feat/default-values #23
48
.gitea/workflows/e2e-tests-consul.yml
Normal file
48
.gitea/workflows/e2e-tests-consul.yml
Normal file
@ -0,0 +1,48 @@
|
|||||||
|
---
|
||||||
|
name: test
|
||||||
|
on:
|
||||||
|
pull_request:
|
||||||
|
types:
|
||||||
|
- opened
|
||||||
|
- edited
|
||||||
|
- synchronize
|
||||||
|
branches:
|
||||||
|
- main
|
||||||
|
paths:
|
||||||
|
- roles/consul/**
|
||||||
|
|
||||||
|
jobs:
|
||||||
|
retrieve-credentials:
|
||||||
|
name: Retrieve Credentials
|
||||||
|
runs-on: ubuntu-latest
|
||||||
|
outputs:
|
||||||
|
registry-username: ${{ steps.import-secrets.outputs.GITEA_ACTIONS_USERNAME }}
|
||||||
|
registry-token: ${{ steps.import-secrets.outputs.GITEA_ACTIONS_TOKEN }}
|
||||||
|
steps:
|
||||||
|
- name: Get secrets from vault
|
||||||
|
id: import-secrets
|
||||||
|
uses: hashicorp/vault-action@v3
|
||||||
|
with:
|
||||||
|
url: "https://vault.ednz.fr"
|
||||||
|
method: approle
|
||||||
|
roleId: ${{ secrets.VAULT_APPROLE_ID }}
|
||||||
|
secretId: ${{ secrets.VAULT_APPROLE_SECRET_ID }}
|
||||||
|
secrets: |
|
||||||
|
kv/data/applications/gitea/users/actions username | GITEA_ACTIONS_USERNAME ;
|
||||||
|
kv/data/applications/gitea/users/actions token_write | GITEA_ACTIONS_TOKEN ;
|
||||||
|
|
||||||
|
end_to_end_vault:
|
||||||
|
needs: retrieve-credentials
|
||||||
|
strategy:
|
||||||
|
matrix:
|
||||||
|
test_os:
|
||||||
|
["debian11", "debian12", "ubuntu2004", "ubuntu2204", "ubuntu2404"]
|
||||||
|
scenario: ["consul_default", "consul_with_acl_enabled"]
|
||||||
|
uses: ./.gitea/workflows/e2e-tests.yml
|
||||||
|
with:
|
||||||
|
role: vault
|
||||||
|
scenario: ${{ matrix.scenario }}
|
||||||
|
test_os: ${{ matrix.test_os }}
|
||||||
|
secrets:
|
||||||
|
GITEA_ACTIONS_USERNAME: ${{ needs.retrieve-credentials.outputs.registry-username }}
|
||||||
|
GITEA_ACTIONS_TOKEN: ${{ needs.retrieve-credentials.outputs.registry-token }}
|
48
.gitea/workflows/e2e-tests-nomad.yml
Normal file
48
.gitea/workflows/e2e-tests-nomad.yml
Normal file
@ -0,0 +1,48 @@
|
|||||||
|
---
|
||||||
|
name: test
|
||||||
|
on:
|
||||||
|
pull_request:
|
||||||
|
types:
|
||||||
|
- opened
|
||||||
|
- edited
|
||||||
|
- synchronize
|
||||||
|
branches:
|
||||||
|
- main
|
||||||
|
paths:
|
||||||
|
- roles/nomad/**
|
||||||
|
|
||||||
|
jobs:
|
||||||
|
retrieve-credentials:
|
||||||
|
name: Retrieve Credentials
|
||||||
|
runs-on: ubuntu-latest
|
||||||
|
outputs:
|
||||||
|
registry-username: ${{ steps.import-secrets.outputs.GITEA_ACTIONS_USERNAME }}
|
||||||
|
registry-token: ${{ steps.import-secrets.outputs.GITEA_ACTIONS_TOKEN }}
|
||||||
|
steps:
|
||||||
|
- name: Get secrets from vault
|
||||||
|
id: import-secrets
|
||||||
|
uses: hashicorp/vault-action@v3
|
||||||
|
with:
|
||||||
|
url: "https://vault.ednz.fr"
|
||||||
|
method: approle
|
||||||
|
roleId: ${{ secrets.VAULT_APPROLE_ID }}
|
||||||
|
secretId: ${{ secrets.VAULT_APPROLE_SECRET_ID }}
|
||||||
|
secrets: |
|
||||||
|
kv/data/applications/gitea/users/actions username | GITEA_ACTIONS_USERNAME ;
|
||||||
|
kv/data/applications/gitea/users/actions token_write | GITEA_ACTIONS_TOKEN ;
|
||||||
|
|
||||||
|
end_to_end_vault:
|
||||||
|
needs: retrieve-credentials
|
||||||
|
strategy:
|
||||||
|
matrix:
|
||||||
|
test_os:
|
||||||
|
["debian11", "debian12", "ubuntu2004", "ubuntu2204", "ubuntu2404"]
|
||||||
|
scenario: ["nomad_default", "nomad_with_acl_enabled"]
|
||||||
|
uses: ./.gitea/workflows/e2e-tests.yml
|
||||||
|
with:
|
||||||
|
role: vault
|
||||||
|
scenario: ${{ matrix.scenario }}
|
||||||
|
test_os: ${{ matrix.test_os }}
|
||||||
|
secrets:
|
||||||
|
GITEA_ACTIONS_USERNAME: ${{ needs.retrieve-credentials.outputs.registry-username }}
|
||||||
|
GITEA_ACTIONS_TOKEN: ${{ needs.retrieve-credentials.outputs.registry-token }}
|
@ -8,8 +8,9 @@ on:
|
|||||||
- synchronize
|
- synchronize
|
||||||
branches:
|
branches:
|
||||||
- main
|
- main
|
||||||
# paths:
|
paths:
|
||||||
# - roles/vault/**
|
- roles/vault/**
|
||||||
|
- plugins/modules/vault_unseal.py
|
||||||
|
|
||||||
jobs:
|
jobs:
|
||||||
retrieve-credentials:
|
retrieve-credentials:
|
||||||
|
Loading…
Reference in New Issue
Block a user