2019-02-21 14:54:50 +00:00
|
|
|
// Copyright 2019 Sorint.lab
|
|
|
|
//
|
|
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
// you may not use this file except in compliance with the License.
|
|
|
|
// You may obtain a copy of the License at
|
|
|
|
//
|
|
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
//
|
|
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied
|
|
|
|
// See the License for the specific language governing permissions and
|
|
|
|
// limitations under the License.
|
|
|
|
|
|
|
|
package common
|
|
|
|
|
|
|
|
import (
|
2019-09-12 08:36:45 +00:00
|
|
|
"fmt"
|
2019-02-21 14:54:50 +00:00
|
|
|
"path"
|
2019-09-12 08:36:45 +00:00
|
|
|
"sort"
|
|
|
|
|
|
|
|
"agola.io/agola/internal/runconfig"
|
|
|
|
"agola.io/agola/internal/util"
|
|
|
|
"agola.io/agola/services/runservice/types"
|
2019-02-21 14:54:50 +00:00
|
|
|
)
|
|
|
|
|
2019-04-13 12:58:56 +00:00
|
|
|
const (
|
|
|
|
MaxCacheKeyLength = 200
|
|
|
|
)
|
|
|
|
|
2019-02-21 14:54:50 +00:00
|
|
|
type ErrNotExist struct {
|
|
|
|
err error
|
|
|
|
}
|
|
|
|
|
|
|
|
func NewErrNotExist(err error) error {
|
|
|
|
return ErrNotExist{err: err}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (e ErrNotExist) Error() string {
|
|
|
|
return e.err.Error()
|
|
|
|
}
|
|
|
|
|
|
|
|
var (
|
2019-04-27 06:59:47 +00:00
|
|
|
EtcdSchedulerBaseDir = "scheduler"
|
2019-02-21 14:54:50 +00:00
|
|
|
|
2019-04-27 06:59:47 +00:00
|
|
|
EtcdRunsDir = path.Join(EtcdSchedulerBaseDir, "runs")
|
|
|
|
EtcdRunSequenceKey = path.Join(EtcdSchedulerBaseDir, "runsequence")
|
|
|
|
EtcdRunEventKey = path.Join(EtcdSchedulerBaseDir, "runevents")
|
|
|
|
EtcdRunEventSequenceKey = path.Join(EtcdSchedulerBaseDir, "runeventsequence")
|
2019-02-21 14:54:50 +00:00
|
|
|
|
2019-04-27 06:59:47 +00:00
|
|
|
EtcdChangeGroupsDir = path.Join(EtcdSchedulerBaseDir, "changegroups")
|
|
|
|
EtcdChangeGroupMinRevisionKey = path.Join(EtcdSchedulerBaseDir, "changegroupsminrev")
|
2019-04-27 06:50:25 +00:00
|
|
|
|
2019-04-27 06:59:47 +00:00
|
|
|
EtcdExecutorsDir = path.Join(EtcdSchedulerBaseDir, "executors")
|
|
|
|
EtcdTasksDir = path.Join(EtcdSchedulerBaseDir, "tasks")
|
|
|
|
|
|
|
|
EtcdPingKey = path.Join(EtcdSchedulerBaseDir, "ping")
|
|
|
|
|
2019-07-10 08:20:35 +00:00
|
|
|
EtcdCompactChangeGroupsLockKey = path.Join(EtcdSchedulerBaseDir, "compactchangegroupslock")
|
|
|
|
EtcdCacheCleanerLockKey = path.Join(EtcdSchedulerBaseDir, "locks", "cachecleaner")
|
2019-09-09 13:05:13 +00:00
|
|
|
EtcdWorkspaceCleanerLockKey = path.Join(EtcdSchedulerBaseDir, "locks", "workspacecleaner")
|
2019-07-10 08:20:35 +00:00
|
|
|
EtcdTaskUpdaterLockKey = path.Join(EtcdSchedulerBaseDir, "locks", "taskupdater")
|
2019-07-25 13:54:58 +00:00
|
|
|
|
|
|
|
EtcdMaintenanceKey = "maintenance"
|
2019-02-21 14:54:50 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
func EtcdRunKey(runID string) string { return path.Join(EtcdRunsDir, runID) }
|
|
|
|
func EtcdExecutorKey(taskID string) string { return path.Join(EtcdExecutorsDir, taskID) }
|
|
|
|
func EtcdTaskKey(taskID string) string { return path.Join(EtcdTasksDir, taskID) }
|
|
|
|
|
|
|
|
const (
|
|
|
|
EtcdChangeGroupMinRevisionRange = 100
|
|
|
|
)
|
|
|
|
|
|
|
|
var (
|
|
|
|
StorageDataDir = ""
|
|
|
|
StorageRunsDir = path.Join(StorageDataDir, "runs")
|
|
|
|
StorageRunsConfigDir = path.Join(StorageDataDir, "runsconfig")
|
|
|
|
StorageRunsIndexesDir = path.Join(StorageDataDir, "runsindexes")
|
|
|
|
StorageCountersDir = path.Join(StorageDataDir, "counters")
|
|
|
|
)
|
|
|
|
|
2019-04-01 10:54:43 +00:00
|
|
|
type DataType string
|
2019-02-21 14:54:50 +00:00
|
|
|
|
|
|
|
const (
|
2019-04-01 10:54:43 +00:00
|
|
|
DataTypeRun DataType = "run"
|
|
|
|
DataTypeRunConfig DataType = "runconfig"
|
|
|
|
DataTypeRunCounter DataType = "runcounter"
|
2019-02-21 14:54:50 +00:00
|
|
|
)
|
2019-09-12 08:36:45 +00:00
|
|
|
|
|
|
|
func OSTSubGroupsAndGroupTypes(group string) []string {
|
|
|
|
h := util.PathHierarchy(group)
|
|
|
|
if len(h)%2 != 1 {
|
|
|
|
panic(fmt.Errorf("wrong group path %q", group))
|
|
|
|
}
|
|
|
|
|
|
|
|
return h
|
|
|
|
}
|
|
|
|
|
|
|
|
func OSTRootGroup(group string) string {
|
|
|
|
pl := util.PathList(group)
|
|
|
|
if len(pl) < 2 {
|
|
|
|
panic(fmt.Errorf("cannot determine root group name, wrong group path %q", group))
|
|
|
|
}
|
|
|
|
|
|
|
|
return pl[1]
|
|
|
|
}
|
|
|
|
|
|
|
|
func OSTSubGroups(group string) []string {
|
|
|
|
h := util.PathHierarchy(group)
|
|
|
|
if len(h)%2 != 1 {
|
|
|
|
panic(fmt.Errorf("wrong group path %q", group))
|
|
|
|
}
|
|
|
|
|
|
|
|
// remove group types
|
|
|
|
sg := []string{}
|
|
|
|
for i, g := range h {
|
|
|
|
if i%2 == 0 {
|
|
|
|
sg = append(sg, g)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return sg
|
|
|
|
}
|
|
|
|
|
|
|
|
func OSTSubGroupTypes(group string) []string {
|
|
|
|
h := util.PathHierarchy(group)
|
|
|
|
if len(h)%2 != 1 {
|
|
|
|
panic(fmt.Errorf("wrong group path %q", group))
|
|
|
|
}
|
|
|
|
|
|
|
|
// remove group names
|
|
|
|
sg := []string{}
|
|
|
|
for i, g := range h {
|
|
|
|
if i%2 == 1 {
|
|
|
|
sg = append(sg, g)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return sg
|
|
|
|
}
|
|
|
|
|
|
|
|
type parentsByLevelName []*types.RunConfigTask
|
|
|
|
|
|
|
|
func (p parentsByLevelName) Len() int { return len(p) }
|
|
|
|
func (p parentsByLevelName) Less(i, j int) bool {
|
|
|
|
if p[i].Level != p[j].Level {
|
|
|
|
return p[i].Level < p[j].Level
|
|
|
|
}
|
|
|
|
return p[i].Name < p[j].Name
|
|
|
|
}
|
|
|
|
func (p parentsByLevelName) Swap(i, j int) { p[i], p[j] = p[j], p[i] }
|
|
|
|
|
|
|
|
func mergeEnv(dest, src map[string]string) {
|
|
|
|
for k, v := range src {
|
|
|
|
dest[k] = v
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func GenExecutorTaskSpecData(r *types.Run, rt *types.RunTask, rc *types.RunConfig) *types.ExecutorTaskSpecData {
|
|
|
|
rct := rc.Tasks[rt.ID]
|
|
|
|
|
|
|
|
environment := map[string]string{}
|
|
|
|
if rct.Environment != nil {
|
|
|
|
environment = rct.Environment
|
|
|
|
}
|
|
|
|
mergeEnv(environment, rc.StaticEnvironment)
|
|
|
|
// run config Environment variables ovverride every other environment variable
|
|
|
|
mergeEnv(environment, rc.Environment)
|
|
|
|
|
|
|
|
cachePrefix := OSTRootGroup(r.Group)
|
|
|
|
if rc.CacheGroup != "" {
|
|
|
|
cachePrefix = rc.CacheGroup
|
|
|
|
}
|
|
|
|
|
|
|
|
data := &types.ExecutorTaskSpecData{
|
|
|
|
// The executorTask ID must be the same as the runTask ID so we can detect if
|
|
|
|
// there's already an executorTask scheduled for that run task and we can get
|
|
|
|
// at most once task execution
|
|
|
|
TaskName: rct.Name,
|
|
|
|
Arch: rct.Runtime.Arch,
|
|
|
|
Containers: rct.Runtime.Containers,
|
|
|
|
Environment: environment,
|
|
|
|
WorkingDir: rct.WorkingDir,
|
|
|
|
Shell: rct.Shell,
|
|
|
|
User: rct.User,
|
|
|
|
Steps: rct.Steps,
|
|
|
|
CachePrefix: cachePrefix,
|
|
|
|
DockerRegistriesAuth: rct.DockerRegistriesAuth,
|
|
|
|
}
|
|
|
|
|
|
|
|
// calculate workspace operations
|
|
|
|
// TODO(sgotti) right now we don't support duplicated files. So it's not currently possibile to overwrite a file in a upper layer.
|
|
|
|
// this simplifies the workspaces extractions since they could be extracted in any order. We make them ordered just for reproducibility
|
|
|
|
wsops := []types.WorkspaceOperation{}
|
|
|
|
rctAllParents := runconfig.GetAllParents(rc.Tasks, rct)
|
|
|
|
|
|
|
|
// sort parents by level and name just for reproducibility
|
|
|
|
sort.Sort(parentsByLevelName(rctAllParents))
|
|
|
|
|
|
|
|
for _, rctParent := range rctAllParents {
|
|
|
|
for _, archiveStep := range r.Tasks[rctParent.ID].WorkspaceArchives {
|
|
|
|
wsop := types.WorkspaceOperation{TaskID: rctParent.ID, Step: archiveStep}
|
|
|
|
wsops = append(wsops, wsop)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
data.WorkspaceOperations = wsops
|
|
|
|
|
|
|
|
return data
|
|
|
|
}
|
|
|
|
|
|
|
|
func GenExecutorTask(r *types.Run, rt *types.RunTask, rc *types.RunConfig, executor *types.Executor) *types.ExecutorTask {
|
|
|
|
rct := rc.Tasks[rt.ID]
|
|
|
|
|
|
|
|
et := &types.ExecutorTask{
|
|
|
|
// The executorTask ID must be the same as the runTask ID so we can detect if
|
|
|
|
// there's already an executorTask scheduled for that run task and we can get
|
|
|
|
// at most once task execution
|
|
|
|
ID: rt.ID,
|
|
|
|
Spec: types.ExecutorTaskSpec{
|
|
|
|
ExecutorID: executor.ID,
|
|
|
|
RunID: r.ID,
|
|
|
|
// ExecutorTaskSpecData is not saved in etcd to avoid exceeding the max etcd value
|
|
|
|
// size but is generated everytime the executor task is sent to the executor
|
|
|
|
},
|
|
|
|
Status: types.ExecutorTaskStatus{
|
|
|
|
Phase: types.ExecutorTaskPhaseNotStarted,
|
|
|
|
Steps: make([]*types.ExecutorTaskStepStatus, len(rct.Steps)),
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
for i := range et.Status.Steps {
|
|
|
|
et.Status.Steps[i] = &types.ExecutorTaskStepStatus{
|
|
|
|
Phase: types.ExecutorTaskPhaseNotStarted,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return et
|
|
|
|
}
|