Skip to content

Add support for OCI labels on image/bundle push #1022

Add support for OCI labels on image/bundle push

Add support for OCI labels on image/bundle push #1022

name: test-gh-external-registries
on:
push:
branches:
- develop
pull_request_target:
types: [opened, reopened, synchronize, edited]
permissions:
contents: read
actions: none
checks: none
deployments: none
issues: none
packages: none
pull-requests: none
repository-projects: none
security-events: none
statuses: none
jobs:
test-harbor:
name: Test GH with Harbor
runs-on: ubuntu-latest
environment: TanzuNet Registry Dev e2e
steps:
- name: Set up Go 1.x
uses: actions/setup-go@v1
with:
go-version: "1.20.5"
- name: Check out code into the Go module directory
uses: actions/checkout@v2
with:
ref: ${{ github.event.pull_request.head.sha }}
path: src/github.com/${{ github.repository }}
persist-credentials: false
- name: Run Tests
env:
IMGPKG_E2E_IMAGE: "dev.registry.tanzu.vmware.com/imgpkg/github-action-test-relocation"
IMGPKG_E2E_RELOCATION_REPO: "dev.registry.tanzu.vmware.com/imgpkg/github-action-imgpkg-test"
TanzuNetDevUsername: ${{ secrets.TanzuNetDevUsername }}
TanzuNetDevPassword: ${{ secrets.TanzuNetDevPassword }}
run: |
set -e
# Prevent conflicts from multiple e2e tests run in parallel from diff PR's
export IMGPKG_E2E_IMAGE="$IMGPKG_E2E_IMAGE-$GITHUB_RUN_ID"
export IMGPKG_E2E_RELOCATION_REPO="$IMGPKG_E2E_RELOCATION_REPO-$GITHUB_RUN_ID"
export GOPATH=$(echo `pwd`)
export PATH="$PATH:$GOPATH/bin"
cd src/github.com/${{ github.repository }}
docker login dev.registry.tanzu.vmware.com -u "$TanzuNetDevUsername" -p "$TanzuNetDevPassword"
# pull registry for e2e tests that require a locally running docker registry. i.e. airgapped env tests
docker pull registry:2
./hack/test-all.sh
test-gcr:
name: Test GH with GCR
runs-on: ubuntu-latest
environment: GCR e2e
steps:
- name: Set up Go 1.x
uses: actions/setup-go@v1
with:
go-version: "1.20.5"
- name: Check out code into the Go module directory
uses: actions/checkout@v2
with:
ref: ${{ github.event.pull_request.head.sha }}
path: src/github.com/${{ github.repository }}
persist-credentials: false
- name: Run Tests
env:
IMGPKG_E2E_IMAGE: "gcr.io/cf-k8s-lifecycle-tooling-klt/github-action-test-relocation"
IMGPKG_E2E_RELOCATION_REPO: "gcr.io/cf-k8s-lifecycle-tooling-klt/github-action-imgpkg-test"
GCR_PASSWORD: ${{ secrets.GCR_PASSWORD }}
run: |
set -e
# Prevent conflicts from multiple e2e tests run in parallel from diff PR's
export IMGPKG_E2E_IMAGE="$IMGPKG_E2E_IMAGE-$GITHUB_RUN_ID"
export IMGPKG_E2E_RELOCATION_REPO="$IMGPKG_E2E_RELOCATION_REPO-$GITHUB_RUN_ID"
export GOPATH=$(echo `pwd`)
export PATH="$PATH:$GOPATH/bin"
cd src/github.com/${{ github.repository }}
docker login -u _json_key --password-stdin https://gcr.io <<< "$GCR_PASSWORD"
# pull registry for e2e tests that require a locally running docker registry. i.e. airgapped env tests
docker pull registry:2
function cleanup {
set +e
{
gcloud auth activate-service-account --key-file <(echo "$GCR_PASSWORD")
gcloud config set project cf-k8s-lifecycle-tooling-klt > /dev/null
gcloud container images list --filter=$GITHUB_RUN_ID | while read img; do
gcloud container images list-tags $img --format='get(digest)' | while read img_sha_to_delete; do
gcloud container images delete "${img}@${img_sha_to_delete}" --force-delete-tags --quiet
done
done
} > /dev/null
}
trap cleanup EXIT
./hack/test-all.sh