Petr Lomakin | 47fee0a | 2017-08-01 10:46:05 -0700 | [diff] [blame] | 1 | package com.mirantis.mcp |
| 2 | |
| 3 | /** |
| 4 | * |
| 5 | * Tests providing functions |
| 6 | * |
| 7 | */ |
| 8 | |
| 9 | /** |
Oleksii Zhurba | 7b44ef1 | 2017-11-13 17:50:16 -0600 | [diff] [blame] | 10 | * Run docker container with basic (keystone) parameters |
Oleksii Zhurba | 1f4a6ff | 2018-06-27 16:45:17 -0500 | [diff] [blame] | 11 | * For backward compatibility. Deprecated. |
| 12 | * Will be removed soon. |
Petr Lomakin | 47fee0a | 2017-08-01 10:46:05 -0700 | [diff] [blame] | 13 | * |
Oleksii Zhurba | 7b44ef1 | 2017-11-13 17:50:16 -0600 | [diff] [blame] | 14 | * @param target Host to run container |
| 15 | * @param dockerImageLink Docker image link. May be custom or default rally image |
Petr Lomakin | 47fee0a | 2017-08-01 10:46:05 -0700 | [diff] [blame] | 16 | */ |
Oleksii Zhurba | 1f4a6ff | 2018-06-27 16:45:17 -0500 | [diff] [blame] | 17 | def runBasicContainer(master, target, dockerImageLink="xrally/xrally-openstack:0.10.1"){ |
Petr Lomakin | 47fee0a | 2017-08-01 10:46:05 -0700 | [diff] [blame] | 18 | def salt = new com.mirantis.mk.Salt() |
| 19 | def common = new com.mirantis.mk.Common() |
Sam Stoelinga | 28bdb72 | 2017-09-25 18:29:59 -0700 | [diff] [blame] | 20 | def _pillar = salt.getPillar(master, 'I@keystone:server', 'keystone:server') |
| 21 | def keystone = _pillar['return'][0].values()[0] |
Oleksii Zhurba | 7b44ef1 | 2017-11-13 17:50:16 -0600 | [diff] [blame] | 22 | if ( salt.cmdRun(master, target, "docker ps -f name=cvp -q", false, null, false)['return'][0].values()[0] ) { |
| 23 | salt.cmdRun(master, target, "docker rm -f cvp") |
| 24 | } |
| 25 | salt.cmdRun(master, target, "docker run -tid --net=host --name=cvp " + |
| 26 | "-u root -e OS_USERNAME=${keystone.admin_name} " + |
Petr Lomakin | 47fee0a | 2017-08-01 10:46:05 -0700 | [diff] [blame] | 27 | "-e OS_PASSWORD=${keystone.admin_password} -e OS_TENANT_NAME=${keystone.admin_tenant} " + |
| 28 | "-e OS_AUTH_URL=http://${keystone.bind.private_address}:${keystone.bind.private_port}/v2.0 " + |
Oleksii Zhurba | 1bf9be1 | 2018-01-17 15:20:00 -0600 | [diff] [blame] | 29 | "-e OS_REGION_NAME=${keystone.region} -e OS_ENDPOINT_TYPE=admin --entrypoint /bin/bash ${dockerImageLink}") |
Petr Lomakin | 47fee0a | 2017-08-01 10:46:05 -0700 | [diff] [blame] | 30 | } |
| 31 | |
Oleksii Zhurba | 1f4a6ff | 2018-06-27 16:45:17 -0500 | [diff] [blame] | 32 | |
| 33 | /** |
| 34 | * Run docker container with parameters |
| 35 | * |
| 36 | * @param target Host to run container |
| 37 | * @param dockerImageLink Docker image link. May be custom or default rally image |
| 38 | * @param name Name for container |
| 39 | * @param env_var Environment variables to set in container |
| 40 | * @param entrypoint Set entrypoint to /bin/bash or leave default |
| 41 | **/ |
| 42 | |
| 43 | |
| 44 | def runContainer(master, target, dockerImageLink, name='cvp', env_var=[], entrypoint=true){ |
| 45 | def salt = new com.mirantis.mk.Salt() |
| 46 | def common = new com.mirantis.mk.Common() |
| 47 | def variables = '' |
| 48 | def entry_point = '' |
Oleksii Zhurba | f4f8933 | 2019-03-15 15:47:52 -0500 | [diff] [blame^] | 49 | def cluster_name = salt.getPillar(master, 'I@salt:master', '_param:cluster_name')['return'][0].values()[0] |
Oleksii Zhurba | 1f4a6ff | 2018-06-27 16:45:17 -0500 | [diff] [blame] | 50 | if ( salt.cmdRun(master, target, "docker ps -f name=${name} -q", false, null, false)['return'][0].values()[0] ) { |
| 51 | salt.cmdRun(master, target, "docker rm -f ${name}") |
| 52 | } |
| 53 | if (env_var.size() > 0) { |
| 54 | variables = ' -e ' + env_var.join(' -e ') |
| 55 | } |
| 56 | if (entrypoint) { |
| 57 | entry_point = '--entrypoint /bin/bash' |
| 58 | } |
| 59 | salt.cmdRun(master, target, "docker run -tid --net=host --name=${name} " + |
Oleksii Zhurba | 115474a | 2019-02-13 18:27:31 -0600 | [diff] [blame] | 60 | "-u root ${entry_point} ${variables} " + |
| 61 | "-v /srv/salt/pki/${cluster_name}/:/etc/certs ${dockerImageLink}") |
Oleksii Zhurba | 1f4a6ff | 2018-06-27 16:45:17 -0500 | [diff] [blame] | 62 | } |
| 63 | |
| 64 | |
Petr Lomakin | 47fee0a | 2017-08-01 10:46:05 -0700 | [diff] [blame] | 65 | /** |
Oleksii Zhurba | 4bcf07f | 2018-09-11 15:23:18 -0500 | [diff] [blame] | 66 | * Get v2 Keystone credentials from pillars |
| 67 | * |
| 68 | */ |
| 69 | def _get_keystone_creds_v2(master){ |
| 70 | def salt = new com.mirantis.mk.Salt() |
| 71 | def common = new com.mirantis.mk.Common() |
| 72 | def keystone = [] |
| 73 | common.infoMsg("Fetching Keystone v2 credentials") |
| 74 | _pillar = salt.getPillar(master, 'I@keystone:server', 'keystone:server')['return'][0].values()[0] |
| 75 | keystone.add("OS_USERNAME=${_pillar.admin_name}") |
| 76 | keystone.add("OS_PASSWORD=${_pillar.admin_password}") |
| 77 | keystone.add("OS_TENANT_NAME=${_pillar.admin_tenant}") |
| 78 | keystone.add("OS_AUTH_URL=http://${_pillar.bind.private_address}:${_pillar.bind.private_port}/v2.0") |
| 79 | keystone.add("OS_REGION_NAME=${_pillar.region}") |
| 80 | keystone.add("OS_ENDPOINT_TYPE=admin") |
| 81 | return keystone |
| 82 | } |
| 83 | |
| 84 | /** |
| 85 | * Get v3 Keystone credentials from pillars |
| 86 | * |
| 87 | */ |
| 88 | def _get_keystone_creds_v3(master){ |
| 89 | def salt = new com.mirantis.mk.Salt() |
| 90 | def common = new com.mirantis.mk.Common() |
| 91 | pillar_name = 'keystone:client:os_client_config:cfgs:root:content:clouds:admin_identity' |
| 92 | common.infoMsg("Fetching Keystone v3 credentials") |
| 93 | def _pillar = salt.getPillar(master, 'I@keystone:client', pillar_name)['return'][0].values()[0] |
| 94 | def keystone = [] |
| 95 | if (_pillar) { |
| 96 | keystone.add("OS_USERNAME=${_pillar.auth.username}") |
| 97 | keystone.add("OS_PASSWORD=${_pillar.auth.password}") |
| 98 | keystone.add("OS_TENANT_NAME=${_pillar.auth.project_name}") |
| 99 | keystone.add("OS_PROJECT_NAME=${_pillar.auth.project_name}") |
| 100 | keystone.add("OS_AUTH_URL=${_pillar.auth.auth_url}/v3") |
| 101 | keystone.add("OS_REGION_NAME=${_pillar.region_name}") |
| 102 | keystone.add("OS_IDENTITY_API_VERSION=${_pillar.identity_api_version}") |
Oleksii Zhurba | 115474a | 2019-02-13 18:27:31 -0600 | [diff] [blame] | 103 | keystone.add("OS_ENDPOINT_TYPE=internal") |
Oleksii Zhurba | 4bcf07f | 2018-09-11 15:23:18 -0500 | [diff] [blame] | 104 | keystone.add("OS_PROJECT_DOMAIN_NAME=${_pillar.auth.project_domain_name}") |
| 105 | keystone.add("OS_USER_DOMAIN_NAME=${_pillar.auth.user_domain_name}") |
Oleksii Zhurba | 115474a | 2019-02-13 18:27:31 -0600 | [diff] [blame] | 106 | // we mount /srv/salt/pki/${cluster_name}/:/etc/certs with certs for cvp container |
| 107 | keystone.add("OS_CACERT='/etc/certs/proxy-with-chain.crt'") |
Oleksii Zhurba | 4bcf07f | 2018-09-11 15:23:18 -0500 | [diff] [blame] | 108 | return keystone |
| 109 | } |
| 110 | else { |
| 111 | common.warningMsg("Failed to fetch Keystone v3 credentials") |
| 112 | return false |
| 113 | } |
| 114 | } |
| 115 | |
| 116 | /** |
Dmitrii Kabanov | 23901c2 | 2017-10-20 10:25:36 -0700 | [diff] [blame] | 117 | * Get file content (encoded). The content encoded by Base64. |
Dmitrii Kabanov | d5f1c5f | 2017-08-30 14:51:41 -0700 | [diff] [blame] | 118 | * |
| 119 | * @param target Compound target (should target only one host) |
| 120 | * @param file File path to read |
Dmitrii Kabanov | 23901c2 | 2017-10-20 10:25:36 -0700 | [diff] [blame] | 121 | * @return The encoded content of the file |
Dmitrii Kabanov | d5f1c5f | 2017-08-30 14:51:41 -0700 | [diff] [blame] | 122 | */ |
Dmitrii Kabanov | 23901c2 | 2017-10-20 10:25:36 -0700 | [diff] [blame] | 123 | def getFileContentEncoded(master, target, file) { |
Dmitrii Kabanov | d5f1c5f | 2017-08-30 14:51:41 -0700 | [diff] [blame] | 124 | def salt = new com.mirantis.mk.Salt() |
Dmitrii Kabanov | 23901c2 | 2017-10-20 10:25:36 -0700 | [diff] [blame] | 125 | def file_content = '' |
| 126 | def cmd = "base64 -w0 ${file} > ${file}_encoded; " + |
| 127 | "split -b 1MB -d ${file}_encoded ${file}__; " + |
| 128 | "rm ${file}_encoded" |
| 129 | salt.cmdRun(master, target, cmd, false, null, false) |
| 130 | def filename = file.tokenize('/').last() |
| 131 | def folder = file - filename |
| 132 | def parts = salt.runSaltProcessStep(master, target, 'file.find', ["${folder}", "type=f", "name=${filename}__*"]) |
| 133 | for ( part in parts['return'][0].values()[0]) { |
| 134 | def _result = salt.cmdRun(master, target, "cat ${part}", false, null, false) |
| 135 | file_content = file_content + _result['return'][0].values()[0].replaceAll('Salt command execution success','') |
| 136 | } |
| 137 | salt.runSaltProcessStep(master, target, 'file.find', ["${folder}", "type=f", "name=${filename}__*", "delete"]) |
| 138 | return file_content |
| 139 | } |
| 140 | |
| 141 | /** |
| 142 | * Copy files from remote to local directory. The content of files will be |
| 143 | * decoded by Base64. |
| 144 | * |
| 145 | * @param target Compound target (should target only one host) |
| 146 | * @param folder The path to remote folder. |
| 147 | * @param output_dir The path to local folder. |
| 148 | */ |
| 149 | def addFiles(master, target, folder, output_dir) { |
| 150 | def salt = new com.mirantis.mk.Salt() |
| 151 | def _result = salt.runSaltProcessStep(master, target, 'file.find', ["${folder}", "type=f"]) |
| 152 | def files = _result['return'][0].values()[0] |
| 153 | for (file in files) { |
| 154 | def file_content = getFileContentEncoded(master, target, "${file}") |
| 155 | def fileName = file.tokenize('/').last() |
| 156 | writeFile file: "${output_dir}${fileName}_encoded", text: file_content |
| 157 | def cmd = "base64 -d ${output_dir}${fileName}_encoded > ${output_dir}${fileName}; " + |
| 158 | "rm ${output_dir}${fileName}_encoded" |
| 159 | sh(script: cmd) |
Dmitrii Kabanov | d5f1c5f | 2017-08-30 14:51:41 -0700 | [diff] [blame] | 160 | } |
| 161 | } |
| 162 | |
| 163 | /** |
| 164 | * Get reclass value |
| 165 | * |
| 166 | * @param target The host for which the values will be provided |
| 167 | * @param filter Parameters divided by dots |
| 168 | * @return The pillar data |
| 169 | */ |
| 170 | def getReclassValue(master, target, filter) { |
| 171 | def common = new com.mirantis.mk.Common() |
| 172 | def salt = new com.mirantis.mk.Salt() |
| 173 | def items = filter.tokenize('.') |
Dmitrii Kabanov | 23901c2 | 2017-10-20 10:25:36 -0700 | [diff] [blame] | 174 | def _result = salt.cmdRun(master, 'I@salt:master', "reclass-salt -o json -p ${target}", false, null, false) |
Dmitrii Kabanov | d5f1c5f | 2017-08-30 14:51:41 -0700 | [diff] [blame] | 175 | _result = common.parseJSON(_result['return'][0].values()[0]) |
Dmitrii Kabanov | 23901c2 | 2017-10-20 10:25:36 -0700 | [diff] [blame] | 176 | for (int k = 0; k < items.size(); k++) { |
Dmitrii Kabanov | d5f1c5f | 2017-08-30 14:51:41 -0700 | [diff] [blame] | 177 | if ( _result ) { |
Dmitrii Kabanov | 23901c2 | 2017-10-20 10:25:36 -0700 | [diff] [blame] | 178 | _result = _result["${items[k]}"] |
Dmitrii Kabanov | d5f1c5f | 2017-08-30 14:51:41 -0700 | [diff] [blame] | 179 | } |
| 180 | } |
| 181 | return _result |
| 182 | } |
| 183 | |
| 184 | /** |
| 185 | * Create list of nodes in JSON format. |
| 186 | * |
| 187 | * @param filter The Salt's matcher |
| 188 | * @return JSON list of nodes |
| 189 | */ |
| 190 | def getNodeList(master, filter = null) { |
| 191 | def salt = new com.mirantis.mk.Salt() |
| 192 | def common = new com.mirantis.mk.Common() |
Dmitrii Kabanov | d5f1c5f | 2017-08-30 14:51:41 -0700 | [diff] [blame] | 193 | def nodes = [] |
Dmitrii Kabanov | d5f1c5f | 2017-08-30 14:51:41 -0700 | [diff] [blame] | 194 | def filtered_list = null |
| 195 | def controllers = salt.getMinions(master, 'I@nova:controller') |
| 196 | def hw_nodes = salt.getMinions(master, 'G@virtual:physical') |
Dmitrii Kabanov | d5f1c5f | 2017-08-30 14:51:41 -0700 | [diff] [blame] | 197 | if ( filter ) { |
| 198 | filtered_list = salt.getMinions(master, filter) |
Dmitrii Kabanov | d5f1c5f | 2017-08-30 14:51:41 -0700 | [diff] [blame] | 199 | } |
| 200 | def _result = salt.cmdRun(master, 'I@salt:master', "reclass-salt -o json -t", false, null, false) |
| 201 | def reclass_top = common.parseJSON(_result['return'][0].values()[0]) |
Dmitrii Kabanov | 23901c2 | 2017-10-20 10:25:36 -0700 | [diff] [blame] | 202 | def nodesList = reclass_top['base'].keySet() |
| 203 | for (int i = 0; i < nodesList.size(); i++) { |
Dmitrii Kabanov | d5f1c5f | 2017-08-30 14:51:41 -0700 | [diff] [blame] | 204 | if ( filtered_list ) { |
Dmitrii Kabanov | 23901c2 | 2017-10-20 10:25:36 -0700 | [diff] [blame] | 205 | if ( ! filtered_list.contains(nodesList[i]) ) { |
Dmitrii Kabanov | d5f1c5f | 2017-08-30 14:51:41 -0700 | [diff] [blame] | 206 | continue |
| 207 | } |
| 208 | } |
Dmitrii Kabanov | 23901c2 | 2017-10-20 10:25:36 -0700 | [diff] [blame] | 209 | def ip = getReclassValue(master, nodesList[i], '_param.linux_single_interface.address') |
| 210 | def network_data = [ip: ip, name: 'management'] |
| 211 | def roles = [nodesList[i].tokenize('.')[0]] |
| 212 | if ( controllers.contains(nodesList[i]) ) { |
| 213 | roles.add('controller') |
Dmitrii Kabanov | d5f1c5f | 2017-08-30 14:51:41 -0700 | [diff] [blame] | 214 | } |
Dmitrii Kabanov | 23901c2 | 2017-10-20 10:25:36 -0700 | [diff] [blame] | 215 | if ( hw_nodes.contains(nodesList[i]) ) { |
| 216 | roles.add('hw_node') |
Dmitrii Kabanov | d5f1c5f | 2017-08-30 14:51:41 -0700 | [diff] [blame] | 217 | } |
Dmitrii Kabanov | 23901c2 | 2017-10-20 10:25:36 -0700 | [diff] [blame] | 218 | nodes.add([id: i+1, ip: ip, roles: roles, network_data: [network_data]]) |
Dmitrii Kabanov | d5f1c5f | 2017-08-30 14:51:41 -0700 | [diff] [blame] | 219 | } |
Dmitrii Kabanov | 23901c2 | 2017-10-20 10:25:36 -0700 | [diff] [blame] | 220 | return common.prettify(nodes) |
Dmitrii Kabanov | d5f1c5f | 2017-08-30 14:51:41 -0700 | [diff] [blame] | 221 | } |
| 222 | |
Oleksii Zhurba | bcb97e2 | 2017-10-05 14:10:39 -0500 | [diff] [blame] | 223 | /** |
| 224 | * Execute mcp sanity tests |
Oleksii Zhurba | 1f4a6ff | 2018-06-27 16:45:17 -0500 | [diff] [blame] | 225 | * Deprecated. Will be removed soon |
Oleksii Zhurba | bcb97e2 | 2017-10-05 14:10:39 -0500 | [diff] [blame] | 226 | * |
| 227 | * @param salt_url Salt master url |
| 228 | * @param salt_credentials Salt credentials |
| 229 | * @param test_set Test set for mcp sanity framework |
Oleksii Zhurba | 0a7b070 | 2017-11-10 16:02:16 -0600 | [diff] [blame] | 230 | * @param env_vars Additional environment variables for cvp-sanity-checks |
Oleksii Zhurba | bcb97e2 | 2017-10-05 14:10:39 -0500 | [diff] [blame] | 231 | * @param output_dir Directory for results |
| 232 | */ |
Oleksii Zhurba | 0a7b070 | 2017-11-10 16:02:16 -0600 | [diff] [blame] | 233 | def runSanityTests(salt_url, salt_credentials, test_set="", output_dir="validation_artifacts/", env_vars="") { |
Oleksii Zhurba | bcb97e2 | 2017-10-05 14:10:39 -0500 | [diff] [blame] | 234 | def common = new com.mirantis.mk.Common() |
Oleksii Zhurba | 0a7b070 | 2017-11-10 16:02:16 -0600 | [diff] [blame] | 235 | def creds = common.getCredentials(salt_credentials) |
| 236 | def username = creds.username |
| 237 | def password = creds.password |
| 238 | def settings = "" |
| 239 | if ( env_vars != "" ) { |
| 240 | for (var in env_vars.tokenize(";")) { |
| 241 | settings += "export ${var}; " |
| 242 | } |
| 243 | } |
| 244 | def script = ". ${env.WORKSPACE}/venv/bin/activate; ${settings}" + |
Oleksii Zhurba | 5250a9c | 2018-03-21 15:47:03 -0500 | [diff] [blame] | 245 | "pytest --junitxml ${output_dir}cvp_sanity.xml --tb=short -sv ${env.WORKSPACE}/cvp-sanity-checks/cvp_checks/tests/${test_set}" |
Oleksii Zhurba | bcb97e2 | 2017-10-05 14:10:39 -0500 | [diff] [blame] | 246 | withEnv(["SALT_USERNAME=${username}", "SALT_PASSWORD=${password}", "SALT_URL=${salt_url}"]) { |
| 247 | def statusCode = sh script:script, returnStatus:true |
| 248 | } |
| 249 | } |
Dmitrii Kabanov | d5f1c5f | 2017-08-30 14:51:41 -0700 | [diff] [blame] | 250 | |
| 251 | /** |
Oleksii Zhurba | 4e366ff | 2018-02-16 20:06:52 -0600 | [diff] [blame] | 252 | * Execute pytest framework tests |
| 253 | * |
| 254 | * @param salt_url Salt master url |
| 255 | * @param salt_credentials Salt credentials |
| 256 | * @param test_set Test set to run |
| 257 | * @param env_vars Additional environment variables for cvp-sanity-checks |
| 258 | * @param output_dir Directory for results |
| 259 | */ |
Oleksii Zhurba | 1f4a6ff | 2018-06-27 16:45:17 -0500 | [diff] [blame] | 260 | def runPyTests(salt_url, salt_credentials, test_set="", env_vars="", name='cvp', container_node="", remote_dir='/root/qa_results/', artifacts_dir='validation_artifacts/') { |
| 261 | def xml_file = "${name}_report.xml" |
| 262 | def common = new com.mirantis.mk.Common() |
| 263 | def salt = new com.mirantis.mk.Salt() |
| 264 | def creds = common.getCredentials(salt_credentials) |
| 265 | def username = creds.username |
| 266 | def password = creds.password |
| 267 | if (container_node != "") { |
| 268 | def saltMaster |
| 269 | saltMaster = salt.connection(salt_url, salt_credentials) |
| 270 | def script = "pytest --junitxml ${xml_file} --tb=short -sv ${test_set}" |
| 271 | env_vars.addAll("SALT_USERNAME=${username}", "SALT_PASSWORD=${password}", |
| 272 | "SALT_URL=${salt_url}") |
| 273 | variables = ' -e ' + env_vars.join(' -e ') |
| 274 | salt.cmdRun(saltMaster, container_node, "docker exec ${variables} ${name} bash -c '${script}'", false) |
| 275 | salt.cmdRun(saltMaster, container_node, "docker cp ${name}:/var/lib/${xml_file} ${remote_dir}${xml_file}") |
| 276 | addFiles(saltMaster, container_node, remote_dir+xml_file, artifacts_dir) |
| 277 | } |
| 278 | else { |
| 279 | if (env_vars.size() > 0) { |
| 280 | variables = 'export ' + env_vars.join(';export ') |
| 281 | } |
| 282 | def script = ". ${env.WORKSPACE}/venv/bin/activate; ${variables}; " + |
| 283 | "pytest --junitxml ${artifacts_dir}${xml_file} --tb=short -sv ${env.WORKSPACE}/${test_set}" |
| 284 | withEnv(["SALT_USERNAME=${username}", "SALT_PASSWORD=${password}", "SALT_URL=${salt_url}"]) { |
| 285 | def statusCode = sh script:script, returnStatus:true |
| 286 | } |
| 287 | } |
| 288 | } |
| 289 | |
| 290 | /** |
| 291 | * Execute pytest framework tests |
| 292 | * For backward compatibility |
| 293 | * Will be removed soon |
| 294 | * |
| 295 | * @param salt_url Salt master url |
| 296 | * @param salt_credentials Salt credentials |
| 297 | * @param test_set Test set to run |
| 298 | * @param env_vars Additional environment variables for cvp-sanity-checks |
| 299 | * @param output_dir Directory for results |
| 300 | */ |
Oleksii Zhurba | 4e366ff | 2018-02-16 20:06:52 -0600 | [diff] [blame] | 301 | def runTests(salt_url, salt_credentials, test_set="", output_dir="validation_artifacts/", env_vars="") { |
| 302 | def common = new com.mirantis.mk.Common() |
| 303 | def creds = common.getCredentials(salt_credentials) |
| 304 | def username = creds.username |
| 305 | def password = creds.password |
| 306 | def settings = "" |
| 307 | if ( env_vars != "" ) { |
| 308 | for (var in env_vars.tokenize(";")) { |
| 309 | settings += "export ${var}; " |
| 310 | } |
| 311 | } |
| 312 | def script = ". ${env.WORKSPACE}/venv/bin/activate; ${settings}" + |
| 313 | "pytest --junitxml ${output_dir}report.xml --tb=short -sv ${env.WORKSPACE}/${test_set}" |
| 314 | withEnv(["SALT_USERNAME=${username}", "SALT_PASSWORD=${password}", "SALT_URL=${salt_url}"]) { |
| 315 | def statusCode = sh script:script, returnStatus:true |
| 316 | } |
| 317 | } |
| 318 | |
| 319 | /** |
Petr Lomakin | 47fee0a | 2017-08-01 10:46:05 -0700 | [diff] [blame] | 320 | * Execute tempest tests |
| 321 | * |
| 322 | * @param target Host to run tests |
Dmitrii Kabanov | 23901c2 | 2017-10-20 10:25:36 -0700 | [diff] [blame] | 323 | * @param dockerImageLink Docker image link |
Petr Lomakin | 47fee0a | 2017-08-01 10:46:05 -0700 | [diff] [blame] | 324 | * @param pattern If not false, will run only tests matched the pattern |
| 325 | * @param output_dir Directory for results |
Dmitrii Kabanov | 999fda9 | 2017-11-10 00:18:30 -0800 | [diff] [blame] | 326 | * @param confRepository Git repository with configuration files for Tempest |
| 327 | * @param confBranch Git branch which will be used during the checkout |
| 328 | * @param repository Git repository with Tempest |
| 329 | * @param version Version of Tempest (tag, branch or commit) |
Sergey Galkin | d1068e2 | 2018-02-13 13:59:32 +0400 | [diff] [blame] | 330 | * @param results The reports directory |
Petr Lomakin | 47fee0a | 2017-08-01 10:46:05 -0700 | [diff] [blame] | 331 | */ |
Sergey Galkin | d1068e2 | 2018-02-13 13:59:32 +0400 | [diff] [blame] | 332 | def runTempestTests(master, target, dockerImageLink, output_dir, confRepository, confBranch, repository, version, pattern = "false", results = '/root/qa_results') { |
Petr Lomakin | 47fee0a | 2017-08-01 10:46:05 -0700 | [diff] [blame] | 333 | def salt = new com.mirantis.mk.Salt() |
| 334 | def output_file = 'docker-tempest.log' |
Dmitrii Kabanov | 23901c2 | 2017-10-20 10:25:36 -0700 | [diff] [blame] | 335 | def dest_folder = '/home/rally/qa_results' |
Dmitrii Kabanov | 999fda9 | 2017-11-10 00:18:30 -0800 | [diff] [blame] | 336 | def skip_list = '--skip-list /opt/devops-qa-tools/deployment/skip_contrail.list' |
Dmitrii Kabanov | 23901c2 | 2017-10-20 10:25:36 -0700 | [diff] [blame] | 337 | salt.runSaltProcessStep(master, target, 'file.remove', ["${results}"]) |
| 338 | salt.runSaltProcessStep(master, target, 'file.mkdir', ["${results}", "mode=777"]) |
| 339 | def _pillar = salt.getPillar(master, 'I@keystone:server', 'keystone:server') |
| 340 | def keystone = _pillar['return'][0].values()[0] |
Dmitry Tsapikov | b691192 | 2018-07-24 15:21:23 +0000 | [diff] [blame] | 341 | def env_vars = ['tempest_version=15.0.0', |
Dmitrii Kabanov | 23901c2 | 2017-10-20 10:25:36 -0700 | [diff] [blame] | 342 | "OS_USERNAME=${keystone.admin_name}", |
| 343 | "OS_PASSWORD=${keystone.admin_password}", |
| 344 | "OS_TENANT_NAME=${keystone.admin_tenant}", |
| 345 | "OS_AUTH_URL=http://${keystone.bind.private_address}:${keystone.bind.private_port}/v2.0", |
| 346 | "OS_REGION_NAME=${keystone.region}", |
| 347 | 'OS_ENDPOINT_TYPE=admin'].join(' -e ') |
| 348 | def cmd = '/opt/devops-qa-tools/deployment/configure.sh; ' |
Dmitrii Kabanov | 999fda9 | 2017-11-10 00:18:30 -0800 | [diff] [blame] | 349 | if (confRepository != '' ) { |
| 350 | cmd = "git clone -b ${confBranch ?: 'master'} ${confRepository} test_config; " + |
| 351 | 'rally deployment create --fromenv --name=tempest; rally deployment config; ' + |
| 352 | 'rally verify create-verifier --name tempest_verifier --type tempest ' + |
Dmitry Tsapikov | b691192 | 2018-07-24 15:21:23 +0000 | [diff] [blame] | 353 | "--source ${repository ?: '/tmp/tempest/'} --version ${version: '15.0.0'}; " + |
Dmitrii Kabanov | 999fda9 | 2017-11-10 00:18:30 -0800 | [diff] [blame] | 354 | 'rally verify configure-verifier --extend test_config/tempest/tempest.conf --show; ' |
| 355 | skip_list = '--skip-list test_config/tempest/skip-list.yaml' |
| 356 | } |
Dmitrii Kabanov | 23901c2 | 2017-10-20 10:25:36 -0700 | [diff] [blame] | 357 | if (pattern == 'false') { |
Dmitrii Kabanov | 999fda9 | 2017-11-10 00:18:30 -0800 | [diff] [blame] | 358 | cmd += "rally verify start --pattern set=full ${skip_list} --detailed; " |
Petr Lomakin | 47fee0a | 2017-08-01 10:46:05 -0700 | [diff] [blame] | 359 | } |
| 360 | else { |
Dmitrii Kabanov | 999fda9 | 2017-11-10 00:18:30 -0800 | [diff] [blame] | 361 | cmd += "rally verify start --pattern set=${pattern} ${skip_list} --detailed; " |
Petr Lomakin | 47fee0a | 2017-08-01 10:46:05 -0700 | [diff] [blame] | 362 | } |
Dmitrii Kabanov | 23901c2 | 2017-10-20 10:25:36 -0700 | [diff] [blame] | 363 | cmd += "rally verify report --type json --to ${dest_folder}/report-tempest.json; " + |
| 364 | "rally verify report --type html --to ${dest_folder}/report-tempest.html" |
mkraynov | d49daf5 | 2018-07-12 16:11:14 +0400 | [diff] [blame] | 365 | salt.cmdRun(master, target, "docker run -w /home/rally -i --rm --net=host -e ${env_vars} " + |
Sergey Galkin | 193ef87 | 2017-11-29 14:20:35 +0400 | [diff] [blame] | 366 | "-v ${results}:${dest_folder} --entrypoint /bin/bash ${dockerImageLink} " + |
| 367 | "-c \"${cmd}\" > ${results}/${output_file}") |
Dmitrii Kabanov | 23901c2 | 2017-10-20 10:25:36 -0700 | [diff] [blame] | 368 | addFiles(master, target, results, output_dir) |
Petr Lomakin | 47fee0a | 2017-08-01 10:46:05 -0700 | [diff] [blame] | 369 | } |
| 370 | |
| 371 | /** |
Oleg Basov | 40e502c | 2018-09-04 20:42:21 +0200 | [diff] [blame] | 372 | * Make all-in-one scenario cmd for rally tests |
| 373 | * |
| 374 | * @param scenarios_path Path to scenarios folder/file |
| 375 | * @param skip_scenarios Comma-delimited list of scenarios names to skip |
| 376 | * @param bundle_file Bundle name to create |
| 377 | */ |
Oleg Basov | 06fce2a | 2018-11-09 21:39:03 +0100 | [diff] [blame] | 378 | def bundle_up_scenarios(scenarios_path, skip_scenarios, bundle_file = '' ) { |
Oleg Basov | 40e502c | 2018-09-04 20:42:21 +0200 | [diff] [blame] | 379 | def skip_names = '' |
| 380 | def skip_dirs = '' |
| 381 | def result = '' |
| 382 | if (skip_scenarios != ''){ |
| 383 | for ( scen in skip_scenarios.split(',') ) { |
| 384 | if ( scen.contains('yaml')) { |
| 385 | skip_names += "! -name ${scen} " |
| 386 | } |
| 387 | else { |
| 388 | skip_dirs += "-path ${scenarios_path}/${scen} -prune -o " |
| 389 | } |
| 390 | } |
| 391 | } |
Oleg Basov | 06fce2a | 2018-11-09 21:39:03 +0100 | [diff] [blame] | 392 | if (bundle_file != '') { |
| 393 | result = "if [ -f ${scenarios_path} ]; then cp ${scenarios_path} ${bundle_file}; " + |
Oleg Basov | 40e502c | 2018-09-04 20:42:21 +0200 | [diff] [blame] | 394 | "else " + |
| 395 | "find -L ${scenarios_path} " + skip_dirs + |
| 396 | " -name '*.yaml' " + skip_names + |
| 397 | "-exec cat {} >> ${bundle_file} \\; ; " + |
| 398 | "sed -i '/---/d' ${bundle_file}; fi; " |
Oleg Basov | 06fce2a | 2018-11-09 21:39:03 +0100 | [diff] [blame] | 399 | } else { |
| 400 | result = "find -L ${scenarios_path} " + skip_dirs + |
| 401 | " -name '*.yaml' " + skip_names |
| 402 | } |
Oleg Basov | 40e502c | 2018-09-04 20:42:21 +0200 | [diff] [blame] | 403 | |
| 404 | return result |
| 405 | } |
| 406 | |
| 407 | /** |
Petr Lomakin | 47fee0a | 2017-08-01 10:46:05 -0700 | [diff] [blame] | 408 | * Execute rally tests |
| 409 | * |
| 410 | * @param target Host to run tests |
Dmitrii Kabanov | 23901c2 | 2017-10-20 10:25:36 -0700 | [diff] [blame] | 411 | * @param dockerImageLink Docker image link |
Oleg Basov | 20afb15 | 2018-06-10 03:09:25 +0200 | [diff] [blame] | 412 | * @param platform What do we have underneath (openstack/k8s) |
Petr Lomakin | 47fee0a | 2017-08-01 10:46:05 -0700 | [diff] [blame] | 413 | * @param output_dir Directory for results |
Oleg Basov | 40e502c | 2018-09-04 20:42:21 +0200 | [diff] [blame] | 414 | * @param config_repo Git repository with with files for Rally |
| 415 | * @param config_branch Git config repo branch which will be used during the checkout |
| 416 | * @param plugins_repo Git repository with Rally plugins |
| 417 | * @param plugins_branch Git plugins repo branch which will be used during the checkout |
Oleg Basov | 20afb15 | 2018-06-10 03:09:25 +0200 | [diff] [blame] | 418 | * @param scenarios Directory inside repo with specific scenarios |
Oleg Basov | 40e502c | 2018-09-04 20:42:21 +0200 | [diff] [blame] | 419 | * @param sl_scenarios Directory inside repo with specific scenarios for stacklight |
Oleg Basov | 20afb15 | 2018-06-10 03:09:25 +0200 | [diff] [blame] | 420 | * @param tasks_args_file Argument file that is used for throttling settings |
Dmitrii Kabanov | 23901c2 | 2017-10-20 10:25:36 -0700 | [diff] [blame] | 421 | * @param ext_variables The list of external variables |
Sergey Galkin | d1068e2 | 2018-02-13 13:59:32 +0400 | [diff] [blame] | 422 | * @param results The reports directory |
Petr Lomakin | 47fee0a | 2017-08-01 10:46:05 -0700 | [diff] [blame] | 423 | */ |
Oleg Basov | 40e502c | 2018-09-04 20:42:21 +0200 | [diff] [blame] | 424 | def runRallyTests(master, target, dockerImageLink, platform, output_dir, config_repo, config_branch, plugins_repo, plugins_branch, scenarios, sl_scenarios = '', tasks_args_file = '', ext_variables = [], results = '/root/qa_results', skip_list = '') { |
Petr Lomakin | 47fee0a | 2017-08-01 10:46:05 -0700 | [diff] [blame] | 425 | def salt = new com.mirantis.mk.Salt() |
| 426 | def output_file = 'docker-rally.log' |
Dmitrii Kabanov | 23901c2 | 2017-10-20 10:25:36 -0700 | [diff] [blame] | 427 | def dest_folder = '/home/rally/qa_results' |
Oleg Basov | 20afb15 | 2018-06-10 03:09:25 +0200 | [diff] [blame] | 428 | def env_vars = [] |
| 429 | def rally_extra_args = '' |
Oleg Basov | 40e502c | 2018-09-04 20:42:21 +0200 | [diff] [blame] | 430 | def cmd_rally_plugins = |
| 431 | "git clone -b ${plugins_branch ?: 'master'} ${plugins_repo} /tmp/plugins; " + |
| 432 | "sudo pip install --upgrade /tmp/plugins; " |
Oleg Basov | 20afb15 | 2018-06-10 03:09:25 +0200 | [diff] [blame] | 433 | def cmd_rally_init = '' |
Oleg Basov | 40e502c | 2018-09-04 20:42:21 +0200 | [diff] [blame] | 434 | def cmd_rally_checkout = "git clone -b ${config_branch ?: 'master'} ${config_repo} test_config; " |
Oleg Basov | 20afb15 | 2018-06-10 03:09:25 +0200 | [diff] [blame] | 435 | def cmd_rally_start = '' |
| 436 | def cmd_rally_task_args = '' |
Oleg Basov | 40e502c | 2018-09-04 20:42:21 +0200 | [diff] [blame] | 437 | def cmd_rally_stacklight = '' |
| 438 | def cmd_rally_report = '' |
Dmitrii Kabanov | 23901c2 | 2017-10-20 10:25:36 -0700 | [diff] [blame] | 439 | salt.runSaltProcessStep(master, target, 'file.remove', ["${results}"]) |
| 440 | salt.runSaltProcessStep(master, target, 'file.mkdir', ["${results}", "mode=777"]) |
Oleg Basov | 40e502c | 2018-09-04 20:42:21 +0200 | [diff] [blame] | 441 | if (platform['type'] == 'openstack') { |
Oleg Basov | 4a697fc | 2018-11-06 18:34:08 +0100 | [diff] [blame] | 442 | def _pillar = salt.getPillar(master, 'I@keystone:server', 'keystone') |
Oleg Basov | 20afb15 | 2018-06-10 03:09:25 +0200 | [diff] [blame] | 443 | def keystone = _pillar['return'][0].values()[0] |
| 444 | env_vars = ( ['tempest_version=15.0.0', |
Oleg Basov | 4a697fc | 2018-11-06 18:34:08 +0100 | [diff] [blame] | 445 | "OS_USERNAME=${keystone.server.admin_name}", |
| 446 | "OS_PASSWORD=${keystone.server.admin_password}", |
| 447 | "OS_TENANT_NAME=${keystone.server.admin_tenant}", |
| 448 | "OS_AUTH_URL=http://${keystone.server.bind.private_address}:${keystone.server.bind.private_port}" + |
| 449 | "/v${keystone.client.os_client_config.cfgs.root.content.clouds.admin_identity.identity_api_version}", |
| 450 | "OS_REGION_NAME=${keystone.server.region}", |
Oleg Basov | 20afb15 | 2018-06-10 03:09:25 +0200 | [diff] [blame] | 451 | 'OS_ENDPOINT_TYPE=admin'] + ext_variables ).join(' -e ') |
Oleg Basov | 40e502c | 2018-09-04 20:42:21 +0200 | [diff] [blame] | 452 | cmd_rally_init = 'rally db create; ' + |
| 453 | 'rally deployment create --fromenv --name=existing; ' + |
| 454 | 'rally deployment config; ' |
| 455 | if (platform['stacklight_enabled'] == true) { |
Oleg Basov | 418bfc4 | 2018-10-28 15:01:22 +0100 | [diff] [blame] | 456 | def _pillar_grafana = salt.getPillar(master, 'I@grafana:client', 'grafana:client:server') |
| 457 | def grafana = _pillar_grafana['return'][0].values()[0] |
Oleg Basov | 40e502c | 2018-09-04 20:42:21 +0200 | [diff] [blame] | 458 | cmd_rally_stacklight = bundle_up_scenarios(sl_scenarios, skip_list, "scenarios_${platform.type}_stacklight.yaml") |
Oleg Basov | 418bfc4 | 2018-10-28 15:01:22 +0100 | [diff] [blame] | 459 | cmd_rally_stacklight += "sed -i 's/grafana_password: .*/grafana_password: ${grafana.password}/' " + |
| 460 | "test_config/job-params-stacklight.yaml; " + |
| 461 | "rally $rally_extra_args task start scenarios_${platform.type}_stacklight.yaml " + |
Oleg Basov | 40e502c | 2018-09-04 20:42:21 +0200 | [diff] [blame] | 462 | "--task-args-file test_config/job-params-stacklight.yaml; " |
Oleg Basov | 20afb15 | 2018-06-10 03:09:25 +0200 | [diff] [blame] | 463 | } |
Oleg Basov | 40e502c | 2018-09-04 20:42:21 +0200 | [diff] [blame] | 464 | } else if (platform['type'] == 'k8s') { |
Oleg Basov | 20afb15 | 2018-06-10 03:09:25 +0200 | [diff] [blame] | 465 | rally_extra_args = "--debug --log-file ${dest_folder}/task.log" |
Oleg Basov | 3e050d3 | 2018-07-03 22:10:56 +0200 | [diff] [blame] | 466 | def _pillar = salt.getPillar(master, 'I@kubernetes:master and *01*', 'kubernetes:master') |
| 467 | def kubernetes = _pillar['return'][0].values()[0] |
| 468 | env_vars = [ |
Oleg Basov | 491942d | 2018-10-17 16:11:25 +0200 | [diff] [blame] | 469 | "KUBERNETES_HOST=http://${kubernetes.apiserver.vip_address}" + |
Oleg Basov | 3e050d3 | 2018-07-03 22:10:56 +0200 | [diff] [blame] | 470 | ":${kubernetes.apiserver.insecure_port}", |
| 471 | "KUBERNETES_CERT_AUTH=${dest_folder}/k8s-ca.crt", |
| 472 | "KUBERNETES_CLIENT_KEY=${dest_folder}/k8s-client.key", |
| 473 | "KUBERNETES_CLIENT_CERT=${dest_folder}/k8s-client.crt"].join(' -e ') |
| 474 | def k8s_ca = salt.getReturnValues(salt.runSaltProcessStep(master, |
Oleg Basov | 20afb15 | 2018-06-10 03:09:25 +0200 | [diff] [blame] | 475 | 'I@kubernetes:master and *01*', 'cmd.run', |
Oleg Basov | 3e050d3 | 2018-07-03 22:10:56 +0200 | [diff] [blame] | 476 | ["cat /etc/kubernetes/ssl/ca-kubernetes.crt"])) |
| 477 | def k8s_client_key = salt.getReturnValues(salt.runSaltProcessStep(master, |
| 478 | 'I@kubernetes:master and *01*', 'cmd.run', |
| 479 | ["cat /etc/kubernetes/ssl/kubelet-client.key"])) |
| 480 | def k8s_client_crt = salt.getReturnValues(salt.runSaltProcessStep(master, |
| 481 | 'I@kubernetes:master and *01*', 'cmd.run', |
| 482 | ["cat /etc/kubernetes/ssl/kubelet-client.crt"])) |
Oleg Basov | 20afb15 | 2018-06-10 03:09:25 +0200 | [diff] [blame] | 483 | def tmp_dir = '/tmp/kube' |
| 484 | salt.runSaltProcessStep(master, target, 'file.mkdir', ["${tmp_dir}", "mode=777"]) |
Oleg Basov | 3e050d3 | 2018-07-03 22:10:56 +0200 | [diff] [blame] | 485 | writeFile file: "${tmp_dir}/k8s-ca.crt", text: k8s_ca |
| 486 | writeFile file: "${tmp_dir}/k8s-client.key", text: k8s_client_key |
| 487 | writeFile file: "${tmp_dir}/k8s-client.crt", text: k8s_client_crt |
Oleg Basov | 20afb15 | 2018-06-10 03:09:25 +0200 | [diff] [blame] | 488 | salt.cmdRun(master, target, "mv ${tmp_dir}/* ${results}/") |
| 489 | salt.runSaltProcessStep(master, target, 'file.rmdir', ["${tmp_dir}"]) |
Oleg Basov | 40e502c | 2018-09-04 20:42:21 +0200 | [diff] [blame] | 490 | cmd_rally_init = "rally db recreate; " + |
Oleg Basov | 3e050d3 | 2018-07-03 22:10:56 +0200 | [diff] [blame] | 491 | "rally env create --name k8s --from-sysenv; " + |
Oleg Basov | 20afb15 | 2018-06-10 03:09:25 +0200 | [diff] [blame] | 492 | "rally env check k8s; " |
Oleg Basov | 20afb15 | 2018-06-10 03:09:25 +0200 | [diff] [blame] | 493 | } else { |
| 494 | throw new Exception("Platform ${platform} is not supported yet") |
Dmitrii Kabanov | 999fda9 | 2017-11-10 00:18:30 -0800 | [diff] [blame] | 495 | } |
Oleg Basov | 06fce2a | 2018-11-09 21:39:03 +0100 | [diff] [blame] | 496 | switch(tasks_args_file) { |
| 497 | case 'none': |
| 498 | cmd_rally_task_args = '; ' |
Oleg Basov | 20afb15 | 2018-06-10 03:09:25 +0200 | [diff] [blame] | 499 | break |
Oleg Basov | 06fce2a | 2018-11-09 21:39:03 +0100 | [diff] [blame] | 500 | case '': |
| 501 | cmd_rally_task_args = '--task-args-file test_config/job-params-light.yaml; ' |
| 502 | break |
| 503 | default: |
| 504 | cmd_rally_task_args = "--task-args-file ${tasks_args_file}; " |
| 505 | break |
| 506 | } |
| 507 | if (platform['type'] == 'k8s') { |
| 508 | cmd_rally_start = "for task in \\\$(" + bundle_up_scenarios(scenarios, skip_list) + |
| 509 | "); do " + |
| 510 | "rally $rally_extra_args task start \\\$task ${cmd_rally_task_args}" + |
| 511 | "done; " |
| 512 | } else { |
| 513 | cmd_rally_checkout += bundle_up_scenarios(scenarios, skip_list, "scenarios_${platform.type}.yaml") |
| 514 | cmd_rally_start = "rally $rally_extra_args task start " + |
| 515 | "scenarios_${platform.type}.yaml ${cmd_rally_task_args}" |
Oleg Basov | 20afb15 | 2018-06-10 03:09:25 +0200 | [diff] [blame] | 516 | } |
Oleg Basov | aaeb51f | 2018-10-17 01:07:10 +0200 | [diff] [blame] | 517 | cmd_rally_report= "rally task export --uuid \\\$(rally task list --uuids-only --status finished) " + |
| 518 | "--type junit-xml --to ${dest_folder}/report-rally.xml; " + |
| 519 | "rally task report --uuid \\\$(rally task list --uuids-only --status finished) " + |
| 520 | "--out ${dest_folder}/report-rally.html" |
| 521 | |
Oleg Basov | 40e502c | 2018-09-04 20:42:21 +0200 | [diff] [blame] | 522 | full_cmd = 'set -xe; ' + cmd_rally_plugins + |
| 523 | cmd_rally_init + cmd_rally_checkout + |
| 524 | 'set +e; ' + cmd_rally_start + |
Oleg Basov | 06fce2a | 2018-11-09 21:39:03 +0100 | [diff] [blame] | 525 | cmd_rally_stacklight + |
Oleg Basov | 40e502c | 2018-09-04 20:42:21 +0200 | [diff] [blame] | 526 | cmd_rally_report |
Sergey Galkin | f89509d | 2018-03-19 15:24:17 +0400 | [diff] [blame] | 527 | salt.runSaltProcessStep(master, target, 'file.touch', ["${results}/rally.db"]) |
| 528 | salt.cmdRun(master, target, "chmod 666 ${results}/rally.db") |
mkraynov | d49daf5 | 2018-07-12 16:11:14 +0400 | [diff] [blame] | 529 | salt.cmdRun(master, target, "docker run -w /home/rally -i --rm --net=host -e ${env_vars} " + |
Sergey Galkin | 3c1e9e2 | 2018-01-12 16:31:53 +0400 | [diff] [blame] | 530 | "-v ${results}:${dest_folder} " + |
mkraynov | d49daf5 | 2018-07-12 16:11:14 +0400 | [diff] [blame] | 531 | "-v ${results}/rally.db:/home/rally/data/rally.db " + |
Sergey Galkin | 3c1e9e2 | 2018-01-12 16:31:53 +0400 | [diff] [blame] | 532 | "--entrypoint /bin/bash ${dockerImageLink} " + |
| 533 | "-c \"${full_cmd}\" > ${results}/${output_file}") |
Dmitrii Kabanov | 23901c2 | 2017-10-20 10:25:36 -0700 | [diff] [blame] | 534 | addFiles(master, target, results, output_dir) |
Petr Lomakin | 47fee0a | 2017-08-01 10:46:05 -0700 | [diff] [blame] | 535 | } |
| 536 | |
| 537 | /** |
Tetiana Korchak | 3383cc9 | 2017-08-25 09:36:19 -0700 | [diff] [blame] | 538 | * Generate test report |
| 539 | * |
| 540 | * @param target Host to run script from |
Dmitrii Kabanov | 23901c2 | 2017-10-20 10:25:36 -0700 | [diff] [blame] | 541 | * @param dockerImageLink Docker image link |
Tetiana Korchak | 3383cc9 | 2017-08-25 09:36:19 -0700 | [diff] [blame] | 542 | * @param output_dir Directory for results |
Sergey Galkin | d1068e2 | 2018-02-13 13:59:32 +0400 | [diff] [blame] | 543 | * @param results The reports directory |
Tetiana Korchak | 3383cc9 | 2017-08-25 09:36:19 -0700 | [diff] [blame] | 544 | */ |
Sergey Galkin | d1068e2 | 2018-02-13 13:59:32 +0400 | [diff] [blame] | 545 | def generateTestReport(master, target, dockerImageLink, output_dir, results = '/root/qa_results') { |
Tetiana Korchak | 3383cc9 | 2017-08-25 09:36:19 -0700 | [diff] [blame] | 546 | def report_file = 'jenkins_test_report.html' |
Tetiana Korchak | 3383cc9 | 2017-08-25 09:36:19 -0700 | [diff] [blame] | 547 | def salt = new com.mirantis.mk.Salt() |
| 548 | def common = new com.mirantis.mk.Common() |
Dmitrii Kabanov | 23901c2 | 2017-10-20 10:25:36 -0700 | [diff] [blame] | 549 | def dest_folder = '/opt/devops-qa-tools/generate_test_report/test_results' |
| 550 | salt.runSaltProcessStep(master, target, 'file.remove', ["${results}"]) |
| 551 | salt.runSaltProcessStep(master, target, 'file.mkdir', ["${results}", "mode=777"]) |
| 552 | def reports = ['report-tempest.json', |
| 553 | 'report-rally.xml', |
| 554 | 'report-k8s-e2e-tests.txt', |
| 555 | 'report-ha.json', |
| 556 | 'report-spt.txt'] |
| 557 | for ( report in reports ) { |
Tetiana Korchak | 3383cc9 | 2017-08-25 09:36:19 -0700 | [diff] [blame] | 558 | if ( fileExists("${output_dir}${report}") ) { |
| 559 | common.infoMsg("Copying ${report} to docker container") |
Dmitrii Kabanov | 23901c2 | 2017-10-20 10:25:36 -0700 | [diff] [blame] | 560 | def items = sh(script: "base64 -w0 ${output_dir}${report} > ${output_dir}${report}_encoded; " + |
| 561 | "split -b 100KB -d -a 4 ${output_dir}${report}_encoded ${output_dir}${report}__; " + |
| 562 | "rm ${output_dir}${report}_encoded; " + |
| 563 | "find ${output_dir} -type f -name ${report}__* -printf \'%f\\n\' | sort", returnStdout: true) |
| 564 | for ( item in items.tokenize() ) { |
| 565 | def content = sh(script: "cat ${output_dir}${item}", returnStdout: true) |
| 566 | salt.cmdRun(master, target, "echo \"${content}\" >> ${results}/${report}_encoded", false, null, false) |
| 567 | sh(script: "rm ${output_dir}${item}") |
Tetiana Korchak | 3383cc9 | 2017-08-25 09:36:19 -0700 | [diff] [blame] | 568 | } |
Dmitrii Kabanov | 23901c2 | 2017-10-20 10:25:36 -0700 | [diff] [blame] | 569 | salt.cmdRun(master, target, "base64 -d ${results}/${report}_encoded > ${results}/${report}; " + |
| 570 | "rm ${results}/${report}_encoded", false, null, false) |
Tetiana Korchak | 3383cc9 | 2017-08-25 09:36:19 -0700 | [diff] [blame] | 571 | } |
| 572 | } |
Tetiana Korchak | 3383cc9 | 2017-08-25 09:36:19 -0700 | [diff] [blame] | 573 | |
Dmitrii Kabanov | 23901c2 | 2017-10-20 10:25:36 -0700 | [diff] [blame] | 574 | def cmd = "jenkins_report.py --path /opt/devops-qa-tools/generate_test_report/; " + |
| 575 | "cp ${report_file} ${dest_folder}/${report_file}" |
| 576 | salt.cmdRun(master, target, "docker run -i --rm --net=host " + |
| 577 | "-v ${results}:${dest_folder} ${dockerImageLink} " + |
| 578 | "/bin/bash -c \"${cmd}\"") |
| 579 | def report_content = salt.getFileContent(master, target, "${results}/${report_file}") |
Tetiana Korchak | 3383cc9 | 2017-08-25 09:36:19 -0700 | [diff] [blame] | 580 | writeFile file: "${output_dir}${report_file}", text: report_content |
| 581 | } |
| 582 | |
| 583 | /** |
Dmitrii Kabanov | d5f1c5f | 2017-08-30 14:51:41 -0700 | [diff] [blame] | 584 | * Execute SPT tests |
| 585 | * |
| 586 | * @param target Host to run tests |
Dmitrii Kabanov | 23901c2 | 2017-10-20 10:25:36 -0700 | [diff] [blame] | 587 | * @param dockerImageLink Docker image link |
Dmitrii Kabanov | d5f1c5f | 2017-08-30 14:51:41 -0700 | [diff] [blame] | 588 | * @param output_dir Directory for results |
Dmitrii Kabanov | 23901c2 | 2017-10-20 10:25:36 -0700 | [diff] [blame] | 589 | * @param ext_variables The list of external variables |
Sergey Galkin | d1068e2 | 2018-02-13 13:59:32 +0400 | [diff] [blame] | 590 | * @param results The reports directory |
Dmitrii Kabanov | d5f1c5f | 2017-08-30 14:51:41 -0700 | [diff] [blame] | 591 | */ |
Sergey Galkin | d1068e2 | 2018-02-13 13:59:32 +0400 | [diff] [blame] | 592 | def runSptTests(master, target, dockerImageLink, output_dir, ext_variables = [], results = '/root/qa_results') { |
Dmitrii Kabanov | d5f1c5f | 2017-08-30 14:51:41 -0700 | [diff] [blame] | 593 | def salt = new com.mirantis.mk.Salt() |
Dmitrii Kabanov | 23901c2 | 2017-10-20 10:25:36 -0700 | [diff] [blame] | 594 | def dest_folder = '/home/rally/qa_results' |
| 595 | salt.runSaltProcessStep(master, target, 'file.remove', ["${results}"]) |
| 596 | salt.runSaltProcessStep(master, target, 'file.mkdir', ["${results}", "mode=777"]) |
| 597 | def nodes = getNodeList(master) |
| 598 | def nodes_hw = getNodeList(master, 'G@virtual:physical') |
| 599 | def _pillar = salt.getPillar(master, 'I@keystone:server', 'keystone:server') |
| 600 | def keystone = _pillar['return'][0].values()[0] |
| 601 | def ssh_key = salt.getFileContent(master, 'I@salt:master', '/root/.ssh/id_rsa') |
| 602 | def env_vars = ( ['tempest_version=15.0.0', |
| 603 | "OS_USERNAME=${keystone.admin_name}", |
| 604 | "OS_PASSWORD=${keystone.admin_password}", |
| 605 | "OS_TENANT_NAME=${keystone.admin_tenant}", |
| 606 | "OS_AUTH_URL=http://${keystone.bind.private_address}:${keystone.bind.private_port}/v2.0", |
| 607 | "OS_REGION_NAME=${keystone.region}", |
| 608 | 'OS_ENDPOINT_TYPE=admin'] + ext_variables ).join(' -e ') |
| 609 | salt.runSaltProcessStep(master, target, 'file.write', ["${results}/nodes.json", nodes]) |
| 610 | salt.runSaltProcessStep(master, target, 'file.write', ["${results}/nodes_hw.json", nodes_hw]) |
| 611 | def cmd = '/opt/devops-qa-tools/deployment/configure.sh; ' + |
| 612 | 'sudo mkdir -p /root/.ssh; sudo chmod 700 /root/.ssh; ' + |
| 613 | "echo \\\"${ssh_key}\\\" | sudo tee /root/.ssh/id_rsa > /dev/null; " + |
| 614 | 'sudo chmod 600 /root/.ssh/id_rsa; ' + |
| 615 | "sudo timmy -c simplified-performance-testing/config.yaml " + |
| 616 | "--nodes-json ${dest_folder}/nodes.json --log-file ${dest_folder}/docker-spt2.log; " + |
| 617 | "./simplified-performance-testing/SPT_parser.sh > ${dest_folder}/report-spt.txt; " + |
| 618 | "custom_spt_parser.sh ${dest_folder}/nodes_hw.json > ${dest_folder}/report-spt-hw.txt; " + |
| 619 | "cp /tmp/timmy/archives/general.tar.gz ${dest_folder}/results-spt.tar.gz" |
| 620 | salt.cmdRun(master, target, "docker run -i --rm --net=host -e ${env_vars} " + |
| 621 | "-v ${results}:${dest_folder} ${dockerImageLink} /bin/bash -c " + |
| 622 | "\"${cmd}\" > ${results}/docker-spt.log") |
| 623 | addFiles(master, target, results, output_dir) |
Dmitrii Kabanov | d5f1c5f | 2017-08-30 14:51:41 -0700 | [diff] [blame] | 624 | } |
| 625 | |
Dmitrii Kabanov | d5f1c5f | 2017-08-30 14:51:41 -0700 | [diff] [blame] | 626 | /** |
Oleksii Zhurba | 7b44ef1 | 2017-11-13 17:50:16 -0600 | [diff] [blame] | 627 | * Configure docker container |
| 628 | * |
| 629 | * @param target Host to run container |
| 630 | * @param proxy Proxy for accessing github and pip |
| 631 | * @param testing_tools_repo Repo with testing tools: configuration script, skip-list, etc. |
Oleksii Zhurba | 1579b97 | 2017-12-14 15:21:56 -0600 | [diff] [blame] | 632 | * @param tempest_repo Tempest repo to clone. Can be upstream tempest (default, recommended), your customized tempest in local/remote repo or path inside container. If not specified, tempest will not be configured. |
| 633 | * @param tempest_endpoint_type internalURL or adminURL or publicURL to use in tests |
Oleksii Zhurba | 198dd68 | 2018-09-07 18:16:59 -0500 | [diff] [blame] | 634 | * @param tempest_version Version of tempest to use. This value will be just passed to configure.sh script (cvp-configuration repo). |
Oleksii Zhurba | 1579b97 | 2017-12-14 15:21:56 -0600 | [diff] [blame] | 635 | * @param conf_script_path Path to configuration script. |
| 636 | * @param ext_variables Some custom extra variables to add into container |
Oleksii Zhurba | 7b44ef1 | 2017-11-13 17:50:16 -0600 | [diff] [blame] | 637 | */ |
| 638 | def configureContainer(master, target, proxy, testing_tools_repo, tempest_repo, |
Oleksii Zhurba | 198dd68 | 2018-09-07 18:16:59 -0500 | [diff] [blame] | 639 | tempest_endpoint_type="internalURL", tempest_version="", |
Oleksii Zhurba | 1579b97 | 2017-12-14 15:21:56 -0600 | [diff] [blame] | 640 | conf_script_path="", ext_variables = []) { |
Oleksii Zhurba | 7b44ef1 | 2017-11-13 17:50:16 -0600 | [diff] [blame] | 641 | def salt = new com.mirantis.mk.Salt() |
| 642 | if (testing_tools_repo != "" ) { |
Oleksii Zhurba | 0cda6e0 | 2018-06-20 14:53:19 -0500 | [diff] [blame] | 643 | if (testing_tools_repo.contains('http://') || testing_tools_repo.contains('https://')) { |
| 644 | salt.cmdRun(master, target, "docker exec cvp git clone ${testing_tools_repo} cvp-configuration") |
| 645 | configure_script = conf_script_path != "" ? conf_script_path : "cvp-configuration/configure.sh" |
| 646 | } |
| 647 | else { |
| 648 | configure_script = testing_tools_repo |
| 649 | } |
| 650 | ext_variables.addAll("PROXY=${proxy}", "TEMPEST_REPO=${tempest_repo}", |
| 651 | "TEMPEST_ENDPOINT_TYPE=${tempest_endpoint_type}", |
| 652 | "tempest_version=${tempest_version}") |
| 653 | salt.cmdRun(master, target, "docker exec -e " + ext_variables.join(' -e ') + " cvp bash -c ${configure_script}") |
Oleksii Zhurba | 7b44ef1 | 2017-11-13 17:50:16 -0600 | [diff] [blame] | 654 | } |
Oleksii Zhurba | 0cda6e0 | 2018-06-20 14:53:19 -0500 | [diff] [blame] | 655 | else { |
| 656 | common.infoMsg("TOOLS_REPO is empty, no confguration is needed for container") |
| 657 | } |
Oleksii Zhurba | 7b44ef1 | 2017-11-13 17:50:16 -0600 | [diff] [blame] | 658 | } |
| 659 | |
| 660 | /** |
| 661 | * Run Tempest |
| 662 | * |
| 663 | * @param target Host to run container |
| 664 | * @param test_pattern Test pattern to run |
| 665 | * @param skip_list Path to skip-list |
| 666 | * @param output_dir Directory on target host for storing results (containers is not a good place) |
| 667 | */ |
| 668 | def runCVPtempest(master, target, test_pattern="set=smoke", skip_list="", output_dir, output_filename="docker-tempest") { |
| 669 | def salt = new com.mirantis.mk.Salt() |
| 670 | def xml_file = "${output_filename}.xml" |
Oleksii Zhurba | 4404531 | 2017-12-12 15:38:26 -0600 | [diff] [blame] | 671 | def html_file = "${output_filename}.html" |
Oleksii Zhurba | 7b44ef1 | 2017-11-13 17:50:16 -0600 | [diff] [blame] | 672 | skip_list_cmd = '' |
| 673 | if (skip_list != '') { |
| 674 | skip_list_cmd = "--skip-list ${skip_list}" |
| 675 | } |
Oleksii Zhurba | 77896d4 | 2018-05-25 18:11:30 -0500 | [diff] [blame] | 676 | salt.cmdRun(master, target, "docker exec cvp rally verify start --pattern ${test_pattern} ${skip_list_cmd} --detailed") |
Oleksii Zhurba | 7b44ef1 | 2017-11-13 17:50:16 -0600 | [diff] [blame] | 677 | salt.cmdRun(master, target, "docker exec cvp rally verify report --type junit-xml --to /home/rally/${xml_file}") |
Oleksii Zhurba | 4404531 | 2017-12-12 15:38:26 -0600 | [diff] [blame] | 678 | salt.cmdRun(master, target, "docker exec cvp rally verify report --type html --to /home/rally/${html_file}") |
Oleksii Zhurba | 7b44ef1 | 2017-11-13 17:50:16 -0600 | [diff] [blame] | 679 | salt.cmdRun(master, target, "docker cp cvp:/home/rally/${xml_file} ${output_dir}") |
Oleksii Zhurba | 4404531 | 2017-12-12 15:38:26 -0600 | [diff] [blame] | 680 | salt.cmdRun(master, target, "docker cp cvp:/home/rally/${html_file} ${output_dir}") |
Oleksii Zhurba | 77896d4 | 2018-05-25 18:11:30 -0500 | [diff] [blame] | 681 | return salt.cmdRun(master, target, "docker exec cvp rally verify show | head -5 | tail -1 | " + |
| 682 | "awk '{print \$4}'")['return'][0].values()[0].split()[0] |
Oleksii Zhurba | 7b44ef1 | 2017-11-13 17:50:16 -0600 | [diff] [blame] | 683 | } |
| 684 | |
| 685 | /** |
| 686 | * Run Rally |
| 687 | * |
| 688 | * @param target Host to run container |
| 689 | * @param test_pattern Test pattern to run |
| 690 | * @param scenarios_path Path to Rally scenarios |
| 691 | * @param output_dir Directory on target host for storing results (containers is not a good place) |
| 692 | */ |
| 693 | def runCVPrally(master, target, scenarios_path, output_dir, output_filename="docker-rally") { |
| 694 | def salt = new com.mirantis.mk.Salt() |
| 695 | def xml_file = "${output_filename}.xml" |
Oleksii Zhurba | 7b44ef1 | 2017-11-13 17:50:16 -0600 | [diff] [blame] | 696 | def html_file = "${output_filename}.html" |
Oleksii Zhurba | 77896d4 | 2018-05-25 18:11:30 -0500 | [diff] [blame] | 697 | salt.cmdRun(master, target, "docker exec cvp rally task start ${scenarios_path}") |
Oleksii Zhurba | 7b44ef1 | 2017-11-13 17:50:16 -0600 | [diff] [blame] | 698 | salt.cmdRun(master, target, "docker exec cvp rally task report --out ${html_file}") |
Oleksii Zhurba | 1bf9be1 | 2018-01-17 15:20:00 -0600 | [diff] [blame] | 699 | salt.cmdRun(master, target, "docker exec cvp rally task report --junit --out ${xml_file}") |
Oleksii Zhurba | 7b44ef1 | 2017-11-13 17:50:16 -0600 | [diff] [blame] | 700 | salt.cmdRun(master, target, "docker cp cvp:/home/rally/${xml_file} ${output_dir}") |
| 701 | salt.cmdRun(master, target, "docker cp cvp:/home/rally/${html_file} ${output_dir}") |
| 702 | } |
| 703 | |
| 704 | |
| 705 | /** |
| 706 | * Shutdown node |
| 707 | * |
| 708 | * @param target Host to run command |
| 709 | * @param mode How to shutdown node |
| 710 | * @param retries # of retries to make to check node status |
| 711 | */ |
| 712 | def shutdown_vm_node(master, target, mode, retries=200) { |
| 713 | def salt = new com.mirantis.mk.Salt() |
| 714 | def common = new com.mirantis.mk.Common() |
| 715 | if (mode == 'reboot') { |
| 716 | try { |
| 717 | def out = salt.runSaltCommand(master, 'local', ['expression': target, 'type': 'compound'], 'cmd.run', null, ['reboot'], null, 3, 3) |
| 718 | } catch (Exception e) { |
| 719 | common.warningMsg('Timeout from minion: node must be rebooting now') |
| 720 | } |
| 721 | common.warningMsg("Checking that minion is down") |
| 722 | status = "True" |
| 723 | for (i = 0; i < retries; i++) { |
| 724 | status = salt.minionsReachable(master, 'I@salt:master', target, null, 5, 1) |
| 725 | if (status != "True") { |
| 726 | break |
| 727 | } |
| 728 | } |
| 729 | if (status == "True") { |
| 730 | throw new Exception("Tired to wait for minion ${target} to stop responding") |
| 731 | } |
| 732 | } |
| 733 | if (mode == 'hard_shutdown' || mode == 'soft_shutdown') { |
| 734 | kvm = locate_node_on_kvm(master, target) |
| 735 | if (mode == 'soft_shutdown') { |
| 736 | salt.cmdRun(master, target, "shutdown -h 0") |
| 737 | } |
| 738 | if (mode == 'hard_shutdown') { |
| 739 | salt.cmdRun(master, kvm, "virsh destroy ${target}") |
| 740 | } |
| 741 | common.warningMsg("Checking that vm on kvm is in power off state") |
| 742 | status = 'running' |
| 743 | for (i = 0; i < retries; i++) { |
| 744 | status = check_vm_status(master, target, kvm) |
| 745 | echo "Current status - ${status}" |
| 746 | if (status != 'running') { |
| 747 | break |
| 748 | } |
| 749 | sleep (1) |
| 750 | } |
| 751 | if (status == 'running') { |
| 752 | throw new Exception("Tired to wait for node ${target} to shutdown") |
| 753 | } |
| 754 | } |
| 755 | } |
| 756 | |
| 757 | |
| 758 | /** |
| 759 | * Locate kvm where target host is located |
| 760 | * |
| 761 | * @param target Host to check |
| 762 | */ |
| 763 | def locate_node_on_kvm(master, target) { |
| 764 | def salt = new com.mirantis.mk.Salt() |
| 765 | def list = salt.runSaltProcessStep(master, "I@salt:control", 'cmd.run', ["virsh list --all | grep ' ${target}'"])['return'][0] |
| 766 | for (item in list.keySet()) { |
| 767 | if (list[item]) { |
| 768 | return item |
| 769 | } |
| 770 | } |
| 771 | } |
| 772 | |
| 773 | /** |
| 774 | * Check target host status |
| 775 | * |
| 776 | * @param target Host to check |
| 777 | * @param kvm KVM node where target host is located |
| 778 | */ |
| 779 | def check_vm_status(master, target, kvm) { |
| 780 | def salt = new com.mirantis.mk.Salt() |
| 781 | def list = salt.runSaltProcessStep(master, "${kvm}", 'cmd.run', ["virsh list --all | grep ' ${target}'"])['return'][0] |
| 782 | for (item in list.keySet()) { |
| 783 | if (list[item]) { |
| 784 | return list[item].split()[2] |
| 785 | } |
| 786 | } |
| 787 | } |
| 788 | |
| 789 | /** |
| 790 | * Find vip on nodes |
| 791 | * |
| 792 | * @param target Pattern, e.g. ctl* |
| 793 | */ |
| 794 | def get_vip_node(master, target) { |
| 795 | def salt = new com.mirantis.mk.Salt() |
Oleksii Zhurba | 5f73cf6 | 2018-08-03 16:11:10 -0500 | [diff] [blame] | 796 | def list = salt.runSaltProcessStep(master, "${target}", 'cmd.run', ["ip a | grep '/32'"])['return'][0] |
Oleksii Zhurba | 7b44ef1 | 2017-11-13 17:50:16 -0600 | [diff] [blame] | 797 | for (item in list.keySet()) { |
| 798 | if (list[item]) { |
| 799 | return item |
| 800 | } |
| 801 | } |
| 802 | } |
| 803 | |
| 804 | /** |
| 805 | * Find vip on nodes |
| 806 | * |
| 807 | * @param target Host with cvp container |
| 808 | */ |
Oleksii Zhurba | 5250a9c | 2018-03-21 15:47:03 -0500 | [diff] [blame] | 809 | def openstack_cleanup(master, target, script_path="/home/rally/cvp-configuration/cleanup.sh") { |
Oleksii Zhurba | 7b44ef1 | 2017-11-13 17:50:16 -0600 | [diff] [blame] | 810 | def salt = new com.mirantis.mk.Salt() |
| 811 | salt.runSaltProcessStep(master, "${target}", 'cmd.run', ["docker exec cvp bash -c ${script_path}"]) |
| 812 | } |
| 813 | |
| 814 | |
| 815 | /** |
Petr Lomakin | 47fee0a | 2017-08-01 10:46:05 -0700 | [diff] [blame] | 816 | * Cleanup |
| 817 | * |
| 818 | * @param target Host to run commands |
Oleksii Zhurba | 1f4a6ff | 2018-06-27 16:45:17 -0500 | [diff] [blame] | 819 | * @param name Name of container to remove |
Petr Lomakin | 47fee0a | 2017-08-01 10:46:05 -0700 | [diff] [blame] | 820 | */ |
Oleksii Zhurba | 1f4a6ff | 2018-06-27 16:45:17 -0500 | [diff] [blame] | 821 | def runCleanup(master, target, name='cvp') { |
Petr Lomakin | 47fee0a | 2017-08-01 10:46:05 -0700 | [diff] [blame] | 822 | def salt = new com.mirantis.mk.Salt() |
Oleksii Zhurba | 1f4a6ff | 2018-06-27 16:45:17 -0500 | [diff] [blame] | 823 | if ( salt.cmdRun(master, target, "docker ps -f name=${name} -q", false, null, false)['return'][0].values()[0] ) { |
| 824 | salt.cmdRun(master, target, "docker rm -f ${name}") |
Oleksii Zhurba | 7b44ef1 | 2017-11-13 17:50:16 -0600 | [diff] [blame] | 825 | } |
Petr Lomakin | 47fee0a | 2017-08-01 10:46:05 -0700 | [diff] [blame] | 826 | } |
Oleksii Zhurba | bcb97e2 | 2017-10-05 14:10:39 -0500 | [diff] [blame] | 827 | /** |
| 828 | * Prepare venv for any python project |
| 829 | * Note: <repo_name>\/requirements.txt content will be used |
| 830 | * for this venv |
| 831 | * |
| 832 | * @param repo_url Repository url to clone |
| 833 | * @param proxy Proxy address to use |
| 834 | */ |
dtsapikov | f2e1bb1 | 2018-11-29 18:49:48 +0400 | [diff] [blame] | 835 | def prepareVenv(repo_url, proxy, useSystemPackages=false) { |
Oleksii Zhurba | bcb97e2 | 2017-10-05 14:10:39 -0500 | [diff] [blame] | 836 | def python = new com.mirantis.mk.Python() |
| 837 | repo_name = "${repo_url}".tokenize("/").last() |
Oleksii Zhurba | e711ebb | 2018-06-15 16:36:38 -0500 | [diff] [blame] | 838 | if (repo_url.tokenize().size() > 1){ |
| 839 | if (repo_url.tokenize()[1] == '-b'){ |
| 840 | repo_name = repo_url.tokenize()[0].tokenize("/").last() |
| 841 | } |
| 842 | } |
Oleksii Zhurba | 83e3e5c | 2018-06-27 16:59:29 -0500 | [diff] [blame] | 843 | path_venv = "${env.WORKSPACE}/venv" |
| 844 | path_req = "${env.WORKSPACE}/${repo_name}/requirements.txt" |
Oleksii Zhurba | bcb97e2 | 2017-10-05 14:10:39 -0500 | [diff] [blame] | 845 | sh "rm -rf ${repo_name}" |
Oleksii Zhurba | 83e3e5c | 2018-06-27 16:59:29 -0500 | [diff] [blame] | 846 | // this is temporary W/A for offline deployments |
| 847 | // Jenkins slave image has /opt/pip-mirror/ folder |
| 848 | // where pip wheels for cvp projects are located |
| 849 | if (proxy != 'offline') { |
| 850 | withEnv(["HTTPS_PROXY=${proxy}", "HTTP_PROXY=${proxy}", "https_proxy=${proxy}", "http_proxy=${proxy}"]) { |
| 851 | sh "git clone ${repo_url}" |
dtsapikov | f2e1bb1 | 2018-11-29 18:49:48 +0400 | [diff] [blame] | 852 | python.setupVirtualenv(path_venv, "python2", [], path_req, true, useSystemPackages) |
Oleksii Zhurba | 83e3e5c | 2018-06-27 16:59:29 -0500 | [diff] [blame] | 853 | } |
| 854 | } |
| 855 | else { |
Oleksii Zhurba | bcb97e2 | 2017-10-05 14:10:39 -0500 | [diff] [blame] | 856 | sh "git clone ${repo_url}" |
Oleksii Zhurba | 83e3e5c | 2018-06-27 16:59:29 -0500 | [diff] [blame] | 857 | sh "virtualenv ${path_venv} --python python2" |
| 858 | python.runVirtualenvCommand(path_venv, "pip install --no-index --find-links=/opt/pip-mirror/ -r ${path_req}", true) |
Oleksii Zhurba | bcb97e2 | 2017-10-05 14:10:39 -0500 | [diff] [blame] | 859 | } |
| 860 | } |
| 861 | |
Petr Lomakin | 47fee0a | 2017-08-01 10:46:05 -0700 | [diff] [blame] | 862 | /** Install docker if needed |
| 863 | * |
| 864 | * @param target Target node to install docker pkg |
| 865 | */ |
| 866 | def installDocker(master, target) { |
| 867 | def salt = new com.mirantis.mk.Salt() |
| 868 | if ( ! salt.runSaltProcessStep(master, target, 'pkg.version', ["docker-engine"]) ) { |
| 869 | salt.runSaltProcessStep(master, target, 'pkg.install', ["docker.io"]) |
| 870 | } |
| 871 | } |