mirror of
https://github.com/SAP/jenkins-library.git
synced 2024-12-12 10:55:20 +02:00
78a29d782b
* Switch to service key for CPI GetMplStatus
Introduces read method for service key files, mock utils and tests.
* Use secret text instead of file
* Change serviceKey definition
* Update cpiUpload to use Service Key
retrieved the host and uaa information from service key
* Update cpiDeploy to use service key
retrieved the host and uaa information from service key
* Update cpiServiceEndpoint to use Service Key
retrieved the host and uaa information from service key
* Update cpiDownload to use Service Key
retrieved the host and uaa information from service key
* Update cpiUpdateConfig to use Service Key
retrieved the host and uaa information from service key
* Refactor serviceKey var name
* Fixed references to service key to follow the real format
they should be accessed through oauth instead of uaa because of the format of the json
* Rename ServiceKey to APIServiceKey
To support having a different service key(and for readability), we need to change the name to API.
* Add STAGES and STEPS yaml
add in to each yaml file of cpi integration
* Revert "Add STAGES and STEPS yaml"
This reverts commit aa2665d158
.
* Change comments/formatting commonUtils
Make comments more understandable and follow code climate suggestions
* Change documentation files for steps
remove OAuth and host and change credentials to be servicekey
Co-authored-by: Oliver Feldmann <oliver.feldmann@sap.com>
Co-authored-by: Thorsten Duda <thorsten.duda@sap.com>
213 lines
9.4 KiB
Go
213 lines
9.4 KiB
Go
package cmd
|
|
|
|
import (
|
|
"bytes"
|
|
b64 "encoding/base64"
|
|
"encoding/json"
|
|
"fmt"
|
|
"io/ioutil"
|
|
"net/http"
|
|
|
|
"github.com/Jeffail/gabs/v2"
|
|
"github.com/SAP/jenkins-library/pkg/command"
|
|
"github.com/SAP/jenkins-library/pkg/cpi"
|
|
piperhttp "github.com/SAP/jenkins-library/pkg/http"
|
|
"github.com/SAP/jenkins-library/pkg/log"
|
|
"github.com/SAP/jenkins-library/pkg/piperutils"
|
|
"github.com/SAP/jenkins-library/pkg/telemetry"
|
|
"github.com/pkg/errors"
|
|
)
|
|
|
|
type integrationArtifactUploadUtils interface {
|
|
command.ExecRunner
|
|
|
|
// Add more methods here, or embed additional interfaces, or remove/replace as required.
|
|
// The integrationArtifactUploadUtils interface should be descriptive of your runtime dependencies,
|
|
// i.e. include everything you need to be able to mock in tests.
|
|
// Unit tests shall be executable in parallel (not depend on global state), and don't (re-)test dependencies.
|
|
}
|
|
|
|
type integrationArtifactUploadUtilsBundle struct {
|
|
*command.Command
|
|
|
|
// Embed more structs as necessary to implement methods or interfaces you add to integrationArtifactUploadUtils.
|
|
// Structs embedded in this way must each have a unique set of methods attached.
|
|
// If there is no struct which implements the method you need, attach the method to
|
|
// integrationArtifactUploadUtilsBundle and forward to the implementation of the dependency.
|
|
}
|
|
|
|
func newIntegrationArtifactUploadUtils() integrationArtifactUploadUtils {
|
|
utils := integrationArtifactUploadUtilsBundle{
|
|
Command: &command.Command{},
|
|
}
|
|
// Reroute command output to logging framework
|
|
utils.Stdout(log.Writer())
|
|
utils.Stderr(log.Writer())
|
|
return &utils
|
|
}
|
|
|
|
func integrationArtifactUpload(config integrationArtifactUploadOptions, telemetryData *telemetry.CustomData) {
|
|
// Utils can be used wherever the command.ExecRunner interface is expected.
|
|
// It can also be used for example as a mavenExecRunner.
|
|
httpClient := &piperhttp.Client{}
|
|
fileUtils := &piperutils.Files{}
|
|
// For HTTP calls import piperhttp "github.com/SAP/jenkins-library/pkg/http"
|
|
// and use a &piperhttp.Client{} in a custom system
|
|
// Example: step checkmarxExecuteScan.go
|
|
|
|
// Error situations should be bubbled up until they reach the line below which will then stop execution
|
|
// through the log.Entry().Fatal() call leading to an os.Exit(1) in the end.
|
|
err := runIntegrationArtifactUpload(&config, telemetryData, fileUtils, httpClient)
|
|
if err != nil {
|
|
log.Entry().WithError(err).Fatal("step execution failed")
|
|
}
|
|
}
|
|
|
|
func runIntegrationArtifactUpload(config *integrationArtifactUploadOptions, telemetryData *telemetry.CustomData, fileUtils piperutils.FileUtils, httpClient piperhttp.Sender) error {
|
|
|
|
serviceKey, err := cpi.ReadCpiServiceKey(config.APIServiceKey)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
clientOptions := piperhttp.ClientOptions{}
|
|
header := make(http.Header)
|
|
header.Add("Accept", "application/json")
|
|
iFlowStatusServiceURL := fmt.Sprintf("%s/api/v1/IntegrationDesigntimeArtifacts(Id='%s',Version='%s')", serviceKey.OAuth.Host, config.IntegrationFlowID, config.IntegrationFlowVersion)
|
|
tokenParameters := cpi.TokenParameters{TokenURL: serviceKey.OAuth.OAuthTokenProviderURL, Username: serviceKey.OAuth.ClientID, Password: serviceKey.OAuth.ClientSecret, Client: httpClient}
|
|
token, err := cpi.CommonUtils.GetBearerToken(tokenParameters)
|
|
if err != nil {
|
|
return errors.Wrap(err, "failed to fetch Bearer Token")
|
|
}
|
|
clientOptions.Token = fmt.Sprintf("Bearer %s", token)
|
|
httpClient.SetOptions(clientOptions)
|
|
httpMethod := "GET"
|
|
|
|
//Check availability of integration artefact in CPI design time
|
|
iFlowStatusResp, httpErr := httpClient.SendRequest(httpMethod, iFlowStatusServiceURL, nil, header, nil)
|
|
|
|
if iFlowStatusResp != nil && iFlowStatusResp.Body != nil {
|
|
defer iFlowStatusResp.Body.Close()
|
|
}
|
|
if iFlowStatusResp.StatusCode == 200 {
|
|
return UpdateIntegrationArtifact(config, httpClient, fileUtils, serviceKey.OAuth.Host)
|
|
} else if httpErr != nil && iFlowStatusResp.StatusCode == 404 {
|
|
return UploadIntegrationArtifact(config, httpClient, fileUtils, serviceKey.OAuth.Host)
|
|
}
|
|
|
|
if iFlowStatusResp == nil {
|
|
return errors.Errorf("did not retrieve a HTTP response: %v", httpErr)
|
|
}
|
|
|
|
if httpErr != nil {
|
|
responseBody, readErr := ioutil.ReadAll(iFlowStatusResp.Body)
|
|
if readErr != nil {
|
|
return errors.Wrapf(readErr, "HTTP response body could not be read, Response status code: %v", iFlowStatusResp.StatusCode)
|
|
}
|
|
log.Entry().Errorf("a HTTP error occurred! Response body: %v, Response status code: %v", responseBody, iFlowStatusResp.StatusCode)
|
|
return errors.Wrapf(httpErr, "HTTP %v request to %v failed with error: %v", httpMethod, iFlowStatusServiceURL, string(responseBody))
|
|
}
|
|
return errors.Errorf("Failed to check integration flow availability, Response Status code: %v", iFlowStatusResp.StatusCode)
|
|
}
|
|
|
|
//UploadIntegrationArtifact - Upload new integration artifact
|
|
func UploadIntegrationArtifact(config *integrationArtifactUploadOptions, httpClient piperhttp.Sender, fileUtils piperutils.FileUtils, apiHost string) error {
|
|
httpMethod := "POST"
|
|
uploadIflowStatusURL := fmt.Sprintf("%s/api/v1/IntegrationDesigntimeArtifacts", apiHost)
|
|
header := make(http.Header)
|
|
header.Add("content-type", "application/json")
|
|
payload, jsonError := GetJSONPayloadAsByteArray(config, "create", fileUtils)
|
|
if jsonError != nil {
|
|
return errors.Wrapf(jsonError, "Failed to get json payload for file %v, failed with error", config.FilePath)
|
|
}
|
|
|
|
uploadIflowStatusResp, httpErr := httpClient.SendRequest(httpMethod, uploadIflowStatusURL, payload, header, nil)
|
|
|
|
if uploadIflowStatusResp != nil && uploadIflowStatusResp.Body != nil {
|
|
defer uploadIflowStatusResp.Body.Close()
|
|
}
|
|
|
|
if uploadIflowStatusResp == nil {
|
|
return errors.Errorf("did not retrieve a HTTP response: %v", httpErr)
|
|
}
|
|
|
|
if uploadIflowStatusResp.StatusCode == http.StatusCreated {
|
|
log.Entry().
|
|
WithField("IntegrationFlowID", config.IntegrationFlowID).
|
|
Info("Successfully created integration flow artefact in CPI designtime")
|
|
return nil
|
|
}
|
|
if httpErr != nil {
|
|
responseBody, readErr := ioutil.ReadAll(uploadIflowStatusResp.Body)
|
|
if readErr != nil {
|
|
return errors.Wrapf(readErr, "HTTP response body could not be read, Response status code: %v", uploadIflowStatusResp.StatusCode)
|
|
}
|
|
log.Entry().Errorf("a HTTP error occurred! Response body: %v, Response status code: %v", responseBody, uploadIflowStatusResp.StatusCode)
|
|
return errors.Wrapf(httpErr, "HTTP %v request to %v failed with error: %v", httpMethod, uploadIflowStatusURL, string(responseBody))
|
|
}
|
|
return errors.Errorf("Failed to create Integration Flow artefact, Response Status code: %v", uploadIflowStatusResp.StatusCode)
|
|
}
|
|
|
|
//UpdateIntegrationArtifact - Update existing integration artifact
|
|
func UpdateIntegrationArtifact(config *integrationArtifactUploadOptions, httpClient piperhttp.Sender, fileUtils piperutils.FileUtils, apiHost string) error {
|
|
httpMethod := "POST"
|
|
header := make(http.Header)
|
|
header.Add("content-type", "application/json")
|
|
updateIflowStatusURL := fmt.Sprintf("%s/api/v1/IntegrationDesigntimeArtifactSaveAsVersion?Id='%s'&SaveAsVersion='%s'", apiHost, config.IntegrationFlowID, config.IntegrationFlowVersion)
|
|
payload, jsonError := GetJSONPayloadAsByteArray(config, "update", fileUtils)
|
|
if jsonError != nil {
|
|
return errors.Wrapf(jsonError, "Failed to get json payload for file %v, failed with error", config.FilePath)
|
|
}
|
|
updateIflowStatusResp, httpErr := httpClient.SendRequest(httpMethod, updateIflowStatusURL, payload, header, nil)
|
|
|
|
if updateIflowStatusResp != nil && updateIflowStatusResp.Body != nil {
|
|
defer updateIflowStatusResp.Body.Close()
|
|
}
|
|
|
|
if updateIflowStatusResp == nil {
|
|
return errors.Errorf("did not retrieve a HTTP response: %v", httpErr)
|
|
}
|
|
|
|
if updateIflowStatusResp.StatusCode == http.StatusOK {
|
|
log.Entry().
|
|
WithField("IntegrationFlowID", config.IntegrationFlowID).
|
|
Info("Successfully updated integration flow artefact in CPI designtime")
|
|
return nil
|
|
}
|
|
if httpErr != nil {
|
|
responseBody, readErr := ioutil.ReadAll(updateIflowStatusResp.Body)
|
|
if readErr != nil {
|
|
return errors.Wrapf(readErr, "HTTP response body could not be read, Response status code: %v", updateIflowStatusResp.StatusCode)
|
|
}
|
|
log.Entry().Errorf("a HTTP error occurred! Response body: %v, Response status code: %v", responseBody, updateIflowStatusResp.StatusCode)
|
|
return errors.Wrapf(httpErr, "HTTP %v request to %v failed with error: %v", httpMethod, updateIflowStatusURL, string(responseBody))
|
|
}
|
|
return errors.Errorf("Failed to update Integration Flow artefact, Response Status code: %v", updateIflowStatusResp.StatusCode)
|
|
}
|
|
|
|
//GetJSONPayloadAsByteArray -return http payload as byte array
|
|
func GetJSONPayloadAsByteArray(config *integrationArtifactUploadOptions, mode string, fileUtils piperutils.FileUtils) (*bytes.Buffer, error) {
|
|
fileContent, readError := fileUtils.FileRead(config.FilePath)
|
|
if readError != nil {
|
|
return nil, errors.Wrapf(readError, "Error reading file")
|
|
}
|
|
jsonObj := gabs.New()
|
|
if mode == "create" {
|
|
jsonObj.Set(config.IntegrationFlowID, "Name")
|
|
jsonObj.Set(config.IntegrationFlowID, "Id")
|
|
jsonObj.Set(config.PackageID, "PackageId")
|
|
jsonObj.Set(b64.StdEncoding.EncodeToString(fileContent), "ArtifactContent")
|
|
} else if mode == "update" {
|
|
jsonObj.Set(b64.StdEncoding.EncodeToString(fileContent), "ArtifactContent")
|
|
} else {
|
|
return nil, fmt.Errorf("Unkown node: '%s'", mode)
|
|
}
|
|
|
|
jsonBody, jsonErr := json.Marshal(jsonObj)
|
|
|
|
if jsonErr != nil {
|
|
return nil, errors.Wrapf(jsonErr, "json payload is invalid for integration flow artifact %q", config.IntegrationFlowID)
|
|
}
|
|
return bytes.NewBuffer(jsonBody), nil
|
|
}
|