DEV-375 feat: new process for backup scheduling

feature/DEV-380
Sven Ketelsen 4 years ago
parent 49aa913213
commit 80b321cd65

@ -16,6 +16,7 @@ stages:
- ansible-run-setup - ansible-run-setup
- ansible-run-kubernetes - ansible-run-kubernetes
- ansible-patchday - ansible-patchday
- ansible-management
ansible-lint-job: ansible-lint-job:
stage: ansible-lint stage: ansible-lint
@ -64,7 +65,7 @@ ansible-builder-job:
### | | __/ | ### | | __/ |
### |_| |___/ ### |_| |___/
ansible-run-setup-1-dev: ansible-run-setup-dev:
image: $AWX_EE_DOCKER_IMAGE_EXTERN:latest image: $AWX_EE_DOCKER_IMAGE_EXTERN:latest
stage: ansible-run-setup stage: ansible-run-setup
before_script: before_script:
@ -88,7 +89,7 @@ ansible-run-setup-1-dev:
- harbor # 05.02.22 TODO some runners run into timeouts - harbor # 05.02.22 TODO some runners run into timeouts
resource_group: dev resource_group: dev
ansible-run-setup-2-qa: ansible-run-setup-qa:
image: $AWX_EE_DOCKER_IMAGE_EXTERN:latest image: $AWX_EE_DOCKER_IMAGE_EXTERN:latest
stage: ansible-run-setup stage: ansible-run-setup
before_script: before_script:
@ -111,7 +112,7 @@ ansible-run-setup-2-qa:
- harbor # 05.02.22 TODO some runners run into timeouts - harbor # 05.02.22 TODO some runners run into timeouts
resource_group: qa resource_group: qa
ansible-run-setup-3-prodnso: ansible-run-setup-prodnso:
image: $AWX_EE_DOCKER_IMAGE_EXTERN:latest image: $AWX_EE_DOCKER_IMAGE_EXTERN:latest
stage: ansible-run-setup stage: ansible-run-setup
before_script: before_script:
@ -146,7 +147,7 @@ ansible-run-setup-3-prodnso:
### __/ | ### __/ |
### |___/ ### |___/
ansible-run-kubernetes-1-dev: ansible-run-kubernetes-dev:
image: $AWX_EE_DOCKER_IMAGE_EXTERN:latest image: $AWX_EE_DOCKER_IMAGE_EXTERN:latest
stage: ansible-run-kubernetes stage: ansible-run-kubernetes
before_script: before_script:
@ -170,7 +171,7 @@ ansible-run-kubernetes-1-dev:
- harbor # 05.02.22 TODO some runners run into timeouts - harbor # 05.02.22 TODO some runners run into timeouts
resource_group: dev resource_group: dev
ansible-run-kubernetes-2-qa: ansible-run-kubernetes-qa:
image: $AWX_EE_DOCKER_IMAGE_EXTERN:latest image: $AWX_EE_DOCKER_IMAGE_EXTERN:latest
stage: ansible-run-kubernetes stage: ansible-run-kubernetes
before_script: before_script:
@ -193,7 +194,7 @@ ansible-run-kubernetes-2-qa:
- harbor # 05.02.22 TODO some runners run into timeouts - harbor # 05.02.22 TODO some runners run into timeouts
resource_group: qa resource_group: qa
ansible-run-kubernetes-3-prodnso: ansible-run-kubernetes-prodnso:
image: $AWX_EE_DOCKER_IMAGE_EXTERN:latest image: $AWX_EE_DOCKER_IMAGE_EXTERN:latest
stage: ansible-run-kubernetes stage: ansible-run-kubernetes
before_script: before_script:
@ -228,7 +229,7 @@ ansible-run-kubernetes-3-prodnso:
### |_| |___/ ### |_| |___/
### ###
ansible-patchday-1-dev: ansible-patchday-dev:
image: $AWX_EE_DOCKER_IMAGE_EXTERN:latest image: $AWX_EE_DOCKER_IMAGE_EXTERN:latest
stage: ansible-patchday stage: ansible-patchday
before_script: before_script:
@ -251,7 +252,7 @@ ansible-patchday-1-dev:
- harbor # 05.02.22 TODO some runners run into timeouts - harbor # 05.02.22 TODO some runners run into timeouts
resource_group: dev resource_group: dev
ansible-patchday-2-qa: ansible-patchday-qa:
image: $AWX_EE_DOCKER_IMAGE_EXTERN:latest image: $AWX_EE_DOCKER_IMAGE_EXTERN:latest
stage: ansible-patchday stage: ansible-patchday
before_script: before_script:
@ -275,7 +276,7 @@ ansible-patchday-2-qa:
- harbor # 05.02.22 TODO some runners run into timeouts - harbor # 05.02.22 TODO some runners run into timeouts
resource_group: qa resource_group: qa
ansible-patchday-3-prodnso: ansible-patchday-prodnso:
image: $AWX_EE_DOCKER_IMAGE_EXTERN:latest image: $AWX_EE_DOCKER_IMAGE_EXTERN:latest
stage: ansible-patchday stage: ansible-patchday
before_script: before_script:
@ -298,3 +299,64 @@ ansible-patchday-3-prodnso:
- dind - dind
- harbor # 05.02.22 TODO some runners run into timeouts - harbor # 05.02.22 TODO some runners run into timeouts
resource_group: prodnso resource_group: prodnso
########
### https://patorjk.com/software/taag/#p=display&f=Doom&t=management
### _
### | |
### _ __ ___ __ _ _ __ __ _ __ _ ___ _ __ ___ ___ _ __ | |_
### | '_ ` _ \ / _` | '_ \ / _` |/ _` |/ _ \ '_ ` _ \ / _ \ '_ \| __|
### | | | | | | (_| | | | | (_| | (_| | __/ | | | | | __/ | | | |_
### |_| |_| |_|\__,_|_| |_|\__,_|\__, |\___|_| |_| |_|\___|_| |_|\__|
### __/ |
### |___/
.ansible-management:
image: $AWX_EE_DOCKER_IMAGE_EXTERN:latest
# A resource group ensures a job is mutually exclusive across different pipelines for the same project.
stage: ansible-management
script:
- 'command -v ssh-agent >/dev/null || ( apt-get update -y && apt-get install openssh-client -y )'
- eval $(ssh-agent -s)
- 'echo "$GITLAB_SSH_KEY" | tr -d "\r" | ssh-add -'
- mkdir -p ~/.ssh
- chmod 0700 ~/.ssh
- '[[ -f /.dockerenv ]] && echo -e "Host *\n\tStrictHostKeyChecking no\n\n" >> ~/.ssh/config'
- ssh-add -L
- echo "${ANSIBLE_VAULT_PASS_DEV}" > /tmp/vault-pass
- export HETZNER_LABEL_SELECTOR="stage=${STAGE}"
- ansible-playbook -i stage-$STAGE smardigo.yml --vault-password-file=/tmp/vault-pass -l management -t update_configurations -u gitlabci
# only:
# changes:
# - smardigo/**/*
except:
- schedules
tags:
- dind
ansible-management-dev:
extends: .ansible-management
resource_group: deployment
before_script:
- export STAGE=dev
only:
refs:
- branches
ansible-management-qa:
extends: .ansible-management
resource_group: qa
before_script:
- export STAGE=qa
only:
- qa
- schedules
ansible-management-prodnso:
extends: .ansible-management
resource_group: prodnso
before_script:
- export STAGE=prodnso
only:
- prodnso
- schedules

@ -9,6 +9,8 @@ connect_admin_password: "{{ management_admin_password }}"
connect_workflow_env: "stage:{{ stage }};smardigoUserToken:{{ smardigo_auth_token_value }}" connect_workflow_env: "stage:{{ stage }};smardigoUserToken:{{ smardigo_auth_token_value }}"
connect_process_search_module: "external" connect_process_search_module: "external"
connect_oidc_client_secret: "{{ management_oidc_client_secret }}" connect_oidc_client_secret: "{{ management_oidc_client_secret }}"
connect_external_task_script_worker_enabled: "true"
spring_profiles_include: "prod,postgres,elastic,swagger" spring_profiles_include: "prod,postgres,elastic,swagger"
tenant_id: "{{ management_oidc_realm }}" tenant_id: "{{ management_oidc_realm }}"

@ -356,6 +356,9 @@ argocd_admin_password: "argocd-admin"
argo_keycloak_client_secret: "{{ argo_keycloak_client_secret_vault }}" argo_keycloak_client_secret: "{{ argo_keycloak_client_secret_vault }}"
argocd_server_admin_password: "{{ argocd_server_admin_password_vault }}" argocd_server_admin_password: "{{ argocd_server_admin_password_vault }}"
awx_admin_username: "awx-admin"
awx_admin_password: "{{ awx_admin_password_vault }}"
netgo_msteams_hook_cd: "{{ netgo_msteams_hook_cd_vault }}" netgo_msteams_hook_cd: "{{ netgo_msteams_hook_cd_vault }}"
netgo_msteams_hook_alerting: "{{ netgo_msteams_hook_alerting_vault }}" netgo_msteams_hook_alerting: "{{ netgo_msteams_hook_alerting_vault }}"

@ -356,6 +356,9 @@ argocd_admin_password: "{{ argocd_admin_password_vault }}"
argo_keycloak_client_secret: "{{ argo_keycloak_client_secret_vault }}" argo_keycloak_client_secret: "{{ argo_keycloak_client_secret_vault }}"
argocd_server_admin_password: "{{ argocd_server_admin_password_vault }}" argocd_server_admin_password: "{{ argocd_server_admin_password_vault }}"
awx_admin_username: "awx-admin"
awx_admin_password: "{{ awx_admin_password_vault }}"
netgo_msteams_hook_cd: "{{ netgo_msteams_hook_cd_vault }}" netgo_msteams_hook_cd: "{{ netgo_msteams_hook_cd_vault }}"
netgo_msteams_hook_alerting: "{{ netgo_msteams_hook_alerting_vault }}" netgo_msteams_hook_alerting: "{{ netgo_msteams_hook_alerting_vault }}"

@ -356,6 +356,9 @@ argocd_admin_password: "{{ argocd_admin_password_vault }}"
argo_keycloak_client_secret: "{{ argo_keycloak_client_secret_vault }}" argo_keycloak_client_secret: "{{ argo_keycloak_client_secret_vault }}"
argocd_server_admin_password: "{{ argocd_server_admin_password_vault }}" argocd_server_admin_password: "{{ argocd_server_admin_password_vault }}"
awx_admin_username: "awx-admin"
awx_admin_password: "{{ awx_admin_password_vault }}"
netgo_msteams_hook_cd: "{{ netgo_msteams_hook_cd_vault }}" netgo_msteams_hook_cd: "{{ netgo_msteams_hook_cd_vault }}"
netgo_msteams_hook_alerting: "{{ netgo_msteams_hook_alerting_vault }}" netgo_msteams_hook_alerting: "{{ netgo_msteams_hook_alerting_vault }}"

@ -73,10 +73,3 @@
pull: yes pull: yes
tags: tags:
- update_deployment - update_deployment
- name: "Configure connect connections"
include_tasks: connections.yml
when:
smardigo_auth_token_value is defined
tags:
- always

@ -99,6 +99,9 @@ connect_environment: [
"OPENTRACING_JAEGER_LOG_SPANS: \"{{ connect_opentracing_jaeger_log_spans | default(false) }}\"", "OPENTRACING_JAEGER_LOG_SPANS: \"{{ connect_opentracing_jaeger_log_spans | default(false) }}\"",
"OPENTRACING_JAEGER_SERVICE_NAME: \"{{ connect_opentracing_jaeger_service_name | default(connect_id) }}\"", "OPENTRACING_JAEGER_SERVICE_NAME: \"{{ connect_opentracing_jaeger_service_name | default(connect_id) }}\"",
"OPENTRACING_JAEGER_HTTP_SENDER_URL: \"{{ connect_opentracing_jaeger_http_sender_url | default() }}\"", "OPENTRACING_JAEGER_HTTP_SENDER_URL: \"{{ connect_opentracing_jaeger_http_sender_url | default() }}\"",
"CONFIG_DELETE_SCOPE_ENABLED: \"{{ connect_config_delete_scope_enabled | default(false) }}\"",
"CONFIG_LOCAL_IMPORT_ENABLED: \"{{ connect_config_local_import_enabled | default(false) }}\"",
] ]
connect_docker: { connect_docker: {

@ -1,6 +1,4 @@
--- ---
awx_admin_username: "awx-admin"
awx_admin_password: "{{ awx_admin_password_vault }}"
awx_ansible_username: ansible awx_ansible_username: ansible
awx_ansible_password: ansible awx_ansible_password: ansible

@ -20,3 +20,18 @@ connect_connections:
authType: "BASIC_AUTH" authType: "BASIC_AUTH"
username: "{{ harbor_admin_username }}" username: "{{ harbor_admin_username }}"
password: "{{ harbor_admin_password }}" password: "{{ harbor_admin_password }}"
current_realm_users_base:
- username: "{{ management_admin_username }}"
password: "{{ management_admin_password }}"
email: "{{ connect_admin_email }}"
requiredActions: []
current_realm_password_policy: ''
connect_config_delete_scope_enabled: true
connect_config_local_import_enabled: true
connect_configurations:
- backup
- provisioning
- template

@ -0,0 +1,63 @@
---
### tags:
### update_configurations
- name: "Running all block tasks on locahost"
delegate_to: 127.0.0.1
become: false
block:
- name: "Checking connect is running on <{{ connect_base_url }}>"
uri:
url: "{{ http_s }}://{{ connect_base_url }}/api/profile-info"
method: GET
headers:
"Smardigo-User-Token": "{{ smardigo_auth_token_value }}"
status_code: [200]
register: connect_profile_info
delay: 15
retries: 10
until: connect_profile_info.status in [200]
tags:
- update_configurations
- name: "Creating archives of smardigo configuration"
ansible.builtin.tempfile:
state: directory
suffix: temp
register: temp
tags:
- update_configurations
- name: "Creating archives of smardigo configuration"
archive:
path: "./smardigo/{{ item }}"
dest: "{{ temp.path }}/{{ item }}.zip"
format: zip
with_items: "{{ connect_configurations }}"
tags:
- update_configurations
- name: "Upload configuration zip file to <{{ connect_base_url }}>"
uri:
url: "{{ http_s }}://{{ connect_base_url }}/api/v1/config/import-zip"
method: POST
headers:
Smardigo-User-Token: "{{ smardigo_auth_token_value }}"
body_format: form-multipart
body:
file:
filename: "{{ temp.path }}/{{ item }}.zip"
mime_type: "application/zip"
status_code: [200]
register: config_import_result
with_items: "{{ connect_configurations }}"
tags:
- update_configurations
- name: "Upload configuration zip file to <{{ connect_base_url }}>"
debug:
msg: '{{ config_import_result }}'
tags:
- update_configurations

@ -2,7 +2,6 @@
### tags: ### tags:
### update_connections ### update_connections
### update_configuration
- name: "Checking connect is running on <{{ connect_base_url }}>" - name: "Checking connect is running on <{{ connect_base_url }}>"
delegate_to: 127.0.0.1 delegate_to: 127.0.0.1
@ -19,7 +18,6 @@
until: connect_profile_info.status in [200] until: connect_profile_info.status in [200]
tags: tags:
- update_connections - update_connections
- update_configuration
- name: "Reading connections from <{{ connect_base_url }}>" - name: "Reading connections from <{{ connect_base_url }}>"
delegate_to: 127.0.0.1 delegate_to: 127.0.0.1
@ -33,7 +31,6 @@
register: connect_connections_result register: connect_connections_result
tags: tags:
- update_connections - update_connections
- update_configuration
- name: "Reading connection ids from <{{ connect_base_url }}>" - name: "Reading connection ids from <{{ connect_base_url }}>"
set_fact: set_fact:
@ -42,7 +39,6 @@
querystr: "[[*].id]" querystr: "[[*].id]"
tags: tags:
- update_connections - update_connections
- update_configuration
- name: "Printing connection ids for <{{ connect_base_url }}>" - name: "Printing connection ids for <{{ connect_base_url }}>"
debug: debug:
@ -51,7 +47,6 @@
- debug - debug
tags: tags:
- update_connections - update_connections
- update_configuration
- name: "Creating/Updating connections on <{{ connect_base_url }}>" - name: "Creating/Updating connections on <{{ connect_base_url }}>"
delegate_to: 127.0.0.1 delegate_to: 127.0.0.1
@ -70,4 +65,3 @@
changed_when: true changed_when: true
tags: tags:
- update_connections - update_connections
- update_configuration

@ -1,7 +1,8 @@
--- ---
### tags: ### tags:
### update_configuration ### update_connections
### update_configurations
- name: "Creating smardigo user token" - name: "Creating smardigo user token"
smardigo_user_token: smardigo_user_token:
@ -24,17 +25,27 @@
name: connect_postgres name: connect_postgres
vars: vars:
ansible_ssh_host: "{{ stage }}-postgres-01.{{ domain }}" ansible_ssh_host: "{{ stage }}-postgres-01.{{ domain }}"
tags:
- always
- name: "Create realm for <{{ inventory_hostname }}> if necessary" - name: "Create realm for <{{ inventory_hostname }}> if necessary"
include_role: include_role:
name: connect_realm name: connect_realm
tags:
- always
- name: "Create connect for <{{ inventory_hostname }}> if necessary" - name: "Create connect for <{{ inventory_hostname }}> if necessary"
include_role: include_role:
name: connect name: connect
- name: "Configure connect connections"
include_tasks: connections.yml
when:
smardigo_auth_token_value is defined
tags: tags:
- always - update_connections
- name: "Configure connect configurations"
include_tasks: configurations.yml
vars:
local_folder_name: "/tmp/smardigo"
when:
smardigo_auth_token_value is defined
tags:
- update_configurations

@ -3,18 +3,11 @@
"configType" : "policy", "configType" : "policy",
"name" : "Policies", "name" : "Policies",
"policies" : [ { "policies" : [ {
"id" : "allow_delete_process_all",
"name" : "Processes delete all",
"effect" : "allow",
"actions" : [ "delete" ],
"resources" : [ "processes:simple-connect" ],
"conditions": [ "${vorgang_status_text == 'Neu'}" ]
}, {
"id" : "allow_read_write_variables_all", "id" : "allow_read_write_variables_all",
"name" : "Variables read/write all", "name" : "Variables read/write all",
"effect" : "allow", "effect" : "allow",
"actions" : [ "read", "write" ], "actions" : [ "read", "write" ],
"resources" : [ "variables:simple-connect:*" ], "resources" : [ "variables:primary-process:*" ],
"conditions" : [ ] "conditions" : [ ]
} ] } ]
} }

@ -69,7 +69,7 @@
</bpmn2:task> </bpmn2:task>
</bpmn2:process> </bpmn2:process>
<bpmn2:process id="smardigo-management-action" name="Smardigo Management Action" isExecutable="true"> <bpmn2:process id="smardigo-management-action" name="Smardigo Management Action" isExecutable="true">
<bpmn2:startEvent id="Event_01o224p" camunda:formKey="simple-connect-create"> <bpmn2:startEvent id="Event_01o224p">
<bpmn2:outgoing>Flow_1o2xasq</bpmn2:outgoing> <bpmn2:outgoing>Flow_1o2xasq</bpmn2:outgoing>
</bpmn2:startEvent> </bpmn2:startEvent>
<bpmn2:scriptTask id="Activity_12re8b9" name="ansible-start.groovy" scriptFormat="groovy" camunda:resource="ansible-start.groovy"> <bpmn2:scriptTask id="Activity_12re8b9" name="ansible-start.groovy" scriptFormat="groovy" camunda:resource="ansible-start.groovy">
@ -145,7 +145,7 @@
<bpmn2:sequenceFlow id="Flow_0a10mmp" sourceRef="Activity_0sfkswg" targetRef="Activity_0m6rbdo" /> <bpmn2:sequenceFlow id="Flow_0a10mmp" sourceRef="Activity_0sfkswg" targetRef="Activity_0m6rbdo" />
</bpmn2:process> </bpmn2:process>
<bpmn2:process id="smardigo-management-message" name="Smardigo Management Message" isExecutable="true"> <bpmn2:process id="smardigo-management-message" name="Smardigo Management Message" isExecutable="true">
<bpmn2:startEvent id="Event_0cntm51" camunda:formKey="simple-connect-create"> <bpmn2:startEvent id="Event_0cntm51">
<bpmn2:outgoing>Flow_1nplu24</bpmn2:outgoing> <bpmn2:outgoing>Flow_1nplu24</bpmn2:outgoing>
</bpmn2:startEvent> </bpmn2:startEvent>
<bpmn2:serviceTask id="Activity_00iw76a" name="MS-Teams Benachrichtigung senden" camunda:delegateExpression="${rest.post(&#39;teams&#39;, &#39;/&#39;).responseJSONObject(&#39;teamsResponse&#39;).bodyJSONMap(teamsRequestBody)}"> <bpmn2:serviceTask id="Activity_00iw76a" name="MS-Teams Benachrichtigung senden" camunda:delegateExpression="${rest.post(&#39;teams&#39;, &#39;/&#39;).responseJSONObject(&#39;teamsResponse&#39;).bodyJSONMap(teamsRequestBody)}">
@ -171,25 +171,25 @@
<bpmndi:BPMNShape id="Participant_19lpjee_di" bpmnElement="Participant_19lpjee" isHorizontal="true"> <bpmndi:BPMNShape id="Participant_19lpjee_di" bpmnElement="Participant_19lpjee" isHorizontal="true">
<dc:Bounds x="160" y="470" width="1710" height="590" /> <dc:Bounds x="160" y="470" width="1710" height="590" />
</bpmndi:BPMNShape> </bpmndi:BPMNShape>
<bpmndi:BPMNEdge id="Flow_1a8vxf0_di" bpmnElement="Flow_1a8vxf0"> <bpmndi:BPMNEdge id="Flow_1vjr74e_di" bpmnElement="Flow_1vjr74e">
<di:waypoint x="398" y="690" /> <di:waypoint x="550" y="690" />
<di:waypoint x="450" y="690" /> <di:waypoint x="662" y="690" />
</bpmndi:BPMNEdge> </bpmndi:BPMNEdge>
<bpmndi:BPMNEdge id="Flow_0oc7f69_di" bpmnElement="Flow_0oc7f69"> <bpmndi:BPMNEdge id="Flow_0htljqr_di" bpmnElement="Flow_0htljqr">
<di:waypoint x="698" y="690" /> <di:waypoint x="880" y="690" />
<di:waypoint x="780" y="690" /> <di:waypoint x="912" y="690" />
</bpmndi:BPMNEdge> </bpmndi:BPMNEdge>
<bpmndi:BPMNEdge id="Flow_0ufs5lg_di" bpmnElement="Flow_0ufs5lg"> <bpmndi:BPMNEdge id="Flow_0ufs5lg_di" bpmnElement="Flow_0ufs5lg">
<di:waypoint x="948" y="690" /> <di:waypoint x="948" y="690" />
<di:waypoint x="982" y="690" /> <di:waypoint x="982" y="690" />
</bpmndi:BPMNEdge> </bpmndi:BPMNEdge>
<bpmndi:BPMNEdge id="Flow_0htljqr_di" bpmnElement="Flow_0htljqr"> <bpmndi:BPMNEdge id="Flow_1a8vxf0_di" bpmnElement="Flow_1a8vxf0">
<di:waypoint x="880" y="690" /> <di:waypoint x="398" y="690" />
<di:waypoint x="912" y="690" /> <di:waypoint x="450" y="690" />
</bpmndi:BPMNEdge> </bpmndi:BPMNEdge>
<bpmndi:BPMNEdge id="Flow_1vjr74e_di" bpmnElement="Flow_1vjr74e"> <bpmndi:BPMNEdge id="Flow_0oc7f69_di" bpmnElement="Flow_0oc7f69">
<di:waypoint x="550" y="690" /> <di:waypoint x="698" y="690" />
<di:waypoint x="662" y="690" /> <di:waypoint x="780" y="690" />
</bpmndi:BPMNEdge> </bpmndi:BPMNEdge>
<bpmndi:BPMNShape id="Event_04q3ydu_di" bpmnElement="Event_0wqvypp"> <bpmndi:BPMNShape id="Event_04q3ydu_di" bpmnElement="Event_0wqvypp">
<dc:Bounds x="362" y="672" width="36" height="36" /> <dc:Bounds x="362" y="672" width="36" height="36" />
@ -302,4 +302,4 @@
</bpmndi:BPMNShape> </bpmndi:BPMNShape>
</bpmndi:BPMNPlane> </bpmndi:BPMNPlane>
</bpmndi:BPMNDiagram> </bpmndi:BPMNDiagram>
</bpmn2:definitions> </bpmn2:definitions>

@ -0,0 +1,9 @@
{
"name" : "Policy Mapping",
"configKey" : "role-policy-mapping",
"configType" : "role-policy-mapping",
"rolePolicyMapping" : {
"maintainer" : [ "allow_read_write_variables_all" ],
"administrator" : [ "allow_read_write_variables_all" ]
}
}

@ -5,6 +5,7 @@ def env = [
scope_id: contextScopeId, scope_id: contextScopeId,
smardigo_management_action: smardigoManagementAction, smardigo_management_action: smardigoManagementAction,
stage: cluster.stage, stage: cluster.stage,
database_engine: 'postgres',
] ]
if (binding.hasVariable('extraVariables')) { if (binding.hasVariable('extraVariables')) {
env << extraVariables env << extraVariables

@ -5,6 +5,7 @@ def env = [
scope_id: contextScopeId, scope_id: contextScopeId,
smardigo_management_action: smardigoManagementAction, smardigo_management_action: smardigoManagementAction,
stage: cluster.stage, stage: cluster.stage,
database_engine: 'postgres',
] ]
if (binding.hasVariable('extraVariables')) { if (binding.hasVariable('extraVariables')) {
env << extraVariables env << extraVariables

@ -1,10 +0,0 @@
def parameters = [:]
parameters["default"] = "'1'"
def defaultFeatures = datasources.query("connect-features").processScope(contextScopeId, contextScopeTag).parameters(parameters).list();
def features = []
defaultFeatures.each { val -> features+= val.key }
features

File diff suppressed because it is too large Load Diff

@ -1,5 +1,5 @@
<?xml version="1.0" encoding="UTF-8"?> <?xml version="1.0" encoding="UTF-8"?>
<bpmn2:definitions xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:bpmn2="http://www.omg.org/spec/BPMN/20100524/MODEL" xmlns:bpmndi="http://www.omg.org/spec/BPMN/20100524/DI" xmlns:dc="http://www.omg.org/spec/DD/20100524/DC" xmlns:camunda="http://camunda.org/schema/1.0/bpmn" xmlns:di="http://www.omg.org/spec/DD/20100524/DI" xmlns:bioc="http://bpmn.io/schema/bpmn/biocolor/1.0" xmlns:color="http://www.omg.org/spec/BPMN/non-normative/color/1.0" id="sample-diagram" targetNamespace="http://bpmn.io/schema/bpmn" exporter="Camunda Modeler" exporterVersion="4.11.1" xsi:schemaLocation="http://www.omg.org/spec/BPMN/20100524/MODEL BPMN20.xsd"> <bpmn2:definitions xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:bpmn2="http://www.omg.org/spec/BPMN/20100524/MODEL" xmlns:bpmndi="http://www.omg.org/spec/BPMN/20100524/DI" xmlns:dc="http://www.omg.org/spec/DD/20100524/DC" xmlns:camunda="http://camunda.org/schema/1.0/bpmn" xmlns:di="http://www.omg.org/spec/DD/20100524/DI" xmlns:bioc="http://bpmn.io/schema/bpmn/biocolor/1.0" xmlns:color="http://www.omg.org/spec/BPMN/non-normative/color/1.0" id="sample-diagram" targetNamespace="http://bpmn.io/schema/bpmn" exporter="Camunda Modeler" exporterVersion="4.12.0" xsi:schemaLocation="http://www.omg.org/spec/BPMN/20100524/MODEL BPMN20.xsd">
<bpmn2:signal id="Signal_1rr7wdd" name="Signal_05vo0km" /> <bpmn2:signal id="Signal_1rr7wdd" name="Signal_05vo0km" />
<bpmn2:collaboration id="Collaboration_0oahy0i"> <bpmn2:collaboration id="Collaboration_0oahy0i">
<bpmn2:participant id="Participant_19lpjee" name="Simple Connect" processRef="simple-connect" /> <bpmn2:participant id="Participant_19lpjee" name="Simple Connect" processRef="simple-connect" />
@ -1068,7 +1068,7 @@ Variables.userId(authenticatedUserId)</camunda:script>
<bpmn2:message id="Message_1in2mhs" name="create-server" /> <bpmn2:message id="Message_1in2mhs" name="create-server" />
<bpmn2:message id="Message_01xkrhl" name="create-service" /> <bpmn2:message id="Message_01xkrhl" name="create-service" />
<bpmn2:process id="smardigo-management-action" name="Smardigo Management Action" isExecutable="true"> <bpmn2:process id="smardigo-management-action" name="Smardigo Management Action" isExecutable="true">
<bpmn2:startEvent id="Event_02kqmmg" camunda:formKey="simple-connect-create"> <bpmn2:startEvent id="Event_02kqmmg">
<bpmn2:outgoing>Flow_1ow8whd</bpmn2:outgoing> <bpmn2:outgoing>Flow_1ow8whd</bpmn2:outgoing>
</bpmn2:startEvent> </bpmn2:startEvent>
<bpmn2:scriptTask id="Activity_1olpao9" name="ansible-start.groovy" scriptFormat="groovy" camunda:resource="ansible-start.groovy"> <bpmn2:scriptTask id="Activity_1olpao9" name="ansible-start.groovy" scriptFormat="groovy" camunda:resource="ansible-start.groovy">
@ -1145,7 +1145,7 @@ Variables.userId(authenticatedUserId)</camunda:script>
</bpmn2:process> </bpmn2:process>
<bpmn2:message id="Message_13oyyv2" name="action-executed-${execution.getVariable(&#39;smardigoManagementAction&#39;)}" /> <bpmn2:message id="Message_13oyyv2" name="action-executed-${execution.getVariable(&#39;smardigoManagementAction&#39;)}" />
<bpmn2:process id="smardigo-management-message" name="Smardigo Management Message" isExecutable="true"> <bpmn2:process id="smardigo-management-message" name="Smardigo Management Message" isExecutable="true">
<bpmn2:startEvent id="Event_14clga5" camunda:formKey="simple-connect-create"> <bpmn2:startEvent id="Event_14clga5">
<bpmn2:outgoing>Flow_1nu8qqa</bpmn2:outgoing> <bpmn2:outgoing>Flow_1nu8qqa</bpmn2:outgoing>
</bpmn2:startEvent> </bpmn2:startEvent>
<bpmn2:serviceTask id="Activity_1ipajwe" name="MS-Teams Benachrichtigung senden" camunda:delegateExpression="${rest.post(&#39;teams&#39;, &#39;/&#39;).responseJSONObject(&#39;teamsResponse&#39;).bodyJSONMap(teamsRequestBody)}"> <bpmn2:serviceTask id="Activity_1ipajwe" name="MS-Teams Benachrichtigung senden" camunda:delegateExpression="${rest.post(&#39;teams&#39;, &#39;/&#39;).responseJSONObject(&#39;teamsResponse&#39;).bodyJSONMap(teamsRequestBody)}">

@ -1,10 +0,0 @@
{
"name" : "Policy Mapping",
"configKey" : "role-policy-mapping",
"configType" : "role-policy-mapping",
"rolePolicyMapping" : {
"user" : [ "allow_read_write_variables_all" ],
"maintainer" : [ "allow_delete_process_all" ],
"administrator" : [ "allow_delete_process_all" ]
}
}
Loading…
Cancel
Save