mirror of
https://github.com/SAP/jenkins-library.git
synced 2025-01-30 05:59:39 +02:00
Update Cloud SDK stash settings and stage defaults (#2105)
This change updates and cleans up the Cloud SDK specific stash settings and stage defaults.
This commit is contained in:
parent
9354697525
commit
08a5189f39
@ -1,7 +1,6 @@
|
|||||||
# Mapping of Go step names to their YAML metadata resource file
|
# Mapping of Go step names to their YAML metadata resource file
|
||||||
stepMetadata:
|
stepMetadata:
|
||||||
artifactPrepareVersion: versioning.yaml
|
artifactPrepareVersion: versioning.yaml
|
||||||
fortifyExecuteScan: fortify.yaml
|
|
||||||
mavenExecute: mavenExecute.yaml
|
mavenExecute: mavenExecute.yaml
|
||||||
mavenExecuteStaticCodeChecks: mavenStaticCodeChecks.yaml
|
mavenExecuteStaticCodeChecks: mavenStaticCodeChecks.yaml
|
||||||
mtaBuild: mtaBuild.yaml
|
mtaBuild: mtaBuild.yaml
|
||||||
@ -9,8 +8,6 @@ stepMetadata:
|
|||||||
npmExecuteScripts: npmExecuteScripts.yaml
|
npmExecuteScripts: npmExecuteScripts.yaml
|
||||||
npmExecuteLint: npmExecuteLint.yaml
|
npmExecuteLint: npmExecuteLint.yaml
|
||||||
sonarExecuteScan: sonar.yaml
|
sonarExecuteScan: sonar.yaml
|
||||||
detectExecuteScan: detect.yaml
|
|
||||||
whitesourceExecuteScan: whitesource.yaml
|
|
||||||
|
|
||||||
# Mapping of stages to the steps (and by extension Docker images) they use
|
# Mapping of stages to the steps (and by extension Docker images) they use
|
||||||
containerMaps:
|
containerMaps:
|
||||||
@ -35,10 +32,6 @@ containerMaps:
|
|||||||
- npmExecuteScripts
|
- npmExecuteScripts
|
||||||
additionalUnitTests:
|
additionalUnitTests:
|
||||||
- npmExecuteScripts
|
- npmExecuteScripts
|
||||||
fortifyScan:
|
|
||||||
- fortifyExecuteScan
|
|
||||||
npmAudit:
|
|
||||||
- executeNpm
|
|
||||||
endToEndTests:
|
endToEndTests:
|
||||||
- mavenExecute
|
- mavenExecute
|
||||||
- npmExecuteScripts
|
- npmExecuteScripts
|
||||||
@ -50,17 +43,8 @@ containerMaps:
|
|||||||
- checkJMeter
|
- checkJMeter
|
||||||
- cloudFoundryDeploy
|
- cloudFoundryDeploy
|
||||||
- neoDeploy
|
- neoDeploy
|
||||||
s4SdkQualityChecks:
|
|
||||||
- mavenExecute
|
|
||||||
artifactDeployment:
|
artifactDeployment:
|
||||||
- nexusUpload
|
- nexusUpload
|
||||||
whitesourceScan:
|
|
||||||
- mavenExecute
|
|
||||||
- executeNpm
|
|
||||||
security:
|
|
||||||
- fortifyExecuteScan
|
|
||||||
- detectExecuteScan
|
|
||||||
- whitesourceExecuteScan
|
|
||||||
compliance:
|
compliance:
|
||||||
- sonarExecuteScan
|
- sonarExecuteScan
|
||||||
productionDeployment:
|
productionDeployment:
|
||||||
|
@ -50,38 +50,10 @@ frontendIntegrationTests:
|
|||||||
merge: true
|
merge: true
|
||||||
includes: "s4hana_pipeline/reports/**, **/target/site/**/jacoco.xml"
|
includes: "s4hana_pipeline/reports/**, **/target/site/**/jacoco.xml"
|
||||||
|
|
||||||
checkmarxScan:
|
|
||||||
unstash: ["SOURCE", "TARGET"]
|
|
||||||
stashes: []
|
|
||||||
|
|
||||||
whitesourceScan:
|
|
||||||
unstash: ["SOURCE", "M2", "NODE_MODULES", "PACKAGE_LOCK"]
|
|
||||||
stashes: []
|
|
||||||
|
|
||||||
security:
|
|
||||||
unstash: ["SOURCE", "M2", "TARGET", "NODE_MODULES", "PACKAGE_LOCK"]
|
|
||||||
stashes: []
|
|
||||||
|
|
||||||
additionalTools:
|
|
||||||
unstash: ["SOURCE", "M2", "NODE_MODULES", "GENERATED_CAP_FILES"]
|
|
||||||
stashes: []
|
|
||||||
|
|
||||||
compliance:
|
compliance:
|
||||||
unstash: ['SOURCE', 'M2', 'REPORTS', 'TARGET', 'EXEC_FILES']
|
unstash: ['SOURCE', 'M2', 'REPORTS', 'TARGET', 'EXEC_FILES']
|
||||||
stashes: []
|
stashes: []
|
||||||
|
|
||||||
fortifyScan:
|
|
||||||
unstash: ["SOURCE", "M2", "TARGET"]
|
|
||||||
stashes: []
|
|
||||||
|
|
||||||
detect:
|
|
||||||
unstash: ["SOURCE", "M2", "TARGET"]
|
|
||||||
stashes: []
|
|
||||||
|
|
||||||
npmAudit:
|
|
||||||
unstash: ["SOURCE", "PACKAGE_LOCK"]
|
|
||||||
stashes: []
|
|
||||||
|
|
||||||
additionalUnitTests:
|
additionalUnitTests:
|
||||||
unstash: ["SOURCE", "NODE_MODULES", "GENERATED_CAP_FILES"]
|
unstash: ["SOURCE", "NODE_MODULES", "GENERATED_CAP_FILES"]
|
||||||
stashes:
|
stashes:
|
||||||
@ -100,12 +72,6 @@ performanceTests:
|
|||||||
merge: true
|
merge: true
|
||||||
includes: "s4hana_pipeline/reports/**"
|
includes: "s4hana_pipeline/reports/**"
|
||||||
|
|
||||||
s4SdkQualityChecks:
|
|
||||||
unstash: ["SOURCE", "M2", "TARGET", "REPORTS", "EXEC_FILES"]
|
|
||||||
stashes:
|
|
||||||
- name: "REPORTS"
|
|
||||||
includes: "s4hana_pipeline/reports/**"
|
|
||||||
|
|
||||||
artifactDeployment:
|
artifactDeployment:
|
||||||
unstash: ["SOURCE", "M2", "TARGET", "NODE_MODULES", "GENERATED_CAP_FILES"]
|
unstash: ["SOURCE", "M2", "TARGET", "NODE_MODULES", "GENERATED_CAP_FILES"]
|
||||||
stashes: []
|
stashes: []
|
||||||
|
@ -51,29 +51,6 @@ compliance:
|
|||||||
unstash: ['SOURCE', 'NODE_MODULES', 'DIST']
|
unstash: ['SOURCE', 'NODE_MODULES', 'DIST']
|
||||||
stashes: []
|
stashes: []
|
||||||
|
|
||||||
npmAudit:
|
|
||||||
unstash: ["SOURCE", "PACKAGE_LOCK"]
|
|
||||||
stashes: []
|
|
||||||
|
|
||||||
s4SdkQualityChecks:
|
|
||||||
unstash: ["SOURCE", "DIST", "REPORTS"]
|
|
||||||
|
|
||||||
whitesourceScan:
|
|
||||||
unstash: ["SOURCE", "NODE_MODULES", "PACKAGE_LOCK"]
|
|
||||||
stashes: []
|
|
||||||
|
|
||||||
checkmarxScan:
|
|
||||||
unstash: ["SOURCE"]
|
|
||||||
stashes: []
|
|
||||||
|
|
||||||
detect:
|
|
||||||
unstash: ["SOURCE"]
|
|
||||||
stashes: []
|
|
||||||
|
|
||||||
security:
|
|
||||||
unstash: ["SOURCE", "NODE_MODULES", "PACKAGE_LOCK"]
|
|
||||||
stashes: []
|
|
||||||
|
|
||||||
endToEndTests:
|
endToEndTests:
|
||||||
unstash: ["SOURCE", "DEPLOYMENTARTIFACT", "NODE_MODULES", "GENERATED_CAP_FILES"]
|
unstash: ["SOURCE", "DEPLOYMENTARTIFACT", "NODE_MODULES", "GENERATED_CAP_FILES"]
|
||||||
stashes: []
|
stashes: []
|
||||||
|
@ -50,38 +50,10 @@ frontendIntegrationTests:
|
|||||||
merge: true
|
merge: true
|
||||||
includes: "s4hana_pipeline/reports/**, **/target/site/**/jacoco.xml"
|
includes: "s4hana_pipeline/reports/**, **/target/site/**/jacoco.xml"
|
||||||
|
|
||||||
checkmarxScan:
|
|
||||||
unstash: ["SOURCE", "TARGET"]
|
|
||||||
stashes: []
|
|
||||||
|
|
||||||
whitesourceScan:
|
|
||||||
unstash: ["SOURCE", "M2", "NODE_MODULES", "PACKAGE_LOCK"]
|
|
||||||
stashes: []
|
|
||||||
|
|
||||||
additionalTools:
|
|
||||||
unstash: ["SOURCE", "M2", "NODE_MODULES"]
|
|
||||||
stashes: []
|
|
||||||
|
|
||||||
compliance:
|
compliance:
|
||||||
unstash: ['SOURCE', 'M2', 'NODE_MODULES', 'REPORTS', 'TARGET']
|
unstash: ['SOURCE', 'M2', 'NODE_MODULES', 'REPORTS', 'TARGET']
|
||||||
stashes: []
|
stashes: []
|
||||||
|
|
||||||
fortifyScan:
|
|
||||||
unstash: ["SOURCE", "M2", "TARGET"]
|
|
||||||
stashes: []
|
|
||||||
|
|
||||||
detect:
|
|
||||||
unstash: ["SOURCE", "M2", "TARGET"]
|
|
||||||
stashes: []
|
|
||||||
|
|
||||||
security:
|
|
||||||
unstash: ["SOURCE", "M2", "TARGET", "NODE_MODULES", "PACKAGE_LOCK"]
|
|
||||||
stashes: []
|
|
||||||
|
|
||||||
npmAudit:
|
|
||||||
unstash: ["SOURCE", "PACKAGE_LOCK"]
|
|
||||||
stashes: []
|
|
||||||
|
|
||||||
additionalUnitTests:
|
additionalUnitTests:
|
||||||
unstash: ["SOURCE", "NODE_MODULES"]
|
unstash: ["SOURCE", "NODE_MODULES"]
|
||||||
stashes:
|
stashes:
|
||||||
@ -100,12 +72,6 @@ performanceTests:
|
|||||||
merge: true
|
merge: true
|
||||||
includes: "s4hana_pipeline/reports/**"
|
includes: "s4hana_pipeline/reports/**"
|
||||||
|
|
||||||
s4SdkQualityChecks:
|
|
||||||
unstash: ["SOURCE", "M2", "TARGET", "REPORTS", "EXEC_FILES"]
|
|
||||||
stashes:
|
|
||||||
- name: "REPORTS"
|
|
||||||
includes: "s4hana_pipeline/reports/**"
|
|
||||||
|
|
||||||
artifactDeployment:
|
artifactDeployment:
|
||||||
unstash: ["SOURCE", "M2", "TARGET", "NODE_MODULES", "EXEC_FILES"]
|
unstash: ["SOURCE", "M2", "TARGET", "NODE_MODULES", "EXEC_FILES"]
|
||||||
stashes: []
|
stashes: []
|
||||||
|
@ -24,13 +24,6 @@ stages:
|
|||||||
- 'sonarTokenCredentialsId'
|
- 'sonarTokenCredentialsId'
|
||||||
- 'projectKey'
|
- 'projectKey'
|
||||||
- 'instance'
|
- 'instance'
|
||||||
security:
|
|
||||||
stepConditions:
|
|
||||||
whitesourceExecuteScan:
|
|
||||||
configKeys:
|
|
||||||
- 'productName'
|
|
||||||
- 'orgAdminUserTokenCredentialsId'
|
|
||||||
- 'userTokenCredentialsId'
|
|
||||||
frontendIntegrationTests:
|
frontendIntegrationTests:
|
||||||
stepConditions:
|
stepConditions:
|
||||||
npmExecuteScripts:
|
npmExecuteScripts:
|
||||||
@ -41,10 +34,6 @@ stages:
|
|||||||
npmExecuteScripts:
|
npmExecuteScripts:
|
||||||
npmScripts:
|
npmScripts:
|
||||||
- 'ci-frontend-unit-test'
|
- 'ci-frontend-unit-test'
|
||||||
npmAudit:
|
|
||||||
stepConditions:
|
|
||||||
npmAudit:
|
|
||||||
filePattern: '**/package.json'
|
|
||||||
endToEndTests:
|
endToEndTests:
|
||||||
stepConditions:
|
stepConditions:
|
||||||
multicloudDeploy:
|
multicloudDeploy:
|
||||||
@ -75,45 +64,6 @@ stages:
|
|||||||
configKeys:
|
configKeys:
|
||||||
- 'cfTargets'
|
- 'cfTargets'
|
||||||
- 'neoTargets'
|
- 'neoTargets'
|
||||||
checkmarxScan:
|
|
||||||
onlyProductiveBranch: true
|
|
||||||
stepConditions:
|
|
||||||
checkmarxScan:
|
|
||||||
configKeys:
|
|
||||||
- 'groupId'
|
|
||||||
sonarQubeScan:
|
|
||||||
stepConditions:
|
|
||||||
sonarQubeScan:
|
|
||||||
configKeys:
|
|
||||||
- 'projectKey'
|
|
||||||
- 'instance'
|
|
||||||
additionalTools:
|
|
||||||
onlyProductiveBranch: true
|
|
||||||
extensionExists: true
|
|
||||||
whitesourceScan:
|
|
||||||
onlyProductiveBranch: true
|
|
||||||
stepConditions:
|
|
||||||
whitesourceExecuteScan:
|
|
||||||
configKeys:
|
|
||||||
- 'productName'
|
|
||||||
- 'orgAdminUserTokenCredentialsId'
|
|
||||||
- 'userTokenCredentialsId'
|
|
||||||
whitesourceScan:
|
|
||||||
configKeys:
|
|
||||||
- 'product'
|
|
||||||
- 'credentialsId'
|
|
||||||
fortifyScan:
|
|
||||||
onlyProductiveBranch: true
|
|
||||||
stepConditions:
|
|
||||||
fortifyExecuteScan:
|
|
||||||
configKeys:
|
|
||||||
- 'fortifyCredentialsId'
|
|
||||||
detectScan:
|
|
||||||
onlyProductiveBranch: true
|
|
||||||
stepConditions:
|
|
||||||
detectScan:
|
|
||||||
configKeys:
|
|
||||||
- 'detectTokenCredentialsId'
|
|
||||||
security:
|
security:
|
||||||
onlyProductiveBranch: true
|
onlyProductiveBranch: true
|
||||||
stepConditions:
|
stepConditions:
|
||||||
@ -128,7 +78,7 @@ stages:
|
|||||||
- 'fortifyCredentialsId'
|
- 'fortifyCredentialsId'
|
||||||
whitesourceExecuteScan:
|
whitesourceExecuteScan:
|
||||||
configKeys:
|
configKeys:
|
||||||
- 'product'
|
- 'productName'
|
||||||
- 'orgAdminUserTokenCredentialsId'
|
- 'orgAdminUserTokenCredentialsId'
|
||||||
- 'userTokenCredentialsId'
|
- 'userTokenCredentialsId'
|
||||||
productionDeployment:
|
productionDeployment:
|
||||||
|
Loading…
x
Reference in New Issue
Block a user