blob: 515fcb6231bc1aa8a2ccb60d57936d17c9d9be29 [file] [log] [blame]
Tomáš Kukrál7ded3642017-03-27 15:52:51 +02001/**
2 * Generate cookiecutter cluster by individual products
3 *
4 * Expected parameters:
Tomáš Kukrál7ded3642017-03-27 15:52:51 +02005 * COOKIECUTTER_TEMPLATE_CONTEXT Context parameters for the template generation.
Sergey Galkin8b87f6e2018-10-24 18:40:13 +04006 * CREDENTIALS_ID Credentials id for git
azvyagintsev6d678da2018-11-28 21:19:06 +02007 * TEST_MODEL Run syntax tests for model
azvyagintsev3ed704f2018-07-09 15:49:27 +03008 **/
Aleksey Zvyagintsevb16902d2018-10-29 12:33:48 +00009import static groovy.json.JsonOutput.toJson
10import static groovy.json.JsonOutput.prettyPrint
Tomáš Kukrál7ded3642017-03-27 15:52:51 +020011
12common = new com.mirantis.mk.Common()
Aleksey Zvyagintsevb16902d2018-10-29 12:33:48 +000013common2 = new com.mirantis.mcp.Common()
Tomáš Kukrál7ded3642017-03-27 15:52:51 +020014git = new com.mirantis.mk.Git()
15python = new com.mirantis.mk.Python()
chnyda89191012017-05-29 15:38:35 +020016saltModelTesting = new com.mirantis.mk.SaltModelTesting()
Tomáš Kukrál7ded3642017-03-27 15:52:51 +020017
azvyagintsev6d678da2018-11-28 21:19:06 +020018slaveNode = env.getProperty('SLAVE_NODE') ?: 'python&&docker'
19gerritCredentials = env.getProperty('CREDENTIALS_ID') ?: 'gerrit'
20runTestModel = (env.getProperty('TEST_MODEL') ?: true).toBoolean()
azvyagintsev866b19a2018-11-20 18:21:43 +020021distribRevision = 'proposed'
22gitGuessedVersion = false
23
24
25def globalVariatorsUpdate() {
26 def templateContext = readYaml text: env.COOKIECUTTER_TEMPLATE_CONTEXT
27 def context = templateContext['default_context']
28 // TODO add more check's for critical var's
29 // Since we can't pin to any '_branch' variable from context, to identify 'default git revision' -
30 // because each of them, might be 'refs/' variable, we need to add some tricky trigger of using
31 // 'release/XXX' logic. This is totall guess - so,if even those one failed, to definitely must pass
32 // correct variable finally!
33 [context.get('cookiecutter_template_branch'), context.get('shared_reclass_branch'), context.get('mcp_common_scripts_branch')].any { branch ->
34 if (branch.toString().startsWith('release/')) {
35 gitGuessedVersion = branch
36 return true
37 }
38 }
39
40 // Use mcpVersion git tag if not specified branch for cookiecutter-templates
41 if (!context.get('cookiecutter_template_branch')) {
42 context['cookiecutter_template_branch'] = gitGuessedVersion ?: context['mcp_version']
43 }
44 // Don't have n/t/s for cookiecutter-templates repo, therefore use master
45 if (["nightly", "testing", "stable"].contains(context['cookiecutter_template_branch'])) {
46 context['cookiecutter_template_branch'] = 'master'
47 }
48 if (!context.get('shared_reclass_branch')) {
49 context['shared_reclass_branch'] = gitGuessedVersion ?: context['mcp_version']
50 }
51 // Don't have nightly/testing for reclass-system repo, therefore use master
52 if (["nightly", "testing", "stable"].contains(context['shared_reclass_branch'])) {
53 context['shared_reclass_branch'] = 'master'
54 }
55 if (!context.get('mcp_common_scripts_branch')) {
56 // Pin exactly to CC branch, since it might use 'release/XXX' format
57 context['mcp_common_scripts_branch'] = gitGuessedVersion ?: context['mcp_version']
58 }
59 // Don't have n/t/s for mcp-common-scripts repo, therefore use master
60 if (["nightly", "testing", "stable"].contains(context['mcp_common_scripts_branch'])) {
61 context['mcp_common_scripts_branch'] = 'master'
62 }
63 //
64 distribRevision = context['mcp_version']
65 if (['master'].contains(context['mcp_version'])) {
66 distribRevision = 'nightly'
67 }
68 if (distribRevision.contains('/')) {
69 distribRevision = distribRevision.split('/')[-1]
70 }
71 // Check if we are going to test bleeding-edge release, which doesn't have binary release yet
72 if (!common.checkRemoteBinary([mcp_version: distribRevision]).linux_system_repo_url) {
73 common.warningMsg("Binary release: ${distribRevision} not exist. Fallback to 'proposed'! ")
74 distribRevision = 'proposed'
75 }
76 common.warningMsg("Fetching:\n" +
77 "DISTRIB_REVISION from ${distribRevision}")
78 common.infoMsg("Using context:\n" + context)
79 print prettyPrint(toJson(context))
80 return context
81
82}
azvyagintsevf252b592018-08-13 18:39:14 +030083
Aleksey Zvyagintsevb16902d2018-10-29 12:33:48 +000084timeout(time: 1, unit: 'HOURS') {
azvyagintsev636493c2018-09-12 17:17:05 +030085 node(slaveNode) {
azvyagintsev866b19a2018-11-20 18:21:43 +020086 def context = globalVariatorsUpdate()
azvyagintsev6d678da2018-11-28 21:19:06 +020087 def RequesterEmail = context.get('email_address', '')
Aleksey Zvyagintsevb16902d2018-10-29 12:33:48 +000088 def templateEnv = "${env.WORKSPACE}/template"
89 def modelEnv = "${env.WORKSPACE}/model"
90 def testEnv = "${env.WORKSPACE}/test"
91 def pipelineEnv = "${env.WORKSPACE}/pipelines"
Tomáš Kukrál9f6260f2017-03-29 23:58:26 +020092
Aleksey Zvyagintsevb16902d2018-10-29 12:33:48 +000093 try {
Aleksey Zvyagintsevb16902d2018-10-29 12:33:48 +000094 //
95 def cutterEnv = "${env.WORKSPACE}/cutter"
96 def systemEnv = "${modelEnv}/classes/system"
97 def testResult = false
98 def user
99 wrap([$class: 'BuildUser']) {
100 user = env.BUILD_USER_ID
101 }
azvyagintsev6d678da2018-11-28 21:19:06 +0200102 currentBuild.description = "${context['cluster_name']} ${RequesterEmail}"
azvyagintsev866b19a2018-11-20 18:21:43 +0200103
Aleksey Zvyagintsevb16902d2018-10-29 12:33:48 +0000104 stage('Download Cookiecutter template') {
105 sh(script: 'find . -mindepth 1 -delete > /dev/null || true')
106 checkout([
107 $class : 'GitSCM',
108 branches : [[name: 'FETCH_HEAD'],],
109 extensions : [[$class: 'RelativeTargetDirectory', relativeTargetDir: templateEnv]],
110 userRemoteConfigs: [[url: context['cookiecutter_template_url'], refspec: context['cookiecutter_template_branch'], credentialsId: gerritCredentials],],
111 ])
112 }
113 stage('Create empty reclass model') {
114 dir(path: modelEnv) {
115 sh "rm -rfv .git; git init"
116 sshagent(credentials: [gerritCredentials]) {
117 sh "git submodule add ${context['shared_reclass_url']} 'classes/system'"
118 }
119 }
120 checkout([
121 $class : 'GitSCM',
122 branches : [[name: 'FETCH_HEAD'],],
123 extensions : [[$class: 'RelativeTargetDirectory', relativeTargetDir: systemEnv]],
124 userRemoteConfigs: [[url: context['shared_reclass_url'], refspec: context['shared_reclass_branch'], credentialsId: gerritCredentials],],
125 ])
126 git.commitGitChanges(modelEnv, "Added new shared reclass submodule", "${user}@localhost", "${user}")
127 }
128
129 stage('Generate model') {
130 python.setupCookiecutterVirtualenv(cutterEnv)
azvyagintsevab3f48c2018-11-05 15:16:07 +0200131 // FIXME refactor generateModel
Aleksey Zvyagintsevb16902d2018-10-29 12:33:48 +0000132 python.generateModel(common2.dumpYAML(['default_context': context]), 'default_context', context['salt_master_hostname'], cutterEnv, modelEnv, templateEnv, false)
133 git.commitGitChanges(modelEnv, "Create model ${context['cluster_name']}", "${user}@localhost", "${user}")
134 }
135
136 stage("Test") {
azvyagintsev6d678da2018-11-28 21:19:06 +0200137 if (runTestModel) {
Aleksey Zvyagintsevb16902d2018-10-29 12:33:48 +0000138 // Check if we are going to test bleeding-edge release, which doesn't have binary release yet
azvyagintsev0a38ec22018-11-19 19:18:02 +0200139 if (!common.checkRemoteBinary([mcp_version: distribRevision]).linux_system_repo_url) {
Aleksey Zvyagintsevb16902d2018-10-29 12:33:48 +0000140 common.errorMsg("Binary release: ${distribRevision} not exist. Fallback to 'proposed'! ")
141 distribRevision = 'proposed'
142 }
143 sh("cp -r ${modelEnv} ${testEnv}")
144 def DockerCName = "${env.JOB_NAME.toLowerCase()}_${env.BUILD_TAG.toLowerCase()}"
145 common.infoMsg("Attempt to run test against distribRevision: ${distribRevision}")
146 try {
147 def config = [
148 'dockerHostname' : "${context['salt_master_hostname']}.${context['cluster_domain']}",
149 'reclassEnv' : testEnv,
150 'distribRevision' : distribRevision,
151 'dockerContainerName': DockerCName,
152 'testContext' : 'salt-model-node'
153 ]
154 testResult = saltModelTesting.testNode(config)
155 common.infoMsg("Test finished: SUCCESS")
156 } catch (Exception ex) {
157 common.warningMsg("Test finished: FAILED")
158 testResult = false
159 }
160 } else {
161 common.warningMsg("Test stage has been skipped!")
162 }
163 }
164 stage("Generate config drives") {
165 // apt package genisoimage is required for this stage
Aleksey Zvyagintsevb16902d2018-10-29 12:33:48 +0000166 // download create-config-drive
Aleksey Zvyagintsevb16902d2018-10-29 12:33:48 +0000167 def commonScriptsRepoUrl = context['mcp_common_scripts_repo'] ?: 'ssh://gerrit.mcp.mirantis.com:29418/mcp/mcp-common-scripts'
168 checkout([
169 $class : 'GitSCM',
170 branches : [[name: 'FETCH_HEAD'],],
171 extensions : [[$class: 'RelativeTargetDirectory', relativeTargetDir: 'mcp-common-scripts']],
azvyagintsev866b19a2018-11-20 18:21:43 +0200172 userRemoteConfigs: [[url: commonScriptsRepoUrl, refspec: context['mcp_common_scripts_branch'], credentialsId: gerritCredentials],],
Aleksey Zvyagintsevb16902d2018-10-29 12:33:48 +0000173 ])
174
175 sh 'cp mcp-common-scripts/config-drive/create_config_drive.sh create-config-drive && chmod +x create-config-drive'
176 sh '[ -f mcp-common-scripts/config-drive/master_config.sh ] && cp mcp-common-scripts/config-drive/master_config.sh user_data || cp mcp-common-scripts/config-drive/master_config.yaml user_data'
177
178 sh "git clone --mirror https://github.com/Mirantis/mk-pipelines.git ${pipelineEnv}/mk-pipelines"
179 sh "git clone --mirror https://github.com/Mirantis/pipeline-library.git ${pipelineEnv}/pipeline-library"
180 args = "--user-data user_data --hostname ${context['salt_master_hostname']} --model ${modelEnv} --mk-pipelines ${pipelineEnv}/mk-pipelines/ --pipeline-library ${pipelineEnv}/pipeline-library/ ${context['salt_master_hostname']}.${context['cluster_domain']}-config.iso"
181
182 // load data from model
183 def smc = [:]
184 smc['SALT_MASTER_MINION_ID'] = "${context['salt_master_hostname']}.${context['cluster_domain']}"
185 smc['SALT_MASTER_DEPLOY_IP'] = context['salt_master_management_address']
186 smc['DEPLOY_NETWORK_GW'] = context['deploy_network_gateway']
187 smc['DEPLOY_NETWORK_NETMASK'] = context['deploy_network_netmask']
188 if (context.get('deploy_network_mtu')) {
189 smc['DEPLOY_NETWORK_MTU'] = context['deploy_network_mtu']
190 }
191 smc['DNS_SERVERS'] = context['dns_server01']
192 smc['MCP_VERSION'] = "${context['mcp_version']}"
193 if (context['local_repositories'] == 'True') {
194 def localRepoIP = context['local_repo_url']
195 smc['MCP_SALT_REPO_KEY'] = "http://${localRepoIP}/public.gpg"
196 smc['MCP_SALT_REPO_URL'] = "http://${localRepoIP}/ubuntu-xenial"
197 smc['PIPELINES_FROM_ISO'] = 'false'
198 smc['PIPELINE_REPO_URL'] = "http://${localRepoIP}:8088"
199 smc['LOCAL_REPOS'] = 'true'
200 }
201 if (context['upstream_proxy_enabled'] == 'True') {
202 if (context['upstream_proxy_auth_enabled'] == 'True') {
203 smc['http_proxy'] = 'http://' + context['upstream_proxy_user'] + ':' + context['upstream_proxy_password'] + '@' + context['upstream_proxy_address'] + ':' + context['upstream_proxy_port']
204 smc['https_proxy'] = 'http://' + context['upstream_proxy_user'] + ':' + context['upstream_proxy_password'] + '@' + context['upstream_proxy_address'] + ':' + context['upstream_proxy_port']
205 } else {
206 smc['http_proxy'] = 'http://' + context['upstream_proxy_address'] + ':' + context['upstream_proxy_port']
207 smc['https_proxy'] = 'http://' + context['upstream_proxy_address'] + ':' + context['upstream_proxy_port']
208 }
209 }
210
211 for (i in common.entries(smc)) {
212 sh "sed -i 's,${i[0]}=.*,${i[0]}=${i[1]},' user_data"
213 }
214
215 // create cfg config-drive
216 sh "./create-config-drive ${args}"
217 sh("mkdir output-${context['cluster_name']} && mv ${context['salt_master_hostname']}.${context['cluster_domain']}-config.iso output-${context['cluster_name']}/")
218
219 // save cfg iso to artifacts
220 archiveArtifacts artifacts: "output-${context['cluster_name']}/${context['salt_master_hostname']}.${context['cluster_domain']}-config.iso"
221
222 if (context['local_repositories'] == 'True') {
223 def aptlyServerHostname = context.aptly_server_hostname
224 sh "[ -f mcp-common-scripts/config-drive/mirror_config.yaml ] && cp mcp-common-scripts/config-drive/mirror_config.yaml mirror_config || cp mcp-common-scripts/config-drive/mirror_config.sh mirror_config"
225
226 def smc_apt = [:]
227 smc_apt['SALT_MASTER_DEPLOY_IP'] = context['salt_master_management_address']
228 smc_apt['APTLY_DEPLOY_IP'] = context['aptly_server_deploy_address']
229 smc_apt['APTLY_DEPLOY_NETMASK'] = context['deploy_network_netmask']
230 smc_apt['APTLY_MINION_ID'] = "${aptlyServerHostname}.${context['cluster_domain']}"
231
232 for (i in common.entries(smc_apt)) {
233 sh "sed -i \"s,export ${i[0]}=.*,export ${i[0]}=${i[1]},\" mirror_config"
234 }
235
236 // create apt config-drive
237 sh "./create-config-drive --user-data mirror_config --hostname ${aptlyServerHostname} ${aptlyServerHostname}.${context['cluster_domain']}-config.iso"
238 sh("mv ${aptlyServerHostname}.${context['cluster_domain']}-config.iso output-${context['cluster_name']}/")
239
240 // save apt iso to artifacts
241 archiveArtifacts artifacts: "output-${context['cluster_name']}/${aptlyServerHostname}.${context['cluster_domain']}-config.iso"
242 }
243 }
244
245 stage('Save changes reclass model') {
246 sh(returnStatus: true, script: "tar -czf output-${context['cluster_name']}/${context['cluster_name']}.tar.gz --exclude='*@tmp' -C ${modelEnv} .")
247 archiveArtifacts artifacts: "output-${context['cluster_name']}/${context['cluster_name']}.tar.gz"
248
azvyagintsev6d678da2018-11-28 21:19:06 +0200249 if(RequesterEmail != '' && !RequesterEmail.contains('example')){
250 emailext(to: RequesterEmail,
Aleksey Zvyagintsevb16902d2018-10-29 12:33:48 +0000251 attachmentsPattern: "output-${context['cluster_name']}/*",
252 body: "Mirantis Jenkins\n\nRequested reclass model ${context['cluster_name']} has been created and attached to this email.\nEnjoy!\n\nMirantis",
253 subject: "Your Salt model ${context['cluster_name']}")
254 }
255 dir("output-${context['cluster_name']}") {
256 deleteDir()
257 }
258 }
259
260 // Fail, but leave possibility to get failed artifacts
azvyagintsev6d678da2018-11-28 21:19:06 +0200261 if (!testResult && runTestModel) {
Aleksey Zvyagintsevb16902d2018-10-29 12:33:48 +0000262 common.warningMsg('Test finished: FAILURE. Please check logs and\\or debug failed model manually!')
263 error('Test stage finished: FAILURE')
264 }
265
266 } catch (Throwable e) {
267 currentBuild.result = "FAILURE"
268 currentBuild.description = currentBuild.description ? e.message + " " + currentBuild.description : e.message
269 throw e
270 } finally {
271 stage('Clean workspace directories') {
272 sh(script: 'find . -mindepth 1 -delete > /dev/null || true')
273 }
274 // common.sendNotification(currentBuild.result,"",["slack"])
Ruslan Kamaldinov6feef402017-08-02 16:55:58 +0400275 }
Tomáš Kukrál7ded3642017-03-27 15:52:51 +0200276 }
Mikhail Ivanov9f812922017-11-07 18:52:02 +0400277}