Some checks failed
Block internal-flavored paths / Block forbidden paths (pull_request) Successful in 3s
E2E Staging SaaS (full lifecycle) / E2E Staging SaaS (pull_request) Has been skipped
CI / Detect changes (pull_request) Successful in 10s
Harness Replays / detect-changes (pull_request) Successful in 12s
Secret scan / Scan diff for credential-shaped strings (pull_request) Successful in 15s
E2E API Smoke Test / detect-changes (pull_request) Successful in 22s
sop-checklist / na-declarations (pull_request) awaiting /sop-n/a declaration for: qa-review, security-review
qa-review / approved (pull_request) Failing after 16s
E2E Staging Canvas (Playwright) / detect-changes (pull_request) Successful in 28s
Handlers Postgres Integration / detect-changes (pull_request) Successful in 27s
Runtime PR-Built Compatibility / detect-changes (pull_request) Successful in 27s
security-review / approved (pull_request) Failing after 17s
gate-check-v3 / gate-check (pull_request) Successful in 27s
CI / Canvas (Next.js) (pull_request) Successful in 8s
CI / Shellcheck (E2E scripts) (pull_request) Successful in 7s
sop-checklist / all-items-acked (pull_request) Successful in 14s
sop-tier-check / tier-check (pull_request) Successful in 13s
CI / Canvas Deploy Reminder (pull_request) Has been skipped
CI / Python Lint & Test (pull_request) Successful in 3s
Harness Replays / Harness Replays (pull_request) Successful in 3s
E2E Staging SaaS (full lifecycle) / pr-validate (pull_request) Successful in 36s
E2E Staging Canvas (Playwright) / Canvas tabs E2E (pull_request) Successful in 5s
Runtime PR-Built Compatibility / PR-built wheel + import smoke (pull_request) Successful in 4s
Handlers Postgres Integration / Handlers Postgres Integration (pull_request) Failing after 41s
lint-required-no-paths / lint-required-no-paths (pull_request) Successful in 1m14s
Ops Scripts Tests / Ops scripts (unittest) (pull_request) Successful in 1m18s
E2E API Smoke Test / E2E API Smoke Test (pull_request) Successful in 1m1s
CI / Platform (Go) (pull_request) Failing after 1m13s
CI / all-required (pull_request) Successful in 1s
E2E Staging External Runtime / E2E Staging External Runtime (pull_request) Successful in 5m21s
audit-force-merge / audit (pull_request) Has been skipped
E2E API smoke test fails intermittently with: Server failed: listen tcp :8080: bind: address already in use Root cause: concurrent CI runs on the same host-network act_runner all bind the platform server to fixed port :8080. When a previous run is cancelled before the "Stop platform" step runs, its process lingers on :8080 and the new run fails to bind. Fix: add a pre-start step that probes :8080 and kills any stale platform-server via /proc scan. This is safe (no false positives — only kills if the port is actually in use) and requires no extra tools beyond curl+grep+kill which are universally available on Ubuntu/Debian runners. Refs: internal#374 Fixes: internal#374 Co-Authored-By: Claude Opus 4.7 <noreply@anthropic.com>
330 lines
16 KiB
YAML
330 lines
16 KiB
YAML
name: E2E API Smoke Test
|
|
# Extracted from ci.yml so workflow-level concurrency can protect this job
|
|
# from run-level cancellation (issue #458).
|
|
#
|
|
# Trigger model (revised 2026-04-29):
|
|
#
|
|
# Always FIRES on push/pull_request to staging+main. Real work is gated
|
|
# per-step on `needs.detect-changes.outputs.api` — when paths under
|
|
# `workspace-server/`, `tests/e2e/`, or this workflow file haven't
|
|
# changed, the no-op step alone runs and emits SUCCESS for the
|
|
# `E2E API Smoke Test` check, satisfying branch protection without
|
|
# spending CI cycles. See the in-job comment on the `e2e-api` job for
|
|
# why this is one job (not two-jobs-sharing-name) and the 2026-04-29
|
|
# PR #2264 incident that drove the consolidation.
|
|
#
|
|
# Parallel-safety (Class B Hongming-owned CICD red sweep, 2026-05-08)
|
|
# -------------------------------------------------------------------
|
|
# Same substrate hazard as PR #98 (handlers-postgres-integration). Our
|
|
# Gitea act_runner runs with `container.network: host` (operator host
|
|
# `/opt/molecule/runners/config.yaml`), which means:
|
|
#
|
|
# * Two concurrent runs both try to bind their `-p 15432:5432` /
|
|
# `-p 16379:6379` host ports — the second postgres/redis FATALs
|
|
# with `Address in use` and `docker run` returns exit 125 with
|
|
# `Conflict. The container name "/molecule-ci-postgres" is already
|
|
# in use by container ...`. Verified in run a7/2727 on 2026-05-07.
|
|
# * The fixed container names `molecule-ci-postgres` / `-redis` (the
|
|
# pre-fix shape) collide on name AS WELL AS port. The cleanup-with-
|
|
# `docker rm -f` at the start of the second job KILLS the first
|
|
# job's still-running postgres/redis.
|
|
#
|
|
# Fix shape (mirrors PR #98's bridge-net pattern, adapted because
|
|
# platform-server is a Go binary on the host, not a containerised
|
|
# step):
|
|
#
|
|
# 1. Unique container names per run:
|
|
# pg-e2e-api-${RUN_ID}-${RUN_ATTEMPT}
|
|
# redis-e2e-api-${RUN_ID}-${RUN_ATTEMPT}
|
|
# `${RUN_ID}-${RUN_ATTEMPT}` is unique even across reruns of the
|
|
# same run_id.
|
|
# 2. Ephemeral host port per run (`-p 0:5432`), then read the actual
|
|
# bound port via `docker port` and export DATABASE_URL/REDIS_URL
|
|
# pointing at it. No fixed host-port → no port collision.
|
|
# 3. `127.0.0.1` (NOT `localhost`) in URLs — IPv6 first-resolve was
|
|
# the original flake fixed in #92 and the script's still IPv6-
|
|
# enabled.
|
|
# 4. `if: always()` cleanup so containers don't leak when test steps
|
|
# fail.
|
|
#
|
|
# Issue #94 items #2 + #3 (also fixed here):
|
|
# * Pre-pull `alpine:latest` so the platform-server's provisioner
|
|
# (`internal/handlers/container_files.go`) can stand up its
|
|
# ephemeral token-write helper without a daemon.io round-trip.
|
|
# * Create `molecule-core-net` bridge network if missing so the
|
|
# provisioner's container.HostConfig {NetworkMode: ...} attach
|
|
# succeeds.
|
|
# Item #1 (timeouts) — evidence on recent runs (77/3191, ae/4270, 0e/
|
|
# 2318) shows Postgres ready in 3s, Redis in 1s, Platform in 1s when
|
|
# they DO come up. Timeouts are not the bottleneck; not bumped.
|
|
#
|
|
# Item explicitly NOT fixed here: failing test `Status back online`
|
|
# fails because the platform's langgraph workspace template image
|
|
# (ghcr.io/molecule-ai/workspace-template-langgraph:latest) returns
|
|
# 403 Forbidden post-2026-05-06 GitHub org suspension. That is a
|
|
# template-registry resolution issue (ADR-002 / local-build mode) and
|
|
# belongs in a separate change that touches workspace-server, not
|
|
# this workflow file.
|
|
|
|
on:
|
|
push:
|
|
branches: [main, staging]
|
|
pull_request:
|
|
branches: [main, staging]
|
|
workflow_dispatch:
|
|
|
|
concurrency:
|
|
# Per-SHA grouping (changed 2026-04-28 from per-ref). Per-ref had the
|
|
# same auto-promote-staging brittleness as e2e-staging-canvas — back-
|
|
# to-back staging pushes share refs/heads/staging, so the older push's
|
|
# queued run gets cancelled when a newer push lands. Auto-promote-
|
|
# staging then sees `completed/cancelled` for the older SHA and stays
|
|
# put; the newer SHA's gates may eventually save the day, but if the
|
|
# newer push gets cancelled too, we deadlock.
|
|
#
|
|
# See e2e-staging-canvas.yml's identical concurrency block for the full
|
|
# rationale and the 2026-04-28 incident reference.
|
|
group: e2e-api-${{ github.event.pull_request.head.sha || github.sha }}
|
|
cancel-in-progress: false
|
|
|
|
jobs:
|
|
detect-changes:
|
|
runs-on: ubuntu-latest
|
|
outputs:
|
|
api: ${{ steps.decide.outputs.api }}
|
|
steps:
|
|
- uses: actions/checkout@de0fac2e4500dabe0009e67214ff5f5447ce83dd # v6.0.2
|
|
- uses: dorny/paths-filter@fbd0ab8f3e69293af611ebaee6363fc25e6d187d # v4.0.1
|
|
id: filter
|
|
with:
|
|
filters: |
|
|
api:
|
|
- 'workspace-server/**'
|
|
- 'tests/e2e/**'
|
|
- '.github/workflows/e2e-api.yml'
|
|
- id: decide
|
|
# Always run real work for manual dispatch — no diff context to
|
|
# filter against and ops dispatching this expects the suite to
|
|
# actually exercise the platform.
|
|
run: |
|
|
if [ "${{ github.event_name }}" = "workflow_dispatch" ]; then
|
|
echo "api=true" >> "$GITHUB_OUTPUT"
|
|
else
|
|
echo "api=${{ steps.filter.outputs.api }}" >> "$GITHUB_OUTPUT"
|
|
fi
|
|
|
|
# ONE job (no job-level `if:`) that always runs and reports under the
|
|
# required-check name `E2E API Smoke Test`. Real work is gated per-step
|
|
# on `needs.detect-changes.outputs.api`. Reason: GitHub registers a
|
|
# check run for every job that matches `name:`, and a job-level
|
|
# `if: false` produces a SKIPPED check run. Branch protection treats
|
|
# all check runs with a matching context name on the latest commit as a
|
|
# SET — any SKIPPED in the set fails the required-check eval, even with
|
|
# SUCCESS siblings. Verified 2026-04-29 on PR #2264 (staging→main):
|
|
# 4 check runs (2 SKIPPED + 2 SUCCESS) at the head SHA blocked
|
|
# promotion despite all real work succeeding. Collapsing to a single
|
|
# always-running job with conditional steps emits exactly one SUCCESS
|
|
# check run regardless of paths filter — branch-protection-clean.
|
|
e2e-api:
|
|
needs: detect-changes
|
|
name: E2E API Smoke Test
|
|
runs-on: ubuntu-latest
|
|
timeout-minutes: 15
|
|
env:
|
|
# Unique per-run container names so concurrent runs on the host-
|
|
# network act_runner don't collide on name OR port.
|
|
# `${RUN_ID}-${RUN_ATTEMPT}` stays unique across reruns of the
|
|
# same run_id. PORT is set later (after docker port lookup) since
|
|
# we let Docker assign an ephemeral host port.
|
|
PG_CONTAINER: pg-e2e-api-${{ github.run_id }}-${{ github.run_attempt }}
|
|
REDIS_CONTAINER: redis-e2e-api-${{ github.run_id }}-${{ github.run_attempt }}
|
|
PORT: "8080"
|
|
steps:
|
|
- name: No-op pass (paths filter excluded this commit)
|
|
if: needs.detect-changes.outputs.api != 'true'
|
|
run: |
|
|
echo "No workspace-server / tests/e2e / workflow changes — E2E API gate satisfied without running tests."
|
|
echo "::notice::E2E API Smoke Test no-op pass (paths filter excluded this commit)."
|
|
- if: needs.detect-changes.outputs.api == 'true'
|
|
uses: actions/checkout@de0fac2e4500dabe0009e67214ff5f5447ce83dd # v6.0.2
|
|
- if: needs.detect-changes.outputs.api == 'true'
|
|
uses: actions/setup-go@40f1582b2485089dde7abd97c1529aa768e1baff # v5
|
|
with:
|
|
go-version: 'stable'
|
|
cache: true
|
|
cache-dependency-path: workspace-server/go.sum
|
|
- name: Pre-pull alpine + ensure provisioner network (Issue #94 items #2 + #3)
|
|
if: needs.detect-changes.outputs.api == 'true'
|
|
run: |
|
|
# Provisioner uses alpine:latest for ephemeral token-write
|
|
# containers (workspace-server/internal/handlers/container_files.go).
|
|
# Pre-pull so the first provision in test_api.sh doesn't race
|
|
# the daemon's pull cache. Idempotent — `docker pull` is a no-op
|
|
# when the image is already present.
|
|
docker pull alpine:latest >/dev/null
|
|
# Provisioner attaches workspace containers to
|
|
# molecule-core-net (workspace-server/internal/provisioner/
|
|
# provisioner.go::DefaultNetwork). The bridge already exists on
|
|
# the operator host's docker daemon — `network create` is
|
|
# idempotent via `|| true`.
|
|
docker network create molecule-core-net >/dev/null 2>&1 || true
|
|
echo "alpine:latest pre-pulled; molecule-core-net ensured."
|
|
- name: Start Postgres (docker)
|
|
if: needs.detect-changes.outputs.api == 'true'
|
|
run: |
|
|
# Defensive cleanup — only matches THIS run's container name,
|
|
# so it cannot kill a sibling run's postgres. (Pre-fix the
|
|
# name was static and this rm hit other runs' containers.)
|
|
docker rm -f "$PG_CONTAINER" 2>/dev/null || true
|
|
# `-p 0:5432` requests an ephemeral host port; we read it back
|
|
# below and export DATABASE_URL.
|
|
docker run -d --name "$PG_CONTAINER" \
|
|
-e POSTGRES_USER=dev -e POSTGRES_PASSWORD=dev -e POSTGRES_DB=molecule \
|
|
-p 0:5432 postgres:16 >/dev/null
|
|
# Resolve the host-side port assignment. `docker port` prints
|
|
# `0.0.0.0:NNNN` (and on host-net runners may also print an
|
|
# IPv6 line — take the first IPv4 line).
|
|
PG_PORT=$(docker port "$PG_CONTAINER" 5432/tcp | awk -F: '/^0\.0\.0\.0:/ {print $2; exit}')
|
|
if [ -z "$PG_PORT" ]; then
|
|
# Fallback: any first line. Some Docker versions print only
|
|
# one line.
|
|
PG_PORT=$(docker port "$PG_CONTAINER" 5432/tcp | head -1 | awk -F: '{print $NF}')
|
|
fi
|
|
if [ -z "$PG_PORT" ]; then
|
|
echo "::error::Could not resolve host port for $PG_CONTAINER"
|
|
docker port "$PG_CONTAINER" 5432/tcp || true
|
|
docker logs "$PG_CONTAINER" || true
|
|
exit 1
|
|
fi
|
|
# 127.0.0.1 (NOT localhost) — IPv6 first-resolve flake (#92).
|
|
echo "PG_PORT=${PG_PORT}" >> "$GITHUB_ENV"
|
|
echo "DATABASE_URL=postgres://dev:dev@127.0.0.1:${PG_PORT}/molecule?sslmode=disable" >> "$GITHUB_ENV"
|
|
echo "Postgres host port: ${PG_PORT}"
|
|
for i in $(seq 1 30); do
|
|
if docker exec "$PG_CONTAINER" pg_isready -U dev >/dev/null 2>&1; then
|
|
echo "Postgres ready after ${i}s"
|
|
exit 0
|
|
fi
|
|
sleep 1
|
|
done
|
|
echo "::error::Postgres did not become ready in 30s"
|
|
docker logs "$PG_CONTAINER" || true
|
|
exit 1
|
|
- name: Start Redis (docker)
|
|
if: needs.detect-changes.outputs.api == 'true'
|
|
run: |
|
|
docker rm -f "$REDIS_CONTAINER" 2>/dev/null || true
|
|
docker run -d --name "$REDIS_CONTAINER" -p 0:6379 redis:7 >/dev/null
|
|
REDIS_PORT=$(docker port "$REDIS_CONTAINER" 6379/tcp | awk -F: '/^0\.0\.0\.0:/ {print $2; exit}')
|
|
if [ -z "$REDIS_PORT" ]; then
|
|
REDIS_PORT=$(docker port "$REDIS_CONTAINER" 6379/tcp | head -1 | awk -F: '{print $NF}')
|
|
fi
|
|
if [ -z "$REDIS_PORT" ]; then
|
|
echo "::error::Could not resolve host port for $REDIS_CONTAINER"
|
|
docker port "$REDIS_CONTAINER" 6379/tcp || true
|
|
docker logs "$REDIS_CONTAINER" || true
|
|
exit 1
|
|
fi
|
|
echo "REDIS_PORT=${REDIS_PORT}" >> "$GITHUB_ENV"
|
|
echo "REDIS_URL=redis://127.0.0.1:${REDIS_PORT}" >> "$GITHUB_ENV"
|
|
echo "Redis host port: ${REDIS_PORT}"
|
|
for i in $(seq 1 15); do
|
|
if docker exec "$REDIS_CONTAINER" redis-cli ping 2>/dev/null | grep -q PONG; then
|
|
echo "Redis ready after ${i}s"
|
|
exit 0
|
|
fi
|
|
sleep 1
|
|
done
|
|
echo "::error::Redis did not become ready in 15s"
|
|
docker logs "$REDIS_CONTAINER" || true
|
|
exit 1
|
|
- name: Build platform
|
|
if: needs.detect-changes.outputs.api == 'true'
|
|
working-directory: workspace-server
|
|
run: go build -o platform-server ./cmd/server
|
|
- name: Free port 8080 before start
|
|
if: needs.detect-changes.outputs.api == 'true'
|
|
run: |
|
|
# Kill any stale platform-server from a previous run that failed to
|
|
# clean up (e.g. runner was cancelled before the Stop step ran).
|
|
# Concurrent runs on the same host-network runner all bind :8080.
|
|
# Try curl first (cheap), kill if port is occupied.
|
|
if curl -sf http://127.0.0.1:8080/health > /dev/null 2>&1; then
|
|
echo "Port 8080 in use — killing stale platform-server"
|
|
# /proc scan — works on any Linux without pkill/lsof/ss.
|
|
# comm field is truncated to 15 chars: "platform-serve" matches.
|
|
# shellcheck disable=SC2013
|
|
for pid in $(grep -l "platform-serve" /proc/[0-9]*/comm 2>/dev/null); do
|
|
kpid="${pid%/comm}"
|
|
kpid="${kpid##*/}"
|
|
echo "Killing stale process $kpid"
|
|
kill "$kpid" 2>/dev/null || true
|
|
done
|
|
sleep 2 # Wait for port to release.
|
|
else
|
|
echo "Port 8080 is free"
|
|
fi
|
|
- name: Start platform (background)
|
|
if: needs.detect-changes.outputs.api == 'true'
|
|
working-directory: workspace-server
|
|
run: |
|
|
# DATABASE_URL + REDIS_URL exported by the start-postgres /
|
|
# start-redis steps point at this run's per-run host ports.
|
|
./platform-server > platform.log 2>&1 &
|
|
echo $! > platform.pid
|
|
- name: Wait for /health
|
|
if: needs.detect-changes.outputs.api == 'true'
|
|
run: |
|
|
for i in $(seq 1 30); do
|
|
if curl -sf http://127.0.0.1:8080/health > /dev/null; then
|
|
echo "Platform up after ${i}s"
|
|
exit 0
|
|
fi
|
|
sleep 1
|
|
done
|
|
echo "::error::Platform did not become healthy in 30s"
|
|
cat workspace-server/platform.log || true
|
|
exit 1
|
|
- name: Assert migrations applied
|
|
if: needs.detect-changes.outputs.api == 'true'
|
|
run: |
|
|
tables=$(docker exec "$PG_CONTAINER" psql -U dev -d molecule -tAc "SELECT count(*) FROM information_schema.tables WHERE table_schema='public' AND table_name='workspaces'")
|
|
if [ "$tables" != "1" ]; then
|
|
echo "::error::Migrations did not apply"
|
|
cat workspace-server/platform.log || true
|
|
exit 1
|
|
fi
|
|
echo "Migrations OK"
|
|
- name: Run E2E API tests
|
|
if: needs.detect-changes.outputs.api == 'true'
|
|
run: bash tests/e2e/test_api.sh
|
|
- name: Run notify-with-attachments E2E
|
|
if: needs.detect-changes.outputs.api == 'true'
|
|
run: bash tests/e2e/test_notify_attachments_e2e.sh
|
|
- name: Run priority-runtimes E2E (claude-code + hermes — skips when keys absent)
|
|
if: needs.detect-changes.outputs.api == 'true'
|
|
run: bash tests/e2e/test_priority_runtimes_e2e.sh
|
|
- name: Run poll-mode + since_id cursor E2E (#2339)
|
|
if: needs.detect-changes.outputs.api == 'true'
|
|
run: bash tests/e2e/test_poll_mode_e2e.sh
|
|
- name: Run poll-mode chat upload E2E (RFC #2891)
|
|
if: needs.detect-changes.outputs.api == 'true'
|
|
run: bash tests/e2e/test_poll_mode_chat_upload_e2e.sh
|
|
- name: Dump platform log on failure
|
|
if: failure() && needs.detect-changes.outputs.api == 'true'
|
|
run: cat workspace-server/platform.log || true
|
|
- name: Stop platform
|
|
if: always() && needs.detect-changes.outputs.api == 'true'
|
|
run: |
|
|
if [ -f workspace-server/platform.pid ]; then
|
|
kill "$(cat workspace-server/platform.pid)" 2>/dev/null || true
|
|
fi
|
|
- name: Stop service containers
|
|
# always() so containers don't leak when test steps fail. The
|
|
# cleanup is best-effort: if the container is already gone
|
|
# (e.g. concurrent rerun race), don't fail the job.
|
|
if: always() && needs.detect-changes.outputs.api == 'true'
|
|
run: |
|
|
docker rm -f "$PG_CONTAINER" 2>/dev/null || true
|
|
docker rm -f "$REDIS_CONTAINER" 2>/dev/null || true
|