2022-10-18 01:24:12 +00:00
|
|
|
// Copyright 2022 Woodpecker Authors
|
|
|
|
//
|
|
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
// you may not use this file except in compliance with the License.
|
|
|
|
// You may obtain a copy of the License at
|
|
|
|
//
|
|
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
//
|
|
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
// See the License for the specific language governing permissions and
|
|
|
|
// limitations under the License.
|
|
|
|
|
2019-04-06 19:32:14 +00:00
|
|
|
package exec
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
2020-11-17 07:42:42 +00:00
|
|
|
"fmt"
|
2019-04-06 19:32:14 +00:00
|
|
|
"io"
|
2021-12-13 18:51:53 +00:00
|
|
|
"os"
|
2019-04-06 19:32:14 +00:00
|
|
|
"path"
|
|
|
|
"path/filepath"
|
|
|
|
"runtime"
|
|
|
|
"strings"
|
|
|
|
|
2019-09-14 12:21:16 +00:00
|
|
|
"github.com/drone/envsubst"
|
2024-01-12 14:24:30 +00:00
|
|
|
"github.com/rs/zerolog/log"
|
2024-07-17 23:26:35 +00:00
|
|
|
"github.com/urfave/cli/v3"
|
2021-10-12 07:25:13 +00:00
|
|
|
|
2023-12-08 07:15:08 +00:00
|
|
|
"go.woodpecker-ci.org/woodpecker/v2/cli/common"
|
2024-07-03 14:22:09 +00:00
|
|
|
"go.woodpecker-ci.org/woodpecker/v2/cli/lint"
|
2023-12-08 07:15:08 +00:00
|
|
|
"go.woodpecker-ci.org/woodpecker/v2/pipeline"
|
|
|
|
"go.woodpecker-ci.org/woodpecker/v2/pipeline/backend"
|
|
|
|
"go.woodpecker-ci.org/woodpecker/v2/pipeline/backend/docker"
|
|
|
|
"go.woodpecker-ci.org/woodpecker/v2/pipeline/backend/kubernetes"
|
|
|
|
"go.woodpecker-ci.org/woodpecker/v2/pipeline/backend/local"
|
2024-07-03 14:22:09 +00:00
|
|
|
backend_types "go.woodpecker-ci.org/woodpecker/v2/pipeline/backend/types"
|
2023-12-08 07:15:08 +00:00
|
|
|
"go.woodpecker-ci.org/woodpecker/v2/pipeline/frontend/yaml"
|
|
|
|
"go.woodpecker-ci.org/woodpecker/v2/pipeline/frontend/yaml/compiler"
|
|
|
|
"go.woodpecker-ci.org/woodpecker/v2/pipeline/frontend/yaml/linter"
|
|
|
|
"go.woodpecker-ci.org/woodpecker/v2/pipeline/frontend/yaml/matrix"
|
2024-06-13 15:18:32 +00:00
|
|
|
pipelineLog "go.woodpecker-ci.org/woodpecker/v2/pipeline/log"
|
2024-09-01 18:41:10 +00:00
|
|
|
"go.woodpecker-ci.org/woodpecker/v2/shared/constant"
|
2023-12-08 07:15:08 +00:00
|
|
|
"go.woodpecker-ci.org/woodpecker/v2/shared/utils"
|
2019-04-06 19:32:14 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
// Command exports the exec command.
|
2021-10-27 19:03:14 +00:00
|
|
|
var Command = &cli.Command{
|
2019-04-06 19:32:14 +00:00
|
|
|
Name: "exec",
|
2022-10-18 01:24:12 +00:00
|
|
|
Usage: "execute a local pipeline",
|
2023-04-29 08:12:36 +00:00
|
|
|
ArgsUsage: "[path/to/.woodpecker.yaml]",
|
2021-12-13 18:51:53 +00:00
|
|
|
Action: run,
|
2023-12-08 08:36:53 +00:00
|
|
|
Flags: utils.MergeSlices(flags, docker.Flags, kubernetes.Flags, local.Flags),
|
2019-04-06 19:32:14 +00:00
|
|
|
}
|
|
|
|
|
2024-07-08 14:29:43 +00:00
|
|
|
var backends = []backend_types.Backend{
|
|
|
|
kubernetes.New(),
|
|
|
|
docker.New(),
|
|
|
|
local.New(),
|
|
|
|
}
|
|
|
|
|
2024-07-17 23:26:35 +00:00
|
|
|
func run(ctx context.Context, c *cli.Command) error {
|
|
|
|
return common.RunPipelineFunc(ctx, c, execFile, execDir)
|
2021-12-13 18:51:53 +00:00
|
|
|
}
|
|
|
|
|
2024-07-17 23:26:35 +00:00
|
|
|
func execDir(ctx context.Context, c *cli.Command, dir string) error {
|
2021-12-13 18:51:53 +00:00
|
|
|
// TODO: respect pipeline dependency
|
2024-03-20 23:19:48 +00:00
|
|
|
repoPath := c.String("repo-path")
|
|
|
|
if repoPath != "" {
|
|
|
|
repoPath, _ = filepath.Abs(repoPath)
|
|
|
|
} else {
|
|
|
|
repoPath, _ = filepath.Abs(filepath.Dir(dir))
|
|
|
|
}
|
2021-12-13 18:51:53 +00:00
|
|
|
if runtime.GOOS == "windows" {
|
|
|
|
repoPath = convertPathForWindows(repoPath)
|
|
|
|
}
|
|
|
|
return filepath.Walk(dir, func(path string, info os.FileInfo, e error) error {
|
|
|
|
if e != nil {
|
|
|
|
return e
|
|
|
|
}
|
|
|
|
|
|
|
|
// check if it is a regular file (not dir)
|
2023-04-29 08:12:36 +00:00
|
|
|
if info.Mode().IsRegular() && (strings.HasSuffix(info.Name(), ".yaml") || strings.HasSuffix(info.Name(), ".yml")) {
|
2021-12-13 18:51:53 +00:00
|
|
|
fmt.Println("#", info.Name())
|
2024-07-17 23:26:35 +00:00
|
|
|
_ = runExec(ctx, c, path, repoPath) // TODO: should we drop errors or store them and report back?
|
2021-12-13 18:51:53 +00:00
|
|
|
fmt.Println("")
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
2024-07-17 23:26:35 +00:00
|
|
|
func execFile(ctx context.Context, c *cli.Command, file string) error {
|
2024-03-20 23:19:48 +00:00
|
|
|
repoPath := c.String("repo-path")
|
|
|
|
if repoPath != "" {
|
|
|
|
repoPath, _ = filepath.Abs(repoPath)
|
|
|
|
} else {
|
|
|
|
repoPath, _ = filepath.Abs(filepath.Dir(file))
|
|
|
|
}
|
2021-12-13 18:51:53 +00:00
|
|
|
if runtime.GOOS == "windows" {
|
|
|
|
repoPath = convertPathForWindows(repoPath)
|
2019-04-06 19:32:14 +00:00
|
|
|
}
|
2024-07-17 23:26:35 +00:00
|
|
|
return runExec(ctx, c, file, repoPath)
|
2021-12-13 18:51:53 +00:00
|
|
|
}
|
2019-04-06 19:32:14 +00:00
|
|
|
|
2024-07-17 23:26:35 +00:00
|
|
|
func runExec(ctx context.Context, c *cli.Command, file, repoPath string) error {
|
2022-08-25 06:39:19 +00:00
|
|
|
dat, err := os.ReadFile(file)
|
2020-11-17 07:42:42 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
axes, err := matrix.ParseString(string(dat))
|
|
|
|
if err != nil {
|
2023-12-29 20:19:42 +00:00
|
|
|
return fmt.Errorf("parse matrix fail")
|
2020-11-17 07:42:42 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if len(axes) == 0 {
|
|
|
|
axes = append(axes, matrix.Axis{})
|
|
|
|
}
|
|
|
|
for _, axis := range axes {
|
2024-07-17 23:26:35 +00:00
|
|
|
err := execWithAxis(ctx, c, file, repoPath, axis)
|
2020-11-17 07:42:42 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2024-07-17 23:26:35 +00:00
|
|
|
func execWithAxis(ctx context.Context, c *cli.Command, file, repoPath string, axis matrix.Axis) error {
|
2024-09-16 20:03:24 +00:00
|
|
|
metadata, err := metadataFromContext(ctx, c, axis)
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("could not create metadata: %w", err)
|
|
|
|
}
|
2019-04-06 19:32:14 +00:00
|
|
|
environ := metadata.Environ()
|
2021-09-24 14:29:26 +00:00
|
|
|
var secrets []compiler.Secret
|
2023-04-08 11:15:28 +00:00
|
|
|
for key, val := range metadata.Workflow.Matrix {
|
2019-04-06 19:32:14 +00:00
|
|
|
environ[key] = val
|
|
|
|
secrets = append(secrets, compiler.Secret{
|
|
|
|
Name: key,
|
|
|
|
Value: val,
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
2024-01-12 14:24:30 +00:00
|
|
|
pipelineEnv := make(map[string]string)
|
2019-04-06 19:32:14 +00:00
|
|
|
for _, env := range c.StringSlice("env") {
|
2024-03-15 17:00:25 +00:00
|
|
|
before, after, _ := strings.Cut(env, "=")
|
|
|
|
pipelineEnv[before] = after
|
|
|
|
if oldVar, exists := environ[before]; exists {
|
2024-01-12 14:24:30 +00:00
|
|
|
// override existing values, but print a warning
|
2024-03-15 17:00:25 +00:00
|
|
|
log.Warn().Msgf("environment variable '%s' had value '%s', but got overwritten", before, oldVar)
|
2022-07-30 06:06:03 +00:00
|
|
|
}
|
2024-03-15 17:00:25 +00:00
|
|
|
environ[before] = after
|
2019-04-06 19:32:14 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
tmpl, err := envsubst.ParseFile(file)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2024-05-24 20:35:04 +00:00
|
|
|
confStr, err := tmpl.Execute(func(name string) string {
|
2019-04-06 19:32:14 +00:00
|
|
|
return environ[name]
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2024-05-24 20:35:04 +00:00
|
|
|
conf, err := yaml.ParseString(confStr)
|
2019-04-06 19:32:14 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
// configure volumes for local execution
|
|
|
|
volumes := c.StringSlice("volumes")
|
|
|
|
if c.Bool("local") {
|
|
|
|
var (
|
|
|
|
workspaceBase = conf.Workspace.Base
|
|
|
|
workspacePath = conf.Workspace.Path
|
|
|
|
)
|
|
|
|
if workspaceBase == "" {
|
|
|
|
workspaceBase = c.String("workspace-base")
|
|
|
|
}
|
|
|
|
if workspacePath == "" {
|
|
|
|
workspacePath = c.String("workspace-path")
|
|
|
|
}
|
|
|
|
|
|
|
|
volumes = append(volumes, c.String("prefix")+"_default:"+workspaceBase)
|
2021-12-13 18:51:53 +00:00
|
|
|
volumes = append(volumes, repoPath+":"+path.Join(workspaceBase, workspacePath))
|
2019-04-06 19:32:14 +00:00
|
|
|
}
|
|
|
|
|
2024-09-02 08:41:20 +00:00
|
|
|
privilegedPlugins := c.StringSlice("plugins-privileged")
|
|
|
|
|
2019-04-06 19:32:14 +00:00
|
|
|
// lint the yaml file
|
2024-09-01 18:41:10 +00:00
|
|
|
err = linter.New(
|
|
|
|
linter.WithTrusted(true),
|
2024-09-02 08:41:20 +00:00
|
|
|
linter.PrivilegedPlugins(privilegedPlugins),
|
2024-09-01 18:41:10 +00:00
|
|
|
linter.WithTrustedClonePlugins(constant.TrustedClonePlugins),
|
|
|
|
).Lint([]*linter.WorkflowConfig{{
|
2023-11-04 14:30:47 +00:00
|
|
|
File: path.Base(file),
|
2024-05-24 20:35:04 +00:00
|
|
|
RawConfig: confStr,
|
2023-11-04 14:30:47 +00:00
|
|
|
Workflow: conf,
|
2024-07-03 14:22:09 +00:00
|
|
|
}})
|
|
|
|
if err != nil {
|
|
|
|
str, err := lint.FormatLintError(file, err)
|
|
|
|
fmt.Print(str)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2019-04-06 19:32:14 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// compiles the yaml file
|
2022-10-05 23:49:23 +00:00
|
|
|
compiled, err := compiler.New(
|
2019-04-06 19:32:14 +00:00
|
|
|
compiler.WithEscalated(
|
2024-09-02 08:41:20 +00:00
|
|
|
privilegedPlugins...,
|
2019-04-06 19:32:14 +00:00
|
|
|
),
|
|
|
|
compiler.WithVolumes(volumes...),
|
|
|
|
compiler.WithWorkspace(
|
|
|
|
c.String("workspace-base"),
|
|
|
|
c.String("workspace-path"),
|
|
|
|
),
|
|
|
|
compiler.WithNetworks(
|
|
|
|
c.StringSlice("network")...,
|
|
|
|
),
|
|
|
|
compiler.WithPrefix(
|
|
|
|
c.String("prefix"),
|
|
|
|
),
|
2023-08-07 19:13:26 +00:00
|
|
|
compiler.WithProxy(compiler.ProxyOptions{
|
|
|
|
NoProxy: c.String("backend-no-proxy"),
|
|
|
|
HTTPProxy: c.String("backend-http-proxy"),
|
|
|
|
HTTPSProxy: c.String("backend-https-proxy"),
|
|
|
|
}),
|
2019-04-06 19:32:14 +00:00
|
|
|
compiler.WithLocal(
|
|
|
|
c.Bool("local"),
|
|
|
|
),
|
|
|
|
compiler.WithNetrc(
|
|
|
|
c.String("netrc-username"),
|
|
|
|
c.String("netrc-password"),
|
|
|
|
c.String("netrc-machine"),
|
|
|
|
),
|
|
|
|
compiler.WithMetadata(metadata),
|
|
|
|
compiler.WithSecret(secrets...),
|
2024-01-12 14:24:30 +00:00
|
|
|
compiler.WithEnviron(pipelineEnv),
|
2019-04-06 19:32:14 +00:00
|
|
|
).Compile(conf)
|
2022-10-05 23:49:23 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2022-02-26 02:02:42 +00:00
|
|
|
|
2024-07-17 23:26:35 +00:00
|
|
|
backendCtx := context.WithValue(ctx, backend_types.CliCommand, c)
|
2024-02-08 23:04:43 +00:00
|
|
|
backendEngine, err := backend.FindBackend(backendCtx, backends, c.String("backend-engine"))
|
2022-02-26 02:02:42 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2023-12-14 18:20:47 +00:00
|
|
|
if _, err = backendEngine.Load(backendCtx); err != nil {
|
2019-04-06 19:32:14 +00:00
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2024-07-17 23:26:35 +00:00
|
|
|
pipelineCtx, cancel := context.WithTimeout(context.Background(), c.Duration("timeout"))
|
2019-04-06 19:32:14 +00:00
|
|
|
defer cancel()
|
2024-07-17 23:26:35 +00:00
|
|
|
pipelineCtx = utils.WithContextSigtermCallback(pipelineCtx, func() {
|
|
|
|
fmt.Printf("ctrl+c received, terminating current pipeline '%s'\n", confStr)
|
2022-02-28 08:27:31 +00:00
|
|
|
})
|
2019-04-06 19:32:14 +00:00
|
|
|
|
|
|
|
return pipeline.New(compiled,
|
2024-07-17 23:26:35 +00:00
|
|
|
pipeline.WithContext(pipelineCtx), //nolint:contextcheck
|
2019-04-06 19:32:14 +00:00
|
|
|
pipeline.WithTracer(pipeline.DefaultTracer),
|
|
|
|
pipeline.WithLogger(defaultLogger),
|
2023-12-14 18:20:47 +00:00
|
|
|
pipeline.WithBackend(backendEngine),
|
2022-06-15 16:11:20 +00:00
|
|
|
pipeline.WithDescription(map[string]string{
|
|
|
|
"CLI": "exec",
|
|
|
|
}),
|
2024-07-17 23:26:35 +00:00
|
|
|
).Run(ctx)
|
2019-04-06 19:32:14 +00:00
|
|
|
}
|
|
|
|
|
2024-03-15 17:00:25 +00:00
|
|
|
// convertPathForWindows converts a path to use slash separators
|
|
|
|
// for Windows. If the path is a Windows volume name like C:, it
|
|
|
|
// converts it to an absolute root path starting with slash (e.g.
|
|
|
|
// C: -> /c). Otherwise it just converts backslash separators to
|
|
|
|
// slashes.
|
2019-04-06 19:32:14 +00:00
|
|
|
func convertPathForWindows(path string) string {
|
|
|
|
base := filepath.VolumeName(path)
|
2024-03-15 17:00:25 +00:00
|
|
|
|
|
|
|
// Check if path is volume name like C:
|
2024-05-13 20:58:21 +00:00
|
|
|
//nolint:mnd
|
2019-04-06 19:32:14 +00:00
|
|
|
if len(base) == 2 {
|
|
|
|
path = strings.TrimPrefix(path, base)
|
|
|
|
base = strings.ToLower(strings.TrimSuffix(base, ":"))
|
|
|
|
return "/" + base + filepath.ToSlash(path)
|
|
|
|
}
|
|
|
|
|
|
|
|
return filepath.ToSlash(path)
|
|
|
|
}
|
|
|
|
|
2024-07-03 14:22:09 +00:00
|
|
|
var defaultLogger = pipeline.Logger(func(step *backend_types.Step, rc io.ReadCloser) error {
|
2024-06-13 15:18:32 +00:00
|
|
|
logWriter := NewLineWriter(step.Name, step.UUID)
|
2024-08-25 20:53:04 +00:00
|
|
|
return pipelineLog.CopyLineByLine(logWriter, rc, pipeline.MaxLogLineLength)
|
2019-04-06 19:32:14 +00:00
|
|
|
})
|