#!/usr/bin/env groovy // When scheduling a job that gets automatically triggered by changes, // you need to include a [cronjob] tag within the commit message. String cron_timezone = 'TZ=Asia/Shanghai' String cron_string = BRANCH_NAME == "2.4" ? "50 3 * * * " : "" // Make timeout 4 hours so that we can run two nightly during the ci int total_timeout_minutes = 7 * 60 def imageTag='' def chart_version='4.1.27' pipeline { triggers { cron """${cron_timezone} ${cron_string}""" } options { timestamps() timeout(time: total_timeout_minutes, unit: 'MINUTES') buildDiscarder logRotator(artifactDaysToKeepStr: '30') // parallelsAlwaysFailFast() preserveStashes(buildCount: 5) disableConcurrentBuilds() } agent { kubernetes { inheritFrom 'default' defaultContainer 'main' yamlFile "ci/jenkins/pod/rte.yaml" customWorkspace '/home/jenkins/agent/workspace' } } environment { PROJECT_NAME = "milvus" BRANCH_NAME="nightly" SEMVER = "${BRANCH_NAME.contains('/') ? BRANCH_NAME.substring(BRANCH_NAME.lastIndexOf('/') + 1) : BRANCH_NAME}" DOCKER_BUILDKIT = 1 ARTIFACTS = "${env.WORKSPACE}/_artifacts" DOCKER_CREDENTIALS_ID = "dockerhub" TARGET_REPO = "milvusdb" CI_DOCKER_CREDENTIAL_ID = "harbor-milvus-io-registry" MILVUS_HELM_NAMESPACE = "milvus-ci" DISABLE_KIND = true HUB = "harbor.milvus.io/milvus" JENKINS_BUILD_ID = "${env.BUILD_ID}" CI_MODE="nightly" SHOW_MILVUS_CONFIGMAP= true } stages { stage ('Build'){ steps { container('main') { dir ('build'){ sh './set_docker_mirror.sh' } dir ('tests/scripts') { script { sh 'printenv' def date = sh(returnStdout: true, script: 'date +%Y%m%d').trim() def gitShortCommit = sh(returnStdout: true, script: 'git rev-parse --short HEAD').trim() imageTag="${env.BRANCH_NAME}-${date}-${gitShortCommit}" withCredentials([usernamePassword(credentialsId: "${env.CI_DOCKER_CREDENTIAL_ID}", usernameVariable: 'CI_REGISTRY_USERNAME', passwordVariable: 'CI_REGISTRY_PASSWORD')]){ sh """ TAG="${imageTag}" \ ./e2e-k8s.sh \ --skip-export-logs \ --skip-install \ --skip-cleanup \ --skip-setup \ --skip-test """ // stash imageTag info for rebuild install & E2E Test only sh "echo ${imageTag} > imageTag.txt" stash includes: 'imageTag.txt', name: 'imageTag' } } } } } } stage ('Install & E2E Test') { matrix { axes { axis { name 'MILVUS_SERVER_TYPE' values 'standalone', 'distributed-pulsar', 'distributed-kafka', 'standalone-authentication', 'standalone-one-pod' } axis { name 'MILVUS_CLIENT' values 'pymilvus' } } stages { stage('Install') { steps { container('main') { dir ('tests/scripts') { script { sh 'printenv' def clusterEnabled = "false" // def setMemoryResourceLimitArgs="--set standalone.resources.limits.memory=4Gi" def mqMode='pulsar' // default using is pulsar def authenticationEnabled = "false" def valuesFile = "values/ci/nightly.yaml" if ("${MILVUS_SERVER_TYPE}" == "distributed-pulsar") { clusterEnabled = "true" } else if ("${MILVUS_SERVER_TYPE}" == "distributed-kafka") { clusterEnabled = "true" mqMode='kafka' } else if("${MILVUS_SERVER_TYPE}" == "standalone-authentication") { authenticationEnabled = "true" } else if("${MILVUS_SERVER_TYPE}" == "standalone-one-pod") { valuesFile = "values/ci/nightly-one-pod.yaml" } if ("${MILVUS_CLIENT}" == "pymilvus") { if ("${imageTag}"==''){ dir ("imageTag"){ try{ unstash 'imageTag' imageTag=sh(returnStdout: true, script: 'cat imageTag.txt | tr -d \'\n\r\'') }catch(e){ print "No Image Tag info remained ,please rerun build to build new image." exit 1 } } } withCredentials([usernamePassword(credentialsId: "${env.CI_DOCKER_CREDENTIAL_ID}", usernameVariable: 'CI_REGISTRY_USERNAME', passwordVariable: 'CI_REGISTRY_PASSWORD')]){ sh """ MILVUS_CLUSTER_ENABLED=${clusterEnabled} \ TAG="${imageTag}" \ ./e2e-k8s.sh \ --skip-export-logs \ --skip-cleanup \ --skip-setup \ --skip-test \ --skip-build \ --skip-build-image \ --install-extra-arg " --set etcd.metrics.enabled=true \ --set etcd.metrics.podMonitor.enabled=true \ --set proxy.replicas=2 \ --set queryNode.replicas=2 \ --set indexNode.replicas=2 \ --set dataNode.replicas=2 \ --set dataCoordinator.gc.missingTolerance=86400 \ --set dataCoordinator.gc.dropTolerance=86400 \ --set indexCoordinator.gc.interval=1 \ --set proxy.profiling.enabled=true \ --set dataCoordinator.profiling.enabled=true \ --set dataNode.profiling.enabled=true \ --set queryCoordinator.profiling.enabled=true \ --set queryNode.profiling.enabled=true \ --set indexCoordinator.profiling.enabled=true \ --set indexNode.profiling.enabled=true \ --set indexNode.disk.enabled=true \ --set queryNode.disk.enabled=true \ --set standalone.disk.enabled=true \ --set log.level=debug \ --set common.security.authorizationEnabled=${authenticationEnabled} \ --version ${chart_version} \ -f values/${mqMode}.yaml \ -f ${valuesFile}" """ } } else { error "Error: Unsupported Milvus client: ${MILVUS_CLIENT}" } } } } } } stage('E2E Test'){ agent { kubernetes { inheritFrom 'default' defaultContainer 'main' yamlFile 'ci/jenkins/pod/rte.yaml' customWorkspace '/home/jenkins/agent/workspace' } } steps { container('pytest') { dir ('tests/scripts') { script { def release_name=sh(returnStdout: true, script: './get_release_name.sh') def clusterEnabled = "false" def mqMode='pulsar' int e2e_timeout_seconds = 5 * 60 * 60 int parallel_num = 6 def tag="L0 L1 L2" if ("${MILVUS_SERVER_TYPE}" == "distributed-pulsar") { clusterEnabled = "true" tag="L0 L1 L2 ClusterOnly" e2e_timeout_seconds = 6 * 60 * 60 } else if("${MILVUS_SERVER_TYPE}" == "distributed-kafka" ) { clusterEnabled = "true" mqMode='kafka' tag="L0 L1 L2 ClusterOnly" e2e_timeout_seconds = 6 * 60 * 60 } else if("${MILVUS_SERVER_TYPE}" == "standalone-authentication") { tag="RBAC" parallel_num = 1 e2e_timeout_seconds = 3 * 60 * 60 } if ("${MILVUS_CLIENT}" == "pymilvus") { sh """ MILVUS_HELM_RELEASE_NAME="${release_name}" \ MILVUS_HELM_NAMESPACE="milvus-ci" \ MILVUS_CLUSTER_ENABLED="${clusterEnabled}" \ TEST_TIMEOUT="${e2e_timeout_seconds}" \ MQ_MODE="${mqMode}" \ ./ci_e2e.sh "-n ${parallel_num} --tags ${tag}" """ } else { error "Error: Unsupported Milvus client: ${MILVUS_CLIENT}" } sh """ MILVUS_HELM_RELEASE_NAME="${release_name}" \ MILVUS_HELM_NAMESPACE="milvus-ci" \ MILVUS_CLUSTER_ENABLED="${clusterEnabled}" \ TEST_TIMEOUT="${e2e_timeout_seconds}" \ ./e2e-restful.sh """ } } } } post{ always { container('pytest'){ dir("${env.ARTIFACTS}") { sh "tar -zcvf ${PROJECT_NAME}-${MILVUS_SERVER_TYPE}-${MILVUS_CLIENT}-pytest-logs.tar.gz /tmp/ci_logs/test --remove-files || true" archiveArtifacts artifacts: "${PROJECT_NAME}-${MILVUS_SERVER_TYPE}-${MILVUS_CLIENT}-pytest-logs.tar.gz ", allowEmptyArchive: true } } } } } } post { unsuccessful { container('jnlp') { script { emailext subject: '$DEFAULT_SUBJECT', body: '$DEFAULT_CONTENT', recipientProviders: [requestor()], replyTo: '$DEFAULT_REPLYTO', to: 'qa@zilliz.com,devops@zilliz.com' } } } success { container('main') { script { withCredentials([usernamePassword(credentialsId: "${env.DOCKER_CREDENTIALS_ID}", usernameVariable: 'DOCKER_USERNAME', passwordVariable: 'DOCKER_PASSWORD')]) { sh 'docker login -u ${DOCKER_USERNAME} -p ${DOCKER_PASSWORD}' // Use ci registry instead of local registry sh """ docker tag ${HUB}/milvus:${imageTag} ${TARGET_REPO}/milvus-nightly:${imageTag} docker tag ${HUB}/milvus:${imageTag} ${TARGET_REPO}/milvus-nightly:${env.BRANCH_NAME}-latest docker push ${TARGET_REPO}/milvus-nightly:${imageTag} docker push ${TARGET_REPO}/milvus-nightly:${env.BRANCH_NAME}-latest """ sh 'docker logout' } } } } always { container('main') { dir ('tests/scripts') { script { def release_name=sh(returnStdout: true, script: './get_release_name.sh') sh "./uninstall_milvus.sh --release-name ${release_name}" sh "./ci_logs.sh --log-dir /ci-logs --artifacts-name ${env.ARTIFACTS}/artifacts-${PROJECT_NAME}-${MILVUS_SERVER_TYPE}-${SEMVER}-${env.BUILD_NUMBER}-${MILVUS_CLIENT}-e2e-logs \ --release-name ${release_name}" dir("${env.ARTIFACTS}") { archiveArtifacts artifacts: "artifacts-${PROJECT_NAME}-${MILVUS_SERVER_TYPE}-${SEMVER}-${env.BUILD_NUMBER}-${MILVUS_CLIENT}-e2e-logs.tar.gz", allowEmptyArchive: true } } } } } } } } } }