This repository has been archived by the owner on Jun 15, 2021. It is now read-only.
-
Notifications
You must be signed in to change notification settings - Fork 21
/
Copy pathe2e-tests.sh
executable file
·97 lines (93 loc) · 5.93 KB
/
e2e-tests.sh
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
#!/usr/bin/env bash
export POSTGRES_USER=circleci
export POSTGRES_DB=mappamundi_dev
export POSTGRES_PASSWORD=""
export DB_DATABASE=mappamundi_dev
export DB_ADDR=db
export DB_USER=circleci
export DATABASE_NAME=mappamundi_dev
export DATABASE_USERNAME=circleci
export DATABASE_PASSWORD=""
export DATABASE_HOST=db
export HAVEN_JWK_PATH=/keycloak-dev-public-key.json
export KEYCLOAK_USER=admin
export KEYCLOAK_PASSWORD=admin
export PROXY_ADDRESS_FORWARDING=true
export KEYCLOAK_INTERNAL=http://keycloak:8080
export KEYCLOAK_SCHEME=http
export KEYCLOAK_HOSTNAME=dev.havengrc.com
export KEYCLOAK_HTTP_PORT=80
export KEYCLOAK_HTTPS_PORT=443
export FLYWAY_URL="jdbc:postgresql://db/mappamundi_dev"
export FLYWAY_USER=circleci
export FLYWAY_IGNORE_MISSING_MIGRATIONS="true"
export FLYWAY_GROUP="true"
export FLYWAY_SCHEMAS=mappa,1
export HAVEN_JWK_PATH=/cfg/keycloak-dev-public-key.json
export HAVEN_JWT_ISS=http://dev.havengrc.com/auth/realms/havendev
export TEST_DATABASE_URL="postgres://circleci@db:5432/mappamundi_test?sslmode=disable"
export AUTH_SERVER=dev.havengrc.com
export BUFFALO_SERVER=dev.havengrc.com
export DISCOVERY_URL=http://webui/auth/realms/havendev
export UPSTREAM_URL=http://webui/
export GATEKEEPER_SESSION_KEY=c01f3736e640ea874d66c3704ddb7a9a
export SECURE_COOKIE=false
export GATEKEEPER_LISTEN_PORT=81
export REDIRECTION_URL=http://dev.havengrc.com/
export DISCOVERY_URL=http://dev.havengrc.com/auth/realms/havendev
export BASE_URI=""
export GATEKEEPER_INTERNAL=http://gatekeeper:81
export CLIENT_SECRET="df2ba720-1d10-4d85-940a-6df77ef69baa"
export GO_ENV=production
source ./report-changed-services
# create network for containers
docker network create -d bridge net0
# run db
docker run --network net0 -d -e POSTGRES_USER -e POSTGRES_DB -e POSTGRES_PASSWORD -h db --name db circleci/postgres:9.6.4-alpine
# wait for DB
docker run --network net0 --name dockerize1 jwilder/dockerize -wait tcp://db:5432 -timeout 1m
sleep 2
docker run --network net0 --name psql circleci/postgres:9.6.4-alpine /usr/local/bin/psql -l -h db -U circleci || true
# create dummy DB to work around https://github.com/markbates/pop/issues/175
docker run --network net0 --name createdb circleci/postgres:9.6.4-alpine /usr/local/bin/createdb -h db -U circleci circleci
# run mailhog
docker run --network net0 -d -h mailhog --name mailhog mailhog/mailhog:v1.0.0
# wait for mailhog
docker run --network net0 --name dockerize2 jwilder/dockerize -wait tcp://mailhog:8025 -timeout 2m
# creating dummy container which will hold a volume with config
docker create -v /cfg -v /keycloak --name configs alpine:3.4 /bin/true
docker cp keycloak/keycloak-dev-public-key.json configs:/cfg
docker cp keycloak/data/havendev-realm.json configs:/keycloak
docker pull kindlyops/keycloak:$KEYCLOAK_REV
# start keycloak in background container
docker run --volumes-from configs --network net0 -d -e DB_DATABASE -e DB_USER -e DB_ADDR -e KEYCLOAK_USER -e KEYCLOAK_PASSWORD -e PROXY_ADDRESS_FORWARDING -e KEYCLOAK_HTTP_PORT -e KEYCLOAK_HTTPS_PORT -e KEYCLOAK_HOSTNAME -h keycloak --name keycloak kindlyops/keycloak:$KEYCLOAK_REV -b 0.0.0.0 -Dkeycloak.migration.file=/keycloak/havendev-realm.json -Dkeycloak.migration.strategy=IGNORE_EXISTING -Dkeycloak.migration.provider=singleFile -Dkeycloak.migration.action=import
# Wait for keycloak
docker run --network net0 --name dockerize3 jwilder/dockerize -wait tcp://keycloak:8080 -timeout 2m
docker pull kindlyops/havenflyway:$FLYWAY_REV
docker run --network net0 --name flyway -e FLYWAY_URL -e FLYWAY_USER -e FLYWAY_IGNORE_MISSING_MIGRATIONS -e FLYWAY_GROUP -e FLYWAY_SCHEMAS kindlyops/havenflyway:$FLYWAY_REV migrate -placeholders.databaseUser=circleci
docker build -t kindlyops/havenapitest -f havenapi/Dockerfile-hotreload ./havenapi
docker pull kindlyops/havenapi:$HAVENAPI_REV
docker build -t kindlyops/apitest -f apitest/Dockerfile ./apitest
docker run --volumes-from configs --network net0 --name buffalotest -e KC_ADMIN=admin -e KC_PW=admin -e KC_HOST=http://keycloak -e KC_PORT=8080 -e TEST_DATABASE_URL -e HAVEN_JWK_PATH -e HAVEN_JWT_ISS kindlyops/havenapitest /go/bin/buffalo test
docker run --volumes-from configs --network net0 -d -h havenapi --name havenapi -e KC_ADMIN=admin -e KC_PW=admin -e KC_HOST=http://keycloak -e KC_PORT=8080 -e TEST_DATABASE_URL -e HAVEN_JWK_PATH -e HAVEN_JWT_ISS kindlyops/havenapitest /go/bin/buffalo dev
docker run --network net0 --name dockerize5 jwilder/dockerize -wait tcp://havenapi:3000 -timeout 2m
echo $WEBUI_TEST_CERT|base64 --decode - > fullchain.pem
echo $WEBUI_TEST_KEY|base64 --decode - > privkey.pem
# creating dummy container which will hold a volume with certs
docker create -v /certs --name certs alpine:3.4 /bin/true
docker cp fullchain.pem certs:/certs
rm fullchain.pem
docker cp privkey.pem certs:/certs
rm privkey.pem
docker pull kindlyops/havenweb:$WEBUI_REV
docker run -d --volumes-from certs --network net0 -h webui --name webui -e ELM_APP_KEYCLOAK_CLIENT_ID=havendev kindlyops/havenweb:$WEBUI_REV
docker run --volumes-from configs --name cucumber --network net0 --link="webui:dev.havengrc.com" -e AUTH_SERVER -e BUFFALO_SERVER --workdir /usr/src/app kindlyops/apitest cucumber --backtrace
docker pull kindlyops/gatekeeper:$GATEKEEPER_REV
docker run -d --volumes-from certs --network net0 --publish 80:81 --name gatekeeper -e DISCOVERY_URL -e UPSTREAM_URL -e REDIRECTION_URL -e GATEKEEPER_LISTEN_PORT -e SECURE_COOKIE -e GATEKEEPER_SESSION_KEY -e KEYCLOAK_INTERNAL -e KEYCLOAK_SCHEME -e DISCOVERY_URL -e BASE_URI -e CLIENT_SECRET --add-host dev.havengrc.com:127.0.0.1 kindlyops/gatekeeper:$GATEKEEPER_REV
docker build -t kindlyops/cypress -f webui/Dockerfile-cypress ./webui
# creating dummy container to hold volume with outputs from cypress
docker create -v /e2e/cypress/videos/ --name videos alpine:3.4 /bin/true
# useful when pausing for running ngrep inside some of the containers under test
# for manual debbugging
# read -rsp $'Press any key to continue...\n' -n1 key
docker run --network net0 --name cypress -e GATEKEEPER_INTERNAL --volumes-from videos kindlyops/cypress run