@@ -18,7 +18,6 @@ package e2e
1818
1919import (
2020 "context"
21- "encoding/json"
2221 "flag"
2322 "fmt"
2423 "log"
@@ -42,7 +41,6 @@ import (
4241 "sigs.k8s.io/blob-csi-driver/pkg/util"
4342 "sigs.k8s.io/blob-csi-driver/test/utils/azure"
4443 "sigs.k8s.io/blob-csi-driver/test/utils/credentials"
45- "sigs.k8s.io/blob-csi-driver/test/utils/testutil"
4644)
4745
4846const (
@@ -82,24 +80,11 @@ func TestE2E(t *testing.T) {
8280var _ = ginkgo .SynchronizedBeforeSuite (func (ctx ginkgo.SpecContext ) []byte {
8381 creds , err := credentials .CreateAzureCredentialFile ()
8482 gomega .Expect (err ).NotTo (gomega .HaveOccurred ())
85- azureClient , err := azure .GetClient (creds .Cloud , creds .SubscriptionID , creds .AADClientID , creds .TenantID , creds .AADClientSecret )
83+ azureClient , err := azure .GetClient (creds .Cloud , creds .SubscriptionID , creds .AADClientID , creds .TenantID , creds .AADClientSecret , creds . AADFederatedTokenFile )
8684 gomega .Expect (err ).NotTo (gomega .HaveOccurred ())
8785 _ , err = azureClient .EnsureResourceGroup (ctx , creds .ResourceGroup , creds .Location , nil )
8886 gomega .Expect (err ).NotTo (gomega .HaveOccurred ())
8987
90- if testutil .IsRunningInProw () {
91- // Need to login to ACR using SP credential if we are running in Prow so we can push test images.
92- // If running locally, user should run 'docker login' before running E2E tests
93- registry := os .Getenv ("REGISTRY" )
94- gomega .Expect (registry ).NotTo (gomega .Equal ("" ))
95-
96- log .Println ("Attempting docker login with Azure service principal" )
97- cmd := exec .Command ("docker" , "login" , fmt .Sprintf ("--username=%s" , creds .AADClientID ), fmt .Sprintf ("--password=%s" , creds .AADClientSecret ), registry )
98- err = cmd .Run ()
99- gomega .Expect (err ).NotTo (gomega .HaveOccurred ())
100- log .Println ("docker login is successful" )
101- }
102-
10388 // Install Azure Blob Storage CSI driver on cluster from project root
10489 e2eBootstrap := testCmd {
10590 command : "make" ,
@@ -115,25 +100,8 @@ var _ = ginkgo.SynchronizedBeforeSuite(func(ctx ginkgo.SpecContext) []byte {
115100 endLog : "metrics service created" ,
116101 }
117102 execTestCmd ([]testCmd {e2eBootstrap , createMetricsSVC })
118-
119- if testutil .IsRunningInProw () {
120- data , err := json .Marshal (creds )
121- gomega .Expect (err ).NotTo (gomega .HaveOccurred ())
122- return data
123- }
124-
125103 return nil
126104}, func (ctx ginkgo.SpecContext , data []byte ) {
127- if testutil .IsRunningInProw () {
128- creds := & credentials.Credentials {}
129- err := json .Unmarshal (data , creds )
130- gomega .Expect (err ).NotTo (gomega .HaveOccurred ())
131- // set env for azidentity.EnvironmentCredential
132- os .Setenv ("AZURE_TENANT_ID" , creds .TenantID )
133- os .Setenv ("AZURE_CLIENT_ID" , creds .AADClientID )
134- os .Setenv ("AZURE_CLIENT_SECRET" , creds .AADClientSecret )
135- }
136-
137105 // k8s.io/kubernetes/test/e2e/framework requires env KUBECONFIG to be set
138106 // it does not fall back to defaults
139107 if os .Getenv (kubeconfigEnvVar ) == "" {
@@ -226,7 +194,7 @@ func execTestCmd(cmds []testCmd) {
226194func checkAccountCreationLeak (ctx context.Context ) {
227195 creds , err := credentials .CreateAzureCredentialFile ()
228196 gomega .Expect (err ).NotTo (gomega .HaveOccurred ())
229- azureClient , err := azure .GetClient (creds .Cloud , creds .SubscriptionID , creds .AADClientID , creds .TenantID , creds .AADClientSecret )
197+ azureClient , err := azure .GetClient (creds .Cloud , creds .SubscriptionID , creds .AADClientID , creds .TenantID , creds .AADClientSecret , creds . AADFederatedTokenFile )
230198 gomega .Expect (err ).NotTo (gomega .HaveOccurred ())
231199
232200 accountNum , err := azureClient .GetAccountNumByResourceGroup (ctx , creds .ResourceGroup )
0 commit comments