blob: cc1a05e2328dcdd1e62c49bbb642a39dcd06b608 [file] [log] [blame]
maruel@chromium.org9c72d4e2012-09-28 19:20:25 +00001#!/usr/bin/env python
Marc-Antoine Ruel8add1242013-11-05 17:28:27 -05002# Copyright 2012 The Swarming Authors. All rights reserved.
Marc-Antoine Ruele98b1122013-11-05 20:27:57 -05003# Use of this source code is governed under the Apache License, Version 2.0 that
4# can be found in the LICENSE file.
maruel@chromium.org9c72d4e2012-09-28 19:20:25 +00005
maruel@chromium.org0cd0b182012-10-22 13:34:15 +00006"""Reads a .isolated, creates a tree of hardlinks and runs the test.
maruel@chromium.org9c72d4e2012-09-28 19:20:25 +00007
Marc-Antoine Ruel2283ad12014-02-09 11:14:57 -05008To improve performance, it keeps a local cache. The local cache can safely be
9deleted.
10
11Any ${ISOLATED_OUTDIR} on the command line will be replaced by the location of a
12temporary directory upon execution of the command specified in the .isolated
13file. All content written to this directory will be uploaded upon termination
14and the .isolated file describing this directory will be printed to stdout.
maruel@chromium.org9c72d4e2012-09-28 19:20:25 +000015"""
16
marueleb5fbee2015-09-17 13:01:36 -070017__version__ = '0.5.1'
maruel@chromium.orgdedbf492013-09-12 20:42:11 +000018
maruel@chromium.org9c72d4e2012-09-28 19:20:25 +000019import logging
20import optparse
21import os
maruel@chromium.org9c72d4e2012-09-28 19:20:25 +000022import sys
23import tempfile
maruel@chromium.org9c72d4e2012-09-28 19:20:25 +000024
vadimsh@chromium.orga4326472013-08-24 02:05:41 +000025from third_party.depot_tools import fix_encoding
26
Vadim Shtayura6b555c12014-07-23 16:22:18 -070027from utils import file_path
Marc-Antoine Ruelf74cffe2015-07-15 15:21:34 -040028from utils import logging_utils
Marc-Antoine Ruelcfb60852014-07-02 15:22:00 -040029from utils import on_error
Marc-Antoine Ruelc44f5722015-01-08 16:10:01 -050030from utils import subprocess42
vadimsh@chromium.orga4326472013-08-24 02:05:41 +000031from utils import tools
vadimsh@chromium.org3e97deb2013-08-24 00:56:44 +000032from utils import zip_package
vadimsh@chromium.org8b9d56b2013-08-21 22:24:35 +000033
Vadim Shtayurae34e13a2014-02-02 11:23:26 -080034import auth
Marc-Antoine Ruel8bee66d2014-08-28 19:02:07 -040035import isolated_format
maruel@chromium.orgdedbf492013-09-12 20:42:11 +000036import isolateserver
maruel@chromium.orgdedbf492013-09-12 20:42:11 +000037
vadimsh@chromium.orga4326472013-08-24 02:05:41 +000038
vadimsh@chromium.org85071062013-08-21 23:37:45 +000039# Absolute path to this file (can be None if running from zip on Mac).
40THIS_FILE_PATH = os.path.abspath(__file__) if __file__ else None
vadimsh@chromium.org8b9d56b2013-08-21 22:24:35 +000041
42# Directory that contains this file (might be inside zip package).
vadimsh@chromium.org85071062013-08-21 23:37:45 +000043BASE_DIR = os.path.dirname(THIS_FILE_PATH) if __file__ else None
vadimsh@chromium.org8b9d56b2013-08-21 22:24:35 +000044
45# Directory that contains currently running script file.
maruel@chromium.org814d23f2013-10-01 19:08:00 +000046if zip_package.get_main_script_path():
47 MAIN_DIR = os.path.dirname(
48 os.path.abspath(zip_package.get_main_script_path()))
49else:
50 # This happens when 'import run_isolated' is executed at the python
51 # interactive prompt, in that case __file__ is undefined.
52 MAIN_DIR = None
vadimsh@chromium.org8b9d56b2013-08-21 22:24:35 +000053
csharp@chromium.orgff2a4662012-11-21 20:49:32 +000054# The name of the log file to use.
55RUN_ISOLATED_LOG_FILE = 'run_isolated.log'
56
csharp@chromium.orge217f302012-11-22 16:51:53 +000057# The name of the log to use for the run_test_cases.py command
vadimsh@chromium.org8b9d56b2013-08-21 22:24:35 +000058RUN_TEST_CASES_LOG = 'run_test_cases.log'
csharp@chromium.orge217f302012-11-22 16:51:53 +000059
vadimsh@chromium.org87d63262013-04-04 19:34:21 +000060
vadimsh@chromium.org8b9d56b2013-08-21 22:24:35 +000061def get_as_zip_package(executable=True):
62 """Returns ZipPackage with this module and all its dependencies.
63
64 If |executable| is True will store run_isolated.py as __main__.py so that
65 zip package is directly executable be python.
66 """
67 # Building a zip package when running from another zip package is
68 # unsupported and probably unneeded.
69 assert not zip_package.is_zipped_module(sys.modules[__name__])
vadimsh@chromium.org85071062013-08-21 23:37:45 +000070 assert THIS_FILE_PATH
71 assert BASE_DIR
vadimsh@chromium.org8b9d56b2013-08-21 22:24:35 +000072 package = zip_package.ZipPackage(root=BASE_DIR)
73 package.add_python_file(THIS_FILE_PATH, '__main__.py' if executable else None)
Marc-Antoine Ruel8bee66d2014-08-28 19:02:07 -040074 package.add_python_file(os.path.join(BASE_DIR, 'isolated_format.py'))
maruel@chromium.orgdedbf492013-09-12 20:42:11 +000075 package.add_python_file(os.path.join(BASE_DIR, 'isolateserver.py'))
Vadim Shtayurae34e13a2014-02-02 11:23:26 -080076 package.add_python_file(os.path.join(BASE_DIR, 'auth.py'))
vadimsh@chromium.org8b9d56b2013-08-21 22:24:35 +000077 package.add_directory(os.path.join(BASE_DIR, 'third_party'))
78 package.add_directory(os.path.join(BASE_DIR, 'utils'))
79 return package
80
81
Vadim Shtayuracb0b7432015-07-31 13:26:50 -070082def make_temp_dir(prefix, root_dir=None):
83 """Returns a temporary directory.
84
85 If root_dir is given and /tmp is on same file system as root_dir, uses /tmp.
86 Otherwise makes a new temp directory under root_dir.
87 """
maruel@chromium.org9c72d4e2012-09-28 19:20:25 +000088 base_temp_dir = None
Marc-Antoine Ruele4ad07e2014-10-15 20:22:29 -040089 if (root_dir and
90 not file_path.is_same_filesystem(root_dir, tempfile.gettempdir())):
Paweł Hajdan, Jrf7d58722015-04-27 14:54:42 +020091 base_temp_dir = root_dir
marueleb5fbee2015-09-17 13:01:36 -070092 return unicode(tempfile.mkdtemp(prefix=prefix, dir=base_temp_dir))
maruel@chromium.org9c72d4e2012-09-28 19:20:25 +000093
94
Marc-Antoine Ruel7124e392014-01-09 11:49:21 -050095def change_tree_read_only(rootdir, read_only):
96 """Changes the tree read-only bits according to the read_only specification.
97
98 The flag can be 0, 1 or 2, which will affect the possibility to modify files
99 and create or delete files.
100 """
101 if read_only == 2:
102 # Files and directories (except on Windows) are marked read only. This
103 # inhibits modifying, creating or deleting files in the test directory,
104 # except on Windows where creating and deleting files is still possible.
Marc-Antoine Ruele4ad07e2014-10-15 20:22:29 -0400105 file_path.make_tree_read_only(rootdir)
Marc-Antoine Ruel7124e392014-01-09 11:49:21 -0500106 elif read_only == 1:
107 # Files are marked read only but not the directories. This inhibits
108 # modifying files but creating or deleting files is still possible.
Marc-Antoine Ruele4ad07e2014-10-15 20:22:29 -0400109 file_path.make_tree_files_read_only(rootdir)
Marc-Antoine Ruel7124e392014-01-09 11:49:21 -0500110 elif read_only in (0, None):
Marc-Antoine Ruelf1d827c2014-11-24 15:22:25 -0500111 # Anything can be modified.
Marc-Antoine Ruel7124e392014-01-09 11:49:21 -0500112 # TODO(maruel): This is currently dangerous as long as DiskCache.touch()
113 # is not yet changed to verify the hash of the content of the files it is
114 # looking at, so that if a test modifies an input file, the file must be
115 # deleted.
Marc-Antoine Ruele4ad07e2014-10-15 20:22:29 -0400116 file_path.make_tree_writeable(rootdir)
Marc-Antoine Ruel7124e392014-01-09 11:49:21 -0500117 else:
118 raise ValueError(
119 'change_tree_read_only(%s, %s): Unknown flag %s' %
120 (rootdir, read_only, read_only))
121
122
Marc-Antoine Ruel2283ad12014-02-09 11:14:57 -0500123def process_command(command, out_dir):
124 """Replaces isolated specific variables in a command line."""
maruela9cfd6f2015-09-15 11:03:15 -0700125 def fix(arg):
Vadim Shtayura51aba362014-05-14 15:39:23 -0700126 if '${ISOLATED_OUTDIR}' in arg:
maruela9cfd6f2015-09-15 11:03:15 -0700127 return arg.replace('${ISOLATED_OUTDIR}', out_dir).replace('/', os.sep)
128 return arg
129
130 return [fix(arg) for arg in command]
131
132
marueleb5fbee2015-09-17 13:01:36 -0700133def run_command(command, cwd, tmp_dir):
maruela9cfd6f2015-09-15 11:03:15 -0700134 """Runs the command, returns the process exit code."""
135 logging.info('run_command(%s, %s)' % (command, cwd))
136 sys.stdout.flush()
marueleb5fbee2015-09-17 13:01:36 -0700137
138 env = os.environ.copy()
139 if sys.platform == 'darwin':
140 env['TMPDIR'] = tmp_dir.encode('ascii')
141 elif sys.platform == 'win32':
142 env['TEMP'] = tmp_dir.encode('ascii')
143 else:
144 env['TMP'] = tmp_dir.encode('ascii')
maruela9cfd6f2015-09-15 11:03:15 -0700145 with tools.Profiler('RunTest'):
146 try:
marueleb5fbee2015-09-17 13:01:36 -0700147 with subprocess42.Popen_with_handler(command, cwd=cwd, env=env) as p:
maruela9cfd6f2015-09-15 11:03:15 -0700148 p.communicate()
149 exit_code = p.returncode
150 except OSError:
151 # This is not considered to be an internal error. The executable simply
152 # does not exit.
153 exit_code = 1
154 logging.info(
155 'Command finished with exit code %d (%s)',
156 exit_code, hex(0xffffffff & exit_code))
157 return exit_code
158
159
160def delete_and_upload(storage, out_dir, leak_temp_dir):
161 """Deletes the temporary run directory and uploads results back.
162
163 Returns:
164 tuple(outputs_ref, success)
165 - outputs_ref is a dict referring to the results archived back to the
166 isolated server, if applicable.
167 - success is False if something occurred that means that the task must
168 forcibly be considered a failure, e.g. zombie processes were left behind.
169 """
170
171 # Upload out_dir and generate a .isolated file out of this directory. It is
172 # only done if files were written in the directory.
173 outputs_ref = None
174 if os.path.isdir(out_dir) and os.listdir(out_dir):
175 with tools.Profiler('ArchiveOutput'):
176 try:
177 results = isolateserver.archive_files_to_storage(
178 storage, [out_dir], None)
179 outputs_ref = {
180 'isolated': results[0][0],
181 'isolatedserver': storage.location,
182 'namespace': storage.namespace,
183 }
184 except isolateserver.Aborted:
185 # This happens when a signal SIGTERM was received while uploading data.
186 # There is 2 causes:
187 # - The task was too slow and was about to be killed anyway due to
188 # exceeding the hard timeout.
189 # - The amount of data uploaded back is very large and took too much
190 # time to archive.
191 sys.stderr.write('Received SIGTERM while uploading')
192 # Re-raise, so it will be treated as an internal failure.
193 raise
194 try:
maruel6eeea7d2015-09-16 12:17:42 -0700195 if (not leak_temp_dir and os.path.isdir(out_dir) and
196 not file_path.rmtree(out_dir)):
maruela9cfd6f2015-09-15 11:03:15 -0700197 logging.error('Had difficulties removing out_dir %s', out_dir)
198 return outputs_ref, False
199 except OSError as e:
200 # When this happens, it means there's a process error.
201 logging.error('Had difficulties removing out_dir %s: %s', out_dir, e)
202 return outputs_ref, False
203 return outputs_ref, True
204
205
marueleb5fbee2015-09-17 13:01:36 -0700206def map_and_run(
207 isolated_hash, storage, cache, leak_temp_dir, root_dir, extra_args):
maruela9cfd6f2015-09-15 11:03:15 -0700208 """Maps and run the command. Returns metadata about the result."""
209 # TODO(maruel): Include performance statistics.
210 result = {
211 'exit_code': None,
212 'internal_failure': None,
213 'outputs_ref': None,
214 'version': 1,
215 }
marueleb5fbee2015-09-17 13:01:36 -0700216 if root_dir:
217 if not os.path.isdir(root_dir):
218 os.makedirs(root_dir, 0700)
219 prefix = u''
220 else:
221 root_dir = os.path.dirname(cache.cache_dir) if cache.cache_dir else None
222 prefix = u'isolated_'
223 run_dir = make_temp_dir(prefix + u'run', root_dir)
224 out_dir = make_temp_dir(prefix + u'out', root_dir)
225 tmp_dir = make_temp_dir(prefix + u'tmp', root_dir)
maruela9cfd6f2015-09-15 11:03:15 -0700226 try:
227 bundle = isolateserver.fetch_isolated(
228 isolated_hash=isolated_hash,
229 storage=storage,
230 cache=cache,
231 outdir=run_dir,
232 require_command=True)
233
234 change_tree_read_only(run_dir, bundle.read_only)
235 cwd = os.path.normpath(os.path.join(run_dir, bundle.relative_cwd))
236 command = bundle.command + extra_args
237 file_path.ensure_command_has_abs_path(command, cwd)
marueleb5fbee2015-09-17 13:01:36 -0700238 result['exit_code'] = run_command(
239 process_command(command, out_dir), cwd, tmp_dir)
maruela9cfd6f2015-09-15 11:03:15 -0700240 except Exception as e:
241 # An internal error occured. Report accordingly so the swarming task will be
242 # retried automatically.
243 logging.error('internal failure: %s', e)
244 result['internal_failure'] = str(e)
245 on_error.report(None)
246 finally:
247 try:
248 if leak_temp_dir:
249 logging.warning(
250 'Deliberately leaking %s for later examination', run_dir)
marueleb5fbee2015-09-17 13:01:36 -0700251 else:
252 if os.path.isdir(run_dir) and not file_path.rmtree(run_dir):
253 # On Windows rmtree(run_dir) call above has a synchronization effect:
254 # it finishes only when all task child processes terminate (since a
255 # running process locks *.exe file). Examine out_dir only after that
256 # call completes (since child processes may write to out_dir too and
257 # we need to wait for them to finish).
258 print >> sys.stderr, (
259 'Failed to delete the run directory, forcibly failing\n'
260 'the task because of it. No zombie process can outlive a\n'
261 'successful task run and still be marked as successful.\n'
262 'Fix your stuff.')
263 if result['exit_code'] == 0:
264 result['exit_code'] = 1
265 if os.path.isdir(tmp_dir) and not file_path.rmtree(tmp_dir):
266 print >> sys.stderr, (
267 'Failed to delete the temporary directory, forcibly failing\n'
268 'the task because of it. No zombie process can outlive a\n'
269 'successful task run and still be marked as successful.\n'
270 'Fix your stuff.')
271 if result['exit_code'] == 0:
272 result['exit_code'] = 1
maruela9cfd6f2015-09-15 11:03:15 -0700273
marueleb5fbee2015-09-17 13:01:36 -0700274 # This deletes out_dir if leak_temp_dir is not set.
maruela9cfd6f2015-09-15 11:03:15 -0700275 result['outputs_ref'], success = delete_and_upload(
276 storage, out_dir, leak_temp_dir)
277 if not success and result['exit_code'] == 0:
278 result['exit_code'] = 1
279 except Exception as e:
280 # Swallow any exception in the main finally clause.
281 logging.error('Leaking out_dir %s: %s', out_dir, e)
282 result['internal_failure'] = str(e)
283 return result
Marc-Antoine Ruel2283ad12014-02-09 11:14:57 -0500284
285
Marc-Antoine Ruel0ec868b2015-08-12 14:12:46 -0400286def run_tha_test(
marueleb5fbee2015-09-17 13:01:36 -0700287 isolated_hash, storage, cache, leak_temp_dir, result_json, root_dir,
288 extra_args):
Marc-Antoine Ruel2283ad12014-02-09 11:14:57 -0500289 """Downloads the dependencies in the cache, hardlinks them into a temporary
290 directory and runs the executable from there.
291
292 A temporary directory is created to hold the output files. The content inside
293 this directory will be uploaded back to |storage| packaged as a .isolated
294 file.
295
296 Arguments:
Marc-Antoine Ruel35b58432014-12-08 17:40:40 -0500297 isolated_hash: the SHA-1 of the .isolated file that must be retrieved to
Marc-Antoine Ruel2283ad12014-02-09 11:14:57 -0500298 recreate the tree of files to run the target executable.
299 storage: an isolateserver.Storage object to retrieve remote objects. This
300 object has a reference to an isolateserver.StorageApi, which does
301 the actual I/O.
302 cache: an isolateserver.LocalCache to keep from retrieving the same objects
303 constantly by caching the objects retrieved. Can be on-disk or
304 in-memory.
Kenneth Russell61d42352014-09-15 11:41:16 -0700305 leak_temp_dir: if true, the temporary directory will be deliberately leaked
306 for later examination.
maruela9cfd6f2015-09-15 11:03:15 -0700307 result_json: file path to dump result metadata into. If set, the process
308 exit code is always 0 unless an internal error occured.
marueleb5fbee2015-09-17 13:01:36 -0700309 root_dir: directory to the path to use to create the temporary directory. If
310 not specified, a random temporary directory is created.
Marc-Antoine Ruel2283ad12014-02-09 11:14:57 -0500311 extra_args: optional arguments to add to the command stated in the .isolate
312 file.
maruela9cfd6f2015-09-15 11:03:15 -0700313
314 Returns:
315 Process exit code that should be used.
maruel@chromium.org9c72d4e2012-09-28 19:20:25 +0000316 """
maruela9cfd6f2015-09-15 11:03:15 -0700317 # run_isolated exit code. Depends on if result_json is used or not.
318 result = map_and_run(
marueleb5fbee2015-09-17 13:01:36 -0700319 isolated_hash, storage, cache, leak_temp_dir, root_dir, extra_args)
maruela9cfd6f2015-09-15 11:03:15 -0700320 logging.info('Result:\n%s', tools.format_json(result, dense=True))
321 if result_json:
322 tools.write_json(result_json, result, dense=True)
323 # Only return 1 if there was an internal error.
324 return int(bool(result['internal_failure']))
maruel@chromium.org781ccf62013-09-17 19:39:47 +0000325
maruela9cfd6f2015-09-15 11:03:15 -0700326 # Marshall into old-style inline output.
327 if result['outputs_ref']:
328 data = {
329 'hash': result['outputs_ref']['isolated'],
330 'namespace': result['outputs_ref']['namespace'],
331 'storage': result['outputs_ref']['isolatedserver'],
332 }
Marc-Antoine Ruelc44f5722015-01-08 16:10:01 -0500333 sys.stdout.flush()
maruela9cfd6f2015-09-15 11:03:15 -0700334 print(
335 '[run_isolated_out_hack]%s[/run_isolated_out_hack]' %
336 tools.format_json(data, dense=True))
337 return result['exit_code'] or int(bool(result['internal_failure']))
maruel@chromium.org9c72d4e2012-09-28 19:20:25 +0000338
339
Marc-Antoine Ruel90c98162013-12-18 15:11:57 -0500340def main(args):
vadimsh@chromium.orga4326472013-08-24 02:05:41 +0000341 tools.disable_buffering()
Marc-Antoine Ruelf74cffe2015-07-15 15:21:34 -0400342 parser = logging_utils.OptionParserWithLogging(
maruel@chromium.orgdedbf492013-09-12 20:42:11 +0000343 usage='%prog <options>',
344 version=__version__,
345 log_file=RUN_ISOLATED_LOG_FILE)
maruela9cfd6f2015-09-15 11:03:15 -0700346 parser.add_option(
347 '--json',
348 help='dump output metadata to json file. When used, run_isolated returns '
349 'non-zero only on internal failure')
Marc-Antoine Ruel1687b5e2014-02-06 17:47:53 -0500350 data_group = optparse.OptionGroup(parser, 'Data source')
351 data_group.add_option(
Marc-Antoine Ruel185ded42015-01-28 20:49:18 -0500352 '-s', '--isolated',
353 help='Hash of the .isolated to grab from the isolate server')
Marc-Antoine Ruelf7d737d2014-12-10 15:36:29 -0500354 isolateserver.add_isolate_server_options(data_group)
Marc-Antoine Ruel1687b5e2014-02-06 17:47:53 -0500355 parser.add_option_group(data_group)
maruel@chromium.org9c72d4e2012-09-28 19:20:25 +0000356
Marc-Antoine Ruela57d7db2014-10-15 20:31:19 -0400357 isolateserver.add_cache_options(parser)
358 parser.set_defaults(cache='cache')
maruel@chromium.org9c72d4e2012-09-28 19:20:25 +0000359
Kenneth Russell61d42352014-09-15 11:41:16 -0700360 debug_group = optparse.OptionGroup(parser, 'Debugging')
361 debug_group.add_option(
362 '--leak-temp-dir',
363 action='store_true',
364 help='Deliberately leak isolate\'s temp dir for later examination '
365 '[default: %default]')
marueleb5fbee2015-09-17 13:01:36 -0700366 debug_group.add_option(
367 '--root-dir', help='Use a directory instead of a random one')
Kenneth Russell61d42352014-09-15 11:41:16 -0700368 parser.add_option_group(debug_group)
369
Vadim Shtayurae34e13a2014-02-02 11:23:26 -0800370 auth.add_auth_options(parser)
Marc-Antoine Ruel90c98162013-12-18 15:11:57 -0500371 options, args = parser.parse_args(args)
Marc-Antoine Ruel185ded42015-01-28 20:49:18 -0500372 if not options.isolated:
373 parser.error('--isolated is required.')
Vadim Shtayura5d1efce2014-02-04 10:55:43 -0800374 auth.process_auth_options(parser, options)
Marc-Antoine Ruele290ada2014-12-10 19:48:49 -0500375 isolateserver.process_isolate_server_options(parser, options, True)
maruel@chromium.org9c72d4e2012-09-28 19:20:25 +0000376
Marc-Antoine Ruela57d7db2014-10-15 20:31:19 -0400377 cache = isolateserver.process_cache_options(options)
Marc-Antoine Ruelf7d737d2014-12-10 15:36:29 -0500378 with isolateserver.get_storage(
379 options.isolate_server, options.namespace) as storage:
Marc-Antoine Ruelcfb60852014-07-02 15:22:00 -0400380 # Hashing schemes used by |storage| and |cache| MUST match.
381 assert storage.hash_algo == cache.hash_algo
382 return run_tha_test(
Marc-Antoine Ruel0ec868b2015-08-12 14:12:46 -0400383 options.isolated, storage, cache, options.leak_temp_dir, options.json,
marueleb5fbee2015-09-17 13:01:36 -0700384 options.root_dir, args)
maruel@chromium.org9c72d4e2012-09-28 19:20:25 +0000385
386
387if __name__ == '__main__':
csharp@chromium.orgbfb98742013-03-26 20:28:36 +0000388 # Ensure that we are always running with the correct encoding.
vadimsh@chromium.orga4326472013-08-24 02:05:41 +0000389 fix_encoding.fix_encoding()
Marc-Antoine Ruel90c98162013-12-18 15:11:57 -0500390 sys.exit(main(sys.argv[1:]))