-
Notifications
You must be signed in to change notification settings - Fork 66
57 lines (57 loc) · 2.01 KB
/
test-harness-ariesvcx-acapy.yml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
name: test-harness-ariesvcx-acapy
# RUNSET_NAME: "aries-vcx to acapy"
# Scope: AIP 1.0
# Exceptions: None
#
# Summary
#
# This runset uses the current main branch of Aries VCX for all of the agents except Bob (holder),
# which uses the master branch of ACA-Py.
# @RFC0023 is excluded, as aries-vcx does not handle unqualified DIDs in invitations/responses
#
# Current
#
# Most tests are currently struggling, due to aries-vcx reporting the wrong connection state to the
# backchannel. Being resolved here: https://github.com/hyperledger/aries-vcx/issues/1253
# @RFC0793 has relatively low success due to aries-vcx not supporting full range of DID methods in
# these tests.
# *Status Note Updated: 2024.07.05*
#
# End
on:
workflow_dispatch:
defaults:
run:
shell: bash
jobs:
test:
runs-on: ubuntu-latest
steps:
- name: checkout-test-harness
uses: actions/checkout@v4
with:
path: test-harness
- name: Docker Login
uses: azure/docker-login@v2
with:
login-server: docker.pkg.github.com
username: $GITHUB_ACTOR
password: ${{ secrets.GITHUB_TOKEN }}
- name: run-von-network
uses: ./test-harness/actions/run-von-network
- name: run-indy-tails-server
uses: ./test-harness/actions/run-indy-tails-server
- name: run-test-harness-wo-reports
uses: ./test-harness/actions/run-test-harness-wo-reports
with:
BUILD_AGENTS: "-a aries-vcx -a acapy-main"
TEST_AGENTS: "-d aries-vcx -b acapy-main"
TEST_SCOPE: "-t @RFC0036,@RFC0037,@RFC0160,@RFC0793 -t ~@wip -t ~@RFC0434 -t ~@RFC0453 -t ~@RFC0211 -t ~@DIDExchangeConnection -t ~@Transport_Ws"
REPORT_PROJECT: aries-vcx-b-acapy
- name: run-send-gen-test-results-secure
if: ${{ always() }}
uses: ./test-harness/actions/run-send-gen-test-results-secure
with:
REPORT_PROJECT: aries-vcx-b-acapy
ADMIN_USER: ${{ secrets.AllureAdminUser }}
ADMIN_PW: ${{ secrets.AllureAdminPW }}