You've already forked sap-jenkins-library
							
							
				mirror of
				https://github.com/SAP/jenkins-library.git
				synced 2025-10-30 23:57:50 +02:00 
			
		
		
		
	* Add ans implementation * Remove todo comment * Rename test function Co-authored-by: Linda Siebert <39100394+LindaSieb@users.noreply.github.com> * Better wording Co-authored-by: Linda Siebert <39100394+LindaSieb@users.noreply.github.com> * Add reading of response body function * Use http pkg ReadResponseBody * Check read error * Better test case description * Fix formatting * Create own package for read response body * Omit empty nested resource struct * Separate Resource struct from Event struct * Merge and unmarshall instead of only unmarshalling * Improve status code error message * Remove unchangeable event fields * Separate event parts * Change log level setter function * Restructure ans send test * Revert exporting readResponseBody function Instead the code is duplicated in the xsuaa and ans package * Add check correct ans setup request * Add set options function for mocking * Review fixes * Correct function name * Use strict unmarshalling * Validate event * Move functions * Add documentation comments * improve test * Validate event * Add logrus hook for ans * Set defaults on new hook creation * Fix log level on error * Don't alter entry log level * Set severity fatal on 'fatal error' log message * Ensure that log entries don't affect each other * Remove unnecessary correlationID * Use file path instead of event template string * Improve warning messages * Add empty log message check * Allow configuration from file and string * Add sourceEventId to tags * Change resourceType to Pipeline * Use structured config approach * Use new log level set function * Check correct setup and return error * Mock http requests * Only send log level warning or higher * Use new function name * One-liner ifs * Improve test name * Fix tests * Prevent double firing * Reduce Fire test size * Add error message to test * Reduce newANSHook test size * Further check error * Rename to defaultEvent in hook struct * Reduce ifs further * Fix set error category test The ansHook Fire test cannot run in parallel, as it would affect the other tests that use the error category. * Change function name to SetServiceKey * Validate event * Rename to eventTemplate in hook struct * Move copy to event.go * Fix function mix * Remove unnecessary cleanup * Remove parallel test The translation fails now and again when parallel is on. * Remove prefix test * Remove unused copyEvent function * Fix ifs * Add docu comment * Register ans hook from pkg * register hook and setup event template seperately * Exclusively read eventTemplate from environment * setupEventTemplate tests * adjust hook levels test * sync tests- wlill still fail * migrate TestANSHook_registerANSHook test * fixes * Introduce necessary parameters * Setup hook test * Use file instead * Adapt helper for ans * Generate go files * Add ans config to general config * Change generator * Regenerate steps * Allow hook config from user config Merges with hook config from defaults * Remove ans flags from root command * Get environment variables * Generate files * Add test when calling merge twice * Update generator * Regenerate steps * Check two location for ans service key env var * Re-generate * Fix if * Generate files with fix * Duplicate config struct * Add type casting test for ans config * Fix helper * Fix format * Fix type casting of config * Revert "Allow hook config from user config" This reverts commit 4864499a4c497998c9ffc3e157ef491be955e68e. * Revert "Add test when calling merge twice" This reverts commit b82320fd07b82f5a597c5071049d918bcf62de00. * Add ans config tests * Improve helper code * Re-generate commands * Fix helper unit tests * Change to only one argument * Fix helper tests * Re-generate * Revert piper and config changes * Re-generate missing step * Generate new steps * [ANS] Add servicekey credential to environment (#3684) * Add ANS credential * Switch to hooks and remove comments * Add subsection for ans Co-authored-by: Oliver Feldmann <oliver.feldmann@sap.com> * Remove changes to piper.go * Remove formatting * Add test for ANS * Define hook credential seperately from step credential * Add test for retrieval from general section * Add comment * Get ans hook info from DefaultValueCache * [ANS] Add documentation (#3704) * Add ANS credential * Switch to hooks and remove comments * Add subsection for ans Co-authored-by: Oliver Feldmann <oliver.feldmann@sap.com> * Remove changes to piper.go * Remove formatting * Add test for ANS * Define hook credential seperately from step credential * Add test for retrieval from general section * Add comment * Add documentation * Review changes * Review comments * Improve documentation further * Add note of two event templates * Add log level destinction * Further improvements * Improve text * Remove unused things * Add ANS credential * Switch to hooks and remove comments * Add subsection for ans Co-authored-by: Oliver Feldmann <oliver.feldmann@sap.com> * Remove changes to piper.go * Remove formatting * Add test for ANS * Define hook credential seperately from step credential * Add test for retrieval from general section * Add comment * Get ans hook info from DefaultValueCache * Improvements Co-authored-by: Linda Siebert <linda.siebert@sap.com> Co-authored-by: Linda Siebert <39100394+LindaSieb@users.noreply.github.com> Co-authored-by: Oliver Feldmann <oliver.feldmann@sap.com> * New lines Co-authored-by: Oliver Feldmann <oliver.feldmann@sap.com> Co-authored-by: Roland Stengel <r.stengel@sap.com> Co-authored-by: Thorsten Duda <thorsten.duda@sap.com>
		
			
				
	
	
		
			579 lines
		
	
	
		
			26 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			579 lines
		
	
	
		
			26 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| // Code generated by piper's step-generator. DO NOT EDIT.
 | |
| 
 | |
| package cmd
 | |
| 
 | |
| import (
 | |
| 	"fmt"
 | |
| 	"os"
 | |
| 	"path/filepath"
 | |
| 	"time"
 | |
| 
 | |
| 	"github.com/SAP/jenkins-library/pkg/config"
 | |
| 	"github.com/SAP/jenkins-library/pkg/log"
 | |
| 	"github.com/SAP/jenkins-library/pkg/piperenv"
 | |
| 	"github.com/SAP/jenkins-library/pkg/splunk"
 | |
| 	"github.com/SAP/jenkins-library/pkg/telemetry"
 | |
| 	"github.com/SAP/jenkins-library/pkg/validation"
 | |
| 	"github.com/spf13/cobra"
 | |
| )
 | |
| 
 | |
| type cloudFoundryDeployOptions struct {
 | |
| 	APIEndpoint              string                 `json:"apiEndpoint,omitempty"`
 | |
| 	AppName                  string                 `json:"appName,omitempty"`
 | |
| 	ArtifactVersion          string                 `json:"artifactVersion,omitempty"`
 | |
| 	CommitHash               string                 `json:"commitHash,omitempty"`
 | |
| 	CfHome                   string                 `json:"cfHome,omitempty"`
 | |
| 	CfNativeDeployParameters string                 `json:"cfNativeDeployParameters,omitempty"`
 | |
| 	CfPluginHome             string                 `json:"cfPluginHome,omitempty"`
 | |
| 	DeployDockerImage        string                 `json:"deployDockerImage,omitempty"`
 | |
| 	DeployTool               string                 `json:"deployTool,omitempty"`
 | |
| 	BuildTool                string                 `json:"buildTool,omitempty"`
 | |
| 	DeployType               string                 `json:"deployType,omitempty"`
 | |
| 	DockerPassword           string                 `json:"dockerPassword,omitempty"`
 | |
| 	DockerUsername           string                 `json:"dockerUsername,omitempty"`
 | |
| 	KeepOldInstance          bool                   `json:"keepOldInstance,omitempty"`
 | |
| 	LoginParameters          string                 `json:"loginParameters,omitempty"`
 | |
| 	Manifest                 string                 `json:"manifest,omitempty"`
 | |
| 	ManifestVariables        []string               `json:"manifestVariables,omitempty"`
 | |
| 	ManifestVariablesFiles   []string               `json:"manifestVariablesFiles,omitempty"`
 | |
| 	MtaDeployParameters      string                 `json:"mtaDeployParameters,omitempty"`
 | |
| 	MtaExtensionDescriptor   string                 `json:"mtaExtensionDescriptor,omitempty"`
 | |
| 	MtaExtensionCredentials  map[string]interface{} `json:"mtaExtensionCredentials,omitempty"`
 | |
| 	MtaPath                  string                 `json:"mtaPath,omitempty"`
 | |
| 	Org                      string                 `json:"org,omitempty"`
 | |
| 	Password                 string                 `json:"password,omitempty"`
 | |
| 	SmokeTestScript          string                 `json:"smokeTestScript,omitempty"`
 | |
| 	SmokeTestStatusCode      int                    `json:"smokeTestStatusCode,omitempty"`
 | |
| 	Space                    string                 `json:"space,omitempty"`
 | |
| 	Username                 string                 `json:"username,omitempty"`
 | |
| }
 | |
| 
 | |
| type cloudFoundryDeployInflux struct {
 | |
| 	deployment_data struct {
 | |
| 		fields struct {
 | |
| 			artifactURL string
 | |
| 			deployTime  string
 | |
| 			commitHash  string
 | |
| 			jobTrigger  string
 | |
| 		}
 | |
| 		tags struct {
 | |
| 			artifactVersion string
 | |
| 			deployUser      string
 | |
| 			deployResult    string
 | |
| 			cfAPIEndpoint   string
 | |
| 			cfOrg           string
 | |
| 			cfSpace         string
 | |
| 		}
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func (i *cloudFoundryDeployInflux) persist(path, resourceName string) {
 | |
| 	measurementContent := []struct {
 | |
| 		measurement string
 | |
| 		valType     string
 | |
| 		name        string
 | |
| 		value       interface{}
 | |
| 	}{
 | |
| 		{valType: config.InfluxField, measurement: "deployment_data", name: "artifactUrl", value: i.deployment_data.fields.artifactURL},
 | |
| 		{valType: config.InfluxField, measurement: "deployment_data", name: "deployTime", value: i.deployment_data.fields.deployTime},
 | |
| 		{valType: config.InfluxField, measurement: "deployment_data", name: "commitHash", value: i.deployment_data.fields.commitHash},
 | |
| 		{valType: config.InfluxField, measurement: "deployment_data", name: "jobTrigger", value: i.deployment_data.fields.jobTrigger},
 | |
| 		{valType: config.InfluxTag, measurement: "deployment_data", name: "artifactVersion", value: i.deployment_data.tags.artifactVersion},
 | |
| 		{valType: config.InfluxTag, measurement: "deployment_data", name: "deployUser", value: i.deployment_data.tags.deployUser},
 | |
| 		{valType: config.InfluxTag, measurement: "deployment_data", name: "deployResult", value: i.deployment_data.tags.deployResult},
 | |
| 		{valType: config.InfluxTag, measurement: "deployment_data", name: "cfApiEndpoint", value: i.deployment_data.tags.cfAPIEndpoint},
 | |
| 		{valType: config.InfluxTag, measurement: "deployment_data", name: "cfOrg", value: i.deployment_data.tags.cfOrg},
 | |
| 		{valType: config.InfluxTag, measurement: "deployment_data", name: "cfSpace", value: i.deployment_data.tags.cfSpace},
 | |
| 	}
 | |
| 
 | |
| 	errCount := 0
 | |
| 	for _, metric := range measurementContent {
 | |
| 		err := piperenv.SetResourceParameter(path, resourceName, filepath.Join(metric.measurement, fmt.Sprintf("%vs", metric.valType), metric.name), metric.value)
 | |
| 		if err != nil {
 | |
| 			log.Entry().WithError(err).Error("Error persisting influx environment.")
 | |
| 			errCount++
 | |
| 		}
 | |
| 	}
 | |
| 	if errCount > 0 {
 | |
| 		log.Entry().Error("failed to persist Influx environment")
 | |
| 	}
 | |
| }
 | |
| 
 | |
| // CloudFoundryDeployCommand Deploys an application to Cloud Foundry
 | |
| func CloudFoundryDeployCommand() *cobra.Command {
 | |
| 	const STEP_NAME = "cloudFoundryDeploy"
 | |
| 
 | |
| 	metadata := cloudFoundryDeployMetadata()
 | |
| 	var stepConfig cloudFoundryDeployOptions
 | |
| 	var startTime time.Time
 | |
| 	var influx cloudFoundryDeployInflux
 | |
| 	var logCollector *log.CollectorHook
 | |
| 	var splunkClient *splunk.Splunk
 | |
| 	telemetryClient := &telemetry.Telemetry{}
 | |
| 
 | |
| 	var createCloudFoundryDeployCmd = &cobra.Command{
 | |
| 		Use:   STEP_NAME,
 | |
| 		Short: "Deploys an application to Cloud Foundry",
 | |
| 		Long:  `Deploys an application to a test or production space within Cloud Foundry.`,
 | |
| 		PreRunE: func(cmd *cobra.Command, _ []string) error {
 | |
| 			startTime = time.Now()
 | |
| 			log.SetStepName(STEP_NAME)
 | |
| 			log.SetVerbose(GeneralConfig.Verbose)
 | |
| 
 | |
| 			GeneralConfig.GitHubAccessTokens = ResolveAccessTokens(GeneralConfig.GitHubTokens)
 | |
| 
 | |
| 			path, _ := os.Getwd()
 | |
| 			fatalHook := &log.FatalHook{CorrelationID: GeneralConfig.CorrelationID, Path: path}
 | |
| 			log.RegisterHook(fatalHook)
 | |
| 
 | |
| 			err := PrepareConfig(cmd, &metadata, STEP_NAME, &stepConfig, config.OpenPiperFile)
 | |
| 			if err != nil {
 | |
| 				log.SetErrorCategory(log.ErrorConfiguration)
 | |
| 				return err
 | |
| 			}
 | |
| 			log.RegisterSecret(stepConfig.DockerPassword)
 | |
| 			log.RegisterSecret(stepConfig.DockerUsername)
 | |
| 			log.RegisterSecret(stepConfig.Password)
 | |
| 			log.RegisterSecret(stepConfig.Username)
 | |
| 
 | |
| 			if len(GeneralConfig.HookConfig.SentryConfig.Dsn) > 0 {
 | |
| 				sentryHook := log.NewSentryHook(GeneralConfig.HookConfig.SentryConfig.Dsn, GeneralConfig.CorrelationID)
 | |
| 				log.RegisterHook(&sentryHook)
 | |
| 			}
 | |
| 
 | |
| 			if len(GeneralConfig.HookConfig.SplunkConfig.Dsn) > 0 {
 | |
| 				splunkClient = &splunk.Splunk{}
 | |
| 				logCollector = &log.CollectorHook{CorrelationID: GeneralConfig.CorrelationID}
 | |
| 				log.RegisterHook(logCollector)
 | |
| 			}
 | |
| 
 | |
| 			if err = log.RegisterANSHookIfConfigured(GeneralConfig.CorrelationID); err != nil {
 | |
| 				log.Entry().WithError(err).Warn("failed to set up SAP Alert Notification Service log hook")
 | |
| 			}
 | |
| 
 | |
| 			validation, err := validation.New(validation.WithJSONNamesForStructFields(), validation.WithPredefinedErrorMessages())
 | |
| 			if err != nil {
 | |
| 				return err
 | |
| 			}
 | |
| 			if err = validation.ValidateStruct(stepConfig); err != nil {
 | |
| 				log.SetErrorCategory(log.ErrorConfiguration)
 | |
| 				return err
 | |
| 			}
 | |
| 
 | |
| 			return nil
 | |
| 		},
 | |
| 		Run: func(_ *cobra.Command, _ []string) {
 | |
| 			stepTelemetryData := telemetry.CustomData{}
 | |
| 			stepTelemetryData.ErrorCode = "1"
 | |
| 			handler := func() {
 | |
| 				influx.persist(GeneralConfig.EnvRootPath, "influx")
 | |
| 				config.RemoveVaultSecretFiles()
 | |
| 				stepTelemetryData.Duration = fmt.Sprintf("%v", time.Since(startTime).Milliseconds())
 | |
| 				stepTelemetryData.ErrorCategory = log.GetErrorCategory().String()
 | |
| 				stepTelemetryData.PiperCommitHash = GitCommit
 | |
| 				telemetryClient.SetData(&stepTelemetryData)
 | |
| 				telemetryClient.Send()
 | |
| 				if len(GeneralConfig.HookConfig.SplunkConfig.Dsn) > 0 {
 | |
| 					splunkClient.Send(telemetryClient.GetData(), logCollector)
 | |
| 				}
 | |
| 			}
 | |
| 			log.DeferExitHandler(handler)
 | |
| 			defer handler()
 | |
| 			telemetryClient.Initialize(GeneralConfig.NoTelemetry, STEP_NAME)
 | |
| 			if len(GeneralConfig.HookConfig.SplunkConfig.Dsn) > 0 {
 | |
| 				splunkClient.Initialize(GeneralConfig.CorrelationID,
 | |
| 					GeneralConfig.HookConfig.SplunkConfig.Dsn,
 | |
| 					GeneralConfig.HookConfig.SplunkConfig.Token,
 | |
| 					GeneralConfig.HookConfig.SplunkConfig.Index,
 | |
| 					GeneralConfig.HookConfig.SplunkConfig.SendLogs)
 | |
| 			}
 | |
| 			cloudFoundryDeploy(stepConfig, &stepTelemetryData, &influx)
 | |
| 			stepTelemetryData.ErrorCode = "0"
 | |
| 			log.Entry().Info("SUCCESS")
 | |
| 		},
 | |
| 	}
 | |
| 
 | |
| 	addCloudFoundryDeployFlags(createCloudFoundryDeployCmd, &stepConfig)
 | |
| 	return createCloudFoundryDeployCmd
 | |
| }
 | |
| 
 | |
| func addCloudFoundryDeployFlags(cmd *cobra.Command, stepConfig *cloudFoundryDeployOptions) {
 | |
| 	cmd.Flags().StringVar(&stepConfig.APIEndpoint, "apiEndpoint", `https://api.cf.eu10.hana.ondemand.com`, "Cloud Foundry API endpoint")
 | |
| 	cmd.Flags().StringVar(&stepConfig.AppName, "appName", os.Getenv("PIPER_appName"), "Defines the name of the application to be deployed to the Cloud Foundry space")
 | |
| 	cmd.Flags().StringVar(&stepConfig.ArtifactVersion, "artifactVersion", os.Getenv("PIPER_artifactVersion"), "The artifact version, used for influx reporting")
 | |
| 	cmd.Flags().StringVar(&stepConfig.CommitHash, "commitHash", os.Getenv("PIPER_commitHash"), "The commit hash, used for influx reporting")
 | |
| 	cmd.Flags().StringVar(&stepConfig.CfHome, "cfHome", os.Getenv("PIPER_cfHome"), "The cf home folder used by the cf cli. If not provided the default assumed by the cf cli is used.")
 | |
| 	cmd.Flags().StringVar(&stepConfig.CfNativeDeployParameters, "cfNativeDeployParameters", os.Getenv("PIPER_cfNativeDeployParameters"), "Additional parameters passed to cf native deployment command")
 | |
| 	cmd.Flags().StringVar(&stepConfig.CfPluginHome, "cfPluginHome", os.Getenv("PIPER_cfPluginHome"), "The cf plugin home folder used by the cf cli. If not provided the default assumed by the cf cli is used.")
 | |
| 	cmd.Flags().StringVar(&stepConfig.DeployDockerImage, "deployDockerImage", os.Getenv("PIPER_deployDockerImage"), "Docker image deployments are supported (via manifest file in general)[https://docs.cloudfoundry.org/devguide/deploy-apps/manifest-attributes.html#docker]. If no manifest is used, this parameter defines the image to be deployed. The specified name of the image is passed to the `--docker-image` parameter of the cf CLI and must adhere it's naming pattern (e.g. REPO/IMAGE:TAG). See (cf CLI documentation)[https://docs.cloudfoundry.org/devguide/deploy-apps/push-docker.html] for details. Note: The used Docker registry must be visible for the targeted Cloud Foundry instance.")
 | |
| 	cmd.Flags().StringVar(&stepConfig.DeployTool, "deployTool", os.Getenv("PIPER_deployTool"), "Defines the tool which should be used for deployment.")
 | |
| 	cmd.Flags().StringVar(&stepConfig.BuildTool, "buildTool", os.Getenv("PIPER_buildTool"), "Defines the tool which is used for building the artifact. If provided, `deployTool` is automatically derived from it. For MTA projects, `deployTool` defaults to `mtaDeployPlugin`. For other projects `cf_native` will be used.")
 | |
| 	cmd.Flags().StringVar(&stepConfig.DeployType, "deployType", `standard`, "Defines the type of deployment, either `standard` deployment which results in a system downtime or a zero-downtime `blue-green` deployment.If 'cf_native' as deployType and 'blue-green' as deployTool is used in combination, your manifest.yaml may only contain one application. If this application has the option 'no-route' active the deployType will be changed to 'standard'.")
 | |
| 	cmd.Flags().StringVar(&stepConfig.DockerPassword, "dockerPassword", os.Getenv("PIPER_dockerPassword"), "If the specified image in `deployDockerImage` is contained in a Docker registry, which requires authorization, this defines the password to be used.")
 | |
| 	cmd.Flags().StringVar(&stepConfig.DockerUsername, "dockerUsername", os.Getenv("PIPER_dockerUsername"), "If the specified image in `deployDockerImage` is contained in a Docker registry, which requires authorization, this defines the username to be used.")
 | |
| 	cmd.Flags().BoolVar(&stepConfig.KeepOldInstance, "keepOldInstance", false, "In case of a `blue-green` deployment the old instance will be deleted by default. If this option is set to true the old instance will remain stopped in the Cloud Foundry space.")
 | |
| 	cmd.Flags().StringVar(&stepConfig.LoginParameters, "loginParameters", os.Getenv("PIPER_loginParameters"), "Addition command line options for cf login command. No escaping/quoting is performed. Not recommended for productive environments.")
 | |
| 	cmd.Flags().StringVar(&stepConfig.Manifest, "manifest", os.Getenv("PIPER_manifest"), "Defines the manifest to be used for deployment to Cloud Foundry.")
 | |
| 	cmd.Flags().StringSliceVar(&stepConfig.ManifestVariables, "manifestVariables", []string{}, "Defines a list of variables in the form `key=value` which are used for variable substitution within the file given by manifest.")
 | |
| 	cmd.Flags().StringSliceVar(&stepConfig.ManifestVariablesFiles, "manifestVariablesFiles", []string{`manifest-variables.yml`}, "path(s) of the Yaml file(s) containing the variable values to use as a replacement in the manifest file. The order of the files is relevant in case there are conflicting variable names and values within variable files. In such a case, the values of the last file win.")
 | |
| 	cmd.Flags().StringVar(&stepConfig.MtaDeployParameters, "mtaDeployParameters", `-f`, "Additional parameters passed to mta deployment command")
 | |
| 	cmd.Flags().StringVar(&stepConfig.MtaExtensionDescriptor, "mtaExtensionDescriptor", os.Getenv("PIPER_mtaExtensionDescriptor"), "Defines additional extension descriptor file for deployment with the mtaDeployPlugin")
 | |
| 
 | |
| 	cmd.Flags().StringVar(&stepConfig.MtaPath, "mtaPath", os.Getenv("PIPER_mtaPath"), "Defines the path to *.mtar for deployment with the mtaDeployPlugin")
 | |
| 	cmd.Flags().StringVar(&stepConfig.Org, "org", os.Getenv("PIPER_org"), "Cloud Foundry target organization.")
 | |
| 	cmd.Flags().StringVar(&stepConfig.Password, "password", os.Getenv("PIPER_password"), "Password")
 | |
| 	cmd.Flags().StringVar(&stepConfig.SmokeTestScript, "smokeTestScript", `blueGreenCheckScript.sh`, "Allows to specify a script which performs a check during blue-green deployment. The script gets the FQDN as parameter and returns `exit code 0` in case check returned `smokeTestStatusCode`. More details can be found [here](https://github.com/bluemixgaragelondon/cf-blue-green-deploy#how-to-use). Currently this option is only considered for deployTool `cf_native`.")
 | |
| 	cmd.Flags().IntVar(&stepConfig.SmokeTestStatusCode, "smokeTestStatusCode", 200, "Expected status code returned by the check.")
 | |
| 	cmd.Flags().StringVar(&stepConfig.Space, "space", os.Getenv("PIPER_space"), "Cloud Foundry target space")
 | |
| 	cmd.Flags().StringVar(&stepConfig.Username, "username", os.Getenv("PIPER_username"), "User name used for deployment")
 | |
| 
 | |
| 	cmd.MarkFlagRequired("apiEndpoint")
 | |
| 	cmd.MarkFlagRequired("org")
 | |
| 	cmd.MarkFlagRequired("password")
 | |
| 	cmd.MarkFlagRequired("space")
 | |
| 	cmd.MarkFlagRequired("username")
 | |
| }
 | |
| 
 | |
| // retrieve step metadata
 | |
| func cloudFoundryDeployMetadata() config.StepData {
 | |
| 	var theMetaData = config.StepData{
 | |
| 		Metadata: config.StepMetadata{
 | |
| 			Name:        "cloudFoundryDeploy",
 | |
| 			Aliases:     []config.Alias{},
 | |
| 			Description: "Deploys an application to Cloud Foundry",
 | |
| 		},
 | |
| 		Spec: config.StepSpec{
 | |
| 			Inputs: config.StepInputs{
 | |
| 				Secrets: []config.StepSecrets{
 | |
| 					{Name: "cfCredentialsId", Description: "Jenkins 'Username with password' credentials ID containing user and password to authenticate to the Cloud Foundry API.", Type: "jenkins", Aliases: []config.Alias{{Name: "cloudFoundry/credentialsId", Deprecated: true}}},
 | |
| 					{Name: "dockerCredentialsId", Description: "Jenkins 'Username with password' credentials ID containing user and password to authenticate to the Docker registry.", Type: "jenkins"},
 | |
| 				},
 | |
| 				Parameters: []config.StepParameters{
 | |
| 					{
 | |
| 						Name:        "apiEndpoint",
 | |
| 						ResourceRef: []config.ResourceReference{},
 | |
| 						Scope:       []string{"PARAMETERS", "STAGES", "STEPS", "GENERAL"},
 | |
| 						Type:        "string",
 | |
| 						Mandatory:   true,
 | |
| 						Aliases:     []config.Alias{{Name: "cfApiEndpoint"}, {Name: "cloudFoundry/apiEndpoint", Deprecated: true}},
 | |
| 						Default:     `https://api.cf.eu10.hana.ondemand.com`,
 | |
| 					},
 | |
| 					{
 | |
| 						Name:        "appName",
 | |
| 						ResourceRef: []config.ResourceReference{},
 | |
| 						Scope:       []string{"PARAMETERS", "STAGES", "STEPS", "GENERAL"},
 | |
| 						Type:        "string",
 | |
| 						Mandatory:   false,
 | |
| 						Aliases:     []config.Alias{{Name: "cfAppName"}, {Name: "cloudFoundry/appName", Deprecated: true}},
 | |
| 						Default:     os.Getenv("PIPER_appName"),
 | |
| 					},
 | |
| 					{
 | |
| 						Name: "artifactVersion",
 | |
| 						ResourceRef: []config.ResourceReference{
 | |
| 							{
 | |
| 								Name:  "commonPipelineEnvironment",
 | |
| 								Param: "artifactVersion",
 | |
| 							},
 | |
| 						},
 | |
| 						Scope:     []string{"PARAMETERS", "STAGES", "STEPS", "GENERAL"},
 | |
| 						Type:      "string",
 | |
| 						Mandatory: false,
 | |
| 						Aliases:   []config.Alias{},
 | |
| 						Default:   os.Getenv("PIPER_artifactVersion"),
 | |
| 					},
 | |
| 					{
 | |
| 						Name: "commitHash",
 | |
| 						ResourceRef: []config.ResourceReference{
 | |
| 							{
 | |
| 								Name:  "commonPipelineEnvironment",
 | |
| 								Param: "git/headCommitId",
 | |
| 							},
 | |
| 						},
 | |
| 						Scope:     []string{"PARAMETERS", "STAGES", "STEPS", "GENERAL"},
 | |
| 						Type:      "string",
 | |
| 						Mandatory: false,
 | |
| 						Aliases:   []config.Alias{},
 | |
| 						Default:   os.Getenv("PIPER_commitHash"),
 | |
| 					},
 | |
| 					{
 | |
| 						Name:        "cfHome",
 | |
| 						ResourceRef: []config.ResourceReference{},
 | |
| 						Scope:       []string{"PARAMETERS", "STAGES", "STEPS", "GENERAL"},
 | |
| 						Type:        "string",
 | |
| 						Mandatory:   false,
 | |
| 						Aliases:     []config.Alias{},
 | |
| 						Default:     os.Getenv("PIPER_cfHome"),
 | |
| 					},
 | |
| 					{
 | |
| 						Name:        "cfNativeDeployParameters",
 | |
| 						ResourceRef: []config.ResourceReference{},
 | |
| 						Scope:       []string{"PARAMETERS", "STAGES", "STEPS", "GENERAL"},
 | |
| 						Type:        "string",
 | |
| 						Mandatory:   false,
 | |
| 						Aliases:     []config.Alias{},
 | |
| 						Default:     os.Getenv("PIPER_cfNativeDeployParameters"),
 | |
| 					},
 | |
| 					{
 | |
| 						Name:        "cfPluginHome",
 | |
| 						ResourceRef: []config.ResourceReference{},
 | |
| 						Scope:       []string{"PARAMETERS", "STAGES", "STEPS", "GENERAL"},
 | |
| 						Type:        "string",
 | |
| 						Mandatory:   false,
 | |
| 						Aliases:     []config.Alias{},
 | |
| 						Default:     os.Getenv("PIPER_cfPluginHome"),
 | |
| 					},
 | |
| 					{
 | |
| 						Name:        "deployDockerImage",
 | |
| 						ResourceRef: []config.ResourceReference{},
 | |
| 						Scope:       []string{"PARAMETERS", "STAGES", "STEPS", "GENERAL"},
 | |
| 						Type:        "string",
 | |
| 						Mandatory:   false,
 | |
| 						Aliases:     []config.Alias{},
 | |
| 						Default:     os.Getenv("PIPER_deployDockerImage"),
 | |
| 					},
 | |
| 					{
 | |
| 						Name:        "deployTool",
 | |
| 						ResourceRef: []config.ResourceReference{},
 | |
| 						Scope:       []string{"PARAMETERS", "STAGES", "STEPS", "GENERAL"},
 | |
| 						Type:        "string",
 | |
| 						Mandatory:   false,
 | |
| 						Aliases:     []config.Alias{},
 | |
| 						Default:     os.Getenv("PIPER_deployTool"),
 | |
| 					},
 | |
| 					{
 | |
| 						Name: "buildTool",
 | |
| 						ResourceRef: []config.ResourceReference{
 | |
| 							{
 | |
| 								Name:  "commonPipelineEnvironment",
 | |
| 								Param: "buildTool",
 | |
| 							},
 | |
| 						},
 | |
| 						Scope:     []string{"PARAMETERS", "STAGES", "STEPS", "GENERAL"},
 | |
| 						Type:      "string",
 | |
| 						Mandatory: false,
 | |
| 						Aliases:   []config.Alias{},
 | |
| 						Default:   os.Getenv("PIPER_buildTool"),
 | |
| 					},
 | |
| 					{
 | |
| 						Name:        "deployType",
 | |
| 						ResourceRef: []config.ResourceReference{},
 | |
| 						Scope:       []string{"PARAMETERS", "STAGES", "STEPS", "GENERAL"},
 | |
| 						Type:        "string",
 | |
| 						Mandatory:   false,
 | |
| 						Aliases:     []config.Alias{},
 | |
| 						Default:     `standard`,
 | |
| 					},
 | |
| 					{
 | |
| 						Name: "dockerPassword",
 | |
| 						ResourceRef: []config.ResourceReference{
 | |
| 							{
 | |
| 								Name:  "dockerCredentialsId",
 | |
| 								Param: "password",
 | |
| 								Type:  "secret",
 | |
| 							},
 | |
| 						},
 | |
| 						Scope:     []string{"PARAMETERS", "STAGES", "STEPS"},
 | |
| 						Type:      "string",
 | |
| 						Mandatory: false,
 | |
| 						Aliases:   []config.Alias{},
 | |
| 						Default:   os.Getenv("PIPER_dockerPassword"),
 | |
| 					},
 | |
| 					{
 | |
| 						Name: "dockerUsername",
 | |
| 						ResourceRef: []config.ResourceReference{
 | |
| 							{
 | |
| 								Name:  "dockerCredentialsId",
 | |
| 								Param: "username",
 | |
| 								Type:  "secret",
 | |
| 							},
 | |
| 						},
 | |
| 						Scope:     []string{"PARAMETERS", "STAGES", "STEPS"},
 | |
| 						Type:      "string",
 | |
| 						Mandatory: false,
 | |
| 						Aliases:   []config.Alias{},
 | |
| 						Default:   os.Getenv("PIPER_dockerUsername"),
 | |
| 					},
 | |
| 					{
 | |
| 						Name:        "keepOldInstance",
 | |
| 						ResourceRef: []config.ResourceReference{},
 | |
| 						Scope:       []string{"PARAMETERS", "STAGES", "STEPS"},
 | |
| 						Type:        "bool",
 | |
| 						Mandatory:   false,
 | |
| 						Aliases:     []config.Alias{},
 | |
| 						Default:     false,
 | |
| 					},
 | |
| 					{
 | |
| 						Name:        "loginParameters",
 | |
| 						ResourceRef: []config.ResourceReference{},
 | |
| 						Scope:       []string{"PARAMETERS", "STAGES", "STEPS", "GENERAL"},
 | |
| 						Type:        "string",
 | |
| 						Mandatory:   false,
 | |
| 						Aliases:     []config.Alias{},
 | |
| 						Default:     os.Getenv("PIPER_loginParameters"),
 | |
| 					},
 | |
| 					{
 | |
| 						Name:        "manifest",
 | |
| 						ResourceRef: []config.ResourceReference{},
 | |
| 						Scope:       []string{"PARAMETERS", "STAGES", "STEPS", "GENERAL"},
 | |
| 						Type:        "string",
 | |
| 						Mandatory:   false,
 | |
| 						Aliases:     []config.Alias{{Name: "cfManifest"}, {Name: "cloudFoundry/manifest", Deprecated: true}},
 | |
| 						Default:     os.Getenv("PIPER_manifest"),
 | |
| 					},
 | |
| 					{
 | |
| 						Name:        "manifestVariables",
 | |
| 						ResourceRef: []config.ResourceReference{},
 | |
| 						Scope:       []string{"PARAMETERS", "STAGES", "STEPS", "GENERAL"},
 | |
| 						Type:        "[]string",
 | |
| 						Mandatory:   false,
 | |
| 						Aliases:     []config.Alias{{Name: "cfManifestVariables"}, {Name: "cloudFoundry/manifestVariables", Deprecated: true}},
 | |
| 						Default:     []string{},
 | |
| 					},
 | |
| 					{
 | |
| 						Name:        "manifestVariablesFiles",
 | |
| 						ResourceRef: []config.ResourceReference{},
 | |
| 						Scope:       []string{"PARAMETERS", "STAGES", "STEPS", "GENERAL"},
 | |
| 						Type:        "[]string",
 | |
| 						Mandatory:   false,
 | |
| 						Aliases:     []config.Alias{{Name: "cfManifestVariablesFiles"}, {Name: "cloudFoundry/manifestVariablesFiles", Deprecated: true}},
 | |
| 						Default:     []string{`manifest-variables.yml`},
 | |
| 					},
 | |
| 					{
 | |
| 						Name:        "mtaDeployParameters",
 | |
| 						ResourceRef: []config.ResourceReference{},
 | |
| 						Scope:       []string{"PARAMETERS", "STAGES", "STEPS", "GENERAL"},
 | |
| 						Type:        "string",
 | |
| 						Mandatory:   false,
 | |
| 						Aliases:     []config.Alias{},
 | |
| 						Default:     `-f`,
 | |
| 					},
 | |
| 					{
 | |
| 						Name:        "mtaExtensionDescriptor",
 | |
| 						ResourceRef: []config.ResourceReference{},
 | |
| 						Scope:       []string{"PARAMETERS", "STAGES", "STEPS", "GENERAL"},
 | |
| 						Type:        "string",
 | |
| 						Mandatory:   false,
 | |
| 						Aliases:     []config.Alias{{Name: "cloudFoundry/mtaExtensionDescriptor", Deprecated: true}},
 | |
| 						Default:     os.Getenv("PIPER_mtaExtensionDescriptor"),
 | |
| 					},
 | |
| 					{
 | |
| 						Name:        "mtaExtensionCredentials",
 | |
| 						ResourceRef: []config.ResourceReference{},
 | |
| 						Scope:       []string{"PARAMETERS", "STAGES", "STEPS", "GENERAL"},
 | |
| 						Type:        "map[string]interface{}",
 | |
| 						Mandatory:   false,
 | |
| 						Aliases:     []config.Alias{{Name: "cloudFoundry/mtaExtensionCredentials", Deprecated: true}},
 | |
| 					},
 | |
| 					{
 | |
| 						Name: "mtaPath",
 | |
| 						ResourceRef: []config.ResourceReference{
 | |
| 							{
 | |
| 								Name:  "commonPipelineEnvironment",
 | |
| 								Param: "mtarFilePath",
 | |
| 							},
 | |
| 						},
 | |
| 						Scope:     []string{"PARAMETERS", "STAGES", "STEPS", "GENERAL"},
 | |
| 						Type:      "string",
 | |
| 						Mandatory: false,
 | |
| 						Aliases:   []config.Alias{},
 | |
| 						Default:   os.Getenv("PIPER_mtaPath"),
 | |
| 					},
 | |
| 					{
 | |
| 						Name:        "org",
 | |
| 						ResourceRef: []config.ResourceReference{},
 | |
| 						Scope:       []string{"PARAMETERS", "STAGES", "STEPS", "GENERAL"},
 | |
| 						Type:        "string",
 | |
| 						Mandatory:   true,
 | |
| 						Aliases:     []config.Alias{{Name: "cfOrg"}, {Name: "cloudFoundry/org", Deprecated: true}},
 | |
| 						Default:     os.Getenv("PIPER_org"),
 | |
| 					},
 | |
| 					{
 | |
| 						Name: "password",
 | |
| 						ResourceRef: []config.ResourceReference{
 | |
| 							{
 | |
| 								Name:  "cfCredentialsId",
 | |
| 								Param: "password",
 | |
| 								Type:  "secret",
 | |
| 							},
 | |
| 
 | |
| 							{
 | |
| 								Name:    "cloudfoundryVaultSecretName",
 | |
| 								Type:    "vaultSecret",
 | |
| 								Default: "cloudfoundry-$(org)-$(space)",
 | |
| 							},
 | |
| 						},
 | |
| 						Scope:     []string{"PARAMETERS", "STAGES", "STEPS"},
 | |
| 						Type:      "string",
 | |
| 						Mandatory: true,
 | |
| 						Aliases:   []config.Alias{},
 | |
| 						Default:   os.Getenv("PIPER_password"),
 | |
| 					},
 | |
| 					{
 | |
| 						Name:        "smokeTestScript",
 | |
| 						ResourceRef: []config.ResourceReference{},
 | |
| 						Scope:       []string{"PARAMETERS", "STAGES", "STEPS", "GENERAL"},
 | |
| 						Type:        "string",
 | |
| 						Mandatory:   false,
 | |
| 						Aliases:     []config.Alias{},
 | |
| 						Default:     `blueGreenCheckScript.sh`,
 | |
| 					},
 | |
| 					{
 | |
| 						Name:        "smokeTestStatusCode",
 | |
| 						ResourceRef: []config.ResourceReference{},
 | |
| 						Scope:       []string{"PARAMETERS", "STAGES", "STEPS", "GENERAL"},
 | |
| 						Type:        "int",
 | |
| 						Mandatory:   false,
 | |
| 						Aliases:     []config.Alias{},
 | |
| 						Default:     200,
 | |
| 					},
 | |
| 					{
 | |
| 						Name:        "space",
 | |
| 						ResourceRef: []config.ResourceReference{},
 | |
| 						Scope:       []string{"PARAMETERS", "STAGES", "STEPS", "GENERAL"},
 | |
| 						Type:        "string",
 | |
| 						Mandatory:   true,
 | |
| 						Aliases:     []config.Alias{{Name: "cfSpace"}, {Name: "cloudFoundry/space", Deprecated: true}},
 | |
| 						Default:     os.Getenv("PIPER_space"),
 | |
| 					},
 | |
| 					{
 | |
| 						Name: "username",
 | |
| 						ResourceRef: []config.ResourceReference{
 | |
| 							{
 | |
| 								Name:  "cfCredentialsId",
 | |
| 								Param: "username",
 | |
| 								Type:  "secret",
 | |
| 							},
 | |
| 
 | |
| 							{
 | |
| 								Name:    "cloudfoundryVaultSecretName",
 | |
| 								Type:    "vaultSecret",
 | |
| 								Default: "cloudfoundry-$(org)-$(space)",
 | |
| 							},
 | |
| 						},
 | |
| 						Scope:     []string{"PARAMETERS", "STAGES", "STEPS"},
 | |
| 						Type:      "string",
 | |
| 						Mandatory: true,
 | |
| 						Aliases:   []config.Alias{},
 | |
| 						Default:   os.Getenv("PIPER_username"),
 | |
| 					},
 | |
| 				},
 | |
| 			},
 | |
| 			Containers: []config.Container{
 | |
| 				{Name: "cfDeploy", Image: "ppiper/cf-cli:latest"},
 | |
| 			},
 | |
| 			Outputs: config.StepOutputs{
 | |
| 				Resources: []config.StepResources{
 | |
| 					{
 | |
| 						Name: "influx",
 | |
| 						Type: "influx",
 | |
| 						Parameters: []map[string]interface{}{
 | |
| 							{"name": "deployment_data", "fields": []map[string]string{{"name": "artifactUrl"}, {"name": "deployTime"}, {"name": "commitHash"}, {"name": "jobTrigger"}}, "tags": []map[string]string{{"name": "artifactVersion"}, {"name": "deployUser"}, {"name": "deployResult"}, {"name": "cfApiEndpoint"}, {"name": "cfOrg"}, {"name": "cfSpace"}}},
 | |
| 						},
 | |
| 					},
 | |
| 				},
 | |
| 			},
 | |
| 		},
 | |
| 	}
 | |
| 	return theMetaData
 | |
| }
 |