blob: 5fc1dfbb81be09e3f61b91b75eb845e6ac2f0881 [file] [log] [blame]
Richard Felkl26cae4d2017-12-19 00:19:16 +01001/**
2 *
3 * Update Salt environment pipeline
4 *
5 * Expected parameters:
azvyagintsev6dac3802018-11-09 15:11:30 +02006 * TARGET_MCP_VERSION Version of MCP to upgrade to
Denis Egorenkod13ad132018-12-17 16:56:02 +04007 * GIT_REFSPEC Git repo ref to be used
8 * DRIVE_TRAIN_PARAMS Yaml, DriveTrain releated params:
9 * SALT_MASTER_URL Salt API server location
10 * SALT_MASTER_CREDENTIALS Credentials to the Salt API
Denis Egorenkoca6aeca2019-08-19 19:41:27 +040011 * BATCH_SIZE Use batch sizing during upgrade for large envs
Denis Egorenkod13ad132018-12-17 16:56:02 +040012 * UPGRADE_SALTSTACK Upgrade SaltStack packages to new version.
13 * UPDATE_CLUSTER_MODEL Update MCP version parameter in cluster model
14 * UPDATE_PIPELINES Update pipeline repositories on Gerrit
15 * UPDATE_LOCAL_REPOS Update local repositories
Ivan Berezovskiy22390f62020-02-17 17:08:47 +040016 * OS_UPGRADE Run apt-get upgrade on Drivetrain nodes
17 * OS_DIST_UPGRADE Run apt-get dist-upgrade on Drivetrain nodes and reboot to apply changes
18 * APPLY_MODEL_WORKAROUNDS Whether to apply cluster model workarounds from the pipeline
Richard Felkl26cae4d2017-12-19 00:19:16 +010019 */
20
Richard Felkl5f7fdaf2018-02-15 15:38:31 +010021salt = new com.mirantis.mk.Salt()
22common = new com.mirantis.mk.Common()
23python = new com.mirantis.mk.Python()
Richard Felkl970e0082018-06-12 18:00:51 +020024jenkinsUtils = new com.mirantis.mk.JenkinsUtils()
azvyagintsevf3bf77a2018-11-15 19:30:04 +020025def pipelineTimeout = 12
Richard Felkl5f7fdaf2018-02-15 15:38:31 +010026venvPepper = "venvPepper"
Richard Felkl0e80d892018-06-20 13:44:54 +020027workspace = ""
Ivan Berezovskiya766d432019-12-11 15:31:10 +040028def saltMastURL = ''
29def saltMastCreds = ''
Denis Egorenko96cc57d2020-01-24 19:47:05 +040030def packageUpgradeMode = ''
Ivan Berezovskiy22390f62020-02-17 17:08:47 +040031batchSize = ''
Richard Felkl5f7fdaf2018-02-15 15:38:31 +010032
Ivan Berezovskiyc4dc5012020-03-19 14:03:43 +040033def fullRefreshOneByOne(venvPepper, minions) {
34 for (minion in minions) {
35 salt.runSaltProcessStep(venvPepper, minion, 'saltutil.refresh_pillar', [], null, true, 60)
36 salt.runSaltProcessStep(venvPepper, minion, 'saltutil.refresh_grains', [], null, true, 60)
37 salt.runSaltProcessStep(venvPepper, minion, 'saltutil.sync_all', [], null, true, 180)
38 }
39}
40
azvyagintsevbc359d42019-04-10 19:53:22 +030041def triggerMirrorJob(String jobName, String reclassSystemBranch) {
Richard Felkl970e0082018-06-12 18:00:51 +020042 params = jenkinsUtils.getJobParameters(jobName)
azvyagintsevbc359d42019-04-10 19:53:22 +030043 try {
44 build job: jobName, parameters: [
45 [$class: 'StringParameterValue', name: 'BRANCHES', value: params.get('BRANCHES')],
46 [$class: 'StringParameterValue', name: 'CREDENTIALS_ID', value: params.get('CREDENTIALS_ID')],
47 [$class: 'StringParameterValue', name: 'SOURCE_URL', value: params.get('SOURCE_URL')],
48 [$class: 'StringParameterValue', name: 'TARGET_URL', value: params.get('TARGET_URL')]
49 ]
50 } catch (Exception updateErr) {
51 common.warningMsg(updateErr)
52 common.warningMsg('Attempt to update git repo in failsafe manner')
53 build job: jobName, parameters: [
54 [$class: 'StringParameterValue', name: 'BRANCHES', value: reclassSystemBranch.replace('origin/', '')],
55 [$class: 'StringParameterValue', name: 'CREDENTIALS_ID', value: params.get('CREDENTIALS_ID')],
56 [$class: 'StringParameterValue', name: 'SOURCE_URL', value: params.get('SOURCE_URL')],
57 [$class: 'StringParameterValue', name: 'TARGET_URL', value: params.get('TARGET_URL')]
58 ]
59 }
Richard Felkl970e0082018-06-12 18:00:51 +020060}
61
azvyagintsev6dac3802018-11-09 15:11:30 +020062def updateSaltStack(target, pkgs) {
azvyagintsev97fd5ae2019-06-03 19:09:43 +030063 salt.cmdRun(venvPepper, 'I@salt:master', "salt -C '${target}' --async pkg.install force_yes=True pkgs='$pkgs'")
Denis Egorenko4b54e7f2019-02-26 16:05:03 +040064 // can't use same function from pipeline lib, as at the moment of running upgrade pipeline Jenkins
65 // still using pipeline lib from current old mcp-version
Denis V. Meltsaykinfd7586b2020-06-02 11:23:18 +020066
67 // sleep to make sure package update started, otherwise checks will pass on still running old instance
68 sleep(120)
69
azvyagintsev6dac3802018-11-09 15:11:30 +020070 common.retry(20, 60) {
Richard Felkl0e80d892018-06-20 13:44:54 +020071 salt.minionsReachable(venvPepper, 'I@salt:master', '*')
72 def running = salt.runSaltProcessStep(venvPepper, target, 'saltutil.running', [], null, true, 5)
azvyagintsev6dac3802018-11-09 15:11:30 +020073 for (value in running.get("return")[0].values()) {
74 if (value != []) {
Richard Felkl0e80d892018-06-20 13:44:54 +020075 throw new Exception("Not all salt-minions are ready for execution")
76 }
77 }
78 }
79
azvyagintsevf3bf77a2018-11-15 19:30:04 +020080 def saltVersion = salt.getPillar(venvPepper, 'I@salt:master', '_param:salt_version').get('return')[0].values()[0]
Richard Felklf23257e2018-08-06 09:24:23 +020081 def saltMinionVersions = salt.cmdRun(venvPepper, target, "apt-cache policy salt-common | awk '/Installed/ && /$saltVersion/'").get("return")
Richard Felkl0e80d892018-06-20 13:44:54 +020082 def saltMinionVersion = ""
83
azvyagintsev6dac3802018-11-09 15:11:30 +020084 for (minion in saltMinionVersions[0].keySet()) {
85 saltMinionVersion = saltMinionVersions[0].get(minion).replace("Salt command execution success", "").trim()
86 if (saltMinionVersion == "") {
Richard Felkl0e80d892018-06-20 13:44:54 +020087 error("Installed version of Salt on $minion doesn't match specified version in the model.")
88 }
89 }
90}
91
Denis Egorenko20a43462019-09-24 14:55:50 +040092def getWorkerThreads(saltId) {
93 if (env.getEnvironment().containsKey('SALT_MASTER_OPT_WORKER_THREADS')) {
94 return env['SALT_MASTER_OPT_WORKER_THREADS'].toString()
95 }
96 def threads = salt.cmdRun(saltId, "I@salt:master", "cat /etc/salt/master.d/master.conf | grep worker_threads | cut -f 2 -d ':'", true, null, true)
97 return threads['return'][0].values()[0].replaceAll('Salt command execution success','').trim()
98}
99
Ivan Berezovskiyf5c911b2019-12-03 18:49:09 +0400100def wa29352(String cname) {
azvyagintsev745a6e52019-04-18 13:19:39 +0300101 // WA for PROD-29352. Issue cause due patch https://gerrit.mcp.mirantis.com/#/c/37932/12/openssh/client/root.yml
102 // Default soft-param has been removed, what now makes not possible to render some old env's.
103 // Like fix, we found copy-paste already generated key from backups, to secrets.yml with correct key name
104 def wa29352ClassName = 'cluster.' + cname + '.infra.secrets_root_wa29352'
105 def wa29352File = "/srv/salt/reclass/classes/cluster/${cname}/infra/secrets_root_wa29352.yml"
106 def wa29352SecretsFile = "/srv/salt/reclass/classes/cluster/${cname}/infra/secrets.yml"
107 def _tempFile = '/tmp/wa29352_' + UUID.randomUUID().toString().take(8)
108 try {
Ivan Berezovskiy22390f62020-02-17 17:08:47 +0400109 salt.cmdRun(venvPepper, 'I@salt:master', "! grep -qi root_private_key: ${wa29352SecretsFile}", true, null, false)
azvyagintsev745a6e52019-04-18 13:19:39 +0300110 salt.cmdRun(venvPepper, 'I@salt:master', "test ! -f ${wa29352File}", true, null, false)
111 }
112 catch (Exception ex) {
Denis Egorenkodfa35422019-10-07 12:46:14 +0400113 common.infoMsg('Work-around for PROD-29352 already applied, nothing todo')
azvyagintsev745a6e52019-04-18 13:19:39 +0300114 return
115 }
116 def rKeysDict = [
117 'parameters': [
118 '_param': [
119 'root_private_key': salt.getPillar(venvPepper, 'I@salt:master', '_param:root_private_key').get('return')[0].values()[0].trim(),
120 'root_public_key' : '',
121 ]
122 ]
123 ]
124 // save root key,and generate public one from it
125 writeFile file: _tempFile, text: rKeysDict['parameters']['_param']['root_private_key'].toString().trim()
126 sh('chmod 0600 ' + _tempFile)
127 rKeysDict['parameters']['_param']['root_public_key'] = sh(script: "ssh-keygen -q -y -f ${_tempFile}", returnStdout: true).trim()
128 sh('rm -fv ' + _tempFile)
129 writeYaml file: _tempFile, data: rKeysDict
130 def yamlData = sh(script: "cat ${_tempFile} | base64", returnStdout: true).trim()
131 salt.cmdRun(venvPepper, 'I@salt:master', "echo '${yamlData}' | base64 -d > ${wa29352File}", false, null, false)
132 common.infoMsg("Add $wa29352ClassName class into secrets.yml")
133
134 // Add 'classes:' directive
135 salt.cmdRun(venvPepper, 'I@salt:master', "cd /srv/salt/reclass/classes/cluster/$cname && " +
136 "grep -q 'classes:' infra/secrets.yml || sed -i '1iclasses:' infra/secrets.yml")
137
138 salt.cmdRun(venvPepper, 'I@salt:master', "cd /srv/salt/reclass/classes/cluster/$cname && " +
139 "grep -q '${wa29352ClassName}' infra/secrets.yml || sed -i '/classes:/ a - $wa29352ClassName' infra/secrets.yml")
azvyagintsev745a6e52019-04-18 13:19:39 +0300140 sh('rm -fv ' + _tempFile)
Denis Egorenkodfa35422019-10-07 12:46:14 +0400141 salt.cmdRun(venvPepper, 'I@salt:master', "cd /srv/salt/reclass/classes/cluster/$cname && git status && " +
142 "git add ${wa29352File} && git add -u && git commit --allow-empty -m 'Cluster model updated with WA for PROD-29352. Issue cause due patch https://gerrit.mcp.mirantis.com/#/c/37932/ at ${common.getDatetime()}' ")
143 common.infoMsg('Work-around for PROD-29352 successfully applied')
azvyagintsev745a6e52019-04-18 13:19:39 +0300144}
145
azvyagintsevbc359d42019-04-10 19:53:22 +0300146def wa29155(ArrayList saltMinions, String cname) {
147 // WA for PROD-29155. Issue cause due patch https://gerrit.mcp.mirantis.com/#/c/37932/
148 // CHeck for existence cmp nodes, and try to render it. Is failed, apply ssh-key wa
azvyagintsevbc359d42019-04-10 19:53:22 +0300149 def patched = false
150 def wa29155ClassName = 'cluster.' + cname + '.infra.secrets_nova_wa29155'
151 def wa29155File = "/srv/salt/reclass/classes/cluster/${cname}/infra/secrets_nova_wa29155.yml"
152
153 try {
154 salt.cmdRun(venvPepper, 'I@salt:master', "test ! -f ${wa29155File}", true, null, false)
Ivan Berezovskiy22390f62020-02-17 17:08:47 +0400155 def patch_required = false
156 for (String minion in saltMinions) {
157 def nova_key = salt.getPillar(venvPepper, minion, '_param:nova_compute_ssh_private').get("return")[0].values()[0]
158 if (nova_key == '' || nova_key == 'null' || nova_key == null) {
159 patch_required = true
160 break // no exception, proceeding to apply the patch
161 }
162 }
163 if (!patch_required) {
164 error('No need to apply work-around for PROD-29155')
165 }
azvyagintsevbc359d42019-04-10 19:53:22 +0300166 }
167 catch (Exception ex) {
azvyagintsevbc359d42019-04-10 19:53:22 +0300168 return
169 }
Denis Egorenko14fa6e12019-08-23 14:29:34 +0400170 salt.fullRefresh(venvPepper, 'I@salt:master')
azvyagintsevbc359d42019-04-10 19:53:22 +0300171 for (String minion in saltMinions) {
azvyagintsevbc359d42019-04-10 19:53:22 +0300172 // First attempt, second will be performed in next validateReclassModel() stages
173 try {
azvyagintsev745a6e52019-04-18 13:19:39 +0300174 salt.cmdRun(venvPepper, 'I@salt:master', "reclass -n ${minion}", true, null, false).get('return')[0].values()[0].replaceAll('Salt command execution success', '').trim()
azvyagintsevbc359d42019-04-10 19:53:22 +0300175 } catch (Exception e) {
176 common.errorMsg(e.toString())
177 if (patched) {
Ivan Berezovskiy22390f62020-02-17 17:08:47 +0400178 error("Node: ${minion} failed to render after reclass-system upgrade! WA29155 probably didn't help.")
azvyagintsevbc359d42019-04-10 19:53:22 +0300179 }
azvyagintsev745a6e52019-04-18 13:19:39 +0300180 common.warningMsg('Perform: Attempt to apply WA for PROD-29155\n' +
181 'See https://gerrit.mcp.mirantis.com/#/c/37932/ for more info')
azvyagintsevbc359d42019-04-10 19:53:22 +0300182 common.warningMsg('WA-PROD-29155 Generating new ssh key at master node')
183 def _tempFile = "/tmp/nova_wa29155_" + UUID.randomUUID().toString().take(8)
184 common.infoMsg('Perform: generation NEW ssh-private key for nova-compute')
185 salt.cmdRun(venvPepper, 'I@salt:master', "ssh-keygen -f ${_tempFile} -N '' -q")
186 def _pub_k = salt.runSaltProcessStep(venvPepper, 'I@salt:master', 'cmd.run', "cat ${_tempFile}.pub").get('return')[0].values()[0].trim()
187 def _priv_k = salt.runSaltProcessStep(venvPepper, 'I@salt:master', 'cmd.run', "cat ${_tempFile}").get('return')[0].values()[0].trim()
188 salt.cmdRun(venvPepper, 'I@salt:master', "rm -fv ${_tempFile}", false, null, false)
189 def novaKeysDict = [
190 "parameters": [
191 "_param": [
192 "nova_compute_ssh_private": _priv_k,
193 "nova_compute_ssh_public" : _pub_k
194 ]
195 ]
196 ]
azvyagintsev745a6e52019-04-18 13:19:39 +0300197 writeYaml file: _tempFile, data: novaKeysDict
azvyagintsevbc359d42019-04-10 19:53:22 +0300198 def yamlData = sh(script: "cat ${_tempFile} | base64", returnStdout: true).trim()
199 salt.cmdRun(venvPepper, 'I@salt:master', "echo '${yamlData}' | base64 -d > ${wa29155File}", false, null, false)
200 common.infoMsg("Add $wa29155ClassName class into secrets.yml")
201
202 // Add 'classes:' directive
203 salt.cmdRun(venvPepper, 'I@salt:master', "cd /srv/salt/reclass/classes/cluster/$cname && " +
204 "grep -q 'classes:' infra/secrets.yml || sed -i '1iclasses:' infra/secrets.yml")
205
206 salt.cmdRun(venvPepper, 'I@salt:master', "cd /srv/salt/reclass/classes/cluster/$cname && " +
207 "grep -q '${wa29155ClassName}' infra/secrets.yml || sed -i '/classes:/ a - $wa29155ClassName' infra/secrets.yml")
Ivan Berezovskiyf5c911b2019-12-03 18:49:09 +0400208 salt.fullRefresh(venvPepper, 'I@salt:master')
Ivan Berezovskiyc4dc5012020-03-19 14:03:43 +0400209 salt.runSaltProcessStep(venvPepper, saltMinions, 'saltutil.refresh_pillar', [], null, true, 60)
azvyagintsevbc359d42019-04-10 19:53:22 +0300210 patched = true
211 }
212 }
213 if (patched) {
214 salt.cmdRun(venvPepper, 'I@salt:master', "cd /srv/salt/reclass/classes/cluster/$cname && git status && " +
215 "git add ${wa29155File} && git add -u && git commit --allow-empty -m 'Cluster model updated with WA for PROD-29155. Issue cause due patch https://gerrit.mcp.mirantis.com/#/c/37932/ at ${common.getDatetime()}' ")
216 common.infoMsg('Work-around for PROD-29155 successfully applied')
217 }
218
219}
220
Ivan Berezovskiy5b62e9c2020-01-24 17:52:26 +0400221def wa32284(String cluster_name) {
Denis Egorenko1b11d232019-07-29 17:44:46 +0400222 def clientGluster = salt.getPillar(venvPepper, 'I@salt:master', "glusterfs:client:enabled").get("return")[0].values()[0]
223 def pkiGluster = salt.getPillar(venvPepper, 'I@salt:master', "glusterfs:client:volumes:salt_pki").get("return")[0].values()[0]
224 def nginxEnabledAtMaster = salt.getPillar(venvPepper, 'I@salt:master', 'nginx:server:enabled').get('return')[0].values()[0]
225 if (nginxEnabledAtMaster.toString().toLowerCase() == 'true' && clientGluster.toString().toLowerCase() == 'true' && pkiGluster) {
226 def nginxRequires = salt.getPillar(venvPepper, 'I@salt:master', 'nginx:server:wait_for_service').get('return')[0].values()[0]
227 if (nginxRequires.isEmpty()) {
Ivan Berezovskiy5b62e9c2020-01-24 17:52:26 +0400228 def nginxRequiresClassName = "cluster.${cluster_name}.infra.config.nginx_requires_wa32284"
229 def nginxRequiresClassFile = "/srv/salt/reclass/classes/cluster/${cluster_name}/infra/config/nginx_requires_wa32284.yml"
Denis Egorenko1b11d232019-07-29 17:44:46 +0400230 def nginxRequiresBlock = ['parameters': ['nginx': ['server': ['wait_for_service': ['srv-salt-pki.mount'] ] ] ] ]
231 def _tempFile = '/tmp/wa32284_' + UUID.randomUUID().toString().take(8)
232 writeYaml file: _tempFile , data: nginxRequiresBlock
233 def nginxRequiresBlockString = sh(script: "cat ${_tempFile}", returnStdout: true).trim()
Ivan Berezovskiy5b62e9c2020-01-24 17:52:26 +0400234 salt.cmdRun(venvPepper, 'I@salt:master', "cd /srv/salt/reclass/classes/cluster/${cluster_name} && " +
Denis Egorenko1b11d232019-07-29 17:44:46 +0400235 "sed -i '/^parameters:/i - ${nginxRequiresClassName}' infra/config/init.yml")
236 salt.cmdRun(venvPepper, 'I@salt:master', "echo '${nginxRequiresBlockString}' > ${nginxRequiresClassFile}", false, null, false)
Ivan Berezovskiy5b62e9c2020-01-24 17:52:26 +0400237 salt.cmdRun(venvPepper, 'I@salt:master', "cd /srv/salt/reclass/classes/cluster/${cluster_name} && git status && git add ${nginxRequiresClassFile}")
Denis Egorenko1b11d232019-07-29 17:44:46 +0400238 }
239 }
240}
241
Oleksii Molchanov5b7fceb2020-03-13 13:28:10 +0200242def check_34406(String cluster_name) {
243 def sphinxpasswordPillar = salt.getPillar(venvPepper, 'I@salt:master', '_param:sphinx_proxy_password_generated').get("return")[0].values()[0]
244 if (sphinxpasswordPillar == '' || sphinxpasswordPillar == 'null' || sphinxpasswordPillar == null) {
245 error('Sphinx password is not defined.\n' +
246 'See https://docs.mirantis.com/mcp/q4-18/mcp-release-notes/mu/mu-9/mu-9-addressed/mu-9-dtrain/mu-9-dt-manual.html#i-34406 for more info')
247 }
248}
249
Valeriy Sakharov679e0502021-09-15 17:28:08 +0400250def check_34645(String cluster_name) {
251 def updatecellsPillar = salt.getPillar(venvPepper, 'I@nova:controller', 'nova:controller:update_cells').get("return")[0].values()[0]
252 if (updatecellsPillar.toString().toLowerCase() == 'false') {
253 error('Update cells disabled.\n' +
254 'See https://docs.mirantis.com/mcp/q4-18/mcp-operations-guide/openstack-operations/disable-nova-cell-mapping.html')
255 }
256}
257
Oleksii Molchanov05c49832020-09-28 19:28:06 +0300258def check_35705(String cluster_name) {
259 def galeracheckpasswordPillar = salt.getPillar(venvPepper, 'I@salt:master', '_param:galera_clustercheck_password').get("return")[0].values()[0]
260 if (galeracheckpasswordPillar == '' || galeracheckpasswordPillar == 'null' || galeracheckpasswordPillar == null) {
261 error('Galera clustercheck password is not defined.\n' +
262 'See https://docs.mirantis.com/mcp/q4-18/mcp-release-notes/mu/mu-12/mu-12-addressed/mu-12-dtrain/mu-12-dt-manual.html#improper-operation-of-galera-ha for more info')
263 }
264}
265
Ksawery Dziekoński09fa3ce2020-12-02 13:32:40 +0100266def check_35884(String cluster_name) {
Vladimir Khlyunevff208812020-12-08 19:34:36 +0400267 if (salt.getMinions(venvPepper, 'I@prometheus:alerta or I@prometheus:alertmanager')) {
268 def alertaApiKeyGenPillar = salt.getPillar(venvPepper, 'I@salt:master', '_param:alerta_admin_api_key_generated').get("return")[0].values()[0]
269 def alertaApiKeyPillar = salt.getPillar(venvPepper, 'I@prometheus:alerta or I@prometheus:alertmanager', '_param:alerta_admin_key').get("return")[0].values()[0]
Ksawery Dziekoński09fa3ce2020-12-02 13:32:40 +0100270
Vladimir Khlyunevff208812020-12-08 19:34:36 +0400271 if (alertaApiKeyGenPillar == '' || alertaApiKeyGenPillar == 'null' || alertaApiKeyGenPillar == null || alertaApiKeyPillar == '' || alertaApiKeyPillar == 'null' || alertaApiKeyPillar == null) {
272 error('Alerta admin API key not defined.\n' +
273 'See https://docs.mirantis.com/mcp/q4-18/mcp-release-notes/mu/mu-12/mu-12-addressed/mu-12-dtrain/mu-12-dt-manual.html#i-35884 for more info')
274 }
Ksawery Dziekoński09fa3ce2020-12-02 13:32:40 +0100275 }
276}
277
Vladimir Khlyunev8b7008f2021-07-15 15:18:49 +0400278// ceph cluster class ordering for radosgw
279def check_36461(String cluster_name){
280 if (!salt.testTarget(venvPepper, 'I@ceph:radosgw')) {
281 return
282 }
283 def clusterModelPath = "/srv/salt/reclass/classes/cluster/${cluster_name}"
284 def checkFile = "${clusterModelPath}/ceph/rgw.yml"
285 def saltTarget = "I@salt:master"
286 try {
287 salt.cmdRun(venvPepper, saltTarget, "test -f ${checkFile}")
288 }
289 catch (Exception e) {
290 common.warningMsg("Unable to check ordering of RadosGW imports, file ${checkFile} not found, skipping")
291 return
292 }
293 def fileContent = salt.cmdRun(venvPepper, saltTarget, "cat ${checkFile}").get('return')[0].values()[0].replaceAll('Salt command execution success', '').trim()
294 def yamlData = readYaml text: fileContent
295 def infraClassImport = "cluster.${cluster_name}.infra"
296 def cephClassImport = "cluster.${cluster_name}.ceph"
297 def cephCommonClassImport = "cluster.${cluster_name}.ceph.common"
298 def infraClassFound = false
299 def importErrorDetected = false
300 def importErrorMessage = """Ceph classes in '${checkFile}' are used in wrong order! Please reorder it:
301'${infraClassImport}' should be placed before '${cephClassImport}' and '${cephCommonClassImport}'.
Vladimir Khlyunev318fc892021-07-20 14:33:53 +0400302For additional information please see https://docs.mirantis.com/mcp/q4-18/mcp-release-notes/mu/mu-15/mu-15-addressed/mu-15-dtrain/mu-15-dtrain-manual.html"""
Vladimir Khlyunev8b7008f2021-07-15 15:18:49 +0400303 for (yamlClass in yamlData.classes) {
304 switch(yamlClass){
305 case infraClassImport:
306 infraClassFound = true;
307 break;
308 case cephClassImport:
309 if (!infraClassFound) {
310 importErrorDetected = true
311 };
312 break;
313 case cephCommonClassImport:
314 if (!infraClassFound) {
315 importErrorDetected = true
316 };
317 break;
318 }
319 }
320 if (importErrorDetected) {
321 common.errorMsg(importErrorMessage)
322 error(importErrorMessage)
323 }
324}
325
Denis Egorenkoaf18b252019-09-02 14:53:02 +0400326def wa32182(String cluster_name) {
Hanna Arhipovad5eec4c2019-09-06 17:55:40 +0300327 if (salt.testTarget(venvPepper, 'I@opencontrail:control or I@opencontrail:collector')) {
Denis Egorenkoaf18b252019-09-02 14:53:02 +0400328 def clusterModelPath = "/srv/salt/reclass/classes/cluster/${cluster_name}"
329 def fixFile = "${clusterModelPath}/opencontrail/common_wa32182.yml"
330 def usualFile = "${clusterModelPath}/opencontrail/common.yml"
331 def fixFileContent = "classes:\n- system.opencontrail.common\n"
332 salt.cmdRun(venvPepper, 'I@salt:master', "test -f ${fixFile} -o -f ${usualFile} || echo '${fixFileContent}' > ${fixFile}")
333 def contrailFiles = ['opencontrail/analytics.yml', 'opencontrail/control.yml', 'openstack/compute/init.yml']
334 if (salt.testTarget(venvPepper, "I@kubernetes:master")) {
335 contrailFiles.add('kubernetes/compute.yml')
336 }
Ivan Berezovskiy9f6330b2020-02-05 21:18:17 +0400337 for (String contrailFile in contrailFiles) {
Denis Egorenkoaf18b252019-09-02 14:53:02 +0400338 contrailFile = "${clusterModelPath}/${contrailFile}"
339 def containsFix = salt.cmdRun(venvPepper, 'I@salt:master', "grep -E '^- cluster\\.${cluster_name}\\.opencontrail\\.common(_wa32182)?\$' ${contrailFile}", false, null, true).get('return')[0].values()[0].replaceAll('Salt command execution success', '').trim()
340 if (containsFix) {
341 continue
342 } else {
343 salt.cmdRun(venvPepper, 'I@salt:master', "grep -q -E '^parameters:' ${contrailFile} && sed -i '/^parameters:/i - cluster.${cluster_name}.opencontrail.common_wa32182' ${contrailFile} || " +
Ivan Berezovskiy9f6330b2020-02-05 21:18:17 +0400344 "echo '- cluster.${cluster_name}.opencontrail.common_wa32182' >> ${contrailFile}")
Denis Egorenkoaf18b252019-09-02 14:53:02 +0400345 }
346 }
Ivan Berezovskiy9f6330b2020-02-05 21:18:17 +0400347 salt.cmdRun(venvPepper, 'I@salt:master', "test -f ${fixFile} && cd ${clusterModelPath} && git status && git add ${fixFile} || true")
Denis Egorenkoaf18b252019-09-02 14:53:02 +0400348 }
349}
350
Denis Egorenkoba631332019-10-25 13:13:39 +0400351def wa33867(String cluster_name) {
352 if (salt.testTarget(venvPepper, 'I@opencontrail:control or I@opencontrail:collector')) {
353 def contrailControlFile = "/srv/salt/reclass/classes/cluster/${cluster_name}/opencontrail/control.yml"
354 def line = salt.cmdRun(venvPepper, 'I@salt:master', "awk '/^- cluster.${cluster_name}.infra.backup.client_zookeeper/ {getline; print \$0}' ${contrailControlFile}", false, null, true).get('return')[0].values()[0].replaceAll('Salt command execution success', '').trim()
355 if (line == "- cluster.${cluster_name}.infra") {
356 salt.cmdRun(venvPepper, 'I@salt:master', "sed -i '/^- cluster.${cluster_name}.infra\$/d' ${contrailControlFile}")
357 salt.cmdRun(venvPepper, 'I@salt:master', "sed -i '/^- cluster.${cluster_name}.infra.backup.client_zookeeper\$/i - cluster.${cluster_name}.infra' ${contrailControlFile}")
358 }
359 }
360}
361
Denis Egorenkoe312cc92019-10-18 17:06:11 +0400362def wa33771(String cluster_name) {
Ivan Berezovskiy22390f62020-02-17 17:08:47 +0400363 if (salt.getMinions(venvPepper, 'I@_param:openstack_node_role and I@apache:server')) {
364 def octaviaEnabled = salt.getMinions(venvPepper, 'I@octavia:api:enabled')
365 def octaviaWSGI = salt.getMinions(venvPepper, 'I@apache:server:site:octavia_api')
366 if (octaviaEnabled && !octaviaWSGI) {
367 def openstackControl = "/srv/salt/reclass/classes/cluster/${cluster_name}/openstack/control.yml"
368 def octaviaFile = "/srv/salt/reclass/classes/cluster/${cluster_name}/openstack/octavia_wa33771.yml"
369 def octaviaContext = [
370 'classes' : ['system.apache.server.site.octavia'],
371 'parameters': [
372 '_param': ['apache_octavia_api_address': '${_param:cluster_local_address}'],
373 ]
Denis Egorenkoe312cc92019-10-18 17:06:11 +0400374 ]
Ivan Berezovskiy22390f62020-02-17 17:08:47 +0400375 def openstackHTTPSEnabled = salt.getPillar(venvPepper, 'I@salt:master', "_param:cluster_internal_protocol").get("return")[0].values()[0]
376 if (openstackHTTPSEnabled == 'https') {
377 octaviaContext['parameters'] << ['apache': ['server': ['site': ['apache_proxy_openstack_api_octavia': ['enabled': false]]]]]
378 }
379 def _tempFile = '/tmp/wa33771' + UUID.randomUUID().toString().take(8)
380 writeYaml file: _tempFile, data: octaviaContext
381 def octaviaFileContent = sh(script: "cat ${_tempFile} | base64", returnStdout: true).trim()
382 salt.cmdRun(venvPepper, 'I@salt:master', "sed -i '/^parameters:/i - cluster.${cluster_name}.openstack.octavia_wa33771' ${openstackControl}")
383 salt.cmdRun(venvPepper, 'I@salt:master', "echo '${octaviaFileContent}' | base64 -d > ${octaviaFile}", false, null, false)
384 salt.cmdRun(venvPepper, 'I@salt:master', "cd /srv/salt/reclass/classes/cluster/${cluster_name} && git status && git add ${octaviaFile}")
Denis Egorenko59f82a52020-01-30 17:17:25 +0400385 }
Ivan Berezovskiy22390f62020-02-17 17:08:47 +0400386 } else {
387 common.warningMsg("Apache server is not defined on controller nodes. Skipping Octavia WSGI workaround");
Denis Egorenkoe312cc92019-10-18 17:06:11 +0400388 }
389}
390
Denis Egorenkoe9fc0592019-11-14 19:56:17 +0400391def wa33930_33931(String cluster_name) {
392 def openstackControlFile = "/srv/salt/reclass/classes/cluster/${cluster_name}/openstack/control.yml"
393 def fixName = 'clients_common_wa33930_33931'
394 def fixFile = "/srv/salt/reclass/classes/cluster/${cluster_name}/openstack/${fixName}.yml"
395 def containsFix = salt.cmdRun(venvPepper, 'I@salt:master', "grep -E '^- cluster\\.${cluster_name}\\.openstack\\.${fixName}\$' ${openstackControlFile}", false, null, true).get('return')[0].values()[0].replaceAll('Salt command execution success', '').trim()
396 if (! containsFix) {
Ivan Berezovskiy22390f62020-02-17 17:08:47 +0400397 def fixContext = [ 'classes': [ ] ]
398 def novaControllerNodes = salt.getMinions(venvPepper, 'I@nova:controller')
399 for (novaController in novaControllerNodes) {
400 def novaClientPillar = salt.getPillar(venvPepper, novaController, "nova:client").get("return")[0].values()[0]
401 if (novaClientPillar == '' || novaClientPillar == 'null' || novaClientPillar == null) {
402 fixContext['classes'] << 'service.nova.client'
403 break
404 }
405 }
406 def glanceServerNodes = salt.getMinions(venvPepper, 'I@glance:server')
407 for (glanceServer in glanceServerNodes) {
408 def glanceClientPillar = salt.getPillar(venvPepper, glanceServer, "glance:client").get("return")[0].values()[0]
409 if (glanceClientPillar == '' || glanceClientPillar == 'null' || glanceClientPillar == null) {
410 fixContext['classes'] << 'service.glance.client'
411 break
412 }
413 }
414 def neutronServerNodes = salt.getMinions(venvPepper, 'I@neutron:server')
415 for (neutronServer in neutronServerNodes) {
416 def neutronServerPillar = salt.getPillar(venvPepper, neutronServer, "neutron:client").get("return")[0].values()[0]
417 if (neutronServerPillar == '' || neutronServerPillar == 'null' || neutronServerPillar == null) {
418 fixContext['classes'] << 'service.neutron.client'
419 break
420 }
421 }
Denis Egorenkoe9fc0592019-11-14 19:56:17 +0400422 if (salt.getMinions(venvPepper, 'I@manila:api:enabled')) {
Ivan Berezovskiy22390f62020-02-17 17:08:47 +0400423 def manilaApiNodes = salt.getMinions(venvPepper, 'I@manila:api')
424 for (manilaNode in manilaApiNodes) {
425 def manilaNodePillar = salt.getPillar(venvPepper, manilaNode, "manila:client").get("return")[0].values()[0]
426 if (manilaNodePillar == '' || manilaNodePillar == 'null' || manilaNodePillar == null) {
427 fixContext['classes'] << 'service.manila.client'
428 break
429 }
430 }
Denis Egorenkoe9fc0592019-11-14 19:56:17 +0400431 }
432 if (salt.getMinions(venvPepper, 'I@ironic:api:enabled')) {
Ivan Berezovskiy22390f62020-02-17 17:08:47 +0400433 def ironicApiNodes = salt.getMinions(venvPepper, 'I@ironic:api')
434 for (ironicNode in ironicApiNodes) {
435 def ironicNodePillar = salt.getPillar(venvPepper, ironicNode, "ironic:client").get("return")[0].values()[0]
436 if (ironicNodePillar == '' || ironicNodePillar == 'null' || ironicNodePillar == null) {
437 fixContext['classes'] << 'service.ironic.client'
438 break
439 }
440 }
Denis Egorenkoe9fc0592019-11-14 19:56:17 +0400441 }
442 if (salt.getMinions(venvPepper, 'I@gnocchi:server:enabled')) {
Ivan Berezovskiy22390f62020-02-17 17:08:47 +0400443 def gnocchiServerNodes = salt.getMinions(venvPepper, 'I@gnocchi:server')
444 for (gnocchiNode in gnocchiServerNodes) {
445 def gnocchiNodePillar = salt.getPillar(venvPepper, gnocchiNode, "gnocchi:client").get("return")[0].values()[0]
446 if (gnocchiNodePillar == '' || gnocchiNodePillar == 'null' || gnocchiNodePillar == null) {
447 fixContext['classes'] << 'service.gnocchi.client'
448 break
449 }
450 }
Denis Egorenkoe9fc0592019-11-14 19:56:17 +0400451 }
Ivan Berezovskiy22390f62020-02-17 17:08:47 +0400452
Denis Egorenkoe9fc0592019-11-14 19:56:17 +0400453 if (salt.getMinions(venvPepper, 'I@barbican:server:enabled')) {
Ivan Berezovskiy22390f62020-02-17 17:08:47 +0400454 def barbicanServerNodes = salt.getMinions(venvPepper, 'I@barbican:server')
455 for (barbicanNode in barbicanServerNodes) {
456 def barbicanNodePillar = salt.getPillar(venvPepper, barbicanNode, "barbican:client").get("return")[0].values()[0]
457 if (barbicanNodePillar == '' || barbicanNodePillar == 'null' || barbicanNodePillar == null) {
458 fixContext['classes'] << 'service.barbican.client.single'
459 break
460 }
461 }
Denis Egorenkoe9fc0592019-11-14 19:56:17 +0400462 }
Ivan Berezovskiy22390f62020-02-17 17:08:47 +0400463 if (fixContext['classes'] != []) {
464 def _tempFile = '/tmp/wa33930_33931' + UUID.randomUUID().toString().take(8)
465 writeYaml file: _tempFile, data: fixContext
466 def fixFileContent = sh(script: "cat ${_tempFile} | base64", returnStdout: true).trim()
467 salt.cmdRun(venvPepper, 'I@salt:master', "echo '${fixFileContent}' | base64 -d > ${fixFile}", false, null, false)
468 salt.cmdRun(venvPepper, 'I@salt:master', "sed -i '/^parameters:/i - cluster.${cluster_name}.openstack.${fixName}' ${openstackControlFile}")
469 salt.cmdRun(venvPepper, 'I@salt:master', "cd /srv/salt/reclass/classes/cluster/${cluster_name} && git status && git add ${fixFile}")
470 }
Denis Egorenkoe9fc0592019-11-14 19:56:17 +0400471 }
472}
473
Denis Egorenko215acda2020-01-28 16:41:44 +0400474def wa34245(cluster_name) {
475 def infraInitFile = "/srv/salt/reclass/classes/cluster/${cluster_name}/infra/init.yml"
476 def fixName = 'hosts_wa34245'
477 def fixFile = "/srv/salt/reclass/classes/cluster/${cluster_name}/infra/${fixName}.yml"
478 if (salt.testTarget(venvPepper, 'I@keystone:server')) {
479 def fixApplied = salt.cmdRun(venvPepper, 'I@salt:master', "grep -E '^- cluster.${cluster_name}.infra.${fixName}\$' ${infraInitFile}", false, null, true).get('return')[0].values()[0].replaceAll('Salt command execution success', '').trim()
480 if (!fixApplied) {
481 def fixFileContent = []
482 def containsFix = salt.cmdRun(venvPepper, 'I@salt:master', "grep -E '^- system\\.linux\\.network\\.hosts\\.openstack\$' ${infraInitFile}", false, null, true).get('return')[0].values()[0].replaceAll('Salt command execution success', '').trim()
483 if (!containsFix) {
484 fixFileContent << '- system.linux.network.hosts.openstack'
485 }
486 if (salt.testTarget(venvPepper, 'I@gnocchi:server')) {
487 containsFix = salt.cmdRun(venvPepper, 'I@salt:master', "grep -E '^- system\\.linux\\.network\\.hosts\\.openstack\\.telemetry\$' ${infraInitFile}", false, null, true).get('return')[0].values()[0].replaceAll('Salt command execution success', '').trim()
488 if (!containsFix) {
489 fixFileContent << '- system.linux.network.hosts.openstack.telemetry'
490 }
491 }
492 if (salt.testTarget(venvPepper, 'I@manila:api')) {
493 containsFix = salt.cmdRun(venvPepper, 'I@salt:master', "grep -E '^- system\\.linux\\.network\\.hosts\\.openstack\\.share\$' ${infraInitFile}", false, null, true).get('return')[0].values()[0].replaceAll('Salt command execution success', '').trim()
494 if (!containsFix) {
495 fixFileContent << '- system.linux.network.hosts.openstack.share'
496 }
497 }
498 if (salt.testTarget(venvPepper, 'I@barbican:server')) {
499 containsFix = salt.cmdRun(venvPepper, 'I@salt:master', "grep -E '^- system\\.linux\\.network\\.hosts\\.openstack\\.kmn\$' ${infraInitFile}", false, null, true).get('return')[0].values()[0].replaceAll('Salt command execution success', '').trim()
500 if (!containsFix) {
501 fixFileContent << '- system.linux.network.hosts.openstack.kmn'
502 }
503 }
504 if (fixFileContent) {
505 salt.cmdRun(venvPepper, 'I@salt:master', "echo 'classes:\n${fixFileContent.join('\n')}' > ${fixFile}")
506 salt.cmdRun(venvPepper, 'I@salt:master', "sed -i '/^parameters:/i - cluster.${cluster_name}.infra.${fixName}' ${infraInitFile}")
Ivan Berezovskiy5b62e9c2020-01-24 17:52:26 +0400507 salt.cmdRun(venvPepper, 'I@salt:master', "cd /srv/salt/reclass/classes/cluster/${cluster_name} && git status && git add ${fixFile}")
Denis Egorenko215acda2020-01-28 16:41:44 +0400508 }
509 }
510 }
511}
512
Ivan Berezovskiy5b62e9c2020-01-24 17:52:26 +0400513def wa34528(String cluster_name) {
514 // Mysql users have to be defined on each Galera node
515 if(salt.getMinions(venvPepper, 'I@galera:master').isEmpty()) {
516 common.errorMsg('No Galera master found in cluster. Skipping')
517 return
518 }
519 def mysqlUsersMasterPillar = salt.getPillar(venvPepper, 'I@galera:master', 'mysql:server:database').get("return")[0].values()[0]
520 if (mysqlUsersMasterPillar == '' || mysqlUsersMasterPillar == 'null' || mysqlUsersMasterPillar == null) {
521 common.errorMsg('Pillar data is broken for Galera master node!')
522 input message: 'Do you want to ignore and continue without Galera pillar patch?'
523 return
524 }
525 def fileToPatch = salt.cmdRun(venvPepper, 'I@salt:master', "ls /srv/salt/reclass/classes/cluster/${cluster_name}/openstack/database/init.yml || " +
526 "ls /srv/salt/reclass/classes/cluster/${cluster_name}/openstack/database/slave.yml || echo 'File not found'", true, null, false).get('return')[0].values()[0].replaceAll('Salt command execution success', '').trim()
527 if (fileToPatch == 'File not found') {
528 common.errorMsg('Cluster model is old and cannot be patched for PROD-34528. Patching is possible for 2019.2.x cluster models only')
529 return
530 }
531 def patchRequired = false
532 def mysqlUsersSlavePillar = ''
533 def galeraSlaveNodes = salt.getMinions(venvPepper, 'I@galera:slave')
534 if (!galeraSlaveNodes.isEmpty()) {
535 for (galeraSlave in galeraSlaveNodes) {
536 mysqlUsersSlavePillar = salt.getPillar(venvPepper, galeraSlave, 'mysql:server:database').get("return")[0].values()[0]
537 if (mysqlUsersSlavePillar == '' || mysqlUsersSlavePillar == 'null' || mysqlUsersSlavePillar == null) {
538 common.errorMsg('Mysql users data is not defined for Galera slave nodes. Fixing...')
539 patchRequired = true
540 break
541 }
542 }
543 if (patchRequired) {
544 def fixFileContent = []
545 def fixName = 'db_wa34528'
546 def fixFile = "/srv/salt/reclass/classes/cluster/${cluster_name}/openstack/database/${fixName}.yml"
547 for (dbName in mysqlUsersMasterPillar.keySet()) {
548 def classIncluded = salt.cmdRun(venvPepper, 'I@salt:master', "grep -E '^- system\\.galera\\.server\\.database\\.${dbName}\$'" +
549 " /srv/salt/reclass/classes/cluster/${cluster_name}/openstack/database/master.yml", false, null, true).get('return')[0].values()[0].replaceAll('Salt command execution success', '').trim()
550 if(classIncluded) {
551 fixFileContent << "- system.galera.server.database.${dbName}"
552 }
553 def sslClassIncluded = salt.cmdRun(venvPepper, 'I@salt:master', "grep -E '^- system\\.galera\\.server\\.database\\.x509\\.${dbName}\$'" +
554 " /srv/salt/reclass/classes/cluster/${cluster_name}/openstack/database/master.yml", false, null, true).get('return')[0].values()[0].replaceAll('Salt command execution success', '').trim()
555 if(sslClassIncluded) {
556 fixFileContent << "- system.galera.server.database.x509.${dbName}"
557 }
558 }
559 if (fixFileContent) {
560 salt.cmdRun(venvPepper, 'I@salt:master', "echo 'classes:\n${fixFileContent.join('\n')}' > ${fixFile}")
561 salt.cmdRun(venvPepper, 'I@salt:master', "sed -i '/^parameters:/i - cluster.${cluster_name}.openstack.database.${fixName}' ${fileToPatch}")
562 }
563 salt.fullRefresh(venvPepper, 'I@galera:slave')
564 // Verify
565 for (galeraSlave in galeraSlaveNodes) {
566 mysqlUsersSlavePillar = salt.getPillar(venvPepper, galeraSlave, 'mysql:server:database').get("return")[0].values()[0]
567 if (mysqlUsersSlavePillar == '' || mysqlUsersSlavePillar == 'null' || mysqlUsersSlavePillar == null || mysqlUsersSlavePillar.keySet() != mysqlUsersMasterPillar.keySet()) {
568 common.errorMsg("Mysql user data is different on master and slave node ${galeraSlave}.")
569 input message: 'Do you want to ignore and continue?'
570 }
571 }
572 salt.cmdRun(venvPepper, 'I@salt:master', "cd /srv/salt/reclass/classes/cluster/${cluster_name} && git status && git add ${fixFile}")
573 common.infoMsg('Galera slaves patching is done')
574 } else {
575 common.infoMsg('Galera slaves patching is not required')
576 }
577 }
578}
579
azvyagintsev6dac3802018-11-09 15:11:30 +0200580def archiveReclassInventory(filename) {
azvyagintsevbc359d42019-04-10 19:53:22 +0300581 def _tmp_file = '/tmp/' + filename + UUID.randomUUID().toString().take(8)
582 // jenkins may fail at overheap. Compress data with gzip like WA
azvyagintsev745a6e52019-04-18 13:19:39 +0300583 def ret = salt.cmdRun(venvPepper, 'I@salt:master', 'reclass -i 2>/dev/null | gzip -9 -c | base64', true, null, false).get('return')[0].values()[0].replaceAll('Salt command execution success', '').trim()
azvyagintsevbc359d42019-04-10 19:53:22 +0300584 def _tmp = sh(script: "echo '$ret' > ${_tmp_file}", returnStdout: false)
585 sh(script: "cat ${_tmp_file} | base64 -d | gzip -d > $filename", returnStdout: false)
586 archiveArtifacts artifacts: filename
587 sh(script: "rm -v ${_tmp_file}|| true")
Richard Felkl0e80d892018-06-20 13:44:54 +0200588}
589
Denis Egorenkod13ad132018-12-17 16:56:02 +0400590def validateReclassModel(ArrayList saltMinions, String suffix) {
591 try {
azvyagintsevbc359d42019-04-10 19:53:22 +0300592 for (String minion in saltMinions) {
Denis Egorenkod13ad132018-12-17 16:56:02 +0400593 common.infoMsg("Reclass model validation for minion ${minion}...")
azvyagintsev745a6e52019-04-18 13:19:39 +0300594 def reclassInv = salt.cmdRun(venvPepper, 'I@salt:master', "reclass -n ${minion}", true, null, false).get('return')[0].values()[0].replaceAll('Salt command execution success', '').trim()
Denis Egorenkod13ad132018-12-17 16:56:02 +0400595 writeFile file: "inventory-${minion}-${suffix}.out", text: reclassInv.toString()
596 }
597 } catch (Exception e) {
598 common.errorMsg('Can not validate current Reclass model. Inspect failed minion manually.')
azvyagintsevbc359d42019-04-10 19:53:22 +0300599 error(e.toString())
Denis Egorenkod13ad132018-12-17 16:56:02 +0400600 }
601}
602
azvyagintsevbc359d42019-04-10 19:53:22 +0300603def archiveReclassModelChanges(ArrayList saltMinions, String oldSuffix = 'before', String newSuffix = 'after') {
604 for (String minion in saltMinions) {
Denis Egorenkod13ad132018-12-17 16:56:02 +0400605 def fileName = "reclass-model-${minion}-diff.out"
606 sh "diff -u inventory-${minion}-${oldSuffix}.out inventory-${minion}-${newSuffix}.out > ${fileName} || true"
607 archiveArtifacts artifacts: "${fileName}"
608 }
609}
610
azvyagintsev97fd5ae2019-06-03 19:09:43 +0300611def checkDebsums() {
612 // check for salt-formulas consistency
613 try {
614 try {
615 salt.cmdRun(venvPepper, 'I@salt:master', "salt -C 'I@salt:master' pkg.install force_yes=True pkgs=[debsums]")
616 }
617 catch (Exception ex) {
618 common.warningMsg('Unable to install package "debsums" at cfg01. Salt-formulas integrity check skipped')
619 }
620 salt.cmdRun(venvPepper, 'I@salt:master', '> /root/debdsums_report; for i in $(dpkg-query -W -f=\'${Package}\\n\' | sed "s/ //g" |grep \'salt-formula-\'); do debsums -s ${i} 2>> /root/debdsums_report; done')
621 salt.cmdRun(venvPepper, 'I@salt:master', 'if [ -s "/root/debdsums_report" ]; then exit 1 ; fi')
622 }
623 catch (Exception ex) {
624 common.errorMsg(salt.cmdRun(venvPepper, 'I@salt:master', 'cat /root/debdsums_report ', true, null, false).get('return')[0].values()[0].trim())
625 common.errorMsg(ex.toString())
626 error('You have unexpected changes in formulas. All of them will be overwrited by update. Unable to continue in automatic way')
627 }
628}
629
Denis Egorenko96cc57d2020-01-24 19:47:05 +0400630def checkCICDDocker() {
631 common.infoMsg('Perform: Checking if Docker containers are up')
632 try {
633 common.retry(10, 30) {
634 salt.cmdRun(venvPepper, 'I@jenkins:client and I@docker:client', "! docker service ls | tail -n +2 | grep -v -E '\\s([0-9])/\\1\\s'")
635 }
636 }
637 catch (Exception ex) {
638 error("Docker containers for CI/CD services are having troubles with starting.")
639 }
640}
641
Denis Egorenko5a8a7e92018-12-27 14:13:48 +0400642if (common.validInputParam('PIPELINE_TIMEOUT')) {
643 try {
644 pipelineTimeout = env.PIPELINE_TIMEOUT.toInteger()
azvyagintsevbc359d42019-04-10 19:53:22 +0300645 } catch (Exception e) {
Denis Egorenko5a8a7e92018-12-27 14:13:48 +0400646 common.warningMsg("Provided PIPELINE_TIMEOUT parameter has invalid value: ${env.PIPELINE_TIMEOUT} - should be interger")
647 }
Martin Polreich965c9032018-08-09 16:33:57 +0200648}
649
650timeout(time: pipelineTimeout, unit: 'HOURS') {
azvyagintsev97fd5ae2019-06-03 19:09:43 +0300651 node('python') {
Jakub Josefa63f9862018-01-11 17:58:38 +0100652 try {
azvyagintsevbc359d42019-04-10 19:53:22 +0300653 def inventoryBeforeFilename = "reclass-inventory-before.out"
654 def inventoryAfterFilename = "reclass-inventory-after.out"
Richard Felkl0e80d892018-06-20 13:44:54 +0200655 workspace = common.getWorkspace()
azvyagintsevf3bf77a2018-11-15 19:30:04 +0200656 targetMcpVersion = null
657 if (!common.validInputParam('TARGET_MCP_VERSION') && !common.validInputParam('MCP_VERSION')) {
658 error('You must specify MCP version in TARGET_MCP_VERSION|MCP_VERSION variable')
azvyagintsev6dac3802018-11-09 15:11:30 +0200659 }
azvyagintsevf3bf77a2018-11-15 19:30:04 +0200660 // bw comp. for 2018.X => 2018.11 release
azvyagintsevbc359d42019-04-10 19:53:22 +0300661 if (common.validInputParam('MCP_VERSION')) {
azvyagintsevf3bf77a2018-11-15 19:30:04 +0200662 targetMcpVersion = env.MCP_VERSION
663 common.warningMsg("targetMcpVersion has been changed to:${targetMcpVersion}, which was taken from deprecated pipeline viriable:MCP_VERSION")
azvyagintsevbc359d42019-04-10 19:53:22 +0300664 } else {
azvyagintsevf3bf77a2018-11-15 19:30:04 +0200665 targetMcpVersion = env.TARGET_MCP_VERSION
666 }
667 // end bw comp. for 2018.X => 2018.11 release
Denis Egorenkod13ad132018-12-17 16:56:02 +0400668 def gitTargetMcpVersion = env.getProperty('GIT_REFSPEC')
Ivan Berezovskiydb325092019-01-16 19:26:18 +0400669 if (targetMcpVersion in ['nightly', 'testing']) {
azvyagintsevf3bf77a2018-11-15 19:30:04 +0200670 gitTargetMcpVersion = 'master'
Ivan Berezovskiydb325092019-01-16 19:26:18 +0400671 } else if (targetMcpVersion == 'proposed') {
672 gitTargetMcpVersion = 'proposed'
Denis Egorenko284690e2018-12-25 15:55:12 +0400673 } else if (!gitTargetMcpVersion) {
674 // backward compatibility for 2018.11.0
675 gitTargetMcpVersion = "release/${targetMcpVersion}"
azvyagintsev6dac3802018-11-09 15:11:30 +0200676 }
Ivan Berezovskiydb325092019-01-16 19:26:18 +0400677 common.warningMsg("gitTargetMcpVersion has been changed to:${gitTargetMcpVersion}")
Denis Egorenko284690e2018-12-25 15:55:12 +0400678 def upgradeSaltStack = ''
679 def updateClusterModel = ''
Ivan Berezovskiy22390f62020-02-17 17:08:47 +0400680 def applyWorkarounds = true
Denis Egorenko284690e2018-12-25 15:55:12 +0400681 def updatePipelines = ''
682 def updateLocalRepos = ''
683 def reclassSystemBranch = ''
Denis Egorenko517e06c2019-03-29 13:24:15 +0400684 def reclassSystemBranchDefault = gitTargetMcpVersion
Ivan Berezovskiyf5c911b2019-12-03 18:49:09 +0400685 if (gitTargetMcpVersion ==~ /^\d\d\d\d\.\d\d?\.\d+$/) {
686 reclassSystemBranchDefault = "tags/${gitTargetMcpVersion}"
687 } else if (gitTargetMcpVersion != 'proposed') {
Denis Egorenko517e06c2019-03-29 13:24:15 +0400688 reclassSystemBranchDefault = "origin/${gitTargetMcpVersion}"
689 }
Hanna Arhipovad5eec4c2019-09-06 17:55:40 +0300690 def driveTrainParamsYaml = env.getProperty('DRIVE_TRAIN_PARAMS')
691 if (driveTrainParamsYaml) {
692 def driveTrainParams = readYaml text: driveTrainParamsYaml
693 saltMastURL = driveTrainParams.get('SALT_MASTER_URL')
694 saltMastCreds = driveTrainParams.get('SALT_MASTER_CREDENTIALS')
695 upgradeSaltStack = driveTrainParams.get('UPGRADE_SALTSTACK', false).toBoolean()
696 updateClusterModel = driveTrainParams.get('UPDATE_CLUSTER_MODEL', false).toBoolean()
697 updatePipelines = driveTrainParams.get('UPDATE_PIPELINES', false).toBoolean()
698 updateLocalRepos = driveTrainParams.get('UPDATE_LOCAL_REPOS', false).toBoolean()
699 reclassSystemBranch = driveTrainParams.get('RECLASS_SYSTEM_BRANCH', reclassSystemBranchDefault)
Denis Egorenkoca6aeca2019-08-19 19:41:27 +0400700 batchSize = driveTrainParams.get('BATCH_SIZE', '')
Denis Egorenko96cc57d2020-01-24 19:47:05 +0400701 if (driveTrainParams.get('OS_DIST_UPGRADE', false).toBoolean() == true) {
702 packageUpgradeMode = 'dist-upgrade'
703 } else if (driveTrainParams.get('OS_UPGRADE', false).toBoolean() == true) {
704 packageUpgradeMode = 'upgrade'
705 }
Ivan Berezovskiy22390f62020-02-17 17:08:47 +0400706 applyWorkarounds = driveTrainParams.get('APPLY_MODEL_WORKAROUNDS', true).toBoolean()
Taras Khlivnyak80ded1c2021-10-25 13:48:09 +0300707 archiveInventory = driveTrainParams.get('ARCHIVE_RECLASS_INVENTORY', false).toBoolean()
Denis Egorenko284690e2018-12-25 15:55:12 +0400708 } else {
709 // backward compatibility for 2018.11.0
710 saltMastURL = env.getProperty('SALT_MASTER_URL')
711 saltMastCreds = env.getProperty('SALT_MASTER_CREDENTIALS')
Denis Egorenkoe5f39142018-12-28 12:30:48 +0400712 upgradeSaltStack = env.getProperty('UPGRADE_SALTSTACK').toBoolean()
713 updateClusterModel = env.getProperty('UPDATE_CLUSTER_MODEL').toBoolean()
714 updatePipelines = env.getProperty('UPDATE_PIPELINES').toBoolean()
715 updateLocalRepos = env.getProperty('UPDATE_LOCAL_REPOS').toBoolean()
Denis Egorenko517e06c2019-03-29 13:24:15 +0400716 reclassSystemBranch = reclassSystemBranchDefault
Denis Egorenko284690e2018-12-25 15:55:12 +0400717 }
Denis Egorenkod13ad132018-12-17 16:56:02 +0400718 python.setupPepperVirtualenv(venvPepper, saltMastURL, saltMastCreds)
Denis Egorenkod13ad132018-12-17 16:56:02 +0400719 def minions = salt.getMinions(venvPepper, '*')
Denis Egorenkofbcee412019-04-19 15:05:18 +0400720 def cluster_name = salt.getPillar(venvPepper, 'I@salt:master', "_param:cluster_name").get("return")[0].values()[0]
721 if (cluster_name == '' || cluster_name == 'null' || cluster_name == null) {
722 error('Pillar data is broken for Salt master node! Please check it manually and re-run pipeline.')
723 }
Hanna Arhipovad5eec4c2019-09-06 17:55:40 +0300724 if (!batchSize) {
Denis Egorenko7b098c32019-12-19 16:45:25 +0400725 // if no batch size provided get current worker threads and set batch size to 2/3 of it to avoid
726 // 'SaltReqTimeoutError: Message timed out' issue on Salt targets for large amount of nodes
727 // do not use toDouble/Double as it requires additional approved method
728 def workerThreads = getWorkerThreads(venvPepper).toInteger()
Ivan Berezovskiy22390f62020-02-17 17:08:47 +0400729 batchSize = (workerThreads * 2 / 3).toString().tokenize('.')[0]
Denis Egorenkoca6aeca2019-08-19 19:41:27 +0400730 }
Ivan Berezovskiyf5c911b2019-12-03 18:49:09 +0400731 def computeMinions = salt.getMinions(venvPepper, 'I@nova:compute')
Ivan Berezovskiyc4dc5012020-03-19 14:03:43 +0400732 def allMinions = salt.getMinions(venvPepper, '*')
Denis Egorenkod13ad132018-12-17 16:56:02 +0400733
azvyagintsevbc359d42019-04-10 19:53:22 +0300734 stage('Update Reclass and Salt-Formulas') {
735 common.infoMsg('Perform: Full salt sync')
Ivan Berezovskiyc4dc5012020-03-19 14:03:43 +0400736 fullRefreshOneByOne(venvPepper, allMinions)
Oleksii Molchanov5b7fceb2020-03-13 13:28:10 +0200737
738 check_34406(cluster_name)
Valeriy Sakharov679e0502021-09-15 17:28:08 +0400739 check_34645(cluster_name)
Oleksii Molchanov05c49832020-09-28 19:28:06 +0300740 check_35705(cluster_name)
Ksawery Dziekoński09fa3ce2020-12-02 13:32:40 +0100741 check_35884(cluster_name)
Vladimir Khlyunev8b7008f2021-07-15 15:18:49 +0400742 check_36461(cluster_name)
Oleksii Molchanov5b7fceb2020-03-13 13:28:10 +0200743
azvyagintsevbc359d42019-04-10 19:53:22 +0300744 common.infoMsg('Perform: Validate reclass medata before processing')
Denis Egorenkod13ad132018-12-17 16:56:02 +0400745 validateReclassModel(minions, 'before')
Taras Khlivnyak80ded1c2021-10-25 13:48:09 +0300746 if (archiveInventory) {
747 common.infoMsg('Perform: archiveReclassInventory before upgrade')
748 archiveReclassInventory(inventoryBeforeFilename)
749 }
azvyagintsev745a6e52019-04-18 13:19:39 +0300750
azvyagintsev6dac3802018-11-09 15:11:30 +0200751 try {
azvyagintsevbc359d42019-04-10 19:53:22 +0300752 salt.cmdRun(venvPepper, 'I@salt:master', 'cd /srv/salt/reclass/ && git status && git diff-index --quiet HEAD --')
Richard Felkl970e0082018-06-12 18:00:51 +0200753 }
azvyagintsev6dac3802018-11-09 15:11:30 +0200754 catch (Exception ex) {
azvyagintsevbc359d42019-04-10 19:53:22 +0300755 error('You have uncommitted changes in your Reclass cluster model repository. Please commit or reset them and rerun the pipeline.')
Richard Felkl970e0082018-06-12 18:00:51 +0200756 }
azvyagintsev97fd5ae2019-06-03 19:09:43 +0300757 checkDebsums()
Denis Egorenkod13ad132018-12-17 16:56:02 +0400758 if (updateClusterModel) {
azvyagintsev6dac3802018-11-09 15:11:30 +0200759 common.infoMsg('Perform: UPDATE_CLUSTER_MODEL')
Sergey382581a2018-10-25 12:22:26 +0400760 def dateTime = common.getDatetime()
Ivan Berezovskiycfa1b2f2020-01-17 13:55:18 +0400761 salt.cmdRun(venvPepper, 'I@salt:master', "cd /srv/salt/reclass/classes/system && git fetch")
Sergey382581a2018-10-25 12:22:26 +0400762 salt.cmdRun(venvPepper, 'I@salt:master', "cd /srv/salt/reclass/classes/cluster/$cluster_name && " +
Denis Egorenkofcbc6b82019-01-15 11:47:16 +0400763 "grep -r --exclude-dir=aptly -l 'mcp_version: .*' * | xargs --no-run-if-empty sed -i 's|mcp_version: .*|mcp_version: \"$targetMcpVersion\"|g'")
azvyagintsev6dac3802018-11-09 15:11:30 +0200764 // Do the same, for deprecated variable-duplicate
765 salt.cmdRun(venvPepper, 'I@salt:master', "cd /srv/salt/reclass/classes/cluster/$cluster_name && " +
Denis Egorenkofcbc6b82019-01-15 11:47:16 +0400766 "grep -r --exclude-dir=aptly -l 'apt_mk_version: .*' * | xargs --no-run-if-empty sed -i 's|apt_mk_version: .*|apt_mk_version: \"$targetMcpVersion\"|g'")
Denis Egorenko284690e2018-12-25 15:55:12 +0400767 salt.cmdRun(venvPepper, 'I@salt:master', "cd /srv/salt/reclass/classes/cluster/$cluster_name && " +
Denis Egorenkofcbc6b82019-01-15 11:47:16 +0400768 "grep -r --exclude-dir=aptly -l 'jenkins_pipelines_branch: .*' * | xargs --no-run-if-empty sed -i 's|jenkins_pipelines_branch: .*|jenkins_pipelines_branch: \"$gitTargetMcpVersion\"|g'")
Victor Ryzhenkinabbefe62019-01-15 19:58:03 +0400769 // Set new k8s param
770 salt.cmdRun(venvPepper, 'I@salt:master', "cd /srv/salt/reclass/classes/cluster/$cluster_name && " +
771 "grep -r --exclude-dir=aptly -l 'kubernetes_containerd_enabled: .*' * | xargs --no-run-if-empty sed -i 's|kubernetes_containerd_enabled: .*|kubernetes_containerd_enabled: True|g'")
Denis Egorenkoe5b49512019-01-16 19:18:31 +0400772 salt.cmdRun(venvPepper, 'I@salt:master', "cd /srv/salt/reclass/classes/cluster/$cluster_name && " +
773 "grep -r --exclude-dir=aptly -l 'system.linux.system.repo.mcp.salt' * | xargs --no-run-if-empty sed -i 's/system.linux.system.repo.mcp.salt/system.linux.system.repo.mcp.apt_mirantis.salt-formulas/g'")
774 salt.cmdRun(venvPepper, 'I@salt:master', "cd /srv/salt/reclass/classes/cluster/$cluster_name && " +
Denis Egorenko301cc8a2019-02-13 13:49:13 +0400775 "grep -r --exclude-dir=aptly -l 'system.linux.system.repo.mcp.contrail' * | xargs --no-run-if-empty sed -i 's/system.linux.system.repo.mcp.contrail/system.linux.system.repo.mcp.apt_mirantis.contrail/g'")
Denis Egorenkoe5b49512019-01-16 19:18:31 +0400776 salt.cmdRun(venvPepper, 'I@salt:master', "cd /srv/salt/reclass/classes/cluster/$cluster_name && " +
Vladimir Khlyunev8efa75a2021-07-13 14:44:01 +0400777 "grep -r --exclude-dir=aptly -l 'system.linux.system.repo.mcp.updates\$' * | xargs --no-run-if-empty sed -i 's/system.linux.system.repo.mcp.updates\$/system.linux.system.repo.mcp.apt_mirantis.update/g'")
Anton Samoylov308c7ca2019-02-13 15:57:13 +0400778 salt.cmdRun(venvPepper, 'I@salt:master', "cd /srv/salt/reclass/classes/cluster/$cluster_name && " +
azvyagintsevbc359d42019-04-10 19:53:22 +0300779 "grep -r --exclude-dir=aptly -l 'system.linux.system.repo.mcp.extra' * | xargs --no-run-if-empty sed -i 's/system.linux.system.repo.mcp.extra/system.linux.system.repo.mcp.apt_mirantis.extra/g'")
Denis Egorenko21c78be2019-07-10 19:47:39 +0400780
Denis Egorenko6f07b592019-09-16 16:41:26 +0400781 salt.cmdRun(venvPepper, 'I@salt:master', "cd /srv/salt/reclass/classes/cluster/$cluster_name/infra && sed -i '/linux_system_repo_mcp_maas_url/d' maas.yml")
782 salt.cmdRun(venvPepper, 'I@salt:master', "cd /srv/salt/reclass/classes/cluster/$cluster_name/infra && sed -i '/maas_region_main_archive/d' maas.yml")
783
Denis Egorenko21c78be2019-07-10 19:47:39 +0400784 // Switch Jenkins/Gerrit to use LDAP SSL/TLS
785 def gerritldapURI = salt.cmdRun(venvPepper, 'I@salt:master', "cd /srv/salt/reclass/classes/cluster/$cluster_name && " +
786 "grep -r --exclude-dir=aptly 'gerrit_ldap_server: .*' * | grep -Po 'gerrit_ldap_server: \\K.*' | tr -d '\"'", true, null, false).get('return')[0].values()[0].replaceAll('Salt command execution success', '').trim()
787 if (gerritldapURI.startsWith('ldap://')) {
788 salt.cmdRun(venvPepper, 'I@salt:master', "cd /srv/salt/reclass/classes/cluster/$cluster_name && " +
789 "grep -r --exclude-dir=aptly -l 'gerrit_ldap_server: .*' * | xargs --no-run-if-empty sed -i 's|ldap://|ldaps://|g'")
790 } else if (! gerritldapURI.startsWith('ldaps://')) {
791 salt.cmdRun(venvPepper, 'I@salt:master', "cd /srv/salt/reclass/classes/cluster/$cluster_name && " +
792 "grep -r --exclude-dir=aptly -l 'gerrit_ldap_server: .*' * | xargs --no-run-if-empty sed -i 's|gerrit_ldap_server: .*|gerrit_ldap_server: \"ldaps://${gerritldapURI}\"|g'")
793 }
794 def jenkinsldapURI = salt.cmdRun(venvPepper, 'I@salt:master', "cd /srv/salt/reclass/classes/cluster/$cluster_name && " +
795 "grep -r --exclude-dir=aptly 'jenkins_security_ldap_server: .*' * | grep -Po 'jenkins_security_ldap_server: \\K.*' | tr -d '\"'", true, null, false).get('return')[0].values()[0].replaceAll('Salt command execution success', '').trim()
796 if (jenkinsldapURI.startsWith('ldap://')) {
797 salt.cmdRun(venvPepper, 'I@salt:master', "cd /srv/salt/reclass/classes/cluster/$cluster_name && " +
798 "grep -r --exclude-dir=aptly -l 'jenkins_security_ldap_server: .*' * | xargs --no-run-if-empty sed -i 's|ldap://|ldaps://|g'")
799 } else if (! jenkinsldapURI.startsWith('ldaps://')) {
800 salt.cmdRun(venvPepper, 'I@salt:master', "cd /srv/salt/reclass/classes/cluster/$cluster_name && " +
801 "grep -r --exclude-dir=aptly -l 'jenkins_security_ldap_server: .*' * | xargs --no-run-if-empty sed -i 's|jenkins_security_ldap_server: .*|jenkins_security_ldap_server: \"ldaps://${jenkinsldapURI}\"|g'")
802 }
803
Ivan Berezovskiy22390f62020-02-17 17:08:47 +0400804 if (applyWorkarounds) {
805 wa32284(cluster_name)
806 wa34245(cluster_name)
807 }
Denis Egorenko1b11d232019-07-29 17:44:46 +0400808
Denis Egorenkod13ad132018-12-17 16:56:02 +0400809 salt.cmdRun(venvPepper, 'I@salt:master', "cd /srv/salt/reclass/classes/system && git checkout ${reclassSystemBranch}")
Sergey Kolekonov5dfbf7a2019-01-23 16:47:43 +0400810 // Add kubernetes-extra repo
811 if (salt.testTarget(venvPepper, "I@kubernetes:master")) {
Sergey Kolekonov3fde8b12019-04-11 16:33:54 +0400812 // docker-engine conflicts with the recent containerd versions, so it's removed during upgrade. Thus update source engine
813 salt.cmdRun(venvPepper, 'I@salt:master', "cd /srv/salt/reclass/classes/cluster/$cluster_name && " +
814 "grep -r -l 'engine: docker_hybrid' kubernetes | xargs --no-run-if-empty sed -i 's/engine: docker_hybrid/engine: archive/g'")
Sergey Kolekonov5dfbf7a2019-01-23 16:47:43 +0400815 common.infoMsg("Add kubernetes-extra repo")
816 salt.cmdRun(venvPepper, 'I@salt:master', "cd /srv/salt/reclass/classes/cluster/$cluster_name && " +
817 "grep -q system.linux.system.repo.mcp.apt_mirantis.update.kubernetes_extra kubernetes/common.yml || sed -i '/classes:/ a - system.linux.system.repo.mcp.apt_mirantis.update.kubernetes_extra' kubernetes/common.yml")
818 salt.cmdRun(venvPepper, 'I@salt:master', "cd /srv/salt/reclass/classes/cluster/$cluster_name && " +
819 "grep -q system.linux.system.repo.mcp.apt_mirantis.kubernetes_extra kubernetes/common.yml || sed -i '/classes:/ a - system.linux.system.repo.mcp.apt_mirantis.kubernetes_extra' kubernetes/common.yml")
820 }
Ivan Berezovskiy41c76792019-04-15 13:23:58 +0400821 // Add all update repositories
822 def repoIncludeBase = '- system.linux.system.repo.mcp.apt_mirantis.'
Denis Egorenko6f07b592019-09-16 16:41:26 +0400823 def updateRepoList = ['cassandra', 'ceph', 'contrail', 'docker', 'elastic', 'extra', 'openstack', 'maas', 'percona', 'salt-formulas', 'saltstack', 'ubuntu']
Ivan Berezovskiy41c76792019-04-15 13:23:58 +0400824 updateRepoList.each { repo ->
825 def repoNameUpdateInclude = "${repoIncludeBase}update.${repo}"
826 def filesWithInclude = salt.cmdRun(venvPepper, 'I@salt:master', "cd /srv/salt/reclass/classes/cluster/$cluster_name && grep -Plr '\\${repoIncludeBase}${repo}\$' . || true", false).get('return')[0].values()[0].trim().tokenize('\n')
827 filesWithInclude.each { file ->
828 def updateRepoIncludeExist = salt.cmdRun(venvPepper, 'I@salt:master', "cd /srv/salt/reclass/classes/cluster/$cluster_name && grep -P '\\${repoNameUpdateInclude}\$' ${file} || echo not_found", false, null, true).get('return')[0].values()[0].trim()
829 if (updateRepoIncludeExist == 'not_found') {
830 // Include needs to be added
831 salt.cmdRun(venvPepper, 'I@salt:master', "cd /srv/salt/reclass/classes/cluster/$cluster_name && " +
azvyagintsevbc359d42019-04-10 19:53:22 +0300832 "sed -i 's/\\( *\\)${repoIncludeBase}${repo}\$/&\\n\\1${repoNameUpdateInclude}/g' ${file}")
Ivan Berezovskiy41c76792019-04-15 13:23:58 +0400833 common.infoMsg("Update repo for ${repo} is added to ${file}")
834 }
835 }
836 }
Ivan Berezovskiy22390f62020-02-17 17:08:47 +0400837 if (applyWorkarounds) {
838 wa32182(cluster_name)
839 wa33771(cluster_name)
840 wa33867(cluster_name)
841 wa33930_33931(cluster_name)
842 wa34528(cluster_name)
843 }
Sergey382581a2018-10-25 12:22:26 +0400844 // Add new defaults
845 common.infoMsg("Add new defaults")
Denis Egorenkod13ad132018-12-17 16:56:02 +0400846 salt.cmdRun(venvPepper, 'I@salt:master', "grep '^ mcp_version: ' /srv/salt/reclass/classes/cluster/$cluster_name/infra/init.yml || " +
Denis Egorenkofcbc6b82019-01-15 11:47:16 +0400847 "sed -i 's|^ _param:| _param:\\n mcp_version: \"$targetMcpVersion\"|' /srv/salt/reclass/classes/cluster/$cluster_name/infra/init.yml")
Sergey382581a2018-10-25 12:22:26 +0400848 salt.cmdRun(venvPepper, 'I@salt:master', "grep '^- system.defaults\$' /srv/salt/reclass/classes/cluster/$cluster_name/infra/init.yml || " +
Denis Egorenkofcbc6b82019-01-15 11:47:16 +0400849 "sed -i 's|^classes:|classes:\\n- system.defaults|' /srv/salt/reclass/classes/cluster/$cluster_name/infra/init.yml")
Ivan Berezovskiy5113c7c2019-04-23 14:32:02 +0400850 salt.cmdRun(venvPepper, 'I@salt:master', "cd /srv/salt/reclass/classes/cluster/$cluster_name && " +
azvyagintsev97fd5ae2019-06-03 19:09:43 +0300851 "grep -r -l 'docker_image_jenkins: .*' cicd | xargs --no-run-if-empty sed -i 's|\\s*docker_image_jenkins: .*||g'")
Ivan Berezovskiy5113c7c2019-04-23 14:32:02 +0400852 salt.cmdRun(venvPepper, 'I@salt:master', "cd /srv/salt/reclass/classes/cluster/$cluster_name && " +
azvyagintsev97fd5ae2019-06-03 19:09:43 +0300853 "grep -r -l 'docker_image_jenkins_slave: .*' cicd | xargs --no-run-if-empty sed -i 's|\\s*docker_image_jenkins_slave: .*||g'")
Sergey382581a2018-10-25 12:22:26 +0400854 common.infoMsg("The following changes were made to the cluster model and will be commited. " +
azvyagintsev6dac3802018-11-09 15:11:30 +0200855 "Please consider if you want to push them to the remote repository or not. You have to do this manually when the run is finished.")
Sergey382581a2018-10-25 12:22:26 +0400856 salt.cmdRun(venvPepper, 'I@salt:master', "cd /srv/salt/reclass/classes/cluster/$cluster_name && git diff")
857 salt.cmdRun(venvPepper, 'I@salt:master', "cd /srv/salt/reclass/classes/cluster/$cluster_name && git status && " +
azvyagintsevf3bf77a2018-11-15 19:30:04 +0200858 "git add -u && git commit --allow-empty -m 'Cluster model update to the release $targetMcpVersion on $dateTime'")
Sergey382581a2018-10-25 12:22:26 +0400859 }
Denis Egorenkod13ad132018-12-17 16:56:02 +0400860 try {
861 common.infoMsg('Perform: UPDATE Salt Formulas')
Ivan Berezovskiyc4dc5012020-03-19 14:03:43 +0400862 fullRefreshOneByOne(venvPepper, allMinions)
Denis Egorenkoea0ba7d2019-07-04 14:16:40 +0400863 salt.enforceState(venvPepper, 'I@salt:master', 'linux.system.repo', true, true, null, false, 60, 2)
Denis Egorenkod13ad132018-12-17 16:56:02 +0400864 def saltEnv = salt.getPillar(venvPepper, 'I@salt:master', "_param:salt_master_base_environment").get("return")[0].values()[0]
azvyagintsevbc359d42019-04-10 19:53:22 +0300865 salt.runSaltProcessStep(venvPepper, 'I@salt:master', 'state.sls_id', ["salt_master_${saltEnv}_pkg_formulas", 'salt.master.env'])
Ivan Berezovskiyc4dc5012020-03-19 14:03:43 +0400866 fullRefreshOneByOne(venvPepper, allMinions)
Denis Egorenkod13ad132018-12-17 16:56:02 +0400867 } catch (Exception updateErr) {
868 common.warningMsg(updateErr)
869 common.warningMsg('Failed to update Salt Formulas repos/packages. Check current available documentation on https://docs.mirantis.com/mcp/latest/, how to update packages.')
870 input message: 'Continue anyway?'
871 }
Ivan Berezovskiy22390f62020-02-17 17:08:47 +0400872 if (applyWorkarounds) {
873 wa29352(cluster_name)
874 wa29155(computeMinions, cluster_name)
875 }
Denis Egorenkod13ad132018-12-17 16:56:02 +0400876
877 try {
878 common.infoMsg('Perform: UPDATE Reclass package')
879 salt.runSaltProcessStep(venvPepper, 'I@salt:master', 'pkg.install', ["reclass"])
880 } catch (Exception updateErr) {
881 common.warningMsg(updateErr)
882 common.warningMsg('Failed to update Reclass package. Check current available documentation on https://docs.mirantis.com/mcp/latest/, how to update packages.')
883 input message: 'Continue anyway?'
884 }
885
886 salt.fullRefresh(venvPepper, 'I@salt:master')
Denis Egorenkoea0ba7d2019-07-04 14:16:40 +0400887 salt.enforceState(venvPepper, 'I@salt:master', 'reclass.storage', true, true, null, false, 60, 2)
Ivan Berezovskiyf5c911b2019-12-03 18:49:09 +0400888 salt.cmdRun(venvPepper, 'I@salt:master', "cd /srv/salt/reclass/classes/cluster/${cluster_name} && git status && " +
889 "git add -u && git commit --allow-empty -m 'Reclass nodes update to the release ${targetMcpVersion} on ${common.getDatetime()}'")
Denis Egorenkod13ad132018-12-17 16:56:02 +0400890 try {
Denis Egorenkoea0ba7d2019-07-04 14:16:40 +0400891 salt.enforceState(venvPepper, 'I@salt:master', 'reclass', true, true, null, false, 60, 2)
Denis Egorenkod13ad132018-12-17 16:56:02 +0400892 }
893 catch (Exception ex) {
azvyagintsev97fd5ae2019-06-03 19:09:43 +0300894 common.errorMsg(ex.toString())
895 error('Reclass fails rendering. Pay attention to your cluster model.')
Denis Egorenkod13ad132018-12-17 16:56:02 +0400896 }
897
Ivan Berezovskiyc4dc5012020-03-19 14:03:43 +0400898 fullRefreshOneByOne(venvPepper, allMinions)
Denis Egorenkod13ad132018-12-17 16:56:02 +0400899 try {
900 salt.cmdRun(venvPepper, 'I@salt:master', "reclass-salt --top")
901 }
902 catch (Exception ex) {
azvyagintsevbc359d42019-04-10 19:53:22 +0300903
904 error('Reclass fails rendering. Pay attention to your cluster model.' +
905 'ErrorMessage:' + ex.toString())
Denis Egorenkod13ad132018-12-17 16:56:02 +0400906 }
Taras Khlivnyak80ded1c2021-10-25 13:48:09 +0300907 if (archiveInventory) {
908 common.infoMsg('Perform: archiveReclassInventory AFTER upgrade')
909 archiveReclassInventory(inventoryAfterFilename)
910 }
Denis Egorenkod13ad132018-12-17 16:56:02 +0400911
912 sh "diff -u $inventoryBeforeFilename $inventoryAfterFilename > reclass-inventory-diff.out || true"
913 archiveArtifacts artifacts: "reclass-inventory-diff.out"
914
915 validateReclassModel(minions, 'after')
916 archiveReclassModelChanges(minions)
Jakub Josefa63f9862018-01-11 17:58:38 +0100917 }
Richard Felkl26cae4d2017-12-19 00:19:16 +0100918
Denis Egorenkod13ad132018-12-17 16:56:02 +0400919 if (updateLocalRepos) {
azvyagintsev6dac3802018-11-09 15:11:30 +0200920 stage("Update local repos") {
Jakub Josefa63f9862018-01-11 17:58:38 +0100921 common.infoMsg("Updating local repositories")
Sam Stoelingaaab79702018-04-09 18:49:39 -0700922
Sergey1b81c062018-10-16 17:10:21 +0400923 def engine = salt.getPillar(venvPepper, 'I@aptly:publisher', "aptly:publisher:source:engine")
Sam Stoelingaaab79702018-04-09 18:49:39 -0700924 runningOnDocker = engine.get("return")[0].containsValue("docker")
925
926 if (runningOnDocker) {
927 common.infoMsg("Aptly is running as Docker container")
azvyagintsev6dac3802018-11-09 15:11:30 +0200928 } else {
Sam Stoelingaaab79702018-04-09 18:49:39 -0700929 common.infoMsg("Aptly isn't running as Docker container. Going to use aptly user for executing aptly commands")
930 }
931
azvyagintsev6dac3802018-11-09 15:11:30 +0200932 if (runningOnDocker) {
azvyagintsevf3bf77a2018-11-15 19:30:04 +0200933 salt.cmdRun(venvPepper, 'I@aptly:publisher', "aptly mirror list --raw | grep -E '*' | xargs --no-run-if-empty -n 1 aptly mirror drop -force", true, null, true)
azvyagintsev6dac3802018-11-09 15:11:30 +0200934 } else {
azvyagintsevf3bf77a2018-11-15 19:30:04 +0200935 salt.cmdRun(venvPepper, 'I@aptly:publisher', "aptly mirror list --raw | grep -E '*' | xargs --no-run-if-empty -n 1 aptly mirror drop -force", true, null, true, ['runas=aptly'])
Richard Felkl5f7fdaf2018-02-15 15:38:31 +0100936 }
Richard Felkl26cae4d2017-12-19 00:19:16 +0100937
Sergey1b81c062018-10-16 17:10:21 +0400938 salt.enforceState(venvPepper, 'I@aptly:publisher', 'aptly', true)
Richard Felkl26cae4d2017-12-19 00:19:16 +0100939
azvyagintsev6dac3802018-11-09 15:11:30 +0200940 if (runningOnDocker) {
Sergey1b81c062018-10-16 17:10:21 +0400941 salt.runSaltProcessStep(venvPepper, 'I@aptly:publisher', 'cmd.script', ['salt://aptly/files/aptly_mirror_update.sh', "args=-sv"], null, true)
942 salt.runSaltProcessStep(venvPepper, 'I@aptly:publisher', 'cmd.script', ['salt://aptly/files/aptly_publish_update.sh', "args=-frv -u http://10.99.0.1:8080"], null, true)
azvyagintsev6dac3802018-11-09 15:11:30 +0200943 } else {
Sergey1b81c062018-10-16 17:10:21 +0400944 salt.runSaltProcessStep(venvPepper, 'I@aptly:publisher', 'cmd.script', ['salt://aptly/files/aptly_mirror_update.sh', "args=-sv", 'runas=aptly'], null, true)
945 salt.runSaltProcessStep(venvPepper, 'I@aptly:publisher', 'cmd.script', ['salt://aptly/files/aptly_publish_update.sh', "args=-afrv", 'runas=aptly'], null, true)
Richard Felkl5f7fdaf2018-02-15 15:38:31 +0100946 }
Richard Felkl79d7df12018-01-05 16:40:11 +0100947
Sergey1b81c062018-10-16 17:10:21 +0400948 salt.enforceState(venvPepper, 'I@aptly:publisher', 'docker.client.registry', true)
Richard Felkl26cae4d2017-12-19 00:19:16 +0100949
Sergey1b81c062018-10-16 17:10:21 +0400950 salt.enforceState(venvPepper, 'I@aptly:publisher', 'debmirror', true)
Richard Felkl26cae4d2017-12-19 00:19:16 +0100951
Sergey1b81c062018-10-16 17:10:21 +0400952 salt.enforceState(venvPepper, 'I@aptly:publisher', 'git.server', true)
Richard Felkl5f7fdaf2018-02-15 15:38:31 +0100953
Sergey1b81c062018-10-16 17:10:21 +0400954 salt.enforceState(venvPepper, 'I@aptly:publisher', 'linux.system.file', true)
Jakub Josefa63f9862018-01-11 17:58:38 +0100955 }
956 }
Richard Felkl26cae4d2017-12-19 00:19:16 +0100957
Vladimir Khlyunev20d63672021-06-18 13:43:08 +0400958 stage('Update Drivetrain: Part 1') {
Vladimir Khlyunev2dd5bfd2021-03-19 18:45:54 +0400959 salt.enforceState(venvPepper, 'I@linux:system', 'linux.system.repo', true, true, batchSize, false, 60, 2)
Oleksii Molchanov68eb72c2020-05-15 13:33:45 +0300960 salt.enforceState(venvPepper, '*', 'linux.system.package', true, true, batchSize, false, 60, 2)
961
Denis Egorenkod13ad132018-12-17 16:56:02 +0400962 if (upgradeSaltStack) {
azvyagintsev97fd5ae2019-06-03 19:09:43 +0300963 updateSaltStack('I@salt:master', '["salt-master", "salt-common", "salt-api", "salt-minion"]')
azvyagintsev97fd5ae2019-06-03 19:09:43 +0300964 updateSaltStack('I@salt:minion and not I@salt:master', '["salt-minion"]')
Richard Felkl0e80d892018-06-20 13:44:54 +0200965 }
966
Denis Egorenkod13ad132018-12-17 16:56:02 +0400967 if (updatePipelines) {
azvyagintsevbc359d42019-04-10 19:53:22 +0300968 common.infoMsg('Perform: UPDATE git repos')
969 triggerMirrorJob('git-mirror-downstream-mk-pipelines', reclassSystemBranch)
970 triggerMirrorJob('git-mirror-downstream-pipeline-library', reclassSystemBranch)
Richard Felkl970e0082018-06-12 18:00:51 +0200971 }
972
Denis Egorenko7a4cf032019-04-25 20:48:26 +0400973 // update minions certs
Denis Egorenkoaf3a2202019-04-26 15:13:16 +0400974 // call for `salt.minion.ca` state on related nodes to make sure
975 // mine was updated with required data after salt-minion/salt-master restart salt:minion:ca
Denis Egorenkoca6aeca2019-08-19 19:41:27 +0400976 salt.enforceState(venvPepper, 'I@salt:minion:ca', 'salt.minion.ca', true, true, batchSize, false, 60, 2)
977 salt.enforceState(venvPepper, 'I@salt:minion', 'salt.minion.cert', true, true, batchSize, false, 60, 2)
Denis Egorenko7a4cf032019-04-25 20:48:26 +0400978
Ann Kamyshnikovae8910112019-05-06 12:56:38 +0400979 // run `salt.minion` to refresh all minion configs (for example _keystone.conf)
Ivan Berezovskiy22390f62020-02-17 17:08:47 +0400980 salt.enforceState(venvPepper, 'I@salt:minion', 'salt.minion', true, true, batchSize, false, 60, 2)
azvyagintsevbc359d42019-04-10 19:53:22 +0300981 // Retry needed only for rare race-condition in user appearance
982 common.infoMsg('Perform: updating users and keys')
Denis Egorenkoca6aeca2019-08-19 19:41:27 +0400983 salt.enforceState(venvPepper, 'I@linux:system', 'linux.system.user', true, true, batchSize, false, 60, 2)
azvyagintsevbc359d42019-04-10 19:53:22 +0300984 common.infoMsg('Perform: updating openssh')
Denis Egorenkoca6aeca2019-08-19 19:41:27 +0400985 salt.enforceState(venvPepper, 'I@linux:system', 'openssh', true, true, batchSize, false, 60, 2)
Denis Egorenko65cf2a42019-01-15 11:58:12 +0400986
azvyagintsev97fd5ae2019-06-03 19:09:43 +0300987 // apply salt API TLS if needed
988 def nginxAtMaster = salt.getPillar(venvPepper, 'I@salt:master', 'nginx:server:enabled').get('return')[0].values()[0]
989 if (nginxAtMaster.toString().toLowerCase() == 'true') {
Denis Egorenkoea0ba7d2019-07-04 14:16:40 +0400990 salt.enforceState(venvPepper, 'I@salt:master', 'nginx', true, true, null, false, 60, 2)
azvyagintsev97fd5ae2019-06-03 19:09:43 +0300991 }
Ivan Berezovskiya766d432019-12-11 15:31:10 +0400992 }
993 }
994 catch (Throwable e) {
995 // If there was an error or exception thrown, the build failed
996 currentBuild.result = "FAILURE"
997 throw e
998 }
999 }
Denis Egorenko96cc57d2020-01-24 19:47:05 +04001000 stage('Upgrade OS') {
1001 if (packageUpgradeMode) {
Vladimir Khlyunev20d63672021-06-18 13:43:08 +04001002 def cidNodes = []
1003 node('python') {
1004 python.setupPepperVirtualenv(venvPepper, saltMastURL, saltMastCreds)
1005 cidNodes = salt.getMinions(venvPepper, 'I@_param:drivetrain_role:cicd')
1006 }
Denis Egorenko96cc57d2020-01-24 19:47:05 +04001007 def debian = new com.mirantis.mk.Debian()
1008 def statusFile = '/tmp/rebooted_during_upgrade'
1009 for(cidNode in cidNodes) {
1010 node('python') {
1011 python.setupPepperVirtualenv(venvPepper, saltMastURL, saltMastCreds)
1012 // cmd.run async to prevent connection close in case of slave shutdown, give 5 seconds to handle request response
1013 salt.cmdRun(venvPepper, "I@salt:master", "salt -C '${cidNode}' cmd.run 'sleep 5; touch ${statusFile}; salt-call service.stop docker' --async")
1014 }
1015 sleep(30)
1016 node('python') {
1017 python.setupPepperVirtualenv(venvPepper, saltMastURL, saltMastCreds)
1018 debian.osUpgradeNode(venvPepper, cidNode, packageUpgradeMode, false, 60)
1019 salt.checkTargetMinionsReady(['saltId': venvPepper, 'target': cidNode, wait: 60, timeout: 10])
1020 if (salt.runSaltProcessStep(venvPepper, cidNode, 'file.file_exists', [statusFile], null, true, 5)['return'][0].values()[0].toBoolean()) {
1021 salt.cmdRun(venvPepper, "I@salt:master", "salt -C '${cidNode}' cmd.run 'rm ${statusFile} && salt-call service.start docker'") // in case if node was not rebooted
1022 sleep(10)
1023 }
1024 checkCICDDocker()
1025 }
1026 }
1027 } else {
1028 common.infoMsg('Upgrade OS skipped...')
1029 }
1030 }
Vladimir Khlyunev20d63672021-06-18 13:43:08 +04001031
1032 node('python') {
1033 stage('Update Drivetrain: Part 2') {
1034 python.setupPepperVirtualenv(venvPepper, saltMastURL, saltMastCreds)
1035 // Gerrit 2019.2.0 (2.13.6) version has wrong file name for download-commands plugin and was not loaded, let's remove if still there before upgrade
1036 def gerritGlusterPath = salt.getPillar(venvPepper, 'I@gerrit:client', 'glusterfs:client:volumes:gerrit:path').get('return')[0].values()[0]
1037 def wrongPluginJarName = "${gerritGlusterPath}/plugins/project-download-commands.jar"
1038 salt.cmdRun(venvPepper, 'I@gerrit:client', "test -f ${wrongPluginJarName} && rm ${wrongPluginJarName} || true")
1039
1040 salt.enforceStateWithTest(venvPepper, 'I@jenkins:client:security and not I@salt:master', 'jenkins.client.security', "", true, true, null, true, 60, 2)
1041 salt.enforceStateWithTest(venvPepper, 'I@jenkins:client and I@docker:client:images and not I@salt:master', 'docker.client.images', "", true, true, null, true, 60, 2)
1042 salt.cmdRun(venvPepper, "I@salt:master", "salt -C 'I@jenkins:client and I@docker:client and not I@salt:master' state.sls docker.client --async")
1043 }
1044 }
1045 // docker.client state may trigger change of jenkins master or jenkins slave services,
1046 // so we need wait for slave to reconnect and continue pipeline
1047 sleep(180)
1048 node('python') {
1049 stage('Update Drivetrain: Part 3') {
1050 python.setupPepperVirtualenv(venvPepper, saltMastURL, saltMastCreds)
1051 checkCICDDocker()
1052
1053 // update Nginx proxy settings for Jenkins/Gerrit if needed
1054 if (salt.testTarget(venvPepper, 'I@nginx:server:site:nginx_proxy_jenkins and I@nginx:server:site:nginx_proxy_gerrit')) {
1055 salt.enforceState(venvPepper, 'I@nginx:server:site:nginx_proxy_jenkins and I@nginx:server:site:nginx_proxy_gerrit', 'nginx.server', true, true, null, false, 60, 2)
1056 }
1057 // Apply changes for HaProxy on CI/CD nodes
1058 salt.enforceState(venvPepper, 'I@keepalived:cluster:instance:cicd_control_vip and I@haproxy:proxy', 'haproxy.proxy', true)
1059 salt.upgradePackageAndRestartSaltMinion(venvPepper, 'I@jenkins:client and not I@salt:master', 'python-jenkins')
1060 salt.cmdRun(venvPepper, "I@salt:master", "salt -C 'I@jenkins:client and not I@salt:master' state.sls jenkins.client --async")
1061
1062 common.warningMsg("Jenkins update started in background in order to handle plugin post-install issues.")
1063 common.warningMsg("Please wait until it finished. Jenkins could be restarted during this procedure.")
1064 common.warningMsg("You can monitor job progress by running 'salt-run jobs.active' on master node")
1065 common.warningMsg("For ensuring that upgrade is done and there are no errors you can run the following command on salt master node")
1066 common.warningMsg("salt-run jobs.lookup_jid %salt_job_id%")
1067 common.warningMsg("Salt job ID could be found in the log above.")
1068 }
1069 }
Jakub Josef2c21c6c2018-02-08 18:51:42 +01001070}