-
Notifications
You must be signed in to change notification settings - Fork 2
105 lines (101 loc) · 3.52 KB
/
integration.yml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
name: Integration Tests
# Run either when pushing directly to main/master or in a PR targeting main/master
on:
push:
branches:
- master
- main
pull_request:
branches:
- master
- main
permissions:
id-token: write
contents: read
jobs:
build:
runs-on: ubuntu-latest
strategy:
matrix:
lang: [go, rust]
defaults:
run:
working-directory: ${{matrix.lang}}
steps:
- uses: actions/checkout@v4
- uses: dtolnay/rust-toolchain@stable
if: ${{ matrix.lang == 'rust'}}
- uses: Swatinem/[email protected]
if: ${{ matrix.lang == 'rust'}}
with:
workspaces: ./rust -> target
- uses: actions/setup-go@v5
if: ${{ matrix.lang == 'go'}}
with:
go-version: ">=1.21.0"
cache-dependency-path: go/go.sum
- name: Run build script for compiled languages
run: "./build.sh"
- name: Upload built binaries
uses: actions/upload-artifact@v4
with:
name: ${{matrix.lang}}
path: ${{matrix.lang}}/vault
tests:
needs: build
runs-on: ubuntu-latest
env:
# VAULT_STACK overwrites default 'vault' for vaults
VAULT_STACK: nitor-vault-integration-testing
# at the moment we store to the values to fixed keys so this needs to have limited concurrency
concurrency: "integration-test"
steps:
- name: Configure AWS Credentials
uses: aws-actions/configure-aws-credentials@v4
with:
role-to-assume: ${{ secrets.AWS_CI_ROLE }}
role-session-name: GitHubVaultIntegrationTests
aws-region: eu-west-1
- uses: actions/checkout@v4
- name: Download reports' artifacts
uses: actions/download-artifact@v4
with:
path: bin
- uses: actions/setup-python@v5
with:
python-version: "3.12"
cache: pip
- name: install python vault
run: python -m pip install .
working-directory: python
- name: add execute rights & run --version for all versions
run: |
chmod +x bin/go/vault bin/rust/vault
vault --version
bin/go/vault --version
bin/rust/vault --version
- name: store secret with python
run: vault -s 'secret-python' -v 'sha-${{github.sha}}' -w
- name: store secret with go
run: bin/go/vault -s 'secret-go' -v 'sha-${{github.sha}}' -w
- name: store secret with rust
run: bin/rust/vault -s 'secret-rust' -v 'sha-${{github.sha}}' -w
- name: validate storing worked fine python
run: diff <(vault -l secret-python) <(echo -n sha-${{github.sha}})
- name: validate go and rust secret equality with python
run: diff <(vault -l secret-go) <(vault -l secret-rust)
- name: validate python and rust secret equality with go
run: diff <(bin/go/vault -l secret-rust) <(bin/go/vault -l secret-python)
- name: validate go and python secret equality with rust
run: diff <(bin/rust/vault -l secret-go) <(bin/rust/vault -l secret-python)
- name: delete secret with python
run: vault -d 'secret-python'
- name: delete secret with go
run: bin/go/vault -d 'secret-go'
- name: delete secret with rust
run: bin/rust/vault -d 'secret-rust'
- name: verify that keys have been deleted
run: |
bin/rust/vault --exists secret-python | grep doesn\'t
bin/rust/vault --exists secret-go | grep doesn\'t
bin/rust/vault --exists secret-rust | grep doesn\'t