parent
							
								
									fc23b7d08e
								
							
						
					
					
						commit
						2407e4f6c6
					
				|  | @ -0,0 +1,226 @@ | ||||||
|  | /* | ||||||
|  | Copyright 2022 The actions-runner-controller authors. | ||||||
|  | 
 | ||||||
|  | Licensed under the Apache License, Version 2.0 (the "License"); | ||||||
|  | you may not use this file except in compliance with the License. | ||||||
|  | You may obtain a copy of the License at | ||||||
|  | 
 | ||||||
|  |     http://www.apache.org/licenses/LICENSE-2.0
 | ||||||
|  | 
 | ||||||
|  | Unless required by applicable law or agreed to in writing, software | ||||||
|  | distributed under the License is distributed on an "AS IS" BASIS, | ||||||
|  | WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. | ||||||
|  | See the License for the specific language governing permissions and | ||||||
|  | limitations under the License. | ||||||
|  | */ | ||||||
|  | 
 | ||||||
|  | package main | ||||||
|  | 
 | ||||||
|  | import ( | ||||||
|  | 	"context" | ||||||
|  | 	"errors" | ||||||
|  | 	"flag" | ||||||
|  | 	"fmt" | ||||||
|  | 	"net/http" | ||||||
|  | 	"os" | ||||||
|  | 	"sync" | ||||||
|  | 
 | ||||||
|  | 	actionsv1alpha1 "github.com/actions-runner-controller/actions-runner-controller/api/v1alpha1" | ||||||
|  | 	"github.com/actions-runner-controller/actions-runner-controller/github" | ||||||
|  | 	"github.com/actions-runner-controller/actions-runner-controller/logging" | ||||||
|  | 	"github.com/actions-runner-controller/actions-runner-controller/pkg/actionsmetrics" | ||||||
|  | 	"github.com/prometheus/client_golang/prometheus/promhttp" | ||||||
|  | 	"sigs.k8s.io/controller-runtime/pkg/metrics" | ||||||
|  | 
 | ||||||
|  | 	"github.com/kelseyhightower/envconfig" | ||||||
|  | 
 | ||||||
|  | 	"k8s.io/apimachinery/pkg/runtime" | ||||||
|  | 	clientgoscheme "k8s.io/client-go/kubernetes/scheme" | ||||||
|  | 	_ "k8s.io/client-go/plugin/pkg/client/auth/exec" | ||||||
|  | 	_ "k8s.io/client-go/plugin/pkg/client/auth/gcp" | ||||||
|  | 	_ "k8s.io/client-go/plugin/pkg/client/auth/oidc" | ||||||
|  | 	ctrl "sigs.k8s.io/controller-runtime" | ||||||
|  | 	// +kubebuilder:scaffold:imports
 | ||||||
|  | ) | ||||||
|  | 
 | ||||||
|  | var ( | ||||||
|  | 	scheme = runtime.NewScheme() | ||||||
|  | ) | ||||||
|  | 
 | ||||||
|  | const ( | ||||||
|  | 	webhookSecretTokenEnvName = "GITHUB_WEBHOOK_SECRET_TOKEN" | ||||||
|  | ) | ||||||
|  | 
 | ||||||
|  | func init() { | ||||||
|  | 	_ = clientgoscheme.AddToScheme(scheme) | ||||||
|  | 
 | ||||||
|  | 	_ = actionsv1alpha1.AddToScheme(scheme) | ||||||
|  | 	// +kubebuilder:scaffold:scheme
 | ||||||
|  | } | ||||||
|  | 
 | ||||||
|  | func main() { | ||||||
|  | 	var ( | ||||||
|  | 		err error | ||||||
|  | 
 | ||||||
|  | 		webhookAddr string | ||||||
|  | 		metricsAddr string | ||||||
|  | 
 | ||||||
|  | 		// The secret token of the GitHub Webhook. See https://docs.github.com/en/developers/webhooks-and-events/securing-your-webhooks
 | ||||||
|  | 		webhookSecretToken    string | ||||||
|  | 		webhookSecretTokenEnv string | ||||||
|  | 
 | ||||||
|  | 		logLevel  string | ||||||
|  | 		logFormat string | ||||||
|  | 
 | ||||||
|  | 		ghClient *github.Client | ||||||
|  | 	) | ||||||
|  | 
 | ||||||
|  | 	var c github.Config | ||||||
|  | 	err = envconfig.Process("github", &c) | ||||||
|  | 	if err != nil { | ||||||
|  | 		fmt.Fprintf(os.Stderr, "Error: processing environment variables: %v\n", err) | ||||||
|  | 		os.Exit(1) | ||||||
|  | 	} | ||||||
|  | 
 | ||||||
|  | 	webhookSecretTokenEnv = os.Getenv(webhookSecretTokenEnvName) | ||||||
|  | 
 | ||||||
|  | 	flag.StringVar(&webhookAddr, "webhook-addr", ":8000", "The address the metric endpoint binds to.") | ||||||
|  | 	flag.StringVar(&metricsAddr, "metrics-addr", ":8080", "The address the metric endpoint binds to.") | ||||||
|  | 	flag.StringVar(&logLevel, "log-level", logging.LogLevelDebug, `The verbosity of the logging. Valid values are "debug", "info", "warn", "error". Defaults to "debug".`) | ||||||
|  | 	flag.StringVar(&webhookSecretToken, "github-webhook-secret-token", "", "The personal access token of GitHub.") | ||||||
|  | 	flag.StringVar(&c.Token, "github-token", c.Token, "The personal access token of GitHub.") | ||||||
|  | 	flag.Int64Var(&c.AppID, "github-app-id", c.AppID, "The application ID of GitHub App.") | ||||||
|  | 	flag.Int64Var(&c.AppInstallationID, "github-app-installation-id", c.AppInstallationID, "The installation ID of GitHub App.") | ||||||
|  | 	flag.StringVar(&c.AppPrivateKey, "github-app-private-key", c.AppPrivateKey, "The path of a private key file to authenticate as a GitHub App") | ||||||
|  | 	flag.StringVar(&c.URL, "github-url", c.URL, "GitHub URL to be used for GitHub API calls") | ||||||
|  | 	flag.StringVar(&c.UploadURL, "github-upload-url", c.UploadURL, "GitHub Upload URL to be used for GitHub API calls") | ||||||
|  | 	flag.StringVar(&c.BasicauthUsername, "github-basicauth-username", c.BasicauthUsername, "Username for GitHub basic auth to use instead of PAT or GitHub APP in case it's running behind a proxy API") | ||||||
|  | 	flag.StringVar(&c.BasicauthPassword, "github-basicauth-password", c.BasicauthPassword, "Password for GitHub basic auth to use instead of PAT or GitHub APP in case it's running behind a proxy API") | ||||||
|  | 	flag.StringVar(&c.RunnerGitHubURL, "runner-github-url", c.RunnerGitHubURL, "GitHub URL to be used by runners during registration") | ||||||
|  | 	flag.StringVar(&logFormat, "log-format", "text", `The log format. Valid options are "text" and "json". Defaults to "text"`) | ||||||
|  | 
 | ||||||
|  | 	flag.Parse() | ||||||
|  | 
 | ||||||
|  | 	logger, err := logging.NewLogger(logLevel, logFormat) | ||||||
|  | 	if err != nil { | ||||||
|  | 		fmt.Fprintf(os.Stderr, "Error: creating logger: %v\n", err) | ||||||
|  | 		os.Exit(1) | ||||||
|  | 	} | ||||||
|  | 	logger.WithName("setup") | ||||||
|  | 
 | ||||||
|  | 	if webhookSecretToken == "" && webhookSecretTokenEnv != "" { | ||||||
|  | 		logger.Info(fmt.Sprintf("Using the value from %s for -github-webhook-secret-token", webhookSecretTokenEnvName)) | ||||||
|  | 		webhookSecretToken = webhookSecretTokenEnv | ||||||
|  | 	} | ||||||
|  | 
 | ||||||
|  | 	if webhookSecretToken == "" { | ||||||
|  | 		logger.Info(fmt.Sprintf("-github-webhook-secret-token and %s are missing or empty. Create one following https://docs.github.com/en/developers/webhooks-and-events/securing-your-webhooks and specify it via the flag or the envvar", webhookSecretTokenEnvName)) | ||||||
|  | 	} | ||||||
|  | 
 | ||||||
|  | 	ctrl.SetLogger(logger) | ||||||
|  | 
 | ||||||
|  | 	// Valid GitHub API credentials is required to call get workflow job logs
 | ||||||
|  | 	if len(c.Token) > 0 || (c.AppID > 0 && c.AppInstallationID > 0 && c.AppPrivateKey != "") || (len(c.BasicauthUsername) > 0 && len(c.BasicauthPassword) > 0) { | ||||||
|  | 		c.Log = &logger | ||||||
|  | 
 | ||||||
|  | 		ghClient, err = c.NewClient() | ||||||
|  | 		if err != nil { | ||||||
|  | 			fmt.Fprintln(os.Stderr, "Error: Client creation failed.", err) | ||||||
|  | 			logger.Error(err, "unable to create controller", "controller", "Runner") | ||||||
|  | 			os.Exit(1) | ||||||
|  | 		} | ||||||
|  | 	} else { | ||||||
|  | 		logger.Info("GitHub client is not initialized. Runner groups with custom visibility are not supported. If needed, please provide GitHub authentication. This will incur in extra GitHub API calls") | ||||||
|  | 	} | ||||||
|  | 
 | ||||||
|  | 	eventReader := &actionsmetrics.EventReader{ | ||||||
|  | 		Log:          ctrl.Log.WithName("workflowjobmetrics-eventreader"), | ||||||
|  | 		GitHubClient: ghClient, | ||||||
|  | 		Events:       make(chan interface{}, 1024*1024), | ||||||
|  | 	} | ||||||
|  | 
 | ||||||
|  | 	webhookServer := &actionsmetrics.WebhookServer{ | ||||||
|  | 		Log:            ctrl.Log.WithName("workflowjobmetrics-webhookserver"), | ||||||
|  | 		SecretKeyBytes: []byte(webhookSecretToken), | ||||||
|  | 		GitHubClient:   ghClient, | ||||||
|  | 		EventHooks:     []actionsmetrics.EventHook{eventReader.HandleWorkflowJobEvent}, | ||||||
|  | 	} | ||||||
|  | 
 | ||||||
|  | 	var wg sync.WaitGroup | ||||||
|  | 
 | ||||||
|  | 	ctx, cancel := context.WithCancel(context.Background()) | ||||||
|  | 
 | ||||||
|  | 	wg.Add(1) | ||||||
|  | 	go func() { | ||||||
|  | 		defer cancel() | ||||||
|  | 		defer wg.Done() | ||||||
|  | 		eventReader.ProcessWorkflowJobEvents(ctx) | ||||||
|  | 	}() | ||||||
|  | 
 | ||||||
|  | 	// Metrics Server
 | ||||||
|  | 
 | ||||||
|  | 	metricsHandler := promhttp.HandlerFor(metrics.Registry, promhttp.HandlerOpts{ | ||||||
|  | 		ErrorHandling: promhttp.HTTPErrorOnError, | ||||||
|  | 	}) | ||||||
|  | 
 | ||||||
|  | 	metricsMux := http.NewServeMux() | ||||||
|  | 	metricsMux.HandleFunc("/", metricsHandler.ServeHTTP) | ||||||
|  | 
 | ||||||
|  | 	metricsSrv := http.Server{ | ||||||
|  | 		Addr:    metricsAddr, | ||||||
|  | 		Handler: metricsMux, | ||||||
|  | 	} | ||||||
|  | 
 | ||||||
|  | 	wg.Add(1) | ||||||
|  | 	go func() { | ||||||
|  | 		defer cancel() | ||||||
|  | 		defer wg.Done() | ||||||
|  | 
 | ||||||
|  | 		go func() { | ||||||
|  | 			<-ctx.Done() | ||||||
|  | 
 | ||||||
|  | 			metricsSrv.Shutdown(context.Background()) | ||||||
|  | 		}() | ||||||
|  | 
 | ||||||
|  | 		if err := metricsSrv.ListenAndServe(); err != nil { | ||||||
|  | 			if !errors.Is(err, http.ErrServerClosed) { | ||||||
|  | 				logger.Error(err, "problem running metrics server") | ||||||
|  | 			} | ||||||
|  | 		} | ||||||
|  | 	}() | ||||||
|  | 
 | ||||||
|  | 	// Webhook Server
 | ||||||
|  | 
 | ||||||
|  | 	mux := http.NewServeMux() | ||||||
|  | 	mux.HandleFunc("/", webhookServer.Handle) | ||||||
|  | 
 | ||||||
|  | 	srv := http.Server{ | ||||||
|  | 		Addr:    webhookAddr, | ||||||
|  | 		Handler: mux, | ||||||
|  | 	} | ||||||
|  | 
 | ||||||
|  | 	wg.Add(1) | ||||||
|  | 	go func() { | ||||||
|  | 		defer cancel() | ||||||
|  | 		defer wg.Done() | ||||||
|  | 
 | ||||||
|  | 		go func() { | ||||||
|  | 			<-ctx.Done() | ||||||
|  | 
 | ||||||
|  | 			srv.Shutdown(context.Background()) | ||||||
|  | 		}() | ||||||
|  | 
 | ||||||
|  | 		if err := srv.ListenAndServe(); err != nil { | ||||||
|  | 			if !errors.Is(err, http.ErrServerClosed) { | ||||||
|  | 				logger.Error(err, "problem running http server") | ||||||
|  | 			} | ||||||
|  | 		} | ||||||
|  | 	}() | ||||||
|  | 
 | ||||||
|  | 	go func() { | ||||||
|  | 		<-ctrl.SetupSignalHandler().Done() | ||||||
|  | 		cancel() | ||||||
|  | 	}() | ||||||
|  | 
 | ||||||
|  | 	wg.Wait() | ||||||
|  | } | ||||||
		Loading…
	
		Reference in New Issue