1
0
mirror of https://github.com/SAP/jenkins-library.git synced 2025-01-30 05:59:39 +02:00

Update Cloud SDK stash settings and stage defaults (#2105)

This change updates and cleans up the Cloud SDK specific stash settings
and stage defaults.
This commit is contained in:
Kevin Hudemann 2020-10-02 09:05:42 +02:00 committed by GitHub
parent 9354697525
commit 08a5189f39
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
5 changed files with 1 additions and 158 deletions

View File

@ -1,7 +1,6 @@
# Mapping of Go step names to their YAML metadata resource file # Mapping of Go step names to their YAML metadata resource file
stepMetadata: stepMetadata:
artifactPrepareVersion: versioning.yaml artifactPrepareVersion: versioning.yaml
fortifyExecuteScan: fortify.yaml
mavenExecute: mavenExecute.yaml mavenExecute: mavenExecute.yaml
mavenExecuteStaticCodeChecks: mavenStaticCodeChecks.yaml mavenExecuteStaticCodeChecks: mavenStaticCodeChecks.yaml
mtaBuild: mtaBuild.yaml mtaBuild: mtaBuild.yaml
@ -9,8 +8,6 @@ stepMetadata:
npmExecuteScripts: npmExecuteScripts.yaml npmExecuteScripts: npmExecuteScripts.yaml
npmExecuteLint: npmExecuteLint.yaml npmExecuteLint: npmExecuteLint.yaml
sonarExecuteScan: sonar.yaml sonarExecuteScan: sonar.yaml
detectExecuteScan: detect.yaml
whitesourceExecuteScan: whitesource.yaml
# Mapping of stages to the steps (and by extension Docker images) they use # Mapping of stages to the steps (and by extension Docker images) they use
containerMaps: containerMaps:
@ -35,10 +32,6 @@ containerMaps:
- npmExecuteScripts - npmExecuteScripts
additionalUnitTests: additionalUnitTests:
- npmExecuteScripts - npmExecuteScripts
fortifyScan:
- fortifyExecuteScan
npmAudit:
- executeNpm
endToEndTests: endToEndTests:
- mavenExecute - mavenExecute
- npmExecuteScripts - npmExecuteScripts
@ -50,17 +43,8 @@ containerMaps:
- checkJMeter - checkJMeter
- cloudFoundryDeploy - cloudFoundryDeploy
- neoDeploy - neoDeploy
s4SdkQualityChecks:
- mavenExecute
artifactDeployment: artifactDeployment:
- nexusUpload - nexusUpload
whitesourceScan:
- mavenExecute
- executeNpm
security:
- fortifyExecuteScan
- detectExecuteScan
- whitesourceExecuteScan
compliance: compliance:
- sonarExecuteScan - sonarExecuteScan
productionDeployment: productionDeployment:

View File

@ -50,38 +50,10 @@ frontendIntegrationTests:
merge: true merge: true
includes: "s4hana_pipeline/reports/**, **/target/site/**/jacoco.xml" includes: "s4hana_pipeline/reports/**, **/target/site/**/jacoco.xml"
checkmarxScan:
unstash: ["SOURCE", "TARGET"]
stashes: []
whitesourceScan:
unstash: ["SOURCE", "M2", "NODE_MODULES", "PACKAGE_LOCK"]
stashes: []
security:
unstash: ["SOURCE", "M2", "TARGET", "NODE_MODULES", "PACKAGE_LOCK"]
stashes: []
additionalTools:
unstash: ["SOURCE", "M2", "NODE_MODULES", "GENERATED_CAP_FILES"]
stashes: []
compliance: compliance:
unstash: ['SOURCE', 'M2', 'REPORTS', 'TARGET', 'EXEC_FILES'] unstash: ['SOURCE', 'M2', 'REPORTS', 'TARGET', 'EXEC_FILES']
stashes: [] stashes: []
fortifyScan:
unstash: ["SOURCE", "M2", "TARGET"]
stashes: []
detect:
unstash: ["SOURCE", "M2", "TARGET"]
stashes: []
npmAudit:
unstash: ["SOURCE", "PACKAGE_LOCK"]
stashes: []
additionalUnitTests: additionalUnitTests:
unstash: ["SOURCE", "NODE_MODULES", "GENERATED_CAP_FILES"] unstash: ["SOURCE", "NODE_MODULES", "GENERATED_CAP_FILES"]
stashes: stashes:
@ -100,12 +72,6 @@ performanceTests:
merge: true merge: true
includes: "s4hana_pipeline/reports/**" includes: "s4hana_pipeline/reports/**"
s4SdkQualityChecks:
unstash: ["SOURCE", "M2", "TARGET", "REPORTS", "EXEC_FILES"]
stashes:
- name: "REPORTS"
includes: "s4hana_pipeline/reports/**"
artifactDeployment: artifactDeployment:
unstash: ["SOURCE", "M2", "TARGET", "NODE_MODULES", "GENERATED_CAP_FILES"] unstash: ["SOURCE", "M2", "TARGET", "NODE_MODULES", "GENERATED_CAP_FILES"]
stashes: [] stashes: []

View File

@ -51,29 +51,6 @@ compliance:
unstash: ['SOURCE', 'NODE_MODULES', 'DIST'] unstash: ['SOURCE', 'NODE_MODULES', 'DIST']
stashes: [] stashes: []
npmAudit:
unstash: ["SOURCE", "PACKAGE_LOCK"]
stashes: []
s4SdkQualityChecks:
unstash: ["SOURCE", "DIST", "REPORTS"]
whitesourceScan:
unstash: ["SOURCE", "NODE_MODULES", "PACKAGE_LOCK"]
stashes: []
checkmarxScan:
unstash: ["SOURCE"]
stashes: []
detect:
unstash: ["SOURCE"]
stashes: []
security:
unstash: ["SOURCE", "NODE_MODULES", "PACKAGE_LOCK"]
stashes: []
endToEndTests: endToEndTests:
unstash: ["SOURCE", "DEPLOYMENTARTIFACT", "NODE_MODULES", "GENERATED_CAP_FILES"] unstash: ["SOURCE", "DEPLOYMENTARTIFACT", "NODE_MODULES", "GENERATED_CAP_FILES"]
stashes: [] stashes: []

View File

@ -50,38 +50,10 @@ frontendIntegrationTests:
merge: true merge: true
includes: "s4hana_pipeline/reports/**, **/target/site/**/jacoco.xml" includes: "s4hana_pipeline/reports/**, **/target/site/**/jacoco.xml"
checkmarxScan:
unstash: ["SOURCE", "TARGET"]
stashes: []
whitesourceScan:
unstash: ["SOURCE", "M2", "NODE_MODULES", "PACKAGE_LOCK"]
stashes: []
additionalTools:
unstash: ["SOURCE", "M2", "NODE_MODULES"]
stashes: []
compliance: compliance:
unstash: ['SOURCE', 'M2', 'NODE_MODULES', 'REPORTS', 'TARGET'] unstash: ['SOURCE', 'M2', 'NODE_MODULES', 'REPORTS', 'TARGET']
stashes: [] stashes: []
fortifyScan:
unstash: ["SOURCE", "M2", "TARGET"]
stashes: []
detect:
unstash: ["SOURCE", "M2", "TARGET"]
stashes: []
security:
unstash: ["SOURCE", "M2", "TARGET", "NODE_MODULES", "PACKAGE_LOCK"]
stashes: []
npmAudit:
unstash: ["SOURCE", "PACKAGE_LOCK"]
stashes: []
additionalUnitTests: additionalUnitTests:
unstash: ["SOURCE", "NODE_MODULES"] unstash: ["SOURCE", "NODE_MODULES"]
stashes: stashes:
@ -100,12 +72,6 @@ performanceTests:
merge: true merge: true
includes: "s4hana_pipeline/reports/**" includes: "s4hana_pipeline/reports/**"
s4SdkQualityChecks:
unstash: ["SOURCE", "M2", "TARGET", "REPORTS", "EXEC_FILES"]
stashes:
- name: "REPORTS"
includes: "s4hana_pipeline/reports/**"
artifactDeployment: artifactDeployment:
unstash: ["SOURCE", "M2", "TARGET", "NODE_MODULES", "EXEC_FILES"] unstash: ["SOURCE", "M2", "TARGET", "NODE_MODULES", "EXEC_FILES"]
stashes: [] stashes: []

View File

@ -24,13 +24,6 @@ stages:
- 'sonarTokenCredentialsId' - 'sonarTokenCredentialsId'
- 'projectKey' - 'projectKey'
- 'instance' - 'instance'
security:
stepConditions:
whitesourceExecuteScan:
configKeys:
- 'productName'
- 'orgAdminUserTokenCredentialsId'
- 'userTokenCredentialsId'
frontendIntegrationTests: frontendIntegrationTests:
stepConditions: stepConditions:
npmExecuteScripts: npmExecuteScripts:
@ -41,10 +34,6 @@ stages:
npmExecuteScripts: npmExecuteScripts:
npmScripts: npmScripts:
- 'ci-frontend-unit-test' - 'ci-frontend-unit-test'
npmAudit:
stepConditions:
npmAudit:
filePattern: '**/package.json'
endToEndTests: endToEndTests:
stepConditions: stepConditions:
multicloudDeploy: multicloudDeploy:
@ -75,45 +64,6 @@ stages:
configKeys: configKeys:
- 'cfTargets' - 'cfTargets'
- 'neoTargets' - 'neoTargets'
checkmarxScan:
onlyProductiveBranch: true
stepConditions:
checkmarxScan:
configKeys:
- 'groupId'
sonarQubeScan:
stepConditions:
sonarQubeScan:
configKeys:
- 'projectKey'
- 'instance'
additionalTools:
onlyProductiveBranch: true
extensionExists: true
whitesourceScan:
onlyProductiveBranch: true
stepConditions:
whitesourceExecuteScan:
configKeys:
- 'productName'
- 'orgAdminUserTokenCredentialsId'
- 'userTokenCredentialsId'
whitesourceScan:
configKeys:
- 'product'
- 'credentialsId'
fortifyScan:
onlyProductiveBranch: true
stepConditions:
fortifyExecuteScan:
configKeys:
- 'fortifyCredentialsId'
detectScan:
onlyProductiveBranch: true
stepConditions:
detectScan:
configKeys:
- 'detectTokenCredentialsId'
security: security:
onlyProductiveBranch: true onlyProductiveBranch: true
stepConditions: stepConditions:
@ -128,7 +78,7 @@ stages:
- 'fortifyCredentialsId' - 'fortifyCredentialsId'
whitesourceExecuteScan: whitesourceExecuteScan:
configKeys: configKeys:
- 'product' - 'productName'
- 'orgAdminUserTokenCredentialsId' - 'orgAdminUserTokenCredentialsId'
- 'userTokenCredentialsId' - 'userTokenCredentialsId'
productionDeployment: productionDeployment: