Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

chore: use hashed versions of test-summary action #556

Merged
merged 5 commits into from Oct 7, 2022

Conversation

mdelapenya
Copy link
Collaborator

@mdelapenya mdelapenya commented Oct 6, 2022

What does this PR do?

It uses the commit of the v1 tag in the test-summary action, pinning it to the v1 version (see https://github.com/test-summary/action/releases/tag/v1.0)

I also noticed that junit test reports were not generated (added here d0116e4 but removed during a merge, probably here 897803f). Therefore I'm adding the --junitfile flag to gotestsum, ignoring the test reports from git, and finally running go mod tidy in the e2e module to sync the module dependencies.

Why is it important?

Security concerns about using dynamic version of GH actions, and recover the summary action

@mdelapenya mdelapenya requested a review from a team as a code owner October 6, 2022 15:14
@mdelapenya mdelapenya added dependencies Dependencies or external services security Vulnerabilities in dependencies or in the library itself labels Oct 6, 2022
@mdelapenya mdelapenya self-assigned this Oct 6, 2022
@mdelapenya mdelapenya requested a review from a team October 6, 2022 15:14
@codecov
Copy link

codecov bot commented Oct 6, 2022

Codecov Report

Merging #556 (861a1d8) into main (38fbdc6) will increase coverage by 0.18%.
The diff coverage is n/a.

@@            Coverage Diff             @@
##             main     #556      +/-   ##
==========================================
+ Coverage   68.83%   69.01%   +0.18%     
==========================================
  Files          22       22              
  Lines        2172     2172              
==========================================
+ Hits         1495     1499       +4     
+ Misses        537      535       -2     
+ Partials      140      138       -2     
Impacted Files Coverage Δ
docker.go 71.67% <0.00%> (+0.41%) ⬆️

📣 We’re building smart automated test selection to slash your CI/CD build times. Learn more

@thomaseizinger
Copy link

Can we please limit review requests to the language-specific team? I get notified by every request for @testcontainers/oss-team but I only maintain the Rust impl.

@mdelapenya
Copy link
Collaborator Author

Can we please limit review requests to the language-specific team? I get notified by every request for @testcontainers/oss-team but I only maintain the Rust impl.

Makes sense, and sorry for noise. I was not aware that the oss-team included other projects apart from java, go and .NET. Will change patterns ASAP

@mdelapenya mdelapenya removed the request for review from a team October 7, 2022 05:55
@mdelapenya mdelapenya merged commit 66fed81 into testcontainers:main Oct 7, 2022
@mdelapenya mdelapenya deleted the use-fixed-gh-versions branch October 15, 2022 06:56
mdelapenya referenced this pull request in mdelapenya/testcontainers-go Dec 21, 2022
* main:
  Add system requirements parent docs page for podman and colima (#562)
  Support for cap-add/cap-drop (#555)
  fix container NetworkMode usage (#560)
  chore: use hashed versions of test-summary action (#556)
  chore: use container.State() function in tests (#543)
  Log docker server info (#548)
  docs: add docs regarding Colima usage (#547)
  chore: add emoji to breaking changes in release drafter (#542)
  chore: add CONTRIBUTING file (#539)
  issue #537 Rename the wait/multi.go file to wait/all.go (#541)
  docs: add a basic layout for wait strategies in docs (#536)
  docs: improve consistency and fix typos (#534)
  chore: do not skip test (#528)
  chore: include test flakiness in the release drafter (#535)
  chore: retire old versions of Go (#530)
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
dependencies Dependencies or external services security Vulnerabilities in dependencies or in the library itself
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

2 participants