blob: ef1c145af7241d67f8d57bf6ba46b03cb02c4457 [file] [log] [blame]
Victor Ryzhenkinef34a022018-06-22 19:36:13 +04001/**
2 * Update kuberentes cluster
3 *
4 * Expected parameters:
5 * SALT_MASTER_CREDENTIALS Credentials to the Salt API.
6 * SALT_MASTER_URL Full Salt API address [https://10.10.10.1:8000].
7 * KUBERNETES_HYPERKUBE_IMAGE Target kubernetes version. May be null in case of reclass-system rollout
8 * KUBERNETES_PAUSE_IMAGE Kubernetes pause image should have same version as hyperkube. May be null in case of reclass-system rollout
9 * TARGET_UPDATES Comma separated list of nodes to update (Valid values are ctl,cmp)
10 * CTL_TARGET Salt targeted kubernetes CTL nodes (ex. I@kubernetes:master). Kubernetes control plane
11 * CMP_TARGET Salt targeted compute nodes (ex. cmp* and 'I@kubernetes:pool') Kubernetes computes
12 * PER_NODE Target nodes will be managed one by one (bool)
Victor Ryzhenkin42e4b382018-09-11 17:57:56 +040013 * SIMPLE_UPGRADE Use previous version of upgrade without conron/drain abilities
14 * UPGRADE_DOCKER Upgrade docker component
Victor Ryzhenkinae22a5a2018-10-12 15:52:27 +040015 * CONFORMANCE_RUN_AFTER Run Kubernetes conformance tests after update
16 * CONFORMANCE_RUN_BEFORE Run Kubernetes conformance tests before update
17 * TEST_K8S_API_SERVER Kubernetes API server address for test execution
18 * ARTIFACTORY_URL Artifactory URL where docker images located. Needed to correctly fetch conformance images.
Aleksei Kasatkinff9d5b52018-10-26 11:47:46 +020019 * UPGRADE_CALICO_V2_TO_V3 Perform Calico upgrade from v2 to v3.
20 * KUBERNETES_CALICO_IMAGE Target calico/node image. May be null in case of reclass-system rollout.
21 * KUBERNETES_CALICO_CALICOCTL_IMAGE Target calico/ctl image. May be null in case of reclass-system rollout.
22 * KUBERNETES_CALICO_CNI_IMAGE Target calico/cni image. May be null in case of reclass-system rollout.
23 * KUBERNETES_CALICO_KUBE_CONTROLLERS_IMAGE Target calico/kube-controllers image. May be null in case of reclass-system rollout.
24 * CALICO_UPGRADE_VERSION Version of "calico-upgrade" utility to be used ("v1.0.5" for Calico v3.1.3 target).
Victor Ryzhenkinef34a022018-06-22 19:36:13 +040025 *
26**/
Aleksei Kasatkin9ce11842018-11-23 14:27:33 +010027import groovy.json.JsonSlurper
28
Victor Ryzhenkinef34a022018-06-22 19:36:13 +040029def common = new com.mirantis.mk.Common()
30def salt = new com.mirantis.mk.Salt()
31def python = new com.mirantis.mk.Python()
Victor Ryzhenkin723bd062018-12-11 17:09:06 +040032def test = new com.mirantis.mk.Test()
Victor Ryzhenkinef34a022018-06-22 19:36:13 +040033
34def updates = TARGET_UPDATES.tokenize(",").collect{it -> it.trim()}
35def pepperEnv = "pepperEnv"
36
Aleksei Kasatkinff9d5b52018-10-26 11:47:46 +020037def POOL = "I@kubernetes:pool"
38def calicoImagesValid = false
39
Aleksei Kasatkin1f4f5ba2018-11-20 18:30:36 +010040ETCD_ENDPOINTS = ""
41
Victor Ryzhenkinef34a022018-06-22 19:36:13 +040042def overrideKubernetesImage(pepperEnv) {
43 def salt = new com.mirantis.mk.Salt()
44
45 def k8sSaltOverrides = """
46 kubernetes_hyperkube_image: ${KUBERNETES_HYPERKUBE_IMAGE}
47 kubernetes_pause_image: ${KUBERNETES_PAUSE_IMAGE}
48 """
49 stage("Override kubernetes images to target version") {
50 salt.setSaltOverrides(pepperEnv, k8sSaltOverrides)
51 }
52}
53
Aleksei Kasatkinff9d5b52018-10-26 11:47:46 +020054def overrideCalicoImages(pepperEnv) {
55 def salt = new com.mirantis.mk.Salt()
56
57 def calicoSaltOverrides = """
58 kubernetes_calico_image: ${KUBERNETES_CALICO_IMAGE}
59 kubernetes_calico_calicoctl_image: ${KUBERNETES_CALICO_CALICOCTL_IMAGE}
60 kubernetes_calico_cni_image: ${KUBERNETES_CALICO_CNI_IMAGE}
61 kubernetes_calico_kube_controllers_image: ${KUBERNETES_CALICO_KUBE_CONTROLLERS_IMAGE}
62 """
63 stage("Override calico images to target version") {
64 salt.setSaltOverrides(pepperEnv, calicoSaltOverrides)
65 }
66}
67
68def downloadCalicoUpgrader(pepperEnv, target) {
69 def salt = new com.mirantis.mk.Salt()
70
71 stage("Downloading calico-upgrade utility") {
72 salt.cmdRun(pepperEnv, target, "rm -f ./calico-upgrade")
73 salt.cmdRun(pepperEnv, target, "wget https://github.com/projectcalico/calico-upgrade/releases/download/${CALICO_UPGRADE_VERSION}/calico-upgrade")
74 salt.cmdRun(pepperEnv, target, "chmod +x ./calico-upgrade")
75 }
76}
77
78def pullCalicoImages(pepperEnv, target) {
79 def salt = new com.mirantis.mk.Salt()
80
81 stage("Pulling updated Calico docker images") {
82 salt.cmdRun(pepperEnv, target, "docker pull ${KUBERNETES_CALICO_IMAGE}")
83 salt.cmdRun(pepperEnv, target, "docker pull ${KUBERNETES_CALICO_CALICOCTL_IMAGE}")
84 salt.cmdRun(pepperEnv, target, "docker pull ${KUBERNETES_CALICO_CNI_IMAGE}")
85 salt.cmdRun(pepperEnv, target, "docker pull ${KUBERNETES_CALICO_KUBE_CONTROLLERS_IMAGE}")
86 }
87}
88
Victor Ryzhenkinef34a022018-06-22 19:36:13 +040089def performKubernetesComputeUpdate(pepperEnv, target) {
90 def salt = new com.mirantis.mk.Salt()
91
92 stage("Execute Kubernetes compute update on ${target}") {
93 salt.enforceState(pepperEnv, target, 'kubernetes.pool')
94 salt.runSaltProcessStep(pepperEnv, target, 'service.restart', ['kubelet'])
95 }
96}
97
98def performKubernetesControlUpdate(pepperEnv, target) {
99 def salt = new com.mirantis.mk.Salt()
100
101 stage("Execute Kubernetes control plane update on ${target}") {
102 salt.enforceStateWithExclude(pepperEnv, target, "kubernetes", "kubernetes.master.setup")
103 // Restart kubelet
104 salt.runSaltProcessStep(pepperEnv, target, 'service.restart', ['kubelet'])
105 }
106}
107
Aleksei Kasatkinff9d5b52018-10-26 11:47:46 +0200108def startCalicoUpgrade(pepperEnv, target) {
109 def salt = new com.mirantis.mk.Salt()
110
111 stage("Starting upgrade using calico-upgrade: migrate etcd schema and lock Calico") {
Aleksei Kasatkinff9d5b52018-10-26 11:47:46 +0200112 def cmd = "export APIV1_ETCD_ENDPOINTS=${ETCD_ENDPOINTS} && " +
113 "export APIV1_ETCD_CA_CERT_FILE=/var/lib/etcd/ca.pem && " +
114 "export APIV1_ETCD_CERT_FILE=/var/lib/etcd/etcd-client.crt && " +
115 "export APIV1_ETCD_KEY_FILE=/var/lib/etcd/etcd-client.key && " +
116 "export ETCD_ENDPOINTS=${ETCD_ENDPOINTS} && " +
117 "export ETCD_CA_CERT_FILE=/var/lib/etcd/ca.pem && " +
118 "export ETCD_CERT_FILE=/var/lib/etcd/etcd-client.crt && " +
119 "export ETCD_KEY_FILE=/var/lib/etcd/etcd-client.key && " +
120 "rm /root/upg_complete -f && " +
121 "./calico-upgrade start --no-prompts --ignore-v3-data > upgrade-start.log && " +
122 "until [ -f /root/upg_complete ]; do sleep 0.1; done && " +
123 "./calico-upgrade complete --no-prompts > upgrade-complete.log && " +
124 "rm /root/upg_complete -f"
125 // "saltArgs = ['async']" doesn't work, so we have to run "cmd.run --async"
126 salt.cmdRun(pepperEnv, "I@salt:master", "salt -C '${target}' cmd.run '${cmd}' --async")
127 salt.cmdRun(pepperEnv, target, "until [ -f /root/upgrade-start.log ]; do sleep 0.1; done")
128 }
129}
130
131def completeCalicoUpgrade(pepperEnv, target) {
132 def salt = new com.mirantis.mk.Salt()
133
134 stage("Complete upgrade using calico-upgrade: unlock Calico") {
135 salt.cmdRun(pepperEnv, target, "echo 'true' > /root/upg_complete")
136 salt.cmdRun(pepperEnv, target, "while [ -f /root/upg_complete ]; do sleep 0.1; done")
137 salt.cmdRun(pepperEnv, target, "cat /root/upgrade-start.log")
138 salt.cmdRun(pepperEnv, target, "cat /root/upgrade-complete.log")
139 }
140}
141
Aleksei Kasatkind9d682e2018-12-12 14:51:59 +0100142def performCalicoConfigurationUpdateAndServicesRestart(pepperEnv, target, ctl_node) {
Aleksei Kasatkinff9d5b52018-10-26 11:47:46 +0200143 def salt = new com.mirantis.mk.Salt()
144
145 stage("Performing Calico configuration update and services restart") {
Aleksei Kasatkind9d682e2018-12-12 14:51:59 +0100146 if (containerDenabled(pepperEnv, ctl_node)) {
147 salt.enforceState(pepperEnv, target, "kubernetes.pool")
148 } else {
149 salt.enforceState(pepperEnv, target, "kubernetes.pool.calico")
150 }
Aleksei Kasatkinff9d5b52018-10-26 11:47:46 +0200151 salt.runSaltProcessStep(pepperEnv, target, 'service.restart', ['kubelet'])
152 }
153}
154
Victor Ryzhenkin42e4b382018-09-11 17:57:56 +0400155def cordonNode(pepperEnv, target) {
156 def salt = new com.mirantis.mk.Salt()
157 def originalTarget = "I@kubernetes:master and not ${target}"
158
159 stage("Cordoning ${target} kubernetes node") {
160 def nodeShortName = target.tokenize(".")[0]
161 salt.cmdRun(pepperEnv, originalTarget, "kubectl cordon ${nodeShortName}", true, 1)
162 }
163}
164
165def uncordonNode(pepperEnv, target) {
166 def salt = new com.mirantis.mk.Salt()
167 def originalTarget = "I@kubernetes:master and not ${target}"
168
169 stage("Uncordoning ${target} kubernetes node") {
170 def nodeShortName = target.tokenize(".")[0]
171 salt.cmdRun(pepperEnv, originalTarget, "kubectl uncordon ${nodeShortName}", true, 1)
172 }
173}
174
175def drainNode(pepperEnv, target) {
176 def salt = new com.mirantis.mk.Salt()
177 def originalTarget = "I@kubernetes:master and not ${target}"
178
179 stage("Draining ${target} kubernetes node") {
180 def nodeShortName = target.tokenize(".")[0]
181 salt.cmdRun(pepperEnv, originalTarget, "kubectl drain --force --ignore-daemonsets --grace-period 100 --timeout 300s --delete-local-data ${nodeShortName}", true, 1)
182 }
183}
184
185def regenerateCerts(pepperEnv, target) {
186 def salt = new com.mirantis.mk.Salt()
187
188 stage("Regenerate certs for ${target}") {
189 salt.enforceState(pepperEnv, target, 'salt.minion.cert')
190 }
191}
192
Victor Ryzhenkinae909182018-10-02 17:49:18 +0400193def updateAddons(pepperEnv, target) {
194 def salt = new com.mirantis.mk.Salt()
195
196 stage("Upgrading Addons at ${target}") {
Victor Ryzhenkin40625bc2018-10-04 16:15:27 +0400197 salt.enforceState(pepperEnv, target, "kubernetes.master.kube-addons")
Victor Ryzhenkinfd9677f2018-10-16 16:14:40 +0400198 }
199}
200
201def updateAddonManager(pepperEnv, target) {
202 def salt = new com.mirantis.mk.Salt()
203
204 stage("Upgrading AddonManager at ${target}") {
Victor Ryzhenkinae909182018-10-02 17:49:18 +0400205 salt.enforceState(pepperEnv, target, "kubernetes.master.setup")
206 }
207}
208
Victor Ryzhenkin42e4b382018-09-11 17:57:56 +0400209def upgradeDocker(pepperEnv, target) {
210 def salt = new com.mirantis.mk.Salt()
211
212 stage("Upgrading docker at ${target}") {
213 salt.enforceState(pepperEnv, target, 'docker.host')
214 }
215}
Victor Ryzhenkinef34a022018-06-22 19:36:13 +0400216
Victor Ryzhenkinae22a5a2018-10-12 15:52:27 +0400217def runConformance(pepperEnv, target, k8s_api, image) {
218 def salt = new com.mirantis.mk.Salt()
219 def containerName = 'conformance_tests'
220 output_file = image.replaceAll('/', '-') + '.output'
221 def output_file_full_path = "/tmp/" + image.replaceAll('/', '-') + '.output'
222 def artifacts_dir = '_artifacts/'
223 salt.cmdRun(pepperEnv, target, "docker rm -f ${containerName}", false)
224 salt.cmdRun(pepperEnv, target, "docker run -d --name ${containerName} --net=host -e API_SERVER=${k8s_api} ${image}")
225 sleep(10)
226
227 print("Waiting for tests to run...")
228 salt.runSaltProcessStep(pepperEnv, target, 'cmd.run', ["docker wait ${containerName}"], null, false)
229
230 print("Writing test results to output file...")
231 salt.runSaltProcessStep(pepperEnv, target, 'cmd.run', ["docker logs -t ${containerName} > ${output_file_full_path}"])
232 print("Conformance test output saved in " + output_file_full_path)
233
234 // collect output
235 sh "mkdir -p ${artifacts_dir}"
236 file_content = salt.getFileContent(pepperEnv, target, '/tmp/' + output_file)
237 writeFile file: "${artifacts_dir}${output_file}", text: file_content
238 sh "cat ${artifacts_dir}${output_file}"
239 try {
240 sh "cat ${artifacts_dir}${output_file} | grep 'Test Suite Failed' && exit 1 || exit 0"
241 } catch (Throwable e) {
242 print("Conformance tests failed. Please check output")
243 currentBuild.result = "FAILURE"
244 currentBuild.description = currentBuild.description ? e.message + " " + currentBuild.description : e.message
245 throw e
246 }
247}
248
249def buildImageURL(pepperEnv, target, mcp_repo) {
250 def salt = new com.mirantis.mk.Salt()
251 def raw_version = salt.cmdRun(pepperEnv, target, "kubectl version --short -o json")['return'][0].values()[0].replaceAll('Salt command execution success','')
252 print("Kubernetes version: " + raw_version)
253 def serialized_version = readJSON text: raw_version
254 def short_version = (serialized_version.serverVersion.gitVersion =~ /([v])(\d+\.)(\d+\.)(\d+\-)(\d+)/)[0][0]
255 print("Kubernetes short version: " + short_version)
256 def conformance_image = mcp_repo + "/mirantis/kubernetes/k8s-conformance:" + short_version
257 return conformance_image
258}
259
260def executeConformance(pepperEnv, target, k8s_api, mcp_repo) {
261 stage("Running conformance tests") {
262 def image = buildImageURL(pepperEnv, target, mcp_repo)
263 print("Using image: " + image)
264 runConformance(pepperEnv, target, k8s_api, image)
265 }
266}
267
Victor Ryzhenkin723bd062018-12-11 17:09:06 +0400268def containerDinstalled(pepperEnv, target) {
269 def salt = new com.mirantis.mk.Salt()
270 return salt.cmdRun(pepperEnv, target, "containerd --version 2>1 1>/dev/null && echo 'true' || echo 'false'"
271 )['return'][0].values()[0].replaceAll('Salt command execution success','').trim().toBoolean()
272}
273
274def containerDenabled(pepperEnv, target) {
275 def salt = new com.mirantis.mk.Salt()
Victor Ryzhenkin71ecdf42018-12-11 22:22:50 +0400276 return salt.getPillar(pepperEnv, target, "kubernetes:common:containerd:enabled"
Victor Ryzhenkin723bd062018-12-11 17:09:06 +0400277 )["return"][0].values()[0].toBoolean()
278}
279
280def conformancePodDefExists(pepperEnv, target) {
281 def salt = new com.mirantis.mk.Salt()
282 return salt.cmdRun(pepperEnv, target, "test -e /srv/kubernetes/conformance.yml && echo 'true' || echo 'false'"
283 )['return'][0].values()[0].replaceAll('Salt command execution success','').trim().toBoolean()
284}
285
Aleksei Kasatkinff9d5b52018-10-26 11:47:46 +0200286def checkCalicoUpgradeSuccessful(pepperEnv, target) {
287 def salt = new com.mirantis.mk.Salt()
288
289 stage("Checking cluster state after Calico upgrade") {
290 // TODO add auto-check of results
291 salt.cmdRun(pepperEnv, target, "calicoctl version | grep -i version")
292 salt.cmdRun(pepperEnv, target, "calicoctl node status")
Aleksei Kasatkin1f4f5ba2018-11-20 18:30:36 +0100293 salt.cmdRun(pepperEnv, target, "calicoctl node checksystem")
294 }
295}
296
297def checkCalicoUpgradePossibility(pepperEnv, target) {
298 def salt = new com.mirantis.mk.Salt()
299
300 stage("Verification of Calico upgrade possibility") {
301 // check Calico version
302 def versionResult = salt.cmdRun(
303 pepperEnv, target, "calicoctl version | grep 'Cluster Version'"
304 )['return'][0].values()[0].split("\n")[0].trim()
305 versionStr = (versionResult - "Cluster Version:").trim()
306 version = versionStr.tokenize(".")
307 if ((version.size() < 3) || (version[0] != "v2") || (version[1] != "6") || (version[2].toInteger() < 5)) {
308 error(
309 "Current Calico ${versionStr} cannot be upgraded to v3.x. " +
310 "Calico v2.6.x starting from v2.6.5 can be upgraded. " +
311 "For earlier versions, please update to v2.6.5 first."
312 )
313 }
314 print("Calico version was determined: ${versionStr}")
315
316 // check Calico is switched on
317 def readinessResult = salt.cmdRun(
318 pepperEnv, target, ". /var/lib/etcd/configenv && etcdctl get /calico/v1/Ready"
319 )['return'][0].values()[0].split("\n")[0].trim()
320 print("Calico readiness check result: ${readinessResult}")
321 if (readinessResult != "true") {
322 // try set it to true
323 readinessResult = salt.cmdRun(
324 pepperEnv, target, ". /var/lib/etcd/configenv && etcdctl set /calico/v1/Ready true"
325 )['return'][0].values()[0].split("\n")[0].trim()
326 print("Calico readiness result 2nd attempt: ${readinessResult}")
327 if (readinessResult != "true") {
328 error("Calico is not ready. '/calico/v1/Ready': '${readinessResult}'")
329 }
330 }
331
332 // Calico data upgrade dry-run
333 def cmd = "export APIV1_ETCD_ENDPOINTS=${ETCD_ENDPOINTS} && " +
334 "export APIV1_ETCD_CA_CERT_FILE=/var/lib/etcd/ca.pem && " +
335 "export APIV1_ETCD_CERT_FILE=/var/lib/etcd/etcd-client.crt && " +
336 "export APIV1_ETCD_KEY_FILE=/var/lib/etcd/etcd-client.key && " +
337 "export ETCD_ENDPOINTS=${ETCD_ENDPOINTS} && " +
338 "export ETCD_CA_CERT_FILE=/var/lib/etcd/ca.pem && " +
339 "export ETCD_CERT_FILE=/var/lib/etcd/etcd-client.crt && " +
340 "export ETCD_KEY_FILE=/var/lib/etcd/etcd-client.key && " +
341 "./calico-upgrade dry-run --ignore-v3-data"
342 def dryRunResult = salt.cmdRun(pepperEnv, target, cmd)['return'][0].values()[0]
343 // check dry-run result
344 def validationSuccessStr = "Successfully validated v1 to v3 conversion"
345 if (!dryRunResult.contains(validationSuccessStr)) {
346 error("Calico data upgrade dry-run has failed")
347 }
Aleksei Kasatkinff9d5b52018-10-26 11:47:46 +0200348 }
349}
Victor Ryzhenkinae22a5a2018-10-12 15:52:27 +0400350
Aleksei Kasatkin9ce11842018-11-23 14:27:33 +0100351def checkCalicoPolicySetting(pepperEnv, target) {
352 def common = new com.mirantis.mk.Common()
353 def salt = new com.mirantis.mk.Salt()
354
355 stage("Checking of Calico network policy setting") {
356 // check Calico policy enabled
357 def cniPolicy = false
358 def addonsPolicy = false
359 def kubeCtrlRunning = false
360
361 // check CNI config
362 def cniCfgResult = salt.cmdRun(
363 pepperEnv, target, "cat /etc/cni/net.d/10-calico.conf"
364 )['return'][0].values()[0].toString()
365 def cniCfg = new JsonSlurper().parseText(cniCfgResult)
366 if (cniCfg.get("policy") != null) {
367 if (cniCfg["policy"].get("type") == "k8s") {
368 cniPolicy = true
369 } else {
370 common.warningMsg("Calico policy type is unknown or not set.")
371 }
372 }
373
374 // check k8s addons
375 def addonsResult = salt.cmdRun(
376 pepperEnv, target, "ls /etc/kubernetes/addons"
377 )['return'][0].values()[0].toString()
378 if (addonsResult.contains("calico_policy")) {
379 addonsPolicy = true
380 }
381
382 // check kube-controllers is running
383 def kubeCtrlResult = salt.cmdRun(
384 pepperEnv, target, "kubectl get pod -n kube-system --selector=k8s-app=calico-kube-controllers"
385 )['return'][0].values()[0].toString()
386 if (kubeCtrlResult.contains("Running")) {
387 kubeCtrlRunning = true
388 }
389
390 // It's safe to enable Calico policy any time, but it may be unsafe to disable it.
391 // So, no need to disable Calico policy for v3.x if it's not in use currently.
392 // But if Calico policy is in use already, it should be enabled after upgrade as well.
393
394 // check for consistency
395 if ((cniPolicy != addonsPolicy) || (addonsPolicy != kubeCtrlRunning)) {
396 caution = "ATTENTION. Calico policy setting cannot be determined reliably (enabled in CNI config: ${cniPolicy}, " +
397 "presence in k8s addons: ${addonsPolicy}, kube-controllers is running: ${kubeCtrlRunning})."
398 currentBuild.description += "<br><b>${caution}</b><br><br>"
399 common.warningMsg(caution)
400 } else {
401 common.infoMsg("Current Calico policy state is detected as: ${cniPolicy}")
402 if (cniPolicy) {
403 // Calico policy is in use. Check policy setting for v3.x.
404 common.infoMsg("Calico policy is in use. It should be enabled for v3.x as well.")
405 def saltPolicyResult = salt.getPillar(
406 pepperEnv, target, "kubernetes:pool:network:calico:policy"
407 )["return"][0].values()[0].toString()
408
409 common.infoMsg("kubernetes.pool.network.calico.policy: ${saltPolicyResult}")
410 if (saltPolicyResult.toLowerCase().contains("true")) {
411 common.infoMsg("Calico policy setting for v3.x is detected as: true")
412 } else {
413 caution = "ATTENTION. Currently, Calico is running with policy switched on. " +
414 "Calico policy setting for v3.x is not set to true. " +
415 "After upgrade is completed, Calico policy will be switched off. " +
416 "You will need to switch it on manually if required."
417 currentBuild.description += "<br><b>${caution}</b><br><br>"
418 common.warningMsg(caution)
419 }
420 }
421 }
422
423 if (addonsPolicy) {
424 // Remove v2.6.x policy-related addons on masters to not interfere with v3.x kube-controllers
425 salt.cmdRun(pepperEnv, CTL_TARGET, "rm -rf /etc/kubernetes/addons/calico_policy")
426 }
427 }
428}
429
Victor Ryzhenkinef34a022018-06-22 19:36:13 +0400430timeout(time: 12, unit: 'HOURS') {
431 node() {
432 try {
433
434 stage("Setup virtualenv for Pepper") {
435 python.setupPepperVirtualenv(pepperEnv, SALT_MASTER_URL, SALT_MASTER_CREDENTIALS)
436 }
437
Victor Ryzhenkinae22a5a2018-10-12 15:52:27 +0400438 if (CONFORMANCE_RUN_BEFORE.toBoolean()) {
439 def target = CTL_TARGET
440 def mcp_repo = ARTIFACTORY_URL
441 def k8s_api = TEST_K8S_API_SERVER
442 firstTarget = salt.getFirstMinion(pepperEnv, target)
Victor Ryzhenkin723bd062018-12-11 17:09:06 +0400443 def containerd_enabled = containerDenabled(pepperEnv, firstTarget)
444 def containerd_installed = containerDinstalled(pepperEnv, firstTarget)
445 def conformance_pod_ready = conformancePodDefExists(pepperEnv, firstTarget)
446 if (containerd_enabled && containerd_installed && conformance_pod_ready) {
447 def config = ['master': pepperEnv,
448 'target': firstTarget,
449 'junitResults': false,
450 'autodetect': true]
451 test.executeConformance(config)
452 } else {
453 executeConformance(pepperEnv, firstTarget, k8s_api, mcp_repo)
454 }
Victor Ryzhenkinae22a5a2018-10-12 15:52:27 +0400455 }
456
Victor Ryzhenkinef34a022018-06-22 19:36:13 +0400457 if ((common.validInputParam('KUBERNETES_HYPERKUBE_IMAGE')) && (common.validInputParam('KUBERNETES_PAUSE_IMAGE'))) {
458 overrideKubernetesImage(pepperEnv)
459 }
460
Aleksei Kasatkinff9d5b52018-10-26 11:47:46 +0200461 if ((common.validInputParam('KUBERNETES_CALICO_IMAGE'))
462 && (common.validInputParam('KUBERNETES_CALICO_CALICOCTL_IMAGE'))
463 && (common.validInputParam('KUBERNETES_CALICO_CNI_IMAGE'))
464 && (common.validInputParam('KUBERNETES_CALICO_KUBE_CONTROLLERS_IMAGE'))
465 ) {
466 calicoImagesValid = true
467 overrideCalicoImages(pepperEnv)
468 }
469
Victor Ryzhenkinef34a022018-06-22 19:36:13 +0400470 /*
Aleksei Kasatkinff9d5b52018-10-26 11:47:46 +0200471 * Execute Calico upgrade if needed (only for v2 to v3 upgrade).
472 * This part causes workloads operations downtime.
473 * It is only required for Calico v2.x to v3.x upgrade when etcd is in use for Calico
474 * as Calico etcd schema has different formats for Calico v2.x and Calico v3.x.
475 */
476 if (UPGRADE_CALICO_V2_TO_V3.toBoolean()) {
477 // one CTL node will be used for running upgrade of Calico etcd schema
478 def ctl_node = salt.getMinionsSorted(pepperEnv, CTL_TARGET)[0]
479
Aleksei Kasatkin1f4f5ba2018-11-20 18:30:36 +0100480 // get ETCD_ENDPOINTS in use by Calico
481 def ep_str = salt.cmdRun(pepperEnv, ctl_node, "cat /etc/calico/calicoctl.cfg | grep etcdEndpoints")['return'][0].values()[0]
482 ETCD_ENDPOINTS = ep_str.split("\n")[0].tokenize(' ')[1]
483 print("ETCD_ENDPOINTS in use by Calico: '${ETCD_ENDPOINTS}'")
484
485 // download calico-upgrade utility
Aleksei Kasatkinff9d5b52018-10-26 11:47:46 +0200486 downloadCalicoUpgrader(pepperEnv, ctl_node)
Aleksei Kasatkin1f4f5ba2018-11-20 18:30:36 +0100487
488 // check the possibility of upgrading of Calico
489 checkCalicoUpgradePossibility(pepperEnv, ctl_node)
490
491 // prepare for upgrade. when done in advance, this will decrease downtime during upgrade
Aleksei Kasatkinff9d5b52018-10-26 11:47:46 +0200492 if (calicoImagesValid) {
493 pullCalicoImages(pepperEnv, POOL)
494 }
495
Aleksei Kasatkin9ce11842018-11-23 14:27:33 +0100496 // check and adjust Calico policy setting
497 checkCalicoPolicySetting(pepperEnv, ctl_node)
498
Aleksei Kasatkinff9d5b52018-10-26 11:47:46 +0200499 // this sequence implies workloads operations downtime
500 startCalicoUpgrade(pepperEnv, ctl_node)
Aleksei Kasatkind9d682e2018-12-12 14:51:59 +0100501 performCalicoConfigurationUpdateAndServicesRestart(pepperEnv, POOL, ctl_node)
Aleksei Kasatkinff9d5b52018-10-26 11:47:46 +0200502 completeCalicoUpgrade(pepperEnv, ctl_node)
503 // after that no downtime is expected
504
505 checkCalicoUpgradeSuccessful(pepperEnv, POOL)
506 }
507
508 /*
509 * Execute k8s update
Victor Ryzhenkinef34a022018-06-22 19:36:13 +0400510 */
511 if (updates.contains("ctl")) {
512 def target = CTL_TARGET
513
514 if (PER_NODE.toBoolean()) {
515 def targetHosts = salt.getMinionsSorted(pepperEnv, target)
516
517 for (t in targetHosts) {
Victor Ryzhenkin42e4b382018-09-11 17:57:56 +0400518 if (SIMPLE_UPGRADE.toBoolean()) {
519 performKubernetesControlUpdate(pepperEnv, t)
520 } else {
521 cordonNode(pepperEnv, t)
522 drainNode(pepperEnv, t)
523 regenerateCerts(pepperEnv, t)
524 if (UPGRADE_DOCKER.toBoolean()) {
525 upgradeDocker(pepperEnv, t)
526 }
527 performKubernetesControlUpdate(pepperEnv, t)
Victor Ryzhenkinfd9677f2018-10-16 16:14:40 +0400528 updateAddonManager(pepperEnv, t)
Victor Ryzhenkin42e4b382018-09-11 17:57:56 +0400529 uncordonNode(pepperEnv, t)
530 }
Victor Ryzhenkinef34a022018-06-22 19:36:13 +0400531 }
532 } else {
533 performKubernetesControlUpdate(pepperEnv, target)
534 }
Victor Ryzhenkinfd9677f2018-10-16 16:14:40 +0400535 if (!SIMPLE_UPGRADE.toBoolean()) {
Aleksei Kasatkinff9d5b52018-10-26 11:47:46 +0200536 // Addons upgrade should be performed after all nodes will be upgraded
Victor Ryzhenkinfd9677f2018-10-16 16:14:40 +0400537 updateAddons(pepperEnv, target)
538 // Wait for 90 sec for addons reconciling
539 sleep(90)
540 }
Victor Ryzhenkinef34a022018-06-22 19:36:13 +0400541 }
542
543 if (updates.contains("cmp")) {
544 def target = CMP_TARGET
545
546 if (PER_NODE.toBoolean()) {
547 def targetHosts = salt.getMinionsSorted(pepperEnv, target)
548
549 for (t in targetHosts) {
Victor Ryzhenkin42e4b382018-09-11 17:57:56 +0400550 if (SIMPLE_UPGRADE.toBoolean()) {
551 performKubernetesComputeUpdate(pepperEnv, t)
552 } else {
553 cordonNode(pepperEnv, t)
554 drainNode(pepperEnv, t)
555 regenerateCerts(pepperEnv, t)
556 if (UPGRADE_DOCKER.toBoolean()) {
557 upgradeDocker(pepperEnv, t)
558 }
559 performKubernetesComputeUpdate(pepperEnv, t)
560 uncordonNode(pepperEnv, t)
561 }
Victor Ryzhenkinef34a022018-06-22 19:36:13 +0400562 }
563 } else {
564 performKubernetesComputeUpdate(pepperEnv, target)
565 }
566 }
Victor Ryzhenkinae22a5a2018-10-12 15:52:27 +0400567
568 if (CONFORMANCE_RUN_AFTER.toBoolean()) {
569 def target = CTL_TARGET
570 def mcp_repo = ARTIFACTORY_URL
571 def k8s_api = TEST_K8S_API_SERVER
572 firstTarget = salt.getFirstMinion(pepperEnv, target)
Victor Ryzhenkin723bd062018-12-11 17:09:06 +0400573 def containerd_enabled = containerDenabled(pepperEnv, firstTarget)
574 def containerd_installed = containerDinstalled(pepperEnv, firstTarget)
575 def conformance_pod_ready = conformancePodDefExists(pepperEnv, firstTarget)
576 if (containerd_enabled && containerd_installed && conformance_pod_ready) {
577 def config = ['master': pepperEnv,
578 'target': firstTarget,
579 'junitResults': false,
580 'autodetect': true]
581 test.executeConformance(config)
582 } else {
583 executeConformance(pepperEnv, firstTarget, k8s_api, mcp_repo)
584 }
Victor Ryzhenkinae22a5a2018-10-12 15:52:27 +0400585 }
Victor Ryzhenkinef34a022018-06-22 19:36:13 +0400586 } catch (Throwable e) {
587 // If there was an error or exception thrown, the build failed
588 currentBuild.result = "FAILURE"
589 currentBuild.description = currentBuild.description ? e.message + " " + currentBuild.description : e.message
590 throw e
591 }
592 }
593}