Push event #63 canceled

  • Ran for
  • Total time
mkdtravis/testingdocker:.travis.yml@45a9c4d
jobs:
  include:
    - stage: "Vault Tests"
      name: "A job w/o config for Vault"
      script:
        - echo $SECRET_KEY_A_MESSAGE

    - stage: "Vault Tests"
      name: "jobs includes - two keys should be parsed successfully by user program but not echoed by system call from within program"
      vault:
        api_url: https://vault-dwztla.travis-ci.com
        token:
          secure: "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"
        secrets:
          - namespace:
            - name: ns0
            - project_id/secret_key_0
            - project_id/not_existent
          - namespace:
            - name: ns1
            - project_id/secret_key_a
            - project_id/not_existent
          - ns2/project_id/secret_key_b
          - ns2/project_id/not_existent
      script:
        - ruby ./source/vault_check.rb

    - stage: "Vault Tests"
      name: "jobs includes - two keys should be parsed successfully by user program but not echoed by system call from within program, reversed order of secrets in .travis.yml"
      vault:
        api_url: https://vault-dwztla.travis-ci.com
        token:
          secure: "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"

        secrets:
          - ns2/project_id/secret_key_b
          - ns2/project_id/not_existent
          - namespace:
            - name: ns1
            - project_id/secret_key_a
            - project_id/not_existent
          - namespace:
            - name: ns0
            - project_id/secret_key_0
            - project_id/not_existent
      script:
        - ruby ./source/vault_check.rb

    - stage: "Vault Tests"
      name: "jobs includes - two keys should be not explicitly echoed"
      vault:
        api_url: https://vault-dwztla.travis-ci.com
        token:
          secure: "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"
        secrets:
          - namespace:
            - name: ns1
            - project_id/secret_key_a
            - project_id/not_existent
          - ns2/project_id/secret_key_b
          - ns2/project_id/not_existent
      script:
        - echo "Explicit echo check:"
        - echo $SECRET_KEY_A_MESSAGE
        - echo $SECRET_KEY_B_CLIMATE
        - echo "$SECRET_KEY_A_MESSAGE"
        - echo "$SECRET_KEY_B_CLIMATE"

    - stage: "Vault Tests"
      name: "jobs includes - Plain text token 'plain_token' -> can't connect to the vault as token is wiped out as Travis parsing error does the job"
      vault:
        api_url: https://vault-dwztla.travis-ci.com
        token: "plain_token"
        secrets:
          - namespace:
            - name: ns1
            - project_id/secret_key_a
            - project_id/not_existent
          - ns2/project_id/secret_key_b
          - ns2/project_id/not_existent
      script:
        - ruby ./source/vault_check.rb
        - echo "Explicit echo check:"
        - echo $SECRET_KEY_A_MESSAGE
        - echo $SECRET_KEY_B_CLIMATE
        - echo "$SECRET_KEY_A_MESSAGE"
        - echo "$SECRET_KEY_B_CLIMATE"

    - stage: "Vault Tests"
      name: "jobs includes - Plain text token -> can't connect to the vault as token is wiped out as Travis parsing error does the job"
      vault:
        api_url: https://vault-dwztla.travis-ci.com
        token: "hvs.R8aPmQyWng9ak52n8lwILf2F"
        secrets:
          - namespace:
            - name: ns1
            - project_id/secret_key_a
            - project_id/not_existent
          - ns2/project_id/secret_key_b
          - ns2/project_id/not_existent
      script:
        - ruby ./source/vault_check.rb
        - echo "Explicit echo check:"
        - echo $SECRET_KEY_A_MESSAGE
        - echo $SECRET_KEY_B_CLIMATE
        - echo "$SECRET_KEY_A_MESSAGE"
        - echo "$SECRET_KEY_B_CLIMATE"

    - stage: "Vault Tests"
      name: "jobs includes - Plain text token w/o quotes -> can't connect to the vault as token is wiped out as Travis parsing error does the job"
      vault:
        api_url: https://vault-dwztla.travis-ci.com
        token: hvs.R8aPmQyWng9ak52n8lwILf2F
        secrets:
          - namespace:
            - name: ns1
            - project_id/secret_key_a
            - project_id/not_existent
          - ns2/project_id/secret_key_b
          - ns2/project_id/not_existent
      script:
        - ruby ./source/vault_check.rb
        - echo "Explicit echo check:"
        - echo $SECRET_KEY_A_MESSAGE
        - echo $SECRET_KEY_B_CLIMATE
        - echo "$SECRET_KEY_A_MESSAGE"
        - echo "$SECRET_KEY_B_CLIMATE"

    - stage: "Vault Tests"
      name: "jobs includes -  No secrets defined to download - there is no connection to the vault at all." # since nothing to obtain (no secrets defined), the connection is not executed and not visible in build job logs
      vault:
        api_url: https://vault-dwztla.travis-ci.com
        token:
          secure: "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"
        secrets:
          - kv_api_ver: kv2
      script:
        - ruby ./source/vault_check.rb
        - echo "Explicit echo check:"
        - echo $SECRET_KEY_A_MESSAGE
        - echo $SECRET_KEY_B_CLIMATE
        - echo "$SECRET_KEY_A_MESSAGE"
        - echo "$SECRET_KEY_B_CLIMATE"
Build Config
{
  "language": "ruby",
  "os": [
    "linux"
  ],
  "dist": "xenial",
  "jobs": {
    "include": [
      {
        "stage": "Vault Tests",
        "name": "A job w/o config for Vault",
        "script": [
          "echo $SECRET_KEY_A_MESSAGE"
        ]
      },
      {
        "stage": "Vault Tests",
        "name": "jobs includes - two keys should be parsed successfully by user program but not echoed by system call from within program",
        "vault": {
          "api_url": "https://vault-dwztla.travis-ci.com",
          "token": {
            "secure": "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"
          },
          "secrets": [
            {
              "namespace": [
                {
                  "name": "ns0"
                },
                "project_id/secret_key_0",
                "project_id/not_existent"
              ]
            },
            {
              "namespace": [
                {
                  "name": "ns1"
                },
                "project_id/secret_key_a",
                "project_id/not_existent"
              ]
            },
            "ns2/project_id/secret_key_b",
            "ns2/project_id/not_existent"
          ]
        },
        "script": [
          "ruby ./source/vault_check.rb"
        ]
      },
      {
        "stage": "Vault Tests",
        "name": "jobs includes - two keys should be parsed successfully by user program but not echoed by system call from within program, reversed order of secrets in .travis.yml",
        "vault": {
          "api_url": "https://vault-dwztla.travis-ci.com",
          "token": {
            "secure": "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"
          },
          "secrets": [
            "ns2/project_id/secret_key_b",
            "ns2/project_id/not_existent",
            {
              "namespace": [
                {
                  "name": "ns1"
                },
                "project_id/secret_key_a",
                "project_id/not_existent"
              ]
            },
            {
              "namespace": [
                {
                  "name": "ns0"
                },
                "project_id/secret_key_0",
                "project_id/not_existent"
              ]
            }
          ]
        },
        "script": [
          "ruby ./source/vault_check.rb"
        ]
      },
      {
        "stage": "Vault Tests",
        "name": "jobs includes - two keys should be not explicitly echoed",
        "vault": {
          "api_url": "https://vault-dwztla.travis-ci.com",
          "token": {
            "secure": "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"
          },
          "secrets": [
            {
              "namespace": [
                {
                  "name": "ns1"
                },
                "project_id/secret_key_a",
                "project_id/not_existent"
              ]
            },
            "ns2/project_id/secret_key_b",
            "ns2/project_id/not_existent"
          ]
        },
        "script": [
          "echo \"Explicit echo check:\"",
          "echo $SECRET_KEY_A_MESSAGE",
          "echo $SECRET_KEY_B_CLIMATE",
          "echo \"$SECRET_KEY_A_MESSAGE\"",
          "echo \"$SECRET_KEY_B_CLIMATE\""
        ]
      },
      {
        "stage": "Vault Tests",
        "name": "jobs includes - Plain text token 'plain_token' -> can't connect to the vault as token is wiped out as Travis parsing error does the job",
        "vault": {
          "api_url": "https://vault-dwztla.travis-ci.com",
          "token": "plain_token",
          "secrets": [
            {
              "namespace": [
                {
                  "name": "ns1"
                },
                "project_id/secret_key_a",
                "project_id/not_existent"
              ]
            },
            "ns2/project_id/secret_key_b",
            "ns2/project_id/not_existent"
          ]
        },
        "script": [
          "ruby ./source/vault_check.rb",
          "echo \"Explicit echo check:\"",
          "echo $SECRET_KEY_A_MESSAGE",
          "echo $SECRET_KEY_B_CLIMATE",
          "echo \"$SECRET_KEY_A_MESSAGE\"",
          "echo \"$SECRET_KEY_B_CLIMATE\""
        ]
      },
      {
        "stage": "Vault Tests",
        "name": "jobs includes - Plain text token -> can't connect to the vault as token is wiped out as Travis parsing error does the job",
        "vault": {
          "api_url": "https://vault-dwztla.travis-ci.com",
          "token": "hvs.R8aPmQyWng9ak52n8lwILf2F",
          "secrets": [
            {
              "namespace": [
                {
                  "name": "ns1"
                },
                "project_id/secret_key_a",
                "project_id/not_existent"
              ]
            },
            "ns2/project_id/secret_key_b",
            "ns2/project_id/not_existent"
          ]
        },
        "script": [
          "ruby ./source/vault_check.rb",
          "echo \"Explicit echo check:\"",
          "echo $SECRET_KEY_A_MESSAGE",
          "echo $SECRET_KEY_B_CLIMATE",
          "echo \"$SECRET_KEY_A_MESSAGE\"",
          "echo \"$SECRET_KEY_B_CLIMATE\""
        ]
      },
      {
        "stage": "Vault Tests",
        "name": "jobs includes - Plain text token w/o quotes -> can't connect to the vault as token is wiped out as Travis parsing error does the job",
        "vault": {
          "api_url": "https://vault-dwztla.travis-ci.com",
          "token": "hvs.R8aPmQyWng9ak52n8lwILf2F",
          "secrets": [
            {
              "namespace": [
                {
                  "name": "ns1"
                },
                "project_id/secret_key_a",
                "project_id/not_existent"
              ]
            },
            "ns2/project_id/secret_key_b",
            "ns2/project_id/not_existent"
          ]
        },
        "script": [
          "ruby ./source/vault_check.rb",
          "echo \"Explicit echo check:\"",
          "echo $SECRET_KEY_A_MESSAGE",
          "echo $SECRET_KEY_B_CLIMATE",
          "echo \"$SECRET_KEY_A_MESSAGE\"",
          "echo \"$SECRET_KEY_B_CLIMATE\""
        ]
      },
      {
        "stage": "Vault Tests",
        "name": "jobs includes -  No secrets defined to download - there is no connection to the vault at all.",
        "vault": {
          "api_url": "https://vault-dwztla.travis-ci.com",
          "token": {
            "secure": "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"
          },
          "secrets": [
            {
              "kv_api_ver": "kv2"
            }
          ]
        },
        "script": [
          "ruby ./source/vault_check.rb",
          "echo \"Explicit echo check:\"",
          "echo $SECRET_KEY_A_MESSAGE",
          "echo $SECRET_KEY_B_CLIMATE",
          "echo \"$SECRET_KEY_A_MESSAGE\"",
          "echo \"$SECRET_KEY_B_CLIMATE\""
        ]
      }
    ]
  }
}