Skip to main content

Download build logs from GitHub Actions, Travis, and Appveyor

Project description

GitHub Actions Status Travis CI Status Appveyor Status https://img.shields.io/pypi/pyversions/tinuous.svg MIT License

GitHub | PyPI | Issues | Changelog

tinuous is a command for downloading build logs and (for GitHub only) artifacts & release assets for a GitHub repository from GitHub Actions, Travis-CI.com, and/or Appveyor.

Installation

tinuous requires Python 3.8 or higher. Just use pip for Python 3 (You have pip, right?) to install tinuous and its dependencies:

python3 -m pip install tinuous

tinuous can also optionally integrate with DataLad. To install DataLad alongside tinuous, specify the datalad extra:

python3 -m pip install "tinuous[datalad]"

Usage

tinuous [<global options>] <command> [<args> ...]

Global Options

-c FILE, --config FILE

Read configuration from the given file [default value: tinuous.yaml]

-E FILE, --env FILE

Load environment variables from the given .env file. By default, environment variables are loaded from the first file named “.env” found by searching from the current directory upwards.

Warning: Care must be taken when this file is located in a Git repository so as not to publicly expose it: either list the file in .gitignore or, if using DataLad or git-annex, configure git-annex to prohibit public sharing of the file.

-l LEVEL, --log-level LEVEL

Set the log level to the given value. Possible values are “CRITICAL”, “ERROR”, “WARNING”, “INFO”, “DEBUG” (all case-insensitive) and their Python integer equivalents. [default value: INFO]

fetch Command

tinuous [<global options>] fetch [<options>]

tinuous fetch reads a configuration file telling it what repository to retrieve logs & artifacts for, where to retrieve them from, and where to save them, and then it carries those steps out.

Options

--sanitize-secrets

Sanitize secrets from log files after downloading

-S FILE, --state FILE

Store program state (e.g., timestamps before which all asset are known to have been fetched) in the given file [default value: .tinuous.state.json]

sanitize Command

tinuous [<global options>] sanitize <path> ...

Sanitize the given files, replacing all strings matching a secret regex with a series of asterisks.

Configuration

The configuration file is a YAML file containing a mapping with the following keys:

repo

(required) The GitHub repository to retrieve assets for, in the form OWNER/NAME

vars

A mapping defining custom path template placeholders. Each key is the name of a custom placeholder, without enclosing braces, and the value is the string to substitute in its place. Custom values may contain standard path template placeholders as well as other custom placeholders.

ci

(required) A mapping from the names of the CI systems from which to retrieve assets to sub-mappings containing CI-specific configuration. Including a given CI system is optional; assets will only be fetched from a given system if it is listed in this mapping.

The CI systems and their sub-mappings are as follows:

github

Configuration for retrieving assets from GitHub Actions. Subfields:

paths

A mapping giving template strings for the paths at which to save various types of assets. If this is empty or not present, no assets are retrieved. Subfields:

logs

A template string that will be instantiated for each workflow run to produce the path for the directory (relative to the current working directory) under which the run’s build logs will be saved. If this is not specified, no logs will be downloaded.

artifacts

A template string that will be instantiated for each workflow run to produce the path for the directory (relative to the current working directory) under which the run’s artifacts will be saved. If this is not specified, no artifacts will be downloaded.

releases

A template string that will be instantiated for each (non-draft, non-prerelease) GitHub release to produce the path for the directory (relative to the current working directory) under which the release’s assets will be saved. If this is not specified, no release assets will be downloaded.

workflows

A specification of the workflows for which to retrieve assets. This can be either a list of workflow basenames, including the file extension (e.g., test.yml, not .github/workflows/test.yml) or a mapping containing the following fields:

include

A list of workflows to retrieve assets for, given as either basenames or (when regex is true) regular expressions to match against basenames. If include is omitted, it defaults to including all workflows.

exclude

A list of workflows to not retrieve assets for, given as either basenames or (when regex is true) regular expressions to match against basenames. If exclude is omitted, no workflows are excluded. Workflows that match both include and exclude are excluded.

regex

A boolean. If true (default false), the elements of the include and exclude fields are treated as regular expressions that are matched (unanchored) against workflow basenames; if false, they are used as exact names

When workflows is not specified, assets are retrieved for all workflows in the repository.

travis

Configuration for retrieving logs from Travis-CI.com. Subfield:

paths

A mapping giving template strings for the paths at which to save various types of assets. If this is empty or not present, no assets are retrieved. Subfield:

logs

A template string that will be instantiated for each job of each build to produce the path for the file (relative to the current working directory) in which the job’s logs will be saved. If this is not specified, no logs will be downloaded.

appveyor

Configuration for retrieving logs from Appveyor. Subfields:

paths

A mapping giving template strings for the paths at which to save various types of assets. If this is empty or not present, no assets are retrieved. Subfield:

logs

A template string that will be instantiated for each job of each build to produce the path for the file (relative to the current working directory) in which the job’s logs will be saved. If this is not specified, no logs will be downloaded.

accountName

(required) The name of the Appveyor account to which the repository belongs on Appveyor

projectSlug

The project slug for the repository on Appveyor; if not specified, it is assumed that the slug is the same as the repository name

since

(required) A timestamp (date, time, & timezone); only assets for builds started after the given point in time will be retrieved

As the script retrieves new build assets, it keeps track of their starting points. Once the assets for all builds for the given CI system & configuration have been fetched up to a certain point, the timestamp for the latest such build is stored in the state file and used as the new since value for the respective CI system on subsequent runs. If the since setting in the configuration file is then updated to a newer timestamp, the configuration will override the value in the state file, and the next tinuous run will only retrieve assets after the new setting.

until

A timestamp (date, time, & timezone); only assets for builds started before the given point in time will be retrieved

types

A list of build trigger event types; only assets for builds triggered by one of the given events will be retrieved. If this is not specified, assets will be retrieved for all recognized event types.

The recognized event types are:

cron

A build run on a schedule

manual

A build trigger manually by a human or through the CI system’s API

pr

A build in response to activity on a pull request

push

A build in response to new commits

secrets

A mapping from names (used in log messages) to regexes matching secrets to sanitize

allow-secrets-regex

Any strings that match a secrets regex and also match this regex will not be sanitized. Note that allow-secrets-regex is tested against just the substring that matched a secrets regex without any surrounding text, and so lookahead and lookbehind will not work in this regex.

datalad

A sub-mapping describing integration of tinuous with DataLad. Subfields:

enabled

A boolean. If true (default false), DataLad must be installed, the current directory will be converted into a DataLad dataset if it is not one already, the assets will optionally be divided up into subdatasets, and all new assets will be committed at the end of a run of tinuous fetch. path template strings may contain // separators indicating the boundaries of subdatasets.

cfg_proc

Procedure to run on the dataset & subdatasets when creating them

A sample config file:

repo: datalad/datalad
vars:
  path_prefix: '{year}//{month}//{day}/{ci}/{type}'
  build_prefix: '{path_prefix}/{type_id}/{build_commit[:7]}'
ci:
  github:
    paths:
      logs: '{build_prefix}/{wf_name}/{number}/logs/'
      artifacts: '{build_prefix}/{wf_name}/{number}/artifacts/'
      releases: '{path_prefix}/{type}/{release_tag}/'
    workflows:
      - test_crippled.yml
      - test_extensions.yml
      - test_macos.yml
  travis:
    paths:
      logs: '{build_prefix}/{number}/{job}.txt'
  appveyor:
    paths:
      logs: '{build_prefix}/{number}/{job}.txt'
    accountName: mih
    projectSlug: datalad
since: 2021-01-20T00:00:00Z
types: [cron, manual, pr, push]
secrets:
  github: '\b(v1\.)?[a-f0-9]{40}\b'
  docker-hub: '\b[a-f0-9]{8}(?:-[a-f0-9]{4}){3}-[a-f0-9]{12}\b'
  appveyor: '\b(v2\.)?[a-z0-9]{20}\b'
  travis: '\b[a-zA-Z0-9]{22}\b'
  aws: '\b[a-zA-Z0-9+/]{40}\b'
datalad:
  enabled: true
  cfg_proc: text2git

Path Templates

The path at which assets for a given workflow run, build job, or release are saved is determined by instantiating the appropriate path template string given in the configuration file for the corresponding CI system. A template string is a filepath containing placeholders of the form {field}, where the available placeholders are:

Placeholder

Definition

{year}

The four-digit year in which the build was started or the release was published

{month}

The two-digit month in which the build was started or the release was published

{day}

The two-digit day in which the build was started or the release was published

{hour}

The two-digit hour at which the build was started or the release was published

{minute}

The two-digit minute at which the build was started or the release was published

{second}

The two-digit second at which the build was started or the release was published

{ci}

The name of the CI system (github, travis, or appveyor)

{type}

The event type that triggered the build (cron, manual, pr, or push), or release for GitHub releases

{type_id}

Further information on the triggering event; for cron and manual, this is a timestamp for the start of the build; for pr, this is the number of the associated pull request, or UNK if it cannot be determined; for push, this is the name of the branch to which the push was made (or possibly the tag that was pushed, if using Appveyor) [1]

{release_tag}

(``releases_path`` only) The release tag

{build_commit}

The hash of the commit the build ran against or that was tagged for the release. Note that, for PR builds on Travis and Appveyor, this is the hash of an autogenerated merge commit.

{commit}

The hash of the original commit that triggered the build or that was tagged for the release. For pull request builds, this is the head of the PR branch, or UNK if it cannot be determined. For other builds (along with PR builds on GitHub Actions), this is always the same as {build_commit}.

{number}

The run number of the workflow run (GitHub) or the build number (Travis and Appveyor) [1]

{status}

The success status of the workflow run (GitHub) or job (Travis and Appveyor); the exact strings used depend on the CI system [1]

{common_status}

The success status of the workflow run or job, normalized into one of success, failed, errored, or incomplete [1]

{wf_name}

(GitHub only) The name of the workflow [1]

{wf_file}

(GitHub only) The basename of the workflow file (including the file extension) [1]

{run_id}

(GitHub only) The unique ID of the workflow run [1]

{job}

(Travis and Appveyor only) The number of the job, without the build number prefix (Travis) or the job ID string (Appveyor) [1]

{job_index}

(Travis and Appveyor only) The index of the job in the list returned by the API, starting from 1 [1]

{job_env}

(Appveyor only) The environment variables specific to the job [1]

{job_env_hash}

(Appveyor only) The SHA1 hash of {job_env} [1]

A placeholder’s value may be truncated to the first n characters by writing {placeholder[:n]}, e.g., {commit[:7]}.

All timestamps and timestamp components are in UTC.

Path templates may also contain custom placeholders defined in the top-level vars mapping of the configuration.

Authentication

Note that environment variables can be loaded from a .env file as an alternative to setting them directly in the environment.

GitHub

In order to retrieve assets from GitHub, a GitHub OAuth token must be specified either via the GITHUB_TOKEN environment variable or as the value of the hub.oauthtoken Git config option.

Travis

In order to retrieve logs from Travis, a Travis API access token must be either specified via the TRAVIS_TOKEN environment variable or be retrievable by running travis token --com --no-interactive.

A Travis API access token can be acquired as follows:

  • Install the Travis command line client.

  • Run travis login --com to authenticate.

    • If your Travis account is linked to your GitHub account, you can authenticate by running travis login --com --github-token $GITHUB_TOKEN.

  • If the script will be run on the same machine that the above steps are carried out on, you can stop here, and the script will retrieve the token directly from the travis command.

  • Run travis token --com to retrieve the API access token.

The Travis integration also requires a GitHub OAuth token in order to look up information on pull requests that the Travis API does not report; this token must be specified in the same way as for the GitHub integration.

Appveyor

In order to retrieve logs from Appveyor, an Appveyor API key (for either all accessible accounts or just the specific account associated with the repository) must be specified via the APPVEYOR_TOKEN environment variable. Such a key can be obtained at <https://ci.appveyor.com/api-keys>.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

tinuous-0.3.0.tar.gz (48.4 kB view details)

Uploaded Source

Built Distribution

tinuous-0.3.0-py3-none-any.whl (26.3 kB view details)

Uploaded Python 3

File details

Details for the file tinuous-0.3.0.tar.gz.

File metadata

  • Download URL: tinuous-0.3.0.tar.gz
  • Upload date:
  • Size: 48.4 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/3.4.1 importlib_metadata/4.5.0 pkginfo/1.7.0 requests/2.25.1 requests-toolbelt/0.9.1 tqdm/4.61.0 CPython/3.9.5

File hashes

Hashes for tinuous-0.3.0.tar.gz
Algorithm Hash digest
SHA256 51597e0cbb6139c7ecf40c51a6d10c9f595c6a21560334d042d7271eb0b13363
MD5 a5c95b5641e3226ee30265a2cf0601a0
BLAKE2b-256 7aaa705de8b6a337f1a97f6d81bff4908ec6c3326650fb650ef661cee59c23bf

See more details on using hashes here.

File details

Details for the file tinuous-0.3.0-py3-none-any.whl.

File metadata

  • Download URL: tinuous-0.3.0-py3-none-any.whl
  • Upload date:
  • Size: 26.3 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/3.4.1 importlib_metadata/4.5.0 pkginfo/1.7.0 requests/2.25.1 requests-toolbelt/0.9.1 tqdm/4.61.0 CPython/3.9.5

File hashes

Hashes for tinuous-0.3.0-py3-none-any.whl
Algorithm Hash digest
SHA256 579a9ceea6977280516d87247b07c76a8b2c1f2720239b88f6ea5f396c83313c
MD5 661846fc18d7a8af3f37d976674ea681
BLAKE2b-256 fc7d66ee7fbd38a6b06554e203ae57415ce4fee3dc45b5ddc318f545906010c7

See more details on using hashes here.

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page