mirror of
https://github.com/SAP/jenkins-library.git
synced 2024-12-14 11:03:09 +02:00
b509e14afd
* add evaluateFromMavenPom to piper Utils * adapt mavenExecute to accept `returnStdout` as parameter. If configured mavenExecute will return the stdout for further processing * adapt tests of mavenExecute and mavenArtifactVersioning as well as add another exception to CommonStepsTest because mavenExecute will return a String if configured
312 lines
14 KiB
Groovy
312 lines
14 KiB
Groovy
import org.junit.Before
|
|
import org.junit.Rule
|
|
import org.junit.Test
|
|
import org.junit.rules.ExpectedException
|
|
import org.junit.rules.RuleChain
|
|
|
|
import com.sap.piper.GitUtils
|
|
|
|
import hudson.AbortException
|
|
import util.BasePiperTest
|
|
import util.JenkinsCredentialsRule
|
|
import util.JenkinsDockerExecuteRule
|
|
import util.JenkinsEnvironmentRule
|
|
import util.JenkinsLoggingRule
|
|
import util.JenkinsReadMavenPomRule
|
|
import util.JenkinsReadYamlRule
|
|
import util.JenkinsShellCallRule
|
|
import util.JenkinsStepRule
|
|
import util.JenkinsWriteFileRule
|
|
import util.Rules
|
|
|
|
import static org.hamcrest.Matchers.hasItem
|
|
import static org.hamcrest.Matchers.hasItems
|
|
import static org.hamcrest.Matchers.not
|
|
import static org.hamcrest.Matchers.notNullValue
|
|
import static org.hamcrest.Matchers.stringContainsInOrder
|
|
import static org.hamcrest.Matchers.allOf
|
|
import static org.hamcrest.Matchers.containsString
|
|
import static org.hamcrest.Matchers.emptyIterable
|
|
import static org.junit.Assert.assertThat
|
|
|
|
import org.hamcrest.Matchers
|
|
|
|
import static org.junit.Assert.assertEquals
|
|
|
|
class ArtifactSetVersionTest extends BasePiperTest {
|
|
Map dockerParameters
|
|
|
|
def GitUtils gitUtils = new GitUtils() {
|
|
boolean isWorkTreeDirty() {
|
|
return false
|
|
}
|
|
|
|
String getGitCommitIdOrNull() {
|
|
return 'testCommitId'
|
|
}
|
|
}
|
|
|
|
def sshAgentList = []
|
|
|
|
private ExpectedException thrown = ExpectedException.none()
|
|
private JenkinsDockerExecuteRule dockerExecuteRule = new JenkinsDockerExecuteRule(this)
|
|
private JenkinsLoggingRule loggingRule = new JenkinsLoggingRule(this)
|
|
private JenkinsShellCallRule shellRule = new JenkinsShellCallRule(this)
|
|
private JenkinsWriteFileRule writeFileRule = new JenkinsWriteFileRule(this)
|
|
private JenkinsStepRule stepRule = new JenkinsStepRule(this)
|
|
private JenkinsEnvironmentRule environmentRule = new JenkinsEnvironmentRule(this)
|
|
private JenkinsCredentialsRule jenkinsCredentialsRule = new JenkinsCredentialsRule(this)
|
|
|
|
@Rule
|
|
public RuleChain ruleChain = Rules
|
|
.getCommonRules(this)
|
|
.around(new JenkinsReadYamlRule(this))
|
|
.around(thrown)
|
|
.around(loggingRule)
|
|
.around(shellRule)
|
|
.around(new JenkinsReadMavenPomRule(this, 'test/resources/versioning/MavenArtifactVersioning'))
|
|
.around(writeFileRule)
|
|
.around(dockerExecuteRule)
|
|
.around(stepRule)
|
|
.around(jenkinsCredentialsRule)
|
|
.around(environmentRule)
|
|
|
|
@Before
|
|
void init() throws Throwable {
|
|
dockerParameters = [:]
|
|
String version = '1.2.3'
|
|
|
|
nullScript.commonPipelineEnvironment.setArtifactVersion(null)
|
|
nullScript.commonPipelineEnvironment.setGitSshUrl('git@test.url')
|
|
|
|
helper.registerAllowedMethod("sshagent", [List.class, Closure.class], { list, closure ->
|
|
sshAgentList = list
|
|
return closure()
|
|
})
|
|
|
|
shellRule.setReturnValue("mvn --file 'pom.xml' --batch-mode -Dorg.slf4j.simpleLogger.log.org.apache.maven.cli.transfer.Slf4jMavenTransferListener=warn org.apache.maven.plugins:maven-help-plugin:3.1.0:evaluate -Dexpression=project.version -DforceStdout -q", version)
|
|
shellRule.setReturnValue("mvn --file 'snapshot/pom.xml' --batch-mode -Dorg.slf4j.simpleLogger.log.org.apache.maven.cli.transfer.Slf4jMavenTransferListener=warn org.apache.maven.plugins:maven-help-plugin:3.1.0:evaluate -Dexpression=project.version", version)
|
|
shellRule.setReturnValue("date --utc +'%Y%m%d%H%M%S'", '20180101010203')
|
|
shellRule.setReturnValue('git diff --quiet HEAD', 0)
|
|
|
|
helper.registerAllowedMethod('fileExists', [String.class], {true})
|
|
}
|
|
|
|
@Test
|
|
void testVersioningPushViaSSH() {
|
|
stepRule.step.artifactSetVersion(script: stepRule.step, juStabGitUtils: gitUtils, buildTool: 'maven', gitSshUrl: 'myGitSshUrl')
|
|
|
|
assertEquals('1.2.3-20180101010203_testCommitId', environmentRule.env.getArtifactVersion())
|
|
assertEquals('testCommitId', environmentRule.env.getGitCommitId())
|
|
|
|
assertThat(shellRule.shell, hasItem("mvn --file 'pom.xml' --batch-mode -Dorg.slf4j.simpleLogger.log.org.apache.maven.cli.transfer.Slf4jMavenTransferListener=warn versions:set -DnewVersion=1.2.3-20180101010203_testCommitId -DgenerateBackupPoms=false"))
|
|
assertThat(shellRule.shell.join(), stringContainsInOrder([
|
|
"git add .",
|
|
"git commit -m 'update version 1.2.3-20180101010203_testCommitId'",
|
|
'git tag build_1.2.3-20180101010203_testCommitId',
|
|
'git push myGitSshUrl build_1.2.3-20180101010203_testCommitId',
|
|
]
|
|
))
|
|
}
|
|
|
|
|
|
@Test
|
|
void testVersioningNoPush() {
|
|
|
|
stepRule.step.artifactSetVersion(
|
|
script: stepRule.step,
|
|
juStabGitUtils: gitUtils,
|
|
buildTool: 'maven',
|
|
gitPushMode: 'NONE')
|
|
|
|
assertThat(loggingRule.log, containsString('Git push to remote has been skipped.'))
|
|
assertThat(((Iterable)shellRule.shell).join(), not(containsString('push')))
|
|
}
|
|
|
|
@Test
|
|
void testVersioningPushViaHTTPS() {
|
|
|
|
jenkinsCredentialsRule.withCredentials('myGitRepoCredentials', 'me', 'topSecret')
|
|
|
|
stepRule.step.artifactSetVersion(
|
|
script: stepRule.step,
|
|
juStabGitUtils: gitUtils,
|
|
buildTool: 'maven',
|
|
gitHttpsCredentialsId: 'myGitRepoCredentials',
|
|
gitHttpsUrl: 'https://example.org/myGitRepo',
|
|
gitPushMode: 'HTTPS')
|
|
|
|
// closer version checks already performed in test 'testVersioningPushViaSSH', focusing on
|
|
// GIT related assertions here
|
|
|
|
assertThat(shellRule.shell, hasItem("mvn --file 'pom.xml' --batch-mode -Dorg.slf4j.simpleLogger.log.org.apache.maven.cli.transfer.Slf4jMavenTransferListener=warn versions:set -DnewVersion=1.2.3-20180101010203_testCommitId -DgenerateBackupPoms=false"))
|
|
assertThat(((Iterable)shellRule.shell).join(), stringContainsInOrder([
|
|
"git add .",
|
|
"git commit -m 'update version 1.2.3-20180101010203_testCommitId'",
|
|
'git tag build_1.2.3-20180101010203_testCommitId',
|
|
'git push https://me:topSecret@example.org/myGitRepo build_1.2.3-20180101010203_testCommitId',
|
|
]
|
|
))
|
|
}
|
|
|
|
@Test
|
|
void testVersioningPushViaHTTPDisableSSLCheck() {
|
|
|
|
jenkinsCredentialsRule.withCredentials('myGitRepoCredentials', 'me', 'topSecret')
|
|
|
|
stepRule.step.artifactSetVersion(
|
|
script: stepRule.step,
|
|
juStabGitUtils: gitUtils,
|
|
buildTool: 'maven',
|
|
gitHttpsCredentialsId: 'myGitRepoCredentials',
|
|
gitHttpsUrl: 'https://example.org/myGitRepo',
|
|
gitPushMode: 'HTTPS',
|
|
gitDisableSslVerification: true)
|
|
|
|
// closer version checks already performed in test 'testVersioningPushViaSSH', focusing on
|
|
// GIT related assertions here
|
|
|
|
assertThat(((Iterable)shellRule.shell).join(), containsString('-c http.sslVerify=false'))
|
|
}
|
|
|
|
@Test
|
|
void testVersioningPushViaHTTPVerboseMode() {
|
|
|
|
jenkinsCredentialsRule.withCredentials('myGitRepoCredentials', 'me', 'topSecret')
|
|
|
|
stepRule.step.artifactSetVersion(
|
|
script: stepRule.step,
|
|
juStabGitUtils: gitUtils,
|
|
buildTool: 'maven',
|
|
gitHttpsCredentialsId: 'myGitRepoCredentials',
|
|
gitHttpsUrl: 'https://example.org/myGitRepo',
|
|
gitPushMode: 'HTTPS',
|
|
verbose: true)
|
|
|
|
// closer version checks already performed in test 'testVersioningPushViaSSH', focusing on
|
|
// GIT related assertions here
|
|
|
|
assertThat(((Iterable)shellRule.shell).join(), allOf(
|
|
containsString('GIT_CURL_VERBOSE=1'),
|
|
containsString('GIT_TRACE=1'),
|
|
containsString('--verbose'),
|
|
not(containsString('&>/dev/null'))))
|
|
}
|
|
|
|
@Test
|
|
void testVersioningPushViaHTTPSInDebugModeEncodingDoesNotRevealSecrets() {
|
|
|
|
loggingRule.expect('Verbose flag set, but encoded username/password differs from unencoded version. Cannot provide verbose output in this case.')
|
|
loggingRule.expect('Performing git push in quiet mode')
|
|
|
|
jenkinsCredentialsRule.withCredentials('myGitRepoCredentials', 'me', 'top@Secret')
|
|
|
|
stepRule.step.artifactSetVersion(
|
|
script: stepRule.step,
|
|
juStabGitUtils: gitUtils,
|
|
buildTool: 'maven',
|
|
gitHttpsCredentialsId: 'myGitRepoCredentials',
|
|
gitHttpsUrl: 'https://example.org/myGitRepo',
|
|
gitPushMode: 'HTTPS',
|
|
verbose: true)
|
|
|
|
// closer version checks already performed in test 'testVersioningPushViaSSH', focusing on
|
|
// GIT related assertions here
|
|
|
|
assertThat(((Iterable)shellRule.shell).join(), stringContainsInOrder([
|
|
"git add .",
|
|
"git commit -m 'update version 1.2.3-20180101010203_testCommitId'",
|
|
'git tag build_1.2.3-20180101010203_testCommitId',
|
|
'#!/bin/bash -e git push --quiet https://me:top%40Secret@example.org/myGitRepo build_1.2.3-20180101010203_testCommitId &>/dev/null',
|
|
]
|
|
))
|
|
}
|
|
|
|
|
|
@Test
|
|
void testVersioningPushViaHTTPSEncodingDoesNotRevealSecrets() {
|
|
|
|
// Credentials needs to be url encoded. In case that changes the secrets the credentials plugin
|
|
// doesn't hide the secrets anymore in the log. Hence we have to take care that the command is silent.
|
|
// Check for more details how that is handled in the step.
|
|
|
|
loggingRule.expect('Performing git push in quiet mode')
|
|
|
|
jenkinsCredentialsRule.withCredentials('myGitRepoCredentials', 'me', 'top@Secret')
|
|
|
|
stepRule.step.artifactSetVersion(
|
|
script: stepRule.step,
|
|
juStabGitUtils: gitUtils,
|
|
buildTool: 'maven',
|
|
gitHttpsCredentialsId: 'myGitRepoCredentials',
|
|
gitHttpsUrl: 'https://example.org/myGitRepo',
|
|
gitPushMode: 'HTTPS')
|
|
|
|
// closer version checks already performed in test 'testVersioningPushViaSSH', focusing on
|
|
// GIT related assertions here
|
|
|
|
assertThat(((Iterable)shellRule.shell).join(), stringContainsInOrder([
|
|
"git add .",
|
|
"git commit -m 'update version 1.2.3-20180101010203_testCommitId'",
|
|
'git tag build_1.2.3-20180101010203_testCommitId',
|
|
'#!/bin/bash -e git push --quiet https://me:top%40Secret@example.org/myGitRepo build_1.2.3-20180101010203_testCommitId &>/dev/null',
|
|
]
|
|
))
|
|
}
|
|
|
|
@Test
|
|
void testVersioningWithoutCommit() {
|
|
stepRule.step.artifactSetVersion(script: stepRule.step, juStabGitUtils: gitUtils, buildTool: 'maven', commitVersion: false)
|
|
|
|
assertEquals('1.2.3-20180101010203_testCommitId', environmentRule.env.getArtifactVersion())
|
|
assertThat(shellRule.shell, hasItem("mvn --file 'pom.xml' --batch-mode -Dorg.slf4j.simpleLogger.log.org.apache.maven.cli.transfer.Slf4jMavenTransferListener=warn versions:set -DnewVersion=1.2.3-20180101010203_testCommitId -DgenerateBackupPoms=false"))
|
|
assertThat(shellRule.shell, not(hasItem(containsString('commit'))))
|
|
}
|
|
|
|
@Test
|
|
void testVersioningCustomGitUserAndEMail() {
|
|
stepRule.step.artifactSetVersion(script: stepRule.step, juStabGitUtils: gitUtils, buildTool: 'maven', gitSshUrl: 'myGitSshUrl', gitUserEMail: 'test@test.com', gitUserName: 'test')
|
|
|
|
assertThat(shellRule.shell, hasItem(containsString("git -c user.email=\"test@test.com\" -c user.name=\"test\" commit -m 'update version 1.2.3-20180101010203_testCommitId'")))
|
|
}
|
|
|
|
@Test
|
|
void testVersioningWithTimestamp() {
|
|
stepRule.step.artifactSetVersion(script: stepRule.step, juStabGitUtils: gitUtils, buildTool: 'maven', timestamp: '2018')
|
|
assertEquals('1.2.3-2018_testCommitId', environmentRule.env.getArtifactVersion())
|
|
}
|
|
|
|
@Test
|
|
void testVersioningNoBuildTool() {
|
|
thrown.expect(Exception)
|
|
thrown.expectMessage('ERROR - NO VALUE AVAILABLE FOR buildTool')
|
|
stepRule.step.artifactSetVersion(script: stepRule.step, juStabGitUtils: gitUtils)
|
|
}
|
|
|
|
@Test
|
|
void testVersioningWithCustomTemplate() {
|
|
stepRule.step.artifactSetVersion(script: stepRule.step, juStabGitUtils: gitUtils, buildTool: 'maven', versioningTemplate: '${version}-xyz')
|
|
assertEquals('1.2.3-xyz', environmentRule.env.getArtifactVersion())
|
|
}
|
|
|
|
@Test
|
|
void testVersioningWithTypeAppContainer() {
|
|
nullScript.commonPipelineEnvironment.setAppContainerProperty('gitSshUrl', 'git@test.url')
|
|
environmentRule.env.setArtifactVersion('1.2.3-xyz')
|
|
stepRule.step.artifactSetVersion(script: stepRule.step, juStabGitUtils: gitUtils, buildTool: 'docker', artifactType: 'appContainer', dockerVersionSource: 'appVersion')
|
|
assertEquals('1.2.3-xyz', environmentRule.env.getArtifactVersion())
|
|
assertEquals('1.2.3-xyz', writeFileRule.files['VERSION'])
|
|
}
|
|
|
|
@Test
|
|
void testCredentialCompatibility() {
|
|
stepRule.step.artifactSetVersion (
|
|
script: nullScript,
|
|
buildTool: 'maven',
|
|
gitCredentialsId: 'testCredentials',
|
|
juStabGitUtils: gitUtils
|
|
)
|
|
assertThat(sshAgentList, hasItem('testCredentials'))
|
|
}
|
|
}
|