hgzero/Jenkinsfile
hjmoons 3483c9c1b2 Jenkins 파이프라인 추가
- Jenkinsfile: GitHub Actions 대체 Jenkins Pipeline 구축
  - 5개 백엔드 서비스 빌드 (user, meeting, stt, ai, notification)
  - Gradle 빌드 및 SonarQube 분석 (선택사항)
  - Docker 이미지 빌드 및 ACR 푸시
  - Manifest 저장소 업데이트 (ArgoCD 연동)
  - 환경별 배포 지원 (dev/staging/prod)

- deployment/jenkins/JENKINS_SETUP.md: Jenkins 설정 가이드
  - Credentials 설정 방법
  - JDK 21 및 SonarQube 설정
  - Pipeline Job 생성 및 실행 가이드
  - 트러블슈팅 가이드

- 사용 이유: GitHub Actions 차단으로 인한 대체 CI/CD 구축
2025-10-30 18:16:56 +09:00

235 lines
8.5 KiB
Groovy

pipeline {
agent any
parameters {
choice(
name: 'ENVIRONMENT',
choices: ['dev', 'staging', 'prod'],
description: 'Target environment'
)
choice(
name: 'SKIP_SONARQUBE',
choices: ['true', 'false'],
description: 'Skip SonarQube Analysis'
)
}
environment {
// Container Registry
REGISTRY = 'acrdigitalgarage02.azurecr.io'
IMAGE_ORG = 'hgzero'
// Azure
RESOURCE_GROUP = 'rg-digitalgarage-02'
AKS_CLUSTER = 'aks-digitalgarage-02'
NAMESPACE = 'hgzero'
// Image Tag
IMAGE_TAG = "${new Date().format('yyyyMMddHHmmss')}"
// Services
SERVICES = 'user meeting stt ai notification'
// Credentials
ACR_CREDENTIALS = credentials('acr-credentials')
DOCKERHUB_CREDENTIALS = credentials('dockerhub-credentials')
SONAR_TOKEN = credentials('sonar-token')
GIT_CREDENTIALS = credentials('git-credentials')
}
stages {
stage('Checkout') {
steps {
script {
echo "🔄 Checking out code..."
checkout scm
}
}
}
stage('Setup Java') {
steps {
script {
echo "☕ Setting up Java 21..."
// Jenkins에 JDK 21이 설정되어 있어야 함
// Global Tool Configuration에서 'JDK21' 이름으로 설정
}
}
}
stage('Load Environment Variables') {
steps {
script {
echo "📋 Loading environment variables for ${params.ENVIRONMENT}..."
def configFile = ".github/config/deploy_env_vars_${params.ENVIRONMENT}"
if (fileExists(configFile)) {
def config = readFile(configFile)
config.split('\n').each { line ->
if (line && !line.startsWith('#')) {
def parts = line.split('=', 2)
if (parts.size() == 2) {
def key = parts[0].trim()
def value = parts[1].trim()
if (key == 'resource_group') {
env.RESOURCE_GROUP = value
} else if (key == 'cluster_name') {
env.AKS_CLUSTER = value
}
}
}
}
}
echo "Registry: ${env.REGISTRY}"
echo "Image Org: ${env.IMAGE_ORG}"
echo "Resource Group: ${env.RESOURCE_GROUP}"
echo "AKS Cluster: ${env.AKS_CLUSTER}"
}
}
}
stage('Build with Gradle') {
steps {
script {
echo "🔨 Building with Gradle..."
sh 'chmod +x gradlew'
sh './gradlew build -x test'
}
}
}
stage('SonarQube Analysis') {
when {
expression { params.SKIP_SONARQUBE == 'false' }
}
steps {
script {
echo "🔍 Running SonarQube Analysis..."
withSonarQubeEnv('SonarQube') {
env.SERVICES.split().each { service ->
echo "Analyzing ${service}..."
sh """
./gradlew :${service}:test :${service}:jacocoTestReport :${service}:sonar \
-Dsonar.projectKey=hgzero-${service}-${params.ENVIRONMENT} \
-Dsonar.projectName=hgzero-${service}-${params.ENVIRONMENT} \
-Dsonar.host.url=\${SONAR_HOST_URL} \
-Dsonar.token=\${SONAR_TOKEN} \
-Dsonar.java.binaries=build/classes/java/main \
-Dsonar.coverage.jacoco.xmlReportPaths=build/reports/jacoco/test/jacocoTestReport.xml \
-Dsonar.exclusions=**/config/**,**/entity/**,**/dto/**,**/*Application.class,**/exception/**
"""
}
}
}
}
}
stage('Archive Artifacts') {
steps {
script {
echo "📦 Archiving build artifacts..."
archiveArtifacts artifacts: '**/build/libs/*.jar', fingerprint: true
}
}
}
stage('Docker Build & Push') {
steps {
script {
echo "🐳 Building and pushing Docker images..."
// Login to Docker Hub (prevent rate limit)
sh """
echo ${DOCKERHUB_CREDENTIALS_PSW} | docker login -u ${DOCKERHUB_CREDENTIALS_USR} --password-stdin
"""
// Login to Azure Container Registry
sh """
echo ${ACR_CREDENTIALS_PSW} | docker login ${REGISTRY} -u ${ACR_CREDENTIALS_USR} --password-stdin
"""
// Build and push each service
env.SERVICES.split().each { service ->
echo "Building ${service}..."
def imageTag = "${env.REGISTRY}/${env.IMAGE_ORG}/${service}:${params.ENVIRONMENT}-${env.IMAGE_TAG}"
sh """
docker build \
--build-arg BUILD_LIB_DIR="${service}/build/libs" \
--build-arg ARTIFACTORY_FILE="${service}.jar" \
-f deployment/container/Dockerfile-backend \
-t ${imageTag} .
"""
echo "Pushing ${service}..."
sh "docker push ${imageTag}"
echo "✅ ${service} image pushed: ${imageTag}"
}
}
}
}
stage('Update Manifest Repository') {
steps {
script {
echo "📝 Updating manifest repository..."
// Clone manifest repository
sh """
rm -rf manifest-repo
git clone https://${GIT_CREDENTIALS_USR}:${GIT_CREDENTIALS_PSW}@github.com/hjmoons/hgzero-manifest.git manifest-repo
"""
dir('manifest-repo') {
// Install Kustomize
sh """
curl -s "https://raw.githubusercontent.com/kubernetes-sigs/kustomize/master/hack/install_kustomize.sh" | bash
chmod +x kustomize
"""
// Update manifest
dir("hgzero-back/kustomize/overlays/${params.ENVIRONMENT}") {
env.SERVICES.split().each { service ->
sh """
../../../kustomize edit set image ${env.REGISTRY}/${env.IMAGE_ORG}/${service}:${params.ENVIRONMENT}-${env.IMAGE_TAG}
"""
}
}
// Git commit and push
sh """
git config user.name "Jenkins"
git config user.email "jenkins@hgzero.com"
git add .
git commit -m "🚀 Update hgzero ${params.ENVIRONMENT} images to ${params.ENVIRONMENT}-${env.IMAGE_TAG}"
git push origin main
"""
}
echo "✅ Manifest repository updated. ArgoCD will auto-deploy."
}
}
}
}
post {
success {
echo "✅ Pipeline completed successfully!"
echo "Environment: ${params.ENVIRONMENT}"
echo "Image Tag: ${env.IMAGE_TAG}"
}
failure {
echo "❌ Pipeline failed!"
}
always {
// Clean workspace
cleanWs()
}
}
}