e2e-managed.yml 3.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103
  1. on:
  2. repository_dispatch:
  3. types: [ok-to-test-managed-command]
  4. permissions:
  5. id-token: write
  6. checks: write
  7. contents: read
  8. env:
  9. # Common versions
  10. GO_VERSION: '1.21'
  11. GINKGO_VERSION: 'v2.8.0'
  12. DOCKER_BUILDX_VERSION: 'v0.4.2'
  13. # Common users. We can't run a step 'if secrets.GHCR_USERNAME != ""' but we can run
  14. # a step 'if env.GHCR_USERNAME' != ""', so we copy these to succinctly test whether
  15. # credentials have been provided before trying to run steps that need them.
  16. GHCR_USERNAME: ${{ secrets.GHCR_USERNAME }}
  17. GCP_SM_SA_JSON: ${{ secrets.GCP_SM_SA_JSON}}
  18. GCP_PROJECT_ID: ${{ secrets.GCP_PROJECT_ID}}
  19. USE_GKE_GCLOUD_AUTH_PLUGIN: true
  20. TF_VAR_GCP_PROJECT_ID: ${{ secrets.GCP_PROJECT_ID}}
  21. GCP_SM_SA_GKE_JSON: ${{ secrets.GCP_SM_SA_GKE_JSON}}
  22. GCP_GKE_CLUSTER: test-cluster
  23. GCP_GKE_ZONE: ${{ secrets.GCP_GKE_ZONE}}
  24. GCP_GSA_NAME: ${{ secrets.GCP_GSA_NAME}} # Goolge Service Account
  25. GCP_KSA_NAME: ${{ secrets.GCP_KSA_NAME}} # Kubernetes Service Account
  26. TF_VAR_GCP_GSA_NAME: ${{ secrets.GCP_GSA_NAME}} # Goolge Service Account for tf
  27. TF_VAR_GCP_KSA_NAME: ${{ secrets.GCP_KSA_NAME}} # Kubernetes Service Account for tf
  28. AWS_OIDC_ROLE_ARN: ${{ secrets.AWS_OIDC_ROLE_ARN}}
  29. AWS_SA_NAME: ${{ secrets.AWS_SA_NAME }}
  30. AWS_SA_NAMESPACE: ${{ secrets.AWS_SA_NAMESPACE }}
  31. AWS_REGION: "eu-central-1"
  32. AWS_CLUSTER_NAME: "eso-e2e-managed"
  33. TF_VAR_AWS_SA_NAME: ${{ secrets.AWS_SA_NAME }}
  34. TF_VAR_AWS_SA_NAMESPACE: ${{ secrets.AWS_SA_NAMESPACE }}
  35. TF_VAR_AWS_REGION: "eu-central-1"
  36. TF_VAR_AWS_CLUSTER_NAME: "eso-e2e-managed"
  37. TFC_AZURE_CLIENT_ID: ${{ secrets.TFC_AZURE_CLIENT_ID}}
  38. TFC_AZURE_CLIENT_SECRET: ${{ secrets.TFC_AZURE_CLIENT_SECRET }}
  39. TFC_AZURE_TENANT_ID: ${{ secrets.TFC_AZURE_TENANT_ID}}
  40. TFC_AZURE_SUBSCRIPTION_ID: ${{ secrets.TFC_AZURE_SUBSCRIPTION_ID }}
  41. TFC_VAULT_URL: ${{ secrets.TFC_VAULT_URL}}
  42. GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
  43. GITHUB_PR_NUMBER: ${{ github.event.client_payload.pull_request.number }}
  44. CLOUD_PROVIDER: ${{ github.event.client_payload.slash_command.args.named.provider }}
  45. INFRACOST_API_KEY: ${{ secrets.INFRACOST_API_KEY }}
  46. GHCR_TOKEN: ${{ secrets.GHCR_TOKEN }}
  47. name: managed e2e tests
  48. jobs:
  49. run-e2e-managed:
  50. runs-on: ubuntu-latest
  51. if: github.event_name == 'repository_dispatch'
  52. steps:
  53. # Check out merge commit
  54. - name: Fork based /ok-to-test-managed checkout
  55. uses: actions/checkout@v4
  56. with:
  57. ref: 'refs/pull/${{ env.GITHUB_PR_NUMBER }}/merge'
  58. - name: Fetch History
  59. run: git fetch --prune --unshallow
  60. - uses: ./.github/actions/e2e-managed
  61. # set status=completed
  62. - uses: actions/github-script@v7
  63. if: ${{ always() }}
  64. env:
  65. number: ${{ env.GITHUB_PR_NUMBER }}
  66. provider: ${{ env.CLOUD_PROVIDER }}
  67. job: ${{ github.job }}
  68. # Conveniently, job.status maps to https://developer.github.com/v3/checks/runs/#update-a-check-run
  69. conclusion: ${{ job.status }}
  70. with:
  71. github-token: ${{ env.GITHUB_TOKEN }}
  72. script: |
  73. const { data: pull } = await github.rest.pulls.get({
  74. ...context.repo,
  75. pull_number: process.env.number
  76. });
  77. const ref = pull.head.sha;
  78. const { data: checks } = await github.rest.checks.listForRef({
  79. ...context.repo,
  80. ref
  81. });
  82. const job_name = "e2e-managed-" + process.env.provider
  83. const check = checks.check_runs.filter(c => c.name === job_name);
  84. const { data: result } = await github.rest.checks.update({
  85. ...context.repo,
  86. check_run_id: check[0].id,
  87. status: 'completed',
  88. conclusion: process.env.conclusion
  89. });
  90. return result;