Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Cloud runner develop - Stabilizes kubernetes provider #531

Merged
merged 219 commits into from
Feb 6, 2024
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
219 commits
Select commit Hold shift + click to select a range
e580bee
fixes
frostebite Mar 30, 2023
7474886
fixes
frostebite Mar 30, 2023
03435c5
fixes
frostebite Mar 30, 2023
a09b75a
fixes
frostebite Mar 30, 2023
d197881
fixes
frostebite Mar 30, 2023
9962206
check for startup message in workflows
frostebite May 7, 2023
5208eab
check for startup message in workflows
frostebite May 7, 2023
df3f3df
check for startup message in workflows
frostebite May 7, 2023
88f6a6d
check for startup message in workflows
frostebite May 7, 2023
0b9a28f
check for startup message in workflows
frostebite May 7, 2023
7d49733
check for startup message in workflows
frostebite May 9, 2023
9e36958
Update cloud-runner-ci-pipeline.yml
frostebite May 10, 2023
7ee1859
Update cloud-runner-ci-pipeline.yml
frostebite May 10, 2023
f46b387
no storage class specified
frostebite May 10, 2023
d21b193
log file path
frostebite May 13, 2023
9eed488
Merge branch 'cloud-runner-develop' of https://github.com/game-ci/uni…
frostebite May 13, 2023
6d7934f
log file path
frostebite May 13, 2023
1a5b953
log file path
frostebite May 13, 2023
4a4b472
log file path
frostebite May 13, 2023
ae9fef3
log file path
frostebite May 13, 2023
ade6d78
log file path
frostebite May 13, 2023
9102a7e
log file path
frostebite May 13, 2023
fcf7fde
log file path
frostebite May 13, 2023
12764c8
updates
frostebite May 13, 2023
4de8ca9
log file path
frostebite May 14, 2023
dc01a0d
latest develop
frostebite May 14, 2023
36dc42c
log file path
frostebite May 14, 2023
80ec2d0
log file path
frostebite May 14, 2023
a1120d0
Update package.json
frostebite May 14, 2023
0d7955f
log file path
frostebite May 14, 2023
45a1901
log file path
frostebite May 14, 2023
a6ec380
log file path
frostebite May 14, 2023
a86e483
log file path
frostebite May 14, 2023
1df6a12
log file path
frostebite May 14, 2023
d3b4f28
log file path
frostebite May 14, 2023
d0934cb
log file path
frostebite May 14, 2023
8e5ccae
log file path
frostebite May 14, 2023
fecb78d
log file path
frostebite May 14, 2023
68f787c
log file path
frostebite May 14, 2023
6f6ba10
log file path
frostebite May 14, 2023
ce6c1ca
log file path
frostebite May 15, 2023
aec5ebd
log file path
frostebite May 15, 2023
16284dc
log file path
frostebite May 15, 2023
8a501a6
stream logs through standard input and new remote client cli command
frostebite Jun 4, 2023
a485fb0
stream logs through standard input and new remote client cli command
frostebite Jun 4, 2023
79ddbbd
stream logs through standard input and new remote client cli command
frostebite Jun 5, 2023
fdde0de
stream logs through standard input and new remote client cli command
frostebite Jun 5, 2023
88fa5d2
stream logs through standard input and new remote client cli command
frostebite Jun 5, 2023
c366060
stream logs through standard input and new remote client cli command
frostebite Jun 5, 2023
1867dce
stream logs through standard input and new remote client cli command
frostebite Jun 5, 2023
d92ce4d
stream logs through standard input and new remote client cli command
frostebite Jun 5, 2023
83491d9
stream logs through standard input and new remote client cli command
frostebite Jun 5, 2023
d1a2969
stream logs through standard input and new remote client cli command
frostebite Jun 5, 2023
596f3fb
stream logs through standard input and new remote client cli command
frostebite Jun 5, 2023
76e8818
stream logs through standard input and new remote client cli command
frostebite Jun 5, 2023
9e7fad6
stream logs through standard input and new remote client cli command
frostebite Jun 5, 2023
8a3a366
stream logs through standard input and new remote client cli command
frostebite Jun 5, 2023
4793f6b
stream logs through standard input and new remote client cli command
frostebite Jun 5, 2023
6a52358
update pipeline to use k3s
frostebite Jun 26, 2023
654638c
version: 'latest'
frostebite Jun 26, 2023
383a40e
fixes
frostebite Jun 26, 2023
1040f80
disable aws pipe for now
frostebite Jul 5, 2023
ec2b38d
disable aws pipe for now
frostebite Jul 5, 2023
e488903
disable aws pipe for now
frostebite Jul 5, 2023
c1a199e
disable aws pipe for now
frostebite Jul 6, 2023
613d7cc
disable aws pipe for now
frostebite Jul 6, 2023
4128a15
disable aws pipe for now
frostebite Jul 10, 2023
3488cec
disable aws pipe for now
frostebite Jul 10, 2023
334afd8
disable aws pipe for now
frostebite Jul 10, 2023
cf758e2
disable aws pipe for now
frostebite Jul 10, 2023
50d7f57
disable aws pipe for now
frostebite Jul 10, 2023
2e2eae0
push k8s logs to LOG SERVICE IP
frostebite Jul 17, 2023
e404132
push k8s logs to LOG SERVICE IP
frostebite Jul 17, 2023
c77d0ba
push k8s logs to LOG SERVICE IP
frostebite Jul 17, 2023
8cafc65
push k8s logs to LOG SERVICE IP
frostebite Jul 17, 2023
7385dfe
push k8s logs to LOG SERVICE IP
frostebite Jul 17, 2023
e7802b9
push k8s logs to LOG SERVICE IP
frostebite Jul 17, 2023
37fc4c1
push k8s logs to LOG SERVICE IP
frostebite Jul 17, 2023
cd4fb29
push k8s logs to LOG SERVICE IP
frostebite Jul 17, 2023
e710d72
tests
frostebite Jul 19, 2023
0541b88
tests
frostebite Jul 21, 2023
7a488ec
tests
frostebite Jul 22, 2023
6757bcd
tests
frostebite Jul 22, 2023
219ae16
tests
frostebite Jul 22, 2023
27a1252
tests
frostebite Jul 22, 2023
fecae8e
tests
frostebite Jul 22, 2023
9fafb79
tests
frostebite Jul 22, 2023
5b8e2c7
tests
frostebite Jul 22, 2023
d881c3d
tests
frostebite Jul 22, 2023
8e6762e
tests
frostebite Jul 22, 2023
c3ec851
tests
frostebite Jul 23, 2023
7243511
tests
frostebite Jul 23, 2023
7506b71
tests
frostebite Jul 23, 2023
e73a8b4
tests
frostebite Jul 23, 2023
f52e8ce
tests
frostebite Jul 23, 2023
74b943e
tests
frostebite Jul 23, 2023
a275c2e
podname logs for log service
frostebite Aug 1, 2023
7d2704c
podname logs for log service
frostebite Aug 1, 2023
e7c48f6
podname logs for log service
frostebite Aug 2, 2023
1314055
podname logs for log service
frostebite Aug 2, 2023
2cb1914
podname logs for log service
frostebite Aug 11, 2023
0dd50cc
podname logs for log service
frostebite Aug 11, 2023
f889ac6
podname logs for log service
frostebite Aug 11, 2023
14819a6
podname logs for log service
frostebite Aug 11, 2023
2019e73
podname logs for log service
frostebite Aug 14, 2023
87c7a1f
hashed logs
frostebite Aug 14, 2023
358cf1c
hashed logs
frostebite Aug 14, 2023
4225feb
hashed logs
frostebite Aug 14, 2023
174bda8
hashed logs
frostebite Aug 14, 2023
debe473
hashed logs
frostebite Aug 14, 2023
c658a08
hashed logs
frostebite Aug 14, 2023
9900a91
no wait, just repeat logs
frostebite Aug 15, 2023
a31896b
no wait, just repeat logs
frostebite Aug 15, 2023
eba396b
no wait, just repeat logs
frostebite Aug 15, 2023
39392a1
remove typo - double await
frostebite Aug 17, 2023
964e77c
test fix - kubernetes - name typo in github yaml
frostebite Aug 17, 2023
2b1e4cb
test fix - kubernetes - name typo in github yaml
frostebite Aug 17, 2023
499ad87
check missing log file
frostebite Aug 18, 2023
c6b0f25
check missing log file
frostebite Aug 18, 2023
b489bd5
Push to steam test
frostebite Aug 19, 2023
c5580f8
Push to steam test
frostebite Aug 19, 2023
2e9e9df
Fix path
frostebite Aug 19, 2023
b91e21f
k8s reliable log hashing
frostebite Sep 18, 2023
2739d23
k8s reliable log hashing
frostebite Sep 18, 2023
b0b1cf8
k8s reliable log hashing
frostebite Sep 18, 2023
c0f9b06
hashed logging k8s
frostebite Sep 18, 2023
cc57add
hashed logging k8s
frostebite Sep 18, 2023
df456df
hashed logging k8s
frostebite Sep 19, 2023
51c1da5
hashed logging k8s
frostebite Sep 19, 2023
368f63e
hashed logging k8s
frostebite Sep 20, 2023
6bd6fdd
hashed logging k8s
frostebite Sep 20, 2023
b452c2b
Include log chunk when task runner sees log update, clarify if we can…
frostebite Sep 23, 2023
a760ee8
Include log chunk when task runner sees log update, clarify if we can…
frostebite Sep 23, 2023
5631a3b
Include log chunk when task runner sees log update, clarify if we can…
frostebite Sep 24, 2023
f563b8c
Include log chunk when task runner sees log update, clarify if we can…
frostebite Sep 25, 2023
534c94e
Include log chunk when task runner sees log update, clarify if we can…
frostebite Sep 25, 2023
6c6866f
Fix exit flow for k8s job
frostebite Sep 28, 2023
9cb8294
hash comparison logging for log complete in k8s flow
frostebite Oct 2, 2023
4b07216
Interrupt k8s logs when logs found
frostebite Oct 2, 2023
df4cc41
fixes
frostebite Nov 18, 2023
e296ef2
cleanup async parameter
frostebite Nov 18, 2023
dd13cba
cleanup async parameter
frostebite Nov 18, 2023
f547cb2
cleanup async parameter
frostebite Nov 18, 2023
b14cc24
latest main merged
frostebite Dec 1, 2023
e9336d7
fixes
frostebite Dec 6, 2023
bd3de93
fix
frostebite Dec 9, 2023
41f1f8b
fix
frostebite Dec 9, 2023
a624d7b
fix
frostebite Dec 9, 2023
8ca9214
fix
frostebite Dec 9, 2023
5d52c1d
fix
frostebite Dec 10, 2023
51919eb
Merge commit '9406bce8755d1903fa423d9b39de091ae2875506' into cloud-ru…
frostebite Dec 11, 2023
b4a6b75
fix
frostebite Dec 11, 2023
328bf4e
fix
frostebite Dec 20, 2023
115a9d4
fix
frostebite Dec 20, 2023
c3ec139
fix
frostebite Dec 21, 2023
5133a0b
fix
frostebite Dec 21, 2023
6dd49d6
fix
frostebite Dec 21, 2023
557c799
fix
frostebite Dec 21, 2023
94c9262
fix
frostebite Dec 21, 2023
3592835
fix
frostebite Dec 21, 2023
6ffa535
fix
frostebite Dec 21, 2023
b109ad0
fix
frostebite Dec 21, 2023
675443c
fix
frostebite Dec 21, 2023
dd76efe
fix
frostebite Dec 21, 2023
b595403
fix
frostebite Dec 21, 2023
1d38f8a
fix
frostebite Dec 21, 2023
6488cc3
fix
frostebite Dec 21, 2023
3733938
fix
frostebite Dec 21, 2023
5206ee7
fix
frostebite Dec 22, 2023
4ade890
fix
frostebite Dec 22, 2023
cdbb9e6
fix
frostebite Dec 22, 2023
c30f58b
fix
frostebite Jan 4, 2024
144045f
fix
frostebite Jan 7, 2024
f9b7a21
fix
frostebite Jan 7, 2024
37de5b2
fix
frostebite Jan 7, 2024
66947bd
fix
frostebite Jan 7, 2024
c262c92
fix
frostebite Jan 7, 2024
f5ba540
fix
frostebite Jan 7, 2024
0d70b4d
fix
frostebite Jan 7, 2024
a6f8859
fix
frostebite Jan 11, 2024
c13079a
fix
frostebite Jan 11, 2024
41c4f1c
fix
frostebite Jan 11, 2024
87b1587
fix
frostebite Jan 11, 2024
cdd1bd2
fix
frostebite Jan 12, 2024
74ad7d8
fix
frostebite Jan 19, 2024
71f94af
Merge branch 'main' into cloud-runner-develop
frostebite Jan 27, 2024
aaeb1d1
fix
frostebite Jan 27, 2024
e7dbd46
fix
frostebite Jan 27, 2024
38c3fbb
fix
frostebite Jan 27, 2024
fd181cc
fix
frostebite Jan 27, 2024
8f1f842
fix
frostebite Jan 27, 2024
48c6eef
fix
frostebite Jan 27, 2024
1a36e77
fix
frostebite Jan 29, 2024
5c870d9
fix
frostebite Jan 29, 2024
f8d0a49
fix
frostebite Jan 29, 2024
eb0a426
fix
frostebite Jan 30, 2024
3f48063
fix
frostebite Jan 30, 2024
07ed633
fix
frostebite Jan 30, 2024
1c9e51b
fix
frostebite Jan 30, 2024
b74fa7a
fix
frostebite Jan 30, 2024
e038adc
fix
frostebite Jan 30, 2024
44e887f
fix
frostebite Jan 30, 2024
620a730
fix
frostebite Jan 30, 2024
bb0b3bd
fix
frostebite Jan 31, 2024
f00c248
fix
frostebite Jan 31, 2024
9840db2
fix
frostebite Feb 1, 2024
18ed88c
fix
frostebite Feb 1, 2024
d493977
fix
frostebite Feb 4, 2024
345084e
fix
frostebite Feb 4, 2024
28b4f69
fix
frostebite Feb 5, 2024
d79587f
fix
frostebite Feb 5, 2024
2badcf5
fix
frostebite Feb 6, 2024
f8e3d73
fix
frostebite Feb 6, 2024
5c618dc
fix
frostebite Feb 6, 2024
cb0def7
fix
frostebite Feb 6, 2024
be427a5
fix
frostebite Feb 6, 2024
0682fae
fix
frostebite Feb 6, 2024
ca30440
fix
frostebite Feb 6, 2024
64e78ab
fix
frostebite Feb 6, 2024
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
29 changes: 5 additions & 24 deletions .eslintrc.json
Original file line number Diff line number Diff line change
@@ -1,22 +1,11 @@
{
"plugins": [
"jest",
"@typescript-eslint",
"prettier",
"unicorn"
],
"extends": [
"plugin:unicorn/recommended",
"plugin:github/recommended",
"plugin:prettier/recommended"
],
"plugins": ["jest", "@typescript-eslint", "prettier", "unicorn"],
"extends": ["plugin:unicorn/recommended", "plugin:github/recommended", "plugin:prettier/recommended"],
"parser": "@typescript-eslint/parser",
"parserOptions": {
"ecmaVersion": 2020,
"sourceType": "module",
"extraFileExtensions": [
".mjs"
],
"extraFileExtensions": [".mjs"],
"ecmaFeatures": {
"impliedStrict": true
},
Expand All @@ -33,10 +22,7 @@
// Namespaces or sometimes needed
"import/no-namespace": "off",
// Properly format comments
"spaced-comment": [
"error",
"always"
],
"spaced-comment": ["error", "always"],
"lines-around-comment": [
"error",
{
Expand Down Expand Up @@ -71,12 +57,7 @@
// Enforce camelCase
"camelcase": "error",
// Allow forOfStatements
"no-restricted-syntax": [
"error",
"ForInStatement",
"LabeledStatement",
"WithStatement"
],
"no-restricted-syntax": ["error", "ForInStatement", "LabeledStatement", "WithStatement"],
// Continue is viable in forOf loops in generators
"no-continue": "off",
// From experience, named exports are almost always desired. I got tired of this rule
Expand Down
152 changes: 90 additions & 62 deletions .github/workflows/cloud-runner-ci-pipeline.yml
Original file line number Diff line number Diff line change
Expand Up @@ -18,42 +18,37 @@ env:
GCP_PROJECT: unitykubernetesbuilder
GCP_LOG_FILE: ${{ github.workspace }}/cloud-runner-logs.txt
AWS_REGION: eu-west-2
AWS_ACCESS_KEY_ID: ${{ secrets.AWS_ACCESS_KEY_ID }}
AWS_SECRET_ACCESS_KEY: ${{ secrets.AWS_SECRET_ACCESS_KEY }}
AWS_DEFAULT_REGION: eu-west-2
AWS_STACK_NAME: game-ci-team-pipelines
CLOUD_RUNNER_BRANCH: ${{ github.ref }}
DEBUG: true
UNITY_LICENSE: ${{ secrets.UNITY_LICENSE }}
UNITY_EMAIL: ${{ secrets.UNITY_EMAIL }}
UNITY_PASSWORD: ${{ secrets.UNITY_PASSWORD }}
UNITY_SERIAL: ${{ secrets.UNITY_SERIAL }}
PROJECT_PATH: test-project
UNITY_VERSION: 2019.3.15f1
USE_IL2CPP: false
USE_GKE_GCLOUD_AUTH_PLUGIN: true
GIT_PRIVATE_TOKEN: ${{ secrets.GIT_PRIVATE_TOKEN }}
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}

jobs:
smokeTests:
name: Smoke Tests
tests:
name: Tests
if: github.event.event_type != 'pull_request_target'
runs-on: ubuntu-latest
strategy:
fail-fast: false
matrix:
test:
#- 'cloud-runner-async-workflow'
- 'cloud-runner-end2end-locking'
- 'cloud-runner-end2end-caching'
- 'cloud-runner-end2end-retaining'
- 'cloud-runner-caching'
# - 'cloud-runner-end2end-caching'
# - 'cloud-runner-end2end-retaining'
- 'cloud-runner-environment'
- 'cloud-runner-image'
- 'cloud-runner-hooks'
- 'cloud-runner-local-persistence'
- 'cloud-runner-locking-core'
- 'cloud-runner-locking-get-locked'
providerStrategy:
#- aws
- local-docker
#- k8s
steps:
- name: Checkout (default)
uses: actions/checkout@v4
Expand All @@ -65,58 +60,85 @@ jobs:
aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }}
aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }}
aws-region: eu-west-2
- uses: google-github-actions/auth@v1
if: matrix.providerStrategy == 'k8s'
- run: yarn
- run: yarn run test "${{ matrix.test }}" --detectOpenHandles --forceExit --runInBand
timeout-minutes: 60
env:
UNITY_EMAIL: ${{ secrets.UNITY_EMAIL }}
UNITY_PASSWORD: ${{ secrets.UNITY_PASSWORD }}
UNITY_SERIAL: ${{ secrets.UNITY_SERIAL }}
PROJECT_PATH: test-project
TARGET_PLATFORM: StandaloneWindows64
cloudRunnerTests: true
versioning: None
KUBE_STORAGE_CLASS: local-path
PROVIDER_STRATEGY: local-docker
AWS_ACCESS_KEY_ID: ${{ secrets.AWS_ACCESS_KEY_ID }}
AWS_SECRET_ACCESS_KEY: ${{ secrets.AWS_SECRET_ACCESS_KEY }}
GIT_PRIVATE_TOKEN: ${{ secrets.GIT_PRIVATE_TOKEN }}
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
- run: |
docker volume rm $(docker volume ls -qf dangling=true)
docker rmi $(docker images -q -f dangling=true)
docker rm $(docker ps -aqf status=exited)
docker rmi $(docker images -q)
k8sTests:
name: K8s Tests
if: github.event.event_type != 'pull_request_target'
runs-on: ubuntu-latest
strategy:
fail-fast: false
matrix:
test:
# - 'cloud-runner-async-workflow'
- 'cloud-runner-end2end-locking'
- 'cloud-runner-end2end-caching'
- 'cloud-runner-end2end-retaining'
- 'cloud-runner-kubernetes'
- 'cloud-runner-environment'
- 'cloud-runner-github-checks'
steps:
- name: Checkout (default)
uses: actions/checkout@v2
with:
credentials_json: ${{ secrets.GOOGLE_SERVICE_ACCOUNT_KEY }}
- name: 'Set up Cloud SDK'
if: matrix.providerStrategy == 'k8s'
uses: 'google-github-actions/setup-gcloud@v1.1.0'
- name: Get GKE cluster credentials
if: matrix.providerStrategy == 'k8s'
run: |
export USE_GKE_GCLOUD_AUTH_PLUGIN=True
gcloud components install gke-gcloud-auth-plugin
gcloud container clusters get-credentials $GKE_CLUSTER --zone $GKE_ZONE --project $GKE_PROJECT
lfs: false
- run: yarn
- name: actions-k3s
uses: debianmaster/actions-k3s@v1.0.5
with:
version: 'latest'
- run: yarn run test "${{ matrix.test }}" --detectOpenHandles --forceExit --runInBand
timeout-minutes: 35
timeout-minutes: 60
env:
UNITY_LICENSE: ${{ secrets.UNITY_LICENSE }}
UNITY_EMAIL: ${{ secrets.UNITY_EMAIL }}
UNITY_PASSWORD: ${{ secrets.UNITY_PASSWORD }}
UNITY_SERIAL: ${{ secrets.UNITY_SERIAL }}
PROJECT_PATH: test-project
TARGET_PLATFORM: StandaloneWindows64
cloudRunnerTests: true
versioning: None
CLOUD_RUNNER_CLUSTER: ${{ matrix.providerStrategy }}
tests:
# needs:
# - smokeTests
# - buildTargetTests
name: Integration Tests
KUBE_STORAGE_CLASS: local-path
PROVIDER_STRATEGY: k8s
AWS_ACCESS_KEY_ID: ${{ secrets.AWS_ACCESS_KEY_ID }}
AWS_SECRET_ACCESS_KEY: ${{ secrets.AWS_SECRET_ACCESS_KEY }}
GIT_PRIVATE_TOKEN: ${{ secrets.GIT_PRIVATE_TOKEN }}
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
awsTests:
name: AWS Tests
if: github.event.event_type != 'pull_request_target'
runs-on: ubuntu-latest
strategy:
fail-fast: false
matrix:
providerStrategy:
- aws
- local-docker
- k8s
test:
- 'cloud-runner-async-workflow'
#- 'cloud-runner-caching'
- 'cloud-runner-end2end-locking'
- 'cloud-runner-end2end-caching'
- 'cloud-runner-end2end-retaining'
- 'cloud-runner-environment'
#- 'cloud-runner-hooks'
- 'cloud-runner-s3-steps'
#- 'cloud-runner-local-persistence'
#- 'cloud-runner-locking-core'
#- 'cloud-runner-locking-get-locked'
steps:
- name: Checkout (default)
uses: actions/checkout@v4
uses: actions/checkout@v2
with:
lfs: false
- name: Configure AWS Credentials
Expand All @@ -125,29 +147,24 @@ jobs:
aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }}
aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }}
aws-region: eu-west-2
- uses: google-github-actions/auth@v1
if: matrix.providerStrategy == 'k8s'
with:
credentials_json: ${{ secrets.GOOGLE_SERVICE_ACCOUNT_KEY }}
- name: 'Set up Cloud SDK'
if: matrix.providerStrategy == 'k8s'
uses: 'google-github-actions/setup-gcloud@v1.1.0'
- name: Get GKE cluster credentials
if: matrix.providerStrategy == 'k8s'
run: |
export USE_GKE_GCLOUD_AUTH_PLUGIN=True
gcloud components install gke-gcloud-auth-plugin
gcloud container clusters get-credentials $GKE_CLUSTER --zone $GKE_ZONE --project $GKE_PROJECT
- run: yarn
- run: yarn run test "${{ matrix.test }}" --detectOpenHandles --forceExit --runInBand
timeout-minutes: 60
env:
UNITY_LICENSE: ${{ secrets.UNITY_LICENSE }}
UNITY_EMAIL: ${{ secrets.UNITY_EMAIL }}
UNITY_PASSWORD: ${{ secrets.UNITY_PASSWORD }}
UNITY_SERIAL: ${{ secrets.UNITY_SERIAL }}
PROJECT_PATH: test-project
TARGET_PLATFORM: StandaloneWindows64
cloudRunnerTests: true
versioning: None
PROVIDER_STRATEGY: ${{ matrix.providerStrategy }}
KUBE_STORAGE_CLASS: local-path
PROVIDER_STRATEGY: aws
AWS_ACCESS_KEY_ID: ${{ secrets.AWS_ACCESS_KEY_ID }}
AWS_SECRET_ACCESS_KEY: ${{ secrets.AWS_SECRET_ACCESS_KEY }}
GIT_PRIVATE_TOKEN: ${{ secrets.GIT_PRIVATE_TOKEN }}
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}

buildTargetTests:
name: Local Build Target Tests
runs-on: ubuntu-latest
Expand All @@ -164,7 +181,7 @@ jobs:
- StandaloneLinux64 # Build a Linux 64-bit standalone.
- WebGL # WebGL.
- iOS # Build an iOS player.
- Android # Build an Android .apk.
# - Android # Build an Android .apk.
steps:
- name: Checkout (default)
uses: actions/checkout@v4
Expand All @@ -175,7 +192,13 @@ jobs:
id: unity-build
timeout-minutes: 30
env:
UNITY_LICENSE: ${{ secrets.UNITY_LICENSE }}
UNITY_EMAIL: ${{ secrets.UNITY_EMAIL }}
UNITY_PASSWORD: ${{ secrets.UNITY_PASSWORD }}
UNITY_SERIAL: ${{ secrets.UNITY_SERIAL }}
AWS_ACCESS_KEY_ID: ${{ secrets.AWS_ACCESS_KEY_ID }}
AWS_SECRET_ACCESS_KEY: ${{ secrets.AWS_SECRET_ACCESS_KEY }}
GIT_PRIVATE_TOKEN: ${{ secrets.GIT_PRIVATE_TOKEN }}
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
with:
cloudRunnerTests: true
versioning: None
Expand All @@ -188,3 +211,8 @@ jobs:
name: ${{ matrix.providerStrategy }} Build (${{ matrix.targetPlatform }})
path: ${{ steps.unity-build.outputs.BUILD_ARTIFACT }}
retention-days: 14
- run: |
docker volume rm $(docker volume ls -qf dangling=true)
docker rmi $(docker images -q -f dangling=true)
docker rm $(docker ps -aqf status=exited)
docker rmi $(docker images -q)
4 changes: 2 additions & 2 deletions action.yml
Original file line number Diff line number Diff line change
Expand Up @@ -186,11 +186,11 @@ inputs:
description:
'[CloudRunner] Either local, k8s or aws can be used to run builds on a remote cluster. Additional parameters must
be configured.'
cloudRunnerCpu:
containerCpu:
default: ''
required: false
description: '[CloudRunner] Amount of CPU time to assign the remote build container'
cloudRunnerMemory:
containerMemory:
default: ''
required: false
description: '[CloudRunner] Amount of memory to assign the remote build container'
Expand Down
Loading
Loading