1818 gcp-service-account-key :
1919 description : The GCP service account key to use.
2020 required : true
21- azure-client-id :
22- description : The Azure client ID to use.
23- required : true
24- azure-client-secret :
25- description : The Azure client secret to use.
26- required : true
27- azure-subscription-id :
28- description : The Azure subscription to use.
29- required : true
30- azure-tenant-id :
31- description : The Azure tenant ID to use.
32- required : true
3321 inputs :
3422 image_name :
3523 description : The image repository and name to use.
@@ -53,19 +41,10 @@ jobs:
5341 permissions :
5442 packages : read
5543 outputs :
56- aks-cluster-name : ${{ steps.aks-cluster-name.outputs.stdout }}
57- aks-cluster-resource-group : ${{ steps.aks-cluster-resource-group.outputs.stdout }}
5844 aws-opensearch-endpoint : ${{ steps.aws-opensearch-endpoint.outputs.stdout }}
5945 gke-cluster-name : ${{ steps.gke-cluster-name.outputs.stdout }}
6046 gke-cluster-region : ${{ steps.gke-cluster-region.outputs.stdout }}
6147 gke-cluster-zone : ${{ steps.gke-cluster-zone.outputs.stdout }}
62- env :
63- # https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/guides/service_principal_client_secret
64- # Note these have to be set in the Terraform Cloud workspace as well
65- ARM_CLIENT_ID : ${{ secrets.azure-client-id }}
66- ARM_CLIENT_SECRET : ${{ secrets.azure-client-secret }}
67- ARM_SUBSCRIPTION_ID : ${{ secrets.azure-subscription-id }}
68- ARM_TENANT_ID : ${{ secrets.azure-tenant-id }}
6948 steps :
7049 - uses : actions/checkout@v3
7150 with :
9170 sed -i -e "s|\$OPENSEARCH_AWS_SECRET_KEY|${{ secrets.opensearch_aws_secret_key }}|g" default.auto.tfvars
9271 sed -i -e "s|\$OPENSEARCH_ADMIN_PASSWORD|${{ secrets.opensearch_admin_password }}|g" default.auto.tfvars
9372
94- sed -i -e "s|\$AZURE_CLIENT_ID|${{ secrets.azure-client-id }}|g" default.auto.tfvars
95- sed -i -e "s|\$AZURE_CLIENT_SECRET|${{ secrets.azure-client-secret }}|g" default.auto.tfvars
96- sed -i -e "s|\$AZURE_SUBSCRIPTION_ID|${{ secrets.azure-subscription-id }}|g" default.auto.tfvars
97- sed -i -e "s|\$AZURE_TENANT_ID|${{ secrets.azure-tenant-id }}|g" default.auto.tfvars
98-
9973 cat <<EOT >> default.auto.tfvars
10074 gcp_sa_key = <<-EOF
10175 ${{ secrets.gcp-service-account-key }}
@@ -184,16 +158,6 @@ jobs:
184158 working-directory : terraform
185159 shell : bash
186160
187- - id : aks-cluster-name
188- run : terraform output -no-color -raw aks_cluster_name
189- working-directory : terraform
190- shell : bash
191-
192- - id : aks-cluster-resource-group
193- run : terraform output -no-color -raw aks_resource_group
194- working-directory : terraform
195- shell : bash
196-
197161 call-run-integration-kind :
198162 name : Run integration tests on KIND
199163 needs :
@@ -266,7 +230,6 @@ jobs:
266230 fail-fast : false
267231 matrix :
268232 cloud :
269- - aks
270233 - gke
271234 env :
272235 USE_GKE_GCLOUD_AUTH_PLUGIN : true
@@ -306,20 +269,6 @@ jobs:
306269 cluster_name : ${{ needs.call-run-terraform-setup.outputs.gke-cluster-name }}
307270 location : ${{ needs.call-run-terraform-setup.outputs.gke-cluster-zone }}
308271
309- - name : Get the AKS Kubeconfig
310- if : matrix.cloud == 'aks'
311- run : |
312- az login --username="$ARM_CLIENT_ID" --password="$ARM_CLIENT_SECRET" --tenant="$ARM_TENANT_ID" --service-principal
313- az aks get-credentials --name "$AKS_CLUSTER_NAME" --resource-group "$AKS_CLUSTER_RG" --admin
314- shell : bash
315- env :
316- AKS_CLUSTER_NAME : ${{ needs.call-run-terraform-setup.outputs.aks-cluster-name }}
317- AKS_CLUSTER_RG : ${{ needs.call-run-terraform-setup.outputs.aks-cluster-resource-group }}
318- ARM_CLIENT_ID : ${{ secrets.azure-client-id }}
319- ARM_CLIENT_SECRET : ${{ secrets.azure-client-secret }}
320- ARM_SUBSCRIPTION_ID : ${{ secrets.azure-subscription-id }}
321- ARM_TENANT_ID : ${{ secrets.azure-tenant-id }}
322-
323272 - name : Check Kubeconfig set up
324273 run : |
325274 kubectl cluster-info
0 commit comments