Getting Started

Starting up a BuildGrid server requires only installation and a configuration file.

Warning

WARNING: The following setup is highly insecure and intended for proof-of-concept testing ONLY! A malicious user can have full unsandboxed access to the entire host system. A secure setup must be configured with authentication.

Installation

Please follow the steps in the installation guide to install it on your host system.

Configuration File

If you’d like to get started, a sample configuration that uses your filesystem as the CAS (Content Addressable Storage) and a SQLite-based scheduler is provided below. Copy the following text into a file called config.yml and change /path/to/cas/ to a suitable storage path.

By default the scheduler’s data store is written to ./example.db. You can also change this to a suitable storage path.

server:
- !channel
  address: "[::]:50051"
  insecure-mode: true

description: >
    BuildGrid's default configuration:
    - Unauthenticated plain HTTP at :50051
    - Single instance: [unnamed]
    - In-memory data, max. 2Gio
    - DataStore: sqlite:///./example.db
    - Hosted services:
    - ActionCache
    - Execute
    - ContentAddressableStorage
    - ByteStream

authorization:
    method: none

monitoring:
    enabled: false

connections:
  - !sql-connection &sql
    connection-string: sqlite:///./example.db
    automigrate: yes
    connection-timeout: 15

storages:
  - !disk-storage &cas-storage
    path: /path/to/cas/

caches:
  - !lru-action-cache &build-cache
    storage: *cas-storage
    max-cached-refs: 256
    cache-failed-actions: true
    allow-updates: true

schedulers:
  - !sql-scheduler &state-database
    sql: *sql
    storage: *cas-storage
    action-cache: *build-cache
    poll-interval: 0.5

instances:
  - name: ''
    description: |
      The unique '' instance.

    services:
      - !action-cache
        cache: *build-cache

      - !execution
        scheduler: *state-database

      - !cas
        storage: *cas-storage

      - !bytestream
        storage: *cas-storage

To start buildgrid with this configuration, simply run:

bgd server start --verbose /path/to/config.yml

See the Understanding the configuration file section to learn more about this file. For now, we will continue setting up BuildGrid for work.

Setting up a bot

Now we will need a worker. The recommended worker to use with BuildGrid is buildbox-worker. This worker works best when used alongside a local CAS cache called buildbox-casd. First, build these tools following the instructions in their READMEs.

Then, start the CAS cache.

buildbox-casd --cas-remote=http://localhost:50051 --bind=127.0.0.1:50011 ~/casd &

Once CASD is running we can start the worker itself, pointing it to CASD for CAS requests.

buildbox-worker --buildbox-run=buildbox-run-hosttools --bots-remote=http://localhost:50051 \
    --cas-remote=http://127.0.0.1:50011 --request-timeout=30 my_bot

We should be able to see this worker connecting as log messages for CreateBotSession and UpdateBotSession requests in the server logs.

Without CASD

Warning

Whilst this approach has less moving parts, it will make your build slower due to needing to freshly fetch the input root for every Action rather than keeping a local cache. Production deployments should use buildbox-casd.

buildbox-worker supports running without buildbox-casd by pointing it to the remote CAS rather than the local CASD, although this isn’t recommended due to the additional network load it will lead to. When running in this configuration, its important to tell the runner command to not use the LocalCAS protocol to stage the input root.

buildbox-worker --buildbox-run=buildbox-run-hosttools --bots-remote=http://localhost:50051 \
    --cas-remote=http://localhost:50051 --request-timeout=30 --runner-arg=--disable-localcas my_bot

Sending work to BuildGrid

We have a working BuildGrid setup! Now you can send work to it.

You can use your own remote execution compatible client, but BuildGrid also comes with a command-line tool for execute simple commands called bgd execute.

We’re going to send a simple job that just cats a file. All Execute requests specify an Action to execute, and each Action has an “input root,” which is a directory that the job is performed inside. bgd execute requires this input root as a command-line parameter, so let’s make one.

In another terminal, create a directory in your home directory or somewhere else that is convenient, then add a file to it:

mkdir ~/my_input_root
echo "I'm in the input root!" >> ~/my_input_root/input_root.txt

Now, let’s send the action to our running BuildGrid instance and bot with “bgd execute.”

bgd execute --remote http://localhost:50051 --remote-cas http://localhost:50051 command ~/my_input_root /bin/cat input_root.txt

In the above request, notice that the input root (~/my_input_root) is specified first, before the rest of the command. The file is specified relative to the input root.

If all goes well, the request should have been sent to BuildGrid, which will have farmed it out to the bot. The bot will have done the work and sent it back to BuildGrid, and bgd execute should display the response metadata. Look for the stdout_raw field, which will contain the text of the file we catted.

If the stdout_raw field is empty, the output might be stored in CAS and need to be fetched. The digest to fetch is in the stdout_digest field. We can fetch it using the bgd cas tool.

bgd cas --remote http://localhost:50051 download-file <stdout_digest> action-stdout.log

Understanding the configuration file

Looking at the config file provides insight into BuildGrid’s structure. While a full breakdown of the configuration options can be found on the configuration page, the “instances” section deserves special mention.

BuildGrid is not just a single service, but rather a collection of services that work together to facilitate remote execution. The REAPI has the notion of “instances”, which effectively act as namespaces for requests since requests must contain the instance name as a field. Each instance can have one or more services attached to it.

The services that can be attached to an instance are as follows:

  • !execution

    The Execution Service is BuildGrid’s primary service. Your clients’ Execute() requests are sent here for processing. Note that it checks the ActionCache to determine whether it can just return a cached result. The data-store represents the backend for the scheduling system. In this case, we’re using a sql-backed scheduler.

  • !cas

    This is the interface into the Content-Addressable Storage. Note that the other services talk to the storage backend directly rather than make requests to this service.

  • !bytestream

    This is the interface into the ByteStream service. This is used for blobs too large to be handled by the batch gRPC methods of the CAS service.

  • !action-cache

    The ActionCache service handles requests to the ActionCache. It needs to talk to the backend storage to retrieve the ActionResult blobs. In this configuration, we have set the maximum number of cacheable actions to 256, and we allow failed builds to be cached and make the ActionCache writeable.

The <anatomy-of-a-configuration-file> section describes an example configuration file, including this “instances” section in more detail.

Next steps

Now that we have a working BuildGrid, it is time to run some real Actions. Usage of BuildGrid with various clients is documented in the Using section, along with information on how to use the sandboxing features of BuildBox and some of the more advanced features of BuildGrid such as Indexed CAS and CAS cleanup.