mirror of
https://github.com/edgelesssys/constellation.git
synced 2024-10-01 01:36:09 -04:00
ci: fix service accounts introduced by merge (#2652)
* Fix service accounts introduced my merge * Remove GCP_E2E_PROJECT placeholders --------- Signed-off-by: Daniel Weiße <dw@edgeless.systems>
This commit is contained in:
parent
45f6eec0d0
commit
43f47cc5c5
4
.github/workflows/e2e-test-daily.yml
vendored
4
.github/workflows/e2e-test-daily.yml
vendored
@ -74,7 +74,7 @@ jobs:
|
|||||||
isDebugImage: ${{ matrix.refStream == 'ref/main/stream/debug/?' }}
|
isDebugImage: ${{ matrix.refStream == 'ref/main/stream/debug/?' }}
|
||||||
cliVersion: ${{ matrix.refStream == 'ref/release/stream/stable/?' && needs.find-latest-image.outputs.image-release-stable || '' }}
|
cliVersion: ${{ matrix.refStream == 'ref/release/stream/stable/?' && needs.find-latest-image.outputs.image-release-stable || '' }}
|
||||||
refStream: ${{ matrix.refStream }}
|
refStream: ${{ matrix.refStream }}
|
||||||
gcpProject: constellation-e2e # ${{ secrets.GCP_E2E_PROJECT }}
|
gcpProject: constellation-e2e
|
||||||
gcpClusterCreateServiceAccount: "infrastructure-e2e@constellation-e2e.iam.gserviceaccount.com"
|
gcpClusterCreateServiceAccount: "infrastructure-e2e@constellation-e2e.iam.gserviceaccount.com"
|
||||||
gcpIAMCreateServiceAccount: "iam-e2e@constellation-e2e.iam.gserviceaccount.com"
|
gcpIAMCreateServiceAccount: "iam-e2e@constellation-e2e.iam.gserviceaccount.com"
|
||||||
kubernetesVersion: ${{ matrix.kubernetesVersion }}
|
kubernetesVersion: ${{ matrix.kubernetesVersion }}
|
||||||
@ -100,7 +100,7 @@ jobs:
|
|||||||
selfManagedInfra: "false"
|
selfManagedInfra: "false"
|
||||||
cloudProvider: ${{ matrix.provider }}
|
cloudProvider: ${{ matrix.provider }}
|
||||||
azureClusterDeleteCredentials: ${{ secrets.AZURE_E2E_CLUSTER_CREDENTIALS }}
|
azureClusterDeleteCredentials: ${{ secrets.AZURE_E2E_CLUSTER_CREDENTIALS }}
|
||||||
gcpClusterDeleteServiceAccount: "constellation-e2e-cluster@constellation-331613.iam.gserviceaccount.com"
|
gcpClusterDeleteServiceAccount: "infrastructure-e2e@constellation-e2e.iam.gserviceaccount.com"
|
||||||
|
|
||||||
- name: Always delete IAM configuration
|
- name: Always delete IAM configuration
|
||||||
if: always()
|
if: always()
|
||||||
|
4
.github/workflows/e2e-test-release.yml
vendored
4
.github/workflows/e2e-test-release.yml
vendored
@ -226,7 +226,7 @@ jobs:
|
|||||||
awsOpenSearchDomain: ${{ secrets.AWS_OPENSEARCH_DOMAIN }}
|
awsOpenSearchDomain: ${{ secrets.AWS_OPENSEARCH_DOMAIN }}
|
||||||
awsOpenSearchUsers: ${{ secrets.AWS_OPENSEARCH_USER }}
|
awsOpenSearchUsers: ${{ secrets.AWS_OPENSEARCH_USER }}
|
||||||
awsOpenSearchPwd: ${{ secrets.AWS_OPENSEARCH_PWD }}
|
awsOpenSearchPwd: ${{ secrets.AWS_OPENSEARCH_PWD }}
|
||||||
gcpProject: constellation-e2e # ${{ secrets.GCP_E2E_PROJECT }}
|
gcpProject: constellation-e2e
|
||||||
gcpClusterCreateServiceAccount: "infrastructure-e2e@constellation-e2e.iam.gserviceaccount.com"
|
gcpClusterCreateServiceAccount: "infrastructure-e2e@constellation-e2e.iam.gserviceaccount.com"
|
||||||
gcpIAMCreateServiceAccount: "iam-e2e@constellation-e2e.iam.gserviceaccount.com"
|
gcpIAMCreateServiceAccount: "iam-e2e@constellation-e2e.iam.gserviceaccount.com"
|
||||||
test: ${{ matrix.test }}
|
test: ${{ matrix.test }}
|
||||||
@ -249,7 +249,7 @@ jobs:
|
|||||||
selfManagedInfra: ${{ matrix.selfManagedInfra == 'true' }}
|
selfManagedInfra: ${{ matrix.selfManagedInfra == 'true' }}
|
||||||
cloudProvider: ${{ matrix.provider }}
|
cloudProvider: ${{ matrix.provider }}
|
||||||
azureClusterDeleteCredentials: ${{ secrets.AZURE_E2E_CLUSTER_CREDENTIALS }}
|
azureClusterDeleteCredentials: ${{ secrets.AZURE_E2E_CLUSTER_CREDENTIALS }}
|
||||||
gcpClusterDeleteServiceAccount: "constellation-e2e-cluster@constellation-331613.iam.gserviceaccount.com"
|
gcpClusterDeleteServiceAccount: "infrastructure-e2e@constellation-e2e.iam.gserviceaccount.com"
|
||||||
|
|
||||||
- name: Always delete IAM configuration
|
- name: Always delete IAM configuration
|
||||||
if: always()
|
if: always()
|
||||||
|
1
.github/workflows/e2e-test-tf-module.yml
vendored
1
.github/workflows/e2e-test-tf-module.yml
vendored
@ -159,7 +159,6 @@ jobs:
|
|||||||
run: |
|
run: |
|
||||||
cat > terraform.tfvars <<EOF
|
cat > terraform.tfvars <<EOF
|
||||||
name = "${{ steps.create-prefix.outputs.prefix }}"
|
name = "${{ steps.create-prefix.outputs.prefix }}"
|
||||||
# project = "${{ secrets.GCP_E2E_PROJECT }}"
|
|
||||||
project = "constellation-e2e"
|
project = "constellation-e2e"
|
||||||
service_account_id = "${{ steps.create-prefix.outputs.prefix }}-sa"
|
service_account_id = "${{ steps.create-prefix.outputs.prefix }}-sa"
|
||||||
image = "${{ steps.find-latest-image.outputs.image }}"
|
image = "${{ steps.find-latest-image.outputs.image }}"
|
||||||
|
4
.github/workflows/e2e-test-weekly.yml
vendored
4
.github/workflows/e2e-test-weekly.yml
vendored
@ -243,7 +243,7 @@ jobs:
|
|||||||
awsOpenSearchDomain: ${{ secrets.AWS_OPENSEARCH_DOMAIN }}
|
awsOpenSearchDomain: ${{ secrets.AWS_OPENSEARCH_DOMAIN }}
|
||||||
awsOpenSearchUsers: ${{ secrets.AWS_OPENSEARCH_USER }}
|
awsOpenSearchUsers: ${{ secrets.AWS_OPENSEARCH_USER }}
|
||||||
awsOpenSearchPwd: ${{ secrets.AWS_OPENSEARCH_PWD }}
|
awsOpenSearchPwd: ${{ secrets.AWS_OPENSEARCH_PWD }}
|
||||||
gcpProject: constellation-e2e # ${{ secrets.GCP_E2E_PROJECT }}
|
gcpProject: constellation-e2e
|
||||||
gcpClusterCreateServiceAccount: "infrastructure-e2e@constellation-e2e.iam.gserviceaccount.com"
|
gcpClusterCreateServiceAccount: "infrastructure-e2e@constellation-e2e.iam.gserviceaccount.com"
|
||||||
gcpIAMCreateServiceAccount: "iam-e2e@constellation-e2e.iam.gserviceaccount.com"
|
gcpIAMCreateServiceAccount: "iam-e2e@constellation-e2e.iam.gserviceaccount.com"
|
||||||
test: ${{ matrix.test }}
|
test: ${{ matrix.test }}
|
||||||
@ -268,7 +268,7 @@ jobs:
|
|||||||
selfManagedInfra: ${{ matrix.selfManagedInfra == 'true' }}
|
selfManagedInfra: ${{ matrix.selfManagedInfra == 'true' }}
|
||||||
cloudProvider: ${{ matrix.provider }}
|
cloudProvider: ${{ matrix.provider }}
|
||||||
azureClusterDeleteCredentials: ${{ secrets.AZURE_E2E_CLUSTER_CREDENTIALS }}
|
azureClusterDeleteCredentials: ${{ secrets.AZURE_E2E_CLUSTER_CREDENTIALS }}
|
||||||
gcpClusterDeleteServiceAccount: "constellation-e2e-cluster@constellation-331613.iam.gserviceaccount.com"
|
gcpClusterDeleteServiceAccount: "infrastructure-e2e@constellation-e2e.iam.gserviceaccount.com"
|
||||||
|
|
||||||
- name: Always delete IAM configuration
|
- name: Always delete IAM configuration
|
||||||
if: always()
|
if: always()
|
||||||
|
4
.github/workflows/e2e-test.yml
vendored
4
.github/workflows/e2e-test.yml
vendored
@ -215,7 +215,7 @@ jobs:
|
|||||||
cloudProvider: ${{ inputs.cloudProvider }}
|
cloudProvider: ${{ inputs.cloudProvider }}
|
||||||
machineType: ${{ inputs.machineType }}
|
machineType: ${{ inputs.machineType }}
|
||||||
regionZone: ${{ inputs.regionZone }}
|
regionZone: ${{ inputs.regionZone }}
|
||||||
gcpProject: constellation-e2e # ${{ secrets.GCP_E2E_PROJECT }}
|
gcpProject: constellation-e2e
|
||||||
gcpClusterCreateServiceAccount: "infrastructure-e2e@constellation-e2e.iam.gserviceaccount.com"
|
gcpClusterCreateServiceAccount: "infrastructure-e2e@constellation-e2e.iam.gserviceaccount.com"
|
||||||
gcpIAMCreateServiceAccount: "iam-e2e@constellation-e2e.iam.gserviceaccount.com"
|
gcpIAMCreateServiceAccount: "iam-e2e@constellation-e2e.iam.gserviceaccount.com"
|
||||||
test: ${{ inputs.test }}
|
test: ${{ inputs.test }}
|
||||||
@ -247,7 +247,7 @@ jobs:
|
|||||||
selfManagedInfra: ${{ inputs.selfManagedInfra }}
|
selfManagedInfra: ${{ inputs.selfManagedInfra }}
|
||||||
cloudProvider: ${{ inputs.cloudProvider }}
|
cloudProvider: ${{ inputs.cloudProvider }}
|
||||||
azureClusterDeleteCredentials: ${{ secrets.AZURE_E2E_CLUSTER_CREDENTIALS }}
|
azureClusterDeleteCredentials: ${{ secrets.AZURE_E2E_CLUSTER_CREDENTIALS }}
|
||||||
gcpClusterDeleteServiceAccount: "constellation-e2e-cluster@constellation-331613.iam.gserviceaccount.com"
|
gcpClusterDeleteServiceAccount: "infrastructure-e2e@constellation-e2e.iam.gserviceaccount.com"
|
||||||
|
|
||||||
- name: Always delete IAM configuration
|
- name: Always delete IAM configuration
|
||||||
if: always()
|
if: always()
|
||||||
|
4
.github/workflows/e2e-upgrade.yml
vendored
4
.github/workflows/e2e-upgrade.yml
vendored
@ -170,7 +170,7 @@ jobs:
|
|||||||
isDebugImage: "false"
|
isDebugImage: "false"
|
||||||
cliVersion: ${{ inputs.fromVersion }}
|
cliVersion: ${{ inputs.fromVersion }}
|
||||||
regionZone: ${{ inputs.regionZone }}
|
regionZone: ${{ inputs.regionZone }}
|
||||||
gcpProject: constellation-e2e # ${{ secrets.GCP_E2E_PROJECT }}
|
gcpProject: constellation-e2e
|
||||||
gcpClusterCreateServiceAccount: "infrastructure-e2e@constellation-e2e.iam.gserviceaccount.com"
|
gcpClusterCreateServiceAccount: "infrastructure-e2e@constellation-e2e.iam.gserviceaccount.com"
|
||||||
gcpIAMCreateServiceAccount: "iam-e2e@constellation-e2e.iam.gserviceaccount.com"
|
gcpIAMCreateServiceAccount: "iam-e2e@constellation-e2e.iam.gserviceaccount.com"
|
||||||
test: "upgrade"
|
test: "upgrade"
|
||||||
@ -291,7 +291,7 @@ jobs:
|
|||||||
selfManagedInfra: "false"
|
selfManagedInfra: "false"
|
||||||
cloudProvider: ${{ inputs.cloudProvider }}
|
cloudProvider: ${{ inputs.cloudProvider }}
|
||||||
azureClusterDeleteCredentials: ${{ secrets.AZURE_E2E_CLUSTER_CREDENTIALS }}
|
azureClusterDeleteCredentials: ${{ secrets.AZURE_E2E_CLUSTER_CREDENTIALS }}
|
||||||
gcpClusterDeleteServiceAccount: "constellation-e2e-cluster@constellation-331613.iam.gserviceaccount.com"
|
gcpClusterDeleteServiceAccount: "infrastructure-e2e@constellation-e2e.iam.gserviceaccount.com"
|
||||||
|
|
||||||
- name: Always delete IAM configuration
|
- name: Always delete IAM configuration
|
||||||
if: always()
|
if: always()
|
||||||
|
Loading…
Reference in New Issue
Block a user