README ¶
generic-worker
A generic worker for taskcluster, written in go.
Engines
Simple engine
This was the first engine to be written, and is, pretty simple. It executes processes as child processes of the generic-worker process, under the same user account that the generic-worker process runs as. Note, this means that anything that the worker has access to, the tasks will also have access to.
This is therefore a pretty insecure engine (tasks can read generic-worker config file and thus access taskcluster credentials for claiming work from the Queue).
Also it is impossible for the worker to guarantee a clean task environment between task runs, since any task can potentially soil the environment by changing user settings or for example, leaving files around.
Multiuser engine
This was the next engine to be written, and solves the problem of task isolation by creating unique OS user accounts for each task that is to be run. Each task user account (by default) is unprivileged, much like a guest user account. Once the task has completed, the task user account is purged, and there should be no further trace of the task on the system. The task user does not have permission to alter system-wide settings, so after the user account is purged, the host environment should be restored to a pristine state.
Since the generic-worker process runs under a different user account to the task processes, taskcluster credentials, signing keys, and other private matter can be protected from task access. Note, it is the responsibility of the host owner to lock down resources as necessary, to ensure that an unprivleged account does not have access to anything private on the machine.
Since tasks run on the host of the worker (without any container technology or virtualisation technology), toolchains that need to be installed as an Administrator typically need to be installed on the host environment. Toolchains that do not require Administrator privileges to be installed can be installed as task steps.
Docker engine
Work has started to provide a docker engine, that allows tasks to be executed in the context of a docker container running on the host system. This has similar benefits as the multiuser engine (task isolation, protection of host secrets) but additionally has the advantage that the target execution environment can be defined in a docker image, varying significantly from the host environment. This makes it possible to have arbitrary toolchains available to a task, without needing to roll new host environments, and also allows tasks to run task steps as the root user, without impacting the security of the host environment.
At the moment there is only elementary support for running tasks inside a docker container, and this should not be used in production. The features are being implemented in bug 1499055.
Obtain prebuilt release
- Download the latest release for your platform from https://github.com/taskcluster/generic-worker/releases
- Download the latest release of taskcluster-proxy for your platform from https://github.com/taskcluster/taskcluster-proxy/releases
- Download the latest release of livelog for your platform from https://github.com/taskcluster/livelog/releases
- For darwin/linux, make the binaries executable:
chmod a+x {generic-worker,livelog,taskcluster-proxy}*
Build from source
If you prefer not to use a prepackaged binary, or want to have the latest unreleased version from the development head:
- Head over to https://golang.org/dl/ and follow the instructions for your platform. NOTE: go 1.8 or higher is required. Be sure to set your GOPATH to something appropriate.
- Run
go get github.com/taskcluster/livelog
- Run
go get github.com/taskcluster/taskcluster-proxy
Run go get -tags multiuser github.com/taskcluster/generic-worker
(windows/darwin) and/or go get -tags simple github.com/taskcluster/generic-worker
(linux/darwin) and/or go get -tags docker github.com/taskcluster/generic-worker
(linux). This should also build binaries for your platform.
Run ./build.sh
to check go version, generate code, build binaries, compile (but not run) tests, perform linting, and ensure there are no ineffective assignments in go code.
./build.sh
takes optional arguments, -a
to build all platforms, and -t
to run tests. By default tests are not run and only the current platform is built.
All being well, the binaries will be built in the directory you executed the build.sh
script from.
Guide to installation on worker machines
The following instructions should be considered more as a guide rather than concrete requirements.
They document possible (and simple) ways to install and run generic-worker on various platforms. Real life production deployments may be integrated quite differently.
Each installation guide provides a bootstrap script to runs the generic-worker binary. The bootstrapping script can be easily customised (for example, to deal with automatic quarantining of workers, waiting for custom events, etc).
Windows - multiuser build
-
Build or download a
generic-worker.exe
windows multiuser binary. -
Run the following command to generate an ed25519 private key for signing artifacts:
generic-worker.exe new-ed25519-keypair --file C:\generic-worker\ed25519_key
The private key will be written to the file
C:\generic-worker\ed25519_key
, and the public key will be written to standard out. Keep a copy of the public key if you wish to validate artifact signatures. -
Download NSSM 2.24 from https://nssm.cc/release/nssm-2.24.zip and extract it under
C:\
. -
Install generic-worker as a Windows service running under the
LocalSystem
account, by running the following command as anAdministrator
:generic-worker.exe install service
(seegeneric-worker.exe --help
to apply non-default configuration settings)
-
Download livelog from https://github.com/taskcluster/livelog/releases and place it in
C:\generic-worker\livelog.exe
. -
Download taskcluster proxy from https://github.com/taskcluster/taskcluster-proxy/releases and place it in
C:\generic-worker\taskcluster-proxy.exe
. -
Create
C:\generic-worker\generic-worker.config
with appopriate values. -
Edit file
C:\generic-worker\generic-worker.config
with appropriate settings (seegeneric-worker.exe --help
for information). -
Reboot the machine, and the worker should be running. Check logs under
C:\generic-worker\generic-worker.log
.
macOS - multiuser/simple build
These instructions require macOS Mojave version 10.14.x
-
Log into target user account:
Simple build: Create user account
genericworker
to run the worker under, and log in asgenericworker
in a shell.Multiuser build: Log in as root (
sudo su -
) in a shell. -
Multiuser build only
Disable wizards/warning pop ups on first-login to user accounts:
git clone git@github.com:rtrouton/profiles.git
git -C profiles checkout f23bc6146ca570108dbaa9e3cb8da954ce325002
(just because this is the version I tested, later versions may also be fine)profiles install -path=profiles/SkipSiriSetup/SkipSiriSetup.mobileconfig
profiles install -path=profiles/SkipDarkorLightAppearance/SkipDarkorLightAppearance.mobileconfig
profiles install -path=profiles/Disable32BitApplicationWarning/10.14/Disable32BitApplicationWarning.mobileconfig
profiles install -path=profiles/SkipDataAndPrivacy/SkipDataAndPrivacy.mobileconfig
profiles install -path=profiles/SkipiCloudSetup/SkipiCloudSetup.mobileconfig
-
Download
generic-worker
from https://github.com/taskcluster/generic-worker/releases and place it in/usr/local/bin/generic-worker
. -
Download livelog from https://github.com/taskcluster/livelog/releases and place it in
/usr/local/bin/livelog
. -
Download taskcluster proxy from https://github.com/taskcluster/taskcluster-proxy/releases and place it in
/usr/local/bin/taskcluster-proxy
. -
Make
generic-worker
,taskcluster-proxy
,livelog
binaries executable:chmod a+x /usr/local/bin/{generic-worker,taskcluster-proxy,livelog}
-
Generate a key for signing artifacts:
-
sudo mkdir /etc/generic-worker
-
Simple build only:
sudo chown genericworker:staff /etc/generic-worker
-
/usr/local/bin/generic-worker new-ed25519-keypair --file /etc/generic-worker/ed25519_key
The private key will be written to the file
/etc/generic-worker/ed25519_key
, and the public key will be written to standard out. Keep a copy of the public key if you wish to validate artifact signatures. -
-
Create the file
/usr/local/bin/run-generic-worker.sh
with the following content:#!/bin/bash . /etc/rc.common CheckForNetwork while [ "${NETWORKUP}" != "-YES-" ] do sleep 5 NETWORKUP= CheckForNetwork done /usr/local/bin/generic-worker run --config /etc/generic-worker/config
-
Run the following to make the
run-generic-worker.sh
script executable:chmod a+x /usr/local/bin/run-generic-worker.sh
-
Create
/etc/generic-worker/config
with appropriate configuration settings (seegeneric-worker --help
for details). Something like this:{ "accessToken": "********************************************", "cachesDir": "/Library/Caches/generic-worker/caches", "cleanUpTaskDirs": true, "clientId": "project/foo/bar/my/client", "disableReboots": false, "downloadsDir": "/Library/Caches/generic-worker/downloads", "ed25519SigningKeyLocation": "/etc/generic-worker/ed25519_key", "provisionerId": "my-dear-provisioner", "publicIP": "1.2.3.4", "requiredDiskSpaceMegabytes": 2048, "rootURL": "https://my-root-url.com", "sentryProject": "generic-worker", "shutdownMachineOnIdle": false, "shutdownMachineOnInternalError": false, "subdomain": "taskcluster-worker.net", "taskclusterProxyPort": 8080, "tasksDir": "/Users", "workerGroup": "my-worker-group", "workerId": "my-lovely-computer", "workerType": "my-special-worker-type", "wstAudience": "taskcluster-net", "wstServerURL": "https://websocktunnel.tasks.build" }
-
Create launch daemon:
Create the file
/Library/LaunchDaemons/com.mozilla.genericworker.plist
with the following content:<?xml version="1.0" encoding="UTF-8"?> <!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd"> <plist version="1.0"> <dict> <key>Label</key> <string>com.mozilla.genericworker</string> <key>Program</key> <string>/usr/local/bin/run-generic-worker.sh</string> <key>StandardOutPath</key> <string>/var/log/genericworker/stdout.log</string> <key>StandardErrorPath</key> <string>/var/log/genericworker/stderr.log</string> <key>RunAtLoad</key> <true/> <key>UserName</key> <string>root</string> <----------- (for multiuser build) <string>genericworker</string> <----------- (for simple build) </dict> </plist>
-
Install launch daemon:
sudo launchctl load -w /Library/LaunchDaemons/com.mozilla.genericworker.plist
-
Watch for logs in
/var/log/generic-worker/
.
Linux simple/multiuser/docker build
-
Make sure your system is up-to-date. For example, on ubuntu:
apt update DEBIAN_FRONTEND=noninteractive apt upgrade -yq
-
Install curl (needed for later). For example, on ubuntu:
apt install -y curl
-
For multiuser ensure Gnome Desktop 3 is installed:
apt install -y ubuntu-desktop ubuntu-gnome-desktop
-
For docker engine, or if tasks require Docker, install it. For example, on ubuntu bionic:
apt install -y apt-transport-https ca-certificates software-properties-common curl -fsSL https://download.docker.com/linux/ubuntu/gpg | apt-key add - add-apt-repository "deb [arch=amd64] https://download.docker.com/linux/ubuntu bionic stable" apt update apt-cache policy docker-ce | grep -qF download.docker.com apt install -y docker-ce sleep 5 systemctl status docker | grep "Started Docker Application Container Engine" usermod -aG docker ubuntu
-
Download
generic-worker
,taskcluster-proxy
andlivelog
to/usr/local/bin
:cd /usr/local/bin curl -L "https://github.com/taskcluster/generic-worker/releases/download/<GENERIC_WORKER_VERSION>/generic-worker-multiuser-linux-amd64" > generic-worker curl -L "https://github.com/taskcluster/livelog/releases/download/<LIVELOG_VERSION>/livelog-linux-amd64" > livelog curl -L "https://github.com/taskcluster/taskcluster-proxy/releases/download/<TASKCLUSTER_PROXY_VERSION>/taskcluster-proxy-linux-amd64" > taskcluster-proxy
-
Make binaries executable:
chmod a+x /usr/local/bin/{generic-worker,taskcluster-proxy,livelog}
-
Create directories required by generic-worker:
mkdir -p /etc/generic-worker /var/local/generic-worker
-
Check generic-worker works and has correct version:
/usr/local/bin/generic-worker --version
-
Generate a key for signing artifacts:
/usr/local/bin/generic-worker new-ed25519-keypair --file /etc/generic-worker/ed25519_key
The private key will be written to the file
/etc/generic-worker/ed25519_key
, and the public key will be written to standard out. Keep a copy of the public key if you wish to validate artifact signatures. -
Ensure host 'taskcluster' resolves to localhost:
echo 127.0.1.1 taskcluster >> /etc/hosts
-
AWS workers only: configure generic-worker to run on boot with dynamically provided config from AWS Provisioner:
echo '@reboot cd /var/local/generic-worker && PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin /usr/local/bin/generic-worker run --configure-for-aws --config /etc/generic-worker/config >> /var/log/generic-worker.log 2>&1' | crontab -
Make sure netplan network renderer takes precendence over eni network renderer. See bug 1499054 comment 12 for an explanation.
cat > /etc/cloud/cloud.cfg.d/01_network_renderer_policy.cfg << EOF system_info: network: renderers: [ 'netplan', 'eni', 'sysconfig' ] EOF
-
Non-AWS workers only: configure generic-worker to run on boot with a static local config file:
echo '@reboot cd /var/local/generic-worker && PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin /usr/local/bin/generic-worker run --config /etc/generic-worker/config >> /var/log/generic-worker.log 2>&1' | crontab -
Create
/etc/generic-worker/config
with appropriate configuration settings (seegeneric-worker --help
for details).
Acquire taskcluster credentials for running tests
There are two alternative mechanisms to acquire the scopes you need.
Option 1
This method works if you log into Taskcluster via mozillians, or you log into taskcluster via LDAP using the same email address as your mozillians account, or if you do not currently have a mozillians account but would like to create one.
- Sign up for a Mozillians account (if you do not already have one)
- Request membership of the taskcluster-contributors mozillians group
Option 2
This method is for those who wish not to create a mozillians account, but already authenticate into taskcluster via some other means, or have a mozillians account but it is registered to a different email address than the one they use to log into Taskcluster with (e.g. via LDAP integration).
- Request the scope
assume:project:taskcluster:generic-worker-tester
to be granted to you via a bugzilla request, including your currently activeClientId
in the bug description. From the ClientId, we will be able to work out which role to assign the scope to, in order that you acquire the scope with the client you log into Taskcluster tools site with.
Once you have been granted the above scope:
- If you are signed into tools.taskcluster.net already, sign out
- Sign into tools.taskcluster.net using either your new Mozillians account, or your LDAP account if it uses the same email address as your Mozillians account
- Check that a role or client of yours appears in this list
- Create a permanent client (taskcluster credentials) for yourself in the Client Manager granting it the single scope
assume:project:taskcluster:generic-worker-tester
Set up your env
- Generate an ed25519 key pair with
generic-worker new-ed25519-keypair --file <file>
wherefile
is where you want the generated ed25519 private key to be written to - Create a generic worker configuration file somewhere, with the following content:
{
"accessToken": "<access token of your permanent credentials>",
"certificate": "",
"clientId": "<client ID of your permanent credentials>",
"ed25519SigningKeyLocation": "<file location you wrote ed25519 private key to>",
"livelogSecret": "<anything you like>",
"provisionerId": "test-provisioner",
"publicIP": "<ideally an IP address of one of your network interfaces>",
"workerGroup": "test-worker-group",
"workerId": "test-worker-id",
"workerType": "<a unique name that only you will use for your test worker(s)>"
}
To see a full description of all the config options available to you, run generic-worker --help
:
generic-worker (multiuser engine) 16.3.1
generic-worker is a taskcluster worker that can run on any platform that supports go (golang).
See http://taskcluster.github.io/generic-worker/ for more details. Essentially, the worker is
the taskcluster component that executes tasks. It requests tasks from the taskcluster queue,
and reports back results to the queue.
Usage:
generic-worker run [--config CONFIG-FILE]
[--configure-for-aws | --configure-for-gcp]
generic-worker show-payload-schema
generic-worker new-ed25519-keypair --file ED25519-PRIVATE-KEY-FILE
generic-worker --help
generic-worker --version
Targets:
run Runs the generic-worker.
show-payload-schema Each taskcluster task defines a payload to be
interpreted by the worker that executes it. This
payload is validated against a json schema baked
into the release. This option outputs the json
schema used in this version of the generic
worker.
new-ed25519-keypair This will generate a fresh, new ed25519
compliant private/public key pair. The public
key will be written to stdout and the private
key will be written to the specified file.
Options:
--config CONFIG-FILE Json configuration file to use. See
configuration section below to see what this
file should contain. When calling the install
target, this is the config file that the
installation should use, rather than the config
to use during install.
[default: generic-worker.config]
--configure-for-aws Use this option when installing or running a worker
that is spawned by the AWS provisioner. It will cause
the worker to query the EC2 metadata service when it
is run, in order to retrieve data that will allow it
to self-configure, based on AWS metadata, information
from the provisioner, and the worker type definition
that the provisioner holds for the worker type.
--configure-for-gcp This will create the CONFIG-FILE for a GCP
installation by querying the GCP environment
and setting appropriate values.
--file PRIVATE-KEY-FILE The path to the file to write the private key
to. The parent directory must already exist.
If the file exists it will be overwritten,
otherwise it will be created.
--help Display this help text.
--version The release version of the generic-worker.
Configuring the generic worker:
The configuration file for the generic worker is specified with -c|--config CONFIG-FILE
as described above. Its format is a json dictionary of name/value pairs.
** REQUIRED ** properties
=========================
accessToken Taskcluster access token used by generic worker
to talk to taskcluster queue.
clientId Taskcluster client ID used by generic worker to
talk to taskcluster queue.
ed25519SigningKeyLocation The ed25519 signing key for signing artifacts with.
publicIP The IP address for clients to be directed to
for serving live logs; see
https://github.com/taskcluster/livelog and
https://github.com/taskcluster/stateless-dns-server
Also used by chain of trust.
rootURL The root URL of the taskcluster deployment to which
clientId and accessToken grant access. For example,
'https://taskcluster.net'. Individual services can
override this setting - see the *BaseURL settings.
workerId A name to uniquely identify your worker.
workerType This should match a worker_type managed by the
provisioner you have specified.
** OPTIONAL ** properties
=========================
authBaseURL The base URL for taskcluster auth API calls.
If not provided, the base URL for API calls is
instead derived from rootURL setting as follows:
* https://auth.taskcluster.net/v1 for rootURL https://taskcluster.net
* <rootURL>/api/auth/v1 for all other rootURLs
availabilityZone The EC2 availability zone of the worker.
cachesDir The directory where task caches should be stored on
the worker. The directory will be created if it does
not exist. This may be a relative path to the
current directory, or an absolute path.
[default: caches]
certificate Taskcluster certificate, when using temporary
credentials only.
checkForNewDeploymentEverySecs The number of seconds between consecutive calls
to the provisioner, to check if there has been a
new deployment of the current worker type. If a
new deployment is discovered, worker will shut
down. See deploymentId property. [default: 1800]
cleanUpTaskDirs Whether to delete the home directories of the task
users after the task completes. Normally you would
want to do this to avoid filling up disk space,
but for one-off troubleshooting, it can be useful
to (temporarily) leave home directories in place.
Accepted values: true or false. [default: true]
deploymentId If running with --configure-for-aws, then between
tasks, at a chosen maximum frequency (see
checkForNewDeploymentEverySecs property), the
worker will query the provisioner to get the
updated worker type definition. If the deploymentId
in the config of the worker type definition is
different to the worker's current deploymentId, the
worker will shut itself down. See
https://bugzil.la/1298010
disableReboots If true, no system reboot will be initiated by
generic-worker program, but it will still return
with exit code 67 if the system needs rebooting.
This allows custom logic to be executed before
rebooting, by patching run-generic-worker.bat
script to check for exit code 67, perform steps
(such as formatting a hard drive) and then
rebooting in the run-generic-worker.bat script.
[default: false]
downloadsDir The directory to cache downloaded files for
populating preloaded caches and readonly mounts. The
directory will be created if it does not exist. This
may be a relative path to the current directory, or
an absolute path. [default: downloads]
idleTimeoutSecs How many seconds to wait without getting a new
task to perform, before the worker process exits.
An integer, >= 0. A value of 0 means "never reach
the idle state" - i.e. continue running
indefinitely. See also shutdownMachineOnIdle.
[default: 0]
instanceID The EC2 instance ID of the worker. Used by chain of trust.
instanceType The EC2 instance Type of the worker. Used by chain of trust.
livelogCertificate SSL certificate to be used by livelog for hosting
logs over https. If not set, http will be used.
livelogExecutable Filepath of LiveLog executable to use; see
https://github.com/taskcluster/livelog
[default: livelog]
livelogGETPort Port number for livelog HTTP GET requests.
[default: 60023]
livelogKey SSL key to be used by livelog for hosting logs
over https. If not set, http will be used.
livelogPUTPort Port number for livelog HTTP PUT requests.
[default: 60022]
livelogSecret This should match the secret used by the
stateless dns server; see
https://github.com/taskcluster/stateless-dns-server
Optional if stateless DNS is not in use.
numberOfTasksToRun If zero, run tasks indefinitely. Otherwise, after
this many tasks, exit. [default: 0]
privateIP The private IP of the worker, used by chain of trust.
provisionerBaseURL The base URL for aws-provisioner API calls.
If not provided, the base URL for API calls is
instead derived from rootURL setting as follows:
* https://aws-provisioner.taskcluster.net/v1 for rootURL https://taskcluster.net
* <rootURL>/api/aws-provisioner/v1 for all other rootURLs
provisionerId The taskcluster provisioner which is taking care
of provisioning environments with generic-worker
running on them. [default: test-provisioner]
purgeCacheBaseURL The base URL for purge cache API calls.
If not provided, the base URL for API calls is
instead derived from rootURL setting as follows:
* https://purge-cache.taskcluster.net/v1 for rootURL https://taskcluster.net
* <rootURL>/api/purge-cache/v1 for all other rootURLs
queueBaseURL The base URL for API calls to the queue service.
If not provided, the base URL for API calls is
instead derived from rootURL setting as follows:
* https://queue.taskcluster.net/v1 for rootURL https://taskcluster.net
* <rootURL>/api/queue/v1 for all other rootURLs
region The EC2 region of the worker. Used by chain of trust.
requiredDiskSpaceMegabytes The garbage collector will ensure at least this
number of megabytes of disk space are available
when each task starts. If it cannot free enough
disk space, the worker will shut itself down.
[default: 10240]
runAfterUserCreation A string, that if non-empty, will be treated as a
command to be executed as the newly generated task
user, after the user has been created, the machine
has rebooted and the user has logged in, but before
a task is run as that user. This is a way to
provide generic user initialisation logic that
should apply to all generated users (and thus all
tasks) and be run as the task user itself. This
option does *not* support running a command as
Administrator. Furthermore, even if
runTasksAsCurrentUser is true, the script will still
be executed as the task user, rather than the
current user (that runs the generic-worker process).
runTasksAsCurrentUser If true, users will not be created for tasks, but
the current OS user will be used. [default: false]
secretsBaseURL The base URL for taskcluster secrets API calls.
If not provided, the base URL for API calls is
instead derived from rootURL setting as follows:
* https://secrets.taskcluster.net/v1 for rootURL https://taskcluster.net
* <rootURL>/api/secrets/v1 for all other rootURLs
sentryProject The project name used in https://sentry.io for
reporting worker crashes. Permission to publish
crash reports is granted via the scope
auth:sentry:<sentryProject>. If the taskcluster
client (see clientId property above) does not
posses this scope, no crash reports will be sent.
Similarly, if this property is not specified or
is the empty string, no reports will be sent.
[default: generic-worker]
shutdownMachineOnIdle If true, when the worker is deemed to have been
idle for enough time (see idleTimeoutSecs) the
worker will issue an OS shutdown command. If false,
the worker process will simply terminate, but the
machine will not be shut down. [default: false]
shutdownMachineOnInternalError If true, if the worker encounters an unrecoverable
error (such as not being able to write to a
required file) it will shutdown the host
computer. Note this is generally only desired
for machines running in production, such as on AWS
EC2 spot instances. Use with caution!
[default: false]
subdomain Subdomain to use in stateless dns name for live
logs; see
https://github.com/taskcluster/stateless-dns-server
[default: taskcluster-worker.net]
taskclusterProxyExecutable Filepath of taskcluster-proxy executable to use; see
https://github.com/taskcluster/taskcluster-proxy
[default: taskcluster-proxy]
taskclusterProxyPort Port number for taskcluster-proxy HTTP requests.
[default: 80]
tasksDir The location where task directories should be
created on the worker. [default: /Users]
workerGroup Typically this would be an aws region - an
identifier to uniquely identify which pool of
workers this worker logically belongs to.
[default: test-worker-group]
workerManagerBaseURL The base URL for taskcluster worker-manager API calls.
If not provided, the base URL for API calls is
instead derived from rootURL setting as follows:
* https://worker-manager.taskcluster.net/v1 for rootURL https://taskcluster.net
* <rootURL>/api/worker-manager/v1 for all other rootURLs
workerTypeMetaData This arbitrary json blob will be included at the
top of each task log. Providing information here,
such as a URL to the code/config used to set up the
worker type will mean that people running tasks on
the worker type will have more information about how
it was set up (for example what has been installed on
the machine).
wstAudience The audience value for which to request websocktunnel
credentials, identifying a set of WST servers this
worker could connect to. Optional if not using websocktunnel
to expose live logs.
wstServerURL The URL of the websocktunnel server with which to expose
live logs. Optional if not using websocktunnel to expose
live logs.
If an optional config setting is not provided in the json configuration file, the
default will be taken (defaults documented above).
If no value can be determined for a required config setting, the generic-worker will
exit with a failure message.
Exit Codes:
0 Tasks completed successfully; no more tasks to run (see config setting
numberOfTasksToRun).
64 Not able to load generic-worker config. This could be a problem reading the
generic-worker config file on the filesystem, a problem talking to AWS/GCP
metadata service, or a problem retrieving config/files from the taskcluster
secrets service.
65 Not able to install generic-worker on the system.
67 A task user has been created, and the generic-worker needs to reboot in order
to log on as the new task user. Note, the reboot happens automatically unless
config setting disableReboots is set to true - in either code this exit code will
be issued.
68 The generic-worker hit its idle timeout limit (see config settings idleTimeoutSecs
and shutdownMachineOnIdle).
69 Worker panic - either a worker bug, or the environment is not suitable for running
a task, e.g. a file cannot be written to the file system, or something else did
not work that was required in order to execute a task. See config setting
shutdownMachineOnInternalError.
70 A new deploymentId has been issued in the AWS worker type configuration, meaning
this worker environment is no longer up-to-date. Typcially workers should
terminate.
71 The worker was terminated via an interrupt signal (e.g. Ctrl-C pressed).
72 The worker is running on spot infrastructure in AWS EC2 and has been served a
spot termination notice, and therefore has shut down.
73 The config provided to the worker is invalid.
75 Not able to create an ed25519 key pair.
76 Not able to save generic-worker config file after fetching it from AWS provisioner
or Google Cloud metadata.
77 Not able to apply required file access permissions to the generic-worker config
file so that task users can't read from or write to it.
Start the generic worker
Simply run:
generic-worker run --config <config file>
where <config file>
is the generic worker config file you created above.
Create a test job
Go to https://tools.taskcluster.net/task-creator/ and create a task to run on your generic worker.
Use this example as a template, but make sure to edit provisionerId
and workerType
values so that they match what you set in your config file.
Don't forget to submit the task by clicking the Create Task icon.
If all is well, your local generic worker should pick up the job you submit, run it, and report back status.
Modify dependencies
To add, remove, or update dependencies, use dep.
Do not manually edit anything under the vendor/
directory!
Run the generic worker test suite
For this you need to have the source files (you cannot run the tests from the binary package).
Then cd into the source directory, and run:
go test -v ./...
There are a few environment variables that you can set to influence the tests:
GW_SKIP_INTEGRATION_TESTS
Set to a non-empty string if you wish to skip all tests that submit tasks to a real taskcluster Queue service.
Otherwise you'll need to configure the taskcluster credentials for talking to the taskcluster Queue service:
TASKCLUSTER_CLIENT_ID
TASKCLUSTER_ACCESS_TOKEN
TASKCLUSTER_ROOT_URL
TASKCLUSTER_CERTIFICATE
(only if using temp credentials)
GW_SKIP_PERMA_CREDS_TESTS
Set to a non-empty string if you wish to skip tests that require permanent taskcluster credentials (e.g. if you only have temp credentials, and don't feel like creating a permanent client, or don't have the scopes to do so).
GW_SKIP_Z_DRIVE_TESTS
Only used in a single Windows-specific test - if you don't have a Z: drive setup on your computer, or you do but you also run tests from the Z: drive, you can set this env var to a non-empty string to skip this test.
GW_TESTS_RUN_AS_CURRENT_USER
This environment variable applies only to the multiuser engine.
If GW_TESTS_RUN_AS_CURRENT_USER
is not set, generic-worker will be tested
running in its normal operational mode, i.e. running tasks as task users
(config setting runTasksAsCurrentUser
will be false
).
If GW_TESTS_RUN_AS_CURRENT_USER
is a non-empty string, generic-worker will be
tested running tasks as the same user that runs go test
(config setting
runTasksAsCurrentUser
will be true
). This is how the CI multiuser workers
are configured, in order that the generic-worker under test has the required
privileges to function correctly. Set this environment variable to ensure that
the generic-worker under test will function correctly as a generic-worker CI
worker.
Making a new generic worker release
Run the release.sh
script like so:
$ ./release.sh 16.3.1
This will perform some checks, tag the repo, push the tag to github, which will then trigger travis-ci to run tests, and publish the new release.
Creating and updating worker types
Release notes
In v16.2.0 since v16.1.0
In v16.1.0 since v16.0.0
In v16.0.0 since v15.1.5
This major release includes support for multiuser on linux. There are no changes to the other platforms.
Installation instructions for multiuser engine on linux have been added.
In v15.1.5 since v15.1.4
In v15.1.4 since v15.1.3
- Bug 1567632 - generic-worker: circa 8 second startup cost in CI tasks on darwin multiuser
- Bug 1568471 - generic-worker: close those http response bodies!
- Bug 1568782 - generic-worker: error artifacts do not have a contentType
In v15.1.3 since v15.1.2
- Bug 1563220 - generic-worker: switch to using docker client CLI instead of importing native docker client library
- Bug 1567073 - generic-worker: consistently log executed commands and output / exit code from failed commands
In v15.1.2 since v15.1.1
In v15.1.1 since v15.1.0
- Bug 1382668 - generic-worker: document the env vars that the worker implicitly sets in the task commands it runs
- Bug 1562964 - generic-worker: log HTTP response body when getting a bad HTTP response code from the queue when uploading artifacts
- Bug 1564354 - generic-worker: use generic-worker sentry project by default
- Bug 1564361 - generic-worker: log system failures when checking if chain of trust key is readable
In v15.1.0 since v15.0.1
In v15.0.1 since v15.0.0
In v15.0.0 since v14.1.2
With this release of generic-worker, we now have three unique engines:
- simple
- multiuser
- docker
The generic-worker source code README.md
provides information about these
different engines, together with updated installation instructions.
This should mostly be a no-op change for Windows/Linux, but due to the large codebase refactoring and internal reorganisation of code, the major version number has been bumped to 15.
Changes
In v14.1.2 since v14.1.1
In v14.1.1 since v14.1.0
Please don't use release v14.1.1 on any platform due to bug 1552465 which will be fixed in v14.1.2
- Bug 1548829 - generic-worker: log header should mention provisionerId
- Bug 1551164 - [mounts] Not able to rename dir caches/*** as tasks/task_/: rename caches/*** tasks/task_/: file exists
In v14.1.0 since v14.0.2
Please don't use release 14.1.0 on macOS/linux due to bug 1551164 which will be fixed in v14.1.1.
-
Bug 1436195 - Add support for live-logs via websocktunnel (note that existing livelog support via stateless DNS still works)
To enable websocktunnel, include configuration options
wstAudience
andwstServerURL
to correspond to the websocktunnel server the worker should use. For the current production environment that would be:{ "wstAudience": "taskcluster-net", "wstServerURL": "https://websocktunnel.tasks.build" }
Omit the configuration items
subdomain
,livelogGETPort
,livelogCertificate
,livelogKey
, andlivelogSecret
. These options will be removed in a future release.Ensure that the worker's credentials have scope
auth:websocktunnel-token:<wstAudience>/<workerGroup>.<workerId>.*
.
In v14.0.2 since v14.0.1
- Bug 1533694 - generic-worker: create new task user before using current task user
- Bug 1543082 - generic-worker: sentry issue GENERIC-WORKER-1J - runtime error: invalid memory address or nil pointer dereference
In v14.0.1 since v14.0.0
Please do not use this release! It has a buggy implementation of bug 1533694 which was fixed in v14.0.2.
The following bug was backed out:
Support for websocktunnel will be added back in, in generic-worker release 14.1.0.
In v14.0.0 since v13.0.4
The backwardly-incompatible change in release 14.0.0 is that open pgp support has been removed from Chain Of Trust feature. The following configuration property is no longer supported, and is not allowed in the generic-worker config file:
openpgpSigningKeyLocation
Please note, you need to remove this config property from your config file, if it exists, in order to work with generic-worker 14 onwards.
- Bug 1436195 - Deploy websocktunnel on generic-worker
- Bug 1502335 - Support running a task inside a fixed docker image
- Bug 1534506 - remove cot gpg support
In v13.0.4 since v13.0.3
In v13.0.3 since v13.0.2
In v13.0.2 since v12.0.0
The backwardly incompatible change for version 13 is that AWS provisioner worker type definitions no longer
store generic-worker secrets. Instead, the secrets should be placed in a taskcluster secrets secret called
worker-type:aws-provisioner-v1/<workerType>
. The secret could look something like this:
config:
livelogSecret: <secret key>
files:
- content: >-
<base64>
description: SSL certificate for livelog
encoding: base64
format: file
path: 'C:\generic-worker\livelog.crt'
- content: >-
<base64>
description: SSL key for livelog
encoding: base64
format: file
path: 'C:\generic-worker\livelog.key'
The secrets
section of the AWS provisioner worker type definition should be an empty json object:
"secrets": {}
Now the userdata
section of the worker type definition should contain the remaining (non-secret) configuration, e.g.
"userData": {
"genericWorker": {
"config": {
"deploymentId": "axlvK6p9SNa-HJgPCVXKEA",
"ed25519SigningKeyLocation": "C:\\generic-worker\\generic-worker-ed25519-signing-key.key",
"idleTimeoutSecs": 60,
"livelogCertificate": "C:\\generic-worker\\livelog.crt",
"livelogExecutable": "C:\\generic-worker\\livelog.exe",
"livelogKey": "C:\\generic-worker\\livelog.key",
"openpgpSigningKeyLocation": "C:\\generic-worker\\generic-worker-gpg-signing-key.key",
"shutdownMachineOnInternalError": false,
"subdomain": "taskcluster-worker.net",
"taskclusterProxyExecutable": "C:\\generic-worker\\taskcluster-proxy.exe",
"workerTypeMetadata": {
"machine-setup": {
"maintainer": "pmoore@mozilla.com",
"script": "https://raw.githubusercontent.com/taskcluster/generic-worker/53f1d934688f9e9c6ba60db6cc9185e5c9e9c0ce/worker_types/nss-win2012r2/userdata"
}
}
}
}
},
- Bug 1375200 - [generic-worker] Remove support for reading secrets from AWS worker type definition
- Bug 1524630 -
generic-worker --help
should state that xxxBaseURL settings are optional overrides for the global rootURL setting - Bug 1524792 - Bring GCP integration up-to-date with recent changes
v13.0.1
Please do not use this release! It is broken.
v13.0.0
Please do not use this release! It is broken.
In v12.0.0 since v11.1.1
The backwardly incompatible change for version 12 is that you need to create both a openpgp signing key and an ed25519 signing key before running the worker.
generic-worker new-ed25519-keypair --file ED25519-PRIVATE-KEY-FILE
generic-worker new-openpgp-keypair --file OPENPGP-PRIVATE-KEY-FILE
Note, both are required.
The config property signingKeyLocation
has been renamed to openpgpSigningKeyLocation
and the new config property
ed25519SigningKeyLocation
is needed. For example, could changes could look like this:
- "signingKeyLocation": "C:\\generic-worker\\generic-worker-gpg-signing-key.key",
+ "openpgpSigningKeyLocation": "C:\\generic-worker\\generic-worker-gpg-signing-key.key",
+ "ed25519SigningKeyLocation": "C:\\generic-worker\\generic-worker-ed25519-signing-key.key",
In v11.1.1 since v11.1.0
In v11.1.0 since v11.0.1
- Bug 1495732 - Inline source for mounts
- Bug 1479415 - Executing non-executable file is task failure not worker panic
- Bug 1493688 - Avoid panic on Windows 10 Build 1803 if task directory not on default drive
- Bug 1506621 - Use new archiver library
- Bug 1516458 - Provide taskcluster-proxy with rootURL
In v11.0.1 since v11.0.0
In v11.0.0 since v10.11.3
The backwardly incompatible change for version 11 is that you need to specify --configure-for-aws
at installation time, if the workers will run in AWS. Previously, this was assumed to always be
the case.
generic-worker install service [--nssm NSSM-EXE]
[--service-name SERVICE-NAME]
[--config CONFIG-FILE]
[--configure-for-aws]
In v10.11.3 since v10.11.2
In v10.11.2 since v10.11.1
In v10.11.1 since v10.11.1alpha1
In v10.10.0 since v10.9.0
In v10.8.5 since v10.8.4
In v10.8.4 since v10.8.3
- Bug 1433854 - clean up after tasks on windows test workers
- Bug 1465479 - Don't block task abortion waiting for cmd.Wait() to complete
- Bug 1466803 - Could not copy from backing log to livelog: io: read/write on closed pipe
In v10.8.2 since v10.8.1
In v10.8.0 since v10.7.12
In v10.7.12 since v10.7.11
- Bug 1452095 - Upgrade mac taskcluster workers to generic-worker 10.8.4
- Bug 1458873 - Process termination when aborting task not always successful on Windows
In v10.7.11 since v10.7.10
In v10.7.10 since v10.7.9
In v10.7.6 since v10.7.5
In v10.7.3 since v10.7.2
In v10.6.1 since v10.6.0
In v10.6.0 since v10.5.1
- Bug 1358545 - [generic-worker] startup tests for CoT privkey protection
- Bug 1439517 - generic-worker: support taskcluster-proxy
- Bug 1441482 - generic-worker should free up disk space before claiming a task
In v10.5.1 since v10.5.0
In v10.5.0 since v10.5.0alpha4
- Bug 1172273 - generic-worker (windows): RDP into task users
- Bug 1429370 - Changing PR title causes new tasks to be triggered
In v10.4.1 since v10.4.0
- Bug 1424986 - No attempt in logs to reclaim task
- Bug 1425438 - Idle time inaccurate when (and after) computer sleeps/hibernates/is not being watched
In v10.4.0 since v10.3.1
In v10.3.0 since v10.2.3
In v10.2.3 since v10.2.2
- Bug 1397373 - Move superseding docs out of docker-worker
- Bug 1401007 - Ensure generic worker runs on Windows Server 2016
- Bug 1402152 - Use temporary credentials from claimWork, reclaimTask in reclaimTask, createArtifact, reportCompleted
In v10.2.2 since v10.2.1
In v10.2.1 since v10.2.0
In v10.2.0 since v10.1.8
In v10.1.8 since v10.1.7
In v10.1.7 since v10.1.6
In v10.1.6 since v10.1.5
In v10.1.5 since v10.1.4
In v10.1.4 since v10.1.3
In v10.0.5 since v10.0.4
In v8.5.0 since v8.4.1
In v8.3.0 since v8.2.0
In v8.2.0 since v8.1.1
In v8.1.0 since v8.0.1
In v8.0.1 since v8.0.0
In v7.2.13 since v7.2.12
In v7.2.6 since v7.2.5
In v7.2.2 since v7.2.1
In v7.1.1 since v7.1.0
In v7.1.0 since v7.0.3alpha1
In v7.0.3alpha1 since v7.0.2alpha1
In v6.1.0 since v6.1.0alpha1
In v6.0.0 since v5.4.0
- Bug 1306988 - GenericWorker task user groups should be configurable or task dependent
- Bug 1307383 - win2012r2 hung / didn't run correctly
In v5.4.0 since v5.3.1
- Bug 1182451 - preloaded writable directory caches / empty writable directory caches / preloaded readonly directory mounts / preloaded readonly files
- Bug 1305048 - Add node/npm to the generic "win2012r2" worker
In v5.3.0 since v5.2.0
In v5.1.0 since v5.0.3
In v4.0.0alpha1 since v3.0.0alpha1
- Bug 1181524 - generic-worker: Reject tasks w. malformed-payload if artifact.expires x3c task.deadline
- Bug 1191524 - [Browser] Suggestions in youtube search bar overlap with icon.
- Bug 1285197 - package github.com/taskcluster/taskcluster-client-go: no buildable Go source files in x3cGOPATHx3e/src/github.com/taskcluster/taskcluster-client-go
In v3.0.0alpha1 since v2.1.0
In v2.0.0alpha44 since v2.0.0alpha43
Further information
Please see:
- Taskcluster Documentation
- Generic Worker presentations (focus on Windows platform)
- Taskcluster Web Tools
- Generic Worker Open Bugs
Useful information on win32 APIs:
Source Files ¶
Directories ¶
Path | Synopsis |
---|---|
Expose serves as an abstract mechanism for exposing local services to the world.
|
Expose serves as an abstract mechanism for exposing local services to the world. |
package gdm3 provides functions for interfacing with Gnome Desktop Manager 3 on linux
|
package gdm3 provides functions for interfacing with Gnome Desktop Manager 3 on linux |
Package host provides facilities for interfacing with the host operating system, logging activities performed.
|
Package host provides facilities for interfacing with the host operating system, logging activities performed. |
Package kc provides functions for encoding/decoding darwin user passwords, for use in the /etc/kcpassword file.
|
Package kc provides functions for encoding/decoding darwin user passwords, for use in the /etc/kcpassword file. |
Package livelog provides a simple wrapper around the livelog executable.
|
Package livelog provides a simple wrapper around the livelog executable. |
Package process provides a mechanism for running processes under a different user account to the current process
|
Package process provides a mechanism for running processes under a different user account to the current process |
Package tcproxy provides a simple wrapper around the tcproxy executable.
|
Package tcproxy provides a simple wrapper around the tcproxy executable. |
Package testutil contains utilities that are used by tests from _multiple_ packages.
|
Package testutil contains utilities that are used by tests from _multiple_ packages. |
worker_types
|
|