2019-02-21 15:04:33 +00:00
|
|
|
// Copyright 2019 Sorint.lab
|
|
|
|
//
|
|
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
// you may not use this file except in compliance with the License.
|
|
|
|
// You may obtain a copy of the License at
|
|
|
|
//
|
|
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
//
|
|
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied
|
|
|
|
// See the License for the specific language governing permissions and
|
|
|
|
// limitations under the License.
|
|
|
|
|
|
|
|
package scheduler
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
2019-05-06 13:19:29 +00:00
|
|
|
"encoding/json"
|
2019-02-21 15:04:33 +00:00
|
|
|
"fmt"
|
|
|
|
"time"
|
|
|
|
|
|
|
|
slog "github.com/sorintlab/agola/internal/log"
|
2019-05-15 07:38:27 +00:00
|
|
|
"github.com/sorintlab/agola/internal/services/common"
|
2019-02-21 15:04:33 +00:00
|
|
|
"github.com/sorintlab/agola/internal/services/config"
|
2019-05-07 21:56:10 +00:00
|
|
|
rsapi "github.com/sorintlab/agola/internal/services/runservice/api"
|
2019-04-29 08:14:10 +00:00
|
|
|
"github.com/sorintlab/agola/internal/util"
|
2019-02-21 15:04:33 +00:00
|
|
|
|
|
|
|
"github.com/pkg/errors"
|
|
|
|
"go.uber.org/zap"
|
|
|
|
"go.uber.org/zap/zapcore"
|
|
|
|
)
|
|
|
|
|
|
|
|
var level = zap.NewAtomicLevelAt(zapcore.InfoLevel)
|
|
|
|
var logger = slog.New(level)
|
|
|
|
var log = logger.Sugar()
|
|
|
|
|
|
|
|
func (s *Scheduler) scheduleLoop(ctx context.Context) {
|
|
|
|
for {
|
|
|
|
if err := s.schedule(ctx); err != nil {
|
|
|
|
log.Errorf("err: %+v", err)
|
|
|
|
}
|
|
|
|
time.Sleep(1 * time.Second)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *Scheduler) schedule(ctx context.Context) error {
|
|
|
|
// create a list of project and users with queued runs
|
|
|
|
groups := map[string]struct{}{}
|
|
|
|
|
|
|
|
var lastRunID string
|
|
|
|
for {
|
2019-05-06 13:19:29 +00:00
|
|
|
queuedRunsResponse, _, err := s.runserviceClient.GetQueuedRuns(ctx, lastRunID, 0, nil)
|
2019-02-21 15:04:33 +00:00
|
|
|
if err != nil {
|
|
|
|
return errors.Wrapf(err, "failed to get queued runs")
|
|
|
|
}
|
|
|
|
//log.Infof("queuedRuns: %s", util.Dump(queuedRunsResponse.Runs))
|
|
|
|
|
|
|
|
for _, run := range queuedRunsResponse.Runs {
|
|
|
|
groups[run.Group] = struct{}{}
|
|
|
|
}
|
|
|
|
|
|
|
|
if len(queuedRunsResponse.Runs) == 0 {
|
|
|
|
break
|
|
|
|
}
|
|
|
|
|
2019-05-06 13:19:29 +00:00
|
|
|
lastRunID = queuedRunsResponse.Runs[len(queuedRunsResponse.Runs)-1].ID
|
2019-02-21 15:04:33 +00:00
|
|
|
}
|
|
|
|
|
2019-03-29 11:15:48 +00:00
|
|
|
for groupID := range groups {
|
2019-02-21 15:04:33 +00:00
|
|
|
if err := s.scheduleRun(ctx, groupID); err != nil {
|
|
|
|
log.Errorf("scheduler err: %v", err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *Scheduler) scheduleRun(ctx context.Context, groupID string) error {
|
|
|
|
// get first queued run
|
|
|
|
queuedRunsResponse, _, err := s.runserviceClient.GetGroupFirstQueuedRuns(ctx, groupID, nil)
|
|
|
|
//log.Infof("first queuedRuns: %s", util.Dump(queuedRunsResponse.Runs))
|
|
|
|
if err != nil {
|
|
|
|
return errors.Wrapf(err, "failed to get the first project queued run")
|
|
|
|
}
|
|
|
|
if len(queuedRunsResponse.Runs) == 0 {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
//log.Infof("queued runs: %s", queuedRunsResponse.Runs)
|
|
|
|
run := queuedRunsResponse.Runs[0]
|
|
|
|
|
2019-04-29 08:14:10 +00:00
|
|
|
changegroup := util.EncodeSha256Hex(fmt.Sprintf("changegroup-%s", groupID))
|
|
|
|
runningRunsResponse, _, err := s.runserviceClient.GetGroupRunningRuns(ctx, groupID, 1, []string{changegroup})
|
2019-02-21 15:04:33 +00:00
|
|
|
if err != nil {
|
|
|
|
return errors.Wrapf(err, "failed to get running runs")
|
|
|
|
}
|
|
|
|
//log.Infof("running Runs: %s", util.Dump(runningRunsResponse.Runs))
|
|
|
|
if len(runningRunsResponse.Runs) == 0 {
|
|
|
|
log.Infof("starting run %s", run.ID)
|
|
|
|
log.Infof("changegroups: %s", runningRunsResponse.ChangeGroupsUpdateToken)
|
|
|
|
if _, err := s.runserviceClient.StartRun(ctx, run.ID, runningRunsResponse.ChangeGroupsUpdateToken); err != nil {
|
|
|
|
log.Errorf("failed to start run %s: %v", run.ID, err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2019-05-06 13:19:29 +00:00
|
|
|
func (s *Scheduler) approveLoop(ctx context.Context) {
|
|
|
|
for {
|
|
|
|
if err := s.approve(ctx); err != nil {
|
|
|
|
log.Errorf("err: %+v", err)
|
|
|
|
}
|
|
|
|
time.Sleep(1 * time.Second)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *Scheduler) approve(ctx context.Context) error {
|
|
|
|
var lastRunID string
|
|
|
|
for {
|
|
|
|
runningRunsResponse, _, err := s.runserviceClient.GetRunningRuns(ctx, lastRunID, 0, nil)
|
|
|
|
if err != nil {
|
|
|
|
return errors.Wrapf(err, "failed to get running runs")
|
|
|
|
}
|
|
|
|
|
|
|
|
if len(runningRunsResponse.Runs) == 0 {
|
|
|
|
break
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, run := range runningRunsResponse.Runs {
|
|
|
|
if err := s.approveRunTasks(ctx, run.ID); err != nil {
|
|
|
|
// just log error and continue with the other runs
|
|
|
|
log.Errorf("failed to approve run tasks for run %q: %+v", run.ID, err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
lastRunID = runningRunsResponse.Runs[len(runningRunsResponse.Runs)-1].ID
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *Scheduler) approveRunTasks(ctx context.Context, runID string) error {
|
|
|
|
// refetch run with a dedicated changegroup
|
|
|
|
changegroup := util.EncodeSha256Hex(fmt.Sprintf("approval-%s", runID))
|
|
|
|
runResp, _, err := s.runserviceClient.GetRun(ctx, runID, []string{changegroup})
|
|
|
|
if err != nil {
|
|
|
|
return errors.Wrapf(err, "failed to get run %q", runID)
|
|
|
|
}
|
|
|
|
run := runResp.Run
|
|
|
|
|
|
|
|
tasksWaitingApproval := run.TasksWaitingApproval()
|
|
|
|
for _, rtID := range tasksWaitingApproval {
|
|
|
|
rt, ok := run.Tasks[rtID]
|
|
|
|
if !ok {
|
|
|
|
return util.NewErrBadRequest(errors.Errorf("run %q doesn't have task %q", run.ID, rtID))
|
|
|
|
}
|
|
|
|
annotations := rt.Annotations
|
|
|
|
if annotations == nil {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
approversAnnotation, ok := annotations[common.ApproversAnnotation]
|
|
|
|
if !ok {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
var approvers []string
|
|
|
|
if err := json.Unmarshal([]byte(approversAnnotation), &approvers); err != nil {
|
|
|
|
return errors.Wrapf(err, "failed to unmarshal run task approvers annotation")
|
|
|
|
}
|
|
|
|
// TODO(sgotti) change when we introduce a config the set the minimum number of required approvers
|
|
|
|
if len(approvers) > 0 {
|
|
|
|
rsreq := &rsapi.RunTaskActionsRequest{
|
|
|
|
ActionType: rsapi.RunTaskActionTypeApprove,
|
|
|
|
ChangeGroupsUpdateToken: runResp.ChangeGroupsUpdateToken,
|
|
|
|
}
|
|
|
|
if _, err := s.runserviceClient.RunTaskActions(ctx, run.ID, rt.ID, rsreq); err != nil {
|
|
|
|
return errors.Wrapf(err, "failed to approve run")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2019-02-21 15:04:33 +00:00
|
|
|
type Scheduler struct {
|
|
|
|
c *config.Scheduler
|
|
|
|
runserviceClient *rsapi.Client
|
|
|
|
}
|
|
|
|
|
|
|
|
func NewScheduler(c *config.Scheduler) (*Scheduler, error) {
|
|
|
|
if c.Debug {
|
|
|
|
level.SetLevel(zapcore.DebugLevel)
|
|
|
|
}
|
|
|
|
|
|
|
|
return &Scheduler{
|
2019-05-07 21:56:10 +00:00
|
|
|
runserviceClient: rsapi.NewClient(c.RunserviceURL),
|
2019-02-21 15:04:33 +00:00
|
|
|
}, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *Scheduler) Run(ctx context.Context) error {
|
|
|
|
go s.scheduleLoop(ctx)
|
2019-05-06 13:19:29 +00:00
|
|
|
go s.approveLoop(ctx)
|
2019-02-21 15:04:33 +00:00
|
|
|
|
|
|
|
select {
|
|
|
|
case <-ctx.Done():
|
|
|
|
log.Infof("scheduler exiting")
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
}
|