Fixes the special case that if no worker is available and we generate an internal timeout and cancel the depsolve including all followup jobs, no error was propagated.
677 lines
22 KiB
Go
677 lines
22 KiB
Go
package v2
|
||
|
||
import (
|
||
"context"
|
||
"encoding/json"
|
||
"errors"
|
||
"fmt"
|
||
"net/http"
|
||
"strings"
|
||
"sync"
|
||
"time"
|
||
|
||
"github.com/getkin/kin-openapi/openapi3"
|
||
"github.com/getkin/kin-openapi/routers"
|
||
legacyrouter "github.com/getkin/kin-openapi/routers/legacy"
|
||
"github.com/getsentry/sentry-go"
|
||
sentryecho "github.com/getsentry/sentry-go/echo"
|
||
"github.com/google/uuid"
|
||
"github.com/labstack/echo/v4"
|
||
"github.com/labstack/echo/v4/middleware"
|
||
"github.com/sirupsen/logrus"
|
||
|
||
"github.com/osbuild/osbuild-composer/pkg/jobqueue"
|
||
|
||
"github.com/osbuild/images/pkg/container"
|
||
"github.com/osbuild/images/pkg/distrofactory"
|
||
"github.com/osbuild/images/pkg/manifest"
|
||
"github.com/osbuild/images/pkg/ostree"
|
||
"github.com/osbuild/images/pkg/reporegistry"
|
||
"github.com/osbuild/images/pkg/sbom"
|
||
"github.com/osbuild/osbuild-composer/internal/auth"
|
||
"github.com/osbuild/osbuild-composer/internal/blueprint"
|
||
"github.com/osbuild/osbuild-composer/internal/common"
|
||
"github.com/osbuild/osbuild-composer/internal/prometheus"
|
||
"github.com/osbuild/osbuild-composer/internal/target"
|
||
"github.com/osbuild/osbuild-composer/internal/worker"
|
||
"github.com/osbuild/osbuild-composer/internal/worker/clienterrors"
|
||
)
|
||
|
||
// Server represents the state of the cloud Server
|
||
type Server struct {
|
||
workers *worker.Server
|
||
distros *distrofactory.Factory
|
||
repos *reporegistry.RepoRegistry
|
||
config ServerConfig
|
||
router routers.Router
|
||
|
||
goroutinesCtx context.Context
|
||
goroutinesCtxCancel context.CancelFunc
|
||
goroutinesGroup sync.WaitGroup
|
||
}
|
||
|
||
type ServerConfig struct {
|
||
TenantProviderFields []string
|
||
JWTEnabled bool
|
||
}
|
||
|
||
func NewServer(workers *worker.Server, distros *distrofactory.Factory, repos *reporegistry.RepoRegistry, config ServerConfig) *Server {
|
||
ctx, cancel := context.WithCancel(context.Background())
|
||
spec, err := GetSwagger()
|
||
if err != nil {
|
||
panic(err)
|
||
}
|
||
|
||
loader := openapi3.NewLoader()
|
||
if err := spec.Validate(loader.Context); err != nil {
|
||
panic(err)
|
||
}
|
||
|
||
router, err := legacyrouter.NewRouter(spec)
|
||
if err != nil {
|
||
panic(err)
|
||
}
|
||
|
||
server := &Server{
|
||
workers: workers,
|
||
distros: distros,
|
||
repos: repos,
|
||
config: config,
|
||
router: router,
|
||
|
||
goroutinesCtx: ctx,
|
||
goroutinesCtxCancel: cancel,
|
||
}
|
||
return server
|
||
}
|
||
|
||
func (s *Server) Handler(path string) http.Handler {
|
||
e := echo.New()
|
||
e.Binder = binder{}
|
||
e.HTTPErrorHandler = HTTPErrorHandler
|
||
e.Logger = common.Logger()
|
||
|
||
// OperationIDMiddleware - generates OperationID random string and puts it into the contexts
|
||
// ExternalIDMiddleware - extracts ID from HTTP header and puts it into the contexts
|
||
// LoggerMiddleware - creates context-aware logger for each request
|
||
e.Pre(common.OperationIDMiddleware, common.ExternalIDMiddleware, common.LoggerMiddleware)
|
||
e.Use(middleware.Recover())
|
||
|
||
e.Use(middleware.RequestLoggerWithConfig(middleware.RequestLoggerConfig{
|
||
LogURI: true,
|
||
LogStatus: true,
|
||
LogLatency: true,
|
||
LogMethod: true,
|
||
LogValuesFunc: func(c echo.Context, values middleware.RequestLoggerValues) error {
|
||
fields := logrus.Fields{
|
||
"uri": values.URI,
|
||
"method": values.Method,
|
||
"status": values.Status,
|
||
"latency_ms": values.Latency.Milliseconds(),
|
||
"operation_id": c.Get(common.OperationIDKey),
|
||
"external_id": c.Get(common.ExternalIDKey),
|
||
}
|
||
if values.Error != nil {
|
||
fields["error"] = values.Error
|
||
}
|
||
logrus.WithFields(fields).Infof("Processed request %s %s", values.Method, values.URI)
|
||
|
||
return nil
|
||
},
|
||
}))
|
||
|
||
if sentry.CurrentHub().Client() == nil {
|
||
logrus.Warn("Sentry/Glitchtip not initialized, echo middleware was not enabled")
|
||
} else {
|
||
e.Use(sentryecho.New(sentryecho.Options{}))
|
||
}
|
||
|
||
handler := apiHandlers{
|
||
server: s,
|
||
}
|
||
|
||
mws := []echo.MiddlewareFunc{
|
||
prometheus.StatusMiddleware(prometheus.ComposerSubsystem),
|
||
}
|
||
if s.config.JWTEnabled {
|
||
mws = append(mws, auth.TenantChannelMiddleware(s.config.TenantProviderFields, HTTPError(ErrorTenantNotFound)))
|
||
}
|
||
mws = append(mws,
|
||
prometheus.HTTPDurationMiddleware(prometheus.ComposerSubsystem),
|
||
prometheus.MetricsMiddleware, s.ValidateRequest)
|
||
RegisterHandlers(e.Group(path, mws...), &handler)
|
||
|
||
return e
|
||
}
|
||
|
||
func (s *Server) Shutdown() {
|
||
s.goroutinesCtxCancel()
|
||
s.goroutinesGroup.Wait()
|
||
}
|
||
|
||
func (s *Server) enqueueCompose(irs []imageRequest, channel string) (uuid.UUID, error) {
|
||
var id uuid.UUID
|
||
if len(irs) != 1 {
|
||
return id, HTTPError(ErrorInvalidNumberOfImageBuilds)
|
||
}
|
||
ir := irs[0]
|
||
|
||
ibp := blueprint.Convert(ir.blueprint)
|
||
// shortcuts
|
||
arch := ir.imageType.Arch()
|
||
distribution := arch.Distro()
|
||
|
||
manifestSource, _, err := ir.imageType.Manifest(&ibp, ir.imageOptions, ir.repositories, ir.manifestSeed)
|
||
if err != nil {
|
||
logrus.Warningf("ErrorEnqueueingJob, failed generating manifest: %v", err)
|
||
return id, HTTPErrorWithInternal(ErrorEnqueueingJob, err)
|
||
}
|
||
|
||
depsolveJobID, err := s.workers.EnqueueDepsolve(&worker.DepsolveJob{
|
||
PackageSets: manifestSource.GetPackageSetChains(),
|
||
ModulePlatformID: distribution.ModulePlatformID(),
|
||
Arch: arch.Name(),
|
||
Releasever: distribution.Releasever(),
|
||
SbomType: sbom.StandardTypeSpdx,
|
||
}, channel)
|
||
if err != nil {
|
||
return id, HTTPErrorWithInternal(ErrorEnqueueingJob, err)
|
||
}
|
||
dependencies := []uuid.UUID{depsolveJobID}
|
||
|
||
var containerResolveJobID uuid.UUID
|
||
containerSources := manifestSource.GetContainerSourceSpecs()
|
||
if len(containerSources) > 1 {
|
||
// only one pipeline can embed containers
|
||
pipelines := make([]string, 0, len(containerSources))
|
||
for name := range containerSources {
|
||
pipelines = append(pipelines, name)
|
||
}
|
||
return id, HTTPErrorWithInternal(ErrorEnqueueingJob, fmt.Errorf("manifest returned %d pipelines with containers (at most 1 is supported): %s", len(containerSources), strings.Join(pipelines, ", ")))
|
||
}
|
||
|
||
for _, sources := range containerSources {
|
||
workerResolveSpecs := make([]worker.ContainerSpec, len(sources))
|
||
for idx, source := range sources {
|
||
workerResolveSpecs[idx] = worker.ContainerSpec{
|
||
Source: source.Source,
|
||
Name: source.Name,
|
||
TLSVerify: source.TLSVerify,
|
||
}
|
||
}
|
||
|
||
job := worker.ContainerResolveJob{
|
||
Arch: arch.Name(),
|
||
Specs: workerResolveSpecs,
|
||
}
|
||
|
||
jobId, err := s.workers.EnqueueContainerResolveJob(&job, channel)
|
||
if err != nil {
|
||
return id, HTTPErrorWithInternal(ErrorEnqueueingJob, err)
|
||
}
|
||
|
||
containerResolveJobID = jobId
|
||
dependencies = append(dependencies, containerResolveJobID)
|
||
break // there can be only one
|
||
}
|
||
|
||
var ostreeResolveJobID uuid.UUID
|
||
commitSources := manifestSource.GetOSTreeSourceSpecs()
|
||
if len(commitSources) > 1 {
|
||
// only one pipeline can specify an ostree commit for content
|
||
pipelines := make([]string, 0, len(commitSources))
|
||
for name := range commitSources {
|
||
pipelines = append(pipelines, name)
|
||
}
|
||
return id, HTTPErrorWithInternal(ErrorEnqueueingJob, fmt.Errorf("manifest returned %d pipelines with ostree commits (at most 1 is supported): %s", len(commitSources), strings.Join(pipelines, ", ")))
|
||
}
|
||
for _, sources := range commitSources {
|
||
workerResolveSpecs := make([]worker.OSTreeResolveSpec, len(sources))
|
||
for idx, source := range sources {
|
||
// ostree.SourceSpec is directly convertible to worker.OSTreeResolveSpec
|
||
workerResolveSpecs[idx] = worker.OSTreeResolveSpec{
|
||
URL: source.URL,
|
||
Ref: source.Ref,
|
||
RHSM: source.RHSM,
|
||
}
|
||
|
||
}
|
||
jobID, err := s.workers.EnqueueOSTreeResolveJob(&worker.OSTreeResolveJob{Specs: workerResolveSpecs}, channel)
|
||
if err != nil {
|
||
return id, HTTPErrorWithInternal(ErrorEnqueueingJob, err)
|
||
}
|
||
|
||
ostreeResolveJobID = jobID
|
||
dependencies = append(dependencies, ostreeResolveJobID)
|
||
break // there can be only one
|
||
}
|
||
|
||
manifestJobID, err := s.workers.EnqueueManifestJobByID(&worker.ManifestJobByID{}, dependencies, channel)
|
||
if err != nil {
|
||
return id, HTTPErrorWithInternal(ErrorEnqueueingJob, err)
|
||
}
|
||
|
||
id, err = s.workers.EnqueueOSBuildAsDependency(arch.Name(), &worker.OSBuildJob{
|
||
Targets: ir.targets,
|
||
PipelineNames: &worker.PipelineNames{
|
||
Build: ir.imageType.BuildPipelines(),
|
||
Payload: ir.imageType.PayloadPipelines(),
|
||
},
|
||
}, []uuid.UUID{manifestJobID}, channel)
|
||
if err != nil {
|
||
return id, HTTPErrorWithInternal(ErrorEnqueueingJob, err)
|
||
}
|
||
|
||
s.goroutinesGroup.Add(1)
|
||
go func() {
|
||
serializeManifest(s.goroutinesCtx, manifestSource, s.workers, depsolveJobID, containerResolveJobID, ostreeResolveJobID, manifestJobID, id, ir.manifestSeed)
|
||
defer s.goroutinesGroup.Done()
|
||
}()
|
||
|
||
return id, nil
|
||
}
|
||
|
||
func (s *Server) enqueueKojiCompose(taskID uint64, server, name, version, release string, irs []imageRequest, channel string) (uuid.UUID, error) {
|
||
var id uuid.UUID
|
||
kojiDirectory := "osbuild-cg/osbuild-composer-koji-" + uuid.New().String()
|
||
|
||
initID, err := s.workers.EnqueueKojiInit(&worker.KojiInitJob{
|
||
Server: server,
|
||
Name: name,
|
||
Version: version,
|
||
Release: release,
|
||
}, channel)
|
||
if err != nil {
|
||
return id, HTTPErrorWithInternal(ErrorEnqueueingJob, err)
|
||
}
|
||
|
||
var kojiFilenames []string
|
||
var buildIDs []uuid.UUID
|
||
for _, ir := range irs {
|
||
ibp := blueprint.Convert(ir.blueprint)
|
||
|
||
// shortcuts
|
||
arch := ir.imageType.Arch()
|
||
distribution := arch.Distro()
|
||
|
||
manifestSource, _, err := ir.imageType.Manifest(&ibp, ir.imageOptions, ir.repositories, ir.manifestSeed)
|
||
if err != nil {
|
||
logrus.Errorf("ErrorEnqueueingJob, failed generating manifest: %v", err)
|
||
return id, HTTPErrorWithInternal(ErrorEnqueueingJob, err)
|
||
}
|
||
|
||
depsolveJobID, err := s.workers.EnqueueDepsolve(&worker.DepsolveJob{
|
||
PackageSets: manifestSource.GetPackageSetChains(),
|
||
ModulePlatformID: distribution.ModulePlatformID(),
|
||
Arch: arch.Name(),
|
||
Releasever: distribution.Releasever(),
|
||
SbomType: sbom.StandardTypeSpdx,
|
||
}, channel)
|
||
if err != nil {
|
||
return id, HTTPErrorWithInternal(ErrorEnqueueingJob, err)
|
||
}
|
||
dependencies := []uuid.UUID{depsolveJobID}
|
||
|
||
var containerResolveJobID uuid.UUID
|
||
containerSources := manifestSource.GetContainerSourceSpecs()
|
||
if len(containerSources) > 1 {
|
||
// only one pipeline can embed containers
|
||
pipelines := make([]string, 0, len(containerSources))
|
||
for name := range containerSources {
|
||
pipelines = append(pipelines, name)
|
||
}
|
||
return id, HTTPErrorWithInternal(ErrorEnqueueingJob, fmt.Errorf("manifest returned %d pipelines with containers (at most 1 is supported): %s", len(containerSources), strings.Join(pipelines, ", ")))
|
||
}
|
||
|
||
for _, sources := range containerSources {
|
||
workerResolveSpecs := make([]worker.ContainerSpec, len(sources))
|
||
for idx, source := range sources {
|
||
workerResolveSpecs[idx] = worker.ContainerSpec{
|
||
Source: source.Source,
|
||
Name: source.Name,
|
||
TLSVerify: source.TLSVerify,
|
||
}
|
||
}
|
||
|
||
job := worker.ContainerResolveJob{
|
||
Arch: arch.Name(),
|
||
Specs: make([]worker.ContainerSpec, len(ir.blueprint.Containers)),
|
||
}
|
||
|
||
jobId, err := s.workers.EnqueueContainerResolveJob(&job, channel)
|
||
if err != nil {
|
||
return id, HTTPErrorWithInternal(ErrorEnqueueingJob, err)
|
||
}
|
||
|
||
containerResolveJobID = jobId
|
||
dependencies = append(dependencies, containerResolveJobID)
|
||
break // there can be only one
|
||
}
|
||
|
||
var ostreeResolveJobID uuid.UUID
|
||
commitSources := manifestSource.GetOSTreeSourceSpecs()
|
||
if len(commitSources) > 1 {
|
||
// only one pipeline can specify an ostree commit for content
|
||
pipelines := make([]string, 0, len(commitSources))
|
||
for name := range commitSources {
|
||
pipelines = append(pipelines, name)
|
||
}
|
||
return id, HTTPErrorWithInternal(ErrorEnqueueingJob, fmt.Errorf("manifest returned %d pipelines with ostree commits (at most 1 is supported): %s", len(commitSources), strings.Join(pipelines, ", ")))
|
||
}
|
||
for _, sources := range commitSources {
|
||
workerResolveSpecs := make([]worker.OSTreeResolveSpec, len(sources))
|
||
for idx, source := range sources {
|
||
// ostree.SourceSpec is directly convertible to worker.OSTreeResolveSpec
|
||
workerResolveSpecs[idx] = worker.OSTreeResolveSpec{
|
||
URL: source.URL,
|
||
Ref: source.Ref,
|
||
RHSM: source.RHSM,
|
||
}
|
||
}
|
||
jobID, err := s.workers.EnqueueOSTreeResolveJob(&worker.OSTreeResolveJob{Specs: workerResolveSpecs}, channel)
|
||
if err != nil {
|
||
return id, HTTPErrorWithInternal(ErrorEnqueueingJob, err)
|
||
}
|
||
|
||
ostreeResolveJobID = jobID
|
||
dependencies = append(dependencies, ostreeResolveJobID)
|
||
break // there can be only one
|
||
}
|
||
|
||
manifestJobID, err := s.workers.EnqueueManifestJobByID(&worker.ManifestJobByID{}, dependencies, channel)
|
||
if err != nil {
|
||
return id, HTTPErrorWithInternal(ErrorEnqueueingJob, err)
|
||
}
|
||
kojiFilename := fmt.Sprintf(
|
||
"%s-%s-%s.%s%s",
|
||
name,
|
||
version,
|
||
release,
|
||
arch.Name(),
|
||
splitExtension(ir.imageType.Filename()),
|
||
)
|
||
|
||
kojiTarget := target.NewKojiTarget(&target.KojiTargetOptions{
|
||
Server: server,
|
||
UploadDirectory: kojiDirectory,
|
||
})
|
||
kojiTarget.OsbuildArtifact.ExportFilename = ir.imageType.Filename()
|
||
kojiTarget.OsbuildArtifact.ExportName = ir.imageType.Exports()[0]
|
||
kojiTarget.ImageName = kojiFilename
|
||
|
||
targets := []*target.Target{kojiTarget}
|
||
// add any cloud upload targets if defined
|
||
if ir.targets != nil {
|
||
targets = append(targets, ir.targets...)
|
||
}
|
||
|
||
buildID, err := s.workers.EnqueueOSBuildAsDependency(arch.Name(), &worker.OSBuildJob{
|
||
PipelineNames: &worker.PipelineNames{
|
||
Build: ir.imageType.BuildPipelines(),
|
||
Payload: ir.imageType.PayloadPipelines(),
|
||
},
|
||
Targets: targets,
|
||
ManifestDynArgsIdx: common.ToPtr(1),
|
||
DepsolveDynArgsIdx: common.ToPtr(2),
|
||
ImageBootMode: ir.imageType.BootMode().String(),
|
||
}, []uuid.UUID{initID, manifestJobID, depsolveJobID}, channel)
|
||
if err != nil {
|
||
return id, HTTPErrorWithInternal(ErrorEnqueueingJob, err)
|
||
}
|
||
kojiFilenames = append(kojiFilenames, kojiFilename)
|
||
buildIDs = append(buildIDs, buildID)
|
||
|
||
// copy the image request while passing it into the goroutine to prevent data races
|
||
s.goroutinesGroup.Add(1)
|
||
go func(ir imageRequest) {
|
||
serializeManifest(s.goroutinesCtx, manifestSource, s.workers, depsolveJobID, containerResolveJobID, ostreeResolveJobID, manifestJobID, buildID, ir.manifestSeed)
|
||
defer s.goroutinesGroup.Done()
|
||
}(ir)
|
||
}
|
||
id, err = s.workers.EnqueueKojiFinalize(&worker.KojiFinalizeJob{
|
||
Server: server,
|
||
Name: name,
|
||
Version: version,
|
||
Release: release,
|
||
KojiFilenames: kojiFilenames,
|
||
KojiDirectory: kojiDirectory,
|
||
TaskID: taskID,
|
||
StartTime: uint64(time.Now().Unix()),
|
||
}, initID, buildIDs, channel)
|
||
if err != nil {
|
||
return id, HTTPErrorWithInternal(ErrorEnqueueingJob, err)
|
||
}
|
||
|
||
return id, nil
|
||
}
|
||
|
||
func serializeManifest(ctx context.Context, manifestSource *manifest.Manifest, workers *worker.Server, depsolveJobID, containerResolveJobID, ostreeResolveJobID, manifestJobID, osbuildJobID uuid.UUID, seed int64) {
|
||
// prepared to become a config variable
|
||
const depsolveTimeout = 5
|
||
ctx, cancel := context.WithTimeout(ctx, time.Minute*depsolveTimeout)
|
||
defer cancel()
|
||
|
||
jobResult := &worker.ManifestJobByIDResult{
|
||
Manifest: nil,
|
||
ManifestInfo: worker.ManifestInfo{
|
||
OSBuildComposerVersion: common.BuildVersion(),
|
||
},
|
||
}
|
||
|
||
var dynArgs []json.RawMessage
|
||
var err error
|
||
token := uuid.Nil
|
||
logWithId := logrus.WithField("jobId", manifestJobID)
|
||
|
||
defer func() {
|
||
// token == uuid.Nil indicates that no worker even started processing
|
||
if token == uuid.Nil {
|
||
if jobResult.JobError != nil {
|
||
// set all jobs to "failed"
|
||
jobs := map[string]uuid.UUID{
|
||
"depsolve": depsolveJobID,
|
||
"containerResolve": containerResolveJobID,
|
||
"ostreeResolve": ostreeResolveJobID,
|
||
"manifest": manifestJobID,
|
||
"osbuild": osbuildJobID,
|
||
}
|
||
|
||
for jobName, jobID := range jobs {
|
||
if jobID != uuid.Nil {
|
||
err := workers.SetFailed(jobID, jobResult.JobError)
|
||
if err != nil {
|
||
logWithId.Errorf("Error failing %s job: %v", jobName, err)
|
||
}
|
||
}
|
||
}
|
||
|
||
} else {
|
||
logWithId.Errorf("Internal error, no worker started depsolve but we didn't get a reason.")
|
||
}
|
||
} else {
|
||
result, err := json.Marshal(jobResult)
|
||
if err != nil {
|
||
logWithId.Errorf("Error marshalling manifest job results: %v", err)
|
||
}
|
||
err = workers.FinishJob(token, result)
|
||
if err != nil {
|
||
logWithId.Errorf("Error finishing manifest job: %v", err)
|
||
}
|
||
if jobResult.JobError != nil {
|
||
logWithId.Errorf("Error in manifest job %v: %v", jobResult.JobError.Reason, err)
|
||
}
|
||
}
|
||
}()
|
||
|
||
// wait until job is in a pending state
|
||
for {
|
||
_, token, _, _, dynArgs, err = workers.RequestJobById(ctx, "", manifestJobID)
|
||
if errors.Is(err, jobqueue.ErrNotPending) {
|
||
logWithId.Debug("Manifest job not pending, waiting for depsolve job to finish")
|
||
time.Sleep(time.Millisecond * 50)
|
||
select {
|
||
case <-ctx.Done():
|
||
logWithId.Warning(fmt.Sprintf("Manifest job dependencies took longer than %d minutes to finish,"+
|
||
" or the server is shutting down, returning to avoid dangling routines", depsolveTimeout))
|
||
|
||
jobResult.JobError = clienterrors.New(clienterrors.ErrorDepsolveTimeout,
|
||
"Timeout while waiting for package dependency resolution",
|
||
"There may be a temporary issue with compute resources. "+
|
||
"We’re looking into it, please try again later.",
|
||
)
|
||
break
|
||
default:
|
||
continue
|
||
}
|
||
}
|
||
if err != nil {
|
||
logWithId.Errorf("Error requesting manifest job: %v", err)
|
||
return
|
||
}
|
||
break
|
||
}
|
||
|
||
// add osbuild/images dependency info to job result
|
||
osbuildImagesDep, err := common.GetDepModuleInfoByPath(common.OSBuildImagesModulePath)
|
||
if err != nil {
|
||
// do not fail here and just log the error, because the module info is not available in tests.
|
||
// Failing here would make the unit tests fail. See https://github.com/golang/go/issues/33976
|
||
logWithId.Errorf("Error getting %s dependency info: %v", common.OSBuildImagesModulePath, err)
|
||
} else {
|
||
osbuildImagesDepModule := worker.ComposerDepModuleFromDebugModule(osbuildImagesDep)
|
||
jobResult.ManifestInfo.OSBuildComposerDeps = append(jobResult.ManifestInfo.OSBuildComposerDeps, osbuildImagesDepModule)
|
||
}
|
||
|
||
if len(dynArgs) == 0 {
|
||
reason := "No dynamic arguments"
|
||
jobResult.JobError = clienterrors.New(clienterrors.ErrorNoDynamicArgs, reason, nil)
|
||
return
|
||
}
|
||
|
||
var depsolveResults worker.DepsolveJobResult
|
||
err = json.Unmarshal(dynArgs[0], &depsolveResults)
|
||
if err != nil {
|
||
reason := "Error parsing dynamic arguments"
|
||
jobResult.JobError = clienterrors.New(clienterrors.ErrorParsingDynamicArgs, reason, nil)
|
||
return
|
||
}
|
||
|
||
_, err = workers.DepsolveJobInfo(depsolveJobID, &depsolveResults)
|
||
if err != nil {
|
||
reason := "Error reading depsolve status"
|
||
jobResult.JobError = clienterrors.New(clienterrors.ErrorReadingJobStatus, reason, nil)
|
||
return
|
||
}
|
||
|
||
if jobErr := depsolveResults.JobError; jobErr != nil {
|
||
if jobErr.ID == clienterrors.ErrorDNFDepsolveError || jobErr.ID == clienterrors.ErrorDNFMarkingErrors {
|
||
jobResult.JobError = clienterrors.New(clienterrors.ErrorDepsolveDependency, "Error in depsolve job dependency input, bad package set requested", jobErr.Details)
|
||
return
|
||
}
|
||
jobResult.JobError = clienterrors.New(clienterrors.ErrorDepsolveDependency, "Error in depsolve job dependency", jobErr.Details)
|
||
return
|
||
}
|
||
|
||
if len(depsolveResults.PackageSpecs) == 0 {
|
||
jobResult.JobError = clienterrors.New(clienterrors.ErrorEmptyPackageSpecs, "Received empty package specs", nil)
|
||
return
|
||
}
|
||
|
||
var containerSpecs map[string][]container.Spec
|
||
if containerResolveJobID != uuid.Nil {
|
||
// Container resolve job
|
||
var result worker.ContainerResolveJobResult
|
||
_, err := workers.ContainerResolveJobInfo(containerResolveJobID, &result)
|
||
|
||
if err != nil {
|
||
reason := "Error reading container resolve job status"
|
||
jobResult.JobError = clienterrors.New(clienterrors.ErrorReadingJobStatus, reason, nil)
|
||
return
|
||
}
|
||
|
||
if jobErr := result.JobError; jobErr != nil {
|
||
jobResult.JobError = clienterrors.New(clienterrors.ErrorContainerDependency, "Error in container resolve job dependency", nil)
|
||
return
|
||
}
|
||
|
||
// NOTE: The container resolve job doesn't hold the pipeline name for
|
||
// the container embedding, so we need to get it from the manifest
|
||
// content field. There should be only one.
|
||
var containerEmbedPipeline string
|
||
for name := range manifestSource.GetContainerSourceSpecs() {
|
||
containerEmbedPipeline = name
|
||
break
|
||
}
|
||
|
||
pipelineSpecs := make([]container.Spec, len(result.Specs))
|
||
for idx, resultSpec := range result.Specs {
|
||
pipelineSpecs[idx] = container.Spec{
|
||
Source: resultSpec.Source,
|
||
Digest: resultSpec.Digest,
|
||
LocalName: resultSpec.Name,
|
||
TLSVerify: resultSpec.TLSVerify,
|
||
ImageID: resultSpec.ImageID,
|
||
ListDigest: resultSpec.ListDigest,
|
||
}
|
||
|
||
}
|
||
containerSpecs = map[string][]container.Spec{
|
||
containerEmbedPipeline: pipelineSpecs,
|
||
}
|
||
}
|
||
|
||
var ostreeCommitSpecs map[string][]ostree.CommitSpec
|
||
if ostreeResolveJobID != uuid.Nil {
|
||
var result worker.OSTreeResolveJobResult
|
||
_, err := workers.OSTreeResolveJobInfo(ostreeResolveJobID, &result)
|
||
|
||
if err != nil {
|
||
reason := "Error reading ostree resolve job status"
|
||
logrus.Errorf("%s: %v", reason, err)
|
||
jobResult.JobError = clienterrors.New(clienterrors.ErrorReadingJobStatus, reason, nil)
|
||
return
|
||
}
|
||
|
||
if jobErr := result.JobError; jobErr != nil {
|
||
jobResult.JobError = clienterrors.New(clienterrors.ErrorOSTreeDependency, "Error in ostree resolve job dependency", nil)
|
||
return
|
||
}
|
||
|
||
// NOTE: The ostree resolve job doesn't hold the pipeline name for the
|
||
// ostree commits, so we need to get it from the manifest content
|
||
// field. There should be only one.
|
||
var ostreeCommitPipeline string
|
||
for name := range manifestSource.GetOSTreeSourceSpecs() {
|
||
ostreeCommitPipeline = name
|
||
break
|
||
}
|
||
|
||
commitSpecs := make([]ostree.CommitSpec, len(result.Specs))
|
||
for idx, resultSpec := range result.Specs {
|
||
commitSpecs[idx] = ostree.CommitSpec{
|
||
Ref: resultSpec.Ref,
|
||
URL: resultSpec.URL,
|
||
Checksum: resultSpec.Checksum,
|
||
}
|
||
if resultSpec.RHSM {
|
||
// NOTE: Older workers don't set the Secrets string in the result
|
||
// spec so let's add it here for backwards compatibility. This
|
||
// should be removed after a few versions when all workers have
|
||
// been updated.
|
||
resultSpec.Secrets = "org.osbuild.rhsm.consumer"
|
||
}
|
||
}
|
||
ostreeCommitSpecs = map[string][]ostree.CommitSpec{
|
||
ostreeCommitPipeline: commitSpecs,
|
||
}
|
||
}
|
||
|
||
ms, err := manifestSource.Serialize(depsolveResults.PackageSpecs, containerSpecs, ostreeCommitSpecs, depsolveResults.RepoConfigs)
|
||
if err != nil {
|
||
reason := "Error serializing manifest"
|
||
jobResult.JobError = clienterrors.New(clienterrors.ErrorManifestGeneration, reason, nil)
|
||
return
|
||
}
|
||
|
||
jobResult.Manifest = ms
|
||
}
|