diff --git a/ansible/monitoring-fed.yml b/ansible/monitoring-fed.yml new file mode 100644 index 0000000000000000000000000000000000000000..a247a8218769f9f3f5512c077879c34359b6736c --- /dev/null +++ b/ansible/monitoring-fed.yml @@ -0,0 +1,6 @@ +- hosts: swarm-dashboard + become: yes + vars_files: + - ['{{ inventory_dir }}/secrets.yml'] + roles: + - prometheus-fed diff --git a/ansible/roles/kong-api/defaults/main.yml b/ansible/roles/kong-api/defaults/main.yml index e35a1c489afd3232a0eb2c2dca028db934cbe753..9fa21be7539ef02c9dfaac8d67e225b03e9acf76 100644 --- a/ansible/roles/kong-api/defaults/main.yml +++ b/ansible/roles/kong-api/defaults/main.yml @@ -1393,6 +1393,22 @@ kong_apis: config.limit_by: credential - name: request-size-limiting config.allowed_payload_size: "{{ small_request_size_limit }}" + - name: removeUserFromBatch + uris: "{{ course_service_prefix }}/v1/batch/user/remove" + upstream_url: "{{ lms_service_url }}/v1/course/batch/users/remove" + strip_uri: true + plugins: + - name: jwt + - name: cors + - "{{ statsd_pulgin }}" + - name: acl + config.whitelist: courseUpdate + - name: rate-limiting + config.policy: local + config.hour: "{{ medium_rate_limit_per_hour }}" + config.limit_by: credential + - name: request-size-limiting + config.allowed_payload_size: "{{ small_request_size_limit }}" - name: getBatch uris: "{{ course_service_prefix }}/v1/batch/read" upstream_url: "{{ lms_service_url }}/v1/course/batch/read" @@ -1409,6 +1425,22 @@ kong_apis: config.limit_by: credential - name: request-size-limiting config.allowed_payload_size: "{{ small_request_size_limit }}" + - name: getParticipants + uris: "{{ course_service_prefix }}/v1/batch/participants/list" + upstream_url: "{{ lms_service_url }}/v1/batch/participants/list" + strip_uri: true + plugins: + - name: jwt + - name: cors + - "{{ statsd_pulgin }}" + - name: acl + config.whitelist: courseUser + - name: rate-limiting + config.policy: local + config.hour: "{{ medium_rate_limit_per_hour }}" + config.limit_by: credential + - name: request-size-limiting + config.allowed_payload_size: "{{ small_request_size_limit }}" - name: assignRole uris: "{{ user_service_prefix }}/v1/role/assign" upstream_url: "{{ learning_service_url }}/v1/user/assign/role" @@ -1521,6 +1553,22 @@ kong_apis: config.limit_by: credential - name: request-size-limiting config.allowed_payload_size: "{{ small_request_size_limit }}" + - name: batchBulkUnEnrolment + uris: "{{ course_service_prefix }}/v1/batch/bulk/unenrollment" + upstream_url: "{{ lms_service_url }}/v1/batch/bulk/unenrollment" + strip_uri: true + plugins: + - name: jwt + - name: cors + - "{{ statsd_pulgin }}" + - name: acl + config.whitelist: orgAdmin + - name: rate-limiting + config.policy: local + config.hour: "{{ medium_rate_limit_per_hour }}" + config.limit_by: credential + - name: request-size-limiting + config.allowed_payload_size: "{{ small_request_size_limit }}" - name: getTenantInfo uris: "{{ org_service_prefix }}/v1/tenant/info" upstream_url: "{{ player_service_url }}/v1/tenant/info" diff --git a/ansible/roles/kong-consumer/defaults/main.yml b/ansible/roles/kong-consumer/defaults/main.yml index f98eec6c82b29427e5e5dd9e07d7934363ae2506..2f2d88b41fd17d9bc065028847ee3554728e4a46 100644 --- a/ansible/roles/kong-consumer/defaults/main.yml +++ b/ansible/roles/kong-consumer/defaults/main.yml @@ -18,6 +18,7 @@ mobile_device_groups: - domainUser - dataUpdate - dialcodeUser + - echoUser integration_partner_groups: - echoUser diff --git a/ansible/roles/prometheus-fed/defaults/main.yml b/ansible/roles/prometheus-fed/defaults/main.yml new file mode 100644 index 0000000000000000000000000000000000000000..870313d517c4d022fba820671a8931c4582dd99b --- /dev/null +++ b/ansible/roles/prometheus-fed/defaults/main.yml @@ -0,0 +1,19 @@ +prometheus_reservation_memory: 1G +prometheus_limit_memory: 1G +prometheus_storage_retention_time: 90d + +enable_scraping_docker_metrics: false +docker_metrics_port: "2377" +monitor_stack_files_dest_dir: /opt/docker/stacks/prom_fed/stacks +monitor_config_files_dest_dir: /opt/docker/stacks/prom_fed/config + +monitor_config_templates: + - prometheus.yml + +prometheus_route_prefix: prometheus +prometheus_web_external_url: "{{proto}}://{{api__host}}:29090/{{ prometheus_route_prefix }}" + +root_group: root +root_owner: root +backup_storage_name: prometheus_backup +prometheus_storage_location: /root/dockerdata/prometheus_fed/data/ diff --git a/ansible/roles/prometheus-fed/tasks/main.yml b/ansible/roles/prometheus-fed/tasks/main.yml new file mode 100644 index 0000000000000000000000000000000000000000..9962dafc0aa93681aeb5686bb64eb3c12fdf6a60 --- /dev/null +++ b/ansible/roles/prometheus-fed/tasks/main.yml @@ -0,0 +1,54 @@ +--- +- name: Create prometheus data dir + file: + path: "{{ prometheus_storage_location }}" + state: directory + mode: 0755 + owner: 'nobody' + group: 'nogroup' + +- name: Ensure stack directory exists + file: + path: "{{ monitor_stack_files_dest_dir }}" + state: directory + owner: '{{ root_owner }}' + group: '{{ root_group }}' + +- name: Ensure config directory exists + file: + path: "{{ monitor_config_files_dest_dir }}" + state: directory + owner: '{{ root_owner }}' + group: '{{ root_group }}' + +- name: Save stack file + template: + src: stack-monitor.yml + dest: "{{ monitor_stack_files_dest_dir }}/monitor.yml" + mode: 0644 + +- name: Save prometheus config fed_{{ item }} + template: + src="{{ item }}" + dest="{{ monitor_config_files_dest_dir }}/{{ item }}" + mode=0644 + with_items: + - "{{ monitor_config_templates }}" + +- name: Remove monitor stack + shell: "docker stack rm prometheus_fed" + ignore_errors: yes + +- name: Remove old docker config fed_{{ item }} + shell: "docker config rm fed_{{ item }}" + with_items: "{{ monitor_config_templates }}" + ignore_errors: yes + +- name: Save docker config fed_{{ item }} + shell: "docker config create fed_{{ item }} {{ monitor_config_files_dest_dir }}/{{ item }}" + with_items: "{{ monitor_config_templates }}" + +- name: Deploy stack + shell: "docker stack deploy -c monitor.yml prometheus_fed" + args: + chdir: "{{ monitor_stack_files_dest_dir }}" diff --git a/ansible/roles/prometheus-fed/templates/prometheus.yml b/ansible/roles/prometheus-fed/templates/prometheus.yml new file mode 100644 index 0000000000000000000000000000000000000000..6857f3f4c1cb9877dbb7b2bf3ae0ba1fd790b3a1 --- /dev/null +++ b/ansible/roles/prometheus-fed/templates/prometheus.yml @@ -0,0 +1,45 @@ +global: + scrape_interval: 1m + scrape_timeout: 10s + evaluation_interval: 1m + # Clustername is defined for multi swarm cluster + # can name first cluster as DS1 and 2nd as DS2 ... DSn + # all metrics will have label as cluster: < value > + # This value won't be accessible from GUI but for external tools like + # federation or alertmanager + external_labels: + federation: fed1 + + +scrape_configs: + + {% if enable_scraping_docker_metrics %} + # This empty line ensures indentation is correct after ansible jinja2 template is materialized + - job_name: 'docker' + static_configs: + - targets: {{ groups['swarm-manager'] | map('regex_replace', '^(.*)$', '\\1:' + docker_metrics_port ) | list | to_yaml }} + metric_relabel_configs: + - source_labels: [__name__] + regex: 'grpc_.*' + action: drop + {% endif %} + + + - job_name: 'federate' + metrics_path: /prometheus/federate + honor_labels: true + params: + match[]: + - '{__name__=~"nginx_.*"}' + - '{__name__=~"kong_.*"}' + - '{__name__=~"node_.*"}' + static_configs: + {# groups[alertmanager] and prometheus are same machines #} + {# and alertmanagers will be unique per swarm #} + # This empty line make sure the indentation is correct + - targets: [ '{{groups['alertmanager']|join(':9090\', \'')}}:9090', '{{groups['alertmanager_stateful']|join(':19090\', \'')}}:19090' ] + + - job_name: 'vm-node-exporter' + static_configs: + - targets: ["{{ansible_host}}:9100"] + diff --git a/ansible/roles/prometheus-fed/templates/stack-monitor.yml b/ansible/roles/prometheus-fed/templates/stack-monitor.yml new file mode 100644 index 0000000000000000000000000000000000000000..f9795b5ee2f925fe378441dcc94bfa1295ffcdbb --- /dev/null +++ b/ansible/roles/prometheus-fed/templates/stack-monitor.yml @@ -0,0 +1,31 @@ +version: "3.3" + +services: + prometheus: + image: quay.io/prometheus/prometheus:v2.8.1 + ports: + - "29090:9090" + networks: + - application_default + volumes: + - {{prometheus_storage_location}}:/prometheus + command: "--config.file=/etc/prometheus/prometheus.yml --storage.tsdb.path=/prometheus --web.console.libraries=/etc/prometheus/console_libraries --storage.tsdb.retention.time={{prometheus_storage_retention_time}} --web.console.templates=/etc/prometheus/consoles --web.route-prefix={{prometheus_route_prefix}} --web.external-url={{prometheus_web_external_url}} --web.enable-admin-api" + configs: + - source: fed_prometheus.yml + target: /etc/prometheus/prometheus.yml + deploy: + replicas: 1 + resources: + reservations: + memory: "{{ prometheus_reservation_memory }}" + limits: + memory: "{{ prometheus_limit_memory }}" + +configs: + fed_prometheus.yml: + external: true + +networks: + application_default: + external: true + diff --git a/ansible/roles/stack-proxy/templates/nginx.conf b/ansible/roles/stack-proxy/templates/nginx.conf index 566be10a09d34e0c9f3631f6df4ea96464d563cb..ff5ee83d09534cf212f10531956deb7aad6e19a9 100644 --- a/ansible/roles/stack-proxy/templates/nginx.conf +++ b/ansible/roles/stack-proxy/templates/nginx.conf @@ -45,7 +45,7 @@ http { #tcp_nopush on; client_max_body_size 60M; - keepalive_timeout 500s; + keepalive_timeout 65s; keepalive_requests 200; # Nginx connection limit per ip diff --git a/ansible/roles/stack-proxy/templates/proxy-default.conf b/ansible/roles/stack-proxy/templates/proxy-default.conf index bf750cedfe89556d30b87371ba2c675e0b372bcc..c489c283da8f7a323d7ad53c5c164a02a5547027 100644 --- a/ansible/roles/stack-proxy/templates/proxy-default.conf +++ b/ansible/roles/stack-proxy/templates/proxy-default.conf @@ -49,8 +49,18 @@ server { location ~* ^/auth/realms/(.+)/clients-registrations/ { return 301 {{proto}}://$host/api/auth/v1/realms/$1/clients-registrations/; } + location ~* ^/auth/v1/refresh/token { - return 301 {{proto}}://{{ proxy_server_name }}; + set $target http://player:3000; + rewrite ^/auth/(.*) /auth/$1 break; + proxy_pass $target; + + proxy_set_header Host $host; + proxy_set_header X-Real-IP $remote_addr; + proxy_set_header X-Scheme $scheme; + proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; + proxy_set_header X-Forwarded-Proto $scheme; + } location ~* ^/auth/admin/master/console/ { diff --git a/deploy/gitOPS/README.md b/deploy/gitOPS/README.md new file mode 100644 index 0000000000000000000000000000000000000000..65e8cdf33dcb97c528e60ae565895a68edbc944c --- /dev/null +++ b/deploy/gitOPS/README.md @@ -0,0 +1,10 @@ +# Using scripts: + +- All the scripts are using the github api's. +- All the scripts will take github.csv file as input and read each line to get the values of all variables +- First udpate github.csv file row wise and run the scripts +- In github.csv there are 4 variables with comma seperated + + REPO_NAME,BRANCH_NAME,MERGE_ACCESS_USERS(;),CHECKS + + MERGE_ACCESS_USERS and CHECKS: These variables are required only by disableBranchProtection.sh script. diff --git a/deploy/gitOPS/deleteBranches.sh b/deploy/gitOPS/deleteBranches.sh new file mode 100644 index 0000000000000000000000000000000000000000..b635d0388683ab2beb19f3ae64ac8b4acc013518 --- /dev/null +++ b/deploy/gitOPS/deleteBranches.sh @@ -0,0 +1,14 @@ +#!/bin/bash +read -p "Enter Github Username: " user +read -sp "Enter Github Password: " pass +echo " " +IFS=',' +grep -v -e '#' -e "^$" github.csv | while read -ra LINE +do + repo_name="${LINE[0]}" + branch_name="${LINE[1]}" + echo "----------------------------------------------------" + echo -e '\033[0;32m'$repo_name' '$branch_name'\033[0m' + echo "----------------------------------------------------" + curl -u $user:$pass -XDELETE https://api.github.com/repos/project-sunbird/$repo_name/git/refs/heads/$branch_name +done diff --git a/deploy/gitOPS/disableBranchProtection.sh b/deploy/gitOPS/disableBranchProtection.sh new file mode 100644 index 0000000000000000000000000000000000000000..1e4e040281f708cb64118693b66c3bb0cd71da29 --- /dev/null +++ b/deploy/gitOPS/disableBranchProtection.sh @@ -0,0 +1,24 @@ +#!/bin/bash +read -p "Enter Github Username: " user +read -sp "Enter Github Password: " pass +echo " " +IFS=',' +grep -v -e '#' -e "^$" github.csv | while read -ra LINE +do + repo_name="${LINE[0]}" + branch_name="${LINE[1]}" + echo "----------------------------------------------------" + echo -e '\033[0;32m'$repo_name' '$branch_name'\033[0m' + echo "----------------------------------------------------" + curl -u $user:$pass -XDELETE \ + -H "Accept: application/vnd.github.loki-preview+json" \ + -d '{ + "protection": { + "enabled": null + }, + "restrictions": null, + "required_status_checks": null, + "enforce_admins": null, + "required_pull_request_reviews": null + }' "https://api.github.com/repos/project-sunbird/$repo_name/branches/$branch_name/protection" +done diff --git a/deploy/gitOPS/enableBranchProtection.sh b/deploy/gitOPS/enableBranchProtection.sh new file mode 100644 index 0000000000000000000000000000000000000000..1eda8d728bc3b657258d7c63a1ca342fe08c0d2b --- /dev/null +++ b/deploy/gitOPS/enableBranchProtection.sh @@ -0,0 +1,62 @@ +#!/bin/bash -xv +read -p "Enter the github username: " user +read -sp "Enter the password: " pass +echo " " +statusChecks=0 +IFS=',' +#read input from a file +grep -v -e '#' -e "^$" github.csv | while read -ra LINE +do + repo_name="${LINE[0]}" + branch_name="${LINE[1]}" + users="${LINE[2]}" + check="${LINE[3]}" +unset IFS +Users=\"$users\" +githubUsers=$(echo $Users | sed 's/;/\",\"/g') +echo "------------------------------------------------------------------" +echo -e '\033[0;32m'$repo_name $branch_name $githubUsers $check'\033[0m' +echo "------------------------------------------------------------------" +IFS=',' +if [[ $check == "1" ]]; then + statusChecks='"Codacy/PR Quality Review"' +elif [[ $check == "2" ]]; then + statusChecks='"ci/circleci: build"' +elif [[ $check == "3" ]]; then + statusChecks='"Codacy/PR Quality Review", + "ci/circleci: build"' +else + echo "Provide correct value!" +fi + +curl -u $user:$pass -XPUT \ + -H 'Accept: application/vnd.github.luke-cage-preview+json' \ + -d '{ + "protection": { + "enabled": true + }, + + "enforce_admins": true, + "required_pull_request_reviews": { + "dismiss_stale_reviews": true, + "require_code_owner_reviews": false, + "required_approving_review_count": 1 + }, + + "required_status_checks": { + "strict": true, + "contexts": [ + '"$statusChecks"' + ] + }, + + "restrictions": { + "users": [ + '"$githubUsers"' + ], + "teams": [ + "null" + ] + } + }' "https://api.github.com/repos/project-sunbird/$repo_name/branches/$branch_name/protection" +done diff --git a/deploy/gitOPS/enableBranchProtection.sh_bak b/deploy/gitOPS/enableBranchProtection.sh_bak new file mode 100644 index 0000000000000000000000000000000000000000..4073fea0742c17c4668c14e3940cacc5fe668669 --- /dev/null +++ b/deploy/gitOPS/enableBranchProtection.sh_bak @@ -0,0 +1,57 @@ +#!/bin/bash +read -p "Enter the username: " user +read -sp "Enter the password:" pass +echo " " +read -p "Enter the repo name:" repo_name +read -p "Enter the branch name:" branch_name +echo -e "status check: \n 1. codacy \n 2. circleci \n 3. both" +read -p "enter number:" check +check=${check:-3} +statusChecks=0 +read -p "enter username for merge access:" users +Users=\"$users\" +githubUsers=$(echo $Users | sed 's/,/\",\"/g') + +if [[ $check == "1" ]]; then + statusChecks='"Codacy/PR Quality Review"' +elif [[ $check == "2" ]]; then + statusChecks='"ci/circleci: build"' +elif [[ $check == "3" ]]; then + statusChecks='"Codacy/PR Quality Review", + "ci/circleci: build"' +else + echo "Select correct option!" +fi +echo $statusChecks +echo $githubUsers + +curl -u $user:$pass -XPUT \ + -H 'Accept: application/vnd.github.luke-cage-preview+json' \ + -d '{ + "protection": { + "enabled": true + }, + + "enforce_admins": true, + "required_pull_request_reviews": { + "dismiss_stale_reviews": true, + "require_code_owner_reviews": false, + "required_approving_review_count": 1 + }, + + "required_status_checks": { + "strict": true, + "contexts": [ + '"$statusChecks"' + ] + }, + + "restrictions": { + "users": [ + '"$githubUsers"' + ], + "teams": [ + "null" + ] + } + }' "https://api.github.com/repos/project-sunbird/$repo_name/branches/$branch_name/protection" diff --git a/deploy/gitOPS/getBranchProtection.sh b/deploy/gitOPS/getBranchProtection.sh new file mode 100644 index 0000000000000000000000000000000000000000..a9f0c206bb7a9a10dbc6750fcc409a5cf181c924 --- /dev/null +++ b/deploy/gitOPS/getBranchProtection.sh @@ -0,0 +1,14 @@ +#!/bin/bash +read -p "Enter Github Username: " user +read -sp "Enter Github Password: " pass +echo " " +IFS=',' +grep -v -e '#' -e "^$" github.csv | while read -ra LINE +do + repo_name="${LINE[0]}" + branch_name="${LINE[1]}" + echo "----------------------------------------------------" + echo -e '\033[0;32m'$repo_name' '$branch_name'\033[0m' + echo "----------------------------------------------------" + curl -u $user:$pass -XGET https://api.github.com/repos/project-sunbird/$repo_name/branches/$branch_name/protection +done diff --git a/deploy/gitOPS/getBranches.sh b/deploy/gitOPS/getBranches.sh new file mode 100644 index 0000000000000000000000000000000000000000..caffb6a1a4482ef1beecff588ff46c7d5729360f --- /dev/null +++ b/deploy/gitOPS/getBranches.sh @@ -0,0 +1,13 @@ +#!/bin/bash +read -p "Enter Github Username: " user +read -sp "Enter Github Password: " pass +echo " " +IFS=',' +grep -v -e '#' -e "^$" github.csv | while read -ra LINE +do + repo_name="${LINE[0]}" + echo "----------------------------------------------------" + echo -e '\033[0;32m'$repo_name'\033[0m' + echo "----------------------------------------------------" + curl -u $user:$pass -s -N https://api.github.com/repos/project-sunbird/$repo_name/branches | jq '.[].name' -r +done diff --git a/deploy/gitOPS/getRepos.sh b/deploy/gitOPS/getRepos.sh new file mode 100644 index 0000000000000000000000000000000000000000..509400d7d6d763f0b20cec9c9054b3d9213591d9 --- /dev/null +++ b/deploy/gitOPS/getRepos.sh @@ -0,0 +1,9 @@ +#!/bin/bash +read -p "Enter Github Username: " user +read -sp "Enter Github Password: " pass +echo " " +read -p "Enter Github Account Name: " acc_name +echo "---------------------------------------------" +echo -e '\033[0;32m'$acc_name'\033[0m' +echo "---------------------------------------------" +curl -s -N https://api.github.com/users/$acc_name/repos\?per_page=100 | jq '.[].name' -r diff --git a/deploy/gitOPS/github.csv b/deploy/gitOPS/github.csv new file mode 100644 index 0000000000000000000000000000000000000000..64bf495ac6bda48ed71b3d6163cecaaa9fe8f2b8 --- /dev/null +++ b/deploy/gitOPS/github.csv @@ -0,0 +1,13 @@ +#REPO_NAME,BRANCH_NAME,MERGE_ACCESS_USERS(;),CHECKS +sunbird-lms-service,jenkins-test,harshavardhanc;abcb,3 + + + + + + + + +#NOTE: +#MERGE_ACCESS_USERS SHOULD BE (;) seperated +#CHECKS: 1.codacy 2.cirleci 3.both diff --git a/deploy/utilities/getEsData.sh b/deploy/utilities/getEsData.sh new file mode 100644 index 0000000000000000000000000000000000000000..48041b2849258708194f5c8cbb45c5dc94c9b0fd --- /dev/null +++ b/deploy/utilities/getEsData.sh @@ -0,0 +1,20 @@ +#!/bin/bash +#################################################### +# Author S M Y ALTAMASH <smy.altamash@gmail.com> # +# Script gets the Latest Logs of proxy from Log-es # +#################################################### +# NOTE: Have jq installed before running this script +for index in $(curl -s localhost:9200/_cat/indices | grep -v kibana | awk '{print $3}' | tr "\n" " "); +do + echo "Index:$index" + # Get the Total Hits for the Proxy Container + hits=$(curl -s -X GET "http://localhost:9200/$index/_search?pretty" -H 'Content-Type: application/json' -d'{"query":{"match":{"program":"proxy_proxy*"}}}' | jq '.hits.total') + + # Increase the query size + curl -XPUT "http://localhost:9200/$index/_settings" -d "{ \"index\" : { \"max_result_window\" : \"$hits\" } }" -H "Content-Type: application/json" + + # Save the Logs in the file + curl -s -X GET "http://localhost:9200/$index/_search?size=$hits" -H 'Content-Type: application/json' -d'{"query":{"match":{"program":"proxy_proxy*"}}}' > $index.json + echo "################################" +done + diff --git a/pipelines/deploy/monitor/prom-fed/Jenkinsfile b/pipelines/deploy/monitor/prom-fed/Jenkinsfile new file mode 100644 index 0000000000000000000000000000000000000000..0294ea7c2127e02abc5ee26b1882e3d629ece38a --- /dev/null +++ b/pipelines/deploy/monitor/prom-fed/Jenkinsfile @@ -0,0 +1,38 @@ +@Library('deploy-conf') _ +node() { + try { + String ANSI_GREEN = "\u001B[32m" + String ANSI_NORMAL = "\u001B[0m" + String ANSI_BOLD = "\u001B[1m" + String ANSI_RED = "\u001B[31m" + String ANSI_YELLOW = "\u001B[33m" + + stage('checkout public repo') { + cleanWs() + checkout scm + } + + ansiColor('xterm') { + stage('deploy'){ + values = [:] + currentWs = sh(returnStdout: true, script: 'pwd').trim() + envDir = sh(returnStdout: true, script: "echo $JOB_NAME").split('/')[-3].trim() + module = sh(returnStdout: true, script: "echo $JOB_NAME").split('/')[-2].trim() + jobName = sh(returnStdout: true, script: "echo $JOB_NAME").split('/')[-1].trim() + ansiblePlaybook = "${currentWs}/ansible/monitoring-fed.yml" + ansibleExtraArgs = "--vault-password-file /var/lib/jenkins/secrets/vault-pass -v" + values.put('currentWs', currentWs) + values.put('env', envDir) + values.put('module', module) + values.put('jobName', jobName) + values.put('ansiblePlaybook', ansiblePlaybook) + values.put('ansibleExtraArgs', ansibleExtraArgs) + println values + ansible_playbook_run(values) + } + } + } + catch (err) { + throw err + } +} \ No newline at end of file