2020-04-23 09:12:10 +02:00
// Code generated by piper's step-generator. DO NOT EDIT.
package cmd
import (
"fmt"
"os"
"time"
"github.com/SAP/jenkins-library/pkg/config"
"github.com/SAP/jenkins-library/pkg/log"
2021-05-17 12:14:04 +02:00
"github.com/SAP/jenkins-library/pkg/splunk"
2020-04-23 09:12:10 +02:00
"github.com/SAP/jenkins-library/pkg/telemetry"
"github.com/spf13/cobra"
)
type malwareExecuteScanOptions struct {
Host string ` json:"host,omitempty" `
2020-05-06 08:52:26 +02:00
Username string ` json:"username,omitempty" `
2020-04-23 09:12:10 +02:00
Password string ` json:"password,omitempty" `
File string ` json:"file,omitempty" `
2020-06-03 11:08:34 +02:00
Timeout string ` json:"timeout,omitempty" `
2020-04-23 09:12:10 +02:00
}
// MalwareExecuteScanCommand Performs a malware scan
func MalwareExecuteScanCommand ( ) * cobra . Command {
2020-04-28 07:42:02 +02:00
const STEP_NAME = "malwareExecuteScan"
2020-04-23 09:12:10 +02:00
metadata := malwareExecuteScanMetadata ( )
var stepConfig malwareExecuteScanOptions
var startTime time . Time
2021-05-17 12:14:04 +02:00
var logCollector * log . CollectorHook
2020-04-23 09:12:10 +02:00
var createMalwareExecuteScanCmd = & cobra . Command {
2020-04-28 07:42:02 +02:00
Use : STEP_NAME ,
2020-04-23 09:12:10 +02:00
Short : "Performs a malware scan" ,
Long : ` Performs a malware scan ` ,
2020-06-23 18:05:21 +02:00
PreRunE : func ( cmd * cobra . Command , _ [ ] string ) error {
2020-04-23 09:12:10 +02:00
startTime = time . Now ( )
2020-04-28 07:42:02 +02:00
log . SetStepName ( STEP_NAME )
2020-04-23 09:12:10 +02:00
log . SetVerbose ( GeneralConfig . Verbose )
2020-04-28 07:42:02 +02:00
path , _ := os . Getwd ( )
fatalHook := & log . FatalHook { CorrelationID : GeneralConfig . CorrelationID , Path : path }
log . RegisterHook ( fatalHook )
err := PrepareConfig ( cmd , & metadata , STEP_NAME , & stepConfig , config . OpenPiperFile )
2020-04-23 09:12:10 +02:00
if err != nil {
2020-06-24 10:04:05 +02:00
log . SetErrorCategory ( log . ErrorConfiguration )
2020-04-23 09:12:10 +02:00
return err
}
2020-05-06 08:52:26 +02:00
log . RegisterSecret ( stepConfig . Username )
log . RegisterSecret ( stepConfig . Password )
2020-05-05 08:36:24 +02:00
if len ( GeneralConfig . HookConfig . SentryConfig . Dsn ) > 0 {
sentryHook := log . NewSentryHook ( GeneralConfig . HookConfig . SentryConfig . Dsn , GeneralConfig . CorrelationID )
log . RegisterHook ( & sentryHook )
}
2021-05-17 12:14:04 +02:00
if len ( GeneralConfig . HookConfig . SplunkConfig . Dsn ) > 0 {
logCollector = & log . CollectorHook { CorrelationID : GeneralConfig . CorrelationID }
log . RegisterHook ( logCollector )
}
2020-04-23 09:12:10 +02:00
return nil
} ,
2020-06-23 18:05:21 +02:00
Run : func ( _ * cobra . Command , _ [ ] string ) {
2020-04-23 09:12:10 +02:00
telemetryData := telemetry . CustomData { }
telemetryData . ErrorCode = "1"
handler := func ( ) {
2020-10-26 15:20:04 +02:00
config . RemoveVaultSecretFiles ( )
2020-04-23 09:12:10 +02:00
telemetryData . Duration = fmt . Sprintf ( "%v" , time . Since ( startTime ) . Milliseconds ( ) )
2020-09-29 13:49:40 +02:00
telemetryData . ErrorCategory = log . GetErrorCategory ( ) . String ( )
2020-04-23 09:12:10 +02:00
telemetry . Send ( & telemetryData )
2021-05-17 12:14:04 +02:00
if len ( GeneralConfig . HookConfig . SplunkConfig . Dsn ) > 0 {
splunk . Send ( & telemetryData , logCollector )
}
2020-04-23 09:12:10 +02:00
}
log . DeferExitHandler ( handler )
defer handler ( )
2020-04-28 07:42:02 +02:00
telemetry . Initialize ( GeneralConfig . NoTelemetry , STEP_NAME )
2021-05-17 12:14:04 +02:00
if len ( GeneralConfig . HookConfig . SplunkConfig . Dsn ) > 0 {
splunk . Initialize ( GeneralConfig . CorrelationID ,
GeneralConfig . HookConfig . SplunkConfig . Dsn ,
GeneralConfig . HookConfig . SplunkConfig . Token ,
GeneralConfig . HookConfig . SplunkConfig . Index ,
GeneralConfig . HookConfig . SplunkConfig . SendLogs )
}
2020-04-23 09:12:10 +02:00
malwareExecuteScan ( stepConfig , & telemetryData )
telemetryData . ErrorCode = "0"
2020-05-18 21:52:54 +02:00
log . Entry ( ) . Info ( "SUCCESS" )
2020-04-23 09:12:10 +02:00
} ,
}
addMalwareExecuteScanFlags ( createMalwareExecuteScanCmd , & stepConfig )
return createMalwareExecuteScanCmd
}
func addMalwareExecuteScanFlags ( cmd * cobra . Command , stepConfig * malwareExecuteScanOptions ) {
cmd . Flags ( ) . StringVar ( & stepConfig . Host , "host" , os . Getenv ( "PIPER_host" ) , "malware scanning host." )
2020-05-06 08:52:26 +02:00
cmd . Flags ( ) . StringVar ( & stepConfig . Username , "username" , os . Getenv ( "PIPER_username" ) , "User" )
2020-04-23 09:12:10 +02:00
cmd . Flags ( ) . StringVar ( & stepConfig . Password , "password" , os . Getenv ( "PIPER_password" ) , "Password" )
cmd . Flags ( ) . StringVar ( & stepConfig . File , "file" , os . Getenv ( "PIPER_file" ) , "The file which is scanned for malware" )
2020-06-03 11:08:34 +02:00
cmd . Flags ( ) . StringVar ( & stepConfig . Timeout , "timeout" , ` 600 ` , "timeout for http layer in seconds" )
2020-04-23 09:12:10 +02:00
cmd . MarkFlagRequired ( "host" )
2020-05-06 08:52:26 +02:00
cmd . MarkFlagRequired ( "username" )
2020-04-23 09:12:10 +02:00
cmd . MarkFlagRequired ( "password" )
2020-05-06 08:52:26 +02:00
cmd . MarkFlagRequired ( "file" )
2020-04-23 09:12:10 +02:00
}
// retrieve step metadata
func malwareExecuteScanMetadata ( ) config . StepData {
var theMetaData = config . StepData {
Metadata : config . StepMetadata {
2020-11-20 09:13:59 +02:00
Name : "malwareExecuteScan" ,
Aliases : [ ] config . Alias { } ,
Description : "Performs a malware scan" ,
2020-04-23 09:12:10 +02:00
} ,
Spec : config . StepSpec {
Inputs : config . StepInputs {
2021-06-16 08:43:30 +02:00
Secrets : [ ] config . StepSecrets {
{ Name : "malwareScanCredentialsId" , Description : "Jenkins 'Username with password' credentials ID containing the technical user/password credential used to communicate with the malwarescanning service." , Type : "jenkins" } ,
} ,
2020-04-23 09:12:10 +02:00
Parameters : [ ] config . StepParameters {
{
Name : "host" ,
ResourceRef : [ ] config . ResourceReference { } ,
Scope : [ ] string { "PARAMETERS" , "STAGES" , "STEPS" } ,
Type : "string" ,
Mandatory : true ,
Aliases : [ ] config . Alias { } ,
2021-06-16 08:43:30 +02:00
Default : os . Getenv ( "PIPER_host" ) ,
2020-04-23 09:12:10 +02:00
} ,
{
2020-09-16 14:50:09 +02:00
Name : "username" ,
ResourceRef : [ ] config . ResourceReference {
{
Name : "malwareScanCredentialsId" ,
Param : "username" ,
Type : "secret" ,
} ,
} ,
Scope : [ ] string { "PARAMETERS" , "STAGES" , "STEPS" } ,
Type : "string" ,
Mandatory : true ,
Aliases : [ ] config . Alias { } ,
2021-06-16 08:43:30 +02:00
Default : os . Getenv ( "PIPER_username" ) ,
2020-04-23 09:12:10 +02:00
} ,
{
2020-09-16 14:50:09 +02:00
Name : "password" ,
ResourceRef : [ ] config . ResourceReference {
{
Name : "malwareScanCredentialsId" ,
Param : "password" ,
Type : "secret" ,
} ,
} ,
Scope : [ ] string { "PARAMETERS" , "STAGES" , "STEPS" } ,
Type : "string" ,
Mandatory : true ,
Aliases : [ ] config . Alias { } ,
2021-06-16 08:43:30 +02:00
Default : os . Getenv ( "PIPER_password" ) ,
2020-04-23 09:12:10 +02:00
} ,
{
Name : "file" ,
ResourceRef : [ ] config . ResourceReference { } ,
Scope : [ ] string { "PARAMETERS" , "STAGES" , "STEPS" } ,
Type : "string" ,
2020-05-06 08:52:26 +02:00
Mandatory : true ,
2020-04-23 09:12:10 +02:00
Aliases : [ ] config . Alias { } ,
2021-06-16 08:43:30 +02:00
Default : os . Getenv ( "PIPER_file" ) ,
2020-04-23 09:12:10 +02:00
} ,
2020-06-03 11:08:34 +02:00
{
Name : "timeout" ,
ResourceRef : [ ] config . ResourceReference { } ,
Scope : [ ] string { "PARAMETERS" , "STAGES" , "STEPS" } ,
Type : "string" ,
Mandatory : false ,
Aliases : [ ] config . Alias { } ,
2021-06-16 08:43:30 +02:00
Default : ` 600 ` ,
2020-06-03 11:08:34 +02:00
} ,
2020-04-23 09:12:10 +02:00
} ,
} ,
} ,
}
return theMetaData
}