|
22 | 22 | required: false |
23 | 23 | type: string |
24 | 24 | # Fleet `AC-FC E2E tests (k8s)` on staging using FC's `Test Automation` account. |
25 | | - default: "MTIyMTA0NzV8TkdFUHxGTEVFVHwwMTliZTAzZC03MDYwLTcxMDctOTUwYS04YTFiODc3YjJiN2Q" |
| 25 | + default: "MTIyMTA0NzV8TkdFUHxGTEVFVHwwMTliZTAzZC03MDYwLTcxMDctOTUwYS04YTFiODc3Y\ |
| 26 | + jJiN2Q" |
| 27 | + push: |
| 28 | + branches: [ ci/fc-tests-with-running-ac ] |
26 | 29 | schedule: |
27 | 30 | # Scheduled to run at 5 a.m on every day-of-week from Monday through Friday. |
28 | 31 | - cron: "0 4 * * 1-5" |
|
41 | 44 |
|
42 | 45 | k8s-fleet-control-e2e: |
43 | 46 | name: K8s Fleet Control E2E |
44 | | - needs: [build-packages] |
| 47 | + needs: [ build-packages ] |
45 | 48 | runs-on: linux-4-core-nr-control |
46 | 49 | steps: |
47 | 50 | - name: Record job start time |
@@ -126,12 +129,15 @@ jobs: |
126 | 129 | LICENSE_KEY: ${{ secrets.AC_FLEET_CONTROL_STAG_E2E_LICENSE_KEY }} |
127 | 130 | # System identity for Fleet Control authentication |
128 | 131 | NR_SYSTEM_IDENTITY_CLIENT_ID: ${{ secrets.AC_FLEET_CONTROL_STAG_E2E_NR_SYSTEM_IDENTITY_CLIENT_ID }} |
129 | | - NR_SYSTEM_IDENTITY_PRIVATE_KEY: ${{ secrets.AC_FLEET_CONTROL_STAG_E2E_NR_SYSTEM_IDENTITY_PRIVATE_KEY }} |
| 132 | + NR_SYSTEM_IDENTITY_PRIVATE_KEY: ${{ |
| 133 | + secrets.AC_FLEET_CONTROL_STAG_E2E_NR_SYSTEM_IDENTITY_PRIVATE_KEY }} |
130 | 134 | # Tilt/deployment config |
131 | 135 | USE_LATEST_FLUX: false |
132 | 136 | ARCH: amd64 |
133 | 137 | # Use input fleet_id or fall back to default (for push triggers) |
134 | | - FLEET_ID: ${{ inputs.fleet_id || 'MTIyMTA0NzV8TkdFUHxGTEVFVHwwMTliZTAzZC03MDYwLTcxMDctOTUwYS04YTFiODc3YjJiN2Q' }} |
| 138 | + FLEET_ID: ${{ inputs.fleet_id || |
| 139 | + 'MTIyMTA0NzV8TkdFUHxGTEVFVHwwMTliZTAzZC03MDYwLTcxMDctOTUwYS04YTFiODc3YjJiN2Q' |
| 140 | + }} |
135 | 141 | run: | |
136 | 142 | # Create system identity secret |
137 | 143 | kubectl get secret sys-identity || kubectl create secret generic sys-identity \ |
@@ -162,7 +168,9 @@ jobs: |
162 | 168 |
|
163 | 169 | - name: Run Fleet Control E2E test |
164 | 170 | env: |
165 | | - FLEET_ID: ${{ inputs.fleet_id || 'MTIyMTA0NzV8TkdFUHxGTEVFVHwwMTliZTAzZC03MDYwLTcxMDctOTUwYS04YTFiODc3YjJiN2Q' }} |
| 171 | + FLEET_ID: ${{ inputs.fleet_id || |
| 172 | + 'MTIyMTA0NzV8TkdFUHxGTEVFVHwwMTliZTAzZC03MDYwLTcxMDctOTUwYS04YTFiODc3YjJiN2Q' |
| 173 | + }} |
166 | 174 | run: | |
167 | 175 | echo "🧪 Running Fleet Control E2E test for cluster: ${CLUSTER_NAME}" |
168 | 176 | ${{ github.workspace }}/target/debug/e2e-runner \ |
@@ -244,7 +252,8 @@ jobs: |
244 | 252 | if: always() |
245 | 253 | env: |
246 | 254 | SLACK_WEBHOOK_URL: ${{ secrets.AC_FLEET_COMMON_SLACK_WEBHOOK }} |
247 | | - RUN_URL: ${{ github.server_url }}/${{ github.repository }}/actions/runs/${{ github.run_id }} |
| 255 | + RUN_URL: ${{ github.server_url }}/${{ github.repository }}/actions/runs/${{ |
| 256 | + github.run_id }} |
248 | 257 | E2E_REPORT_TITLE: "K8s Fleet Control E2E Test with Running AC" |
249 | 258 | run: | |
250 | 259 | mkdir -p e2e-results |
|
0 commit comments