2023-02-13 07:58:34 -05:00
name : e2e test release
# This workflow is not integrated with e2e-test-weekly since we want different tests to run during weekly and release testing.
# To integrate both tests we would need to pass executed tests as arguments.
# Defining the executed tests is currently the main point of the e2e-test-weekly workflow.
# e2e-test-release runs the same tests as e2e-test-weekly except:
# - any tests on the last release
# - loadbalancer tests for AWS. Test test is currently broken and should not block a release. AB#2780.
#
# The workflow is triggered by the completion of the release workflow.
# The workflow only executes, after being triggered, if the triggering workflow completed successfully.
# e2e-test-release uses the same branch as the triggering workflow and not the commit of the triggering workflow. This is because the release workflow produces further commits.
# e2e-test-release depends on the fact that actions/constellation_create does not overwrite the default osImage, if no osImage is supplied.
on :
workflow_dispatch :
workflow_run :
workflows : [ "Release" ]
types : [ completed]
jobs :
on-failure-quit :
runs-on : ubuntu-22.04
if : github.event.workflow_run.conclusion == 'failure'
steps :
- run : |
echo 'Release workflow failed, exiting..'
exit 1
2023-04-03 07:40:42 -04:00
e2e-tests :
2023-02-13 07:58:34 -05:00
strategy :
fail-fast : false
2023-04-04 04:47:26 -04:00
max-parallel : 9
2023-02-13 07:58:34 -05:00
matrix :
2023-04-14 12:43:54 -04:00
include :
#
# Tests on ubuntu runner
#
# sonobuoy full test on all k8s versions
- test : "sonobuoy full"
provider : "gcp"
kubernetes-version : "v1.26"
runner : "ubuntu-22.04"
- test : "sonobuoy full"
provider : "azure"
kubernetes-version : "v1.26"
runner : "ubuntu-22.04"
- test : "sonobuoy full"
provider : "aws"
kubernetes-version : "v1.26"
runner : "ubuntu-22.04"
- test : "sonobuoy full"
provider : "gcp"
2023-02-13 07:58:34 -05:00
kubernetes-version : "v1.25"
2023-04-14 12:43:54 -04:00
runner : "ubuntu-22.04"
- test : "sonobuoy full"
provider : "azure"
2023-02-13 07:58:34 -05:00
kubernetes-version : "v1.25"
2023-04-14 12:43:54 -04:00
runner : "ubuntu-22.04"
- test : "sonobuoy full"
provider : "aws"
2023-02-13 07:58:34 -05:00
kubernetes-version : "v1.25"
2023-04-14 12:43:54 -04:00
runner : "ubuntu-22.04"
- test : "sonobuoy full"
provider : "gcp"
2023-02-13 07:58:34 -05:00
kubernetes-version : "v1.24"
2023-04-14 12:43:54 -04:00
runner : "ubuntu-22.04"
- test : "sonobuoy full"
provider : "azure"
2023-02-13 07:58:34 -05:00
kubernetes-version : "v1.24"
2023-04-14 12:43:54 -04:00
runner : "ubuntu-22.04"
- test : "sonobuoy full"
provider : "aws"
2023-02-13 07:58:34 -05:00
kubernetes-version : "v1.24"
2023-04-14 12:43:54 -04:00
runner : "ubuntu-22.04"
# verify test on latest k8s version
- test : "verify"
provider : "gcp"
kubernetes-version : "v1.26"
runner : "ubuntu-22.04"
- test : "verify"
provider : "azure"
kubernetes-version : "v1.26"
runner : "ubuntu-22.04"
- test : "verify"
2023-02-13 07:58:34 -05:00
provider : "aws"
2023-04-14 12:43:54 -04:00
kubernetes-version : "v1.26"
runner : "ubuntu-22.04"
# recover test on latest k8s version
- test : "recover"
provider : "gcp"
kubernetes-version : "v1.26"
runner : "ubuntu-22.04"
- test : "recover"
provider : "azure"
kubernetes-version : "v1.26"
runner : "ubuntu-22.04"
- test : "recover"
2023-02-13 07:58:34 -05:00
provider : "aws"
2023-04-14 12:43:54 -04:00
kubernetes-version : "v1.26"
runner : "ubuntu-22.04"
# lb test on latest k8s version
- test : "lb"
provider : "gcp"
kubernetes-version : "v1.26"
runner : "ubuntu-22.04"
- test : "lb"
provider : "azure"
kubernetes-version : "v1.26"
runner : "ubuntu-22.04"
2023-02-13 07:58:34 -05:00
- test : "lb"
provider : "aws"
2023-04-14 12:43:54 -04:00
kubernetes-version : "v1.26"
runner : "ubuntu-22.04"
# autoscaling test on latest k8s version, not supported on AWS
- test : "autoscaling"
provider : "gcp"
kubernetes-version : "v1.26"
runner : "ubuntu-22.04"
- test : "autoscaling"
provider : "azure"
kubernetes-version : "v1.26"
runner : "ubuntu-22.04"
# perf-bench test on latest k8s version, not supported on AWS
- test : "perf-bench"
provider : "gcp"
kubernetes-version : "v1.26"
runner : "ubuntu-22.04"
- test : "perf-bench"
provider : "azure"
kubernetes-version : "v1.26"
runner : "ubuntu-22.04"
#
# Tests on macOS runner
#
2023-04-03 11:47:21 -04:00
- test : "verify"
provider : "azure"
kubernetes-version : "v1.25"
runner : "macos-12"
2023-04-14 12:43:54 -04:00
- test : "recover"
2023-04-03 11:47:21 -04:00
provider : "gcp"
2023-04-14 12:43:54 -04:00
kubernetes-version : "v1.25"
runner : "macos-12"
2023-02-13 07:58:34 -05:00
runs-on : ${{ matrix.runner }}
permissions :
id-token : write
checks : write
contents : read
2023-04-24 05:32:22 -04:00
packages : write
2023-02-13 07:58:34 -05:00
steps :
- name : Install the basics tools (macOS)
if : runner.os == 'macOS'
shell : bash
run : brew install coreutils kubectl bash
- name : Checkout
2023-04-03 10:36:43 -04:00
uses : actions/checkout@8f4b7f84864484a7bf31766abe9204da3cbe65b3 # v3.5.0
2023-02-13 07:58:34 -05:00
with :
fetch-depth : 0
ref : ${{ !github.event.pull_request.head.repo.fork && github.event.workflow_run.head_branch || '' }}
- name : Setup Go environment
2023-04-04 05:06:30 -04:00
uses : actions/setup-go@4d34df0c2316fe8122ab82dc22947d607c0c91f9 # v4.0.0
2023-02-13 07:58:34 -05:00
with :
2023-04-06 10:36:07 -04:00
go-version : "1.20.3"
2023-02-13 07:58:34 -05:00
- name : Set up gcloud CLI (macOS)
if : matrix.provider == 'gcp' && runner.os == 'macOS'
2023-04-03 10:36:43 -04:00
uses : google-github-actions/setup-gcloud@62d4898025f6041e16b1068643bfc5a696863587 # v1.1.0
2023-02-13 07:58:34 -05:00
- name : Run E2E test
id : e2e_test
uses : ./.github/actions/e2e_test
with :
workerNodesCount : "2"
controlNodesCount : "3"
cloudProvider : ${{ matrix.provider }}
cliVersion : ""
kubernetesVersion : ${{ matrix.kubernetes-version }}
2023-04-12 07:24:13 -04:00
keepMeasurements : "true"
2023-02-13 07:58:34 -05:00
osImage : ""
isDebugImage : "false"
awsOpenSearchDomain : ${{ secrets.AWS_OPENSEARCH_DOMAIN }}
awsOpenSearchUsers : ${{ secrets.AWS_OPENSEARCH_USER }}
awsOpenSearchPwd : ${{ secrets.AWS_OPENSEARCH_PWD }}
gcpProject : ${{ secrets.GCP_E2E_PROJECT }}
2023-04-12 07:24:13 -04:00
gcpClusterCreateServiceAccount : "constellation-e2e-cluster@constellation-331613.iam.gserviceaccount.com"
gcpIAMCreateServiceAccount : " constellation-iam-e2e@constellation-331613.iam.gserviceaccount.com"
gcpInClusterServiceAccountKey : ${{ secrets.GCP_CLUSTER_SERVICE_ACCOUNT }}
2023-02-13 07:58:34 -05:00
test : ${{ matrix.test }}
buildBuddyApiKey : ${{ secrets.BUILDBUDDY_ORG_API_KEY }}
2023-04-12 07:24:13 -04:00
azureClusterCreateCredentials : ${{ secrets.AZURE_E2E_CLUSTER_CREDENTIALS }}
azureIAMCreateCredentials : ${{ secrets.AZURE_E2E_IAM_CREDENTIALS }}
2023-04-04 04:16:04 -04:00
registry : ghcr.io
githubToken : ${{ secrets.GITHUB_TOKEN }}
2023-04-12 07:24:13 -04:00
2023-02-13 07:58:34 -05:00
- name : Always terminate cluster
if : always()
uses : ./.github/actions/constellation_destroy
with :
kubeconfig : ${{ steps.e2e_test.outputs.kubeconfig }}
- name : Always delete IAM configuration
2023-04-12 07:24:13 -04:00
if : always()
2023-02-13 07:58:34 -05:00
uses : ./.github/actions/constellation_iam_destroy
2023-04-12 07:24:13 -04:00
with :
cloudProvider : ${{ matrix.provider }}
azureCredentials : ${{ secrets.AZURE_E2E_IAM_CREDENTIALS }}
gcpServiceAccount : "constellation-iam-e2e@constellation-331613.iam.gserviceaccount.com"
2023-02-13 07:58:34 -05:00
e2e-upgrade :
strategy :
2023-04-04 04:47:26 -04:00
fail-fast : false
max-parallel : 1
matrix :
fromVersion : [ "v2.6.0" ]
cloudProvider : [ "gcp" , "azure" ]
2023-02-13 07:58:34 -05:00
name : Run upgrade tests
secrets : inherit
permissions :
id-token : write
contents : read
uses : ./.github/workflows/e2e-upgrade.yml
with :
fromVersion : ${{ matrix.fromVersion }}
cloudProvider : ${{ matrix.cloudProvider }}
workerNodesCount : 2
controlNodesCount : 3