Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(59)

Side by Side Diff: tools/testrunner/server/main.py

Issue 11035053: Rollback trunk to bleeding_edge revision 12525 (Closed) Base URL: https://v8.googlecode.com/svn/trunk
Patch Set: Created 8 years, 2 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
« no previous file with comments | « tools/testrunner/server/local_handler.py ('k') | tools/testrunner/server/presence_handler.py » ('j') | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
(Empty)
1 # Copyright 2012 the V8 project authors. All rights reserved.
2 # Redistribution and use in source and binary forms, with or without
3 # modification, are permitted provided that the following conditions are
4 # met:
5 #
6 # * Redistributions of source code must retain the above copyright
7 # notice, this list of conditions and the following disclaimer.
8 # * Redistributions in binary form must reproduce the above
9 # copyright notice, this list of conditions and the following
10 # disclaimer in the documentation and/or other materials provided
11 # with the distribution.
12 # * Neither the name of Google Inc. nor the names of its
13 # contributors may be used to endorse or promote products derived
14 # from this software without specific prior written permission.
15 #
16 # THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
17 # "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
18 # LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
19 # A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
20 # OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
21 # SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
22 # LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
23 # DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
24 # THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
25 # (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
26 # OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
27
28
29 import multiprocessing
30 import os
31 import shutil
32 import subprocess
33 import threading
34 import time
35
36 from . import daemon
37 from . import local_handler
38 from . import presence_handler
39 from . import signatures
40 from . import status_handler
41 from . import work_handler
42 from ..network import perfdata
43
44
45 class Server(daemon.Daemon):
46
47 def __init__(self, pidfile, root, stdin="/dev/null",
48 stdout="/dev/null", stderr="/dev/null"):
49 super(Server, self).__init__(pidfile, stdin, stdout, stderr)
50 self.root = root
51 self.local_handler = None
52 self.local_handler_thread = None
53 self.work_handler = None
54 self.work_handler_thread = None
55 self.status_handler = None
56 self.status_handler_thread = None
57 self.presence_daemon = None
58 self.presence_daemon_thread = None
59 self.peers = []
60 self.jobs = multiprocessing.cpu_count()
61 self.peer_list_lock = threading.Lock()
62 self.perf_data_lock = None
63 self.presence_daemon_lock = None
64 self.datadir = os.path.join(self.root, "data")
65 pubkey_fingerprint_filename = os.path.join(self.datadir, "mypubkey")
66 with open(pubkey_fingerprint_filename) as f:
67 self.pubkey_fingerprint = f.read().strip()
68 self.relative_perf_filename = os.path.join(self.datadir, "myperf")
69 if os.path.exists(self.relative_perf_filename):
70 with open(self.relative_perf_filename) as f:
71 try:
72 self.relative_perf = float(f.read())
73 except:
74 self.relative_perf = 1.0
75 else:
76 self.relative_perf = 1.0
77
78 def run(self):
79 os.nice(20)
80 self.ip = presence_handler.GetOwnIP()
81 self.perf_data_manager = perfdata.PerfDataManager(self.datadir)
82 self.perf_data_lock = threading.Lock()
83
84 self.local_handler = local_handler.LocalSocketServer(self)
85 self.local_handler_thread = threading.Thread(
86 target=self.local_handler.serve_forever)
87 self.local_handler_thread.start()
88
89 self.work_handler = work_handler.WorkSocketServer(self)
90 self.work_handler_thread = threading.Thread(
91 target=self.work_handler.serve_forever)
92 self.work_handler_thread.start()
93
94 self.status_handler = status_handler.StatusSocketServer(self)
95 self.status_handler_thread = threading.Thread(
96 target=self.status_handler.serve_forever)
97 self.status_handler_thread.start()
98
99 self.presence_daemon = presence_handler.PresenceDaemon(self)
100 self.presence_daemon_thread = threading.Thread(
101 target=self.presence_daemon.serve_forever)
102 self.presence_daemon_thread.start()
103
104 self.presence_daemon.FindPeers()
105 time.sleep(0.5) # Give those peers some time to reply.
106
107 with self.peer_list_lock:
108 for p in self.peers:
109 if p.address == self.ip: continue
110 status_handler.RequestTrustedPubkeys(p, self)
111
112 while True:
113 try:
114 self.PeriodicTasks()
115 time.sleep(60)
116 except Exception, e:
117 print("MAIN LOOP EXCEPTION: %s" % e)
118 self.Shutdown()
119 break
120 except KeyboardInterrupt:
121 self.Shutdown()
122 break
123
124 def Shutdown(self):
125 with open(self.relative_perf_filename, "w") as f:
126 f.write("%s" % self.relative_perf)
127 self.presence_daemon.shutdown()
128 self.presence_daemon.server_close()
129 self.local_handler.shutdown()
130 self.local_handler.server_close()
131 self.work_handler.shutdown()
132 self.work_handler.server_close()
133 self.status_handler.shutdown()
134 self.status_handler.server_close()
135
136 def PeriodicTasks(self):
137 # If we know peers we don't trust, see if someone else trusts them.
138 with self.peer_list_lock:
139 for p in self.peers:
140 if p.trusted: continue
141 if self.IsTrusted(p.pubkey):
142 p.trusted = True
143 status_handler.ITrustYouNow(p)
144 continue
145 for p2 in self.peers:
146 if not p2.trusted: continue
147 status_handler.TryTransitiveTrust(p2, p.pubkey, self)
148 # TODO: Ping for more peers waiting to be discovered.
149 # TODO: Update the checkout (if currently idle).
150
151 def AddPeer(self, peer):
152 with self.peer_list_lock:
153 for p in self.peers:
154 if p.address == peer.address:
155 return
156 self.peers.append(peer)
157 if peer.trusted:
158 status_handler.ITrustYouNow(peer)
159
160 def DeletePeer(self, peer_address):
161 with self.peer_list_lock:
162 for i in xrange(len(self.peers)):
163 if self.peers[i].address == peer_address:
164 del self.peers[i]
165 return
166
167 def MarkPeerAsTrusting(self, peer_address):
168 with self.peer_list_lock:
169 for p in self.peers:
170 if p.address == peer_address:
171 p.trusting_me = True
172 break
173
174 def UpdatePeerPerformance(self, peer_address, performance):
175 with self.peer_list_lock:
176 for p in self.peers:
177 if p.address == peer_address:
178 p.relative_performance = performance
179
180 def CopyToTrusted(self, pubkey_filename):
181 with open(pubkey_filename, "r") as f:
182 lines = f.readlines()
183 fingerprint = lines[-1].strip()
184 target_filename = self._PubkeyFilename(fingerprint)
185 shutil.copy(pubkey_filename, target_filename)
186 with self.peer_list_lock:
187 for peer in self.peers:
188 if peer.address == self.ip: continue
189 if peer.pubkey == fingerprint:
190 status_handler.ITrustYouNow(peer)
191 else:
192 result = self.SignTrusted(fingerprint)
193 status_handler.NotifyNewTrusted(peer, result)
194 return fingerprint
195
196 def _PubkeyFilename(self, pubkey_fingerprint):
197 return os.path.join(self.root, "trusted", "%s.pem" % pubkey_fingerprint)
198
199 def IsTrusted(self, pubkey_fingerprint):
200 return os.path.exists(self._PubkeyFilename(pubkey_fingerprint))
201
202 def ListTrusted(self):
203 path = os.path.join(self.root, "trusted")
204 if not os.path.exists(path): return []
205 return [ f[:-4] for f in os.listdir(path) if f.endswith(".pem") ]
206
207 def SignTrusted(self, pubkey_fingerprint):
208 if not self.IsTrusted(pubkey_fingerprint):
209 return []
210 filename = self._PubkeyFilename(pubkey_fingerprint)
211 result = signatures.ReadFileAndSignature(filename) # Format: [key, sig].
212 return [pubkey_fingerprint, result[0], result[1], self.pubkey_fingerprint]
213
214 def AcceptNewTrusted(self, data):
215 # The format of |data| matches the return value of |SignTrusted()|.
216 if not data: return
217 fingerprint = data[0]
218 pubkey = data[1]
219 signature = data[2]
220 signer = data[3]
221 if not self.IsTrusted(signer):
222 return
223 if self.IsTrusted(fingerprint):
224 return # Already trust this guy.
225 filename = self._PubkeyFilename(fingerprint)
226 signer_pubkeyfile = self._PubkeyFilename(signer)
227 if not signatures.VerifySignature(filename, pubkey, signature,
228 signer_pubkeyfile):
229 return
230 return # Nothing more to do.
231
232 def AddPerfData(self, test_key, duration, arch, mode):
233 data_store = self.perf_data_manager.GetStore(arch, mode)
234 data_store.RawUpdatePerfData(str(test_key), duration)
235
236 def CompareOwnPerf(self, test, arch, mode):
237 data_store = self.perf_data_manager.GetStore(arch, mode)
238 observed = data_store.FetchPerfData(test)
239 if not observed: return
240 own_perf_estimate = observed / test.duration
241 with self.perf_data_lock:
242 kLearnRateLimiter = 9999
243 self.relative_perf *= kLearnRateLimiter
244 self.relative_perf += own_perf_estimate
245 self.relative_perf /= (kLearnRateLimiter + 1)
OLDNEW
« no previous file with comments | « tools/testrunner/server/local_handler.py ('k') | tools/testrunner/server/presence_handler.py » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698