-
Notifications
You must be signed in to change notification settings - Fork 32
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Develop->Master #360
base: master
Are you sure you want to change the base?
Develop->Master #360
Conversation
changes to templates, code parser, and test data
Also, there are a few other test files that should all be changed and tested together...
…est token in the test_local folder
Check KBASE_TEST_TOKEN env var if no dev token is found
…trieval of information from git.properties file.
…tarting kb-sdk. Add release notes. Fix KBase report class name error in Java version.
Let's skip ci this time.
Java edits for kb-sdk 1.3
Update Dockerfile
Makefile template change for develop branch.
Adding kb-sdk image build and upload to Dockerhub to GitHub actions
Remove outdated sdkbase directory and docs
…cfg file Remove extra step of adding in the test token to the test.cfg file in the github actions Improve error message text with information about where the kbase test token may be found Update release notes; bump version number.
Update entrypoint script to force root user
Removing "-t" flag to allow github actions to run kb-sdk
DEVOPS-1197: Add GHA actions
Update module_test_python_client.vm.properties
…at no longer exists
Fixing kb_sdk tests, slimming down dockerfile
Updating Dockerfile to enable `docker buildx`
363 python Server.py file adds extraneous quotes to error messages
This pull request sets up GitHub code scanning for this repository. Once the scans have completed and the checks have passed, the analysis results for this pull request branch will appear on this overview. Once you merge this pull request, the 'Security' tab will show more code scanning analysis results (for example, for the default branch). Depending on your configuration and choice of analysis tool, future pull requests will be annotated with code scanning analysis results. For more information about GitHub code scanning, check out the documentation. |
if: "!contains(github.event.head_commit.message, 'skip ci')" | ||
runs-on: ${{ matrix.os }} | ||
strategy: | ||
fail-fast: false | ||
matrix: | ||
os: [ubuntu-20.04, ubuntu-latest] | ||
language: [perl, python, java] | ||
test_type: [base] #, example] | ||
auth: [token, env_var] | ||
|
||
steps: | ||
- name: Checkout | ||
uses: actions/checkout@v3 | ||
|
||
# build kb-sdk from source and test basic functions | ||
- name: Set up JDK 1.8 | ||
uses: actions/setup-java@v3 | ||
with: | ||
distribution: temurin | ||
java-version: 8.0.362+9 | ||
|
||
- name: Build with Ant | ||
run: | | ||
make | ||
|
||
- name: Add bin to $PATH | ||
run: | | ||
echo "$GITHUB_WORKSPACE/bin" >> $GITHUB_PATH | ||
|
||
- name: checking kb-sdk functions | ||
env: | ||
KBASE_TEST_TOKEN: ${{ secrets.KBASE_TEST_TOKEN }} | ||
LANGUAGE_TOKEN: ${{ matrix.language }} | ||
run: | | ||
env | ||
kb-sdk help | ||
kb-sdk version | ||
|
||
# the following steps create a KBase app using the SDK | ||
# and runs some checks to ensure the app generated | ||
# is functional and that the SDK can test it. | ||
- name: init base repo | ||
if: matrix.test_type == 'base' | ||
env: | ||
LANGUAGE_TOKEN: ${{ matrix.language }} | ||
run: | | ||
kb-sdk init -l $LANGUAGE_TOKEN -u user SampleApp | ||
|
||
- name: init example repo | ||
if: matrix.test_type == 'example' | ||
env: | ||
LANGUAGE_TOKEN: ${{ matrix.language }} | ||
run: | | ||
kb-sdk init -l $LANGUAGE_TOKEN -u user --example SampleApp | ||
|
||
- name: test ${{ matrix.test_type }} repo, using test.cfg for auth | ||
if: matrix.auth == 'token' | ||
run: | | ||
cd SampleApp | ||
kb-sdk test || true | ||
|
||
- name: test ${{ matrix.test_type }} repo, using test.cfg for auth, add env var to test.cfg | ||
if: matrix.auth == 'token' | ||
env: | ||
KBASE_TEST_TOKEN: ${{ secrets.KBASE_TEST_TOKEN }} | ||
run: | | ||
cd SampleApp | ||
sed -i "s/test_token=/test_token=$KBASE_TEST_TOKEN/" test_local/test.cfg | ||
kb-sdk test | ||
|
||
- name: test ${{ matrix.test_type }} repo, using env var for auth | ||
if: matrix.auth == 'env_var' | ||
env: | ||
KBASE_TEST_TOKEN: ${{ secrets.KBASE_TEST_TOKEN }} | ||
run: | | ||
cd SampleApp | ||
kb-sdk test | ||
|
||
- name: make resulting app available as artefact in case of failure | ||
if: ${{ failure() }} | ||
uses: actions/upload-artifact@v3 | ||
with: | ||
name: kbaseapp-${{ matrix.language }}-${{ matrix.test_type }}-${{ matrix.os }} | ||
path: SampleApp | ||
|
||
|
||
test_existing_repos: |
Check warning
Code scanning / CodeQL
Workflow does not contain permissions Medium
if: "!contains(github.event.head_commit.message, 'skip ci')" | ||
runs-on: ${{ matrix.os }} | ||
strategy: | ||
fail-fast: false | ||
matrix: | ||
os: [ubuntu-20.04, ubuntu-latest] | ||
# TODO: add a Java app. WsLargeDataIO does not currently build as it relies on a Java | ||
# repo that no longer exists. | ||
app: [KBaseReport] # , WsLargeDataIO] | ||
auth: [token, env_var] | ||
|
||
steps: | ||
- name: Checkout | ||
uses: actions/checkout@v3 | ||
|
||
- name: Set up JDK 1.8 | ||
uses: actions/setup-java@v3 | ||
with: | ||
distribution: temurin | ||
java-version: 8.0.362+9 | ||
|
||
- name: Build with Ant | ||
run: | | ||
make | ||
|
||
- name: Add bin to $PATH | ||
run: | | ||
echo "$GITHUB_WORKSPACE/bin" >> $GITHUB_PATH | ||
|
||
- name: checking basic kb-sdk functions | ||
run: | | ||
env | ||
kb-sdk help | ||
kb-sdk version | ||
|
||
# the following steps check out and run the tests of an existing KBase app | ||
- name: Checkout existing kbase module ${{ matrix.app }} | ||
uses: actions/checkout@v3 | ||
with: | ||
repository: kbaseapps/${{ matrix.app }} | ||
path: kbase_app | ||
|
||
- name: run repo tests, using test.cfg for auth | ||
if: matrix.auth == 'token' | ||
run: | | ||
cd kbase_app | ||
kb-sdk test || true | ||
|
||
- name: run repo tests, using test.cfg for auth | ||
if: matrix.auth == 'token' | ||
env: | ||
KBASE_TEST_TOKEN: ${{ secrets.KBASE_TEST_TOKEN }} | ||
run: | | ||
cd kbase_app | ||
sed -i "s/test_token=/test_token=$KBASE_TEST_TOKEN/" test_local/test.cfg | ||
kb-sdk test | ||
|
||
- name: run repo tests, using env var for auth | ||
if: matrix.auth == 'env_var' | ||
env: | ||
KBASE_TEST_TOKEN: ${{ secrets.KBASE_TEST_TOKEN }} | ||
run: | | ||
cd kbase_app | ||
kb-sdk test | ||
|
||
- name: make resulting app available as artefact in case of failure | ||
if: ${{ failure() }} | ||
uses: actions/upload-artifact@v3 | ||
with: | ||
name: kbaseapp-${{ matrix.app }}-${{ matrix.os }} | ||
path: kbase_app |
Check warning
Code scanning / CodeQL
Workflow does not contain permissions Medium
uses: kbase/.github/.github/workflows/reusable_build-push.yml@main | ||
with: | ||
name: '${{ github.event.repository.name }}-develop' | ||
tags: br-${{ github.ref_name }} | ||
secrets: inherit |
Check warning
Code scanning / CodeQL
Workflow does not contain permissions Medium
if: github.base_ref == 'develop' && github.event.pull_request.merged == false | ||
uses: kbase/.github/.github/workflows/reusable_build.yml@main | ||
secrets: inherit | ||
build-develop-merge: |
Check warning
Code scanning / CodeQL
Workflow does not contain permissions Medium
if: github.base_ref == 'develop' && github.event.pull_request.merged == true | ||
uses: kbase/.github/.github/workflows/reusable_build-push.yml@main | ||
with: | ||
name: '${{ github.event.repository.name }}-develop' | ||
tags: pr-${{ github.event.number }},latest | ||
secrets: inherit | ||
build-main-open: |
Check warning
Code scanning / CodeQL
Workflow does not contain permissions Medium
if: (github.base_ref == 'main' || github.base_ref == 'master') && github.event.pull_request.merged == true | ||
uses: kbase/.github/.github/workflows/reusable_build-push.yml@main | ||
with: | ||
name: '${{ github.event.repository.name }}' | ||
tags: pr-${{ github.event.number }},latest-rc | ||
secrets: inherit | ||
trivy-scans: |
Check warning
Code scanning / CodeQL
Workflow does not contain permissions Medium
if: (github.base_ref == 'develop' || github.base_ref == 'main' || github.base_ref == 'master' ) && github.event.pull_request.merged == false | ||
uses: kbase/.github/.github/workflows/reusable_trivy-scans.yml@main | ||
secrets: inherit |
Check warning
Code scanning / CodeQL
Workflow does not contain permissions Medium
uses: kbase/.github/.github/workflows/reusable_validate-branch.yml@main | ||
with: | ||
build_branch: '${{ github.event.release.target_commitish }}' | ||
validate-release-tag: |
Check warning
Code scanning / CodeQL
Workflow does not contain permissions Medium
needs: check-source-branch | ||
uses: kbase/.github/.github/workflows/reusable_validate-release-tag.yml@main | ||
with: | ||
release_tag: '${{ github.event.release.tag_name }}' | ||
build-push: |
Check warning
Code scanning / CodeQL
Workflow does not contain permissions Medium
needs: validate-release-tag | ||
uses: kbase/.github/.github/workflows/reusable_build-push.yml@main | ||
with: | ||
name: '${{ github.event.repository.name }}' | ||
tags: '${{ github.event.release.tag_name }},latest' | ||
secrets: inherit |
Check warning
Code scanning / CodeQL
Workflow does not contain permissions Medium
No description provided.