debian-mirror-gitlab/app/models/ci/runner.rb

Ignoring revisions in .git-blame-ignore-revs. Click here to bypass and see the normal blame view.

606 lines
20 KiB
Ruby
Raw Normal View History

2018-11-18 11:00:15 +05:30
# frozen_string_literal: true
2015-09-25 12:07:36 +05:30
module Ci
2021-10-27 15:23:28 +05:30
class Runner < Ci::ApplicationRecord
2022-08-13 15:12:31 +05:30
prepend Ci::BulkInsertableTags
2018-03-17 18:26:18 +05:30
include Gitlab::SQL::Pattern
include RedisCacheable
2018-05-09 12:01:36 +05:30
include ChronicDurationAttribute
2018-12-05 23:21:45 +05:30
include FromUnion
2019-02-15 15:39:39 +05:30
include TokenAuthenticatable
2021-04-17 20:07:23 +05:30
include FeatureGate
2021-09-04 01:27:46 +05:30
include Gitlab::Utils::StrongMemoize
include TaggableQueries
2021-10-27 15:23:28 +05:30
include Presentable
2022-07-16 23:28:13 +05:30
include EachBatch
2023-03-17 16:20:25 +05:30
include Ci::HasRunnerExecutor
2019-02-15 15:39:39 +05:30
2023-04-23 21:23:45 +05:30
extend ::Gitlab::Utils::Override
2022-11-25 23:54:43 +05:30
add_authentication_token_field :token, encrypted: :optional, expires_at: :compute_token_expiration
2018-12-05 23:21:45 +05:30
enum access_level: {
not_protected: 0,
ref_protected: 1
}
enum runner_type: {
instance_type: 1,
group_type: 2,
project_type: 3
}
2015-10-24 18:46:33 +05:30
2023-04-23 21:23:45 +05:30
enum registration_type: {
registration_token: 0,
authenticated_user: 1
}, _suffix: true
# Prefix assigned to runners created from the UI, instead of registered via the command line
CREATED_RUNNER_TOKEN_PREFIX = 'glrt-'
2020-06-23 00:09:42 +05:30
# This `ONLINE_CONTACT_TIMEOUT` needs to be larger than
# `RUNNER_QUEUE_EXPIRY_TIME+UPDATE_CONTACT_COLUMN_EVERY`
#
ONLINE_CONTACT_TIMEOUT = 2.hours
# The `RUNNER_QUEUE_EXPIRY_TIME` indicates the longest interval that
# Runner request needs to be refreshed by Rails instead of being handled
# by Workhorse
2019-12-04 20:38:33 +05:30
RUNNER_QUEUE_EXPIRY_TIME = 1.hour
2020-06-23 00:09:42 +05:30
# The `UPDATE_CONTACT_COLUMN_EVERY` defines how often the Runner DB entry can be updated
2019-12-04 20:38:33 +05:30
UPDATE_CONTACT_COLUMN_EVERY = (40.minutes..55.minutes).freeze
2022-01-26 12:08:38 +05:30
# The `STALE_TIMEOUT` constant defines the how far past the last contact or creation date a runner will be considered stale
STALE_TIMEOUT = 3.months
2018-12-05 23:21:45 +05:30
AVAILABLE_TYPES_LEGACY = %w[specific shared].freeze
AVAILABLE_TYPES = runner_types.keys.freeze
2022-07-16 23:28:13 +05:30
AVAILABLE_STATUSES = %w[active paused online offline never_contacted stale].freeze # TODO: Remove in %16.0: active, paused. Relevant issue: https://gitlab.com/gitlab-org/gitlab/-/issues/344648
2018-12-05 23:21:45 +05:30
AVAILABLE_SCOPES = (AVAILABLE_TYPES_LEGACY + AVAILABLE_TYPES + AVAILABLE_STATUSES).freeze
2019-12-04 20:38:33 +05:30
2018-05-09 12:01:36 +05:30
FORM_EDITABLE = %i[description tag_list active run_untagged locked access_level maximum_timeout_human_readable].freeze
2020-04-22 19:07:51 +05:30
MINUTES_COST_FACTOR_FIELDS = %i[public_projects_minutes_cost_factor private_projects_minutes_cost_factor].freeze
2016-06-02 11:05:42 +05:30
2022-04-01 21:47:47 +05:30
TAG_LIST_MAX_LENGTH = 50
2023-03-17 16:20:25 +05:30
has_many :runner_machines, inverse_of: :runner
2017-08-17 22:00:37 +05:30
has_many :builds
2021-06-08 01:23:25 +05:30
has_many :runner_projects, inverse_of: :runner, autosave: true, dependent: :destroy # rubocop:disable Cop/ActiveRecordDependent
2022-04-04 11:22:00 +05:30
has_many :projects, through: :runner_projects, disable_joins: true
2021-06-08 01:23:25 +05:30
has_many :runner_namespaces, inverse_of: :runner, autosave: true
2021-11-18 22:05:49 +05:30
has_many :groups, through: :runner_namespaces, disable_joins: true
2015-09-25 12:07:36 +05:30
2020-11-24 15:15:51 +05:30
has_one :last_build, -> { order('id DESC') }, class_name: 'Ci::Build'
2022-08-13 15:12:31 +05:30
has_one :runner_version, primary_key: :version, foreign_key: :version, class_name: 'Ci::RunnerVersion'
2015-09-25 12:07:36 +05:30
2023-03-17 16:20:25 +05:30
belongs_to :creator, class_name: 'User', optional: true
2019-02-15 15:39:39 +05:30
before_save :ensure_token
2015-09-25 12:07:36 +05:30
2022-01-26 12:08:38 +05:30
scope :active, -> (value = true) { where(active: value) }
scope :paused, -> { active(false) }
2019-12-04 20:38:33 +05:30
scope :online, -> { where('contacted_at > ?', online_contact_time_deadline) }
2022-01-26 12:08:38 +05:30
scope :recent, -> { where('ci_runners.created_at >= :date OR ci_runners.contacted_at >= :date', date: stale_deadline) }
scope :stale, -> { where('ci_runners.created_at < :date AND (ci_runners.contacted_at IS NULL OR ci_runners.contacted_at < :date)', date: stale_deadline) }
2021-10-27 15:23:28 +05:30
scope :offline, -> { where(arel_table[:contacted_at].lteq(online_contact_time_deadline)) }
2022-01-26 12:08:38 +05:30
scope :never_contacted, -> { where(contacted_at: nil) }
2018-10-15 14:42:47 +05:30
scope :ordered, -> { order(id: :desc) }
2015-09-25 12:07:36 +05:30
2019-12-04 20:38:33 +05:30
scope :with_recent_runner_queue, -> { where('contacted_at > ?', recent_queue_deadline) }
2023-03-04 22:38:38 +05:30
scope :with_running_builds, -> do
where('EXISTS(?)', ::Ci::Build.running.select(1).where('ci_builds.runner_id = ci_runners.id'))
end
2019-12-04 20:38:33 +05:30
2018-11-08 19:23:39 +05:30
# BACKWARD COMPATIBILITY: There are needed to maintain compatibility with `AVAILABLE_SCOPES` used by `lib/api/runners.rb`
scope :deprecated_shared, -> { instance_type }
2019-02-15 15:39:39 +05:30
scope :deprecated_specific, -> { project_type.or(group_type) }
2018-11-08 19:23:39 +05:30
2018-10-15 14:42:47 +05:30
scope :belonging_to_project, -> (project_id) {
joins(:runner_projects).where(ci_runner_projects: { project_id: project_id })
}
2022-03-02 08:16:31 +05:30
scope :belonging_to_group, -> (group_id) {
2022-11-25 23:54:43 +05:30
joins(:runner_namespaces).where(ci_runner_namespaces: { namespace_id: group_id })
2022-03-02 08:16:31 +05:30
}
scope :belonging_to_group_or_project_descendants, -> (group_id) {
2022-04-04 11:22:00 +05:30
group_ids = Ci::NamespaceMirror.by_group_and_descendants(group_id).select(:namespace_id)
2022-03-02 08:16:31 +05:30
project_ids = Ci::ProjectMirror.by_namespace_id(group_ids).select(:project_id)
2022-11-25 23:54:43 +05:30
group_runners = belonging_to_group(group_ids)
project_runners = belonging_to_project(project_ids).distinct
2022-03-02 08:16:31 +05:30
2022-11-25 23:54:43 +05:30
from_union(
[group_runners, project_runners],
remove_duplicates: false
)
2022-03-02 08:16:31 +05:30
}
scope :belonging_to_group_and_ancestors, -> (group_id) {
group_self_and_ancestors_ids = ::Group.find_by(id: group_id)&.self_and_ancestor_ids
2022-11-25 23:54:43 +05:30
belonging_to_group(group_self_and_ancestors_ids)
2022-03-02 08:16:31 +05:30
}
2018-10-15 14:42:47 +05:30
scope :belonging_to_parent_group_of_project, -> (project_id) {
2022-03-02 08:16:31 +05:30
raise ArgumentError, "only 1 project_id allowed for performance reasons" unless project_id.is_a?(Integer)
2018-10-15 14:42:47 +05:30
project_groups = ::Group.joins(:projects).where(projects: { id: project_id })
2022-03-02 08:16:31 +05:30
belonging_to_group(project_groups.self_and_ancestors.pluck(:id))
2018-10-15 14:42:47 +05:30
}
2018-11-08 19:23:39 +05:30
scope :owned_or_instance_wide, -> (project_id) do
2022-04-04 11:22:00 +05:30
project = project_id.respond_to?(:shared_runners) ? project_id : Project.find(project_id)
2018-12-05 23:21:45 +05:30
from_union(
[
belonging_to_project(project_id),
2022-04-04 11:22:00 +05:30
project.group_runners_enabled? ? belonging_to_parent_group_of_project(project_id) : nil,
project.shared_runners
].compact,
remove_duplicates: false
)
end
scope :group_or_instance_wide, -> (group) do
from_union(
[
belonging_to_group_and_ancestors(group.id),
group.shared_runners
2018-12-05 23:21:45 +05:30
],
2018-10-15 14:42:47 +05:30
remove_duplicates: false
2022-03-02 08:16:31 +05:30
)
2016-04-02 18:10:28 +05:30
end
2022-11-25 23:54:43 +05:30
scope :usable_from_scope, -> (group) do
from_union(
[
belonging_to_group(group.ancestor_ids),
belonging_to_group_or_project_descendants(group.id),
group.shared_runners
],
remove_duplicates: false
)
end
2016-06-22 15:30:34 +05:30
scope :assignable_for, ->(project) do
# FIXME: That `to_sql` is needed to workaround a weird Rails bug.
# Without that, placeholders would miss one and couldn't match.
2018-12-05 23:21:45 +05:30
#
# We use "unscoped" here so that any current Ci::Runner filters don't
# apply to the inner query, which is not necessary.
exclude_runners = unscoped { project.runners.select(:id) }.to_sql
2017-09-10 17:25:29 +05:30
where(locked: false)
2018-12-05 23:21:45 +05:30
.where.not("ci_runners.id IN (#{exclude_runners})")
2018-11-08 19:23:39 +05:30
.project_type
2016-06-22 15:30:34 +05:30
end
2018-12-05 23:21:45 +05:30
scope :order_contacted_at_asc, -> { order(contacted_at: :asc) }
2021-09-04 01:27:46 +05:30
scope :order_contacted_at_desc, -> { order(contacted_at: :desc) }
scope :order_created_at_asc, -> { order(created_at: :asc) }
2018-12-05 23:21:45 +05:30
scope :order_created_at_desc, -> { order(created_at: :desc) }
2022-04-04 11:22:00 +05:30
scope :order_token_expires_at_asc, -> { order(token_expires_at: :asc) }
scope :order_token_expires_at_desc, -> { order(token_expires_at: :desc) }
2019-07-07 11:18:12 +05:30
scope :with_tags, -> { preload(:tags) }
2018-12-05 23:21:45 +05:30
2016-06-02 11:05:42 +05:30
validate :tag_constraints
2018-03-17 18:26:18 +05:30
validates :access_level, presence: true
2018-11-08 19:23:39 +05:30
validates :runner_type, presence: true
2023-04-23 21:23:45 +05:30
validates :registration_type, presence: true
2018-11-08 19:23:39 +05:30
validate :no_projects, unless: :project_type?
validate :no_groups, unless: :group_type?
validate :any_project, if: :project_type?
validate :exactly_one_group, if: :group_type?
2016-06-02 11:05:42 +05:30
2015-09-25 12:07:36 +05:30
acts_as_taggable
2017-08-17 22:00:37 +05:30
after_destroy :cleanup_runner_queue
2022-01-26 12:08:38 +05:30
cached_attr_reader :version, :revision, :platform, :architecture, :ip_address, :contacted_at, :executor_type
2018-03-17 18:26:18 +05:30
2019-02-15 15:39:39 +05:30
chronic_duration_attr :maximum_timeout_human_readable, :maximum_timeout,
error_message: 'Maximum job timeout has a value which could not be accepted'
2018-05-09 12:01:36 +05:30
validates :maximum_timeout, allow_nil: true,
numericality: { greater_than_or_equal_to: 600,
message: 'needs to be at least 10 minutes' }
2020-04-22 19:07:51 +05:30
validates :public_projects_minutes_cost_factor, :private_projects_minutes_cost_factor,
allow_nil: false,
numericality: { greater_than_or_equal_to: 0.0,
message: 'needs to be non-negative' }
2021-09-04 01:27:46 +05:30
validates :config, json_schema: { filename: 'ci_runner_config' }
2022-05-07 20:08:51 +05:30
validates :maintenance_note, length: { maximum: 1024 }
2022-04-04 11:22:00 +05:30
2022-11-25 23:54:43 +05:30
alias_attribute :maintenance_note, :maintainer_note # NOTE: Need to keep until REST v5 is implemented
2022-03-02 08:16:31 +05:30
2016-06-02 11:05:42 +05:30
# Searches for runners matching the given query.
#
2021-09-04 01:27:46 +05:30
# This method uses ILIKE on PostgreSQL for the description field and performs a full match on tokens.
2016-06-02 11:05:42 +05:30
#
2020-06-23 00:09:42 +05:30
# query - The search query as a String.
2016-06-02 11:05:42 +05:30
#
# Returns an ActiveRecord::Relation.
2015-09-25 12:07:36 +05:30
def self.search(query)
2021-09-04 01:27:46 +05:30
where(token: query).or(fuzzy_search(query, [:description]))
2015-09-25 12:07:36 +05:30
end
2019-12-04 20:38:33 +05:30
def self.online_contact_time_deadline
2017-09-10 17:25:29 +05:30
ONLINE_CONTACT_TIMEOUT.ago
end
2022-01-26 12:08:38 +05:30
def self.stale_deadline
STALE_TIMEOUT.ago
end
2019-12-04 20:38:33 +05:30
def self.recent_queue_deadline
# we add queue expiry + online
# - contacted_at can be updated at any time within this interval
# we have always accurate `contacted_at` but it is stored in Redis
# and not persisted in database
(ONLINE_CONTACT_TIMEOUT + RUNNER_QUEUE_EXPIRY_TIME).ago
end
2018-12-05 23:21:45 +05:30
def self.order_by(order)
2021-09-04 01:27:46 +05:30
case order
when 'contacted_asc'
2018-12-05 23:21:45 +05:30
order_contacted_at_asc
2021-09-04 01:27:46 +05:30
when 'contacted_desc'
order_contacted_at_desc
when 'created_at_asc'
order_created_at_asc
2022-04-04 11:22:00 +05:30
when 'token_expires_at_asc'
order_token_expires_at_asc
when 'token_expires_at_desc'
order_token_expires_at_desc
2018-12-05 23:21:45 +05:30
else
order_created_at_desc
end
end
2021-09-04 01:27:46 +05:30
def self.runner_matchers
unique_params = [
:runner_type,
:public_projects_minutes_cost_factor,
:private_projects_minutes_cost_factor,
:run_untagged,
:access_level,
Arel.sql("(#{arel_tag_names_array.to_sql})")
]
2022-03-02 08:16:31 +05:30
group(*unique_params).pluck('array_agg(ci_runners.id)', *unique_params).map do |values|
Gitlab::Ci::Matching::RunnerMatcher.new({
runner_ids: values[0],
runner_type: values[1],
public_projects_minutes_cost_factor: values[2],
private_projects_minutes_cost_factor: values[3],
run_untagged: values[4],
access_level: values[5],
tag_list: values[6]
})
2021-09-04 01:27:46 +05:30
end
end
def runner_matcher
strong_memoize(:runner_matcher) do
Gitlab::Ci::Matching::RunnerMatcher.new({
2021-09-30 23:02:18 +05:30
runner_ids: [id],
2021-09-04 01:27:46 +05:30
runner_type: runner_type,
public_projects_minutes_cost_factor: public_projects_minutes_cost_factor,
private_projects_minutes_cost_factor: private_projects_minutes_cost_factor,
run_untagged: run_untagged,
access_level: access_level,
tag_list: tag_list
})
end
end
2015-09-25 12:07:36 +05:30
def assign_to(project, current_user = nil)
2018-11-08 19:23:39 +05:30
if instance_type?
2022-07-16 23:28:13 +05:30
raise ArgumentError, 'Transitioning an instance runner to a project runner is not supported'
2018-10-15 14:42:47 +05:30
elsif group_type?
raise ArgumentError, 'Transitioning a group runner to a project runner is not supported'
end
2018-11-08 19:23:39 +05:30
begin
transaction do
2021-11-18 22:05:49 +05:30
self.runner_projects << ::Ci::RunnerProject.new(project: project, runner: self)
2018-11-08 19:23:39 +05:30
self.save!
end
rescue ActiveRecord::RecordInvalid => e
self.errors.add(:assign_to, e.message)
false
end
2015-09-25 12:07:36 +05:30
end
def display_name
return short_sha if description.blank?
2015-09-25 12:07:36 +05:30
description
end
2015-10-24 18:46:33 +05:30
def online?
2019-12-04 20:38:33 +05:30
contacted_at && contacted_at > self.class.online_contact_time_deadline
2015-10-24 18:46:33 +05:30
end
2022-01-26 12:08:38 +05:30
def stale?
return false unless created_at
[created_at, contacted_at].compact.max < self.class.stale_deadline
end
def status(legacy_mode = nil)
2022-07-16 23:28:13 +05:30
# TODO Deprecate legacy_mode in %16.0 and make it a no-op
# (see https://gitlab.com/gitlab-org/gitlab/-/issues/360545)
# TODO Remove legacy_mode in %17.0
2022-01-26 12:08:38 +05:30
return deprecated_rest_status if legacy_mode == '14.5'
return :stale if stale?
return :never_contacted unless contacted_at
2021-12-11 22:18:48 +05:30
online? ? :online : :offline
end
# DEPRECATED
2022-11-25 23:54:43 +05:30
# TODO Remove in v5 in favor of `status` for REST calls, see https://gitlab.com/gitlab-org/gitlab/-/issues/344648
2021-12-11 22:18:48 +05:30
def deprecated_rest_status
2022-07-16 23:28:13 +05:30
return :stale if stale?
if contacted_at.nil?
:never_contacted
2015-10-24 18:46:33 +05:30
elsif active?
online? ? :online : :offline
else
:paused
end
end
2022-10-11 01:57:18 +05:30
def owner_project
return unless project_type?
runner_projects.order(:id).first.project
end
2015-09-25 12:07:36 +05:30
def belongs_to_one_project?
runner_projects.count == 1
end
2020-07-28 23:09:34 +05:30
def belongs_to_more_than_one_project?
2021-11-18 22:05:49 +05:30
runner_projects.limit(2).count(:all) > 1
2020-07-28 23:09:34 +05:30
end
2021-04-17 20:07:23 +05:30
def match_build_if_online?(build)
2022-04-04 11:22:00 +05:30
active? && online? && matches_build?(build)
2016-06-22 15:30:34 +05:30
end
2015-09-25 12:07:36 +05:30
def only_for?(project)
2022-04-04 11:22:00 +05:30
!runner_projects.where.not(project_id: project.id).exists?
2015-09-25 12:07:36 +05:30
end
def short_sha
2023-04-23 21:23:45 +05:30
return unless token
start_index = authenticated_user_registration_type? ? CREATED_RUNNER_TOKEN_PREFIX.length : 0
token[start_index..start_index + 8]
2015-09-25 12:07:36 +05:30
end
2016-06-02 11:05:42 +05:30
2021-04-17 20:07:23 +05:30
def tag_list
if tags.loaded?
tags.map(&:name)
else
super
end
end
2016-06-02 11:05:42 +05:30
def has_tags?
tag_list.any?
end
2016-08-24 12:49:21 +05:30
def predefined_variables
2018-05-09 12:01:36 +05:30
Gitlab::Ci::Variables::Collection.new
.append(key: 'CI_RUNNER_ID', value: id.to_s)
.append(key: 'CI_RUNNER_DESCRIPTION', value: description)
.append(key: 'CI_RUNNER_TAGS', value: tag_list.to_s)
2016-08-24 12:49:21 +05:30
end
2017-08-17 22:00:37 +05:30
def tick_runner_queue
2021-09-04 01:27:46 +05:30
##
# We only stick a runner to primary database to be able to detect the
# replication lag in `EE::Ci::RegisterJobService#execute`. The
# intention here is not to execute `Ci::RegisterJobService#execute` on
# the primary database.
#
2021-11-18 22:05:49 +05:30
::Ci::Runner.sticking.stick(:runner, id)
2021-09-04 01:27:46 +05:30
2017-08-17 22:00:37 +05:30
SecureRandom.hex.tap do |new_update|
::Gitlab::Workhorse.set_key_and_notify(runner_queue_key, new_update,
expire: RUNNER_QUEUE_EXPIRY_TIME, overwrite: true)
end
end
def ensure_runner_queue_value
new_value = SecureRandom.hex
::Gitlab::Workhorse.set_key_and_notify(runner_queue_key, new_value,
expire: RUNNER_QUEUE_EXPIRY_TIME, overwrite: false)
end
2018-03-17 18:26:18 +05:30
def runner_queue_value_latest?(value)
2017-08-17 22:00:37 +05:30
ensure_runner_queue_value == value if value.present?
end
2020-06-23 00:09:42 +05:30
def heartbeat(values)
2021-09-04 01:27:46 +05:30
##
# We can safely ignore writes performed by a runner heartbeat. We do
# not want to upgrade database connection proxy to use the primary
# database after heartbeat write happens.
#
::Gitlab::Database::LoadBalancing::Session.without_sticky_writes do
2022-01-26 12:08:38 +05:30
values = values&.slice(:version, :revision, :platform, :architecture, :ip_address, :config, :executor) || {}
2021-09-04 01:27:46 +05:30
values[:contacted_at] = Time.current
2023-03-17 16:20:25 +05:30
if values.include?(:executor)
values[:executor_type] = EXECUTOR_NAME_TO_TYPES.fetch(values.delete(:executor), :unknown)
end
2018-03-17 18:26:18 +05:30
2021-09-04 01:27:46 +05:30
cache_attributes(values)
2018-03-17 18:26:18 +05:30
2021-09-04 01:27:46 +05:30
# We save data without validation, it will always change due to `contacted_at`
2022-08-27 11:52:29 +05:30
if persist_cached_data?
version_updated = values.include?(:version) && values[:version] != version
update_columns(values)
schedule_runner_version_update if version_updated
end
2021-09-04 01:27:46 +05:30
end
2018-03-17 18:26:18 +05:30
end
2018-10-15 14:42:47 +05:30
def pick_build!(build)
2021-09-04 01:27:46 +05:30
tick_runner_queue if matches_build?(build)
2018-10-15 14:42:47 +05:30
end
2022-04-04 11:22:00 +05:30
def matches_build?(build)
runner_matcher.matches?(build.build_matcher)
end
2019-02-15 15:39:39 +05:30
def uncached_contacted_at
read_attribute(:contacted_at)
end
2021-11-11 11:23:49 +05:30
def namespace_ids
strong_memoize(:namespace_ids) do
runner_namespaces.pluck(:namespace_id).compact
end
end
2022-04-04 11:22:00 +05:30
def compute_token_expiration
case runner_type
when 'instance_type'
compute_token_expiration_instance
when 'group_type'
compute_token_expiration_group
when 'project_type'
compute_token_expiration_project
end
end
2023-04-23 21:23:45 +05:30
override :format_token
def format_token(token)
return token if registration_token_registration_type?
"#{CREATED_RUNNER_TOKEN_PREFIX}#{token}"
end
def ensure_machine(system_xid, &blk)
RunnerMachine.safe_find_or_create_by!(runner_id: id, system_xid: system_xid.to_s, &blk) # rubocop: disable Performance/ActiveRecordSubtransactionMethods
end
2016-06-02 11:05:42 +05:30
private
2022-08-13 15:12:31 +05:30
scope :with_upgrade_status, ->(upgrade_status) do
2022-08-27 11:52:29 +05:30
joins(:runner_version).where(runner_version: { status: upgrade_status })
2022-08-13 15:12:31 +05:30
end
2022-01-26 12:08:38 +05:30
EXECUTOR_NAME_TO_TYPES = {
2022-03-02 08:16:31 +05:30
'unknown' => :unknown,
2022-01-26 12:08:38 +05:30
'custom' => :custom,
'shell' => :shell,
'docker' => :docker,
'docker-windows' => :docker_windows,
'docker-ssh' => :docker_ssh,
'ssh' => :ssh,
'parallels' => :parallels,
'virtualbox' => :virtualbox,
'docker+machine' => :docker_machine,
'docker-ssh+machine' => :docker_ssh_machine,
'kubernetes' => :kubernetes
}.freeze
2022-03-02 08:16:31 +05:30
EXECUTOR_TYPE_TO_NAMES = EXECUTOR_NAME_TO_TYPES.invert.freeze
2022-04-04 11:22:00 +05:30
def compute_token_expiration_instance
return unless expiration_interval = Gitlab::CurrentSettings.runner_token_expiration_interval
expiration_interval.seconds.from_now
end
def compute_token_expiration_group
::Group.where(id: runner_namespaces.map(&:namespace_id)).map(&:effective_runner_token_expiration_interval).compact.min&.from_now
end
def compute_token_expiration_project
Project.where(id: runner_projects.map(&:project_id)).map(&:effective_runner_token_expiration_interval).compact.min&.from_now
end
2017-08-17 22:00:37 +05:30
def cleanup_runner_queue
2019-10-12 21:52:04 +05:30
Gitlab::Redis::SharedState.with do |redis|
2017-08-17 22:00:37 +05:30
redis.del(runner_queue_key)
end
end
def runner_queue_key
"runner:build_queue:#{self.token}"
end
2018-03-17 18:26:18 +05:30
def persist_cached_data?
# Use a random threshold to prevent beating DB updates.
2019-12-04 20:38:33 +05:30
contacted_at_max_age = Random.rand(UPDATE_CONTACT_COLUMN_EVERY)
2018-03-17 18:26:18 +05:30
real_contacted_at = read_attribute(:contacted_at)
real_contacted_at.nil? ||
2020-06-23 00:09:42 +05:30
(Time.current - real_contacted_at) >= contacted_at_max_age
2018-03-17 18:26:18 +05:30
end
2016-06-02 11:05:42 +05:30
def tag_constraints
unless has_tags? || run_untagged?
errors.add(:tags_list,
'can not be empty when runner is not allowed to pick untagged jobs')
end
2022-04-01 21:47:47 +05:30
if tag_list_changed? && tag_list.count > TAG_LIST_MAX_LENGTH
errors.add(:tags_list,
"Too many tags specified. Please limit the number of tags to #{TAG_LIST_MAX_LENGTH}")
end
2016-06-02 11:05:42 +05:30
end
2016-06-22 15:30:34 +05:30
2018-11-08 19:23:39 +05:30
def no_projects
2021-11-18 22:05:49 +05:30
if runner_projects.any?
errors.add(:runner, 'cannot have projects assigned')
2018-11-08 19:23:39 +05:30
end
2018-10-15 14:42:47 +05:30
end
2018-11-08 19:23:39 +05:30
def no_groups
2021-12-11 22:18:48 +05:30
if runner_namespaces.any?
errors.add(:runner, 'cannot have groups assigned')
2018-10-15 14:42:47 +05:30
end
2018-11-08 19:23:39 +05:30
end
def any_project
2021-11-18 22:05:49 +05:30
unless runner_projects.any?
2018-11-08 19:23:39 +05:30
errors.add(:runner, 'needs to be assigned to at least one project')
end
end
2018-10-15 14:42:47 +05:30
2018-11-08 19:23:39 +05:30
def exactly_one_group
2021-12-11 22:18:48 +05:30
unless runner_namespaces.one?
errors.add(:runner, 'needs to be assigned to exactly one group')
2018-10-15 14:42:47 +05:30
end
2016-06-22 15:30:34 +05:30
end
2022-08-27 11:52:29 +05:30
2023-04-23 21:23:45 +05:30
# TODO Remove in 16.0 when runners are known to send a system_id
# For now, heartbeats with version updates might result in two Sidekiq jobs being queued if a runner has a system_id
# This is not a problem since the jobs are deduplicated on the version
2022-08-27 11:52:29 +05:30
def schedule_runner_version_update
return unless version
Ci::Runners::ProcessRunnerVersionUpdateWorker.perform_async(version)
end
2015-09-25 12:07:36 +05:30
end
end
2019-12-04 20:38:33 +05:30
2021-06-08 01:23:25 +05:30
Ci::Runner.prepend_mod_with('Ci::Runner')