219 automate the configuration of kubectlctrcri #135
Workflow file for this run
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
--- | |
name: Ansible build test for Ubuntu | |
on: | |
pull_request: | |
workflow_dispatch: | |
jobs: | |
lint-test: | |
name: Lint for PR | |
runs-on: ubuntu-latest | |
steps: | |
- name: Check out the codebase. | |
uses: actions/checkout@v3 | |
- name: Set up Python. | |
uses: actions/setup-python@v4 | |
with: | |
python-version: '3.x' | |
- name: Install test dependencies. | |
run: pip3 install yamllint ansible-lint ansible | |
- name: Version check | |
run: | | |
ansible --version | |
ansible-lint --version | |
yamllint --version | |
- name: Run yamllint. | |
run: yamllint . | |
- name: Run ansible-lint. | |
run: ansible-lint | |
ubuntu20-test: | |
name: Ansible build test for Ubuntu | |
runs-on: ubuntu-latest | |
needs: ['lint-test'] | |
steps: | |
- name: Check out the codebase. | |
uses: actions/checkout@v2 | |
- name: Terraform Init | |
id: init | |
run: | | |
cd testing/ | |
terraform init | |
- run: 'echo "$SSH_KEY" > .key' | |
shell: bash | |
env: | |
SSH_KEY: ${{secrets.SSH_PRIVATE_KEY}} | |
- run: chmod 400 .key | |
- name: Terraform private key | |
run: cp .key testing/.key | |
- name: Terraform Validate | |
id: validate | |
run: | | |
cd testing/ | |
terraform validate -no-color | |
- name: Terraform Plan | |
id: plan | |
run: | | |
cd testing/ | |
terraform plan -var "GITHUB_RUN_ID=$GITHUB_RUN_ID" -var "os=ubuntu20" -no-color | |
continue-on-error: true | |
env: | |
AWS_ACCESS_KEY_ID: ${{ secrets.AWS_ACCESS_KEY_ID }} | |
AWS_SECRET_ACCESS_KEY: ${{ secrets.AWS_SECRET_ACCESS_KEY }} | |
AWS_DEFAULT_REGION: us-gov-west-1 | |
- name: Terraform Plan Status | |
if: steps.plan.outcome == 'failure' | |
run: exit 1 | |
- name: Terraform Apply | |
run: | | |
cd testing/ | |
terraform apply -var "GITHUB_RUN_ID=$GITHUB_RUN_ID" -var "os=ubuntu20" -auto-approve | |
env: | |
AWS_ACCESS_KEY_ID: ${{ secrets.AWS_ACCESS_KEY_ID }} | |
AWS_SECRET_ACCESS_KEY: ${{ secrets.AWS_SECRET_ACCESS_KEY }} | |
AWS_DEFAULT_REGION: us-gov-west-1 | |
- name: Set up Python | |
id: setup_python | |
uses: actions/setup-python@v2 | |
with: | |
python-version: 3.9 | |
- name: Install dependencies | |
run: | | |
python -m pip install --upgrade pip | |
pip3 install ansible pytest-testinfra | |
- name: Ansible Version check | |
run: ansible --version | |
- name: Create inventory hosts.yml | |
run: | | |
touch hosts.yml | |
echo "rke2_cluster:" > hosts.yml | |
echo " children:" >> hosts.yml | |
echo " rke2_servers:" >> hosts.yml | |
echo " hosts:" >> hosts.yml | |
echo " $(aws ec2 describe-instances --filters "Name=instance-state-name,Values=running" "Name=tag:Owner,Values=rke2-ansible-github-actions" "Name=tag:NodeType,Values=Server" "Name=tag:github_run,Values=$GITHUB_RUN_ID" --query "Reservations[*].Instances[*].PublicIpAddress" --output text | head -1):" >> hosts.yml | |
echo " rke2_agents:" >> hosts.yml | |
echo " hosts:" >> hosts.yml | |
echo " $(aws ec2 describe-instances --filters "Name=instance-state-name,Values=running" "Name=tag:Owner,Values=rke2-ansible-github-actions" "Name=tag:NodeType,Values=Agent" "Name=tag:github_run,Values=$GITHUB_RUN_ID" --query "Reservations[*].Instances[*].PublicIpAddress" --output text | head -1):" >> hosts.yml | |
echo "all:" >> hosts.yml | |
echo " vars:" >> hosts.yml | |
echo " kubernetes_api_server_host: $(aws ec2 describe-instances --filters "Name=instance-state-name,Values=running" "Name=tag:Owner,Values=rke2-ansible-github-actions" "Name=tag:NodeType,Values=Server" "Name=tag:github_run,Values=$GITHUB_RUN_ID" --query "Reservations[*].Instances[*].PrivateIpAddress" --output text | head -1)" >> hosts.yml | |
echo "" >> ansible.cfg | |
echo "" >> ansible.cfg | |
echo "remote_user=ubuntu" >> ansible.cfg | |
echo "private_key_file=.key" >> ansible.cfg | |
env: | |
AWS_ACCESS_KEY_ID: ${{ secrets.AWS_ACCESS_KEY_ID }} | |
AWS_SECRET_ACCESS_KEY: ${{ secrets.AWS_SECRET_ACCESS_KEY }} | |
AWS_DEFAULT_REGION: us-gov-west-1 | |
- name: Check hosts.yml and ansible.cfg | |
run: | | |
cat hosts.yml | |
cat ansible.cfg | |
- name: Prep inventory | |
run: | | |
cp -R inventory/sample inventory/ubuntu20 | |
cp hosts.yml inventory/ubuntu20/hosts.yml | |
- name: Run playbook | |
run: | | |
ANSIBLE_HOST_KEY_CHECKING=False ansible-playbook -i inventory/ubuntu20/hosts.yml -u ubuntu --verbose --private-key .key site.yml | |
- name: Run playbook again for idempotency | |
run: | | |
ANSIBLE_HOST_KEY_CHECKING=False ansible-playbook -i inventory/ubuntu20/hosts.yml -u ubuntu --verbose --private-key .key site.yml | |
- name: Run Ansible Tests | |
run: | | |
ANSIBLE_HOST_KEY_CHECKING=False ansible-playbook -i inventory/ubuntu20/hosts.yml -u ubuntu --verbose --private-key .key testing.yml | |
- name: Run Python Tests | |
run: | | |
export DEFAULT_PRIVATE_KEY_FILE=.key | |
pytest --hosts=rke2_servers --ansible-inventory=inventory/ubuntu20/hosts.yml --force-ansible --connection=ansible --sudo testing/basic_server_tests.py | |
pytest --hosts=rke2_agents --ansible-inventory=inventory/ubuntu20/hosts.yml --force-ansible --connection=ansible --sudo testing/basic_agent_tests.py | |
- name: Create new inventory hosts.yml with added hosts | |
run: | | |
rm -f hosts.yml | |
touch hosts.yml | |
echo "rke2_cluster:" > hosts.yml | |
echo " children:" >> hosts.yml | |
echo " rke2_servers:" >> hosts.yml | |
echo " hosts:" >> hosts.yml | |
echo " $(aws ec2 describe-instances --filters "Name=instance-state-name,Values=running" "Name=tag:Owner,Values=rke2-ansible-github-actions" "Name=tag:NodeType,Values=Server" "Name=tag:github_run,Values=$GITHUB_RUN_ID" --query "Reservations[*].Instances[*].PublicIpAddress" --output text | head -1):" >> hosts.yml | |
echo " rke2_agents:" >> hosts.yml | |
echo " hosts:" >> hosts.yml | |
echo " $(aws ec2 describe-instances --filters "Name=instance-state-name,Values=running" "Name=tag:Owner,Values=rke2-ansible-github-actions" "Name=tag:NodeType,Values=Agent" "Name=tag:github_run,Values=$GITHUB_RUN_ID" --query "Reservations[*].Instances[*].PublicIpAddress" --output text | head -1):" >> hosts.yml | |
echo " $(aws ec2 describe-instances --filters "Name=instance-state-name,Values=running" "Name=tag:Owner,Values=rke2-ansible-github-actions" "Name=tag:NodeType,Values=ExtraNode" "Name=tag:github_run,Values=$GITHUB_RUN_ID" --query "Reservations[*].Instances[*].PublicIpAddress" --output text | head -1):" >> hosts.yml | |
echo "all:" >> hosts.yml | |
echo " vars:" >> hosts.yml | |
echo " kubernetes_api_server_host: $(aws ec2 describe-instances --filters "Name=instance-state-name,Values=running" "Name=tag:Owner,Values=rke2-ansible-github-actions" "Name=tag:NodeType,Values=Server" "Name=tag:github_run,Values=$GITHUB_RUN_ID" --query "Reservations[*].Instances[*].PrivateIpAddress" --output text | head -1)" >> hosts.yml | |
cp hosts.yml inventory/ubuntu20/hosts.yml | |
env: | |
AWS_ACCESS_KEY_ID: ${{ secrets.AWS_ACCESS_KEY_ID }} | |
AWS_SECRET_ACCESS_KEY: ${{ secrets.AWS_SECRET_ACCESS_KEY }} | |
AWS_DEFAULT_REGION: us-gov-west-1 | |
- name: Run playbook again with added hosts | |
run: | | |
ANSIBLE_HOST_KEY_CHECKING=False ansible-playbook -i inventory/ubuntu20/hosts.yml -u ubuntu --verbose --private-key .key site.yml | |
- name: Run Ansible Tests with added hosts | |
run: | | |
ANSIBLE_HOST_KEY_CHECKING=False ansible-playbook -i inventory/ubuntu20/hosts.yml -u ubuntu --verbose --private-key .key testing.yml | |
- name: Run Python Tests with added hosts | |
run: | | |
export DEFAULT_PRIVATE_KEY_FILE=.key | |
pytest --hosts=rke2_servers --ansible-inventory=inventory/ubuntu20/hosts.yml --force-ansible --connection=ansible --sudo testing/basic_server_tests.py | |
pytest --hosts=rke2_agents --ansible-inventory=inventory/ubuntu20/hosts.yml --force-ansible --connection=ansible --sudo testing/basic_agent_tests.py | |
- name: Delete Stack | |
if: ${{ always() }} | |
run: | | |
cd testing/ | |
terraform destroy -var "GITHUB_RUN_ID=$GITHUB_RUN_ID" -auto-approve | |
env: | |
AWS_ACCESS_KEY_ID: ${{ secrets.AWS_ACCESS_KEY_ID }} | |
AWS_SECRET_ACCESS_KEY: ${{ secrets.AWS_SECRET_ACCESS_KEY }} | |
AWS_DEFAULT_REGION: us-gov-west-1 | |