woodpecker/pipeline/frontend/yaml/compiler/compiler.go

303 lines
8.5 KiB
Go
Raw Normal View History

// Copyright 2023 Woodpecker Authors
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
2017-03-05 07:56:08 +00:00
package compiler
import (
"fmt"
"path"
2017-03-05 07:56:08 +00:00
backend_types "github.com/woodpecker-ci/woodpecker/pipeline/backend/types"
"github.com/woodpecker-ci/woodpecker/pipeline/frontend/metadata"
yaml_types "github.com/woodpecker-ci/woodpecker/pipeline/frontend/yaml/types"
"github.com/woodpecker-ci/woodpecker/pipeline/frontend/yaml/utils"
"github.com/woodpecker-ci/woodpecker/shared/constant"
2017-03-05 07:56:08 +00:00
)
const (
defaultCloneName = "clone"
nameServices = "services"
)
// Registry represents registry credentials
2017-04-06 16:04:25 +00:00
type Registry struct {
Hostname string
Username string
Password string
Email string
Token string
}
2017-04-10 10:39:50 +00:00
type Secret struct {
Name string
Value string
Match []string
PluginOnly bool
}
func (s *Secret) Available(container *yaml_types.Container) bool {
return (len(s.Match) == 0 || utils.MatchImage(container.Image, s.Match...)) && (!s.PluginOnly || container.IsPlugin())
2017-04-10 10:39:50 +00:00
}
type secretMap map[string]Secret
func (sm secretMap) toStringMap() map[string]string {
m := make(map[string]string, len(sm))
for k, v := range sm {
m[k] = v.Value
}
return m
}
2017-06-22 19:06:28 +00:00
type ResourceLimit struct {
MemSwapLimit int64
MemLimit int64
ShmSize int64
CPUQuota int64
CPUShares int64
CPUSet string
}
2017-03-05 07:56:08 +00:00
// Compiler compiles the yaml
type Compiler struct {
local bool
escalated []string
prefix string
volumes []string
networks []string
env map[string]string
cloneEnv map[string]string
base string
path string
metadata metadata.Metadata
registries []Registry
secrets secretMap
cacher Cacher
reslimit ResourceLimit
defaultCloneImage string
trustedPipeline bool
netrcOnlyTrusted bool
2017-03-05 07:56:08 +00:00
}
// New creates a new Compiler with options.
func New(opts ...Option) *Compiler {
2017-04-10 10:39:50 +00:00
compiler := &Compiler{
env: map[string]string{},
cloneEnv: map[string]string{},
secrets: map[string]Secret{},
2017-04-10 10:39:50 +00:00
}
2017-03-05 07:56:08 +00:00
for _, opt := range opts {
opt(compiler)
}
return compiler
}
// Compile compiles the YAML configuration to the pipeline intermediate
// representation configuration format.
func (c *Compiler) Compile(conf *yaml_types.Workflow) (*backend_types.Config, error) {
config := new(backend_types.Config)
2017-03-05 07:56:08 +00:00
if match, err := conf.When.Match(c.metadata, true, c.env); !match && err == nil {
// This pipeline does not match the configured filter so return an empty config and stop further compilation.
// An empty pipeline will just be skipped completely.
return config, nil
} else if err != nil {
return nil, err
}
2017-03-05 07:56:08 +00:00
// create a default volume
config.Volumes = append(config.Volumes, &backend_types.Volume{
Name: fmt.Sprintf("%s_default", c.prefix),
2017-03-05 07:56:08 +00:00
})
// create a default network
config.Networks = append(config.Networks, &backend_types.Network{
Name: fmt.Sprintf("%s_default", c.prefix),
})
2017-03-05 07:56:08 +00:00
2020-11-19 07:42:18 +00:00
// create secrets for mask
for _, sec := range c.secrets {
config.Secrets = append(config.Secrets, &backend_types.Secret{
2020-11-19 07:42:18 +00:00
Name: sec.Name,
Value: sec.Value,
Mask: true,
})
}
2017-03-05 07:56:08 +00:00
// overrides the default workspace paths when specified
// in the YAML file.
if len(conf.Workspace.Base) != 0 {
c.base = conf.Workspace.Base
}
if len(conf.Workspace.Path) != 0 {
c.path = conf.Workspace.Path
}
cloneImage := constant.DefaultCloneImage
if len(c.defaultCloneImage) > 0 {
cloneImage = c.defaultCloneImage
}
2017-03-05 07:56:08 +00:00
// add default clone step
if !c.local && len(conf.Clone.ContainerList) == 0 && !conf.SkipClone {
cloneSettings := map[string]interface{}{"depth": "0"}
if c.metadata.Curr.Event == metadata.EventTag {
cloneSettings["tags"] = "true"
}
container := &yaml_types.Container{
Name: defaultCloneName,
Image: cloneImage,
Settings: cloneSettings,
Environment: c.cloneEnv,
}
2017-03-05 07:56:08 +00:00
name := fmt.Sprintf("%s_clone", c.prefix)
step := c.createProcess(name, container, backend_types.StepTypeClone)
2017-03-05 07:56:08 +00:00
stage := new(backend_types.Stage)
2017-03-05 07:56:08 +00:00
stage.Name = name
stage.Alias = defaultCloneName
2017-03-05 07:56:08 +00:00
stage.Steps = append(stage.Steps, step)
config.Stages = append(config.Stages, stage)
} else if !c.local && !conf.SkipClone {
for i, container := range conf.Clone.ContainerList {
if match, err := container.When.Match(c.metadata, false, c.env); !match && err == nil {
2017-03-05 07:56:08 +00:00
continue
} else if err != nil {
return nil, err
2017-03-05 07:56:08 +00:00
}
stage := new(backend_types.Stage)
2017-03-05 07:56:08 +00:00
stage.Name = fmt.Sprintf("%s_clone_%v", c.prefix, i)
stage.Alias = container.Name
name := fmt.Sprintf("%s_clone_%d", c.prefix, i)
step := c.createProcess(name, container, backend_types.StepTypeClone)
// only inject netrc if it's a trusted repo or a trusted plugin
if !c.netrcOnlyTrusted || c.trustedPipeline || (container.IsPlugin() && container.IsTrustedCloneImage()) {
for k, v := range c.cloneEnv {
step.Environment[k] = v
}
}
2017-03-05 07:56:08 +00:00
stage.Steps = append(stage.Steps, step)
config.Stages = append(config.Stages, stage)
}
}
2017-06-22 19:06:28 +00:00
c.setupCache(conf, config)
2017-03-05 07:56:08 +00:00
// add services steps
if len(conf.Services.ContainerList) != 0 {
stage := new(backend_types.Stage)
stage.Name = fmt.Sprintf("%s_%s", c.prefix, nameServices)
stage.Alias = nameServices
2017-03-05 07:56:08 +00:00
for i, container := range conf.Services.ContainerList {
if match, err := container.When.Match(c.metadata, false, c.env); !match && err == nil {
2017-05-14 17:28:17 +00:00
continue
} else if err != nil {
return nil, err
2017-05-14 17:28:17 +00:00
}
name := fmt.Sprintf("%s_%s_%d", c.prefix, nameServices, i)
step := c.createProcess(name, container, backend_types.StepTypeService)
2017-03-05 07:56:08 +00:00
stage.Steps = append(stage.Steps, step)
}
config.Stages = append(config.Stages, stage)
}
// add pipeline steps. 1 pipeline step per stage, at the moment
var stage *backend_types.Stage
2017-03-05 07:56:08 +00:00
var group string
for i, container := range conf.Steps.ContainerList {
2022-01-05 20:50:23 +00:00
// Skip if local and should not run local
if c.local && !container.When.IsLocal() {
2017-05-06 01:15:47 +00:00
continue
}
if match, err := container.When.Match(c.metadata, false, c.env); !match && err == nil {
2017-03-05 07:56:08 +00:00
continue
} else if err != nil {
return nil, err
2017-03-05 07:56:08 +00:00
}
if stage == nil || group != container.Group || container.Group == "" {
group = container.Group
stage = new(backend_types.Stage)
2017-03-05 07:56:08 +00:00
stage.Name = fmt.Sprintf("%s_stage_%v", c.prefix, i)
stage.Alias = container.Name
config.Stages = append(config.Stages, stage)
2017-03-05 07:56:08 +00:00
}
name := fmt.Sprintf("%s_step_%d", c.prefix, i)
stepType := backend_types.StepTypeCommands
if container.IsPlugin() {
stepType = backend_types.StepTypePlugin
}
step := c.createProcess(name, container, stepType)
// inject netrc if it's a trusted repo or a trusted clone-plugin
if c.trustedPipeline || (container.IsPlugin() && container.IsTrustedCloneImage()) {
for k, v := range c.cloneEnv {
step.Environment[k] = v
}
}
2017-03-05 07:56:08 +00:00
stage.Steps = append(stage.Steps, step)
}
2017-06-22 19:06:28 +00:00
c.setupCacheRebuild(conf, config)
return config, nil
2017-03-05 07:56:08 +00:00
}
2017-06-22 19:06:28 +00:00
func (c *Compiler) setupCache(conf *yaml_types.Workflow, ir *backend_types.Config) {
2017-06-22 19:06:28 +00:00
if c.local || len(conf.Cache) == 0 || c.cacher == nil {
return
}
container := c.cacher.Restore(path.Join(c.metadata.Repo.Owner, c.metadata.Repo.Name), c.metadata.Curr.Commit.Branch, conf.Cache)
2017-06-22 19:06:28 +00:00
name := fmt.Sprintf("%s_restore_cache", c.prefix)
step := c.createProcess(name, container, backend_types.StepTypeCache)
2017-06-22 19:06:28 +00:00
stage := new(backend_types.Stage)
2017-06-22 19:06:28 +00:00
stage.Name = name
stage.Alias = "restore_cache"
stage.Steps = append(stage.Steps, step)
ir.Stages = append(ir.Stages, stage)
}
func (c *Compiler) setupCacheRebuild(conf *yaml_types.Workflow, ir *backend_types.Config) {
if c.local || len(conf.Cache) == 0 || c.metadata.Curr.Event != metadata.EventPush || c.cacher == nil {
2017-06-22 19:06:28 +00:00
return
}
container := c.cacher.Rebuild(path.Join(c.metadata.Repo.Owner, c.metadata.Repo.Name), c.metadata.Curr.Commit.Branch, conf.Cache)
2017-06-22 19:06:28 +00:00
name := fmt.Sprintf("%s_rebuild_cache", c.prefix)
step := c.createProcess(name, container, backend_types.StepTypeCache)
2017-06-22 19:06:28 +00:00
stage := new(backend_types.Stage)
2017-06-22 19:06:28 +00:00
stage.Name = name
stage.Alias = "rebuild_cache"
stage.Steps = append(stage.Steps, step)
ir.Stages = append(ir.Stages, stage)
}