From ad87414f3cdd0d58b7f61efa5fba70ff4a0959a2 Mon Sep 17 00:00:00 2001 From: liusheng Date: Thu, 8 Feb 2018 16:06:49 +0800 Subject: [PATCH] Add job definition for opentelekomcloud provider (#36) * Add job definition for opentelekomcloud provider For #34 * Add access key for telekom job * fix telekom job and add secret key * use unified opentelekomcloud word --- .../run.yaml | 51 ++++++++++ zuul.d/jobs.yaml | 10 ++ zuul.d/secrets.yaml | 94 +++++++++++++++++++ 3 files changed, 155 insertions(+) create mode 100644 playbooks/terraform-provider-opentelekomcloud-acceptance-test-opentelekomcloud/run.yaml diff --git a/playbooks/terraform-provider-opentelekomcloud-acceptance-test-opentelekomcloud/run.yaml b/playbooks/terraform-provider-opentelekomcloud-acceptance-test-opentelekomcloud/run.yaml new file mode 100644 index 0000000000000..4a9b482645f6c --- /dev/null +++ b/playbooks/terraform-provider-opentelekomcloud-acceptance-test-opentelekomcloud/run.yaml @@ -0,0 +1,51 @@ +- hosts: all + become: yes + tasks: + - shell: + cmd: | + apt-get install python-pip -y + pip install -U python-openstackclient + # NOTE: the following commands may include sensitive information please do not print in job logs + export OS_PASSWORD="`echo {{ opentelekomcloud_credentials.password }}`" + export OS_AUTH_TYPE="`echo {{ opentelekomcloud_credentials.auth_type }}`" + export OS_AUTH_URL="`echo {{ opentelekomcloud_credentials.auth_url }}`" + export OS_IDENTITY_API_VERSION="`echo {{ opentelekomcloud_credentials.identity_api_version }}`" + export OS_DOMAIN_NAME="`echo {{ opentelekomcloud_credentials.domain_name }}`" + export OS_PROJECT_NAME="`echo {{ opentelekomcloud_credentials.project_name}}`" + export OS_REGION_NAME="`echo {{ opentelekomcloud_credentials.region_name}}`" + export OS_TENANT_NAME="`echo {{ opentelekomcloud_credentials.project_name }}`" + export OS_USERNAME="`echo {{ opentelekomcloud_credentials.user_name }}`" + export OS_ACCESS_KEY="`echo {{ opentelekomcloud_credentials.access_key }}`" + export OS_SECRET_KEY="`echo {{ opentelekomcloud_credentials.secret_key }}`" + + set -o pipefail + set -x + export OS_SHARE_NETWORK_ID="foobar" + export OS_FLAVOR_ID_RESIZE=2 + export OS_FLAVOR_ID=1 + export OS_POOL_NAME="admin_external_net" + # export OS_EXTGW_ID="$(openstack network show $OS_POOL_NAME -f value -c id)" + export OS_EXTGW_ID=`openstack network list -f value |grep admin_external_net | awk -F ' ' '{print $1}'` + export OS_IMAGE_NAME="cirros-0.3.5-x86_64-disk" + export OS_IMAGE_ID="$(openstack image show $OS_IMAGE_NAME -f value -c id)" + if [ -z "$OS_IMAGE_ID" ]; then + curl -O http://download.cirros-cloud.net/0.3.5/cirros-0.3.5-x86_64-disk.img + export OS_IMAGE_ID="$(openstack image create --file ./cirros-0.3.5-x86_64-disk.img --min-disk 1 --container-format bare --disk-format raw cirros-0.3.5-x86_64-disk -f value -c id)" + rm cirros-0.3.5-x86_64-disk.img + fi + _NET_PREFIX="terraform-provider-opentelekomcloud" + export OS_NETWORK_NAME="$_NET_PREFIX-net" + export OS_NETWORK_ID="$(openstack network show $OS_NETWORK_NAME -f value -c id)" + if [ -z "$OS_NETWORK_ID" ]; then + export OS_NETWORK_ID="$(openstack network create $OS_NETWORK_NAME -f value -c id)" + openstack subnet create --network $OS_NETWORK_ID --subnet-range 10.0.20.0/24 $_NET_PREFIX-subnet + fi + + export OS_SWIFT_ENVIRONMENT=1 + # Run except the DNS/FW/LB test 100 testcases at a time + testcases=`go test github.com/gator1/terraform-provider-opentelekomcloud/opentelekomcloud/ -v -list 'Acc'` + testcases=`echo "$testcases" | sed '$d' | grep -v -e FW -e LB` + # echo "$testcases" | xargs -t -n100 sh -c 'TF_ACC=1 go test github.com/gator1/terraform-provider-opentelekomcloud/opentelekomcloud/ -v -timeout 120m -run $(echo "$@" | tr " " "|")' argv0 2>&1 | tee $TEST_RESULTS_TXT + executable: /bin/bash + chdir: '{{ zuul.project.src_dir }}' + environment: '{{ golang_env }}' diff --git a/zuul.d/jobs.yaml b/zuul.d/jobs.yaml index 707e519642504..482b092751f77 100644 --- a/zuul.d/jobs.yaml +++ b/zuul.d/jobs.yaml @@ -190,3 +190,13 @@ run: playbooks/terraform-provider-flexibleengine-acceptance-test-orange/run.yaml secrets: - orange_credentials + +# terraform-provider-opentelekomcloud acceptance tests with Open Telekom cloud +- job: + name: terraform-provider-opentelekomcloud-acceptance-test-opentelekomcloud + parent: golang-test + description: | + Run acceptance tests of terraform-provider-opentelekomcloud repo against open telekom cloud + run: playbooks/terraform-provider-opentelekomcloud-acceptance-test-opentelekomcloud/run.yaml + secrets: + - opentelekomcloud_credentials diff --git a/zuul.d/secrets.yaml b/zuul.d/secrets.yaml index 8760c5b8c44b5..c32d2ad58610b 100644 --- a/zuul.d/secrets.yaml +++ b/zuul.d/secrets.yaml @@ -178,3 +178,97 @@ wrbA5CI8uuocJ5MfvBzodzzSfsV0FWHL5iBZx41osaURRZL+msj01WbRSWYS+GtyqMW2Q ZE9YnBJH0U/0FchGt4P1X1UXgTlGEOxa2FRYjHyfgyK02vuhtKE/4biruqHveEPnw7Rpy ubs4p1hw7nTIgFtNCAt8AhxT1FK8lgmgyyc14qiJJCZ02S9U0b1x10zjw5lwpo= + +- secret: + name: opentelekomcloud_credentials + data: + auth_type: password + identity_api_version: "3" + auth_url: !encrypted/pkcs1-oaep + - WU4CYf11kMKgmeE8qwTQ1M18P4MFwjeePcU+BrrI9SBqh5lno3t5MHRWKM4f7mZnXftrE + 2FE+jy9++oVJMGjhh57InvMO9nPRT1Wr5OBi5c6SLpqQiE5auOJahQgN0khzhdw7b70ii + P/OZSQcKQeBqmoSMNhpkBhdOgL1njvrDu9HeoYdv/fDJQQFmqrITi5Z2ezBqZKCbdjwJd + AXRdwtpwEzLtDqTjsLXAPGd82HONa+N+udo8KZMG40VQZWJdQlPIL2oIFOJIo4FuCwELA + 5TzW8/KSSFzvq9xLQyMFJOxgJCfnYMwyyH942wuDGoVeD87Al8SOHixayuXSMp4PAiWti + j/xezYCc/lDts8/mhQTgHJmnMVKzgcWZViA9zAx7upsVzInOhQHbEotIczLOzjq2iuxdp + TrC2AUfDzhId/GiG8MiBuCdfeoj/TBB0yrZCMI5VZ+BLE5LgwIhF/66FR8z2KpfOeGRRE + KdEaBComzTDeKMj5+iF+s6AMNvFY1j6fQb5mT8reXQaK0TRH/258akcEPcBpeVkgH7ZyZ + ++uLal8eVKYtPxuh2MThVFrCalPBn38/4+NDB9wBYJ/0KTvYx+B5wNSJV9FLW9e1S5dwT + NTwyrbRosAKPo4fZBgapdaTV2HoKU9JsFziTHfFZyfUnMImgKO2F3nSP2iZzfI= + password: !encrypted/pkcs1-oaep + - U1SdhWnkib9K6uNj3AjZTUtpqa4/CIODJM6E7plUDGpY1OtJzYCYK1YLk1TfO6xz16ihs + LogqY8ayrvd8kSpHz4Erv/aTqcjvZ/J6jDbhA7WbABbyQO4X7go6V9nJ6MQu/oEGn40/I + Cck3EUOY+D3DtxzGSarLeP24//Sei0xnLW4ABpgefiONSP4dLaAOO2nWtQ01QShM5GgtV + X9BjS0tkgZCnbCtPj26w909ED7t1ZvByuQ/Wu0lEUtG4oOKu0VSI6vww6yqVX0qwMroph + yXiN3urGqZkEWiG1+w1ViZMN4gg/r+3Ncg1fKIV0nnube4/mNbgNt/mdtCtlOlRUp/KML + Xbt0JW4Dl0IjIgYIkoXvPKyK3XtvEnifj5YR8RZonTyCrEzmo2L4qBktTuLATEZ+P/qXU + bbmGeSruPDia2U3S8MFDtT76vmrczlgUuRCusAecc88YY+ISlOu7jN8LcPF3jITCpcfmu + dkyP+r9GcZT3/HvkJT+Ifqk7VcXoLPuoDDNfxeiA6cBPYi9ecMssnvLYQuUd23mDYJ8ph + H7sULv9S2n0xu6u9bmsoIouH2n/WIAUDyPA1WkdUhL+l9XiaZnTqVcVK+8HAz7WGjXpnK + L09OKol7XqKDS1iwR5miiBbF8UqRgXUOz8ocQYqPavf2KXHHkOBWXmkU5qNgNg= + domain_name: !encrypted/pkcs1-oaep + - KjB/2qMa3looFzto42u6Gi4gEqNH99fzweazyvM1CeJPCjojwO4oDv5GQyPC2H4MzK6mM + ymlKbUSu3JEQ4OOA5KKqiC1OYf52R3bX1ebhkWaaNU8w7nraBviNNrz3h5JoDc7EQnp3y + tjTJOtuMoKDqGEu+f7yj1bYYmHrBjhhuoCfQVpOR1VUXi/HMzGpsoUmbtBwkjtM53IGre + 3+mdz2DAIG+68rt/BH14wg5wP6D7PadDqcOxqCMgOVSOAFEPr/WkoZkwqnWyhj0czGj/H + iEZ6TPbf9NCNp1KhJDBn+RCjpnrt1SQSh77eV7uTH/23HjqNAgF/ymL3qmPVMW+Eu8p9L + /VmpXw0eHXC1jnZIGPEW05wZI/4Br8OBMhcHoeES3GCprWXY8lx6z6+k0j+Yb/Q4iSfJ4 + b8pbKtuMYl6z6PQ1w334gLQxGlkCZMsOmpuNPkEU0g00M7tlTqXxy1GN8Yx8sr8pTDoke + wTVKLBGJydK5pls8pbtfq6lgmPuRJQ91EE9yiZv/3b7GFIXEOnJvUGDHkLam4jGFDQaXs + UE8pd8461DIpSrkWVsqf5DCrbkfNQaBg89uRjtYyZ0wCWKGuahyotLorAovkurkKxo87C + hv+5Gwcq7jYszhRCvJvNvOUb6mx7OaWXaxdNX8OGOsvr5tB7llrXgGTKiUQlus= + project_name: !encrypted/pkcs1-oaep + - SR2EfKmW7JLeo3gJj1/EahAO7K23wEoWl1yUdjt0qn3cNf+3HxWZyB7WtMY9eVFOeHHp6 + t0T/MM5mMrPIzHhuRHfK1vshY0Ah4s6DiNxVnOXbnl88RPyp/kxgyRdTgqVZagxS8hKjz + Kay5YYZ1KoPZzRkxct9I/1ffQcVryXTtACYBSbRuOP/q0GXy+tTfrJa0bpuzG0tiiz6vK + CTm5aj6ncKMdiApy5ReDwblQPdqZVuPzI+YSG9W59pjn6YFKaf5wghQuh618GfFeq4bFK + 5g9OCYdBIUBVPjsvNkXf2oSthFwmsa0SX0N4LHHfoiDJEStnEcifGzr7bAJV1SbyD0rb5 + 2UxR14f6fD+ZZDQwLBfx/eJ66IjMnHj6i614HYw2kNMy6j73Xt0IPSTRpGG7g6BrFDnYu + WOuQ3L6H2LZAuMUAoZcQNfe48rPYkAsjuTpB7k0qf0/Dya4PWJnNIjBFkc/2iHTZmFfco + gI4EdE/lfn3Z6LpGcESEdvfUF1w5JMhIplda1EeBroTEzZnCuohtzRlKq5DhXlOfXXgDb + TFaJcDHjoLdqkZVok2K46W4VYXBh2UK+3XTfHUauNme8GBjcsxZkD8OBjNboqZaN0N+Gz + iZx7JZ1e7rdjdR4gLrNSE1guC9u5JMe3wkPMGu/ID9Ya1ctSOpTwO/FRPxlQlk= + region_name: !encrypted/pkcs1-oaep + - RUhxd7rY36HPQuXfFFabxeYFjselhhAOKV8mRtxHYQVraWnqcBUqcLRgVAIwRjoPuOs9h + /yeJx/KBJaaGm5s9uAhqpKm/Sf1aNveutkgqqQHxwTxulBLSivYEA9z5piL7qbhQgRwzH + 7Av6fRlEc/C56ABZth7JlWpiyrRQKX7omqCaeeNTQGwAK3okBKZFKIyVpiIg5bQFG3Rtl + ScMyFIzSLaKNzp97m250kJeZqwXM9LxtabsZ8dGnOQjWB/nT8RxTxCgDh7en4/2SvYJvJ + soXJvUNuqXG0t84ONOXZpQ09B06Smx8ao7HcnJ+Q/VHaT1LLPoBQGICQeiPPhO8EkG69G + icj8HahsZU3wwJW34rtv8hgCzj7HK/9lvwDXulIpPvT4QxY3Gcp228g+cjwssklxB0pJz + 7tEnmRwBkYD14InLXRdGTiJ/l1/X9xj3MGpWYZc/+vAmBLgD9zb+O8vprTlcEoqn1IsVX + MAgpS6rAZ8D7fLzUzKCT2PjxSOdrqwFzoPWbozFubN4PMr1q0fA0FkKyccmUMNt/LuOmY + rgnz4UCSfPZTzoGl5upcuZG2e+rFf7wbnkKwknxS7q3XLZir86QRqJIEOocIMPkcEbEeC + uCCYDBnvgIgxjbZIzndc0JydzxT8UHhXu3vDdf0x7ET70lr2EqJ+k62p/Wnvbo= + user_name: !encrypted/pkcs1-oaep + - lH/9uzskKttSs6ImEyJ4u61e/JvV+IIjshOdt5sciU1SfwnZvGQt90liYctHybs+39Myx + dafPotvPfFy4+vSG8Iez0gGUo74bSKjHLsede1vHKf1VeFhoax1ovl13G/R6UlHXwg2lD + TlOMpVVCpTnHJ01ng1q9b+YPIdg0shTRjW+SzE7YlaHrGQMzh6wRHmxF1KzthNGIAUFdy + ii2pCIQeQvM0G3EBTef+512CXsf+NKwbrBER7xd+m7U1gS4XYX67RlmG0EbDz0walCTJu + I98VCclfom6W8pAkP9vMmXkl9+FUy3WV0yWMpHIvIsUdvqa3UKQGXxfVJpESDbzYQpnpH + IW/YE0Azt52DZXG3NVF4uFfS5ENmFNt2UFp9fZdBCcvdhVFeg3k+AxJfDYoAsodo/ZDby + qonEMBq3eQPR33NL8s4knY0pt6WWA3hAH5OmVgdXGMCxJaKH+jOm6hDtgvVG+TVeDPo88 + ZQPWJPXIevd8Y78Fiu1A2BVUNZM4n8KpNytCQEbRFZwVtcTM8Hqh23ytSlB1pw4GOoJ1c + 5ioW6N0L8CBjKSeFbTvmPQsVdxFTnRFogeVq79BI9BPVoDqTm0Dqxej76nI2Onnb9ZVYT + RptSb+hiVbeU+VSMPXYRU5bPnIrsmorHoIpZt9LXqA19Urn7gy8WnYi2meeKTs= + access_key: !encrypted/pkcs1-oaep + - kKP+rrf+C+IP6MEu+RnBYtf0tU84CPPR+KkxiFa45oOLvK5q+GbyTS0DZcXrC9dy39D4c + AjfKWyRas/lZFAYvohVLywmwd8ZfRJJDb499tzO/pQ2SLI7q5d6EXsgviXMCenVF2np5q + ze36JeD3mZA5xnZyD2U4/EdMa8HtB4iCNleZp9QzvOlNLifTKMyCsghgwy4dLMJH2KS6e + cz9gsTcO6vpFY3lchsHLALSVJWAl9uME59Va8ddy8CJSyJX0z50URltfl1kaAH/skFS2y + Fq8l4X5YfaLLmg4MFKlS89nrqncy3nWCrD/yLyQ5Jx6fJ+FipcHU89x5Ut/Wy7TPims6k + GvGsD1He77y8nDlL5t32SkTIlqWi3m+0REZnmqFC8hYJ3eOuf/dWE7HrCtKPAy4+J0kR4 + NL9F07nSzPBZh5PJ2dGiDs+r3n/0Rn++siINIYworaXJs0w2yRXXcZ3hsmlpDnErQVjJO + mVBQSM4yVQg5P6tQOW9RhR0wsL2DWW9EYkNMpyJ3FbIXVX76JrIFr530A+YrQJBuViUEt + uh+xp79pGHrs00sz4VP6rB9AtPevUpJgEgSn9Q+LXJKBp47b1oQzNUVhnKuPGopPW6rCD + HD6R//Hf6BPvd6QYNIQ0y2Esig5Y3wFe3CkEQTBQF+V5qBMyY3CCQi6/eZmlas= + secret_key: !encrypted/pkcs1-oaep + - cnLJ/B4I1HA8KrBcMtciPBqnS87FMkCpo7uW6/J4ixlN7al6jbhFC1V03nIiPGNYVHlW/ + KghdULGn0qFVgt1DtqnjEgeerSC7chZs7daHhf2EcopbdzP/POYw5TiF8vSh6myntq2ra + h8O21h5jjoWi46OVxnSOfl6SxF3v5/uliuiQVwQvxWOCryAu8AK4cflEQUUgL084DHq4G + TIWmTIGM6PIUpQ9SQtp1xmBhNReiWFv2LVTu0f3iO1A0X+vJ7Qp2Cl2brAP0El5hlrwAN + BzGl2z/Nj++TWiFAJw2FDdOpJ/vOiR1Eprmr6izw2TxW0thIZ5RkaAYxThIVMgzRp0+NN + Uscd5FaZR1kIk2Fgy5CE/96CJ2WazJk0DhXzSw92a7yr59g4Uf1SNT9vliwar3sxxl7nk + jcITFoLb/LU78U0AW81eI+Z77Nihkhj2zEgCcDoQaqPpDWqFJzPy48l0y293Cc+FizlXZ + 1eAK6me9p/N3Dc2Zm2SVeUghgKf7Isx6FoReM2CaaESRy5rr3zUTW7U5oSvD18frQ4JzZ + iCspQ2lATLbaNt/Tqc+zbUBBgaGMzVTHqNGvKIKM71n3z4iOhc4g2yFJC0OZrSTNB8XPI + 9ADKvexYHPvHAGtN2OwfvY9feJ+pBwTyOLqoBq5RTy27nhIHMIIrSxr3UO/EN4=