Skip to content
This repository has been archived by the owner on Jul 12, 2023. It is now read-only.

e2e test container #265

Closed
mikehelmick opened this issue Aug 18, 2020 · 5 comments · Fixed by #417 or #420
Closed

e2e test container #265

mikehelmick opened this issue Aug 18, 2020 · 5 comments · Fixed by #417 or #420
Assignees
Labels
kind/enhancement New feature or feature request.

Comments

@mikehelmick
Copy link
Contributor

Bundle the e2e test tool into a runnable HTTP server/container.

essentially the tools/e2e tester that can be run an an automated fashion as a prober.

Setup instructions (needs to be fully written as part of this)

  • create a separate realm for the probers
  • configure a key sever for that healthAuthorityID that puts keys into an UNUSED region so that they generated keys don't enter the general export population

/kind enhancement

@mikehelmick mikehelmick added this to the v0.5.0 milestone Aug 18, 2020
@google-oss-robot google-oss-robot added the kind/enhancement New feature or feature request. label Aug 18, 2020
@yegle
Copy link
Contributor

yegle commented Aug 20, 2020

@mikehelmick I can start working on this. Do you have a quick write up on how to use the e2e tester?

@mikehelmick
Copy link
Contributor Author

don't have a quick writeup.
All of the flags in the e2e tester define what settings are needed, essentially just needs to know which servers to connect to and which credentials to use.

@yegle
Copy link
Contributor

yegle commented Aug 20, 2020

/assign @yegle

@yegle
Copy link
Contributor

yegle commented Aug 25, 2020

Finally get everything working:

$ ./e2e-test     
{"severity":"INFO","timestamp":"2020-08-25T14:40:41.582403443-07:00","caller":"e2e-test/main.go:118","message":"Issuing verification code, iteration 0"}
{"severity":"INFO","timestamp":"2020-08-25T14:40:41.775751238-07:00","caller":"e2e-test/main.go:131","message":"Verifying code and getting token"}
{"severity":"INFO","timestamp":"2020-08-25T14:40:42.068807114-07:00","caller":"e2e-test/main.go:143","message":"Check code status"}
{"severity":"INFO","timestamp":"2020-08-25T14:40:42.170099368-07:00","caller":"e2e-test/main.go:159","message":"Calculating HMAC and getting verification certificate"}
{"severity":"INFO","timestamp":"2020-08-25T14:40:42.408116092-07:00","caller":"e2e-test/main.go:187","message":"Publish TEKs to the key server"}
{"severity":"INFO","timestamp":"2020-08-25T14:40:42.548661736-07:00","caller":"e2e-test/main.go:200","message":"Inserted 14 exposures"}
{"severity":"INFO","timestamp":"2020-08-25T14:40:42.548738954-07:00","caller":"e2e-test/main.go:79","message":"successful shutdown"}
$ ./e2e-test -revise
{"severity":"INFO","timestamp":"2020-08-25T14:41:26.359729116-07:00","caller":"e2e-test/main.go:118","message":"Issuing verification code, iteration 0"}
{"severity":"INFO","timestamp":"2020-08-25T14:41:26.595322994-07:00","caller":"e2e-test/main.go:131","message":"Verifying code and getting token"}
{"severity":"INFO","timestamp":"2020-08-25T14:41:26.906078219-07:00","caller":"e2e-test/main.go:143","message":"Check code status"}
{"severity":"INFO","timestamp":"2020-08-25T14:41:27.009109277-07:00","caller":"e2e-test/main.go:159","message":"Calculating HMAC and getting verification certificate"}
{"severity":"INFO","timestamp":"2020-08-25T14:41:27.257665966-07:00","caller":"e2e-test/main.go:187","message":"Publish TEKs to the key server"}
{"severity":"INFO","timestamp":"2020-08-25T14:41:27.420324982-07:00","caller":"e2e-test/main.go:200","message":"Inserted 14 exposures"}
{"severity":"INFO","timestamp":"2020-08-25T14:41:27.420399977-07:00","caller":"e2e-test/main.go:118","message":"Issuing verification code, iteration 1"}
{"severity":"INFO","timestamp":"2020-08-25T14:41:27.540427384-07:00","caller":"e2e-test/main.go:131","message":"Verifying code and getting token"}
{"severity":"INFO","timestamp":"2020-08-25T14:41:27.763235987-07:00","caller":"e2e-test/main.go:143","message":"Check code status"}
{"severity":"INFO","timestamp":"2020-08-25T14:41:27.873048443-07:00","caller":"e2e-test/main.go:159","message":"Calculating HMAC and getting verification certificate"}
{"severity":"INFO","timestamp":"2020-08-25T14:41:28.096963344-07:00","caller":"e2e-test/main.go:187","message":"Publish TEKs to the key server"}
{"severity":"INFO","timestamp":"2020-08-25T14:41:28.200618194-07:00","caller":"e2e-test/main.go:200","message":"Inserted 1 exposures"}
{"severity":"INFO","timestamp":"2020-08-25T14:41:28.200681907-07:00","caller":"e2e-test/main.go:79","message":"successful shutdown"}

@yegle
Copy link
Contributor

yegle commented Aug 30, 2020

Still need to configure Cloud Scheduler to probe the e2e-service.

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
kind/enhancement New feature or feature request.
Projects
None yet
3 participants