Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[flytepropeller][flyteadmin] Streaming Decks V2 #6053

Merged
merged 34 commits into from
Jan 24, 2025

Conversation

Future-Outlier
Copy link
Member

@Future-Outlier Future-Outlier commented Nov 27, 2024

Tracking issue

#5574

Why are the changes needed?

To enhance user visibility into Flyte Decks at different stages of workflow execution (running, failing, and succeeding), enabling better debugging and analysis.

Summary

Condition Description Has Deck
Enabled and Running Yes
Unknown State with Deck Yes
Unknown State without Deck No
Enabled and Succeeded Yes
Enabled but Memory Exceeded No
Disabled No

What changes were proposed in this pull request?

2025/01/14 update

  1. add a BoolValue, it can return 3 values, which can represent 3 status
    nil -> DeckUnknown
    true -> DeckEnabled
    false -> DeckDisabled

Concept:

  1. propeller will turn node info to NodeExecutionEvent, and send it to admin.

nev, err := ToNodeExecutionEvent(
nCtx.NodeExecutionMetadata().GetNodeExecutionID(),
p,
nCtx.InputReader().GetInputPath().String(),
nCtx.NodeStatus(),
nCtx.ExecutionContext().GetEventVersion(),
nCtx.ExecutionContext().GetParentInfo(), nCtx.Node(),
c.clusterID,
nCtx.NodeStateReader().GetDynamicNodeState().Phase,
c.eventConfig,
targetEntity)

Life Cycle:

use new flytekit > 1.14.0

summary:

  1. NO HEAD request to be called. (save resource)
  2. use config from task template to know whether enable deck or not

details:

  1. propeller keep adding DeckURI when the task is running if FLYTE_ENABLE_DECK=true in the task template.
  2. propeller will put DeckURI to node info, and turn it to NodeExecutionEvent to flyte admin.
  3. flyte admin will add DeckURI to Closure
  4. flyte console will get DeckURI by sending request to admin.
    nativeURL = node.GetClosure().GetDeckUri()
    }
    } else {
    return nil, errors.NewFlyteAdminErrorf(codes.InvalidArgument, "unsupported source [%v]", reflect.TypeOf(req.GetSource()))
    }
    if len(nativeURL) == 0 {
    return nil, errors.NewFlyteAdminErrorf(codes.Internal, "no deckUrl found for request [%+v]", req)
    }
    ref := storage.DataReference(nativeURL)
    meta, err := s.dataStore.Head(ctx, ref)
    if err != nil {
    return nil, errors.NewFlyteAdminErrorf(codes.Internal, "failed to head object before signing url. Error: %v", err)
    }
  5. if flyte console can't get the DeckURI from the node Closure, it will not show the Flyte Deck button.

old flytekit <= 1.14.0

summary:

  1. we keep the backward compatible (show deck when succeed)

details:

  1. In the terminal state, use a HEAD request to know if the Deck URI exists or not.
    if exist, then put it to the node info.

How was this patch tested?

  1. unit test and remote execution.

python code:

from flytekit import ImageSpec, task, workflow
from flytekit.deck import Deck

flytekit_hash = "6b55930d0a77efc3594ebaac056f2c75024e61b5"
flytekit = f"git+https://github.com/flyteorg/flytekit.git@{flytekit_hash}"

# Define custom image for the task
custom_image = ImageSpec(packages=[flytekit],
                            apt_packages=["git"],
                            registry="localhost:30000",
                            env={"FLYTE_SDK_LOGGING_LEVEL": 10},
                         )

@task(enable_deck=False, container_image=custom_image)
def t_no_deck():
    # Deck.publish()
    print("No Deck")

@task(enable_deck=True, container_image=custom_image)
def t_deck():
    import time
    """
    1st deck only show timeline deck
    2nd will show
    """
    for i in range(3):
        Deck.publish()
        time.sleep(1)

@task(enable_deck=True, container_image=custom_image)
def t_fail_deck():
    import time

    for i in range(3):
        Deck.publish()
        time.sleep(3)
    time.sleep(10)
    raise ValueError("Failed Deck")

@workflow
def wf():
    t_no_deck()
    t_deck()
    t_fail_deck()

if __name__ == "__main__":
    from flytekit.clis.sdk_in_container import pyflyte
    from click.testing import CliRunner
    import os

    runner = CliRunner()
    path = os.path.realpath(__file__)

    result = runner.invoke(pyflyte.main,
                           ["run", path, "t_no_deck"])
    print("Local Execution: ", result.output)

    result = runner.invoke(pyflyte.main,
                           ["run", "--remote", path,"wf"])
    print("Remote Execution: ", result.output)

Setup process

single binary.

flyte: this branch
flytekit: flyteorg/flytekit#2779
flyteconsole: flyteorg/flyteconsole#890

Screenshots

flytekit branch:
flyteorg/flytekit#2779

NEW FLYTEKIT, NO DECK, RUNNING With Deck, SUCCEED, and FAILED

OSS-STREAMING-DECK-small.mov

OLD FLYTEKIT, NO DECK, RUNNING With Deck, SUCCEED, and FAILED

OSS-STREAMING-DECK-OLD-FLYTEKIT-small.mov

Check all the applicable boxes

  • I updated the documentation accordingly.
  • All new and existing tests passed.
  • All commits are signed-off.

Related PRs

follow up questions

  1. should we support Abort phase for the streaming deck?

should we support EPhaseAbort in this file?

https://github.com/flyteorg/flyte/blob/b3330ba4430538f91ae9fc7d868a29a2e96db8bd/flytepropeller/pkg/controller/nodes/handler/transition_info.go

  1. how can we support the auto-refresh UX?

Summary by Bito

This PR enhances Flyte's functionality through multiple improvements: (1) Decks V2 streaming with tri-state support and refined protocol buffer definitions, including improved deck URI handling and terminal state management, (2) Service discovery updates with k8s:// scheme implementation, (3) Security configurations with shared secrets, and (4) Enhanced type system handling including dataclass metadata improvements and OutputInfo safety measures. Changes span TypeScript, Go, JavaScript, Python, and Rust codebases.

Unit tests added: True

Estimated effort to review (1-5, lower is better): 5

Future-Outlier and others added 2 commits November 27, 2024 23:36
Signed-off-by: Future-Outlier <[email protected]>
Signed-off-by: Future-Outlier <[email protected]>
Co-authored-by: Yi Cheng <[email protected]>
Co-authored-by: pingsutw  <[email protected]>
Copy link

codecov bot commented Nov 27, 2024

Codecov Report

Attention: Patch coverage is 61.72840% with 31 lines in your changes missing coverage. Please review.

Project coverage is 37.07%. Comparing base (29ad645) to head (a33ba09).
Report is 7 commits behind head on master.

Files with missing lines Patch % Lines
...lytepropeller/pkg/controller/nodes/task/handler.go 61.25% 23 Missing and 8 partials ⚠️
Additional details and impacted files
@@           Coverage Diff           @@
##           master    #6053   +/-   ##
=======================================
  Coverage   37.06%   37.07%           
=======================================
  Files        1318     1318           
  Lines      132644   132707   +63     
=======================================
+ Hits        49167    49202   +35     
- Misses      79228    79250   +22     
- Partials     4249     4255    +6     
Flag Coverage Δ
unittests-datacatalog 51.58% <ø> (ø)
unittests-flyteadmin 54.31% <100.00%> (-0.03%) ⬇️
unittests-flytecopilot 30.99% <ø> (ø)
unittests-flytectl 62.29% <ø> (ø)
unittests-flyteidl 7.23% <ø> (ø)
unittests-flyteplugins 53.87% <ø> (ø)
unittests-flytepropeller 42.73% <61.25%> (+0.02%) ⬆️
unittests-flytestdlib 55.35% <ø> (+0.05%) ⬆️

Flags with carried forward coverage won't be shown. Click here to find out more.

☔ View full report in Codecov by Sentry.
📢 Have feedback on the report? Share it here.

Signed-off-by: Future-Outlier <[email protected]>
switch pluginTrns.pInfo.Phase() {
case pluginCore.PhaseSuccess:
// This is to prevent the console from potentially checking the deck URI that does not exist if in final phase(PhaseSuccess).
err = pluginTrns.RemoveNonexistentDeckURI(ctx, tCtx)
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Does this do a head call on the deck URI for every task that succeeds? Two thoughts here:
(1) does the flyteadmin merge algorithm then remove the deckURI from the execution metadata?
(2) this is incurring a 20-30ms performance degredation to every task execution

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

will take a look tmr, thank you!!!

Copy link
Member Author

@Future-Outlier Future-Outlier Nov 28, 2024

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Does this do a head call on the deck URI for every task that succeeds?

yes it will do a head call by RemoteFileOutputReader

func (r RemoteFileOutputReader) DeckExists(ctx context.Context) (bool, error) {
md, err := r.store.Head(ctx, r.outPath.GetDeckPath())
if err != nil {
return false, err
}
return md.Exists(), nil
}

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

how do you know the performance degradation?
did you use grafana or other performance tools?

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

does the flyteadmin merge algorithm then remove the deckURI from the execution metadata?

flyteadmin will set the deckURI in the execution metadata to nil if the propeller removes it.

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

just to just to close the loop on this, we're still making this HEAD call only when the node reaches the terminal phase.

@Future-Outlier
Copy link
Member Author

Future-Outlier commented Nov 27, 2024

How to test it?

  1. start a new sandbox
flytectl demo start --image futureoutlier/sandbox:deck-1205-1138 --force
  1. checkout streaming deck flytekit branch
cd flytekit
gh pr checkout 2779
  1. run a failure task (show deck after it failed)
from flytekit import ImageSpec, task, workflow
from flytekit.deck import Deck

flytekit_hash = "473ae1119af6f86c26c0790dee0affa3eb29be64"
flytekit = f"git+https://github.com/flyteorg/flytekit.git@{flytekit_hash}"

# Define custom image for the task
custom_image = ImageSpec(packages=[flytekit],
                            apt_packages=["git"],
                            registry="localhost:30000",
                            env={"FLYTE_SDK_LOGGING_LEVEL": 10},
                         )

@task(enable_deck=True, container_image=custom_image)
def t_deck():
    import time
    """
    1st deck only show timeline deck
    2nd will show
    """
    for i in range(5):
        Deck.publish()
        # # raise Exception("This is an exception")
        time.sleep(3)

@workflow
def wf():
    t_deck()

if __name__ == "__main__":
    from flytekit.clis.sdk_in_container import pyflyte
    from click.testing import CliRunner
    import os

    runner = CliRunner()
    path = os.path.realpath(__file__)

    # result = runner.invoke(pyflyte.main,
    #                        ["run", path, "wf"])
    # print("Local Execution: ", result.output)

    result = runner.invoke(pyflyte.main,
                           ["run", "--remote", path,"wf"])
    # "--remote"
    print("Remote Execution: ", result.output)

@EngHabu
Copy link
Contributor

EngHabu commented Nov 28, 2024

Mind adding screenshots for the rendered deck and refresh to the PR description?

@Future-Outlier
Copy link
Member Author

Mind adding screenshots for the rendered deck and refresh to the PR description?

Yes no problem

@Future-Outlier
Copy link
Member Author

Mind adding screenshots for the rendered deck and refresh to the PR description?

its provided!
#6053 (comment)

Signed-off-by: Future-Outlier <[email protected]>
Signed-off-by: Future-Outlier <[email protected]>
Signed-off-by: Future-Outlier <[email protected]>
Signed-off-by: Future-Outlier <[email protected]>
Signed-off-by: Future-Outlier <[email protected]>
Signed-off-by: Future-Outlier <[email protected]>
Signed-off-by: Future-Outlier <[email protected]>
@flyte-bot
Copy link
Collaborator

flyte-bot commented Jan 2, 2025

Code Review Agent Run #f3ef5e

Actionable Suggestions - 1
  • flytepropeller/pkg/controller/nodes/task/handler.go - 1
    • Consider impact of removing deckPath parameter · Line 120-120
Additional Suggestions - 1
  • flytepropeller/pkg/controller/nodes/task/handler.go - 1
    • Consider removing unnecessary string cast · Line 43-43
Review Details
  • Files reviewed - 3 · Commit Range: 54aa165..65b6efe
    • flyteadmin/pkg/repositories/transformers/node_execution.go
    • flyteadmin/pkg/repositories/transformers/node_execution_test.go
    • flytepropeller/pkg/controller/nodes/task/handler.go
  • Files skipped - 0
  • Tools
    • Golangci-lint (Linter) - ✖︎ Failed
    • Whispers (Secret Scanner) - ✔︎ Successful
    • Detect-secrets (Secret Scanner) - ✔︎ Successful
    • OWASP (Security Vulnerability) - ✔︎ Successful
    • GOVULNCHECK (Security Vulnerability) - ✖︎ Failed
    • SNYK (Security Vulnerability) - ✔︎ Successful

AI Code Review powered by Bito Logo

@flyte-bot
Copy link
Collaborator

flyte-bot commented Jan 2, 2025

Changelist by Bito

This pull request implements the following key changes.

Key Change Files Impacted
Feature Improvement - Enhanced Deck URI Handling and Status Management

node_execution.go - Added deck URI support in node execution events

node_execution_test.go - Added test coverage for deck URI handling in node executions

handler.go - Implemented deck status management and streaming functionality

// - We relied on a HEAD request to check if the deck file exists, then added the URI to the event.
//
// After (new behavior):
// - If `FLYTE_ENABLE_DECK = true` is set in the task template config (requires Flytekit > 1.14.0),
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

this comment is no longer correct right?

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

yes super nice catch

@@ -380,6 +430,27 @@ func (t Handler) fetchPluginTaskMetrics(pluginID, taskType string) (*taskMetrics
return t.taskMetricsMap[metricNameKey], nil
}

func GetDeckStatus(ctx context.Context, tCtx *taskExecutionContext) (DeckStatus, error) {
// FLYTE_ENABLE_DECK is used when flytekit > 1.14.0
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

update this comment

@flyte-bot
Copy link
Collaborator

flyte-bot commented Jan 9, 2025

Code Review Agent Run Status

  • Limitations and other issues: ❌ Failure - Bito Code Review Agent didn't review this pull request automatically because it exceeded the size limit. No action is needed if you didn't intend for the agent to review it. Otherwise, you can initiate the review by typing /review in a comment below.

Comment on lines 432 to 445
// GetDeckStatus determines whether a task generates a deck based on its execution context.
//
// This function ensures backward compatibility with older Flytekit versions using the following logic:
// 1. For Flytekit > 1.14.3, the task template's metadata includes the `generates_deck` flag:
// - If `generates_deck` is set to true, it indicates that the task generates a deck, and DeckEnabled is returned.
// 2. If `generates_deck` is set to false or is not set (likely from older Flytekit versions):
// - DeckUnknown is returned as a placeholder status.
// - In terminal states, a HEAD request can be made to check if the deck file exists.
//
// In future implementations, a `DeckDisabled` status could be introduced for better performance optimization:
// - This would eliminate the need for a HEAD request in the final phase.
// - However, the tradeoff is that a new field would need to be added to FlyteIDL to support this behavior.

template, err := tCtx.tr.Read(ctx)
Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Better comments!
cc @wild-endeavor

@Future-Outlier
Copy link
Member Author

Streaming Decks

#!/usr/bin/env bash

set -ex

ARCH="$(uname -m)"
case ${ARCH} in
x86_64|amd64)
  IMAGE_ARCH=amd64
  ;;
aarch64|arm64)
  IMAGE_ARCH=arm64
  ;;
*)
  >&2 echo "ERROR: Unsupported architecture: ${ARCH}"
  exit 1
  ;;
esac

FLYTECONSOLE_IMAGE="localhost:30000/flyteconsole:1216-2134"
IMAGE_DIGEST="$(docker manifest inspect --verbose localhost:30000/flyteconsole:1216-2134 | \
    jq --arg IMAGE_ARCH "${IMAGE_ARCH}" --raw-output \
      '.[] | select(.Descriptor.platform.architecture == $IMAGE_ARCH) | .Descriptor.digest')"

# Short circuit if we already have the correct distribution
[ -f cmd/single/dist/.digest ] && grep -Fxq ${IMAGE_DIGEST} cmd/single/dist/.digest && exit 0

# Create container from desired image
CONTAINER_ID=$(docker create localhost:30000/flyteconsole:1216-2134)
trap 'docker rm -f ${CONTAINER_ID}' EXIT

# Copy distribution
rm -rf cmd/single/dist
docker cp ${CONTAINER_ID}:/app cmd/single/dist
printf '%q' ${IMAGE_DIGEST} > cmd/single/dist/.digest

@flyte-bot
Copy link
Collaborator

flyte-bot commented Jan 17, 2025

Code Review Agent Run #daa4f1

Actionable Suggestions - 0
Review Details
  • Files reviewed - 11 · Commit Range: 69ba94e..c992eae
    • flyteidl/gen/pb-es/flyteidl/core/security_pb.ts
    • flyteidl/gen/pb-go/flyteidl/core/security.pb.go
    • flyteidl/gen/pb-js/flyteidl.d.ts
    • flyteidl/gen/pb-js/flyteidl.js
    • flyteidl/gen/pb_python/flyteidl/core/security_pb2.py
    • flyteidl/gen/pb_python/flyteidl/core/security_pb2.pyi
    • flyteidl/gen/pb_rust/flyteidl.core.rs
    • flyteidl/protos/flyteidl/core/security.proto
    • flytepropeller/pkg/webhook/k8s_secrets.go
    • flytepropeller/pkg/webhook/k8s_secrets_test.go
    • flytepropeller/pkg/webhook/utils.go
  • Files skipped - 4
    • flyteidl/clients/go/assets/admin.swagger.json - Reason: Filter setting
    • flyteidl/gen/pb-go/gateway/flyteidl/service/admin.swagger.json - Reason: Filter setting
    • flyteidl/gen/pb-go/gateway/flyteidl/service/agent.swagger.json - Reason: Filter setting
    • flyteidl/gen/pb-go/gateway/flyteidl/service/external_plugin_service.swagger.json - Reason: Filter setting
  • Tools
    • Golangci-lint (Linter) - ✖︎ Failed
    • Whispers (Secret Scanner) - ✔︎ Successful
    • Detect-secrets (Secret Scanner) - ✔︎ Successful

AI Code Review powered by Bito Logo

@Future-Outlier
Copy link
Member Author

Future-Outlier commented Jan 17, 2025

Hi, @eapolinario @pingsutw @wild-endeavor

Now all of these cases will be considered.
let's push this PR!

Condition Description Has Deck
Enabled and Running Yes
Unknown State with Deck Yes
Unknown State without Deck No
Enabled and Succeeded Yes
Enabled but Memory Exceeded No
Disabled No

Signed-off-by: Future-Outlier <[email protected]>
@flyte-bot
Copy link
Collaborator

flyte-bot commented Jan 17, 2025

Code Review Agent Run #dc455e

Actionable Suggestions - 5
  • flytepropeller/pkg/controller/nodes/task/handler.go - 4
  • flyteadmin/pkg/repositories/transformers/node_execution_test.go - 1
Review Details
  • Files reviewed - 2 · Commit Range: c992eae..1d18265
    • flyteadmin/pkg/repositories/transformers/node_execution_test.go
    • flytepropeller/pkg/controller/nodes/task/handler.go
  • Files skipped - 0
  • Tools
    • Golangci-lint (Linter) - ✖︎ Failed
    • Whispers (Secret Scanner) - ✔︎ Successful
    • Detect-secrets (Secret Scanner) - ✔︎ Successful

AI Code Review powered by Bito Logo

Comment on lines +557 to +562
if (deckStatus == DeckUnknown || deckStatus == DeckEnabled) && pluginTrns.pInfo.Phase().IsTerminal() {
if err := pluginTrns.RemoveDeckURIIfDeckNotExists(ctx, tCtx); err != nil {
logger.Errorf(ctx, "Failed to remove deck URI if deck does not exist. Error: %v", err)
}
}
}()
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Consider proper error handling for RemoveDeckURIIfDeckNotExists

Consider checking for errors from RemoveDeckURIIfDeckNotExists before proceeding with the task completion. The current implementation only logs the error but continues execution which could lead to inconsistent state.

Code suggestion
Check the AI-generated fix before applying
Suggested change
if (deckStatus == DeckUnknown || deckStatus == DeckEnabled) && pluginTrns.pInfo.Phase().IsTerminal() {
if err := pluginTrns.RemoveDeckURIIfDeckNotExists(ctx, tCtx); err != nil {
logger.Errorf(ctx, "Failed to remove deck URI if deck does not exist. Error: %v", err)
}
}
}()
if (deckStatus == DeckUnknown || deckStatus == DeckEnabled) && pluginTrns.pInfo.Phase().IsTerminal() {
if err := pluginTrns.RemoveDeckURIIfDeckNotExists(ctx, tCtx); err != nil {
logger.Errorf(ctx, "Failed to remove deck URI if deck does not exist. Error: %v", err)
// Return error to allow proper handling at higher levels
return pluginTrns, err
}
}
}
}()

Code Review Run #dc455e


Is this a valid issue, or was it incorrectly flagged by the Agent?

  • it was incorrectly flagged

Comment on lines +556 to +562
defer func() {
if (deckStatus == DeckUnknown || deckStatus == DeckEnabled) && pluginTrns.pInfo.Phase().IsTerminal() {
if err := pluginTrns.RemoveDeckURIIfDeckNotExists(ctx, tCtx); err != nil {
logger.Errorf(ctx, "Failed to remove deck URI if deck does not exist. Error: %v", err)
}
}
}()
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Consider extracting deck cleanup logic

Consider moving the deck URI cleanup logic to a separate function for better code organization and reusability. The deferred function could be simplified by extracting the logic into a named function.

Code suggestion
Check the AI-generated fix before applying
Suggested change
defer func() {
if (deckStatus == DeckUnknown || deckStatus == DeckEnabled) && pluginTrns.pInfo.Phase().IsTerminal() {
if err := pluginTrns.RemoveDeckURIIfDeckNotExists(ctx, tCtx); err != nil {
logger.Errorf(ctx, "Failed to remove deck URI if deck does not exist. Error: %v", err)
}
}
}()
defer cleanupDeckURI(ctx, tCtx, deckStatus, pluginTrns)
func cleanupDeckURI(ctx context.Context, tCtx *taskExecutionContext, deckStatus DeckStatus, pluginTrns *pluginRequestedTransition) {
if (deckStatus == DeckUnknown || deckStatus == DeckEnabled) && pluginTrns.pInfo.Phase().IsTerminal() {
if err := pluginTrns.RemoveDeckURIIfDeckNotExists(ctx, tCtx); err != nil {
logger.Errorf(ctx, "Failed to remove deck URI if deck does not exist. Error: %v", err)
}
}
}

Code Review Run #dc455e


Is this a valid issue, or was it incorrectly flagged by the Agent?

  • it was incorrectly flagged

exists, err := reader.DeckExists(ctx)
if err != nil {
logger.Errorf(ctx, "Failed to check deck file existence. Error: %v", err)
p.execInfo.OutputInfo.DeckURI = nil
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Consider nil check for OutputInfo

Consider initializing OutputInfo if it's nil before attempting to set DeckURI to avoid potential nil pointer dereference in RemoveDeckURIIfDeckNotExists

Code suggestion
Check the AI-generated fix before applying
 @@ -102,2 +102,5 @@
 		logger.Errorf(ctx, "Failed to check deck file existence. Error: %v", err)
 +		if p.execInfo.OutputInfo == nil {
 +			p.execInfo.OutputInfo = &handler.OutputInfo{}
 +		}
 		p.execInfo.OutputInfo.DeckURI = nil

Code Review Run #dc455e


Is this a valid issue, or was it incorrectly flagged by the Agent?

  • it was incorrectly flagged

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@Future-Outlier , does this suggestion make sense?

Copy link
Member Author

@Future-Outlier Future-Outlier left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

old flytekit screenshot.

image

Signed-off-by: Future-Outlier <[email protected]>
@flyte-bot
Copy link
Collaborator

flyte-bot commented Jan 22, 2025

Code Review Agent Run #b10317

Actionable Suggestions - 0
Review Details
  • Files reviewed - 1 · Commit Range: 1d18265..96500c1
    • flytepropeller/pkg/controller/nodes/task/handler.go
  • Files skipped - 0
  • Tools
    • Golangci-lint (Linter) - ✖︎ Failed
    • Whispers (Secret Scanner) - ✔︎ Successful
    • Detect-secrets (Secret Scanner) - ✔︎ Successful

AI Code Review powered by Bito Logo

eapolinario
eapolinario previously approved these changes Jan 23, 2025
Copy link
Contributor

@eapolinario eapolinario left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Looking good, just left one minor question, but won't block the change on it.

exists, err := reader.DeckExists(ctx)
if err != nil {
logger.Errorf(ctx, "Failed to check deck file existence. Error: %v", err)
p.execInfo.OutputInfo.DeckURI = nil
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@Future-Outlier , does this suggestion make sense?

switch pluginTrns.pInfo.Phase() {
case pluginCore.PhaseSuccess:
// This is to prevent the console from potentially checking the deck URI that does not exist if in final phase(PhaseSuccess).
err = pluginTrns.RemoveNonexistentDeckURI(ctx, tCtx)
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

just to just to close the loop on this, we're still making this HEAD call only when the node reaches the terminal phase.

@Future-Outlier
Copy link
Member Author

Looking good, just left one minor question, but won't block the change on it.

yes I should remove this line, thank you!

Signed-off-by: Future-Outlier <[email protected]>
Signed-off-by: Future-Outlier <[email protected]>
@flyte-bot
Copy link
Collaborator

flyte-bot commented Jan 23, 2025

Code Review Agent Run #c2d4d4

Actionable Suggestions - 0
Review Details
  • Files reviewed - 10 · Commit Range: 96500c1..bd5e682
    • charts/flyte-binary/values.yaml
    • charts/flyte-core/values.yaml
    • docker/sandbox-bundled/manifests/complete-agent.yaml
    • docker/sandbox-bundled/manifests/complete.yaml
    • docker/sandbox-bundled/manifests/dev.yaml
    • flyteplugins/go/tasks/plugins/webapi/agent/config.go
    • flyteplugins/go/tasks/plugins/webapi/agent/config_test.go
    • flytepropeller/pkg/compiler/transformers/k8s/utils.go
    • flytepropeller/pkg/compiler/transformers/k8s/utils_test.go
    • flytepropeller/pkg/controller/nodes/task/handler.go
  • Files skipped - 3
    • charts/flyte-binary/README.md - Reason: Filter setting
    • charts/flyte-core/README.md - Reason: Filter setting
    • docs/user_guide/flyte_agents/developing_agents.md - Reason: Filter setting
  • Tools
    • Golangci-lint (Linter) - ✖︎ Failed
    • Whispers (Secret Scanner) - ✔︎ Successful
    • Detect-secrets (Secret Scanner) - ✔︎ Successful

AI Code Review powered by Bito Logo

@Future-Outlier Future-Outlier enabled auto-merge (squash) January 23, 2025 02:38
if p.execInfo.OutputInfo != nil {
p.execInfo.OutputInfo.DeckURI = nil
}
p.execInfo.OutputInfo.DeckURI = nil
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

this is superfluous since in the case of OutputInfo being nil by definition DeckUri is going to be nil.

Signed-off-by: Future-Outlier <[email protected]>
Signed-off-by: Future-Outlier <[email protected]>
@Future-Outlier Future-Outlier merged commit da23c18 into master Jan 24, 2025
52 of 53 checks passed
@Future-Outlier Future-Outlier deleted the streaming-deck-v2 branch January 24, 2025 06:10
@flyte-bot
Copy link
Collaborator

flyte-bot commented Jan 24, 2025

Code Review Agent Run Status

  • Limitations and other issues: ❌ Failure - Bito Code Review Agent couldn't review this pull request because it is no longer valid. It may have been merged, or the source/target branch may not exist.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

7 participants