- Adding firewall entries for Jenkins workers
release-*
machines- macOS
- AIX
- AIX 7.1
- AIX 7.2 Install
- Windows (Azure/Rackspace)
- jenkins-workspace
- benchmark
- Docker hosts
- SmartOS
- IBM i
- z/OS
Workers must be added to the firewall config before they will be able to connect to the Jenkins master.
You must be part of the infra group and have setup the ssh keys and config file beforehand.
To add an entry do the following:
- ssh to the ci master:
ssh ci
- save the current config to a temporary file:
iptables-save >foo
- edit the temporary file with your favorite editor. Use one of
the existing lines as a template and add a new entry at the end
of the list of hosts just before the second
COMMIT
line near the end of the file. - restore the config from the temporary file:
iptables-restore foo
- remove the temporary file:
rm foo
- run
iptables-save > /etc/iptables/rules.v4
to ensure the changes persist across reboots
Release machines must be able to upload release artifacts to the nodejs.org web server. The release-builder Ansible role will write the necessary key and ssh config onto the release machine, automating the previously manual steps.
Manual steps
Once setup, they must have ~iojs/.ssh
cloned from another machine, so they
have the ssh setup and keys required to upload release artifacts to the
nodejs.org web server. The result will be 2 files, an id_rsa
containing
a private key, and a config
containing:
Host node-www
HostName direct.nodejs.org
User staging
IdentityFile ~/.ssh/id_rsa
Both the config
file and id_rsa
should be owned and only readable by the
user: chmod 700 .ssh && chmod 600 .ssh/*
.
Its necessary to accept the known_hosts
keys interactively on first ssh or
the release builds will fail. After setting up .ssh, do something like this:
ssh node-www date
// ... accept the host keys
In the case of Docker container release hosts, the SSH configuration above works
differently since the ~iojs
home directories are elsewhere on the host
machine. The Docker containers are started with /home/iojs
inside the
container mounted from /home/iojs/name-of-container/
on the host machine.
Therefore, the above SSH configuration should take place in
/home/iojs/name-of-container/.ssh/
, with permissions set appropriately.
known_hosts
can be primed and SSH tested from within the running containers:
- Find the running container ID using
docker ps
- Enter the container using
docker exec <containerid> -ti bash
- Run
ssh node-www date
(as above)
Previous notes: #1393
Xcode Command-line tools are not enough to perform a full notarization cycle, full Xcode must be installed manually.
As root:
- Download Xcode: https://developer.apple.com/download/more/ - find non-beta version, open Developer Tools in browser, Networking tab, start download (then cancel), in Networking tab "Copy as cURL" (available in Chrome & FF)
- On OSX 11 we currently install 13.2.1
- Download onto release machine using the copied curl command (may need
-o xcode.xip
appended to curl command) to/tmp
- If you have trouble on the command line, pasting into a shell script file can make pasting/editing to add -o xcode.xip easier
- Extract:
xip --expand xcode.xip
- This takes a long time since xcode.xip is 7-10G in size depending on version
- If you run out of space you can delete
/Users/build/workspace/*
to free up some space. Also make sure that if you are updating Xcode that you have removed any existing version of /Applications/Xcode.app. You may also need to clear the ccache by runningsudo -s su - iojs
followed byccache --clear
- Move
Xcode.app
directory to/Applications
by runningmv Xcode.app /Applications/Xcode.app
sudo xcode-select --switch /Applications/Xcode.app
sudo xcodebuild -license
- accept licensegit
- check that git is working (confirming license has been accepted)
Create a keychain profile (NODE_RELEASE_PROFILE
) for the release machine:
sudo xcrun notarytool store-credentials NODE_RELEASE_PROFILE \
--apple-id XXXX \
--team-id XXXX \
--password XXXX \
--keychain /Library/Keychains/System.keychain
Note: XXXX
values are found in secrets/build/release/apple.md
Note2: (security unlock-keychain -u /Library/Keychains/System.keychain
may be required prior to running this command).
The expected output is:
This process stores your credentials securely in the Keychain. You reference these credentials later using a profile name.
Validating your credentials...
Success. Credentials validated.
Credentials saved to Keychain.
To use them, specify `--keychain-profile "NODE_RELEASE_PROFILE" --keychain /Library/Keychains/System.keychain`
- Go to the
build/release
folder in the secrets repo. - Extract from secrets/build/release:
dotgpg cat Apple\ Developer\ ID\ Node.js\ Foundation.p12.base64 | base64 -D > /tmp/Apple\ Developer\ ID\ Node.js\ Foundation.p12
- Transfer to release machine (scp to /tmp)
sudo security import /tmp/Apple\ Developer\ ID\ Node.js\ Foundation.p12 -k /Library/Keychains/System.keychain -T /usr/bin/codesign -T /usr/bin/productsign -P 'XXXX'
(where XXXX is found in secrets/build/release/apple.md) (security unlock-keychain -u /Library/Keychains/System.keychain
may be required prior to running this command).
security -i unlock-keychain
Enter the password for the machine located in secretssecurity find-certificate -c "Developer ID Application" -p > /tmp/app.cert
outputs the PEM format of the cert so we can properly inspect itsecurity find-certificate -c "Developer ID Installer" -p > /tmp/installer.cert
openssl x509 -inform PEM -text -in /tmp/app.cert | less
openssl x509 -inform PEM -text -in /tmp/installer.cert | less
security find-identity -p codesigning -v
The steps 4 and 5 will show the details of the certificates allowing to see expiry dates.
Example:
Not Before: Jan 22 03:40:05 2020 GMT
Not After : Jan 22 03:40:05 2025 GMT
The step 6 will show the list of certificates available on the machine.
Example:
1) XXXXXXXXXXX "Developer ID Application: Node.js Foundation (XXXXXXX)"
1 valid identities found
- Update Sudoers file:
this requires NOPASSWD
to be added to the sudoers file to enable elevation
sudo visudo
and change:
%admin ALL = (ALL) ALL
to
%admin ALL = (ALL) NOPASSWD:ALL
- Allow ssh access
sudo systemsetup -setremotelogin on
Our AIX Ansible bootstrap role attempts to resize filesystems to be large enough to install packages from the AIX Toolbox and to hold workspaces for CI builds. The server instances will need to have enough disk space available to fit the requested disk space. On IBM Cloud, for example, this involves having a second disk added in addition to the default one (e.g. 20Gb standard disk and an additional 100Gb one).
If not enough space is availble the Jenkins worker create playbook will fail
with an allocp
error, e.g.
TASK [bootstrap : Set size of /tmp to 1G] ******************************************************************************************************************
task path: /home/rlau/sandbox/github/build/ansible/roles/bootstrap/tasks/partials/aix.yml:25
redirecting (type: modules) ansible.builtin.aix_filesystem to community.general.aix_filesystem
fatal: [test-ibm-aix73-ppc64_be-1]: FAILED! => {"changed": false, "msg": "Failed to run chfs. Error message: 0516-404 allocp: This system cannot fulfill the allocation request.\n\tThere are not enough free partitions or not enough physical volumes \n\tto keep strictness and satisfy allocation requests. The command\n\tshould be retried with different allocation characteristics.\n"}
On AIX disks are organised into physical volumes (the disks) and logical volumes. Disks can be added to a volume group (where AIX will then manage the storage for the group). Useful commands are:
lspv
this will list the physical volumes attached to the server, e.g.
hdisk0 00c8d470fdbc3b5e rootvg active
hdisk1 00f6db0a6c7aece5 rootvg active
shows two disks attached to one volume group named rootvg
. If this shows one
of the disks as None
this indicates that the disk has not been included in
the volume group.
hdisk0 00fa00d6b552f41b rootvg active
hdisk1 none None
lspv <disk name>
will show further information about disks.
# lspv hdisk0
PHYSICAL VOLUME: hdisk0 VOLUME GROUP: rootvg
PV IDENTIFIER: 00fa00d6b552f41b VG IDENTIFIER 00fa00d600004c000000017d43623707
PV STATE: active
STALE PARTITIONS: 0 ALLOCATABLE: yes
PP SIZE: 32 megabyte(s) LOGICAL VOLUMES: 13
TOTAL PPs: 639 (20448 megabytes) VG DESCRIPTORS: 2
FREE PPs: 4 (128 megabytes) HOT SPARE: no
USED PPs: 635 (20320 megabytes) MAX REQUEST: 512 kilobytes
FREE DISTRIBUTION: 00..00..00..00..04
USED DISTRIBUTION: 128..128..127..128..124
MIRROR POOL: None
# lspv hdisk1
0516-1396 : The physical volume hdisk1, was not found in the
system database.
#
To add a disk to a volume group:
extendvg rootvg hdisk1
This may fail:
0516-1254 extendvg: Changing the PVID in the ODM.
0516-1162 extendvg: The Physical Partition Size of 32 requires the creation of
3200 partitions for hdisk1. The limitation for volume group rootvg is
1016 physical partitions per physical volume. Use chvg command with -t
option to attempt to change the maximum Physical Partitions per Physical
volume for this volume group.
0516-792 extendvg: Unable to extend volume group.
Information about a volume group can be obtained via lsvg
,
e.g.
# lsvg rootvg
VOLUME GROUP: rootvg VG IDENTIFIER: 00fa00d600004c000000017d43623707
VG STATE: active PP SIZE: 32 megabyte(s)
VG PERMISSION: read/write TOTAL PPs: 639 (20448 megabytes)
MAX LVs: 256 FREE PPs: 4 (128 megabytes)
LVs: 13 USED PPs: 635 (20320 megabytes)
OPEN LVs: 12 QUORUM: 2 (Enabled)
TOTAL PVs: 1 VG DESCRIPTORS: 2
STALE PVs: 0 STALE PPs: 0
ACTIVE PVs: 1 AUTO ON: yes
MAX PPs per VG: 32512
MAX PPs per PV: 1016 MAX PVs: 32
LTG size (Dynamic): 512 kilobyte(s) AUTO SYNC: no
HOT SPARE: no BB POLICY: relocatable
PV RESTRICTION: none INFINITE RETRY: no
DISK BLOCK SIZE: 512 CRITICAL VG: no
FS SYNC OPTION: no CRITICAL PVs: no
ENCRYPTION: yes
#
where the earlier error is referring to MAX PPs per PV
. This can be changed,
as indicated by the error message, with chvg -t
.
Note that -t
takes a scaling factor which is multiplied by 1016. For our
100Gb disks we use a factor of 16 which then allows the
extendvg
command to succeed:
# chvg -t 16 rootvg
0516-1164 chvg: Volume group rootvg changed. With given characteristics rootvg
can include up to 2 physical volumes with 16256 physical partitions each.
# extendvg rootvg hdisk1
#
After extending the rootvg
volume group you may still run into an error with
the playbook:
TASK [bootstrap : Set size of /home to 50G] ****************************************************************************************************************
ok: [test-ibm-aix73-ppc64_be-1] => {"changed": false, "msg": "0516-787 extendlv: Maximum allocation for logical volume hd1\n\tis 512.\n"}
We can use lslv <logical volume name>
to view the volume:
# lslv hd1
LOGICAL VOLUME: hd1 VOLUME GROUP: rootvg
LV IDENTIFIER: 00fa00d600004c000000017d43623707.8 PERMISSION: read/write
VG STATE: active/complete LV STATE: opened/syncd
TYPE: jfs2 WRITE VERIFY: off
MAX LPs: 512 PP SIZE: 32 megabyte(s)
COPIES: 1 SCHED POLICY: parallel
LPs: 1 PPs: 1
STALE PPs: 0 BB POLICY: relocatable
INTER-POLICY: minimum RELOCATABLE: yes
INTRA-POLICY: center UPPER BOUND: 32
MOUNT POINT: /home LABEL: /home
MIRROR WRITE CONSISTENCY: on/ACTIVE
EACH LP COPY ON A SEPARATE PV ?: yes
Serialize IO ?: NO
INFINITE RETRY: no PREFERRED READ: 0
ENCRYPTION: no
#
and use chlv -x
to increase the maximum logical partitions (MAX LPs
). For our 100Gb we use
6000
(to match what we have for our AIX 7.1 IBM Cloud instances):
# chlv -x 6000 hd1
# lslv hd1
LOGICAL VOLUME: hd1 VOLUME GROUP: rootvg
LV IDENTIFIER: 00fa00d600004c000000017d43623707.8 PERMISSION: read/write
VG STATE: active/complete LV STATE: opened/syncd
TYPE: jfs2 WRITE VERIFY: off
MAX LPs: 6000 PP SIZE: 32 megabyte(s)
COPIES: 1 SCHED POLICY: parallel
LPs: 1 PPs: 1
STALE PPs: 0 BB POLICY: relocatable
INTER-POLICY: minimum RELOCATABLE: yes
INTRA-POLICY: center UPPER BOUND: 32
MOUNT POINT: /home LABEL: /home
MIRROR WRITE CONSISTENCY: on/ACTIVE
EACH LP COPY ON A SEPARATE PV ?: yes
Serialize IO ?: NO
INFINITE RETRY: no PREFERRED READ: 0
ENCRYPTION: no
#
On AIX OpenSSL is not available as an rpm via yum/dnf and is instead an installp fileset that must be manually downloaded and installed.
Go to https://www.ibm.com/resources/mrs/assets?source=aixbp&S_PKG=openssl
and pick the most recent OpenSSL release (each package should contain
compatibility libraries for older versions). Download/copy the .tar.Z
package (URL will be temporary) on to the machine into a temporary directory
e.g. /tmp/openssl
.
curl -sL openssl-3.0.8.1000.tar.Z https://iwm.dhe.ibm.com/.../openssl-3.0.8.1000.tar.Z
Then unpack the compressed archive:
zcat openssl-3.0.8.1000.tar.Z | tar -xvf -
and install:
installp -aXYgd openssl-3.0.8.1000 -e /tmp/install.log all
To see a list of installed packages, run:
lslpp -L all
Some libuv/Node.js tests currently fail on AIX with a network interface
containing a link local address. This is being tracked in
nodejs/node#46792. In the meantime the en1
interface containing the link local address is removed.
sudo ifconfig en1 down detach
Use
ifconfig -a
to list the available interfaces. To add back the en1
interface, run
sudo autoconf6 -i en1
Java 17 requires XL C/C++ Runtime 16.1 available from https://www.ibm.com/support/pages/fix-list-xl-cc-runtime-aix#161X.
Once downloaded, unpack the files with zcat
:
zcat 16.1.0.9-IBM-xlCrte-AIX-FP009.tar.Z | tar -xvf -
and then install with installp
:
installp -aXYgd . -e /tmp/install.log all
Use lslpp -l xlC\*
to view the curently installed version.
# lslpp -l xlC\*
Fileset Level State Description
----------------------------------------------------------------------------
Path: /usr/lib/objrepos
xlC.aix61.rte 13.1.3.3 COMMITTED IBM XL C++ Runtime for AIX 6.1
and later
xlC.cpp 9.0.0.0 COMMITTED C for AIX Preprocessor
xlC.rte 13.1.3.3 COMMITTED IBM XL C++ Runtime for AIX
xlC.sup.aix50.rte 9.0.0.1 COMMITTED XL C/C++ Runtime for AIX 5.2
#
Most packages should be installed via ansible.
If there are any missing they should be installed via yum
What you do need to install manually is ccache
mkdir -p /opt/gcc-6.3 && cd /opt/gcc-6.3
curl -L https://ci.nodejs.org/downloads/aix/gcc-6.3-aix7.2.ppc.tar.gz | /opt/freeware/bin/tar -xzf -
mkdir -p /opt/ccache-3.7.4 && cd /opt/ccache-3.7.4
curl -L https://ci.nodejs.org/downloads/aix/ccache-3.7.4.aix7.2.ppc.tar.gz | /opt/freeware/bin/tar -xzf -
For AIX 7 and 6.1, needed for the file watcher unit tests.
Add the following to /etc/filesystems:
/aha:
dev = /aha
vfs = ahafs
mount = true
vol = /aha
and then:
mkdir /aha
mount /aha
- Download 16.1.0 packages from: https://testcase.boulder.ibm.com (username: xlcomp4, password: ask @mhdawson)
- scp them to target:/opt/ibm-xlc
- on target:
cd /opt/ibm-xlc
uncompress 16.1.0.3-IBM-xlCcmp-AIX-FP003.tar.Z
tar -xvf 16.1.0.3-IBM-xlCcmp-AIX-FP003.tar
uncompress IBM_XL_C_CPP_V16.1.0.0_AIX.tar.Z
tar -xvf IBM_XL_C_CPP_V16.1.0.0_AIX.tar
installp -aXYgd ./usr/sys/inst.images -e /tmp/install.log all
inutoc
installp -aXgd ./ -e /tmp/install.log all
- Find compilers in
/opt/IBM/xl[cC]/16.1.0/bin/
-
download gcc-c++ (with dependencies) from bullfreeware.com
-
scp 15412gcc-c++-6.3.0-1.aix7.2.ppc.rpm-with-deps.zip TARGET:/ramdisk0
- Note: / is too small
-
unzip 15412gcc-c++-6.3.0-1.aix7.2.ppc.rpm-with-deps.zip
-
contained wrong libstdc++-9.1, so downloaded bundle for libstdc++ 6.3.0-1
-
unpack the RPMs:
$ for f in *gcc* *stdc*; do rpm2cpio $f | /opt/freeware/bin/cpio_64 -idmv; done
-
Find absolute symlinks, and make them relative, example:
$ find . -type l | xargs file ./opt/freeware/lib/gcc/powerpc-ibm-aix7.2.0.0/6.3.0/ppc64/libatomic.a: symbolic link to /opt/freeware/lib/gcc/powerpc-ibm-aix7.2.0.0/6.3.0/libatomic.a. ./opt/freeware/lib/gcc/powerpc-ibm-aix7.2.0.0/6.3.0/ppc64/libgcc_s.a: symbolic link to /opt/freeware/lib/gcc/powerpc-ibm-aix7.2.0.0/6.3.0/libgcc_s.a. ./opt/freeware/lib/gcc/powerpc-ibm-aix7.2.0.0/6.3.0/ppc64/libstdc++.a: symbolic link to /opt/freeware/lib/gcc/powerpc-ibm-aix7.2.0.0/6.3.0/libstdc++.a. ./opt/freeware/lib/gcc/powerpc-ibm-aix7.2.0.0/6.3.0/ppc64/libsupc++.a: symbolic link to /opt/freeware/lib/gcc/powerpc-ibm-aix7.2.0.0/6.3.0/libsupc++.a. ./opt/freeware/lib/gcc/powerpc-ibm-aix7.2.0.0/6.3.0/pthread/ppc64/libatomic.a: symbolic link to /opt/freeware/lib/gcc/powerpc-ibm-aix7.2.0.0/6.3.0/pthread/libatomic.a. ./opt/freeware/lib/gcc/powerpc-ibm-aix7.2.0.0/6.3.0/pthread/ppc64/libgcc_s.a: symbolic link to /opt/freeware/lib/gcc/powerpc-ibm-aix7.2.0.0/6.3.0/pthread/libgcc_s.a. ./opt/freeware/lib/gcc/powerpc-ibm-aix7.2.0.0/6.3.0/pthread/ppc64/libstdc++.a: symbolic link to /opt/freeware/lib/gcc/powerpc-ibm-aix7.2.0.0/6.3.0/pthread/libstdc++.a. ./opt/freeware/lib/gcc/powerpc-ibm-aix7.2.0.0/6.3.0/pthread/ppc64/libsupc++.a: symbolic link to /opt/freeware/lib/gcc/powerpc-ibm-aix7.2.0.0/6.3.0/pthread/libsupc++.a.
bash-5.0# pwd /ramdisk0/aixtoolbox/opt/freeware/lib/gcc/powerpc-ibm-aix7.2.0.0/6.3.0/ppc64
bash-5.0# ln -fs ../libatomic.a ../libgcc_s.a ../libstdc++.a ../libsupc++.a ./
bash-5.0# find . -type l | xargs file ./ppc64/libatomic.a: archive (big format) ./ppc64/libgcc_s.a: archive (big format) ./ppc64/libstdc++.a: archive (big format) ./ppc64/libsupc++.a: archive (big format) ./pthread/ppc64/libatomic.a: symbolic link to /opt/freeware/lib/gcc/powerpc-ibm-aix7.2.0.0/6.3.0/pthread/libatomic.a. ./pthread/ppc64/libgcc_s.a: symbolic link to /opt/freeware/lib/gcc/powerpc-ibm-aix7.2.0.0/6.3.0/pthread/libgcc_s.a. ./pthread/ppc64/libstdc++.a: symbolic link to /opt/freeware/lib/gcc/powerpc-ibm-aix7.2.0.0/6.3.0/pthread/libstdc++.a. ./pthread/ppc64/libsupc++.a: symbolic link to /opt/freeware/lib/gcc/powerpc-ibm-aix7.2.0.0/6.3.0/pthread/libsupc++.a.
bash-5.0# cd pthread/ppc64/
bash-5.0# ln -fs ../libatomic.a ../libgcc_s.a ../libstdc++.a ../libsupc++.a ./
bash-5.0# file *.a libatomic.a: archive (big format) libgcc.a: archive (big format) libgcc_eh.a: archive (big format) libgcc_s.a: archive (big format) libgcov.a: archive (big format) libstdc++.a: archive (big format) libsupc++.a: archive (big format)
-
Move to target location and create a tarball with no assumptions on leading path prefix:
$ mkdir /opt/gcc-6.3 $ cd /opt/gcc-6.3 $ mv .../opt/freeware/* ./ $ tar -cvf ../gcc-6.3-aix7.2.ppc.tar *
Example above was for 6.3.0, but process for 4.8.5 is identical, other than the version numbers.
Example search for 4.8.5 gcc on bullfreeware:
Notes:
-
AIX tar doesn't know about the "z" switch, so use GNU tar.
-
Build tools create 32-bit binaries by default, so explicitly create 64-bit ones.
$ curl -L -O https://github.com/ccache/ccache/releases/download/v3.7.4/ccache-3.7.4.tar.gz % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 100 607 0 607 0 0 3281 0 --:--:-- --:--:-- --:--:-- 3281 100 490k 100 490k 0 0 586k 0 --:--:-- --:--:-- --:--:-- 60.4M $ /opt/freeware/bin/tar -xzf ccache-3.7.4.tar.gz $ cd ccache-3.7.4 $ ./configure CC="gcc -maix64" && gmake $ mkdir -p /opt/ccache-3.7.4/libexec /opt/ccache-3.7.4/bin $ cp ccache /opt/ccache-3.7.4/bin $ cd /opt/ccache-3.7.4/libexec $ ln -s ../bin/ccache c++ $ ln -s ../bin/ccache cpp $ ln -s ../bin/ccache g++ $ ln -s ../bin/ccache gcc $ ln -s ../bin/ccache gcov $ cd cd /opt/ccache-3.7.4 $ tar -cf /opt/ccache-3.7.4.aix7.2.ppc.tar.gz *
In order to get Windows machines to a state where Ansible can be run against them, some manual steps need to be taken so that Ansible can connect.
Machines should have:
- Remote Desktop (RDP) enabled, the port should be listed with the access credentials if it is not the default (3389).
- PowerShell access enabled, the port should be listed with the access credentials if it is not the default (5986).
Install the pywinrm
pip module: pip install pywinrm
The preparation script needs to be run in PowerShell (run as Administrator):
[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12
Invoke-WebRequest "https://raw.githubusercontent.com/ansible/ansible-documentation/devel/examples/scripts/ConfigureRemotingForAnsible.ps1" -OutFile "ConfigureRemotingForAnsible.ps1"
.\ConfigureRemotingForAnsible.ps1 -ForceNewSSLCert true -CertValidityDays 3650
After creating new machines, the update-windows.yml
playbook should be run to:
- Make sure the unencrypted WinRM endpoint is deleted on every machine. Check with:
The HTTP endpoint should not appear. Only the HTTPS endpoint should be present.
ansible -f 50 'test-*-win*' -m win_shell -a 'winrm enumerate winrm/config/listener'
- On Rackspace hosts, make sure to change the ports, username, and password as described in the playbook.
On Azure, changing the ports is done in the Load Balancer configuration using the Azure Portal. The username and password are set during the creation of the VM in the Azure Portal.
Test the connection to the target machine with ansible HOST -m win_ping -vvvv
. If there is any issue, please refer to the official Ansible documentation in Setting up a Windows Host.
The hosts labelled jenkins-workspace are used to "execute" the coordination of Jenkins jobs. Jenkins uses them to do the initial Git work to figure out what needs to be done before farming off to the actual test machines. These machines are lower powered but have large disks so they can waste space with the numerous Git repositories Jenkins will create in this process. The use of these hosts takes a load off the Jenkins master and prevents the Jenkins master from filling up its disk with Git repositories.
Note that not all jobs can use jenkins-workspace servers for execution, some are tied to other hosts.
The jenkins-workspace hosts are setup as standard Node.js nodes but are only given the jenkins-workspace label.
The benchmark machines are set up so they can run preinstalled tooling against the Node.js codebase and submit the results to Coverity Scan.
The playbook should download and install the Coverity build tool needed for static analysis into /var/
. The extracted build tool should end up in a directory similar to /var/cov-analysis-linux64-2023.6.2
. This directory must match the PATH
setting in the node-daily-coverity job. According to Synopsis the tool is usually updated twice yearly -- if it is updated the directory will change and the following steps should be done:
- Run the playbook on all benchmark machines so that they have the same version of the Coverity build tool installed.
- Update the node-daily-coverity job so that the set
PATH
contains the new directory name.
The hosts that run Docker images for "sharedlibs", Alpine Linux and a few other dedicated systems (hosts identified by grep _docker-x64- inventory.yml
) don't have Docker image reload logic built in to Ansible. Changes to Docker images (adding, deleting, modifying) involve some manual preparation.
The general steps are:
- Stop the concerned Jenkins systemd service(s) (
sudo systemctl stop jenkins-test-$INSTANCE
) - Disable the concerned Jenkins systemd service(s) (
sudo systemctl disable jenkins-test-$INSTANCE
) - Remove the Jenkins systemd service configuration (
rm /lib/systemd/system/jenkins-test-$INSTANCE.service
) systemctl daemon-reload
to reload systemd configuration from disksystemctl reset-failed
to remove the disabled and removed systemd service(s)- Clean up unnecessary Docker images (
docker system prune -fa
to clean everything up, or justdocker rm
for the images that are no longer needed and a lighterdocker system prune
after that to clean non-tagged images).
Steps 3-5 may not be strictly necessary in the case of a simple modification as the existing configurations will be reused or rewritten by Ansible anyway.
To completely clean the Jenkins and Docker setup on a Docker host to start from scratch, either re-image the server or run the follwing commands:
systemctl list-units -t service --plain --all jenkins* | grep jenkins-test | awk '{print $1}' | xargs -l sudo systemctl stop
systemctl list-units -t service --plain --all jenkins* | grep jenkins-test | awk '{print $1}' | xargs -l sudo systemctl disable
sudo rm /lib/systemd/system/jenkins-test-*
sudo systemctl daemon-reload
sudo systemctl reset-failed
sudo docker system prune -fa
To do this across multiple hosts, it can be executed with parallel-ssh
like so:
parallel-ssh -i -h /tmp/docker-hosts 'systemctl list-units -t service --plain --all jenkins* | grep jenkins-test | awk '\''{print $1}'\'' | xargs -l sudo systemctl stop'
parallel-ssh -i -h /tmp/docker-hosts 'systemctl list-units -t service --plain --all jenkins* | grep jenkins-test | awk '\''{print $1}'\'' | xargs -l sudo systemctl disable'
parallel-ssh -i -h /tmp/docker-hosts 'sudo rm /lib/systemd/system/jenkins-test-*'
parallel-ssh -i -h /tmp/docker-hosts 'sudo systemctl daemon-reload'
parallel-ssh -i -h /tmp/docker-hosts 'sudo systemctl reset-failed'
parallel-ssh -i -h /tmp/docker-hosts 'sudo docker system prune -fa'
Note that while this is being done across all Docker hosts, you should disable node-test-commit-linux-containered to avoid a queue and delays of jobs. The Alpine Linux hosts under node-test-commit-linux will also be impacted and may need to be manually cancelled if there is considerable delay. Leaving one or more Docker hosts active while reloading others will alleviate the need to do this.
Joyent SmartOS machines use libsmartsshd.so
for PAM SSH authentication in order to look up SSH keys allowed to access machines. Part of our Ansible setup removes this so we can only rely on traditional SSH authentication. Therefore, it is critcal to put nodejs_test_*
public keys into $USER/.ssh/authorized_keys
as appropriate or access will be lost and not recoverable after reboot or sshd restart (part of Ansible setup).
There isn't a system start service on IBMi -- the machine should not be
rebooted, and after ansible is run, jenkins needs to be started with
jenkins-start.sh
. This will submit the job under the iojs user. If the
job is already running, the jenkins-start.sh
script will not start
another job.
See http://ibm.biz/ibmi-rpms (see "Installation" section)
/QOpenSys/usr/bin/system -kpib 'CRTUSRPRF USRPRF(NODEJS) PASSWORD() USRCLS(*SECOFR) SPCAUT(*USRCLS) PWDEXPITV(*NOMAX)'
mkdir -p /home/NODEJS
chown -R nodejs /home/NODEJS
Edit /QOpenSys/etc/profile
to contain:
PATH=/QOpenSys/pkgs/bin:$PATH
export PATH
This can be done by running the following commands from a shell:
echo 'PATH=/QOpenSys/pkgs/bin:$PATH' >> /QOpenSys/etc/profile
echo 'export PATH' >> /QOpenSys/etc/profile
After that is completed, copy to the .bashrc
file for the nodejs user
cp /QOpenSys/etc/profile /home/NODEJS/.bashrc
/QOpenSys/pkgs/bin/yum install chsh
/QOpenSys/pkgs/bin/chsh -s /QOpenSys/pkgs/bin/bash
/QOpenSys/pkgs/bin/chsh -s /QOpenSys/pkgs/bin/bash nodejs
The system Java installed is too old to be able to verify the SSL certificate
for our Jenkins servers and a more recent version has to be installed manually.
The script used to start the Jenkins agent expects to find the Java SDK in
/u/unix1/java/J8.0_64/
.
To install the Java SDK, obtain the latest Java 8 service refresh for z/OS from: https://developer.ibm.com/javasdk/support/zos/
Transfer the pax.Z file to the z/OS system (via sftp, do not use scp as that
will perform an unwanted character conversion). Log into the z/OS system and
extract the SDK via the pax
command:
e.g. if the pax.Z file is located in /u/unix1/SDK8_64bit_SR6_FP10.PAX.Z
mkdir -p /u/unix1/java
cd /u/unix1/java
pax -rf /u/unix1/SDK8_64bit_SR6_FP10.PAX.Z -ppx