2021-08-02 01:10:41 +00:00
|
|
|
package app
|
|
|
|
|
|
|
|
import (
|
|
|
|
"errors"
|
|
|
|
"fmt"
|
|
|
|
"path"
|
|
|
|
|
|
|
|
"coopcloud.tech/abra/catalogue"
|
|
|
|
abraFormatter "coopcloud.tech/abra/cli/formatter"
|
|
|
|
"coopcloud.tech/abra/cli/internal"
|
|
|
|
"coopcloud.tech/abra/config"
|
|
|
|
"coopcloud.tech/abra/secret"
|
|
|
|
"github.com/AlecAivazis/survey/v2"
|
|
|
|
"github.com/sirupsen/logrus"
|
|
|
|
"github.com/urfave/cli/v2"
|
|
|
|
)
|
|
|
|
|
2021-08-02 06:36:35 +00:00
|
|
|
type secrets map[string]string
|
|
|
|
|
|
|
|
var domain string
|
|
|
|
var domainFlag = &cli.StringFlag{
|
|
|
|
Name: "domain",
|
|
|
|
Aliases: []string{"d"},
|
|
|
|
Value: "",
|
|
|
|
Usage: "Choose a domain name",
|
|
|
|
Destination: &domain,
|
|
|
|
}
|
|
|
|
|
|
|
|
var newAppServer string
|
|
|
|
var newAppServerFlag = &cli.StringFlag{
|
|
|
|
Name: "server",
|
|
|
|
Aliases: []string{"s"},
|
|
|
|
Value: "",
|
|
|
|
Usage: "Show apps of a specific server",
|
|
|
|
Destination: &listAppServer,
|
|
|
|
}
|
|
|
|
|
|
|
|
var newAppName string
|
|
|
|
var newAppNameFlag = &cli.StringFlag{
|
|
|
|
Name: "app-name",
|
|
|
|
Aliases: []string{"a"},
|
|
|
|
Value: "",
|
|
|
|
Usage: "Choose an app name",
|
|
|
|
Destination: &newAppName,
|
|
|
|
}
|
2021-08-02 03:18:20 +00:00
|
|
|
|
|
|
|
var appNewDescription = `
|
2021-09-04 22:14:27 +00:00
|
|
|
This command takes a recipe and uses it to create a new app. This new app
|
2021-08-02 01:10:41 +00:00
|
|
|
configuration is stored in your ~/.abra directory under the appropriate server.
|
|
|
|
|
|
|
|
This command does not deploy your app for you. You will need to run "abra app
|
|
|
|
deploy <app>" to do so.
|
|
|
|
|
2021-09-04 22:14:27 +00:00
|
|
|
You can see what recipes are available (i.e. values for the <recipe> argument)
|
|
|
|
by running "abra recipe ls".
|
2021-08-02 01:10:41 +00:00
|
|
|
|
|
|
|
Passing the "--secrets/-S" flag will automatically generate secrets for your
|
|
|
|
app and store them encrypted at rest on the chosen target server. These
|
|
|
|
generated secrets are only visible at generation time, so please take care to
|
|
|
|
store them somewhere safe.
|
|
|
|
|
|
|
|
You can use the "--pass/-P" to store these generated passwords locally in a
|
|
|
|
pass store (see passwordstore.org for more). The pass command must be available
|
|
|
|
on your $PATH.
|
2021-08-02 03:18:20 +00:00
|
|
|
`
|
|
|
|
|
|
|
|
var appNewCommand = &cli.Command{
|
|
|
|
Name: "new",
|
|
|
|
Usage: "Create a new app",
|
|
|
|
Description: appNewDescription,
|
2021-08-02 01:10:41 +00:00
|
|
|
Flags: []cli.Flag{
|
2021-08-02 06:36:35 +00:00
|
|
|
newAppServerFlag,
|
|
|
|
domainFlag,
|
|
|
|
newAppNameFlag,
|
2021-08-02 01:10:41 +00:00
|
|
|
internal.PassFlag,
|
|
|
|
internal.SecretsFlag,
|
|
|
|
},
|
2021-09-04 22:14:27 +00:00
|
|
|
ArgsUsage: "<recipe>",
|
2021-08-02 03:18:20 +00:00
|
|
|
Action: action,
|
|
|
|
}
|
2021-08-02 01:10:41 +00:00
|
|
|
|
2021-09-04 22:14:27 +00:00
|
|
|
// getRecipe retrieves a recipe from the recipe catalogue.
|
|
|
|
func getRecipe(recipeName string) (catalogue.Recipe, error) {
|
|
|
|
catl, err := catalogue.ReadRecipeCatalogue()
|
2021-08-02 03:18:20 +00:00
|
|
|
if err != nil {
|
2021-09-04 22:14:27 +00:00
|
|
|
return catalogue.Recipe{}, err
|
2021-08-02 03:18:20 +00:00
|
|
|
}
|
|
|
|
|
2021-09-04 22:14:27 +00:00
|
|
|
recipe, ok := catl[recipeName]
|
2021-08-02 03:18:20 +00:00
|
|
|
if !ok {
|
2021-09-04 22:14:27 +00:00
|
|
|
return catalogue.Recipe{}, fmt.Errorf("recipe '%s' does not exist?", recipeName)
|
2021-08-02 03:18:20 +00:00
|
|
|
}
|
2021-09-04 22:14:27 +00:00
|
|
|
if err := recipe.EnsureExists(); err != nil {
|
|
|
|
return catalogue.Recipe{}, err
|
2021-08-02 03:18:20 +00:00
|
|
|
}
|
2021-09-04 22:14:27 +00:00
|
|
|
|
|
|
|
return recipe, nil
|
2021-08-02 03:18:20 +00:00
|
|
|
}
|
2021-08-02 01:10:41 +00:00
|
|
|
|
2021-09-04 22:14:27 +00:00
|
|
|
// ensureDomainFlag checks if the domain flag was used. if not, asks the user for it/
|
2021-08-02 03:18:20 +00:00
|
|
|
func ensureDomainFlag() error {
|
2021-08-02 06:36:35 +00:00
|
|
|
if domain == "" {
|
2021-08-02 03:18:20 +00:00
|
|
|
prompt := &survey.Input{
|
|
|
|
Message: "Specify app domain",
|
2021-08-02 01:10:41 +00:00
|
|
|
}
|
2021-08-02 06:36:35 +00:00
|
|
|
if err := survey.AskOne(prompt, &domain); err != nil {
|
2021-08-02 03:18:20 +00:00
|
|
|
return err
|
2021-08-02 01:10:41 +00:00
|
|
|
}
|
2021-08-02 03:18:20 +00:00
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
2021-08-02 01:10:41 +00:00
|
|
|
|
2021-09-04 22:14:27 +00:00
|
|
|
// ensureServerFlag checks if the server flag was used. if not, asks the user for it.
|
2021-08-02 03:18:20 +00:00
|
|
|
func ensureServerFlag() error {
|
2021-08-02 06:36:35 +00:00
|
|
|
appFiles, err := config.LoadAppFiles(newAppServer)
|
2021-08-02 03:18:20 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
servers := appFiles.GetServers()
|
2021-08-02 06:36:35 +00:00
|
|
|
if newAppServer == "" {
|
2021-08-02 03:18:20 +00:00
|
|
|
prompt := &survey.Select{
|
|
|
|
Message: "Select app server:",
|
|
|
|
Options: servers,
|
2021-08-02 01:10:41 +00:00
|
|
|
}
|
2021-08-02 06:36:35 +00:00
|
|
|
if err := survey.AskOne(prompt, &newAppServer); err != nil {
|
2021-08-02 03:18:20 +00:00
|
|
|
return err
|
2021-08-02 01:10:41 +00:00
|
|
|
}
|
2021-08-02 03:18:20 +00:00
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
2021-08-02 01:10:41 +00:00
|
|
|
|
2021-09-04 22:14:27 +00:00
|
|
|
// ensureServerFlag checks if the AppName flag was used. if not, asks the user for it.
|
2021-08-02 03:18:20 +00:00
|
|
|
func ensureAppNameFlag() error {
|
2021-08-02 06:36:35 +00:00
|
|
|
if newAppName == "" {
|
2021-08-02 03:18:20 +00:00
|
|
|
prompt := &survey.Input{
|
|
|
|
Message: "Specify app name:",
|
2021-08-02 06:36:35 +00:00
|
|
|
Default: config.SanitiseAppName(domain),
|
2021-08-02 01:10:41 +00:00
|
|
|
}
|
2021-08-02 06:36:35 +00:00
|
|
|
if err := survey.AskOne(prompt, &newAppName); err != nil {
|
2021-08-02 03:18:20 +00:00
|
|
|
return err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
2021-08-02 01:10:41 +00:00
|
|
|
|
2021-09-04 22:14:27 +00:00
|
|
|
// createSecrets creates all secrets for a new app.
|
2021-08-02 06:36:35 +00:00
|
|
|
func createSecrets(sanitisedAppName string) (secrets, error) {
|
|
|
|
appEnvPath := path.Join(config.ABRA_DIR, "servers", newAppServer, fmt.Sprintf("%s.env", sanitisedAppName))
|
2021-08-02 03:18:20 +00:00
|
|
|
appEnv, err := config.ReadEnv(appEnvPath)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
secretEnvVars := secret.ReadSecretEnvVars(appEnv)
|
2021-08-02 06:36:35 +00:00
|
|
|
secrets, err := secret.GenerateSecrets(secretEnvVars, sanitisedAppName, newAppServer)
|
2021-08-02 03:18:20 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
if internal.Pass {
|
|
|
|
for secretName := range secrets {
|
|
|
|
secretValue := secrets[secretName]
|
2021-08-02 06:36:35 +00:00
|
|
|
if err := secret.PassInsertSecret(secretValue, secretName, sanitisedAppName, newAppServer); err != nil {
|
2021-08-02 03:18:20 +00:00
|
|
|
return nil, err
|
|
|
|
}
|
2021-08-02 01:10:41 +00:00
|
|
|
}
|
2021-08-02 03:18:20 +00:00
|
|
|
}
|
|
|
|
return secrets, nil
|
|
|
|
}
|
2021-08-02 01:10:41 +00:00
|
|
|
|
2021-09-04 22:14:27 +00:00
|
|
|
// action is the main command-line action for this package
|
2021-08-02 03:18:20 +00:00
|
|
|
func action(c *cli.Context) error {
|
2021-09-04 22:14:27 +00:00
|
|
|
recipeName := c.Args().First()
|
|
|
|
if recipeName == "" {
|
|
|
|
internal.ShowSubcommandHelpAndError(c, errors.New("no recipe provided"))
|
2021-08-02 03:18:20 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if err := config.EnsureAbraDirExists(); err != nil {
|
|
|
|
logrus.Fatal(err)
|
|
|
|
}
|
|
|
|
|
2021-09-04 22:14:27 +00:00
|
|
|
recipe, err := getRecipe(recipeName)
|
2021-08-02 03:18:20 +00:00
|
|
|
if err != nil {
|
|
|
|
logrus.Fatal(err)
|
|
|
|
}
|
|
|
|
|
2021-09-04 22:14:27 +00:00
|
|
|
latestVersion := recipe.LatestVersion()
|
|
|
|
if err := recipe.EnsureVersion(latestVersion); err != nil {
|
2021-08-02 03:18:20 +00:00
|
|
|
logrus.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// These use the flag from internal.x to check and edit so no need to return anything
|
|
|
|
if err := ensureServerFlag(); err != nil {
|
|
|
|
logrus.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if err := ensureDomainFlag(); err != nil {
|
|
|
|
logrus.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if err := ensureAppNameFlag(); err != nil {
|
|
|
|
logrus.Fatal(err)
|
|
|
|
}
|
|
|
|
|
2021-08-02 06:36:35 +00:00
|
|
|
sanitisedAppName := config.SanitiseAppName(newAppName)
|
2021-08-02 03:18:20 +00:00
|
|
|
if len(sanitisedAppName) > 45 {
|
|
|
|
logrus.Fatalf("'%s' cannot be longer than 45 characters", sanitisedAppName)
|
|
|
|
}
|
|
|
|
|
2021-09-04 22:14:27 +00:00
|
|
|
if err := config.CopyAppEnvSample(recipeName, newAppName, newAppServer); err != nil {
|
2021-08-02 03:18:20 +00:00
|
|
|
logrus.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if internal.Secrets {
|
|
|
|
secrets, err := createSecrets(sanitisedAppName)
|
|
|
|
if err != nil {
|
2021-08-02 01:10:41 +00:00
|
|
|
logrus.Fatal(err)
|
|
|
|
}
|
|
|
|
|
2021-08-02 03:18:20 +00:00
|
|
|
secretCols := []string{"Name", "Value"}
|
|
|
|
secretTable := abraFormatter.CreateTable(secretCols)
|
|
|
|
for secret := range secrets {
|
|
|
|
secretTable.Append([]string{secret, secrets[secret]})
|
2021-08-02 01:10:41 +00:00
|
|
|
}
|
2021-08-02 03:18:20 +00:00
|
|
|
defer secretTable.Render()
|
|
|
|
}
|
2021-08-02 01:10:41 +00:00
|
|
|
|
2021-08-02 03:18:20 +00:00
|
|
|
tableCol := []string{"Name", "Domain", "Type", "Server"}
|
|
|
|
table := abraFormatter.CreateTable(tableCol)
|
2021-09-04 22:14:27 +00:00
|
|
|
table.Append([]string{sanitisedAppName, domain, recipeName, newAppServer})
|
2021-08-02 03:18:20 +00:00
|
|
|
defer table.Render()
|
2021-08-02 01:10:41 +00:00
|
|
|
|
2021-08-02 03:18:20 +00:00
|
|
|
return nil
|
2021-08-02 01:10:41 +00:00
|
|
|
}
|