mirror of
https://github.com/tailscale/tailscale.git
synced 2025-12-29 23:33:44 +00:00
We got a flake in https://github.com/tailscale/tailscale/actions/runs/19867229792/job/56933249360 but it's not obvious to me where it failed. Make it more robust and print out more useful error messages for next time. Updates tailscale/corp#10808 Change-Id: I9ca08ea1103b9ad968c9cc0c42a493981ea62435 Signed-off-by: Tom Proctor <tomhjp@users.noreply.github.com>
79 lines
2.5 KiB
Bash
Executable File
79 lines
2.5 KiB
Bash
Executable File
#!/usr/bin/env bash
|
|
#
|
|
# This script sets up cigocacher, but should never fail the build if unsuccessful.
|
|
# It expects to run on a GitHub-hosted runner, and connects to cigocached over a
|
|
# private Azure network that is configured at the runner group level in GitHub.
|
|
#
|
|
# Usage: ./action.sh
|
|
# Inputs:
|
|
# URL: The cigocached server URL.
|
|
# Outputs:
|
|
# success: Whether cigocacher was set up successfully.
|
|
|
|
set -euo pipefail
|
|
|
|
if [ -z "${GITHUB_ACTIONS:-}" ]; then
|
|
echo "This script is intended to run within GitHub Actions"
|
|
exit 1
|
|
fi
|
|
|
|
if [ -z "${URL:-}" ]; then
|
|
echo "No cigocached URL is set, skipping cigocacher setup"
|
|
exit 0
|
|
fi
|
|
|
|
curl_and_parse() {
|
|
local jq_filter="$1"
|
|
local step="$2"
|
|
shift 2
|
|
|
|
local response
|
|
local curl_exit
|
|
response="$(curl -sSL "$@" 2>&1)" || curl_exit="$?"
|
|
if [ "${curl_exit:-0}" -ne "0" ]; then
|
|
echo "${step}: ${response}" >&2
|
|
return 1
|
|
fi
|
|
|
|
local parsed
|
|
local jq_exit
|
|
parsed=$(echo "${response}" | jq -e -r "${jq_filter}" 2>&1) || jq_exit=$?
|
|
if [ "${jq_exit:-0}" -ne "0" ]; then
|
|
echo "${step}: Failed to parse JSON response:" >&2
|
|
echo "${response}" >&2
|
|
return 1
|
|
fi
|
|
|
|
echo "${parsed}"
|
|
return 0
|
|
}
|
|
|
|
JWT="$(curl_and_parse ".value" "Fetching GitHub identity JWT" \
|
|
-H "Authorization: Bearer ${ACTIONS_ID_TOKEN_REQUEST_TOKEN}" \
|
|
"${ACTIONS_ID_TOKEN_REQUEST_URL}&audience=gocached")" || exit 0
|
|
|
|
# cigocached serves a TLS cert with an FQDN, but DNS is based on VM name.
|
|
HOST_AND_PORT="${URL#http*://}"
|
|
FIRST_LABEL="${HOST_AND_PORT/.*/}"
|
|
# Save CONNECT_TO for later steps to use.
|
|
echo "CONNECT_TO=${HOST_AND_PORT}:${FIRST_LABEL}:" >> "${GITHUB_ENV}"
|
|
BODY="$(jq -n --arg jwt "$JWT" '{"jwt": $jwt}')"
|
|
CIGOCACHER_TOKEN="$(curl_and_parse ".access_token" "Exchanging token with cigocached" \
|
|
--connect-to "${HOST_AND_PORT}:${FIRST_LABEL}:" \
|
|
-H "Content-Type: application/json" \
|
|
"$URL/auth/exchange-token" \
|
|
-d "$BODY")" || exit 0
|
|
|
|
# Wait until we successfully auth before building cigocacher to ensure we know
|
|
# it's worth building.
|
|
# TODO(tomhjp): bake cigocacher into runner image and use it for auth.
|
|
echo "Fetched cigocacher token successfully"
|
|
echo "::add-mask::${CIGOCACHER_TOKEN}"
|
|
echo "CIGOCACHER_TOKEN=${CIGOCACHER_TOKEN}" >> "${GITHUB_ENV}"
|
|
|
|
BIN_PATH="${RUNNER_TEMP:-/tmp}/cigocacher$(go env GOEXE)"
|
|
|
|
go build -o "${BIN_PATH}" ./cmd/cigocacher
|
|
echo "GOCACHEPROG=${BIN_PATH} --cache-dir ${CACHE_DIR} --cigocached-url ${URL} --token ${CIGOCACHER_TOKEN}" >> "${GITHUB_ENV}"
|
|
echo "success=true" >> "${GITHUB_OUTPUT}"
|