Skip to content

CWS CI LDAP

CWS CI LDAP #1504

Workflow file for this run

name: CWS CI LDAP
# Triggers the workflow on push
on:
push:
schedule:
# trigger a build and test of CWS weekly on Monday at 5 AM PST / 12 PM UTC
- cron: '0 12 * * 1'
env:
TEAM: ("jamesfwood" "jdrodjpl" "jl-0")
jobs:
build-and-test-cws:
runs-on: ubuntu-latest
env:
SECURITY: "LDAP"
WORKERS: 1
services:
mdb106:
image: mariadb:10.11
ports:
- 3306:3306
env:
MYSQL_DATABASE: cws_dev
MYSQL_ROOT_PASSWORD: adminpw
options: >-
--name mdb106
steps:
- uses: actions/checkout@v4
- name: Set up JDK 17
uses: actions/setup-java@v4
with:
java-version: '17'
distribution: 'temurin'
# Configure Maven security (master password)
- name: Configure Maven security
run: |
mkdir -p ~/.m2
echo "<settingsSecurity>
<master>${{ secrets.MAVEN_MASTER_PASSWORD }}</master>
</settingsSecurity>" > ~/.m2/settings-security.xml
# Configure Maven settings (encrypted repo password)
- name: Configure Maven settings
run: |
echo "<settings>
<servers>
<server>
<id>${{ secrets.MAVEN_REPO_ID }}</id>
<username>${{ secrets.MAVEN_USERNAME }}</username>
<password>${{ secrets.MAVEN_ENCRYPTED_PASSWORD }}</password>
</server>
</servers>
</settings>" > ~/.m2/settings.xml
- name: Configure Camunda Download Credentials
run: |
echo "machine downloads.camunda.cloud
login ${{ secrets.CAMUNDA_DOWNLOAD_LOGIN }}
password ${{ secrets.CAMUNDA_DOWNLOAD_PASSWORD }}" > ~/.netrc
chmod 400 ~/.netrc
- name: Cache Maven packages
uses: actions/cache@v4
with:
path: ~/.m2/repository
key: ${{ runner.os }}-m2-${{ hashFiles('**/pom.xml') }}
restore-keys: |
${{ runner.os }}-m2-
- name: Create open-source certs
run: |
cd cws-certs
chmod +x generate-certs.sh
./generate-certs.sh
- name: Set up Keystore storepass
run: |
mkdir ~/.cws/
chmod 700 ~/.cws/
echo ${{ secrets.KEYSTORE_PASSWORD }} > ~/.cws/creds
chmod 400 ~/.cws/creds
- name: Download Logstash
run: |
curl -o install/logging/logstash-8.12.0.zip https://artifacts.elastic.co/downloads/logstash/logstash-8.12.0-windows-x86_64.zip
- name: Check for Logstash
run: |
cd install/logging/
ls -l
- name: Set up Elasticsearch
run: |
cd install/docker/es-only
docker compose up -d
- name: Set up CWS LDAP Server
run: |
cd cws-opensource-ldap
docker compose up -d
- name: Show Docker containers
run: |
sleep 5s
docker ps -a
- name: Build and Start CWS
id: build
run: |
cd ci
chmod +x run_ci.sh
./run_ci.sh $SECURITY $WORKERS
shell: bash
- name: List CWS Logs
run: |
cd dist/console-only/cws/server/apache-tomcat-10.1.36/logs
ls -al
- name: Set up Google Chrome
run: |
sudo apt update
sudo apt install -y google-chrome-stable
- name: Display Google Chrome version
run: google-chrome --version
- name: Run LDAP Integration Tests
id: ldap
run: mvn -Dmaven.compiler.debug=true -Dmaven.compiler.debuglevel=lines,vars, -Dit.test=LdapTestIT verify -DskipTests
shell: bash
- name: Show CWS Log for Console
if: always()
working-directory: dist/console-only/cws/server/apache-tomcat-10.1.36/logs
run: |
cat cws.log
- name: Show Catalina Log for Console
if: always()
working-directory: dist/console-only/cws/server/apache-tomcat-10.1.36/logs
run: |
cat catalina.out
- name: Show CWS Log for Worker1
if: always()
working-directory: dist/worker1/cws/server/apache-tomcat-10.1.36/logs
run: |
cat cws.log
- name: Show Catalina Log for Worker1
if: always()
working-directory: dist/worker1/cws/server/apache-tomcat-10.1.36/logs
run: |
cat catalina.out
- name: Send custom JSON data to Slack workflow
if: ${{ always() && contains(env.TEAM, github.actor) }}
id: slack
uses: slackapi/slack-github-action@v1.25.0
with:
# This data can be any valid JSON from a previous step in the GitHub Action
payload: |
{
"status": "CWS CI LDAP build and test result: ${{ job.status }}\n${{ github.event.pull_request.html_url || github.event.head_commit.url }}\nBuild result: ${{ steps.build.outcome }}\nLDAP integration test result: ${{ steps.ldap.outcome }}",
"blocks": [
{
"type": "section",
"text": {
"type": "mrkdwn",
"text": "CWS CI LDAP build and test result: ${{ job.status }}\n${{ github.event.pull_request.html_url || github.event.head_commit.url }}\nBuild result: ${{ steps.build.outcome }}\nLDAP integration test result: ${{ steps.ldap.outcome }}"
}
}
]
}
env:
SLACK_WEBHOOK_URL: ${{ secrets.SLACK_WEBHOOK_URL }}