2020-02-04 18:38:41 -06:00
|
|
|
package runner
|
|
|
|
|
|
|
|
import (
|
2020-02-11 11:10:35 -06:00
|
|
|
"context"
|
2020-02-17 12:25:28 -06:00
|
|
|
"fmt"
|
2022-10-29 12:15:38 -05:00
|
|
|
"os"
|
2021-05-04 16:50:35 -05:00
|
|
|
"path/filepath"
|
|
|
|
"regexp"
|
|
|
|
"runtime"
|
|
|
|
"strings"
|
2022-05-24 09:52:25 -05:00
|
|
|
"time"
|
2020-02-04 18:38:41 -06:00
|
|
|
|
2022-03-22 14:26:10 -05:00
|
|
|
log "github.com/sirupsen/logrus"
|
|
|
|
|
2020-02-04 18:38:41 -06:00
|
|
|
"github.com/nektos/act/pkg/common"
|
2022-03-22 14:26:10 -05:00
|
|
|
"github.com/nektos/act/pkg/container"
|
2020-02-04 18:38:41 -06:00
|
|
|
"github.com/nektos/act/pkg/model"
|
|
|
|
)
|
|
|
|
|
|
|
|
// Runner provides capabilities to run GitHub actions
|
|
|
|
type Runner interface {
|
2020-02-07 00:17:58 -06:00
|
|
|
NewPlanExecutor(plan *model.Plan) common.Executor
|
2020-02-04 18:38:41 -06:00
|
|
|
}
|
|
|
|
|
|
|
|
// Config contains the config for a new runner
|
|
|
|
type Config struct {
|
2022-06-21 08:52:21 -05:00
|
|
|
Actor string // the user that triggered the event
|
|
|
|
Workdir string // path to working directory
|
|
|
|
BindWorkdir bool // bind the workdir to the job container
|
|
|
|
EventName string // name of event to run
|
|
|
|
EventPath string // path to JSON file to use for event.json in containers
|
|
|
|
DefaultBranch string // name of the main branch for this repository
|
|
|
|
ReuseContainers bool // reuse containers to maintain state
|
|
|
|
ForcePull bool // force pulling of the image, even if already present
|
|
|
|
ForceRebuild bool // force rebuilding local docker image action
|
|
|
|
LogOutput bool // log the output from docker run
|
|
|
|
JSONLogger bool // use json or text logger
|
|
|
|
Env map[string]string // env for containers
|
|
|
|
Secrets map[string]string // list of secrets
|
|
|
|
Token string // GitHub token
|
|
|
|
InsecureSecrets bool // switch hiding output when printing to terminal
|
|
|
|
Platforms map[string]string // list of platforms
|
|
|
|
Privileged bool // use privileged mode
|
|
|
|
UsernsMode string // user namespace to use
|
|
|
|
ContainerArchitecture string // Desired OS/architecture platform for running containers
|
|
|
|
ContainerDaemonSocket string // Path to Docker daemon socket
|
|
|
|
UseGitIgnore bool // controls if paths in .gitignore should not be copied into container, default true
|
|
|
|
GitHubInstance string // GitHub instance to use, default "github.com"
|
|
|
|
ContainerCapAdd []string // list of kernel capabilities to add to the containers
|
|
|
|
ContainerCapDrop []string // list of kernel capabilities to remove from the containers
|
|
|
|
AutoRemove bool // controls if the container is automatically removed upon workflow completion
|
|
|
|
ArtifactServerPath string // the path where the artifact server stores uploads
|
|
|
|
ArtifactServerPort string // the port the artifact server binds to
|
|
|
|
NoSkipCheckout bool // do not skip actions/checkout
|
|
|
|
RemoteName string // remote name in local git repo config
|
|
|
|
ReplaceGheActionWithGithubCom []string // Use actions from GitHub Enterprise instance to GitHub
|
|
|
|
ReplaceGheActionTokenWithGithubCom string // Token of private action repo on GitHub.
|
2020-02-04 18:38:41 -06:00
|
|
|
}
|
|
|
|
|
2021-05-04 16:50:35 -05:00
|
|
|
// Resolves the equivalent host path inside the container
|
|
|
|
// This is required for windows and WSL 2 to translate things like C:\Users\Myproject to /mnt/users/Myproject
|
|
|
|
// For use in docker volumes and binds
|
|
|
|
func (config *Config) containerPath(path string) string {
|
|
|
|
if runtime.GOOS == "windows" && strings.Contains(path, "/") {
|
|
|
|
log.Error("You cannot specify linux style local paths (/mnt/etc) on Windows as it does not understand them.")
|
|
|
|
return ""
|
|
|
|
}
|
|
|
|
|
|
|
|
abspath, err := filepath.Abs(path)
|
|
|
|
if err != nil {
|
|
|
|
log.Error(err)
|
|
|
|
return ""
|
|
|
|
}
|
|
|
|
|
|
|
|
// Test if the path is a windows path
|
|
|
|
windowsPathRegex := regexp.MustCompile(`^([a-zA-Z]):\\(.+)$`)
|
|
|
|
windowsPathComponents := windowsPathRegex.FindStringSubmatch(abspath)
|
|
|
|
|
|
|
|
// Return as-is if no match
|
|
|
|
if windowsPathComponents == nil {
|
|
|
|
return abspath
|
|
|
|
}
|
|
|
|
|
|
|
|
// Convert to WSL2-compatible path if it is a windows path
|
|
|
|
// NOTE: Cannot use filepath because it will use the wrong path separators assuming we want the path to be windows
|
|
|
|
// based if running on Windows, and because we are feeding this to Docker, GoLang auto-path-translate doesn't work.
|
|
|
|
driveLetter := strings.ToLower(windowsPathComponents[1])
|
|
|
|
translatedPath := strings.ReplaceAll(windowsPathComponents[2], `\`, `/`)
|
|
|
|
// Should make something like /mnt/c/Users/person/My Folder/MyActProject
|
|
|
|
result := strings.Join([]string{"/mnt", driveLetter, translatedPath}, `/`)
|
|
|
|
return result
|
|
|
|
}
|
|
|
|
|
|
|
|
// Resolves the equivalent host path inside the container
|
|
|
|
// This is required for windows and WSL 2 to translate things like C:\Users\Myproject to /mnt/users/Myproject
|
|
|
|
func (config *Config) ContainerWorkdir() string {
|
|
|
|
return config.containerPath(config.Workdir)
|
|
|
|
}
|
|
|
|
|
2020-02-04 18:38:41 -06:00
|
|
|
type runnerImpl struct {
|
|
|
|
config *Config
|
|
|
|
eventJSON string
|
|
|
|
}
|
|
|
|
|
2020-02-07 00:17:58 -06:00
|
|
|
// New Creates a new Runner
|
|
|
|
func New(runnerConfig *Config) (Runner, error) {
|
2020-02-04 18:38:41 -06:00
|
|
|
runner := &runnerImpl{
|
|
|
|
config: runnerConfig,
|
|
|
|
}
|
|
|
|
|
|
|
|
runner.eventJSON = "{}"
|
2020-02-07 00:17:58 -06:00
|
|
|
if runnerConfig.EventPath != "" {
|
2020-02-04 18:38:41 -06:00
|
|
|
log.Debugf("Reading event.json from %s", runner.config.EventPath)
|
2022-10-29 12:15:38 -05:00
|
|
|
eventJSONBytes, err := os.ReadFile(runner.config.EventPath)
|
2020-02-04 18:38:41 -06:00
|
|
|
if err != nil {
|
2020-02-07 00:17:58 -06:00
|
|
|
return nil, err
|
2020-02-04 18:38:41 -06:00
|
|
|
}
|
|
|
|
runner.eventJSON = string(eventJSONBytes)
|
|
|
|
}
|
2020-02-07 00:17:58 -06:00
|
|
|
return runner, nil
|
2020-02-04 18:38:41 -06:00
|
|
|
}
|
|
|
|
|
2022-03-30 12:20:45 -05:00
|
|
|
// NewPlanExecutor ...
|
2022-10-05 17:13:00 -05:00
|
|
|
//
|
2022-03-30 12:20:45 -05:00
|
|
|
//nolint:gocyclo
|
2020-02-07 00:17:58 -06:00
|
|
|
func (runner *runnerImpl) NewPlanExecutor(plan *model.Plan) common.Executor {
|
2020-02-27 01:29:43 -06:00
|
|
|
maxJobNameLen := 0
|
2020-02-17 12:25:28 -06:00
|
|
|
|
2022-02-15 10:35:02 -06:00
|
|
|
stagePipeline := make([]common.Executor, 0)
|
|
|
|
for i := range plan.Stages {
|
|
|
|
s := i
|
|
|
|
stage := plan.Stages[i]
|
|
|
|
stagePipeline = append(stagePipeline, func(ctx context.Context) error {
|
|
|
|
pipeline := make([]common.Executor, 0)
|
|
|
|
for r, run := range stage.Runs {
|
2022-02-25 12:47:16 -06:00
|
|
|
stageExecutor := make([]common.Executor, 0)
|
2022-02-15 10:35:02 -06:00
|
|
|
job := run.Job()
|
2022-03-30 12:20:45 -05:00
|
|
|
|
|
|
|
if job.Uses != "" {
|
|
|
|
return fmt.Errorf("reusable workflows are currently not supported (see https://github.com/nektos/act/issues/826 for updates)")
|
|
|
|
}
|
|
|
|
|
2022-02-15 10:35:02 -06:00
|
|
|
if job.Strategy != nil {
|
2022-06-17 10:55:21 -05:00
|
|
|
strategyRc := runner.newRunContext(ctx, run, nil)
|
|
|
|
if err := strategyRc.NewExpressionEvaluator(ctx).EvaluateYamlNode(ctx, &job.Strategy.RawMatrix); err != nil {
|
2022-02-15 10:35:02 -06:00
|
|
|
log.Errorf("Error while evaluating matrix: %v", err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
matrixes := job.GetMatrixes()
|
|
|
|
maxParallel := 4
|
|
|
|
if job.Strategy != nil {
|
|
|
|
maxParallel = job.Strategy.MaxParallel
|
2020-02-27 01:29:43 -06:00
|
|
|
}
|
2022-02-15 10:35:02 -06:00
|
|
|
|
|
|
|
if len(matrixes) < maxParallel {
|
|
|
|
maxParallel = len(matrixes)
|
2020-02-27 01:29:43 -06:00
|
|
|
}
|
2022-02-15 10:35:02 -06:00
|
|
|
|
|
|
|
for i, matrix := range matrixes {
|
2022-10-05 17:13:00 -05:00
|
|
|
matrix := matrix
|
2022-06-17 10:55:21 -05:00
|
|
|
rc := runner.newRunContext(ctx, run, matrix)
|
2022-02-15 10:35:02 -06:00
|
|
|
rc.JobName = rc.Name
|
|
|
|
if len(matrixes) > 1 {
|
|
|
|
rc.Name = fmt.Sprintf("%s-%d", rc.Name, i+1)
|
|
|
|
}
|
2022-06-08 10:25:51 -05:00
|
|
|
// evaluate environment variables since they can contain
|
|
|
|
// GitHub's special environment variables.
|
|
|
|
for k, v := range rc.GetEnv() {
|
2022-07-27 14:46:04 -05:00
|
|
|
rc.Env[k] = rc.ExprEval.Interpolate(ctx, v)
|
2022-06-08 10:25:51 -05:00
|
|
|
}
|
2022-02-15 10:35:02 -06:00
|
|
|
if len(rc.String()) > maxJobNameLen {
|
|
|
|
maxJobNameLen = len(rc.String())
|
|
|
|
}
|
|
|
|
stageExecutor = append(stageExecutor, func(ctx context.Context) error {
|
2022-06-17 10:55:21 -05:00
|
|
|
logger := common.Logger(ctx)
|
2022-02-15 10:35:02 -06:00
|
|
|
jobName := fmt.Sprintf("%-*s", maxJobNameLen, rc.String())
|
|
|
|
return rc.Executor().Finally(func(ctx context.Context) error {
|
|
|
|
isLastRunningContainer := func(currentStage int, currentRun int) bool {
|
|
|
|
return currentStage == len(plan.Stages)-1 && currentRun == len(stage.Runs)-1
|
|
|
|
}
|
|
|
|
|
|
|
|
if runner.config.AutoRemove && isLastRunningContainer(s, r) {
|
2022-05-24 09:52:25 -05:00
|
|
|
var cancel context.CancelFunc
|
|
|
|
if ctx.Err() == context.Canceled {
|
|
|
|
ctx, cancel = context.WithTimeout(context.Background(), 5*time.Minute)
|
|
|
|
defer cancel()
|
|
|
|
}
|
|
|
|
|
2022-02-15 10:35:02 -06:00
|
|
|
log.Infof("Cleaning up container for job %s", rc.JobName)
|
2022-05-24 09:52:25 -05:00
|
|
|
|
2022-02-15 10:35:02 -06:00
|
|
|
if err := rc.stopJobContainer()(ctx); err != nil {
|
2022-06-17 10:55:21 -05:00
|
|
|
logger.Errorf("Error while cleaning container: %v", err)
|
2022-02-15 10:35:02 -06:00
|
|
|
}
|
2021-06-10 10:09:05 -05:00
|
|
|
}
|
2022-02-15 10:35:02 -06:00
|
|
|
|
|
|
|
return nil
|
2022-09-27 10:49:22 -05:00
|
|
|
})(common.WithJobErrorContainer(WithJobLogger(ctx, rc.Run.JobID, jobName, rc.Config, &rc.Masks, matrix)))
|
2022-02-15 10:35:02 -06:00
|
|
|
})
|
2021-09-26 11:21:12 -05:00
|
|
|
}
|
2022-02-25 12:47:16 -06:00
|
|
|
pipeline = append(pipeline, common.NewParallelExecutor(maxParallel, stageExecutor...))
|
2020-02-17 12:11:16 -06:00
|
|
|
}
|
2022-03-22 14:26:10 -05:00
|
|
|
var ncpu int
|
|
|
|
info, err := container.GetHostInfo(ctx)
|
|
|
|
if err != nil {
|
|
|
|
log.Errorf("failed to obtain container engine info: %s", err)
|
|
|
|
ncpu = 1 // sane default?
|
|
|
|
} else {
|
|
|
|
ncpu = info.NCPU
|
|
|
|
}
|
|
|
|
return common.NewParallelExecutor(ncpu, pipeline...)(ctx)
|
2022-02-15 10:35:02 -06:00
|
|
|
})
|
2020-02-04 18:38:41 -06:00
|
|
|
}
|
|
|
|
|
2022-02-15 10:35:02 -06:00
|
|
|
return common.NewPipelineExecutor(stagePipeline...).Then(handleFailure(plan))
|
2021-12-08 14:57:42 -06:00
|
|
|
}
|
|
|
|
|
|
|
|
func handleFailure(plan *model.Plan) common.Executor {
|
|
|
|
return func(ctx context.Context) error {
|
|
|
|
for _, stage := range plan.Stages {
|
|
|
|
for _, run := range stage.Runs {
|
|
|
|
if run.Job().Result == "failure" {
|
|
|
|
return fmt.Errorf("Job '%s' failed", run.String())
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
2020-02-04 18:38:41 -06:00
|
|
|
}
|
|
|
|
|
2022-06-17 10:55:21 -05:00
|
|
|
func (runner *runnerImpl) newRunContext(ctx context.Context, run *model.Run, matrix map[string]interface{}) *RunContext {
|
2020-02-23 17:01:25 -06:00
|
|
|
rc := &RunContext{
|
|
|
|
Config: runner.config,
|
|
|
|
Run: run,
|
|
|
|
EventJSON: runner.eventJSON,
|
2021-12-22 13:52:09 -06:00
|
|
|
StepResults: make(map[string]*model.StepResult),
|
2020-02-23 17:01:25 -06:00
|
|
|
Matrix: matrix,
|
2020-02-17 12:11:16 -06:00
|
|
|
}
|
2022-06-17 10:55:21 -05:00
|
|
|
rc.ExprEval = rc.NewExpressionEvaluator(ctx)
|
|
|
|
rc.Name = rc.ExprEval.Interpolate(ctx, run.String())
|
2020-02-27 01:29:43 -06:00
|
|
|
return rc
|
2020-02-04 18:38:41 -06:00
|
|
|
}
|