2024-04-22 13:12:38 +02:00
// Code generated by piper's step-generator. DO NOT EDIT.
package cmd
import (
"fmt"
"os"
"path/filepath"
"time"
"github.com/SAP/jenkins-library/pkg/config"
2024-10-11 14:55:39 +05:00
"github.com/SAP/jenkins-library/pkg/gcp"
2024-04-22 13:12:38 +02:00
"github.com/SAP/jenkins-library/pkg/log"
"github.com/SAP/jenkins-library/pkg/piperenv"
"github.com/SAP/jenkins-library/pkg/splunk"
"github.com/SAP/jenkins-library/pkg/telemetry"
"github.com/SAP/jenkins-library/pkg/validation"
"github.com/spf13/cobra"
)
type abapAddonAssemblyKitCheckOptions struct {
AbapAddonAssemblyKitCertificateFile string ` json:"abapAddonAssemblyKitCertificateFile,omitempty" `
AbapAddonAssemblyKitCertificatePass string ` json:"abapAddonAssemblyKitCertificatePass,omitempty" `
AbapAddonAssemblyKitEndpoint string ` json:"abapAddonAssemblyKitEndpoint,omitempty" `
Username string ` json:"username,omitempty" `
Password string ` json:"password,omitempty" `
AddonDescriptorFileName string ` json:"addonDescriptorFileName,omitempty" `
AddonDescriptor string ` json:"addonDescriptor,omitempty" `
2024-08-23 16:37:58 +02:00
AbapAddonAssemblyKitOriginHash string ` json:"abapAddonAssemblyKitOriginHash,omitempty" `
2024-04-22 13:12:38 +02:00
}
type abapAddonAssemblyKitCheckCommonPipelineEnvironment struct {
abap struct {
addonDescriptor string
}
}
func ( p * abapAddonAssemblyKitCheckCommonPipelineEnvironment ) persist ( path , resourceName string ) {
content := [ ] struct {
category string
name string
value interface { }
} {
{ category : "abap" , name : "addonDescriptor" , value : p . abap . addonDescriptor } ,
}
errCount := 0
for _ , param := range content {
err := piperenv . SetResourceParameter ( path , resourceName , filepath . Join ( param . category , param . name ) , param . value )
if err != nil {
log . Entry ( ) . WithError ( err ) . Error ( "Error persisting piper environment." )
errCount ++
}
}
if errCount > 0 {
log . Entry ( ) . Error ( "failed to persist Piper environment" )
}
}
// AbapAddonAssemblyKitCheckCommand This step calls AAKaaS to check the validity of the Addon Product Modelling.
func AbapAddonAssemblyKitCheckCommand ( ) * cobra . Command {
const STEP_NAME = "abapAddonAssemblyKitCheck"
metadata := abapAddonAssemblyKitCheckMetadata ( )
var stepConfig abapAddonAssemblyKitCheckOptions
var startTime time . Time
var commonPipelineEnvironment abapAddonAssemblyKitCheckCommonPipelineEnvironment
var logCollector * log . CollectorHook
var splunkClient * splunk . Splunk
telemetryClient := & telemetry . Telemetry { }
var createAbapAddonAssemblyKitCheckCmd = & cobra . Command {
Use : STEP_NAME ,
Short : "This step calls AAKaaS to check the validity of the Addon Product Modelling." ,
2024-07-22 14:32:26 +02:00
Long : ` [ The Addon Product Modelling ] ( https : //www.project-piper.io/scenarios/abapEnvironmentAddons/#add-on-descriptor-file) is read from the <b>addonDescriptorFileName</b> (e.g. addon.yml).
A connection to AAKaaS ( Addon Assembly Kit as a Service ) is established and the Addon Product Modelling is transfered for detailed [ checks ] ( https : //www.project-piper.io/scenarios/abapEnvironmentAddons/#versioning-rules).
The semantic versions are resolved and stored into the piper commonPipelineEnviroment for usage in subsequent pipeline steps .
2024-04-22 13:12:38 +02:00
< br / >
For logon to AAKaaS you can either provide a credential with basic authorization ( username and password ) or two secret text credentials containing the technical s - users certificate ( see note [ 2805811 ] ( https : //me.sap.com/notes/2805811) for download) as base64 encoded string and the password to decrypt the file
< br / >
For Terminology refer to the [ Scenario Description ] ( https : //www.project-piper.io/scenarios/abapEnvironmentAddons/).`,
PreRunE : func ( cmd * cobra . Command , _ [ ] string ) error {
startTime = time . Now ( )
log . SetStepName ( STEP_NAME )
log . SetVerbose ( GeneralConfig . Verbose )
GeneralConfig . GitHubAccessTokens = ResolveAccessTokens ( GeneralConfig . GitHubTokens )
2024-11-04 14:20:37 +01:00
path , err := os . Getwd ( )
if err != nil {
return err
}
2024-04-22 13:12:38 +02:00
fatalHook := & log . FatalHook { CorrelationID : GeneralConfig . CorrelationID , Path : path }
log . RegisterHook ( fatalHook )
2024-11-04 14:20:37 +01:00
err = PrepareConfig ( cmd , & metadata , STEP_NAME , & stepConfig , config . OpenPiperFile )
2024-04-22 13:12:38 +02:00
if err != nil {
log . SetErrorCategory ( log . ErrorConfiguration )
return err
}
log . RegisterSecret ( stepConfig . AbapAddonAssemblyKitCertificateFile )
log . RegisterSecret ( stepConfig . AbapAddonAssemblyKitCertificatePass )
log . RegisterSecret ( stepConfig . Username )
log . RegisterSecret ( stepConfig . Password )
2024-08-23 16:37:58 +02:00
log . RegisterSecret ( stepConfig . AbapAddonAssemblyKitOriginHash )
2024-04-22 13:12:38 +02:00
if len ( GeneralConfig . HookConfig . SentryConfig . Dsn ) > 0 {
sentryHook := log . NewSentryHook ( GeneralConfig . HookConfig . SentryConfig . Dsn , GeneralConfig . CorrelationID )
log . RegisterHook ( & sentryHook )
}
if len ( GeneralConfig . HookConfig . SplunkConfig . Dsn ) > 0 || len ( GeneralConfig . HookConfig . SplunkConfig . ProdCriblEndpoint ) > 0 {
splunkClient = & splunk . Splunk { }
logCollector = & log . CollectorHook { CorrelationID : GeneralConfig . CorrelationID }
log . RegisterHook ( logCollector )
}
if err = log . RegisterANSHookIfConfigured ( GeneralConfig . CorrelationID ) ; err != nil {
log . Entry ( ) . WithError ( err ) . Warn ( "failed to set up SAP Alert Notification Service log hook" )
}
validation , err := validation . New ( validation . WithJSONNamesForStructFields ( ) , validation . WithPredefinedErrorMessages ( ) )
if err != nil {
return err
}
if err = validation . ValidateStruct ( stepConfig ) ; err != nil {
log . SetErrorCategory ( log . ErrorConfiguration )
return err
}
return nil
} ,
Run : func ( _ * cobra . Command , _ [ ] string ) {
2024-10-11 14:55:39 +05:00
vaultClient := config . GlobalVaultClient ( )
if vaultClient != nil {
defer vaultClient . MustRevokeToken ( )
}
2024-04-22 13:12:38 +02:00
stepTelemetryData := telemetry . CustomData { }
stepTelemetryData . ErrorCode = "1"
handler := func ( ) {
commonPipelineEnvironment . persist ( GeneralConfig . EnvRootPath , "commonPipelineEnvironment" )
config . RemoveVaultSecretFiles ( )
stepTelemetryData . Duration = fmt . Sprintf ( "%v" , time . Since ( startTime ) . Milliseconds ( ) )
stepTelemetryData . ErrorCategory = log . GetErrorCategory ( ) . String ( )
stepTelemetryData . PiperCommitHash = GitCommit
telemetryClient . SetData ( & stepTelemetryData )
telemetryClient . Send ( )
if len ( GeneralConfig . HookConfig . SplunkConfig . Dsn ) > 0 {
splunkClient . Initialize ( GeneralConfig . CorrelationID ,
GeneralConfig . HookConfig . SplunkConfig . Dsn ,
GeneralConfig . HookConfig . SplunkConfig . Token ,
GeneralConfig . HookConfig . SplunkConfig . Index ,
GeneralConfig . HookConfig . SplunkConfig . SendLogs )
splunkClient . Send ( telemetryClient . GetData ( ) , logCollector )
}
if len ( GeneralConfig . HookConfig . SplunkConfig . ProdCriblEndpoint ) > 0 {
splunkClient . Initialize ( GeneralConfig . CorrelationID ,
GeneralConfig . HookConfig . SplunkConfig . ProdCriblEndpoint ,
GeneralConfig . HookConfig . SplunkConfig . ProdCriblToken ,
GeneralConfig . HookConfig . SplunkConfig . ProdCriblIndex ,
GeneralConfig . HookConfig . SplunkConfig . SendLogs )
splunkClient . Send ( telemetryClient . GetData ( ) , logCollector )
}
2024-10-11 14:55:39 +05:00
if GeneralConfig . HookConfig . GCPPubSubConfig . Enabled {
err := gcp . NewGcpPubsubClient (
vaultClient ,
GeneralConfig . HookConfig . GCPPubSubConfig . ProjectNumber ,
GeneralConfig . HookConfig . GCPPubSubConfig . IdentityPool ,
GeneralConfig . HookConfig . GCPPubSubConfig . IdentityProvider ,
GeneralConfig . CorrelationID ,
GeneralConfig . HookConfig . OIDCConfig . RoleID ,
) . Publish ( GeneralConfig . HookConfig . GCPPubSubConfig . Topic , telemetryClient . GetDataBytes ( ) )
if err != nil {
log . Entry ( ) . WithError ( err ) . Warn ( "event publish failed" )
}
}
2024-04-22 13:12:38 +02:00
}
log . DeferExitHandler ( handler )
defer handler ( )
telemetryClient . Initialize ( GeneralConfig . NoTelemetry , STEP_NAME , GeneralConfig . HookConfig . PendoConfig . Token )
abapAddonAssemblyKitCheck ( stepConfig , & stepTelemetryData , & commonPipelineEnvironment )
stepTelemetryData . ErrorCode = "0"
log . Entry ( ) . Info ( "SUCCESS" )
} ,
}
addAbapAddonAssemblyKitCheckFlags ( createAbapAddonAssemblyKitCheckCmd , & stepConfig )
return createAbapAddonAssemblyKitCheckCmd
}
func addAbapAddonAssemblyKitCheckFlags ( cmd * cobra . Command , stepConfig * abapAddonAssemblyKitCheckOptions ) {
cmd . Flags ( ) . StringVar ( & stepConfig . AbapAddonAssemblyKitCertificateFile , "abapAddonAssemblyKitCertificateFile" , os . Getenv ( "PIPER_abapAddonAssemblyKitCertificateFile" ) , "base64 encoded certificate pfx file (PKCS12 format) see note [2805811](https://me.sap.com/notes/2805811)" )
cmd . Flags ( ) . StringVar ( & stepConfig . AbapAddonAssemblyKitCertificatePass , "abapAddonAssemblyKitCertificatePass" , os . Getenv ( "PIPER_abapAddonAssemblyKitCertificatePass" ) , "password to decrypt the certificate file" )
cmd . Flags ( ) . StringVar ( & stepConfig . AbapAddonAssemblyKitEndpoint , "abapAddonAssemblyKitEndpoint" , ` https://apps.support.sap.com ` , "Base URL to the Addon Assembly Kit as a Service (AAKaaS) system" )
cmd . Flags ( ) . StringVar ( & stepConfig . Username , "username" , os . Getenv ( "PIPER_username" ) , "User for the Addon Assembly Kit as a Service (AAKaaS) system" )
cmd . Flags ( ) . StringVar ( & stepConfig . Password , "password" , os . Getenv ( "PIPER_password" ) , "Password for the Addon Assembly Kit as a Service (AAKaaS) system" )
cmd . Flags ( ) . StringVar ( & stepConfig . AddonDescriptorFileName , "addonDescriptorFileName" , ` addon.yml ` , "File name of the YAML file which describes the Product Version and corresponding Software Component Versions" )
cmd . Flags ( ) . StringVar ( & stepConfig . AddonDescriptor , "addonDescriptor" , os . Getenv ( "PIPER_addonDescriptor" ) , "Structure in the commonPipelineEnvironment containing information about the Product Version and corresponding Software Component Versions" )
2024-08-23 16:37:58 +02:00
cmd . Flags ( ) . StringVar ( & stepConfig . AbapAddonAssemblyKitOriginHash , "abapAddonAssemblyKitOriginHash" , os . Getenv ( "PIPER_abapAddonAssemblyKitOriginHash" ) , "Origin Hash for restricted AAKaaS scenarios" )
2024-04-22 13:12:38 +02:00
cmd . MarkFlagRequired ( "abapAddonAssemblyKitEndpoint" )
cmd . MarkFlagRequired ( "addonDescriptorFileName" )
}
// retrieve step metadata
func abapAddonAssemblyKitCheckMetadata ( ) config . StepData {
var theMetaData = config . StepData {
Metadata : config . StepMetadata {
Name : "abapAddonAssemblyKitCheck" ,
Aliases : [ ] config . Alias { } ,
Description : "This step calls AAKaaS to check the validity of the Addon Product Modelling." ,
} ,
Spec : config . StepSpec {
Inputs : config . StepInputs {
Secrets : [ ] config . StepSecrets {
{ Name : "abapAddonAssemblyKitCredentialsId" , Description : "CredentialsId stored in Jenkins for the Addon Assembly Kit as a Service (AAKaaS) system" , Type : "jenkins" } ,
{ Name : "abapAddonAssemblyKitCertificateFileCredentialsId" , Description : "Jenkins secret text credential ID containing the base64 encoded certificate pfx file (PKCS12 format) see note [2805811](https://me.sap.com/notes/2805811)" , Type : "jenkins" } ,
{ Name : "abapAddonAssemblyKitCertificatePassCredentialsId" , Description : "Jenkins secret text credential ID containing the password to decrypt the certificate file stored in abapAddonAssemblyKitCertificateFileCredentialsId" , Type : "jenkins" } ,
} ,
Parameters : [ ] config . StepParameters {
{
Name : "abapAddonAssemblyKitCertificateFile" ,
ResourceRef : [ ] config . ResourceReference {
{
Name : "abapAddonAssemblyKitCertificateFileCredentialsId" ,
Param : "abapAddonAssemblyKitCertificateFile" ,
Type : "secret" ,
} ,
} ,
Scope : [ ] string { "PARAMETERS" } ,
Type : "string" ,
Mandatory : false ,
Aliases : [ ] config . Alias { } ,
Default : os . Getenv ( "PIPER_abapAddonAssemblyKitCertificateFile" ) ,
} ,
{
Name : "abapAddonAssemblyKitCertificatePass" ,
ResourceRef : [ ] config . ResourceReference {
{
Name : "abapAddonAssemblyKitCertificatePassCredentialsId" ,
Param : "abapAddonAssemblyKitCertificatePass" ,
Type : "secret" ,
} ,
} ,
Scope : [ ] string { "PARAMETERS" } ,
Type : "string" ,
Mandatory : false ,
Aliases : [ ] config . Alias { } ,
Default : os . Getenv ( "PIPER_abapAddonAssemblyKitCertificatePass" ) ,
} ,
{
Name : "abapAddonAssemblyKitEndpoint" ,
ResourceRef : [ ] config . ResourceReference { } ,
Scope : [ ] string { "PARAMETERS" , "STAGES" , "STEPS" , "GENERAL" } ,
Type : "string" ,
Mandatory : true ,
Aliases : [ ] config . Alias { } ,
Default : ` https://apps.support.sap.com ` ,
} ,
{
Name : "username" ,
ResourceRef : [ ] config . ResourceReference { } ,
Scope : [ ] string { "PARAMETERS" , "STAGES" , "STEPS" } ,
Type : "string" ,
Mandatory : false ,
Aliases : [ ] config . Alias { } ,
Default : os . Getenv ( "PIPER_username" ) ,
} ,
{
Name : "password" ,
ResourceRef : [ ] config . ResourceReference { } ,
Scope : [ ] string { "PARAMETERS" } ,
Type : "string" ,
Mandatory : false ,
Aliases : [ ] config . Alias { } ,
Default : os . Getenv ( "PIPER_password" ) ,
} ,
{
Name : "addonDescriptorFileName" ,
ResourceRef : [ ] config . ResourceReference { } ,
Scope : [ ] string { "PARAMETERS" , "STAGES" , "STEPS" , "GENERAL" } ,
Type : "string" ,
Mandatory : true ,
Aliases : [ ] config . Alias { } ,
Default : ` addon.yml ` ,
} ,
{
Name : "addonDescriptor" ,
ResourceRef : [ ] config . ResourceReference {
{
Name : "commonPipelineEnvironment" ,
Param : "abap/addonDescriptor" ,
} ,
} ,
Scope : [ ] string { "PARAMETERS" , "STAGES" , "STEPS" } ,
Type : "string" ,
Mandatory : false ,
Aliases : [ ] config . Alias { } ,
Default : os . Getenv ( "PIPER_addonDescriptor" ) ,
} ,
2024-08-23 16:37:58 +02:00
{
Name : "abapAddonAssemblyKitOriginHash" ,
ResourceRef : [ ] config . ResourceReference { } ,
Scope : [ ] string { "PARAMETERS" } ,
Type : "string" ,
Mandatory : false ,
Aliases : [ ] config . Alias { } ,
Default : os . Getenv ( "PIPER_abapAddonAssemblyKitOriginHash" ) ,
} ,
2024-04-22 13:12:38 +02:00
} ,
} ,
Outputs : config . StepOutputs {
Resources : [ ] config . StepResources {
{
Name : "commonPipelineEnvironment" ,
Type : "piperEnvironment" ,
Parameters : [ ] map [ string ] interface { } {
{ "name" : "abap/addonDescriptor" } ,
} ,
} ,
} ,
} ,
} ,
}
return theMetaData
}