Skip to content

Commit

Permalink
Fix Github workflow AWS env variables (#1065)
Browse files Browse the repository at this point in the history
* Fix Github workflow AWS env variables
* AWS Test Env variable annotation to check empty string
* Fix Azure Env Variable annotations
  • Loading branch information
usmansaleem authored Feb 27, 2025
1 parent dbd20bf commit c4fddf9
Show file tree
Hide file tree
Showing 17 changed files with 91 additions and 88 deletions.
4 changes: 2 additions & 2 deletions .github/workflows/ci_main.yml
Original file line number Diff line number Diff line change
Expand Up @@ -38,8 +38,8 @@ jobs:
uses: ./.github/actions/build-test
env:
AWS_REGION: ${{ secrets.AWS_REGION }}
RO_AWS_ACCESS_KEY_ID: ${{ secrets.RO_AWS_ACCESS_KEY_ID }}
RO_AWS_SECRET_ACCESS_KEY: ${{ secrets.RO_AWS_SECRET_ACCESS_KEY }}
AWS_ACCESS_KEY_ID: ${{ secrets.RO_AWS_ACCESS_KEY_ID }}
AWS_SECRET_ACCESS_KEY: ${{ secrets.RO_AWS_SECRET_ACCESS_KEY }}
RW_AWS_ACCESS_KEY_ID: ${{ secrets.RW_AWS_ACCESS_KEY_ID }}
RW_AWS_SECRET_ACCESS_KEY: ${{ secrets.RW_AWS_SECRET_ACCESS_KEY }}
AZURE_CLIENT_ID: ${{ secrets.AZURE_CLIENT_ID }}
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -48,23 +48,23 @@

@EnabledIfEnvironmentVariable(
named = "RW_AWS_ACCESS_KEY_ID",
matches = ".*",
matches = ".+",
disabledReason = "RW_AWS_ACCESS_KEY_ID env variable is required")
@EnabledIfEnvironmentVariable(
named = "RW_AWS_SECRET_ACCESS_KEY",
matches = ".*",
matches = ".+",
disabledReason = "RW_AWS_SECRET_ACCESS_KEY env variable is required")
@EnabledIfEnvironmentVariable(
named = "AWS_ACCESS_KEY_ID",
matches = ".*",
matches = ".+",
disabledReason = "AWS_ACCESS_KEY_ID env variable is required")
@EnabledIfEnvironmentVariable(
named = "AWS_SECRET_ACCESS_KEY",
matches = ".*",
matches = ".+",
disabledReason = "AWS_SECRET_ACCESS_KEY env variable is required")
@EnabledIfEnvironmentVariable(
named = "AWS_REGION",
matches = ".*",
matches = ".+",
disabledReason = "AWS_REGION env variable is required")
@TestInstance(TestInstance.Lifecycle.PER_CLASS) // same instance is shared across test methods
public class AwsKmsAcceptanceTest extends AcceptanceTestBase {
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -49,23 +49,23 @@

@EnabledIfEnvironmentVariable(
named = "RW_AWS_ACCESS_KEY_ID",
matches = ".*",
matches = ".+",
disabledReason = "RW_AWS_ACCESS_KEY_ID env variable is required")
@EnabledIfEnvironmentVariable(
named = "RW_AWS_SECRET_ACCESS_KEY",
matches = ".*",
matches = ".+",
disabledReason = "RW_AWS_SECRET_ACCESS_KEY env variable is required")
@EnabledIfEnvironmentVariable(
named = "AWS_ACCESS_KEY_ID",
matches = ".*",
matches = ".+",
disabledReason = "AWS_ACCESS_KEY_ID env variable is required")
@EnabledIfEnvironmentVariable(
named = "AWS_SECRET_ACCESS_KEY",
matches = ".*",
matches = ".+",
disabledReason = "AWS_SECRET_ACCESS_KEY env variable is required")
@EnabledIfEnvironmentVariable(
named = "AWS_REGION",
matches = ".*",
matches = ".+",
disabledReason = "AWS_REGION env variable is required")
@TestInstance(TestInstance.Lifecycle.PER_CLASS) // same instance is shared across test methods
public class AwsSecretsManagerAcceptanceTest extends AcceptanceTestBase {
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -44,23 +44,23 @@

@EnabledIfEnvironmentVariable(
named = "RW_AWS_ACCESS_KEY_ID",
matches = ".*",
matches = ".+",
disabledReason = "RW_AWS_ACCESS_KEY_ID env variable is required")
@EnabledIfEnvironmentVariable(
named = "RW_AWS_SECRET_ACCESS_KEY",
matches = ".*",
matches = ".+",
disabledReason = "RW_AWS_SECRET_ACCESS_KEY env variable is required")
@EnabledIfEnvironmentVariable(
named = "AWS_ACCESS_KEY_ID",
matches = ".*",
matches = ".+",
disabledReason = "AWS_ACCESS_KEY_ID env variable is required")
@EnabledIfEnvironmentVariable(
named = "AWS_SECRET_ACCESS_KEY",
matches = ".*",
matches = ".+",
disabledReason = "AWS_SECRET_ACCESS_KEY env variable is required")
@EnabledIfEnvironmentVariable(
named = "AWS_REGION",
matches = ".*",
matches = ".+",
disabledReason = "AWS_REGION env variable is required")
@TestInstance(TestInstance.Lifecycle.PER_CLASS) // same instance is shared across test methods
public class AwsSecretsManagerMultiValueAcceptanceTest extends AcceptanceTestBase {
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -53,23 +53,23 @@
disabledReason = "AWS_PERF_AT_ENABLED env variable is required and must be set to true")
@EnabledIfEnvironmentVariable(
named = "RW_AWS_ACCESS_KEY_ID",
matches = ".*",
matches = ".+",
disabledReason = "RW_AWS_ACCESS_KEY_ID env variable is required")
@EnabledIfEnvironmentVariable(
named = "RW_AWS_SECRET_ACCESS_KEY",
matches = ".*",
matches = ".+",
disabledReason = "RW_AWS_SECRET_ACCESS_KEY env variable is required")
@EnabledIfEnvironmentVariable(
named = "AWS_ACCESS_KEY_ID",
matches = ".*",
matches = ".+",
disabledReason = "AWS_ACCESS_KEY_ID env variable is required")
@EnabledIfEnvironmentVariable(
named = "AWS_SECRET_ACCESS_KEY",
matches = ".*",
matches = ".+",
disabledReason = "AWS_SECRET_ACCESS_KEY env variable is required")
@EnabledIfEnvironmentVariable(
named = "AWS_REGION",
matches = ".*",
matches = ".+",
disabledReason = "AWS_REGION env variable is required")
@TestInstance(TestInstance.Lifecycle.PER_CLASS) // same instance is shared across test methods
public class AwsSecretsManagerPerformanceAcceptanceTest extends AcceptanceTestBase {
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -16,6 +16,7 @@
import static org.hamcrest.Matchers.equalTo;
import static org.hamcrest.Matchers.hasItems;
import static org.hamcrest.Matchers.hasSize;
import static org.junit.jupiter.api.Assumptions.assumeTrue;
import static tech.pegasys.web3signer.core.config.HealthCheckNames.KEYS_CHECK_AZURE_BULK_LOADING;
import static tech.pegasys.web3signer.dsl.utils.HealthCheckResultUtil.getHealtcheckKeysLoaded;
import static tech.pegasys.web3signer.dsl.utils.HealthCheckResultUtil.getHealthcheckErrorCount;
Expand All @@ -32,7 +33,7 @@
import com.fasterxml.jackson.core.JsonProcessingException;
import io.restassured.http.ContentType;
import io.restassured.response.Response;
import org.junit.jupiter.api.Assumptions;
import org.apache.commons.lang3.StringUtils;
import org.junit.jupiter.api.BeforeAll;
import org.junit.jupiter.params.ParameterizedTest;
import org.junit.jupiter.params.provider.Arguments;
Expand All @@ -56,10 +57,10 @@ public class AzureKeyVaultAcceptanceTest extends AcceptanceTestBase {

@BeforeAll
public static void setup() {
Assumptions.assumeTrue(CLIENT_ID != null, "Set AZURE_CLIENT_ID environment variable");
Assumptions.assumeTrue(CLIENT_SECRET != null, "Set AZURE_CLIENT_SECRET environment variable");
Assumptions.assumeTrue(TENANT_ID != null, "Set AZURE_TENANT_ID environment variable");
Assumptions.assumeTrue(VAULT_NAME != null, "Set AZURE_KEY_VAULT_NAME environment variable");
assumeTrue(!StringUtils.isEmpty(CLIENT_ID), "Set AZURE_CLIENT_ID environment variable");
assumeTrue(!StringUtils.isEmpty(CLIENT_SECRET), "Set AZURE_CLIENT_SECRET environment variable");
assumeTrue(!StringUtils.isEmpty(TENANT_ID), "Set AZURE_TENANT_ID environment variable");
assumeTrue(!StringUtils.isEmpty(VAULT_NAME), "Set AZURE_KEY_VAULT_NAME environment variable");
}

@ParameterizedTest
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -48,19 +48,19 @@

@EnabledIfEnvironmentVariable(
named = "AZURE_CLIENT_ID",
matches = ".*",
matches = ".+",
disabledReason = "AZURE_CLIENT_ID env variable is required")
@EnabledIfEnvironmentVariable(
named = "AZURE_CLIENT_SECRET",
matches = ".*",
matches = ".+",
disabledReason = "AZURE_CLIENT_SECRET env variable is required")
@EnabledIfEnvironmentVariable(
named = "AZURE_TENANT_ID",
matches = ".*",
matches = ".+",
disabledReason = "AZURE_TENANT_ID env variable is required")
@EnabledIfEnvironmentVariable(
named = "AZURE_KEY_VAULT_NAME",
matches = ".*",
matches = ".+",
disabledReason = "AZURE_KEY_VAULT_NAME env variable is required")
public class AzureKeyVaultMultiValueAcceptanceTest extends AcceptanceTestBase {

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -31,23 +31,23 @@
@TestInstance(TestInstance.Lifecycle.PER_CLASS)
@EnabledIfEnvironmentVariable(
named = "RW_AWS_ACCESS_KEY_ID",
matches = ".*",
matches = ".+",
disabledReason = "RW_AWS_ACCESS_KEY_ID env variable is required")
@EnabledIfEnvironmentVariable(
named = "RW_AWS_SECRET_ACCESS_KEY",
matches = ".*",
matches = ".+",
disabledReason = "RW_AWS_SECRET_ACCESS_KEY env variable is required")
@EnabledIfEnvironmentVariable(
named = "AWS_ACCESS_KEY_ID",
matches = ".*",
matches = ".+",
disabledReason = "AWS_ACCESS_KEY_ID env variable is required")
@EnabledIfEnvironmentVariable(
named = "AWS_SECRET_ACCESS_KEY",
matches = ".*",
matches = ".+",
disabledReason = "AWS_SECRET_ACCESS_KEY env variable is required")
@EnabledIfEnvironmentVariable(
named = "AWS_REGION",
matches = ".*",
matches = ".+",
disabledReason = "AWS_REGION env variable is required")
public class AwsKeyIdentifiersAcceptanceTest extends KeyIdentifiersAcceptanceTestBase {

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -205,10 +205,10 @@ public void allLoadedKeysAreReturnedPublicKeyResponseWithEmptyAccept(final KeyTy

@Test
@EnabledIfEnvironmentVariables({
@EnabledIfEnvironmentVariable(named = "AZURE_CLIENT_ID", matches = ".*"),
@EnabledIfEnvironmentVariable(named = "AZURE_CLIENT_SECRET", matches = ".*"),
@EnabledIfEnvironmentVariable(named = "AZURE_KEY_VAULT_NAME", matches = ".*"),
@EnabledIfEnvironmentVariable(named = "AZURE_TENANT_ID", matches = ".*")
@EnabledIfEnvironmentVariable(named = "AZURE_CLIENT_ID", matches = ".+"),
@EnabledIfEnvironmentVariable(named = "AZURE_CLIENT_SECRET", matches = ".+"),
@EnabledIfEnvironmentVariable(named = "AZURE_KEY_VAULT_NAME", matches = ".+"),
@EnabledIfEnvironmentVariable(named = "AZURE_TENANT_ID", matches = ".+")
})
public void azureKeysReturnAppropriatePublicKey() {
final String clientId = System.getenv("AZURE_CLIENT_ID");
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -156,10 +156,10 @@ public void ableToSignUsingHashicorpWithHttpProtocolOverride(

@Test
@EnabledIfEnvironmentVariables({
@EnabledIfEnvironmentVariable(named = "AZURE_CLIENT_ID", matches = ".*"),
@EnabledIfEnvironmentVariable(named = "AZURE_CLIENT_SECRET", matches = ".*"),
@EnabledIfEnvironmentVariable(named = "AZURE_KEY_VAULT_NAME", matches = ".*"),
@EnabledIfEnvironmentVariable(named = "AZURE_TENANT_ID", matches = ".*")
@EnabledIfEnvironmentVariable(named = "AZURE_CLIENT_ID", matches = ".+"),
@EnabledIfEnvironmentVariable(named = "AZURE_CLIENT_SECRET", matches = ".+"),
@EnabledIfEnvironmentVariable(named = "AZURE_KEY_VAULT_NAME", matches = ".+"),
@EnabledIfEnvironmentVariable(named = "AZURE_TENANT_ID", matches = ".+")
})
public void ableToSignUsingAzure() throws JsonProcessingException {
final String clientId = System.getenv("AZURE_CLIENT_ID");
Expand All @@ -180,23 +180,23 @@ public void ableToSignUsingAzure() throws JsonProcessingException {
@EnabledIfEnvironmentVariables({
@EnabledIfEnvironmentVariable(
named = "RW_AWS_ACCESS_KEY_ID",
matches = ".*",
matches = ".+",
disabledReason = "RW_AWS_ACCESS_KEY_ID env variable is required"),
@EnabledIfEnvironmentVariable(
named = "RW_AWS_SECRET_ACCESS_KEY",
matches = ".*",
matches = ".+",
disabledReason = "RW_AWS_SECRET_ACCESS_KEY env variable is required"),
@EnabledIfEnvironmentVariable(
named = "AWS_ACCESS_KEY_ID",
matches = ".*",
matches = ".+",
disabledReason = "AWS_ACCESS_KEY_ID env variable is required"),
@EnabledIfEnvironmentVariable(
named = "AWS_SECRET_ACCESS_KEY",
matches = ".*",
matches = ".+",
disabledReason = "AWS_SECRET_ACCESS_KEY env variable is required"),
@EnabledIfEnvironmentVariable(
named = "AWS_REGION",
matches = ".*",
matches = ".+",
disabledReason = "AWS_REGION env variable is required")
})
public void ableToSignUsingAws() throws JsonProcessingException {
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -99,10 +99,10 @@ public void signDataWithKeyFromHashicorp() {

@Test
@EnabledIfEnvironmentVariables({
@EnabledIfEnvironmentVariable(named = "AZURE_CLIENT_ID", matches = ".*"),
@EnabledIfEnvironmentVariable(named = "AZURE_CLIENT_SECRET", matches = ".*"),
@EnabledIfEnvironmentVariable(named = "AZURE_KEY_VAULT_NAME", matches = ".*"),
@EnabledIfEnvironmentVariable(named = "AZURE_TENANT_ID", matches = ".*")
@EnabledIfEnvironmentVariable(named = "AZURE_CLIENT_ID", matches = ".+"),
@EnabledIfEnvironmentVariable(named = "AZURE_CLIENT_SECRET", matches = ".+"),
@EnabledIfEnvironmentVariable(named = "AZURE_KEY_VAULT_NAME", matches = ".+"),
@EnabledIfEnvironmentVariable(named = "AZURE_TENANT_ID", matches = ".+")
})
public void signDataWithKeyInAzure() {
METADATA_FILE_HELPERS.createAzureKeyYamlFileAt(
Expand All @@ -119,19 +119,19 @@ public void signDataWithKeyInAzure() {
@EnabledIfEnvironmentVariables({
@EnabledIfEnvironmentVariable(
named = "RW_AWS_ACCESS_KEY_ID",
matches = ".*",
matches = ".+",
disabledReason = "RW_AWS_ACCESS_KEY_ID env variable is required"),
@EnabledIfEnvironmentVariable(
named = "RW_AWS_SECRET_ACCESS_KEY",
matches = ".*",
matches = ".+",
disabledReason = "RW_AWS_SECRET_ACCESS_KEY env variable is required"),
@EnabledIfEnvironmentVariable(
named = "AWS_ACCESS_KEY_ID",
matches = ".*",
matches = ".+",
disabledReason = "AWS_ACCESS_KEY_ID env variable is required"),
@EnabledIfEnvironmentVariable(
named = "AWS_SECRET_ACCESS_KEY",
matches = ".*",
matches = ".+",
disabledReason = "AWS_SECRET_ACCESS_KEY env variable is required"),
})
public void remoteSignWithAwsKMS() {
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -26,23 +26,23 @@
@TestInstance(TestInstance.Lifecycle.PER_CLASS)
@EnabledIfEnvironmentVariable(
named = "RW_AWS_ACCESS_KEY_ID",
matches = ".*",
matches = ".+",
disabledReason = "RW_AWS_ACCESS_KEY_ID env variable is required")
@EnabledIfEnvironmentVariable(
named = "RW_AWS_SECRET_ACCESS_KEY",
matches = ".*",
matches = ".+",
disabledReason = "RW_AWS_SECRET_ACCESS_KEY env variable is required")
@EnabledIfEnvironmentVariable(
named = "AWS_ACCESS_KEY_ID",
matches = ".*",
matches = ".+",
disabledReason = "AWS_ACCESS_KEY_ID env variable is required")
@EnabledIfEnvironmentVariable(
named = "AWS_SECRET_ACCESS_KEY",
matches = ".*",
matches = ".+",
disabledReason = "AWS_SECRET_ACCESS_KEY env variable is required")
@EnabledIfEnvironmentVariable(
named = "AWS_REGION",
matches = ".*",
matches = ".+",
disabledReason = "AWS_REGION env variable is required")
class AwsSecretsManagerProviderTest {

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -51,23 +51,23 @@
@TestInstance(TestInstance.Lifecycle.PER_CLASS)
@EnabledIfEnvironmentVariable(
named = "RW_AWS_ACCESS_KEY_ID",
matches = ".*",
matches = ".+",
disabledReason = "RW_AWS_ACCESS_KEY_ID env variable is required")
@EnabledIfEnvironmentVariable(
named = "RW_AWS_SECRET_ACCESS_KEY",
matches = ".*",
matches = ".+",
disabledReason = "RW_AWS_SECRET_ACCESS_KEY env variable is required")
@EnabledIfEnvironmentVariable(
named = "AWS_ACCESS_KEY_ID",
matches = ".*",
matches = ".+",
disabledReason = "AWS_ACCESS_KEY_ID env variable is required")
@EnabledIfEnvironmentVariable(
named = "AWS_SECRET_ACCESS_KEY",
matches = ".*",
matches = ".+",
disabledReason = "AWS_SECRET_ACCESS_KEY env variable is required")
@EnabledIfEnvironmentVariable(
named = "AWS_REGION",
matches = ".*",
matches = ".+",
disabledReason = "AWS_REGION env variable is required")
class AwsSecretsManagerTest {

Expand Down
Loading

0 comments on commit c4fddf9

Please sign in to comment.