1
0
mirror of https://github.com/SAP/jenkins-library.git synced 2025-07-15 01:34:38 +02:00
Commit Graph

1845 Commits

Author SHA1 Message Date
bde8f388be containerExecuteStructureTests: generate docu 2019-04-09 11:12:38 +02:00
fa05b0bcb6 prepareDefaultValues: generate docu (#634) 2019-04-09 09:52:45 +02:00
998dd99cf5 batsExecuteTests: generate docu (#605) 2019-04-09 08:39:20 +02:00
35ced01ffa Avoid unwanted behavior when using resilience options (#650)
Certain steps should always fail, even though resilience option `failOnError=false` is used.

* Docker execution typically happens in another step. We should not hide errors here but rather handle their resilience in the step which uses `dockerExecute` and `dockerExecuteOnKubernetes`.
* Wrapper steps like `pipelineExecute`, `pipelineRestartSteps` should not hide errors. If an error occured this has to be considered as **intentional** and not hidden accidentially in case resilience option is switched on.
2019-04-08 20:10:54 +02:00
5c13a0e2a2 fix docs generation (#643) 2019-04-05 15:31:29 +02:00
a92c01b640 Merge remote-tracking branch 'github/master' into HEAD 2019-04-05 11:19:24 +02:00
4d945c8557 handlePipelineStepErrors - allow step timeouts (#644)
* handlePipelineStepErrors - allow step timeouts

This adds another resilience option:
A timeout can be configured for steps in order to stop step execution, continue with the pipeline while setting build status to "UNSTABLE"
2019-04-05 11:16:34 +02:00
4a756e1f4b Merge remote-tracking branch 'github/master' into HEAD 2019-04-05 10:08:49 +02:00
e3cb31da04 Merge pull request #548 from SAP/whitesource-step
whitesourceExecuteScan: Introduce new step for OSS vulnerability scanning
2019-04-04 22:54:17 +02:00
2ad3483233 Merge branch 'master' into whitesource-step 2019-04-04 22:19:16 +02:00
bccec4259a Fix scala test 2019-04-04 21:20:25 +02:00
1e36df6a9c fix docs generation (#640) 2019-04-04 17:01:30 +02:00
259619f00f Merge branch 'master' into whitesource-step 2019-04-04 16:06:51 +02:00
097ee4179b Chris' final comments + Scala config 2019-04-04 16:05:26 +02:00
bc253d0036 Merge remote-tracking branch 'github/master' into HEAD 2019-04-04 15:54:52 +02:00
54846ea0d6 Add a guide on authenticating UIVeri5 tests (#577)
* Add a guide on authenticating UIVeri5 tests

* Update documentation/docs/steps/uiVeri5ExecuteTests.md

Co-Authored-By: LukasHeimann <48723560+LukasHeimann@users.noreply.github.com>
2019-04-04 13:54:16 +02:00
fa656fd36c Merge pull request #639 from alejandraferreirovidal/fixDocu
fix docu
2019-04-04 11:22:03 +02:00
fbddb910d0 fix docu 2019-04-04 10:50:46 +02:00
138656b49b Allow resilient error handling in pipelines (#583)
* add resilience to error handling
* adapt documentation
* make ConfigLoader more resilient
2019-04-04 08:38:54 +02:00
dfa47ac4c7 Merge branch 'master' into whitesource-step 2019-04-03 22:18:39 +02:00
ec3d350252 Merge pull request #637 from alejandraferreirovidal/fixDocsBuild
fix unstable docs build
2019-04-03 17:30:39 +02:00
316ea83423 fix doc build error 2019-04-03 15:44:59 +02:00
a011c67d09 No update to the stash content list from dockerExecuteOnK8S
When dealing with stashes in dockerExecuteOnKubernetes the global
stash list was updated from the step. This resulted in stashes
transported between the steps, which in turn resulted in having
old stashes unstashed in a pod later down the build. E.g.: mtaBuild
followed by neoDeploy: mtaBuild created a stash, the stash was
rememebered in the default stash list and re-used later on by
neoDeploy. Since the stash was created before the mtaBuild the
deployable was missing in the step.
2019-04-03 13:38:43 +02:00
8fc6eb5219 Fix time displayed in report 2019-04-03 12:31:40 +02:00
1fe05b8a56 Merge branch 'master' into whitesource-step 2019-04-03 12:19:34 +02:00
70d3e6a89c Merge pull request #623 from alejandraferreirovidal/mtaBuild
mtaBuild: generate docu
2019-04-03 11:30:58 +02:00
83ee7d0b28 mtaBuild: generate docu 2019-04-03 10:36:56 +02:00
8679dd261b Merge pull request #626 from alejandraferreirovidal/pipelineExecute
pipelineExecute: generate docu
2019-04-03 10:30:19 +02:00
92e895d34e pipelineExecute: generate docu 2019-04-03 09:41:27 +02:00
29faceb838 Merge pull request #610 from alejandraferreirovidal/durationMeasure
durationMeasure: generate docu
2019-04-03 09:38:09 +02:00
d863bb3209 durationMeasure: generate config 2019-04-03 08:16:33 +02:00
abf10fba13 Merge pull request #622 from alejandraferreirovidal/mavenExecute
mavenExecute: generate docu
2019-04-02 22:56:04 +02:00
3d0aa51380 mavenExecute: generate docu 2019-04-02 22:03:23 +02:00
db6bf1ffa8 Merge pull request #618 from alejandraferreirovidal/healthExecuteCheck
healthExecuteCheck: generate docu
2019-04-02 21:58:12 +02:00
0397f152dc Merge branch 'master' into healthExecuteCheck 2019-04-02 21:01:29 +02:00
d2a615fbc3 Update vars/healthExecuteCheck.groovy
Co-Authored-By: alejandraferreirovidal <alejandra.ferreiro.vidal@sap.com>
2019-04-02 21:01:09 +02:00
6468b54b8e Merge pull request #613 from alejandraferreirovidal/handlePipelineStepErrors
handlePipelineStepErrors: generate docu
2019-04-02 20:59:46 +02:00
f77d9957a5 handlePipelineStepErrors: generate docu 2019-04-02 20:06:47 +02:00
b1d8032ee2 alpine does not support date option --universal (#578)
* alpine does not support date option --universal

Replaced by --utc as this seems to be more universal than --universal

* Fix unit tests after date parameter change
2019-04-02 15:59:33 +02:00
025ce5a88e Don't use host port (#579)
* Stop using host ports

* Sort parameters alphabetically

* Fix warning format
2019-04-02 14:23:19 +02:00
dea2dbcbaa neoDeploy: assert deployable exists before starting deployment.
Up to now the presence of the deployable (source) was checked late
by the NeoCommandLineHelper. The code doing this is surrounded by
the try/catch which finally also puts the log written by the neo
toolset into the job log in case an exception occured.

The check for the deployable returns with the same type of
exception like a failed neo command. Hence we cannot distiguish (ok,
would be possible to parse the exception message, but that is ugly).
When the exception is triggered by the missing deployable we try to
cat the neo log into the job log. But at this point the neo log has
not been provided - neo has not been called at all in this case.
Hence `cat logs/neo/*` in turn fails.

In order to avoid such a failure we check now for the presence of the
deployable earlier before launching the neo toolset.

Since the deployable is used in any deploy mode case no further check
for the deploy mode is required prior to the check for the deployable.
2019-04-02 13:53:31 +02:00
24563db155 update stashing behavior (#628)
* update stashing behavior

close #619

* add test
2019-04-02 13:13:25 +02:00
7f4f0eef00 JSON strings into tripple quotes 2019-04-01 16:33:10 +02:00
b618764a00 Use ExpectedException 2019-04-01 16:13:48 +02:00
a43760d34a Use JenkinsCredentialsRule 2019-04-01 15:59:20 +02:00
4e144b80a1 Refactor test to address last review comments 2019-04-01 14:43:44 +02:00
4f93f1f07a healthExecuteCheck: generate docu 2019-04-01 11:14:38 +02:00
ab392c11ee Remove malignous blank in import statement
Co-Authored-By: marcusholl <marcus.holl@sap.com>
2019-04-01 11:07:05 +02:00
6fb782ac3c put everything together 2019-04-01 09:30:46 +02:00
8d1ce13e4e Refactor test to address review comments 2019-04-01 09:03:56 +02:00