Merge pull request #10 from DeterminateSystems/eelcodolstra/fh-159-magic-nix-cache-handle-flakehub-errors-more-gracefully

Improve error handling in FlakeHub cache setup
This commit is contained in:
Eelco Dolstra 2024-01-11 11:02:41 +01:00 committed by GitHub
commit ac64bcd221
No known key found for this signature in database
GPG key ID: 4AEE18F83AFDEB23
5 changed files with 88 additions and 167 deletions

65
Cargo.lock generated
View file

@ -125,13 +125,19 @@ dependencies = [
"syn 2.0.32", "syn 2.0.32",
] ]
[[package]]
name = "atomic"
version = "0.5.3"
source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "c59bdb34bc650a32731b31bd8f0829cc15d24a708ee31559e0bb34f2bc320cba"
[[package]] [[package]]
name = "attic" name = "attic"
version = "0.2.0" version = "0.2.0"
source = "git+ssh://git@github.com/DeterminateSystems/attic-priv?branch=main#a16c0f4cf1abe471ac69731bf3cfe9a8d2eedd5e" source = "git+ssh://git@github.com/DeterminateSystems/attic-priv?branch=main#a16c0f4cf1abe471ac69731bf3cfe9a8d2eedd5e"
dependencies = [ dependencies = [
"async-stream", "async-stream",
"base64 0.21.2", "base64",
"bytes", "bytes",
"cxx", "cxx",
"cxx-build", "cxx-build",
@ -249,12 +255,6 @@ dependencies = [
"syn 2.0.32", "syn 2.0.32",
] ]
[[package]]
name = "base64"
version = "0.13.1"
source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "9e1b586273c5702936fe7b7d6896644d8be71e6314cfe09d3167c95f712589e8"
[[package]] [[package]]
name = "base64" name = "base64"
version = "0.21.2" version = "0.21.2"
@ -617,7 +617,6 @@ checksum = "9ed9a281f7bc9b7576e61468ba615a66a5c8cfdff42420a70aa82701a3b1e292"
dependencies = [ dependencies = [
"block-buffer", "block-buffer",
"crypto-common", "crypto-common",
"subtle",
] ]
[[package]] [[package]]
@ -924,15 +923,6 @@ version = "0.4.3"
source = "registry+https://github.com/rust-lang/crates.io-index" source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "7f24254aa9a54b5c858eaee2f5bccdb46aaf0e486a595ed5fd8f86ba55232a70" checksum = "7f24254aa9a54b5c858eaee2f5bccdb46aaf0e486a595ed5fd8f86ba55232a70"
[[package]]
name = "hmac"
version = "0.12.1"
source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "6c49c37c09c17a53d937dfbb742eb3a961d65a994e6bcdcf37e7399d0cc8ab5e"
dependencies = [
"digest",
]
[[package]] [[package]]
name = "hostname" name = "hostname"
version = "0.3.1" version = "0.3.1"
@ -1203,21 +1193,6 @@ dependencies = [
"wasm-bindgen", "wasm-bindgen",
] ]
[[package]]
name = "jwt"
version = "0.16.0"
source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "6204285f77fe7d9784db3fdc449ecce1a0114927a51d5a41c4c7a292011c015f"
dependencies = [
"base64 0.13.1",
"crypto-common",
"digest",
"hmac",
"serde",
"serde_json",
"sha2",
]
[[package]] [[package]]
name = "kqueue" name = "kqueue"
version = "1.0.8" version = "1.0.8"
@ -1316,7 +1291,6 @@ dependencies = [
"gha-cache", "gha-cache",
"indicatif", "indicatif",
"is_ci", "is_ci",
"jwt",
"netrc-rs", "netrc-rs",
"reqwest", "reqwest",
"serde", "serde",
@ -1330,6 +1304,7 @@ dependencies = [
"tower-http", "tower-http",
"tracing", "tracing",
"tracing-subscriber", "tracing-subscriber",
"uuid",
] ]
[[package]] [[package]]
@ -1659,7 +1634,7 @@ version = "0.11.18"
source = "registry+https://github.com/rust-lang/crates.io-index" source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "cde824a14b7c14f85caff81225f411faacc04a2013f41670f41443742b1c1c55" checksum = "cde824a14b7c14f85caff81225f411faacc04a2013f41670f41443742b1c1c55"
dependencies = [ dependencies = [
"base64 0.21.2", "base64",
"bytes", "bytes",
"encoding_rs", "encoding_rs",
"futures-core", "futures-core",
@ -1792,7 +1767,7 @@ version = "1.0.2"
source = "registry+https://github.com/rust-lang/crates.io-index" source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "d194b56d58803a43635bdc398cd17e383d6f71f9182b9a192c127ca42494a59b" checksum = "d194b56d58803a43635bdc398cd17e383d6f71f9182b9a192c127ca42494a59b"
dependencies = [ dependencies = [
"base64 0.21.2", "base64",
] ]
[[package]] [[package]]
@ -1947,7 +1922,7 @@ version = "3.4.0"
source = "registry+https://github.com/rust-lang/crates.io-index" source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "64cd236ccc1b7a29e7e2739f27c0b2dd199804abc4290e32f59f3b68d6405c23" checksum = "64cd236ccc1b7a29e7e2739f27c0b2dd199804abc4290e32f59f3b68d6405c23"
dependencies = [ dependencies = [
"base64 0.21.2", "base64",
"chrono", "chrono",
"hex", "hex",
"indexmap 1.9.3", "indexmap 1.9.3",
@ -2058,12 +2033,6 @@ version = "0.10.0"
source = "registry+https://github.com/rust-lang/crates.io-index" source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "73473c0e59e6d5812c5dfe2a064a6444949f089e20eec9a2e5506596494e4623" checksum = "73473c0e59e6d5812c5dfe2a064a6444949f089e20eec9a2e5506596494e4623"
[[package]]
name = "subtle"
version = "2.5.0"
source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "81cdd64d312baedb58e21336b31bc043b77e01cc99033ce76ef539f78e965ebc"
[[package]] [[package]]
name = "syn" name = "syn"
version = "1.0.109" version = "1.0.109"
@ -2530,6 +2499,18 @@ version = "0.2.1"
source = "registry+https://github.com/rust-lang/crates.io-index" source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "711b9620af191e0cdc7468a8d14e709c3dcdb115b36f838e601583af800a370a" checksum = "711b9620af191e0cdc7468a8d14e709c3dcdb115b36f838e601583af800a370a"
[[package]]
name = "uuid"
version = "1.6.1"
source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "5e395fcf16a7a3d8127ec99782007af141946b4795001f876d54fb0d55978560"
dependencies = [
"atomic",
"getrandom",
"rand",
"serde",
]
[[package]] [[package]]
name = "valuable" name = "valuable"
version = "0.1.0" version = "0.1.0"

View file

@ -23,7 +23,6 @@ is_ci = "1.1.1"
sha2 = { version = "0.10.6", default-features = false } sha2 = { version = "0.10.6", default-features = false }
reqwest = { version = "0.11.17", default-features = false, features = ["blocking", "rustls-tls-native-roots", "trust-dns"] } reqwest = { version = "0.11.17", default-features = false, features = ["blocking", "rustls-tls-native-roots", "trust-dns"] }
netrc-rs = "0.1.2" netrc-rs = "0.1.2"
jwt = { version = "0.16" }
attic = { git = "ssh://git@github.com/DeterminateSystems/attic-priv", branch = "main" } attic = { git = "ssh://git@github.com/DeterminateSystems/attic-priv", branch = "main" }
#attic = { path = "../../attic-priv/attic" } #attic = { path = "../../attic-priv/attic" }
attic-client = { git = "ssh://git@github.com/DeterminateSystems/attic-priv", branch = "main" } attic-client = { git = "ssh://git@github.com/DeterminateSystems/attic-priv", branch = "main" }
@ -31,6 +30,7 @@ attic-client = { git = "ssh://git@github.com/DeterminateSystems/attic-priv", bra
indicatif = "0.17" indicatif = "0.17"
anyhow = "1.0.71" anyhow = "1.0.71"
tempfile = "3.9" tempfile = "3.9"
uuid = { version = "1.4.0", features = ["serde", "v7", "rand", "std"] }
[dependencies.tokio] [dependencies.tokio]
version = "1.28.0" version = "1.28.0"

View file

@ -29,7 +29,25 @@ pub enum Error {
GHADisabled, GHADisabled,
#[error("FlakeHub cache error: {0}")] #[error("FlakeHub cache error: {0}")]
FlakeHub(anyhow::Error), FlakeHub(#[from] anyhow::Error),
#[error("FlakeHub HTTP error: {0}")]
FlakeHubHttp(#[from] reqwest::Error),
#[error("Got HTTP response {0} getting the cache name from FlakeHub: {1}")]
GetCacheName(reqwest::StatusCode, String),
#[error("netrc parse error: {0}")]
Netrc(netrc_rs::Error),
#[error("Cannot find netrc credentials for {0}")]
MissingCreds(String),
#[error("Attic error: {0}")]
Attic(#[from] attic::AtticError),
#[error("Bad URL")]
BadUrl(reqwest::Url),
} }
impl IntoResponse for Error { impl IntoResponse for Error {

View file

@ -8,6 +8,7 @@ use attic_client::{
config::ServerConfig, config::ServerConfig,
push::{PushConfig, Pusher}, push::{PushConfig, Pusher},
}; };
use reqwest::Url;
use serde::Deserialize; use serde::Deserialize;
use std::env; use std::env;
use std::path::Path; use std::path::Path;
@ -15,20 +16,20 @@ use std::str::FromStr;
use std::sync::Arc; use std::sync::Arc;
use tokio::fs::File; use tokio::fs::File;
use tokio::io::{AsyncReadExt, AsyncWriteExt}; use tokio::io::{AsyncReadExt, AsyncWriteExt};
use uuid::Uuid;
const JWT_PREFIX: &str = "flakehub1_";
const USER_AGENT: &str = "magic-nix-cache"; const USER_AGENT: &str = "magic-nix-cache";
pub struct State { pub struct State {
pub substituter: String, pub substituter: Url,
pub push_session: PushSession, pub push_session: PushSession,
} }
pub async fn init_cache( pub async fn init_cache(
flakehub_api_server: &str, flakehub_api_server: &Url,
flakehub_api_server_netrc: &Path, flakehub_api_server_netrc: &Path,
flakehub_cache_server: &str, flakehub_cache_server: &Url,
store: Arc<NixStore>, store: Arc<NixStore>,
) -> Result<State> { ) -> Result<State> {
// Parse netrc to get the credentials for api.flakehub.com. // Parse netrc to get the credentials for api.flakehub.com.
@ -36,7 +37,7 @@ pub async fn init_cache(
let mut netrc_file = File::open(flakehub_api_server_netrc).await?; let mut netrc_file = File::open(flakehub_api_server_netrc).await?;
let mut netrc_contents = String::new(); let mut netrc_contents = String::new();
netrc_file.read_to_string(&mut netrc_contents).await?; netrc_file.read_to_string(&mut netrc_contents).await?;
netrc_rs::Netrc::parse(netrc_contents, false).unwrap() netrc_rs::Netrc::parse(netrc_contents, false).map_err(Error::Netrc)?
}; };
let netrc_entry = { let netrc_entry = {
@ -44,35 +45,28 @@ pub async fn init_cache(
.machines .machines
.iter() .iter()
.find(|machine| { .find(|machine| {
machine.name.as_ref().unwrap() machine.name.as_ref() == flakehub_api_server.host().map(|x| x.to_string()).as_ref()
== &reqwest::Url::parse(flakehub_api_server)
.unwrap()
.host()
.unwrap()
.to_string()
}) })
.unwrap() .ok_or_else(|| Error::MissingCreds(flakehub_api_server.to_string()))?
.to_owned() .to_owned()
}; };
let flakehub_cache_server_hostname = reqwest::Url::parse(flakehub_cache_server) let flakehub_cache_server_hostname = flakehub_cache_server
.unwrap()
.host() .host()
.unwrap() .ok_or_else(|| Error::BadUrl(flakehub_cache_server.to_owned()))?
.to_string(); .to_string();
// Append an entry for the FlakeHub cache server to netrc. // Append an entry for the FlakeHub cache server to netrc.
if !netrc if !netrc
.machines .machines
.iter() .iter()
.any(|machine| machine.name.as_ref().unwrap() == &flakehub_cache_server_hostname) .any(|machine| machine.name.as_ref() == Some(&flakehub_cache_server_hostname))
{ {
let mut netrc_file = tokio::fs::OpenOptions::new() let mut netrc_file = tokio::fs::OpenOptions::new()
.create(false) .create(false)
.append(true) .append(true)
.open(flakehub_api_server_netrc) .open(flakehub_api_server_netrc)
.await .await?;
.unwrap();
netrc_file netrc_file
.write_all( .write_all(
format!( format!(
@ -82,127 +76,58 @@ pub async fn init_cache(
) )
.as_bytes(), .as_bytes(),
) )
.await .await?;
.unwrap();
} }
// Get the cache we're supposed to use. // Get the cache UUID for this project.
let expected_cache_name = { let cache_name = {
let github_repo = env::var("GITHUB_REPOSITORY") let github_repo = env::var("GITHUB_REPOSITORY")
.expect("GITHUB_REPOSITORY environment variable is not set"); .expect("GITHUB_REPOSITORY environment variable is not set");
let url = format!("{}/project/{}", flakehub_api_server, github_repo,); let url = flakehub_api_server
.join(&format!("project/{}", github_repo))
.unwrap();
let response = reqwest::Client::new() let response = reqwest::Client::new()
.get(&url) .get(url.to_owned())
.header("User-Agent", USER_AGENT) .header("User-Agent", USER_AGENT)
.basic_auth( .basic_auth(
netrc_entry.login.as_ref().unwrap(), netrc_entry.login.as_ref().unwrap(),
netrc_entry.password.as_ref(), netrc_entry.password.as_ref(),
) )
.send() .send()
.await .await?;
.unwrap();
if response.status().is_success() {
#[derive(Deserialize)]
struct ProjectInfo {
organization_uuid_v7: String,
project_uuid_v7: String,
}
let project_info = response.json::<ProjectInfo>().await.unwrap();
let expected_cache_name = format!(
"{}:{}",
project_info.organization_uuid_v7, project_info.project_uuid_v7,
);
tracing::info!("Want to use cache {:?}.", expected_cache_name);
Some(expected_cache_name)
} else {
tracing::error!(
"Failed to get project info from {}: {}",
url,
response.status()
);
None
}
};
// Get a token for creating and pushing to the FlakeHub binary cache.
let (known_caches, token) = {
let url = format!("{}/token/create/cache", flakehub_api_server);
let request = reqwest::Client::new()
.post(&url)
.header("User-Agent", USER_AGENT)
.basic_auth(
netrc_entry.login.as_ref().unwrap(),
netrc_entry.password.as_ref(),
);
let response = request.send().await.unwrap();
if !response.status().is_success() { if !response.status().is_success() {
panic!( return Err(Error::GetCacheName(
"Failed to get FlakeHub binary cache creation token from {}: {}", response.status(),
url, response.text().await?,
response.status() ));
);
} }
#[derive(Deserialize)] #[derive(Deserialize)]
struct Response { struct ProjectInfo {
token: String, organization_uuid_v7: Uuid,
project_uuid_v7: Uuid,
} }
let token = response.json::<Response>().await.unwrap().token; let project_info = response.json::<ProjectInfo>().await?;
// Parse the JWT to get the list of caches to which we have access. format!(
let jwt = token.strip_prefix(JWT_PREFIX).unwrap(); "{}:{}",
let jwt_parsed: jwt::Token<jwt::Header, serde_json::Map<String, serde_json::Value>, _> = project_info.organization_uuid_v7, project_info.project_uuid_v7,
jwt::Token::parse_unverified(jwt).unwrap(); )
let known_caches = jwt_parsed
.claims()
.get("https://cache.flakehub.com/v1")
.unwrap()
.get("caches")
.unwrap()
.as_object()
.unwrap();
(known_caches.to_owned(), token)
}; };
// Use the expected cache if we have access to it, otherwise use tracing::info!("Using cache {:?}.", cache_name);
// the oldest cache to which we have access.
let cache_name = {
if expected_cache_name
.as_ref()
.map_or(false, |x| known_caches.get(x).is_some())
{
expected_cache_name.unwrap().to_owned()
} else {
let mut keys: Vec<_> = known_caches.keys().collect();
keys.sort();
keys.first()
.expect("FlakeHub did not return any cache for the calling user.")
.to_string()
}
};
let cache = CacheSliceIdentifier::from_str(&cache_name).unwrap(); let cache = CacheSliceIdentifier::from_str(&cache_name)?;
tracing::info!("Using cache {}.", cache);
// Create the cache. // Create the cache.
let api = ApiClient::from_server_config(ServerConfig { let api = ApiClient::from_server_config(ServerConfig {
endpoint: flakehub_cache_server.to_owned(), endpoint: flakehub_cache_server.to_string(),
token: Some(token.to_owned()), token: netrc_entry.password.as_ref().cloned(),
}) })?;
.unwrap();
let request = CreateCacheRequest { let request = CreateCacheRequest {
keypair: KeypairConfig::Generate, keypair: KeypairConfig::Generate,
@ -218,14 +143,14 @@ pub async fn init_cache(
tracing::info!("Cache {} already exists.", cache_name); tracing::info!("Cache {} already exists.", cache_name);
} }
_ => { _ => {
panic!("{:?}", err); return Err(Error::FlakeHub(err));
} }
} }
} else { } else {
tracing::info!("Created cache {} on {}.", cache_name, flakehub_cache_server); tracing::info!("Created cache {} on {}.", cache_name, flakehub_cache_server);
} }
let cache_config = api.get_cache_config(&cache).await.unwrap(); let cache_config = api.get_cache_config(&cache).await?;
let push_config = PushConfig { let push_config = PushConfig {
num_workers: 5, // FIXME: use number of CPUs? num_workers: 5, // FIXME: use number of CPUs?
@ -254,10 +179,7 @@ pub async fn init_cache(
} }
pub async fn enqueue_paths(state: &State, store_paths: Vec<StorePath>) -> Result<()> { pub async fn enqueue_paths(state: &State, store_paths: Vec<StorePath>) -> Result<()> {
state state.push_session.queue_many(store_paths)?;
.push_session
.queue_many(store_paths)
.map_err(Error::FlakeHub)?;
Ok(()) Ok(())
} }

View file

@ -81,7 +81,7 @@ struct Args {
/// The FlakeHub API server. /// The FlakeHub API server.
#[arg(long)] #[arg(long)]
flakehub_api_server: Option<String>, flakehub_api_server: Option<reqwest::Url>,
/// The path of the `netrc` file that contains the FlakeHub JWT token. /// The path of the `netrc` file that contains the FlakeHub JWT token.
#[arg(long)] #[arg(long)]
@ -89,7 +89,7 @@ struct Args {
/// The FlakeHub binary cache server. /// The FlakeHub binary cache server.
#[arg(long)] #[arg(long)]
flakehub_cache_server: Option<String>, flakehub_cache_server: Option<reqwest::Url>,
/// The location of `nix.conf`. /// The location of `nix.conf`.
#[arg(long)] #[arg(long)]
@ -186,16 +186,16 @@ async fn main_cli() {
) )
.expect("Writing to nix.conf"); .expect("Writing to nix.conf");
tracing::info!("Attic cache is enabled."); tracing::info!("FlakeHub cache is enabled.");
Some(state) Some(state)
} }
Err(err) => { Err(err) => {
tracing::error!("Attic cache initialization failed: {}", err); tracing::error!("FlakeHub cache initialization failed: {}", err);
None None
} }
} }
} else { } else {
tracing::info!("Attic cache is disabled."); tracing::info!("FlakeHub cache is disabled.");
None None
}; };