blob: 01c288f7a22cbbeb492b0b433d341127d03228aa [file] [log] [blame]
Richard Felkl26cae4d2017-12-19 00:19:16 +01001/**
2 *
3 * Update Salt environment pipeline
4 *
5 * Expected parameters:
azvyagintsev6dac3802018-11-09 15:11:30 +02006 * TARGET_MCP_VERSION Version of MCP to upgrade to
Denis Egorenkod13ad132018-12-17 16:56:02 +04007 * GIT_REFSPEC Git repo ref to be used
8 * DRIVE_TRAIN_PARAMS Yaml, DriveTrain releated params:
9 * SALT_MASTER_URL Salt API server location
10 * SALT_MASTER_CREDENTIALS Credentials to the Salt API
Denis Egorenko70002bc2019-08-19 19:41:27 +040011 * BATCH_SIZE Use batch sizing during upgrade for large envs
Denis Egorenkod13ad132018-12-17 16:56:02 +040012 * UPGRADE_SALTSTACK Upgrade SaltStack packages to new version.
13 * UPDATE_CLUSTER_MODEL Update MCP version parameter in cluster model
14 * UPDATE_PIPELINES Update pipeline repositories on Gerrit
15 * UPDATE_LOCAL_REPOS Update local repositories
Ivan Berezovskiycac04e42020-02-17 17:08:47 +040016 * OS_UPGRADE Run apt-get upgrade on Drivetrain nodes
17 * OS_DIST_UPGRADE Run apt-get dist-upgrade on Drivetrain nodes and reboot to apply changes
18 * APPLY_MODEL_WORKAROUNDS Whether to apply cluster model workarounds from the pipeline
Richard Felkl26cae4d2017-12-19 00:19:16 +010019 */
20
Richard Felkl5f7fdaf2018-02-15 15:38:31 +010021salt = new com.mirantis.mk.Salt()
22common = new com.mirantis.mk.Common()
23python = new com.mirantis.mk.Python()
Richard Felkl970e0082018-06-12 18:00:51 +020024jenkinsUtils = new com.mirantis.mk.JenkinsUtils()
azvyagintsevf3bf77a2018-11-15 19:30:04 +020025def pipelineTimeout = 12
Richard Felkl5f7fdaf2018-02-15 15:38:31 +010026venvPepper = "venvPepper"
Richard Felkl0e80d892018-06-20 13:44:54 +020027workspace = ""
Ivan Berezovskiy24b0be02019-12-11 15:31:10 +040028def saltMastURL = ''
29def saltMastCreds = ''
Denis Egorenkobf390102020-01-24 19:47:05 +040030def packageUpgradeMode = ''
Ivan Berezovskiycac04e42020-02-17 17:08:47 +040031batchSize = ''
Richard Felkl5f7fdaf2018-02-15 15:38:31 +010032
Ivan Berezovskiy224eb8e2020-03-19 14:03:43 +040033def fullRefreshOneByOne(venvPepper, minions) {
34 for (minion in minions) {
35 salt.runSaltProcessStep(venvPepper, minion, 'saltutil.refresh_pillar', [], null, true, 60)
36 salt.runSaltProcessStep(venvPepper, minion, 'saltutil.refresh_grains', [], null, true, 60)
37 salt.runSaltProcessStep(venvPepper, minion, 'saltutil.sync_all', [], null, true, 180)
38 }
39}
40
Denis Egorenkoada83882019-06-11 14:03:40 +040041def triggerMirrorJob(String jobName, String reclassSystemBranch) {
Richard Felkl970e0082018-06-12 18:00:51 +020042 params = jenkinsUtils.getJobParameters(jobName)
Denis Egorenkoada83882019-06-11 14:03:40 +040043 try {
44 build job: jobName, parameters: [
45 [$class: 'StringParameterValue', name: 'BRANCHES', value: params.get('BRANCHES')],
46 [$class: 'StringParameterValue', name: 'CREDENTIALS_ID', value: params.get('CREDENTIALS_ID')],
47 [$class: 'StringParameterValue', name: 'SOURCE_URL', value: params.get('SOURCE_URL')],
48 [$class: 'StringParameterValue', name: 'TARGET_URL', value: params.get('TARGET_URL')]
49 ]
50 } catch (Exception updateErr) {
51 common.warningMsg(updateErr)
52 common.warningMsg('Attempt to update git repo in failsafe manner')
53 build job: jobName, parameters: [
54 [$class: 'StringParameterValue', name: 'BRANCHES', value: reclassSystemBranch.replace('origin/', '')],
55 [$class: 'StringParameterValue', name: 'CREDENTIALS_ID', value: params.get('CREDENTIALS_ID')],
56 [$class: 'StringParameterValue', name: 'SOURCE_URL', value: params.get('SOURCE_URL')],
57 [$class: 'StringParameterValue', name: 'TARGET_URL', value: params.get('TARGET_URL')]
58 ]
59 }
Richard Felkl970e0082018-06-12 18:00:51 +020060}
61
azvyagintsev6dac3802018-11-09 15:11:30 +020062def updateSaltStack(target, pkgs) {
Denis Egorenko0d0c65f2019-02-26 16:05:03 +040063 salt.cmdRun(venvPepper, "I@salt:master", "salt -C '${target}' --async pkg.install force_yes=True pkgs='$pkgs'")
64 // can't use same function from pipeline lib, as at the moment of running upgrade pipeline Jenkins
65 // still using pipeline lib from current old mcp-version
azvyagintsev6dac3802018-11-09 15:11:30 +020066 common.retry(20, 60) {
Richard Felkl0e80d892018-06-20 13:44:54 +020067 salt.minionsReachable(venvPepper, 'I@salt:master', '*')
68 def running = salt.runSaltProcessStep(venvPepper, target, 'saltutil.running', [], null, true, 5)
azvyagintsev6dac3802018-11-09 15:11:30 +020069 for (value in running.get("return")[0].values()) {
70 if (value != []) {
Richard Felkl0e80d892018-06-20 13:44:54 +020071 throw new Exception("Not all salt-minions are ready for execution")
72 }
73 }
74 }
75
azvyagintsevf3bf77a2018-11-15 19:30:04 +020076 def saltVersion = salt.getPillar(venvPepper, 'I@salt:master', '_param:salt_version').get('return')[0].values()[0]
Richard Felklf23257e2018-08-06 09:24:23 +020077 def saltMinionVersions = salt.cmdRun(venvPepper, target, "apt-cache policy salt-common | awk '/Installed/ && /$saltVersion/'").get("return")
Richard Felkl0e80d892018-06-20 13:44:54 +020078 def saltMinionVersion = ""
79
azvyagintsev6dac3802018-11-09 15:11:30 +020080 for (minion in saltMinionVersions[0].keySet()) {
81 saltMinionVersion = saltMinionVersions[0].get(minion).replace("Salt command execution success", "").trim()
82 if (saltMinionVersion == "") {
Richard Felkl0e80d892018-06-20 13:44:54 +020083 error("Installed version of Salt on $minion doesn't match specified version in the model.")
84 }
85 }
86}
87
Denis Egorenko6f1c8732019-09-24 14:55:50 +040088def getWorkerThreads(saltId) {
89 if (env.getEnvironment().containsKey('SALT_MASTER_OPT_WORKER_THREADS')) {
90 return env['SALT_MASTER_OPT_WORKER_THREADS'].toString()
91 }
92 def threads = salt.cmdRun(saltId, "I@salt:master", "cat /etc/salt/master.d/master.conf | grep worker_threads | cut -f 2 -d ':'", true, null, true)
93 return threads['return'][0].values()[0].replaceAll('Salt command execution success','').trim()
94}
95
Ivan Berezovskiy304705c2019-12-03 18:49:09 +040096def wa29352(String cname) {
Denis Egorenkoada83882019-06-11 14:03:40 +040097 // WA for PROD-29352. Issue cause due patch https://gerrit.mcp.mirantis.com/#/c/37932/12/openssh/client/root.yml
98 // Default soft-param has been removed, what now makes not possible to render some old env's.
99 // Like fix, we found copy-paste already generated key from backups, to secrets.yml with correct key name
100 def wa29352ClassName = 'cluster.' + cname + '.infra.secrets_root_wa29352'
101 def wa29352File = "/srv/salt/reclass/classes/cluster/${cname}/infra/secrets_root_wa29352.yml"
102 def wa29352SecretsFile = "/srv/salt/reclass/classes/cluster/${cname}/infra/secrets.yml"
103 def _tempFile = '/tmp/wa29352_' + UUID.randomUUID().toString().take(8)
104 try {
Ivan Berezovskiycac04e42020-02-17 17:08:47 +0400105 salt.cmdRun(venvPepper, 'I@salt:master', "! grep -qi root_private_key: ${wa29352SecretsFile}", true, null, false)
Denis Egorenkoada83882019-06-11 14:03:40 +0400106 salt.cmdRun(venvPepper, 'I@salt:master', "test ! -f ${wa29352File}", true, null, false)
107 }
108 catch (Exception ex) {
Denis Egorenkoe0c88432019-10-07 12:46:14 +0400109 common.infoMsg('Work-around for PROD-29352 already applied, nothing todo')
Denis Egorenkoada83882019-06-11 14:03:40 +0400110 return
111 }
112 def rKeysDict = [
113 'parameters': [
114 '_param': [
115 'root_private_key': salt.getPillar(venvPepper, 'I@salt:master', '_param:root_private_key').get('return')[0].values()[0].trim(),
116 'root_public_key' : '',
117 ]
118 ]
119 ]
120 // save root key,and generate public one from it
121 writeFile file: _tempFile, text: rKeysDict['parameters']['_param']['root_private_key'].toString().trim()
122 sh('chmod 0600 ' + _tempFile)
123 rKeysDict['parameters']['_param']['root_public_key'] = sh(script: "ssh-keygen -q -y -f ${_tempFile}", returnStdout: true).trim()
124 sh('rm -fv ' + _tempFile)
125 writeYaml file: _tempFile, data: rKeysDict
126 def yamlData = sh(script: "cat ${_tempFile} | base64", returnStdout: true).trim()
127 salt.cmdRun(venvPepper, 'I@salt:master', "echo '${yamlData}' | base64 -d > ${wa29352File}", false, null, false)
128 common.infoMsg("Add $wa29352ClassName class into secrets.yml")
129
130 // Add 'classes:' directive
131 salt.cmdRun(venvPepper, 'I@salt:master', "cd /srv/salt/reclass/classes/cluster/$cname && " +
132 "grep -q 'classes:' infra/secrets.yml || sed -i '1iclasses:' infra/secrets.yml")
133
134 salt.cmdRun(venvPepper, 'I@salt:master', "cd /srv/salt/reclass/classes/cluster/$cname && " +
135 "grep -q '${wa29352ClassName}' infra/secrets.yml || sed -i '/classes:/ a - $wa29352ClassName' infra/secrets.yml")
Denis Egorenkoada83882019-06-11 14:03:40 +0400136 sh('rm -fv ' + _tempFile)
Denis Egorenkoe0c88432019-10-07 12:46:14 +0400137 salt.cmdRun(venvPepper, 'I@salt:master', "cd /srv/salt/reclass/classes/cluster/$cname && git status && " +
138 "git add ${wa29352File} && git add -u && git commit --allow-empty -m 'Cluster model updated with WA for PROD-29352. Issue cause due patch https://gerrit.mcp.mirantis.com/#/c/37932/ at ${common.getDatetime()}' ")
139 common.infoMsg('Work-around for PROD-29352 successfully applied')
Denis Egorenkoada83882019-06-11 14:03:40 +0400140}
141
142def wa29155(ArrayList saltMinions, String cname) {
143 // WA for PROD-29155. Issue cause due patch https://gerrit.mcp.mirantis.com/#/c/37932/
144 // CHeck for existence cmp nodes, and try to render it. Is failed, apply ssh-key wa
Denis Egorenkoada83882019-06-11 14:03:40 +0400145 def patched = false
146 def wa29155ClassName = 'cluster.' + cname + '.infra.secrets_nova_wa29155'
147 def wa29155File = "/srv/salt/reclass/classes/cluster/${cname}/infra/secrets_nova_wa29155.yml"
148
149 try {
150 salt.cmdRun(venvPepper, 'I@salt:master', "test ! -f ${wa29155File}", true, null, false)
Ivan Berezovskiycac04e42020-02-17 17:08:47 +0400151 def patch_required = false
152 for (String minion in saltMinions) {
153 def nova_key = salt.getPillar(venvPepper, minion, '_param:nova_compute_ssh_private').get("return")[0].values()[0]
154 if (nova_key == '' || nova_key == 'null' || nova_key == null) {
155 patch_required = true
156 break // no exception, proceeding to apply the patch
157 }
158 }
159 if (!patch_required) {
160 error('No need to apply work-around for PROD-29155')
161 }
Denis Egorenkoada83882019-06-11 14:03:40 +0400162 }
163 catch (Exception ex) {
Denis Egorenkoada83882019-06-11 14:03:40 +0400164 return
165 }
Denis Egorenkoe983d452019-08-23 14:29:34 +0400166 salt.fullRefresh(venvPepper, 'I@salt:master')
Denis Egorenkoada83882019-06-11 14:03:40 +0400167 for (String minion in saltMinions) {
Denis Egorenkoada83882019-06-11 14:03:40 +0400168 // First attempt, second will be performed in next validateReclassModel() stages
169 try {
170 salt.cmdRun(venvPepper, 'I@salt:master', "reclass -n ${minion}", true, null, false).get('return')[0].values()[0].replaceAll('Salt command execution success', '').trim()
171 } catch (Exception e) {
172 common.errorMsg(e.toString())
173 if (patched) {
Ivan Berezovskiycac04e42020-02-17 17:08:47 +0400174 error("Node: ${minion} failed to render after reclass-system upgrade! WA29155 probably didn't help.")
Denis Egorenkoada83882019-06-11 14:03:40 +0400175 }
176 common.warningMsg('Perform: Attempt to apply WA for PROD-29155\n' +
177 'See https://gerrit.mcp.mirantis.com/#/c/37932/ for more info')
178 common.warningMsg('WA-PROD-29155 Generating new ssh key at master node')
179 def _tempFile = "/tmp/nova_wa29155_" + UUID.randomUUID().toString().take(8)
180 common.infoMsg('Perform: generation NEW ssh-private key for nova-compute')
181 salt.cmdRun(venvPepper, 'I@salt:master', "ssh-keygen -f ${_tempFile} -N '' -q")
182 def _pub_k = salt.runSaltProcessStep(venvPepper, 'I@salt:master', 'cmd.run', "cat ${_tempFile}.pub").get('return')[0].values()[0].trim()
183 def _priv_k = salt.runSaltProcessStep(venvPepper, 'I@salt:master', 'cmd.run', "cat ${_tempFile}").get('return')[0].values()[0].trim()
184 salt.cmdRun(venvPepper, 'I@salt:master', "rm -fv ${_tempFile}", false, null, false)
185 def novaKeysDict = [
186 "parameters": [
187 "_param": [
188 "nova_compute_ssh_private": _priv_k,
189 "nova_compute_ssh_public" : _pub_k
190 ]
191 ]
192 ]
193 writeYaml file: _tempFile, data: novaKeysDict
194 def yamlData = sh(script: "cat ${_tempFile} | base64", returnStdout: true).trim()
195 salt.cmdRun(venvPepper, 'I@salt:master', "echo '${yamlData}' | base64 -d > ${wa29155File}", false, null, false)
196 common.infoMsg("Add $wa29155ClassName class into secrets.yml")
197
198 // Add 'classes:' directive
199 salt.cmdRun(venvPepper, 'I@salt:master', "cd /srv/salt/reclass/classes/cluster/$cname && " +
200 "grep -q 'classes:' infra/secrets.yml || sed -i '1iclasses:' infra/secrets.yml")
201
202 salt.cmdRun(venvPepper, 'I@salt:master', "cd /srv/salt/reclass/classes/cluster/$cname && " +
203 "grep -q '${wa29155ClassName}' infra/secrets.yml || sed -i '/classes:/ a - $wa29155ClassName' infra/secrets.yml")
Ivan Berezovskiy304705c2019-12-03 18:49:09 +0400204 salt.fullRefresh(venvPepper, 'I@salt:master')
Ivan Berezovskiy224eb8e2020-03-19 14:03:43 +0400205 salt.runSaltProcessStep(venvPepper, saltMinions, 'saltutil.refresh_pillar', [], null, true, 60)
Denis Egorenkoada83882019-06-11 14:03:40 +0400206 patched = true
207 }
208 }
209 if (patched) {
210 salt.cmdRun(venvPepper, 'I@salt:master', "cd /srv/salt/reclass/classes/cluster/$cname && git status && " +
211 "git add ${wa29155File} && git add -u && git commit --allow-empty -m 'Cluster model updated with WA for PROD-29155. Issue cause due patch https://gerrit.mcp.mirantis.com/#/c/37932/ at ${common.getDatetime()}' ")
212 common.infoMsg('Work-around for PROD-29155 successfully applied')
213 }
214
215}
216
Ivan Berezovskiy8699f3f2020-01-24 17:52:26 +0400217def wa32284(String cluster_name) {
Denis Egorenkobae9dc72019-07-29 17:44:46 +0400218 def clientGluster = salt.getPillar(venvPepper, 'I@salt:master', "glusterfs:client:enabled").get("return")[0].values()[0]
219 def pkiGluster = salt.getPillar(venvPepper, 'I@salt:master', "glusterfs:client:volumes:salt_pki").get("return")[0].values()[0]
220 def nginxEnabledAtMaster = salt.getPillar(venvPepper, 'I@salt:master', 'nginx:server:enabled').get('return')[0].values()[0]
221 if (nginxEnabledAtMaster.toString().toLowerCase() == 'true' && clientGluster.toString().toLowerCase() == 'true' && pkiGluster) {
222 def nginxRequires = salt.getPillar(venvPepper, 'I@salt:master', 'nginx:server:wait_for_service').get('return')[0].values()[0]
223 if (nginxRequires.isEmpty()) {
Ivan Berezovskiy8699f3f2020-01-24 17:52:26 +0400224 def nginxRequiresClassName = "cluster.${cluster_name}.infra.config.nginx_requires_wa32284"
225 def nginxRequiresClassFile = "/srv/salt/reclass/classes/cluster/${cluster_name}/infra/config/nginx_requires_wa32284.yml"
Denis Egorenkobae9dc72019-07-29 17:44:46 +0400226 def nginxRequiresBlock = ['parameters': ['nginx': ['server': ['wait_for_service': ['srv-salt-pki.mount'] ] ] ] ]
227 def _tempFile = '/tmp/wa32284_' + UUID.randomUUID().toString().take(8)
228 writeYaml file: _tempFile , data: nginxRequiresBlock
229 def nginxRequiresBlockString = sh(script: "cat ${_tempFile}", returnStdout: true).trim()
Ivan Berezovskiy8699f3f2020-01-24 17:52:26 +0400230 salt.cmdRun(venvPepper, 'I@salt:master', "cd /srv/salt/reclass/classes/cluster/${cluster_name} && " +
Denis Egorenkobae9dc72019-07-29 17:44:46 +0400231 "sed -i '/^parameters:/i - ${nginxRequiresClassName}' infra/config/init.yml")
232 salt.cmdRun(venvPepper, 'I@salt:master', "echo '${nginxRequiresBlockString}' > ${nginxRequiresClassFile}", false, null, false)
Ivan Berezovskiy8699f3f2020-01-24 17:52:26 +0400233 salt.cmdRun(venvPepper, 'I@salt:master', "cd /srv/salt/reclass/classes/cluster/${cluster_name} && git status && git add ${nginxRequiresClassFile}")
Denis Egorenkobae9dc72019-07-29 17:44:46 +0400234 }
235 }
236}
237
Oleksii Molchanov911749c2020-03-13 13:28:10 +0200238def check_34406(String cluster_name) {
239 def sphinxpasswordPillar = salt.getPillar(venvPepper, 'I@salt:master', '_param:sphinx_proxy_password_generated').get("return")[0].values()[0]
240 if (sphinxpasswordPillar == '' || sphinxpasswordPillar == 'null' || sphinxpasswordPillar == null) {
241 error('Sphinx password is not defined.\n' +
242 'See https://docs.mirantis.com/mcp/q4-18/mcp-release-notes/mu/mu-9/mu-9-addressed/mu-9-dtrain/mu-9-dt-manual.html#i-34406 for more info')
243 }
244}
245
Denis Egorenkoda117892019-09-02 14:53:02 +0400246def wa32182(String cluster_name) {
Hanna Arhipova644aefd2019-09-06 17:55:40 +0300247 if (salt.testTarget(venvPepper, 'I@opencontrail:control or I@opencontrail:collector')) {
Denis Egorenkoda117892019-09-02 14:53:02 +0400248 def clusterModelPath = "/srv/salt/reclass/classes/cluster/${cluster_name}"
249 def fixFile = "${clusterModelPath}/opencontrail/common_wa32182.yml"
250 def usualFile = "${clusterModelPath}/opencontrail/common.yml"
251 def fixFileContent = "classes:\n- system.opencontrail.common\n"
252 salt.cmdRun(venvPepper, 'I@salt:master', "test -f ${fixFile} -o -f ${usualFile} || echo '${fixFileContent}' > ${fixFile}")
253 def contrailFiles = ['opencontrail/analytics.yml', 'opencontrail/control.yml', 'openstack/compute/init.yml']
254 if (salt.testTarget(venvPepper, "I@kubernetes:master")) {
255 contrailFiles.add('kubernetes/compute.yml')
256 }
Ivan Berezovskiye375e6a2020-02-05 21:18:17 +0400257 for (String contrailFile in contrailFiles) {
Denis Egorenkoda117892019-09-02 14:53:02 +0400258 contrailFile = "${clusterModelPath}/${contrailFile}"
259 def containsFix = salt.cmdRun(venvPepper, 'I@salt:master', "grep -E '^- cluster\\.${cluster_name}\\.opencontrail\\.common(_wa32182)?\$' ${contrailFile}", false, null, true).get('return')[0].values()[0].replaceAll('Salt command execution success', '').trim()
260 if (containsFix) {
261 continue
262 } else {
263 salt.cmdRun(venvPepper, 'I@salt:master', "grep -q -E '^parameters:' ${contrailFile} && sed -i '/^parameters:/i - cluster.${cluster_name}.opencontrail.common_wa32182' ${contrailFile} || " +
Ivan Berezovskiye375e6a2020-02-05 21:18:17 +0400264 "echo '- cluster.${cluster_name}.opencontrail.common_wa32182' >> ${contrailFile}")
Denis Egorenkoda117892019-09-02 14:53:02 +0400265 }
266 }
Ivan Berezovskiye375e6a2020-02-05 21:18:17 +0400267 salt.cmdRun(venvPepper, 'I@salt:master', "test -f ${fixFile} && cd ${clusterModelPath} && git status && git add ${fixFile} || true")
Denis Egorenkoda117892019-09-02 14:53:02 +0400268 }
269}
270
Denis Egorenko32461082019-10-25 13:13:39 +0400271def wa33867(String cluster_name) {
272 if (salt.testTarget(venvPepper, 'I@opencontrail:control or I@opencontrail:collector')) {
273 def contrailControlFile = "/srv/salt/reclass/classes/cluster/${cluster_name}/opencontrail/control.yml"
274 def line = salt.cmdRun(venvPepper, 'I@salt:master', "awk '/^- cluster.${cluster_name}.infra.backup.client_zookeeper/ {getline; print \$0}' ${contrailControlFile}", false, null, true).get('return')[0].values()[0].replaceAll('Salt command execution success', '').trim()
275 if (line == "- cluster.${cluster_name}.infra") {
276 salt.cmdRun(venvPepper, 'I@salt:master', "sed -i '/^- cluster.${cluster_name}.infra\$/d' ${contrailControlFile}")
277 salt.cmdRun(venvPepper, 'I@salt:master', "sed -i '/^- cluster.${cluster_name}.infra.backup.client_zookeeper\$/i - cluster.${cluster_name}.infra' ${contrailControlFile}")
278 }
279 }
280}
281
Denis Egorenko7e934c22019-10-18 17:06:11 +0400282def wa33771(String cluster_name) {
Ivan Berezovskiycac04e42020-02-17 17:08:47 +0400283 if (salt.getMinions(venvPepper, 'I@_param:openstack_node_role and I@apache:server')) {
284 def octaviaEnabled = salt.getMinions(venvPepper, 'I@octavia:api:enabled')
285 def octaviaWSGI = salt.getMinions(venvPepper, 'I@apache:server:site:octavia_api')
286 if (octaviaEnabled && !octaviaWSGI) {
287 def openstackControl = "/srv/salt/reclass/classes/cluster/${cluster_name}/openstack/control.yml"
288 def octaviaFile = "/srv/salt/reclass/classes/cluster/${cluster_name}/openstack/octavia_wa33771.yml"
289 def octaviaContext = [
290 'classes' : ['system.apache.server.site.octavia'],
291 'parameters': [
292 '_param': ['apache_octavia_api_address': '${_param:cluster_local_address}'],
293 ]
Denis Egorenko7e934c22019-10-18 17:06:11 +0400294 ]
Ivan Berezovskiycac04e42020-02-17 17:08:47 +0400295 def openstackHTTPSEnabled = salt.getPillar(venvPepper, 'I@salt:master', "_param:cluster_internal_protocol").get("return")[0].values()[0]
296 if (openstackHTTPSEnabled == 'https') {
297 octaviaContext['parameters'] << ['apache': ['server': ['site': ['apache_proxy_openstack_api_octavia': ['enabled': false]]]]]
298 }
299 def _tempFile = '/tmp/wa33771' + UUID.randomUUID().toString().take(8)
300 writeYaml file: _tempFile, data: octaviaContext
301 def octaviaFileContent = sh(script: "cat ${_tempFile} | base64", returnStdout: true).trim()
302 salt.cmdRun(venvPepper, 'I@salt:master', "sed -i '/^parameters:/i - cluster.${cluster_name}.openstack.octavia_wa33771' ${openstackControl}")
303 salt.cmdRun(venvPepper, 'I@salt:master', "echo '${octaviaFileContent}' | base64 -d > ${octaviaFile}", false, null, false)
304 salt.cmdRun(venvPepper, 'I@salt:master', "cd /srv/salt/reclass/classes/cluster/${cluster_name} && git status && git add ${octaviaFile}")
Denis Egorenko72353092020-01-30 17:17:25 +0400305 }
Ivan Berezovskiycac04e42020-02-17 17:08:47 +0400306 } else {
307 common.warningMsg("Apache server is not defined on controller nodes. Skipping Octavia WSGI workaround");
Denis Egorenko7e934c22019-10-18 17:06:11 +0400308 }
309}
310
Denis Egorenko4ac89a32019-11-14 19:56:17 +0400311def wa33930_33931(String cluster_name) {
312 def openstackControlFile = "/srv/salt/reclass/classes/cluster/${cluster_name}/openstack/control.yml"
313 def fixName = 'clients_common_wa33930_33931'
314 def fixFile = "/srv/salt/reclass/classes/cluster/${cluster_name}/openstack/${fixName}.yml"
315 def containsFix = salt.cmdRun(venvPepper, 'I@salt:master', "grep -E '^- cluster\\.${cluster_name}\\.openstack\\.${fixName}\$' ${openstackControlFile}", false, null, true).get('return')[0].values()[0].replaceAll('Salt command execution success', '').trim()
316 if (! containsFix) {
Ivan Berezovskiycac04e42020-02-17 17:08:47 +0400317 def fixContext = [ 'classes': [ ] ]
318 def novaControllerNodes = salt.getMinions(venvPepper, 'I@nova:controller')
319 for (novaController in novaControllerNodes) {
320 def novaClientPillar = salt.getPillar(venvPepper, novaController, "nova:client").get("return")[0].values()[0]
321 if (novaClientPillar == '' || novaClientPillar == 'null' || novaClientPillar == null) {
322 fixContext['classes'] << 'service.nova.client'
323 break
324 }
325 }
326 def glanceServerNodes = salt.getMinions(venvPepper, 'I@glance:server')
327 for (glanceServer in glanceServerNodes) {
328 def glanceClientPillar = salt.getPillar(venvPepper, glanceServer, "glance:client").get("return")[0].values()[0]
329 if (glanceClientPillar == '' || glanceClientPillar == 'null' || glanceClientPillar == null) {
330 fixContext['classes'] << 'service.glance.client'
331 break
332 }
333 }
334 def neutronServerNodes = salt.getMinions(venvPepper, 'I@neutron:server')
335 for (neutronServer in neutronServerNodes) {
336 def neutronServerPillar = salt.getPillar(venvPepper, neutronServer, "neutron:client").get("return")[0].values()[0]
337 if (neutronServerPillar == '' || neutronServerPillar == 'null' || neutronServerPillar == null) {
338 fixContext['classes'] << 'service.neutron.client'
339 break
340 }
341 }
Denis Egorenko4ac89a32019-11-14 19:56:17 +0400342 if (salt.getMinions(venvPepper, 'I@manila:api:enabled')) {
Ivan Berezovskiycac04e42020-02-17 17:08:47 +0400343 def manilaApiNodes = salt.getMinions(venvPepper, 'I@manila:api')
344 for (manilaNode in manilaApiNodes) {
345 def manilaNodePillar = salt.getPillar(venvPepper, manilaNode, "manila:client").get("return")[0].values()[0]
346 if (manilaNodePillar == '' || manilaNodePillar == 'null' || manilaNodePillar == null) {
347 fixContext['classes'] << 'service.manila.client'
348 break
349 }
350 }
Denis Egorenko4ac89a32019-11-14 19:56:17 +0400351 }
352 if (salt.getMinions(venvPepper, 'I@ironic:api:enabled')) {
Ivan Berezovskiycac04e42020-02-17 17:08:47 +0400353 def ironicApiNodes = salt.getMinions(venvPepper, 'I@ironic:api')
354 for (ironicNode in ironicApiNodes) {
355 def ironicNodePillar = salt.getPillar(venvPepper, ironicNode, "ironic:client").get("return")[0].values()[0]
356 if (ironicNodePillar == '' || ironicNodePillar == 'null' || ironicNodePillar == null) {
357 fixContext['classes'] << 'service.ironic.client'
358 break
359 }
360 }
Denis Egorenko4ac89a32019-11-14 19:56:17 +0400361 }
362 if (salt.getMinions(venvPepper, 'I@gnocchi:server:enabled')) {
Ivan Berezovskiycac04e42020-02-17 17:08:47 +0400363 def gnocchiServerNodes = salt.getMinions(venvPepper, 'I@gnocchi:server')
364 for (gnocchiNode in gnocchiServerNodes) {
365 def gnocchiNodePillar = salt.getPillar(venvPepper, gnocchiNode, "gnocchi:client").get("return")[0].values()[0]
366 if (gnocchiNodePillar == '' || gnocchiNodePillar == 'null' || gnocchiNodePillar == null) {
367 fixContext['classes'] << 'service.gnocchi.client'
368 break
369 }
370 }
Denis Egorenko4ac89a32019-11-14 19:56:17 +0400371 }
Ivan Berezovskiycac04e42020-02-17 17:08:47 +0400372
Denis Egorenko4ac89a32019-11-14 19:56:17 +0400373 if (salt.getMinions(venvPepper, 'I@barbican:server:enabled')) {
Ivan Berezovskiycac04e42020-02-17 17:08:47 +0400374 def barbicanServerNodes = salt.getMinions(venvPepper, 'I@barbican:server')
375 for (barbicanNode in barbicanServerNodes) {
376 def barbicanNodePillar = salt.getPillar(venvPepper, barbicanNode, "barbican:client").get("return")[0].values()[0]
377 if (barbicanNodePillar == '' || barbicanNodePillar == 'null' || barbicanNodePillar == null) {
378 fixContext['classes'] << 'service.barbican.client.single'
379 break
380 }
381 }
Denis Egorenko4ac89a32019-11-14 19:56:17 +0400382 }
Ivan Berezovskiycac04e42020-02-17 17:08:47 +0400383 if (fixContext['classes'] != []) {
384 def _tempFile = '/tmp/wa33930_33931' + UUID.randomUUID().toString().take(8)
385 writeYaml file: _tempFile, data: fixContext
386 def fixFileContent = sh(script: "cat ${_tempFile} | base64", returnStdout: true).trim()
387 salt.cmdRun(venvPepper, 'I@salt:master', "echo '${fixFileContent}' | base64 -d > ${fixFile}", false, null, false)
388 salt.cmdRun(venvPepper, 'I@salt:master', "sed -i '/^parameters:/i - cluster.${cluster_name}.openstack.${fixName}' ${openstackControlFile}")
389 salt.cmdRun(venvPepper, 'I@salt:master', "cd /srv/salt/reclass/classes/cluster/${cluster_name} && git status && git add ${fixFile}")
390 }
Denis Egorenko4ac89a32019-11-14 19:56:17 +0400391 }
392}
393
Denis Egorenkodb450152020-01-28 16:41:44 +0400394def wa34245(cluster_name) {
395 def infraInitFile = "/srv/salt/reclass/classes/cluster/${cluster_name}/infra/init.yml"
396 def fixName = 'hosts_wa34245'
397 def fixFile = "/srv/salt/reclass/classes/cluster/${cluster_name}/infra/${fixName}.yml"
398 if (salt.testTarget(venvPepper, 'I@keystone:server')) {
399 def fixApplied = salt.cmdRun(venvPepper, 'I@salt:master', "grep -E '^- cluster.${cluster_name}.infra.${fixName}\$' ${infraInitFile}", false, null, true).get('return')[0].values()[0].replaceAll('Salt command execution success', '').trim()
400 if (!fixApplied) {
401 def fixFileContent = []
402 def containsFix = salt.cmdRun(venvPepper, 'I@salt:master', "grep -E '^- system\\.linux\\.network\\.hosts\\.openstack\$' ${infraInitFile}", false, null, true).get('return')[0].values()[0].replaceAll('Salt command execution success', '').trim()
403 if (!containsFix) {
404 fixFileContent << '- system.linux.network.hosts.openstack'
405 }
406 if (salt.testTarget(venvPepper, 'I@gnocchi:server')) {
407 containsFix = salt.cmdRun(venvPepper, 'I@salt:master', "grep -E '^- system\\.linux\\.network\\.hosts\\.openstack\\.telemetry\$' ${infraInitFile}", false, null, true).get('return')[0].values()[0].replaceAll('Salt command execution success', '').trim()
408 if (!containsFix) {
409 fixFileContent << '- system.linux.network.hosts.openstack.telemetry'
410 }
411 }
412 if (salt.testTarget(venvPepper, 'I@manila:api')) {
413 containsFix = salt.cmdRun(venvPepper, 'I@salt:master', "grep -E '^- system\\.linux\\.network\\.hosts\\.openstack\\.share\$' ${infraInitFile}", false, null, true).get('return')[0].values()[0].replaceAll('Salt command execution success', '').trim()
414 if (!containsFix) {
415 fixFileContent << '- system.linux.network.hosts.openstack.share'
416 }
417 }
418 if (salt.testTarget(venvPepper, 'I@barbican:server')) {
419 containsFix = salt.cmdRun(venvPepper, 'I@salt:master', "grep -E '^- system\\.linux\\.network\\.hosts\\.openstack\\.kmn\$' ${infraInitFile}", false, null, true).get('return')[0].values()[0].replaceAll('Salt command execution success', '').trim()
420 if (!containsFix) {
421 fixFileContent << '- system.linux.network.hosts.openstack.kmn'
422 }
423 }
424 if (fixFileContent) {
425 salt.cmdRun(venvPepper, 'I@salt:master', "echo 'classes:\n${fixFileContent.join('\n')}' > ${fixFile}")
426 salt.cmdRun(venvPepper, 'I@salt:master', "sed -i '/^parameters:/i - cluster.${cluster_name}.infra.${fixName}' ${infraInitFile}")
Ivan Berezovskiy8699f3f2020-01-24 17:52:26 +0400427 salt.cmdRun(venvPepper, 'I@salt:master', "cd /srv/salt/reclass/classes/cluster/${cluster_name} && git status && git add ${fixFile}")
Denis Egorenkodb450152020-01-28 16:41:44 +0400428 }
429 }
430 }
431}
432
Ivan Berezovskiy8699f3f2020-01-24 17:52:26 +0400433def wa34528(String cluster_name) {
434 // Mysql users have to be defined on each Galera node
435 if(salt.getMinions(venvPepper, 'I@galera:master').isEmpty()) {
436 common.errorMsg('No Galera master found in cluster. Skipping')
437 return
438 }
439 def mysqlUsersMasterPillar = salt.getPillar(venvPepper, 'I@galera:master', 'mysql:server:database').get("return")[0].values()[0]
440 if (mysqlUsersMasterPillar == '' || mysqlUsersMasterPillar == 'null' || mysqlUsersMasterPillar == null) {
441 common.errorMsg('Pillar data is broken for Galera master node!')
442 input message: 'Do you want to ignore and continue without Galera pillar patch?'
443 return
444 }
445 def fileToPatch = salt.cmdRun(venvPepper, 'I@salt:master', "ls /srv/salt/reclass/classes/cluster/${cluster_name}/openstack/database/init.yml || " +
446 "ls /srv/salt/reclass/classes/cluster/${cluster_name}/openstack/database/slave.yml || echo 'File not found'", true, null, false).get('return')[0].values()[0].replaceAll('Salt command execution success', '').trim()
447 if (fileToPatch == 'File not found') {
448 common.errorMsg('Cluster model is old and cannot be patched for PROD-34528. Patching is possible for 2019.2.x cluster models only')
449 return
450 }
451 def patchRequired = false
452 def mysqlUsersSlavePillar = ''
453 def galeraSlaveNodes = salt.getMinions(venvPepper, 'I@galera:slave')
454 if (!galeraSlaveNodes.isEmpty()) {
455 for (galeraSlave in galeraSlaveNodes) {
456 mysqlUsersSlavePillar = salt.getPillar(venvPepper, galeraSlave, 'mysql:server:database').get("return")[0].values()[0]
457 if (mysqlUsersSlavePillar == '' || mysqlUsersSlavePillar == 'null' || mysqlUsersSlavePillar == null) {
458 common.errorMsg('Mysql users data is not defined for Galera slave nodes. Fixing...')
459 patchRequired = true
460 break
461 }
462 }
463 if (patchRequired) {
464 def fixFileContent = []
465 def fixName = 'db_wa34528'
466 def fixFile = "/srv/salt/reclass/classes/cluster/${cluster_name}/openstack/database/${fixName}.yml"
467 for (dbName in mysqlUsersMasterPillar.keySet()) {
468 def classIncluded = salt.cmdRun(venvPepper, 'I@salt:master', "grep -E '^- system\\.galera\\.server\\.database\\.${dbName}\$'" +
469 " /srv/salt/reclass/classes/cluster/${cluster_name}/openstack/database/master.yml", false, null, true).get('return')[0].values()[0].replaceAll('Salt command execution success', '').trim()
470 if(classIncluded) {
471 fixFileContent << "- system.galera.server.database.${dbName}"
472 }
473 def sslClassIncluded = salt.cmdRun(venvPepper, 'I@salt:master', "grep -E '^- system\\.galera\\.server\\.database\\.x509\\.${dbName}\$'" +
474 " /srv/salt/reclass/classes/cluster/${cluster_name}/openstack/database/master.yml", false, null, true).get('return')[0].values()[0].replaceAll('Salt command execution success', '').trim()
475 if(sslClassIncluded) {
476 fixFileContent << "- system.galera.server.database.x509.${dbName}"
477 }
478 }
479 if (fixFileContent) {
480 salt.cmdRun(venvPepper, 'I@salt:master', "echo 'classes:\n${fixFileContent.join('\n')}' > ${fixFile}")
481 salt.cmdRun(venvPepper, 'I@salt:master', "sed -i '/^parameters:/i - cluster.${cluster_name}.openstack.database.${fixName}' ${fileToPatch}")
482 }
483 salt.fullRefresh(venvPepper, 'I@galera:slave')
484 // Verify
485 for (galeraSlave in galeraSlaveNodes) {
486 mysqlUsersSlavePillar = salt.getPillar(venvPepper, galeraSlave, 'mysql:server:database').get("return")[0].values()[0]
487 if (mysqlUsersSlavePillar == '' || mysqlUsersSlavePillar == 'null' || mysqlUsersSlavePillar == null || mysqlUsersSlavePillar.keySet() != mysqlUsersMasterPillar.keySet()) {
488 common.errorMsg("Mysql user data is different on master and slave node ${galeraSlave}.")
489 input message: 'Do you want to ignore and continue?'
490 }
491 }
492 salt.cmdRun(venvPepper, 'I@salt:master', "cd /srv/salt/reclass/classes/cluster/${cluster_name} && git status && git add ${fixFile}")
493 common.infoMsg('Galera slaves patching is done')
494 } else {
495 common.infoMsg('Galera slaves patching is not required')
496 }
497 }
498}
499
azvyagintsev6dac3802018-11-09 15:11:30 +0200500def archiveReclassInventory(filename) {
Denis Egorenkoada83882019-06-11 14:03:40 +0400501 def _tmp_file = '/tmp/' + filename + UUID.randomUUID().toString().take(8)
502 // jenkins may fail at overheap. Compress data with gzip like WA
503 def ret = salt.cmdRun(venvPepper, 'I@salt:master', 'reclass -i 2>/dev/null | gzip -9 -c | base64', true, null, false).get('return')[0].values()[0].replaceAll('Salt command execution success', '').trim()
504 def _tmp = sh(script: "echo '$ret' > ${_tmp_file}", returnStdout: false)
505 sh(script: "cat ${_tmp_file} | base64 -d | gzip -d > $filename", returnStdout: false)
506 archiveArtifacts artifacts: filename
507 sh(script: "rm -v ${_tmp_file}|| true")
Richard Felkl0e80d892018-06-20 13:44:54 +0200508}
509
Denis Egorenkod13ad132018-12-17 16:56:02 +0400510def validateReclassModel(ArrayList saltMinions, String suffix) {
511 try {
Denis Egorenkoada83882019-06-11 14:03:40 +0400512 for (String minion in saltMinions) {
513 common.infoMsg("Reclass model validation for minion ${minion}...")
514 def reclassInv = salt.cmdRun(venvPepper, 'I@salt:master', "reclass -n ${minion}", true, null, false).get('return')[0].values()[0].replaceAll('Salt command execution success', '').trim()
515 writeFile file: "inventory-${minion}-${suffix}.out", text: reclassInv.toString()
Denis Egorenkod13ad132018-12-17 16:56:02 +0400516 }
517 } catch (Exception e) {
518 common.errorMsg('Can not validate current Reclass model. Inspect failed minion manually.')
Denis Egorenkoada83882019-06-11 14:03:40 +0400519 error(e.toString())
Denis Egorenkod13ad132018-12-17 16:56:02 +0400520 }
521}
522
Denis Egorenkoada83882019-06-11 14:03:40 +0400523def archiveReclassModelChanges(ArrayList saltMinions, String oldSuffix = 'before', String newSuffix = 'after') {
524 for (String minion in saltMinions) {
525 def fileName = "reclass-model-${minion}-diff.out"
526 sh "diff -u inventory-${minion}-${oldSuffix}.out inventory-${minion}-${newSuffix}.out > ${fileName} || true"
527 archiveArtifacts artifacts: "${fileName}"
Denis Egorenkod13ad132018-12-17 16:56:02 +0400528 }
529}
530
Denis Egorenkobf390102020-01-24 19:47:05 +0400531def checkCICDDocker() {
532 common.infoMsg('Perform: Checking if Docker containers are up')
533 try {
534 common.retry(10, 30) {
535 salt.cmdRun(venvPepper, 'I@jenkins:client and I@docker:client', "! docker service ls | tail -n +2 | grep -v -E '\\s([0-9])/\\1\\s'")
536 }
537 }
538 catch (Exception ex) {
539 error("Docker containers for CI/CD services are having troubles with starting.")
540 }
541}
542
Denis Egorenko5a8a7e92018-12-27 14:13:48 +0400543if (common.validInputParam('PIPELINE_TIMEOUT')) {
544 try {
545 pipelineTimeout = env.PIPELINE_TIMEOUT.toInteger()
Denis Egorenkoada83882019-06-11 14:03:40 +0400546 } catch (Exception e) {
Denis Egorenko5a8a7e92018-12-27 14:13:48 +0400547 common.warningMsg("Provided PIPELINE_TIMEOUT parameter has invalid value: ${env.PIPELINE_TIMEOUT} - should be interger")
548 }
Martin Polreich965c9032018-08-09 16:33:57 +0200549}
550
551timeout(time: pipelineTimeout, unit: 'HOURS') {
Denis Egorenkoada83882019-06-11 14:03:40 +0400552 node("python") {
Jakub Josefa63f9862018-01-11 17:58:38 +0100553 try {
Denis Egorenkoada83882019-06-11 14:03:40 +0400554 def inventoryBeforeFilename = "reclass-inventory-before.out"
555 def inventoryAfterFilename = "reclass-inventory-after.out"
Richard Felkl0e80d892018-06-20 13:44:54 +0200556 workspace = common.getWorkspace()
azvyagintsevf3bf77a2018-11-15 19:30:04 +0200557 targetMcpVersion = null
558 if (!common.validInputParam('TARGET_MCP_VERSION') && !common.validInputParam('MCP_VERSION')) {
559 error('You must specify MCP version in TARGET_MCP_VERSION|MCP_VERSION variable')
azvyagintsev6dac3802018-11-09 15:11:30 +0200560 }
azvyagintsevf3bf77a2018-11-15 19:30:04 +0200561 // bw comp. for 2018.X => 2018.11 release
Denis Egorenkoada83882019-06-11 14:03:40 +0400562 if (common.validInputParam('MCP_VERSION')) {
azvyagintsevf3bf77a2018-11-15 19:30:04 +0200563 targetMcpVersion = env.MCP_VERSION
564 common.warningMsg("targetMcpVersion has been changed to:${targetMcpVersion}, which was taken from deprecated pipeline viriable:MCP_VERSION")
Denis Egorenkoada83882019-06-11 14:03:40 +0400565 } else {
azvyagintsevf3bf77a2018-11-15 19:30:04 +0200566 targetMcpVersion = env.TARGET_MCP_VERSION
567 }
568 // end bw comp. for 2018.X => 2018.11 release
Denis Egorenkod13ad132018-12-17 16:56:02 +0400569 def gitTargetMcpVersion = env.getProperty('GIT_REFSPEC')
Ivan Berezovskiyd62629c2019-01-16 19:26:18 +0400570 if (targetMcpVersion in ['nightly', 'testing']) {
azvyagintsevf3bf77a2018-11-15 19:30:04 +0200571 gitTargetMcpVersion = 'master'
Ivan Berezovskiyd62629c2019-01-16 19:26:18 +0400572 } else if (targetMcpVersion == 'proposed') {
573 gitTargetMcpVersion = 'proposed'
Denis Egorenko284690e2018-12-25 15:55:12 +0400574 } else if (!gitTargetMcpVersion) {
575 // backward compatibility for 2018.11.0
576 gitTargetMcpVersion = "release/${targetMcpVersion}"
azvyagintsev6dac3802018-11-09 15:11:30 +0200577 }
Ivan Berezovskiyd62629c2019-01-16 19:26:18 +0400578 common.warningMsg("gitTargetMcpVersion has been changed to:${gitTargetMcpVersion}")
Denis Egorenko284690e2018-12-25 15:55:12 +0400579 def upgradeSaltStack = ''
580 def updateClusterModel = ''
Ivan Berezovskiycac04e42020-02-17 17:08:47 +0400581 def applyWorkarounds = true
Denis Egorenko284690e2018-12-25 15:55:12 +0400582 def updatePipelines = ''
583 def updateLocalRepos = ''
584 def reclassSystemBranch = ''
Denis Egorenkob559e542019-03-29 13:24:15 +0400585 def reclassSystemBranchDefault = gitTargetMcpVersion
Ivan Berezovskiy304705c2019-12-03 18:49:09 +0400586 if (gitTargetMcpVersion ==~ /^\d\d\d\d\.\d\d?\.\d+$/) {
587 reclassSystemBranchDefault = "tags/${gitTargetMcpVersion}"
588 } else if (gitTargetMcpVersion != 'proposed') {
Denis Egorenkob559e542019-03-29 13:24:15 +0400589 reclassSystemBranchDefault = "origin/${gitTargetMcpVersion}"
590 }
Hanna Arhipova644aefd2019-09-06 17:55:40 +0300591 def driveTrainParamsYaml = env.getProperty('DRIVE_TRAIN_PARAMS')
592 if (driveTrainParamsYaml) {
593 def driveTrainParams = readYaml text: driveTrainParamsYaml
594 saltMastURL = driveTrainParams.get('SALT_MASTER_URL')
595 saltMastCreds = driveTrainParams.get('SALT_MASTER_CREDENTIALS')
596 upgradeSaltStack = driveTrainParams.get('UPGRADE_SALTSTACK', false).toBoolean()
597 updateClusterModel = driveTrainParams.get('UPDATE_CLUSTER_MODEL', false).toBoolean()
598 updatePipelines = driveTrainParams.get('UPDATE_PIPELINES', false).toBoolean()
599 updateLocalRepos = driveTrainParams.get('UPDATE_LOCAL_REPOS', false).toBoolean()
600 reclassSystemBranch = driveTrainParams.get('RECLASS_SYSTEM_BRANCH', reclassSystemBranchDefault)
Denis Egorenko70002bc2019-08-19 19:41:27 +0400601 batchSize = driveTrainParams.get('BATCH_SIZE', '')
Denis Egorenkobf390102020-01-24 19:47:05 +0400602 if (driveTrainParams.get('OS_DIST_UPGRADE', false).toBoolean() == true) {
603 packageUpgradeMode = 'dist-upgrade'
604 } else if (driveTrainParams.get('OS_UPGRADE', false).toBoolean() == true) {
605 packageUpgradeMode = 'upgrade'
606 }
Ivan Berezovskiycac04e42020-02-17 17:08:47 +0400607 applyWorkarounds = driveTrainParams.get('APPLY_MODEL_WORKAROUNDS', true).toBoolean()
Denis Egorenko284690e2018-12-25 15:55:12 +0400608 } else {
609 // backward compatibility for 2018.11.0
610 saltMastURL = env.getProperty('SALT_MASTER_URL')
611 saltMastCreds = env.getProperty('SALT_MASTER_CREDENTIALS')
Denis Egorenkoe5f39142018-12-28 12:30:48 +0400612 upgradeSaltStack = env.getProperty('UPGRADE_SALTSTACK').toBoolean()
613 updateClusterModel = env.getProperty('UPDATE_CLUSTER_MODEL').toBoolean()
614 updatePipelines = env.getProperty('UPDATE_PIPELINES').toBoolean()
615 updateLocalRepos = env.getProperty('UPDATE_LOCAL_REPOS').toBoolean()
Denis Egorenkob559e542019-03-29 13:24:15 +0400616 reclassSystemBranch = reclassSystemBranchDefault
Denis Egorenko284690e2018-12-25 15:55:12 +0400617 }
Denis Egorenkod13ad132018-12-17 16:56:02 +0400618 python.setupPepperVirtualenv(venvPepper, saltMastURL, saltMastCreds)
Denis Egorenkod13ad132018-12-17 16:56:02 +0400619 def minions = salt.getMinions(venvPepper, '*')
Denis Egorenkoc0538ce2019-04-19 15:05:18 +0400620 def cluster_name = salt.getPillar(venvPepper, 'I@salt:master', "_param:cluster_name").get("return")[0].values()[0]
621 if (cluster_name == '' || cluster_name == 'null' || cluster_name == null) {
622 error('Pillar data is broken for Salt master node! Please check it manually and re-run pipeline.')
623 }
Hanna Arhipova644aefd2019-09-06 17:55:40 +0300624 if (!batchSize) {
Denis Egorenko9ef25b92019-12-19 16:45:25 +0400625 // if no batch size provided get current worker threads and set batch size to 2/3 of it to avoid
626 // 'SaltReqTimeoutError: Message timed out' issue on Salt targets for large amount of nodes
627 // do not use toDouble/Double as it requires additional approved method
628 def workerThreads = getWorkerThreads(venvPepper).toInteger()
Ivan Berezovskiycac04e42020-02-17 17:08:47 +0400629 batchSize = (workerThreads * 2 / 3).toString().tokenize('.')[0]
Denis Egorenko70002bc2019-08-19 19:41:27 +0400630 }
Ivan Berezovskiy304705c2019-12-03 18:49:09 +0400631 def computeMinions = salt.getMinions(venvPepper, 'I@nova:compute')
Ivan Berezovskiy224eb8e2020-03-19 14:03:43 +0400632 def allMinions = salt.getMinions(venvPepper, '*')
Denis Egorenkod13ad132018-12-17 16:56:02 +0400633
Denis Egorenkoada83882019-06-11 14:03:40 +0400634 stage('Update Reclass and Salt-Formulas') {
635 common.infoMsg('Perform: Full salt sync')
Ivan Berezovskiy224eb8e2020-03-19 14:03:43 +0400636 fullRefreshOneByOne(venvPepper, allMinions)
Oleksii Molchanov911749c2020-03-13 13:28:10 +0200637
638 check_34406(cluster_name)
639
Denis Egorenkoada83882019-06-11 14:03:40 +0400640 common.infoMsg('Perform: Validate reclass medata before processing')
641 validateReclassModel(minions, 'before')
642
643 common.infoMsg('Perform: archiveReclassInventory before upgrade')
Denis Egorenko89a3c572019-03-22 17:03:40 +0400644 archiveReclassInventory(inventoryBeforeFilename)
Denis Egorenkod13ad132018-12-17 16:56:02 +0400645
azvyagintsev6dac3802018-11-09 15:11:30 +0200646 try {
Denis Egorenkoada83882019-06-11 14:03:40 +0400647 salt.cmdRun(venvPepper, 'I@salt:master', 'cd /srv/salt/reclass/ && git status && git diff-index --quiet HEAD --')
Richard Felkl970e0082018-06-12 18:00:51 +0200648 }
azvyagintsev6dac3802018-11-09 15:11:30 +0200649 catch (Exception ex) {
Denis Egorenkoada83882019-06-11 14:03:40 +0400650 error('You have uncommitted changes in your Reclass cluster model repository. Please commit or reset them and rerun the pipeline.')
Richard Felkl970e0082018-06-12 18:00:51 +0200651 }
Denis Egorenkod13ad132018-12-17 16:56:02 +0400652 if (updateClusterModel) {
azvyagintsev6dac3802018-11-09 15:11:30 +0200653 common.infoMsg('Perform: UPDATE_CLUSTER_MODEL')
Sergey382581a2018-10-25 12:22:26 +0400654 def dateTime = common.getDatetime()
Ivan Berezovskiy1d780522020-01-17 13:55:18 +0400655 salt.cmdRun(venvPepper, 'I@salt:master', "cd /srv/salt/reclass/classes/system && git fetch")
Sergey382581a2018-10-25 12:22:26 +0400656 salt.cmdRun(venvPepper, 'I@salt:master', "cd /srv/salt/reclass/classes/cluster/$cluster_name && " +
Denis Egorenko928b3e82019-01-15 11:47:16 +0400657 "grep -r --exclude-dir=aptly -l 'mcp_version: .*' * | xargs --no-run-if-empty sed -i 's|mcp_version: .*|mcp_version: \"$targetMcpVersion\"|g'")
azvyagintsev6dac3802018-11-09 15:11:30 +0200658 // Do the same, for deprecated variable-duplicate
659 salt.cmdRun(venvPepper, 'I@salt:master', "cd /srv/salt/reclass/classes/cluster/$cluster_name && " +
Denis Egorenko928b3e82019-01-15 11:47:16 +0400660 "grep -r --exclude-dir=aptly -l 'apt_mk_version: .*' * | xargs --no-run-if-empty sed -i 's|apt_mk_version: .*|apt_mk_version: \"$targetMcpVersion\"|g'")
Denis Egorenko284690e2018-12-25 15:55:12 +0400661 salt.cmdRun(venvPepper, 'I@salt:master', "cd /srv/salt/reclass/classes/cluster/$cluster_name && " +
Denis Egorenko928b3e82019-01-15 11:47:16 +0400662 "grep -r --exclude-dir=aptly -l 'jenkins_pipelines_branch: .*' * | xargs --no-run-if-empty sed -i 's|jenkins_pipelines_branch: .*|jenkins_pipelines_branch: \"$gitTargetMcpVersion\"|g'")
Victor Ryzhenkin202c5062019-01-15 19:58:03 +0400663 // Set new k8s param
664 salt.cmdRun(venvPepper, 'I@salt:master', "cd /srv/salt/reclass/classes/cluster/$cluster_name && " +
665 "grep -r --exclude-dir=aptly -l 'kubernetes_containerd_enabled: .*' * | xargs --no-run-if-empty sed -i 's|kubernetes_containerd_enabled: .*|kubernetes_containerd_enabled: True|g'")
Denis Egorenko2a39d2c2019-01-16 19:18:31 +0400666 salt.cmdRun(venvPepper, 'I@salt:master', "cd /srv/salt/reclass/classes/cluster/$cluster_name && " +
667 "grep -r --exclude-dir=aptly -l 'system.linux.system.repo.mcp.salt' * | xargs --no-run-if-empty sed -i 's/system.linux.system.repo.mcp.salt/system.linux.system.repo.mcp.apt_mirantis.salt-formulas/g'")
668 salt.cmdRun(venvPepper, 'I@salt:master', "cd /srv/salt/reclass/classes/cluster/$cluster_name && " +
Denis Egorenkoca871c22019-02-13 13:49:13 +0400669 "grep -r --exclude-dir=aptly -l 'system.linux.system.repo.mcp.contrail' * | xargs --no-run-if-empty sed -i 's/system.linux.system.repo.mcp.contrail/system.linux.system.repo.mcp.apt_mirantis.contrail/g'")
Denis Egorenko2a39d2c2019-01-16 19:18:31 +0400670 salt.cmdRun(venvPepper, 'I@salt:master', "cd /srv/salt/reclass/classes/cluster/$cluster_name && " +
Denis Egorenkoca871c22019-02-13 13:49:13 +0400671 "grep -r --exclude-dir=aptly -l 'system.linux.system.repo.mcp.updates' * | xargs --no-run-if-empty sed -i 's/system.linux.system.repo.mcp.updates/system.linux.system.repo.mcp.apt_mirantis.update/g'")
Anton Samoylov72c2ccf2019-02-13 15:57:13 +0400672 salt.cmdRun(venvPepper, 'I@salt:master', "cd /srv/salt/reclass/classes/cluster/$cluster_name && " +
Denis Egorenkoada83882019-06-11 14:03:40 +0400673 "grep -r --exclude-dir=aptly -l 'system.linux.system.repo.mcp.extra' * | xargs --no-run-if-empty sed -i 's/system.linux.system.repo.mcp.extra/system.linux.system.repo.mcp.apt_mirantis.extra/g'")
Denis Egorenko6ca9f0d2019-07-10 19:47:39 +0400674
Denis Egorenko70f4f9a2019-09-16 16:41:26 +0400675 salt.cmdRun(venvPepper, 'I@salt:master', "cd /srv/salt/reclass/classes/cluster/$cluster_name/infra && sed -i '/linux_system_repo_mcp_maas_url/d' maas.yml")
676 salt.cmdRun(venvPepper, 'I@salt:master', "cd /srv/salt/reclass/classes/cluster/$cluster_name/infra && sed -i '/maas_region_main_archive/d' maas.yml")
677
Denis Egorenko6ca9f0d2019-07-10 19:47:39 +0400678 // Switch Jenkins/Gerrit to use LDAP SSL/TLS
679 def gerritldapURI = salt.cmdRun(venvPepper, 'I@salt:master', "cd /srv/salt/reclass/classes/cluster/$cluster_name && " +
680 "grep -r --exclude-dir=aptly 'gerrit_ldap_server: .*' * | grep -Po 'gerrit_ldap_server: \\K.*' | tr -d '\"'", true, null, false).get('return')[0].values()[0].replaceAll('Salt command execution success', '').trim()
681 if (gerritldapURI.startsWith('ldap://')) {
682 salt.cmdRun(venvPepper, 'I@salt:master', "cd /srv/salt/reclass/classes/cluster/$cluster_name && " +
683 "grep -r --exclude-dir=aptly -l 'gerrit_ldap_server: .*' * | xargs --no-run-if-empty sed -i 's|ldap://|ldaps://|g'")
684 } else if (! gerritldapURI.startsWith('ldaps://')) {
685 salt.cmdRun(venvPepper, 'I@salt:master', "cd /srv/salt/reclass/classes/cluster/$cluster_name && " +
686 "grep -r --exclude-dir=aptly -l 'gerrit_ldap_server: .*' * | xargs --no-run-if-empty sed -i 's|gerrit_ldap_server: .*|gerrit_ldap_server: \"ldaps://${gerritldapURI}\"|g'")
687 }
688 def jenkinsldapURI = salt.cmdRun(venvPepper, 'I@salt:master', "cd /srv/salt/reclass/classes/cluster/$cluster_name && " +
689 "grep -r --exclude-dir=aptly 'jenkins_security_ldap_server: .*' * | grep -Po 'jenkins_security_ldap_server: \\K.*' | tr -d '\"'", true, null, false).get('return')[0].values()[0].replaceAll('Salt command execution success', '').trim()
690 if (jenkinsldapURI.startsWith('ldap://')) {
691 salt.cmdRun(venvPepper, 'I@salt:master', "cd /srv/salt/reclass/classes/cluster/$cluster_name && " +
692 "grep -r --exclude-dir=aptly -l 'jenkins_security_ldap_server: .*' * | xargs --no-run-if-empty sed -i 's|ldap://|ldaps://|g'")
693 } else if (! jenkinsldapURI.startsWith('ldaps://')) {
694 salt.cmdRun(venvPepper, 'I@salt:master', "cd /srv/salt/reclass/classes/cluster/$cluster_name && " +
695 "grep -r --exclude-dir=aptly -l 'jenkins_security_ldap_server: .*' * | xargs --no-run-if-empty sed -i 's|jenkins_security_ldap_server: .*|jenkins_security_ldap_server: \"ldaps://${jenkinsldapURI}\"|g'")
696 }
697
Ivan Berezovskiycac04e42020-02-17 17:08:47 +0400698 if (applyWorkarounds) {
699 wa32284(cluster_name)
700 wa34245(cluster_name)
701 }
Denis Egorenkobae9dc72019-07-29 17:44:46 +0400702
Denis Egorenkod13ad132018-12-17 16:56:02 +0400703 salt.cmdRun(venvPepper, 'I@salt:master', "cd /srv/salt/reclass/classes/system && git checkout ${reclassSystemBranch}")
Sergey Kolekonov6ab15112019-01-23 16:47:43 +0400704 // Add kubernetes-extra repo
705 if (salt.testTarget(venvPepper, "I@kubernetes:master")) {
Sergey Kolekonovac9554c2019-04-11 16:33:54 +0400706 // docker-engine conflicts with the recent containerd versions, so it's removed during upgrade. Thus update source engine
707 salt.cmdRun(venvPepper, 'I@salt:master', "cd /srv/salt/reclass/classes/cluster/$cluster_name && " +
708 "grep -r -l 'engine: docker_hybrid' kubernetes | xargs --no-run-if-empty sed -i 's/engine: docker_hybrid/engine: archive/g'")
Sergey Kolekonov6ab15112019-01-23 16:47:43 +0400709 common.infoMsg("Add kubernetes-extra repo")
710 salt.cmdRun(venvPepper, 'I@salt:master', "cd /srv/salt/reclass/classes/cluster/$cluster_name && " +
711 "grep -q system.linux.system.repo.mcp.apt_mirantis.update.kubernetes_extra kubernetes/common.yml || sed -i '/classes:/ a - system.linux.system.repo.mcp.apt_mirantis.update.kubernetes_extra' kubernetes/common.yml")
712 salt.cmdRun(venvPepper, 'I@salt:master', "cd /srv/salt/reclass/classes/cluster/$cluster_name && " +
713 "grep -q system.linux.system.repo.mcp.apt_mirantis.kubernetes_extra kubernetes/common.yml || sed -i '/classes:/ a - system.linux.system.repo.mcp.apt_mirantis.kubernetes_extra' kubernetes/common.yml")
714 }
Ivan Berezovskiybe630ee2019-04-15 13:23:58 +0400715 // Add all update repositories
716 def repoIncludeBase = '- system.linux.system.repo.mcp.apt_mirantis.'
Denis Egorenko70f4f9a2019-09-16 16:41:26 +0400717 def updateRepoList = ['cassandra', 'ceph', 'contrail', 'docker', 'elastic', 'extra', 'openstack', 'maas', 'percona', 'salt-formulas', 'saltstack', 'ubuntu']
Ivan Berezovskiybe630ee2019-04-15 13:23:58 +0400718 updateRepoList.each { repo ->
719 def repoNameUpdateInclude = "${repoIncludeBase}update.${repo}"
720 def filesWithInclude = salt.cmdRun(venvPepper, 'I@salt:master', "cd /srv/salt/reclass/classes/cluster/$cluster_name && grep -Plr '\\${repoIncludeBase}${repo}\$' . || true", false).get('return')[0].values()[0].trim().tokenize('\n')
721 filesWithInclude.each { file ->
722 def updateRepoIncludeExist = salt.cmdRun(venvPepper, 'I@salt:master', "cd /srv/salt/reclass/classes/cluster/$cluster_name && grep -P '\\${repoNameUpdateInclude}\$' ${file} || echo not_found", false, null, true).get('return')[0].values()[0].trim()
723 if (updateRepoIncludeExist == 'not_found') {
724 // Include needs to be added
725 salt.cmdRun(venvPepper, 'I@salt:master', "cd /srv/salt/reclass/classes/cluster/$cluster_name && " +
Denis Egorenkoada83882019-06-11 14:03:40 +0400726 "sed -i 's/\\( *\\)${repoIncludeBase}${repo}\$/&\\n\\1${repoNameUpdateInclude}/g' ${file}")
Ivan Berezovskiybe630ee2019-04-15 13:23:58 +0400727 common.infoMsg("Update repo for ${repo} is added to ${file}")
728 }
729 }
730 }
Ivan Berezovskiycac04e42020-02-17 17:08:47 +0400731 if (applyWorkarounds) {
732 wa32182(cluster_name)
733 wa33771(cluster_name)
734 wa33867(cluster_name)
735 wa33930_33931(cluster_name)
736 wa34528(cluster_name)
737 }
Sergey382581a2018-10-25 12:22:26 +0400738 // Add new defaults
739 common.infoMsg("Add new defaults")
Denis Egorenkod13ad132018-12-17 16:56:02 +0400740 salt.cmdRun(venvPepper, 'I@salt:master', "grep '^ mcp_version: ' /srv/salt/reclass/classes/cluster/$cluster_name/infra/init.yml || " +
Denis Egorenko928b3e82019-01-15 11:47:16 +0400741 "sed -i 's|^ _param:| _param:\\n mcp_version: \"$targetMcpVersion\"|' /srv/salt/reclass/classes/cluster/$cluster_name/infra/init.yml")
Sergey382581a2018-10-25 12:22:26 +0400742 salt.cmdRun(venvPepper, 'I@salt:master', "grep '^- system.defaults\$' /srv/salt/reclass/classes/cluster/$cluster_name/infra/init.yml || " +
Denis Egorenko928b3e82019-01-15 11:47:16 +0400743 "sed -i 's|^classes:|classes:\\n- system.defaults|' /srv/salt/reclass/classes/cluster/$cluster_name/infra/init.yml")
Ivan Berezovskiyadb7d832019-04-23 14:32:02 +0400744 salt.cmdRun(venvPepper, 'I@salt:master', "cd /srv/salt/reclass/classes/cluster/$cluster_name && " +
745 "grep -r -l 'docker_image_jenkins: .*' cicd | xargs --no-run-if-empty sed -i 's|\\s*docker_image_jenkins: .*||g'")
746 salt.cmdRun(venvPepper, 'I@salt:master', "cd /srv/salt/reclass/classes/cluster/$cluster_name && " +
747 "grep -r -l 'docker_image_jenkins_slave: .*' cicd | xargs --no-run-if-empty sed -i 's|\\s*docker_image_jenkins_slave: .*||g'")
Sergey382581a2018-10-25 12:22:26 +0400748 common.infoMsg("The following changes were made to the cluster model and will be commited. " +
azvyagintsev6dac3802018-11-09 15:11:30 +0200749 "Please consider if you want to push them to the remote repository or not. You have to do this manually when the run is finished.")
Sergey382581a2018-10-25 12:22:26 +0400750 salt.cmdRun(venvPepper, 'I@salt:master', "cd /srv/salt/reclass/classes/cluster/$cluster_name && git diff")
751 salt.cmdRun(venvPepper, 'I@salt:master', "cd /srv/salt/reclass/classes/cluster/$cluster_name && git status && " +
azvyagintsevf3bf77a2018-11-15 19:30:04 +0200752 "git add -u && git commit --allow-empty -m 'Cluster model update to the release $targetMcpVersion on $dateTime'")
Sergey382581a2018-10-25 12:22:26 +0400753 }
Denis Egorenkod13ad132018-12-17 16:56:02 +0400754 try {
755 common.infoMsg('Perform: UPDATE Salt Formulas')
Ivan Berezovskiy224eb8e2020-03-19 14:03:43 +0400756 fullRefreshOneByOne(venvPepper, allMinions)
757 salt.enforceState(venvPepper, 'I@salt:master', 'linux.system.repo', true, true, null, false, 60, 2)
Denis Egorenkod13ad132018-12-17 16:56:02 +0400758 def saltEnv = salt.getPillar(venvPepper, 'I@salt:master', "_param:salt_master_base_environment").get("return")[0].values()[0]
Denis Egorenkoada83882019-06-11 14:03:40 +0400759 salt.runSaltProcessStep(venvPepper, 'I@salt:master', 'state.sls_id', ["salt_master_${saltEnv}_pkg_formulas", 'salt.master.env'])
Ivan Berezovskiy224eb8e2020-03-19 14:03:43 +0400760 fullRefreshOneByOne(venvPepper, allMinions)
Denis Egorenkod13ad132018-12-17 16:56:02 +0400761 } catch (Exception updateErr) {
762 common.warningMsg(updateErr)
763 common.warningMsg('Failed to update Salt Formulas repos/packages. Check current available documentation on https://docs.mirantis.com/mcp/latest/, how to update packages.')
764 input message: 'Continue anyway?'
765 }
Ivan Berezovskiycac04e42020-02-17 17:08:47 +0400766 if (applyWorkarounds) {
767 wa29352(cluster_name)
768 wa29155(computeMinions, cluster_name)
769 }
Denis Egorenkoada83882019-06-11 14:03:40 +0400770
Denis Egorenkod13ad132018-12-17 16:56:02 +0400771 try {
772 common.infoMsg('Perform: UPDATE Reclass package')
773 salt.runSaltProcessStep(venvPepper, 'I@salt:master', 'pkg.install', ["reclass"])
774 } catch (Exception updateErr) {
775 common.warningMsg(updateErr)
776 common.warningMsg('Failed to update Reclass package. Check current available documentation on https://docs.mirantis.com/mcp/latest/, how to update packages.')
777 input message: 'Continue anyway?'
778 }
779
780 salt.fullRefresh(venvPepper, 'I@salt:master')
Sergey1b81c062018-10-16 17:10:21 +0400781 salt.enforceState(venvPepper, 'I@salt:master', 'reclass.storage', true)
Ivan Berezovskiy304705c2019-12-03 18:49:09 +0400782 salt.cmdRun(venvPepper, 'I@salt:master', "cd /srv/salt/reclass/classes/cluster/${cluster_name} && git status && " +
783 "git add -u && git commit --allow-empty -m 'Reclass nodes update to the release ${targetMcpVersion} on ${common.getDatetime()}'")
Denis Egorenkod13ad132018-12-17 16:56:02 +0400784 try {
785 salt.enforceState(venvPepper, "I@salt:master", 'reclass', true)
786 }
787 catch (Exception ex) {
788 error("Reclass fails rendering. Pay attention to your cluster model.")
789 }
790
Ivan Berezovskiy224eb8e2020-03-19 14:03:43 +0400791 fullRefreshOneByOne(venvPepper, allMinions)
Denis Egorenkod13ad132018-12-17 16:56:02 +0400792 try {
793 salt.cmdRun(venvPepper, 'I@salt:master', "reclass-salt --top")
794 }
795 catch (Exception ex) {
Denis Egorenkoada83882019-06-11 14:03:40 +0400796
797 error('Reclass fails rendering. Pay attention to your cluster model.' +
798 'ErrorMessage:' + ex.toString())
Denis Egorenkod13ad132018-12-17 16:56:02 +0400799 }
800
Denis Egorenkoada83882019-06-11 14:03:40 +0400801 common.infoMsg('Perform: archiveReclassInventory AFTER upgrade')
Denis Egorenkod13ad132018-12-17 16:56:02 +0400802 archiveReclassInventory(inventoryAfterFilename)
803
804 sh "diff -u $inventoryBeforeFilename $inventoryAfterFilename > reclass-inventory-diff.out || true"
805 archiveArtifacts artifacts: "reclass-inventory-diff.out"
806
Denis Egorenkoada83882019-06-11 14:03:40 +0400807 validateReclassModel(minions, 'after')
808 archiveReclassModelChanges(minions)
Jakub Josefa63f9862018-01-11 17:58:38 +0100809 }
Richard Felkl26cae4d2017-12-19 00:19:16 +0100810
Denis Egorenkod13ad132018-12-17 16:56:02 +0400811 if (updateLocalRepos) {
azvyagintsev6dac3802018-11-09 15:11:30 +0200812 stage("Update local repos") {
Jakub Josefa63f9862018-01-11 17:58:38 +0100813 common.infoMsg("Updating local repositories")
Sam Stoelingaaab79702018-04-09 18:49:39 -0700814
Sergey1b81c062018-10-16 17:10:21 +0400815 def engine = salt.getPillar(venvPepper, 'I@aptly:publisher', "aptly:publisher:source:engine")
Sam Stoelingaaab79702018-04-09 18:49:39 -0700816 runningOnDocker = engine.get("return")[0].containsValue("docker")
817
818 if (runningOnDocker) {
819 common.infoMsg("Aptly is running as Docker container")
azvyagintsev6dac3802018-11-09 15:11:30 +0200820 } else {
Sam Stoelingaaab79702018-04-09 18:49:39 -0700821 common.infoMsg("Aptly isn't running as Docker container. Going to use aptly user for executing aptly commands")
822 }
823
azvyagintsev6dac3802018-11-09 15:11:30 +0200824 if (runningOnDocker) {
azvyagintsevf3bf77a2018-11-15 19:30:04 +0200825 salt.cmdRun(venvPepper, 'I@aptly:publisher', "aptly mirror list --raw | grep -E '*' | xargs --no-run-if-empty -n 1 aptly mirror drop -force", true, null, true)
azvyagintsev6dac3802018-11-09 15:11:30 +0200826 } else {
azvyagintsevf3bf77a2018-11-15 19:30:04 +0200827 salt.cmdRun(venvPepper, 'I@aptly:publisher', "aptly mirror list --raw | grep -E '*' | xargs --no-run-if-empty -n 1 aptly mirror drop -force", true, null, true, ['runas=aptly'])
Richard Felkl5f7fdaf2018-02-15 15:38:31 +0100828 }
Richard Felkl26cae4d2017-12-19 00:19:16 +0100829
Sergey1b81c062018-10-16 17:10:21 +0400830 salt.enforceState(venvPepper, 'I@aptly:publisher', 'aptly', true)
Richard Felkl26cae4d2017-12-19 00:19:16 +0100831
azvyagintsev6dac3802018-11-09 15:11:30 +0200832 if (runningOnDocker) {
Sergey1b81c062018-10-16 17:10:21 +0400833 salt.runSaltProcessStep(venvPepper, 'I@aptly:publisher', 'cmd.script', ['salt://aptly/files/aptly_mirror_update.sh', "args=-sv"], null, true)
834 salt.runSaltProcessStep(venvPepper, 'I@aptly:publisher', 'cmd.script', ['salt://aptly/files/aptly_publish_update.sh', "args=-frv -u http://10.99.0.1:8080"], null, true)
azvyagintsev6dac3802018-11-09 15:11:30 +0200835 } else {
Sergey1b81c062018-10-16 17:10:21 +0400836 salt.runSaltProcessStep(venvPepper, 'I@aptly:publisher', 'cmd.script', ['salt://aptly/files/aptly_mirror_update.sh', "args=-sv", 'runas=aptly'], null, true)
837 salt.runSaltProcessStep(venvPepper, 'I@aptly:publisher', 'cmd.script', ['salt://aptly/files/aptly_publish_update.sh', "args=-afrv", 'runas=aptly'], null, true)
Richard Felkl5f7fdaf2018-02-15 15:38:31 +0100838 }
Richard Felkl79d7df12018-01-05 16:40:11 +0100839
Sergey1b81c062018-10-16 17:10:21 +0400840 salt.enforceState(venvPepper, 'I@aptly:publisher', 'docker.client.registry', true)
Richard Felkl26cae4d2017-12-19 00:19:16 +0100841
Sergey1b81c062018-10-16 17:10:21 +0400842 salt.enforceState(venvPepper, 'I@aptly:publisher', 'debmirror', true)
Richard Felkl26cae4d2017-12-19 00:19:16 +0100843
Sergey1b81c062018-10-16 17:10:21 +0400844 salt.enforceState(venvPepper, 'I@aptly:publisher', 'git.server', true)
Richard Felkl5f7fdaf2018-02-15 15:38:31 +0100845
Sergey1b81c062018-10-16 17:10:21 +0400846 salt.enforceState(venvPepper, 'I@aptly:publisher', 'linux.system.file', true)
Jakub Josefa63f9862018-01-11 17:58:38 +0100847 }
848 }
Richard Felkl26cae4d2017-12-19 00:19:16 +0100849
Denis Egorenkoada83882019-06-11 14:03:40 +0400850 stage('Update Drivetrain') {
Oleksii Molchanov63a069d2020-05-15 13:33:45 +0300851 salt.enforceState(venvPepper, '*', 'linux.system.package', true, true, batchSize, false, 60, 2)
852
Denis Egorenkod13ad132018-12-17 16:56:02 +0400853 if (upgradeSaltStack) {
854 updateSaltStack("I@salt:master", '["salt-master", "salt-common", "salt-api", "salt-minion"]')
Richard Felkl0e80d892018-06-20 13:44:54 +0200855
Denis Egorenko70002bc2019-08-19 19:41:27 +0400856 salt.enforceState(venvPepper, "I@linux:system", 'linux.system.repo', true, true, batchSize)
Richard Felkl0e80d892018-06-20 13:44:54 +0200857 updateSaltStack("I@salt:minion and not I@salt:master", '["salt-minion"]')
858 }
859
Denis Egorenkod13ad132018-12-17 16:56:02 +0400860 if (updatePipelines) {
Denis Egorenkoada83882019-06-11 14:03:40 +0400861 common.infoMsg('Perform: UPDATE git repos')
862 triggerMirrorJob('git-mirror-downstream-mk-pipelines', reclassSystemBranch)
863 triggerMirrorJob('git-mirror-downstream-pipeline-library', reclassSystemBranch)
Richard Felkl970e0082018-06-12 18:00:51 +0200864 }
865
Denis Egorenkod00c17e2019-04-25 20:17:27 +0400866 // update minions certs
Denis Egorenko70002bc2019-08-19 19:41:27 +0400867 salt.enforceState(venvPepper, "I@salt:minion", 'salt.minion.cert', true, true, batchSize)
Denis Egorenkoada83882019-06-11 14:03:40 +0400868
Ivan Berezovskiycac04e42020-02-17 17:08:47 +0400869 // run `salt.minion` to refresh all minion configs (for example _keystone.conf)
870 salt.enforceState(venvPepper, 'I@salt:minion', 'salt.minion', true, true, batchSize, false, 60, 2)
Denis Egorenkoada83882019-06-11 14:03:40 +0400871 // Retry needed only for rare race-condition in user appearance
872 common.infoMsg('Perform: updating users and keys')
Denis Egorenko70002bc2019-08-19 19:41:27 +0400873 salt.enforceState(venvPepper, "I@linux:system", 'linux.system.user', true, true, batchSize)
Denis Egorenkoada83882019-06-11 14:03:40 +0400874 common.infoMsg('Perform: updating openssh')
Denis Egorenko70002bc2019-08-19 19:41:27 +0400875 salt.enforceState(venvPepper, "I@linux:system", 'openssh', true, true, batchSize)
Denis Egorenkoaeaa1de2019-01-15 11:58:12 +0400876
Denis Egorenkoe69920e2019-10-30 13:26:59 +0400877 // Gerrit 2019.2.0 (2.13.6) version has wrong file name for download-commands plugin and was not loaded, let's remove if still there before upgrade
878 def gerritGlusterPath = salt.getPillar(venvPepper, 'I@gerrit:client', 'glusterfs:client:volumes:gerrit:path').get('return')[0].values()[0]
879 def wrongPluginJarName = "${gerritGlusterPath}/plugins/project-download-commands.jar"
Ivan Berezovskiy304705c2019-12-03 18:49:09 +0400880 salt.cmdRun(venvPepper, 'I@gerrit:client', "test -f ${wrongPluginJarName} && rm ${wrongPluginJarName} || true")
Denis Egorenkoe69920e2019-10-30 13:26:59 +0400881
Ivan Berezovskiy48cc4212020-03-19 19:11:27 +0400882 salt.enforceStateWithTest(venvPepper, 'I@jenkins:client:security and not I@salt:master', 'jenkins.client.security', "", true, true, null, true, 60, 2)
Ivan Berezovskiyf8139a82020-02-27 15:21:57 +0400883 salt.enforceStateWithTest(venvPepper, 'I@jenkins:client and I@docker:client:images and not I@salt:master', 'docker.client.images', "", true, true, null, true, 60, 2)
Denis Egorenkoada83882019-06-11 14:03:40 +0400884 salt.cmdRun(venvPepper, "I@salt:master", "salt -C 'I@jenkins:client and I@docker:client and not I@salt:master' state.sls docker.client --async")
Ivan Berezovskiy24b0be02019-12-11 15:31:10 +0400885 }
886 }
887 catch (Throwable e) {
888 // If there was an error or exception thrown, the build failed
889 currentBuild.result = "FAILURE"
890 throw e
891 }
892 }
893 // docker.client state may trigger change of jenkins master or jenkins slave services,
894 // so we need wait for slave to reconnect and continue pipeline
895 sleep(180)
Denis Egorenkobf390102020-01-24 19:47:05 +0400896 def cidNodes = []
Ivan Berezovskiy24b0be02019-12-11 15:31:10 +0400897 node('python') {
898 try {
899 stage('Update Drivetrain: Phase 2') {
900 python.setupPepperVirtualenv(venvPepper, saltMastURL, saltMastCreds)
Denis Egorenkobf390102020-01-24 19:47:05 +0400901 checkCICDDocker()
Denis Egorenko6ca9f0d2019-07-10 19:47:39 +0400902
Ivan Berezovskiy304705c2019-12-03 18:49:09 +0400903 // Apply changes for HaProxy on CI/CD nodes
904 salt.enforceState(venvPepper, 'I@keepalived:cluster:instance:cicd_control_vip and I@haproxy:proxy', 'haproxy.proxy', true)
Valeriy Sakharov86a394b2020-04-06 16:46:39 +0400905 salt.upgradePackageAndRestartSaltMinion(venvPepper, 'I@jenkins:client and not I@salt:master', 'python-jenkins')
Ivan Berezovskiy304705c2019-12-03 18:49:09 +0400906 salt.enforceState(venvPepper, 'I@jenkins:client and not I@salt:master', 'jenkins.client', true, true, null, false, 60, 2)
Denis Egorenko84a0bc02019-07-23 18:01:21 +0400907
908 // update Nginx proxy settings for Jenkins/Gerrit if needed
909 if (salt.testTarget(venvPepper, 'I@nginx:server:site:nginx_proxy_jenkins and I@nginx:server:site:nginx_proxy_gerrit')) {
910 salt.enforceState(venvPepper, 'I@nginx:server:site:nginx_proxy_jenkins and I@nginx:server:site:nginx_proxy_gerrit', 'nginx.server', true, true, null, false, 60, 2)
911 }
Richard Felkl26cae4d2017-12-19 00:19:16 +0100912 }
Denis Egorenkobf390102020-01-24 19:47:05 +0400913 if (packageUpgradeMode) {
914 cidNodes = salt.getMinions(venvPepper, 'I@_param:drivetrain_role:cicd')
915 }
Richard Felkl26cae4d2017-12-19 00:19:16 +0100916 }
Jakub Josefa63f9862018-01-11 17:58:38 +0100917 catch (Throwable e) {
918 // If there was an error or exception thrown, the build failed
919 currentBuild.result = "FAILURE"
920 throw e
Richard Felkl26cae4d2017-12-19 00:19:16 +0100921 }
Richard Felkl26cae4d2017-12-19 00:19:16 +0100922 }
Denis Egorenkobf390102020-01-24 19:47:05 +0400923
924 stage('Upgrade OS') {
925 if (packageUpgradeMode) {
926 def debian = new com.mirantis.mk.Debian()
927 def statusFile = '/tmp/rebooted_during_upgrade'
928 for(cidNode in cidNodes) {
929 node('python') {
930 python.setupPepperVirtualenv(venvPepper, saltMastURL, saltMastCreds)
931 // cmd.run async to prevent connection close in case of slave shutdown, give 5 seconds to handle request response
932 salt.cmdRun(venvPepper, "I@salt:master", "salt -C '${cidNode}' cmd.run 'sleep 5; touch ${statusFile}; salt-call service.stop docker' --async")
933 }
934 sleep(30)
935 node('python') {
936 python.setupPepperVirtualenv(venvPepper, saltMastURL, saltMastCreds)
937 debian.osUpgradeNode(venvPepper, cidNode, packageUpgradeMode, false, 60)
938 salt.checkTargetMinionsReady(['saltId': venvPepper, 'target': cidNode, wait: 60, timeout: 10])
939 if (salt.runSaltProcessStep(venvPepper, cidNode, 'file.file_exists', [statusFile], null, true, 5)['return'][0].values()[0].toBoolean()) {
940 salt.cmdRun(venvPepper, "I@salt:master", "salt -C '${cidNode}' cmd.run 'rm ${statusFile} && salt-call service.start docker'") // in case if node was not rebooted
941 sleep(10)
942 }
943 checkCICDDocker()
944 }
945 }
946 } else {
947 common.infoMsg('Upgrade OS skipped...')
948 }
949 }
Hanna Arhipova644aefd2019-09-06 17:55:40 +0300950}