+ if (params.COMMIT_ID) {
+ commit_id = "-b ${params.COMMIT_ID}"
+ }
+ if (params.REPO_DISTRO) {
+ repo_distro = "-r ${params.REPO_DISTRO}"
+ }
+ if (params.REPO_KEY_NAME) {
+ repo_key_name = "-k ${params.REPO_KEY_NAME}"
+ }
+ if (params.RELEASE) {
+ release = "-R ${params.RELEASE}"
+ }
+ if (params.REPOSITORY_BASE) {
+ repo_base_url = "-u ${params.REPOSITORY_BASE}"
+ } else {
+ repo_base_url = "-u http://${NODE_IP_ADDRESS}:${repo_port}"
+ }
+
+ remote = [
+ name: containerName,
+ host: IP_ADDRESS,
+ user: 'ubuntu',
+ identityFile: SSH_KEY,
+ allowAnyHosts: true,
+ logLevel: 'INFO',
+ pty: true
+ ]
+
+ sshCommand remote: remote, command: '''
+ wget https://osm-download.etsi.org/ftp/osm-11.0-eleven/install_osm.sh
+ chmod +x ./install_osm.sh
+ sed -i '1 i\\export PATH=/snap/bin:\$PATH' ~/.bashrc
+ '''
+
+ Map gitlabCredentialsMap = [$class: 'UsernamePasswordMultiBinding',
+ credentialsId: 'gitlab-registry',
+ usernameVariable: 'USERNAME',
+ passwordVariable: 'PASSWORD']
+ if (useCharmedInstaller) {
+ // Use local proxy for docker hub
+ sshCommand remote: remote, command: '''
+ sudo snap install microk8s --classic --channel=1.19/stable
+ sudo sed -i "s|https://registry-1.docker.io|http://172.21.1.1:5000|" \
+ /var/snap/microk8s/current/args/containerd-template.toml
+ sudo systemctl restart snap.microk8s.daemon-containerd.service
+ sudo snap alias microk8s.kubectl kubectl
+ '''
+
+ withCredentials([gitlabCredentialsMap]) {
+ sshCommand remote: remote, command: """
+ ./install_osm.sh -y \
+ ${repo_base_url} \
+ ${repo_key_name} \
+ ${release} -r unstable \
+ --charmed \
+ --registry ${USERNAME}:${PASSWORD}@${INTERNAL_DOCKER_REGISTRY} \
+ --tag ${containerName}
+ """
+ }
+ prometheusHostname = "prometheus.${IP_ADDRESS}.nip.io"
+ prometheusPort = 80
+ osmHostname = "nbi.${IP_ADDRESS}.nip.io:443"
+ } else {
+ // Run -k8s installer here specifying internal docker registry and docker proxy
+ withCredentials([gitlabCredentialsMap]) {
+ sshCommand remote: remote, command: """
+ ./install_osm.sh -y \
+ ${repo_base_url} \
+ ${repo_key_name} \
+ ${release} -r unstable \
+ -d ${USERNAME}:${PASSWORD}@${INTERNAL_DOCKER_REGISTRY} \
+ -p ${INTERNAL_DOCKER_PROXY} \
+ -t ${containerName}
+ """
+ }
+ prometheusHostname = IP_ADDRESS
+ prometheusPort = 9091
+ osmHostname = IP_ADDRESS
+ }
+ } // stage("Install")
+///////////////////////////////////////////////////////////////////////////////////////
+// Health check of installed OSM in remote vm
+///////////////////////////////////////////////////////////////////////////////////////
+ stage('OSM Health') {
+ stackName = 'osm'
+ sshCommand remote: remote, command: """
+ /usr/share/osm-devops/installers/osm_health.sh -k -s ${stackName}
+ """
+ } // stage("OSM Health")
+ } // if ( params.DO_INSTALL )
+
+
+///////////////////////////////////////////////////////////////////////////////////////
+// Execute Robot tests
+///////////////////////////////////////////////////////////////////////////////////////
+ stage_archive = false
+ if ( params.DO_ROBOT ) {
+ try {
+ stage('System Integration Test') {
+ if (useCharmedInstaller) {
+ tempdir = sh(returnStdout: true, script: 'mktemp -d').trim()
+ sh(script: "touch ${tempdir}/hosts")
+ hostfile = "${tempdir}/hosts"
+ sh """cat << EOF > ${hostfile}
+127.0.0.1 localhost
+${remote.host} prometheus.${remote.host}.nip.io nbi.${remote.host}.nip.io
+EOF"""
+ } else {
+ hostfile = null
+ }
+
+ jujuPassword = sshCommand remote: remote, command: '''
+ echo `juju gui 2>&1 | grep password | cut -d: -f2`
+ '''
+
+ run_robot_systest(
+ containerName,
+ params.ROBOT_TAG_NAME,
+ osmHostname,
+ prometheusHostname,
+ prometheusPort,
+ params.ROBOT_VIM,
+ params.ROBOT_PORT_MAPPING_VIM,
+ params.KUBECONFIG,
+ params.CLOUDS,
+ hostfile,
+ jujuPassword,
+ SSH_KEY,
+ params.ROBOT_PASS_THRESHOLD,
+ params.ROBOT_UNSTABLE_THRESHOLD
+ )
+ } // stage("System Integration Test")
+ } finally {
+ stage('Archive Container Logs') {
+ // Archive logs to containers_logs.txt
+ archive_logs(remote)
+ if (currentBuild.result != 'FAILURE') {
+ stage_archive = keep_artifacts
+ } else {
+ println('Systest test failed, throwing error')
+ error = new Exception('Systest test failed')
+ currentBuild.result = 'FAILURE'
+ throw error
+ }
+ }
+ }
+ } // if ( params.DO_ROBOT )
+
+ if (params.SAVE_ARTIFACTS_OVERRIDE || stage_archive) {
+ stage('Archive') {
+ sh "echo ${containerName} > build_version.txt"
+ archiveArtifacts artifacts: 'build_version.txt', fingerprint: true
+
+ // Archive the tested repo
+ dir("${RELEASE_DIR}") {
+ ci_helper.archive(params.ARTIFACTORY_SERVER, RELEASE, GERRIT_BRANCH, 'tested')
+ }
+ if (params.DO_DOCKERPUSH) {
+ stage('Publish to Dockerhub') {
+ parallelSteps = [:]
+ for (buildStep in containerList) {
+ def module = buildStep
+ def moduleName = buildStep.toLowerCase()
+ def dockerTag = params.DOCKER_TAG
+ def moduleTag = containerName
+
+ parallelSteps[module] = {
+ dir("$module") {
+ sh("""docker tag opensourcemano/${moduleName}:${moduleTag} \
+ opensourcemano/${moduleName}:${dockerTag}""")
+ sh "docker push opensourcemano/${moduleName}:${dockerTag}"
+ }
+ }
+ }
+ parallel parallelSteps
+ }
+
+ stage('Snap promotion') {
+ snaps = ['osmclient']
+ sh 'snapcraft login --with ~/.snapcraft/config'
+ for (snap in snaps) {
+ channel = 'latest/'
+ if (BRANCH_NAME.startsWith('v')) {
+ channel = BRANCH_NAME.substring(1) + '/'
+ } else if (BRANCH_NAME != 'master') {
+ channel += '/' + BRANCH_NAME.replaceAll('/', '-')
+ }
+ track = channel + 'edge\\*'
+ edge_rev = sh(returnStdout: true,
+ script: "snapcraft revisions $snap | " +
+ "grep \"$track\" | tail -1 | awk '{print \$1}'").trim()
+ print "edge rev is $edge_rev"
+ track = channel + 'beta\\*'
+ beta_rev = sh(returnStdout: true,
+ script: "snapcraft revisions $snap | " +
+ "grep \"$track\" | tail -1 | awk '{print \$1}'").trim()
+ print "beta rev is $beta_rev"
+
+ if (edge_rev != beta_rev) {
+ print "Promoting $edge_rev to beta in place of $beta_rev"
+ beta_track = channel + 'beta'
+ sh "snapcraft release $snap $edge_rev $beta_track"
+ }
+ }
+ } // stage('Snap promotion')
+ } // if (params.DO_DOCKERPUSH)
+ } // stage('Archive')
+ } // if (params.SAVE_ARTIFACTS_OVERRIDE || stage_archive)
+ } // dir(OSM_DEVOPS)
+ } finally {
+ if ( params.DO_INSTALL && server_id != null) {
+ delete_vm = true
+ if (error && params.SAVE_CONTAINER_ON_FAIL ) {
+ delete_vm = false
+ }
+ if (!error && params.SAVE_CONTAINER_ON_PASS ) {
+ delete_vm = false