blob: 224040f69f7901af5825630b3e06082881fd10c0 [file] [log] [blame]
/**
* Update kuberentes cluster
*
* Expected parameters:
* SALT_MASTER_CREDENTIALS Credentials to the Salt API.
* SALT_MASTER_URL Full Salt API address [https://10.10.10.1:8000].
* KUBERNETES_HYPERKUBE_SOURCE Versioned hyperkube binary to update control plane from. Should be null if update rolling via reclass-system level
* KUBERNETES_HYPERKUBE_SOURCE_HASH Versioned hyperkube binary to update control plane from. Should be null if update rolling via reclass-system level
* KUBERNETES_PAUSE_IMAGE Kubernetes pause image should have same version as hyperkube. May be null in case of reclass-system rollout
* TARGET_UPDATES Comma separated list of nodes to update (Valid values are ctl,cmp)
* CTL_TARGET Salt targeted kubernetes CTL nodes (ex. I@kubernetes:master). Kubernetes control plane
* CMP_TARGET Salt targeted compute nodes (ex. cmp* and 'I@kubernetes:pool') Kubernetes computes
* PER_NODE Target nodes will be managed one by one (bool)
* SIMPLE_UPGRADE Use previous version of upgrade without conron/drain abilities
* CONFORMANCE_RUN_AFTER Run Kubernetes conformance tests after update
* CONFORMANCE_RUN_BEFORE Run Kubernetes conformance tests before update
* TEST_K8S_API_SERVER Kubernetes API server address for test execution
* ARTIFACTORY_URL Artifactory URL where docker images located. Needed to correctly fetch conformance images.
* UPGRADE_CALICO_V2_TO_V3 Perform Calico upgrade from v2 to v3.
* KUBERNETES_CALICO_IMAGE Target calico/node image. May be null in case of reclass-system rollout.
* KUBERNETES_CALICO_CALICOCTL_SOURCE Versioned calico/ctl binary. Should be null if update rolling via reclass-system level
* KUBERNETES_CALICO_CALICOCTL_SOURCE_HASH Calico/ctl binary md5 hash. Should be null if update rolling via reclass-system level
* KUBERNETES_CALICO_CNI_SOURCE Versioned calico/cni binary. Should be null if update rolling via reclass-system level
* KUBERNETES_CALICO_CNI_SOURCE_HASH Сalico/cni binary hash. Should be null if update rolling via reclass-system level
* KUBERNETES_CALICO_BIRDCL_SOURCE Versioned calico/bird binary. Should be null if update rolling via reclass-system level
* KUBERNETES_CALICO_BIRDCL_SOURCE_HASH Сalico/bird binary hash. Should be null if update rolling via reclass-system level
* KUBERNETES_CALICO_CNI_IPAM_SOURCE Versioned calico/ipam binary. Should be null if update rolling via reclass-system level
* KUBERNETES_CALICO_CNI_IPAM_SOURCE_HASH Сalico/ipam binary hash. Should be null if update rolling via reclass-system level
* KUBERNETES_CALICO_KUBE_CONTROLLERS_IMAGE Target calico/kube-controllers image. May be null in case of reclass-system rollout.
* CALICO_UPGRADE_VERSION Version of "calico-upgrade" utility to be used ("v1.0.5" for Calico v3.1.3 target).
* KUBERNETES_ETCD_SOURCE Target etcd binary. May be null in case of reclass-system rollout.
* KUBERNETES_ETCD_SOURCE_HASH Target etcd binary checksum. May be null in case of reclass-system rollout.
*
**/
import groovy.json.JsonSlurper
def common = new com.mirantis.mk.Common()
def salt = new com.mirantis.mk.Salt()
def python = new com.mirantis.mk.Python()
def test = new com.mirantis.mk.Test()
def updates = TARGET_UPDATES.tokenize(",").collect{it -> it.trim()}
def pepperEnv = "pepperEnv"
def POOL = "I@kubernetes:pool"
ETCD_ENDPOINTS = ""
def overrideKubernetesImage(pepperEnv) {
def salt = new com.mirantis.mk.Salt()
def k8sSaltOverrides = """
kubernetes_hyperkube_source: ${KUBERNETES_HYPERKUBE_SOURCE}
kubernetes_hyperkube_source_hash: ${KUBERNETES_HYPERKUBE_SOURCE_HASH}
kubernetes_pause_image: ${KUBERNETES_PAUSE_IMAGE}
"""
stage("Override kubernetes images to target version") {
salt.setSaltOverrides(pepperEnv, k8sSaltOverrides)
}
}
def overrideCalicoImages(pepperEnv) {
def salt = new com.mirantis.mk.Salt()
def calicoSaltOverrides = """
kubernetes_calico_image: ${KUBERNETES_CALICO_IMAGE}
kubernetes_calico_calicoctl_source: ${KUBERNETES_CALICO_CALICOCTL_SOURCE}
kubernetes_calico_calicoctl_source_hash: ${KUBERNETES_CALICO_CALICOCTL_SOURCE_HASH}
kubernetes_calico_birdcl_source: ${KUBERNETES_CALICO_BIRDCL_SOURCE}
kubernetes_calico_birdcl_source_hash: ${KUBERNETES_CALICO_BIRDCL_SOURCE_HASH}
kubernetes_calico_cni_source: ${KUBERNETES_CALICO_CNI_SOURCE}
kubernetes_calico_cni_source_hash: ${KUBERNETES_CALICO_CNI_SOURCE_HASH}
kubernetes_calico_cni_ipam_source: ${KUBERNETES_CALICO_CNI_IPAM_SOURCE}
kubernetes_calico_cni_ipam_source_hash: ${KUBERNETES_CALICO_CNI_IPAM_SOURCE_HASH}
kubernetes_calico_kube_controllers_image: ${KUBERNETES_CALICO_KUBE_CONTROLLERS_IMAGE}
"""
stage("Override calico images to target version") {
salt.setSaltOverrides(pepperEnv, calicoSaltOverrides)
}
}
def downloadCalicoUpgrader(pepperEnv, target) {
def salt = new com.mirantis.mk.Salt()
stage("Downloading calico-upgrade utility") {
salt.cmdRun(pepperEnv, target, "rm -f ./calico-upgrade")
salt.cmdRun(pepperEnv, target, "wget https://github.com/projectcalico/calico-upgrade/releases/download/${CALICO_UPGRADE_VERSION}/calico-upgrade")
salt.cmdRun(pepperEnv, target, "chmod +x ./calico-upgrade")
}
}
def overrideEtcdSource(pepperEnv) {
def salt = new com.mirantis.mk.Salt()
def k8sSaltOverrides = """
kubernetes_etcd_source: ${KUBERNETES_ETCD_SOURCE}
kubernetes_etcd_source_hash: ${KUBERNETES_ETCD_SOURCE_HASH}
"""
stage("Override etcd binaries to target version") {
salt.setSaltOverrides(pepperEnv, k8sSaltOverrides)
}
}
def performEtcdUpdateAndServicesRestart(pepperEnv, target) {
def salt = new com.mirantis.mk.Salt()
stage("Performing etcd update and services restart on ${target}") {
salt.enforceState(pepperEnv, target, "etcd.server.service")
salt.cmdRun(pepperEnv, target, ". /var/lib/etcd/configenv && etcdctl cluster-health")
}
}
def performKubernetesComputeUpdate(pepperEnv, target) {
def salt = new com.mirantis.mk.Salt()
stage("Execute Kubernetes compute update on ${target}") {
salt.enforceState(pepperEnv, target, 'kubernetes.pool')
salt.runSaltProcessStep(pepperEnv, target, 'service.restart', ['kubelet'])
}
}
def performKubernetesControlUpdate(pepperEnv, target) {
def salt = new com.mirantis.mk.Salt()
stage("Execute Kubernetes control plane update on ${target}") {
salt.enforceStateWithExclude(pepperEnv, target, "kubernetes", "kubernetes.master.setup,kubernetes.master.kube-addons")
// Restart kubelet
salt.runSaltProcessStep(pepperEnv, target, 'service.restart', ['kubelet'])
}
}
def startCalicoUpgrade(pepperEnv, target) {
def salt = new com.mirantis.mk.Salt()
stage("Starting upgrade using calico-upgrade: migrate etcd schema and lock Calico") {
def cmd = "export APIV1_ETCD_ENDPOINTS=${ETCD_ENDPOINTS} && " +
"export APIV1_ETCD_CA_CERT_FILE=/var/lib/etcd/ca.pem && " +
"export APIV1_ETCD_CERT_FILE=/var/lib/etcd/etcd-client.crt && " +
"export APIV1_ETCD_KEY_FILE=/var/lib/etcd/etcd-client.key && " +
"export ETCD_ENDPOINTS=${ETCD_ENDPOINTS} && " +
"export ETCD_CA_CERT_FILE=/var/lib/etcd/ca.pem && " +
"export ETCD_CERT_FILE=/var/lib/etcd/etcd-client.crt && " +
"export ETCD_KEY_FILE=/var/lib/etcd/etcd-client.key && " +
"rm /root/upg_complete -f && " +
"./calico-upgrade start --no-prompts --ignore-v3-data > upgrade-start.log && " +
"until [ -f /root/upg_complete ]; do sleep 0.1; done && " +
"./calico-upgrade complete --no-prompts > upgrade-complete.log && " +
"rm /root/upg_complete -f"
// "saltArgs = ['async']" doesn't work, so we have to run "cmd.run --async"
salt.cmdRun(pepperEnv, "I@salt:master", "salt -C '${target}' cmd.run '${cmd}' --async")
salt.cmdRun(pepperEnv, target, "until [ -f /root/upgrade-start.log ]; do sleep 0.1; done")
}
}
def completeCalicoUpgrade(pepperEnv, target) {
def salt = new com.mirantis.mk.Salt()
stage("Complete upgrade using calico-upgrade: unlock Calico") {
salt.cmdRun(pepperEnv, target, "echo 'true' > /root/upg_complete")
salt.cmdRun(pepperEnv, target, "while [ -f /root/upg_complete ]; do sleep 0.1; done")
salt.cmdRun(pepperEnv, target, "cat /root/upgrade-start.log")
salt.cmdRun(pepperEnv, target, "cat /root/upgrade-complete.log")
}
}
def performCalicoConfigurationUpdateAndServicesRestart(pepperEnv, target, ctl_node) {
def salt = new com.mirantis.mk.Salt()
stage("Performing Calico configuration update and services restart") {
if (containerDenabled(pepperEnv, ctl_node)) {
salt.enforceState(pepperEnv, target, "kubernetes.pool")
} else {
salt.enforceState(pepperEnv, target, "kubernetes.pool.calico")
}
salt.runSaltProcessStep(pepperEnv, target, 'service.restart', ['kubelet'])
}
}
def cordonNode(pepperEnv, target) {
def salt = new com.mirantis.mk.Salt()
def originalTarget = "I@kubernetes:master and not ${target}"
stage("Cordoning ${target} kubernetes node") {
def nodeShortName = target.tokenize(".")[0]
salt.cmdRun(pepperEnv, originalTarget, "kubectl cordon ${nodeShortName}", true, 1)
}
}
def uncordonNode(pepperEnv, target) {
def salt = new com.mirantis.mk.Salt()
def originalTarget = "I@kubernetes:master and not ${target}"
stage("Uncordoning ${target} kubernetes node") {
def nodeShortName = target.tokenize(".")[0]
salt.cmdRun(pepperEnv, originalTarget, "kubectl uncordon ${nodeShortName}", true, 1)
}
}
def drainNode(pepperEnv, target) {
def salt = new com.mirantis.mk.Salt()
def originalTarget = "I@kubernetes:master and not ${target}"
stage("Draining ${target} kubernetes node") {
def nodeShortName = target.tokenize(".")[0]
salt.cmdRun(pepperEnv, originalTarget, "kubectl drain --force --ignore-daemonsets --grace-period 100 --timeout 300s --delete-local-data ${nodeShortName}", true, 1)
}
}
def regenerateCerts(pepperEnv, target) {
def salt = new com.mirantis.mk.Salt()
stage("Regenerate certs for ${target}") {
salt.enforceState(pepperEnv, target, 'salt.minion.cert')
}
}
def updateAddons(pepperEnv, target) {
def salt = new com.mirantis.mk.Salt()
stage("Upgrading Addons at ${target}") {
salt.enforceState(pepperEnv, target, "kubernetes.master.kube-addons")
}
}
def updateAddonManager(pepperEnv, target) {
def salt = new com.mirantis.mk.Salt()
stage("Upgrading AddonManager at ${target}") {
salt.enforceState(pepperEnv, target, "kubernetes.master.setup")
}
}
def buildDaemonsetMap(pepperEnv, target) {
def salt = new com.mirantis.mk.Salt()
def daemonset_lists
daemonset_lists = salt.cmdRun(pepperEnv, target, "kubectl get ds --all-namespaces | tail -n+2 | awk '{print \$2, \$1}'"
)['return'][0].values()[0].replaceAll('Salt command execution success','').tokenize("\n")
def daemonset_map = []
for (ds in daemonset_lists) {
a = ds.tokenize(" ")
daemonset_map << a
}
print("Built daemonset map")
print(daemonset_map)
return daemonset_map
}
def purgeDaemonsetPods(pepperEnv, target, daemonSetMap) {
def salt = new com.mirantis.mk.Salt()
def originalTarget = "I@kubernetes:master and not ${target}"
def nodeShortName = target.tokenize(".")[0]
firstTarget = salt.getFirstMinion(pepperEnv, originalTarget)
if (daemonSetMap) {
stage("Purging daemonset-managed pods on ${target}") {
for (ds in daemonSetMap) {
print("Purging "+ ds[0] +" inside "+ ds[1] +" namespace")
salt.cmdRun(pepperEnv, firstTarget, "kubectl get po -n ${ds[1]} -o wide | grep ${nodeShortName}" +
" | grep ${ds[0]} | awk '{print \$1}' | xargs --no-run-if-empty kubectl delete po -n ${ds[1]} --grace-period=0 --force")
}
}
}
}
def isNodeReady(pepperEnv, target) {
def salt = new com.mirantis.mk.Salt()
def originalTarget = "I@kubernetes:master and not ${target}"
def nodeShortName = target.tokenize(".")[0]
firstTarget = salt.getFirstMinion(pepperEnv, originalTarget)
status = salt.cmdRun(pepperEnv, firstTarget, "kubectl get no ${nodeShortName} | tail -n+2 | awk '{print \$2}'"
)['return'][0].values()[0].replaceAll('Salt command execution success',''
).replaceAll(',SchedulingDisabled','').trim()
if (status == "Ready") {
return true
} else {
return false
}
}
def rebootKubernetesNode(pepperEnv, target, times=15, delay=10) {
def common = new com.mirantis.mk.Common()
def debian = new com.mirantis.mk.Debian()
stage("Rebooting ${target}") {
debian.osReboot(pepperEnv, target)
/*
* Kubernetes controller manager will mark kubernetes node as NotReady
* only after 40 seconds of it's downtime.
* Let's wait for 60 sec to be sure that node will reach it's
* correct status.
*/
sleep(60)
common.retry(times, delay) {
if(!isNodeReady(pepperEnv, target)) {
error("Node still not in Ready state...")
}
}
}
}
def upgradeDocker(pepperEnv, target) {
def salt = new com.mirantis.mk.Salt()
stage("Upgrading docker at ${target}") {
salt.enforceState(pepperEnv, target, 'docker.host')
}
}
def runConformance(pepperEnv, target, k8s_api, image) {
def salt = new com.mirantis.mk.Salt()
def containerName = 'conformance_tests'
output_file = image.replaceAll('/', '-') + '.output'
def output_file_full_path = "/tmp/" + image.replaceAll('/', '-') + '.output'
def artifacts_dir = '_artifacts/'
salt.cmdRun(pepperEnv, target, "docker rm -f ${containerName}", false)
salt.cmdRun(pepperEnv, target, "docker run -d --name ${containerName} --net=host -e API_SERVER=${k8s_api} ${image}")
sleep(10)
print("Waiting for tests to run...")
salt.runSaltProcessStep(pepperEnv, target, 'cmd.run', ["docker wait ${containerName}"], null, false)
print("Writing test results to output file...")
salt.runSaltProcessStep(pepperEnv, target, 'cmd.run', ["docker logs -t ${containerName} > ${output_file_full_path}"])
print("Conformance test output saved in " + output_file_full_path)
// collect output
sh "mkdir -p ${artifacts_dir}"
file_content = salt.getFileContent(pepperEnv, target, '/tmp/' + output_file)
writeFile file: "${artifacts_dir}${output_file}", text: file_content
sh "cat ${artifacts_dir}${output_file}"
try {
sh "cat ${artifacts_dir}${output_file} | grep 'Test Suite Failed' && exit 1 || exit 0"
} catch (Throwable e) {
print("Conformance tests failed. Please check output")
currentBuild.result = "FAILURE"
currentBuild.description = currentBuild.description ? e.message + " " + currentBuild.description : e.message
throw e
}
}
def buildImageURL(pepperEnv, target, mcp_repo) {
def salt = new com.mirantis.mk.Salt()
def raw_version = salt.cmdRun(pepperEnv, target, "kubectl version --short -o json")['return'][0].values()[0].replaceAll('Salt command execution success','')
print("Kubernetes version: " + raw_version)
def serialized_version = readJSON text: raw_version
def short_version = (serialized_version.serverVersion.gitVersion =~ /([v])(\d+\.)(\d+\.)(\d+\-)(\d+)/)[0][0]
print("Kubernetes short version: " + short_version)
def conformance_image = mcp_repo + "/mirantis/kubernetes/k8s-conformance:" + short_version
return conformance_image
}
def executeConformance(pepperEnv, target, k8s_api, mcp_repo) {
def image = buildImageURL(pepperEnv, target, mcp_repo)
print("Using image: " + image)
runConformance(pepperEnv, target, k8s_api, image)
}
def containerDinstalled(pepperEnv, target) {
def salt = new com.mirantis.mk.Salt()
return salt.cmdRun(pepperEnv, target, "containerd --version 2>1 1>/dev/null && echo 'true' || echo 'false'"
)['return'][0].values()[0].replaceAll('Salt command execution success','').trim().toBoolean()
}
def containerDenabled(pepperEnv, target) {
def salt = new com.mirantis.mk.Salt()
return salt.getPillar(pepperEnv, target, "kubernetes:common:containerd:enabled"
)["return"][0].values()[0].toBoolean()
}
def conformancePodDefExists(pepperEnv, target) {
def salt = new com.mirantis.mk.Salt()
return salt.cmdRun(pepperEnv, target, "test -e /srv/kubernetes/conformance.yml && echo 'true' || echo 'false'"
)['return'][0].values()[0].replaceAll('Salt command execution success','').trim().toBoolean()
}
def printVersionInfo(pepperEnv, target) {
def salt = new com.mirantis.mk.Salt()
def common = new com.mirantis.mk.Common()
stage("Gather version and runtime information") {
common.infoMsg("Version and runtime info:")
salt.cmdRun(pepperEnv, target, "kubectl get no -o wide")
common.infoMsg("Cluster health info:")
salt.cmdRun(pepperEnv, target, "kubectl get cs")
common.infoMsg("ETCD health info:")
salt.cmdRun(pepperEnv, target, ". /var/lib/etcd/configenv && etcdctl cluster-health")
common.infoMsg("Calico peers info:")
salt.cmdRun(pepperEnv, target, "calicoctl node status")
}
}
def calicoEnabled(pepperEnv, target) {
def salt = new com.mirantis.mk.Salt()
return salt.getPillar(pepperEnv, target, "kubernetes:pool:network:calico:enabled"
)["return"][0].values()[0].toBoolean()
}
def checkCalicoClusterState(pepperEnv, target) {
def common = new com.mirantis.mk.Common()
def salt = new com.mirantis.mk.Salt()
stage("Checking Calico cluster state after upgrade") {
// check Calico cluster and cli clients versions
def checkVer = [
"Client Version:": [verStr: "", dif: false, wrong: false],
"Cluster Version:": [verStr: "", dif: false, wrong: false]
]
def checkVerPassed = true
def versionResults = salt.cmdRun(pepperEnv, target, "calicoctl version | grep -i version")['return'][0]
versionResults.each { k, v ->
// println("Node:\n${k}\nResult:\n${v}")
for (verLine in v.split("\n")) {
for (verType in checkVer.keySet()) {
if (verLine.contains(verType)) {
def verRec = checkVer[verType]
ver = (verLine - verType).trim()
if (!verRec.verStr) {
verRec.verStr = ver
}
if (verRec.verStr != ver) {
verRec.dif = true
checkVerPassed = false
}
version = ver.tokenize(".")
if ((version.size() < 3) || (version[0] != "v3")) {
verRec.wrong = true
checkVerPassed = false
}
checkVer[verType] = verRec
}
}
}
}
if (checkVerPassed) {
common.infoMsg("Calico version verification passed")
}
else {
def warningMsg = "Calico version verification failed.\n"
checkVer.each { k, rec ->
if (rec.dif) {
warningMsg += "${k} versions are different across nodes.\n"
}
if (rec.wrong) {
warningMsg += "${k} (some) versions are wrong - should be v3.x.\n"
}
}
common.warningMsg(warningMsg)
currentBuild.description += "<br><b>${warningMsg}</b><br><br>"
}
// check Calico nodes' statuses
def nodeStatusResults = salt.cmdRun(pepperEnv, target, "calicoctl node status")['return'][0]
def nodesRunning = true
def peersNotFound = []
def peersNotOnline = []
nodeStatusResults.each { k, v ->
// println("Node:\n${k}\nResult:\n${v}")
if (!v.contains("Calico process is running")) {
nodesRunning = false
def warningMsg = "Node ${k}: Calico node is not running."
common.warningMsg(warningMsg)
currentBuild.description += "<br><b>${warningMsg}</b><br><br>"
}
def nodePeersFound = false
def nodePeersOnline = true
for (nodeLine in v.split("\n")) {
if (nodeLine.contains("|") && (!nodeLine.contains("STATE"))) {
def col = nodeLine.tokenize("|").collect{it.trim()}
if (col.size() == 5) {
nodePeersFound = true
if ((col[2] != "up") || (col[4] != "Established")) {
def warningMsg = "Node ${k}: BGP peer '${col[0]}' is out of reach. Peer state: '${col[2]}', connection info: '${col[4]}'."
common.warningMsg(warningMsg)
currentBuild.description += "<br><b>${warningMsg}</b><br><br>"
nodePeersOnline = false
}
}
}
}
if (!nodePeersFound) {
peersNotFound += k
}
if (!nodePeersOnline) {
peersNotOnline += k
}
}
if (nodesRunning) {
common.infoMsg("All the Calico nodes are running")
}
if (peersNotFound) {
def warningMsg = "BGP peers not found for the node(s): " + peersNotFound.join(', ') + "."
common.warningMsg(warningMsg)
currentBuild.description += "<br><b>${warningMsg}</b><br><br>"
} else {
common.infoMsg("BGP peers were found for all the nodes")
}
if (!peersNotOnline) {
common.infoMsg("All reported BGP peers are reachable")
}
// check that 'calico-kube-controllers' is running
// one CTL node will be used to get pod's state using kubectl
def ctl_node = salt.getMinionsSorted(pepperEnv, CTL_TARGET)[0]
def kubeCtrlResult = salt.cmdRun(
pepperEnv, ctl_node, "kubectl get pod -n kube-system --selector=k8s-app=calico-kube-controllers"
)['return'][0].values()[0].toString()
if (kubeCtrlResult.contains("calico-kube-controllers")) {
for (line in kubeCtrlResult.split("\n")) {
if (line.contains("calico-kube-controllers")) {
col = line.tokenize(" ")
if ((col[1] != "1/1") || (col[2] != "Running")) {
def warningMsg = "Calico kube-controllers pod is not running properly."
common.warningMsg(warningMsg)
currentBuild.description += "<br><b>${warningMsg}</b><br><br>"
}
else {
common.infoMsg("Calico kube-controllers pod is running.")
}
break
}
}
} else {
def warningMsg = "Calico kube-controllers pod was not scheduled."
common.warningMsg(warningMsg)
currentBuild.description += "<br><b>${warningMsg}</b><br><br>"
}
}
}
def checkCalicoUpgradePossibility(pepperEnv, target) {
def salt = new com.mirantis.mk.Salt()
stage("Verification of Calico upgrade possibility") {
// check Calico version
def versionResult = salt.cmdRun(
pepperEnv, target, "calicoctl version | grep 'Cluster Version'"
)['return'][0].values()[0].split("\n")[0].trim()
versionStr = (versionResult - "Cluster Version:").trim()
version = versionStr.tokenize(".")
if ((version.size() < 3) || (version[0] != "v2") || (version[1] != "6") || (version[2].toInteger() < 5)) {
error(
"Current Calico ${versionStr} cannot be upgraded to v3.x. " +
"Calico v2.6.x starting from v2.6.5 can be upgraded. " +
"For earlier versions, please update to v2.6.5 first."
)
}
print("Calico version was determined: ${versionStr}")
// check Calico is switched on
def readinessResult = salt.cmdRun(
pepperEnv, target, ". /var/lib/etcd/configenv && etcdctl get /calico/v1/Ready"
)['return'][0].values()[0].split("\n")[0].trim()
print("Calico readiness check result: ${readinessResult}")
if (readinessResult != "true") {
// try set it to true
readinessResult = salt.cmdRun(
pepperEnv, target, ". /var/lib/etcd/configenv && etcdctl set /calico/v1/Ready true"
)['return'][0].values()[0].split("\n")[0].trim()
print("Calico readiness result 2nd attempt: ${readinessResult}")
if (readinessResult != "true") {
error("Calico is not ready. '/calico/v1/Ready': '${readinessResult}'")
}
}
// Calico data upgrade dry-run
def cmd = "export APIV1_ETCD_ENDPOINTS=${ETCD_ENDPOINTS} && " +
"export APIV1_ETCD_CA_CERT_FILE=/var/lib/etcd/ca.pem && " +
"export APIV1_ETCD_CERT_FILE=/var/lib/etcd/etcd-client.crt && " +
"export APIV1_ETCD_KEY_FILE=/var/lib/etcd/etcd-client.key && " +
"export ETCD_ENDPOINTS=${ETCD_ENDPOINTS} && " +
"export ETCD_CA_CERT_FILE=/var/lib/etcd/ca.pem && " +
"export ETCD_CERT_FILE=/var/lib/etcd/etcd-client.crt && " +
"export ETCD_KEY_FILE=/var/lib/etcd/etcd-client.key && " +
"./calico-upgrade dry-run --ignore-v3-data"
def dryRunResult = salt.cmdRun(pepperEnv, target, cmd)['return'][0].values()[0]
// check dry-run result
def validationSuccessStr = "Successfully validated v1 to v3 conversion"
if (!dryRunResult.contains(validationSuccessStr)) {
error("Calico data upgrade dry-run has failed")
}
}
}
def checkCalicoPolicySetting(pepperEnv, target) {
def common = new com.mirantis.mk.Common()
def salt = new com.mirantis.mk.Salt()
stage("Checking of Calico network policy setting") {
// check Calico policy enabled
def cniPolicy = false
def addonsPolicy = false
def kubeCtrlRunning = false
// check CNI config
def cniCfgResult = salt.cmdRun(
pepperEnv, target, "cat /etc/cni/net.d/10-calico.conf"
)['return'][0].values()[0].toString()
def cniCfg = new JsonSlurper().parseText(cniCfgResult)
if (cniCfg.get("policy") != null) {
if (cniCfg["policy"].get("type") == "k8s") {
cniPolicy = true
} else {
common.warningMsg("Calico policy type is unknown or not set.")
}
}
// check k8s addons
def addonsResult = salt.cmdRun(
pepperEnv, target, "ls /etc/kubernetes/addons"
)['return'][0].values()[0].toString()
if (addonsResult.contains("calico_policy")) {
addonsPolicy = true
}
// check kube-controllers is running
def kubeCtrlResult = salt.cmdRun(
pepperEnv, target, "kubectl get pod -n kube-system --selector=k8s-app=calico-kube-controllers"
)['return'][0].values()[0].toString()
if (kubeCtrlResult.contains("Running")) {
kubeCtrlRunning = true
}
// It's safe to enable Calico policy any time, but it may be unsafe to disable it.
// So, no need to disable Calico policy for v3.x if it's not in use currently.
// But if Calico policy is in use already, it should be enabled after upgrade as well.
// check for consistency
if ((cniPolicy != addonsPolicy) || (addonsPolicy != kubeCtrlRunning)) {
caution = "ATTENTION. Calico policy setting cannot be determined reliably (enabled in CNI config: ${cniPolicy}, " +
"presence in k8s addons: ${addonsPolicy}, kube-controllers is running: ${kubeCtrlRunning})."
currentBuild.description += "<br><b>${caution}</b><br><br>"
common.warningMsg(caution)
} else {
common.infoMsg("Current Calico policy state is detected as: ${cniPolicy}")
if (cniPolicy) {
// Calico policy is in use. Check policy setting for v3.x.
common.infoMsg("Calico policy is in use. It should be enabled for v3.x as well.")
def saltPolicyResult = salt.getPillar(
pepperEnv, target, "kubernetes:pool:network:calico:policy"
)["return"][0].values()[0].toString()
common.infoMsg("kubernetes.pool.network.calico.policy: ${saltPolicyResult}")
if (saltPolicyResult.toLowerCase().contains("true")) {
common.infoMsg("Calico policy setting for v3.x is detected as: true")
} else {
caution = "ATTENTION. Currently, Calico is running with policy switched on. " +
"Calico policy setting for v3.x is not set to true. " +
"After upgrade is completed, Calico policy will be switched off. " +
"You will need to switch it on manually if required."
currentBuild.description += "<br><b>${caution}</b><br><br>"
common.warningMsg(caution)
}
}
}
if (addonsPolicy) {
// Remove v2.6.x policy-related addons on masters to not interfere with v3.x kube-controllers
salt.cmdRun(pepperEnv, CTL_TARGET, "rm -rf /etc/kubernetes/addons/calico_policy")
}
}
}
timeout(time: 12, unit: 'HOURS') {
node() {
try {
stage("Setup virtualenv for Pepper") {
python.setupPepperVirtualenv(pepperEnv, SALT_MASTER_URL, SALT_MASTER_CREDENTIALS)
}
def ctl_node = salt.getMinionsSorted(pepperEnv, CTL_TARGET)[0]
def daemonsetMap = buildDaemonsetMap(pepperEnv, ctl_node)
if (CONFORMANCE_RUN_BEFORE.toBoolean()) {
stage("Perform conformance run before upgrade") {
def target = CTL_TARGET
def mcp_repo = ARTIFACTORY_URL
def k8s_api = TEST_K8S_API_SERVER
firstTarget = salt.getFirstMinion(pepperEnv, target)
def containerd_enabled = containerDenabled(pepperEnv, firstTarget)
def containerd_installed = containerDinstalled(pepperEnv, firstTarget)
def conformance_pod_ready = conformancePodDefExists(pepperEnv, firstTarget)
if (containerd_enabled && containerd_installed && conformance_pod_ready) {
def config = ['master': pepperEnv,
'target': firstTarget,
'junitResults': false,
'autodetect': true]
test.executeConformance(config)
} else {
executeConformance(pepperEnv, firstTarget, k8s_api, mcp_repo)
}
}
}
if ((common.validInputParam('KUBERNETES_HYPERKUBE_IMAGE')) && (common.validInputParam('KUBERNETES_PAUSE_IMAGE'))) {
overrideKubernetesImage(pepperEnv)
}
if ((common.validInputParam('KUBERNETES_CALICO_IMAGE'))
&& (common.validInputParam('KUBERNETES_CALICO_CALICOCTL_SOURCE'))
&& (common.validInputParam('KUBERNETES_CALICO_CALICOCTL_SOURCE_HASH'))
&& (common.validInputParam('KUBERNETES_CALICO_CNI_SOURCE'))
&& (common.validInputParam('KUBERNETES_CALICO_CNI_SOURCE_HASH'))
&& (common.validInputParam('KUBERNETES_CALICO_BIRDCL_SOURCE'))
&& (common.validInputParam('KUBERNETES_CALICO_BIRDCL_SOURCE_HASH'))
&& (common.validInputParam('KUBERNETES_CALICO_CNI_IPAM_SOURCE'))
&& (common.validInputParam('KUBERNETES_CALICO_CNI_IPAM_SOURCE_HASH'))
&& (common.validInputParam('KUBERNETES_CALICO_KUBE_CONTROLLERS_IMAGE'))
) {
overrideCalicoImages(pepperEnv)
}
/*
* Execute Calico upgrade if needed (only for v2 to v3 upgrade).
* This part causes workloads operations downtime.
* It is only required for Calico v2.x to v3.x upgrade when etcd is in use for Calico
* as Calico etcd schema has different formats for Calico v2.x and Calico v3.x.
*/
if (UPGRADE_CALICO_V2_TO_V3.toBoolean()) {
// get ETCD_ENDPOINTS in use by Calico
def ep_str = salt.cmdRun(pepperEnv, ctl_node, "cat /etc/calico/calicoctl.cfg | grep etcdEndpoints")['return'][0].values()[0]
ETCD_ENDPOINTS = ep_str.split("\n")[0].tokenize(' ')[1]
print("ETCD_ENDPOINTS in use by Calico: '${ETCD_ENDPOINTS}'")
// download calico-upgrade utility
downloadCalicoUpgrader(pepperEnv, ctl_node)
// check the possibility of upgrading of Calico
checkCalicoUpgradePossibility(pepperEnv, ctl_node)
// check and adjust Calico policy setting
checkCalicoPolicySetting(pepperEnv, ctl_node)
// this sequence implies workloads operations downtime
startCalicoUpgrade(pepperEnv, ctl_node)
performCalicoConfigurationUpdateAndServicesRestart(pepperEnv, POOL, ctl_node)
completeCalicoUpgrade(pepperEnv, ctl_node)
// no downtime is expected after this point
}
/*
* Execute etcd update
*/
if ((common.validInputParam('KUBERNETES_ETCD_SOURCE')) && (common.validInputParam('KUBERNETES_ETCD_SOURCE_HASH'))) {
overrideEtcdSource(pepperEnv)
}
def targetHostsEtcd = salt.getMinionsSorted(pepperEnv, "I@etcd:server")
for (t in targetHostsEtcd) {
performEtcdUpdateAndServicesRestart(pepperEnv, t)
}
/*
* Execute k8s update
*/
if (updates.contains("ctl")) {
def target = CTL_TARGET
if (PER_NODE.toBoolean()) {
def targetHosts = salt.getMinionsSorted(pepperEnv, target)
for (t in targetHosts) {
if (SIMPLE_UPGRADE.toBoolean()) {
performKubernetesControlUpdate(pepperEnv, t)
} else {
cordonNode(pepperEnv, t)
drainNode(pepperEnv, t)
regenerateCerts(pepperEnv, t)
performKubernetesControlUpdate(pepperEnv, t)
updateAddonManager(pepperEnv, t)
if (daemonsetMap) {
purgeDaemonsetPods(pepperEnv, t, daemonsetMap)
rebootKubernetesNode(pepperEnv, t)
}
uncordonNode(pepperEnv, t)
}
}
} else {
performKubernetesControlUpdate(pepperEnv, target)
}
if (!SIMPLE_UPGRADE.toBoolean()) {
// Addons upgrade should be performed after all nodes will be upgraded
updateAddons(pepperEnv, target)
// Wait for 90 sec for addons reconciling
sleep(90)
}
}
if (updates.contains("cmp")) {
def target = CMP_TARGET
if (PER_NODE.toBoolean()) {
def targetHosts = salt.getMinionsSorted(pepperEnv, target)
for (t in targetHosts) {
if (SIMPLE_UPGRADE.toBoolean()) {
performKubernetesComputeUpdate(pepperEnv, t)
} else {
cordonNode(pepperEnv, t)
drainNode(pepperEnv, t)
regenerateCerts(pepperEnv, t)
performKubernetesComputeUpdate(pepperEnv, t)
if (daemonsetMap) {
purgeDaemonsetPods(pepperEnv, t, daemonsetMap)
rebootKubernetesNode(pepperEnv, t)
}
uncordonNode(pepperEnv, t)
}
}
} else {
performKubernetesComputeUpdate(pepperEnv, target)
}
}
if (calicoEnabled(pepperEnv, ctl_node)) {
checkCalicoClusterState(pepperEnv, POOL)
}
printVersionInfo(pepperEnv, ctl_node)
if (CONFORMANCE_RUN_AFTER.toBoolean()) {
stage("Perform conformance run after upgrade") {
def target = CTL_TARGET
def mcp_repo = ARTIFACTORY_URL
def k8s_api = TEST_K8S_API_SERVER
firstTarget = salt.getFirstMinion(pepperEnv, target)
def containerd_enabled = containerDenabled(pepperEnv, firstTarget)
def containerd_installed = containerDinstalled(pepperEnv, firstTarget)
def conformance_pod_ready = conformancePodDefExists(pepperEnv, firstTarget)
if (containerd_enabled && containerd_installed && conformance_pod_ready) {
def config = ['master': pepperEnv,
'target': firstTarget,
'junitResults': false,
'autodetect': true]
test.executeConformance(config)
} else {
executeConformance(pepperEnv, firstTarget, k8s_api, mcp_repo)
}
}
}
} catch (Throwable e) {
// If there was an error or exception thrown, the build failed
currentBuild.result = "FAILURE"
currentBuild.description = currentBuild.description ? e.message + " " + currentBuild.description : e.message
throw e
}
}
}