diff --git a/cmd/abapEnvironmentCloneGitRepo.go b/cmd/abapEnvironmentCloneGitRepo.go
index 687044dd7..71cfe60ab 100644
--- a/cmd/abapEnvironmentCloneGitRepo.go
+++ b/cmd/abapEnvironmentCloneGitRepo.go
@@ -42,7 +42,7 @@ func runAbapEnvironmentCloneGitRepo(config *abapEnvironmentCloneGitRepoOptions,
return errors.Wrap(errConfig, "The provided configuration is not allowed")
}
- repositories, errGetRepos := abaputils.GetRepositories(&abaputils.RepositoriesConfig{BranchName: config.BranchName, RepositoryName: config.RepositoryName, Repositories: config.Repositories}, false)
+ repositories, errGetRepos := abaputils.GetRepositories(&abaputils.RepositoriesConfig{BranchName: config.BranchName, RepositoryName: config.RepositoryName, Repositories: config.Repositories, ByogUsername: config.ByogUsername, ByogPassword: config.ByogPassword, ByogAuthMethod: config.ByogAuthMethod}, false)
if errGetRepos != nil {
return errors.Wrap(errGetRepos, "Could not read repositories")
}
@@ -85,12 +85,15 @@ func cloneSingleRepo(apiManager abaputils.SoftwareComponentApiManagerInterface,
log.Entry().Info("Start cloning " + logString)
abaputils.AddDefaultDashedLine(1)
- alreadyCloned, activeBranch, errCheckCloned := api.GetRepository()
+ alreadyCloned, activeBranch, errCheckCloned, isByog := api.GetRepository()
if errCheckCloned != nil {
return errors.Wrapf(errCheckCloned, errorString)
}
if !alreadyCloned {
+ if isByog {
+ api.UpdateRepoWithBYOGCredentials(config.ByogAuthMethod, config.ByogUsername, config.ByogPassword)
+ }
errClone := api.Clone()
if errClone != nil {
return errors.Wrapf(errClone, errorString)
@@ -186,5 +189,8 @@ func convertCloneConfig(config *abapEnvironmentCloneGitRepoOptions) abaputils.Ab
subOptions.Host = config.Host
subOptions.Password = config.Password
subOptions.Username = config.Username
+ subOptions.ByogUsername = config.ByogUsername
+ subOptions.ByogPassword = config.ByogPassword
+ subOptions.ByogAuthMethod = config.ByogAuthMethod
return subOptions
}
diff --git a/cmd/abapEnvironmentCloneGitRepo_generated.go b/cmd/abapEnvironmentCloneGitRepo_generated.go
index 9cba6305e..8e160194f 100644
--- a/cmd/abapEnvironmentCloneGitRepo_generated.go
+++ b/cmd/abapEnvironmentCloneGitRepo_generated.go
@@ -18,6 +18,9 @@ import (
type abapEnvironmentCloneGitRepoOptions struct {
Username string `json:"username,omitempty"`
Password string `json:"password,omitempty"`
+ ByogUsername string `json:"byogUsername,omitempty"`
+ ByogPassword string `json:"byogPassword,omitempty"`
+ ByogAuthMethod string `json:"byogAuthMethod,omitempty"`
Repositories string `json:"repositories,omitempty"`
RepositoryName string `json:"repositoryName,omitempty"`
BranchName string `json:"branchName,omitempty"`
@@ -68,6 +71,8 @@ Please provide either of the following options:
}
log.RegisterSecret(stepConfig.Username)
log.RegisterSecret(stepConfig.Password)
+ log.RegisterSecret(stepConfig.ByogUsername)
+ log.RegisterSecret(stepConfig.ByogPassword)
if len(GeneralConfig.HookConfig.SentryConfig.Dsn) > 0 {
sentryHook := log.NewSentryHook(GeneralConfig.HookConfig.SentryConfig.Dsn, GeneralConfig.CorrelationID)
@@ -138,6 +143,9 @@ Please provide either of the following options:
func addAbapEnvironmentCloneGitRepoFlags(cmd *cobra.Command, stepConfig *abapEnvironmentCloneGitRepoOptions) {
cmd.Flags().StringVar(&stepConfig.Username, "username", os.Getenv("PIPER_username"), "User for either the Cloud Foundry API or the Communication Arrangement for SAP_COM_0948")
cmd.Flags().StringVar(&stepConfig.Password, "password", os.Getenv("PIPER_password"), "Password for either the Cloud Foundry API or the Communication Arrangement for SAP_COM_0948")
+ cmd.Flags().StringVar(&stepConfig.ByogUsername, "byogUsername", os.Getenv("PIPER_byogUsername"), "Username for bring your own git (BYOG) authentication")
+ cmd.Flags().StringVar(&stepConfig.ByogPassword, "byogPassword", os.Getenv("PIPER_byogPassword"), "Password for bring your own git (BYOG) authentication")
+ cmd.Flags().StringVar(&stepConfig.ByogAuthMethod, "byogAuthMethod", os.Getenv("PIPER_byogAuthMethod"), "Specifies which authentication method is used for bring your own git (BYOG) repositories")
cmd.Flags().StringVar(&stepConfig.Repositories, "repositories", os.Getenv("PIPER_repositories"), "Specifies a YAML file containing the repositories configuration")
cmd.Flags().StringVar(&stepConfig.RepositoryName, "repositoryName", os.Getenv("PIPER_repositoryName"), "Specifies a repository (Software Components) on the SAP BTP ABAP Environment system")
cmd.Flags().StringVar(&stepConfig.BranchName, "branchName", os.Getenv("PIPER_branchName"), "Specifies a branch of a repository (Software Components) on the SAP BTP ABAP Environment system")
@@ -151,6 +159,8 @@ func addAbapEnvironmentCloneGitRepoFlags(cmd *cobra.Command, stepConfig *abapEnv
cmd.MarkFlagRequired("username")
cmd.MarkFlagRequired("password")
+ cmd.MarkFlagRequired("byogUsername")
+ cmd.MarkFlagRequired("byogPassword")
}
// retrieve step metadata
@@ -165,6 +175,7 @@ func abapEnvironmentCloneGitRepoMetadata() config.StepData {
Inputs: config.StepInputs{
Secrets: []config.StepSecrets{
{Name: "abapCredentialsId", Description: "Jenkins credentials ID containing user and password to authenticate to the BTP ABAP Environment system or the Cloud Foundry API", Type: "jenkins", Aliases: []config.Alias{{Name: "cfCredentialsId", Deprecated: false}, {Name: "credentialsId", Deprecated: false}}},
+ {Name: "byogCredentialsId", Description: "Jenkins credentials ID containing ByogUsername and ByogPassword to authenticate to a software component which is used in a BYOG scenario. (https://help.sap.com/docs/btp/sap-business-technology-platform/cloning-software-components-to-abap-environment-system-383ce2f9e2eb40f1b8ad538ddf79e656)", Type: "jenkins"},
},
Parameters: []config.StepParameters{
{
@@ -197,6 +208,45 @@ func abapEnvironmentCloneGitRepoMetadata() config.StepData {
Aliases: []config.Alias{},
Default: os.Getenv("PIPER_password"),
},
+ {
+ Name: "byogUsername",
+ ResourceRef: []config.ResourceReference{
+ {
+ Name: "byogCredentialsId",
+ Param: "username",
+ Type: "secret",
+ },
+ },
+ Scope: []string{"PARAMETERS", "STAGES", "STEPS", "GENERAL"},
+ Type: "string",
+ Mandatory: true,
+ Aliases: []config.Alias{},
+ Default: os.Getenv("PIPER_byogUsername"),
+ },
+ {
+ Name: "byogPassword",
+ ResourceRef: []config.ResourceReference{
+ {
+ Name: "byogCredentialsId",
+ Param: "password",
+ Type: "secret",
+ },
+ },
+ Scope: []string{"PARAMETERS", "STAGES", "STEPS", "GENERAL"},
+ Type: "string",
+ Mandatory: true,
+ Aliases: []config.Alias{},
+ Default: os.Getenv("PIPER_byogPassword"),
+ },
+ {
+ Name: "byogAuthMethod",
+ ResourceRef: []config.ResourceReference{},
+ Scope: []string{"PARAMETERS", "STAGES", "STEPS", "GENERAL"},
+ Type: "string",
+ Mandatory: false,
+ Aliases: []config.Alias{},
+ Default: os.Getenv("PIPER_byogAuthMethod"),
+ },
{
Name: "repositories",
ResourceRef: []config.ResourceReference{},
diff --git a/documentation/docs/steps/abapEnvironmentCloneGitRepo.md b/documentation/docs/steps/abapEnvironmentCloneGitRepo.md
index 8bdf906a7..53c88aec7 100644
--- a/documentation/docs/steps/abapEnvironmentCloneGitRepo.md
+++ b/documentation/docs/steps/abapEnvironmentCloneGitRepo.md
@@ -97,3 +97,39 @@ abapEnvironmentCloneGitRepo (
cfServiceKeyName: 'cfServiceKeyName'
)
```
+
+## Example: Cloning a Bring Your Own Git (BYOG) repository
+
+> Feature will be available in November 2024.
+
+Since a ByoG repository is an external repository, you must be authenticated to clone it.
+For this, the corresponding credentials must be stored in Jenkins as a username and password/token.
+
+ Store the credentials:
+A new credential with the type username and password must be stored.
+`Jenkins Dashboard > Manage Jenkins > Credentials`
+These credentials are used to clone the ByoG repository.
+More information on configuring the credentials can be found [here](https://www.jenkins.io/doc/book/using/using-credentials/).
+
+The config.yaml should look like this:
+
+```yaml
+steps:
+ abapEnvironmentCloneGitRepo:
+ repositories: 'repos.yaml'
+ byogCredentialsId: 'byogCredentialsId'
+ abapCredentialsId: 'abapCredentialsId'
+ host: '1234-abcd-5678-efgh-ijk.abap.eu10.hana.ondemand.com'
+```
+
+`byogCredentialsId: 'byogCredentialsId'` is the reference to the defined credential in Jenkins. So take care that this matches with your setup.
+
+After that, the ByoG repository that is to be cloned must be specified in the repos.yaml:
+
+```yaml
+repositories:
+ - name: '/DMO/REPO_BYOG'
+ branch: 'main'
+```
+
+After the pipeline has run through, the repository has been cloned.
diff --git a/pkg/abaputils/abaputils.go b/pkg/abaputils/abaputils.go
index caf6cb993..2f43a003c 100644
--- a/pkg/abaputils/abaputils.go
+++ b/pkg/abaputils/abaputils.go
@@ -285,6 +285,9 @@ type AbapEnvironmentRunATCCheckOptions struct {
type AbapEnvironmentOptions struct {
Username string `json:"username,omitempty"`
Password string `json:"password,omitempty"`
+ ByogUsername string `json:"byogUsername,omitempty"`
+ ByogPassword string `json:"byogPassword,omitempty"`
+ ByogAuthMethod string `json:"byogAuthMethod,omitempty"`
Host string `json:"host,omitempty"`
CfAPIEndpoint string `json:"cfApiEndpoint,omitempty"`
CfOrg string `json:"cfOrg,omitempty"`
diff --git a/pkg/abaputils/descriptor.go b/pkg/abaputils/descriptor.go
index e63e9c219..1a044d23e 100644
--- a/pkg/abaputils/descriptor.go
+++ b/pkg/abaputils/descriptor.go
@@ -42,6 +42,10 @@ type Repository struct {
Tag string `json:"tag,omitempty"`
Branch string `json:"branch,omitempty"`
CommitID string `json:"commitID,omitempty"`
+ ByogUsername string `json:"byogUsername"`
+ ByogPassword string `json:"byogPassword"`
+ ByogAuthMethod string `json:"byogAuthMethod"`
+ IsByog bool `json:",omitempty"`
VersionYAML string `json:"version,omitempty"`
Version string `json:"versionAAK"`
AdditionalPiecelist string `json:"additionalPiecelist,omitempty"`
diff --git a/pkg/abaputils/manageGitRepositoryUtils.go b/pkg/abaputils/manageGitRepositoryUtils.go
index d53755a50..73da35c04 100644
--- a/pkg/abaputils/manageGitRepositoryUtils.go
+++ b/pkg/abaputils/manageGitRepositoryUtils.go
@@ -163,7 +163,7 @@ func printHeader(logEntry LogResultsV2, api SoftwareComponentApiInterface) {
}
}
-// GetRepositories for parsing one or multiple branches and repositories from repositories file or branchName and repositoryName configuration
+// GetRepositories for parsing one or multiple branches and repositories from repositories file or branchName and repositoryName configuration
func GetRepositories(config *RepositoriesConfig, branchRequired bool) ([]Repository, error) {
var repositories = make([]Repository, 0)
if reflect.DeepEqual(RepositoriesConfig{}, config) {
@@ -193,6 +193,7 @@ func GetRepositories(config *RepositoriesConfig, branchRequired bool) ([]Reposit
if config.RepositoryName != "" && !branchRequired {
repositories = append(repositories, Repository{Name: config.RepositoryName, CommitID: config.CommitID})
}
+
if len(config.RepositoryNames) > 0 {
for _, repository := range config.RepositoryNames {
repositories = append(repositories, Repository{Name: repository})
@@ -210,6 +211,25 @@ func (repo *Repository) GetRequestBodyForCommitOrTag() (requestBodyString string
return requestBodyString
}
+func (repo *Repository) GetRequestBodyForBYOGCredentials() (string, error) {
+ var byogBodyString string
+
+ if repo.ByogAuthMethod != "" {
+ byogBodyString += `, "auth_method":"` + repo.ByogAuthMethod + `"`
+ }
+ if repo.ByogUsername != "" {
+ byogBodyString += `, "username":"` + repo.ByogUsername + `"`
+ } else {
+ return "", fmt.Errorf("Failed to get BYOG credentials: %w", errors.New("Username for BYOG is missing, please provide git username to authenticate"))
+ }
+ if repo.ByogPassword != "" {
+ byogBodyString += `, "password":"` + repo.ByogPassword + `"`
+ } else {
+ return "", fmt.Errorf("Failed to get BYOG credentials: %w", errors.New("Password/Token for BYOG is missing, please provide git password or token to authenticate"))
+ }
+ return byogBodyString, nil
+}
+
func (repo *Repository) GetLogStringForCommitOrTag() (logString string) {
if repo.CommitID != "" {
logString = ", commit '" + repo.CommitID + "'"
@@ -228,13 +248,21 @@ func (repo *Repository) GetCloneRequestBodyWithSWC() (body string) {
return body
}
-func (repo *Repository) GetCloneRequestBody() (body string) {
+func (repo *Repository) GetCloneRequestBody() (body string, err error) {
if repo.CommitID != "" && repo.Tag != "" {
log.Entry().WithField("Tag", repo.Tag).WithField("Commit ID", repo.CommitID).Info("The commit ID takes precedence over the tag")
}
requestBodyString := repo.GetRequestBodyForCommitOrTag()
- body = `{"branch_name":"` + repo.Branch + `"` + requestBodyString + `}`
- return body
+ var byogBodyString = ""
+ if repo.IsByog {
+ byogBodyString, err = repo.GetRequestBodyForBYOGCredentials()
+ if err != nil {
+ return "", err
+ }
+ }
+
+ body = `{"branch_name":"` + repo.Branch + `"` + requestBodyString + byogBodyString + `}`
+ return body, nil
}
func (repo *Repository) GetCloneLogString() (logString string) {
diff --git a/pkg/abaputils/manageGitRepositoryUtils_test.go b/pkg/abaputils/manageGitRepositoryUtils_test.go
index ffd96a614..557c742ce 100644
--- a/pkg/abaputils/manageGitRepositoryUtils_test.go
+++ b/pkg/abaputils/manageGitRepositoryUtils_test.go
@@ -268,7 +268,7 @@ func TestCreateRequestBodies(t *testing.T) {
CommitID: "1234567",
Tag: "myTag",
}
- body := repo.GetCloneRequestBody()
+ body, _ := repo.GetCloneRequestBody()
assert.Equal(t, `{"branch_name":"main", "commit_id":"1234567"}`, body, "Expected different body")
})
t.Run("Clone Body Tag", func(t *testing.T) {
diff --git a/pkg/abaputils/sap_com_0510.go b/pkg/abaputils/sap_com_0510.go
index f543c9ff6..24d3d9925 100644
--- a/pkg/abaputils/sap_com_0510.go
+++ b/pkg/abaputils/sap_com_0510.go
@@ -225,10 +225,10 @@ func (api *SAP_COM_0510) GetAction() (string, error) {
return abapStatusCode, nil
}
-func (api *SAP_COM_0510) GetRepository() (bool, string, error) {
+func (api *SAP_COM_0510) GetRepository() (bool, string, error, bool) {
if api.repository.Name == "" {
- return false, "", errors.New("An empty string was passed for the parameter 'repositoryName'")
+ return false, "", errors.New("An empty string was passed for the parameter 'repositoryName'"), false
}
swcConnectionDetails := api.con
@@ -236,7 +236,7 @@ func (api *SAP_COM_0510) GetRepository() (bool, string, error) {
resp, err := GetHTTPResponse("GET", swcConnectionDetails, nil, api.client)
if err != nil {
_, errRepo := HandleHTTPError(resp, err, "Reading the Repository / Software Component failed", api.con)
- return false, "", errRepo
+ return false, "", errRepo, false
}
defer resp.Body.Close()
@@ -244,25 +244,25 @@ func (api *SAP_COM_0510) GetRepository() (bool, string, error) {
var abapResp map[string]*json.RawMessage
bodyText, errRead := io.ReadAll(resp.Body)
if errRead != nil {
- return false, "", err
+ return false, "", err, false
}
if err := json.Unmarshal(bodyText, &abapResp); err != nil {
- return false, "", err
+ return false, "", err, false
}
if err := json.Unmarshal(*abapResp["d"], &body); err != nil {
- return false, "", err
+ return false, "", err, false
}
if reflect.DeepEqual(RepositoryEntity{}, body) {
log.Entry().WithField("StatusCode", resp.Status).WithField("repositoryName", api.repository.Name).WithField("branchName", api.repository.Branch).WithField("commitID", api.repository.CommitID).WithField("Tag", api.repository.Tag).Error("Could not Clone the Repository / Software Component")
err := errors.New("Request to ABAP System not successful")
- return false, "", err
+ return false, "", err, false
}
if body.AvailOnInst {
- return true, body.ActiveBranch, nil
+ return true, body.ActiveBranch, nil, false
}
- return false, "", err
+ return false, "", err, false
}
@@ -399,3 +399,8 @@ func (api *SAP_COM_0510) ConvertTime(logTimeStamp string) time.Time {
t := time.Unix(n, 0).UTC()
return t
}
+
+// Dummy implementation of the "optional" method UpdateRepoWithBYOGCredentials (only used in SAP_COM_0948)
+func (api *SAP_COM_0510) UpdateRepoWithBYOGCredentials(byogAuthMethod string, byogUsername string, byogPassword string) {
+ panic("UpdateRepoWithBYOGCredentials cannot be used in SAP_COM_0510")
+}
diff --git a/pkg/abaputils/sap_com_0510_test.go b/pkg/abaputils/sap_com_0510_test.go
index 28c3af01e..1e953560c 100644
--- a/pkg/abaputils/sap_com_0510_test.go
+++ b/pkg/abaputils/sap_com_0510_test.go
@@ -368,7 +368,7 @@ func TestGetRepo(t *testing.T) {
assert.NoError(t, err)
assert.IsType(t, &SAP_COM_0510{}, api.(*SAP_COM_0510), "API has wrong type")
- cloned, activeBranch, errAction := api.GetRepository()
+ cloned, activeBranch, errAction, _ := api.GetRepository()
assert.True(t, cloned)
assert.Equal(t, "testBranch1", activeBranch)
assert.NoError(t, errAction)
diff --git a/pkg/abaputils/sap_com_0948.go b/pkg/abaputils/sap_com_0948.go
index de1ac13eb..ef25db3bb 100644
--- a/pkg/abaputils/sap_com_0948.go
+++ b/pkg/abaputils/sap_com_0948.go
@@ -238,10 +238,10 @@ func (api *SAP_COM_0948) GetAction() (string, error) {
return abapStatusCode, nil
}
-func (api *SAP_COM_0948) GetRepository() (bool, string, error) {
+func (api *SAP_COM_0948) GetRepository() (bool, string, error, bool) {
if api.repository.Name == "" {
- return false, "", errors.New("An empty string was passed for the parameter 'repositoryName'")
+ return false, "", errors.New("An empty string was passed for the parameter 'repositoryName'"), false
}
swcConnectionDetails := api.con
@@ -249,30 +249,42 @@ func (api *SAP_COM_0948) GetRepository() (bool, string, error) {
resp, err := GetHTTPResponse("GET", swcConnectionDetails, nil, api.client)
if err != nil {
_, errRepo := HandleHTTPError(resp, err, "Reading the Repository / Software Component failed", api.con)
- return false, "", errRepo
+ return false, "", errRepo, false
}
defer resp.Body.Close()
var body RepositoryEntity
bodyText, errRead := io.ReadAll(resp.Body)
if errRead != nil {
- return false, "", err
+ return false, "", err, false
}
if err := json.Unmarshal(bodyText, &body); err != nil {
- return false, "", err
+ return false, "", err, false
}
if reflect.DeepEqual(RepositoryEntity{}, body) {
log.Entry().WithField("StatusCode", resp.Status).WithField("repositoryName", api.repository.Name).WithField("branchName", api.repository.Branch).WithField("commitID", api.repository.CommitID).WithField("Tag", api.repository.Tag).Error("Could not Clone the Repository / Software Component")
err := errors.New("Request to ABAP System not successful")
- return false, "", err
+ return false, "", err, false
}
if body.AvailOnInst {
- return true, body.ActiveBranch, nil
+ return true, body.ActiveBranch, nil, false
}
- return false, "", err
+ if body.ByogUrl != "" {
+ return false, "", err, true
+ }
+
+ return false, "", err, false
+
+}
+
+func (api *SAP_COM_0948) UpdateRepoWithBYOGCredentials(byogAuthMethod string, byogUsername string, byogPassword string) {
+ api.repository.ByogAuthMethod = byogAuthMethod
+ api.repository.ByogUsername = byogUsername
+ api.repository.ByogPassword = byogPassword
+ api.repository.IsByog = true
}
func (api *SAP_COM_0948) Clone() error {
@@ -284,9 +296,12 @@ func (api *SAP_COM_0948) Clone() error {
cloneConnectionDetails := api.con
cloneConnectionDetails.URL = api.con.URL + api.path + api.softwareComponentEntity + api.getRepoNameForPath() + api.cloneAction
- body := []byte(api.repository.GetCloneRequestBody())
+ body, err := api.repository.GetCloneRequestBody()
+ if err != nil {
+ return errors.Wrap(err, "Failed to clone repository")
+ }
- return api.triggerRequest(cloneConnectionDetails, body)
+ return api.triggerRequest(cloneConnectionDetails, []byte(body))
}
diff --git a/pkg/abaputils/sap_com_0948_test.go b/pkg/abaputils/sap_com_0948_test.go
index 8855e994e..629f23c04 100644
--- a/pkg/abaputils/sap_com_0948_test.go
+++ b/pkg/abaputils/sap_com_0948_test.go
@@ -23,6 +23,11 @@ func init() {
repoTest0948.Name = "/DMO/REPO"
repoTest0948.Branch = "main"
+ repoTest0948.IsByog = false
+ repoTest0948.ByogAuthMethod = "token"
+ repoTest0948.ByogUsername = "byogUser"
+ repoTest0948.ByogPassword = "byogToken"
+
}
func TestRetry0948(t *testing.T) {
@@ -52,7 +57,7 @@ func TestRetry0948(t *testing.T) {
errAction := api.(*SAP_COM_0948).triggerRequest(ConnectionDetailsHTTP{User: "CC_USER", Password: "abc123", URL: "https://example.com/path"}, []byte("{}"))
assert.NoError(t, errAction)
- assert.Equal(t, "GUID", api.getUUID(), "API does not cotain correct UUID")
+ assert.Equal(t, "GUID", api.getUUID(), "API does not contain correct UUID")
})
@@ -82,7 +87,7 @@ func TestRetry0948(t *testing.T) {
errAction := api.(*SAP_COM_0948).triggerRequest(ConnectionDetailsHTTP{User: "CC_USER", Password: "abc123", URL: "https://example.com/path"}, []byte("{}"))
assert.ErrorContains(t, errAction, "HTTP 400: A4C_A2G/224 - Error Text")
- assert.Empty(t, api.getUUID(), "API does not cotain correct UUID")
+ assert.Empty(t, api.getUUID(), "API does not contain correct UUID")
})
@@ -128,7 +133,7 @@ func TestRetry0948(t *testing.T) {
errAction := api.(*SAP_COM_0948).triggerRequest(ConnectionDetailsHTTP{User: "CC_USER", Password: "abc123", URL: "https://example.com/path"}, []byte("{}"))
assert.ErrorContains(t, errAction, "HTTP 400: A4C_A2G/228 - Error Text")
- assert.Empty(t, api.getUUID(), "API does not cotain correct UUID")
+ assert.Empty(t, api.getUUID(), "API does not contain correct UUID")
assert.Equal(t, 6, len(client.BodyList), "Expected maxSleepTime to limit requests")
})
@@ -175,7 +180,7 @@ func TestRetry0948(t *testing.T) {
errAction := api.(*SAP_COM_0948).triggerRequest(ConnectionDetailsHTTP{User: "CC_USER", Password: "abc123", URL: "https://example.com/path"}, []byte("{}"))
assert.ErrorContains(t, errAction, "HTTP 400: A4C_A2G/228 - Error Text")
- assert.Empty(t, api.getUUID(), "API does not cotain correct UUID")
+ assert.Empty(t, api.getUUID(), "API does not contain correct UUID")
assert.Equal(t, 5, len(client.BodyList), "Expected maxRetries to limit requests")
})
@@ -201,7 +206,7 @@ func TestClone0948(t *testing.T) {
errClone := api.Clone()
assert.NoError(t, errClone)
- assert.Equal(t, "GUID", api.getUUID(), "API does not cotain correct UUID")
+ assert.Equal(t, "GUID", api.getUUID(), "API does not contain correct UUID")
})
t.Run("Test Clone Failure", func(t *testing.T) {
@@ -225,7 +230,7 @@ func TestClone0948(t *testing.T) {
errClone := api.Clone()
assert.ErrorContains(t, errClone, "Request to ABAP System not successful")
- assert.Empty(t, api.getUUID(), "API does not cotain correct UUID")
+ assert.Empty(t, api.getUUID(), "API does not contain correct UUID")
})
t.Run("Test Clone Retry", func(t *testing.T) {
@@ -254,8 +259,48 @@ func TestClone0948(t *testing.T) {
errClone := api.Clone()
assert.NoError(t, errClone)
- assert.Equal(t, "GUID", api.getUUID(), "API does not cotain correct UUID")
+ assert.Equal(t, "GUID", api.getUUID(), "API does not contain correct UUID")
})
+
+ t.Run("Test Clone Body Success", func(t *testing.T) {
+
+ cloneBody, _ := repoTest0948.GetCloneRequestBody()
+ assert.Equal(t, "{\"branch_name\":\"main\"}", string([]byte(cloneBody)), "Clone body is not correct")
+ })
+
+ t.Run("Test Clone Body Failure", func(t *testing.T) {
+
+ repoTest0948.Branch = "wrongBranch"
+
+ cloneBody, _ := repoTest0948.GetCloneRequestBody()
+ assert.NotEqual(t, "{\"branch_name\":\"main\"}", string([]byte(cloneBody)), "Clone body should not match")
+
+ repoTest0948.Branch = "main"
+
+ })
+
+ t.Run("Test Clone Body BYOG Success", func(t *testing.T) {
+
+ repoTest0948.IsByog = true
+
+ cloneBody, _ := repoTest0948.GetCloneRequestBody()
+ assert.Equal(t, "{\"branch_name\":\"main\", \"auth_method\":\"token\", \"username\":\"byogUser\", \"password\":\"byogToken\"}", string([]byte(cloneBody)), "Clone body for byog parameter is not correct")
+
+ repoTest0948.IsByog = false
+ })
+
+ t.Run("Test Clone Body BYOG Failure", func(t *testing.T) {
+
+ repoTest0948.ByogPassword = "wrongToken"
+ repoTest0948.IsByog = true
+
+ cloneBody, _ := repoTest0948.GetCloneRequestBody()
+ assert.NotEqual(t, "{\"branch_name\":\"main\", \"auth_method\":\"token\", \"username\":\"byogUser\", \"password\":\"byogToken\"}", string([]byte(cloneBody)), "Clone body for byog parameter should not match")
+
+ repoTest0948.ByogPassword = "byogToken"
+ repoTest0948.IsByog = false
+ })
+
}
func TestPull0948(t *testing.T) {
@@ -278,7 +323,7 @@ func TestPull0948(t *testing.T) {
errPull := api.Pull()
assert.NoError(t, errPull)
- assert.Equal(t, "GUID", api.getUUID(), "API does not cotain correct UUID")
+ assert.Equal(t, "GUID", api.getUUID(), "API does not contain correct UUID")
})
t.Run("Test Pull Failure", func(t *testing.T) {
@@ -300,7 +345,7 @@ func TestPull0948(t *testing.T) {
errPull := api.Pull()
assert.ErrorContains(t, errPull, "Request to ABAP System not successful")
- assert.Empty(t, api.getUUID(), "API does not cotain correct UUID")
+ assert.Empty(t, api.getUUID(), "API does not contain correct UUID")
})
}
@@ -324,7 +369,7 @@ func TestCheckout0948(t *testing.T) {
errCheckout := api.CheckoutBranch()
assert.NoError(t, errCheckout)
- assert.Equal(t, "GUID", api.getUUID(), "API does not cotain correct UUID")
+ assert.Equal(t, "GUID", api.getUUID(), "API does not contain correct UUID")
})
t.Run("Test Checkout Failure", func(t *testing.T) {
@@ -346,7 +391,7 @@ func TestCheckout0948(t *testing.T) {
errCheckoput := api.CheckoutBranch()
assert.ErrorContains(t, errCheckoput, "Request to ABAP System not successful")
- assert.Empty(t, api.getUUID(), "API does not cotain correct UUID")
+ assert.Empty(t, api.getUUID(), "API does not contain correct UUID")
})
}
@@ -368,7 +413,7 @@ func TestGetRepo0948(t *testing.T) {
assert.NoError(t, err)
assert.IsType(t, &SAP_COM_0948{}, api.(*SAP_COM_0948), "API has wrong type")
- cloned, activeBranch, errAction := api.GetRepository()
+ cloned, activeBranch, errAction, _ := api.GetRepository()
assert.True(t, cloned)
assert.Equal(t, "testBranch1", activeBranch)
assert.NoError(t, errAction)
@@ -395,7 +440,7 @@ func TestCreateTag0948(t *testing.T) {
errCreateTag := api.CreateTag(Tag{TagName: "myTag", TagDescription: "descr"})
assert.NoError(t, errCreateTag)
- assert.Equal(t, "GUID", api.getUUID(), "API does not cotain correct UUID")
+ assert.Equal(t, "GUID", api.getUUID(), "API does not contain correct UUID")
})
t.Run("Test Tag Failure", func(t *testing.T) {
@@ -417,7 +462,7 @@ func TestCreateTag0948(t *testing.T) {
errCreateTag := api.CreateTag(Tag{TagName: "myTag", TagDescription: "descr"})
assert.ErrorContains(t, errCreateTag, "Request to ABAP System not successful")
- assert.Empty(t, api.getUUID(), "API does not cotain correct UUID")
+ assert.Empty(t, api.getUUID(), "API does not contain correct UUID")
})
t.Run("Test Tag Empty", func(t *testing.T) {
@@ -439,7 +484,7 @@ func TestCreateTag0948(t *testing.T) {
errCreateTag := api.CreateTag(Tag{})
assert.ErrorContains(t, errCreateTag, "No Tag provided")
- assert.Empty(t, api.getUUID(), "API does not cotain correct UUID")
+ assert.Empty(t, api.getUUID(), "API does not contain correct UUID")
})
}
diff --git a/pkg/abaputils/softwareComponentApiManager.go b/pkg/abaputils/softwareComponentApiManager.go
index c4d02e711..0bd7b712f 100644
--- a/pkg/abaputils/softwareComponentApiManager.go
+++ b/pkg/abaputils/softwareComponentApiManager.go
@@ -59,7 +59,7 @@ type SoftwareComponentApiInterface interface {
setSleepTimeConfig(timeUnit time.Duration, maxSleepTime time.Duration)
getSleepTime(n int) (time.Duration, error)
getUUID() string
- GetRepository() (bool, string, error)
+ GetRepository() (bool, string, error, bool)
Clone() error
Pull() error
CheckoutBranch() error
@@ -69,6 +69,7 @@ type SoftwareComponentApiInterface interface {
GetLogProtocol(LogResultsV2, int) (result []LogProtocol, count int, err error)
ConvertTime(logTimeStamp string) time.Time
GetExecutionLog() (ExecutionLog, error)
+ UpdateRepoWithBYOGCredentials(string, string, string)
}
/****************************************
@@ -128,6 +129,7 @@ type CloneEntity struct {
type RepositoryEntity struct {
Metadata AbapMetadata `json:"__metadata"`
ScName string `json:"sc_name"`
+ ByogUrl string `json:"url"`
ActiveBranch string `json:"active_branch"`
AvailOnInst bool `json:"avail_on_inst"`
}
@@ -201,6 +203,9 @@ type RepositoriesConfig struct {
BranchName string
CommitID string
RepositoryName string
+ ByogUsername string
+ ByogPassword string
+ ByogAuthMethod string
RepositoryNames []string
Repositories string
}
diff --git a/resources/metadata/abapEnvironmentCloneGitRepo.yaml b/resources/metadata/abapEnvironmentCloneGitRepo.yaml
index e3d382838..746c2c3a8 100644
--- a/resources/metadata/abapEnvironmentCloneGitRepo.yaml
+++ b/resources/metadata/abapEnvironmentCloneGitRepo.yaml
@@ -18,6 +18,9 @@ spec:
aliases:
- name: cfCredentialsId
- name: credentialsId
+ - name: byogCredentialsId
+ description: Jenkins credentials ID containing ByogUsername and ByogPassword to authenticate to a software component which is used in a BYOG scenario. (https://help.sap.com/docs/btp/sap-business-technology-platform/cloning-software-components-to-abap-environment-system-383ce2f9e2eb40f1b8ad538ddf79e656)
+ type: jenkins
params:
- name: username
type: string
@@ -45,6 +48,42 @@ spec:
- name: abapCredentialsId
type: secret
param: password
+ - name: byogUsername
+ type: string
+ description: Username for bring your own git (BYOG) authentication
+ scope:
+ - PARAMETERS
+ - STAGES
+ - STEPS
+ - GENERAL
+ mandatory: true
+ secret: true
+ resourceRef:
+ - name: byogCredentialsId
+ type: secret
+ param: username
+ - name: byogPassword
+ type: string
+ description: Password for bring your own git (BYOG) authentication
+ scope:
+ - PARAMETERS
+ - STAGES
+ - STEPS
+ - GENERAL
+ mandatory: true
+ secret: true
+ resourceRef:
+ - name: byogCredentialsId
+ type: secret
+ param: password
+ - name: byogAuthMethod
+ type: string
+ description: Specifies which authentication method is used for bring your own git (BYOG) repositories
+ scope:
+ - PARAMETERS
+ - STAGES
+ - STEPS
+ - GENERAL
- name: repositories
type: string
description: Specifies a YAML file containing the repositories configuration
diff --git a/vars/abapEnvironmentCloneGitRepo.groovy b/vars/abapEnvironmentCloneGitRepo.groovy
index 96d948cbd..46aaf0312 100644
--- a/vars/abapEnvironmentCloneGitRepo.groovy
+++ b/vars/abapEnvironmentCloneGitRepo.groovy
@@ -5,7 +5,8 @@ import groovy.transform.Field
void call(Map parameters = [:]) {
List credentials = [
- [type: 'usernamePassword', id: 'abapCredentialsId', env: ['PIPER_username', 'PIPER_password']]
+ [type: 'usernamePassword', id: 'abapCredentialsId', env: ['PIPER_username', 'PIPER_password']],
+ [type: 'usernamePassword', id: 'byogCredentialsId', env: ['PIPER_byogUsername', 'PIPER_byogPassword']]
]
piperExecuteBin(parameters, STEP_NAME, METADATA_FILE, credentials, false, false, true)
}