Enable installation of TA in CI
[ci-management.git] / jjb / shell / ta-install.sh
diff --git a/jjb/shell/ta-install.sh b/jjb/shell/ta-install.sh
new file mode 100644 (file)
index 0000000..7642978
--- /dev/null
@@ -0,0 +1,223 @@
+#!/bin/bash -e
+
+# Copyright 2019 AT&T
+# Copyright 2020 ENEA
+
+# Licensed under the Apache License, Version 2.0 (the "License");
+# you may not use this file except in compliance with the License.
+# You may obtain a copy of the License at
+#
+#     http://www.apache.org/licenses/LICENSE-2.0
+#
+# Unless required by applicable law or agreed to in writing, software
+# distributed under the License is distributed on an "AS IS" BASIS,
+# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+# See the License for the specific language governing permissions and
+# limitations under the License.
+#
+
+_yaml2json() {
+    python -c 'import json,sys,yaml; json.dump(yaml.safe_load(sys.stdin.read()), sys.stdout)'
+}
+
+#Work-flow:
+
+#0. Get values for the environment variables
+
+# The following must be provided.
+    REC_ISO_IMAGE_NAME="${REC_ISO_IMAGE_NAME:?'Must be defined!'}"
+    REC_PROVISIONING_ISO_NAME="${REC_PROVISIONING_ISO_NAME:?'Must be defined!'}"
+    REC_USER_CONFIG="${REC_USER_CONFIG:?'Must be defined!'}"
+
+# The next set may be modified if necessary but are best left as-is
+    ADMIN_PASSWD="admin"
+    POD_NAME="REC-$BUILD_ID"
+    HTTPS_PORT=8443
+    API_PORT=15101
+    # Max time (in minutes) to wait for the remote-installer to return completed
+    # Currently 4 hours
+    MAX_TIME=240
+
+    # These should probably not be changed
+    WORKDIR="$(pwd)"
+    BASEDIR="$WORKDIR/rec_basedir"
+
+
+cat <<EOF
+    --------------------------------------------
+    WORKDIR is $WORKDIR
+    BASEDIR is $BASEDIR
+    POD_NAME is $POD_NAME
+    REC_ISO_IMAGE_NAME is $REC_ISO_IMAGE_NAME
+    REC_PROVISIONING_ISO_NAME is $REC_PROVISIONING_ISO_NAME
+    REC_USER_CONFIG is $REC_USER_CONFIG
+    --------------------------------------------
+EOF
+
+# Create cleanup hook
+_cleanup() {
+    exit_status=$?
+    set +e
+    sudo chown -R jenkins:jenkins "$WORKDIR"
+    docker cp 'remote-installer':/var/log/remote-installer.log "$BASEDIR/"
+    docker rm -f 'remote-installer'
+    trap - EXIT ERR HUP INT QUIT TERM
+    exit $exit_status
+}
+trap _cleanup EXIT ERR HUP INT QUIT TERM
+
+# Enable debugging
+    set -x
+
+#1. Create a new directory to be used for holding the installation artifacts.
+
+    # Clean workspace from previous run
+    sudo chown -R jenkins:jenkins "$WORKDIR"
+    rm -rf "$BASEDIR"
+
+    # Create the base directory structure
+    mkdir -p "$BASEDIR/images" \
+             "$BASEDIR/certificates" \
+             "$BASEDIR/installations" \
+             "$BASEDIR/user-configs/$POD_NAME"
+
+#2. Get REC golden and bootcd images from REC Nexus artifacts
+
+    cd "$BASEDIR/images/"
+    curl -sL "$REC_ISO_IMAGE_NAME"        > "$(basename "$REC_ISO_IMAGE_NAME")"
+    curl -sL "$REC_PROVISIONING_ISO_NAME" > "$(basename "$REC_PROVISIONING_ISO_NAME")"
+
+#3. Get the user-config.yaml file and admin_password file for the CD environment from the
+#   cd-environments repo and copy it to the user-configs sub-directory under the directory
+#   created in (1). Copy the files to a cloud-specific directory identified by the cloudname.
+
+    cd "$BASEDIR/user-configs/$POD_NAME"
+    curl -sL "$REC_USER_CONFIG" > user_config.yaml
+    echo "$ADMIN_PASSWD" > admin_passwd
+
+    FIRST_CONTROLLER_IP="$(_yaml2json < user_config.yaml | \
+        jq -r '.hosts[]|select(.service_profiles[]|contains("caas_master", "controller"))|.hwmgmt.address' | \
+        sort | head -1 )"
+    HOST_IP="$(ip route get "$FIRST_CONTROLLER_IP" | grep -Pzo 'src\s+\K([^\s]*)' )"
+
+#4. Copy the sever certificates, the client certificates in addition to CA certificate to
+#  the certificates sub-directory under the directory created in (1).
+#   The following certificates are expected to be available in the directory:
+#
+#   cacert.pem: The CA certificate
+#   servercert.pem: The server certificate signed by the CA
+#   serverkey.pem: The server key
+#   clientcert.pem: The client certificate signed by the CA
+#   clientkey.pem: The client key
+#
+
+    cd "$WORKDIR/git/remote-installer/test/certificates"
+    ./create.sh
+    cp -a {ca,client,server}{cert,key}.pem "${BASEDIR}/certificates/"
+
+#5. Build the remote installer docker-image.
+    cd "$WORKDIR/git/remote-installer/scripts/"
+    ./build.sh "$HTTPS_PORT" "$API_PORT"
+
+#6. Start the remote installer
+
+    cd "$WORKDIR/git/remote-installer/scripts/"
+    if ! ./start.sh -b "$BASEDIR" -e "$HOST_IP" -s "$HTTPS_PORT" -a "$API_PORT" -p "$ADMIN_PASSWD"
+    then
+        echo 'Failed to run workflow.'
+        exit 1
+    fi
+
+#7. Wait for the remote installer to become running.
+#   check every 30 seconds to see if it has it has a status of "running"
+
+    DOCKER_STATUS=""
+
+    while [ ${#DOCKER_STATUS} -eq 0 ]; do
+        sleep 30
+        DOCKER_ID=$(docker ps | grep 'remote-installer' | awk '{print $1}')
+        DOCKER_STATUS=$(docker ps -f status=running | grep "$DOCKER_ID")
+    done
+
+#8. Start the installation by sending the following http request to the installer API
+
+#    POST url: https://localhost:$API_PORT/v1/installations
+#    REQ body json- encoded
+#    {
+#        'cloudname': $POD_NAME,
+#        'iso': $REC_ISO_IMAGE_NAME,
+#        'provisioning-iso': $REC_PROVISIONING_ISO_NAME
+#    }
+#    REP body json-encoded
+#    {
+#        'uuid': $INSTALLATION_UUID
+#    }
+
+INSTALL_ISO="$(basename "$REC_ISO_IMAGE_NAME")"
+BOOT_ISO="$(basename "$REC_PROVISIONING_ISO_NAME")"
+cat >rec_request.json <<EOF
+{
+    "cloud-name": "$POD_NAME",
+    "iso": "$INSTALL_ISO",
+    "provisioning-iso": "$BOOT_ISO"
+}
+EOF
+
+    # Get the IP address of the remote installer container
+    RI_IP=$HOST_IP
+
+    RESPONSE=$(curl -k --silent \
+                    --header "Content-Type: application/json" \
+                    -d "@rec_request.json" \
+                    --cert "$BASEDIR/certificates/clientcert.pem" \
+                    --key  "$BASEDIR/certificates/clientkey.pem" \
+                    "https://${RI_IP}:${API_PORT}/v1/installations")
+    echo "$0: RESPONSE IS $RESPONSE"
+
+    INSTALLATION_UUID="$(echo "$RESPONSE" | jq -r ".uuid")"
+
+#9. Follow the progress of the installation by sending the following http request to the installer API
+
+#    GET url: https://localhost:$API_PORT/v1/installations/$INSTALLATION_UUID
+#
+#    REP body json-encoded
+#    {
+#        'status': <ongoing|completed|failed>,
+#        'description': <description>,
+#        'percentage': <the progess precentage>
+#    }
+#
+#
+
+# check the status every minute until it has become "completed"
+# (for a maximum of MAX_TIME minutes)
+
+    STATUS="ongoing"
+    NTIMES=$MAX_TIME
+    while [ "$STATUS" == "ongoing" -a $NTIMES -gt 0 ]; do
+        sleep 60
+        NTIMES=$((NTIMES - 1))
+        RESPONSE=$(curl -k --silent \
+                        --cert "$BASEDIR/certificates/clientcert.pem" \
+                        --key  "$BASEDIR/certificates/clientkey.pem" \
+                        "https://${RI_IP}:${API_PORT}/v1/installations/$INSTALLATION_UUID/state")
+        STATUS="$(echo "$RESPONSE" | jq -r ".status")"
+        PCT="$(   echo "$RESPONSE" | jq -r ".percentage")"
+        DESCR="$( echo "$RESPONSE" | jq -r ".description")"
+        echo "$(date): Status is $STATUS ($PCT) $DESCR"
+    done
+
+    if [ "$STATUS" == "ongoing" -a $NTIMES -le 0 ]; then
+        echo "Installation failed after $MAX_TIME minutes."
+        echo "RESPONSE: $RESPONSE"
+        exit 1
+    elif [ "$STATUS" != "completed" ]; then
+        echo "Installation failed."
+        echo "RESPONSE: $RESPONSE"
+        exit 1
+    fi
+
+    echo "Installation complete!"
+
+#10. Done
+    exit 0