constellation/.github/workflows/e2e-test-weekly.yml

248 lines
9.1 KiB
YAML
Raw Normal View History

name: e2e test weekly
on:
workflow_dispatch:
schedule:
- cron: "0 3 * * 6" # At 03:00 on Saturday.
env:
ARM_CLIENT_ID: ${{ secrets.AZURE_E2E_CLIENT_ID }}
ARM_CLIENT_SECRET: ${{ secrets.AZURE_E2E_CLIENT_SECRET }}
ARM_SUBSCRIPTION_ID: ${{ secrets.AZURE_E2E_SUBSCRIPTION_ID }}
ARM_TENANT_ID: ${{ secrets.AZURE_E2E_TENANT_ID }}
jobs:
2022-11-23 08:41:42 +00:00
find-latest-image:
strategy:
fail-fast: false
matrix:
refStream: ["main-debug", "release-stable"]
name: Find latest image
2022-11-23 08:41:42 +00:00
runs-on: ubuntu-22.04
permissions:
id-token: write
contents: read
outputs:
image-main-debug: ${{ steps.relabel-output.outputs.image-main-debug }}
image-release-stable: ${{ steps.relabel-output.outputs.image-release-stable }}
2022-11-23 08:41:42 +00:00
steps:
- name: Checkout
uses: actions/checkout@24cb9080177205b6e8c946b17badbe402adc938f # v3.4.0
2022-11-23 08:41:42 +00:00
with:
ref: ${{ !github.event.pull_request.head.repo.fork && github.head_ref || '' }}
2022-11-23 08:41:42 +00:00
- name: Login to AWS
uses: aws-actions/configure-aws-credentials@e1e17a757e536f70e52b5a12b2e8d1d1c60e04ef # v2.0.0
with:
role-to-assume: arn:aws:iam::795746500882:role/GithubConstellationVersionsAPIRead
aws-region: eu-central-1
- name: Separate ref and stream from matrix
id: separate-ref-stream
env:
REFSTREAM: ${{ matrix.refStream }}
run: |
echo "ref=${REFSTREAM%-*}" | tee -a "$GITHUB_OUTPUT"
echo "stream=${REFSTREAM#*-}" | tee -a "$GITHUB_OUTPUT"
2022-11-23 08:41:42 +00:00
- name: Find latest image
id: find-latest-image
uses: ./.github/actions/versionsapi
2022-11-23 08:41:42 +00:00
with:
command: latest
ref: ${{ steps.separate-ref-stream.outputs.ref == 'release' && '-' || steps.separate-ref-stream.outputs.ref }}
stream: ${{ steps.separate-ref-stream.outputs.stream }}
- name: Relabel output
id: relabel-output
run: echo "image-${{ matrix.refStream }}=${{ steps.find-latest-image.outputs.output }}" | tee -a "$GITHUB_OUTPUT"
2022-11-23 08:41:42 +00:00
e2e-weekly:
strategy:
fail-fast: false
max-parallel: 5
matrix:
test:
[
"sonobuoy full",
"autoscaling",
"perf-bench",
"lb",
"verify",
"recover",
"iamcreate",
]
provider: ["gcp", "azure", "aws"]
kubernetes-version: ["v1.24", "v1.25", "v1.26"]
refStream: ["main-debug", "release-stable"]
exclude:
# IAM create test runs only on latest kubernetes-version.
- test: "iamcreate"
kubernetes-version: "v1.24"
- test: "iamcreate"
kubernetes-version: "v1.25"
# Verify test runs only on latest kubernetes-version.
- test: "verify"
kubernetes-version: "v1.24"
- test: "verify"
kubernetes-version: "v1.25"
# Recover test runs only on latest kubernetes-version.
- test: "recover"
kubernetes-version: "v1.24"
- test: "recover"
kubernetes-version: "v1.25"
# Autoscaling test runs only on latest kubernetes-version.
- test: "autoscaling"
kubernetes-version: "v1.24"
- test: "autoscaling"
kubernetes-version: "v1.25"
# Perf-Bench test runs only on latest kubernetes-version.
2023-03-01 09:24:36 +00:00
- test: "perf-bench"
kubernetes-version: "v1.24"
2023-03-01 09:24:36 +00:00
- test: "perf-bench"
kubernetes-version: "v1.25"
# lb test runs only on latest kubernetes-version.
- test: "lb"
kubernetes-version: "v1.24"
- test: "lb"
kubernetes-version: "v1.25"
# Currently not supported on AWS.
- test: "autoscaling"
provider: "aws"
2023-03-01 09:24:36 +00:00
- test: "perf-bench"
provider: "aws"
# Only iamcreate for K8s v1.25 on all providers.
- refStream: "release-stable"
kubernetes-version: "v1.24"
- refStream: "release-stable"
kubernetes-version: "v1.26"
- refStream: "release-stable"
test: "lb"
- refStream: "release-stable"
test: "perf-bench"
- refStream: "release-stable"
test: "autoscaling"
- refStream: "release-stable"
test: "sonobuoy full"
- refStream: "release-stable"
test: "verify"
- refStream: "release-stable"
test: "recover"
runs-on: ubuntu-22.04
permissions:
id-token: write
checks: write
contents: read
2022-11-23 08:41:42 +00:00
needs: [find-latest-image]
steps:
- name: Check out repository
uses: actions/checkout@24cb9080177205b6e8c946b17badbe402adc938f # v3.4.0
with:
fetch-depth: 0
ref: ${{ !github.event.pull_request.head.repo.fork && github.head_ref || '' }}
2022-09-02 10:43:04 +00:00
2022-09-14 13:14:26 +00:00
- name: Setup Go environment
uses: actions/setup-go@6edd4406fa81c3da01a34fa6f6343087c207a568 # v3.5.0
2022-09-14 13:14:26 +00:00
with:
go-version: "1.20.2"
2022-09-14 13:14:26 +00:00
2022-09-02 10:43:04 +00:00
- name: Login to Azure
if: matrix.provider == 'azure'
uses: ./.github/actions/login_azure
2022-09-02 10:43:04 +00:00
with:
azure_credentials: ${{ secrets.AZURE_E2E_CREDENTIALS }}
- name: Create Azure resource group
id: az_resource_group_gen
if: matrix.provider == 'azure'
2022-09-02 10:43:04 +00:00
shell: bash
run: |
uuid=$(cat /proc/sys/kernel/random/uuid)
name=e2e-test-${uuid%%-*}
az group create --location northeurope --name "$name" --tags e2e
echo "res_group_name=$name" >> "$GITHUB_OUTPUT"
2022-09-02 10:43:04 +00:00
- name: Run E2E test
id: e2e_test
uses: ./.github/actions/e2e_test
with:
workerNodesCount: "2"
controlNodesCount: "3"
cloudProvider: ${{ matrix.provider }}
osImage: ${{ matrix.refStream == 'release-stable' && needs.find-latest-image.outputs.image-release-stable || needs.find-latest-image.outputs.image-main-debug }}
isDebugImage: ${{ matrix.refStream == 'main-debug' }}
cliVersion: ${{ matrix.refStream == 'release-stable' && needs.find-latest-image.outputs.image-release-stable || '' }}
kubernetesVersion: ${{ matrix.kubernetes-version }}
awsOpenSearchDomain: ${{ secrets.AWS_OPENSEARCH_DOMAIN }}
awsOpenSearchUsers: ${{ secrets.AWS_OPENSEARCH_USER }}
awsOpenSearchPwd: ${{ secrets.AWS_OPENSEARCH_PWD }}
azureSubscription: ${{ secrets.AZURE_E2E_SUBSCRIPTION_ID }}
azureTenant: ${{ secrets.AZURE_E2E_TENANT_ID }}
azureClientID: ${{ secrets.AZURE_E2E_CLIENT_ID }}
2022-08-30 11:42:14 +00:00
azureClientSecret: ${{ secrets.AZURE_E2E_CLIENT_SECRET }}
azureUserAssignedIdentity: ${{ secrets.AZURE_E2E_USER_ASSIGNED_IDENTITY }}
2022-09-02 10:43:04 +00:00
azureResourceGroup: ${{ steps.az_resource_group_gen.outputs.res_group_name }}
gcpProject: ${{ secrets.GCP_E2E_PROJECT }}
2023-01-16 17:15:17 +00:00
gcp_service_account: "constellation-e2e@constellation-331613.iam.gserviceaccount.com"
gcpClusterServiceAccountKey: ${{ secrets.GCP_CLUSTER_SERVICE_ACCOUNT }}
test: ${{ matrix.test }}
buildBuddyApiKey: ${{ secrets.BUILDBUDDY_ORG_API_KEY }}
2022-09-02 10:40:22 +00:00
- name: Always terminate cluster
if: always()
continue-on-error: true
uses: ./.github/actions/constellation_destroy
with:
kubeconfig: ${{ steps.e2e_test.outputs.kubeconfig }}
2022-09-02 10:40:22 +00:00
- name: Always delete IAM configuration
if: always() && matrix.test == 'iamcreate' && matrix.provider != 'azure' # skip for Azure, as the SP / MI does not have the required permissions
continue-on-error: true
uses: ./.github/actions/constellation_iam_destroy
2022-09-02 10:40:22 +00:00
- name: Notify teams channel
if: failure() && github.ref == 'refs/heads/main'
2022-09-02 10:40:22 +00:00
continue-on-error: true
shell: bash
working-directory: .github/actions/e2e_test
2022-09-02 10:40:22 +00:00
run: |
sudo apt-get install gettext-base -y
export TEAMS_JOB_NAME=${{ matrix.provider }}
2022-09-02 10:40:22 +00:00
export TEAMS_RUN_ID=${{ github.run_id }}
envsubst < teams-payload.json > to-be-send.json
curl \
-H "Content-Type: application/json" \
-d @to-be-send.json \
"${{ secrets.MS_TEAMS_WEBHOOK_URI }}"
2022-09-02 10:43:04 +00:00
- name: Always destroy Azure resource group
if: always() && matrix.provider == 'azure'
2022-09-02 10:43:04 +00:00
shell: bash
run: |
az group delete \
--name ${{ steps.az_resource_group_gen.outputs.res_group_name }} \
--force-deletion-types Microsoft.Compute/virtualMachineScaleSets \
--force-deletion-types Microsoft.Compute/virtualMachines \
--no-wait \
--yes
e2e-upgrade:
strategy:
fail-fast: false
max-parallel: 1
matrix:
fromVersion:
["v2.6.0"]
cloudProvider: ["gcp", "azure"]
name: Run upgrade tests
secrets: inherit
permissions:
id-token: write
contents: read
uses: ./.github/workflows/e2e-upgrade.yml
with:
fromVersion: ${{ matrix.fromVersion }}
cloudProvider: ${{ matrix.cloudProvider }}
workerNodesCount: 2
controlNodesCount: 3