mirror of
https://github.com/game-ci/unity-builder.git
synced 2025-07-07 20:35:33 -04:00
347 lines
13 KiB
TypeScript
347 lines
13 KiB
TypeScript
import * as k8s from '@kubernetes/client-node';
|
|
import { BuildParameters } from '../../..';
|
|
import * as core from '@actions/core';
|
|
import { ProviderInterface } from '../provider-interface';
|
|
import CloudRunnerSecret from '../../options/cloud-runner-secret';
|
|
import KubernetesStorage from './kubernetes-storage';
|
|
import CloudRunnerEnvironmentVariable from '../../options/cloud-runner-environment-variable';
|
|
import KubernetesTaskRunner from './kubernetes-task-runner';
|
|
import KubernetesSecret from './kubernetes-secret';
|
|
import KubernetesJobSpecFactory from './kubernetes-job-spec-factory';
|
|
import KubernetesServiceAccount from './kubernetes-service-account';
|
|
import CloudRunnerLogger from '../../services/core/cloud-runner-logger';
|
|
import { CoreV1Api } from '@kubernetes/client-node';
|
|
import CloudRunner from '../../cloud-runner';
|
|
import { ProviderResource } from '../provider-resource';
|
|
import { ProviderWorkflow } from '../provider-workflow';
|
|
import { RemoteClientLogger } from '../../remote-client/remote-client-logger';
|
|
import { KubernetesRole } from './kubernetes-role';
|
|
import KubernetesLogService from './kubernetes-log-service';
|
|
import { CloudRunnerSystem } from '../../services/core/cloud-runner-system';
|
|
|
|
class Kubernetes implements ProviderInterface {
|
|
public static Instance: Kubernetes;
|
|
public kubeConfig!: k8s.KubeConfig;
|
|
public kubeClient!: k8s.CoreV1Api;
|
|
public kubeClientApps!: k8s.AppsV1Api;
|
|
public kubeClientBatch!: k8s.BatchV1Api;
|
|
public rbacAuthorizationV1Api!: k8s.RbacAuthorizationV1Api;
|
|
public buildGuid: string = '';
|
|
public buildParameters!: BuildParameters;
|
|
public pvcName: string = '';
|
|
public secretName: string = '';
|
|
public jobName: string = '';
|
|
public namespace!: string;
|
|
public podName: string = '';
|
|
public containerName: string = '';
|
|
public cleanupCronJobName: string = '';
|
|
public serviceAccountName: string = '';
|
|
public ip: string = '';
|
|
|
|
// eslint-disable-next-line no-unused-vars
|
|
constructor(buildParameters: BuildParameters) {
|
|
Kubernetes.Instance = this;
|
|
this.kubeConfig = new k8s.KubeConfig();
|
|
this.kubeConfig.loadFromDefault();
|
|
this.kubeClient = this.kubeConfig.makeApiClient(k8s.CoreV1Api);
|
|
this.kubeClientApps = this.kubeConfig.makeApiClient(k8s.AppsV1Api);
|
|
this.kubeClientBatch = this.kubeConfig.makeApiClient(k8s.BatchV1Api);
|
|
this.rbacAuthorizationV1Api = this.kubeConfig.makeApiClient(k8s.RbacAuthorizationV1Api);
|
|
this.namespace = 'default';
|
|
CloudRunnerLogger.log('Loaded default Kubernetes configuration for this environment');
|
|
}
|
|
|
|
async PushLogUpdate(logs: string) {
|
|
// push logs to nginx file server via 'LOG_SERVICE_IP' env var
|
|
const ip = process.env[`LOG_SERVICE_IP`];
|
|
if (ip === undefined) {
|
|
RemoteClientLogger.logWarning(`LOG_SERVICE_IP not set, skipping log push`);
|
|
|
|
return;
|
|
}
|
|
const url = `http://${ip}/api/log`;
|
|
RemoteClientLogger.log(`Pushing logs to ${url}`);
|
|
|
|
// logs to base64
|
|
logs = Buffer.from(logs).toString('base64');
|
|
const response = await CloudRunnerSystem.Run(`curl -X POST -d "${logs}" ${url}`, false, true);
|
|
RemoteClientLogger.log(`Pushed logs to ${url} ${response}`);
|
|
}
|
|
|
|
async listResources(): Promise<ProviderResource[]> {
|
|
const pods = await this.kubeClient.listNamespacedPod(this.namespace);
|
|
const serviceAccounts = await this.kubeClient.listNamespacedServiceAccount(this.namespace);
|
|
const secrets = await this.kubeClient.listNamespacedSecret(this.namespace);
|
|
const jobs = await this.kubeClientBatch.listNamespacedJob(this.namespace);
|
|
|
|
return [
|
|
...pods.body.items.map((x) => {
|
|
return { Name: x.metadata?.name || `` };
|
|
}),
|
|
...serviceAccounts.body.items.map((x) => {
|
|
return { Name: x.metadata?.name || `` };
|
|
}),
|
|
...secrets.body.items.map((x) => {
|
|
return { Name: x.metadata?.name || `` };
|
|
}),
|
|
...jobs.body.items.map((x) => {
|
|
return { Name: x.metadata?.name || `` };
|
|
}),
|
|
];
|
|
}
|
|
listWorkflow(): Promise<ProviderWorkflow[]> {
|
|
throw new Error('Method not implemented.');
|
|
}
|
|
watchWorkflow(): Promise<string> {
|
|
throw new Error('Method not implemented.');
|
|
}
|
|
garbageCollect(
|
|
// eslint-disable-next-line no-unused-vars
|
|
filter: string,
|
|
// eslint-disable-next-line no-unused-vars
|
|
previewOnly: boolean,
|
|
// eslint-disable-next-line no-unused-vars
|
|
olderThan: Number,
|
|
// eslint-disable-next-line no-unused-vars
|
|
fullCache: boolean,
|
|
// eslint-disable-next-line no-unused-vars
|
|
baseDependencies: boolean,
|
|
): Promise<string> {
|
|
return new Promise((result) => result(``));
|
|
}
|
|
public async setupWorkflow(
|
|
buildGuid: string,
|
|
buildParameters: BuildParameters,
|
|
// eslint-disable-next-line no-unused-vars
|
|
branchName: string,
|
|
// eslint-disable-next-line no-unused-vars
|
|
defaultSecretsArray: { ParameterKey: string; EnvironmentVariable: string; ParameterValue: string }[],
|
|
) {
|
|
try {
|
|
this.buildParameters = buildParameters;
|
|
this.cleanupCronJobName = `unity-builder-cronjob-${buildParameters.buildGuid}`;
|
|
this.serviceAccountName = `service-account-${buildParameters.buildGuid}`;
|
|
|
|
await KubernetesServiceAccount.createServiceAccount(this.serviceAccountName, this.namespace, this.kubeClient);
|
|
} catch (error) {
|
|
throw error;
|
|
}
|
|
}
|
|
|
|
async runTaskInWorkflow(
|
|
buildGuid: string,
|
|
image: string,
|
|
commands: string,
|
|
mountdir: string,
|
|
workingdir: string,
|
|
environment: CloudRunnerEnvironmentVariable[],
|
|
secrets: CloudRunnerSecret[],
|
|
): Promise<string> {
|
|
try {
|
|
CloudRunnerLogger.log('Cloud Runner K8s workflow!');
|
|
|
|
// Setup
|
|
const id =
|
|
BuildParameters && BuildParameters.shouldUseRetainedWorkspaceMode(this.buildParameters)
|
|
? CloudRunner.lockedWorkspace
|
|
: this.buildParameters.buildGuid;
|
|
this.pvcName = `unity-builder-pvc-${id}`;
|
|
await KubernetesStorage.createPersistentVolumeClaim(
|
|
this.buildParameters,
|
|
this.pvcName,
|
|
this.kubeClient,
|
|
this.namespace,
|
|
);
|
|
this.buildGuid = buildGuid;
|
|
this.secretName = `build-credentials-${this.buildGuid}`;
|
|
this.jobName = `unity-builder-job-${this.buildGuid}`;
|
|
this.containerName = `main`;
|
|
await KubernetesSecret.createSecret(secrets, this.secretName, this.namespace, this.kubeClient);
|
|
let output = '';
|
|
try {
|
|
this.ip =
|
|
(await KubernetesLogService.createLogDeployment(this.namespace, this.kubeClientApps, this.kubeClient)) || ``;
|
|
CloudRunnerLogger.log('Job does not exist');
|
|
await this.createJob(commands, image, mountdir, workingdir, environment, secrets);
|
|
CloudRunnerLogger.log('Watching pod until running');
|
|
await KubernetesTaskRunner.watchUntilPodRunning(this.kubeClient, this.podName, this.namespace);
|
|
|
|
CloudRunnerLogger.log('Pod running, streaming logs');
|
|
CloudRunnerLogger.log(
|
|
`Starting logs follow for pod: ${this.podName} container: ${this.containerName} namespace: ${this.namespace} pvc: ${this.pvcName} ${CloudRunner.buildParameters.kubeVolumeSize}/${CloudRunner.buildParameters.containerCpu}/${CloudRunner.buildParameters.containerMemory}`,
|
|
);
|
|
output += await KubernetesTaskRunner.runTask(
|
|
this.kubeConfig,
|
|
this.kubeClient,
|
|
this.jobName,
|
|
this.podName,
|
|
this.containerName,
|
|
this.namespace,
|
|
);
|
|
} catch (error: any) {
|
|
CloudRunnerLogger.log(`error running k8s workflow ${error}`);
|
|
await new Promise((resolve) => setTimeout(resolve, 3000));
|
|
CloudRunnerLogger.log(
|
|
JSON.stringify(
|
|
(await this.kubeClient.listNamespacedEvent(this.namespace)).body.items
|
|
.map((x) => {
|
|
return {
|
|
message: x.message || ``,
|
|
name: x.metadata.name || ``,
|
|
reason: x.reason || ``,
|
|
};
|
|
})
|
|
.filter((x) => x.name.includes(this.podName)),
|
|
undefined,
|
|
4,
|
|
),
|
|
);
|
|
await this.cleanupTaskResources();
|
|
throw error;
|
|
}
|
|
|
|
await this.cleanupTaskResources();
|
|
|
|
return output;
|
|
} catch (error) {
|
|
CloudRunnerLogger.log('Running job failed');
|
|
core.error(JSON.stringify(error, undefined, 4));
|
|
|
|
// await this.cleanupTaskResources();
|
|
throw error;
|
|
}
|
|
}
|
|
|
|
private async createJob(
|
|
commands: string,
|
|
image: string,
|
|
mountdir: string,
|
|
workingdir: string,
|
|
environment: CloudRunnerEnvironmentVariable[],
|
|
secrets: CloudRunnerSecret[],
|
|
) {
|
|
await this.createNamespacedJob(commands, image, mountdir, workingdir, environment, secrets);
|
|
const find = await Kubernetes.findPodFromJob(this.kubeClient, this.jobName, this.namespace);
|
|
this.setPodNameAndContainerName(find);
|
|
}
|
|
|
|
private async doesJobExist(name: string) {
|
|
const jobs = await this.kubeClientBatch.listNamespacedJob(this.namespace);
|
|
|
|
return jobs.body.items.some((x) => x.metadata?.name === name);
|
|
}
|
|
|
|
private async doesFailedJobExist() {
|
|
const podStatus = await this.kubeClient.readNamespacedPodStatus(this.podName, this.namespace);
|
|
|
|
return podStatus.body.status?.phase === `Failed`;
|
|
}
|
|
|
|
private async createNamespacedJob(
|
|
commands: string,
|
|
image: string,
|
|
mountdir: string,
|
|
workingdir: string,
|
|
environment: CloudRunnerEnvironmentVariable[],
|
|
secrets: CloudRunnerSecret[],
|
|
) {
|
|
for (let index = 0; index < 3; index++) {
|
|
try {
|
|
const jobSpec = KubernetesJobSpecFactory.getJobSpec(
|
|
commands,
|
|
image,
|
|
mountdir,
|
|
workingdir,
|
|
environment,
|
|
secrets,
|
|
this.buildGuid,
|
|
this.buildParameters,
|
|
this.secretName,
|
|
this.pvcName,
|
|
this.jobName,
|
|
k8s,
|
|
this.containerName,
|
|
this.ip,
|
|
);
|
|
await new Promise((promise) => setTimeout(promise, 15000));
|
|
|
|
// await KubernetesRole.createRole(this.serviceAccountName, this.namespace, this.rbacAuthorizationV1Api);
|
|
|
|
const result = await this.kubeClientBatch.createNamespacedJob(this.namespace, jobSpec);
|
|
CloudRunnerLogger.log(`Build job created`);
|
|
await new Promise((promise) => setTimeout(promise, 5000));
|
|
CloudRunnerLogger.log('Job created');
|
|
await KubernetesLogService.cleanupLogDeployment(this.namespace, this.kubeClientApps, this.kubeClient);
|
|
|
|
return result.body.metadata?.name;
|
|
} catch (error) {
|
|
CloudRunnerLogger.log(`Error occured creating job: ${error}`);
|
|
throw error;
|
|
}
|
|
}
|
|
}
|
|
|
|
setPodNameAndContainerName(pod: k8s.V1Pod) {
|
|
this.podName = pod.metadata?.name || '';
|
|
this.containerName = pod.status?.containerStatuses?.[0].name || this.containerName;
|
|
}
|
|
|
|
async cleanupTaskResources() {
|
|
CloudRunnerLogger.log('cleaning up');
|
|
try {
|
|
await this.kubeClientBatch.deleteNamespacedJob(this.jobName, this.namespace);
|
|
await this.kubeClient.deleteNamespacedPod(this.podName, this.namespace);
|
|
await KubernetesRole.deleteRole(this.serviceAccountName, this.namespace, this.rbacAuthorizationV1Api);
|
|
await KubernetesLogService.cleanupLogDeployment(this.namespace, this.kubeClientApps, this.kubeClient);
|
|
} catch (error: any) {
|
|
CloudRunnerLogger.log(`Failed to cleanup`);
|
|
if (error.response.body.reason !== `NotFound`) {
|
|
CloudRunnerLogger.log(`Wasn't a not found error: ${error.response.body.reason}`);
|
|
throw error;
|
|
}
|
|
}
|
|
try {
|
|
await this.kubeClient.deleteNamespacedSecret(this.secretName, this.namespace);
|
|
} catch (error: any) {
|
|
CloudRunnerLogger.log(`Failed to cleanup secret`);
|
|
CloudRunnerLogger.log(error.response.body.reason);
|
|
}
|
|
CloudRunnerLogger.log('cleaned up Secret, Job and Pod');
|
|
CloudRunnerLogger.log('cleaning up finished');
|
|
}
|
|
|
|
async cleanupWorkflow(
|
|
buildGuid: string,
|
|
buildParameters: BuildParameters,
|
|
// eslint-disable-next-line no-unused-vars
|
|
branchName: string,
|
|
// eslint-disable-next-line no-unused-vars
|
|
defaultSecretsArray: { ParameterKey: string; EnvironmentVariable: string; ParameterValue: string }[],
|
|
) {
|
|
if (BuildParameters && BuildParameters.shouldUseRetainedWorkspaceMode(buildParameters)) {
|
|
return;
|
|
}
|
|
CloudRunnerLogger.log(`deleting PVC`);
|
|
|
|
try {
|
|
await this.kubeClient.deleteNamespacedPersistentVolumeClaim(this.pvcName, this.namespace);
|
|
await this.kubeClient.deleteNamespacedServiceAccount(this.serviceAccountName, this.namespace);
|
|
CloudRunnerLogger.log('cleaned up PVC and Service Account');
|
|
} catch (error: any) {
|
|
CloudRunnerLogger.log(`Cleanup failed ${JSON.stringify(error, undefined, 4)}`);
|
|
throw error;
|
|
}
|
|
}
|
|
|
|
static async findPodFromJob(kubeClient: CoreV1Api, jobName: string, namespace: string) {
|
|
const namespacedPods = await kubeClient.listNamespacedPod(namespace);
|
|
const pod = namespacedPods.body.items.find((x) => x.metadata?.labels?.['job-name'] === jobName);
|
|
if (pod === undefined) {
|
|
throw new Error("pod with job-name label doesn't exist");
|
|
}
|
|
|
|
return pod;
|
|
}
|
|
}
|
|
export default Kubernetes;
|