Skip to content

SDKS-3622 Add Accept-Language Header Support #255

SDKS-3622 Add Accept-Language Header Support

SDKS-3622 Add Accept-Language Header Support #255

Workflow file for this run

#
# Copyright (c) 2024 Ping Identity. All rights reserved.
#
# This software may be modified and distributed under the terms
# of the MIT license. See the LICENSE file for details.
#
name: CI
# Trigger on push or pull request
on:
pull_request:
types: [opened, reopened, synchronize, edited]
push:
branches:
- master
- develop
permissions: write-all
jobs:
# Create TestRail run
create-testrail-run:
name: Create TestRail Run
uses: ./.github/workflows/create-testrail-run.yaml
secrets:
TESTRAIL_USERNAME: ${{ secrets.TESTRAIL_USERNAME }}
TESTRAIL_API_KEY: ${{ secrets.TESTRAIL_API_KEY }}
# Build and run unit tests
build-and-test:
name: Build and test
uses: ./.github/workflows/build-and-test.yaml
needs: create-testrail-run
secrets:
SLACK_WEBHOOK: ${{ secrets.SLACK_WEBHOOK }}
CODECOV_TOKEN: ${{ secrets.CODECOV_TOKEN }}
TESTRAIL_USERNAME: ${{ secrets.TESTRAIL_USERNAME }}
TESTRAIL_API_KEY: ${{ secrets.TESTRAIL_API_KEY }}
with:
runs-on: ubuntu-latest
testrail-run-id: ${{needs.create-testrail-run.outputs.testrail-run-id}}
# Run integration tests on emulators
integration-tests:
name: Integration tests
uses: ./.github/workflows/integration-tests.yaml
if: ${{ vars.ENABLE_INTEGRATION_TESTS == 'true' }}
needs: create-testrail-run
secrets:
SLACK_WEBHOOK: ${{ secrets.SLACK_WEBHOOK }}
CODECOV_TOKEN: ${{ secrets.CODECOV_TOKEN }}
TESTRAIL_USERNAME: ${{ secrets.TESTRAIL_USERNAME }}
TESTRAIL_API_KEY: ${{ secrets.TESTRAIL_API_KEY }}
with:
runs-on: ubuntu-latest
testrail-run-id: ${{needs.create-testrail-run.outputs.testrail-run-id}}
# Build and sign BitBar test artifacts (app-debug-androidTest-signed.apk and davinci-debug-androidTest-signed.apk)
# Skip this step for PRs created by dependabot
bitbar-prepare-artifacts:
name: Prepare device farm artifacts
uses: ./.github/workflows/bitbar-prepare-artifacts.yaml
if: ${{ github.actor != 'dependabot[bot]' }}
needs: build-and-test
secrets:
SIGNING_KEYSTORE: ${{ secrets.SIGNING_KEYSTORE }}
SIGNING_ALIAS: ${{ secrets.SIGNING_ALIAS }}
SIGNING_KEYSTORE_PASSWORD: ${{ secrets.SIGNING_KEYSTORE_PASSWORD }}
SIGNING_KEY_PASSWORD: ${{ secrets.SIGNING_KEY_PASSWORD }}
SLACK_WEBHOOK: ${{ secrets.SLACK_WEBHOOK }}
# Execute e2e test cases in BitBar. The workflow outputs the newly created run id.
bitbar-run:
name: Run tests in BitBar
uses: ./.github/workflows/bitbar-run.yaml
needs: bitbar-prepare-artifacts
secrets:
BITBAR_API_KEY: ${{ secrets.BITBAR_API_KEY }}
SLACK_WEBHOOK: ${{ secrets.SLACK_WEBHOOK }}
with:
bitbar-project-id: ${{ vars.BITBAR_PROJECT_ID }}
bitbar-device-group-id: ${{ vars.BITBAR_DEVICE_GROUP_ID }}
# Wait for BitBar test run to finish and publish results
bitbar-results:
name: BitBar test results
uses: ./.github/workflows/bitbar-results.yaml
needs: bitbar-run
secrets:
BITBAR_API_KEY: ${{ secrets.BITBAR_API_KEY }}
SLACK_WEBHOOK: ${{ secrets.SLACK_WEBHOOK }}
with:
bitbar-project-id: ${{ vars.BITBAR_PROJECT_ID }}
bitbar-run-id: ${{ needs.bitbar-run.outputs.bitbar-run-id }}
# Run Mend CLI Scan
mend-cli-scan:
name: Mend CLI Scan
uses: ./.github/workflows/mend-cli-scan.yaml
secrets:
MEND_EMAIL: ${{ secrets.MEND_EMAIL }}
MEND_USER_KEY: ${{ secrets.MEND_USER_KEY }}
SLACK_WEBHOOK: ${{ secrets.SLACK_WEBHOOK }}