Skip to content

UID2-6321 Add AKS related e2e test steps back#201

Open
cYKatherine wants to merge 23 commits intomainfrom
kcc-UID2-6321-reenable-aks-e2e
Open

UID2-6321 Add AKS related e2e test steps back#201
cYKatherine wants to merge 23 commits intomainfrom
kcc-UID2-6321-reenable-aks-e2e

Conversation

@cYKatherine
Copy link
Contributor

@cYKatherine cYKatherine commented Feb 17, 2026

Since there are many changes, here's a summary of what's different from the previous behavior:

  1. Previously, tests ran on a long-lived AKS cluster. The pipeline now creates a new cluster for each run to ensure all nodes are up to date.
  2. Previously the long-lived AKS cluster was set up on "Production - GitOps / AWX Managed" subscription, I now moved the cluster to "Pre-Production - Testing Only" subscription
  3. Added GitHub run ID as a suffix to all AKS resource names to enable parallel runs without conflicts
  4. Extracted AKS environment variables to aks_env.sh for consistent naming across all scripts.
  5. Added integ and prod operator keys to GitHub Actions secrets. These are now passed into the pipeline and stored in Key Vault during cluster creation.
  6. Refined the AKS cluster deletion step to ensure the cluster is properly deleted whenever the pipeline fails.
  7. Updated shared action workflows/actions to use ${{ github.action_path }} relative paths, avoiding reference errors when the action is called from different branches.
  8. Granted Contributor, User Access Administrator and Key Vault Secrets Officer role to the github-uid service principal (dae96aa9-b4fb-473e-ae51-b817a571bfec)

@cYKatherine cYKatherine self-assigned this Feb 17, 2026
@cYKatherine cYKatherine force-pushed the kcc-UID2-6321-reenable-aks-e2e branch from 2911ae0 to 44f4a1c Compare February 18, 2026 00:28
@cYKatherine cYKatherine force-pushed the kcc-UID2-6321-reenable-aks-e2e branch from a5b5f61 to f9a1b00 Compare February 18, 2026 02:30
@cYKatherine cYKatherine force-pushed the kcc-UID2-6321-reenable-aks-e2e branch from 81ad624 to 79ed936 Compare February 18, 2026 02:47
uses: actions/checkout@v4
with:
ref: v3
ref: kcc-UID2-6321-reenable-aks-e2e
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Revert this to v3 before merging

uses: actions/checkout@v4
with:
ref: v3
ref: kcc-UID2-6321-reenable-aks-e2e
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Revert this to v3 before merging

- name: Start AKS cluster
id: start_aks_cluster
if: ${{ inputs.operator_type == 'aks' }}
uses: IABTechLab/uid2-shared-actions/actions/start_aks_cluster@kcc-UID2-6321-reenable-aks-e2e
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

will need to change here to version name as well

Copy link
Contributor

@lizk886 lizk886 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM

E2E_EUID_PROD_AWS_OPERATOR_API_KEY: ${{ secrets.E2E_EUID_PROD_AWS_OPERATOR_API_KEY }}

E2E_UID2_INTEG_AKS_OPERATOR_KEY: ${{ secrets.E2E_UID2_INTEG_AKS_OPERATOR_KEY }}
E2E_UID2_PROD_AKS_OPERATOR_KEY: ${{ secrets.E2E_UID2_PROD_AKS_OPERATOR_KEY }}
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

It's good practice to limit secrets to only the steps that require them.

E2E_EUID_PROD_AWS_ARGS_JSON: ${{ secrets.E2E_EUID_PROD_AWS_ARGS_JSON }}
E2E_EUID_PROD_AWS_OPERATOR_API_KEY: ${{ secrets.E2E_EUID_PROD_AWS_OPERATOR_API_KEY }}

E2E_UID2_INTEG_AKS_OPERATOR_KEY: ${{ secrets.E2E_UID2_INTEG_AKS_OPERATOR_KEY }}
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This workflow can only be called with for a single combination of operator type, identity scope, and environment.

Why don't we just have the caller pass in the operator key and secret for that specific combination instead of having all these secrets and making the workflow pick the appropriate one (get_operator_key.sh)?

RUN_ID: ${{ inputs.run_id }}
run: |
bash uid2-shared-actions/scripts/aks/prepare_aks_artifacts.sh
bash ${{ github.action_path }}/../../scripts/aks/prepare_aks_artifacts.sh
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Why this change?

Co-authored-by: Cursor <cursoragent@cursor.com>
@cYKatherine cYKatherine force-pushed the kcc-UID2-6321-reenable-aks-e2e branch from 7cfa322 to f92beaf Compare February 24, 2026 05:28
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants