From 26344cf590ee7c046670ec3ec4d1eb6781a9df2a Mon Sep 17 00:00:00 2001 From: Nick Irvine <115657443+nfi-hashicorp@users.noreply.github.com> Date: Fri, 21 Jul 2023 14:41:15 -0700 Subject: [PATCH] disable other tests --- .github/workflows/go-tests.yml | 722 +++++++++++++++++---------------- 1 file changed, 362 insertions(+), 360 deletions(-) diff --git a/.github/workflows/go-tests.yml b/.github/workflows/go-tests.yml index c29322c97808..c307a276e74b 100644 --- a/.github/workflows/go-tests.yml +++ b/.github/workflows/go-tests.yml @@ -38,142 +38,142 @@ jobs: name: Setup outputs run: ./.github/scripts/get_runner_classes.sh - check-go-mod: - needs: - - setup - uses: ./.github/workflows/reusable-check-go-mod.yml - with: - runs-on: ${{ needs.setup.outputs.compute-small }} - repository-name: ${{ github.repository }} - secrets: - elevated-github-token: ${{ secrets.ELEVATED_GITHUB_TOKEN }} + # check-go-mod: + # needs: + # - setup + # uses: ./.github/workflows/reusable-check-go-mod.yml + # with: + # runs-on: ${{ needs.setup.outputs.compute-small }} + # repository-name: ${{ github.repository }} + # secrets: + # elevated-github-token: ${{ secrets.ELEVATED_GITHUB_TOKEN }} - check-generated-protobuf: - needs: - - setup - runs-on: ${{ fromJSON(needs.setup.outputs.compute-medium) }} - steps: - - uses: actions/checkout@c85c95e3d7251135ab7dc9ce3241c5835cc595a9 # v3.5.3 - # NOTE: This step is specifically needed for ENT. It allows us to access the required private HashiCorp repos. - - name: Setup Git - if: ${{ endsWith(github.repository, '-enterprise') }} - run: git config --global url."https://${{ secrets.ELEVATED_GITHUB_TOKEN }}:@github.com".insteadOf "https://github.com" - - uses: actions/setup-go@fac708d6674e30b6ba41289acaab6d4b75aa0753 # v4.0.1 - with: - go-version-file: 'go.mod' - - run: make proto-tools - name: Install protobuf - - run: make proto-format - name: "Protobuf Format" - - run: make --always-make proto - - run: | - if ! git diff --exit-code; then - echo "Generated code was not updated correctly" - exit 1 - fi - - run: make proto-lint - name: "Protobuf Lint" - - name: Notify Slack - if: ${{ failure() }} - run: .github/scripts/notify_slack.sh - check-generated-deep-copy: - needs: - - setup - runs-on: ${{ fromJSON(needs.setup.outputs.compute-large) }} - steps: - - uses: actions/checkout@c85c95e3d7251135ab7dc9ce3241c5835cc595a9 # v3.5.3 - # NOTE: This step is specifically needed for ENT. It allows us to access the required private HashiCorp repos. - - name: Setup Git - if: ${{ endsWith(github.repository, '-enterprise') }} - run: git config --global url."https://${{ secrets.ELEVATED_GITHUB_TOKEN }}:@github.com".insteadOf "https://github.com" - - uses: actions/setup-go@fac708d6674e30b6ba41289acaab6d4b75aa0753 # v4.0.1 - with: - go-version-file: 'go.mod' - - run: make --always-make deep-copy - - run: | - if ! git diff --exit-code; then - echo "Generated code was not updated correctly" - exit 1 - fi - - name: Notify Slack - if: ${{ failure() }} - run: .github/scripts/notify_slack.sh - - lint-enums: - needs: - - setup - runs-on: ${{ fromJSON(needs.setup.outputs.compute-large) }} - steps: - - uses: actions/checkout@c85c95e3d7251135ab7dc9ce3241c5835cc595a9 # v3.5.3 - # NOTE: This step is specifically needed for ENT. It allows us to access the required private HashiCorp repos. - - name: Setup Git - if: ${{ endsWith(github.repository, '-enterprise') }} - run: git config --global url."https://${{ secrets.ELEVATED_GITHUB_TOKEN }}:@github.com".insteadOf "https://github.com" - - uses: actions/setup-go@fac708d6674e30b6ba41289acaab6d4b75aa0753 # v4.0.1 - with: - go-version-file: 'go.mod' - cache: false - - run: go install github.com/reillywatson/enumcover/cmd/enumcover@master && enumcover ./... - - name: Notify Slack - if: ${{ failure() }} - run: .github/scripts/notify_slack.sh - - - lint-container-test-deps: - needs: - - setup - runs-on: ${{ fromJSON(needs.setup.outputs.compute-small) }} - steps: - - uses: actions/checkout@c85c95e3d7251135ab7dc9ce3241c5835cc595a9 # v3.5.3 - # NOTE: This step is specifically needed for ENT. It allows us to access the required private HashiCorp repos. - - name: Setup Git - run: git config --global url."https://${{ secrets.ELEVATED_GITHUB_TOKEN }}:@github.com".insteadOf "https://github.com" - - uses: actions/setup-go@fac708d6674e30b6ba41289acaab6d4b75aa0753 # v4.0.1 - with: - go-version-file: 'go.mod' - - run: make lint-container-test-deps - - name: Notify Slack - if: ${{ failure() }} - run: .github/scripts/notify_slack.sh - - lint-consul-retry: - needs: - - setup - runs-on: ${{ fromJSON(needs.setup.outputs.compute-small) }} - steps: - - uses: actions/checkout@c85c95e3d7251135ab7dc9ce3241c5835cc595a9 # v3.5.3 - # NOTE: This step is specifically needed for ENT. It allows us to access the required private HashiCorp repos. - - name: Setup Git - if: ${{ endsWith(github.repository, '-enterprise') }} - run: git config --global url."https://${{ secrets.ELEVATED_GITHUB_TOKEN }}:@github.com".insteadOf "https://github.com" - - uses: actions/setup-go@fac708d6674e30b6ba41289acaab6d4b75aa0753 # v4.0.1 - with: - go-version-file: 'go.mod' - - run: go install github.com/hashicorp/lint-consul-retry@master && lint-consul-retry - - name: Notify Slack - if: ${{ failure() }} - run: .github/scripts/notify_slack.sh - - lint: - needs: - - setup - uses: ./.github/workflows/reusable-lint.yml - with: - runs-on: ${{ needs.setup.outputs.compute-xl }} - repository-name: ${{ github.repository }} - secrets: - elevated-github-token: ${{ secrets.ELEVATED_GITHUB_TOKEN }} + # check-generated-protobuf: + # needs: + # - setup + # runs-on: ${{ fromJSON(needs.setup.outputs.compute-medium) }} + # steps: + # - uses: actions/checkout@c85c95e3d7251135ab7dc9ce3241c5835cc595a9 # v3.5.3 + # # NOTE: This step is specifically needed for ENT. It allows us to access the required private HashiCorp repos. + # - name: Setup Git + # if: ${{ endsWith(github.repository, '-enterprise') }} + # run: git config --global url."https://${{ secrets.ELEVATED_GITHUB_TOKEN }}:@github.com".insteadOf "https://github.com" + # - uses: actions/setup-go@fac708d6674e30b6ba41289acaab6d4b75aa0753 # v4.0.1 + # with: + # go-version-file: 'go.mod' + # - run: make proto-tools + # name: Install protobuf + # - run: make proto-format + # name: "Protobuf Format" + # - run: make --always-make proto + # - run: | + # if ! git diff --exit-code; then + # echo "Generated code was not updated correctly" + # exit 1 + # fi + # - run: make proto-lint + # name: "Protobuf Lint" + # - name: Notify Slack + # if: ${{ failure() }} + # run: .github/scripts/notify_slack.sh + # check-generated-deep-copy: + # needs: + # - setup + # runs-on: ${{ fromJSON(needs.setup.outputs.compute-large) }} + # steps: + # - uses: actions/checkout@c85c95e3d7251135ab7dc9ce3241c5835cc595a9 # v3.5.3 + # # NOTE: This step is specifically needed for ENT. It allows us to access the required private HashiCorp repos. + # - name: Setup Git + # if: ${{ endsWith(github.repository, '-enterprise') }} + # run: git config --global url."https://${{ secrets.ELEVATED_GITHUB_TOKEN }}:@github.com".insteadOf "https://github.com" + # - uses: actions/setup-go@fac708d6674e30b6ba41289acaab6d4b75aa0753 # v4.0.1 + # with: + # go-version-file: 'go.mod' + # - run: make --always-make deep-copy + # - run: | + # if ! git diff --exit-code; then + # echo "Generated code was not updated correctly" + # exit 1 + # fi + # - name: Notify Slack + # if: ${{ failure() }} + # run: .github/scripts/notify_slack.sh + + # lint-enums: + # needs: + # - setup + # runs-on: ${{ fromJSON(needs.setup.outputs.compute-large) }} + # steps: + # - uses: actions/checkout@c85c95e3d7251135ab7dc9ce3241c5835cc595a9 # v3.5.3 + # # NOTE: This step is specifically needed for ENT. It allows us to access the required private HashiCorp repos. + # - name: Setup Git + # if: ${{ endsWith(github.repository, '-enterprise') }} + # run: git config --global url."https://${{ secrets.ELEVATED_GITHUB_TOKEN }}:@github.com".insteadOf "https://github.com" + # - uses: actions/setup-go@fac708d6674e30b6ba41289acaab6d4b75aa0753 # v4.0.1 + # with: + # go-version-file: 'go.mod' + # cache: false + # - run: go install github.com/reillywatson/enumcover/cmd/enumcover@master && enumcover ./... + # - name: Notify Slack + # if: ${{ failure() }} + # run: .github/scripts/notify_slack.sh + + + # lint-container-test-deps: + # needs: + # - setup + # runs-on: ${{ fromJSON(needs.setup.outputs.compute-small) }} + # steps: + # - uses: actions/checkout@c85c95e3d7251135ab7dc9ce3241c5835cc595a9 # v3.5.3 + # # NOTE: This step is specifically needed for ENT. It allows us to access the required private HashiCorp repos. + # - name: Setup Git + # run: git config --global url."https://${{ secrets.ELEVATED_GITHUB_TOKEN }}:@github.com".insteadOf "https://github.com" + # - uses: actions/setup-go@fac708d6674e30b6ba41289acaab6d4b75aa0753 # v4.0.1 + # with: + # go-version-file: 'go.mod' + # - run: make lint-container-test-deps + # - name: Notify Slack + # if: ${{ failure() }} + # run: .github/scripts/notify_slack.sh + + # lint-consul-retry: + # needs: + # - setup + # runs-on: ${{ fromJSON(needs.setup.outputs.compute-small) }} + # steps: + # - uses: actions/checkout@c85c95e3d7251135ab7dc9ce3241c5835cc595a9 # v3.5.3 + # # NOTE: This step is specifically needed for ENT. It allows us to access the required private HashiCorp repos. + # - name: Setup Git + # if: ${{ endsWith(github.repository, '-enterprise') }} + # run: git config --global url."https://${{ secrets.ELEVATED_GITHUB_TOKEN }}:@github.com".insteadOf "https://github.com" + # - uses: actions/setup-go@fac708d6674e30b6ba41289acaab6d4b75aa0753 # v4.0.1 + # with: + # go-version-file: 'go.mod' + # - run: go install github.com/hashicorp/lint-consul-retry@master && lint-consul-retry + # - name: Notify Slack + # if: ${{ failure() }} + # run: .github/scripts/notify_slack.sh + + # lint: + # needs: + # - setup + # uses: ./.github/workflows/reusable-lint.yml + # with: + # runs-on: ${{ needs.setup.outputs.compute-xl }} + # repository-name: ${{ github.repository }} + # secrets: + # elevated-github-token: ${{ secrets.ELEVATED_GITHUB_TOKEN }} - lint-32bit: - needs: - - setup - uses: ./.github/workflows/reusable-lint.yml - with: - go-arch: "386" - runs-on: ${{ needs.setup.outputs.compute-xl }} - repository-name: ${{ github.repository }} - secrets: - elevated-github-token: ${{ secrets.ELEVATED_GITHUB_TOKEN }} + # lint-32bit: + # needs: + # - setup + # uses: ./.github/workflows/reusable-lint.yml + # with: + # go-arch: "386" + # runs-on: ${{ needs.setup.outputs.compute-xl }} + # repository-name: ${{ github.repository }} + # secrets: + # elevated-github-token: ${{ secrets.ELEVATED_GITHUB_TOKEN }} # TODO: matrix? @@ -210,19 +210,19 @@ jobs: secrets: elevated-github-token: ${{ secrets.ELEVATED_GITHUB_TOKEN }} - dev-build-s390x: - if: ${{ endsWith(github.repository, '-enterprise') }} - needs: - - setup - uses: ./.github/workflows/reusable-dev-build.yml - with: - uploaded-binary-name: 'consul-bin-s390x' - runs-on: ${{ needs.setup.outputs.compute-xl }} - go-arch: "s390x" - repository-name: ${{ github.repository }} - # TODO: cachekey - secrets: - elevated-github-token: ${{ secrets.ELEVATED_GITHUB_TOKEN }} + # dev-build-s390x: + # if: ${{ endsWith(github.repository, '-enterprise') }} + # needs: + # - setup + # uses: ./.github/workflows/reusable-dev-build.yml + # with: + # uploaded-binary-name: 'consul-bin-s390x' + # runs-on: ${{ needs.setup.outputs.compute-xl }} + # go-arch: "s390x" + # repository-name: ${{ github.repository }} + # # TODO: cachekey + # secrets: + # elevated-github-token: ${{ secrets.ELEVATED_GITHUB_TOKEN }} # dev-build-arm64: # # only run on enterprise because GHA does not have arm64 runners in OSS @@ -278,210 +278,210 @@ jobs: consul-license: ${{secrets.CONSUL_LICENSE}} datadog-api-key: "${{ !endsWith(github.repository, '-enterprise') && secrets.DATADOG_API_KEY || '' }}" - go-test-enterprise: - if: ${{ endsWith(github.repository, '-enterprise') }} - needs: - - setup - - go-mod-download_root - - dev-build - uses: ./.github/workflows/reusable-unit-split.yml - with: - directory: . - runner-count: 12 - runs-on: ${{ needs.setup.outputs.compute-xl }} - repository-name: ${{ github.repository }} - go-tags: "${{ github.event.repository.name == 'consul-enterprise' && 'consulent consulprem consuldev' || '' }}" - cachekey_GOMODCACHE: "${{ needs.go-mod-download_root.outputs.cachekey_GOMODCACHE }}" - permissions: - id-token: write # NOTE: this permission is explicitly required for Vault auth. - contents: read - secrets: - elevated-github-token: ${{ secrets.ELEVATED_GITHUB_TOKEN }} - consul-license: ${{secrets.CONSUL_LICENSE}} - datadog-api-key: "${{ !endsWith(github.repository, '-enterprise') && secrets.DATADOG_API_KEY || '' }}" + # go-test-enterprise: + # if: ${{ endsWith(github.repository, '-enterprise') }} + # needs: + # - setup + # - go-mod-download_root + # - dev-build + # uses: ./.github/workflows/reusable-unit-split.yml + # with: + # directory: . + # runner-count: 12 + # runs-on: ${{ needs.setup.outputs.compute-xl }} + # repository-name: ${{ github.repository }} + # go-tags: "${{ github.event.repository.name == 'consul-enterprise' && 'consulent consulprem consuldev' || '' }}" + # cachekey_GOMODCACHE: "${{ needs.go-mod-download_root.outputs.cachekey_GOMODCACHE }}" + # permissions: + # id-token: write # NOTE: this permission is explicitly required for Vault auth. + # contents: read + # secrets: + # elevated-github-token: ${{ secrets.ELEVATED_GITHUB_TOKEN }} + # consul-license: ${{secrets.CONSUL_LICENSE}} + # datadog-api-key: "${{ !endsWith(github.repository, '-enterprise') && secrets.DATADOG_API_KEY || '' }}" - go-test-race: - needs: - - setup - - dev-build - - go-mod-download_root - uses: ./.github/workflows/reusable-unit.yml - with: - directory: . - go-test-flags: 'GO_TEST_FLAGS="-race -gcflags=all=-d=checkptr=0"' - package-names-command: "go list ./... | grep -E -v '^github.com/hashicorp/consul/agent(/consul|/local|/routine-leak-checker)?$' | grep -E -v '^github.com/hashicorp/consul(/command|/connect|/snapshot)'" - runs-on: ${{ needs.setup.outputs.compute-xl }} - repository-name: ${{ github.repository }} - go-tags: "${{ github.event.repository.name == 'consul-enterprise' && 'consulent consulprem consuldev' || '' }}" - cachekey_GOMODCACHE: "${{ needs.go-mod-download_root.outputs.cachekey_GOMODCACHE }}" - permissions: - id-token: write # NOTE: this permission is explicitly required for Vault auth. - contents: read - secrets: - elevated-github-token: ${{ secrets.ELEVATED_GITHUB_TOKEN }} - consul-license: ${{secrets.CONSUL_LICENSE}} - datadog-api-key: "${{ !endsWith(github.repository, '-enterprise') && secrets.DATADOG_API_KEY || '' }}" + # go-test-race: + # needs: + # - setup + # - dev-build + # - go-mod-download_root + # uses: ./.github/workflows/reusable-unit.yml + # with: + # directory: . + # go-test-flags: 'GO_TEST_FLAGS="-race -gcflags=all=-d=checkptr=0"' + # package-names-command: "go list ./... | grep -E -v '^github.com/hashicorp/consul/agent(/consul|/local|/routine-leak-checker)?$' | grep -E -v '^github.com/hashicorp/consul(/command|/connect|/snapshot)'" + # runs-on: ${{ needs.setup.outputs.compute-xl }} + # repository-name: ${{ github.repository }} + # go-tags: "${{ github.event.repository.name == 'consul-enterprise' && 'consulent consulprem consuldev' || '' }}" + # cachekey_GOMODCACHE: "${{ needs.go-mod-download_root.outputs.cachekey_GOMODCACHE }}" + # permissions: + # id-token: write # NOTE: this permission is explicitly required for Vault auth. + # contents: read + # secrets: + # elevated-github-token: ${{ secrets.ELEVATED_GITHUB_TOKEN }} + # consul-license: ${{secrets.CONSUL_LICENSE}} + # datadog-api-key: "${{ !endsWith(github.repository, '-enterprise') && secrets.DATADOG_API_KEY || '' }}" - go-test-32bit: - needs: - - setup - - dev-build - - go-mod-download_root - uses: ./.github/workflows/reusable-unit.yml - with: - directory: . - go-arch: "386" - go-test-flags: 'export GO_TEST_FLAGS="-short"' - runs-on: ${{ needs.setup.outputs.compute-xl }} - repository-name: ${{ github.repository }} - go-tags: "${{ github.event.repository.name == 'consul-enterprise' && 'consulent consulprem consuldev' || '' }}" - cachekey_GOMODCACHE: "${{ needs.go-mod-download_root.outputs.cachekey_GOMODCACHE }}" - permissions: - id-token: write # NOTE: this permission is explicitly required for Vault auth. - contents: read - secrets: - elevated-github-token: ${{ secrets.ELEVATED_GITHUB_TOKEN }} - consul-license: ${{secrets.CONSUL_LICENSE}} - datadog-api-key: "${{ !endsWith(github.repository, '-enterprise') && secrets.DATADOG_API_KEY || '' }}" + # go-test-32bit: + # needs: + # - setup + # - dev-build + # - go-mod-download_root + # uses: ./.github/workflows/reusable-unit.yml + # with: + # directory: . + # go-arch: "386" + # go-test-flags: 'export GO_TEST_FLAGS="-short"' + # runs-on: ${{ needs.setup.outputs.compute-xl }} + # repository-name: ${{ github.repository }} + # go-tags: "${{ github.event.repository.name == 'consul-enterprise' && 'consulent consulprem consuldev' || '' }}" + # cachekey_GOMODCACHE: "${{ needs.go-mod-download_root.outputs.cachekey_GOMODCACHE }}" + # permissions: + # id-token: write # NOTE: this permission is explicitly required for Vault auth. + # contents: read + # secrets: + # elevated-github-token: ${{ secrets.ELEVATED_GITHUB_TOKEN }} + # consul-license: ${{secrets.CONSUL_LICENSE}} + # datadog-api-key: "${{ !endsWith(github.repository, '-enterprise') && secrets.DATADOG_API_KEY || '' }}" - go-test-s390x: - if: ${{ endsWith(github.repository, '-enterprise') }} - needs: - - setup - - dev-build-s390x - - go-mod-download_root - uses: ./.github/workflows/reusable-unit.yml - with: - uploaded-binary-name: 'consul-bin-s390x' - directory: . - go-test-flags: 'export GO_TEST_FLAGS="-short"' - runs-on: ${{ needs.setup.outputs.compute-xl }} - repository-name: ${{ github.repository }} - go-tags: "${{ github.event.repository.name == 'consul-enterprise' && 'consulent consulprem consuldev' || '' }}" - cachekey_GOMODCACHE: "${{ needs.go-mod-download_root.outputs.cachekey_GOMODCACHE }}" - permissions: - id-token: write # NOTE: this permission is explicitly required for Vault auth. - contents: read - secrets: - elevated-github-token: ${{ secrets.ELEVATED_GITHUB_TOKEN }} - consul-license: ${{secrets.CONSUL_LICENSE}} - datadog-api-key: "${{ !endsWith(github.repository, '-enterprise') && secrets.DATADOG_API_KEY || '' }}" + # go-test-s390x: + # if: ${{ endsWith(github.repository, '-enterprise') }} + # needs: + # - setup + # - dev-build-s390x + # - go-mod-download_root + # uses: ./.github/workflows/reusable-unit.yml + # with: + # uploaded-binary-name: 'consul-bin-s390x' + # directory: . + # go-test-flags: 'export GO_TEST_FLAGS="-short"' + # runs-on: ${{ needs.setup.outputs.compute-xl }} + # repository-name: ${{ github.repository }} + # go-tags: "${{ github.event.repository.name == 'consul-enterprise' && 'consulent consulprem consuldev' || '' }}" + # cachekey_GOMODCACHE: "${{ needs.go-mod-download_root.outputs.cachekey_GOMODCACHE }}" + # permissions: + # id-token: write # NOTE: this permission is explicitly required for Vault auth. + # contents: read + # secrets: + # elevated-github-token: ${{ secrets.ELEVATED_GITHUB_TOKEN }} + # consul-license: ${{secrets.CONSUL_LICENSE}} + # datadog-api-key: "${{ !endsWith(github.repository, '-enterprise') && secrets.DATADOG_API_KEY || '' }}" - go-test-envoyextensions: - needs: - - setup - - dev-build - uses: ./.github/workflows/reusable-unit.yml - with: - directory: envoyextensions - runs-on: ${{ needs.setup.outputs.compute-xl }} - repository-name: ${{ github.repository }} - go-tags: "${{ github.event.repository.name == 'consul-enterprise' && 'consulent consulprem consuldev' || '' }}" - permissions: - id-token: write # NOTE: this permission is explicitly required for Vault auth. - contents: read - secrets: - elevated-github-token: ${{ secrets.ELEVATED_GITHUB_TOKEN }} - consul-license: ${{secrets.CONSUL_LICENSE}} - datadog-api-key: "${{ !endsWith(github.repository, '-enterprise') && secrets.DATADOG_API_KEY || '' }}" + # go-test-envoyextensions: + # needs: + # - setup + # - dev-build + # uses: ./.github/workflows/reusable-unit.yml + # with: + # directory: envoyextensions + # runs-on: ${{ needs.setup.outputs.compute-xl }} + # repository-name: ${{ github.repository }} + # go-tags: "${{ github.event.repository.name == 'consul-enterprise' && 'consulent consulprem consuldev' || '' }}" + # permissions: + # id-token: write # NOTE: this permission is explicitly required for Vault auth. + # contents: read + # secrets: + # elevated-github-token: ${{ secrets.ELEVATED_GITHUB_TOKEN }} + # consul-license: ${{secrets.CONSUL_LICENSE}} + # datadog-api-key: "${{ !endsWith(github.repository, '-enterprise') && secrets.DATADOG_API_KEY || '' }}" - go-test-troubleshoot: - needs: - - setup - - dev-build - uses: ./.github/workflows/reusable-unit.yml - with: - directory: troubleshoot - runs-on: ${{ needs.setup.outputs.compute-xl }} - repository-name: ${{ github.repository }} - go-tags: "${{ github.event.repository.name == 'consul-enterprise' && 'consulent consulprem consuldev' || '' }}" - permissions: - id-token: write # NOTE: this permission is explicitly required for Vault auth. - contents: read - secrets: - elevated-github-token: ${{ secrets.ELEVATED_GITHUB_TOKEN }} - consul-license: ${{secrets.CONSUL_LICENSE}} - datadog-api-key: "${{ !endsWith(github.repository, '-enterprise') && secrets.DATADOG_API_KEY || '' }}" + # go-test-troubleshoot: + # needs: + # - setup + # - dev-build + # uses: ./.github/workflows/reusable-unit.yml + # with: + # directory: troubleshoot + # runs-on: ${{ needs.setup.outputs.compute-xl }} + # repository-name: ${{ github.repository }} + # go-tags: "${{ github.event.repository.name == 'consul-enterprise' && 'consulent consulprem consuldev' || '' }}" + # permissions: + # id-token: write # NOTE: this permission is explicitly required for Vault auth. + # contents: read + # secrets: + # elevated-github-token: ${{ secrets.ELEVATED_GITHUB_TOKEN }} + # consul-license: ${{secrets.CONSUL_LICENSE}} + # datadog-api-key: "${{ !endsWith(github.repository, '-enterprise') && secrets.DATADOG_API_KEY || '' }}" - go-test-api-1-19: - needs: - - setup - - dev-build - - go-mod-download_api - uses: ./.github/workflows/reusable-unit.yml - with: - directory: api - runs-on: ${{ needs.setup.outputs.compute-xl }} - repository-name: ${{ github.repository }} - go-tags: "${{ github.event.repository.name == 'consul-enterprise' && 'consulent consulprem consuldev' || '' }}" - go-version: "1.19" - cachekey_GOMODCACHE: "${{ needs.go-mod-download_api.outputs.cachekey_GOMODCACHE }}" - permissions: - id-token: write # NOTE: this permission is explicitly required for Vault auth. - contents: read - secrets: - elevated-github-token: ${{ secrets.ELEVATED_GITHUB_TOKEN }} - consul-license: ${{secrets.CONSUL_LICENSE}} - datadog-api-key: "${{ !endsWith(github.repository, '-enterprise') && secrets.DATADOG_API_KEY || '' }}" + # go-test-api-1-19: + # needs: + # - setup + # - dev-build + # - go-mod-download_api + # uses: ./.github/workflows/reusable-unit.yml + # with: + # directory: api + # runs-on: ${{ needs.setup.outputs.compute-xl }} + # repository-name: ${{ github.repository }} + # go-tags: "${{ github.event.repository.name == 'consul-enterprise' && 'consulent consulprem consuldev' || '' }}" + # go-version: "1.19" + # cachekey_GOMODCACHE: "${{ needs.go-mod-download_api.outputs.cachekey_GOMODCACHE }}" + # permissions: + # id-token: write # NOTE: this permission is explicitly required for Vault auth. + # contents: read + # secrets: + # elevated-github-token: ${{ secrets.ELEVATED_GITHUB_TOKEN }} + # consul-license: ${{secrets.CONSUL_LICENSE}} + # datadog-api-key: "${{ !endsWith(github.repository, '-enterprise') && secrets.DATADOG_API_KEY || '' }}" - go-test-api-1-20: - needs: - - setup - - dev-build - - go-mod-download_api - uses: ./.github/workflows/reusable-unit.yml - with: - directory: api - runs-on: ${{ needs.setup.outputs.compute-xl }} - repository-name: ${{ github.repository }} - go-tags: "${{ github.event.repository.name == 'consul-enterprise' && 'consulent consulprem consuldev' || '' }}" - go-version: "1.20" - cachekey_GOMODCACHE: "${{ needs.go-mod-download_api.outputs.cachekey_GOMODCACHE }}" - permissions: - id-token: write # NOTE: this permission is explicitly required for Vault auth. - contents: read - secrets: - elevated-github-token: ${{ secrets.ELEVATED_GITHUB_TOKEN }} - consul-license: ${{secrets.CONSUL_LICENSE}} - datadog-api-key: "${{ !endsWith(github.repository, '-enterprise') && secrets.DATADOG_API_KEY || '' }}" + # go-test-api-1-20: + # needs: + # - setup + # - dev-build + # - go-mod-download_api + # uses: ./.github/workflows/reusable-unit.yml + # with: + # directory: api + # runs-on: ${{ needs.setup.outputs.compute-xl }} + # repository-name: ${{ github.repository }} + # go-tags: "${{ github.event.repository.name == 'consul-enterprise' && 'consulent consulprem consuldev' || '' }}" + # go-version: "1.20" + # cachekey_GOMODCACHE: "${{ needs.go-mod-download_api.outputs.cachekey_GOMODCACHE }}" + # permissions: + # id-token: write # NOTE: this permission is explicitly required for Vault auth. + # contents: read + # secrets: + # elevated-github-token: ${{ secrets.ELEVATED_GITHUB_TOKEN }} + # consul-license: ${{secrets.CONSUL_LICENSE}} + # datadog-api-key: "${{ !endsWith(github.repository, '-enterprise') && secrets.DATADOG_API_KEY || '' }}" - go-test-sdk-1-19: - needs: - - setup - - dev-build - uses: ./.github/workflows/reusable-unit.yml - with: - directory: sdk - runs-on: ${{ needs.setup.outputs.compute-xl }} - repository-name: ${{ github.repository }} - go-tags: "${{ github.event.repository.name == 'consul-enterprise' && 'consulent consulprem consuldev' || '' }}" - go-version: "1.19" - permissions: - id-token: write # NOTE: this permission is explicitly required for Vault auth. - contents: read - secrets: - elevated-github-token: ${{ secrets.ELEVATED_GITHUB_TOKEN }} - consul-license: ${{secrets.CONSUL_LICENSE}} - datadog-api-key: "${{ !endsWith(github.repository, '-enterprise') && secrets.DATADOG_API_KEY || '' }}" + # go-test-sdk-1-19: + # needs: + # - setup + # - dev-build + # uses: ./.github/workflows/reusable-unit.yml + # with: + # directory: sdk + # runs-on: ${{ needs.setup.outputs.compute-xl }} + # repository-name: ${{ github.repository }} + # go-tags: "${{ github.event.repository.name == 'consul-enterprise' && 'consulent consulprem consuldev' || '' }}" + # go-version: "1.19" + # permissions: + # id-token: write # NOTE: this permission is explicitly required for Vault auth. + # contents: read + # secrets: + # elevated-github-token: ${{ secrets.ELEVATED_GITHUB_TOKEN }} + # consul-license: ${{secrets.CONSUL_LICENSE}} + # datadog-api-key: "${{ !endsWith(github.repository, '-enterprise') && secrets.DATADOG_API_KEY || '' }}" - go-test-sdk-1-20: - needs: - - setup - - dev-build - uses: ./.github/workflows/reusable-unit.yml - with: - directory: sdk - runs-on: ${{ needs.setup.outputs.compute-xl }} - repository-name: ${{ github.repository }} - go-tags: "${{ github.event.repository.name == 'consul-enterprise' && 'consulent consulprem consuldev' || '' }}" - go-version: "1.20" - permissions: - id-token: write # NOTE: this permission is explicitly required for Vault auth. - contents: read - secrets: - elevated-github-token: ${{ secrets.ELEVATED_GITHUB_TOKEN }} - consul-license: ${{secrets.CONSUL_LICENSE}} - datadog-api-key: "${{ !endsWith(github.repository, '-enterprise') && secrets.DATADOG_API_KEY || '' }}" + # go-test-sdk-1-20: + # needs: + # - setup + # - dev-build + # uses: ./.github/workflows/reusable-unit.yml + # with: + # directory: sdk + # runs-on: ${{ needs.setup.outputs.compute-xl }} + # repository-name: ${{ github.repository }} + # go-tags: "${{ github.event.repository.name == 'consul-enterprise' && 'consulent consulprem consuldev' || '' }}" + # go-version: "1.20" + # permissions: + # id-token: write # NOTE: this permission is explicitly required for Vault auth. + # contents: read + # secrets: + # elevated-github-token: ${{ secrets.ELEVATED_GITHUB_TOKEN }} + # consul-license: ${{secrets.CONSUL_LICENSE}} + # datadog-api-key: "${{ !endsWith(github.repository, '-enterprise') && secrets.DATADOG_API_KEY || '' }}" noop: runs-on: ubuntu-latest @@ -505,26 +505,28 @@ jobs: go-tests-success: needs: - setup - - check-generated-deep-copy - - check-generated-protobuf - - check-go-mod - - lint-consul-retry - - lint-container-test-deps - - lint-enums - - lint - - lint-32bit + # TODO: TEMP: disable for lazy + # - check-generated-deep-copy + # - check-generated-protobuf + # - check-go-mod + # - lint-consul-retry + # - lint-container-test-deps + # - lint-enums + # - lint + # - lint-32bit # - go-test-arm64 - - go-test-enterprise + # - go-test-enterprise - go-test-oss - - go-test-race - - go-test-envoyextensions - - go-test-troubleshoot - - go-test-api-1-19 - - go-test-api-1-20 - - go-test-sdk-1-19 - - go-test-sdk-1-20 - - go-test-32bit - - go-test-s390x + # TODO: TEMP: disabled for lazy + # - go-test-race + # - go-test-envoyextensions + # - go-test-troubleshoot + # - go-test-api-1-19 + # - go-test-api-1-20 + # - go-test-sdk-1-19 + # - go-test-sdk-1-20 + # - go-test-32bit + # - go-test-s390x runs-on: ${{ fromJSON(needs.setup.outputs.compute-small) }} if: ${{ always() }} steps: