forked from red-hat-storage/ocs-ci
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Jenkinsfile
178 lines (177 loc) · 7.34 KB
/
Jenkinsfile
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
// This Jenkinsfile is intended to be used with a companion jenkins-job-builder
// definition. It requires the following parameters:
// AWS_DOMAIN
// AWS_REGION
// CLUSTER_USER
// It also requires credentials with these IDs to be present in the CI system.
// The openshift aws credentials are stored per user so that we can easily
// switch to another user's credentials if need be:
// openshift-dev-aws-access-key-id-$CLUSTER_USER (AWS_ACCESS_KEY_ID)
// openshift-dev-aws-secret-access-key-$CLUSTER_USER (AWS_SECRET_ACCESS_KEY)
// openshift-pull-secret (PULL_SECRET)
// ocs-bugzilla-cfg (BUGZILLA_CFG)
// It may also provide these optional parameters to override the framework's
// defaults:
// OCS_REGISTRY_IMAGE
// EMAIL
// UMB_MESSAGE
// DEBUG_CLUSTER
def LAST_STAGE
pipeline {
agent { node { label "ocs-ci" }}
environment {
AWS_SHARED_CREDENTIALS_FILE = "${env.WORKSPACE}/.aws/credentials"
AWS_CONFIG_FILE = "${env.WORKSPACE}/.aws/config"
AWS_ACCESS_KEY_ID = credentials("openshift-dev-aws-access-key-id-${env.CLUSTER_USER}")
AWS_SECRET_ACCESS_KEY = credentials("openshift-dev-aws-secret-access-key-${env.CLUSTER_USER}")
PULL_SECRET = credentials('openshift-pull-secret')
BUGZILLA_CFG = credentials('ocs-bugzilla-cfg')
}
stages {
stage("Setup") {
steps {
script { LAST_STAGE=env.STAGE_NAME }
sh """
if [ ! -z '${env.EMAIL}' ]; then
sudo yum install -y /usr/sbin/postfix
sudo systemctl start postfix
fi
sudo sysctl -w net.ipv6.conf.all.disable_ipv6=1
sudo sysctl -w net.ipv6.conf.default.disable_ipv6=1
python3 -V
pip3 install --user virtualenv
python3 -m virtualenv venv
source ./venv/bin/activate
pip3 install tox
pip3 install -r requirements.txt
python3 setup.py develop
python3 ./.functional_ci_setup.py --skip-aws
"""
}
}
stage("Lint") {
steps {
script { LAST_STAGE=env.STAGE_NAME }
sh """
source ./venv/bin/activate
tox -e flake8
"""
}
}
stage("Unit test") {
steps {
script { LAST_STAGE=env.STAGE_NAME }
sh """
source ./venv/bin/activate
tox -e py36
"""
}
}
stage("Deploy OCP") {
steps {
script { LAST_STAGE=env.STAGE_NAME }
sh """
source ./venv/bin/activate
run-ci -m deployment --deploy --ocsci-conf=ocs-ci-ocp.yaml --ocsci-conf=conf/ocsci/production-aws-ipi.yaml --ocsci-conf=conf/ocsci/production_device_size.yaml --cluster-name=${env.CLUSTER_USER}-ocsci-${env.BUILD_ID} --cluster-path=cluster --collect-logs
"""
}
}
stage("Deploy OCS") {
steps {
script { LAST_STAGE=env.STAGE_NAME }
sh """
source ./venv/bin/activate
run-ci -m deployment --deploy --ocsci-conf=ocs-ci-ocs.yaml --ocsci-conf=conf/ocsci/production-aws-ipi.yaml --cluster-name=${env.CLUSTER_USER}-ocsci-${env.BUILD_ID} --cluster-path=cluster --collect-logs
"""
}
}
stage("Acceptance Tests") {
environment {
EMAIL_ARG = """${sh(
returnStdout: true,
script: "if [ ! -z '${env.EMAIL}' ]; then echo -n '--email=${env.EMAIL}'; fi"
)}"""
}
steps {
script { LAST_STAGE=env.STAGE_NAME }
sh """
source ./venv/bin/activate
run-ci -m acceptance --ocsci-conf=ocs-ci-ocs.yaml --cluster-name=${env.CLUSTER_USER}-ocsci-${env.BUILD_ID} --cluster-path=cluster --self-contained-html --html=${env.WORKSPACE}/logs/report.html --junit-xml=${env.WORKSPACE}/logs/junit.xml --collect-logs --bugzilla ${env.EMAIL_ARG}
"""
}
}
}
post {
always {
archiveArtifacts artifacts: 'ocs-ci-*.yaml,cluster/**,logs/**', fingerprint: true
script {
if( env.DEBUG_CLUSTER in [true, 'true'] ) {
input(message: "Proceed with cluster teardown?")
}
}
sh """
source ./venv/bin/activate
run-ci -m deployment --teardown --ocsci-conf=ocs-ci-ocs.yaml --cluster-name=${env.CLUSTER_USER}-ocsci-${env.BUILD_ID} --cluster-path=cluster --collect-logs
"""
junit testResults: "logs/junit.xml", keepLongStdio: false
}
failure {
script {
if ( LAST_STAGE != "Acceptance Tests" ) {
emailext (
subject: "Job '${env.JOB_NAME}' build #${env.BUILD_ID} failed during stage '${LAST_STAGE}'",
body: "Build failed : ${env.BUILD_URL}",
from: "${env.EMAIL}",
to: "${env.EMAIL}"
)
}
}
}
success {
script {
def registry_image = "${env.OCS_REGISTRY_IMAGE}"
// quay.io/rhceph-dev/ocs-registry:4.2.2-255.ci -> 4.2.2-255.ci
def registry_tag = registry_image.split(':')[-1]
def ocs_version = registry_tag.split('-')[0]
// ocs version with only X.Y
def short_ocs_version = ocs_version.tokenize(".").take(2).join(".")
if (short_ocs_version.toFloat() < 4.5 ) {
// tag ocs-olm-operator container because versions < 4.5 use olm registry containers
build job: 'quay-tag-image', parameters: [string(name: "SOURCE_URL", value: "${registry_image}"), string(name: "QUAY_IMAGE_TAG", value: "ocs-olm-operator:latest-stable-${ocs_version}")]
build job: 'quay-tag-image', parameters: [string(name: "SOURCE_URL", value: "${registry_image}"), string(name: "QUAY_IMAGE_TAG", value: "ocs-olm-operator:latest-stable-${short_ocs_version}")]
}
else {
// tag ocs-operator-bundle and ocs-registry container because versions > 4.5 use bundle index containers
build job: 'quay-tag-image', parameters: [string(name: "SOURCE_URL", value: "${registry_image}"), string(name: "QUAY_IMAGE_TAG", value: "ocs-operator-bundle:latest-stable-${ocs_version}")]
build job: 'quay-tag-image', parameters: [string(name: "SOURCE_URL", value: "${registry_image}"), string(name: "QUAY_IMAGE_TAG", value: "ocs-operator-bundle:latest-stable-${short_ocs_version}")]
build job: 'quay-tag-image', parameters: [string(name: "SOURCE_URL", value: "${registry_image}"), string(name: "QUAY_IMAGE_TAG", value: "ocs-registry:latest-stable-${ocs_version}")]
build job: 'quay-tag-image', parameters: [string(name: "SOURCE_URL", value: "${registry_image}"), string(name: "QUAY_IMAGE_TAG", value: "ocs-registry:latest-stable-${short_ocs_version}")]
}
if( env.UMB_MESSAGE in [true, 'true'] ) {
def registry_version = registry_tag.split('-')[0]
def properties = """
TOOL=ocs-ci
PRODUCT=ocs
PRODUCT_VERSION=${registry_version}
"""
def content_string = """{
"SENDER_BUILD_NUMBER": "${BUILD_NUMBER}",
"OCS_REGISTRY_IMAGE": "${env.OCS_REGISTRY_IMAGE}",
}"""
def content = readJSON text: content_string
echo "Sending UMB message"
echo 'Properties: ' + properties
echo 'Content: ' + content.toString()
sendCIMessage (
providerName: 'Red Hat UMB',
overrides: [ topic: 'VirtualTopic.qe.ci.jenkins' ],
failOnError: false,
messageType: 'ProductAcceptedForReleaseTesting',
messageProperties: properties,
messageContent: content.toString()
)
}
}
}
}
}