@@ -142,10 +142,7 @@ export async function deployToPreviewEnvironment(werft: Werft, jobConfig: JobCon
142
142
await installMetaCertificates ( werft , jobConfig . repository . branch , withVM , 'default' , PREVIEW_K3S_KUBECONFIG_PATH , vmSlices . COPY_CERT_MANAGER_RESOURCES )
143
143
werft . done ( vmSlices . COPY_CERT_MANAGER_RESOURCES )
144
144
} catch ( err ) {
145
- if ( ! jobConfig . mainBuild ) {
146
- werft . fail ( vmSlices . COPY_CERT_MANAGER_RESOURCES , err ) ;
147
- }
148
- exec ( 'exit 0' )
145
+ werft . fail ( vmSlices . COPY_CERT_MANAGER_RESOURCES , err ) ;
149
146
}
150
147
151
148
// Deploying monitoring satellite to VM-based preview environments is currently best-effort.
@@ -262,10 +259,7 @@ async function deployToDevWithInstaller(werft: Werft, jobConfig: JobConfig, depl
262
259
}
263
260
werft . done ( installerSlices . CLEAN_ENV_STATE ) ;
264
261
} catch ( err ) {
265
- if ( ! jobConfig . mainBuild ) {
266
- werft . fail ( installerSlices . CLEAN_ENV_STATE , err ) ;
267
- }
268
- exec ( 'exit 0' )
262
+ werft . fail ( installerSlices . CLEAN_ENV_STATE , err ) ;
269
263
}
270
264
271
265
if ( ! withVM ) {
@@ -278,10 +272,7 @@ async function deployToDevWithInstaller(werft: Werft, jobConfig: JobConfig, depl
278
272
await installMetaCertificates ( werft , jobConfig . repository . branch , jobConfig . withVM , namespace , CORE_DEV_KUBECONFIG_PATH , installerSlices . COPY_CERTIFICATES ) ;
279
273
werft . done ( installerSlices . COPY_CERTIFICATES ) ;
280
274
} catch ( err ) {
281
- if ( ! jobConfig . mainBuild ) {
282
- werft . fail ( installerSlices . COPY_CERTIFICATES , err ) ;
283
- }
284
- exec ( 'exit 0' )
275
+ werft . fail ( installerSlices . COPY_CERTIFICATES , err ) ;
285
276
}
286
277
}
287
278
@@ -295,10 +286,7 @@ async function deployToDevWithInstaller(werft: Werft, jobConfig: JobConfig, depl
295
286
exec ( `kubectl --kubeconfig ${ deploymentKubeconfig } create secret docker-registry ${ IMAGE_PULL_SECRET_NAME } -n ${ namespace } --from-file=.dockerconfigjson=./${ IMAGE_PULL_SECRET_NAME } ` , { slice : installerSlices . IMAGE_PULL_SECRET } ) ;
296
287
}
297
288
catch ( err ) {
298
- if ( ! jobConfig . mainBuild ) {
299
- werft . fail ( installerSlices . IMAGE_PULL_SECRET , err ) ;
300
- }
301
- exec ( 'exit 0' )
289
+ werft . fail ( installerSlices . IMAGE_PULL_SECRET , err ) ;
302
290
}
303
291
}
304
292
werft . done ( installerSlices . IMAGE_PULL_SECRET ) ;
@@ -338,10 +326,7 @@ async function deployToDevWithInstaller(werft: Werft, jobConfig: JobConfig, depl
338
326
installer . postProcessing ( installerSlices . INSTALLER_POST_PROCESSING )
339
327
installer . install ( installerSlices . APPLY_INSTALL_MANIFESTS )
340
328
} catch ( err ) {
341
- if ( ! jobConfig . mainBuild ) {
342
- werft . fail ( phases . DEPLOY , err )
343
- }
344
- exec ( 'exit 0' )
329
+ werft . fail ( phases . DEPLOY , err )
345
330
}
346
331
347
332
werft . log ( installerSlices . DEPLOYMENT_WAITING , "Waiting until all pods are ready." ) ;
@@ -410,10 +395,7 @@ async function deployToDevWithHelm(werft: Werft, jobConfig: JobConfig, deploymen
410
395
await addDNSRecord ( werft , deploymentConfig . namespace , deploymentConfig . domain , false , CORE_DEV_KUBECONFIG_PATH )
411
396
werft . done ( 'prep' ) ;
412
397
} catch ( err ) {
413
- if ( ! jobConfig . mainBuild ) {
414
- werft . fail ( 'prep' , err ) ;
415
- }
416
- exec ( 'exit 0' )
398
+ werft . fail ( 'prep' , err ) ;
417
399
}
418
400
419
401
// core-dev specific section start
@@ -435,10 +417,7 @@ async function deployToDevWithHelm(werft: Werft, jobConfig: JobConfig, deploymen
435
417
}` ) ;
436
418
werft . done ( 'secret' ) ;
437
419
} catch ( err ) {
438
- if ( ! jobConfig . mainBuild ) {
439
- werft . fail ( 'secret' , err ) ;
440
- }
441
- exec ( 'exit 0' )
420
+ werft . fail ( 'secret' , err ) ;
442
421
}
443
422
444
423
werft . log ( "authProviders" , "copy authProviders" )
@@ -450,10 +429,7 @@ async function deployToDevWithHelm(werft: Werft, jobConfig: JobConfig, deploymen
450
429
exec ( `yq merge --inplace .werft/jobs/build/helm/values.dev.yaml ./authProviders` , { slice : "authProviders" } )
451
430
werft . done ( 'authProviders' ) ;
452
431
} catch ( err ) {
453
- if ( ! jobConfig . mainBuild ) {
454
- werft . fail ( 'authProviders' , err ) ;
455
- }
456
- exec ( 'exit 0' )
432
+ werft . fail ( 'authProviders' , err ) ;
457
433
}
458
434
// core-dev specific section end
459
435
@@ -478,10 +454,7 @@ async function deployToDevWithHelm(werft: Werft, jobConfig: JobConfig, deploymen
478
454
} ) ;
479
455
await installMonitoringSatellite . install ( )
480
456
} catch ( err ) {
481
- if ( ! jobConfig . mainBuild ) {
482
- werft . fail ( 'observability' , err ) ;
483
- }
484
- exec ( 'exit 0' )
457
+ werft . fail ( 'observability' , err ) ;
485
458
}
486
459
} else {
487
460
exec ( `echo '"with-observability" annotation not set, skipping...'` , { slice : `observability` } )
@@ -500,10 +473,7 @@ async function deployToDevWithHelm(werft: Werft, jobConfig: JobConfig, deploymen
500
473
werft . log ( 'helm' , 'done' ) ;
501
474
werft . done ( 'helm' ) ;
502
475
} catch ( err ) {
503
- if ( ! jobConfig . mainBuild ) {
504
- werft . fail ( 'deploy' , err ) ;
505
- }
506
- exec ( 'exit 0' )
476
+ werft . fail ( 'deploy' , err ) ;
507
477
} finally {
508
478
// produce the result independently of Helm succeding, so that in case Helm fails we still have the URL.
509
479
exec ( `werft log result -d "dev installation" -c github-check-preview-env url ${ url } /workspaces` ) ;
@@ -559,10 +529,7 @@ async function deployToDevWithHelm(werft: Werft, jobConfig: JobConfig, deploymen
559
529
try {
560
530
exec ( `docker run --rm eu.gcr.io/gitpod-core-dev/build/versions:${ version } cat /versions.yaml | tee versions.yaml` ) ;
561
531
} catch ( err ) {
562
- if ( ! jobConfig . mainBuild ) {
563
- werft . fail ( 'helm' , err ) ;
564
- }
565
- exec ( 'exit 0' )
532
+ werft . fail ( 'helm' , err ) ;
566
533
}
567
534
const pathToVersions = `${ shell . pwd ( ) . toString ( ) } /versions.yaml` ;
568
535
flags += ` -f ${ pathToVersions } ` ;
@@ -590,10 +557,7 @@ async function deployToDevWithHelm(werft: Werft, jobConfig: JobConfig, deploymen
590
557
await deleteNonNamespaceObjects ( namespace , destname , CORE_DEV_KUBECONFIG_PATH , { ...shellOpts , slice : 'predeploy cleanup' } ) ;
591
558
werft . done ( 'predeploy cleanup' ) ;
592
559
} catch ( err ) {
593
- if ( ! jobConfig . mainBuild ) {
594
- werft . fail ( 'predeploy cleanup' , err ) ;
595
- }
596
- exec ( 'exit 0' )
560
+ werft . fail ( 'predeploy cleanup' , err ) ;
597
561
}
598
562
}
599
563
}
0 commit comments