forked from trustification/trustification
-
Notifications
You must be signed in to change notification settings - Fork 0
369 lines (317 loc) · 11.2 KB
/
ci.yaml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
name: CI
on:
push:
# Run on the main branch
branches:
- main
- stable
- release/*
# Also on PRs, just be careful not to publish anything
pull_request:
branches:
- main
- stable
- release/*
# Allow to be called from other workflows (like "release")
workflow_call:
# But don't trigger on tags, as they are covered by the "release.yaml" workflow
# The overall idea is to be quick, but re-use output from previous steps.
# The quickest checks is formatting, so we do that first. Next is integration, and ci. For ci we split up backend
# and frontend, because they are somewhat independent.
#
# For the backend part, we run check, clippy, and test as they build upon each other. For the frontend, we run
# check and clippy, but test as a dedicated job, as we don't have a WASM test runner. Yet, check and clippy for wasm32
# are different.
env:
HELM_VERSION: "3.14.0"
jobs:
formatting:
runs-on: ubuntu-22.04
steps:
- uses: actions/checkout@v4
- name: Check formatting
run: |
cargo fmt --check
cargo fmt --check --manifest-path spog/ui/Cargo.toml
uncommitted:
runs-on: ubuntu-22.04
steps:
- uses: actions/checkout@v4
- name: Check if templates have uncommitted changes
run: |
pip3 install yq
make -C deploy/openshift
git diff --quiet deploy/openshift
if [ $? -gt 0 ]; then
echo "::error::Uncommitted changes to deploy/openshift (most likely template must be updated by running `make`)"
exit 1
fi
- name: Check if values schema has uncommitted changes
working-directory: deploy/k8s
run: |
python3 -c 'import sys, yaml, json; print(json.dumps(yaml.safe_load(sys.stdin), indent=2))' < charts/trustification/values.schema.yaml > charts/trustification/values.schema.json
git diff --quiet charts/trustification
if [ $? -gt 0 ]; then
echo "::error::Uncommitted changes to deploy/k8s/charts/trustification/values.schema.json"
exit 1
fi
helm-lint:
runs-on: ubuntu-22.04
steps:
- uses: actions/checkout@v4
- uses: azure/[email protected]
with:
version: ${{ env.HELM_VERSION }}
- name: add helm repositories
working-directory: deploy/k8s
run: |
helm repo add bitnami https://charts.bitnami.com/bitnami
- name: install helm dependencies
working-directory: deploy/k8s
run: |
helm dependency build charts/trustification
- name: helm-lint (minikube)
working-directory: deploy/k8s
run: |
helm lint ./charts/trustification --values values-minikube.yaml --set-string appDomain=.localhost
- name: helm-lint (ocp-no-aws)
working-directory: deploy/k8s
run: |
helm lint ./charts/trustification --values values-ocp-no-aws.yaml --set-string appDomain=.localhost
- name: helm-lint (ocp-aws)
working-directory: deploy/k8s
run: |
helm lint ./charts/trustification --values values-ocp-aws.yaml --values values-ocp-aws-lint.yaml --set-string appDomain=.localhost
- name: helm-lint (branding)
working-directory: deploy/k8s
run: |
helm lint ./charts/trustification-branding
# also lint the deprecated charts for now
- name: helm-lint-deprecated (staging)
working-directory: deploy/k8s
run: |
helm lint ./chart -f ../trustification.dev/staging.yaml
- name: helm-lint-deprecated (prod)
working-directory: deploy/k8s
run: |
helm lint ./chart -f ../trustification.dev/prod.yaml
ci-backend:
runs-on: ubuntu-22.04
needs:
- formatting
steps:
- name: Maximize build space
run: |
df -h
sudo rm -rf /usr/share/dotnet
sudo rm -rf /usr/local/lib/android
sudo rm -rf /opt/ghc
sudo rm -rf /opt/hostedtoolcache/CodeQL
sudo docker image prune --all --force
sudo rm -Rf ${JAVA_HOME_8_X64}
sudo rm -Rf ${JAVA_HOME_11_X64}
sudo rm -Rf ${JAVA_HOME_17_X64}
sudo rm -Rf ${RUBY_PATH}
df -h
- uses: actions/checkout@v4
- run: rustup component add clippy
- uses: actions/cache@v4
with:
path: |
~/.cargo/bin/
~/.cargo/.crates.toml
~/.cargo/.crates2.json
~/.cargo/registry/index/
~/.cargo/registry/cache/
~/.cargo/git/db/
target/
spog/ui/target/
key: ${{ runner.os }}-cargo-backend-${{ hashFiles('**/Cargo.lock') }}
- name: Install Protoc
uses: arduino/setup-protoc@v3
with:
repo-token: ${{ secrets.GITHUB_TOKEN }}
- name: Install dependencies
env:
DEBIAN_FRONTEND: noninteractive
run: |
sudo apt-get install -y libsasl2-dev
- name: Check
run: cargo check
- name: Clippy
run: cargo clippy --all-targets --all-features -- -D warnings -D clippy::unwrap_used
- name: Test
run: cargo test
ci-frontend-check:
runs-on: ubuntu-22.04
needs:
- formatting
steps:
- uses: actions/checkout@v4
- run: rustup component add clippy
- run: rustup target add wasm32-unknown-unknown
- uses: actions/cache@v4
with:
path: |
~/.cargo/bin/
~/.cargo/.crates.toml
~/.cargo/.crates2.json
~/.cargo/registry/index/
~/.cargo/registry/cache/
~/.cargo/git/db/
target/
spog/ui/target/
key: ${{ runner.os }}-cargo-frontend-check-${{ hashFiles('**/Cargo.lock') }}
- name: Install Protoc
uses: arduino/setup-protoc@v3
with:
repo-token: ${{ secrets.GITHUB_TOKEN }}
- name: Check
run: |
cargo check --target wasm32-unknown-unknown --manifest-path spog/ui/Cargo.toml
- name: Clippy
run: |
cargo clippy --target wasm32-unknown-unknown --all-targets --all-features --manifest-path spog/ui/Cargo.toml -- -D warnings -D clippy::unwrap_used
ci-frontend-test:
runs-on: ubuntu-22.04
needs:
- formatting
steps:
- uses: actions/checkout@v4
- uses: actions/cache@v4
with:
path: |
~/.cargo/bin/
~/.cargo/.crates.toml
~/.cargo/.crates2.json
~/.cargo/registry/index/
~/.cargo/registry/cache/
~/.cargo/git/db/
target/
spog/ui/target/
key: ${{ runner.os }}-cargo-frontend-test-${{ hashFiles('**/Cargo.lock') }}
- name: Test
run: |
cargo test --manifest-path spog/ui/Cargo.toml
integration:
needs:
- formatting
uses: ./.github/workflows/integration.yaml
unit:
needs:
- formatting
uses: ./.github/workflows/unit.yaml
containers:
needs:
- formatting
uses: ./.github/workflows/containers.yaml
secrets: inherit
with:
imageTag: ci
platforms: "linux/amd64"
helm-test:
runs-on: ubuntu-22.04
needs:
- containers
- helm-lint
env:
CONTAINERS: "trust trust-docs trust-tests"
steps:
- uses: actions/checkout@v4
- uses: azure/[email protected]
- uses: azure/[email protected]
with:
version: ${{ env.HELM_VERSION }}
- name: add helm repositories
working-directory: deploy/k8s
run: |
helm repo add bitnami https://charts.bitnami.com/bitnami
- name: Fetch Helm dependencies
working-directory: deploy/k8s
run: |
helm dependency build charts/trustification-infrastructure
- uses: actions/download-artifact@v4
with:
path: ~/download
- name: Display downloaded content
run: ls -R ~/download
- name: Create Kind cluster
uses: helm/kind-action@v1
with:
config: .github/kind-config.yaml
wait: 120s
- name: Install NGINX ingress controller
run: kubectl apply -f https://raw.githubusercontent.com/kubernetes/ingress-nginx/86f3af8dead82f2d0905dceddeba213751e15b50/deploy/static/provider/kind/deploy.yaml
- name: Wait for NGINX ingress controller
run: |
kubectl wait --namespace ingress-nginx \
--for=condition=ready pod \
--selector=app.kubernetes.io/component=controller \
--timeout=90s
- name: Load containers
run: |
for container in $CONTAINERS; do
kind load image-archive ~/download/${container}-container/${container}-image.tar --name chart-testing
done
- name: Check images
run: |
docker exec -t chart-testing-control-plane crictl images
- name: Set up chart-testing
uses: helm/[email protected]
- name: check nodes
run: kubectl get nodes -o json
- name: Eval app-domain and namespace
run: |
APP_DOMAIN=.$(kubectl get node chart-testing-control-plane -o jsonpath='{.status.addresses[?(@.type == "InternalIP")].address}' | awk '// { print $1 }').nip.io
echo "App domain: $APP_DOMAIN"
echo "APP_DOMAIN=$APP_DOMAIN" >> $GITHUB_ENV
echo "NAMESPACE=trustification" >> $GITHUB_ENV
- name: Create namespace
run: |
kubectl create ns $NAMESPACE
- name: Deploy infrastructure chart first
working-directory: deploy/k8s
run: |
# we use the minikube values file, which works the same way with kind
helm upgrade --install -n $NAMESPACE \
infrastructure charts/trustification-infrastructure \
--wait --timeout 10m \
--values values-minikube.yaml \
--set-string keycloak.ingress.hostname=sso$APP_DOMAIN \
--set-string appDomain=$APP_DOMAIN
- name: Lint chart-testing
run: |
ct lint \
--helm-lint-extra-args "--values deploy/k8s/values-minikube.yaml --set-string appDomain=$APP_DOMAIN" \
--charts deploy/k8s/charts/trustification \
--target-branch ${{ github.event.repository.default_branch }}
- name: Install chart-testing
run: |
ct install \
--helm-extra-set-args "--values deploy/k8s/values-minikube.yaml --set-string appDomain=$APP_DOMAIN --set-string image.version=ci --set-string image.registry=localhost --set workarounds.initCronJobPvcs=true" \
--helm-extra-args "--timeout 10m --debug" \
--namespace $NAMESPACE --charts deploy/k8s/charts/trustification \
--target-branch ${{ github.event.repository.default_branch }}
# A virtual job, referenced by the branch protection rule
ci:
runs-on: ubuntu-22.04
needs:
- unit
- uncommitted
- ci-backend
- ci-frontend-check
- ci-frontend-test
- integration
- helm-test
if: always()
steps:
- name: Success
if: ${{ !(contains(needs.*.result, 'failure')) }}
run: |
echo 🎉
exit 0
- name: Failure
if: ${{ contains(needs.*.result, 'failure') }}
run: |
echo 😥
exit 1