mirror of
https://github.com/SAP/jenkins-library.git
synced 2024-12-12 10:55:20 +02:00
acbcc5646b
* Add ans implementation * Remove todo comment * Rename test function Co-authored-by: Linda Siebert <39100394+LindaSieb@users.noreply.github.com> * Better wording Co-authored-by: Linda Siebert <39100394+LindaSieb@users.noreply.github.com> * Add reading of response body function * Use http pkg ReadResponseBody * Check read error * Better test case description * Fix formatting * Create own package for read response body * Omit empty nested resource struct * Separate Resource struct from Event struct * Merge and unmarshall instead of only unmarshalling * Improve status code error message * Remove unchangeable event fields * Separate event parts * Change log level setter function * Restructure ans send test * Revert exporting readResponseBody function Instead the code is duplicated in the xsuaa and ans package * Add check correct ans setup request * Add set options function for mocking * Review fixes * Correct function name * Use strict unmarshalling * Validate event * Move functions * Add documentation comments * improve test * Validate event * Add logrus hook for ans * Set defaults on new hook creation * Fix log level on error * Don't alter entry log level * Set severity fatal on 'fatal error' log message * Ensure that log entries don't affect each other * Remove unnecessary correlationID * Use file path instead of event template string * Improve warning messages * Add empty log message check * Allow configuration from file and string * Add sourceEventId to tags * Change resourceType to Pipeline * Use structured config approach * Use new log level set function * Check correct setup and return error * Mock http requests * Only send log level warning or higher * Use new function name * One-liner ifs * Improve test name * Fix tests * Prevent double firing * Reduce Fire test size * Add error message to test * Reduce newANSHook test size * Further check error * Rename to defaultEvent in hook struct * Reduce ifs further * Fix set error category test The ansHook Fire test cannot run in parallel, as it would affect the other tests that use the error category. * Change function name to SetServiceKey * Validate event * Rename to eventTemplate in hook struct * Move copy to event.go * Fix function mix * Remove unnecessary cleanup * Remove parallel test The translation fails now and again when parallel is on. * Remove prefix test * Remove unused copyEvent function * Fix ifs * Add docu comment * Register ans hook from pkg * register hook and setup event template seperately * Exclusively read eventTemplate from environment * setupEventTemplate tests * adjust hook levels test * sync tests- wlill still fail * migrate TestANSHook_registerANSHook test * fixes * Introduce necessary parameters * Setup hook test * Use file instead * Adapt helper for ans * Generate go files * Add ans config to general config * Change generator * Regenerate steps * Allow hook config from user config Merges with hook config from defaults * Remove ans flags from root command * Get environment variables * Generate files * Add test when calling merge twice * Update generator * Regenerate steps * Check two location for ans service key env var * Re-generate * Fix if * Generate files with fix * Duplicate config struct * Add type casting test for ans config * Fix helper * Fix format * Fix type casting of config * Revert "Allow hook config from user config" This reverts commit 4864499a4c497998c9ffc3e157ef491be955e68e. * Revert "Add test when calling merge twice" This reverts commit b82320fd07b82f5a597c5071049d918bcf62de00. * Add ans config tests * Improve helper code * Re-generate commands * Fix helper unit tests * Change to only one argument * Fix helper tests * Re-generate * Revert piper and config changes * Re-generate missing step * Generate new steps * [ANS] Add servicekey credential to environment (#3684) * Add ANS credential * Switch to hooks and remove comments * Add subsection for ans Co-authored-by: Oliver Feldmann <oliver.feldmann@sap.com> * Remove changes to piper.go * Remove formatting * Add test for ANS * Define hook credential seperately from step credential * Add test for retrieval from general section * Add comment * Get ans hook info from DefaultValueCache * [ANS] Add documentation (#3704) * Add ANS credential * Switch to hooks and remove comments * Add subsection for ans Co-authored-by: Oliver Feldmann <oliver.feldmann@sap.com> * Remove changes to piper.go * Remove formatting * Add test for ANS * Define hook credential seperately from step credential * Add test for retrieval from general section * Add comment * Add documentation * Review changes * Review comments * Improve documentation further * Add note of two event templates * Add log level destinction * Further improvements * Improve text * Remove unused things * Add ANS credential * Switch to hooks and remove comments * Add subsection for ans Co-authored-by: Oliver Feldmann <oliver.feldmann@sap.com> * Remove changes to piper.go * Remove formatting * Add test for ANS * Define hook credential seperately from step credential * Add test for retrieval from general section * Add comment * Get ans hook info from DefaultValueCache * Improvements Co-authored-by: Linda Siebert <linda.siebert@sap.com> Co-authored-by: Linda Siebert <39100394+LindaSieb@users.noreply.github.com> Co-authored-by: Oliver Feldmann <oliver.feldmann@sap.com> * New lines Co-authored-by: Oliver Feldmann <oliver.feldmann@sap.com> Co-authored-by: Roland Stengel <r.stengel@sap.com> Co-authored-by: Thorsten Duda <thorsten.duda@sap.com>
440 lines
17 KiB
Groovy
440 lines
17 KiB
Groovy
import com.sap.piper.DebugReport
|
|
import com.sap.piper.DefaultValueCache
|
|
import com.sap.piper.JenkinsUtils
|
|
import groovy.json.JsonSlurper
|
|
import hudson.AbortException
|
|
import org.junit.After
|
|
import org.junit.Before
|
|
import org.junit.Rule
|
|
import org.junit.Test
|
|
import org.junit.rules.ExpectedException
|
|
import org.junit.rules.RuleChain
|
|
import util.*
|
|
|
|
import static org.hamcrest.Matchers.*
|
|
import static org.junit.Assert.assertThat
|
|
|
|
class PiperExecuteBinTest extends BasePiperTest {
|
|
private ExpectedException exception = ExpectedException.none()
|
|
|
|
private JenkinsCredentialsRule credentialsRule = new JenkinsCredentialsRule(this)
|
|
private JenkinsShellCallRule shellCallRule = new JenkinsShellCallRule(this)
|
|
private JenkinsStepRule stepRule = new JenkinsStepRule(this)
|
|
private JenkinsWriteFileRule writeFileRule = new JenkinsWriteFileRule(this)
|
|
private JenkinsFileExistsRule fileExistsRule = new JenkinsFileExistsRule(this, [])
|
|
private JenkinsDockerExecuteRule dockerExecuteRule = new JenkinsDockerExecuteRule(this)
|
|
|
|
private List withEnvArgs = []
|
|
private List credentials = []
|
|
private List artifacts = []
|
|
|
|
@Rule
|
|
public RuleChain rules = Rules
|
|
.getCommonRules(this)
|
|
.around(exception)
|
|
.around(new JenkinsReadYamlRule(this))
|
|
.around(credentialsRule)
|
|
.around(shellCallRule)
|
|
.around(stepRule)
|
|
.around(writeFileRule)
|
|
.around(fileExistsRule)
|
|
.around(dockerExecuteRule)
|
|
|
|
@Before
|
|
void init() {
|
|
credentials = []
|
|
|
|
// Clear DebugReport to avoid left-overs from another UnitTest
|
|
DebugReport.instance.failedBuild = [:]
|
|
|
|
helper.registerAllowedMethod("withEnv", [List.class, Closure.class], {arguments, closure ->
|
|
arguments.each {arg ->
|
|
withEnvArgs.add(arg.toString())
|
|
}
|
|
return closure()
|
|
})
|
|
|
|
helper.registerAllowedMethod("writePipelineEnv", [Map.class], {m -> return })
|
|
helper.registerAllowedMethod("readPipelineEnv", [Map.class], {m -> return })
|
|
helper.registerAllowedMethod('fileExists', [Map.class], {m ->
|
|
if (m.file == 'noDetailsStep_errorDetails.json') {
|
|
return false
|
|
}
|
|
return true
|
|
})
|
|
helper.registerAllowedMethod("readJSON", [Map], { m ->
|
|
if(m.file == 'testStep_reports.json')
|
|
return [[target: "1234.pdf", mandatory: true]]
|
|
if(m.file == 'testStep_links.json')
|
|
return []
|
|
if(m.file == 'testStepCategory_errorDetails.json')
|
|
return [message: 'detailed error', category: 'testCategory']
|
|
if(m.file == 'testStep_errorDetails.json')
|
|
return [message: 'detailed error']
|
|
if(m.text != null)
|
|
return new JsonSlurper().parseText(m.text)
|
|
})
|
|
|
|
helper.registerAllowedMethod('libraryResource', [String.class], {s ->
|
|
if (s == 'metadata/test.yaml') {
|
|
return '''metadata:
|
|
name: testStep
|
|
'''
|
|
} else {
|
|
return '''general:
|
|
failOnError: true
|
|
'''
|
|
}
|
|
})
|
|
|
|
helper.registerAllowedMethod('file', [Map], { m -> return m })
|
|
helper.registerAllowedMethod('string', [Map], { m -> return m })
|
|
helper.registerAllowedMethod('usernamePassword', [Map], { m -> return m })
|
|
helper.registerAllowedMethod('withCredentials', [List, Closure], { l, c ->
|
|
l.each {m ->
|
|
credentials.add(m)
|
|
if (m.credentialsId == 'credFile') {
|
|
binding.setProperty('PIPER_credFile', 'credFileContent')
|
|
} else if (m.credentialsId == 'credToken') {
|
|
binding.setProperty('PIPER_credToken','credTokenContent')
|
|
} else if (m.credentialsId == 'credUsernamePassword') {
|
|
binding.setProperty('PIPER_user', 'userId')
|
|
binding.setProperty('PIPER_password', '********')
|
|
}
|
|
}
|
|
try {
|
|
c()
|
|
} finally {
|
|
binding.setProperty('PIPER_credFile', null)
|
|
binding.setProperty('PIPER_credToken', null)
|
|
binding.setProperty('PIPER_user', null)
|
|
binding.setProperty('PIPER_password', null)
|
|
}
|
|
})
|
|
|
|
helper.registerAllowedMethod('archiveArtifacts', [Map.class], {m ->
|
|
artifacts.add(m)
|
|
return null
|
|
})
|
|
|
|
helper.registerAllowedMethod('findFiles', [Map.class], {m -> return null})
|
|
}
|
|
|
|
@Test
|
|
void testPiperExecuteBinDefault() {
|
|
shellCallRule.setReturnValue('./piper getConfig --contextConfig --stepMetadata \'.pipeline/tmp/metadata/test.yaml\'', '{"fileCredentialsId":"credFile", "tokenCredentialsId":"credToken", "credentialsId":"credUsernamePassword", "dockerImage":"my.Registry/my/image:latest"}')
|
|
|
|
List stepCredentials = [
|
|
[type: 'file', id: 'fileCredentialsId', env: ['PIPER_credFile']],
|
|
[type: 'token', id: 'tokenCredentialsId', env: ['PIPER_credToken']],
|
|
[type: 'usernamePassword', id: 'credentialsId', env: ['PIPER_user', 'PIPER_password']],
|
|
]
|
|
stepRule.step.piperExecuteBin(
|
|
[
|
|
juStabUtils: utils,
|
|
jenkinsUtilsStub: jenkinsUtils,
|
|
testParam: "This is test content",
|
|
script: nullScript
|
|
],
|
|
'testStep',
|
|
'metadata/test.yaml',
|
|
stepCredentials
|
|
)
|
|
// asserts
|
|
assertThat(writeFileRule.files['.pipeline/tmp/metadata/test.yaml'], containsString('name: testStep'))
|
|
assertThat(withEnvArgs[0], allOf(startsWith('PIPER_parametersJSON'), containsString('"testParam":"This is test content"')))
|
|
assertThat(shellCallRule.shell[1], is('./piper testStep'))
|
|
assertThat(credentials.size(), is(3))
|
|
assertThat(credentials[0], allOf(hasEntry('credentialsId', 'credFile'), hasEntry('variable', 'PIPER_credFile')))
|
|
assertThat(credentials[1], allOf(hasEntry('credentialsId', 'credToken'), hasEntry('variable', 'PIPER_credToken')))
|
|
assertThat(credentials[2], allOf(hasEntry('credentialsId', 'credUsernamePassword'), hasEntry('usernameVariable', 'PIPER_user') , hasEntry('passwordVariable', 'PIPER_password')))
|
|
|
|
assertThat(dockerExecuteRule.dockerParams.dockerImage, is('my.Registry/my/image:latest'))
|
|
assertThat(dockerExecuteRule.dockerParams.stashContent, is([]))
|
|
|
|
assertThat(artifacts[0], allOf(hasEntry('artifacts', '1234.pdf'), hasEntry('allowEmptyArchive', false)))
|
|
}
|
|
|
|
@Test
|
|
void testPiperExecuteBinANSCredentialsFromHooksSection() {
|
|
shellCallRule.setReturnValue('./piper getConfig --contextConfig --stepMetadata \'.pipeline/tmp/metadata/test.yaml\'', '{"fileCredentialsId":"credFile", "tokenCredentialsId":"credToken", "credentialsId":"credUsernamePassword", "dockerImage":"my.Registry/my/image:latest"}')
|
|
|
|
def newScript = nullScript
|
|
DefaultValueCache.createInstance([hooks: [ans: [serviceKeyCredentialsId: "ansServiceKeyID"]]])
|
|
|
|
List stepCredentials = []
|
|
stepRule.step.piperExecuteBin(
|
|
[
|
|
juStabUtils: utils,
|
|
jenkinsUtilsStub: jenkinsUtils,
|
|
testParam: "This is test content",
|
|
script: newScript
|
|
],
|
|
'testStep',
|
|
'metadata/test.yaml',
|
|
stepCredentials
|
|
)
|
|
// asserts
|
|
assertThat(credentials.size(), is(1))
|
|
assertThat(credentials[0], allOf(hasEntry('credentialsId', 'ansServiceKeyID'), hasEntry('variable', 'PIPER_ansHookServiceKey')))
|
|
DefaultValueCache.reset()
|
|
}
|
|
|
|
@Test
|
|
void testPiperExecuteBinDontResolveCredentialsAndNoCredId() {
|
|
|
|
// In case we have a credential entry without Id we drop that silenty.
|
|
// Maybe we should revisit that and fail in this case.
|
|
|
|
shellCallRule.setReturnValue('./piper getConfig --contextConfig --stepMetadata \'.pipeline/tmp/metadata/test.yaml\'', '{"dockerImage":"my.Registry/my/image:latest"}')
|
|
|
|
List stepCredentials = [
|
|
[type: 'token', env: ['PIPER_credTokenNoResolve'], resolveCredentialsId: false],
|
|
]
|
|
|
|
stepRule.step.piperExecuteBin(
|
|
[
|
|
juStabUtils: utils,
|
|
jenkinsUtilsStub: jenkinsUtils,
|
|
testParam: "This is test content",
|
|
script: nullScript
|
|
],
|
|
'testStep',
|
|
'metadata/test.yaml',
|
|
stepCredentials
|
|
)
|
|
assertThat(credentials.size(), is(0))
|
|
}
|
|
|
|
@Test
|
|
void testPiperExecuteBinSomeCredentials() {
|
|
shellCallRule.setReturnValue('./piper getConfig --contextConfig --stepMetadata \'.pipeline/tmp/metadata/test.yaml\'', '{"fileCredentialsId":"credFile", "tokenCredentialsId":"credToken", "dockerImage":"my.Registry/my/image:latest"}')
|
|
|
|
List stepCredentials = [
|
|
[type: 'file', id: 'fileCredentialsId', env: ['PIPER_credFile']],
|
|
[type: 'token', id: 'tokenCredentialsId', env: ['PIPER_credToken']],
|
|
// for the entry below we don't have a config lookup.
|
|
[type: 'token', id: 'tokenCredentialsIdNoResolve', env: ['PIPER_credTokenNoResolve'], resolveCredentialsId: false],
|
|
[type: 'token', id: 'tokenCredentialsIdNotContainedInConfig', env: ['PIPER_credToken_doesNotMatter']],
|
|
[type: 'usernamePassword', id: 'credentialsId', env: ['PIPER_user', 'PIPER_password']],
|
|
]
|
|
stepRule.step.piperExecuteBin(
|
|
[
|
|
juStabUtils: utils,
|
|
jenkinsUtilsStub: jenkinsUtils,
|
|
testParam: "This is test content",
|
|
script: nullScript
|
|
],
|
|
'testStep',
|
|
'metadata/test.yaml',
|
|
stepCredentials
|
|
)
|
|
// asserts
|
|
assertThat(credentials.size(), is(3))
|
|
assertThat(credentials[0], allOf(hasEntry('credentialsId', 'credFile'), hasEntry('variable', 'PIPER_credFile')))
|
|
assertThat(credentials[1], allOf(hasEntry('credentialsId', 'credToken'), hasEntry('variable', 'PIPER_credToken')))
|
|
assertThat(credentials[2], allOf(hasEntry('credentialsId', 'tokenCredentialsIdNoResolve'), hasEntry('variable', 'PIPER_credTokenNoResolve')))
|
|
}
|
|
|
|
@Test
|
|
void testPiperExecuteBinSSHCredentials() {
|
|
shellCallRule.setReturnValue('./piper getConfig --contextConfig --stepMetadata \'.pipeline/tmp/metadata/test.yaml\'', '{"sshCredentialsId":"sshKey", "tokenCredentialsId":"credToken"}')
|
|
|
|
List sshKey = []
|
|
helper.registerAllowedMethod("sshagent", [List, Closure], {s, c ->
|
|
sshKey = s
|
|
c()
|
|
})
|
|
|
|
List stepCredentials = [
|
|
[type: 'token', id: 'tokenCredentialsId', env: ['PIPER_credToken']],
|
|
[type: 'ssh', id: 'sshCredentialsId'],
|
|
]
|
|
stepRule.step.piperExecuteBin(
|
|
[
|
|
juStabUtils: utils,
|
|
jenkinsUtilsStub: jenkinsUtils,
|
|
testParam: "This is test content",
|
|
script: nullScript
|
|
],
|
|
'testStep',
|
|
'metadata/test.yaml',
|
|
stepCredentials
|
|
)
|
|
// asserts
|
|
assertThat(credentials.size(), is(1))
|
|
assertThat(credentials[0], allOf(hasEntry('credentialsId', 'credToken'), hasEntry('variable', 'PIPER_credToken')))
|
|
assertThat(sshKey, is(['sshKey']))
|
|
}
|
|
|
|
@Test
|
|
void testPiperExecuteBinNoDockerNoCredentials() {
|
|
shellCallRule.setReturnValue('./piper getConfig --contextConfig --stepMetadata \'.pipeline/tmp/metadata/test.yaml\'', '{}')
|
|
|
|
stepRule.step.piperExecuteBin(
|
|
[
|
|
juStabUtils: utils,
|
|
jenkinsUtilsStub: jenkinsUtils,
|
|
testParam: "This is test content",
|
|
script: nullScript
|
|
],
|
|
'testStep',
|
|
'metadata/test.yaml',
|
|
[]
|
|
)
|
|
|
|
assertThat(writeFileRule.files['.pipeline/tmp/metadata/test.yaml'], containsString('name: testStep'))
|
|
assertThat(withEnvArgs[0], allOf(startsWith('PIPER_parametersJSON'), containsString('"testParam":"This is test content"')))
|
|
assertThat(shellCallRule.shell[1], is('./piper testStep'))
|
|
assertThat(credentials.size(), is(0))
|
|
|
|
assertThat(dockerExecuteRule.dockerParams.size(), is(0))
|
|
|
|
assertThat(artifacts[0], allOf(hasEntry('artifacts', '1234.pdf'), hasEntry('allowEmptyArchive', false)))
|
|
|
|
}
|
|
|
|
@Test
|
|
void testPiperExecuteBinNoReportFound() {
|
|
shellCallRule.setReturnValue('./piper getConfig --contextConfig --stepMetadata \'.pipeline/tmp/metadata/test.yaml\'', '{}')
|
|
helper.registerAllowedMethod('fileExists', [Map], {
|
|
return false
|
|
})
|
|
|
|
exception.expect(AbortException)
|
|
exception.expectMessage("Expected to find testStep_reports.json in workspace but it is not there")
|
|
|
|
stepRule.step.piperExecuteBin(
|
|
[
|
|
juStabUtils: utils,
|
|
jenkinsUtilsStub: jenkinsUtils,
|
|
testParam: "This is test content",
|
|
script: nullScript
|
|
],
|
|
'testStep',
|
|
'metadata/test.yaml',
|
|
[],
|
|
true,
|
|
false,
|
|
false
|
|
)
|
|
}
|
|
|
|
@Test
|
|
void testErrorWithCategory() {
|
|
shellCallRule.setReturnValue('./piper getConfig --contextConfig --stepMetadata \'.pipeline/tmp/metadata/test.yaml\'', '{}')
|
|
helper.registerAllowedMethod('sh', [String.class], {s -> throw new AbortException('exit code 1')})
|
|
|
|
exception.expect(AbortException)
|
|
exception.expectMessage("[testStepCategory] Step execution failed (category: testCategory). Error: detailed error")
|
|
|
|
try {
|
|
stepRule.step.piperExecuteBin(
|
|
[
|
|
juStabUtils: utils,
|
|
jenkinsUtilsStub: jenkinsUtils,
|
|
testParam: "This is test content",
|
|
script: nullScript
|
|
],
|
|
'testStepCategory',
|
|
'metadata/test.yaml',
|
|
[]
|
|
)
|
|
} catch (ex) {
|
|
assertThat(DebugReport.instance.failedBuild.category, is('testCategory'))
|
|
throw ex
|
|
}
|
|
|
|
}
|
|
|
|
@Test
|
|
void testErrorWithoutCategory() {
|
|
shellCallRule.setReturnValue('./piper getConfig --contextConfig --stepMetadata \'.pipeline/tmp/metadata/test.yaml\'', '{}')
|
|
helper.registerAllowedMethod('sh', [String.class], {s -> throw new AbortException('exit code 1')})
|
|
|
|
exception.expect(AbortException)
|
|
exception.expectMessage("[testStep] Step execution failed. Error: detailed error")
|
|
|
|
stepRule.step.piperExecuteBin(
|
|
[
|
|
juStabUtils: utils,
|
|
jenkinsUtilsStub: jenkinsUtils,
|
|
testParam: "This is test content",
|
|
script: nullScript
|
|
],
|
|
'testStep',
|
|
'metadata/test.yaml',
|
|
[]
|
|
)
|
|
}
|
|
|
|
@Test
|
|
void testErrorNoDetails() {
|
|
shellCallRule.setReturnValue('./piper getConfig --contextConfig --stepMetadata \'.pipeline/tmp/metadata/test.yaml\'', '{}')
|
|
helper.registerAllowedMethod('sh', [String.class], {s -> throw new AbortException('exit code 1')})
|
|
|
|
exception.expect(AbortException)
|
|
exception.expectMessage("[noDetailsStep] Step execution failed. Error: hudson.AbortException: exit code 1, please see log file for more details.")
|
|
|
|
stepRule.step.piperExecuteBin(
|
|
[
|
|
juStabUtils: utils,
|
|
jenkinsUtilsStub: jenkinsUtils,
|
|
testParam: "This is test content",
|
|
script: nullScript
|
|
],
|
|
'noDetailsStep',
|
|
'metadata/test.yaml',
|
|
[]
|
|
)
|
|
}
|
|
|
|
@Test
|
|
void testRespectPipelineResilienceSetting() {
|
|
shellCallRule.setReturnValue('./piper getConfig --contextConfig --stepMetadata \'.pipeline/tmp/metadata/test.yaml\'', '{}')
|
|
helper.registerAllowedMethod('sh', [String.class], {s -> throw new AbortException('exit code 1')})
|
|
|
|
def unstableCalled
|
|
helper.registerAllowedMethod('unstable', [String.class], {s -> unstableCalled = true})
|
|
|
|
try {
|
|
nullScript.commonPipelineEnvironment.configuration.steps = [handlePipelineStepErrors: [failOnError: false]]
|
|
|
|
stepRule.step.piperExecuteBin(
|
|
[
|
|
juStabUtils: utils,
|
|
jenkinsUtilsStub: jenkinsUtils,
|
|
testParam: "This is test content",
|
|
script: nullScript
|
|
],
|
|
'noDetailsStep',
|
|
'metadata/test.yaml',
|
|
[]
|
|
)
|
|
} finally {
|
|
//clean up
|
|
nullScript.commonPipelineEnvironment.configuration.steps = [handlePipelineStepErrors: [failOnError: true]]
|
|
}
|
|
assertThat(unstableCalled, is(true))
|
|
|
|
}
|
|
|
|
@Test
|
|
void testProperStashHandling() {
|
|
shellCallRule.setReturnValue('./piper getConfig --contextConfig --stepMetadata \'.pipeline/tmp/metadata/test.yaml\'', '{"dockerImage":"test","stashContent":["buildDescriptor"]}')
|
|
|
|
stepRule.step.piperExecuteBin(
|
|
[
|
|
juStabUtils: utils,
|
|
jenkinsUtilsStub: jenkinsUtils,
|
|
script: nullScript
|
|
],
|
|
'testStep',
|
|
'metadata/test.yaml',
|
|
[]
|
|
)
|
|
|
|
assertThat(dockerExecuteRule.dockerParams.stashContent, is(["buildDescriptor", "pipelineConfigAndTests", "piper-bin", "pipelineStepReports"]))
|
|
}
|
|
}
|