Merge "[cicd] Removed public-ci sync from cross component demos"
diff --git a/src/com/mirantis/mcp/UpgradeChecks.groovy b/src/com/mirantis/mcp/UpgradeChecks.groovy
new file mode 100644
index 0000000..60ab9a6
--- /dev/null
+++ b/src/com/mirantis/mcp/UpgradeChecks.groovy
@@ -0,0 +1,154 @@
+package com.mirantis.mcp
+
+/**
+ * Run check with parameters
+ *
+ * @param salt com.mirantis.mk.Salt object
+ * @param venvPepper venvPepper
+ * @param cluster_name MCP cluster name
+ * @param raise_exc Raise exception or return status of check
+**/
+
+def check_34406(salt, venvPepper, String cluster_name, Boolean raise_exc) {
+ def sphinxpasswordPillar = salt.getPillar(venvPepper, 'I@salt:master', '_param:sphinx_proxy_password_generated').get("return")[0].values()[0]
+ def waStatus = [prodId: "PROD-34406", isFixed: "", waInfo: ""]
+ if (sphinxpasswordPillar == '' || sphinxpasswordPillar == 'null' || sphinxpasswordPillar == null) {
+ waStatus.isFixed = "Work-around should be applied manually"
+ waStatus.waInfo = "See https://docs.mirantis.com/mcp/q4-18/mcp-release-notes/mu/mu-9/mu-9-addressed/mu-9-dtrain/mu-9-dt-manual.html#i-34406 for more info"
+ if (raise_exc) {
+ error('Sphinx password is not defined.\n' +
+ waStatus.waInfo)
+ }
+ return waStatus
+ }
+ waStatus.isFixed = "Work-around for PROD-34406 already applied, nothing todo"
+ return waStatus
+}
+
+def check_34645(salt, venvPepper, String cluster_name, Boolean raise_exc) {
+ def updatecellsPillar = salt.getPillar(venvPepper, 'I@nova:controller', 'nova:controller:update_cells').get("return")[0].values()[0]
+ def waStatus = [prodId: "PROD-34645", isFixed: "", waInfo: ""]
+ if (updatecellsPillar.toString().toLowerCase() == 'false') {
+ waStatus.isFixed = "Work-around should be applied manually"
+ waStatus.waInfo = "See https://docs.mirantis.com/mcp/q4-18/mcp-operations-guide/openstack-operations/disable-nova-cell-mapping.html for more info"
+ if (raise_exc) {
+ error('Update cells disabled.\n' +
+ waStatus.waInfo)
+ }
+ return waStatus
+ }
+ waStatus.isFixed = "Work-around for PROD-34645 already applied, nothing todo"
+ return waStatus
+}
+
+def check_35705(salt, venvPepper, String cluster_name, Boolean raise_exc) {
+ def galeracheckpasswordPillar = salt.getPillar(venvPepper, 'I@salt:master', '_param:galera_clustercheck_password').get("return")[0].values()[0]
+ def waStatus = [prodId: "PROD-35705", isFixed: "", waInfo: ""]
+ if (galeracheckpasswordPillar == '' || galeracheckpasswordPillar == 'null' || galeracheckpasswordPillar == null) {
+ waStatus.isFixed = "Work-around should be applied manually"
+ waStatus.waInfo = "See https://docs.mirantis.com/mcp/q4-18/mcp-release-notes/mu/mu-12/mu-12-addressed/mu-12-dtrain/mu-12-dt-manual.html#improper-operation-of-galera-ha for more info"
+ if (raise_exc) {
+ error('Galera clustercheck password is not defined.\n' +
+ waStatus.waInfo)
+ }
+ return waStatus
+ }
+ waStatus.isFixed = "Work-around for PROD-35705 already applied, nothing todo"
+ return waStatus
+}
+
+def check_35884(salt, venvPepper, String cluster_name, Boolean raise_exc) {
+ def waStatus = [prodId: "PROD-35884", isFixed: "", waInfo: ""]
+ if (salt.getMinions(venvPepper, 'I@prometheus:alerta or I@prometheus:alertmanager')) {
+ def alertaApiKeyGenPillar = salt.getPillar(venvPepper, 'I@salt:master', '_param:alerta_admin_api_key_generated').get("return")[0].values()[0]
+ def alertaApiKeyPillar = salt.getPillar(venvPepper, 'I@prometheus:alerta or I@prometheus:alertmanager', '_param:alerta_admin_key').get("return")[0].values()[0]
+ if (alertaApiKeyGenPillar == '' || alertaApiKeyGenPillar == 'null' || alertaApiKeyGenPillar == null || alertaApiKeyPillar == '' || alertaApiKeyPillar == 'null' || alertaApiKeyPillar == null) {
+ waStatus.isFixed = "Work-around should be applied manually"
+ waStatus.waInfo = "See https://docs.mirantis.com/mcp/q4-18/mcp-release-notes/mu/mu-12/mu-12-addressed/mu-12-dtrain/mu-12-dt-manual.html#i-35884 for more info"
+ if (raise_exc) {
+ error('Alerta admin API key not defined.\n' +
+ waStatus.waInfo)
+ }
+ return waStatus
+ }
+ }
+ waStatus.isFixed = "Work-around for PROD-35884 already applied, nothing todo"
+ return waStatus
+}
+
+def check_36461(salt, venvPepper, String cluster_name, Boolean raise_exc){
+ def common = new com.mirantis.mk.Common()
+ def waStatus = [prodId: "PROD-36461", isFixed: "", waInfo: ""]
+ if (!salt.testTarget(venvPepper, 'I@ceph:radosgw')) {
+ return
+ }
+ def clusterModelPath = "/srv/salt/reclass/classes/cluster/${cluster_name}"
+ def checkFile = "${clusterModelPath}/ceph/rgw.yml"
+ def saltTarget = "I@salt:master"
+ try {
+ salt.cmdRun(venvPepper, saltTarget, "test -f ${checkFile}")
+ }
+ catch (Exception e) {
+ waStatus.isFixed = "Check skipped"
+ waStatus.waInfo = "Unable to check ordering of RadosGW imports, file ${checkFile} not found, skipping"
+ if (raise_exc) {
+ common.warningMsg(waStatus.waInfo)
+ return
+ }
+ return waStatus
+ }
+ def fileContent = salt.cmdRun(venvPepper, saltTarget, "cat ${checkFile}").get('return')[0].values()[0].replaceAll('Salt command execution success', '').trim()
+ def yamlData = readYaml text: fileContent
+ def infraClassImport = "cluster.${cluster_name}.infra"
+ def cephClassImport = "cluster.${cluster_name}.ceph"
+ def cephCommonClassImport = "cluster.${cluster_name}.ceph.common"
+ def infraClassFound = false
+ def importErrorDetected = false
+ def importErrorMessage = """Ceph classes in '${checkFile}' are used in wrong order! Please reorder it:
+'${infraClassImport}' should be placed before '${cephClassImport}' and '${cephCommonClassImport}'.
+For additional information please see https://docs.mirantis.com/mcp/q4-18/mcp-release-notes/mu/mu-15/mu-15-addressed/mu-15-dtrain/mu-15-dtrain-manual.html"""
+ for (yamlClass in yamlData.classes) {
+ switch(yamlClass){
+ case infraClassImport:
+ infraClassFound = true;
+ break;
+ case cephClassImport:
+ if (!infraClassFound) {
+ importErrorDetected = true
+ };
+ break;
+ case cephCommonClassImport:
+ if (!infraClassFound) {
+ importErrorDetected = true
+ };
+ break;
+ }
+ }
+ if (importErrorDetected) {
+ waStatus.isFixed = "Work-around should be applied manually"
+ waStatus.waInfo = importErrorMessage
+ if (raise_exc) {
+ common.errorMsg(importErrorMessage)
+ error(importErrorMessage)
+ }
+ return waStatus
+ }
+ waStatus.isFixed = "Work-around for PROD-36461 already applied, nothing todo"
+ return waStatus
+}
+
+def check_36461_2 (salt, venvPepper, String cluster_name, Boolean raise_exc) {
+ def cephMonPillar = salt.getPillar(venvPepper, 'I@ceph:mon', 'ceph:common:config:mon:auth_allow_insecure_global_id_reclaim').get("return")[0].values()[0]
+ def waStatus = [prodId: "PROD-36461_2", isFixed: "", waInfo: ""]
+ if (cephMonPillar.toString().toLowerCase() != 'false') {
+ waStatus.isFixed = "Work-around should be applied manually"
+ waStatus.waInfo = "See https://docs.mirantis.com/mcp/q4-18/mcp-release-notes/single/index.html#i-cve-2021-20288 for more info"
+ if (raise_exc) {
+ error('Needed option is not set.\n' +
+ waStatus.waInfo)
+ }
+ return waStatus
+ }
+ waStatus.isFixed = "Work-around for PROD-36461_2 already applied, nothing todo"
+ return waStatus
+}
diff --git a/src/com/mirantis/mk/KaasUtils.groovy b/src/com/mirantis/mk/KaasUtils.groovy
index 51ee8d6..29d3cff 100644
--- a/src/com/mirantis/mk/KaasUtils.groovy
+++ b/src/com/mirantis/mk/KaasUtils.groovy
@@ -54,6 +54,7 @@
def customChildRelease = env.KAAS_CHILD_CLUSTER_RELEASE_NAME ? env.KAAS_CHILD_CLUSTER_RELEASE_NAME : ''
def attachBYO = env.ATTACH_BYO ? env.ATTACH_BYO.toBoolean() : false
def upgradeBYO = env.UPGRADE_BYO ? env.UPGRADE_BYO.toBoolean() : false
+ def runBYOMatrix = env.RUN_BYO_MATRIX ? env.RUN_BYO_MATRIX.toBoolean() : false
def upgradeMgmt = env.UPGRADE_MGMT_CLUSTER ? env.UPGRADE_MGMT_CLUSTER.toBoolean() : false
def enableLMALogging = env.ENABLE_LMA_LOGGING ? env.ENABLE_LMA_LOGGING.toBoolean(): false
def runUie2e = env.RUN_UI_E2E ? env.RUN_UI_E2E.toBoolean() : false
@@ -117,6 +118,13 @@
attachBYO = true
upgradeBYO = true
}
+ if (commitMsg ==~ /(?s).*\[run-byo-matrix\].*/ || env.GERRIT_EVENT_COMMENT_TEXT ==~ /(?s).*run-byo-matrix\.*/) {
+ runBYOMatrix = true
+
+ common.warningMsg('Forced byo matrix test via run-byo-matrix, all other byo triggers will be skipped')
+ attachBYO = false
+ upgradeBYO = false
+ }
if (commitMsg ==~ /(?s).*\[mgmt-upgrade\].*/ || env.GERRIT_EVENT_COMMENT_TEXT ==~ /(?s).*mgmt-upgrade.*/) {
upgradeMgmt = true
}
@@ -165,6 +173,7 @@
env.GERRIT_EVENT_COMMENT_TEXT ==~ /(?s).*aws-demo.*/ ||
attachBYO ||
upgradeBYO ||
+ runBYOMatrix ||
seedMacOs ||
equinixOnAwsDemo ||
azureOnAwsDemo) {
@@ -267,8 +276,9 @@
Custom child cluster release: ${customChildRelease}
Child cluster release upgrade scheduled: ${upgradeChild}
Child conformance testing scheduled: ${runChildConformance}
- BYO cluster attachment scheduled: ${attachBYO}
- Attached BYO cluster upgrade test scheduled: ${upgradeBYO}
+ Single BYO cluster attachment scheduled: ${attachBYO}
+ Single Attached BYO cluster upgrade test scheduled: ${upgradeBYO}
+ BYO test matrix whole suite scheduled: ${runBYOMatrix}
Mgmt cluster release upgrade scheduled: ${upgradeMgmt}
Mgmt LMA logging enabled: ${enableLMALogging}
Mgmt conformance testing scheduled: ${runMgmtConformance}
@@ -299,6 +309,7 @@
runChildConformanceEnabled : runChildConformance,
attachBYOEnabled : attachBYO,
upgradeBYOEnabled : upgradeBYO,
+ runBYOMatrixEnabled : runBYOMatrix,
upgradeMgmtEnabled : upgradeMgmt,
enableLMALoggingEnabled : enableLMALogging,
runUie2eEnabled : runUie2e,
@@ -582,6 +593,7 @@
booleanParam(name: 'UPGRADE_CHILD_CLUSTER', value: triggers.upgradeChildEnabled),
booleanParam(name: 'ATTACH_BYO', value: triggers.attachBYOEnabled),
booleanParam(name: 'UPGRADE_BYO', value: triggers.upgradeBYOEnabled),
+ booleanParam(name: 'RUN_BYO_MATRIX', value: triggers.runBYOMatrixEnabled),
booleanParam(name: 'RUN_CHILD_CFM', value: triggers.runChildConformanceEnabled),
booleanParam(name: 'ALLOW_AWS_ON_DEMAND', value: triggers.awsOnDemandDemoEnabled),
booleanParam(name: 'ALLOW_EQUINIX_ON_DEMAND', value: triggers.equinixOnDemandDemoEnabled),