blob: 58d924a593c19eb26ea3826bb3a1461d9d231abd [file] [log] [blame]
Ales Komarek24097402017-05-22 16:28:10 +02001/**
2 *
Tomáš Kukrál0d00dd22017-07-27 14:28:36 +02003 * Launch stack and work with it
Ales Komarek24097402017-05-22 16:28:10 +02004 *
5 * Expected parameters:
6 * STACK_NAME Infrastructure stack name
Tomáš Kukrál4691f682017-07-27 16:36:12 +02007 * STACK_TEMPLATE File with stack template
8 * STACK_TYPE Deploy OpenStack/AWS [heat/aws], use 'physical' if no stack should be started
Ales Komarek24097402017-05-22 16:28:10 +02009 *
10 * STACK_TEMPLATE_URL URL to git repo with stack templates
11 * STACK_TEMPLATE_CREDENTIALS Credentials to the templates repo
12 * STACK_TEMPLATE_BRANCH Stack templates repo branch
13 *
14 * STACK_DELETE Delete stack when finished (bool)
Tomáš Kukrál4691f682017-07-27 16:36:12 +020015 * STACK_REUSE Reuse existing stack (don't create one, only read outputs)
Ales Komarek24097402017-05-22 16:28:10 +020016 * STACK_INSTALL What should be installed (k8s, openstack, ...)
17 * STACK_TEST Run tests (bool)
18 * STACK_CLEANUP_JOB Name of job for deleting stack
19 *
Tomáš Kukrál74f92862017-06-05 19:18:43 +020020 * STACK_COMPUTE_COUNT Number of compute nodes to launch
Vasyl Saienkoa81e9312018-03-06 01:28:35 +020021 * STACK_CLUSTER_NAME The name of cluster model to use
Jiri Broulik61b3e5d2017-12-19 15:42:30 +010022 * STATIC_MGMT_NETWORK Check if model contains static IP address definitions for all nodes
Tomáš Kukrál74f92862017-06-05 19:18:43 +020023 *
Ales Komarek24097402017-05-22 16:28:10 +020024 * AWS_STACK_REGION CloudFormation AWS region
25 * AWS_API_CREDENTIALS AWS Access key ID with AWS secret access key
Tomáš Kukrál7a8a4fa2017-05-25 14:54:24 +020026 * AWS_SSH_KEY AWS key pair name (used for SSH access)
Ales Komarek24097402017-05-22 16:28:10 +020027 *
28 * HEAT_STACK_ENVIRONMENT Heat stack environmental parameters
29 * HEAT_STACK_ZONE Heat stack availability zone
30 * HEAT_STACK_PUBLIC_NET Heat stack floating IP pool
31 * OPENSTACK_API_URL OpenStack API address
32 * OPENSTACK_API_CREDENTIALS Credentials to the OpenStack API
33 * OPENSTACK_API_PROJECT OpenStack project to connect to
34 * OPENSTACK_API_CLIENT Versions of OpenStack python clients
35 * OPENSTACK_API_VERSION Version of the OpenStack API (2/3)
Oleh Hryhorov9630a762017-10-24 14:33:25 +030036 * SLAVE_NODE Lable or node name where the job will be run
Tomáš Kukrál5c2ec132017-07-26 09:57:27 +020037
Ales Komarek24097402017-05-22 16:28:10 +020038 * SALT_MASTER_CREDENTIALS Credentials to the Salt API
Tomáš Kukrál4691f682017-07-27 16:36:12 +020039 * required for STACK_TYPE=physical
Ales Komarek24097402017-05-22 16:28:10 +020040 * SALT_MASTER_URL URL of Salt master
Tomáš Kukrál5c2ec132017-07-26 09:57:27 +020041
Oleg Iurchenko9a8c3d72017-12-21 14:55:38 +020042 * BOOTSTRAP_EXTRA_REPO_PARAMS optional parameter to define a list of extra repos with parameters
43 * which have to be added during bootstrap.
44 * Format: repo 1, repo priority 1, repo pin 1; repo 2, repo priority 2, repo pin 2;
45
Oleh Hryhorov825b5be2018-06-13 13:01:53 +030046 * SALT_VERSION Version of Salt which is going to be installed i.e. 'stable 2016.3' or 'stable 2017.7' etc.
47 *
Oleh Hryhorov2a63aa62018-06-22 17:26:41 +030048 * EXTRA_TARGET The value will be added to target nodes
49 *
Tomáš Kukrál5c2ec132017-07-26 09:57:27 +020050 * Test settings:
51 * TEST_K8S_API_SERVER Kubernetes API address
52 * TEST_K8S_CONFORMANCE_IMAGE Path to docker image with conformance e2e tests
Ales Komarek24097402017-05-22 16:28:10 +020053 *
Tomáš Kukrál5c2ec132017-07-26 09:57:27 +020054 * TEST_DOCKER_INSTALL Install docker on the target if true
55 * TEST_TEMPEST_IMAGE Tempest image link
56 * TEST_TEMPEST_PATTERN If not false, run tests matched to pattern only
57 * TEST_TEMPEST_TARGET Salt target for tempest node
ibumarskov637a2152018-01-16 10:39:57 +040058 * TESTRAIL_REPORT Whether upload results to testrail or not
59 * TESTRAIL_REPORTER_IMAGE Docker image for testrail reporter
60 * TESTRAIL_QA_CREDENTIALS Credentials for upload to testrail
61 * TESTRAIL_MILESTONE Product version for tests
62 * TESTRAIL_PLAN Testrail test plan
63 * TESTRAIL_GROUP Testrail test group
64 * TESTRAIL_SUITE Testrail test suite
Ales Komarek24097402017-05-22 16:28:10 +020065 *
Tomáš Kukrál5c2ec132017-07-26 09:57:27 +020066 * optional parameters for overwriting soft params
67 * SALT_OVERRIDES YAML with overrides for Salt deployment
Ales Komarek24097402017-05-22 16:28:10 +020068 *
69 */
Tomáš Kukrál3a17dd62017-07-27 18:24:16 +020070
Ales Komarek24097402017-05-22 16:28:10 +020071common = new com.mirantis.mk.Common()
72git = new com.mirantis.mk.Git()
73openstack = new com.mirantis.mk.Openstack()
Tomáš Kukrál7a8a4fa2017-05-25 14:54:24 +020074aws = new com.mirantis.mk.Aws()
Ales Komarek24097402017-05-22 16:28:10 +020075orchestrate = new com.mirantis.mk.Orchestrate()
Mykyta Karpine016d7e2017-10-09 13:35:20 +030076python = new com.mirantis.mk.Python()
Ales Komarek24097402017-05-22 16:28:10 +020077salt = new com.mirantis.mk.Salt()
78test = new com.mirantis.mk.Test()
79
80_MAX_PERMITTED_STACKS = 2
81overwriteFile = "/srv/salt/reclass/classes/cluster/override.yml"
82
Tomáš Kukrála1d86b82017-07-10 17:24:01 +020083// Define global variables
Tomáš Kukrála1d86b82017-07-10 17:24:01 +020084def venv
chnyda597fb032017-10-06 13:42:48 +020085def venvPepper
Tomáš Kukrál8e50d8e2017-09-01 17:40:53 +020086def outputs = [:]
Tomáš Kukrálbc4be252017-06-06 11:28:40 +020087
chnydae14058a2017-08-29 15:07:48 +020088def ipRegex = "\\d{1,3}\\.\\d{1,3}\\.\\d{1,3}\\.\\d{1,3}"
89
Tomáš Kukrálb19bdda2017-06-13 17:09:43 +020090if (STACK_TYPE == 'aws') {
Tomáš Kukrála1d86b82017-07-10 17:24:01 +020091 def aws_env_vars
Tomáš Kukrál8427ff52017-08-30 15:46:52 +020092} else if (STACK_TYPE == 'heat') {
93 def envParams
94 def openstackCloud
Tomáš Kukrálb19bdda2017-06-13 17:09:43 +020095}
96
Oleh Hryhorov9630a762017-10-24 14:33:25 +030097def slave_node = 'python'
98
Oleh Hryhorov54460512017-10-26 18:45:36 +030099if (common.validInputParam('SLAVE_NODE')) {
Oleh Hryhorov9630a762017-10-24 14:33:25 +0300100 slave_node = SLAVE_NODE
101}
Oleh Hryhorov2a63aa62018-06-22 17:26:41 +0300102
103def extra_tgt = ''
Stanislav Riazanovf0302582019-02-04 17:47:06 +0400104def extra_tgt_bckp = ''
Oleh Hryhorov2a63aa62018-06-22 17:26:41 +0300105if (common.validInputParam('EXTRA_TARGET')) {
106 extra_tgt = "${EXTRA_TARGET}"
107}
108
Jakub Josefa63f9862018-01-11 17:58:38 +0100109timeout(time: 12, unit: 'HOURS') {
110 node(slave_node) {
111 try {
112 // Set build-specific variables
Jakub Josef88aaf832018-01-18 16:18:28 +0100113 def workspace = common.getWorkspace()
114 venv = "${workspace}/venv"
115 venvPepper = "${workspace}/venvPepper"
Jakub Josef052e77a2018-03-05 15:19:03 +0100116 if(common.validInputParam("STACK_DELETE") && STACK_DELETE.toBoolean()){
117 common.warningMsg("You running stack with STACK_DELETE option enabled, deployed stack will be removed at the end!")
118 }
Jakub Josefa63f9862018-01-11 17:58:38 +0100119 //
120 // Prepare machines
121 //
122 stage ('Create infrastructure') {
Tomáš Kukrála1d86b82017-07-10 17:24:01 +0200123
Jakub Josefa63f9862018-01-11 17:58:38 +0100124 outputs.put('stack_type', STACK_TYPE)
Ales Komarek24097402017-05-22 16:28:10 +0200125
Jakub Josefa63f9862018-01-11 17:58:38 +0100126 if (STACK_TYPE == 'heat') {
127 // value defaults
128 envParams = [
129 'cluster_zone': HEAT_STACK_ZONE,
130 'cluster_public_net': HEAT_STACK_PUBLIC_NET
131 ]
Tomáš Kukrál8e50d8e2017-09-01 17:40:53 +0200132
Jakub Josefa63f9862018-01-11 17:58:38 +0100133 if (STACK_REUSE.toBoolean() == true && STACK_NAME == '') {
134 error("If you want to reuse existing stack you need to provide it's name")
Ruslan Kamaldinov65144322017-08-02 15:16:55 +0400135 }
Tomáš Kukrál550364e2017-08-23 11:42:45 +0200136
Jakub Josefa63f9862018-01-11 17:58:38 +0100137 if (STACK_REUSE.toBoolean() == false) {
Vasyl Saienko293fa3f2019-01-22 21:14:37 +0200138 // TODO(vsaienko): remove stack creation from this pipeline to separate job
139 // Allow to set custom stack name but user-id will be added anyway
140 // This will fix issue with cleanup when job is aborted by jenkins and
141 // still guarantee stack count per user.
142 def stackNameSuffix = "${JOB_NAME}-${BUILD_NUMBER}"
143 if (STACK_NAME != ''){
144 stackNameSuffix = STACK_NAME
145 }
Jakub Josefa63f9862018-01-11 17:58:38 +0100146 wrap([$class: 'BuildUser']) {
147 if (env.BUILD_USER_ID) {
Vasyl Saienko293fa3f2019-01-22 21:14:37 +0200148 STACK_NAME = "${env.BUILD_USER_ID}-${stackNameSuffix}"
Jakub Josefa63f9862018-01-11 17:58:38 +0100149 } else {
Vasyl Saienko293fa3f2019-01-22 21:14:37 +0200150 STACK_NAME = "jenkins-${stackNameSuffix}"
Jakub Josefa63f9862018-01-11 17:58:38 +0100151 }
152 currentBuild.description = STACK_NAME
Ales Komarek24097402017-05-22 16:28:10 +0200153 }
Inessa Vasilevskaya7fd23f22018-10-09 10:58:46 +0200154 } else {
155 // In case name was copied with unicode zero-width space chars -
156 // remove them
157 STACK_NAME = STACK_NAME.trim().replaceAll("\\p{C}", "")
Ales Komarek24097402017-05-22 16:28:10 +0200158 }
159
Ruslan Kamaldinov65144322017-08-02 15:16:55 +0400160 // no underscore in STACK_NAME
161 STACK_NAME = STACK_NAME.replaceAll('_', '-')
Jakub Josefa63f9862018-01-11 17:58:38 +0100162 outputs.put('stack_name', STACK_NAME)
Ales Komarek24097402017-05-22 16:28:10 +0200163
Jakub Josefa63f9862018-01-11 17:58:38 +0100164 // set description
165 currentBuild.description = "${STACK_NAME}"
Ruslan Kamaldinov65144322017-08-02 15:16:55 +0400166
Ales Komarek24097402017-05-22 16:28:10 +0200167 // get templates
168 git.checkoutGitRepository('template', STACK_TEMPLATE_URL, STACK_TEMPLATE_BRANCH, STACK_TEMPLATE_CREDENTIALS)
169
Jakub Josefa63f9862018-01-11 17:58:38 +0100170 // create openstack env
171 openstack.setupOpenstackVirtualenv(venv, OPENSTACK_API_CLIENT)
Jakub Josef88aaf832018-01-18 16:18:28 +0100172 openstackCloud = openstack.createOpenstackEnv(venv,
Jakub Josefa63f9862018-01-11 17:58:38 +0100173 OPENSTACK_API_URL, OPENSTACK_API_CREDENTIALS,
174 OPENSTACK_API_PROJECT, OPENSTACK_API_PROJECT_DOMAIN,
175 OPENSTACK_API_PROJECT_ID, OPENSTACK_API_USER_DOMAIN,
176 OPENSTACK_API_VERSION)
177 openstack.getKeystoneToken(openstackCloud, venv)
Ales Komarek24097402017-05-22 16:28:10 +0200178
Jakub Josefa63f9862018-01-11 17:58:38 +0100179 //
180 // Verify possibility of create stack for given user and stack type
181 //
182 wrap([$class: 'BuildUser']) {
183 if (env.BUILD_USER_ID && !env.BUILD_USER_ID.equals("jenkins") && !STACK_REUSE.toBoolean()) {
184 def existingStacks = openstack.getStacksForNameContains(openstackCloud, "${env.BUILD_USER_ID}-${JOB_NAME}".replaceAll('_', '-'), venv)
185 if (existingStacks.size() >= _MAX_PERMITTED_STACKS) {
186 STACK_DELETE = "false"
187 throw new Exception("You cannot create new stack, you already have ${_MAX_PERMITTED_STACKS} stacks of this type (${JOB_NAME}). \nStack names: ${existingStacks}")
188 }
189 }
Tomáš Kukrál8e50d8e2017-09-01 17:40:53 +0200190 }
Jakub Josefa63f9862018-01-11 17:58:38 +0100191 // launch stack
192 if (STACK_REUSE.toBoolean() == false) {
Ruslan Kamaldinov65144322017-08-02 15:16:55 +0400193
Jakub Josefa63f9862018-01-11 17:58:38 +0100194 // set reclass repo in heat env
195 try {
196 envParams.put('cfg_reclass_branch', STACK_RECLASS_BRANCH)
197 envParams.put('cfg_reclass_address', STACK_RECLASS_ADDRESS)
198 } catch (MissingPropertyException e) {
199 common.infoMsg("Property STACK_RECLASS_BRANCH or STACK_RECLASS_ADDRESS not found! Using default values from template.")
Tomáš Kukrálf83409d2017-11-08 20:56:57 +0100200 }
201
Jakub Josefa63f9862018-01-11 17:58:38 +0100202 // put formulas revision - stable, testing or nightly
203 if (common.validInputParam('FORMULA_PKG_REVISION')) {
204 common.infoMsg("Setting formulas revision to ${FORMULA_PKG_REVISION}")
205 envParams.put('cfg_formula_pkg_revision', FORMULA_PKG_REVISION)
206 }
207
208 // put extra repo definitions
209 if (common.validInputParam('BOOTSTRAP_EXTRA_REPO_PARAMS')) {
210 common.infoMsg("Setting additional repo during bootstrap to ${BOOTSTRAP_EXTRA_REPO_PARAMS}")
211 envParams.put('cfg_bootstrap_extra_repo_params', BOOTSTRAP_EXTRA_REPO_PARAMS)
212 }
213
azvyagintsevb8ddb492018-09-12 14:59:45 +0300214 // put extra salt-formulas # FIXME: looks like some outdated logic. See #PROD-23127
Jakub Josefa63f9862018-01-11 17:58:38 +0100215 if (common.validInputParam('EXTRA_FORMULAS')) {
216 common.infoMsg("Setting extra salt-formulas to ${EXTRA_FORMULAS}")
217 envParams.put('cfg_extra_formulas', EXTRA_FORMULAS)
218 }
219
Vasyl Saienkoa81e9312018-03-06 01:28:35 +0200220 // add cluster name if specified
221 if (common.validInputParam('STACK_CLUSTER_NAME')) {
222 common.infoMsg("Setting cluster_name to ${STACK_CLUSTER_NAME}")
223 envParams.put('cluster_name', STACK_CLUSTER_NAME)
224 }
225
Vasyl Saienko51139fd2018-04-20 12:01:50 +0300226 if (common.validInputParam('STACK_COMPUTE_COUNT')) {
227 if (STACK_COMPUTE_COUNT.toInteger() > 0){
228 common.infoMsg("Setting cluster_node_count to ${STACK_COMPUTE_COUNT}")
229 envParams.put('cluster_node_count', STACK_COMPUTE_COUNT)
230 }
231 }
232
Oleh Hryhorov825b5be2018-06-13 13:01:53 +0300233
234 if (common.validInputParam('SALT_VERSION')) {
235 common.infoMsg("Setting salt version to ${SALT_VERSION}")
236 envParams.put('cfg_saltversion', SALT_VERSION)
237 }
238
Mykyta Karpin35f71332018-07-27 11:54:51 +0300239 // If stack wasn't removed by the same user which has created it,
240 // nova key pair won't be removed, so need to make sure that no
241 // key pair with the same name exists before creating the stack.
242 if (openstack.getKeyPair(openstackCloud, STACK_NAME, venv)){
243 try {
244 openstack.deleteKeyPair(openstackCloud, STACK_NAME, venv)
245 } catch (Exception e) {
246 common.errorMsg("Key pair failed to remove with error ${e.message}")
247 }
248 }
249
Jakub Josefa63f9862018-01-11 17:58:38 +0100250 openstack.createHeatStack(openstackCloud, STACK_NAME, STACK_TEMPLATE, envParams, HEAT_STACK_ENVIRONMENT, venv)
251 }
252
253 // get SALT_MASTER_URL
254 saltMasterHost = openstack.getHeatStackOutputParam(openstackCloud, STACK_NAME, 'salt_master_ip', venv)
255 // check that saltMasterHost is valid
256 if (!saltMasterHost || !saltMasterHost.matches(ipRegex)) {
257 common.errorMsg("saltMasterHost is not a valid ip, value is: ${saltMasterHost}")
258 throw new Exception("saltMasterHost is not a valid ip")
259 }
260
261 currentBuild.description = "${STACK_NAME} ${saltMasterHost}"
262
263 SALT_MASTER_URL = "http://${saltMasterHost}:6969"
264
265 } else if (STACK_TYPE == 'aws') {
266
267 // setup environment
268 aws.setupVirtualEnv(venv)
269
270 // set aws_env_vars
271 aws_env_vars = aws.getEnvVars(AWS_API_CREDENTIALS, AWS_STACK_REGION)
272
273 if (STACK_REUSE.toBoolean() == true && STACK_NAME == '') {
274 error("If you want to reuse existing stack you need to provide it's name")
275 }
276
277 if (STACK_REUSE.toBoolean() == false) {
278 // Don't allow to set custom stack name
279 wrap([$class: 'BuildUser']) {
280 if (env.BUILD_USER_ID) {
281 STACK_NAME = "${env.BUILD_USER_ID}-${JOB_NAME}-${BUILD_NUMBER}"
282 } else {
283 STACK_NAME = "jenkins-${JOB_NAME}-${BUILD_NUMBER}"
284 }
285 }
286
287 // no underscore in STACK_NAME
288 STACK_NAME = STACK_NAME.replaceAll('_', '-')
289 }
290
291 // set description
292 currentBuild.description = STACK_NAME
293 outputs.put('stack_name', STACK_NAME)
294
295 if (STACK_REUSE.toBoolean() == false) {
296 // get templates
297 git.checkoutGitRepository('template', STACK_TEMPLATE_URL, STACK_TEMPLATE_BRANCH, STACK_TEMPLATE_CREDENTIALS)
298
299 // start stack
300 def stack_params = [
301 "ParameterKey=KeyName,ParameterValue=" + AWS_SSH_KEY,
302 "ParameterKey=CmpNodeCount,ParameterValue=" + STACK_COMPUTE_COUNT
303 ]
304 def template_file = 'cfn/' + STACK_TEMPLATE + '.yml'
305 aws.createStack(venv, aws_env_vars, template_file, STACK_NAME, stack_params)
306 }
307
308 // wait for stack to be ready
309 aws.waitForStatus(venv, aws_env_vars, STACK_NAME, 'CREATE_COMPLETE')
310
311 // get outputs
312 saltMasterHost = aws.getOutputs(venv, aws_env_vars, STACK_NAME, 'SaltMasterIP')
313
314 // check that saltMasterHost is valid
315 if (!saltMasterHost || !saltMasterHost.matches(ipRegex)) {
316 common.errorMsg("saltMasterHost is not a valid ip, value is: ${saltMasterHost}")
317 throw new Exception("saltMasterHost is not a valid ip")
318 }
319
320 currentBuild.description = "${STACK_NAME} ${saltMasterHost}"
321 SALT_MASTER_URL = "http://${saltMasterHost}:6969"
322
323 } else if (STACK_TYPE != 'physical') {
324 throw new Exception("STACK_TYPE ${STACK_TYPE} is not supported")
325 }
326
327 outputs.put('salt_api', SALT_MASTER_URL)
328
329 // Setup virtualenv for pepper
330 python.setupPepperVirtualenv(venvPepper, SALT_MASTER_URL, SALT_MASTER_CREDENTIALS)
331 }
332
333
334 // Set up override params
Oleh Hryhorovc409d1e2019-02-27 16:57:09 +0200335 if (common.validInputParam('SALT_OVERRIDES') && common.validInputParam('STACK_INSTALL')) {
Jakub Josefa63f9862018-01-11 17:58:38 +0100336 stage('Set Salt overrides') {
Oleh Hryhorov2a63aa62018-06-22 17:26:41 +0300337 salt.setSaltOverrides(venvPepper, SALT_OVERRIDES, '/srv/salt/reclass', extra_tgt)
Jakub Josefa63f9862018-01-11 17:58:38 +0100338 }
339 }
340
341 //
342 // Install
343 //
344
345 if (common.checkContains('STACK_INSTALL', 'core')) {
346 stage('Install core infrastructure') {
347 def staticMgmtNetwork = false
348 if (common.validInputParam('STATIC_MGMT_NETWORK')) {
349 staticMgmtNetwork = STATIC_MGMT_NETWORK.toBoolean()
350 }
Oleh Hryhorov2a63aa62018-06-22 17:26:41 +0300351 orchestrate.installFoundationInfra(venvPepper, staticMgmtNetwork, extra_tgt)
Jakub Josefa63f9862018-01-11 17:58:38 +0100352
353 if (common.checkContains('STACK_INSTALL', 'kvm')) {
Oleh Hryhorov2a63aa62018-06-22 17:26:41 +0300354 orchestrate.installInfraKvm(venvPepper, extra_tgt)
Dzmitry Stremkouski16fb74f2018-07-10 02:01:34 +0200355 orchestrate.installFoundationInfra(venvPepper, staticMgmtNetwork, extra_tgt)
Jakub Josefa63f9862018-01-11 17:58:38 +0100356 }
357
Oleh Hryhorov2a63aa62018-06-22 17:26:41 +0300358 orchestrate.validateFoundationInfra(venvPepper, extra_tgt)
Jakub Josefa63f9862018-01-11 17:58:38 +0100359 }
360 }
361
Oleksii Grudevd3d5fad2018-06-29 16:25:35 +0300362 stage('Install infra') {
Stanislav Riazanovf0302582019-02-04 17:47:06 +0400363 if (common.checkContains('STACK_INSTALL', 'core') ||
Oleksii Grudevd3d5fad2018-06-29 16:25:35 +0300364 common.checkContains('STACK_INSTALL', 'openstack') ||
Stanislav Riazanovf0302582019-02-04 17:47:06 +0400365 common.checkContains('STACK_INSTALL', 'oss')) {
366 orchestrate.installInfra(venvPepper, extra_tgt)
367 }
Oleksii Grudevd3d5fad2018-06-29 16:25:35 +0300368 }
369
Oleh Hryhorovc409d1e2019-02-27 16:57:09 +0200370 if (common.validInputParam('STACK_INSTALL')) {
371 stage('Install Orchestrated Apps'){
372 orchestrate.OrchestrateApplications(venvPepper, "I@salt:master ${extra_tgt}", "orchestration.deploy.applications")
373 }
Vasyl Saienko4c78fe12018-08-06 10:17:28 +0300374 }
375
Jakub Josefa63f9862018-01-11 17:58:38 +0100376 // install k8s
377 if (common.checkContains('STACK_INSTALL', 'k8s')) {
Stanislav Riazanovf0302582019-02-04 17:47:06 +0400378 extra_tgt_bckp = extra_tgt
379 extra_tgt = 'and not kdt* ' + extra_tgt_bckp
Jakub Josefa63f9862018-01-11 17:58:38 +0100380 stage('Install Kubernetes infra') {
381 if (STACK_TYPE == 'aws') {
382 // configure kubernetes_control_address - save loadbalancer
383 def awsOutputs = aws.getOutputs(venv, aws_env_vars, STACK_NAME)
384 common.prettyPrint(awsOutputs)
385 if (awsOutputs.containsKey('ControlLoadBalancer')) {
Oleh Hryhorov2a63aa62018-06-22 17:26:41 +0300386 salt.runSaltProcessStep(venvPepper, "I@salt:master ${extra_tgt}", 'reclass.cluster_meta_set', ['kubernetes_control_address', awsOutputs['ControlLoadBalancer']], null, true)
Jakub Josefa63f9862018-01-11 17:58:38 +0100387 outputs.put('kubernetes_apiserver', 'https://' + awsOutputs['ControlLoadBalancer'])
388 }
389 }
390
391 // ensure certificates are generated properly
Andrey Shestakovf23ed002018-08-21 12:09:51 +0300392 salt.runSaltProcessStep(venvPepper, "I@kubernetes:* ${extra_tgt}", 'saltutil.refresh_pillar', [], null, true)
393 salt.enforceState(venvPepper, "I@kubernetes:* ${extra_tgt}", ['salt.minion.cert'], true)
Jakub Josefa63f9862018-01-11 17:58:38 +0100394 }
395
396 if (common.checkContains('STACK_INSTALL', 'contrail')) {
Svimbaa554ea02018-06-06 18:45:23 +0200397 stage('Install Contrail control') {
Oleh Hryhorov2a63aa62018-06-22 17:26:41 +0300398 orchestrate.installContrailNetwork(venvPepper, extra_tgt)
Tomáš Kukrál39c96cd2017-07-11 10:14:13 +0200399 }
Ales Komarek24097402017-05-22 16:28:10 +0200400 }
Tomáš Kukrálf83409d2017-11-08 20:56:57 +0100401
Jakub Josefa63f9862018-01-11 17:58:38 +0100402 stage('Install Kubernetes control') {
Oleh Hryhorov2a63aa62018-06-22 17:26:41 +0300403 orchestrate.installKubernetesControl(venvPepper, extra_tgt)
Anton Samoylovf8a65aa2019-01-23 20:22:26 +0400404 if (common.checkContains('STACK_INSTALL', 'contrail')) {
405 orchestrate.checkContrailApiReadiness(venvPepper, extra_tgt)
406 }
Ruslan Kamaldinov65144322017-08-02 15:16:55 +0400407
Jakub Josefa63f9862018-01-11 17:58:38 +0100408 // collect artifacts (kubeconfig)
Oleh Hryhorov2a63aa62018-06-22 17:26:41 +0300409 writeFile(file: 'kubeconfig', text: salt.getFileContent(venvPepper, "I@kubernetes:master and *01* ${extra_tgt}", '/etc/kubernetes/admin-kube-config'))
Jakub Josefa63f9862018-01-11 17:58:38 +0100410 archiveArtifacts(artifacts: 'kubeconfig')
vrovachev7be1e962017-07-05 13:28:26 +0400411 }
412
Svimbaa554ea02018-06-06 18:45:23 +0200413 if (common.checkContains('STACK_INSTALL', 'contrail')) {
414 stage('Install Contrail compute') {
Oleh Hryhorov2a63aa62018-06-22 17:26:41 +0300415 orchestrate.installContrailCompute(venvPepper, extra_tgt)
Svimbaa554ea02018-06-06 18:45:23 +0200416 }
417 }
418
Jakub Josefa63f9862018-01-11 17:58:38 +0100419 stage('Install Kubernetes computes') {
420 if (common.validInputParam('STACK_COMPUTE_COUNT')) {
421 if (STACK_COMPUTE_COUNT > 0) {
422 if (STACK_TYPE == 'aws') {
423 // get stack info
424 def scaling_group = aws.getOutputs(venv, aws_env_vars, STACK_NAME, 'ComputesScalingGroup')
425
426 //update autoscaling group
427 aws.updateAutoscalingGroup(venv, aws_env_vars, scaling_group, ["--desired-capacity " + STACK_COMPUTE_COUNT])
428
429 // wait for computes to boot up
430 aws.waitForAutoscalingInstances(venv, aws_env_vars, scaling_group)
431 sleep(60)
432
433 } else if (STACK_TYPE == 'heat') {
434 envParams.put('cluster_node_count', STACK_COMPUTE_COUNT)
435
436 openstack.createHeatStack(openstackCloud, STACK_NAME, STACK_TEMPLATE, envParams, HEAT_STACK_ENVIRONMENT, venv, "update")
437 sleep(60)
438 }
439
440 }
441 }
442
Oleh Hryhorov2a63aa62018-06-22 17:26:41 +0300443 orchestrate.installKubernetesCompute(venvPepper, extra_tgt)
Svimbaa979f8f2018-09-26 11:24:49 +0200444 // Setup kubernetes addons for opencontrail. More info in the definition of the func.
445 orchestrate.setupKubeAddonForContrail(venvPepper, extra_tgt)
Jakub Josefa63f9862018-01-11 17:58:38 +0100446 }
Stanislav Riazanovf0302582019-02-04 17:47:06 +0400447 extra_tgt = extra_tgt_bckp
448 }
449
450 // install kdt (drivetrain on k8s) cluster
451 if (common.checkContains('STACK_INSTALL', 'kdt')){
452 extra_tgt_bckp = extra_tgt
453 extra_tgt = 'and kdt* ' + extra_tgt_bckp
454 stage('Install Kubernetes infra for kdt') {
455 // ensure certificates are generated properly
456 salt.runSaltProcessStep(venvPepper, "I@kubernetes:* ${extra_tgt}", 'saltutil.refresh_pillar', [], null, true)
457 salt.enforceState(venvPepper, "I@kubernetes:* ${extra_tgt}", ['salt.minion.cert'], true)
458 }
459
460 stage('Install Kubernetes control for kdt') {
461 salt.enforceStateWithTest([saltId: venvPepper, target: "I@kubernetes:master ${extra_tgt}", state: 'kubernetes.master.kube-addons'])
462 orchestrate.installKubernetesControl(venvPepper, extra_tgt)
463
464 // collect artifacts (kubeconfig)
465 writeFile(file: 'kubeconfig-kdt', text: salt.getFileContent(venvPepper, "I@kubernetes:master and *01* ${extra_tgt}", '/etc/kubernetes/admin-kube-config'))
466 archiveArtifacts(artifacts: 'kubeconfig-kdt')
467 }
468
469 extra_tgt = extra_tgt_bckp
Ruslan Kamaldinov65144322017-08-02 15:16:55 +0400470 }
Ales Komarek24097402017-05-22 16:28:10 +0200471
Mykyta Karpin5b7c2602018-09-11 17:47:20 +0300472 // install ceph
473 if (common.checkContains('STACK_INSTALL', 'ceph')) {
474 stage('Install Ceph MONs') {
475 orchestrate.installCephMon(venvPepper, "I@ceph:mon ${extra_tgt}", extra_tgt)
476 }
477
478 stage('Install Ceph OSDs') {
479 orchestrate.installCephOsd(venvPepper, "I@ceph:osd ${extra_tgt}", true, extra_tgt)
480 }
481
482 stage('Install Ceph clients') {
483 orchestrate.installCephClient(venvPepper, extra_tgt)
484 }
485 }
486
Vasyl Saienkoc562fc42018-12-15 22:19:28 +0200487 // install docker swarm
Oleh Hryhorovc409d1e2019-02-27 16:57:09 +0200488 if (common.validInputParam('STACK_INSTALL')) {
489 orchestrate.installDockerSwarm(venvPepper, extra_tgt)
490 }
Vasyl Saienkoc562fc42018-12-15 22:19:28 +0200491
Jakub Josefa63f9862018-01-11 17:58:38 +0100492 // install openstack
493 if (common.checkContains('STACK_INSTALL', 'openstack')) {
Oleksii Grudevd3d5fad2018-06-29 16:25:35 +0300494 // install control, tests, ...
Jakub Josefa63f9862018-01-11 17:58:38 +0100495 stage('Install OpenStack control') {
Oleh Hryhorov2a63aa62018-06-22 17:26:41 +0300496 orchestrate.installOpenstackControl(venvPepper, extra_tgt)
Jakub Josefa63f9862018-01-11 17:58:38 +0100497 }
498
Oleg Iurchenko86f1a842018-02-13 22:18:28 +0200499 // Workaround for PROD-17765 issue to prevent crashes of keystone.role_present state.
500 // More details: https://mirantis.jira.com/browse/PROD-17765
Oleh Hryhorov2a63aa62018-06-22 17:26:41 +0300501 salt.runSaltProcessStep(venvPepper, "I@keystone:client ${extra_tgt}", 'service.restart', ['salt-minion'])
502 salt.minionsReachable(venvPepper, "I@salt:master and *01* ${extra_tgt}", 'I@keystone:client', null, 10, 6)
Oleg Iurchenko86f1a842018-02-13 22:18:28 +0200503
Jakub Josefa63f9862018-01-11 17:58:38 +0100504 stage('Install OpenStack network') {
505
506 if (common.checkContains('STACK_INSTALL', 'contrail')) {
Oleh Hryhorov2a63aa62018-06-22 17:26:41 +0300507 orchestrate.installContrailNetwork(venvPepper, extra_tgt)
Anton Samoylovf8a65aa2019-01-23 20:22:26 +0400508 orchestrate.checkContrailApiReadiness(venvPepper, extra_tgt)
Jakub Josefa63f9862018-01-11 17:58:38 +0100509 } else if (common.checkContains('STACK_INSTALL', 'ovs')) {
Oleh Hryhorov2a63aa62018-06-22 17:26:41 +0300510 orchestrate.installOpenstackNetwork(venvPepper, extra_tgt)
Jakub Josefa63f9862018-01-11 17:58:38 +0100511 }
512
Petr Jedinýefd668f2018-05-24 14:44:08 +0200513 // Wait for network to come up, 150s should be enough
514 common.retry(10, 15) {
Oleh Hryhorov2a63aa62018-06-22 17:26:41 +0300515 salt.cmdRun(venvPepper, "I@keystone:server ${extra_tgt}", '. /root/keystonercv3; openstack network list')
Petr Jedinýefd668f2018-05-24 14:44:08 +0200516 }
Jakub Josefa63f9862018-01-11 17:58:38 +0100517 }
518
Oleh Hryhorov2a63aa62018-06-22 17:26:41 +0300519 if (salt.testTarget(venvPepper, "I@ironic:conductor ${extra_tgt}")){
Jakub Josefa63f9862018-01-11 17:58:38 +0100520 stage('Install OpenStack Ironic conductor') {
Oleh Hryhorov2a63aa62018-06-22 17:26:41 +0300521 orchestrate.installIronicConductor(venvPepper, extra_tgt)
Jakub Josefa63f9862018-01-11 17:58:38 +0100522 }
523 }
524
Oleh Hryhorov2a63aa62018-06-22 17:26:41 +0300525 if (salt.testTarget(venvPepper, "I@manila:share ${extra_tgt}")){
Vasyl Saienkob800a0f2018-02-21 18:38:53 +0200526 stage('Install OpenStack Manila data and share') {
Oleh Hryhorov2a63aa62018-06-22 17:26:41 +0300527 orchestrate.installManilaShare(venvPepper, extra_tgt)
Vasyl Saienkob800a0f2018-02-21 18:38:53 +0200528 }
529 }
Jakub Josefa63f9862018-01-11 17:58:38 +0100530
531 stage('Install OpenStack compute') {
Oleh Hryhorov2a63aa62018-06-22 17:26:41 +0300532 orchestrate.installOpenstackCompute(venvPepper, extra_tgt)
Jakub Josefa63f9862018-01-11 17:58:38 +0100533
534 if (common.checkContains('STACK_INSTALL', 'contrail')) {
Oleh Hryhorov2a63aa62018-06-22 17:26:41 +0300535 orchestrate.installContrailCompute(venvPepper, extra_tgt)
Inessa Vasilevskaya30cb7312018-10-08 12:13:03 +0200536 orchestrate.installBackup(venvPepper, 'contrail', extra_tgt)
Jakub Josefa63f9862018-01-11 17:58:38 +0100537 }
538 }
539
540 }
541
Mykyta Karpin5b7c2602018-09-11 17:47:20 +0300542 // connect ceph
Jakub Josefa63f9862018-01-11 17:58:38 +0100543 if (common.checkContains('STACK_INSTALL', 'ceph')) {
Jakub Josefa63f9862018-01-11 17:58:38 +0100544
545 stage('Connect Ceph') {
Oleh Hryhorov2a63aa62018-06-22 17:26:41 +0300546 orchestrate.connectCeph(venvPepper, extra_tgt)
Jakub Josefa63f9862018-01-11 17:58:38 +0100547 }
548 }
549
550 if (common.checkContains('STACK_INSTALL', 'oss')) {
551 stage('Install Oss infra') {
Oleh Hryhorov2a63aa62018-06-22 17:26:41 +0300552 orchestrate.installOssInfra(venvPepper, extra_tgt)
Jakub Josefa63f9862018-01-11 17:58:38 +0100553 }
554 }
555
556 if (common.checkContains('STACK_INSTALL', 'cicd')) {
557 stage('Install Cicd') {
Stanislav Riazanovf0302582019-02-04 17:47:06 +0400558 extra_tgt_bckp = extra_tgt
559 extra_tgt = 'and cid* ' + extra_tgt_bckp
Oleh Hryhorov2a63aa62018-06-22 17:26:41 +0300560 orchestrate.installInfra(venvPepper, extra_tgt)
Oleh Hryhorov2a63aa62018-06-22 17:26:41 +0300561 orchestrate.installCicd(venvPepper, extra_tgt)
Stanislav Riazanovf0302582019-02-04 17:47:06 +0400562 extra_tgt = extra_tgt_bckp
563 }
564 }
565
566 if (common.checkContains('STACK_INSTALL', 'kdt')) {
567 stage('Install Cicd on kdt') {
568 extra_tgt_bckp = extra_tgt
569 extra_tgt = 'and kdt* ' + extra_tgt_bckp
570 orchestrate.installInfra(venvPepper, extra_tgt)
571 orchestrate.installCicd(venvPepper, extra_tgt)
572 extra_tgt = extra_tgt_bckp
Jakub Josefa63f9862018-01-11 17:58:38 +0100573 }
574 }
575
576 if (common.checkContains('STACK_INSTALL', 'sl-legacy')) {
577 stage('Install StackLight v1') {
Oleh Hryhorov2a63aa62018-06-22 17:26:41 +0300578 orchestrate.installStacklightv1Control(venvPepper, extra_tgt)
579 orchestrate.installStacklightv1Client(venvPepper, extra_tgt)
Jakub Josefa63f9862018-01-11 17:58:38 +0100580 }
581 }
582
583 if (common.checkContains('STACK_INSTALL', 'stacklight')) {
584 stage('Install StackLight') {
Oleh Hryhorov2a63aa62018-06-22 17:26:41 +0300585 orchestrate.installStacklight(venvPepper, extra_tgt)
Jakub Josefa63f9862018-01-11 17:58:38 +0100586 }
587 }
588
589 if (common.checkContains('STACK_INSTALL', 'oss')) {
590 stage('Install OSS') {
591 if (!common.checkContains('STACK_INSTALL', 'stacklight')) {
592 // In case if StackLightv2 enabled containers already started
Oleh Hryhorov2a63aa62018-06-22 17:26:41 +0300593 salt.enforceState(venvPepper, "I@docker:swarm:role:master and I@devops_portal:config ${extra_tgt}", 'docker.client', true)
Jakub Josefa63f9862018-01-11 17:58:38 +0100594 }
Oleh Hryhorov2a63aa62018-06-22 17:26:41 +0300595 orchestrate.installOss(venvPepper, extra_tgt)
Jakub Josefa63f9862018-01-11 17:58:38 +0100596 }
597 }
598
599 //
600 // Test
601 //
602 def artifacts_dir = '_artifacts/'
603
604 if (common.checkContains('STACK_TEST', 'k8s')) {
605 stage('Run k8s conformance e2e tests') {
606 def image = TEST_K8S_CONFORMANCE_IMAGE
Victor Ryzhenkin723bd062018-12-11 17:09:06 +0400607 def autodetect = AUTODETECT
608 def ctl_target = 'I@kubernetes:master'
609 firstTarget = salt.getFirstMinion(venvPepper, ctl_target)
610 def containerd_enabled = salt.getPillar(
611 venvPepper, firstTarget, "kubernetes:common:containerd:enabled"
612 )["return"][0].values()[0].toBoolean()
613 if (containerd_enabled) {
614 def config = ['master': venvPepper,
615 'target': firstTarget,
616 'junitResults': true,
617 'autodetect': autodetect,
618 'image': image]
619 test.executeConformance(config)
620 } else {
621 def output_file = image.replaceAll('/', '-') + '.output'
622 def target = "ctl01* ${extra_tgt}"
623 def conformance_output_file = 'conformance_test.tar'
Jakub Josefa63f9862018-01-11 17:58:38 +0100624
Victor Ryzhenkin723bd062018-12-11 17:09:06 +0400625 // run image
626 test.runConformanceTests(venvPepper, target, TEST_K8S_API_SERVER, image)
Jakub Josefa63f9862018-01-11 17:58:38 +0100627
Victor Ryzhenkin723bd062018-12-11 17:09:06 +0400628 // collect output
629 sh "mkdir -p ${artifacts_dir}"
630 file_content = salt.getFileContent(venvPepper, target, '/tmp/' + output_file)
631 writeFile file: "${artifacts_dir}${output_file}", text: file_content
632 sh "cat ${artifacts_dir}${output_file}"
Jakub Josefa63f9862018-01-11 17:58:38 +0100633
Victor Ryzhenkin723bd062018-12-11 17:09:06 +0400634 // collect artifacts
635 archiveArtifacts artifacts: "${artifacts_dir}${output_file}"
vrovachevff3e72d2018-01-25 16:14:43 +0400636
Victor Ryzhenkin723bd062018-12-11 17:09:06 +0400637 // Copy test results
638 test.CopyConformanceResults(venvPepper, target, artifacts_dir, conformance_output_file)
639 }
Jakub Josefa63f9862018-01-11 17:58:38 +0100640 }
641 }
642
643 if (common.checkContains('STACK_TEST', 'openstack')) {
644 if (common.checkContains('TEST_DOCKER_INSTALL', 'true')) {
645 test.install_docker(venvPepper, TEST_TEMPEST_TARGET)
646 }
647 stage('Run OpenStack tests') {
648 test.runTempestTests(venvPepper, TEST_TEMPEST_IMAGE, TEST_TEMPEST_TARGET, TEST_TEMPEST_PATTERN)
649 }
650
651 stage('Copy Tempest results to config node') {
652 test.copyTempestResults(venvPepper, TEST_TEMPEST_TARGET)
653 }
654
655 stage('Archive rally artifacts') {
656 test.archiveRallyArtifacts(venvPepper, TEST_TEMPEST_TARGET)
Tomáš Kukrál74f92862017-06-05 19:18:43 +0200657 }
ibumarskov637a2152018-01-16 10:39:57 +0400658
659 if (common.validInputParam('TESTRAIL_REPORT') && TESTRAIL_REPORT.toBoolean()) {
660 stage('Upload test results to TestRail') {
661 def date = sh(script: 'date +%Y-%m-%d', returnStdout: true).trim()
662 def plan = TESTRAIL_PLAN ?: "[${TESTRAIL_MILESTONE}]System-Devcloud-${date}"
663 def group = TESTRAIL_GROUP ?: STACK_TEMPLATE
664
665 salt.cmdRun(venvPepper, TEST_TEMPEST_TARGET, "cd /root/rally_reports && cp \$(ls -t *xml | head -n1) report.xml")
666 test.uploadResultsTestrail("/root/rally_reports/report.xml",
667 TESTRAIL_REPORTER_IMAGE, group, TESTRAIL_QA_CREDENTIALS,
668 plan, TESTRAIL_MILESTONE, TESTRAIL_SUITE)
669 }
670 }
Ales Komarek24097402017-05-22 16:28:10 +0200671 }
672
Ales Komarek24097402017-05-22 16:28:10 +0200673
Jakub Josefa63f9862018-01-11 17:58:38 +0100674 if (common.checkContains('STACK_TEST', 'ceph')) {
675 stage('Run infra tests') {
676 sleep(120)
677 def cmd = "apt-get install -y python-pip && pip install -r /usr/share/salt-formulas/env/ceph/files/testinfra/requirements.txt && python -m pytest --junitxml=/root/report.xml /usr/share/salt-formulas/env/ceph/files/testinfra/"
678 salt.cmdRun(venvPepper, 'I@salt:master', cmd, false)
679 writeFile(file: 'report.xml', text: salt.getFileContent(venvPepper, 'I@salt:master', '/root/report.xml'))
680 junit(keepLongStdio: true, testResults: 'report.xml')
Martin Polreich46971102017-07-11 12:56:40 +0200681 }
682 }
683
Jakub Josefa63f9862018-01-11 17:58:38 +0100684 if (common.checkContains('STACK_TEST', 'opencontrail')) {
685 stage('Run opencontrail tests') {
686 def opencontrail_tests_dir = "/opt/opencontrail_test/fuel-plugin-contrail/plugin_test/vapor/"
687 def report_dir = "/opt/opencontrail-test-report/"
688 def cmd = ". ${opencontrail_tests_dir}exports.sh && " +
689 "cd ${opencontrail_tests_dir} && " +
690 "py.test --junit-xml=${report_dir}report.xml" +
691 " --html=${report_dir}report.html -v vapor/tests/ -k 'not destructive' "
Ruslan Kamaldinov65144322017-08-02 15:16:55 +0400692
Jakub Josefa63f9862018-01-11 17:58:38 +0100693 salt.runSaltProcessStep(venvPepper, 'cfg*', 'saltutil.refresh_pillar', [], null, true)
694 salt.enforceState(venvPepper, 'I@opencontrail:test' , 'opencontrail.test' , true)
Jiri Broulikd01c42f2018-01-02 11:37:10 +0100695
Jakub Josefa63f9862018-01-11 17:58:38 +0100696 salt.cmdRun(venvPepper, 'I@opencontrail:test', cmd, false)
697
698 writeFile(file: 'report.xml', text: salt.getFileContent(venvPepper,
699 'I@opencontrail:test', "${report_dir}report.xml"))
700 junit(keepLongStdio: true, testResults: 'report.xml')
701 }
Jiri Broulikd01c42f2018-01-02 11:37:10 +0100702 }
703
704
Jakub Josefa63f9862018-01-11 17:58:38 +0100705 stage('Finalize') {
706 if (common.checkContains('STACK_INSTALL', 'finalize')) {
Oleh Hryhorov2a63aa62018-06-22 17:26:41 +0300707 def gluster_compound = "I@glusterfs:server ${extra_tgt}"
708 def salt_ca_compound = "I@salt:minion:ca:salt_master_ca ${extra_tgt}"
Dzmitry Stremkouskifa4c1632018-03-21 17:55:39 +0100709 // Enforce highstate asynchronous only on the nodes which are not glusterfs servers
Dzmitry Stremkouski47a45122018-04-25 17:05:56 +0200710 salt.enforceHighstate(venvPepper, '* and not ' + gluster_compound + ' and not ' + salt_ca_compound)
Dzmitry Stremkouskifa4c1632018-03-21 17:55:39 +0100711 // Iterate over nonempty set of gluster servers and apply highstates one by one
712 // TODO: switch to batch once salt 2017.7+ would be used
Dzmitry Stremkouski47a45122018-04-25 17:05:56 +0200713 def saltcaMinions = salt.getMinionsSorted(venvPepper, salt_ca_compound)
714 if ( !saltcaMinions.isEmpty() ) {
715 for ( target in saltcaMinions ) {
716 salt.enforceHighstate(venvPepper, target)
717 }
718 }
Dzmitry Stremkouskifa4c1632018-03-21 17:55:39 +0100719 def glusterMinions = salt.getMinionsSorted(venvPepper, gluster_compound)
720 if ( !glusterMinions.isEmpty() ) {
721 for ( target in glusterMinions ) {
722 salt.enforceHighstate(venvPepper, target)
723 }
724 }
Jakub Josefa63f9862018-01-11 17:58:38 +0100725 }
726
727 outputsPretty = common.prettify(outputs)
728 print(outputsPretty)
729 writeFile(file: 'outputs.json', text: outputsPretty)
730 archiveArtifacts(artifacts: 'outputs.json')
Jiri Broulikd01c42f2018-01-02 11:37:10 +0100731 }
732
Jakub Josefa63f9862018-01-11 17:58:38 +0100733 } catch (Throwable e) {
734 currentBuild.result = 'FAILURE'
735 throw e
736 } finally {
Jiri Broulikd01c42f2018-01-02 11:37:10 +0100737
Mikhail Ivanov3deb79a2017-12-06 17:44:47 +0400738
Jakub Josefa63f9862018-01-11 17:58:38 +0100739 //
740 // Clean
741 //
Ruslan Kamaldinov65144322017-08-02 15:16:55 +0400742
Jakub Josefa63f9862018-01-11 17:58:38 +0100743 if (common.validInputParam('STACK_NAME')) {
744 // send notification
745 common.sendNotification(currentBuild.result, STACK_NAME, ["slack"])
Ales Komarek24097402017-05-22 16:28:10 +0200746 }
747
Jakub Josefa63f9862018-01-11 17:58:38 +0100748 if (common.validInputParam('STACK_DELETE') && STACK_DELETE.toBoolean() == true) {
749 stage('Trigger cleanup job') {
750 common.errorMsg('Stack cleanup job triggered')
751 build(job: STACK_CLEANUP_JOB, parameters: [
752 [$class: 'StringParameterValue', name: 'STACK_NAME', value: STACK_NAME],
753 [$class: 'StringParameterValue', name: 'STACK_TYPE', value: STACK_TYPE],
754 [$class: 'StringParameterValue', name: 'OPENSTACK_API_URL', value: OPENSTACK_API_URL],
755 [$class: 'StringParameterValue', name: 'OPENSTACK_API_CREDENTIALS', value: OPENSTACK_API_CREDENTIALS],
756 [$class: 'StringParameterValue', name: 'OPENSTACK_API_PROJECT', value: OPENSTACK_API_PROJECT],
757 [$class: 'StringParameterValue', name: 'OPENSTACK_API_PROJECT_DOMAIN', value: OPENSTACK_API_PROJECT_DOMAIN],
758 [$class: 'StringParameterValue', name: 'OPENSTACK_API_PROJECT_ID', value: OPENSTACK_API_PROJECT_ID],
759 [$class: 'StringParameterValue', name: 'OPENSTACK_API_USER_DOMAIN', value: OPENSTACK_API_USER_DOMAIN],
760 [$class: 'StringParameterValue', name: 'OPENSTACK_API_CLIENT', value: OPENSTACK_API_CLIENT],
761 [$class: 'StringParameterValue', name: 'OPENSTACK_API_VERSION', value: OPENSTACK_API_VERSION]
762 ])
763 }
764 } else {
765 if (currentBuild.result == 'FAILURE') {
766 common.errorMsg("Deploy job FAILED and was not deleted. Please fix the problem and delete stack on you own.")
Vasyl Saienkoff24e582017-08-04 10:04:33 +0300767
Jakub Josefa63f9862018-01-11 17:58:38 +0100768 if (common.validInputParam('SALT_MASTER_URL')) {
769 common.errorMsg("Salt master URL: ${SALT_MASTER_URL}")
770 }
Ales Komarek24097402017-05-22 16:28:10 +0200771 }
772 }
773 }
774 }
775}