generated from amazon-archives/__template_Apache-2.0
-
Notifications
You must be signed in to change notification settings - Fork 23
Enable ECS end to end test for Java and Python #222
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Merged
Merged
Changes from all commits
Commits
Show all changes
17 commits
Select commit
Hold shift + click to select a range
07cda90
add ECS e2e.
zzhlogin 6b054e1
Code Clean up.
zzhlogin dddbd63
Code clean up.
zzhlogin 89218cb
Merge branch 'main' into ecs-no-call-zzhlogin
zzhlogin 35a4029
Test workflow run.
zzhlogin f645c81
Code clean up.
zzhlogin ba84d86
Remove unuseful comment.
zzhlogin 47bd778
Merge branch 'main' into ecs-no-call-zzhlogin
zzhlogin 7f93bef
Merge branch 'main' into ecs-no-call-zzhlogin
zzhlogin 70afa17
Address comments and use the latest ADOT python released image.
zzhlogin f7a54cc
Test workflow.
zzhlogin fe359cc
Fix traffic gen.:
zzhlogin 77b249d
Remove test condition.
zzhlogin f2143fe
Remove concurency.
zzhlogin 82b412c
# This is a combination of 11 commits.
zzhlogin 2c6acd4
# This is a combination of 11 commits.
zzhlogin 87a6456
Merge branch 'main' into ecs-no-call-zzhlogin
zzhlogin File filter
Filter by extension
Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,27 @@ | ||
| ## Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. | ||
| ## SPDX-License-Identifier: Apache-2.0 | ||
|
|
||
| ## This workflow aims to run the Application Signals Java end-to-end tests as a canary to | ||
| ## test the artifacts for Application Signals enablement. It will deploy a sample app onto an ECS cluster, | ||
| ## call the APIs, and validate the generated telemetry, including logs, metrics, and traces. | ||
| name: Java ECS Enablement Canary Testing | ||
| on: | ||
| schedule: | ||
| - cron: '*/15 * * * *' # run the workflow every 15 minutes | ||
| workflow_dispatch: # be able to run the workflow on demand | ||
|
|
||
| permissions: | ||
| id-token: write | ||
| contents: read | ||
|
|
||
| jobs: | ||
| ecs: | ||
| strategy: | ||
| fail-fast: false | ||
| matrix: | ||
| aws-region: ['us-east-1'] | ||
| uses: ./.github/workflows/java-ecs-retry.yml | ||
| secrets: inherit | ||
| with: | ||
| aws-region: ${{ matrix.aws-region }} | ||
| caller-workflow-name: 'appsignals-e2e-java-ecs-canary-test' | ||
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,57 @@ | ||
| ## Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. | ||
| ## SPDX-License-Identifier: Apache-2.0 | ||
|
|
||
| # This is a reusable workflow for running the Enablement test for App Signals. | ||
| # It is meant to be called from another workflow. | ||
| # Read more about reusable workflows: https://docs.github.com/en/actions/using-workflows/reusing-workflows#overview | ||
| name: Java ECS Retry | ||
| on: | ||
| workflow_call: | ||
| inputs: | ||
| aws-region: | ||
| required: true | ||
| type: string | ||
| caller-workflow-name: | ||
| required: true | ||
| type: string | ||
|
|
||
| permissions: | ||
| id-token: write | ||
| contents: read | ||
|
|
||
| jobs: | ||
| java-ecs-attempt-1: | ||
| uses: ./.github/workflows/java-ecs-test.yml | ||
| secrets: inherit | ||
| with: | ||
| aws-region: ${{ inputs.aws-region }} | ||
| caller-workflow-name: ${{ inputs.caller-workflow-name }} | ||
|
|
||
| java-ecs-attempt-2: | ||
| needs: [ java-ecs-attempt-1 ] | ||
| if: ${{ needs.java-ecs-attempt-1.outputs.job-started != 'true' }} | ||
| uses: ./.github/workflows/java-ecs-test.yml | ||
| secrets: inherit | ||
| with: | ||
| aws-region: ${{ inputs.aws-region }} | ||
| caller-workflow-name: ${{ inputs.caller-workflow-name }} | ||
|
|
||
| publish-metric-attempt-1: | ||
| needs: [ java-ecs-attempt-1, java-ecs-attempt-2 ] | ||
| if: always() | ||
| uses: ./.github/workflows/enablement-test-publish-result.yml | ||
| secrets: inherit | ||
| with: | ||
| aws-region: ${{ inputs.aws-region }} | ||
| caller-workflow-name: ${{ inputs.caller-workflow-name }} | ||
| validation-result: ${{ needs.java-ecs-attempt-1.outputs.validation-result || needs.java-ecs-attempt-2.outputs.validation-result }} | ||
|
|
||
| publish-metric-attempt-2: | ||
| needs: [ java-ecs-attempt-1, java-ecs-attempt-2, publish-metric-attempt-1 ] | ||
| if: ${{ always() && needs.publish-metric-attempt-1.outputs.job-started != 'true' }} | ||
| uses: ./.github/workflows/enablement-test-publish-result.yml | ||
| secrets: inherit | ||
| with: | ||
| aws-region: ${{ inputs.aws-region }} | ||
| caller-workflow-name: ${{ inputs.caller-workflow-name }} | ||
| validation-result: ${{ needs.java-ecs-attempt-1.outputs.validation-result || needs.java-ecs-attempt-2.outputs.validation-result }} |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,276 @@ | ||
| ## Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. | ||
| ## SPDX-License-Identifier: Apache-2.0 | ||
|
|
||
| # This is a reusable workflow for running the E2E test for App Signals. | ||
| # It is meant to be called from another workflow. | ||
| # Read more about reusable workflows: https://docs.github.com/en/actions/using-workflows/reusing-workflows#overview | ||
| name: Java ECS Use Case | ||
| on: | ||
| workflow_call: | ||
| inputs: | ||
| aws-region: | ||
| required: true | ||
| type: string | ||
| caller-workflow-name: | ||
| required: true | ||
| type: string | ||
| adot-image-name: | ||
| required: false | ||
| type: string | ||
| cwagent-image-name: | ||
| required: false | ||
| type: string | ||
| outputs: | ||
| job-started: | ||
| value: ${{ jobs.java-ecs.outputs.job-started }} | ||
| validation-result: | ||
| value: ${{ jobs.java-ecs.outputs.validation-result }} | ||
|
|
||
| permissions: | ||
| id-token: write | ||
| contents: read | ||
|
|
||
| env: | ||
| E2E_TEST_AWS_REGION: ${{ inputs.aws-region }} | ||
| CALLER_WORKFLOW_NAME: ${{ inputs.caller-workflow-name }} | ||
| ADOT_IMAGE_NAME: ${{ inputs.adot-image-name }} | ||
| CLUSTER_NAME: e2e-test-java | ||
| SAMPLE_APP_NAME: main-service-java | ||
| METRIC_NAMESPACE: ApplicationSignals | ||
| LOG_GROUP_NAME: /aws/application-signals/data | ||
| TEST_RESOURCES_FOLDER: ${GITHUB_WORKSPACE} | ||
| E2E_TEST_ACCOUNT_ID: ${{ secrets.APPLICATION_SIGNALS_E2E_TEST_ACCOUNT_ID }} | ||
| E2E_TEST_ROLE_NAME: ${{ secrets.APPLICATION_SIGNALS_E2E_TEST_ROLE_NAME }} | ||
|
|
||
| jobs: | ||
| java-ecs: | ||
| runs-on: ubuntu-latest | ||
| outputs: | ||
| job-started: ${{ steps.job-started.outputs.job-started }} | ||
| validation-result: ${{ steps.validation-result.outputs.validation-result }} | ||
| steps: | ||
| - name: Check if the job started | ||
| id: job-started | ||
| run: echo "job-started=true" >> $GITHUB_OUTPUT | ||
|
|
||
| - name: Generate testing id and sample app namespace | ||
| run: | | ||
| echo TESTING_ID="${{ github.job }}-${{ github.run_id }}-${{ github.run_number }}-${{ github.run_attempt }}" >> $GITHUB_ENV | ||
|
|
||
| - uses: actions/checkout@v4 | ||
| with: | ||
| repository: 'aws-observability/aws-application-signals-test-framework' | ||
| ref: ${{ env.CALLER_WORKFLOW_NAME == 'main-build' && 'main' || github.ref }} | ||
| fetch-depth: 0 | ||
|
|
||
| # We initialize Gradlew Daemon early on during the workflow because sometimes initialization | ||
| # fails due to transient issues. If it fails here, then we will try again later before the validators | ||
| - name: Initiate Gradlew Daemon | ||
| id: initiate-gradlew | ||
| uses: ./.github/workflows/actions/execute_and_retry | ||
| continue-on-error: true | ||
| with: | ||
| command: "./gradlew :validator:build" | ||
| cleanup: "./gradlew clean" | ||
| max_retry: 3 | ||
| sleep_time: 60 | ||
|
|
||
| - name: Configure AWS Credentials | ||
| uses: aws-actions/configure-aws-credentials@v4 | ||
| with: | ||
| role-to-assume: arn:aws:iam::${{ env.E2E_TEST_ACCOUNT_ID }}:role/${{ env.E2E_TEST_ROLE_NAME }} | ||
| aws-region: us-east-1 | ||
|
|
||
| - name: Retrieve account | ||
| uses: aws-actions/aws-secretsmanager-get-secrets@v1 | ||
| with: | ||
| secret-ids: | | ||
| ACCOUNT_ID, region-account/${{ env.E2E_TEST_AWS_REGION }} | ||
| JAVA_MAIN_SAMPLE_APP_IMAGE, e2e-test/java-main-sample-app-image | ||
| JAVA_REMOTE_SAMPLE_APP_IMAGE, e2e-test/java-remote-sample-app-image | ||
|
|
||
| # If the workflow is running as a canary, then we want to log in to the aws account in the appropriate region | ||
| - name: Configure AWS Credentials | ||
| if: ${{ github.event.repository.name == 'aws-application-signals-test-framework' }} | ||
| uses: aws-actions/configure-aws-credentials@v4 | ||
| with: | ||
| role-to-assume: arn:aws:iam::${{ env.ACCOUNT_ID }}:role/${{ env.E2E_TEST_ROLE_NAME }} | ||
| aws-region: ${{ env.E2E_TEST_AWS_REGION }} | ||
|
|
||
| - name: Initiate Terraform | ||
| uses: ./.github/workflows/actions/execute_and_retry | ||
| with: | ||
| command: "cd ${{ env.TEST_RESOURCES_FOLDER }}/terraform/java/ecs && terraform init && terraform validate" | ||
| cleanup: "rm -rf .terraform && rm -rf .terraform.lock.hcl" | ||
| max_retry: 6 | ||
| sleep_time: 60 | ||
|
|
||
| - name: Set Sample App Image | ||
| run: | | ||
| echo MAIN_SAMPLE_APP_IMAGE_URI="${{ env.ACCOUNT_ID }}.dkr.ecr.${{ env.E2E_TEST_AWS_REGION }}.amazonaws.com/${{ env.JAVA_MAIN_SAMPLE_APP_IMAGE }}" >> $GITHUB_ENV | ||
| echo REMOTE_SAMPLE_APP_IMAGE_URI="${{ env.ACCOUNT_ID }}.dkr.ecr.${{ env.E2E_TEST_AWS_REGION }}.amazonaws.com/${{ env.JAVA_REMOTE_SAMPLE_APP_IMAGE }}" >> $GITHUB_ENV | ||
|
|
||
| - name: Set ADOT Java image environment variable | ||
| run: | | ||
| if [ "${{ github.event.repository.name }}" = "aws-otel-java-instrumentation" ]; then | ||
| # Use the staging image build by the ADOT Java repo | ||
| echo ADOT_INSTRUMENTATION_IMAGE_URI="${{ env.ADOT_IMAGE_NAME }}" >> $GITHUB_ENV | ||
| else | ||
| ADOT_INSTRUMENTATION_IMAGE_TAG=$(curl -s -I -L 'https://github.com/aws-observability/aws-otel-java-instrumentation/releases/latest' | grep -i Location | awk -F'/tag/' '{print $2}' | tr -d '\r') | ||
| echo ADOT_INSTRUMENTATION_IMAGE_URI="public.ecr.aws/aws-observability/adot-autoinstrumentation-java:$ADOT_INSTRUMENTATION_IMAGE_TAG" >> $GITHUB_ENV | ||
| fi | ||
|
|
||
| # Switch to use the public image for CW Agent | ||
| - name: Set Get CW Agent command environment variable | ||
| run: | | ||
| if [ "${{ github.event.repository.name }}" = "amazon-cloudwatch-agent" ]; then | ||
| echo CWAGENT_IMAGE_URI="${{ secrets.AWS_ECR_PRIVATE_REGISTRY }}/cwagent-integration-test:${{ github.sha }}" >> $GITHUB_ENV | ||
| else | ||
| # echo CWAGENT_IMAGE_URI="public.ecr.aws/cloudwatch-agent/cloudwatch-agent:latest" >> $GITHUB_ENV | ||
| echo CWAGENT_IMAGE_URI="public.ecr.aws/y8s3a7r9/cloudwatch-agent:latest" >> $GITHUB_ENV | ||
| fi | ||
|
|
||
| - name: Deploy sample app via terraform and wait for the endpoint to come online | ||
| id: deploy-sample-app | ||
| working-directory: terraform/java/ecs | ||
| run: | | ||
| # Attempt to deploy the sample app on an EKS instance and wait for its endpoint to come online. | ||
| # There may be occasional failures due to transitivity issues, so try up to 2 times. | ||
| # deployment_failed of 0 indicates that both the terraform deployment and the endpoint are running, while 1 indicates | ||
| # that it failed at some point | ||
| retry_counter=0 | ||
| max_retry=2 | ||
| while [ $retry_counter -lt $max_retry ]; do | ||
| echo "Attempt $retry_counter" | ||
| deployment_failed=0 | ||
| terraform apply -auto-approve \ | ||
| -var="test_id=${{ env.TESTING_ID }}" \ | ||
| -var="aws_region=${{ env.E2E_TEST_AWS_REGION }}" \ | ||
| -var="ecs_cluster_name=${{ env.CLUSTER_NAME }}-${{ env.TESTING_ID }}" \ | ||
| -var="sample_app_name=${{ env.SAMPLE_APP_NAME }}-${{ env.TESTING_ID }}" \ | ||
| -var="sample_app_image=${{ env.MAIN_SAMPLE_APP_IMAGE_URI }}" \ | ||
| -var="sample_remote_app_image=${{ env.REMOTE_SAMPLE_APP_IMAGE_URI }}" \ | ||
| -var="adot_instrumentation_image=${{ env.ADOT_INSTRUMENTATION_IMAGE_URI }}" \ | ||
| -var="cwagent_image=${{ env.CWAGENT_IMAGE_URI }}" \ | ||
| || deployment_failed=$? | ||
|
|
||
| if [ $deployment_failed -ne 0 ]; then | ||
| echo "Terraform deployment was unsuccessful. Will attempt to retry deployment." | ||
| fi | ||
|
|
||
| # If the deployment_failed is 1 then either the terraform deployment or the endpoint connection failed, so first destroy the | ||
| # resources created from terraform and try again. | ||
| if [ $deployment_failed -eq 1 ]; then | ||
| echo "Destroying terraform" | ||
| terraform destroy -auto-approve \ | ||
| -var="test_id=${{ env.TESTING_ID }}" \ | ||
| -var="aws_region=${{ env.E2E_TEST_AWS_REGION }}" \ | ||
| -var="ecs_cluster_name=${{ env.CLUSTER_NAME }}-${{ env.TESTING_ID }}" \ | ||
| -var="sample_app_name=${{ env.SAMPLE_APP_NAME }}-${{ env.TESTING_ID }}" \ | ||
| -var="sample_app_image=${{ env.MAIN_SAMPLE_APP_IMAGE_URI }}" \ | ||
| -var="sample_remote_app_image=${{ env.REMOTE_SAMPLE_APP_IMAGE_URI }}" \ | ||
| -var="adot_instrumentation_image=${{ env.ADOT_INSTRUMENTATION_IMAGE_URI }}" \ | ||
| -var="cwagent_image=${{ env.CWAGENT_IMAGE_URI }}" | ||
|
|
||
| retry_counter=$(($retry_counter+1)) | ||
| else | ||
| # If deployment succeeded, then exit the loop | ||
| break | ||
| fi | ||
|
|
||
| if [ $retry_counter -ge $max_retry ]; then | ||
| echo "Max retry reached, failed to deploy terraform and connect to the endpoint. Exiting code" | ||
| exit 1 | ||
| fi | ||
| done | ||
|
|
||
| - name: Sleep to Wait for Canary Generated and Log Artifact Versions | ||
| run: | | ||
| sleep 120 | ||
| echo "ADOT Image: ${{ env.ADOT_INSTRUMENTATION_IMAGE_URI }}"; | ||
| echo "CW Agent Image: ${{ env.CWAGENT_IMAGE_URI }}"; | ||
|
|
||
| - name: Initiate Gradlew Daemon | ||
| if: steps.initiate-gradlew == 'failure' | ||
| uses: ./.github/workflows/actions/execute_and_retry | ||
| continue-on-error: true | ||
| with: | ||
| command: "./gradlew :validator:build" | ||
| cleanup: "./gradlew clean" | ||
| max_retry: 3 | ||
| sleep_time: 60 | ||
|
|
||
| # Validation for app signals telemetry data | ||
| - name: Call endpoint and validate generated EMF logs | ||
| id: log-validation | ||
| if: steps.deploy-sample-app.outcome == 'success' && !cancelled() | ||
| run: ./gradlew validator:run --args='-c java/ecs/log-validation.yml | ||
| --testing-id ${{ env.TESTING_ID }} | ||
| --region ${{ env.E2E_TEST_AWS_REGION }} | ||
| --account-id ${{ env.ACCOUNT_ID }} | ||
| --metric-namespace ${{ env.METRIC_NAMESPACE }} | ||
| --log-group ${{ env.LOG_GROUP_NAME }} | ||
| --platform-info ${{ env.CLUSTER_NAME }}-${{ env.TESTING_ID }} | ||
| --service-name ${{env.SAMPLE_APP_NAME }}-${{ env.TESTING_ID }} | ||
| --rollup' | ||
|
|
||
| - name: Call endpoints and validate generated metrics | ||
| id: metric-validation | ||
| if: (steps.deploy-sample-app.outcome == 'success' || steps.log-validation.outcome == 'failure') && !cancelled() | ||
| run: ./gradlew validator:run --args='-c java/ecs/metric-validation.yml | ||
| --testing-id ${{ env.TESTING_ID }} | ||
| --region ${{ env.E2E_TEST_AWS_REGION }} | ||
| --account-id ${{ env.ACCOUNT_ID }} | ||
| --metric-namespace ${{ env.METRIC_NAMESPACE }} | ||
| --log-group ${{ env.LOG_GROUP_NAME }} | ||
| --platform-info ${{ env.CLUSTER_NAME }}-${{ env.TESTING_ID }} | ||
| --service-name ${{env.SAMPLE_APP_NAME }}-${{ env.TESTING_ID }} | ||
| --rollup' | ||
|
|
||
| - name: Call endpoints and validate generated traces | ||
| id: trace-validation | ||
| if: (steps.deploy-sample-app.outcome == 'success' || steps.log-validation.outcome == 'failure' || steps.metric-validation.outcome == 'failure') && !cancelled() | ||
| run: ./gradlew validator:run --args='-c java/ecs/trace-validation.yml | ||
| --testing-id ${{ env.TESTING_ID }} | ||
| --region ${{ env.E2E_TEST_AWS_REGION }} | ||
| --account-id ${{ env.ACCOUNT_ID }} | ||
| --metric-namespace ${{ env.METRIC_NAMESPACE }} | ||
| --log-group ${{ env.LOG_GROUP_NAME }} | ||
| --platform-info ${{ env.CLUSTER_NAME }}-${{ env.TESTING_ID }} | ||
| --service-name ${{env.SAMPLE_APP_NAME }}-${{ env.TESTING_ID }} | ||
| --rollup' | ||
|
|
||
| - name: Refresh AWS Credentials | ||
| if: ${{ github.event.repository.name == 'aws-application-signals-test-framework' }} | ||
| uses: aws-actions/configure-aws-credentials@v4 | ||
| with: | ||
| role-to-assume: arn:aws:iam::${{ env.ACCOUNT_ID }}:role/${{ env.E2E_TEST_ROLE_NAME }} | ||
| aws-region: ${{ env.E2E_TEST_AWS_REGION }} | ||
|
|
||
| - name: Save test results | ||
| if: always() | ||
| id: validation-result | ||
| run: | | ||
| if [ "${{ steps.log-validation.outcome }}" = "success" ] && [ "${{ steps.metric-validation.outcome }}" = "success" ] && [ "${{ steps.trace-validation.outcome }}" = "success" ]; then | ||
| echo "validation-result=success" >> $GITHUB_OUTPUT | ||
| else | ||
| echo "validation-result=failure" >> $GITHUB_OUTPUT | ||
| fi | ||
|
|
||
| # Clean up Procedures | ||
|
|
||
| - name: Terraform destroy | ||
| if: always() | ||
| continue-on-error: true | ||
| timeout-minutes: 5 | ||
| working-directory: terraform/java/ecs | ||
| run: | | ||
| terraform destroy -auto-approve \ | ||
| -var="test_id=${{ env.TESTING_ID }}" \ | ||
| -var="aws_region=${{ env.E2E_TEST_AWS_REGION }}" \ | ||
| -var="ecs_cluster_name=${{ env.CLUSTER_NAME }}-${{ env.TESTING_ID }}" \ | ||
| -var="sample_app_name=${{ env.SAMPLE_APP_NAME }}-${{ env.TESTING_ID }}" \ | ||
| -var="sample_app_image=${{ env.MAIN_SAMPLE_APP_IMAGE_URI }}" \ | ||
| -var="sample_remote_app_image=${{ env.REMOTE_SAMPLE_APP_IMAGE_URI }}" \ | ||
| -var="adot_instrumentation_image=${{ env.ADOT_INSTRUMENTATION_IMAGE_URI }}" \ | ||
| -var="cwagent_image=${{ env.CWAGENT_IMAGE_URI }}" |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,27 @@ | ||
| ## Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. | ||
| ## SPDX-License-Identifier: Apache-2.0 | ||
|
|
||
| ## This workflow aims to run the Application Signals Python end-to-end tests as a canary to | ||
| ## test the artifacts for Application Signals enablement. It will deploy a sample app onto an ECS cluster, | ||
| ## call the APIs, and validate the generated telemetry, including logs, metrics, and traces. | ||
| name: Python ECS Enablement Canary Testing | ||
| on: | ||
| schedule: | ||
| - cron: '*/15 * * * *' # run the workflow every 15 minutes | ||
| workflow_dispatch: # be able to run the workflow on demand | ||
|
|
||
| permissions: | ||
| id-token: write | ||
| contents: read | ||
|
|
||
| jobs: | ||
| ecs: | ||
| strategy: | ||
| fail-fast: false | ||
| matrix: | ||
| aws-region: ['us-east-1'] | ||
| uses: ./.github/workflows/python-ecs-retry.yml | ||
| secrets: inherit | ||
| with: | ||
| aws-region: ${{ matrix.aws-region }} | ||
| caller-workflow-name: 'appsignals-e2e-python-ecs-canary-test' |
Oops, something went wrong.
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Uh oh!
There was an error while loading. Please reload this page.