Skip to content

Latest commit

 

History

History
290 lines (203 loc) · 9.26 KB

DEVELOPERS.md

File metadata and controls

290 lines (203 loc) · 9.26 KB

Developer notes

Dependencies

Install the development dependencies with:

pip install -r requirements.dev.txt

This includes the production dependencies in requirements.txt which are intentionally kept minimal.

You will also need an up-to-date version of Docker Compose. Instructions to install it are here.

Architecture

The package has two main entrypoints: jobrunner.sync and jobrunner.run. Both are implemented as infinite loops with a fixed sleep period and are designed to be run as services.

jobrunner.sync

This handles all communication between the job-server and the job-runner. It polls the job-server for active JobRequests, updates its local Jobs table accordingly, and then posts back the details of all Jobs associated with the active JobRequests it received.

The bulk of the work here is done by the create_or_update_jobs module.

jobrunner.run

This runs Docker containers based on the contents of the Jobs table. It's implemented as a synchronous loop which polls the database for active jobs and takes appropriate actions.

The bulk of the work here is done by the the local Docker executor implementation module which starts new Docker containers and stores the appropriate outputs when they finish.

Job State

Jobs move through a defined set of StatusCode's as the job-runner manages them. These are defined in jobrunner/models.py.

The diagram below shows the transitions, but all states have an implicit transition to INTERNAL_ERROR or CANCELLED_BY_USER, which is not shown.

graph TD
    CREATED --> PREPARING
    CREATED --> WAITING_ON_DEPENDENCIES
    CREATED --> WAITING_ON_WORKERS
    CREATED --> WAITING_ON_REBOOT
    CREATED --> WAITING_DB_MAINTENANCE
    CREATED --> WAITING_PAUSED
    WAITING_ON_DEPENDENCIES -->  WAITING_ON_WORKERS
    WAITING_ON_DEPENDENCIES -->  WAITING_ON_REBOOT
    WAITING_ON_DEPENDENCIES -->  WAITING_DB_MAINTENANCE
    WAITING_ON_DEPENDENCIES --> PREPARING
    WAITING_ON_DEPENDENCIES --> DEPENDENCY_FAILED
    WAITING_PAUSED --> PREPARING
    WAITING_ON_WORKERS --> PREPARING
    WAITING_ON_REBOOT --> PREPARING
    WAITING_DB_MAINTENANCE --> PREPARING
    PREPARING --> EXECUTING
    EXECUTING --> FINALIZING
    FINALIZING --> SUCCEEDED
    FINALIZING --> NONZERO_EXIT
    FINALIZING --> UNMATCHED_PATTERNS
    FINALIZING --all states can go here--> CANCELLED_BY_USER
    FINALIZING --all states can go here--> INTERNAL_ERROR
    FINALIZING --all states can go here--> KILLED_BY_ADMIN

    subgraph Legend
      direction TB
      LEGEND_ERROR[ERROR STATE]
      LEGEND_BLOCKED[BLOCKED]
      LEGEND_NORMAL[HAPPY PATH]
    end

    %% styles
    classDef default fill:#00397a,color:#f1f7ff,stroke-width:2px,stroke:#002147;
    classDef error fill:#b6093d,color:#fef3f6,stroke-width:2px,stroke:#770628;
    classDef blocking fill:#ffdf75,color:#7d661c,stroke-width:2px,stroke:#997d23;

    class LEGEND_BLOCKED,WAITING_ON_WORKERS,WAITING_ON_REBOOT,WAITING_PAUSED,WAITING_DB_MAINTENANCE blocking
    class LEGEND_ERROR,INTERNAL_ERROR,UNMATCHED_PATTERNS,DEPENDENCY_FAILED,NONZERO_EXIT error

Loading

Testing

Tests can be run with:

just test

Some of these tests involve talking to GitHub and there is a big fat integration test which takes a while to run. You can run just the fast tests with:

just test-fast

The big integration test will sit there inscrutably for 30s-1min. If you want to know what it's up to you can get pytest to show the log output with:

just test-verbose

Testing in docker

To run tests in docker, simply run:

just docker/test

This will build the docker image and run tests. You can run job-runner as a service with:

just docker/service

Or run a command inside the docker image:

just docker/run ARGS=command  # bash by default

Testing on Windows

For reasons outlined in #76 this is a bit painful. None of the tests which require talking to Docker are run in CI. However it is possible to run them locally assuming you have Windows installed in a VM and Docker running on the host. The steps are:

  1. Install git in the Windows VM: https://git-scm.com/download/win

  2. Install Python 3.8 in the Windows VM: I used Python 3.8.12 Windows x86-64 executable installer from: https://www.python.org/downloads/windows/

  3. On the host machine, navigate to your job-runner checkout and run

    ./scripts/host-services-for-win-testing.sh

    This will let you VM talk to host Docker and fetch stuff from your git repo so you don't need to push to github to test locally. (Note you'll need socat installed.)

  4. Inside the VM, open a git-bash shell and run:

    git clone git://10.0.2.2:8343/ job-runner
    cd job-runner
    ./scripts/run-tests-in-windows.sh

    10.0.2.2 is the default NAT gateway in Virtualbox. Port 8343 is the where we set our git-daemon to listen on.

    This will (or should) create a virtualenv, install the requirements, download the docker cli (not the full Docker package), and run the tests using the host Docker daemon.

Running jobs locally

Adding jobs locally is most easily done with the jobrunner.cli.add_job command e.g

python -m jobrunner.cli.add_job https://github.com/opensafely/os-demo-research run_all

As well as URLs this will accept paths to local git repos e.g.

python -m jobrunner.cli.add_job ../os-demo-research run_all

If you now run the main loop you'll see it pick up the jobs:

python -m jobrunner.run

See the full set of options it accepts with:

python -m jobrunner.cli.add_job --help

job-runner docker image

Building the dev docker image:

make -C docker-build                   # build base and dev image
make -C docker-build ENV=prod          # build base and prod image
make -C docker-build ARGS=--no-cache   # build without cache

Exposing the host's docker service

By default, running the docker container will mount your host's /var/run/docker.sock into the container and use that for job-runner to run jobs. It does some matching of docker GIDs to do so.

However, it also supports accessing docker over ssh:

make -C docker enable-docker-over-ssh

The docker-compose invocations will now talk to your host docker over SSH, possibly on a remote machine. You can disable with:

make -C docker disable-docker-over-ssh

Note: The above commands will automatically generate a local ed25519 dev ssh key, and add it to your ~/.ssh/authorized_keys file. You can use just docker-clean to remove this. If you wish to use a different user/host, you can do so:

  1. Specify SSH_USER and SSH_HOST environment variables.
  2. Add an authorized ed25519 private key for that user to docker/ssh/id_ed25519.
  3. Run touch docker/ssh/id_ed25519.authorized to let Make know that it is all set up.

Database schema and migrations

jobrunner uses a minimal ORM-lite wrapper to talk to the DB.

The current version of a tables schema definition is stored in the the __tableschema__ attribute for that model's class, i.e. Job.__tableschema__. This is use to create the table in dev and test, so migrations are not usually needed in those cases.

Adding a migration

However, we also occasionally need to apply changes to this schema in production, or in a user's local opensafely-cli database.

To do this, we track migrations in jobrunner/models.py. Add a migration like so:

database.migration(1, """
DDL STATEMENT 1;
DDL STATEMENT 2;
""")

These statements are run together in a single transaction, along with incrementing the user_version in the database.

Note: be aware that there are various restrictions on ALTER TABLE statements in sqlite:

https://www.sqlite.org/lang_altertable.html#alter_table_add_column

Applying migrations

Trying to run jobrunner as a service will error if the database does not exist or is out of date, as a protection against misconfiguration.

To initialise or migrate the database, you can use the migrate command:

python -m jobrunner.cli.migrate

Note that for jobrunner.cli.local_run, which is used by opensafely-cli, migrations are automatically applied.

Deploying

jobrunner is currently deployed by hand because of the difficulties of adding automated deploys to backend servers.

Connect to the relevant backend server:

TPP

  1. Log onto the VPN
  2. RDP onto L3
  3. SSH into the linux VM running on L3
  4. Switch to the jobrunner user

EMIS

  1. SSH into EMIS

When you're connected to the relevant server:

  1. Switch to the jobrunner user
  2. Change to the /srv/backend-server directory
  3. Deploy job-runner
  4. Note the sections on dependencies and config, if those are relevant to your deploy
  5. Watch the logs for errors