From c44d164b2b74015148849d693c15e214f16a17f8 Mon Sep 17 00:00:00 2001 From: Leon Schuermann Date: Mon, 21 Oct 2024 14:26:43 -0400 Subject: [PATCH] Create treadmill-ci-test.yml --- .github/workflows/treadmill-ci-test.yml | 33 +++++++++++++++++++++++++ 1 file changed, 33 insertions(+) create mode 100644 .github/workflows/treadmill-ci-test.yml diff --git a/.github/workflows/treadmill-ci-test.yml b/.github/workflows/treadmill-ci-test.yml new file mode 100644 index 0000000..9d7abff --- /dev/null +++ b/.github/workflows/treadmill-ci-test.yml @@ -0,0 +1,33 @@ +name: treadmill-ci-test +env: + TERM: xterm # Makes tput work in actions output + +# Controls when the action will run. Triggers the workflow on pull request and +# merge group checks: +# +# KEEP IN SYNC WITH `environment:` ATTRIBUTE BELOW: +on: + push: + branches: + - master + - dev/tock-hardware-ci + # Pull requests from forks will not have access to the required GitHub API + # secrets below, even if they are using an appropriate deployment environment + # and the workflow runs have been approved according to this environment's + # rules. We don't know whether this is a bug on GitHub's end or deliberate. + # Either way, for now we disable this workflow to run on PRs until we have + # an API proxy that securely performs these GitHub API calls (adding runners + # and starting Treadmill jobs with those runner registration tokens), which + # allows this workflow to run without access to repository secrets. + #pull_request: + merge_group: # Run CI for the GitHub merge queue + +permissions: + contents: read + +jobs: + call-treadmill-ci: + uses: ./.github/workflows/treadmill-ci.yml + with: + repository: 'tock/tock-hardware-ci' + environment: ${{ github.event_name == 'pull_request' && 'treadmill-ci' || 'treadmill-ci-merged' }}