pipeline{ agent { label 'aws' } parameters{ choice( description:'Choose ACCOUNT_ID', name:'ACCOUNT_ID', choices: ['122'] ) choice( description:'Choose EKS_CLUSTER', name:'EKS_CLUSTER', choices: [ 'nonprod-ap-east-1' ] ) choice( description:'Choose Helm Chart', name:'HELM', choices: [ 'spark-pi-ns-rbac' ] ) choice( description:'Choose Action', name:'ACTION', choices: [ 'deploy', 'delete' ] ) choice( description:'Choose Namespa
/***************************************************************************************************** @Note:Encrypt the password: SAS Password Encryption code: proc pwencode in="AAA123"; run; Use the code on SAS Studio to encrypt the password In the place of “AAA123” in the code, replace with password and execute Check the log to find the encrypted password looks like “{SAS002}993090402DD916161D2D84542B0148C” Update the encrypted password in the code *******************************************************************************************************/; %let usr=sasdemo; %let pwd={SAS002}35BAE0144C92782311439227468DDB33; /* Start timer */ %let _timer_start = %sysfunc(datetime()); %macro adduser_group(user= ,group= ,mdebug=0 ); %local check uuri guri; %let check=ok; data _null_; length uri type msg $256; call missing(of _all_); rc=metadata_getnobj("omsobj:Person?@Name='&user'",1,uri); if rc<=0