-
Notifications
You must be signed in to change notification settings - Fork 3
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Integration tests: Use oauth client instead of API token #162
Conversation
e436aed
to
816fcdb
Compare
Does the PR have any schema changes?Looking good! No breaking changes found. |
1 similar comment
Does the PR have any schema changes?Looking good! No breaking changes found. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
🚢
Does the PR have any schema changes?Looking good! No breaking changes found. |
Does the PR have any schema changes?Looking good! No breaking changes found. |
Does the PR have any schema changes?Looking good! No breaking changes found. |
Does the PR have any schema changes?Looking good! No breaking changes found. |
Does the PR have any schema changes?Looking good! No breaking changes found. |
This PR aims to reduce ops toil.
It uses the new oauth client to authenticate against Tailscale.
Due to the client creating short-lived API tokens, this brings us to a final resolution for #93 for this provider.
I have unset the TAILSCALE_API_KEY Action secret, generated a Tailscale Oauth client and added those secrets to the repository.
If the integration test passes on this PR, it means the keys are valid.
Additionally, I added a friendly failfast to our tests to verify if the keys exist. This is an improvement over our previous practice of
t.Skip
.h/t to @passcod for the original issue!
Part of #150.