hydra/src/lib/Hydra/Helper/CatalystUtils.pm

427 lines
11 KiB
Perl
Raw Normal View History

package Hydra::Helper::CatalystUtils;
use utf8;
use strict;
use Exporter;
2009-03-02 10:23:40 +00:00
use Readonly;
2011-11-30 15:25:28 +01:00
use Nix::Store;
use Hydra::Helper::Nix;
our @ISA = qw(Exporter);
2009-03-02 10:23:40 +00:00
our @EXPORT = qw(
2013-02-21 13:45:11 +01:00
getBuild getPreviousBuild getNextBuild getPreviousSuccessfulBuild
searchBuildsAndEvalsForJobset
error notFound gone accessDenied badRequest
forceLogin requireUser requireProjectOwner requireRestartPrivileges requireAdmin requirePost isAdmin isProjectOwner
2019-11-05 19:24:51 +01:00
requireBumpPrivileges
2019-11-05 19:29:36 +01:00
requireCancelBuildPrivileges
trim
2014-11-19 15:22:30 +01:00
getLatestFinishedEval getFirstEval
paramToList
backToReferer
$pathCompRE $relPathRE $relNameRE $projectNameRE $jobsetNameRE $jobNameRE $systemRE $userNameRE $inputNameRE
@buildListColumns
parseJobsetName
showJobName
showStatus
getResponsibleAuthors
setCacheHeaders
2015-07-10 15:08:34 +02:00
approxTableSize
requireLocalStore
dbh
2009-03-02 10:23:40 +00:00
);
# Columns from the Builds table needed to render build lists.
Readonly our @buildListColumns => ('id', 'finished', 'timestamp', 'stoptime', 'project', 'jobset', 'job', 'nixname', 'system', 'buildstatus', 'releasename');
sub getBuild {
my ($c, $id) = @_;
my $build = $c->model('DB::Builds')->find($id);
return $build;
}
sub getPreviousBuild {
my ($build) = @_;
2010-07-27 11:21:21 +00:00
return undef if !defined $build;
# FIXME: slow
return $build->jobset->builds->search(
{ finished => 1
, system => $build->system
2013-01-22 14:41:02 +01:00
, 'me.id' => { '<' => $build->id }
, job => $build->job
, -not => { buildstatus => { -in => [4, 3]} }
}, { rows => 1, order_by => "me.id DESC" })->single;
}
sub getNextBuild {
my ($c, $build) = @_;
2010-07-27 11:21:21 +00:00
return undef if !defined $build;
(my $nextBuild) = $c->model('DB::Builds')->search(
{ finished => 1
, system => $build->system
2021-06-01 11:16:47 -04:00
, jobset_id => $build->get_column('jobset_id')
, job => $build->get_column('job')
2013-01-22 14:41:02 +01:00
, 'me.id' => { '>' => $build->id }
2011-03-14 14:05:32 +00:00
}, {rows => 1, order_by => "me.id ASC"});
2013-01-22 14:41:02 +01:00
return $nextBuild;
}
sub getPreviousSuccessfulBuild {
my ($c, $build) = @_;
2010-07-27 11:21:21 +00:00
return undef if !defined $build;
(my $prevBuild) = $c->model('DB::Builds')->search(
{ finished => 1
, system => $build->system
2021-06-01 11:16:47 -04:00
, jobset_id => $build->get_column('jobset_id')
, job => $build->get_column('job')
, buildstatus => 0
2013-01-22 14:41:02 +01:00
, 'me.id' => { '<' => $build->id }
2011-03-14 14:05:32 +00:00
}, {rows => 1, order_by => "me.id DESC"});
2013-01-22 14:41:02 +01:00
return $prevBuild;
}
sub searchBuildsAndEvalsForJobset {
my ($jobset, $condition, $maxBuilds) = @_;
my @evals = $jobset->jobsetevals->search(
{ hasnewbuilds => 1},
{ order_by => "id desc",
rows => 20
});
my $evals = {};
my %builds;
my $nrBuilds = 0;
foreach my $eval (@evals) {
my @allBuilds = $eval->builds->search(
$condition,
{ columns => ['id', 'job', 'finished', 'buildstatus'] }
);
foreach my $b (@allBuilds) {
my $jobName = $b->get_column('job');
$evals->{$eval->id}->{timestamp} = $eval->timestamp;
$evals->{$eval->id}->{builds}->{$jobName} = {
id => $b->id,
finished => $b->finished,
buildstatus => $b->buildstatus
};
$builds{$jobName} = 1;
$nrBuilds++;
}
last if $maxBuilds && $nrBuilds >= $maxBuilds;
}
return ($evals, \%builds);
}
sub error {
my ($c, $msg, $status) = @_;
$c->response->status($status) if defined $status;
$c->error($msg);
$c->detach; # doesn't return
}
2009-02-25 14:34:29 +00:00
sub notFound {
my ($c, $msg) = @_;
error($c, $msg, 404);
2009-02-25 14:34:29 +00:00
}
sub gone {
my ($c, $msg) = @_;
error($c, $msg, 410);
}
2013-10-14 18:01:04 +02:00
sub accessDenied {
my ($c, $msg) = @_;
error($c, $msg, 403);
2013-10-14 18:01:04 +02:00
}
sub badRequest {
my ($c, $msg) = @_;
error($c, $msg, 400);
}
2013-10-14 18:01:04 +02:00
sub backToReferer {
my ($c) = @_;
$c->response->redirect($c->session->{referer} || $c->uri_for('/'));
$c->session->{referer} = undef;
$c->detach;
}
2013-10-14 18:01:04 +02:00
sub forceLogin {
my ($c) = @_;
$c->session->{referer} = $c->request->uri;
accessDenied($c, "This page requires you to sign in.");
}
2013-10-14 18:01:04 +02:00
sub requireUser {
my ($c) = @_;
forceLogin($c) if !$c->user_exists;
}
2010-06-04 14:43:28 +00:00
sub isProjectOwner {
my ($c, $project) = @_;
2013-10-14 18:01:04 +02:00
return
$c->user_exists &&
(isAdmin($c) ||
$c->user->username eq $project->owner->username ||
defined $c->model('DB::ProjectMembers')->find({ project => $project, userName => $c->user->username }));
2010-06-04 14:43:28 +00:00
}
2019-11-05 19:29:36 +01:00
sub hasCancelBuildRole {
my ($c) = @_;
return $c->user_exists && $c->check_user_roles('cancel-build');
}
sub mayCancelBuild {
my ($c, $project) = @_;
return
$c->user_exists &&
(isAdmin($c) ||
hasCancelBuildRole($c) ||
isProjectOwner($c, $project));
}
sub requireCancelBuildPrivileges {
my ($c, $project) = @_;
requireUser($c);
accessDenied($c, "Only the project members, administrators, and accounts with cancel-build privileges can perform this operation.")
unless mayCancelBuild($c, $project);
}
2019-11-05 19:24:51 +01:00
sub hasBumpJobsRole {
my ($c) = @_;
return $c->user_exists && $c->check_user_roles('bump-to-front');
}
sub mayBumpJobs {
my ($c, $project) = @_;
return
$c->user_exists &&
(isAdmin($c) ||
hasBumpJobsRole($c) ||
isProjectOwner($c, $project));
}
sub requireBumpPrivileges {
my ($c, $project) = @_;
requireUser($c);
accessDenied($c, "Only the project members, administrators, and accounts with bump-to-front privileges can perform this operation.")
unless mayBumpJobs($c, $project);
}
sub hasRestartJobsRole {
my ($c) = @_;
return $c->user_exists && $c->check_user_roles('restart-jobs');
}
sub mayRestartJobs {
my ($c, $project) = @_;
return
$c->user_exists &&
(isAdmin($c) ||
hasRestartJobsRole($c) ||
isProjectOwner($c, $project));
}
sub requireRestartPrivileges {
my ($c, $project) = @_;
requireUser($c);
accessDenied($c, "Only the project members, administrators, and accounts with restart-jobs privileges can perform this operation.")
unless mayRestartJobs($c, $project);
}
sub requireProjectOwner {
my ($c, $project) = @_;
2013-10-14 18:01:04 +02:00
requireUser($c);
accessDenied($c, "Only the project members or administrators can perform this operation.")
2010-06-04 14:43:28 +00:00
unless isProjectOwner($c, $project);
}
2010-06-04 14:43:28 +00:00
sub isAdmin {
my ($c) = @_;
return $c->user_exists && $c->check_user_roles('admin');
}
sub requireAdmin {
my ($c) = @_;
2013-10-14 18:01:04 +02:00
requireUser($c);
accessDenied($c, "Only administrators can perform this operation.")
2010-06-04 14:43:28 +00:00
unless isAdmin($c);
}
sub requirePost {
my ($c) = @_;
error($c, "Request must be POSTed.") if $c->request->method ne "POST";
}
sub trim {
my $s = shift;
$s =~ s/^\s+|\s+$//g;
return $s;
}
2012-04-03 11:28:59 +02:00
sub getLatestFinishedEval {
my ($jobset) = @_;
2012-04-03 11:28:59 +02:00
my ($eval) = $jobset->jobsetevals->search(
{ hasnewbuilds => 1 },
{ order_by => "id DESC", rows => 1
, where => \ "not exists (select 1 from JobsetEvalMembers m join Builds b on m.build = b.id where m.eval = me.id and b.finished = 0)"
});
return $eval;
}
2014-11-19 15:22:30 +01:00
sub getFirstEval {
my ($build) = @_;
return $build->jobsetevals->search(
{ hasnewbuilds => 1},
{ rows => 1, order_by => ["id"] })->single;
}
# Catalyst request parameters can be an array or a scalar or
# undefined, making them annoying to handle. So this utility function
# always returns a request parameter as a list.
sub paramToList {
my ($c, $name) = @_;
my $x = $c->stash->{params}->{$name};
return () unless defined $x;
return @$x if ref($x) eq 'ARRAY';
return ($x);
}
2009-03-02 10:23:40 +00:00
# Security checking of filenames.
2013-05-27 13:01:23 +02:00
Readonly our $pathCompRE => "(?:[A-Za-z0-9-\+\._\$][A-Za-z0-9-\+\._\$:]*)";
Readonly our $relPathRE => "(?:$pathCompRE(?:/$pathCompRE)*)";
2013-06-18 16:00:24 +02:00
Readonly our $relNameRE => "(?:[A-Za-z0-9-_][A-Za-z0-9-\._]*)";
2013-01-11 12:16:21 +01:00
Readonly our $attrNameRE => "(?:[A-Za-z_][A-Za-z0-9-_]*)";
Readonly our $projectNameRE => "(?:[A-Za-z_][A-Za-z0-9-_]*)";
Readonly our $jobsetNameRE => "(?:[A-Za-z_][A-Za-z0-9-_\.]*)";
Readonly our $jobNameRE => "(?:$attrNameRE(?:\\.$attrNameRE)*)";
Readonly our $systemRE => "(?:[a-z0-9_]+-[a-z0-9_]+)";
2013-02-27 18:33:47 +01:00
Readonly our $userNameRE => "(?:[a-z][a-z0-9_\.]*)";
Readonly our $inputNameRE => "(?:[A-Za-z_][A-Za-z0-9-_]*)";
2009-03-02 10:23:40 +00:00
sub parseJobsetName {
my ($s) = @_;
Enable declarative projects. This allows fully declarative project specifications. This is best illustrated by example: * I create a new project, setting the declarative spec file to "spec.json" and the declarative input to a git repo pointing at git://github.com/shlevy/declarative-hydra-example.git * hydra creates a special ".jobsets" jobset alongside the project * Just before evaluating the ".jobsets" jobset, hydra fetches declarative-hydra-example.git, reads spec.json as a jobset spec, and updates the jobset's configuration accordingly: { "enabled": 1, "hidden": false, "description": "Jobsets", "nixexprinput": "src", "nixexprpath": "default.nix", "checkinterval": 300, "schedulingshares": 100, "enableemail": false, "emailoverride": "", "keepnr": 3, "inputs": { "src": { "type": "git", "value": "git://github.com/shlevy/declarative-hydra-example.git", "emailresponsible": false }, "nixpkgs": { "type": "git", "value": "git://github.com/NixOS/nixpkgs.git release-16.03", "emailresponsible": false } } } * When the "jobsets" job of the ".jobsets" jobset completes, hydra reads its output as a JSON representation of a dictionary of jobset specs and creates a jobset named "master" configured accordingly (In this example, this is the same configuration as .jobsets itself, except using release.nix instead of default.nix): { "enabled": 1, "hidden": false, "description": "js", "nixexprinput": "src", "nixexprpath": "release.nix", "checkinterval": 300, "schedulingshares": 100, "enableemail": false, "emailoverride": "", "keepnr": 3, "inputs": { "src": { "type": "git", "value": "git://github.com/shlevy/declarative-hydra-example.git", "emailresponsible": false }, "nixpkgs": { "type": "git", "value": "git://github.com/NixOS/nixpkgs.git release-16.03", "emailresponsible": false } } }
2016-03-11 18:14:58 -05:00
$s =~ /^($projectNameRE):(\.?$jobsetNameRE)$/ or die "invalid jobset specifier $s\n";
return ($1, $2);
}
sub showJobName {
my ($build) = @_;
return $build->get_column('project') . ":" . $build->get_column('jobset') . ":" . $build->get_column('job');
}
sub showStatus {
my ($build) = @_;
my $status = "Failed";
if ($build->buildstatus == 0) { $status = "Success"; }
elsif ($build->buildstatus == 1) { $status = "Failed"; }
elsif ($build->buildstatus == 2) { $status = "Dependency failed"; }
elsif ($build->buildstatus == 4) { $status = "Cancelled"; }
elsif ($build->buildstatus == 6) { $status = "Failed with output"; }
return $status;
}
# Determine who broke/fixed the build.
sub getResponsibleAuthors {
my ($build, $plugins) = @_;
my $prevBuild = getPreviousBuild($build);
2014-11-19 15:22:30 +01:00
return ({}, 0, []) unless $prevBuild;
my $nrCommits = 0;
my %authors;
my @emailable_authors;
2014-11-19 15:22:30 +01:00
my $prevEval = getFirstEval($prevBuild);
my $eval = getFirstEval($build);
foreach my $curInput ($eval->jobsetevalinputs) {
next unless ($curInput->type eq "git" || $curInput->type eq "hg");
my $prevInput = $prevEval->jobsetevalinputs->find({ name => $curInput->name });
next unless defined $prevInput;
next if $curInput->type ne $prevInput->type;
next if $curInput->uri ne $prevInput->uri;
next if $curInput->revision eq $prevInput->revision;
my @commits;
foreach my $plugin (@{$plugins}) {
push @commits, @{$plugin->getCommits($curInput->type, $curInput->uri, $prevInput->revision, $curInput->revision)};
}
foreach my $commit (@commits) {
#print STDERR "$commit->{revision} by $commit->{author}\n";
$authors{$commit->{author}} = $commit->{email};
my $inputSpec = $build->jobset->jobsetinputs->find({ name => $curInput->name });
push @emailable_authors, $commit->{email} if $inputSpec && $inputSpec->emailresponsible;
$nrCommits++;
}
}
return (\%authors, $nrCommits, \@emailable_authors);
}
# Set HTTP headers for the Nix binary cache.
sub setCacheHeaders {
my ($c, $expiration) = @_;
$c->response->headers->expires(time + $expiration);
delete $c->response->cookies->{hydra_session};
}
2015-07-10 15:08:34 +02:00
sub approxTableSize {
my ($c, $name) = @_;
return $c->model('DB')->schema->storage->dbh->selectrow_hashref(
"select reltuples::int from pg_class where relname = lower(?)", { }, $name)->{"reltuples"};
}
sub requireLocalStore {
my ($c) = @_;
notFound($c, "Nix channels are not supported by this Hydra server.") if !Hydra::Helper::Nix::isLocalStore();
}
sub dbh {
my ($c) = @_;
return $c->model('DB')->schema->storage->dbh;
}
1;