Skip to content

Separate all-in-one integration tests for v1 and v2 (#4968) #3

Separate all-in-one integration tests for v1 and v2 (#4968)

Separate all-in-one integration tests for v1 and v2 (#4968) #3

name: CIT gRPC And Badger
on:
push:
branches: [main]
pull_request:
branches: [main]
concurrency:
group: ${{ github.workflow }}-${{ (github.event.pull_request && github.event.pull_request.number) || github.ref || github.run_id }}
cancel-in-progress: true
# See https://github.com/ossf/scorecard/blob/main/docs/checks.md#token-permissions
permissions: # added using https://github.com/step-security/secure-workflows
contents: read
jobs:
grpc-and-badger:
runs-on: ubuntu-latest
steps:
- name: Harden Runner
uses: step-security/harden-runner@eb238b55efaa70779f274895e782ed17c84f2895
with:
egress-policy: audit # TODO: change to 'egress-policy: block' after couple of runs
- uses: actions/checkout@b4ffde65f46336ab88eb53be808477a3936bae11
- uses: actions/setup-go@93397bea11091df50f3d7e59dc26a7711a8bcfbe
with:
go-version: 1.21.x
- name: Run Badger storage integration tests
run: make badger-storage-integration-test
- name: Run gRPC storage integration tests
run: make grpc-storage-integration-test
- name: Setup CODECOV_TOKEN
uses: ./.github/actions/setup-codecov
- name: Upload coverage to codecov
uses: codecov/codecov-action@894ff025c7b54547a9a2a1e9f228beae737ad3c2
with:
files: cover.out,cover-badger.out
verbose: true
flags: grpc-badger
fail_ci_if_error: true
token: ${{ env.CODECOV_TOKEN }}