| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126 |
- # Run secret-dependent e2e tests only after /ok-to-test approval
- on:
- pull_request:
- repository_dispatch:
- types: [ok-to-test-command]
- permissions:
- contents: read
- name: e2e tests
- env:
- # Common versions
- GO_VERSION: '1.24'
- GINKGO_VERSION: 'v2.8.0'
- DOCKER_BUILDX_VERSION: 'v0.4.2'
- KIND_VERSION: 'v0.30.0'
- KIND_IMAGE: 'kindest/node:v1.33.4'
- # Common users. We can't run a step 'if secrets.GHCR_USERNAME != ""' but we can run
- # a step 'if env.GHCR_USERNAME' != ""', so we copy these to succinctly test whether
- # credentials have been provided before trying to run steps that need them.
- TARGET_SHA: ${{ github.event.client_payload.slash_command.args.named.sha }}
- GHCR_USERNAME: ${{ github.actor }}
- GCP_SM_SA_JSON: ${{ secrets.GCP_SM_SA_JSON}}
- GCP_GKE_ZONE: ${{ secrets.GCP_GKE_ZONE}}
- GCP_GSA_NAME: ${{ secrets.GCP_GSA_NAME}} # Goolge Service Account
- GCP_KSA_NAME: ${{ secrets.GCP_KSA_NAME}} # Kubernetes Service Account
- GCP_PROJECT_ID: ${{ secrets.GCP_PROJECT_ID}}
- AWS_REGION: "eu-central-1"
- AWS_OIDC_ROLE_ARN: ${{ secrets.AWS_OIDC_ROLE_ARN }}
- AWS_SA_NAME: ${{ secrets.AWS_SA_NAME }}
- AWS_SA_NAMESPACE: ${{ secrets.AWS_SA_NAMESPACE }}
- TFC_AZURE_CLIENT_ID: ${{ secrets.TFC_AZURE_CLIENT_ID}}
- TFC_AZURE_CLIENT_SECRET: ${{ secrets.TFC_AZURE_CLIENT_SECRET }}
- TFC_AZURE_TENANT_ID: ${{ secrets.TFC_AZURE_TENANT_ID}}
- TFC_AZURE_SUBSCRIPTION_ID: ${{ secrets.TFC_AZURE_SUBSCRIPTION_ID }}
- TFC_VAULT_URL: ${{ secrets.TFC_VAULT_URL}}
- SCALEWAY_API_URL: ${{ secrets.SCALEWAY_API_URL }}
- SCALEWAY_REGION: ${{ secrets.SCALEWAY_REGION }}
- SCALEWAY_PROJECT_ID: ${{ secrets.SCALEWAY_PROJECT_ID }}
- SCALEWAY_ACCESS_KEY: ${{ secrets.SCALEWAY_ACCESS_KEY }}
- SCALEWAY_SECRET_KEY: ${{ secrets.SCALEWAY_SECRET_KEY }}
- DELINEA_TLD: ${{ secrets.DELINEA_TLD }}
- DELINEA_URL_TEMPLATE: ${{ secrets.DELINEA_URL_TEMPLATE }}
- DELINEA_TENANT: ${{ secrets.DELINEA_TENANT }}
- DELINEA_CLIENT_ID: ${{ secrets.DELINEA_CLIENT_ID }}
- DELINEA_CLIENT_SECRET: ${{ secrets.DELINEA_CLIENT_SECRET }}
- SECRETSERVER_USERNAME: ${{ secrets.SECRETSERVER_USERNAME }}
- SECRETSERVER_PASSWORD: ${{ secrets.SECRETSERVER_PASSWORD }}
- SECRETSERVER_URL: ${{ secrets.SECRETSERVER_URL }}
- GRAFANA_URL: ${{ secrets.GRAFANA_URL }}
- GRAFANA_TOKEN: ${{ secrets.GRAFANA_TOKEN }}
- jobs:
- integration-trusted:
- runs-on: ubuntu-latest
- permissions:
- id-token: write #for oidc auth with aws/gcp/azure
- contents: read #for checkout
- if: github.event_name == 'pull_request' && github.event.pull_request.head.repo.full_name == github.repository && github.actor !='dependabot[bot]'
- steps:
- - uses: step-security/harden-runner@ec9f2d5744a09debf3a187a3f4f675c53b671911 # v2.13.0
- with:
- egress-policy: audit
- - name: Branch based PR checkout
- uses: actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v5.0.0
- - name: Fetch History
- run: git fetch --prune --unshallow
- - uses: ./.github/actions/e2e
- # Repo owner has commented /ok-to-test on a (fork-based) pull request
- integration-fork:
- runs-on: ubuntu-latest
- permissions:
- id-token: write #for oidc auth with aws/gcp/azure
- contents: read #for checkout
- pull-requests: write # to publish the status as comments
- if: github.event_name == 'repository_dispatch'
- steps:
- - uses: step-security/harden-runner@ec9f2d5744a09debf3a187a3f4f675c53b671911 # v2.13.0
- with:
- egress-policy: audit
- # Check out merge commit
- - name: Fork based /ok-to-test checkout
- uses: actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v5.0.0
- with:
- ref: '${{ env.TARGET_SHA }}'
- - name: Fetch History
- run: git fetch --prune --unshallow
- - id: e2e
- uses: ./.github/actions/e2e
- - id: create_token
- if: always()
- uses: actions/create-github-app-token@67018539274d69449ef7c02e8e71183d1719ab42 # v2.1.4
- with:
- app-id: ${{ secrets.APP_ID }}
- private-key: ${{ secrets.PRIVATE_KEY }}
- owner: ${{ github.repository_owner }}
- - name: Update on Succeess
- if: always() && steps.e2e.conclusion == 'success'
- uses: peter-evans/create-or-update-comment@71345be0265236311c031f5c7866368bd1eff043 # v4.0.0
- with:
- token: ${{ steps.create_token.outputs.token }}
- issue-number: ${{ github.event.client_payload.pull_request.number }}
- body: |
- [Bot] - :white_check_mark: [e2e for ${{ env.TARGET_SHA }} passed](https://github.com/external-secrets/external-secrets/actions/runs/${{ github.run_id }})
- - name: Update on Failure
- if: always() && steps.e2e.conclusion != 'success'
- uses: peter-evans/create-or-update-comment@71345be0265236311c031f5c7866368bd1eff043 # v4.0.0
- with:
- token: ${{ steps.create_token.outputs.token }}
- issue-number: ${{ github.event.client_payload.pull_request.number }}
- body: |
- [Bot] - :x: [e2e for ${{ env.TARGET_SHA }} failed](https://github.com/external-secrets/external-secrets/actions/runs/${{ github.run_id }})
|