mirror of
https://github.com/actions/runner-container-hooks.git
synced 2025-12-17 02:06:43 +00:00
Compare commits
17 Commits
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
17d2b3b850 | ||
|
|
ea011028f5 | ||
|
|
eaae191ebb | ||
|
|
418d484160 | ||
|
|
ce3c55d086 | ||
|
|
d988d965c5 | ||
|
|
23cc6dda6f | ||
|
|
8986035ca8 | ||
|
|
e975289683 | ||
|
|
a555151eef | ||
|
|
16eb238caa | ||
|
|
8e06496e34 | ||
|
|
e2033b29c7 | ||
|
|
eb47baaf5e | ||
|
|
20c19dae27 | ||
|
|
4307828719 | ||
|
|
5c6995dba1 |
@@ -1 +1 @@
|
|||||||
* @actions/actions-runtime
|
* @actions/actions-runtime @actions/runner-akvelon
|
||||||
|
|||||||
@@ -13,7 +13,7 @@ You'll need a runner compatible with hooks, a repository with container workflow
|
|||||||
- You'll need a runner compatible with hooks, a repository with container workflows to which you can register the runner and the hooks from this repository.
|
- You'll need a runner compatible with hooks, a repository with container workflows to which you can register the runner and the hooks from this repository.
|
||||||
- See [the runner contributing.md](../../github/CONTRIBUTING.MD) for how to get started with runner development.
|
- See [the runner contributing.md](../../github/CONTRIBUTING.MD) for how to get started with runner development.
|
||||||
- Build your hook using `npm run build`
|
- Build your hook using `npm run build`
|
||||||
- Enable the hooks by setting `ACTIONS_RUNNER_CONTAINER_HOOK=./packages/{libraryname}/dist/index.js` file generated by [ncc](https://github.com/vercel/ncc)
|
- Enable the hooks by setting `ACTIONS_RUNNER_CONTAINER_HOOKS=./packages/{libraryname}/dist/index.js` file generated by [ncc](https://github.com/vercel/ncc)
|
||||||
- Configure your self hosted runner against the a repository you have admin access
|
- Configure your self hosted runner against the a repository you have admin access
|
||||||
- Run a workflow with a container job, for example
|
- Run a workflow with a container job, for example
|
||||||
```
|
```
|
||||||
|
|||||||
4
package-lock.json
generated
4
package-lock.json
generated
@@ -1,12 +1,12 @@
|
|||||||
{
|
{
|
||||||
"name": "hooks",
|
"name": "hooks",
|
||||||
"version": "0.1.1",
|
"version": "0.1.3",
|
||||||
"lockfileVersion": 2,
|
"lockfileVersion": 2,
|
||||||
"requires": true,
|
"requires": true,
|
||||||
"packages": {
|
"packages": {
|
||||||
"": {
|
"": {
|
||||||
"name": "hooks",
|
"name": "hooks",
|
||||||
"version": "0.1.1",
|
"version": "0.1.3",
|
||||||
"license": "MIT",
|
"license": "MIT",
|
||||||
"devDependencies": {
|
"devDependencies": {
|
||||||
"@types/jest": "^27.5.1",
|
"@types/jest": "^27.5.1",
|
||||||
|
|||||||
@@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"name": "hooks",
|
"name": "hooks",
|
||||||
"version": "0.1.1",
|
"version": "0.2.0",
|
||||||
"description": "Three projects are included - k8s: a kubernetes hook implementation that spins up pods dynamically to run a job - docker: A hook implementation of the runner's docker implementation - A hook lib, which contains shared typescript definitions and utilities that the other packages consume",
|
"description": "Three projects are included - k8s: a kubernetes hook implementation that spins up pods dynamically to run a job - docker: A hook implementation of the runner's docker implementation - A hook lib, which contains shared typescript definitions and utilities that the other packages consume",
|
||||||
"main": "",
|
"main": "",
|
||||||
"directories": {
|
"directories": {
|
||||||
|
|||||||
40
packages/docker/package-lock.json
generated
40
packages/docker/package-lock.json
generated
@@ -9,7 +9,7 @@
|
|||||||
"version": "0.1.0",
|
"version": "0.1.0",
|
||||||
"license": "MIT",
|
"license": "MIT",
|
||||||
"dependencies": {
|
"dependencies": {
|
||||||
"@actions/core": "^1.6.0",
|
"@actions/core": "^1.9.1",
|
||||||
"@actions/exec": "^1.1.1",
|
"@actions/exec": "^1.1.1",
|
||||||
"hooklib": "file:../hooklib",
|
"hooklib": "file:../hooklib",
|
||||||
"uuid": "^8.3.2"
|
"uuid": "^8.3.2"
|
||||||
@@ -30,7 +30,7 @@
|
|||||||
"version": "0.1.0",
|
"version": "0.1.0",
|
||||||
"license": "MIT",
|
"license": "MIT",
|
||||||
"dependencies": {
|
"dependencies": {
|
||||||
"@actions/core": "^1.6.0"
|
"@actions/core": "^1.9.1"
|
||||||
},
|
},
|
||||||
"devDependencies": {
|
"devDependencies": {
|
||||||
"@types/node": "^17.0.23",
|
"@types/node": "^17.0.23",
|
||||||
@@ -43,11 +43,12 @@
|
|||||||
}
|
}
|
||||||
},
|
},
|
||||||
"node_modules/@actions/core": {
|
"node_modules/@actions/core": {
|
||||||
"version": "1.6.0",
|
"version": "1.9.1",
|
||||||
"resolved": "https://registry.npmjs.org/@actions/core/-/core-1.6.0.tgz",
|
"resolved": "https://registry.npmjs.org/@actions/core/-/core-1.9.1.tgz",
|
||||||
"integrity": "sha512-NB1UAZomZlCV/LmJqkLhNTqtKfFXJZAUPcfl/zqG7EfsQdeUJtaWO98SGbuQ3pydJ3fHl2CvI/51OKYlCYYcaw==",
|
"integrity": "sha512-5ad+U2YGrmmiw6du20AQW5XuWo7UKN2052FjSV7MX+Wfjf8sCqcsZe62NfgHys4QI4/Y+vQvLKYL8jWtA1ZBTA==",
|
||||||
"dependencies": {
|
"dependencies": {
|
||||||
"@actions/http-client": "^1.0.11"
|
"@actions/http-client": "^2.0.1",
|
||||||
|
"uuid": "^8.3.2"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
"node_modules/@actions/exec": {
|
"node_modules/@actions/exec": {
|
||||||
@@ -59,11 +60,11 @@
|
|||||||
}
|
}
|
||||||
},
|
},
|
||||||
"node_modules/@actions/http-client": {
|
"node_modules/@actions/http-client": {
|
||||||
"version": "1.0.11",
|
"version": "2.0.1",
|
||||||
"resolved": "https://registry.npmjs.org/@actions/http-client/-/http-client-1.0.11.tgz",
|
"resolved": "https://registry.npmjs.org/@actions/http-client/-/http-client-2.0.1.tgz",
|
||||||
"integrity": "sha512-VRYHGQV1rqnROJqdMvGUbY/Kn8vriQe/F9HR2AlYHzmKuM/p3kjNuXhmdBfcVgsvRWTz5C5XW5xvndZrVBuAYg==",
|
"integrity": "sha512-PIXiMVtz6VvyaRsGY268qvj57hXQEpsYogYOu2nrQhlf+XCGmZstmuZBbAybUl1nQGnvS1k1eEsQ69ZoD7xlSw==",
|
||||||
"dependencies": {
|
"dependencies": {
|
||||||
"tunnel": "0.0.6"
|
"tunnel": "^0.0.6"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
"node_modules/@actions/io": {
|
"node_modules/@actions/io": {
|
||||||
@@ -5279,11 +5280,12 @@
|
|||||||
},
|
},
|
||||||
"dependencies": {
|
"dependencies": {
|
||||||
"@actions/core": {
|
"@actions/core": {
|
||||||
"version": "1.6.0",
|
"version": "1.9.1",
|
||||||
"resolved": "https://registry.npmjs.org/@actions/core/-/core-1.6.0.tgz",
|
"resolved": "https://registry.npmjs.org/@actions/core/-/core-1.9.1.tgz",
|
||||||
"integrity": "sha512-NB1UAZomZlCV/LmJqkLhNTqtKfFXJZAUPcfl/zqG7EfsQdeUJtaWO98SGbuQ3pydJ3fHl2CvI/51OKYlCYYcaw==",
|
"integrity": "sha512-5ad+U2YGrmmiw6du20AQW5XuWo7UKN2052FjSV7MX+Wfjf8sCqcsZe62NfgHys4QI4/Y+vQvLKYL8jWtA1ZBTA==",
|
||||||
"requires": {
|
"requires": {
|
||||||
"@actions/http-client": "^1.0.11"
|
"@actions/http-client": "^2.0.1",
|
||||||
|
"uuid": "^8.3.2"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
"@actions/exec": {
|
"@actions/exec": {
|
||||||
@@ -5295,11 +5297,11 @@
|
|||||||
}
|
}
|
||||||
},
|
},
|
||||||
"@actions/http-client": {
|
"@actions/http-client": {
|
||||||
"version": "1.0.11",
|
"version": "2.0.1",
|
||||||
"resolved": "https://registry.npmjs.org/@actions/http-client/-/http-client-1.0.11.tgz",
|
"resolved": "https://registry.npmjs.org/@actions/http-client/-/http-client-2.0.1.tgz",
|
||||||
"integrity": "sha512-VRYHGQV1rqnROJqdMvGUbY/Kn8vriQe/F9HR2AlYHzmKuM/p3kjNuXhmdBfcVgsvRWTz5C5XW5xvndZrVBuAYg==",
|
"integrity": "sha512-PIXiMVtz6VvyaRsGY268qvj57hXQEpsYogYOu2nrQhlf+XCGmZstmuZBbAybUl1nQGnvS1k1eEsQ69ZoD7xlSw==",
|
||||||
"requires": {
|
"requires": {
|
||||||
"tunnel": "0.0.6"
|
"tunnel": "^0.0.6"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
"@actions/io": {
|
"@actions/io": {
|
||||||
@@ -7376,7 +7378,7 @@
|
|||||||
"hooklib": {
|
"hooklib": {
|
||||||
"version": "file:../hooklib",
|
"version": "file:../hooklib",
|
||||||
"requires": {
|
"requires": {
|
||||||
"@actions/core": "^1.6.0",
|
"@actions/core": "^1.9.1",
|
||||||
"@types/node": "^17.0.23",
|
"@types/node": "^17.0.23",
|
||||||
"@typescript-eslint/parser": "^5.18.0",
|
"@typescript-eslint/parser": "^5.18.0",
|
||||||
"@zeit/ncc": "^0.22.3",
|
"@zeit/ncc": "^0.22.3",
|
||||||
|
|||||||
@@ -10,7 +10,7 @@
|
|||||||
"author": "",
|
"author": "",
|
||||||
"license": "MIT",
|
"license": "MIT",
|
||||||
"dependencies": {
|
"dependencies": {
|
||||||
"@actions/core": "^1.6.0",
|
"@actions/core": "^1.9.1",
|
||||||
"@actions/exec": "^1.1.1",
|
"@actions/exec": "^1.1.1",
|
||||||
"hooklib": "file:../hooklib",
|
"hooklib": "file:../hooklib",
|
||||||
"uuid": "^8.3.2"
|
"uuid": "^8.3.2"
|
||||||
|
|||||||
@@ -427,6 +427,9 @@ export async function containerRun(
|
|||||||
dockerArgs.push(args.image)
|
dockerArgs.push(args.image)
|
||||||
if (args.entryPointArgs) {
|
if (args.entryPointArgs) {
|
||||||
for (const entryPointArg of args.entryPointArgs) {
|
for (const entryPointArg of args.entryPointArgs) {
|
||||||
|
if (!entryPointArg) {
|
||||||
|
continue
|
||||||
|
}
|
||||||
dockerArgs.push(entryPointArg)
|
dockerArgs.push(entryPointArg)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -16,6 +16,7 @@ export async function runDockerCommand(
|
|||||||
args: string[],
|
args: string[],
|
||||||
options?: RunDockerCommandOptions
|
options?: RunDockerCommandOptions
|
||||||
): Promise<string> {
|
): Promise<string> {
|
||||||
|
options = optionsWithDockerEnvs(options)
|
||||||
const pipes = await exec.getExecOutput('docker', args, options)
|
const pipes = await exec.getExecOutput('docker', args, options)
|
||||||
if (pipes.exitCode !== 0) {
|
if (pipes.exitCode !== 0) {
|
||||||
core.error(`Docker failed with exit code ${pipes.exitCode}`)
|
core.error(`Docker failed with exit code ${pipes.exitCode}`)
|
||||||
@@ -24,6 +25,45 @@ export async function runDockerCommand(
|
|||||||
return Promise.resolve(pipes.stdout)
|
return Promise.resolve(pipes.stdout)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
export function optionsWithDockerEnvs(
|
||||||
|
options?: RunDockerCommandOptions
|
||||||
|
): RunDockerCommandOptions | undefined {
|
||||||
|
// From https://docs.docker.com/engine/reference/commandline/cli/#environment-variables
|
||||||
|
const dockerCliEnvs = new Set([
|
||||||
|
'DOCKER_API_VERSION',
|
||||||
|
'DOCKER_CERT_PATH',
|
||||||
|
'DOCKER_CONFIG',
|
||||||
|
'DOCKER_CONTENT_TRUST_SERVER',
|
||||||
|
'DOCKER_CONTENT_TRUST',
|
||||||
|
'DOCKER_CONTEXT',
|
||||||
|
'DOCKER_DEFAULT_PLATFORM',
|
||||||
|
'DOCKER_HIDE_LEGACY_COMMANDS',
|
||||||
|
'DOCKER_HOST',
|
||||||
|
'DOCKER_STACK_ORCHESTRATOR',
|
||||||
|
'DOCKER_TLS_VERIFY',
|
||||||
|
'BUILDKIT_PROGRESS'
|
||||||
|
])
|
||||||
|
const dockerEnvs = {}
|
||||||
|
for (const key in process.env) {
|
||||||
|
if (dockerCliEnvs.has(key)) {
|
||||||
|
dockerEnvs[key] = process.env[key]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
const newOptions = {
|
||||||
|
workingDir: options?.workingDir,
|
||||||
|
input: options?.input,
|
||||||
|
env: options?.env || {}
|
||||||
|
}
|
||||||
|
|
||||||
|
// Set docker envs or overwrite provided ones
|
||||||
|
for (const [key, value] of Object.entries(dockerEnvs)) {
|
||||||
|
newOptions.env[key] = value as string
|
||||||
|
}
|
||||||
|
|
||||||
|
return newOptions
|
||||||
|
}
|
||||||
|
|
||||||
export function sanitize(val: string): string {
|
export function sanitize(val: string): string {
|
||||||
if (!val || typeof val !== 'string') {
|
if (!val || typeof val !== 'string') {
|
||||||
return ''
|
return ''
|
||||||
|
|||||||
@@ -52,7 +52,9 @@ describe('run script step', () => {
|
|||||||
definitions.runScriptStep.args.entryPoint = '/bin/bash'
|
definitions.runScriptStep.args.entryPoint = '/bin/bash'
|
||||||
definitions.runScriptStep.args.entryPointArgs = [
|
definitions.runScriptStep.args.entryPointArgs = [
|
||||||
'-c',
|
'-c',
|
||||||
`if [[ ! $(env | grep "^PATH=") = "PATH=${definitions.runScriptStep.args.prependPath}:"* ]]; then exit 1; fi`
|
`if [[ ! $(env | grep "^PATH=") = "PATH=${definitions.runScriptStep.args.prependPath.join(
|
||||||
|
':'
|
||||||
|
)}:"* ]]; then exit 1; fi`
|
||||||
]
|
]
|
||||||
await expect(
|
await expect(
|
||||||
runScriptStep(definitions.runScriptStep.args, prepareJobResponse.state)
|
runScriptStep(definitions.runScriptStep.args, prepareJobResponse.state)
|
||||||
|
|||||||
@@ -1,4 +1,4 @@
|
|||||||
import { sanitize } from '../src/utils'
|
import { optionsWithDockerEnvs, sanitize } from '../src/utils'
|
||||||
|
|
||||||
describe('Utilities', () => {
|
describe('Utilities', () => {
|
||||||
it('should return sanitized image name', () => {
|
it('should return sanitized image name', () => {
|
||||||
@@ -9,4 +9,41 @@ describe('Utilities', () => {
|
|||||||
const validStr = 'teststr8_one'
|
const validStr = 'teststr8_one'
|
||||||
expect(sanitize(validStr)).toBe(validStr)
|
expect(sanitize(validStr)).toBe(validStr)
|
||||||
})
|
})
|
||||||
|
|
||||||
|
describe('with docker options', () => {
|
||||||
|
it('should augment options with docker environment variables', () => {
|
||||||
|
process.env.DOCKER_HOST = 'unix:///run/user/1001/docker.sock'
|
||||||
|
process.env.DOCKER_NOTEXIST = 'notexist'
|
||||||
|
|
||||||
|
const optionDefinitions: any = [
|
||||||
|
undefined,
|
||||||
|
{},
|
||||||
|
{ env: {} },
|
||||||
|
{ env: { DOCKER_HOST: 'unix://var/run/docker.sock' } }
|
||||||
|
]
|
||||||
|
for (const opt of optionDefinitions) {
|
||||||
|
let options = optionsWithDockerEnvs(opt)
|
||||||
|
expect(options).toBeDefined()
|
||||||
|
expect(options?.env).toBeDefined()
|
||||||
|
expect(options?.env?.DOCKER_HOST).toBe(process.env.DOCKER_HOST)
|
||||||
|
expect(options?.env?.DOCKER_NOTEXIST).toBeUndefined()
|
||||||
|
}
|
||||||
|
})
|
||||||
|
|
||||||
|
it('should not overwrite other options', () => {
|
||||||
|
process.env.DOCKER_HOST = 'unix:///run/user/1001/docker.sock'
|
||||||
|
const opt = {
|
||||||
|
workingDir: 'test',
|
||||||
|
input: Buffer.from('test')
|
||||||
|
}
|
||||||
|
|
||||||
|
const options = optionsWithDockerEnvs(opt)
|
||||||
|
expect(options).toBeDefined()
|
||||||
|
expect(options?.workingDir).toBe(opt.workingDir)
|
||||||
|
expect(options?.input).toBe(opt.input)
|
||||||
|
expect(options?.env).toStrictEqual({
|
||||||
|
DOCKER_HOST: process.env.DOCKER_HOST
|
||||||
|
})
|
||||||
|
})
|
||||||
|
})
|
||||||
})
|
})
|
||||||
|
|||||||
49
packages/hooklib/package-lock.json
generated
49
packages/hooklib/package-lock.json
generated
@@ -9,7 +9,7 @@
|
|||||||
"version": "0.1.0",
|
"version": "0.1.0",
|
||||||
"license": "MIT",
|
"license": "MIT",
|
||||||
"dependencies": {
|
"dependencies": {
|
||||||
"@actions/core": "^1.6.0"
|
"@actions/core": "^1.9.1"
|
||||||
},
|
},
|
||||||
"devDependencies": {
|
"devDependencies": {
|
||||||
"@types/node": "^17.0.23",
|
"@types/node": "^17.0.23",
|
||||||
@@ -22,19 +22,20 @@
|
|||||||
}
|
}
|
||||||
},
|
},
|
||||||
"node_modules/@actions/core": {
|
"node_modules/@actions/core": {
|
||||||
"version": "1.6.0",
|
"version": "1.9.1",
|
||||||
"resolved": "https://registry.npmjs.org/@actions/core/-/core-1.6.0.tgz",
|
"resolved": "https://registry.npmjs.org/@actions/core/-/core-1.9.1.tgz",
|
||||||
"integrity": "sha512-NB1UAZomZlCV/LmJqkLhNTqtKfFXJZAUPcfl/zqG7EfsQdeUJtaWO98SGbuQ3pydJ3fHl2CvI/51OKYlCYYcaw==",
|
"integrity": "sha512-5ad+U2YGrmmiw6du20AQW5XuWo7UKN2052FjSV7MX+Wfjf8sCqcsZe62NfgHys4QI4/Y+vQvLKYL8jWtA1ZBTA==",
|
||||||
"dependencies": {
|
"dependencies": {
|
||||||
"@actions/http-client": "^1.0.11"
|
"@actions/http-client": "^2.0.1",
|
||||||
|
"uuid": "^8.3.2"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
"node_modules/@actions/http-client": {
|
"node_modules/@actions/http-client": {
|
||||||
"version": "1.0.11",
|
"version": "2.0.1",
|
||||||
"resolved": "https://registry.npmjs.org/@actions/http-client/-/http-client-1.0.11.tgz",
|
"resolved": "https://registry.npmjs.org/@actions/http-client/-/http-client-2.0.1.tgz",
|
||||||
"integrity": "sha512-VRYHGQV1rqnROJqdMvGUbY/Kn8vriQe/F9HR2AlYHzmKuM/p3kjNuXhmdBfcVgsvRWTz5C5XW5xvndZrVBuAYg==",
|
"integrity": "sha512-PIXiMVtz6VvyaRsGY268qvj57hXQEpsYogYOu2nrQhlf+XCGmZstmuZBbAybUl1nQGnvS1k1eEsQ69ZoD7xlSw==",
|
||||||
"dependencies": {
|
"dependencies": {
|
||||||
"tunnel": "0.0.6"
|
"tunnel": "^0.0.6"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
"node_modules/@eslint/eslintrc": {
|
"node_modules/@eslint/eslintrc": {
|
||||||
@@ -2485,6 +2486,14 @@
|
|||||||
"punycode": "^2.1.0"
|
"punycode": "^2.1.0"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
|
"node_modules/uuid": {
|
||||||
|
"version": "8.3.2",
|
||||||
|
"resolved": "https://registry.npmjs.org/uuid/-/uuid-8.3.2.tgz",
|
||||||
|
"integrity": "sha512-+NYs2QeMWy+GWFOEm9xnn6HCDp0l7QBD7ml8zLUmJ+93Q5NF0NocErnwkTkXVFNiX3/fpC6afS8Dhb/gz7R7eg==",
|
||||||
|
"bin": {
|
||||||
|
"uuid": "dist/bin/uuid"
|
||||||
|
}
|
||||||
|
},
|
||||||
"node_modules/v8-compile-cache": {
|
"node_modules/v8-compile-cache": {
|
||||||
"version": "2.3.0",
|
"version": "2.3.0",
|
||||||
"resolved": "https://registry.npmjs.org/v8-compile-cache/-/v8-compile-cache-2.3.0.tgz",
|
"resolved": "https://registry.npmjs.org/v8-compile-cache/-/v8-compile-cache-2.3.0.tgz",
|
||||||
@@ -2546,19 +2555,20 @@
|
|||||||
},
|
},
|
||||||
"dependencies": {
|
"dependencies": {
|
||||||
"@actions/core": {
|
"@actions/core": {
|
||||||
"version": "1.6.0",
|
"version": "1.9.1",
|
||||||
"resolved": "https://registry.npmjs.org/@actions/core/-/core-1.6.0.tgz",
|
"resolved": "https://registry.npmjs.org/@actions/core/-/core-1.9.1.tgz",
|
||||||
"integrity": "sha512-NB1UAZomZlCV/LmJqkLhNTqtKfFXJZAUPcfl/zqG7EfsQdeUJtaWO98SGbuQ3pydJ3fHl2CvI/51OKYlCYYcaw==",
|
"integrity": "sha512-5ad+U2YGrmmiw6du20AQW5XuWo7UKN2052FjSV7MX+Wfjf8sCqcsZe62NfgHys4QI4/Y+vQvLKYL8jWtA1ZBTA==",
|
||||||
"requires": {
|
"requires": {
|
||||||
"@actions/http-client": "^1.0.11"
|
"@actions/http-client": "^2.0.1",
|
||||||
|
"uuid": "^8.3.2"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
"@actions/http-client": {
|
"@actions/http-client": {
|
||||||
"version": "1.0.11",
|
"version": "2.0.1",
|
||||||
"resolved": "https://registry.npmjs.org/@actions/http-client/-/http-client-1.0.11.tgz",
|
"resolved": "https://registry.npmjs.org/@actions/http-client/-/http-client-2.0.1.tgz",
|
||||||
"integrity": "sha512-VRYHGQV1rqnROJqdMvGUbY/Kn8vriQe/F9HR2AlYHzmKuM/p3kjNuXhmdBfcVgsvRWTz5C5XW5xvndZrVBuAYg==",
|
"integrity": "sha512-PIXiMVtz6VvyaRsGY268qvj57hXQEpsYogYOu2nrQhlf+XCGmZstmuZBbAybUl1nQGnvS1k1eEsQ69ZoD7xlSw==",
|
||||||
"requires": {
|
"requires": {
|
||||||
"tunnel": "0.0.6"
|
"tunnel": "^0.0.6"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
"@eslint/eslintrc": {
|
"@eslint/eslintrc": {
|
||||||
@@ -4300,6 +4310,11 @@
|
|||||||
"punycode": "^2.1.0"
|
"punycode": "^2.1.0"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
|
"uuid": {
|
||||||
|
"version": "8.3.2",
|
||||||
|
"resolved": "https://registry.npmjs.org/uuid/-/uuid-8.3.2.tgz",
|
||||||
|
"integrity": "sha512-+NYs2QeMWy+GWFOEm9xnn6HCDp0l7QBD7ml8zLUmJ+93Q5NF0NocErnwkTkXVFNiX3/fpC6afS8Dhb/gz7R7eg=="
|
||||||
|
},
|
||||||
"v8-compile-cache": {
|
"v8-compile-cache": {
|
||||||
"version": "2.3.0",
|
"version": "2.3.0",
|
||||||
"resolved": "https://registry.npmjs.org/v8-compile-cache/-/v8-compile-cache-2.3.0.tgz",
|
"resolved": "https://registry.npmjs.org/v8-compile-cache/-/v8-compile-cache-2.3.0.tgz",
|
||||||
|
|||||||
@@ -23,6 +23,6 @@
|
|||||||
"typescript": "^4.6.3"
|
"typescript": "^4.6.3"
|
||||||
},
|
},
|
||||||
"dependencies": {
|
"dependencies": {
|
||||||
"@actions/core": "^1.6.0"
|
"@actions/core": "^1.9.1"
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|||||||
51
packages/k8s/package-lock.json
generated
51
packages/k8s/package-lock.json
generated
@@ -9,7 +9,7 @@
|
|||||||
"version": "0.1.0",
|
"version": "0.1.0",
|
||||||
"license": "MIT",
|
"license": "MIT",
|
||||||
"dependencies": {
|
"dependencies": {
|
||||||
"@actions/core": "^1.6.0",
|
"@actions/core": "^1.9.1",
|
||||||
"@actions/exec": "^1.1.1",
|
"@actions/exec": "^1.1.1",
|
||||||
"@actions/io": "^1.1.2",
|
"@actions/io": "^1.1.2",
|
||||||
"@kubernetes/client-node": "^0.16.3",
|
"@kubernetes/client-node": "^0.16.3",
|
||||||
@@ -28,7 +28,7 @@
|
|||||||
"version": "0.1.0",
|
"version": "0.1.0",
|
||||||
"license": "MIT",
|
"license": "MIT",
|
||||||
"dependencies": {
|
"dependencies": {
|
||||||
"@actions/core": "^1.6.0"
|
"@actions/core": "^1.9.1"
|
||||||
},
|
},
|
||||||
"devDependencies": {
|
"devDependencies": {
|
||||||
"@types/node": "^17.0.23",
|
"@types/node": "^17.0.23",
|
||||||
@@ -41,11 +41,20 @@
|
|||||||
}
|
}
|
||||||
},
|
},
|
||||||
"node_modules/@actions/core": {
|
"node_modules/@actions/core": {
|
||||||
"version": "1.8.2",
|
"version": "1.9.1",
|
||||||
"resolved": "https://registry.npmjs.org/@actions/core/-/core-1.8.2.tgz",
|
"resolved": "https://registry.npmjs.org/@actions/core/-/core-1.9.1.tgz",
|
||||||
"integrity": "sha512-FXcBL7nyik8K5ODeCKlxi+vts7torOkoDAKfeh61EAkAy1HAvwn9uVzZBY0f15YcQTcZZ2/iSGBFHEuioZWfDA==",
|
"integrity": "sha512-5ad+U2YGrmmiw6du20AQW5XuWo7UKN2052FjSV7MX+Wfjf8sCqcsZe62NfgHys4QI4/Y+vQvLKYL8jWtA1ZBTA==",
|
||||||
"dependencies": {
|
"dependencies": {
|
||||||
"@actions/http-client": "^2.0.1"
|
"@actions/http-client": "^2.0.1",
|
||||||
|
"uuid": "^8.3.2"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"node_modules/@actions/core/node_modules/uuid": {
|
||||||
|
"version": "8.3.2",
|
||||||
|
"resolved": "https://registry.npmjs.org/uuid/-/uuid-8.3.2.tgz",
|
||||||
|
"integrity": "sha512-+NYs2QeMWy+GWFOEm9xnn6HCDp0l7QBD7ml8zLUmJ+93Q5NF0NocErnwkTkXVFNiX3/fpC6afS8Dhb/gz7R7eg==",
|
||||||
|
"bin": {
|
||||||
|
"uuid": "dist/bin/uuid"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
"node_modules/@actions/exec": {
|
"node_modules/@actions/exec": {
|
||||||
@@ -3428,9 +3437,9 @@
|
|||||||
}
|
}
|
||||||
},
|
},
|
||||||
"node_modules/jose": {
|
"node_modules/jose": {
|
||||||
"version": "2.0.5",
|
"version": "2.0.6",
|
||||||
"resolved": "https://registry.npmjs.org/jose/-/jose-2.0.5.tgz",
|
"resolved": "https://registry.npmjs.org/jose/-/jose-2.0.6.tgz",
|
||||||
"integrity": "sha512-BAiDNeDKTMgk4tvD0BbxJ8xHEHBZgpeRZ1zGPPsitSyMgjoMWiLGYAE7H7NpP5h0lPppQajQs871E8NHUrzVPA==",
|
"integrity": "sha512-FVoPY7SflDodE4lknJmbAHSUjLCzE2H1F6MS0RYKMQ8SR+lNccpMf8R4eqkNYyyUjR5qZReOzZo5C5YiHOCjjg==",
|
||||||
"dependencies": {
|
"dependencies": {
|
||||||
"@panva/asn1.js": "^1.0.0"
|
"@panva/asn1.js": "^1.0.0"
|
||||||
},
|
},
|
||||||
@@ -5145,11 +5154,19 @@
|
|||||||
},
|
},
|
||||||
"dependencies": {
|
"dependencies": {
|
||||||
"@actions/core": {
|
"@actions/core": {
|
||||||
"version": "1.8.2",
|
"version": "1.9.1",
|
||||||
"resolved": "https://registry.npmjs.org/@actions/core/-/core-1.8.2.tgz",
|
"resolved": "https://registry.npmjs.org/@actions/core/-/core-1.9.1.tgz",
|
||||||
"integrity": "sha512-FXcBL7nyik8K5ODeCKlxi+vts7torOkoDAKfeh61EAkAy1HAvwn9uVzZBY0f15YcQTcZZ2/iSGBFHEuioZWfDA==",
|
"integrity": "sha512-5ad+U2YGrmmiw6du20AQW5XuWo7UKN2052FjSV7MX+Wfjf8sCqcsZe62NfgHys4QI4/Y+vQvLKYL8jWtA1ZBTA==",
|
||||||
"requires": {
|
"requires": {
|
||||||
"@actions/http-client": "^2.0.1"
|
"@actions/http-client": "^2.0.1",
|
||||||
|
"uuid": "^8.3.2"
|
||||||
|
},
|
||||||
|
"dependencies": {
|
||||||
|
"uuid": {
|
||||||
|
"version": "8.3.2",
|
||||||
|
"resolved": "https://registry.npmjs.org/uuid/-/uuid-8.3.2.tgz",
|
||||||
|
"integrity": "sha512-+NYs2QeMWy+GWFOEm9xnn6HCDp0l7QBD7ml8zLUmJ+93Q5NF0NocErnwkTkXVFNiX3/fpC6afS8Dhb/gz7R7eg=="
|
||||||
|
}
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
"@actions/exec": {
|
"@actions/exec": {
|
||||||
@@ -7074,7 +7091,7 @@
|
|||||||
"hooklib": {
|
"hooklib": {
|
||||||
"version": "file:../hooklib",
|
"version": "file:../hooklib",
|
||||||
"requires": {
|
"requires": {
|
||||||
"@actions/core": "^1.6.0",
|
"@actions/core": "^1.9.1",
|
||||||
"@types/node": "^17.0.23",
|
"@types/node": "^17.0.23",
|
||||||
"@typescript-eslint/parser": "^5.18.0",
|
"@typescript-eslint/parser": "^5.18.0",
|
||||||
"@zeit/ncc": "^0.22.3",
|
"@zeit/ncc": "^0.22.3",
|
||||||
@@ -7804,9 +7821,9 @@
|
|||||||
}
|
}
|
||||||
},
|
},
|
||||||
"jose": {
|
"jose": {
|
||||||
"version": "2.0.5",
|
"version": "2.0.6",
|
||||||
"resolved": "https://registry.npmjs.org/jose/-/jose-2.0.5.tgz",
|
"resolved": "https://registry.npmjs.org/jose/-/jose-2.0.6.tgz",
|
||||||
"integrity": "sha512-BAiDNeDKTMgk4tvD0BbxJ8xHEHBZgpeRZ1zGPPsitSyMgjoMWiLGYAE7H7NpP5h0lPppQajQs871E8NHUrzVPA==",
|
"integrity": "sha512-FVoPY7SflDodE4lknJmbAHSUjLCzE2H1F6MS0RYKMQ8SR+lNccpMf8R4eqkNYyyUjR5qZReOzZo5C5YiHOCjjg==",
|
||||||
"requires": {
|
"requires": {
|
||||||
"@panva/asn1.js": "^1.0.0"
|
"@panva/asn1.js": "^1.0.0"
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -13,7 +13,7 @@
|
|||||||
"author": "",
|
"author": "",
|
||||||
"license": "MIT",
|
"license": "MIT",
|
||||||
"dependencies": {
|
"dependencies": {
|
||||||
"@actions/core": "^1.6.0",
|
"@actions/core": "^1.9.1",
|
||||||
"@actions/exec": "^1.1.1",
|
"@actions/exec": "^1.1.1",
|
||||||
"@actions/io": "^1.1.2",
|
"@actions/io": "^1.1.2",
|
||||||
"@kubernetes/client-node": "^0.16.3",
|
"@kubernetes/client-node": "^0.16.3",
|
||||||
|
|||||||
@@ -39,14 +39,14 @@ export function getSecretName(): string {
|
|||||||
)}-secret-${uuidv4().substring(0, STEP_POD_NAME_SUFFIX_LENGTH)}`
|
)}-secret-${uuidv4().substring(0, STEP_POD_NAME_SUFFIX_LENGTH)}`
|
||||||
}
|
}
|
||||||
|
|
||||||
const MAX_POD_NAME_LENGTH = 63
|
export const MAX_POD_NAME_LENGTH = 63
|
||||||
const STEP_POD_NAME_SUFFIX_LENGTH = 8
|
export const STEP_POD_NAME_SUFFIX_LENGTH = 8
|
||||||
export const JOB_CONTAINER_NAME = 'job'
|
export const JOB_CONTAINER_NAME = 'job'
|
||||||
|
|
||||||
export class RunnerInstanceLabel {
|
export class RunnerInstanceLabel {
|
||||||
runnerhook: string
|
private podName: string
|
||||||
constructor() {
|
constructor() {
|
||||||
this.runnerhook = process.env.ACTIONS_RUNNER_POD_NAME as string
|
this.podName = getRunnerPodName()
|
||||||
}
|
}
|
||||||
|
|
||||||
get key(): string {
|
get key(): string {
|
||||||
@@ -54,10 +54,10 @@ export class RunnerInstanceLabel {
|
|||||||
}
|
}
|
||||||
|
|
||||||
get value(): string {
|
get value(): string {
|
||||||
return this.runnerhook
|
return this.podName
|
||||||
}
|
}
|
||||||
|
|
||||||
toString(): string {
|
toString(): string {
|
||||||
return `runner-pod=${this.runnerhook}`
|
return `runner-pod=${this.podName}`
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -46,10 +46,10 @@ export async function prepareJob(
|
|||||||
}
|
}
|
||||||
let createdPod: k8s.V1Pod | undefined = undefined
|
let createdPod: k8s.V1Pod | undefined = undefined
|
||||||
try {
|
try {
|
||||||
createdPod = await createPod(container, services, args.registry)
|
createdPod = await createPod(container, services, args.container.registry)
|
||||||
} catch (err) {
|
} catch (err) {
|
||||||
await prunePods()
|
await prunePods()
|
||||||
throw new Error(`failed to create job pod: ${JSON.stringify(err)}`)
|
throw new Error(`failed to create job pod: ${err}`)
|
||||||
}
|
}
|
||||||
|
|
||||||
if (!createdPod?.metadata?.name) {
|
if (!createdPod?.metadata?.name) {
|
||||||
@@ -158,7 +158,7 @@ function createPodSpec(
|
|||||||
name: string,
|
name: string,
|
||||||
jobContainer = false
|
jobContainer = false
|
||||||
): k8s.V1Container {
|
): k8s.V1Container {
|
||||||
if (!container.entryPoint) {
|
if (!container.entryPoint && jobContainer) {
|
||||||
container.entryPoint = DEFAULT_CONTAINER_ENTRY_POINT
|
container.entryPoint = DEFAULT_CONTAINER_ENTRY_POINT
|
||||||
container.entryPointArgs = DEFAULT_CONTAINER_ENTRY_POINT_ARGS
|
container.entryPointArgs = DEFAULT_CONTAINER_ENTRY_POINT_ARGS
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -28,7 +28,7 @@ export async function runScriptStep(
|
|||||||
JOB_CONTAINER_NAME
|
JOB_CONTAINER_NAME
|
||||||
)
|
)
|
||||||
} catch (err) {
|
} catch (err) {
|
||||||
throw new Error(`failed to run script step: ${JSON.stringify(err)}`)
|
throw new Error(`failed to run script step: ${err}`)
|
||||||
} finally {
|
} finally {
|
||||||
fs.rmSync(runnerPath)
|
fs.rmSync(runnerPath)
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -22,7 +22,7 @@ async function run(): Promise<void> {
|
|||||||
throw new Error(
|
throw new Error(
|
||||||
`The Service account needs the following permissions ${JSON.stringify(
|
`The Service account needs the following permissions ${JSON.stringify(
|
||||||
requiredPermissions
|
requiredPermissions
|
||||||
)} on the pod resource in the '${namespace}' namespace. Please contact your self hosted runner administrator.`
|
)} on the pod resource in the '${namespace()}' namespace. Please contact your self hosted runner administrator.`
|
||||||
)
|
)
|
||||||
}
|
}
|
||||||
switch (command) {
|
switch (command) {
|
||||||
|
|||||||
@@ -1,3 +1,4 @@
|
|||||||
|
import * as core from '@actions/core'
|
||||||
import * as k8s from '@kubernetes/client-node'
|
import * as k8s from '@kubernetes/client-node'
|
||||||
import { ContainerInfo, Registry } from 'hooklib'
|
import { ContainerInfo, Registry } from 'hooklib'
|
||||||
import * as stream from 'stream'
|
import * as stream from 'stream'
|
||||||
@@ -109,13 +110,14 @@ export async function createPod(
|
|||||||
export async function createJob(
|
export async function createJob(
|
||||||
container: k8s.V1Container
|
container: k8s.V1Container
|
||||||
): Promise<k8s.V1Job> {
|
): Promise<k8s.V1Job> {
|
||||||
const job = new k8s.V1Job()
|
const runnerInstanceLabel = new RunnerInstanceLabel()
|
||||||
|
|
||||||
|
const job = new k8s.V1Job()
|
||||||
job.apiVersion = 'batch/v1'
|
job.apiVersion = 'batch/v1'
|
||||||
job.kind = 'Job'
|
job.kind = 'Job'
|
||||||
job.metadata = new k8s.V1ObjectMeta()
|
job.metadata = new k8s.V1ObjectMeta()
|
||||||
job.metadata.name = getStepPodName()
|
job.metadata.name = getStepPodName()
|
||||||
job.metadata.labels = { 'runner-pod': getRunnerPodName() }
|
job.metadata.labels = { [runnerInstanceLabel.key]: runnerInstanceLabel.value }
|
||||||
|
|
||||||
job.spec = new k8s.V1JobSpec()
|
job.spec = new k8s.V1JobSpec()
|
||||||
job.spec.ttlSecondsAfterFinished = 300
|
job.spec.ttlSecondsAfterFinished = 300
|
||||||
@@ -127,7 +129,7 @@ export async function createJob(
|
|||||||
job.spec.template.spec.restartPolicy = 'Never'
|
job.spec.template.spec.restartPolicy = 'Never'
|
||||||
job.spec.template.spec.nodeName = await getCurrentNodeName()
|
job.spec.template.spec.nodeName = await getCurrentNodeName()
|
||||||
|
|
||||||
const claimName = `${runnerName()}-work`
|
const claimName = getVolumeClaimName()
|
||||||
job.spec.template.spec.volumes = [
|
job.spec.template.spec.volumes = [
|
||||||
{
|
{
|
||||||
name: 'work',
|
name: 'work',
|
||||||
@@ -185,7 +187,6 @@ export async function execPodStep(
|
|||||||
): Promise<void> {
|
): Promise<void> {
|
||||||
const exec = new k8s.Exec(kc)
|
const exec = new k8s.Exec(kc)
|
||||||
await new Promise(async function (resolve, reject) {
|
await new Promise(async function (resolve, reject) {
|
||||||
try {
|
|
||||||
await exec.exec(
|
await exec.exec(
|
||||||
namespace(),
|
namespace(),
|
||||||
podName,
|
podName,
|
||||||
@@ -200,18 +201,16 @@ export async function execPodStep(
|
|||||||
if (resp.status === 'Success') {
|
if (resp.status === 'Success') {
|
||||||
resolve(resp.code)
|
resolve(resp.code)
|
||||||
} else {
|
} else {
|
||||||
reject(
|
core.debug(
|
||||||
JSON.stringify({
|
JSON.stringify({
|
||||||
message: resp?.message,
|
message: resp?.message,
|
||||||
details: resp?.details
|
details: resp?.details
|
||||||
})
|
})
|
||||||
)
|
)
|
||||||
|
reject(resp?.message)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
)
|
)
|
||||||
} catch (error) {
|
|
||||||
reject(JSON.stringify(error))
|
|
||||||
}
|
|
||||||
})
|
})
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -234,29 +233,34 @@ export async function createDockerSecret(
|
|||||||
): Promise<k8s.V1Secret> {
|
): Promise<k8s.V1Secret> {
|
||||||
const authContent = {
|
const authContent = {
|
||||||
auths: {
|
auths: {
|
||||||
[registry.serverUrl]: {
|
[registry.serverUrl || 'https://index.docker.io/v1/']: {
|
||||||
username: registry.username,
|
username: registry.username,
|
||||||
password: registry.password,
|
password: registry.password,
|
||||||
auth: Buffer.from(
|
auth: Buffer.from(`${registry.username}:${registry.password}`).toString(
|
||||||
`${registry.username}:${registry.password}`,
|
|
||||||
'base64'
|
'base64'
|
||||||
).toString()
|
)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
const runnerInstanceLabel = new RunnerInstanceLabel()
|
||||||
|
|
||||||
const secretName = getSecretName()
|
const secretName = getSecretName()
|
||||||
const secret = new k8s.V1Secret()
|
const secret = new k8s.V1Secret()
|
||||||
secret.immutable = true
|
secret.immutable = true
|
||||||
secret.apiVersion = 'v1'
|
secret.apiVersion = 'v1'
|
||||||
secret.metadata = new k8s.V1ObjectMeta()
|
secret.metadata = new k8s.V1ObjectMeta()
|
||||||
secret.metadata.name = secretName
|
secret.metadata.name = secretName
|
||||||
secret.metadata.labels = { 'runner-pod': getRunnerPodName() }
|
secret.metadata.namespace = namespace()
|
||||||
|
secret.metadata.labels = {
|
||||||
|
[runnerInstanceLabel.key]: runnerInstanceLabel.value
|
||||||
|
}
|
||||||
|
secret.type = 'kubernetes.io/dockerconfigjson'
|
||||||
secret.kind = 'Secret'
|
secret.kind = 'Secret'
|
||||||
secret.data = {
|
secret.data = {
|
||||||
'.dockerconfigjson': Buffer.from(
|
'.dockerconfigjson': Buffer.from(JSON.stringify(authContent)).toString(
|
||||||
JSON.stringify(authContent),
|
|
||||||
'base64'
|
'base64'
|
||||||
).toString()
|
)
|
||||||
}
|
}
|
||||||
|
|
||||||
const { body } = await k8sApi.createNamespacedSecret(namespace(), secret)
|
const { body } = await k8sApi.createNamespacedSecret(namespace(), secret)
|
||||||
@@ -266,13 +270,18 @@ export async function createDockerSecret(
|
|||||||
export async function createSecretForEnvs(envs: {
|
export async function createSecretForEnvs(envs: {
|
||||||
[key: string]: string
|
[key: string]: string
|
||||||
}): Promise<string> {
|
}): Promise<string> {
|
||||||
|
const runnerInstanceLabel = new RunnerInstanceLabel()
|
||||||
|
|
||||||
const secret = new k8s.V1Secret()
|
const secret = new k8s.V1Secret()
|
||||||
const secretName = getSecretName()
|
const secretName = getSecretName()
|
||||||
secret.immutable = true
|
secret.immutable = true
|
||||||
secret.apiVersion = 'v1'
|
secret.apiVersion = 'v1'
|
||||||
secret.metadata = new k8s.V1ObjectMeta()
|
secret.metadata = new k8s.V1ObjectMeta()
|
||||||
secret.metadata.name = secretName
|
secret.metadata.name = secretName
|
||||||
secret.metadata.labels = { 'runner-pod': getRunnerPodName() }
|
|
||||||
|
secret.metadata.labels = {
|
||||||
|
[runnerInstanceLabel.key]: runnerInstanceLabel.value
|
||||||
|
}
|
||||||
secret.kind = 'Secret'
|
secret.kind = 'Secret'
|
||||||
secret.data = {}
|
secret.data = {}
|
||||||
for (const [key, value] of Object.entries(envs)) {
|
for (const [key, value] of Object.entries(envs)) {
|
||||||
@@ -372,7 +381,7 @@ export async function getPodLogs(
|
|||||||
})
|
})
|
||||||
|
|
||||||
logStream.on('error', err => {
|
logStream.on('error', err => {
|
||||||
process.stderr.write(JSON.stringify(err))
|
process.stderr.write(err.message)
|
||||||
})
|
})
|
||||||
|
|
||||||
const r = await log.log(namespace(), podName, containerName, logStream, {
|
const r = await log.log(namespace(), podName, containerName, logStream, {
|
||||||
@@ -478,16 +487,6 @@ export function namespace(): string {
|
|||||||
return context.namespace
|
return context.namespace
|
||||||
}
|
}
|
||||||
|
|
||||||
function runnerName(): string {
|
|
||||||
const name = process.env.ACTIONS_RUNNER_POD_NAME
|
|
||||||
if (!name) {
|
|
||||||
throw new Error(
|
|
||||||
'Failed to determine runner name. "ACTIONS_RUNNER_POD_NAME" env variables should be set.'
|
|
||||||
)
|
|
||||||
}
|
|
||||||
return name
|
|
||||||
}
|
|
||||||
|
|
||||||
class BackOffManager {
|
class BackOffManager {
|
||||||
private backOffSeconds = 1
|
private backOffSeconds = 1
|
||||||
totalTime = 0
|
totalTime = 0
|
||||||
@@ -517,27 +516,37 @@ class BackOffManager {
|
|||||||
export function containerPorts(
|
export function containerPorts(
|
||||||
container: ContainerInfo
|
container: ContainerInfo
|
||||||
): k8s.V1ContainerPort[] {
|
): k8s.V1ContainerPort[] {
|
||||||
// 8080:8080/tcp
|
|
||||||
const portFormat = /(\d{1,5})(:(\d{1,5}))?(\/(tcp|udp))?/
|
|
||||||
|
|
||||||
const ports: k8s.V1ContainerPort[] = []
|
const ports: k8s.V1ContainerPort[] = []
|
||||||
for (const portDefinition of container.portMappings) {
|
for (const portDefinition of container.portMappings) {
|
||||||
const submatches = portFormat.exec(portDefinition)
|
const portProtoSplit = portDefinition.split('/')
|
||||||
if (!submatches) {
|
if (portProtoSplit.length > 2) {
|
||||||
throw new Error(
|
throw new Error(`Unexpected port format: ${portDefinition}`)
|
||||||
`Port definition "${portDefinition}" is in incorrect format`
|
|
||||||
)
|
|
||||||
}
|
}
|
||||||
|
|
||||||
const port = new k8s.V1ContainerPort()
|
const port = new k8s.V1ContainerPort()
|
||||||
port.hostPort = Number(submatches[1])
|
port.protocol =
|
||||||
if (submatches[3]) {
|
portProtoSplit.length === 2 ? portProtoSplit[1].toUpperCase() : 'TCP'
|
||||||
port.containerPort = Number(submatches[3])
|
|
||||||
|
const portSplit = portProtoSplit[0].split(':')
|
||||||
|
if (portSplit.length > 2) {
|
||||||
|
throw new Error('ports should have at most one ":" separator')
|
||||||
}
|
}
|
||||||
if (submatches[5]) {
|
|
||||||
port.protocol = submatches[5].toUpperCase()
|
const parsePort = (p: string): number => {
|
||||||
|
const num = Number(p)
|
||||||
|
if (!Number.isInteger(num) || num < 1 || num > 65535) {
|
||||||
|
throw new Error(`invalid container port: ${p}`)
|
||||||
|
}
|
||||||
|
return num
|
||||||
|
}
|
||||||
|
|
||||||
|
if (portSplit.length === 1) {
|
||||||
|
port.containerPort = parsePort(portSplit[0])
|
||||||
} else {
|
} else {
|
||||||
port.protocol = 'TCP'
|
port.hostPort = parsePort(portSplit[0])
|
||||||
|
port.containerPort = parsePort(portSplit[1])
|
||||||
}
|
}
|
||||||
|
|
||||||
ports.push(port)
|
ports.push(port)
|
||||||
}
|
}
|
||||||
return ports
|
return ports
|
||||||
|
|||||||
@@ -20,18 +20,20 @@ export function containerVolumes(
|
|||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
|
||||||
|
const workspacePath = process.env.GITHUB_WORKSPACE as string
|
||||||
if (containerAction) {
|
if (containerAction) {
|
||||||
const workspace = process.env.GITHUB_WORKSPACE as string
|
const i = workspacePath.lastIndexOf('_work/')
|
||||||
|
const workspaceRelativePath = workspacePath.slice(i + '_work/'.length)
|
||||||
mounts.push(
|
mounts.push(
|
||||||
{
|
{
|
||||||
name: POD_VOLUME_NAME,
|
name: POD_VOLUME_NAME,
|
||||||
mountPath: '/github/workspace',
|
mountPath: '/github/workspace',
|
||||||
subPath: workspace.substring(workspace.indexOf('work/') + 1)
|
subPath: workspaceRelativePath
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
name: POD_VOLUME_NAME,
|
name: POD_VOLUME_NAME,
|
||||||
mountPath: '/github/file_commands',
|
mountPath: '/github/file_commands',
|
||||||
subPath: workspace.substring(workspace.indexOf('work/') + 1)
|
subPath: '_temp/_runner_file_commands'
|
||||||
}
|
}
|
||||||
)
|
)
|
||||||
return mounts
|
return mounts
|
||||||
@@ -63,7 +65,6 @@ export function containerVolumes(
|
|||||||
return mounts
|
return mounts
|
||||||
}
|
}
|
||||||
|
|
||||||
const workspacePath = process.env.GITHUB_WORKSPACE as string
|
|
||||||
for (const userVolume of userMountVolumes) {
|
for (const userVolume of userMountVolumes) {
|
||||||
let sourceVolumePath = ''
|
let sourceVolumePath = ''
|
||||||
if (path.isAbsolute(userVolume.sourceVolumePath)) {
|
if (path.isAbsolute(userVolume.sourceVolumePath)) {
|
||||||
|
|||||||
@@ -1,4 +1,7 @@
|
|||||||
|
import * as k8s from '@kubernetes/client-node'
|
||||||
import { cleanupJob, prepareJob } from '../src/hooks'
|
import { cleanupJob, prepareJob } from '../src/hooks'
|
||||||
|
import { RunnerInstanceLabel } from '../src/hooks/constants'
|
||||||
|
import { namespace } from '../src/k8s'
|
||||||
import { TestHelper } from './test-setup'
|
import { TestHelper } from './test-setup'
|
||||||
|
|
||||||
let testHelper: TestHelper
|
let testHelper: TestHelper
|
||||||
@@ -13,10 +16,50 @@ describe('Cleanup Job', () => {
|
|||||||
)
|
)
|
||||||
await prepareJob(prepareJobData.args, prepareJobOutputFilePath)
|
await prepareJob(prepareJobData.args, prepareJobOutputFilePath)
|
||||||
})
|
})
|
||||||
it('should not throw', async () => {
|
|
||||||
await expect(cleanupJob()).resolves.not.toThrow()
|
|
||||||
})
|
|
||||||
afterEach(async () => {
|
afterEach(async () => {
|
||||||
await testHelper.cleanup()
|
await testHelper.cleanup()
|
||||||
})
|
})
|
||||||
|
|
||||||
|
it('should not throw', async () => {
|
||||||
|
await expect(cleanupJob()).resolves.not.toThrow()
|
||||||
|
})
|
||||||
|
|
||||||
|
it('should have no runner linked pods running', async () => {
|
||||||
|
await cleanupJob()
|
||||||
|
const kc = new k8s.KubeConfig()
|
||||||
|
|
||||||
|
kc.loadFromDefault()
|
||||||
|
const k8sApi = kc.makeApiClient(k8s.CoreV1Api)
|
||||||
|
|
||||||
|
const podList = await k8sApi.listNamespacedPod(
|
||||||
|
namespace(),
|
||||||
|
undefined,
|
||||||
|
undefined,
|
||||||
|
undefined,
|
||||||
|
undefined,
|
||||||
|
new RunnerInstanceLabel().toString()
|
||||||
|
)
|
||||||
|
|
||||||
|
expect(podList.body.items.length).toBe(0)
|
||||||
|
})
|
||||||
|
|
||||||
|
it('should have no runner linked secrets', async () => {
|
||||||
|
await cleanupJob()
|
||||||
|
const kc = new k8s.KubeConfig()
|
||||||
|
|
||||||
|
kc.loadFromDefault()
|
||||||
|
const k8sApi = kc.makeApiClient(k8s.CoreV1Api)
|
||||||
|
|
||||||
|
const secretList = await k8sApi.listNamespacedSecret(
|
||||||
|
namespace(),
|
||||||
|
undefined,
|
||||||
|
undefined,
|
||||||
|
undefined,
|
||||||
|
undefined,
|
||||||
|
new RunnerInstanceLabel().toString()
|
||||||
|
)
|
||||||
|
|
||||||
|
expect(secretList.body.items.length).toBe(0)
|
||||||
|
})
|
||||||
})
|
})
|
||||||
|
|||||||
182
packages/k8s/tests/constants-test.ts
Normal file
182
packages/k8s/tests/constants-test.ts
Normal file
@@ -0,0 +1,182 @@
|
|||||||
|
import {
|
||||||
|
getJobPodName,
|
||||||
|
getRunnerPodName,
|
||||||
|
getSecretName,
|
||||||
|
getStepPodName,
|
||||||
|
getVolumeClaimName,
|
||||||
|
JOB_CONTAINER_NAME,
|
||||||
|
MAX_POD_NAME_LENGTH,
|
||||||
|
RunnerInstanceLabel,
|
||||||
|
STEP_POD_NAME_SUFFIX_LENGTH
|
||||||
|
} from '../src/hooks/constants'
|
||||||
|
|
||||||
|
describe('constants', () => {
|
||||||
|
describe('runner instance label', () => {
|
||||||
|
beforeEach(() => {
|
||||||
|
process.env.ACTIONS_RUNNER_POD_NAME = 'example'
|
||||||
|
})
|
||||||
|
it('should throw if ACTIONS_RUNNER_POD_NAME env is not set', () => {
|
||||||
|
delete process.env.ACTIONS_RUNNER_POD_NAME
|
||||||
|
expect(() => new RunnerInstanceLabel()).toThrow()
|
||||||
|
})
|
||||||
|
|
||||||
|
it('should have key truthy', () => {
|
||||||
|
const runnerInstanceLabel = new RunnerInstanceLabel()
|
||||||
|
expect(typeof runnerInstanceLabel.key).toBe('string')
|
||||||
|
expect(runnerInstanceLabel.key).toBeTruthy()
|
||||||
|
expect(runnerInstanceLabel.key.length).toBeGreaterThan(0)
|
||||||
|
})
|
||||||
|
|
||||||
|
it('should have value as runner pod name', () => {
|
||||||
|
const name = process.env.ACTIONS_RUNNER_POD_NAME as string
|
||||||
|
const runnerInstanceLabel = new RunnerInstanceLabel()
|
||||||
|
expect(typeof runnerInstanceLabel.value).toBe('string')
|
||||||
|
expect(runnerInstanceLabel.value).toBe(name)
|
||||||
|
})
|
||||||
|
|
||||||
|
it('should have toString combination of key and value', () => {
|
||||||
|
const runnerInstanceLabel = new RunnerInstanceLabel()
|
||||||
|
expect(runnerInstanceLabel.toString()).toBe(
|
||||||
|
`${runnerInstanceLabel.key}=${runnerInstanceLabel.value}`
|
||||||
|
)
|
||||||
|
})
|
||||||
|
})
|
||||||
|
|
||||||
|
describe('getRunnerPodName', () => {
|
||||||
|
it('should throw if ACTIONS_RUNNER_POD_NAME env is not set', () => {
|
||||||
|
delete process.env.ACTIONS_RUNNER_POD_NAME
|
||||||
|
expect(() => getRunnerPodName()).toThrow()
|
||||||
|
|
||||||
|
process.env.ACTIONS_RUNNER_POD_NAME = ''
|
||||||
|
expect(() => getRunnerPodName()).toThrow()
|
||||||
|
})
|
||||||
|
|
||||||
|
it('should return corrent ACTIONS_RUNNER_POD_NAME name', () => {
|
||||||
|
const name = 'example'
|
||||||
|
process.env.ACTIONS_RUNNER_POD_NAME = name
|
||||||
|
expect(getRunnerPodName()).toBe(name)
|
||||||
|
})
|
||||||
|
})
|
||||||
|
|
||||||
|
describe('getJobPodName', () => {
|
||||||
|
it('should throw on getJobPodName if ACTIONS_RUNNER_POD_NAME env is not set', () => {
|
||||||
|
delete process.env.ACTIONS_RUNNER_POD_NAME
|
||||||
|
expect(() => getJobPodName()).toThrow()
|
||||||
|
|
||||||
|
process.env.ACTIONS_RUNNER_POD_NAME = ''
|
||||||
|
expect(() => getRunnerPodName()).toThrow()
|
||||||
|
})
|
||||||
|
|
||||||
|
it('should contain suffix -workflow', () => {
|
||||||
|
const tableTests = [
|
||||||
|
{
|
||||||
|
podName: 'test',
|
||||||
|
expect: 'test-workflow'
|
||||||
|
},
|
||||||
|
{
|
||||||
|
// podName.length == 63
|
||||||
|
podName:
|
||||||
|
'abcdaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa',
|
||||||
|
expect:
|
||||||
|
'abcdaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa-workflow'
|
||||||
|
}
|
||||||
|
]
|
||||||
|
|
||||||
|
for (const tt of tableTests) {
|
||||||
|
process.env.ACTIONS_RUNNER_POD_NAME = tt.podName
|
||||||
|
const actual = getJobPodName()
|
||||||
|
expect(actual).toBe(tt.expect)
|
||||||
|
}
|
||||||
|
})
|
||||||
|
})
|
||||||
|
|
||||||
|
describe('getVolumeClaimName', () => {
|
||||||
|
it('should throw if ACTIONS_RUNNER_POD_NAME env is not set', () => {
|
||||||
|
delete process.env.ACTIONS_RUNNER_CLAIM_NAME
|
||||||
|
delete process.env.ACTIONS_RUNNER_POD_NAME
|
||||||
|
expect(() => getVolumeClaimName()).toThrow()
|
||||||
|
|
||||||
|
process.env.ACTIONS_RUNNER_POD_NAME = ''
|
||||||
|
expect(() => getVolumeClaimName()).toThrow()
|
||||||
|
})
|
||||||
|
|
||||||
|
it('should return ACTIONS_RUNNER_CLAIM_NAME env if set', () => {
|
||||||
|
const claimName = 'testclaim'
|
||||||
|
process.env.ACTIONS_RUNNER_CLAIM_NAME = claimName
|
||||||
|
process.env.ACTIONS_RUNNER_POD_NAME = 'example'
|
||||||
|
expect(getVolumeClaimName()).toBe(claimName)
|
||||||
|
})
|
||||||
|
|
||||||
|
it('should contain suffix -work if ACTIONS_RUNNER_CLAIM_NAME is not set', () => {
|
||||||
|
delete process.env.ACTIONS_RUNNER_CLAIM_NAME
|
||||||
|
process.env.ACTIONS_RUNNER_POD_NAME = 'example'
|
||||||
|
expect(getVolumeClaimName()).toBe('example-work')
|
||||||
|
})
|
||||||
|
})
|
||||||
|
|
||||||
|
describe('getSecretName', () => {
|
||||||
|
it('should throw if ACTIONS_RUNNER_POD_NAME env is not set', () => {
|
||||||
|
delete process.env.ACTIONS_RUNNER_POD_NAME
|
||||||
|
expect(() => getSecretName()).toThrow()
|
||||||
|
|
||||||
|
process.env.ACTIONS_RUNNER_POD_NAME = ''
|
||||||
|
expect(() => getSecretName()).toThrow()
|
||||||
|
})
|
||||||
|
|
||||||
|
it('should contain suffix -secret- and name trimmed', () => {
|
||||||
|
const podNames = [
|
||||||
|
'test',
|
||||||
|
'abcdaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa'
|
||||||
|
]
|
||||||
|
|
||||||
|
for (const podName of podNames) {
|
||||||
|
process.env.ACTIONS_RUNNER_POD_NAME = podName
|
||||||
|
const actual = getSecretName()
|
||||||
|
const re = new RegExp(
|
||||||
|
`${podName.substring(
|
||||||
|
MAX_POD_NAME_LENGTH -
|
||||||
|
'-secret-'.length -
|
||||||
|
STEP_POD_NAME_SUFFIX_LENGTH
|
||||||
|
)}-secret-[a-z0-9]{8,}`
|
||||||
|
)
|
||||||
|
expect(actual).toMatch(re)
|
||||||
|
}
|
||||||
|
})
|
||||||
|
})
|
||||||
|
|
||||||
|
describe('getStepPodName', () => {
|
||||||
|
it('should throw if ACTIONS_RUNNER_POD_NAME env is not set', () => {
|
||||||
|
delete process.env.ACTIONS_RUNNER_POD_NAME
|
||||||
|
expect(() => getStepPodName()).toThrow()
|
||||||
|
|
||||||
|
process.env.ACTIONS_RUNNER_POD_NAME = ''
|
||||||
|
expect(() => getStepPodName()).toThrow()
|
||||||
|
})
|
||||||
|
|
||||||
|
it('should contain suffix -step- and name trimmed', () => {
|
||||||
|
const podNames = [
|
||||||
|
'test',
|
||||||
|
'abcdaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa'
|
||||||
|
]
|
||||||
|
|
||||||
|
for (const podName of podNames) {
|
||||||
|
process.env.ACTIONS_RUNNER_POD_NAME = podName
|
||||||
|
const actual = getStepPodName()
|
||||||
|
const re = new RegExp(
|
||||||
|
`${podName.substring(
|
||||||
|
MAX_POD_NAME_LENGTH - '-step-'.length - STEP_POD_NAME_SUFFIX_LENGTH
|
||||||
|
)}-step-[a-z0-9]{8,}`
|
||||||
|
)
|
||||||
|
expect(actual).toMatch(re)
|
||||||
|
}
|
||||||
|
})
|
||||||
|
})
|
||||||
|
|
||||||
|
describe('const values', () => {
|
||||||
|
it('should have constants set', () => {
|
||||||
|
expect(JOB_CONTAINER_NAME).toBeTruthy()
|
||||||
|
expect(MAX_POD_NAME_LENGTH).toBeGreaterThan(0)
|
||||||
|
expect(STEP_POD_NAME_SUFFIX_LENGTH).toBeGreaterThan(0)
|
||||||
|
})
|
||||||
|
})
|
||||||
|
})
|
||||||
224
packages/k8s/tests/k8s-utils-test.ts
Normal file
224
packages/k8s/tests/k8s-utils-test.ts
Normal file
@@ -0,0 +1,224 @@
|
|||||||
|
import * as fs from 'fs'
|
||||||
|
import { containerPorts, POD_VOLUME_NAME } from '../src/k8s'
|
||||||
|
import { containerVolumes, writeEntryPointScript } from '../src/k8s/utils'
|
||||||
|
import { TestHelper } from './test-setup'
|
||||||
|
|
||||||
|
let testHelper: TestHelper
|
||||||
|
|
||||||
|
describe('k8s utils', () => {
|
||||||
|
describe('write entrypoint', () => {
|
||||||
|
beforeEach(async () => {
|
||||||
|
testHelper = new TestHelper()
|
||||||
|
await testHelper.initialize()
|
||||||
|
})
|
||||||
|
|
||||||
|
afterEach(async () => {
|
||||||
|
await testHelper.cleanup()
|
||||||
|
})
|
||||||
|
|
||||||
|
it('should not throw', () => {
|
||||||
|
expect(() =>
|
||||||
|
writeEntryPointScript(
|
||||||
|
'/test',
|
||||||
|
'sh',
|
||||||
|
['-e', 'script.sh'],
|
||||||
|
['/prepend/path'],
|
||||||
|
{
|
||||||
|
SOME_ENV: 'SOME_VALUE'
|
||||||
|
}
|
||||||
|
)
|
||||||
|
).not.toThrow()
|
||||||
|
})
|
||||||
|
|
||||||
|
it('should throw if RUNNER_TEMP is not set', () => {
|
||||||
|
delete process.env.RUNNER_TEMP
|
||||||
|
expect(() =>
|
||||||
|
writeEntryPointScript(
|
||||||
|
'/test',
|
||||||
|
'sh',
|
||||||
|
['-e', 'script.sh'],
|
||||||
|
['/prepend/path'],
|
||||||
|
{
|
||||||
|
SOME_ENV: 'SOME_VALUE'
|
||||||
|
}
|
||||||
|
)
|
||||||
|
).toThrow()
|
||||||
|
})
|
||||||
|
|
||||||
|
it('should return object with containerPath and runnerPath', () => {
|
||||||
|
const { containerPath, runnerPath } = writeEntryPointScript(
|
||||||
|
'/test',
|
||||||
|
'sh',
|
||||||
|
['-e', 'script.sh'],
|
||||||
|
['/prepend/path'],
|
||||||
|
{
|
||||||
|
SOME_ENV: 'SOME_VALUE'
|
||||||
|
}
|
||||||
|
)
|
||||||
|
expect(containerPath).toMatch(/\/__w\/_temp\/.*\.sh/)
|
||||||
|
const re = new RegExp(`${process.env.RUNNER_TEMP}/.*\\.sh`)
|
||||||
|
expect(runnerPath).toMatch(re)
|
||||||
|
})
|
||||||
|
|
||||||
|
it('should write entrypoint path and the file should exist', () => {
|
||||||
|
const { runnerPath } = writeEntryPointScript(
|
||||||
|
'/test',
|
||||||
|
'sh',
|
||||||
|
['-e', 'script.sh'],
|
||||||
|
['/prepend/path'],
|
||||||
|
{
|
||||||
|
SOME_ENV: 'SOME_VALUE'
|
||||||
|
}
|
||||||
|
)
|
||||||
|
expect(fs.existsSync(runnerPath)).toBe(true)
|
||||||
|
})
|
||||||
|
})
|
||||||
|
|
||||||
|
describe('container volumes', () => {
|
||||||
|
beforeEach(async () => {
|
||||||
|
testHelper = new TestHelper()
|
||||||
|
await testHelper.initialize()
|
||||||
|
})
|
||||||
|
|
||||||
|
afterEach(async () => {
|
||||||
|
await testHelper.cleanup()
|
||||||
|
})
|
||||||
|
|
||||||
|
it('should throw if container action and GITHUB_WORKSPACE env is not set', () => {
|
||||||
|
delete process.env.GITHUB_WORKSPACE
|
||||||
|
expect(() => containerVolumes([], true, true)).toThrow()
|
||||||
|
expect(() => containerVolumes([], false, true)).toThrow()
|
||||||
|
})
|
||||||
|
|
||||||
|
it('should always have work mount', () => {
|
||||||
|
let volumes = containerVolumes([], true, true)
|
||||||
|
expect(volumes.find(e => e.mountPath === '/__w')).toBeTruthy()
|
||||||
|
volumes = containerVolumes([], true, false)
|
||||||
|
expect(volumes.find(e => e.mountPath === '/__w')).toBeTruthy()
|
||||||
|
volumes = containerVolumes([], false, true)
|
||||||
|
expect(volumes.find(e => e.mountPath === '/__w')).toBeTruthy()
|
||||||
|
volumes = containerVolumes([], false, false)
|
||||||
|
expect(volumes.find(e => e.mountPath === '/__w')).toBeTruthy()
|
||||||
|
})
|
||||||
|
|
||||||
|
it('should have container action volumes', () => {
|
||||||
|
let volumes = containerVolumes([], true, true)
|
||||||
|
let workspace = volumes.find(e => e.mountPath === '/github/workspace')
|
||||||
|
let fileCommands = volumes.find(
|
||||||
|
e => e.mountPath === '/github/file_commands'
|
||||||
|
)
|
||||||
|
expect(workspace).toBeTruthy()
|
||||||
|
expect(workspace?.subPath).toBe('repo/repo')
|
||||||
|
expect(fileCommands).toBeTruthy()
|
||||||
|
expect(fileCommands?.subPath).toBe('_temp/_runner_file_commands')
|
||||||
|
|
||||||
|
volumes = containerVolumes([], false, true)
|
||||||
|
workspace = volumes.find(e => e.mountPath === '/github/workspace')
|
||||||
|
fileCommands = volumes.find(e => e.mountPath === '/github/file_commands')
|
||||||
|
expect(workspace).toBeTruthy()
|
||||||
|
expect(workspace?.subPath).toBe('repo/repo')
|
||||||
|
expect(fileCommands).toBeTruthy()
|
||||||
|
expect(fileCommands?.subPath).toBe('_temp/_runner_file_commands')
|
||||||
|
})
|
||||||
|
|
||||||
|
it('should have externals, github home and github workflow mounts if job container', () => {
|
||||||
|
const volumes = containerVolumes()
|
||||||
|
expect(volumes.find(e => e.mountPath === '/__e')).toBeTruthy()
|
||||||
|
expect(volumes.find(e => e.mountPath === '/github/home')).toBeTruthy()
|
||||||
|
expect(volumes.find(e => e.mountPath === '/github/workflow')).toBeTruthy()
|
||||||
|
})
|
||||||
|
|
||||||
|
it('should throw if user volume source volume path is not in workspace', () => {
|
||||||
|
expect(() =>
|
||||||
|
containerVolumes(
|
||||||
|
[
|
||||||
|
{
|
||||||
|
sourceVolumePath: '/outside/of/workdir'
|
||||||
|
}
|
||||||
|
],
|
||||||
|
true,
|
||||||
|
false
|
||||||
|
)
|
||||||
|
).toThrow()
|
||||||
|
})
|
||||||
|
|
||||||
|
it(`all volumes should have name ${POD_VOLUME_NAME}`, () => {
|
||||||
|
let volumes = containerVolumes([], true, true)
|
||||||
|
expect(volumes.every(e => e.name === POD_VOLUME_NAME)).toBeTruthy()
|
||||||
|
volumes = containerVolumes([], true, false)
|
||||||
|
expect(volumes.every(e => e.name === POD_VOLUME_NAME)).toBeTruthy()
|
||||||
|
volumes = containerVolumes([], false, true)
|
||||||
|
expect(volumes.every(e => e.name === POD_VOLUME_NAME)).toBeTruthy()
|
||||||
|
volumes = containerVolumes([], false, false)
|
||||||
|
expect(volumes.every(e => e.name === POD_VOLUME_NAME)).toBeTruthy()
|
||||||
|
})
|
||||||
|
|
||||||
|
it('should parse container ports', () => {
|
||||||
|
const tt = [
|
||||||
|
{
|
||||||
|
spec: '8080:80',
|
||||||
|
want: {
|
||||||
|
containerPort: 80,
|
||||||
|
hostPort: 8080,
|
||||||
|
protocol: 'TCP'
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
spec: '8080:80/udp',
|
||||||
|
want: {
|
||||||
|
containerPort: 80,
|
||||||
|
hostPort: 8080,
|
||||||
|
protocol: 'UDP'
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
spec: '8080/udp',
|
||||||
|
want: {
|
||||||
|
containerPort: 8080,
|
||||||
|
hostPort: undefined,
|
||||||
|
protocol: 'UDP'
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
spec: '8080',
|
||||||
|
want: {
|
||||||
|
containerPort: 8080,
|
||||||
|
hostPort: undefined,
|
||||||
|
protocol: 'TCP'
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
|
||||||
|
for (const tc of tt) {
|
||||||
|
const got = containerPorts({ portMappings: [tc.spec] })
|
||||||
|
for (const [key, value] of Object.entries(tc.want)) {
|
||||||
|
expect(got[0][key]).toBe(value)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
})
|
||||||
|
|
||||||
|
it('should throw when ports are out of range (0, 65536)', () => {
|
||||||
|
expect(() => containerPorts({ portMappings: ['65536'] })).toThrow()
|
||||||
|
expect(() => containerPorts({ portMappings: ['0'] })).toThrow()
|
||||||
|
expect(() => containerPorts({ portMappings: ['65536/udp'] })).toThrow()
|
||||||
|
expect(() => containerPorts({ portMappings: ['0/udp'] })).toThrow()
|
||||||
|
expect(() => containerPorts({ portMappings: ['1:65536'] })).toThrow()
|
||||||
|
expect(() => containerPorts({ portMappings: ['65536:1'] })).toThrow()
|
||||||
|
expect(() => containerPorts({ portMappings: ['1:65536/tcp'] })).toThrow()
|
||||||
|
expect(() => containerPorts({ portMappings: ['65536:1/tcp'] })).toThrow()
|
||||||
|
expect(() => containerPorts({ portMappings: ['1:'] })).toThrow()
|
||||||
|
expect(() => containerPorts({ portMappings: [':1'] })).toThrow()
|
||||||
|
expect(() => containerPorts({ portMappings: ['1:/tcp'] })).toThrow()
|
||||||
|
expect(() => containerPorts({ portMappings: [':1/tcp'] })).toThrow()
|
||||||
|
})
|
||||||
|
|
||||||
|
it('should throw on multi ":" splits', () => {
|
||||||
|
expect(() => containerPorts({ portMappings: ['1:1:1'] })).toThrow()
|
||||||
|
})
|
||||||
|
|
||||||
|
it('should throw on multi "/" splits', () => {
|
||||||
|
expect(() => containerPorts({ portMappings: ['1:1/tcp/udp'] })).toThrow()
|
||||||
|
expect(() => containerPorts({ portMappings: ['1/tcp/udp'] })).toThrow()
|
||||||
|
})
|
||||||
|
})
|
||||||
|
})
|
||||||
@@ -94,7 +94,9 @@ describe('Run script step', () => {
|
|||||||
runScriptStepDefinition.args.entryPoint = '/bin/bash'
|
runScriptStepDefinition.args.entryPoint = '/bin/bash'
|
||||||
runScriptStepDefinition.args.entryPointArgs = [
|
runScriptStepDefinition.args.entryPointArgs = [
|
||||||
'-c',
|
'-c',
|
||||||
`'if [[ ! $(env | grep "^PATH=") = "PATH=${runScriptStepDefinition.args.prependPath}:"* ]]; then exit 1; fi'`
|
`'if [[ ! $(env | grep "^PATH=") = "PATH=${runScriptStepDefinition.args.prependPath.join(
|
||||||
|
':'
|
||||||
|
)}:"* ]]; then exit 1; fi'`
|
||||||
]
|
]
|
||||||
|
|
||||||
await expect(
|
await expect(
|
||||||
|
|||||||
@@ -40,7 +40,7 @@ export class TestHelper {
|
|||||||
await this.createTestVolume()
|
await this.createTestVolume()
|
||||||
await this.createTestJobPod()
|
await this.createTestJobPod()
|
||||||
} catch (e) {
|
} catch (e) {
|
||||||
console.log(JSON.stringify(e))
|
console.log(e)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|||||||
@@ -1,7 +1,9 @@
|
|||||||
## Features
|
## Features
|
||||||
- Loosened the restriction on `ACTIONS_RUNNER_CLAIM_NAME` to be optional, not required for k8s hooks
|
- Always use the Docker related ENVs from the host machine instead of ENVs from the runner job [#40]
|
||||||
|
- Use user defined entrypoints for service containers (instead of `tail -f /dev/null`)
|
||||||
|
|
||||||
## Bugs
|
## Bugs
|
||||||
|
- Fixed substring issue with /github/workspace and /github/file_commands [#35]
|
||||||
|
- Fixed issue related to setting hostPort and containerPort when formatting is not recognized by k8s default [#38]
|
||||||
|
|
||||||
|
<!-- ## Misc
|
||||||
## Misc
|
|
||||||
|
|||||||
Reference in New Issue
Block a user