Skip to content

Automating SDK generation process #398

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
wants to merge 61 commits into
base: master
Choose a base branch
from

Conversation

Raghunath-S-S-J
Copy link
Contributor

No description provided.

Vignesh Kennadi and others added 30 commits September 13, 2024 12:43
…x/replace-postman-with-prism

Verified

This commit was created on GitHub.com and signed with GitHub’s verified signature.
…-in-Java-SDK-to-consume-PRISM-Server-codegen

PETOS-560 Adds Content Type for API Calls
…x/replace-postman-with-prism

Verified

This commit was created on GitHub.com and signed with GitHub’s verified signature.
Replaced Postman Mock Server with PRISM Server and fixed failing test cases - Accounting Related
…x/replace-postman-with-prism-payroll

Verified

This commit was created on GitHub.com and signed with GitHub’s verified signature.
…ayroll

Replaced Postman Mock Server with PRISM Server and fixed failing test cases - Payroll Related
Vignesh Kennadi and others added 26 commits September 30, 2024 15:11

Verified

This commit was created on GitHub.com and signed with GitHub’s verified signature.
…r-manual-release-from-GitHub

Petoss 533 publish java sdk after manual release from GitHub

Verified

This commit was created on GitHub.com and signed with GitHub’s verified signature.
…ilities-and-update-dependent-packages-for-Java

Petoss 516 find package vulnerabilities and update dependent packages for java

Verified

This commit was created on GitHub.com and signed with GitHub’s verified signature.
ci: Added the slack alert code

Verified

This commit was created on GitHub.com and signed with GitHub’s verified signature.
…d-SDK-Repos
…x/replace-byte-by-binary

Verified

This commit was created on GitHub.com and signed with GitHub’s verified signature.
…ode-Gen-and-SDK-Repos

Petoss 585 enable test step in code gen and sdk repos

Verified

This commit was created on GitHub.com and signed with GitHub’s verified signature.

Verified

This commit was created on GitHub.com and signed with GitHub’s verified signature.
Replaced byte content type by binary for octet-stream
@Raghunath-S-S-J Raghunath-S-S-J changed the title Feature/sdk automation Automating SDK generation process Feb 4, 2025
Comment on lines +61 to +83
runs-on: ubuntu-latest
needs: publish
if: success()
steps:
- name: Checkout Xero-Java repo
uses: actions/checkout@v4
with:
repository: XeroAPI/Xero-Java
path: Xero-Java

- name: Send slack notification on success
uses: ./Xero-Java/.github/actions/notify-slack
with:
heading_text: "Publish job has succeeded !"
alert_type: "thumbsup"
job_status: "Success"
XERO_SLACK_WEBHOOK_URL: ${{secrets.XERO_SLACK_WEBHOOK_URL}}
job_url: "https://github.com/${{github.repository}}/actions/runs/${{github.run_id}}"
button_type: "primary"
package_version: ${{needs.publish.outputs.release_number}}
repo_link: ${{github.server_url}}/${{github.repository}}

notify-slack-on-failure:

Check warning

Code scanning / CodeQL

Workflow does not contain permissions Medium

Actions job or workflow does not limit the permissions of the GITHUB_TOKEN. Consider setting an explicit permissions block, using the following as a minimal starting point: {contents: read}
Comment on lines +84 to +104
runs-on: ubuntu-latest
needs: publish
if: failure()
steps:
- name: Checkout Xero-Java repo
uses: actions/checkout@v4
with:
repository: XeroAPI/Xero-Java
path: Xero-Java

- name: Send slack notification on failure
uses: ./Xero-Java/.github/actions/notify-slack
with:
heading_text: "Publish job has failed !"
alert_type: "alert"
job_status: "Failed"
XERO_SLACK_WEBHOOK_URL: ${{secrets.XERO_SLACK_WEBHOOK_URL}}
job_url: "https://github.com/${{github.repository}}/actions/runs/${{github.run_id}}"
button_type: "danger"
package_version: ${{needs.publish.outputs.release_number}}
repo_link: ${{github.server_url}}/${{github.repository}}

Check warning

Code scanning / CodeQL

Workflow does not contain permissions Medium

Actions job or workflow does not limit the permissions of the GITHUB_TOKEN. Consider setting an explicit permissions block, using the following as a minimal starting point: {contents: read}
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

3 participants