Skip to content

Commit

Permalink
test: enable federated identity test profile
Browse files Browse the repository at this point in the history
Signed-off-by: Jack Francis <[email protected]>
  • Loading branch information
jackfrancis authored and k8s-infra-cherrypick-robot committed Jul 22, 2024
1 parent e37f822 commit 4bc08b9
Showing 1 changed file with 12 additions and 4 deletions.
16 changes: 12 additions & 4 deletions tests/e2e/utils/azure_auth.go
Original file line number Diff line number Diff line change
Expand Up @@ -27,12 +27,13 @@ import (
const (
TenantIDEnv = "AZURE_TENANT_ID"
SubscriptionEnv = "AZURE_SUBSCRIPTION_ID"
ServicePrincipleIDEnv = "AZURE_CLIENT_ID"
AADClientIDEnv = "AZURE_CLIENT_ID"
ServicePrincipleSecretEnv = "AZURE_CLIENT_SECRET" // #nosec G101
ClusterLocationEnv = "AZURE_LOCATION"
ClusterEnvironment = "AZURE_ENVIRONMENT"
LoadBalancerSkuEnv = "AZURE_LOADBALANCER_SKU"
managedIdentityClientID = "AZURE_MANAGED_IDENTITY_CLIENT_ID"
federatedTokenFile = "AZURE_FEDERATED_TOKEN_FILE"
managedIdentityType = "E2E_MANAGED_IDENTITY_TYPE"

userAssignedManagedIdentity = "userassigned"
Expand All @@ -46,13 +47,14 @@ func azureAuthConfigFromTestProfile() (*azclient.AzureAuthConfig, *azclient.ARMC
}

var azureAuthConfig azclient.AzureAuthConfig
servicePrincipleIDEnv := os.Getenv(ServicePrincipleIDEnv)
aadClientIDEnv := os.Getenv(AADClientIDEnv)
servicePrincipleSecretEnv := os.Getenv(ServicePrincipleSecretEnv)
managedIdentityTypeEnv := os.Getenv(managedIdentityType)
managedIdentityClientIDEnv := os.Getenv(managedIdentityClientID)
if servicePrincipleIDEnv != "" && servicePrincipleSecretEnv != "" {
federatedTokenFileEnv := os.Getenv(federatedTokenFile)
if aadClientIDEnv != "" && servicePrincipleSecretEnv != "" {
azureAuthConfig = azclient.AzureAuthConfig{
AADClientID: servicePrincipleIDEnv,
AADClientID: aadClientIDEnv,
AADClientSecret: servicePrincipleSecretEnv,
}
} else if managedIdentityTypeEnv != "" {
Expand All @@ -63,6 +65,12 @@ func azureAuthConfigFromTestProfile() (*azclient.AzureAuthConfig, *azclient.ARMC
azureAuthConfig.UserAssignedIdentityID = managedIdentityClientIDEnv

}
} else if federatedTokenFileEnv != "" {
azureAuthConfig = azclient.AzureAuthConfig{
AADFederatedTokenFile: federatedTokenFileEnv,
UseFederatedWorkloadIdentityExtension: true,
AADClientID: aadClientIDEnv,
}
} else {
return nil, nil, nil, fmt.Errorf("failed to get Azure auth config from environment")
}
Expand Down

0 comments on commit 4bc08b9

Please sign in to comment.