-
Notifications
You must be signed in to change notification settings - Fork 30
179 lines (153 loc) · 6.53 KB
/
end-to-end-test.yaml
File metadata and controls
179 lines (153 loc) · 6.53 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
name: end-to-end-test
on:
pull_request_target:
types: [ labeled ]
workflow_dispatch:
env:
chartuser: ${{ secrets.DEV_CHARTS_USERNAME }}
chartpassword: ${{ secrets.DEV_CHARTS_PASSWORD }}
ENFORCE_CRITICAL_CHECK: ${{ secrets.ENFORCE_CRITICAL_CHECK }}
permissions:
contents: write
pages: write
jobs:
end-to-end:
runs-on: ubuntu-latest
if: ${{ github.event.label.name == 'ready-to-test' }}
steps:
- name: checkout the repo
uses: actions/checkout@v4
with:
ref: ${{ github.event.pull_request.head.sha }}
- name: Get branch name
id: branch-name
uses: tj-actions/branch-names@v9
- name: Set outputs
id: vars
run: echo "sha_commit=$(git rev-parse HEAD)" >> $GITHUB_OUTPUT
- name: build the kubeslice controller
uses: docker/build-push-action@v6
with:
tags: kubeslice-controller:${{ steps.vars.outputs.sha_commit }}
build-args: |
PLATFORM=amd64
push: false
- name: Scanning image for vulnerablilities
uses: aquasecurity/trivy-action@master
with:
image-ref: kubeslice-controller:${{ steps.vars.outputs.sha_commit }}
format: 'table'
output: 'scan.txt'
- name: check files
run: |
ls -ltr
cat scan.txt
- name: extract lines for base and binary image
run: |
bash .github/workflows/scripts/line-extractor.sh
- name: check file is created or not
run: |
ls -ltr
echo "base image file content:"
cat final.txt
echo "binary image file content:"
cat binary.txt
- name: break the bulid if critical vulunerablitites in base image
if: env.ENFORCE_CRITICAL_CHECK == 'true'
run: |
bash .github/workflows/scripts/base-image-critical.sh
- name: break the bulid if critical vulunerablitites in binary image
if: env.ENFORCE_CRITICAL_CHECK == 'true'
run: |
bash .github/workflows/scripts/binary-image-critical.sh
- name: Upload artifact
uses: actions/upload-artifact@v4
with:
name: trivy-scan
path: scan.txt
- name: build kind clusters
run: |
mkdir -p ${{ github.workspace }}/profile
sh .github/workflows/scripts/start-kind.sh
env:
GITHUB_HEAD_COMMIT: ${{ steps.vars.outputs.sha_commit }}
- name: Run E2E Tests
run: |
echo "Running E2E Tests..."
make e2e-test
env:
KUBECONFIG: /home/runner/.kube/config
GITHUB_HEAD_COMMIT: ${{ steps.vars.outputs.sha_commit }}
- name: Docker Run Action
uses: addnab/docker-run-action@v3
with:
username: ${{ secrets.DUSERNAME }}
password: ${{ secrets.DPASSWORD }}
image: aveshadev/kubeslice-e2e:latest
options: -v ${{ github.workspace }}/reports:/e2e/reports -v /home/runner/.kube:/e2e/assets/kubeconfig -v ${{ github.workspace }}/profile:/e2e/profile --network kind
run: |
bash run.sh kind
- name: Fix permissions on reports
run: |
sudo chown -R $USER:$USER reports || true
- name: Get current date
id: date
run: echo "date=$(date +'%Y-%m-%dT%H:%M:%S')" >> $GITHUB_OUTPUT
- name: Checkout external reports repo into gh-pages
uses: actions/checkout@v5
with:
repository: kubeslice/e2e-allure-reports
path: gh-pages
token: ${{ secrets.TOKEN }}
- name: Allure Report with history
uses: PavanMudigonda/html-reporter-github-pages@v1.5
id: Allure_report_with_history
with:
test_results: reports
allure_report_generate_flag: true
gh_pages: gh-pages
external_repository: kubeslice/e2e-allure-reports
keep_reports: 500
subfolder: Kind
tool_name: allure
workflow_name: ${{ github.event.repository.name }}
env: ${{ github.base_ref }}
order: descending
report_url: 'https://kubeslice.github.io/e2e-allure-reports/'
token: ${{ secrets.TOKEN }}
- name: wait for report deploy on site ( you can check report here also )
run: |
sleep 200
echo "${{ env.GITHUB_PAGES_WEBSITE_URL }}/${{ github.run_number }}/index.html"
- name: Report link on Pull Request comment
uses: thollander/actions-comment-pull-request@v2
with:
message: |
report link '${{ env.GITHUB_PAGES_WEBSITE_URL }}/${{ github.run_number }}/index.html'
GITHUB_TOKEN: ${{ secrets.TOKEN }}
- name: Run Quality Gate Check
uses: ./quality-gate
with:
ENABLE_QUALITY_GATE: true
MINIMUM_PASS_PERCENTAGE: 75
ALLURE_BEHAVIORS_CSV: '/home/runner/work/${{ github.event.repository.name }}/${{ github.event.repository.name }}/allure-history/Kind-${{ github.event.repository.name }}-${{ steps.date.outputs.date }}-${{ github.base_ref }}-${{ github.run_number }}/data/behaviors.csv'
- name: Send mail
if: always()
uses: dawidd6/action-send-mail@v6
with:
server_address: smtp.gmail.com
server_port: 465
username: ${{secrets.MAIL_USERNAME}}
password: ${{secrets.MAIL_PASSWORD}}
cc: rajendra@aveshasystems.com, eric@aveshasystems.com, abhisek@aveshasystems.com
subject: Kubeslice-controller | controller-end-to-end-test | ${{ steps.date.outputs.date }}
to: richie@aveshasystems.com, nishant.singh@aveshasystems.com
from: no-reply@aveshasystems.com
attachments: result-summary.txt
body: Pipeline for the repo ${{github.repository}} is triggered by ${{github.actor}} from the branch ${{ steps.branch-name.outputs.current_branch }} !
Run id for the pipeline is ${{ github.run_id }} .
Check your logs in github action here https://github.com/kubeslice/kubeslice-controller/actions/runs/${{ github.run_id }} .
for downloading the logs zip file in your local use this API url in curl command https://api.github.com/repos/kubeslice/kubeslice-controller/actions/runs/${{ github.run_id }}/logs
the report url is https://kubeslice.github.io/e2e-allure-reports/Kind-${{ github.event.repository.name }}-${{ steps.date.outputs.date }}-${{ github.base_ref }}-${{ github.run_number }}/index.html.
for looking all the allure reports (including old ones ) please visit at https://kubeslice.github.io/e2e-allure-reports/ .
please look result-summary.txt file for more info regarding test cases ( please note you will get result-summary.txt file only if your quality gate check steps ran successfully ).