d345591fc8
GitLab Performance Monitoring is now able to track custom events not directly related to application performance. These events include the number of tags pushed, repositories created, builds registered, etc. The use of these events is to get a better overview of how a GitLab instance is used and how that may affect performance. For example, a large number of Git pushes may have a negative impact on the underlying storage engine. Events are stored in the "events" measurement and are not prefixed with "rails_" or "sidekiq_", this makes it easier to query events with the same name triggered from different parts of the application. All events being stored in the same measurement also makes it easier to downsample data. Currently the following events are tracked: * Creating repositories * Removing repositories * Changing the default branch of a repository * Pushing a new tag * Removing an existing tag * Pushing a commit (along with the branch being pushed to) * Pushing a new branch * Removing an existing branch * Importing a repository (along with the URL we're importing) * Forking a repository (along with the source/target path) * CI builds registered (and when no build could be found) * CI builds being updated * Rails and Sidekiq exceptions Fixes gitlab-org/gitlab-ce#13720
211 lines
7.3 KiB
Ruby
211 lines
7.3 KiB
Ruby
module Ci
|
|
module API
|
|
# Builds API
|
|
class Builds < Grape::API
|
|
resource :builds do
|
|
# Runs oldest pending build by runner - Runners only
|
|
#
|
|
# Parameters:
|
|
# token (required) - The uniq token of runner
|
|
#
|
|
# Example Request:
|
|
# POST /builds/register
|
|
post "register" do
|
|
authenticate_runner!
|
|
update_runner_last_contact
|
|
update_runner_info
|
|
required_attributes! [:token]
|
|
not_found! unless current_runner.active?
|
|
|
|
build = Ci::RegisterBuildService.new.execute(current_runner)
|
|
|
|
if build
|
|
Gitlab::Metrics.add_event(:build_found,
|
|
project: build.project.path_with_namespace)
|
|
|
|
present build, with: Entities::BuildDetails
|
|
else
|
|
Gitlab::Metrics.add_event(:build_not_found)
|
|
|
|
not_found!
|
|
end
|
|
end
|
|
|
|
# Update an existing build - Runners only
|
|
#
|
|
# Parameters:
|
|
# id (required) - The ID of a project
|
|
# state (optional) - The state of a build
|
|
# trace (optional) - The trace of a build
|
|
# Example Request:
|
|
# PUT /builds/:id
|
|
put ":id" do
|
|
authenticate_runner!
|
|
update_runner_last_contact
|
|
build = Ci::Build.where(runner_id: current_runner.id).running.find(params[:id])
|
|
forbidden!('Build has been erased!') if build.erased?
|
|
|
|
build.update_attributes(trace: params[:trace]) if params[:trace]
|
|
|
|
Gitlab::Metrics.add_event(:update_build,
|
|
project: build.project.path_with_namespace)
|
|
|
|
case params[:state].to_s
|
|
when 'success'
|
|
build.success
|
|
when 'failed'
|
|
build.drop
|
|
end
|
|
end
|
|
|
|
# Send incremental log update - Runners only
|
|
#
|
|
# Parameters:
|
|
# id (required) - The ID of a build
|
|
# Body:
|
|
# content of logs to append
|
|
# Headers:
|
|
# Content-Range (required) - range of content that was sent
|
|
# BUILD-TOKEN (required) - The build authorization token
|
|
# Example Request:
|
|
# PATCH /builds/:id/trace.txt
|
|
patch ":id/trace.txt" do
|
|
build = Ci::Build.find_by_id(params[:id])
|
|
not_found! unless build
|
|
authenticate_build_token!(build)
|
|
forbidden!('Build has been erased!') if build.erased?
|
|
|
|
error!('400 Missing header Content-Range', 400) unless request.headers.has_key?('Content-Range')
|
|
content_range = request.headers['Content-Range']
|
|
content_range = content_range.split('-')
|
|
|
|
current_length = build.trace_length
|
|
unless current_length == content_range[0].to_i
|
|
return error!('416 Range Not Satisfiable', 416, { 'Range' => "0-#{current_length}" })
|
|
end
|
|
|
|
build.append_trace(request.body.read, content_range[0].to_i)
|
|
|
|
status 202
|
|
header 'Build-Status', build.status
|
|
header 'Range', "0-#{build.trace_length}"
|
|
end
|
|
|
|
# Authorize artifacts uploading for build - Runners only
|
|
#
|
|
# Parameters:
|
|
# id (required) - The ID of a build
|
|
# token (required) - The build authorization token
|
|
# filesize (optional) - the size of uploaded file
|
|
# Example Request:
|
|
# POST /builds/:id/artifacts/authorize
|
|
post ":id/artifacts/authorize" do
|
|
require_gitlab_workhorse!
|
|
not_allowed! unless Gitlab.config.artifacts.enabled
|
|
build = Ci::Build.find_by_id(params[:id])
|
|
not_found! unless build
|
|
authenticate_build_token!(build)
|
|
forbidden!('build is not running') unless build.running?
|
|
|
|
if params[:filesize]
|
|
file_size = params[:filesize].to_i
|
|
file_to_large! unless file_size < max_artifacts_size
|
|
end
|
|
|
|
status 200
|
|
{ TempPath: ArtifactUploader.artifacts_upload_path }
|
|
end
|
|
|
|
# Upload artifacts to build - Runners only
|
|
#
|
|
# Parameters:
|
|
# id (required) - The ID of a build
|
|
# token (required) - The build authorization token
|
|
# file (required) - Artifacts file
|
|
# expire_in (optional) - Specify when artifacts should expire (ex. 7d)
|
|
# Parameters (accelerated by GitLab Workhorse):
|
|
# file.path - path to locally stored body (generated by Workhorse)
|
|
# file.name - real filename as send in Content-Disposition
|
|
# file.type - real content type as send in Content-Type
|
|
# metadata.path - path to locally stored body (generated by Workhorse)
|
|
# metadata.name - filename (generated by Workhorse)
|
|
# Headers:
|
|
# BUILD-TOKEN (required) - The build authorization token, the same as token
|
|
# Body:
|
|
# The file content
|
|
#
|
|
# Example Request:
|
|
# POST /builds/:id/artifacts
|
|
post ":id/artifacts" do
|
|
require_gitlab_workhorse!
|
|
not_allowed! unless Gitlab.config.artifacts.enabled
|
|
build = Ci::Build.find_by_id(params[:id])
|
|
not_found! unless build
|
|
authenticate_build_token!(build)
|
|
forbidden!('Build is not running!') unless build.running?
|
|
forbidden!('Build has been erased!') if build.erased?
|
|
|
|
artifacts_upload_path = ArtifactUploader.artifacts_upload_path
|
|
artifacts = uploaded_file(:file, artifacts_upload_path)
|
|
metadata = uploaded_file(:metadata, artifacts_upload_path)
|
|
|
|
bad_request!('Missing artifacts file!') unless artifacts
|
|
file_to_large! unless artifacts.size < max_artifacts_size
|
|
|
|
build.artifacts_file = artifacts
|
|
build.artifacts_metadata = metadata
|
|
build.artifacts_expire_in = params['expire_in']
|
|
|
|
if build.save
|
|
present(build, with: Entities::BuildDetails)
|
|
else
|
|
render_validation_error!(build)
|
|
end
|
|
end
|
|
|
|
# Download the artifacts file from build - Runners only
|
|
#
|
|
# Parameters:
|
|
# id (required) - The ID of a build
|
|
# token (required) - The build authorization token
|
|
# Headers:
|
|
# BUILD-TOKEN (required) - The build authorization token, the same as token
|
|
# Example Request:
|
|
# GET /builds/:id/artifacts
|
|
get ":id/artifacts" do
|
|
build = Ci::Build.find_by_id(params[:id])
|
|
not_found! unless build
|
|
authenticate_build_token!(build)
|
|
artifacts_file = build.artifacts_file
|
|
|
|
unless artifacts_file.file_storage?
|
|
return redirect_to build.artifacts_file.url
|
|
end
|
|
|
|
unless artifacts_file.exists?
|
|
not_found!
|
|
end
|
|
|
|
present_file!(artifacts_file.path, artifacts_file.filename)
|
|
end
|
|
|
|
# Remove the artifacts file from build - Runners only
|
|
#
|
|
# Parameters:
|
|
# id (required) - The ID of a build
|
|
# token (required) - The build authorization token
|
|
# Headers:
|
|
# BUILD-TOKEN (required) - The build authorization token, the same as token
|
|
# Example Request:
|
|
# DELETE /builds/:id/artifacts
|
|
delete ":id/artifacts" do
|
|
build = Ci::Build.find_by_id(params[:id])
|
|
not_found! unless build
|
|
authenticate_build_token!(build)
|
|
|
|
build.erase_artifacts!
|
|
end
|
|
end
|
|
end
|
|
end
|
|
end
|