-
Notifications
You must be signed in to change notification settings - Fork 1.4k
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
[WFLY-18475] helloworld-mutual-ssl-secured Quickstart Common Enhancem…
…ents CY2023Q3
- Loading branch information
Prarthona Paul
committed
Oct 19, 2023
1 parent
e67ac03
commit abb9e1a
Showing
9 changed files
with
479 additions
and
41 deletions.
There are no files selected for viewing
214 changes: 214 additions & 0 deletions
214
.github/workflows/quickstart_helloworld-mutual-ssl-secured_ci.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,214 @@ | ||
name: WildFly helloworld-mutual-ssl-secured Quickstart CI | ||
|
||
on: | ||
pull_request: | ||
types: [opened, synchronize, reopened, ready_for_review] | ||
paths: | ||
- 'helloworld-mutual-ssl-secured/**' | ||
- '.github/workflows/quickstart_ci.yml' | ||
|
||
# Only run the latest job | ||
concurrency: | ||
group: '${{ github.workflow }} @ ${{ github.ref || github.run_id }}' | ||
cancel-in-progress: true | ||
|
||
env: | ||
QUICKSTART_PATH: helloworld-mutual-ssl-secured | ||
TEST_PROVISIONED_SERVER: true | ||
TEST_OPENSHIFT: false | ||
|
||
jobs: | ||
Matrix-Setup: | ||
runs-on: ubuntu-latest | ||
outputs: | ||
os: ${{ steps.setup-os-matrix.outputs.os }} | ||
steps: | ||
- id: setup-os-matrix | ||
run: echo 'os=[${{ env.MATRIX_OS }}]' >> $GITHUB_OUTPUT | ||
|
||
Test-build-default-matrix: | ||
name: BUILD DEFAULT - JDK${{ matrix.jdk }} - ${{ matrix.os }} | ||
runs-on: ${{ matrix.os }} | ||
needs: Matrix-Setup | ||
strategy: | ||
fail-fast: false | ||
matrix: | ||
jdk: [11, 17] | ||
os: ${{ fromJSON(needs.Matrix-Setup.outputs.os) }} | ||
steps: | ||
- uses: actions/checkout@v4 | ||
with: | ||
path: quickstarts | ||
- name: Set up JDK ${{ matrix.jdk }} | ||
uses: actions/setup-java@v3 | ||
with: | ||
java-version: ${{ matrix.jdk }} | ||
distribution: 'temurin' | ||
cache: 'maven' | ||
- name: Run before script | ||
env: | ||
FILE: "./quickstarts/.github/workflows/quickstart_${{ env.QUICKSTART_PATH }}_ci_before.sh" | ||
run: | | ||
if test -f $FILE; | ||
then | ||
chmod +x $FILE | ||
bash $FILE | ||
fi | ||
shell: bash | ||
- name: Build ${{ env.QUICKSTART_PATH }} Quickstart for Release | ||
run: | | ||
cd quickstarts | ||
cd ${{ env.QUICKSTART_PATH }} | ||
mvn -U -B -fae clean install -Drelease | ||
shell: bash | ||
- name: Build, run & test ${{ env.QUICKSTART_PATH }} Quickstart with provisioned-server profile | ||
if: ${{ env.TEST_PROVISIONED_SERVER }} | ||
run: | | ||
cd quickstarts | ||
cd ${{ env.QUICKSTART_PATH }} | ||
echo "Building provisioned server..." | ||
mvn -U -B -fae clean package -Pprovisioned-server | ||
echo "Starting provisioned server..." | ||
mvn -U -B -fae wildfly:start -DjbossHome=target/server -Dstartup-timeout=120 | ||
echo "Testing provisioned server..." | ||
mvn -U -B -fae verify -Dserver.host=${{ env.SERVER_PROVISIONING_SERVER_HOST }} -Pintegration-testing | ||
echo "Shutting down provisioned server..." | ||
mvn -U -B -fae wildfly:shutdown | ||
shell: bash | ||
- name: Build, run & test ${{ env.QUICKSTART_PATH }} Quickstart with bootable-jar profile | ||
if: ${{ env.TEST_BOOTABLE_JAR }} | ||
run: | | ||
cd quickstarts | ||
cd ${{ env.QUICKSTART_PATH }} | ||
echo "Building bootable jar..." | ||
mvn -U -B -fae clean package -Pbootable-jar | ||
echo "Starting bootable jar..." | ||
mvn -U -B -fae wildfly-jar:start -Djar-file-name=target/${{ env.QUICKSTART_PATH }}-bootable.jar -Dstartup-timeout=120 | ||
echo "Testing bootable jar..." | ||
mvn -U -B -fae verify -Dserver.host=${{ env.SERVER_PROVISIONING_SERVER_HOST }} -Pintegration-testing | ||
echo "Shutting down bootable jar..." | ||
mvn -U -B -fae wildfly-jar:shutdown | ||
shell: bash | ||
- name: Build ${{ env.QUICKSTART_PATH }} Quickstart with openshift profile | ||
if: ${{ env.TEST_OPENSHIFT }} | ||
run: | | ||
cd quickstarts | ||
cd ${{ env.QUICKSTART_PATH }} | ||
mvn -U -B -fae clean package -Popenshift | ||
shell: bash | ||
- name: Run after script | ||
env: | ||
FILE: "./quickstarts/.github/workflows/quickstart_${{ env.QUICKSTART_PATH }}_ci_after.sh" | ||
run: | | ||
if test -f $FILE; | ||
then | ||
chmod +x $FILE | ||
bash $FILE | ||
fi | ||
shell: bash | ||
- uses: actions/upload-artifact@v3 | ||
if: failure() | ||
with: | ||
name: surefire-reports-JDK${{ matrix.jdk }}-${{ matrix.os }} | ||
path: 'quickstarts/${{ env.QUICKSTART_PATH }}/**/surefire-reports/*.txt' | ||
|
||
# Use the shared-wildfly-build workflow to have a consistent WildFly build. Note the branch names MUST match what | ||
# is used in WildFly. | ||
WildFly-build: | ||
uses: wildfly/wildfly/.github/workflows/shared-wildfly-build.yml@main | ||
with: | ||
wildfly-branch: ${{ github.base_ref }} | ||
wildfly-repo: "wildfly/wildfly" | ||
|
||
Test-build-with-deps-matrix: | ||
name: BUILD WITH DEPS - JDK${{ matrix.jdk }} - ${{ matrix.os }} | ||
runs-on: ${{ matrix.os }} | ||
needs: [Matrix-Setup, WildFly-build] | ||
strategy: | ||
fail-fast: false | ||
matrix: | ||
jdk: [11, 17] | ||
os: ${{ fromJSON(needs.Matrix-Setup.outputs.os) }} | ||
steps: | ||
- uses: actions/checkout@v4 | ||
with: | ||
path: quickstarts | ||
- uses: actions/download-artifact@v3 | ||
with: | ||
name: wildfly-maven-repository | ||
path: . | ||
- name: Extract Maven Repo | ||
shell: bash | ||
run: tar -xzf wildfly-maven-repository.tar.gz -C ~ | ||
- name: Set up JDK ${{ matrix.jdk }} | ||
uses: actions/setup-java@v3 | ||
with: | ||
java-version: ${{ matrix.jdk }} | ||
distribution: 'temurin' | ||
cache: 'maven' | ||
- name: Run before script | ||
env: | ||
FILE: "./quickstarts/.github/workflows/quickstart_${{ env.QUICKSTART_PATH }}_ci_before.sh" | ||
run: | | ||
if test -f $FILE; | ||
then | ||
chmod +x $FILE | ||
bash $FILE | ||
fi | ||
shell: bash | ||
- name: Build Quickstart for Release with built Server version | ||
run: | | ||
cd quickstarts | ||
cd ${{ env.QUICKSTART_PATH }} | ||
mvn -U -B -fae clean package -Drelease -Dversion.server=${{ needs.wildfly-build.outputs.wildfly-version }} | ||
shell: bash | ||
- name: Build, run & test ${{ env.QUICKSTART_PATH }} Quickstart with provisioned-server profile, and built Server version | ||
if: ${{ env.TEST_PROVISIONED_SERVER }} | ||
run: | | ||
cd quickstarts | ||
cd ${{ env.QUICKSTART_PATH }} | ||
echo "Building provisioned server..." | ||
mvn -U -B -fae clean package -Pprovisioned-server -Dversion.server=${{ needs.wildfly-build.outputs.wildfly-version }} | ||
echo "Starting provisioned server..." | ||
mvn -U -B -fae wildfly:start -DjbossHome=target/server -Dstartup-timeout=120 | ||
echo "Testing provisioned server..." | ||
mvn -U -B -fae verify -Dserver.host=${{ env.SERVER_PROVISIONING_SERVER_HOST }} -Pintegration-testing | ||
echo "Shutting down provisioned server..." | ||
mvn -U -B -fae wildfly:shutdown | ||
shell: bash | ||
- name: Build, run & test ${{ env.QUICKSTART_PATH }} Quickstart with bootable-jar profile, and built Server version | ||
if: ${{ env.TEST_BOOTABLE_JAR }} | ||
run: | | ||
cd quickstarts | ||
cd ${{ env.QUICKSTART_PATH }} | ||
echo "Building bootable jar..." | ||
mvn -U -B -fae clean package -Pbootable-jar -Dversion.server=${{ needs.wildfly-build.outputs.wildfly-version }} | ||
echo "Starting bootable jar..." | ||
mvn -U -B -fae wildfly-jar:start -Djar-file-name=target/${{ env.QUICKSTART_PATH }}-bootable.jar -Dstartup-timeout=120 | ||
echo "Testing bootable jar..." | ||
mvn -U -B -fae verify -Dserver.host=${{ env.SERVER_PROVISIONING_SERVER_HOST }} -Pintegration-testing | ||
echo "Shutting down bootable jar..." | ||
mvn -U -B -fae wildfly-jar:shutdown | ||
shell: bash | ||
- name: Build ${{ env.QUICKSTART_PATH }} Quickstart with openshift profile, and built Server version | ||
if: ${{ env.TEST_OPENSHIFT }} | ||
run: | | ||
cd quickstarts | ||
cd ${{ env.QUICKSTART_PATH }} | ||
mvn -U -B -fae clean package -Popenshift -Dversion.server=${{ needs.wildfly-build.outputs.wildfly-version }} | ||
shell: bash | ||
- name: Run after script | ||
env: | ||
FILE: "./quickstarts/.github/workflows/quickstart_${{ env.QUICKSTART_PATH }}_ci_after.sh" | ||
run: | | ||
if test -f $FILE; | ||
then | ||
chmod +x $FILE | ||
bash $FILE | ||
fi | ||
shell: bash | ||
- uses: actions/upload-artifact@v3 | ||
if: failure() | ||
with: | ||
name: surefire-reports-JDK${{ matrix.jdk }}-${{ matrix.os }} | ||
path: 'quickstarts/**/surefire-reports/*.txt' |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,39 @@ | ||
#!/bin/sh | ||
|
||
# Generate a self-signed keystore with the specified DN fields | ||
expect <<EOF | ||
set timeout 10 | ||
spawn keytool -genkey -keystore client.keystore -storepass secret -validity 365 -keyalg RSA -keysize 2048 -storetype pkcs12 | ||
expect "What is your first and last name?" | ||
send "quickstartUser\r" | ||
expect "What is the name of your organizational unit?" | ||
send "Sales\r" | ||
expect "What is the name of your organization?" | ||
send "My Organization\r" | ||
expect "What is the name of your City or Locality?" | ||
send "Sao Paulo\r" | ||
expect "What is the name of your State or Province?" | ||
send "Sao Paulo\r" | ||
expect "What is the two-letter country code for this unit?" | ||
send "BR\r" | ||
expect "Is CN=quickstartUser, OU=Sales, O=My Organization, L=Sao Paulo, ST=Sao Paulo, C=BR correct?" | ||
send "yes\r" | ||
expect eof | ||
EOF | ||
|
||
# Export the certificate | ||
keytool -exportcert -keystore client.keystore -storetype pkcs12 -storepass secret -keypass secret -file client.crt | ||
|
||
# Import the certificate into a truststore | ||
expect <<EOF | ||
set timeout 10 | ||
spawn keytool -import -file client.crt -alias quickstartUser -keystore client.truststore -storepass secret | ||
expect "Trust this certificate? [no]: " | ||
send "yes\r" | ||
expect eof | ||
EOF | ||
|
||
# Create a new PKCS12 keystore with the same certificate | ||
keytool -importkeystore -srckeystore client.keystore -srcstorepass secret -destkeystore clientCert.p12 -srcstoretype PKCS12 -deststoretype PKCS12 -deststorepass secret |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,19 @@ | ||
#configure a key-store in the Elytron subsystem. The path to the keystore file doesn’t actually have to exist yet. | ||
/subsystem=elytron/key-store=mutualKS:add(path=clientCert.P12, relative-to=jboss.server.config.dir, credential-reference={clear-text=secret}, type=PKCS12) | ||
|
||
#generate a new key pair which will be used later to extract the certificate. This is an RSA key of size 1024. CN must be quickstartUser for the key | ||
/subsystem=elytron/key-store=mutualKS:generate-key-pair(alias=example, algorithm=RSA, key-size=2048, validity=365, credential-reference={clear-text=secret}, distinguished-name="CN=quickstartUser") | ||
|
||
#Export the certificate to a file | ||
/subsystem=elytron/key-store=mutualKS:export-certificate(alias=example, path=clientCert.crt, relative-to=jboss.server.config.dir, pem=true) | ||
|
||
#Create a truststore in the elytron subsystem. | ||
/subsystem=elytron/key-store=mutualTS:add(path=client.keystore, relative-to=jboss.server.config.dir, credential-reference={clear-text=secret}, type=PKCS12) | ||
|
||
# Import a certificate into a truststore | ||
/subsystem=elytron/key-store=mutualTS:import-certificate(alias=example, path=clientCert.crt, relative-to=jboss.server.config.dir, credential-reference={clear-text=secret}, trust-cacerts=true, validate=false) | ||
|
||
#store the keystore and truststore into keystore files | ||
/subsystem=elytron/key-store=mutualTS:store() | ||
/subsystem=elytron/key-store=mutualKS:store() | ||
|
Oops, something went wrong.