mirror of
https://github.com/google/nomulus
synced 2025-12-23 06:15:42 +00:00
We've seen this issue happen more often than not recently, where GAE canary deployment is stuck for about 10 min and the failed. The reason is not clear, but delete the canary version prior to a deployment always fixes the issue.
288 lines
13 KiB
YAML
288 lines
13 KiB
YAML
# To manually trigger a build on GCB, run:
|
|
# gcloud builds submit --config cloudbuild-release.yaml --substitutions \
|
|
# TAG_NAME=[TAG],_INTERNAL_REPO_URL=[URL] ..
|
|
#
|
|
# To trigger a build automatically, follow the instructions below and add a trigger:
|
|
# https://cloud.google.com/cloud-build/docs/running-builds/automate-builds
|
|
#
|
|
# This pipeline prepares a release. The pipeline should be run against the Nomulus public repo on
|
|
# GitHub. It builds the builder and base images, and hard codes the sha256 hashes of the resulting
|
|
# images in the merged code base (internal + public), which is tagged and pushed into the release
|
|
# repo. Actual release artifacts are built from the release repo, ensuring reproducibility.
|
|
steps:
|
|
# Check the out internal repo.
|
|
- name: 'gcr.io/cloud-builders/git'
|
|
entrypoint: /bin/bash
|
|
args:
|
|
- -c
|
|
- |
|
|
set -e
|
|
git clone https://gerrit.googlesource.com/gcompute-tools
|
|
sed -i s@/usr/bin/python@/usr/bin/python3@g ./gcompute-tools/git-cookie-authdaemon
|
|
./gcompute-tools/git-cookie-authdaemon
|
|
git clone ${_INTERNAL_REPO_URL} nomulus-internal
|
|
# Tag and push the internal repo.
|
|
- name: 'gcr.io/cloud-builders/git'
|
|
entrypoint: /bin/bash
|
|
args:
|
|
- -c
|
|
- |
|
|
set -e
|
|
git tag ${TAG_NAME}
|
|
git push origin ${TAG_NAME}
|
|
dir: 'nomulus-internal'
|
|
# Merge the repos.
|
|
- name: 'gcr.io/cloud-builders/git'
|
|
entrypoint: /bin/bash
|
|
args:
|
|
- -c
|
|
- |
|
|
set -e
|
|
shopt -s dotglob
|
|
rm -rf .git && rm -rf nomulus-internal/.git
|
|
cp -rf nomulus-internal/* .
|
|
rm -rf nomulus-internal
|
|
# Build the builder image and pull the base images, them upload them to GCR.
|
|
- name: 'gcr.io/cloud-builders/docker'
|
|
entrypoint: /bin/bash
|
|
args:
|
|
- -c
|
|
- |
|
|
set -e
|
|
docker build -t gcr.io/${PROJECT_ID}/builder:${TAG_NAME} .
|
|
docker tag gcr.io/${PROJECT_ID}/builder:${TAG_NAME} gcr.io/${PROJECT_ID}/builder:latest
|
|
docker push gcr.io/${PROJECT_ID}/builder:${TAG_NAME}
|
|
docker push gcr.io/${PROJECT_ID}/builder:latest
|
|
docker pull jetty:12-jdk21
|
|
docker tag jetty:12-jdk21 gcr.io/${PROJECT_ID}/jetty:${TAG_NAME}
|
|
docker tag jetty:12-jdk21 gcr.io/${PROJECT_ID}/jetty:latest
|
|
docker push gcr.io/${PROJECT_ID}/jetty:${TAG_NAME}
|
|
docker push gcr.io/${PROJECT_ID}/jetty:latest
|
|
docker pull eclipse-temurin:21
|
|
docker tag eclipse-temurin:21 gcr.io/${PROJECT_ID}/temurin:${TAG_NAME}
|
|
docker tag eclipse-temurin:21 gcr.io/${PROJECT_ID}/temurin:latest
|
|
docker push gcr.io/${PROJECT_ID}/temurin:${TAG_NAME}
|
|
docker push gcr.io/${PROJECT_ID}/temurin:latest
|
|
dir: 'release/builder/'
|
|
# Do text replacement in the merged repo, hardcoding image digests.
|
|
- name: 'gcr.io/cloud-builders/gcloud'
|
|
entrypoint: /bin/bash
|
|
args:
|
|
- -c
|
|
- |
|
|
set -e
|
|
builder_digest=$(gcloud container images list-tags gcr.io/${PROJECT_ID}/builder \
|
|
--format='get(digest)' --filter='tags = ${TAG_NAME}')
|
|
jetty_digest=$(gcloud container images list-tags gcr.io/${PROJECT_ID}/jetty \
|
|
--format='get(digest)' --filter='tags = ${TAG_NAME}')
|
|
temurin_digest=$(gcloud container images list-tags gcr.io/${PROJECT_ID}/temurin \
|
|
--format='get(digest)' --filter='tags = ${TAG_NAME}')
|
|
sed -i s%eclipse-temurin:21%gcr.io/${PROJECT_ID}/temurin@$temurin_digest%g proxy/Dockerfile
|
|
sed -i s%eclipse-temurin:21%gcr.io/${PROJECT_ID}/temurin@$temurin_digest%g core/Dockerfile
|
|
sed -i s%jetty:12-jdk21%gcr.io/${PROJECT_ID}/jetty@$jetty_digest%g jetty/Dockerfile
|
|
sed -i s/builder:latest/builder@$builder_digest/g release/cloudbuild-proxy.yaml
|
|
sed -i s/builder:latest/builder@$builder_digest/g release/cloudbuild-nomulus.yaml
|
|
sed -i s/builder:latest/builder@$builder_digest/g release/cloudbuild-deploy.yaml
|
|
sed -i s/builder:latest/builder@$builder_digest/g release/cloudbuild-deploy-gke.yaml
|
|
sed -i s/builder:latest/builder@$builder_digest/g release/cloudbuild-sync-and-tag.yaml
|
|
sed -i s/builder:latest/builder@$builder_digest/g release/cloudbuild-schema-deploy.yaml
|
|
sed -i s/builder:latest/builder@$builder_digest/g release/cloudbuild-schema-verify.yaml
|
|
sed -i s/builder:latest/builder@$builder_digest/g release/cloudbuild-delete.yaml
|
|
sed -i s/builder:latest/builder@$builder_digest/g release/cloudbuild-delete-canary.yaml
|
|
sed -i s/builder:latest/builder@$builder_digest/g release/cloudbuild-restart-proxies.yaml
|
|
sed -i s/GCP_PROJECT/${PROJECT_ID}/ proxy/kubernetes/proxy-*.yaml
|
|
sed -i s/'$${TAG_NAME}'/${TAG_NAME}/g release/cloudbuild-sync-and-tag.yaml
|
|
sed -i s/'$${TAG_NAME}'/${TAG_NAME}/g release/cloudbuild-deploy.yaml
|
|
sed -i s/'$${TAG_NAME}'/${TAG_NAME}/g release/cloudbuild-deploy-gke.yaml
|
|
for environment in alpha crash qa sandbox production; do
|
|
sed s/'$${_ENV}'/${environment}/g release/cloudbuild-deploy.yaml \
|
|
> release/cloudbuild-deploy-${environment}.yaml
|
|
sed s/'$${_ENV}'/${environment}/g release/cloudbuild-deploy-gke.yaml \
|
|
> release/cloudbuild-deploy-gke-${environment}.yaml
|
|
sed s/'$${_ENV}'/${environment}/g release/cloudbuild-delete.yaml \
|
|
> release/cloudbuild-delete-${environment}.yaml
|
|
sed s/'$${_ENV}'/${environment}/g release/cloudbuild-delete-canary.yaml \
|
|
> release/cloudbuild-delete-canary-${environment}.yaml
|
|
sed s/'$${_ENV}'/${environment}/g release/cloudbuild-restart-proxies.yaml \
|
|
> release/cloudbuild-restart-proxies-${environment}.yaml
|
|
sed s/'$${_ENV}'/${environment}/g release/cloudbuild-restart-proxies.yaml | \
|
|
sed s/proxy-deployment/proxy-deployment-canary/g \
|
|
> release/cloudbuild-restart-proxies-${environment}-canary.yaml
|
|
done
|
|
# Build and upload the schema_deployer image.
|
|
- name: 'gcr.io/cloud-builders/docker'
|
|
entrypoint: /bin/bash
|
|
args:
|
|
- -c
|
|
- |
|
|
set -e
|
|
docker build -t gcr.io/${PROJECT_ID}/schema_deployer:${TAG_NAME} --build-arg TAG_NAME=${TAG_NAME} --build-arg PROJECT_ID=${PROJECT_ID} .
|
|
docker tag gcr.io/${PROJECT_ID}/schema_deployer:${TAG_NAME} \
|
|
gcr.io/${PROJECT_ID}/schema_deployer:latest
|
|
docker push gcr.io/${PROJECT_ID}/schema_deployer:${TAG_NAME}
|
|
docker push gcr.io/${PROJECT_ID}/schema_deployer:latest
|
|
dir: 'release/schema-deployer/'
|
|
# Build and upload the schema_verifier image.
|
|
- name: 'gcr.io/cloud-builders/docker'
|
|
entrypoint: /bin/bash
|
|
args:
|
|
- -c
|
|
- |
|
|
set -e
|
|
docker build -t gcr.io/${PROJECT_ID}/schema_verifier:${TAG_NAME} --build-arg TAG_NAME=${TAG_NAME} --build-arg PROJECT_ID=${PROJECT_ID} .
|
|
docker tag gcr.io/${PROJECT_ID}/schema_verifier:${TAG_NAME} \
|
|
gcr.io/${PROJECT_ID}/schema_verifier:latest
|
|
docker push gcr.io/${PROJECT_ID}/schema_verifier:${TAG_NAME}
|
|
docker push gcr.io/${PROJECT_ID}/schema_verifier:latest
|
|
dir: 'release/schema-verifier/'
|
|
# Do text replacement in the cloud build YAML files.
|
|
- name: 'gcr.io/cloud-builders/gcloud'
|
|
entrypoint: /bin/bash
|
|
args:
|
|
- -c
|
|
- |
|
|
set -e
|
|
builder_digest=$(gcloud container images list-tags gcr.io/${PROJECT_ID}/builder \
|
|
--format='get(digest)' --filter='tags = ${TAG_NAME}')
|
|
schema_deployer_digest=$(gcloud container images list-tags gcr.io/${PROJECT_ID}/schema_deployer \
|
|
--format='get(digest)' --filter='tags = ${TAG_NAME}')
|
|
schema_verifier_digest=$(gcloud container images list-tags gcr.io/${PROJECT_ID}/schema_verifier \
|
|
--format='get(digest)' --filter='tags = ${TAG_NAME}')
|
|
sed -i s/builder:latest/builder@$builder_digest/g \
|
|
release/cloudbuild-schema-deploy.yaml
|
|
sed -i s/builder:latest/builder@$builder_digest/g \
|
|
release/cloudbuild-schema-verify.yaml
|
|
sed -i s/builder:latest/builder@$builder_digest/g \
|
|
release/cloudbuild-renew-prober-certs.yaml
|
|
sed -i s/builder:latest/builder@$builder_digest/g \
|
|
release/cloudbuild-sync-db-objects.yaml
|
|
sed -i s/schema_deployer:latest/schema_deployer@$schema_deployer_digest/g \
|
|
release/cloudbuild-schema-deploy.yaml
|
|
sed -i s/schema_verifier:latest/schema_verifier@$schema_verifier_digest/g \
|
|
release/cloudbuild-schema-verify.yaml
|
|
sed -i s/'$${TAG_NAME}'/${TAG_NAME}/g release/cloudbuild-schema-deploy.yaml
|
|
for environment in alpha crash qa sandbox production; do
|
|
sed s/'$${_ENV}'/${environment}/g release/cloudbuild-schema-deploy.yaml \
|
|
> release/cloudbuild-schema-deploy-${environment}.yaml
|
|
sed s/'$${_ENV}'/${environment}/g release/cloudbuild-schema-verify.yaml \
|
|
> release/cloudbuild-schema-verify-${environment}.yaml
|
|
done
|
|
# Do text replacement in the k8s manifests.
|
|
- name: 'gcr.io/cloud-builders/gcloud'
|
|
entrypoint: /bin/bash
|
|
args:
|
|
- -c
|
|
- |
|
|
set -e
|
|
for env in alpha crash qa sandbox production
|
|
do
|
|
# This is the project where Nomulus runs, and we need it to correctly bind the k8s service
|
|
# account to the GCP service account.
|
|
if [ ${env} == production ]
|
|
then
|
|
project="domain-registry"
|
|
else
|
|
project="domain-registry-${env}"
|
|
fi
|
|
base_domain=$(grep baseDomain \
|
|
./core/src/main/java/google/registry/config/files/nomulus-config-${env}.yaml | \
|
|
awk '{print $2}')
|
|
for service in frontend backend pubapi console
|
|
do
|
|
# non-canary
|
|
sed s/GCP_PROJECT/${PROJECT_ID}/g ./jetty/kubernetes/nomulus-${service}.yaml | \
|
|
sed s/latest/${TAG_NAME}/g | \
|
|
sed s/ENVIRONMENT/${env}/g | \
|
|
sed s/PROXY_ENV/"${env}"/g | \
|
|
sed s/EPP/"epp"/g > ./jetty/kubernetes/nomulus-${env}-${service}.yaml
|
|
# Proxy '--log' flag does not work on production.
|
|
if [ ${env} == production ]
|
|
then
|
|
sed -i s/--log,//g ./jetty/kubernetes/nomulus-${env}-${service}.yaml
|
|
fi
|
|
if [ ${service} == frontend ]
|
|
then
|
|
sed -i s/${PROJECT_ID}.iam.gserviceaccount.com/${project}.iam.gserviceaccount.com/g \
|
|
./jetty/kubernetes/nomulus-${env}-${service}.yaml
|
|
fi
|
|
# canary
|
|
sed s/GCP_PROJECT/${PROJECT_ID}/g ./jetty/kubernetes/nomulus-${service}.yaml | \
|
|
sed s/latest/${TAG_NAME}/g | \
|
|
sed s/ENVIRONMENT/${env}/g | \
|
|
sed s/PROXY_ENV/"${env}_canary"/g | \
|
|
sed s/EPP/"epp-canary"/g | \
|
|
sed s/${service}/${service}-canary/g \
|
|
> ./jetty/kubernetes/nomulus-${env}-${service}-canary.yaml
|
|
# Proxy '--log' flag does not work on production.
|
|
if [ ${env} == production ]
|
|
then
|
|
sed -i s/--log,//g ./jetty/kubernetes/nomulus-${env}-${service}-canary.yaml
|
|
fi
|
|
if [ ${service} == frontend ]
|
|
then
|
|
sed -i s/${PROJECT_ID}.iam.gserviceaccount.com/${project}.iam.gserviceaccount.com/g \
|
|
./jetty/kubernetes/nomulus-${env}-${service}-canary.yaml
|
|
fi
|
|
# gateway
|
|
sed s/BASE_DOMAIN/${base_domain}/g \
|
|
./jetty/kubernetes/gateway/nomulus-route-${service}.yaml \
|
|
> ./jetty/kubernetes/gateway/nomulus-route-${env}-${service}.yaml
|
|
# GCP backend policy
|
|
sed s/SERVICE/${service}/g ./jetty/kubernetes/gateway/nomulus-backend-policy-${env}.yaml \
|
|
> ./jetty/kubernetes/gateway/nomulus-backend-policy-${env}-${service}.yaml
|
|
sed s/SERVICE/${service}-canary/g ./jetty/kubernetes/gateway/nomulus-backend-policy-${env}.yaml \
|
|
> ./jetty/kubernetes/gateway/nomulus-backend-policy-${env}-${service}-canary.yaml
|
|
done
|
|
done
|
|
# Upload the Gradle binary to GCS if it does not exist and point URL in Gradle wrapper to it.
|
|
- name: 'gcr.io/cloud-builders/gcloud'
|
|
entrypoint: /bin/bash
|
|
args:
|
|
- -c
|
|
- |
|
|
set -e
|
|
gradle_url=$(grep distributionUrl gradle/wrapper/gradle-wrapper.properties \
|
|
| awk -F = '{print $2}' | sed 's/\\//g')
|
|
gradle_bin=$(basename $gradle_url)
|
|
gcs_loc="domain-registry-maven-repository/gradle"
|
|
curl -O -L ${gradle_url}
|
|
if gcloud storage objects describe gs://${gcs_loc}/${gradle_bin}
|
|
then
|
|
local_md5=$(md5sum ${gradle_bin} | awk '{print $1}')
|
|
remote_md5=$(gcloud storage hash -h gs://${gcs_loc}/${gradle_bin} | grep md5 | awk '{print $3}')
|
|
if [[ ${local_md5} != ${remote_md5} ]]
|
|
then
|
|
echo "${gradle_bin} HAS CHANGED ON GRADLE WEBSITE, USING THE BINARY ON GCS."
|
|
fi
|
|
else
|
|
gcloud storage cp $gradle_bin gs://${gcs_loc}/
|
|
gcloud storage objects update --predefined-acl=publicRead gs://${gcs_loc}/${gradle_bin}
|
|
fi
|
|
rm ${gradle_bin}
|
|
sed -i s%services.gradle.org/distributions%storage.googleapis.com/${gcs_loc}% \
|
|
gradle/wrapper/gradle-wrapper.properties
|
|
# Check out the release repo.
|
|
- name: 'gcr.io/cloud-builders/gcloud'
|
|
args: ['source', 'repos', 'clone', 'nomulus-release']
|
|
# Tag and check in the release repo.
|
|
- name: 'gcr.io/cloud-builders/git'
|
|
entrypoint: /bin/bash
|
|
args:
|
|
- -c
|
|
- |
|
|
set -e
|
|
rm -rf gcompute-tools
|
|
cp -rf nomulus-release/.git .
|
|
rm -rf nomulus-release
|
|
git config --global user.name "Cloud Build"
|
|
git config --global user.email \
|
|
$(gcloud auth list --format='get(account)' --filter=active)
|
|
git add .
|
|
git commit -m "Release commit for tag ${TAG_NAME}"
|
|
git push -o nokeycheck origin master
|
|
git tag ${TAG_NAME}
|
|
git push -o nokeycheck origin ${TAG_NAME}
|
|
timeout: 3600s
|
|
options:
|
|
machineType: 'E2_HIGHCPU_32'
|