CI with environments #1
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
name: CI with environments | |
on: | |
# push: | |
# branches: | |
# - master | |
# schedule: | |
# - cron: '0 18 * * *' # every day at 6 pm | |
workflow_dispatch: | |
inputs: | |
test_name: | |
description: 'test(s) to run (example connect/connect-jms-weblogic-sink connect/connect-http-sink)' | |
required: false | |
default: '' | |
jobs: | |
pre-build: | |
if: ${{ github.event.inputs.test_name == '' }} | |
name: Cleanup resources | |
runs-on: ubuntu-latest | |
steps: | |
- name: Checkout code | |
uses: actions/checkout@v3 | |
with: | |
repository: vdesabou/kafka-docker-playground | |
fetch-depth: 0 | |
build: | |
if: ${{ github.event.inputs.test_name == '' }} | |
runs-on: ubuntu-latest | |
needs: pre-build | |
name: ${{ matrix.tag }} ${{ matrix.test_list }} ${{ matrix.environment }} | |
strategy: | |
fail-fast: false | |
matrix: | |
tag: ["7.5.2"] | |
environment: ["ccloud", "plaintext", "sasl-ssl", "sasl-plain", "2way-ssl", "sasl-scram", "kraft-external-plaintext", "kraft-plaintext", "kerberos", "ssl_kerberos", "ldap-authorizer-sasl-plain", "ldap-sasl-plain"] | |
test_list : [ | |
"🚀 connect/connect-active-mq-sink", | |
"🚀 connect/connect-debezium-sqlserver-source", | |
"🚀 connect/connect-cdc-oracle19-source" | |
] | |
steps: | |
- name: Checkout code | |
uses: actions/checkout@v3 | |
with: | |
repository: vdesabou/kafka-docker-playground | |
fetch-depth: 0 | |
- name: "Free up disk space" | |
run: | | |
df -h | |
sudo apt-get -qq purge build-essential ghc* | |
sudo apt-get clean | |
sudo apt-get install expect fzf coreutils -y | |
docker system prune -af | |
sudo rm -rf /usr/share/dotnet | |
sudo rm -rf /opt/ghc | |
sudo rm -rf "/usr/local/share/boost" | |
sudo rm -rf "$AGENT_TOOLSDIRECTORY" | |
sudo docker rmi $(docker image ls -aq) >/dev/null 2>&1 || true | |
sudo rm -rf \ | |
/usr/share/dotnet /usr/local/lib/android /opt/ghc \ | |
/usr/local/share/powershell /usr/share/swift /usr/local/.ghcup \ | |
/usr/lib/jvm || true | |
echo "some directories deleted" | |
sudo apt install aptitude -y >/dev/null 2>&1 | |
sudo aptitude purge aria2 ansible azure-cli shellcheck rpm xorriso zsync \ | |
esl-erlang firefox gfortran-8 gfortran-9 google-chrome-stable \ | |
google-cloud-sdk imagemagick \ | |
libmagickcore-dev libmagickwand-dev libmagic-dev ant ant-optional kubectl \ | |
mercurial apt-transport-https mono-complete libmysqlclient \ | |
unixodbc-dev yarn chrpath libssl-dev libxft-dev \ | |
libfreetype6 libfreetype6-dev libfontconfig1 libfontconfig1-dev \ | |
snmp pollinate libpq-dev postgresql-client powershell ruby-full \ | |
sphinxsearch subversion mongodb-org azure-cli microsoft-edge-stable \ | |
-y -f >/dev/null 2>&1 | |
sudo aptitude purge google-cloud-sdk -f -y >/dev/null 2>&1 | |
sudo aptitude purge microsoft-edge-stable -f -y >/dev/null 2>&1 || true | |
sudo apt purge microsoft-edge-stable -f -y >/dev/null 2>&1 || true | |
sudo aptitude purge '~n ^mysql' -f -y >/dev/null 2>&1 | |
sudo aptitude purge '~n ^php' -f -y >/dev/null 2>&1 | |
sudo aptitude purge '~n ^dotnet' -f -y >/dev/null 2>&1 | |
sudo apt-get autoremove -y >/dev/null 2>&1 | |
sudo apt-get autoclean -y >/dev/null 2>&1 | |
echo "some packages purged" | |
df -h | |
- name: Decrypt secrets.tar | |
run: | | |
./.github/scripts/decrypt_secret.sh | |
tar xvf secrets.tar | |
rm secrets.tar | |
mkdir -p $HOME/.aws | |
mv aws_credentials_with_assuming_iam_role $HOME/.aws/credentials-with-assuming-iam-role | |
mv aws_credentials_aws_account_with_assume_role $HOME/.aws/credentials_aws_account_with_assume_role | |
chmod -R a+rw $HOME/.aws | |
mkdir -p $HOME/.confluent | |
echo "$DOCKER_PASSWORD" | docker login -u "$DOCKER_USERNAME" --password-stdin | |
env: | |
SECRETS_ENCRYPTION_PASSWORD: ${{ secrets.SECRETS_ENCRYPTION_PASSWORD }} | |
DOCKER_USERNAME: ${{ secrets.DOCKER_USERNAME}} | |
DOCKER_PASSWORD: ${{ secrets.DOCKER_PASSWORD}} | |
- name: Build and Test | |
run: bash scripts/run-tests.sh "${{ matrix.test_list }}" "${{ matrix.tag }}" | |
env: | |
AWS_ACCESS_KEY_ID: ${{ secrets.AWS_ACCESS_KEY_ID}} | |
AWS_SECRET_ACCESS_KEY: ${{ secrets.AWS_SECRET_ACCESS_KEY}} | |
AWS_REGION: ${{ secrets.AWS_REGION}} | |
AWS_ACCOUNT_WITH_ASSUME_ROLE_AWS_ACCESS_KEY_ID: ${{ secrets.AWS_ACCOUNT_WITH_ASSUME_ROLE_AWS_ACCESS_KEY_ID}} | |
AWS_ACCOUNT_WITH_ASSUME_ROLE_AWS_SECRET_ACCESS_KEY: ${{ secrets.AWS_ACCOUNT_WITH_ASSUME_ROLE_AWS_SECRET_ACCESS_KEY}} | |
AWS_STS_ROLE_ARN: ${{ secrets.AWS_STS_ROLE_ARN}} | |
AZ_USER: ${{ secrets.AZ_USER}} | |
AZ_PASS: ${{ secrets.AZ_PASS}} | |
AZURE_TENANT_NAME: ${{ secrets.AZURE_TENANT_NAME}} | |
CONFLUENT_CLOUD_EMAIL: ${{ secrets.CONFLUENT_CLOUD_EMAIL}} | |
CONFLUENT_CLOUD_PASSWORD: ${{ secrets.CONFLUENT_CLOUD_PASSWORD}} | |
ENVIRONMENT: ${{ secrets.ENVIRONMENT}} | |
CLUSTER_NAME: ${{ secrets.CLUSTER_NAME}} | |
CLUSTER_REGION: ${{ secrets.CLUSTER_REGION}} | |
CLUSTER_CLOUD: ${{ secrets.CLUSTER_CLOUD}} | |
CLUSTER_CREDS: ${{ secrets.CLUSTER_CREDS}} | |
SCHEMA_REGISTRY_CREDS: ${{ secrets.SCHEMA_REGISTRY_CREDS}} | |
CONFLUENT_LICENSE: ${{ secrets.CONFLUENT_LICENSE}} | |
SALESFORCE_USERNAME: ${{ secrets.SALESFORCE_USERNAME}} | |
SALESFORCE_PASSWORD: ${{ secrets.SALESFORCE_PASSWORD}} | |
SALESFORCE_CONSUMER_KEY: ${{ secrets.SALESFORCE_CONSUMER_KEY}} | |
SALESFORCE_CONSUMER_PASSWORD: ${{ secrets.SALESFORCE_CONSUMER_PASSWORD}} | |
SALESFORCE_SECURITY_TOKEN: ${{ secrets.SALESFORCE_SECURITY_TOKEN}} | |
SALESFORCE_INSTANCE: ${{ secrets.SALESFORCE_INSTANCE}} | |
SALESFORCE_USERNAME_ACCOUNT2: ${{ secrets.SALESFORCE_USERNAME_ACCOUNT2}} | |
SALESFORCE_PASSWORD_ACCOUNT2: ${{ secrets.SALESFORCE_PASSWORD_ACCOUNT2}} | |
SALESFORCE_SECURITY_TOKEN_ACCOUNT2: ${{ secrets.SALESFORCE_SECURITY_TOKEN_ACCOUNT2}} | |
SALESFORCE_CONSUMER_KEY_ACCOUNT2: ${{ secrets.SALESFORCE_CONSUMER_KEY_ACCOUNT2}} | |
SALESFORCE_CONSUMER_PASSWORD_ACCOUNT2: ${{ secrets.SALESFORCE_CONSUMER_PASSWORD_ACCOUNT2}} | |
SALESFORCE_CONSUMER_KEY_WITH_JWT: ${{ secrets.SALESFORCE_CONSUMER_KEY_WITH_JWT}} | |
SALESFORCE_CONSUMER_PASSWORD_WITH_JWT: ${{ secrets.SALESFORCE_CONSUMER_PASSWORD_WITH_JWT}} | |
DD_API_KEY: ${{ secrets.DD_API_KEY}} | |
DD_APP_KEY: ${{ secrets.DD_APP_KEY}} | |
DOCKER_USERNAME: ${{ secrets.DOCKER_USERNAME}} | |
DOCKER_PASSWORD: ${{ secrets.DOCKER_PASSWORD}} | |
JIRA_URL: ${{ secrets.JIRA_URL}} | |
JIRA_USERNAME: ${{ secrets.JIRA_USERNAME}} | |
JIRA_API_TOKEN: ${{ secrets.JIRA_API_TOKEN}} | |
MARKETO_ENDPOINT_URL: ${{ secrets.MARKETO_ENDPOINT_URL}} | |
MARKETO_CLIENT_ID: ${{ secrets.MARKETO_CLIENT_ID}} | |
MARKETO_CLIENT_SECRET: ${{ secrets.MARKETO_CLIENT_SECRET}} | |
PAGERDUTY_USER_EMAIL: ${{ secrets.PAGERDUTY_USER_EMAIL}} | |
PAGERDUTY_API_KEY: ${{ secrets.PAGERDUTY_API_KEY}} | |
PAGERDUTY_SERVICE_ID: ${{ secrets.PAGERDUTY_SERVICE_ID}} | |
CCLOUD_REST_PROXY_SECURITY_PLUGIN_API_KEY: ${{ secrets.CCLOUD_REST_PROXY_SECURITY_PLUGIN_API_KEY}} | |
CCLOUD_REST_PROXY_SECURITY_PLUGIN_API_SECRET: ${{ secrets.CCLOUD_REST_PROXY_SECURITY_PLUGIN_API_SECRET}} | |
SERVICENOW_URL: ${{ secrets.SERVICENOW_URL}} | |
SERVICENOW_PASSWORD: ${{ secrets.SERVICENOW_PASSWORD}} | |
SERVICENOW_DEVELOPER_USERNAME: ${{ secrets.SERVICENOW_DEVELOPER_USERNAME}} | |
SERVICENOW_DEVELOPER_PASSWORD: ${{ secrets.SERVICENOW_DEVELOPER_PASSWORD}} | |
SNOWFLAKE_ACCOUNT_NAME: ${{ secrets.SNOWFLAKE_ACCOUNT_NAME}} | |
SNOWFLAKE_USERNAME: ${{ secrets.SNOWFLAKE_USERNAME}} | |
SNOWFLAKE_PASSWORD: ${{ secrets.SNOWFLAKE_PASSWORD}} | |
ZENDESK_URL: ${{ secrets.ZENDESK_URL}} | |
ZENDESK_USERNAME: ${{ secrets.ZENDESK_USERNAME}} | |
ZENDESK_PASSWORD: ${{ secrets.ZENDESK_PASSWORD}} | |
CONNECTOR_GITHUB_ACCESS_TOKEN: ${{ secrets.CONNECTOR_GITHUB_ACCESS_TOKEN}} | |
CI_GITHUB_TOKEN: ${{ secrets.CI_GITHUB_TOKEN}} | |
AUDIT_LOG_CLUSTER_BOOTSTRAP_SERVERS: ${{ secrets.AUDIT_LOG_CLUSTER_BOOTSTRAP_SERVERS}} | |
AUDIT_LOG_CLUSTER_API_KEY: ${{ secrets.AUDIT_LOG_CLUSTER_API_KEY}} | |
AUDIT_LOG_CLUSTER_API_SECRET: ${{ secrets.AUDIT_LOG_CLUSTER_API_SECRET}} | |
NGROK_AUTH_TOKEN: ${{ secrets.NGROK_AUTH_TOKEN}} | |
DATABRICKS_AWS_BUCKET_NAME: ${{ secrets.DATABRICKS_AWS_BUCKET_NAME}} | |
DATABRICKS_AWS_BUCKET_REGION: ${{ secrets.DATABRICKS_AWS_BUCKET_REGION}} | |
DATABRICKS_AWS_STAGING_S3_ACCESS_KEY_ID: ${{ secrets.DATABRICKS_AWS_STAGING_S3_ACCESS_KEY_ID}} | |
DATABRICKS_AWS_STAGING_S3_SECRET_ACCESS_KEY: ${{ secrets.DATABRICKS_AWS_STAGING_S3_SECRET_ACCESS_KEY}} | |
DATABRICKS_SERVER_HOSTNAME: ${{ secrets.DATABRICKS_SERVER_HOSTNAME}} | |
DATABRICKS_HTTP_PATH: ${{ secrets.DATABRICKS_HTTP_PATH}} | |
DATABRICKS_TOKEN: ${{ secrets.DATABRICKS_TOKEN}} | |
ORACLE_CONTAINER_REGISTRY_USERNAME: ${{ secrets.ORACLE_CONTAINER_REGISTRY_USERNAME}} | |
ORACLE_CONTAINER_REGISTRY_PASSWORD: ${{ secrets.ORACLE_CONTAINER_REGISTRY_PASSWORD}} | |
GCP_KEYFILE_CONTENT: ${{ secrets.GCP_KEYFILE_CONTENT}} | |
GCP_PROJECT: ${{ secrets.GCP_PROJECT}} | |
HPE_MAPR_EMAIL: ${{ secrets.HPE_MAPR_EMAIL}} | |
HPE_MAPR_TOKEN: ${{ secrets.HPE_MAPR_TOKEN}} | |
execute_one_test: | |
if: ${{ github.event.inputs.test_name != '' }} | |
runs-on: ubuntu-latest | |
name: ${{ matrix.tag }} ${{ matrix.test_list }} | |
strategy: | |
fail-fast: false | |
matrix: | |
tag: ["7.5.2"] | |
environment: ["ccloud", "plaintext", "sasl-ssl", "sasl-plain", "2way-ssl", "sasl-scram", "kraft-external-plaintext", "kraft-plaintext", "kerberos", "ssl_kerberos", "ldap-authorizer-sasl-plain", "ldap-sasl-plain"] | |
test_list : [ | |
"🚀 ${{ github.event.inputs.test_name }}" | |
] | |
steps: | |
# - name: Maximize build space | |
# uses: easimon/maximize-build-space@master | |
# with: | |
# root-reserve-mb: 512 | |
# swap-size-mb: 1024 | |
# remove-dotnet: 'true' | |
# remove-android: 'true' | |
# remove-haskell: 'true' | |
# remove-codeql: 'true' | |
- name: Checkout code | |
uses: actions/checkout@v3 | |
with: | |
repository: vdesabou/kafka-docker-playground | |
fetch-depth: 0 | |
- name: "Free up disk space" | |
run: | | |
df -h | |
sudo apt-get -qq purge build-essential ghc* | |
sudo apt-get clean | |
sudo apt-get install expect fzf coreutils -y | |
docker system prune -af | |
sudo rm -rf /usr/share/dotnet | |
sudo rm -rf /opt/ghc | |
sudo rm -rf "/usr/local/share/boost" | |
sudo rm -rf "$AGENT_TOOLSDIRECTORY" | |
sudo docker rmi $(docker image ls -aq) >/dev/null 2>&1 || true | |
sudo rm -rf \ | |
/usr/share/dotnet /usr/local/lib/android /opt/ghc \ | |
/usr/local/share/powershell /usr/share/swift /usr/local/.ghcup \ | |
/usr/lib/jvm || true | |
echo "some directories deleted" | |
sudo apt install aptitude -y >/dev/null 2>&1 | |
sudo aptitude purge aria2 ansible azure-cli shellcheck rpm xorriso zsync \ | |
esl-erlang firefox gfortran-8 gfortran-9 google-chrome-stable \ | |
google-cloud-sdk imagemagick \ | |
libmagickcore-dev libmagickwand-dev libmagic-dev ant ant-optional kubectl \ | |
mercurial apt-transport-https mono-complete libmysqlclient \ | |
unixodbc-dev yarn chrpath libssl-dev libxft-dev \ | |
libfreetype6 libfreetype6-dev libfontconfig1 libfontconfig1-dev \ | |
snmp pollinate libpq-dev postgresql-client powershell ruby-full \ | |
sphinxsearch subversion mongodb-org azure-cli microsoft-edge-stable \ | |
-y -f >/dev/null 2>&1 | |
sudo aptitude purge google-cloud-sdk -f -y >/dev/null 2>&1 | |
sudo aptitude purge microsoft-edge-stable -f -y >/dev/null 2>&1 || true | |
sudo apt purge microsoft-edge-stable -f -y >/dev/null 2>&1 || true | |
sudo aptitude purge '~n ^mysql' -f -y >/dev/null 2>&1 | |
sudo aptitude purge '~n ^php' -f -y >/dev/null 2>&1 | |
sudo aptitude purge '~n ^dotnet' -f -y >/dev/null 2>&1 | |
sudo apt-get autoremove -y >/dev/null 2>&1 | |
sudo apt-get autoclean -y >/dev/null 2>&1 | |
echo "some packages purged" | |
df -h | |
- name: Decrypt secrets.tar | |
run: | | |
./.github/scripts/decrypt_secret.sh | |
tar xvf secrets.tar | |
rm secrets.tar | |
mkdir -p $HOME/.aws | |
mv aws_credentials_with_assuming_iam_role $HOME/.aws/credentials-with-assuming-iam-role | |
mv aws_credentials_aws_account_with_assume_role $HOME/.aws/credentials_aws_account_with_assume_role | |
chmod -R a+rw $HOME/.aws | |
mkdir -p $HOME/.confluent | |
echo "$DOCKER_PASSWORD" | docker login -u "$DOCKER_USERNAME" --password-stdin | |
env: | |
SECRETS_ENCRYPTION_PASSWORD: ${{ secrets.SECRETS_ENCRYPTION_PASSWORD }} | |
DOCKER_USERNAME: ${{ secrets.DOCKER_USERNAME}} | |
DOCKER_PASSWORD: ${{ secrets.DOCKER_PASSWORD}} | |
- name: Build and Test | |
run: bash scripts/run-tests.sh "${{ matrix.test_list }}" "${{ matrix.tag }}" "${{ matrix.environment }}" | |
env: | |
AWS_ACCESS_KEY_ID: ${{ secrets.AWS_ACCESS_KEY_ID}} | |
AWS_SECRET_ACCESS_KEY: ${{ secrets.AWS_SECRET_ACCESS_KEY}} | |
AWS_REGION: ${{ secrets.AWS_REGION}} | |
AWS_ACCOUNT_WITH_ASSUME_ROLE_AWS_ACCESS_KEY_ID: ${{ secrets.AWS_ACCOUNT_WITH_ASSUME_ROLE_AWS_ACCESS_KEY_ID}} | |
AWS_ACCOUNT_WITH_ASSUME_ROLE_AWS_SECRET_ACCESS_KEY: ${{ secrets.AWS_ACCOUNT_WITH_ASSUME_ROLE_AWS_SECRET_ACCESS_KEY}} | |
AWS_STS_ROLE_ARN: ${{ secrets.AWS_STS_ROLE_ARN}} | |
AZ_USER: ${{ secrets.AZ_USER}} | |
AZ_PASS: ${{ secrets.AZ_PASS}} | |
AZURE_TENANT_NAME: ${{ secrets.AZURE_TENANT_NAME}} | |
CONFLUENT_CLOUD_EMAIL: ${{ secrets.CONFLUENT_CLOUD_EMAIL}} | |
CONFLUENT_CLOUD_PASSWORD: ${{ secrets.CONFLUENT_CLOUD_PASSWORD}} | |
ENVIRONMENT: ${{ secrets.ENVIRONMENT}} | |
CLUSTER_NAME: ${{ secrets.CLUSTER_NAME}} | |
CLUSTER_REGION: ${{ secrets.CLUSTER_REGION}} | |
CLUSTER_CLOUD: ${{ secrets.CLUSTER_CLOUD}} | |
CLUSTER_CREDS: ${{ secrets.CLUSTER_CREDS}} | |
SCHEMA_REGISTRY_CREDS: ${{ secrets.SCHEMA_REGISTRY_CREDS}} | |
CONFLUENT_LICENSE: ${{ secrets.CONFLUENT_LICENSE}} | |
SALESFORCE_USERNAME: ${{ secrets.SALESFORCE_USERNAME}} | |
SALESFORCE_PASSWORD: ${{ secrets.SALESFORCE_PASSWORD}} | |
SALESFORCE_CONSUMER_KEY: ${{ secrets.SALESFORCE_CONSUMER_KEY}} | |
SALESFORCE_CONSUMER_PASSWORD: ${{ secrets.SALESFORCE_CONSUMER_PASSWORD}} | |
SALESFORCE_SECURITY_TOKEN: ${{ secrets.SALESFORCE_SECURITY_TOKEN}} | |
SALESFORCE_INSTANCE: ${{ secrets.SALESFORCE_INSTANCE}} | |
SALESFORCE_USERNAME_ACCOUNT2: ${{ secrets.SALESFORCE_USERNAME_ACCOUNT2}} | |
SALESFORCE_PASSWORD_ACCOUNT2: ${{ secrets.SALESFORCE_PASSWORD_ACCOUNT2}} | |
SALESFORCE_SECURITY_TOKEN_ACCOUNT2: ${{ secrets.SALESFORCE_SECURITY_TOKEN_ACCOUNT2}} | |
SALESFORCE_CONSUMER_KEY_ACCOUNT2: ${{ secrets.SALESFORCE_CONSUMER_KEY_ACCOUNT2}} | |
SALESFORCE_CONSUMER_PASSWORD_ACCOUNT2: ${{ secrets.SALESFORCE_CONSUMER_PASSWORD_ACCOUNT2}} | |
SALESFORCE_CONSUMER_KEY_WITH_JWT: ${{ secrets.SALESFORCE_CONSUMER_KEY_WITH_JWT}} | |
SALESFORCE_CONSUMER_PASSWORD_WITH_JWT: ${{ secrets.SALESFORCE_CONSUMER_PASSWORD_WITH_JWT}} | |
DD_API_KEY: ${{ secrets.DD_API_KEY}} | |
DD_APP_KEY: ${{ secrets.DD_APP_KEY}} | |
DOCKER_USERNAME: ${{ secrets.DOCKER_USERNAME}} | |
DOCKER_PASSWORD: ${{ secrets.DOCKER_PASSWORD}} | |
JIRA_URL: ${{ secrets.JIRA_URL}} | |
JIRA_USERNAME: ${{ secrets.JIRA_USERNAME}} | |
JIRA_API_TOKEN: ${{ secrets.JIRA_API_TOKEN}} | |
MARKETO_ENDPOINT_URL: ${{ secrets.MARKETO_ENDPOINT_URL}} | |
MARKETO_CLIENT_ID: ${{ secrets.MARKETO_CLIENT_ID}} | |
MARKETO_CLIENT_SECRET: ${{ secrets.MARKETO_CLIENT_SECRET}} | |
PAGERDUTY_USER_EMAIL: ${{ secrets.PAGERDUTY_USER_EMAIL}} | |
PAGERDUTY_API_KEY: ${{ secrets.PAGERDUTY_API_KEY}} | |
PAGERDUTY_SERVICE_ID: ${{ secrets.PAGERDUTY_SERVICE_ID}} | |
CCLOUD_REST_PROXY_SECURITY_PLUGIN_API_KEY: ${{ secrets.CCLOUD_REST_PROXY_SECURITY_PLUGIN_API_KEY}} | |
CCLOUD_REST_PROXY_SECURITY_PLUGIN_API_SECRET: ${{ secrets.CCLOUD_REST_PROXY_SECURITY_PLUGIN_API_SECRET}} | |
SERVICENOW_URL: ${{ secrets.SERVICENOW_URL}} | |
SERVICENOW_PASSWORD: ${{ secrets.SERVICENOW_PASSWORD}} | |
SERVICENOW_DEVELOPER_USERNAME: ${{ secrets.SERVICENOW_DEVELOPER_USERNAME}} | |
SERVICENOW_DEVELOPER_PASSWORD: ${{ secrets.SERVICENOW_DEVELOPER_PASSWORD}} | |
SNOWFLAKE_ACCOUNT_NAME: ${{ secrets.SNOWFLAKE_ACCOUNT_NAME}} | |
SNOWFLAKE_USERNAME: ${{ secrets.SNOWFLAKE_USERNAME}} | |
SNOWFLAKE_PASSWORD: ${{ secrets.SNOWFLAKE_PASSWORD}} | |
ZENDESK_URL: ${{ secrets.ZENDESK_URL}} | |
ZENDESK_USERNAME: ${{ secrets.ZENDESK_USERNAME}} | |
ZENDESK_PASSWORD: ${{ secrets.ZENDESK_PASSWORD}} | |
CONNECTOR_GITHUB_ACCESS_TOKEN: ${{ secrets.CONNECTOR_GITHUB_ACCESS_TOKEN}} | |
CI_GITHUB_TOKEN: ${{ secrets.CI_GITHUB_TOKEN}} | |
AUDIT_LOG_CLUSTER_BOOTSTRAP_SERVERS: ${{ secrets.AUDIT_LOG_CLUSTER_BOOTSTRAP_SERVERS}} | |
AUDIT_LOG_CLUSTER_API_KEY: ${{ secrets.AUDIT_LOG_CLUSTER_API_KEY}} | |
AUDIT_LOG_CLUSTER_API_SECRET: ${{ secrets.AUDIT_LOG_CLUSTER_API_SECRET}} | |
NGROK_AUTH_TOKEN: ${{ secrets.NGROK_AUTH_TOKEN}} | |
DATABRICKS_AWS_BUCKET_NAME: ${{ secrets.DATABRICKS_AWS_BUCKET_NAME}} | |
DATABRICKS_AWS_BUCKET_REGION: ${{ secrets.DATABRICKS_AWS_BUCKET_REGION}} | |
DATABRICKS_AWS_STAGING_S3_ACCESS_KEY_ID: ${{ secrets.DATABRICKS_AWS_STAGING_S3_ACCESS_KEY_ID}} | |
DATABRICKS_AWS_STAGING_S3_SECRET_ACCESS_KEY: ${{ secrets.DATABRICKS_AWS_STAGING_S3_SECRET_ACCESS_KEY}} | |
DATABRICKS_SERVER_HOSTNAME: ${{ secrets.DATABRICKS_SERVER_HOSTNAME}} | |
DATABRICKS_HTTP_PATH: ${{ secrets.DATABRICKS_HTTP_PATH}} | |
DATABRICKS_TOKEN: ${{ secrets.DATABRICKS_TOKEN}} | |
ORACLE_CONTAINER_REGISTRY_USERNAME: ${{ secrets.ORACLE_CONTAINER_REGISTRY_USERNAME}} | |
ORACLE_CONTAINER_REGISTRY_PASSWORD: ${{ secrets.ORACLE_CONTAINER_REGISTRY_PASSWORD}} | |
GCP_KEYFILE_CONTENT: ${{ secrets.GCP_KEYFILE_CONTENT}} | |
GCP_PROJECT: ${{ secrets.GCP_PROJECT}} | |
HPE_MAPR_EMAIL: ${{ secrets.HPE_MAPR_EMAIL}} | |
HPE_MAPR_TOKEN: ${{ secrets.HPE_MAPR_TOKEN}} |