mirror of
https://github.com/ClickHouse/ClickHouse.git
synced 2024-11-23 16:12:01 +00:00
64a308013f
v1: vm.mmap_rnd_bits=28 v2: rebase with clang 18.1.6 + kernel.randomize_va_space=0 v3: leave only vm.mmap_rnd_bits=28 + use pre-run.sh (hope that it will be used), that way docker will not require --privileged and by some reason this breaks ASAN (though I cannot reproduce it) v4: use actions/common_setup over init_runner.sh (it requires some manual deploy)
254 lines
8.8 KiB
Bash
254 lines
8.8 KiB
Bash
#!/usr/bin/env bash
|
|
# The script is downloaded the AWS image builder Task Orchestrator and Executor (AWSTOE)
|
|
# We can't use `user data script` because cloud-init does not check the exit code
|
|
# The script is downloaded in the component named ci-infrastructure-prepare in us-east-1
|
|
# The link there must be adjusted to a particular RAW link, e.g.
|
|
# https://github.com/ClickHouse/ClickHouse/raw/653da5f00219c088af66d97a8f1ea3e35e798268/tests/ci/worker/prepare-ci-ami.sh
|
|
|
|
set -xeuo pipefail
|
|
|
|
echo "Running prepare script"
|
|
export DEBIAN_FRONTEND=noninteractive
|
|
export RUNNER_VERSION=2.316.1
|
|
export RUNNER_HOME=/home/ubuntu/actions-runner
|
|
|
|
deb_arch() {
|
|
case $(uname -m) in
|
|
x86_64 )
|
|
echo amd64;;
|
|
aarch64 )
|
|
echo arm64;;
|
|
esac
|
|
}
|
|
|
|
runner_arch() {
|
|
case $(uname -m) in
|
|
x86_64 )
|
|
echo x64;;
|
|
aarch64 )
|
|
echo arm64;;
|
|
esac
|
|
}
|
|
|
|
# We have test for cgroups, and it's broken with cgroups v2
|
|
# Ubuntu 22.04 has it enabled by default
|
|
sed -r '/GRUB_CMDLINE_LINUX=/ s/"(.*)"/"\1 systemd.unified_cgroup_hierarchy=0"/' -i /etc/default/grub
|
|
update-grub
|
|
|
|
apt-get update
|
|
|
|
apt-get install --yes --no-install-recommends \
|
|
apt-transport-https \
|
|
at \
|
|
atop \
|
|
binfmt-support \
|
|
build-essential \
|
|
ca-certificates \
|
|
curl \
|
|
gnupg \
|
|
jq \
|
|
lsb-release \
|
|
pigz \
|
|
ripgrep \
|
|
zstd \
|
|
python3-dev \
|
|
python3-pip \
|
|
qemu-user-static \
|
|
unzip
|
|
|
|
# Install docker
|
|
curl -fsSL https://download.docker.com/linux/ubuntu/gpg | gpg --dearmor -o /usr/share/keyrings/docker-archive-keyring.gpg
|
|
|
|
echo "deb [arch=$(deb_arch) signed-by=/usr/share/keyrings/docker-archive-keyring.gpg] https://download.docker.com/linux/ubuntu $(lsb_release -cs) stable" | tee /etc/apt/sources.list.d/docker.list > /dev/null
|
|
|
|
apt-get update
|
|
apt-get install --yes --no-install-recommends docker-ce docker-buildx-plugin docker-ce-cli containerd.io
|
|
|
|
usermod -aG docker ubuntu
|
|
|
|
# enable ipv6 in containers (fixed-cidr-v6 is some random network mask)
|
|
cat <<EOT > /etc/docker/daemon.json
|
|
{
|
|
"ipv6": true,
|
|
"fixed-cidr-v6": "2001:db8:1::/64",
|
|
"log-driver": "json-file",
|
|
"log-opts": {
|
|
"max-file": "5",
|
|
"max-size": "1000m"
|
|
},
|
|
"insecure-registries" : ["dockerhub-proxy.dockerhub-proxy-zone:5000"],
|
|
"registry-mirrors" : ["http://dockerhub-proxy.dockerhub-proxy-zone:5000"]
|
|
}
|
|
EOT
|
|
|
|
# Install azure-cli
|
|
curl -sLS https://packages.microsoft.com/keys/microsoft.asc | gpg --dearmor -o /etc/apt/keyrings/microsoft.gpg
|
|
AZ_DIST=$(lsb_release -cs)
|
|
echo "deb [arch=$(dpkg --print-architecture) signed-by=/etc/apt/keyrings/microsoft.gpg] https://packages.microsoft.com/repos/azure-cli/ $AZ_DIST main" | tee /etc/apt/sources.list.d/azure-cli.list
|
|
|
|
apt-get update
|
|
apt-get install --yes --no-install-recommends azure-cli
|
|
|
|
# Increase the limit on number of virtual memory mappings to aviod 'Cannot mmap' error
|
|
echo "vm.max_map_count = 2097152" > /etc/sysctl.d/01-increase-map-counts.conf
|
|
# Workarond for sanitizers uncompatibility with some kernels, see https://github.com/google/sanitizers/issues/856
|
|
echo "vm.mmap_rnd_bits=28" > /etc/sysctl.d/02-vm-mmap_rnd_bits.conf
|
|
|
|
systemctl restart docker
|
|
|
|
# buildx builder is user-specific
|
|
sudo -u ubuntu docker buildx version
|
|
sudo -u ubuntu docker buildx rm default-builder || : # if it's the second attempt
|
|
sudo -u ubuntu docker buildx create --use --name default-builder
|
|
|
|
pip install boto3 pygithub requests urllib3 unidiff dohq-artifactory
|
|
|
|
rm -rf $RUNNER_HOME # if it's the second attempt
|
|
mkdir -p $RUNNER_HOME && cd $RUNNER_HOME
|
|
|
|
RUNNER_ARCHIVE="actions-runner-linux-$(runner_arch)-$RUNNER_VERSION.tar.gz"
|
|
|
|
curl -O -L "https://github.com/actions/runner/releases/download/v$RUNNER_VERSION/$RUNNER_ARCHIVE"
|
|
|
|
tar xzf "./$RUNNER_ARCHIVE"
|
|
rm -f "./$RUNNER_ARCHIVE"
|
|
./bin/installdependencies.sh
|
|
|
|
chown -R ubuntu:ubuntu $RUNNER_HOME
|
|
|
|
cd /home/ubuntu
|
|
curl "https://awscli.amazonaws.com/awscli-exe-linux-$(uname -m).zip" -o "awscliv2.zip"
|
|
unzip -q awscliv2.zip
|
|
./aws/install
|
|
|
|
rm -rf /home/ubuntu/awscliv2.zip /home/ubuntu/aws
|
|
|
|
# SSH keys of core team
|
|
mkdir -p /home/ubuntu/.ssh
|
|
|
|
# ~/.ssh/authorized_keys is cleaned out, so we use deprecated but working ~/.ssh/authorized_keys2
|
|
TEAM_KEYS_URL=$(aws ssm get-parameter --region us-east-1 --name team-keys-url --query 'Parameter.Value' --output=text)
|
|
curl "${TEAM_KEYS_URL}" > /home/ubuntu/.ssh/authorized_keys2
|
|
chown ubuntu: /home/ubuntu/.ssh -R
|
|
chmod 0700 /home/ubuntu/.ssh
|
|
|
|
# Download cloudwatch agent and install config for it
|
|
wget --directory-prefix=/tmp https://s3.amazonaws.com/amazoncloudwatch-agent/ubuntu/"$(deb_arch)"/latest/amazon-cloudwatch-agent.deb{,.sig}
|
|
gpg --recv-key --keyserver keyserver.ubuntu.com D58167303B789C72
|
|
gpg --verify /tmp/amazon-cloudwatch-agent.deb.sig
|
|
dpkg -i /tmp/amazon-cloudwatch-agent.deb
|
|
aws ssm get-parameter --region us-east-1 --name AmazonCloudWatch-github-runners --query 'Parameter.Value' --output text > /opt/aws/amazon-cloudwatch-agent/etc/amazon-cloudwatch-agent.json
|
|
systemctl enable amazon-cloudwatch-agent.service
|
|
|
|
|
|
echo "Install tailscale"
|
|
# Build get-authkey for tailscale
|
|
docker run --rm -v /usr/local/bin/:/host-local-bin -i golang:alpine sh -ex <<'EOF'
|
|
CGO_ENABLED=0 go install -tags tag:svc-core-ci-github tailscale.com/cmd/get-authkey@main
|
|
mv /go/bin/get-authkey /host-local-bin
|
|
EOF
|
|
|
|
# install tailscale
|
|
curl -fsSL "https://pkgs.tailscale.com/stable/ubuntu/$(lsb_release -cs).noarmor.gpg" > /usr/share/keyrings/tailscale-archive-keyring.gpg
|
|
curl -fsSL "https://pkgs.tailscale.com/stable/ubuntu/$(lsb_release -cs).tailscale-keyring.list" > /etc/apt/sources.list.d/tailscale.list
|
|
apt-get update
|
|
apt-get install tailscale --yes --no-install-recommends
|
|
|
|
|
|
# Create a common script for the instances
|
|
mkdir /usr/local/share/scripts -p
|
|
setup_cloudflare_dns() {
|
|
# Add cloudflare DNS as a fallback
|
|
# Get default gateway interface
|
|
local IFACE ETH_DNS CLOUDFLARE_NS new_dns
|
|
IFACE=$(ip --json route list | jq '.[]|select(.dst == "default").dev' --raw-output)
|
|
# `Link 2 (eth0): 172.31.0.2`
|
|
ETH_DNS=$(resolvectl dns "$IFACE") || :
|
|
CLOUDFLARE_NS=1.1.1.1
|
|
if [[ "$ETH_DNS" ]] && [[ "${ETH_DNS#*: }" != *"$CLOUDFLARE_NS"* ]]; then
|
|
# Cut the leading legend
|
|
ETH_DNS=${ETH_DNS#*: }
|
|
# shellcheck disable=SC2206
|
|
new_dns=(${ETH_DNS} "$CLOUDFLARE_NS")
|
|
resolvectl dns "$IFACE" "${new_dns[@]}"
|
|
fi
|
|
}
|
|
|
|
setup_tailscale() {
|
|
# Setup tailscale, the very first action
|
|
local TS_API_CLIENT_ID TS_API_CLIENT_SECRET TS_AUTHKEY RUNNER_TYPE
|
|
TS_API_CLIENT_ID=$(aws ssm get-parameter --region us-east-1 --name /tailscale/api-client-id --query 'Parameter.Value' --output text --with-decryption)
|
|
TS_API_CLIENT_SECRET=$(aws ssm get-parameter --region us-east-1 --name /tailscale/api-client-secret --query 'Parameter.Value' --output text --with-decryption)
|
|
|
|
RUNNER_TYPE=$(/usr/local/bin/aws ec2 describe-tags --filters "Name=resource-id,Values=$INSTANCE_ID" --query "Tags[?Key=='github:runner-type'].Value" --output text)
|
|
RUNNER_TYPE=${RUNNER_TYPE:-unknown}
|
|
# Clean possible garbage from the runner type
|
|
RUNNER_TYPE=${RUNNER_TYPE//[^0-9a-z]/-}
|
|
TS_AUTHKEY=$(TS_API_CLIENT_ID="$TS_API_CLIENT_ID" TS_API_CLIENT_SECRET="$TS_API_CLIENT_SECRET" \
|
|
get-authkey -tags tag:svc-core-ci-github -ephemeral)
|
|
tailscale up --ssh --auth-key="$TS_AUTHKEY" --hostname="ci-runner-$RUNNER_TYPE-$INSTANCE_ID"
|
|
}
|
|
|
|
cat > /usr/local/share/scripts/init-network.sh << EOF
|
|
!/usr/bin/env bash
|
|
$(declare -f setup_cloudflare_dns)
|
|
|
|
$(declare -f setup_tailscale)
|
|
|
|
# If the script is sourced, it will return now and won't execute functions
|
|
return 0 &>/dev/null || :
|
|
|
|
echo Setup Cloudflare DNS
|
|
setup_cloudflare_dns
|
|
|
|
echo Setup Tailscale VPN
|
|
setup_tailscale
|
|
EOF
|
|
|
|
chmod +x /usr/local/share/scripts/init-network.sh
|
|
|
|
|
|
# The following line is used in aws TOE check.
|
|
touch /var/tmp/clickhouse-ci-ami.success
|
|
# END OF THE SCRIPT
|
|
|
|
# TOE description
|
|
# name: CIInfrastructurePrepare
|
|
# description: instals the infrastructure for ClickHouse CI runners
|
|
# schemaVersion: 1.0
|
|
#
|
|
# phases:
|
|
# - name: build
|
|
# steps:
|
|
# - name: DownloadRemoteScript
|
|
# maxAttempts: 3
|
|
# action: WebDownload
|
|
# onFailure: Abort
|
|
# inputs:
|
|
# - source: https://github.com/ClickHouse/ClickHouse/raw/653da5f00219c088af66d97a8f1ea3e35e798268/tests/ci/worker/prepare-ci-ami.sh
|
|
# destination: /tmp/prepare-ci-ami.sh
|
|
# - name: RunScript
|
|
# maxAttempts: 3
|
|
# action: ExecuteBash
|
|
# onFailure: Abort
|
|
# inputs:
|
|
# commands:
|
|
# - bash -x '{{build.DownloadRemoteScript.inputs[0].destination}}'
|
|
#
|
|
#
|
|
# - name: validate
|
|
# steps:
|
|
# - name: RunScript
|
|
# maxAttempts: 3
|
|
# action: ExecuteBash
|
|
# onFailure: Abort
|
|
# inputs:
|
|
# commands:
|
|
# - ls /var/tmp/clickhouse-ci-ami.success
|
|
# - name: Cleanup
|
|
# action: DeleteFile
|
|
# onFailure: Abort
|
|
# maxAttempts: 3
|
|
# inputs:
|
|
# - path: /var/tmp/clickhouse-ci-ami.success
|