Skip to content

Documentation update #78

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
wants to merge 3 commits into
base: main
Choose a base branch
from

Conversation

devanshjainms
Copy link
Contributor

This pull request includes updates to documentation and configuration files for the SAP Testing Automation Framework. The changes improve clarity, provide additional usage instructions, and modify some configuration parameters.

Documentation Updates:

  • README.md: Updated the repository status from "private preview" to "public preview" to reflect its current state.
  • docs/HIGH_AVAILABILITY.md: Added detailed instructions for using Azure Key Vault to store SSH keys or VM passwords, including how to locate the required resource and secret IDs.
  • docs/HIGH_AVAILABILITY.md: Enhanced the "Viewing Test Results" section with step-by-step instructions to locate and interpret the generated HTML test report, including an example screenshot.
  • docs/HIGH_AVAILABILITY.md: Corrected a minor typo in the file path for creating a password file (WORKSPACEWORKSPACES).
  • docs/HIGH_AVAILABILITY.md: Replaced the incorrect Markdown syntax for a note with the correct format.

Configuration Updates:

@Copilot Copilot AI review requested due to automatic review settings May 16, 2025 20:00
@devanshjainms devanshjainms requested a review from a team as a code owner May 16, 2025 20:00
Copy link

@Copilot Copilot AI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pull Request Overview

This PR enhances documentation clarity for the SAP Testing Automation Framework and adds new configuration parameters for SAP high-availability instances.

  • Updates preview status in README from “private” to “public”
  • Enriches HIGH_AVAILABILITY.md with Azure Key Vault guidance, test report viewing steps, typo fixes, and corrects note syntax
  • Introduces scs_instance_number and ers_instance_number in sap-parameters.yaml for Central Services and ERS instance configuration

Reviewed Changes

Copilot reviewed 4 out of 4 changed files in this pull request and generated 4 comments.

File Description
README.md Changed repository status note from “private preview” to “public preview”
docs/HIGH_AVAILABILITY.md Added Azure Key Vault SSH/VM password instructions; fixed path typo; detailed HTML report viewing steps; corrected Markdown note syntax
WORKSPACES/SYSTEM/DEV-WEEU-SAP01-X00/sap-parameters.yaml Added scs_instance_number and ers_instance_number parameters

Comment on lines +266 to +267
# If you've the SSHKEY or VMPASSWORD stored in the an Azure Key Vault as Secret:
# - Enter the Azure Key Vault Resource ID in key_vault_id parameter and the Secrete ID in secret_id paramter.
Copy link
Preview

Copilot AI May 16, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Fix grammar and duplicate article: change to If you have the SSH key or VM password stored in an Azure Key Vault as a secret:

Suggested change
# If you've the SSHKEY or VMPASSWORD stored in the an Azure Key Vault as Secret:
# - Enter the Azure Key Vault Resource ID in key_vault_id parameter and the Secrete ID in secret_id paramter.
# If you have the SSH key or VM password stored in an Azure Key Vault as a secret:
# - Enter the Azure Key Vault Resource ID in the key_vault_id parameter and the Secret ID in the secret_id parameter.

Copilot uses AI. Check for mistakes.

Comment on lines +266 to +269
# If you've the SSHKEY or VMPASSWORD stored in the an Azure Key Vault as Secret:
# - Enter the Azure Key Vault Resource ID in key_vault_id parameter and the Secrete ID in secret_id paramter.
# - You can find the Resource ID of Key Vault in Azure Portal → Key Vaults → Your Key Vault → JSON view → Copy the Resource ID
# - You can find the Resource ID of Secret in Your Key Vault → Secrets → Select Secret → Current Version → Copy the Secrete Identifier
Copy link
Preview

Copilot AI May 16, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Correct typos: SecreteSecret and paramterparameter.

Suggested change
# If you've the SSHKEY or VMPASSWORD stored in the an Azure Key Vault as Secret:
# - Enter the Azure Key Vault Resource ID in key_vault_id parameter and the Secrete ID in secret_id paramter.
# - You can find the Resource ID of Key Vault in Azure Portal → Key Vaults → Your Key Vault → JSON view → Copy the Resource ID
# - You can find the Resource ID of Secret in Your Key Vault → Secrets → Select Secret → Current Version → Copy the Secrete Identifier
# If you've the SSHKEY or VMPASSWORD stored in an Azure Key Vault as a Secret:
# - Enter the Azure Key Vault Resource ID in the key_vault_id parameter and the Secret ID in the secret_id parameter.
# - You can find the Resource ID of the Key Vault in Azure Portal → Key Vaults → Your Key Vault → JSON view → Copy the Resource ID
# - You can find the Resource ID of the Secret in Your Key Vault → Secrets → Select Secret → Current Version → Copy the Secret Identifier

Copilot uses AI. Check for mistakes.

Comment on lines +267 to +269
# - Enter the Azure Key Vault Resource ID in key_vault_id parameter and the Secrete ID in secret_id paramter.
# - You can find the Resource ID of Key Vault in Azure Portal → Key Vaults → Your Key Vault → JSON view → Copy the Resource ID
# - You can find the Resource ID of Secret in Your Key Vault → Secrets → Select Secret → Current Version → Copy the Secrete Identifier
Copy link
Preview

Copilot AI May 16, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Fix typo: SecreteSecret.

Suggested change
# - Enter the Azure Key Vault Resource ID in key_vault_id parameter and the Secrete ID in secret_id paramter.
# - You can find the Resource ID of Key Vault in Azure Portal → Key Vaults → Your Key Vault → JSON view → Copy the Resource ID
# - You can find the Resource ID of Secret in Your Key Vault → Secrets → Select Secret → Current Version → Copy the Secrete Identifier
# - Enter the Azure Key Vault Resource ID in key_vault_id parameter and the Secret ID in secret_id paramter.
# - You can find the Resource ID of Key Vault in Azure Portal → Key Vaults → Your Key Vault → JSON view → Copy the Resource ID
# - You can find the Resource ID of Secret in Your Key Vault → Secrets → Select Secret → Current Version → Copy the Secret Identifier

Copilot uses AI. Check for mistakes.

Comment on lines 11 to +12
scs_cluster_type: AFA
scs_instance_number: "00"
Copy link
Preview

Copilot AI May 16, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

[nitpick] Add a brief comment describing scs_instance_number and ers_instance_number to explain their purpose (e.g., two-digit instance number for the SAP Central Services and Enqueue Replication Server).

Suggested change
scs_cluster_type: AFA
scs_instance_number: "00"
scs_cluster_type: AFA
# scs_instance_number is the two-digit instance number for the SAP Central Services (SCS)
scs_instance_number: "00"
# ers_instance_number is the two-digit instance number for the Enqueue Replication Server (ERS)

Copilot uses AI. Check for mistakes.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant