-
Notifications
You must be signed in to change notification settings - Fork 0
/
Jenkinsfile-ECR
151 lines (141 loc) · 5.13 KB
/
Jenkinsfile-ECR
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
// jenkins shared library https://github.com/vikash-kumar01/jenkins_shared_lib.git
@Library('my_lib') _ // whatever the library name that we are configuring in jenkins global pipeline libraries
pipeline {
agent any
parameters {
choice(name: 'action', choices: 'create\ndelete', description: 'Choose Create/Destroy')
string(name: 'aws_accountId', description: 'AWS accountId', defaultValue: 'web-app')
string(name: 'region', description: 'region of the ECR', defaultValue: 'us-east-1')
string(name: 'repoName', description: 'RepoName of the hub', defaultValue: 'ashwiin11')
string(name: 'cluster_name', description: 'name of the eks cluster', defaultValue: 'demo-cluster')
}
environment{
ACCESS_KEY = credentials('AWS_ACCESS_KEY')
SECRET_KEY = credentials('AWS_SECRET_KEY')
}
stages {
stage('git checkout') {
when { expression { params.action == 'create' } }
steps {
sh 'echo passed'
}
}
stage('Unit test using shared lib') {
when { expression { params.action == 'create' } }
steps {
script{
mvnTest()
}
}
}
stage('Integration test using shared lib') {
when { expression { params.action == 'create' } }
steps {
script{
mvnIntegrationTest()
}
}
}
stage('Static code analysis') {
when { expression { params.action == 'create' } }
steps {
script{
def credentials = 'sonarqube_api'
QualityGateStatus(credentials)
}
}
}
stage('Quality gate check') {
when { expression { params.action == 'create' } }
steps {
script{
def credentials = 'sonarqube_api'
QualityGateStatus(credentials)
}
}
}
stage('Maven build') {
when { expression { params.action == 'create' } }
steps {
script{
mvnBuild()
}
}
}
stage('Docker build using ECR') {
when { expression { params.action == 'create' } }
steps {
dockerBuild("${params.aws_accountId}", "${params.region}", "${params.repoName}")
}
}
stage('Docker image scan'){
when { expression { params.action == 'create' } }
steps{
script {
dockerImageScan("${params.aws_accountId}", "${params.region}", "${params.repoName}")
}
}
}
stage('Docker image push'){
when { expression { params.action == 'create' } }
steps{
script {
dockerImagePush("${params.aws_accountId}", "${params.region}", "${params.repoName}")
}
}
}
stage('Docker image cleanup'){
when { expression { params.action == 'create' } }
steps{
script {
dockerImageCleanup("${params.aws_accountId}", "${params.region}", "${params.repoName}")
}
}
}
stage('create eks cluster : terraform'){
when { expression { params.action == 'create' } }
steps{
script {
dir('eks_module'){
sh """
terraform init
terraform plan -var 'access_key=$ACCESS_KEY' -var 'secret_key=$SECRET_KEY' -var 'region=${params.region}' --var-file=./config/terrafo
terraform apply -var 'access_key=$ACCESS_KEY' -var 'secret_key=$SECRET_KEY' -var 'region=${params.region}' --var-file=./config/terraform.tfvars --auto-approve
"""
}
}
}
}
stage('Configure eks '){
steps{
script{
sh """
aws configure set aws_access_key_id "$ACCESS_KEY"
aws configure set aws_secret_access_key "$SECRET_KEY"
aws configure set region "${params.region}"
aws eks update-kubeconfig --name ${params.cluster_name} --region ${params.region}
"""
}
}
}
stage('Deployment stage'){
steps{
script{
def apply = false
try{
input message: 'please confirm to deploy on eks', ok: 'Ready to apply the config ?'
apply = true
}catch(err){
apply= false
currentBuild.result = 'UNSTABLE'
}
if(apply){
sh """
kubectl apply -f
"""
}
}
}
}
}
}