mirror of
https://github.com/woodpecker-ci/woodpecker.git
synced 2024-11-22 18:01:02 +00:00
6af94d79e3
Some flags where unused and / or unnecessary as they are covered by alternatives implemented in PRs of milestone 0.15.0 and just complicated the setup. closes #681
182 lines
4.3 KiB
Go
182 lines
4.3 KiB
Go
// Copyright 2018 Drone.IO Inc.
|
|
//
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
// you may not use this file except in compliance with the License.
|
|
// You may obtain a copy of the License at
|
|
//
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
//
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
// See the License for the specific language governing permissions and
|
|
// limitations under the License.
|
|
|
|
package main
|
|
|
|
import (
|
|
"context"
|
|
"crypto/tls"
|
|
"net/http"
|
|
"os"
|
|
"runtime"
|
|
"sync"
|
|
|
|
"github.com/rs/zerolog"
|
|
"github.com/rs/zerolog/log"
|
|
"github.com/tevino/abool"
|
|
"github.com/urfave/cli/v2"
|
|
"google.golang.org/grpc"
|
|
grpccredentials "google.golang.org/grpc/credentials"
|
|
"google.golang.org/grpc/credentials/insecure"
|
|
"google.golang.org/grpc/keepalive"
|
|
"google.golang.org/grpc/metadata"
|
|
|
|
"github.com/woodpecker-ci/woodpecker/agent"
|
|
"github.com/woodpecker-ci/woodpecker/pipeline/backend"
|
|
"github.com/woodpecker-ci/woodpecker/pipeline/rpc"
|
|
)
|
|
|
|
func loop(c *cli.Context) error {
|
|
filter := rpc.Filter{
|
|
Labels: map[string]string{
|
|
"platform": runtime.GOOS + "/" + runtime.GOARCH,
|
|
},
|
|
Expr: c.String("filter"),
|
|
}
|
|
|
|
hostname := c.String("hostname")
|
|
if len(hostname) == 0 {
|
|
hostname, _ = os.Hostname()
|
|
}
|
|
|
|
if c.Bool("pretty") {
|
|
log.Logger = log.Output(
|
|
zerolog.ConsoleWriter{
|
|
Out: os.Stderr,
|
|
NoColor: c.Bool("nocolor"),
|
|
},
|
|
)
|
|
}
|
|
|
|
zerolog.SetGlobalLevel(zerolog.WarnLevel)
|
|
if zerolog.GlobalLevel() <= zerolog.DebugLevel {
|
|
log.Logger = log.With().Caller().Logger()
|
|
}
|
|
|
|
if c.IsSet("log-level") {
|
|
logLevelFlag := c.String("log-level")
|
|
lvl, err := zerolog.ParseLevel(logLevelFlag)
|
|
if err != nil {
|
|
log.Fatal().Msgf("unknown logging level: %s", logLevelFlag)
|
|
}
|
|
zerolog.SetGlobalLevel(lvl)
|
|
}
|
|
|
|
counter.Polling = c.Int("max-procs")
|
|
counter.Running = 0
|
|
|
|
if c.Bool("healthcheck") {
|
|
go func() {
|
|
if err := http.ListenAndServe(":3000", nil); err != nil {
|
|
log.Error().Msgf("can not listen on port 3000: %v", err)
|
|
}
|
|
}()
|
|
}
|
|
|
|
// TODO pass version information to grpc server
|
|
// TODO authenticate to grpc server
|
|
|
|
// grpc.Dial(target, ))
|
|
var transport grpc.DialOption
|
|
if c.Bool("grpc-secure") {
|
|
transport = grpc.WithTransportCredentials(grpccredentials.NewTLS(&tls.Config{InsecureSkipVerify: c.Bool("skip-insecure-grpc")}))
|
|
} else {
|
|
transport = grpc.WithTransportCredentials(insecure.NewCredentials())
|
|
}
|
|
|
|
conn, err := grpc.Dial(
|
|
c.String("server"),
|
|
transport,
|
|
grpc.WithPerRPCCredentials(&credentials{
|
|
username: c.String("grpc-username"),
|
|
password: c.String("grpc-password"),
|
|
}),
|
|
grpc.WithKeepaliveParams(keepalive.ClientParameters{
|
|
Time: c.Duration("grpc-keepalive-time"),
|
|
Timeout: c.Duration("grpc-keepalive-timeout"),
|
|
}),
|
|
)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
defer conn.Close()
|
|
|
|
client := rpc.NewGrpcClient(conn)
|
|
|
|
sigterm := abool.New()
|
|
ctx := metadata.NewOutgoingContext(
|
|
context.Background(),
|
|
metadata.Pairs("hostname", hostname),
|
|
)
|
|
ctx = WithContextFunc(ctx, func() {
|
|
println("ctrl+c received, terminating process")
|
|
sigterm.Set()
|
|
})
|
|
|
|
var wg sync.WaitGroup
|
|
parallel := c.Int("max-procs")
|
|
wg.Add(parallel)
|
|
|
|
for i := 0; i < parallel; i++ {
|
|
go func() {
|
|
defer wg.Done()
|
|
for {
|
|
if sigterm.IsSet() {
|
|
return
|
|
}
|
|
|
|
// new engine
|
|
engine, err := backend.FindEngine(c.String("backend-engine"))
|
|
if err != nil {
|
|
log.Error().Err(err).Msgf("cannot find backend engine '%s'", c.String("backend-engine"))
|
|
return
|
|
}
|
|
|
|
// load engine (e.g. init api client)
|
|
err = engine.Load()
|
|
if err != nil {
|
|
log.Error().Err(err).Msg("cannot load backend engine")
|
|
return
|
|
}
|
|
|
|
log.Debug().Msgf("loaded %s backend engine", engine.Name())
|
|
|
|
r := agent.NewRunner(client, filter, hostname, counter, &engine)
|
|
if err := r.Run(ctx); err != nil {
|
|
log.Error().Err(err).Msg("pipeline done with error")
|
|
return
|
|
}
|
|
}
|
|
}()
|
|
}
|
|
|
|
wg.Wait()
|
|
return nil
|
|
}
|
|
|
|
type credentials struct {
|
|
username string
|
|
password string
|
|
}
|
|
|
|
func (c *credentials) GetRequestMetadata(context.Context, ...string) (map[string]string, error) {
|
|
return map[string]string{
|
|
"username": c.username,
|
|
"password": c.password,
|
|
}, nil
|
|
}
|
|
|
|
func (c *credentials) RequireTransportSecurity() bool {
|
|
return false
|
|
}
|