOUNT_ID }} | ||
| E2E_TEST_ROLE_NAME: ${{ secrets.APPLICATION_SIGNALS_E2E_TEST_ROLE_NAME }} | ||
| SAMPLE_APP_NAMESPACE: dotnet-sample-app-namespace | ||
| METRIC_NAMESPACE: ApplicationSignals | ||
| LOG_GROUP_NAME: /aws/application-signals/data | ||
| TEST_RESOURCES_FOLDER: ${GITHUB_WORKSPACE} | ||
|
|
||
| jobs: | ||
| dotnet-k8s: | ||
| runs-on: ubuntu-latest | ||
| timeout-minutes: 30 | ||
| outputs: | ||
| job-started: ${{ steps.job-started.outputs.job-started }} | ||
| validation-result: ${{ steps.validation-result.outputs.validation-result }} | ||
| steps: | ||
| - name: Check if the job started | ||
| id: job-started | ||
| run: echo "job-started=true" >> $GITHUB_OUTPUT | ||
|
|
||
| - name: Generate testing id | ||
| run: echo TESTING_ID="${{ github.run_id }}-${{ github.run_number }}-${RANDOM}" >> $GITHUB_ENV | ||
|
|
||
| - uses: actions/checkout@v4 | ||
| with: | ||
| repository: 'aws-observability/aws-application-signals-test-framework' | ||
| ref: ${{ env.CALLER_WORKFLOW_NAME == 'main-build' && 'main' || github.ref }} | ||
| fetch-depth: 0 | ||
|
|
||
| # We initialize Gradlew Daemon early on during the workflow because sometimes initialization | ||
| # fails due to transient issues. If it fails here, then we will try again later before the validators | ||
| - name: Initiate Gradlew Daemon | ||
| id: initiate-gradlew | ||
| uses: ./.github/workflows/actions/execute_and_retry | ||
| continue-on-error: true | ||
| with: | ||
| command: "./gradlew :validator:build" | ||
| cleanup: "./gradlew clean" | ||
| max_retry: 3 | ||
| sleep_time: 60 | ||
|
|
||
| - name: Configure AWS Credentials | ||
| uses: aws-actions/configure-aws-credentials@v4 | ||
| with: | ||
| role-to-assume: arn:aws:iam::${{ env.E2E_TEST_ACCOUNT_ID }}:role/${{ env.E2E_TEST_ROLE_NAME }} | ||
| aws-region: us-east-1 | ||
|
|
||
| - name: Retrieve Secrets | ||
| uses: aws-actions/aws-secretsmanager-get-secrets@v1 | ||
| with: | ||
| secret-ids: | | ||
| ACCOUNT_ID, region-account/${{ env.E2E_TEST_AWS_REGION }} | ||
| DOTNET_MAIN_SAMPLE_APP_IMAGE, e2e-test/dotnet-main-sample-app-image | ||
| DOTNET_REMOTE_SAMPLE_APP_IMAGE, e2e-test/dotnet-remote-sample-app-image | ||
| RELEASE_TESTING_ECR_ACCOUNT, e2e-test/${{ github.event.repository.name }}/dotnet-k8s-release-testing-account | ||
|
|
||
| - name: Retrieve K8s EC2 Secrets | ||
| if: ${{ env.CALLER_WORKFLOW_NAME != 'k8s-os-patching' }} | ||
| uses: aws-actions/aws-secretsmanager-get-secrets@v1 | ||
| with: | ||
| secret-ids: | | ||
| MAIN_SERVICE_ENDPOINT, e2e-test/${{ github.event.repository.name }}/dotnet-k8s-master-node-endpoint | ||
| MASTER_NODE_SSH_KEY, e2e-test/${{ github.event.repository.name }}/dotnet-k8s-ssh-key | ||
|
|
||
| - name: Retrieve K8s EC2 OS Patching Secrets | ||
| if: ${{ env.CALLER_WORKFLOW_NAME == 'k8s-os-patching' }} | ||
| uses: aws-actions/aws-secretsmanager-get-secrets@v1 | ||
| with: | ||
| secret-ids: | | ||
| MAIN_SERVICE_ENDPOINT, e2e-test/${{ env.CALLER_REPOSITORY }}/dotnet-k8s-master-node-endpoint-pending-value | ||
| MASTER_NODE_SSH_KEY, e2e-test/${{ env.CALLER_REPOSITORY }}/dotnet-k8s-ssh-key-pending-value | ||
|
|
||
| - name: Prepare and upload sample app deployment files | ||
| working-directory: terraform/dotnet/k8s/deploy/resources | ||
| run: | | ||
| sed -i 's#\${TESTING_ID}#${{ env.TESTING_ID }}#' dotnet-frontend-service-depl.yaml | ||
| sed -i 's#\${IMAGE}#${{ env.ACCOUNT_ID }}.dkr.ecr.${{ env.E2E_TEST_AWS_REGION }}.amazonaws.com/${{ env.DOTNET_MAIN_SAMPLE_APP_IMAGE }}#' dotnet-frontend-service-depl.yaml | ||
| sed -i 's#\${TESTING_ID}#${{ env.TESTING_ID }}#' dotnet-remote-service-depl.yaml | ||
| sed -i 's#\${IMAGE}#${{ env.ACCOUNT_ID }}.dkr.ecr.${{ env.E2E_TEST_AWS_REGION }}.amazonaws.com/${{ env.DOTNET_REMOTE_SAMPLE_APP_IMAGE }}#' dotnet-remote-service-depl.yaml | ||
| aws s3api put-object --bucket aws-appsignals-sample-app-prod-${{ env.E2E_TEST_AWS_REGION }} --key dotnet-frontend-service-depl-${{ env.TESTING_ID }}.yaml --body dotnet-frontend-service-depl.yaml | ||
| aws s3api put-object --bucket aws-appsignals-sample-app-prod-${{ env.E2E_TEST_AWS_REGION }} --key dotnet-remote-service-depl-${{ env.TESTING_ID }}.yaml --body dotnet-remote-service-depl.yaml | ||
|
|
||
| - name: Set up terraform | ||
| uses: ./.github/workflows/actions/execute_and_retry | ||
| with: | ||
| command: "wget -O- https://apt.releases.hashicorp.com/gpg | sudo gpg --dearmor -o /usr/share/keyrings/hashicorp-archive-keyring.gpg" | ||
| post-command: 'echo "deb [signed-by=/usr/share/keyrings/hashicorp-archive-keyring.gpg] https://apt.releases.hashicorp.com $(lsb_release -cs) main" | sudo tee /etc/apt/sources.list.d/hashicorp.list | ||
| && sudo apt update && sudo apt install terraform' | ||
| sleep_time: 60 | ||
|
|
||
| - name: Initiate Terraform | ||
| uses: ./.github/workflows/actions/execute_and_retry | ||
| with: | ||
| command: "cd ${{ env.TEST_RESOURCES_FOLDER }}/terraform/dotnet/k8s/deploy && terraform init && terraform validate" | ||
| cleanup: "rm -rf .terraform && rm -rf .terraform.lock.hcl" | ||
| max_retry: 6 | ||
| sleep_time: 60 | ||
|
|
||
| - name: Get ECR to Patch | ||
| run: | | ||
| if [ "${{ github.event.repository.name }}" = "amazon-cloudwatch-agent" ]; then | ||
| echo PATCH_IMAGE_ARN="${{ secrets.AWS_ECR_PRIVATE_REGISTRY }}/cwagent-integration-test:${{ github.sha }}" >> $GITHUB_ENV | ||
| elif [ "${{ github.event.repository.name }}" = "amazon-cloudwatch-agent-operator" ]; then | ||
| echo PATCH_IMAGE_ARN="${{ vars.ECR_OPERATOR_STAGING_REPO }}:${{ env.CW_AGENT_OPERATOR_TAG }}" >> $GITHUB_ENV | ||
| elif [ "${{ github.event.repository.name }}" = "aws-otel-dotnet-instrumentation" ]; then | ||
| echo PATCH_IMAGE_ARN="${{ env.ADOT_IMAGE_NAME }}" >> $GITHUB_ENV | ||
| fi | ||
|
|
||
| - name: Deploy Operator and Sample App using Terraform | ||
| working-directory: terraform/dotnet/k8s/deploy | ||
| run: | | ||
| terraform apply -auto-approve \ | ||
| -var="aws_region=${{ env.E2E_TEST_AWS_REGION }}" \ | ||
| -var="test_id=${{ env.TESTING_ID }}" \ | ||
| -var="ssh_key=${{ env.MASTER_NODE_SSH_KEY }}" \ | ||
| -var="host=${{ env.MAIN_SERVICE_ENDPOINT }}" \ | ||
| -var="repository=${{ github.event.repository.name }}" \ | ||
| -var="patch_image_arn=${{ env.PATCH_IMAGE_ARN }}" \ | ||
| -var="release_testing_ecr_account=${{ env.RELEASE_TESTING_ECR_ACCOUNT }}" | ||
|
|
||
| - name: Get Main and Remote Service IP | ||
| run: | | ||
| echo MAIN_SERVICE_IP="$(aws ssm get-parameter --region ${{ env.E2E_TEST_AWS_REGION }} --name dotnet-main-service-ip-${{ env.TESTING_ID }} | jq -r '.Parameter.Value')" >> $GITHUB_ENV | ||
| echo REMOTE_SERVICE_IP="$(aws ssm get-parameter --region us-east-1 --name dotnet-remote-service-ip-${{ env.TESTING_ID }} | jq -r '.Parameter.Value')" >> $GITHUB_ENV | ||
|
|
||
| - name: Initiate Gradlew Daemon | ||
| if: steps.initiate-gradlew == 'failure' | ||
| uses: ./.github/workflows/actions/execute_and_retry | ||
| continue-on-error: true | ||
| with: | ||
| command: "./gradlew :validator:build" | ||
| cleanup: "./gradlew clean" | ||
| max_retry: 3 | ||
| sleep_time: 60 | ||
|
|
||
| # Validation for pulse telemetry data | ||
| - name: Validate generated EMF logs | ||
| id: log-validation | ||
| run: ./gradlew validator:run --args='-c dotnet/k8s/log-validation.yml | ||
| --testing-id ${{ env.TESTING_ID }} | ||
| --endpoint http://${{ env.MAIN_SERVICE_IP }}:8080 | ||
| --region ${{ env.E2E_TEST_AWS_REGION }} | ||
| --account-id ${{ env.ACCOUNT_ID }} | ||
| --metric-namespace ${{ env.METRIC_NAMESPACE }} | ||
| --log-group ${{ env.LOG_GROUP_NAME }} | ||
| --platform-info k8s-cluster-${{ env.TESTING_ID }} | ||
| --app-namespace ${{ env.SAMPLE_APP_NAMESPACE }} | ||
| --service-name dotnet-sample-app-deployment-${{ env.TESTING_ID }} | ||
| --remote-service-name dotnet-sample-r-app-deployment-${{ env.TESTING_ID }} | ||
| --remote-service-deployment-name dotnet-sample-r-app-deployment-${{ env.TESTING_ID }} | ||
| --query-string ip=${{ env.REMOTE_SERVICE_IP }}&testingId=${{ env.TESTING_ID }} | ||
| --rollup' | ||
|
|
||
| - name: Validate generated metrics | ||
| id: metric-validation | ||
| if: (success() || steps.log-validation.outcome == 'failure') && !cancelled() | ||
| run: ./gradlew validator:run --args='-c dotnet/k8s/metric-validation.yml | ||
| --testing-id ${{ env.TESTING_ID }} | ||
| --endpoint http://${{ env.MAIN_SERVICE_IP }}:8080 | ||
| --region ${{ env.E2E_TEST_AWS_REGION }} | ||
| --account-id ${{ env.ACCOUNT_ID }} | ||
| --metric-namespace ${{ env.METRIC_NAMESPACE }} | ||
| --log-group ${{ env.LOG_GROUP_NAME }} | ||
| --platform-info k8s-cluster-${{ env.TESTING_ID }} | ||
| --app-namespace ${{ env.SAMPLE_APP_NAMESPACE }} | ||
| --service-name dotnet-sample-app-deployment-${{ env.TESTING_ID }} | ||
| --remote-service-name dotnet-sample-r-app-deployment-${{ env.TESTING_ID }} | ||
| --remote-service-deployment-name dotnet-sample-r-app-deployment-${{ env.TESTING_ID }} | ||
| --query-string ip=${{ env.REMOTE_SERVICE_IP }}&testingId=${{ env.TESTING_ID }} | ||
| --rollup' | ||
|
|
||
| - name: Validate generated traces | ||
| id: trace-validation | ||
| if: (success() || steps.log-validation.outcome == 'failure' || steps.metric-validation.outcome == 'failure') && !cancelled() | ||
| run: ./gradlew validator:run --args='-c dotnet/k8s/trace-validation.yml | ||
| --testing-id ${{ env.TESTING_ID }} | ||
| --endpoint http://${{ env.MAIN_SERVICE_IP }}:8080 | ||
| --region ${{ env.E2E_TEST_AWS_REGION }} | ||
| --account-id ${{ env.ACCOUNT_ID }} | ||
| --metric-namespace ${{ env.METRIC_NAMESPACE }} | ||
| --log-group ${{ env.LOG_GROUP_NAME }} | ||
| --platform-info k8s-cluster-${{ env.TESTING_ID }} | ||
| --app-namespace ${{ env.SAMPLE_APP_NAMESPACE }} | ||
| --service-name dotnet-sample-app-deployment-${{ env.TESTING_ID }} | ||
| --remote-service-name dotnet-sample-r-app-deployment-${{ env.TESTING_ID }} | ||
| --remote-service-deployment-name dotnet-sample-r-app-deployment-${{ env.TESTING_ID }} | ||
| --query-string ip=${{ env.REMOTE_SERVICE_IP }}&testingId=${{ env.TESTING_ID }} | ||
| --rollup' | ||
|
|
||
| - name: Refresh AWS Credentials | ||
| uses: aws-actions/configure-aws-credentials@v4 | ||
| with: | ||
| role-to-assume: arn:aws:iam::${{ env.E2E_TEST_ACCOUNT_ID }}:role/${{ env.E2E_TEST_ROLE_NAME }} | ||
| aws-region: us-east-1 | ||
|
|
||
| - name: Save test results | ||
| if: always() | ||
| id: validation-result | ||
| run: | | ||
| if [ "${{ steps.log-validation.outcome }}" = "success" ] && [ "${{ steps.metric-validation.outcome }}" = "success" ] && [ "${{ steps.trace-validation.outcome }}" = "success" ]; then | ||
| echo "validation-result=success" >> $GITHUB_OUTPUT | ||
| else | ||
| echo "validation-result=failure" >> $GITHUB_OUTPUT | ||
| fi | ||
|
|
||
| # Clean up Procedures | ||
| - name: Initiate Terraform for Cleanup | ||
| if: always() | ||
| uses: ./.github/workflows/actions/execute_and_retry | ||
| with: | ||
| command: "cd ${{ env.TEST_RESOURCES_FOLDER }}/terraform/dotnet/k8s/cleanup && terraform init && terraform validate" | ||
| cleanup: "rm -rf .terraform && rm -rf .terraform.lock.hcl" | ||
|
|
||
| - name: Clean Up Operator and Sample App using Terraform | ||
| if: always() | ||
| working-directory: terraform/dotnet/k8s/cleanup | ||
| run: | | ||
| terraform apply -auto-approve \ | ||
| -var="aws_region=${{ env.E2E_TEST_AWS_REGION }}" \ | ||
| -var="test_id=${{ env.TESTING_ID }}" \ | ||
| -var="ssh_key=${{ env.MASTER_NODE_SSH_KEY }}" \ | ||
| -var="host=${{ env.MAIN_SERVICE_ENDPOINT }}" | ||
|
|
||
| - name: Terraform destroy - deployment | ||
| if: always() | ||
| continue-on-error: true | ||
| working-directory: terraform/dotnet/k8s/deploy | ||
| run: | | ||
| terraform destroy -auto-approve \ | ||
| -var="test_id=${{ env.TESTING_ID }}" | ||
|
|
||
| - name: Terraform destroy - cleanup | ||
| if: always() | ||
| continue-on-error: true | ||
| working-directory: terraform/dotnet/k8s/cleanup | ||
| run: | | ||
| terraform destroy -auto-approve \ | ||
| -var="test_id=${{ env.TESTING_ID }}" | ||
|
|
||
| - name: Delete deployment files | ||
| if: always() | ||
| continue-on-error: true | ||
| run: | | ||
| aws s3api delete-object --bucket aws-appsignals-sample-app-prod-${{ env.E2E_TEST_AWS_REGION }} --key dotnet-frontend-service-depl-${{ env.TESTING_ID }}.yaml | ||
| aws s3api delete-object --bucket aws-appsignals-sample-app-prod-${{ env.E2E_TEST_AWS_REGION }} --key dotnet-remote-service-depl-${{ env.TESTING_ID }}.yaml | ||
XinRanZhAWS marked this conversation as resolved.
Outdated
Show resolved
Hide resolved
|
Binary file not shown.
Oops, something went wrong.
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Uh oh!
There was an error while loading. Please reload this page.