Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
7 changes: 0 additions & 7 deletions .github/actions/integration/mssql.sh
Original file line number Diff line number Diff line change
Expand Up @@ -4,13 +4,6 @@ set -eo pipefail
# Debug log for test containers
export DEBUG=testcontainers

export TEST_MSSQL_VERSION=2017-latest

echo "::group::MSSQL ${TEST_MSSQL_VERSION}";
docker pull mcr.microsoft.com/mssql/server:${TEST_MSSQL_VERSION}
yarn lerna run --concurrency 1 --stream --no-prefix integration:mssql
echo "::endgroup::"

export TEST_MSSQL_VERSION=2019-latest

echo "::group::MSSQL ${TEST_MSSQL_VERSION}";
Expand Down
4 changes: 2 additions & 2 deletions .github/workflows/cloud.yml
Original file line number Diff line number Diff line change
Expand Up @@ -27,32 +27,32 @@

jobs:
latest-tag-sha:
runs-on: ubuntu-20.04
runs-on: ubuntu-24.04
outputs:
sha: ${{ steps.get-tag.outputs.sha }}
steps:
- uses: actions/checkout@v4
with:
fetch-depth: 0
- id: git-log
run: git log HEAD~30..HEAD
- id: get-tag-test
run: echo "$SHA $(git rev-list -n 1 "$(git tag --contains "$SHA")")"
env:
SHA: ${{ github.sha }}
- id: get-tag
run: echo "sha=$(git rev-list -n 1 "$(git tag --contains "$SHA")")" >> "$GITHUB_OUTPUT"
env:
SHA: ${{ github.sha }}
- id: get-tag-out
run: echo "$OUT"
env:
OUT: ${{ steps.get-tag.outputs.sha }}

integration-cloud:
needs: latest-tag-sha
if: (needs['latest-tag-sha'].outputs.sha != github.sha)
runs-on: ubuntu-20.04
runs-on: ubuntu-24.04
timeout-minutes: 60

strategy:
Expand Down
2 changes: 1 addition & 1 deletion .github/workflows/cross-images.yml
Original file line number Diff line number Diff line change
Expand Up @@ -15,7 +15,7 @@ on:
jobs:
docker-dev:
name: Build cross image for ${{ matrix.target }} target
runs-on: ubuntu-20.04
runs-on: ubuntu-24.04
timeout-minutes: 120
strategy:
matrix:
Expand Down
8 changes: 4 additions & 4 deletions .github/workflows/drivers-tests.yml
Original file line number Diff line number Diff line change
Expand Up @@ -56,7 +56,7 @@

jobs:
latest-tag-sha:
runs-on: ubuntu-20.04
runs-on: ubuntu-24.04
outputs:
sha: ${{ steps.get-tag.outputs.sha }}
steps:
Expand All @@ -70,90 +70,90 @@
env:
SHA: ${{ github.sha }}
- id: get-tag
run: echo "sha=$(git rev-list -n 1 "$(git tag --contains "$SHA")")" >> "$GITHUB_OUTPUT"
env:
SHA: ${{ github.sha }}
- id: get-tag-out
run: echo "$OUT"
env:
OUT: ${{ steps.get-tag.outputs.sha }}

native_linux:
runs-on: ubuntu-20.04
runs-on: ubuntu-24.04
timeout-minutes: 60
name: Build native Linux ${{ matrix.node-version }} ${{ matrix.target }} Python ${{ matrix.python-version }}
strategy:
matrix:
node-version: [ 20 ]
python-version: [ "fallback" ]
target: [ "x86_64-unknown-linux-gnu" ]
fail-fast: false
container:
image: cubejs/rust-cross:${{ matrix.target }}-15082024

steps:
- name: Checkout

Check warning

Code scanning / CodeQL

Workflow does not contain permissions Medium

Actions job or workflow does not limit the permissions of the GITHUB_TOKEN. Consider setting an explicit permissions block, using the following as a minimal starting point: {contents: read}
uses: actions/checkout@v4
- name: Install Rust
uses: actions-rust-lang/setup-rust-toolchain@v1
with:
toolchain: nightly-2024-07-15
# override: true # this is by default on
rustflags: ""
components: rustfmt
target: ${{ matrix.target }}
- name: Install Node.js ${{ matrix.node-version }}
uses: actions/setup-node@v4
with:
node-version: ${{ matrix.node-version }}
- name: Install Yarn
run: npm install -g yarn
- name: Set Yarn version
run: yarn policies set-version v1.22.22
- name: Install cargo-cp-artifact
run: npm install -g cargo-cp-artifact@0.1
- uses: Swatinem/rust-cache@v2
with:
workspaces: ./packages/cubejs-backend-native
key: native-${{ runner.OS }}-x86_64-unknown-linux-gnu
shared-key: native-${{ runner.OS }}-x86_64-unknown-linux-gnu
- name: Build native (fallback)
if: (matrix.python-version == 'fallback')
env:
CARGO_BUILD_TARGET: ${{ matrix.target }}
run: cd packages/cubejs-backend-native && npm run native:build-release
- name: Setup cross compilation
if: (matrix.target == 'aarch64-unknown-linux-gnu')
uses: allenevans/set-env@v4.0.0
with:
PYO3_CROSS_PYTHON_VERSION: ${{ matrix.python-version }}
- name: Build native (with Python)
if: (matrix.python-version != 'fallback')
env:
PYO3_PYTHON: python${{ matrix.python-version }}
CARGO_BUILD_TARGET: ${{ matrix.target }}
run: cd packages/cubejs-backend-native && npm run native:build-release-python
- name: Upload native build
uses: actions/upload-artifact@v4
with:
name: backend-native
path: packages/cubejs-backend-native/index.node

build:
needs: [latest-tag-sha, native_linux]
if: (needs['latest-tag-sha'].outputs.sha != github.sha)
runs-on: ubuntu-20.04
runs-on: ubuntu-24.04
timeout-minutes: 30
env:
DOCKERHUB_USERNAME: ${{ secrets.DOCKERHUB_USERNAME }}
steps:
- name: Check out the repo
uses: actions/checkout@v4

# Building docker
- name: Login to DockerHub
uses: docker/login-action@v3
with:

Check warning

Code scanning / CodeQL

Workflow does not contain permissions Medium

Actions job or workflow does not limit the permissions of the GITHUB_TOKEN. Consider setting an explicit permissions block, using the following as a minimal starting point: {contents: read}
username: ${{ secrets.DOCKERHUB_USERNAME }}
password: ${{ secrets.DOCKERHUB_TOKEN }}
if: (env.DOCKERHUB_USERNAME != '')
Expand Down Expand Up @@ -184,7 +184,7 @@
path: image.tar.gz

tests:
runs-on: ubuntu-20.04
runs-on: ubuntu-24.04
timeout-minutes: 30
needs: [latest-tag-sha, build]
if: (needs['latest-tag-sha'].outputs.sha != github.sha)
Expand All @@ -203,124 +203,124 @@
snowflake-export-bucket-gcs
# As per docs:
# Secrets cannot be directly referenced in if: conditionals. Instead, consider setting
# secrets as job-level environment variables, then referencing the environment variables
# to conditionally run steps in the job.
DRIVERS_TESTS_ATHENA_CUBEJS_AWS_KEY: ${{ secrets.DRIVERS_TESTS_ATHENA_CUBEJS_AWS_KEY }}
strategy:
matrix:
node:
- 20.x
database:
- athena-export-bucket-s3
- bigquery-export-bucket-gcs
- clickhouse
- clickhouse-export-bucket-s3
- databricks-jdbc
- databricks-jdbc-export-bucket-s3
- databricks-jdbc-export-bucket-azure
- mssql
- mysql
- postgres
- snowflake
- snowflake-export-bucket-s3
- snowflake-export-bucket-azure
- snowflake-export-bucket-azure-via-storage-integration
- snowflake-export-bucket-gcs
fail-fast: false

steps:
- name: Checkout
uses: actions/checkout@v4

- name: Install Node.js 20.x
uses: actions/setup-node@v4
with:
node-version: 20.x

- name: Configure `yarn`
run: yarn policies set-version v1.22.22

- name: Get yarn cache directory path
id: yarn-cache-dir-path
run: echo "dir=$(yarn cache dir)" >> "$GITHUB_OUTPUT"
shell: bash
- name: Restore yarn cache
# We don't want to save it on finish, restore only!
uses: actions/cache/restore@v4
with:
path: ${{ steps.yarn-cache-dir-path.outputs.dir }}
key: ${{ runner.os }}-yarn-${{ hashFiles('**/yarn.lock') }}
restore-keys: |
${{ runner.os }}-yarn-

- name: Install dependencies
uses: nick-fields/retry@v3
env:
CUBESTORE_SKIP_POST_INSTALL: true
with:
max_attempts: 3
retry_on: error
retry_wait_seconds: 15
timeout_minutes: 20
command: yarn install --frozen-lockfile

- name: Build client
run: yarn build

- name: Build packages
run: yarn tsc

- name: Build tests
run: |
cd packages/cubejs-testing-drivers
yarn tsc

- name: Download Docker image artifact
uses: actions/download-artifact@v4
with:
name: docker-image

- name: Load Docker image into Docker Daemon
run: |
gunzip image.tar.gz
docker load -i image.tar

- name: Run tests
uses: nick-fields/retry@v3
# It's enough to test for any one secret because they are set all at once or not set all
if: |
(contains(env.CLOUD_DATABASES, matrix.database) && env.DRIVERS_TESTS_ATHENA_CUBEJS_AWS_KEY != '') ||
(!contains(env.CLOUD_DATABASES, matrix.database))
env:
# Athena
DRIVERS_TESTS_ATHENA_CUBEJS_AWS_KEY: ${{ secrets.DRIVERS_TESTS_ATHENA_CUBEJS_AWS_KEY }}
DRIVERS_TESTS_ATHENA_CUBEJS_AWS_SECRET: ${{ secrets.DRIVERS_TESTS_ATHENA_CUBEJS_AWS_SECRET }}

# BigQuery
DRIVERS_TESTS_CUBEJS_DB_BQ_CREDENTIALS: ${{ secrets.DRIVERS_TESTS_CUBEJS_DB_BQ_CREDENTIALS }}

#GCS
DRIVERS_TESTS_CUBEJS_DB_EXPORT_GCS_CREDENTIALS: ${{ secrets.DRIVERS_TESTS_CUBEJS_DB_EXPORT_GCS_CREDENTIALS }}

# Azure
DRIVERS_TESTS_CUBEJS_DB_EXPORT_BUCKET_AZURE_KEY: ${{ secrets.DRIVERS_TESTS_CUBEJS_DB_EXPORT_BUCKET_AZURE_KEY }}
DRIVERS_TESTS_CUBEJS_DB_EXPORT_BUCKET_AZURE_SAS_TOKEN: ${{ secrets.DRIVERS_TESTS_CUBEJS_DB_EXPORT_BUCKET_AZURE_SAS_TOKEN }}

# Databricks
DRIVERS_TESTS_CUBEJS_DB_DATABRICKS_URL: ${{ secrets.DRIVERS_TESTS_CUBEJS_DB_DATABRICKS_URL }}
DRIVERS_TESTS_CUBEJS_DB_DATABRICKS_TOKEN: ${{ secrets.DRIVERS_TESTS_CUBEJS_DB_DATABRICKS_TOKEN }}
DRIVERS_TESTS_CUBEJS_DB_EXPORT_BUCKET_AWS_KEY: ${{ secrets.DRIVERS_TESTS_CUBEJS_DB_EXPORT_BUCKET_AWS_KEY }}
DRIVERS_TESTS_CUBEJS_DB_EXPORT_BUCKET_AWS_SECRET: ${{ secrets.DRIVERS_TESTS_CUBEJS_DB_EXPORT_BUCKET_AWS_SECRET }}

# Snowflake
DRIVERS_TESTS_CUBEJS_DB_SNOWFLAKE_USER: ${{ secrets.DRIVERS_TESTS_CUBEJS_DB_SNOWFLAKE_USER }}
DRIVERS_TESTS_CUBEJS_DB_SNOWFLAKE_PASS: ${{ secrets.DRIVERS_TESTS_CUBEJS_DB_SNOWFLAKE_PASS }}
with:
max_attempts: 3
retry_on: error
retry_wait_seconds: 15
timeout_minutes: 20
command: |
cd ./packages/cubejs-testing-drivers
export DEBUG=testcontainers
yarn ${{ matrix.database }}-full
56 changes: 28 additions & 28 deletions .github/workflows/examples-publish.yml
Original file line number Diff line number Diff line change
Expand Up @@ -12,689 +12,689 @@
jobs:

clickhouse-multi-tenancy:
runs-on: ubuntu-20.04
runs-on: ubuntu-24.04
timeout-minutes: 30

steps:
- uses: actions/checkout@v4

- uses: pheel/path-watcher-action@v1
id: modified
with:
paths: '.github/workflows/examples-publish.yml,.github/actions/deploy-example.sh,examples/building-an-open-source-data-stack-with-clickhouse-and-cube-workshop/*,examples/building-an-open-source-data-stack-with-clickhouse-and-cube-workshop/**'

- if: steps.modified.outputs.modified
uses: actions/setup-node@v4
with:
node-version: 14.x

- if: steps.modified.outputs.modified
run: .github/actions/deploy-example.sh
env:
EXAMPLE_SLUG: building-an-open-source-data-stack-with-clickhouse-and-cube-workshop
EXAMPLE_FRONTEND_SUBDIRECTORY: dashboard-app-multi-tenancy
EXAMPLE_FRONTEND_BUILD_SUBDIRECTORY: dist/
NETLIFY_AUTH_TOKEN: ${{ secrets.NETLIFY_AUTH_TOKEN }}
EXAMPLE_CUBE_SKIP: 1

clickhouse-multiple-sources:

Check warning

Code scanning / CodeQL

Workflow does not contain permissions Medium

Actions job or workflow does not limit the permissions of the GITHUB_TOKEN. Consider setting an explicit permissions block, using the following as a minimal starting point: {contents: read}
runs-on: ubuntu-20.04
runs-on: ubuntu-24.04
timeout-minutes: 30

steps:
- uses: actions/checkout@v4

- uses: pheel/path-watcher-action@v1
id: modified
with:
paths: '.github/workflows/examples-publish.yml,.github/actions/deploy-example.sh,examples/building-an-open-source-data-stack-with-clickhouse-and-cube-workshop/*,examples/building-an-open-source-data-stack-with-clickhouse-and-cube-workshop/**'

- if: steps.modified.outputs.modified
uses: actions/setup-node@v4
with:
node-version: 14.x

- if: steps.modified.outputs.modified
run: .github/actions/deploy-example.sh
env:
EXAMPLE_SLUG: building-an-open-source-data-stack-with-clickhouse-and-cube-workshop
EXAMPLE_FRONTEND_SUBDIRECTORY: dashboard-app-multiple-data-sources
EXAMPLE_FRONTEND_BUILD_SUBDIRECTORY: dist/
NETLIFY_AUTH_TOKEN: ${{ secrets.NETLIFY_AUTH_TOKEN }}
EXAMPLE_CUBE_SKIP: 1

apollo-federation:

Check warning

Code scanning / CodeQL

Workflow does not contain permissions Medium

Actions job or workflow does not limit the permissions of the GITHUB_TOKEN. Consider setting an explicit permissions block, using the following as a minimal starting point: {contents: read}
runs-on: ubuntu-20.04
runs-on: ubuntu-24.04
timeout-minutes: 30

steps:
- uses: actions/checkout@v4

- uses: pheel/path-watcher-action@v1
id: modified
with:
paths: '.github/workflows/examples-publish.yml,.github/actions/deploy-example.sh,examples/apollo-federation-with-cube/*,examples/apollo-federation-with-cube/**'

- if: steps.modified.outputs.modified
uses: actions/setup-node@v4
with:
node-version: 14.x

- if: steps.modified.outputs.modified
run: .github/actions/deploy-example.sh
env:
EXAMPLE_SLUG: apollo-federation-with-cube
EXAMPLE_FRONTEND_BUILD_SUBDIRECTORY: dist/
NETLIFY_AUTH_TOKEN: ${{ secrets.NETLIFY_AUTH_TOKEN }}
EXAMPLE_CUBE_SKIP: 1

ksql:

Check warning

Code scanning / CodeQL

Workflow does not contain permissions Medium

Actions job or workflow does not limit the permissions of the GITHUB_TOKEN. Consider setting an explicit permissions block, using the following as a minimal starting point: {contents: read}
runs-on: ubuntu-20.04
runs-on: ubuntu-24.04
timeout-minutes: 30

steps:
- uses: actions/checkout@v4

- uses: pheel/path-watcher-action@v1
id: modified
with:
paths: '.github/workflows/examples-publish.yml,.github/actions/deploy-example.sh,examples/ksql/*,examples/ksql/**'

- if: steps.modified.outputs.modified
uses: actions/setup-node@v4
with:
node-version: 14.x

- if: steps.modified.outputs.modified
run: .github/actions/deploy-example.sh
env:
EXAMPLE_SLUG: ksql
EXAMPLE_FRONTEND_BUILD_SUBDIRECTORY: build/
NETLIFY_AUTH_TOKEN: ${{ secrets.NETLIFY_AUTH_TOKEN }}
EXAMPLE_CUBE_SKIP: 1

hasura-remote-schema:

Check warning

Code scanning / CodeQL

Workflow does not contain permissions Medium

Actions job or workflow does not limit the permissions of the GITHUB_TOKEN. Consider setting an explicit permissions block, using the following as a minimal starting point: {contents: read}
runs-on: ubuntu-20.04
runs-on: ubuntu-24.04
timeout-minutes: 30

steps:
- uses: actions/checkout@v4

- uses: pheel/path-watcher-action@v1
id: modified
with:
paths: '.github/workflows/examples-publish.yml,.github/actions/deploy-example.sh,examples/hasura-remote-schema-with-cube/*,examples/hasura-remote-schema-with-cube/**'

- if: steps.modified.outputs.modified
uses: actions/setup-node@v4
with:
node-version: 14.x

- if: steps.modified.outputs.modified
run: .github/actions/deploy-example.sh
env:
EXAMPLE_SLUG: hasura-remote-schema-with-cube
EXAMPLE_FRONTEND_BUILD_SUBDIRECTORY: dist/
NETLIFY_AUTH_TOKEN: ${{ secrets.NETLIFY_AUTH_TOKEN }}
EXAMPLE_CUBE_SKIP: 1

angular-dashboard:

Check warning

Code scanning / CodeQL

Workflow does not contain permissions Medium

Actions job or workflow does not limit the permissions of the GITHUB_TOKEN. Consider setting an explicit permissions block, using the following as a minimal starting point: {contents: read}
runs-on: ubuntu-20.04
runs-on: ubuntu-24.04
timeout-minutes: 30

steps:
- uses: actions/checkout@v4

- uses: pheel/path-watcher-action@v1
id: modified
with:
paths: '.github/workflows/examples-publish.yml,.github/actions/deploy-example.sh,examples/angular-dashboard-with-material-ui/*,examples/angular-dashboard-with-material-ui/**'

- if: steps.modified.outputs.modified
uses: actions/setup-node@v4
with:
node-version: 14.x

- if: steps.modified.outputs.modified
run: .github/actions/deploy-example.sh
env:
EXAMPLE_SLUG: angular-dashboard-with-material-ui
EXAMPLE_FRONTEND_BUILD_SUBDIRECTORY: dist/dashboard-app
CUBE_CLOUD_DEPLOY_AUTH: ${{ secrets.CUBE_CLOUD_DEPLOY_AUTH_ANGULAR_DASHBOARD }}
NETLIFY_AUTH_TOKEN: ${{ secrets.NETLIFY_AUTH_TOKEN }}

compare-date-range:

Check warning

Code scanning / CodeQL

Workflow does not contain permissions Medium

Actions job or workflow does not limit the permissions of the GITHUB_TOKEN. Consider setting an explicit permissions block, using the following as a minimal starting point: {contents: read}
runs-on: ubuntu-20.04
runs-on: ubuntu-24.04
timeout-minutes: 30

steps:
- uses: actions/checkout@v4

- uses: pheel/path-watcher-action@v1
id: modified
with:
paths: '.github/workflows/examples-publish.yml,.github/actions/deploy-example.sh,examples/compare-date-range/*,examples/compare-date-range/**'

- if: steps.modified.outputs.modified
uses: actions/setup-node@v4
with:
node-version: 14.x

- if: steps.modified.outputs.modified
run: .github/actions/deploy-example.sh
env:
EXAMPLE_SLUG: compare-date-range
CUBE_CLOUD_DEPLOY_AUTH: ${{ secrets.CUBE_CLOUD_DEPLOY_AUTH_DATA_RANGE }}
NETLIFY_AUTH_TOKEN: ${{ secrets.NETLIFY_AUTH_TOKEN }}

clickhouse-dashboard:

Check warning

Code scanning / CodeQL

Workflow does not contain permissions Medium

Actions job or workflow does not limit the permissions of the GITHUB_TOKEN. Consider setting an explicit permissions block, using the following as a minimal starting point: {contents: read}
runs-on: ubuntu-20.04
runs-on: ubuntu-24.04
timeout-minutes: 30

steps:
- uses: actions/checkout@v4

- uses: pheel/path-watcher-action@v1
id: modified
with:
paths: '.github/workflows/examples-publish.yml,.github/actions/deploy-example.sh,examples/clickhouse-dashboard/*,examples/clickhouse-dashboard/**'

- if: steps.modified.outputs.modified
uses: actions/setup-node@v4
with:
node-version: 14.x

- if: steps.modified.outputs.modified
run: .github/actions/deploy-example.sh
env:
EXAMPLE_SLUG: clickhouse-dashboard
CUBE_CLOUD_DEPLOY_AUTH: ${{ secrets.CUBE_CLOUD_DEPLOY_AUTH_CLICKHOUSE_DASHBOARD }}
NETLIFY_AUTH_TOKEN: ${{ secrets.NETLIFY_AUTH_TOKEN }}

d3-dashboard:

Check warning

Code scanning / CodeQL

Workflow does not contain permissions Medium

Actions job or workflow does not limit the permissions of the GITHUB_TOKEN. Consider setting an explicit permissions block, using the following as a minimal starting point: {contents: read}
runs-on: ubuntu-20.04
runs-on: ubuntu-24.04
timeout-minutes: 30

steps:
- uses: actions/checkout@v4

- uses: pheel/path-watcher-action@v1
id: modified
with:
paths: '.github/workflows/examples-publish.yml,.github/actions/deploy-example.sh,examples/d3-dashboard/*,examples/d3-dashboard/**'

- if: steps.modified.outputs.modified
uses: actions/setup-node@v4
with:
node-version: 14.x

- if: steps.modified.outputs.modified
run: .github/actions/deploy-example.sh
env:
EXAMPLE_SLUG: d3-dashboard
CUBE_CLOUD_DEPLOY_AUTH: ${{ secrets.CUBE_CLOUD_DEPLOY_AUTH_D3_DASHBOARD }}
NETLIFY_AUTH_TOKEN: ${{ secrets.NETLIFY_AUTH_TOKEN }}

data-blending:

Check warning

Code scanning / CodeQL

Workflow does not contain permissions Medium

Actions job or workflow does not limit the permissions of the GITHUB_TOKEN. Consider setting an explicit permissions block, using the following as a minimal starting point: {contents: read}
runs-on: ubuntu-20.04
runs-on: ubuntu-24.04
timeout-minutes: 30

steps:
- uses: actions/checkout@v4

- uses: pheel/path-watcher-action@v1
id: modified
with:
paths: '.github/workflows/examples-publish.yml,.github/actions/deploy-example.sh,examples/data-blending/*,examples/data-blending/**'

- if: steps.modified.outputs.modified
uses: actions/setup-node@v4
with:
node-version: 14.x

- if: steps.modified.outputs.modified
run: .github/actions/deploy-example.sh
env:
EXAMPLE_SLUG: data-blending
CUBE_CLOUD_DEPLOY_AUTH: ${{ secrets.CUBE_CLOUD_DEPLOY_AUTH_DATA_BLENDING }}
NETLIFY_AUTH_TOKEN: ${{ secrets.NETLIFY_AUTH_TOKEN }}

drill-downs:

Check warning

Code scanning / CodeQL

Workflow does not contain permissions Medium

Actions job or workflow does not limit the permissions of the GITHUB_TOKEN. Consider setting an explicit permissions block, using the following as a minimal starting point: {contents: read}
runs-on: ubuntu-20.04
runs-on: ubuntu-24.04
timeout-minutes: 30

steps:
- uses: actions/checkout@v4

- uses: pheel/path-watcher-action@v1
id: modified
with:
paths: '.github/workflows/examples-publish.yml,.github/actions/deploy-example.sh,examples/drill-downs/*,examples/drill-downs/**'

- if: steps.modified.outputs.modified
uses: actions/setup-node@v4
with:
node-version: 14.x

- if: steps.modified.outputs.modified
run: .github/actions/deploy-example.sh
env:
EXAMPLE_SLUG: drill-downs
CUBE_CLOUD_DEPLOY_AUTH: ${{ secrets.CUBE_CLOUD_DEPLOY_AUTH_DRILL_DOWNS }}
NETLIFY_AUTH_TOKEN: ${{ secrets.NETLIFY_AUTH_TOKEN }}

ecom-backend:

Check warning

Code scanning / CodeQL

Workflow does not contain permissions Medium

Actions job or workflow does not limit the permissions of the GITHUB_TOKEN. Consider setting an explicit permissions block, using the following as a minimal starting point: {contents: read}
runs-on: ubuntu-20.04
runs-on: ubuntu-24.04
timeout-minutes: 30

steps:
- uses: actions/checkout@v4

- uses: pheel/path-watcher-action@v1
id: modified
with:
paths: '.github/workflows/examples-publish.yml,.github/actions/deploy-example.sh,examples/ecom-backend/*,examples/ecom-backend/**'

- if: steps.modified.outputs.modified
uses: actions/setup-node@v4
with:
node-version: 14.x

- if: steps.modified.outputs.modified
run: .github/actions/deploy-example.sh
env:
EXAMPLE_SLUG: ecom-backend
EXAMPLE_FRONTEND_SKIP: 1
CUBE_CLOUD_DEPLOY_AUTH: ${{ secrets.CUBE_CLOUD_DEPLOY_AUTH_ECOM_BACKEND }}
NETLIFY_AUTH_TOKEN: ${{ secrets.NETLIFY_AUTH_TOKEN }}

external-rollups:

Check warning

Code scanning / CodeQL

Workflow does not contain permissions Medium

Actions job or workflow does not limit the permissions of the GITHUB_TOKEN. Consider setting an explicit permissions block, using the following as a minimal starting point: {contents: read}
runs-on: ubuntu-20.04
runs-on: ubuntu-24.04
timeout-minutes: 30

steps:
- uses: actions/checkout@v4

- uses: pheel/path-watcher-action@v1
id: modified
with:
paths: '.github/workflows/examples-publish.yml,.github/actions/deploy-example.sh,examples/external-rollups/*,examples/external-rollups/**'

- if: steps.modified.outputs.modified
uses: actions/setup-node@v4
with:
node-version: 14.x

- if: steps.modified.outputs.modified
run: .github/actions/deploy-example.sh
env:
EXAMPLE_SLUG: external-rollups
CUBE_CLOUD_DEPLOY_AUTH: ${{ secrets.CUBE_CLOUD_DEPLOY_AUTH_EXTERNAL_ROLLUPS }}
NETLIFY_AUTH_TOKEN: ${{ secrets.NETLIFY_AUTH_TOKEN }}

hacktoberfest:

Check warning

Code scanning / CodeQL

Workflow does not contain permissions Medium

Actions job or workflow does not limit the permissions of the GITHUB_TOKEN. Consider setting an explicit permissions block, using the following as a minimal starting point: {contents: read}
runs-on: ubuntu-20.04
runs-on: ubuntu-24.04
timeout-minutes: 30

steps:
- uses: actions/checkout@v4

- uses: pheel/path-watcher-action@v1
id: modified
with:
paths: '.github/workflows/examples-publish.yml,.github/actions/deploy-example.sh,examples/hacktoberfest/*,examples/hacktoberfest/**'

- if: steps.modified.outputs.modified
uses: actions/setup-node@v4
with:
node-version: 14.x

- if: steps.modified.outputs.modified
run: .github/actions/deploy-example.sh
env:
EXAMPLE_SLUG: hacktoberfest
EXAMPLE_FRONTEND_SUBDIRECTORY: dashboard
CUBE_CLOUD_DEPLOY_AUTH: ${{ secrets.CUBE_CLOUD_DEPLOY_AUTH_HACKTOBERFEST }}
NETLIFY_AUTH_TOKEN: ${{ secrets.NETLIFY_AUTH_TOKEN }}

mapbox:

Check warning

Code scanning / CodeQL

Workflow does not contain permissions Medium

Actions job or workflow does not limit the permissions of the GITHUB_TOKEN. Consider setting an explicit permissions block, using the following as a minimal starting point: {contents: read}
runs-on: ubuntu-20.04
runs-on: ubuntu-24.04
timeout-minutes: 30

steps:
- uses: actions/checkout@v4

- uses: pheel/path-watcher-action@v1
id: modified
with:
paths: '.github/workflows/examples-publish.yml,.github/actions/deploy-example.sh,examples/mapbox/*,examples/mapbox/**'

- if: steps.modified.outputs.modified
uses: actions/setup-node@v4
with:
node-version: 14.x

- if: steps.modified.outputs.modified
run: .github/actions/deploy-example.sh
env:
EXAMPLE_SLUG: mapbox
CUBE_CLOUD_DEPLOY_AUTH: ${{ secrets.CUBE_CLOUD_DEPLOY_AUTH_MAPBOX }}
NETLIFY_AUTH_TOKEN: ${{ secrets.NETLIFY_AUTH_TOKEN }}

react-dashboard:

Check warning

Code scanning / CodeQL

Workflow does not contain permissions Medium

Actions job or workflow does not limit the permissions of the GITHUB_TOKEN. Consider setting an explicit permissions block, using the following as a minimal starting point: {contents: read}
runs-on: ubuntu-20.04
runs-on: ubuntu-24.04
timeout-minutes: 30

steps:
- uses: actions/checkout@v4

- uses: pheel/path-watcher-action@v1
id: modified
with:
paths: '.github/workflows/examples-publish.yml,.github/actions/deploy-example.sh,examples/react-dashboard/*,examples/react-dashboard/**'

- if: steps.modified.outputs.modified
uses: actions/setup-node@v4
with:
node-version: 14.x

- if: steps.modified.outputs.modified
run: .github/actions/deploy-example.sh
env:
EXAMPLE_SLUG: react-dashboard
CUBE_CLOUD_DEPLOY_AUTH: ${{ secrets.CUBE_CLOUD_DEPLOY_AUTH_REACT_DASHBOARD }}
NETLIFY_AUTH_TOKEN: ${{ secrets.NETLIFY_AUTH_TOKEN }}

react-muze:

Check warning

Code scanning / CodeQL

Workflow does not contain permissions Medium

Actions job or workflow does not limit the permissions of the GITHUB_TOKEN. Consider setting an explicit permissions block, using the following as a minimal starting point: {contents: read}
runs-on: ubuntu-20.04
runs-on: ubuntu-24.04
timeout-minutes: 30

steps:
- uses: actions/checkout@v4

- uses: pheel/path-watcher-action@v1
id: modified
with:
paths: '.github/workflows/examples-publish.yml,.github/actions/deploy-example.sh,examples/react-muze/*,examples/react-muze/**'

- if: steps.modified.outputs.modified
uses: actions/setup-node@v4
with:
node-version: 14.x

- if: steps.modified.outputs.modified
run: .github/actions/deploy-example.sh
env:
EXAMPLE_SLUG: react-muze
CUBE_CLOUD_DEPLOY_AUTH: ${{ secrets.CUBE_CLOUD_DEPLOY_AUTH_REACT_MUZE }}
NETLIFY_AUTH_TOKEN: ${{ secrets.NETLIFY_AUTH_TOKEN }}

real-time-dashboard:

Check warning

Code scanning / CodeQL

Workflow does not contain permissions Medium

Actions job or workflow does not limit the permissions of the GITHUB_TOKEN. Consider setting an explicit permissions block, using the following as a minimal starting point: {contents: read}
runs-on: ubuntu-20.04
runs-on: ubuntu-24.04
timeout-minutes: 30

steps:
- uses: actions/checkout@v4

- uses: pheel/path-watcher-action@v1
id: modified
with:
paths: '.github/workflows/examples-publish.yml,.github/actions/deploy-example.sh,examples/real-time-dashboard/*,examples/real-time-dashboard/**'

- if: steps.modified.outputs.modified
uses: actions/setup-node@v4
with:
node-version: 14.x

- if: steps.modified.outputs.modified
run: .github/actions/deploy-example.sh
env:
EXAMPLE_SLUG: real-time-dashboard
CUBE_CLOUD_DEPLOY_AUTH: ${{ secrets.CUBE_CLOUD_DEPLOY_AUTH_REAL_TIME_DASHBOARD }}
NETLIFY_AUTH_TOKEN: ${{ secrets.NETLIFY_AUTH_TOKEN }}

web-analytics:

Check warning

Code scanning / CodeQL

Workflow does not contain permissions Medium

Actions job or workflow does not limit the permissions of the GITHUB_TOKEN. Consider setting an explicit permissions block, using the following as a minimal starting point: {contents: read}
runs-on: ubuntu-20.04
runs-on: ubuntu-24.04
timeout-minutes: 30

steps:
- uses: actions/checkout@v4

- uses: pheel/path-watcher-action@v1
id: modified
with:
paths: '.github/workflows/examples-publish.yml,.github/actions/deploy-example.sh,examples/web-analytics/*,examples/web-analytics/**'

- if: steps.modified.outputs.modified
uses: actions/setup-node@v4
with:
node-version: 14.x

- if: steps.modified.outputs.modified
run: .github/actions/deploy-example.sh
env:
EXAMPLE_SLUG: web-analytics
CUBE_CLOUD_DEPLOY_AUTH: ${{ secrets.CUBE_CLOUD_DEPLOY_AUTH_WEB_ANALYTICS }}
NETLIFY_AUTH_TOKEN: ${{ secrets.NETLIFY_AUTH_TOKEN }}

auth0:

Check warning

Code scanning / CodeQL

Workflow does not contain permissions Medium

Actions job or workflow does not limit the permissions of the GITHUB_TOKEN. Consider setting an explicit permissions block, using the following as a minimal starting point: {contents: read}
runs-on: ubuntu-20.04
runs-on: ubuntu-24.04
timeout-minutes: 30

steps:
- uses: actions/checkout@v4

- uses: pheel/path-watcher-action@v1
id: modified
with:
paths: '.github/workflows/examples-publish.yml,.github/actions/deploy-example.sh,examples/auth0/*,examples/auth0/**'

- if: steps.modified.outputs.modified
uses: actions/setup-node@v4
with:
node-version: 14.x

- if: steps.modified.outputs.modified
run: .github/actions/deploy-example.sh
env:
EXAMPLE_SLUG: auth0
CUBE_CLOUD_DEPLOY_AUTH: ${{ secrets.CUBE_CLOUD_DEPLOY_AUTH_AUTH0 }}
NETLIFY_AUTH_TOKEN: ${{ secrets.NETLIFY_AUTH_TOKEN }}

bigquery-public-datasets:

Check warning

Code scanning / CodeQL

Workflow does not contain permissions Medium

Actions job or workflow does not limit the permissions of the GITHUB_TOKEN. Consider setting an explicit permissions block, using the following as a minimal starting point: {contents: read}
runs-on: ubuntu-20.04
runs-on: ubuntu-24.04
timeout-minutes: 30

steps:
- uses: actions/checkout@v4

- uses: pheel/path-watcher-action@v1
id: modified
with:
paths: '.github/workflows/examples-publish.yml,.github/actions/deploy-example.sh,examples/bigquery-public-datasets/*,examples/bigquery-public-datasets/**'

- if: steps.modified.outputs.modified
uses: actions/setup-node@v4
with:
node-version: 14.x

- if: steps.modified.outputs.modified
run: .github/actions/deploy-example.sh
env:
EXAMPLE_SLUG: bigquery-public-datasets
EXAMPLE_CUBE_SKIP: 1
NETLIFY_AUTH_TOKEN: ${{ secrets.NETLIFY_AUTH_TOKEN }}

google-charts-moma:

Check warning

Code scanning / CodeQL

Workflow does not contain permissions Medium

Actions job or workflow does not limit the permissions of the GITHUB_TOKEN. Consider setting an explicit permissions block, using the following as a minimal starting point: {contents: read}
runs-on: ubuntu-20.04
runs-on: ubuntu-24.04
timeout-minutes: 30

steps:
- uses: actions/checkout@v4

- uses: pheel/path-watcher-action@v1
id: modified
with:
paths: '.github/workflows/examples-publish.yml,.github/actions/deploy-example.sh,examples/google-charts-moma/*,examples/google-charts-moma/**'

- if: steps.modified.outputs.modified
uses: actions/setup-node@v4
with:
node-version: 14.x

- if: steps.modified.outputs.modified
run: .github/actions/deploy-example.sh
env:
EXAMPLE_SLUG: google-charts-moma
EXAMPLE_CUBE_SKIP: 1
EXAMPLE_FRONTEND_BUILD_SUBDIRECTORY: public/
NETLIFY_AUTH_TOKEN: ${{ secrets.NETLIFY_AUTH_TOKEN }}

deepnote:

Check warning

Code scanning / CodeQL

Workflow does not contain permissions Medium

Actions job or workflow does not limit the permissions of the GITHUB_TOKEN. Consider setting an explicit permissions block, using the following as a minimal starting point: {contents: read}
runs-on: ubuntu-20.04
runs-on: ubuntu-24.04
timeout-minutes: 30

steps:
- uses: actions/checkout@v4

- uses: pheel/path-watcher-action@v1
id: modified
with:
paths: '.github/workflows/examples-publish.yml,.github/actions/deploy-example.sh,examples/deepnote/*,examples/deepnote/**'

- if: steps.modified.outputs.modified
uses: actions/setup-node@v4
with:
node-version: 14.x

- if: steps.modified.outputs.modified
run: .github/actions/deploy-example.sh
env:
EXAMPLE_SLUG: deepnote
EXAMPLE_CUBE_SKIP: 1
EXAMPLE_FRONTEND_BUILD_SUBDIRECTORY: dist/
NETLIFY_AUTH_TOKEN: ${{ secrets.NETLIFY_AUTH_TOKEN }}
EXAMPLE_FRONTEND_SUBDIRECTORY: './'

graphql-api-metrics-dashboard:

Check warning

Code scanning / CodeQL

Workflow does not contain permissions Medium

Actions job or workflow does not limit the permissions of the GITHUB_TOKEN. Consider setting an explicit permissions block, using the following as a minimal starting point: {contents: read}
runs-on: ubuntu-20.04
runs-on: ubuntu-24.04
timeout-minutes: 30

steps:
- uses: actions/checkout@v4

- uses: pheel/path-watcher-action@v1
id: modified
with:
paths: '.github/workflows/examples-publish.yml,.github/actions/deploy-example.sh,examples/graphql-api-metrics-dashboard/*,examples/graphql-api-metrics-dashboard/**'

- if: steps.modified.outputs.modified
uses: actions/setup-node@v4
with:
node-version: 14.x

- if: steps.modified.outputs.modified
run: .github/actions/deploy-example.sh
env:
EXAMPLE_SLUG: graphql-api-metrics-dashboard
EXAMPLE_CUBE_SKIP: 1
NETLIFY_AUTH_TOKEN: ${{ secrets.NETLIFY_AUTH_TOKEN }}
EXAMPLE_FRONTEND_SUBDIRECTORY: './'

multi-tenant-analytics:

Check warning

Code scanning / CodeQL

Workflow does not contain permissions Medium

Actions job or workflow does not limit the permissions of the GITHUB_TOKEN. Consider setting an explicit permissions block, using the following as a minimal starting point: {contents: read}
runs-on: ubuntu-20.04
runs-on: ubuntu-24.04
timeout-minutes: 30

steps:
- uses: actions/checkout@v4

- uses: pheel/path-watcher-action@v1
id: modified
with:
paths: '.github/workflows/examples-publish.yml,.github/actions/deploy-example.sh,examples/multi-tenant-analytics/*,examples/multi-tenant-analytics/**'

- if: steps.modified.outputs.modified
uses: actions/setup-node@v4
with:
node-version: 14.x

- if: steps.modified.outputs.modified
run: .github/actions/deploy-example.sh
env:
EXAMPLE_SLUG: multi-tenant-analytics
EXAMPLE_CUBE_SKIP: 1
NETLIFY_AUTH_TOKEN: ${{ secrets.NETLIFY_AUTH_TOKEN }}

multitenancy-workshop:

Check warning

Code scanning / CodeQL

Workflow does not contain permissions Medium

Actions job or workflow does not limit the permissions of the GITHUB_TOKEN. Consider setting an explicit permissions block, using the following as a minimal starting point: {contents: read}
runs-on: ubuntu-20.04
runs-on: ubuntu-24.04
timeout-minutes: 30

steps:
- uses: actions/checkout@v4

- uses: pheel/path-watcher-action@v1
id: modified
with:
paths: '.github/workflows/examples-publish.yml,.github/actions/deploy-example.sh,examples/multitenancy-workshop/*,examples/multitenancy-workshop/**'

- if: steps.modified.outputs.modified
uses: actions/setup-node@v4
with:
node-version: 14.x

- if: steps.modified.outputs.modified
run: .github/actions/deploy-example.sh
env:
EXAMPLE_SLUG: multitenancy-workshop
EXAMPLE_CUBE_SKIP: 1
NETLIFY_AUTH_TOKEN: ${{ secrets.NETLIFY_AUTH_TOKEN }}

aws-web-analytics:

Check warning

Code scanning / CodeQL

Workflow does not contain permissions Medium

Actions job or workflow does not limit the permissions of the GITHUB_TOKEN. Consider setting an explicit permissions block, using the following as a minimal starting point: {contents: read}
runs-on: ubuntu-20.04
runs-on: ubuntu-24.04
timeout-minutes: 30

steps:
- uses: actions/checkout@v4

- uses: pheel/path-watcher-action@v1
id: modified
with:
paths: '.github/workflows/examples-publish.yml,.github/actions/deploy-example.sh,examples/aws-web-analytics/*,examples/aws-web-analytics/**'

- if: steps.modified.outputs.modified
uses: actions/setup-node@v4
with:
node-version: 14.x

- if: steps.modified.outputs.modified
run: .github/actions/deploy-example.sh
env:
EXAMPLE_SLUG: aws-web-analytics
EXAMPLE_CUBE_SKIP: 1
NETLIFY_AUTH_TOKEN: ${{ secrets.NETLIFY_AUTH_TOKEN }}
EXAMPLE_FRONTEND_SUBDIRECTORY: 'analytics-dashboard'

event-analytics:

Check warning

Code scanning / CodeQL

Workflow does not contain permissions Medium

Actions job or workflow does not limit the permissions of the GITHUB_TOKEN. Consider setting an explicit permissions block, using the following as a minimal starting point: {contents: read}
runs-on: ubuntu-20.04
runs-on: ubuntu-24.04
timeout-minutes: 30

steps:
- uses: actions/checkout@v4

- uses: pheel/path-watcher-action@v1
id: modified
with:
paths: '.github/workflows/examples-publish.yml,.github/actions/deploy-example.sh,examples/event-analytics/*,examples/event-analytics/**'

- if: steps.modified.outputs.modified
uses: actions/setup-node@v4
with:
node-version: 14.x

- if: steps.modified.outputs.modified
run: .github/actions/deploy-example.sh
env:
EXAMPLE_SLUG: event-analytics
EXAMPLE_CUBE_SKIP: 1
NETLIFY_AUTH_TOKEN: ${{ secrets.NETLIFY_AUTH_TOKEN }}
EXAMPLE_FRONTEND_SUBDIRECTORY: 'frontend'

Check warning

Code scanning / CodeQL

Workflow does not contain permissions Medium

Actions job or workflow does not limit the permissions of the GITHUB_TOKEN. Consider setting an explicit permissions block, using the following as a minimal starting point: {contents: read}
2 changes: 1 addition & 1 deletion .github/workflows/issue-labeler.yml
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@ on:
jobs:
main:
name: Process Label Action
runs-on: ubuntu-20.04
runs-on: ubuntu-24.04
steps:
- uses: actions/checkout@v4
- name: Process Label Action
Expand Down
9 changes: 5 additions & 4 deletions .github/workflows/master.yml
Original file line number Diff line number Diff line change
Expand Up @@ -18,80 +18,81 @@
- master
jobs:
latest-tag-sha:
runs-on: ubuntu-20.04
runs-on: ubuntu-24.04
outputs:
sha: ${{ steps.get-tag.outputs.sha }}
steps:
- uses: actions/checkout@v4
with:
fetch-depth: 0
- id: git-log
run: git log HEAD~30..HEAD
- id: get-tag-test
run: echo "$SHA $(git rev-list -n 1 "$(git tag --contains "$SHA")")"
env:
SHA: ${{ github.sha }}
- id: get-tag
run: echo "sha=$(git rev-list -n 1 "$(git tag --contains "$SHA")")" >> "$GITHUB_OUTPUT"
env:
SHA: ${{ github.sha }}
- id: get-tag-out
run: echo "$OUT"
env:
OUT: ${{ steps.get-tag.outputs.sha }}

build_native_linux:
runs-on: ubuntu-20.04
# Please use minimal possible version of ubuntu, because it produces constraint on glibc
runs-on: ubuntu-22.04
timeout-minutes: 60
name: Build Linux Native backend for Dev image
container:
image: cubejs/rust-cross:x86_64-unknown-linux-gnu-15082024-python-3.9

steps:
- name: Checkout
uses: actions/checkout@v4
- name: Install Rust
uses: actions-rust-lang/setup-rust-toolchain@v1
with:
toolchain: nightly-2024-07-15
# override: true # this is by default on
rustflags: ""
components: rustfmt
target: x86_64-unknown-linux-gnu
cache: false
- uses: Swatinem/rust-cache@v2
with:
workspaces: ./rust/cubesql -> target
key: cubesql-x86_64-unknown-linux-gnu
shared-key: cubesql-x86_64-unknown-linux-gnu
- name: Install Node.js 20
uses: actions/setup-node@v4
with:
node-version: 20
- name: Install Yarn
run: npm install -g yarn
- name: Set Yarn version
run: yarn policies set-version v1.22.22
# We don't need to install all yarn deps to build native
- name: Install cargo-cp-artifact
run: npm install -g cargo-cp-artifact@0.1
- name: Build native (with Python)
env:
PYO3_PYTHON: python3.9
CARGO_BUILD_TARGET: x86_64-unknown-linux-gnu
working-directory: ./packages/cubejs-backend-native
run: yarn run native:build-debug-python
- name: Store build artifact for dev image
uses: actions/upload-artifact@v4
with:
name: "native-linux-x64-glibc-3.9.node" # this name is referenced below in docker-image-dev
path: ./packages/cubejs-backend-native/index.node
overwrite: true

docker-image-dev:
name: Release :dev image
needs: [latest-tag-sha, build_native_linux]

Check warning

Code scanning / CodeQL

Workflow does not contain permissions Medium

Actions job or workflow does not limit the permissions of the GITHUB_TOKEN. Consider setting an explicit permissions block, using the following as a minimal starting point: {contents: read}
runs-on: ubuntu-20.04
runs-on: ubuntu-24.04
if: (needs['latest-tag-sha'].outputs.sha != github.sha)
steps:
- name: Check out the repo
Expand Down Expand Up @@ -126,7 +127,7 @@

trigger-test-suites:
name: Trigger test suites run
runs-on: ubuntu-20.04
runs-on: ubuntu-24.04
needs: [docker-image-dev]
timeout-minutes: 60
steps:
Expand Down
Loading
Loading