maruel@chromium.org | 9c72d4e | 2012-09-28 19:20:25 +0000 | [diff] [blame] | 1 | #!/usr/bin/env python |
Marc-Antoine Ruel | 8add124 | 2013-11-05 17:28:27 -0500 | [diff] [blame] | 2 | # Copyright 2012 The Swarming Authors. All rights reserved. |
Marc-Antoine Ruel | e98b112 | 2013-11-05 20:27:57 -0500 | [diff] [blame] | 3 | # Use of this source code is governed under the Apache License, Version 2.0 that |
| 4 | # can be found in the LICENSE file. |
maruel@chromium.org | 9c72d4e | 2012-09-28 19:20:25 +0000 | [diff] [blame] | 5 | |
maruel@chromium.org | 0cd0b18 | 2012-10-22 13:34:15 +0000 | [diff] [blame] | 6 | """Reads a .isolated, creates a tree of hardlinks and runs the test. |
maruel@chromium.org | 9c72d4e | 2012-09-28 19:20:25 +0000 | [diff] [blame] | 7 | |
Marc-Antoine Ruel | 2283ad1 | 2014-02-09 11:14:57 -0500 | [diff] [blame] | 8 | To improve performance, it keeps a local cache. The local cache can safely be |
| 9 | deleted. |
| 10 | |
| 11 | Any ${ISOLATED_OUTDIR} on the command line will be replaced by the location of a |
| 12 | temporary directory upon execution of the command specified in the .isolated |
| 13 | file. All content written to this directory will be uploaded upon termination |
| 14 | and the .isolated file describing this directory will be printed to stdout. |
maruel@chromium.org | 9c72d4e | 2012-09-28 19:20:25 +0000 | [diff] [blame] | 15 | """ |
| 16 | |
maruel | eb5fbee | 2015-09-17 13:01:36 -0700 | [diff] [blame^] | 17 | __version__ = '0.5.1' |
maruel@chromium.org | dedbf49 | 2013-09-12 20:42:11 +0000 | [diff] [blame] | 18 | |
maruel@chromium.org | 9c72d4e | 2012-09-28 19:20:25 +0000 | [diff] [blame] | 19 | import logging |
| 20 | import optparse |
| 21 | import os |
maruel@chromium.org | 9c72d4e | 2012-09-28 19:20:25 +0000 | [diff] [blame] | 22 | import sys |
| 23 | import tempfile |
maruel@chromium.org | 9c72d4e | 2012-09-28 19:20:25 +0000 | [diff] [blame] | 24 | |
vadimsh@chromium.org | a432647 | 2013-08-24 02:05:41 +0000 | [diff] [blame] | 25 | from third_party.depot_tools import fix_encoding |
| 26 | |
Vadim Shtayura | 6b555c1 | 2014-07-23 16:22:18 -0700 | [diff] [blame] | 27 | from utils import file_path |
Marc-Antoine Ruel | f74cffe | 2015-07-15 15:21:34 -0400 | [diff] [blame] | 28 | from utils import logging_utils |
Marc-Antoine Ruel | cfb6085 | 2014-07-02 15:22:00 -0400 | [diff] [blame] | 29 | from utils import on_error |
Marc-Antoine Ruel | c44f572 | 2015-01-08 16:10:01 -0500 | [diff] [blame] | 30 | from utils import subprocess42 |
vadimsh@chromium.org | a432647 | 2013-08-24 02:05:41 +0000 | [diff] [blame] | 31 | from utils import tools |
vadimsh@chromium.org | 3e97deb | 2013-08-24 00:56:44 +0000 | [diff] [blame] | 32 | from utils import zip_package |
vadimsh@chromium.org | 8b9d56b | 2013-08-21 22:24:35 +0000 | [diff] [blame] | 33 | |
Vadim Shtayura | e34e13a | 2014-02-02 11:23:26 -0800 | [diff] [blame] | 34 | import auth |
Marc-Antoine Ruel | 8bee66d | 2014-08-28 19:02:07 -0400 | [diff] [blame] | 35 | import isolated_format |
maruel@chromium.org | dedbf49 | 2013-09-12 20:42:11 +0000 | [diff] [blame] | 36 | import isolateserver |
maruel@chromium.org | dedbf49 | 2013-09-12 20:42:11 +0000 | [diff] [blame] | 37 | |
vadimsh@chromium.org | a432647 | 2013-08-24 02:05:41 +0000 | [diff] [blame] | 38 | |
vadimsh@chromium.org | 8507106 | 2013-08-21 23:37:45 +0000 | [diff] [blame] | 39 | # Absolute path to this file (can be None if running from zip on Mac). |
| 40 | THIS_FILE_PATH = os.path.abspath(__file__) if __file__ else None |
vadimsh@chromium.org | 8b9d56b | 2013-08-21 22:24:35 +0000 | [diff] [blame] | 41 | |
| 42 | # Directory that contains this file (might be inside zip package). |
vadimsh@chromium.org | 8507106 | 2013-08-21 23:37:45 +0000 | [diff] [blame] | 43 | BASE_DIR = os.path.dirname(THIS_FILE_PATH) if __file__ else None |
vadimsh@chromium.org | 8b9d56b | 2013-08-21 22:24:35 +0000 | [diff] [blame] | 44 | |
| 45 | # Directory that contains currently running script file. |
maruel@chromium.org | 814d23f | 2013-10-01 19:08:00 +0000 | [diff] [blame] | 46 | if zip_package.get_main_script_path(): |
| 47 | MAIN_DIR = os.path.dirname( |
| 48 | os.path.abspath(zip_package.get_main_script_path())) |
| 49 | else: |
| 50 | # This happens when 'import run_isolated' is executed at the python |
| 51 | # interactive prompt, in that case __file__ is undefined. |
| 52 | MAIN_DIR = None |
vadimsh@chromium.org | 8b9d56b | 2013-08-21 22:24:35 +0000 | [diff] [blame] | 53 | |
csharp@chromium.org | ff2a466 | 2012-11-21 20:49:32 +0000 | [diff] [blame] | 54 | # The name of the log file to use. |
| 55 | RUN_ISOLATED_LOG_FILE = 'run_isolated.log' |
| 56 | |
csharp@chromium.org | e217f30 | 2012-11-22 16:51:53 +0000 | [diff] [blame] | 57 | # The name of the log to use for the run_test_cases.py command |
vadimsh@chromium.org | 8b9d56b | 2013-08-21 22:24:35 +0000 | [diff] [blame] | 58 | RUN_TEST_CASES_LOG = 'run_test_cases.log' |
csharp@chromium.org | e217f30 | 2012-11-22 16:51:53 +0000 | [diff] [blame] | 59 | |
vadimsh@chromium.org | 87d6326 | 2013-04-04 19:34:21 +0000 | [diff] [blame] | 60 | |
vadimsh@chromium.org | 8b9d56b | 2013-08-21 22:24:35 +0000 | [diff] [blame] | 61 | def get_as_zip_package(executable=True): |
| 62 | """Returns ZipPackage with this module and all its dependencies. |
| 63 | |
| 64 | If |executable| is True will store run_isolated.py as __main__.py so that |
| 65 | zip package is directly executable be python. |
| 66 | """ |
| 67 | # Building a zip package when running from another zip package is |
| 68 | # unsupported and probably unneeded. |
| 69 | assert not zip_package.is_zipped_module(sys.modules[__name__]) |
vadimsh@chromium.org | 8507106 | 2013-08-21 23:37:45 +0000 | [diff] [blame] | 70 | assert THIS_FILE_PATH |
| 71 | assert BASE_DIR |
vadimsh@chromium.org | 8b9d56b | 2013-08-21 22:24:35 +0000 | [diff] [blame] | 72 | package = zip_package.ZipPackage(root=BASE_DIR) |
| 73 | package.add_python_file(THIS_FILE_PATH, '__main__.py' if executable else None) |
Marc-Antoine Ruel | 8bee66d | 2014-08-28 19:02:07 -0400 | [diff] [blame] | 74 | package.add_python_file(os.path.join(BASE_DIR, 'isolated_format.py')) |
maruel@chromium.org | dedbf49 | 2013-09-12 20:42:11 +0000 | [diff] [blame] | 75 | package.add_python_file(os.path.join(BASE_DIR, 'isolateserver.py')) |
Vadim Shtayura | e34e13a | 2014-02-02 11:23:26 -0800 | [diff] [blame] | 76 | package.add_python_file(os.path.join(BASE_DIR, 'auth.py')) |
vadimsh@chromium.org | 8b9d56b | 2013-08-21 22:24:35 +0000 | [diff] [blame] | 77 | package.add_directory(os.path.join(BASE_DIR, 'third_party')) |
| 78 | package.add_directory(os.path.join(BASE_DIR, 'utils')) |
| 79 | return package |
| 80 | |
| 81 | |
Vadim Shtayura | cb0b743 | 2015-07-31 13:26:50 -0700 | [diff] [blame] | 82 | def make_temp_dir(prefix, root_dir=None): |
| 83 | """Returns a temporary directory. |
| 84 | |
| 85 | If root_dir is given and /tmp is on same file system as root_dir, uses /tmp. |
| 86 | Otherwise makes a new temp directory under root_dir. |
| 87 | """ |
maruel@chromium.org | 9c72d4e | 2012-09-28 19:20:25 +0000 | [diff] [blame] | 88 | base_temp_dir = None |
Marc-Antoine Ruel | e4ad07e | 2014-10-15 20:22:29 -0400 | [diff] [blame] | 89 | if (root_dir and |
| 90 | not file_path.is_same_filesystem(root_dir, tempfile.gettempdir())): |
Paweł Hajdan, Jr | f7d5872 | 2015-04-27 14:54:42 +0200 | [diff] [blame] | 91 | base_temp_dir = root_dir |
maruel | eb5fbee | 2015-09-17 13:01:36 -0700 | [diff] [blame^] | 92 | return unicode(tempfile.mkdtemp(prefix=prefix, dir=base_temp_dir)) |
maruel@chromium.org | 9c72d4e | 2012-09-28 19:20:25 +0000 | [diff] [blame] | 93 | |
| 94 | |
Marc-Antoine Ruel | 7124e39 | 2014-01-09 11:49:21 -0500 | [diff] [blame] | 95 | def change_tree_read_only(rootdir, read_only): |
| 96 | """Changes the tree read-only bits according to the read_only specification. |
| 97 | |
| 98 | The flag can be 0, 1 or 2, which will affect the possibility to modify files |
| 99 | and create or delete files. |
| 100 | """ |
| 101 | if read_only == 2: |
| 102 | # Files and directories (except on Windows) are marked read only. This |
| 103 | # inhibits modifying, creating or deleting files in the test directory, |
| 104 | # except on Windows where creating and deleting files is still possible. |
Marc-Antoine Ruel | e4ad07e | 2014-10-15 20:22:29 -0400 | [diff] [blame] | 105 | file_path.make_tree_read_only(rootdir) |
Marc-Antoine Ruel | 7124e39 | 2014-01-09 11:49:21 -0500 | [diff] [blame] | 106 | elif read_only == 1: |
| 107 | # Files are marked read only but not the directories. This inhibits |
| 108 | # modifying files but creating or deleting files is still possible. |
Marc-Antoine Ruel | e4ad07e | 2014-10-15 20:22:29 -0400 | [diff] [blame] | 109 | file_path.make_tree_files_read_only(rootdir) |
Marc-Antoine Ruel | 7124e39 | 2014-01-09 11:49:21 -0500 | [diff] [blame] | 110 | elif read_only in (0, None): |
Marc-Antoine Ruel | f1d827c | 2014-11-24 15:22:25 -0500 | [diff] [blame] | 111 | # Anything can be modified. |
Marc-Antoine Ruel | 7124e39 | 2014-01-09 11:49:21 -0500 | [diff] [blame] | 112 | # TODO(maruel): This is currently dangerous as long as DiskCache.touch() |
| 113 | # is not yet changed to verify the hash of the content of the files it is |
| 114 | # looking at, so that if a test modifies an input file, the file must be |
| 115 | # deleted. |
Marc-Antoine Ruel | e4ad07e | 2014-10-15 20:22:29 -0400 | [diff] [blame] | 116 | file_path.make_tree_writeable(rootdir) |
Marc-Antoine Ruel | 7124e39 | 2014-01-09 11:49:21 -0500 | [diff] [blame] | 117 | else: |
| 118 | raise ValueError( |
| 119 | 'change_tree_read_only(%s, %s): Unknown flag %s' % |
| 120 | (rootdir, read_only, read_only)) |
| 121 | |
| 122 | |
Marc-Antoine Ruel | 2283ad1 | 2014-02-09 11:14:57 -0500 | [diff] [blame] | 123 | def process_command(command, out_dir): |
| 124 | """Replaces isolated specific variables in a command line.""" |
maruel | a9cfd6f | 2015-09-15 11:03:15 -0700 | [diff] [blame] | 125 | def fix(arg): |
Vadim Shtayura | 51aba36 | 2014-05-14 15:39:23 -0700 | [diff] [blame] | 126 | if '${ISOLATED_OUTDIR}' in arg: |
maruel | a9cfd6f | 2015-09-15 11:03:15 -0700 | [diff] [blame] | 127 | return arg.replace('${ISOLATED_OUTDIR}', out_dir).replace('/', os.sep) |
| 128 | return arg |
| 129 | |
| 130 | return [fix(arg) for arg in command] |
| 131 | |
| 132 | |
maruel | eb5fbee | 2015-09-17 13:01:36 -0700 | [diff] [blame^] | 133 | def run_command(command, cwd, tmp_dir): |
maruel | a9cfd6f | 2015-09-15 11:03:15 -0700 | [diff] [blame] | 134 | """Runs the command, returns the process exit code.""" |
| 135 | logging.info('run_command(%s, %s)' % (command, cwd)) |
| 136 | sys.stdout.flush() |
maruel | eb5fbee | 2015-09-17 13:01:36 -0700 | [diff] [blame^] | 137 | |
| 138 | env = os.environ.copy() |
| 139 | if sys.platform == 'darwin': |
| 140 | env['TMPDIR'] = tmp_dir.encode('ascii') |
| 141 | elif sys.platform == 'win32': |
| 142 | env['TEMP'] = tmp_dir.encode('ascii') |
| 143 | else: |
| 144 | env['TMP'] = tmp_dir.encode('ascii') |
maruel | a9cfd6f | 2015-09-15 11:03:15 -0700 | [diff] [blame] | 145 | with tools.Profiler('RunTest'): |
| 146 | try: |
maruel | eb5fbee | 2015-09-17 13:01:36 -0700 | [diff] [blame^] | 147 | with subprocess42.Popen_with_handler(command, cwd=cwd, env=env) as p: |
maruel | a9cfd6f | 2015-09-15 11:03:15 -0700 | [diff] [blame] | 148 | p.communicate() |
| 149 | exit_code = p.returncode |
| 150 | except OSError: |
| 151 | # This is not considered to be an internal error. The executable simply |
| 152 | # does not exit. |
| 153 | exit_code = 1 |
| 154 | logging.info( |
| 155 | 'Command finished with exit code %d (%s)', |
| 156 | exit_code, hex(0xffffffff & exit_code)) |
| 157 | return exit_code |
| 158 | |
| 159 | |
| 160 | def delete_and_upload(storage, out_dir, leak_temp_dir): |
| 161 | """Deletes the temporary run directory and uploads results back. |
| 162 | |
| 163 | Returns: |
| 164 | tuple(outputs_ref, success) |
| 165 | - outputs_ref is a dict referring to the results archived back to the |
| 166 | isolated server, if applicable. |
| 167 | - success is False if something occurred that means that the task must |
| 168 | forcibly be considered a failure, e.g. zombie processes were left behind. |
| 169 | """ |
| 170 | |
| 171 | # Upload out_dir and generate a .isolated file out of this directory. It is |
| 172 | # only done if files were written in the directory. |
| 173 | outputs_ref = None |
| 174 | if os.path.isdir(out_dir) and os.listdir(out_dir): |
| 175 | with tools.Profiler('ArchiveOutput'): |
| 176 | try: |
| 177 | results = isolateserver.archive_files_to_storage( |
| 178 | storage, [out_dir], None) |
| 179 | outputs_ref = { |
| 180 | 'isolated': results[0][0], |
| 181 | 'isolatedserver': storage.location, |
| 182 | 'namespace': storage.namespace, |
| 183 | } |
| 184 | except isolateserver.Aborted: |
| 185 | # This happens when a signal SIGTERM was received while uploading data. |
| 186 | # There is 2 causes: |
| 187 | # - The task was too slow and was about to be killed anyway due to |
| 188 | # exceeding the hard timeout. |
| 189 | # - The amount of data uploaded back is very large and took too much |
| 190 | # time to archive. |
| 191 | sys.stderr.write('Received SIGTERM while uploading') |
| 192 | # Re-raise, so it will be treated as an internal failure. |
| 193 | raise |
| 194 | try: |
maruel | 6eeea7d | 2015-09-16 12:17:42 -0700 | [diff] [blame] | 195 | if (not leak_temp_dir and os.path.isdir(out_dir) and |
| 196 | not file_path.rmtree(out_dir)): |
maruel | a9cfd6f | 2015-09-15 11:03:15 -0700 | [diff] [blame] | 197 | logging.error('Had difficulties removing out_dir %s', out_dir) |
| 198 | return outputs_ref, False |
| 199 | except OSError as e: |
| 200 | # When this happens, it means there's a process error. |
| 201 | logging.error('Had difficulties removing out_dir %s: %s', out_dir, e) |
| 202 | return outputs_ref, False |
| 203 | return outputs_ref, True |
| 204 | |
| 205 | |
maruel | eb5fbee | 2015-09-17 13:01:36 -0700 | [diff] [blame^] | 206 | def map_and_run( |
| 207 | isolated_hash, storage, cache, leak_temp_dir, root_dir, extra_args): |
maruel | a9cfd6f | 2015-09-15 11:03:15 -0700 | [diff] [blame] | 208 | """Maps and run the command. Returns metadata about the result.""" |
| 209 | # TODO(maruel): Include performance statistics. |
| 210 | result = { |
| 211 | 'exit_code': None, |
| 212 | 'internal_failure': None, |
| 213 | 'outputs_ref': None, |
| 214 | 'version': 1, |
| 215 | } |
maruel | eb5fbee | 2015-09-17 13:01:36 -0700 | [diff] [blame^] | 216 | if root_dir: |
| 217 | if not os.path.isdir(root_dir): |
| 218 | os.makedirs(root_dir, 0700) |
| 219 | prefix = u'' |
| 220 | else: |
| 221 | root_dir = os.path.dirname(cache.cache_dir) if cache.cache_dir else None |
| 222 | prefix = u'isolated_' |
| 223 | run_dir = make_temp_dir(prefix + u'run', root_dir) |
| 224 | out_dir = make_temp_dir(prefix + u'out', root_dir) |
| 225 | tmp_dir = make_temp_dir(prefix + u'tmp', root_dir) |
maruel | a9cfd6f | 2015-09-15 11:03:15 -0700 | [diff] [blame] | 226 | try: |
| 227 | bundle = isolateserver.fetch_isolated( |
| 228 | isolated_hash=isolated_hash, |
| 229 | storage=storage, |
| 230 | cache=cache, |
| 231 | outdir=run_dir, |
| 232 | require_command=True) |
| 233 | |
| 234 | change_tree_read_only(run_dir, bundle.read_only) |
| 235 | cwd = os.path.normpath(os.path.join(run_dir, bundle.relative_cwd)) |
| 236 | command = bundle.command + extra_args |
| 237 | file_path.ensure_command_has_abs_path(command, cwd) |
maruel | eb5fbee | 2015-09-17 13:01:36 -0700 | [diff] [blame^] | 238 | result['exit_code'] = run_command( |
| 239 | process_command(command, out_dir), cwd, tmp_dir) |
maruel | a9cfd6f | 2015-09-15 11:03:15 -0700 | [diff] [blame] | 240 | except Exception as e: |
| 241 | # An internal error occured. Report accordingly so the swarming task will be |
| 242 | # retried automatically. |
| 243 | logging.error('internal failure: %s', e) |
| 244 | result['internal_failure'] = str(e) |
| 245 | on_error.report(None) |
| 246 | finally: |
| 247 | try: |
| 248 | if leak_temp_dir: |
| 249 | logging.warning( |
| 250 | 'Deliberately leaking %s for later examination', run_dir) |
maruel | eb5fbee | 2015-09-17 13:01:36 -0700 | [diff] [blame^] | 251 | else: |
| 252 | if os.path.isdir(run_dir) and not file_path.rmtree(run_dir): |
| 253 | # On Windows rmtree(run_dir) call above has a synchronization effect: |
| 254 | # it finishes only when all task child processes terminate (since a |
| 255 | # running process locks *.exe file). Examine out_dir only after that |
| 256 | # call completes (since child processes may write to out_dir too and |
| 257 | # we need to wait for them to finish). |
| 258 | print >> sys.stderr, ( |
| 259 | 'Failed to delete the run directory, forcibly failing\n' |
| 260 | 'the task because of it. No zombie process can outlive a\n' |
| 261 | 'successful task run and still be marked as successful.\n' |
| 262 | 'Fix your stuff.') |
| 263 | if result['exit_code'] == 0: |
| 264 | result['exit_code'] = 1 |
| 265 | if os.path.isdir(tmp_dir) and not file_path.rmtree(tmp_dir): |
| 266 | print >> sys.stderr, ( |
| 267 | 'Failed to delete the temporary directory, forcibly failing\n' |
| 268 | 'the task because of it. No zombie process can outlive a\n' |
| 269 | 'successful task run and still be marked as successful.\n' |
| 270 | 'Fix your stuff.') |
| 271 | if result['exit_code'] == 0: |
| 272 | result['exit_code'] = 1 |
maruel | a9cfd6f | 2015-09-15 11:03:15 -0700 | [diff] [blame] | 273 | |
maruel | eb5fbee | 2015-09-17 13:01:36 -0700 | [diff] [blame^] | 274 | # This deletes out_dir if leak_temp_dir is not set. |
maruel | a9cfd6f | 2015-09-15 11:03:15 -0700 | [diff] [blame] | 275 | result['outputs_ref'], success = delete_and_upload( |
| 276 | storage, out_dir, leak_temp_dir) |
| 277 | if not success and result['exit_code'] == 0: |
| 278 | result['exit_code'] = 1 |
| 279 | except Exception as e: |
| 280 | # Swallow any exception in the main finally clause. |
| 281 | logging.error('Leaking out_dir %s: %s', out_dir, e) |
| 282 | result['internal_failure'] = str(e) |
| 283 | return result |
Marc-Antoine Ruel | 2283ad1 | 2014-02-09 11:14:57 -0500 | [diff] [blame] | 284 | |
| 285 | |
Marc-Antoine Ruel | 0ec868b | 2015-08-12 14:12:46 -0400 | [diff] [blame] | 286 | def run_tha_test( |
maruel | eb5fbee | 2015-09-17 13:01:36 -0700 | [diff] [blame^] | 287 | isolated_hash, storage, cache, leak_temp_dir, result_json, root_dir, |
| 288 | extra_args): |
Marc-Antoine Ruel | 2283ad1 | 2014-02-09 11:14:57 -0500 | [diff] [blame] | 289 | """Downloads the dependencies in the cache, hardlinks them into a temporary |
| 290 | directory and runs the executable from there. |
| 291 | |
| 292 | A temporary directory is created to hold the output files. The content inside |
| 293 | this directory will be uploaded back to |storage| packaged as a .isolated |
| 294 | file. |
| 295 | |
| 296 | Arguments: |
Marc-Antoine Ruel | 35b5843 | 2014-12-08 17:40:40 -0500 | [diff] [blame] | 297 | isolated_hash: the SHA-1 of the .isolated file that must be retrieved to |
Marc-Antoine Ruel | 2283ad1 | 2014-02-09 11:14:57 -0500 | [diff] [blame] | 298 | recreate the tree of files to run the target executable. |
| 299 | storage: an isolateserver.Storage object to retrieve remote objects. This |
| 300 | object has a reference to an isolateserver.StorageApi, which does |
| 301 | the actual I/O. |
| 302 | cache: an isolateserver.LocalCache to keep from retrieving the same objects |
| 303 | constantly by caching the objects retrieved. Can be on-disk or |
| 304 | in-memory. |
Kenneth Russell | 61d4235 | 2014-09-15 11:41:16 -0700 | [diff] [blame] | 305 | leak_temp_dir: if true, the temporary directory will be deliberately leaked |
| 306 | for later examination. |
maruel | a9cfd6f | 2015-09-15 11:03:15 -0700 | [diff] [blame] | 307 | result_json: file path to dump result metadata into. If set, the process |
| 308 | exit code is always 0 unless an internal error occured. |
maruel | eb5fbee | 2015-09-17 13:01:36 -0700 | [diff] [blame^] | 309 | root_dir: directory to the path to use to create the temporary directory. If |
| 310 | not specified, a random temporary directory is created. |
Marc-Antoine Ruel | 2283ad1 | 2014-02-09 11:14:57 -0500 | [diff] [blame] | 311 | extra_args: optional arguments to add to the command stated in the .isolate |
| 312 | file. |
maruel | a9cfd6f | 2015-09-15 11:03:15 -0700 | [diff] [blame] | 313 | |
| 314 | Returns: |
| 315 | Process exit code that should be used. |
maruel@chromium.org | 9c72d4e | 2012-09-28 19:20:25 +0000 | [diff] [blame] | 316 | """ |
maruel | a9cfd6f | 2015-09-15 11:03:15 -0700 | [diff] [blame] | 317 | # run_isolated exit code. Depends on if result_json is used or not. |
| 318 | result = map_and_run( |
maruel | eb5fbee | 2015-09-17 13:01:36 -0700 | [diff] [blame^] | 319 | isolated_hash, storage, cache, leak_temp_dir, root_dir, extra_args) |
maruel | a9cfd6f | 2015-09-15 11:03:15 -0700 | [diff] [blame] | 320 | logging.info('Result:\n%s', tools.format_json(result, dense=True)) |
| 321 | if result_json: |
| 322 | tools.write_json(result_json, result, dense=True) |
| 323 | # Only return 1 if there was an internal error. |
| 324 | return int(bool(result['internal_failure'])) |
maruel@chromium.org | 781ccf6 | 2013-09-17 19:39:47 +0000 | [diff] [blame] | 325 | |
maruel | a9cfd6f | 2015-09-15 11:03:15 -0700 | [diff] [blame] | 326 | # Marshall into old-style inline output. |
| 327 | if result['outputs_ref']: |
| 328 | data = { |
| 329 | 'hash': result['outputs_ref']['isolated'], |
| 330 | 'namespace': result['outputs_ref']['namespace'], |
| 331 | 'storage': result['outputs_ref']['isolatedserver'], |
| 332 | } |
Marc-Antoine Ruel | c44f572 | 2015-01-08 16:10:01 -0500 | [diff] [blame] | 333 | sys.stdout.flush() |
maruel | a9cfd6f | 2015-09-15 11:03:15 -0700 | [diff] [blame] | 334 | print( |
| 335 | '[run_isolated_out_hack]%s[/run_isolated_out_hack]' % |
| 336 | tools.format_json(data, dense=True)) |
| 337 | return result['exit_code'] or int(bool(result['internal_failure'])) |
maruel@chromium.org | 9c72d4e | 2012-09-28 19:20:25 +0000 | [diff] [blame] | 338 | |
| 339 | |
Marc-Antoine Ruel | 90c9816 | 2013-12-18 15:11:57 -0500 | [diff] [blame] | 340 | def main(args): |
vadimsh@chromium.org | a432647 | 2013-08-24 02:05:41 +0000 | [diff] [blame] | 341 | tools.disable_buffering() |
Marc-Antoine Ruel | f74cffe | 2015-07-15 15:21:34 -0400 | [diff] [blame] | 342 | parser = logging_utils.OptionParserWithLogging( |
maruel@chromium.org | dedbf49 | 2013-09-12 20:42:11 +0000 | [diff] [blame] | 343 | usage='%prog <options>', |
| 344 | version=__version__, |
| 345 | log_file=RUN_ISOLATED_LOG_FILE) |
maruel | a9cfd6f | 2015-09-15 11:03:15 -0700 | [diff] [blame] | 346 | parser.add_option( |
| 347 | '--json', |
| 348 | help='dump output metadata to json file. When used, run_isolated returns ' |
| 349 | 'non-zero only on internal failure') |
Marc-Antoine Ruel | 1687b5e | 2014-02-06 17:47:53 -0500 | [diff] [blame] | 350 | data_group = optparse.OptionGroup(parser, 'Data source') |
| 351 | data_group.add_option( |
Marc-Antoine Ruel | 185ded4 | 2015-01-28 20:49:18 -0500 | [diff] [blame] | 352 | '-s', '--isolated', |
| 353 | help='Hash of the .isolated to grab from the isolate server') |
Marc-Antoine Ruel | f7d737d | 2014-12-10 15:36:29 -0500 | [diff] [blame] | 354 | isolateserver.add_isolate_server_options(data_group) |
Marc-Antoine Ruel | 1687b5e | 2014-02-06 17:47:53 -0500 | [diff] [blame] | 355 | parser.add_option_group(data_group) |
maruel@chromium.org | 9c72d4e | 2012-09-28 19:20:25 +0000 | [diff] [blame] | 356 | |
Marc-Antoine Ruel | a57d7db | 2014-10-15 20:31:19 -0400 | [diff] [blame] | 357 | isolateserver.add_cache_options(parser) |
| 358 | parser.set_defaults(cache='cache') |
maruel@chromium.org | 9c72d4e | 2012-09-28 19:20:25 +0000 | [diff] [blame] | 359 | |
Kenneth Russell | 61d4235 | 2014-09-15 11:41:16 -0700 | [diff] [blame] | 360 | debug_group = optparse.OptionGroup(parser, 'Debugging') |
| 361 | debug_group.add_option( |
| 362 | '--leak-temp-dir', |
| 363 | action='store_true', |
| 364 | help='Deliberately leak isolate\'s temp dir for later examination ' |
| 365 | '[default: %default]') |
maruel | eb5fbee | 2015-09-17 13:01:36 -0700 | [diff] [blame^] | 366 | debug_group.add_option( |
| 367 | '--root-dir', help='Use a directory instead of a random one') |
Kenneth Russell | 61d4235 | 2014-09-15 11:41:16 -0700 | [diff] [blame] | 368 | parser.add_option_group(debug_group) |
| 369 | |
Vadim Shtayura | e34e13a | 2014-02-02 11:23:26 -0800 | [diff] [blame] | 370 | auth.add_auth_options(parser) |
Marc-Antoine Ruel | 90c9816 | 2013-12-18 15:11:57 -0500 | [diff] [blame] | 371 | options, args = parser.parse_args(args) |
Marc-Antoine Ruel | 185ded4 | 2015-01-28 20:49:18 -0500 | [diff] [blame] | 372 | if not options.isolated: |
| 373 | parser.error('--isolated is required.') |
Vadim Shtayura | 5d1efce | 2014-02-04 10:55:43 -0800 | [diff] [blame] | 374 | auth.process_auth_options(parser, options) |
Marc-Antoine Ruel | e290ada | 2014-12-10 19:48:49 -0500 | [diff] [blame] | 375 | isolateserver.process_isolate_server_options(parser, options, True) |
maruel@chromium.org | 9c72d4e | 2012-09-28 19:20:25 +0000 | [diff] [blame] | 376 | |
Marc-Antoine Ruel | a57d7db | 2014-10-15 20:31:19 -0400 | [diff] [blame] | 377 | cache = isolateserver.process_cache_options(options) |
Marc-Antoine Ruel | f7d737d | 2014-12-10 15:36:29 -0500 | [diff] [blame] | 378 | with isolateserver.get_storage( |
| 379 | options.isolate_server, options.namespace) as storage: |
Marc-Antoine Ruel | cfb6085 | 2014-07-02 15:22:00 -0400 | [diff] [blame] | 380 | # Hashing schemes used by |storage| and |cache| MUST match. |
| 381 | assert storage.hash_algo == cache.hash_algo |
| 382 | return run_tha_test( |
Marc-Antoine Ruel | 0ec868b | 2015-08-12 14:12:46 -0400 | [diff] [blame] | 383 | options.isolated, storage, cache, options.leak_temp_dir, options.json, |
maruel | eb5fbee | 2015-09-17 13:01:36 -0700 | [diff] [blame^] | 384 | options.root_dir, args) |
maruel@chromium.org | 9c72d4e | 2012-09-28 19:20:25 +0000 | [diff] [blame] | 385 | |
| 386 | |
| 387 | if __name__ == '__main__': |
csharp@chromium.org | bfb9874 | 2013-03-26 20:28:36 +0000 | [diff] [blame] | 388 | # Ensure that we are always running with the correct encoding. |
vadimsh@chromium.org | a432647 | 2013-08-24 02:05:41 +0000 | [diff] [blame] | 389 | fix_encoding.fix_encoding() |
Marc-Antoine Ruel | 90c9816 | 2013-12-18 15:11:57 -0500 | [diff] [blame] | 390 | sys.exit(main(sys.argv[1:])) |