Skip to content

chore: bump aquasecurity/trivy-action from 0.27.0 to 0.28.0 #907

chore: bump aquasecurity/trivy-action from 0.27.0 to 0.28.0

chore: bump aquasecurity/trivy-action from 0.27.0 to 0.28.0 #907

Workflow file for this run

name: e2e-test
on:
push:
branches:
- "*"
pull_request:
permissions:
contents: read
jobs:
e2e-test:
runs-on: ubuntu-22.04
strategy:
fail-fast: false
matrix:
arrays:
[
{
node: "v1.22.17",
digest: "f5b2e5698c6c9d6d0adc419c0deae21a425c07d81bbf3b6a6834042f25d4fba2",
},
{
node: "v1.23.17",
digest: "14d0a9a892b943866d7e6be119a06871291c517d279aedb816a4b4bc0ec0a5b3",
},
{
node: "v1.24.17",
digest: "bad10f9b98d54586cba05a7eaa1b61c6b90bfc4ee174fdc43a7b75ca75c95e51",
},
{
node: "v1.25.16",
digest: "5da57dfc290ac3599e775e63b8b6c49c0c85d3fec771cd7d55b45fae14b38d3b",
},
{
node: "v1.26.15",
digest: "84333e26cae1d70361bb7339efb568df1871419f2019c80f9a12b7e2d485fe19",
},
{
node: "v1.27.13",
digest: "17439fa5b32290e3ead39ead1250dca1d822d94a10d26f1981756cd51b24b9d8",
},
{
node: "v1.28.9",
digest: "dca54bc6a6079dd34699d53d7d4ffa2e853e46a20cd12d619a09207e35300bd0",
},
{
node: "v1.29.4",
digest: "3abb816a5b1061fb15c6e9e60856ec40d56b7b52bcea5f5f1350bc6e2320b6f8",
},
{
node: "v1.30.0",
digest: "047357ac0cfea04663786a612ba1eaba9702bef25227a794b52890dd8bcd692e",
},
{
node: "v1.31.0",
digest: "53df588e04085fd41ae12de0c3fe4c72f7013bba32a20e7325357a1ac94ba865",
},
]
install-mode:
- ha
- standalone
steps:
- name: Check out code into the Go module directory
uses: actions/checkout@v4
with:
fetch-depth: 0
- name: Set up kubectl
uses: azure/setup-kubectl@v4
with:
version: ${{ matrix.arrays.node }}
- name: Set up QEMU
uses: docker/setup-qemu-action@v3.2.0
- name: Set up Docker Buildx
uses: docker/setup-buildx-action@v3.7.1
- name: Build Container Image
uses: docker/build-push-action@v6.9.0
with:
context: .
file: ./Dockerfile
load: true
platforms: linux/amd64
provenance: false
push: false
tags: ghcr.io/${{ github.repository }}:ci
- name: Set up KinD
uses: engineerd/setup-kind@v0.5.0
with:
config: ./hack/e2e-kind-config.yaml
image: docker.io/kindest/node@sha256:${{ matrix.arrays.digest }}
version: "v0.23.0"
- name: Wait for KiND readiness
run: |
kubectl --namespace kube-system wait --for=condition=ready pod -l tier=control-plane --timeout=300s
kubectl get nodes -o wide
- name: Load image on the nodes of the KinD
run: |
kind load docker-image ghcr.io/${{ github.repository }}:ci
- name: Patch Install Manifests
run: |
sed -i -e 's@imagePullPolicy: Always@imagePullPolicy: IfNotPresent@g' ./deploy/${{ matrix.install-mode }}-install.yaml
sed -i -e 's@image: .*@image: ghcr.io/${{ github.repository }}:ci@g' ./deploy/${{ matrix.install-mode }}-install.yaml
- name: Deploy Application
id: deployment
run: |
kubectl apply -f ./deploy/${{ matrix.install-mode }}-install.yaml
count=0
until [[ $(kubectl --namespace kubelet-serving-cert-approver get pod --selector app.kubernetes.io/name=kubelet-serving-cert-approver 2>/dev/null) ]]; do
count=$((count + 1))
if [[ "${count}" -eq "150" ]]; then
echo 'Wait Timeout exceeded' >&3
return 1
fi
sleep 2
done
kubectl --namespace kubelet-serving-cert-approver wait --for=condition=ready pod --selector app.kubernetes.io/name=kubelet-serving-cert-approver --timeout=300s
- name: Get deployment failure logs
if: ${{ failure() && steps.deployment.outputs.exit_code != 0 }}
run: |
kubectl --namespace kubelet-serving-cert-approver get events
kubectl --namespace kubelet-serving-cert-approver describe deployments kubelet-serving-cert-approver
- name: Set up Go
uses: actions/setup-go@v5
with:
cache: true
go-version: 1.23.1
- name: Test Approved Certificate Signing Requests
run: go test -tags=e2e -v ./e2e
- name: Get Application logs
if: ${{ always() }}
run: |
kubectl --namespace kubelet-serving-cert-approver logs --selector app.kubernetes.io/name=kubelet-serving-cert-approver --prefix