Skip to content

Fix AWS Scan Test #3556

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 8 commits into from
Jun 27, 2023
Merged

Fix AWS Scan Test #3556

merged 8 commits into from
Jun 27, 2023

Conversation

ThomasLaPiana
Copy link
Contributor

@ThomasLaPiana ThomasLaPiana commented Jun 13, 2023

Closes #

Newly-created test resources: https://ethyca.atlassian.net/browse/OPS-346?focusedCommentId=36117

Code Changes

  • Update the expected objects for the AWS system scan test
  • Update Secrets for the actions

Steps to Confirm

  • ctl-external tests pass

Pre-Merge Checklist

  • All CI Pipelines Succeeded

Description Of Changes

Update the expected resources within our external tests to match the reality of what actually exists in those accounts.

Additionally, @daveqnet has created a sequestered area for our tests so that we shouldn't have to worry about resource drift/changes impacting these tests in the future.

@ThomasLaPiana ThomasLaPiana self-assigned this Jun 13, 2023
@ThomasLaPiana ThomasLaPiana added the run unsafe ci checks Runs fides-related CI checks that require sensitive credentials label Jun 13, 2023
@cypress
Copy link

cypress bot commented Jun 13, 2023

Passing run #2903 ↗︎

0 4 0 0 Flakiness 0
⚠️ You've recorded test results over your free plan limit.
Upgrade your plan to view test results.

Details:

Merge e49522c into c55abb0...
Project: fides Commit: b6f69a5757 ℹ️
Status: Passed Duration: 01:06 💡
Started: Jun 26, 2023 11:17 AM Ended: Jun 26, 2023 11:18 AM

This comment has been generated by cypress-bot as a result of this project's GitHub integration settings.

@codecov
Copy link

codecov bot commented Jun 13, 2023

Codecov Report

Patch and project coverage have no change.

Comparison is base (c55abb0) 87.10% compared to head (e49522c) 87.10%.

Additional details and impacted files
@@           Coverage Diff           @@
##             main    #3556   +/-   ##
=======================================
  Coverage   87.10%   87.10%           
=======================================
  Files         310      310           
  Lines       19031    19031           
  Branches     2437     2437           
=======================================
  Hits        16577    16577           
  Misses       2026     2026           
  Partials      428      428           

☔ View full report in Codecov by Sentry.
📢 Do you have feedback about the report comment? Let us know in this issue.

@ThomasLaPiana
Copy link
Contributor Author

fyi @daveqnet I'm going to fix this here

@daveqnet
Copy link
Contributor

daveqnet commented Jun 13, 2023

fyi @daveqnet I'm going to fix this here

Gotcha! The thing we'll need to work on is IAM and which creds/secrets are being used by this test in CI. I wasn't able to puzzle this out from the code - do you know?

[edit: obviously just looking for their parameter names in GH Actions secrets, not the actual secret values]

@ThomasLaPiana
Copy link
Contributor Author

fyi @daveqnet I'm going to fix this here

Gotcha! The thing we'll need to work on is IAM and which creds/secrets are being used by this test in CI. I wasn't able to puzzle this out from the code - do you know?

[edit: obviously just looking for their parameter names in GH Actions secrets, not the actual secret values]

I'm not sure how to figure that out either 🤔 if it isn't obvious maybe we should just create new creds for this test env specifically?

@daveqnet
Copy link
Contributor

I'm not sure how to figure that out either 🤔 if it isn't obvious maybe we should just create new creds for this test env specifically?

Okay, yep, let's do it, @ThomasLaPiana. I will message you privately to discuss.

@ThomasLaPiana ThomasLaPiana removed the run unsafe ci checks Runs fides-related CI checks that require sensitive credentials label Jun 26, 2023
@ThomasLaPiana ThomasLaPiana added the run unsafe ci checks Runs fides-related CI checks that require sensitive credentials label Jun 26, 2023
@ThomasLaPiana ThomasLaPiana marked this pull request as ready for review June 26, 2023 13:33
Copy link
Contributor

@adamsachs adamsachs left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

thank you @ThomasLaPiana and @daveqnet for the diligence in clearing this up! 🎊

CI failures for external saas tests seem unrelated, though we do have to clean that up at some point. not relevant here though!

@SteveDMurphy
Copy link
Contributor

CI failures for external saas tests seem unrelated, though we do have to clean that up at some point. not relevant here though!

We created this #3278 recently as well for saas connectors too @adamsachs - agree hopefully soon!

@ThomasLaPiana
Copy link
Contributor Author

thank you all! team effort here 🙂

@ThomasLaPiana ThomasLaPiana merged commit 243f6e2 into main Jun 27, 2023
@ThomasLaPiana ThomasLaPiana deleted the ThomasLaPiana-update-aws-scan-test branch June 27, 2023 08:31
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
run unsafe ci checks Runs fides-related CI checks that require sensitive credentials
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants