2018-09-25 10:32:53 -04:00
|
|
|
[[ "$TRACE" ]] && set -x
|
|
|
|
|
2019-05-23 10:37:29 -04:00
|
|
|
function deploy_exists() {
|
2019-03-27 05:36:01 -04:00
|
|
|
local namespace="${1}"
|
2019-11-21 13:06:26 -05:00
|
|
|
local release="${2}"
|
|
|
|
local deploy_exists
|
2019-03-27 05:36:01 -04:00
|
|
|
|
2019-11-21 13:06:26 -05:00
|
|
|
echoinfo "Checking if ${release} exists in the ${namespace} namespace..." true
|
2019-03-27 05:36:01 -04:00
|
|
|
|
2019-11-21 13:06:26 -05:00
|
|
|
helm status --tiller-namespace "${namespace}" "${release}" >/dev/null 2>&1
|
|
|
|
deploy_exists=$?
|
|
|
|
|
|
|
|
echoinfo "Deployment status for ${release} is ${deploy_exists}"
|
2019-03-27 05:36:01 -04:00
|
|
|
return $deploy_exists
|
|
|
|
}
|
|
|
|
|
2019-05-23 10:37:29 -04:00
|
|
|
function previous_deploy_failed() {
|
2019-11-21 13:06:26 -05:00
|
|
|
local namespace="${1}"
|
|
|
|
local release="${2}"
|
|
|
|
|
|
|
|
echoinfo "Checking for previous deployment of ${release}" true
|
2019-03-27 05:36:01 -04:00
|
|
|
|
2019-11-21 13:06:26 -05:00
|
|
|
helm status --tiller-namespace "${namespace}" "${release}" >/dev/null 2>&1
|
2019-03-27 05:36:01 -04:00
|
|
|
local status=$?
|
|
|
|
|
|
|
|
# if `status` is `0`, deployment exists, has a status
|
|
|
|
if [ $status -eq 0 ]; then
|
|
|
|
echoinfo "Previous deployment found, checking status..."
|
2019-11-21 13:06:26 -05:00
|
|
|
deployment_status=$(helm status --tiller-namespace "${namespace}" "${release}" | grep ^STATUS | cut -d' ' -f2)
|
2019-03-27 05:36:01 -04:00
|
|
|
echoinfo "Previous deployment state: ${deployment_status}"
|
|
|
|
if [[ "$deployment_status" == "FAILED" || "$deployment_status" == "PENDING_UPGRADE" || "$deployment_status" == "PENDING_INSTALL" ]]; then
|
|
|
|
status=0;
|
|
|
|
else
|
|
|
|
status=1;
|
|
|
|
fi
|
|
|
|
else
|
|
|
|
echoerr "Previous deployment NOT found."
|
|
|
|
fi
|
|
|
|
return $status
|
|
|
|
}
|
|
|
|
|
2019-08-27 07:01:13 -04:00
|
|
|
function delete_release() {
|
2019-11-21 13:06:26 -05:00
|
|
|
local namespace="${KUBE_NAMESPACE}"
|
|
|
|
local release="${CI_ENVIRONMENT_SLUG}"
|
|
|
|
|
|
|
|
if [ -z "${release}" ]; then
|
2019-03-27 05:36:01 -04:00
|
|
|
echoerr "No release given, aborting the delete!"
|
|
|
|
return
|
|
|
|
fi
|
|
|
|
|
2019-11-27 13:06:30 -05:00
|
|
|
helm_delete_release "${namespace}" "${release}"
|
|
|
|
kubectl_cleanup_release "${namespace}" "${release}"
|
|
|
|
}
|
|
|
|
|
|
|
|
function helm_delete_release() {
|
|
|
|
local namespace="${1}"
|
|
|
|
local release="${2}"
|
|
|
|
|
|
|
|
echoinfo "Deleting Helm release '${release}'..." true
|
2019-03-27 05:36:01 -04:00
|
|
|
|
2019-11-21 13:06:26 -05:00
|
|
|
helm delete --tiller-namespace "${namespace}" --purge "${release}"
|
2019-03-27 05:36:01 -04:00
|
|
|
}
|
|
|
|
|
2019-11-27 13:06:30 -05:00
|
|
|
function kubectl_cleanup_release() {
|
|
|
|
local namespace="${1}"
|
|
|
|
local release="${2}"
|
|
|
|
|
|
|
|
echoinfo "Deleting all K8s resources matching '${release}'..." true
|
|
|
|
kubectl --namespace "${namespace}" get ingress,svc,pdb,hpa,deploy,statefulset,job,pod,secret,configmap,pvc,secret,clusterrole,clusterrolebinding,role,rolebinding,sa,crd 2>&1 \
|
|
|
|
| grep "${release}" \
|
|
|
|
| awk '{print $1}' \
|
|
|
|
| xargs kubectl --namespace "${namespace}" delete \
|
|
|
|
|| true
|
|
|
|
}
|
|
|
|
|
2019-09-09 15:29:44 -04:00
|
|
|
function delete_failed_release() {
|
2019-11-21 13:06:26 -05:00
|
|
|
local namespace="${KUBE_NAMESPACE}"
|
|
|
|
local release="${CI_ENVIRONMENT_SLUG}"
|
|
|
|
|
|
|
|
if [ -z "${release}" ]; then
|
2019-09-09 15:29:44 -04:00
|
|
|
echoerr "No release given, aborting the delete!"
|
|
|
|
return
|
|
|
|
fi
|
|
|
|
|
2019-11-21 13:06:26 -05:00
|
|
|
if ! deploy_exists "${namespace}" "${release}"; then
|
|
|
|
echoinfo "No Review App with ${release} is currently deployed."
|
2019-09-09 15:29:44 -04:00
|
|
|
else
|
|
|
|
# Cleanup and previous installs, as FAILED and PENDING_UPGRADE will cause errors with `upgrade`
|
2019-11-21 13:06:26 -05:00
|
|
|
if previous_deploy_failed "${namespace}" "${release}" ; then
|
|
|
|
echoinfo "Review App deployment in bad state, cleaning up ${release}"
|
2019-09-09 15:29:44 -04:00
|
|
|
delete_release
|
|
|
|
else
|
|
|
|
echoinfo "Review App deployment in good state"
|
|
|
|
fi
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2019-03-27 05:36:01 -04:00
|
|
|
function get_pod() {
|
2019-11-21 13:06:26 -05:00
|
|
|
local namespace="${KUBE_NAMESPACE}"
|
|
|
|
local release="${CI_ENVIRONMENT_SLUG}"
|
2019-03-27 05:36:01 -04:00
|
|
|
local app_name="${1}"
|
|
|
|
local status="${2-Running}"
|
2019-11-21 13:06:26 -05:00
|
|
|
|
|
|
|
get_pod_cmd="kubectl get pods --namespace ${namespace} --field-selector=status.phase=${status} -lapp=${app_name},release=${release} --no-headers -o=custom-columns=NAME:.metadata.name | tail -n 1"
|
2019-05-23 10:37:29 -04:00
|
|
|
echoinfo "Waiting till '${app_name}' pod is ready" true
|
|
|
|
echoinfo "Running '${get_pod_cmd}'"
|
2019-03-27 05:36:01 -04:00
|
|
|
|
2019-05-23 10:37:29 -04:00
|
|
|
local interval=5
|
|
|
|
local elapsed_seconds=0
|
|
|
|
local max_seconds=$((2 * 60))
|
2019-03-27 05:36:01 -04:00
|
|
|
while true; do
|
2019-04-09 07:12:49 -04:00
|
|
|
local pod_name
|
|
|
|
pod_name="$(eval "${get_pod_cmd}")"
|
2019-03-27 05:36:01 -04:00
|
|
|
[[ "${pod_name}" == "" ]] || break
|
|
|
|
|
2019-05-23 10:37:29 -04:00
|
|
|
if [[ "${elapsed_seconds}" -gt "${max_seconds}" ]]; then
|
|
|
|
echoerr "The pod name couldn't be found after ${elapsed_seconds} seconds, aborting."
|
2019-06-20 04:59:31 -04:00
|
|
|
break
|
2019-05-23 10:37:29 -04:00
|
|
|
fi
|
|
|
|
|
|
|
|
let "elapsed_seconds+=interval"
|
|
|
|
sleep ${interval}
|
2019-03-27 05:36:01 -04:00
|
|
|
done
|
|
|
|
|
|
|
|
echoinfo "The pod name is '${pod_name}'."
|
|
|
|
echo "${pod_name}"
|
|
|
|
}
|
2018-11-06 17:59:25 -05:00
|
|
|
|
2018-09-25 10:32:53 -04:00
|
|
|
function check_kube_domain() {
|
2019-03-27 05:36:01 -04:00
|
|
|
echoinfo "Checking that Kube domain exists..." true
|
|
|
|
|
2018-09-25 10:32:53 -04:00
|
|
|
if [ -z ${REVIEW_APPS_DOMAIN+x} ]; then
|
|
|
|
echo "In order to deploy or use Review Apps, REVIEW_APPS_DOMAIN variable must be set"
|
|
|
|
echo "You can do it in Auto DevOps project settings or defining a variable at group or project level"
|
|
|
|
echo "You can also manually add it in .gitlab-ci.yml"
|
|
|
|
false
|
|
|
|
else
|
|
|
|
true
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
|
|
|
function ensure_namespace() {
|
2019-11-21 13:06:26 -05:00
|
|
|
local namespace="${KUBE_NAMESPACE}"
|
|
|
|
|
|
|
|
echoinfo "Ensuring the ${namespace} namespace exists..." true
|
2019-03-27 05:36:01 -04:00
|
|
|
|
2019-11-21 13:06:26 -05:00
|
|
|
kubectl describe namespace "${namespace}" || kubectl create namespace "${namespace}"
|
2018-09-25 10:32:53 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
function install_tiller() {
|
2019-11-21 13:06:26 -05:00
|
|
|
local namespace="${KUBE_NAMESPACE}"
|
|
|
|
|
|
|
|
echoinfo "Checking deployment/tiller-deploy status in the ${namespace} namespace..." true
|
2019-03-27 05:36:01 -04:00
|
|
|
|
|
|
|
echoinfo "Initiating the Helm client..."
|
|
|
|
helm init --client-only
|
|
|
|
|
2019-06-20 04:59:31 -04:00
|
|
|
# Set toleration for Tiller to be installed on a specific node pool
|
2018-12-13 10:45:44 -05:00
|
|
|
helm init \
|
2019-11-21 13:06:26 -05:00
|
|
|
--tiller-namespace "${namespace}" \
|
2019-06-20 04:59:31 -04:00
|
|
|
--wait \
|
2018-12-13 10:45:44 -05:00
|
|
|
--upgrade \
|
2019-11-25 07:06:13 -05:00
|
|
|
--force-upgrade \
|
2019-06-20 04:59:31 -04:00
|
|
|
--node-selectors "app=helm" \
|
|
|
|
--replicas 3 \
|
|
|
|
--override "spec.template.spec.tolerations[0].key"="dedicated" \
|
|
|
|
--override "spec.template.spec.tolerations[0].operator"="Equal" \
|
|
|
|
--override "spec.template.spec.tolerations[0].value"="helm" \
|
2019-11-19 10:06:24 -05:00
|
|
|
--override "spec.template.spec.tolerations[0].effect"="NoSchedule"
|
2019-03-27 05:36:01 -04:00
|
|
|
|
2019-11-21 13:06:26 -05:00
|
|
|
kubectl rollout status --namespace "${namespace}" --watch "deployment/tiller-deploy"
|
2019-03-27 05:36:01 -04:00
|
|
|
|
2019-11-21 13:06:26 -05:00
|
|
|
if ! helm version --tiller-namespace "${namespace}" --debug; then
|
2018-09-25 10:32:53 -04:00
|
|
|
echo "Failed to init Tiller."
|
|
|
|
return 1
|
|
|
|
fi
|
2019-03-27 05:36:01 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
function install_external_dns() {
|
2019-11-21 13:06:26 -05:00
|
|
|
local namespace="${KUBE_NAMESPACE}"
|
|
|
|
local release="dns-gitlab-review-app"
|
2019-04-09 07:12:49 -04:00
|
|
|
local domain
|
|
|
|
domain=$(echo "${REVIEW_APPS_DOMAIN}" | awk -F. '{printf "%s.%s", $(NF-1), $NF}')
|
2019-03-27 05:36:01 -04:00
|
|
|
echoinfo "Installing external DNS for domain ${domain}..." true
|
|
|
|
|
2019-11-21 13:06:26 -05:00
|
|
|
if ! deploy_exists "${namespace}" "${release}" || previous_deploy_failed "${namespace}" "${release}" ; then
|
2019-03-27 05:36:01 -04:00
|
|
|
echoinfo "Installing external-dns Helm chart"
|
2019-11-21 13:06:26 -05:00
|
|
|
helm repo update --tiller-namespace "${namespace}"
|
|
|
|
|
2019-06-28 05:38:38 -04:00
|
|
|
# Default requested: CPU => 0, memory => 0
|
2019-11-26 16:06:38 -05:00
|
|
|
# Chart > 2.6.1 has a problem with AWS so we're pinning it for now.
|
|
|
|
# See https://gitlab.com/gitlab-org/gitlab/issues/37269 and https://github.com/kubernetes-sigs/external-dns/issues/1262
|
2019-11-21 13:06:26 -05:00
|
|
|
helm install stable/external-dns \
|
|
|
|
--tiller-namespace "${namespace}" \
|
|
|
|
--namespace "${namespace}" \
|
2019-11-26 16:06:38 -05:00
|
|
|
--version '2.6.1' \
|
2019-11-21 13:06:26 -05:00
|
|
|
--name "${release}" \
|
2019-03-27 05:36:01 -04:00
|
|
|
--set provider="aws" \
|
2019-07-10 12:35:42 -04:00
|
|
|
--set aws.credentials.secretKey="${REVIEW_APPS_AWS_SECRET_KEY}" \
|
|
|
|
--set aws.credentials.accessKey="${REVIEW_APPS_AWS_ACCESS_KEY}" \
|
2019-03-27 05:36:01 -04:00
|
|
|
--set aws.zoneType="public" \
|
2019-07-10 12:35:42 -04:00
|
|
|
--set aws.batchChangeSize=400 \
|
2019-03-27 05:36:01 -04:00
|
|
|
--set domainFilters[0]="${domain}" \
|
2019-11-21 13:06:26 -05:00
|
|
|
--set txtOwnerId="${namespace}" \
|
2019-03-27 05:36:01 -04:00
|
|
|
--set rbac.create="true" \
|
2019-06-28 05:38:38 -04:00
|
|
|
--set policy="sync" \
|
|
|
|
--set resources.requests.cpu=50m \
|
|
|
|
--set resources.limits.cpu=100m \
|
|
|
|
--set resources.requests.memory=100M \
|
|
|
|
--set resources.limits.memory=200M
|
2019-03-27 05:36:01 -04:00
|
|
|
else
|
|
|
|
echoinfo "The external-dns Helm chart is already successfully deployed."
|
|
|
|
fi
|
2018-09-25 10:32:53 -04:00
|
|
|
}
|
|
|
|
|
2019-05-23 10:37:29 -04:00
|
|
|
function create_application_secret() {
|
2019-11-21 13:06:26 -05:00
|
|
|
local namespace="${KUBE_NAMESPACE}"
|
|
|
|
local release="${CI_ENVIRONMENT_SLUG}"
|
2019-11-27 07:06:30 -05:00
|
|
|
local initial_root_password_shared_secret
|
|
|
|
local gitlab_license_shared_secret
|
|
|
|
|
|
|
|
initial_root_password_shared_secret=$(kubectl get secret --namespace ${namespace} --no-headers -o=custom-columns=NAME:.metadata.name shared-gitlab-initial-root-password | tail -n 1)
|
|
|
|
if [[ "${initial_root_password_shared_secret}" == "" ]]; then
|
|
|
|
echoinfo "Creating the 'shared-gitlab-initial-root-password' secret in the ${namespace} namespace..." true
|
|
|
|
kubectl create secret generic --namespace "${namespace}" \
|
|
|
|
"shared-gitlab-initial-root-password" \
|
|
|
|
--from-literal="password=${REVIEW_APPS_ROOT_PASSWORD}" \
|
|
|
|
--dry-run -o json | kubectl apply -f -
|
|
|
|
else
|
|
|
|
echoinfo "The 'shared-gitlab-initial-root-password' secret already exists in the ${namespace} namespace."
|
|
|
|
fi
|
2019-11-04 13:06:28 -05:00
|
|
|
|
|
|
|
if [ -z "${REVIEW_APPS_EE_LICENSE}" ]; then echo "License not found" && return; fi
|
|
|
|
|
2019-11-27 07:06:30 -05:00
|
|
|
gitlab_license_shared_secret=$(kubectl get secret --namespace ${namespace} --no-headers -o=custom-columns=NAME:.metadata.name shared-gitlab-license | tail -n 1)
|
|
|
|
if [[ "${gitlab_license_shared_secret}" == "" ]]; then
|
|
|
|
echoinfo "Creating the 'shared-gitlab-license' secret in the ${namespace} namespace..." true
|
|
|
|
echo "${REVIEW_APPS_EE_LICENSE}" > /tmp/license.gitlab
|
|
|
|
kubectl create secret generic --namespace "${namespace}" \
|
|
|
|
"shared-gitlab-license" \
|
|
|
|
--from-file=license=/tmp/license.gitlab \
|
|
|
|
--dry-run -o json | kubectl apply -f -
|
|
|
|
else
|
|
|
|
echoinfo "The 'shared-gitlab-license' secret already exists in the ${namespace} namespace."
|
|
|
|
fi
|
2019-11-25 07:06:13 -05:00
|
|
|
}
|
|
|
|
|
2019-05-23 10:37:29 -04:00
|
|
|
function download_chart() {
|
2019-03-27 05:36:01 -04:00
|
|
|
echoinfo "Downloading the GitLab chart..." true
|
2018-09-20 10:37:21 -04:00
|
|
|
|
2019-09-03 11:04:00 -04:00
|
|
|
curl --location -o gitlab.tar.bz2 "https://gitlab.com/gitlab-org/charts/gitlab/-/archive/${GITLAB_HELM_CHART_REF}/gitlab-${GITLAB_HELM_CHART_REF}.tar.bz2"
|
2019-03-27 05:36:01 -04:00
|
|
|
tar -xjf gitlab.tar.bz2
|
2019-04-09 07:12:49 -04:00
|
|
|
cd "gitlab-${GITLAB_HELM_CHART_REF}"
|
2019-03-27 05:36:01 -04:00
|
|
|
|
|
|
|
echoinfo "Adding the gitlab repo to Helm..."
|
|
|
|
helm repo add gitlab https://charts.gitlab.io
|
|
|
|
|
|
|
|
echoinfo "Building the gitlab chart's dependencies..."
|
|
|
|
helm dependency build .
|
2018-09-25 10:32:53 -04:00
|
|
|
}
|
|
|
|
|
2019-10-30 11:14:17 -04:00
|
|
|
function base_config_changed() {
|
2019-11-08 07:06:32 -05:00
|
|
|
if [ -z "${CI_MERGE_REQUEST_IID}" ]; then return; fi
|
2019-10-30 11:14:17 -04:00
|
|
|
|
2019-11-08 07:06:32 -05:00
|
|
|
curl "${CI_API_V4_URL}/projects/${CI_MERGE_REQUEST_PROJECT_ID}/merge_requests/${CI_MERGE_REQUEST_IID}/changes" | jq '.changes | any(.old_path == "scripts/review_apps/base-config.yaml")'
|
2019-10-30 11:14:17 -04:00
|
|
|
}
|
|
|
|
|
2018-09-25 10:32:53 -04:00
|
|
|
function deploy() {
|
2019-11-21 13:06:26 -05:00
|
|
|
local namespace="${KUBE_NAMESPACE}"
|
|
|
|
local release="${CI_ENVIRONMENT_SLUG}"
|
2019-09-16 14:06:05 -04:00
|
|
|
local edition="${GITLAB_EDITION-ce}"
|
2019-10-30 11:14:17 -04:00
|
|
|
local base_config_file_ref="master"
|
2019-11-21 13:06:26 -05:00
|
|
|
if [[ "$(base_config_changed)" == "true" ]]; then base_config_file_ref="${CI_COMMIT_SHA}"; fi
|
2019-10-30 11:14:17 -04:00
|
|
|
local base_config_file="https://gitlab.com/gitlab-org/gitlab/raw/${base_config_file_ref}/scripts/review_apps/base-config.yaml"
|
|
|
|
|
2019-11-21 13:06:26 -05:00
|
|
|
echoinfo "Deploying ${release}..." true
|
2018-09-25 10:32:53 -04:00
|
|
|
|
2018-11-06 17:59:25 -05:00
|
|
|
IMAGE_REPOSITORY="registry.gitlab.com/gitlab-org/build/cng-mirror"
|
2019-09-16 14:06:05 -04:00
|
|
|
gitlab_migrations_image_repository="${IMAGE_REPOSITORY}/gitlab-rails-${edition}"
|
|
|
|
gitlab_sidekiq_image_repository="${IMAGE_REPOSITORY}/gitlab-sidekiq-${edition}"
|
|
|
|
gitlab_unicorn_image_repository="${IMAGE_REPOSITORY}/gitlab-unicorn-${edition}"
|
|
|
|
gitlab_task_runner_image_repository="${IMAGE_REPOSITORY}/gitlab-task-runner-${edition}"
|
2018-11-06 17:59:25 -05:00
|
|
|
gitlab_gitaly_image_repository="${IMAGE_REPOSITORY}/gitaly"
|
|
|
|
gitlab_shell_image_repository="${IMAGE_REPOSITORY}/gitlab-shell"
|
2019-09-16 14:06:05 -04:00
|
|
|
gitlab_workhorse_image_repository="${IMAGE_REPOSITORY}/gitlab-workhorse-${edition}"
|
2018-09-25 10:32:53 -04:00
|
|
|
|
2019-05-23 10:37:29 -04:00
|
|
|
create_application_secret
|
2018-09-25 10:32:53 -04:00
|
|
|
|
|
|
|
HELM_CMD=$(cat << EOF
|
2019-11-21 13:06:26 -05:00
|
|
|
helm upgrade \
|
|
|
|
--tiller-namespace="${namespace}" \
|
|
|
|
--namespace="${namespace}" \
|
|
|
|
--install \
|
2019-08-27 07:01:13 -04:00
|
|
|
--wait \
|
2019-07-23 11:53:17 -04:00
|
|
|
--timeout 900 \
|
2019-11-21 13:06:26 -05:00
|
|
|
--set ci.branch="${CI_COMMIT_REF_NAME}" \
|
|
|
|
--set ci.commit.sha="${CI_COMMIT_SHORT_SHA}" \
|
|
|
|
--set ci.job.url="${CI_JOB_URL}" \
|
|
|
|
--set ci.pipeline.url="${CI_PIPELINE_URL}" \
|
|
|
|
--set releaseOverride="${release}" \
|
|
|
|
--set global.hosts.hostSuffix="${HOST_SUFFIX}" \
|
|
|
|
--set global.hosts.domain="${REVIEW_APPS_DOMAIN}" \
|
|
|
|
--set gitlab.migrations.image.repository="${gitlab_migrations_image_repository}" \
|
|
|
|
--set gitlab.migrations.image.tag="${CI_COMMIT_REF_SLUG}" \
|
|
|
|
--set gitlab.gitaly.image.repository="${gitlab_gitaly_image_repository}" \
|
|
|
|
--set gitlab.gitaly.image.tag="v${GITALY_VERSION}" \
|
|
|
|
--set gitlab.gitlab-shell.image.repository="${gitlab_shell_image_repository}" \
|
|
|
|
--set gitlab.gitlab-shell.image.tag="v${GITLAB_SHELL_VERSION}" \
|
|
|
|
--set gitlab.sidekiq.image.repository="${gitlab_sidekiq_image_repository}" \
|
|
|
|
--set gitlab.sidekiq.image.tag="${CI_COMMIT_REF_SLUG}" \
|
|
|
|
--set gitlab.unicorn.image.repository="${gitlab_unicorn_image_repository}" \
|
|
|
|
--set gitlab.unicorn.image.tag="${CI_COMMIT_REF_SLUG}" \
|
|
|
|
--set gitlab.unicorn.workhorse.image="${gitlab_workhorse_image_repository}" \
|
|
|
|
--set gitlab.unicorn.workhorse.tag="${CI_COMMIT_REF_SLUG}" \
|
|
|
|
--set gitlab.task-runner.image.repository="${gitlab_task_runner_image_repository}" \
|
|
|
|
--set gitlab.task-runner.image.tag="${CI_COMMIT_REF_SLUG}"
|
2019-06-28 05:38:38 -04:00
|
|
|
EOF
|
|
|
|
)
|
|
|
|
|
2019-11-04 13:06:28 -05:00
|
|
|
if [ -n "${REVIEW_APPS_EE_LICENSE}" ]; then
|
|
|
|
HELM_CMD=$(cat << EOF
|
|
|
|
${HELM_CMD} \
|
2019-11-27 07:06:30 -05:00
|
|
|
--set global.gitlab.license.secret="shared-gitlab-license"
|
2019-11-04 13:06:28 -05:00
|
|
|
EOF
|
|
|
|
)
|
|
|
|
fi
|
|
|
|
|
2019-06-28 05:38:38 -04:00
|
|
|
HELM_CMD=$(cat << EOF
|
2019-10-30 11:14:17 -04:00
|
|
|
${HELM_CMD} \
|
|
|
|
--version="${CI_PIPELINE_ID}-${CI_JOB_ID}" \
|
|
|
|
-f "${base_config_file}" \
|
2019-11-21 13:06:26 -05:00
|
|
|
"${release}" .
|
2018-09-25 10:32:53 -04:00
|
|
|
EOF
|
|
|
|
)
|
|
|
|
|
2019-03-27 05:36:01 -04:00
|
|
|
echoinfo "Deploying with:"
|
|
|
|
echoinfo "${HELM_CMD}"
|
2018-09-25 10:32:53 -04:00
|
|
|
|
2019-05-23 10:37:29 -04:00
|
|
|
eval "${HELM_CMD}"
|
|
|
|
}
|
|
|
|
|
|
|
|
function display_deployment_debug() {
|
2019-11-21 13:06:26 -05:00
|
|
|
local namespace="${KUBE_NAMESPACE}"
|
|
|
|
local release="${CI_ENVIRONMENT_SLUG}"
|
|
|
|
|
2019-10-10 11:06:07 -04:00
|
|
|
# Get all pods for this release
|
2019-11-21 13:06:26 -05:00
|
|
|
echoinfo "Pods for release ${release}"
|
|
|
|
kubectl get pods --namespace "${namespace}" -lrelease=${release}
|
2019-09-13 09:26:31 -04:00
|
|
|
|
2019-10-07 08:06:18 -04:00
|
|
|
# Get all non-completed jobs
|
2019-11-21 13:06:26 -05:00
|
|
|
echoinfo "Unsuccessful Jobs for release ${release}"
|
|
|
|
kubectl get jobs --namespace "${namespace}" -lrelease=${release} --field-selector=status.successful!=1
|
2019-04-08 13:10:18 -04:00
|
|
|
}
|