Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
30 commits
Select commit Hold shift + click to select a range
5e03d55
draft catalog service
ikethecoder Dec 22, 2025
e5e8729
upd data model for sdx entities
ikethecoder Dec 24, 2025
90704ad
upds to sdx api
ikethecoder Dec 26, 2025
2cd469e
fix spec loader
ikethecoder Dec 26, 2025
0632486
fix spectral errors
ikethecoder Dec 26, 2025
ad53d0f
add spectral rules
ikethecoder Dec 26, 2025
b9e0672
spectral adjustments
ikethecoder Dec 26, 2025
8be2afe
upd openapi tags to be alphabetical
ikethecoder Dec 26, 2025
f07eece
refactor subsystem
ikethecoder Dec 30, 2025
875c036
comment out future work
ikethecoder Dec 30, 2025
45e893d
upd system owner role
ikethecoder Dec 30, 2025
e8d9d00
make the apispec public
ikethecoder Dec 30, 2025
b4b0066
include all scopes in sdx v1
ikethecoder Dec 30, 2025
7fc27a2
add cypress tests for new sdx apis
ikethecoder Jan 7, 2026
2f8bc30
adj sdx v1 apis
ikethecoder Jan 8, 2026
b825e2c
remove all related to runtime groups
ikethecoder Jan 8, 2026
d57fc71
cleanup some runtime group refs
ikethecoder Jan 8, 2026
daa4ced
fix local db
ikethecoder Jan 8, 2026
9e8dc0b
fix unit test
ikethecoder Jan 8, 2026
647b75c
upd ks integrated test init
ikethecoder Jan 8, 2026
6eb1190
upd test data for passing sonar
ikethecoder Jan 8, 2026
c6e0d0b
sonar fix
ikethecoder Jan 8, 2026
c60fb18
sonar trying to resolve
ikethecoder Jan 8, 2026
d8f5219
fixes for cypress tests
ikethecoder Jan 9, 2026
59845be
sonar node fix
ikethecoder Jan 9, 2026
fc65b12
fix cypress tests
ikethecoder Jan 9, 2026
c47fce4
upd authz decision matrix
ikethecoder Jan 9, 2026
b78f202
Merge branch 'dev' into feature/sdx-service
ikethecoder Mar 13, 2026
f054068
APS-3966, APS-4050 - Runtime Groups (#1331)
ikethecoder Mar 13, 2026
a82e09c
cleanup a botched merge
ikethecoder Mar 13, 2026
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
6 changes: 3 additions & 3 deletions .github/workflows/aps-cypress-e2e.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -56,7 +56,7 @@ jobs:
# Start following logs in the background with continuous output
docker logs -f cypress-e2e 2>&1 &
LOG_PID=$!

while true; do
if [ "$(docker ps -aq -f status=exited -f name=cypress-e2e)" ]; then
echo "Cypress tests completed."
Expand Down Expand Up @@ -120,7 +120,7 @@ jobs:
with:
name: astra-scan-results
path: ${{ github.workspace }}/e2e/cypress/fixtures/state/scanResult.json

- name: Check for failed tests and create Issue
if: always()
env:
Expand Down Expand Up @@ -163,4 +163,4 @@ jobs:
env:
JIRA_EMAIL: ${{ secrets.JIRA_EMAIL }}
JIRA_API_KEY: ${{ secrets.JIRA_API_KEY }}
ASTRA_SCAN_RESULTS: ${{ github.workspace }}/e2e/cypress/fixtures/state/scanResult.json
ASTRA_SCAN_RESULTS: ${{ github.workspace }}/e2e/cypress/fixtures/state/scanResult.json
34 changes: 16 additions & 18 deletions .github/workflows/ci-build-feeders.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -31,6 +31,22 @@ jobs:

- uses: actions/checkout@v2

- name: Install oc
uses: redhat-actions/oc-installer@v1
with:
version: '4.6'

- name: Authenticate to silver and set context
uses: redhat-actions/oc-login@v1
with:
openshift_server_url: ${{ secrets.OPENSHIFT_SERVER }}
openshift_token: ${{ secrets.OPENSHIFT_TOKEN }}

# Disables SSL cert checking. Use this if you don't have the certificate authority data.
insecure_skip_tls_verify: true

namespace: ${{ env.OPENSHIFT_NAMESPACE }}

- name: Login to DockerHub
uses: docker/login-action@v1
with:
Expand Down Expand Up @@ -66,22 +82,6 @@ jobs:
- name: Push
run: docker push ${{ steps.docker_meta.outputs.tags }}

- name: Install oc
uses: redhat-actions/oc-installer@v1
with:
version: '4.6'

- name: Authenticate and set context
uses: redhat-actions/oc-login@v1
with:
openshift_server_url: ${{ secrets.OPENSHIFT_SERVER }}
openshift_token: ${{ secrets.OPENSHIFT_TOKEN }}

# Disables SSL cert checking. Use this if you don't have the certificate authority data.
insecure_skip_tls_verify: true

namespace: ${{ env.OPENSHIFT_NAMESPACE }}

- name: 'Get Helm'
if: github.ref != 'refs/heads/dev'
run: |
Expand Down Expand Up @@ -143,7 +143,6 @@ jobs:
helm repo add bcgov http://bcgov.github.io/helm-charts
helm upgrade --install proto-asp-${{ steps.set-deploy-id.outputs.DEPLOY_ID }}-feeder -f values.yaml --history-max 3 bcgov/generic-api


- name: Authenticate to Gold and set context
if: github.ref == 'refs/heads/test'
uses: redhat-actions/oc-login@v1
Expand All @@ -157,4 +156,3 @@ jobs:
if: github.ref == 'refs/heads/test'
run: |
oc rollout restart deployment/bcgov-aps-portal-feeder-generic-api -n ${{ secrets.OPENSHIFT_GOLD_TEST_NAMESPACE }}

1 change: 0 additions & 1 deletion .github/workflows/ci-feat-sonar.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -58,4 +58,3 @@ jobs:
env:
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
SONAR_TOKEN: ${{ secrets.SONAR_TOKEN }}
SONAR_HOST_URL: https://sonarcloud.io
5 changes: 4 additions & 1 deletion .gitignore
Original file line number Diff line number Diff line change
Expand Up @@ -122,4 +122,7 @@ e2e/cypress/fixtures/state/*.pub
e2e/cypress/fixtures/state/*.pem
e2e/cypress/fixtures/state/scanResult.json
e2e/cypress/fixtures/state/scanID.json
e2e/cypress/downloads/
e2e/cypress/downloads/

openapi.yaml
routes.ts
2 changes: 2 additions & 0 deletions .spectral.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,2 @@
extends:
- https://raw.githubusercontent.com/bcgov/csit-api-governance-spectral-style-guide/refs/heads/main/spectral/basic-ruleset.yaml
3 changes: 2 additions & 1 deletion e2e/cypress.config.ts
Original file line number Diff line number Diff line change
Expand Up @@ -43,7 +43,8 @@ export default defineConfig({
'./cypress/tests/18-*/*.ts',
'./cypress/tests/19-*/*.ts',
'./cypress/tests/20-*/*.ts',
'./cypress/tests/21-*/*.ts',
'./cypress/tests/21-*/**/*.ts',
'./cypress/tests/22-*/**/*.ts',
]
return config
},
Expand Down
Loading
Loading