Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
28 commits
Select commit Hold shift + click to select a range
a7cdcc4
fix: use typology cfg and add completion log
Lenbkr Jul 31, 2024
4dc944a
build: update log level for docker
Lenbkr Jul 31, 2024
a3263b8
Merge pull request #202 from frmscoe/endlog
Lenbkr Aug 2, 2024
fbacf99
feat(imports): add efrup features from new library
Lenbkr Sep 2, 2024
ffba348
ci(workflow): use new scope
Lenbkr Sep 2, 2024
a84790d
ci(workflow): use new token
Lenbkr Sep 3, 2024
8b0b954
Merge pull request #216 from tazama-lf/feat/efrup
Justus-at-Tazama Sep 4, 2024
61e37a2
chore(deps-dev): bump typescript from 5.5.3 to 5.6.2
dependabot[bot] Sep 25, 2024
7945051
chore(deps-dev): bump micromatch from 4.0.7 to 4.0.8
dependabot[bot] Sep 25, 2024
43e1a3c
feat: Env/validation (#226)
cshezi Oct 4, 2024
c669b74
Merge pull request #215 from tazama-lf/dependabot/npm_and_yarn/microm…
Justus-at-Tazama Oct 9, 2024
6e329ab
Merge pull request #221 from tazama-lf/dependabot/npm_and_yarn/typesc…
Justus-at-Tazama Oct 9, 2024
ff67cdb
refactor: apply cache option environment variable split
cshezi Oct 10, 2024
da3da8a
test: add mock of the local cache vars
cshezi Oct 10, 2024
28b2d51
Merge pull request #231 from tazama-lf/split-cache-options
cshezi Oct 11, 2024
3ffb7e8
build: remove unused deps
Oct 11, 2024
2ce4444
Merge pull request #233 from tazama-lf/deps
rtkay123 Oct 11, 2024
89b3939
refactor: abstract service configs
Oct 15, 2024
651d847
test: mock env
Oct 15, 2024
d976f49
test: remove unused modules
Oct 15, 2024
faf38ba
build: update env
Oct 17, 2024
4ce6dae
build: bump lib ver
Oct 17, 2024
989a49a
Merge pull request #237 from tazama-lf/encapsulation
rtkay123 Oct 17, 2024
fa2d564
feat: updated networkcache
JeanPierreNell Oct 30, 2024
c3798e3
feat: updated tests
JeanPierreNell Oct 30, 2024
d191ad2
Merge pull request #246 from tazama-lf/multi-currency
JeanPierreNell Nov 1, 2024
e70193e
build: update libs (#255)
rtkay123 Dec 2, 2024
305a4ab
ci: sync workflows from central-workflows Signed-off-by: Scott <busin…
scott45 Dec 2, 2024
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
53 changes: 30 additions & 23 deletions .env.template
Original file line number Diff line number Diff line change
@@ -1,49 +1,56 @@
# SPDX-License-Identifier: Apache-2.0
NODE_TLS_REJECT_UNAUTHORIZED='0'

FUNCTION_NAME=transaction-aggregation-decisioning-processor
NODE_ENV=production
SERVER_URL=0.0.0.0:4222
SIDECAR_HOST=0.0.0.0:4222
NODE_ENV=dev
MAX_CPU=

# Redis
REDIS_DB=0
REDIS_DATABASE=0
REDIS_AUTH="exampleAuth"
REDIS_SERVERS='[{"host":"127.0.0.1", "port":6379}, {"host":"127.0.0.1", "port":6380}]'
REDIS_IS_CLUSTER=false
DISTRIBUTED_CACHETTL=300
DISTRIBUTED_CACHE_ENABLED=true

# NODE CACHE
LOCAL_CACHETTL=300
LOCAL_CACHE_ENABLED=true

# Database
TRANSACTION_HISTORY_DATABASE_CERT_PATH=
TRANSACTION_HISTORY_DATABASE_URL=
TRANSACTION_HISTORY_DATABASE_USER=
TRANSACTION_HISTORY_DATABASE_PASSWORD=
TRANSACTION_HISTORY_DATABASE=

CONFIG_DATABASE_CERT_PATH=
CONFIG_DATABASE_URL=
CONFIG_DATABASE_USER=
CONFIG_DATABASE_PASSWORD=
CONFIG_DATABASE=

TRANSACTION_DATABASE_CERT_PATH=
TRANSACTION_DATABASE_URL=
TRANSACTION_DATABASE_USER=
TRANSACTION_DATABASE_PASSWORD=
TRANSACTION_DATABASE=
TRANSACTION_HISTORY_DATABASE_URL=http://0.0.0.0:18529
TRANSACTION_HISTORY_DATABASE_USER='root'
TRANSACTION_HISTORY_DATABASE_PASSWORD=''
TRANSACTION_HISTORY_DATABASE='transactionHistory'

CONFIGURATION_DATABASE_CERT_PATH=
CONFIGURATION_DATABASE_URL=http://0.0.0.0:18529
CONFIGURATION_DATABASE_USER='root'
CONFIGURATION_DATABASE_PASSWORD=''
CONFIGURATION_DATABASE='configuration'

EVALUATION_DATABASE_CERT_PATH=
EVALUATION_DATABASE_URL=http://0.0.0.0:18529
EVALUATION_DATABASE_USER='root'
EVALUATION_DATABASE_PASSWORD=''
EVALUATION_DATABASE='evaluationResults'

# Alert
SUPPRESS_ALERTS=false

# Apm
APM_ACTIVE=true
APM_SERVICE_NAME=transaction-aggregation-decisioning-processor
APM_ACTIVE=false
APM_URL=http://apm-server.development:8200
APM_SECRET_TOKEN=

# Logstash
LOGSTASH_HOST=logstash.development
LOGSTASH_PORT=8080
LOGSTASH_LEVEL='info'
SIDECAR_HOST=0.0.0.0:5000

# Nats
PRODUCER_STREAM=
PRODUCER_STREAM=TEMP
STARTUP_TYPE=nats
SERVER_URL=0.0.0.0:4222
11 changes: 7 additions & 4 deletions .github/workflows/codacy.yml
Original file line number Diff line number Diff line change
Expand Up @@ -13,14 +13,16 @@
# For more information on Codacy Analysis CLI in general, see
# https://github.com/codacy/codacy-analysis-cli.

# Please do not attempt to edit this flow without the direct consent from the DevOps team. This file is managed centrally.

name: Codacy Security Scan

on:
push:
branches: [ "main" ]
branches: [ "dev", "main" ]
pull_request:
# The branches below must be a subset of the branches above
branches: [ "main" ]
branches: [ "dev", "main" ]
schedule:
- cron: '17 0 * * 4'

Expand All @@ -29,6 +31,7 @@ permissions:

jobs:
codacy-security-scan:
if: github.actor != 'dependabot[bot]' && github.actor != 'dependabot-preview[bot]'
permissions:
contents: read # for actions/checkout to fetch code
security-events: write # for github/codeql-action/upload-sarif to upload SARIF results
Expand All @@ -42,7 +45,7 @@ jobs:

# Execute Codacy Analysis CLI and generate a SARIF output with the security issues identified during the analysis
- name: Run Codacy Analysis CLI
uses: codacy/codacy-analysis-cli-action@d840f886c4bd4edc059706d09c6a1586111c540b
uses: codacy/codacy-analysis-cli-action@3ff8e64eb4b714c4bee91b7b4eea31c6fc2c4f93
with:
# Check https://github.com/codacy/codacy-analysis-cli#project-token to get your project token from your Codacy repository
# You can also omit the token and run the tools that support default configurations
Expand All @@ -58,6 +61,6 @@ jobs:

# Upload the SARIF file generated in the previous step
- name: Upload SARIF results file
uses: github/codeql-action/upload-sarif@v2
uses: github/codeql-action/upload-sarif@v3
with:
sarif_file: results.sarif
14 changes: 9 additions & 5 deletions .github/workflows/codeql.yml
Original file line number Diff line number Diff line change
Expand Up @@ -11,19 +11,23 @@
# the `language` matrix defined below to confirm you have the correct set of
# supported CodeQL languages.
#

# Please do not attempt to edit this flow without the direct consent from the DevOps team. This file is managed centrally.

name: "CodeQL"

on:
push:
branches: [ "main" ]
branches: [ "dev", "main" ]
pull_request:
# The branches below must be a subset of the branches above
branches: [ "main" ]
branches: [ "dev", "main" ]
schedule:
- cron: '34 0 * * 4'

jobs:
analyze:
if: github.actor != 'dependabot[bot]' && github.actor != 'dependabot-preview[bot]'
name: Analyze
runs-on: ${{ (matrix.language == 'swift' && 'macos-latest') || 'ubuntu-latest' }}
permissions:
Expand All @@ -46,7 +50,7 @@ jobs:

# Initializes the CodeQL tools for scanning.
- name: Initialize CodeQL
uses: github/codeql-action/init@v2
uses: github/codeql-action/init@v3
with:
languages: ${{ matrix.language }}
# If you wish to specify custom queries, you can do so here or in a config file.
Expand All @@ -60,7 +64,7 @@ jobs:
# Autobuild attempts to build any compiled languages (C/C++, C#, Go, or Java).
# If this step fails, then you should remove it and run the build manually (see below)
- name: Autobuild
uses: github/codeql-action/autobuild@v2
uses: github/codeql-action/autobuild@v3

# ℹ️ Command-line programs to run using the OS shell.
# 📚 See https://docs.github.com/en/actions/using-workflows/workflow-syntax-for-github-actions#jobsjob_idstepsrun
Expand All @@ -73,6 +77,6 @@ jobs:
# ./location_of_script_within_repo/buildscript.sh

- name: Perform CodeQL Analysis
uses: github/codeql-action/analyze@v2
uses: github/codeql-action/analyze@v3
with:
category: "/language:${{matrix.language}}"
3 changes: 3 additions & 0 deletions .github/workflows/conventional-commits.yml
Original file line number Diff line number Diff line change
Expand Up @@ -7,6 +7,8 @@

# This GitHub Actions workflow validates the title of pull requests (PRs) to ensure they follow conventional commit standards.

# Please do not attempt to edit this flow without the direct consent from the DevOps team. This file is managed centrally.

name: PR Conventional Commit Validation

on:
Expand All @@ -16,6 +18,7 @@ on:

jobs:
validate-pr-title:
if: github.actor != 'dependabot[bot]' && github.actor != 'dependabot-preview[bot]'
runs-on: ubuntu-latest # Use the latest Ubuntu runner for the job
steps:
- name: Checkout code
Expand Down
57 changes: 57 additions & 0 deletions .github/workflows/dco-check.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,57 @@
# SPDX-License-Identifier: Apache-2.0

# This GitHub Actions workflow checks that all commits in a pull request (PR) have a "Signed-off-by" line to ensure Developer Certificate of Origin (DCO) compliance.

# Please do not attempt to edit this flow without the direct consent from the DevOps team. This file is managed centrally.

name: DCO

# Trigger the workflow on pull request events
on: [pull_request]

jobs:
dco:
if: github.actor != 'dependabot[bot]' && github.actor != 'dependabot-preview[bot]'
# Define the runner environment
runs-on: ubuntu-latest

steps:
# Step to check out the repository
- uses: actions/checkout@v4
with:
fetch-depth: 0 # Fetch all history for all branches to ensure complete commit history is available

- name: Set up environment variables
run: |
echo "BASE_BRANCH=${{ github.event.pull_request.base.ref }}" >> $GITHUB_ENV
echo "HEAD_BRANCH=${{ github.event.pull_request.head.ref }}" >> $GITHUB_ENV

# Step to check each commit in the pull request for a Signed-off-by line
- name: Check for DCO Sign-off
run: |
# Get the base branch and head branch of the pull request
base_branch=$BASE_BRANCH
head_branch=$HEAD_BRANCH

# Get the list of commit hashes between the head branch and base branch
commits=$(git log --pretty=format:%H origin/${head_branch}..origin/${base_branch})
non_compliant_commits=""

# Loop through each commit and check for the Signed-off-by line
for commit in $commits; do
# Check if the commit message contains the Signed-off-by line
if ! git show --quiet --format=%B $commit | grep -q "^Signed-off-by: "; then
# If not, add the commit hash to the list of non-compliant commits
non_compliant_commits="$non_compliant_commits $commit"
fi
done

# If there are any non-compliant commits, output their hashes and fail the job
if [ -n "$non_compliant_commits" ]; then
echo "The following commits do not have a Signed-off-by line:"
for commit in $non_compliant_commits; do
echo "- $commit"
done
exit 1
fi
shell: bash
6 changes: 5 additions & 1 deletion .github/workflows/dependency-review.yml
Original file line number Diff line number Diff line change
Expand Up @@ -6,6 +6,10 @@
#
# Source repository: https://github.com/actions/dependency-review-action
# Public documentation: https://docs.github.com/en/code-security/supply-chain-security/understanding-your-software-supply-chain/about-dependency-review#dependency-review-enforcement


# Please do not attempt to edit this flow without the direct consent from the DevOps team. This file is managed centrally.

name: 'Dependency Review'
on: [pull_request]

Expand All @@ -19,4 +23,4 @@ jobs:
- name: 'Checkout Repository'
uses: actions/checkout@v4
- name: 'Dependency Review'
uses: actions/dependency-review-action@v3
uses: actions/dependency-review-action@v4
52 changes: 52 additions & 0 deletions .github/workflows/dockerfile-linter.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,52 @@
# SPDX-License-Identifier: Apache-2.0

# This workflow uses actions that are not certified by GitHub.
# They are provided by a third-party and are governed by
# separate terms of service, privacy policy, and support
# documentation.
# hadoint is a Dockerfile linter written in Haskell
# that helps you build best practice Docker images.
# More details at https://github.com/hadolint/hadolint

# Please do not attempt to edit this flow without the direct consent from the DevOps team. This file is managed centrally.

name: Hadolint

on:
push:
branches: [ "dev", "main" ]
pull_request:
# The branches below must be a subset of the branches above
branches: [ "dev" ]
schedule:
- cron: '17 13 * * 0'

permissions:
contents: read

jobs:
hadolint:
if: github.actor != 'dependabot[bot]' && github.actor != 'dependabot-preview[bot]'
name: Run hadolint scanning
runs-on: ubuntu-latest
permissions:
contents: read # for actions/checkout to fetch code
security-events: write # for github/codeql-action/upload-sarif to upload SARIF results
actions: read # only required for a private repository by github/codeql-action/upload-sarif to get the Action run status
steps:
- name: Checkout code
uses: actions/checkout@v4

- name: Run hadolint
uses: hadolint/hadolint-action@f988afea3da57ee48710a9795b6bb677cc901183
with:
dockerfile: ./Dockerfile
format: sarif
output-file: hadolint-results.sarif
no-fail: true

- name: Upload analysis results to GitHub
uses: github/codeql-action/upload-sarif@v3
with:
sarif_file: hadolint-results.sarif
wait-for-processing: true
Loading
Loading