This is an automated email from the ASF dual-hosted git repository.

jstastnycz pushed a commit to branch main
in repository 
https://gitbox.apache.org/repos/asf/incubator-kie-kogito-operator.git


The following commit(s) were added to refs/heads/main by this push:
     new 28b2d3dc kie-issues#574 Initial ASF Jenkins CI Setup (#1530)
28b2d3dc is described below

commit 28b2d3dc945e48659b199cca33723568b848f72e
Author: Jan Stastny <[email protected]>
AuthorDate: Tue Sep 19 20:22:44 2023 +0200

    kie-issues#574 Initial ASF Jenkins CI Setup (#1530)
    
    Co-authored-by: radtriste <[email protected]>
---
 .ci/jenkins/Jenkinsfile                         |   6 +-
 .ci/jenkins/Jenkinsfile-rhpam                   | 149 ------------------------
 .ci/jenkins/Jenkinsfile.deploy                  |  21 +---
 .ci/jenkins/Jenkinsfile.examples-images.deploy  |  17 +--
 .ci/jenkins/Jenkinsfile.examples-images.promote |  11 +-
 .ci/jenkins/Jenkinsfile.profiling               |  18 +--
 .ci/jenkins/Jenkinsfile.promote                 |   9 +-
 .ci/jenkins/Jenkinsfile.setup-branch            |   9 +-
 .ci/jenkins/dsl/jobs.groovy                     |  31 +++--
 .ci/jenkins/dsl/test.sh                         |   2 +-
 .ci/jenkins/scripts/container.groovy            |   4 +-
 .ci/jenkins/scripts/helper.groovy               |   2 +-
 .github/bot-files/comments.yml                  |   2 +-
 .github/pull_request_template.md                |   4 +-
 .github/workflows/jenkins-tests-PR.yml          |   4 +-
 15 files changed, 56 insertions(+), 233 deletions(-)

diff --git a/.ci/jenkins/Jenkinsfile b/.ci/jenkins/Jenkinsfile
index e3d14044..e6f1d6c9 100644
--- a/.ci/jenkins/Jenkinsfile
+++ b/.ci/jenkins/Jenkinsfile
@@ -8,7 +8,7 @@ testsFailed = false
 
 pipeline {
     agent {
-        label 'kogito-jenkins-node && !master'
+        label 'kogito-jenkins-node && !master' // Running on IBMCLoud jenkins, 
no change to be done there
     }
     tools {
         go 'golang-1.17'
@@ -20,7 +20,7 @@ pipeline {
     environment {
         OPENSHIFT_INTERNAL_REGISTRY = 
'image-registry.openshift-image-registry.svc:5000'
 
-        CONTAINER_ENGINE = 'podman'
+        CONTAINER_ENGINE = 'docker'
 
         CODECOV_TOKEN = credentials('KOGITO_OPERATOR_CODECOV_TOKEN')
     }
@@ -32,7 +32,7 @@ pipeline {
 
                     sh ' git config --global user.email "[email protected]" '
                     sh ' git config --global user.name "kie user"'
-                    githubscm.checkoutIfExists('kogito-operator', 
changeAuthor, changeBranch, 'kiegroup', changeTarget, true, ['token' : 
'GITHUB_TOKEN', 'usernamePassword' : 'user-kie-ci10'])
+                    
githubscm.checkoutIfExists('incubator-kie-kogito-operator', changeAuthor, 
changeBranch, 'apache', changeTarget, true, ['token' : 'GITHUB_TOKEN', 
'usernamePassword' : 'user-kie-ci10'])
                     sh "set +x && oc login --token=\$(oc whoami -t) 
--server=${OPENSHIFT_API} --insecure-skip-tls-verify"
                 }
             }
diff --git a/.ci/jenkins/Jenkinsfile-rhpam b/.ci/jenkins/Jenkinsfile-rhpam
deleted file mode 100644
index 15a111ff..00000000
--- a/.ci/jenkins/Jenkinsfile-rhpam
+++ /dev/null
@@ -1,149 +0,0 @@
-@Library('jenkins-pipeline-shared-libraries')_
-
-def changeAuthor = env.ghprbPullAuthorLogin ?: CHANGE_AUTHOR
-def changeBranch = env.ghprbSourceBranch ?: CHANGE_BRANCH
-def changeTarget = env.ghprbTargetBranch ?: CHANGE_TARGET
-
-testsFailed = false
-
-pipeline {
-    agent {
-        label 'kogito-jenkins-node && !master'
-    }
-    tools {
-        go 'golang-1.17'
-    }
-    options {
-        buildDiscarder logRotator(artifactDaysToKeepStr: '', 
artifactNumToKeepStr: '', daysToKeepStr: '', numToKeepStr: '10')
-        timeout(time: 12, unit: 'HOURS') // We give a lot of time to timeout 
due to the lock on Openshift
-    }
-    environment {
-        OPENSHIFT_INTERNAL_REGISTRY = 
'image-registry.openshift-image-registry.svc:5000'
-
-        CONTAINER_ENGINE = 'podman'
-    }
-    stages {
-        stage('Initialize') {
-            steps {
-                script {
-                    cleanGoPath()
-
-                    sh ' git config --global user.email "[email protected]" '
-                    sh ' git config --global user.name "kie user"'
-                    githubscm.checkoutIfExists('kogito-operator', 
changeAuthor, changeBranch, 'kiegroup', changeTarget, true, ['token' : 
'GITHUB_TOKEN', 'usernamePassword' : 'user-kie-ci10'])
-                    sh "set +x && oc login --token=\$(oc whoami -t) 
--server=${OPENSHIFT_API} --insecure-skip-tls-verify"
-                }
-            }
-        }
-        stage('Build RHPAM Kogito Operator') {
-            steps {
-                // Workaround until Operator PR checks is solved
-                sh "echo '' > content_sets.yaml"
-
-                sh "make -f Makefile.rhpam BUILDER=${CONTAINER_ENGINE}"
-            }
-        }
-        stage('Push Operator Image(s) to Openshift Registry') {
-            steps {
-                sh """
-                    set +x && ${CONTAINER_ENGINE} login -u jenkins -p \$(oc 
whoami -t) --tls-verify=false ${OPENSHIFT_REGISTRY}
-                    TAG_OPERATOR=\$(go run version/getrhpamversion.go)
-
-                    ${CONTAINER_ENGINE} tag 
registry.stage.redhat.io/rhpam-7/rhpam-kogito-rhel8-operator:\${TAG_OPERATOR} 
${OPENSHIFT_REGISTRY}/openshift/rhpam-kogito-rhel8-operator:pr-\$(echo 
\${GIT_COMMIT} | cut -c1-7)
-                    ${CONTAINER_ENGINE} push --tls-verify=false 
${OPENSHIFT_REGISTRY}/openshift/rhpam-kogito-rhel8-operator:pr-\$(echo 
\${GIT_COMMIT} | cut -c1-7)
-                """
-            }
-        }
-
-        stage('Run BDD tests') {
-            options {
-                lock("BDD tests ${OPENSHIFT_API}")
-            }
-            stages {
-                stage('Running smoke tests') {
-                    options {
-                        timeout(time: 90, unit: 'MINUTES')
-                    }
-                    steps {
-                        script {
-                            try {
-                                // Run just smoke tests to verify basic 
operator functionality
-                                sh "make run-smoke-tests tags='@rhpam' 
concurrent=5 ${getBDDParameters()}"
-                            } catch (err) {
-                                testsFailed = true
-                                util.archiveConsoleLog()
-                            }
-                        }
-                    }
-                    post {
-                        always {
-                            archiveArtifacts artifacts: 'test/logs/**/*.log', 
allowEmptyArchive: true
-                            junit testResults: 'test/logs/**/junit.xml', 
allowEmptyResults: true
-                        }
-                        cleanup {
-                            sh 'cd test && go run scripts/prune_namespaces.go'
-                        }
-                    }
-                }
-            }
-        }
-    }
-    post {
-        always {
-            script {
-                // Verify here if BDD tests due to test errors or build error
-                if (testsFailed && currentBuild.currentResult == 'SUCCESS') {
-                    error 'There was a test execution failure'
-                }
-            }
-        }
-        unsuccessful {
-            script {
-                def additionalInfo = "You can find test error logs here: 
${BUILD_URL}/artifact/test/logs/error/"
-                pullrequest.postComment(util.getMarkdownTestSummary('RHPAM 
PR', additionalInfo, "${BUILD_URL}", 'GITHUB'), 'GITHUB_TOKEN')
-            }
-        }
-        cleanup {
-            script {
-                cleanGoPath()
-                cleanWs()
-            }
-        }
-    }
-}
-
-void cleanGoPath() {
-    sh 'rm -rf $GOPATH/bin/*'
-}
-
-String getBDDParameters() {
-    testParamsMap = [:]
-
-    testParamsMap['load_default_config'] = true
-    testParamsMap['ci'] = 'j'
-    testParamsMap['load_factor'] = 3
-    testParamsMap['disable_maven_native_build_container'] = true
-
-    testParamsMap['operator_image_tag'] = 
"${OPENSHIFT_REGISTRY}/openshift/rhpam-kogito-rhel8-operator:pr-\$(echo 
\${GIT_COMMIT} | cut -c1-7)"
-
-    if (env.MAVEN_MIRROR_REPOSITORY) {
-        testParamsMap['maven_mirror_url'] = env.MAVEN_MIRROR_REPOSITORY
-        testParamsMap['maven_ignore_self_signed_certificate'] = true
-    }
-
-    // Reuse runtime application images from nightly builds
-    testParamsMap['image_cache_mode'] = 'always'
-
-    // Don't run tests using CLI as it is not supported for product
-    testParamsMap['cr_deployment_only'] = 'true'
-    testParamsMap['use_product_operator'] = 'true'
-
-    testParamsMap['container_engine'] = env.CONTAINER_ENGINE
-
-    // Clean the cluster before/after BDD test execution
-    testParamsMap['enable_clean_cluster'] = true
-
-    String testParams = testParamsMap.collect { entry -> 
"${entry.getKey()}=\"${entry.getValue()}\"" }.join(' ')
-    echo "BDD parameters = ${testParams}"
-    return testParams
-}
diff --git a/.ci/jenkins/Jenkinsfile.deploy b/.ci/jenkins/Jenkinsfile.deploy
index e5022f48..a49693fe 100644
--- a/.ci/jenkins/Jenkinsfile.deploy
+++ b/.ci/jenkins/Jenkinsfile.deploy
@@ -7,14 +7,10 @@ gitChanges = false
 
 pipeline {
     agent {
-        label 'kie-rhel8 && podman && kie-mem16g && !built-in'
-    }
-
-    // Needed for local build
-    tools {
-        maven env.BUILD_MAVEN_TOOL
-        jdk env.BUILD_JDK_TOOL
-        go 'golang-1.17'
+        docker { 
+            image env.AGENT_DOCKER_BUILDER_IMAGE
+            args env.AGENT_DOCKER_BUILDER_ARGS
+        }
     }
 
     options {
@@ -22,21 +18,14 @@ pipeline {
     }
 
     environment {
-        // Static env is defined into ./dsl/jobs.groovy file
-
         KOGITO_CI_EMAIL_TO = credentials("${JENKINS_EMAIL_CREDS_ID}")
 
-        CONTAINER_ENGINE = 'podman'
-        CONTAINER_TLS_OPTIONS = '--tls-verify=false'
-
-        JAVA_HOME = "${GRAALVM_HOME}"
-
         PR_BRANCH_HASH = "${util.generateHash(10)}"
 
         // Environment required by OLM tests when run from process
         OP_TEST_CONTAINER_OPT = '-t'
         OP_TEST_DEBUG = 1
-        OP_TEST_CONTAINER_TOOL = 'podman'
+        OP_TEST_CONTAINER_TOOL = 'docker'
     }
 
     stages {
diff --git a/.ci/jenkins/Jenkinsfile.examples-images.deploy 
b/.ci/jenkins/Jenkinsfile.examples-images.deploy
index 02a51f7b..cdbe9440 100644
--- a/.ci/jenkins/Jenkinsfile.examples-images.deploy
+++ b/.ci/jenkins/Jenkinsfile.examples-images.deploy
@@ -5,14 +5,10 @@ testsFailed = false
 
 pipeline {
     agent {
-        label 'kie-rhel8 && docker && kie-mem16g && !built-in'
-    }
-
-    // Needed for local build
-    tools {
-        maven env.BUILD_MAVEN_TOOL
-        jdk env.BUILD_JDK_TOOL
-        go 'golang-1.17'
+        docker { 
+            image env.AGENT_DOCKER_BUILDER_IMAGE
+            args env.AGENT_DOCKER_BUILDER_ARGS
+        }
     }
 
     options {
@@ -23,9 +19,7 @@ pipeline {
         KOGITO_CI_EMAIL_TO = credentials("${JENKINS_EMAIL_CREDS_ID}")
 
         CONTAINER_ENGINE = 'docker'
-        CONTAINER_TLS_OPTIONS = ''
-
-        JAVA_HOME = "${GRAALVM_HOME}"
+        CONTAINER_ENGINE_TLS_OPTIONS = ''
     }
 
     stages {
@@ -92,7 +86,6 @@ pipeline {
                 script {
                     try {
                         // Optaplanner taking a lot of resources, we should 
not build in parallel
-                        // There seems to be a problem with podman executed 
from the BDD tests ... Using docker instead for now ...
                         sh "make build-examples-images concurrent=1 
${getExamplesBuildParameters(true)}"
                     } catch (err) {
                         testsFailed = true
diff --git a/.ci/jenkins/Jenkinsfile.examples-images.promote 
b/.ci/jenkins/Jenkinsfile.examples-images.promote
index 870966f8..fb9f3e86 100644
--- a/.ci/jenkins/Jenkinsfile.examples-images.promote
+++ b/.ci/jenkins/Jenkinsfile.examples-images.promote
@@ -4,7 +4,10 @@ helper = null
 
 pipeline {
     agent {
-        label 'rhel8 && podman && !built-in'
+        docker { 
+            image env.AGENT_DOCKER_BUILDER_IMAGE
+            args env.AGENT_DOCKER_BUILDER_ARGS
+        }
     }
 
     options {
@@ -14,10 +17,8 @@ pipeline {
     environment {
         KOGITO_CI_EMAIL_TO = credentials("${JENKINS_EMAIL_CREDS_ID}")
 
-        CONTAINER_ENGINE = 'podman'
-        CONTAINER_TLS_OPTIONS = '--tls-verify=false'
-
-        GITHUB_REPO = "${REPO_NAME}" // for github-release cli
+        CONTAINER_ENGINE = 'docker'
+        CONTAINER_ENGINE_TLS_OPTIONS = ''
     }
 
     stages {
diff --git a/.ci/jenkins/Jenkinsfile.profiling 
b/.ci/jenkins/Jenkinsfile.profiling
index 03db97c9..02407d47 100644
--- a/.ci/jenkins/Jenkinsfile.profiling
+++ b/.ci/jenkins/Jenkinsfile.profiling
@@ -4,14 +4,10 @@ helper = null
 
 pipeline {
     agent {
-        label 'kie-rhel8 && podman && kie-mem16g && !built-in'
-    }
-
-    // Needed for local build
-    tools {
-        maven env.BUILD_MAVEN_TOOL
-        jdk env.BUILD_JDK_TOOL
-        go 'golang-1.17'
+        docker { 
+            image env.AGENT_DOCKER_BUILDER_IMAGE
+            args env.AGENT_DOCKER_BUILDER_ARGS
+        }
     }
 
     options {
@@ -21,12 +17,10 @@ pipeline {
     environment {
         KOGITO_CI_EMAIL_TO = credentials("${JENKINS_EMAIL_CREDS_ID}")
 
-        CONTAINER_ENGINE = 'podman'
-        CONTAINER_TLS_OPTIONS = '--tls-verify=false'
+        CONTAINER_ENGINE = 'docker'
+        CONTAINER_ENGINE_TLS_OPTIONS = ''
 
         CODECOV_TOKEN = credentials('KOGITO_OPERATOR_CODECOV_TOKEN')
-
-        JAVA_HOME = "${GRAALVM_HOME}"
     }
 
     stages {
diff --git a/.ci/jenkins/Jenkinsfile.promote b/.ci/jenkins/Jenkinsfile.promote
index c52bea46..698e86bd 100644
--- a/.ci/jenkins/Jenkinsfile.promote
+++ b/.ci/jenkins/Jenkinsfile.promote
@@ -6,7 +6,10 @@ helper = null
 
 pipeline {
     agent {
-        label 'rhel8 && podman && !built-in'
+        docker { 
+            image env.AGENT_DOCKER_BUILDER_IMAGE
+            args env.AGENT_DOCKER_BUILDER_ARGS
+        }
     }
 
     options {
@@ -16,11 +19,7 @@ pipeline {
     environment {
         KOGITO_CI_EMAIL_TO = credentials("${JENKINS_EMAIL_CREDS_ID}")
 
-        CONTAINER_ENGINE = 'podman'
-        CONTAINER_TLS_OPTIONS = '--tls-verify=false'
-
         PR_BRANCH_HASH = "${util.generateHash(10)}"
-        GITHUB_REPO = "${REPO_NAME}" // for github-release cli
     }
 
     stages {
diff --git a/.ci/jenkins/Jenkinsfile.setup-branch 
b/.ci/jenkins/Jenkinsfile.setup-branch
index 6f2cc535..2c71fdb7 100644
--- a/.ci/jenkins/Jenkinsfile.setup-branch
+++ b/.ci/jenkins/Jenkinsfile.setup-branch
@@ -4,11 +4,10 @@ helper = null
 
 pipeline {
     agent {
-        label 'kie-rhel8 && !built-in'
-    }
-
-    tools {
-        go 'golang-1.17'
+        docker { 
+            image env.AGENT_DOCKER_BUILDER_IMAGE
+            args env.AGENT_DOCKER_BUILDER_ARGS
+        }
     }
 
     options {
diff --git a/.ci/jenkins/dsl/jobs.groovy b/.ci/jenkins/dsl/jobs.groovy
index 73dba1cb..fb4e54ae 100644
--- a/.ci/jenkins/dsl/jobs.groovy
+++ b/.ci/jenkins/dsl/jobs.groovy
@@ -2,10 +2,10 @@
 * This file is describing all the Jenkins jobs in the DSL format (see 
https://plugins.jenkins.io/job-dsl/)
 * needed by the Kogito pipelines.
 *
-* The main part of Jenkins job generation is defined into the 
https://github.com/kiegroup/kogito-pipelines repository.
+* The main part of Jenkins job generation is defined into the 
https://github.com/apache/incubator-kie-kogito-pipelines repository.
 *
 * This file is making use of shared libraries defined in
-* 
https://github.com/kiegroup/kogito-pipelines/tree/main/dsl/seed/src/main/groovy/org/kie/jenkins/jobdsl.
+* 
https://github.com/apache/incubator-kie-kogito-pipelines/tree/main/dsl/seed/src/main/groovy/org/kie/jenkins/jobdsl.
 */
 
 import org.kie.jenkins.jobdsl.model.JobType
@@ -37,12 +37,11 @@ setupExamplesImagesPromoteJob(JobType.RELEASE)
 
 void setupProfilingJob() {
     def jobParams = JobParamsUtils.getBasicJobParamsWithEnv(this, 
'kogito-operator-profiling', JobType.NIGHTLY, 'sonarcloud', 
"${jenkins_path}/Jenkinsfile.profiling", 'Kogito Cloud Operator Profiling')
-    JobParamsUtils.setupJobParamsDefaultMavenConfiguration(this, jobParams)
+    JobParamsUtils.setupJobParamsAgentDockerBuilderImageConfiguration(this, 
jobParams)
     jobParams.triggers = [ cron : '@midnight' ]
     jobParams.env.putAll([
         JENKINS_EMAIL_CREDS_ID: "${JENKINS_EMAIL_CREDS_ID}",
 
-        REPO_NAME: 'kogito-operator',
         OPERATOR_IMAGE_NAME: 'kogito-operator-profiling',
         MAX_REGISTRY_RETRIES: 3,
         OPENSHIFT_API_KEY: 'OPENSHIFT_API',
@@ -60,10 +59,9 @@ void setupProfilingJob() {
 
 void createSetupBranchJob() {
     def jobParams = JobParamsUtils.getBasicJobParams(this, 'kogito-operator', 
JobType.SETUP_BRANCH, "${jenkins_path}/Jenkinsfile.setup-branch", 'Kogito Cloud 
Operator Init Branch')
-    JobParamsUtils.setupJobParamsDefaultMavenConfiguration(this, jobParams)
+    JobParamsUtils.setupJobParamsAgentDockerBuilderImageConfiguration(this, 
jobParams)
     jobParams.env.putAll([
         JENKINS_EMAIL_CREDS_ID: "${JENKINS_EMAIL_CREDS_ID}",
-        REPO_NAME: 'kogito-operator',
         GIT_AUTHOR: "${GIT_AUTHOR_NAME}",
         AUTHOR_CREDS_ID: "${GIT_AUTHOR_CREDENTIALS_ID}",
         GITHUB_TOKEN_CREDS_ID: "${GIT_AUTHOR_TOKEN_CREDENTIALS_ID}",
@@ -85,7 +83,7 @@ void createSetupBranchJob() {
 
 void setupDeployJob(JobType jobType) {
     def jobParams = JobParamsUtils.getBasicJobParams(this, 
'kogito-operator-deploy', jobType, "${jenkins_path}/Jenkinsfile.deploy", 
'Kogito Cloud Operator Deploy')
-    JobParamsUtils.setupJobParamsDefaultMavenConfiguration(this, jobParams)
+    JobParamsUtils.setupJobParamsAgentDockerBuilderImageConfiguration(this, 
jobParams)
     jobParams.env.putAll([
         JENKINS_EMAIL_CREDS_ID: "${JENKINS_EMAIL_CREDS_ID}",
 
@@ -127,7 +125,7 @@ void setupDeployJob(JobType jobType) {
 
             // Deploy information
             booleanParam('IMAGE_USE_OPENSHIFT_REGISTRY', false, 'Set to true 
if image should be deployed in Openshift registry.In this case, 
IMAGE_REGISTRY_CREDENTIALS, IMAGE_REGISTRY and IMAGE_NAMESPACE parameters will 
be ignored')
-            stringParam('IMAGE_REGISTRY_CREDENTIALS', 
"${CLOUD_IMAGE_REGISTRY_CREDENTIALS_NIGHTLY}", 'Image registry credentials to 
use to deploy images. Will be ignored if no IMAGE_REGISTRY is given')
+            stringParam('IMAGE_REGISTRY_CREDENTIALS', 
"${CLOUD_IMAGE_REGISTRY_CREDENTIALS}", 'Image registry credentials to use to 
deploy images. Will be ignored if no IMAGE_REGISTRY is given')
             stringParam('IMAGE_REGISTRY', "${CLOUD_IMAGE_REGISTRY}", 'Image 
registry to use to deploy images')
             stringParam('IMAGE_NAMESPACE', "${CLOUD_IMAGE_NAMESPACE}", 'Image 
namespace to use to deploy images')
             stringParam('IMAGE_NAME_SUFFIX', '', 'Image name suffix to use to 
deploy images. In case you need to change the final image name, you can add a 
suffix to it.')
@@ -161,10 +159,10 @@ void setupDeployJob(JobType jobType) {
 
 void setupPromoteJob(JobType jobType) {
     def jobParams = JobParamsUtils.getBasicJobParams(this, 
'kogito-operator-promote', jobType, "${jenkins_path}/Jenkinsfile.promote", 
'Kogito Cloud Operator Promote')
+    JobParamsUtils.setupJobParamsAgentDockerBuilderImageConfiguration(this, 
jobParams)
     jobParams.env.putAll([
         JENKINS_EMAIL_CREDS_ID: "${JENKINS_EMAIL_CREDS_ID}",
 
-        REPO_NAME: 'kogito-operator',
         MAX_REGISTRY_RETRIES: 3,
         OPENSHIFT_API_KEY: 'OPENSHIFT_API',
         OPENSHIFT_CREDS_KEY: 'OPENSHIFT_CREDS',
@@ -186,7 +184,7 @@ void setupPromoteJob(JobType jobType) {
 
             // Base information which can override `deployment.properties`
             booleanParam('BASE_IMAGE_USE_OPENSHIFT_REGISTRY', false, 'Override 
`deployment.properties`. Set to true if base image should be deployed in 
Openshift registry.In this case, BASE_IMAGE_REGISTRY_CREDENTIALS, 
BASE_IMAGE_REGISTRY and BASE_IMAGE_NAMESPACE parameters will be ignored')
-            stringParam('BASE_IMAGE_REGISTRY_CREDENTIALS', 
"${CLOUD_IMAGE_REGISTRY_CREDENTIALS_NIGHTLY}", 'Override 
`deployment.properties`. Base Image registry credentials to use to deploy 
images. Will be ignored if no BASE_IMAGE_REGISTRY is given')
+            stringParam('BASE_IMAGE_REGISTRY_CREDENTIALS', 
"${CLOUD_IMAGE_REGISTRY_CREDENTIALS}", 'Override `deployment.properties`. Base 
Image registry credentials to use to deploy images. Will be ignored if no 
BASE_IMAGE_REGISTRY is given')
             stringParam('BASE_IMAGE_REGISTRY', "${CLOUD_IMAGE_REGISTRY}", 
'Override `deployment.properties`. Base image registry')
             stringParam('BASE_IMAGE_NAMESPACE', "${CLOUD_IMAGE_NAMESPACE}", 
'Override `deployment.properties`. Base image namespace')
             stringParam('BASE_IMAGE_NAME_SUFFIX', '', 'Override 
`deployment.properties`. Base image name suffix')
@@ -194,7 +192,7 @@ void setupPromoteJob(JobType jobType) {
 
             // Promote information
             booleanParam('PROMOTE_IMAGE_USE_OPENSHIFT_REGISTRY', false, 'Set 
to true if base image should be deployed in Openshift registry.In this case, 
PROMOTE_IMAGE_REGISTRY_CREDENTIALS, PROMOTE_IMAGE_REGISTRY and 
PROMOTE_IMAGE_NAMESPACE parameters will be ignored')
-            stringParam('PROMOTE_IMAGE_REGISTRY_CREDENTIALS', 
"${CLOUD_IMAGE_REGISTRY_CREDENTIALS_NIGHTLY}", 'Promote Image registry 
credentials to use to deploy images. Will be ignored if no 
PROMOTE_IMAGE_REGISTRY is given')
+            stringParam('PROMOTE_IMAGE_REGISTRY_CREDENTIALS', 
"${CLOUD_IMAGE_REGISTRY_CREDENTIALS}", 'Promote Image registry credentials to 
use to deploy images. Will be ignored if no PROMOTE_IMAGE_REGISTRY is given')
             stringParam('PROMOTE_IMAGE_REGISTRY', "${CLOUD_IMAGE_REGISTRY}", 
'Promote image registry')
             stringParam('PROMOTE_IMAGE_NAMESPACE', "${CLOUD_IMAGE_NAMESPACE}", 
'Promote image namespace')
             stringParam('PROMOTE_IMAGE_NAME_SUFFIX', '', 'Promote image name 
suffix')
@@ -212,7 +210,7 @@ void setupPromoteJob(JobType jobType) {
 
 void setupExamplesImagesDeployJob(JobType jobType, String jobName = 
'kogito-examples-images-deploy', Map extraEnv = [:]) {
     def jobParams = JobParamsUtils.getBasicJobParams(this, jobName, jobType, 
"${jenkins_path}/Jenkinsfile.examples-images.deploy", 'Kogito Examples Images 
Deploy')
-    JobParamsUtils.setupJobParamsDefaultMavenConfiguration(this, jobParams)
+    JobParamsUtils.setupJobParamsAgentDockerBuilderImageConfiguration(this, 
jobParams)
     jobParams.env.putAll(extraEnv)
     if (jobType == JobType.PULL_REQUEST) {
         jobParams.git.branch = '${BUILD_BRANCH_NAME}'
@@ -222,7 +220,6 @@ void setupExamplesImagesDeployJob(JobType jobType, String 
jobName = 'kogito-exam
     jobParams.env.putAll([
         JENKINS_EMAIL_CREDS_ID: "${JENKINS_EMAIL_CREDS_ID}",
 
-        REPO_NAME: 'kogito-operator',
         MAX_REGISTRY_RETRIES: 3,
         OPENSHIFT_API_KEY: 'OPENSHIFT_API',
         OPENSHIFT_CREDS_KEY: 'OPENSHIFT_CREDS',
@@ -261,7 +258,7 @@ void setupExamplesImagesDeployJob(JobType jobType, String 
jobName = 'kogito-exam
 
             // Deploy information
             booleanParam('IMAGE_USE_OPENSHIFT_REGISTRY', false, 'Set to true 
if image should be deployed in Openshift registry.In this case, 
IMAGE_REGISTRY_CREDENTIALS, IMAGE_REGISTRY and IMAGE_NAMESPACE parameters will 
be ignored')
-            stringParam('IMAGE_REGISTRY_CREDENTIALS', 
"${CLOUD_IMAGE_REGISTRY_CREDENTIALS_NIGHTLY}", 'Image registry credentials to 
use to deploy images. Will be ignored if no IMAGE_REGISTRY is given')
+            stringParam('IMAGE_REGISTRY_CREDENTIALS', 
"${CLOUD_IMAGE_REGISTRY_CREDENTIALS}", 'Image registry credentials to use to 
deploy images. Will be ignored if no IMAGE_REGISTRY is given')
             stringParam('IMAGE_REGISTRY', "${CLOUD_IMAGE_REGISTRY}", 'Image 
registry to use to deploy images')
             stringParam('IMAGE_NAMESPACE', "${CLOUD_IMAGE_NAMESPACE}", 'Image 
namespace to use to deploy images')
             stringParam('IMAGE_NAME_PREFIX', '', 'Image name prefix to use to 
deploy images. In case you need to change the final image name, you can add a 
prefix to it.')
@@ -283,10 +280,10 @@ void setupExamplesImagesDeployJob(JobType jobType, String 
jobName = 'kogito-exam
 
 void setupExamplesImagesPromoteJob(JobType jobType) {
     def jobParams = JobParamsUtils.getBasicJobParams(this, 
'kogito-examples-images-promote', jobType, 
"${jenkins_path}/Jenkinsfile.examples-images.promote", 'Kogito Examples Images 
Promote')
+    JobParamsUtils.setupJobParamsAgentDockerBuilderImageConfiguration(this, 
jobParams)
     jobParams.env.putAll([
         JENKINS_EMAIL_CREDS_ID: "${JENKINS_EMAIL_CREDS_ID}",
 
-        REPO_NAME: 'kogito-operator',
         MAX_REGISTRY_RETRIES: 3,
         OPENSHIFT_API_KEY: 'OPENSHIFT_API',
         OPENSHIFT_CREDS_KEY: 'OPENSHIFT_CREDS',
@@ -305,7 +302,7 @@ void setupExamplesImagesPromoteJob(JobType jobType) {
 
             // Base information which can override `deployment.properties`
             booleanParam('BASE_IMAGE_USE_OPENSHIFT_REGISTRY', false, 'Override 
`deployment.properties`. Set to true if base image should be deployed in 
Openshift registry.In this case, BASE_IMAGE_REGISTRY_CREDENTIALS, 
BASE_IMAGE_REGISTRY and BASE_IMAGE_NAMESPACE parameters will be ignored')
-            stringParam('BASE_IMAGE_REGISTRY_CREDENTIALS', 
"${CLOUD_IMAGE_REGISTRY_CREDENTIALS_NIGHTLY}", 'Override 
`deployment.properties`. Base Image registry credentials to use to deploy 
images. Will be ignored if no BASE_IMAGE_REGISTRY is given')
+            stringParam('BASE_IMAGE_REGISTRY_CREDENTIALS', 
"${CLOUD_IMAGE_REGISTRY_CREDENTIALS}", 'Override `deployment.properties`. Base 
Image registry credentials to use to deploy images. Will be ignored if no 
BASE_IMAGE_REGISTRY is given')
             stringParam('BASE_IMAGE_REGISTRY', "${CLOUD_IMAGE_REGISTRY}", 
'Override `deployment.properties`. Base image registry')
             stringParam('BASE_IMAGE_NAMESPACE', "${CLOUD_IMAGE_NAMESPACE}", 
'Override `deployment.properties`. Base image namespace')
             stringParam('BASE_IMAGE_NAME_PREFIX', '', 'Override 
`deployment.properties`. Base image name prefix')
@@ -315,7 +312,7 @@ void setupExamplesImagesPromoteJob(JobType jobType) {
 
             // Promote information
             booleanParam('PROMOTE_IMAGE_USE_OPENSHIFT_REGISTRY', false, 'Set 
to true if base image should be deployed in Openshift registry.In this case, 
PROMOTE_IMAGE_REGISTRY_CREDENTIALS, PROMOTE_IMAGE_REGISTRY and 
PROMOTE_IMAGE_NAMESPACE parameters will be ignored')
-            stringParam('PROMOTE_IMAGE_REGISTRY_CREDENTIALS', 
"${CLOUD_IMAGE_REGISTRY_CREDENTIALS_NIGHTLY}", 'Promote Image registry 
credentials to use to deploy images. Will be ignored if no 
PROMOTE_IMAGE_REGISTRY is given')
+            stringParam('PROMOTE_IMAGE_REGISTRY_CREDENTIALS', 
"${CLOUD_IMAGE_REGISTRY_CREDENTIALS}", 'Promote Image registry credentials to 
use to deploy images. Will be ignored if no PROMOTE_IMAGE_REGISTRY is given')
             stringParam('PROMOTE_IMAGE_REGISTRY', "${CLOUD_IMAGE_REGISTRY}", 
'Promote image registry')
             stringParam('PROMOTE_IMAGE_NAMESPACE', "${CLOUD_IMAGE_NAMESPACE}", 
'Promote image namespace')
             stringParam('PROMOTE_IMAGE_NAME_PREFIX', '', 'Promote image name 
prefix')
diff --git a/.ci/jenkins/dsl/test.sh b/.ci/jenkins/dsl/test.sh
index ad8af34a..2d518eb9 100755
--- a/.ci/jenkins/dsl/test.sh
+++ b/.ci/jenkins/dsl/test.sh
@@ -1,6 +1,6 @@
 #!/bin/bash -e
 file=$(mktemp)
 # For more usage of the script, use ./test.sh -h
-curl -o ${file} 
https://raw.githubusercontent.com/kiegroup/kogito-pipelines/main/dsl/seed/scripts/seed_test.sh
+curl -o ${file} 
https://raw.githubusercontent.com/apache/incubator-kie-kogito-pipelines/main/dsl/seed/scripts/seed_test.sh
 chmod u+x ${file}
 ${file} $@
\ No newline at end of file
diff --git a/.ci/jenkins/scripts/container.groovy 
b/.ci/jenkins/scripts/container.groovy
index 96526a50..a88d05ef 100644
--- a/.ci/jenkins/scripts/container.groovy
+++ b/.ci/jenkins/scripts/container.groovy
@@ -1,7 +1,7 @@
 containerOpenshift = null
 
-containerEngine = 'podman'
-containerTlsOptions = '--tls-verify=false'
+containerEngine = 'docker'
+containerTlsOptions = ''
 
 void pullImage(String image) {
     retry(env.MAX_REGISTRY_RETRIES ?: 1) {
diff --git a/.ci/jenkins/scripts/helper.groovy 
b/.ci/jenkins/scripts/helper.groovy
index 8b1c0ed4..886b8dff 100644
--- a/.ci/jenkins/scripts/helper.groovy
+++ b/.ci/jenkins/scripts/helper.groovy
@@ -15,7 +15,7 @@ void initPipeline() {
 
     container = load '.ci/jenkins/scripts/container.groovy'
     container.containerEngine = env.CONTAINER_ENGINE
-    container.containerTlsOptions = env.CONTAINER_TLS_OPTIONS ?: ''
+    container.containerTlsOptions = env.CONTAINER_ENGINE_TLS_OPTIONS ?: ''
     container.containerOpenshift = openshift
 }
 
diff --git a/.github/bot-files/comments.yml b/.github/bot-files/comments.yml
index 7341f950..04db5ee1 100644
--- a/.github/bot-files/comments.yml
+++ b/.github/bot-files/comments.yml
@@ -2,7 +2,7 @@
 # for now you'll need to difine every comment here, in the future comments 
will be optional.
 # please see the example for the file below
 
-prFirstTimeContributor: Welcome to the Kogito Community!. Please make sure 
you've read the [contributors' 
guide](https://github.com/kiegroup/kogito-operator/blob/main/README.md#contributing-to-the-kogito-operator)
+prFirstTimeContributor: Welcome to the Kogito Community!. Please make sure 
you've read the [contributors' 
guide](https://github.com/apache/incubator-kie-kogito-operator/blob/main/README.md#contributing-to-the-kogito-operator)
 
 prCiTrigger: /jenkins test
 
diff --git a/.github/pull_request_template.md b/.github/pull_request_template.md
index 69c2c346..87bb12ef 100644
--- a/.github/pull_request_template.md
+++ b/.github/pull_request_template.md
@@ -2,7 +2,7 @@ Many thanks for submitting your Pull Request :heart:!
 
 Please make sure your PR meets the following requirements:
 
-- [ ] You have read the [contributors' 
guide](https://github.com/kiegroup/kogito-operator/blob/main/README.md#contributing-to-the-kogito-operator)
+- [ ] You have read the [contributors' 
guide](https://github.com/apache/incubator-kie-kogito-operator/blob/main/README.md#contributing-to-the-kogito-operator)
 - [ ] Pull Request title is properly formatted: `[KOGITO-XYZ] Subject`
 - [ ] Pull Request contains a link to the JIRA issue
 - [ ] Pull Request contains a description of the issue
@@ -10,7 +10,7 @@ Please make sure your PR meets the following requirements:
 - [ ] Your feature/bug fix has a unit test that verifies it
 - [ ] You've ran `make before-pr` and everything is working accordingly
 - [ ] You've tested the new feature/bug fix in an actual OpenShift cluster
-- [ ] You've added a 
[RELEASE_NOTES.md](https://github.com/kiegroup/kogito-operator/blob/main/RELEASE_NOTES.md)
 entry regarding this change
+- [ ] You've added a 
[RELEASE_NOTES.md](https://github.com/apache/incubator-kie-kogito-operator/blob/main/RELEASE_NOTES.md)
 entry regarding this change
 
 <details>
 <summary>
diff --git a/.github/workflows/jenkins-tests-PR.yml 
b/.github/workflows/jenkins-tests-PR.yml
index bf3815cb..324a2deb 100644
--- a/.github/workflows/jenkins-tests-PR.yml
+++ b/.github/workflows/jenkins-tests-PR.yml
@@ -17,6 +17,6 @@ jobs:
     - name: DSL tests
       uses: kiegroup/kie-ci/.ci/actions/dsl-tests@main
       with:
-        main-config-file-repo: kiegroup/kogito-pipelines
+        main-config-file-repo: apache/incubator-kie-kogito-pipelines
         main-config-file-path: .ci/jenkins/config/main.yaml
-        branch-config-file-repo: kiegroup/kogito-pipelines
+        branch-config-file-repo: apache/incubator-kie-kogito-pipelines


---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to