blob: 00ca70378cdd4347862f7c7753679a55b43eec63 [file] [log] [blame]
/**
*
* Launch heat stack with basic k8s
* Flow parameters:
* STACK_NAME Heat stack name
* STACK_TYPE Orchestration engine: heat, ''
* STACK_INSTALL What should be installed (k8s, openstack, ...)
* STACK_TEST What should be tested (k8s, openstack, ...)
*
* STACK_TEMPLATE_URL URL to git repo with stack templates
* STACK_TEMPLATE_BRANCH Stack templates repo branch
* STACK_TEMPLATE_CREDENTIALS Credentials to the stack templates repo
* STACK_TEMPLATE Heat stack HOT template
* STACK_DELETE Delete stack when finished (bool)
* STACK_REUSE Reuse stack (don't create one)
* STACK_CLEANUP_JOB Name of job for deleting Heat stack
*
* Expected parameters:
* required for STACK_TYPE=heat
* HEAT_STACK_ENVIRONMENT Heat stack environmental parameters
* HEAT_STACK_ZONE Heat stack availability zone
* HEAT_STACK_PUBLIC_NET Heat stack floating IP pool
* OPENSTACK_API_URL OpenStack API address
* OPENSTACK_API_CREDENTIALS Credentials to the OpenStack API
* OPENSTACK_API_PROJECT OpenStack project to connect to
* OPENSTACK_API_PROJECT_DOMAIN Domain for OpenStack project
* OPENSTACK_API_PROJECT_ID ID for OpenStack project
* OPENSTACK_API_USER_DOMAIN Domain for OpenStack user
* OPENSTACK_API_CLIENT Versions of OpenStack python clients
* OPENSTACK_API_VERSION Version of the OpenStack API (2/3)
*
* SALT_MASTER_CREDENTIALS Credentials to the Salt API
*
* required for STACK_TYPE=NONE or empty string
* SALT_MASTER_URL URL of Salt-API
* K8S_API_SERVER Kubernetes API address
* K8S_CONFORMANCE_IMAGE Path to docker image with conformance e2e tests
*
* TEMPEST_IMAGE_LINK Tempest image link
*
* optional parameters for overwriting soft params
* KUBERNETES_HYPERKUBE_IMAGE Docker repository and tag for hyperkube image
* CALICO_CNI_IMAGE Docker repository and tag for calico CNI image
* CALICO_NODE_IMAGE Docker repository and tag for calico node image
* CALICOCTL_IMAGE Docker repository and tag for calicoctl image
* MTU MTU for Calico
* NETCHECKER_AGENT_IMAGE Docker repository and tag for netchecker agent image
* NETCHECKER_SERVER_IMAGE Docker repository and tag for netchecker server image
*
*/
common = new com.mirantis.mk.Common()
git = new com.mirantis.mk.Git()
openstack = new com.mirantis.mk.Openstack()
orchestrate = new com.mirantis.mk.Orchestrate()
salt = new com.mirantis.mk.Salt()
test = new com.mirantis.mk.Test()
_MAX_PERMITTED_STACKS = 2
timestamps {
node {
// try to get STACK_INSTALL or fallback to INSTALL if exists
try {
def temporary = STACK_INSTALL
} catch (MissingPropertyException e) {
try {
STACK_INSTALL = INSTALL
env['STACK_INSTALL'] = INSTALL
} catch (MissingPropertyException e2) {
common.errorMsg("Property STACK_INSTALL or INSTALL not found!")
}
}
try {
//
// Prepare machines
//
stage ('Create infrastructure') {
if (STACK_TYPE == 'heat') {
// value defaults
def openstackCloud
def openstackVersion = OPENSTACK_API_CLIENT ? OPENSTACK_API_CLIENT : 'liberty'
def openstackEnv = "${env.WORKSPACE}/venv"
if (STACK_REUSE.toBoolean() == true && STACK_NAME == '') {
error("If you want to reuse existing stack you need to provide it's name")
}
if (STACK_REUSE.toBoolean() == false) {
// Don't allow to set custom heat stack name
wrap([$class: 'BuildUser']) {
if (env.BUILD_USER_ID) {
STACK_NAME = "${env.BUILD_USER_ID}-${JOB_NAME}-${BUILD_NUMBER}"
} else {
STACK_NAME = "jenkins-${JOB_NAME}-${BUILD_NUMBER}"
}
currentBuild.description = STACK_NAME
}
}
// set description
currentBuild.description = "${STACK_NAME}"
// get templates
git.checkoutGitRepository('template', STACK_TEMPLATE_URL, STACK_TEMPLATE_BRANCH, STACK_TEMPLATE_CREDENTIALS)
// create openstack env
openstack.setupOpenstackVirtualenv(openstackEnv, openstackVersion)
openstackCloud = openstack.createOpenstackEnv(
OPENSTACK_API_URL, OPENSTACK_API_CREDENTIALS,
OPENSTACK_API_PROJECT, OPENSTACK_API_PROJECT_DOMAIN,
OPENSTACK_API_PROJECT_ID, OPENSTACK_API_USER_DOMAIN,
OPENSTACK_API_VERSION)
openstack.getKeystoneToken(openstackCloud, openstackEnv)
//
// Verify possibility of create stack for given user and stack type
//
wrap([$class: 'BuildUser']) {
if (env.BUILD_USER_ID && !env.BUILD_USER_ID.equals("jenkins") && !env.BUILD_USER_ID.equals("mceloud") && !STACK_REUSE.toBoolean()) {
def existingStacks = openstack.getStacksForNameContains(openstackCloud, "${env.BUILD_USER_ID}-${JOB_NAME}", openstackEnv)
if(existingStacks.size() >= _MAX_PERMITTED_STACKS){
STACK_DELETE = "false"
throw new Exception("You cannot create new stack, you already have ${_MAX_PERMITTED_STACKS} stacks of this type (${JOB_NAME}). \nStack names: ${existingStacks}")
}
}
}
// launch stack
if (STACK_REUSE.toBoolean() == false) {
stage('Launch new Heat stack') {
// create stack
envParams = [
'instance_zone': HEAT_STACK_ZONE,
'public_net': HEAT_STACK_PUBLIC_NET
]
openstack.createHeatStack(openstackCloud, STACK_NAME, STACK_TEMPLATE, envParams, HEAT_STACK_ENVIRONMENT, openstackEnv)
}
}
// get SALT_MASTER_URL
saltMasterHost = openstack.getHeatStackOutputParam(openstackCloud, STACK_NAME, 'salt_master_ip', openstackEnv)
currentBuild.description = "${STACK_NAME}: ${saltMasterHost}"
SALT_MASTER_URL = "http://${saltMasterHost}:6969"
}
}
//
// Connect to Salt master
//
def saltMaster
stage('Connect to Salt API') {
saltMaster = salt.connection(SALT_MASTER_URL, SALT_MASTER_CREDENTIALS)
}
//
// Install
//
if (common.checkContains('STACK_INSTALL', 'core')) {
stage('Install core infrastructure') {
orchestrate.installFoundationInfra(saltMaster)
if (common.checkContains('STACK_INSTALL', 'kvm')) {
orchestrate.installInfraKvm(saltMaster)
orchestrate.installFoundationInfra(saltMaster)
}
orchestrate.validateFoundationInfra(saltMaster)
}
}
// install k8s
if (common.checkContains('STACK_INSTALL', 'k8s')) {
stage('Install Kubernetes infra') {
orchestrate.installKubernetesInfra(saltMaster)
}
stage('Install Kubernetes control') {
// Overwrite Kubernetes vars if specified
if (env.getEnvironment().containsKey('KUBERNETES_HYPERKUBE_IMAGE')) {
salt.runSaltProcessStep(saltMaster, 'I@salt:master', 'reclass.cluster_meta_set', 'kubernetes_hyperkube_image', KUBERNETES_HYPERKUBE_IMAGE)
}
if (env.getEnvironment().containsKey('MTU')) {
salt.runSaltProcessStep(saltMaster, 'I@salt:master', 'reclass.cluster_meta_set', 'kubernetes_mtu', MTU)
}
// Overwrite Calico vars if specified
if (env.getEnvironment().containsKey('CALICO_CNI_IMAGE')) {
salt.runSaltProcessStep(saltMaster, 'I@salt:master', 'reclass.cluster_meta_set', 'kubernetes_calico_cni_image', CALICO_CNI_IMAGE)
}
if (env.getEnvironment().containsKey('CALICO_NODE_IMAGE')) {
salt.runSaltProcessStep(saltMaster, 'I@salt:master', 'reclass.cluster_meta_set', 'kubernetes_calico_image', CALICO_NODE_IMAGE)
}
if (env.getEnvironment().containsKey('CALICOCTL_IMAGE')) {
salt.runSaltProcessStep(saltMaster, 'I@salt:master', 'reclass.cluster_meta_set', 'kubernetes_calicoctl_image', CALICOCTL_IMAGE)
}
// Overwrite netchecker vars if specified
if (env.getEnvironment().containsKey('NETCHECKER_AGENT_IMAGE')) {
salt.runSaltProcessStep(saltMaster, 'I@salt:master', 'reclass.cluster_meta_set', 'kubernetes_netchecker_agent_image', NETCHECKER_AGENT_IMAGE)
}
if (env.getEnvironment().containsKey('NETCHECKER_SERVER_IMAGE')) {
salt.runSaltProcessStep(saltMaster, 'I@salt:master', 'reclass.cluster_meta_set', 'kubernetes_netchecker_server_image', NETCHECKER_SERVER_IMAGE)
}
orchestrate.installKubernetesControl(saltMaster)
}
if (common.checkContains('STACK_INSTALL', 'contrail')) {
state('Install Contrail for Kubernetes') {
orchestrate.installContrailNetwork(saltMaster)
orchestrate.installContrailCompute(saltMaster)
}
}
}
// install openstack
if (common.checkContains('STACK_INSTALL', 'openstack')) {
// install Infra and control, tests, ...
stage('Install OpenStack infra') {
orchestrate.installOpenstackInfra(saltMaster)
}
stage('Install OpenStack control') {
orchestrate.installOpenstackControl(saltMaster)
}
stage('Install OpenStack network') {
if (common.checkContains('STACK_INSTALL', 'contrail')) {
orchestrate.installContrailNetwork(saltMaster)
} else if (common.checkContains('STACK_INSTALL', 'ovs')) {
orchestrate.installOpenstackNetwork(saltMaster)
}
salt.runSaltProcessStep(saltMaster, 'I@keystone:server', 'cmd.run', ['. /root/keystonerc; neutron net-list'])
salt.runSaltProcessStep(saltMaster, 'I@keystone:server', 'cmd.run', ['. /root/keystonerc; nova net-list'])
}
stage('Install OpenStack compute') {
orchestrate.installOpenstackCompute(saltMaster)
if (common.checkContains('STACK_INSTALL', 'contrail')) {
orchestrate.installContrailCompute(saltMaster)
}
}
}
if (common.checkContains('STACK_INSTALL', 'stacklight')) {
stage('Install StackLight') {
orchestrate.installStacklightControl(saltMaster)
orchestrate.installStacklightClient(saltMaster)
}
}
//
// Test
//
def artifacts_dir = '_artifacts/'
if (common.checkContains('STACK_TEST', 'k8s')) {
stage('Run k8s bootstrap tests') {
def image = 'tomkukral/k8s-scripts'
def output_file = image.replaceAll('/', '-') + '.output'
// run image
test.runConformanceTests(saltMaster, K8S_API_SERVER, image)
// collect output
sh "mkdir -p ${artifacts_dir}"
file_content = salt.getFileContent(saltMaster, 'ctl01*', '/tmp/' + output_file)
writeFile file: "${artifacts_dir}${output_file}", text: file_content
sh "cat ${artifacts_dir}${output_file}"
// collect artifacts
archiveArtifacts artifacts: "${artifacts_dir}${output_file}"
}
stage('Run k8s conformance e2e tests') {
//test.runConformanceTests(saltMaster, K8S_API_SERVER, K8S_CONFORMANCE_IMAGE)
def image = K8S_CONFORMANCE_IMAGE
def output_file = image.replaceAll('/', '-') + '.output'
// run image
test.runConformanceTests(saltMaster, K8S_API_SERVER, image)
// collect output
sh "mkdir -p ${artifacts_dir}"
file_content = salt.getFileContent(saltMaster, 'ctl01*', '/tmp/' + output_file)
writeFile file: "${artifacts_dir}${output_file}", text: file_content
sh "cat ${artifacts_dir}${output_file}"
// collect artifacts
archiveArtifacts artifacts: "${artifacts_dir}${output_file}"
}
}
if (common.checkContains('STACK_TEST', 'openstack')) {
stage('Run OpenStack tests') {
test.runTempestTests(saltMaster, TEMPEST_IMAGE_LINK)
}
stage('Copy Tempest results to config node') {
test.copyTempestResults(saltMaster)
}
}
stage('Finalize') {
if (STACK_INSTALL != '') {
try {
salt.runSaltProcessStep(saltMaster, '*', 'state.apply', [], null, true)
} catch (Exception e) {
common.warningMsg('State apply failed but we should continue to run')
throw e
}
}
}
} catch (Throwable e) {
currentBuild.result = 'FAILURE'
throw e
} finally {
//
// Clean
//
if (STACK_TYPE == 'heat') {
// send notification
common.sendNotification(currentBuild.result, STACK_NAME, ["slack"])
if (STACK_DELETE.toBoolean() == true) {
common.errorMsg('Heat job cleanup triggered')
stage('Trigger cleanup job') {
build(job: STACK_CLEANUP_JOB, parameters: [
[$class: 'StringParameterValue', name: 'STACK_NAME', value: STACK_NAME],
[$class: 'StringParameterValue', name: 'STACK_TYPE', value: STACK_TYPE],
[$class: 'StringParameterValue', name: 'OPENSTACK_API_URL', value: OPENSTACK_API_URL],
[$class: 'StringParameterValue', name: 'OPENSTACK_API_CREDENTIALS', value: OPENSTACK_API_CREDENTIALS],
[$class: 'StringParameterValue', name: 'OPENSTACK_API_PROJECT', value: OPENSTACK_API_PROJECT],
[$class: 'StringParameterValue', name: 'OPENSTACK_API_PROJECT_DOMAIN', value: OPENSTACK_API_PROJECT_DOMAIN],
[$class: 'StringParameterValue', name: 'OPENSTACK_API_PROJECT_ID', value: OPENSTACK_API_PROJECT_ID],
[$class: 'StringParameterValue', name: 'OPENSTACK_API_USER_DOMAIN', value: OPENSTACK_API_USER_DOMAIN],
[$class: 'StringParameterValue', name: 'OPENSTACK_API_CLIENT', value: OPENSTACK_API_CLIENT],
[$class: 'StringParameterValue', name: 'OPENSTACK_API_VERSION', value: OPENSTACK_API_VERSION]
])
}
} else {
if (currentBuild.result == 'FAILURE') {
common.errorMsg("Deploy job FAILED and was not deleted. Please fix the problem and delete stack on you own.")
if (SALT_MASTER_URL) {
common.errorMsg("Salt master URL: ${SALT_MASTER_URL}")
}
}
}
}
}
}
}