Jenkinsfile 7.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177
  1. def SERIAL
  2. pipeline {
  3. agent {
  4. label "swarm"
  5. }
  6. environment {
  7. DOCKER_REGISTRY='dev-registry.infoclinica.ru:5000'
  8. DOCKER_IMAGE='ovpn'
  9. SERVICE_NAME='ovpn_server'
  10. SERVICE_IMAGE='container_run'
  11. SWARM_GIT_URL='ssh://git@git.sdsys.ru:8022/iru/stack-deploy.git'
  12. SWARM_GIT_NAME='stack-deploy'
  13. PKI_GIT_URL='ssh://git@git.sdsys.ru:8022/iru/openvpn-pki.git'
  14. PKI_GIT_NAME='openvpn-pki'
  15. OVPN_GIT_DIR='openvpn'
  16. JENKINS_MAIL='jenkins@sdsys.ru'
  17. CLUSTER_NAME='dev-iru-swarm.infoclinica.lan'
  18. }
  19. parameters {
  20. string(
  21. name: "branch",
  22. defaultValue: "97009",
  23. description: "Which branch to use"
  24. )
  25. string(
  26. name: "mailto",
  27. defaultValue: "tomishinets.v@sdsys.ru",
  28. description: "Email which has to be notified."
  29. )
  30. }
  31. stages {
  32. stage ("Discover SERIAL") {
  33. steps {
  34. script {
  35. SERIAL = sh script: "echo -n `date +%y%m%d``printf %03d $BUILD_NUMBER`", returnStdout: true
  36. }
  37. }
  38. }
  39. stage("Pull PKI repo") {
  40. steps {
  41. withCredentials([sshUserPrivateKey(credentialsId: 'provision', keyFileVariable: 'GIT_SSH_KEY', passphraseVariable: '', usernameVariable: 'GIT_SSH_USERNAME')]) {
  42. sh '''GIT_SSH_COMMAND='ssh -i ${GIT_SSH_KEY} -o UserKnownHostsFile=/dev/null -o StrictHostKeyChecking=no' \
  43. git clone ${PKI_GIT_URL} && cd ${WORKSPACE}/${PKI_GIT_NAME} && git checkout ${branch} && cd ${WORKSPACE}
  44. '''
  45. }
  46. sh '''cp ${WORKSPACE}/openvpn-pki/open/easy-rsa/keys/ca.crt \
  47. ${WORKSPACE}/openvpn-pki/open/easy-rsa/keys/server.crt \
  48. ${WORKSPACE}/openvpn-pki/open/easy-rsa/keys/server.key \
  49. ${WORKSPACE}/openvpn-pki/open/easy-rsa/keys/sds-test.crt \
  50. ${WORKSPACE}/openvpn-pki/open/easy-rsa/keys/sds-test.key \
  51. ${WORKSPACE}/openvpn-pki/open/easy-rsa/keys/ta.key \
  52. ${WORKSPACE}/openvpn-pki/open/easy-rsa/keys/stonevpn.crl \
  53. ${WORKSPACE}/openvpn-pki/open/easy-rsa/keys/dh2048.pem \
  54. ${WORKSPACE}/openvpn/keys
  55. ls -al ${WORKSPACE}/openvpn/keys/
  56. '''
  57. }
  58. }
  59. stage("Build") {
  60. steps {
  61. echo "Building ${DOCKER_REGISTRY}/iru/${DOCKER_IMAGE}:${SERIAL}."
  62. sh """docker build --no-cache -t ${DOCKER_REGISTRY}/iru/${DOCKER_IMAGE}:${SERIAL} .
  63. if [ \$? != 0 ]; then echo 'The container was not built'; exit 1; fi
  64. """
  65. }
  66. }
  67. /* stage("Staging") {
  68. steps {
  69. echo "Run ${DOCKER_IMAGE} in server mode."
  70. sh '''container_id_server=`docker run -d --rm -e "mode=server" \
  71. --privileged ${DOCKER_REGISTRY}/${DOCKER_IMAGE}:${BUILD_NUMBER}`
  72. container_ip_server=`docker inspect ${container_id_server} --format='{{.NetworkSettings.IPAddress}}'`
  73. container_id_client=`docker run -d --rm -e "mode=client" -e "server=${container_ip_server}" --privileged ${DOCKER_REGISTRY}/${DOCKER_IMAGE}:${BUILD_NUMBER}`
  74. sleep 15
  75. docker exec ${container_id_client} ping -c 3 -q 10.10.20.1
  76. if [ $? != 0 ]
  77. then
  78. echo "Can not connect to VPN server !!!"
  79. docker stop ${container_id_server} ${container_id_client}
  80. exit 1
  81. else
  82. echo "VPN server is started"
  83. docker stop ${container_id_server} ${container_id_client}
  84. fi
  85. '''
  86. }
  87. }
  88. stage("Publish") {
  89. steps {
  90. echo "Publishing ${DOCKER_REGISTRY}/${DOCKER_IMAGE}:${BUILD_NUMBER}."
  91. sh "docker push ${DOCKER_REGISTRY}/${DOCKER_IMAGE}:${BUILD_NUMBER}"
  92. }
  93. }
  94. stage("Prod-like") {
  95. steps {
  96. echo "Check Prod-like cluster status"
  97. sh '''ping -c 2 ${CLUSTER_NAME}
  98. if [ $? -eq 0 ]; then
  99. export DOCKER_CERT_PATH=/run/secrets/swarm
  100. export DOCKER_HOST=tcp://${CLUSTER_NAME}:2376 DOCKER_TLS_VERIFY=1
  101. docker node ls --format "{{.Hostname}} {{.TLSStatus}}" | while read host status
  102. do
  103. if [ $status != Ready ]; then echo "Cluster ${CLUSTER_NAME} state is inconsistent"; exit 1
  104. else echo "HOST: $host STATUS: $status"
  105. fi
  106. done
  107. else echo "Host not Found"; exit 1
  108. fi
  109. '''
  110. echo "Run containers in Prod-like"
  111. sh '''export DOCKER_CERT_PATH=/run/secrets/swarm
  112. export DOCKER_HOST=tcp://${CLUSTER_NAME}:2376 DOCKER_TLS_VERIFY=1
  113. export DOCKER_HOST=tcp://$(docker info -f '{{.Name}}'):2376 DOCKER_TLS_VERIFY=1
  114. if [ -z $(docker service ps -q ${DOCKER_IMAGE}) ];then
  115. docker service create --replicas 1 \
  116. --mount type=bind,source=/var/run/docker.sock,destination=/var/run/docker.sock \
  117. --name ${SERVICE_NAME} ${DOCKER_REGISTRY}/${SERVICE_IMAGE}:2 -p 1194:1194 \
  118. --privileged --security-opt seccomp=unconfined \
  119. --tmpfs /run --tmpfs /run/lock -v /sys/fs/cgroup:/sys/fs/cgroup:ro \
  120. -e "mode=server" ${DOCKER_REGISTRY}/${DOCKER_IMAGE}:${BUILD_NUMBER}
  121. else
  122. docker service update \
  123. --args "-p 1194:1194 --privileged --security-opt seccomp=unconfined \
  124. --tmpfs /run --tmpfs /run/lock -v /sys/fs/cgroup:/sys/fs/cgroup:ro \
  125. -e "mode=server" ${DOCKER_REGISTRY}/${DOCKER_IMAGE}:${BUILD_NUMBER}" \
  126. ${SERVICE_NAME}
  127. if [ $? != 0 ]; then docker service rollback ${SERVICE_NAME}; fi
  128. fi
  129. '''
  130. }
  131. }
  132. stage("Tagging") {
  133. steps {
  134. echo "Tagging ${DOCKER_REGISTRY}/${DOCKER_IMAGE}:${BUILD_NUMBER} to ${DOCKER_REGISTRY}/${DOCKER_IMAGE}:latest"
  135. sh '''docker tag ${DOCKER_REGISTRY}/${DOCKER_IMAGE}:${BUILD_NUMBER} \
  136. ${DOCKER_REGISTRY}/iru/${DOCKER_IMAGE}:latest
  137. docker push ${DOCKER_REGISTRY}/iru/${DOCKER_IMAGE}:latest
  138. '''
  139. echo "Updating tag info in ${SWARM_GIT_NAME} repository"
  140. withCredentials([sshUserPrivateKey(credentialsId: 'provision', keyFileVariable: 'GIT_SSH_KEY', passphraseVariable: '', usernameVariable: 'GIT_SSH_USERNAME')]) {
  141. sh '''GIT_SSH_COMMAND='ssh -i ${GIT_SSH_KEY} -o UserKnownHostsFile=/dev/null -o StrictHostKeyChecking=no' \
  142. git clone ${SWARM_GIT_URL}
  143. cd ${SWARM_GIT_NAME}
  144. echo -n ${BUILD_NUMBER} > tags/${DOCKER_IMAGE}.version
  145. git add -A
  146. git config --global user.email "${JENKINS_MAIL}"
  147. git config --global user.name "Jenkins"
  148. git commit -m 'Version update'
  149. GIT_SSH_COMMAND='ssh -i ${GIT_SSH_KEY} -o UserKnownHostsFile=/dev/null -o StrictHostKeyChecking=no' \
  150. git push origin master
  151. '''
  152. }
  153. }
  154. }
  155. */ }
  156. post {
  157. always {
  158. echo "CleaningUp work directory"
  159. deleteDir()
  160. }
  161. failure {
  162. mail charset: 'UTF-8',
  163. subject: "Jenkins build ERROR",
  164. mimeType: 'text/html',
  165. to: "${mailto}",
  166. body: "<b>ATTENTION!!!</b> <b><br> Jenkins job failed.\n\n <b><br>Project Name:</b> ${env.JOB_NAME} <b><br>\nBuild Number:</b> ${env.BUILD_NUMBER} <b><br>\nURL Build:</b> ${RUN_DISPLAY_URL}"
  167. }
  168. success {
  169. mail charset: 'UTF-8',
  170. subject: "Jenkins build SUSCCESS",
  171. mimeType: 'text/html',
  172. to: "${mailto}",
  173. body: "<b>Congradulations!!!</b> <b><br> Jenkins job succefully finished.\n\n <b><br>Project Name:</b> ${env.JOB_NAME} <b><br>\nBuild Number:</b> ${env.BUILD_NUMBER} <b><br>\nURL Build:</b> ${RUN_DISPLAY_URL}"
  174. }
  175. }
  176. }