From 31fb6727c2cad938cc29d69003b9110c2d646935 Mon Sep 17 00:00:00 2001 From: Prashant Shahi Date: Tue, 11 Mar 2025 16:15:19 +0530 Subject: [PATCH] ci: remove unused GitHub workflows (#7264) Signed-off-by: Prashant Shahi --- .github/workflows/codeball.yml | 17 ---- .github/workflows/codeql.yaml | 71 -------------- .../workflows/create-issue-on-pr-merge.yml | 27 ------ .github/workflows/dependency-review.yml | 22 ----- .github/workflows/e2e-k3s.yaml | 93 ------------------- .github/workflows/jest-coverage-changes.yml | 32 ------- .github/workflows/playwright.yaml | 24 ----- .github/workflows/sonar.yml | 25 ----- 8 files changed, 311 deletions(-) delete mode 100644 .github/workflows/codeball.yml delete mode 100644 .github/workflows/codeql.yaml delete mode 100644 .github/workflows/create-issue-on-pr-merge.yml delete mode 100644 .github/workflows/dependency-review.yml delete mode 100644 .github/workflows/e2e-k3s.yaml delete mode 100644 .github/workflows/jest-coverage-changes.yml delete mode 100644 .github/workflows/playwright.yaml delete mode 100644 .github/workflows/sonar.yml diff --git a/.github/workflows/codeball.yml b/.github/workflows/codeball.yml deleted file mode 100644 index ed69d5c10e..0000000000 --- a/.github/workflows/codeball.yml +++ /dev/null @@ -1,17 +0,0 @@ -name: Codeball -on: [pull_request] - -jobs: - codeball_job: - runs-on: ubuntu-latest - name: Codeball - steps: - # Run Codeball on all new Pull Requests 🚀 - # For customizations and more documentation, see https://github.com/sturdy-dev/codeball-action - - name: Codeball - uses: sturdy-dev/codeball-action@v2 - with: - approvePullRequests: "true" - labelPullRequestsWhenApproved: "true" - labelPullRequestsWhenReviewNeeded: "false" - failJobsWhenReviewNeeded: "false" diff --git a/.github/workflows/codeql.yaml b/.github/workflows/codeql.yaml deleted file mode 100644 index be02f3bb82..0000000000 --- a/.github/workflows/codeql.yaml +++ /dev/null @@ -1,71 +0,0 @@ -# For most projects, this workflow file will not need changing; you simply need -# to commit it to your repository. -# -# You may wish to alter this file to override the set of languages analyzed, -# or to provide custom queries or build logic. -# -# ******** NOTE ******** -# We have attempted to detect the languages in your repository. Please check -# the `language` matrix defined below to confirm you have the correct set of -# supported CodeQL languages. -# -name: "CodeQL" - -on: - push: - branches: [ main, v* ] - pull_request: - # The branches below must be a subset of the branches above - branches: [ main ] - schedule: - - cron: '32 5 * * 5' - -jobs: - analyze: - name: Analyze - runs-on: ubuntu-latest - permissions: - actions: read - contents: read - security-events: write - - strategy: - fail-fast: false - matrix: - language: [ 'go', 'javascript', 'python' ] - # CodeQL supports [ 'cpp', 'csharp', 'go', 'java', 'javascript', 'python' ] - # Learn more: - # https://docs.github.com/en/free-pro-team@latest/github/finding-security-vulnerabilities-and-errors-in-your-code/configuring-code-scanning#changing-the-languages-that-are-analyzed - - steps: - - name: Checkout repository - uses: actions/checkout@v4 - - # Initializes the CodeQL tools for scanning. - - name: Initialize CodeQL - uses: github/codeql-action/init@v2 - with: - languages: ${{ matrix.language }} - # If you wish to specify custom queries, you can do so here or in a config file. - # By default, queries listed here will override any specified in a config file. - # Prefix the list here with "+" to use these queries and those in the config file. - # queries: ./path/to/local/query, your-org/your-repo/queries@main - - # Autobuild attempts to build any compiled languages (C/C++, C#, or Java). - # If this step fails, then you should remove it and run the build manually (see below) - - name: Autobuild - uses: github/codeql-action/autobuild@v2 - - # â„šī¸ Command-line programs to run using the OS shell. - # 📚 https://git.io/JvXDl - - # âœī¸ If the Autobuild fails above, remove it and uncomment the following three lines - # and modify them (or add more) to build your code if your project - # uses a compiled language - - #- run: | - # make bootstrap - # make release - - - name: Perform CodeQL Analysis - uses: github/codeql-action/analyze@v2 diff --git a/.github/workflows/create-issue-on-pr-merge.yml b/.github/workflows/create-issue-on-pr-merge.yml deleted file mode 100644 index 2a79618d12..0000000000 --- a/.github/workflows/create-issue-on-pr-merge.yml +++ /dev/null @@ -1,27 +0,0 @@ -on: - pull_request_target: - types: - - closed - -env: - GITHUB_ACCESS_TOKEN: ${{ secrets.CI_BOT_TOKEN }} - PR_NUMBER: ${{ github.event.number }} -jobs: - create_issue_on_merge: - if: github.event.pull_request.merged == true - runs-on: ubuntu-latest - steps: - - name: Checkout Codebase - uses: actions/checkout@v4 - with: - repository: signoz/gh-bot - - name: Use Node v16 - uses: actions/setup-node@v4 - with: - node-version: 16 - - name: Setup Cache & Install Dependencies - uses: bahmutov/npm-install@v1 - with: - install-command: yarn --frozen-lockfile - - name: Comment on PR - run: node create-issue.js diff --git a/.github/workflows/dependency-review.yml b/.github/workflows/dependency-review.yml deleted file mode 100644 index 4cb3979cea..0000000000 --- a/.github/workflows/dependency-review.yml +++ /dev/null @@ -1,22 +0,0 @@ -# Dependency Review Action -# -# This Action will scan dependency manifest files that change as part of a Pull Request, surfacing known-vulnerable versions of the packages declared or updated in the PR. Once installed, if the workflow run is marked as required, PRs introducing known-vulnerable packages will be blocked from merging. -# -# Source repository: https://github.com/actions/dependency-review-action -# Public documentation: https://docs.github.com/en/code-security/supply-chain-security/understanding-your-software-supply-chain/about-dependency-review#dependency-review-enforcement -name: 'Dependency Review' -on: [pull_request] - -permissions: - contents: read - -jobs: - dependency-review: - runs-on: ubuntu-latest - steps: - - name: 'Checkout Repository' - uses: actions/checkout@v4 - - name: 'Dependency Review' - with: - fail-on-severity: high - uses: actions/dependency-review-action@v3 diff --git a/.github/workflows/e2e-k3s.yaml b/.github/workflows/e2e-k3s.yaml deleted file mode 100644 index b09666fb80..0000000000 --- a/.github/workflows/e2e-k3s.yaml +++ /dev/null @@ -1,93 +0,0 @@ -name: e2e-k3s - -on: - pull_request: - types: [labeled] - -jobs: - - e2e-k3s: - runs-on: ubuntu-latest - if: ${{ github.event.label.name == 'ok-to-test' }} - env: - DOCKER_TAG: pull-${{ github.event.number }} - steps: - - name: Checkout code - uses: actions/checkout@v4 - - - name: Setup golang - uses: actions/setup-go@v4 - with: - go-version: "1.21" - - - name: Build query-service image - env: - DEV_BUILD: 1 - run: make build-ee-query-service-amd64 - - - name: Build frontend image - run: make build-frontend-amd64 - - - name: Create a k3s cluster - uses: AbsaOSS/k3d-action@v2 - with: - cluster-name: "signoz" - - - name: Inject the images to the cluster - run: k3d image import signoz/query-service:$DOCKER_TAG signoz/frontend:$DOCKER_TAG -c signoz - - - name: Set up HotROD sample-app - run: | - # create sample-application namespace - kubectl create ns sample-application - - # apply hotrod k8s manifest file - kubectl -n sample-application apply -f https://raw.githubusercontent.com/SigNoz/signoz/main/sample-apps/hotrod/hotrod.yaml - - # wait for all deployments in sample-application namespace to be READY - kubectl -n sample-application get deploy --output name | xargs -r -n1 -t kubectl -n sample-application rollout status --timeout=300s - - - name: Deploy the app - run: | - # add signoz helm repository - helm repo add signoz https://charts.signoz.io - - # create platform namespace - kubectl create ns platform - - # installing signoz using helm - helm install my-release signoz/signoz -n platform \ - --wait \ - --timeout 10m0s \ - --set frontend.service.type=LoadBalancer \ - --set queryService.image.tag=$DOCKER_TAG \ - --set frontend.image.tag=$DOCKER_TAG - - # get pods, services and the container images - kubectl get pods -n platform - kubectl get svc -n platform - - - name: Kick off a sample-app workload - run: | - # start the locust swarm - kubectl --namespace sample-application run strzal --image=djbingham/curl \ - --restart='OnFailure' -i --tty --rm --command -- curl -X POST -F \ - 'user_count=6' -F 'spawn_rate=2' http://locust-master:8089/swarm - - - name: Get short commit SHA, display tunnel URL and IP Address of the worker node - id: get-subdomain - run: | - subdomain="pr-$(git rev-parse --short HEAD)" - echo "URL for tunnelling: https://$subdomain.loca.lt" - echo "subdomain=$subdomain" >> $GITHUB_OUTPUT - worker_ip="$(curl -4 -s ipconfig.io/ip)" - echo "Worker node IP address: $worker_ip" - - - name: Start tunnel - env: - SUBDOMAIN: ${{ steps.get-subdomain.outputs.subdomain }} - run: | - npm install -g localtunnel - host=$(kubectl get svc -n platform | grep frontend | tr -s ' ' | cut -d" " -f4) - port=$(kubectl get svc -n platform | grep frontend | tr -s ' ' | cut -d" " -f5 | cut -d":" -f1) - lt -p $port -l $host -s $SUBDOMAIN diff --git a/.github/workflows/jest-coverage-changes.yml b/.github/workflows/jest-coverage-changes.yml deleted file mode 100644 index d5df9ce686..0000000000 --- a/.github/workflows/jest-coverage-changes.yml +++ /dev/null @@ -1,32 +0,0 @@ -name: Jest Coverage - changed files - -on: - pull_request: - branches: - - main - -jobs: - build: - runs-on: ubuntu-latest - steps: - - name: Checkout - uses: actions/checkout@v4 - with: - ref: "refs/heads/main" - token: ${{ secrets.GITHUB_TOKEN }} # Provide the GitHub token for authentication - - - name: Fetch branch - run: git fetch origin ${{ github.event.pull_request.head.ref }} - - - run: | - git checkout ${{ github.event.pull_request.head.sha }} - - - uses: actions/setup-node@v4 - with: - node-version: lts/* - - - name: Install dependencies - run: cd frontend && npm install -g yarn && yarn - - - name: npm run test:changedsince - run: cd frontend && npm run i18n:generate-hash && npm run test:changedsince diff --git a/.github/workflows/playwright.yaml b/.github/workflows/playwright.yaml deleted file mode 100644 index 9ad3ef4313..0000000000 --- a/.github/workflows/playwright.yaml +++ /dev/null @@ -1,24 +0,0 @@ -name: Playwright Tests -on: [pull_request] - -jobs: - playwright: - defaults: - run: - working-directory: frontend - timeout-minutes: 60 - runs-on: ubuntu-latest - steps: - - uses: actions/checkout@v4 - - uses: actions/setup-node@v4 - with: - node-version: "16.x" - - name: Install dependencies - run: CI=1 yarn install - - name: Install Playwright - run: npx playwright install --with-deps - - name: Run Playwright tests - run: yarn playwright - env: - # This might depend on your test-runner/language binding - PLAYWRIGHT_TEST_BASE_URL: ${{ secrets.PLAYWRIGHT_TEST_BASE_URL }} diff --git a/.github/workflows/sonar.yml b/.github/workflows/sonar.yml deleted file mode 100644 index eff8de7c6b..0000000000 --- a/.github/workflows/sonar.yml +++ /dev/null @@ -1,25 +0,0 @@ -name: sonar -on: - pull_request: - branches: - - main - paths: - - 'frontend/**' -defaults: - run: - working-directory: frontend -jobs: - sonar-analysis: - runs-on: ubuntu-latest - steps: - - name: Checkout code - uses: actions/checkout@v4 - with: - fetch-depth: 0 - - name: Sonar analysis - uses: sonarsource/sonarcloud-github-action@master - with: - projectBaseDir: frontend - env: - GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }} - SONAR_TOKEN: ${{ secrets.SONAR_TOKEN }}