def run(decrypt=None, encrypt=None, crypto_file=None, update=None, _is_cli=False): options = {'-d': decrypt, '-e': encrypt, '-f': crypto_file, '-u': update} runner.run('manageFileCrypto.sh', [], options, _is_cli)
def run( release_mode=None, deployment_mode=None, log_level=None, tenant=None, account=None, product=None, environment=None, segment=None, context_credentials=None, _is_cli=False, env={}, ): env = { "AUTOMATION_LOG_LEVEL": log_level, "AUTOMATION_CONTEXT_CREDENTIALS": context_credentials, **env, } opts = { "-t": tenant, "-a": account, "-p": product, "-e": environment, "-s": segment, "-d": deployment_mode, "-r": release_mode, } runner.run( "setContext.sh", [], opts, env, _is_cli, script_base_path_env="AUTOMATION_BASE_DIR", )
def run(component=None, tier=None, instance=None, version=None, pipeline_status_only=None, pipeline_allow_concurrent=None, log_level=None, root_dir=None, tenant=None, account=None, product=None, environment=None, segment=None, _is_cli=False, **kwargs): options = { "-i": component, "-t": tier, "-x": instance, "-y": version, "-s": pipeline_status_only, "-c": pipeline_allow_concurrent, } env = { "GENERATION_LOG_LEVEL": log_level, "ROOT_DIR": root_dir, "TENANT": tenant, "ACCOUNT": account, "PRODUCT": product, "ENVIRONMENT": environment, "SEGMENT": segment, } runner.run("runPipeline.sh", [], options, env, _is_cli)
def run( account_repos=None, product_repos=None, commit_message=None, reference=None, tag=None, defer_push=None, log_level=None, _is_cli=False, env={}, ): opts = { "-a": account_repos, "-m": commit_message, "-p": product_repos, "-r": reference, "-t": tag, } env = { "AUTOMATION_LOG_LEVEL": log_level, "DEFER_REPO_PUSH": defer_push, **env } runner.run( "saveCMDBRepos.sh", [], opts, env, _is_cli, script_base_path_env="AUTOMATION_DIR", )
def run(sentry_source_map_s3_url=None, sentry_url_prefix=None, sentry_release_name=None, run_setup=None, log_level=None, root_dir=None, tenant=None, account=None, product=None, environment=None, segment=None, _is_cli=False, **kwargs): options = { "-m": sentry_source_map_s3_url, "-p": sentry_url_prefix, "-r": sentry_release_name, "-s": run_setup, } env = { "GENERATION_LOG_LEVEL": log_level, "ROOT_DIR": root_dir, "TENANT": tenant, "ACCOUNT": account, "PRODUCT": product, "ENVIRONMENT": environment, "SEGMENT": segment, } runner.run("runSentryRelease.sh", [], options, env, _is_cli)
def run( container_id=None, delay=None, env_name=None, component=None, component_instance=None, component_version=None, tier=None, value=None, task=None, instance=None, version=None, _is_cli=False ): options = { '-c': container_id, '-d': delay, '-e': env_name, '-i': component, '-j': component_instance, '-k': component_version, '-t': tier, '-v': value, '-w': task, '-x': instance, '-y': version } runner.run('runTask.sh', [], options, _is_cli)
def run(function_id=None, deployment_unit=None, input_payload=None, include_log_tail=None, log_level=None, root_dir=None, tenant=None, account=None, product=None, environment=None, segment=None, _is_cli=False, **kwargs): options = { "-f": function_id, "-u": deployment_unit, "-i": input_payload, "-l": include_log_tail, } env = { "GENERATION_LOG_LEVEL": log_level, "ROOT_DIR": root_dir, "TENANT": tenant, "ACCOUNT": account, "PRODUCT": product, "ENVIRONMENT": environment, "SEGMENT": segment, } runner.run("runLambda.sh", [], options, env, _is_cli)
def run(alias=None, base64_decode=None, decrypt=None, encrypt=None, crypto_file=None, key_id=None, no_alteration=None, json_path=None, quiet=None, crypto_text=None, update=None, visible=None, _is_cli=False): options = { '-a': alias, '-b': base64_decode, '-d': decrypt, '-e': encrypt, '-f': crypto_file, '-k': key_id, '-n': no_alteration, '-p': json_path, '-q': quiet, '-t': crypto_text, '-u': update, '-v': visible } runner.run('manageCrypto.sh', [], options, _is_cli)
def run( generation_input_source=None, output_dir=None, generation_provider=None, generation_framework=None, generation_testcase=None, log_level=None, root_dir=None, tenant=None, account=None, product=None, environment=None, segment=None, _is_cli=False, ): options = { "-i": generation_input_source, "-o": output_dir, "-p": generation_provider, "-f": generation_framework, "-t": generation_testcase, "-l": "unitlist", } env = { "GENERATION_LOG_LEVEL": log_level, "ROOT_DIR": root_dir, "TENANT": tenant, "ACCOUNT": account, "PRODUCT": product, "ENVIRONMENT": environment, "SEGMENT": segment, } runner.run("createTemplate.sh", [], options, env, _is_cli)
def run( registry_scope=None, dockerfile=None, docker_context=None, image_formats=None, code_commit=None, image_paths=None, docker_image=None, deployment_unit=None, log_level=None, _is_cli=False, env={}, ): opts = { "-c": registry_scope, "-d": dockerfile, "-e": docker_context, "-f": image_formats, "-g": code_commit, "-i": image_paths, "-t": docker_image, "-u": deployment_unit, } env = {"AUTOMATION_LOG_LEVEL": log_level, **env} runner.run( "manageImages.sh", [], opts, env, _is_cli, script_base_path_env="AUTOMATION_DIR" )
def run( config_ref=None, resource_group=None, level=None, request_ref=None, region=None, deployment_unit=None, deployment_unit_subset=None, deployment_mode=None, generation_provider=None, generation_framework=None, generation_testcase=None, generation_scenarios=None, generation_input_source=None, output_dir=None, _is_cli=False ): options = { '-c': config_ref, '-g': resource_group, '-l': level, '-q': request_ref, '-r': region, '-u': deployment_unit, '-z': deployment_unit_subset, '-d': deployment_mode, '-p': generation_provider, '-f': generation_framework, '-t': generation_testcase, '-s': generation_scenarios, '-i': generation_input_source, '-o': output_dir } runner.run('createTemplate.sh', [], options, _is_cli)
def run( decrypt=None, encrypt=None, crypto_file=None, update=None, log_level=None, root_dir=None, tenant=None, account=None, product=None, environment=None, segment=None, _is_cli=False, **kwargs, ): options = {"-d": decrypt, "-e": encrypt, "-f": crypto_file, "-u": update} env = { "GENERATION_LOG_LEVEL": log_level, "ROOT_DIR": root_dir, "TENANT": tenant, "ACCOUNT": account, "PRODUCT": product, "ENVIRONMENT": environment, "SEGMENT": segment, } runner.run("manageFileCrypto.sh", [], options, env, _is_cli)
def run( release_mode=None, acceptance_tag=None, deployment_unit=None, code_commit=None, code_tag=None, image_format=None, registry_scope=None, log_level=None, _is_cli=False, env={}, ): env = { "AUTOMATION_LOG_LEVEL": log_level, "DEPLOYMENT_UNIT_LIST": deployment_unit, "CODE_COMMIT": code_commit, "CODE_TAG": code_tag, "IMAGE_FORMAT": image_format, "REGISTRY_SCOPE": registry_scope, "RELEASE_MODE": release_mode, "ACCEPTANCE_TAG": acceptance_tag, **env, } runner.run( "confirmBuilds.sh", [], {}, env, _is_cli, script_base_path_env="AUTOMATION_DIR" )
def run( log_level=None, deployment_unit=None, code_commit=None, code_tag=None, image_format=None, registry_scope=None, _is_cli=False, env={}, ): env = { "AUTOMATION_LOG_LEVEL": log_level, "DEPLOYMENT_UNITS": deployment_unit, "CODE_COMMIT": code_commit, "CODE_TAG": code_tag, "IMAGE_FORMATS": image_format, "REGISTRY_SCOPE": registry_scope, **env, } runner.run( "updateBuildReferences.sh", [], {}, env, _is_cli, script_base_path_env="AUTOMATION_DIR", )
def run(sentry_source_map_s3_url=None, sentry_url_prefix=None, sentry_release_name=None, run_setup=None, _is_cli=False): options = { '-m': sentry_source_map_s3_url, '-p': sentry_url_prefix, '-r': sentry_release_name, '-s': run_setup } runner.run('runSentryRelease.sh', [], options, _is_cli)
def run(function_id=None, deployment_unit=None, input_payload=None, include_log_tail=None, _is_cli=False): options = { '-f': function_id, '-u': deployment_unit, '-i': input_payload, '-l': include_log_tail } runner.run('runLambda.sh', [], options, _is_cli)
def run(entrance=None, config_ref=None, resource_group=None, request_ref=None, region=None, deployment_group=None, deployment_unit=None, deployment_unit_subset=None, deployment_mode=None, generation_provider=None, generation_framework=None, generation_input_source=None, output_dir=None, disable_output_cleanup=None, entrance_parameter=None, log_level=None, root_dir=None, tenant=None, account=None, product=None, environment=None, segment=None, _is_cli=False, **kwargs): options = { "-e": entrance, "-c": config_ref, "-g": resource_group, "-l": deployment_group, "-q": request_ref, "-r": region, "-u": deployment_unit, "-z": deployment_unit_subset, "-d": deployment_mode, "-p": generation_provider, "-f": generation_framework, "-i": generation_input_source, "-o": output_dir, "-x": disable_output_cleanup, "-y": entrance_parameter, } env = { "GENERATION_LOG_LEVEL": log_level, "ROOT_DIR": root_dir, "TENANT": tenant, "ACCOUNT": account, "PRODUCT": product, "ENVIRONMENT": environment, "SEGMENT": segment, } runner.run("createTemplate.sh", [], options, env, _is_cli)
def run(component=None, tier=None, instance=None, version=None, pipeline_status_only=None, pipeline_allow_concurrent=None, _is_cli=False): options = { '-i': component, '-t': tier, '-x': instance, '-y': version, '-s': pipeline_status_only, '-c': pipeline_allow_concurrent } runner.run('runPipeline.sh', [], options, _is_cli)
def run(generation_input_source=None, output_dir=None, generation_provider=None, generation_framework=None, generation_testcase=None, generation_scenarios=None, _is_cli=False): options = { '-i': generation_input_source, '-o': output_dir, '-p': generation_provider, '-f': generation_framework, '-t': generation_testcase, '-s': generation_scenarios } runner.run('createBlueprint.sh', [], options, _is_cli)
def run( alias=None, base64_decode=None, decrypt=None, encrypt=None, crypto_file=None, key_id=None, no_alteration=None, json_path=None, quiet=None, crypto_text=None, update=None, visible=None, log_level=None, root_dir=None, tenant=None, account=None, product=None, environment=None, segment=None, _is_cli=False, **kwargs, ): options = { "-a": alias, "-b": base64_decode, "-d": decrypt, "-e": encrypt, "-f": crypto_file, "-k": key_id, "-n": no_alteration, "-p": json_path, "-q": quiet, "-t": crypto_text, "-u": update, "-v": visible, } env = { "GENERATION_LOG_LEVEL": log_level, "ROOT_DIR": root_dir, "TENANT": tenant, "ACCOUNT": account, "PRODUCT": product, "ENVIRONMENT": environment, "SEGMENT": segment, } runner.run("manageCrypto.sh", [], options, env, _is_cli)
def run( delete=None, deployment_initiate=None, deployment_group=None, deployment_monitor=None, region=None, deployment_scope=None, deployment_unit=None, deployment_wait=None, deployment_unit_subset=None, output_dir=None, dryrun=None, log_level=None, root_dir=None, tenant=None, account=None, product=None, environment=None, segment=None, _is_cli=False, **kwargs, ): options = { "-d": delete, "-i": deployment_initiate, "-m": deployment_monitor, "-l": deployment_group, "-r": region, "-s": deployment_scope, "-u": deployment_unit, "-w": deployment_wait, "-y": dryrun, "-z": deployment_unit_subset, "-o": output_dir, } env = { "GENERATION_LOG_LEVEL": log_level, "ROOT_DIR": root_dir, "TENANT": tenant, "ACCOUNT": account, "PRODUCT": product, "ENVIRONMENT": environment, "SEGMENT": segment, } runner.run("manageDeployment.sh", [], options, env, _is_cli)
def run(credential_email=None, crypto_file=None, credential_id=None, credential_path=None, credential_secret=None, visible=None, credential_type=None, _is_cli=False): options = { '-e': credential_email, '-f': crypto_file, '-i': credential_id, '-n': credential_path, '-v': visible, '-y': credential_type, '-s': credential_secret } runner.run('manageCredentialCrypto.sh', [], options, _is_cli)
def run( exclude_account_dirs=None, product_config_reference=None, product_infrastructure_reference=None, exclude_product_dirs=None, account_config_reference=None, account_infrastructure_reference=None, use_existing_tree=None, log_level=None, tenant=None, account=None, product=None, environment=None, segment=None, _is_cli=False, env={}, ): opts = { "-a": exclude_account_dirs, "-c": product_config_reference, "-e": use_existing_tree, "-i": product_infrastructure_reference, "-r": exclude_product_dirs, "-x": account_config_reference, "-y": account_infrastructure_reference, } env = { "AUTOMATION_LOG_LEVEL": log_level, "TENANT": tenant, "ACCOUNT": account, "PRODUCT": product, "ENVIRONMENT": environment, "SEGMENT": segment, **env, } runner.run( "constructTree.sh", [], opts, env, _is_cli, script_base_path_env="AUTOMATION_BASE_DIR", )
def run(container_id=None, delay=None, env_name=None, component=None, component_instance=None, component_version=None, tier=None, value=None, task=None, instance=None, version=None, log_level=None, root_dir=None, tenant=None, account=None, product=None, environment=None, segment=None, _is_cli=False, **kwargs): options = { "-c": container_id, "-d": delay, "-e": env_name, "-i": component, "-j": component_instance, "-k": component_version, "-t": tier, "-v": value, "-w": task, "-x": instance, "-y": version, } env = { "GENERATION_LOG_LEVEL": log_level, "ROOT_DIR": root_dir, "TENANT": tenant, "ACCOUNT": account, "PRODUCT": product, "ENVIRONMENT": environment, "SEGMENT": segment, } runner.run("runTask.sh", [], options, env, _is_cli)
def run( acceptance_tag=None, code_commits=None, list_full=None, segment_builds_dir=None, image_formats=None, list=None, registry_scopes=None, code_providers=None, code_repos=None, deployment_units=None, code_tags=None, update=None, verify=None, log_level=None, _is_cli=False, env={}, ): opts = { "-a": acceptance_tag, "-c": code_commits, "-f": list_full, "-g": segment_builds_dir, "-i": image_formats, "-l": list, "-o": registry_scopes, "-p": code_providers, "-r": code_repos, "-s": deployment_units, "-t": code_tags, "-u": update, "-v": verify, } env = {"AUTOMATION_LOG_LEVEL": log_level, **env} runner.run( "manageBuildReferences.sh", [], opts, env, _is_cli, script_base_path_env="AUTOMATION_DIR", )
def run(deployment_unit=None, run_setup=None, binary_expiration=None, force_binary_build=None, submit_binary=None, disable_ota=None, binary_build_process=None, qr_build_formats=None, _is_cli=False): options = { '-u': deployment_unit, '-s': run_setup, '-t': binary_expiration, '-f': force_binary_build, '-m': submit_binary, '-o': disable_ota, '-b': binary_build_process, '-q': qr_build_formats } runner.run('runExpoAppPublish.sh', [], options, _is_cli)
def run(deployment_unit=None, run_setup=None, force_binary_build=None, submit_binary=None, binary_build_process=None, build_logs=None, environment_badge=None, environment_badge_content=None, node_package_manager=None, app_version_source=None, log_level=None, root_dir=None, tenant=None, account=None, product=None, environment=None, segment=None, _is_cli=False, **kwargs): options = { "-b": binary_build_process, "-d": environment_badge_content, "-e": environment_badge, "-f": force_binary_build, "-l": build_logs, "-m": submit_binary, "-n": node_package_manager, "-s": run_setup, "-u": deployment_unit, "-v": app_version_source, } env = { "GENERATION_LOG_LEVEL": log_level, "ROOT_DIR": root_dir, "TENANT": tenant, "ACCOUNT": account, "PRODUCT": product, "ENVIRONMENT": environment, "SEGMENT": segment, } runner.run("runExpoAppPublish.sh", [], options, env, _is_cli)
def run( log_level=None, root_dir=None, tenant=None, account=None, product=None, environment=None, segment=None, _is_cli=False, **kwargs ): options = {} env = { "GENERATION_LOG_LEVEL": log_level, "ROOT_DIR": root_dir, "TENANT": tenant, "ACCOUNT": account, "PRODUCT": product, "ENVIRONMENT": environment, "SEGMENT": segment, } runner.run("setup.sh", [], options, env, _is_cli)
def run( credential_email=None, crypto_file=None, credential_id=None, credential_path=None, credential_secret=None, visible=None, credential_type=None, log_level=None, root_dir=None, tenant=None, account=None, product=None, environment=None, segment=None, _is_cli=False, **kwargs, ): options = { "-e": credential_email, "-f": crypto_file, "-i": credential_id, "-n": credential_path, "-v": visible, "-y": credential_type, "-s": credential_secret, } env = { "GENERATION_LOG_LEVEL": log_level, "ROOT_DIR": root_dir, "TENANT": tenant, "ACCOUNT": account, "PRODUCT": product, "ENVIRONMENT": environment, "SEGMENT": segment, } runner.run("manageCredentialCrypto.sh", [], options, env, _is_cli)
def run(delete=None, resource_group=None, deployment_initiate=None, level=None, deployment_monitor=None, region=None, deployment_scope=None, deployment_unit=None, deployment_wait=None, deployment_unit_subset=None, _is_cli=False): options = { '-d': delete, '-g': resource_group, '-i': deployment_initiate, '-m': deployment_monitor, '-l': level, '-r': region, '-s': deployment_scope, '-u': deployment_unit, '-w': deployment_wait, '-z': deployment_unit_subset } runner.run('manageDeployment.sh', [], options, _is_cli)