forked from toolshed/abra
		
	Compare commits
	
		
			158 Commits
		
	
	
		
			0.8.0-rc1-
			...
			main
		
	
	| Author | SHA1 | Date | |
|---|---|---|---|
| c5687dfbd7 | |||
| ca91abbed9 | |||
| d4727db8f9 | |||
| af8cd1f67a | |||
| cdd7516e54 | |||
| 99e3ed416f | |||
| 02b726db02 | |||
| 2de6934322 | |||
| cb49cf06d1 | |||
| 9affda8a70 | |||
| 3957b7c965 | |||
| 0d83339d80 | |||
| 6e54ec7213 | |||
| 66b40a9189 | |||
| 049f02f063 | |||
| 15857e6453 | |||
| 31e0ed75b0 | |||
| b1d3fcbb0b | |||
| 7b6134f35e | |||
| 316b59b465 | |||
| 92b073d5b6 | |||
| 9b0dd933b5 | |||
| f255fa1555 | |||
| 74200318ab | |||
| 609656b4e1 | |||
| 856c9f2f7d | |||
| bd5cdd3443 | |||
| 79d274e074 | |||
| 51e3df17f1 | |||
| ccf0215495 | |||
| 254df7f2be | |||
| 6a673ef101 | |||
| 7f7f7224c6 | |||
| f96bf9a8ac | |||
| dcecf32999 | |||
| bc88dac150 | |||
| 704c0e9c74 | |||
| c9bb7e15c2 | |||
| d90c9b88f1 | |||
| 69ce07f81f | |||
| 85b90ef80c | |||
| 3e511446aa | |||
| 7566b4262b | |||
| c249c6ae9c | |||
| be693e9df0 | |||
| a43125701c | |||
| b57edb440a | |||
| 6fc4573a71 | |||
| cbe6676881 | |||
| b4fd39828f | |||
| 14f2d72aba | |||
| 57692ec3c9 | |||
| 47d3b77003 | |||
| 8078e91e52 | |||
| dc5d3a8dd6 | |||
| ab6107610c | |||
| e837835e00 | |||
| c646263e9e | |||
| 422c642949 | |||
| 379915587c | |||
| 970ae0fc4e | |||
| d11ad61efb | |||
| 54dc696c69 | |||
| 7e3ce9c42a | |||
| 7751423c7d | |||
| f18f0b6f82 | |||
| 892f6c0730 | |||
| b53fd2689c | |||
| 906bf65d47 | |||
| 1e6a6e6174 | |||
| 1e4f1b4ade | |||
| 306fe02d1c | |||
| e4610f8ad5 | |||
| e1f900de14 | |||
| d5b18d74ef | |||
| 776a83d8d1 | |||
| 810cea8269 | |||
| c0f3e6f2a4 | |||
| 7b240059b0 | |||
| c456d13881 | |||
| c7c553164d | |||
| 7616528f4e | |||
| 6cd85f7239 | |||
| b1774cc44b | |||
| e438fc6e8e | |||
| c065ceb1f0 | |||
| ce4b775428 | |||
| d02f659bf8 | |||
| f3ded88ed8 | |||
| bf648eeb5d | |||
| 533edbf172 | |||
| 78b8cf9725 | |||
| f0560ca975 | |||
| ce7b4733d7 | |||
| 575bfbb0fb | |||
| 510ce66570 | |||
| 82631d9ab1 | |||
| 358490e939 | |||
| 79b9cc9be7 | |||
| 9b6eb613aa | |||
| 8f1231e409 | |||
| aa37c936eb | |||
| 3d1158a425 | |||
| 8788558cf1 | |||
| 76035e003e | |||
| b708382d26 | |||
| 557b670fc5 | |||
| e116148c49 | |||
| d5593b69e0 | |||
| 0be532692d | |||
| 7a9224b2b2 | |||
| e73d1a8359 | |||
| f8c49c82c8 | |||
| ab7edd2a62 | |||
| b1888dcf0f | |||
| e5e122296f | |||
| 83bf148304 | |||
| d80b882b83 | |||
| c345c6f5f1 | |||
| f8c4fd72a3 | |||
| 10f612f998 | |||
| 58e78e4d7c | |||
| 25258d3d64 | |||
| b3bd058962 | |||
| b4fd7fd77c | |||
| 64cfdae6b7 | |||
| 0a765794f2 | |||
| 18dc6e9434 | |||
| 4ba4107288 | |||
| d9b4f4ef3b | |||
| c365dcf96d | |||
| 0c6a7cc0b8 | |||
| 6640cfab64 | |||
| 71addcd1b2 | |||
| 60c0e55e3d | |||
| e42139fd83 | |||
| 2d826e47d0 | |||
| 2db172ea5a | |||
| 2077658f6a | |||
| 502e26b534 | |||
| e22b692ada | |||
| 5ae73f700e | |||
| 63d419caae | |||
| 179b66d65c | |||
| c9144d90f3 | |||
| ebf5d82c56 | |||
| 8bb98ed0ed | |||
| 23f5745cb8 | |||
| 2cd453ae8d | |||
| e42cc0f91d | |||
| 1de45a6508 | |||
| 55c7aca3c0 | |||
| 8fa9419c99 | |||
| 73ad0a802e | |||
| 798fd2336c | |||
| 70e65d6667 | |||
| efc9602808 | |||
| 1e110f1375 | 
| @ -1,4 +1,8 @@ | ||||
| Dockerfile | ||||
| .dockerignore | ||||
| *.swp | ||||
| *.swo | ||||
| *.swp | ||||
| .dockerignore | ||||
| Dockerfile | ||||
| abra | ||||
| dist | ||||
| kadabra | ||||
| tags | ||||
|  | ||||
							
								
								
									
										20
									
								
								.drone.yml
									
									
									
									
									
								
							
							
						
						
									
										20
									
								
								.drone.yml
									
									
									
									
									
								
							| @ -3,20 +3,17 @@ kind: pipeline | ||||
| name: coopcloud.tech/abra | ||||
| steps: | ||||
|   - name: make check | ||||
|     image: golang:1.20 | ||||
|     image: golang:1.21 | ||||
|     commands: | ||||
|       - make check | ||||
|  | ||||
|   - name: make build | ||||
|     image: golang:1.20 | ||||
|     commands: | ||||
|       - make build | ||||
|     depends_on: | ||||
|       - make check | ||||
|  | ||||
|   - name: make test | ||||
|     image: golang:1.20 | ||||
|     image: golang:1.21 | ||||
|     environment: | ||||
|       ABRA_DIR: "/root/.abra" | ||||
|     commands: | ||||
|       - make build-abra | ||||
|       - ./abra help # show version, initialise $ABRA_DIR | ||||
|       - make test | ||||
|     depends_on: | ||||
|       - make check | ||||
| @ -27,13 +24,12 @@ steps: | ||||
|       - git fetch --tags | ||||
|     depends_on: | ||||
|       - make check | ||||
|       - make build | ||||
|       - make test | ||||
|     when: | ||||
|       event: tag | ||||
|  | ||||
|   - name: release | ||||
|     image: golang:1.20 | ||||
|     image: goreleaser/goreleaser:v1.18.2 | ||||
|     environment: | ||||
|       GITEA_TOKEN: | ||||
|         from_secret: goreleaser_gitea_token | ||||
| @ -41,7 +37,7 @@ steps: | ||||
|       - name: deps | ||||
|         path: /go | ||||
|     commands: | ||||
|       - curl -sL https://git.io/goreleaser | bash | ||||
|       - goreleaser release | ||||
|     depends_on: | ||||
|       - fetch | ||||
|     when: | ||||
|  | ||||
| @ -1,4 +0,0 @@ | ||||
| GANDI_TOKEN=... | ||||
| HCLOUD_TOKEN=... | ||||
| REGISTRY_PASSWORD=... | ||||
| REGISTRY_USERNAME=... | ||||
| @ -1,6 +1,7 @@ | ||||
| go env -w GOPRIVATE=coopcloud.tech | ||||
|  | ||||
| # export PASSWORD_STORE_DIR=$(pwd)/../../autonomic/passwords/passwords/ | ||||
| # export HCLOUD_TOKEN=$(pass show logins/hetzner/cicd/api_key) | ||||
| # export CAPSUL_TOKEN=... | ||||
| # export GITEA_TOKEN=... | ||||
|  | ||||
| # export ABRA_DIR="$HOME/.abra_test" | ||||
| # export ABRA_TEST_DOMAIN=test.example.com | ||||
| # export ABRA_SKIP_TEARDOWN=1 # for faster feedback when developing tests | ||||
|  | ||||
							
								
								
									
										2
									
								
								.gitignore
									
									
									
									
										vendored
									
									
								
							
							
						
						
									
										2
									
								
								.gitignore
									
									
									
									
										vendored
									
									
								
							| @ -5,5 +5,5 @@ | ||||
| /kadabra | ||||
| abra | ||||
| dist/ | ||||
| tests/integration/.abra/catalogue | ||||
| tests/integration/.bats | ||||
| vendor/ | ||||
|  | ||||
| @ -52,12 +52,9 @@ builds: | ||||
|       - "-X 'main.Version={{ .Version }}'" | ||||
|  | ||||
| archives: | ||||
|   - name_template: >- | ||||
|       {{ .ProjectName }}_ | ||||
|       {{- title .Os }}_ | ||||
|       {{- if eq .Arch "amd64" }}x86_64 | ||||
|       {{- else if eq .Arch "386" }}i386 | ||||
|       {{- else }}{{ .Arch }}{{ end }} | ||||
|   - replacements: | ||||
|       386: i386 | ||||
|       amd64: x86_64 | ||||
|     format: binary | ||||
|  | ||||
| checksum: | ||||
|  | ||||
| @ -1,7 +1,7 @@ | ||||
| # authors | ||||
|  | ||||
| > If you're looking at this and you hack on `abra` and you're not listed here, | ||||
| > please do add yourself! This is a community project, let's show some :heart: | ||||
| > please do add yourself! This is a community project, let's show some 💞 | ||||
|  | ||||
| - 3wordchant | ||||
| - cassowary | ||||
| @ -11,6 +11,8 @@ | ||||
| - kawaiipunk | ||||
| - knoflook | ||||
| - moritz | ||||
| - p4u1 | ||||
| - rix | ||||
| - roxxers | ||||
| - vera | ||||
| - yksflip | ||||
|  | ||||
							
								
								
									
										11
									
								
								Dockerfile
									
									
									
									
									
								
							
							
						
						
									
										11
									
								
								Dockerfile
									
									
									
									
									
								
							| @ -1,8 +1,15 @@ | ||||
| FROM golang:1.20-alpine AS build | ||||
| FROM golang:1.21-alpine AS build | ||||
|  | ||||
| ENV GOPRIVATE coopcloud.tech | ||||
|  | ||||
| RUN apk add --no-cache make git gcc musl-dev | ||||
| RUN apk add --no-cache \ | ||||
|   ca-certificates \ | ||||
|   gcc \ | ||||
|   git \ | ||||
|   make \ | ||||
|   musl-dev | ||||
|  | ||||
| RUN update-ca-certificates | ||||
|  | ||||
| COPY . /app | ||||
|  | ||||
|  | ||||
							
								
								
									
										34
									
								
								Makefile
									
									
									
									
									
								
							
							
						
						
									
										34
									
								
								Makefile
									
									
									
									
									
								
							| @ -2,26 +2,41 @@ ABRA         := ./cmd/abra | ||||
| KADABRA      := ./cmd/kadabra | ||||
| COMMIT       := $(shell git rev-list -1 HEAD) | ||||
| GOPATH       := $(shell go env GOPATH) | ||||
| GOVERSION    := 1.21 | ||||
| LDFLAGS      := "-X 'main.Commit=$(COMMIT)'" | ||||
| DIST_LDFLAGS := $(LDFLAGS)" -s -w" | ||||
|  | ||||
| export GOPRIVATE=coopcloud.tech | ||||
|  | ||||
| all: format check build test | ||||
| # NOTE(d1): default `make` optimised for Abra hacking | ||||
| all: format check build-abra test | ||||
|  | ||||
| run: | ||||
| run-abra: | ||||
| 	@go run -ldflags=$(LDFLAGS) $(ABRA) | ||||
|  | ||||
| install: | ||||
| run-kadabra: | ||||
| 	@go run -ldflags=$(LDFLAGS) $(KADABRA) | ||||
|  | ||||
| install-abra: | ||||
| 	@go install -ldflags=$(LDFLAGS) $(ABRA) | ||||
|  | ||||
| build-dev: | ||||
| 	@go build -v -ldflags=$(LDFLAGS) $(ABRA) | ||||
| install-kadabra: | ||||
| 	@go install -ldflags=$(LDFLAGS) $(KADABRA) | ||||
|  | ||||
| build: | ||||
| build-abra: | ||||
| 	@go build -v -ldflags=$(DIST_LDFLAGS) $(ABRA) | ||||
|  | ||||
| build-kadabra: | ||||
| 	@go build -v -ldflags=$(DIST_LDFLAGS) $(KADABRA) | ||||
|  | ||||
| build: build-abra build-kadabra | ||||
|  | ||||
| build-docker-abra: | ||||
| 	@docker run -it -v $(PWD):/abra golang:$(GOVERSION) \ | ||||
| 		bash -c 'cd /abra; ./scripts/docker/build.sh' | ||||
|  | ||||
| build-docker: build-docker-abra | ||||
|  | ||||
| clean: | ||||
| 	@rm '$(GOPATH)/bin/abra' | ||||
| 	@rm '$(GOPATH)/bin/kadabra' | ||||
| @ -38,10 +53,3 @@ test: | ||||
|  | ||||
| loc: | ||||
| 	@find . -name "*.go" | xargs wc -l | ||||
|  | ||||
| loc-author: | ||||
| 	@git ls-files -z | \ | ||||
| 		xargs -0rn 1 -P "$$(nproc)" -I{} sh -c 'git blame -w -M -C -C --line-porcelain -- {} | grep -I --line-buffered "^author "' | \ | ||||
|    	sort -f | \ | ||||
|    	uniq -ic | \ | ||||
|    	sort -n | ||||
|  | ||||
| @ -8,6 +8,6 @@ The Co-op Cloud utility belt 🎩🐇 | ||||
|  | ||||
| <a href="https://github.com/egonelbre/gophers"><img align="right" width="150" src="https://github.com/egonelbre/gophers/raw/master/.thumb/sketch/adventure/poking-fire.png"/></a> | ||||
|  | ||||
| `abra` is the flagship client & command-line tool for Co-op Cloud. It has been developed specifically for the purpose of making the day-to-day operations of [operators](https://docs.coopcloud.tech/operators/) and [maintainers](https://docs.coopcloud.tech/maintainers/) pleasant & convenient. It is libre software, written in [Go](https://go.dev) and maintained and extended by the community :heart: | ||||
| `abra` is the flagship client & command-line tool for Co-op Cloud. It has been developed specifically for the purpose of making the day-to-day operations of [operators](https://docs.coopcloud.tech/operators/) and [maintainers](https://docs.coopcloud.tech/maintainers/) pleasant & convenient. It is libre software, written in [Go](https://go.dev) and maintained and extended by the community 💖 | ||||
|  | ||||
| Please see [docs.coopcloud.tech/abra](https://docs.coopcloud.tech/abra) for help on install, upgrade, hacking, troubleshooting & more! | ||||
|  | ||||
| @ -1,399 +1,296 @@ | ||||
| package app | ||||
|  | ||||
| import ( | ||||
| 	"archive/tar" | ||||
| 	"context" | ||||
| 	"fmt" | ||||
| 	"io" | ||||
| 	"os" | ||||
| 	"path/filepath" | ||||
| 	"strings" | ||||
| 	"time" | ||||
|  | ||||
| 	"coopcloud.tech/abra/cli/internal" | ||||
| 	"coopcloud.tech/abra/pkg/autocomplete" | ||||
| 	"coopcloud.tech/abra/pkg/client" | ||||
| 	"coopcloud.tech/abra/pkg/config" | ||||
| 	containerPkg "coopcloud.tech/abra/pkg/container" | ||||
| 	"coopcloud.tech/abra/pkg/recipe" | ||||
| 	"coopcloud.tech/abra/pkg/runtime" | ||||
| 	"coopcloud.tech/abra/pkg/upstream/container" | ||||
| 	"github.com/docker/cli/cli/command" | ||||
| 	"github.com/docker/docker/api/types" | ||||
| 	"github.com/docker/docker/api/types/filters" | ||||
| 	dockerClient "github.com/docker/docker/client" | ||||
| 	"github.com/docker/docker/pkg/archive" | ||||
| 	"github.com/klauspost/pgzip" | ||||
| 	"github.com/sirupsen/logrus" | ||||
| 	"github.com/urfave/cli" | ||||
| ) | ||||
|  | ||||
| type backupConfig struct { | ||||
| 	preHookCmd  string | ||||
| 	postHookCmd string | ||||
| 	backupPaths []string | ||||
| var snapshot string | ||||
| var snapshotFlag = &cli.StringFlag{ | ||||
| 	Name:        "snapshot, s", | ||||
| 	Usage:       "Lists specific snapshot", | ||||
| 	Destination: &snapshot, | ||||
| } | ||||
|  | ||||
| var appBackupCommand = cli.Command{ | ||||
| 	Name:      "backup", | ||||
| 	Aliases:   []string{"bk"}, | ||||
| 	Usage:     "Run app backup", | ||||
| 	ArgsUsage: "<domain> [<service>]", | ||||
| var includePath string | ||||
| var includePathFlag = &cli.StringFlag{ | ||||
| 	Name:        "path, p", | ||||
| 	Usage:       "Include path", | ||||
| 	Destination: &includePath, | ||||
| } | ||||
|  | ||||
| var resticRepo string | ||||
| var resticRepoFlag = &cli.StringFlag{ | ||||
| 	Name:        "repo, r", | ||||
| 	Usage:       "Restic repository", | ||||
| 	Destination: &resticRepo, | ||||
| } | ||||
|  | ||||
| var appBackupListCommand = cli.Command{ | ||||
| 	Name:    "list", | ||||
| 	Aliases: []string{"ls"}, | ||||
| 	Flags: []cli.Flag{ | ||||
| 		internal.DebugFlag, | ||||
| 		internal.OfflineFlag, | ||||
| 		snapshotFlag, | ||||
| 		includePathFlag, | ||||
| 	}, | ||||
| 	Before:       internal.SubCommandBefore, | ||||
| 	Usage:        "List all backups", | ||||
| 	BashComplete: autocomplete.AppNameComplete, | ||||
| 	Description: ` | ||||
| Run an app backup. | ||||
|  | ||||
| A backup command and pre/post hook commands are defined in the recipe | ||||
| configuration. Abra reads this configuration and run the comands in the context | ||||
| of the deployed services. Pass <service> if you only want to back up a single | ||||
| service. All backups are placed in the ~/.abra/backups directory. | ||||
|  | ||||
| A single backup file is produced for all backup paths specified for a service. | ||||
| If we have the following backup configuration: | ||||
|  | ||||
|     - "backupbot.backup.path=/var/lib/foo,/var/lib/bar" | ||||
|  | ||||
| And we run "abra app backup example.com app", Abra will produce a file that | ||||
| looks like: | ||||
|  | ||||
|     ~/.abra/backups/example_com_app_609341138.tar.gz | ||||
|  | ||||
| This file is a compressed archive which contains all backup paths. To see paths, run: | ||||
|  | ||||
|     tar -tf ~/.abra/backups/example_com_app_609341138.tar.gz | ||||
|  | ||||
| (Make sure to change the name of the backup file) | ||||
|  | ||||
| This single file can be used to restore your app. See "abra app restore" for more. | ||||
| `, | ||||
| 	Action: func(c *cli.Context) error { | ||||
| 		conf := runtime.New(runtime.WithOffline(internal.Offline)) | ||||
| 		app := internal.ValidateApp(c, conf) | ||||
| 		app := internal.ValidateApp(c) | ||||
|  | ||||
| 		if err := recipe.EnsureExists(app.Recipe); err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		if !internal.Chaos { | ||||
| 			if err := recipe.EnsureIsClean(app.Recipe); err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
|  | ||||
| 			if !internal.Offline { | ||||
| 				if err := recipe.EnsureUpToDate(app.Recipe); err != nil { | ||||
| 					logrus.Fatal(err) | ||||
| 				} | ||||
| 			} | ||||
|  | ||||
| 			if err := recipe.EnsureLatest(app.Recipe); err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
| 		} | ||||
|  | ||||
| 		cl, err := client.New(app.Server) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		recipe, err := recipe.Get(app.Recipe, conf) | ||||
| 		targetContainer, err := internal.RetrieveBackupBotContainer(cl) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		backupConfigs := make(map[string]backupConfig) | ||||
| 		for _, service := range recipe.Config.Services { | ||||
| 			if backupsEnabled, ok := service.Deploy.Labels["backupbot.backup"]; ok { | ||||
| 				if backupsEnabled == "true" { | ||||
| 					fullServiceName := fmt.Sprintf("%s_%s", app.StackName(), service.Name) | ||||
| 					bkConfig := backupConfig{} | ||||
|  | ||||
| 					logrus.Debugf("backup config detected for %s", fullServiceName) | ||||
|  | ||||
| 					if paths, ok := service.Deploy.Labels["backupbot.backup.path"]; ok { | ||||
| 						logrus.Debugf("detected backup paths for %s: %s", fullServiceName, paths) | ||||
| 						bkConfig.backupPaths = strings.Split(paths, ",") | ||||
| 					} | ||||
|  | ||||
| 					if preHookCmd, ok := service.Deploy.Labels["backupbot.backup.pre-hook"]; ok { | ||||
| 						logrus.Debugf("detected pre-hook command for %s: %s", fullServiceName, preHookCmd) | ||||
| 						bkConfig.preHookCmd = preHookCmd | ||||
| 					} | ||||
|  | ||||
| 					if postHookCmd, ok := service.Deploy.Labels["backupbot.backup.post-hook"]; ok { | ||||
| 						logrus.Debugf("detected post-hook command for %s: %s", fullServiceName, postHookCmd) | ||||
| 						bkConfig.postHookCmd = postHookCmd | ||||
| 					} | ||||
|  | ||||
| 					backupConfigs[service.Name] = bkConfig | ||||
| 				} | ||||
| 			} | ||||
| 		execEnv := []string{fmt.Sprintf("SERVICE=%s", app.Domain)} | ||||
| 		if snapshot != "" { | ||||
| 			logrus.Debugf("including SNAPSHOT=%s in backupbot exec invocation", snapshot) | ||||
| 			execEnv = append(execEnv, fmt.Sprintf("SNAPSHOT=%s", snapshot)) | ||||
| 		} | ||||
| 		if includePath != "" { | ||||
| 			logrus.Debugf("including INCLUDE_PATH=%s in backupbot exec invocation", includePath) | ||||
| 			execEnv = append(execEnv, fmt.Sprintf("INCLUDE_PATH=%s", includePath)) | ||||
| 		} | ||||
|  | ||||
| 		serviceName := c.Args().Get(1) | ||||
| 		if serviceName != "" { | ||||
| 			backupConfig, ok := backupConfigs[serviceName] | ||||
| 			if !ok { | ||||
| 				logrus.Fatalf("no backup config for %s? does %s exist?", serviceName, serviceName) | ||||
| 			} | ||||
|  | ||||
| 			logrus.Infof("running backup for the %s service", serviceName) | ||||
|  | ||||
| 			if err := runBackup(cl, app, serviceName, backupConfig); err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
| 		} else { | ||||
| 			if len(backupConfigs) == 0 { | ||||
| 				logrus.Fatalf("no backup configs discovered for %s?", app.Name) | ||||
| 			} | ||||
|  | ||||
| 			for serviceName, backupConfig := range backupConfigs { | ||||
| 				logrus.Infof("running backup for the %s service", serviceName) | ||||
|  | ||||
| 				if err := runBackup(cl, app, serviceName, backupConfig); err != nil { | ||||
| 					logrus.Fatal(err) | ||||
| 				} | ||||
| 			} | ||||
| 		if err := internal.RunBackupCmdRemote(cl, "ls", targetContainer.ID, execEnv); err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		return nil | ||||
| 	}, | ||||
| } | ||||
|  | ||||
| // TimeStamp generates a file name friendly timestamp. | ||||
| func TimeStamp() string { | ||||
| 	ts := time.Now().UTC().Format(time.RFC3339) | ||||
| 	return strings.Replace(ts, ":", "-", -1) | ||||
| } | ||||
| var appBackupDownloadCommand = cli.Command{ | ||||
| 	Name:    "download", | ||||
| 	Aliases: []string{"d"}, | ||||
| 	Flags: []cli.Flag{ | ||||
| 		internal.DebugFlag, | ||||
| 		internal.OfflineFlag, | ||||
| 		snapshotFlag, | ||||
| 		includePathFlag, | ||||
| 	}, | ||||
| 	Before:       internal.SubCommandBefore, | ||||
| 	Usage:        "Download a backup", | ||||
| 	BashComplete: autocomplete.AppNameComplete, | ||||
| 	Action: func(c *cli.Context) error { | ||||
| 		app := internal.ValidateApp(c) | ||||
|  | ||||
| // runBackup does the actual backup logic. | ||||
| func runBackup(cl *dockerClient.Client, app config.App, serviceName string, bkConfig backupConfig) error { | ||||
| 	if len(bkConfig.backupPaths) == 0 { | ||||
| 		return fmt.Errorf("backup paths are empty for %s?", serviceName) | ||||
| 	} | ||||
|  | ||||
| 	// FIXME: avoid instantiating a new CLI | ||||
| 	dcli, err := command.NewDockerCli() | ||||
| 	if err != nil { | ||||
| 		return err | ||||
| 	} | ||||
|  | ||||
| 	filters := filters.NewArgs() | ||||
| 	filters.Add("name", fmt.Sprintf("^%s_%s", app.StackName(), serviceName)) | ||||
|  | ||||
| 	targetContainer, err := containerPkg.GetContainer(context.Background(), cl, filters, true) | ||||
| 	if err != nil { | ||||
| 		return err | ||||
| 	} | ||||
|  | ||||
| 	fullServiceName := fmt.Sprintf("%s_%s", app.StackName(), serviceName) | ||||
| 	if bkConfig.preHookCmd != "" { | ||||
| 		splitCmd := internal.SafeSplit(bkConfig.preHookCmd) | ||||
|  | ||||
| 		logrus.Debugf("split pre-hook command for %s into %s", fullServiceName, splitCmd) | ||||
|  | ||||
| 		preHookExecOpts := types.ExecConfig{ | ||||
| 			AttachStderr: true, | ||||
| 			AttachStdin:  true, | ||||
| 			AttachStdout: true, | ||||
| 			Cmd:          splitCmd, | ||||
| 			Detach:       false, | ||||
| 			Tty:          true, | ||||
| 		if err := recipe.EnsureExists(app.Recipe); err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		if err := container.RunExec(dcli, cl, targetContainer.ID, &preHookExecOpts); err != nil { | ||||
| 			return fmt.Errorf("failed to run %s on %s: %s", bkConfig.preHookCmd, targetContainer.ID, err.Error()) | ||||
| 		if !internal.Chaos { | ||||
| 			if err := recipe.EnsureIsClean(app.Recipe); err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
|  | ||||
| 			if !internal.Offline { | ||||
| 				if err := recipe.EnsureUpToDate(app.Recipe); err != nil { | ||||
| 					logrus.Fatal(err) | ||||
| 				} | ||||
| 			} | ||||
|  | ||||
| 			if err := recipe.EnsureLatest(app.Recipe); err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
| 		} | ||||
|  | ||||
| 		logrus.Infof("succesfully ran %s pre-hook command: %s", fullServiceName, bkConfig.preHookCmd) | ||||
| 	} | ||||
|  | ||||
| 	var tempBackupPaths []string | ||||
| 	for _, remoteBackupPath := range bkConfig.backupPaths { | ||||
| 		sanitisedPath := strings.ReplaceAll(remoteBackupPath, "/", "_") | ||||
| 		localBackupPath := filepath.Join(config.BACKUP_DIR, fmt.Sprintf("%s%s_%s.tar.gz", fullServiceName, sanitisedPath, TimeStamp())) | ||||
| 		logrus.Debugf("temporarily backing up %s:%s to %s", fullServiceName, remoteBackupPath, localBackupPath) | ||||
|  | ||||
| 		logrus.Infof("backing up %s:%s", fullServiceName, remoteBackupPath) | ||||
|  | ||||
| 		content, _, err := cl.CopyFromContainer(context.Background(), targetContainer.ID, remoteBackupPath) | ||||
| 		cl, err := client.New(app.Server) | ||||
| 		if err != nil { | ||||
| 			logrus.Debugf("failed to copy %s from container: %s", remoteBackupPath, err.Error()) | ||||
| 			if err := cleanupTempArchives(tempBackupPaths); err != nil { | ||||
| 				return fmt.Errorf("failed to clean up temporary archives: %s", err.Error()) | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		targetContainer, err := internal.RetrieveBackupBotContainer(cl) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		execEnv := []string{fmt.Sprintf("SERVICE=%s", app.Domain)} | ||||
| 		if snapshot != "" { | ||||
| 			logrus.Debugf("including SNAPSHOT=%s in backupbot exec invocation", snapshot) | ||||
| 			execEnv = append(execEnv, fmt.Sprintf("SNAPSHOT=%s", snapshot)) | ||||
| 		} | ||||
| 		if includePath != "" { | ||||
| 			logrus.Debugf("including INCLUDE_PATH=%s in backupbot exec invocation", includePath) | ||||
| 			execEnv = append(execEnv, fmt.Sprintf("INCLUDE_PATH=%s", includePath)) | ||||
| 		} | ||||
|  | ||||
| 		if err := internal.RunBackupCmdRemote(cl, "download", targetContainer.ID, execEnv); err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		remoteBackupDir := "/tmp/backup.tar.gz" | ||||
| 		currentWorkingDir := "." | ||||
| 		if err = CopyFromContainer(cl, targetContainer.ID, remoteBackupDir, currentWorkingDir); err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		fmt.Println("backup successfully downloaded to current working directory") | ||||
|  | ||||
| 		return nil | ||||
| 	}, | ||||
| } | ||||
|  | ||||
| var appBackupCreateCommand = cli.Command{ | ||||
| 	Name:    "create", | ||||
| 	Aliases: []string{"c"}, | ||||
| 	Flags: []cli.Flag{ | ||||
| 		internal.DebugFlag, | ||||
| 		internal.OfflineFlag, | ||||
| 		resticRepoFlag, | ||||
| 	}, | ||||
| 	Before:       internal.SubCommandBefore, | ||||
| 	Usage:        "Create a new backup", | ||||
| 	BashComplete: autocomplete.AppNameComplete, | ||||
| 	Action: func(c *cli.Context) error { | ||||
| 		app := internal.ValidateApp(c) | ||||
|  | ||||
| 		if err := recipe.EnsureExists(app.Recipe); err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		if !internal.Chaos { | ||||
| 			if err := recipe.EnsureIsClean(app.Recipe); err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
| 			return fmt.Errorf("failed to copy %s from container: %s", remoteBackupPath, err.Error()) | ||||
| 		} | ||||
| 		defer content.Close() | ||||
|  | ||||
| 		_, srcBase := archive.SplitPathDirEntry(remoteBackupPath) | ||||
| 		preArchive := archive.RebaseArchiveEntries(content, srcBase, remoteBackupPath) | ||||
| 		if err := copyToFile(localBackupPath, preArchive); err != nil { | ||||
| 			logrus.Debugf("failed to create tar archive (%s): %s", localBackupPath, err.Error()) | ||||
| 			if err := cleanupTempArchives(tempBackupPaths); err != nil { | ||||
| 				return fmt.Errorf("failed to clean up temporary archives: %s", err.Error()) | ||||
| 			if !internal.Offline { | ||||
| 				if err := recipe.EnsureUpToDate(app.Recipe); err != nil { | ||||
| 					logrus.Fatal(err) | ||||
| 				} | ||||
| 			} | ||||
| 			return fmt.Errorf("failed to create tar archive (%s): %s", localBackupPath, err.Error()) | ||||
| 		} | ||||
|  | ||||
| 		tempBackupPaths = append(tempBackupPaths, localBackupPath) | ||||
| 	} | ||||
|  | ||||
| 	logrus.Infof("compressing and merging archives...") | ||||
|  | ||||
| 	if err := mergeArchives(tempBackupPaths, fullServiceName); err != nil { | ||||
| 		logrus.Debugf("failed to merge archive files: %s", err.Error()) | ||||
| 		if err := cleanupTempArchives(tempBackupPaths); err != nil { | ||||
| 			return fmt.Errorf("failed to clean up temporary archives: %s", err.Error()) | ||||
| 		} | ||||
| 		return fmt.Errorf("failed to merge archive files: %s", err.Error()) | ||||
| 	} | ||||
|  | ||||
| 	if err := cleanupTempArchives(tempBackupPaths); err != nil { | ||||
| 		return fmt.Errorf("failed to clean up temporary archives: %s", err.Error()) | ||||
| 	} | ||||
|  | ||||
| 	if bkConfig.postHookCmd != "" { | ||||
| 		splitCmd := internal.SafeSplit(bkConfig.postHookCmd) | ||||
|  | ||||
| 		logrus.Debugf("split post-hook command for %s into %s", fullServiceName, splitCmd) | ||||
|  | ||||
| 		postHookExecOpts := types.ExecConfig{ | ||||
| 			AttachStderr: true, | ||||
| 			AttachStdin:  true, | ||||
| 			AttachStdout: true, | ||||
| 			Cmd:          splitCmd, | ||||
| 			Detach:       false, | ||||
| 			Tty:          true, | ||||
| 		} | ||||
|  | ||||
| 		if err := container.RunExec(dcli, cl, targetContainer.ID, &postHookExecOpts); err != nil { | ||||
| 			return err | ||||
| 		} | ||||
|  | ||||
| 		logrus.Infof("succesfully ran %s post-hook command: %s", fullServiceName, bkConfig.postHookCmd) | ||||
| 	} | ||||
|  | ||||
| 	return nil | ||||
| } | ||||
|  | ||||
| func copyToFile(outfile string, r io.Reader) error { | ||||
| 	tmpFile, err := os.CreateTemp(filepath.Dir(outfile), ".tar_temp") | ||||
| 	if err != nil { | ||||
| 		return err | ||||
| 	} | ||||
|  | ||||
| 	tmpPath := tmpFile.Name() | ||||
|  | ||||
| 	_, err = io.Copy(tmpFile, r) | ||||
| 	tmpFile.Close() | ||||
|  | ||||
| 	if err != nil { | ||||
| 		os.Remove(tmpPath) | ||||
| 		return err | ||||
| 	} | ||||
|  | ||||
| 	if err = os.Rename(tmpPath, outfile); err != nil { | ||||
| 		os.Remove(tmpPath) | ||||
| 		return err | ||||
| 	} | ||||
|  | ||||
| 	return nil | ||||
| } | ||||
|  | ||||
| func cleanupTempArchives(tarPaths []string) error { | ||||
| 	for _, tarPath := range tarPaths { | ||||
| 		if err := os.RemoveAll(tarPath); err != nil { | ||||
| 			return err | ||||
| 		} | ||||
|  | ||||
| 		logrus.Debugf("remove temporary archive file %s", tarPath) | ||||
| 	} | ||||
|  | ||||
| 	return nil | ||||
| } | ||||
|  | ||||
| func mergeArchives(tarPaths []string, serviceName string) error { | ||||
| 	var out io.Writer | ||||
| 	var cout *pgzip.Writer | ||||
|  | ||||
| 	localBackupPath := filepath.Join(config.BACKUP_DIR, fmt.Sprintf("%s_%s.tar.gz", serviceName, TimeStamp())) | ||||
|  | ||||
| 	fout, err := os.Create(localBackupPath) | ||||
| 	if err != nil { | ||||
| 		return fmt.Errorf("Failed to open %s: %s", localBackupPath, err) | ||||
| 	} | ||||
|  | ||||
| 	defer fout.Close() | ||||
| 	out = fout | ||||
|  | ||||
| 	cout = pgzip.NewWriter(out) | ||||
| 	out = cout | ||||
|  | ||||
| 	tw := tar.NewWriter(out) | ||||
|  | ||||
| 	for _, tarPath := range tarPaths { | ||||
| 		if err := addTar(tw, tarPath); err != nil { | ||||
| 			return fmt.Errorf("failed to merge %s: %v", tarPath, err) | ||||
| 		} | ||||
| 	} | ||||
|  | ||||
| 	if err := tw.Close(); err != nil { | ||||
| 		return fmt.Errorf("failed to close tar writer %v", err) | ||||
| 	} | ||||
|  | ||||
| 	if cout != nil { | ||||
| 		if err := cout.Flush(); err != nil { | ||||
| 			return fmt.Errorf("failed to flush: %s", err) | ||||
| 		} else if err = cout.Close(); err != nil { | ||||
| 			return fmt.Errorf("failed to close compressed writer: %s", err) | ||||
| 		} | ||||
| 	} | ||||
|  | ||||
| 	logrus.Infof("backed up %s to %s", serviceName, localBackupPath) | ||||
|  | ||||
| 	return nil | ||||
| } | ||||
|  | ||||
| func addTar(tw *tar.Writer, pth string) (err error) { | ||||
| 	var tr *tar.Reader | ||||
| 	var rc io.ReadCloser | ||||
| 	var hdr *tar.Header | ||||
|  | ||||
| 	if tr, rc, err = openTarFile(pth); err != nil { | ||||
| 		return | ||||
| 	} | ||||
|  | ||||
| 	for { | ||||
| 		if hdr, err = tr.Next(); err != nil { | ||||
| 			if err == io.EOF { | ||||
| 				err = nil | ||||
| 			if err := recipe.EnsureLatest(app.Recipe); err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
| 			break | ||||
| 		} | ||||
| 		if err = tw.WriteHeader(hdr); err != nil { | ||||
| 			break | ||||
| 		} else if _, err = io.Copy(tw, tr); err != nil { | ||||
| 			break | ||||
|  | ||||
| 		cl, err := client.New(app.Server) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
| 	} | ||||
| 	if err == nil { | ||||
| 		err = rc.Close() | ||||
| 	} else { | ||||
| 		rc.Close() | ||||
| 	} | ||||
| 	return | ||||
|  | ||||
| 		targetContainer, err := internal.RetrieveBackupBotContainer(cl) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		execEnv := []string{fmt.Sprintf("SERVICE=%s", app.Domain)} | ||||
| 		if resticRepo != "" { | ||||
| 			logrus.Debugf("including RESTIC_REPO=%s in backupbot exec invocation", resticRepo) | ||||
| 			execEnv = append(execEnv, fmt.Sprintf("RESTIC_REPO=%s", resticRepo)) | ||||
| 		} | ||||
|  | ||||
| 		if err := internal.RunBackupCmdRemote(cl, "create", targetContainer.ID, execEnv); err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		return nil | ||||
| 	}, | ||||
| } | ||||
|  | ||||
| func openTarFile(pth string) (tr *tar.Reader, rc io.ReadCloser, err error) { | ||||
| 	var fin *os.File | ||||
| 	var n int | ||||
| 	buff := make([]byte, 1024) | ||||
| var appBackupSnapshotsCommand = cli.Command{ | ||||
| 	Name:    "snapshots", | ||||
| 	Aliases: []string{"s"}, | ||||
| 	Flags: []cli.Flag{ | ||||
| 		internal.DebugFlag, | ||||
| 		internal.OfflineFlag, | ||||
| 		snapshotFlag, | ||||
| 	}, | ||||
| 	Before:       internal.SubCommandBefore, | ||||
| 	Usage:        "List backup snapshots", | ||||
| 	BashComplete: autocomplete.AppNameComplete, | ||||
| 	Action: func(c *cli.Context) error { | ||||
| 		app := internal.ValidateApp(c) | ||||
|  | ||||
| 	if fin, err = os.Open(pth); err != nil { | ||||
| 		return | ||||
| 	} | ||||
| 		if err := recipe.EnsureExists(app.Recipe); err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 	if n, err = fin.Read(buff); err != nil { | ||||
| 		fin.Close() | ||||
| 		return | ||||
| 	} else if n == 0 { | ||||
| 		fin.Close() | ||||
| 		err = fmt.Errorf("%s is empty", pth) | ||||
| 		return | ||||
| 	} | ||||
| 		if !internal.Chaos { | ||||
| 			if err := recipe.EnsureIsClean(app.Recipe); err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
|  | ||||
| 	if _, err = fin.Seek(0, 0); err != nil { | ||||
| 		fin.Close() | ||||
| 		return | ||||
| 	} | ||||
| 			if !internal.Offline { | ||||
| 				if err := recipe.EnsureUpToDate(app.Recipe); err != nil { | ||||
| 					logrus.Fatal(err) | ||||
| 				} | ||||
| 			} | ||||
|  | ||||
| 	rc = fin | ||||
| 	tr = tar.NewReader(rc) | ||||
| 			if err := recipe.EnsureLatest(app.Recipe); err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
| 		} | ||||
|  | ||||
| 	return tr, rc, nil | ||||
| 		cl, err := client.New(app.Server) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		targetContainer, err := internal.RetrieveBackupBotContainer(cl) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		execEnv := []string{fmt.Sprintf("SERVICE=%s", app.Domain)} | ||||
| 		if snapshot != "" { | ||||
| 			logrus.Debugf("including SNAPSHOT=%s in backupbot exec invocation", snapshot) | ||||
| 			execEnv = append(execEnv, fmt.Sprintf("SNAPSHOT=%s", snapshot)) | ||||
| 		} | ||||
|  | ||||
| 		if err := internal.RunBackupCmdRemote(cl, "snapshots", targetContainer.ID, execEnv); err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		return nil | ||||
| 	}, | ||||
| } | ||||
|  | ||||
| var appBackupCommand = cli.Command{ | ||||
| 	Name:      "backup", | ||||
| 	Aliases:   []string{"b"}, | ||||
| 	Usage:     "Manage app backups", | ||||
| 	ArgsUsage: "<domain>", | ||||
| 	Subcommands: []cli.Command{ | ||||
| 		appBackupListCommand, | ||||
| 		appBackupSnapshotsCommand, | ||||
| 		appBackupDownloadCommand, | ||||
| 		appBackupCreateCommand, | ||||
| 	}, | ||||
| } | ||||
|  | ||||
| @ -1,60 +1,81 @@ | ||||
| package app | ||||
|  | ||||
| import ( | ||||
| 	"os" | ||||
| 	"path" | ||||
| 	"strings" | ||||
|  | ||||
| 	"coopcloud.tech/abra/cli/internal" | ||||
| 	"coopcloud.tech/abra/pkg/autocomplete" | ||||
| 	"coopcloud.tech/abra/pkg/config" | ||||
| 	"coopcloud.tech/abra/pkg/runtime" | ||||
| 	"coopcloud.tech/abra/pkg/formatter" | ||||
| 	"coopcloud.tech/abra/pkg/recipe" | ||||
| 	recipePkg "coopcloud.tech/abra/pkg/recipe" | ||||
| 	"github.com/sirupsen/logrus" | ||||
| 	"github.com/urfave/cli" | ||||
| ) | ||||
|  | ||||
| var appCheckCommand = cli.Command{ | ||||
| 	Name:      "check", | ||||
| 	Aliases:   []string{"chk"}, | ||||
| 	Usage:     "Check if app is configured correctly", | ||||
| 	Name:    "check", | ||||
| 	Aliases: []string{"chk"}, | ||||
| 	Usage:   "Ensure an app is well configured", | ||||
| 	Description: ` | ||||
| This command compares env vars in both the app ".env" and recipe ".env.sample" | ||||
| file. | ||||
|  | ||||
| The goal is to ensure that recipe ".env.sample" env vars are defined in your | ||||
| app ".env" file. Only env var definitions in the ".env.sample" which are | ||||
| uncommented, e.g. "FOO=bar" are checked. If an app ".env" file does not include | ||||
| these env vars, then "check" will complain. | ||||
|  | ||||
| Recipe maintainers may or may not provide defaults for env vars within their | ||||
| recipes regardless of commenting or not (e.g. through the use of | ||||
| ${FOO:<default>} syntax). "check" does not confirm or deny this for you.`, | ||||
| 	ArgsUsage: "<domain>", | ||||
| 	Flags: []cli.Flag{ | ||||
| 		internal.DebugFlag, | ||||
| 		internal.ChaosFlag, | ||||
| 		internal.OfflineFlag, | ||||
| 	}, | ||||
| 	Before: internal.SubCommandBefore, | ||||
| 	Before:       internal.SubCommandBefore, | ||||
| 	BashComplete: autocomplete.AppNameComplete, | ||||
| 	Action: func(c *cli.Context) error { | ||||
| 		conf := runtime.New(runtime.WithOffline(internal.Offline)) | ||||
| 		app := internal.ValidateApp(c, conf) | ||||
| 		app := internal.ValidateApp(c) | ||||
|  | ||||
| 		envSamplePath := path.Join(config.RECIPES_DIR, app.Recipe, ".env.sample") | ||||
| 		if _, err := os.Stat(envSamplePath); err != nil { | ||||
| 			if os.IsNotExist(err) { | ||||
| 				logrus.Fatalf("%s does not exist?", envSamplePath) | ||||
| 			} | ||||
| 		if err := recipe.EnsureExists(app.Recipe); err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		envSample, err := config.ReadEnv(envSamplePath) | ||||
| 		if !internal.Chaos { | ||||
| 			if err := recipePkg.EnsureIsClean(app.Recipe); err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
|  | ||||
| 			if !internal.Offline { | ||||
| 				if err := recipePkg.EnsureUpToDate(app.Recipe); err != nil { | ||||
| 					logrus.Fatal(err) | ||||
| 				} | ||||
| 			} | ||||
|  | ||||
| 			if err := recipePkg.EnsureLatest(app.Recipe); err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
| 		} | ||||
|  | ||||
| 		tableCol := []string{"recipe env sample", "app env"} | ||||
| 		table := formatter.CreateTable(tableCol) | ||||
|  | ||||
| 		envVars, err := config.CheckEnv(app) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		var missing []string | ||||
| 		for k := range envSample { | ||||
| 			if _, ok := app.Env[k]; !ok { | ||||
| 				missing = append(missing, k) | ||||
| 		for _, envVar := range envVars { | ||||
| 			if envVar.Present { | ||||
| 				table.Append([]string{envVar.Name, "✅"}) | ||||
| 			} else { | ||||
| 				table.Append([]string{envVar.Name, "❌"}) | ||||
| 			} | ||||
| 		} | ||||
|  | ||||
| 		if len(missing) > 0 { | ||||
| 			missingEnvVars := strings.Join(missing, ", ") | ||||
| 			logrus.Fatalf("%s is missing %s", app.Path, missingEnvVars) | ||||
| 		} | ||||
|  | ||||
| 		logrus.Infof("all necessary environment variables defined for %s", app.Name) | ||||
| 		table.Render() | ||||
|  | ||||
| 		return nil | ||||
| 	}, | ||||
| 	BashComplete: autocomplete.AppNameComplete, | ||||
| } | ||||
|  | ||||
							
								
								
									
										133
									
								
								cli/app/cmd.go
									
									
									
									
									
								
							
							
						
						
									
										133
									
								
								cli/app/cmd.go
									
									
									
									
									
								
							| @ -6,13 +6,16 @@ import ( | ||||
| 	"os" | ||||
| 	"os/exec" | ||||
| 	"path" | ||||
| 	"sort" | ||||
| 	"strings" | ||||
|  | ||||
| 	"coopcloud.tech/abra/cli/internal" | ||||
| 	"coopcloud.tech/abra/pkg/app" | ||||
| 	"coopcloud.tech/abra/pkg/autocomplete" | ||||
| 	"coopcloud.tech/abra/pkg/client" | ||||
| 	"coopcloud.tech/abra/pkg/config" | ||||
| 	"coopcloud.tech/abra/pkg/runtime" | ||||
| 	"coopcloud.tech/abra/pkg/recipe" | ||||
| 	recipePkg "coopcloud.tech/abra/pkg/recipe" | ||||
| 	"github.com/sirupsen/logrus" | ||||
| 	"github.com/urfave/cli" | ||||
| ) | ||||
| @ -21,8 +24,7 @@ var appCmdCommand = cli.Command{ | ||||
| 	Name:    "command", | ||||
| 	Aliases: []string{"cmd"}, | ||||
| 	Usage:   "Run app commands", | ||||
| 	Description: ` | ||||
| Run an app specific command. | ||||
| 	Description: `Run an app specific command. | ||||
|  | ||||
| These commands are bash functions, defined in the abra.sh of the recipe itself. | ||||
| They can be run within the context of a service (e.g. app) or locally on your | ||||
| @ -40,18 +42,44 @@ Example: | ||||
| 		internal.RemoteUserFlag, | ||||
| 		internal.TtyFlag, | ||||
| 		internal.OfflineFlag, | ||||
| 		internal.ChaosFlag, | ||||
| 	}, | ||||
| 	Before:      internal.SubCommandBefore, | ||||
| 	Subcommands: []cli.Command{appCmdListCommand}, | ||||
| 	BashComplete: func(ctx *cli.Context) { | ||||
| 		args := ctx.Args() | ||||
| 		switch len(args) { | ||||
| 		case 0: | ||||
| 			autocomplete.AppNameComplete(ctx) | ||||
| 		case 1: | ||||
| 			autocomplete.ServiceNameComplete(args.Get(0)) | ||||
| 		case 2: | ||||
| 			cmdNameComplete(args.Get(0)) | ||||
| 		} | ||||
| 	}, | ||||
| 	BashComplete: autocomplete.AppNameComplete, | ||||
| 	Before:       internal.SubCommandBefore, | ||||
| 	Action: func(c *cli.Context) error { | ||||
| 		conf := runtime.New(runtime.WithOffline(internal.Offline)) | ||||
| 		app := internal.ValidateApp(c, conf) | ||||
| 		app := internal.ValidateApp(c) | ||||
|  | ||||
| 		cl, err := client.New(app.Server) | ||||
| 		if err != nil { | ||||
| 		if err := recipe.EnsureExists(app.Recipe); err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		if !internal.Chaos { | ||||
| 			if err := recipePkg.EnsureIsClean(app.Recipe); err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
|  | ||||
| 			if !internal.Offline { | ||||
| 				if err := recipePkg.EnsureUpToDate(app.Recipe); err != nil { | ||||
| 					logrus.Fatal(err) | ||||
| 				} | ||||
| 			} | ||||
|  | ||||
| 			if err := recipePkg.EnsureLatest(app.Recipe); err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
| 		} | ||||
|  | ||||
| 		if internal.LocalCmd && internal.RemoteUser != "" { | ||||
| 			internal.ShowSubcommandHelpAndError(c, errors.New("cannot use --local & --user together")) | ||||
| 		} | ||||
| @ -67,6 +95,10 @@ Example: | ||||
| 		} | ||||
|  | ||||
| 		if internal.LocalCmd { | ||||
| 			if !(len(c.Args()) >= 2) { | ||||
| 				internal.ShowSubcommandHelpAndError(c, errors.New("missing arguments")) | ||||
| 			} | ||||
|  | ||||
| 			cmdName := c.Args().Get(1) | ||||
| 			if err := internal.EnsureCommand(abraSh, app.Recipe, cmdName); err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| @ -78,6 +110,7 @@ Example: | ||||
| 			for k, v := range app.Env { | ||||
| 				exportEnv = exportEnv + fmt.Sprintf("%s='%s'; ", k, v) | ||||
| 			} | ||||
|  | ||||
| 			var sourceAndExec string | ||||
| 			if hasCmdArgs { | ||||
| 				logrus.Debugf("parsed following command arguments: %s", parsedCmdArgs) | ||||
| @ -98,6 +131,10 @@ Example: | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
| 		} else { | ||||
| 			if !(len(c.Args()) >= 3) { | ||||
| 				internal.ShowSubcommandHelpAndError(c, errors.New("missing arguments")) | ||||
| 			} | ||||
|  | ||||
| 			targetServiceName := c.Args().Get(1) | ||||
|  | ||||
| 			cmdName := c.Args().Get(2) | ||||
| @ -129,6 +166,11 @@ Example: | ||||
| 				logrus.Debug("did not detect any command arguments") | ||||
| 			} | ||||
|  | ||||
| 			cl, err := client.New(app.Server) | ||||
| 			if err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
|  | ||||
| 			if err := internal.RunCmdRemote(cl, app, abraSh, targetServiceName, cmdName, parsedCmdArgs); err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
| @ -156,3 +198,76 @@ func parseCmdArgs(args []string, isLocal bool) (bool, string) { | ||||
|  | ||||
| 	return hasCmdArgs, parsedCmdArgs | ||||
| } | ||||
|  | ||||
| func cmdNameComplete(appName string) { | ||||
| 	app, err := app.Get(appName) | ||||
| 	if err != nil { | ||||
| 		return | ||||
| 	} | ||||
| 	cmdNames, _ := getShCmdNames(app) | ||||
| 	if err != nil { | ||||
| 		return | ||||
| 	} | ||||
| 	for _, n := range cmdNames { | ||||
| 		fmt.Println(n) | ||||
| 	} | ||||
| } | ||||
|  | ||||
| var appCmdListCommand = cli.Command{ | ||||
| 	Name:      "list", | ||||
| 	Aliases:   []string{"ls"}, | ||||
| 	Usage:     "List all available commands", | ||||
| 	ArgsUsage: "<domain>", | ||||
| 	Flags: []cli.Flag{ | ||||
| 		internal.DebugFlag, | ||||
| 		internal.OfflineFlag, | ||||
| 		internal.ChaosFlag, | ||||
| 	}, | ||||
| 	BashComplete: autocomplete.AppNameComplete, | ||||
| 	Before:       internal.SubCommandBefore, | ||||
| 	Action: func(c *cli.Context) error { | ||||
| 		app := internal.ValidateApp(c) | ||||
|  | ||||
| 		if err := recipe.EnsureExists(app.Recipe); err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		if !internal.Chaos { | ||||
| 			if err := recipePkg.EnsureIsClean(app.Recipe); err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
|  | ||||
| 			if !internal.Offline { | ||||
| 				if err := recipePkg.EnsureUpToDate(app.Recipe); err != nil { | ||||
| 					logrus.Fatal(err) | ||||
| 				} | ||||
| 			} | ||||
|  | ||||
| 			if err := recipePkg.EnsureLatest(app.Recipe); err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
| 		} | ||||
|  | ||||
| 		cmdNames, err := getShCmdNames(app) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		for _, cmdName := range cmdNames { | ||||
| 			fmt.Println(cmdName) | ||||
| 		} | ||||
|  | ||||
| 		return nil | ||||
| 	}, | ||||
| } | ||||
|  | ||||
| func getShCmdNames(app config.App) ([]string, error) { | ||||
| 	abraShPath := fmt.Sprintf("%s/%s/%s", config.RECIPES_DIR, app.Recipe, "abra.sh") | ||||
| 	cmdNames, err := config.ReadAbraShCmdNames(abraShPath) | ||||
| 	if err != nil { | ||||
| 		return nil, err | ||||
| 	} | ||||
|  | ||||
| 	sort.Strings(cmdNames) | ||||
| 	return cmdNames, nil | ||||
| } | ||||
|  | ||||
| @ -20,9 +20,9 @@ var appConfigCommand = cli.Command{ | ||||
| 	ArgsUsage: "<domain>", | ||||
| 	Flags: []cli.Flag{ | ||||
| 		internal.DebugFlag, | ||||
| 		internal.OfflineFlag, | ||||
| 	}, | ||||
| 	Before: internal.SubCommandBefore, | ||||
| 	Before:       internal.SubCommandBefore, | ||||
| 	BashComplete: autocomplete.AppNameComplete, | ||||
| 	Action: func(c *cli.Context) error { | ||||
| 		appName := c.Args().First() | ||||
|  | ||||
| @ -61,5 +61,4 @@ var appConfigCommand = cli.Command{ | ||||
|  | ||||
| 		return nil | ||||
| 	}, | ||||
| 	BashComplete: autocomplete.AppNameComplete, | ||||
| } | ||||
|  | ||||
							
								
								
									
										393
									
								
								cli/app/cp.go
									
									
									
									
									
								
							
							
						
						
									
										393
									
								
								cli/app/cp.go
									
									
									
									
									
								
							| @ -2,20 +2,24 @@ package app | ||||
|  | ||||
| import ( | ||||
| 	"context" | ||||
| 	"errors" | ||||
| 	"fmt" | ||||
| 	"io" | ||||
| 	"os" | ||||
| 	"path" | ||||
| 	"path/filepath" | ||||
| 	"strings" | ||||
|  | ||||
| 	"coopcloud.tech/abra/cli/internal" | ||||
| 	"coopcloud.tech/abra/pkg/autocomplete" | ||||
| 	"coopcloud.tech/abra/pkg/client" | ||||
| 	"coopcloud.tech/abra/pkg/config" | ||||
| 	"coopcloud.tech/abra/pkg/container" | ||||
| 	containerPkg "coopcloud.tech/abra/pkg/container" | ||||
| 	"coopcloud.tech/abra/pkg/formatter" | ||||
| 	"coopcloud.tech/abra/pkg/runtime" | ||||
| 	"coopcloud.tech/abra/pkg/upstream/container" | ||||
| 	"github.com/docker/cli/cli/command" | ||||
| 	"github.com/docker/docker/api/types" | ||||
| 	"github.com/docker/docker/api/types/filters" | ||||
| 	dockerClient "github.com/docker/docker/client" | ||||
| 	"github.com/docker/docker/errdefs" | ||||
| 	"github.com/docker/docker/pkg/archive" | ||||
| 	"github.com/sirupsen/logrus" | ||||
| 	"github.com/urfave/cli" | ||||
| @ -28,10 +32,9 @@ var appCpCommand = cli.Command{ | ||||
| 	Flags: []cli.Flag{ | ||||
| 		internal.DebugFlag, | ||||
| 		internal.NoInputFlag, | ||||
| 		internal.OfflineFlag, | ||||
| 	}, | ||||
| 	Before: internal.SubCommandBefore, | ||||
| 	Usage:  "Copy files to/from a running app service", | ||||
| 	Usage:  "Copy files to/from a deployed app service", | ||||
| 	Description: ` | ||||
| Copy files to and from any app service file system. | ||||
|  | ||||
| @ -41,116 +44,336 @@ If you want to copy a myfile.txt to the root of the app service: | ||||
|  | ||||
| And if you want to copy that file back to your current working directory locally: | ||||
|  | ||||
| 		abra app cp <domain> app:/myfile.txt . | ||||
|     abra app cp <domain> app:/myfile.txt . | ||||
| `, | ||||
| 	BashComplete: autocomplete.AppNameComplete, | ||||
| 	Action: func(c *cli.Context) error { | ||||
| 		conf := runtime.New(runtime.WithOffline(internal.Offline)) | ||||
| 		app := internal.ValidateApp(c, conf) | ||||
| 		app := internal.ValidateApp(c) | ||||
|  | ||||
| 		src := c.Args().Get(1) | ||||
| 		dst := c.Args().Get(2) | ||||
| 		if src == "" { | ||||
| 			logrus.Fatal("missing <src> argument") | ||||
| 		} | ||||
| 		if dst == "" { | ||||
| 			logrus.Fatal("missing <dest> argument") | ||||
| 		} | ||||
|  | ||||
| 		srcPath, dstPath, service, toContainer, err := parseSrcAndDst(src, dst) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		cl, err := client.New(app.Server) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		src := c.Args().Get(1) | ||||
| 		dst := c.Args().Get(2) | ||||
| 		if src == "" { | ||||
| 			logrus.Fatal("missing <src> argument") | ||||
| 		} else if dst == "" { | ||||
| 			logrus.Fatal("missing <dest> argument") | ||||
| 		container, err := containerPkg.GetContainerFromStackAndService(cl, app.StackName(), service) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
| 		logrus.Debugf("retrieved %s as target container on %s", formatter.ShortenID(container.ID), app.Server) | ||||
|  | ||||
| 		parsedSrc := strings.SplitN(src, ":", 2) | ||||
| 		parsedDst := strings.SplitN(dst, ":", 2) | ||||
| 		errorMsg := "one of <src>/<dest> arguments must take $SERVICE:$PATH form" | ||||
| 		if len(parsedSrc) == 2 && len(parsedDst) == 2 { | ||||
| 			logrus.Fatal(errorMsg) | ||||
| 		} else if len(parsedSrc) != 2 { | ||||
| 			if len(parsedDst) != 2 { | ||||
| 				logrus.Fatal(errorMsg) | ||||
| 			} | ||||
| 		} else if len(parsedDst) != 2 { | ||||
| 			if len(parsedSrc) != 2 { | ||||
| 				logrus.Fatal(errorMsg) | ||||
| 			} | ||||
| 		if toContainer { | ||||
| 			err = CopyToContainer(cl, container.ID, srcPath, dstPath) | ||||
| 		} else { | ||||
| 			err = CopyFromContainer(cl, container.ID, srcPath, dstPath) | ||||
| 		} | ||||
|  | ||||
| 		var service string | ||||
| 		var srcPath string | ||||
| 		var dstPath string | ||||
| 		isToContainer := false // <container:src> <dst> | ||||
| 		if len(parsedSrc) == 2 { | ||||
| 			service = parsedSrc[0] | ||||
| 			srcPath = parsedSrc[1] | ||||
| 			dstPath = dst | ||||
| 			logrus.Debugf("assuming transfer is coming FROM the container") | ||||
| 		} else if len(parsedDst) == 2 { | ||||
| 			service = parsedDst[0] | ||||
| 			dstPath = parsedDst[1] | ||||
| 			srcPath = src | ||||
| 			isToContainer = true // <src> <container:dst> | ||||
| 			logrus.Debugf("assuming transfer is going TO the container") | ||||
| 		} | ||||
|  | ||||
| 		if !isToContainer { | ||||
| 			if _, err := os.Stat(dstPath); os.IsNotExist(err) { | ||||
| 				logrus.Fatalf("%s does not exist locally?", dstPath) | ||||
| 			} | ||||
| 		} | ||||
|  | ||||
| 		if err := configureAndCp(c, cl, app, srcPath, dstPath, service, isToContainer); err != nil { | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		return nil | ||||
| 	}, | ||||
| 	BashComplete: autocomplete.AppNameComplete, | ||||
| } | ||||
|  | ||||
| func configureAndCp( | ||||
| 	c *cli.Context, | ||||
| 	cl *dockerClient.Client, | ||||
| 	app config.App, | ||||
| 	srcPath string, | ||||
| 	dstPath string, | ||||
| 	service string, | ||||
| 	isToContainer bool) error { | ||||
| 	filters := filters.NewArgs() | ||||
| 	filters.Add("name", fmt.Sprintf("^%s_%s", app.StackName(), service)) | ||||
| var errServiceMissing = errors.New("one of <src>/<dest> arguments must take $SERVICE:$PATH form") | ||||
|  | ||||
| 	container, err := container.GetContainer(context.Background(), cl, filters, internal.NoInput) | ||||
| // parseSrcAndDst parses src and dest string. One of src or dst must be of the form $SERVICE:$PATH | ||||
| func parseSrcAndDst(src, dst string) (srcPath string, dstPath string, service string, toContainer bool, err error) { | ||||
| 	parsedSrc := strings.SplitN(src, ":", 2) | ||||
| 	parsedDst := strings.SplitN(dst, ":", 2) | ||||
| 	if len(parsedSrc)+len(parsedDst) != 3 { | ||||
| 		return "", "", "", false, errServiceMissing | ||||
| 	} | ||||
| 	if len(parsedSrc) == 2 { | ||||
| 		return parsedSrc[1], dst, parsedSrc[0], false, nil | ||||
| 	} | ||||
| 	if len(parsedDst) == 2 { | ||||
| 		return src, parsedDst[1], parsedDst[0], true, nil | ||||
| 	} | ||||
| 	return "", "", "", false, errServiceMissing | ||||
| } | ||||
|  | ||||
| // CopyToContainer copies a file or directory from the local file system to the container. | ||||
| // See the possible copy modes and their documentation. | ||||
| func CopyToContainer(cl *dockerClient.Client, containerID, srcPath, dstPath string) error { | ||||
| 	srcStat, err := os.Stat(srcPath) | ||||
| 	if err != nil { | ||||
| 		logrus.Fatal(err) | ||||
| 		return fmt.Errorf("local %s ", err) | ||||
| 	} | ||||
|  | ||||
| 	logrus.Debugf("retrieved %s as target container on %s", formatter.ShortenID(container.ID), app.Server) | ||||
|  | ||||
| 	if isToContainer { | ||||
| 		if _, err := os.Stat(srcPath); err != nil { | ||||
| 			logrus.Fatalf("%s does not exist?", srcPath) | ||||
| 	dstStat, err := cl.ContainerStatPath(context.Background(), containerID, dstPath) | ||||
| 	dstExists := true | ||||
| 	if err != nil { | ||||
| 		if errdefs.IsNotFound(err) { | ||||
| 			dstExists = false | ||||
| 		} else { | ||||
| 			return fmt.Errorf("remote path: %s", err) | ||||
| 		} | ||||
| 	} | ||||
|  | ||||
| 		toTarOpts := &archive.TarOptions{NoOverwriteDirNonDir: true, Compression: archive.Gzip} | ||||
| 		content, err := archive.TarWithOptions(srcPath, toTarOpts) | ||||
| 	mode, err := copyMode(srcPath, dstPath, srcStat.Mode(), dstStat.Mode, dstExists) | ||||
| 	if err != nil { | ||||
| 		return err | ||||
| 	} | ||||
| 	movePath := "" | ||||
| 	switch mode { | ||||
| 	case CopyModeDirToDir: | ||||
| 		// Add the src directory to the destination path | ||||
| 		_, srcDir := path.Split(srcPath) | ||||
| 		dstPath = path.Join(dstPath, srcDir) | ||||
|  | ||||
| 		// Make sure the dst directory exits. | ||||
| 		dcli, err := command.NewDockerCli() | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 			return err | ||||
| 		} | ||||
| 		if _, err := container.RunExec(dcli, cl, containerID, &types.ExecConfig{ | ||||
| 			AttachStderr: true, | ||||
| 			AttachStdin:  true, | ||||
| 			AttachStdout: true, | ||||
| 			Cmd:          []string{"mkdir", "-p", dstPath}, | ||||
| 			Detach:       false, | ||||
| 			Tty:          true, | ||||
| 		}); err != nil { | ||||
| 			return fmt.Errorf("create remote directory: %s", err) | ||||
| 		} | ||||
| 	case CopyModeFileToFile: | ||||
| 		// Remove the file component from the path, since docker can only copy | ||||
| 		// to a directory. | ||||
| 		dstPath, _ = path.Split(dstPath) | ||||
| 	case CopyModeFileToFileRename: | ||||
| 		// Copy the file to the temp directory and move it to its dstPath | ||||
| 		// afterwards. | ||||
| 		movePath = dstPath | ||||
| 		dstPath = "/tmp" | ||||
| 	} | ||||
|  | ||||
| 		copyOpts := types.CopyToContainerOptions{AllowOverwriteDirWithFile: false, CopyUIDGID: false} | ||||
| 		if err := cl.CopyToContainer(context.Background(), container.ID, dstPath, content, copyOpts); err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
| 	} else { | ||||
| 		content, _, err := cl.CopyFromContainer(context.Background(), container.ID, srcPath) | ||||
| 	toTarOpts := &archive.TarOptions{IncludeSourceDir: true, NoOverwriteDirNonDir: true, Compression: archive.Gzip} | ||||
| 	content, err := archive.TarWithOptions(srcPath, toTarOpts) | ||||
| 	if err != nil { | ||||
| 		return err | ||||
| 	} | ||||
|  | ||||
| 	logrus.Debugf("copy %s from local to %s on container", srcPath, dstPath) | ||||
| 	copyOpts := types.CopyToContainerOptions{AllowOverwriteDirWithFile: false, CopyUIDGID: false} | ||||
| 	if err := cl.CopyToContainer(context.Background(), containerID, dstPath, content, copyOpts); err != nil { | ||||
| 		return err | ||||
| 	} | ||||
|  | ||||
| 	if movePath != "" { | ||||
| 		_, srcFile := path.Split(srcPath) | ||||
| 		dcli, err := command.NewDockerCli() | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 			return err | ||||
| 		} | ||||
| 		defer content.Close() | ||||
| 		fromTarOpts := &archive.TarOptions{NoOverwriteDirNonDir: true, Compression: archive.Gzip} | ||||
| 		if err := archive.Untar(content, dstPath, fromTarOpts); err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		if _, err := container.RunExec(dcli, cl, containerID, &types.ExecConfig{ | ||||
| 			AttachStderr: true, | ||||
| 			AttachStdin:  true, | ||||
| 			AttachStdout: true, | ||||
| 			Cmd:          []string{"mv", path.Join("/tmp", srcFile), movePath}, | ||||
| 			Detach:       false, | ||||
| 			Tty:          true, | ||||
| 		}); err != nil { | ||||
| 			return fmt.Errorf("create remote directory: %s", err) | ||||
| 		} | ||||
| 	} | ||||
|  | ||||
| 	return nil | ||||
| } | ||||
|  | ||||
| // CopyFromContainer copies a file or directory from the given container to the local file system. | ||||
| // See the possible copy modes and their documentation. | ||||
| func CopyFromContainer(cl *dockerClient.Client, containerID, srcPath, dstPath string) error { | ||||
| 	srcStat, err := cl.ContainerStatPath(context.Background(), containerID, srcPath) | ||||
| 	if err != nil { | ||||
| 		if errdefs.IsNotFound(err) { | ||||
| 			return fmt.Errorf("remote: %s does not exist", srcPath) | ||||
| 		} else { | ||||
| 			return fmt.Errorf("remote path: %s", err) | ||||
| 		} | ||||
| 	} | ||||
|  | ||||
| 	dstStat, err := os.Stat(dstPath) | ||||
| 	dstExists := true | ||||
| 	var dstMode os.FileMode | ||||
| 	if err != nil { | ||||
| 		if os.IsNotExist(err) { | ||||
| 			dstExists = false | ||||
| 		} else { | ||||
| 			return fmt.Errorf("remote path: %s", err) | ||||
| 		} | ||||
| 	} else { | ||||
| 		dstMode = dstStat.Mode() | ||||
| 	} | ||||
|  | ||||
| 	mode, err := copyMode(srcPath, dstPath, srcStat.Mode, dstMode, dstExists) | ||||
| 	if err != nil { | ||||
| 		return err | ||||
| 	} | ||||
|  | ||||
| 	moveDstDir := "" | ||||
| 	moveDstFile := "" | ||||
| 	switch mode { | ||||
| 	case CopyModeFileToFile: | ||||
| 		// Remove the file component from the path, since docker can only copy | ||||
| 		// to a directory. | ||||
| 		dstPath, _ = path.Split(dstPath) | ||||
| 	case CopyModeFileToFileRename: | ||||
| 		// Copy the file to the temp directory and move it to its dstPath | ||||
| 		// afterwards. | ||||
| 		moveDstFile = dstPath | ||||
| 		dstPath = "/tmp" | ||||
| 	case CopyModeFilesToDir: | ||||
| 		// Copy the directory to the temp directory and move it to its | ||||
| 		// dstPath afterwards. | ||||
| 		moveDstDir = path.Join(dstPath, "/") | ||||
| 		dstPath = "/tmp" | ||||
|  | ||||
| 		// Make sure the temp directory always gets removed | ||||
| 		defer os.Remove(path.Join("/tmp")) | ||||
| 	} | ||||
|  | ||||
| 	content, _, err := cl.CopyFromContainer(context.Background(), containerID, srcPath) | ||||
| 	if err != nil { | ||||
| 		return fmt.Errorf("copy: %s", err) | ||||
| 	} | ||||
| 	defer content.Close() | ||||
| 	if err := archive.Untar(content, dstPath, &archive.TarOptions{ | ||||
| 		NoOverwriteDirNonDir: true, | ||||
| 		Compression:          archive.Gzip, | ||||
| 		NoLchown:             true, | ||||
| 	}); err != nil { | ||||
| 		return fmt.Errorf("untar: %s", err) | ||||
| 	} | ||||
|  | ||||
| 	if moveDstFile != "" { | ||||
| 		_, srcFile := path.Split(strings.TrimSuffix(srcPath, "/")) | ||||
| 		if err := moveFile(path.Join("/tmp", srcFile), moveDstFile); err != nil { | ||||
| 			return err | ||||
| 		} | ||||
| 	} | ||||
| 	if moveDstDir != "" { | ||||
| 		_, srcDir := path.Split(strings.TrimSuffix(srcPath, "/")) | ||||
| 		if err := moveDir(path.Join("/tmp", srcDir), moveDstDir); err != nil { | ||||
| 			return err | ||||
| 		} | ||||
| 	} | ||||
| 	return nil | ||||
| } | ||||
|  | ||||
| var ( | ||||
| 	ErrCopyDirToFile  = fmt.Errorf("can't copy dir to file") | ||||
| 	ErrDstDirNotExist = fmt.Errorf("destination directory does not exist") | ||||
| ) | ||||
|  | ||||
| type CopyMode int | ||||
|  | ||||
| const ( | ||||
| 	// Copy a src file to a dest file. The src and dest file names are the same. | ||||
| 	//  <dir_src>/<file> + <dir_dst>/<file> -> <dir_dst>/<file> | ||||
| 	CopyModeFileToFile = CopyMode(iota) | ||||
| 	// Copy a src file to a dest file. The src and dest file names are  not the same. | ||||
| 	//  <dir_src>/<file_src> + <dir_dst>/<file_dst> -> <dir_dst>/<file_dst> | ||||
| 	CopyModeFileToFileRename | ||||
| 	// Copy a src file to dest directory. The dest file gets created in the dest | ||||
| 	// folder with the src filename. | ||||
| 	//  <dir_src>/<file> + <dir_dst> -> <dir_dst>/<file> | ||||
| 	CopyModeFileToDir | ||||
| 	// Copy a src directory to dest directory. | ||||
| 	//  <dir_src> + <dir_dst> -> <dir_dst>/<dir_src> | ||||
| 	CopyModeDirToDir | ||||
| 	// Copy all files in the src directory to the dest directory. This works recursively. | ||||
| 	//  <dir_src>/ + <dir_dst> -> <dir_dst>/<files_from_dir_src> | ||||
| 	CopyModeFilesToDir | ||||
| ) | ||||
|  | ||||
| // copyMode takes a src and dest path and file mode to determine the copy mode. | ||||
| // See the possible copy modes and their documentation. | ||||
| func copyMode(srcPath, dstPath string, srcMode os.FileMode, dstMode os.FileMode, dstExists bool) (CopyMode, error) { | ||||
| 	_, srcFile := path.Split(srcPath) | ||||
| 	_, dstFile := path.Split(dstPath) | ||||
| 	if srcMode.IsDir() { | ||||
| 		if !dstExists { | ||||
| 			return -1, ErrDstDirNotExist | ||||
| 		} | ||||
| 		if dstMode.IsDir() { | ||||
| 			if strings.HasSuffix(srcPath, "/") { | ||||
| 				return CopyModeFilesToDir, nil | ||||
| 			} | ||||
| 			return CopyModeDirToDir, nil | ||||
| 		} | ||||
| 		return -1, ErrCopyDirToFile | ||||
| 	} | ||||
|  | ||||
| 	if dstMode.IsDir() { | ||||
| 		return CopyModeFileToDir, nil | ||||
| 	} | ||||
|  | ||||
| 	if srcFile != dstFile { | ||||
| 		return CopyModeFileToFileRename, nil | ||||
| 	} | ||||
|  | ||||
| 	return CopyModeFileToFile, nil | ||||
| } | ||||
|  | ||||
| // moveDir moves all files from a source path to the destination path recursively. | ||||
| func moveDir(sourcePath, destPath string) error { | ||||
| 	return filepath.Walk(sourcePath, func(p string, info os.FileInfo, err error) error { | ||||
| 		if err != nil { | ||||
| 			return err | ||||
| 		} | ||||
| 		newPath := path.Join(destPath, strings.TrimPrefix(p, sourcePath)) | ||||
| 		if info.IsDir() { | ||||
| 			err := os.Mkdir(newPath, info.Mode()) | ||||
| 			if err != nil { | ||||
| 				if os.IsExist(err) { | ||||
| 					return nil | ||||
| 				} | ||||
| 				return err | ||||
| 			} | ||||
| 		} | ||||
| 		if info.Mode().IsRegular() { | ||||
| 			return moveFile(p, newPath) | ||||
| 		} | ||||
| 		return nil | ||||
| 	}) | ||||
| } | ||||
|  | ||||
| // moveFile moves a file from a source path to a destination path. | ||||
| func moveFile(sourcePath, destPath string) error { | ||||
| 	inputFile, err := os.Open(sourcePath) | ||||
| 	if err != nil { | ||||
| 		return err | ||||
| 	} | ||||
| 	outputFile, err := os.Create(destPath) | ||||
| 	if err != nil { | ||||
| 		inputFile.Close() | ||||
| 		return err | ||||
| 	} | ||||
| 	defer outputFile.Close() | ||||
| 	_, err = io.Copy(outputFile, inputFile) | ||||
| 	inputFile.Close() | ||||
| 	if err != nil { | ||||
| 		return err | ||||
| 	} | ||||
|  | ||||
| 	// Remove file after succesfull copy. | ||||
| 	err = os.Remove(sourcePath) | ||||
| 	if err != nil { | ||||
| 		return err | ||||
| 	} | ||||
| 	return nil | ||||
| } | ||||
|  | ||||
							
								
								
									
										113
									
								
								cli/app/cp_test.go
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										113
									
								
								cli/app/cp_test.go
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,113 @@ | ||||
| package app | ||||
|  | ||||
| import ( | ||||
| 	"os" | ||||
| 	"testing" | ||||
| ) | ||||
|  | ||||
| func TestParse(t *testing.T) { | ||||
| 	tests := []struct { | ||||
| 		src         string | ||||
| 		dst         string | ||||
| 		srcPath     string | ||||
| 		dstPath     string | ||||
| 		service     string | ||||
| 		toContainer bool | ||||
| 		err         error | ||||
| 	}{ | ||||
| 		{src: "foo", dst: "bar", err: errServiceMissing}, | ||||
| 		{src: "app:foo", dst: "app:bar", err: errServiceMissing}, | ||||
| 		{src: "app:foo", dst: "bar", srcPath: "foo", dstPath: "bar", service: "app", toContainer: false}, | ||||
| 		{src: "foo", dst: "app:bar", srcPath: "foo", dstPath: "bar", service: "app", toContainer: true}, | ||||
| 	} | ||||
|  | ||||
| 	for i, tc := range tests { | ||||
| 		srcPath, dstPath, service, toContainer, err := parseSrcAndDst(tc.src, tc.dst) | ||||
| 		if srcPath != tc.srcPath { | ||||
| 			t.Errorf("[%d] srcPath: want (%s), got(%s)", i, tc.srcPath, srcPath) | ||||
| 		} | ||||
| 		if dstPath != tc.dstPath { | ||||
| 			t.Errorf("[%d] dstPath: want (%s), got(%s)", i, tc.dstPath, dstPath) | ||||
| 		} | ||||
| 		if service != tc.service { | ||||
| 			t.Errorf("[%d] service: want (%s), got(%s)", i, tc.service, service) | ||||
| 		} | ||||
| 		if toContainer != tc.toContainer { | ||||
| 			t.Errorf("[%d] toConainer: want (%t), got(%t)", i, tc.toContainer, toContainer) | ||||
| 		} | ||||
| 		if err == nil && tc.err != nil && err.Error() != tc.err.Error() { | ||||
| 			t.Errorf("[%d] err: want (%s), got(%s)", i, tc.err, err) | ||||
| 		} | ||||
| 	} | ||||
| } | ||||
|  | ||||
| func TestCopyMode(t *testing.T) { | ||||
| 	tests := []struct { | ||||
| 		srcPath   string | ||||
| 		dstPath   string | ||||
| 		srcMode   os.FileMode | ||||
| 		dstMode   os.FileMode | ||||
| 		dstExists bool | ||||
| 		mode      CopyMode | ||||
| 		err       error | ||||
| 	}{ | ||||
| 		{ | ||||
| 			srcPath:   "foo.txt", | ||||
| 			dstPath:   "foo.txt", | ||||
| 			srcMode:   os.ModePerm, | ||||
| 			dstMode:   os.ModePerm, | ||||
| 			dstExists: true, | ||||
| 			mode:      CopyModeFileToFile, | ||||
| 		}, | ||||
| 		{ | ||||
| 			srcPath:   "foo.txt", | ||||
| 			dstPath:   "bar.txt", | ||||
| 			srcMode:   os.ModePerm, | ||||
| 			dstExists: true, | ||||
| 			mode:      CopyModeFileToFileRename, | ||||
| 		}, | ||||
| 		{ | ||||
| 			srcPath:   "foo", | ||||
| 			dstPath:   "foo", | ||||
| 			srcMode:   os.ModeDir, | ||||
| 			dstMode:   os.ModeDir, | ||||
| 			dstExists: true, | ||||
| 			mode:      CopyModeDirToDir, | ||||
| 		}, | ||||
| 		{ | ||||
| 			srcPath:   "foo/", | ||||
| 			dstPath:   "foo", | ||||
| 			srcMode:   os.ModeDir, | ||||
| 			dstMode:   os.ModeDir, | ||||
| 			dstExists: true, | ||||
| 			mode:      CopyModeFilesToDir, | ||||
| 		}, | ||||
| 		{ | ||||
| 			srcPath:   "foo", | ||||
| 			dstPath:   "foo", | ||||
| 			srcMode:   os.ModeDir, | ||||
| 			dstExists: false, | ||||
| 			mode:      -1, | ||||
| 			err:       ErrDstDirNotExist, | ||||
| 		}, | ||||
| 		{ | ||||
| 			srcPath:   "foo", | ||||
| 			dstPath:   "foo", | ||||
| 			srcMode:   os.ModeDir, | ||||
| 			dstMode:   os.ModePerm, | ||||
| 			dstExists: true, | ||||
| 			mode:      -1, | ||||
| 			err:       ErrCopyDirToFile, | ||||
| 		}, | ||||
| 	} | ||||
|  | ||||
| 	for i, tc := range tests { | ||||
| 		mode, err := copyMode(tc.srcPath, tc.dstPath, tc.srcMode, tc.dstMode, tc.dstExists) | ||||
| 		if mode != tc.mode { | ||||
| 			t.Errorf("[%d] mode: want (%d), got(%d)", i, tc.mode, mode) | ||||
| 		} | ||||
| 		if err != tc.err { | ||||
| 			t.Errorf("[%d] err: want (%s), got(%s)", i, tc.err, err) | ||||
| 		} | ||||
| 	} | ||||
| } | ||||
| @ -3,14 +3,10 @@ package app | ||||
| import ( | ||||
| 	"context" | ||||
| 	"fmt" | ||||
| 	"io/ioutil" | ||||
| 	"os" | ||||
| 	"path" | ||||
| 	"strings" | ||||
|  | ||||
| 	"coopcloud.tech/abra/cli/internal" | ||||
| 	"coopcloud.tech/abra/pkg/autocomplete" | ||||
| 	"coopcloud.tech/abra/pkg/runtime" | ||||
| 	"coopcloud.tech/abra/pkg/secret" | ||||
|  | ||||
| 	"coopcloud.tech/abra/pkg/client" | ||||
| 	"coopcloud.tech/abra/pkg/config" | ||||
| @ -20,8 +16,6 @@ import ( | ||||
| 	"coopcloud.tech/abra/pkg/lint" | ||||
| 	"coopcloud.tech/abra/pkg/recipe" | ||||
| 	"coopcloud.tech/abra/pkg/upstream/stack" | ||||
| 	"github.com/AlecAivazis/survey/v2" | ||||
| 	dockerClient "github.com/docker/docker/client" | ||||
| 	"github.com/sirupsen/logrus" | ||||
| 	"github.com/urfave/cli" | ||||
| ) | ||||
| @ -30,7 +24,7 @@ var appDeployCommand = cli.Command{ | ||||
| 	Name:      "deploy", | ||||
| 	Aliases:   []string{"d"}, | ||||
| 	Usage:     "Deploy an app", | ||||
| 	ArgsUsage: "<domain>", | ||||
| 	ArgsUsage: "<domain> [<version>]", | ||||
| 	Flags: []cli.Flag{ | ||||
| 		internal.DebugFlag, | ||||
| 		internal.NoInputFlag, | ||||
| @ -48,28 +42,41 @@ for this you need to look at the "abra app upgrade <domain>" command. | ||||
| You may pass "--force" to re-deploy the same version again. This can be useful | ||||
| if the container runtime has gotten into a weird state. | ||||
|  | ||||
| Chas mode ("--chaos") will deploy your local checkout of a recipe as-is, | ||||
| Chaos mode ("--chaos") will deploy your local checkout of a recipe as-is, | ||||
| including unstaged changes and can be useful for live hacking and testing new | ||||
| recipes. | ||||
| `, | ||||
| 	BashComplete: autocomplete.AppNameComplete, | ||||
| 	Action: func(c *cli.Context) error { | ||||
| 		conf := runtime.New(runtime.WithOffline(internal.Offline)) | ||||
| 		app := internal.ValidateApp(c, conf) | ||||
| 		app := internal.ValidateApp(c) | ||||
| 		stackName := app.StackName() | ||||
|  | ||||
| 		cl, err := client.New(app.Server) | ||||
| 		if err != nil { | ||||
| 		specificVersion := c.Args().Get(1) | ||||
| 		if specificVersion != "" && internal.Chaos { | ||||
| 			logrus.Fatal("cannot use <version> and --chaos together") | ||||
| 		} | ||||
|  | ||||
| 		if err := recipe.EnsureExists(app.Recipe); err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		if !internal.Chaos { | ||||
| 			if err := recipe.EnsureUpToDate(app.Recipe, conf); err != nil { | ||||
| 			if err := recipe.EnsureIsClean(app.Recipe); err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
|  | ||||
| 			if !internal.Offline { | ||||
| 				if err := recipe.EnsureUpToDate(app.Recipe); err != nil { | ||||
| 					logrus.Fatal(err) | ||||
| 				} | ||||
| 			} | ||||
|  | ||||
| 			if err := recipe.EnsureLatest(app.Recipe); err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
| 		} | ||||
|  | ||||
| 		r, err := recipe.Get(app.Recipe, conf) | ||||
| 		r, err := recipe.Get(app.Recipe, internal.Offline) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
| @ -80,11 +87,27 @@ recipes. | ||||
|  | ||||
| 		logrus.Debugf("checking whether %s is already deployed", stackName) | ||||
|  | ||||
| 		cl, err := client.New(app.Server) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		isDeployed, deployedVersion, err := stack.IsDeployed(context.Background(), cl, stackName) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		secStats, err := secret.PollSecretsStatus(cl, app) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		for _, secStat := range secStats { | ||||
| 			if !secStat.CreatedOnRemote { | ||||
| 				logrus.Fatalf("unable to deploy, secrets not generated (%s)?", secStat.LocalName) | ||||
| 			} | ||||
| 		} | ||||
|  | ||||
| 		if isDeployed { | ||||
| 			if internal.Force || internal.Chaos { | ||||
| 				logrus.Warnf("%s is already deployed but continuing (--force/--chaos)", app.Name) | ||||
| @ -94,8 +117,16 @@ recipes. | ||||
| 		} | ||||
|  | ||||
| 		version := deployedVersion | ||||
| 		if version == "unknown" && !internal.Chaos { | ||||
| 			catl, err := recipe.ReadRecipeCatalogue(conf) | ||||
| 		if specificVersion != "" { | ||||
| 			version = specificVersion | ||||
| 			logrus.Debugf("choosing %s as version to deploy", version) | ||||
| 			if err := recipe.EnsureVersion(app.Recipe, version); err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
| 		} | ||||
|  | ||||
| 		if !internal.Chaos && specificVersion == "" { | ||||
| 			catl, err := recipe.ReadRecipeCatalogue(internal.Offline) | ||||
| 			if err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
| @ -103,7 +134,21 @@ recipes. | ||||
| 			if err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
| 			if len(versions) > 0 { | ||||
|  | ||||
| 			if len(versions) == 0 && !internal.Chaos { | ||||
| 				logrus.Warn("no published versions in catalogue, trying local recipe repository") | ||||
| 				recipeVersions, err := recipe.GetRecipeVersions(app.Recipe, internal.Offline) | ||||
| 				if err != nil { | ||||
| 					logrus.Warn(err) | ||||
| 				} | ||||
| 				for _, recipeVersion := range recipeVersions { | ||||
| 					for version := range recipeVersion { | ||||
| 						versions = append(versions, version) | ||||
| 					} | ||||
| 				} | ||||
| 			} | ||||
|  | ||||
| 			if len(versions) > 0 && !internal.Chaos { | ||||
| 				version = versions[len(versions)-1] | ||||
| 				logrus.Debugf("choosing %s as version to deploy", version) | ||||
| 				if err := recipe.EnsureVersion(app.Recipe, version); err != nil { | ||||
| @ -116,22 +161,6 @@ recipes. | ||||
| 				} | ||||
| 				version = formatter.SmallSHA(head.String()) | ||||
| 				logrus.Warn("no versions detected, using latest commit") | ||||
| 				if err := recipe.EnsureLatest(app.Recipe, conf); err != nil { | ||||
| 					logrus.Fatal(err) | ||||
| 				} | ||||
| 			} | ||||
| 		} | ||||
|  | ||||
| 		if version == "unknown" && !internal.Chaos { | ||||
| 			logrus.Debugf("choosing %s as version to deploy", version) | ||||
| 			if err := recipe.EnsureVersion(app.Recipe, version); err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
| 		} | ||||
|  | ||||
| 		if version != "unknown" && !internal.Chaos { | ||||
| 			if err := recipe.EnsureVersion(app.Recipe, version); err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
| 		} | ||||
|  | ||||
| @ -153,10 +182,11 @@ recipes. | ||||
| 			app.Env[k] = v | ||||
| 		} | ||||
|  | ||||
| 		composeFiles, err := config.GetAppComposeFiles(app.Recipe, app.Env) | ||||
| 		composeFiles, err := config.GetComposeFiles(app.Recipe, app.Env) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		deployOpts := stack.Deploy{ | ||||
| 			Composefiles: composeFiles, | ||||
| 			Namespace:    stackName, | ||||
| @ -167,13 +197,25 @@ recipes. | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		config.ExposeAllEnv(stackName, compose, app.Env) | ||||
| 		config.SetRecipeLabel(compose, stackName, app.Recipe) | ||||
| 		config.SetChaosLabel(compose, stackName, internal.Chaos) | ||||
| 		config.SetChaosVersionLabel(compose, stackName, version) | ||||
| 		config.SetUpdateLabel(compose, stackName, app.Env) | ||||
|  | ||||
| 		if err := DeployOverview(app, version, "continue with deployment?"); err != nil { | ||||
| 		envVars, err := config.CheckEnv(app) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		for _, envVar := range envVars { | ||||
| 			if !envVar.Present { | ||||
| 				logrus.Warnf("env var %s missing from %s.env, present in recipe .env.sample", envVar.Name, app.Domain) | ||||
| 			} | ||||
| 		} | ||||
|  | ||||
| 		if err := internal.DeployOverview(app, version, "continue with deployment?"); err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| @ -203,175 +245,10 @@ recipes. | ||||
| 		postDeployCmds, ok := app.Env["POST_DEPLOY_CMDS"] | ||||
| 		if ok && !internal.DontWaitConverge { | ||||
| 			logrus.Debugf("run the following post-deploy commands: %s", postDeployCmds) | ||||
| 			if err := PostCmds(cl, app, postDeployCmds); err != nil { | ||||
| 			if err := internal.PostCmds(cl, app, postDeployCmds); err != nil { | ||||
| 				logrus.Fatalf("attempting to run post deploy commands, saw: %s", err) | ||||
| 			} | ||||
| 		} | ||||
| 		return nil | ||||
| 	}, | ||||
| } | ||||
|  | ||||
| // PostCmds parses a string of commands and executes them inside of the respective services | ||||
| // the commands string must have the following format: | ||||
| // "<service> <command> <arguments>|<service> <command> <arguments>|... " | ||||
| func PostCmds(cl *dockerClient.Client, app config.App, commands string) error { | ||||
| 	abraSh := path.Join(config.RECIPES_DIR, app.Recipe, "abra.sh") | ||||
| 	if _, err := os.Stat(abraSh); err != nil { | ||||
| 		if os.IsNotExist(err) { | ||||
| 			return fmt.Errorf(fmt.Sprintf("%s does not exist for %s?", abraSh, app.Name)) | ||||
| 		} | ||||
| 		return err | ||||
| 	} | ||||
|  | ||||
| 	for _, command := range strings.Split(commands, "|") { | ||||
| 		commandParts := strings.Split(command, " ") | ||||
| 		if len(commandParts) < 2 { | ||||
| 			return fmt.Errorf(fmt.Sprintf("not enough arguments: %s", command)) | ||||
| 		} | ||||
| 		targetServiceName := commandParts[0] | ||||
| 		cmdName := commandParts[1] | ||||
| 		parsedCmdArgs := "" | ||||
| 		if len(commandParts) > 2 { | ||||
| 			parsedCmdArgs = fmt.Sprintf("%s ", strings.Join(commandParts[2:], " ")) | ||||
| 		} | ||||
| 		logrus.Infof("running post-command '%s %s' in container %s", cmdName, parsedCmdArgs, targetServiceName) | ||||
|  | ||||
| 		if err := internal.EnsureCommand(abraSh, app.Recipe, cmdName); err != nil { | ||||
| 			return err | ||||
| 		} | ||||
|  | ||||
| 		serviceNames, err := config.GetAppServiceNames(app.Name) | ||||
| 		if err != nil { | ||||
| 			return err | ||||
| 		} | ||||
|  | ||||
| 		matchingServiceName := false | ||||
| 		for _, serviceName := range serviceNames { | ||||
| 			if serviceName == targetServiceName { | ||||
| 				matchingServiceName = true | ||||
| 			} | ||||
| 		} | ||||
|  | ||||
| 		if !matchingServiceName { | ||||
| 			return fmt.Errorf(fmt.Sprintf("no service %s for %s?", targetServiceName, app.Name)) | ||||
| 		} | ||||
|  | ||||
| 		logrus.Debugf("running command %s %s within the context of %s_%s", cmdName, parsedCmdArgs, app.StackName(), targetServiceName) | ||||
|  | ||||
| 		internal.Tty = true | ||||
| 		if err := internal.RunCmdRemote(cl, app, abraSh, targetServiceName, cmdName, parsedCmdArgs); err != nil { | ||||
| 			return err | ||||
| 		} | ||||
| 	} | ||||
| 	return nil | ||||
| } | ||||
|  | ||||
| // DeployOverview shows a deployment overview | ||||
| func DeployOverview(app config.App, version, message string) error { | ||||
| 	tableCol := []string{"server", "recipe", "config", "domain", "version"} | ||||
| 	table := formatter.CreateTable(tableCol) | ||||
|  | ||||
| 	deployConfig := "compose.yml" | ||||
| 	if composeFiles, ok := app.Env["COMPOSE_FILE"]; ok { | ||||
| 		deployConfig = strings.Join(strings.Split(composeFiles, ":"), "\n") | ||||
| 	} | ||||
|  | ||||
| 	server := app.Server | ||||
| 	if app.Server == "default" { | ||||
| 		server = "local" | ||||
| 	} | ||||
|  | ||||
| 	table.Append([]string{server, app.Recipe, deployConfig, app.Domain, version}) | ||||
| 	table.Render() | ||||
|  | ||||
| 	if internal.NoInput { | ||||
| 		return nil | ||||
| 	} | ||||
|  | ||||
| 	response := false | ||||
| 	prompt := &survey.Confirm{ | ||||
| 		Message: message, | ||||
| 	} | ||||
|  | ||||
| 	if err := survey.AskOne(prompt, &response); err != nil { | ||||
| 		return err | ||||
| 	} | ||||
|  | ||||
| 	if !response { | ||||
| 		logrus.Fatal("exiting as requested") | ||||
| 	} | ||||
|  | ||||
| 	return nil | ||||
| } | ||||
|  | ||||
| // NewVersionOverview shows an upgrade or downgrade overview | ||||
| func NewVersionOverview(app config.App, currentVersion, newVersion, releaseNotes string) error { | ||||
| 	tableCol := []string{"server", "recipe", "config", "domain", "current version", "to be deployed"} | ||||
| 	table := formatter.CreateTable(tableCol) | ||||
|  | ||||
| 	deployConfig := "compose.yml" | ||||
| 	if composeFiles, ok := app.Env["COMPOSE_FILE"]; ok { | ||||
| 		deployConfig = strings.Join(strings.Split(composeFiles, ":"), "\n") | ||||
| 	} | ||||
|  | ||||
| 	server := app.Server | ||||
| 	if app.Server == "default" { | ||||
| 		server = "local" | ||||
| 	} | ||||
|  | ||||
| 	table.Append([]string{server, app.Recipe, deployConfig, app.Domain, currentVersion, newVersion}) | ||||
| 	table.Render() | ||||
|  | ||||
| 	if releaseNotes == "" { | ||||
| 		var err error | ||||
| 		releaseNotes, err = GetReleaseNotes(app.Recipe, newVersion) | ||||
| 		if err != nil { | ||||
| 			return err | ||||
| 		} | ||||
| 	} | ||||
|  | ||||
| 	if releaseNotes != "" && newVersion != "" { | ||||
| 		fmt.Println() | ||||
| 		fmt.Println(fmt.Sprintf("%s release notes:\n\n%s", newVersion, releaseNotes)) | ||||
| 	} else { | ||||
| 		logrus.Warnf("no release notes available for %s", newVersion) | ||||
| 	} | ||||
|  | ||||
| 	if internal.NoInput { | ||||
| 		return nil | ||||
| 	} | ||||
|  | ||||
| 	response := false | ||||
| 	prompt := &survey.Confirm{ | ||||
| 		Message: "continue with deployment?", | ||||
| 	} | ||||
|  | ||||
| 	if err := survey.AskOne(prompt, &response); err != nil { | ||||
| 		return err | ||||
| 	} | ||||
|  | ||||
| 	if !response { | ||||
| 		logrus.Fatal("exiting as requested") | ||||
| 	} | ||||
|  | ||||
| 	return nil | ||||
| } | ||||
|  | ||||
| // GetReleaseNotes prints release notes for a recipe version | ||||
| func GetReleaseNotes(recipeName, version string) (string, error) { | ||||
| 	if version == "" { | ||||
| 		return "", nil | ||||
| 	} | ||||
|  | ||||
| 	fpath := path.Join(config.RECIPES_DIR, recipeName, "release", version) | ||||
|  | ||||
| 	if _, err := os.Stat(fpath); !os.IsNotExist(err) { | ||||
| 		releaseNotes, err := ioutil.ReadFile(fpath) | ||||
| 		if err != nil { | ||||
| 			return "", err | ||||
| 		} | ||||
| 		return string(releaseNotes), nil | ||||
| 	} | ||||
|  | ||||
| 	return "", nil | ||||
| } | ||||
|  | ||||
| @ -12,7 +12,6 @@ import ( | ||||
| 	"coopcloud.tech/abra/pkg/client" | ||||
| 	"coopcloud.tech/abra/pkg/config" | ||||
| 	"coopcloud.tech/abra/pkg/recipe" | ||||
| 	"coopcloud.tech/abra/pkg/runtime" | ||||
| 	stack "coopcloud.tech/abra/pkg/upstream/stack" | ||||
| 	"github.com/docker/docker/api/types" | ||||
| 	"github.com/docker/docker/api/types/filters" | ||||
| @ -56,8 +55,7 @@ the logs. | ||||
| 	Before:       internal.SubCommandBefore, | ||||
| 	BashComplete: autocomplete.AppNameComplete, | ||||
| 	Action: func(c *cli.Context) error { | ||||
| 		conf := runtime.New(runtime.WithOffline(internal.Offline)) | ||||
| 		app := internal.ValidateApp(c, conf) | ||||
| 		app := internal.ValidateApp(c) | ||||
|  | ||||
| 		cl, err := client.New(app.Server) | ||||
| 		if err != nil { | ||||
| @ -74,25 +72,23 @@ the logs. | ||||
| 		} | ||||
|  | ||||
| 		if !internal.Watch { | ||||
| 			if err := checkErrors(c, cl, app, conf); err != nil { | ||||
| 			if err := checkErrors(c, cl, app); err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
| 			return nil | ||||
| 		} | ||||
|  | ||||
| 		for { | ||||
| 			if err := checkErrors(c, cl, app, conf); err != nil { | ||||
| 			if err := checkErrors(c, cl, app); err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
| 			time.Sleep(2 * time.Second) | ||||
| 		} | ||||
|  | ||||
| 		return nil | ||||
| 	}, | ||||
| } | ||||
|  | ||||
| func checkErrors(c *cli.Context, cl *dockerClient.Client, app config.App, conf *runtime.Config) error { | ||||
| 	recipe, err := recipe.Get(app.Recipe, conf) | ||||
| func checkErrors(c *cli.Context, cl *dockerClient.Client, app config.App) error { | ||||
| 	recipe, err := recipe.Get(app.Recipe, internal.Offline) | ||||
| 	if err != nil { | ||||
| 		return err | ||||
| 	} | ||||
|  | ||||
| @ -11,7 +11,6 @@ import ( | ||||
| 	"coopcloud.tech/abra/pkg/config" | ||||
| 	"coopcloud.tech/abra/pkg/formatter" | ||||
| 	"coopcloud.tech/abra/pkg/recipe" | ||||
| 	"coopcloud.tech/abra/pkg/runtime" | ||||
| 	"coopcloud.tech/tagcmp" | ||||
| 	"github.com/sirupsen/logrus" | ||||
| 	"github.com/urfave/cli" | ||||
| @ -84,8 +83,6 @@ can take some time. | ||||
| 	}, | ||||
| 	Before: internal.SubCommandBefore, | ||||
| 	Action: func(c *cli.Context) error { | ||||
| 		conf := runtime.New(runtime.WithOffline(internal.Offline)) | ||||
|  | ||||
| 		appFiles, err := config.LoadAppFiles(listAppServer) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| @ -113,7 +110,7 @@ can take some time. | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
|  | ||||
| 			catl, err = recipe.ReadRecipeCatalogue(conf) | ||||
| 			catl, err = recipe.ReadRecipeCatalogue(internal.Offline) | ||||
| 			if err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
|  | ||||
							
								
								
									
										182
									
								
								cli/app/logs.go
									
									
									
									
									
								
							
							
						
						
									
										182
									
								
								cli/app/logs.go
									
									
									
									
									
								
							| @ -2,57 +2,124 @@ package app | ||||
|  | ||||
| import ( | ||||
| 	"context" | ||||
| 	"fmt" | ||||
| 	"io" | ||||
| 	"os" | ||||
| 	"slices" | ||||
| 	"sync" | ||||
| 	"time" | ||||
|  | ||||
| 	"coopcloud.tech/abra/cli/internal" | ||||
| 	"coopcloud.tech/abra/pkg/autocomplete" | ||||
| 	"coopcloud.tech/abra/pkg/client" | ||||
| 	"coopcloud.tech/abra/pkg/config" | ||||
| 	"coopcloud.tech/abra/pkg/runtime" | ||||
| 	"coopcloud.tech/abra/pkg/service" | ||||
| 	"coopcloud.tech/abra/pkg/recipe" | ||||
| 	"coopcloud.tech/abra/pkg/upstream/stack" | ||||
| 	"github.com/docker/docker/api/types" | ||||
| 	"github.com/docker/docker/api/types/filters" | ||||
| 	"github.com/docker/docker/api/types/swarm" | ||||
| 	dockerClient "github.com/docker/docker/client" | ||||
| 	"github.com/sirupsen/logrus" | ||||
| 	"github.com/urfave/cli" | ||||
| ) | ||||
|  | ||||
| var logOpts = types.ContainerLogsOptions{ | ||||
| 	ShowStderr: true, | ||||
| 	ShowStdout: true, | ||||
| 	Since:      "", | ||||
| 	Until:      "", | ||||
| 	Timestamps: true, | ||||
| 	Follow:     true, | ||||
| 	Tail:       "20", | ||||
| 	Details:    false, | ||||
| var appLogsCommand = cli.Command{ | ||||
| 	Name:      "logs", | ||||
| 	Aliases:   []string{"l"}, | ||||
| 	ArgsUsage: "<domain> [<service>]", | ||||
| 	Usage:     "Tail app logs", | ||||
| 	Flags: []cli.Flag{ | ||||
| 		internal.StdErrOnlyFlag, | ||||
| 		internal.SinceLogsFlag, | ||||
| 		internal.DebugFlag, | ||||
| 	}, | ||||
| 	Before:       internal.SubCommandBefore, | ||||
| 	BashComplete: autocomplete.AppNameComplete, | ||||
| 	Action: func(c *cli.Context) error { | ||||
| 		app := internal.ValidateApp(c) | ||||
| 		stackName := app.StackName() | ||||
|  | ||||
| 		if err := recipe.EnsureExists(app.Recipe); err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		cl, err := client.New(app.Server) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		isDeployed, _, err := stack.IsDeployed(context.Background(), cl, stackName) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		if !isDeployed { | ||||
| 			logrus.Fatalf("%s is not deployed?", app.Name) | ||||
| 		} | ||||
|  | ||||
| 		serviceName := c.Args().Get(1) | ||||
| 		serviceNames := []string{} | ||||
| 		if serviceName != "" { | ||||
| 			serviceNames = []string{serviceName} | ||||
| 		} | ||||
| 		err = tailLogs(cl, app, serviceNames) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		return nil | ||||
| 	}, | ||||
| } | ||||
|  | ||||
| // stackLogs lists logs for all stack services | ||||
| func stackLogs(c *cli.Context, app config.App, client *dockerClient.Client) { | ||||
| 	filters, err := app.Filters(true, false) | ||||
| // tailLogs prints logs for the given app with optional service names to be | ||||
| // filtered on. It also checks if the latest task is not runnning and then | ||||
| // prints the past tasks. | ||||
| func tailLogs(cl *dockerClient.Client, app config.App, serviceNames []string) error { | ||||
| 	f, err := app.Filters(true, false, serviceNames...) | ||||
| 	if err != nil { | ||||
| 		logrus.Fatal(err) | ||||
| 		return err | ||||
| 	} | ||||
|  | ||||
| 	serviceOpts := types.ServiceListOptions{Filters: filters} | ||||
| 	services, err := client.ServiceList(context.Background(), serviceOpts) | ||||
| 	services, err := cl.ServiceList(context.Background(), types.ServiceListOptions{Filters: f}) | ||||
| 	if err != nil { | ||||
| 		logrus.Fatal(err) | ||||
| 		return err | ||||
| 	} | ||||
|  | ||||
| 	var wg sync.WaitGroup | ||||
| 	for _, service := range services { | ||||
| 		wg.Add(1) | ||||
| 		go func(s string) { | ||||
| 			if internal.StdErrOnly { | ||||
| 				logOpts.ShowStdout = false | ||||
| 		filters := filters.NewArgs() | ||||
| 		filters.Add("name", service.Spec.Name) | ||||
| 		tasks, err := cl.TaskList(context.Background(), types.TaskListOptions{Filters: f}) | ||||
| 		if err != nil { | ||||
| 			return err | ||||
| 		} | ||||
| 		if len(tasks) > 0 { | ||||
| 			// Need to sort the tasks by the CreatedAt field in the inverse order. | ||||
| 			// Otherwise they are in the reversed order and not sorted properly. | ||||
| 			slices.SortFunc[[]swarm.Task](tasks, func(t1, t2 swarm.Task) int { | ||||
| 				return int(t2.Meta.CreatedAt.Unix() - t1.Meta.CreatedAt.Unix()) | ||||
| 			}) | ||||
| 			lastTask := tasks[0].Status | ||||
| 			if lastTask.State != swarm.TaskStateRunning { | ||||
| 				for _, task := range tasks { | ||||
| 					logrus.Errorf("[%s] %s State %s: %s", service.Spec.Name, task.Meta.CreatedAt.Format(time.RFC3339), task.Status.State, task.Status.Err) | ||||
| 				} | ||||
| 			} | ||||
| 		} | ||||
|  | ||||
| 			logs, err := client.ServiceLogs(context.Background(), s, logOpts) | ||||
| 		// Collect the logs in a go routine, so the logs from all services are | ||||
| 		// collected in parallel. | ||||
| 		wg.Add(1) | ||||
| 		go func(serviceID string) { | ||||
| 			logs, err := cl.ServiceLogs(context.Background(), serviceID, types.ContainerLogsOptions{ | ||||
| 				ShowStderr: true, | ||||
| 				ShowStdout: !internal.StdErrOnly, | ||||
| 				Since:      internal.SinceLogs, | ||||
| 				Until:      "", | ||||
| 				Timestamps: true, | ||||
| 				Follow:     true, | ||||
| 				Tail:       "20", | ||||
| 				Details:    false, | ||||
| 			}) | ||||
| 			if err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
| @ -65,73 +132,8 @@ func stackLogs(c *cli.Context, app config.App, client *dockerClient.Client) { | ||||
| 		}(service.ID) | ||||
| 	} | ||||
|  | ||||
| 	// Wait for all log streams to be closed. | ||||
| 	wg.Wait() | ||||
|  | ||||
| 	os.Exit(0) | ||||
| } | ||||
|  | ||||
| var appLogsCommand = cli.Command{ | ||||
| 	Name:      "logs", | ||||
| 	Aliases:   []string{"l"}, | ||||
| 	ArgsUsage: "<domain> [<service>]", | ||||
| 	Usage:     "Tail app logs", | ||||
| 	Flags: []cli.Flag{ | ||||
| 		internal.StdErrOnlyFlag, | ||||
| 		internal.SinceLogsFlag, | ||||
| 		internal.DebugFlag, | ||||
| 		internal.OfflineFlag, | ||||
| 	}, | ||||
| 	Before:       internal.SubCommandBefore, | ||||
| 	BashComplete: autocomplete.AppNameComplete, | ||||
| 	Action: func(c *cli.Context) error { | ||||
| 		conf := runtime.New(runtime.WithOffline(internal.Offline)) | ||||
| 		app := internal.ValidateApp(c, conf) | ||||
|  | ||||
| 		cl, err := client.New(app.Server) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		logOpts.Since = internal.SinceLogs | ||||
|  | ||||
| 		serviceName := c.Args().Get(1) | ||||
| 		if serviceName == "" { | ||||
| 			logrus.Debugf("tailing logs for all %s services", app.Recipe) | ||||
| 			stackLogs(c, app, cl) | ||||
| 		} else { | ||||
| 			logrus.Debugf("tailing logs for %s", serviceName) | ||||
| 			if err := tailServiceLogs(c, cl, app, serviceName); err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
| 		} | ||||
|  | ||||
| 		return nil | ||||
| 	}, | ||||
| } | ||||
|  | ||||
| func tailServiceLogs(c *cli.Context, cl *dockerClient.Client, app config.App, serviceName string) error { | ||||
| 	filters := filters.NewArgs() | ||||
| 	filters.Add("name", fmt.Sprintf("%s_%s", app.StackName(), serviceName)) | ||||
|  | ||||
| 	chosenService, err := service.GetService(context.Background(), cl, filters, internal.NoInput) | ||||
| 	if err != nil { | ||||
| 		logrus.Fatal(err) | ||||
| 	} | ||||
|  | ||||
| 	if internal.StdErrOnly { | ||||
| 		logOpts.ShowStdout = false | ||||
| 	} | ||||
|  | ||||
| 	logs, err := cl.ServiceLogs(context.Background(), chosenService.ID, logOpts) | ||||
| 	if err != nil { | ||||
| 		logrus.Fatal(err) | ||||
| 	} | ||||
| 	defer logs.Close() | ||||
|  | ||||
| 	_, err = io.Copy(os.Stdout, logs) | ||||
| 	if err != nil && err != io.EOF { | ||||
| 		logrus.Fatal(err) | ||||
| 	} | ||||
|  | ||||
| 	return nil | ||||
| } | ||||
|  | ||||
							
								
								
									
										103
									
								
								cli/app/new.go
									
									
									
									
									
								
							
							
						
						
									
										103
									
								
								cli/app/new.go
									
									
									
									
									
								
							| @ -5,7 +5,6 @@ import ( | ||||
| 	"path" | ||||
|  | ||||
| 	"coopcloud.tech/abra/cli/internal" | ||||
| 	"coopcloud.tech/abra/pkg/app" | ||||
| 	"coopcloud.tech/abra/pkg/autocomplete" | ||||
| 	"coopcloud.tech/abra/pkg/client" | ||||
| 	"coopcloud.tech/abra/pkg/config" | ||||
| @ -13,7 +12,6 @@ import ( | ||||
| 	"coopcloud.tech/abra/pkg/jsontable" | ||||
| 	"coopcloud.tech/abra/pkg/recipe" | ||||
| 	recipePkg "coopcloud.tech/abra/pkg/recipe" | ||||
| 	"coopcloud.tech/abra/pkg/runtime" | ||||
| 	"coopcloud.tech/abra/pkg/secret" | ||||
| 	"github.com/AlecAivazis/survey/v2" | ||||
| 	dockerClient "github.com/docker/docker/client" | ||||
| @ -54,15 +52,26 @@ var appNewCommand = cli.Command{ | ||||
| 		internal.PassFlag, | ||||
| 		internal.SecretsFlag, | ||||
| 		internal.OfflineFlag, | ||||
| 		internal.ChaosFlag, | ||||
| 	}, | ||||
| 	Before:    internal.SubCommandBefore, | ||||
| 	ArgsUsage: "[<recipe>]", | ||||
| 	Before:       internal.SubCommandBefore, | ||||
| 	ArgsUsage:    "[<recipe>]", | ||||
| 	BashComplete: autocomplete.RecipeNameComplete, | ||||
| 	Action: func(c *cli.Context) error { | ||||
| 		conf := runtime.New(runtime.WithOffline(internal.Offline)) | ||||
| 		recipe := internal.ValidateRecipeWithPrompt(c, conf) | ||||
| 		recipe := internal.ValidateRecipe(c) | ||||
|  | ||||
| 		if err := recipePkg.EnsureUpToDate(recipe.Name, conf); err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		if !internal.Chaos { | ||||
| 			if err := recipePkg.EnsureIsClean(recipe.Name); err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
| 			if !internal.Offline { | ||||
| 				if err := recipePkg.EnsureUpToDate(recipe.Name); err != nil { | ||||
| 					logrus.Fatal(err) | ||||
| 				} | ||||
| 			} | ||||
| 			if err := recipePkg.EnsureLatest(recipe.Name); err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
| 		} | ||||
|  | ||||
| 		if err := ensureServerFlag(); err != nil { | ||||
| @ -85,29 +94,44 @@ var appNewCommand = cli.Command{ | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		if err := promptForSecrets(internal.Domain); err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		cl, err := client.New(internal.NewAppServer) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		var secrets AppSecrets | ||||
| 		var secretTable *jsontable.JSONTable | ||||
| 		if internal.Secrets { | ||||
| 			secrets, err := createSecrets(cl, sanitisedAppName) | ||||
| 			sampleEnv, err := recipe.SampleEnv() | ||||
| 			if err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
|  | ||||
| 			composeFiles, err := config.GetComposeFiles(recipe.Name, sampleEnv) | ||||
| 			if err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
|  | ||||
| 			envSamplePath := path.Join(config.RECIPES_DIR, recipe.Name, ".env.sample") | ||||
| 			secretsConfig, err := secret.ReadSecretsConfig(envSamplePath, composeFiles, config.StackName(internal.Domain)) | ||||
| 			if err != nil { | ||||
| 				return err | ||||
| 			} | ||||
|  | ||||
| 			if err := promptForSecrets(recipe.Name, secretsConfig); err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
|  | ||||
| 			cl, err := client.New(internal.NewAppServer) | ||||
| 			if err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
|  | ||||
| 			secrets, err = createSecrets(cl, secretsConfig, sanitisedAppName) | ||||
| 			if err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
|  | ||||
| 			secretCols := []string{"Name", "Value"} | ||||
| 			secretTable = formatter.CreateTable(secretCols) | ||||
| 			for secret := range secrets { | ||||
| 				secretTable.Append([]string{secret, secrets[secret]}) | ||||
| 			for name, val := range secrets { | ||||
| 				secretTable.Append([]string{name, val}) | ||||
| 			} | ||||
|  | ||||
| 		} | ||||
|  | ||||
| 		if internal.NewAppServer == "default" { | ||||
| @ -118,7 +142,6 @@ var appNewCommand = cli.Command{ | ||||
| 		table := formatter.CreateTable(tableCol) | ||||
| 		table.Append([]string{internal.NewAppServer, recipe.Name, internal.Domain}) | ||||
|  | ||||
| 		fmt.Println("") | ||||
| 		fmt.Println(fmt.Sprintf("A new %s app has been created! Here is an overview:", recipe.Name)) | ||||
| 		fmt.Println("") | ||||
| 		table.Render() | ||||
| @ -128,40 +151,25 @@ var appNewCommand = cli.Command{ | ||||
| 		fmt.Println("") | ||||
| 		fmt.Println("You can deploy this app by running the following:") | ||||
| 		fmt.Println(fmt.Sprintf("\n    abra app deploy %s", internal.Domain)) | ||||
| 		fmt.Println("") | ||||
|  | ||||
| 		if len(secrets) > 0 { | ||||
| 			fmt.Println("") | ||||
| 			fmt.Println("Here are your generated secrets:") | ||||
| 			fmt.Println("") | ||||
| 			secretTable.Render() | ||||
| 			fmt.Println("") | ||||
| 			logrus.Warn("generated secrets are not shown again, please take note of them *now*") | ||||
| 			logrus.Warn("generated secrets are not shown again, please take note of them NOW") | ||||
| 		} | ||||
|  | ||||
| 		return nil | ||||
| 	}, | ||||
| 	BashComplete: autocomplete.RecipeNameComplete, | ||||
| } | ||||
|  | ||||
| // AppSecrets represents all app secrest | ||||
| type AppSecrets map[string]string | ||||
|  | ||||
| // createSecrets creates all secrets for a new app. | ||||
| func createSecrets(cl *dockerClient.Client, sanitisedAppName string) (AppSecrets, error) { | ||||
| 	appEnvPath := path.Join( | ||||
| 		config.ABRA_DIR, | ||||
| 		"servers", | ||||
| 		internal.NewAppServer, | ||||
| 		fmt.Sprintf("%s.env", internal.Domain), | ||||
| 	) | ||||
|  | ||||
| 	appEnv, err := config.ReadEnv(appEnvPath) | ||||
| 	if err != nil { | ||||
| 		return nil, err | ||||
| 	} | ||||
|  | ||||
| 	secretEnvVars := secret.ReadSecretEnvVars(appEnv) | ||||
| 	secrets, err := secret.GenerateSecrets(cl, secretEnvVars, sanitisedAppName, internal.NewAppServer) | ||||
| func createSecrets(cl *dockerClient.Client, secretsConfig map[string]secret.Secret, sanitisedAppName string) (AppSecrets, error) { | ||||
| 	secrets, err := secret.GenerateSecrets(cl, secretsConfig, internal.NewAppServer) | ||||
| 	if err != nil { | ||||
| 		return nil, err | ||||
| 	} | ||||
| @ -179,6 +187,7 @@ func createSecrets(cl *dockerClient.Client, sanitisedAppName string) (AppSecrets | ||||
| 			} | ||||
| 		} | ||||
| 	} | ||||
|  | ||||
| 	return secrets, nil | ||||
| } | ||||
|  | ||||
| @ -202,15 +211,9 @@ func ensureDomainFlag(recipe recipe.Recipe, server string) error { | ||||
| } | ||||
|  | ||||
| // promptForSecrets asks if we should generate secrets for a new app. | ||||
| func promptForSecrets(appName string) error { | ||||
| 	app, err := app.Get(appName) | ||||
| 	if err != nil { | ||||
| 		return err | ||||
| 	} | ||||
|  | ||||
| 	secretEnvVars := secret.ReadSecretEnvVars(app.Env) | ||||
| 	if len(secretEnvVars) == 0 { | ||||
| 		logrus.Debugf("%s has no secrets to generate, skipping...", app.Recipe) | ||||
| func promptForSecrets(recipeName string, secretsConfig map[string]secret.Secret) error { | ||||
| 	if len(secretsConfig) == 0 { | ||||
| 		logrus.Debugf("%s has no secrets to generate, skipping...", recipeName) | ||||
| 		return nil | ||||
| 	} | ||||
|  | ||||
|  | ||||
| @ -10,7 +10,6 @@ import ( | ||||
| 	"coopcloud.tech/abra/pkg/client" | ||||
| 	"coopcloud.tech/abra/pkg/config" | ||||
| 	"coopcloud.tech/abra/pkg/formatter" | ||||
| 	"coopcloud.tech/abra/pkg/runtime" | ||||
| 	"coopcloud.tech/abra/pkg/service" | ||||
| 	stack "coopcloud.tech/abra/pkg/upstream/stack" | ||||
| 	"github.com/buger/goterm" | ||||
| @ -30,13 +29,11 @@ var appPsCommand = cli.Command{ | ||||
| 	Flags: []cli.Flag{ | ||||
| 		internal.WatchFlag, | ||||
| 		internal.DebugFlag, | ||||
| 		internal.OfflineFlag, | ||||
| 	}, | ||||
| 	Before:       internal.SubCommandBefore, | ||||
| 	BashComplete: autocomplete.AppNameComplete, | ||||
| 	Action: func(c *cli.Context) error { | ||||
| 		conf := runtime.New(runtime.WithOffline(internal.Offline)) | ||||
| 		app := internal.ValidateApp(c, conf) | ||||
| 		app := internal.ValidateApp(c) | ||||
|  | ||||
| 		cl, err := client.New(app.Server) | ||||
| 		if err != nil { | ||||
|  | ||||
| @ -8,7 +8,6 @@ import ( | ||||
| 	"coopcloud.tech/abra/cli/internal" | ||||
| 	"coopcloud.tech/abra/pkg/autocomplete" | ||||
| 	"coopcloud.tech/abra/pkg/client" | ||||
| 	"coopcloud.tech/abra/pkg/runtime" | ||||
| 	stack "coopcloud.tech/abra/pkg/upstream/stack" | ||||
| 	"github.com/AlecAivazis/survey/v2" | ||||
| 	"github.com/docker/docker/api/types" | ||||
| @ -49,8 +48,7 @@ flag. | ||||
| 	BashComplete: autocomplete.AppNameComplete, | ||||
| 	Before:       internal.SubCommandBefore, | ||||
| 	Action: func(c *cli.Context) error { | ||||
| 		conf := runtime.New(runtime.WithOffline(internal.Offline)) | ||||
| 		app := internal.ValidateApp(c, conf) | ||||
| 		app := internal.ValidateApp(c) | ||||
|  | ||||
| 		if !internal.Force && !internal.NoInput { | ||||
| 			response := false | ||||
|  | ||||
| @ -8,7 +8,6 @@ import ( | ||||
| 	"coopcloud.tech/abra/cli/internal" | ||||
| 	"coopcloud.tech/abra/pkg/autocomplete" | ||||
| 	"coopcloud.tech/abra/pkg/client" | ||||
| 	"coopcloud.tech/abra/pkg/runtime" | ||||
| 	upstream "coopcloud.tech/abra/pkg/upstream/service" | ||||
| 	stack "coopcloud.tech/abra/pkg/upstream/stack" | ||||
| 	"github.com/sirupsen/logrus" | ||||
| @ -28,8 +27,7 @@ var appRestartCommand = cli.Command{ | ||||
| 	Description:  `This command restarts a service within a deployed app.`, | ||||
| 	BashComplete: autocomplete.AppNameComplete, | ||||
| 	Action: func(c *cli.Context) error { | ||||
| 		conf := runtime.New(runtime.WithOffline(internal.Offline)) | ||||
| 		app := internal.ValidateApp(c, conf) | ||||
| 		app := internal.ValidateApp(c) | ||||
|  | ||||
| 		serviceNameShort := c.Args().Get(1) | ||||
| 		if serviceNameShort == "" { | ||||
| @ -42,6 +40,15 @@ var appRestartCommand = cli.Command{ | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		isDeployed, _, err := stack.IsDeployed(context.Background(), cl, app.StackName()) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		if !isDeployed { | ||||
| 			logrus.Fatalf("%s is not deployed?", app.Name) | ||||
| 		} | ||||
|  | ||||
| 		serviceName := fmt.Sprintf("%s_%s", app.StackName(), serviceNameShort) | ||||
|  | ||||
| 		logrus.Debugf("attempting to scale %s to 0 (restart logic)", serviceName) | ||||
|  | ||||
| @ -1,206 +1,82 @@ | ||||
| package app | ||||
|  | ||||
| import ( | ||||
| 	"context" | ||||
| 	"errors" | ||||
| 	"fmt" | ||||
| 	"os" | ||||
|  | ||||
| 	"coopcloud.tech/abra/cli/internal" | ||||
| 	"coopcloud.tech/abra/pkg/autocomplete" | ||||
| 	"coopcloud.tech/abra/pkg/client" | ||||
| 	"coopcloud.tech/abra/pkg/config" | ||||
| 	containerPkg "coopcloud.tech/abra/pkg/container" | ||||
| 	"coopcloud.tech/abra/pkg/recipe" | ||||
| 	"coopcloud.tech/abra/pkg/runtime" | ||||
| 	"coopcloud.tech/abra/pkg/upstream/container" | ||||
| 	"github.com/docker/cli/cli/command" | ||||
| 	"github.com/docker/docker/api/types" | ||||
| 	"github.com/docker/docker/api/types/filters" | ||||
| 	dockerClient "github.com/docker/docker/client" | ||||
| 	"github.com/docker/docker/pkg/archive" | ||||
| 	"github.com/sirupsen/logrus" | ||||
| 	"github.com/urfave/cli" | ||||
| ) | ||||
|  | ||||
| type restoreConfig struct { | ||||
| 	preHookCmd  string | ||||
| 	postHookCmd string | ||||
| var targetPath string | ||||
| var targetPathFlag = &cli.StringFlag{ | ||||
| 	Name:        "target, t", | ||||
| 	Usage:       "Target path", | ||||
| 	Destination: &targetPath, | ||||
| } | ||||
|  | ||||
| var appRestoreCommand = cli.Command{ | ||||
| 	Name:      "restore", | ||||
| 	Aliases:   []string{"rs"}, | ||||
| 	Usage:     "Run app restore", | ||||
| 	ArgsUsage: "<domain> <service> <file>", | ||||
| 	Usage:     "Restore an app backup", | ||||
| 	ArgsUsage: "<domain> <service>", | ||||
| 	Flags: []cli.Flag{ | ||||
| 		internal.DebugFlag, | ||||
| 		internal.OfflineFlag, | ||||
| 		targetPathFlag, | ||||
| 	}, | ||||
| 	Before:       internal.SubCommandBefore, | ||||
| 	BashComplete: autocomplete.AppNameComplete, | ||||
| 	Description: ` | ||||
| Run an app restore. | ||||
|  | ||||
| Pre/post hook commands are defined in the recipe configuration. Abra reads this | ||||
| configuration and run the comands in the context of the service before | ||||
| restoring the backup. | ||||
|  | ||||
| Unlike "abra app backup", restore must be run on a per-service basis. You can | ||||
| not restore all services in one go. Backup files produced by Abra are | ||||
| compressed archives which use absolute paths. This allows Abra to restore | ||||
| according to standard tar command logic. | ||||
|  | ||||
| Example: | ||||
|  | ||||
|     abra app restore example.com app ~/.abra/backups/example_com_app_609341138.tar.gz | ||||
| `, | ||||
| 	Action: func(c *cli.Context) error { | ||||
| 		conf := runtime.New(runtime.WithOffline(internal.Offline)) | ||||
| 		app := internal.ValidateApp(c, conf) | ||||
| 		app := internal.ValidateApp(c) | ||||
|  | ||||
| 		if err := recipe.EnsureExists(app.Recipe); err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		if !internal.Chaos { | ||||
| 			if err := recipe.EnsureIsClean(app.Recipe); err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
|  | ||||
| 			if !internal.Offline { | ||||
| 				if err := recipe.EnsureUpToDate(app.Recipe); err != nil { | ||||
| 					logrus.Fatal(err) | ||||
| 				} | ||||
| 			} | ||||
|  | ||||
| 			if err := recipe.EnsureLatest(app.Recipe); err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
| 		} | ||||
|  | ||||
| 		cl, err := client.New(app.Server) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		serviceName := c.Args().Get(1) | ||||
| 		if serviceName == "" { | ||||
| 			internal.ShowSubcommandHelpAndError(c, errors.New("missing <service>?")) | ||||
| 		} | ||||
|  | ||||
| 		backupPath := c.Args().Get(2) | ||||
| 		if backupPath == "" { | ||||
| 			internal.ShowSubcommandHelpAndError(c, errors.New("missing <file>?")) | ||||
| 		} | ||||
|  | ||||
| 		if _, err := os.Stat(backupPath); err != nil { | ||||
| 			if os.IsNotExist(err) { | ||||
| 				logrus.Fatalf("%s doesn't exist?", backupPath) | ||||
| 			} | ||||
| 		} | ||||
|  | ||||
| 		recipe, err := recipe.Get(app.Recipe, conf) | ||||
| 		targetContainer, err := internal.RetrieveBackupBotContainer(cl) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		restoreConfigs := make(map[string]restoreConfig) | ||||
| 		for _, service := range recipe.Config.Services { | ||||
| 			if restoreEnabled, ok := service.Deploy.Labels["backupbot.restore"]; ok { | ||||
| 				if restoreEnabled == "true" { | ||||
| 					fullServiceName := fmt.Sprintf("%s_%s", app.StackName(), service.Name) | ||||
| 					rsConfig := restoreConfig{} | ||||
|  | ||||
| 					logrus.Debugf("restore config detected for %s", fullServiceName) | ||||
|  | ||||
| 					if preHookCmd, ok := service.Deploy.Labels["backupbot.restore.pre-hook"]; ok { | ||||
| 						logrus.Debugf("detected pre-hook command for %s: %s", fullServiceName, preHookCmd) | ||||
| 						rsConfig.preHookCmd = preHookCmd | ||||
| 					} | ||||
|  | ||||
| 					if postHookCmd, ok := service.Deploy.Labels["backupbot.restore.post-hook"]; ok { | ||||
| 						logrus.Debugf("detected post-hook command for %s: %s", fullServiceName, postHookCmd) | ||||
| 						rsConfig.postHookCmd = postHookCmd | ||||
| 					} | ||||
|  | ||||
| 					restoreConfigs[service.Name] = rsConfig | ||||
| 				} | ||||
| 			} | ||||
| 		execEnv := []string{fmt.Sprintf("SERVICE=%s", app.Domain)} | ||||
| 		if snapshot != "" { | ||||
| 			logrus.Debugf("including SNAPSHOT=%s in backupbot exec invocation", snapshot) | ||||
| 			execEnv = append(execEnv, fmt.Sprintf("SNAPSHOT=%s", snapshot)) | ||||
| 		} | ||||
| 		if targetPath != "" { | ||||
| 			logrus.Debugf("including TARGET=%s in backupbot exec invocation", targetPath) | ||||
| 			execEnv = append(execEnv, fmt.Sprintf("TARGET=%s", targetPath)) | ||||
| 		} | ||||
|  | ||||
| 		rsConfig, ok := restoreConfigs[serviceName] | ||||
| 		if !ok { | ||||
| 			rsConfig = restoreConfig{} | ||||
| 		} | ||||
|  | ||||
| 		if err := runRestore(cl, app, backupPath, serviceName, rsConfig); err != nil { | ||||
| 		if err := internal.RunBackupCmdRemote(cl, "restore", targetContainer.ID, execEnv); err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		return nil | ||||
| 	}, | ||||
| } | ||||
|  | ||||
| // runRestore does the actual restore logic. | ||||
| func runRestore(cl *dockerClient.Client, app config.App, backupPath, serviceName string, rsConfig restoreConfig) error { | ||||
| 	// FIXME: avoid instantiating a new CLI | ||||
| 	dcli, err := command.NewDockerCli() | ||||
| 	if err != nil { | ||||
| 		return err | ||||
| 	} | ||||
|  | ||||
| 	filters := filters.NewArgs() | ||||
| 	filters.Add("name", fmt.Sprintf("^%s_%s", app.StackName(), serviceName)) | ||||
|  | ||||
| 	targetContainer, err := containerPkg.GetContainer(context.Background(), cl, filters, true) | ||||
| 	if err != nil { | ||||
| 		return err | ||||
| 	} | ||||
|  | ||||
| 	fullServiceName := fmt.Sprintf("%s_%s", app.StackName(), serviceName) | ||||
| 	if rsConfig.preHookCmd != "" { | ||||
| 		splitCmd := internal.SafeSplit(rsConfig.preHookCmd) | ||||
|  | ||||
| 		logrus.Debugf("split pre-hook command for %s into %s", fullServiceName, splitCmd) | ||||
|  | ||||
| 		preHookExecOpts := types.ExecConfig{ | ||||
| 			AttachStderr: true, | ||||
| 			AttachStdin:  true, | ||||
| 			AttachStdout: true, | ||||
| 			Cmd:          splitCmd, | ||||
| 			Detach:       false, | ||||
| 			Tty:          true, | ||||
| 		} | ||||
|  | ||||
| 		if err := container.RunExec(dcli, cl, targetContainer.ID, &preHookExecOpts); err != nil { | ||||
| 			return err | ||||
| 		} | ||||
|  | ||||
| 		logrus.Infof("succesfully ran %s pre-hook command: %s", fullServiceName, rsConfig.preHookCmd) | ||||
| 	} | ||||
|  | ||||
| 	backupReader, err := os.Open(backupPath) | ||||
| 	if err != nil { | ||||
| 		return err | ||||
| 	} | ||||
|  | ||||
| 	content, err := archive.DecompressStream(backupReader) | ||||
| 	if err != nil { | ||||
| 		return err | ||||
| 	} | ||||
|  | ||||
| 	// we use absolute paths so tar knows what to do. it will restore files | ||||
| 	// according to the paths set in the compresed archive | ||||
| 	restorePath := "/" | ||||
|  | ||||
| 	copyOpts := types.CopyToContainerOptions{AllowOverwriteDirWithFile: false, CopyUIDGID: false} | ||||
| 	if err := cl.CopyToContainer(context.Background(), targetContainer.ID, restorePath, content, copyOpts); err != nil { | ||||
| 		return err | ||||
| 	} | ||||
|  | ||||
| 	logrus.Infof("restored %s to %s", backupPath, fullServiceName) | ||||
|  | ||||
| 	if rsConfig.postHookCmd != "" { | ||||
| 		splitCmd := internal.SafeSplit(rsConfig.postHookCmd) | ||||
|  | ||||
| 		logrus.Debugf("split post-hook command for %s into %s", fullServiceName, splitCmd) | ||||
|  | ||||
| 		postHookExecOpts := types.ExecConfig{ | ||||
| 			AttachStderr: true, | ||||
| 			AttachStdin:  true, | ||||
| 			AttachStdout: true, | ||||
| 			Cmd:          splitCmd, | ||||
| 			Detach:       false, | ||||
| 			Tty:          true, | ||||
| 		} | ||||
|  | ||||
| 		if err := container.RunExec(dcli, cl, targetContainer.ID, &postHookExecOpts); err != nil { | ||||
| 			return err | ||||
| 		} | ||||
|  | ||||
| 		logrus.Infof("succesfully ran %s post-hook command: %s", fullServiceName, rsConfig.postHookCmd) | ||||
| 	} | ||||
|  | ||||
| 	return nil | ||||
| } | ||||
|  | ||||
| @ -8,7 +8,6 @@ import ( | ||||
| 	"coopcloud.tech/abra/pkg/config" | ||||
| 	"coopcloud.tech/abra/pkg/lint" | ||||
| 	"coopcloud.tech/abra/pkg/recipe" | ||||
| 	"coopcloud.tech/abra/pkg/runtime" | ||||
| 	stack "coopcloud.tech/abra/pkg/upstream/stack" | ||||
| 	"coopcloud.tech/tagcmp" | ||||
|  | ||||
| @ -23,7 +22,7 @@ var appRollbackCommand = cli.Command{ | ||||
| 	Name:      "rollback", | ||||
| 	Aliases:   []string{"rl"}, | ||||
| 	Usage:     "Roll an app back to a previous version", | ||||
| 	ArgsUsage: "<domain>", | ||||
| 	ArgsUsage: "<domain> [<version>]", | ||||
| 	Flags: []cli.Flag{ | ||||
| 		internal.DebugFlag, | ||||
| 		internal.NoInputFlag, | ||||
| @ -43,23 +42,41 @@ useful if the container runtime has gotten into a weird state. | ||||
| This action could be destructive, please ensure you have a copy of your app | ||||
| data beforehand. | ||||
|  | ||||
| Chas mode ("--chaos") will deploy your local checkout of a recipe as-is, | ||||
| Chaos mode ("--chaos") will deploy your local checkout of a recipe as-is, | ||||
| including unstaged changes and can be useful for live hacking and testing new | ||||
| recipes. | ||||
| `, | ||||
| 	BashComplete: autocomplete.AppNameComplete, | ||||
| 	Action: func(c *cli.Context) error { | ||||
| 		conf := runtime.New(runtime.WithOffline(internal.Offline)) | ||||
| 		app := internal.ValidateApp(c, conf) | ||||
| 		app := internal.ValidateApp(c) | ||||
| 		stackName := app.StackName() | ||||
|  | ||||
| 		specificVersion := c.Args().Get(1) | ||||
| 		if specificVersion != "" && internal.Chaos { | ||||
| 			logrus.Fatal("cannot use <version> and --chaos together") | ||||
| 		} | ||||
|  | ||||
| 		if err := recipe.EnsureExists(app.Recipe); err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		if !internal.Chaos { | ||||
| 			if err := recipe.EnsureUpToDate(app.Recipe, conf); err != nil { | ||||
| 			if err := recipe.EnsureIsClean(app.Recipe); err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
|  | ||||
| 			if !internal.Offline { | ||||
| 				if err := recipe.EnsureUpToDate(app.Recipe); err != nil { | ||||
| 					logrus.Fatal(err) | ||||
| 				} | ||||
| 			} | ||||
|  | ||||
| 			if err := recipe.EnsureLatest(app.Recipe); err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
| 		} | ||||
|  | ||||
| 		r, err := recipe.Get(app.Recipe, conf) | ||||
| 		r, err := recipe.Get(app.Recipe, internal.Offline) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
| @ -84,7 +101,7 @@ recipes. | ||||
| 			logrus.Fatalf("%s is not deployed?", app.Name) | ||||
| 		} | ||||
|  | ||||
| 		catl, err := recipe.ReadRecipeCatalogue(conf) | ||||
| 		catl, err := recipe.ReadRecipeCatalogue(internal.Offline) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
| @ -95,16 +112,40 @@ recipes. | ||||
| 		} | ||||
|  | ||||
| 		if len(versions) == 0 && !internal.Chaos { | ||||
| 			logrus.Fatalf("no published releases for %s in the recipe catalogue?", app.Recipe) | ||||
| 			logrus.Warn("no published versions in catalogue, trying local recipe repository") | ||||
| 			recipeVersions, err := recipe.GetRecipeVersions(app.Recipe, internal.Offline) | ||||
| 			if err != nil { | ||||
| 				logrus.Warn(err) | ||||
| 			} | ||||
| 			for _, recipeVersion := range recipeVersions { | ||||
| 				for version := range recipeVersion { | ||||
| 					versions = append(versions, version) | ||||
| 				} | ||||
| 			} | ||||
| 		} | ||||
|  | ||||
| 		var availableDowngrades []string | ||||
| 		if deployedVersion == "unknown" { | ||||
| 			availableDowngrades = versions | ||||
| 			logrus.Warnf("failed to determine version of deployed %s", app.Name) | ||||
| 			logrus.Warnf("failed to determine deployed version of %s", app.Name) | ||||
| 		} | ||||
|  | ||||
| 		if deployedVersion != "unknown" && !internal.Chaos { | ||||
| 		if specificVersion != "" { | ||||
| 			parsedDeployedVersion, err := tagcmp.Parse(deployedVersion) | ||||
| 			if err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
| 			parsedSpecificVersion, err := tagcmp.Parse(specificVersion) | ||||
| 			if err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
| 			if parsedSpecificVersion.IsGreaterThan(parsedDeployedVersion) || parsedSpecificVersion.Equals(parsedDeployedVersion) { | ||||
| 				logrus.Fatalf("%s is not a downgrade for %s?", deployedVersion, specificVersion) | ||||
| 			} | ||||
| 			availableDowngrades = append(availableDowngrades, specificVersion) | ||||
| 		} | ||||
|  | ||||
| 		if deployedVersion != "unknown" && !internal.Chaos && specificVersion == "" { | ||||
| 			for _, version := range versions { | ||||
| 				parsedDeployedVersion, err := tagcmp.Parse(deployedVersion) | ||||
| 				if err != nil { | ||||
| @ -114,12 +155,12 @@ recipes. | ||||
| 				if err != nil { | ||||
| 					logrus.Fatal(err) | ||||
| 				} | ||||
| 				if parsedVersion != parsedDeployedVersion && parsedVersion.IsLessThan(parsedDeployedVersion) { | ||||
| 				if parsedVersion.IsLessThan(parsedDeployedVersion) && !(parsedVersion.Equals(parsedDeployedVersion)) { | ||||
| 					availableDowngrades = append(availableDowngrades, version) | ||||
| 				} | ||||
| 			} | ||||
|  | ||||
| 			if len(availableDowngrades) == 0 { | ||||
| 			if len(availableDowngrades) == 0 && !internal.Force { | ||||
| 				logrus.Info("no available downgrades, you're on oldest ✌️") | ||||
| 				return nil | ||||
| 			} | ||||
| @ -127,9 +168,9 @@ recipes. | ||||
|  | ||||
| 		var chosenDowngrade string | ||||
| 		if len(availableDowngrades) > 0 && !internal.Chaos { | ||||
| 			if internal.Force || internal.NoInput { | ||||
| 			if internal.Force || internal.NoInput || specificVersion != "" { | ||||
| 				chosenDowngrade = availableDowngrades[len(availableDowngrades)-1] | ||||
| 				logrus.Debugf("choosing %s as version to downgrade to (--force)", chosenDowngrade) | ||||
| 				logrus.Debugf("choosing %s as version to downgrade to (--force/--no-input)", chosenDowngrade) | ||||
| 			} else { | ||||
| 				prompt := &survey.Select{ | ||||
| 					Message: fmt.Sprintf("Please select a downgrade (current version: %s):", deployedVersion), | ||||
| @ -165,7 +206,7 @@ recipes. | ||||
| 			app.Env[k] = v | ||||
| 		} | ||||
|  | ||||
| 		composeFiles, err := config.GetAppComposeFiles(app.Recipe, app.Env) | ||||
| 		composeFiles, err := config.GetComposeFiles(app.Recipe, app.Env) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
| @ -185,7 +226,8 @@ recipes. | ||||
| 		config.SetChaosVersionLabel(compose, stackName, chosenDowngrade) | ||||
| 		config.SetUpdateLabel(compose, stackName, app.Env) | ||||
|  | ||||
| 		if err := NewVersionOverview(app, deployedVersion, chosenDowngrade, ""); err != nil { | ||||
| 		// NOTE(d1): no release notes implemeneted for rolling back | ||||
| 		if err := internal.NewVersionOverview(app, deployedVersion, chosenDowngrade, ""); err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
|  | ||||
| @ -9,7 +9,6 @@ import ( | ||||
| 	"coopcloud.tech/abra/pkg/autocomplete" | ||||
| 	"coopcloud.tech/abra/pkg/client" | ||||
| 	containerPkg "coopcloud.tech/abra/pkg/container" | ||||
| 	"coopcloud.tech/abra/pkg/runtime" | ||||
| 	"coopcloud.tech/abra/pkg/upstream/container" | ||||
| 	"github.com/docker/cli/cli/command" | ||||
| 	"github.com/docker/docker/api/types" | ||||
| @ -38,15 +37,13 @@ var appRunCommand = cli.Command{ | ||||
| 		internal.DebugFlag, | ||||
| 		noTTYFlag, | ||||
| 		userFlag, | ||||
| 		internal.OfflineFlag, | ||||
| 	}, | ||||
| 	Before:       internal.SubCommandBefore, | ||||
| 	ArgsUsage:    "<domain> <service> <args>...", | ||||
| 	Usage:        "Run a command in a service container", | ||||
| 	BashComplete: autocomplete.AppNameComplete, | ||||
| 	Action: func(c *cli.Context) error { | ||||
| 		conf := runtime.New(runtime.WithOffline(internal.Offline)) | ||||
| 		app := internal.ValidateApp(c, conf) | ||||
| 		app := internal.ValidateApp(c) | ||||
|  | ||||
| 		if len(c.Args()) < 2 { | ||||
| 			internal.ShowSubcommandHelpAndError(c, errors.New("no <service> provided?")) | ||||
| @ -94,7 +91,7 @@ var appRunCommand = cli.Command{ | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		if err := container.RunExec(dcli, cl, targetContainer.ID, &execCreateOpts); err != nil { | ||||
| 		if _, err := container.RunExec(dcli, cl, targetContainer.ID, &execCreateOpts); err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
|  | ||||
| @ -12,7 +12,7 @@ import ( | ||||
| 	"coopcloud.tech/abra/pkg/client" | ||||
| 	"coopcloud.tech/abra/pkg/config" | ||||
| 	"coopcloud.tech/abra/pkg/formatter" | ||||
| 	"coopcloud.tech/abra/pkg/runtime" | ||||
| 	"coopcloud.tech/abra/pkg/recipe" | ||||
| 	"coopcloud.tech/abra/pkg/secret" | ||||
| 	"github.com/docker/docker/api/types" | ||||
| 	dockerClient "github.com/docker/docker/client" | ||||
| @ -20,19 +20,23 @@ import ( | ||||
| 	"github.com/urfave/cli" | ||||
| ) | ||||
|  | ||||
| var allSecrets bool | ||||
| var allSecretsFlag = &cli.BoolFlag{ | ||||
| 	Name:        "all, a", | ||||
| 	Destination: &allSecrets, | ||||
| 	Usage:       "Generate all secrets", | ||||
| } | ||||
| var ( | ||||
| 	allSecrets     bool | ||||
| 	allSecretsFlag = &cli.BoolFlag{ | ||||
| 		Name:        "all, a", | ||||
| 		Destination: &allSecrets, | ||||
| 		Usage:       "Generate all secrets", | ||||
| 	} | ||||
| ) | ||||
|  | ||||
| var rmAllSecrets bool | ||||
| var rmAllSecretsFlag = &cli.BoolFlag{ | ||||
| 	Name:        "all, a", | ||||
| 	Destination: &rmAllSecrets, | ||||
| 	Usage:       "Remove all secrets", | ||||
| } | ||||
| var ( | ||||
| 	rmAllSecrets     bool | ||||
| 	rmAllSecretsFlag = &cli.BoolFlag{ | ||||
| 		Name:        "all, a", | ||||
| 		Destination: &rmAllSecrets, | ||||
| 		Usage:       "Remove all secrets", | ||||
| 	} | ||||
| ) | ||||
|  | ||||
| var appSecretGenerateCommand = cli.Command{ | ||||
| 	Name:      "generate", | ||||
| @ -43,19 +47,35 @@ var appSecretGenerateCommand = cli.Command{ | ||||
| 		internal.DebugFlag, | ||||
| 		allSecretsFlag, | ||||
| 		internal.PassFlag, | ||||
| 		internal.MachineReadableFlag, | ||||
| 		internal.OfflineFlag, | ||||
| 		internal.ChaosFlag, | ||||
| 	}, | ||||
| 	Before:       internal.SubCommandBefore, | ||||
| 	BashComplete: autocomplete.AppNameComplete, | ||||
| 	Action: func(c *cli.Context) error { | ||||
| 		conf := runtime.New(runtime.WithOffline(internal.Offline)) | ||||
| 		app := internal.ValidateApp(c, conf) | ||||
| 		app := internal.ValidateApp(c) | ||||
|  | ||||
| 		cl, err := client.New(app.Server) | ||||
| 		if err != nil { | ||||
| 		if err := recipe.EnsureExists(app.Recipe); err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		if !internal.Chaos { | ||||
| 			if err := recipe.EnsureIsClean(app.Recipe); err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
|  | ||||
| 			if !internal.Offline { | ||||
| 				if err := recipe.EnsureUpToDate(app.Recipe); err != nil { | ||||
| 					logrus.Fatal(err) | ||||
| 				} | ||||
| 			} | ||||
|  | ||||
| 			if err := recipe.EnsureLatest(app.Recipe); err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
| 		} | ||||
|  | ||||
| 		if len(c.Args()) == 1 && !allSecrets { | ||||
| 			err := errors.New("missing arguments <secret>/<version> or '--all'") | ||||
| 			internal.ShowSubcommandHelpAndError(c, err) | ||||
| @ -66,28 +86,35 @@ var appSecretGenerateCommand = cli.Command{ | ||||
| 			internal.ShowSubcommandHelpAndError(c, err) | ||||
| 		} | ||||
|  | ||||
| 		secretsToCreate := make(map[string]string) | ||||
| 		secretEnvVars := secret.ReadSecretEnvVars(app.Env) | ||||
| 		if allSecrets { | ||||
| 			secretsToCreate = secretEnvVars | ||||
| 		} else { | ||||
| 		composeFiles, err := config.GetComposeFiles(app.Recipe, app.Env) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		secrets, err := secret.ReadSecretsConfig(app.Path, composeFiles, app.StackName()) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		if !allSecrets { | ||||
| 			secretName := c.Args().Get(1) | ||||
| 			secretVersion := c.Args().Get(2) | ||||
| 			matches := false | ||||
| 			for sec := range secretEnvVars { | ||||
| 				parsed := secret.ParseSecretEnvVarName(sec) | ||||
| 				if secretName == parsed { | ||||
| 					secretsToCreate[sec] = secretVersion | ||||
| 					matches = true | ||||
| 				} | ||||
| 			} | ||||
|  | ||||
| 			if !matches { | ||||
| 			s, ok := secrets[secretName] | ||||
| 			if !ok { | ||||
| 				logrus.Fatalf("%s doesn't exist in the env config?", secretName) | ||||
| 			} | ||||
| 			s.Version = secretVersion | ||||
| 			secrets = map[string]secret.Secret{ | ||||
| 				secretName: s, | ||||
| 			} | ||||
| 		} | ||||
|  | ||||
| 		secretVals, err := secret.GenerateSecrets(cl, secretsToCreate, app.StackName(), app.Server) | ||||
| 		cl, err := client.New(app.Server) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		secretVals, err := secret.GenerateSecrets(cl, secrets, app.Server) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
| @ -110,8 +137,13 @@ var appSecretGenerateCommand = cli.Command{ | ||||
| 		for name, val := range secretVals { | ||||
| 			table.Append([]string{name, val}) | ||||
| 		} | ||||
| 		table.Render() | ||||
| 		logrus.Warn("generated secrets are not shown again, please take note of them *now*") | ||||
|  | ||||
| 		if internal.MachineReadable { | ||||
| 			table.JSONRender() | ||||
| 		} else { | ||||
| 			table.Render() | ||||
| 		} | ||||
| 		logrus.Warn("generated secrets are not shown again, please take note of them NOW") | ||||
|  | ||||
| 		return nil | ||||
| 	}, | ||||
| @ -124,7 +156,6 @@ var appSecretInsertCommand = cli.Command{ | ||||
| 	Flags: []cli.Flag{ | ||||
| 		internal.DebugFlag, | ||||
| 		internal.PassFlag, | ||||
| 		internal.OfflineFlag, | ||||
| 	}, | ||||
| 	Before:       internal.SubCommandBefore, | ||||
| 	ArgsUsage:    "<domain> <secret-name> <version> <data>", | ||||
| @ -142,18 +173,17 @@ Example: | ||||
|  | ||||
| `, | ||||
| 	Action: func(c *cli.Context) error { | ||||
| 		conf := runtime.New(runtime.WithOffline(internal.Offline)) | ||||
| 		app := internal.ValidateApp(c, conf) | ||||
| 		app := internal.ValidateApp(c) | ||||
|  | ||||
| 		if len(c.Args()) != 4 { | ||||
| 			internal.ShowSubcommandHelpAndError(c, errors.New("missing arguments?")) | ||||
| 		} | ||||
|  | ||||
| 		cl, err := client.New(app.Server) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		if len(c.Args()) != 4 { | ||||
| 			internal.ShowSubcommandHelpAndError(c, errors.New("missing arguments?")) | ||||
| 		} | ||||
|  | ||||
| 		name := c.Args().Get(1) | ||||
| 		version := c.Args().Get(2) | ||||
| 		data := c.Args().Get(3) | ||||
| @ -204,6 +234,7 @@ var appSecretRmCommand = cli.Command{ | ||||
| 		rmAllSecretsFlag, | ||||
| 		internal.PassRemoveFlag, | ||||
| 		internal.OfflineFlag, | ||||
| 		internal.ChaosFlag, | ||||
| 	}, | ||||
| 	Before:       internal.SubCommandBefore, | ||||
| 	ArgsUsage:    "<domain> [<secret-name>]", | ||||
| @ -216,9 +247,37 @@ Example: | ||||
|     abra app secret remove myapp db_pass | ||||
| `, | ||||
| 	Action: func(c *cli.Context) error { | ||||
| 		conf := runtime.New(runtime.WithOffline(internal.Offline)) | ||||
| 		app := internal.ValidateApp(c, conf) | ||||
| 		secrets := secret.ReadSecretEnvVars(app.Env) | ||||
| 		app := internal.ValidateApp(c) | ||||
|  | ||||
| 		if err := recipe.EnsureExists(app.Recipe); err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		if !internal.Chaos { | ||||
| 			if err := recipe.EnsureIsClean(app.Recipe); err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
|  | ||||
| 			if !internal.Offline { | ||||
| 				if err := recipe.EnsureUpToDate(app.Recipe); err != nil { | ||||
| 					logrus.Fatal(err) | ||||
| 				} | ||||
| 			} | ||||
|  | ||||
| 			if err := recipe.EnsureLatest(app.Recipe); err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
| 		} | ||||
|  | ||||
| 		composeFiles, err := config.GetComposeFiles(app.Recipe, app.Env) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		secrets, err := secret.ReadSecretsConfig(app.Path, composeFiles, app.StackName()) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		if c.Args().Get(1) != "" && rmAllSecrets { | ||||
| 			internal.ShowSubcommandHelpAndError(c, errors.New("cannot use '<secret-name>' and '--all' together")) | ||||
| @ -250,15 +309,8 @@ Example: | ||||
|  | ||||
| 		match := false | ||||
| 		secretToRm := c.Args().Get(1) | ||||
| 		for sec := range secrets { | ||||
| 			secretName := secret.ParseSecretEnvVarName(sec) | ||||
|  | ||||
| 			secVal, err := secret.ParseSecretEnvVarValue(secrets[sec]) | ||||
| 			if err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
|  | ||||
| 			secretRemoteName := fmt.Sprintf("%s_%s_%s", app.StackName(), secretName, secVal.Version) | ||||
| 		for secretName, val := range secrets { | ||||
| 			secretRemoteName := fmt.Sprintf("%s_%s_%s", app.StackName(), secretName, val.Version) | ||||
| 			if _, ok := remoteSecretNames[secretRemoteName]; ok { | ||||
| 				if secretToRm != "" { | ||||
| 					if secretName == secretToRm { | ||||
| @ -296,61 +348,70 @@ var appSecretLsCommand = cli.Command{ | ||||
| 	Flags: []cli.Flag{ | ||||
| 		internal.DebugFlag, | ||||
| 		internal.OfflineFlag, | ||||
| 		internal.ChaosFlag, | ||||
| 		internal.MachineReadableFlag, | ||||
| 	}, | ||||
| 	Before: internal.SubCommandBefore, | ||||
| 	Usage:  "List all secrets", | ||||
| 	Before:       internal.SubCommandBefore, | ||||
| 	Usage:        "List all secrets", | ||||
| 	BashComplete: autocomplete.AppNameComplete, | ||||
| 	Action: func(c *cli.Context) error { | ||||
| 		conf := runtime.New(runtime.WithOffline(internal.Offline)) | ||||
| 		app := internal.ValidateApp(c, conf) | ||||
| 		secrets := secret.ReadSecretEnvVars(app.Env) | ||||
| 		app := internal.ValidateApp(c) | ||||
|  | ||||
| 		tableCol := []string{"Name", "Version", "Generated Name", "Created On Server"} | ||||
| 		table := formatter.CreateTable(tableCol) | ||||
| 		if err := recipe.EnsureExists(app.Recipe); err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		if !internal.Chaos { | ||||
| 			if err := recipe.EnsureIsClean(app.Recipe); err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
|  | ||||
| 			if !internal.Offline { | ||||
| 				if err := recipe.EnsureUpToDate(app.Recipe); err != nil { | ||||
| 					logrus.Fatal(err) | ||||
| 				} | ||||
| 			} | ||||
|  | ||||
| 			if err := recipe.EnsureLatest(app.Recipe); err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
| 		} | ||||
|  | ||||
| 		cl, err := client.New(app.Server) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		filters, err := app.Filters(false, false) | ||||
| 		tableCol := []string{"Name", "Version", "Generated Name", "Created On Server"} | ||||
| 		table := formatter.CreateTable(tableCol) | ||||
|  | ||||
| 		secStats, err := secret.PollSecretsStatus(cl, app) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		secretList, err := cl.SecretList(context.Background(), types.SecretListOptions{Filters: filters}) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		remoteSecretNames := make(map[string]bool) | ||||
| 		for _, cont := range secretList { | ||||
| 			remoteSecretNames[cont.Spec.Annotations.Name] = true | ||||
| 		} | ||||
|  | ||||
| 		for sec := range secrets { | ||||
| 			createdRemote := false | ||||
| 			secretName := secret.ParseSecretEnvVarName(sec) | ||||
| 			secVal, err := secret.ParseSecretEnvVarValue(secrets[sec]) | ||||
| 			if err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 		for _, secStat := range secStats { | ||||
| 			tableRow := []string{ | ||||
| 				secStat.LocalName, | ||||
| 				secStat.Version, | ||||
| 				secStat.RemoteName, | ||||
| 				strconv.FormatBool(secStat.CreatedOnRemote), | ||||
| 			} | ||||
| 			secretRemoteName := fmt.Sprintf("%s_%s_%s", app.StackName(), secretName, secVal.Version) | ||||
| 			if _, ok := remoteSecretNames[secretRemoteName]; ok { | ||||
| 				createdRemote = true | ||||
| 			} | ||||
| 			tableRow := []string{secretName, secVal.Version, secretRemoteName, strconv.FormatBool(createdRemote)} | ||||
| 			table.Append(tableRow) | ||||
| 		} | ||||
|  | ||||
| 		if table.NumLines() > 0 { | ||||
| 			table.Render() | ||||
| 			if internal.MachineReadable { | ||||
| 				table.JSONRender() | ||||
| 			} else { | ||||
| 				table.Render() | ||||
| 			} | ||||
| 		} else { | ||||
| 			logrus.Warnf("no secrets stored for %s", app.Name) | ||||
| 		} | ||||
|  | ||||
| 		return nil | ||||
| 	}, | ||||
| 	BashComplete: autocomplete.AppNameComplete, | ||||
| } | ||||
|  | ||||
| var appSecretCommand = cli.Command{ | ||||
|  | ||||
| @ -9,7 +9,6 @@ import ( | ||||
| 	"coopcloud.tech/abra/pkg/autocomplete" | ||||
| 	"coopcloud.tech/abra/pkg/client" | ||||
| 	"coopcloud.tech/abra/pkg/formatter" | ||||
| 	"coopcloud.tech/abra/pkg/runtime" | ||||
| 	"coopcloud.tech/abra/pkg/service" | ||||
| 	stack "coopcloud.tech/abra/pkg/upstream/stack" | ||||
| 	"github.com/docker/docker/api/types" | ||||
| @ -24,13 +23,11 @@ var appServicesCommand = cli.Command{ | ||||
| 	ArgsUsage: "<domain>", | ||||
| 	Flags: []cli.Flag{ | ||||
| 		internal.DebugFlag, | ||||
| 		internal.OfflineFlag, | ||||
| 	}, | ||||
| 	Before:       internal.SubCommandBefore, | ||||
| 	BashComplete: autocomplete.AppNameComplete, | ||||
| 	Action: func(c *cli.Context) error { | ||||
| 		conf := runtime.New(runtime.WithOffline(internal.Offline)) | ||||
| 		app := internal.ValidateApp(c, conf) | ||||
| 		app := internal.ValidateApp(c) | ||||
|  | ||||
| 		cl, err := client.New(app.Server) | ||||
| 		if err != nil { | ||||
|  | ||||
| @ -10,7 +10,6 @@ import ( | ||||
| 	"coopcloud.tech/abra/pkg/client" | ||||
| 	"coopcloud.tech/abra/pkg/config" | ||||
| 	"coopcloud.tech/abra/pkg/formatter" | ||||
| 	"coopcloud.tech/abra/pkg/runtime" | ||||
| 	stack "coopcloud.tech/abra/pkg/upstream/stack" | ||||
| 	"github.com/docker/docker/api/types/filters" | ||||
| 	dockerClient "github.com/docker/docker/client" | ||||
| @ -87,7 +86,6 @@ var appUndeployCommand = cli.Command{ | ||||
| 		internal.DebugFlag, | ||||
| 		internal.NoInputFlag, | ||||
| 		pruneFlag, | ||||
| 		internal.OfflineFlag, | ||||
| 	}, | ||||
| 	Before:       internal.SubCommandBefore, | ||||
| 	Usage:        "Undeploy an app", | ||||
| @ -101,8 +99,7 @@ any previously attached volumes as eligible for pruning once undeployed. | ||||
| Passing "-p/--prune" does not remove those volumes. | ||||
| `, | ||||
| 	Action: func(c *cli.Context) error { | ||||
| 		conf := runtime.New(runtime.WithOffline(internal.Offline)) | ||||
| 		app := internal.ValidateApp(c, conf) | ||||
| 		app := internal.ValidateApp(c) | ||||
| 		stackName := app.StackName() | ||||
|  | ||||
| 		cl, err := client.New(app.Server) | ||||
| @ -121,7 +118,7 @@ Passing "-p/--prune" does not remove those volumes. | ||||
| 			logrus.Fatalf("%s is not deployed?", app.Name) | ||||
| 		} | ||||
|  | ||||
| 		if err := DeployOverview(app, deployedVersion, "continue with undeploy?"); err != nil { | ||||
| 		if err := internal.DeployOverview(app, deployedVersion, "continue with undeploy?"); err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
|  | ||||
| @ -10,7 +10,7 @@ import ( | ||||
| 	"coopcloud.tech/abra/pkg/config" | ||||
| 	"coopcloud.tech/abra/pkg/lint" | ||||
| 	"coopcloud.tech/abra/pkg/recipe" | ||||
| 	"coopcloud.tech/abra/pkg/runtime" | ||||
| 	recipePkg "coopcloud.tech/abra/pkg/recipe" | ||||
| 	stack "coopcloud.tech/abra/pkg/upstream/stack" | ||||
| 	"coopcloud.tech/tagcmp" | ||||
| 	"github.com/AlecAivazis/survey/v2" | ||||
| @ -22,7 +22,7 @@ var appUpgradeCommand = cli.Command{ | ||||
| 	Name:      "upgrade", | ||||
| 	Aliases:   []string{"up"}, | ||||
| 	Usage:     "Upgrade an app", | ||||
| 	ArgsUsage: "<domain>", | ||||
| 	ArgsUsage: "<domain> [<version>]", | ||||
| 	Flags: []cli.Flag{ | ||||
| 		internal.DebugFlag, | ||||
| 		internal.NoInputFlag, | ||||
| @ -47,37 +47,52 @@ useful if the container runtime has gotten into a weird state. | ||||
| This action could be destructive, please ensure you have a copy of your app | ||||
| data beforehand. | ||||
|  | ||||
| Chas mode ("--chaos") will deploy your local checkout of a recipe as-is, | ||||
| Chaos mode ("--chaos") will deploy your local checkout of a recipe as-is, | ||||
| including unstaged changes and can be useful for live hacking and testing new | ||||
| recipes. | ||||
| `, | ||||
| 	BashComplete: autocomplete.AppNameComplete, | ||||
| 	Action: func(c *cli.Context) error { | ||||
| 		conf := runtime.New(runtime.WithOffline(internal.Offline)) | ||||
| 		app := internal.ValidateApp(c, conf) | ||||
| 		app := internal.ValidateApp(c) | ||||
| 		stackName := app.StackName() | ||||
|  | ||||
| 		specificVersion := c.Args().Get(1) | ||||
| 		if specificVersion != "" && internal.Chaos { | ||||
| 			logrus.Fatal("cannot use <version> and --chaos together") | ||||
| 		} | ||||
|  | ||||
| 		if !internal.Chaos { | ||||
| 			if err := recipe.EnsureIsClean(app.Recipe); err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
|  | ||||
| 			if !internal.Offline { | ||||
| 				if err := recipe.EnsureUpToDate(app.Recipe); err != nil { | ||||
| 					logrus.Fatal(err) | ||||
| 				} | ||||
| 			} | ||||
|  | ||||
| 			if err := recipe.EnsureLatest(app.Recipe); err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
| 		} | ||||
|  | ||||
| 		recipe, err := recipePkg.Get(app.Recipe, internal.Offline) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		if err := lint.LintForErrors(recipe); err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		logrus.Debugf("checking whether %s is already deployed", stackName) | ||||
|  | ||||
| 		cl, err := client.New(app.Server) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		if !internal.Chaos { | ||||
| 			if err := recipe.EnsureUpToDate(app.Recipe, conf); err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
| 		} | ||||
|  | ||||
| 		r, err := recipe.Get(app.Recipe, conf) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		if err := lint.LintForErrors(r); err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		logrus.Debugf("checking whether %s is already deployed", stackName) | ||||
|  | ||||
| 		isDeployed, deployedVersion, err := stack.IsDeployed(context.Background(), cl, stackName) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| @ -87,37 +102,62 @@ recipes. | ||||
| 			logrus.Fatalf("%s is not deployed?", app.Name) | ||||
| 		} | ||||
|  | ||||
| 		catl, err := recipe.ReadRecipeCatalogue(conf) | ||||
| 		catl, err := recipePkg.ReadRecipeCatalogue(internal.Offline) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		versions, err := recipe.GetRecipeCatalogueVersions(app.Recipe, catl) | ||||
| 		versions, err := recipePkg.GetRecipeCatalogueVersions(app.Recipe, catl) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		if len(versions) == 0 && !internal.Chaos { | ||||
| 			logrus.Fatalf("no published releases for %s in the recipe catalogue?", app.Recipe) | ||||
| 			logrus.Warn("no published versions in catalogue, trying local recipe repository") | ||||
| 			recipeVersions, err := recipePkg.GetRecipeVersions(app.Recipe, internal.Offline) | ||||
| 			if err != nil { | ||||
| 				logrus.Warn(err) | ||||
| 			} | ||||
| 			for _, recipeVersion := range recipeVersions { | ||||
| 				for version := range recipeVersion { | ||||
| 					versions = append(versions, version) | ||||
| 				} | ||||
| 			} | ||||
| 		} | ||||
|  | ||||
| 		var availableUpgrades []string | ||||
| 		if deployedVersion == "unknown" { | ||||
| 			availableUpgrades = versions | ||||
| 			logrus.Warnf("failed to determine version of deployed %s", app.Name) | ||||
| 			logrus.Warnf("failed to determine deployed version of %s", app.Name) | ||||
| 		} | ||||
|  | ||||
| 		if deployedVersion != "unknown" && !internal.Chaos { | ||||
| 		if specificVersion != "" { | ||||
| 			parsedDeployedVersion, err := tagcmp.Parse(deployedVersion) | ||||
| 			if err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
| 			parsedSpecificVersion, err := tagcmp.Parse(specificVersion) | ||||
| 			if err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
| 			if parsedSpecificVersion.IsLessThan(parsedDeployedVersion) || parsedSpecificVersion.Equals(parsedDeployedVersion) { | ||||
| 				logrus.Fatalf("%s is not an upgrade for %s?", deployedVersion, specificVersion) | ||||
| 			} | ||||
| 			availableUpgrades = append(availableUpgrades, specificVersion) | ||||
| 		} | ||||
|  | ||||
| 		parsedDeployedVersion, err := tagcmp.Parse(deployedVersion) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		if deployedVersion != "unknown" && !internal.Chaos && specificVersion == "" { | ||||
| 			for _, version := range versions { | ||||
| 				parsedDeployedVersion, err := tagcmp.Parse(deployedVersion) | ||||
| 				if err != nil { | ||||
| 					logrus.Fatal(err) | ||||
| 				} | ||||
| 				parsedVersion, err := tagcmp.Parse(version) | ||||
| 				if err != nil { | ||||
| 					logrus.Fatal(err) | ||||
| 				} | ||||
| 				if parsedVersion.IsGreaterThan(parsedDeployedVersion) { | ||||
| 				if parsedVersion.IsGreaterThan(parsedDeployedVersion) && !(parsedVersion.Equals(parsedDeployedVersion)) { | ||||
| 					availableUpgrades = append(availableUpgrades, version) | ||||
| 				} | ||||
| 			} | ||||
| @ -130,7 +170,7 @@ recipes. | ||||
|  | ||||
| 		var chosenUpgrade string | ||||
| 		if len(availableUpgrades) > 0 && !internal.Chaos { | ||||
| 			if internal.Force || internal.NoInput { | ||||
| 			if internal.Force || internal.NoInput || specificVersion != "" { | ||||
| 				chosenUpgrade = availableUpgrades[len(availableUpgrades)-1] | ||||
| 				logrus.Debugf("choosing %s as version to upgrade to", chosenUpgrade) | ||||
| 			} else { | ||||
| @ -152,13 +192,30 @@ recipes. | ||||
| 		// if release notes written after git tag published, read them before we | ||||
| 		// check out the tag and then they'll appear to be missing. this covers | ||||
| 		// when we obviously will forget to write release notes before publishing | ||||
| 		releaseNotes, err := GetReleaseNotes(app.Recipe, chosenUpgrade) | ||||
| 		if err != nil { | ||||
| 			return err | ||||
| 		var releaseNotes string | ||||
| 		for _, version := range versions { | ||||
| 			parsedVersion, err := tagcmp.Parse(version) | ||||
| 			if err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
| 			parsedChosenUpgrade, err := tagcmp.Parse(chosenUpgrade) | ||||
| 			if err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
|  | ||||
| 			if !(parsedVersion.Equals(parsedDeployedVersion)) && parsedVersion.IsLessThan(parsedChosenUpgrade) { | ||||
| 				note, err := internal.GetReleaseNotes(app.Recipe, version) | ||||
| 				if err != nil { | ||||
| 					return err | ||||
| 				} | ||||
| 				if note != "" { | ||||
| 					releaseNotes += fmt.Sprintf("%s\n", note) | ||||
| 				} | ||||
| 			} | ||||
| 		} | ||||
|  | ||||
| 		if !internal.Chaos { | ||||
| 			if err := recipe.EnsureVersion(app.Recipe, chosenUpgrade); err != nil { | ||||
| 			if err := recipePkg.EnsureVersion(app.Recipe, chosenUpgrade); err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
| 		} | ||||
| @ -166,7 +223,7 @@ recipes. | ||||
| 		if internal.Chaos { | ||||
| 			logrus.Warn("chaos mode engaged") | ||||
| 			var err error | ||||
| 			chosenUpgrade, err = recipe.ChaosVersion(app.Recipe) | ||||
| 			chosenUpgrade, err = recipePkg.ChaosVersion(app.Recipe) | ||||
| 			if err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
| @ -181,7 +238,7 @@ recipes. | ||||
| 			app.Env[k] = v | ||||
| 		} | ||||
|  | ||||
| 		composeFiles, err := config.GetAppComposeFiles(app.Recipe, app.Env) | ||||
| 		composeFiles, err := config.GetComposeFiles(app.Recipe, app.Env) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
| @ -201,7 +258,18 @@ recipes. | ||||
| 		config.SetChaosVersionLabel(compose, stackName, chosenUpgrade) | ||||
| 		config.SetUpdateLabel(compose, stackName, app.Env) | ||||
|  | ||||
| 		if err := NewVersionOverview(app, deployedVersion, chosenUpgrade, releaseNotes); err != nil { | ||||
| 		envVars, err := config.CheckEnv(app) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		for _, envVar := range envVars { | ||||
| 			if !envVar.Present { | ||||
| 				logrus.Warnf("env var %s missing from %s.env, present in recipe .env.sample", envVar.Name, app.Domain) | ||||
| 			} | ||||
| 		} | ||||
|  | ||||
| 		if err := internal.NewVersionOverview(app, deployedVersion, chosenUpgrade, releaseNotes); err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| @ -218,12 +286,11 @@ recipes. | ||||
| 		postDeployCmds, ok := app.Env["POST_UPGRADE_CMDS"] | ||||
| 		if ok && !internal.DontWaitConverge { | ||||
| 			logrus.Debugf("run the following post-deploy commands: %s", postDeployCmds) | ||||
| 			if err := PostCmds(cl, app, postDeployCmds); err != nil { | ||||
| 			if err := internal.PostCmds(cl, app, postDeployCmds); err != nil { | ||||
| 				logrus.Fatalf("attempting to run post deploy commands, saw: %s", err) | ||||
| 			} | ||||
| 		} | ||||
|  | ||||
| 		return nil | ||||
| 	}, | ||||
| 	BashComplete: autocomplete.AppNameComplete, | ||||
| } | ||||
|  | ||||
| @ -2,19 +2,30 @@ package app | ||||
|  | ||||
| import ( | ||||
| 	"context" | ||||
| 	"sort" | ||||
|  | ||||
| 	"coopcloud.tech/abra/cli/internal" | ||||
| 	"coopcloud.tech/abra/pkg/autocomplete" | ||||
| 	"coopcloud.tech/abra/pkg/client" | ||||
| 	"coopcloud.tech/abra/pkg/formatter" | ||||
| 	"coopcloud.tech/abra/pkg/recipe" | ||||
| 	"coopcloud.tech/abra/pkg/runtime" | ||||
| 	"coopcloud.tech/abra/pkg/upstream/stack" | ||||
| 	"github.com/docker/distribution/reference" | ||||
| 	"github.com/olekukonko/tablewriter" | ||||
| 	"github.com/sirupsen/logrus" | ||||
| 	"github.com/urfave/cli" | ||||
| ) | ||||
|  | ||||
| func sortServiceByName(versions [][]string) func(i, j int) bool { | ||||
| 	return func(i, j int) bool { | ||||
| 		// NOTE(d1): corresponds to the `tableCol` definition below | ||||
| 		if versions[i][1] == "app" { | ||||
| 			return true | ||||
| 		} | ||||
| 		return versions[i][1] < versions[j][1] | ||||
| 	} | ||||
| } | ||||
|  | ||||
| // getImagePath returns the image name | ||||
| func getImagePath(image string) (string, error) { | ||||
| 	img, err := reference.ParseNormalizedNamed(image) | ||||
| @ -40,16 +51,11 @@ var appVersionCommand = cli.Command{ | ||||
| 		internal.NoInputFlag, | ||||
| 		internal.OfflineFlag, | ||||
| 	}, | ||||
| 	Before: internal.SubCommandBefore, | ||||
| 	Usage:  "Show app versions", | ||||
| 	Description: ` | ||||
| Show all information about versioning related to a deployed app. This includes | ||||
| the individual image names, tags and digests. But also the Co-op Cloud recipe | ||||
| version. | ||||
| `, | ||||
| 	Before:       internal.SubCommandBefore, | ||||
| 	Usage:        "Show version info of a deployed app", | ||||
| 	BashComplete: autocomplete.AppNameComplete, | ||||
| 	Action: func(c *cli.Context) error { | ||||
| 		conf := runtime.New(runtime.WithOffline(internal.Offline)) | ||||
| 		app := internal.ValidateApp(c, conf) | ||||
| 		app := internal.ValidateApp(c) | ||||
| 		stackName := app.StackName() | ||||
|  | ||||
| 		cl, err := client.New(app.Server) | ||||
| @ -64,15 +70,15 @@ version. | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		if deployedVersion == "unknown" { | ||||
| 			logrus.Fatalf("failed to determine version of deployed %s", app.Name) | ||||
| 		} | ||||
|  | ||||
| 		if !isDeployed { | ||||
| 			logrus.Fatalf("%s is not deployed?", app.Name) | ||||
| 		} | ||||
|  | ||||
| 		recipeMeta, err := recipe.GetRecipeMeta(app.Recipe, conf) | ||||
| 		if deployedVersion == "unknown" { | ||||
| 			logrus.Fatalf("failed to determine version of deployed %s", app.Name) | ||||
| 		} | ||||
|  | ||||
| 		recipeMeta, err := recipe.GetRecipeMeta(app.Recipe, internal.Offline) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
| @ -88,17 +94,24 @@ version. | ||||
| 			logrus.Fatalf("could not retrieve deployed version (%s) from recipe catalogue?", deployedVersion) | ||||
| 		} | ||||
|  | ||||
| 		tableCol := []string{"version", "service", "image"} | ||||
| 		tableCol := []string{"version", "service", "image", "tag"} | ||||
| 		table := formatter.CreateTable(tableCol) | ||||
| 		table.SetAutoMergeCellsByColumnIndex([]int{0}) | ||||
|  | ||||
| 		var versions [][]string | ||||
| 		for serviceName, versionMeta := range versionsMeta { | ||||
| 			table.Append([]string{deployedVersion, serviceName, versionMeta.Image}) | ||||
| 			versions = append(versions, []string{deployedVersion, serviceName, versionMeta.Image, versionMeta.Tag}) | ||||
| 		} | ||||
|  | ||||
| 		sort.Slice(versions, sortServiceByName(versions)) | ||||
|  | ||||
| 		for _, version := range versions { | ||||
| 			table.Append(version) | ||||
| 		} | ||||
|  | ||||
| 		table.SetAutoMergeCellsByColumnIndex([]int{0}) | ||||
| 		table.SetAlignment(tablewriter.ALIGN_LEFT) | ||||
| 		table.Render() | ||||
|  | ||||
| 		return nil | ||||
| 	}, | ||||
| 	BashComplete: autocomplete.AppNameComplete, | ||||
| } | ||||
|  | ||||
| @ -7,7 +7,7 @@ import ( | ||||
| 	"coopcloud.tech/abra/pkg/autocomplete" | ||||
| 	"coopcloud.tech/abra/pkg/client" | ||||
| 	"coopcloud.tech/abra/pkg/formatter" | ||||
| 	"coopcloud.tech/abra/pkg/runtime" | ||||
| 	"coopcloud.tech/abra/pkg/upstream/stack" | ||||
| 	"github.com/AlecAivazis/survey/v2" | ||||
| 	"github.com/sirupsen/logrus" | ||||
| 	"github.com/urfave/cli" | ||||
| @ -20,14 +20,12 @@ var appVolumeListCommand = cli.Command{ | ||||
| 	Flags: []cli.Flag{ | ||||
| 		internal.DebugFlag, | ||||
| 		internal.NoInputFlag, | ||||
| 		internal.OfflineFlag, | ||||
| 	}, | ||||
| 	Before:       internal.SubCommandBefore, | ||||
| 	Usage:        "List volumes associated with an app", | ||||
| 	BashComplete: autocomplete.AppNameComplete, | ||||
| 	Action: func(c *cli.Context) error { | ||||
| 		conf := runtime.New(runtime.WithOffline(internal.Offline)) | ||||
| 		app := internal.ValidateApp(c, conf) | ||||
| 		app := internal.ValidateApp(c) | ||||
|  | ||||
| 		cl, err := client.New(app.Server) | ||||
| 		if err != nil { | ||||
| @ -83,18 +81,26 @@ Passing "--force/-f" will select all volumes for removal. Be careful. | ||||
| 		internal.DebugFlag, | ||||
| 		internal.NoInputFlag, | ||||
| 		internal.ForceFlag, | ||||
| 		internal.OfflineFlag, | ||||
| 	}, | ||||
| 	Before: internal.SubCommandBefore, | ||||
| 	Before:       internal.SubCommandBefore, | ||||
| 	BashComplete: autocomplete.AppNameComplete, | ||||
| 	Action: func(c *cli.Context) error { | ||||
| 		conf := runtime.New(runtime.WithOffline(internal.Offline)) | ||||
| 		app := internal.ValidateApp(c, conf) | ||||
| 		app := internal.ValidateApp(c) | ||||
|  | ||||
| 		cl, err := client.New(app.Server) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		isDeployed, _, err := stack.IsDeployed(context.Background(), cl, app.StackName()) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		if isDeployed { | ||||
| 			logrus.Fatalf("%s is still deployed. Run \"abra app undeploy %s\"", app.Name, app.Name) | ||||
| 		} | ||||
|  | ||||
| 		filters, err := app.Filters(false, true) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| @ -124,16 +130,19 @@ Passing "--force/-f" will select all volumes for removal. Be careful. | ||||
| 			volumesToRemove = volumeNames | ||||
| 		} | ||||
|  | ||||
| 		err = client.RemoveVolumes(cl, context.Background(), app.Server, volumesToRemove, internal.Force) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
| 		if len(volumesToRemove) > 0 { | ||||
| 			err = client.RemoveVolumes(cl, context.Background(), app.Server, volumesToRemove, internal.Force) | ||||
| 			if err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
|  | ||||
| 		logrus.Info("volumes removed successfully") | ||||
| 			logrus.Info("volumes removed successfully") | ||||
| 		} else { | ||||
| 			logrus.Info("no volumes removed") | ||||
| 		} | ||||
|  | ||||
| 		return nil | ||||
| 	}, | ||||
| 	BashComplete: autocomplete.AppNameComplete, | ||||
| } | ||||
|  | ||||
| var appVolumeCommand = cli.Command{ | ||||
|  | ||||
| @ -13,7 +13,6 @@ import ( | ||||
| 	"coopcloud.tech/abra/pkg/formatter" | ||||
| 	gitPkg "coopcloud.tech/abra/pkg/git" | ||||
| 	"coopcloud.tech/abra/pkg/recipe" | ||||
| 	"coopcloud.tech/abra/pkg/runtime" | ||||
| 	"github.com/go-git/go-git/v5" | ||||
| 	"github.com/sirupsen/logrus" | ||||
| 	"github.com/urfave/cli" | ||||
| @ -29,6 +28,7 @@ var catalogueGenerateCommand = cli.Command{ | ||||
| 		internal.PublishFlag, | ||||
| 		internal.DryFlag, | ||||
| 		internal.SkipUpdatesFlag, | ||||
| 		internal.ChaosFlag, | ||||
| 		internal.OfflineFlag, | ||||
| 	}, | ||||
| 	Before: internal.SubCommandBefore, | ||||
| @ -53,20 +53,22 @@ Push your new release to git.coopcloud.tech with "-p/--publish". This requires | ||||
| that you have permission to git push to these repositories and have your SSH | ||||
| keys configured on your account. | ||||
| `, | ||||
| 	ArgsUsage: "[<recipe>]", | ||||
| 	ArgsUsage:    "[<recipe>]", | ||||
| 	BashComplete: autocomplete.RecipeNameComplete, | ||||
| 	Action: func(c *cli.Context) error { | ||||
| 		conf := runtime.New(runtime.WithOffline(internal.Offline)) | ||||
| 		recipeName := c.Args().First() | ||||
|  | ||||
| 		if recipeName != "" { | ||||
| 			internal.ValidateRecipe(c, conf) | ||||
| 			internal.ValidateRecipe(c) | ||||
| 		} | ||||
|  | ||||
| 		if err := catalogue.EnsureUpToDate(conf); err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		if !internal.Chaos { | ||||
| 			if err := catalogue.EnsureIsClean(); err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
| 		} | ||||
|  | ||||
| 		repos, err := recipe.ReadReposMetadata(conf) | ||||
| 		repos, err := recipe.ReadReposMetadata() | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
| @ -83,7 +85,7 @@ keys configured on your account. | ||||
|  | ||||
| 		if !internal.SkipUpdates { | ||||
| 			logrus.Warn(logMsg) | ||||
| 			if err := recipe.UpdateRepositories(repos, recipeName, conf); err != nil { | ||||
| 			if err := recipe.UpdateRepositories(repos, recipeName); err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
| 		} | ||||
| @ -96,12 +98,7 @@ keys configured on your account. | ||||
| 				continue | ||||
| 			} | ||||
|  | ||||
| 			if _, exists := catalogue.CatalogueSkipList[recipeMeta.Name]; exists { | ||||
| 				catlBar.Add(1) | ||||
| 				continue | ||||
| 			} | ||||
|  | ||||
| 			versions, err := recipe.GetRecipeVersions(recipeMeta.Name, conf) | ||||
| 			versions, err := recipe.GetRecipeVersions(recipeMeta.Name, internal.Offline) | ||||
| 			if err != nil { | ||||
| 				logrus.Warn(err) | ||||
| 			} | ||||
| @ -137,7 +134,7 @@ keys configured on your account. | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
| 		} else { | ||||
| 			catlFS, err := recipe.ReadRecipeCatalogue(conf) | ||||
| 			catlFS, err := recipe.ReadRecipeCatalogue(internal.Offline) | ||||
| 			if err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
| @ -171,7 +168,7 @@ keys configured on your account. | ||||
| 			} | ||||
|  | ||||
| 			msg := "chore: publish new catalogue release changes" | ||||
| 			if err := gitPkg.Commit(cataloguePath, "**.json", msg, internal.Dry); err != nil { | ||||
| 			if err := gitPkg.Commit(cataloguePath, msg, internal.Dry); err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
|  | ||||
| @ -211,7 +208,6 @@ keys configured on your account. | ||||
|  | ||||
| 		return nil | ||||
| 	}, | ||||
| 	BashComplete: autocomplete.RecipeNameComplete, | ||||
| } | ||||
|  | ||||
| // CatalogueCommand defines the `abra catalogue` command and sub-commands. | ||||
|  | ||||
							
								
								
									
										15
									
								
								cli/cli.go
									
									
									
									
									
								
							
							
						
						
									
										15
									
								
								cli/cli.go
									
									
									
									
									
								
							| @ -12,9 +12,9 @@ import ( | ||||
| 	"coopcloud.tech/abra/cli/catalogue" | ||||
| 	"coopcloud.tech/abra/cli/internal" | ||||
| 	"coopcloud.tech/abra/cli/recipe" | ||||
| 	"coopcloud.tech/abra/cli/record" | ||||
| 	"coopcloud.tech/abra/cli/server" | ||||
| 	"coopcloud.tech/abra/pkg/autocomplete" | ||||
| 	cataloguePkg "coopcloud.tech/abra/pkg/catalogue" | ||||
| 	"coopcloud.tech/abra/pkg/config" | ||||
| 	"coopcloud.tech/abra/pkg/web" | ||||
| 	"github.com/sirupsen/logrus" | ||||
| @ -158,7 +158,6 @@ func newAbraApp(version, commit string) *cli.App { | ||||
| 			server.ServerCommand, | ||||
| 			recipe.RecipeCommand, | ||||
| 			catalogue.CatalogueCommand, | ||||
| 			record.RecordCommand, | ||||
| 			UpgradeCommand, | ||||
| 			AutoCompleteCommand, | ||||
| 		}, | ||||
| @ -170,10 +169,10 @@ func newAbraApp(version, commit string) *cli.App { | ||||
| 	app.Before = func(c *cli.Context) error { | ||||
| 		paths := []string{ | ||||
| 			config.ABRA_DIR, | ||||
| 			path.Join(config.SERVERS_DIR), | ||||
| 			path.Join(config.RECIPES_DIR), | ||||
| 			path.Join(config.VENDOR_DIR), | ||||
| 			path.Join(config.BACKUP_DIR), | ||||
| 			config.SERVERS_DIR, | ||||
| 			config.RECIPES_DIR, | ||||
| 			config.VENDOR_DIR, | ||||
| 			config.BACKUP_DIR, | ||||
| 		} | ||||
|  | ||||
| 		for _, path := range paths { | ||||
| @ -185,6 +184,10 @@ func newAbraApp(version, commit string) *cli.App { | ||||
| 			} | ||||
| 		} | ||||
|  | ||||
| 		if err := cataloguePkg.EnsureCatalogue(); err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		logrus.Debugf("abra version %s, commit %s", version, commit) | ||||
|  | ||||
| 		return nil | ||||
|  | ||||
| @ -1,35 +1,67 @@ | ||||
| package internal | ||||
|  | ||||
| import ( | ||||
| 	"strings" | ||||
| 	"context" | ||||
|  | ||||
| 	"coopcloud.tech/abra/pkg/config" | ||||
| 	containerPkg "coopcloud.tech/abra/pkg/container" | ||||
| 	"coopcloud.tech/abra/pkg/service" | ||||
| 	"coopcloud.tech/abra/pkg/upstream/container" | ||||
| 	"github.com/docker/cli/cli/command" | ||||
| 	"github.com/docker/docker/api/types" | ||||
| 	"github.com/docker/docker/api/types/filters" | ||||
| 	dockerClient "github.com/docker/docker/client" | ||||
| 	"github.com/sirupsen/logrus" | ||||
| ) | ||||
|  | ||||
| // SafeSplit splits up a string into a list of commands safely. | ||||
| func SafeSplit(s string) []string { | ||||
| 	split := strings.Split(s, " ") | ||||
|  | ||||
| 	var result []string | ||||
| 	var inquote string | ||||
| 	var block string | ||||
| 	for _, i := range split { | ||||
| 		if inquote == "" { | ||||
| 			if strings.HasPrefix(i, "'") || strings.HasPrefix(i, "\"") { | ||||
| 				inquote = string(i[0]) | ||||
| 				block = strings.TrimPrefix(i, inquote) + " " | ||||
| 			} else { | ||||
| 				result = append(result, i) | ||||
| 			} | ||||
| 		} else { | ||||
| 			if !strings.HasSuffix(i, inquote) { | ||||
| 				block += i + " " | ||||
| 			} else { | ||||
| 				block += strings.TrimSuffix(i, inquote) | ||||
| 				inquote = "" | ||||
| 				result = append(result, block) | ||||
| 				block = "" | ||||
| 			} | ||||
| 		} | ||||
| // RetrieveBackupBotContainer gets the deployed backupbot container. | ||||
| func RetrieveBackupBotContainer(cl *dockerClient.Client) (types.Container, error) { | ||||
| 	ctx := context.Background() | ||||
| 	chosenService, err := service.GetServiceByLabel(ctx, cl, config.BackupbotLabel, NoInput) | ||||
| 	if err != nil { | ||||
| 		return types.Container{}, err | ||||
| 	} | ||||
|  | ||||
| 	return result | ||||
| 	logrus.Debugf("retrieved %s as backup enabled service", chosenService.Spec.Name) | ||||
|  | ||||
| 	filters := filters.NewArgs() | ||||
| 	filters.Add("name", chosenService.Spec.Name) | ||||
| 	targetContainer, err := containerPkg.GetContainer( | ||||
| 		ctx, | ||||
| 		cl, | ||||
| 		filters, | ||||
| 		NoInput, | ||||
| 	) | ||||
| 	if err != nil { | ||||
| 		return types.Container{}, err | ||||
| 	} | ||||
|  | ||||
| 	return targetContainer, nil | ||||
| } | ||||
|  | ||||
| // RunBackupCmdRemote runs a backup related command on a remote backupbot container. | ||||
| func RunBackupCmdRemote(cl *dockerClient.Client, backupCmd string, containerID string, execEnv []string) error { | ||||
| 	execBackupListOpts := types.ExecConfig{ | ||||
| 		AttachStderr: true, | ||||
| 		AttachStdin:  true, | ||||
| 		AttachStdout: true, | ||||
| 		Cmd:          []string{"/usr/bin/backup", "--", backupCmd}, | ||||
| 		Detach:       false, | ||||
| 		Env:          execEnv, | ||||
| 		Tty:          true, | ||||
| 	} | ||||
|  | ||||
| 	logrus.Debugf("running backup %s on %s with exec config %v", backupCmd, containerID, execBackupListOpts) | ||||
|  | ||||
| 	// FIXME: avoid instantiating a new CLI | ||||
| 	dcli, err := command.NewDockerCli() | ||||
| 	if err != nil { | ||||
| 		return err | ||||
| 	} | ||||
|  | ||||
| 	if _, err := container.RunExec(dcli, cl, containerID, &execBackupListOpts); err != nil { | ||||
| 		return err | ||||
| 	} | ||||
|  | ||||
| 	return nil | ||||
| } | ||||
|  | ||||
| @ -54,7 +54,7 @@ var Chaos bool | ||||
| // ChaosFlag turns on/off chaos functionality. | ||||
| var ChaosFlag = &cli.BoolFlag{ | ||||
| 	Name:        "chaos, C", | ||||
| 	Usage:       "Deploy uncommitted recipes changes. Use with care!", | ||||
| 	Usage:       "Proceed with uncommitted recipes changes. Use with care!", | ||||
| 	Destination: &Chaos, | ||||
| } | ||||
|  | ||||
| @ -68,17 +68,6 @@ var TtyFlag = &cli.BoolFlag{ | ||||
| 	Destination: &Tty, | ||||
| } | ||||
|  | ||||
| // DNSProvider specifies a DNS provider. | ||||
| var DNSProvider string | ||||
|  | ||||
| // DNSProviderFlag selects a DNS provider. | ||||
| var DNSProviderFlag = &cli.StringFlag{ | ||||
| 	Name:        "provider, p", | ||||
| 	Value:       "", | ||||
| 	Usage:       "DNS provider", | ||||
| 	Destination: &DNSProvider, | ||||
| } | ||||
|  | ||||
| var NoInput bool | ||||
| var NoInputFlag = &cli.BoolFlag{ | ||||
| 	Name:        "no-input, n", | ||||
| @ -86,163 +75,6 @@ var NoInputFlag = &cli.BoolFlag{ | ||||
| 	Destination: &NoInput, | ||||
| } | ||||
|  | ||||
| var DNSType string | ||||
|  | ||||
| var DNSTypeFlag = &cli.StringFlag{ | ||||
| 	Name:        "record-type, rt", | ||||
| 	Value:       "", | ||||
| 	Usage:       "Domain name record type (e.g. A)", | ||||
| 	Destination: &DNSType, | ||||
| } | ||||
|  | ||||
| var DNSName string | ||||
|  | ||||
| var DNSNameFlag = &cli.StringFlag{ | ||||
| 	Name:        "record-name, rn", | ||||
| 	Value:       "", | ||||
| 	Usage:       "Domain name record name (e.g. mysubdomain)", | ||||
| 	Destination: &DNSName, | ||||
| } | ||||
|  | ||||
| var DNSValue string | ||||
|  | ||||
| var DNSValueFlag = &cli.StringFlag{ | ||||
| 	Name:        "record-value, rv", | ||||
| 	Value:       "", | ||||
| 	Usage:       "Domain name record value (e.g. 192.168.1.1)", | ||||
| 	Destination: &DNSValue, | ||||
| } | ||||
|  | ||||
| var DNSTTL string | ||||
| var DNSTTLFlag = &cli.StringFlag{ | ||||
| 	Name:        "record-ttl, rl", | ||||
| 	Value:       "600s", | ||||
| 	Usage:       "Domain name TTL value (seconds)", | ||||
| 	Destination: &DNSTTL, | ||||
| } | ||||
|  | ||||
| var DNSPriority int | ||||
|  | ||||
| var DNSPriorityFlag = &cli.IntFlag{ | ||||
| 	Name:        "record-priority, rp", | ||||
| 	Value:       10, | ||||
| 	Usage:       "Domain name priority value", | ||||
| 	Destination: &DNSPriority, | ||||
| } | ||||
|  | ||||
| var ServerProvider string | ||||
|  | ||||
| var ServerProviderFlag = &cli.StringFlag{ | ||||
| 	Name:        "provider, p", | ||||
| 	Usage:       "3rd party server provider", | ||||
| 	Destination: &ServerProvider, | ||||
| } | ||||
|  | ||||
| var CapsulInstanceURL string | ||||
|  | ||||
| var CapsulInstanceURLFlag = &cli.StringFlag{ | ||||
| 	Name:        "capsul-url, cu", | ||||
| 	Value:       "yolo.servers.coop", | ||||
| 	Usage:       "capsul instance URL", | ||||
| 	Destination: &CapsulInstanceURL, | ||||
| } | ||||
|  | ||||
| var CapsulName string | ||||
|  | ||||
| var CapsulNameFlag = &cli.StringFlag{ | ||||
| 	Name:        "capsul-name, cn", | ||||
| 	Value:       "", | ||||
| 	Usage:       "capsul name", | ||||
| 	Destination: &CapsulName, | ||||
| } | ||||
|  | ||||
| var CapsulType string | ||||
|  | ||||
| var CapsulTypeFlag = &cli.StringFlag{ | ||||
| 	Name:        "capsul-type, ct", | ||||
| 	Value:       "f1-xs", | ||||
| 	Usage:       "capsul type", | ||||
| 	Destination: &CapsulType, | ||||
| } | ||||
|  | ||||
| var CapsulImage string | ||||
|  | ||||
| var CapsulImageFlag = &cli.StringFlag{ | ||||
| 	Name:        "capsul-image, ci", | ||||
| 	Value:       "debian10", | ||||
| 	Usage:       "capsul image", | ||||
| 	Destination: &CapsulImage, | ||||
| } | ||||
|  | ||||
| var CapsulSSHKeys cli.StringSlice | ||||
| var CapsulSSHKeysFlag = &cli.StringSliceFlag{ | ||||
| 	Name:  "capsul-ssh-keys, cs", | ||||
| 	Usage: "capsul SSH key", | ||||
| 	Value: &CapsulSSHKeys, | ||||
| } | ||||
|  | ||||
| var CapsulAPIToken string | ||||
|  | ||||
| var CapsulAPITokenFlag = &cli.StringFlag{ | ||||
| 	Name:        "capsul-token, ca", | ||||
| 	Usage:       "capsul API token", | ||||
| 	EnvVar:      "CAPSUL_TOKEN", | ||||
| 	Destination: &CapsulAPIToken, | ||||
| } | ||||
|  | ||||
| var HetznerCloudName string | ||||
|  | ||||
| var HetznerCloudNameFlag = &cli.StringFlag{ | ||||
| 	Name:        "hetzner-name, hn", | ||||
| 	Value:       "", | ||||
| 	Usage:       "hetzner cloud name", | ||||
| 	Destination: &HetznerCloudName, | ||||
| } | ||||
|  | ||||
| var HetznerCloudType string | ||||
|  | ||||
| var HetznerCloudTypeFlag = &cli.StringFlag{ | ||||
| 	Name:        "hetzner-type, ht", | ||||
| 	Usage:       "hetzner cloud type", | ||||
| 	Destination: &HetznerCloudType, | ||||
| 	Value:       "cx11", | ||||
| } | ||||
|  | ||||
| var HetznerCloudImage string | ||||
|  | ||||
| var HetznerCloudImageFlag = &cli.StringFlag{ | ||||
| 	Name:        "hetzner-image, hi", | ||||
| 	Usage:       "hetzner cloud image", | ||||
| 	Value:       "debian-10", | ||||
| 	Destination: &HetznerCloudImage, | ||||
| } | ||||
|  | ||||
| var HetznerCloudSSHKeys cli.StringSlice | ||||
|  | ||||
| var HetznerCloudSSHKeysFlag = &cli.StringSliceFlag{ | ||||
| 	Name:  "hetzner-ssh-keys, hs", | ||||
| 	Usage: "hetzner cloud SSH keys (e.g. me@foo.com)", | ||||
| 	Value: &HetznerCloudSSHKeys, | ||||
| } | ||||
|  | ||||
| var HetznerCloudLocation string | ||||
|  | ||||
| var HetznerCloudLocationFlag = &cli.StringFlag{ | ||||
| 	Name:        "hetzner-location, hl", | ||||
| 	Usage:       "hetzner cloud server location", | ||||
| 	Value:       "hel1", | ||||
| 	Destination: &HetznerCloudLocation, | ||||
| } | ||||
|  | ||||
| var HetznerCloudAPIToken string | ||||
|  | ||||
| var HetznerCloudAPITokenFlag = &cli.StringFlag{ | ||||
| 	Name:        "hetzner-token, ha", | ||||
| 	Usage:       "hetzner cloud API token", | ||||
| 	EnvVar:      "HCLOUD_TOKEN", | ||||
| 	Destination: &HetznerCloudAPIToken, | ||||
| } | ||||
|  | ||||
| // Debug stores the variable from DebugFlag. | ||||
| var Debug bool | ||||
|  | ||||
|  | ||||
| @ -60,7 +60,7 @@ func RunCmdRemote(cl *dockerClient.Client, app config.App, abraSh, serviceName, | ||||
| 		Tty:          false, | ||||
| 	} | ||||
|  | ||||
| 	if err := container.RunExec(dcli, cl, targetContainer.ID, &execCreateOpts); err != nil { | ||||
| 	if _, err := container.RunExec(dcli, cl, targetContainer.ID, &execCreateOpts); err != nil { | ||||
| 		logrus.Infof("%s does not exist for %s, use /bin/sh as fallback", shell, app.Name) | ||||
| 		shell = "/bin/sh" | ||||
| 	} | ||||
| @ -85,7 +85,7 @@ func RunCmdRemote(cl *dockerClient.Client, app config.App, abraSh, serviceName, | ||||
| 		execCreateOpts.Tty = false | ||||
| 	} | ||||
|  | ||||
| 	if err := container.RunExec(dcli, cl, targetContainer.ID, &execCreateOpts); err != nil { | ||||
| 	if _, err := container.RunExec(dcli, cl, targetContainer.ID, &execCreateOpts); err != nil { | ||||
| 		return err | ||||
| 	} | ||||
|  | ||||
|  | ||||
							
								
								
									
										173
									
								
								cli/internal/deploy.go
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										173
									
								
								cli/internal/deploy.go
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,173 @@ | ||||
| package internal | ||||
|  | ||||
| import ( | ||||
| 	"fmt" | ||||
| 	"io/ioutil" | ||||
| 	"os" | ||||
| 	"path" | ||||
| 	"strings" | ||||
|  | ||||
| 	"coopcloud.tech/abra/pkg/config" | ||||
| 	"coopcloud.tech/abra/pkg/formatter" | ||||
| 	"github.com/AlecAivazis/survey/v2" | ||||
| 	dockerClient "github.com/docker/docker/client" | ||||
| 	"github.com/sirupsen/logrus" | ||||
| ) | ||||
|  | ||||
| // NewVersionOverview shows an upgrade or downgrade overview | ||||
| func NewVersionOverview(app config.App, currentVersion, newVersion, releaseNotes string) error { | ||||
| 	tableCol := []string{"server", "recipe", "config", "domain", "current version", "to be deployed"} | ||||
| 	table := formatter.CreateTable(tableCol) | ||||
|  | ||||
| 	deployConfig := "compose.yml" | ||||
| 	if composeFiles, ok := app.Env["COMPOSE_FILE"]; ok { | ||||
| 		deployConfig = strings.Join(strings.Split(composeFiles, ":"), "\n") | ||||
| 	} | ||||
|  | ||||
| 	server := app.Server | ||||
| 	if app.Server == "default" { | ||||
| 		server = "local" | ||||
| 	} | ||||
|  | ||||
| 	table.Append([]string{server, app.Recipe, deployConfig, app.Domain, currentVersion, newVersion}) | ||||
| 	table.Render() | ||||
|  | ||||
| 	if releaseNotes != "" && newVersion != "" { | ||||
| 		fmt.Println() | ||||
| 		fmt.Print(releaseNotes) | ||||
| 	} else { | ||||
| 		logrus.Warnf("no release notes available for %s", newVersion) | ||||
| 	} | ||||
|  | ||||
| 	if NoInput { | ||||
| 		return nil | ||||
| 	} | ||||
|  | ||||
| 	response := false | ||||
| 	prompt := &survey.Confirm{ | ||||
| 		Message: "continue with deployment?", | ||||
| 	} | ||||
|  | ||||
| 	if err := survey.AskOne(prompt, &response); err != nil { | ||||
| 		return err | ||||
| 	} | ||||
|  | ||||
| 	if !response { | ||||
| 		logrus.Fatal("exiting as requested") | ||||
| 	} | ||||
|  | ||||
| 	return nil | ||||
| } | ||||
|  | ||||
| // GetReleaseNotes prints release notes for a recipe version | ||||
| func GetReleaseNotes(recipeName, version string) (string, error) { | ||||
| 	if version == "" { | ||||
| 		return "", nil | ||||
| 	} | ||||
|  | ||||
| 	fpath := path.Join(config.RECIPES_DIR, recipeName, "release", version) | ||||
|  | ||||
| 	if _, err := os.Stat(fpath); !os.IsNotExist(err) { | ||||
| 		releaseNotes, err := ioutil.ReadFile(fpath) | ||||
| 		if err != nil { | ||||
| 			return "", err | ||||
| 		} | ||||
| 		withTitle := fmt.Sprintf("%s release notes:\n%s", version, string(releaseNotes)) | ||||
| 		return withTitle, nil | ||||
| 	} | ||||
|  | ||||
| 	return "", nil | ||||
| } | ||||
|  | ||||
| // PostCmds parses a string of commands and executes them inside of the respective services | ||||
| // the commands string must have the following format: | ||||
| // "<service> <command> <arguments>|<service> <command> <arguments>|... " | ||||
| func PostCmds(cl *dockerClient.Client, app config.App, commands string) error { | ||||
| 	abraSh := path.Join(config.RECIPES_DIR, app.Recipe, "abra.sh") | ||||
| 	if _, err := os.Stat(abraSh); err != nil { | ||||
| 		if os.IsNotExist(err) { | ||||
| 			return fmt.Errorf(fmt.Sprintf("%s does not exist for %s?", abraSh, app.Name)) | ||||
| 		} | ||||
| 		return err | ||||
| 	} | ||||
|  | ||||
| 	for _, command := range strings.Split(commands, "|") { | ||||
| 		commandParts := strings.Split(command, " ") | ||||
| 		if len(commandParts) < 2 { | ||||
| 			return fmt.Errorf(fmt.Sprintf("not enough arguments: %s", command)) | ||||
| 		} | ||||
| 		targetServiceName := commandParts[0] | ||||
| 		cmdName := commandParts[1] | ||||
| 		parsedCmdArgs := "" | ||||
| 		if len(commandParts) > 2 { | ||||
| 			parsedCmdArgs = fmt.Sprintf("%s ", strings.Join(commandParts[2:], " ")) | ||||
| 		} | ||||
| 		logrus.Infof("running post-command '%s %s' in container %s", cmdName, parsedCmdArgs, targetServiceName) | ||||
|  | ||||
| 		if err := EnsureCommand(abraSh, app.Recipe, cmdName); err != nil { | ||||
| 			return err | ||||
| 		} | ||||
|  | ||||
| 		serviceNames, err := config.GetAppServiceNames(app.Name) | ||||
| 		if err != nil { | ||||
| 			return err | ||||
| 		} | ||||
|  | ||||
| 		matchingServiceName := false | ||||
| 		for _, serviceName := range serviceNames { | ||||
| 			if serviceName == targetServiceName { | ||||
| 				matchingServiceName = true | ||||
| 			} | ||||
| 		} | ||||
|  | ||||
| 		if !matchingServiceName { | ||||
| 			return fmt.Errorf(fmt.Sprintf("no service %s for %s?", targetServiceName, app.Name)) | ||||
| 		} | ||||
|  | ||||
| 		logrus.Debugf("running command %s %s within the context of %s_%s", cmdName, parsedCmdArgs, app.StackName(), targetServiceName) | ||||
|  | ||||
| 		Tty = true | ||||
| 		if err := RunCmdRemote(cl, app, abraSh, targetServiceName, cmdName, parsedCmdArgs); err != nil { | ||||
| 			return err | ||||
| 		} | ||||
| 	} | ||||
| 	return nil | ||||
| } | ||||
|  | ||||
| // DeployOverview shows a deployment overview | ||||
| func DeployOverview(app config.App, version, message string) error { | ||||
| 	tableCol := []string{"server", "recipe", "config", "domain", "version"} | ||||
| 	table := formatter.CreateTable(tableCol) | ||||
|  | ||||
| 	deployConfig := "compose.yml" | ||||
| 	if composeFiles, ok := app.Env["COMPOSE_FILE"]; ok { | ||||
| 		deployConfig = strings.Join(strings.Split(composeFiles, ":"), "\n") | ||||
| 	} | ||||
|  | ||||
| 	server := app.Server | ||||
| 	if app.Server == "default" { | ||||
| 		server = "local" | ||||
| 	} | ||||
|  | ||||
| 	table.Append([]string{server, app.Recipe, deployConfig, app.Domain, version}) | ||||
| 	table.Render() | ||||
|  | ||||
| 	if NoInput { | ||||
| 		return nil | ||||
| 	} | ||||
|  | ||||
| 	response := false | ||||
| 	prompt := &survey.Confirm{ | ||||
| 		Message: message, | ||||
| 	} | ||||
|  | ||||
| 	if err := survey.AskOne(prompt, &response); err != nil { | ||||
| 		return err | ||||
| 	} | ||||
|  | ||||
| 	if !response { | ||||
| 		logrus.Fatal("exiting as requested") | ||||
| 	} | ||||
|  | ||||
| 	return nil | ||||
| } | ||||
| @ -2,60 +2,24 @@ package internal | ||||
|  | ||||
| import ( | ||||
| 	"errors" | ||||
| 	"fmt" | ||||
| 	"os" | ||||
| 	"strings" | ||||
|  | ||||
| 	"coopcloud.tech/abra/pkg/app" | ||||
| 	"coopcloud.tech/abra/pkg/config" | ||||
| 	"coopcloud.tech/abra/pkg/recipe" | ||||
| 	"coopcloud.tech/abra/pkg/runtime" | ||||
| 	"github.com/AlecAivazis/survey/v2" | ||||
| 	"github.com/sirupsen/logrus" | ||||
| 	"github.com/urfave/cli" | ||||
| ) | ||||
|  | ||||
| // ValidateRecipe ensures the recipe arg is valid. | ||||
| func ValidateRecipe(c *cli.Context, conf *runtime.Config) recipe.Recipe { | ||||
| 	recipeName := c.Args().First() | ||||
|  | ||||
| 	if recipeName == "" { | ||||
| 		ShowSubcommandHelpAndError(c, errors.New("no recipe name provided")) | ||||
| 	} | ||||
|  | ||||
| 	chosenRecipe, err := recipe.Get(recipeName, conf) | ||||
| 	if err != nil { | ||||
| 		if c.Command.Name == "generate" { | ||||
| 			if strings.Contains(err.Error(), "missing a compose") { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
| 			logrus.Warn(err) | ||||
| 		} else { | ||||
| 			if strings.Contains(err.Error(), "template_driver is not allowed") { | ||||
| 				logrus.Warnf("ensure %s recipe compose.* files include \"version: '3.8'\"", recipeName) | ||||
| 			} | ||||
| 			logrus.Fatalf("unable to validate recipe: %s", err) | ||||
| 		} | ||||
| 	} | ||||
|  | ||||
| 	if err := recipe.EnsureLatest(recipeName, conf); err != nil { | ||||
| 		logrus.Fatal(err) | ||||
| 	} | ||||
|  | ||||
| 	logrus.Debugf("validated %s as recipe argument", recipeName) | ||||
|  | ||||
| 	return chosenRecipe | ||||
| } | ||||
|  | ||||
| // ValidateRecipeWithPrompt ensures a recipe argument is present before | ||||
| // validating, asking for input if required. | ||||
| func ValidateRecipeWithPrompt(c *cli.Context, conf *runtime.Config) recipe.Recipe { | ||||
| func ValidateRecipe(c *cli.Context) recipe.Recipe { | ||||
| 	recipeName := c.Args().First() | ||||
|  | ||||
| 	if recipeName == "" && !NoInput { | ||||
| 		var recipes []string | ||||
|  | ||||
| 		catl, err := recipe.ReadRecipeCatalogue(conf) | ||||
| 		catl, err := recipe.ReadRecipeCatalogue(Offline) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
| @ -93,13 +57,19 @@ func ValidateRecipeWithPrompt(c *cli.Context, conf *runtime.Config) recipe.Recip | ||||
| 		ShowSubcommandHelpAndError(c, errors.New("no recipe name provided")) | ||||
| 	} | ||||
|  | ||||
| 	chosenRecipe, err := recipe.Get(recipeName, conf) | ||||
| 	chosenRecipe, err := recipe.Get(recipeName, Offline) | ||||
| 	if err != nil { | ||||
| 		logrus.Fatal(err) | ||||
| 	} | ||||
|  | ||||
| 	if err := recipe.EnsureLatest(recipeName, conf); err != nil { | ||||
| 		logrus.Fatal(err) | ||||
| 		if c.Command.Name == "generate" { | ||||
| 			if strings.Contains(err.Error(), "missing a compose") { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
| 			logrus.Warn(err) | ||||
| 		} else { | ||||
| 			if strings.Contains(err.Error(), "template_driver is not allowed") { | ||||
| 				logrus.Warnf("ensure %s recipe compose.* files include \"version: '3.8'\"", recipeName) | ||||
| 			} | ||||
| 			logrus.Fatalf("unable to validate recipe: %s", err) | ||||
| 		} | ||||
| 	} | ||||
|  | ||||
| 	logrus.Debugf("validated %s as recipe argument", recipeName) | ||||
| @ -108,7 +78,7 @@ func ValidateRecipeWithPrompt(c *cli.Context, conf *runtime.Config) recipe.Recip | ||||
| } | ||||
|  | ||||
| // ValidateApp ensures the app name arg is valid. | ||||
| func ValidateApp(c *cli.Context, conf *runtime.Config) config.App { | ||||
| func ValidateApp(c *cli.Context) config.App { | ||||
| 	appName := c.Args().First() | ||||
|  | ||||
| 	if appName == "" { | ||||
| @ -120,10 +90,6 @@ func ValidateApp(c *cli.Context, conf *runtime.Config) config.App { | ||||
| 		logrus.Fatal(err) | ||||
| 	} | ||||
|  | ||||
| 	if err := recipe.EnsureExists(app.Recipe, conf); err != nil { | ||||
| 		logrus.Fatal(err) | ||||
| 	} | ||||
|  | ||||
| 	logrus.Debugf("validated %s as app argument", appName) | ||||
|  | ||||
| 	return app | ||||
| @ -192,309 +158,15 @@ func ValidateServer(c *cli.Context) string { | ||||
| 		} | ||||
| 	} | ||||
|  | ||||
| 	if !matched { | ||||
| 		ShowSubcommandHelpAndError(c, errors.New("server doesn't exist?")) | ||||
| 	} | ||||
|  | ||||
| 	if serverName == "" { | ||||
| 		ShowSubcommandHelpAndError(c, errors.New("no server provided")) | ||||
| 	} | ||||
|  | ||||
| 	if !matched { | ||||
| 		ShowSubcommandHelpAndError(c, errors.New("server doesn't exist?")) | ||||
| 	} | ||||
|  | ||||
| 	logrus.Debugf("validated %s as server argument", serverName) | ||||
|  | ||||
| 	return serverName | ||||
| } | ||||
|  | ||||
| // EnsureDNSProvider ensures a DNS provider is chosen. | ||||
| func EnsureDNSProvider() error { | ||||
| 	if DNSProvider == "" && !NoInput { | ||||
| 		prompt := &survey.Select{ | ||||
| 			Message: "Select DNS provider", | ||||
| 			Options: []string{"gandi"}, | ||||
| 		} | ||||
|  | ||||
| 		if err := survey.AskOne(prompt, &DNSProvider); err != nil { | ||||
| 			return err | ||||
| 		} | ||||
| 	} | ||||
|  | ||||
| 	if DNSProvider == "" { | ||||
| 		return fmt.Errorf("missing DNS provider?") | ||||
| 	} | ||||
|  | ||||
| 	return nil | ||||
| } | ||||
|  | ||||
| // EnsureDNSTypeFlag ensures a DNS type flag is present. | ||||
| func EnsureDNSTypeFlag(c *cli.Context) error { | ||||
| 	if DNSType == "" && !NoInput { | ||||
| 		prompt := &survey.Input{ | ||||
| 			Message: "Specify DNS record type", | ||||
| 			Default: "A", | ||||
| 		} | ||||
| 		if err := survey.AskOne(prompt, &DNSType); err != nil { | ||||
| 			return err | ||||
| 		} | ||||
| 	} | ||||
|  | ||||
| 	if DNSType == "" { | ||||
| 		ShowSubcommandHelpAndError(c, errors.New("no record type provided")) | ||||
| 	} | ||||
|  | ||||
| 	return nil | ||||
| } | ||||
|  | ||||
| // EnsureDNSNameFlag ensures a DNS name flag is present. | ||||
| func EnsureDNSNameFlag(c *cli.Context) error { | ||||
| 	if DNSName == "" && !NoInput { | ||||
| 		prompt := &survey.Input{ | ||||
| 			Message: "Specify DNS record name", | ||||
| 			Default: "mysubdomain", | ||||
| 		} | ||||
| 		if err := survey.AskOne(prompt, &DNSName); err != nil { | ||||
| 			return err | ||||
| 		} | ||||
| 	} | ||||
|  | ||||
| 	if DNSName == "" { | ||||
| 		ShowSubcommandHelpAndError(c, errors.New("no record name provided")) | ||||
| 	} | ||||
|  | ||||
| 	return nil | ||||
| } | ||||
|  | ||||
| // EnsureDNSValueFlag ensures a DNS value flag is present. | ||||
| func EnsureDNSValueFlag(c *cli.Context) error { | ||||
| 	if DNSValue == "" && !NoInput { | ||||
| 		prompt := &survey.Input{ | ||||
| 			Message: "Specify DNS record value", | ||||
| 			Default: "192.168.1.2", | ||||
| 		} | ||||
| 		if err := survey.AskOne(prompt, &DNSValue); err != nil { | ||||
| 			return err | ||||
| 		} | ||||
| 	} | ||||
|  | ||||
| 	if DNSValue == "" { | ||||
| 		ShowSubcommandHelpAndError(c, errors.New("no record value provided")) | ||||
| 	} | ||||
|  | ||||
| 	return nil | ||||
| } | ||||
|  | ||||
| // EnsureZoneArgument ensures a zone argument is present. | ||||
| func EnsureZoneArgument(c *cli.Context) (string, error) { | ||||
| 	zone := c.Args().First() | ||||
|  | ||||
| 	if zone == "" && !NoInput { | ||||
| 		prompt := &survey.Input{ | ||||
| 			Message: "Specify a domain name zone", | ||||
| 			Default: "example.com", | ||||
| 		} | ||||
|  | ||||
| 		if err := survey.AskOne(prompt, &zone); err != nil { | ||||
| 			return zone, err | ||||
| 		} | ||||
| 	} | ||||
|  | ||||
| 	if zone == "" { | ||||
| 		ShowSubcommandHelpAndError(c, errors.New("no zone value provided")) | ||||
| 	} | ||||
|  | ||||
| 	return zone, nil | ||||
| } | ||||
|  | ||||
| // EnsureServerProvider ensures a 3rd party server provider is chosen. | ||||
| func EnsureServerProvider() error { | ||||
| 	if ServerProvider == "" && !NoInput { | ||||
| 		prompt := &survey.Select{ | ||||
| 			Message: "Select server provider", | ||||
| 			Options: []string{"capsul", "hetzner-cloud"}, | ||||
| 		} | ||||
|  | ||||
| 		if err := survey.AskOne(prompt, &ServerProvider); err != nil { | ||||
| 			return err | ||||
| 		} | ||||
| 	} | ||||
|  | ||||
| 	if ServerProvider == "" { | ||||
| 		return fmt.Errorf("missing server provider?") | ||||
| 	} | ||||
|  | ||||
| 	return nil | ||||
| } | ||||
|  | ||||
| // EnsureNewCapsulVPSFlags ensure all flags are present. | ||||
| func EnsureNewCapsulVPSFlags(c *cli.Context) error { | ||||
| 	if CapsulName == "" && !NoInput { | ||||
| 		prompt := &survey.Input{ | ||||
| 			Message: "specify capsul name", | ||||
| 		} | ||||
| 		if err := survey.AskOne(prompt, &CapsulName); err != nil { | ||||
| 			return err | ||||
| 		} | ||||
| 	} | ||||
|  | ||||
| 	if !NoInput { | ||||
| 		prompt := &survey.Input{ | ||||
| 			Message: "specify capsul instance URL", | ||||
| 			Default: CapsulInstanceURL, | ||||
| 		} | ||||
| 		if err := survey.AskOne(prompt, &CapsulInstanceURL); err != nil { | ||||
| 			return err | ||||
| 		} | ||||
| 	} | ||||
|  | ||||
| 	if !NoInput { | ||||
| 		prompt := &survey.Input{ | ||||
| 			Message: "specify capsul type", | ||||
| 			Default: CapsulType, | ||||
| 		} | ||||
| 		if err := survey.AskOne(prompt, &CapsulType); err != nil { | ||||
| 			return err | ||||
| 		} | ||||
| 	} | ||||
|  | ||||
| 	if !NoInput { | ||||
| 		prompt := &survey.Input{ | ||||
| 			Message: "specify capsul image", | ||||
| 			Default: CapsulImage, | ||||
| 		} | ||||
| 		if err := survey.AskOne(prompt, &CapsulImage); err != nil { | ||||
| 			return err | ||||
| 		} | ||||
| 	} | ||||
|  | ||||
| 	if len(CapsulSSHKeys.Value()) == 0 && !NoInput { | ||||
| 		var sshKeys string | ||||
| 		prompt := &survey.Input{ | ||||
| 			Message: "specify capsul SSH keys (e.g. me@foo.com)", | ||||
| 			Default: "", | ||||
| 		} | ||||
| 		if err := survey.AskOne(prompt, &CapsulSSHKeys); err != nil { | ||||
| 			return err | ||||
| 		} | ||||
| 		CapsulSSHKeys = cli.StringSlice(strings.Split(sshKeys, ",")) | ||||
| 	} | ||||
|  | ||||
| 	if CapsulAPIToken == "" && !NoInput { | ||||
| 		token, ok := os.LookupEnv("CAPSUL_TOKEN") | ||||
| 		if !ok { | ||||
| 			prompt := &survey.Input{ | ||||
| 				Message: "specify capsul API token", | ||||
| 			} | ||||
| 			if err := survey.AskOne(prompt, &CapsulAPIToken); err != nil { | ||||
| 				return err | ||||
| 			} | ||||
| 		} else { | ||||
| 			CapsulAPIToken = token | ||||
| 		} | ||||
| 	} | ||||
|  | ||||
| 	if CapsulName == "" { | ||||
| 		ShowSubcommandHelpAndError(c, fmt.Errorf("missing capsul name?")) | ||||
| 	} | ||||
| 	if CapsulInstanceURL == "" { | ||||
| 		ShowSubcommandHelpAndError(c, fmt.Errorf("missing capsul instance url?")) | ||||
| 	} | ||||
| 	if CapsulType == "" { | ||||
| 		ShowSubcommandHelpAndError(c, fmt.Errorf("missing capsul type?")) | ||||
| 	} | ||||
| 	if CapsulImage == "" { | ||||
| 		ShowSubcommandHelpAndError(c, fmt.Errorf("missing capsul image?")) | ||||
| 	} | ||||
| 	if len(CapsulSSHKeys.Value()) == 0 { | ||||
| 		ShowSubcommandHelpAndError(c, fmt.Errorf("missing capsul ssh keys?")) | ||||
| 	} | ||||
| 	if CapsulAPIToken == "" { | ||||
| 		ShowSubcommandHelpAndError(c, fmt.Errorf("missing capsul API token?")) | ||||
| 	} | ||||
|  | ||||
| 	return nil | ||||
| } | ||||
|  | ||||
| // EnsureNewHetznerCloudVPSFlags ensure all flags are present. | ||||
| func EnsureNewHetznerCloudVPSFlags(c *cli.Context) error { | ||||
| 	if HetznerCloudName == "" && !NoInput { | ||||
| 		prompt := &survey.Input{ | ||||
| 			Message: "specify hetzner cloud VPS name", | ||||
| 		} | ||||
| 		if err := survey.AskOne(prompt, &HetznerCloudName); err != nil { | ||||
| 			return err | ||||
| 		} | ||||
| 	} | ||||
|  | ||||
| 	if !NoInput { | ||||
| 		prompt := &survey.Input{ | ||||
| 			Message: "specify hetzner cloud VPS type", | ||||
| 			Default: HetznerCloudType, | ||||
| 		} | ||||
| 		if err := survey.AskOne(prompt, &HetznerCloudType); err != nil { | ||||
| 			return err | ||||
| 		} | ||||
| 	} | ||||
|  | ||||
| 	if !NoInput { | ||||
| 		prompt := &survey.Input{ | ||||
| 			Message: "specify hetzner cloud VPS image", | ||||
| 			Default: HetznerCloudImage, | ||||
| 		} | ||||
| 		if err := survey.AskOne(prompt, &HetznerCloudImage); err != nil { | ||||
| 			return err | ||||
| 		} | ||||
| 	} | ||||
|  | ||||
| 	if len(HetznerCloudSSHKeys.Value()) == 0 && !NoInput { | ||||
| 		var sshKeys string | ||||
| 		prompt := &survey.Input{ | ||||
| 			Message: "specify hetzner cloud SSH keys (e.g. me@foo.com)", | ||||
| 			Default: "", | ||||
| 		} | ||||
| 		if err := survey.AskOne(prompt, &sshKeys); err != nil { | ||||
| 			return err | ||||
| 		} | ||||
| 		HetznerCloudSSHKeys = cli.StringSlice(strings.Split(sshKeys, ",")) | ||||
| 	} | ||||
|  | ||||
| 	if !NoInput { | ||||
| 		prompt := &survey.Input{ | ||||
| 			Message: "specify hetzner cloud VPS location", | ||||
| 			Default: HetznerCloudLocation, | ||||
| 		} | ||||
| 		if err := survey.AskOne(prompt, &HetznerCloudLocation); err != nil { | ||||
| 			return err | ||||
| 		} | ||||
| 	} | ||||
|  | ||||
| 	if HetznerCloudAPIToken == "" && !NoInput { | ||||
| 		token, ok := os.LookupEnv("HCLOUD_TOKEN") | ||||
| 		if !ok { | ||||
| 			prompt := &survey.Input{ | ||||
| 				Message: "specify hetzner cloud API token", | ||||
| 			} | ||||
| 			if err := survey.AskOne(prompt, &HetznerCloudAPIToken); err != nil { | ||||
| 				return err | ||||
| 			} | ||||
| 		} else { | ||||
| 			HetznerCloudAPIToken = token | ||||
| 		} | ||||
| 	} | ||||
|  | ||||
| 	if HetznerCloudName == "" { | ||||
| 		ShowSubcommandHelpAndError(c, fmt.Errorf("missing hetzner cloud VPS name?")) | ||||
| 	} | ||||
| 	if HetznerCloudType == "" { | ||||
| 		ShowSubcommandHelpAndError(c, fmt.Errorf("missing hetzner cloud VPS type?")) | ||||
| 	} | ||||
| 	if HetznerCloudImage == "" { | ||||
| 		ShowSubcommandHelpAndError(c, fmt.Errorf("missing hetzner cloud image?")) | ||||
| 	} | ||||
| 	if HetznerCloudLocation == "" { | ||||
| 		ShowSubcommandHelpAndError(c, fmt.Errorf("missing hetzner cloud VPS location?")) | ||||
| 	} | ||||
| 	if HetznerCloudAPIToken == "" { | ||||
| 		ShowSubcommandHelpAndError(c, fmt.Errorf("missing hetzner cloud API token?")) | ||||
| 	} | ||||
|  | ||||
| 	return nil | ||||
| } | ||||
|  | ||||
							
								
								
									
										40
									
								
								cli/recipe/diff.go
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										40
									
								
								cli/recipe/diff.go
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,40 @@ | ||||
| package recipe | ||||
|  | ||||
| import ( | ||||
| 	"path" | ||||
|  | ||||
| 	"coopcloud.tech/abra/cli/internal" | ||||
| 	"coopcloud.tech/abra/pkg/autocomplete" | ||||
| 	"coopcloud.tech/abra/pkg/config" | ||||
| 	gitPkg "coopcloud.tech/abra/pkg/git" | ||||
| 	"github.com/sirupsen/logrus" | ||||
| 	"github.com/urfave/cli" | ||||
| ) | ||||
|  | ||||
| var recipeDiffCommand = cli.Command{ | ||||
| 	Name:        "diff", | ||||
| 	Usage:       "Show unstaged changes in recipe config", | ||||
| 	Description: "Due to limitations in our underlying Git dependency, this command requires /usr/bin/git.", | ||||
| 	Aliases:     []string{"d"}, | ||||
| 	ArgsUsage:   "<recipe>", | ||||
| 	Flags: []cli.Flag{ | ||||
| 		internal.DebugFlag, | ||||
| 		internal.NoInputFlag, | ||||
| 	}, | ||||
| 	Before:       internal.SubCommandBefore, | ||||
| 	BashComplete: autocomplete.RecipeNameComplete, | ||||
| 	Action: func(c *cli.Context) error { | ||||
| 		recipeName := c.Args().First() | ||||
|  | ||||
| 		if recipeName != "" { | ||||
| 			internal.ValidateRecipe(c) | ||||
| 		} | ||||
|  | ||||
| 		recipeDir := path.Join(config.RECIPES_DIR, recipeName) | ||||
| 		if err := gitPkg.DiffUnstaged(recipeDir); err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		return nil | ||||
| 	}, | ||||
| } | ||||
| @ -4,38 +4,38 @@ import ( | ||||
| 	"coopcloud.tech/abra/cli/internal" | ||||
| 	"coopcloud.tech/abra/pkg/autocomplete" | ||||
| 	"coopcloud.tech/abra/pkg/recipe" | ||||
| 	"coopcloud.tech/abra/pkg/runtime" | ||||
| 	"github.com/sirupsen/logrus" | ||||
| 	"github.com/urfave/cli" | ||||
| ) | ||||
|  | ||||
| var recipeFetchCommand = cli.Command{ | ||||
| 	Name:        "fetch", | ||||
| 	Usage:       "Fetch recipe local copies", | ||||
| 	Usage:       "Fetch recipe(s)", | ||||
| 	Aliases:     []string{"f"}, | ||||
| 	ArgsUsage:   "[<recipe>]", | ||||
| 	Description: "Fetchs all recipes without arguments.", | ||||
| 	Description: "Retrieves all recipes if no <recipe> argument is passed", | ||||
| 	Flags: []cli.Flag{ | ||||
| 		internal.DebugFlag, | ||||
| 		internal.OfflineFlag, | ||||
| 		internal.NoInputFlag, | ||||
| 	}, | ||||
| 	Before:       internal.SubCommandBefore, | ||||
| 	BashComplete: autocomplete.RecipeNameComplete, | ||||
| 	Action: func(c *cli.Context) error { | ||||
| 		conf := runtime.New(runtime.WithOffline(internal.Offline)) | ||||
| 		recipeName := c.Args().First() | ||||
|  | ||||
| 		if recipeName != "" { | ||||
| 			internal.ValidateRecipe(c, conf) | ||||
| 			return nil // ValidateRecipe ensures latest checkout | ||||
| 			internal.ValidateRecipe(c) | ||||
| 		} | ||||
|  | ||||
| 		repos, err := recipe.ReadReposMetadata(conf) | ||||
| 		if err != nil { | ||||
| 		if err := recipe.EnsureExists(recipeName); err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		if err := recipe.UpdateRepositories(repos, recipeName, conf); err != nil { | ||||
| 		if err := recipe.EnsureUpToDate(recipeName); err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		if err := recipe.EnsureLatest(recipeName); err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
|  | ||||
| @ -8,7 +8,6 @@ import ( | ||||
| 	"coopcloud.tech/abra/pkg/formatter" | ||||
| 	"coopcloud.tech/abra/pkg/lint" | ||||
| 	recipePkg "coopcloud.tech/abra/pkg/recipe" | ||||
| 	"coopcloud.tech/abra/pkg/runtime" | ||||
| 	"github.com/sirupsen/logrus" | ||||
| 	"github.com/urfave/cli" | ||||
| ) | ||||
| @ -22,17 +21,34 @@ var recipeLintCommand = cli.Command{ | ||||
| 		internal.DebugFlag, | ||||
| 		internal.OnlyErrorFlag, | ||||
| 		internal.OfflineFlag, | ||||
| 		internal.NoInputFlag, | ||||
| 		internal.ChaosFlag, | ||||
| 	}, | ||||
| 	Before:       internal.SubCommandBefore, | ||||
| 	BashComplete: autocomplete.RecipeNameComplete, | ||||
| 	Action: func(c *cli.Context) error { | ||||
| 		conf := runtime.New(runtime.WithOffline(internal.Offline)) | ||||
| 		recipe := internal.ValidateRecipe(c, conf) | ||||
| 		recipe := internal.ValidateRecipe(c) | ||||
|  | ||||
| 		if err := recipePkg.EnsureUpToDate(recipe.Name, conf); err != nil { | ||||
| 		if err := recipePkg.EnsureExists(recipe.Name); err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		if !internal.Chaos { | ||||
| 			if err := recipePkg.EnsureIsClean(recipe.Name); err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
|  | ||||
| 			if !internal.Offline { | ||||
| 				if err := recipePkg.EnsureUpToDate(recipe.Name); err != nil { | ||||
| 					logrus.Fatal(err) | ||||
| 				} | ||||
| 			} | ||||
|  | ||||
| 			if err := recipePkg.EnsureLatest(recipe.Name); err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
| 		} | ||||
|  | ||||
| 		tableCol := []string{"ref", "rule", "severity", "satisfied", "skipped", "resolve"} | ||||
| 		table := formatter.CreateTable(tableCol) | ||||
|  | ||||
| @ -52,7 +68,7 @@ var recipeLintCommand = cli.Command{ | ||||
|  | ||||
| 				skippedOutput := "-" | ||||
| 				if skipped { | ||||
| 					skippedOutput = "yes" | ||||
| 					skippedOutput = "✅" | ||||
| 				} | ||||
|  | ||||
| 				satisfied := false | ||||
| @ -71,9 +87,9 @@ var recipeLintCommand = cli.Command{ | ||||
| 					} | ||||
| 				} | ||||
|  | ||||
| 				satisfiedOutput := "yes" | ||||
| 				satisfiedOutput := "✅" | ||||
| 				if !satisfied { | ||||
| 					satisfiedOutput = "NO" | ||||
| 					satisfiedOutput = "❌" | ||||
| 					if skipped { | ||||
| 						satisfiedOutput = "-" | ||||
| 					} | ||||
|  | ||||
| @ -9,7 +9,6 @@ import ( | ||||
| 	"coopcloud.tech/abra/cli/internal" | ||||
| 	"coopcloud.tech/abra/pkg/formatter" | ||||
| 	"coopcloud.tech/abra/pkg/recipe" | ||||
| 	"coopcloud.tech/abra/pkg/runtime" | ||||
| 	"github.com/sirupsen/logrus" | ||||
| 	"github.com/urfave/cli" | ||||
| ) | ||||
| @ -34,9 +33,7 @@ var recipeListCommand = cli.Command{ | ||||
| 	}, | ||||
| 	Before: internal.SubCommandBefore, | ||||
| 	Action: func(c *cli.Context) error { | ||||
| 		conf := runtime.New(runtime.WithOffline(internal.Offline)) | ||||
|  | ||||
| 		catl, err := recipe.ReadRecipeCatalogue(conf) | ||||
| 		catl, err := recipe.ReadRecipeCatalogue(internal.Offline) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err.Error()) | ||||
| 		} | ||||
|  | ||||
| @ -30,5 +30,7 @@ manner. Abra supports convenient automation for recipe maintainenace, see the | ||||
| 		recipeSyncCommand, | ||||
| 		recipeUpgradeCommand, | ||||
| 		recipeVersionCommand, | ||||
| 		recipeResetCommand, | ||||
| 		recipeDiffCommand, | ||||
| 	}, | ||||
| } | ||||
|  | ||||
| @ -1,7 +1,9 @@ | ||||
| package recipe | ||||
|  | ||||
| import ( | ||||
| 	"errors" | ||||
| 	"fmt" | ||||
| 	"os" | ||||
| 	"path" | ||||
| 	"strconv" | ||||
| 	"strings" | ||||
| @ -13,7 +15,6 @@ import ( | ||||
| 	gitPkg "coopcloud.tech/abra/pkg/git" | ||||
| 	"coopcloud.tech/abra/pkg/recipe" | ||||
| 	recipePkg "coopcloud.tech/abra/pkg/recipe" | ||||
| 	"coopcloud.tech/abra/pkg/runtime" | ||||
| 	"coopcloud.tech/tagcmp" | ||||
| 	"github.com/AlecAivazis/survey/v2" | ||||
| 	"github.com/docker/distribution/reference" | ||||
| @ -60,8 +61,7 @@ your SSH keys configured on your account. | ||||
| 	Before:       internal.SubCommandBefore, | ||||
| 	BashComplete: autocomplete.RecipeNameComplete, | ||||
| 	Action: func(c *cli.Context) error { | ||||
| 		conf := runtime.New(runtime.WithOffline(internal.Offline)) | ||||
| 		recipe := internal.ValidateRecipeWithPrompt(c, conf) | ||||
| 		recipe := internal.ValidateRecipe(c) | ||||
|  | ||||
| 		imagesTmp, err := getImageVersions(recipe) | ||||
| 		if err != nil { | ||||
| @ -108,6 +108,18 @@ your SSH keys configured on your account. | ||||
| 			} | ||||
| 		} | ||||
|  | ||||
| 		isClean, err := gitPkg.IsClean(recipe.Dir()) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		if !isClean { | ||||
| 			logrus.Infof("%s currently has these unstaged changes 👇", recipe.Name) | ||||
| 			if err := gitPkg.DiffUnstaged(recipe.Dir()); err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
| 		} | ||||
|  | ||||
| 		if len(tags) > 0 { | ||||
| 			logrus.Warnf("previous git tags detected, assuming this is a new semver release") | ||||
| 			if err := createReleaseFromPreviousTag(tagString, mainAppVersion, recipe, tags); err != nil { | ||||
| @ -130,7 +142,7 @@ your SSH keys configured on your account. | ||||
|  | ||||
| // getImageVersions retrieves image versions for a recipe | ||||
| func getImageVersions(recipe recipe.Recipe) (map[string]string, error) { | ||||
| 	var services = make(map[string]string) | ||||
| 	services := make(map[string]string) | ||||
|  | ||||
| 	missingTag := false | ||||
| 	for _, service := range recipe.Config.Services { | ||||
| @ -197,6 +209,10 @@ func createReleaseFromTag(recipe recipe.Recipe, tagString, mainAppVersion string | ||||
| 		tagString = fmt.Sprintf("%s+%s", tag.String(), mainAppVersion) | ||||
| 	} | ||||
|  | ||||
| 	if err := addReleaseNotes(recipe, tagString); err != nil { | ||||
| 		logrus.Fatal(err) | ||||
| 	} | ||||
|  | ||||
| 	if err := commitRelease(recipe, tagString); err != nil { | ||||
| 		logrus.Fatal(err) | ||||
| 	} | ||||
| @ -227,6 +243,82 @@ func getTagCreateOptions(tag string) (git.CreateTagOptions, error) { | ||||
| 	return git.CreateTagOptions{Message: msg}, nil | ||||
| } | ||||
|  | ||||
| // addReleaseNotes checks if the release/next release note exists and moves the | ||||
| // file to release/<tag>. | ||||
| func addReleaseNotes(recipe recipe.Recipe, tag string) error { | ||||
| 	repoPath := path.Join(config.RECIPES_DIR, recipe.Name) | ||||
| 	tagReleaseNotePath := path.Join(repoPath, "release", tag) | ||||
| 	if _, err := os.Stat(tagReleaseNotePath); err == nil { | ||||
| 		// Release note for current tag already exist exists. | ||||
| 		return nil | ||||
| 	} else if !errors.Is(err, os.ErrNotExist) { | ||||
| 		return err | ||||
| 	} | ||||
|  | ||||
| 	nextReleaseNotePath := path.Join(repoPath, "release", "next") | ||||
| 	if _, err := os.Stat(nextReleaseNotePath); err == nil { | ||||
| 		// release/next note exists. Move it to release/<tag> | ||||
| 		if internal.Dry { | ||||
| 			logrus.Debugf("dry run: move release note from 'next' to %s", tag) | ||||
| 			return nil | ||||
| 		} | ||||
| 		if !internal.NoInput { | ||||
| 			prompt := &survey.Input{ | ||||
| 				Message: "Use release note in release/next?", | ||||
| 			} | ||||
| 			var addReleaseNote bool | ||||
| 			if err := survey.AskOne(prompt, &addReleaseNote); err != nil { | ||||
| 				return err | ||||
| 			} | ||||
| 			if !addReleaseNote { | ||||
| 				return nil | ||||
| 			} | ||||
| 		} | ||||
| 		err := os.Rename(nextReleaseNotePath, tagReleaseNotePath) | ||||
| 		if err != nil { | ||||
| 			return err | ||||
| 		} | ||||
| 		err = gitPkg.Add(repoPath, path.Join("release", "next"), internal.Dry) | ||||
| 		if err != nil { | ||||
| 			return err | ||||
| 		} | ||||
| 		err = gitPkg.Add(repoPath, path.Join("release", tag), internal.Dry) | ||||
| 		if err != nil { | ||||
| 			return err | ||||
| 		} | ||||
| 	} else if !errors.Is(err, os.ErrNotExist) { | ||||
| 		return err | ||||
| 	} | ||||
|  | ||||
| 	// No release note exists for the current release. | ||||
| 	if internal.NoInput { | ||||
| 		return nil | ||||
| 	} | ||||
|  | ||||
| 	prompt := &survey.Input{ | ||||
| 		Message: "Release Note (leave empty for no release note)", | ||||
| 	} | ||||
| 	var releaseNote string | ||||
| 	if err := survey.AskOne(prompt, &releaseNote); err != nil { | ||||
| 		return err | ||||
| 	} | ||||
|  | ||||
| 	if releaseNote == "" { | ||||
| 		return nil | ||||
| 	} | ||||
|  | ||||
| 	err := os.WriteFile(tagReleaseNotePath, []byte(releaseNote), 0o644) | ||||
| 	if err != nil { | ||||
| 		return err | ||||
| 	} | ||||
| 	err = gitPkg.Add(repoPath, path.Join("release", tag), internal.Dry) | ||||
| 	if err != nil { | ||||
| 		return err | ||||
| 	} | ||||
|  | ||||
| 	return nil | ||||
| } | ||||
|  | ||||
| func commitRelease(recipe recipe.Recipe, tag string) error { | ||||
| 	if internal.Dry { | ||||
| 		logrus.Debugf("dry run: no changes committed") | ||||
| @ -246,7 +338,7 @@ func commitRelease(recipe recipe.Recipe, tag string) error { | ||||
|  | ||||
| 	msg := fmt.Sprintf("chore: publish %s release", tag) | ||||
| 	repoPath := path.Join(config.RECIPES_DIR, recipe.Name) | ||||
| 	if err := gitPkg.Commit(repoPath, ".", msg, internal.Dry); err != nil { | ||||
| 	if err := gitPkg.Commit(repoPath, msg, internal.Dry); err != nil { | ||||
| 		return err | ||||
| 	} | ||||
|  | ||||
| @ -394,6 +486,10 @@ func createReleaseFromPreviousTag(tagString, mainAppVersion string, recipe recip | ||||
| 		} | ||||
| 	} | ||||
|  | ||||
| 	if err := addReleaseNotes(recipe, tagString); err != nil { | ||||
| 		logrus.Fatal(err) | ||||
| 	} | ||||
|  | ||||
| 	if err := commitRelease(recipe, tagString); err != nil { | ||||
| 		logrus.Fatalf("failed to commit changes: %s", err.Error()) | ||||
| 	} | ||||
|  | ||||
							
								
								
									
										56
									
								
								cli/recipe/reset.go
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										56
									
								
								cli/recipe/reset.go
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,56 @@ | ||||
| package recipe | ||||
|  | ||||
| import ( | ||||
| 	"path" | ||||
|  | ||||
| 	"coopcloud.tech/abra/cli/internal" | ||||
| 	"coopcloud.tech/abra/pkg/autocomplete" | ||||
| 	"coopcloud.tech/abra/pkg/config" | ||||
| 	"github.com/go-git/go-git/v5" | ||||
| 	"github.com/sirupsen/logrus" | ||||
| 	"github.com/urfave/cli" | ||||
| ) | ||||
|  | ||||
| var recipeResetCommand = cli.Command{ | ||||
| 	Name:        "reset", | ||||
| 	Usage:       "Remove all unstaged changes from recipe config", | ||||
| 	Description: "WARNING, this will delete your changes. Be Careful.", | ||||
| 	Aliases:     []string{"rs"}, | ||||
| 	ArgsUsage:   "<recipe>", | ||||
| 	Flags: []cli.Flag{ | ||||
| 		internal.DebugFlag, | ||||
| 		internal.NoInputFlag, | ||||
| 	}, | ||||
| 	Before:       internal.SubCommandBefore, | ||||
| 	BashComplete: autocomplete.RecipeNameComplete, | ||||
| 	Action: func(c *cli.Context) error { | ||||
| 		recipeName := c.Args().First() | ||||
|  | ||||
| 		if recipeName != "" { | ||||
| 			internal.ValidateRecipe(c) | ||||
| 		} | ||||
|  | ||||
| 		repoPath := path.Join(config.RECIPES_DIR, recipeName) | ||||
| 		repo, err := git.PlainOpen(repoPath) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		ref, err := repo.Head() | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		worktree, err := repo.Worktree() | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		opts := &git.ResetOptions{Commit: ref.Hash(), Mode: git.HardReset} | ||||
| 		if err := worktree.Reset(opts); err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		return nil | ||||
| 	}, | ||||
| } | ||||
| @ -8,7 +8,7 @@ import ( | ||||
| 	"coopcloud.tech/abra/cli/internal" | ||||
| 	"coopcloud.tech/abra/pkg/autocomplete" | ||||
| 	"coopcloud.tech/abra/pkg/config" | ||||
| 	"coopcloud.tech/abra/pkg/runtime" | ||||
| 	gitPkg "coopcloud.tech/abra/pkg/git" | ||||
| 	"coopcloud.tech/tagcmp" | ||||
| 	"github.com/AlecAivazis/survey/v2" | ||||
| 	"github.com/go-git/go-git/v5" | ||||
| @ -29,7 +29,6 @@ var recipeSyncCommand = cli.Command{ | ||||
| 		internal.MajorFlag, | ||||
| 		internal.MinorFlag, | ||||
| 		internal.PatchFlag, | ||||
| 		internal.OfflineFlag, | ||||
| 	}, | ||||
| 	Before: internal.SubCommandBefore, | ||||
| 	Description: ` | ||||
| @ -42,9 +41,9 @@ Where <version> can be specifed on the command-line or Abra can attempt to | ||||
| auto-generate it for you. The <recipe> configuration will be updated on the | ||||
| local file system. | ||||
| `, | ||||
| 	BashComplete: autocomplete.RecipeNameComplete, | ||||
| 	Action: func(c *cli.Context) error { | ||||
| 		conf := runtime.New(runtime.WithOffline(internal.Offline)) | ||||
| 		recipe := internal.ValidateRecipeWithPrompt(c, conf) | ||||
| 		recipe := internal.ValidateRecipe(c) | ||||
|  | ||||
| 		mainApp, err := internal.GetMainAppImage(recipe) | ||||
| 		if err != nil { | ||||
| @ -66,6 +65,9 @@ local file system. | ||||
| 		nextTag := c.Args().Get(1) | ||||
| 		if len(tags) == 0 && nextTag == "" { | ||||
| 			logrus.Warnf("no git tags found for %s", recipe.Name) | ||||
| 			if internal.NoInput { | ||||
| 				logrus.Fatalf("unable to continue, input required for initial version") | ||||
| 			} | ||||
| 			fmt.Println(fmt.Sprintf(` | ||||
| The following options are two types of initial semantic version that you can | ||||
| pick for %s that will be published in the recipe catalogue. This follows the | ||||
| @ -197,7 +199,17 @@ likely to change. | ||||
| 			logrus.Infof("dry run: not syncing label %s for recipe %s", nextTag, recipe.Name) | ||||
| 		} | ||||
|  | ||||
| 		isClean, err := gitPkg.IsClean(recipe.Dir()) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
| 		if !isClean { | ||||
| 			logrus.Infof("%s currently has these unstaged changes 👇", recipe.Name) | ||||
| 			if err := gitPkg.DiffUnstaged(recipe.Dir()); err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
| 		} | ||||
|  | ||||
| 		return nil | ||||
| 	}, | ||||
| 	BashComplete: autocomplete.RecipeNameComplete, | ||||
| } | ||||
|  | ||||
| @ -14,8 +14,8 @@ import ( | ||||
| 	"coopcloud.tech/abra/pkg/client" | ||||
| 	"coopcloud.tech/abra/pkg/config" | ||||
| 	"coopcloud.tech/abra/pkg/formatter" | ||||
| 	gitPkg "coopcloud.tech/abra/pkg/git" | ||||
| 	recipePkg "coopcloud.tech/abra/pkg/recipe" | ||||
| 	"coopcloud.tech/abra/pkg/runtime" | ||||
| 	"coopcloud.tech/tagcmp" | ||||
| 	"github.com/AlecAivazis/survey/v2" | ||||
| 	"github.com/docker/distribution/reference" | ||||
| @ -58,8 +58,7 @@ You may invoke this command in "wizard" mode and be prompted for input: | ||||
|  | ||||
|     abra recipe upgrade | ||||
| `, | ||||
| 	BashComplete: autocomplete.RecipeNameComplete, | ||||
| 	ArgsUsage:    "<recipe>", | ||||
| 	ArgsUsage: "<recipe>", | ||||
| 	Flags: []cli.Flag{ | ||||
| 		internal.DebugFlag, | ||||
| 		internal.NoInputFlag, | ||||
| @ -68,14 +67,25 @@ You may invoke this command in "wizard" mode and be prompted for input: | ||||
| 		internal.MajorFlag, | ||||
| 		internal.MachineReadableFlag, | ||||
| 		internal.AllTagsFlag, | ||||
| 		internal.OfflineFlag, | ||||
| 	}, | ||||
| 	Before: internal.SubCommandBefore, | ||||
| 	Before:       internal.SubCommandBefore, | ||||
| 	BashComplete: autocomplete.RecipeNameComplete, | ||||
| 	Action: func(c *cli.Context) error { | ||||
| 		conf := runtime.New(runtime.WithOffline(internal.Offline)) | ||||
| 		recipe := internal.ValidateRecipeWithPrompt(c, conf) | ||||
| 		recipe := internal.ValidateRecipe(c) | ||||
|  | ||||
| 		if err := recipePkg.EnsureUpToDate(recipe.Name, conf); err != nil { | ||||
| 		if err := recipePkg.EnsureIsClean(recipe.Name); err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		if err := recipePkg.EnsureExists(recipe.Name); err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		if err := recipePkg.EnsureUpToDate(recipe.Name); err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		if err := recipePkg.EnsureLatest(recipe.Name); err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| @ -185,7 +195,7 @@ You may invoke this command in "wizard" mode and be prompted for input: | ||||
| 				continue // skip on to the next tag and don't update any compose files | ||||
| 			} | ||||
|  | ||||
| 			catlVersions, err := recipePkg.VersionsOfService(recipe.Name, service.Name, conf) | ||||
| 			catlVersions, err := recipePkg.VersionsOfService(recipe.Name, service.Name, internal.Offline) | ||||
| 			if err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
| @ -317,6 +327,7 @@ You may invoke this command in "wizard" mode and be prompted for input: | ||||
| 				} | ||||
|  | ||||
| 				fmt.Println(string(jsonstring)) | ||||
|  | ||||
| 				return nil | ||||
| 			} | ||||
|  | ||||
| @ -327,6 +338,18 @@ You may invoke this command in "wizard" mode and be prompted for input: | ||||
| 				} | ||||
| 			} | ||||
| 		} | ||||
|  | ||||
| 		isClean, err := gitPkg.IsClean(recipeDir) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
| 		if !isClean { | ||||
| 			logrus.Infof("%s currently has these unstaged changes 👇", recipe.Name) | ||||
| 			if err := gitPkg.DiffUnstaged(recipeDir); err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
| 		} | ||||
|  | ||||
| 		return nil | ||||
| 	}, | ||||
| } | ||||
|  | ||||
| @ -1,59 +1,85 @@ | ||||
| package recipe | ||||
|  | ||||
| import ( | ||||
| 	"fmt" | ||||
| 	"sort" | ||||
|  | ||||
| 	"coopcloud.tech/abra/cli/internal" | ||||
| 	"coopcloud.tech/abra/pkg/autocomplete" | ||||
| 	"coopcloud.tech/abra/pkg/formatter" | ||||
| 	recipePkg "coopcloud.tech/abra/pkg/recipe" | ||||
| 	"coopcloud.tech/abra/pkg/runtime" | ||||
| 	"github.com/olekukonko/tablewriter" | ||||
| 	"github.com/sirupsen/logrus" | ||||
| 	"github.com/urfave/cli" | ||||
| ) | ||||
|  | ||||
| func sortServiceByName(versions [][]string) func(i, j int) bool { | ||||
| 	return func(i, j int) bool { | ||||
| 		// NOTE(d1): corresponds to the `tableCol` definition below | ||||
| 		if versions[i][1] == "app" { | ||||
| 			return true | ||||
| 		} | ||||
| 		return versions[i][1] < versions[j][1] | ||||
| 	} | ||||
| } | ||||
|  | ||||
| var recipeVersionCommand = cli.Command{ | ||||
| 	Name:      "versions", | ||||
| 	Aliases:   []string{"v"}, | ||||
| 	Usage:     "List recipe versions", | ||||
| 	ArgsUsage: "<recipe>", | ||||
| 	Name:        "versions", | ||||
| 	Aliases:     []string{"v"}, | ||||
| 	Usage:       "List recipe versions", | ||||
| 	ArgsUsage:   "<recipe>", | ||||
| 	Description: "Versions are read from the recipe catalogue.", | ||||
| 	Flags: []cli.Flag{ | ||||
| 		internal.DebugFlag, | ||||
| 		internal.OfflineFlag, | ||||
| 		internal.NoInputFlag, | ||||
| 		internal.MachineReadableFlag, | ||||
| 	}, | ||||
| 	Before:       internal.SubCommandBefore, | ||||
| 	BashComplete: autocomplete.RecipeNameComplete, | ||||
| 	Action: func(c *cli.Context) error { | ||||
| 		conf := runtime.New(runtime.WithOffline(internal.Offline)) | ||||
| 		recipe := internal.ValidateRecipe(c, conf) | ||||
| 		recipe := internal.ValidateRecipe(c) | ||||
|  | ||||
| 		catalogue, err := recipePkg.ReadRecipeCatalogue(conf) | ||||
| 		catl, err := recipePkg.ReadRecipeCatalogue(internal.Offline) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		recipeMeta, ok := catalogue[recipe.Name] | ||||
| 		recipeMeta, ok := catl[recipe.Name] | ||||
| 		if !ok { | ||||
| 			logrus.Fatalf("%s recipe doesn't exist?", recipe.Name) | ||||
| 			logrus.Fatalf("%s is not published on the catalogue?", recipe.Name) | ||||
| 		} | ||||
|  | ||||
| 		tableCol := []string{"Version", "Service", "Image", "Tag"} | ||||
| 		table := formatter.CreateTable(tableCol) | ||||
| 		if len(recipeMeta.Versions) == 0 { | ||||
| 			logrus.Fatalf("%s has no catalogue published versions?", recipe.Name) | ||||
| 		} | ||||
|  | ||||
| 		for i := len(recipeMeta.Versions) - 1; i >= 0; i-- { | ||||
| 			for tag, meta := range recipeMeta.Versions[i] { | ||||
| 			tableCols := []string{"version", "service", "image", "tag"} | ||||
| 			table := formatter.CreateTable(tableCols) | ||||
| 			for version, meta := range recipeMeta.Versions[i] { | ||||
| 				var versions [][]string | ||||
| 				for service, serviceMeta := range meta { | ||||
| 					table.Append([]string{tag, service, serviceMeta.Image, serviceMeta.Tag}) | ||||
| 					versions = append(versions, []string{version, service, serviceMeta.Image, serviceMeta.Tag}) | ||||
| 				} | ||||
|  | ||||
| 				sort.Slice(versions, sortServiceByName(versions)) | ||||
|  | ||||
| 				for _, version := range versions { | ||||
| 					table.Append(version) | ||||
| 				} | ||||
|  | ||||
| 				if internal.MachineReadable { | ||||
| 					table.JSONRender() | ||||
| 				} else { | ||||
| 					table.SetAutoMergeCellsByColumnIndex([]int{0}) | ||||
| 					table.SetAlignment(tablewriter.ALIGN_LEFT) | ||||
| 					table.Render() | ||||
| 					fmt.Println() | ||||
| 				} | ||||
| 			} | ||||
| 		} | ||||
|  | ||||
| 		table.SetAutoMergeCells(true) | ||||
|  | ||||
| 		if table.NumLines() > 0 { | ||||
| 			table.Render() | ||||
| 		} else { | ||||
| 			logrus.Fatalf("%s has no published versions?", recipe.Name) | ||||
| 		} | ||||
|  | ||||
| 		return nil | ||||
| 	}, | ||||
| } | ||||
|  | ||||
| @ -1,83 +0,0 @@ | ||||
| package record | ||||
|  | ||||
| import ( | ||||
| 	"context" | ||||
| 	"fmt" | ||||
| 	"strconv" | ||||
|  | ||||
| 	"coopcloud.tech/abra/cli/internal" | ||||
| 	gandiPkg "coopcloud.tech/abra/pkg/dns/gandi" | ||||
| 	"coopcloud.tech/abra/pkg/formatter" | ||||
| 	"github.com/libdns/gandi" | ||||
| 	"github.com/sirupsen/logrus" | ||||
| 	"github.com/urfave/cli" | ||||
| ) | ||||
|  | ||||
| // RecordListCommand lists domains. | ||||
| var RecordListCommand = cli.Command{ | ||||
| 	Name:      "list", | ||||
| 	Usage:     "List domain name records", | ||||
| 	Aliases:   []string{"ls"}, | ||||
| 	ArgsUsage: "<zone>", | ||||
| 	Flags: []cli.Flag{ | ||||
| 		internal.DebugFlag, | ||||
| 		internal.DNSProviderFlag, | ||||
| 		internal.OfflineFlag, | ||||
| 	}, | ||||
| 	Before: internal.SubCommandBefore, | ||||
| 	Description: ` | ||||
| List all domain name records managed by a 3rd party provider for a specific | ||||
| zone. | ||||
|  | ||||
| You must specify a zone (e.g. example.com) under which your domain name records | ||||
| are listed. This zone must already be created on your provider account. | ||||
| `, | ||||
| 	Action: func(c *cli.Context) error { | ||||
| 		if err := internal.EnsureDNSProvider(); err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		zone, err := internal.EnsureZoneArgument(c) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		var provider gandi.Provider | ||||
| 		switch internal.DNSProvider { | ||||
| 		case "gandi": | ||||
| 			provider, err = gandiPkg.New() | ||||
| 			if err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
| 		default: | ||||
| 			logrus.Fatalf("%s is not a supported DNS provider", internal.DNSProvider) | ||||
| 		} | ||||
|  | ||||
| 		records, err := provider.GetRecords(context.Background(), zone) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		tableCol := []string{"type", "name", "value", "TTL", "priority"} | ||||
| 		table := formatter.CreateTable(tableCol) | ||||
|  | ||||
| 		for _, record := range records { | ||||
| 			value := record.Value | ||||
| 			if len(record.Value) > 30 { | ||||
| 				value = fmt.Sprintf("%s...", record.Value[:30]) | ||||
| 			} | ||||
|  | ||||
| 			table.Append([]string{ | ||||
| 				record.Type, | ||||
| 				record.Name, | ||||
| 				value, | ||||
| 				record.TTL.String(), | ||||
| 				strconv.Itoa(record.Priority), | ||||
| 			}) | ||||
| 		} | ||||
|  | ||||
| 		table.Render() | ||||
|  | ||||
| 		return nil | ||||
| 	}, | ||||
| } | ||||
| @ -1,149 +0,0 @@ | ||||
| package record | ||||
|  | ||||
| import ( | ||||
| 	"context" | ||||
| 	"fmt" | ||||
| 	"strconv" | ||||
|  | ||||
| 	"coopcloud.tech/abra/cli/internal" | ||||
| 	"coopcloud.tech/abra/pkg/dns" | ||||
| 	gandiPkg "coopcloud.tech/abra/pkg/dns/gandi" | ||||
| 	"coopcloud.tech/abra/pkg/formatter" | ||||
| 	"github.com/libdns/gandi" | ||||
| 	"github.com/libdns/libdns" | ||||
| 	"github.com/sirupsen/logrus" | ||||
| 	"github.com/urfave/cli" | ||||
| ) | ||||
|  | ||||
| // RecordNewCommand creates a new domain name record. | ||||
| var RecordNewCommand = cli.Command{ | ||||
| 	Name:      "new", | ||||
| 	Usage:     "Create a new domain record", | ||||
| 	Aliases:   []string{"n"}, | ||||
| 	ArgsUsage: "<zone>", | ||||
| 	Flags: []cli.Flag{ | ||||
| 		internal.DebugFlag, | ||||
| 		internal.NoInputFlag, | ||||
| 		internal.DNSProviderFlag, | ||||
| 		internal.DNSTypeFlag, | ||||
| 		internal.DNSNameFlag, | ||||
| 		internal.DNSValueFlag, | ||||
| 		internal.DNSTTLFlag, | ||||
| 		internal.DNSPriorityFlag, | ||||
| 		internal.OfflineFlag, | ||||
| 	}, | ||||
| 	Before: internal.SubCommandBefore, | ||||
| 	Description: ` | ||||
| Create a new domain name record for a specific zone. | ||||
|  | ||||
| You must specify a zone (e.g. example.com) under which your domain name records | ||||
| are listed. This zone must already be created on your provider account. | ||||
|  | ||||
| Example: | ||||
|  | ||||
|     abra record new foo.com -p gandi -t A -n myapp -v 192.168.178.44 | ||||
|  | ||||
| You may also invoke this command in "wizard" mode and be prompted for input: | ||||
|  | ||||
|     abra record new | ||||
| `, | ||||
| 	Action: func(c *cli.Context) error { | ||||
| 		zone, err := internal.EnsureZoneArgument(c) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		if err := internal.EnsureDNSProvider(); err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		var provider gandi.Provider | ||||
| 		switch internal.DNSProvider { | ||||
| 		case "gandi": | ||||
| 			provider, err = gandiPkg.New() | ||||
| 			if err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
| 		default: | ||||
| 			logrus.Fatalf("%s is not a supported DNS provider", internal.DNSProvider) | ||||
| 		} | ||||
|  | ||||
| 		if err := internal.EnsureDNSTypeFlag(c); err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		if err := internal.EnsureDNSNameFlag(c); err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		if err := internal.EnsureDNSValueFlag(c); err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		ttl, err := dns.GetTTL(internal.DNSTTL) | ||||
| 		if err != nil { | ||||
| 			return err | ||||
| 		} | ||||
|  | ||||
| 		record := libdns.Record{ | ||||
| 			Type:  internal.DNSType, | ||||
| 			Name:  internal.DNSName, | ||||
| 			Value: internal.DNSValue, | ||||
| 			TTL:   ttl, | ||||
| 		} | ||||
|  | ||||
| 		if internal.DNSType == "MX" || internal.DNSType == "SRV" || internal.DNSType == "URI" { | ||||
| 			record.Priority = internal.DNSPriority | ||||
| 		} | ||||
|  | ||||
| 		records, err := provider.GetRecords(context.Background(), zone) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		for _, existingRecord := range records { | ||||
| 			if existingRecord.Type == record.Type && | ||||
| 				existingRecord.Name == record.Name && | ||||
| 				existingRecord.Value == record.Value { | ||||
| 				logrus.Fatalf("%s record for %s already exists?", record.Type, zone) | ||||
| 			} | ||||
| 		} | ||||
|  | ||||
| 		createdRecords, err := provider.SetRecords( | ||||
| 			context.Background(), | ||||
| 			zone, | ||||
| 			[]libdns.Record{record}, | ||||
| 		) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		if len(createdRecords) == 0 { | ||||
| 			logrus.Fatal("provider library reports that no record was created?") | ||||
| 		} | ||||
|  | ||||
| 		createdRecord := createdRecords[0] | ||||
|  | ||||
| 		tableCol := []string{"type", "name", "value", "TTL", "priority"} | ||||
| 		table := formatter.CreateTable(tableCol) | ||||
|  | ||||
| 		value := createdRecord.Value | ||||
| 		if len(createdRecord.Value) > 30 { | ||||
| 			value = fmt.Sprintf("%s...", createdRecord.Value[:30]) | ||||
| 		} | ||||
|  | ||||
| 		table.Append([]string{ | ||||
| 			createdRecord.Type, | ||||
| 			createdRecord.Name, | ||||
| 			value, | ||||
| 			createdRecord.TTL.String(), | ||||
| 			strconv.Itoa(createdRecord.Priority), | ||||
| 		}) | ||||
|  | ||||
| 		table.Render() | ||||
|  | ||||
| 		logrus.Info("record created") | ||||
|  | ||||
| 		return nil | ||||
| 	}, | ||||
| } | ||||
| @ -1,37 +0,0 @@ | ||||
| package record | ||||
|  | ||||
| import ( | ||||
| 	"github.com/urfave/cli" | ||||
| ) | ||||
|  | ||||
| // RecordCommand supports managing DNS entries. | ||||
| var RecordCommand = cli.Command{ | ||||
| 	Name:      "record", | ||||
| 	Usage:     "Manage domain name records", | ||||
| 	Aliases:   []string{"rc"}, | ||||
| 	ArgsUsage: "<record>", | ||||
| 	Description: ` | ||||
| Manage domain name records via 3rd party providers such as Gandi DNS. It | ||||
| supports listing, creating and removing all types of records that you might | ||||
| need for managing Co-op Cloud apps. | ||||
|  | ||||
| The following providers are supported: | ||||
|  | ||||
|     Gandi DNS https://www.gandi.net | ||||
|  | ||||
| You need an account with such a provider already. Typically, you need to | ||||
| provide an API token on the Abra command-line when using these commands so that | ||||
| you can authenticate with your provider account. | ||||
|  | ||||
| New providers can be integrated, we welcome change sets. See the underlying DNS | ||||
| library documentation for more. It supports many existing providers and allows | ||||
| to implement new provider support easily. | ||||
|  | ||||
|     https://pkg.go.dev/github.com/libdns/libdns | ||||
| `, | ||||
| 	Subcommands: []cli.Command{ | ||||
| 		RecordListCommand, | ||||
| 		RecordNewCommand, | ||||
| 		RecordRemoveCommand, | ||||
| 	}, | ||||
| } | ||||
| @ -1,137 +0,0 @@ | ||||
| package record | ||||
|  | ||||
| import ( | ||||
| 	"context" | ||||
| 	"fmt" | ||||
| 	"strconv" | ||||
|  | ||||
| 	"coopcloud.tech/abra/cli/internal" | ||||
| 	gandiPkg "coopcloud.tech/abra/pkg/dns/gandi" | ||||
| 	"coopcloud.tech/abra/pkg/formatter" | ||||
| 	"github.com/AlecAivazis/survey/v2" | ||||
| 	"github.com/libdns/gandi" | ||||
| 	"github.com/libdns/libdns" | ||||
| 	"github.com/sirupsen/logrus" | ||||
| 	"github.com/urfave/cli" | ||||
| ) | ||||
|  | ||||
| // RecordRemoveCommand lists domains. | ||||
| var RecordRemoveCommand = cli.Command{ | ||||
| 	Name:      "remove", | ||||
| 	Usage:     "Remove a domain name record", | ||||
| 	Aliases:   []string{"rm"}, | ||||
| 	ArgsUsage: "<zone>", | ||||
| 	Flags: []cli.Flag{ | ||||
| 		internal.DebugFlag, | ||||
| 		internal.NoInputFlag, | ||||
| 		internal.DNSProviderFlag, | ||||
| 		internal.DNSTypeFlag, | ||||
| 		internal.DNSNameFlag, | ||||
| 		internal.OfflineFlag, | ||||
| 	}, | ||||
| 	Before: internal.SubCommandBefore, | ||||
| 	Description: ` | ||||
| Remove a domain name record for a specific zone. | ||||
|  | ||||
| It uses the type of record and name to match existing records and choose one | ||||
| for deletion. You must specify a zone (e.g. example.com) under which your | ||||
| domain name records are listed. This zone must already be created on your | ||||
| provider account. | ||||
|  | ||||
| Example: | ||||
|  | ||||
|     abra record remove foo.com -p gandi -t A -n myapp | ||||
|  | ||||
| You may also invoke this command in "wizard" mode and be prompted for input: | ||||
|  | ||||
|     abra record rm | ||||
| `, | ||||
| 	Action: func(c *cli.Context) error { | ||||
| 		zone, err := internal.EnsureZoneArgument(c) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		if err := internal.EnsureDNSProvider(); err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		var provider gandi.Provider | ||||
| 		switch internal.DNSProvider { | ||||
| 		case "gandi": | ||||
| 			provider, err = gandiPkg.New() | ||||
| 			if err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
| 		default: | ||||
| 			logrus.Fatalf("%s is not a supported DNS provider", internal.DNSProvider) | ||||
| 		} | ||||
|  | ||||
| 		if err := internal.EnsureDNSTypeFlag(c); err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		if err := internal.EnsureDNSNameFlag(c); err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		records, err := provider.GetRecords(context.Background(), zone) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		var toDelete libdns.Record | ||||
| 		for _, record := range records { | ||||
| 			if record.Type == internal.DNSType && record.Name == internal.DNSName { | ||||
| 				toDelete = record | ||||
| 				break | ||||
| 			} | ||||
| 		} | ||||
|  | ||||
| 		if (libdns.Record{}) == toDelete { | ||||
| 			logrus.Fatal("provider library reports no matching record?") | ||||
| 		} | ||||
|  | ||||
| 		tableCol := []string{"type", "name", "value", "TTL", "priority"} | ||||
| 		table := formatter.CreateTable(tableCol) | ||||
|  | ||||
| 		value := toDelete.Value | ||||
| 		if len(toDelete.Value) > 30 { | ||||
| 			value = fmt.Sprintf("%s...", toDelete.Value[:30]) | ||||
| 		} | ||||
|  | ||||
| 		table.Append([]string{ | ||||
| 			toDelete.Type, | ||||
| 			toDelete.Name, | ||||
| 			value, | ||||
| 			toDelete.TTL.String(), | ||||
| 			strconv.Itoa(toDelete.Priority), | ||||
| 		}) | ||||
|  | ||||
| 		table.Render() | ||||
|  | ||||
| 		if !internal.NoInput { | ||||
| 			response := false | ||||
| 			prompt := &survey.Confirm{ | ||||
| 				Message: "continue with record deletion?", | ||||
| 			} | ||||
|  | ||||
| 			if err := survey.AskOne(prompt, &response); err != nil { | ||||
| 				return err | ||||
| 			} | ||||
|  | ||||
| 			if !response { | ||||
| 				logrus.Fatal("exiting as requested") | ||||
| 			} | ||||
| 		} | ||||
|  | ||||
| 		_, err = provider.DeleteRecords(context.Background(), zone, []libdns.Record{toDelete}) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		logrus.Info("record successfully deleted") | ||||
|  | ||||
| 		return nil | ||||
| 	}, | ||||
| } | ||||
| @ -118,7 +118,6 @@ developer machine. | ||||
| 		internal.DebugFlag, | ||||
| 		internal.NoInputFlag, | ||||
| 		localFlag, | ||||
| 		internal.OfflineFlag, | ||||
| 	}, | ||||
| 	Before:    internal.SubCommandBefore, | ||||
| 	ArgsUsage: "<domain>", | ||||
|  | ||||
| @ -60,6 +60,17 @@ var serverListCommand = cli.Command{ | ||||
| 					if err != nil { | ||||
| 						logrus.Fatal(err) | ||||
| 					} | ||||
|  | ||||
| 					if sp.Host == "" { | ||||
| 						sp.Host = "unknown" | ||||
| 					} | ||||
| 					if sp.User == "" { | ||||
| 						sp.User = "unknown" | ||||
| 					} | ||||
| 					if sp.Port == "" { | ||||
| 						sp.Port = "unknown" | ||||
| 					} | ||||
|  | ||||
| 					row = []string{serverName, sp.Host, sp.User, sp.Port} | ||||
| 				} | ||||
| 			} | ||||
| @ -73,8 +84,11 @@ var serverListCommand = cli.Command{ | ||||
| 			} | ||||
|  | ||||
| 			if problemsFilter { | ||||
| 				if row[1] == "unknown" { | ||||
| 					table.Append(row) | ||||
| 				for _, val := range row { | ||||
| 					if val == "unknown" { | ||||
| 						table.Append(row) | ||||
| 						break | ||||
| 					} | ||||
| 				} | ||||
| 			} else { | ||||
| 				table.Append(row) | ||||
|  | ||||
| @ -1,261 +0,0 @@ | ||||
| package server | ||||
|  | ||||
| import ( | ||||
| 	"context" | ||||
| 	"fmt" | ||||
| 	"strings" | ||||
|  | ||||
| 	"coopcloud.tech/abra/cli/internal" | ||||
| 	"coopcloud.tech/abra/pkg/formatter" | ||||
| 	"coopcloud.tech/libcapsul" | ||||
| 	"github.com/AlecAivazis/survey/v2" | ||||
| 	"github.com/hetznercloud/hcloud-go/hcloud" | ||||
| 	"github.com/sirupsen/logrus" | ||||
| 	"github.com/urfave/cli" | ||||
| ) | ||||
|  | ||||
| func newHetznerCloudVPS(c *cli.Context) error { | ||||
| 	if err := internal.EnsureNewHetznerCloudVPSFlags(c); err != nil { | ||||
| 		return err | ||||
| 	} | ||||
|  | ||||
| 	client := hcloud.NewClient(hcloud.WithToken(internal.HetznerCloudAPIToken)) | ||||
|  | ||||
| 	var sshKeysRaw []string | ||||
| 	var sshKeys []*hcloud.SSHKey | ||||
| 	for _, sshKey := range c.StringSlice("hetzner-ssh-keys") { | ||||
| 		if sshKey == "" { | ||||
| 			continue | ||||
| 		} | ||||
|  | ||||
| 		sshKey, _, err := client.SSHKey.GetByName(context.Background(), sshKey) | ||||
| 		if err != nil { | ||||
| 			return err | ||||
| 		} | ||||
| 		sshKeys = append(sshKeys, sshKey) | ||||
| 		sshKeysRaw = append(sshKeysRaw, sshKey.Name) | ||||
| 	} | ||||
|  | ||||
| 	serverOpts := hcloud.ServerCreateOpts{ | ||||
| 		Name:       internal.HetznerCloudName, | ||||
| 		ServerType: &hcloud.ServerType{Name: internal.HetznerCloudType}, | ||||
| 		Image:      &hcloud.Image{Name: internal.HetznerCloudImage}, | ||||
| 		SSHKeys:    sshKeys, | ||||
| 		Location:   &hcloud.Location{Name: internal.HetznerCloudLocation}, | ||||
| 	} | ||||
|  | ||||
| 	sshKeyIDs := strings.Join(sshKeysRaw, "\n") | ||||
| 	if sshKeyIDs == "" { | ||||
| 		sshKeyIDs = "N/A (password auth)" | ||||
| 	} | ||||
|  | ||||
| 	tableColumns := []string{"name", "type", "image", "ssh-keys", "location"} | ||||
| 	table := formatter.CreateTable(tableColumns) | ||||
| 	table.Append([]string{ | ||||
| 		internal.HetznerCloudName, | ||||
| 		internal.HetznerCloudType, | ||||
| 		internal.HetznerCloudImage, | ||||
| 		sshKeyIDs, | ||||
| 		internal.HetznerCloudLocation, | ||||
| 	}) | ||||
| 	table.Render() | ||||
|  | ||||
| 	response := false | ||||
| 	prompt := &survey.Confirm{ | ||||
| 		Message: "continue with hetzner cloud VPS creation?", | ||||
| 	} | ||||
|  | ||||
| 	if err := survey.AskOne(prompt, &response); err != nil { | ||||
| 		return err | ||||
| 	} | ||||
|  | ||||
| 	if !response { | ||||
| 		logrus.Fatal("exiting as requested") | ||||
| 	} | ||||
|  | ||||
| 	res, _, err := client.Server.Create(context.Background(), serverOpts) | ||||
| 	if err != nil { | ||||
| 		return err | ||||
| 	} | ||||
|  | ||||
| 	var rootPassword string | ||||
| 	if len(sshKeys) > 0 { | ||||
| 		rootPassword = "N/A (using SSH keys)" | ||||
| 	} else { | ||||
| 		rootPassword = res.RootPassword | ||||
| 	} | ||||
|  | ||||
| 	ip := res.Server.PublicNet.IPv4.IP.String() | ||||
|  | ||||
| 	fmt.Println(fmt.Sprintf(` | ||||
| Your new Hetzner Cloud VPS has successfully been created! Here are the details: | ||||
|  | ||||
|     name: %s | ||||
|     IP address: %s | ||||
|     root password: %s | ||||
|  | ||||
| You can access this new VPS via SSH using the following command: | ||||
|  | ||||
|     ssh root@%s | ||||
|  | ||||
| Please note, this server is not managed by Abra yet (i.e. "abra server ls" will | ||||
| not list this server)! You will need to assign a domain name record (manually | ||||
| or by using "abra record new") and add the server to your Abra configuration | ||||
| ("abra server add") to have a working server that you can deploy Co-op Cloud | ||||
| apps to. | ||||
|  | ||||
| When setting up domain name records, you probably want to set up the following | ||||
| 2 A records. This supports deploying apps to your root domain (e.g. | ||||
| example.com) and other apps on sub-domains (e.g. foo.example.com, | ||||
| bar.example.com). | ||||
|  | ||||
|     @  1800 IN A %s | ||||
|     *  1800 IN A %s | ||||
| 	`, | ||||
| 		internal.HetznerCloudName, ip, rootPassword, | ||||
| 		ip, ip, ip, | ||||
| 	)) | ||||
|  | ||||
| 	return nil | ||||
| } | ||||
|  | ||||
| func newCapsulVPS(c *cli.Context) error { | ||||
| 	if err := internal.EnsureNewCapsulVPSFlags(c); err != nil { | ||||
| 		return err | ||||
| 	} | ||||
|  | ||||
| 	capsulCreateURL := fmt.Sprintf("https://%s/api/capsul/create", internal.CapsulInstanceURL) | ||||
|  | ||||
| 	var sshKeys []string | ||||
| 	for _, sshKey := range c.StringSlice("capsul-ssh-keys") { | ||||
| 		if sshKey == "" { | ||||
| 			continue | ||||
| 		} | ||||
| 		sshKeys = append(sshKeys, sshKey) | ||||
| 	} | ||||
|  | ||||
| 	tableColumns := []string{"instance", "name", "type", "image", "ssh-keys"} | ||||
| 	table := formatter.CreateTable(tableColumns) | ||||
| 	table.Append([]string{ | ||||
| 		internal.CapsulInstanceURL, | ||||
| 		internal.CapsulName, | ||||
| 		internal.CapsulType, | ||||
| 		internal.CapsulImage, | ||||
| 		strings.Join(sshKeys, "\n"), | ||||
| 	}) | ||||
| 	table.Render() | ||||
|  | ||||
| 	response := false | ||||
| 	prompt := &survey.Confirm{ | ||||
| 		Message: "continue with capsul creation?", | ||||
| 	} | ||||
|  | ||||
| 	if err := survey.AskOne(prompt, &response); err != nil { | ||||
| 		return err | ||||
| 	} | ||||
|  | ||||
| 	if !response { | ||||
| 		logrus.Fatal("exiting as requested") | ||||
| 	} | ||||
|  | ||||
| 	capsulClient := libcapsul.New(capsulCreateURL, internal.CapsulAPIToken) | ||||
| 	resp, err := capsulClient.Create( | ||||
| 		internal.CapsulName, | ||||
| 		internal.CapsulType, | ||||
| 		internal.CapsulImage, | ||||
| 		sshKeys, | ||||
| 	) | ||||
| 	if err != nil { | ||||
| 		return err | ||||
| 	} | ||||
|  | ||||
| 	fmt.Println(fmt.Sprintf(` | ||||
| Your new Capsul has successfully been created! Here are the details: | ||||
|  | ||||
|     Capsul name: %s | ||||
|     Capsul ID:   %v | ||||
|  | ||||
| You will need to log into your Capsul instance web interface to retrieve the IP | ||||
| address. You can learn all about how to get SSH access to your new Capsul on: | ||||
|  | ||||
|     %s/about-ssh | ||||
|  | ||||
| Please note, this server is not managed by Abra yet (i.e. "abra server ls" will | ||||
| not list this server)! You will need to assign a domain name record (manually | ||||
| or by using "abra record new") and add the server to your Abra configuration | ||||
| ("abra server add") to have a working server that you can deploy Co-op Cloud | ||||
| apps to. | ||||
|  | ||||
| When setting up domain name records, you probably want to set up the following | ||||
| 2 A records. This supports deploying apps to your root domain (e.g. | ||||
| example.com) and other apps on sub-domains (e.g. foo.example.com, | ||||
| bar.example.com). | ||||
|  | ||||
|     @  1800 IN A <your-capsul-ip> | ||||
|     *  1800 IN A <your-capsul-ip> | ||||
| 	`, internal.CapsulName, resp.ID, internal.CapsulInstanceURL)) | ||||
|  | ||||
| 	return nil | ||||
| } | ||||
|  | ||||
| var serverNewCommand = cli.Command{ | ||||
| 	Name:    "new", | ||||
| 	Aliases: []string{"n"}, | ||||
| 	Usage:   "Create a new server using a 3rd party provider", | ||||
| 	Description: ` | ||||
| Create a new server via a 3rd party provider. | ||||
|  | ||||
| The following providers are supported: | ||||
|  | ||||
| 		Capsul https://git.cyberia.club/Cyberia/capsul-flask | ||||
|     Hetzner Cloud https://docs.hetzner.com/cloud | ||||
|  | ||||
| You may invoke this command in "wizard" mode and be prompted for input: | ||||
|  | ||||
|     abra record new | ||||
|  | ||||
| API tokens are read from the environment if specified, e.g. | ||||
|  | ||||
|     export HCLOUD_TOKEN=... | ||||
| `, | ||||
| 	Flags: []cli.Flag{ | ||||
| 		internal.DebugFlag, | ||||
| 		internal.NoInputFlag, | ||||
| 		internal.ServerProviderFlag, | ||||
| 		internal.OfflineFlag, | ||||
|  | ||||
| 		// Capsul | ||||
| 		internal.CapsulInstanceURLFlag, | ||||
| 		internal.CapsulTypeFlag, | ||||
| 		internal.CapsulImageFlag, | ||||
| 		internal.CapsulSSHKeysFlag, | ||||
| 		internal.CapsulAPITokenFlag, | ||||
|  | ||||
| 		// Hetzner | ||||
| 		internal.HetznerCloudNameFlag, | ||||
| 		internal.HetznerCloudTypeFlag, | ||||
| 		internal.HetznerCloudImageFlag, | ||||
| 		internal.HetznerCloudSSHKeysFlag, | ||||
| 		internal.HetznerCloudLocationFlag, | ||||
| 		internal.HetznerCloudAPITokenFlag, | ||||
| 	}, | ||||
| 	Before: internal.SubCommandBefore, | ||||
| 	Action: func(c *cli.Context) error { | ||||
| 		if err := internal.EnsureServerProvider(); err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		switch internal.ServerProvider { | ||||
| 		case "capsul": | ||||
| 			if err := newCapsulVPS(c); err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
| 		case "hetzner-cloud": | ||||
| 			if err := newHetznerCloudVPS(c); err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
| 		} | ||||
|  | ||||
| 		return nil | ||||
| 	}, | ||||
| } | ||||
| @ -20,12 +20,12 @@ var allFilterFlag = &cli.BoolFlag{ | ||||
| 	Destination: &allFilter, | ||||
| } | ||||
|  | ||||
| var volunesFilter bool | ||||
| var volumesFilter bool | ||||
|  | ||||
| var volumesFilterFlag = &cli.BoolFlag{ | ||||
| 	Name:        "volumes, v", | ||||
| 	Usage:       "Prune volumes. This will remove app data, Be Careful!", | ||||
| 	Destination: &volunesFilter, | ||||
| 	Destination: &volumesFilter, | ||||
| } | ||||
|  | ||||
| var serverPruneCommand = cli.Command{ | ||||
| @ -35,7 +35,7 @@ var serverPruneCommand = cli.Command{ | ||||
| 	Description: ` | ||||
| Prunes unused containers, networks, and dangling images. | ||||
|  | ||||
| If passing "-v/--volumes" then volumes not connected with a deployed app will | ||||
| If passing "-v/--volumes" then volumes not connected to a deployed app will | ||||
| also be removed. This can result in unwanted data loss if not used carefully. | ||||
| 	`, | ||||
| 	ArgsUsage: "[<server>]", | ||||
| @ -44,12 +44,11 @@ also be removed. This can result in unwanted data loss if not used carefully. | ||||
| 		volumesFilterFlag, | ||||
| 		internal.DebugFlag, | ||||
| 		internal.OfflineFlag, | ||||
| 		internal.NoInputFlag, | ||||
| 	}, | ||||
| 	Before:       internal.SubCommandBefore, | ||||
| 	BashComplete: autocomplete.ServerNameComplete, | ||||
| 	Action: func(c *cli.Context) error { | ||||
| 		var args filters.Args | ||||
|  | ||||
| 		serverName := internal.ValidateServer(c) | ||||
|  | ||||
| 		cl, err := client.New(serverName) | ||||
| @ -57,6 +56,8 @@ also be removed. This can result in unwanted data loss if not used carefully. | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		var args filters.Args | ||||
|  | ||||
| 		ctx := context.Background() | ||||
| 		cr, err := cl.ContainersPrune(ctx, args) | ||||
| 		if err != nil { | ||||
| @ -75,6 +76,7 @@ also be removed. This can result in unwanted data loss if not used carefully. | ||||
|  | ||||
| 		pruneFilters := filters.NewArgs() | ||||
| 		if allFilter { | ||||
| 			logrus.Debugf("removing all images, not only dangling ones") | ||||
| 			pruneFilters.Add("dangling", "false") | ||||
| 		} | ||||
|  | ||||
| @ -86,7 +88,7 @@ also be removed. This can result in unwanted data loss if not used carefully. | ||||
| 		imgSpaceReclaimed := formatter.ByteCountSI(ir.SpaceReclaimed) | ||||
| 		logrus.Infof("images pruned: %d; space reclaimed: %s", len(ir.ImagesDeleted), imgSpaceReclaimed) | ||||
|  | ||||
| 		if volunesFilter { | ||||
| 		if volumesFilter { | ||||
| 			vr, err := cl.VolumesPrune(ctx, args) | ||||
| 			if err != nil { | ||||
| 				logrus.Fatal(err) | ||||
|  | ||||
| @ -1,8 +1,6 @@ | ||||
| package server | ||||
|  | ||||
| import ( | ||||
| 	"context" | ||||
| 	"fmt" | ||||
| 	"os" | ||||
| 	"path/filepath" | ||||
|  | ||||
| @ -10,168 +8,31 @@ import ( | ||||
| 	"coopcloud.tech/abra/pkg/autocomplete" | ||||
| 	"coopcloud.tech/abra/pkg/client" | ||||
| 	"coopcloud.tech/abra/pkg/config" | ||||
| 	"coopcloud.tech/abra/pkg/formatter" | ||||
| 	"github.com/AlecAivazis/survey/v2" | ||||
| 	"github.com/hetznercloud/hcloud-go/hcloud" | ||||
| 	"github.com/sirupsen/logrus" | ||||
| 	"github.com/urfave/cli" | ||||
| ) | ||||
|  | ||||
| var rmServer bool | ||||
| var rmServerFlag = &cli.BoolFlag{ | ||||
| 	Name:        "server, s", | ||||
| 	Usage:       "remove the actual server also", | ||||
| 	Destination: &rmServer, | ||||
| } | ||||
|  | ||||
| func rmHetznerCloudVPS(c *cli.Context) error { | ||||
| 	if internal.HetznerCloudName == "" && !internal.NoInput { | ||||
| 		prompt := &survey.Input{ | ||||
| 			Message: "specify hetzner cloud VPS name", | ||||
| 		} | ||||
| 		if err := survey.AskOne(prompt, &internal.HetznerCloudName); err != nil { | ||||
| 			return err | ||||
| 		} | ||||
| 	} | ||||
|  | ||||
| 	if internal.HetznerCloudAPIToken == "" && !internal.NoInput { | ||||
| 		token, ok := os.LookupEnv("HCLOUD_TOKEN") | ||||
| 		if !ok { | ||||
| 			prompt := &survey.Input{ | ||||
| 				Message: "specify hetzner cloud API token", | ||||
| 			} | ||||
| 			if err := survey.AskOne(prompt, &internal.HetznerCloudAPIToken); err != nil { | ||||
| 				return err | ||||
| 			} | ||||
| 		} else { | ||||
| 			internal.HetznerCloudAPIToken = token | ||||
| 		} | ||||
| 	} | ||||
|  | ||||
| 	client := hcloud.NewClient(hcloud.WithToken(internal.HetznerCloudAPIToken)) | ||||
|  | ||||
| 	server, _, err := client.Server.Get(context.Background(), internal.HetznerCloudName) | ||||
| 	if err != nil { | ||||
| 		return err | ||||
| 	} | ||||
|  | ||||
| 	if server == nil { | ||||
| 		logrus.Fatalf("library provider reports that %s doesn't exist?", internal.HetznerCloudName) | ||||
| 	} | ||||
|  | ||||
| 	fmt.Println(fmt.Sprintf(` | ||||
| You have requested that Abra delete the following server (%s). Please be | ||||
| absolutely sure that this is indeed the server that you would like to have | ||||
| removed. There will be no going back once you confirm, the server will be | ||||
| destroyed. | ||||
| `, server.Name)) | ||||
|  | ||||
| 	tableColumns := []string{"name", "type", "image", "location"} | ||||
| 	table := formatter.CreateTable(tableColumns) | ||||
| 	table.Append([]string{ | ||||
| 		server.Name, | ||||
| 		server.ServerType.Name, | ||||
| 		server.Image.Name, | ||||
| 		server.Datacenter.Name, | ||||
| 	}) | ||||
| 	table.Render() | ||||
|  | ||||
| 	response := false | ||||
| 	prompt := &survey.Confirm{ | ||||
| 		Message: "continue with hetzner cloud VPS removal?", | ||||
| 	} | ||||
|  | ||||
| 	if err := survey.AskOne(prompt, &response); err != nil { | ||||
| 		return err | ||||
| 	} | ||||
|  | ||||
| 	if !response { | ||||
| 		logrus.Fatal("exiting as requested") | ||||
| 	} | ||||
|  | ||||
| 	_, err = client.Server.Delete(context.Background(), server) | ||||
| 	if err != nil { | ||||
| 		return err | ||||
| 	} | ||||
|  | ||||
| 	logrus.Infof("%s has been deleted from your hetzner cloud account", internal.HetznerCloudName) | ||||
|  | ||||
| 	return nil | ||||
| } | ||||
|  | ||||
| var serverRemoveCommand = cli.Command{ | ||||
| 	Name:      "remove", | ||||
| 	Aliases:   []string{"rm"}, | ||||
| 	ArgsUsage: "[<server>]", | ||||
| 	ArgsUsage: "<server>", | ||||
| 	Usage:     "Remove a managed server", | ||||
| 	Description: ` | ||||
| Remova a server from Abra management. | ||||
| 	Description: `Remove a managed server. | ||||
|  | ||||
| Depending on whether you used a 3rd party provider to create this server ("abra | ||||
| server new"), you can also destroy the virtual server as well. Pass | ||||
| "--server/-s" to tell Abra to try to delete this VPS. | ||||
|  | ||||
| Otherwise, Abra will remove the internal bookkeeping (~/.abra/servers/...) and | ||||
| underlying client connection context. This server will then be lost in time, | ||||
| like tears in rain. | ||||
| Abra will remove the internal bookkeeping (~/.abra/servers/...) and underlying | ||||
| client connection context. This server will then be lost in time, like tears in | ||||
| rain. | ||||
| `, | ||||
| 	Flags: []cli.Flag{ | ||||
| 		internal.DebugFlag, | ||||
| 		internal.NoInputFlag, | ||||
| 		rmServerFlag, | ||||
| 		internal.ServerProviderFlag, | ||||
| 		internal.OfflineFlag, | ||||
|  | ||||
| 		// Hetzner | ||||
| 		internal.HetznerCloudNameFlag, | ||||
| 		internal.HetznerCloudAPITokenFlag, | ||||
| 	}, | ||||
| 	Before:       internal.SubCommandBefore, | ||||
| 	BashComplete: autocomplete.ServerNameComplete, | ||||
| 	Action: func(c *cli.Context) error { | ||||
| 		serverName := internal.ValidateServer(c) | ||||
|  | ||||
| 		warnMsg := `Did not pass -s/--server for actual server deletion, prompting! | ||||
|  | ||||
| Abra doesn't currently know if it helped you create this server with one of the | ||||
| 3rd party integrations (e.g. Capsul). You have a choice here to actually, | ||||
| really and finally destroy this server using those integrations. If you want to | ||||
| do this, choose Yes. | ||||
|  | ||||
| If you just want to remove the server config files & context, choose No. | ||||
| ` | ||||
|  | ||||
| 		if !rmServer { | ||||
| 			logrus.Warn(fmt.Sprintf(warnMsg)) | ||||
|  | ||||
| 			response := false | ||||
| 			prompt := &survey.Confirm{ | ||||
| 				Message: "delete actual live server?", | ||||
| 			} | ||||
| 			if err := survey.AskOne(prompt, &response); err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
| 			if response { | ||||
| 				logrus.Info("setting -s/--server and attempting to remove actual server") | ||||
| 				rmServer = true | ||||
| 			} | ||||
| 		} | ||||
|  | ||||
| 		if rmServer { | ||||
| 			if err := internal.EnsureServerProvider(); err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
|  | ||||
| 			switch internal.ServerProvider { | ||||
| 			case "capsul": | ||||
| 				logrus.Warn("capsul provider does not support automatic removal yet, sorry!") | ||||
| 			case "hetzner-cloud": | ||||
| 				if err := rmHetznerCloudVPS(c); err != nil { | ||||
| 					logrus.Fatal(err) | ||||
| 				} | ||||
| 			} | ||||
| 		} | ||||
|  | ||||
| 		if err := client.DeleteContext(serverName); err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| @ -9,16 +9,7 @@ var ServerCommand = cli.Command{ | ||||
| 	Name:    "server", | ||||
| 	Aliases: []string{"s"}, | ||||
| 	Usage:   "Manage servers", | ||||
| 	Description: ` | ||||
| Create, manage and remove servers using 3rd party integrations.  | ||||
|  | ||||
| Servers can be created from scratch using the "abra server new" command. If you | ||||
| already have a server, you can add it to your configuration using "abra server | ||||
| add". Abra can provision servers so that they are ready to deploy Co-op Cloud | ||||
| recipes, see available flags on "abra server add" for more. | ||||
| `, | ||||
| 	Subcommands: []cli.Command{ | ||||
| 		serverNewCommand, | ||||
| 		serverAddCommand, | ||||
| 		serverListCommand, | ||||
| 		serverRemoveCommand, | ||||
|  | ||||
| @ -12,7 +12,6 @@ import ( | ||||
| 	"coopcloud.tech/abra/pkg/config" | ||||
| 	"coopcloud.tech/abra/pkg/lint" | ||||
| 	"coopcloud.tech/abra/pkg/recipe" | ||||
| 	"coopcloud.tech/abra/pkg/runtime" | ||||
| 	"coopcloud.tech/abra/pkg/upstream/convert" | ||||
| 	"coopcloud.tech/abra/pkg/upstream/stack" | ||||
| 	"coopcloud.tech/tagcmp" | ||||
| @ -58,8 +57,6 @@ catalogue. If a new patch/minor version is available, a notification is | ||||
| printed. To include major versions use the --major flag. | ||||
| `, | ||||
| 	Action: func(c *cli.Context) error { | ||||
| 		conf := runtime.New(runtime.WithOffline(internal.Offline)) | ||||
|  | ||||
| 		cl, err := client.New("default") | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| @ -78,7 +75,7 @@ printed. To include major versions use the --major flag. | ||||
| 			} | ||||
|  | ||||
| 			if recipeName != "" { | ||||
| 				_, err = getLatestUpgrade(cl, stackName, recipeName, conf) | ||||
| 				_, err = getLatestUpgrade(cl, stackName, recipeName) | ||||
| 				if err != nil { | ||||
| 					logrus.Fatal(err) | ||||
| 				} | ||||
| @ -113,8 +110,6 @@ break things. Only apps that are not deployed with "--chaos" are upgraded, to | ||||
| update chaos deployments use the "--chaos" flag. Use it with care. | ||||
| `, | ||||
| 	Action: func(c *cli.Context) error { | ||||
| 		conf := runtime.New(runtime.WithOffline(internal.Offline)) | ||||
|  | ||||
| 		cl, err := client.New("default") | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| @ -123,7 +118,7 @@ update chaos deployments use the "--chaos" flag. Use it with care. | ||||
| 		if !updateAll { | ||||
| 			stackName := c.Args().Get(0) | ||||
| 			recipeName := c.Args().Get(1) | ||||
| 			err = tryUpgrade(cl, stackName, recipeName, conf) | ||||
| 			err = tryUpgrade(cl, stackName, recipeName) | ||||
| 			if err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
| @ -143,7 +138,7 @@ update chaos deployments use the "--chaos" flag. Use it with care. | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
|  | ||||
| 			err = tryUpgrade(cl, stackName, recipeName, conf) | ||||
| 			err = tryUpgrade(cl, stackName, recipeName) | ||||
| 			if err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
| @ -227,14 +222,13 @@ func getEnv(cl *dockerclient.Client, stackName string) (config.AppEnv, error) { | ||||
|  | ||||
| // getLatestUpgrade returns the latest available version for an app respecting | ||||
| // the "--major" flag if it is newer than the currently deployed version. | ||||
| func getLatestUpgrade(cl *dockerclient.Client, stackName string, | ||||
| 	recipeName string, conf *runtime.Config) (string, error) { | ||||
| func getLatestUpgrade(cl *dockerclient.Client, stackName string, recipeName string) (string, error) { | ||||
| 	deployedVersion, err := getDeployedVersion(cl, stackName, recipeName) | ||||
| 	if err != nil { | ||||
| 		return "", err | ||||
| 	} | ||||
|  | ||||
| 	availableUpgrades, err := getAvailableUpgrades(cl, stackName, recipeName, deployedVersion, conf) | ||||
| 	availableUpgrades, err := getAvailableUpgrades(cl, stackName, recipeName, deployedVersion) | ||||
| 	if err != nil { | ||||
| 		return "", err | ||||
| 	} | ||||
| @ -277,8 +271,8 @@ func getDeployedVersion(cl *dockerclient.Client, stackName string, recipeName st | ||||
| // than the deployed version. It only includes major upgrades if the "--major" | ||||
| // flag is set. | ||||
| func getAvailableUpgrades(cl *dockerclient.Client, stackName string, recipeName string, | ||||
| 	deployedVersion string, conf *runtime.Config) ([]string, error) { | ||||
| 	catl, err := recipe.ReadRecipeCatalogue(conf) | ||||
| 	deployedVersion string) ([]string, error) { | ||||
| 	catl, err := recipe.ReadRecipeCatalogue(internal.Offline) | ||||
| 	if err != nil { | ||||
| 		return nil, err | ||||
| 	} | ||||
| @ -322,12 +316,12 @@ func getAvailableUpgrades(cl *dockerclient.Client, stackName string, recipeName | ||||
|  | ||||
| // processRecipeRepoVersion clones, pulls, checks out the version and lints the | ||||
| // recipe repository. | ||||
| func processRecipeRepoVersion(recipeName, version string, conf *runtime.Config) error { | ||||
| 	if err := recipe.EnsureExists(recipeName, conf); err != nil { | ||||
| func processRecipeRepoVersion(recipeName, version string) error { | ||||
| 	if err := recipe.EnsureExists(recipeName); err != nil { | ||||
| 		return err | ||||
| 	} | ||||
|  | ||||
| 	if err := recipe.EnsureUpToDate(recipeName, conf); err != nil { | ||||
| 	if err := recipe.EnsureUpToDate(recipeName); err != nil { | ||||
| 		return err | ||||
| 	} | ||||
|  | ||||
| @ -335,7 +329,7 @@ func processRecipeRepoVersion(recipeName, version string, conf *runtime.Config) | ||||
| 		return err | ||||
| 	} | ||||
|  | ||||
| 	if r, err := recipe.Get(recipeName, conf); err != nil { | ||||
| 	if r, err := recipe.Get(recipeName, internal.Offline); err != nil { | ||||
| 		return err | ||||
| 	} else if err := lint.LintForErrors(r); err != nil { | ||||
| 		return err | ||||
| @ -370,7 +364,7 @@ func createDeployConfig(recipeName string, stackName string, env config.AppEnv) | ||||
| 		ResolveImage: stack.ResolveImageAlways, | ||||
| 	} | ||||
|  | ||||
| 	composeFiles, err := config.GetAppComposeFiles(recipeName, env) | ||||
| 	composeFiles, err := config.GetComposeFiles(recipeName, env) | ||||
| 	if err != nil { | ||||
| 		return nil, deployOpts, err | ||||
| 	} | ||||
| @ -392,7 +386,7 @@ func createDeployConfig(recipeName string, stackName string, env config.AppEnv) | ||||
| } | ||||
|  | ||||
| // tryUpgrade performs the upgrade if all the requirements are fulfilled. | ||||
| func tryUpgrade(cl *dockerclient.Client, stackName, recipeName string, conf *runtime.Config) error { | ||||
| func tryUpgrade(cl *dockerclient.Client, stackName, recipeName string) error { | ||||
| 	if recipeName == "" { | ||||
| 		logrus.Debugf("don't update %s due to missing recipe name", stackName) | ||||
| 		return nil | ||||
| @ -418,7 +412,7 @@ func tryUpgrade(cl *dockerclient.Client, stackName, recipeName string, conf *run | ||||
| 		return nil | ||||
| 	} | ||||
|  | ||||
| 	upgradeVersion, err := getLatestUpgrade(cl, stackName, recipeName, conf) | ||||
| 	upgradeVersion, err := getLatestUpgrade(cl, stackName, recipeName) | ||||
| 	if err != nil { | ||||
| 		return err | ||||
| 	} | ||||
| @ -428,14 +422,14 @@ func tryUpgrade(cl *dockerclient.Client, stackName, recipeName string, conf *run | ||||
| 		return nil | ||||
| 	} | ||||
|  | ||||
| 	err = upgrade(cl, stackName, recipeName, upgradeVersion, conf) | ||||
| 	err = upgrade(cl, stackName, recipeName, upgradeVersion) | ||||
|  | ||||
| 	return err | ||||
| } | ||||
|  | ||||
| // upgrade performs all necessary steps to upgrade an app. | ||||
| func upgrade(cl *dockerclient.Client, stackName, recipeName, | ||||
| 	upgradeVersion string, conf *runtime.Config) error { | ||||
| 	upgradeVersion string) error { | ||||
| 	env, err := getEnv(cl, stackName) | ||||
| 	if err != nil { | ||||
| 		return err | ||||
| @ -448,7 +442,7 @@ func upgrade(cl *dockerclient.Client, stackName, recipeName, | ||||
| 		Env:    env, | ||||
| 	} | ||||
|  | ||||
| 	if err = processRecipeRepoVersion(recipeName, upgradeVersion, conf); err != nil { | ||||
| 	if err = processRecipeRepoVersion(recipeName, upgradeVersion); err != nil { | ||||
| 		return err | ||||
| 	} | ||||
|  | ||||
|  | ||||
							
								
								
									
										98
									
								
								go.mod
									
									
									
									
									
								
							
							
						
						
									
										98
									
								
								go.mod
									
									
									
									
									
								
							| @ -1,28 +1,98 @@ | ||||
| module coopcloud.tech/abra | ||||
|  | ||||
| go 1.16 | ||||
| go 1.21 | ||||
|  | ||||
| require ( | ||||
| 	coopcloud.tech/tagcmp v0.0.0-20211103052201-885b22f77d52 | ||||
| 	git.coopcloud.tech/coop-cloud/godotenv v1.5.2-0.20231130100509-01bff8284355 | ||||
| 	github.com/AlecAivazis/survey/v2 v2.3.7 | ||||
| 	github.com/Autonomic-Cooperative/godotenv v1.3.1-0.20210731094149-b031ea1211e7 | ||||
| 	github.com/Gurpartap/logrus-stack v0.0.0-20170710170904-89c00d8a28f4 | ||||
| 	github.com/docker/cli v24.0.5+incompatible | ||||
| 	github.com/docker/distribution v2.8.2+incompatible | ||||
| 	github.com/docker/docker v24.0.5+incompatible | ||||
| 	github.com/docker/cli v24.0.7+incompatible | ||||
| 	github.com/docker/distribution v2.8.3+incompatible | ||||
| 	github.com/docker/docker v24.0.7+incompatible | ||||
| 	github.com/docker/go-units v0.5.0 | ||||
| 	github.com/go-git/go-git/v5 v5.8.0 | ||||
| 	github.com/go-git/go-git/v5 v5.10.0 | ||||
| 	github.com/google/go-cmp v0.5.9 | ||||
| 	github.com/moby/sys/signal v0.7.0 | ||||
| 	github.com/moby/term v0.5.0 | ||||
| 	github.com/olekukonko/tablewriter v0.0.5 | ||||
| 	github.com/pkg/errors v0.9.1 | ||||
| 	github.com/schollz/progressbar/v3 v3.13.1 | ||||
| 	github.com/schollz/progressbar/v3 v3.14.1 | ||||
| 	github.com/sirupsen/logrus v1.9.3 | ||||
| 	gotest.tools/v3 v3.5.0 | ||||
| 	gotest.tools/v3 v3.5.1 | ||||
| ) | ||||
|  | ||||
| require ( | ||||
| 	dario.cat/mergo v1.0.0 // indirect | ||||
| 	github.com/Azure/go-ansiterm v0.0.0-20210617225240-d185dfc1b5a1 // indirect | ||||
| 	github.com/BurntSushi/toml v1.0.0 // indirect | ||||
| 	github.com/Microsoft/go-winio v0.6.1 // indirect | ||||
| 	github.com/Microsoft/hcsshim v0.9.2 // indirect | ||||
| 	github.com/ProtonMail/go-crypto v0.0.0-20230828082145-3c4c8a2d2371 // indirect | ||||
| 	github.com/acomagu/bufpipe v1.0.4 // indirect | ||||
| 	github.com/beorn7/perks v1.0.1 // indirect | ||||
| 	github.com/cespare/xxhash/v2 v2.2.0 // indirect | ||||
| 	github.com/cloudflare/circl v1.3.3 // indirect | ||||
| 	github.com/cpuguy83/go-md2man/v2 v2.0.1 // indirect | ||||
| 	github.com/cyphar/filepath-securejoin v0.2.4 // indirect | ||||
| 	github.com/davecgh/go-spew v1.1.1 // indirect | ||||
| 	github.com/distribution/reference v0.5.0 // indirect | ||||
| 	github.com/docker/go v1.5.1-1.0.20160303222718-d30aec9fd63c // indirect | ||||
| 	github.com/docker/go-connections v0.4.0 // indirect | ||||
| 	github.com/docker/go-metrics v0.0.1 // indirect | ||||
| 	github.com/docker/libtrust v0.0.0-20160708172513-aabc10ec26b7 // indirect | ||||
| 	github.com/emirpasic/gods v1.18.1 // indirect | ||||
| 	github.com/ghodss/yaml v1.0.0 // indirect | ||||
| 	github.com/go-git/gcfg v1.5.1-0.20230307220236-3a3c6141e376 // indirect | ||||
| 	github.com/go-git/go-billy/v5 v5.5.0 // indirect | ||||
| 	github.com/gogo/protobuf v1.3.2 // indirect | ||||
| 	github.com/golang/groupcache v0.0.0-20210331224755-41bb18bfe9da // indirect | ||||
| 	github.com/golang/protobuf v1.5.3 // indirect | ||||
| 	github.com/hashicorp/go-cleanhttp v0.5.2 // indirect | ||||
| 	github.com/imdario/mergo v0.3.12 // indirect | ||||
| 	github.com/inconshreveable/mousetrap v1.0.0 // indirect | ||||
| 	github.com/jbenet/go-context v0.0.0-20150711004518-d14ea06fba99 // indirect | ||||
| 	github.com/kballard/go-shellquote v0.0.0-20180428030007-95032a82bc51 // indirect | ||||
| 	github.com/kevinburke/ssh_config v1.2.0 // indirect | ||||
| 	github.com/klauspost/compress v1.14.2 // indirect | ||||
| 	github.com/mattn/go-colorable v0.1.12 // indirect | ||||
| 	github.com/mattn/go-isatty v0.0.20 // indirect | ||||
| 	github.com/mattn/go-runewidth v0.0.14 // indirect | ||||
| 	github.com/matttproud/golang_protobuf_extensions v1.0.4 // indirect | ||||
| 	github.com/mgutz/ansi v0.0.0-20170206155736-9520e82c474b // indirect | ||||
| 	github.com/miekg/pkcs11 v1.0.3 // indirect | ||||
| 	github.com/mitchellh/colorstring v0.0.0-20190213212951-d06e56a500db // indirect | ||||
| 	github.com/mitchellh/mapstructure v1.4.3 // indirect | ||||
| 	github.com/morikuni/aec v1.0.0 // indirect | ||||
| 	github.com/opencontainers/go-digest v1.0.0 // indirect | ||||
| 	github.com/opencontainers/runc v1.1.0 // indirect | ||||
| 	github.com/pjbgf/sha1cd v0.3.0 // indirect | ||||
| 	github.com/pmezard/go-difflib v1.0.0 // indirect | ||||
| 	github.com/prometheus/client_model v0.3.0 // indirect | ||||
| 	github.com/prometheus/common v0.42.0 // indirect | ||||
| 	github.com/prometheus/procfs v0.10.1 // indirect | ||||
| 	github.com/rivo/uniseg v0.4.4 // indirect | ||||
| 	github.com/russross/blackfriday/v2 v2.1.0 // indirect | ||||
| 	github.com/skeema/knownhosts v1.2.0 // indirect | ||||
| 	github.com/spf13/pflag v1.0.5 // indirect | ||||
| 	github.com/xanzy/ssh-agent v0.3.3 // indirect | ||||
| 	github.com/xeipuuv/gojsonreference v0.0.0-20180127040603-bd5ef7bd5415 // indirect | ||||
| 	github.com/xeipuuv/gojsonschema v1.2.0 // indirect | ||||
| 	golang.org/x/crypto v0.14.0 // indirect | ||||
| 	golang.org/x/mod v0.12.0 // indirect | ||||
| 	golang.org/x/net v0.17.0 // indirect | ||||
| 	golang.org/x/sync v0.3.0 // indirect | ||||
| 	golang.org/x/term v0.14.0 // indirect | ||||
| 	golang.org/x/text v0.13.0 // indirect | ||||
| 	golang.org/x/time v0.0.0-20200630173020-3af7569d3a1e // indirect | ||||
| 	golang.org/x/tools v0.13.0 // indirect | ||||
| 	google.golang.org/protobuf v1.30.0 // indirect | ||||
| 	gopkg.in/warnings.v0 v0.1.2 // indirect | ||||
| 	gopkg.in/yaml.v2 v2.4.0 // indirect | ||||
| 	gopkg.in/yaml.v3 v3.0.1 // indirect | ||||
| ) | ||||
|  | ||||
| require ( | ||||
| 	coopcloud.tech/libcapsul v0.0.0-20230605070824-878af473f07b | ||||
| 	github.com/AdaLogics/go-fuzz-headers v0.0.0-20230106234847-43070de90fa1 // indirect | ||||
| 	github.com/buger/goterm v1.0.4 | ||||
| 	github.com/containerd/containerd v1.5.9 // indirect | ||||
| @ -34,19 +104,17 @@ require ( | ||||
| 	github.com/fvbommel/sortorder v1.0.2 // indirect | ||||
| 	github.com/google/shlex v0.0.0-20191202100458-e7afc7fbc510 // indirect | ||||
| 	github.com/gorilla/mux v1.8.0 // indirect | ||||
| 	github.com/hashicorp/go-retryablehttp v0.7.4 | ||||
| 	github.com/hetznercloud/hcloud-go v1.48.0 | ||||
| 	github.com/hashicorp/go-retryablehttp v0.7.5 | ||||
| 	github.com/klauspost/pgzip v1.2.6 | ||||
| 	github.com/libdns/gandi v1.0.2 | ||||
| 	github.com/libdns/libdns v0.2.1 | ||||
| 	github.com/moby/patternmatcher v0.5.0 // indirect | ||||
| 	github.com/moby/sys/sequential v0.5.0 // indirect | ||||
| 	github.com/opencontainers/image-spec v1.0.3-0.20211202193544-a5463b7f9c84 // indirect | ||||
| 	github.com/rogpeppe/go-internal v1.11.0 // indirect | ||||
| 	github.com/prometheus/client_golang v1.16.0 // indirect | ||||
| 	github.com/sergi/go-diff v1.2.0 // indirect | ||||
| 	github.com/spf13/cobra v1.3.0 // indirect | ||||
| 	github.com/stretchr/testify v1.8.4 | ||||
| 	github.com/theupdateframework/notary v0.7.0 // indirect | ||||
| 	github.com/urfave/cli v1.22.9 | ||||
| 	github.com/xeipuuv/gojsonpointer v0.0.0-20190809123943-df4f5c81cb3b // indirect | ||||
| 	golang.org/x/sys v0.10.0 | ||||
| 	golang.org/x/sys v0.14.0 | ||||
| ) | ||||
|  | ||||
							
								
								
									
										187
									
								
								go.sum
									
									
									
									
									
								
							
							
						
						
									
										187
									
								
								go.sum
									
									
									
									
									
								
							| @ -34,7 +34,6 @@ cloud.google.com/go/bigquery v1.4.0/go.mod h1:S8dzgnTigyfTmLBfrtrhyYhwRxG72rYxvf | ||||
| cloud.google.com/go/bigquery v1.5.0/go.mod h1:snEHRnqQbz117VIFhE8bmtwIDY80NLUZUMb4Nv6dBIg= | ||||
| cloud.google.com/go/bigquery v1.7.0/go.mod h1://okPTzCYNXSlb24MZs83e2Do+h+VXtc4gLoIoXIAPc= | ||||
| cloud.google.com/go/bigquery v1.8.0/go.mod h1:J5hqkt3O0uAFnINi6JXValWIb1v0goeZM77hZzJN/fQ= | ||||
| cloud.google.com/go/compute/metadata v0.2.0/go.mod h1:zFmK7XCadkQkj6TtorcaGlCW1hT1fIilQDwofLpJ20k= | ||||
| cloud.google.com/go/datastore v1.0.0/go.mod h1:LXYbyblFSglQ5pkeyhO+Qmw7ukd3C+pD7TKLgZqpHYE= | ||||
| cloud.google.com/go/datastore v1.1.0/go.mod h1:umbIZjpQpHh4hmRpGhH4tLFup+FVzqBi1b3c64qFpCk= | ||||
| cloud.google.com/go/firestore v1.6.1/go.mod h1:asNXNOzBdyVQmEU+ggO8UPodTkEVFW5Qx+rwHnAz+EY= | ||||
| @ -47,17 +46,17 @@ cloud.google.com/go/storage v1.5.0/go.mod h1:tpKbwo567HUNpVclU5sGELwQWBDZ8gh0Zeo | ||||
| cloud.google.com/go/storage v1.6.0/go.mod h1:N7U0C8pVQ/+NIKOBQyamJIeKQKkZ+mxpohlUTyfDhBk= | ||||
| cloud.google.com/go/storage v1.8.0/go.mod h1:Wv1Oy7z6Yz3DshWRJFhqM/UCfaWIRTdp0RXyy7KQOVs= | ||||
| cloud.google.com/go/storage v1.10.0/go.mod h1:FLPqc6j+Ki4BU591ie1oL6qBQGu2Bl/tZ9ullr3+Kg0= | ||||
| coopcloud.tech/libcapsul v0.0.0-20230605070824-878af473f07b h1:ORxAmzrd6SSlSGm/RdPM2TSTTe5+QWp7rqzjEY/pIKA= | ||||
| coopcloud.tech/libcapsul v0.0.0-20230605070824-878af473f07b/go.mod h1:6u7ekg+v+yL07QtU7E+K+WqK9LKDDqTF4s+PrIXZ+QM= | ||||
| coopcloud.tech/tagcmp v0.0.0-20211103052201-885b22f77d52 h1:cyFFOl0tKe+dVHt8saejG8xoff33eQiHxFCVzRpPUjM= | ||||
| coopcloud.tech/tagcmp v0.0.0-20211103052201-885b22f77d52/go.mod h1:ESVm0wQKcbcFi06jItF3rI7enf4Jt2PvbkWpDDHk1DQ= | ||||
| dario.cat/mergo v1.0.0 h1:AGCNq9Evsj31mOgNPcLyXc+4PNABt905YmuqPYYpBWk= | ||||
| dario.cat/mergo v1.0.0/go.mod h1:uNxQE+84aUszobStD9th8a29P2fMDhsBdgRYvZOxGmk= | ||||
| dmitri.shuralyov.com/gpu/mtl v0.0.0-20190408044501-666a987793e9/go.mod h1:H6x//7gZCb22OMCxBHrMx7a5I7Hp++hsVxbQ4BYO7hU= | ||||
| git.coopcloud.tech/coop-cloud/godotenv v1.5.2-0.20231130100509-01bff8284355 h1:tCv2B4qoN6RMheKDnCzIafOkWS5BB1h7hwhmo+9bVeE= | ||||
| git.coopcloud.tech/coop-cloud/godotenv v1.5.2-0.20231130100509-01bff8284355/go.mod h1:Q8V1zbtPAlzYSr/Dvky3wS6x58IQAl3rot2me1oSO2Q= | ||||
| github.com/AdaLogics/go-fuzz-headers v0.0.0-20230106234847-43070de90fa1 h1:EKPd1INOIyr5hWOWhvpmQpY6tKjeG0hT1s3AMC/9fic= | ||||
| github.com/AdaLogics/go-fuzz-headers v0.0.0-20230106234847-43070de90fa1/go.mod h1:VzwV+t+dZ9j/H867F1M2ziD+yLHtB46oM35FxxMJ4d0= | ||||
| github.com/AlecAivazis/survey/v2 v2.3.7 h1:6I/u8FvytdGsgonrYsVn2t8t4QiRnh6QSTqkkhIiSjQ= | ||||
| github.com/AlecAivazis/survey/v2 v2.3.7/go.mod h1:xUTIdE4KCOIjsBAE1JYsUPoCqYdZ1reCfTwbto0Fduo= | ||||
| github.com/Autonomic-Cooperative/godotenv v1.3.1-0.20210731094149-b031ea1211e7 h1:asQtdXYbxEYWcwAQqJTVYC/RltB4eqoWKvqWg/LFPOg= | ||||
| github.com/Autonomic-Cooperative/godotenv v1.3.1-0.20210731094149-b031ea1211e7/go.mod h1:oZRCMMRS318l07ei4DTqbZoOawfJlJ4yyo8juk2v4Rk= | ||||
| github.com/Azure/azure-sdk-for-go v16.2.1+incompatible/go.mod h1:9XXNKU+eRnpl9moKnB4QOLf1HestfXbmab5FXxiDBjc= | ||||
| github.com/Azure/go-ansiterm v0.0.0-20170929234023-d6e3b3328b78/go.mod h1:LmzpDX56iTiv29bbRTIsUNlaFfuhWRQBWjQdVyAevI8= | ||||
| github.com/Azure/go-ansiterm v0.0.0-20210617225240-d185dfc1b5a1 h1:UQHMgLO+TxOElx5B5HZ4hJQsoJ/PvUvKRhJHDQXO8P8= | ||||
| @ -88,8 +87,9 @@ github.com/Microsoft/go-winio v0.4.17-0.20210211115548-6eac466e5fa3/go.mod h1:JP | ||||
| github.com/Microsoft/go-winio v0.4.17-0.20210324224401-5516f17a5958/go.mod h1:JPGBdM1cNvN/6ISo+n8V5iA4v8pBzdOpzfwIujj1a84= | ||||
| github.com/Microsoft/go-winio v0.4.17/go.mod h1:JPGBdM1cNvN/6ISo+n8V5iA4v8pBzdOpzfwIujj1a84= | ||||
| github.com/Microsoft/go-winio v0.5.1/go.mod h1:JPGBdM1cNvN/6ISo+n8V5iA4v8pBzdOpzfwIujj1a84= | ||||
| github.com/Microsoft/go-winio v0.5.2 h1:a9IhgEQBCUEk6QCdml9CiJGhAws+YwffDHEMp1VMrpA= | ||||
| github.com/Microsoft/go-winio v0.5.2/go.mod h1:WpS1mjBmmwHBEWmogvA2mj8546UReBk4v8QkMxJ6pZY= | ||||
| github.com/Microsoft/go-winio v0.6.1 h1:9/kr64B9VUZrLm5YYwbGtUJnMgqWVOdUAXu6Migciow= | ||||
| github.com/Microsoft/go-winio v0.6.1/go.mod h1:LRdKpFKfdobln8UmuiYcKPot9D2v6svN5+sAH+4kjUM= | ||||
| github.com/Microsoft/hcsshim v0.8.6/go.mod h1:Op3hHsoHPAvb6lceZHDtd9OkTew38wNoXnJs8iY7rUg= | ||||
| github.com/Microsoft/hcsshim v0.8.7-0.20190325164909-8abdbb8205e4/go.mod h1:Op3hHsoHPAvb6lceZHDtd9OkTew38wNoXnJs8iY7rUg= | ||||
| github.com/Microsoft/hcsshim v0.8.7/go.mod h1:OHd7sQqRFrYd3RmSgbgji+ctCwkbq2wbEYNSzOYtcBQ= | ||||
| @ -107,8 +107,8 @@ github.com/NYTimes/gziphandler v0.0.0-20170623195520-56545f4a5d46/go.mod h1:3wb0 | ||||
| github.com/Netflix/go-expect v0.0.0-20220104043353-73e0943537d2 h1:+vx7roKuyA63nhn5WAunQHLTznkw5W8b1Xc0dNjp83s= | ||||
| github.com/Netflix/go-expect v0.0.0-20220104043353-73e0943537d2/go.mod h1:HBCaDeC1lPdgDeDbhX8XFpy1jqjK0IBG8W5K+xYqA0w= | ||||
| github.com/OneOfOne/xxhash v1.2.2/go.mod h1:HSdplMjZKSmBqAxg5vPj2TmRDmfkzw+cTzAElWljhcU= | ||||
| github.com/ProtonMail/go-crypto v0.0.0-20230518184743-7afd39499903 h1:ZK3C5DtzV2nVAQTx5S5jQvMeDqWtD1By5mOoyY/xJek= | ||||
| github.com/ProtonMail/go-crypto v0.0.0-20230518184743-7afd39499903/go.mod h1:8TI4H3IbrackdNgv+92dI+rhpCaLqM0IfpgCgenFvRE= | ||||
| github.com/ProtonMail/go-crypto v0.0.0-20230828082145-3c4c8a2d2371 h1:kkhsdkhsCvIsutKu5zLMgWtgh9YxGCNAw8Ad8hjwfYg= | ||||
| github.com/ProtonMail/go-crypto v0.0.0-20230828082145-3c4c8a2d2371/go.mod h1:EjAoLdwvbIOoOQr3ihjnSoLZRtE8azugULFRteWMNc0= | ||||
| github.com/PuerkitoBio/purell v1.0.0/go.mod h1:c11w/QuzBsJSee3cPx9rAFu61PvFxuPbtSwDGJws/X0= | ||||
| github.com/PuerkitoBio/purell v1.1.1/go.mod h1:c11w/QuzBsJSee3cPx9rAFu61PvFxuPbtSwDGJws/X0= | ||||
| github.com/PuerkitoBio/urlesc v0.0.0-20160726150825-5bd2802263f2/go.mod h1:uGdkoq3SwY9Y+13GIhn11/XLaGBb4BfwItxLd5jeuXE= | ||||
| @ -118,13 +118,10 @@ github.com/Shopify/logrus-bugsnag v0.0.0-20171204204709-577dee27f20d h1:UrqY+r/O | ||||
| github.com/Shopify/logrus-bugsnag v0.0.0-20171204204709-577dee27f20d/go.mod h1:HI8ITrYtUY+O+ZhtlqUnD8+KwNPOyugEhfP9fdUIaEQ= | ||||
| github.com/acomagu/bufpipe v1.0.4 h1:e3H4WUzM3npvo5uv95QuJM3cQspFNtFBzvJ2oNjKIDQ= | ||||
| github.com/acomagu/bufpipe v1.0.4/go.mod h1:mxdxdup/WdsKVreO5GpW4+M/1CE2sMG4jeGJ2sYmHc4= | ||||
| github.com/alecthomas/kingpin/v2 v2.3.1/go.mod h1:oYL5vtsvEHZGHxU7DMp32Dvx+qL+ptGn6lWaot2vCNE= | ||||
| github.com/alecthomas/template v0.0.0-20160405071501-a0175ee3bccc/go.mod h1:LOuyumcjzFXgccqObfd/Ljyb9UuFJ6TxHnclSeseNhc= | ||||
| github.com/alecthomas/template v0.0.0-20190718012654-fb15b899a751/go.mod h1:LOuyumcjzFXgccqObfd/Ljyb9UuFJ6TxHnclSeseNhc= | ||||
| github.com/alecthomas/units v0.0.0-20151022065526-2efee857e7cf/go.mod h1:ybxpYRFXyAe+OPACYpWeL0wqObRcbAqCMya13uyzqw0= | ||||
| github.com/alecthomas/units v0.0.0-20190717042225-c3de453c63f4/go.mod h1:ybxpYRFXyAe+OPACYpWeL0wqObRcbAqCMya13uyzqw0= | ||||
| github.com/alecthomas/units v0.0.0-20190924025748-f65c72e2690d/go.mod h1:rBZYJk541a8SKzHPHnH3zbiI+7dagKZ0cgpgrD7Fyho= | ||||
| github.com/alecthomas/units v0.0.0-20211218093645-b94a6e3cc137/go.mod h1:OMCwj8VM1Kc9e19TLln2VL61YJF0x1XFtfdL4JdbSyE= | ||||
| github.com/alexflint/go-filemutex v0.0.0-20171022225611-72bdc8eae2ae/go.mod h1:CgnQgUtFrFz9mxFNtED3jI5tLDjKlOM+oUF/sTk6ps0= | ||||
| github.com/anmitsu/go-shlex v0.0.0-20200514113438-38f4b401e2be h1:9AeTilPcZAjCFIImctFaOjnTIavg87rW78vTPkQqLI8= | ||||
| github.com/anmitsu/go-shlex v0.0.0-20200514113438-38f4b401e2be/go.mod h1:ySMOLuWl6zY27l47sB3qLNK6tF2fkHG55UZxx8oIVo4= | ||||
| @ -163,12 +160,10 @@ github.com/bugsnag/osext v0.0.0-20130617224835-0dd3f918b21b h1:otBG+dV+YK+Soembj | ||||
| github.com/bugsnag/osext v0.0.0-20130617224835-0dd3f918b21b/go.mod h1:obH5gd0BsqsP2LwDJ9aOkm/6J86V6lyAXCoQWGw3K50= | ||||
| github.com/bugsnag/panicwrap v0.0.0-20151223152923-e2c28503fcd0 h1:nvj0OLI3YqYXer/kZD8Ri1aaunCxIEsOst1BVJswV0o= | ||||
| github.com/bugsnag/panicwrap v0.0.0-20151223152923-e2c28503fcd0/go.mod h1:D/8v3kj0zr8ZAKg1AQ6crr+5VwKN5eIywRkfhyM/+dE= | ||||
| github.com/bwesterb/go-ristretto v1.2.0/go.mod h1:fUIoIZaG73pV5biE2Blr2xEzDoMj7NFEuV9ekS419A0= | ||||
| github.com/bwesterb/go-ristretto v1.2.3/go.mod h1:fUIoIZaG73pV5biE2Blr2xEzDoMj7NFEuV9ekS419A0= | ||||
| github.com/cenkalti/backoff/v4 v4.1.1/go.mod h1:scbssz8iZGpm3xbr14ovlUdkxfGXNInqkPWOWmG2CLw= | ||||
| github.com/census-instrumentation/opencensus-proto v0.2.1/go.mod h1:f6KPmirojxKA12rnyqOA5BBL4O983OfeGPqjHWSTneU= | ||||
| github.com/census-instrumentation/opencensus-proto v0.3.0/go.mod h1:f6KPmirojxKA12rnyqOA5BBL4O983OfeGPqjHWSTneU= | ||||
| github.com/cespare/xxhash v1.1.0 h1:a6HrQnmkObjyL+Gs60czilIUGqrzKutQD6XZog3p+ko= | ||||
| github.com/cespare/xxhash v1.1.0/go.mod h1:XrSqR1VqqWfGrhpAt58auRo0WTKS1nRRg3ghfAqPWnc= | ||||
| github.com/cespare/xxhash/v2 v2.1.1/go.mod h1:VGX0DQ3Q6kWi7AoAeZDth3/j3BFtOZR5XLFGgcrjCOs= | ||||
| github.com/cespare/xxhash/v2 v2.1.2/go.mod h1:VGX0DQ3Q6kWi7AoAeZDth3/j3BFtOZR5XLFGgcrjCOs= | ||||
| @ -191,7 +186,6 @@ github.com/circonus-labs/circonusllhist v0.1.3/go.mod h1:kMXHVDlOchFAehlya5ePtbp | ||||
| github.com/client9/misspell v0.3.4/go.mod h1:qj6jICC3Q7zFZvVWo7KLAzC3yx5G7kyvSDkc90ppPyw= | ||||
| github.com/cloudflare/cfssl v0.0.0-20180223231731-4e2dcbde5004 h1:lkAMpLVBDaj17e85keuznYcH5rqI438v41pKcBl4ZxQ= | ||||
| github.com/cloudflare/cfssl v0.0.0-20180223231731-4e2dcbde5004/go.mod h1:yMWuSON2oQp+43nFtAV/uvKQIFpSPerB57DCt9t8sSA= | ||||
| github.com/cloudflare/circl v1.1.0/go.mod h1:prBCrKB9DV4poKZY1l9zBXg2QJY7mvgRvtMxxK7fi4I= | ||||
| github.com/cloudflare/circl v1.3.3 h1:fE/Qz0QdIGqeWfnwq0RE0R7MI51s0M2E4Ga9kq5AEMs= | ||||
| github.com/cloudflare/circl v1.3.3/go.mod h1:5XYMA4rFBvNIrhs50XuiBJ15vF2pZn4nnUKZrLbUZFA= | ||||
| github.com/cncf/udpa/go v0.0.0-20191209042840-269d4d468f6f/go.mod h1:M8M6+tZqaGXZJjfX53e64911xZQV5JYwmTeXPW+k8Sc= | ||||
| @ -323,8 +317,9 @@ github.com/creack/pty v1.1.17/go.mod h1:MOBLtS5ELjhRRrroQr9kyvTxUAFNvYEK993ew/Vr | ||||
| github.com/creack/pty v1.1.18 h1:n56/Zwd5o6whRC5PMGretI4IdRLlmBXYNjScPaBgsbY= | ||||
| github.com/creack/pty v1.1.18/go.mod h1:MOBLtS5ELjhRRrroQr9kyvTxUAFNvYEK993ew/Vr4O4= | ||||
| github.com/cyphar/filepath-securejoin v0.2.2/go.mod h1:FpkQEhXnPnOthhzymB7CGsFk2G9VLXONKD9G7QGMM+4= | ||||
| github.com/cyphar/filepath-securejoin v0.2.3 h1:YX6ebbZCZP7VkM3scTTokDgBL2TY741X51MTk3ycuNI= | ||||
| github.com/cyphar/filepath-securejoin v0.2.3/go.mod h1:aPGpWjXOXUn2NCNjFvBE6aRxGGx79pTxQpKOJNYHHl4= | ||||
| github.com/cyphar/filepath-securejoin v0.2.4 h1:Ugdm7cg7i6ZK6x3xDF1oEu1nfkyfH53EtKeQYTC3kyg= | ||||
| github.com/cyphar/filepath-securejoin v0.2.4/go.mod h1:aPGpWjXOXUn2NCNjFvBE6aRxGGx79pTxQpKOJNYHHl4= | ||||
| github.com/d2g/dhcp4 v0.0.0-20170904100407-a1d1b6c41b1c/go.mod h1:Ct2BUK8SB0YC1SMSibvLzxjeJLnrYEVLULFNiHY9YfQ= | ||||
| github.com/d2g/dhcp4client v1.0.0/go.mod h1:j0hNfjhrt2SxUOw55nL0ATM/z4Yt3t2Kd1mW34z5W5s= | ||||
| github.com/d2g/dhcp4server v0.0.0-20181031114812-7d4a0a7f59a5/go.mod h1:Eo87+Kg/IX2hfWJfwxMzLyuSZyxSoAug2nGa1G2QAi8= | ||||
| @ -340,18 +335,20 @@ github.com/denverdino/aliyungo v0.0.0-20190125010748-a747050bb1ba/go.mod h1:dV8l | ||||
| github.com/dgrijalva/jwt-go v0.0.0-20170104182250-a601269ab70c/go.mod h1:E3ru+11k8xSBh+hMPgOLZmtrrCbhqsmaPHjLKYnJCaQ= | ||||
| github.com/dgrijalva/jwt-go v3.2.0+incompatible/go.mod h1:E3ru+11k8xSBh+hMPgOLZmtrrCbhqsmaPHjLKYnJCaQ= | ||||
| github.com/dgryski/go-sip13 v0.0.0-20181026042036-e10d5fee7954/go.mod h1:vAd38F8PWV+bWy6jNmig1y/TA+kYO4g3RSRF0IAv0no= | ||||
| github.com/distribution/reference v0.5.0 h1:/FUIFXtfc/x2gpa5/VGfiGLuOIdYa1t65IKK2OFGvA0= | ||||
| github.com/distribution/reference v0.5.0/go.mod h1:BbU0aIcezP1/5jX/8MP0YiH4SdvB5Y4f/wlDRiLyi3E= | ||||
| github.com/dnaeon/go-vcr v1.0.1/go.mod h1:aBB1+wY4s93YsC3HHjMBMrwTj2R9FHDzUr9KyGc8n1E= | ||||
| github.com/docker/cli v0.0.0-20191017083524-a8ff7f821017/go.mod h1:JLrzqnKDaYBop7H2jaqPtU4hHvMKP+vjCwu2uszcLI8= | ||||
| github.com/docker/cli v24.0.5+incompatible h1:WeBimjvS0eKdH4Ygx+ihVq1Q++xg36M/rMi4aXAvodc= | ||||
| github.com/docker/cli v24.0.5+incompatible/go.mod h1:JLrzqnKDaYBop7H2jaqPtU4hHvMKP+vjCwu2uszcLI8= | ||||
| github.com/docker/cli v24.0.7+incompatible h1:wa/nIwYFW7BVTGa7SWPVyyXU9lgORqUb1xfI36MSkFg= | ||||
| github.com/docker/cli v24.0.7+incompatible/go.mod h1:JLrzqnKDaYBop7H2jaqPtU4hHvMKP+vjCwu2uszcLI8= | ||||
| github.com/docker/distribution v0.0.0-20190905152932-14b96e55d84c/go.mod h1:0+TTO4EOBfRPhZXAeF1Vu+W3hHZ8eLp8PgKVZlcvtFY= | ||||
| github.com/docker/distribution v2.7.1-0.20190205005809-0d3efadf0154+incompatible/go.mod h1:J2gT2udsDAN96Uj4KfcMRqY0/ypR+oyYUYmja8H+y+w= | ||||
| github.com/docker/distribution v2.7.1+incompatible/go.mod h1:J2gT2udsDAN96Uj4KfcMRqY0/ypR+oyYUYmja8H+y+w= | ||||
| github.com/docker/distribution v2.8.2+incompatible h1:T3de5rq0dB1j30rp0sA2rER+m322EBzniBPB6ZIzuh8= | ||||
| github.com/docker/distribution v2.8.2+incompatible/go.mod h1:J2gT2udsDAN96Uj4KfcMRqY0/ypR+oyYUYmja8H+y+w= | ||||
| github.com/docker/distribution v2.8.3+incompatible h1:AtKxIZ36LoNK51+Z6RpzLpddBirtxJnzDrHLEKxTAYk= | ||||
| github.com/docker/distribution v2.8.3+incompatible/go.mod h1:J2gT2udsDAN96Uj4KfcMRqY0/ypR+oyYUYmja8H+y+w= | ||||
| github.com/docker/docker v1.4.2-0.20190924003213-a8608b5b67c7/go.mod h1:eEKB0N0r5NX/I1kEveEz05bcu8tLC/8azJZsviup8Sk= | ||||
| github.com/docker/docker v24.0.5+incompatible h1:WmgcE4fxyI6EEXxBRxsHnZXrO1pQ3smi0k/jho4HLeY= | ||||
| github.com/docker/docker v24.0.5+incompatible/go.mod h1:eEKB0N0r5NX/I1kEveEz05bcu8tLC/8azJZsviup8Sk= | ||||
| github.com/docker/docker v24.0.7+incompatible h1:Wo6l37AuwP3JaMnZa226lzVXGA3F9Ig1seQen0cKYlM= | ||||
| github.com/docker/docker v24.0.7+incompatible/go.mod h1:eEKB0N0r5NX/I1kEveEz05bcu8tLC/8azJZsviup8Sk= | ||||
| github.com/docker/docker-credential-helpers v0.6.3/go.mod h1:WRaJzqw3CTB9bk10avuGsjVBZsD05qeibJ1/TYlvc0Y= | ||||
| github.com/docker/docker-credential-helpers v0.6.4 h1:axCks+yV+2MR3/kZhAmy07yC56WZ2Pwu/fKWtKuZB0o= | ||||
| github.com/docker/docker-credential-helpers v0.6.4/go.mod h1:ofX3UI0Gz1TteYBjtgs07O36Pyasyp66D2uKT7H8W1c= | ||||
| @ -376,9 +373,8 @@ github.com/dustin/go-humanize v0.0.0-20171111073723-bb3d318650d4/go.mod h1:Htrtb | ||||
| github.com/dustin/go-humanize v1.0.0/go.mod h1:HtrtbFcZ19U5GC7JDqmcUSB87Iq5E25KnS6fMYU6eOk= | ||||
| github.com/dvsekhvalnov/jose2go v0.0.0-20170216131308-f21a8cedbbae/go.mod h1:7BvyPhdbLxMXIYTFPLsyJRFMsKmOZnQmzh6Gb+uquuM= | ||||
| github.com/elazarl/goproxy v0.0.0-20180725130230-947c36da3153/go.mod h1:/Zj4wYkgs4iZTTu3o/KG3Itv/qCCa8VVMlb3i9OVuzc= | ||||
| github.com/elazarl/goproxy v0.0.0-20221015165544-a0805db90819 h1:RIB4cRk+lBqKK3Oy0r2gRX4ui7tuhiZq2SuTtTCi0/0= | ||||
| github.com/elazarl/goproxy v0.0.0-20221015165544-a0805db90819/go.mod h1:Ro8st/ElPeALwNFlcTpWmkr6IoMFfkjXAvTHpevnDsM= | ||||
| github.com/elazarl/goproxy/ext v0.0.0-20190711103511-473e67f1d7d2/go.mod h1:gNh8nYJoAm43RfaxurUnxr+N1PwuFV3ZMl/efxlIlY8= | ||||
| github.com/elazarl/goproxy v0.0.0-20230808193330-2592e75ae04a h1:mATvB/9r/3gvcejNsXKSkQ6lcIaNec2nyfOdlTBR2lU= | ||||
| github.com/elazarl/goproxy v0.0.0-20230808193330-2592e75ae04a/go.mod h1:Ro8st/ElPeALwNFlcTpWmkr6IoMFfkjXAvTHpevnDsM= | ||||
| github.com/emicklei/go-restful v0.0.0-20170410110728-ff4f55a20633/go.mod h1:otzb+WCGbkyDHkqmQmT5YD2WR4BBwUdeQoFo8l/7tVs= | ||||
| github.com/emicklei/go-restful v2.9.5+incompatible/go.mod h1:otzb+WCGbkyDHkqmQmT5YD2WR4BBwUdeQoFo8l/7tVs= | ||||
| github.com/emirpasic/gods v1.18.1 h1:FXtiHYKDGKCW2KzwZKx0iC0PQmdlorYgdFG9jPXJ1Bc= | ||||
| @ -419,26 +415,20 @@ github.com/gliderlabs/ssh v0.3.5 h1:OcaySEmAQJgyYcArR+gGGTHCyE7nvhEMTlYY+Dp8CpY= | ||||
| github.com/gliderlabs/ssh v0.3.5/go.mod h1:8XB4KraRrX39qHhT6yxPsHedjA08I/uBVwj4xC+/+z4= | ||||
| github.com/go-git/gcfg v1.5.1-0.20230307220236-3a3c6141e376 h1:+zs/tPmkDkHx3U66DAb0lQFJrpS6731Oaa12ikc+DiI= | ||||
| github.com/go-git/gcfg v1.5.1-0.20230307220236-3a3c6141e376/go.mod h1:an3vInlBmSxCcxctByoQdvwPiA7DTK7jaaFDBTtu0ic= | ||||
| github.com/go-git/go-billy/v5 v5.3.1/go.mod h1:pmpqyWchKfYfrkb/UVH4otLvyi/5gJlGI4Hb3ZqZ3W0= | ||||
| github.com/go-git/go-billy/v5 v5.4.1 h1:Uwp5tDRkPr+l/TnbHOQzp+tmJfLceOlbVucgpTz8ix4= | ||||
| github.com/go-git/go-billy/v5 v5.4.1/go.mod h1:vjbugF6Fz7JIflbVpl1hJsGjSHNltrSw45YK/ukIvQg= | ||||
| github.com/go-git/go-git-fixtures/v4 v4.3.2-0.20230305113008-0c11038e723f h1:Pz0DHeFij3XFhoBRGUDPzSJ+w2UcK5/0JvF8DRI58r8= | ||||
| github.com/go-git/go-git-fixtures/v4 v4.3.2-0.20230305113008-0c11038e723f/go.mod h1:8LHG1a3SRW71ettAD/jW13h8c6AqjVSeL11RAdgaqpo= | ||||
| github.com/go-git/go-git/v5 v5.8.0 h1:Rc543s6Tyq+YcyPwZRvU4jzZGM8rB/wWu94TnTIYALQ= | ||||
| github.com/go-git/go-git/v5 v5.8.0/go.mod h1:coJHKEOk5kUClpsNlXrUvPrDxY3w3gjHvhcZd8Fodw8= | ||||
| github.com/go-git/go-billy/v5 v5.5.0 h1:yEY4yhzCDuMGSv83oGxiBotRzhwhNr8VZyphhiu+mTU= | ||||
| github.com/go-git/go-billy/v5 v5.5.0/go.mod h1:hmexnoNsr2SJU1Ju67OaNz5ASJY3+sHgFRpCtpDCKow= | ||||
| github.com/go-git/go-git-fixtures/v4 v4.3.2-0.20231010084843-55a94097c399 h1:eMje31YglSBqCdIqdhKBW8lokaMrL3uTkpGYlE2OOT4= | ||||
| github.com/go-git/go-git-fixtures/v4 v4.3.2-0.20231010084843-55a94097c399/go.mod h1:1OCfN199q1Jm3HZlxleg+Dw/mwps2Wbk9frAWm+4FII= | ||||
| github.com/go-git/go-git/v5 v5.10.0 h1:F0x3xXrAWmhwtzoCokU4IMPcBdncG+HAAqi9FcOOjbQ= | ||||
| github.com/go-git/go-git/v5 v5.10.0/go.mod h1:1FOZ/pQnqw24ghP2n7cunVl0ON55BsjPYvhWHvZGhoo= | ||||
| github.com/go-gl/glfw v0.0.0-20190409004039-e6da0acd62b1/go.mod h1:vR7hzQXu2zJy9AVAgeJqvqgH9Q5CA+iKCZ2gyEVpxRU= | ||||
| github.com/go-gl/glfw/v3.3/glfw v0.0.0-20191125211704-12ad95a8df72/go.mod h1:tQ2UAYgL5IevRw8kRxooKSPJfGvJ9fJQFa0TUsXzTg8= | ||||
| github.com/go-gl/glfw/v3.3/glfw v0.0.0-20200222043503-6f7a984d4dc4/go.mod h1:tQ2UAYgL5IevRw8kRxooKSPJfGvJ9fJQFa0TUsXzTg8= | ||||
| github.com/go-ini/ini v1.25.4/go.mod h1:ByCAeIL28uOIIG0E3PJtZPDL8WnHpFKFOtgjp+3Ies8= | ||||
| github.com/go-kit/kit v0.8.0/go.mod h1:xBxKIO96dXMWWy0MnWVtmwkA9/13aqxPnvrjFYMA2as= | ||||
| github.com/go-kit/kit v0.9.0/go.mod h1:xBxKIO96dXMWWy0MnWVtmwkA9/13aqxPnvrjFYMA2as= | ||||
| github.com/go-kit/log v0.1.0/go.mod h1:zbhenjAZHb184qTLMA9ZjW7ThYL0H2mk7Q6pNt4vbaY= | ||||
| github.com/go-kit/log v0.2.0/go.mod h1:NwTd00d/i8cPZ3xOwwiv2PO5MOcx78fFErGNcVmBjv0= | ||||
| github.com/go-kit/log v0.2.1/go.mod h1:NwTd00d/i8cPZ3xOwwiv2PO5MOcx78fFErGNcVmBjv0= | ||||
| github.com/go-logfmt/logfmt v0.3.0/go.mod h1:Qt1PoO58o5twSAckw1HlFXLmHsOX5/0LbT9GBnD5lWE= | ||||
| github.com/go-logfmt/logfmt v0.4.0/go.mod h1:3RMwSq7FuexP4Kalkev3ejPJsZTpXXBr9+V4qmtdjCk= | ||||
| github.com/go-logfmt/logfmt v0.5.0/go.mod h1:wCYkCAKZfumFQihp8CzCvQ3paCTfi41vtzG1KdI/P7A= | ||||
| github.com/go-logfmt/logfmt v0.5.1/go.mod h1:WYhtIu8zTZfxdn5+rREduYbwxfcBr/Vr6KEVveWlfTs= | ||||
| github.com/go-logr/logr v0.1.0/go.mod h1:ixOQHD9gLJUVQQ2ZOR7zLEifBX6tGkNJF4QyIY7sIas= | ||||
| github.com/go-logr/logr v0.2.0/go.mod h1:z6/tIYblkpsD+a4lm/fGIIU9mZ+XfAiaFtq7xTgseGU= | ||||
| github.com/go-openapi/jsonpointer v0.0.0-20160704185906-46af16f9f7b1/go.mod h1:+35s3my2LFTysnkMfxsJBAMHj/DoqoB9knIWoYG/Vk0= | ||||
| @ -525,7 +515,6 @@ github.com/google/go-cmp v0.5.3/go.mod h1:v8dTdLbMG2kIc/vJvl+f65V22dbkXbowE6jgT/ | ||||
| github.com/google/go-cmp v0.5.4/go.mod h1:v8dTdLbMG2kIc/vJvl+f65V22dbkXbowE6jgT/gNBxE= | ||||
| github.com/google/go-cmp v0.5.5/go.mod h1:v8dTdLbMG2kIc/vJvl+f65V22dbkXbowE6jgT/gNBxE= | ||||
| github.com/google/go-cmp v0.5.6/go.mod h1:v8dTdLbMG2kIc/vJvl+f65V22dbkXbowE6jgT/gNBxE= | ||||
| github.com/google/go-cmp v0.5.8/go.mod h1:17dUlkBOakJ0+DkrSSNjCkIjxS6bF9zb3elmeNGIjoY= | ||||
| github.com/google/go-cmp v0.5.9 h1:O2Tfq5qg4qc4AmwVlvv0oLiVAGB7enBSJ2x2DqQFi38= | ||||
| github.com/google/go-cmp v0.5.9/go.mod h1:17dUlkBOakJ0+DkrSSNjCkIjxS6bF9zb3elmeNGIjoY= | ||||
| github.com/google/go-containerregistry v0.5.1/go.mod h1:Ct15B4yir3PLOP5jsy0GNeYVaIZs/MK/Jz5any1wFW0= | ||||
| @ -601,8 +590,8 @@ github.com/hashicorp/go-multierror v1.0.0/go.mod h1:dHtQlpGsu+cZNNAkkCN/P3hoUDHh | ||||
| github.com/hashicorp/go-multierror v1.1.0/go.mod h1:spPvp8C1qA32ftKqdAHm4hHTbPw+vmowP0z+KUhOZdA= | ||||
| github.com/hashicorp/go-multierror v1.1.1/go.mod h1:iw975J/qwKPdAO1clOe2L8331t/9/fmwbPZ6JB6eMoM= | ||||
| github.com/hashicorp/go-retryablehttp v0.5.3/go.mod h1:9B5zBasrRhHXnJnui7y6sL7es7NDiJgTc6Er0maI1Xs= | ||||
| github.com/hashicorp/go-retryablehttp v0.7.4 h1:ZQgVdpTdAL7WpMIwLzCfbalOcSUdkDZnpUv3/+BxzFA= | ||||
| github.com/hashicorp/go-retryablehttp v0.7.4/go.mod h1:Jy/gPYAdjqffZ/yFGCFV2doI5wjtH1ewM9u8iYVjtX8= | ||||
| github.com/hashicorp/go-retryablehttp v0.7.5 h1:bJj+Pj19UZMIweq/iie+1u5YCdGrnxCT9yvm0e+Nd5M= | ||||
| github.com/hashicorp/go-retryablehttp v0.7.5/go.mod h1:Jy/gPYAdjqffZ/yFGCFV2doI5wjtH1ewM9u8iYVjtX8= | ||||
| github.com/hashicorp/go-rootcerts v1.0.2/go.mod h1:pqUvnprVnM5bf7AOirdbb01K4ccR319Vf4pU3K5EGc8= | ||||
| github.com/hashicorp/go-sockaddr v1.0.0/go.mod h1:7Xibr9yA9JjQq1JpNB2Vw7kxv8xerXegt+ozgdvDeDU= | ||||
| github.com/hashicorp/go-syslog v1.0.0/go.mod h1:qPfqrKkXGihmCqbJM2mZgkZGvKG1dFdvsLplgctolz4= | ||||
| @ -620,8 +609,6 @@ github.com/hashicorp/memberlist v0.2.2/go.mod h1:MS2lj3INKhZjWNqd3N0m3J+Jxf3DAOn | ||||
| github.com/hashicorp/memberlist v0.3.0/go.mod h1:MS2lj3INKhZjWNqd3N0m3J+Jxf3DAOnAH9VT3Sh9MUE= | ||||
| github.com/hashicorp/serf v0.9.5/go.mod h1:UWDWwZeL5cuWDJdl0C6wrvrUwEqtQ4ZKBKKENpqIUyk= | ||||
| github.com/hashicorp/serf v0.9.6/go.mod h1:TXZNMjZQijwlDvp+r0b63xZ45H7JmCmgg4gpTwn9UV4= | ||||
| github.com/hetznercloud/hcloud-go v1.48.0 h1:b6x0ABNYJr8zVX9sE1kCNMU/sndzI8vmZjxEWEr+Gn0= | ||||
| github.com/hetznercloud/hcloud-go v1.48.0/go.mod h1:VzDWThl47lOnZXY0q5/LPFD+M62pfe/52TV+mOrpp9Q= | ||||
| github.com/hinshun/vt10x v0.0.0-20220119200601-820417d04eec h1:qv2VnGeEQHchGaZ/u7lxST/RaJw+cv273q79D81Xbog= | ||||
| github.com/hinshun/vt10x v0.0.0-20220119200601-820417d04eec/go.mod h1:Q48J4R4DvxnHolD5P8pOtXigYlRuPLGl6moFx3ulM68= | ||||
| github.com/hpcloud/tail v1.0.0/go.mod h1:ab1qPbhIpdTxEkNHXyeSf5vhxWSCs/tWer42PpOxQnU= | ||||
| @ -632,15 +619,13 @@ github.com/imdario/mergo v0.3.5/go.mod h1:2EnlNZ0deacrJVfApfmtdGgDfMuh/nq6Ok1EcJ | ||||
| github.com/imdario/mergo v0.3.8/go.mod h1:2EnlNZ0deacrJVfApfmtdGgDfMuh/nq6Ok1EcJh5FfA= | ||||
| github.com/imdario/mergo v0.3.10/go.mod h1:jmQim1M+e3UYxmgPu/WyfjB3N3VflVyUjjjwH0dnCYA= | ||||
| github.com/imdario/mergo v0.3.11/go.mod h1:jmQim1M+e3UYxmgPu/WyfjB3N3VflVyUjjjwH0dnCYA= | ||||
| github.com/imdario/mergo v0.3.12 h1:b6R2BslTbIEToALKP7LxUvijTsNI9TAe80pLWN2g/HU= | ||||
| github.com/imdario/mergo v0.3.12/go.mod h1:jmQim1M+e3UYxmgPu/WyfjB3N3VflVyUjjjwH0dnCYA= | ||||
| github.com/imdario/mergo v0.3.15 h1:M8XP7IuFNsqUx6VPK2P9OSmsYsI/YFaGil0uD21V3dM= | ||||
| github.com/imdario/mergo v0.3.15/go.mod h1:WBLT9ZmE3lPoWsEzCh9LPo3TiwVN+ZKEjmz+hD27ysY= | ||||
| github.com/inconshreveable/mousetrap v1.0.0 h1:Z8tu5sraLXCXIcARxBp/8cbvlwVa7Z1NHg9XEKhtSvM= | ||||
| github.com/inconshreveable/mousetrap v1.0.0/go.mod h1:PxqpIevigyE2G7u3NXJIT2ANytuPF1OarO4DADm73n8= | ||||
| github.com/j-keck/arping v0.0.0-20160618110441-2cf9dc699c56/go.mod h1:ymszkNOg6tORTn+6F6j+Jc8TOr5osrynvN6ivFWZ2GA= | ||||
| github.com/jbenet/go-context v0.0.0-20150711004518-d14ea06fba99 h1:BQSFePA1RWJOlocH6Fxy8MmwDt+yVQYULKfN0RoTN8A= | ||||
| github.com/jbenet/go-context v0.0.0-20150711004518-d14ea06fba99/go.mod h1:1lJo3i6rXxKeerYnT8Nvf0QmHCRC1n8sfWVwXF2Frvo= | ||||
| github.com/jessevdk/go-flags v1.5.0/go.mod h1:Fw0T6WPc1dYxT4mKEZRfG5kJhaTDP9pj1c2EWnYs/m4= | ||||
| github.com/jinzhu/gorm v0.0.0-20170222002820-5409931a1bb8 h1:CZkYfurY6KGhVtlalI4QwQ6T0Cu6iuY3e0x5RLu96WE= | ||||
| github.com/jinzhu/gorm v0.0.0-20170222002820-5409931a1bb8/go.mod h1:Vla75njaFJ8clLU1W44h34PjIkijhjHIYnZxMqCdxqo= | ||||
| github.com/jinzhu/inflection v0.0.0-20170102125226-1c35d901db3d h1:jRQLvyVGL+iVtDElaEIDdKwpPqUIZJfzkNLV34htpEc= | ||||
| @ -650,7 +635,6 @@ github.com/jmespath/go-jmespath v0.0.0-20160202185014-0b12d6b521d8/go.mod h1:Nht | ||||
| github.com/jmespath/go-jmespath v0.0.0-20160803190731-bd40a432e4c7/go.mod h1:Nht3zPeWKUH0NzdCt2Blrr5ys8VGpn0CEB0cQHVjt7k= | ||||
| github.com/joefitzgerald/rainbow-reporter v0.1.0/go.mod h1:481CNgqmVHQZzdIbN52CupLJyoVwB10FQ/IQlF1pdL8= | ||||
| github.com/jonboulle/clockwork v0.1.0/go.mod h1:Ii8DK3G1RaLaWxj9trq07+26W01tbo22gdxWY5EU2bo= | ||||
| github.com/jpillora/backoff v1.0.0/go.mod h1:J/6gKK9jxlEcS3zixgDgUAsiuZ7yrSoa/FX5e0EB2j4= | ||||
| github.com/json-iterator/go v1.1.6/go.mod h1:+SdeFBvtyEkXs7REEP0seUULqWtbJapLOCVDaaPEHmU= | ||||
| github.com/json-iterator/go v1.1.7/go.mod h1:KdQUCv79m/52Kvf8AW2vK1V8akMuk1QjK/uOdHXbAo4= | ||||
| github.com/json-iterator/go v1.1.9/go.mod h1:KdQUCv79m/52Kvf8AW2vK1V8akMuk1QjK/uOdHXbAo4= | ||||
| @ -662,7 +646,6 @@ github.com/jstemmer/go-junit-report v0.9.1/go.mod h1:Brl9GWCQeLvo8nXZwPNNblvFj/X | ||||
| github.com/jtolds/gls v4.20.0+incompatible/go.mod h1:QJZ7F/aHp+rZTRtaJ1ow/lLfFfVYBRgL+9YlvaHOwJU= | ||||
| github.com/juju/loggo v0.0.0-20190526231331-6e530bcce5d8/go.mod h1:vgyd7OREkbtVEN/8IXZe5Ooef3LQePvuBm9UWj6ZL8U= | ||||
| github.com/julienschmidt/httprouter v1.2.0/go.mod h1:SYymIcj16QtmaHHD7aYtjjsJG7VTCxuUUipMqKk8s4w= | ||||
| github.com/julienschmidt/httprouter v1.3.0/go.mod h1:JR6WtHb+2LUe8TCKY3cZOxFyyO8IZAc4RVcycCCAKdM= | ||||
| github.com/k0kubun/go-ansi v0.0.0-20180517002512-3bf9e2903213/go.mod h1:vNUNkEQ1e29fT/6vq2aBdFsgNPmy8qMdSay1npru+Sw= | ||||
| github.com/kballard/go-shellquote v0.0.0-20180428030007-95032a82bc51 h1:Z9n2FFNUXsshfwJMBgNA0RU6/i7WVaAegv3PtuIHPMs= | ||||
| github.com/kballard/go-shellquote v0.0.0-20180428030007-95032a82bc51/go.mod h1:CzGEWj7cYgsdH8dAjBGEr58BoE7ScuLd+fwFZ44+/x8= | ||||
| @ -695,11 +678,6 @@ github.com/kr/text v0.1.0/go.mod h1:4Jbv+DJW3UT/LiOwJeYQe1efqtUx/iVham/4vfdArNI= | ||||
| github.com/kr/text v0.2.0 h1:5Nx0Ya0ZqY2ygV366QzturHI13Jq95ApcVaJBhpS+AY= | ||||
| github.com/kr/text v0.2.0/go.mod h1:eLer722TekiGuMkidMxC/pM04lWEeraHUUmBw8l2grE= | ||||
| github.com/lib/pq v0.0.0-20150723085316-0dad96c0b94f/go.mod h1:5WUZQaWbwv1U+lTReE5YruASi9Al49XbQIvNi/34Woo= | ||||
| github.com/libdns/gandi v1.0.2 h1:1Ts8UpI1x5PVKpOjKC7Dn4+EObndz9gm6vdZnloHSKQ= | ||||
| github.com/libdns/gandi v1.0.2/go.mod h1:hxpbQKcQFgQrTS5lV4tAgn6QoL6HcCnoBJaW5nOW4Sk= | ||||
| github.com/libdns/libdns v0.1.0/go.mod h1:yQCXzk1lEZmmCPa857bnk4TsOiqYasqpyOEeSObbb40= | ||||
| github.com/libdns/libdns v0.2.1 h1:Wu59T7wSHRgtA0cfxC+n1c/e+O3upJGWytknkmFEDis= | ||||
| github.com/libdns/libdns v0.2.1/go.mod h1:yQCXzk1lEZmmCPa857bnk4TsOiqYasqpyOEeSObbb40= | ||||
| github.com/linuxkit/virtsock v0.0.0-20201010232012-f8cee7dfc7a3/go.mod h1:3r6x7q95whyfWQpmGZTu3gk3v2YkMi05HEzl7Tf7YEo= | ||||
| github.com/lyft/protoc-gen-star v0.5.3/go.mod h1:V0xaHgaf5oCCqmcxYcWiDfTiKsZsRc87/1qhoTACD8w= | ||||
| github.com/magiconair/properties v1.5.3/go.mod h1:PppfXfuXeibc/6YijjN8zIbojt8czPbwD3XqdrwzmxQ= | ||||
| @ -727,8 +705,8 @@ github.com/mattn/go-isatty v0.0.10/go.mod h1:qgIWMr58cqv1PHHyhnkY9lrL7etaEgOFcME | ||||
| github.com/mattn/go-isatty v0.0.11/go.mod h1:PhnuNfih5lzO57/f3n+odYbM4JtupLOxQOAqxQCu2WE= | ||||
| github.com/mattn/go-isatty v0.0.12/go.mod h1:cbi8OIDigv2wuxKPP5vlRcQ1OAZbq2CE4Kysco4FUpU= | ||||
| github.com/mattn/go-isatty v0.0.14/go.mod h1:7GGIvUiUoEMVVmxf/4nioHXj79iQHKdU27kJ6hsGG94= | ||||
| github.com/mattn/go-isatty v0.0.17 h1:BTarxUcIeDqL27Mc+vyvdWYSL28zpIhv3RoTdsLMPng= | ||||
| github.com/mattn/go-isatty v0.0.17/go.mod h1:kYGgaQfpe5nmfYZH+SKPsOc2e4SrIfOl2e/yFXSvRLM= | ||||
| github.com/mattn/go-isatty v0.0.20 h1:xfD0iDuEKnDkl03q4limB+vH+GxLEtL/jb4xVJSWWEY= | ||||
| github.com/mattn/go-isatty v0.0.20/go.mod h1:W+V8PltTTMOvKvAeJH7IuucS94S2C6jfK/D7dTCTo3Y= | ||||
| github.com/mattn/go-runewidth v0.0.2/go.mod h1:LwmH8dsx7+W8Uxz3IHJYH5QSwggIsqBzpuz5H//U1FU= | ||||
| github.com/mattn/go-runewidth v0.0.9/go.mod h1:H031xJmbD/WCDINGzjvQ9THkh0rPKHF+m2gUSrubnMI= | ||||
| github.com/mattn/go-runewidth v0.0.14 h1:+xnbZSEeDbOIg5/mE6JF0w6n9duR1l3/WmbinWVwUuU= | ||||
| @ -762,7 +740,6 @@ github.com/mitchellh/mapstructure v1.1.2/go.mod h1:FVVH3fgwuzCH5S8UJGiWEs2h04kUh | ||||
| github.com/mitchellh/mapstructure v1.4.3 h1:OVowDSCllw/YjdLkam3/sm7wEtOy59d8ndGgCcyj8cs= | ||||
| github.com/mitchellh/mapstructure v1.4.3/go.mod h1:bFUtVrKA4DC2yAKiSyO/QUcy7e+RRV2QTWOzhPopBRo= | ||||
| github.com/mitchellh/osext v0.0.0-20151018003038-5e2d6d41470f/go.mod h1:OkQIRizQZAeMln+1tSwduZz7+Af5oFlKirV/MSYes2A= | ||||
| github.com/mmcloughlin/avo v0.5.0/go.mod h1:ChHFdoV7ql95Wi7vuq2YT1bwCJqiWdZrQ1im3VujLYM= | ||||
| github.com/moby/locker v1.0.1/go.mod h1:S7SDdo5zpBK84bzzVlKr2V0hz+7x9hWbYC/kq7oQppc= | ||||
| github.com/moby/patternmatcher v0.5.0 h1:YCZgJOeULcxLw1Q+sVR636pmS7sPEn1Qo2iAN6M7DBo= | ||||
| github.com/moby/patternmatcher v0.5.0/go.mod h1:hDPoyOpDY7OrrMDLaYoY3hf52gNCR/YOUYxkhApJIxc= | ||||
| @ -789,7 +766,6 @@ github.com/mrunalp/fileutils v0.5.0/go.mod h1:M1WthSahJixYnrXQl/DFQuteStB1weuxD2 | ||||
| github.com/munnerz/goautoneg v0.0.0-20120707110453-a547fc61f48d/go.mod h1:+n7T8mK8HuQTcFwEeznm/DIxMOiR9yIdICNftLE1DvQ= | ||||
| github.com/munnerz/goautoneg v0.0.0-20191010083416-a7dc8b61c822/go.mod h1:+n7T8mK8HuQTcFwEeznm/DIxMOiR9yIdICNftLE1DvQ= | ||||
| github.com/mwitkow/go-conntrack v0.0.0-20161129095857-cc309e4a2223/go.mod h1:qRWi+5nqEBWmkhHvq77mSJWrCKwh8bxhgT7d/eI7P4U= | ||||
| github.com/mwitkow/go-conntrack v0.0.0-20190716064945-2f068394615f/go.mod h1:qRWi+5nqEBWmkhHvq77mSJWrCKwh8bxhgT7d/eI7P4U= | ||||
| github.com/mxk/go-flowrate v0.0.0-20140419014527-cca7078d478f/go.mod h1:ZdcZmHo+o7JKHSa8/e818NopupXU1YMK5fe1lsApnBw= | ||||
| github.com/ncw/swift v1.0.47/go.mod h1:23YIA4yWVnGwv2dQlN4bB7egfYX6YLn0Yo/S6zZO/ZM= | ||||
| github.com/niemeyer/pretty v0.0.0-20200227124842-a10e7caefd8e/go.mod h1:zD1mROLANZcx1PVRCS0qkT7pwLkGfwJo4zjcN/Tysno= | ||||
| @ -814,6 +790,8 @@ github.com/onsi/gomega v1.7.0/go.mod h1:ex+gbHU/CVuBBDIJjb2X0qEXbFg53c61hWP/1Cpa | ||||
| github.com/onsi/gomega v1.7.1/go.mod h1:XdKZgCCFLUoM/7CFJVPcG8C1xQ1AJ0vpAezJrB7JYyY= | ||||
| github.com/onsi/gomega v1.9.0/go.mod h1:Ho0h+IUsWyvy1OpqCwxlQ/21gkhVunqlU8fDGcoTdcA= | ||||
| github.com/onsi/gomega v1.10.3/go.mod h1:V9xEwhxec5O8UDM77eCW8vLymOMltsqPVYWrpDsH8xc= | ||||
| github.com/onsi/gomega v1.27.10 h1:naR28SdDFlqrG6kScpT8VWpu1xWY5nJRCF3XaYyBjhI= | ||||
| github.com/onsi/gomega v1.27.10/go.mod h1:RsS8tutOdbdgzbPtzzATp12yT7kM5I5aElG3evPbQ0M= | ||||
| github.com/opencontainers/go-digest v0.0.0-20170106003457-a6d0ee40d420/go.mod h1:cMLVZDEM3+U2I4VmLI6N8jQYUd2OVphdqWwCJHrFt2s= | ||||
| github.com/opencontainers/go-digest v0.0.0-20180430190053-c9281466c8b2/go.mod h1:cMLVZDEM3+U2I4VmLI6N8jQYUd2OVphdqWwCJHrFt2s= | ||||
| github.com/opencontainers/go-digest v1.0.0-rc1/go.mod h1:cMLVZDEM3+U2I4VmLI6N8jQYUd2OVphdqWwCJHrFt2s= | ||||
| @ -856,7 +834,6 @@ github.com/pelletier/go-toml v1.9.4/go.mod h1:u1nR/EPcESfeI/szUZKdtJ0xRNbUoANCko | ||||
| github.com/peterbourgon/diskv v2.0.1+incompatible/go.mod h1:uqqh8zWWbv1HBMNONnaR/tNboyR3/BZd58JJSHlUSCU= | ||||
| github.com/pjbgf/sha1cd v0.3.0 h1:4D5XXmUUBUl/xQ6IjCkEAbqXskkq/4O7LmGn0AqMDs4= | ||||
| github.com/pjbgf/sha1cd v0.3.0/go.mod h1:nZ1rrWOcGJ5uZgEEVL1VUM9iRQiZvWdbZjkKyFzPPsI= | ||||
| github.com/pkg/diff v0.0.0-20210226163009-20ebb0f2a09e/go.mod h1:pJLUxLENpZxwdsKMEsNbx1VGcRFpLqf3715MtcvvzbA= | ||||
| github.com/pkg/errors v0.8.0/go.mod h1:bwawxfHBFNV+L2hUp1rHADufV3IMtnDRdf1r5NINEl0= | ||||
| github.com/pkg/errors v0.8.1-0.20171018195549-f15c970de5b7/go.mod h1:bwawxfHBFNV+L2hUp1rHADufV3IMtnDRdf1r5NINEl0= | ||||
| github.com/pkg/errors v0.8.1/go.mod h1:bwawxfHBFNV+L2hUp1rHADufV3IMtnDRdf1r5NINEl0= | ||||
| @ -876,9 +853,6 @@ github.com/prometheus/client_golang v1.0.0/go.mod h1:db9x61etRT2tGnBNRi70OPL5Fsn | ||||
| github.com/prometheus/client_golang v1.1.0/go.mod h1:I1FGZT9+L76gKKOs5djB6ezCbFQP1xR9D75/vuwEF3g= | ||||
| github.com/prometheus/client_golang v1.4.0/go.mod h1:e9GMxYsXl05ICDXkRhurwBS4Q3OK1iX/F2sw+iXX5zU= | ||||
| github.com/prometheus/client_golang v1.7.1/go.mod h1:PY5Wy2awLA44sXw4AOSfFBetzPP4j5+D6mVACh+pe2M= | ||||
| github.com/prometheus/client_golang v1.11.0/go.mod h1:Z6t4BnS23TR94PD6BsDNk8yVqroYurpAkEiz0P2BEV0= | ||||
| github.com/prometheus/client_golang v1.12.1/go.mod h1:3Z9XVyYiZYEO+YQWt3RD2R3jrbd179Rt297l4aS6nDY= | ||||
| github.com/prometheus/client_golang v1.14.0/go.mod h1:8vpkKitgIVNcqrRBWh1C4TIUQgYNtG/XQE4E/Zae36Y= | ||||
| github.com/prometheus/client_golang v1.16.0 h1:yk/hx9hDbrGHovbci4BY+pRMfSuuat626eFsHb7tmT8= | ||||
| github.com/prometheus/client_golang v1.16.0/go.mod h1:Zsulrv/L9oM40tJ7T815tM89lFEugiJ9HzIqaAx4LKc= | ||||
| github.com/prometheus/client_model v0.0.0-20171117100541-99fa1f4be8e5/go.mod h1:MbSGuTsp3dbXC40dX6PRTWyKYBIrTGTE9sqQNg2J8bo= | ||||
| @ -895,9 +869,6 @@ github.com/prometheus/common v0.4.1/go.mod h1:TNfzLD0ON7rHzMJeJkieUDPYmFC7Snx/y8 | ||||
| github.com/prometheus/common v0.6.0/go.mod h1:eBmuwkDJBwy6iBfxCBob6t6dR6ENT/y+J+Zk0j9GMYc= | ||||
| github.com/prometheus/common v0.9.1/go.mod h1:yhUN8i9wzaXS3w1O07YhxHEBxD+W35wd8bs7vj7HSQ4= | ||||
| github.com/prometheus/common v0.10.0/go.mod h1:Tlit/dnDKsSWFlCLTWaA1cyBgKHSMdTB80sz/V91rCo= | ||||
| github.com/prometheus/common v0.26.0/go.mod h1:M7rCNAaPfAosfx8veZJCuw84e35h3Cfd9VFqTh1DIvc= | ||||
| github.com/prometheus/common v0.32.1/go.mod h1:vu+V0TpY+O6vW9J44gczi3Ap/oXXR10b+M/gUGO4Hls= | ||||
| github.com/prometheus/common v0.37.0/go.mod h1:phzohg0JFMnBEFGxTDbfu3QyL5GI8gTQJFhYO5B3mfA= | ||||
| github.com/prometheus/common v0.42.0 h1:EKsfXEYo4JpWMHH5cg+KOUWeuJSov1Id8zGR8eeI1YM= | ||||
| github.com/prometheus/common v0.42.0/go.mod h1:xBwqVerjNdUDjgODMpudtOMwlOwf2SaTr1yjz4b7Zbc= | ||||
| github.com/prometheus/procfs v0.0.0-20180125133057-cb4147076ac7/go.mod h1:c3At6R/oaqEKCNdg8wHV1ftS6bRYblBhIjjI8uT2IGk= | ||||
| @ -911,21 +882,17 @@ github.com/prometheus/procfs v0.0.8/go.mod h1:7Qr8sr6344vo1JqZ6HhLceV9o3AJ1Ff+Gx | ||||
| github.com/prometheus/procfs v0.1.3/go.mod h1:lV6e/gmhEcM9IjHGsFOCxxuZ+z1YqCvr4OA4YeYWdaU= | ||||
| github.com/prometheus/procfs v0.2.0/go.mod h1:lV6e/gmhEcM9IjHGsFOCxxuZ+z1YqCvr4OA4YeYWdaU= | ||||
| github.com/prometheus/procfs v0.6.0/go.mod h1:cz+aTbrPOrUb4q7XlbU9ygM+/jj0fzG6c1xBZuNvfVA= | ||||
| github.com/prometheus/procfs v0.7.3/go.mod h1:cz+aTbrPOrUb4q7XlbU9ygM+/jj0fzG6c1xBZuNvfVA= | ||||
| github.com/prometheus/procfs v0.8.0/go.mod h1:z7EfXMXOkbkqb9IINtpCn86r/to3BnA0uaxHdg830/4= | ||||
| github.com/prometheus/procfs v0.10.1 h1:kYK1Va/YMlutzCGazswoHKo//tZVlFpKYh+PymziUAg= | ||||
| github.com/prometheus/procfs v0.10.1/go.mod h1:nwNm2aOCAYw8uTR/9bWRREkZFxAUcWzPHWJq+XBB/FM= | ||||
| github.com/prometheus/tsdb v0.7.1/go.mod h1:qhTCs0VvXwvX/y3TZrWD7rabWM+ijKTux40TwIPHuXU= | ||||
| github.com/rivo/uniseg v0.2.0 h1:S1pD9weZBuJdFmowNwbpi7BJ8TNftyUImj/0WQi72jY= | ||||
| github.com/rivo/uniseg v0.2.0/go.mod h1:J6wj4VEh+S6ZtnVlnTBMWIodfgj8LQOQFoIToxlJtxc= | ||||
| github.com/rivo/uniseg v0.4.4 h1:8TfxU8dW6PdqD27gjM8MVNuicgxIjxpm4K7x4jp8sis= | ||||
| github.com/rivo/uniseg v0.4.4/go.mod h1:FN3SvrM+Zdj16jyLfmOkMNblXMcoc8DfTHruCPUcx88= | ||||
| github.com/rogpeppe/fastuuid v0.0.0-20150106093220-6724a57986af/go.mod h1:XWv6SoW27p1b0cqNHllgS5HIMJraePCO15w5zCzIWYg= | ||||
| github.com/rogpeppe/fastuuid v1.2.0/go.mod h1:jVj6XXZzXRy/MSR5jhDC/2q6DgLz+nrA6LYCDYWNEvQ= | ||||
| github.com/rogpeppe/go-charset v0.0.0-20180617210344-2471d30d28b4/go.mod h1:qgYeAmZ5ZIpBWTGllZSQnw97Dj+woV0toclVaRGI8pc= | ||||
| github.com/rogpeppe/go-internal v1.3.0/go.mod h1:M8bDsm7K2OlrFYOpmOWEs/qY81heoFRclV5y23lUDJ4= | ||||
| github.com/rogpeppe/go-internal v1.9.0/go.mod h1:WtVeX8xhTBvf0smdhujwtBcq4Qrzq/fJaraNFVN+nFs= | ||||
| github.com/rogpeppe/go-internal v1.11.0 h1:cWPaGQEPrBb5/AsnsZesgZZ9yb1OQ+GOISoDNXVBh4M= | ||||
| github.com/rogpeppe/go-internal v1.11.0/go.mod h1:ddIwULY96R17DhadqLgMfk9H9tvdUzkipdSkR5nkCZA= | ||||
| github.com/russross/blackfriday v1.6.0 h1:KqfZb0pUVN2lYqZUYRddxF4OR8ZMURnJIG5Y3VRLtww= | ||||
| github.com/russross/blackfriday v1.6.0/go.mod h1:ti0ldHuxg49ri4ksnFxlkCfN+hvslNlmVHqNRXXJNAY= | ||||
| github.com/russross/blackfriday/v2 v2.0.1/go.mod h1:+Rmxgy9KzJVeS9/2gXHxylqXiyQDYRxCVz55jmeOWTM= | ||||
| github.com/russross/blackfriday/v2 v2.1.0 h1:JIOH55/0cWyOuilr9/qlrm0BSXldqnqwMsf35Ld67mk= | ||||
| @ -934,13 +901,12 @@ github.com/ryanuber/columnize v0.0.0-20160712163229-9b3edd62028f/go.mod h1:sm1tb | ||||
| github.com/safchain/ethtool v0.0.0-20190326074333-42ed695e3de8/go.mod h1:Z0q5wiBQGYcxhMZ6gUqHn6pYNLypFAvaL3UvgZLR0U4= | ||||
| github.com/sagikazarmark/crypt v0.3.0/go.mod h1:uD/D+6UF4SrIR1uGEv7bBNkNqLGqUr43MRiaGWX1Nig= | ||||
| github.com/satori/go.uuid v1.2.0/go.mod h1:dA0hQrYB0VpLJoorglMZABFdXlWrHn1NEOzdhQKdks0= | ||||
| github.com/schollz/progressbar/v3 v3.13.1 h1:o8rySDYiQ59Mwzy2FELeHY5ZARXZTVJC7iHD6PEFUiE= | ||||
| github.com/schollz/progressbar/v3 v3.13.1/go.mod h1:xvrbki8kfT1fzWzBT/UZd9L6GA+jdL7HAgq2RFnO6fQ= | ||||
| github.com/schollz/progressbar/v3 v3.14.1 h1:VD+MJPCr4s3wdhTc7OEJ/Z3dAeBzJ7yKH/P4lC5yRTI= | ||||
| github.com/schollz/progressbar/v3 v3.14.1/go.mod h1:Zc9xXneTzWXF81TGoqL71u0sBPjULtEHYtj/WVgVy8E= | ||||
| github.com/sclevine/spec v1.2.0/go.mod h1:W4J29eT/Kzv7/b9IWLB055Z+qvVC9vt0Arko24q7p+U= | ||||
| github.com/sean-/seed v0.0.0-20170313163322-e2103e2c3529/go.mod h1:DxrIzT+xaE7yg65j358z/aeFdxmN0P9QXhEzd20vsDc= | ||||
| github.com/seccomp/libseccomp-golang v0.9.1/go.mod h1:GbW5+tmTXfcxTToHLXlScSlAvWlF4P2Ca7zGrPiEpWo= | ||||
| github.com/seccomp/libseccomp-golang v0.9.2-0.20210429002308-3879420cc921/go.mod h1:JA8cRccbGaA1s33RQf7Y1+q9gHmZX1yB/z9WDN1C6fg= | ||||
| github.com/sergi/go-diff v1.1.0/go.mod h1:STckp+ISIX8hZLjrqAeVduY0gWCT9IjLuqbuNXdaHfM= | ||||
| github.com/sergi/go-diff v1.2.0 h1:XU+rvMAioB0UC3q1MFrIQy4Vo5/4VsRDQQXHsEya6xQ= | ||||
| github.com/sergi/go-diff v1.2.0/go.mod h1:STckp+ISIX8hZLjrqAeVduY0gWCT9IjLuqbuNXdaHfM= | ||||
| github.com/shurcooL/sanitized_anchor_name v1.0.0/go.mod h1:1NzhyTcUVG4SuEtjjoZeVRXNmyL/1OwPU0+IJeTBvfc= | ||||
| @ -952,11 +918,10 @@ github.com/sirupsen/logrus v1.4.2/go.mod h1:tLMulIdttU9McNUspp0xgXVQah82FyeX6Mwd | ||||
| github.com/sirupsen/logrus v1.6.0/go.mod h1:7uNnSEd1DgxDLC74fIahvMZmmYsHGZGEOFrfsX/uA88= | ||||
| github.com/sirupsen/logrus v1.7.0/go.mod h1:yWOB1SBYBC5VeMP7gHvWumXLIWorT60ONWic61uBYv0= | ||||
| github.com/sirupsen/logrus v1.8.1/go.mod h1:yWOB1SBYBC5VeMP7gHvWumXLIWorT60ONWic61uBYv0= | ||||
| github.com/sirupsen/logrus v1.9.0/go.mod h1:naHLuLoDiP4jHNo9R0sCBMtWGeIprob74mVsIT4qYEQ= | ||||
| github.com/sirupsen/logrus v1.9.3 h1:dueUQJ1C2q9oE3F7wvmSGAaVtTmUizReu6fjN8uqzbQ= | ||||
| github.com/sirupsen/logrus v1.9.3/go.mod h1:naHLuLoDiP4jHNo9R0sCBMtWGeIprob74mVsIT4qYEQ= | ||||
| github.com/skeema/knownhosts v1.1.1 h1:MTk78x9FPgDFVFkDLTrsnnfCJl7g1C/nnKvePgrIngE= | ||||
| github.com/skeema/knownhosts v1.1.1/go.mod h1:g4fPeYpque7P0xefxtGzV81ihjC8sX2IqpAoNkjxbMo= | ||||
| github.com/skeema/knownhosts v1.2.0 h1:h9r9cf0+u7wSE+M183ZtMGgOJKiL96brpaz5ekfJCpM= | ||||
| github.com/skeema/knownhosts v1.2.0/go.mod h1:g4fPeYpque7P0xefxtGzV81ihjC8sX2IqpAoNkjxbMo= | ||||
| github.com/smartystreets/assertions v0.0.0-20180927180507-b2de0cb4f26d/go.mod h1:OnSkiWE9lh6wB0YB77sQom3nweQdgAjqCqsofrRNTgc= | ||||
| github.com/smartystreets/goconvey v0.0.0-20190330032615-68dc04aab96a/go.mod h1:syvi0/a8iFYH4r/RixwvyeAJjdLS9QV7WQ/tjFTllLA= | ||||
| github.com/soheilhy/cmux v0.1.4/go.mod h1:IM3LyeVVIOuxMH7sFAkER9+bJ4dT7Ms6E4xg4kGIyLM= | ||||
| @ -996,8 +961,6 @@ github.com/stretchr/objx v0.0.0-20180129172003-8a3f7159479f/go.mod h1:HFkY916IF+ | ||||
| github.com/stretchr/objx v0.1.0/go.mod h1:HFkY916IF+rwdDfMAkV7OtwuqBVzrE8GR6GFx+wExME= | ||||
| github.com/stretchr/objx v0.1.1/go.mod h1:HFkY916IF+rwdDfMAkV7OtwuqBVzrE8GR6GFx+wExME= | ||||
| github.com/stretchr/objx v0.2.0/go.mod h1:qt09Ya8vawLte6SNmTgCsAVtYtaKzEcn8ATUoHMkEqE= | ||||
| github.com/stretchr/objx v0.4.0/go.mod h1:YvHI0jy2hoMjB+UWwv71VJQ9isScKT/TqJzVSSt89Yw= | ||||
| github.com/stretchr/objx v0.5.0/go.mod h1:Yh+to48EsGEfYuaHDzXPcE3xhTkx73EhmCGUpEOglKo= | ||||
| github.com/stretchr/testify v0.0.0-20180303142811-b89eecf5ca5d/go.mod h1:a8OnRcib4nhh0OaRAV+Yts87kKdq0PP7pXfy6kDkUVs= | ||||
| github.com/stretchr/testify v1.2.2/go.mod h1:a8OnRcib4nhh0OaRAV+Yts87kKdq0PP7pXfy6kDkUVs= | ||||
| github.com/stretchr/testify v1.3.0/go.mod h1:M5WIy9Dh21IEIfnGCwXGc5bZfKNJtfHm1UVUgZn+9EI= | ||||
| @ -1005,8 +968,6 @@ github.com/stretchr/testify v1.4.0/go.mod h1:j7eGeouHqKxXV5pUuKE4zz7dFj8WfuZ+81P | ||||
| github.com/stretchr/testify v1.5.1/go.mod h1:5W2xD1RspED5o8YsWQXVCued0rvSQ+mT+I5cxcmMvtA= | ||||
| github.com/stretchr/testify v1.6.1/go.mod h1:6Fq8oRcR53rry900zMqJjRRixrwX3KX962/h/Wwjteg= | ||||
| github.com/stretchr/testify v1.7.0/go.mod h1:6Fq8oRcR53rry900zMqJjRRixrwX3KX962/h/Wwjteg= | ||||
| github.com/stretchr/testify v1.7.1/go.mod h1:6Fq8oRcR53rry900zMqJjRRixrwX3KX962/h/Wwjteg= | ||||
| github.com/stretchr/testify v1.8.0/go.mod h1:yNjHg4UonilssWZ8iaSj1OCr/vHnekPRkoO+kdMU+MU= | ||||
| github.com/stretchr/testify v1.8.4 h1:CcVxjf3Q8PM0mHUKJCdn+eZZtm5yQwehR5yeSVQQcUk= | ||||
| github.com/stretchr/testify v1.8.4/go.mod h1:sz/lmYIOXD/1dqDmKjjqLyZ2RngseejIcXlSw2iwfAo= | ||||
| github.com/subosito/gotenv v1.2.0 h1:Slr1R9HxAlEKefgq5jn9U+DnETlIUa6HfgEzj0g5d7s= | ||||
| @ -1050,7 +1011,6 @@ github.com/xeipuuv/gojsonreference v0.0.0-20180127040603-bd5ef7bd5415/go.mod h1: | ||||
| github.com/xeipuuv/gojsonschema v0.0.0-20180618132009-1d523034197f/go.mod h1:5yf86TLmAcydyeJq5YvxkGPE2fm/u4myDekKRoLuqhs= | ||||
| github.com/xeipuuv/gojsonschema v1.2.0 h1:LhYJRs+L4fBtjZUfuSZIKGeVu0QRy8e5Xi7D17UxZ74= | ||||
| github.com/xeipuuv/gojsonschema v1.2.0/go.mod h1:anYRn/JVcOK2ZgGU+IjEV4nwlhoK5sQluxsYJ78Id3Y= | ||||
| github.com/xhit/go-str2duration v1.2.0/go.mod h1:3cPSlfZlUHVlneIVfePFWcJZsuwf+P1v2SRTV4cUmp4= | ||||
| github.com/xiang90/probing v0.0.0-20190116061207-43a291ad63a2/go.mod h1:UETIi67q53MR2AWcXfiuqkDkRtnGDLqkBTpCHuJHxtU= | ||||
| github.com/xordataexchange/crypt v0.0.3-0.20170626215501-b2862e3d0a77/go.mod h1:aYKd//L2LvnjZzWKhF00oedf4jCCReLcmhLdhm1A27Q= | ||||
| github.com/yuin/goldmark v1.1.25/go.mod h1:3hX8gzYuyVAZsxl0MRgGTJEmQBFcNTphYh9decYSb74= | ||||
| @ -1086,7 +1046,6 @@ go.uber.org/multierr v1.1.0/go.mod h1:wR5kodmAFQ0UK8QlbwjlSNy0Z68gJhDJUG5sjR94q/ | ||||
| go.uber.org/multierr v1.6.0/go.mod h1:cdWPpRnG4AhwMwsgIHip0KRBQjJy5kYEpYjJxpXp9iU= | ||||
| go.uber.org/zap v1.10.0/go.mod h1:vwi/ZaCAaUcBkycHslxD9B2zi4UTXhF60s6SWpuDF0Q= | ||||
| go.uber.org/zap v1.17.0/go.mod h1:MXVU+bhUf/A7Xi2HNOnopQOrmycQ5Ih87HtOu4q5SSo= | ||||
| golang.org/x/arch v0.1.0/go.mod h1:5om86z9Hs0C8fWVUuoMHwpExlXzs5Tkyp9hOrfG7pp8= | ||||
| golang.org/x/crypto v0.0.0-20171113213409-9f005a07e0d3/go.mod h1:6SG95UA2DQfeDnfUPMdvaQW0Q7yPrPDi9nlGo2tz2b4= | ||||
| golang.org/x/crypto v0.0.0-20180904163835-0709b304e793/go.mod h1:6SG95UA2DQfeDnfUPMdvaQW0Q7yPrPDi9nlGo2tz2b4= | ||||
| golang.org/x/crypto v0.0.0-20181009213950-7c1a557ab941/go.mod h1:6SG95UA2DQfeDnfUPMdvaQW0Q7yPrPDi9nlGo2tz2b4= | ||||
| @ -1109,14 +1068,10 @@ golang.org/x/crypto v0.0.0-20210322153248-0c34fe9e7dc2/go.mod h1:T9bdIzuCu7OtxOm | ||||
| golang.org/x/crypto v0.0.0-20210817164053-32db794688a5/go.mod h1:GvvjBRRGRdwPK5ydBHafDWAxML/pGHZbMvKqRZ5+Abc= | ||||
| golang.org/x/crypto v0.0.0-20210921155107-089bfa567519/go.mod h1:GvvjBRRGRdwPK5ydBHafDWAxML/pGHZbMvKqRZ5+Abc= | ||||
| golang.org/x/crypto v0.0.0-20220622213112-05595931fe9d/go.mod h1:IxCIyHEi3zRg3s0A5j5BB6A9Jmi73HwBIUl50j+osU4= | ||||
| golang.org/x/crypto v0.0.0-20220826181053-bd7e27e6170d/go.mod h1:IxCIyHEi3zRg3s0A5j5BB6A9Jmi73HwBIUl50j+osU4= | ||||
| golang.org/x/crypto v0.1.0/go.mod h1:RecgLatLF4+eUMCP1PoPZQb+cVrJcOPbHkTkbkB9sbw= | ||||
| golang.org/x/crypto v0.3.1-0.20221117191849-2c476679df9a/go.mod h1:hebNnKkNXi2UzZN1eVRvBB7co0a+JxK6XbPiWVs/3J4= | ||||
| golang.org/x/crypto v0.7.0/go.mod h1:pYwdfH91IfpZVANVyUOhSIPZaFoJGxTFbZhFTx+dXZU= | ||||
| golang.org/x/crypto v0.8.0/go.mod h1:mRqEX+O9/h5TFCrQhkgjo2yKi0yYA+9ecGkdQoHrywE= | ||||
| golang.org/x/crypto v0.9.0/go.mod h1:yrmDGqONDYtNj3tH8X9dzUun2m2lzPa9ngI6/RUPGR0= | ||||
| golang.org/x/crypto v0.11.0 h1:6Ewdq3tDic1mg5xRO4milcWCfMVQhI4NkqWWvqejpuA= | ||||
| golang.org/x/crypto v0.11.0/go.mod h1:xgJhtzW8F9jGdVFWZESrid1U1bjeNy4zgy5cRr/CIio= | ||||
| golang.org/x/crypto v0.14.0 h1:wBqGXzWJW6m1XrIKlAH0Hs1JJ7+9KBwnIO8v66Q9cHc= | ||||
| golang.org/x/crypto v0.14.0/go.mod h1:MVFd36DqK4CsrnJYDkBA3VC4m2GkXAM0PvzMCn4JQf4= | ||||
| golang.org/x/exp v0.0.0-20190121172915-509febef88a4/go.mod h1:CJ0aWSM057203Lf6IL+f9T1iT9GByDxfZKAQTCR3kQA= | ||||
| golang.org/x/exp v0.0.0-20190306152737-a1d7652674e8/go.mod h1:CJ0aWSM057203Lf6IL+f9T1iT9GByDxfZKAQTCR3kQA= | ||||
| golang.org/x/exp v0.0.0-20190510132918-efd6b22b2522/go.mod h1:ZjyILWgesfNpC6sMxTJOJm9Kp84zZh5NQWvqDGG3Qr8= | ||||
| @ -1154,9 +1109,9 @@ golang.org/x/mod v0.4.1/go.mod h1:s0Qsj1ACt9ePp/hMypM3fl4fZqREWJwdYDEqhRiZZUA= | ||||
| golang.org/x/mod v0.4.2/go.mod h1:s0Qsj1ACt9ePp/hMypM3fl4fZqREWJwdYDEqhRiZZUA= | ||||
| golang.org/x/mod v0.5.0/go.mod h1:5OXOZSfqPIIbmVBIIKWRFfZjPR0E5r58TLhUjH0a2Ro= | ||||
| golang.org/x/mod v0.6.0-dev.0.20220419223038-86c51ed26bb4/go.mod h1:jJ57K6gSWd91VN4djpZkiMVwK6gcyfeH4XE8wZrZaV4= | ||||
| golang.org/x/mod v0.6.0/go.mod h1:4mET923SAdbXp2ki8ey+zGs1SLqsuM2Y0uvdZR/fUNI= | ||||
| golang.org/x/mod v0.8.0/go.mod h1:iBbtSCu2XBx23ZKBPSOrRkjjQPZFPuis4dIYUhu/chs= | ||||
| golang.org/x/mod v0.9.0/go.mod h1:iBbtSCu2XBx23ZKBPSOrRkjjQPZFPuis4dIYUhu/chs= | ||||
| golang.org/x/mod v0.12.0 h1:rmsUpXtvNzj340zd98LZ4KntptpfRHwpFOHG188oHXc= | ||||
| golang.org/x/mod v0.12.0/go.mod h1:iBbtSCu2XBx23ZKBPSOrRkjjQPZFPuis4dIYUhu/chs= | ||||
| golang.org/x/net v0.0.0-20180724234803-3673e40ba225/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4= | ||||
| golang.org/x/net v0.0.0-20180826012351-8a410e7b638d/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4= | ||||
| golang.org/x/net v0.0.0-20180906233101-161cd47e91fd/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4= | ||||
| @ -1207,23 +1162,15 @@ golang.org/x/net v0.0.0-20210316092652-d523dce5a7f4/go.mod h1:RBQZq4jEuRlivfhVLd | ||||
| golang.org/x/net v0.0.0-20210405180319-a5a99cb37ef4/go.mod h1:p54w0d4576C0XHj96bSt6lcn1PtDYWL6XObtHCRCNQM= | ||||
| golang.org/x/net v0.0.0-20210410081132-afb366fc7cd1/go.mod h1:9tjilg8BloeKEkVJvy7fQ90B1CfIiPueXVOjqfkSzI8= | ||||
| golang.org/x/net v0.0.0-20210503060351-7fd8e65b6420/go.mod h1:9nx3DQGgdP8bBQD5qxJ1jj9UTztislL4KSBs9R2vV5Y= | ||||
| golang.org/x/net v0.0.0-20210525063256-abc453219eb5/go.mod h1:9nx3DQGgdP8bBQD5qxJ1jj9UTztislL4KSBs9R2vV5Y= | ||||
| golang.org/x/net v0.0.0-20210813160813-60bc85c4be6d/go.mod h1:9nx3DQGgdP8bBQD5qxJ1jj9UTztislL4KSBs9R2vV5Y= | ||||
| golang.org/x/net v0.0.0-20210825183410-e898025ed96a/go.mod h1:9nx3DQGgdP8bBQD5qxJ1jj9UTztislL4KSBs9R2vV5Y= | ||||
| golang.org/x/net v0.0.0-20211112202133-69e39bad7dc2/go.mod h1:9nx3DQGgdP8bBQD5qxJ1jj9UTztislL4KSBs9R2vV5Y= | ||||
| golang.org/x/net v0.0.0-20220127200216-cd36cc0744dd/go.mod h1:CfG3xpIq0wQ8r1q4Su4UZFWDARRcnwPjda9FqA0JpMk= | ||||
| golang.org/x/net v0.0.0-20220225172249-27dd8689420f/go.mod h1:CfG3xpIq0wQ8r1q4Su4UZFWDARRcnwPjda9FqA0JpMk= | ||||
| golang.org/x/net v0.0.0-20220722155237-a158d28d115b/go.mod h1:XRhObCWvk6IyKnWLug+ECip1KBveYUHfp+8e9klMJ9c= | ||||
| golang.org/x/net v0.0.0-20220826154423-83b083e8dc8b/go.mod h1:YDH+HFinaLZZlnHAfSS6ZXJJ9M9t4Dl22yv3iI2vPwk= | ||||
| golang.org/x/net v0.1.0/go.mod h1:Cx3nUiGt4eDBEyega/BKRp+/AlGL8hYe7U9odMt2Cco= | ||||
| golang.org/x/net v0.2.0/go.mod h1:KqCZLdyyvdV855qA2rE3GC2aiw5xGR5TEjj8smXukLY= | ||||
| golang.org/x/net v0.6.0/go.mod h1:2Tu9+aMcznHK/AK1HMvgo6xiTLG5rD5rZLDS+rp2Bjs= | ||||
| golang.org/x/net v0.7.0/go.mod h1:2Tu9+aMcznHK/AK1HMvgo6xiTLG5rD5rZLDS+rp2Bjs= | ||||
| golang.org/x/net v0.8.0/go.mod h1:QVkue5JL9kW//ek3r6jTKnTFis1tRmNAW2P1shuFdJc= | ||||
| golang.org/x/net v0.9.0/go.mod h1:d48xBJpPfHeWQsugry2m+kC02ZBRGRgulfHnEXEuWns= | ||||
| golang.org/x/net v0.10.0/go.mod h1:0qNGK6F8kojg2nk9dLZ2mShWaEBan6FAoqfSigmmuDg= | ||||
| golang.org/x/net v0.12.0 h1:cfawfvKITfUsFCeJIHJrbSxpeu/E81khclypR0GVT50= | ||||
| golang.org/x/net v0.12.0/go.mod h1:zEVYFnQC7m/vmpQFELhcD1EWkZlX69l4oqgmer6hfKA= | ||||
| golang.org/x/net v0.17.0 h1:pVaXccu2ozPjCXewfr1S7xza/zcXTity9cCdXQYSjIM= | ||||
| golang.org/x/net v0.17.0/go.mod h1:NxSsAGuq816PNPmqtQdLE42eU2Fs7NoRIZrHJAlaCOE= | ||||
| golang.org/x/oauth2 v0.0.0-20180821212333-d2e6202438be/go.mod h1:N/0e6XlmueqKjAGxoOufVs8QHGRruUQn6yWY3a++T0U= | ||||
| golang.org/x/oauth2 v0.0.0-20190226205417-e64efc72b421/go.mod h1:gOpvHmFTYa4IltrdGE7lF6nIHvwfUNPOp7c8zoXwtLw= | ||||
| golang.org/x/oauth2 v0.0.0-20190604053449-0f29369cfe45/go.mod h1:gOpvHmFTYa4IltrdGE7lF6nIHvwfUNPOp7c8zoXwtLw= | ||||
| @ -1241,8 +1188,6 @@ golang.org/x/oauth2 v0.0.0-20210805134026-6f1e6394065a/go.mod h1:KelEdhl1UZF7XfJ | ||||
| golang.org/x/oauth2 v0.0.0-20210819190943-2bc19b11175f/go.mod h1:KelEdhl1UZF7XfJ4dDtk6s++YSgaE7mD/BuKKDLBl4A= | ||||
| golang.org/x/oauth2 v0.0.0-20211005180243-6b3c2da341f1/go.mod h1:KelEdhl1UZF7XfJ4dDtk6s++YSgaE7mD/BuKKDLBl4A= | ||||
| golang.org/x/oauth2 v0.0.0-20211104180415-d3ed0bb246c8/go.mod h1:KelEdhl1UZF7XfJ4dDtk6s++YSgaE7mD/BuKKDLBl4A= | ||||
| golang.org/x/oauth2 v0.0.0-20220223155221-ee480838109b/go.mod h1:DAh4E804XQdzx2j+YRIaUnCqCV2RuMz24cGBJ5QYIrc= | ||||
| golang.org/x/oauth2 v0.5.0/go.mod h1:9/XBHVqLaWO3/BRHs5jbpYCnOZVjj5V0ndyaAM7KB4I= | ||||
| golang.org/x/sync v0.0.0-20180314180146-1d60e4601c6f/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM= | ||||
| golang.org/x/sync v0.0.0-20181108010431-42b317875d0f/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM= | ||||
| golang.org/x/sync v0.0.0-20181221193216-37e7f081c4d4/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM= | ||||
| @ -1254,11 +1199,10 @@ golang.org/x/sync v0.0.0-20200625203802-6e8e738ad208/go.mod h1:RxMgew5VJxzue5/jJ | ||||
| golang.org/x/sync v0.0.0-20201020160332-67f06af15bc9/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM= | ||||
| golang.org/x/sync v0.0.0-20201207232520-09787c993a3a/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM= | ||||
| golang.org/x/sync v0.0.0-20210220032951-036812b2e83c/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM= | ||||
| golang.org/x/sync v0.0.0-20220601150217-0de741cfad7f/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM= | ||||
| golang.org/x/sync v0.0.0-20220722155255-886fb9371eb4/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM= | ||||
| golang.org/x/sync v0.1.0/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM= | ||||
| golang.org/x/sync v0.2.0 h1:PUR+T4wwASmuSTYdKjYHI5TD22Wy5ogLU5qZCOLxBrI= | ||||
| golang.org/x/sync v0.2.0/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM= | ||||
| golang.org/x/sync v0.3.0 h1:ftCYgMx6zT/asHUrPw8BLLscYtGznsLAnjq5RH9P66E= | ||||
| golang.org/x/sync v0.3.0/go.mod h1:FU7BRWz2tNW+3quACPkgCx/L+uEAv1htQ0V83Z9Rj+Y= | ||||
| golang.org/x/sys v0.0.0-20180823144017-11551d06cbcc/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY= | ||||
| golang.org/x/sys v0.0.0-20180830151530-49385e6e1522/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY= | ||||
| golang.org/x/sys v0.0.0-20180905080454-ebe1bf3edb33/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY= | ||||
| @ -1318,7 +1262,6 @@ golang.org/x/sys v0.0.0-20200515095857-1151b9dac4a9/go.mod h1:h1NjWce9XRLGQEsW7w | ||||
| golang.org/x/sys v0.0.0-20200523222454-059865788121/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= | ||||
| golang.org/x/sys v0.0.0-20200615200032-f1bc736245b1/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= | ||||
| golang.org/x/sys v0.0.0-20200622214017-ed371f2e16b4/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= | ||||
| golang.org/x/sys v0.0.0-20200625212154-ddb9806d33ae/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= | ||||
| golang.org/x/sys v0.0.0-20200728102440-3e129f6d46b1/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= | ||||
| golang.org/x/sys v0.0.0-20200803210538-64077c9b5642/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= | ||||
| golang.org/x/sys v0.0.0-20200817155316-9781c653f443/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= | ||||
| @ -1349,7 +1292,6 @@ golang.org/x/sys v0.0.0-20210423082822-04245dca01da/go.mod h1:h1NjWce9XRLGQEsW7w | ||||
| golang.org/x/sys v0.0.0-20210426230700-d19ff857e887/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= | ||||
| golang.org/x/sys v0.0.0-20210510120138-977fb7262007/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg= | ||||
| golang.org/x/sys v0.0.0-20210514084401-e8d321eab015/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg= | ||||
| golang.org/x/sys v0.0.0-20210603081109-ebe580a85c40/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg= | ||||
| golang.org/x/sys v0.0.0-20210603125802-9665404d3644/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg= | ||||
| golang.org/x/sys v0.0.0-20210615035016-665e8c7367d1/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg= | ||||
| golang.org/x/sys v0.0.0-20210616094352-59db8d763f22/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg= | ||||
| @ -1366,34 +1308,23 @@ golang.org/x/sys v0.0.0-20211116061358-0a5406a5449c/go.mod h1:oPkhp1MJrh7nUepCBc | ||||
| golang.org/x/sys v0.0.0-20211124211545-fe61309f8881/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg= | ||||
| golang.org/x/sys v0.0.0-20211205182925-97ca703d548d/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg= | ||||
| golang.org/x/sys v0.0.0-20211216021012-1d35b9e2eb4e/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg= | ||||
| golang.org/x/sys v0.0.0-20220114195835-da31bd327af9/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg= | ||||
| golang.org/x/sys v0.0.0-20220520151302-bc2c85ada10a/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg= | ||||
| golang.org/x/sys v0.0.0-20220715151400-c0bba94af5f8/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg= | ||||
| golang.org/x/sys v0.0.0-20220722155257-8c9f86f7a55f/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg= | ||||
| golang.org/x/sys v0.0.0-20220728004956-3c1f35247d10/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg= | ||||
| golang.org/x/sys v0.0.0-20220811171246-fbc7d0a398ab/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg= | ||||
| golang.org/x/sys v0.0.0-20220825204002-c680a09ffe64/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg= | ||||
| golang.org/x/sys v0.1.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg= | ||||
| golang.org/x/sys v0.2.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg= | ||||
| golang.org/x/sys v0.3.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg= | ||||
| golang.org/x/sys v0.5.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg= | ||||
| golang.org/x/sys v0.6.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg= | ||||
| golang.org/x/sys v0.7.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg= | ||||
| golang.org/x/sys v0.8.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg= | ||||
| golang.org/x/sys v0.10.0 h1:SqMFp9UcQJZa+pmYuAKjd9xq1f0j5rLcDIk0mj4qAsA= | ||||
| golang.org/x/sys v0.10.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg= | ||||
| golang.org/x/sys v0.14.0 h1:Vz7Qs629MkJkGyHxUlRHizWJRG2j8fbQKjELVSNhy7Q= | ||||
| golang.org/x/sys v0.14.0/go.mod h1:/VUhepiaJMQUp4+oa/7Zr1D23ma6VTLIYjOOTFZPUcA= | ||||
| golang.org/x/term v0.0.0-20201117132131-f5c789dd3221/go.mod h1:Nr5EML6q2oocZ2LXRh80K7BxOlk5/8JxuGnuhpl+muw= | ||||
| golang.org/x/term v0.0.0-20201126162022-7de9c90e9dd1/go.mod h1:bj7SfCRtBDWHUb9snDiAeCFNEtKQo2Wmx5Cou7ajbmo= | ||||
| golang.org/x/term v0.0.0-20210927222741-03fcf44c2211/go.mod h1:jbD1KX2456YbFQfuXm/mYQcufACuNUgVhRMnK/tPxf8= | ||||
| golang.org/x/term v0.0.0-20220722155259-a9ba230a4035/go.mod h1:jbD1KX2456YbFQfuXm/mYQcufACuNUgVhRMnK/tPxf8= | ||||
| golang.org/x/term v0.1.0/go.mod h1:jbD1KX2456YbFQfuXm/mYQcufACuNUgVhRMnK/tPxf8= | ||||
| golang.org/x/term v0.2.0/go.mod h1:TVmDHMZPmdnySmBfhjOoOdhjzdE1h4u1VwSiw2l1Nuc= | ||||
| golang.org/x/term v0.5.0/go.mod h1:jMB1sMXY+tzblOD4FWmEbocvup2/aLOaQEp7JmGp78k= | ||||
| golang.org/x/term v0.6.0/go.mod h1:m6U89DPEgQRMq3DNkDClhWw02AUbt2daBVO4cn4Hv9U= | ||||
| golang.org/x/term v0.7.0/go.mod h1:P32HKFT3hSsZrRxla30E9HqToFYAQPCMs/zFMBUFqPY= | ||||
| golang.org/x/term v0.8.0/go.mod h1:xPskH00ivmX89bAKVGSKKtLOWNx2+17Eiy94tnKShWo= | ||||
| golang.org/x/term v0.10.0 h1:3R7pNqamzBraeqj/Tj8qt1aQ2HpmlC+Cx/qL/7hn4/c= | ||||
| golang.org/x/term v0.10.0/go.mod h1:lpqdcUyK/oCiQxvxVrppt5ggO2KCZ5QblwqPnfZ6d5o= | ||||
| golang.org/x/term v0.14.0 h1:LGK9IlZ8T9jvdy6cTdfKUCltatMFOehAQo9SRC46UQ8= | ||||
| golang.org/x/term v0.14.0/go.mod h1:TySc+nGkYR6qt8km8wUhuFRTVSMIX3XPR58y2lC8vww= | ||||
| golang.org/x/text v0.0.0-20170915032832-14c0d48ead0c/go.mod h1:NqM8EUOU14njkJ3fqMW+pc6Ldnwhi/IjpwHt7yyuwOQ= | ||||
| golang.org/x/text v0.3.0/go.mod h1:NqM8EUOU14njkJ3fqMW+pc6Ldnwhi/IjpwHt7yyuwOQ= | ||||
| golang.org/x/text v0.3.1-0.20180807135948-17ff2d5776d2/go.mod h1:NqM8EUOU14njkJ3fqMW+pc6Ldnwhi/IjpwHt7yyuwOQ= | ||||
| @ -1406,9 +1337,8 @@ golang.org/x/text v0.3.7/go.mod h1:u+2+/6zg+i71rQMx5EYifcz6MCKuco9NR6JIITiCfzQ= | ||||
| golang.org/x/text v0.4.0/go.mod h1:mrYo+phRRbMaCq/xk9113O4dZlRixOauAjOtrjsXDZ8= | ||||
| golang.org/x/text v0.7.0/go.mod h1:mrYo+phRRbMaCq/xk9113O4dZlRixOauAjOtrjsXDZ8= | ||||
| golang.org/x/text v0.8.0/go.mod h1:e1OnstbJyHTd6l/uOt8jFFHp6TRDWZR/bV3emEE/zU8= | ||||
| golang.org/x/text v0.9.0/go.mod h1:e1OnstbJyHTd6l/uOt8jFFHp6TRDWZR/bV3emEE/zU8= | ||||
| golang.org/x/text v0.11.0 h1:LAntKIrcmeSKERyiOh0XMV39LXS8IE9UL2yP7+f5ij4= | ||||
| golang.org/x/text v0.11.0/go.mod h1:TvPlkZtksWOMsz7fbANvkp4WM8x/WCo/om8BMLbz+aE= | ||||
| golang.org/x/text v0.13.0 h1:ablQoSUd0tRdKxZewP80B+BaqeKJuVhuRxj/dkrun3k= | ||||
| golang.org/x/text v0.13.0/go.mod h1:TvPlkZtksWOMsz7fbANvkp4WM8x/WCo/om8BMLbz+aE= | ||||
| golang.org/x/time v0.0.0-20180412165947-fbb02b2291d2/go.mod h1:tRJNPiyCQ0inRvYxbN9jk5I+vvW/OXSQhTDSoE431IQ= | ||||
| golang.org/x/time v0.0.0-20181108054448-85acf8d2951c/go.mod h1:tRJNPiyCQ0inRvYxbN9jk5I+vvW/OXSQhTDSoE431IQ= | ||||
| golang.org/x/time v0.0.0-20190308202827-9d24e82272b4/go.mod h1:tRJNPiyCQ0inRvYxbN9jk5I+vvW/OXSQhTDSoE431IQ= | ||||
| @ -1481,8 +1411,9 @@ golang.org/x/tools v0.1.3/go.mod h1:o0xws9oXOQQZyjljx8fwUC0k7L1pTE6eaCbjGeHmOkk= | ||||
| golang.org/x/tools v0.1.4/go.mod h1:o0xws9oXOQQZyjljx8fwUC0k7L1pTE6eaCbjGeHmOkk= | ||||
| golang.org/x/tools v0.1.5/go.mod h1:o0xws9oXOQQZyjljx8fwUC0k7L1pTE6eaCbjGeHmOkk= | ||||
| golang.org/x/tools v0.1.12/go.mod h1:hNGJHUnrk76NpqgfD5Aqm5Crs+Hm0VOH/i9J2+nxYbc= | ||||
| golang.org/x/tools v0.2.0/go.mod h1:y4OqIKeOV/fWJetJ8bXPU1sEVniLMIyDAZWeHdV+NTA= | ||||
| golang.org/x/tools v0.6.0/go.mod h1:Xwgl3UAJ/d3gWutnCtw505GrjyAbvKui8lOU390QaIU= | ||||
| golang.org/x/tools v0.13.0 h1:Iey4qkscZuv0VvIt8E0neZjtPVQFSc870HQ448QgEmQ= | ||||
| golang.org/x/tools v0.13.0/go.mod h1:HvlwmtVNQAhOuCjW7xxvovg8wbNq7LwfXh/k7wXUl58= | ||||
| golang.org/x/xerrors v0.0.0-20190717185122-a985d3407aa7/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0= | ||||
| golang.org/x/xerrors v0.0.0-20191011141410-1b5146add898/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0= | ||||
| golang.org/x/xerrors v0.0.0-20191204190536-9bdfabe68543/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0= | ||||
| @ -1641,8 +1572,6 @@ google.golang.org/protobuf v1.25.0/go.mod h1:9JNX74DMeImyA3h4bdi1ymwjUzf21/xIlba | ||||
| google.golang.org/protobuf v1.26.0-rc.1/go.mod h1:jlhhOSvTdKEhbULTjvd4ARK9grFBp09yW+WbY/TyQbw= | ||||
| google.golang.org/protobuf v1.26.0/go.mod h1:9q0QmTI4eRPtz6boOQmLYwt+qCgq0jsYwAQnmE0givc= | ||||
| google.golang.org/protobuf v1.27.1/go.mod h1:9q0QmTI4eRPtz6boOQmLYwt+qCgq0jsYwAQnmE0givc= | ||||
| google.golang.org/protobuf v1.28.0/go.mod h1:HV8QOd/L58Z+nl8r43ehVNZIU/HEI6OcFqwMG9pJV4I= | ||||
| google.golang.org/protobuf v1.28.1/go.mod h1:HV8QOd/L58Z+nl8r43ehVNZIU/HEI6OcFqwMG9pJV4I= | ||||
| google.golang.org/protobuf v1.30.0 h1:kPPoIgf3TsEvrm0PFe15JQ+570QVxYzEvvHqChK+cng= | ||||
| google.golang.org/protobuf v1.30.0/go.mod h1:HV8QOd/L58Z+nl8r43ehVNZIU/HEI6OcFqwMG9pJV4I= | ||||
| gopkg.in/airbrake/gobrake.v2 v2.0.9/go.mod h1:/h5ZAUhDkGaJfjzjKLSjv6zCL6O0LLBxU4K+aSYdM/U= | ||||
| @ -1687,12 +1616,11 @@ gopkg.in/yaml.v3 v3.0.0-20200313102051-9f266ea9e77c/go.mod h1:K4uyk7z7BCEPqu6E+C | ||||
| gopkg.in/yaml.v3 v3.0.0-20210107192922-496545a6307b/go.mod h1:K4uyk7z7BCEPqu6E+C64Yfv1cQ7kz7rIZviUmN+EgEM= | ||||
| gopkg.in/yaml.v3 v3.0.1 h1:fxVm/GzAzEWqLHuvctI91KS9hhNmmWOoWu0XTYJS7CA= | ||||
| gopkg.in/yaml.v3 v3.0.1/go.mod h1:K4uyk7z7BCEPqu6E+C64Yfv1cQ7kz7rIZviUmN+EgEM= | ||||
| gotest.tools v2.2.0+incompatible h1:VsBPFP1AI068pPrMxtb/S8Zkgf9xEmTLJjfM+P5UIEo= | ||||
| gotest.tools v2.2.0+incompatible/go.mod h1:DsYFclhRJ6vuDpmuTbkuFWG+y2sxOXAzmJt81HFBacw= | ||||
| gotest.tools/v3 v3.0.2/go.mod h1:3SzNCllyD9/Y+b5r9JIKQ474KzkZyqLqEfYqMsX94Bk= | ||||
| gotest.tools/v3 v3.0.3/go.mod h1:Z7Lb0S5l+klDB31fvDQX8ss/FlKDxtlFlw3Oa8Ymbl8= | ||||
| gotest.tools/v3 v3.5.0 h1:Ljk6PdHdOhAb5aDMWXjDLMMhph+BpztA4v1QdqEW2eY= | ||||
| gotest.tools/v3 v3.5.0/go.mod h1:isy3WKz7GK6uNw/sbHzfKBLvlvXwUyV06n6brMxxopU= | ||||
| gotest.tools/v3 v3.5.1 h1:EENdUnS3pdur5nybKYIh2Vfgc8IUNBjxDPSjtiJcOzU= | ||||
| gotest.tools/v3 v3.5.1/go.mod h1:isy3WKz7GK6uNw/sbHzfKBLvlvXwUyV06n6brMxxopU= | ||||
| honnef.co/go/tools v0.0.0-20190102054323-c2f93a96b099/go.mod h1:rf3lG4BRIbNafJWhAfAdb/ePZxsR/4RtNHQocxwk9r4= | ||||
| honnef.co/go/tools v0.0.0-20190106161140-3f1c8253044a/go.mod h1:rf3lG4BRIbNafJWhAfAdb/ePZxsR/4RtNHQocxwk9r4= | ||||
| honnef.co/go/tools v0.0.0-20190418001031-e561f6794a2a/go.mod h1:rf3lG4BRIbNafJWhAfAdb/ePZxsR/4RtNHQocxwk9r4= | ||||
| @ -1731,7 +1659,6 @@ k8s.io/kube-openapi v0.0.0-20201113171705-d219536bb9fd/go.mod h1:WOJ3KddDSol4tAG | ||||
| k8s.io/kubernetes v1.13.0/go.mod h1:ocZa8+6APFNC2tX1DZASIbocyYT5jHzqFVsY5aoB7Jk= | ||||
| k8s.io/utils v0.0.0-20201110183641-67b214c5f920/go.mod h1:jPW/WVKK9YHAvNhRxK0md/EJ228hCsBRufyofKtW8HA= | ||||
| rsc.io/binaryregexp v0.2.0/go.mod h1:qTv7/COck+e2FymRvadv62gMdZztPaShugOCi3I+8D8= | ||||
| rsc.io/pdf v0.1.1/go.mod h1:n8OzWcQ6Sp37PL01nO98y4iUCRdTGarVfzxY20ICaU4= | ||||
| rsc.io/quote/v3 v3.1.0/go.mod h1:yEA65RcK8LyAZtP9Kv3t0HmxON59tX3rD+tICJqUlj0= | ||||
| rsc.io/sampler v1.3.0/go.mod h1:T1hPZKmBbMNahiBKFy5HrXp6adAjACjK9JXDnKaTXpA= | ||||
| sigs.k8s.io/apiserver-network-proxy/konnectivity-client v0.0.14/go.mod h1:LEScyzhFmoF5pso/YSeBstl57mOzx9xlU9n85RGrDQg= | ||||
|  | ||||
| @ -5,7 +5,6 @@ import ( | ||||
|  | ||||
| 	"coopcloud.tech/abra/pkg/config" | ||||
| 	"coopcloud.tech/abra/pkg/recipe" | ||||
| 	"coopcloud.tech/abra/pkg/runtime" | ||||
| 	"github.com/sirupsen/logrus" | ||||
| 	"github.com/urfave/cli" | ||||
| ) | ||||
| @ -26,14 +25,19 @@ func AppNameComplete(c *cli.Context) { | ||||
| 	} | ||||
| } | ||||
|  | ||||
| func ServiceNameComplete(appName string) { | ||||
| 	serviceNames, err := config.GetAppServiceNames(appName) | ||||
| 	if err != nil { | ||||
| 		return | ||||
| 	} | ||||
| 	for _, s := range serviceNames { | ||||
| 		fmt.Println(s) | ||||
| 	} | ||||
| } | ||||
|  | ||||
| // RecipeNameComplete completes recipe names. | ||||
| func RecipeNameComplete(c *cli.Context) { | ||||
| 	// defaults since we can't take arguments here... this means auto-completion | ||||
| 	// of recipe names always access the network if e.g. the catalogue needs | ||||
| 	// cloning / updating | ||||
| 	conf := runtime.New() | ||||
|  | ||||
| 	catl, err := recipe.ReadRecipeCatalogue(conf) | ||||
| 	catl, err := recipe.ReadRecipeCatalogue(false) | ||||
| 	if err != nil { | ||||
| 		logrus.Warn(err) | ||||
| 	} | ||||
| @ -74,7 +78,6 @@ func SubcommandComplete(c *cli.Context) { | ||||
| 		"autocomplete", | ||||
| 		"catalogue", | ||||
| 		"recipe", | ||||
| 		"record", | ||||
| 		"server", | ||||
| 		"upgrade", | ||||
| 	} | ||||
|  | ||||
| @ -8,58 +8,15 @@ import ( | ||||
|  | ||||
| 	"coopcloud.tech/abra/pkg/config" | ||||
| 	gitPkg "coopcloud.tech/abra/pkg/git" | ||||
| 	"coopcloud.tech/abra/pkg/runtime" | ||||
| 	"github.com/go-git/go-git/v5" | ||||
| 	"github.com/sirupsen/logrus" | ||||
| ) | ||||
|  | ||||
| // CatalogueSkipList is all the repos that are not recipes. | ||||
| var CatalogueSkipList = map[string]bool{ | ||||
| 	"abra":                        true, | ||||
| 	"abra-apps":                   true, | ||||
| 	"abra-aur":                    true, | ||||
| 	"abra-bash":                   true, | ||||
| 	"abra-capsul":                 true, | ||||
| 	"abra-gandi":                  true, | ||||
| 	"abra-hetzner":                true, | ||||
| 	"apps":                        true, | ||||
| 	"aur-abra-git":                true, | ||||
| 	"auto-recipes-catalogue-json": true, | ||||
| 	"auto-mirror":                 true, | ||||
| 	"backup-bot":                  true, | ||||
| 	"backup-bot-two":              true, | ||||
| 	"beta.coopcloud.tech":         true, | ||||
| 	"comrade-renovate-bot":        true, | ||||
| 	"coopcloud.tech":              true, | ||||
| 	"coturn":                      true, | ||||
| 	"docker-cp-deploy":            true, | ||||
| 	"docker-dind-bats-kcov":       true, | ||||
| 	"docs.coopcloud.tech":         true, | ||||
| 	"drone-abra":                  true, | ||||
| 	"example":                     true, | ||||
| 	"gardening":                   true, | ||||
| 	"go-abra":                     true, | ||||
| 	"organising":                  true, | ||||
| 	"pyabra":                      true, | ||||
| 	"radicle-seed-node":           true, | ||||
| 	"recipes-catalogue-json":      true, | ||||
| 	"recipes-wishlist":            true, | ||||
| 	"recipes.coopcloud.tech":      true, | ||||
| 	"stack-ssh-deploy":            true, | ||||
| 	"swarm-cronjob":               true, | ||||
| 	"tagcmp":                      true, | ||||
| 	"traefik-cert-dumper":         true, | ||||
| 	"tyop":                        true, | ||||
| } | ||||
|  | ||||
| // EnsureCatalogue ensures that the catalogue is cloned locally & present. | ||||
| func EnsureCatalogue(conf *runtime.Config) error { | ||||
| func EnsureCatalogue() error { | ||||
| 	catalogueDir := path.Join(config.ABRA_DIR, "catalogue") | ||||
| 	if _, err := os.Stat(catalogueDir); err != nil && os.IsNotExist(err) { | ||||
| 		if conf.Offline { | ||||
| 			return fmt.Errorf("no local copy of the catalogue available, network access required") | ||||
| 		} | ||||
|  | ||||
| 		logrus.Warnf("local recipe catalogue is missing, retrieving now") | ||||
| 		url := fmt.Sprintf("%s/%s.git", config.REPOS_BASE_URL, config.CATALOGUE_JSON_REPO_NAME) | ||||
| 		if err := gitPkg.Clone(catalogueDir, url); err != nil { | ||||
| 			return err | ||||
| @ -71,9 +28,8 @@ func EnsureCatalogue(conf *runtime.Config) error { | ||||
| 	return nil | ||||
| } | ||||
|  | ||||
| // EnsureUpToDate ensures that the local catalogue has no unstaged changes as | ||||
| // is up to date. This is useful to run before doing catalogue generation. | ||||
| func EnsureUpToDate(conf *runtime.Config) error { | ||||
| // EnsureIsClean makes sure that the catalogue has no unstaged changes. | ||||
| func EnsureIsClean() error { | ||||
| 	isClean, err := gitPkg.IsClean(config.CATALOGUE_DIR) | ||||
| 	if err != nil { | ||||
| 		return err | ||||
| @ -84,11 +40,11 @@ func EnsureUpToDate(conf *runtime.Config) error { | ||||
| 		return fmt.Errorf(msg, config.CATALOGUE_DIR) | ||||
| 	} | ||||
|  | ||||
| 	if conf.Offline { | ||||
| 		logrus.Debug("attempting to use local catalogue without access network (\"--offline\")") | ||||
| 		return nil | ||||
| 	} | ||||
| 	return nil | ||||
| } | ||||
|  | ||||
| // EnsureUpToDate ensures that the local catalogue is up to date. | ||||
| func EnsureUpToDate() error { | ||||
| 	repo, err := git.PlainOpen(config.CATALOGUE_DIR) | ||||
| 	if err != nil { | ||||
| 		return err | ||||
|  | ||||
| @ -122,7 +122,7 @@ func UpdateLabel(pattern, serviceName, label, recipeName string) error { | ||||
|  | ||||
| 		discovered := false | ||||
| 		for oldLabel, value := range service.Deploy.Labels { | ||||
| 			if strings.HasPrefix(oldLabel, "coop-cloud") { | ||||
| 			if strings.HasPrefix(oldLabel, "coop-cloud") && strings.Contains(oldLabel, "version") { | ||||
| 				discovered = true | ||||
|  | ||||
| 				bytes, err := ioutil.ReadFile(composeFile) | ||||
|  | ||||
| @ -25,6 +25,9 @@ import ( | ||||
| // AppEnv is a map of the values in an apps env config | ||||
| type AppEnv = map[string]string | ||||
|  | ||||
| // AppModifiers is a map of modifiers in an apps env config | ||||
| type AppModifiers = map[string]map[string]string | ||||
|  | ||||
| // AppName is AppName | ||||
| type AppName = string | ||||
|  | ||||
| @ -47,36 +50,63 @@ type App struct { | ||||
| 	Path   string | ||||
| } | ||||
|  | ||||
| // StackName gets whatever the docker safe (uses the right delimiting | ||||
| // character, e.g. "_") stack name is for the app. In general, you don't want | ||||
| // to use this to show anything to end-users, you want use a.Name instead. | ||||
| // See documentation of config.StackName | ||||
| func (a App) StackName() string { | ||||
| 	if _, exists := a.Env["STACK_NAME"]; exists { | ||||
| 		return a.Env["STACK_NAME"] | ||||
| 	} | ||||
|  | ||||
| 	stackName := SanitiseAppName(a.Name) | ||||
|  | ||||
| 	if len(stackName) > 45 { | ||||
| 		logrus.Debugf("trimming %s to %s to avoid runtime limits", stackName, stackName[:45]) | ||||
| 		stackName = stackName[:45] | ||||
| 	} | ||||
| 	stackName := StackName(a.Name) | ||||
|  | ||||
| 	a.Env["STACK_NAME"] = stackName | ||||
|  | ||||
| 	return stackName | ||||
| } | ||||
|  | ||||
| // Filters retrieves exact app filters for querying the container runtime. Due | ||||
| // to upstream issues, filtering works different depending on what you're | ||||
| // StackName gets whatever the docker safe (uses the right delimiting | ||||
| // character, e.g. "_") stack name is for the app. In general, you don't want | ||||
| // to use this to show anything to end-users, you want use a.Name instead. | ||||
| func StackName(appName string) string { | ||||
| 	stackName := SanitiseAppName(appName) | ||||
|  | ||||
| 	if len(stackName) > 45 { | ||||
| 		logrus.Debugf("trimming %s to %s to avoid runtime limits", stackName, stackName[:45]) | ||||
| 		stackName = stackName[:45] | ||||
| 	} | ||||
|  | ||||
| 	return stackName | ||||
| } | ||||
|  | ||||
| // Filters retrieves app filters for querying the container runtime. By default | ||||
| // it filters on all services in the app. It is also possible to pass an | ||||
| // otional list of service names, which get filtered instead. | ||||
| // | ||||
| // Due to upstream issues, filtering works different depending on what you're | ||||
| // querying. So, for example, secrets don't work with regex! The caller needs | ||||
| // to implement their own validation that the right secrets are matched. In | ||||
| // order to handle these cases, we provide the `appendServiceNames` / | ||||
| // `exactMatch` modifiers. | ||||
| func (a App) Filters(appendServiceNames, exactMatch bool) (filters.Args, error) { | ||||
| func (a App) Filters(appendServiceNames, exactMatch bool, services ...string) (filters.Args, error) { | ||||
| 	filters := filters.NewArgs() | ||||
| 	if len(services) > 0 { | ||||
| 		for _, serviceName := range services { | ||||
| 			filters.Add("name", ServiceFilter(a.StackName(), serviceName, exactMatch)) | ||||
| 		} | ||||
| 		return filters, nil | ||||
| 	} | ||||
|  | ||||
| 	composeFiles, err := GetAppComposeFiles(a.Recipe, a.Env) | ||||
| 	// When not appending the service name, just add one filter for the whole | ||||
| 	// stack. | ||||
| 	if !appendServiceNames { | ||||
| 		f := fmt.Sprintf("%s", a.StackName()) | ||||
| 		if exactMatch { | ||||
| 			f = fmt.Sprintf("^%s", f) | ||||
| 		} | ||||
| 		filters.Add("name", f) | ||||
| 		return filters, nil | ||||
| 	} | ||||
|  | ||||
| 	composeFiles, err := GetComposeFiles(a.Recipe, a.Env) | ||||
| 	if err != nil { | ||||
| 		return filters, err | ||||
| 	} | ||||
| @ -88,28 +118,23 @@ func (a App) Filters(appendServiceNames, exactMatch bool) (filters.Args, error) | ||||
| 	} | ||||
|  | ||||
| 	for _, service := range compose.Services { | ||||
| 		var filter string | ||||
|  | ||||
| 		if appendServiceNames { | ||||
| 			if exactMatch { | ||||
| 				filter = fmt.Sprintf("^%s_%s", a.StackName(), service.Name) | ||||
| 			} else { | ||||
| 				filter = fmt.Sprintf("%s_%s", a.StackName(), service.Name) | ||||
| 			} | ||||
| 		} else { | ||||
| 			if exactMatch { | ||||
| 				filter = fmt.Sprintf("^%s", a.StackName()) | ||||
| 			} else { | ||||
| 				filter = fmt.Sprintf("%s", a.StackName()) | ||||
| 			} | ||||
| 		} | ||||
|  | ||||
| 		filters.Add("name", filter) | ||||
| 		f := ServiceFilter(a.StackName(), service.Name, exactMatch) | ||||
| 		filters.Add("name", f) | ||||
| 	} | ||||
|  | ||||
| 	return filters, nil | ||||
| } | ||||
|  | ||||
| // ServiceFilter creates a filter string for filtering a service in the docker | ||||
| // container runtime. When exact match is true, it uses regex to match the | ||||
| // string exactly. | ||||
| func ServiceFilter(stack, service string, exact bool) string { | ||||
| 	if exact { | ||||
| 		return fmt.Sprintf("^%s_%s", stack, service) | ||||
| 	} | ||||
| 	return fmt.Sprintf("%s_%s", stack, service) | ||||
| } | ||||
|  | ||||
| // ByServer sort a slice of Apps | ||||
| type ByServer []App | ||||
|  | ||||
| @ -149,7 +174,7 @@ func (a ByName) Less(i, j int) bool { | ||||
| 	return strings.ToLower(a[i].Name) < strings.ToLower(a[j].Name) | ||||
| } | ||||
|  | ||||
| func readAppEnvFile(appFile AppFile, name AppName) (App, error) { | ||||
| func ReadAppEnvFile(appFile AppFile, name AppName) (App, error) { | ||||
| 	env, err := ReadEnv(appFile.Path) | ||||
| 	if err != nil { | ||||
| 		return App{}, fmt.Errorf("env file for %s couldn't be read: %s", name, err.Error()) | ||||
| @ -157,7 +182,7 @@ func readAppEnvFile(appFile AppFile, name AppName) (App, error) { | ||||
|  | ||||
| 	logrus.Debugf("read env %s from %s", env, appFile.Path) | ||||
|  | ||||
| 	app, err := newApp(env, name, appFile) | ||||
| 	app, err := NewApp(env, name, appFile) | ||||
| 	if err != nil { | ||||
| 		return App{}, fmt.Errorf("env file for %s has issues: %s", name, err.Error()) | ||||
| 	} | ||||
| @ -165,8 +190,8 @@ func readAppEnvFile(appFile AppFile, name AppName) (App, error) { | ||||
| 	return app, nil | ||||
| } | ||||
|  | ||||
| // newApp creates new App object | ||||
| func newApp(env AppEnv, name string, appFile AppFile) (App, error) { | ||||
| // NewApp creates new App object | ||||
| func NewApp(env AppEnv, name string, appFile AppFile) (App, error) { | ||||
| 	domain := env["DOMAIN"] | ||||
|  | ||||
| 	recipe, exists := env["RECIPE"] | ||||
| @ -232,7 +257,7 @@ func GetApp(apps AppFiles, name AppName) (App, error) { | ||||
| 		return App{}, fmt.Errorf("cannot find app with name %s", name) | ||||
| 	} | ||||
|  | ||||
| 	app, err := readAppEnvFile(appFile, name) | ||||
| 	app, err := ReadAppEnvFile(appFile, name) | ||||
| 	if err != nil { | ||||
| 		return App{}, err | ||||
| 	} | ||||
| @ -277,7 +302,7 @@ func GetAppServiceNames(appName string) ([]string, error) { | ||||
| 		return serviceNames, err | ||||
| 	} | ||||
|  | ||||
| 	composeFiles, err := GetAppComposeFiles(app.Recipe, app.Env) | ||||
| 	composeFiles, err := GetComposeFiles(app.Recipe, app.Env) | ||||
| 	if err != nil { | ||||
| 		return serviceNames, err | ||||
| 	} | ||||
| @ -326,11 +351,11 @@ func TemplateAppEnvSample(recipeName, appName, server, domain string) error { | ||||
| 	} | ||||
|  | ||||
| 	appEnvPath := path.Join(ABRA_DIR, "servers", server, fmt.Sprintf("%s.env", appName)) | ||||
| 	if _, err := os.Stat(appEnvPath); os.IsExist(err) { | ||||
| 	if _, err := os.Stat(appEnvPath); !os.IsNotExist(err) { | ||||
| 		return fmt.Errorf("%s already exists?", appEnvPath) | ||||
| 	} | ||||
|  | ||||
| 	err = ioutil.WriteFile(appEnvPath, envSample, 0664) | ||||
| 	err = ioutil.WriteFile(appEnvPath, envSample, 0o664) | ||||
| 	if err != nil { | ||||
| 		return err | ||||
| 	} | ||||
| @ -437,26 +462,56 @@ func GetAppStatuses(apps []App, MachineReadable bool) (map[string]map[string]str | ||||
| 	return statuses, nil | ||||
| } | ||||
|  | ||||
| // GetAppComposeFiles gets the list of compose files for an app which should be | ||||
| // merged into a composetypes.Config while respecting the COMPOSE_FILE env var. | ||||
| func GetAppComposeFiles(recipe string, appEnv AppEnv) ([]string, error) { | ||||
| // ensurePathExists ensures that a path exists. | ||||
| func ensurePathExists(path string) error { | ||||
| 	if _, err := os.Stat(path); err != nil && os.IsNotExist(err) { | ||||
| 		return err | ||||
| 	} | ||||
| 	return nil | ||||
| } | ||||
|  | ||||
| // GetComposeFiles gets the list of compose files for an app (or recipe if you | ||||
| // don't already have an app) which should be merged into a composetypes.Config | ||||
| // while respecting the COMPOSE_FILE env var. | ||||
| func GetComposeFiles(recipe string, appEnv AppEnv) ([]string, error) { | ||||
| 	var composeFiles []string | ||||
|  | ||||
| 	if _, ok := appEnv["COMPOSE_FILE"]; !ok { | ||||
| 		logrus.Debug("no COMPOSE_FILE detected, loading compose.yml") | ||||
| 	composeFileEnvVar, ok := appEnv["COMPOSE_FILE"] | ||||
| 	if !ok { | ||||
| 		path := fmt.Sprintf("%s/%s/compose.yml", RECIPES_DIR, recipe) | ||||
| 		if err := ensurePathExists(path); err != nil { | ||||
| 			return composeFiles, err | ||||
| 		} | ||||
| 		logrus.Debugf("no COMPOSE_FILE detected, loading default: %s", path) | ||||
| 		composeFiles = append(composeFiles, path) | ||||
| 		return composeFiles, nil | ||||
| 	} | ||||
|  | ||||
| 	composeFileEnvVar := appEnv["COMPOSE_FILE"] | ||||
| 	envVars := strings.Split(composeFileEnvVar, ":") | ||||
| 	logrus.Debugf("COMPOSE_FILE detected (%s), loading %s", composeFileEnvVar, strings.Join(envVars, ", ")) | ||||
| 	for _, file := range strings.Split(composeFileEnvVar, ":") { | ||||
| 	if !strings.Contains(composeFileEnvVar, ":") { | ||||
| 		path := fmt.Sprintf("%s/%s/%s", RECIPES_DIR, recipe, composeFileEnvVar) | ||||
| 		if err := ensurePathExists(path); err != nil { | ||||
| 			return composeFiles, err | ||||
| 		} | ||||
| 		logrus.Debugf("COMPOSE_FILE detected, loading %s", path) | ||||
| 		composeFiles = append(composeFiles, path) | ||||
| 		return composeFiles, nil | ||||
| 	} | ||||
|  | ||||
| 	numComposeFiles := strings.Count(composeFileEnvVar, ":") + 1 | ||||
| 	envVars := strings.SplitN(composeFileEnvVar, ":", numComposeFiles) | ||||
| 	if len(envVars) != numComposeFiles { | ||||
| 		return composeFiles, fmt.Errorf("COMPOSE_FILE (=\"%s\") parsing failed?", composeFileEnvVar) | ||||
| 	} | ||||
|  | ||||
| 	for _, file := range envVars { | ||||
| 		path := fmt.Sprintf("%s/%s/%s", RECIPES_DIR, recipe, file) | ||||
| 		if err := ensurePathExists(path); err != nil { | ||||
| 			return composeFiles, err | ||||
| 		} | ||||
| 		composeFiles = append(composeFiles, path) | ||||
| 	} | ||||
|  | ||||
| 	logrus.Debugf("COMPOSE_FILE detected (%s), loading %s", composeFileEnvVar, strings.Join(envVars, ", ")) | ||||
| 	logrus.Debugf("retrieved %s configs for %s", strings.Join(composeFiles, ", "), recipe) | ||||
|  | ||||
| 	return composeFiles, nil | ||||
| @ -562,7 +617,7 @@ func GetLabel(compose *composetypes.Config, stackName string, label string) stri | ||||
|  | ||||
| // GetTimeoutFromLabel reads the timeout value from docker label "coop-cloud.${STACK_NAME}.TIMEOUT" and returns 50 as default value | ||||
| func GetTimeoutFromLabel(compose *composetypes.Config, stackName string) (int, error) { | ||||
| 	var timeout = 50 // Default Timeout | ||||
| 	timeout := 50 // Default Timeout | ||||
| 	var err error = nil | ||||
| 	if timeoutLabel := GetLabel(compose, stackName, "timeout"); timeoutLabel != "" { | ||||
| 		logrus.Debugf("timeout label: %s", timeoutLabel) | ||||
|  | ||||
| @ -1,36 +1,197 @@ | ||||
| package config | ||||
| package config_test | ||||
|  | ||||
| import ( | ||||
| 	"encoding/json" | ||||
| 	"fmt" | ||||
| 	"reflect" | ||||
| 	"testing" | ||||
|  | ||||
| 	"coopcloud.tech/abra/pkg/config" | ||||
| 	"coopcloud.tech/abra/pkg/recipe" | ||||
| 	"github.com/docker/docker/api/types/filters" | ||||
| 	"github.com/google/go-cmp/cmp" | ||||
| 	"github.com/stretchr/testify/assert" | ||||
| ) | ||||
|  | ||||
| func TestNewApp(t *testing.T) { | ||||
| 	app, err := newApp(expectedAppEnv, appName, expectedAppFile) | ||||
| 	app, err := config.NewApp(ExpectedAppEnv, AppName, ExpectedAppFile) | ||||
| 	if err != nil { | ||||
| 		t.Fatal(err) | ||||
| 	} | ||||
| 	if !reflect.DeepEqual(app, expectedApp) { | ||||
| 		t.Fatalf("did not get expected app type. Expected: %s; Got: %s", app, expectedApp) | ||||
| 	if !reflect.DeepEqual(app, ExpectedApp) { | ||||
| 		t.Fatalf("did not get expected app type. Expected: %s; Got: %s", app, ExpectedApp) | ||||
| 	} | ||||
| } | ||||
|  | ||||
| func TestReadAppEnvFile(t *testing.T) { | ||||
| 	app, err := readAppEnvFile(expectedAppFile, appName) | ||||
| 	app, err := config.ReadAppEnvFile(ExpectedAppFile, AppName) | ||||
| 	if err != nil { | ||||
| 		t.Fatal(err) | ||||
| 	} | ||||
| 	if !reflect.DeepEqual(app, expectedApp) { | ||||
| 		t.Fatalf("did not get expected app type. Expected: %s; Got: %s", app, expectedApp) | ||||
| 	if !reflect.DeepEqual(app, ExpectedApp) { | ||||
| 		t.Fatalf("did not get expected app type. Expected: %s; Got: %s", app, ExpectedApp) | ||||
| 	} | ||||
| } | ||||
|  | ||||
| func TestGetApp(t *testing.T) { | ||||
| 	app, err := GetApp(expectedAppFiles, appName) | ||||
| 	app, err := config.GetApp(ExpectedAppFiles, AppName) | ||||
| 	if err != nil { | ||||
| 		t.Fatal(err) | ||||
| 	} | ||||
| 	if !reflect.DeepEqual(app, expectedApp) { | ||||
| 		t.Fatalf("did not get expected app type. Expected: %s; Got: %s", app, expectedApp) | ||||
| 	if !reflect.DeepEqual(app, ExpectedApp) { | ||||
| 		t.Fatalf("did not get expected app type. Expected: %s; Got: %s", app, ExpectedApp) | ||||
| 	} | ||||
| } | ||||
|  | ||||
| func TestGetComposeFiles(t *testing.T) { | ||||
| 	offline := true | ||||
| 	r, err := recipe.Get("abra-test-recipe", offline) | ||||
| 	if err != nil { | ||||
| 		t.Fatal(err) | ||||
| 	} | ||||
|  | ||||
| 	tests := []struct { | ||||
| 		appEnv       map[string]string | ||||
| 		composeFiles []string | ||||
| 	}{ | ||||
| 		{ | ||||
| 			map[string]string{}, | ||||
| 			[]string{ | ||||
| 				fmt.Sprintf("%s/%s/compose.yml", config.RECIPES_DIR, r.Name), | ||||
| 			}, | ||||
| 		}, | ||||
| 		{ | ||||
| 			map[string]string{"COMPOSE_FILE": "compose.yml"}, | ||||
| 			[]string{ | ||||
| 				fmt.Sprintf("%s/%s/compose.yml", config.RECIPES_DIR, r.Name), | ||||
| 			}, | ||||
| 		}, | ||||
| 		{ | ||||
| 			map[string]string{"COMPOSE_FILE": "compose.extra_secret.yml"}, | ||||
| 			[]string{ | ||||
| 				fmt.Sprintf("%s/%s/compose.extra_secret.yml", config.RECIPES_DIR, r.Name), | ||||
| 			}, | ||||
| 		}, | ||||
| 		{ | ||||
| 			map[string]string{"COMPOSE_FILE": "compose.yml:compose.extra_secret.yml"}, | ||||
| 			[]string{ | ||||
| 				fmt.Sprintf("%s/%s/compose.yml", config.RECIPES_DIR, r.Name), | ||||
| 				fmt.Sprintf("%s/%s/compose.extra_secret.yml", config.RECIPES_DIR, r.Name), | ||||
| 			}, | ||||
| 		}, | ||||
| 	} | ||||
|  | ||||
| 	for _, test := range tests { | ||||
| 		composeFiles, err := config.GetComposeFiles(r.Name, test.appEnv) | ||||
| 		if err != nil { | ||||
| 			t.Fatal(err) | ||||
| 		} | ||||
| 		assert.Equal(t, composeFiles, test.composeFiles) | ||||
| 	} | ||||
| } | ||||
|  | ||||
| func TestGetComposeFilesError(t *testing.T) { | ||||
| 	offline := true | ||||
| 	r, err := recipe.Get("abra-test-recipe", offline) | ||||
| 	if err != nil { | ||||
| 		t.Fatal(err) | ||||
| 	} | ||||
|  | ||||
| 	tests := []struct{ appEnv map[string]string }{ | ||||
| 		{map[string]string{"COMPOSE_FILE": "compose.yml::compose.foo.yml"}}, | ||||
| 		{map[string]string{"COMPOSE_FILE": "doesnt.exist.yml"}}, | ||||
| 	} | ||||
|  | ||||
| 	for _, test := range tests { | ||||
| 		_, err := config.GetComposeFiles(r.Name, test.appEnv) | ||||
| 		if err == nil { | ||||
| 			t.Fatalf("should have failed: %v", test.appEnv) | ||||
| 		} | ||||
| 	} | ||||
| } | ||||
|  | ||||
| func TestFilters(t *testing.T) { | ||||
| 	oldDir := config.RECIPES_DIR | ||||
| 	config.RECIPES_DIR = "./testdir" | ||||
| 	defer func() { | ||||
| 		config.RECIPES_DIR = oldDir | ||||
| 	}() | ||||
|  | ||||
| 	app, err := config.NewApp(config.AppEnv{ | ||||
| 		"DOMAIN": "test.example.com", | ||||
| 		"RECIPE": "test-recipe", | ||||
| 	}, "test_example_com", config.AppFile{ | ||||
| 		Path:   "./testdir/filtertest.end", | ||||
| 		Server: "local", | ||||
| 	}) | ||||
| 	if err != nil { | ||||
| 		t.Fatal(err) | ||||
| 	} | ||||
|  | ||||
| 	f, err := app.Filters(false, false) | ||||
| 	if err != nil { | ||||
| 		t.Error(err) | ||||
| 	} | ||||
| 	compareFilter(t, f, map[string]map[string]bool{ | ||||
| 		"name": { | ||||
| 			"test_example_com": true, | ||||
| 		}, | ||||
| 	}) | ||||
|  | ||||
| 	f2, err := app.Filters(false, true) | ||||
| 	if err != nil { | ||||
| 		t.Error(err) | ||||
| 	} | ||||
| 	compareFilter(t, f2, map[string]map[string]bool{ | ||||
| 		"name": { | ||||
| 			"^test_example_com": true, | ||||
| 		}, | ||||
| 	}) | ||||
|  | ||||
| 	f3, err := app.Filters(true, false) | ||||
| 	if err != nil { | ||||
| 		t.Error(err) | ||||
| 	} | ||||
| 	compareFilter(t, f3, map[string]map[string]bool{ | ||||
| 		"name": { | ||||
| 			"test_example_com_bar": true, | ||||
| 			"test_example_com_foo": true, | ||||
| 		}, | ||||
| 	}) | ||||
|  | ||||
| 	f4, err := app.Filters(true, true) | ||||
| 	if err != nil { | ||||
| 		t.Error(err) | ||||
| 	} | ||||
| 	compareFilter(t, f4, map[string]map[string]bool{ | ||||
| 		"name": { | ||||
| 			"^test_example_com_bar": true, | ||||
| 			"^test_example_com_foo": true, | ||||
| 		}, | ||||
| 	}) | ||||
|  | ||||
| 	f5, err := app.Filters(false, false, "foo") | ||||
| 	if err != nil { | ||||
| 		t.Error(err) | ||||
| 	} | ||||
| 	compareFilter(t, f5, map[string]map[string]bool{ | ||||
| 		"name": { | ||||
| 			"test_example_com_foo": true, | ||||
| 		}, | ||||
| 	}) | ||||
| } | ||||
|  | ||||
| func compareFilter(t *testing.T, f1 filters.Args, f2 map[string]map[string]bool) { | ||||
| 	t.Helper() | ||||
| 	j1, err := f1.MarshalJSON() | ||||
| 	if err != nil { | ||||
| 		t.Error(err) | ||||
| 	} | ||||
| 	j2, err := json.Marshal(f2) | ||||
| 	if err != nil { | ||||
| 		t.Error(err) | ||||
| 	} | ||||
| 	if diff := cmp.Diff(string(j2), string(j1)); diff != "" { | ||||
| 		t.Errorf("filters mismatch (-want +got):\n%s", diff) | ||||
| 	} | ||||
| } | ||||
|  | ||||
| @ -8,13 +8,24 @@ import ( | ||||
| 	"os" | ||||
| 	"path" | ||||
| 	"path/filepath" | ||||
| 	"regexp" | ||||
| 	"sort" | ||||
| 	"strings" | ||||
|  | ||||
| 	"github.com/Autonomic-Cooperative/godotenv" | ||||
| 	"git.coopcloud.tech/coop-cloud/godotenv" | ||||
| 	"github.com/sirupsen/logrus" | ||||
| ) | ||||
|  | ||||
| var ABRA_DIR = os.ExpandEnv("$HOME/.abra") | ||||
| // getBaseDir retrieves the Abra base directory. | ||||
| func getBaseDir() string { | ||||
| 	home := os.ExpandEnv("$HOME/.abra") | ||||
| 	if customAbraDir, exists := os.LookupEnv("ABRA_DIR"); exists && customAbraDir != "" { | ||||
| 		home = customAbraDir | ||||
| 	} | ||||
| 	return home | ||||
| } | ||||
|  | ||||
| var ABRA_DIR = getBaseDir() | ||||
| var SERVERS_DIR = path.Join(ABRA_DIR, "servers") | ||||
| var RECIPES_DIR = path.Join(ABRA_DIR, "recipes") | ||||
| var VENDOR_DIR = path.Join(ABRA_DIR, "vendor") | ||||
| @ -25,6 +36,13 @@ var REPOS_BASE_URL = "https://git.coopcloud.tech/coop-cloud" | ||||
| var CATALOGUE_JSON_REPO_NAME = "recipes-catalogue-json" | ||||
| var SSH_URL_TEMPLATE = "ssh://git@git.coopcloud.tech:2222/coop-cloud/%s.git" | ||||
|  | ||||
| var BackupbotLabel = "coop-cloud.backupbot.enabled" | ||||
|  | ||||
| // envVarModifiers is a list of env var modifier strings. These are added to | ||||
| // env vars as comments and modify their processing by Abra, e.g. determining | ||||
| // how long secrets should be. | ||||
| var envVarModifiers = []string{"length"} | ||||
|  | ||||
| // GetServers retrieves all servers. | ||||
| func GetServers() ([]string, error) { | ||||
| 	var servers []string | ||||
| @ -41,16 +59,30 @@ func GetServers() ([]string, error) { | ||||
|  | ||||
| // ReadEnv loads an app envivornment into a map. | ||||
| func ReadEnv(filePath string) (AppEnv, error) { | ||||
| 	var envFile AppEnv | ||||
| 	var envVars AppEnv | ||||
|  | ||||
| 	envFile, err := godotenv.Read(filePath) | ||||
| 	envVars, _, err := godotenv.Read(filePath) | ||||
| 	if err != nil { | ||||
| 		return nil, err | ||||
| 	} | ||||
|  | ||||
| 	logrus.Debugf("read %s from %s", envFile, filePath) | ||||
| 	logrus.Debugf("read %s from %s", envVars, filePath) | ||||
|  | ||||
| 	return envFile, nil | ||||
| 	return envVars, nil | ||||
| } | ||||
|  | ||||
| // ReadEnv loads an app envivornment and their modifiers in two different maps. | ||||
| func ReadEnvWithModifiers(filePath string) (AppEnv, AppModifiers, error) { | ||||
| 	var envVars AppEnv | ||||
|  | ||||
| 	envVars, mods, err := godotenv.Read(filePath) | ||||
| 	if err != nil { | ||||
| 		return nil, mods, err | ||||
| 	} | ||||
|  | ||||
| 	logrus.Debugf("read %s from %s", envVars, filePath) | ||||
|  | ||||
| 	return envVars, mods, nil | ||||
| } | ||||
|  | ||||
| // ReadServerNames retrieves all server names. | ||||
| @ -140,22 +172,107 @@ func ReadAbraShEnvVars(abraSh string) (map[string]string, error) { | ||||
| 		} | ||||
| 		return envVars, err | ||||
| 	} | ||||
| 	defer file.Close() | ||||
|  | ||||
| 	exportRegex, err := regexp.Compile(`^export\s+(\w+=\w+)`) | ||||
| 	if err != nil { | ||||
| 		return envVars, err | ||||
| 	} | ||||
|  | ||||
| 	scanner := bufio.NewScanner(file) | ||||
| 	for scanner.Scan() { | ||||
| 		line := scanner.Text() | ||||
| 		if strings.Contains(line, "export") { | ||||
| 			splitVals := strings.Split(line, "export ") | ||||
| 		txt := scanner.Text() | ||||
| 		if exportRegex.MatchString(txt) { | ||||
| 			splitVals := strings.Split(txt, "export ") | ||||
| 			envVarDef := splitVals[len(splitVals)-1] | ||||
| 			keyVal := strings.Split(envVarDef, "=") | ||||
| 			if len(keyVal) != 2 { | ||||
| 				return envVars, fmt.Errorf("couldn't parse %s", line) | ||||
| 				return envVars, fmt.Errorf("couldn't parse %s", txt) | ||||
| 			} | ||||
| 			envVars[keyVal[0]] = keyVal[1] | ||||
| 		} | ||||
| 	} | ||||
|  | ||||
| 	logrus.Debugf("read %s from %s", envVars, abraSh) | ||||
| 	if len(envVars) > 0 { | ||||
| 		logrus.Debugf("read %s from %s", envVars, abraSh) | ||||
| 	} else { | ||||
| 		logrus.Debugf("read 0 env var exports from %s", abraSh) | ||||
| 	} | ||||
|  | ||||
| 	return envVars, nil | ||||
| } | ||||
|  | ||||
| type EnvVar struct { | ||||
| 	Name    string | ||||
| 	Present bool | ||||
| } | ||||
|  | ||||
| func CheckEnv(app App) ([]EnvVar, error) { | ||||
| 	var envVars []EnvVar | ||||
|  | ||||
| 	envSamplePath := path.Join(RECIPES_DIR, app.Recipe, ".env.sample") | ||||
| 	if _, err := os.Stat(envSamplePath); err != nil { | ||||
| 		if os.IsNotExist(err) { | ||||
| 			return envVars, fmt.Errorf("%s does not exist?", envSamplePath) | ||||
| 		} | ||||
| 		return envVars, err | ||||
| 	} | ||||
|  | ||||
| 	envSample, err := ReadEnv(envSamplePath) | ||||
| 	if err != nil { | ||||
| 		return envVars, err | ||||
| 	} | ||||
|  | ||||
| 	var keys []string | ||||
| 	for key := range envSample { | ||||
| 		keys = append(keys, key) | ||||
| 	} | ||||
|  | ||||
| 	sort.Strings(keys) | ||||
|  | ||||
| 	for _, key := range keys { | ||||
| 		if _, ok := app.Env[key]; ok { | ||||
| 			envVars = append(envVars, EnvVar{Name: key, Present: true}) | ||||
| 		} else { | ||||
| 			envVars = append(envVars, EnvVar{Name: key, Present: false}) | ||||
| 		} | ||||
| 	} | ||||
|  | ||||
| 	return envVars, nil | ||||
| } | ||||
|  | ||||
| // ReadAbraShCmdNames reads the names of commands. | ||||
| func ReadAbraShCmdNames(abraSh string) ([]string, error) { | ||||
| 	var cmdNames []string | ||||
|  | ||||
| 	file, err := os.Open(abraSh) | ||||
| 	if err != nil { | ||||
| 		if os.IsNotExist(err) { | ||||
| 			return cmdNames, nil | ||||
| 		} | ||||
| 		return cmdNames, err | ||||
| 	} | ||||
| 	defer file.Close() | ||||
|  | ||||
| 	cmdNameRegex, err := regexp.Compile(`(\w+)(\(\).*\{)`) | ||||
| 	if err != nil { | ||||
| 		return cmdNames, err | ||||
| 	} | ||||
|  | ||||
| 	scanner := bufio.NewScanner(file) | ||||
| 	for scanner.Scan() { | ||||
| 		line := scanner.Text() | ||||
| 		matches := cmdNameRegex.FindStringSubmatch(line) | ||||
| 		if len(matches) > 0 { | ||||
| 			cmdNames = append(cmdNames, matches[1]) | ||||
| 		} | ||||
| 	} | ||||
|  | ||||
| 	if len(cmdNames) > 0 { | ||||
| 		logrus.Debugf("read %s from %s", strings.Join(cmdNames, " "), abraSh) | ||||
| 	} else { | ||||
| 		logrus.Debugf("read 0 command names from %s", abraSh) | ||||
| 	} | ||||
|  | ||||
| 	return cmdNames, nil | ||||
| } | ||||
|  | ||||
| @ -1,60 +1,69 @@ | ||||
| package config | ||||
| package config_test | ||||
|  | ||||
| import ( | ||||
| 	"fmt" | ||||
| 	"os" | ||||
| 	"path" | ||||
| 	"reflect" | ||||
| 	"slices" | ||||
| 	"strings" | ||||
| 	"testing" | ||||
|  | ||||
| 	"coopcloud.tech/abra/pkg/config" | ||||
| 	"coopcloud.tech/abra/pkg/recipe" | ||||
| ) | ||||
|  | ||||
| var testFolder = os.ExpandEnv("$PWD/../../tests/resources/test_folder") | ||||
| var validAbraConf = os.ExpandEnv("$PWD/../../tests/resources/valid_abra_config") | ||||
| var ( | ||||
| 	TestFolder    = os.ExpandEnv("$PWD/../../tests/resources/test_folder") | ||||
| 	ValidAbraConf = os.ExpandEnv("$PWD/../../tests/resources/valid_abra_config") | ||||
| ) | ||||
|  | ||||
| // make sure these are in alphabetical order | ||||
| var tFolders = []string{"folder1", "folder2"} | ||||
| var tFiles = []string{"bar.env", "foo.env"} | ||||
| var ( | ||||
| 	TFolders = []string{"folder1", "folder2"} | ||||
| 	TFiles   = []string{"bar.env", "foo.env"} | ||||
| ) | ||||
|  | ||||
| var appName = "ecloud" | ||||
| var serverName = "evil.corp" | ||||
| var ( | ||||
| 	AppName    = "ecloud" | ||||
| 	ServerName = "evil.corp" | ||||
| ) | ||||
|  | ||||
| var expectedAppEnv = AppEnv{ | ||||
| var ExpectedAppEnv = config.AppEnv{ | ||||
| 	"DOMAIN": "ecloud.evil.corp", | ||||
| 	"RECIPE": "ecloud", | ||||
| } | ||||
|  | ||||
| var expectedApp = App{ | ||||
| 	Name:   appName, | ||||
| 	Recipe: expectedAppEnv["RECIPE"], | ||||
| 	Domain: expectedAppEnv["DOMAIN"], | ||||
| 	Env:    expectedAppEnv, | ||||
| 	Path:   expectedAppFile.Path, | ||||
| 	Server: expectedAppFile.Server, | ||||
| var ExpectedApp = config.App{ | ||||
| 	Name:   AppName, | ||||
| 	Recipe: ExpectedAppEnv["RECIPE"], | ||||
| 	Domain: ExpectedAppEnv["DOMAIN"], | ||||
| 	Env:    ExpectedAppEnv, | ||||
| 	Path:   ExpectedAppFile.Path, | ||||
| 	Server: ExpectedAppFile.Server, | ||||
| } | ||||
|  | ||||
| var expectedAppFile = AppFile{ | ||||
| 	Path:   path.Join(validAbraConf, "servers", serverName, appName+".env"), | ||||
| 	Server: serverName, | ||||
| var ExpectedAppFile = config.AppFile{ | ||||
| 	Path:   path.Join(ValidAbraConf, "servers", ServerName, AppName+".env"), | ||||
| 	Server: ServerName, | ||||
| } | ||||
|  | ||||
| var expectedAppFiles = map[string]AppFile{ | ||||
| 	appName: expectedAppFile, | ||||
| var ExpectedAppFiles = map[string]config.AppFile{ | ||||
| 	AppName: ExpectedAppFile, | ||||
| } | ||||
|  | ||||
| // var expectedServerNames = []string{"evil.corp"} | ||||
|  | ||||
| func TestGetAllFoldersInDirectory(t *testing.T) { | ||||
| 	folders, err := GetAllFoldersInDirectory(testFolder) | ||||
| 	folders, err := config.GetAllFoldersInDirectory(TestFolder) | ||||
| 	if err != nil { | ||||
| 		t.Fatal(err) | ||||
| 	} | ||||
| 	if !reflect.DeepEqual(folders, tFolders) { | ||||
| 		t.Fatalf("did not get expected folders. Expected: (%s), Got: (%s)", strings.Join(tFolders, ","), strings.Join(folders, ",")) | ||||
| 	if !reflect.DeepEqual(folders, TFolders) { | ||||
| 		t.Fatalf("did not get expected folders. Expected: (%s), Got: (%s)", strings.Join(TFolders, ","), strings.Join(folders, ",")) | ||||
| 	} | ||||
| } | ||||
|  | ||||
| func TestGetAllFilesInDirectory(t *testing.T) { | ||||
| 	files, err := GetAllFilesInDirectory(testFolder) | ||||
| 	files, err := config.GetAllFilesInDirectory(TestFolder) | ||||
| 	if err != nil { | ||||
| 		t.Fatal(err) | ||||
| 	} | ||||
| @ -62,23 +71,205 @@ func TestGetAllFilesInDirectory(t *testing.T) { | ||||
| 	for _, file := range files { | ||||
| 		fileNames = append(fileNames, file.Name()) | ||||
| 	} | ||||
| 	if !reflect.DeepEqual(fileNames, tFiles) { | ||||
| 		t.Fatalf("did not get expected files. Expected: (%s), Got: (%s)", strings.Join(tFiles, ","), strings.Join(fileNames, ",")) | ||||
| 	if !reflect.DeepEqual(fileNames, TFiles) { | ||||
| 		t.Fatalf("did not get expected files. Expected: (%s), Got: (%s)", strings.Join(TFiles, ","), strings.Join(fileNames, ",")) | ||||
| 	} | ||||
| } | ||||
|  | ||||
| func TestReadEnv(t *testing.T) { | ||||
| 	env, err := ReadEnv(expectedAppFile.Path) | ||||
| 	env, err := config.ReadEnv(ExpectedAppFile.Path) | ||||
| 	if err != nil { | ||||
| 		t.Fatal(err) | ||||
| 	} | ||||
| 	if !reflect.DeepEqual(env, expectedAppEnv) { | ||||
| 	if !reflect.DeepEqual(env, ExpectedAppEnv) { | ||||
| 		t.Fatalf( | ||||
| 			"did not get expected application settings. Expected: DOMAIN=%s RECIPE=%s; Got: DOMAIN=%s RECIPE=%s", | ||||
| 			expectedAppEnv["DOMAIN"], | ||||
| 			expectedAppEnv["RECIPE"], | ||||
| 			ExpectedAppEnv["DOMAIN"], | ||||
| 			ExpectedAppEnv["RECIPE"], | ||||
| 			env["DOMAIN"], | ||||
| 			env["RECIPE"], | ||||
| 		) | ||||
| 	} | ||||
| } | ||||
|  | ||||
| func TestReadAbraShEnvVars(t *testing.T) { | ||||
| 	offline := true | ||||
| 	r, err := recipe.Get("abra-test-recipe", offline) | ||||
| 	if err != nil { | ||||
| 		t.Fatal(err) | ||||
| 	} | ||||
|  | ||||
| 	abraShPath := fmt.Sprintf("%s/%s/%s", config.RECIPES_DIR, r.Name, "abra.sh") | ||||
| 	abraShEnv, err := config.ReadAbraShEnvVars(abraShPath) | ||||
| 	if err != nil { | ||||
| 		t.Fatal(err) | ||||
| 	} | ||||
|  | ||||
| 	if len(abraShEnv) == 0 { | ||||
| 		t.Error("at least one env var should be exported") | ||||
| 	} | ||||
|  | ||||
| 	if _, ok := abraShEnv["INNER_FOO"]; ok { | ||||
| 		t.Error("INNER_FOO should not be exported") | ||||
| 	} | ||||
|  | ||||
| 	if _, ok := abraShEnv["INNER_BAZ"]; ok { | ||||
| 		t.Error("INNER_BAZ should not be exported") | ||||
| 	} | ||||
|  | ||||
| 	if _, ok := abraShEnv["OUTER_FOO"]; !ok { | ||||
| 		t.Error("OUTER_FOO should be exported") | ||||
| 	} | ||||
| } | ||||
|  | ||||
| func TestReadAbraShCmdNames(t *testing.T) { | ||||
| 	offline := true | ||||
| 	r, err := recipe.Get("abra-test-recipe", offline) | ||||
| 	if err != nil { | ||||
| 		t.Fatal(err) | ||||
| 	} | ||||
|  | ||||
| 	abraShPath := fmt.Sprintf("%s/%s/%s", config.RECIPES_DIR, r.Name, "abra.sh") | ||||
| 	cmdNames, err := config.ReadAbraShCmdNames(abraShPath) | ||||
| 	if err != nil { | ||||
| 		t.Fatal(err) | ||||
| 	} | ||||
|  | ||||
| 	if len(cmdNames) == 0 { | ||||
| 		t.Error("at least one command name should be found") | ||||
| 	} | ||||
|  | ||||
| 	expectedCmdNames := []string{"test_cmd", "test_cmd_args"} | ||||
| 	for _, cmdName := range expectedCmdNames { | ||||
| 		if !slices.Contains(cmdNames, cmdName) { | ||||
| 			t.Fatalf("%s should have been found in %s", cmdName, abraShPath) | ||||
| 		} | ||||
| 	} | ||||
| } | ||||
|  | ||||
| func TestCheckEnv(t *testing.T) { | ||||
| 	offline := true | ||||
| 	r, err := recipe.Get("abra-test-recipe", offline) | ||||
| 	if err != nil { | ||||
| 		t.Fatal(err) | ||||
| 	} | ||||
|  | ||||
| 	envSamplePath := path.Join(config.RECIPES_DIR, r.Name, ".env.sample") | ||||
| 	envSample, err := config.ReadEnv(envSamplePath) | ||||
| 	if err != nil { | ||||
| 		t.Fatal(err) | ||||
| 	} | ||||
|  | ||||
| 	app := config.App{ | ||||
| 		Name:   "test-app", | ||||
| 		Recipe: r.Name, | ||||
| 		Domain: "example.com", | ||||
| 		Env:    envSample, | ||||
| 		Path:   "example.com.env", | ||||
| 		Server: "example.com", | ||||
| 	} | ||||
|  | ||||
| 	envVars, err := config.CheckEnv(app) | ||||
| 	if err != nil { | ||||
| 		t.Fatal(err) | ||||
| 	} | ||||
|  | ||||
| 	for _, envVar := range envVars { | ||||
| 		if !envVar.Present { | ||||
| 			t.Fatalf("%s should be present", envVar.Name) | ||||
| 		} | ||||
| 	} | ||||
| } | ||||
|  | ||||
| func TestCheckEnvError(t *testing.T) { | ||||
| 	offline := true | ||||
| 	r, err := recipe.Get("abra-test-recipe", offline) | ||||
| 	if err != nil { | ||||
| 		t.Fatal(err) | ||||
| 	} | ||||
|  | ||||
| 	envSamplePath := path.Join(config.RECIPES_DIR, r.Name, ".env.sample") | ||||
| 	envSample, err := config.ReadEnv(envSamplePath) | ||||
| 	if err != nil { | ||||
| 		t.Fatal(err) | ||||
| 	} | ||||
|  | ||||
| 	delete(envSample, "DOMAIN") | ||||
|  | ||||
| 	app := config.App{ | ||||
| 		Name:   "test-app", | ||||
| 		Recipe: r.Name, | ||||
| 		Domain: "example.com", | ||||
| 		Env:    envSample, | ||||
| 		Path:   "example.com.env", | ||||
| 		Server: "example.com", | ||||
| 	} | ||||
|  | ||||
| 	envVars, err := config.CheckEnv(app) | ||||
| 	if err != nil { | ||||
| 		t.Fatal(err) | ||||
| 	} | ||||
|  | ||||
| 	for _, envVar := range envVars { | ||||
| 		if envVar.Name == "DOMAIN" && envVar.Present { | ||||
| 			t.Fatalf("%s should not be present", envVar.Name) | ||||
| 		} | ||||
| 	} | ||||
| } | ||||
|  | ||||
| func TestEnvVarCommentsRemoved(t *testing.T) { | ||||
| 	offline := true | ||||
| 	r, err := recipe.Get("abra-test-recipe", offline) | ||||
| 	if err != nil { | ||||
| 		t.Fatal(err) | ||||
| 	} | ||||
|  | ||||
| 	envSamplePath := path.Join(config.RECIPES_DIR, r.Name, ".env.sample") | ||||
| 	envSample, err := config.ReadEnv(envSamplePath) | ||||
| 	if err != nil { | ||||
| 		t.Fatal(err) | ||||
| 	} | ||||
|  | ||||
| 	envVar, exists := envSample["WITH_COMMENT"] | ||||
| 	if !exists { | ||||
| 		t.Fatal("WITH_COMMENT env var should be present in .env.sample") | ||||
| 	} | ||||
|  | ||||
| 	if strings.Contains(envVar, "should be removed") { | ||||
| 		t.Fatalf("comment from '%s' should be removed", envVar) | ||||
| 	} | ||||
|  | ||||
| 	envVar, exists = envSample["SECRET_TEST_PASS_TWO_VERSION"] | ||||
| 	if !exists { | ||||
| 		t.Fatal("WITH_COMMENT env var should be present in .env.sample") | ||||
| 	} | ||||
|  | ||||
| 	if strings.Contains(envVar, "length") { | ||||
| 		t.Fatal("comment from env var SECRET_TEST_PASS_TWO_VERSION should have been removed") | ||||
| 	} | ||||
| } | ||||
|  | ||||
| func TestEnvVarModifiersIncluded(t *testing.T) { | ||||
| 	offline := true | ||||
| 	r, err := recipe.Get("abra-test-recipe", offline) | ||||
| 	if err != nil { | ||||
| 		t.Fatal(err) | ||||
| 	} | ||||
|  | ||||
| 	envSamplePath := path.Join(config.RECIPES_DIR, r.Name, ".env.sample") | ||||
| 	envSample, modifiers, err := config.ReadEnvWithModifiers(envSamplePath) | ||||
| 	if err != nil { | ||||
| 		t.Fatal(err) | ||||
| 	} | ||||
|  | ||||
| 	if !strings.Contains(envSample["SECRET_TEST_PASS_TWO_VERSION"], "v1") { | ||||
| 		t.Errorf("value should be 'v1', got: '%s'", envSample["SECRET_TEST_PASS_TWO_VERSION"]) | ||||
| 	} | ||||
| 	if modifiers == nil || modifiers["SECRET_TEST_PASS_TWO_VERSION"] == nil { | ||||
| 		t.Errorf("no modifiers included") | ||||
| 	} else { | ||||
| 		if modifiers["SECRET_TEST_PASS_TWO_VERSION"]["length"] != "10" { | ||||
| 			t.Errorf("length modifier should be '10', got: '%s'", modifiers["SECRET_TEST_PASS_TWO_VERSION"]["length"]) | ||||
| 		} | ||||
| 	} | ||||
| } | ||||
|  | ||||
							
								
								
									
										2
									
								
								pkg/config/testdir/filtertest.env
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										2
									
								
								pkg/config/testdir/filtertest.env
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,2 @@ | ||||
| RECIPE=test-recipe | ||||
| DOMAIN=test.example.com | ||||
							
								
								
									
										6
									
								
								pkg/config/testdir/test-recipe/compose.yml
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										6
									
								
								pkg/config/testdir/test-recipe/compose.yml
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,6 @@ | ||||
| version: "3.8" | ||||
| services: | ||||
|   foo: | ||||
|     image: debian | ||||
|   bar: | ||||
|     image: debian | ||||
| @ -28,7 +28,7 @@ func GetContainer(c context.Context, cl *client.Client, filters filters.Args, no | ||||
| 		return types.Container{}, fmt.Errorf("no containers matching the %v filter found?", filter) | ||||
| 	} | ||||
|  | ||||
| 	if len(containers) != 1 { | ||||
| 	if len(containers) > 1 { | ||||
| 		var containersRaw []string | ||||
| 		for _, container := range containers { | ||||
| 			containerName := strings.Join(container.Names, " ") | ||||
| @ -68,3 +68,15 @@ func GetContainer(c context.Context, cl *client.Client, filters filters.Args, no | ||||
|  | ||||
| 	return containers[0], nil | ||||
| } | ||||
|  | ||||
| // GetContainerFromStackAndService retrieves the container for the given stack and service. | ||||
| func GetContainerFromStackAndService(cl *client.Client, stack, service string) (types.Container, error) { | ||||
| 	filters := filters.NewArgs() | ||||
| 	filters.Add("name", fmt.Sprintf("^%s_%s", stack, service)) | ||||
|  | ||||
| 	container, err := GetContainer(context.Background(), cl, filters, true) | ||||
| 	if err != nil { | ||||
| 		return types.Container{}, err | ||||
| 	} | ||||
| 	return container, nil | ||||
| } | ||||
|  | ||||
| @ -3,39 +3,20 @@ package dns | ||||
| import ( | ||||
| 	"fmt" | ||||
| 	"net" | ||||
| 	"os" | ||||
| 	"time" | ||||
| 
 | ||||
| 	"github.com/AlecAivazis/survey/v2" | ||||
| 	"github.com/sirupsen/logrus" | ||||
| ) | ||||
| 
 | ||||
| // NewToken constructs a new DNS provider token. | ||||
| func NewToken(provider, providerTokenEnvVar string) (string, error) { | ||||
| 	if token, present := os.LookupEnv(providerTokenEnvVar); present { | ||||
| 		return token, nil | ||||
| 	} | ||||
| 
 | ||||
| 	logrus.Debugf("no %s in environment, asking via stdin", providerTokenEnvVar) | ||||
| 
 | ||||
| 	var token string | ||||
| 	prompt := &survey.Input{ | ||||
| 		Message: fmt.Sprintf("%s API token?", provider), | ||||
| 	} | ||||
| 	if err := survey.AskOne(prompt, &token); err != nil { | ||||
| 		return "", err | ||||
| 	} | ||||
| 
 | ||||
| 	return token, nil | ||||
| } | ||||
| 
 | ||||
| // EnsureIPv4 ensures that an ipv4 address is set for a domain name | ||||
| func EnsureIPv4(domainName string) (string, error) { | ||||
| 	ipv4, err := net.ResolveIPAddr("ip", domainName) | ||||
| 	ipv4, err := net.ResolveIPAddr("ip4", domainName) | ||||
| 	if err != nil { | ||||
| 		return "", err | ||||
| 	} | ||||
| 
 | ||||
| 	// NOTE(d1): e.g. when there is only an ipv6 record available | ||||
| 	if ipv4 == nil { | ||||
| 		return "", fmt.Errorf("unable to resolve ipv4 address for %s", domainName) | ||||
| 	} | ||||
| 
 | ||||
| 	return ipv4.String(), nil | ||||
| } | ||||
| 
 | ||||
| @ -72,12 +53,3 @@ func EnsureDomainsResolveSameIPv4(domainName, server string) (string, error) { | ||||
| 
 | ||||
| 	return ipv4, nil | ||||
| } | ||||
| 
 | ||||
| // GetTTL parses a ttl string into a duration | ||||
| func GetTTL(ttl string) (time.Duration, error) { | ||||
| 	val, err := time.ParseDuration(ttl) | ||||
| 	if err != nil { | ||||
| 		return val, err | ||||
| 	} | ||||
| 	return val, nil | ||||
| } | ||||
							
								
								
									
										64
									
								
								pkg/dns/dns_test.go
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										64
									
								
								pkg/dns/dns_test.go
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,64 @@ | ||||
| package dns | ||||
|  | ||||
| import ( | ||||
| 	"fmt" | ||||
| 	"testing" | ||||
|  | ||||
| 	"gotest.tools/v3/assert" | ||||
| ) | ||||
|  | ||||
| func TestEnsureDomainsResolveSameIPv4(t *testing.T) { | ||||
| 	tests := []struct { | ||||
| 		domainName     string | ||||
| 		serverName     string | ||||
| 		shouldValidate bool | ||||
| 	}{ | ||||
| 		// NOTE(d1): DNS records get checked, so use something that is maintained | ||||
| 		// within the federation. if you're here because of a failing test, try | ||||
| 		// `dig +short <domain>` to ensure stuff matches first! If flakyness | ||||
| 		// becomes an issue we can look into mocking | ||||
| 		{"docs.coopcloud.tech", "coopcloud.tech", true}, | ||||
| 		{"docs.coopcloud.tech", "swarm.autonomic.zone", true}, | ||||
|  | ||||
| 		// NOTE(d1): special case handling for "--local" | ||||
| 		{"", "default", true}, | ||||
| 		{"", "local", true}, | ||||
|  | ||||
| 		{"", "", false}, | ||||
| 		{"123", "", false}, | ||||
| 	} | ||||
|  | ||||
| 	for _, test := range tests { | ||||
| 		_, err := EnsureDomainsResolveSameIPv4(test.domainName, test.serverName) | ||||
| 		if err != nil && test.shouldValidate { | ||||
| 			t.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		if err == nil && !test.shouldValidate { | ||||
| 			t.Fatal(fmt.Errorf("should have failed but did not: %v", test)) | ||||
| 		} | ||||
| 	} | ||||
| } | ||||
|  | ||||
| func TestEnsureIpv4(t *testing.T) { | ||||
| 	// NOTE(d1): DNS records get checked, so use something that is maintained | ||||
| 	// within the federation. if you're here because of a failing test, try `dig | ||||
| 	// +short <domain>` to ensure stuff matches first! If flakyness becomes an | ||||
| 	// issue we can look into mocking | ||||
| 	domainName := "collabora.ostrom.collective.tools" | ||||
| 	serverName := "ostrom.collective.tools" | ||||
|  | ||||
| 	for i := 0; i < 15; i++ { | ||||
| 		domainIpv4, err := EnsureIPv4(domainName) | ||||
| 		if err != nil { | ||||
| 			t.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		serverIpv4, err := EnsureIPv4(serverName) | ||||
| 		if err != nil { | ||||
| 			t.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		assert.Equal(t, domainIpv4, serverIpv4) | ||||
| 	} | ||||
| } | ||||
| @ -1,15 +0,0 @@ | ||||
| package gandi | ||||
|  | ||||
| import ( | ||||
| 	"coopcloud.tech/abra/pkg/dns" | ||||
| 	"github.com/libdns/gandi" | ||||
| ) | ||||
|  | ||||
| // New constructs a new DNs provider. | ||||
| func New() (gandi.Provider, error) { | ||||
| 	token, err := dns.NewToken("Gandi", "GANDI_TOKEN") | ||||
| 	if err != nil { | ||||
| 		return gandi.Provider{}, err | ||||
| 	} | ||||
| 	return gandi.Provider{APIToken: token}, nil | ||||
| } | ||||
							
								
								
									
										27
									
								
								pkg/git/add.go
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										27
									
								
								pkg/git/add.go
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,27 @@ | ||||
| package git | ||||
|  | ||||
| import ( | ||||
| 	"github.com/go-git/go-git/v5" | ||||
| 	"github.com/sirupsen/logrus" | ||||
| ) | ||||
|  | ||||
| // Add adds a file to the git index. | ||||
| func Add(repoPath, path string, dryRun bool) error { | ||||
| 	repo, err := git.PlainOpen(repoPath) | ||||
| 	if err != nil { | ||||
| 		return err | ||||
| 	} | ||||
|  | ||||
| 	worktree, err := repo.Worktree() | ||||
| 	if err != nil { | ||||
| 		return err | ||||
| 	} | ||||
|  | ||||
| 	if dryRun { | ||||
| 		logrus.Debugf("dry run: adding %s", path) | ||||
| 	} else { | ||||
| 		worktree.Add(path) | ||||
| 	} | ||||
|  | ||||
| 	return nil | ||||
| } | ||||
| @ -8,7 +8,7 @@ import ( | ||||
| ) | ||||
|  | ||||
| // Commit runs a git commit | ||||
| func Commit(repoPath, glob, commitMessage string, dryRun bool) error { | ||||
| func Commit(repoPath, commitMessage string, dryRun bool) error { | ||||
| 	if commitMessage == "" { | ||||
| 		return fmt.Errorf("no commit message specified?") | ||||
| 	} | ||||
| @ -33,17 +33,8 @@ func Commit(repoPath, glob, commitMessage string, dryRun bool) error { | ||||
| 	} | ||||
|  | ||||
| 	if !dryRun { | ||||
| 		err = commitWorktree.AddGlob(glob) | ||||
| 		if err != nil { | ||||
| 			return err | ||||
| 		} | ||||
| 		logrus.Debugf("staged %s for commit", glob) | ||||
| 	} else { | ||||
| 		logrus.Debugf("dry run: did not stage %s for commit", glob) | ||||
| 	} | ||||
|  | ||||
| 	if !dryRun { | ||||
| 		_, err = commitWorktree.Commit(commitMessage, &git.CommitOptions{}) | ||||
| 		// NOTE(d1): `All: true` does not include untracked files | ||||
| 		_, err = commitWorktree.Commit(commitMessage, &git.CommitOptions{All: true}) | ||||
| 		if err != nil { | ||||
| 			return err | ||||
| 		} | ||||
|  | ||||
							
								
								
									
										42
									
								
								pkg/git/diff.go
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										42
									
								
								pkg/git/diff.go
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,42 @@ | ||||
| package git | ||||
|  | ||||
| import ( | ||||
| 	"fmt" | ||||
| 	"os/exec" | ||||
|  | ||||
| 	"github.com/sirupsen/logrus" | ||||
| ) | ||||
|  | ||||
| // getGitDiffArgs builds the `git diff` invocation args. It removes the usage | ||||
| // of a pager and ensures that colours are specified even when Git might detect | ||||
| // otherwise. | ||||
| func getGitDiffArgs(repoPath string) []string { | ||||
| 	return []string{ | ||||
| 		"-C", | ||||
| 		repoPath, | ||||
| 		"--no-pager", | ||||
| 		"-c", | ||||
| 		"color.diff=always", | ||||
| 		"diff", | ||||
| 	} | ||||
| } | ||||
|  | ||||
| // DiffUnstaged shows a `git diff`. Due to limitations in the underlying go-git | ||||
| // library, this implementation requires the /usr/bin/git binary. It gracefully | ||||
| // skips if it cannot find the command on the system. | ||||
| func DiffUnstaged(path string) error { | ||||
| 	if _, err := exec.LookPath("git"); err != nil { | ||||
| 		logrus.Warnf("unable to locate git command, cannot output diff") | ||||
| 		return nil | ||||
| 	} | ||||
|  | ||||
| 	gitDiffArgs := getGitDiffArgs(path) | ||||
| 	diff, err := exec.Command("git", gitDiffArgs...).Output() | ||||
| 	if err != nil { | ||||
| 		return nil | ||||
| 	} | ||||
|  | ||||
| 	fmt.Print(string(diff)) | ||||
|  | ||||
| 	return nil | ||||
| } | ||||
| @ -3,6 +3,7 @@ package jsontable | ||||
| import ( | ||||
| 	"fmt" | ||||
| 	"io" | ||||
| 	"strings" | ||||
|  | ||||
| 	"github.com/olekukonko/tablewriter" | ||||
| ) | ||||
| @ -109,6 +110,9 @@ func (t *JSONTable) _JSONRenderInner() { | ||||
| 		} | ||||
| 		writeChar(t.out, '{') | ||||
| 		for keyidx, key := range t.keys { | ||||
| 			key := strings.ToLower(key) | ||||
| 			key = strings.ReplaceAll(key, " ", "-") | ||||
|  | ||||
| 			value := "nil" | ||||
| 			if keyidx < len(row) { | ||||
| 				value = row[keyidx] | ||||
| @ -138,10 +142,8 @@ func (t *JSONTable) JSONRender() { | ||||
|  | ||||
| 		if t.hasCaption { | ||||
| 			fmt.Fprintf(t.out, "\"%s\":\"%s\",", t.captionLabel, t.caption) | ||||
|  | ||||
| 		} | ||||
| 		fmt.Fprintf(t.out, "\"%s\":", t.dataLabel) | ||||
|  | ||||
| 	} | ||||
|  | ||||
| 	// write list | ||||
| @ -191,6 +193,12 @@ func (t *JSONTable) SetAutoMergeCellsByColumnIndex(cols []int) { | ||||
| 	t.tbl.SetAutoMergeCellsByColumnIndex(cols) | ||||
| } | ||||
|  | ||||
| // Stuff we should implement but we just proxy for now. | ||||
| func (t *JSONTable) SetAlignment(align int) { | ||||
| 	// FIXME | ||||
| 	t.tbl.SetAlignment(align) | ||||
| } | ||||
|  | ||||
| func (t *JSONTable) SetAutoMergeCells(auto bool) { | ||||
| 	// FIXME | ||||
| 	t.tbl.SetAutoMergeCells(auto) | ||||
|  | ||||
| @ -9,7 +9,6 @@ import ( | ||||
| 	"coopcloud.tech/abra/pkg/config" | ||||
| 	"coopcloud.tech/abra/pkg/recipe" | ||||
| 	recipePkg "coopcloud.tech/abra/pkg/recipe" | ||||
| 	"coopcloud.tech/abra/pkg/runtime" | ||||
| 	"coopcloud.tech/tagcmp" | ||||
| 	"github.com/docker/distribution/reference" | ||||
| 	"github.com/go-git/go-git/v5" | ||||
| @ -157,8 +156,8 @@ var LintRules = map[string][]LintRule{ | ||||
| 		{ | ||||
| 			Ref:          "R014", | ||||
| 			Level:        "error", | ||||
| 			Description:  "invalid lightweight tag used for recipe version", | ||||
| 			HowToResolve: "replace tag with annotated version, see operator docs", | ||||
| 			Description:  "only annotated tags used for recipe version", | ||||
| 			HowToResolve: "replace lightweight tag with annotated tag", | ||||
| 			Function:     LintValidTags, | ||||
| 		}, | ||||
| 	}, | ||||
| @ -334,11 +333,7 @@ func LintImagePresent(recipe recipe.Recipe) (bool, error) { | ||||
| } | ||||
|  | ||||
| func LintHasPublishedVersion(recipe recipe.Recipe) (bool, error) { | ||||
| 	// defaults since we can't take arguments here... this means this lint rule | ||||
| 	// always access the network if e.g. the catalogue needs cloning / updating | ||||
| 	conf := runtime.New() | ||||
|  | ||||
| 	catl, err := recipePkg.ReadRecipeCatalogue(conf) | ||||
| 	catl, err := recipePkg.ReadRecipeCatalogue(false) | ||||
| 	if err != nil { | ||||
| 		logrus.Fatal(err) | ||||
| 	} | ||||
|  | ||||
| @ -7,6 +7,7 @@ import ( | ||||
| 	"os" | ||||
| 	"path" | ||||
| 	"path/filepath" | ||||
| 	"slices" | ||||
| 	"sort" | ||||
| 	"strconv" | ||||
| 	"strings" | ||||
| @ -17,7 +18,6 @@ import ( | ||||
| 	"coopcloud.tech/abra/pkg/formatter" | ||||
| 	gitPkg "coopcloud.tech/abra/pkg/git" | ||||
| 	"coopcloud.tech/abra/pkg/limit" | ||||
| 	"coopcloud.tech/abra/pkg/runtime" | ||||
| 	"coopcloud.tech/abra/pkg/upstream/stack" | ||||
| 	loader "coopcloud.tech/abra/pkg/upstream/stack" | ||||
| 	"coopcloud.tech/abra/pkg/web" | ||||
| @ -25,7 +25,6 @@ import ( | ||||
| 	composetypes "github.com/docker/cli/cli/compose/types" | ||||
| 	"github.com/docker/distribution/reference" | ||||
| 	"github.com/go-git/go-git/v5" | ||||
| 	gitConfig "github.com/go-git/go-git/v5/config" | ||||
| 	"github.com/go-git/go-git/v5/plumbing" | ||||
| 	"github.com/sirupsen/logrus" | ||||
| ) | ||||
| @ -33,7 +32,7 @@ import ( | ||||
| // RecipeCatalogueURL is the only current recipe catalogue available. | ||||
| const RecipeCatalogueURL = "https://recipes.coopcloud.tech/recipes.json" | ||||
|  | ||||
| // ReposMetadataURL is the recipe repository metadata | ||||
| // ReposMetadataURL is the recipe repository metadata. | ||||
| const ReposMetadataURL = "https://git.coopcloud.tech/api/v1/orgs/coop-cloud/repos" | ||||
|  | ||||
| // tag represents a git tag. | ||||
| @ -65,6 +64,11 @@ type RecipeMeta struct { | ||||
| 	Website       string         `json:"website"` | ||||
| } | ||||
|  | ||||
| // TopicMeta represents a list of topics for a repository. | ||||
| type TopicMeta struct { | ||||
| 	Topics []string `json:"topics"` | ||||
| } | ||||
|  | ||||
| // LatestVersion returns the latest version of a recipe. | ||||
| func (r RecipeMeta) LatestVersion() string { | ||||
| 	var version string | ||||
| @ -207,8 +211,8 @@ func (r Recipe) Tags() ([]string, error) { | ||||
| } | ||||
|  | ||||
| // Get retrieves a recipe. | ||||
| func Get(recipeName string, conf *runtime.Config) (Recipe, error) { | ||||
| 	if err := EnsureExists(recipeName, conf); err != nil { | ||||
| func Get(recipeName string, offline bool) (Recipe, error) { | ||||
| 	if err := EnsureExists(recipeName); err != nil { | ||||
| 		return Recipe{}, err | ||||
| 	} | ||||
|  | ||||
| @ -234,11 +238,12 @@ func Get(recipeName string, conf *runtime.Config) (Recipe, error) { | ||||
| 		return Recipe{}, err | ||||
| 	} | ||||
|  | ||||
| 	meta, err := GetRecipeMeta(recipeName, conf) | ||||
| 	meta, err := GetRecipeMeta(recipeName, offline) | ||||
| 	if err != nil { | ||||
| 		if strings.Contains(err.Error(), "does not exist") { | ||||
| 		switch err.(type) { | ||||
| 		case RecipeMissingFromCatalogue: | ||||
| 			meta = RecipeMeta{} | ||||
| 		} else { | ||||
| 		default: | ||||
| 			return Recipe{}, err | ||||
| 		} | ||||
| 	} | ||||
| @ -250,15 +255,20 @@ func Get(recipeName string, conf *runtime.Config) (Recipe, error) { | ||||
| 	}, nil | ||||
| } | ||||
|  | ||||
| func (r Recipe) SampleEnv() (map[string]string, error) { | ||||
| 	envSamplePath := path.Join(config.RECIPES_DIR, r.Name, ".env.sample") | ||||
| 	sampleEnv, err := config.ReadEnv(envSamplePath) | ||||
| 	if err != nil { | ||||
| 		return sampleEnv, fmt.Errorf("unable to discover .env.sample for %s", r.Name) | ||||
| 	} | ||||
| 	return sampleEnv, nil | ||||
| } | ||||
|  | ||||
| // EnsureExists ensures that a recipe is locally cloned | ||||
| func EnsureExists(recipeName string, conf *runtime.Config) error { | ||||
| func EnsureExists(recipeName string) error { | ||||
| 	recipeDir := path.Join(config.RECIPES_DIR, recipeName) | ||||
|  | ||||
| 	if _, err := os.Stat(recipeDir); os.IsNotExist(err) { | ||||
| 		if conf.Offline { | ||||
| 			return fmt.Errorf("no local copy of %s available, network access required", recipeName) | ||||
| 		} | ||||
|  | ||||
| 		logrus.Debugf("%s does not exist, attemmpting to clone", recipeDir) | ||||
| 		url := fmt.Sprintf("%s/%s.git", config.REPOS_BASE_URL, recipeName) | ||||
| 		if err := gitPkg.Clone(recipeDir, url); err != nil { | ||||
| @ -277,15 +287,6 @@ func EnsureExists(recipeName string, conf *runtime.Config) error { | ||||
| func EnsureVersion(recipeName, version string) error { | ||||
| 	recipeDir := path.Join(config.RECIPES_DIR, recipeName) | ||||
|  | ||||
| 	isClean, err := gitPkg.IsClean(recipeDir) | ||||
| 	if err != nil { | ||||
| 		return err | ||||
| 	} | ||||
|  | ||||
| 	if !isClean { | ||||
| 		return fmt.Errorf("%s has locally unstaged changes", recipeName) | ||||
| 	} | ||||
|  | ||||
| 	if err := gitPkg.EnsureGitRepo(recipeDir); err != nil { | ||||
| 		return err | ||||
| 	} | ||||
| @ -312,7 +313,10 @@ func EnsureVersion(recipeName, version string) error { | ||||
| 		return err | ||||
| 	} | ||||
|  | ||||
| 	logrus.Debugf("read %s as tags for recipe %s", strings.Join(parsedTags, ", "), recipeName) | ||||
| 	joinedTags := strings.Join(parsedTags, ", ") | ||||
| 	if joinedTags != "" { | ||||
| 		logrus.Debugf("read %s as tags for recipe %s", joinedTags, recipeName) | ||||
| 	} | ||||
|  | ||||
| 	if tagRef.String() == "" { | ||||
| 		return fmt.Errorf("the local copy of %s doesn't seem to have version %s available?", recipeName, version) | ||||
| @ -337,25 +341,31 @@ func EnsureVersion(recipeName, version string) error { | ||||
| 	return nil | ||||
| } | ||||
|  | ||||
| // EnsureLatest makes sure the latest commit is checked out for a local recipe repository | ||||
| func EnsureLatest(recipeName string, conf *runtime.Config) error { | ||||
| // EnsureIsClean makes sure that the recipe repository has no unstaged changes. | ||||
| func EnsureIsClean(recipeName string) error { | ||||
| 	recipeDir := path.Join(config.RECIPES_DIR, recipeName) | ||||
|  | ||||
| 	isClean, err := gitPkg.IsClean(recipeDir) | ||||
| 	if err != nil { | ||||
| 		return err | ||||
| 		return fmt.Errorf("unable to check git clean status in %s: %s", recipeDir, err) | ||||
| 	} | ||||
|  | ||||
| 	if !isClean { | ||||
| 		return fmt.Errorf("%s has locally unstaged changes", recipeName) | ||||
| 		msg := "%s (%s) has locally unstaged changes? please commit/remove your changes before proceeding" | ||||
| 		return fmt.Errorf(msg, recipeName, recipeDir) | ||||
| 	} | ||||
|  | ||||
| 	return nil | ||||
| } | ||||
|  | ||||
| // EnsureLatest makes sure the latest commit is checked out for a local recipe repository | ||||
| func EnsureLatest(recipeName string) error { | ||||
| 	recipeDir := path.Join(config.RECIPES_DIR, recipeName) | ||||
|  | ||||
| 	if err := gitPkg.EnsureGitRepo(recipeDir); err != nil { | ||||
| 		return err | ||||
| 	} | ||||
|  | ||||
| 	logrus.Debugf("attempting to open git repository in %s", recipeDir) | ||||
|  | ||||
| 	repo, err := git.PlainOpen(recipeDir) | ||||
| 	if err != nil { | ||||
| 		return err | ||||
| @ -366,21 +376,11 @@ func EnsureLatest(recipeName string, conf *runtime.Config) error { | ||||
| 		return err | ||||
| 	} | ||||
|  | ||||
| 	meta, err := GetRecipeMeta(recipeName, conf) | ||||
| 	branch, err := gitPkg.GetDefaultBranch(repo, recipeDir) | ||||
| 	if err != nil { | ||||
| 		return err | ||||
| 	} | ||||
|  | ||||
| 	var branch plumbing.ReferenceName | ||||
| 	if meta.DefaultBranch != "" { | ||||
| 		branch = plumbing.ReferenceName(fmt.Sprintf("refs/heads/%s", meta.DefaultBranch)) | ||||
| 	} else { | ||||
| 		branch, err = gitPkg.GetDefaultBranch(repo, recipeDir) | ||||
| 		if err != nil { | ||||
| 			return err | ||||
| 		} | ||||
| 	} | ||||
|  | ||||
| 	checkOutOpts := &git.CheckoutOptions{ | ||||
| 		Create: false, | ||||
| 		Force:  true, | ||||
| @ -437,7 +437,7 @@ func GetVersionLabelLocal(recipe Recipe) (string, error) { | ||||
|  | ||||
| 	for _, service := range recipe.Config.Services { | ||||
| 		for label, value := range service.Deploy.Labels { | ||||
| 			if strings.HasPrefix(label, "coop-cloud") { | ||||
| 			if strings.HasPrefix(label, "coop-cloud") && strings.Contains(label, "version") { | ||||
| 				return value, nil | ||||
| 			} | ||||
| 		} | ||||
| @ -583,24 +583,9 @@ func GetStringInBetween(recipeName, str, start, end string) (result string, err | ||||
| } | ||||
|  | ||||
| // EnsureUpToDate ensures that the local repo is synced to the remote | ||||
| func EnsureUpToDate(recipeName string, conf *runtime.Config) error { | ||||
| func EnsureUpToDate(recipeName string) error { | ||||
| 	recipeDir := path.Join(config.RECIPES_DIR, recipeName) | ||||
|  | ||||
| 	isClean, err := gitPkg.IsClean(recipeDir) | ||||
| 	if err != nil { | ||||
| 		return fmt.Errorf("unable to check git clean status in %s: %s", recipeDir, err) | ||||
| 	} | ||||
|  | ||||
| 	if !isClean { | ||||
| 		msg := "%s (%s) has locally unstaged changes? please commit/remove your changes before proceeding" | ||||
| 		return fmt.Errorf(msg, recipeName, recipeDir) | ||||
| 	} | ||||
|  | ||||
| 	if conf.Offline { | ||||
| 		logrus.Debug("attempting to use local recipe without access network (\"--offline\")") | ||||
| 		return nil | ||||
| 	} | ||||
|  | ||||
| 	repo, err := git.PlainOpen(recipeDir) | ||||
| 	if err != nil { | ||||
| 		return fmt.Errorf("unable to open %s: %s", recipeDir, err) | ||||
| @ -626,12 +611,7 @@ func EnsureUpToDate(recipeName string, conf *runtime.Config) error { | ||||
| 		return fmt.Errorf("unable to check out default branch in %s: %s", recipeDir, err) | ||||
| 	} | ||||
|  | ||||
| 	fetchOpts := &git.FetchOptions{ | ||||
| 		Tags: git.AllTags, | ||||
| 		RefSpecs: []gitConfig.RefSpec{ | ||||
| 			gitConfig.RefSpec(fmt.Sprintf("%s:%s", branch, branch)), | ||||
| 		}, | ||||
| 	} | ||||
| 	fetchOpts := &git.FetchOptions{Tags: git.AllTags} | ||||
| 	if err := repo.Fetch(fetchOpts); err != nil { | ||||
| 		if !strings.Contains(err.Error(), "already up-to-date") { | ||||
| 			return fmt.Errorf("unable to fetch tags in %s: %s", recipeDir, err) | ||||
| @ -656,15 +636,17 @@ func EnsureUpToDate(recipeName string, conf *runtime.Config) error { | ||||
| } | ||||
|  | ||||
| // ReadRecipeCatalogue reads the recipe catalogue. | ||||
| func ReadRecipeCatalogue(conf *runtime.Config) (RecipeCatalogue, error) { | ||||
| func ReadRecipeCatalogue(offline bool) (RecipeCatalogue, error) { | ||||
| 	recipes := make(RecipeCatalogue) | ||||
|  | ||||
| 	if err := catalogue.EnsureCatalogue(conf); err != nil { | ||||
| 	if err := catalogue.EnsureCatalogue(); err != nil { | ||||
| 		return nil, err | ||||
| 	} | ||||
|  | ||||
| 	if err := catalogue.EnsureUpToDate(conf); err != nil { | ||||
| 		return nil, err | ||||
| 	if !offline { | ||||
| 		if err := catalogue.EnsureUpToDate(); err != nil { | ||||
| 			return nil, err | ||||
| 		} | ||||
| 	} | ||||
|  | ||||
| 	if err := readRecipeCatalogueFS(&recipes); err != nil { | ||||
| @ -691,10 +673,10 @@ func readRecipeCatalogueFS(target interface{}) error { | ||||
| } | ||||
|  | ||||
| // VersionsOfService lists the version of a service. | ||||
| func VersionsOfService(recipe, serviceName string, conf *runtime.Config) ([]string, error) { | ||||
| func VersionsOfService(recipe, serviceName string, offline bool) ([]string, error) { | ||||
| 	var versions []string | ||||
|  | ||||
| 	catalogue, err := ReadRecipeCatalogue(conf) | ||||
| 	catalogue, err := ReadRecipeCatalogue(offline) | ||||
| 	if err != nil { | ||||
| 		return nil, err | ||||
| 	} | ||||
| @ -719,20 +701,26 @@ func VersionsOfService(recipe, serviceName string, conf *runtime.Config) ([]stri | ||||
| 	return versions, nil | ||||
| } | ||||
|  | ||||
| // RecipeMissingFromCatalogue signifies a recipe is not present in the catalogue. | ||||
| type RecipeMissingFromCatalogue struct{ err string } | ||||
|  | ||||
| // Error outputs the error message. | ||||
| func (r RecipeMissingFromCatalogue) Error() string { | ||||
| 	return r.err | ||||
| } | ||||
|  | ||||
| // GetRecipeMeta retrieves the recipe metadata from the recipe catalogue. | ||||
| func GetRecipeMeta(recipeName string, conf *runtime.Config) (RecipeMeta, error) { | ||||
| 	catl, err := ReadRecipeCatalogue(conf) | ||||
| func GetRecipeMeta(recipeName string, offline bool) (RecipeMeta, error) { | ||||
| 	catl, err := ReadRecipeCatalogue(offline) | ||||
| 	if err != nil { | ||||
| 		return RecipeMeta{}, err | ||||
| 	} | ||||
|  | ||||
| 	recipeMeta, ok := catl[recipeName] | ||||
| 	if !ok { | ||||
| 		return RecipeMeta{}, fmt.Errorf("recipe %s does not exist?", recipeName) | ||||
| 	} | ||||
|  | ||||
| 	if err := EnsureExists(recipeName, conf); err != nil { | ||||
| 		return RecipeMeta{}, err | ||||
| 		return RecipeMeta{}, RecipeMissingFromCatalogue{ | ||||
| 			err: fmt.Sprintf("recipe %s does not exist?", recipeName), | ||||
| 		} | ||||
| 	} | ||||
|  | ||||
| 	logrus.Debugf("recipe metadata retrieved for %s", recipeName) | ||||
| @ -818,11 +806,7 @@ type InternalTracker struct { | ||||
| type RepoCatalogue map[string]RepoMeta | ||||
|  | ||||
| // ReadReposMetadata retrieves coop-cloud/... repo metadata from Gitea. | ||||
| func ReadReposMetadata(conf *runtime.Config) (RepoCatalogue, error) { | ||||
| 	if conf.Offline { | ||||
| 		return nil, fmt.Errorf("network access required to query recipes metadata") | ||||
| 	} | ||||
|  | ||||
| func ReadReposMetadata() (RepoCatalogue, error) { | ||||
| 	reposMeta := make(RepoCatalogue) | ||||
|  | ||||
| 	pageIdx := 1 | ||||
| @ -844,7 +828,16 @@ func ReadReposMetadata(conf *runtime.Config) (RepoCatalogue, error) { | ||||
| 		} | ||||
|  | ||||
| 		for idx, repo := range reposList { | ||||
| 			reposMeta[repo.Name] = reposList[idx] | ||||
| 			var topicMeta TopicMeta | ||||
|  | ||||
| 			topicsURL := getReposTopicUrl(repo.Name) | ||||
| 			if err := web.ReadJSON(topicsURL, &topicMeta); err != nil { | ||||
| 				return reposMeta, err | ||||
| 			} | ||||
|  | ||||
| 			if slices.Contains(topicMeta.Topics, "recipe") && repo.Name != "example" { | ||||
| 				reposMeta[repo.Name] = reposList[idx] | ||||
| 			} | ||||
| 		} | ||||
|  | ||||
| 		pageIdx++ | ||||
| @ -857,7 +850,7 @@ func ReadReposMetadata(conf *runtime.Config) (RepoCatalogue, error) { | ||||
| } | ||||
|  | ||||
| // GetRecipeVersions retrieves all recipe versions. | ||||
| func GetRecipeVersions(recipeName string, conf *runtime.Config) (RecipeVersions, error) { | ||||
| func GetRecipeVersions(recipeName string, offline bool) (RecipeVersions, error) { | ||||
| 	versions := RecipeVersions{} | ||||
| 	recipeDir := path.Join(config.RECIPES_DIR, recipeName) | ||||
|  | ||||
| @ -895,7 +888,7 @@ func GetRecipeVersions(recipeName string, conf *runtime.Config) (RecipeVersions, | ||||
|  | ||||
| 		logrus.Debugf("successfully checked out %s in %s", ref.Name(), recipeDir) | ||||
|  | ||||
| 		recipe, err := Get(recipeName, conf) | ||||
| 		recipe, err := Get(recipeName, offline) | ||||
| 		if err != nil { | ||||
| 			return err | ||||
| 		} | ||||
| @ -1002,11 +995,7 @@ func GetRecipeCatalogueVersions(recipeName string, catl RecipeCatalogue) ([]stri | ||||
| } | ||||
|  | ||||
| // UpdateRepositories clones and updates all recipe repositories locally. | ||||
| func UpdateRepositories(repos RepoCatalogue, recipeName string, conf *runtime.Config) error { | ||||
| 	if conf.Offline { | ||||
| 		return fmt.Errorf("network access required to update recipes") | ||||
| 	} | ||||
|  | ||||
| func UpdateRepositories(repos RepoCatalogue, recipeName string) error { | ||||
| 	var barLength int | ||||
| 	if recipeName != "" { | ||||
| 		barLength = 1 | ||||
| @ -1028,22 +1017,12 @@ func UpdateRepositories(repos RepoCatalogue, recipeName string, conf *runtime.Co | ||||
| 				retrieveBar.Add(1) | ||||
| 				return | ||||
| 			} | ||||
| 			if _, exists := catalogue.CatalogueSkipList[rm.Name]; exists { | ||||
| 				ch <- rm.Name | ||||
| 				retrieveBar.Add(1) | ||||
| 				return | ||||
| 			} | ||||
|  | ||||
| 			recipeDir := path.Join(config.RECIPES_DIR, rm.Name) | ||||
|  | ||||
| 			if err := gitPkg.Clone(recipeDir, rm.CloneURL); err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
|  | ||||
| 			if err := EnsureUpToDate(rm.Name, conf); err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
|  | ||||
| 			ch <- rm.Name | ||||
| 			retrieveBar.Add(1) | ||||
| 		}(repoMeta) | ||||
| @ -1055,3 +1034,8 @@ func UpdateRepositories(repos RepoCatalogue, recipeName string, conf *runtime.Co | ||||
|  | ||||
| 	return nil | ||||
| } | ||||
|  | ||||
| // getReposTopicUrl retrieves the repository specific topic listing. | ||||
| func getReposTopicUrl(repoName string) string { | ||||
| 	return fmt.Sprintf("https://git.coopcloud.tech/api/v1/repos/coop-cloud/%s/topics", repoName) | ||||
| } | ||||
|  | ||||
							
								
								
									
										31
									
								
								pkg/recipe/recipe_test.go
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										31
									
								
								pkg/recipe/recipe_test.go
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,31 @@ | ||||
| package recipe | ||||
|  | ||||
| import ( | ||||
| 	"testing" | ||||
|  | ||||
| 	"github.com/stretchr/testify/assert" | ||||
| ) | ||||
|  | ||||
| func TestGetVersionLabelLocalDoesNotUseTimeoutLabel(t *testing.T) { | ||||
| 	offline := true | ||||
| 	recipe, err := Get("traefik", offline) | ||||
| 	if err != nil { | ||||
| 		t.Fatal(err) | ||||
| 	} | ||||
|  | ||||
| 	for i := 1; i < 1000; i++ { | ||||
| 		label, err := GetVersionLabelLocal(recipe) | ||||
| 		if err != nil { | ||||
| 			t.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		// NOTE(d1): this is potentially quite a brittle unit test as it needs to | ||||
| 		// hardcode the default timeout label to ensure that the label parser never | ||||
| 		// returns it. hopefully this won't fail too often! if you're here because | ||||
| 		// of a failure, just update the `defaultTimeoutLabel` value & permalink | ||||
| 		// below | ||||
| 		// https://git.coopcloud.tech/coop-cloud/traefik/src/commit/ac3a47fe8ca3ef92db84f64cfedfbb348000faee/.env.sample#L2 | ||||
| 		defaultTimeoutLabel := "300" | ||||
| 		assert.NotEqual(t, label, defaultTimeoutLabel) | ||||
| 	} | ||||
| } | ||||
| @ -1,28 +0,0 @@ | ||||
| package runtime | ||||
|  | ||||
| import "github.com/sirupsen/logrus" | ||||
|  | ||||
| type Config struct { | ||||
| 	Offline bool | ||||
| } | ||||
|  | ||||
| type Option func(c *Config) | ||||
|  | ||||
| func New(opts ...Option) *Config { | ||||
| 	conf := &Config{Offline: false} | ||||
|  | ||||
| 	for _, optFunc := range opts { | ||||
| 		optFunc(conf) | ||||
| 	} | ||||
|  | ||||
| 	return conf | ||||
| } | ||||
|  | ||||
| func WithOffline(offline bool) Option { | ||||
| 	return func(c *Config) { | ||||
| 		if offline { | ||||
| 			logrus.Debugf("runtime config: attempting to run in offline mode") | ||||
| 		} | ||||
| 		c.Offline = offline | ||||
| 	} | ||||
| } | ||||
| @ -4,24 +4,41 @@ | ||||
| package secret | ||||
|  | ||||
| import ( | ||||
| 	"context" | ||||
| 	"fmt" | ||||
| 	"regexp" | ||||
| 	"slices" | ||||
| 	"strconv" | ||||
| 	"strings" | ||||
| 	"sync" | ||||
|  | ||||
| 	"coopcloud.tech/abra/pkg/client" | ||||
| 	"coopcloud.tech/abra/pkg/config" | ||||
| 	"coopcloud.tech/abra/pkg/upstream/stack" | ||||
| 	loader "coopcloud.tech/abra/pkg/upstream/stack" | ||||
| 	"github.com/decentral1se/passgen" | ||||
| 	"github.com/docker/docker/api/types" | ||||
| 	dockerClient "github.com/docker/docker/client" | ||||
| 	"github.com/sirupsen/logrus" | ||||
| ) | ||||
|  | ||||
| // secretValue represents a parsed `SECRET_FOO=v1 # length=bar` env var config | ||||
| // secret definition. | ||||
| type secretValue struct { | ||||
| // Secret represents a secret. | ||||
| type Secret struct { | ||||
| 	// Version comes from the secret version environment variable. | ||||
| 	// For example: | ||||
| 	//  SECRET_FOO=v1 | ||||
| 	Version string | ||||
| 	Length  int | ||||
| 	// Length comes from the length modifier at the secret version environment | ||||
| 	// variable. For Example: | ||||
| 	//   SECRET_FOO=v1 # length=12 | ||||
| 	Length int | ||||
| 	// RemoteName is the name of the secret on the server. For example: | ||||
| 	//   name: ${STACK_NAME}_test_pass_two_${SECRET_TEST_PASS_TWO_VERSION} | ||||
| 	// With the following: | ||||
| 	//   STACK_NAME=test_example_com | ||||
| 	//   SECRET_TEST_PASS_TWO_VERSION=v2 | ||||
| 	// Will have this remote name: | ||||
| 	//   test_example_com_test_pass_two_v2 | ||||
| 	RemoteName string | ||||
| } | ||||
|  | ||||
| // GeneratePasswords generates passwords. | ||||
| @ -31,7 +48,6 @@ func GeneratePasswords(count, length uint) ([]string, error) { | ||||
| 		length, | ||||
| 		passgen.AlphabetDefault, | ||||
| 	) | ||||
|  | ||||
| 	if err != nil { | ||||
| 		return nil, err | ||||
| 	} | ||||
| @ -50,7 +66,6 @@ func GeneratePassphrases(count uint) ([]string, error) { | ||||
| 		passgen.PassphraseCasingDefault, | ||||
| 		passgen.WordListDefault, | ||||
| 	) | ||||
|  | ||||
| 	if err != nil { | ||||
| 		return nil, err | ||||
| 	} | ||||
| @ -60,96 +75,107 @@ func GeneratePassphrases(count uint) ([]string, error) { | ||||
| 	return passphrases, nil | ||||
| } | ||||
|  | ||||
| // ReadSecretEnvVars reads secret env vars from an app env var config. | ||||
| func ReadSecretEnvVars(appEnv config.AppEnv) map[string]string { | ||||
| 	secretEnvVars := make(map[string]string) | ||||
| // ReadSecretsConfig reads secret names/versions from the recipe config. The | ||||
| // function generalises appEnv/composeFiles because some times you have an app | ||||
| // and some times you don't (as the caller). We need to be able to handle the | ||||
| // "app new" case where we pass in the .env.sample and the "secret generate" | ||||
| // case where the app is created. | ||||
| func ReadSecretsConfig(appEnvPath string, composeFiles []string, stackName string) (map[string]Secret, error) { | ||||
| 	appEnv, appModifiers, err := config.ReadEnvWithModifiers(appEnvPath) | ||||
| 	if err != nil { | ||||
| 		return nil, err | ||||
| 	} | ||||
| 	// Set the STACK_NAME to be able to generate the remote name correctly. | ||||
| 	appEnv["STACK_NAME"] = stackName | ||||
|  | ||||
| 	for envVar := range appEnv { | ||||
| 		regex := regexp.MustCompile(`^SECRET.*VERSION.*`) | ||||
| 		if string(regex.Find([]byte(envVar))) != "" { | ||||
| 			secretEnvVars[envVar] = appEnv[envVar] | ||||
| 	opts := stack.Deploy{Composefiles: composeFiles} | ||||
| 	config, err := loader.LoadComposefile(opts, appEnv) | ||||
| 	if err != nil { | ||||
| 		return nil, err | ||||
| 	} | ||||
| 	// Read the compose files without injecting environment variables. | ||||
| 	configWithoutEnv, err := loader.LoadComposefile(opts, map[string]string{}, loader.SkipInterpolation) | ||||
| 	if err != nil { | ||||
| 		return nil, err | ||||
| 	} | ||||
|  | ||||
| 	var enabledSecrets []string | ||||
| 	for _, service := range config.Services { | ||||
| 		for _, secret := range service.Secrets { | ||||
| 			enabledSecrets = append(enabledSecrets, secret.Source) | ||||
| 		} | ||||
| 	} | ||||
|  | ||||
| 	logrus.Debugf("read %s as secrets from %s", secretEnvVars, appEnv) | ||||
|  | ||||
| 	return secretEnvVars | ||||
| } | ||||
|  | ||||
| func ParseSecretEnvVarName(secretEnvVar string) string { | ||||
| 	withoutPrefix := strings.TrimPrefix(secretEnvVar, "SECRET_") | ||||
| 	withoutSuffix := strings.TrimSuffix(withoutPrefix, "_VERSION") | ||||
| 	name := strings.ToLower(withoutSuffix) | ||||
| 	logrus.Debugf("parsed %s as name from %s", name, secretEnvVar) | ||||
| 	return name | ||||
| } | ||||
|  | ||||
| func ParseGeneratedSecretName(secret string, appEnv config.App) string { | ||||
| 	name := fmt.Sprintf("%s_", appEnv.StackName()) | ||||
| 	withoutAppName := strings.TrimPrefix(secret, name) | ||||
| 	idx := strings.LastIndex(withoutAppName, "_") | ||||
| 	parsed := withoutAppName[:idx] | ||||
| 	logrus.Debugf("parsed %s as name from %s", parsed, secret) | ||||
| 	return parsed | ||||
| } | ||||
|  | ||||
| func ParseSecretEnvVarValue(secret string) (secretValue, error) { | ||||
| 	values := strings.Split(secret, "#") | ||||
| 	if len(values) == 0 { | ||||
| 		return secretValue{}, fmt.Errorf("unable to parse %s", secret) | ||||
| 	if len(enabledSecrets) == 0 { | ||||
| 		logrus.Debugf("not generating app secrets, none enabled in recipe config") | ||||
| 		return nil, nil | ||||
| 	} | ||||
|  | ||||
| 	if len(values) == 1 { | ||||
| 		return secretValue{Version: values[0], Length: 0}, nil | ||||
| 	secretValues := map[string]Secret{} | ||||
| 	for secretId, secretConfig := range config.Secrets { | ||||
| 		if string(secretConfig.Name[len(secretConfig.Name)-1]) == "_" { | ||||
| 			return nil, fmt.Errorf("missing version for secret? (%s)", secretId) | ||||
| 		} | ||||
|  | ||||
| 		if !(slices.Contains(enabledSecrets, secretId)) { | ||||
| 			logrus.Warnf("%s not enabled in recipe config, skipping", secretId) | ||||
| 			continue | ||||
| 		} | ||||
|  | ||||
| 		lastIdx := strings.LastIndex(secretConfig.Name, "_") | ||||
| 		secretVersion := secretConfig.Name[lastIdx+1:] | ||||
| 		value := Secret{Version: secretVersion, RemoteName: secretConfig.Name} | ||||
|  | ||||
| 		// Check if the length modifier is set for this secret. | ||||
| 		for envName, modifierValues := range appModifiers { | ||||
| 			// configWithoutEnv contains the raw name as defined in the compose.yaml | ||||
| 			// The name will look something like this: | ||||
| 			//   name: ${STACK_NAME}_test_pass_two_${SECRET_TEST_PASS_TWO_VERSION} | ||||
| 			// To check if the current modifier is for the current secret we check | ||||
| 			// if the raw name contains the env name (e.g. SECRET_TEST_PASS_TWO_VERSION). | ||||
| 			if !strings.Contains(configWithoutEnv.Secrets[secretId].Name, envName) { | ||||
| 				continue | ||||
| 			} | ||||
| 			lengthRaw, ok := modifierValues["length"] | ||||
| 			if ok { | ||||
| 				length, err := strconv.Atoi(lengthRaw) | ||||
| 				if err != nil { | ||||
| 					return nil, err | ||||
| 				} | ||||
| 				value.Length = length | ||||
| 			} | ||||
| 			break | ||||
| 		} | ||||
| 		secretValues[secretId] = value | ||||
| 	} | ||||
|  | ||||
| 	split := strings.Split(values[1], "=") | ||||
| 	parsed := split[len(split)-1] | ||||
| 	stripped := strings.ReplaceAll(parsed, " ", "") | ||||
| 	length, err := strconv.Atoi(stripped) | ||||
| 	if err != nil { | ||||
| 		return secretValue{}, err | ||||
| 	} | ||||
| 	version := strings.ReplaceAll(values[0], " ", "") | ||||
|  | ||||
| 	logrus.Debugf("parsed version %s and length '%v' from %s", version, length, secret) | ||||
|  | ||||
| 	return secretValue{Version: version, Length: length}, nil | ||||
| 	return secretValues, nil | ||||
| } | ||||
|  | ||||
| // GenerateSecrets generates secrets locally and sends them to a remote server for storage. | ||||
| func GenerateSecrets(cl *dockerClient.Client, secretEnvVars map[string]string, appName, server string) (map[string]string, error) { | ||||
| 	secrets := make(map[string]string) | ||||
|  | ||||
| func GenerateSecrets(cl *dockerClient.Client, secrets map[string]Secret, server string) (map[string]string, error) { | ||||
| 	secretsGenerated := map[string]string{} | ||||
| 	var mutex sync.Mutex | ||||
| 	var wg sync.WaitGroup | ||||
| 	ch := make(chan error, len(secretEnvVars)) | ||||
| 	for secretEnvVar := range secretEnvVars { | ||||
| 	ch := make(chan error, len(secrets)) | ||||
| 	for n, v := range secrets { | ||||
| 		wg.Add(1) | ||||
|  | ||||
| 		go func(s string) { | ||||
| 		go func(secretName string, secret Secret) { | ||||
| 			defer wg.Done() | ||||
|  | ||||
| 			secretName := ParseSecretEnvVarName(s) | ||||
| 			secretValue, err := ParseSecretEnvVarValue(secretEnvVars[s]) | ||||
| 			if err != nil { | ||||
| 				ch <- err | ||||
| 				return | ||||
| 			} | ||||
| 			logrus.Debugf("attempting to generate and store %s on %s", secret.RemoteName, server) | ||||
|  | ||||
| 			secretRemoteName := fmt.Sprintf("%s_%s_%s", appName, secretName, secretValue.Version) | ||||
| 			logrus.Debugf("attempting to generate and store %s on %s", secretRemoteName, server) | ||||
|  | ||||
| 			if secretValue.Length > 0 { | ||||
| 				passwords, err := GeneratePasswords(1, uint(secretValue.Length)) | ||||
| 			if secret.Length > 0 { | ||||
| 				passwords, err := GeneratePasswords(1, uint(secret.Length)) | ||||
| 				if err != nil { | ||||
| 					ch <- err | ||||
| 					return | ||||
| 				} | ||||
|  | ||||
| 				if err := client.StoreSecret(cl, secretRemoteName, passwords[0], server); err != nil { | ||||
| 				if err := client.StoreSecret(cl, secret.RemoteName, passwords[0], server); err != nil { | ||||
| 					if strings.Contains(err.Error(), "AlreadyExists") { | ||||
| 						logrus.Warnf("%s already exists, moving on...", secretRemoteName) | ||||
| 						logrus.Warnf("%s already exists, moving on...", secret.RemoteName) | ||||
| 						ch <- nil | ||||
| 					} else { | ||||
| 						ch <- err | ||||
| @ -159,7 +185,7 @@ func GenerateSecrets(cl *dockerClient.Client, secretEnvVars map[string]string, a | ||||
|  | ||||
| 				mutex.Lock() | ||||
| 				defer mutex.Unlock() | ||||
| 				secrets[secretName] = passwords[0] | ||||
| 				secretsGenerated[secretName] = passwords[0] | ||||
| 			} else { | ||||
| 				passphrases, err := GeneratePassphrases(1) | ||||
| 				if err != nil { | ||||
| @ -167,9 +193,9 @@ func GenerateSecrets(cl *dockerClient.Client, secretEnvVars map[string]string, a | ||||
| 					return | ||||
| 				} | ||||
|  | ||||
| 				if err := client.StoreSecret(cl, secretRemoteName, passphrases[0], server); err != nil { | ||||
| 				if err := client.StoreSecret(cl, secret.RemoteName, passphrases[0], server); err != nil { | ||||
| 					if strings.Contains(err.Error(), "AlreadyExists") { | ||||
| 						logrus.Warnf("%s already exists, moving on...", secretRemoteName) | ||||
| 						logrus.Warnf("%s already exists, moving on...", secret.RemoteName) | ||||
| 						ch <- nil | ||||
| 					} else { | ||||
| 						ch <- err | ||||
| @ -179,22 +205,80 @@ func GenerateSecrets(cl *dockerClient.Client, secretEnvVars map[string]string, a | ||||
|  | ||||
| 				mutex.Lock() | ||||
| 				defer mutex.Unlock() | ||||
| 				secrets[secretName] = passphrases[0] | ||||
| 				secretsGenerated[secretName] = passphrases[0] | ||||
| 			} | ||||
| 			ch <- nil | ||||
| 		}(secretEnvVar) | ||||
| 		}(n, v) | ||||
| 	} | ||||
|  | ||||
| 	wg.Wait() | ||||
|  | ||||
| 	for range secretEnvVars { | ||||
| 	for range secrets { | ||||
| 		err := <-ch | ||||
| 		if err != nil { | ||||
| 			return nil, err | ||||
| 		} | ||||
| 	} | ||||
|  | ||||
| 	logrus.Debugf("generated and stored %s on %s", secrets, server) | ||||
| 	logrus.Debugf("generated and stored %v on %s", secrets, server) | ||||
|  | ||||
| 	return secrets, nil | ||||
| 	return secretsGenerated, nil | ||||
| } | ||||
|  | ||||
| type secretStatus struct { | ||||
| 	LocalName       string | ||||
| 	RemoteName      string | ||||
| 	Version         string | ||||
| 	CreatedOnRemote bool | ||||
| } | ||||
|  | ||||
| type secretStatuses []secretStatus | ||||
|  | ||||
| // PollSecretsStatus checks status of secrets by comparing the local recipe | ||||
| // config and deploymend server state. | ||||
| func PollSecretsStatus(cl *dockerClient.Client, app config.App) (secretStatuses, error) { | ||||
| 	var secStats secretStatuses | ||||
|  | ||||
| 	composeFiles, err := config.GetComposeFiles(app.Recipe, app.Env) | ||||
| 	if err != nil { | ||||
| 		return secStats, err | ||||
| 	} | ||||
|  | ||||
| 	secretsConfig, err := ReadSecretsConfig(app.Path, composeFiles, app.StackName()) | ||||
| 	if err != nil { | ||||
| 		return secStats, err | ||||
| 	} | ||||
|  | ||||
| 	filters, err := app.Filters(false, false) | ||||
| 	if err != nil { | ||||
| 		return secStats, err | ||||
| 	} | ||||
|  | ||||
| 	secretList, err := cl.SecretList(context.Background(), types.SecretListOptions{Filters: filters}) | ||||
| 	if err != nil { | ||||
| 		return secStats, err | ||||
| 	} | ||||
|  | ||||
| 	remoteSecretNames := make(map[string]bool) | ||||
| 	for _, cont := range secretList { | ||||
| 		remoteSecretNames[cont.Spec.Annotations.Name] = true | ||||
| 	} | ||||
|  | ||||
| 	for secretName, val := range secretsConfig { | ||||
| 		createdRemote := false | ||||
|  | ||||
| 		secretRemoteName := fmt.Sprintf("%s_%s_%s", app.StackName(), secretName, val.Version) | ||||
| 		if _, ok := remoteSecretNames[secretRemoteName]; ok { | ||||
| 			createdRemote = true | ||||
| 		} | ||||
|  | ||||
| 		secStats = append(secStats, secretStatus{ | ||||
| 			LocalName:       secretName, | ||||
| 			RemoteName:      secretRemoteName, | ||||
| 			Version:         val.Version, | ||||
| 			CreatedOnRemote: createdRemote, | ||||
| 		}) | ||||
| 	} | ||||
|  | ||||
| 	return secStats, nil | ||||
| } | ||||
|  | ||||
							
								
								
									
										30
									
								
								pkg/secret/secret_test.go
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										30
									
								
								pkg/secret/secret_test.go
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,30 @@ | ||||
| package secret | ||||
|  | ||||
| import ( | ||||
| 	"testing" | ||||
|  | ||||
| 	"github.com/stretchr/testify/assert" | ||||
| ) | ||||
|  | ||||
| func TestReadSecretsConfig(t *testing.T) { | ||||
| 	composeFiles := []string{"./testdir/compose.yaml"} | ||||
| 	secretsFromConfig, err := ReadSecretsConfig("./testdir/.env.sample", composeFiles, "test_example_com") | ||||
| 	if err != nil { | ||||
| 		t.Fatal(err) | ||||
| 	} | ||||
|  | ||||
| 	// Simple secret | ||||
| 	assert.Equal(t, "test_example_com_test_pass_one_v2", secretsFromConfig["test_pass_one"].RemoteName) | ||||
| 	assert.Equal(t, "v2", secretsFromConfig["test_pass_one"].Version) | ||||
| 	assert.Equal(t, 0, secretsFromConfig["test_pass_one"].Length) | ||||
|  | ||||
| 	// Has a length modifier | ||||
| 	assert.Equal(t, "test_example_com_test_pass_two_v1", secretsFromConfig["test_pass_two"].RemoteName) | ||||
| 	assert.Equal(t, "v1", secretsFromConfig["test_pass_two"].Version) | ||||
| 	assert.Equal(t, 10, secretsFromConfig["test_pass_two"].Length) | ||||
|  | ||||
| 	// Secret name does not include the secret id | ||||
| 	assert.Equal(t, "test_example_com_pass_three_v2", secretsFromConfig["test_pass_three"].RemoteName) | ||||
| 	assert.Equal(t, "v2", secretsFromConfig["test_pass_three"].Version) | ||||
| 	assert.Equal(t, 0, secretsFromConfig["test_pass_three"].Length) | ||||
| } | ||||
							
								
								
									
										3
									
								
								pkg/secret/testdir/.env.sample
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										3
									
								
								pkg/secret/testdir/.env.sample
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,3 @@ | ||||
| SECRET_TEST_PASS_ONE_VERSION=v2 | ||||
| SECRET_TEST_PASS_TWO_VERSION=v1 # length=10 | ||||
| SECRET_TEST_PASS_THREE_VERSION=v2 | ||||
							
								
								
									
										21
									
								
								pkg/secret/testdir/compose.yaml
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										21
									
								
								pkg/secret/testdir/compose.yaml
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,21 @@ | ||||
| --- | ||||
| version: "3.8" | ||||
|  | ||||
| services: | ||||
|   app: | ||||
|     image: nginx:1.21.0 | ||||
|     secrets: | ||||
|       - test_pass_one | ||||
|       - test_pass_two | ||||
|       - test_pass_three | ||||
|  | ||||
| secrets: | ||||
|   test_pass_one: | ||||
|     external: true | ||||
|     name: ${STACK_NAME}_test_pass_one_${SECRET_TEST_PASS_ONE_VERSION}  # should be removed | ||||
|   test_pass_two: | ||||
|     external: true | ||||
|     name: ${STACK_NAME}_test_pass_two_${SECRET_TEST_PASS_TWO_VERSION} | ||||
|   test_pass_three: | ||||
|     external: true | ||||
|     name: ${STACK_NAME}_pass_three_${SECRET_TEST_PASS_THREE_VERSION} # secretId and name don't match | ||||
| @ -14,6 +14,70 @@ import ( | ||||
| 	"github.com/sirupsen/logrus" | ||||
| ) | ||||
|  | ||||
| // GetService retrieves a service container based on a label. If prompt is true | ||||
| // and the retrievd count of service containers does not match 1, then a prompt | ||||
| // is presented to let the user choose. An error is returned when no service is | ||||
| // found. | ||||
| func GetServiceByLabel(c context.Context, cl *client.Client, label string, prompt bool) (swarm.Service, error) { | ||||
| 	services, err := cl.ServiceList(c, types.ServiceListOptions{}) | ||||
| 	if err != nil { | ||||
| 		return swarm.Service{}, err | ||||
| 	} | ||||
|  | ||||
| 	if len(services) == 0 { | ||||
| 		return swarm.Service{}, fmt.Errorf("no services deployed?") | ||||
| 	} | ||||
|  | ||||
| 	var matchingServices []swarm.Service | ||||
| 	for _, service := range services { | ||||
| 		if enabled, exists := service.Spec.Labels[label]; exists && enabled == "true" { | ||||
| 			matchingServices = append(matchingServices, service) | ||||
| 		} | ||||
| 	} | ||||
|  | ||||
| 	if len(matchingServices) == 0 { | ||||
| 		return swarm.Service{}, fmt.Errorf("no services deployed matching label '%s'?", label) | ||||
| 	} | ||||
|  | ||||
| 	if len(matchingServices) > 1 { | ||||
| 		var servicesRaw []string | ||||
| 		for _, service := range matchingServices { | ||||
| 			serviceName := service.Spec.Name | ||||
| 			created := formatter.HumanDuration(service.CreatedAt.Unix()) | ||||
| 			servicesRaw = append(servicesRaw, fmt.Sprintf("%s (created %v)", serviceName, created)) | ||||
| 		} | ||||
|  | ||||
| 		if !prompt { | ||||
| 			err := fmt.Errorf("expected 1 service but found %v: %s", len(matchingServices), strings.Join(servicesRaw, " ")) | ||||
| 			return swarm.Service{}, err | ||||
| 		} | ||||
|  | ||||
| 		logrus.Warnf("ambiguous service list received, prompting for input") | ||||
|  | ||||
| 		var response string | ||||
| 		prompt := &survey.Select{ | ||||
| 			Message: "which service are you looking for?", | ||||
| 			Options: servicesRaw, | ||||
| 		} | ||||
|  | ||||
| 		if err := survey.AskOne(prompt, &response); err != nil { | ||||
| 			return swarm.Service{}, err | ||||
| 		} | ||||
|  | ||||
| 		chosenService := strings.TrimSpace(strings.Split(response, " ")[0]) | ||||
| 		for _, service := range matchingServices { | ||||
| 			serviceName := strings.ToLower(service.Spec.Name) | ||||
| 			if serviceName == chosenService { | ||||
| 				return service, nil | ||||
| 			} | ||||
| 		} | ||||
|  | ||||
| 		logrus.Panic("failed to match chosen service") | ||||
| 	} | ||||
|  | ||||
| 	return matchingServices[0], nil | ||||
| } | ||||
|  | ||||
| // GetService retrieves a service container. If prompt is true and the retrievd | ||||
| // count of service containers does not match 1, then a prompt is presented to | ||||
| // let the user choose. A count of 0 is handled gracefully. | ||||
|  | ||||
| @ -18,7 +18,7 @@ import ( | ||||
| // | ||||
| // ssh://<user>@<host> URL requires Docker 18.09 or later on the remote host. | ||||
| func GetConnectionHelper(daemonURL string) (*connhelper.ConnectionHelper, error) { | ||||
| 	return getConnectionHelper(daemonURL, []string{"-o ConnectTimeout=5"}) | ||||
| 	return getConnectionHelper(daemonURL, []string{"-o ConnectTimeout=60"}) | ||||
| } | ||||
|  | ||||
| func getConnectionHelper(daemonURL string, sshFlags []string) (*connhelper.ConnectionHelper, error) { | ||||
|  | ||||
| @ -13,7 +13,10 @@ import ( | ||||
| 	"github.com/sirupsen/logrus" | ||||
| ) | ||||
|  | ||||
| func RunExec(dockerCli command.Cli, client *apiclient.Client, containerID string, execConfig *types.ExecConfig) error { | ||||
| // RunExec runs a command on a remote container. io.Writer corresponds to the | ||||
| // command output. | ||||
| func RunExec(dockerCli command.Cli, client *apiclient.Client, containerID string, | ||||
| 	execConfig *types.ExecConfig) (io.Writer, error) { | ||||
| 	ctx := context.Background() | ||||
|  | ||||
| 	// We need to check the tty _before_ we do the ContainerExecCreate, because | ||||
| @ -21,22 +24,22 @@ func RunExec(dockerCli command.Cli, client *apiclient.Client, containerID string | ||||
| 	// there's no easy way to clean those up). But also in order to make "not | ||||
| 	// exist" errors take precedence we do a dummy inspect first. | ||||
| 	if _, err := client.ContainerInspect(ctx, containerID); err != nil { | ||||
| 		return err | ||||
| 		return nil, err | ||||
| 	} | ||||
| 	if !execConfig.Detach { | ||||
| 		if err := dockerCli.In().CheckTty(execConfig.AttachStdin, execConfig.Tty); err != nil { | ||||
| 			return err | ||||
| 			return nil, err | ||||
| 		} | ||||
| 	} | ||||
|  | ||||
| 	response, err := client.ContainerExecCreate(ctx, containerID, *execConfig) | ||||
| 	if err != nil { | ||||
| 		return err | ||||
| 		return nil, err | ||||
| 	} | ||||
|  | ||||
| 	execID := response.ID | ||||
| 	if execID == "" { | ||||
| 		return errors.New("exec ID empty") | ||||
| 		return nil, errors.New("exec ID empty") | ||||
| 	} | ||||
|  | ||||
| 	if execConfig.Detach { | ||||
| @ -44,13 +47,13 @@ func RunExec(dockerCli command.Cli, client *apiclient.Client, containerID string | ||||
| 			Detach: execConfig.Detach, | ||||
| 			Tty:    execConfig.Tty, | ||||
| 		} | ||||
| 		return client.ContainerExecStart(ctx, execID, execStartCheck) | ||||
| 		return nil, client.ContainerExecStart(ctx, execID, execStartCheck) | ||||
| 	} | ||||
| 	return interactiveExec(ctx, dockerCli, client, execConfig, execID) | ||||
| } | ||||
|  | ||||
| func interactiveExec(ctx context.Context, dockerCli command.Cli, client *apiclient.Client, | ||||
| 	execConfig *types.ExecConfig, execID string) error { | ||||
| 	execConfig *types.ExecConfig, execID string) (io.Writer, error) { | ||||
| 	// Interactive exec requested. | ||||
| 	var ( | ||||
| 		out, stderr io.Writer | ||||
| @ -76,7 +79,7 @@ func interactiveExec(ctx context.Context, dockerCli command.Cli, client *apiclie | ||||
| 	} | ||||
| 	resp, err := client.ContainerExecAttach(ctx, execID, execStartCheck) | ||||
| 	if err != nil { | ||||
| 		return err | ||||
| 		return out, err | ||||
| 	} | ||||
| 	defer resp.Close() | ||||
|  | ||||
| @ -107,10 +110,10 @@ func interactiveExec(ctx context.Context, dockerCli command.Cli, client *apiclie | ||||
|  | ||||
| 	if err := <-errCh; err != nil { | ||||
| 		logrus.Debugf("Error hijack: %s", err) | ||||
| 		return err | ||||
| 		return out, err | ||||
| 	} | ||||
|  | ||||
| 	return getExecExitStatus(ctx, client, execID) | ||||
| 	return out, getExecExitStatus(ctx, client, execID) | ||||
| } | ||||
|  | ||||
| func getExecExitStatus(ctx context.Context, client apiclient.ContainerAPIClient, execID string) error { | ||||
|  | ||||
| @ -420,7 +420,7 @@ func convertServiceSecrets( | ||||
| 			return nil, err | ||||
| 		} | ||||
|  | ||||
| 		// NOTE(d1): strip # length=... modifiers | ||||
| 		// NOTE(d1): strip all comments | ||||
| 		if strings.Contains(obj.Name, "#") { | ||||
| 			vals := strings.Split(obj.Name, "#") | ||||
| 			obj.Name = strings.TrimSpace(vals[0]) | ||||
|  | ||||
| @ -18,15 +18,24 @@ func DontSkipValidation(opts *loader.Options) { | ||||
| 	opts.SkipValidation = false | ||||
| } | ||||
|  | ||||
| // SkipInterpolation skip interpolating environment variables. | ||||
| func SkipInterpolation(opts *loader.Options) { | ||||
| 	opts.SkipInterpolation = true | ||||
| } | ||||
|  | ||||
| // LoadComposefile parse the composefile specified in the cli and returns its Config and version. | ||||
| func LoadComposefile(opts Deploy, appEnv map[string]string) (*composetypes.Config, error) { | ||||
| func LoadComposefile(opts Deploy, appEnv map[string]string, options ...func(*loader.Options)) (*composetypes.Config, error) { | ||||
| 	configDetails, err := getConfigDetails(opts.Composefiles, appEnv) | ||||
| 	if err != nil { | ||||
| 		return nil, err | ||||
| 	} | ||||
|  | ||||
| 	if options == nil { | ||||
| 		options = []func(*loader.Options){DontSkipValidation} | ||||
| 	} | ||||
|  | ||||
| 	dicts := getDictsFrom(configDetails.ConfigFiles) | ||||
| 	config, err := loader.Load(configDetails, DontSkipValidation) | ||||
| 	config, err := loader.Load(configDetails, options...) | ||||
| 	if err != nil { | ||||
| 		if fpe, ok := err.(*loader.ForbiddenPropertiesError); ok { | ||||
| 			return nil, fmt.Errorf("compose file contains unsupported options: %s", | ||||
|  | ||||
| @ -5,7 +5,8 @@ import ( | ||||
| 	"fmt" | ||||
| 	"io" | ||||
| 	"io/ioutil" | ||||
| 	"strings" | ||||
| 	"os" | ||||
| 	"os/signal" | ||||
| 	"time" | ||||
|  | ||||
| 	"coopcloud.tech/abra/pkg/upstream/convert" | ||||
| @ -414,7 +415,7 @@ func deployServices( | ||||
| 		return nil | ||||
| 	} | ||||
|  | ||||
| 	logrus.Infof("waiting for services to converge: %s", strings.Join(serviceNames, ", ")) | ||||
| 	logrus.Infof("Waiting for %s to deploy... please hold 🤚", appName) | ||||
| 	ch := make(chan error, len(serviceIDs)) | ||||
| 	for serviceID, serviceName := range serviceIDs { | ||||
| 		logrus.Debugf("waiting on %s to converge", serviceName) | ||||
| @ -431,7 +432,7 @@ func deployServices( | ||||
| 		logrus.Debugf("assuming %s converged successfully", serviceID) | ||||
| 	} | ||||
|  | ||||
| 	logrus.Info("services converged 👌") | ||||
| 	logrus.Infof("Successfully deployed %s", appName) | ||||
|  | ||||
| 	return nil | ||||
| } | ||||
| @ -454,6 +455,10 @@ func WaitOnService(ctx context.Context, cl *dockerClient.Client, serviceID, appN | ||||
| 	errChan := make(chan error, 1) | ||||
| 	pipeReader, pipeWriter := io.Pipe() | ||||
|  | ||||
| 	sigintChannel := make(chan os.Signal, 1) | ||||
| 	signal.Notify(sigintChannel, os.Interrupt) | ||||
| 	defer signal.Stop(sigintChannel) | ||||
|  | ||||
| 	go func() { | ||||
| 		errChan <- progress.ServiceProgress(ctx, cl, serviceID, pipeWriter) | ||||
| 	}() | ||||
| @ -465,6 +470,12 @@ func WaitOnService(ctx context.Context, cl *dockerClient.Client, serviceID, appN | ||||
| 	select { | ||||
| 	case err := <-errChan: | ||||
| 		return err | ||||
| 	case <-sigintChannel: | ||||
| 		return fmt.Errorf(fmt.Sprintf(` | ||||
| Not waiting for %s to deploy. The deployment is ongoing... | ||||
|  | ||||
| If you want to stop the deployment, try: | ||||
|   abra app undeploy %s`, appName, appName)) | ||||
| 	case <-time.After(timeout): | ||||
| 		return fmt.Errorf(fmt.Sprintf(` | ||||
| %s has not converged (%s second timeout reached). | ||||
| @ -481,7 +492,7 @@ And inspect the logs with: | ||||
|  | ||||
|     abra app logs %s | ||||
|  | ||||
| If a service is failing to even start, try smoke out the error with: | ||||
| If a service is failing to even start, try to smoke out the error with: | ||||
|  | ||||
|     abra app errors --watch %s | ||||
|  | ||||
|  | ||||
| @ -8,6 +8,7 @@ | ||||
|     "gomodTidy" | ||||
|   ], | ||||
|   "ignoreDeps": [ | ||||
|     "github.com/urfave/cli" | ||||
|     "github.com/urfave/cli", | ||||
|     "goreleaser/goreleaser" | ||||
|   ] | ||||
| } | ||||
|  | ||||
							
								
								
									
										11
									
								
								scripts/docker/build.sh
									
									
									
									
									
										Executable file
									
								
							
							
						
						
									
										11
									
								
								scripts/docker/build.sh
									
									
									
									
									
										Executable file
									
								
							| @ -0,0 +1,11 @@ | ||||
| #!/bin/bash | ||||
|  | ||||
| if [ ! -f .envrc ]; then | ||||
|     . .envrc.sample | ||||
| else | ||||
|     . .envrc | ||||
| fi | ||||
|  | ||||
| git config --global --add safe.directory /abra  # work around funky file permissions | ||||
|  | ||||
| make build | ||||
| @ -1,8 +1,8 @@ | ||||
| #!/usr/bin/env bash | ||||
|  | ||||
| ABRA_VERSION="0.7.0-beta" | ||||
| ABRA_VERSION="0.8.1-beta" | ||||
| ABRA_RELEASE_URL="https://git.coopcloud.tech/api/v1/repos/coop-cloud/abra/releases/tags/$ABRA_VERSION" | ||||
| RC_VERSION="0.8.0-rc1-beta" | ||||
| RC_VERSION="0.8.1-beta" | ||||
| RC_VERSION_URL="https://git.coopcloud.tech/api/v1/repos/coop-cloud/abra/releases/tags/$RC_VERSION" | ||||
|  | ||||
| for arg in "$@"; do | ||||
|  | ||||
							
								
								
									
										11
									
								
								scripts/release/test.sh
									
									
									
									
									
										Executable file
									
								
							
							
						
						
									
										11
									
								
								scripts/release/test.sh
									
									
									
									
									
										Executable file
									
								
							| @ -0,0 +1,11 @@ | ||||
| #!/bin/bash | ||||
|  | ||||
| set -e | ||||
|  | ||||
| for f in $(find ./tests/integration -name "*.bats"); do | ||||
|   bats -Tp "$f" | ||||
|   res=$? | ||||
|   if [[ "$res" -ne 0 ]]; then | ||||
|     exit 1 | ||||
|   fi | ||||
| done | ||||
							
								
								
									
										10
									
								
								tests/README.md
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										10
									
								
								tests/README.md
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,10 @@ | ||||
| # Test suite | ||||
|  | ||||
| * Unit testing is done in the packages themselves, run `find . -name | ||||
|   "*_test.go"` to find those. Use `make test` to run the entire unit test | ||||
|   suite. Some unit tests require mocked files which are located in | ||||
|   `./tests/resources.` | ||||
|  | ||||
| * Integration tests are in `./tests/integration`. Please see [these | ||||
|   docs](https://docs.coopcloud.tech/abra/hack/#integration-tests) for | ||||
|   instructions and tips on how to run them. | ||||
| @ -1,4 +0,0 @@ | ||||
| GANDI_TOKEN=... | ||||
| HCLOUD_TOKEN=... | ||||
| REGISTRY_PASSWORD=... | ||||
| REGISTRY_USERNAME=... | ||||
Some files were not shown because too many files have changed in this diff Show More
		Reference in New Issue
	
	Block a user
	