1
0
mirror of https://github.com/woodpecker-ci/woodpecker.git synced 2024-11-30 08:06:52 +02:00
woodpecker/cmd/agent/agent.go

185 lines
4.2 KiB
Go
Raw Normal View History

2018-02-20 00:24:10 +02:00
// Copyright 2018 Drone.IO Inc.
2018-03-21 15:02:17 +02:00
//
2018-02-20 00:24:10 +02:00
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
2018-03-21 15:02:17 +02:00
//
2018-02-20 00:24:10 +02:00
// http://www.apache.org/licenses/LICENSE-2.0
2018-03-21 15:02:17 +02:00
//
2018-02-20 00:24:10 +02:00
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
2017-06-30 00:51:22 +02:00
package main
2016-04-20 03:37:53 +02:00
import (
2017-03-16 12:14:02 +02:00
"context"
"crypto/tls"
2017-09-12 20:25:55 +02:00
"net/http"
"os"
2016-04-20 03:37:53 +02:00
"sync"
"github.com/rs/zerolog"
"github.com/rs/zerolog/log"
"github.com/tevino/abool"
"github.com/urfave/cli/v2"
2017-06-28 19:21:22 +02:00
"google.golang.org/grpc"
grpccredentials "google.golang.org/grpc/credentials"
2018-01-08 17:28:38 +02:00
"google.golang.org/grpc/keepalive"
"google.golang.org/grpc/metadata"
2017-06-28 19:21:22 +02:00
"github.com/woodpecker-ci/woodpecker/agent"
"github.com/woodpecker-ci/woodpecker/pipeline/backend"
"github.com/woodpecker-ci/woodpecker/pipeline/rpc"
2016-04-20 03:37:53 +02:00
)
2017-03-16 12:14:02 +02:00
func loop(c *cli.Context) error {
filter := rpc.Filter{
Labels: map[string]string{
"platform": c.String("platform"),
},
Expr: c.String("filter"),
2017-03-16 12:14:02 +02:00
}
2016-04-20 03:37:53 +02:00
hostname := c.String("hostname")
if len(hostname) == 0 {
hostname, _ = os.Hostname()
}
2017-09-12 20:25:55 +02:00
if c.Bool("pretty") {
log.Logger = log.Output(
zerolog.ConsoleWriter{
Out: os.Stderr,
NoColor: c.Bool("nocolor"),
2017-09-12 20:25:55 +02:00
},
)
}
zerolog.SetGlobalLevel(zerolog.WarnLevel)
if c.Bool("debug") {
if c.IsSet("debug") {
log.Warn().Msg("--debug is deprecated, use --log-level instead")
}
zerolog.SetGlobalLevel(zerolog.DebugLevel)
}
if c.IsSet("log-level") {
logLevelFlag := c.String("log-level")
lvl, err := zerolog.ParseLevel(logLevelFlag)
if err != nil {
log.Fatal().Msgf("unknown logging level: %s", logLevelFlag)
}
zerolog.SetGlobalLevel(lvl)
}
2017-09-12 22:40:24 +02:00
counter.Polling = c.Int("max-procs")
counter.Running = 0
if c.Bool("healthcheck") {
go func() {
if err := http.ListenAndServe(":3000", nil); err != nil {
log.Error().Msgf("can not listen on port 3000: %v", err)
}
}()
2017-09-12 20:25:55 +02:00
}
2017-06-28 19:21:22 +02:00
// TODO pass version information to grpc server
// TODO authenticate to grpc server
2017-06-30 01:35:38 +02:00
// grpc.Dial(target, ))
var transport = grpc.WithInsecure()
if c.Bool("secure-grpc") {
transport = grpc.WithTransportCredentials(grpccredentials.NewTLS(&tls.Config{InsecureSkipVerify: c.Bool("skip-insecure-grpc")}))
}
2017-06-28 19:21:22 +02:00
conn, err := grpc.Dial(
c.String("server"),
transport,
2017-06-30 01:35:38 +02:00
grpc.WithPerRPCCredentials(&credentials{
username: c.String("username"),
password: c.String("password"),
}),
grpc.WithKeepaliveParams(keepalive.ClientParameters{
2018-03-21 15:02:17 +02:00
Time: c.Duration("keepalive-time"),
Timeout: c.Duration("keepalive-timeout"),
}),
2017-03-16 12:14:02 +02:00
)
2017-03-16 12:14:02 +02:00
if err != nil {
return err
2017-03-05 09:56:08 +02:00
}
2017-06-28 19:21:22 +02:00
defer conn.Close()
client := rpc.NewGrpcClient(conn)
2017-03-05 09:56:08 +02:00
2017-03-16 12:14:02 +02:00
sigterm := abool.New()
ctx := metadata.NewOutgoingContext(
context.Background(),
metadata.Pairs("hostname", hostname),
)
ctx = WithContextFunc(ctx, func() {
2017-03-16 12:14:02 +02:00
println("ctrl+c received, terminating process")
sigterm.Set()
})
2016-09-29 23:45:13 +02:00
2017-03-16 12:14:02 +02:00
var wg sync.WaitGroup
parallel := c.Int("max-procs")
wg.Add(parallel)
2016-09-29 23:45:13 +02:00
2017-03-16 12:14:02 +02:00
for i := 0; i < parallel; i++ {
go func() {
defer wg.Done()
for {
if sigterm.IsSet() {
return
}
// new engine
engine, err := backend.FindEngine(c.String("backend-engine"))
if err != nil {
log.Error().Err(err).Msgf("cannot find backend engine '%s'", c.String("backend-engine"))
return
2017-09-14 18:39:52 +02:00
}
// load enginge (e.g. init api client)
err = engine.Load()
if err != nil {
log.Error().Err(err).Msg("cannot load backend engine")
return
}
log.Debug().Msgf("loaded %s backend engine", engine.Name())
r := agent.NewRunner(client, filter, hostname, counter, &engine)
if err := r.Run(ctx); err != nil {
2017-08-03 21:36:22 +02:00
log.Error().Err(err).Msg("pipeline done with error")
2017-03-16 12:14:02 +02:00
return
}
}
}()
2016-04-20 03:37:53 +02:00
}
2017-03-16 12:14:02 +02:00
wg.Wait()
return nil
}
2017-06-30 01:35:38 +02:00
type credentials struct {
username string
password string
}
func (c *credentials) GetRequestMetadata(context.Context, ...string) (map[string]string, error) {
2017-06-30 01:35:38 +02:00
return map[string]string{
"username": c.username,
"password": c.password,
}, nil
}
func (c *credentials) RequireTransportSecurity() bool {
return false
}