| Index: tools/testrunner/server/main.py
|
| diff --git a/tools/testrunner/server/main.py b/tools/testrunner/server/main.py
|
| new file mode 100644
|
| index 0000000000000000000000000000000000000000..9c7eafb48d2482520184e0c08f32caceb5c77449
|
| --- /dev/null
|
| +++ b/tools/testrunner/server/main.py
|
| @@ -0,0 +1,245 @@
|
| +# Copyright 2012 the V8 project authors. All rights reserved.
|
| +# Redistribution and use in source and binary forms, with or without
|
| +# modification, are permitted provided that the following conditions are
|
| +# met:
|
| +#
|
| +# * Redistributions of source code must retain the above copyright
|
| +# notice, this list of conditions and the following disclaimer.
|
| +# * Redistributions in binary form must reproduce the above
|
| +# copyright notice, this list of conditions and the following
|
| +# disclaimer in the documentation and/or other materials provided
|
| +# with the distribution.
|
| +# * Neither the name of Google Inc. nor the names of its
|
| +# contributors may be used to endorse or promote products derived
|
| +# from this software without specific prior written permission.
|
| +#
|
| +# THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
|
| +# "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
|
| +# LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
|
| +# A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
|
| +# OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
| +# SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
|
| +# LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
|
| +# DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
|
| +# THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
|
| +# (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
|
| +# OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
| +
|
| +
|
| +import multiprocessing
|
| +import os
|
| +import shutil
|
| +import subprocess
|
| +import threading
|
| +import time
|
| +
|
| +from . import daemon
|
| +from . import discovery
|
| +from . import local_handler
|
| +from . import signatures
|
| +from . import status_handler
|
| +from . import work_handler
|
| +from ..network import perfdata
|
| +
|
| +
|
| +class Server(daemon.Daemon):
|
| +
|
| + def __init__(self, pidfile, root, stdin="/dev/null",
|
| + stdout="/dev/null", stderr="/dev/null"):
|
| + super(Server, self).__init__(pidfile, stdin, stdout, stderr)
|
| + self.root = root
|
| + self.local_handler = None
|
| + self.local_handler_thread = None
|
| + self.work_handler = None
|
| + self.work_handler_thread = None
|
| + self.status_handler = None
|
| + self.status_handler_thread = None
|
| + self.presence_daemon = None
|
| + self.presence_daemon_thread = None
|
| + self.peers = []
|
| + self.jobs = multiprocessing.cpu_count()
|
| + self.peer_list_lock = threading.Lock()
|
| + self.perf_data_lock = None
|
| + self.presence_daemon_lock = None
|
| + self.datadir = os.path.join(self.root, "data")
|
| + pubkey_fingerprint_filename = os.path.join(self.datadir, "mypubkey")
|
| + with open(pubkey_fingerprint_filename) as f:
|
| + self.pubkey_fingerprint = f.read().strip()
|
| + self.relative_perf_filename = os.path.join(self.datadir, "myperf")
|
| + if os.path.exists(self.relative_perf_filename):
|
| + with open(self.relative_perf_filename) as f:
|
| + try:
|
| + self.relative_perf = float(f.read())
|
| + except:
|
| + self.relative_perf = 1.0
|
| + else:
|
| + self.relative_perf = 1.0
|
| +
|
| + def run(self):
|
| + os.nice(20)
|
| + self.ip = discovery.GetOwnIP()
|
| + self.perf_data_manager = perfdata.PerfDataManager(self.datadir)
|
| + self.perf_data_lock = threading.Lock()
|
| +
|
| + self.local_handler = local_handler.LocalSocketServer(self)
|
| + self.local_handler_thread = threading.Thread(
|
| + target=self.local_handler.serve_forever)
|
| + self.local_handler_thread.start()
|
| +
|
| + self.work_handler = work_handler.WorkSocketServer(self)
|
| + self.work_handler_thread = threading.Thread(
|
| + target=self.work_handler.serve_forever)
|
| + self.work_handler_thread.start()
|
| +
|
| + self.status_handler = status_handler.StatusSocketServer(self)
|
| + self.status_handler_thread = threading.Thread(
|
| + target=self.status_handler.serve_forever)
|
| + self.status_handler_thread.start()
|
| +
|
| + self.presence_daemon = discovery.PresenceDaemon(self)
|
| + self.presence_daemon_thread = threading.Thread(
|
| + target=self.presence_daemon.serve_forever)
|
| + self.presence_daemon_thread.start()
|
| +
|
| + self.presence_daemon.FindPeers()
|
| + time.sleep(0.5) # Give those peers some time to reply.
|
| +
|
| + with self.peer_list_lock:
|
| + for p in self.peers:
|
| + if p.address == self.ip: continue
|
| + status_handler.RequestTrustedPubkeys(p, self)
|
| +
|
| + while True:
|
| + try:
|
| + self.PeriodicTasks()
|
| + time.sleep(60)
|
| + except Exception, e:
|
| + print("MAIN LOOP EXCEPTION: %s" % e)
|
| + self.Shutdown()
|
| + break
|
| + except KeyboardInterrupt:
|
| + self.Shutdown()
|
| + break
|
| +
|
| + def Shutdown(self):
|
| + with open(self.relative_perf_filename, "w") as f:
|
| + f.write("%s" % self.relative_perf)
|
| + self.presence_daemon.shutdown()
|
| + self.presence_daemon.server_close()
|
| + self.local_handler.shutdown()
|
| + self.local_handler.server_close()
|
| + self.work_handler.shutdown()
|
| + self.work_handler.server_close()
|
| + self.status_handler.shutdown()
|
| + self.status_handler.server_close()
|
| +
|
| + def PeriodicTasks(self):
|
| + # If we know peers we don't trust, see if someone else trusts them.
|
| + with self.peer_list_lock:
|
| + for p in self.peers:
|
| + if p.trusted: continue
|
| + if self.IsTrusted(p.pubkey):
|
| + p.trusted = True
|
| + status_handler.ITrustYouNow(p)
|
| + continue
|
| + for p2 in self.peers:
|
| + if not p2.trusted: continue
|
| + status_handler.TryTransitiveTrust(p2, p.pubkey, self)
|
| + # TODO: Ping for more peers waiting to be discovered.
|
| + # TODO: Update the checkout (if currently idle).
|
| +
|
| + def AddPeer(self, peer):
|
| + with self.peer_list_lock:
|
| + for p in self.peers:
|
| + if p.address == peer.address:
|
| + return
|
| + self.peers.append(peer)
|
| + if peer.trusted:
|
| + status_handler.ITrustYouNow(peer)
|
| +
|
| + def DeletePeer(self, peer_address):
|
| + with self.peer_list_lock:
|
| + for i in xrange(len(self.peers)):
|
| + if self.peers[i].address == peer_address:
|
| + del self.peers[i]
|
| + return
|
| +
|
| + def MarkPeerAsTrusting(self, peer_address):
|
| + with self.peer_list_lock:
|
| + for p in self.peers:
|
| + if p.address == peer_address:
|
| + p.trusting_me = True
|
| + break
|
| +
|
| + def UpdatePeerPerformance(self, peer_address, performance):
|
| + with self.peer_list_lock:
|
| + for p in self.peers:
|
| + if p.address == peer_address:
|
| + p.relative_performance = performance
|
| +
|
| + def CopyToTrusted(self, pubkey_filename):
|
| + with open(pubkey_filename, "r") as f:
|
| + lines = f.readlines()
|
| + fingerprint = lines[-1].strip()
|
| + target_filename = self._PubkeyFilename(fingerprint)
|
| + shutil.copy(pubkey_filename, target_filename)
|
| + with self.peer_list_lock:
|
| + for peer in self.peers:
|
| + if peer.address == self.ip: continue
|
| + if peer.pubkey == fingerprint:
|
| + status_handler.ITrustYouNow(peer)
|
| + else:
|
| + result = self.SignTrusted(fingerprint)
|
| + status_handler.NotifyNewTrusted(peer, result)
|
| + return fingerprint
|
| +
|
| + def _PubkeyFilename(self, pubkey_fingerprint):
|
| + return os.path.join(self.root, "trusted", "%s.pem" % pubkey_fingerprint)
|
| +
|
| + def IsTrusted(self, pubkey_fingerprint):
|
| + return os.path.exists(self._PubkeyFilename(pubkey_fingerprint))
|
| +
|
| + def ListTrusted(self):
|
| + path = os.path.join(self.root, "trusted")
|
| + if not os.path.exists(path): return []
|
| + return [ f[:-4] for f in os.listdir(path) if f.endswith(".pem") ]
|
| +
|
| + def SignTrusted(self, pubkey_fingerprint):
|
| + if not self.IsTrusted(pubkey_fingerprint):
|
| + return []
|
| + filename = self._PubkeyFilename(pubkey_fingerprint)
|
| + result = signatures.ReadFileAndSignature(filename) # Format: [key, sig].
|
| + return [pubkey_fingerprint, result[0], result[1], self.pubkey_fingerprint]
|
| +
|
| + def AcceptNewTrusted(self, data):
|
| + # The format of |data| matches the return value of |SignTrusted()|.
|
| + if not data: return
|
| + fingerprint = data[0]
|
| + pubkey = data[1]
|
| + signature = data[2]
|
| + signer = data[3]
|
| + if not self.IsTrusted(signer):
|
| + return
|
| + if self.IsTrusted(fingerprint):
|
| + return # Already trust this guy.
|
| + filename = self._PubkeyFilename(fingerprint)
|
| + signer_pubkeyfile = self._PubkeyFilename(signer)
|
| + if not signatures.VerifySignature(filename, pubkey, signature,
|
| + signer_pubkeyfile):
|
| + return
|
| + return # Nothing more to do.
|
| +
|
| + def AddPerfData(self, test_key, duration, arch, mode):
|
| + data_store = self.perf_data_manager.GetStore(arch, mode)
|
| + data_store.RawUpdatePerfData(str(test_key), duration)
|
| +
|
| + def CompareOwnPerf(self, test, arch, mode):
|
| + data_store = self.perf_data_manager.GetStore(arch, mode)
|
| + observed = data_store.FetchPerfData(test)
|
| + if not observed: return
|
| + own_perf_estimate = observed / test.duration
|
| + with self.perf_data_lock:
|
| + kLearnRateLimiter = 9999
|
| + self.relative_perf *= kLearnRateLimiter
|
| + self.relative_perf += own_perf_estimate
|
| + self.relative_perf /= (kLearnRateLimiter + 1)
|
|
|