2020-02-05 08:38:41 +08:00
|
|
|
package cmd
|
|
|
|
|
|
|
|
import (
|
|
|
|
"path/filepath"
|
2021-05-18 14:14:49 +08:00
|
|
|
|
|
|
|
log "github.com/sirupsen/logrus"
|
2020-02-05 08:38:41 +08:00
|
|
|
)
|
|
|
|
|
|
|
|
// Input contains the input for the root command
|
|
|
|
type Input struct {
|
2022-06-21 21:52:21 +08:00
|
|
|
actor string
|
|
|
|
workdir string
|
|
|
|
workflowsPath string
|
|
|
|
autodetectEvent bool
|
|
|
|
eventPath string
|
|
|
|
reuseContainers bool
|
|
|
|
bindWorkdir bool
|
|
|
|
secrets []string
|
2023-06-11 02:09:27 +08:00
|
|
|
vars []string
|
2022-06-21 21:52:21 +08:00
|
|
|
envs []string
|
2023-01-14 03:28:17 +08:00
|
|
|
inputs []string
|
2022-06-21 21:52:21 +08:00
|
|
|
platforms []string
|
|
|
|
dryrun bool
|
|
|
|
forcePull bool
|
|
|
|
forceRebuild bool
|
|
|
|
noOutput bool
|
|
|
|
envfile string
|
2023-01-14 03:28:17 +08:00
|
|
|
inputfile string
|
2022-06-21 21:52:21 +08:00
|
|
|
secretfile string
|
2023-06-11 02:09:27 +08:00
|
|
|
varfile string
|
2022-06-21 21:52:21 +08:00
|
|
|
insecureSecrets bool
|
|
|
|
defaultBranch string
|
|
|
|
privileged bool
|
|
|
|
usernsMode string
|
|
|
|
containerArchitecture string
|
|
|
|
containerDaemonSocket string
|
2022-12-06 23:58:47 +08:00
|
|
|
containerOptions string
|
2022-06-21 21:52:21 +08:00
|
|
|
noWorkflowRecurse bool
|
|
|
|
useGitIgnore bool
|
|
|
|
githubInstance string
|
|
|
|
containerCapAdd []string
|
|
|
|
containerCapDrop []string
|
|
|
|
autoRemove bool
|
|
|
|
artifactServerPath string
|
2023-01-16 22:12:20 +08:00
|
|
|
artifactServerAddr string
|
2022-06-21 21:52:21 +08:00
|
|
|
artifactServerPort string
|
2023-04-28 23:57:40 +08:00
|
|
|
noCacheServer bool
|
|
|
|
cacheServerPath string
|
|
|
|
cacheServerAddr string
|
|
|
|
cacheServerPort uint16
|
2022-06-21 21:52:21 +08:00
|
|
|
jsonLogger bool
|
|
|
|
noSkipCheckout bool
|
|
|
|
remoteName string
|
|
|
|
replaceGheActionWithGithubCom []string
|
|
|
|
replaceGheActionTokenWithGithubCom string
|
2023-03-20 01:25:55 +08:00
|
|
|
matrix []string
|
2023-06-15 09:16:00 +08:00
|
|
|
actionCachePath string
|
2024-01-20 08:20:15 +08:00
|
|
|
actionOfflineMode bool
|
2023-07-20 05:45:44 +08:00
|
|
|
logPrefixJobID bool
|
Add support for service containers (#1949)
* Support services (#42)
Removed createSimpleContainerName and AutoRemove flag
Co-authored-by: Lunny Xiao <xiaolunwen@gmail.com>
Co-authored-by: Jason Song <i@wolfogre.com>
Reviewed-on: https://gitea.com/gitea/act/pulls/42
Reviewed-by: Jason Song <i@wolfogre.com>
Co-authored-by: Zettat123 <zettat123@gmail.com>
Co-committed-by: Zettat123 <zettat123@gmail.com>
* Support services options (#45)
Reviewed-on: https://gitea.com/gitea/act/pulls/45
Reviewed-by: Lunny Xiao <xiaolunwen@gmail.com>
Co-authored-by: Zettat123 <zettat123@gmail.com>
Co-committed-by: Zettat123 <zettat123@gmail.com>
* Support intepolation for `env` of `services` (#47)
Reviewed-on: https://gitea.com/gitea/act/pulls/47
Reviewed-by: Lunny Xiao <xiaolunwen@gmail.com>
Co-authored-by: Zettat123 <zettat123@gmail.com>
Co-committed-by: Zettat123 <zettat123@gmail.com>
* Support services `credentials` (#51)
If a service's image is from a container registry requires authentication, `act_runner` will need `credentials` to pull the image, see [documentation](https://docs.github.com/en/actions/using-workflows/workflow-syntax-for-github-actions#jobsjob_idservicesservice_idcredentials).
Currently, `act_runner` incorrectly uses the `credentials` of `containers` to pull services' images and the `credentials` of services won't be used, see the related code: https://gitea.com/gitea/act/src/commit/0c1f2edb996a87ee17dcf3cfa7259c04be02abd7/pkg/runner/run_context.go#L228-L269
Co-authored-by: Jason Song <i@wolfogre.com>
Reviewed-on: https://gitea.com/gitea/act/pulls/51
Reviewed-by: Jason Song <i@wolfogre.com>
Reviewed-by: Lunny Xiao <xiaolunwen@gmail.com>
Co-authored-by: Zettat123 <zettat123@gmail.com>
Co-committed-by: Zettat123 <zettat123@gmail.com>
* Add ContainerMaxLifetime and ContainerNetworkMode options
from: https://gitea.com/gitea/act/commit/b9c20dcaa43899cb3bb327619d447248303170e0
* Fix container network issue (#56)
Follow: https://gitea.com/gitea/act_runner/pulls/184
Close https://gitea.com/gitea/act_runner/issues/177
- `act` create new networks only if the value of `NeedCreateNetwork` is true, and remove these networks at last. `NeedCreateNetwork` is passed by `act_runner`. 'NeedCreateNetwork' is true only if `container.network` in the configuration file of the `act_runner` is empty.
- In the `docker create` phase, specify the network to which containers will connect. Because, if not specify , container will connect to `bridge` network which is created automatically by Docker.
- If the network is user defined network ( the value of `container.network` is empty or `<custom-network>`. Because, the network created by `act` is also user defined network.), will also specify alias by `--network-alias`. The alias of service is `<service-id>`. So we can be access service container by `<service-id>:<port>` in the steps of job.
- Won't try to `docker network connect ` network after `docker start` any more.
- Because on the one hand, `docker network connect` applies only to user defined networks, if try to `docker network connect host <container-name>` will return error.
- On the other hand, we just specify network in the stage of `docker create`, the same effect can be achieved.
- Won't try to remove containers and networks berfore the stage of `docker start`, because the name of these containers and netwoks won't be repeat.
Co-authored-by: Jason Song <i@wolfogre.com>
Reviewed-on: https://gitea.com/gitea/act/pulls/56
Reviewed-by: Jason Song <i@wolfogre.com>
Co-authored-by: sillyguodong <gedong_1994@163.com>
Co-committed-by: sillyguodong <gedong_1994@163.com>
* Check volumes (#60)
This PR adds a `ValidVolumes` config. Users can specify the volumes (including bind mounts) that can be mounted to containers by this config.
Options related to volumes:
- [jobs.<job_id>.container.volumes](https://docs.github.com/en/actions/using-workflows/workflow-syntax-for-github-actions#jobsjob_idcontainervolumes)
- [jobs.<job_id>.services.<service_id>.volumes](https://docs.github.com/en/actions/using-workflows/workflow-syntax-for-github-actions#jobsjob_idservicesservice_idvolumes)
In addition, volumes specified by `options` will also be checked.
Currently, the following default volumes (see https://gitea.com/gitea/act/src/commit/a72822b3f83d3e68ffc697101b713b7badf57e2f/pkg/runner/run_context.go#L116-L166) will be added to `ValidVolumes`:
- `act-toolcache`
- `<container-name>` and `<container-name>-env`
- `/var/run/docker.sock` (We need to add a new configuration to control whether the docker daemon can be mounted)
Co-authored-by: Jason Song <i@wolfogre.com>
Reviewed-on: https://gitea.com/gitea/act/pulls/60
Reviewed-by: Jason Song <i@wolfogre.com>
Co-authored-by: Zettat123 <zettat123@gmail.com>
Co-committed-by: Zettat123 <zettat123@gmail.com>
* Remove ContainerMaxLifetime; fix lint
* Remove unused ValidVolumes
* Remove ConnectToNetwork
* Add docker stubs
* Close docker clients to prevent file descriptor leaks
* Fix the error when removing network in self-hosted mode (#69)
Fixes https://gitea.com/gitea/act_runner/issues/255
Reviewed-on: https://gitea.com/gitea/act/pulls/69
Co-authored-by: Zettat123 <zettat123@gmail.com>
Co-committed-by: Zettat123 <zettat123@gmail.com>
* Move service container and network cleanup to rc.cleanUpJobContainer
* Add --network flag; default to host if not using service containers or set explicitly
* Correctly close executor to prevent fd leak
* Revert to tail instead of full path
* fix network duplication
* backport networkingConfig for aliaes
* don't hardcode netMode host
* Convert services test to table driven tests
* Add failing tests for services
* Expose service container ports onto the host
* Set container network mode in artifacts server test to host mode
* Log container network mode when creating/starting a container
* fix: Correctly handle ContainerNetworkMode
* fix: missing service container network
* Always remove service containers
Although we usually keep containers running if the workflow errored
(unless `--rm` is given) in order to facilitate debugging and we have
a flag (`--reuse`) to always keep containers running in order to speed
up repeated `act` invocations, I believe that these should only apply
to job containers and not service containers, because changing the
network settings on a service container requires re-creating it anyway.
* Remove networks only if no active endpoints exist
* Ensure job containers are stopped before starting a new job
* fix: go build -tags WITHOUT_DOCKER
---------
Co-authored-by: Zettat123 <zettat123@gmail.com>
Co-authored-by: Lunny Xiao <xiaolunwen@gmail.com>
Co-authored-by: Jason Song <i@wolfogre.com>
Co-authored-by: sillyguodong <gedong_1994@163.com>
Co-authored-by: ChristopherHX <christopher.homberger@web.de>
Co-authored-by: ZauberNerd <zaubernerd@zaubernerd.de>
2023-10-19 17:24:52 +08:00
|
|
|
networkName string
|
2024-01-20 07:49:35 +08:00
|
|
|
useNewActionCache bool
|
2024-02-23 15:40:14 +08:00
|
|
|
localRepository []string
|
2020-02-05 08:38:41 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
func (i *Input) resolve(path string) string {
|
2020-02-07 14:17:58 +08:00
|
|
|
basedir, err := filepath.Abs(i.workdir)
|
2020-02-05 08:38:41 +08:00
|
|
|
if err != nil {
|
|
|
|
log.Fatal(err)
|
|
|
|
}
|
|
|
|
if path == "" {
|
|
|
|
return path
|
|
|
|
}
|
|
|
|
if !filepath.IsAbs(path) {
|
|
|
|
path = filepath.Join(basedir, path)
|
|
|
|
}
|
|
|
|
return path
|
|
|
|
}
|
|
|
|
|
2020-03-07 04:30:24 +08:00
|
|
|
// Envfile returns path to .env
|
|
|
|
func (i *Input) Envfile() string {
|
|
|
|
return i.resolve(i.envfile)
|
|
|
|
}
|
|
|
|
|
2020-04-18 01:04:40 +08:00
|
|
|
// Secretfile returns path to secrets
|
|
|
|
func (i *Input) Secretfile() string {
|
|
|
|
return i.resolve(i.secretfile)
|
|
|
|
}
|
|
|
|
|
2023-06-11 02:09:27 +08:00
|
|
|
func (i *Input) Varfile() string {
|
|
|
|
return i.resolve(i.varfile)
|
|
|
|
}
|
|
|
|
|
2020-02-07 14:17:58 +08:00
|
|
|
// Workdir returns path to workdir
|
|
|
|
func (i *Input) Workdir() string {
|
|
|
|
return i.resolve(".")
|
|
|
|
}
|
|
|
|
|
2020-05-27 11:29:50 +08:00
|
|
|
// WorkflowsPath returns path to workflow file(s)
|
2020-02-05 08:38:41 +08:00
|
|
|
func (i *Input) WorkflowsPath() string {
|
|
|
|
return i.resolve(i.workflowsPath)
|
|
|
|
}
|
|
|
|
|
|
|
|
// EventPath returns the path to events file
|
|
|
|
func (i *Input) EventPath() string {
|
|
|
|
return i.resolve(i.eventPath)
|
|
|
|
}
|
2023-01-14 03:28:17 +08:00
|
|
|
|
|
|
|
// Inputfile returns the path to the input file
|
|
|
|
func (i *Input) Inputfile() string {
|
|
|
|
return i.resolve(i.inputfile)
|
|
|
|
}
|