Skip to content

Koji: expose image metadata in build extra metadata, including boot mode #14314

Koji: expose image metadata in build extra metadata, including boot mode

Koji: expose image metadata in build extra metadata, including boot mode #14314

Workflow file for this run

name: Tests
# NOTE(mhayden): Restricting branches prevents jobs from being doubled since
# a push to a pull request triggers two events.
on:
pull_request:
branches:
- "*"
push:
branches:
- main
jobs:
unit-tests:
name: "πŸ›ƒ Unit tests"
runs-on: ubuntu-20.04
container:
image: registry.fedoraproject.org/fedora:37
steps:
# krb5-devel is needed to test internal/upload/koji package
# gcc is needed to build the mock dnf-json binary for the unit tests
# gpgme-devel is needed for container upload dependencies
- name: Install build and test dependencies
run: dnf -y install krb5-devel gcc git-core go gpgme-devel
- name: Check out code into the Go module directory
uses: actions/checkout@v3
with:
ref: ${{ github.event.pull_request.head.sha }}
- name: Mark the working directory as safe for git
run: git config --global --add safe.directory "$(pwd)"
- name: Run unit tests
run: go test -race -covermode=atomic -coverprofile=coverage.txt -coverpkg=$(go list ./... | grep -v rpmmd/test$ | tr "\n" ",") ./...
- name: Run dnfjson tests with force-dnf to make sure it's not skipped for any reason
run: go test -race ./internal/dnfjson/... -force-dnf
- name: Send coverage to codecov.io
run: bash <(curl -s https://codecov.io/bash)
db-tests:
name: "πŸ—„ DB tests"
runs-on: ubuntu-20.04
services:
postgres:
# 12 is used in deployments
image: postgres:12
env:
POSTGRES_USER: postgres
POSTGRES_PASSWORD: foobar
POSTGRES_DB: osbuildcomposer
options: >-
--health-cmd pg_isready
--health-interval 10s
--health-timeout 5s
--health-retries 5
ports:
- 5432:5432
steps:
# gpgme-devel is needed for container upload dependencies
- name: Install test dependencies
run: sudo apt-get install -y libgpgme-dev
- uses: actions/checkout@v3
- uses: actions/setup-go@v4
with:
go-version: 1.19
- env:
PGUSER: postgres
PGPASSWORD: foobar
PGDATABASE: osbuildcomposer
PGHOST: localhost
PGPORT: 5432
run: |
WORKDIR=$(readlink -f pkg/jobqueue/dbjobqueue/schemas)
pushd $(mktemp -d)
go mod init temp
go install github.com/jackc/tern@latest
$(go env GOPATH)/bin/tern migrate -m "$WORKDIR"
popd
- run: go test -tags=integration ./cmd/osbuild-composer-dbjobqueue-tests
- run: go test -tags=integration ./cmd/osbuild-service-maintenance
python-lint:
name: "🐍 Lint (dnf-json)"
runs-on: ubuntu-latest
container:
image: registry.fedoraproject.org/fedora:37
steps:
- name: Install build and test dependencies
run: dnf -y install python3-pylint git-core python3-requests
- name: Check out code into the Go module directory
uses: actions/checkout@v3
with:
ref: ${{ github.event.pull_request.head.sha }}
- name: Analysing the code with pylint
run: |
python3 -m pylint dnf-json tools/koji-compose.py
lint:
name: "⌨ Lint"
runs-on: ubuntu-latest
steps:
- name: Set up Go 1.19
uses: actions/setup-go@v4
with:
go-version: 1.19
id: go
- name: Check out code into the Go module directory
uses: actions/checkout@v3
with:
ref: ${{ github.event.pull_request.head.sha }}
# This is needed to lint internal/upload/koji package
- name: Install kerberos devel package
run: sudo apt-get install -y libkrb5-dev
# This is needed for the container upload dependencies
- name: Install libgpgme devel package
run: sudo apt-get install -y libgpgme-dev
- name: Run golangci-lint
uses: golangci/golangci-lint-action@v3
with:
version: v1.51.0
args: --verbose --timeout 5m0s
prepare:
name: "πŸ” Check source preparation"
runs-on: ubuntu-20.04
steps:
- name: Set up Go 1.19
uses: actions/setup-go@v4
with:
go-version: 1.19
id: go
- name: Check out code into the Go module directory
uses: actions/checkout@v3
with:
ref: ${{ github.event.pull_request.head.sha }}
- name: Check that source has been prepared
run: |
./tools/prepare-source.sh
if [ -n "$(git status --porcelain)" ]; then
echo
echo "Please include these changes in your branch: "
git status -vv
exit "1"
else
exit "0"
fi
snapshots:
name: "πŸ” Check for valid snapshot urls"
runs-on: ubuntu-20.04
steps:
- name: Check out code into the Go module directory
uses: actions/checkout@v3
with:
ref: ${{ github.event.pull_request.head.sha }}
- name: Check for valid snapshot urls
run: ./tools/check-snapshots --errors-only .
shellcheck:
name: "🐚 Shellcheck"
runs-on: ubuntu-20.04
steps:
- uses: actions/checkout@v3
with:
ref: ${{ github.event.pull_request.head.sha }}
- name: Run ShellCheck
uses: ludeeus/action-shellcheck@00cae500b08a931fb5698e11e79bfbd38e612a38
with:
ignore: vendor # We don't want to fix the code in vendored dependencies
env:
# don't check /etc/os-release sourcing, allow useless cats to live inside our codebase, and
# allow seemingly unreachable commands
SHELLCHECK_OPTS: -e SC1091 -e SC2002 -e SC2317
rpmlint:
name: "πŸ“¦ RPMlint"
runs-on: ubuntu-20.04
container: registry.fedoraproject.org/fedora:37
steps:
- name: Install dependencies
run: sudo dnf install -y rpmlint rpm-build make git-core
- uses: actions/checkout@v3
with:
ref: ${{ github.event.pull_request.head.sha }}
- name: Create SRPM
run: |
git config --global --add safe.directory "$GITHUB_WORKSPACE"
make srpm
- name: Run rpmlint
run: rpmlint rpmbuild/SRPMS/*
gitlab-ci-helper:
name: "Gitlab CI trigger helper"
runs-on: ubuntu-latest
env:
SKIP_CI: ${{ (github.event.pull_request.draft == true || contains(github.event.pull_request.labels.*.name, 'WIP')) && !contains(github.event.pull_request.labels.*.name, 'WIP+test') }}
steps:
- name: Write PR status
run: echo "$SKIP_CI" > SKIP_CI.txt
- name: Upload status
uses: actions/upload-artifact@v3
with:
name: PR_STATUS
path: SKIP_CI.txt
kube-linter:
name: "πŸŽ€ kube-linter"
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v3
- uses: redhat-actions/oc-installer@v1
- name: Process template
run: |
mkdir processed-templates
oc process -f templates/composer.yml \
-p IMAGE_TAG=image_tag \
--local \
-o yaml > processed-templates/composer.yml
- uses: stackrox/[email protected]
with:
directory: processed-templates
config: templates/.kube-linter-config.yml
version: 0.3.0
cloud-cleaner-is-enabled:
name: "🧹 cloud-cleaner-is-enabled"
runs-on: ubuntu-latest
steps:
- name: Check if workflow is enabled
run: |
curl https://github.com/osbuild/cloud-cleaner/actions/workflows/run_ib.yml 2>/dev/null | grep -vz "This scheduled workflow is disabled" >/dev/null
- name: How to enable cloud-cleaner
if: failure()
run: |
echo "Cloud-cleaner is disabled"
echo "Go to https://github.com/osbuild/cloud-cleaner/actions/workflows/run_ib.yml and"
echo "https://github.com/osbuild/cloud-cleaner/actions/workflows/run_cloudx.yml and"
echo "manually enable it!"