我是新的堆叠溢出,以及新的编码部分。我使用usecase从配置文件中读取每个块,并使用jenkins脚本管道(groovy脚本)执行函数。下面是我在配置文件中写下了一系列参数的伪代码。另外,jenkinsfile将读取配置文件并查找应该满足称为“业务逻辑”的值的操作类型。如果满足,则只应使用具有键/值"action-type: business-logic“的迭代模式执行脚本块。
这是我的密码:
ast-config.yaml
message: ""veracode policyscan"
action-type: vc-policy-scan
code-location: "policyscan.groovy"
message: "Deploy DAGs to S3"
action-type: business-logic
binary-action: "copyfilesS3.py"
message: "Deploy CIT-CDW Folder to S3 Bucket"
action-type: business-logic
binary-action: "copyfolderS3.py"
message: "Deploy CIT-CDW Folder to EFS"
action-type: business-logic
binary-action: "" 詹金斯档案
node {
//checkout scm
get-client-code("git url'cit-cdw'")
def conf = readProperties file: "ApplicationConfiguration/ast-config.yaml"
for block in conf {
execute-stage(block)
}
def execute-stage(block) {
if (block.message.action-type == "business-logic")
stage(block.message){
steps { script {
sh """#!/bin/bash
block.binary-action()发布于 2021-12-13 02:14:23
block:
message: ""veracode policyscan"
action-type: vc-policy-scan
code-location: "policyscan.groovy"
block:
message: "Deploy DAGs to S3"
action-type: business-logic
binary-action: "copyfilesS3.py"readProperties无法加载yaml文件,请使用readYamldef conf = readYaml file: "ApplicationConfiguration/ast-config.yaml"binary-action替换binary-action sh """#!/bin/bash
${block.binary-action}
"""https://stackoverflow.com/questions/70325914
复制相似问题