2019-02-21 14:54:50 +00:00
|
|
|
// Copyright 2019 Sorint.lab
|
|
|
|
//
|
|
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
// you may not use this file except in compliance with the License.
|
|
|
|
// You may obtain a copy of the License at
|
|
|
|
//
|
|
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
//
|
|
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied
|
|
|
|
// See the License for the specific language governing permissions and
|
|
|
|
// limitations under the License.
|
|
|
|
|
2019-05-07 21:56:10 +00:00
|
|
|
package runservice
|
2019-02-21 14:54:50 +00:00
|
|
|
|
|
|
|
import (
|
|
|
|
"bytes"
|
|
|
|
"context"
|
|
|
|
"encoding/json"
|
|
|
|
"fmt"
|
|
|
|
"net/http"
|
2019-04-30 12:00:34 +00:00
|
|
|
"sort"
|
2019-05-02 07:49:55 +00:00
|
|
|
"strconv"
|
2019-02-21 14:54:50 +00:00
|
|
|
"time"
|
|
|
|
|
2019-07-01 09:40:20 +00:00
|
|
|
"agola.io/agola/internal/datamanager"
|
|
|
|
"agola.io/agola/internal/etcd"
|
|
|
|
slog "agola.io/agola/internal/log"
|
|
|
|
ostypes "agola.io/agola/internal/objectstorage/types"
|
|
|
|
"agola.io/agola/internal/runconfig"
|
|
|
|
"agola.io/agola/internal/services/runservice/common"
|
|
|
|
"agola.io/agola/internal/services/runservice/store"
|
|
|
|
"agola.io/agola/internal/util"
|
2019-07-31 13:39:07 +00:00
|
|
|
"agola.io/agola/services/runservice/types"
|
2019-02-21 14:54:50 +00:00
|
|
|
|
|
|
|
etcdclientv3 "go.etcd.io/etcd/clientv3"
|
|
|
|
"go.etcd.io/etcd/clientv3/concurrency"
|
|
|
|
"go.uber.org/zap"
|
|
|
|
"go.uber.org/zap/zapcore"
|
2019-05-23 09:23:14 +00:00
|
|
|
errors "golang.org/x/xerrors"
|
2019-02-21 14:54:50 +00:00
|
|
|
)
|
|
|
|
|
2019-04-17 11:58:41 +00:00
|
|
|
const (
|
2019-09-09 13:05:13 +00:00
|
|
|
cacheCleanerInterval = 1 * 24 * time.Hour
|
|
|
|
workspaceCleanerInterval = 1 * 24 * time.Hour
|
2019-06-12 16:12:37 +00:00
|
|
|
|
|
|
|
defaultExecutorNotAliveInterval = 60 * time.Second
|
2019-04-17 11:58:41 +00:00
|
|
|
)
|
|
|
|
|
2019-02-21 14:54:50 +00:00
|
|
|
var level = zap.NewAtomicLevelAt(zapcore.InfoLevel)
|
|
|
|
var logger = slog.New(level)
|
|
|
|
var log = logger.Sugar()
|
|
|
|
|
|
|
|
func mergeEnv(dest, src map[string]string) {
|
|
|
|
for k, v := range src {
|
|
|
|
dest[k] = v
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-05-07 21:56:10 +00:00
|
|
|
func (s *Runservice) runActiveExecutorTasks(ctx context.Context, runID string) ([]*types.ExecutorTask, error) {
|
2019-02-21 14:54:50 +00:00
|
|
|
// the real source of active tasks is the number of executor tasks in etcd
|
|
|
|
// we can't rely on RunTask.Status since it's only updated when receiveing
|
|
|
|
// updated from the executor so it could be in a NotStarted state but have an
|
|
|
|
// executor tasks scheduled and running
|
|
|
|
ets, err := store.GetExecutorTasksForRun(ctx, s.e, runID)
|
|
|
|
if err != nil {
|
2019-04-11 21:44:55 +00:00
|
|
|
return nil, err
|
2019-02-21 14:54:50 +00:00
|
|
|
}
|
2019-04-11 21:44:55 +00:00
|
|
|
activeTasks := []*types.ExecutorTask{}
|
2019-02-21 14:54:50 +00:00
|
|
|
for _, et := range ets {
|
|
|
|
if !et.Status.Phase.IsFinished() {
|
2019-04-11 21:44:55 +00:00
|
|
|
activeTasks = append(activeTasks, et)
|
2019-02-21 14:54:50 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return activeTasks, nil
|
|
|
|
}
|
|
|
|
|
2019-08-30 10:30:38 +00:00
|
|
|
func taskMatchesParentDependCondition(ctx context.Context, rt *types.RunTask, r *types.Run, rc *types.RunConfig) bool {
|
|
|
|
rct := rc.Tasks[rt.ID]
|
|
|
|
parents := runconfig.GetParents(rc.Tasks, rct)
|
|
|
|
|
|
|
|
matchedNum := 0
|
|
|
|
for _, p := range parents {
|
|
|
|
matched := false
|
|
|
|
rp := r.Tasks[p.ID]
|
|
|
|
conds := runconfig.GetParentDependConditions(rct, p)
|
|
|
|
for _, cond := range conds {
|
|
|
|
switch cond {
|
|
|
|
case types.RunConfigTaskDependConditionOnSuccess:
|
|
|
|
if rp.Status == types.RunTaskStatusSuccess {
|
|
|
|
matched = true
|
|
|
|
}
|
|
|
|
case types.RunConfigTaskDependConditionOnFailure:
|
|
|
|
if rp.Status == types.RunTaskStatusFailed {
|
|
|
|
matched = true
|
|
|
|
}
|
|
|
|
case types.RunConfigTaskDependConditionOnSkipped:
|
|
|
|
if rp.Status == types.RunTaskStatusSkipped {
|
|
|
|
matched = true
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if matched {
|
|
|
|
matchedNum++
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return len(parents) == matchedNum
|
|
|
|
}
|
|
|
|
|
2019-04-17 16:00:34 +00:00
|
|
|
func advanceRunTasks(ctx context.Context, curRun *types.Run, rc *types.RunConfig, activeExecutorTasks []*types.ExecutorTask) (*types.Run, error) {
|
2019-04-17 16:06:31 +00:00
|
|
|
log.Debugf("run: %s", util.Dump(curRun))
|
2019-02-21 14:54:50 +00:00
|
|
|
log.Debugf("rc: %s", util.Dump(rc))
|
|
|
|
|
2019-04-17 16:06:31 +00:00
|
|
|
// take a deepcopy of r so we do logic only on fixed status and not affeccted by current changes (due to random map iteration)
|
|
|
|
newRun := curRun.DeepCopy()
|
|
|
|
|
2019-04-17 16:00:34 +00:00
|
|
|
// handle root tasks
|
|
|
|
for _, rt := range newRun.Tasks {
|
|
|
|
if rt.Skip {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
if rt.Status != types.RunTaskStatusNotStarted {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
rct := rc.Tasks[rt.ID]
|
|
|
|
parents := runconfig.GetParents(rc.Tasks, rct)
|
|
|
|
if len(parents) > 0 {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
// cancel task if the run has a result set and is not yet scheduled
|
|
|
|
if curRun.Result.IsSet() {
|
|
|
|
isScheduled := false
|
|
|
|
for _, et := range activeExecutorTasks {
|
|
|
|
if rt.ID == et.ID {
|
|
|
|
isScheduled = true
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if isScheduled {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
if rt.Status == types.RunTaskStatusNotStarted {
|
|
|
|
rt.Status = types.RunTaskStatusCancelled
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// handle all tasks
|
2019-08-30 10:30:38 +00:00
|
|
|
// TODO(sgotti) process tasks by their level (from 0) so we'll calculate the
|
|
|
|
// final state in just one loop. Currently the call to this function won't
|
|
|
|
// calculate a deterministic final state since we could process the tasks in
|
|
|
|
// any order
|
2019-04-17 16:06:31 +00:00
|
|
|
for _, rt := range newRun.Tasks {
|
2019-03-07 17:01:34 +00:00
|
|
|
if rt.Skip {
|
|
|
|
continue
|
|
|
|
}
|
2019-02-21 14:54:50 +00:00
|
|
|
if rt.Status != types.RunTaskStatusNotStarted {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
rct := rc.Tasks[rt.ID]
|
2019-04-09 16:11:00 +00:00
|
|
|
parents := runconfig.GetParents(rc.Tasks, rct)
|
2019-04-12 14:46:04 +00:00
|
|
|
finishedParents := 0
|
2019-02-21 14:54:50 +00:00
|
|
|
for _, p := range parents {
|
2019-04-17 16:06:31 +00:00
|
|
|
// use current run status to not be affected by previous changes to to random map iteration
|
|
|
|
rp := curRun.Tasks[p.ID]
|
2019-04-12 14:46:04 +00:00
|
|
|
if rp.Status.IsFinished() && rp.ArchivesFetchFinished() {
|
|
|
|
finishedParents++
|
2019-03-07 17:01:34 +00:00
|
|
|
}
|
2019-02-21 14:54:50 +00:00
|
|
|
}
|
|
|
|
|
2019-04-12 14:46:04 +00:00
|
|
|
allParentsFinished := finishedParents == len(parents)
|
|
|
|
|
|
|
|
// if all parents are finished check if the task could be executed or be skipped
|
|
|
|
if allParentsFinished {
|
2019-08-30 10:30:38 +00:00
|
|
|
matched := taskMatchesParentDependCondition(ctx, rt, curRun, rc)
|
2019-04-12 14:46:04 +00:00
|
|
|
|
|
|
|
// if all parents are matched then we can start it, otherwise we mark the step to be skipped
|
2019-08-30 10:30:38 +00:00
|
|
|
skip := !matched
|
2019-04-12 14:46:04 +00:00
|
|
|
if skip {
|
|
|
|
rt.Status = types.RunTaskStatusSkipped
|
|
|
|
continue
|
|
|
|
}
|
2019-04-11 15:23:59 +00:00
|
|
|
|
2019-04-08 15:29:57 +00:00
|
|
|
// now that the task can run set it to waiting approval if needed
|
|
|
|
if rct.NeedsApproval && !rt.WaitingApproval && !rt.Approved {
|
2019-02-21 14:54:50 +00:00
|
|
|
rt.WaitingApproval = true
|
2019-04-08 15:29:57 +00:00
|
|
|
}
|
2019-04-10 12:48:47 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-04-17 16:06:31 +00:00
|
|
|
return newRun, nil
|
2019-04-10 12:48:47 +00:00
|
|
|
}
|
|
|
|
|
2019-04-11 15:23:59 +00:00
|
|
|
func getTasksToRun(ctx context.Context, r *types.Run, rc *types.RunConfig) ([]*types.RunTask, error) {
|
2019-04-10 12:48:47 +00:00
|
|
|
log.Debugf("run: %s", util.Dump(r))
|
|
|
|
log.Debugf("rc: %s", util.Dump(rc))
|
|
|
|
|
|
|
|
tasksToRun := []*types.RunTask{}
|
|
|
|
// get tasks that can be executed
|
2019-04-12 15:45:38 +00:00
|
|
|
for _, rt := range r.Tasks {
|
2019-04-10 12:48:47 +00:00
|
|
|
if rt.Skip {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
if rt.Status != types.RunTaskStatusNotStarted {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
rct := rc.Tasks[rt.ID]
|
|
|
|
parents := runconfig.GetParents(rc.Tasks, rct)
|
2019-04-12 14:46:04 +00:00
|
|
|
finishedParents := 0
|
2019-04-10 12:48:47 +00:00
|
|
|
for _, p := range parents {
|
2019-04-12 15:45:38 +00:00
|
|
|
rp := r.Tasks[p.ID]
|
2019-04-12 14:46:04 +00:00
|
|
|
if rp.Status.IsFinished() && rp.ArchivesFetchFinished() {
|
|
|
|
finishedParents++
|
|
|
|
}
|
2019-04-10 12:48:47 +00:00
|
|
|
}
|
|
|
|
|
2019-04-12 14:46:04 +00:00
|
|
|
allParentsFinished := finishedParents == len(parents)
|
|
|
|
|
|
|
|
if allParentsFinished {
|
2019-08-30 10:30:38 +00:00
|
|
|
// TODO(sgotti) This could be removed when advanceRunTasks will calculate the
|
|
|
|
// state in a deterministic a complete way in one loop (see the related TODO)
|
|
|
|
if !taskMatchesParentDependCondition(ctx, rt, r, rc) {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
2019-04-11 15:23:59 +00:00
|
|
|
// Run only if approved (when needs approval)
|
2019-04-08 15:29:57 +00:00
|
|
|
if !rct.NeedsApproval || (rct.NeedsApproval && rt.Approved) {
|
2019-02-21 14:54:50 +00:00
|
|
|
tasksToRun = append(tasksToRun, rt)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-04-10 12:48:47 +00:00
|
|
|
return tasksToRun, nil
|
|
|
|
}
|
2019-02-21 14:54:50 +00:00
|
|
|
|
2019-05-07 21:56:10 +00:00
|
|
|
func (s *Runservice) submitRunTasks(ctx context.Context, r *types.Run, rc *types.RunConfig, tasks []*types.RunTask) error {
|
2019-04-10 12:48:47 +00:00
|
|
|
log.Debugf("tasksToRun: %s", util.Dump(tasks))
|
2019-02-21 14:54:50 +00:00
|
|
|
|
2019-04-10 12:48:47 +00:00
|
|
|
for _, rt := range tasks {
|
2019-04-17 13:26:09 +00:00
|
|
|
rct := rc.Tasks[rt.ID]
|
|
|
|
|
|
|
|
executor, err := s.chooseExecutor(ctx, rct)
|
2019-02-21 14:54:50 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2019-04-10 12:48:47 +00:00
|
|
|
if executor == nil {
|
2019-04-17 13:26:09 +00:00
|
|
|
log.Warnf("cannot choose an executor")
|
|
|
|
return nil
|
2019-04-10 12:48:47 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
et := s.genExecutorTask(ctx, r, rt, rc, executor)
|
2019-02-21 14:54:50 +00:00
|
|
|
log.Debugf("et: %s", util.Dump(et))
|
|
|
|
|
|
|
|
// check that the executorTask wasn't already scheduled
|
|
|
|
// just a check but it's not really needed since the call to
|
|
|
|
// atomicPutExecutorTask will fail if it already exists
|
|
|
|
tet, err := store.GetExecutorTask(ctx, s.e, et.ID)
|
|
|
|
if err != nil && err != etcd.ErrKeyNotFound {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
if tet != nil {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
if _, err := store.AtomicPutExecutorTask(ctx, s.e, et); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
if err := s.sendExecutorTask(ctx, et); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// chooseExecutor chooses the executor to schedule the task on. Now it's a very simple/dumb selection
|
|
|
|
// TODO(sgotti) improve this to use executor statistic, labels (arch type) etc...
|
2019-05-07 21:56:10 +00:00
|
|
|
func (s *Runservice) chooseExecutor(ctx context.Context, rct *types.RunConfigTask) (*types.Executor, error) {
|
2019-02-21 14:54:50 +00:00
|
|
|
executors, err := store.GetExecutors(ctx, s.e)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2019-06-12 16:12:37 +00:00
|
|
|
return chooseExecutor(executors, rct), nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func chooseExecutor(executors []*types.Executor, rct *types.RunConfigTask) *types.Executor {
|
2019-06-13 16:32:56 +00:00
|
|
|
requiresPrivilegedContainers := false
|
|
|
|
for _, c := range rct.Runtime.Containers {
|
2019-07-02 12:53:01 +00:00
|
|
|
if c.Privileged {
|
2019-06-13 16:32:56 +00:00
|
|
|
requiresPrivilegedContainers = true
|
|
|
|
break
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-02-21 14:54:50 +00:00
|
|
|
for _, e := range executors {
|
2019-06-12 16:12:37 +00:00
|
|
|
if e.LastStatusUpdateTime.Add(defaultExecutorNotAliveInterval).Before(time.Now()) {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
2019-06-13 16:32:56 +00:00
|
|
|
// skip executor provileged containers are required but not allowed
|
2019-07-02 12:53:01 +00:00
|
|
|
if requiresPrivilegedContainers && !e.AllowPrivilegedContainers {
|
2019-06-13 16:32:56 +00:00
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
2019-04-17 13:26:09 +00:00
|
|
|
// if arch is not defined use any executor arch
|
|
|
|
if rct.Runtime.Arch != "" {
|
2019-04-25 11:30:46 +00:00
|
|
|
hasArch := false
|
|
|
|
for _, arch := range e.Archs {
|
|
|
|
if arch == rct.Runtime.Arch {
|
|
|
|
hasArch = true
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if !hasArch {
|
2019-04-17 13:26:09 +00:00
|
|
|
continue
|
|
|
|
}
|
2019-04-25 11:30:46 +00:00
|
|
|
}
|
2019-06-12 16:12:37 +00:00
|
|
|
|
2019-04-25 11:30:46 +00:00
|
|
|
if e.ActiveTasksLimit != 0 {
|
|
|
|
if e.ActiveTasks >= e.ActiveTasksLimit {
|
|
|
|
continue
|
2019-04-17 18:59:28 +00:00
|
|
|
}
|
2019-04-17 13:26:09 +00:00
|
|
|
}
|
|
|
|
|
2019-06-12 16:12:37 +00:00
|
|
|
return e
|
2019-02-21 14:54:50 +00:00
|
|
|
}
|
2019-06-12 16:12:37 +00:00
|
|
|
|
|
|
|
return nil
|
2019-02-21 14:54:50 +00:00
|
|
|
}
|
|
|
|
|
2019-04-30 12:00:34 +00:00
|
|
|
type parentsByLevelName []*types.RunConfigTask
|
|
|
|
|
|
|
|
func (p parentsByLevelName) Len() int { return len(p) }
|
|
|
|
func (p parentsByLevelName) Less(i, j int) bool {
|
|
|
|
if p[i].Level != p[j].Level {
|
|
|
|
return p[i].Level < p[j].Level
|
|
|
|
}
|
|
|
|
return p[i].Name < p[j].Name
|
|
|
|
}
|
|
|
|
func (p parentsByLevelName) Swap(i, j int) { p[i], p[j] = p[j], p[i] }
|
|
|
|
|
2019-05-07 21:56:10 +00:00
|
|
|
func (s *Runservice) genExecutorTask(ctx context.Context, r *types.Run, rt *types.RunTask, rc *types.RunConfig, executor *types.Executor) *types.ExecutorTask {
|
2019-02-21 14:54:50 +00:00
|
|
|
rct := rc.Tasks[rt.ID]
|
|
|
|
|
|
|
|
environment := map[string]string{}
|
|
|
|
if rct.Environment != nil {
|
|
|
|
environment = rct.Environment
|
|
|
|
}
|
2019-04-09 16:11:00 +00:00
|
|
|
mergeEnv(environment, rc.StaticEnvironment)
|
|
|
|
// run config Environment variables ovverride every other environment variable
|
2019-02-21 14:54:50 +00:00
|
|
|
mergeEnv(environment, rc.Environment)
|
|
|
|
|
2019-07-03 13:16:37 +00:00
|
|
|
cachePrefix := store.OSTRootGroup(r.Group)
|
|
|
|
if rc.CacheGroup != "" {
|
|
|
|
cachePrefix = rc.CacheGroup
|
|
|
|
}
|
|
|
|
|
2019-02-21 14:54:50 +00:00
|
|
|
et := &types.ExecutorTask{
|
|
|
|
// The executorTask ID must be the same as the runTask ID so we can detect if
|
|
|
|
// there's already an executorTask scheduled for that run task and we can get
|
|
|
|
// at most once task execution
|
|
|
|
ID: rt.ID,
|
|
|
|
RunID: r.ID,
|
|
|
|
TaskName: rct.Name,
|
2019-04-25 11:42:34 +00:00
|
|
|
Arch: rct.Runtime.Arch,
|
2019-02-21 14:54:50 +00:00
|
|
|
Containers: rct.Runtime.Containers,
|
|
|
|
Environment: environment,
|
|
|
|
WorkingDir: rct.WorkingDir,
|
|
|
|
Shell: rct.Shell,
|
|
|
|
User: rct.User,
|
|
|
|
Steps: rct.Steps,
|
2019-07-03 13:16:37 +00:00
|
|
|
CachePrefix: cachePrefix,
|
2019-02-21 14:54:50 +00:00
|
|
|
Status: types.ExecutorTaskStatus{
|
|
|
|
Phase: types.ExecutorTaskPhaseNotStarted,
|
|
|
|
Steps: make([]*types.ExecutorTaskStepStatus, len(rct.Steps)),
|
|
|
|
ExecutorID: executor.ID,
|
|
|
|
},
|
2019-04-22 12:38:25 +00:00
|
|
|
DockerRegistriesAuth: rct.DockerRegistriesAuth,
|
2019-02-21 14:54:50 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
for i := range et.Status.Steps {
|
|
|
|
et.Status.Steps[i] = &types.ExecutorTaskStepStatus{
|
|
|
|
Phase: types.ExecutorTaskPhaseNotStarted,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-04-30 12:00:34 +00:00
|
|
|
// calculate workspace operations
|
|
|
|
// TODO(sgotti) right now we don't support duplicated files. So it's not currently possibile to overwrite a file in a upper layer.
|
|
|
|
// this simplifies the workspaces extractions since they could be extracted in any order. We make them ordered just for reproducibility
|
|
|
|
wsops := []types.WorkspaceOperation{}
|
2019-04-09 16:11:00 +00:00
|
|
|
rctAllParents := runconfig.GetAllParents(rc.Tasks, rct)
|
2019-04-30 12:00:34 +00:00
|
|
|
|
|
|
|
// sort parents by level and name just for reproducibility
|
|
|
|
sort.Sort(parentsByLevelName(rctAllParents))
|
|
|
|
|
2019-02-21 14:54:50 +00:00
|
|
|
for _, rctParent := range rctAllParents {
|
|
|
|
log.Debugf("rctParent: %s", util.Dump(rctParent))
|
2019-04-12 15:45:38 +00:00
|
|
|
for _, archiveStep := range r.Tasks[rctParent.ID].WorkspaceArchives {
|
2019-04-30 12:00:34 +00:00
|
|
|
wsop := types.WorkspaceOperation{TaskID: rctParent.ID, Step: archiveStep}
|
|
|
|
wsops = append(wsops, wsop)
|
2019-02-21 14:54:50 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-04-30 12:00:34 +00:00
|
|
|
et.WorkspaceOperations = wsops
|
2019-02-21 14:54:50 +00:00
|
|
|
|
2019-04-10 12:48:47 +00:00
|
|
|
return et
|
2019-02-21 14:54:50 +00:00
|
|
|
}
|
|
|
|
|
2019-04-11 21:44:55 +00:00
|
|
|
// sendExecutorTask sends executor task to executor, if this fails the executor
|
|
|
|
// will periodically fetch the executortask anyway
|
2019-05-07 21:56:10 +00:00
|
|
|
func (s *Runservice) sendExecutorTask(ctx context.Context, et *types.ExecutorTask) error {
|
2019-02-21 14:54:50 +00:00
|
|
|
executor, err := store.GetExecutor(ctx, s.e, et.Status.ExecutorID)
|
|
|
|
if err != nil && err != etcd.ErrKeyNotFound {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
if executor == nil {
|
|
|
|
log.Warnf("executor with id %q doesn't exist", et.Status.ExecutorID)
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
etj, err := json.Marshal(et)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
r, err := http.Post(executor.ListenURL+"/api/v1alpha/executor", "", bytes.NewReader(etj))
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
if r.StatusCode != http.StatusOK {
|
|
|
|
return errors.Errorf("received http status: %d", r.StatusCode)
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2019-05-07 21:56:10 +00:00
|
|
|
func (s *Runservice) compactChangeGroupsLoop(ctx context.Context) {
|
2019-02-21 14:54:50 +00:00
|
|
|
for {
|
|
|
|
if err := s.compactChangeGroups(ctx); err != nil {
|
|
|
|
log.Errorf("err: %+v", err)
|
|
|
|
}
|
|
|
|
|
2019-07-25 13:53:26 +00:00
|
|
|
sleepCh := time.NewTimer(1 * time.Second).C
|
2019-02-21 14:54:50 +00:00
|
|
|
select {
|
|
|
|
case <-ctx.Done():
|
|
|
|
return
|
2019-07-25 13:53:26 +00:00
|
|
|
case <-sleepCh:
|
2019-02-21 14:54:50 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-05-07 21:56:10 +00:00
|
|
|
func (s *Runservice) compactChangeGroups(ctx context.Context) error {
|
2019-07-10 08:20:35 +00:00
|
|
|
session, err := concurrency.NewSession(s.e.Client(), concurrency.WithTTL(5), concurrency.WithContext(ctx))
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
defer session.Close()
|
|
|
|
|
|
|
|
m := concurrency.NewMutex(session, common.EtcdCompactChangeGroupsLockKey)
|
|
|
|
|
|
|
|
// TODO(sgotti) find a way to use a trylock so we'll just return if already
|
|
|
|
// locked. Currently multiple task updaters will enqueue and start when another
|
|
|
|
// finishes (unuseful and consume resources)
|
|
|
|
if err := m.Lock(ctx); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
defer func() { _ = m.Unlock(ctx) }()
|
|
|
|
|
2019-02-21 14:54:50 +00:00
|
|
|
resp, err := s.e.Client().Get(ctx, common.EtcdChangeGroupMinRevisionKey)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
revision := resp.Kvs[0].ModRevision
|
|
|
|
|
|
|
|
// first update minrevision
|
|
|
|
cmp := etcdclientv3.Compare(etcdclientv3.ModRevision(common.EtcdChangeGroupMinRevisionKey), "=", revision)
|
|
|
|
then := etcdclientv3.OpPut(common.EtcdChangeGroupMinRevisionKey, "")
|
|
|
|
txn := s.e.Client().Txn(ctx).If(cmp).Then(then)
|
|
|
|
tresp, err := txn.Commit()
|
|
|
|
if err != nil {
|
|
|
|
return etcd.FromEtcdError(err)
|
|
|
|
}
|
|
|
|
if !tresp.Succeeded {
|
|
|
|
return errors.Errorf("failed to update change group min revision key due to concurrent update")
|
|
|
|
}
|
|
|
|
|
|
|
|
revision = tresp.Header.Revision
|
|
|
|
|
|
|
|
// then remove all the groups keys with modrevision < minrevision
|
|
|
|
// remove old groups
|
|
|
|
|
|
|
|
resp, err = s.e.List(ctx, common.EtcdChangeGroupsDir, "", 0)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
for _, kv := range resp.Kvs {
|
|
|
|
if kv.ModRevision < revision-common.EtcdChangeGroupMinRevisionRange {
|
|
|
|
cmp := etcdclientv3.Compare(etcdclientv3.ModRevision(string(kv.Key)), "=", kv.ModRevision)
|
|
|
|
then := etcdclientv3.OpDelete(string(kv.Key))
|
|
|
|
txn := s.e.Client().Txn(ctx).If(cmp).Then(then)
|
|
|
|
tresp, err := txn.Commit()
|
|
|
|
if err != nil {
|
|
|
|
return etcd.FromEtcdError(err)
|
|
|
|
}
|
|
|
|
if !tresp.Succeeded {
|
|
|
|
log.Errorf("failed to update change group min revision key due to concurrent update")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2019-05-07 21:56:10 +00:00
|
|
|
func (s *Runservice) scheduleRun(ctx context.Context, r *types.Run, rc *types.RunConfig) error {
|
2019-04-10 12:48:47 +00:00
|
|
|
log.Debugf("r: %s", util.Dump(r))
|
|
|
|
|
|
|
|
prevPhase := r.Phase
|
|
|
|
prevResult := r.Result
|
|
|
|
|
2019-04-17 16:00:34 +00:00
|
|
|
activeExecutorTasks, err := s.runActiveExecutorTasks(ctx, r.ID)
|
2019-04-11 15:23:59 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2019-04-17 16:00:34 +00:00
|
|
|
if err := advanceRun(ctx, r, rc, activeExecutorTasks); err != nil {
|
2019-04-10 12:48:47 +00:00
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2019-05-15 07:40:32 +00:00
|
|
|
var runEvent *types.RunEvent
|
2019-04-10 12:48:47 +00:00
|
|
|
// detect changes to phase and result and set related events
|
|
|
|
if prevPhase != r.Phase || prevResult != r.Result {
|
|
|
|
var err error
|
|
|
|
runEvent, err = common.NewRunEvent(ctx, s.e, r.ID, r.Phase, r.Result)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-04-11 15:23:59 +00:00
|
|
|
r, err = store.AtomicPutRun(ctx, s.e, r, runEvent, nil)
|
2019-02-21 14:54:50 +00:00
|
|
|
if err != nil {
|
2019-04-10 12:48:47 +00:00
|
|
|
return err
|
2019-02-21 14:54:50 +00:00
|
|
|
}
|
2019-04-10 12:48:47 +00:00
|
|
|
|
2019-04-11 21:44:55 +00:00
|
|
|
// if the run is set to stop, stop all tasks
|
|
|
|
if r.Stop {
|
|
|
|
for _, et := range activeExecutorTasks {
|
|
|
|
et.Stop = true
|
|
|
|
if _, err := store.AtomicPutExecutorTask(ctx, s.e, et); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
if err := s.sendExecutorTask(ctx, et); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-04-12 14:46:04 +00:00
|
|
|
// advance tasks
|
|
|
|
if r.Phase == types.RunPhaseRunning {
|
2019-04-17 16:00:34 +00:00
|
|
|
r, err := advanceRunTasks(ctx, r, rc, activeExecutorTasks)
|
2019-04-17 16:06:31 +00:00
|
|
|
if err != nil {
|
2019-04-10 12:48:47 +00:00
|
|
|
return err
|
|
|
|
}
|
2019-04-17 16:06:31 +00:00
|
|
|
r, err = store.AtomicPutRun(ctx, s.e, r, nil, nil)
|
2019-04-10 12:48:47 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2019-04-11 15:23:59 +00:00
|
|
|
tasksToRun, err := getTasksToRun(ctx, r, rc)
|
2019-04-10 12:48:47 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
return s.submitRunTasks(ctx, r, rc, tasksToRun)
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// advanceRun updates the run result and phase. It must be the unique function that
|
|
|
|
// should update them.
|
2019-04-17 16:00:34 +00:00
|
|
|
func advanceRun(ctx context.Context, r *types.Run, rc *types.RunConfig, activeExecutorTasks []*types.ExecutorTask) error {
|
2019-02-21 14:54:50 +00:00
|
|
|
log.Debugf("run: %s", util.Dump(r))
|
2019-04-17 16:00:34 +00:00
|
|
|
hasActiveTasks := len(activeExecutorTasks) > 0
|
2019-02-21 14:54:50 +00:00
|
|
|
|
2019-04-10 12:48:47 +00:00
|
|
|
// fail run if a task is failed
|
|
|
|
if !r.Result.IsSet() && r.Phase == types.RunPhaseRunning {
|
2019-04-12 15:45:38 +00:00
|
|
|
for _, rt := range r.Tasks {
|
2019-04-10 12:48:47 +00:00
|
|
|
rct, ok := rc.Tasks[rt.ID]
|
|
|
|
log.Debugf("rct: %s", util.Dump(rct))
|
|
|
|
if !ok {
|
|
|
|
return errors.Errorf("no such run config task with id %s for run config %s", rt.ID, rc.ID)
|
|
|
|
}
|
|
|
|
if rt.Status == types.RunTaskStatusFailed {
|
|
|
|
if !rct.IgnoreFailure {
|
|
|
|
log.Debugf("marking run %q as failed is task %q is failed", r.ID, rt.ID)
|
|
|
|
r.Result = types.RunResultFailed
|
|
|
|
break
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-04-12 14:46:04 +00:00
|
|
|
// see if run could be marked as success
|
2019-04-10 12:48:47 +00:00
|
|
|
if !r.Result.IsSet() && r.Phase == types.RunPhaseRunning {
|
2019-02-21 14:54:50 +00:00
|
|
|
finished := true
|
2019-04-12 15:45:38 +00:00
|
|
|
for _, rt := range r.Tasks {
|
2019-02-21 14:54:50 +00:00
|
|
|
if !rt.Status.IsFinished() {
|
|
|
|
finished = false
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if finished {
|
|
|
|
r.Result = types.RunResultSuccess
|
|
|
|
return nil
|
|
|
|
}
|
2019-04-10 12:48:47 +00:00
|
|
|
}
|
2019-03-08 09:02:37 +00:00
|
|
|
|
2019-04-10 12:48:47 +00:00
|
|
|
// if run is set to stop set result as stopped
|
|
|
|
if !r.Result.IsSet() && r.Phase == types.RunPhaseRunning {
|
2019-03-08 09:02:37 +00:00
|
|
|
if r.Stop {
|
|
|
|
r.Result = types.RunResultStopped
|
|
|
|
}
|
2019-04-10 12:48:47 +00:00
|
|
|
}
|
2019-02-21 14:54:50 +00:00
|
|
|
|
2019-04-12 14:46:04 +00:00
|
|
|
// if the run has a result defined AND all tasks are finished AND there're no executor tasks scheduled we can mark
|
|
|
|
// the run phase as finished
|
2019-04-10 12:48:47 +00:00
|
|
|
if r.Result.IsSet() {
|
2019-04-12 14:46:04 +00:00
|
|
|
finished := true
|
2019-04-12 15:45:38 +00:00
|
|
|
for _, rt := range r.Tasks {
|
2019-04-12 14:46:04 +00:00
|
|
|
if !rt.Status.IsFinished() {
|
|
|
|
finished = false
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if finished && !r.Phase.IsFinished() {
|
2019-04-11 15:23:59 +00:00
|
|
|
if !hasActiveTasks {
|
2019-02-21 14:54:50 +00:00
|
|
|
r.ChangePhase(types.RunPhaseFinished)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// if the run is finished AND there're no executor tasks scheduled we can mark
|
2019-03-13 14:48:35 +00:00
|
|
|
// all not started runtasks' fetch phases (setup step, logs and archives) as finished
|
2019-02-21 14:54:50 +00:00
|
|
|
if r.Phase.IsFinished() {
|
2019-04-12 15:45:38 +00:00
|
|
|
for _, rt := range r.Tasks {
|
2019-02-21 14:54:50 +00:00
|
|
|
log.Debugf("rt: %s", util.Dump(rt))
|
|
|
|
if rt.Status == types.RunTaskStatusNotStarted {
|
2019-03-13 14:48:35 +00:00
|
|
|
rt.SetupStep.LogPhase = types.RunTaskFetchPhaseFinished
|
2019-02-21 14:54:50 +00:00
|
|
|
for _, s := range rt.Steps {
|
|
|
|
s.LogPhase = types.RunTaskFetchPhaseFinished
|
|
|
|
}
|
|
|
|
for i := range rt.WorkspaceArchivesPhase {
|
|
|
|
rt.WorkspaceArchivesPhase[i] = types.RunTaskFetchPhaseFinished
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2019-05-07 21:56:10 +00:00
|
|
|
func (s *Runservice) handleExecutorTaskUpdate(ctx context.Context, et *types.ExecutorTask) error {
|
2019-02-21 14:54:50 +00:00
|
|
|
r, _, err := store.GetRun(ctx, s.e, et.RunID)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2019-04-26 14:00:03 +00:00
|
|
|
rc, err := store.OSTGetRunConfig(s.dm, r.ID)
|
2019-02-21 14:54:50 +00:00
|
|
|
if err != nil {
|
2019-05-23 09:23:14 +00:00
|
|
|
return errors.Errorf("cannot get run config %q: %w", r.ID, err)
|
2019-02-21 14:54:50 +00:00
|
|
|
}
|
2019-04-10 12:48:47 +00:00
|
|
|
|
|
|
|
if err := s.updateRunTaskStatus(ctx, et, r); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
r, err = store.AtomicPutRun(ctx, s.e, r, nil, nil)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
return s.scheduleRun(ctx, r, rc)
|
|
|
|
}
|
|
|
|
|
2019-05-07 21:56:10 +00:00
|
|
|
func (s *Runservice) updateRunTaskStatus(ctx context.Context, et *types.ExecutorTask, r *types.Run) error {
|
2019-04-10 12:48:47 +00:00
|
|
|
log.Debugf("et: %s", util.Dump(et))
|
2019-02-21 14:54:50 +00:00
|
|
|
|
2019-04-12 15:45:38 +00:00
|
|
|
rt, ok := r.Tasks[et.ID]
|
2019-02-21 14:54:50 +00:00
|
|
|
if !ok {
|
|
|
|
return errors.Errorf("no such run task with id %s for run %s", et.ID, r.ID)
|
|
|
|
}
|
|
|
|
|
|
|
|
rt.StartTime = et.Status.StartTime
|
|
|
|
rt.EndTime = et.Status.EndTime
|
|
|
|
|
|
|
|
wrongstatus := false
|
|
|
|
switch et.Status.Phase {
|
|
|
|
case types.ExecutorTaskPhaseNotStarted:
|
|
|
|
if rt.Status != types.RunTaskStatusNotStarted {
|
|
|
|
wrongstatus = true
|
|
|
|
}
|
|
|
|
case types.ExecutorTaskPhaseCancelled:
|
|
|
|
if rt.Status != types.RunTaskStatusCancelled &&
|
|
|
|
rt.Status != types.RunTaskStatusNotStarted {
|
|
|
|
wrongstatus = true
|
|
|
|
}
|
|
|
|
case types.ExecutorTaskPhaseRunning:
|
|
|
|
if rt.Status != types.RunTaskStatusRunning &&
|
|
|
|
rt.Status != types.RunTaskStatusNotStarted {
|
|
|
|
wrongstatus = true
|
|
|
|
}
|
|
|
|
case types.ExecutorTaskPhaseStopped:
|
|
|
|
if rt.Status != types.RunTaskStatusStopped &&
|
|
|
|
rt.Status != types.RunTaskStatusRunning {
|
|
|
|
wrongstatus = true
|
|
|
|
}
|
|
|
|
case types.ExecutorTaskPhaseSuccess:
|
|
|
|
if rt.Status != types.RunTaskStatusSuccess &&
|
|
|
|
rt.Status != types.RunTaskStatusRunning {
|
|
|
|
wrongstatus = true
|
|
|
|
}
|
|
|
|
case types.ExecutorTaskPhaseFailed:
|
|
|
|
if rt.Status != types.RunTaskStatusFailed &&
|
|
|
|
rt.Status != types.RunTaskStatusNotStarted &&
|
|
|
|
rt.Status != types.RunTaskStatusRunning {
|
|
|
|
wrongstatus = true
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if wrongstatus {
|
|
|
|
log.Warnf("wrong executor task status: %s, rt status: %s", et.Status.Phase, rt.Status)
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
switch et.Status.Phase {
|
|
|
|
case types.ExecutorTaskPhaseNotStarted:
|
|
|
|
rt.Status = types.RunTaskStatusNotStarted
|
|
|
|
case types.ExecutorTaskPhaseCancelled:
|
|
|
|
rt.Status = types.RunTaskStatusCancelled
|
|
|
|
case types.ExecutorTaskPhaseRunning:
|
|
|
|
rt.Status = types.RunTaskStatusRunning
|
|
|
|
case types.ExecutorTaskPhaseStopped:
|
|
|
|
rt.Status = types.RunTaskStatusStopped
|
|
|
|
case types.ExecutorTaskPhaseSuccess:
|
|
|
|
rt.Status = types.RunTaskStatusSuccess
|
|
|
|
case types.ExecutorTaskPhaseFailed:
|
|
|
|
rt.Status = types.RunTaskStatusFailed
|
|
|
|
}
|
|
|
|
|
2019-03-13 14:48:35 +00:00
|
|
|
rt.SetupStep.Phase = et.Status.SetupStep.Phase
|
|
|
|
rt.SetupStep.StartTime = et.Status.SetupStep.StartTime
|
|
|
|
rt.SetupStep.EndTime = et.Status.SetupStep.EndTime
|
|
|
|
|
2019-02-21 14:54:50 +00:00
|
|
|
for i, s := range et.Status.Steps {
|
|
|
|
rt.Steps[i].Phase = s.Phase
|
|
|
|
rt.Steps[i].StartTime = s.StartTime
|
|
|
|
rt.Steps[i].EndTime = s.EndTime
|
|
|
|
}
|
|
|
|
|
2019-04-10 12:48:47 +00:00
|
|
|
return nil
|
2019-02-21 14:54:50 +00:00
|
|
|
}
|
|
|
|
|
2019-05-07 21:56:10 +00:00
|
|
|
func (s *Runservice) executorTaskUpdateHandler(ctx context.Context, c <-chan *types.ExecutorTask) {
|
2019-02-21 14:54:50 +00:00
|
|
|
for {
|
|
|
|
select {
|
|
|
|
case <-ctx.Done():
|
|
|
|
return
|
|
|
|
case et := <-c:
|
|
|
|
go func() {
|
2019-04-10 12:48:47 +00:00
|
|
|
if err := s.handleExecutorTaskUpdate(ctx, et); err != nil {
|
2019-02-21 14:54:50 +00:00
|
|
|
// TODO(sgotti) improve logging to not return "run modified errors" since
|
|
|
|
// they are normal
|
|
|
|
log.Warnf("err: %+v", err)
|
|
|
|
}
|
|
|
|
}()
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-05-07 21:56:10 +00:00
|
|
|
func (s *Runservice) executorTasksCleanerLoop(ctx context.Context) {
|
2019-02-21 14:54:50 +00:00
|
|
|
for {
|
|
|
|
log.Debugf("executorTasksCleaner")
|
|
|
|
|
|
|
|
if err := s.executorTasksCleaner(ctx); err != nil {
|
|
|
|
log.Errorf("err: %+v", err)
|
|
|
|
}
|
|
|
|
|
2019-07-25 13:53:26 +00:00
|
|
|
sleepCh := time.NewTimer(1 * time.Second).C
|
2019-02-21 14:54:50 +00:00
|
|
|
select {
|
|
|
|
case <-ctx.Done():
|
|
|
|
return
|
2019-07-25 13:53:26 +00:00
|
|
|
case <-sleepCh:
|
2019-02-21 14:54:50 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-05-07 21:56:10 +00:00
|
|
|
func (s *Runservice) executorTasksCleaner(ctx context.Context) error {
|
2019-02-21 14:54:50 +00:00
|
|
|
resp, err := s.e.List(ctx, common.EtcdTasksDir, "", 0)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, kv := range resp.Kvs {
|
|
|
|
var et *types.ExecutorTask
|
|
|
|
if err := json.Unmarshal(kv.Value, &et); err != nil {
|
|
|
|
log.Errorf("err: %+v", err)
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
et.Revision = kv.ModRevision
|
|
|
|
if err := s.executorTaskCleaner(ctx, et); err != nil {
|
|
|
|
log.Errorf("err: %+v", err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2019-05-07 21:56:10 +00:00
|
|
|
func (s *Runservice) executorTaskCleaner(ctx context.Context, et *types.ExecutorTask) error {
|
2019-02-21 14:54:50 +00:00
|
|
|
log.Debugf("et: %s", util.Dump(et))
|
|
|
|
if et.Status.Phase.IsFinished() {
|
|
|
|
r, _, err := store.GetRun(ctx, s.e, et.RunID)
|
|
|
|
if err != nil {
|
|
|
|
if err == etcd.ErrKeyNotFound {
|
|
|
|
// run doesn't exists, remove executor task
|
|
|
|
if err := store.DeleteExecutorTask(ctx, s.e, et.ID); err != nil {
|
|
|
|
log.Errorf("err: %+v", err)
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
log.Errorf("err: %+v", err)
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
if r.Phase.IsFinished() {
|
|
|
|
// if the run is finished mark the executor tasks to stop
|
|
|
|
if !et.Stop {
|
|
|
|
et.Stop = true
|
|
|
|
if _, err := store.AtomicPutExecutorTask(ctx, s.e, et); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
if err := s.sendExecutorTask(ctx, et); err != nil {
|
|
|
|
log.Errorf("err: %+v", err)
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if !et.Status.Phase.IsFinished() {
|
|
|
|
// if the executor doesn't exists anymore mark the not finished executor tasks as failed
|
|
|
|
executor, err := store.GetExecutor(ctx, s.e, et.Status.ExecutorID)
|
|
|
|
if err != nil && err != etcd.ErrKeyNotFound {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
if executor == nil {
|
|
|
|
log.Warnf("executor with id %q doesn't exist. marking executor task %q as failed", et.Status.ExecutorID, et.ID)
|
2019-07-26 16:48:12 +00:00
|
|
|
et.FailError = "executor deleted"
|
2019-02-21 14:54:50 +00:00
|
|
|
et.Status.Phase = types.ExecutorTaskPhaseFailed
|
2019-08-01 12:14:56 +00:00
|
|
|
et.Status.EndTime = util.TimeP(time.Now())
|
2019-07-26 16:48:12 +00:00
|
|
|
for _, s := range et.Status.Steps {
|
|
|
|
if s.Phase == types.ExecutorTaskPhaseRunning {
|
|
|
|
s.Phase = types.ExecutorTaskPhaseFailed
|
2019-08-01 12:14:56 +00:00
|
|
|
s.EndTime = util.TimeP(time.Now())
|
2019-07-26 16:48:12 +00:00
|
|
|
}
|
|
|
|
}
|
2019-02-21 14:54:50 +00:00
|
|
|
if _, err := store.AtomicPutExecutorTask(ctx, s.e, et); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2019-05-07 21:56:10 +00:00
|
|
|
func (s *Runservice) runTasksUpdaterLoop(ctx context.Context) {
|
2019-02-21 14:54:50 +00:00
|
|
|
for {
|
|
|
|
log.Debugf("runTasksUpdater")
|
|
|
|
|
|
|
|
if err := s.runTasksUpdater(ctx); err != nil {
|
|
|
|
log.Errorf("err: %+v", err)
|
|
|
|
}
|
|
|
|
|
2019-07-25 13:53:26 +00:00
|
|
|
sleepCh := time.NewTimer(10 * time.Second).C
|
|
|
|
select {
|
|
|
|
case <-ctx.Done():
|
|
|
|
return
|
|
|
|
case <-sleepCh:
|
|
|
|
}
|
2019-02-21 14:54:50 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-05-07 21:56:10 +00:00
|
|
|
func (s *Runservice) runTasksUpdater(ctx context.Context) error {
|
2019-02-21 14:54:50 +00:00
|
|
|
log.Debugf("runTasksUpdater")
|
|
|
|
|
|
|
|
session, err := concurrency.NewSession(s.e.Client(), concurrency.WithTTL(5), concurrency.WithContext(ctx))
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
defer session.Close()
|
|
|
|
|
2019-04-27 06:59:47 +00:00
|
|
|
m := concurrency.NewMutex(session, common.EtcdTaskUpdaterLockKey)
|
2019-02-21 14:54:50 +00:00
|
|
|
|
2019-04-17 11:58:41 +00:00
|
|
|
// TODO(sgotti) find a way to use a trylock so we'll just return if already
|
|
|
|
// locked. Currently multiple task updaters will enqueue and start when another
|
|
|
|
// finishes (unuseful and consume resources)
|
2019-02-21 14:54:50 +00:00
|
|
|
if err := m.Lock(ctx); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2019-07-02 12:53:01 +00:00
|
|
|
defer func() { _ = m.Unlock(ctx) }()
|
2019-02-21 14:54:50 +00:00
|
|
|
|
|
|
|
resp, err := s.e.List(ctx, common.EtcdTasksDir, "", 0)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, kv := range resp.Kvs {
|
|
|
|
var et *types.ExecutorTask
|
|
|
|
if err := json.Unmarshal(kv.Value, &et); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
et.Revision = kv.ModRevision
|
2019-04-10 12:48:47 +00:00
|
|
|
if err := s.handleExecutorTaskUpdate(ctx, et); err != nil {
|
2019-02-21 14:54:50 +00:00
|
|
|
log.Errorf("err: %v", err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2019-05-08 10:11:46 +00:00
|
|
|
func (s *Runservice) OSTFileExists(path string) (bool, error) {
|
|
|
|
_, err := s.ost.Stat(path)
|
2019-05-21 13:17:53 +00:00
|
|
|
if err != nil && err != ostypes.ErrNotExist {
|
2019-02-21 14:54:50 +00:00
|
|
|
return false, err
|
|
|
|
}
|
2019-05-08 10:11:46 +00:00
|
|
|
return err == nil, nil
|
2019-02-21 14:54:50 +00:00
|
|
|
}
|
|
|
|
|
2019-05-07 21:56:10 +00:00
|
|
|
func (s *Runservice) fetchLog(ctx context.Context, rt *types.RunTask, setup bool, stepnum int) error {
|
2019-02-21 14:54:50 +00:00
|
|
|
et, err := store.GetExecutorTask(ctx, s.e, rt.ID)
|
|
|
|
if err != nil && err != etcd.ErrKeyNotFound {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
if et == nil {
|
2019-03-07 17:01:34 +00:00
|
|
|
if !rt.Skip {
|
|
|
|
log.Errorf("executor task with id %q doesn't exist. This shouldn't happen. Skipping fetching", rt.ID)
|
|
|
|
}
|
2019-02-21 14:54:50 +00:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
executor, err := store.GetExecutor(ctx, s.e, et.Status.ExecutorID)
|
|
|
|
if err != nil && err != etcd.ErrKeyNotFound {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
if executor == nil {
|
|
|
|
log.Warnf("executor with id %q doesn't exist. Skipping fetching", et.Status.ExecutorID)
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2019-03-13 14:48:35 +00:00
|
|
|
var logPath string
|
|
|
|
if setup {
|
2019-04-27 13:16:48 +00:00
|
|
|
logPath = store.OSTRunTaskSetupLogPath(rt.ID)
|
2019-03-13 14:48:35 +00:00
|
|
|
} else {
|
2019-04-27 13:16:48 +00:00
|
|
|
logPath = store.OSTRunTaskStepLogPath(rt.ID, stepnum)
|
2019-03-13 14:48:35 +00:00
|
|
|
}
|
2019-05-08 10:11:46 +00:00
|
|
|
ok, err := s.OSTFileExists(logPath)
|
2019-02-21 14:54:50 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
if ok {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2019-03-13 14:48:35 +00:00
|
|
|
var u string
|
|
|
|
if setup {
|
|
|
|
u = fmt.Sprintf(executor.ListenURL+"/api/v1alpha/executor/logs?taskid=%s&setup", rt.ID)
|
|
|
|
} else {
|
|
|
|
u = fmt.Sprintf(executor.ListenURL+"/api/v1alpha/executor/logs?taskid=%s&step=%d", rt.ID, stepnum)
|
|
|
|
}
|
2019-02-21 14:54:50 +00:00
|
|
|
r, err := http.Get(u)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
defer r.Body.Close()
|
|
|
|
|
|
|
|
// ignore if not found
|
|
|
|
if r.StatusCode == http.StatusNotFound {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
if r.StatusCode != http.StatusOK {
|
|
|
|
return errors.Errorf("received http status: %d", r.StatusCode)
|
|
|
|
}
|
|
|
|
|
2019-05-02 07:49:55 +00:00
|
|
|
size := int64(-1)
|
|
|
|
sizeStr := r.Header.Get("Content-Length")
|
|
|
|
if sizeStr != "" {
|
|
|
|
size, err = strconv.ParseInt(sizeStr, 10, 64)
|
|
|
|
if err != nil {
|
|
|
|
return errors.Errorf("failed to parse content length %q", sizeStr)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return s.ost.WriteObject(logPath, r.Body, size, false)
|
2019-02-21 14:54:50 +00:00
|
|
|
}
|
|
|
|
|
2019-05-07 21:56:10 +00:00
|
|
|
func (s *Runservice) finishSetupLogPhase(ctx context.Context, runID, runTaskID string) error {
|
2019-03-13 14:48:35 +00:00
|
|
|
r, _, err := store.GetRun(ctx, s.e, runID)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2019-04-12 15:45:38 +00:00
|
|
|
rt, ok := r.Tasks[runTaskID]
|
2019-03-13 14:48:35 +00:00
|
|
|
if !ok {
|
|
|
|
return errors.Errorf("no such task with ID %s in run %s", runTaskID, runID)
|
|
|
|
}
|
|
|
|
|
|
|
|
rt.SetupStep.LogPhase = types.RunTaskFetchPhaseFinished
|
2019-04-10 12:48:47 +00:00
|
|
|
if _, err := store.AtomicPutRun(ctx, s.e, r, nil, nil); err != nil {
|
2019-03-13 14:48:35 +00:00
|
|
|
return err
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2019-05-07 21:56:10 +00:00
|
|
|
func (s *Runservice) finishStepLogPhase(ctx context.Context, runID, runTaskID string, stepnum int) error {
|
2019-02-21 14:54:50 +00:00
|
|
|
r, _, err := store.GetRun(ctx, s.e, runID)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2019-04-12 15:45:38 +00:00
|
|
|
rt, ok := r.Tasks[runTaskID]
|
2019-02-21 14:54:50 +00:00
|
|
|
if !ok {
|
|
|
|
return errors.Errorf("no such task with ID %s in run %s", runTaskID, runID)
|
|
|
|
}
|
|
|
|
if len(rt.Steps) <= stepnum {
|
|
|
|
return errors.Errorf("no such step for task %s in run %s", runTaskID, runID)
|
|
|
|
}
|
|
|
|
|
|
|
|
rt.Steps[stepnum].LogPhase = types.RunTaskFetchPhaseFinished
|
2019-04-10 12:48:47 +00:00
|
|
|
if _, err := store.AtomicPutRun(ctx, s.e, r, nil, nil); err != nil {
|
2019-02-21 14:54:50 +00:00
|
|
|
return err
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2019-05-07 21:56:10 +00:00
|
|
|
func (s *Runservice) finishArchivePhase(ctx context.Context, runID, runTaskID string, stepnum int) error {
|
2019-02-21 14:54:50 +00:00
|
|
|
r, _, err := store.GetRun(ctx, s.e, runID)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2019-04-12 15:45:38 +00:00
|
|
|
rt, ok := r.Tasks[runTaskID]
|
2019-02-21 14:54:50 +00:00
|
|
|
if !ok {
|
|
|
|
return errors.Errorf("no such task with ID %s in run %s", runTaskID, runID)
|
|
|
|
}
|
|
|
|
if len(rt.Steps) <= stepnum {
|
|
|
|
return errors.Errorf("no such step for task %s in run %s", runTaskID, runID)
|
|
|
|
}
|
|
|
|
found := false
|
|
|
|
for i, sn := range rt.WorkspaceArchives {
|
|
|
|
if stepnum == sn {
|
|
|
|
found = true
|
|
|
|
rt.WorkspaceArchivesPhase[i] = types.RunTaskFetchPhaseFinished
|
|
|
|
break
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if !found {
|
|
|
|
return errors.Errorf("no workspace archive for task %s, step %d in run %s", runTaskID, stepnum, runID)
|
|
|
|
}
|
|
|
|
|
2019-04-10 12:48:47 +00:00
|
|
|
if _, err := store.AtomicPutRun(ctx, s.e, r, nil, nil); err != nil {
|
2019-02-21 14:54:50 +00:00
|
|
|
return err
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2019-05-07 21:56:10 +00:00
|
|
|
func (s *Runservice) fetchTaskLogs(ctx context.Context, runID string, rt *types.RunTask) {
|
2019-02-21 14:54:50 +00:00
|
|
|
log.Debugf("fetchTaskLogs")
|
2019-03-13 14:48:35 +00:00
|
|
|
|
|
|
|
// fetch setup log
|
|
|
|
if rt.SetupStep.LogPhase == types.RunTaskFetchPhaseNotStarted {
|
|
|
|
if err := s.fetchLog(ctx, rt, true, 0); err != nil {
|
|
|
|
log.Errorf("err: %+v", err)
|
|
|
|
}
|
|
|
|
if err := s.finishSetupLogPhase(ctx, runID, rt.ID); err != nil {
|
|
|
|
log.Errorf("err: %+v", err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// fetch steps logs
|
2019-02-21 14:54:50 +00:00
|
|
|
for i, rts := range rt.Steps {
|
|
|
|
lp := rts.LogPhase
|
|
|
|
if lp == types.RunTaskFetchPhaseNotStarted {
|
2019-03-13 14:48:35 +00:00
|
|
|
if err := s.fetchLog(ctx, rt, false, i); err != nil {
|
2019-02-21 14:54:50 +00:00
|
|
|
log.Errorf("err: %+v", err)
|
|
|
|
continue
|
|
|
|
}
|
2019-03-13 14:48:35 +00:00
|
|
|
if err := s.finishStepLogPhase(ctx, runID, rt.ID, i); err != nil {
|
2019-02-21 14:54:50 +00:00
|
|
|
log.Errorf("err: %+v", err)
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-05-07 21:56:10 +00:00
|
|
|
func (s *Runservice) fetchArchive(ctx context.Context, rt *types.RunTask, stepnum int) error {
|
2019-02-21 14:54:50 +00:00
|
|
|
et, err := store.GetExecutorTask(ctx, s.e, rt.ID)
|
|
|
|
if err != nil && err != etcd.ErrKeyNotFound {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
if et == nil {
|
|
|
|
log.Errorf("executor task with id %q doesn't exist. This shouldn't happen. Skipping fetching", rt.ID)
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
executor, err := store.GetExecutor(ctx, s.e, et.Status.ExecutorID)
|
|
|
|
if err != nil && err != etcd.ErrKeyNotFound {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
if executor == nil {
|
|
|
|
log.Warnf("executor with id %q doesn't exist. Skipping fetching", et.Status.ExecutorID)
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2019-05-08 10:11:46 +00:00
|
|
|
path := store.OSTRunTaskArchivePath(rt.ID, stepnum)
|
|
|
|
ok, err := s.OSTFileExists(path)
|
2019-02-21 14:54:50 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
if ok {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
u := fmt.Sprintf(executor.ListenURL+"/api/v1alpha/executor/archives?taskid=%s&step=%d", rt.ID, stepnum)
|
|
|
|
log.Debugf("fetchArchive: %s", u)
|
|
|
|
r, err := http.Get(u)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
defer r.Body.Close()
|
|
|
|
|
|
|
|
// ignore if not found
|
|
|
|
if r.StatusCode == http.StatusNotFound {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
if r.StatusCode != http.StatusOK {
|
|
|
|
return errors.Errorf("received http status: %d", r.StatusCode)
|
|
|
|
}
|
|
|
|
|
2019-05-02 07:49:55 +00:00
|
|
|
size := int64(-1)
|
|
|
|
sizeStr := r.Header.Get("Content-Length")
|
|
|
|
if sizeStr != "" {
|
|
|
|
size, err = strconv.ParseInt(sizeStr, 10, 64)
|
|
|
|
if err != nil {
|
|
|
|
return errors.Errorf("failed to parse content length %q", sizeStr)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return s.ost.WriteObject(path, r.Body, size, false)
|
2019-02-21 14:54:50 +00:00
|
|
|
}
|
|
|
|
|
2019-05-07 21:56:10 +00:00
|
|
|
func (s *Runservice) fetchTaskArchives(ctx context.Context, runID string, rt *types.RunTask) {
|
2019-02-21 14:54:50 +00:00
|
|
|
log.Debugf("fetchTaskArchives")
|
2019-05-08 10:11:46 +00:00
|
|
|
|
2019-02-21 14:54:50 +00:00
|
|
|
for i, stepnum := range rt.WorkspaceArchives {
|
|
|
|
phase := rt.WorkspaceArchivesPhase[i]
|
|
|
|
if phase == types.RunTaskFetchPhaseNotStarted {
|
|
|
|
if err := s.fetchArchive(ctx, rt, stepnum); err != nil {
|
|
|
|
log.Errorf("err: %+v", err)
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
if err := s.finishArchivePhase(ctx, runID, rt.ID, stepnum); err != nil {
|
|
|
|
log.Errorf("err: %+v", err)
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-05-07 21:56:10 +00:00
|
|
|
func (s *Runservice) fetcherLoop(ctx context.Context) {
|
2019-02-21 14:54:50 +00:00
|
|
|
for {
|
|
|
|
log.Debugf("fetcher")
|
|
|
|
|
|
|
|
if err := s.fetcher(ctx); err != nil {
|
|
|
|
log.Errorf("err: %+v", err)
|
|
|
|
}
|
|
|
|
|
2019-07-25 13:53:26 +00:00
|
|
|
sleepCh := time.NewTimer(2 * time.Second).C
|
2019-02-21 14:54:50 +00:00
|
|
|
select {
|
|
|
|
case <-ctx.Done():
|
|
|
|
return
|
2019-07-25 13:53:26 +00:00
|
|
|
case <-sleepCh:
|
2019-02-21 14:54:50 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-05-07 21:56:10 +00:00
|
|
|
func (s *Runservice) fetcher(ctx context.Context) error {
|
2019-02-21 14:54:50 +00:00
|
|
|
log.Debugf("fetcher")
|
|
|
|
runs, err := store.GetRuns(ctx, s.e)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
for _, r := range runs {
|
|
|
|
log.Debugf("r: %s", util.Dump(r))
|
2019-04-12 15:45:38 +00:00
|
|
|
for _, rt := range r.Tasks {
|
2019-02-21 14:54:50 +00:00
|
|
|
log.Debugf("rt: %s", util.Dump(rt))
|
|
|
|
if rt.Status.IsFinished() {
|
2019-05-08 10:11:46 +00:00
|
|
|
// write related logs runID
|
|
|
|
runIDPath := store.OSTRunTaskLogsRunPath(rt.ID, r.ID)
|
|
|
|
exists, err := s.OSTFileExists(runIDPath)
|
|
|
|
if err != nil {
|
|
|
|
log.Errorf("err: %+v", err)
|
|
|
|
} else if !exists {
|
|
|
|
if err := s.ost.WriteObject(runIDPath, bytes.NewReader([]byte{}), 0, false); err != nil {
|
|
|
|
log.Errorf("err: %+v", err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// write related archives runID
|
|
|
|
runIDPath = store.OSTRunTaskArchivesRunPath(rt.ID, r.ID)
|
|
|
|
exists, err = s.OSTFileExists(runIDPath)
|
|
|
|
if err != nil {
|
|
|
|
log.Errorf("err: %+v", err)
|
|
|
|
} else if !exists {
|
|
|
|
if err := s.ost.WriteObject(runIDPath, bytes.NewReader([]byte{}), 0, false); err != nil {
|
|
|
|
log.Errorf("err: %+v", err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-02-21 14:54:50 +00:00
|
|
|
s.fetchTaskLogs(ctx, r.ID, rt)
|
|
|
|
s.fetchTaskArchives(ctx, r.ID, rt)
|
2019-07-08 14:03:14 +00:00
|
|
|
|
|
|
|
// if the fetching is finished we can remove the executor tasks. We cannot
|
|
|
|
// remove it before since it contains the reference to the executor where we
|
|
|
|
// should fetch the data
|
|
|
|
if rt.LogsFetchFinished() && rt.ArchivesFetchFinished() {
|
|
|
|
if err := store.DeleteExecutorTask(ctx, s.e, rt.ID); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
}
|
2019-02-21 14:54:50 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
|
|
|
|
}
|
|
|
|
|
2019-05-07 21:56:10 +00:00
|
|
|
func (s *Runservice) runsSchedulerLoop(ctx context.Context) {
|
2019-02-21 14:54:50 +00:00
|
|
|
for {
|
2019-04-10 12:48:47 +00:00
|
|
|
log.Debugf("runsSchedulerLoop")
|
2019-02-21 14:54:50 +00:00
|
|
|
|
2019-04-10 12:48:47 +00:00
|
|
|
if err := s.runsScheduler(ctx); err != nil {
|
2019-02-21 14:54:50 +00:00
|
|
|
log.Errorf("err: %+v", err)
|
|
|
|
}
|
|
|
|
|
2019-07-25 13:53:26 +00:00
|
|
|
sleepCh := time.NewTimer(2 * time.Second).C
|
2019-02-21 14:54:50 +00:00
|
|
|
select {
|
|
|
|
case <-ctx.Done():
|
|
|
|
return
|
2019-07-25 13:53:26 +00:00
|
|
|
case <-sleepCh:
|
2019-02-21 14:54:50 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-05-07 21:56:10 +00:00
|
|
|
func (s *Runservice) runsScheduler(ctx context.Context) error {
|
2019-04-10 12:48:47 +00:00
|
|
|
log.Debugf("runsScheduler")
|
2019-02-21 14:54:50 +00:00
|
|
|
runs, err := store.GetRuns(ctx, s.e)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
for _, r := range runs {
|
2019-04-10 12:48:47 +00:00
|
|
|
if err := s.runScheduler(ctx, r); err != nil {
|
2019-02-21 14:54:50 +00:00
|
|
|
log.Errorf("err: %+v", err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2019-05-07 21:56:10 +00:00
|
|
|
func (s *Runservice) runScheduler(ctx context.Context, r *types.Run) error {
|
2019-04-10 12:48:47 +00:00
|
|
|
log.Debugf("runScheduler")
|
2019-04-26 14:00:03 +00:00
|
|
|
rc, err := store.OSTGetRunConfig(s.dm, r.ID)
|
2019-04-10 12:48:47 +00:00
|
|
|
if err != nil {
|
2019-05-23 09:23:14 +00:00
|
|
|
return errors.Errorf("cannot get run config %q: %w", r.ID, err)
|
2019-04-10 12:48:47 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return s.scheduleRun(ctx, r, rc)
|
|
|
|
}
|
|
|
|
|
2019-05-07 21:56:10 +00:00
|
|
|
func (s *Runservice) finishedRunsArchiverLoop(ctx context.Context) {
|
2019-02-21 14:54:50 +00:00
|
|
|
for {
|
2019-04-10 12:48:47 +00:00
|
|
|
log.Debugf("finished run archiver loop")
|
2019-02-21 14:54:50 +00:00
|
|
|
|
|
|
|
if err := s.finishedRunsArchiver(ctx); err != nil {
|
|
|
|
log.Errorf("err: %+v", err)
|
|
|
|
}
|
|
|
|
|
2019-07-25 13:53:26 +00:00
|
|
|
sleepCh := time.NewTimer(2 * time.Second).C
|
2019-02-21 14:54:50 +00:00
|
|
|
select {
|
|
|
|
case <-ctx.Done():
|
|
|
|
return
|
2019-07-25 13:53:26 +00:00
|
|
|
case <-sleepCh:
|
2019-02-21 14:54:50 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-05-07 21:56:10 +00:00
|
|
|
func (s *Runservice) finishedRunsArchiver(ctx context.Context) error {
|
2019-02-21 14:54:50 +00:00
|
|
|
log.Debugf("finished run archiver")
|
|
|
|
runs, err := store.GetRuns(ctx, s.e)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
for _, r := range runs {
|
|
|
|
if err := s.finishedRunArchiver(ctx, r); err != nil {
|
|
|
|
log.Errorf("err: %+v", err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-04-27 13:16:48 +00:00
|
|
|
// We write archived runs in objectstorage in the ordered they were archived
|
2019-02-21 14:54:50 +00:00
|
|
|
runs, err = store.GetRuns(ctx, s.e)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
for _, r := range runs {
|
|
|
|
if r.Archived {
|
2019-04-27 13:16:48 +00:00
|
|
|
if err := s.runOSTArchiver(ctx, r); err != nil {
|
2019-02-21 14:54:50 +00:00
|
|
|
log.Errorf("err: %+v", err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// finishedRunArchiver archives a run if it's finished and all the fetching
|
|
|
|
// phases (logs and archives) are marked as finished
|
2019-05-07 21:56:10 +00:00
|
|
|
func (s *Runservice) finishedRunArchiver(ctx context.Context, r *types.Run) error {
|
2019-02-21 14:54:50 +00:00
|
|
|
if !r.Phase.IsFinished() {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
done := true
|
2019-04-12 15:45:38 +00:00
|
|
|
for _, rt := range r.Tasks {
|
2019-03-29 08:00:19 +00:00
|
|
|
// check that all logs are fetched
|
|
|
|
if !rt.LogsFetchFinished() {
|
2019-03-13 14:48:35 +00:00
|
|
|
done = false
|
|
|
|
break
|
|
|
|
}
|
2019-03-29 08:00:19 +00:00
|
|
|
// check that all archives are fetched
|
|
|
|
if !rt.ArchivesFetchFinished() {
|
|
|
|
done = false
|
|
|
|
break
|
2019-02-21 14:54:50 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
if !done {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
log.Infof("run %q archiving completed", r.ID)
|
|
|
|
|
|
|
|
r.Archived = true
|
2019-04-10 12:48:47 +00:00
|
|
|
if _, err := store.AtomicPutRun(ctx, s.e, r, nil, nil); err != nil {
|
2019-02-21 14:54:50 +00:00
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2019-05-07 21:56:10 +00:00
|
|
|
func (s *Runservice) runOSTArchiver(ctx context.Context, r *types.Run) error {
|
2019-04-27 13:16:48 +00:00
|
|
|
// TODO(sgotti) avoid saving multiple times the run on objectstorage if the
|
2019-02-21 14:54:50 +00:00
|
|
|
// store.DeletedArchivedRun fails
|
2019-04-27 13:16:48 +00:00
|
|
|
log.Infof("saving run in objectstorage: %s", r.ID)
|
|
|
|
ra, err := store.OSTSaveRunAction(r)
|
2019-02-21 14:54:50 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2019-03-29 11:15:48 +00:00
|
|
|
|
2019-04-26 14:00:03 +00:00
|
|
|
actions := append([]*datamanager.Action{ra})
|
2019-03-29 11:15:48 +00:00
|
|
|
|
2019-04-26 14:00:03 +00:00
|
|
|
if _, err = s.dm.WriteWal(ctx, actions, nil); err != nil {
|
2019-02-21 14:54:50 +00:00
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
log.Infof("deleting run from etcd: %s", r.ID)
|
|
|
|
if err := store.DeleteRun(ctx, s.e, r.ID); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2019-05-07 21:56:10 +00:00
|
|
|
func (s *Runservice) cacheCleanerLoop(ctx context.Context, cacheExpireInterval time.Duration) {
|
2019-04-17 11:58:41 +00:00
|
|
|
for {
|
|
|
|
if err := s.cacheCleaner(ctx, cacheExpireInterval); err != nil {
|
|
|
|
log.Errorf("err: %+v", err)
|
|
|
|
}
|
|
|
|
|
2019-07-25 13:53:26 +00:00
|
|
|
sleepCh := time.NewTimer(cacheCleanerInterval).C
|
2019-04-17 11:58:41 +00:00
|
|
|
select {
|
|
|
|
case <-ctx.Done():
|
|
|
|
return
|
2019-07-25 13:53:26 +00:00
|
|
|
case <-sleepCh:
|
2019-04-17 11:58:41 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-05-07 21:56:10 +00:00
|
|
|
func (s *Runservice) cacheCleaner(ctx context.Context, cacheExpireInterval time.Duration) error {
|
2019-04-17 11:58:41 +00:00
|
|
|
log.Debugf("cacheCleaner")
|
|
|
|
|
|
|
|
session, err := concurrency.NewSession(s.e.Client(), concurrency.WithTTL(5), concurrency.WithContext(ctx))
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
defer session.Close()
|
|
|
|
|
2019-04-27 06:59:47 +00:00
|
|
|
m := concurrency.NewMutex(session, common.EtcdCacheCleanerLockKey)
|
2019-04-17 11:58:41 +00:00
|
|
|
|
|
|
|
// TODO(sgotti) find a way to use a trylock so we'll just return if already
|
|
|
|
// locked. Currently multiple cachecleaners will enqueue and start when another
|
|
|
|
// finishes (unuseful and consume resources)
|
|
|
|
if err := m.Lock(ctx); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2019-07-02 12:53:01 +00:00
|
|
|
defer func() { _ = m.Unlock(ctx) }()
|
2019-04-17 11:58:41 +00:00
|
|
|
|
|
|
|
doneCh := make(chan struct{})
|
|
|
|
defer close(doneCh)
|
2019-04-27 13:16:48 +00:00
|
|
|
for object := range s.ost.List(store.OSTCacheDir()+"/", "", true, doneCh) {
|
2019-04-17 11:58:41 +00:00
|
|
|
if object.Err != nil {
|
|
|
|
return object.Err
|
|
|
|
}
|
|
|
|
if object.LastModified.Add(cacheExpireInterval).Before(time.Now()) {
|
2019-04-27 13:16:48 +00:00
|
|
|
if err := s.ost.DeleteObject(object.Path); err != nil {
|
2019-05-21 13:17:53 +00:00
|
|
|
if err != ostypes.ErrNotExist {
|
2019-04-17 11:58:41 +00:00
|
|
|
log.Warnf("failed to delete cache object %q: %v", object.Path, err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
2019-09-09 13:05:13 +00:00
|
|
|
|
|
|
|
func (s *Runservice) workspaceCleanerLoop(ctx context.Context, workspaceExpireInterval time.Duration) {
|
|
|
|
for {
|
|
|
|
if err := s.workspaceCleaner(ctx, workspaceExpireInterval); err != nil {
|
|
|
|
log.Errorf("err: %+v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
sleepCh := time.NewTimer(workspaceCleanerInterval).C
|
|
|
|
select {
|
|
|
|
case <-ctx.Done():
|
|
|
|
return
|
|
|
|
case <-sleepCh:
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *Runservice) workspaceCleaner(ctx context.Context, workspaceExpireInterval time.Duration) error {
|
|
|
|
log.Debugf("workspaceCleaner")
|
|
|
|
|
|
|
|
session, err := concurrency.NewSession(s.e.Client(), concurrency.WithTTL(5), concurrency.WithContext(ctx))
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
defer session.Close()
|
|
|
|
|
|
|
|
m := concurrency.NewMutex(session, common.EtcdWorkspaceCleanerLockKey)
|
|
|
|
|
|
|
|
// TODO(sgotti) find a way to use a trylock so we'll just return if already
|
|
|
|
// locked. Currently multiple workspacecleaners will enqueue and start when another
|
|
|
|
// finishes (unuseful and consume resources)
|
|
|
|
if err := m.Lock(ctx); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
defer func() { _ = m.Unlock(ctx) }()
|
|
|
|
|
|
|
|
doneCh := make(chan struct{})
|
|
|
|
defer close(doneCh)
|
|
|
|
for object := range s.ost.List(store.OSTArchivesBaseDir()+"/", "", true, doneCh) {
|
|
|
|
if object.Err != nil {
|
|
|
|
return object.Err
|
|
|
|
}
|
|
|
|
if object.LastModified.Add(workspaceExpireInterval).Before(time.Now()) {
|
|
|
|
if err := s.ost.DeleteObject(object.Path); err != nil {
|
|
|
|
if err != ostypes.ErrNotExist {
|
|
|
|
log.Warnf("failed to delete workspace object %q: %v", object.Path, err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|