github.com/Azure/aad-pod-identity@v1.8.17/.pipelines/templates/soak-test.yml (about) 1 parameters: 2 - name: clusterConfigs 3 type: object 4 5 jobs: 6 - ${{ each clusterConfig in parameters.clusterConfigs }}: 7 - job: 8 displayName: ${{ format('soak/{0}', clusterConfig) }} 9 dependsOn: unit_test 10 timeoutInMinutes: 120 11 cancelTimeoutInMinutes: 5 12 workspace: 13 clean: all 14 variables: 15 - group: aad-pod-identity 16 - group: ${{ format('{0}', clusterConfig) }} 17 - name: CLUSTER_CONFIG 18 value: ${{ format('{0}', clusterConfig) }} 19 - name: IS_SOAK_TEST 20 value: "true" 21 steps: 22 - template: az-login.yml 23 24 - template: install-helm.yml 25 26 - ${{ if eq(clusterConfig, 'pi-aks-e2e-daily') }}: 27 - script: | 28 az aks get-credentials \ 29 --resource-group $(CLUSTER_CONFIG) \ 30 --name $(CLUSTER_CONFIG) 31 displayName: "Set KUBECONFIG" 32 33 - ${{ if not(eq(clusterConfig, 'pi-aks-e2e-daily')) }}: 34 - task: DownloadSecureFile@1 35 name: kubeconfig 36 inputs: 37 secureFile: ${{ format('{0}', clusterConfig) }} 38 displayName: "Download KUBECONFIG" 39 40 - script: | 41 export KUBECONFIG=$(kubeconfig.secureFilePath) 42 echo "##vso[task.setvariable variable=KUBECONFIG]${KUBECONFIG}" 43 displayName: "Set KUBECONFIG" 44 45 - script: | 46 kubectl wait --for=condition=ready node --all 47 kubectl wait pod -n kube-system --for=condition=Ready --all 48 kubectl get nodes -owide 49 kubectl cluster-info 50 displayName: "Check cluster's health" 51 52 - script: | 53 export REGISTRY="${REGISTRY:-$(REGISTRY_NAME).azurecr.io/k8s/aad-pod-identity}" 54 export MIC_VERSION="${IMAGE_VERSION}" 55 export NMI_VERSION="${IMAGE_VERSION}" 56 export IDENTITY_VALIDATOR_VERSION="${IMAGE_VERSION}" 57 make e2e 58 env: 59 # used by one of the test cases 60 SERVICE_PRINCIPAL_CLIENT_ID: $(SERVICE_PRINCIPAL_CLIENT_ID) 61 SERVICE_PRINCIPAL_CLIENT_SECRET: $(SERVICE_PRINCIPAL_CLIENT_SECRET) 62 displayName: "Run E2E tests"