21891: Update test to accept singularity 4.
[arvados.git] / sdk / cwl / arvados_cwl / arvcontainer.py
1 # Copyright (C) The Arvados Authors. All rights reserved.
2 #
3 # SPDX-License-Identifier: Apache-2.0
4
5 import logging
6 import json
7 import os
8 import urllib.request, urllib.parse, urllib.error
9 import time
10 import datetime
11 import ciso8601
12 import uuid
13 import math
14 import re
15
16 import arvados_cwl.util
17 import ruamel.yaml
18
19 from cwltool.errors import WorkflowException
20 from cwltool.process import UnsupportedRequirement, shortname
21 from cwltool.utils import aslist, adjustFileObjs, adjustDirObjs, visit_class
22 from cwltool.job import JobBase
23
24 import arvados.collection
25
26 import crunchstat_summary.summarizer
27 import crunchstat_summary.reader
28
29 from .arvdocker import arv_docker_get_image
30 from . import done
31 from .runner import Runner, arvados_jobs_image, packed_workflow, trim_anonymous_location, remove_redundant_fields, make_builder
32 from .fsaccess import CollectionFetcher
33 from .pathmapper import NoFollowPathMapper, trim_listing
34 from .perf import Perf
35 from ._version import __version__
36
37 logger = logging.getLogger('arvados.cwl-runner')
38 metrics = logging.getLogger('arvados.cwl-runner.metrics')
39
40 def cleanup_name_for_collection(name):
41     return name.replace("/", " ")
42
43 class ArvadosContainer(JobBase):
44     """Submit and manage a Crunch container request for executing a CWL CommandLineTool."""
45
46     def __init__(self, runner, job_runtime, globpatterns,
47                  builder,   # type: Builder
48                  joborder,  # type: Dict[Text, Union[Dict[Text, Any], List, Text]]
49                  make_path_mapper,  # type: Callable[..., PathMapper]
50                  requirements,      # type: List[Dict[Text, Text]]
51                  hints,     # type: List[Dict[Text, Text]]
52                  name       # type: Text
53     ):
54         super(ArvadosContainer, self).__init__(builder, joborder, make_path_mapper, requirements, hints, name)
55         self.arvrunner = runner
56         self.job_runtime = job_runtime
57         self.running = False
58         self.uuid = None
59         self.attempt_count = 0
60         self.globpatterns = globpatterns
61
62     def update_pipeline_component(self, r):
63         pass
64
65     def _required_env(self):
66         env = {}
67         env["HOME"] = self.outdir
68         env["TMPDIR"] = self.tmpdir
69         return env
70
71     def run(self, toplevelRuntimeContext):
72         # ArvadosCommandTool subclasses from cwltool.CommandLineTool,
73         # which calls makeJobRunner() to get a new ArvadosContainer
74         # object.  The fields that define execution such as
75         # command_line, environment, etc are set on the
76         # ArvadosContainer object by CommandLineTool.job() before
77         # run() is called.
78
79         runtimeContext = self.job_runtime
80
81         if runtimeContext.submit_request_uuid:
82             container_request = self.arvrunner.api.container_requests().get(
83                 uuid=runtimeContext.submit_request_uuid
84             ).execute(num_retries=self.arvrunner.num_retries)
85         else:
86             container_request = {}
87
88         container_request["command"] = self.command_line
89         container_request["name"] = self.name
90         container_request["output_path"] = self.outdir
91         container_request["cwd"] = self.outdir
92         container_request["priority"] = runtimeContext.priority
93         container_request["state"] = "Uncommitted"
94         container_request.setdefault("properties", {})
95
96         container_request["properties"]["cwl_input"] = self.joborder
97
98         runtime_constraints = {}
99
100         if runtimeContext.project_uuid:
101             container_request["owner_uuid"] = runtimeContext.project_uuid
102
103         if self.arvrunner.secret_store.has_secret(self.command_line):
104             raise WorkflowException("Secret material leaked on command line, only file literals may contain secrets")
105
106         if self.arvrunner.secret_store.has_secret(self.environment):
107             raise WorkflowException("Secret material leaked in environment, only file literals may contain secrets")
108
109         resources = self.builder.resources
110         if resources is not None:
111             runtime_constraints["vcpus"] = math.ceil(resources.get("cores", 1))
112             runtime_constraints["ram"] = math.ceil(resources.get("ram") * 2**20)
113
114         mounts = {
115             self.outdir: {
116                 "kind": "tmp",
117                 "capacity": math.ceil(resources.get("outdirSize", 0) * 2**20)
118             },
119             self.tmpdir: {
120                 "kind": "tmp",
121                 "capacity": math.ceil(resources.get("tmpdirSize", 0) * 2**20)
122             }
123         }
124         secret_mounts = {}
125         scheduling_parameters = {}
126
127         rf = [self.pathmapper.mapper(f) for f in self.pathmapper.referenced_files]
128         rf.sort(key=lambda k: k.resolved)
129         prevdir = None
130         for resolved, target, tp, stg in rf:
131             if not stg:
132                 continue
133             if prevdir and target.startswith(prevdir):
134                 continue
135             if tp == "Directory":
136                 targetdir = target
137             else:
138                 targetdir = os.path.dirname(target)
139             sp = resolved.split("/", 1)
140             pdh = sp[0][5:]   # remove "keep:"
141             mounts[targetdir] = {
142                 "kind": "collection",
143                 "portable_data_hash": pdh
144             }
145             if pdh in self.pathmapper.pdh_to_uuid:
146                 mounts[targetdir]["uuid"] = self.pathmapper.pdh_to_uuid[pdh]
147             if len(sp) == 2:
148                 if tp == "Directory":
149                     path = sp[1]
150                 else:
151                     path = os.path.dirname(sp[1])
152                 if path and path != "/":
153                     mounts[targetdir]["path"] = path
154             prevdir = targetdir + "/"
155
156         intermediate_collection_info = arvados_cwl.util.get_intermediate_collection_info(self.name, runtimeContext.current_container, runtimeContext.intermediate_output_ttl)
157
158         with Perf(metrics, "generatefiles %s" % self.name):
159             if self.generatefiles["listing"]:
160                 vwd = arvados.collection.Collection(api_client=self.arvrunner.api,
161                                                     keep_client=self.arvrunner.keep_client,
162                                                     num_retries=self.arvrunner.num_retries)
163                 generatemapper = NoFollowPathMapper(self.generatefiles["listing"], "", "",
164                                                     separateDirs=False)
165
166                 sorteditems = sorted(generatemapper.items(), key=lambda n: n[1].target)
167
168                 logger.debug("generatemapper is %s", sorteditems)
169
170                 with Perf(metrics, "createfiles %s" % self.name):
171                     for f, p in sorteditems:
172                         if not p.target:
173                             continue
174
175                         if p.target.startswith("/"):
176                             dst = p.target[len(self.outdir)+1:] if p.target.startswith(self.outdir+"/") else p.target[1:]
177                         else:
178                             dst = p.target
179
180                         if p.type in ("File", "Directory", "WritableFile", "WritableDirectory"):
181                             if p.resolved.startswith("_:"):
182                                 vwd.mkdirs(dst)
183                             else:
184                                 source, path = self.arvrunner.fs_access.get_collection(p.resolved)
185                                 vwd.copy(path or ".", dst, source_collection=source)
186                         elif p.type == "CreateFile":
187                             if self.arvrunner.secret_store.has_secret(p.resolved):
188                                 mountpoint = p.target if p.target.startswith("/") else os.path.join(self.outdir, p.target)
189                                 secret_mounts[mountpoint] = {
190                                     "kind": "text",
191                                     "content": self.arvrunner.secret_store.retrieve(p.resolved)
192                                 }
193                             else:
194                                 with vwd.open(dst, "w") as n:
195                                     n.write(p.resolved)
196
197                 def keepemptydirs(p):
198                     if isinstance(p, arvados.collection.RichCollectionBase):
199                         if len(p) == 0:
200                             p.open(".keep", "w").close()
201                         else:
202                             for c in p:
203                                 keepemptydirs(p[c])
204
205                 keepemptydirs(vwd)
206
207                 if not runtimeContext.current_container:
208                     runtimeContext.current_container = arvados_cwl.util.get_current_container(self.arvrunner.api, self.arvrunner.num_retries, logger)
209                 vwd.save_new(name=intermediate_collection_info["name"],
210                              owner_uuid=runtimeContext.project_uuid,
211                              ensure_unique_name=True,
212                              trash_at=intermediate_collection_info["trash_at"],
213                              properties=intermediate_collection_info["properties"])
214
215                 prev = None
216                 for f, p in sorteditems:
217                     if (not p.target or self.arvrunner.secret_store.has_secret(p.resolved) or
218                         (prev is not None and p.target.startswith(prev))):
219                         continue
220                     if p.target.startswith("/"):
221                         dst = p.target[len(self.outdir)+1:] if p.target.startswith(self.outdir+"/") else p.target[1:]
222                     else:
223                         dst = p.target
224                     mountpoint = p.target if p.target.startswith("/") else os.path.join(self.outdir, p.target)
225                     mounts[mountpoint] = {"kind": "collection",
226                                           "portable_data_hash": vwd.portable_data_hash(),
227                                           "path": dst}
228                     if p.type.startswith("Writable"):
229                         mounts[mountpoint]["writable"] = True
230                     prev = p.target + "/"
231
232         container_request["environment"] = {"TMPDIR": self.tmpdir, "HOME": self.outdir}
233         if self.environment:
234             container_request["environment"].update(self.environment)
235
236         if self.stdin:
237             sp = self.stdin[6:].split("/", 1)
238             mounts["stdin"] = {"kind": "collection",
239                                 "portable_data_hash": sp[0],
240                                 "path": sp[1]}
241
242         if self.stderr:
243             mounts["stderr"] = {"kind": "file",
244                                 "path": "%s/%s" % (self.outdir, self.stderr)}
245
246         if self.stdout:
247             mounts["stdout"] = {"kind": "file",
248                                 "path": "%s/%s" % (self.outdir, self.stdout)}
249
250         (docker_req, docker_is_req) = self.get_requirement("DockerRequirement")
251
252         container_request["container_image"] = arv_docker_get_image(self.arvrunner.api,
253                                                                     docker_req,
254                                                                     runtimeContext.pull_image,
255                                                                     runtimeContext)
256
257         network_req, _ = self.get_requirement("NetworkAccess")
258         if network_req:
259             runtime_constraints["API"] = network_req["networkAccess"]
260
261         api_req, _ = self.get_requirement("http://arvados.org/cwl#APIRequirement")
262         if api_req:
263             runtime_constraints["API"] = True
264
265         use_disk_cache = (self.arvrunner.api.config()["Containers"].get("DefaultKeepCacheRAM", 0) == 0)
266
267         keep_cache_type_req, _ = self.get_requirement("http://arvados.org/cwl#KeepCacheTypeRequirement")
268         if keep_cache_type_req:
269             if "keepCacheType" in keep_cache_type_req:
270                 if keep_cache_type_req["keepCacheType"] == "ram_cache":
271                     use_disk_cache = False
272
273         runtime_req, _ = self.get_requirement("http://arvados.org/cwl#RuntimeConstraints")
274         if runtime_req:
275             if "keep_cache" in runtime_req:
276                 if use_disk_cache:
277                     # If DefaultKeepCacheRAM is zero it means we should use disk cache.
278                     runtime_constraints["keep_cache_disk"] = math.ceil(runtime_req["keep_cache"] * 2**20)
279                 else:
280                     runtime_constraints["keep_cache_ram"] = math.ceil(runtime_req["keep_cache"] * 2**20)
281             if "outputDirType" in runtime_req:
282                 if runtime_req["outputDirType"] == "local_output_dir":
283                     # Currently the default behavior.
284                     pass
285                 elif runtime_req["outputDirType"] == "keep_output_dir":
286                     mounts[self.outdir]= {
287                         "kind": "collection",
288                         "writable": True
289                     }
290
291         partition_req, _ = self.get_requirement("http://arvados.org/cwl#PartitionRequirement")
292         if partition_req:
293             scheduling_parameters["partitions"] = aslist(partition_req["partition"])
294
295         intermediate_output_req, _ = self.get_requirement("http://arvados.org/cwl#IntermediateOutput")
296         if intermediate_output_req:
297             self.output_ttl = intermediate_output_req["outputTTL"]
298         else:
299             self.output_ttl = self.arvrunner.intermediate_output_ttl
300
301         if self.output_ttl < 0:
302             raise WorkflowException("Invalid value %d for output_ttl, cannot be less than zero" % container_request["output_ttl"])
303
304
305         if self.arvrunner.api._rootDesc["revision"] >= "20210628":
306             storage_class_req, _ = self.get_requirement("http://arvados.org/cwl#OutputStorageClass")
307             if storage_class_req and storage_class_req.get("intermediateStorageClass"):
308                 container_request["output_storage_classes"] = aslist(storage_class_req["intermediateStorageClass"])
309             else:
310                 container_request["output_storage_classes"] = runtimeContext.intermediate_storage_classes.strip().split(",")
311
312         cuda_req, _ = self.get_requirement("http://commonwl.org/cwltool#CUDARequirement")
313         if cuda_req:
314             runtime_constraints["cuda"] = {
315                 "device_count": resources.get("cudaDeviceCount", 1),
316                 "driver_version": cuda_req["cudaVersionMin"],
317                 "hardware_capability": aslist(cuda_req["cudaComputeCapability"])[0]
318             }
319
320         if runtimeContext.enable_preemptible is False:
321             scheduling_parameters["preemptible"] = False
322         else:
323             preemptible_req, _ = self.get_requirement("http://arvados.org/cwl#UsePreemptible")
324             if preemptible_req:
325                 scheduling_parameters["preemptible"] = preemptible_req["usePreemptible"]
326             elif runtimeContext.enable_preemptible is True:
327                 scheduling_parameters["preemptible"] = True
328             elif runtimeContext.enable_preemptible is None:
329                 pass
330
331         if self.timelimit is not None and self.timelimit > 0:
332             scheduling_parameters["max_run_time"] = self.timelimit
333
334         extra_submit_params = {}
335         if runtimeContext.submit_runner_cluster:
336             extra_submit_params["cluster_id"] = runtimeContext.submit_runner_cluster
337
338         container_request["output_name"] = cleanup_name_for_collection("Output from step %s" % (self.name))
339         container_request["output_ttl"] = self.output_ttl
340         container_request["mounts"] = mounts
341         container_request["secret_mounts"] = secret_mounts
342         container_request["runtime_constraints"] = runtime_constraints
343         container_request["scheduling_parameters"] = scheduling_parameters
344
345         enable_reuse = runtimeContext.enable_reuse
346         if enable_reuse:
347             reuse_req, _ = self.get_requirement("WorkReuse")
348             if reuse_req:
349                 enable_reuse = reuse_req["enableReuse"]
350             reuse_req, _ = self.get_requirement("http://arvados.org/cwl#ReuseRequirement")
351             if reuse_req:
352                 enable_reuse = reuse_req["enableReuse"]
353         container_request["use_existing"] = enable_reuse
354
355         properties_req, _ = self.get_requirement("http://arvados.org/cwl#ProcessProperties")
356         if properties_req:
357             for pr in properties_req["processProperties"]:
358                 container_request["properties"][pr["propertyName"]] = self.builder.do_eval(pr["propertyValue"])
359
360         output_properties_req, _ = self.get_requirement("http://arvados.org/cwl#OutputCollectionProperties")
361         if output_properties_req:
362             if self.arvrunner.api._rootDesc["revision"] >= "20220510":
363                 container_request["output_properties"] = {}
364                 for pr in output_properties_req["outputProperties"]:
365                     container_request["output_properties"][pr["propertyName"]] = self.builder.do_eval(pr["propertyValue"])
366             else:
367                 logger.warning("%s API revision is %s, revision %s is required to support setting properties on output collections.",
368                                self.arvrunner.label(self), self.arvrunner.api._rootDesc["revision"], "20220510")
369
370         if self.arvrunner.api._rootDesc["revision"] >= "20240502" and self.globpatterns:
371             output_glob = []
372             for gb in self.globpatterns:
373                 gb = self.builder.do_eval(gb)
374                 if not gb:
375                     continue
376                 for gbeval in aslist(gb):
377                     if gbeval.startswith(self.outdir+"/"):
378                         gbeval = gbeval[len(self.outdir)+1:]
379                     while gbeval.startswith("./"):
380                         gbeval = gbeval[2:]
381
382                     if gbeval in (self.outdir, "", "."):
383                         output_glob.append("**")
384                     elif gbeval.endswith("/"):
385                         output_glob.append(gbeval+"**")
386                     else:
387                         output_glob.append(gbeval)
388                         output_glob.append(gbeval + "/**")
389
390             if "**" in output_glob:
391                 # if it's going to match all, prefer not to provide it
392                 # at all.
393                 output_glob.clear()
394
395             if output_glob:
396                 # Tools should either use cwl.output.json or
397                 # outputBinding globs. However, one CWL conformance
398                 # test has both, so we need to make sure we collect
399                 # cwl.output.json in this case. That test uses
400                 # cwl.output.json return a string, but also uses
401                 # outputBinding.
402                 output_glob.append("cwl.output.json")
403
404                 # It could happen that a tool creates cwl.output.json,
405                 # references a file, but also uses a outputBinding
406                 # glob that doesn't include the file being referenced.
407                 #
408                 # In this situation, output_glob will only match the
409                 # pattern we know about.  If cwl.output.json referred
410                 # to other files in the output, those would be
411                 # missing.  We could upload the entire output, but we
412                 # currently have no way of knowing at this point
413                 # whether cwl.output.json will be used this way.
414                 #
415                 # Because this is a corner case, I'm inclined to leave
416                 # this as a known issue for now.  No conformance tests
417                 # do this and I'd even be inclined to have it ruled
418                 # incompatible in the CWL spec if it did come up.
419                 # That said, in retrospect it would have been good to
420                 # require CommandLineTool to declare when it expects
421                 # cwl.output.json.
422
423                 container_request["output_glob"] = output_glob
424
425         ram_multiplier = [1]
426
427         oom_retry_req, _ = self.get_requirement("http://arvados.org/cwl#OutOfMemoryRetry")
428         if oom_retry_req:
429             if oom_retry_req.get('memoryRetryMultiplier'):
430                 ram_multiplier.append(oom_retry_req.get('memoryRetryMultiplier'))
431             elif oom_retry_req.get('memoryRetryMultipler'):
432                 ram_multiplier.append(oom_retry_req.get('memoryRetryMultipler'))
433             else:
434                 ram_multiplier.append(2)
435
436         if runtimeContext.runnerjob.startswith("arvwf:"):
437             wfuuid = runtimeContext.runnerjob[6:runtimeContext.runnerjob.index("#")]
438             wfrecord = self.arvrunner.api.workflows().get(uuid=wfuuid).execute(num_retries=self.arvrunner.num_retries)
439             if container_request["name"] == "main":
440                 container_request["name"] = wfrecord["name"]
441             container_request["properties"]["template_uuid"] = wfuuid
442
443         if self.attempt_count == 0:
444             self.output_callback = self.arvrunner.get_wrapped_callback(self.output_callback)
445
446         try:
447             ram = runtime_constraints["ram"]
448
449             self.uuid = runtimeContext.submit_request_uuid
450
451             for i in ram_multiplier:
452                 runtime_constraints["ram"] = ram * i
453
454                 if self.uuid:
455                     response = self.arvrunner.api.container_requests().update(
456                         uuid=self.uuid,
457                         body=container_request,
458                         **extra_submit_params
459                     ).execute(num_retries=self.arvrunner.num_retries)
460                 else:
461                     response = self.arvrunner.api.container_requests().create(
462                         body=container_request,
463                         **extra_submit_params
464                     ).execute(num_retries=self.arvrunner.num_retries)
465                     self.uuid = response["uuid"]
466
467                 if response["container_uuid"] is not None:
468                     break
469
470             if response["container_uuid"] is None:
471                 runtime_constraints["ram"] = ram * ram_multiplier[self.attempt_count]
472
473             container_request["state"] = "Committed"
474             response = self.arvrunner.api.container_requests().update(
475                 uuid=self.uuid,
476                 body=container_request,
477                 **extra_submit_params
478             ).execute(num_retries=self.arvrunner.num_retries)
479
480             self.arvrunner.process_submitted(self)
481             self.attempt_count += 1
482
483             if response["state"] == "Final":
484                 logger.info("%s reused container %s", self.arvrunner.label(self), response["container_uuid"])
485             else:
486                 logger.info("%s %s state is %s", self.arvrunner.label(self), response["uuid"], response["state"])
487         except Exception as e:
488             logger.exception("%s error submitting container\n%s", self.arvrunner.label(self), e)
489             logger.debug("Container request was %s", container_request)
490             self.output_callback({}, "permanentFail")
491
492     def out_of_memory_retry(self, record, container):
493         oom_retry_req, _ = self.get_requirement("http://arvados.org/cwl#OutOfMemoryRetry")
494         if oom_retry_req is None:
495             return False
496
497         # Sometimes it gets killed with no warning
498         if container["exit_code"] == 137:
499             return True
500
501         logc = arvados.collection.CollectionReader(record["log_uuid"],
502                                                    api_client=self.arvrunner.api,
503                                                    keep_client=self.arvrunner.keep_client,
504                                                    num_retries=self.arvrunner.num_retries)
505
506         loglines = [""]
507         def callback(v1, v2, v3):
508             loglines[0] = v3
509
510         done.logtail(logc, callback, "", maxlen=1000)
511
512         # Check allocation failure
513         oom_matches = oom_retry_req.get('memoryErrorRegex') or r'(bad_alloc|out ?of ?memory|memory ?error|container using over 9.% of memory)'
514         if re.search(oom_matches, loglines[0], re.IGNORECASE | re.MULTILINE):
515             return True
516
517         return False
518
519     def done(self, record):
520         outputs = {}
521         retried = False
522         rcode = None
523         try:
524             container = self.arvrunner.api.containers().get(
525                 uuid=record["container_uuid"]
526             ).execute(num_retries=self.arvrunner.num_retries)
527             if container["state"] == "Complete":
528                 rcode = container["exit_code"]
529                 if self.successCodes and rcode in self.successCodes:
530                     processStatus = "success"
531                 elif self.temporaryFailCodes and rcode in self.temporaryFailCodes:
532                     processStatus = "temporaryFail"
533                 elif self.permanentFailCodes and rcode in self.permanentFailCodes:
534                     processStatus = "permanentFail"
535                 elif rcode == 0:
536                     processStatus = "success"
537                 else:
538                     processStatus = "permanentFail"
539
540                 if processStatus == "permanentFail" and self.attempt_count == 1 and self.out_of_memory_retry(record, container):
541                     logger.warning("%s Container failed with out of memory error, retrying with more RAM.",
542                                  self.arvrunner.label(self))
543                     self.job_runtime.submit_request_uuid = None
544                     self.uuid = None
545                     self.run(None)
546                     retried = True
547                     return
548
549                 if rcode == 137:
550                     logger.warning("%s Container may have been killed for using too much RAM.  Try resubmitting with a higher 'ramMin' or use the arv:OutOfMemoryRetry feature.",
551                                  self.arvrunner.label(self))
552             else:
553                 processStatus = "permanentFail"
554
555             logc = None
556             if record["log_uuid"]:
557                 logc = arvados.collection.Collection(record["log_uuid"],
558                                                      api_client=self.arvrunner.api,
559                                                      keep_client=self.arvrunner.keep_client,
560                                                      num_retries=self.arvrunner.num_retries)
561
562             if processStatus == "permanentFail" and logc is not None:
563                 label = self.arvrunner.label(self)
564                 done.logtail(
565                     logc, logger.error,
566                     "%s (%s) error log:" % (label, record["uuid"]), maxlen=40, include_crunchrun=(rcode is None or rcode > 127))
567
568             if record["output_uuid"]:
569                 if self.arvrunner.trash_intermediate or self.arvrunner.intermediate_output_ttl:
570                     # Compute the trash time to avoid requesting the collection record.
571                     trash_at = ciso8601.parse_datetime_as_naive(record["modified_at"]) + datetime.timedelta(0, self.arvrunner.intermediate_output_ttl)
572                     aftertime = " at %s" % trash_at.strftime("%Y-%m-%d %H:%M:%S UTC") if self.arvrunner.intermediate_output_ttl else ""
573                     orpart = ", or" if self.arvrunner.trash_intermediate and self.arvrunner.intermediate_output_ttl else ""
574                     oncomplete = " upon successful completion of the workflow" if self.arvrunner.trash_intermediate else ""
575                     logger.info("%s Intermediate output %s (%s) will be trashed%s%s%s." % (
576                         self.arvrunner.label(self), record["output_uuid"], container["output"], aftertime, orpart, oncomplete))
577                 self.arvrunner.add_intermediate_output(record["output_uuid"])
578
579             if container["output"]:
580                 outputs = done.done_outputs(self, container, "/tmp", self.outdir, "/keep")
581
582             properties = record["properties"].copy()
583             properties["cwl_output"] = outputs
584             self.arvrunner.api.container_requests().update(
585                 uuid=self.uuid,
586                 body={"container_request": {"properties": properties}}
587             ).execute(num_retries=self.arvrunner.num_retries)
588
589             if logc is not None and self.job_runtime.enable_usage_report is not False:
590                 try:
591                     summarizer = crunchstat_summary.summarizer.ContainerRequestSummarizer(
592                         record,
593                         collection_object=logc,
594                         label=self.name,
595                         arv=self.arvrunner.api)
596                     summarizer.run()
597                     with logc.open("usage_report.html", "wt") as mr:
598                         mr.write(summarizer.html_report())
599                     logc.save()
600
601                     # Post warnings about nodes that are under-utilized.
602                     for rc in summarizer._recommend_gen(lambda x: x):
603                         self.job_runtime.usage_report_notes.append(rc)
604
605                 except Exception as e:
606                     logger.warning("%s unable to generate resource usage report",
607                                  self.arvrunner.label(self),
608                                  exc_info=(e if self.arvrunner.debug else False))
609
610         except WorkflowException as e:
611             # Only include a stack trace if in debug mode.
612             # A stack trace may obfuscate more useful output about the workflow.
613             logger.error("%s unable to collect output from %s:\n%s",
614                          self.arvrunner.label(self), container["output"], e, exc_info=(e if self.arvrunner.debug else False))
615             processStatus = "permanentFail"
616         except Exception:
617             logger.exception("%s while getting output object:", self.arvrunner.label(self))
618             processStatus = "permanentFail"
619         finally:
620             if not retried:
621                 self.output_callback(outputs, processStatus)
622
623
624 class RunnerContainer(Runner):
625     """Submit and manage a container that runs arvados-cwl-runner."""
626
627     def arvados_job_spec(self, runtimeContext, git_info):
628         """Create an Arvados container request for this workflow.
629
630         The returned dict can be used to create a container passed as
631         the +body+ argument to container_requests().create().
632         """
633
634         adjustDirObjs(self.job_order, trim_listing)
635         visit_class(self.job_order, ("File", "Directory"), trim_anonymous_location)
636         visit_class(self.job_order, ("File", "Directory"), remove_redundant_fields)
637
638         secret_mounts = {}
639         for param in sorted(self.job_order.keys()):
640             if self.secret_store.has_secret(self.job_order[param]):
641                 mnt = "/secrets/s%d" % len(secret_mounts)
642                 secret_mounts[mnt] = {
643                     "kind": "text",
644                     "content": self.secret_store.retrieve(self.job_order[param])
645                 }
646                 self.job_order[param] = {"$include": mnt}
647
648         container_image = arvados_jobs_image(self.arvrunner, self.jobs_image, runtimeContext)
649
650         workflow_runner_req, _ = self.embedded_tool.get_requirement("http://arvados.org/cwl#WorkflowRunnerResources")
651         if workflow_runner_req and workflow_runner_req.get("acrContainerImage"):
652             container_image = workflow_runner_req.get("acrContainerImage")
653
654         container_req = {
655             "name": self.name,
656             "output_path": "/var/spool/cwl",
657             "cwd": "/var/spool/cwl",
658             "priority": self.priority,
659             "state": "Committed",
660             "container_image": container_image,
661             "mounts": {
662                 "/var/lib/cwl/cwl.input.json": {
663                     "kind": "json",
664                     "content": self.job_order
665                 },
666                 "stdout": {
667                     "kind": "file",
668                     "path": "/var/spool/cwl/cwl.output.json"
669                 },
670                 "/var/spool/cwl": {
671                     "kind": "collection",
672                     "writable": True
673                 }
674             },
675             "secret_mounts": secret_mounts,
676             "runtime_constraints": {
677                 "vcpus": math.ceil(self.submit_runner_cores),
678                 "ram": 1024*1024 * (math.ceil(self.submit_runner_ram) + math.ceil(self.collection_cache_size)),
679                 "API": True
680             },
681             "use_existing": self.reuse_runner,
682             "properties": {}
683         }
684
685         if self.embedded_tool.tool.get("id", "").startswith("keep:"):
686             sp = self.embedded_tool.tool["id"].split('/')
687             workflowcollection = sp[0][5:]
688             workflowname = "/".join(sp[1:])
689             workflowpath = "/var/lib/cwl/workflow/%s" % workflowname
690             container_req["mounts"]["/var/lib/cwl/workflow"] = {
691                 "kind": "collection",
692                 "portable_data_hash": "%s" % workflowcollection
693             }
694         elif self.embedded_tool.tool.get("id", "").startswith("arvwf:"):
695             uuid, frg = urllib.parse.urldefrag(self.embedded_tool.tool["id"])
696             workflowpath = "/var/lib/cwl/workflow.json#" + frg
697             packedtxt = self.loadingContext.loader.fetch_text(uuid)
698             yaml = ruamel.yaml.YAML(typ='safe', pure=True)
699             packed = yaml.load(packedtxt)
700             container_req["mounts"]["/var/lib/cwl/workflow.json"] = {
701                 "kind": "json",
702                 "content": packed
703             }
704             container_req["properties"]["template_uuid"] = self.embedded_tool.tool["id"][6:33]
705         elif self.embedded_tool.tool.get("id", "").startswith("file:"):
706             raise WorkflowException("Tool id '%s' is a local file but expected keep: or arvwf:" % self.embedded_tool.tool.get("id"))
707         else:
708             main = self.loadingContext.loader.idx["_:main"]
709             if main.get("id") == "_:main":
710                 del main["id"]
711             workflowpath = "/var/lib/cwl/workflow.json#main"
712             container_req["mounts"]["/var/lib/cwl/workflow.json"] = {
713                 "kind": "json",
714                 "content": main
715             }
716
717         container_req["properties"].update({k.replace("http://arvados.org/cwl#", "arv:"): v for k, v in git_info.items()})
718
719         properties_req, _ = self.embedded_tool.get_requirement("http://arvados.org/cwl#ProcessProperties")
720         if properties_req:
721             builder = make_builder(self.job_order, self.embedded_tool.hints, self.embedded_tool.requirements, runtimeContext, self.embedded_tool.metadata)
722             for pr in properties_req["processProperties"]:
723                 container_req["properties"][pr["propertyName"]] = builder.do_eval(pr["propertyValue"])
724
725         # --local means execute the workflow instead of submitting a container request
726         # --api=containers means use the containers API
727         # --no-log-timestamps means don't add timestamps (the logging infrastructure does this)
728         # --disable-validate because we already validated so don't need to do it again
729         # --eval-timeout is the timeout for javascript invocation
730         # --parallel-task-count is the number of threads to use for job submission
731         # --enable/disable-reuse sets desired job reuse
732         # --collection-cache-size sets aside memory to store collections
733         command = ["arvados-cwl-runner",
734                    "--local",
735                    "--api=containers",
736                    "--no-log-timestamps",
737                    "--disable-validate",
738                    "--disable-color",
739                    "--eval-timeout=%s" % self.arvrunner.eval_timeout,
740                    "--thread-count=%s" % self.arvrunner.thread_count,
741                    "--enable-reuse" if self.enable_reuse else "--disable-reuse",
742                    "--collection-cache-size=%s" % self.collection_cache_size]
743
744         if self.output_name:
745             command.append("--output-name=" + self.output_name)
746             container_req["output_name"] = self.output_name
747
748         if self.output_tags:
749             command.append("--output-tags=" + self.output_tags)
750
751         if runtimeContext.debug:
752             command.append("--debug")
753
754         if runtimeContext.storage_classes != "default" and runtimeContext.storage_classes:
755             command.append("--storage-classes=" + runtimeContext.storage_classes)
756
757         if runtimeContext.intermediate_storage_classes != "default" and runtimeContext.intermediate_storage_classes:
758             command.append("--intermediate-storage-classes=" + runtimeContext.intermediate_storage_classes)
759
760         if runtimeContext.on_error:
761             command.append("--on-error=" + self.on_error)
762
763         if runtimeContext.intermediate_output_ttl:
764             command.append("--intermediate-output-ttl=%d" % runtimeContext.intermediate_output_ttl)
765
766         if runtimeContext.trash_intermediate:
767             command.append("--trash-intermediate")
768
769         if runtimeContext.project_uuid:
770             command.append("--project-uuid="+runtimeContext.project_uuid)
771
772         if self.enable_dev:
773             command.append("--enable-dev")
774
775         if runtimeContext.enable_preemptible is True:
776             command.append("--enable-preemptible")
777
778         if runtimeContext.enable_preemptible is False:
779             command.append("--disable-preemptible")
780
781         if runtimeContext.varying_url_params:
782             command.append("--varying-url-params="+runtimeContext.varying_url_params)
783
784         if runtimeContext.prefer_cached_downloads:
785             command.append("--prefer-cached-downloads")
786
787         if runtimeContext.enable_usage_report is True:
788             command.append("--enable-usage-report")
789
790         if runtimeContext.enable_usage_report is False:
791             command.append("--disable-usage-report")
792
793         if self.fast_parser:
794             command.append("--fast-parser")
795
796         command.extend([workflowpath, "/var/lib/cwl/cwl.input.json"])
797
798         container_req["command"] = command
799
800         return container_req
801
802
803     def run(self, runtimeContext):
804         runtimeContext.keepprefix = "keep:"
805         job_spec = self.arvados_job_spec(runtimeContext, self.git_info)
806         if runtimeContext.project_uuid:
807             job_spec["owner_uuid"] = runtimeContext.project_uuid
808
809         extra_submit_params = {}
810         if runtimeContext.submit_runner_cluster:
811             extra_submit_params["cluster_id"] = runtimeContext.submit_runner_cluster
812
813         if runtimeContext.submit_request_uuid:
814             if "cluster_id" in extra_submit_params:
815                 # Doesn't make sense for "update" and actually fails
816                 del extra_submit_params["cluster_id"]
817             response = self.arvrunner.api.container_requests().update(
818                 uuid=runtimeContext.submit_request_uuid,
819                 body=job_spec,
820                 **extra_submit_params
821             ).execute(num_retries=self.arvrunner.num_retries)
822         else:
823             response = self.arvrunner.api.container_requests().create(
824                 body=job_spec,
825                 **extra_submit_params
826             ).execute(num_retries=self.arvrunner.num_retries)
827
828         self.uuid = response["uuid"]
829         self.arvrunner.process_submitted(self)
830
831         logger.info("%s submitted container_request %s", self.arvrunner.label(self), response["uuid"])
832
833         workbench2 = self.arvrunner.api.config()["Services"]["Workbench2"]["ExternalURL"]
834         if workbench2:
835             url = "{}processes/{}".format(workbench2, response["uuid"])
836             logger.info("Monitor workflow progress at %s", url)
837
838
839     def done(self, record):
840         try:
841             container = self.arvrunner.api.containers().get(
842                 uuid=record["container_uuid"]
843             ).execute(num_retries=self.arvrunner.num_retries)
844             container["log"] = record["log_uuid"]
845         except Exception:
846             logger.exception("%s while getting runner container", self.arvrunner.label(self))
847             self.arvrunner.output_callback({}, "permanentFail")
848         else:
849             super(RunnerContainer, self).done(container)