Skip to content

feat: adding unit tests for ipsec#300

Open
mohamedasifs123 wants to merge 3 commits intoopiproject:mainfrom
mohamedasifs123:patch-2
Open

feat: adding unit tests for ipsec#300
mohamedasifs123 wants to merge 3 commits intoopiproject:mainfrom
mohamedasifs123:patch-2

Conversation

@mohamedasifs123
Copy link
Contributor

No description provided.

@mohamedasifs123 mohamedasifs123 requested a review from a team as a code owner January 15, 2025 12:31
Copy link
Contributor

@sandersms sandersms left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Please address the Go build errors

go-version: [ '1.21', '1.22' ]

steps:
- uses: actions/checkout@v4

Check warning

Code scanning / Scorecard

Pinned-Dependencies Medium

score is 0: GitHub-owned GitHubAction not pinned by hash
Click Remediation section below to solve this issue
- uses: actions/checkout@v4

- name: Set up Go
uses: actions/setup-go@v5

Check warning

Code scanning / Scorecard

Pinned-Dependencies Medium

score is 0: GitHub-owned GitHubAction not pinned by hash
Click Remediation section below to solve this issue
uses: actions/checkout@v4

- name: Set up Docker Buildx
uses: docker/setup-buildx-action@v3

Check warning

Code scanning / Scorecard

Pinned-Dependencies Medium

score is 0: third-party GitHubAction not pinned by hash
Click Remediation section below to solve this issue
docker exec -ti tests-go-test-1 go test -race -coverprofile=coverage.out -covermode=atomic -v ./...

- name: Upload coverage to Codecov
uses: codecov/codecov-action@v3

Check warning

Code scanning / Scorecard

Pinned-Dependencies Medium

score is 0: third-party GitHubAction not pinned by hash
Click Remediation section below to solve this issue
@mohamedasifs123 mohamedasifs123 force-pushed the patch-2 branch 3 times, most recently from 83f82ec to 2614cfd Compare January 17, 2025 05:34
@codecov
Copy link

codecov bot commented Jan 17, 2025

Codecov Report

All modified and coverable lines are covered by tests ✅

Please upload report for BASE (main@66cd2ff). Learn more about missing BASE report.

Additional details and impacted files
@@           Coverage Diff           @@
##             main     #300   +/-   ##
=======================================
  Coverage        ?   71.66%           
=======================================
  Files           ?        4           
  Lines           ?     1246           
  Branches        ?        0           
=======================================
  Hits            ?      893           
  Misses          ?      286           
  Partials        ?       67           

☔ View full report in Codecov by Sentry.
📢 Have feedback on the report? Share it here.

🚀 New features to boost your workflow:
  • Test Analytics: Detect flaky tests, report on failures, and find test suite problems.

@mohamedasifs123
Copy link
Contributor Author

Changed the test workflow to support the strongswan integration for vici to run the tests and upload the tests to codecov.

This reverts commit 93e34b6.

Update go.yml

Signed-off-by: Mohamed Asif <142201466+mohamedasifs123@users.noreply.github.com>

feat: adding unit tests for ipsec

This reverts commit d7ff204.

Revert "Update go.yml"

This reverts commit cf792d3.

Update go.yml

Signed-off-by: Mohamed Asif <142201466+mohamedasifs123@users.noreply.github.com>

Update go.yml

Signed-off-by: Mohamed Asif <142201466+mohamedasifs123@users.noreply.github.com>

Update go.yml

Signed-off-by: Mohamed Asif <142201466+mohamedasifs123@users.noreply.github.com>

feat: adding unit tests for ipsec

feat: adding unit tests for ipsec

Signed-off-by: mohamedasifs123 <asifabu272@gmail.com>

feat: adding unit tests for ipsec

Signed-off-by: mohamedasifs123 <asifabu272@gmail.com>

Update go.yml

feat: adding unit tests for ipsec

Signed-off-by: mohamedasifs123 <asifabu272@gmail.com>
Signed-off-by: Mohamed Asif <142201466+mohamedasifs123@users.noreply.github.com>
Signed-off-by: Mohamed Asif <142201466+mohamedasifs123@users.noreply.github.com>
runs-on: ubuntu-latest
permissions:
contents: read
packages: write

Check failure

Code scanning / Scorecard

Token-Permissions High

score is 0: jobLevel 'packages' permission set to 'write'
Remediation tip: Verify which permissions are needed and consider whether you can reduce them.
Click Remediation section below for further remediation help
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants