223 lines
9.4 KiB
YAML
223 lines
9.4 KiB
YAML
name: CrowdSec Integration Tests
|
|
|
|
on:
|
|
workflow_run:
|
|
workflows: ["Docker Build, Publish & Test"]
|
|
types: [completed]
|
|
branches: [main, development, 'feature/**'] # Explicit branch filter prevents unexpected triggers
|
|
# Allow manual trigger for debugging
|
|
workflow_dispatch:
|
|
inputs:
|
|
image_tag:
|
|
description: 'Docker image tag to test (e.g., pr-123-abc1234, latest)'
|
|
required: false
|
|
type: string
|
|
|
|
concurrency:
|
|
group: ${{ github.workflow }}-${{ github.ref }}
|
|
cancel-in-progress: true
|
|
|
|
jobs:
|
|
crowdsec-integration:
|
|
name: CrowdSec Bouncer Integration
|
|
runs-on: ubuntu-latest
|
|
timeout-minutes: 15
|
|
# Only run if docker-build.yml succeeded, or if manually triggered
|
|
if: ${{ github.event.workflow_run.conclusion == 'success' || github.event_name == 'workflow_dispatch' }}
|
|
|
|
steps:
|
|
- uses: actions/checkout@8e8c483db84b4bee98b60c0593521ed34d9990e8 # v6
|
|
|
|
# Determine the correct image tag based on trigger context
|
|
# For PRs: pr-{number}-{sha}, For branches: {sanitized-branch}-{sha}
|
|
- name: Determine image tag
|
|
id: image
|
|
env:
|
|
EVENT: ${{ github.event.workflow_run.event }}
|
|
REF: ${{ github.event.workflow_run.head_branch }}
|
|
SHA: ${{ github.event.workflow_run.head_sha }}
|
|
MANUAL_TAG: ${{ inputs.image_tag }}
|
|
run: |
|
|
# Manual trigger uses provided tag
|
|
if [[ "${{ github.event_name }}" == "workflow_dispatch" ]]; then
|
|
if [[ -n "$MANUAL_TAG" ]]; then
|
|
echo "tag=${MANUAL_TAG}" >> $GITHUB_OUTPUT
|
|
else
|
|
# Default to latest if no tag provided
|
|
echo "tag=latest" >> $GITHUB_OUTPUT
|
|
fi
|
|
echo "source_type=manual" >> $GITHUB_OUTPUT
|
|
exit 0
|
|
fi
|
|
|
|
# Extract 7-character short SHA
|
|
SHORT_SHA=$(echo "$SHA" | cut -c1-7)
|
|
|
|
if [[ "$EVENT" == "pull_request" ]]; then
|
|
# Use native pull_requests array (no API calls needed)
|
|
PR_NUM=$(echo '${{ toJson(github.event.workflow_run.pull_requests) }}' | jq -r '.[0].number')
|
|
|
|
if [[ -z "$PR_NUM" || "$PR_NUM" == "null" ]]; then
|
|
echo "❌ ERROR: Could not determine PR number"
|
|
echo "Event: $EVENT"
|
|
echo "Ref: $REF"
|
|
echo "SHA: $SHA"
|
|
echo "Pull Requests JSON: ${{ toJson(github.event.workflow_run.pull_requests) }}"
|
|
exit 1
|
|
fi
|
|
|
|
# Immutable tag with SHA suffix prevents race conditions
|
|
echo "tag=pr-${PR_NUM}-${SHORT_SHA}" >> $GITHUB_OUTPUT
|
|
echo "source_type=pr" >> $GITHUB_OUTPUT
|
|
else
|
|
# Branch push: sanitize branch name and append SHA
|
|
# Sanitization: lowercase, replace / with -, remove special chars
|
|
SANITIZED=$(echo "$REF" | \
|
|
tr '[:upper:]' '[:lower:]' | \
|
|
tr '/' '-' | \
|
|
sed 's/[^a-z0-9-._]/-/g' | \
|
|
sed 's/^-//; s/-$//' | \
|
|
sed 's/--*/-/g' | \
|
|
cut -c1-121) # Leave room for -SHORT_SHA (7 chars)
|
|
|
|
echo "tag=${SANITIZED}-${SHORT_SHA}" >> $GITHUB_OUTPUT
|
|
echo "source_type=branch" >> $GITHUB_OUTPUT
|
|
fi
|
|
|
|
echo "sha=${SHORT_SHA}" >> $GITHUB_OUTPUT
|
|
echo "Determined image tag: $(cat $GITHUB_OUTPUT | grep tag=)"
|
|
|
|
# Pull image from registry with retry logic (dual-source strategy)
|
|
# Try registry first (fast), fallback to artifact if registry fails
|
|
- name: Pull Docker image from registry
|
|
id: pull_image
|
|
uses: nick-fields/retry@v3
|
|
with:
|
|
timeout_minutes: 5
|
|
max_attempts: 3
|
|
retry_wait_seconds: 10
|
|
command: |
|
|
IMAGE_NAME="ghcr.io/${{ github.repository_owner }}/charon:${{ steps.image.outputs.tag }}"
|
|
echo "Pulling image: $IMAGE_NAME"
|
|
docker pull "$IMAGE_NAME"
|
|
docker tag "$IMAGE_NAME" charon:local
|
|
echo "✅ Successfully pulled from registry"
|
|
continue-on-error: true
|
|
|
|
# Fallback: Download artifact if registry pull failed
|
|
- name: Fallback to artifact download
|
|
if: steps.pull_image.outcome == 'failure'
|
|
env:
|
|
GH_TOKEN: ${{ secrets.GITHUB_TOKEN }}
|
|
SHA: ${{ steps.image.outputs.sha }}
|
|
run: |
|
|
echo "⚠️ Registry pull failed, falling back to artifact..."
|
|
|
|
# Determine artifact name based on source type
|
|
if [[ "${{ steps.image.outputs.source_type }}" == "pr" ]]; then
|
|
PR_NUM=$(echo '${{ toJson(github.event.workflow_run.pull_requests) }}' | jq -r '.[0].number')
|
|
ARTIFACT_NAME="pr-image-${PR_NUM}"
|
|
else
|
|
ARTIFACT_NAME="push-image"
|
|
fi
|
|
|
|
echo "Downloading artifact: $ARTIFACT_NAME"
|
|
gh run download ${{ github.event.workflow_run.id }} \
|
|
--name "$ARTIFACT_NAME" \
|
|
--dir /tmp/docker-image || {
|
|
echo "❌ ERROR: Artifact download failed!"
|
|
echo "Available artifacts:"
|
|
gh run view ${{ github.event.workflow_run.id }} --json artifacts --jq '.artifacts[].name'
|
|
exit 1
|
|
}
|
|
|
|
docker load < /tmp/docker-image/charon-image.tar
|
|
docker tag $(docker images --format "{{.Repository}}:{{.Tag}}" | head -1) charon:local
|
|
echo "✅ Successfully loaded from artifact"
|
|
|
|
# Validate image freshness by checking SHA label
|
|
- name: Validate image SHA
|
|
env:
|
|
SHA: ${{ steps.image.outputs.sha }}
|
|
run: |
|
|
LABEL_SHA=$(docker inspect charon:local --format '{{index .Config.Labels "org.opencontainers.image.revision"}}' | cut -c1-7)
|
|
echo "Expected SHA: $SHA"
|
|
echo "Image SHA: $LABEL_SHA"
|
|
|
|
if [[ "$LABEL_SHA" != "$SHA" ]]; then
|
|
echo "⚠️ WARNING: Image SHA mismatch!"
|
|
echo "Image may be stale. Proceeding with caution..."
|
|
else
|
|
echo "✅ Image SHA matches expected commit"
|
|
fi
|
|
|
|
- name: Run CrowdSec integration tests
|
|
id: crowdsec-test
|
|
run: |
|
|
chmod +x .github/skills/scripts/skill-runner.sh
|
|
.github/skills/scripts/skill-runner.sh integration-test-crowdsec 2>&1 | tee crowdsec-test-output.txt
|
|
exit ${PIPESTATUS[0]}
|
|
|
|
- name: Dump Debug Info on Failure
|
|
if: failure()
|
|
run: |
|
|
echo "## 🔍 Debug Information" >> $GITHUB_STEP_SUMMARY
|
|
echo "" >> $GITHUB_STEP_SUMMARY
|
|
|
|
echo "### Container Status" >> $GITHUB_STEP_SUMMARY
|
|
echo '```' >> $GITHUB_STEP_SUMMARY
|
|
docker ps -a --filter "name=charon" --filter "name=crowdsec" >> $GITHUB_STEP_SUMMARY 2>&1 || true
|
|
echo '```' >> $GITHUB_STEP_SUMMARY
|
|
echo "" >> $GITHUB_STEP_SUMMARY
|
|
|
|
echo "### CrowdSec LAPI Status" >> $GITHUB_STEP_SUMMARY
|
|
echo '```' >> $GITHUB_STEP_SUMMARY
|
|
docker exec crowdsec cscli bouncers list 2>/dev/null >> $GITHUB_STEP_SUMMARY || echo "Could not retrieve bouncer list" >> $GITHUB_STEP_SUMMARY
|
|
echo '```' >> $GITHUB_STEP_SUMMARY
|
|
echo "" >> $GITHUB_STEP_SUMMARY
|
|
|
|
echo "### CrowdSec Decisions" >> $GITHUB_STEP_SUMMARY
|
|
echo '```' >> $GITHUB_STEP_SUMMARY
|
|
docker exec crowdsec cscli decisions list 2>/dev/null >> $GITHUB_STEP_SUMMARY || echo "Could not retrieve decisions" >> $GITHUB_STEP_SUMMARY
|
|
echo '```' >> $GITHUB_STEP_SUMMARY
|
|
echo "" >> $GITHUB_STEP_SUMMARY
|
|
|
|
echo "### Charon Container Logs (last 100 lines)" >> $GITHUB_STEP_SUMMARY
|
|
echo '```' >> $GITHUB_STEP_SUMMARY
|
|
docker logs charon-debug 2>&1 | tail -100 >> $GITHUB_STEP_SUMMARY || echo "No container logs available" >> $GITHUB_STEP_SUMMARY
|
|
echo '```' >> $GITHUB_STEP_SUMMARY
|
|
echo "" >> $GITHUB_STEP_SUMMARY
|
|
|
|
echo "### CrowdSec Container Logs (last 50 lines)" >> $GITHUB_STEP_SUMMARY
|
|
echo '```' >> $GITHUB_STEP_SUMMARY
|
|
docker logs crowdsec 2>&1 | tail -50 >> $GITHUB_STEP_SUMMARY || echo "No CrowdSec logs available" >> $GITHUB_STEP_SUMMARY
|
|
echo '```' >> $GITHUB_STEP_SUMMARY
|
|
|
|
- name: CrowdSec Integration Summary
|
|
if: always()
|
|
run: |
|
|
echo "## 🛡️ CrowdSec Integration Test Results" >> $GITHUB_STEP_SUMMARY
|
|
if [ "${{ steps.crowdsec-test.outcome }}" == "success" ]; then
|
|
echo "✅ **All CrowdSec tests passed**" >> $GITHUB_STEP_SUMMARY
|
|
echo "" >> $GITHUB_STEP_SUMMARY
|
|
echo "### Test Results:" >> $GITHUB_STEP_SUMMARY
|
|
echo '```' >> $GITHUB_STEP_SUMMARY
|
|
grep -E "^✓|^===|^Pull|^Apply" crowdsec-test-output.txt || echo "See logs for details"
|
|
grep -E "^✓|^===|^Pull|^Apply" crowdsec-test-output.txt >> $GITHUB_STEP_SUMMARY || echo "See logs for details" >> $GITHUB_STEP_SUMMARY
|
|
echo '```' >> $GITHUB_STEP_SUMMARY
|
|
else
|
|
echo "❌ **CrowdSec tests failed**" >> $GITHUB_STEP_SUMMARY
|
|
echo "" >> $GITHUB_STEP_SUMMARY
|
|
echo "### Failure Details:" >> $GITHUB_STEP_SUMMARY
|
|
echo '```' >> $GITHUB_STEP_SUMMARY
|
|
grep -E "^✗|Unexpected|Error|failed|FAIL" crowdsec-test-output.txt | head -20 >> $GITHUB_STEP_SUMMARY || echo "See logs for details" >> $GITHUB_STEP_SUMMARY
|
|
echo '```' >> $GITHUB_STEP_SUMMARY
|
|
fi
|
|
|
|
- name: Cleanup
|
|
if: always()
|
|
run: |
|
|
docker rm -f charon-debug || true
|
|
docker rm -f crowdsec || true
|
|
docker network rm containers_default || true
|