Source code for spack.ci

# Copyright 2013-2024 Lawrence Livermore National Security, LLC and other
# Spack Project Developers. See the top-level COPYRIGHT file for details.
#
# SPDX-License-Identifier: (Apache-2.0 OR MIT)

import base64
import codecs
import copy
import json
import os
import re
import shutil
import stat
import subprocess
import sys
import tempfile
import time
import zipfile
from collections import defaultdict, namedtuple
from typing import Dict, List, Optional, Set, Tuple
from urllib.error import HTTPError, URLError
from urllib.parse import urlencode
from urllib.request import HTTPHandler, Request, build_opener

import llnl.util.filesystem as fs
import llnl.util.tty as tty
from llnl.util.lang import memoized
from llnl.util.tty.color import cescape, colorize

import spack
import spack.binary_distribution as bindist
import spack.config as cfg
import spack.environment as ev
import spack.main
import spack.mirror
import spack.paths
import spack.repo
import spack.spec
import spack.util.git
import spack.util.gpg as gpg_util
import spack.util.spack_yaml as syaml
import spack.util.url as url_util
import spack.util.web as web_util
from spack import traverse
from spack.error import SpackError
from spack.reporters import CDash, CDashConfiguration
from spack.reporters.cdash import build_stamp as cdash_build_stamp

# See https://docs.gitlab.com/ee/ci/yaml/#retry for descriptions of conditions
JOB_RETRY_CONDITIONS = [
    # "always",
    "unknown_failure",
    "script_failure",
    "api_failure",
    "stuck_or_timeout_failure",
    "runner_system_failure",
    "runner_unsupported",
    "stale_schedule",
    # "job_execution_timeout",
    "archived_failure",
    "unmet_prerequisites",
    "scheduler_failure",
    "data_integrity_failure",
]

TEMP_STORAGE_MIRROR_NAME = "ci_temporary_mirror"
SPACK_RESERVED_TAGS = ["public", "protected", "notary"]
# TODO: Remove this in Spack 0.23
SHARED_PR_MIRROR_URL = "s3://spack-binaries-prs/shared_pr_mirror"
JOB_NAME_FORMAT = (
    "{name}{@version} {/hash:7} {%compiler.name}{@compiler.version}{arch=architecture}"
)
IS_WINDOWS = sys.platform == "win32"
spack_gpg = spack.main.SpackCommand("gpg")
spack_compiler = spack.main.SpackCommand("compiler")

PushResult = namedtuple("PushResult", "success url")


[docs] class TemporaryDirectory: def __init__(self): self.temporary_directory = tempfile.mkdtemp() def __enter__(self): return self.temporary_directory def __exit__(self, exc_type, exc_value, exc_traceback): shutil.rmtree(self.temporary_directory) return False
[docs] def get_job_name(spec: spack.spec.Spec, build_group: str = ""): """Given a spec and possibly a build group, return the job name. If the resulting name is longer than 255 characters, it will be truncated. Arguments: spec (spack.spec.Spec): Spec job will build build_group (str): Name of build group this job belongs to (a CDash notion) Returns: The job name """ job_name = spec.format(JOB_NAME_FORMAT) if build_group: job_name = f"{job_name} {build_group}" return job_name[:255]
def _remove_reserved_tags(tags): """Convenience function to strip reserved tags from jobs""" return [tag for tag in tags if tag not in SPACK_RESERVED_TAGS] def _spec_ci_label(s): return f"{s.name}/{s.dag_hash(7)}" PlainNodes = Dict[str, spack.spec.Spec] PlainEdges = Dict[str, Set[str]]
[docs] def stage_spec_jobs(specs: List[spack.spec.Spec]) -> Tuple[PlainNodes, PlainEdges, List[Set[str]]]: """Turn a DAG into a list of stages (set of nodes), the list is ordered topologically, so that each node in a stage has dependencies only in previous stages. Arguments: specs: Specs to build Returns: A tuple (nodes, edges, stages) where ``nodes`` maps labels to specs, ``edges`` maps labels to a set of labels of dependencies, and ``stages`` is a topologically ordered list of sets of labels. """ # The convenience method below, "_remove_satisfied_deps()", does not modify # the "deps" parameter. Instead, it returns a new dictionary where only # dependencies which have not yet been satisfied are included in the # return value. def _remove_satisfied_deps(deps, satisfied_list): new_deps = {} for key, value in deps.items(): new_value = set([v for v in value if v not in satisfied_list]) if new_value: new_deps[key] = new_value return new_deps nodes, edges = _extract_dag(specs) # Save the original edges, as we need to return them at the end of the function. In the loop # below, the "dependencies" variable is rebound rather than mutated, so "edges" is not mutated. dependencies = edges unstaged = set(nodes.keys()) stages = [] while dependencies: dependents = set(dependencies.keys()) next_stage = unstaged.difference(dependents) stages.append(next_stage) unstaged.difference_update(next_stage) # Note that "dependencies" is a dictionary mapping each dependent # package to the set of not-yet-handled dependencies. The final step # below removes all the dependencies that are handled by this stage. dependencies = _remove_satisfied_deps(dependencies, next_stage) if unstaged: stages.append(unstaged.copy()) return nodes, edges, stages
def _print_staging_summary(spec_labels, stages, mirrors_to_check, rebuild_decisions): if not stages: return mirrors = spack.mirror.MirrorCollection(mirrors=mirrors_to_check, binary=True) tty.msg("Checked the following mirrors for binaries:") for m in mirrors.values(): tty.msg(f" {m.fetch_url}") tty.msg("Staging summary ([x] means a job needs rebuilding):") for stage_index, stage in enumerate(stages): tty.msg(f" stage {stage_index} ({len(stage)} jobs):") for job in sorted(stage, key=lambda j: (not rebuild_decisions[j].rebuild, j)): s = spec_labels[job] reason = rebuild_decisions[job].reason reason_msg = f" ({reason})" if reason else "" spec_fmt = "{name}{@version}{%compiler}{/hash:7}" if rebuild_decisions[job].rebuild: status = colorize("@*g{[x]} ") msg = f" {status}{s.cformat(spec_fmt)}{reason_msg}" else: msg = f"{s.format(spec_fmt)}{reason_msg}" if rebuild_decisions[job].mirrors: msg += f" [{', '.join(rebuild_decisions[job].mirrors)}]" msg = colorize(f" @K - {cescape(msg)}@.") tty.msg(msg) def _extract_dag(specs: List[spack.spec.Spec]) -> Tuple[PlainNodes, PlainEdges]: """Extract a sub-DAG as plain old Python objects with external nodes removed.""" nodes: PlainNodes = {} edges: PlainEdges = defaultdict(set) for edge in traverse.traverse_edges(specs, cover="edges"): if (edge.parent and edge.parent.external) or edge.spec.external: continue child_id = _spec_ci_label(edge.spec) nodes[child_id] = edge.spec if edge.parent: parent_id = _spec_ci_label(edge.parent) nodes[parent_id] = edge.parent edges[parent_id].add(child_id) return nodes, edges def _spec_matches(spec, match_string): return spec.intersects(match_string) def _format_job_needs( dep_jobs, build_group, prune_dag, rebuild_decisions, enable_artifacts_buildcache ): needs_list = [] for dep_job in dep_jobs: dep_spec_key = _spec_ci_label(dep_job) rebuild = rebuild_decisions[dep_spec_key].rebuild if not prune_dag or rebuild: needs_list.append( { "job": get_job_name(dep_job, build_group), "artifacts": enable_artifacts_buildcache, } ) return needs_list
[docs] def get_change_revisions(): """If this is a git repo get the revisions to use when checking for changed packages and spack core modules.""" git_dir = os.path.join(spack.paths.prefix, ".git") if os.path.exists(git_dir) and os.path.isdir(git_dir): # TODO: This will only find changed packages from the last # TODO: commit. While this may work for single merge commits # TODO: when merging the topic branch into the base, it will # TODO: require more thought outside of that narrow case. return "HEAD^", "HEAD" return None, None
[docs] def get_stack_changed(env_path, rev1="HEAD^", rev2="HEAD"): """Given an environment manifest path and two revisions to compare, return whether or not the stack was changed. Returns True if the environment manifest changed between the provided revisions (or additionally if the `.gitlab-ci.yml` file itself changed). Returns False otherwise.""" git = spack.util.git.git() if git: with fs.working_dir(spack.paths.prefix): git_log = git( "diff", "--name-only", rev1, rev2, output=str, error=os.devnull, fail_on_error=False, ).strip() lines = [] if not git_log else re.split(r"\s+", git_log) for path in lines: if ".gitlab-ci.yml" in path or path in env_path: tty.debug(f"env represented by {env_path} changed") tty.debug(f"touched file: {path}") return True return False
[docs] def compute_affected_packages(rev1="HEAD^", rev2="HEAD"): """Determine which packages were added, removed or changed between rev1 and rev2, and return the names as a set""" return spack.repo.get_all_package_diffs("ARC", rev1=rev1, rev2=rev2)
[docs] def get_spec_filter_list(env, affected_pkgs, dependent_traverse_depth=None): """Given a list of package names and an active/concretized environment, return the set of all concrete specs from the environment that could have been affected by changing the list of packages. If a ``dependent_traverse_depth`` is given, it is used to limit upward (in the parent direction) traversal of specs of touched packages. E.g. if 1 is provided, then only direct dependents of touched package specs are traversed to produce specs that could have been affected by changing the package, while if 0 is provided, only the changed specs themselves are traversed. If ``None`` is given, upward traversal of touched package specs is done all the way to the environment roots. Providing a negative number results in no traversals at all, yielding an empty set. Arguments: env (spack.environment.Environment): Active concrete environment affected_pkgs (List[str]): Affected package names dependent_traverse_depth: Optional integer to limit dependent traversal, or None to disable the limit. Returns: A set of concrete specs from the active environment including those associated with affected packages, their dependencies and dependents, as well as their dependents dependencies. """ affected_specs = set() all_concrete_specs = env.all_specs() tty.debug("All concrete environment specs:") for s in all_concrete_specs: tty.debug(f" {s.name}/{s.dag_hash()[:7]}") affected_pkgs = frozenset(affected_pkgs) env_matches = [s for s in all_concrete_specs if s.name in affected_pkgs] visited = set() dag_hash = lambda s: s.dag_hash() for depth, parent in traverse.traverse_nodes( env_matches, direction="parents", key=dag_hash, depth=True, order="breadth" ): if dependent_traverse_depth is not None and depth > dependent_traverse_depth: break affected_specs.update(parent.traverse(direction="children", visited=visited, key=dag_hash)) return affected_specs
def _build_jobs(spec_labels, stages): for stage_jobs in stages: for spec_label in stage_jobs: release_spec = spec_labels[spec_label] release_spec_dag_hash = release_spec.dag_hash() yield release_spec, release_spec_dag_hash def _noop(x): return x def _unpack_script(script_section, op=_noop): script = [] for cmd in script_section: if isinstance(cmd, list): for subcmd in cmd: script.append(op(subcmd)) else: script.append(op(cmd)) return script
[docs] class RebuildDecision: def __init__(self): self.rebuild = True self.mirrors = [] self.reason = ""
[docs] class SpackCI: """Spack CI object used to generate intermediate representation used by the CI generator(s). """ def __init__(self, ci_config, spec_labels, stages): """Given the information from the ci section of the config and the staged jobs, set up meta data needed for generating Spack CI IR. """ self.ci_config = ci_config self.named_jobs = ["any", "build", "copy", "cleanup", "noop", "reindex", "signing"] self.ir = { "jobs": {}, "temporary-storage-url-prefix": self.ci_config.get( "temporary-storage-url-prefix", None ), "enable-artifacts-buildcache": self.ci_config.get( "enable-artifacts-buildcache", False ), "rebuild-index": self.ci_config.get("rebuild-index", True), "broken-specs-url": self.ci_config.get("broken-specs-url", None), "broken-tests-packages": self.ci_config.get("broken-tests-packages", []), "target": self.ci_config.get("target", "gitlab"), } jobs = self.ir["jobs"] for spec, dag_hash in _build_jobs(spec_labels, stages): jobs[dag_hash] = self.__init_job(spec) for name in self.named_jobs: # Skip the special named jobs if name not in ["any", "build"]: jobs[name] = self.__init_job("") def __init_job(self, spec): """Initialize job object""" return {"spec": spec, "attributes": {}} def __is_named(self, section): """Check if a pipeline-gen configuration section is for a named job, and if so return the name otherwise return none. """ for _name in self.named_jobs: keys = [f"{_name}-job", f"{_name}-job-remove"] if any([key for key in keys if key in section]): return _name return None @staticmethod def __job_name(name, suffix=""): """Compute the name of a named job with appropriate suffix. Valid suffixes are either '-remove' or empty string or None """ assert isinstance(name, str) jname = name if suffix: jname = f"{name}-job{suffix}" else: jname = f"{name}-job" return jname def __apply_submapping(self, dest, spec, section): """Apply submapping setion to the IR dict""" matched = False only_first = section.get("match_behavior", "first") == "first" for match_attrs in reversed(section["submapping"]): attrs = cfg.InternalConfigScope._process_dict_keyname_overrides(match_attrs) for match_string in match_attrs["match"]: if _spec_matches(spec, match_string): matched = True if "build-job-remove" in match_attrs: spack.config.remove_yaml(dest, attrs["build-job-remove"]) if "build-job" in match_attrs: spack.config.merge_yaml(dest, attrs["build-job"]) break if matched and only_first: break return dest # Generate IR from the configs
[docs] def generate_ir(self): """Generate the IR from the Spack CI configurations.""" jobs = self.ir["jobs"] # Implicit job defaults defaults = [ { "build-job": { "script": [ "cd {env_dir}", "spack env activate --without-view .", "spack ci rebuild", ] } }, {"noop-job": {"script": ['echo "All specs already up to date, nothing to rebuild."']}}, ] # Job overrides overrides = [ # Reindex script { "reindex-job": { "script:": ["spack buildcache update-index --keys {index_target_mirror}"] } }, # Cleanup script { "cleanup-job": { "script:": ["spack -d mirror destroy {mirror_prefix}/$CI_PIPELINE_ID"] } }, # Add signing job tags {"signing-job": {"tags": ["aws", "protected", "notary"]}}, # Remove reserved tags {"any-job-remove": {"tags": SPACK_RESERVED_TAGS}}, ] pipeline_gen = overrides + self.ci_config.get("pipeline-gen", []) + defaults for section in reversed(pipeline_gen): name = self.__is_named(section) has_submapping = "submapping" in section section = cfg.InternalConfigScope._process_dict_keyname_overrides(section) if name: remove_job_name = self.__job_name(name, suffix="-remove") merge_job_name = self.__job_name(name) do_remove = remove_job_name in section do_merge = merge_job_name in section def _apply_section(dest, src): if do_remove: dest = spack.config.remove_yaml(dest, src[remove_job_name]) if do_merge: dest = copy.copy(spack.config.merge_yaml(dest, src[merge_job_name])) if name == "build": # Apply attributes to all build jobs for _, job in jobs.items(): if job["spec"]: _apply_section(job["attributes"], section) elif name == "any": # Apply section attributes too all jobs for _, job in jobs.items(): _apply_section(job["attributes"], section) else: # Create a signing job if there is script and the job hasn't # been initialized yet if name == "signing" and name not in jobs: if "signing-job" in section: if "script" not in section["signing-job"]: continue else: jobs[name] = self.__init_job("") # Apply attributes to named job _apply_section(jobs[name]["attributes"], section) elif has_submapping: # Apply section jobs with specs to match for _, job in jobs.items(): if job["spec"]: job["attributes"] = self.__apply_submapping( job["attributes"], job["spec"], section ) for _, job in jobs.items(): if job["spec"]: job["spec"] = job["spec"].name return self.ir
[docs] def generate_gitlab_ci_yaml( env, print_summary, output_file, prune_dag=False, check_index_only=False, run_optimizer=False, use_dependencies=False, artifacts_root=None, remote_mirror_override=None, ): """Generate a gitlab yaml file to run a dynamic child pipeline from the spec matrix in the active environment. Arguments: env (spack.environment.Environment): Activated environment object which must contain a gitlab-ci section describing how to map specs to runners print_summary (bool): Should we print a summary of all the jobs in the stages in which they were placed. output_file (str): File path where generated file should be written prune_dag (bool): If True, do not generate jobs for specs already exist built on the mirror. check_index_only (bool): If True, attempt to fetch the mirror index and only use that to determine whether built specs on the mirror this mode results in faster yaml generation time). Otherwise, also check each spec directly by url (useful if there is no index or it might be out of date). run_optimizer (bool): If True, post-process the generated yaml to try try to reduce the size (attempts to collect repeated configuration and replace with definitions).) use_dependencies (bool): If true, use "dependencies" rather than "needs" ("needs" allows DAG scheduling). Useful if gitlab instance cannot be configured to handle more than a few "needs" per job. artifacts_root (str): Path where artifacts like logs, environment files (spack.yaml, spack.lock), etc should be written. GitLab requires this to be within the project directory. remote_mirror_override (str): Typically only needed when one spack.yaml is used to populate several mirrors with binaries, based on some criteria. Spack protected pipelines populate different mirrors based on branch name, facilitated by this option. DEPRECATED """ with spack.concretize.disable_compiler_existence_check(): with env.write_transaction(): env.concretize() env.write() yaml_root = env.manifest[ev.TOP_LEVEL_KEY] # Get the joined "ci" config with all of the current scopes resolved ci_config = cfg.get("ci") config_deprecated = False if not ci_config: tty.warn("Environment does not have `ci` a configuration") gitlabci_config = yaml_root.get("gitlab-ci") if not gitlabci_config: tty.die("Environment yaml does not have `gitlab-ci` config section. Cannot recover.") tty.warn( "The `gitlab-ci` configuration is deprecated in favor of `ci`.\n", "To update run \n\t$ spack env update /path/to/ci/spack.yaml", ) translate_deprecated_config(gitlabci_config) ci_config = gitlabci_config config_deprecated = True # Default target is gitlab...and only target is gitlab if not ci_config.get("target", "gitlab") == "gitlab": tty.die('Spack CI module only generates target "gitlab"') cdash_config = cfg.get("cdash") cdash_handler = CDashHandler(cdash_config) if "build-group" in cdash_config else None build_group = cdash_handler.build_group if cdash_handler else None dependent_depth = os.environ.get("SPACK_PRUNE_UNTOUCHED_DEPENDENT_DEPTH", None) if dependent_depth is not None: try: dependent_depth = int(dependent_depth) except (TypeError, ValueError): tty.warn( f"Unrecognized value ({dependent_depth}) " "provided for SPACK_PRUNE_UNTOUCHED_DEPENDENT_DEPTH, " "ignoring it." ) dependent_depth = None prune_untouched_packages = False spack_prune_untouched = os.environ.get("SPACK_PRUNE_UNTOUCHED", None) if spack_prune_untouched is not None and spack_prune_untouched.lower() == "true": # Requested to prune untouched packages, but assume we won't do that # unless we're actually in a git repo. rev1, rev2 = get_change_revisions() tty.debug(f"Got following revisions: rev1={rev1}, rev2={rev2}") if rev1 and rev2: # If the stack file itself did not change, proceed with pruning if not get_stack_changed(env.manifest_path, rev1, rev2): prune_untouched_packages = True affected_pkgs = compute_affected_packages(rev1, rev2) tty.debug("affected pkgs:") for p in affected_pkgs: tty.debug(f" {p}") affected_specs = get_spec_filter_list( env, affected_pkgs, dependent_traverse_depth=dependent_depth ) tty.debug("all affected specs:") for s in affected_specs: tty.debug(f" {s.name}/{s.dag_hash()[:7]}") # Allow overriding --prune-dag cli opt with environment variable prune_dag_override = os.environ.get("SPACK_PRUNE_UP_TO_DATE", None) if prune_dag_override is not None: prune_dag = True if prune_dag_override.lower() == "true" else False # If we are not doing any kind of pruning, we are rebuilding everything rebuild_everything = not prune_dag and not prune_untouched_packages # Downstream jobs will "need" (depend on, for both scheduling and # artifacts, which include spack.lock file) this pipeline generation # job by both name and pipeline id. If those environment variables # do not exist, then maybe this is just running in a shell, in which # case, there is no expectation gitlab will ever run the generated # pipeline and those environment variables do not matter. generate_job_name = os.environ.get("CI_JOB_NAME", "job-does-not-exist") parent_pipeline_id = os.environ.get("CI_PIPELINE_ID", "pipeline-does-not-exist") # Values: "spack_pull_request", "spack_protected_branch", or not set spack_pipeline_type = os.environ.get("SPACK_PIPELINE_TYPE", None) copy_only_pipeline = spack_pipeline_type == "spack_copy_only" if copy_only_pipeline and config_deprecated: tty.warn( "SPACK_PIPELINE_TYPE=spack_copy_only is not supported when using\n", "deprecated ci configuration, a no-op pipeline will be generated\n", "instead.", ) pipeline_mirrors = spack.mirror.MirrorCollection(binary=True) deprecated_mirror_config = False buildcache_destination = None if "buildcache-destination" in pipeline_mirrors: if remote_mirror_override: tty.die( "Using the deprecated --buildcache-destination cli option and " "having a mirror named 'buildcache-destination' at the same time " "is not allowed" ) buildcache_destination = pipeline_mirrors["buildcache-destination"] else: deprecated_mirror_config = True # TODO: This will be an error in Spack 0.23 # TODO: Remove this block in spack 0.23 remote_mirror_url = None if deprecated_mirror_config: if "mirrors" not in yaml_root or len(yaml_root["mirrors"].values()) < 1: tty.die("spack ci generate requires an env containing a mirror") ci_mirrors = yaml_root["mirrors"] mirror_urls = [url for url in ci_mirrors.values()] remote_mirror_url = mirror_urls[0] spack_buildcache_copy = os.environ.get("SPACK_COPY_BUILDCACHE", None) if spack_buildcache_copy: buildcache_copies = {} buildcache_copy_src_prefix = ( buildcache_destination.fetch_url if buildcache_destination else remote_mirror_override or remote_mirror_url ) buildcache_copy_dest_prefix = spack_buildcache_copy # Check for a list of "known broken" specs that we should not bother # trying to build. broken_specs_url = "" known_broken_specs_encountered = [] if "broken-specs-url" in ci_config: broken_specs_url = ci_config["broken-specs-url"] enable_artifacts_buildcache = False if "enable-artifacts-buildcache" in ci_config: tty.warn("Support for enable-artifacts-buildcache will be removed in Spack 0.23") enable_artifacts_buildcache = ci_config["enable-artifacts-buildcache"] rebuild_index_enabled = True if "rebuild-index" in ci_config and ci_config["rebuild-index"] is False: rebuild_index_enabled = False temp_storage_url_prefix = None if "temporary-storage-url-prefix" in ci_config: tty.warn("Support for temporary-storage-url-prefix will be removed in Spack 0.23") temp_storage_url_prefix = ci_config["temporary-storage-url-prefix"] # If a remote mirror override (alternate buildcache destination) was # specified, add it here in case it has already built hashes we might # generate. # TODO: Remove this block in Spack 0.23 mirrors_to_check = None if deprecated_mirror_config and remote_mirror_override: if spack_pipeline_type == "spack_protected_branch": # Overriding the main mirror in this case might result # in skipping jobs on a release pipeline because specs are # up to date in develop. Eventually we want to notice and take # advantage of this by scheduling a job to copy the spec from # develop to the release, but until we have that, this makes # sure we schedule a rebuild job if the spec isn't already in # override mirror. mirrors_to_check = {"override": remote_mirror_override} # If we have a remote override and we want generate pipeline using # --check-index-only, then the override mirror needs to be added to # the configured mirrors when bindist.update() is run, or else we # won't fetch its index and include in our local cache. spack.mirror.add( spack.mirror.Mirror(remote_mirror_override, name="ci_pr_mirror"), cfg.default_modify_scope(), ) # TODO: Remove this block in Spack 0.23 shared_pr_mirror = None if deprecated_mirror_config and spack_pipeline_type == "spack_pull_request": stack_name = os.environ.get("SPACK_CI_STACK_NAME", "") shared_pr_mirror = url_util.join(SHARED_PR_MIRROR_URL, stack_name) spack.mirror.add( spack.mirror.Mirror(shared_pr_mirror, name="ci_shared_pr_mirror"), cfg.default_modify_scope(), ) pipeline_artifacts_dir = artifacts_root if not pipeline_artifacts_dir: proj_dir = os.environ.get("CI_PROJECT_DIR", os.getcwd()) pipeline_artifacts_dir = os.path.join(proj_dir, "jobs_scratch_dir") pipeline_artifacts_dir = os.path.abspath(pipeline_artifacts_dir) concrete_env_dir = os.path.join(pipeline_artifacts_dir, "concrete_environment") # Now that we've added the mirrors we know about, they should be properly # reflected in the environment manifest file, so copy that into the # concrete environment directory, along with the spack.lock file. if not os.path.exists(concrete_env_dir): os.makedirs(concrete_env_dir) shutil.copyfile(env.manifest_path, os.path.join(concrete_env_dir, "spack.yaml")) shutil.copyfile(env.lock_path, os.path.join(concrete_env_dir, "spack.lock")) with open(env.manifest_path, "r") as env_fd: env_yaml_root = syaml.load(env_fd) # Add config scopes to environment env_includes = env_yaml_root["spack"].get("include", []) cli_scopes = [ os.path.relpath(s.path, concrete_env_dir) for s in cfg.scopes().values() if isinstance(s, cfg.ImmutableConfigScope) and s.path not in env_includes and os.path.exists(s.path) ] include_scopes = [] for scope in cli_scopes: if scope not in include_scopes and scope not in env_includes: include_scopes.insert(0, scope) env_includes.extend(include_scopes) env_yaml_root["spack"]["include"] = env_includes if "gitlab-ci" in env_yaml_root["spack"] and "ci" not in env_yaml_root["spack"]: env_yaml_root["spack"]["ci"] = env_yaml_root["spack"].pop("gitlab-ci") translate_deprecated_config(env_yaml_root["spack"]["ci"]) with open(os.path.join(concrete_env_dir, "spack.yaml"), "w") as fd: fd.write(syaml.dump_config(env_yaml_root, default_flow_style=False)) job_log_dir = os.path.join(pipeline_artifacts_dir, "logs") job_repro_dir = os.path.join(pipeline_artifacts_dir, "reproduction") job_test_dir = os.path.join(pipeline_artifacts_dir, "tests") # TODO: Remove this line in Spack 0.23 local_mirror_dir = os.path.join(pipeline_artifacts_dir, "mirror") user_artifacts_dir = os.path.join(pipeline_artifacts_dir, "user_data") # We communicate relative paths to the downstream jobs to avoid issues in # situations where the CI_PROJECT_DIR varies between the pipeline # generation job and the rebuild jobs. This can happen when gitlab # checks out the project into a runner-specific directory, for example, # and different runners are picked for generate and rebuild jobs. ci_project_dir = os.environ.get("CI_PROJECT_DIR", os.getcwd()) rel_artifacts_root = os.path.relpath(pipeline_artifacts_dir, ci_project_dir) rel_concrete_env_dir = os.path.relpath(concrete_env_dir, ci_project_dir) rel_job_log_dir = os.path.relpath(job_log_dir, ci_project_dir) rel_job_repro_dir = os.path.relpath(job_repro_dir, ci_project_dir) rel_job_test_dir = os.path.relpath(job_test_dir, ci_project_dir) # TODO: Remove this line in Spack 0.23 rel_local_mirror_dir = os.path.join(local_mirror_dir, ci_project_dir) rel_user_artifacts_dir = os.path.relpath(user_artifacts_dir, ci_project_dir) # Speed up staging by first fetching binary indices from all mirrors try: bindist.BINARY_INDEX.update() except bindist.FetchCacheError as e: tty.warn(e) spec_labels, dependencies, stages = stage_spec_jobs( [ concrete for abstract, concrete in env.concretized_specs() if abstract in env.spec_lists["specs"] ] ) all_job_names = [] output_object = {} job_id = 0 stage_id = 0 stage_names = [] max_length_needs = 0 max_needs_job = "" # If this is configured, spack will fail "spack ci generate" if it # generates any hash which exists under the broken specs url. broken_spec_urls = None if broken_specs_url: if broken_specs_url.startswith("http"): # To make checking each spec against the list faster, we require # a url protocol that allows us to iterate the url in advance. tty.msg("Cannot use an http(s) url for broken specs, ignoring") else: broken_spec_urls = web_util.list_url(broken_specs_url) spack_ci = SpackCI(ci_config, spec_labels, stages) spack_ci_ir = spack_ci.generate_ir() rebuild_decisions = {} for stage_jobs in stages: stage_name = f"stage-{stage_id}" stage_names.append(stage_name) stage_id += 1 for spec_label in stage_jobs: release_spec = spec_labels[spec_label] release_spec_dag_hash = release_spec.dag_hash() spec_record = RebuildDecision() rebuild_decisions[spec_label] = spec_record if prune_untouched_packages: if release_spec not in affected_specs: spec_record.rebuild = False spec_record.reason = "Pruned, untouched by change." continue up_to_date_mirrors = bindist.get_mirrors_for_spec( spec=release_spec, mirrors_to_check=mirrors_to_check, index_only=check_index_only ) spec_record.rebuild = not up_to_date_mirrors if up_to_date_mirrors: spec_record.reason = "Pruned, found in mirrors" spec_record.mirrors = [m["mirror_url"] for m in up_to_date_mirrors] else: spec_record.reason = "Scheduled, not found anywhere" job_object = spack_ci_ir["jobs"][release_spec_dag_hash]["attributes"] if not job_object: tty.warn(f"No match found for {release_spec}, skipping it") continue if spack_pipeline_type is not None: # For spack pipelines "public" and "protected" are reserved tags job_object["tags"] = _remove_reserved_tags(job_object.get("tags", [])) if spack_pipeline_type == "spack_protected_branch": job_object["tags"].extend(["protected"]) elif spack_pipeline_type == "spack_pull_request": job_object["tags"].extend(["public"]) if "script" not in job_object: raise AttributeError def main_script_replacements(cmd): return cmd.replace("{env_dir}", rel_concrete_env_dir) job_object["script"] = _unpack_script( job_object["script"], op=main_script_replacements ) if "before_script" in job_object: job_object["before_script"] = _unpack_script(job_object["before_script"]) if "after_script" in job_object: job_object["after_script"] = _unpack_script(job_object["after_script"]) job_name = get_job_name(release_spec, build_group) job_vars = job_object.setdefault("variables", {}) job_vars["SPACK_JOB_SPEC_DAG_HASH"] = release_spec_dag_hash job_vars["SPACK_JOB_SPEC_PKG_NAME"] = release_spec.name job_vars["SPACK_JOB_SPEC_PKG_VERSION"] = release_spec.format("{version}") job_vars["SPACK_JOB_SPEC_COMPILER_NAME"] = release_spec.format("{compiler.name}") job_vars["SPACK_JOB_SPEC_COMPILER_VERSION"] = release_spec.format("{compiler.version}") job_vars["SPACK_JOB_SPEC_ARCH"] = release_spec.format("{architecture}") job_vars["SPACK_JOB_SPEC_VARIANTS"] = release_spec.format("{variants}") job_object["needs"] = [] if spec_label in dependencies: if enable_artifacts_buildcache: # Get dependencies transitively, so they're all # available in the artifacts buildcache. dep_jobs = [d for d in release_spec.traverse(deptype="all", root=False)] else: # In this case, "needs" is only used for scheduling # purposes, so we only get the direct dependencies. dep_jobs = [] for dep_label in dependencies[spec_label]: dep_jobs.append(spec_labels[dep_label]) job_object["needs"].extend( _format_job_needs( dep_jobs, build_group, prune_dag, rebuild_decisions, enable_artifacts_buildcache, ) ) rebuild_spec = spec_record.rebuild if not rebuild_spec and not copy_only_pipeline: if prune_dag: spec_record.reason = "Pruned, up-to-date" continue else: # DAG pruning is disabled, force the spec to rebuild. The # record still contains any mirrors on which the spec # may have been found, so we can print them in the staging # summary. spec_record.rebuild = True spec_record.reason = "Scheduled, DAG pruning disabled" if broken_spec_urls is not None and release_spec_dag_hash in broken_spec_urls: known_broken_specs_encountered.append(release_spec_dag_hash) # Only keep track of these if we are copying rebuilt cache entries if spack_buildcache_copy: # TODO: This assumes signed version of the spec buildcache_copies[release_spec_dag_hash] = [ { "src": url_util.join( buildcache_copy_src_prefix, bindist.build_cache_relative_path(), bindist.tarball_name(release_spec, ".spec.json.sig"), ), "dest": url_util.join( buildcache_copy_dest_prefix, bindist.build_cache_relative_path(), bindist.tarball_name(release_spec, ".spec.json.sig"), ), }, { "src": url_util.join( buildcache_copy_src_prefix, bindist.build_cache_relative_path(), bindist.tarball_path_name(release_spec, ".spack"), ), "dest": url_util.join( buildcache_copy_dest_prefix, bindist.build_cache_relative_path(), bindist.tarball_path_name(release_spec, ".spack"), ), }, ] if artifacts_root: job_object["needs"].append( {"job": generate_job_name, "pipeline": f"{parent_pipeline_id}"} ) # Let downstream jobs know whether the spec needed rebuilding, regardless # whether DAG pruning was enabled or not. job_vars["SPACK_SPEC_NEEDS_REBUILD"] = str(rebuild_spec) if cdash_handler: cdash_handler.current_spec = release_spec build_name = cdash_handler.build_name all_job_names.append(build_name) job_vars["SPACK_CDASH_BUILD_NAME"] = build_name build_stamp = cdash_handler.build_stamp job_vars["SPACK_CDASH_BUILD_STAMP"] = build_stamp job_object["artifacts"] = spack.config.merge_yaml( job_object.get("artifacts", {}), { "when": "always", "paths": [ rel_job_log_dir, rel_job_repro_dir, rel_job_test_dir, rel_user_artifacts_dir, ], }, ) # TODO: Remove this block in Spack 0.23 if enable_artifacts_buildcache: bc_root = os.path.join(local_mirror_dir, "build_cache") job_object["artifacts"]["paths"].extend( [ os.path.join(bc_root, p) for p in [ bindist.tarball_name(release_spec, ".spec.json"), bindist.tarball_directory_name(release_spec), ] ] ) job_object["stage"] = stage_name job_object["retry"] = {"max": 2, "when": JOB_RETRY_CONDITIONS} job_object["interruptible"] = True length_needs = len(job_object["needs"]) if length_needs > max_length_needs: max_length_needs = length_needs max_needs_job = job_name if not copy_only_pipeline: output_object[job_name] = job_object job_id += 1 if print_summary: _print_staging_summary(spec_labels, stages, mirrors_to_check, rebuild_decisions) # Clean up remote mirror override if enabled # TODO: Remove this block in Spack 0.23 if deprecated_mirror_config: if remote_mirror_override: spack.mirror.remove("ci_pr_mirror", cfg.default_modify_scope()) if spack_pipeline_type == "spack_pull_request": spack.mirror.remove("ci_shared_pr_mirror", cfg.default_modify_scope()) tty.debug(f"{job_id} build jobs generated in {stage_id} stages") if job_id > 0: tty.debug(f"The max_needs_job is {max_needs_job}, with {max_length_needs} needs") # Use "all_job_names" to populate the build group for this set if cdash_handler and cdash_handler.auth_token: try: cdash_handler.populate_buildgroup(all_job_names) except (SpackError, HTTPError, URLError) as err: tty.warn(f"Problem populating buildgroup: {err}") else: tty.warn("Unable to populate buildgroup without CDash credentials") service_job_retries = { "max": 2, "when": ["runner_system_failure", "stuck_or_timeout_failure", "script_failure"], } if copy_only_pipeline and not config_deprecated: stage_names.append("copy") sync_job = copy.deepcopy(spack_ci_ir["jobs"]["copy"]["attributes"]) sync_job["stage"] = "copy" if artifacts_root: sync_job["needs"] = [{"job": generate_job_name, "pipeline": f"{parent_pipeline_id}"}] if "variables" not in sync_job: sync_job["variables"] = {} sync_job["variables"]["SPACK_COPY_ONLY_DESTINATION"] = ( buildcache_destination.fetch_url if buildcache_destination else remote_mirror_override or remote_mirror_url ) if "buildcache-source" in pipeline_mirrors: buildcache_source = pipeline_mirrors["buildcache-source"].fetch_url else: # TODO: Remove this condition in Spack 0.23 buildcache_source = os.environ.get("SPACK_SOURCE_MIRROR", None) sync_job["variables"]["SPACK_BUILDCACHE_SOURCE"] = buildcache_source sync_job["dependencies"] = [] output_object["copy"] = sync_job job_id += 1 if job_id > 0: # TODO: Remove this block in Spack 0.23 if temp_storage_url_prefix: # There were some rebuild jobs scheduled, so we will need to # schedule a job to clean up the temporary storage location # associated with this pipeline. stage_names.append("cleanup-temp-storage") cleanup_job = copy.deepcopy(spack_ci_ir["jobs"]["cleanup"]["attributes"]) cleanup_job["stage"] = "cleanup-temp-storage" cleanup_job["when"] = "always" cleanup_job["retry"] = service_job_retries cleanup_job["interruptible"] = True cleanup_job["script"] = _unpack_script( cleanup_job["script"], op=lambda cmd: cmd.replace("mirror_prefix", temp_storage_url_prefix), ) cleanup_job["dependencies"] = [] output_object["cleanup"] = cleanup_job if ( "script" in spack_ci_ir["jobs"]["signing"]["attributes"] and spack_pipeline_type == "spack_protected_branch" ): # External signing: generate a job to check and sign binary pkgs stage_names.append("stage-sign-pkgs") signing_job = spack_ci_ir["jobs"]["signing"]["attributes"] signing_job["script"] = _unpack_script(signing_job["script"]) signing_job["stage"] = "stage-sign-pkgs" signing_job["when"] = "always" signing_job["retry"] = {"max": 2, "when": ["always"]} signing_job["interruptible"] = True if "variables" not in signing_job: signing_job["variables"] = {} signing_job["variables"]["SPACK_BUILDCACHE_DESTINATION"] = ( buildcache_destination.push_url # need the s3 url for aws s3 sync if buildcache_destination else remote_mirror_override or remote_mirror_url ) signing_job["dependencies"] = [] output_object["sign-pkgs"] = signing_job if rebuild_index_enabled: # Add a final job to regenerate the index stage_names.append("stage-rebuild-index") final_job = spack_ci_ir["jobs"]["reindex"]["attributes"] final_job["stage"] = "stage-rebuild-index" target_mirror = remote_mirror_override or remote_mirror_url if buildcache_destination: target_mirror = buildcache_destination.push_url final_job["script"] = _unpack_script( final_job["script"], op=lambda cmd: cmd.replace("{index_target_mirror}", target_mirror), ) final_job["when"] = "always" final_job["retry"] = service_job_retries final_job["interruptible"] = True final_job["dependencies"] = [] output_object["rebuild-index"] = final_job output_object["stages"] = stage_names # Capture the version of Spack used to generate the pipeline, that can be # passed to `git checkout` for version consistency. If we aren't in a Git # repository, presume we are a Spack release and use the Git tag instead. spack_version = spack.main.get_version() version_to_clone = spack.main.get_spack_commit() or f"v{spack.spack_version}" output_object["variables"] = { "SPACK_ARTIFACTS_ROOT": rel_artifacts_root, "SPACK_CONCRETE_ENV_DIR": rel_concrete_env_dir, "SPACK_VERSION": spack_version, "SPACK_CHECKOUT_VERSION": version_to_clone, # TODO: Remove this line in Spack 0.23 "SPACK_REMOTE_MIRROR_URL": remote_mirror_url, "SPACK_JOB_LOG_DIR": rel_job_log_dir, "SPACK_JOB_REPRO_DIR": rel_job_repro_dir, "SPACK_JOB_TEST_DIR": rel_job_test_dir, # TODO: Remove this line in Spack 0.23 "SPACK_LOCAL_MIRROR_DIR": rel_local_mirror_dir, "SPACK_PIPELINE_TYPE": str(spack_pipeline_type), "SPACK_CI_STACK_NAME": os.environ.get("SPACK_CI_STACK_NAME", "None"), # TODO: Remove this line in Spack 0.23 "SPACK_CI_SHARED_PR_MIRROR_URL": shared_pr_mirror or "None", "SPACK_REBUILD_CHECK_UP_TO_DATE": str(prune_dag), "SPACK_REBUILD_EVERYTHING": str(rebuild_everything), "SPACK_REQUIRE_SIGNING": os.environ.get("SPACK_REQUIRE_SIGNING", "False"), } # TODO: Remove this block in Spack 0.23 if deprecated_mirror_config and remote_mirror_override: (output_object["variables"]["SPACK_REMOTE_MIRROR_OVERRIDE"]) = remote_mirror_override spack_stack_name = os.environ.get("SPACK_CI_STACK_NAME", None) if spack_stack_name: output_object["variables"]["SPACK_CI_STACK_NAME"] = spack_stack_name if spack_buildcache_copy: # Write out the file describing specs that should be copied copy_specs_dir = os.path.join(pipeline_artifacts_dir, "specs_to_copy") if not os.path.exists(copy_specs_dir): os.makedirs(copy_specs_dir) copy_specs_file = os.path.join( copy_specs_dir, f"copy_{spack_stack_name if spack_stack_name else 'rebuilt'}_specs.json", ) with open(copy_specs_file, "w") as fd: fd.write(json.dumps(buildcache_copies)) # TODO(opadron): remove this or refactor if run_optimizer: import spack.ci_optimization as ci_opt output_object = ci_opt.optimizer(output_object) # TODO(opadron): remove this or refactor if use_dependencies: import spack.ci_needs_workaround as cinw output_object = cinw.needs_to_dependencies(output_object) else: # No jobs were generated noop_job = spack_ci_ir["jobs"]["noop"]["attributes"] noop_job["retry"] = service_job_retries if copy_only_pipeline and config_deprecated: tty.debug("Generating no-op job as copy-only is unsupported here.") noop_job["script"] = [ 'echo "copy-only pipelines are not supported with deprecated ci configs"' ] output_object = {"unsupported-copy": noop_job} else: tty.debug("No specs to rebuild, generating no-op job") output_object = {"no-specs-to-rebuild": noop_job} # Ensure the child pipeline always runs output_object["workflow"] = {"rules": [{"when": "always"}]} sorted_output = {} for output_key, output_value in sorted(output_object.items()): sorted_output[output_key] = output_value if known_broken_specs_encountered: tty.error("This pipeline generated hashes known to be broken on develop:") display_broken_spec_messages(broken_specs_url, known_broken_specs_encountered) if not rebuild_everything: sys.exit(1) with open(output_file, "w") as outf: outf.write(syaml.dump(sorted_output, default_flow_style=True))
def _url_encode_string(input_string): encoded_keyval = urlencode({"donotcare": input_string}) eq_idx = encoded_keyval.find("=") + 1 encoded_value = encoded_keyval[eq_idx:] return encoded_value
[docs] def import_signing_key(base64_signing_key): """Given Base64-encoded gpg key, decode and import it to use for signing packages. Arguments: base64_signing_key (str): A gpg key including the secret key, armor-exported and base64 encoded, so it can be stored in a gitlab CI variable. For an example of how to generate such a key, see: https://github.com/spack/spack-infrastructure/blob/main/gitlab-docker/files/gen-key """ if not base64_signing_key: tty.warn("No key found for signing/verifying packages") return tty.debug("ci.import_signing_key() will attempt to import a key") # This command has the side-effect of creating the directory referred # to as GNUPGHOME in setup_environment() list_output = spack_gpg("list", output=str) tty.debug("spack gpg list:") tty.debug(list_output) decoded_key = base64.b64decode(base64_signing_key) if isinstance(decoded_key, bytes): decoded_key = decoded_key.decode("utf8") with TemporaryDirectory() as tmpdir: sign_key_path = os.path.join(tmpdir, "signing_key") with open(sign_key_path, "w") as fd: fd.write(decoded_key) key_import_output = spack_gpg("trust", sign_key_path, output=str) tty.debug(f"spack gpg trust {sign_key_path}") tty.debug(key_import_output) # Now print the keys we have for verifying and signing trusted_keys_output = spack_gpg("list", "--trusted", output=str) signing_keys_output = spack_gpg("list", "--signing", output=str) tty.debug("spack gpg list --trusted") tty.debug(trusted_keys_output) tty.debug("spack gpg list --signing") tty.debug(signing_keys_output)
[docs] def can_sign_binaries(): """Utility method to determine if this spack instance is capable of signing binary packages. This is currently only possible if the spack gpg keystore contains exactly one secret key.""" return len(gpg_util.signing_keys()) == 1
[docs] def can_verify_binaries(): """Utility method to determin if this spack instance is capable (at least in theory) of verifying signed binaries.""" return len(gpg_util.public_keys()) >= 1
def _push_to_build_cache(spec: spack.spec.Spec, sign_binaries: bool, mirror_url: str) -> None: """Unchecked version of the public API, for easier mocking""" bindist.push_or_raise( spec, spack.mirror.Mirror.from_url(mirror_url).push_url, bindist.PushOptions(force=True, unsigned=not sign_binaries), )
[docs] def push_to_build_cache(spec: spack.spec.Spec, mirror_url: str, sign_binaries: bool) -> bool: """Push one or more binary packages to the mirror. Arguments: spec: Installed spec to push mirror_url: URL of target mirror sign_binaries: If True, spack will attempt to sign binary package before pushing. """ tty.debug(f"Pushing to build cache ({'signed' if sign_binaries else 'unsigned'})") try: _push_to_build_cache(spec, sign_binaries, mirror_url) return True except bindist.PushToBuildCacheError as e: tty.error(str(e)) return False except Exception as e: # TODO (zackgalbreath): write an adapter for boto3 exceptions so we can catch a specific # exception instead of parsing str(e)... msg = str(e) if any(x in msg for x in ["Access Denied", "InvalidAccessKeyId"]): tty.error(f"Permission problem writing to {mirror_url}: {msg}") return False raise
[docs] def remove_other_mirrors(mirrors_to_keep, scope=None): """Remove all mirrors from the given config scope, the exceptions being any listed in in mirrors_to_keep, which is a list of mirror urls. """ mirrors_to_remove = [] for name, mirror_url in spack.config.get("mirrors", scope=scope).items(): if mirror_url not in mirrors_to_keep: mirrors_to_remove.append(name) for mirror_name in mirrors_to_remove: spack.mirror.remove(mirror_name, scope)
[docs] def copy_files_to_artifacts(src, artifacts_dir): """ Copy file(s) to the given artifacts directory Parameters: src (str): the glob-friendly path expression for the file(s) to copy artifacts_dir (str): the destination directory """ try: fs.copy(src, artifacts_dir) except Exception as err: msg = ( f"Unable to copy files ({src}) to artifacts {artifacts_dir} due to " f"exception: {str(err)}" ) tty.warn(msg)
[docs] def copy_stage_logs_to_artifacts(job_spec: spack.spec.Spec, job_log_dir: str) -> None: """Copy selected build stage file(s) to the given artifacts directory Looks for build logs in the stage directory of the given job_spec, and attempts to copy the files into the directory given by job_log_dir. Args: job_spec: spec associated with spack install log job_log_dir: path into which build log should be copied """ tty.debug(f"job spec: {job_spec}") if not job_spec: msg = f"Cannot copy stage logs: job spec ({job_spec}) is required" tty.error(msg) return try: pkg_cls = spack.repo.PATH.get_pkg_class(job_spec.name) job_pkg = pkg_cls(job_spec) tty.debug(f"job package: {job_pkg}") except AssertionError: msg = f"Cannot copy stage logs: job spec ({job_spec}) must be concrete" tty.error(msg) return stage_dir = job_pkg.stage.path tty.debug(f"stage dir: {stage_dir}") for file in [job_pkg.log_path, job_pkg.env_mods_path, *job_pkg.builder.archive_files]: copy_files_to_artifacts(file, job_log_dir)
[docs] def copy_test_logs_to_artifacts(test_stage, job_test_dir): """ Copy test log file(s) to the given artifacts directory Parameters: test_stage (str): test stage path job_test_dir (str): the destination artifacts test directory """ tty.debug(f"test stage: {test_stage}") if not os.path.exists(test_stage): msg = f"Cannot copy test logs: job test stage ({test_stage}) does not exist" tty.error(msg) return copy_files_to_artifacts(os.path.join(test_stage, "*", "*.txt"), job_test_dir)
[docs] def download_and_extract_artifacts(url, work_dir): """Look for gitlab artifacts.zip at the given url, and attempt to download and extract the contents into the given work_dir Arguments: url (str): Complete url to artifacts.zip file work_dir (str): Path to destination where artifacts should be extracted """ tty.msg(f"Fetching artifacts from: {url}\n") headers = {"Content-Type": "application/zip"} token = os.environ.get("GITLAB_PRIVATE_TOKEN", None) if token: headers["PRIVATE-TOKEN"] = token opener = build_opener(HTTPHandler) request = Request(url, headers=headers) request.get_method = lambda: "GET" response = opener.open(request) response_code = response.getcode() if response_code != 200: msg = f"Error response code ({response_code}) in reproduce_ci_job" raise SpackError(msg) artifacts_zip_path = os.path.join(work_dir, "artifacts.zip") if not os.path.exists(work_dir): os.makedirs(work_dir) with open(artifacts_zip_path, "wb") as out_file: shutil.copyfileobj(response, out_file) zip_file = zipfile.ZipFile(artifacts_zip_path) zip_file.extractall(work_dir) zip_file.close() os.remove(artifacts_zip_path)
[docs] def get_spack_info(): """If spack is running from a git repo, return the most recent git log entry, otherwise, return a string containing the spack version.""" git_path = os.path.join(spack.paths.prefix, ".git") if os.path.exists(git_path): git = spack.util.git.git() if git: with fs.working_dir(spack.paths.prefix): git_log = git("log", "-1", output=str, error=os.devnull, fail_on_error=False) return git_log return f"no git repo, use spack {spack.spack_version}"
[docs] def setup_spack_repro_version(repro_dir, checkout_commit, merge_commit=None): """Look in the local spack clone to find the checkout_commit, and if provided, the merge_commit given as arguments. If those commits can be found locally, then clone spack and attempt to recreate a merge commit with the same parent commits as tested in gitlab. This looks something like 1) git clone repo && cd repo 2) git checkout <checkout_commit> 3) git merge <merge_commit>. If there is no merge_commit provided, then skip step (3). Arguments: repro_dir (str): Location where spack should be cloned checkout_commit (str): SHA of PR branch commit merge_commit (str): SHA of target branch parent Returns: True if git repo state was successfully recreated, or False otherwise. """ # figure out the path to the spack git version being used for the # reproduction print(f"checkout_commit: {checkout_commit}") print(f"merge_commit: {merge_commit}") dot_git_path = os.path.join(spack.paths.prefix, ".git") if not os.path.exists(dot_git_path): tty.error("Unable to find the path to your local spack clone") return False spack_git_path = spack.paths.prefix git = spack.util.git.git() if not git: tty.error("reproduction of pipeline job requires git") return False # Check if we can find the tested commits in your local spack repo with fs.working_dir(spack_git_path): git("log", "-1", checkout_commit, output=str, error=os.devnull, fail_on_error=False) if git.returncode != 0: tty.error(f"Missing commit: {checkout_commit}") return False if merge_commit: git("log", "-1", merge_commit, output=str, error=os.devnull, fail_on_error=False) if git.returncode != 0: tty.error(f"Missing commit: {merge_commit}") return False # Next attempt to clone your local spack repo into the repro dir with fs.working_dir(repro_dir): clone_out = git( "clone", spack_git_path, "spack", output=str, error=os.devnull, fail_on_error=False ) if git.returncode != 0: tty.error("Unable to clone your local spack repo:") tty.msg(clone_out) return False # Finally, attempt to put the cloned repo into the same state used during # the pipeline build job repro_spack_path = os.path.join(repro_dir, "spack") with fs.working_dir(repro_spack_path): co_out = git( "checkout", checkout_commit, output=str, error=os.devnull, fail_on_error=False ) if git.returncode != 0: tty.error(f"Unable to checkout {checkout_commit}") tty.msg(co_out) return False if merge_commit: merge_out = git( "-c", "user.name=cirepro", "-c", "user.email=user@email.org", "merge", "--no-edit", merge_commit, output=str, error=os.devnull, fail_on_error=False, ) if git.returncode != 0: tty.error(f"Unable to merge {merge_commit}") tty.msg(merge_out) return False return True
[docs] def reproduce_ci_job(url, work_dir, autostart, gpg_url, runtime): """Given a url to gitlab artifacts.zip from a failed 'spack ci rebuild' job, attempt to setup an environment in which the failure can be reproduced locally. This entails the following: First download and extract artifacts. Then look through those artifacts to glean some information needed for the reproduer (e.g. one of the artifacts contains information about the version of spack tested by gitlab, another is the generated pipeline yaml containing details of the job like the docker image used to run it). The output of this function is a set of printed instructions for running docker and then commands to run to reproduce the build once inside the container. """ work_dir = os.path.realpath(work_dir) platform_script_ext = "ps1" if IS_WINDOWS else "sh" download_and_extract_artifacts(url, work_dir) gpg_path = None if gpg_url: gpg_path = web_util.fetch_url_text(gpg_url, dest_dir=os.path.join(work_dir, "_pgp")) rel_gpg_path = gpg_path.replace(work_dir, "").lstrip(os.path.sep) lock_file = fs.find(work_dir, "spack.lock")[0] repro_lock_dir = os.path.dirname(lock_file) tty.debug(f"Found lock file in: {repro_lock_dir}") yaml_files = fs.find(work_dir, ["*.yaml", "*.yml"]) tty.debug("yaml files:") for yaml_file in yaml_files: tty.debug(f" {yaml_file}") pipeline_yaml = None # Try to find the dynamically generated pipeline yaml file in the # reproducer. If the user did not put it in the artifacts root, # but rather somewhere else and exported it as an artifact from # that location, we won't be able to find it. for yf in yaml_files: with open(yf) as y_fd: yaml_obj = syaml.load(y_fd) if "variables" in yaml_obj and "stages" in yaml_obj: pipeline_yaml = yaml_obj if pipeline_yaml: tty.debug(f"\n{yf} is likely your pipeline file") relative_concrete_env_dir = pipeline_yaml["variables"]["SPACK_CONCRETE_ENV_DIR"] tty.debug(f"Relative environment path used by cloud job: {relative_concrete_env_dir}") # Using the relative concrete environment path found in the generated # pipeline variable above, copy the spack environment files so they'll # be found in the same location as when the job ran in the cloud. concrete_env_dir = os.path.join(work_dir, relative_concrete_env_dir) os.makedirs(concrete_env_dir, exist_ok=True) copy_lock_path = os.path.join(concrete_env_dir, "spack.lock") orig_yaml_path = os.path.join(repro_lock_dir, "spack.yaml") copy_yaml_path = os.path.join(concrete_env_dir, "spack.yaml") shutil.copyfile(lock_file, copy_lock_path) shutil.copyfile(orig_yaml_path, copy_yaml_path) # Find the install script in the unzipped artifacts and make it executable install_script = fs.find(work_dir, f"install.{platform_script_ext}")[0] if not IS_WINDOWS: # pointless on Windows st = os.stat(install_script) os.chmod(install_script, st.st_mode | stat.S_IEXEC) # Find the repro details file. This just includes some values we wrote # during `spack ci rebuild` to make reproduction easier. E.g. the job # name is written here so we can easily find the configuration of the # job from the generated pipeline file. repro_file = fs.find(work_dir, "repro.json")[0] repro_details = None with open(repro_file) as fd: repro_details = json.load(fd) repro_dir = os.path.dirname(repro_file) rel_repro_dir = repro_dir.replace(work_dir, "").lstrip(os.path.sep) # Find the spack info text file that should contain the git log # of the HEAD commit used during the CI build spack_info_file = fs.find(work_dir, "spack_info.txt")[0] with open(spack_info_file) as fd: spack_info = fd.read() # Access the specific job configuration job_name = repro_details["job_name"] job_yaml = None if job_name in pipeline_yaml: job_yaml = pipeline_yaml[job_name] if job_yaml: tty.debug("Found job:") tty.debug(job_yaml) job_image = None setup_result = False if "image" in job_yaml: job_image_elt = job_yaml["image"] if "name" in job_image_elt: job_image = job_image_elt["name"] else: job_image = job_image_elt tty.msg(f"Job ran with the following image: {job_image}") # Because we found this job was run with a docker image, so we will try # to print a "docker run" command that bind-mounts the directory where # we extracted the artifacts. # Destination of bind-mounted reproduction directory. It makes for a # more faithful reproducer if everything appears to run in the same # absolute path used during the CI build. mount_as_dir = "/work" mounted_workdir = "/reproducer" if repro_details: mount_as_dir = repro_details["ci_project_dir"] mounted_repro_dir = os.path.join(mount_as_dir, rel_repro_dir) mounted_env_dir = os.path.join(mount_as_dir, relative_concrete_env_dir) if gpg_path: mounted_gpg_path = os.path.join(mounted_workdir, rel_gpg_path) # We will also try to clone spack from your local checkout and # reproduce the state present during the CI build, and put that into # the bind-mounted reproducer directory. # Regular expressions for parsing that HEAD commit. If the pipeline # was on the gitlab spack mirror, it will have been a merge commit made by # gitub and pushed by the sync script. If the pipeline was run on some # environment repo, then the tested spack commit will likely have been # a regular commit. commit_1 = None commit_2 = None commit_regex = re.compile(r"commit\s+([^\s]+)") merge_commit_regex = re.compile(r"Merge\s+([^\s]+)\s+into\s+([^\s]+)") # Try the more specific merge commit regex first m = merge_commit_regex.search(spack_info) if m: # This was a merge commit and we captured the parents commit_1 = m.group(1) commit_2 = m.group(2) else: # Not a merge commit, just get the commit sha m = commit_regex.search(spack_info) if m: commit_1 = m.group(1) setup_result = False if commit_1: if commit_2: setup_result = setup_spack_repro_version(work_dir, commit_2, merge_commit=commit_1) else: setup_result = setup_spack_repro_version(work_dir, commit_1) if not setup_result: setup_msg = """ This can happen if the spack you are using to run this command is not a git repo, or if it is a git repo, but it does not have the commits needed to recreate the tested merge commit. If you are trying to reproduce a spack PR pipeline job failure, try fetching the latest develop commits from mainline spack and make sure you have the most recent commit of the PR branch in your local spack repo. Then run this command again. Alternatively, you can also manually clone spack if you know the version you want to test. """ tty.error( "Failed to automatically setup the tested version of spack " "in your local reproduction directory." ) print(setup_msg) # In cases where CI build was run on a shell runner, it might be useful # to see what tags were applied to the job so the user knows what shell # runner was used. But in that case in general, we cannot do nearly as # much to set up the reproducer. job_tags = None if "tags" in job_yaml: job_tags = job_yaml["tags"] tty.msg(f"Job ran with the following tags: {job_tags}") entrypoint_script = [ ["git", "config", "--global", "--add", "safe.directory", mount_as_dir], [ ".", os.path.join( mount_as_dir if job_image else work_dir, f"share/spack/setup-env.{platform_script_ext}", ), ], ["spack", "gpg", "trust", mounted_gpg_path if job_image else gpg_path] if gpg_path else [], ["spack", "env", "activate", mounted_env_dir if job_image else repro_dir], [ ( os.path.join(mounted_repro_dir, f"install.{platform_script_ext}") if job_image else install_script ) ], ] entry_script = os.path.join(mounted_workdir, f"entrypoint.{platform_script_ext}") inst_list = [] # Finally, print out some instructions to reproduce the build if job_image: # Allow interactive install_mechanism = ( os.path.join(mounted_repro_dir, f"install.{platform_script_ext}") if job_image else install_script ) entrypoint_script.append(["echo", f"Re-run install script using:\n\t{install_mechanism}"]) # Allow interactive if IS_WINDOWS: entrypoint_script.append(["&", "($args -Join ' ')", "-NoExit"]) else: entrypoint_script.append(["exec", "$@"]) process_command( "entrypoint", entrypoint_script, work_dir, run=False, exit_on_failure=False ) docker_command = [ runtime, "run", "-i", "-t", "--rm", "--name", "spack_reproducer", "-v", ":".join([work_dir, mounted_workdir, "Z"]), "-v", ":".join( [ os.path.join(work_dir, "jobs_scratch_dir"), os.path.join(mount_as_dir, "jobs_scratch_dir"), "Z", ] ), "-v", ":".join([os.path.join(work_dir, "spack"), mount_as_dir, "Z"]), "--entrypoint", ] if IS_WINDOWS: docker_command.extend(["powershell.exe", job_image, entry_script, "powershell.exe"]) else: docker_command.extend([entry_script, job_image, "bash"]) docker_command = [docker_command] autostart = autostart and setup_result process_command("start", docker_command, work_dir, run=autostart) if not autostart: inst_list.append("\nTo run the docker reproducer:\n\n") inst_list.extend( [ " - Start the docker container install", f" $ {work_dir}/start.{platform_script_ext}", ] ) else: autostart = autostart and setup_result process_command("reproducer", entrypoint_script, work_dir, run=autostart) inst_list.append("\nOnce on the tagged runner:\n\n") inst_list.extent( [ " - Run the reproducer script", f" $ {work_dir}/reproducer.{platform_script_ext}", ] ) if not setup_result: inst_list.append("\n - Clone spack and acquire tested commit") inst_list.append(f"\n {spack_info}\n") inst_list.append("\n") inst_list.append(f"\n Path to clone spack: {work_dir}/spack\n\n") tty.msg("".join(inst_list))
[docs] def process_command(name, commands, repro_dir, run=True, exit_on_failure=True): """ Create a script for and run the command. Copy the script to the reproducibility directory. Arguments: name (str): name of the command being processed commands (list): list of arguments for single command or list of lists of arguments for multiple commands. No shell escape is performed. repro_dir (str): Job reproducibility directory run (bool): Run the script and return the exit code if True Returns: the exit code from processing the command """ tty.debug(f"spack {name} arguments: {commands}") if len(commands) == 0 or isinstance(commands[0], str): commands = [commands] def compose_command_err_handling(args): if not IS_WINDOWS: args = [f'"{arg}"' for arg in args] arg_str = " ".join(args) result = arg_str + "\n" # ErrorActionPreference will handle PWSH commandlets (Spack calls), # but we need to handle EXEs (git, etc) ourselves catch_exe_failure = ( """ if ($LASTEXITCODE -ne 0){ throw "Command {} has failed" } """ if IS_WINDOWS else "" ) if exit_on_failure and catch_exe_failure: result += catch_exe_failure.format(arg_str) return result # Create a string [command 1] \n [command 2] \n ... \n [command n] with # commands composed into a platform dependent shell script, pwsh on Windows, full_command = "\n".join(map(compose_command_err_handling, commands)) # Write the command to a python script if IS_WINDOWS: script = f"{name}.ps1" script_content = [f"\n# spack {name} command\n"] if exit_on_failure: script_content.append('$ErrorActionPreference = "Stop"\n') if os.environ.get("SPACK_VERBOSE_SCRIPT"): script_content.append("Set-PSDebug -Trace 2\n") else: script = f"{name}.sh" script_content = ["#!/bin/sh\n\n", f"\n# spack {name} command\n"] if exit_on_failure: script_content.append("set -e\n") if os.environ.get("SPACK_VERBOSE_SCRIPT"): script_content.append("set -x\n") script_content.append(full_command) script_content.append("\n") with open(script, "w") as fd: for line in script_content: fd.write(line) copy_path = os.path.join(repro_dir, script) shutil.copyfile(script, copy_path) if not IS_WINDOWS: st = os.stat(copy_path) os.chmod(copy_path, st.st_mode | stat.S_IEXEC) # Run the generated shell script as if it were being run in # a login shell. exit_code = None if run: try: # We use sh as executor on Linux like platforms, pwsh on Windows interpreter = "powershell.exe" if IS_WINDOWS else "/bin/sh" cmd_process = subprocess.Popen([interpreter, f"./{script}"]) cmd_process.wait() exit_code = cmd_process.returncode except (ValueError, subprocess.CalledProcessError, OSError) as err: tty.error(f"Encountered error running {name} script") tty.error(err) exit_code = 1 tty.debug(f"spack {name} exited {exit_code}") else: # Delete the script, it is copied to the destination dir os.remove(script) return exit_code
[docs] def create_buildcache( input_spec: spack.spec.Spec, *, destination_mirror_urls: List[str], sign_binaries: bool = False ) -> List[PushResult]: """Create the buildcache at the provided mirror(s). Arguments: input_spec: Installed spec to package and push destination_mirror_urls: List of urls to push to sign_binaries: Whether or not to sign buildcache entry Returns: A list of PushResults, indicating success or failure. """ results = [] for mirror_url in destination_mirror_urls: results.append( PushResult( success=push_to_build_cache(input_spec, mirror_url, sign_binaries), url=mirror_url ) ) return results
[docs] def write_broken_spec(url, pkg_name, stack_name, job_url, pipeline_url, spec_dict): """Given a url to write to and the details of the failed job, write an entry in the broken specs list. """ tmpdir = tempfile.mkdtemp() file_path = os.path.join(tmpdir, "broken.txt") broken_spec_details = { "broken-spec": { "job-name": pkg_name, "job-stack": stack_name, "job-url": job_url, "pipeline-url": pipeline_url, "concrete-spec-dict": spec_dict, } } try: with open(file_path, "w") as fd: fd.write(syaml.dump(broken_spec_details)) web_util.push_to_url( file_path, url, keep_original=False, extra_args={"ContentType": "text/plain"} ) except Exception as err: # If there is an S3 error (e.g., access denied or connection # error), the first non boto-specific class in the exception # hierarchy is Exception. Just print a warning and return msg = f"Error writing to broken specs list {url}: {err}" tty.warn(msg) finally: shutil.rmtree(tmpdir)
[docs] def read_broken_spec(broken_spec_url): """Read data from broken specs file located at the url, return as a yaml object. """ try: _, _, fs = web_util.read_from_url(broken_spec_url) except (URLError, web_util.SpackWebError, HTTPError): tty.warn(f"Unable to read broken spec from {broken_spec_url}") return None broken_spec_contents = codecs.getreader("utf-8")(fs).read() return syaml.load(broken_spec_contents)
[docs] def display_broken_spec_messages(base_url, hashes): """Fetch the broken spec file for each of the hashes under the base_url and print a message with some details about each one. """ broken_specs = [(h, read_broken_spec(url_util.join(base_url, h))) for h in hashes] for spec_hash, broken_spec in [tup for tup in broken_specs if tup[1]]: details = broken_spec["broken-spec"] if "job-name" in details: item_name = f"{details['job-name']}/{spec_hash[:7]}" else: item_name = spec_hash if "job-stack" in details: item_name = f"{item_name} (in stack {details['job-stack']})" msg = f" {item_name} was reported broken here: {details['job-url']}" tty.msg(msg)
[docs] def run_standalone_tests(**kwargs): """Run stand-alone tests on the current spec. Arguments: kwargs (dict): dictionary of arguments used to run the tests List of recognized keys: * "cdash" (CDashHandler): (optional) cdash handler instance * "fail_fast" (bool): (optional) terminate tests after the first failure * "log_file" (str): (optional) test log file name if NOT CDash reporting * "job_spec" (Spec): spec that was built * "repro_dir" (str): reproduction directory """ cdash = kwargs.get("cdash") fail_fast = kwargs.get("fail_fast") log_file = kwargs.get("log_file") if cdash and log_file: tty.msg(f"The test log file {log_file} option is ignored with CDash reporting") log_file = None # Error out but do NOT terminate if there are missing required arguments. job_spec = kwargs.get("job_spec") if not job_spec: tty.error("Job spec is required to run stand-alone tests") return repro_dir = kwargs.get("repro_dir") if not repro_dir: tty.error("Reproduction directory is required for stand-alone tests") return test_args = ["spack", "--color=always", "--backtrace", "--verbose", "test", "run"] if fail_fast: test_args.append("--fail-fast") if cdash: test_args.extend(cdash.args()) else: test_args.extend(["--log-format", "junit"]) if log_file: test_args.extend(["--log-file", log_file]) test_args.append(job_spec.name) tty.debug(f"Running {job_spec.name} stand-alone tests") exit_code = process_command("test", test_args, repro_dir) tty.debug(f"spack test exited {exit_code}")
[docs] class CDashHandler: """ Class for managing CDash data and processing. """ def __init__(self, ci_cdash): # start with the gitlab ci configuration self.url = ci_cdash.get("url") self.build_group = ci_cdash.get("build-group") self.project = ci_cdash.get("project") self.site = ci_cdash.get("site") # grab the authorization token when available self.auth_token = os.environ.get("SPACK_CDASH_AUTH_TOKEN") if self.auth_token: tty.verbose("Using CDash auth token from environment") # append runner description to the site if available runner = os.environ.get("CI_RUNNER_DESCRIPTION") if runner: self.site += f" ({runner})" # track current spec, if any self.current_spec = None
[docs] def args(self): return [ "--cdash-upload-url", self.upload_url, "--cdash-build", self.build_name, "--cdash-site", self.site, "--cdash-buildstamp", self.build_stamp, ]
@property # type: ignore def build_name(self): """Returns the CDash build name. A name will be generated if the `current_spec` property is set; otherwise, the value will be retrieved from the environment through the `SPACK_CDASH_BUILD_NAME` variable. Returns: (str) current spec's CDash build name.""" spec = self.current_spec if spec: build_name = f"{spec.name}@{spec.version}%{spec.compiler} \ hash={spec.dag_hash()} arch={spec.architecture} ({self.build_group})" tty.debug(f"Generated CDash build name ({build_name}) from the {spec.name}") return build_name build_name = os.environ.get("SPACK_CDASH_BUILD_NAME") tty.debug(f"Using CDash build name ({build_name}) from the environment") return build_name @property # type: ignore def build_stamp(self): """Returns the CDash build stamp. The one defined by SPACK_CDASH_BUILD_STAMP environment variable is preferred due to the representation of timestamps; otherwise, one will be built. Returns: (str) current CDash build stamp""" build_stamp = os.environ.get("SPACK_CDASH_BUILD_STAMP") if build_stamp: tty.debug(f"Using build stamp ({build_stamp}) from the environment") return build_stamp build_stamp = cdash_build_stamp(self.build_group, time.time()) tty.debug(f"Generated new build stamp ({build_stamp})") return build_stamp @property # type: ignore @memoized def project_enc(self): tty.debug(f"Encoding project ({type(self.project)}): {self.project})") encode = urlencode({"project": self.project}) index = encode.find("=") + 1 return encode[index:] @property def upload_url(self): url_format = f"{self.url}/submit.php?project={self.project_enc}" return url_format
[docs] def copy_test_results(self, source, dest): """Copy test results to artifacts directory.""" reports = fs.join_path(source, "*_Test*.xml") copy_files_to_artifacts(reports, dest)
[docs] def create_buildgroup(self, opener, headers, url, group_name, group_type): data = {"newbuildgroup": group_name, "project": self.project, "type": group_type} enc_data = json.dumps(data).encode("utf-8") request = Request(url, data=enc_data, headers=headers) response = opener.open(request) response_code = response.getcode() if response_code not in [200, 201]: msg = f"Creating buildgroup failed (response code = {response_code})" tty.warn(msg) return None response_text = response.read() response_json = json.loads(response_text) build_group_id = response_json["id"] return build_group_id
[docs] def populate_buildgroup(self, job_names): url = f"{self.url}/api/v1/buildgroup.php" headers = { "Authorization": f"Bearer {self.auth_token}", "Content-Type": "application/json", } opener = build_opener(HTTPHandler) parent_group_id = self.create_buildgroup(opener, headers, url, self.build_group, "Daily") group_id = self.create_buildgroup( opener, headers, url, f"Latest {self.build_group}", "Latest" ) if not parent_group_id or not group_id: msg = f"Failed to create or retrieve buildgroups for {self.build_group}" tty.warn(msg) return data = { "dynamiclist": [ {"match": name, "parentgroupid": parent_group_id, "site": self.site} for name in job_names ] } enc_data = json.dumps(data).encode("utf-8") request = Request(url, data=enc_data, headers=headers) request.get_method = lambda: "PUT" response = opener.open(request) response_code = response.getcode() if response_code != 200: msg = f"Error response code ({response_code}) in populate_buildgroup" tty.warn(msg)
[docs] def report_skipped(self, spec: spack.spec.Spec, report_dir: str, reason: Optional[str]): """Explicitly report skipping testing of a spec (e.g., it's CI configuration identifies it as known to have broken tests or the CI installation failed). Args: spec: spec being tested report_dir: directory where the report will be written reason: reason the test is being skipped """ configuration = CDashConfiguration( upload_url=self.upload_url, packages=[spec.name], build=self.build_name, site=self.site, buildstamp=self.build_stamp, track=None, ) reporter = CDash(configuration=configuration) reporter.test_skipped_report(report_dir, spec, reason)
[docs] def translate_deprecated_config(config): # Remove all deprecated keys from config mappings = config.pop("mappings", []) match_behavior = config.pop("match_behavior", "first") build_job = {} if "image" in config: build_job["image"] = config.pop("image") if "tags" in config: build_job["tags"] = config.pop("tags") if "variables" in config: build_job["variables"] = config.pop("variables") # Scripts always override in old CI if "before_script" in config: build_job["before_script:"] = config.pop("before_script") if "script" in config: build_job["script:"] = config.pop("script") if "after_script" in config: build_job["after_script:"] = config.pop("after_script") signing_job = None if "signing-job-attributes" in config: signing_job = {"signing-job": config.pop("signing-job-attributes")} service_job_attributes = None if "service-job-attributes" in config: service_job_attributes = config.pop("service-job-attributes") # If this config already has pipeline-gen do not more if "pipeline-gen" in config: return True if mappings or build_job or signing_job or service_job_attributes else False config["target"] = "gitlab" config["pipeline-gen"] = [] pipeline_gen = config["pipeline-gen"] # Build Job submapping = [] for section in mappings: submapping_section = {"match": section["match"]} if "runner-attributes" in section: remapped_attributes = {} if match_behavior == "first": for key, value in section["runner-attributes"].items(): # Scripts always override in old CI if key == "script": remapped_attributes["script:"] = value elif key == "before_script": remapped_attributes["before_script:"] = value elif key == "after_script": remapped_attributes["after_script:"] = value else: remapped_attributes[key] = value else: # Handle "merge" behavior be allowing scripts to merge in submapping section remapped_attributes = section["runner-attributes"] submapping_section["build-job"] = remapped_attributes if "remove-attributes" in section: # Old format only allowed tags in this section, so no extra checks are needed submapping_section["build-job-remove"] = section["remove-attributes"] submapping.append(submapping_section) pipeline_gen.append({"submapping": submapping, "match_behavior": match_behavior}) if build_job: pipeline_gen.append({"build-job": build_job}) # Signing Job if signing_job: pipeline_gen.append(signing_job) # Service Jobs if service_job_attributes: pipeline_gen.append({"reindex-job": service_job_attributes}) pipeline_gen.append({"noop-job": service_job_attributes}) pipeline_gen.append({"cleanup-job": service_job_attributes}) return True