2021-11-02 13:38:55 +00:00
|
|
|
#!/usr/bin/env python3
|
|
|
|
|
|
|
|
import logging
|
|
|
|
import subprocess
|
|
|
|
import os
|
|
|
|
import sys
|
|
|
|
|
|
|
|
from github import Github
|
|
|
|
|
2023-01-03 14:23:19 +00:00
|
|
|
from build_download_helper import get_build_name_for_check, read_build_urls
|
2023-08-12 20:41:56 +00:00
|
|
|
from clickhouse_helper import (
|
|
|
|
ClickHouseHelper,
|
|
|
|
prepare_tests_results_for_clickhouse,
|
|
|
|
get_instance_type,
|
|
|
|
)
|
2023-04-18 14:58:17 +00:00
|
|
|
from commit_status_helper import (
|
|
|
|
RerunHelper,
|
|
|
|
format_description,
|
|
|
|
get_commit,
|
|
|
|
post_commit_status,
|
|
|
|
)
|
2023-01-03 14:23:19 +00:00
|
|
|
from docker_pull_helper import get_image_with_version
|
2022-03-22 16:39:58 +00:00
|
|
|
from env_helper import (
|
|
|
|
REPORTS_PATH,
|
2022-03-24 14:37:53 +00:00
|
|
|
TEMP_PATH,
|
2022-03-22 16:39:58 +00:00
|
|
|
)
|
2021-11-02 13:38:55 +00:00
|
|
|
from get_robot_token import get_best_robot_token
|
2021-11-26 14:00:09 +00:00
|
|
|
from pr_info import PRInfo
|
2023-01-03 14:23:19 +00:00
|
|
|
from report import TestResult
|
|
|
|
from s3_helper import S3Helper
|
|
|
|
from stopwatch import Stopwatch
|
2023-08-17 07:14:47 +00:00
|
|
|
from upload_result_helper import upload_results
|
2021-11-02 13:38:55 +00:00
|
|
|
|
2022-03-22 16:39:58 +00:00
|
|
|
IMAGE_NAME = "clickhouse/fuzzer"
|
|
|
|
|
2021-11-02 13:38:55 +00:00
|
|
|
|
2023-08-12 20:41:56 +00:00
|
|
|
def get_run_command(
|
2023-08-12 20:53:33 +00:00
|
|
|
check_start_time, check_name, pr_number, sha, download_url, workspace_path, image
|
|
|
|
):
|
2023-08-12 20:41:56 +00:00
|
|
|
instance_type = get_instance_type()
|
|
|
|
|
|
|
|
envs = [
|
|
|
|
"-e CLICKHOUSE_CI_LOGS_HOST",
|
|
|
|
"-e CLICKHOUSE_CI_LOGS_PASSWORD",
|
|
|
|
f"-e CHECK_START_TIME='{check_start_time}'",
|
|
|
|
f"-e CHECK_NAME='{check_name}'",
|
|
|
|
f"-e INSTANCE_TYPE='{instance_type}'",
|
|
|
|
f"-e PR_TO_TEST={pr_number}",
|
|
|
|
f"-e SHA_TO_TEST={sha}",
|
2023-08-12 20:53:33 +00:00
|
|
|
f"-e BINARY_URL_TO_DOWNLOAD='{download_url}'",
|
2023-08-12 20:41:56 +00:00
|
|
|
]
|
|
|
|
|
|
|
|
env_str = " ".join(envs)
|
|
|
|
|
2022-03-22 16:39:58 +00:00
|
|
|
return (
|
2022-08-29 18:36:13 +00:00
|
|
|
f"docker run "
|
|
|
|
# For sysctl
|
|
|
|
"--privileged "
|
|
|
|
"--network=host "
|
|
|
|
f"--volume={workspace_path}:/workspace "
|
2023-08-12 20:41:56 +00:00
|
|
|
f"{env_str} "
|
2022-03-22 16:39:58 +00:00
|
|
|
"--cap-add syslog --cap-add sys_admin --cap-add=SYS_PTRACE "
|
|
|
|
f"{image}"
|
|
|
|
)
|
|
|
|
|
2021-11-02 13:38:55 +00:00
|
|
|
|
2023-04-06 10:46:43 +00:00
|
|
|
def main():
|
2021-11-02 13:38:55 +00:00
|
|
|
logging.basicConfig(level=logging.INFO)
|
2021-11-19 14:47:04 +00:00
|
|
|
|
|
|
|
stopwatch = Stopwatch()
|
|
|
|
|
2021-11-26 14:00:09 +00:00
|
|
|
temp_path = TEMP_PATH
|
|
|
|
reports_path = REPORTS_PATH
|
2021-11-02 13:38:55 +00:00
|
|
|
|
|
|
|
check_name = sys.argv[1]
|
|
|
|
|
|
|
|
if not os.path.exists(temp_path):
|
|
|
|
os.makedirs(temp_path)
|
|
|
|
|
2021-11-26 14:00:09 +00:00
|
|
|
pr_info = PRInfo()
|
2021-11-02 13:38:55 +00:00
|
|
|
|
2022-07-30 05:07:22 +00:00
|
|
|
gh = Github(get_best_robot_token(), per_page=100)
|
2023-04-18 14:58:17 +00:00
|
|
|
commit = get_commit(gh, pr_info.sha)
|
2021-11-02 13:38:55 +00:00
|
|
|
|
2023-04-18 14:58:17 +00:00
|
|
|
rerun_helper = RerunHelper(commit, check_name)
|
2021-12-01 14:23:51 +00:00
|
|
|
if rerun_helper.is_already_finished_by_status():
|
|
|
|
logging.info("Check is already finished according to github status, exiting")
|
|
|
|
sys.exit(0)
|
|
|
|
|
2022-10-20 12:33:56 +00:00
|
|
|
docker_image = get_image_with_version(reports_path, IMAGE_NAME)
|
2021-11-02 13:38:55 +00:00
|
|
|
|
2021-11-26 10:57:36 +00:00
|
|
|
build_name = get_build_name_for_check(check_name)
|
|
|
|
print(build_name)
|
2022-09-07 13:06:44 +00:00
|
|
|
urls = read_build_urls(build_name, reports_path)
|
2021-11-02 13:38:55 +00:00
|
|
|
if not urls:
|
|
|
|
raise Exception("No build URLs found")
|
|
|
|
|
|
|
|
for url in urls:
|
2022-03-22 16:39:58 +00:00
|
|
|
if url.endswith("/clickhouse"):
|
2021-11-02 13:38:55 +00:00
|
|
|
build_url = url
|
|
|
|
break
|
|
|
|
else:
|
2023-07-19 01:42:32 +00:00
|
|
|
raise Exception("Cannot find the clickhouse binary among build results")
|
2021-11-02 13:38:55 +00:00
|
|
|
|
|
|
|
logging.info("Got build url %s", build_url)
|
|
|
|
|
2022-03-22 16:39:58 +00:00
|
|
|
workspace_path = os.path.join(temp_path, "workspace")
|
2021-11-02 13:38:55 +00:00
|
|
|
if not os.path.exists(workspace_path):
|
|
|
|
os.makedirs(workspace_path)
|
|
|
|
|
2022-03-22 16:39:58 +00:00
|
|
|
run_command = get_run_command(
|
2023-08-12 20:41:56 +00:00
|
|
|
stopwatch.start_time_str,
|
|
|
|
check_name,
|
|
|
|
pr_info.number,
|
|
|
|
pr_info.sha,
|
|
|
|
build_url,
|
|
|
|
workspace_path,
|
2023-08-12 20:53:33 +00:00
|
|
|
docker_image,
|
2022-03-22 16:39:58 +00:00
|
|
|
)
|
2021-11-02 13:38:55 +00:00
|
|
|
logging.info("Going to run %s", run_command)
|
|
|
|
|
2022-12-26 15:29:32 +00:00
|
|
|
run_log_path = os.path.join(temp_path, "run.log")
|
2023-08-13 04:32:48 +00:00
|
|
|
main_log_path = os.path.join(workspace_path, "main.log")
|
2023-08-13 04:35:32 +00:00
|
|
|
|
2022-03-22 16:39:58 +00:00
|
|
|
with open(run_log_path, "w", encoding="utf-8") as log:
|
|
|
|
with subprocess.Popen(
|
|
|
|
run_command, shell=True, stderr=log, stdout=log
|
|
|
|
) as process:
|
2021-11-02 13:38:55 +00:00
|
|
|
retcode = process.wait()
|
|
|
|
if retcode == 0:
|
|
|
|
logging.info("Run successfully")
|
|
|
|
else:
|
|
|
|
logging.info("Run failed")
|
|
|
|
|
|
|
|
subprocess.check_call(f"sudo chown -R ubuntu:ubuntu {temp_path}", shell=True)
|
|
|
|
|
2023-08-12 22:19:58 +00:00
|
|
|
# Cleanup run log from the credentials of CI logs database.
|
|
|
|
# Note: a malicious user can still print them by splitting the value into parts.
|
|
|
|
# But we will be warned when a malicious user modifies CI script.
|
|
|
|
# Although they can also print them from inside tests.
|
|
|
|
# Nevertheless, the credentials of the CI logs have limited scope
|
|
|
|
# and does not provide access to sensitive info.
|
|
|
|
|
|
|
|
ci_logs_host = os.getenv("CLICKHOUSE_CI_LOGS_HOST", "CLICKHOUSE_CI_LOGS_HOST")
|
|
|
|
ci_logs_password = os.getenv(
|
|
|
|
"CLICKHOUSE_CI_LOGS_PASSWORD", "CLICKHOUSE_CI_LOGS_PASSWORD"
|
|
|
|
)
|
2023-08-15 06:53:08 +00:00
|
|
|
|
2023-08-16 11:04:14 +00:00
|
|
|
if ci_logs_host not in ("CLICKHOUSE_CI_LOGS_HOST", ""):
|
2023-08-15 06:53:08 +00:00
|
|
|
subprocess.check_call(
|
|
|
|
f"sed -i -r -e 's!{ci_logs_host}!CLICKHOUSE_CI_LOGS_HOST!g; s!{ci_logs_password}!CLICKHOUSE_CI_LOGS_PASSWORD!g;' '{run_log_path}' '{main_log_path}'",
|
|
|
|
shell=True,
|
|
|
|
)
|
2023-08-12 22:19:58 +00:00
|
|
|
|
2022-03-22 16:39:58 +00:00
|
|
|
check_name_lower = (
|
|
|
|
check_name.lower().replace("(", "").replace(")", "").replace(" ", "")
|
|
|
|
)
|
|
|
|
s3_prefix = f"{pr_info.number}/{pr_info.sha}/fuzzer_{check_name_lower}/"
|
2021-11-02 13:38:55 +00:00
|
|
|
paths = {
|
2022-12-26 15:29:32 +00:00
|
|
|
"run.log": run_log_path,
|
2023-08-13 04:32:48 +00:00
|
|
|
"main.log": main_log_path,
|
2022-03-22 16:39:58 +00:00
|
|
|
"fuzzer.log": os.path.join(workspace_path, "fuzzer.log"),
|
|
|
|
"report.html": os.path.join(workspace_path, "report.html"),
|
2023-01-01 20:17:43 +00:00
|
|
|
"core.zst": os.path.join(workspace_path, "core.zst"),
|
2023-01-07 00:18:17 +00:00
|
|
|
"dmesg.log": os.path.join(workspace_path, "dmesg.log"),
|
2021-11-02 13:38:55 +00:00
|
|
|
}
|
|
|
|
|
2023-08-13 00:38:48 +00:00
|
|
|
compressed_server_log_path = os.path.join(workspace_path, "server.log.zst")
|
|
|
|
if os.path.exists(compressed_server_log_path):
|
|
|
|
paths["server.log.zst"] = compressed_server_log_path
|
|
|
|
|
|
|
|
# The script can fail before the invocation of `zstd`, but we are still interested in its log:
|
|
|
|
|
|
|
|
not_compressed_server_log_path = os.path.join(workspace_path, "server.log")
|
|
|
|
if os.path.exists(not_compressed_server_log_path):
|
|
|
|
paths["server.log"] = not_compressed_server_log_path
|
|
|
|
|
2022-08-11 13:01:32 +00:00
|
|
|
s3_helper = S3Helper()
|
2021-11-02 13:38:55 +00:00
|
|
|
for f in paths:
|
|
|
|
try:
|
2022-12-29 17:55:28 +00:00
|
|
|
paths[f] = s3_helper.upload_test_report_to_s3(paths[f], s3_prefix + f)
|
2021-11-02 19:29:58 +00:00
|
|
|
except Exception as ex:
|
|
|
|
logging.info("Exception uploading file %s text %s", f, ex)
|
2022-03-22 16:39:58 +00:00
|
|
|
paths[f] = ""
|
2021-11-02 13:38:55 +00:00
|
|
|
|
|
|
|
# Try to get status message saved by the fuzzer
|
|
|
|
try:
|
2022-03-22 16:39:58 +00:00
|
|
|
with open(
|
|
|
|
os.path.join(workspace_path, "status.txt"), "r", encoding="utf-8"
|
|
|
|
) as status_f:
|
|
|
|
status = status_f.readline().rstrip("\n")
|
|
|
|
|
|
|
|
with open(
|
|
|
|
os.path.join(workspace_path, "description.txt"), "r", encoding="utf-8"
|
|
|
|
) as desc_f:
|
2023-02-23 14:21:19 +00:00
|
|
|
description = desc_f.readline().rstrip("\n")
|
2021-11-02 13:38:55 +00:00
|
|
|
except:
|
2022-03-22 16:39:58 +00:00
|
|
|
status = "failure"
|
|
|
|
description = "Task failed: $?=" + str(retcode)
|
2021-11-02 13:38:55 +00:00
|
|
|
|
2023-02-23 14:21:19 +00:00
|
|
|
description = format_description(description)
|
|
|
|
|
2023-01-03 14:23:19 +00:00
|
|
|
test_result = TestResult(description, "OK")
|
2022-03-22 16:39:58 +00:00
|
|
|
if "fail" in status:
|
2023-01-03 14:23:19 +00:00
|
|
|
test_result.status = "FAIL"
|
2021-11-19 14:47:04 +00:00
|
|
|
|
2023-08-17 07:14:47 +00:00
|
|
|
if paths["report.html"]:
|
|
|
|
report_url = paths["report.html"]
|
|
|
|
else:
|
|
|
|
report_url = upload_results(
|
|
|
|
s3_helper,
|
|
|
|
pr_info.number,
|
|
|
|
pr_info.sha,
|
|
|
|
[test_result],
|
|
|
|
[],
|
|
|
|
check_name,
|
|
|
|
[url for url in paths.values() if url],
|
|
|
|
)
|
|
|
|
|
2021-11-19 14:47:04 +00:00
|
|
|
ch_helper = ClickHouseHelper()
|
|
|
|
|
2022-03-22 16:39:58 +00:00
|
|
|
prepared_events = prepare_tests_results_for_clickhouse(
|
|
|
|
pr_info,
|
2023-01-03 14:23:19 +00:00
|
|
|
[test_result],
|
2022-03-22 16:39:58 +00:00
|
|
|
status,
|
|
|
|
stopwatch.duration_seconds,
|
|
|
|
stopwatch.start_time_str,
|
|
|
|
report_url,
|
|
|
|
check_name,
|
|
|
|
)
|
2021-11-19 14:47:04 +00:00
|
|
|
|
2022-05-19 15:56:35 +00:00
|
|
|
ch_helper.insert_events_into(db="default", table="checks", events=prepared_events)
|
|
|
|
|
2021-11-02 13:38:55 +00:00
|
|
|
logging.info("Result: '%s', '%s', '%s'", status, description, report_url)
|
|
|
|
print(f"::notice ::Report url: {report_url}")
|
2023-04-18 23:03:48 +00:00
|
|
|
post_commit_status(commit, status, report_url, description, check_name, pr_info)
|
2023-04-06 10:46:43 +00:00
|
|
|
|
|
|
|
|
|
|
|
if __name__ == "__main__":
|
|
|
|
main()
|