This change caches jobs meant for an entity in the pool manager. This allows us to avoid querying the db as much and allows us to better determine when we should scale down. Signed-off-by: Gabriel Adrian Samfira <gsamfira@cloudbasesolutions.com>
644 lines
20 KiB
Go
644 lines
20 KiB
Go
// Copyright 2022 Cloudbase Solutions SRL
|
|
//
|
|
// Licensed under the Apache License, Version 2.0 (the "License"); you may
|
|
// not use this file except in compliance with the License. You may obtain
|
|
// a copy of the License at
|
|
//
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
//
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
// distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
|
// WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
|
// License for the specific language governing permissions and limitations
|
|
// under the License.
|
|
|
|
package sql
|
|
|
|
import (
|
|
"context"
|
|
"errors"
|
|
"fmt"
|
|
"log/slog"
|
|
"net/url"
|
|
"strings"
|
|
|
|
"gorm.io/driver/mysql"
|
|
"gorm.io/driver/sqlite"
|
|
"gorm.io/gorm"
|
|
"gorm.io/gorm/logger"
|
|
|
|
runnerErrors "github.com/cloudbase/garm-provider-common/errors"
|
|
commonParams "github.com/cloudbase/garm-provider-common/params"
|
|
"github.com/cloudbase/garm/auth"
|
|
"github.com/cloudbase/garm/config"
|
|
"github.com/cloudbase/garm/database/common"
|
|
"github.com/cloudbase/garm/database/watcher"
|
|
"github.com/cloudbase/garm/internal/templates"
|
|
"github.com/cloudbase/garm/params"
|
|
"github.com/cloudbase/garm/util/appdefaults"
|
|
)
|
|
|
|
const (
|
|
repositoryFieldName string = "Repository"
|
|
organizationFieldName string = "Organization"
|
|
enterpriseFieldName string = "Enterprise"
|
|
)
|
|
|
|
// newDBConn returns a new gorm db connection, given the config
|
|
func newDBConn(dbCfg config.Database) (conn *gorm.DB, err error) {
|
|
dbType, connURI, err := dbCfg.GormParams()
|
|
if err != nil {
|
|
return nil, fmt.Errorf("error getting DB URI string: %w", err)
|
|
}
|
|
|
|
gormConfig := &gorm.Config{
|
|
TranslateError: true,
|
|
}
|
|
if !dbCfg.Debug {
|
|
gormConfig.Logger = logger.Default.LogMode(logger.Silent)
|
|
}
|
|
|
|
switch dbType {
|
|
case config.MySQLBackend:
|
|
conn, err = gorm.Open(mysql.Open(connURI), gormConfig)
|
|
case config.SQLiteBackend:
|
|
conn, err = gorm.Open(sqlite.Open(connURI), gormConfig)
|
|
}
|
|
if err != nil {
|
|
return nil, fmt.Errorf("error connecting to database: %w", err)
|
|
}
|
|
|
|
if dbCfg.Debug {
|
|
conn = conn.Debug()
|
|
}
|
|
|
|
return conn, nil
|
|
}
|
|
|
|
func NewSQLDatabase(ctx context.Context, cfg config.Database) (common.Store, error) {
|
|
conn, err := newDBConn(cfg)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("error creating DB connection: %w", err)
|
|
}
|
|
producer, err := watcher.RegisterProducer(ctx, "sql")
|
|
if err != nil {
|
|
return nil, fmt.Errorf("error registering producer: %w", err)
|
|
}
|
|
db := &sqlDatabase{
|
|
conn: conn,
|
|
ctx: ctx,
|
|
cfg: cfg,
|
|
producer: producer,
|
|
}
|
|
|
|
if err := db.migrateDB(); err != nil {
|
|
return nil, fmt.Errorf("error migrating database: %w", err)
|
|
}
|
|
return db, nil
|
|
}
|
|
|
|
type sqlDatabase struct {
|
|
conn *gorm.DB
|
|
ctx context.Context
|
|
cfg config.Database
|
|
producer common.Producer
|
|
}
|
|
|
|
var renameTemplate = `
|
|
PRAGMA foreign_keys = OFF;
|
|
BEGIN TRANSACTION;
|
|
|
|
ALTER TABLE %s RENAME TO %s_old;
|
|
COMMIT;
|
|
`
|
|
|
|
var restoreNameTemplate = `
|
|
PRAGMA foreign_keys = OFF;
|
|
BEGIN TRANSACTION;
|
|
DROP TABLE IF EXISTS %s;
|
|
ALTER TABLE %s_old RENAME TO %s;
|
|
COMMIT;
|
|
`
|
|
|
|
var copyContentsTemplate = `
|
|
PRAGMA foreign_keys = OFF;
|
|
BEGIN TRANSACTION;
|
|
INSERT INTO %s SELECT * FROM %s_old;
|
|
DROP TABLE %s_old;
|
|
|
|
COMMIT;
|
|
`
|
|
|
|
func (s *sqlDatabase) cascadeMigrationSQLite(model interface{}, name string, justDrop bool) error {
|
|
if !s.conn.Migrator().HasTable(name) {
|
|
return nil
|
|
}
|
|
defer s.conn.Exec("PRAGMA foreign_keys = ON;")
|
|
|
|
var data string
|
|
var indexes []string
|
|
if err := s.conn.Raw(fmt.Sprintf("select sql from sqlite_master where type='table' and tbl_name='%s'", name)).Scan(&data).Error; err != nil {
|
|
if !errors.Is(err, gorm.ErrRecordNotFound) {
|
|
return fmt.Errorf("failed to get table %s: %w", name, err)
|
|
}
|
|
}
|
|
|
|
if err := s.conn.Raw(fmt.Sprintf("SELECT name FROM sqlite_master WHERE type == 'index' AND tbl_name == '%s' and name not like 'sqlite_%%'", name)).Scan(&indexes).Error; err != nil {
|
|
if !errors.Is(err, gorm.ErrRecordNotFound) {
|
|
return fmt.Errorf("failed to get table indexes %s: %w", name, err)
|
|
}
|
|
}
|
|
|
|
if strings.Contains(data, "ON DELETE") {
|
|
return nil
|
|
}
|
|
|
|
if justDrop {
|
|
if err := s.conn.Migrator().DropTable(model); err != nil {
|
|
return fmt.Errorf("failed to drop table %s: %w", name, err)
|
|
}
|
|
return nil
|
|
}
|
|
|
|
for _, index := range indexes {
|
|
if err := s.conn.Migrator().DropIndex(model, index); err != nil {
|
|
return fmt.Errorf("failed to drop index %s: %w", index, err)
|
|
}
|
|
}
|
|
|
|
err := s.conn.Exec(fmt.Sprintf(renameTemplate, name, name)).Error
|
|
if err != nil {
|
|
return fmt.Errorf("failed to rename table %s: %w", name, err)
|
|
}
|
|
|
|
if model != nil {
|
|
if err := s.conn.Migrator().AutoMigrate(model); err != nil {
|
|
if err := s.conn.Exec(fmt.Sprintf(restoreNameTemplate, name, name, name)).Error; err != nil {
|
|
slog.With(slog.Any("error", err)).Error("failed to restore table", "table", name)
|
|
}
|
|
return fmt.Errorf("failed to create table %s: %w", name, err)
|
|
}
|
|
}
|
|
err = s.conn.Exec(fmt.Sprintf(copyContentsTemplate, name, name, name)).Error
|
|
if err != nil {
|
|
return fmt.Errorf("failed to copy contents to table %s: %w", name, err)
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func (s *sqlDatabase) cascadeMigration() error {
|
|
switch s.cfg.DbBackend {
|
|
case config.SQLiteBackend:
|
|
if err := s.cascadeMigrationSQLite(&Address{}, "addresses", true); err != nil {
|
|
return fmt.Errorf("failed to drop table addresses: %w", err)
|
|
}
|
|
|
|
if err := s.cascadeMigrationSQLite(&InstanceStatusUpdate{}, "instance_status_updates", true); err != nil {
|
|
return fmt.Errorf("failed to drop table instance_status_updates: %w", err)
|
|
}
|
|
|
|
if err := s.cascadeMigrationSQLite(&Tag{}, "pool_tags", false); err != nil {
|
|
return fmt.Errorf("failed to migrate addresses: %w", err)
|
|
}
|
|
|
|
if err := s.cascadeMigrationSQLite(&WorkflowJob{}, "workflow_jobs", false); err != nil {
|
|
return fmt.Errorf("failed to migrate addresses: %w", err)
|
|
}
|
|
case config.MySQLBackend:
|
|
return nil
|
|
default:
|
|
return fmt.Errorf("invalid db backend: %s", s.cfg.DbBackend)
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func (s *sqlDatabase) ensureGithubEndpoint() error {
|
|
// Create the default Github endpoint.
|
|
createEndpointParams := params.CreateGithubEndpointParams{
|
|
Name: "github.com",
|
|
Description: "The github.com endpoint",
|
|
APIBaseURL: appdefaults.GithubDefaultBaseURL,
|
|
BaseURL: appdefaults.DefaultGithubURL,
|
|
UploadBaseURL: appdefaults.GithubDefaultUploadBaseURL,
|
|
}
|
|
|
|
var epCount int64
|
|
if err := s.conn.Model(&GithubEndpoint{}).Count(&epCount).Error; err != nil {
|
|
if !errors.Is(err, gorm.ErrRecordNotFound) {
|
|
return fmt.Errorf("error counting github endpoints: %w", err)
|
|
}
|
|
}
|
|
|
|
if epCount == 0 {
|
|
if _, err := s.CreateGithubEndpoint(context.Background(), createEndpointParams); err != nil {
|
|
if !errors.Is(err, runnerErrors.ErrDuplicateEntity) {
|
|
return fmt.Errorf("error creating default github endpoint: %w", err)
|
|
}
|
|
}
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func (s *sqlDatabase) migrateCredentialsToDB() (err error) {
|
|
s.conn.Exec("PRAGMA foreign_keys = OFF")
|
|
defer s.conn.Exec("PRAGMA foreign_keys = ON")
|
|
|
|
adminUser, err := s.GetAdminUser(s.ctx)
|
|
if err != nil {
|
|
if errors.Is(err, runnerErrors.ErrNotFound) {
|
|
// Admin user doesn't exist. This is a new deploy. Nothing to migrate.
|
|
return nil
|
|
}
|
|
return fmt.Errorf("error getting admin user: %w", err)
|
|
}
|
|
|
|
// Impersonate the admin user. We're migrating from config credentials to
|
|
// database credentials. At this point, there is no other user than the admin
|
|
// user. GARM is not yet multi-user, so it's safe to assume we only have this
|
|
// one user.
|
|
adminCtx := context.Background()
|
|
adminCtx = auth.PopulateContext(adminCtx, adminUser, nil)
|
|
|
|
slog.Info("migrating credentials to DB")
|
|
slog.Info("creating github endpoints table")
|
|
if err := s.conn.AutoMigrate(&GithubEndpoint{}); err != nil {
|
|
return fmt.Errorf("error migrating github endpoints: %w", err)
|
|
}
|
|
|
|
defer func() {
|
|
if err != nil {
|
|
slog.With(slog.Any("error", err)).Error("rolling back github github endpoints table")
|
|
s.conn.Migrator().DropTable(&GithubEndpoint{})
|
|
}
|
|
}()
|
|
|
|
slog.Info("creating github credentials table")
|
|
if err := s.conn.AutoMigrate(&GithubCredentials{}); err != nil {
|
|
return fmt.Errorf("error migrating github credentials: %w", err)
|
|
}
|
|
|
|
defer func() {
|
|
if err != nil {
|
|
slog.With(slog.Any("error", err)).Error("rolling back github github credentials table")
|
|
s.conn.Migrator().DropTable(&GithubCredentials{})
|
|
}
|
|
}()
|
|
|
|
// Nothing to migrate.
|
|
if len(s.cfg.MigrateCredentials) == 0 {
|
|
return nil
|
|
}
|
|
|
|
slog.Info("importing credentials from config")
|
|
for _, cred := range s.cfg.MigrateCredentials {
|
|
slog.Info("importing credential", "name", cred.Name)
|
|
parsed, err := url.Parse(cred.BaseEndpoint())
|
|
if err != nil {
|
|
return fmt.Errorf("error parsing base URL: %w", err)
|
|
}
|
|
|
|
certBundle, err := cred.CACertBundle()
|
|
if err != nil {
|
|
return fmt.Errorf("error getting CA cert bundle: %w", err)
|
|
}
|
|
hostname := parsed.Hostname()
|
|
createParams := params.CreateGithubEndpointParams{
|
|
Name: hostname,
|
|
Description: fmt.Sprintf("Endpoint for %s", hostname),
|
|
APIBaseURL: cred.APIEndpoint(),
|
|
BaseURL: cred.BaseEndpoint(),
|
|
UploadBaseURL: cred.UploadEndpoint(),
|
|
CACertBundle: certBundle,
|
|
}
|
|
|
|
var endpoint params.ForgeEndpoint
|
|
endpoint, err = s.GetGithubEndpoint(adminCtx, hostname)
|
|
if err != nil {
|
|
if !errors.Is(err, runnerErrors.ErrNotFound) {
|
|
return fmt.Errorf("error getting github endpoint: %w", err)
|
|
}
|
|
endpoint, err = s.CreateGithubEndpoint(adminCtx, createParams)
|
|
if err != nil {
|
|
return fmt.Errorf("error creating default github endpoint: %w", err)
|
|
}
|
|
}
|
|
|
|
credParams := params.CreateGithubCredentialsParams{
|
|
Name: cred.Name,
|
|
Description: cred.Description,
|
|
Endpoint: endpoint.Name,
|
|
AuthType: params.ForgeAuthType(cred.GetAuthType()),
|
|
}
|
|
switch credParams.AuthType {
|
|
case params.ForgeAuthTypeApp:
|
|
keyBytes, err := cred.App.PrivateKeyBytes()
|
|
if err != nil {
|
|
return fmt.Errorf("error getting private key bytes: %w", err)
|
|
}
|
|
credParams.App = params.GithubApp{
|
|
AppID: cred.App.AppID,
|
|
InstallationID: cred.App.InstallationID,
|
|
PrivateKeyBytes: keyBytes,
|
|
}
|
|
|
|
if err := credParams.App.Validate(); err != nil {
|
|
return fmt.Errorf("error validating app credentials: %w", err)
|
|
}
|
|
case params.ForgeAuthTypePAT:
|
|
token := cred.PAT.OAuth2Token
|
|
if token == "" {
|
|
token = cred.OAuth2Token
|
|
}
|
|
if token == "" {
|
|
return errors.New("missing OAuth2 token")
|
|
}
|
|
credParams.PAT = params.GithubPAT{
|
|
OAuth2Token: token,
|
|
}
|
|
}
|
|
|
|
creds, err := s.CreateGithubCredentials(adminCtx, credParams)
|
|
if err != nil {
|
|
return fmt.Errorf("error creating github credentials: %w", err)
|
|
}
|
|
|
|
if err := s.conn.Exec("update repositories set credentials_id = ?,endpoint_name = ? where credentials_name = ?", creds.ID, creds.Endpoint.Name, creds.Name).Error; err != nil {
|
|
return fmt.Errorf("error updating repositories: %w", err)
|
|
}
|
|
|
|
if err := s.conn.Exec("update organizations set credentials_id = ?,endpoint_name = ? where credentials_name = ?", creds.ID, creds.Endpoint.Name, creds.Name).Error; err != nil {
|
|
return fmt.Errorf("error updating organizations: %w", err)
|
|
}
|
|
|
|
if err := s.conn.Exec("update enterprises set credentials_id = ?,endpoint_name = ? where credentials_name = ?", creds.ID, creds.Endpoint.Name, creds.Name).Error; err != nil {
|
|
return fmt.Errorf("error updating enterprises: %w", err)
|
|
}
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func (s *sqlDatabase) migrateWorkflow() error {
|
|
if s.conn.Migrator().HasTable(&WorkflowJob{}) {
|
|
if s.conn.Migrator().HasColumn(&WorkflowJob{}, "runner_name") {
|
|
// Remove jobs that are not in "queued" status. We really only care about queued jobs. Once they transition
|
|
// to something else, we don't really consume them anyway.
|
|
if err := s.conn.Exec("delete from workflow_jobs where status is not 'queued'").Error; err != nil {
|
|
return fmt.Errorf("error updating workflow_jobs: %w", err)
|
|
}
|
|
if err := s.conn.Migrator().DropColumn(&WorkflowJob{}, "runner_name"); err != nil {
|
|
return fmt.Errorf("error updating workflow_jobs: %w", err)
|
|
}
|
|
}
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func (s *sqlDatabase) ensureTemplates(migrateTemplates bool) error {
|
|
if !migrateTemplates {
|
|
return nil
|
|
}
|
|
// make sure we have a default forge/OSType template. Currently we have Windows
|
|
// and Linux for GitHub and Linux for Gitea.
|
|
githubWindowsData, err := templates.GetTemplateContent(commonParams.Windows, params.GithubEndpointType)
|
|
if err != nil {
|
|
return fmt.Errorf("failed to get windows template for github: %w", err)
|
|
}
|
|
|
|
githubLinuxData, err := templates.GetTemplateContent(commonParams.Linux, params.GithubEndpointType)
|
|
if err != nil {
|
|
return fmt.Errorf("failed to get linux template for github: %w", err)
|
|
}
|
|
|
|
giteaLinuxData, err := templates.GetTemplateContent(commonParams.Linux, params.GiteaEndpointType)
|
|
if err != nil {
|
|
return fmt.Errorf("failed to get linux template for gitea: %w", err)
|
|
}
|
|
|
|
adminCtx := auth.GetAdminContext(s.ctx)
|
|
|
|
githubWindowsParams := params.CreateTemplateParams{
|
|
Name: "github_windows",
|
|
Description: "Default Windows runner install template for GitHub",
|
|
OSType: commonParams.Windows,
|
|
ForgeType: params.GithubEndpointType,
|
|
Data: githubWindowsData,
|
|
}
|
|
githubWindowsSystemTemplate, err := s.createSystemTemplate(adminCtx, githubWindowsParams)
|
|
if err != nil {
|
|
return fmt.Errorf("failed to create github windows template: %w", err)
|
|
}
|
|
|
|
githubLinuxParams := params.CreateTemplateParams{
|
|
Name: "github_linux",
|
|
Description: "Default Linux runner install template for GitHub",
|
|
OSType: commonParams.Linux,
|
|
ForgeType: params.GithubEndpointType,
|
|
Data: githubLinuxData,
|
|
}
|
|
githubLinuxSystemTemplate, err := s.createSystemTemplate(adminCtx, githubLinuxParams)
|
|
if err != nil {
|
|
return fmt.Errorf("failed to create github linux template: %w", err)
|
|
}
|
|
|
|
giteaLinuxParams := params.CreateTemplateParams{
|
|
Name: "gitea_linux",
|
|
Description: "Default Linux runner install template for Gitea",
|
|
OSType: commonParams.Linux,
|
|
ForgeType: params.GiteaEndpointType,
|
|
Data: giteaLinuxData,
|
|
}
|
|
giteaLinuxSystemTemplate, err := s.createSystemTemplate(adminCtx, giteaLinuxParams)
|
|
if err != nil {
|
|
return fmt.Errorf("failed to create gitea linux template: %w", err)
|
|
}
|
|
|
|
getTplID := func(forgeType params.EndpointType, osType commonParams.OSType) uint {
|
|
var templateID uint
|
|
switch forgeType {
|
|
case params.GiteaEndpointType:
|
|
switch osType {
|
|
case commonParams.Linux:
|
|
templateID = giteaLinuxSystemTemplate.ID
|
|
default:
|
|
return 0
|
|
}
|
|
case params.GithubEndpointType:
|
|
switch osType {
|
|
case commonParams.Linux:
|
|
templateID = githubLinuxSystemTemplate.ID
|
|
case commonParams.Windows:
|
|
templateID = githubWindowsSystemTemplate.ID
|
|
default:
|
|
return 0
|
|
}
|
|
default:
|
|
return 0
|
|
}
|
|
return templateID
|
|
}
|
|
|
|
pools, err := s.ListAllPools(s.ctx)
|
|
if err != nil {
|
|
return fmt.Errorf("failed to list pools: %w", err)
|
|
}
|
|
|
|
for _, pool := range pools {
|
|
forgeType := pool.Endpoint.EndpointType
|
|
osType := pool.OSType
|
|
entity, err := pool.GetEntity()
|
|
if err != nil {
|
|
return fmt.Errorf("failed to get pool entity: %w", err)
|
|
}
|
|
templateID := getTplID(forgeType, osType)
|
|
if pool.TemplateID == 0 && templateID != 0 {
|
|
updateParams := params.UpdatePoolParams{
|
|
TemplateID: &templateID,
|
|
}
|
|
if _, err := s.UpdateEntityPool(adminCtx, entity, pool.ID, updateParams); err != nil {
|
|
return fmt.Errorf("failed to update pool template: %w", err)
|
|
}
|
|
}
|
|
}
|
|
|
|
scaleSets, err := s.ListAllScaleSets(adminCtx)
|
|
if err != nil {
|
|
return fmt.Errorf("failed to list scale sets: %w", err)
|
|
}
|
|
|
|
for _, scaleSet := range scaleSets {
|
|
forgeType := scaleSet.Endpoint.EndpointType
|
|
osType := scaleSet.OSType
|
|
entity, err := scaleSet.GetEntity()
|
|
if err != nil {
|
|
return fmt.Errorf("failed to get scale set entity: %w", err)
|
|
}
|
|
templateID := getTplID(forgeType, osType)
|
|
if scaleSet.TemplateID == 0 && templateID != 0 {
|
|
updateParams := params.UpdateScaleSetParams{
|
|
TemplateID: &templateID,
|
|
}
|
|
if _, err := s.UpdateEntityScaleSet(adminCtx, entity, scaleSet.ID, updateParams, nil); err != nil {
|
|
return fmt.Errorf("failed to update pool template: %w", err)
|
|
}
|
|
}
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func (s *sqlDatabase) migrateDB() error {
|
|
if s.conn.Migrator().HasIndex(&Organization{}, "idx_organizations_name") {
|
|
if err := s.conn.Migrator().DropIndex(&Organization{}, "idx_organizations_name"); err != nil {
|
|
slog.With(slog.Any("error", err)).Error("failed to drop index idx_organizations_name")
|
|
}
|
|
}
|
|
|
|
if s.conn.Migrator().HasIndex(&Repository{}, "idx_owner") {
|
|
if err := s.conn.Migrator().DropIndex(&Repository{}, "idx_owner"); err != nil {
|
|
slog.With(slog.Any("error", err)).Error("failed to drop index idx_owner")
|
|
}
|
|
}
|
|
|
|
if err := s.cascadeMigration(); err != nil {
|
|
return fmt.Errorf("error running cascade migration: %w", err)
|
|
}
|
|
|
|
if s.conn.Migrator().HasTable(&Pool{}) {
|
|
if err := s.conn.Exec("update pools set repo_id=NULL where repo_id='00000000-0000-0000-0000-000000000000'").Error; err != nil {
|
|
return fmt.Errorf("error updating pools %w", err)
|
|
}
|
|
|
|
if err := s.conn.Exec("update pools set org_id=NULL where org_id='00000000-0000-0000-0000-000000000000'").Error; err != nil {
|
|
return fmt.Errorf("error updating pools: %w", err)
|
|
}
|
|
|
|
if err := s.conn.Exec("update pools set enterprise_id=NULL where enterprise_id='00000000-0000-0000-0000-000000000000'").Error; err != nil {
|
|
return fmt.Errorf("error updating pools: %w", err)
|
|
}
|
|
}
|
|
|
|
if err := s.migrateWorkflow(); err != nil {
|
|
return fmt.Errorf("error migrating workflows: %w", err)
|
|
}
|
|
|
|
if s.conn.Migrator().HasTable(&GithubEndpoint{}) {
|
|
if !s.conn.Migrator().HasColumn(&GithubEndpoint{}, "endpoint_type") {
|
|
if err := s.conn.Migrator().AutoMigrate(&GithubEndpoint{}); err != nil {
|
|
return fmt.Errorf("error migrating github endpoints: %w", err)
|
|
}
|
|
if err := s.conn.Exec("update github_endpoints set endpoint_type = 'github' where endpoint_type is null").Error; err != nil {
|
|
return fmt.Errorf("error updating github endpoints: %w", err)
|
|
}
|
|
}
|
|
}
|
|
|
|
var needsCredentialMigration bool
|
|
if !s.conn.Migrator().HasTable(&GithubCredentials{}) || !s.conn.Migrator().HasTable(&GithubEndpoint{}) {
|
|
needsCredentialMigration = true
|
|
}
|
|
|
|
var hasMinAgeField bool
|
|
if s.conn.Migrator().HasTable(&ControllerInfo{}) && s.conn.Migrator().HasColumn(&ControllerInfo{}, "minimum_job_age_backoff") {
|
|
hasMinAgeField = true
|
|
}
|
|
|
|
migrateTemplates := !s.conn.Migrator().HasTable(&Template{})
|
|
|
|
s.conn.Exec("PRAGMA foreign_keys = OFF")
|
|
if err := s.conn.AutoMigrate(
|
|
&User{},
|
|
&GithubEndpoint{},
|
|
&GithubCredentials{},
|
|
&GiteaCredentials{},
|
|
&Tag{},
|
|
&Template{},
|
|
&Pool{},
|
|
&Repository{},
|
|
&Organization{},
|
|
&Enterprise{},
|
|
&EnterpriseEvent{},
|
|
&OrganizationEvent{},
|
|
&RepositoryEvent{},
|
|
&Address{},
|
|
&InstanceStatusUpdate{},
|
|
&Instance{},
|
|
&ControllerInfo{},
|
|
&WorkflowJob{},
|
|
&ScaleSet{},
|
|
); err != nil {
|
|
return fmt.Errorf("error running auto migrate: %w", err)
|
|
}
|
|
s.conn.Exec("PRAGMA foreign_keys = ON")
|
|
|
|
if !hasMinAgeField {
|
|
var controller ControllerInfo
|
|
if err := s.conn.First(&controller).Error; err != nil {
|
|
if !errors.Is(err, gorm.ErrRecordNotFound) {
|
|
return fmt.Errorf("error updating controller info: %w", err)
|
|
}
|
|
} else {
|
|
controller.MinimumJobAgeBackoff = 30
|
|
if err := s.conn.Save(&controller).Error; err != nil {
|
|
return fmt.Errorf("error updating controller info: %w", err)
|
|
}
|
|
}
|
|
}
|
|
|
|
if err := s.ensureGithubEndpoint(); err != nil {
|
|
return fmt.Errorf("error ensuring github endpoint: %w", err)
|
|
}
|
|
|
|
if needsCredentialMigration {
|
|
if err := s.migrateCredentialsToDB(); err != nil {
|
|
return fmt.Errorf("error migrating credentials: %w", err)
|
|
}
|
|
}
|
|
|
|
if err := s.ensureTemplates(migrateTemplates); err != nil {
|
|
return fmt.Errorf("failed to create default templates: %w", err)
|
|
}
|
|
|
|
return nil
|
|
}
|