@ -21,7 +21,6 @@ permissions:
env:
env:
TEST_RESULTS : /tmp/test-results
TEST_RESULTS : /tmp/test-results
GOTESTSUM_VERSION : 1.8 .2
jobs:
jobs:
setup:
setup:
@ -215,6 +214,7 @@ jobs:
# secrets:
# secrets:
# elevated-github-token: ${{ secrets.ELEVATED_GITHUB_TOKEN }}
# elevated-github-token: ${{ secrets.ELEVATED_GITHUB_TOKEN }}
# consul-license: ${{secrets.CONSUL_LICENSE}}
# consul-license: ${{secrets.CONSUL_LICENSE}}
# datadog-api-key: "${{ !endsWith(github.repository, '-enterprise') && secrets.DATADOG_API_KEY || '' }}"
go-test-oss:
go-test-oss:
needs :
needs :
@ -227,9 +227,13 @@ jobs:
runs-on : ${{ needs.setup.outputs.compute-xl }}
runs-on : ${{ needs.setup.outputs.compute-xl }}
repository-name : ${{ github.repository }}
repository-name : ${{ github.repository }}
go-tags : ""
go-tags : ""
permissions:
id-token: write # NOTE : this permission is explicitly required for Vault auth.
contents : read
secrets:
secrets:
elevated-github-token : ${{ secrets.ELEVATED_GITHUB_TOKEN }}
elevated-github-token : ${{ secrets.ELEVATED_GITHUB_TOKEN }}
consul-license : ${{secrets.CONSUL_LICENSE}}
consul-license : ${{secrets.CONSUL_LICENSE}}
datadog-api-key : "${{ !endsWith(github.repository, '-enterprise') && secrets.DATADOG_API_KEY || '' }}"
go-test-enterprise:
go-test-enterprise:
if : ${{ endsWith(github.repository, '-enterprise') }}
if : ${{ endsWith(github.repository, '-enterprise') }}
@ -243,9 +247,13 @@ jobs:
runs-on : ${{ needs.setup.outputs.compute-xl }}
runs-on : ${{ needs.setup.outputs.compute-xl }}
repository-name : ${{ github.repository }}
repository-name : ${{ github.repository }}
go-tags : "${{ github.event.repository.name == 'consul-enterprise' && 'consulent consulprem consuldev' || '' }}"
go-tags : "${{ github.event.repository.name == 'consul-enterprise' && 'consulent consulprem consuldev' || '' }}"
permissions:
id-token: write # NOTE : this permission is explicitly required for Vault auth.
contents : read
secrets:
secrets:
elevated-github-token : ${{ secrets.ELEVATED_GITHUB_TOKEN }}
elevated-github-token : ${{ secrets.ELEVATED_GITHUB_TOKEN }}
consul-license : ${{secrets.CONSUL_LICENSE}}
consul-license : ${{secrets.CONSUL_LICENSE}}
datadog-api-key : "${{ !endsWith(github.repository, '-enterprise') && secrets.DATADOG_API_KEY || '' }}"
go-test-race:
go-test-race:
needs :
needs :
@ -259,9 +267,13 @@ jobs:
runs-on : ${{ needs.setup.outputs.compute-xl }}
runs-on : ${{ needs.setup.outputs.compute-xl }}
repository-name : ${{ github.repository }}
repository-name : ${{ github.repository }}
go-tags : "${{ github.event.repository.name == 'consul-enterprise' && 'consulent consulprem consuldev' || '' }}"
go-tags : "${{ github.event.repository.name == 'consul-enterprise' && 'consulent consulprem consuldev' || '' }}"
permissions:
id-token: write # NOTE : this permission is explicitly required for Vault auth.
contents : read
secrets:
secrets:
elevated-github-token : ${{ secrets.ELEVATED_GITHUB_TOKEN }}
elevated-github-token : ${{ secrets.ELEVATED_GITHUB_TOKEN }}
consul-license : ${{secrets.CONSUL_LICENSE}}
consul-license : ${{secrets.CONSUL_LICENSE}}
datadog-api-key : "${{ !endsWith(github.repository, '-enterprise') && secrets.DATADOG_API_KEY || '' }}"
go-test-32bit:
go-test-32bit:
needs :
needs :
@ -275,9 +287,13 @@ jobs:
runs-on : ${{ needs.setup.outputs.compute-xl }}
runs-on : ${{ needs.setup.outputs.compute-xl }}
repository-name : ${{ github.repository }}
repository-name : ${{ github.repository }}
go-tags : "${{ github.event.repository.name == 'consul-enterprise' && 'consulent consulprem consuldev' || '' }}"
go-tags : "${{ github.event.repository.name == 'consul-enterprise' && 'consulent consulprem consuldev' || '' }}"
permissions:
id-token: write # NOTE : this permission is explicitly required for Vault auth.
contents : read
secrets:
secrets:
elevated-github-token : ${{ secrets.ELEVATED_GITHUB_TOKEN }}
elevated-github-token : ${{ secrets.ELEVATED_GITHUB_TOKEN }}
consul-license : ${{secrets.CONSUL_LICENSE}}
consul-license : ${{secrets.CONSUL_LICENSE}}
datadog-api-key : "${{ !endsWith(github.repository, '-enterprise') && secrets.DATADOG_API_KEY || '' }}"
go-test-envoyextensions:
go-test-envoyextensions:
needs:
needs:
@ -289,9 +305,13 @@ jobs:
runs-on : ${{ needs.setup.outputs.compute-xl }}
runs-on : ${{ needs.setup.outputs.compute-xl }}
repository-name : ${{ github.repository }}
repository-name : ${{ github.repository }}
go-tags : "${{ github.event.repository.name == 'consul-enterprise' && 'consulent consulprem consuldev' || '' }}"
go-tags : "${{ github.event.repository.name == 'consul-enterprise' && 'consulent consulprem consuldev' || '' }}"
permissions:
id-token: write # NOTE : this permission is explicitly required for Vault auth.
contents : read
secrets:
secrets:
elevated-github-token : ${{ secrets.ELEVATED_GITHUB_TOKEN }}
elevated-github-token : ${{ secrets.ELEVATED_GITHUB_TOKEN }}
consul-license : ${{secrets.CONSUL_LICENSE}}
consul-license : ${{secrets.CONSUL_LICENSE}}
datadog-api-key : "${{ !endsWith(github.repository, '-enterprise') && secrets.DATADOG_API_KEY || '' }}"
go-test-troubleshoot:
go-test-troubleshoot:
needs:
needs:
@ -303,9 +323,13 @@ jobs:
runs-on : ${{ needs.setup.outputs.compute-xl }}
runs-on : ${{ needs.setup.outputs.compute-xl }}
repository-name : ${{ github.repository }}
repository-name : ${{ github.repository }}
go-tags : "${{ github.event.repository.name == 'consul-enterprise' && 'consulent consulprem consuldev' || '' }}"
go-tags : "${{ github.event.repository.name == 'consul-enterprise' && 'consulent consulprem consuldev' || '' }}"
permissions:
id-token: write # NOTE : this permission is explicitly required for Vault auth.
contents : read
secrets:
secrets:
elevated-github-token : ${{ secrets.ELEVATED_GITHUB_TOKEN }}
elevated-github-token : ${{ secrets.ELEVATED_GITHUB_TOKEN }}
consul-license : ${{secrets.CONSUL_LICENSE}}
consul-license : ${{secrets.CONSUL_LICENSE}}
datadog-api-key : "${{ !endsWith(github.repository, '-enterprise') && secrets.DATADOG_API_KEY || '' }}"
go-test-api-1-19:
go-test-api-1-19:
needs :
needs :
@ -317,9 +341,13 @@ jobs:
runs-on : ${{ needs.setup.outputs.compute-xl }}
runs-on : ${{ needs.setup.outputs.compute-xl }}
repository-name : ${{ github.repository }}
repository-name : ${{ github.repository }}
go-tags : "${{ github.event.repository.name == 'consul-enterprise' && 'consulent consulprem consuldev' || '' }}"
go-tags : "${{ github.event.repository.name == 'consul-enterprise' && 'consulent consulprem consuldev' || '' }}"
permissions:
id-token: write # NOTE : this permission is explicitly required for Vault auth.
contents : read
secrets:
secrets:
elevated-github-token : ${{ secrets.ELEVATED_GITHUB_TOKEN }}
elevated-github-token : ${{ secrets.ELEVATED_GITHUB_TOKEN }}
consul-license : ${{secrets.CONSUL_LICENSE}}
consul-license : ${{secrets.CONSUL_LICENSE}}
datadog-api-key : "${{ !endsWith(github.repository, '-enterprise') && secrets.DATADOG_API_KEY || '' }}"
go-test-api-1-20:
go-test-api-1-20:
needs :
needs :
@ -331,9 +359,13 @@ jobs:
runs-on : ${{ needs.setup.outputs.compute-xl }}
runs-on : ${{ needs.setup.outputs.compute-xl }}
repository-name : ${{ github.repository }}
repository-name : ${{ github.repository }}
go-tags : "${{ github.event.repository.name == 'consul-enterprise' && 'consulent consulprem consuldev' || '' }}"
go-tags : "${{ github.event.repository.name == 'consul-enterprise' && 'consulent consulprem consuldev' || '' }}"
permissions:
id-token: write # NOTE : this permission is explicitly required for Vault auth.
contents : read
secrets:
secrets:
elevated-github-token : ${{ secrets.ELEVATED_GITHUB_TOKEN }}
elevated-github-token : ${{ secrets.ELEVATED_GITHUB_TOKEN }}
consul-license : ${{secrets.CONSUL_LICENSE}}
consul-license : ${{secrets.CONSUL_LICENSE}}
datadog-api-key : "${{ !endsWith(github.repository, '-enterprise') && secrets.DATADOG_API_KEY || '' }}"
go-test-sdk-1-19:
go-test-sdk-1-19:
needs :
needs :
@ -345,9 +377,13 @@ jobs:
runs-on : ${{ needs.setup.outputs.compute-xl }}
runs-on : ${{ needs.setup.outputs.compute-xl }}
repository-name : ${{ github.repository }}
repository-name : ${{ github.repository }}
go-tags : "${{ github.event.repository.name == 'consul-enterprise' && 'consulent consulprem consuldev' || '' }}"
go-tags : "${{ github.event.repository.name == 'consul-enterprise' && 'consulent consulprem consuldev' || '' }}"
permissions:
id-token: write # NOTE : this permission is explicitly required for Vault auth.
contents : read
secrets:
secrets:
elevated-github-token : ${{ secrets.ELEVATED_GITHUB_TOKEN }}
elevated-github-token : ${{ secrets.ELEVATED_GITHUB_TOKEN }}
consul-license : ${{secrets.CONSUL_LICENSE}}
consul-license : ${{secrets.CONSUL_LICENSE}}
datadog-api-key : "${{ !endsWith(github.repository, '-enterprise') && secrets.DATADOG_API_KEY || '' }}"
go-test-sdk-1-20:
go-test-sdk-1-20:
needs :
needs :
@ -359,9 +395,13 @@ jobs:
runs-on : ${{ needs.setup.outputs.compute-xl }}
runs-on : ${{ needs.setup.outputs.compute-xl }}
repository-name : ${{ github.repository }}
repository-name : ${{ github.repository }}
go-tags : "${{ github.event.repository.name == 'consul-enterprise' && 'consulent consulprem consuldev' || '' }}"
go-tags : "${{ github.event.repository.name == 'consul-enterprise' && 'consulent consulprem consuldev' || '' }}"
permissions:
id-token: write # NOTE : this permission is explicitly required for Vault auth.
contents : read
secrets:
secrets:
elevated-github-token : ${{ secrets.ELEVATED_GITHUB_TOKEN }}
elevated-github-token : ${{ secrets.ELEVATED_GITHUB_TOKEN }}
consul-license : ${{secrets.CONSUL_LICENSE}}
consul-license : ${{secrets.CONSUL_LICENSE}}
datadog-api-key : "${{ !endsWith(github.repository, '-enterprise') && secrets.DATADOG_API_KEY || '' }}"
noop:
noop:
runs-on : ubuntu-latest
runs-on : ubuntu-latest