- Notifications
You must be signed in to change notification settings - Fork1k
feat(coderd): add matched provisioner daemons information to more places#15688
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to ourterms of service andprivacy statement. We’ll occasionally send you account related emails.
Already on GitHub?Sign in to your account
Uh oh!
There was an error while loading.Please reload this page.
Changes from2 commits
ba944ab
4e51f20
47036e8
16be03b
4304a06
9ef68dd
38788d5
1c95ffe
98521be
e1423f5
517a505
c4295ef
c5fb83b
3bd62fd
2f625bc
848338e
File filter
Filter by extension
Conversations
Uh oh!
There was an error while loading.Please reload this page.
Jump to
Uh oh!
There was an error while loading.Please reload this page.
Diff view
Diff view
There are no files selected for viewing
Some generated files are not rendered by default. Learn more abouthow customized files appear on GitHub.
Uh oh!
There was an error while loading.Please reload this page.
Some generated files are not rendered by default. Learn more abouthow customized files appear on GitHub.
Uh oh!
There was an error while loading.Please reload this page.
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -245,7 +245,7 @@ func (e *Executor) runOnce(t time.Time) Stats { | ||
} | ||
} | ||
nextBuild, job,_,err = builder.Build(e.ctx, tx, nil, audit.WorkspaceBuildBaggage{IP: "127.0.0.1"}) | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others.Learn more. self-review: we may need to notify or log about this, but deferring for later. | ||
if err != nil { | ||
return xerrors.Errorf("build workspace with transition %q: %w", nextTransition, err) | ||
} | ||
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -299,7 +299,7 @@ var ( | ||
rbac.ResourceSystem.Type: {policy.WildcardSymbol}, | ||
rbac.ResourceOrganization.Type: {policy.ActionCreate, policy.ActionRead}, | ||
rbac.ResourceOrganizationMember.Type: {policy.ActionCreate, policy.ActionDelete, policy.ActionRead}, | ||
rbac.ResourceProvisionerDaemon.Type: {policy.ActionCreate, policy.ActionRead, policy.ActionUpdate}, | ||
rbac.ResourceProvisionerKeys.Type: {policy.ActionCreate, policy.ActionRead, policy.ActionDelete}, | ||
rbac.ResourceUser.Type: rbac.ResourceUser.AvailableActions(), | ||
rbac.ResourceWorkspaceDormant.Type: {policy.ActionUpdate, policy.ActionDelete, policy.ActionWorkspaceStop}, | ||
@@ -317,6 +317,23 @@ var ( | ||
}), | ||
Scope: rbac.ScopeAll, | ||
}.WithCachedASTValue() | ||
subjectSystemReadProvisionerDaemons = rbac.Subject{ | ||
FriendlyName: "System", | ||
johnstcn marked this conversation as resolved. OutdatedShow resolvedHide resolvedUh oh!There was an error while loading.Please reload this page. | ||
ID: uuid.Nil.String(), | ||
Roles: rbac.Roles([]rbac.Role{ | ||
{ | ||
Identifier: rbac.RoleIdentifier{Name: "system-read-provisioner-daemons"}, | ||
DisplayName: "Coder", | ||
Site: rbac.Permissions(map[string][]policy.Action{ | ||
rbac.ResourceProvisionerDaemon.Type: {policy.ActionRead}, | ||
}), | ||
Org: map[string][]rbac.Permission{}, | ||
User: []rbac.Permission{}, | ||
}, | ||
}), | ||
Scope: rbac.ScopeAll, | ||
}.WithCachedASTValue() | ||
) | ||
// AsProvisionerd returns a context with an actor that has permissions required | ||
@@ -359,6 +376,12 @@ func AsSystemRestricted(ctx context.Context) context.Context { | ||
return context.WithValue(ctx, authContextKey{}, subjectSystemRestricted) | ||
} | ||
// AsSystemReadProvisionerDaemons returns a context with an actor that has permissions | ||
// to read provisioner daemons. | ||
func AsSystemReadProvisionerDaemons(ctx context.Context) context.Context { | ||
return context.WithValue(ctx, authContextKey{}, subjectSystemReadProvisionerDaemons) | ||
} | ||
Comment on lines +379 to +384 There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others.Learn more. self-review: I wanted to avoid sprinkling | ||
var AsRemoveActor = rbac.Subject{ | ||
ID: "remove-actor", | ||
} | ||
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -10,7 +10,6 @@ import ( | ||
"fmt" | ||
"net/http" | ||
"os" | ||
"github.com/go-chi/chi/v5" | ||
"github.com/google/uuid" | ||
@@ -22,6 +21,8 @@ import ( | ||
"github.com/coder/coder/v2/coderd/audit" | ||
"github.com/coder/coder/v2/coderd/database" | ||
"github.com/coder/coder/v2/coderd/database/db2sdk" | ||
"github.com/coder/coder/v2/coderd/database/dbauthz" | ||
"github.com/coder/coder/v2/coderd/database/dbtime" | ||
"github.com/coder/coder/v2/coderd/database/provisionerjobs" | ||
"github.com/coder/coder/v2/coderd/externalauth" | ||
@@ -32,6 +33,7 @@ import ( | ||
"github.com/coder/coder/v2/coderd/rbac/policy" | ||
"github.com/coder/coder/v2/coderd/render" | ||
"github.com/coder/coder/v2/coderd/tracing" | ||
"github.com/coder/coder/v2/coderd/util/ptr" | ||
"github.com/coder/coder/v2/codersdk" | ||
"github.com/coder/coder/v2/examples" | ||
"github.com/coder/coder/v2/provisioner/terraform/tfparse" | ||
@@ -60,6 +62,22 @@ func (api *API) templateVersion(rw http.ResponseWriter, r *http.Request) { | ||
return | ||
} | ||
var matchedProvisioners *codersdk.MatchedProvisioners | ||
if jobs[0].ProvisionerJob.JobStatus == database.ProvisionerJobStatusPending { | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others.Learn more. Do we only ever expect a single job to be returned by There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others.Learn more. In this instance, we should get either 0 or 1:
Contributor
| ||
// nolint: gocritic // The user hitting this endpoint may not have | ||
// permission to read provisioner daemons, but we want to show them | ||
// information about the provisioner daemons that are available. | ||
provisioners, err := api.Database.GetProvisionerDaemonsByOrganization(dbauthz.AsSystemReadProvisionerDaemons(ctx), database.GetProvisionerDaemonsByOrganizationParams{ | ||
OrganizationID: jobs[0].ProvisionerJob.OrganizationID, | ||
WantTags: jobs[0].ProvisionerJob.Tags, | ||
}) | ||
if err != nil { | ||
api.Logger.Error(ctx, "failed to fetch provisioners for job id", slog.F("job_id", jobs[0].ProvisionerJob.ID), slog.Error(err)) | ||
} else { | ||
matchedProvisioners = ptr.Ref(db2sdk.MatchedProvisioners(provisioners, dbtime.Now(), provisionerdserver.StaleInterval)) | ||
} | ||
} | ||
schemas, err := api.Database.GetParameterSchemasByJobID(ctx, jobs[0].ProvisionerJob.ID) | ||
if errors.Is(err, sql.ErrNoRows) { | ||
err = nil | ||
@@ -77,7 +95,7 @@ func (api *API) templateVersion(rw http.ResponseWriter, r *http.Request) { | ||
warnings = append(warnings, codersdk.TemplateVersionWarningUnsupportedWorkspaces) | ||
} | ||
httpapi.Write(ctx, rw, http.StatusOK, convertTemplateVersion(templateVersion, convertProvisionerJob(jobs[0]),matchedProvisioners, warnings)) | ||
} | ||
// @Summary Patch template version by ID | ||
@@ -173,7 +191,23 @@ func (api *API) patchTemplateVersion(rw http.ResponseWriter, r *http.Request) { | ||
return | ||
} | ||
var matchedProvisioners *codersdk.MatchedProvisioners | ||
if jobs[0].ProvisionerJob.JobStatus == database.ProvisionerJobStatusPending { | ||
// nolint: gocritic // The user hitting this endpoint may not have | ||
// permission to read provisioner daemons, but we want to show them | ||
// information about the provisioner daemons that are available. | ||
provisioners, err := api.Database.GetProvisionerDaemonsByOrganization(dbauthz.AsSystemReadProvisionerDaemons(ctx), database.GetProvisionerDaemonsByOrganizationParams{ | ||
OrganizationID: jobs[0].ProvisionerJob.OrganizationID, | ||
WantTags: jobs[0].ProvisionerJob.Tags, | ||
}) | ||
if err != nil { | ||
api.Logger.Error(ctx, "failed to fetch provisioners for job id", slog.F("job_id", jobs[0].ProvisionerJob.ID), slog.Error(err)) | ||
} else { | ||
matchedProvisioners = ptr.Ref(db2sdk.MatchedProvisioners(provisioners, dbtime.Now(), provisionerdserver.StaleInterval)) | ||
} | ||
} | ||
httpapi.Write(ctx, rw, http.StatusOK, convertTemplateVersion(updatedTemplateVersion, convertProvisionerJob(jobs[0]), matchedProvisioners, nil)) | ||
} | ||
// @Summary Cancel template version by ID | ||
@@ -868,8 +902,23 @@ func (api *API) templateVersionByName(rw http.ResponseWriter, r *http.Request) { | ||
}) | ||
return | ||
} | ||
var matchedProvisioners *codersdk.MatchedProvisioners | ||
if jobs[0].ProvisionerJob.JobStatus == database.ProvisionerJobStatusPending { | ||
// nolint: gocritic // The user hitting this endpoint may not have | ||
// permission to read provisioner daemons, but we want to show them | ||
// information about the provisioner daemons that are available. | ||
provisioners, err := api.Database.GetProvisionerDaemonsByOrganization(dbauthz.AsSystemReadProvisionerDaemons(ctx), database.GetProvisionerDaemonsByOrganizationParams{ | ||
OrganizationID: jobs[0].ProvisionerJob.OrganizationID, | ||
WantTags: jobs[0].ProvisionerJob.Tags, | ||
}) | ||
if err != nil { | ||
api.Logger.Error(ctx, "failed to fetch provisioners for job id", slog.F("job_id", jobs[0].ProvisionerJob.ID), slog.Error(err)) | ||
} else { | ||
matchedProvisioners = ptr.Ref(db2sdk.MatchedProvisioners(provisioners, dbtime.Now(), provisionerdserver.StaleInterval)) | ||
} | ||
} | ||
httpapi.Write(ctx, rw, http.StatusOK, convertTemplateVersion(templateVersion, convertProvisionerJob(jobs[0]),matchedProvisioners, nil)) | ||
} | ||
// @Summary Get template version by organization, template, and name | ||
@@ -934,7 +983,23 @@ func (api *API) templateVersionByOrganizationTemplateAndName(rw http.ResponseWri | ||
return | ||
} | ||
var matchedProvisioners *codersdk.MatchedProvisioners | ||
if jobs[0].ProvisionerJob.JobStatus == database.ProvisionerJobStatusPending { | ||
// nolint: gocritic // The user hitting this endpoint may not have | ||
// permission to read provisioner daemons, but we want to show them | ||
// information about the provisioner daemons that are available. | ||
provisioners, err := api.Database.GetProvisionerDaemonsByOrganization(dbauthz.AsSystemReadProvisionerDaemons(ctx), database.GetProvisionerDaemonsByOrganizationParams{ | ||
OrganizationID: jobs[0].ProvisionerJob.OrganizationID, | ||
WantTags: jobs[0].ProvisionerJob.Tags, | ||
}) | ||
if err != nil { | ||
api.Logger.Error(ctx, "failed to fetch provisioners for job id", slog.F("job_id", jobs[0].ProvisionerJob.ID), slog.Error(err)) | ||
} else { | ||
matchedProvisioners = ptr.Ref(db2sdk.MatchedProvisioners(provisioners, dbtime.Now(), provisionerdserver.StaleInterval)) | ||
} | ||
} | ||
httpapi.Write(ctx, rw, http.StatusOK, convertTemplateVersion(templateVersion, convertProvisionerJob(jobs[0]), matchedProvisioners, nil)) | ||
Comment on lines +1023 to +1039 There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others.Learn more. self-review: This addresses an issue I noticed in the frontend where it quickly "flashes" with the tag warning message but then gets overwritten when the FE re-requests the template version. Adding it to other template-related endpoints for posterity. | ||
} | ||
// @Summary Get previous template version by organization, template, and name | ||
@@ -1020,7 +1085,23 @@ func (api *API) previousTemplateVersionByOrganizationTemplateAndName(rw http.Res | ||
return | ||
} | ||
var matchedProvisioners *codersdk.MatchedProvisioners | ||
if jobs[0].ProvisionerJob.JobStatus == database.ProvisionerJobStatusPending { | ||
// nolint: gocritic // The user hitting this endpoint may not have | ||
// permission to read provisioner daemons, but we want to show them | ||
// information about the provisioner daemons that are available. | ||
provisioners, err := api.Database.GetProvisionerDaemonsByOrganization(dbauthz.AsSystemReadProvisionerDaemons(ctx), database.GetProvisionerDaemonsByOrganizationParams{ | ||
OrganizationID: jobs[0].ProvisionerJob.OrganizationID, | ||
WantTags: jobs[0].ProvisionerJob.Tags, | ||
}) | ||
if err != nil { | ||
api.Logger.Error(ctx, "failed to fetch provisioners for job id", slog.F("job_id", jobs[0].ProvisionerJob.ID), slog.Error(err)) | ||
} else { | ||
matchedProvisioners = ptr.Ref(db2sdk.MatchedProvisioners(provisioners, dbtime.Now(), provisionerdserver.StaleInterval)) | ||
} | ||
} | ||
httpapi.Write(ctx, rw, http.StatusOK, convertTemplateVersion(previousTemplateVersion, convertProvisionerJob(jobs[0]), matchedProvisioners, nil)) | ||
} | ||
// @Summary Archive template unused versions by template id | ||
@@ -1513,27 +1594,6 @@ func (api *API) postTemplateVersionsByOrganization(rw http.ResponseWriter, r *ht | ||
return err | ||
} | ||
provisionerJob, err = tx.InsertProvisionerJob(ctx, database.InsertProvisionerJobParams{ | ||
ID: jobID, | ||
CreatedAt: dbtime.Now(), | ||
@@ -1559,6 +1619,36 @@ func (api *API) postTemplateVersionsByOrganization(rw http.ResponseWriter, r *ht | ||
return err | ||
} | ||
// Check for eligible provisioners. This allows us to return a warning to the user if they | ||
// submit a job for which no provisioner is available. | ||
// nolint: gocritic // The user hitting this endpoint may not have | ||
// permission to read provisioner daemons, but we want to show them | ||
// information about the provisioner daemons that are available. | ||
eligibleProvisioners, err := tx.GetProvisionerDaemonsByOrganization(dbauthz.AsSystemReadProvisionerDaemons(ctx), database.GetProvisionerDaemonsByOrganizationParams{ | ||
OrganizationID: organization.ID, | ||
WantTags: provisionerJob.Tags, | ||
}) | ||
if err != nil { | ||
// Log the error but do not return any warnings. This is purely advisory and we should not block. | ||
api.Logger.Error(ctx, "failed to check eligible provisioner daemons for job", slog.Error(err)) | ||
} | ||
matchedProvisioners = db2sdk.MatchedProvisioners(eligibleProvisioners, provisionerJob.CreatedAt, provisionerdserver.StaleInterval) | ||
if matchedProvisioners.Count == 0 { | ||
api.Logger.Warn(ctx, "no matching provisioners found for job", | ||
slog.F("user_id", apiKey.UserID), | ||
slog.F("job_id", jobID), | ||
slog.F("job_type", database.ProvisionerJobTypeTemplateVersionImport), | ||
slog.F("tags", tags), | ||
) | ||
} else if matchedProvisioners.Available == 0 { | ||
api.Logger.Warn(ctx, "no active provisioners found for job", | ||
slog.F("user_id", apiKey.UserID), | ||
slog.F("job_id", jobID), | ||
slog.F("job_type", database.ProvisionerJobTypeTemplateVersionImport), | ||
slog.F("tags", tags), | ||
) | ||
} | ||
var templateID uuid.NullUUID | ||
if req.TemplateID != uuid.Nil { | ||
templateID = uuid.NullUUID{ | ||
@@ -1822,34 +1912,3 @@ func (api *API) publishTemplateUpdate(ctx context.Context, templateID uuid.UUID) | ||
slog.F("template_id", templateID), slog.Error(err)) | ||
} | ||
} | ||
Comment on lines -1826 to -1855 There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others.Learn more. self-review: extracted to |
Uh oh!
There was an error while loading.Please reload this page.
Uh oh!
There was an error while loading.Please reload this page.