fix: failing test case for creation of communication setting #105
Workflow file for this run
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# This GitHub action can test if the provider has any issues for CRD for latest development | |
name: test | |
on: pull_request | |
jobs: | |
test: | |
permissions: read-all | |
runs-on: ubuntu-latest | |
env: | |
MY_KEY_VAR: ${{ secrets.MY_KEY_VAR }} | |
MY_CONFORMITY_API_KEY: ${{ secrets.MY_CONFORMITY_API_KEY }} | |
MY_AWS_ACCESS_KEY: ${{ secrets.MY_AWS_ACCESS_KEY }} | |
MY_AWS_SECRET_KEY: ${{ secrets.MY_AWS_SECRET_KEY }} | |
MY_PAGERDUTY_TOKEN: ${{ secrets.MY_PAGERDUTY_TOKEN }} | |
LEGACY_API_KEY: ${{ secrets.LEGACY_API_KEY }} | |
LEGACY_AWS_ACCESS_KEY: ${{ secrets.LEGACY_AWS_ACCESS_KEY }} | |
LEGACY_AWS_SECRET_KEY: ${{ secrets.LEGACY_AWS_SECRET_KEY }} | |
steps: | |
- name: Checkout | |
uses: actions/checkout@v3 | |
with: | |
path: main | |
- name: Unshallow | |
run: | | |
cd main | |
git fetch --prune --unshallow | |
cd .. | |
- name: Set up Go | |
uses: actions/setup-go@v3 | |
with: | |
go-version: 1.18 | |
- name: Install Terraform | |
uses: hashicorp/setup-terraform@v2 | |
with: | |
terraform_wrapper: false | |
- name: Create Provider | |
run: | | |
cd main | |
go mod tidy | |
go mod vendor | |
make install | |
cd .. | |
- name: Run Unit Test | |
run: | | |
cd main/conformity | |
TF_ACC=1 go test -v | |
cd ../../ | |
# CPS-659 - Comment out tests until integrations tests are fixed | |
# - | |
# name: Clone the provider pipeline | |
# uses: actions/checkout@v3 | |
# with: | |
# path: pipeline | |
# repository: shunyeka-spl/tf-provider-test-pipeline | |
# token: ${{ secrets.PIPELINE_PAT }} # `PIPELINE_PAT` is a secret that contains PAT | |
# - | |
# name: Prepare The Pipeline | |
# run: | | |
# cd pipeline | |
# sed -i 's,trendmicro/conformity,trendmicro.com/cloudone/conformity,g' provider.tf | |
# cd .. | |
# - | |
# name: Terraform Init | |
# run: | | |
# cd pipeline | |
# terraform init | |
# cd .. | |
# - | |
# name: Terraform Plan | |
# run: | | |
# cd pipeline | |
# terraform plan -var "key=$MY_KEY_VAR" -var "apikey=$MY_CONFORMITY_API_KEY" -var "access_key=$MY_AWS_ACCESS_KEY" -var "secret_key=$MY_AWS_SECRET_KEY" -var "pagerduty_token=$MY_PAGERDUTY_TOKEN" -var "legacy_apikey=$LEGACY_API_KEY" -var "legacy_aws_access_key=$LEGACY_AWS_ACCESS_KEY" -var "legacy_aws_secret_key=$LEGACY_AWS_SECRET_KEY" | |
# cd .. | |
# - | |
# name: Terraform Apply | |
# run: | | |
# cd pipeline | |
# terraform apply --auto-approve -var "key=$MY_KEY_VAR" -var "apikey=$MY_CONFORMITY_API_KEY" -var "access_key=$MY_AWS_ACCESS_KEY" -var "secret_key=$MY_AWS_SECRET_KEY" -var "pagerduty_token=$MY_PAGERDUTY_TOKEN" -var "legacy_apikey=$LEGACY_API_KEY" -var "legacy_aws_access_key=$LEGACY_AWS_ACCESS_KEY" -var "legacy_aws_secret_key=$LEGACY_AWS_SECRET_KEY" | |
# cd .. | |
# - | |
# if: always() | |
# name: Terraform Destroy | |
# run: | | |
# cd pipeline | |
# terraform destroy --auto-approve -var "key=$MY_KEY_VAR" -var "apikey=$MY_CONFORMITY_API_KEY" -var "access_key=$MY_AWS_ACCESS_KEY" -var "secret_key=$MY_AWS_SECRET_KEY" -var "pagerduty_token=$MY_PAGERDUTY_TOKEN" -var "legacy_apikey=$LEGACY_API_KEY" -var "legacy_aws_access_key=$LEGACY_AWS_ACCESS_KEY" -var "legacy_aws_secret_key=$LEGACY_AWS_SECRET_KEY" | |
# cd .. |