Petr Lomakin | 47fee0a | 2017-08-01 10:46:05 -0700 | [diff] [blame] | 1 | package com.mirantis.mcp |
| 2 | |
| 3 | /** |
| 4 | * |
| 5 | * Tests providing functions |
| 6 | * |
| 7 | */ |
| 8 | |
| 9 | /** |
Oleksii Zhurba | 7b44ef1 | 2017-11-13 17:50:16 -0600 | [diff] [blame] | 10 | * Run docker container with basic (keystone) parameters |
Oleksii Zhurba | 1f4a6ff | 2018-06-27 16:45:17 -0500 | [diff] [blame] | 11 | * For backward compatibility. Deprecated. |
| 12 | * Will be removed soon. |
Petr Lomakin | 47fee0a | 2017-08-01 10:46:05 -0700 | [diff] [blame] | 13 | * |
Oleksii Zhurba | 7b44ef1 | 2017-11-13 17:50:16 -0600 | [diff] [blame] | 14 | * @param target Host to run container |
| 15 | * @param dockerImageLink Docker image link. May be custom or default rally image |
Petr Lomakin | 47fee0a | 2017-08-01 10:46:05 -0700 | [diff] [blame] | 16 | */ |
Oleksii Zhurba | 1f4a6ff | 2018-06-27 16:45:17 -0500 | [diff] [blame] | 17 | def runBasicContainer(master, target, dockerImageLink="xrally/xrally-openstack:0.10.1"){ |
Petr Lomakin | 47fee0a | 2017-08-01 10:46:05 -0700 | [diff] [blame] | 18 | def salt = new com.mirantis.mk.Salt() |
| 19 | def common = new com.mirantis.mk.Common() |
Sam Stoelinga | 28bdb72 | 2017-09-25 18:29:59 -0700 | [diff] [blame] | 20 | def _pillar = salt.getPillar(master, 'I@keystone:server', 'keystone:server') |
| 21 | def keystone = _pillar['return'][0].values()[0] |
Oleksii Zhurba | 7b44ef1 | 2017-11-13 17:50:16 -0600 | [diff] [blame] | 22 | if ( salt.cmdRun(master, target, "docker ps -f name=cvp -q", false, null, false)['return'][0].values()[0] ) { |
| 23 | salt.cmdRun(master, target, "docker rm -f cvp") |
| 24 | } |
| 25 | salt.cmdRun(master, target, "docker run -tid --net=host --name=cvp " + |
| 26 | "-u root -e OS_USERNAME=${keystone.admin_name} " + |
Petr Lomakin | 47fee0a | 2017-08-01 10:46:05 -0700 | [diff] [blame] | 27 | "-e OS_PASSWORD=${keystone.admin_password} -e OS_TENANT_NAME=${keystone.admin_tenant} " + |
| 28 | "-e OS_AUTH_URL=http://${keystone.bind.private_address}:${keystone.bind.private_port}/v2.0 " + |
Oleksii Zhurba | 1bf9be1 | 2018-01-17 15:20:00 -0600 | [diff] [blame] | 29 | "-e OS_REGION_NAME=${keystone.region} -e OS_ENDPOINT_TYPE=admin --entrypoint /bin/bash ${dockerImageLink}") |
Petr Lomakin | 47fee0a | 2017-08-01 10:46:05 -0700 | [diff] [blame] | 30 | } |
| 31 | |
Oleksii Zhurba | 1f4a6ff | 2018-06-27 16:45:17 -0500 | [diff] [blame] | 32 | |
| 33 | /** |
| 34 | * Run docker container with parameters |
| 35 | * |
| 36 | * @param target Host to run container |
| 37 | * @param dockerImageLink Docker image link. May be custom or default rally image |
| 38 | * @param name Name for container |
| 39 | * @param env_var Environment variables to set in container |
| 40 | * @param entrypoint Set entrypoint to /bin/bash or leave default |
| 41 | **/ |
| 42 | |
| 43 | |
| 44 | def runContainer(master, target, dockerImageLink, name='cvp', env_var=[], entrypoint=true){ |
| 45 | def salt = new com.mirantis.mk.Salt() |
| 46 | def common = new com.mirantis.mk.Common() |
| 47 | def variables = '' |
| 48 | def entry_point = '' |
| 49 | if ( salt.cmdRun(master, target, "docker ps -f name=${name} -q", false, null, false)['return'][0].values()[0] ) { |
| 50 | salt.cmdRun(master, target, "docker rm -f ${name}") |
| 51 | } |
| 52 | if (env_var.size() > 0) { |
| 53 | variables = ' -e ' + env_var.join(' -e ') |
| 54 | } |
| 55 | if (entrypoint) { |
| 56 | entry_point = '--entrypoint /bin/bash' |
| 57 | } |
| 58 | salt.cmdRun(master, target, "docker run -tid --net=host --name=${name} " + |
Oleksii Zhurba | fa885ed | 2019-02-13 18:27:31 -0600 | [diff] [blame] | 59 | "-u root ${entry_point} ${variables} " + |
| 60 | "-v /srv/salt/pki/${cluster_name}/:/etc/certs ${dockerImageLink}") |
Oleksii Zhurba | 1f4a6ff | 2018-06-27 16:45:17 -0500 | [diff] [blame] | 61 | } |
| 62 | |
| 63 | |
Petr Lomakin | 47fee0a | 2017-08-01 10:46:05 -0700 | [diff] [blame] | 64 | /** |
Oleksii Zhurba | 4bcf07f | 2018-09-11 15:23:18 -0500 | [diff] [blame] | 65 | * Get v2 Keystone credentials from pillars |
| 66 | * |
| 67 | */ |
| 68 | def _get_keystone_creds_v2(master){ |
| 69 | def salt = new com.mirantis.mk.Salt() |
| 70 | def common = new com.mirantis.mk.Common() |
| 71 | def keystone = [] |
| 72 | common.infoMsg("Fetching Keystone v2 credentials") |
| 73 | _pillar = salt.getPillar(master, 'I@keystone:server', 'keystone:server')['return'][0].values()[0] |
| 74 | keystone.add("OS_USERNAME=${_pillar.admin_name}") |
| 75 | keystone.add("OS_PASSWORD=${_pillar.admin_password}") |
| 76 | keystone.add("OS_TENANT_NAME=${_pillar.admin_tenant}") |
| 77 | keystone.add("OS_AUTH_URL=http://${_pillar.bind.private_address}:${_pillar.bind.private_port}/v2.0") |
| 78 | keystone.add("OS_REGION_NAME=${_pillar.region}") |
| 79 | keystone.add("OS_ENDPOINT_TYPE=admin") |
| 80 | return keystone |
| 81 | } |
| 82 | |
| 83 | /** |
| 84 | * Get v3 Keystone credentials from pillars |
| 85 | * |
| 86 | */ |
| 87 | def _get_keystone_creds_v3(master){ |
| 88 | def salt = new com.mirantis.mk.Salt() |
| 89 | def common = new com.mirantis.mk.Common() |
| 90 | pillar_name = 'keystone:client:os_client_config:cfgs:root:content:clouds:admin_identity' |
| 91 | common.infoMsg("Fetching Keystone v3 credentials") |
| 92 | def _pillar = salt.getPillar(master, 'I@keystone:client', pillar_name)['return'][0].values()[0] |
| 93 | def keystone = [] |
| 94 | if (_pillar) { |
| 95 | keystone.add("OS_USERNAME=${_pillar.auth.username}") |
| 96 | keystone.add("OS_PASSWORD=${_pillar.auth.password}") |
| 97 | keystone.add("OS_TENANT_NAME=${_pillar.auth.project_name}") |
| 98 | keystone.add("OS_PROJECT_NAME=${_pillar.auth.project_name}") |
| 99 | keystone.add("OS_AUTH_URL=${_pillar.auth.auth_url}/v3") |
| 100 | keystone.add("OS_REGION_NAME=${_pillar.region_name}") |
| 101 | keystone.add("OS_IDENTITY_API_VERSION=${_pillar.identity_api_version}") |
Oleksii Zhurba | fa885ed | 2019-02-13 18:27:31 -0600 | [diff] [blame] | 102 | keystone.add("OS_ENDPOINT_TYPE=internal") |
Oleksii Zhurba | 4bcf07f | 2018-09-11 15:23:18 -0500 | [diff] [blame] | 103 | keystone.add("OS_PROJECT_DOMAIN_NAME=${_pillar.auth.project_domain_name}") |
| 104 | keystone.add("OS_USER_DOMAIN_NAME=${_pillar.auth.user_domain_name}") |
Oleksii Zhurba | fa885ed | 2019-02-13 18:27:31 -0600 | [diff] [blame] | 105 | // we mount /srv/salt/pki/${cluster_name}/:/etc/certs with certs for cvp container |
| 106 | keystone.add("OS_CACERT='/etc/certs/proxy-with-chain.crt'") |
Oleksii Zhurba | 4bcf07f | 2018-09-11 15:23:18 -0500 | [diff] [blame] | 107 | return keystone |
| 108 | } |
| 109 | else { |
| 110 | common.warningMsg("Failed to fetch Keystone v3 credentials") |
| 111 | return false |
| 112 | } |
| 113 | } |
| 114 | |
| 115 | /** |
Dmitrii Kabanov | 23901c2 | 2017-10-20 10:25:36 -0700 | [diff] [blame] | 116 | * Get file content (encoded). The content encoded by Base64. |
Dmitrii Kabanov | d5f1c5f | 2017-08-30 14:51:41 -0700 | [diff] [blame] | 117 | * |
| 118 | * @param target Compound target (should target only one host) |
| 119 | * @param file File path to read |
Dmitrii Kabanov | 23901c2 | 2017-10-20 10:25:36 -0700 | [diff] [blame] | 120 | * @return The encoded content of the file |
Dmitrii Kabanov | d5f1c5f | 2017-08-30 14:51:41 -0700 | [diff] [blame] | 121 | */ |
Dmitrii Kabanov | 23901c2 | 2017-10-20 10:25:36 -0700 | [diff] [blame] | 122 | def getFileContentEncoded(master, target, file) { |
Dmitrii Kabanov | d5f1c5f | 2017-08-30 14:51:41 -0700 | [diff] [blame] | 123 | def salt = new com.mirantis.mk.Salt() |
Dmitrii Kabanov | 23901c2 | 2017-10-20 10:25:36 -0700 | [diff] [blame] | 124 | def file_content = '' |
| 125 | def cmd = "base64 -w0 ${file} > ${file}_encoded; " + |
| 126 | "split -b 1MB -d ${file}_encoded ${file}__; " + |
| 127 | "rm ${file}_encoded" |
| 128 | salt.cmdRun(master, target, cmd, false, null, false) |
| 129 | def filename = file.tokenize('/').last() |
| 130 | def folder = file - filename |
| 131 | def parts = salt.runSaltProcessStep(master, target, 'file.find', ["${folder}", "type=f", "name=${filename}__*"]) |
| 132 | for ( part in parts['return'][0].values()[0]) { |
| 133 | def _result = salt.cmdRun(master, target, "cat ${part}", false, null, false) |
| 134 | file_content = file_content + _result['return'][0].values()[0].replaceAll('Salt command execution success','') |
| 135 | } |
| 136 | salt.runSaltProcessStep(master, target, 'file.find', ["${folder}", "type=f", "name=${filename}__*", "delete"]) |
| 137 | return file_content |
| 138 | } |
| 139 | |
| 140 | /** |
| 141 | * Copy files from remote to local directory. The content of files will be |
| 142 | * decoded by Base64. |
| 143 | * |
| 144 | * @param target Compound target (should target only one host) |
| 145 | * @param folder The path to remote folder. |
| 146 | * @param output_dir The path to local folder. |
| 147 | */ |
| 148 | def addFiles(master, target, folder, output_dir) { |
| 149 | def salt = new com.mirantis.mk.Salt() |
| 150 | def _result = salt.runSaltProcessStep(master, target, 'file.find', ["${folder}", "type=f"]) |
| 151 | def files = _result['return'][0].values()[0] |
| 152 | for (file in files) { |
| 153 | def file_content = getFileContentEncoded(master, target, "${file}") |
| 154 | def fileName = file.tokenize('/').last() |
| 155 | writeFile file: "${output_dir}${fileName}_encoded", text: file_content |
| 156 | def cmd = "base64 -d ${output_dir}${fileName}_encoded > ${output_dir}${fileName}; " + |
| 157 | "rm ${output_dir}${fileName}_encoded" |
| 158 | sh(script: cmd) |
Dmitrii Kabanov | d5f1c5f | 2017-08-30 14:51:41 -0700 | [diff] [blame] | 159 | } |
| 160 | } |
| 161 | |
| 162 | /** |
| 163 | * Get reclass value |
| 164 | * |
| 165 | * @param target The host for which the values will be provided |
| 166 | * @param filter Parameters divided by dots |
| 167 | * @return The pillar data |
| 168 | */ |
| 169 | def getReclassValue(master, target, filter) { |
| 170 | def common = new com.mirantis.mk.Common() |
| 171 | def salt = new com.mirantis.mk.Salt() |
| 172 | def items = filter.tokenize('.') |
Dmitrii Kabanov | 23901c2 | 2017-10-20 10:25:36 -0700 | [diff] [blame] | 173 | def _result = salt.cmdRun(master, 'I@salt:master', "reclass-salt -o json -p ${target}", false, null, false) |
Dmitrii Kabanov | d5f1c5f | 2017-08-30 14:51:41 -0700 | [diff] [blame] | 174 | _result = common.parseJSON(_result['return'][0].values()[0]) |
Dmitrii Kabanov | 23901c2 | 2017-10-20 10:25:36 -0700 | [diff] [blame] | 175 | for (int k = 0; k < items.size(); k++) { |
Dmitrii Kabanov | d5f1c5f | 2017-08-30 14:51:41 -0700 | [diff] [blame] | 176 | if ( _result ) { |
Dmitrii Kabanov | 23901c2 | 2017-10-20 10:25:36 -0700 | [diff] [blame] | 177 | _result = _result["${items[k]}"] |
Dmitrii Kabanov | d5f1c5f | 2017-08-30 14:51:41 -0700 | [diff] [blame] | 178 | } |
| 179 | } |
| 180 | return _result |
| 181 | } |
| 182 | |
| 183 | /** |
| 184 | * Create list of nodes in JSON format. |
| 185 | * |
| 186 | * @param filter The Salt's matcher |
| 187 | * @return JSON list of nodes |
| 188 | */ |
| 189 | def getNodeList(master, filter = null) { |
| 190 | def salt = new com.mirantis.mk.Salt() |
| 191 | def common = new com.mirantis.mk.Common() |
Dmitrii Kabanov | d5f1c5f | 2017-08-30 14:51:41 -0700 | [diff] [blame] | 192 | def nodes = [] |
Dmitrii Kabanov | d5f1c5f | 2017-08-30 14:51:41 -0700 | [diff] [blame] | 193 | def filtered_list = null |
| 194 | def controllers = salt.getMinions(master, 'I@nova:controller') |
| 195 | def hw_nodes = salt.getMinions(master, 'G@virtual:physical') |
Dmitrii Kabanov | d5f1c5f | 2017-08-30 14:51:41 -0700 | [diff] [blame] | 196 | if ( filter ) { |
| 197 | filtered_list = salt.getMinions(master, filter) |
Dmitrii Kabanov | d5f1c5f | 2017-08-30 14:51:41 -0700 | [diff] [blame] | 198 | } |
| 199 | def _result = salt.cmdRun(master, 'I@salt:master', "reclass-salt -o json -t", false, null, false) |
| 200 | def reclass_top = common.parseJSON(_result['return'][0].values()[0]) |
Dmitrii Kabanov | 23901c2 | 2017-10-20 10:25:36 -0700 | [diff] [blame] | 201 | def nodesList = reclass_top['base'].keySet() |
| 202 | for (int i = 0; i < nodesList.size(); i++) { |
Dmitrii Kabanov | d5f1c5f | 2017-08-30 14:51:41 -0700 | [diff] [blame] | 203 | if ( filtered_list ) { |
Dmitrii Kabanov | 23901c2 | 2017-10-20 10:25:36 -0700 | [diff] [blame] | 204 | if ( ! filtered_list.contains(nodesList[i]) ) { |
Dmitrii Kabanov | d5f1c5f | 2017-08-30 14:51:41 -0700 | [diff] [blame] | 205 | continue |
| 206 | } |
| 207 | } |
Dmitrii Kabanov | 23901c2 | 2017-10-20 10:25:36 -0700 | [diff] [blame] | 208 | def ip = getReclassValue(master, nodesList[i], '_param.linux_single_interface.address') |
| 209 | def network_data = [ip: ip, name: 'management'] |
| 210 | def roles = [nodesList[i].tokenize('.')[0]] |
| 211 | if ( controllers.contains(nodesList[i]) ) { |
| 212 | roles.add('controller') |
Dmitrii Kabanov | d5f1c5f | 2017-08-30 14:51:41 -0700 | [diff] [blame] | 213 | } |
Dmitrii Kabanov | 23901c2 | 2017-10-20 10:25:36 -0700 | [diff] [blame] | 214 | if ( hw_nodes.contains(nodesList[i]) ) { |
| 215 | roles.add('hw_node') |
Dmitrii Kabanov | d5f1c5f | 2017-08-30 14:51:41 -0700 | [diff] [blame] | 216 | } |
Dmitrii Kabanov | 23901c2 | 2017-10-20 10:25:36 -0700 | [diff] [blame] | 217 | nodes.add([id: i+1, ip: ip, roles: roles, network_data: [network_data]]) |
Dmitrii Kabanov | d5f1c5f | 2017-08-30 14:51:41 -0700 | [diff] [blame] | 218 | } |
Dmitrii Kabanov | 23901c2 | 2017-10-20 10:25:36 -0700 | [diff] [blame] | 219 | return common.prettify(nodes) |
Dmitrii Kabanov | d5f1c5f | 2017-08-30 14:51:41 -0700 | [diff] [blame] | 220 | } |
| 221 | |
Oleksii Zhurba | bcb97e2 | 2017-10-05 14:10:39 -0500 | [diff] [blame] | 222 | /** |
| 223 | * Execute mcp sanity tests |
Oleksii Zhurba | 1f4a6ff | 2018-06-27 16:45:17 -0500 | [diff] [blame] | 224 | * Deprecated. Will be removed soon |
Oleksii Zhurba | bcb97e2 | 2017-10-05 14:10:39 -0500 | [diff] [blame] | 225 | * |
| 226 | * @param salt_url Salt master url |
| 227 | * @param salt_credentials Salt credentials |
| 228 | * @param test_set Test set for mcp sanity framework |
Oleksii Zhurba | 0a7b070 | 2017-11-10 16:02:16 -0600 | [diff] [blame] | 229 | * @param env_vars Additional environment variables for cvp-sanity-checks |
Oleksii Zhurba | bcb97e2 | 2017-10-05 14:10:39 -0500 | [diff] [blame] | 230 | * @param output_dir Directory for results |
| 231 | */ |
Oleksii Zhurba | 0a7b070 | 2017-11-10 16:02:16 -0600 | [diff] [blame] | 232 | def runSanityTests(salt_url, salt_credentials, test_set="", output_dir="validation_artifacts/", env_vars="") { |
Oleksii Zhurba | bcb97e2 | 2017-10-05 14:10:39 -0500 | [diff] [blame] | 233 | def common = new com.mirantis.mk.Common() |
Oleksii Zhurba | 0a7b070 | 2017-11-10 16:02:16 -0600 | [diff] [blame] | 234 | def creds = common.getCredentials(salt_credentials) |
| 235 | def username = creds.username |
| 236 | def password = creds.password |
| 237 | def settings = "" |
| 238 | if ( env_vars != "" ) { |
| 239 | for (var in env_vars.tokenize(";")) { |
| 240 | settings += "export ${var}; " |
| 241 | } |
| 242 | } |
| 243 | def script = ". ${env.WORKSPACE}/venv/bin/activate; ${settings}" + |
Oleksii Zhurba | 5250a9c | 2018-03-21 15:47:03 -0500 | [diff] [blame] | 244 | "pytest --junitxml ${output_dir}cvp_sanity.xml --tb=short -sv ${env.WORKSPACE}/cvp-sanity-checks/cvp_checks/tests/${test_set}" |
Oleksii Zhurba | bcb97e2 | 2017-10-05 14:10:39 -0500 | [diff] [blame] | 245 | withEnv(["SALT_USERNAME=${username}", "SALT_PASSWORD=${password}", "SALT_URL=${salt_url}"]) { |
| 246 | def statusCode = sh script:script, returnStatus:true |
| 247 | } |
| 248 | } |
Dmitrii Kabanov | d5f1c5f | 2017-08-30 14:51:41 -0700 | [diff] [blame] | 249 | |
| 250 | /** |
Oleksii Zhurba | 4e366ff | 2018-02-16 20:06:52 -0600 | [diff] [blame] | 251 | * Execute pytest framework tests |
| 252 | * |
| 253 | * @param salt_url Salt master url |
| 254 | * @param salt_credentials Salt credentials |
| 255 | * @param test_set Test set to run |
| 256 | * @param env_vars Additional environment variables for cvp-sanity-checks |
| 257 | * @param output_dir Directory for results |
| 258 | */ |
Oleksii Zhurba | 1f4a6ff | 2018-06-27 16:45:17 -0500 | [diff] [blame] | 259 | def runPyTests(salt_url, salt_credentials, test_set="", env_vars="", name='cvp', container_node="", remote_dir='/root/qa_results/', artifacts_dir='validation_artifacts/') { |
| 260 | def xml_file = "${name}_report.xml" |
| 261 | def common = new com.mirantis.mk.Common() |
| 262 | def salt = new com.mirantis.mk.Salt() |
| 263 | def creds = common.getCredentials(salt_credentials) |
| 264 | def username = creds.username |
| 265 | def password = creds.password |
| 266 | if (container_node != "") { |
| 267 | def saltMaster |
| 268 | saltMaster = salt.connection(salt_url, salt_credentials) |
| 269 | def script = "pytest --junitxml ${xml_file} --tb=short -sv ${test_set}" |
| 270 | env_vars.addAll("SALT_USERNAME=${username}", "SALT_PASSWORD=${password}", |
| 271 | "SALT_URL=${salt_url}") |
| 272 | variables = ' -e ' + env_vars.join(' -e ') |
| 273 | salt.cmdRun(saltMaster, container_node, "docker exec ${variables} ${name} bash -c '${script}'", false) |
| 274 | salt.cmdRun(saltMaster, container_node, "docker cp ${name}:/var/lib/${xml_file} ${remote_dir}${xml_file}") |
| 275 | addFiles(saltMaster, container_node, remote_dir+xml_file, artifacts_dir) |
| 276 | } |
| 277 | else { |
| 278 | if (env_vars.size() > 0) { |
| 279 | variables = 'export ' + env_vars.join(';export ') |
| 280 | } |
| 281 | def script = ". ${env.WORKSPACE}/venv/bin/activate; ${variables}; " + |
| 282 | "pytest --junitxml ${artifacts_dir}${xml_file} --tb=short -sv ${env.WORKSPACE}/${test_set}" |
| 283 | withEnv(["SALT_USERNAME=${username}", "SALT_PASSWORD=${password}", "SALT_URL=${salt_url}"]) { |
| 284 | def statusCode = sh script:script, returnStatus:true |
| 285 | } |
| 286 | } |
| 287 | } |
| 288 | |
| 289 | /** |
| 290 | * Execute pytest framework tests |
| 291 | * For backward compatibility |
| 292 | * Will be removed soon |
| 293 | * |
| 294 | * @param salt_url Salt master url |
| 295 | * @param salt_credentials Salt credentials |
| 296 | * @param test_set Test set to run |
| 297 | * @param env_vars Additional environment variables for cvp-sanity-checks |
| 298 | * @param output_dir Directory for results |
| 299 | */ |
Oleksii Zhurba | 4e366ff | 2018-02-16 20:06:52 -0600 | [diff] [blame] | 300 | def runTests(salt_url, salt_credentials, test_set="", output_dir="validation_artifacts/", env_vars="") { |
| 301 | def common = new com.mirantis.mk.Common() |
| 302 | def creds = common.getCredentials(salt_credentials) |
| 303 | def username = creds.username |
| 304 | def password = creds.password |
| 305 | def settings = "" |
| 306 | if ( env_vars != "" ) { |
| 307 | for (var in env_vars.tokenize(";")) { |
| 308 | settings += "export ${var}; " |
| 309 | } |
| 310 | } |
| 311 | def script = ". ${env.WORKSPACE}/venv/bin/activate; ${settings}" + |
| 312 | "pytest --junitxml ${output_dir}report.xml --tb=short -sv ${env.WORKSPACE}/${test_set}" |
| 313 | withEnv(["SALT_USERNAME=${username}", "SALT_PASSWORD=${password}", "SALT_URL=${salt_url}"]) { |
| 314 | def statusCode = sh script:script, returnStatus:true |
| 315 | } |
| 316 | } |
| 317 | |
| 318 | /** |
Petr Lomakin | 47fee0a | 2017-08-01 10:46:05 -0700 | [diff] [blame] | 319 | * Execute tempest tests |
| 320 | * |
| 321 | * @param target Host to run tests |
Dmitrii Kabanov | 23901c2 | 2017-10-20 10:25:36 -0700 | [diff] [blame] | 322 | * @param dockerImageLink Docker image link |
Petr Lomakin | 47fee0a | 2017-08-01 10:46:05 -0700 | [diff] [blame] | 323 | * @param pattern If not false, will run only tests matched the pattern |
| 324 | * @param output_dir Directory for results |
Dmitrii Kabanov | 999fda9 | 2017-11-10 00:18:30 -0800 | [diff] [blame] | 325 | * @param confRepository Git repository with configuration files for Tempest |
| 326 | * @param confBranch Git branch which will be used during the checkout |
| 327 | * @param repository Git repository with Tempest |
| 328 | * @param version Version of Tempest (tag, branch or commit) |
Sergey Galkin | d1068e2 | 2018-02-13 13:59:32 +0400 | [diff] [blame] | 329 | * @param results The reports directory |
Petr Lomakin | 47fee0a | 2017-08-01 10:46:05 -0700 | [diff] [blame] | 330 | */ |
Sergey Galkin | d1068e2 | 2018-02-13 13:59:32 +0400 | [diff] [blame] | 331 | def runTempestTests(master, target, dockerImageLink, output_dir, confRepository, confBranch, repository, version, pattern = "false", results = '/root/qa_results') { |
Petr Lomakin | 47fee0a | 2017-08-01 10:46:05 -0700 | [diff] [blame] | 332 | def salt = new com.mirantis.mk.Salt() |
| 333 | def output_file = 'docker-tempest.log' |
Dmitrii Kabanov | 23901c2 | 2017-10-20 10:25:36 -0700 | [diff] [blame] | 334 | def dest_folder = '/home/rally/qa_results' |
Dmitrii Kabanov | 999fda9 | 2017-11-10 00:18:30 -0800 | [diff] [blame] | 335 | def skip_list = '--skip-list /opt/devops-qa-tools/deployment/skip_contrail.list' |
Dmitrii Kabanov | 23901c2 | 2017-10-20 10:25:36 -0700 | [diff] [blame] | 336 | salt.runSaltProcessStep(master, target, 'file.remove', ["${results}"]) |
| 337 | salt.runSaltProcessStep(master, target, 'file.mkdir', ["${results}", "mode=777"]) |
| 338 | def _pillar = salt.getPillar(master, 'I@keystone:server', 'keystone:server') |
| 339 | def keystone = _pillar['return'][0].values()[0] |
Dmitry Tsapikov | b691192 | 2018-07-24 15:21:23 +0000 | [diff] [blame] | 340 | def env_vars = ['tempest_version=15.0.0', |
Dmitrii Kabanov | 23901c2 | 2017-10-20 10:25:36 -0700 | [diff] [blame] | 341 | "OS_USERNAME=${keystone.admin_name}", |
| 342 | "OS_PASSWORD=${keystone.admin_password}", |
| 343 | "OS_TENANT_NAME=${keystone.admin_tenant}", |
| 344 | "OS_AUTH_URL=http://${keystone.bind.private_address}:${keystone.bind.private_port}/v2.0", |
| 345 | "OS_REGION_NAME=${keystone.region}", |
| 346 | 'OS_ENDPOINT_TYPE=admin'].join(' -e ') |
| 347 | def cmd = '/opt/devops-qa-tools/deployment/configure.sh; ' |
Dmitrii Kabanov | 999fda9 | 2017-11-10 00:18:30 -0800 | [diff] [blame] | 348 | if (confRepository != '' ) { |
| 349 | cmd = "git clone -b ${confBranch ?: 'master'} ${confRepository} test_config; " + |
| 350 | 'rally deployment create --fromenv --name=tempest; rally deployment config; ' + |
| 351 | 'rally verify create-verifier --name tempest_verifier --type tempest ' + |
Dmitry Tsapikov | b691192 | 2018-07-24 15:21:23 +0000 | [diff] [blame] | 352 | "--source ${repository ?: '/tmp/tempest/'} --version ${version: '15.0.0'}; " + |
Dmitrii Kabanov | 999fda9 | 2017-11-10 00:18:30 -0800 | [diff] [blame] | 353 | 'rally verify configure-verifier --extend test_config/tempest/tempest.conf --show; ' |
| 354 | skip_list = '--skip-list test_config/tempest/skip-list.yaml' |
| 355 | } |
Dmitrii Kabanov | 23901c2 | 2017-10-20 10:25:36 -0700 | [diff] [blame] | 356 | if (pattern == 'false') { |
Dmitrii Kabanov | 999fda9 | 2017-11-10 00:18:30 -0800 | [diff] [blame] | 357 | cmd += "rally verify start --pattern set=full ${skip_list} --detailed; " |
Petr Lomakin | 47fee0a | 2017-08-01 10:46:05 -0700 | [diff] [blame] | 358 | } |
| 359 | else { |
Dmitrii Kabanov | 999fda9 | 2017-11-10 00:18:30 -0800 | [diff] [blame] | 360 | cmd += "rally verify start --pattern set=${pattern} ${skip_list} --detailed; " |
Petr Lomakin | 47fee0a | 2017-08-01 10:46:05 -0700 | [diff] [blame] | 361 | } |
Dmitrii Kabanov | 23901c2 | 2017-10-20 10:25:36 -0700 | [diff] [blame] | 362 | cmd += "rally verify report --type json --to ${dest_folder}/report-tempest.json; " + |
| 363 | "rally verify report --type html --to ${dest_folder}/report-tempest.html" |
mkraynov | d49daf5 | 2018-07-12 16:11:14 +0400 | [diff] [blame] | 364 | salt.cmdRun(master, target, "docker run -w /home/rally -i --rm --net=host -e ${env_vars} " + |
Sergey Galkin | 193ef87 | 2017-11-29 14:20:35 +0400 | [diff] [blame] | 365 | "-v ${results}:${dest_folder} --entrypoint /bin/bash ${dockerImageLink} " + |
| 366 | "-c \"${cmd}\" > ${results}/${output_file}") |
Dmitrii Kabanov | 23901c2 | 2017-10-20 10:25:36 -0700 | [diff] [blame] | 367 | addFiles(master, target, results, output_dir) |
Petr Lomakin | 47fee0a | 2017-08-01 10:46:05 -0700 | [diff] [blame] | 368 | } |
| 369 | |
| 370 | /** |
Oleg Basov | 40e502c | 2018-09-04 20:42:21 +0200 | [diff] [blame] | 371 | * Make all-in-one scenario cmd for rally tests |
| 372 | * |
| 373 | * @param scenarios_path Path to scenarios folder/file |
| 374 | * @param skip_scenarios Comma-delimited list of scenarios names to skip |
| 375 | * @param bundle_file Bundle name to create |
| 376 | */ |
Oleg Basov | 06fce2a | 2018-11-09 21:39:03 +0100 | [diff] [blame] | 377 | def bundle_up_scenarios(scenarios_path, skip_scenarios, bundle_file = '' ) { |
Oleg Basov | 40e502c | 2018-09-04 20:42:21 +0200 | [diff] [blame] | 378 | def skip_names = '' |
| 379 | def skip_dirs = '' |
| 380 | def result = '' |
| 381 | if (skip_scenarios != ''){ |
| 382 | for ( scen in skip_scenarios.split(',') ) { |
| 383 | if ( scen.contains('yaml')) { |
| 384 | skip_names += "! -name ${scen} " |
| 385 | } |
| 386 | else { |
| 387 | skip_dirs += "-path ${scenarios_path}/${scen} -prune -o " |
| 388 | } |
| 389 | } |
| 390 | } |
Oleg Basov | 06fce2a | 2018-11-09 21:39:03 +0100 | [diff] [blame] | 391 | if (bundle_file != '') { |
| 392 | result = "if [ -f ${scenarios_path} ]; then cp ${scenarios_path} ${bundle_file}; " + |
Oleg Basov | 40e502c | 2018-09-04 20:42:21 +0200 | [diff] [blame] | 393 | "else " + |
| 394 | "find -L ${scenarios_path} " + skip_dirs + |
| 395 | " -name '*.yaml' " + skip_names + |
| 396 | "-exec cat {} >> ${bundle_file} \\; ; " + |
| 397 | "sed -i '/---/d' ${bundle_file}; fi; " |
Oleg Basov | 06fce2a | 2018-11-09 21:39:03 +0100 | [diff] [blame] | 398 | } else { |
| 399 | result = "find -L ${scenarios_path} " + skip_dirs + |
| 400 | " -name '*.yaml' " + skip_names |
| 401 | } |
Oleg Basov | 40e502c | 2018-09-04 20:42:21 +0200 | [diff] [blame] | 402 | |
| 403 | return result |
| 404 | } |
| 405 | |
| 406 | /** |
Petr Lomakin | 47fee0a | 2017-08-01 10:46:05 -0700 | [diff] [blame] | 407 | * Execute rally tests |
| 408 | * |
| 409 | * @param target Host to run tests |
Dmitrii Kabanov | 23901c2 | 2017-10-20 10:25:36 -0700 | [diff] [blame] | 410 | * @param dockerImageLink Docker image link |
Oleg Basov | 20afb15 | 2018-06-10 03:09:25 +0200 | [diff] [blame] | 411 | * @param platform What do we have underneath (openstack/k8s) |
Petr Lomakin | 47fee0a | 2017-08-01 10:46:05 -0700 | [diff] [blame] | 412 | * @param output_dir Directory for results |
Oleg Basov | 40e502c | 2018-09-04 20:42:21 +0200 | [diff] [blame] | 413 | * @param config_repo Git repository with with files for Rally |
| 414 | * @param config_branch Git config repo branch which will be used during the checkout |
| 415 | * @param plugins_repo Git repository with Rally plugins |
| 416 | * @param plugins_branch Git plugins repo branch which will be used during the checkout |
Oleg Basov | 20afb15 | 2018-06-10 03:09:25 +0200 | [diff] [blame] | 417 | * @param scenarios Directory inside repo with specific scenarios |
Oleg Basov | 40e502c | 2018-09-04 20:42:21 +0200 | [diff] [blame] | 418 | * @param sl_scenarios Directory inside repo with specific scenarios for stacklight |
Oleg Basov | 20afb15 | 2018-06-10 03:09:25 +0200 | [diff] [blame] | 419 | * @param tasks_args_file Argument file that is used for throttling settings |
Oleg Basov | 1fa6c66 | 2019-03-05 22:04:01 +0100 | [diff] [blame] | 420 | * @param db_connection_str Rally-compliant external DB connection string |
| 421 | * @param tags Additional tags used for tagging tasks or building trends |
| 422 | * @param trends Build rally trends if enabled |
Dmitrii Kabanov | 23901c2 | 2017-10-20 10:25:36 -0700 | [diff] [blame] | 423 | * @param ext_variables The list of external variables |
Sergey Galkin | d1068e2 | 2018-02-13 13:59:32 +0400 | [diff] [blame] | 424 | * @param results The reports directory |
Petr Lomakin | 47fee0a | 2017-08-01 10:46:05 -0700 | [diff] [blame] | 425 | */ |
Oleg Basov | 1fa6c66 | 2019-03-05 22:04:01 +0100 | [diff] [blame] | 426 | def runRallyTests( |
| 427 | master, target, dockerImageLink, |
| 428 | platform, output_dir, config_repo, |
| 429 | config_branch, plugins_repo, plugins_branch, |
| 430 | scenarios, sl_scenarios = '', tasks_args_file = '', |
| 431 | db_connection_str = '', tags = [], |
| 432 | trends = false, ext_variables = [], |
| 433 | results = '/root/qa_results', skip_list = '' |
| 434 | ) { |
| 435 | |
Petr Lomakin | 47fee0a | 2017-08-01 10:46:05 -0700 | [diff] [blame] | 436 | def salt = new com.mirantis.mk.Salt() |
| 437 | def output_file = 'docker-rally.log' |
Dmitrii Kabanov | 23901c2 | 2017-10-20 10:25:36 -0700 | [diff] [blame] | 438 | def dest_folder = '/home/rally/qa_results' |
Oleg Basov | 20afb15 | 2018-06-10 03:09:25 +0200 | [diff] [blame] | 439 | def env_vars = [] |
Oleg Basov | 1fa6c66 | 2019-03-05 22:04:01 +0100 | [diff] [blame] | 440 | def work_dir = 'test_config' |
| 441 | |
| 442 | // compile rally deployment name from env name, platform name, |
| 443 | // date, cmp nodes count |
| 444 | def deployment_name = '' |
| 445 | def cluster_name = salt.getPillar( |
| 446 | master, 'I@salt:master', '_param:cluster_name' |
| 447 | )['return'][0].values()[0] |
| 448 | def rcs_str_node = salt.getPillar( |
| 449 | master, 'I@salt:master', 'reclass:storage:node' |
| 450 | )['return'][0].values()[0] |
| 451 | def date = new Date() |
| 452 | date = date.format("yyyyMMddHHmm") |
| 453 | def cmp_count |
| 454 | |
| 455 | if (platform['type'] == 'openstack') { |
| 456 | cmp_count = rcs_str_node.openstack_compute_rack01['repeat']['count'] |
| 457 | } else if (platform['type'] == 'k8s') { |
| 458 | cmp_count = rcs_str_node.kubernetes_compute_rack01['repeat']['count'] |
| 459 | } else { |
| 460 | throw new Exception("Platform ${platform} is not supported yet") |
| 461 | } |
| 462 | deployment_name = "env=${cluster_name}:platform=${platform.type}:" + |
| 463 | "date=${date}:cmp=${cmp_count}" |
| 464 | |
| 465 | // set up rally cmds |
Oleg Basov | 20afb15 | 2018-06-10 03:09:25 +0200 | [diff] [blame] | 466 | def rally_extra_args = '' |
Oleg Basov | 40e502c | 2018-09-04 20:42:21 +0200 | [diff] [blame] | 467 | def cmd_rally_plugins = |
Oleg Basov | 1fa6c66 | 2019-03-05 22:04:01 +0100 | [diff] [blame] | 468 | "git clone -b ${plugins_branch ?: 'master'} ${plugins_repo} /tmp/plugins; " + |
| 469 | "sudo pip install --upgrade /tmp/plugins; " |
| 470 | def cmd_rally_init = 'rally db ensure; ' |
| 471 | if (db_connection_str) { |
| 472 | cmd_rally_init = "sudo sed -i -e " + |
| 473 | "'s#connection=.*#connection=${db_connection_str}#' " + |
| 474 | "/etc/rally/rally.conf; " |
| 475 | } |
| 476 | def cmd_rally_checkout = "git clone -b ${config_branch ?: 'master'} ${config_repo} ${work_dir}; " |
Oleg Basov | 20afb15 | 2018-06-10 03:09:25 +0200 | [diff] [blame] | 477 | def cmd_rally_start = '' |
| 478 | def cmd_rally_task_args = '' |
Oleg Basov | 40e502c | 2018-09-04 20:42:21 +0200 | [diff] [blame] | 479 | def cmd_rally_stacklight = '' |
Oleg Basov | 1fa6c66 | 2019-03-05 22:04:01 +0100 | [diff] [blame] | 480 | def cmd_rally_report = "rally task export " + |
| 481 | "--uuid \\\$(rally task list --uuids-only --status finished) " + |
| 482 | "--type junit-xml --to ${dest_folder}/report-rally.xml; " + |
| 483 | "rally task report --uuid \\\$(rally task list --uuids-only --status finished) " + |
| 484 | "--out ${dest_folder}/report-rally.html" |
| 485 | def cmd_filter_tags = '' |
| 486 | |
| 487 | // build rally trends if required |
| 488 | if (trends && db_connection_str) { |
| 489 | if (tags) { |
| 490 | cmd_filter_tags = "--tag " + tags.join(' ') |
| 491 | } |
| 492 | cmd_rally_report += "; rally task trends --tasks " + |
| 493 | "\\\$(rally task list " + cmd_filter_tags + |
| 494 | " --all-deployments --uuids-only --status finished) " + |
| 495 | "--out ${dest_folder}/trends-rally.html" |
| 496 | } |
| 497 | |
| 498 | // add default env tags for inserting into rally tasks |
| 499 | tags = tags + [ |
| 500 | "env=${cluster_name}", |
| 501 | "platform=${platform.type}", |
| 502 | "cmp=${cmp_count}" |
| 503 | ] |
| 504 | |
| 505 | // create results directory |
Dmitrii Kabanov | 23901c2 | 2017-10-20 10:25:36 -0700 | [diff] [blame] | 506 | salt.runSaltProcessStep(master, target, 'file.remove', ["${results}"]) |
| 507 | salt.runSaltProcessStep(master, target, 'file.mkdir', ["${results}", "mode=777"]) |
Oleg Basov | 1fa6c66 | 2019-03-05 22:04:01 +0100 | [diff] [blame] | 508 | |
| 509 | // get required OS data |
Oleg Basov | 40e502c | 2018-09-04 20:42:21 +0200 | [diff] [blame] | 510 | if (platform['type'] == 'openstack') { |
Oleg Basov | 1fa6c66 | 2019-03-05 22:04:01 +0100 | [diff] [blame] | 511 | cmd_rally_init += "rally deployment create --name='${deployment_name}' --fromenv; " + |
| 512 | "rally deployment check; " |
| 513 | |
| 514 | def keystone = salt.getPillar( |
| 515 | master, 'I@keystone:server', 'keystone' |
| 516 | )['return'][0].values()[0] |
Oleg Basov | 20afb15 | 2018-06-10 03:09:25 +0200 | [diff] [blame] | 517 | env_vars = ( ['tempest_version=15.0.0', |
Oleg Basov | 4a697fc | 2018-11-06 18:34:08 +0100 | [diff] [blame] | 518 | "OS_USERNAME=${keystone.server.admin_name}", |
| 519 | "OS_PASSWORD=${keystone.server.admin_password}", |
| 520 | "OS_TENANT_NAME=${keystone.server.admin_tenant}", |
| 521 | "OS_AUTH_URL=http://${keystone.server.bind.private_address}:${keystone.server.bind.private_port}" + |
| 522 | "/v${keystone.client.os_client_config.cfgs.root.content.clouds.admin_identity.identity_api_version}", |
| 523 | "OS_REGION_NAME=${keystone.server.region}", |
Oleg Basov | 20afb15 | 2018-06-10 03:09:25 +0200 | [diff] [blame] | 524 | 'OS_ENDPOINT_TYPE=admin'] + ext_variables ).join(' -e ') |
Oleg Basov | 1fa6c66 | 2019-03-05 22:04:01 +0100 | [diff] [blame] | 525 | |
| 526 | // get required SL data |
Oleg Basov | 40e502c | 2018-09-04 20:42:21 +0200 | [diff] [blame] | 527 | if (platform['stacklight_enabled'] == true) { |
Oleg Basov | 1fa6c66 | 2019-03-05 22:04:01 +0100 | [diff] [blame] | 528 | def grafana = salt.getPillar( |
| 529 | master, 'I@grafana:client', 'grafana:client:server' |
| 530 | )['return'][0].values()[0] |
| 531 | cmd_rally_stacklight = bundle_up_scenarios( |
| 532 | work_dir + '/' + sl_scenarios, |
| 533 | skip_list, |
| 534 | "scenarios_${platform.type}_stacklight.yaml" |
| 535 | ) |
| 536 | tags.add('stacklight') |
Oleg Basov | 418bfc4 | 2018-10-28 15:01:22 +0100 | [diff] [blame] | 537 | cmd_rally_stacklight += "sed -i 's/grafana_password: .*/grafana_password: ${grafana.password}/' " + |
Oleg Basov | 1fa6c66 | 2019-03-05 22:04:01 +0100 | [diff] [blame] | 538 | "${work_dir}/job-params-stacklight.yaml; " + |
| 539 | "rally $rally_extra_args task start --tag " + tags.join(' ') + |
| 540 | " --task scenarios_${platform.type}_stacklight.yaml " + |
| 541 | "--task-args-file ${work_dir}/job-params-stacklight.yaml; " |
Oleg Basov | 20afb15 | 2018-06-10 03:09:25 +0200 | [diff] [blame] | 542 | } |
Oleg Basov | 1fa6c66 | 2019-03-05 22:04:01 +0100 | [diff] [blame] | 543 | |
| 544 | // get required K8S data |
Oleg Basov | 40e502c | 2018-09-04 20:42:21 +0200 | [diff] [blame] | 545 | } else if (platform['type'] == 'k8s') { |
Oleg Basov | 1fa6c66 | 2019-03-05 22:04:01 +0100 | [diff] [blame] | 546 | cmd_rally_init += "rally env create --name='${deployment_name}' --from-sysenv; " + |
| 547 | "rally env check; " |
Oleg Basov | 20afb15 | 2018-06-10 03:09:25 +0200 | [diff] [blame] | 548 | rally_extra_args = "--debug --log-file ${dest_folder}/task.log" |
Oleg Basov | 1fa6c66 | 2019-03-05 22:04:01 +0100 | [diff] [blame] | 549 | |
| 550 | def kubernetes = salt.getPillar( |
| 551 | master, 'I@kubernetes:master and *01*', 'kubernetes:master' |
| 552 | )['return'][0].values()[0] |
Oleg Basov | 3e050d3 | 2018-07-03 22:10:56 +0200 | [diff] [blame] | 553 | env_vars = [ |
Oleg Basov | 491942d | 2018-10-17 16:11:25 +0200 | [diff] [blame] | 554 | "KUBERNETES_HOST=http://${kubernetes.apiserver.vip_address}" + |
Oleg Basov | 3e050d3 | 2018-07-03 22:10:56 +0200 | [diff] [blame] | 555 | ":${kubernetes.apiserver.insecure_port}", |
| 556 | "KUBERNETES_CERT_AUTH=${dest_folder}/k8s-ca.crt", |
| 557 | "KUBERNETES_CLIENT_KEY=${dest_folder}/k8s-client.key", |
| 558 | "KUBERNETES_CLIENT_CERT=${dest_folder}/k8s-client.crt"].join(' -e ') |
Oleg Basov | 1fa6c66 | 2019-03-05 22:04:01 +0100 | [diff] [blame] | 559 | |
| 560 | def k8s_ca = salt.getFileContent( |
| 561 | master, 'I@kubernetes:master and *01*', '/etc/kubernetes/ssl/ca-kubernetes.crt' |
| 562 | ) |
| 563 | def k8s_client_key = salt.getFileContent( |
| 564 | master, 'I@kubernetes:master and *01*', '/etc/kubernetes/ssl/kubelet-client.key' |
| 565 | ) |
| 566 | def k8s_client_crt = salt.getFileContent( |
| 567 | master, 'I@kubernetes:master and *01*', '/etc/kubernetes/ssl/kubelet-client.crt' |
| 568 | ) |
Oleg Basov | 20afb15 | 2018-06-10 03:09:25 +0200 | [diff] [blame] | 569 | def tmp_dir = '/tmp/kube' |
Oleg Basov | 1fa6c66 | 2019-03-05 22:04:01 +0100 | [diff] [blame] | 570 | |
Oleg Basov | 6c0d671 | 2019-01-16 18:52:30 +0100 | [diff] [blame] | 571 | salt.runSaltProcessStep(master, target, 'file.mkdir', ["${tmp_dir}"]) |
Oleg Basov | 1fa6c66 | 2019-03-05 22:04:01 +0100 | [diff] [blame] | 572 | salt.runSaltProcessStep( |
| 573 | master, target, 'file.write', ["${tmp_dir}/k8s-ca.crt","${k8s_ca}"] |
| 574 | ) |
| 575 | salt.runSaltProcessStep( |
| 576 | master, target, 'file.write', ["${tmp_dir}/k8s-client.key", "${k8s_client_key}"] |
| 577 | ) |
| 578 | salt.runSaltProcessStep( |
| 579 | master, target, 'file.write', ["${tmp_dir}/k8s-client.crt", "${k8s_client_crt}"] |
| 580 | ) |
Oleg Basov | 20afb15 | 2018-06-10 03:09:25 +0200 | [diff] [blame] | 581 | salt.cmdRun(master, target, "mv ${tmp_dir}/* ${results}/") |
| 582 | salt.runSaltProcessStep(master, target, 'file.rmdir', ["${tmp_dir}"]) |
Oleg Basov | 1fa6c66 | 2019-03-05 22:04:01 +0100 | [diff] [blame] | 583 | |
Oleg Basov | 20afb15 | 2018-06-10 03:09:25 +0200 | [diff] [blame] | 584 | } else { |
| 585 | throw new Exception("Platform ${platform} is not supported yet") |
Dmitrii Kabanov | 999fda9 | 2017-11-10 00:18:30 -0800 | [diff] [blame] | 586 | } |
Oleg Basov | 1fa6c66 | 2019-03-05 22:04:01 +0100 | [diff] [blame] | 587 | |
| 588 | // set up rally task args file |
Oleg Basov | 06fce2a | 2018-11-09 21:39:03 +0100 | [diff] [blame] | 589 | switch(tasks_args_file) { |
| 590 | case 'none': |
| 591 | cmd_rally_task_args = '; ' |
Oleg Basov | 20afb15 | 2018-06-10 03:09:25 +0200 | [diff] [blame] | 592 | break |
Oleg Basov | 06fce2a | 2018-11-09 21:39:03 +0100 | [diff] [blame] | 593 | case '': |
Oleg Basov | 1fa6c66 | 2019-03-05 22:04:01 +0100 | [diff] [blame] | 594 | cmd_rally_task_args = "--task-args-file ${work_dir}/job-params-light.yaml; " |
Oleg Basov | 06fce2a | 2018-11-09 21:39:03 +0100 | [diff] [blame] | 595 | break |
| 596 | default: |
Oleg Basov | 1fa6c66 | 2019-03-05 22:04:01 +0100 | [diff] [blame] | 597 | cmd_rally_task_args = "--task-args-file ${work_dir}/${tasks_args_file}; " |
Oleg Basov | 06fce2a | 2018-11-09 21:39:03 +0100 | [diff] [blame] | 598 | break |
| 599 | } |
| 600 | if (platform['type'] == 'k8s') { |
Oleg Basov | 1fa6c66 | 2019-03-05 22:04:01 +0100 | [diff] [blame] | 601 | cmd_rally_start = "for task in \\\$(" + |
| 602 | bundle_up_scenarios(work_dir + '/' + scenarios, skip_list) + |
Oleg Basov | 06fce2a | 2018-11-09 21:39:03 +0100 | [diff] [blame] | 603 | "); do " + |
Oleg Basov | 1fa6c66 | 2019-03-05 22:04:01 +0100 | [diff] [blame] | 604 | "rally $rally_extra_args task start --tag " + tags.join(' ') + |
| 605 | " --task \\\$task ${cmd_rally_task_args}" + |
Oleg Basov | 06fce2a | 2018-11-09 21:39:03 +0100 | [diff] [blame] | 606 | "done; " |
| 607 | } else { |
Oleg Basov | 1fa6c66 | 2019-03-05 22:04:01 +0100 | [diff] [blame] | 608 | cmd_rally_checkout += bundle_up_scenarios( |
| 609 | work_dir + '/' + scenarios, |
| 610 | skip_list, |
| 611 | "scenarios_${platform.type}.yaml" |
| 612 | ) |
| 613 | cmd_rally_start = "rally $rally_extra_args task start --tag " + tags.join(' ') + |
| 614 | " --task scenarios_${platform.type}.yaml ${cmd_rally_task_args}" |
Oleg Basov | 20afb15 | 2018-06-10 03:09:25 +0200 | [diff] [blame] | 615 | } |
Oleg Basov | aaeb51f | 2018-10-17 01:07:10 +0200 | [diff] [blame] | 616 | |
Oleg Basov | 1fa6c66 | 2019-03-05 22:04:01 +0100 | [diff] [blame] | 617 | // compile full rally cmd |
Oleg Basov | 40e502c | 2018-09-04 20:42:21 +0200 | [diff] [blame] | 618 | full_cmd = 'set -xe; ' + cmd_rally_plugins + |
| 619 | cmd_rally_init + cmd_rally_checkout + |
| 620 | 'set +e; ' + cmd_rally_start + |
Oleg Basov | 1fa6c66 | 2019-03-05 22:04:01 +0100 | [diff] [blame] | 621 | cmd_rally_stacklight + cmd_rally_report |
| 622 | |
| 623 | // run rally |
Sergey Galkin | f89509d | 2018-03-19 15:24:17 +0400 | [diff] [blame] | 624 | salt.runSaltProcessStep(master, target, 'file.touch', ["${results}/rally.db"]) |
| 625 | salt.cmdRun(master, target, "chmod 666 ${results}/rally.db") |
Oleg Basov | 1fa6c66 | 2019-03-05 22:04:01 +0100 | [diff] [blame] | 626 | salt.cmdRun( |
| 627 | master, target, |
| 628 | "docker run -w /home/rally -i --rm --net=host -e ${env_vars} " + |
Sergey Galkin | 3c1e9e2 | 2018-01-12 16:31:53 +0400 | [diff] [blame] | 629 | "-v ${results}:${dest_folder} " + |
mkraynov | d49daf5 | 2018-07-12 16:11:14 +0400 | [diff] [blame] | 630 | "-v ${results}/rally.db:/home/rally/data/rally.db " + |
Sergey Galkin | 3c1e9e2 | 2018-01-12 16:31:53 +0400 | [diff] [blame] | 631 | "--entrypoint /bin/bash ${dockerImageLink} " + |
| 632 | "-c \"${full_cmd}\" > ${results}/${output_file}") |
Oleg Basov | 1fa6c66 | 2019-03-05 22:04:01 +0100 | [diff] [blame] | 633 | |
| 634 | // remove k8s secrets |
| 635 | if (platform['type'] == 'k8s') { |
| 636 | salt.cmdRun(master, target, "rm ${results}/k8s-*") |
| 637 | } |
| 638 | |
| 639 | // save artifacts |
Dmitrii Kabanov | 23901c2 | 2017-10-20 10:25:36 -0700 | [diff] [blame] | 640 | addFiles(master, target, results, output_dir) |
Petr Lomakin | 47fee0a | 2017-08-01 10:46:05 -0700 | [diff] [blame] | 641 | } |
| 642 | |
| 643 | /** |
Tetiana Korchak | 3383cc9 | 2017-08-25 09:36:19 -0700 | [diff] [blame] | 644 | * Generate test report |
| 645 | * |
| 646 | * @param target Host to run script from |
Dmitrii Kabanov | 23901c2 | 2017-10-20 10:25:36 -0700 | [diff] [blame] | 647 | * @param dockerImageLink Docker image link |
Tetiana Korchak | 3383cc9 | 2017-08-25 09:36:19 -0700 | [diff] [blame] | 648 | * @param output_dir Directory for results |
Sergey Galkin | d1068e2 | 2018-02-13 13:59:32 +0400 | [diff] [blame] | 649 | * @param results The reports directory |
Tetiana Korchak | 3383cc9 | 2017-08-25 09:36:19 -0700 | [diff] [blame] | 650 | */ |
Sergey Galkin | d1068e2 | 2018-02-13 13:59:32 +0400 | [diff] [blame] | 651 | def generateTestReport(master, target, dockerImageLink, output_dir, results = '/root/qa_results') { |
Tetiana Korchak | 3383cc9 | 2017-08-25 09:36:19 -0700 | [diff] [blame] | 652 | def report_file = 'jenkins_test_report.html' |
Tetiana Korchak | 3383cc9 | 2017-08-25 09:36:19 -0700 | [diff] [blame] | 653 | def salt = new com.mirantis.mk.Salt() |
| 654 | def common = new com.mirantis.mk.Common() |
Dmitrii Kabanov | 23901c2 | 2017-10-20 10:25:36 -0700 | [diff] [blame] | 655 | def dest_folder = '/opt/devops-qa-tools/generate_test_report/test_results' |
| 656 | salt.runSaltProcessStep(master, target, 'file.remove', ["${results}"]) |
| 657 | salt.runSaltProcessStep(master, target, 'file.mkdir', ["${results}", "mode=777"]) |
| 658 | def reports = ['report-tempest.json', |
| 659 | 'report-rally.xml', |
| 660 | 'report-k8s-e2e-tests.txt', |
| 661 | 'report-ha.json', |
| 662 | 'report-spt.txt'] |
| 663 | for ( report in reports ) { |
Tetiana Korchak | 3383cc9 | 2017-08-25 09:36:19 -0700 | [diff] [blame] | 664 | if ( fileExists("${output_dir}${report}") ) { |
| 665 | common.infoMsg("Copying ${report} to docker container") |
Dmitrii Kabanov | 23901c2 | 2017-10-20 10:25:36 -0700 | [diff] [blame] | 666 | def items = sh(script: "base64 -w0 ${output_dir}${report} > ${output_dir}${report}_encoded; " + |
| 667 | "split -b 100KB -d -a 4 ${output_dir}${report}_encoded ${output_dir}${report}__; " + |
| 668 | "rm ${output_dir}${report}_encoded; " + |
| 669 | "find ${output_dir} -type f -name ${report}__* -printf \'%f\\n\' | sort", returnStdout: true) |
| 670 | for ( item in items.tokenize() ) { |
| 671 | def content = sh(script: "cat ${output_dir}${item}", returnStdout: true) |
| 672 | salt.cmdRun(master, target, "echo \"${content}\" >> ${results}/${report}_encoded", false, null, false) |
| 673 | sh(script: "rm ${output_dir}${item}") |
Tetiana Korchak | 3383cc9 | 2017-08-25 09:36:19 -0700 | [diff] [blame] | 674 | } |
Dmitrii Kabanov | 23901c2 | 2017-10-20 10:25:36 -0700 | [diff] [blame] | 675 | salt.cmdRun(master, target, "base64 -d ${results}/${report}_encoded > ${results}/${report}; " + |
| 676 | "rm ${results}/${report}_encoded", false, null, false) |
Tetiana Korchak | 3383cc9 | 2017-08-25 09:36:19 -0700 | [diff] [blame] | 677 | } |
| 678 | } |
Tetiana Korchak | 3383cc9 | 2017-08-25 09:36:19 -0700 | [diff] [blame] | 679 | |
Dmitrii Kabanov | 23901c2 | 2017-10-20 10:25:36 -0700 | [diff] [blame] | 680 | def cmd = "jenkins_report.py --path /opt/devops-qa-tools/generate_test_report/; " + |
| 681 | "cp ${report_file} ${dest_folder}/${report_file}" |
| 682 | salt.cmdRun(master, target, "docker run -i --rm --net=host " + |
| 683 | "-v ${results}:${dest_folder} ${dockerImageLink} " + |
| 684 | "/bin/bash -c \"${cmd}\"") |
| 685 | def report_content = salt.getFileContent(master, target, "${results}/${report_file}") |
Tetiana Korchak | 3383cc9 | 2017-08-25 09:36:19 -0700 | [diff] [blame] | 686 | writeFile file: "${output_dir}${report_file}", text: report_content |
| 687 | } |
| 688 | |
| 689 | /** |
Dmitrii Kabanov | d5f1c5f | 2017-08-30 14:51:41 -0700 | [diff] [blame] | 690 | * Execute SPT tests |
| 691 | * |
| 692 | * @param target Host to run tests |
Dmitrii Kabanov | 23901c2 | 2017-10-20 10:25:36 -0700 | [diff] [blame] | 693 | * @param dockerImageLink Docker image link |
Dmitrii Kabanov | d5f1c5f | 2017-08-30 14:51:41 -0700 | [diff] [blame] | 694 | * @param output_dir Directory for results |
Dmitrii Kabanov | 23901c2 | 2017-10-20 10:25:36 -0700 | [diff] [blame] | 695 | * @param ext_variables The list of external variables |
Sergey Galkin | d1068e2 | 2018-02-13 13:59:32 +0400 | [diff] [blame] | 696 | * @param results The reports directory |
Dmitrii Kabanov | d5f1c5f | 2017-08-30 14:51:41 -0700 | [diff] [blame] | 697 | */ |
Sergey Galkin | d1068e2 | 2018-02-13 13:59:32 +0400 | [diff] [blame] | 698 | def runSptTests(master, target, dockerImageLink, output_dir, ext_variables = [], results = '/root/qa_results') { |
Dmitrii Kabanov | d5f1c5f | 2017-08-30 14:51:41 -0700 | [diff] [blame] | 699 | def salt = new com.mirantis.mk.Salt() |
Dmitrii Kabanov | 23901c2 | 2017-10-20 10:25:36 -0700 | [diff] [blame] | 700 | def dest_folder = '/home/rally/qa_results' |
| 701 | salt.runSaltProcessStep(master, target, 'file.remove', ["${results}"]) |
| 702 | salt.runSaltProcessStep(master, target, 'file.mkdir', ["${results}", "mode=777"]) |
| 703 | def nodes = getNodeList(master) |
| 704 | def nodes_hw = getNodeList(master, 'G@virtual:physical') |
| 705 | def _pillar = salt.getPillar(master, 'I@keystone:server', 'keystone:server') |
| 706 | def keystone = _pillar['return'][0].values()[0] |
| 707 | def ssh_key = salt.getFileContent(master, 'I@salt:master', '/root/.ssh/id_rsa') |
| 708 | def env_vars = ( ['tempest_version=15.0.0', |
| 709 | "OS_USERNAME=${keystone.admin_name}", |
| 710 | "OS_PASSWORD=${keystone.admin_password}", |
| 711 | "OS_TENANT_NAME=${keystone.admin_tenant}", |
| 712 | "OS_AUTH_URL=http://${keystone.bind.private_address}:${keystone.bind.private_port}/v2.0", |
| 713 | "OS_REGION_NAME=${keystone.region}", |
| 714 | 'OS_ENDPOINT_TYPE=admin'] + ext_variables ).join(' -e ') |
| 715 | salt.runSaltProcessStep(master, target, 'file.write', ["${results}/nodes.json", nodes]) |
| 716 | salt.runSaltProcessStep(master, target, 'file.write', ["${results}/nodes_hw.json", nodes_hw]) |
| 717 | def cmd = '/opt/devops-qa-tools/deployment/configure.sh; ' + |
| 718 | 'sudo mkdir -p /root/.ssh; sudo chmod 700 /root/.ssh; ' + |
| 719 | "echo \\\"${ssh_key}\\\" | sudo tee /root/.ssh/id_rsa > /dev/null; " + |
| 720 | 'sudo chmod 600 /root/.ssh/id_rsa; ' + |
| 721 | "sudo timmy -c simplified-performance-testing/config.yaml " + |
| 722 | "--nodes-json ${dest_folder}/nodes.json --log-file ${dest_folder}/docker-spt2.log; " + |
| 723 | "./simplified-performance-testing/SPT_parser.sh > ${dest_folder}/report-spt.txt; " + |
| 724 | "custom_spt_parser.sh ${dest_folder}/nodes_hw.json > ${dest_folder}/report-spt-hw.txt; " + |
| 725 | "cp /tmp/timmy/archives/general.tar.gz ${dest_folder}/results-spt.tar.gz" |
| 726 | salt.cmdRun(master, target, "docker run -i --rm --net=host -e ${env_vars} " + |
| 727 | "-v ${results}:${dest_folder} ${dockerImageLink} /bin/bash -c " + |
| 728 | "\"${cmd}\" > ${results}/docker-spt.log") |
| 729 | addFiles(master, target, results, output_dir) |
Dmitrii Kabanov | d5f1c5f | 2017-08-30 14:51:41 -0700 | [diff] [blame] | 730 | } |
| 731 | |
Dmitrii Kabanov | d5f1c5f | 2017-08-30 14:51:41 -0700 | [diff] [blame] | 732 | /** |
Oleksii Zhurba | 7b44ef1 | 2017-11-13 17:50:16 -0600 | [diff] [blame] | 733 | * Configure docker container |
| 734 | * |
| 735 | * @param target Host to run container |
| 736 | * @param proxy Proxy for accessing github and pip |
| 737 | * @param testing_tools_repo Repo with testing tools: configuration script, skip-list, etc. |
Oleksii Zhurba | 1579b97 | 2017-12-14 15:21:56 -0600 | [diff] [blame] | 738 | * @param tempest_repo Tempest repo to clone. Can be upstream tempest (default, recommended), your customized tempest in local/remote repo or path inside container. If not specified, tempest will not be configured. |
| 739 | * @param tempest_endpoint_type internalURL or adminURL or publicURL to use in tests |
Oleksii Zhurba | 198dd68 | 2018-09-07 18:16:59 -0500 | [diff] [blame] | 740 | * @param tempest_version Version of tempest to use. This value will be just passed to configure.sh script (cvp-configuration repo). |
Oleksii Zhurba | 1579b97 | 2017-12-14 15:21:56 -0600 | [diff] [blame] | 741 | * @param conf_script_path Path to configuration script. |
| 742 | * @param ext_variables Some custom extra variables to add into container |
Oleksii Zhurba | 7b44ef1 | 2017-11-13 17:50:16 -0600 | [diff] [blame] | 743 | */ |
| 744 | def configureContainer(master, target, proxy, testing_tools_repo, tempest_repo, |
Oleksii Zhurba | 198dd68 | 2018-09-07 18:16:59 -0500 | [diff] [blame] | 745 | tempest_endpoint_type="internalURL", tempest_version="", |
Oleksii Zhurba | 1579b97 | 2017-12-14 15:21:56 -0600 | [diff] [blame] | 746 | conf_script_path="", ext_variables = []) { |
Oleksii Zhurba | 7b44ef1 | 2017-11-13 17:50:16 -0600 | [diff] [blame] | 747 | def salt = new com.mirantis.mk.Salt() |
| 748 | if (testing_tools_repo != "" ) { |
Oleksii Zhurba | 0cda6e0 | 2018-06-20 14:53:19 -0500 | [diff] [blame] | 749 | if (testing_tools_repo.contains('http://') || testing_tools_repo.contains('https://')) { |
| 750 | salt.cmdRun(master, target, "docker exec cvp git clone ${testing_tools_repo} cvp-configuration") |
| 751 | configure_script = conf_script_path != "" ? conf_script_path : "cvp-configuration/configure.sh" |
| 752 | } |
| 753 | else { |
| 754 | configure_script = testing_tools_repo |
| 755 | } |
| 756 | ext_variables.addAll("PROXY=${proxy}", "TEMPEST_REPO=${tempest_repo}", |
| 757 | "TEMPEST_ENDPOINT_TYPE=${tempest_endpoint_type}", |
| 758 | "tempest_version=${tempest_version}") |
| 759 | salt.cmdRun(master, target, "docker exec -e " + ext_variables.join(' -e ') + " cvp bash -c ${configure_script}") |
Oleksii Zhurba | 7b44ef1 | 2017-11-13 17:50:16 -0600 | [diff] [blame] | 760 | } |
Oleksii Zhurba | 0cda6e0 | 2018-06-20 14:53:19 -0500 | [diff] [blame] | 761 | else { |
| 762 | common.infoMsg("TOOLS_REPO is empty, no confguration is needed for container") |
| 763 | } |
Oleksii Zhurba | 7b44ef1 | 2017-11-13 17:50:16 -0600 | [diff] [blame] | 764 | } |
| 765 | |
| 766 | /** |
| 767 | * Run Tempest |
| 768 | * |
| 769 | * @param target Host to run container |
| 770 | * @param test_pattern Test pattern to run |
| 771 | * @param skip_list Path to skip-list |
| 772 | * @param output_dir Directory on target host for storing results (containers is not a good place) |
| 773 | */ |
| 774 | def runCVPtempest(master, target, test_pattern="set=smoke", skip_list="", output_dir, output_filename="docker-tempest") { |
| 775 | def salt = new com.mirantis.mk.Salt() |
| 776 | def xml_file = "${output_filename}.xml" |
Oleksii Zhurba | 4404531 | 2017-12-12 15:38:26 -0600 | [diff] [blame] | 777 | def html_file = "${output_filename}.html" |
Oleksii Zhurba | 7b44ef1 | 2017-11-13 17:50:16 -0600 | [diff] [blame] | 778 | skip_list_cmd = '' |
| 779 | if (skip_list != '') { |
| 780 | skip_list_cmd = "--skip-list ${skip_list}" |
| 781 | } |
Oleksii Zhurba | 77896d4 | 2018-05-25 18:11:30 -0500 | [diff] [blame] | 782 | salt.cmdRun(master, target, "docker exec cvp rally verify start --pattern ${test_pattern} ${skip_list_cmd} --detailed") |
Oleksii Zhurba | 7b44ef1 | 2017-11-13 17:50:16 -0600 | [diff] [blame] | 783 | salt.cmdRun(master, target, "docker exec cvp rally verify report --type junit-xml --to /home/rally/${xml_file}") |
Oleksii Zhurba | 4404531 | 2017-12-12 15:38:26 -0600 | [diff] [blame] | 784 | salt.cmdRun(master, target, "docker exec cvp rally verify report --type html --to /home/rally/${html_file}") |
Oleksii Zhurba | 7b44ef1 | 2017-11-13 17:50:16 -0600 | [diff] [blame] | 785 | salt.cmdRun(master, target, "docker cp cvp:/home/rally/${xml_file} ${output_dir}") |
Oleksii Zhurba | 4404531 | 2017-12-12 15:38:26 -0600 | [diff] [blame] | 786 | salt.cmdRun(master, target, "docker cp cvp:/home/rally/${html_file} ${output_dir}") |
Oleksii Zhurba | 77896d4 | 2018-05-25 18:11:30 -0500 | [diff] [blame] | 787 | return salt.cmdRun(master, target, "docker exec cvp rally verify show | head -5 | tail -1 | " + |
| 788 | "awk '{print \$4}'")['return'][0].values()[0].split()[0] |
Oleksii Zhurba | 7b44ef1 | 2017-11-13 17:50:16 -0600 | [diff] [blame] | 789 | } |
| 790 | |
| 791 | /** |
| 792 | * Run Rally |
| 793 | * |
| 794 | * @param target Host to run container |
| 795 | * @param test_pattern Test pattern to run |
| 796 | * @param scenarios_path Path to Rally scenarios |
| 797 | * @param output_dir Directory on target host for storing results (containers is not a good place) |
| 798 | */ |
| 799 | def runCVPrally(master, target, scenarios_path, output_dir, output_filename="docker-rally") { |
| 800 | def salt = new com.mirantis.mk.Salt() |
| 801 | def xml_file = "${output_filename}.xml" |
Oleksii Zhurba | 7b44ef1 | 2017-11-13 17:50:16 -0600 | [diff] [blame] | 802 | def html_file = "${output_filename}.html" |
Oleksii Zhurba | 77896d4 | 2018-05-25 18:11:30 -0500 | [diff] [blame] | 803 | salt.cmdRun(master, target, "docker exec cvp rally task start ${scenarios_path}") |
Oleksii Zhurba | 7b44ef1 | 2017-11-13 17:50:16 -0600 | [diff] [blame] | 804 | salt.cmdRun(master, target, "docker exec cvp rally task report --out ${html_file}") |
Oleksii Zhurba | 1bf9be1 | 2018-01-17 15:20:00 -0600 | [diff] [blame] | 805 | salt.cmdRun(master, target, "docker exec cvp rally task report --junit --out ${xml_file}") |
Oleksii Zhurba | 7b44ef1 | 2017-11-13 17:50:16 -0600 | [diff] [blame] | 806 | salt.cmdRun(master, target, "docker cp cvp:/home/rally/${xml_file} ${output_dir}") |
| 807 | salt.cmdRun(master, target, "docker cp cvp:/home/rally/${html_file} ${output_dir}") |
| 808 | } |
| 809 | |
| 810 | |
| 811 | /** |
| 812 | * Shutdown node |
| 813 | * |
| 814 | * @param target Host to run command |
| 815 | * @param mode How to shutdown node |
| 816 | * @param retries # of retries to make to check node status |
| 817 | */ |
| 818 | def shutdown_vm_node(master, target, mode, retries=200) { |
| 819 | def salt = new com.mirantis.mk.Salt() |
| 820 | def common = new com.mirantis.mk.Common() |
| 821 | if (mode == 'reboot') { |
| 822 | try { |
| 823 | def out = salt.runSaltCommand(master, 'local', ['expression': target, 'type': 'compound'], 'cmd.run', null, ['reboot'], null, 3, 3) |
| 824 | } catch (Exception e) { |
| 825 | common.warningMsg('Timeout from minion: node must be rebooting now') |
| 826 | } |
| 827 | common.warningMsg("Checking that minion is down") |
| 828 | status = "True" |
| 829 | for (i = 0; i < retries; i++) { |
| 830 | status = salt.minionsReachable(master, 'I@salt:master', target, null, 5, 1) |
| 831 | if (status != "True") { |
| 832 | break |
| 833 | } |
| 834 | } |
| 835 | if (status == "True") { |
| 836 | throw new Exception("Tired to wait for minion ${target} to stop responding") |
| 837 | } |
| 838 | } |
| 839 | if (mode == 'hard_shutdown' || mode == 'soft_shutdown') { |
| 840 | kvm = locate_node_on_kvm(master, target) |
| 841 | if (mode == 'soft_shutdown') { |
| 842 | salt.cmdRun(master, target, "shutdown -h 0") |
| 843 | } |
| 844 | if (mode == 'hard_shutdown') { |
| 845 | salt.cmdRun(master, kvm, "virsh destroy ${target}") |
| 846 | } |
| 847 | common.warningMsg("Checking that vm on kvm is in power off state") |
| 848 | status = 'running' |
| 849 | for (i = 0; i < retries; i++) { |
| 850 | status = check_vm_status(master, target, kvm) |
| 851 | echo "Current status - ${status}" |
| 852 | if (status != 'running') { |
| 853 | break |
| 854 | } |
| 855 | sleep (1) |
| 856 | } |
| 857 | if (status == 'running') { |
| 858 | throw new Exception("Tired to wait for node ${target} to shutdown") |
| 859 | } |
| 860 | } |
| 861 | } |
| 862 | |
| 863 | |
| 864 | /** |
| 865 | * Locate kvm where target host is located |
| 866 | * |
| 867 | * @param target Host to check |
| 868 | */ |
| 869 | def locate_node_on_kvm(master, target) { |
| 870 | def salt = new com.mirantis.mk.Salt() |
| 871 | def list = salt.runSaltProcessStep(master, "I@salt:control", 'cmd.run', ["virsh list --all | grep ' ${target}'"])['return'][0] |
| 872 | for (item in list.keySet()) { |
| 873 | if (list[item]) { |
| 874 | return item |
| 875 | } |
| 876 | } |
| 877 | } |
| 878 | |
| 879 | /** |
| 880 | * Check target host status |
| 881 | * |
| 882 | * @param target Host to check |
| 883 | * @param kvm KVM node where target host is located |
| 884 | */ |
| 885 | def check_vm_status(master, target, kvm) { |
| 886 | def salt = new com.mirantis.mk.Salt() |
| 887 | def list = salt.runSaltProcessStep(master, "${kvm}", 'cmd.run', ["virsh list --all | grep ' ${target}'"])['return'][0] |
| 888 | for (item in list.keySet()) { |
| 889 | if (list[item]) { |
| 890 | return list[item].split()[2] |
| 891 | } |
| 892 | } |
| 893 | } |
| 894 | |
| 895 | /** |
| 896 | * Find vip on nodes |
| 897 | * |
| 898 | * @param target Pattern, e.g. ctl* |
| 899 | */ |
| 900 | def get_vip_node(master, target) { |
| 901 | def salt = new com.mirantis.mk.Salt() |
Oleksii Zhurba | 5f73cf6 | 2018-08-03 16:11:10 -0500 | [diff] [blame] | 902 | def list = salt.runSaltProcessStep(master, "${target}", 'cmd.run', ["ip a | grep '/32'"])['return'][0] |
Oleksii Zhurba | 7b44ef1 | 2017-11-13 17:50:16 -0600 | [diff] [blame] | 903 | for (item in list.keySet()) { |
| 904 | if (list[item]) { |
| 905 | return item |
| 906 | } |
| 907 | } |
| 908 | } |
| 909 | |
| 910 | /** |
| 911 | * Find vip on nodes |
| 912 | * |
| 913 | * @param target Host with cvp container |
| 914 | */ |
Oleksii Zhurba | 5250a9c | 2018-03-21 15:47:03 -0500 | [diff] [blame] | 915 | def openstack_cleanup(master, target, script_path="/home/rally/cvp-configuration/cleanup.sh") { |
Oleksii Zhurba | 7b44ef1 | 2017-11-13 17:50:16 -0600 | [diff] [blame] | 916 | def salt = new com.mirantis.mk.Salt() |
| 917 | salt.runSaltProcessStep(master, "${target}", 'cmd.run', ["docker exec cvp bash -c ${script_path}"]) |
| 918 | } |
| 919 | |
| 920 | |
| 921 | /** |
Petr Lomakin | 47fee0a | 2017-08-01 10:46:05 -0700 | [diff] [blame] | 922 | * Cleanup |
| 923 | * |
| 924 | * @param target Host to run commands |
Oleksii Zhurba | 1f4a6ff | 2018-06-27 16:45:17 -0500 | [diff] [blame] | 925 | * @param name Name of container to remove |
Petr Lomakin | 47fee0a | 2017-08-01 10:46:05 -0700 | [diff] [blame] | 926 | */ |
Oleksii Zhurba | 1f4a6ff | 2018-06-27 16:45:17 -0500 | [diff] [blame] | 927 | def runCleanup(master, target, name='cvp') { |
Petr Lomakin | 47fee0a | 2017-08-01 10:46:05 -0700 | [diff] [blame] | 928 | def salt = new com.mirantis.mk.Salt() |
Oleksii Zhurba | 1f4a6ff | 2018-06-27 16:45:17 -0500 | [diff] [blame] | 929 | if ( salt.cmdRun(master, target, "docker ps -f name=${name} -q", false, null, false)['return'][0].values()[0] ) { |
| 930 | salt.cmdRun(master, target, "docker rm -f ${name}") |
Oleksii Zhurba | 7b44ef1 | 2017-11-13 17:50:16 -0600 | [diff] [blame] | 931 | } |
Petr Lomakin | 47fee0a | 2017-08-01 10:46:05 -0700 | [diff] [blame] | 932 | } |
Oleksii Zhurba | bcb97e2 | 2017-10-05 14:10:39 -0500 | [diff] [blame] | 933 | /** |
| 934 | * Prepare venv for any python project |
| 935 | * Note: <repo_name>\/requirements.txt content will be used |
| 936 | * for this venv |
| 937 | * |
| 938 | * @param repo_url Repository url to clone |
| 939 | * @param proxy Proxy address to use |
| 940 | */ |
dtsapikov | f2e1bb1 | 2018-11-29 18:49:48 +0400 | [diff] [blame] | 941 | def prepareVenv(repo_url, proxy, useSystemPackages=false) { |
Oleksii Zhurba | bcb97e2 | 2017-10-05 14:10:39 -0500 | [diff] [blame] | 942 | def python = new com.mirantis.mk.Python() |
| 943 | repo_name = "${repo_url}".tokenize("/").last() |
Oleksii Zhurba | e711ebb | 2018-06-15 16:36:38 -0500 | [diff] [blame] | 944 | if (repo_url.tokenize().size() > 1){ |
| 945 | if (repo_url.tokenize()[1] == '-b'){ |
| 946 | repo_name = repo_url.tokenize()[0].tokenize("/").last() |
| 947 | } |
| 948 | } |
Oleksii Zhurba | 83e3e5c | 2018-06-27 16:59:29 -0500 | [diff] [blame] | 949 | path_venv = "${env.WORKSPACE}/venv" |
| 950 | path_req = "${env.WORKSPACE}/${repo_name}/requirements.txt" |
Oleksii Zhurba | bcb97e2 | 2017-10-05 14:10:39 -0500 | [diff] [blame] | 951 | sh "rm -rf ${repo_name}" |
Oleksii Zhurba | 83e3e5c | 2018-06-27 16:59:29 -0500 | [diff] [blame] | 952 | // this is temporary W/A for offline deployments |
| 953 | // Jenkins slave image has /opt/pip-mirror/ folder |
| 954 | // where pip wheels for cvp projects are located |
| 955 | if (proxy != 'offline') { |
| 956 | withEnv(["HTTPS_PROXY=${proxy}", "HTTP_PROXY=${proxy}", "https_proxy=${proxy}", "http_proxy=${proxy}"]) { |
| 957 | sh "git clone ${repo_url}" |
dtsapikov | f2e1bb1 | 2018-11-29 18:49:48 +0400 | [diff] [blame] | 958 | python.setupVirtualenv(path_venv, "python2", [], path_req, true, useSystemPackages) |
Oleksii Zhurba | 83e3e5c | 2018-06-27 16:59:29 -0500 | [diff] [blame] | 959 | } |
| 960 | } |
| 961 | else { |
Oleksii Zhurba | bcb97e2 | 2017-10-05 14:10:39 -0500 | [diff] [blame] | 962 | sh "git clone ${repo_url}" |
Oleksii Zhurba | 83e3e5c | 2018-06-27 16:59:29 -0500 | [diff] [blame] | 963 | sh "virtualenv ${path_venv} --python python2" |
| 964 | python.runVirtualenvCommand(path_venv, "pip install --no-index --find-links=/opt/pip-mirror/ -r ${path_req}", true) |
Oleksii Zhurba | bcb97e2 | 2017-10-05 14:10:39 -0500 | [diff] [blame] | 965 | } |
| 966 | } |
| 967 | |
Petr Lomakin | 47fee0a | 2017-08-01 10:46:05 -0700 | [diff] [blame] | 968 | /** Install docker if needed |
| 969 | * |
| 970 | * @param target Target node to install docker pkg |
| 971 | */ |
| 972 | def installDocker(master, target) { |
| 973 | def salt = new com.mirantis.mk.Salt() |
| 974 | if ( ! salt.runSaltProcessStep(master, target, 'pkg.version', ["docker-engine"]) ) { |
| 975 | salt.runSaltProcessStep(master, target, 'pkg.install', ["docker.io"]) |
| 976 | } |
| 977 | } |