forked from toolshed/abra
		
	Compare commits
	
		
			323 Commits
		
	
	
		
			0.7.0-rc2-
			...
			test-refac
		
	
	| Author | SHA1 | Date | |
|---|---|---|---|
| 9ec99c7712 | |||
| aa3910f8df | |||
| 43990b6fae | |||
| 91ea2c01a5 | |||
| 316fdd3643 | |||
| e07ae8cccd | |||
| 300a4ead01 | |||
| f209b6f564 | |||
| 791183adfe | |||
| e6b35e8524 | |||
| 8a0274cac0 | |||
| e609924af0 | |||
| 70e2943301 | |||
| 0590c1824d | |||
| 459abecfa5 | |||
| 183ad8f576 | |||
| 03f94da2d8 | |||
| 766f69b0fd | |||
| 004cd70aed | |||
| a4de446f58 | |||
| d21c35965d | |||
| 63ea58ffaa | |||
| 2ecace3e90 | |||
| d5ac3958a4 | |||
| 72c20e0039 | |||
| 575f9905f1 | |||
| e3a0af5840 | |||
| 9a3a39a185 | |||
| cea56dddde | |||
| 2c515ce70a | |||
| 40c0fb4bac | |||
| 0643df6d73 | |||
| e9b99fe921 | |||
| 4920dfedb3 | |||
| 0a3624c15b | |||
| c5687dfbd7 | |||
| ca91abbed9 | |||
| d4727db8f9 | |||
| af8cd1f67a | |||
| cdd7516e54 | |||
| 99e3ed416f | |||
| 02b726db02 | |||
| 2de6934322 | |||
| cb49cf06d1 | |||
| 9affda8a70 | |||
| 3957b7c965 | |||
| 0d83339d80 | |||
| 6e54ec7213 | |||
| 66b40a9189 | |||
| 049f02f063 | |||
| 15857e6453 | |||
| 31e0ed75b0 | |||
| b1d3fcbb0b | |||
| 7b6134f35e | |||
| 316b59b465 | |||
| 92b073d5b6 | |||
| 9b0dd933b5 | |||
| f255fa1555 | |||
| 74200318ab | |||
| 609656b4e1 | |||
| 856c9f2f7d | |||
| bd5cdd3443 | |||
| 79d274e074 | |||
| 51e3df17f1 | |||
| ccf0215495 | |||
| 254df7f2be | |||
| 6a673ef101 | |||
| 7f7f7224c6 | |||
| f96bf9a8ac | |||
| dcecf32999 | |||
| bc88dac150 | |||
| 704c0e9c74 | |||
| c9bb7e15c2 | |||
| d90c9b88f1 | |||
| 69ce07f81f | |||
| 85b90ef80c | |||
| 3e511446aa | |||
| 7566b4262b | |||
| c249c6ae9c | |||
| be693e9df0 | |||
| a43125701c | |||
| b57edb440a | |||
| 6fc4573a71 | |||
| cbe6676881 | |||
| b4fd39828f | |||
| 14f2d72aba | |||
| 57692ec3c9 | |||
| 47d3b77003 | |||
| 8078e91e52 | |||
| dc5d3a8dd6 | |||
| ab6107610c | |||
| e837835e00 | |||
| c646263e9e | |||
| 422c642949 | |||
| 379915587c | |||
| 970ae0fc4e | |||
| d11ad61efb | |||
| 54dc696c69 | |||
| 7e3ce9c42a | |||
| 7751423c7d | |||
| f18f0b6f82 | |||
| 892f6c0730 | |||
| b53fd2689c | |||
| 906bf65d47 | |||
| 1e6a6e6174 | |||
| 1e4f1b4ade | |||
| 306fe02d1c | |||
| e4610f8ad5 | |||
| e1f900de14 | |||
| d5b18d74ef | |||
| 776a83d8d1 | |||
| 810cea8269 | |||
| c0f3e6f2a4 | |||
| 7b240059b0 | |||
| c456d13881 | |||
| c7c553164d | |||
| 7616528f4e | |||
| 6cd85f7239 | |||
| b1774cc44b | |||
| e438fc6e8e | |||
| c065ceb1f0 | |||
| ce4b775428 | |||
| d02f659bf8 | |||
| f3ded88ed8 | |||
| bf648eeb5d | |||
| 533edbf172 | |||
| 78b8cf9725 | |||
| f0560ca975 | |||
| ce7b4733d7 | |||
| 575bfbb0fb | |||
| 510ce66570 | |||
| 82631d9ab1 | |||
| 358490e939 | |||
| 79b9cc9be7 | |||
| 9b6eb613aa | |||
| 8f1231e409 | |||
| aa37c936eb | |||
| 3d1158a425 | |||
| 8788558cf1 | |||
| 76035e003e | |||
| b708382d26 | |||
| 557b670fc5 | |||
| e116148c49 | |||
| d5593b69e0 | |||
| 0be532692d | |||
| 7a9224b2b2 | |||
| e73d1a8359 | |||
| f8c49c82c8 | |||
| ab7edd2a62 | |||
| b1888dcf0f | |||
| e5e122296f | |||
| 83bf148304 | |||
| d80b882b83 | |||
| c345c6f5f1 | |||
| f8c4fd72a3 | |||
| 10f612f998 | |||
| 58e78e4d7c | |||
| 25258d3d64 | |||
| b3bd058962 | |||
| b4fd7fd77c | |||
| 64cfdae6b7 | |||
| 0a765794f2 | |||
| 18dc6e9434 | |||
| 4ba4107288 | |||
| d9b4f4ef3b | |||
| c365dcf96d | |||
| 0c6a7cc0b8 | |||
| 6640cfab64 | |||
| 71addcd1b2 | |||
| 60c0e55e3d | |||
| e42139fd83 | |||
| 2d826e47d0 | |||
| 2db172ea5a | |||
| 2077658f6a | |||
| 502e26b534 | |||
| e22b692ada | |||
| 5ae73f700e | |||
| 63d419caae | |||
| 179b66d65c | |||
| c9144d90f3 | |||
| ebf5d82c56 | |||
| 8bb98ed0ed | |||
| 23f5745cb8 | |||
| 2cd453ae8d | |||
| e42cc0f91d | |||
| 1de45a6508 | |||
| 55c7aca3c0 | |||
| 8fa9419c99 | |||
| 73ad0a802e | |||
| 798fd2336c | |||
| 70e65d6667 | |||
| efc9602808 | |||
| 1e110f1375 | |||
| 473cae0146 | |||
| 2da859896a | |||
| ab00578ee1 | |||
| 3dc5662821 | |||
| ab64eb2e8d | |||
| 4f22228aab | |||
| a7f1af7476 | |||
| 949510d4c3 | |||
| 9f478dac1d | |||
| 69f38ea445 | |||
| 0582147874 | |||
| bdeeb75973 | |||
| 2518e65e3e | |||
| 8354c92654 | |||
| 173e81b885 | |||
| d91731518b | |||
| 2bfee5058d | |||
| a7ce71d6cf | |||
| 10f60fee1d | |||
| 6025ab443f | |||
| 43ecf35449 | |||
| 4d2a1065d2 | |||
| 0b67500cab | |||
| e0c3a06182 | |||
| a86ba4e97b | |||
| b5b3395138 | |||
| 502b78ef5c | |||
| 3e2b4dae6a | |||
| 573fe403b3 | |||
| 76862e9d66 | |||
| e8e337a608 | |||
| 500389c5f5 | |||
| dea665652c | |||
| e8cf84b523 | |||
| fab25a6124 | |||
| e71377539c | |||
| 497ecf476a | |||
| ff1c043ec5 | |||
| c4d2e297f8 | |||
| e98b8e3666 | |||
| f5835fe404 | |||
| 07bbe9394f | |||
| 6974681af5 | |||
| 73250fb899 | |||
| 4ce377cffe | |||
| c7dd029689 | |||
| 51319d2ae2 | |||
| d1c2343a54 | |||
| 135ffde0e5 | |||
| 6e4dd51b27 | |||
| 81b652718b | |||
| 442f46e17f | |||
| 574794d4e8 | |||
| 88184125c4 | |||
| 8a4baa66ee | |||
| 16ecbd0291 | |||
| f65b262c11 | |||
| c5d9d88359 | |||
| 87e5909363 | |||
| 152c5d4563 | |||
| 34b274bc52 | |||
| 62f8103fc2 | |||
| 2dcbfa1d65 | |||
| 049da94629 | |||
| b2739dcdf2 | |||
| 343b2bfb91 | |||
| 17aeed6dbd | |||
| 27cac81830 | |||
| 31ec322c55 | |||
| 18615eaaef | |||
| 5e508538f3 | |||
| 9e05000476 | |||
| f088a0d327 | |||
| 3832403c97 | |||
| 47058c897c | |||
| 5d4c7f8ef0 | |||
| ee4315adb3 | |||
| 9ade250f01 | |||
| 81b032be85 | |||
| 5409990a68 | |||
| b1595c0ec9 | |||
| 6c99a2980b | |||
| a9405a36c6 | |||
| 15a417d9bd | |||
| 0ce8b3a5c2 | |||
| edff63b446 | |||
| d5979436c1 | |||
| cb33edaac3 | |||
| e9879e2226 | |||
| 5428ebf43b | |||
| d120299929 | |||
| 3753357ef8 | |||
| 611430aab2 | |||
| f56b02b951 | |||
| f29278f80a | |||
| a9a294cbb7 | |||
| 73004789a4 | |||
| 440aba77d5 | |||
| e4a89bcc4f | |||
| eb07617e73 | |||
| 9fca4e56fb | |||
| f17523010a | |||
| 3058178d84 | |||
| d62c4e3400 | |||
| 5739758c3a | |||
| a6b5566fa6 | |||
| 4dbe1362a8 | |||
| 98fc36c830 | |||
| b8abc8705c | |||
| 636261934f | |||
| 6381b73a6a | |||
| 1a72e27045 | |||
| 9754c1b2d1 | |||
| b14ec0cda4 | |||
| c7730ba604 | |||
| 47c61df444 | |||
| 312b93e794 | |||
| 992e675921 | |||
| d4f3a7be31 | |||
| d619f399e7 | |||
| 96a8cb7aff | |||
| 9b51d22c20 | |||
| d789830ce4 | |||
| e4b4084dfd | |||
| ff58646cfc | |||
| eec6469ba1 | |||
| e94f947d20 | |||
| cccbe4a2ec | |||
| f53cfb6c36 | |||
| f55f01a25c | 
| @ -1,4 +1,8 @@ | ||||
| Dockerfile | ||||
| .dockerignore | ||||
| *.swp | ||||
| *.swo | ||||
| *.swp | ||||
| .dockerignore | ||||
| Dockerfile | ||||
| abra | ||||
| dist | ||||
| kadabra | ||||
| tags | ||||
|  | ||||
							
								
								
									
										20
									
								
								.drone.yml
									
									
									
									
									
								
							
							
						
						
									
										20
									
								
								.drone.yml
									
									
									
									
									
								
							| @ -3,20 +3,17 @@ kind: pipeline | ||||
| name: coopcloud.tech/abra | ||||
| steps: | ||||
|   - name: make check | ||||
|     image: golang:1.20 | ||||
|     image: golang:1.21 | ||||
|     commands: | ||||
|       - make check | ||||
|  | ||||
|   - name: make build | ||||
|     image: golang:1.20 | ||||
|     commands: | ||||
|       - make build | ||||
|     depends_on: | ||||
|       - make check | ||||
|  | ||||
|   - name: make test | ||||
|     image: golang:1.20 | ||||
|     image: golang:1.21 | ||||
|     environment: | ||||
|       ABRA_DIR: "/root/.abra" | ||||
|     commands: | ||||
|       - make build-abra | ||||
|       - ./abra help # show version, initialise $ABRA_DIR | ||||
|       - make test | ||||
|     depends_on: | ||||
|       - make check | ||||
| @ -27,13 +24,12 @@ steps: | ||||
|       - git fetch --tags | ||||
|     depends_on: | ||||
|       - make check | ||||
|       - make build | ||||
|       - make test | ||||
|     when: | ||||
|       event: tag | ||||
|  | ||||
|   - name: release | ||||
|     image: golang:1.20 | ||||
|     image: goreleaser/goreleaser:v1.24.0 | ||||
|     environment: | ||||
|       GITEA_TOKEN: | ||||
|         from_secret: goreleaser_gitea_token | ||||
| @ -41,7 +37,7 @@ steps: | ||||
|       - name: deps | ||||
|         path: /go | ||||
|     commands: | ||||
|       - curl -sL https://git.io/goreleaser | bash | ||||
|       - goreleaser release | ||||
|     depends_on: | ||||
|       - fetch | ||||
|     when: | ||||
|  | ||||
| @ -1,4 +0,0 @@ | ||||
| GANDI_TOKEN=... | ||||
| HCLOUD_TOKEN=... | ||||
| REGISTRY_PASSWORD=... | ||||
| REGISTRY_USERNAME=... | ||||
| @ -1,6 +1,7 @@ | ||||
| go env -w GOPRIVATE=coopcloud.tech | ||||
|  | ||||
| # export PASSWORD_STORE_DIR=$(pwd)/../../autonomic/passwords/passwords/ | ||||
| # export HCLOUD_TOKEN=$(pass show logins/hetzner/cicd/api_key) | ||||
| # export CAPSUL_TOKEN=... | ||||
| # export GITEA_TOKEN=... | ||||
|  | ||||
| # export ABRA_DIR="$HOME/.abra_test" | ||||
| # export ABRA_TEST_DOMAIN=test.example.com | ||||
| # export ABRA_SKIP_TEARDOWN=1 # for faster feedback when developing tests | ||||
|  | ||||
							
								
								
									
										2
									
								
								.gitignore
									
									
									
									
										vendored
									
									
								
							
							
						
						
									
										2
									
								
								.gitignore
									
									
									
									
										vendored
									
									
								
							| @ -5,5 +5,5 @@ | ||||
| /kadabra | ||||
| abra | ||||
| dist/ | ||||
| tests/integration/.abra/catalogue | ||||
| tests/integration/.bats | ||||
| vendor/ | ||||
|  | ||||
| @ -29,6 +29,8 @@ builds: | ||||
|     ldflags: | ||||
|       - "-X 'main.Commit={{ .Commit }}'" | ||||
|       - "-X 'main.Version={{ .Version }}'" | ||||
|       - "-s" | ||||
|       - "-w" | ||||
|  | ||||
|   - id: kadabra | ||||
|     binary: kadabra | ||||
| @ -50,12 +52,8 @@ builds: | ||||
|     ldflags: | ||||
|       - "-X 'main.Commit={{ .Commit }}'" | ||||
|       - "-X 'main.Version={{ .Version }}'" | ||||
|  | ||||
| archives: | ||||
|   - replacements: | ||||
|       386: i386 | ||||
|       amd64: x86_64 | ||||
|     format: binary | ||||
|       - "-s" | ||||
|       - "-w" | ||||
|  | ||||
| checksum: | ||||
|   name_template: "checksums.txt" | ||||
|  | ||||
| @ -1,13 +1,19 @@ | ||||
| # authors | ||||
|  | ||||
| > If you're looking at this and you hack on `abra` and you're not listed here, | ||||
| > please do add yourself! This is a community project, let's show some :heart: | ||||
| > please do add yourself! This is a community project, let's show some 💞 | ||||
|  | ||||
| - 3wordchant | ||||
| - cassowary | ||||
| - codegod100 | ||||
| - decentral1se | ||||
| - fauno | ||||
| - frando | ||||
| - kawaiipunk | ||||
| - knoflook | ||||
| - moritz | ||||
| - p4u1 | ||||
| - rix | ||||
| - roxxers | ||||
| - vera | ||||
| - yksflip | ||||
|  | ||||
							
								
								
									
										19
									
								
								Dockerfile
									
									
									
									
									
								
							
							
						
						
									
										19
									
								
								Dockerfile
									
									
									
									
									
								
							| @ -1,8 +1,13 @@ | ||||
| FROM golang:1.20-alpine AS build | ||||
| # Build image | ||||
| FROM golang:1.21-alpine AS build | ||||
|  | ||||
| ENV GOPRIVATE coopcloud.tech | ||||
|  | ||||
| RUN apk add --no-cache make git gcc musl-dev | ||||
| RUN apk add --no-cache \ | ||||
|   gcc \ | ||||
|   git \ | ||||
|   make \ | ||||
|   musl-dev | ||||
|  | ||||
| COPY . /app | ||||
|  | ||||
| @ -10,7 +15,15 @@ WORKDIR /app | ||||
|  | ||||
| RUN CGO_ENABLED=0 make build | ||||
|  | ||||
| FROM scratch | ||||
| # Release image ("slim") | ||||
| FROM alpine:3.19.1 | ||||
|  | ||||
| RUN apk add --no-cache \ | ||||
|   ca-certificates \ | ||||
|   git \ | ||||
|   openssh | ||||
|  | ||||
| RUN update-ca-certificates | ||||
|  | ||||
| COPY --from=build /app/abra /abra | ||||
|  | ||||
|  | ||||
							
								
								
									
										39
									
								
								Makefile
									
									
									
									
									
								
							
							
						
						
									
										39
									
								
								Makefile
									
									
									
									
									
								
							| @ -2,25 +2,40 @@ ABRA         := ./cmd/abra | ||||
| KADABRA      := ./cmd/kadabra | ||||
| COMMIT       := $(shell git rev-list -1 HEAD) | ||||
| GOPATH       := $(shell go env GOPATH) | ||||
| GOVERSION    := 1.21 | ||||
| LDFLAGS      := "-X 'main.Commit=$(COMMIT)'" | ||||
| DIST_LDFLAGS := $(LDFLAGS)" -s -w" | ||||
|  | ||||
| export GOPRIVATE=coopcloud.tech | ||||
|  | ||||
| all: format check build test | ||||
| # NOTE(d1): default `make` optimised for Abra hacking | ||||
| all: format check build-abra test | ||||
|  | ||||
| run: | ||||
| run-abra: | ||||
| 	@go run -ldflags=$(LDFLAGS) $(ABRA) | ||||
|  | ||||
| install: | ||||
| run-kadabra: | ||||
| 	@go run -ldflags=$(LDFLAGS) $(KADABRA) | ||||
|  | ||||
| install-abra: | ||||
| 	@go install -ldflags=$(LDFLAGS) $(ABRA) | ||||
|  | ||||
| build-dev: | ||||
| 	@go build -ldflags=$(LDFLAGS) $(ABRA) | ||||
| install-kadabra: | ||||
| 	@go install -ldflags=$(LDFLAGS) $(KADABRA) | ||||
|  | ||||
| build: | ||||
| 	@go build -ldflags=$(DIST_LDFLAGS) $(ABRA) | ||||
| 	@go build -ldflags=$(DIST_LDFLAGS) $(KADABRA) | ||||
| build-abra: | ||||
| 	@go build -v -ldflags=$(DIST_LDFLAGS) $(ABRA) | ||||
|  | ||||
| build-kadabra: | ||||
| 	@go build -v -ldflags=$(DIST_LDFLAGS) $(KADABRA) | ||||
|  | ||||
| build: build-abra build-kadabra | ||||
|  | ||||
| build-docker-abra: | ||||
| 	@docker run -it -v $(PWD):/abra golang:$(GOVERSION) \ | ||||
| 		bash -c 'cd /abra; ./scripts/docker/build.sh' | ||||
|  | ||||
| build-docker: build-docker-abra | ||||
|  | ||||
| clean: | ||||
| 	@rm '$(GOPATH)/bin/abra' | ||||
| @ -39,9 +54,5 @@ test: | ||||
| loc: | ||||
| 	@find . -name "*.go" | xargs wc -l | ||||
|  | ||||
| loc-author: | ||||
| 	@git ls-files -z | \ | ||||
| 		xargs -0rn 1 -P "$$(nproc)" -I{} sh -c 'git blame -w -M -C -C --line-porcelain -- {} | grep -I --line-buffered "^author "' | \ | ||||
|    	sort -f | \ | ||||
|    	uniq -ic | \ | ||||
|    	sort -n | ||||
| deps: | ||||
| 	@go get -t -u ./... | ||||
|  | ||||
| @ -2,11 +2,12 @@ | ||||
|  | ||||
| [](https://build.coopcloud.tech/coop-cloud/abra) | ||||
| [](https://goreportcard.com/report/git.coopcloud.tech/coop-cloud/abra) | ||||
| [](https://pkg.go.dev/coopcloud.tech/abra) | ||||
|  | ||||
| The Co-op Cloud utility belt 🎩🐇 | ||||
|  | ||||
| <a href="https://github.com/egonelbre/gophers"><img align="right" width="150" src="https://github.com/egonelbre/gophers/raw/master/.thumb/sketch/adventure/poking-fire.png"/></a> | ||||
|  | ||||
| `abra` is the flagship client & command-line tool for Co-op Cloud. It has been developed specifically for the purpose of making the day-to-day operations of [operators](https://docs.coopcloud.tech/operators/) and [maintainers](https://docs.coopcloud.tech/maintainers/) pleasant & convenient. It is libre software, written in [Go](https://go.dev) and maintained and extended by the community :heart: | ||||
| `abra` is the flagship client & command-line tool for Co-op Cloud. It has been developed specifically for the purpose of making the day-to-day operations of [operators](https://docs.coopcloud.tech/operators/) and [maintainers](https://docs.coopcloud.tech/maintainers/) pleasant & convenient. It is libre software, written in [Go](https://go.dev) and maintained and extended by the community 💖 | ||||
|  | ||||
| Please see [docs.coopcloud.tech/abra](https://docs.coopcloud.tech/abra) for help on install, upgrade, hacking, troubleshooting & more! | ||||
|  | ||||
| @ -1,397 +1,296 @@ | ||||
| package app | ||||
|  | ||||
| import ( | ||||
| 	"archive/tar" | ||||
| 	"context" | ||||
| 	"fmt" | ||||
| 	"io" | ||||
| 	"os" | ||||
| 	"path/filepath" | ||||
| 	"strings" | ||||
| 	"time" | ||||
|  | ||||
| 	"coopcloud.tech/abra/cli/internal" | ||||
| 	"coopcloud.tech/abra/pkg/autocomplete" | ||||
| 	"coopcloud.tech/abra/pkg/client" | ||||
| 	"coopcloud.tech/abra/pkg/config" | ||||
| 	containerPkg "coopcloud.tech/abra/pkg/container" | ||||
| 	"coopcloud.tech/abra/pkg/recipe" | ||||
| 	"coopcloud.tech/abra/pkg/upstream/container" | ||||
| 	"github.com/docker/cli/cli/command" | ||||
| 	"github.com/docker/docker/api/types" | ||||
| 	"github.com/docker/docker/api/types/filters" | ||||
| 	dockerClient "github.com/docker/docker/client" | ||||
| 	"github.com/docker/docker/pkg/archive" | ||||
| 	"github.com/docker/docker/pkg/system" | ||||
| 	"github.com/klauspost/pgzip" | ||||
| 	"github.com/sirupsen/logrus" | ||||
| 	"github.com/urfave/cli" | ||||
| ) | ||||
|  | ||||
| type backupConfig struct { | ||||
| 	preHookCmd  string | ||||
| 	postHookCmd string | ||||
| 	backupPaths []string | ||||
| var snapshot string | ||||
| var snapshotFlag = &cli.StringFlag{ | ||||
| 	Name:        "snapshot, s", | ||||
| 	Usage:       "Lists specific snapshot", | ||||
| 	Destination: &snapshot, | ||||
| } | ||||
|  | ||||
| var appBackupCommand = cli.Command{ | ||||
| 	Name:      "backup", | ||||
| 	Aliases:   []string{"bk"}, | ||||
| 	Usage:     "Run app backup", | ||||
| 	ArgsUsage: "<domain> [<service>]", | ||||
| var includePath string | ||||
| var includePathFlag = &cli.StringFlag{ | ||||
| 	Name:        "path, p", | ||||
| 	Usage:       "Include path", | ||||
| 	Destination: &includePath, | ||||
| } | ||||
|  | ||||
| var resticRepo string | ||||
| var resticRepoFlag = &cli.StringFlag{ | ||||
| 	Name:        "repo, r", | ||||
| 	Usage:       "Restic repository", | ||||
| 	Destination: &resticRepo, | ||||
| } | ||||
|  | ||||
| var appBackupListCommand = cli.Command{ | ||||
| 	Name:    "list", | ||||
| 	Aliases: []string{"ls"}, | ||||
| 	Flags: []cli.Flag{ | ||||
| 		internal.DebugFlag, | ||||
| 		internal.OfflineFlag, | ||||
| 		snapshotFlag, | ||||
| 		includePathFlag, | ||||
| 	}, | ||||
| 	Before:       internal.SubCommandBefore, | ||||
| 	Usage:        "List all backups", | ||||
| 	BashComplete: autocomplete.AppNameComplete, | ||||
| 	Description: ` | ||||
| Run an app backup. | ||||
|  | ||||
| A backup command and pre/post hook commands are defined in the recipe | ||||
| configuration. Abra reads this configuration and run the comands in the context | ||||
| of the deployed services. Pass <service> if you only want to back up a single | ||||
| service. All backups are placed in the ~/.abra/backups directory. | ||||
|  | ||||
| A single backup file is produced for all backup paths specified for a service. | ||||
| If we have the following backup configuration: | ||||
|  | ||||
|     - "backupbot.backup.path=/var/lib/foo,/var/lib/bar" | ||||
|  | ||||
| And we run "abra app backup example.com app", Abra will produce a file that | ||||
| looks like: | ||||
|  | ||||
|     ~/.abra/backups/example_com_app_609341138.tar.gz | ||||
|  | ||||
| This file is a compressed archive which contains all backup paths. To see paths, run: | ||||
|  | ||||
|     tar -tf ~/.abra/backups/example_com_app_609341138.tar.gz | ||||
|  | ||||
| (Make sure to change the name of the backup file) | ||||
|  | ||||
| This single file can be used to restore your app. See "abra app restore" for more. | ||||
| `, | ||||
| 	Action: func(c *cli.Context) error { | ||||
| 		app := internal.ValidateApp(c) | ||||
|  | ||||
| 		if err := recipe.EnsureExists(app.Recipe); err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		if !internal.Chaos { | ||||
| 			if err := recipe.EnsureIsClean(app.Recipe); err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
|  | ||||
| 			if !internal.Offline { | ||||
| 				if err := recipe.EnsureUpToDate(app.Recipe); err != nil { | ||||
| 					logrus.Fatal(err) | ||||
| 				} | ||||
| 			} | ||||
|  | ||||
| 			if err := recipe.EnsureLatest(app.Recipe); err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
| 		} | ||||
|  | ||||
| 		cl, err := client.New(app.Server) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		recipe, err := recipe.Get(app.Recipe) | ||||
| 		targetContainer, err := internal.RetrieveBackupBotContainer(cl) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		backupConfigs := make(map[string]backupConfig) | ||||
| 		for _, service := range recipe.Config.Services { | ||||
| 			if backupsEnabled, ok := service.Deploy.Labels["backupbot.backup"]; ok { | ||||
| 				if backupsEnabled == "true" { | ||||
| 					fullServiceName := fmt.Sprintf("%s_%s", app.StackName(), service.Name) | ||||
| 					bkConfig := backupConfig{} | ||||
|  | ||||
| 					logrus.Debugf("backup config detected for %s", fullServiceName) | ||||
|  | ||||
| 					if paths, ok := service.Deploy.Labels["backupbot.backup.path"]; ok { | ||||
| 						logrus.Debugf("detected backup paths for %s: %s", fullServiceName, paths) | ||||
| 						bkConfig.backupPaths = strings.Split(paths, ",") | ||||
| 					} | ||||
|  | ||||
| 					if preHookCmd, ok := service.Deploy.Labels["backupbot.backup.pre-hook"]; ok { | ||||
| 						logrus.Debugf("detected pre-hook command for %s: %s", fullServiceName, preHookCmd) | ||||
| 						bkConfig.preHookCmd = preHookCmd | ||||
| 					} | ||||
|  | ||||
| 					if postHookCmd, ok := service.Deploy.Labels["backupbot.backup.post-hook"]; ok { | ||||
| 						logrus.Debugf("detected post-hook command for %s: %s", fullServiceName, postHookCmd) | ||||
| 						bkConfig.postHookCmd = postHookCmd | ||||
| 					} | ||||
|  | ||||
| 					backupConfigs[service.Name] = bkConfig | ||||
| 				} | ||||
| 			} | ||||
| 		execEnv := []string{fmt.Sprintf("SERVICE=%s", app.Domain)} | ||||
| 		if snapshot != "" { | ||||
| 			logrus.Debugf("including SNAPSHOT=%s in backupbot exec invocation", snapshot) | ||||
| 			execEnv = append(execEnv, fmt.Sprintf("SNAPSHOT=%s", snapshot)) | ||||
| 		} | ||||
| 		if includePath != "" { | ||||
| 			logrus.Debugf("including INCLUDE_PATH=%s in backupbot exec invocation", includePath) | ||||
| 			execEnv = append(execEnv, fmt.Sprintf("INCLUDE_PATH=%s", includePath)) | ||||
| 		} | ||||
|  | ||||
| 		serviceName := c.Args().Get(1) | ||||
| 		if serviceName != "" { | ||||
| 			backupConfig, ok := backupConfigs[serviceName] | ||||
| 			if !ok { | ||||
| 				logrus.Fatalf("no backup config for %s? does %s exist?", serviceName, serviceName) | ||||
| 			} | ||||
|  | ||||
| 			logrus.Infof("running backup for the %s service", serviceName) | ||||
|  | ||||
| 			if err := runBackup(cl, app, serviceName, backupConfig); err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
| 		} else { | ||||
| 			if len(backupConfigs) == 0 { | ||||
| 				logrus.Fatalf("no backup configs discovered for %s?", app.Name) | ||||
| 			} | ||||
|  | ||||
| 			for serviceName, backupConfig := range backupConfigs { | ||||
| 				logrus.Infof("running backup for the %s service", serviceName) | ||||
|  | ||||
| 				if err := runBackup(cl, app, serviceName, backupConfig); err != nil { | ||||
| 					logrus.Fatal(err) | ||||
| 				} | ||||
| 			} | ||||
| 		if err := internal.RunBackupCmdRemote(cl, "ls", targetContainer.ID, execEnv); err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		return nil | ||||
| 	}, | ||||
| } | ||||
|  | ||||
| // TimeStamp generates a file name friendly timestamp. | ||||
| func TimeStamp() string { | ||||
| 	ts := time.Now().UTC().Format(time.RFC3339) | ||||
| 	return strings.Replace(ts, ":", "-", -1) | ||||
| } | ||||
| var appBackupDownloadCommand = cli.Command{ | ||||
| 	Name:    "download", | ||||
| 	Aliases: []string{"d"}, | ||||
| 	Flags: []cli.Flag{ | ||||
| 		internal.DebugFlag, | ||||
| 		internal.OfflineFlag, | ||||
| 		snapshotFlag, | ||||
| 		includePathFlag, | ||||
| 	}, | ||||
| 	Before:       internal.SubCommandBefore, | ||||
| 	Usage:        "Download a backup", | ||||
| 	BashComplete: autocomplete.AppNameComplete, | ||||
| 	Action: func(c *cli.Context) error { | ||||
| 		app := internal.ValidateApp(c) | ||||
|  | ||||
| // runBackup does the actual backup logic. | ||||
| func runBackup(cl *dockerClient.Client, app config.App, serviceName string, bkConfig backupConfig) error { | ||||
| 	if len(bkConfig.backupPaths) == 0 { | ||||
| 		return fmt.Errorf("backup paths are empty for %s?", serviceName) | ||||
| 	} | ||||
|  | ||||
| 	// FIXME: avoid instantiating a new CLI | ||||
| 	dcli, err := command.NewDockerCli() | ||||
| 	if err != nil { | ||||
| 		return err | ||||
| 	} | ||||
|  | ||||
| 	filters := filters.NewArgs() | ||||
| 	filters.Add("name", fmt.Sprintf("^%s_%s", app.StackName(), serviceName)) | ||||
|  | ||||
| 	targetContainer, err := containerPkg.GetContainer(context.Background(), cl, filters, true) | ||||
| 	if err != nil { | ||||
| 		return err | ||||
| 	} | ||||
|  | ||||
| 	fullServiceName := fmt.Sprintf("%s_%s", app.StackName(), serviceName) | ||||
| 	if bkConfig.preHookCmd != "" { | ||||
| 		splitCmd := internal.SafeSplit(bkConfig.preHookCmd) | ||||
|  | ||||
| 		logrus.Debugf("split pre-hook command for %s into %s", fullServiceName, splitCmd) | ||||
|  | ||||
| 		preHookExecOpts := types.ExecConfig{ | ||||
| 			AttachStderr: true, | ||||
| 			AttachStdin:  true, | ||||
| 			AttachStdout: true, | ||||
| 			Cmd:          splitCmd, | ||||
| 			Detach:       false, | ||||
| 			Tty:          true, | ||||
| 		if err := recipe.EnsureExists(app.Recipe); err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		if err := container.RunExec(dcli, cl, targetContainer.ID, &preHookExecOpts); err != nil { | ||||
| 			return fmt.Errorf("failed to run %s on %s: %s", bkConfig.preHookCmd, targetContainer.ID, err.Error()) | ||||
| 		if !internal.Chaos { | ||||
| 			if err := recipe.EnsureIsClean(app.Recipe); err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
|  | ||||
| 			if !internal.Offline { | ||||
| 				if err := recipe.EnsureUpToDate(app.Recipe); err != nil { | ||||
| 					logrus.Fatal(err) | ||||
| 				} | ||||
| 			} | ||||
|  | ||||
| 			if err := recipe.EnsureLatest(app.Recipe); err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
| 		} | ||||
|  | ||||
| 		logrus.Infof("succesfully ran %s pre-hook command: %s", fullServiceName, bkConfig.preHookCmd) | ||||
| 	} | ||||
|  | ||||
| 	var tempBackupPaths []string | ||||
| 	for _, remoteBackupPath := range bkConfig.backupPaths { | ||||
| 		sanitisedPath := strings.ReplaceAll(remoteBackupPath, "/", "_") | ||||
| 		localBackupPath := filepath.Join(config.BACKUP_DIR, fmt.Sprintf("%s%s_%s.tar.gz", fullServiceName, sanitisedPath, TimeStamp())) | ||||
| 		logrus.Debugf("temporarily backing up %s:%s to %s", fullServiceName, remoteBackupPath, localBackupPath) | ||||
|  | ||||
| 		logrus.Infof("backing up %s:%s", fullServiceName, remoteBackupPath) | ||||
|  | ||||
| 		content, _, err := cl.CopyFromContainer(context.Background(), targetContainer.ID, remoteBackupPath) | ||||
| 		cl, err := client.New(app.Server) | ||||
| 		if err != nil { | ||||
| 			logrus.Debugf("failed to copy %s from container: %s", remoteBackupPath, err.Error()) | ||||
| 			if err := cleanupTempArchives(tempBackupPaths); err != nil { | ||||
| 				return fmt.Errorf("failed to clean up temporary archives: %s", err.Error()) | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		targetContainer, err := internal.RetrieveBackupBotContainer(cl) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		execEnv := []string{fmt.Sprintf("SERVICE=%s", app.Domain)} | ||||
| 		if snapshot != "" { | ||||
| 			logrus.Debugf("including SNAPSHOT=%s in backupbot exec invocation", snapshot) | ||||
| 			execEnv = append(execEnv, fmt.Sprintf("SNAPSHOT=%s", snapshot)) | ||||
| 		} | ||||
| 		if includePath != "" { | ||||
| 			logrus.Debugf("including INCLUDE_PATH=%s in backupbot exec invocation", includePath) | ||||
| 			execEnv = append(execEnv, fmt.Sprintf("INCLUDE_PATH=%s", includePath)) | ||||
| 		} | ||||
|  | ||||
| 		if err := internal.RunBackupCmdRemote(cl, "download", targetContainer.ID, execEnv); err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		remoteBackupDir := "/tmp/backup.tar.gz" | ||||
| 		currentWorkingDir := "." | ||||
| 		if err = CopyFromContainer(cl, targetContainer.ID, remoteBackupDir, currentWorkingDir); err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		fmt.Println("backup successfully downloaded to current working directory") | ||||
|  | ||||
| 		return nil | ||||
| 	}, | ||||
| } | ||||
|  | ||||
| var appBackupCreateCommand = cli.Command{ | ||||
| 	Name:    "create", | ||||
| 	Aliases: []string{"c"}, | ||||
| 	Flags: []cli.Flag{ | ||||
| 		internal.DebugFlag, | ||||
| 		internal.OfflineFlag, | ||||
| 		resticRepoFlag, | ||||
| 	}, | ||||
| 	Before:       internal.SubCommandBefore, | ||||
| 	Usage:        "Create a new backup", | ||||
| 	BashComplete: autocomplete.AppNameComplete, | ||||
| 	Action: func(c *cli.Context) error { | ||||
| 		app := internal.ValidateApp(c) | ||||
|  | ||||
| 		if err := recipe.EnsureExists(app.Recipe); err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		if !internal.Chaos { | ||||
| 			if err := recipe.EnsureIsClean(app.Recipe); err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
| 			return fmt.Errorf("failed to copy %s from container: %s", remoteBackupPath, err.Error()) | ||||
| 		} | ||||
| 		defer content.Close() | ||||
|  | ||||
| 		_, srcBase := archive.SplitPathDirEntry(remoteBackupPath) | ||||
| 		preArchive := archive.RebaseArchiveEntries(content, srcBase, remoteBackupPath) | ||||
| 		if err := copyToFile(localBackupPath, preArchive); err != nil { | ||||
| 			logrus.Debugf("failed to create tar archive (%s): %s", localBackupPath, err.Error()) | ||||
| 			if err := cleanupTempArchives(tempBackupPaths); err != nil { | ||||
| 				return fmt.Errorf("failed to clean up temporary archives: %s", err.Error()) | ||||
| 			if !internal.Offline { | ||||
| 				if err := recipe.EnsureUpToDate(app.Recipe); err != nil { | ||||
| 					logrus.Fatal(err) | ||||
| 				} | ||||
| 			} | ||||
| 			return fmt.Errorf("failed to create tar archive (%s): %s", localBackupPath, err.Error()) | ||||
| 		} | ||||
|  | ||||
| 		tempBackupPaths = append(tempBackupPaths, localBackupPath) | ||||
| 	} | ||||
|  | ||||
| 	logrus.Infof("compressing and merging archives...") | ||||
|  | ||||
| 	if err := mergeArchives(tempBackupPaths, fullServiceName); err != nil { | ||||
| 		logrus.Debugf("failed to merge archive files: %s", err.Error()) | ||||
| 		if err := cleanupTempArchives(tempBackupPaths); err != nil { | ||||
| 			return fmt.Errorf("failed to clean up temporary archives: %s", err.Error()) | ||||
| 		} | ||||
| 		return fmt.Errorf("failed to merge archive files: %s", err.Error()) | ||||
| 	} | ||||
|  | ||||
| 	if err := cleanupTempArchives(tempBackupPaths); err != nil { | ||||
| 		return fmt.Errorf("failed to clean up temporary archives: %s", err.Error()) | ||||
| 	} | ||||
|  | ||||
| 	if bkConfig.postHookCmd != "" { | ||||
| 		splitCmd := internal.SafeSplit(bkConfig.postHookCmd) | ||||
|  | ||||
| 		logrus.Debugf("split post-hook command for %s into %s", fullServiceName, splitCmd) | ||||
|  | ||||
| 		postHookExecOpts := types.ExecConfig{ | ||||
| 			AttachStderr: true, | ||||
| 			AttachStdin:  true, | ||||
| 			AttachStdout: true, | ||||
| 			Cmd:          splitCmd, | ||||
| 			Detach:       false, | ||||
| 			Tty:          true, | ||||
| 		} | ||||
|  | ||||
| 		if err := container.RunExec(dcli, cl, targetContainer.ID, &postHookExecOpts); err != nil { | ||||
| 			return err | ||||
| 		} | ||||
|  | ||||
| 		logrus.Infof("succesfully ran %s post-hook command: %s", fullServiceName, bkConfig.postHookCmd) | ||||
| 	} | ||||
|  | ||||
| 	return nil | ||||
| } | ||||
|  | ||||
| func copyToFile(outfile string, r io.Reader) error { | ||||
| 	tmpFile, err := system.TempFileSequential(filepath.Dir(outfile), ".tar_temp") | ||||
| 	if err != nil { | ||||
| 		return err | ||||
| 	} | ||||
|  | ||||
| 	tmpPath := tmpFile.Name() | ||||
|  | ||||
| 	_, err = io.Copy(tmpFile, r) | ||||
| 	tmpFile.Close() | ||||
|  | ||||
| 	if err != nil { | ||||
| 		os.Remove(tmpPath) | ||||
| 		return err | ||||
| 	} | ||||
|  | ||||
| 	if err = os.Rename(tmpPath, outfile); err != nil { | ||||
| 		os.Remove(tmpPath) | ||||
| 		return err | ||||
| 	} | ||||
|  | ||||
| 	return nil | ||||
| } | ||||
|  | ||||
| func cleanupTempArchives(tarPaths []string) error { | ||||
| 	for _, tarPath := range tarPaths { | ||||
| 		if err := os.RemoveAll(tarPath); err != nil { | ||||
| 			return err | ||||
| 		} | ||||
|  | ||||
| 		logrus.Debugf("remove temporary archive file %s", tarPath) | ||||
| 	} | ||||
|  | ||||
| 	return nil | ||||
| } | ||||
|  | ||||
| func mergeArchives(tarPaths []string, serviceName string) error { | ||||
| 	var out io.Writer | ||||
| 	var cout *pgzip.Writer | ||||
|  | ||||
| 	localBackupPath := filepath.Join(config.BACKUP_DIR, fmt.Sprintf("%s_%s.tar.gz", serviceName, TimeStamp())) | ||||
|  | ||||
| 	fout, err := os.Create(localBackupPath) | ||||
| 	if err != nil { | ||||
| 		return fmt.Errorf("Failed to open %s: %s", localBackupPath, err) | ||||
| 	} | ||||
|  | ||||
| 	defer fout.Close() | ||||
| 	out = fout | ||||
|  | ||||
| 	cout = pgzip.NewWriter(out) | ||||
| 	out = cout | ||||
|  | ||||
| 	tw := tar.NewWriter(out) | ||||
|  | ||||
| 	for _, tarPath := range tarPaths { | ||||
| 		if err := addTar(tw, tarPath); err != nil { | ||||
| 			return fmt.Errorf("failed to merge %s: %v", tarPath, err) | ||||
| 		} | ||||
| 	} | ||||
|  | ||||
| 	if err := tw.Close(); err != nil { | ||||
| 		return fmt.Errorf("failed to close tar writer %v", err) | ||||
| 	} | ||||
|  | ||||
| 	if cout != nil { | ||||
| 		if err := cout.Flush(); err != nil { | ||||
| 			return fmt.Errorf("failed to flush: %s", err) | ||||
| 		} else if err = cout.Close(); err != nil { | ||||
| 			return fmt.Errorf("failed to close compressed writer: %s", err) | ||||
| 		} | ||||
| 	} | ||||
|  | ||||
| 	logrus.Infof("backed up %s to %s", serviceName, localBackupPath) | ||||
|  | ||||
| 	return nil | ||||
| } | ||||
|  | ||||
| func addTar(tw *tar.Writer, pth string) (err error) { | ||||
| 	var tr *tar.Reader | ||||
| 	var rc io.ReadCloser | ||||
| 	var hdr *tar.Header | ||||
|  | ||||
| 	if tr, rc, err = openTarFile(pth); err != nil { | ||||
| 		return | ||||
| 	} | ||||
|  | ||||
| 	for { | ||||
| 		if hdr, err = tr.Next(); err != nil { | ||||
| 			if err == io.EOF { | ||||
| 				err = nil | ||||
| 			if err := recipe.EnsureLatest(app.Recipe); err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
| 			break | ||||
| 		} | ||||
| 		if err = tw.WriteHeader(hdr); err != nil { | ||||
| 			break | ||||
| 		} else if _, err = io.Copy(tw, tr); err != nil { | ||||
| 			break | ||||
|  | ||||
| 		cl, err := client.New(app.Server) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
| 	} | ||||
| 	if err == nil { | ||||
| 		err = rc.Close() | ||||
| 	} else { | ||||
| 		rc.Close() | ||||
| 	} | ||||
| 	return | ||||
|  | ||||
| 		targetContainer, err := internal.RetrieveBackupBotContainer(cl) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		execEnv := []string{fmt.Sprintf("SERVICE=%s", app.Domain)} | ||||
| 		if resticRepo != "" { | ||||
| 			logrus.Debugf("including RESTIC_REPO=%s in backupbot exec invocation", resticRepo) | ||||
| 			execEnv = append(execEnv, fmt.Sprintf("RESTIC_REPO=%s", resticRepo)) | ||||
| 		} | ||||
|  | ||||
| 		if err := internal.RunBackupCmdRemote(cl, "create", targetContainer.ID, execEnv); err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		return nil | ||||
| 	}, | ||||
| } | ||||
|  | ||||
| func openTarFile(pth string) (tr *tar.Reader, rc io.ReadCloser, err error) { | ||||
| 	var fin *os.File | ||||
| 	var n int | ||||
| 	buff := make([]byte, 1024) | ||||
| var appBackupSnapshotsCommand = cli.Command{ | ||||
| 	Name:    "snapshots", | ||||
| 	Aliases: []string{"s"}, | ||||
| 	Flags: []cli.Flag{ | ||||
| 		internal.DebugFlag, | ||||
| 		internal.OfflineFlag, | ||||
| 		snapshotFlag, | ||||
| 	}, | ||||
| 	Before:       internal.SubCommandBefore, | ||||
| 	Usage:        "List backup snapshots", | ||||
| 	BashComplete: autocomplete.AppNameComplete, | ||||
| 	Action: func(c *cli.Context) error { | ||||
| 		app := internal.ValidateApp(c) | ||||
|  | ||||
| 	if fin, err = os.Open(pth); err != nil { | ||||
| 		return | ||||
| 	} | ||||
| 		if err := recipe.EnsureExists(app.Recipe); err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 	if n, err = fin.Read(buff); err != nil { | ||||
| 		fin.Close() | ||||
| 		return | ||||
| 	} else if n == 0 { | ||||
| 		fin.Close() | ||||
| 		err = fmt.Errorf("%s is empty", pth) | ||||
| 		return | ||||
| 	} | ||||
| 		if !internal.Chaos { | ||||
| 			if err := recipe.EnsureIsClean(app.Recipe); err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
|  | ||||
| 	if _, err = fin.Seek(0, 0); err != nil { | ||||
| 		fin.Close() | ||||
| 		return | ||||
| 	} | ||||
| 			if !internal.Offline { | ||||
| 				if err := recipe.EnsureUpToDate(app.Recipe); err != nil { | ||||
| 					logrus.Fatal(err) | ||||
| 				} | ||||
| 			} | ||||
|  | ||||
| 	rc = fin | ||||
| 	tr = tar.NewReader(rc) | ||||
| 			if err := recipe.EnsureLatest(app.Recipe); err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
| 		} | ||||
|  | ||||
| 	return tr, rc, nil | ||||
| 		cl, err := client.New(app.Server) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		targetContainer, err := internal.RetrieveBackupBotContainer(cl) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		execEnv := []string{fmt.Sprintf("SERVICE=%s", app.Domain)} | ||||
| 		if snapshot != "" { | ||||
| 			logrus.Debugf("including SNAPSHOT=%s in backupbot exec invocation", snapshot) | ||||
| 			execEnv = append(execEnv, fmt.Sprintf("SNAPSHOT=%s", snapshot)) | ||||
| 		} | ||||
|  | ||||
| 		if err := internal.RunBackupCmdRemote(cl, "snapshots", targetContainer.ID, execEnv); err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		return nil | ||||
| 	}, | ||||
| } | ||||
|  | ||||
| var appBackupCommand = cli.Command{ | ||||
| 	Name:      "backup", | ||||
| 	Aliases:   []string{"b"}, | ||||
| 	Usage:     "Manage app backups", | ||||
| 	ArgsUsage: "<domain>", | ||||
| 	Subcommands: []cli.Command{ | ||||
| 		appBackupListCommand, | ||||
| 		appBackupSnapshotsCommand, | ||||
| 		appBackupDownloadCommand, | ||||
| 		appBackupCreateCommand, | ||||
| 	}, | ||||
| } | ||||
|  | ||||
| @ -1,57 +1,81 @@ | ||||
| package app | ||||
|  | ||||
| import ( | ||||
| 	"os" | ||||
| 	"path" | ||||
| 	"strings" | ||||
|  | ||||
| 	"coopcloud.tech/abra/cli/internal" | ||||
| 	"coopcloud.tech/abra/pkg/autocomplete" | ||||
| 	"coopcloud.tech/abra/pkg/config" | ||||
| 	"coopcloud.tech/abra/pkg/formatter" | ||||
| 	"coopcloud.tech/abra/pkg/recipe" | ||||
| 	recipePkg "coopcloud.tech/abra/pkg/recipe" | ||||
| 	"github.com/sirupsen/logrus" | ||||
| 	"github.com/urfave/cli" | ||||
| ) | ||||
|  | ||||
| var appCheckCommand = cli.Command{ | ||||
| 	Name:      "check", | ||||
| 	Aliases:   []string{"chk"}, | ||||
| 	Usage:     "Check if app is configured correctly", | ||||
| 	Name:    "check", | ||||
| 	Aliases: []string{"chk"}, | ||||
| 	Usage:   "Ensure an app is well configured", | ||||
| 	Description: ` | ||||
| This command compares env vars in both the app ".env" and recipe ".env.sample" | ||||
| file. | ||||
|  | ||||
| The goal is to ensure that recipe ".env.sample" env vars are defined in your | ||||
| app ".env" file. Only env var definitions in the ".env.sample" which are | ||||
| uncommented, e.g. "FOO=bar" are checked. If an app ".env" file does not include | ||||
| these env vars, then "check" will complain. | ||||
|  | ||||
| Recipe maintainers may or may not provide defaults for env vars within their | ||||
| recipes regardless of commenting or not (e.g. through the use of | ||||
| ${FOO:<default>} syntax). "check" does not confirm or deny this for you.`, | ||||
| 	ArgsUsage: "<domain>", | ||||
| 	Flags: []cli.Flag{ | ||||
| 		internal.DebugFlag, | ||||
| 		internal.ChaosFlag, | ||||
| 		internal.OfflineFlag, | ||||
| 	}, | ||||
| 	Before: internal.SubCommandBefore, | ||||
| 	Before:       internal.SubCommandBefore, | ||||
| 	BashComplete: autocomplete.AppNameComplete, | ||||
| 	Action: func(c *cli.Context) error { | ||||
| 		app := internal.ValidateApp(c) | ||||
|  | ||||
| 		envSamplePath := path.Join(config.RECIPES_DIR, app.Recipe, ".env.sample") | ||||
| 		if _, err := os.Stat(envSamplePath); err != nil { | ||||
| 			if os.IsNotExist(err) { | ||||
| 				logrus.Fatalf("%s does not exist?", envSamplePath) | ||||
| 			} | ||||
| 		if err := recipe.EnsureExists(app.Recipe); err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		envSample, err := config.ReadEnv(envSamplePath) | ||||
| 		if !internal.Chaos { | ||||
| 			if err := recipePkg.EnsureIsClean(app.Recipe); err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
|  | ||||
| 			if !internal.Offline { | ||||
| 				if err := recipePkg.EnsureUpToDate(app.Recipe); err != nil { | ||||
| 					logrus.Fatal(err) | ||||
| 				} | ||||
| 			} | ||||
|  | ||||
| 			if err := recipePkg.EnsureLatest(app.Recipe); err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
| 		} | ||||
|  | ||||
| 		tableCol := []string{"recipe env sample", "app env"} | ||||
| 		table := formatter.CreateTable(tableCol) | ||||
|  | ||||
| 		envVars, err := config.CheckEnv(app) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		var missing []string | ||||
| 		for k := range envSample { | ||||
| 			if _, ok := app.Env[k]; !ok { | ||||
| 				missing = append(missing, k) | ||||
| 		for _, envVar := range envVars { | ||||
| 			if envVar.Present { | ||||
| 				table.Append([]string{envVar.Name, "✅"}) | ||||
| 			} else { | ||||
| 				table.Append([]string{envVar.Name, "❌"}) | ||||
| 			} | ||||
| 		} | ||||
|  | ||||
| 		if len(missing) > 0 { | ||||
| 			missingEnvVars := strings.Join(missing, ", ") | ||||
| 			logrus.Fatalf("%s is missing %s", app.Path, missingEnvVars) | ||||
| 		} | ||||
|  | ||||
| 		logrus.Infof("all necessary environment variables defined for %s", app.Name) | ||||
| 		table.Render() | ||||
|  | ||||
| 		return nil | ||||
| 	}, | ||||
| 	BashComplete: autocomplete.AppNameComplete, | ||||
| } | ||||
|  | ||||
							
								
								
									
										200
									
								
								cli/app/cmd.go
									
									
									
									
									
								
							
							
						
						
									
										200
									
								
								cli/app/cmd.go
									
									
									
									
									
								
							| @ -1,27 +1,21 @@ | ||||
| package app | ||||
|  | ||||
| import ( | ||||
| 	"context" | ||||
| 	"errors" | ||||
| 	"fmt" | ||||
| 	"io/ioutil" | ||||
| 	"os" | ||||
| 	"os/exec" | ||||
| 	"path" | ||||
| 	"sort" | ||||
| 	"strings" | ||||
|  | ||||
| 	"coopcloud.tech/abra/cli/internal" | ||||
| 	"coopcloud.tech/abra/pkg/app" | ||||
| 	"coopcloud.tech/abra/pkg/autocomplete" | ||||
| 	"coopcloud.tech/abra/pkg/client" | ||||
| 	"coopcloud.tech/abra/pkg/config" | ||||
| 	containerPkg "coopcloud.tech/abra/pkg/container" | ||||
| 	"coopcloud.tech/abra/pkg/formatter" | ||||
| 	"coopcloud.tech/abra/pkg/upstream/container" | ||||
| 	"github.com/docker/cli/cli/command" | ||||
| 	"github.com/docker/docker/api/types" | ||||
| 	"github.com/docker/docker/api/types/filters" | ||||
| 	dockerClient "github.com/docker/docker/client" | ||||
| 	"github.com/docker/docker/pkg/archive" | ||||
| 	"coopcloud.tech/abra/pkg/recipe" | ||||
| 	recipePkg "coopcloud.tech/abra/pkg/recipe" | ||||
| 	"github.com/sirupsen/logrus" | ||||
| 	"github.com/urfave/cli" | ||||
| ) | ||||
| @ -30,8 +24,7 @@ var appCmdCommand = cli.Command{ | ||||
| 	Name:    "command", | ||||
| 	Aliases: []string{"cmd"}, | ||||
| 	Usage:   "Run app commands", | ||||
| 	Description: ` | ||||
| Run an app specific command. | ||||
| 	Description: `Run an app specific command. | ||||
|  | ||||
| These commands are bash functions, defined in the abra.sh of the recipe itself. | ||||
| They can be run within the context of a service (e.g. app) or locally on your | ||||
| @ -47,17 +40,46 @@ Example: | ||||
| 		internal.DebugFlag, | ||||
| 		internal.LocalCmdFlag, | ||||
| 		internal.RemoteUserFlag, | ||||
| 		internal.TtyFlag, | ||||
| 		internal.OfflineFlag, | ||||
| 		internal.ChaosFlag, | ||||
| 	}, | ||||
| 	Before:      internal.SubCommandBefore, | ||||
| 	Subcommands: []cli.Command{appCmdListCommand}, | ||||
| 	BashComplete: func(ctx *cli.Context) { | ||||
| 		args := ctx.Args() | ||||
| 		switch len(args) { | ||||
| 		case 0: | ||||
| 			autocomplete.AppNameComplete(ctx) | ||||
| 		case 1: | ||||
| 			autocomplete.ServiceNameComplete(args.Get(0)) | ||||
| 		case 2: | ||||
| 			cmdNameComplete(args.Get(0)) | ||||
| 		} | ||||
| 	}, | ||||
| 	BashComplete: autocomplete.AppNameComplete, | ||||
| 	Before:       internal.SubCommandBefore, | ||||
| 	Action: func(c *cli.Context) error { | ||||
| 		app := internal.ValidateApp(c) | ||||
|  | ||||
| 		cl, err := client.New(app.Server) | ||||
| 		if err != nil { | ||||
| 		if err := recipe.EnsureExists(app.Recipe); err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		if !internal.Chaos { | ||||
| 			if err := recipePkg.EnsureIsClean(app.Recipe); err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
|  | ||||
| 			if !internal.Offline { | ||||
| 				if err := recipePkg.EnsureUpToDate(app.Recipe); err != nil { | ||||
| 					logrus.Fatal(err) | ||||
| 				} | ||||
| 			} | ||||
|  | ||||
| 			if err := recipePkg.EnsureLatest(app.Recipe); err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
| 		} | ||||
|  | ||||
| 		if internal.LocalCmd && internal.RemoteUser != "" { | ||||
| 			internal.ShowSubcommandHelpAndError(c, errors.New("cannot use --local & --user together")) | ||||
| 		} | ||||
| @ -73,8 +95,12 @@ Example: | ||||
| 		} | ||||
|  | ||||
| 		if internal.LocalCmd { | ||||
| 			if !(len(c.Args()) >= 2) { | ||||
| 				internal.ShowSubcommandHelpAndError(c, errors.New("missing arguments")) | ||||
| 			} | ||||
|  | ||||
| 			cmdName := c.Args().Get(1) | ||||
| 			if err := ensureCommand(abraSh, app.Recipe, cmdName); err != nil { | ||||
| 			if err := internal.EnsureCommand(abraSh, app.Recipe, cmdName); err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
|  | ||||
| @ -84,6 +110,7 @@ Example: | ||||
| 			for k, v := range app.Env { | ||||
| 				exportEnv = exportEnv + fmt.Sprintf("%s='%s'; ", k, v) | ||||
| 			} | ||||
|  | ||||
| 			var sourceAndExec string | ||||
| 			if hasCmdArgs { | ||||
| 				logrus.Debugf("parsed following command arguments: %s", parsedCmdArgs) | ||||
| @ -104,10 +131,14 @@ Example: | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
| 		} else { | ||||
| 			if !(len(c.Args()) >= 3) { | ||||
| 				internal.ShowSubcommandHelpAndError(c, errors.New("missing arguments")) | ||||
| 			} | ||||
|  | ||||
| 			targetServiceName := c.Args().Get(1) | ||||
|  | ||||
| 			cmdName := c.Args().Get(2) | ||||
| 			if err := ensureCommand(abraSh, app.Recipe, cmdName); err != nil { | ||||
| 			if err := internal.EnsureCommand(abraSh, app.Recipe, cmdName); err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
|  | ||||
| @ -135,7 +166,12 @@ Example: | ||||
| 				logrus.Debug("did not detect any command arguments") | ||||
| 			} | ||||
|  | ||||
| 			if err := runCmdRemote(cl, app, abraSh, targetServiceName, cmdName, parsedCmdArgs); err != nil { | ||||
| 			cl, err := client.New(app.Server) | ||||
| 			if err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
|  | ||||
| 			if err := internal.RunCmdRemote(cl, app, abraSh, targetServiceName, cmdName, parsedCmdArgs); err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
| 		} | ||||
| @ -163,83 +199,75 @@ func parseCmdArgs(args []string, isLocal bool) (bool, string) { | ||||
| 	return hasCmdArgs, parsedCmdArgs | ||||
| } | ||||
|  | ||||
| func ensureCommand(abraSh, recipeName, execCmd string) error { | ||||
| 	bytes, err := ioutil.ReadFile(abraSh) | ||||
| func cmdNameComplete(appName string) { | ||||
| 	app, err := app.Get(appName) | ||||
| 	if err != nil { | ||||
| 		return err | ||||
| 		return | ||||
| 	} | ||||
|  | ||||
| 	if !strings.Contains(string(bytes), execCmd) { | ||||
| 		return fmt.Errorf("%s doesn't have a %s function", recipeName, execCmd) | ||||
| 	cmdNames, _ := getShCmdNames(app) | ||||
| 	if err != nil { | ||||
| 		return | ||||
| 	} | ||||
| 	for _, n := range cmdNames { | ||||
| 		fmt.Println(n) | ||||
| 	} | ||||
|  | ||||
| 	return nil | ||||
| } | ||||
|  | ||||
| func runCmdRemote(cl *dockerClient.Client, app config.App, abraSh, serviceName, cmdName, cmdArgs string) error { | ||||
| 	filters := filters.NewArgs() | ||||
| 	filters.Add("name", fmt.Sprintf("^%s_%s", app.StackName(), serviceName)) | ||||
| var appCmdListCommand = cli.Command{ | ||||
| 	Name:      "list", | ||||
| 	Aliases:   []string{"ls"}, | ||||
| 	Usage:     "List all available commands", | ||||
| 	ArgsUsage: "<domain>", | ||||
| 	Flags: []cli.Flag{ | ||||
| 		internal.DebugFlag, | ||||
| 		internal.OfflineFlag, | ||||
| 		internal.ChaosFlag, | ||||
| 	}, | ||||
| 	BashComplete: autocomplete.AppNameComplete, | ||||
| 	Before:       internal.SubCommandBefore, | ||||
| 	Action: func(c *cli.Context) error { | ||||
| 		app := internal.ValidateApp(c) | ||||
|  | ||||
| 	targetContainer, err := containerPkg.GetContainer(context.Background(), cl, filters, true) | ||||
| 	if err != nil { | ||||
| 		return err | ||||
| 	} | ||||
| 		if err := recipe.EnsureExists(app.Recipe); err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 	logrus.Debugf("retrieved %s as target container on %s", formatter.ShortenID(targetContainer.ID), app.Server) | ||||
| 		if !internal.Chaos { | ||||
| 			if err := recipePkg.EnsureIsClean(app.Recipe); err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
|  | ||||
| 	toTarOpts := &archive.TarOptions{NoOverwriteDirNonDir: true, Compression: archive.Gzip} | ||||
| 	content, err := archive.TarWithOptions(abraSh, toTarOpts) | ||||
| 	if err != nil { | ||||
| 		return err | ||||
| 	} | ||||
| 			if !internal.Offline { | ||||
| 				if err := recipePkg.EnsureUpToDate(app.Recipe); err != nil { | ||||
| 					logrus.Fatal(err) | ||||
| 				} | ||||
| 			} | ||||
|  | ||||
| 	copyOpts := types.CopyToContainerOptions{AllowOverwriteDirWithFile: false, CopyUIDGID: false} | ||||
| 	if err := cl.CopyToContainer(context.Background(), targetContainer.ID, "/tmp", content, copyOpts); err != nil { | ||||
| 		return err | ||||
| 	} | ||||
| 			if err := recipePkg.EnsureLatest(app.Recipe); err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
| 		} | ||||
|  | ||||
| 	// FIXME: avoid instantiating a new CLI | ||||
| 	dcli, err := command.NewDockerCli() | ||||
| 	if err != nil { | ||||
| 		return err | ||||
| 	} | ||||
| 		cmdNames, err := getShCmdNames(app) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 	shell := "/bin/bash" | ||||
| 	findShell := []string{"test", "-e", shell} | ||||
| 	execCreateOpts := types.ExecConfig{ | ||||
| 		AttachStderr: true, | ||||
| 		AttachStdin:  true, | ||||
| 		AttachStdout: true, | ||||
| 		Cmd:          findShell, | ||||
| 		Detach:       false, | ||||
| 		Tty:          false, | ||||
| 	} | ||||
| 		for _, cmdName := range cmdNames { | ||||
| 			fmt.Println(cmdName) | ||||
| 		} | ||||
|  | ||||
| 	if err := container.RunExec(dcli, cl, targetContainer.ID, &execCreateOpts); err != nil { | ||||
| 		logrus.Infof("%s does not exist for %s, use /bin/sh as fallback", shell, app.Name) | ||||
| 		shell = "/bin/sh" | ||||
| 	} | ||||
|  | ||||
| 	var cmd []string | ||||
| 	if cmdArgs != "" { | ||||
| 		cmd = []string{shell, "-c", fmt.Sprintf("TARGET=%s; APP_NAME=%s; STACK_NAME=%s; . /tmp/abra.sh; %s %s", serviceName, app.Name, app.StackName(), cmdName, cmdArgs)} | ||||
| 	} else { | ||||
| 		cmd = []string{shell, "-c", fmt.Sprintf("TARGET=%s; APP_NAME=%s; STACK_NAME=%s; . /tmp/abra.sh; %s", serviceName, app.Name, app.StackName(), cmdName)} | ||||
| 	} | ||||
|  | ||||
| 	logrus.Debugf("running command: %s", strings.Join(cmd, " ")) | ||||
|  | ||||
| 	if internal.RemoteUser != "" { | ||||
| 		logrus.Debugf("running command with user %s", internal.RemoteUser) | ||||
| 		execCreateOpts.User = internal.RemoteUser | ||||
| 	} | ||||
|  | ||||
| 	execCreateOpts.Cmd = cmd | ||||
| 	execCreateOpts.Tty = true | ||||
|  | ||||
| 	if err := container.RunExec(dcli, cl, targetContainer.ID, &execCreateOpts); err != nil { | ||||
| 		return err | ||||
| 	} | ||||
|  | ||||
| 	return nil | ||||
| 		return nil | ||||
| 	}, | ||||
| } | ||||
|  | ||||
| func getShCmdNames(app config.App) ([]string, error) { | ||||
| 	abraShPath := fmt.Sprintf("%s/%s/%s", config.RECIPES_DIR, app.Recipe, "abra.sh") | ||||
| 	cmdNames, err := config.ReadAbraShCmdNames(abraShPath) | ||||
| 	if err != nil { | ||||
| 		return nil, err | ||||
| 	} | ||||
|  | ||||
| 	sort.Strings(cmdNames) | ||||
| 	return cmdNames, nil | ||||
| } | ||||
|  | ||||
| @ -21,7 +21,8 @@ var appConfigCommand = cli.Command{ | ||||
| 	Flags: []cli.Flag{ | ||||
| 		internal.DebugFlag, | ||||
| 	}, | ||||
| 	Before: internal.SubCommandBefore, | ||||
| 	Before:       internal.SubCommandBefore, | ||||
| 	BashComplete: autocomplete.AppNameComplete, | ||||
| 	Action: func(c *cli.Context) error { | ||||
| 		appName := c.Args().First() | ||||
|  | ||||
| @ -60,5 +61,4 @@ var appConfigCommand = cli.Command{ | ||||
|  | ||||
| 		return nil | ||||
| 	}, | ||||
| 	BashComplete: autocomplete.AppNameComplete, | ||||
| } | ||||
|  | ||||
							
								
								
									
										388
									
								
								cli/app/cp.go
									
									
									
									
									
								
							
							
						
						
									
										388
									
								
								cli/app/cp.go
									
									
									
									
									
								
							| @ -2,19 +2,24 @@ package app | ||||
|  | ||||
| import ( | ||||
| 	"context" | ||||
| 	"errors" | ||||
| 	"fmt" | ||||
| 	"io" | ||||
| 	"os" | ||||
| 	"path" | ||||
| 	"path/filepath" | ||||
| 	"strings" | ||||
|  | ||||
| 	"coopcloud.tech/abra/cli/internal" | ||||
| 	"coopcloud.tech/abra/pkg/autocomplete" | ||||
| 	"coopcloud.tech/abra/pkg/client" | ||||
| 	"coopcloud.tech/abra/pkg/config" | ||||
| 	"coopcloud.tech/abra/pkg/container" | ||||
| 	containerPkg "coopcloud.tech/abra/pkg/container" | ||||
| 	"coopcloud.tech/abra/pkg/formatter" | ||||
| 	"coopcloud.tech/abra/pkg/upstream/container" | ||||
| 	"github.com/docker/cli/cli/command" | ||||
| 	"github.com/docker/docker/api/types" | ||||
| 	"github.com/docker/docker/api/types/filters" | ||||
| 	dockerClient "github.com/docker/docker/client" | ||||
| 	"github.com/docker/docker/errdefs" | ||||
| 	"github.com/docker/docker/pkg/archive" | ||||
| 	"github.com/sirupsen/logrus" | ||||
| 	"github.com/urfave/cli" | ||||
| @ -29,7 +34,7 @@ var appCpCommand = cli.Command{ | ||||
| 		internal.NoInputFlag, | ||||
| 	}, | ||||
| 	Before: internal.SubCommandBefore, | ||||
| 	Usage:  "Copy files to/from a running app service", | ||||
| 	Usage:  "Copy files to/from a deployed app service", | ||||
| 	Description: ` | ||||
| Copy files to and from any app service file system. | ||||
|  | ||||
| @ -39,115 +44,336 @@ If you want to copy a myfile.txt to the root of the app service: | ||||
|  | ||||
| And if you want to copy that file back to your current working directory locally: | ||||
|  | ||||
| 		abra app cp <domain> app:/myfile.txt . | ||||
|     abra app cp <domain> app:/myfile.txt . | ||||
| `, | ||||
| 	BashComplete: autocomplete.AppNameComplete, | ||||
| 	Action: func(c *cli.Context) error { | ||||
| 		app := internal.ValidateApp(c) | ||||
|  | ||||
| 		src := c.Args().Get(1) | ||||
| 		dst := c.Args().Get(2) | ||||
| 		if src == "" { | ||||
| 			logrus.Fatal("missing <src> argument") | ||||
| 		} | ||||
| 		if dst == "" { | ||||
| 			logrus.Fatal("missing <dest> argument") | ||||
| 		} | ||||
|  | ||||
| 		srcPath, dstPath, service, toContainer, err := parseSrcAndDst(src, dst) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		cl, err := client.New(app.Server) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		src := c.Args().Get(1) | ||||
| 		dst := c.Args().Get(2) | ||||
| 		if src == "" { | ||||
| 			logrus.Fatal("missing <src> argument") | ||||
| 		} else if dst == "" { | ||||
| 			logrus.Fatal("missing <dest> argument") | ||||
| 		container, err := containerPkg.GetContainerFromStackAndService(cl, app.StackName(), service) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
| 		logrus.Debugf("retrieved %s as target container on %s", formatter.ShortenID(container.ID), app.Server) | ||||
|  | ||||
| 		parsedSrc := strings.SplitN(src, ":", 2) | ||||
| 		parsedDst := strings.SplitN(dst, ":", 2) | ||||
| 		errorMsg := "one of <src>/<dest> arguments must take $SERVICE:$PATH form" | ||||
| 		if len(parsedSrc) == 2 && len(parsedDst) == 2 { | ||||
| 			logrus.Fatal(errorMsg) | ||||
| 		} else if len(parsedSrc) != 2 { | ||||
| 			if len(parsedDst) != 2 { | ||||
| 				logrus.Fatal(errorMsg) | ||||
| 			} | ||||
| 		} else if len(parsedDst) != 2 { | ||||
| 			if len(parsedSrc) != 2 { | ||||
| 				logrus.Fatal(errorMsg) | ||||
| 			} | ||||
| 		if toContainer { | ||||
| 			err = CopyToContainer(cl, container.ID, srcPath, dstPath) | ||||
| 		} else { | ||||
| 			err = CopyFromContainer(cl, container.ID, srcPath, dstPath) | ||||
| 		} | ||||
|  | ||||
| 		var service string | ||||
| 		var srcPath string | ||||
| 		var dstPath string | ||||
| 		isToContainer := false // <container:src> <dst> | ||||
| 		if len(parsedSrc) == 2 { | ||||
| 			service = parsedSrc[0] | ||||
| 			srcPath = parsedSrc[1] | ||||
| 			dstPath = dst | ||||
| 			logrus.Debugf("assuming transfer is coming FROM the container") | ||||
| 		} else if len(parsedDst) == 2 { | ||||
| 			service = parsedDst[0] | ||||
| 			dstPath = parsedDst[1] | ||||
| 			srcPath = src | ||||
| 			isToContainer = true // <src> <container:dst> | ||||
| 			logrus.Debugf("assuming transfer is going TO the container") | ||||
| 		} | ||||
|  | ||||
| 		if !isToContainer { | ||||
| 			if _, err := os.Stat(dstPath); os.IsNotExist(err) { | ||||
| 				logrus.Fatalf("%s does not exist locally?", dstPath) | ||||
| 			} | ||||
| 		} | ||||
|  | ||||
| 		if err := configureAndCp(c, cl, app, srcPath, dstPath, service, isToContainer); err != nil { | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		return nil | ||||
| 	}, | ||||
| 	BashComplete: autocomplete.AppNameComplete, | ||||
| } | ||||
|  | ||||
| func configureAndCp( | ||||
| 	c *cli.Context, | ||||
| 	cl *dockerClient.Client, | ||||
| 	app config.App, | ||||
| 	srcPath string, | ||||
| 	dstPath string, | ||||
| 	service string, | ||||
| 	isToContainer bool) error { | ||||
| 	filters := filters.NewArgs() | ||||
| 	filters.Add("name", fmt.Sprintf("^%s_%s", app.StackName(), service)) | ||||
| var errServiceMissing = errors.New("one of <src>/<dest> arguments must take $SERVICE:$PATH form") | ||||
|  | ||||
| 	container, err := container.GetContainer(context.Background(), cl, filters, internal.NoInput) | ||||
| // parseSrcAndDst parses src and dest string. One of src or dst must be of the form $SERVICE:$PATH | ||||
| func parseSrcAndDst(src, dst string) (srcPath string, dstPath string, service string, toContainer bool, err error) { | ||||
| 	parsedSrc := strings.SplitN(src, ":", 2) | ||||
| 	parsedDst := strings.SplitN(dst, ":", 2) | ||||
| 	if len(parsedSrc)+len(parsedDst) != 3 { | ||||
| 		return "", "", "", false, errServiceMissing | ||||
| 	} | ||||
| 	if len(parsedSrc) == 2 { | ||||
| 		return parsedSrc[1], dst, parsedSrc[0], false, nil | ||||
| 	} | ||||
| 	if len(parsedDst) == 2 { | ||||
| 		return src, parsedDst[1], parsedDst[0], true, nil | ||||
| 	} | ||||
| 	return "", "", "", false, errServiceMissing | ||||
| } | ||||
|  | ||||
| // CopyToContainer copies a file or directory from the local file system to the container. | ||||
| // See the possible copy modes and their documentation. | ||||
| func CopyToContainer(cl *dockerClient.Client, containerID, srcPath, dstPath string) error { | ||||
| 	srcStat, err := os.Stat(srcPath) | ||||
| 	if err != nil { | ||||
| 		logrus.Fatal(err) | ||||
| 		return fmt.Errorf("local %s ", err) | ||||
| 	} | ||||
|  | ||||
| 	logrus.Debugf("retrieved %s as target container on %s", formatter.ShortenID(container.ID), app.Server) | ||||
|  | ||||
| 	if isToContainer { | ||||
| 		if _, err := os.Stat(srcPath); err != nil { | ||||
| 			logrus.Fatalf("%s does not exist?", srcPath) | ||||
| 	dstStat, err := cl.ContainerStatPath(context.Background(), containerID, dstPath) | ||||
| 	dstExists := true | ||||
| 	if err != nil { | ||||
| 		if errdefs.IsNotFound(err) { | ||||
| 			dstExists = false | ||||
| 		} else { | ||||
| 			return fmt.Errorf("remote path: %s", err) | ||||
| 		} | ||||
| 	} | ||||
|  | ||||
| 		toTarOpts := &archive.TarOptions{NoOverwriteDirNonDir: true, Compression: archive.Gzip} | ||||
| 		content, err := archive.TarWithOptions(srcPath, toTarOpts) | ||||
| 	mode, err := copyMode(srcPath, dstPath, srcStat.Mode(), dstStat.Mode, dstExists) | ||||
| 	if err != nil { | ||||
| 		return err | ||||
| 	} | ||||
| 	movePath := "" | ||||
| 	switch mode { | ||||
| 	case CopyModeDirToDir: | ||||
| 		// Add the src directory to the destination path | ||||
| 		_, srcDir := path.Split(srcPath) | ||||
| 		dstPath = path.Join(dstPath, srcDir) | ||||
|  | ||||
| 		// Make sure the dst directory exits. | ||||
| 		dcli, err := command.NewDockerCli() | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 			return err | ||||
| 		} | ||||
| 		if _, err := container.RunExec(dcli, cl, containerID, &types.ExecConfig{ | ||||
| 			AttachStderr: true, | ||||
| 			AttachStdin:  true, | ||||
| 			AttachStdout: true, | ||||
| 			Cmd:          []string{"mkdir", "-p", dstPath}, | ||||
| 			Detach:       false, | ||||
| 			Tty:          true, | ||||
| 		}); err != nil { | ||||
| 			return fmt.Errorf("create remote directory: %s", err) | ||||
| 		} | ||||
| 	case CopyModeFileToFile: | ||||
| 		// Remove the file component from the path, since docker can only copy | ||||
| 		// to a directory. | ||||
| 		dstPath, _ = path.Split(dstPath) | ||||
| 	case CopyModeFileToFileRename: | ||||
| 		// Copy the file to the temp directory and move it to its dstPath | ||||
| 		// afterwards. | ||||
| 		movePath = dstPath | ||||
| 		dstPath = "/tmp" | ||||
| 	} | ||||
|  | ||||
| 		copyOpts := types.CopyToContainerOptions{AllowOverwriteDirWithFile: false, CopyUIDGID: false} | ||||
| 		if err := cl.CopyToContainer(context.Background(), container.ID, dstPath, content, copyOpts); err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
| 	} else { | ||||
| 		content, _, err := cl.CopyFromContainer(context.Background(), container.ID, srcPath) | ||||
| 	toTarOpts := &archive.TarOptions{IncludeSourceDir: true, NoOverwriteDirNonDir: true, Compression: archive.Gzip} | ||||
| 	content, err := archive.TarWithOptions(srcPath, toTarOpts) | ||||
| 	if err != nil { | ||||
| 		return err | ||||
| 	} | ||||
|  | ||||
| 	logrus.Debugf("copy %s from local to %s on container", srcPath, dstPath) | ||||
| 	copyOpts := types.CopyToContainerOptions{AllowOverwriteDirWithFile: false, CopyUIDGID: false} | ||||
| 	if err := cl.CopyToContainer(context.Background(), containerID, dstPath, content, copyOpts); err != nil { | ||||
| 		return err | ||||
| 	} | ||||
|  | ||||
| 	if movePath != "" { | ||||
| 		_, srcFile := path.Split(srcPath) | ||||
| 		dcli, err := command.NewDockerCli() | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 			return err | ||||
| 		} | ||||
| 		defer content.Close() | ||||
| 		fromTarOpts := &archive.TarOptions{NoOverwriteDirNonDir: true, Compression: archive.Gzip} | ||||
| 		if err := archive.Untar(content, dstPath, fromTarOpts); err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		if _, err := container.RunExec(dcli, cl, containerID, &types.ExecConfig{ | ||||
| 			AttachStderr: true, | ||||
| 			AttachStdin:  true, | ||||
| 			AttachStdout: true, | ||||
| 			Cmd:          []string{"mv", path.Join("/tmp", srcFile), movePath}, | ||||
| 			Detach:       false, | ||||
| 			Tty:          true, | ||||
| 		}); err != nil { | ||||
| 			return fmt.Errorf("create remote directory: %s", err) | ||||
| 		} | ||||
| 	} | ||||
|  | ||||
| 	return nil | ||||
| } | ||||
|  | ||||
| // CopyFromContainer copies a file or directory from the given container to the local file system. | ||||
| // See the possible copy modes and their documentation. | ||||
| func CopyFromContainer(cl *dockerClient.Client, containerID, srcPath, dstPath string) error { | ||||
| 	srcStat, err := cl.ContainerStatPath(context.Background(), containerID, srcPath) | ||||
| 	if err != nil { | ||||
| 		if errdefs.IsNotFound(err) { | ||||
| 			return fmt.Errorf("remote: %s does not exist", srcPath) | ||||
| 		} else { | ||||
| 			return fmt.Errorf("remote path: %s", err) | ||||
| 		} | ||||
| 	} | ||||
|  | ||||
| 	dstStat, err := os.Stat(dstPath) | ||||
| 	dstExists := true | ||||
| 	var dstMode os.FileMode | ||||
| 	if err != nil { | ||||
| 		if os.IsNotExist(err) { | ||||
| 			dstExists = false | ||||
| 		} else { | ||||
| 			return fmt.Errorf("remote path: %s", err) | ||||
| 		} | ||||
| 	} else { | ||||
| 		dstMode = dstStat.Mode() | ||||
| 	} | ||||
|  | ||||
| 	mode, err := copyMode(srcPath, dstPath, srcStat.Mode, dstMode, dstExists) | ||||
| 	if err != nil { | ||||
| 		return err | ||||
| 	} | ||||
|  | ||||
| 	moveDstDir := "" | ||||
| 	moveDstFile := "" | ||||
| 	switch mode { | ||||
| 	case CopyModeFileToFile: | ||||
| 		// Remove the file component from the path, since docker can only copy | ||||
| 		// to a directory. | ||||
| 		dstPath, _ = path.Split(dstPath) | ||||
| 	case CopyModeFileToFileRename: | ||||
| 		// Copy the file to the temp directory and move it to its dstPath | ||||
| 		// afterwards. | ||||
| 		moveDstFile = dstPath | ||||
| 		dstPath = "/tmp" | ||||
| 	case CopyModeFilesToDir: | ||||
| 		// Copy the directory to the temp directory and move it to its | ||||
| 		// dstPath afterwards. | ||||
| 		moveDstDir = path.Join(dstPath, "/") | ||||
| 		dstPath = "/tmp" | ||||
|  | ||||
| 		// Make sure the temp directory always gets removed | ||||
| 		defer os.Remove(path.Join("/tmp")) | ||||
| 	} | ||||
|  | ||||
| 	content, _, err := cl.CopyFromContainer(context.Background(), containerID, srcPath) | ||||
| 	if err != nil { | ||||
| 		return fmt.Errorf("copy: %s", err) | ||||
| 	} | ||||
| 	defer content.Close() | ||||
| 	if err := archive.Untar(content, dstPath, &archive.TarOptions{ | ||||
| 		NoOverwriteDirNonDir: true, | ||||
| 		Compression:          archive.Gzip, | ||||
| 		NoLchown:             true, | ||||
| 	}); err != nil { | ||||
| 		return fmt.Errorf("untar: %s", err) | ||||
| 	} | ||||
|  | ||||
| 	if moveDstFile != "" { | ||||
| 		_, srcFile := path.Split(strings.TrimSuffix(srcPath, "/")) | ||||
| 		if err := moveFile(path.Join("/tmp", srcFile), moveDstFile); err != nil { | ||||
| 			return err | ||||
| 		} | ||||
| 	} | ||||
| 	if moveDstDir != "" { | ||||
| 		_, srcDir := path.Split(strings.TrimSuffix(srcPath, "/")) | ||||
| 		if err := moveDir(path.Join("/tmp", srcDir), moveDstDir); err != nil { | ||||
| 			return err | ||||
| 		} | ||||
| 	} | ||||
| 	return nil | ||||
| } | ||||
|  | ||||
| var ( | ||||
| 	ErrCopyDirToFile  = fmt.Errorf("can't copy dir to file") | ||||
| 	ErrDstDirNotExist = fmt.Errorf("destination directory does not exist") | ||||
| ) | ||||
|  | ||||
| type CopyMode int | ||||
|  | ||||
| const ( | ||||
| 	// Copy a src file to a dest file. The src and dest file names are the same. | ||||
| 	//  <dir_src>/<file> + <dir_dst>/<file> -> <dir_dst>/<file> | ||||
| 	CopyModeFileToFile = CopyMode(iota) | ||||
| 	// Copy a src file to a dest file. The src and dest file names are  not the same. | ||||
| 	//  <dir_src>/<file_src> + <dir_dst>/<file_dst> -> <dir_dst>/<file_dst> | ||||
| 	CopyModeFileToFileRename | ||||
| 	// Copy a src file to dest directory. The dest file gets created in the dest | ||||
| 	// folder with the src filename. | ||||
| 	//  <dir_src>/<file> + <dir_dst> -> <dir_dst>/<file> | ||||
| 	CopyModeFileToDir | ||||
| 	// Copy a src directory to dest directory. | ||||
| 	//  <dir_src> + <dir_dst> -> <dir_dst>/<dir_src> | ||||
| 	CopyModeDirToDir | ||||
| 	// Copy all files in the src directory to the dest directory. This works recursively. | ||||
| 	//  <dir_src>/ + <dir_dst> -> <dir_dst>/<files_from_dir_src> | ||||
| 	CopyModeFilesToDir | ||||
| ) | ||||
|  | ||||
| // copyMode takes a src and dest path and file mode to determine the copy mode. | ||||
| // See the possible copy modes and their documentation. | ||||
| func copyMode(srcPath, dstPath string, srcMode os.FileMode, dstMode os.FileMode, dstExists bool) (CopyMode, error) { | ||||
| 	_, srcFile := path.Split(srcPath) | ||||
| 	_, dstFile := path.Split(dstPath) | ||||
| 	if srcMode.IsDir() { | ||||
| 		if !dstExists { | ||||
| 			return -1, ErrDstDirNotExist | ||||
| 		} | ||||
| 		if dstMode.IsDir() { | ||||
| 			if strings.HasSuffix(srcPath, "/") { | ||||
| 				return CopyModeFilesToDir, nil | ||||
| 			} | ||||
| 			return CopyModeDirToDir, nil | ||||
| 		} | ||||
| 		return -1, ErrCopyDirToFile | ||||
| 	} | ||||
|  | ||||
| 	if dstMode.IsDir() { | ||||
| 		return CopyModeFileToDir, nil | ||||
| 	} | ||||
|  | ||||
| 	if srcFile != dstFile { | ||||
| 		return CopyModeFileToFileRename, nil | ||||
| 	} | ||||
|  | ||||
| 	return CopyModeFileToFile, nil | ||||
| } | ||||
|  | ||||
| // moveDir moves all files from a source path to the destination path recursively. | ||||
| func moveDir(sourcePath, destPath string) error { | ||||
| 	return filepath.Walk(sourcePath, func(p string, info os.FileInfo, err error) error { | ||||
| 		if err != nil { | ||||
| 			return err | ||||
| 		} | ||||
| 		newPath := path.Join(destPath, strings.TrimPrefix(p, sourcePath)) | ||||
| 		if info.IsDir() { | ||||
| 			err := os.Mkdir(newPath, info.Mode()) | ||||
| 			if err != nil { | ||||
| 				if os.IsExist(err) { | ||||
| 					return nil | ||||
| 				} | ||||
| 				return err | ||||
| 			} | ||||
| 		} | ||||
| 		if info.Mode().IsRegular() { | ||||
| 			return moveFile(p, newPath) | ||||
| 		} | ||||
| 		return nil | ||||
| 	}) | ||||
| } | ||||
|  | ||||
| // moveFile moves a file from a source path to a destination path. | ||||
| func moveFile(sourcePath, destPath string) error { | ||||
| 	inputFile, err := os.Open(sourcePath) | ||||
| 	if err != nil { | ||||
| 		return err | ||||
| 	} | ||||
| 	outputFile, err := os.Create(destPath) | ||||
| 	if err != nil { | ||||
| 		inputFile.Close() | ||||
| 		return err | ||||
| 	} | ||||
| 	defer outputFile.Close() | ||||
| 	_, err = io.Copy(outputFile, inputFile) | ||||
| 	inputFile.Close() | ||||
| 	if err != nil { | ||||
| 		return err | ||||
| 	} | ||||
|  | ||||
| 	// Remove file after succesfull copy. | ||||
| 	err = os.Remove(sourcePath) | ||||
| 	if err != nil { | ||||
| 		return err | ||||
| 	} | ||||
| 	return nil | ||||
| } | ||||
|  | ||||
							
								
								
									
										113
									
								
								cli/app/cp_test.go
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										113
									
								
								cli/app/cp_test.go
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,113 @@ | ||||
| package app | ||||
|  | ||||
| import ( | ||||
| 	"os" | ||||
| 	"testing" | ||||
| ) | ||||
|  | ||||
| func TestParse(t *testing.T) { | ||||
| 	tests := []struct { | ||||
| 		src         string | ||||
| 		dst         string | ||||
| 		srcPath     string | ||||
| 		dstPath     string | ||||
| 		service     string | ||||
| 		toContainer bool | ||||
| 		err         error | ||||
| 	}{ | ||||
| 		{src: "foo", dst: "bar", err: errServiceMissing}, | ||||
| 		{src: "app:foo", dst: "app:bar", err: errServiceMissing}, | ||||
| 		{src: "app:foo", dst: "bar", srcPath: "foo", dstPath: "bar", service: "app", toContainer: false}, | ||||
| 		{src: "foo", dst: "app:bar", srcPath: "foo", dstPath: "bar", service: "app", toContainer: true}, | ||||
| 	} | ||||
|  | ||||
| 	for i, tc := range tests { | ||||
| 		srcPath, dstPath, service, toContainer, err := parseSrcAndDst(tc.src, tc.dst) | ||||
| 		if srcPath != tc.srcPath { | ||||
| 			t.Errorf("[%d] srcPath: want (%s), got(%s)", i, tc.srcPath, srcPath) | ||||
| 		} | ||||
| 		if dstPath != tc.dstPath { | ||||
| 			t.Errorf("[%d] dstPath: want (%s), got(%s)", i, tc.dstPath, dstPath) | ||||
| 		} | ||||
| 		if service != tc.service { | ||||
| 			t.Errorf("[%d] service: want (%s), got(%s)", i, tc.service, service) | ||||
| 		} | ||||
| 		if toContainer != tc.toContainer { | ||||
| 			t.Errorf("[%d] toConainer: want (%t), got(%t)", i, tc.toContainer, toContainer) | ||||
| 		} | ||||
| 		if err == nil && tc.err != nil && err.Error() != tc.err.Error() { | ||||
| 			t.Errorf("[%d] err: want (%s), got(%s)", i, tc.err, err) | ||||
| 		} | ||||
| 	} | ||||
| } | ||||
|  | ||||
| func TestCopyMode(t *testing.T) { | ||||
| 	tests := []struct { | ||||
| 		srcPath   string | ||||
| 		dstPath   string | ||||
| 		srcMode   os.FileMode | ||||
| 		dstMode   os.FileMode | ||||
| 		dstExists bool | ||||
| 		mode      CopyMode | ||||
| 		err       error | ||||
| 	}{ | ||||
| 		{ | ||||
| 			srcPath:   "foo.txt", | ||||
| 			dstPath:   "foo.txt", | ||||
| 			srcMode:   os.ModePerm, | ||||
| 			dstMode:   os.ModePerm, | ||||
| 			dstExists: true, | ||||
| 			mode:      CopyModeFileToFile, | ||||
| 		}, | ||||
| 		{ | ||||
| 			srcPath:   "foo.txt", | ||||
| 			dstPath:   "bar.txt", | ||||
| 			srcMode:   os.ModePerm, | ||||
| 			dstExists: true, | ||||
| 			mode:      CopyModeFileToFileRename, | ||||
| 		}, | ||||
| 		{ | ||||
| 			srcPath:   "foo", | ||||
| 			dstPath:   "foo", | ||||
| 			srcMode:   os.ModeDir, | ||||
| 			dstMode:   os.ModeDir, | ||||
| 			dstExists: true, | ||||
| 			mode:      CopyModeDirToDir, | ||||
| 		}, | ||||
| 		{ | ||||
| 			srcPath:   "foo/", | ||||
| 			dstPath:   "foo", | ||||
| 			srcMode:   os.ModeDir, | ||||
| 			dstMode:   os.ModeDir, | ||||
| 			dstExists: true, | ||||
| 			mode:      CopyModeFilesToDir, | ||||
| 		}, | ||||
| 		{ | ||||
| 			srcPath:   "foo", | ||||
| 			dstPath:   "foo", | ||||
| 			srcMode:   os.ModeDir, | ||||
| 			dstExists: false, | ||||
| 			mode:      -1, | ||||
| 			err:       ErrDstDirNotExist, | ||||
| 		}, | ||||
| 		{ | ||||
| 			srcPath:   "foo", | ||||
| 			dstPath:   "foo", | ||||
| 			srcMode:   os.ModeDir, | ||||
| 			dstMode:   os.ModePerm, | ||||
| 			dstExists: true, | ||||
| 			mode:      -1, | ||||
| 			err:       ErrCopyDirToFile, | ||||
| 		}, | ||||
| 	} | ||||
|  | ||||
| 	for i, tc := range tests { | ||||
| 		mode, err := copyMode(tc.srcPath, tc.dstPath, tc.srcMode, tc.dstMode, tc.dstExists) | ||||
| 		if mode != tc.mode { | ||||
| 			t.Errorf("[%d] mode: want (%d), got(%d)", i, tc.mode, mode) | ||||
| 		} | ||||
| 		if err != tc.err { | ||||
| 			t.Errorf("[%d] err: want (%s), got(%s)", i, tc.err, err) | ||||
| 		} | ||||
| 	} | ||||
| } | ||||
| @ -1,8 +1,22 @@ | ||||
| package app | ||||
|  | ||||
| import ( | ||||
| 	"context" | ||||
| 	"fmt" | ||||
|  | ||||
| 	"coopcloud.tech/abra/cli/internal" | ||||
| 	"coopcloud.tech/abra/pkg/autocomplete" | ||||
| 	"coopcloud.tech/abra/pkg/secret" | ||||
|  | ||||
| 	"coopcloud.tech/abra/pkg/client" | ||||
| 	"coopcloud.tech/abra/pkg/config" | ||||
| 	"coopcloud.tech/abra/pkg/dns" | ||||
| 	"coopcloud.tech/abra/pkg/formatter" | ||||
| 	"coopcloud.tech/abra/pkg/git" | ||||
| 	"coopcloud.tech/abra/pkg/lint" | ||||
| 	"coopcloud.tech/abra/pkg/recipe" | ||||
| 	"coopcloud.tech/abra/pkg/upstream/stack" | ||||
| 	"github.com/sirupsen/logrus" | ||||
| 	"github.com/urfave/cli" | ||||
| ) | ||||
|  | ||||
| @ -10,7 +24,7 @@ var appDeployCommand = cli.Command{ | ||||
| 	Name:      "deploy", | ||||
| 	Aliases:   []string{"d"}, | ||||
| 	Usage:     "Deploy an app", | ||||
| 	ArgsUsage: "<domain>", | ||||
| 	ArgsUsage: "<domain> [<version>]", | ||||
| 	Flags: []cli.Flag{ | ||||
| 		internal.DebugFlag, | ||||
| 		internal.NoInputFlag, | ||||
| @ -18,6 +32,7 @@ var appDeployCommand = cli.Command{ | ||||
| 		internal.ChaosFlag, | ||||
| 		internal.NoDomainChecksFlag, | ||||
| 		internal.DontWaitConvergeFlag, | ||||
| 		internal.OfflineFlag, | ||||
| 	}, | ||||
| 	Before: internal.SubCommandBefore, | ||||
| 	Description: ` | ||||
| @ -27,10 +42,217 @@ for this you need to look at the "abra app upgrade <domain>" command. | ||||
| You may pass "--force" to re-deploy the same version again. This can be useful | ||||
| if the container runtime has gotten into a weird state. | ||||
|  | ||||
| Chas mode ("--chaos") will deploy your local checkout of a recipe as-is, | ||||
| Chaos mode ("--chaos") will deploy your local checkout of a recipe as-is, | ||||
| including unstaged changes and can be useful for live hacking and testing new | ||||
| recipes. | ||||
| `, | ||||
| 	Action:       internal.DeployAction, | ||||
| 	BashComplete: autocomplete.AppNameComplete, | ||||
| 	Action: func(c *cli.Context) error { | ||||
| 		app := internal.ValidateApp(c) | ||||
| 		stackName := app.StackName() | ||||
|  | ||||
| 		specificVersion := c.Args().Get(1) | ||||
| 		if specificVersion != "" && internal.Chaos { | ||||
| 			logrus.Fatal("cannot use <version> and --chaos together") | ||||
| 		} | ||||
|  | ||||
| 		if err := recipe.EnsureExists(app.Recipe); err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		if !internal.Chaos { | ||||
| 			if err := recipe.EnsureIsClean(app.Recipe); err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
|  | ||||
| 			if !internal.Offline { | ||||
| 				if err := recipe.EnsureUpToDate(app.Recipe); err != nil { | ||||
| 					logrus.Fatal(err) | ||||
| 				} | ||||
| 			} | ||||
|  | ||||
| 			if err := recipe.EnsureLatest(app.Recipe); err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
| 		} | ||||
|  | ||||
| 		r, err := recipe.Get(app.Recipe, internal.Offline) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		if err := lint.LintForErrors(r); err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		logrus.Debugf("checking whether %s is already deployed", stackName) | ||||
|  | ||||
| 		cl, err := client.New(app.Server) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		isDeployed, deployedVersion, err := stack.IsDeployed(context.Background(), cl, stackName) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		// NOTE(d1): check out specific version before dealing with secrets. This | ||||
| 		// is because we need to deal with GetComposeFiles under the hood and these | ||||
| 		// files change from version to version which therefore affects which | ||||
| 		// secrets might be generated | ||||
| 		version := deployedVersion | ||||
| 		if specificVersion != "" { | ||||
| 			version = specificVersion | ||||
| 			logrus.Debugf("choosing %s as version to deploy", version) | ||||
| 			if err := recipe.EnsureVersion(app.Recipe, version); err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
| 		} | ||||
|  | ||||
| 		secStats, err := secret.PollSecretsStatus(cl, app) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		for _, secStat := range secStats { | ||||
| 			if !secStat.CreatedOnRemote { | ||||
| 				logrus.Fatalf("unable to deploy, secrets not generated (%s)?", secStat.LocalName) | ||||
| 			} | ||||
| 		} | ||||
|  | ||||
| 		if isDeployed { | ||||
| 			if internal.Force || internal.Chaos { | ||||
| 				logrus.Warnf("%s is already deployed but continuing (--force/--chaos)", app.Name) | ||||
| 			} else { | ||||
| 				logrus.Fatalf("%s is already deployed", app.Name) | ||||
| 			} | ||||
| 		} | ||||
|  | ||||
| 		if !internal.Chaos && specificVersion == "" { | ||||
| 			catl, err := recipe.ReadRecipeCatalogue(internal.Offline) | ||||
| 			if err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
| 			versions, err := recipe.GetRecipeCatalogueVersions(app.Recipe, catl) | ||||
| 			if err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
|  | ||||
| 			if len(versions) == 0 && !internal.Chaos { | ||||
| 				logrus.Warn("no published versions in catalogue, trying local recipe repository") | ||||
| 				recipeVersions, err := recipe.GetRecipeVersions(app.Recipe, internal.Offline) | ||||
| 				if err != nil { | ||||
| 					logrus.Warn(err) | ||||
| 				} | ||||
| 				for _, recipeVersion := range recipeVersions { | ||||
| 					for version := range recipeVersion { | ||||
| 						versions = append(versions, version) | ||||
| 					} | ||||
| 				} | ||||
| 			} | ||||
|  | ||||
| 			if len(versions) > 0 && !internal.Chaos { | ||||
| 				version = versions[len(versions)-1] | ||||
| 				logrus.Debugf("choosing %s as version to deploy", version) | ||||
| 				if err := recipe.EnsureVersion(app.Recipe, version); err != nil { | ||||
| 					logrus.Fatal(err) | ||||
| 				} | ||||
| 			} else { | ||||
| 				head, err := git.GetRecipeHead(app.Recipe) | ||||
| 				if err != nil { | ||||
| 					logrus.Fatal(err) | ||||
| 				} | ||||
| 				version = formatter.SmallSHA(head.String()) | ||||
| 				logrus.Warn("no versions detected, using latest commit") | ||||
| 			} | ||||
| 		} | ||||
|  | ||||
| 		if internal.Chaos { | ||||
| 			logrus.Warnf("chaos mode engaged") | ||||
| 			var err error | ||||
| 			version, err = recipe.ChaosVersion(app.Recipe) | ||||
| 			if err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
| 		} | ||||
|  | ||||
| 		abraShPath := fmt.Sprintf("%s/%s/%s", config.RECIPES_DIR, app.Recipe, "abra.sh") | ||||
| 		abraShEnv, err := config.ReadAbraShEnvVars(abraShPath) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
| 		for k, v := range abraShEnv { | ||||
| 			app.Env[k] = v | ||||
| 		} | ||||
|  | ||||
| 		composeFiles, err := config.GetComposeFiles(app.Recipe, app.Env) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		deployOpts := stack.Deploy{ | ||||
| 			Composefiles: composeFiles, | ||||
| 			Namespace:    stackName, | ||||
| 			Prune:        false, | ||||
| 			ResolveImage: stack.ResolveImageAlways, | ||||
| 		} | ||||
| 		compose, err := config.GetAppComposeConfig(app.Name, deployOpts, app.Env) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		config.ExposeAllEnv(stackName, compose, app.Env) | ||||
| 		config.SetRecipeLabel(compose, stackName, app.Recipe) | ||||
| 		config.SetChaosLabel(compose, stackName, internal.Chaos) | ||||
| 		config.SetChaosVersionLabel(compose, stackName, version) | ||||
| 		config.SetUpdateLabel(compose, stackName, app.Env) | ||||
|  | ||||
| 		envVars, err := config.CheckEnv(app) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		for _, envVar := range envVars { | ||||
| 			if !envVar.Present { | ||||
| 				logrus.Warnf("env var %s missing from %s.env, present in recipe .env.sample", envVar.Name, app.Domain) | ||||
| 			} | ||||
| 		} | ||||
|  | ||||
| 		if err := internal.DeployOverview(app, version, "continue with deployment?"); err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		if !internal.NoDomainChecks { | ||||
| 			domainName, ok := app.Env["DOMAIN"] | ||||
| 			if ok { | ||||
| 				if _, err = dns.EnsureDomainsResolveSameIPv4(domainName, app.Server); err != nil { | ||||
| 					logrus.Fatal(err) | ||||
| 				} | ||||
| 			} else { | ||||
| 				logrus.Warn("skipping domain checks as no DOMAIN=... configured for app") | ||||
| 			} | ||||
| 		} else { | ||||
| 			logrus.Warn("skipping domain checks as requested") | ||||
| 		} | ||||
|  | ||||
| 		stack.WaitTimeout, err = config.GetTimeoutFromLabel(compose, stackName) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
| 		logrus.Debugf("set waiting timeout to %d s", stack.WaitTimeout) | ||||
|  | ||||
| 		if err := stack.RunDeploy(cl, deployOpts, compose, app.Name, internal.DontWaitConverge); err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		postDeployCmds, ok := app.Env["POST_DEPLOY_CMDS"] | ||||
| 		if ok && !internal.DontWaitConverge { | ||||
| 			logrus.Debugf("run the following post-deploy commands: %s", postDeployCmds) | ||||
| 			if err := internal.PostCmds(cl, app, postDeployCmds); err != nil { | ||||
| 				logrus.Fatalf("attempting to run post deploy commands, saw: %s", err) | ||||
| 			} | ||||
| 		} | ||||
| 		return nil | ||||
| 	}, | ||||
| } | ||||
|  | ||||
| @ -13,7 +13,7 @@ import ( | ||||
| 	"coopcloud.tech/abra/pkg/config" | ||||
| 	"coopcloud.tech/abra/pkg/recipe" | ||||
| 	stack "coopcloud.tech/abra/pkg/upstream/stack" | ||||
| 	"github.com/docker/docker/api/types" | ||||
| 	containerTypes "github.com/docker/docker/api/types/container" | ||||
| 	"github.com/docker/docker/api/types/filters" | ||||
| 	dockerClient "github.com/docker/docker/client" | ||||
| 	"github.com/sirupsen/logrus" | ||||
| @ -50,6 +50,7 @@ the logs. | ||||
| 	Flags: []cli.Flag{ | ||||
| 		internal.DebugFlag, | ||||
| 		internal.WatchFlag, | ||||
| 		internal.OfflineFlag, | ||||
| 	}, | ||||
| 	Before:       internal.SubCommandBefore, | ||||
| 	BashComplete: autocomplete.AppNameComplete, | ||||
| @ -83,13 +84,11 @@ the logs. | ||||
| 			} | ||||
| 			time.Sleep(2 * time.Second) | ||||
| 		} | ||||
|  | ||||
| 		return nil | ||||
| 	}, | ||||
| } | ||||
|  | ||||
| func checkErrors(c *cli.Context, cl *dockerClient.Client, app config.App) error { | ||||
| 	recipe, err := recipe.Get(app.Recipe) | ||||
| 	recipe, err := recipe.Get(app.Recipe, internal.Offline) | ||||
| 	if err != nil { | ||||
| 		return err | ||||
| 	} | ||||
| @ -98,7 +97,7 @@ func checkErrors(c *cli.Context, cl *dockerClient.Client, app config.App) error | ||||
| 		filters := filters.NewArgs() | ||||
| 		filters.Add("name", fmt.Sprintf("^%s_%s", app.StackName(), service.Name)) | ||||
|  | ||||
| 		containers, err := cl.ContainerList(context.Background(), types.ContainerListOptions{Filters: filters}) | ||||
| 		containers, err := cl.ContainerList(context.Background(), containerTypes.ListOptions{Filters: filters}) | ||||
| 		if err != nil { | ||||
| 			return err | ||||
| 		} | ||||
|  | ||||
| @ -4,6 +4,7 @@ import ( | ||||
| 	"encoding/json" | ||||
| 	"fmt" | ||||
| 	"sort" | ||||
| 	"strconv" | ||||
| 	"strings" | ||||
|  | ||||
| 	"coopcloud.tech/abra/cli/internal" | ||||
| @ -39,13 +40,16 @@ var listAppServerFlag = &cli.StringFlag{ | ||||
| } | ||||
|  | ||||
| type appStatus struct { | ||||
| 	Server  string `json:"server"` | ||||
| 	Recipe  string `json:"recipe"` | ||||
| 	AppName string `json:"appName"` | ||||
| 	Domain  string `json:"domain"` | ||||
| 	Status  string `json:"status"` | ||||
| 	Version string `json:"version"` | ||||
| 	Upgrade string `json:"upgrade"` | ||||
| 	Server       string `json:"server"` | ||||
| 	Recipe       string `json:"recipe"` | ||||
| 	AppName      string `json:"appName"` | ||||
| 	Domain       string `json:"domain"` | ||||
| 	Status       string `json:"status"` | ||||
| 	Chaos        string `json:"chaos"` | ||||
| 	ChaosVersion string `json:"chaosVersion"` | ||||
| 	AutoUpdate   string `json:"autoUpdate"` | ||||
| 	Version      string `json:"version"` | ||||
| 	Upgrade      string `json:"upgrade"` | ||||
| } | ||||
|  | ||||
| type serverStatus struct { | ||||
| @ -75,6 +79,7 @@ can take some time. | ||||
| 		statusFlag, | ||||
| 		listAppServerFlag, | ||||
| 		recipeFlag, | ||||
| 		internal.OfflineFlag, | ||||
| 	}, | ||||
| 	Before: internal.SubCommandBefore, | ||||
| 	Action: func(c *cli.Context) error { | ||||
| @ -105,7 +110,7 @@ can take some time. | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
|  | ||||
| 			catl, err = recipe.ReadRecipeCatalogue() | ||||
| 			catl, err = recipe.ReadRecipeCatalogue(internal.Offline) | ||||
| 			if err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
| @ -138,12 +143,24 @@ can take some time. | ||||
| 				if status { | ||||
| 					status := "unknown" | ||||
| 					version := "unknown" | ||||
| 					chaos := "unknown" | ||||
| 					chaosVersion := "unknown" | ||||
| 					autoUpdate := "unknown" | ||||
| 					if statusMeta, ok := statuses[app.StackName()]; ok { | ||||
| 						if currentVersion, exists := statusMeta["version"]; exists { | ||||
| 							if currentVersion != "" { | ||||
| 								version = currentVersion | ||||
| 							} | ||||
| 						} | ||||
| 						if chaosDeploy, exists := statusMeta["chaos"]; exists { | ||||
| 							chaos = chaosDeploy | ||||
| 						} | ||||
| 						if chaosDeployVersion, exists := statusMeta["chaosVersion"]; exists { | ||||
| 							chaosVersion = chaosDeployVersion | ||||
| 						} | ||||
| 						if autoUpdateState, exists := statusMeta["autoUpdate"]; exists { | ||||
| 							autoUpdate = autoUpdateState | ||||
| 						} | ||||
| 						if statusMeta["status"] != "" { | ||||
| 							status = statusMeta["status"] | ||||
| 						} | ||||
| @ -153,7 +170,10 @@ can take some time. | ||||
| 					} | ||||
|  | ||||
| 					appStats.Status = status | ||||
| 					appStats.Chaos = chaos | ||||
| 					appStats.ChaosVersion = chaosVersion | ||||
| 					appStats.Version = version | ||||
| 					appStats.AutoUpdate = autoUpdate | ||||
|  | ||||
| 					var newUpdates []string | ||||
| 					if version != "unknown" { | ||||
| @ -223,7 +243,7 @@ can take some time. | ||||
|  | ||||
| 			tableCol := []string{"recipe", "domain"} | ||||
| 			if status { | ||||
| 				tableCol = append(tableCol, []string{"status", "version", "upgrade"}...) | ||||
| 				tableCol = append(tableCol, []string{"status", "chaos", "version", "upgrade", "autoupdate"}...) | ||||
| 			} | ||||
|  | ||||
| 			table := formatter.CreateTable(tableCol) | ||||
| @ -231,7 +251,17 @@ can take some time. | ||||
| 			for _, appStat := range serverStat.Apps { | ||||
| 				tableRow := []string{appStat.Recipe, appStat.Domain} | ||||
| 				if status { | ||||
| 					tableRow = append(tableRow, []string{appStat.Status, appStat.Version, appStat.Upgrade}...) | ||||
| 					chaosStatus := appStat.Chaos | ||||
| 					if chaosStatus != "unknown" { | ||||
| 						chaosEnabled, err := strconv.ParseBool(chaosStatus) | ||||
| 						if err != nil { | ||||
| 							logrus.Fatal(err) | ||||
| 						} | ||||
| 						if chaosEnabled && appStat.ChaosVersion != "unknown" { | ||||
| 							chaosStatus = appStat.ChaosVersion | ||||
| 						} | ||||
| 					} | ||||
| 					tableRow = append(tableRow, []string{appStat.Status, chaosStatus, appStat.Version, appStat.Upgrade, appStat.AutoUpdate}...) | ||||
| 				} | ||||
| 				table.Append(tableRow) | ||||
| 			} | ||||
|  | ||||
							
								
								
									
										175
									
								
								cli/app/logs.go
									
									
									
									
									
								
							
							
						
						
									
										175
									
								
								cli/app/logs.go
									
									
									
									
									
								
							| @ -2,54 +2,125 @@ package app | ||||
|  | ||||
| import ( | ||||
| 	"context" | ||||
| 	"fmt" | ||||
| 	"io" | ||||
| 	"os" | ||||
| 	"slices" | ||||
| 	"sync" | ||||
| 	"time" | ||||
|  | ||||
| 	"coopcloud.tech/abra/cli/internal" | ||||
| 	"coopcloud.tech/abra/pkg/autocomplete" | ||||
| 	"coopcloud.tech/abra/pkg/client" | ||||
| 	"coopcloud.tech/abra/pkg/config" | ||||
| 	"coopcloud.tech/abra/pkg/service" | ||||
| 	"coopcloud.tech/abra/pkg/recipe" | ||||
| 	"coopcloud.tech/abra/pkg/upstream/stack" | ||||
| 	"github.com/docker/docker/api/types" | ||||
| 	containerTypes "github.com/docker/docker/api/types/container" | ||||
| 	"github.com/docker/docker/api/types/filters" | ||||
| 	"github.com/docker/docker/api/types/swarm" | ||||
| 	dockerClient "github.com/docker/docker/client" | ||||
| 	"github.com/sirupsen/logrus" | ||||
| 	"github.com/urfave/cli" | ||||
| ) | ||||
|  | ||||
| var logOpts = types.ContainerLogsOptions{ | ||||
| 	Details:    false, | ||||
| 	Follow:     true, | ||||
| 	ShowStderr: true, | ||||
| 	ShowStdout: true, | ||||
| 	Tail:       "20", | ||||
| 	Timestamps: true, | ||||
| var appLogsCommand = cli.Command{ | ||||
| 	Name:      "logs", | ||||
| 	Aliases:   []string{"l"}, | ||||
| 	ArgsUsage: "<domain> [<service>]", | ||||
| 	Usage:     "Tail app logs", | ||||
| 	Flags: []cli.Flag{ | ||||
| 		internal.StdErrOnlyFlag, | ||||
| 		internal.SinceLogsFlag, | ||||
| 		internal.DebugFlag, | ||||
| 	}, | ||||
| 	Before:       internal.SubCommandBefore, | ||||
| 	BashComplete: autocomplete.AppNameComplete, | ||||
| 	Action: func(c *cli.Context) error { | ||||
| 		app := internal.ValidateApp(c) | ||||
| 		stackName := app.StackName() | ||||
|  | ||||
| 		if err := recipe.EnsureExists(app.Recipe); err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		cl, err := client.New(app.Server) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		isDeployed, _, err := stack.IsDeployed(context.Background(), cl, stackName) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		if !isDeployed { | ||||
| 			logrus.Fatalf("%s is not deployed?", app.Name) | ||||
| 		} | ||||
|  | ||||
| 		serviceName := c.Args().Get(1) | ||||
| 		serviceNames := []string{} | ||||
| 		if serviceName != "" { | ||||
| 			serviceNames = []string{serviceName} | ||||
| 		} | ||||
| 		err = tailLogs(cl, app, serviceNames) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		return nil | ||||
| 	}, | ||||
| } | ||||
|  | ||||
| // stackLogs lists logs for all stack services | ||||
| func stackLogs(c *cli.Context, app config.App, client *dockerClient.Client) { | ||||
| 	filters, err := app.Filters(true, false) | ||||
| // tailLogs prints logs for the given app with optional service names to be | ||||
| // filtered on. It also checks if the latest task is not runnning and then | ||||
| // prints the past tasks. | ||||
| func tailLogs(cl *dockerClient.Client, app config.App, serviceNames []string) error { | ||||
| 	f, err := app.Filters(true, false, serviceNames...) | ||||
| 	if err != nil { | ||||
| 		logrus.Fatal(err) | ||||
| 		return err | ||||
| 	} | ||||
|  | ||||
| 	serviceOpts := types.ServiceListOptions{Filters: filters} | ||||
| 	services, err := client.ServiceList(context.Background(), serviceOpts) | ||||
| 	services, err := cl.ServiceList(context.Background(), types.ServiceListOptions{Filters: f}) | ||||
| 	if err != nil { | ||||
| 		logrus.Fatal(err) | ||||
| 		return err | ||||
| 	} | ||||
|  | ||||
| 	var wg sync.WaitGroup | ||||
| 	for _, service := range services { | ||||
| 		wg.Add(1) | ||||
| 		go func(s string) { | ||||
| 			if internal.StdErrOnly { | ||||
| 				logOpts.ShowStdout = false | ||||
| 		filters := filters.NewArgs() | ||||
| 		filters.Add("name", service.Spec.Name) | ||||
| 		tasks, err := cl.TaskList(context.Background(), types.TaskListOptions{Filters: f}) | ||||
| 		if err != nil { | ||||
| 			return err | ||||
| 		} | ||||
| 		if len(tasks) > 0 { | ||||
| 			// Need to sort the tasks by the CreatedAt field in the inverse order. | ||||
| 			// Otherwise they are in the reversed order and not sorted properly. | ||||
| 			slices.SortFunc[[]swarm.Task](tasks, func(t1, t2 swarm.Task) int { | ||||
| 				return int(t2.Meta.CreatedAt.Unix() - t1.Meta.CreatedAt.Unix()) | ||||
| 			}) | ||||
| 			lastTask := tasks[0].Status | ||||
| 			if lastTask.State != swarm.TaskStateRunning { | ||||
| 				for _, task := range tasks { | ||||
| 					logrus.Errorf("[%s] %s State %s: %s", service.Spec.Name, task.Meta.CreatedAt.Format(time.RFC3339), task.Status.State, task.Status.Err) | ||||
| 				} | ||||
| 			} | ||||
| 		} | ||||
|  | ||||
| 			logs, err := client.ServiceLogs(context.Background(), s, logOpts) | ||||
| 		// Collect the logs in a go routine, so the logs from all services are | ||||
| 		// collected in parallel. | ||||
| 		wg.Add(1) | ||||
| 		go func(serviceID string) { | ||||
| 			logs, err := cl.ServiceLogs(context.Background(), serviceID, containerTypes.LogsOptions{ | ||||
| 				ShowStderr: true, | ||||
| 				ShowStdout: !internal.StdErrOnly, | ||||
| 				Since:      internal.SinceLogs, | ||||
| 				Until:      "", | ||||
| 				Timestamps: true, | ||||
| 				Follow:     true, | ||||
| 				Tail:       "20", | ||||
| 				Details:    false, | ||||
| 			}) | ||||
| 			if err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
| @ -62,68 +133,8 @@ func stackLogs(c *cli.Context, app config.App, client *dockerClient.Client) { | ||||
| 		}(service.ID) | ||||
| 	} | ||||
|  | ||||
| 	// Wait for all log streams to be closed. | ||||
| 	wg.Wait() | ||||
|  | ||||
| 	os.Exit(0) | ||||
| } | ||||
|  | ||||
| var appLogsCommand = cli.Command{ | ||||
| 	Name:      "logs", | ||||
| 	Aliases:   []string{"l"}, | ||||
| 	ArgsUsage: "<domain> [<service>]", | ||||
| 	Usage:     "Tail app logs", | ||||
| 	Flags: []cli.Flag{ | ||||
| 		internal.StdErrOnlyFlag, | ||||
| 		internal.DebugFlag, | ||||
| 	}, | ||||
| 	Before:       internal.SubCommandBefore, | ||||
| 	BashComplete: autocomplete.AppNameComplete, | ||||
| 	Action: func(c *cli.Context) error { | ||||
| 		app := internal.ValidateApp(c) | ||||
|  | ||||
| 		cl, err := client.New(app.Server) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		serviceName := c.Args().Get(1) | ||||
| 		if serviceName == "" { | ||||
| 			logrus.Debugf("tailing logs for all %s services", app.Recipe) | ||||
| 			stackLogs(c, app, cl) | ||||
| 		} else { | ||||
| 			logrus.Debugf("tailing logs for %s", serviceName) | ||||
| 			if err := tailServiceLogs(c, cl, app, serviceName); err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
| 		} | ||||
|  | ||||
| 		return nil | ||||
| 	}, | ||||
| } | ||||
|  | ||||
| func tailServiceLogs(c *cli.Context, cl *dockerClient.Client, app config.App, serviceName string) error { | ||||
| 	filters := filters.NewArgs() | ||||
| 	filters.Add("name", fmt.Sprintf("%s_%s", app.StackName(), serviceName)) | ||||
|  | ||||
| 	chosenService, err := service.GetService(context.Background(), cl, filters, internal.NoInput) | ||||
| 	if err != nil { | ||||
| 		logrus.Fatal(err) | ||||
| 	} | ||||
|  | ||||
| 	if internal.StdErrOnly { | ||||
| 		logOpts.ShowStdout = false | ||||
| 	} | ||||
|  | ||||
| 	logs, err := cl.ServiceLogs(context.Background(), chosenService.ID, logOpts) | ||||
| 	if err != nil { | ||||
| 		logrus.Fatal(err) | ||||
| 	} | ||||
| 	defer logs.Close() | ||||
|  | ||||
| 	_, err = io.Copy(os.Stdout, logs) | ||||
| 	if err != nil && err != io.EOF { | ||||
| 		logrus.Fatal(err) | ||||
| 	} | ||||
|  | ||||
| 	return nil | ||||
| } | ||||
|  | ||||
							
								
								
									
										255
									
								
								cli/app/new.go
									
									
									
									
									
								
							
							
						
						
									
										255
									
								
								cli/app/new.go
									
									
									
									
									
								
							| @ -1,8 +1,20 @@ | ||||
| package app | ||||
|  | ||||
| import ( | ||||
| 	"fmt" | ||||
| 	"path" | ||||
|  | ||||
| 	"coopcloud.tech/abra/cli/internal" | ||||
| 	"coopcloud.tech/abra/pkg/autocomplete" | ||||
| 	"coopcloud.tech/abra/pkg/client" | ||||
| 	"coopcloud.tech/abra/pkg/config" | ||||
| 	"coopcloud.tech/abra/pkg/formatter" | ||||
| 	"coopcloud.tech/abra/pkg/jsontable" | ||||
| 	recipePkg "coopcloud.tech/abra/pkg/recipe" | ||||
| 	"coopcloud.tech/abra/pkg/secret" | ||||
| 	"github.com/AlecAivazis/survey/v2" | ||||
| 	dockerClient "github.com/docker/docker/client" | ||||
| 	"github.com/sirupsen/logrus" | ||||
| 	"github.com/urfave/cli" | ||||
| ) | ||||
|  | ||||
| @ -38,9 +50,244 @@ var appNewCommand = cli.Command{ | ||||
| 		internal.DomainFlag, | ||||
| 		internal.PassFlag, | ||||
| 		internal.SecretsFlag, | ||||
| 		internal.OfflineFlag, | ||||
| 		internal.ChaosFlag, | ||||
| 	}, | ||||
| 	Before:    internal.SubCommandBefore, | ||||
| 	ArgsUsage: "[<recipe>] [<version>]", | ||||
| 	BashComplete: func(ctx *cli.Context) { | ||||
| 		args := ctx.Args() | ||||
| 		switch len(args) { | ||||
| 		case 0: | ||||
| 			autocomplete.RecipeNameComplete(ctx) | ||||
| 		case 1: | ||||
| 			autocomplete.RecipeVersionComplete(ctx.Args().Get(0)) | ||||
| 		} | ||||
| 	}, | ||||
| 	Action: func(c *cli.Context) error { | ||||
| 		recipe := internal.ValidateRecipe(c) | ||||
|  | ||||
| 		if !internal.Chaos { | ||||
| 			if err := recipePkg.EnsureIsClean(recipe.Name); err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
| 			if !internal.Offline { | ||||
| 				if err := recipePkg.EnsureUpToDate(recipe.Name); err != nil { | ||||
| 					logrus.Fatal(err) | ||||
| 				} | ||||
| 			} | ||||
| 			if c.Args().Get(1) == "" { | ||||
| 				var version string | ||||
|  | ||||
| 				recipeVersions, err := recipePkg.GetRecipeVersions(recipe.Name, internal.Offline) | ||||
| 				if err != nil { | ||||
| 					logrus.Fatal(err) | ||||
| 				} | ||||
|  | ||||
| 				// NOTE(d1): determine whether recipe versions exist or not and check | ||||
| 				// out the latest version or current HEAD | ||||
| 				if len(recipeVersions) > 0 { | ||||
| 					latest := recipeVersions[len(recipeVersions)-1] | ||||
| 					for tag := range latest { | ||||
| 						version = tag | ||||
| 					} | ||||
|  | ||||
| 					if err := recipePkg.EnsureVersion(recipe.Name, version); err != nil { | ||||
| 						logrus.Fatal(err) | ||||
| 					} | ||||
| 				} else { | ||||
| 					if err := recipePkg.EnsureLatest(recipe.Name); err != nil { | ||||
| 						logrus.Fatal(err) | ||||
| 					} | ||||
| 				} | ||||
| 			} else { | ||||
| 				if err := recipePkg.EnsureVersion(recipe.Name, c.Args().Get(1)); err != nil { | ||||
| 					logrus.Fatal(err) | ||||
| 				} | ||||
| 			} | ||||
| 		} | ||||
|  | ||||
| 		if err := ensureServerFlag(); err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		if err := ensureDomainFlag(recipe, internal.NewAppServer); err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		sanitisedAppName := config.SanitiseAppName(internal.Domain) | ||||
| 		logrus.Debugf("%s sanitised as %s for new app", internal.Domain, sanitisedAppName) | ||||
|  | ||||
| 		if err := config.TemplateAppEnvSample( | ||||
| 			recipe.Name, | ||||
| 			internal.Domain, | ||||
| 			internal.NewAppServer, | ||||
| 			internal.Domain, | ||||
| 		); err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		var secrets AppSecrets | ||||
| 		var secretTable *jsontable.JSONTable | ||||
| 		if internal.Secrets { | ||||
| 			sampleEnv, err := recipe.SampleEnv() | ||||
| 			if err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
|  | ||||
| 			composeFiles, err := config.GetComposeFiles(recipe.Name, sampleEnv) | ||||
| 			if err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
|  | ||||
| 			envSamplePath := path.Join(config.RECIPES_DIR, recipe.Name, ".env.sample") | ||||
| 			secretsConfig, err := secret.ReadSecretsConfig(envSamplePath, composeFiles, config.StackName(internal.Domain)) | ||||
| 			if err != nil { | ||||
| 				return err | ||||
| 			} | ||||
|  | ||||
| 			if err := promptForSecrets(recipe.Name, secretsConfig); err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
|  | ||||
| 			cl, err := client.New(internal.NewAppServer) | ||||
| 			if err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
|  | ||||
| 			secrets, err = createSecrets(cl, secretsConfig, sanitisedAppName) | ||||
| 			if err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
|  | ||||
| 			secretCols := []string{"Name", "Value"} | ||||
| 			secretTable = formatter.CreateTable(secretCols) | ||||
| 			for name, val := range secrets { | ||||
| 				secretTable.Append([]string{name, val}) | ||||
| 			} | ||||
| 		} | ||||
|  | ||||
| 		if internal.NewAppServer == "default" { | ||||
| 			internal.NewAppServer = "local" | ||||
| 		} | ||||
|  | ||||
| 		tableCol := []string{"server", "recipe", "domain"} | ||||
| 		table := formatter.CreateTable(tableCol) | ||||
| 		table.Append([]string{internal.NewAppServer, recipe.Name, internal.Domain}) | ||||
|  | ||||
| 		fmt.Println(fmt.Sprintf("A new %s app has been created! Here is an overview:", recipe.Name)) | ||||
| 		fmt.Println("") | ||||
| 		table.Render() | ||||
| 		fmt.Println("") | ||||
| 		fmt.Println("You can configure this app by running the following:") | ||||
| 		fmt.Println(fmt.Sprintf("\n    abra app config %s", internal.Domain)) | ||||
| 		fmt.Println("") | ||||
| 		fmt.Println("You can deploy this app by running the following:") | ||||
| 		fmt.Println(fmt.Sprintf("\n    abra app deploy %s", internal.Domain)) | ||||
|  | ||||
| 		if len(secrets) > 0 { | ||||
| 			fmt.Println("") | ||||
| 			fmt.Println("Here are your generated secrets:") | ||||
| 			fmt.Println("") | ||||
| 			secretTable.Render() | ||||
| 			logrus.Warn("generated secrets are not shown again, please take note of them NOW") | ||||
| 		} | ||||
|  | ||||
| 		return nil | ||||
| 	}, | ||||
| 	Before:       internal.SubCommandBefore, | ||||
| 	ArgsUsage:    "[<recipe>]", | ||||
| 	Action:       internal.NewAction, | ||||
| 	BashComplete: autocomplete.RecipeNameComplete, | ||||
| } | ||||
|  | ||||
| // AppSecrets represents all app secrest | ||||
| type AppSecrets map[string]string | ||||
|  | ||||
| // createSecrets creates all secrets for a new app. | ||||
| func createSecrets(cl *dockerClient.Client, secretsConfig map[string]secret.Secret, sanitisedAppName string) (AppSecrets, error) { | ||||
| 	// NOTE(d1): trim to match app.StackName() implementation | ||||
| 	if len(sanitisedAppName) > config.MAX_SANITISED_APP_NAME_LENGTH { | ||||
| 		logrus.Debugf("trimming %s to %s to avoid runtime limits", sanitisedAppName, sanitisedAppName[:config.MAX_SANITISED_APP_NAME_LENGTH]) | ||||
| 		sanitisedAppName = sanitisedAppName[:config.MAX_SANITISED_APP_NAME_LENGTH] | ||||
| 	} | ||||
|  | ||||
| 	secrets, err := secret.GenerateSecrets(cl, secretsConfig, internal.NewAppServer) | ||||
| 	if err != nil { | ||||
| 		return nil, err | ||||
| 	} | ||||
|  | ||||
| 	if internal.Pass { | ||||
| 		for secretName := range secrets { | ||||
| 			secretValue := secrets[secretName] | ||||
| 			if err := secret.PassInsertSecret( | ||||
| 				secretValue, | ||||
| 				secretName, | ||||
| 				internal.Domain, | ||||
| 				internal.NewAppServer, | ||||
| 			); err != nil { | ||||
| 				return nil, err | ||||
| 			} | ||||
| 		} | ||||
| 	} | ||||
|  | ||||
| 	return secrets, nil | ||||
| } | ||||
|  | ||||
| // ensureDomainFlag checks if the domain flag was used. if not, asks the user for it/ | ||||
| func ensureDomainFlag(recipe recipePkg.Recipe, server string) error { | ||||
| 	if internal.Domain == "" && !internal.NoInput { | ||||
| 		prompt := &survey.Input{ | ||||
| 			Message: "Specify app domain", | ||||
| 			Default: fmt.Sprintf("%s.%s", recipe.Name, server), | ||||
| 		} | ||||
| 		if err := survey.AskOne(prompt, &internal.Domain); err != nil { | ||||
| 			return err | ||||
| 		} | ||||
| 	} | ||||
|  | ||||
| 	if internal.Domain == "" { | ||||
| 		return fmt.Errorf("no domain provided") | ||||
| 	} | ||||
|  | ||||
| 	return nil | ||||
| } | ||||
|  | ||||
| // promptForSecrets asks if we should generate secrets for a new app. | ||||
| func promptForSecrets(recipeName string, secretsConfig map[string]secret.Secret) error { | ||||
| 	if len(secretsConfig) == 0 { | ||||
| 		logrus.Debugf("%s has no secrets to generate, skipping...", recipeName) | ||||
| 		return nil | ||||
| 	} | ||||
|  | ||||
| 	if !internal.Secrets && !internal.NoInput { | ||||
| 		prompt := &survey.Confirm{ | ||||
| 			Message: "Generate app secrets?", | ||||
| 		} | ||||
| 		if err := survey.AskOne(prompt, &internal.Secrets); err != nil { | ||||
| 			return err | ||||
| 		} | ||||
| 	} | ||||
|  | ||||
| 	return nil | ||||
| } | ||||
|  | ||||
| // ensureServerFlag checks if the server flag was used. if not, asks the user for it. | ||||
| func ensureServerFlag() error { | ||||
| 	servers, err := config.GetServers() | ||||
| 	if err != nil { | ||||
| 		return err | ||||
| 	} | ||||
|  | ||||
| 	if internal.NewAppServer == "" && !internal.NoInput { | ||||
| 		prompt := &survey.Select{ | ||||
| 			Message: "Select app server:", | ||||
| 			Options: servers, | ||||
| 		} | ||||
| 		if err := survey.AskOne(prompt, &internal.NewAppServer); err != nil { | ||||
| 			return err | ||||
| 		} | ||||
| 	} | ||||
|  | ||||
| 	if internal.NewAppServer == "" { | ||||
| 		return fmt.Errorf("no server provided") | ||||
| 	} | ||||
|  | ||||
| 	return nil | ||||
| } | ||||
|  | ||||
							
								
								
									
										100
									
								
								cli/app/ps.go
									
									
									
									
									
								
							
							
						
						
									
										100
									
								
								cli/app/ps.go
									
									
									
									
									
								
							| @ -2,7 +2,8 @@ package app | ||||
|  | ||||
| import ( | ||||
| 	"context" | ||||
| 	"strings" | ||||
| 	"encoding/json" | ||||
| 	"fmt" | ||||
| 	"time" | ||||
|  | ||||
| 	"coopcloud.tech/abra/cli/internal" | ||||
| @ -10,11 +11,13 @@ import ( | ||||
| 	"coopcloud.tech/abra/pkg/client" | ||||
| 	"coopcloud.tech/abra/pkg/config" | ||||
| 	"coopcloud.tech/abra/pkg/formatter" | ||||
| 	"coopcloud.tech/abra/pkg/service" | ||||
| 	"coopcloud.tech/abra/pkg/recipe" | ||||
| 	abraService "coopcloud.tech/abra/pkg/service" | ||||
| 	stack "coopcloud.tech/abra/pkg/upstream/stack" | ||||
| 	"github.com/buger/goterm" | ||||
| 	dockerFormatter "github.com/docker/cli/cli/command/formatter" | ||||
| 	"github.com/docker/docker/api/types" | ||||
| 	containerTypes "github.com/docker/docker/api/types/container" | ||||
| 	"github.com/docker/docker/api/types/filters" | ||||
| 	dockerClient "github.com/docker/docker/client" | ||||
| 	"github.com/sirupsen/logrus" | ||||
| 	"github.com/urfave/cli" | ||||
| @ -27,6 +30,7 @@ var appPsCommand = cli.Command{ | ||||
| 	ArgsUsage:   "<domain>", | ||||
| 	Description: "Show a more detailed status output of a specific deployed app", | ||||
| 	Flags: []cli.Flag{ | ||||
| 		internal.MachineReadableFlag, | ||||
| 		internal.WatchFlag, | ||||
| 		internal.DebugFlag, | ||||
| 	}, | ||||
| @ -40,7 +44,7 @@ var appPsCommand = cli.Command{ | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		isDeployed, _, err := stack.IsDeployed(context.Background(), cl, app.StackName()) | ||||
| 		isDeployed, deployedVersion, err := stack.IsDeployed(context.Background(), cl, app.StackName()) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
| @ -49,6 +53,15 @@ var appPsCommand = cli.Command{ | ||||
| 			logrus.Fatalf("%s is not deployed?", app.Name) | ||||
| 		} | ||||
|  | ||||
| 		statuses, err := config.GetAppStatuses([]config.App{app}, true) | ||||
| 		if statusMeta, ok := statuses[app.StackName()]; ok { | ||||
| 			if _, exists := statusMeta["chaos"]; !exists { | ||||
| 				if err := recipe.EnsureVersion(app.Recipe, deployedVersion); err != nil { | ||||
| 					logrus.Fatal(err) | ||||
| 				} | ||||
| 			} | ||||
| 		} | ||||
|  | ||||
| 		if !internal.Watch { | ||||
| 			showPSOutput(c, app, cl) | ||||
| 			return nil | ||||
| @ -66,36 +79,77 @@ var appPsCommand = cli.Command{ | ||||
|  | ||||
| // showPSOutput renders ps output. | ||||
| func showPSOutput(c *cli.Context, app config.App, cl *dockerClient.Client) { | ||||
| 	filters, err := app.Filters(true, true) | ||||
| 	composeFiles, err := config.GetComposeFiles(app.Recipe, app.Env) | ||||
| 	if err != nil { | ||||
| 		logrus.Fatal(err) | ||||
| 		return | ||||
| 	} | ||||
|  | ||||
| 	containers, err := cl.ContainerList(context.Background(), types.ContainerListOptions{Filters: filters}) | ||||
| 	deployOpts := stack.Deploy{ | ||||
| 		Composefiles: composeFiles, | ||||
| 		Namespace:    app.StackName(), | ||||
| 		Prune:        false, | ||||
| 		ResolveImage: stack.ResolveImageAlways, | ||||
| 	} | ||||
| 	compose, err := config.GetAppComposeConfig(app.Name, deployOpts, app.Env) | ||||
| 	if err != nil { | ||||
| 		logrus.Fatal(err) | ||||
| 		return | ||||
| 	} | ||||
|  | ||||
| 	tableCol := []string{"service name", "image", "created", "status", "state", "ports"} | ||||
| 	table := formatter.CreateTable(tableCol) | ||||
| 	var tablerows [][]string | ||||
| 	allContainerStats := make(map[string]map[string]string) | ||||
| 	for _, service := range compose.Services { | ||||
| 		filters := filters.NewArgs() | ||||
| 		filters.Add("name", fmt.Sprintf("^%s_%s", app.StackName(), service.Name)) | ||||
|  | ||||
| 	for _, container := range containers { | ||||
| 		var containerNames []string | ||||
| 		for _, containerName := range container.Names { | ||||
| 			trimmed := strings.TrimPrefix(containerName, "/") | ||||
| 			containerNames = append(containerNames, trimmed) | ||||
| 		containers, err := cl.ContainerList(context.Background(), containerTypes.ListOptions{Filters: filters}) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 			return | ||||
| 		} | ||||
|  | ||||
| 		tableRow := []string{ | ||||
| 			service.ContainerToServiceName(container.Names, app.StackName()), | ||||
| 			formatter.RemoveSha(container.Image), | ||||
| 			formatter.HumanDuration(container.Created), | ||||
| 			container.Status, | ||||
| 			container.State, | ||||
| 			dockerFormatter.DisplayablePorts(container.Ports), | ||||
| 		var containerStats map[string]string | ||||
|  | ||||
| 		if len(containers) == 0 { | ||||
| 			containerStats = map[string]string{ | ||||
| 				"service name": service.Name, | ||||
| 				"image":        "unknown", | ||||
| 				"created":      "unknown", | ||||
| 				"status":       "unknown", | ||||
| 				"state":        "unknown", | ||||
| 				"ports":        "unknown", | ||||
| 			} | ||||
| 		} else { | ||||
| 			container := containers[0] | ||||
| 			containerStats = map[string]string{ | ||||
| 				"service name": abraService.ContainerToServiceName(container.Names, app.StackName()), | ||||
| 				"image":        formatter.RemoveSha(container.Image), | ||||
| 				"created":      formatter.HumanDuration(container.Created), | ||||
| 				"status":       container.Status, | ||||
| 				"state":        container.State, | ||||
| 				"ports":        dockerFormatter.DisplayablePorts(container.Ports), | ||||
| 			} | ||||
| 		} | ||||
| 		table.Append(tableRow) | ||||
| 		allContainerStats[containerStats["service name"]] = containerStats | ||||
|  | ||||
| 		var tablerow []string = []string{containerStats["service name"], containerStats["image"], containerStats["created"], containerStats["status"], containerStats["state"], containerStats["ports"]} | ||||
| 		tablerows = append(tablerows, tablerow) | ||||
| 	} | ||||
| 	if internal.MachineReadable { | ||||
| 		jsonstring, err := json.Marshal(allContainerStats) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} else { | ||||
| 			fmt.Println(string(jsonstring)) | ||||
| 		} | ||||
| 		return | ||||
| 	} else { | ||||
| 		tableCol := []string{"service name", "image", "created", "status", "state", "ports"} | ||||
| 		table := formatter.CreateTable(tableCol) | ||||
| 		for _, row := range tablerows { | ||||
| 			table.Append(row) | ||||
| 		} | ||||
| 		table.Render() | ||||
| 	} | ||||
|  | ||||
| 	table.Render() | ||||
| } | ||||
|  | ||||
| @ -3,6 +3,7 @@ package app | ||||
| import ( | ||||
| 	"context" | ||||
| 	"fmt" | ||||
| 	"log" | ||||
| 	"os" | ||||
|  | ||||
| 	"coopcloud.tech/abra/cli/internal" | ||||
| @ -42,6 +43,7 @@ flag. | ||||
| 		internal.ForceFlag, | ||||
| 		internal.DebugFlag, | ||||
| 		internal.NoInputFlag, | ||||
| 		internal.OfflineFlag, | ||||
| 	}, | ||||
| 	BashComplete: autocomplete.AppNameComplete, | ||||
| 	Before:       internal.SubCommandBefore, | ||||
| @ -108,26 +110,19 @@ flag. | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		volumeListOKBody, err := cl.VolumeList(context.Background(), fs) | ||||
| 		volumeList := volumeListOKBody.Volumes | ||||
| 		volumeList, err := client.GetVolumes(cl, context.Background(), app.Server, fs) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
| 		volumeNames := client.GetVolumeNames(volumeList) | ||||
|  | ||||
| 		var vols []string | ||||
| 		for _, vol := range volumeList { | ||||
| 			vols = append(vols, vol.Name) | ||||
| 		} | ||||
|  | ||||
| 		if len(vols) > 0 { | ||||
| 			var removeVols []string | ||||
| 			for _, vol := range removeVols { | ||||
| 				err := cl.VolumeRemove(context.Background(), vol, internal.Force) // last argument is for force removing | ||||
| 				if err != nil { | ||||
| 					logrus.Fatal(err) | ||||
| 				} | ||||
| 				logrus.Info(fmt.Sprintf("volume %s removed", vol)) | ||||
| 		if len(volumeNames) > 0 { | ||||
| 			err := client.RemoveVolumes(cl, context.Background(), volumeNames, internal.Force, 5) | ||||
| 			if err != nil { | ||||
| 				log.Fatalf("removing volumes failed: %s", err) | ||||
| 			} | ||||
|  | ||||
| 			logrus.Infof("%d volumes removed successfully", len(volumeNames)) | ||||
| 		} else { | ||||
| 			logrus.Info("no volumes to remove") | ||||
| 		} | ||||
|  | ||||
| @ -21,6 +21,7 @@ var appRestartCommand = cli.Command{ | ||||
| 	ArgsUsage: "<domain>", | ||||
| 	Flags: []cli.Flag{ | ||||
| 		internal.DebugFlag, | ||||
| 		internal.OfflineFlag, | ||||
| 	}, | ||||
| 	Before:       internal.SubCommandBefore, | ||||
| 	Description:  `This command restarts a service within a deployed app.`, | ||||
| @ -39,6 +40,15 @@ var appRestartCommand = cli.Command{ | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		isDeployed, _, err := stack.IsDeployed(context.Background(), cl, app.StackName()) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		if !isDeployed { | ||||
| 			logrus.Fatalf("%s is not deployed?", app.Name) | ||||
| 		} | ||||
|  | ||||
| 		serviceName := fmt.Sprintf("%s_%s", app.StackName(), serviceNameShort) | ||||
|  | ||||
| 		logrus.Debugf("attempting to scale %s to 0 (restart logic)", serviceName) | ||||
|  | ||||
| @ -1,203 +1,82 @@ | ||||
| package app | ||||
|  | ||||
| import ( | ||||
| 	"context" | ||||
| 	"errors" | ||||
| 	"fmt" | ||||
| 	"os" | ||||
|  | ||||
| 	"coopcloud.tech/abra/cli/internal" | ||||
| 	"coopcloud.tech/abra/pkg/autocomplete" | ||||
| 	"coopcloud.tech/abra/pkg/client" | ||||
| 	"coopcloud.tech/abra/pkg/config" | ||||
| 	containerPkg "coopcloud.tech/abra/pkg/container" | ||||
| 	"coopcloud.tech/abra/pkg/recipe" | ||||
| 	"coopcloud.tech/abra/pkg/upstream/container" | ||||
| 	"github.com/docker/cli/cli/command" | ||||
| 	"github.com/docker/docker/api/types" | ||||
| 	"github.com/docker/docker/api/types/filters" | ||||
| 	dockerClient "github.com/docker/docker/client" | ||||
| 	"github.com/docker/docker/pkg/archive" | ||||
| 	"github.com/sirupsen/logrus" | ||||
| 	"github.com/urfave/cli" | ||||
| ) | ||||
|  | ||||
| type restoreConfig struct { | ||||
| 	preHookCmd  string | ||||
| 	postHookCmd string | ||||
| var targetPath string | ||||
| var targetPathFlag = &cli.StringFlag{ | ||||
| 	Name:        "target, t", | ||||
| 	Usage:       "Target path", | ||||
| 	Destination: &targetPath, | ||||
| } | ||||
|  | ||||
| var appRestoreCommand = cli.Command{ | ||||
| 	Name:      "restore", | ||||
| 	Aliases:   []string{"rs"}, | ||||
| 	Usage:     "Run app restore", | ||||
| 	ArgsUsage: "<domain> <service> <file>", | ||||
| 	Usage:     "Restore an app backup", | ||||
| 	ArgsUsage: "<domain> <service>", | ||||
| 	Flags: []cli.Flag{ | ||||
| 		internal.DebugFlag, | ||||
| 		internal.OfflineFlag, | ||||
| 		targetPathFlag, | ||||
| 	}, | ||||
| 	Before:       internal.SubCommandBefore, | ||||
| 	BashComplete: autocomplete.AppNameComplete, | ||||
| 	Description: ` | ||||
| Run an app restore. | ||||
|  | ||||
| Pre/post hook commands are defined in the recipe configuration. Abra reads this | ||||
| configuration and run the comands in the context of the service before | ||||
| restoring the backup. | ||||
|  | ||||
| Unlike "abra app backup", restore must be run on a per-service basis. You can | ||||
| not restore all services in one go. Backup files produced by Abra are | ||||
| compressed archives which use absolute paths. This allows Abra to restore | ||||
| according to standard tar command logic. | ||||
|  | ||||
| Example: | ||||
|  | ||||
|     abra app restore example.com app ~/.abra/backups/example_com_app_609341138.tar.gz | ||||
| `, | ||||
| 	Action: func(c *cli.Context) error { | ||||
| 		app := internal.ValidateApp(c) | ||||
|  | ||||
| 		if err := recipe.EnsureExists(app.Recipe); err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		if !internal.Chaos { | ||||
| 			if err := recipe.EnsureIsClean(app.Recipe); err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
|  | ||||
| 			if !internal.Offline { | ||||
| 				if err := recipe.EnsureUpToDate(app.Recipe); err != nil { | ||||
| 					logrus.Fatal(err) | ||||
| 				} | ||||
| 			} | ||||
|  | ||||
| 			if err := recipe.EnsureLatest(app.Recipe); err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
| 		} | ||||
|  | ||||
| 		cl, err := client.New(app.Server) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		serviceName := c.Args().Get(1) | ||||
| 		if serviceName == "" { | ||||
| 			internal.ShowSubcommandHelpAndError(c, errors.New("missing <service>?")) | ||||
| 		} | ||||
|  | ||||
| 		backupPath := c.Args().Get(2) | ||||
| 		if backupPath == "" { | ||||
| 			internal.ShowSubcommandHelpAndError(c, errors.New("missing <file>?")) | ||||
| 		} | ||||
|  | ||||
| 		if _, err := os.Stat(backupPath); err != nil { | ||||
| 			if os.IsNotExist(err) { | ||||
| 				logrus.Fatalf("%s doesn't exist?", backupPath) | ||||
| 			} | ||||
| 		} | ||||
|  | ||||
| 		recipe, err := recipe.Get(app.Recipe) | ||||
| 		targetContainer, err := internal.RetrieveBackupBotContainer(cl) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		restoreConfigs := make(map[string]restoreConfig) | ||||
| 		for _, service := range recipe.Config.Services { | ||||
| 			if restoreEnabled, ok := service.Deploy.Labels["backupbot.restore"]; ok { | ||||
| 				if restoreEnabled == "true" { | ||||
| 					fullServiceName := fmt.Sprintf("%s_%s", app.StackName(), service.Name) | ||||
| 					rsConfig := restoreConfig{} | ||||
|  | ||||
| 					logrus.Debugf("restore config detected for %s", fullServiceName) | ||||
|  | ||||
| 					if preHookCmd, ok := service.Deploy.Labels["backupbot.restore.pre-hook"]; ok { | ||||
| 						logrus.Debugf("detected pre-hook command for %s: %s", fullServiceName, preHookCmd) | ||||
| 						rsConfig.preHookCmd = preHookCmd | ||||
| 					} | ||||
|  | ||||
| 					if postHookCmd, ok := service.Deploy.Labels["backupbot.restore.post-hook"]; ok { | ||||
| 						logrus.Debugf("detected post-hook command for %s: %s", fullServiceName, postHookCmd) | ||||
| 						rsConfig.postHookCmd = postHookCmd | ||||
| 					} | ||||
|  | ||||
| 					restoreConfigs[service.Name] = rsConfig | ||||
| 				} | ||||
| 			} | ||||
| 		execEnv := []string{fmt.Sprintf("SERVICE=%s", app.Domain)} | ||||
| 		if snapshot != "" { | ||||
| 			logrus.Debugf("including SNAPSHOT=%s in backupbot exec invocation", snapshot) | ||||
| 			execEnv = append(execEnv, fmt.Sprintf("SNAPSHOT=%s", snapshot)) | ||||
| 		} | ||||
| 		if targetPath != "" { | ||||
| 			logrus.Debugf("including TARGET=%s in backupbot exec invocation", targetPath) | ||||
| 			execEnv = append(execEnv, fmt.Sprintf("TARGET=%s", targetPath)) | ||||
| 		} | ||||
|  | ||||
| 		rsConfig, ok := restoreConfigs[serviceName] | ||||
| 		if !ok { | ||||
| 			rsConfig = restoreConfig{} | ||||
| 		} | ||||
|  | ||||
| 		if err := runRestore(cl, app, backupPath, serviceName, rsConfig); err != nil { | ||||
| 		if err := internal.RunBackupCmdRemote(cl, "restore", targetContainer.ID, execEnv); err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		return nil | ||||
| 	}, | ||||
| } | ||||
|  | ||||
| // runRestore does the actual restore logic. | ||||
| func runRestore(cl *dockerClient.Client, app config.App, backupPath, serviceName string, rsConfig restoreConfig) error { | ||||
| 	// FIXME: avoid instantiating a new CLI | ||||
| 	dcli, err := command.NewDockerCli() | ||||
| 	if err != nil { | ||||
| 		return err | ||||
| 	} | ||||
|  | ||||
| 	filters := filters.NewArgs() | ||||
| 	filters.Add("name", fmt.Sprintf("^%s_%s", app.StackName(), serviceName)) | ||||
|  | ||||
| 	targetContainer, err := containerPkg.GetContainer(context.Background(), cl, filters, true) | ||||
| 	if err != nil { | ||||
| 		return err | ||||
| 	} | ||||
|  | ||||
| 	fullServiceName := fmt.Sprintf("%s_%s", app.StackName(), serviceName) | ||||
| 	if rsConfig.preHookCmd != "" { | ||||
| 		splitCmd := internal.SafeSplit(rsConfig.preHookCmd) | ||||
|  | ||||
| 		logrus.Debugf("split pre-hook command for %s into %s", fullServiceName, splitCmd) | ||||
|  | ||||
| 		preHookExecOpts := types.ExecConfig{ | ||||
| 			AttachStderr: true, | ||||
| 			AttachStdin:  true, | ||||
| 			AttachStdout: true, | ||||
| 			Cmd:          splitCmd, | ||||
| 			Detach:       false, | ||||
| 			Tty:          true, | ||||
| 		} | ||||
|  | ||||
| 		if err := container.RunExec(dcli, cl, targetContainer.ID, &preHookExecOpts); err != nil { | ||||
| 			return err | ||||
| 		} | ||||
|  | ||||
| 		logrus.Infof("succesfully ran %s pre-hook command: %s", fullServiceName, rsConfig.preHookCmd) | ||||
| 	} | ||||
|  | ||||
| 	backupReader, err := os.Open(backupPath) | ||||
| 	if err != nil { | ||||
| 		return err | ||||
| 	} | ||||
|  | ||||
| 	content, err := archive.DecompressStream(backupReader) | ||||
| 	if err != nil { | ||||
| 		return err | ||||
| 	} | ||||
|  | ||||
| 	// we use absolute paths so tar knows what to do. it will restore files | ||||
| 	// according to the paths set in the compresed archive | ||||
| 	restorePath := "/" | ||||
|  | ||||
| 	copyOpts := types.CopyToContainerOptions{AllowOverwriteDirWithFile: false, CopyUIDGID: false} | ||||
| 	if err := cl.CopyToContainer(context.Background(), targetContainer.ID, restorePath, content, copyOpts); err != nil { | ||||
| 		return err | ||||
| 	} | ||||
|  | ||||
| 	logrus.Infof("restored %s to %s", backupPath, fullServiceName) | ||||
|  | ||||
| 	if rsConfig.postHookCmd != "" { | ||||
| 		splitCmd := internal.SafeSplit(rsConfig.postHookCmd) | ||||
|  | ||||
| 		logrus.Debugf("split post-hook command for %s into %s", fullServiceName, splitCmd) | ||||
|  | ||||
| 		postHookExecOpts := types.ExecConfig{ | ||||
| 			AttachStderr: true, | ||||
| 			AttachStdin:  true, | ||||
| 			AttachStdout: true, | ||||
| 			Cmd:          splitCmd, | ||||
| 			Detach:       false, | ||||
| 			Tty:          true, | ||||
| 		} | ||||
|  | ||||
| 		if err := container.RunExec(dcli, cl, targetContainer.ID, &postHookExecOpts); err != nil { | ||||
| 			return err | ||||
| 		} | ||||
|  | ||||
| 		logrus.Infof("succesfully ran %s post-hook command: %s", fullServiceName, rsConfig.postHookCmd) | ||||
| 	} | ||||
|  | ||||
| 	return nil | ||||
| } | ||||
|  | ||||
| @ -22,7 +22,7 @@ var appRollbackCommand = cli.Command{ | ||||
| 	Name:      "rollback", | ||||
| 	Aliases:   []string{"rl"}, | ||||
| 	Usage:     "Roll an app back to a previous version", | ||||
| 	ArgsUsage: "<domain>", | ||||
| 	ArgsUsage: "<domain> [<version>]", | ||||
| 	Flags: []cli.Flag{ | ||||
| 		internal.DebugFlag, | ||||
| 		internal.NoInputFlag, | ||||
| @ -30,6 +30,7 @@ var appRollbackCommand = cli.Command{ | ||||
| 		internal.ChaosFlag, | ||||
| 		internal.NoDomainChecksFlag, | ||||
| 		internal.DontWaitConvergeFlag, | ||||
| 		internal.OfflineFlag, | ||||
| 	}, | ||||
| 	Before: internal.SubCommandBefore, | ||||
| 	Description: ` | ||||
| @ -41,7 +42,7 @@ useful if the container runtime has gotten into a weird state. | ||||
| This action could be destructive, please ensure you have a copy of your app | ||||
| data beforehand. | ||||
|  | ||||
| Chas mode ("--chaos") will deploy your local checkout of a recipe as-is, | ||||
| Chaos mode ("--chaos") will deploy your local checkout of a recipe as-is, | ||||
| including unstaged changes and can be useful for live hacking and testing new | ||||
| recipes. | ||||
| `, | ||||
| @ -50,13 +51,32 @@ recipes. | ||||
| 		app := internal.ValidateApp(c) | ||||
| 		stackName := app.StackName() | ||||
|  | ||||
| 		specificVersion := c.Args().Get(1) | ||||
| 		if specificVersion != "" && internal.Chaos { | ||||
| 			logrus.Fatal("cannot use <version> and --chaos together") | ||||
| 		} | ||||
|  | ||||
| 		if err := recipe.EnsureExists(app.Recipe); err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		if !internal.Chaos { | ||||
| 			if err := recipe.EnsureUpToDate(app.Recipe); err != nil { | ||||
| 			if err := recipe.EnsureIsClean(app.Recipe); err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
|  | ||||
| 			if !internal.Offline { | ||||
| 				if err := recipe.EnsureUpToDate(app.Recipe); err != nil { | ||||
| 					logrus.Fatal(err) | ||||
| 				} | ||||
| 			} | ||||
|  | ||||
| 			if err := recipe.EnsureLatest(app.Recipe); err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
| 		} | ||||
|  | ||||
| 		r, err := recipe.Get(app.Recipe) | ||||
| 		r, err := recipe.Get(app.Recipe, internal.Offline) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
| @ -81,7 +101,7 @@ recipes. | ||||
| 			logrus.Fatalf("%s is not deployed?", app.Name) | ||||
| 		} | ||||
|  | ||||
| 		catl, err := recipe.ReadRecipeCatalogue() | ||||
| 		catl, err := recipe.ReadRecipeCatalogue(internal.Offline) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
| @ -92,16 +112,40 @@ recipes. | ||||
| 		} | ||||
|  | ||||
| 		if len(versions) == 0 && !internal.Chaos { | ||||
| 			logrus.Fatalf("no published releases for %s in the recipe catalogue?", app.Recipe) | ||||
| 			logrus.Warn("no published versions in catalogue, trying local recipe repository") | ||||
| 			recipeVersions, err := recipe.GetRecipeVersions(app.Recipe, internal.Offline) | ||||
| 			if err != nil { | ||||
| 				logrus.Warn(err) | ||||
| 			} | ||||
| 			for _, recipeVersion := range recipeVersions { | ||||
| 				for version := range recipeVersion { | ||||
| 					versions = append(versions, version) | ||||
| 				} | ||||
| 			} | ||||
| 		} | ||||
|  | ||||
| 		var availableDowngrades []string | ||||
| 		if deployedVersion == "unknown" { | ||||
| 			availableDowngrades = versions | ||||
| 			logrus.Warnf("failed to determine version of deployed %s", app.Name) | ||||
| 			logrus.Warnf("failed to determine deployed version of %s", app.Name) | ||||
| 		} | ||||
|  | ||||
| 		if deployedVersion != "unknown" && !internal.Chaos { | ||||
| 		if specificVersion != "" { | ||||
| 			parsedDeployedVersion, err := tagcmp.Parse(deployedVersion) | ||||
| 			if err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
| 			parsedSpecificVersion, err := tagcmp.Parse(specificVersion) | ||||
| 			if err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
| 			if parsedSpecificVersion.IsGreaterThan(parsedDeployedVersion) || parsedSpecificVersion.Equals(parsedDeployedVersion) { | ||||
| 				logrus.Fatalf("%s is not a downgrade for %s?", deployedVersion, specificVersion) | ||||
| 			} | ||||
| 			availableDowngrades = append(availableDowngrades, specificVersion) | ||||
| 		} | ||||
|  | ||||
| 		if deployedVersion != "unknown" && !internal.Chaos && specificVersion == "" { | ||||
| 			for _, version := range versions { | ||||
| 				parsedDeployedVersion, err := tagcmp.Parse(deployedVersion) | ||||
| 				if err != nil { | ||||
| @ -111,28 +155,26 @@ recipes. | ||||
| 				if err != nil { | ||||
| 					logrus.Fatal(err) | ||||
| 				} | ||||
| 				if parsedVersion != parsedDeployedVersion && parsedVersion.IsLessThan(parsedDeployedVersion) { | ||||
| 				if parsedVersion.IsLessThan(parsedDeployedVersion) && !(parsedVersion.Equals(parsedDeployedVersion)) { | ||||
| 					availableDowngrades = append(availableDowngrades, version) | ||||
| 				} | ||||
| 			} | ||||
|  | ||||
| 			if len(availableDowngrades) == 0 { | ||||
| 			if len(availableDowngrades) == 0 && !internal.Force { | ||||
| 				logrus.Info("no available downgrades, you're on oldest ✌️") | ||||
| 				return nil | ||||
| 			} | ||||
| 		} | ||||
|  | ||||
| 		availableDowngrades = internal.ReverseStringList(availableDowngrades) | ||||
|  | ||||
| 		var chosenDowngrade string | ||||
| 		if !internal.Chaos { | ||||
| 			if internal.Force || internal.NoInput { | ||||
| 				chosenDowngrade = availableDowngrades[0] | ||||
| 				logrus.Debugf("choosing %s as version to downgrade to (--force)", chosenDowngrade) | ||||
| 		if len(availableDowngrades) > 0 && !internal.Chaos { | ||||
| 			if internal.Force || internal.NoInput || specificVersion != "" { | ||||
| 				chosenDowngrade = availableDowngrades[len(availableDowngrades)-1] | ||||
| 				logrus.Debugf("choosing %s as version to downgrade to (--force/--no-input)", chosenDowngrade) | ||||
| 			} else { | ||||
| 				prompt := &survey.Select{ | ||||
| 					Message: fmt.Sprintf("Please select a downgrade (current version: %s):", deployedVersion), | ||||
| 					Options: availableDowngrades, | ||||
| 					Options: internal.ReverseStringList(availableDowngrades), | ||||
| 				} | ||||
| 				if err := survey.AskOne(prompt, &chosenDowngrade); err != nil { | ||||
| 					return err | ||||
| @ -164,7 +206,7 @@ recipes. | ||||
| 			app.Env[k] = v | ||||
| 		} | ||||
|  | ||||
| 		composeFiles, err := config.GetAppComposeFiles(app.Recipe, app.Env) | ||||
| 		composeFiles, err := config.GetComposeFiles(app.Recipe, app.Env) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
| @ -181,15 +223,15 @@ recipes. | ||||
| 		config.ExposeAllEnv(stackName, compose, app.Env) | ||||
| 		config.SetRecipeLabel(compose, stackName, app.Recipe) | ||||
| 		config.SetChaosLabel(compose, stackName, internal.Chaos) | ||||
| 		config.SetChaosVersionLabel(compose, stackName, chosenDowngrade) | ||||
| 		config.SetUpdateLabel(compose, stackName, app.Env) | ||||
|  | ||||
| 		if !internal.Force { | ||||
| 			if err := internal.NewVersionOverview(app, deployedVersion, chosenDowngrade, ""); err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
| 		// NOTE(d1): no release notes implemeneted for rolling back | ||||
| 		if err := internal.NewVersionOverview(app, deployedVersion, chosenDowngrade, ""); err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		if err := stack.RunDeploy(cl, deployOpts, compose, app.StackName(), internal.DontWaitConverge); err != nil { | ||||
| 		if err := stack.RunDeploy(cl, deployOpts, compose, stackName, internal.DontWaitConverge); err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
|  | ||||
| @ -91,7 +91,7 @@ var appRunCommand = cli.Command{ | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		if err := container.RunExec(dcli, cl, targetContainer.ID, &execCreateOpts); err != nil { | ||||
| 		if _, err := container.RunExec(dcli, cl, targetContainer.ID, &execCreateOpts); err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
|  | ||||
| @ -12,6 +12,7 @@ import ( | ||||
| 	"coopcloud.tech/abra/pkg/client" | ||||
| 	"coopcloud.tech/abra/pkg/config" | ||||
| 	"coopcloud.tech/abra/pkg/formatter" | ||||
| 	"coopcloud.tech/abra/pkg/recipe" | ||||
| 	"coopcloud.tech/abra/pkg/secret" | ||||
| 	"github.com/docker/docker/api/types" | ||||
| 	dockerClient "github.com/docker/docker/client" | ||||
| @ -19,19 +20,23 @@ import ( | ||||
| 	"github.com/urfave/cli" | ||||
| ) | ||||
|  | ||||
| var allSecrets bool | ||||
| var allSecretsFlag = &cli.BoolFlag{ | ||||
| 	Name:        "all, a", | ||||
| 	Destination: &allSecrets, | ||||
| 	Usage:       "Generate all secrets", | ||||
| } | ||||
| var ( | ||||
| 	allSecrets     bool | ||||
| 	allSecretsFlag = &cli.BoolFlag{ | ||||
| 		Name:        "all, a", | ||||
| 		Destination: &allSecrets, | ||||
| 		Usage:       "Generate all secrets", | ||||
| 	} | ||||
| ) | ||||
|  | ||||
| var rmAllSecrets bool | ||||
| var rmAllSecretsFlag = &cli.BoolFlag{ | ||||
| 	Name:        "all, a", | ||||
| 	Destination: &rmAllSecrets, | ||||
| 	Usage:       "Remove all secrets", | ||||
| } | ||||
| var ( | ||||
| 	rmAllSecrets     bool | ||||
| 	rmAllSecretsFlag = &cli.BoolFlag{ | ||||
| 		Name:        "all, a", | ||||
| 		Destination: &rmAllSecrets, | ||||
| 		Usage:       "Remove all secrets", | ||||
| 	} | ||||
| ) | ||||
|  | ||||
| var appSecretGenerateCommand = cli.Command{ | ||||
| 	Name:      "generate", | ||||
| @ -42,17 +47,35 @@ var appSecretGenerateCommand = cli.Command{ | ||||
| 		internal.DebugFlag, | ||||
| 		allSecretsFlag, | ||||
| 		internal.PassFlag, | ||||
| 		internal.MachineReadableFlag, | ||||
| 		internal.OfflineFlag, | ||||
| 		internal.ChaosFlag, | ||||
| 	}, | ||||
| 	Before:       internal.SubCommandBefore, | ||||
| 	BashComplete: autocomplete.AppNameComplete, | ||||
| 	Action: func(c *cli.Context) error { | ||||
| 		app := internal.ValidateApp(c) | ||||
|  | ||||
| 		cl, err := client.New(app.Server) | ||||
| 		if err != nil { | ||||
| 		if err := recipe.EnsureExists(app.Recipe); err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		if !internal.Chaos { | ||||
| 			if err := recipe.EnsureIsClean(app.Recipe); err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
|  | ||||
| 			if !internal.Offline { | ||||
| 				if err := recipe.EnsureUpToDate(app.Recipe); err != nil { | ||||
| 					logrus.Fatal(err) | ||||
| 				} | ||||
| 			} | ||||
|  | ||||
| 			if err := recipe.EnsureLatest(app.Recipe); err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
| 		} | ||||
|  | ||||
| 		if len(c.Args()) == 1 && !allSecrets { | ||||
| 			err := errors.New("missing arguments <secret>/<version> or '--all'") | ||||
| 			internal.ShowSubcommandHelpAndError(c, err) | ||||
| @ -63,28 +86,35 @@ var appSecretGenerateCommand = cli.Command{ | ||||
| 			internal.ShowSubcommandHelpAndError(c, err) | ||||
| 		} | ||||
|  | ||||
| 		secretsToCreate := make(map[string]string) | ||||
| 		secretEnvVars := secret.ReadSecretEnvVars(app.Env) | ||||
| 		if allSecrets { | ||||
| 			secretsToCreate = secretEnvVars | ||||
| 		} else { | ||||
| 		composeFiles, err := config.GetComposeFiles(app.Recipe, app.Env) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		secrets, err := secret.ReadSecretsConfig(app.Path, composeFiles, app.StackName()) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		if !allSecrets { | ||||
| 			secretName := c.Args().Get(1) | ||||
| 			secretVersion := c.Args().Get(2) | ||||
| 			matches := false | ||||
| 			for sec := range secretEnvVars { | ||||
| 				parsed := secret.ParseSecretEnvVarName(sec) | ||||
| 				if secretName == parsed { | ||||
| 					secretsToCreate[sec] = secretVersion | ||||
| 					matches = true | ||||
| 				} | ||||
| 			} | ||||
|  | ||||
| 			if !matches { | ||||
| 			s, ok := secrets[secretName] | ||||
| 			if !ok { | ||||
| 				logrus.Fatalf("%s doesn't exist in the env config?", secretName) | ||||
| 			} | ||||
| 			s.Version = secretVersion | ||||
| 			secrets = map[string]secret.Secret{ | ||||
| 				secretName: s, | ||||
| 			} | ||||
| 		} | ||||
|  | ||||
| 		secretVals, err := secret.GenerateSecrets(cl, secretsToCreate, app.StackName(), app.Server) | ||||
| 		cl, err := client.New(app.Server) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		secretVals, err := secret.GenerateSecrets(cl, secrets, app.Server) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
| @ -107,8 +137,13 @@ var appSecretGenerateCommand = cli.Command{ | ||||
| 		for name, val := range secretVals { | ||||
| 			table.Append([]string{name, val}) | ||||
| 		} | ||||
| 		table.Render() | ||||
| 		logrus.Warn("generated secrets are not shown again, please take note of them *now*") | ||||
|  | ||||
| 		if internal.MachineReadable { | ||||
| 			table.JSONRender() | ||||
| 		} else { | ||||
| 			table.Render() | ||||
| 		} | ||||
| 		logrus.Warn("generated secrets are not shown again, please take note of them NOW") | ||||
|  | ||||
| 		return nil | ||||
| 	}, | ||||
| @ -140,15 +175,15 @@ Example: | ||||
| 	Action: func(c *cli.Context) error { | ||||
| 		app := internal.ValidateApp(c) | ||||
|  | ||||
| 		if len(c.Args()) != 4 { | ||||
| 			internal.ShowSubcommandHelpAndError(c, errors.New("missing arguments?")) | ||||
| 		} | ||||
|  | ||||
| 		cl, err := client.New(app.Server) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		if len(c.Args()) != 4 { | ||||
| 			internal.ShowSubcommandHelpAndError(c, errors.New("missing arguments?")) | ||||
| 		} | ||||
|  | ||||
| 		name := c.Args().Get(1) | ||||
| 		version := c.Args().Get(2) | ||||
| 		data := c.Args().Get(3) | ||||
| @ -198,6 +233,8 @@ var appSecretRmCommand = cli.Command{ | ||||
| 		internal.NoInputFlag, | ||||
| 		rmAllSecretsFlag, | ||||
| 		internal.PassRemoveFlag, | ||||
| 		internal.OfflineFlag, | ||||
| 		internal.ChaosFlag, | ||||
| 	}, | ||||
| 	Before:       internal.SubCommandBefore, | ||||
| 	ArgsUsage:    "<domain> [<secret-name>]", | ||||
| @ -211,7 +248,36 @@ Example: | ||||
| `, | ||||
| 	Action: func(c *cli.Context) error { | ||||
| 		app := internal.ValidateApp(c) | ||||
| 		secrets := secret.ReadSecretEnvVars(app.Env) | ||||
|  | ||||
| 		if err := recipe.EnsureExists(app.Recipe); err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		if !internal.Chaos { | ||||
| 			if err := recipe.EnsureIsClean(app.Recipe); err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
|  | ||||
| 			if !internal.Offline { | ||||
| 				if err := recipe.EnsureUpToDate(app.Recipe); err != nil { | ||||
| 					logrus.Fatal(err) | ||||
| 				} | ||||
| 			} | ||||
|  | ||||
| 			if err := recipe.EnsureLatest(app.Recipe); err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
| 		} | ||||
|  | ||||
| 		composeFiles, err := config.GetComposeFiles(app.Recipe, app.Env) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		secrets, err := secret.ReadSecretsConfig(app.Path, composeFiles, app.StackName()) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		if c.Args().Get(1) != "" && rmAllSecrets { | ||||
| 			internal.ShowSubcommandHelpAndError(c, errors.New("cannot use '<secret-name>' and '--all' together")) | ||||
| @ -243,15 +309,8 @@ Example: | ||||
|  | ||||
| 		match := false | ||||
| 		secretToRm := c.Args().Get(1) | ||||
| 		for sec := range secrets { | ||||
| 			secretName := secret.ParseSecretEnvVarName(sec) | ||||
|  | ||||
| 			secVal, err := secret.ParseSecretEnvVarValue(secrets[sec]) | ||||
| 			if err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
|  | ||||
| 			secretRemoteName := fmt.Sprintf("%s_%s_%s", app.StackName(), secretName, secVal.Version) | ||||
| 		for secretName, val := range secrets { | ||||
| 			secretRemoteName := fmt.Sprintf("%s_%s_%s", app.StackName(), secretName, val.Version) | ||||
| 			if _, ok := remoteSecretNames[secretRemoteName]; ok { | ||||
| 				if secretToRm != "" { | ||||
| 					if secretName == secretToRm { | ||||
| @ -288,60 +347,71 @@ var appSecretLsCommand = cli.Command{ | ||||
| 	Aliases: []string{"ls"}, | ||||
| 	Flags: []cli.Flag{ | ||||
| 		internal.DebugFlag, | ||||
| 		internal.OfflineFlag, | ||||
| 		internal.ChaosFlag, | ||||
| 		internal.MachineReadableFlag, | ||||
| 	}, | ||||
| 	Before: internal.SubCommandBefore, | ||||
| 	Usage:  "List all secrets", | ||||
| 	Before:       internal.SubCommandBefore, | ||||
| 	Usage:        "List all secrets", | ||||
| 	BashComplete: autocomplete.AppNameComplete, | ||||
| 	Action: func(c *cli.Context) error { | ||||
| 		app := internal.ValidateApp(c) | ||||
| 		secrets := secret.ReadSecretEnvVars(app.Env) | ||||
|  | ||||
| 		tableCol := []string{"Name", "Version", "Generated Name", "Created On Server"} | ||||
| 		table := formatter.CreateTable(tableCol) | ||||
| 		if err := recipe.EnsureExists(app.Recipe); err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		if !internal.Chaos { | ||||
| 			if err := recipe.EnsureIsClean(app.Recipe); err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
|  | ||||
| 			if !internal.Offline { | ||||
| 				if err := recipe.EnsureUpToDate(app.Recipe); err != nil { | ||||
| 					logrus.Fatal(err) | ||||
| 				} | ||||
| 			} | ||||
|  | ||||
| 			if err := recipe.EnsureLatest(app.Recipe); err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
| 		} | ||||
|  | ||||
| 		cl, err := client.New(app.Server) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		filters, err := app.Filters(false, false) | ||||
| 		tableCol := []string{"Name", "Version", "Generated Name", "Created On Server"} | ||||
| 		table := formatter.CreateTable(tableCol) | ||||
|  | ||||
| 		secStats, err := secret.PollSecretsStatus(cl, app) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		secretList, err := cl.SecretList(context.Background(), types.SecretListOptions{Filters: filters}) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		remoteSecretNames := make(map[string]bool) | ||||
| 		for _, cont := range secretList { | ||||
| 			remoteSecretNames[cont.Spec.Annotations.Name] = true | ||||
| 		} | ||||
|  | ||||
| 		for sec := range secrets { | ||||
| 			createdRemote := false | ||||
| 			secretName := secret.ParseSecretEnvVarName(sec) | ||||
| 			secVal, err := secret.ParseSecretEnvVarValue(secrets[sec]) | ||||
| 			if err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 		for _, secStat := range secStats { | ||||
| 			tableRow := []string{ | ||||
| 				secStat.LocalName, | ||||
| 				secStat.Version, | ||||
| 				secStat.RemoteName, | ||||
| 				strconv.FormatBool(secStat.CreatedOnRemote), | ||||
| 			} | ||||
| 			secretRemoteName := fmt.Sprintf("%s_%s_%s", app.StackName(), secretName, secVal.Version) | ||||
| 			if _, ok := remoteSecretNames[secretRemoteName]; ok { | ||||
| 				createdRemote = true | ||||
| 			} | ||||
| 			tableRow := []string{secretName, secVal.Version, secretRemoteName, strconv.FormatBool(createdRemote)} | ||||
| 			table.Append(tableRow) | ||||
| 		} | ||||
|  | ||||
| 		if table.NumLines() > 0 { | ||||
| 			table.Render() | ||||
| 			if internal.MachineReadable { | ||||
| 				table.JSONRender() | ||||
| 			} else { | ||||
| 				table.Render() | ||||
| 			} | ||||
| 		} else { | ||||
| 			logrus.Warnf("no secrets stored for %s", app.Name) | ||||
| 		} | ||||
|  | ||||
| 		return nil | ||||
| 	}, | ||||
| 	BashComplete: autocomplete.AppNameComplete, | ||||
| } | ||||
|  | ||||
| var appSecretCommand = cli.Command{ | ||||
|  | ||||
| @ -11,7 +11,7 @@ import ( | ||||
| 	"coopcloud.tech/abra/pkg/formatter" | ||||
| 	"coopcloud.tech/abra/pkg/service" | ||||
| 	stack "coopcloud.tech/abra/pkg/upstream/stack" | ||||
| 	"github.com/docker/docker/api/types" | ||||
| 	containerTypes "github.com/docker/docker/api/types/container" | ||||
| 	"github.com/sirupsen/logrus" | ||||
| 	"github.com/urfave/cli" | ||||
| ) | ||||
| @ -48,7 +48,7 @@ var appServicesCommand = cli.Command{ | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		containers, err := cl.ContainerList(context.Background(), types.ContainerListOptions{Filters: filters}) | ||||
| 		containers, err := cl.ContainerList(context.Background(), containerTypes.ListOptions{Filters: filters}) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| @ -2,15 +2,82 @@ package app | ||||
|  | ||||
| import ( | ||||
| 	"context" | ||||
| 	"fmt" | ||||
| 	"time" | ||||
|  | ||||
| 	"coopcloud.tech/abra/cli/internal" | ||||
| 	"coopcloud.tech/abra/pkg/autocomplete" | ||||
| 	"coopcloud.tech/abra/pkg/client" | ||||
| 	"coopcloud.tech/abra/pkg/config" | ||||
| 	"coopcloud.tech/abra/pkg/formatter" | ||||
| 	stack "coopcloud.tech/abra/pkg/upstream/stack" | ||||
| 	"github.com/docker/docker/api/types/filters" | ||||
| 	dockerClient "github.com/docker/docker/client" | ||||
| 	"github.com/sirupsen/logrus" | ||||
| 	"github.com/urfave/cli" | ||||
| ) | ||||
|  | ||||
| var prune bool | ||||
|  | ||||
| var pruneFlag = &cli.BoolFlag{ | ||||
| 	Name:        "prune, p", | ||||
| 	Destination: &prune, | ||||
| 	Usage:       "Prunes unused containers, networks, and dangling images for an app", | ||||
| } | ||||
|  | ||||
| // pruneApp runs the equivalent of a "docker system prune" but only filtering | ||||
| // against resources connected with the app deployment. It is not a system wide | ||||
| // prune. Volumes are not pruned to avoid unwated data loss. | ||||
| func pruneApp(c *cli.Context, cl *dockerClient.Client, app config.App) error { | ||||
| 	stackName := app.StackName() | ||||
| 	ctx := context.Background() | ||||
|  | ||||
| 	for { | ||||
| 		logrus.Debugf("polling for %s stack, waiting to be undeployed...", stackName) | ||||
|  | ||||
| 		services, err := stack.GetStackServices(ctx, cl, stackName) | ||||
| 		if err != nil { | ||||
| 			return err | ||||
| 		} | ||||
|  | ||||
| 		if len(services) == 0 { | ||||
| 			logrus.Debugf("%s undeployed, moving on with pruning logic", stackName) | ||||
| 			time.Sleep(time.Second) // give runtime more time to tear down related state | ||||
| 			break | ||||
| 		} | ||||
|  | ||||
| 		time.Sleep(time.Second) | ||||
| 	} | ||||
|  | ||||
| 	pruneFilters := filters.NewArgs() | ||||
| 	stackSearch := fmt.Sprintf("%s*", stackName) | ||||
| 	pruneFilters.Add("label", stackSearch) | ||||
| 	cr, err := cl.ContainersPrune(ctx, pruneFilters) | ||||
| 	if err != nil { | ||||
| 		return err | ||||
| 	} | ||||
|  | ||||
| 	cntSpaceReclaimed := formatter.ByteCountSI(cr.SpaceReclaimed) | ||||
| 	logrus.Infof("containers pruned: %d; space reclaimed: %s", len(cr.ContainersDeleted), cntSpaceReclaimed) | ||||
|  | ||||
| 	nr, err := cl.NetworksPrune(ctx, pruneFilters) | ||||
| 	if err != nil { | ||||
| 		return err | ||||
| 	} | ||||
|  | ||||
| 	logrus.Infof("networks pruned: %d", len(nr.NetworksDeleted)) | ||||
|  | ||||
| 	ir, err := cl.ImagesPrune(ctx, pruneFilters) | ||||
| 	if err != nil { | ||||
| 		return err | ||||
| 	} | ||||
|  | ||||
| 	imgSpaceReclaimed := formatter.ByteCountSI(ir.SpaceReclaimed) | ||||
| 	logrus.Infof("images pruned: %d; space reclaimed: %s", len(ir.ImagesDeleted), imgSpaceReclaimed) | ||||
|  | ||||
| 	return nil | ||||
| } | ||||
|  | ||||
| var appUndeployCommand = cli.Command{ | ||||
| 	Name:      "undeploy", | ||||
| 	Aliases:   []string{"un"}, | ||||
| @ -18,13 +85,18 @@ var appUndeployCommand = cli.Command{ | ||||
| 	Flags: []cli.Flag{ | ||||
| 		internal.DebugFlag, | ||||
| 		internal.NoInputFlag, | ||||
| 		pruneFlag, | ||||
| 	}, | ||||
| 	Before: internal.SubCommandBefore, | ||||
| 	Usage:  "Undeploy an app", | ||||
| 	Before:       internal.SubCommandBefore, | ||||
| 	Usage:        "Undeploy an app", | ||||
| 	BashComplete: autocomplete.AppNameComplete, | ||||
| 	Description: ` | ||||
| This does not destroy any of the application data. However, you should remain | ||||
| vigilant, as your swarm installation will consider any previously attached | ||||
| volumes as eligiblef or pruning once undeployed. | ||||
| This does not destroy any of the application data. | ||||
|  | ||||
| However, you should remain vigilant, as your swarm installation will consider | ||||
| any previously attached volumes as eligible for pruning once undeployed. | ||||
|  | ||||
| Passing "-p/--prune" does not remove those volumes. | ||||
| `, | ||||
| 	Action: func(c *cli.Context) error { | ||||
| 		app := internal.ValidateApp(c) | ||||
| @ -55,7 +127,12 @@ volumes as eligiblef or pruning once undeployed. | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		if prune { | ||||
| 			if err := pruneApp(c, cl, app); err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
| 		} | ||||
|  | ||||
| 		return nil | ||||
| 	}, | ||||
| 	BashComplete: autocomplete.AppNameComplete, | ||||
| } | ||||
|  | ||||
| @ -10,6 +10,7 @@ import ( | ||||
| 	"coopcloud.tech/abra/pkg/config" | ||||
| 	"coopcloud.tech/abra/pkg/lint" | ||||
| 	"coopcloud.tech/abra/pkg/recipe" | ||||
| 	recipePkg "coopcloud.tech/abra/pkg/recipe" | ||||
| 	stack "coopcloud.tech/abra/pkg/upstream/stack" | ||||
| 	"coopcloud.tech/tagcmp" | ||||
| 	"github.com/AlecAivazis/survey/v2" | ||||
| @ -21,7 +22,7 @@ var appUpgradeCommand = cli.Command{ | ||||
| 	Name:      "upgrade", | ||||
| 	Aliases:   []string{"up"}, | ||||
| 	Usage:     "Upgrade an app", | ||||
| 	ArgsUsage: "<domain>", | ||||
| 	ArgsUsage: "<domain> [<version>]", | ||||
| 	Flags: []cli.Flag{ | ||||
| 		internal.DebugFlag, | ||||
| 		internal.NoInputFlag, | ||||
| @ -29,6 +30,8 @@ var appUpgradeCommand = cli.Command{ | ||||
| 		internal.ChaosFlag, | ||||
| 		internal.NoDomainChecksFlag, | ||||
| 		internal.DontWaitConvergeFlag, | ||||
| 		internal.OfflineFlag, | ||||
| 		internal.ReleaseNotesFlag, | ||||
| 	}, | ||||
| 	Before: internal.SubCommandBefore, | ||||
| 	Description: ` | ||||
| @ -45,36 +48,52 @@ useful if the container runtime has gotten into a weird state. | ||||
| This action could be destructive, please ensure you have a copy of your app | ||||
| data beforehand. | ||||
|  | ||||
| Chas mode ("--chaos") will deploy your local checkout of a recipe as-is, | ||||
| Chaos mode ("--chaos") will deploy your local checkout of a recipe as-is, | ||||
| including unstaged changes and can be useful for live hacking and testing new | ||||
| recipes. | ||||
| `, | ||||
| 	BashComplete: autocomplete.AppNameComplete, | ||||
| 	Action: func(c *cli.Context) error { | ||||
| 		app := internal.ValidateApp(c) | ||||
| 		stackName := app.StackName() | ||||
|  | ||||
| 		specificVersion := c.Args().Get(1) | ||||
| 		if specificVersion != "" && internal.Chaos { | ||||
| 			logrus.Fatal("cannot use <version> and --chaos together") | ||||
| 		} | ||||
|  | ||||
| 		if !internal.Chaos { | ||||
| 			if err := recipe.EnsureIsClean(app.Recipe); err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
|  | ||||
| 			if !internal.Offline { | ||||
| 				if err := recipe.EnsureUpToDate(app.Recipe); err != nil { | ||||
| 					logrus.Fatal(err) | ||||
| 				} | ||||
| 			} | ||||
|  | ||||
| 			if err := recipe.EnsureLatest(app.Recipe); err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
| 		} | ||||
|  | ||||
| 		recipe, err := recipePkg.Get(app.Recipe, internal.Offline) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		if err := lint.LintForErrors(recipe); err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		logrus.Debugf("checking whether %s is already deployed", stackName) | ||||
|  | ||||
| 		cl, err := client.New(app.Server) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		if !internal.Chaos { | ||||
| 			if err := recipe.EnsureUpToDate(app.Recipe); err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
| 		} | ||||
|  | ||||
| 		r, err := recipe.Get(app.Recipe) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		if err := lint.LintForErrors(r); err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		logrus.Debugf("checking whether %s is already deployed", stackName) | ||||
|  | ||||
| 		isDeployed, deployedVersion, err := stack.IsDeployed(context.Background(), cl, stackName) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| @ -84,37 +103,62 @@ recipes. | ||||
| 			logrus.Fatalf("%s is not deployed?", app.Name) | ||||
| 		} | ||||
|  | ||||
| 		catl, err := recipe.ReadRecipeCatalogue() | ||||
| 		catl, err := recipePkg.ReadRecipeCatalogue(internal.Offline) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		versions, err := recipe.GetRecipeCatalogueVersions(app.Recipe, catl) | ||||
| 		versions, err := recipePkg.GetRecipeCatalogueVersions(app.Recipe, catl) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		if len(versions) == 0 && !internal.Chaos { | ||||
| 			logrus.Fatalf("no published releases for %s in the recipe catalogue?", app.Recipe) | ||||
| 			logrus.Warn("no published versions in catalogue, trying local recipe repository") | ||||
| 			recipeVersions, err := recipePkg.GetRecipeVersions(app.Recipe, internal.Offline) | ||||
| 			if err != nil { | ||||
| 				logrus.Warn(err) | ||||
| 			} | ||||
| 			for _, recipeVersion := range recipeVersions { | ||||
| 				for version := range recipeVersion { | ||||
| 					versions = append(versions, version) | ||||
| 				} | ||||
| 			} | ||||
| 		} | ||||
|  | ||||
| 		var availableUpgrades []string | ||||
| 		if deployedVersion == "unknown" { | ||||
| 			availableUpgrades = versions | ||||
| 			logrus.Warnf("failed to determine version of deployed %s", app.Name) | ||||
| 			logrus.Warnf("failed to determine deployed version of %s", app.Name) | ||||
| 		} | ||||
|  | ||||
| 		if deployedVersion != "unknown" && !internal.Chaos { | ||||
| 		if specificVersion != "" { | ||||
| 			parsedDeployedVersion, err := tagcmp.Parse(deployedVersion) | ||||
| 			if err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
| 			parsedSpecificVersion, err := tagcmp.Parse(specificVersion) | ||||
| 			if err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
| 			if parsedSpecificVersion.IsLessThan(parsedDeployedVersion) || parsedSpecificVersion.Equals(parsedDeployedVersion) { | ||||
| 				logrus.Fatalf("%s is not an upgrade for %s?", deployedVersion, specificVersion) | ||||
| 			} | ||||
| 			availableUpgrades = append(availableUpgrades, specificVersion) | ||||
| 		} | ||||
|  | ||||
| 		parsedDeployedVersion, err := tagcmp.Parse(deployedVersion) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		if deployedVersion != "unknown" && !internal.Chaos && specificVersion == "" { | ||||
| 			for _, version := range versions { | ||||
| 				parsedDeployedVersion, err := tagcmp.Parse(deployedVersion) | ||||
| 				if err != nil { | ||||
| 					logrus.Fatal(err) | ||||
| 				} | ||||
| 				parsedVersion, err := tagcmp.Parse(version) | ||||
| 				if err != nil { | ||||
| 					logrus.Fatal(err) | ||||
| 				} | ||||
| 				if parsedVersion.IsGreaterThan(parsedDeployedVersion) { | ||||
| 				if parsedVersion.IsGreaterThan(parsedDeployedVersion) && !(parsedVersion.Equals(parsedDeployedVersion)) { | ||||
| 					availableUpgrades = append(availableUpgrades, version) | ||||
| 				} | ||||
| 			} | ||||
| @ -125,17 +169,15 @@ recipes. | ||||
| 			} | ||||
| 		} | ||||
|  | ||||
| 		availableUpgrades = internal.ReverseStringList(availableUpgrades) | ||||
|  | ||||
| 		var chosenUpgrade string | ||||
| 		if len(availableUpgrades) > 0 && !internal.Chaos { | ||||
| 			if internal.Force || internal.NoInput { | ||||
| 			if internal.Force || internal.NoInput || specificVersion != "" { | ||||
| 				chosenUpgrade = availableUpgrades[len(availableUpgrades)-1] | ||||
| 				logrus.Debugf("choosing %s as version to upgrade to", chosenUpgrade) | ||||
| 			} else { | ||||
| 				prompt := &survey.Select{ | ||||
| 					Message: fmt.Sprintf("Please select an upgrade (current version: %s):", deployedVersion), | ||||
| 					Options: availableUpgrades, | ||||
| 					Options: internal.ReverseStringList(availableUpgrades), | ||||
| 				} | ||||
| 				if err := survey.AskOne(prompt, &chosenUpgrade); err != nil { | ||||
| 					return err | ||||
| @ -143,16 +185,39 @@ recipes. | ||||
| 			} | ||||
| 		} | ||||
|  | ||||
| 		if internal.Force && chosenUpgrade == "" { | ||||
| 			logrus.Warnf("%s is already upgraded to latest but continuing (--force/--chaos)", app.Name) | ||||
| 			chosenUpgrade = deployedVersion | ||||
| 		} | ||||
|  | ||||
| 		// if release notes written after git tag published, read them before we | ||||
| 		// check out the tag and then they'll appear to be missing. this covers | ||||
| 		// when we obviously will forget to write release notes before publishing | ||||
| 		releaseNotes, err := internal.GetReleaseNotes(app.Recipe, chosenUpgrade) | ||||
| 		if err != nil { | ||||
| 			return err | ||||
| 		var releaseNotes string | ||||
| 		if chosenUpgrade != "" { | ||||
| 			parsedChosenUpgrade, err := tagcmp.Parse(chosenUpgrade) | ||||
| 			if err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
| 			for _, version := range versions { | ||||
| 				parsedVersion, err := tagcmp.Parse(version) | ||||
| 				if err != nil { | ||||
| 					logrus.Fatal(err) | ||||
| 				} | ||||
| 				if parsedVersion.IsGreaterThan(parsedDeployedVersion) && parsedVersion.IsLessThan(parsedChosenUpgrade) { | ||||
| 					note, err := internal.GetReleaseNotes(app.Recipe, version) | ||||
| 					if err != nil { | ||||
| 						return err | ||||
| 					} | ||||
| 					if note != "" { | ||||
| 						releaseNotes += fmt.Sprintf("%s\n", note) | ||||
| 					} | ||||
| 				} | ||||
| 			} | ||||
| 		} | ||||
|  | ||||
| 		if !internal.Chaos { | ||||
| 			if err := recipe.EnsureVersion(app.Recipe, chosenUpgrade); err != nil { | ||||
| 			if err := recipePkg.EnsureVersion(app.Recipe, chosenUpgrade); err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
| 		} | ||||
| @ -160,7 +225,7 @@ recipes. | ||||
| 		if internal.Chaos { | ||||
| 			logrus.Warn("chaos mode engaged") | ||||
| 			var err error | ||||
| 			chosenUpgrade, err = recipe.ChaosVersion(app.Recipe) | ||||
| 			chosenUpgrade, err = recipePkg.ChaosVersion(app.Recipe) | ||||
| 			if err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
| @ -175,7 +240,7 @@ recipes. | ||||
| 			app.Env[k] = v | ||||
| 		} | ||||
|  | ||||
| 		composeFiles, err := config.GetAppComposeFiles(app.Recipe, app.Env) | ||||
| 		composeFiles, err := config.GetComposeFiles(app.Recipe, app.Env) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
| @ -192,17 +257,48 @@ recipes. | ||||
| 		config.ExposeAllEnv(stackName, compose, app.Env) | ||||
| 		config.SetRecipeLabel(compose, stackName, app.Recipe) | ||||
| 		config.SetChaosLabel(compose, stackName, internal.Chaos) | ||||
| 		config.SetChaosVersionLabel(compose, stackName, chosenUpgrade) | ||||
| 		config.SetUpdateLabel(compose, stackName, app.Env) | ||||
|  | ||||
| 		envVars, err := config.CheckEnv(app) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		for _, envVar := range envVars { | ||||
| 			if !envVar.Present { | ||||
| 				logrus.Warnf("env var %s missing from %s.env, present in recipe .env.sample", envVar.Name, app.Domain) | ||||
| 			} | ||||
| 		} | ||||
|  | ||||
| 		if internal.ReleaseNotes { | ||||
| 			fmt.Println() | ||||
| 			fmt.Print(releaseNotes) | ||||
| 			return nil | ||||
| 		} | ||||
|  | ||||
| 		if err := internal.NewVersionOverview(app, deployedVersion, chosenUpgrade, releaseNotes); err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		if err := stack.RunDeploy(cl, deployOpts, compose, app.StackName(), internal.DontWaitConverge); err != nil { | ||||
| 		stack.WaitTimeout, err = config.GetTimeoutFromLabel(compose, stackName) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
| 		logrus.Debugf("set waiting timeout to %d s", stack.WaitTimeout) | ||||
|  | ||||
| 		if err := stack.RunDeploy(cl, deployOpts, compose, stackName, internal.DontWaitConverge); err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		postDeployCmds, ok := app.Env["POST_UPGRADE_CMDS"] | ||||
| 		if ok && !internal.DontWaitConverge { | ||||
| 			logrus.Debugf("run the following post-deploy commands: %s", postDeployCmds) | ||||
| 			if err := internal.PostCmds(cl, app, postDeployCmds); err != nil { | ||||
| 				logrus.Fatalf("attempting to run post deploy commands, saw: %s", err) | ||||
| 			} | ||||
| 		} | ||||
|  | ||||
| 		return nil | ||||
| 	}, | ||||
| 	BashComplete: autocomplete.AppNameComplete, | ||||
| } | ||||
|  | ||||
| @ -2,6 +2,7 @@ package app | ||||
|  | ||||
| import ( | ||||
| 	"context" | ||||
| 	"sort" | ||||
|  | ||||
| 	"coopcloud.tech/abra/cli/internal" | ||||
| 	"coopcloud.tech/abra/pkg/autocomplete" | ||||
| @ -9,11 +10,22 @@ import ( | ||||
| 	"coopcloud.tech/abra/pkg/formatter" | ||||
| 	"coopcloud.tech/abra/pkg/recipe" | ||||
| 	"coopcloud.tech/abra/pkg/upstream/stack" | ||||
| 	"github.com/docker/distribution/reference" | ||||
| 	"github.com/distribution/reference" | ||||
| 	"github.com/olekukonko/tablewriter" | ||||
| 	"github.com/sirupsen/logrus" | ||||
| 	"github.com/urfave/cli" | ||||
| ) | ||||
|  | ||||
| func sortServiceByName(versions [][]string) func(i, j int) bool { | ||||
| 	return func(i, j int) bool { | ||||
| 		// NOTE(d1): corresponds to the `tableCol` definition below | ||||
| 		if versions[i][1] == "app" { | ||||
| 			return true | ||||
| 		} | ||||
| 		return versions[i][1] < versions[j][1] | ||||
| 	} | ||||
| } | ||||
|  | ||||
| // getImagePath returns the image name | ||||
| func getImagePath(image string) (string, error) { | ||||
| 	img, err := reference.ParseNormalizedNamed(image) | ||||
| @ -37,14 +49,11 @@ var appVersionCommand = cli.Command{ | ||||
| 	Flags: []cli.Flag{ | ||||
| 		internal.DebugFlag, | ||||
| 		internal.NoInputFlag, | ||||
| 		internal.OfflineFlag, | ||||
| 	}, | ||||
| 	Before: internal.SubCommandBefore, | ||||
| 	Usage:  "Show app versions", | ||||
| 	Description: ` | ||||
| Show all information about versioning related to a deployed app. This includes | ||||
| the individual image names, tags and digests. But also the Co-op Cloud recipe | ||||
| version. | ||||
| `, | ||||
| 	Before:       internal.SubCommandBefore, | ||||
| 	Usage:        "Show version info of a deployed app", | ||||
| 	BashComplete: autocomplete.AppNameComplete, | ||||
| 	Action: func(c *cli.Context) error { | ||||
| 		app := internal.ValidateApp(c) | ||||
| 		stackName := app.StackName() | ||||
| @ -61,15 +70,15 @@ version. | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		if deployedVersion == "unknown" { | ||||
| 			logrus.Fatalf("failed to determine version of deployed %s", app.Name) | ||||
| 		} | ||||
|  | ||||
| 		if !isDeployed { | ||||
| 			logrus.Fatalf("%s is not deployed?", app.Name) | ||||
| 		} | ||||
|  | ||||
| 		recipeMeta, err := recipe.GetRecipeMeta(app.Recipe) | ||||
| 		if deployedVersion == "unknown" { | ||||
| 			logrus.Fatalf("failed to determine version of deployed %s", app.Name) | ||||
| 		} | ||||
|  | ||||
| 		recipeMeta, err := recipe.GetRecipeMeta(app.Recipe, internal.Offline) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
| @ -85,17 +94,24 @@ version. | ||||
| 			logrus.Fatalf("could not retrieve deployed version (%s) from recipe catalogue?", deployedVersion) | ||||
| 		} | ||||
|  | ||||
| 		tableCol := []string{"version", "service", "image"} | ||||
| 		tableCol := []string{"version", "service", "image", "tag"} | ||||
| 		table := formatter.CreateTable(tableCol) | ||||
| 		table.SetAutoMergeCellsByColumnIndex([]int{0}) | ||||
|  | ||||
| 		var versions [][]string | ||||
| 		for serviceName, versionMeta := range versionsMeta { | ||||
| 			table.Append([]string{deployedVersion, serviceName, versionMeta.Image}) | ||||
| 			versions = append(versions, []string{deployedVersion, serviceName, versionMeta.Image, versionMeta.Tag}) | ||||
| 		} | ||||
|  | ||||
| 		sort.Slice(versions, sortServiceByName(versions)) | ||||
|  | ||||
| 		for _, version := range versions { | ||||
| 			table.Append(version) | ||||
| 		} | ||||
|  | ||||
| 		table.SetAutoMergeCellsByColumnIndex([]int{0}) | ||||
| 		table.SetAlignment(tablewriter.ALIGN_LEFT) | ||||
| 		table.Render() | ||||
|  | ||||
| 		return nil | ||||
| 	}, | ||||
| 	BashComplete: autocomplete.AppNameComplete, | ||||
| } | ||||
|  | ||||
| @ -2,11 +2,13 @@ package app | ||||
|  | ||||
| import ( | ||||
| 	"context" | ||||
| 	"log" | ||||
|  | ||||
| 	"coopcloud.tech/abra/cli/internal" | ||||
| 	"coopcloud.tech/abra/pkg/autocomplete" | ||||
| 	"coopcloud.tech/abra/pkg/client" | ||||
| 	"coopcloud.tech/abra/pkg/formatter" | ||||
| 	"coopcloud.tech/abra/pkg/upstream/stack" | ||||
| 	"github.com/AlecAivazis/survey/v2" | ||||
| 	"github.com/sirupsen/logrus" | ||||
| 	"github.com/urfave/cli" | ||||
| @ -81,7 +83,8 @@ Passing "--force/-f" will select all volumes for removal. Be careful. | ||||
| 		internal.NoInputFlag, | ||||
| 		internal.ForceFlag, | ||||
| 	}, | ||||
| 	Before: internal.SubCommandBefore, | ||||
| 	Before:       internal.SubCommandBefore, | ||||
| 	BashComplete: autocomplete.AppNameComplete, | ||||
| 	Action: func(c *cli.Context) error { | ||||
| 		app := internal.ValidateApp(c) | ||||
|  | ||||
| @ -90,6 +93,15 @@ Passing "--force/-f" will select all volumes for removal. Be careful. | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		isDeployed, _, err := stack.IsDeployed(context.Background(), cl, app.StackName()) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		if isDeployed { | ||||
| 			logrus.Fatalf("%s is still deployed. Run \"abra app undeploy %s\"", app.Name, app.Name) | ||||
| 		} | ||||
|  | ||||
| 		filters, err := app.Filters(false, true) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| @ -119,16 +131,19 @@ Passing "--force/-f" will select all volumes for removal. Be careful. | ||||
| 			volumesToRemove = volumeNames | ||||
| 		} | ||||
|  | ||||
| 		err = client.RemoveVolumes(cl, context.Background(), app.Server, volumesToRemove, internal.Force) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
| 		if len(volumesToRemove) > 0 { | ||||
| 			err := client.RemoveVolumes(cl, context.Background(), volumesToRemove, internal.Force, 5) | ||||
| 			if err != nil { | ||||
| 				log.Fatalf("removing volumes failed: %s", err) | ||||
| 			} | ||||
|  | ||||
| 		logrus.Info("volumes removed successfully") | ||||
| 			logrus.Infof("%d volumes removed successfully", len(volumesToRemove)) | ||||
| 		} else { | ||||
| 			logrus.Info("no volumes removed") | ||||
| 		} | ||||
|  | ||||
| 		return nil | ||||
| 	}, | ||||
| 	BashComplete: autocomplete.AppNameComplete, | ||||
| } | ||||
|  | ||||
| var appVolumeCommand = cli.Command{ | ||||
|  | ||||
| @ -28,6 +28,8 @@ var catalogueGenerateCommand = cli.Command{ | ||||
| 		internal.PublishFlag, | ||||
| 		internal.DryFlag, | ||||
| 		internal.SkipUpdatesFlag, | ||||
| 		internal.ChaosFlag, | ||||
| 		internal.OfflineFlag, | ||||
| 	}, | ||||
| 	Before: internal.SubCommandBefore, | ||||
| 	Description: ` | ||||
| @ -51,15 +53,19 @@ Push your new release to git.coopcloud.tech with "-p/--publish". This requires | ||||
| that you have permission to git push to these repositories and have your SSH | ||||
| keys configured on your account. | ||||
| `, | ||||
| 	ArgsUsage: "[<recipe>]", | ||||
| 	ArgsUsage:    "[<recipe>]", | ||||
| 	BashComplete: autocomplete.RecipeNameComplete, | ||||
| 	Action: func(c *cli.Context) error { | ||||
| 		recipeName := c.Args().First() | ||||
|  | ||||
| 		if recipeName != "" { | ||||
| 			internal.ValidateRecipe(c, true) | ||||
| 			internal.ValidateRecipe(c) | ||||
| 		} | ||||
|  | ||||
| 		if err := catalogue.EnsureUpToDate(); err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		if !internal.Chaos { | ||||
| 			if err := catalogue.EnsureIsClean(); err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
| 		} | ||||
|  | ||||
| 		repos, err := recipe.ReadReposMetadata() | ||||
| @ -92,12 +98,7 @@ keys configured on your account. | ||||
| 				continue | ||||
| 			} | ||||
|  | ||||
| 			if _, exists := catalogue.CatalogueSkipList[recipeMeta.Name]; exists { | ||||
| 				catlBar.Add(1) | ||||
| 				continue | ||||
| 			} | ||||
|  | ||||
| 			versions, err := recipe.GetRecipeVersions(recipeMeta.Name) | ||||
| 			versions, err := recipe.GetRecipeVersions(recipeMeta.Name, internal.Offline) | ||||
| 			if err != nil { | ||||
| 				logrus.Warn(err) | ||||
| 			} | ||||
| @ -133,7 +134,7 @@ keys configured on your account. | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
| 		} else { | ||||
| 			catlFS, err := recipe.ReadRecipeCatalogue() | ||||
| 			catlFS, err := recipe.ReadRecipeCatalogue(internal.Offline) | ||||
| 			if err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
| @ -167,7 +168,7 @@ keys configured on your account. | ||||
| 			} | ||||
|  | ||||
| 			msg := "chore: publish new catalogue release changes" | ||||
| 			if err := gitPkg.Commit(cataloguePath, "**.json", msg, internal.Dry); err != nil { | ||||
| 			if err := gitPkg.Commit(cataloguePath, msg, internal.Dry); err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
|  | ||||
| @ -207,7 +208,6 @@ keys configured on your account. | ||||
|  | ||||
| 		return nil | ||||
| 	}, | ||||
| 	BashComplete: autocomplete.RecipeNameComplete, | ||||
| } | ||||
|  | ||||
| // CatalogueCommand defines the `abra catalogue` command and sub-commands. | ||||
|  | ||||
							
								
								
									
										15
									
								
								cli/cli.go
									
									
									
									
									
								
							
							
						
						
									
										15
									
								
								cli/cli.go
									
									
									
									
									
								
							| @ -12,9 +12,9 @@ import ( | ||||
| 	"coopcloud.tech/abra/cli/catalogue" | ||||
| 	"coopcloud.tech/abra/cli/internal" | ||||
| 	"coopcloud.tech/abra/cli/recipe" | ||||
| 	"coopcloud.tech/abra/cli/record" | ||||
| 	"coopcloud.tech/abra/cli/server" | ||||
| 	"coopcloud.tech/abra/pkg/autocomplete" | ||||
| 	cataloguePkg "coopcloud.tech/abra/pkg/catalogue" | ||||
| 	"coopcloud.tech/abra/pkg/config" | ||||
| 	"coopcloud.tech/abra/pkg/web" | ||||
| 	"github.com/sirupsen/logrus" | ||||
| @ -158,7 +158,6 @@ func newAbraApp(version, commit string) *cli.App { | ||||
| 			server.ServerCommand, | ||||
| 			recipe.RecipeCommand, | ||||
| 			catalogue.CatalogueCommand, | ||||
| 			record.RecordCommand, | ||||
| 			UpgradeCommand, | ||||
| 			AutoCompleteCommand, | ||||
| 		}, | ||||
| @ -170,10 +169,10 @@ func newAbraApp(version, commit string) *cli.App { | ||||
| 	app.Before = func(c *cli.Context) error { | ||||
| 		paths := []string{ | ||||
| 			config.ABRA_DIR, | ||||
| 			path.Join(config.SERVERS_DIR), | ||||
| 			path.Join(config.RECIPES_DIR), | ||||
| 			path.Join(config.VENDOR_DIR), | ||||
| 			path.Join(config.BACKUP_DIR), | ||||
| 			config.SERVERS_DIR, | ||||
| 			config.RECIPES_DIR, | ||||
| 			config.VENDOR_DIR, | ||||
| 			config.BACKUP_DIR, | ||||
| 		} | ||||
|  | ||||
| 		for _, path := range paths { | ||||
| @ -185,6 +184,10 @@ func newAbraApp(version, commit string) *cli.App { | ||||
| 			} | ||||
| 		} | ||||
|  | ||||
| 		if err := cataloguePkg.EnsureCatalogue(); err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		logrus.Debugf("abra version %s, commit %s", version, commit) | ||||
|  | ||||
| 		return nil | ||||
|  | ||||
| @ -1,35 +1,67 @@ | ||||
| package internal | ||||
|  | ||||
| import ( | ||||
| 	"strings" | ||||
| 	"context" | ||||
|  | ||||
| 	"coopcloud.tech/abra/pkg/config" | ||||
| 	containerPkg "coopcloud.tech/abra/pkg/container" | ||||
| 	"coopcloud.tech/abra/pkg/service" | ||||
| 	"coopcloud.tech/abra/pkg/upstream/container" | ||||
| 	"github.com/docker/cli/cli/command" | ||||
| 	"github.com/docker/docker/api/types" | ||||
| 	"github.com/docker/docker/api/types/filters" | ||||
| 	dockerClient "github.com/docker/docker/client" | ||||
| 	"github.com/sirupsen/logrus" | ||||
| ) | ||||
|  | ||||
| // SafeSplit splits up a string into a list of commands safely. | ||||
| func SafeSplit(s string) []string { | ||||
| 	split := strings.Split(s, " ") | ||||
|  | ||||
| 	var result []string | ||||
| 	var inquote string | ||||
| 	var block string | ||||
| 	for _, i := range split { | ||||
| 		if inquote == "" { | ||||
| 			if strings.HasPrefix(i, "'") || strings.HasPrefix(i, "\"") { | ||||
| 				inquote = string(i[0]) | ||||
| 				block = strings.TrimPrefix(i, inquote) + " " | ||||
| 			} else { | ||||
| 				result = append(result, i) | ||||
| 			} | ||||
| 		} else { | ||||
| 			if !strings.HasSuffix(i, inquote) { | ||||
| 				block += i + " " | ||||
| 			} else { | ||||
| 				block += strings.TrimSuffix(i, inquote) | ||||
| 				inquote = "" | ||||
| 				result = append(result, block) | ||||
| 				block = "" | ||||
| 			} | ||||
| 		} | ||||
| // RetrieveBackupBotContainer gets the deployed backupbot container. | ||||
| func RetrieveBackupBotContainer(cl *dockerClient.Client) (types.Container, error) { | ||||
| 	ctx := context.Background() | ||||
| 	chosenService, err := service.GetServiceByLabel(ctx, cl, config.BackupbotLabel, NoInput) | ||||
| 	if err != nil { | ||||
| 		return types.Container{}, err | ||||
| 	} | ||||
|  | ||||
| 	return result | ||||
| 	logrus.Debugf("retrieved %s as backup enabled service", chosenService.Spec.Name) | ||||
|  | ||||
| 	filters := filters.NewArgs() | ||||
| 	filters.Add("name", chosenService.Spec.Name) | ||||
| 	targetContainer, err := containerPkg.GetContainer( | ||||
| 		ctx, | ||||
| 		cl, | ||||
| 		filters, | ||||
| 		NoInput, | ||||
| 	) | ||||
| 	if err != nil { | ||||
| 		return types.Container{}, err | ||||
| 	} | ||||
|  | ||||
| 	return targetContainer, nil | ||||
| } | ||||
|  | ||||
| // RunBackupCmdRemote runs a backup related command on a remote backupbot container. | ||||
| func RunBackupCmdRemote(cl *dockerClient.Client, backupCmd string, containerID string, execEnv []string) error { | ||||
| 	execBackupListOpts := types.ExecConfig{ | ||||
| 		AttachStderr: true, | ||||
| 		AttachStdin:  true, | ||||
| 		AttachStdout: true, | ||||
| 		Cmd:          []string{"/usr/bin/backup", "--", backupCmd}, | ||||
| 		Detach:       false, | ||||
| 		Env:          execEnv, | ||||
| 		Tty:          true, | ||||
| 	} | ||||
|  | ||||
| 	logrus.Debugf("running backup %s on %s with exec config %v", backupCmd, containerID, execBackupListOpts) | ||||
|  | ||||
| 	// FIXME: avoid instantiating a new CLI | ||||
| 	dcli, err := command.NewDockerCli() | ||||
| 	if err != nil { | ||||
| 		return err | ||||
| 	} | ||||
|  | ||||
| 	if _, err := container.RunExec(dcli, cl, containerID, &execBackupListOpts); err != nil { | ||||
| 		return err | ||||
| 	} | ||||
|  | ||||
| 	return nil | ||||
| } | ||||
|  | ||||
| @ -54,19 +54,18 @@ var Chaos bool | ||||
| // ChaosFlag turns on/off chaos functionality. | ||||
| var ChaosFlag = &cli.BoolFlag{ | ||||
| 	Name:        "chaos, C", | ||||
| 	Usage:       "Deploy uncommitted recipes changes. Use with care!", | ||||
| 	Usage:       "Proceed with uncommitted recipes changes. Use with care!", | ||||
| 	Destination: &Chaos, | ||||
| } | ||||
|  | ||||
| // DNSProvider specifies a DNS provider. | ||||
| var DNSProvider string | ||||
| // Disable tty to run commands from script | ||||
| var Tty bool | ||||
|  | ||||
| // DNSProviderFlag selects a DNS provider. | ||||
| var DNSProviderFlag = &cli.StringFlag{ | ||||
| 	Name:        "provider, p", | ||||
| 	Value:       "", | ||||
| 	Usage:       "DNS provider", | ||||
| 	Destination: &DNSProvider, | ||||
| // TtyFlag turns on/off tty mode. | ||||
| var TtyFlag = &cli.BoolFlag{ | ||||
| 	Name:        "tty, T", | ||||
| 	Usage:       "Disables TTY mode to run this command from a script.", | ||||
| 	Destination: &Tty, | ||||
| } | ||||
|  | ||||
| var NoInput bool | ||||
| @ -76,163 +75,6 @@ var NoInputFlag = &cli.BoolFlag{ | ||||
| 	Destination: &NoInput, | ||||
| } | ||||
|  | ||||
| var DNSType string | ||||
|  | ||||
| var DNSTypeFlag = &cli.StringFlag{ | ||||
| 	Name:        "record-type, rt", | ||||
| 	Value:       "", | ||||
| 	Usage:       "Domain name record type (e.g. A)", | ||||
| 	Destination: &DNSType, | ||||
| } | ||||
|  | ||||
| var DNSName string | ||||
|  | ||||
| var DNSNameFlag = &cli.StringFlag{ | ||||
| 	Name:        "record-name, rn", | ||||
| 	Value:       "", | ||||
| 	Usage:       "Domain name record name (e.g. mysubdomain)", | ||||
| 	Destination: &DNSName, | ||||
| } | ||||
|  | ||||
| var DNSValue string | ||||
|  | ||||
| var DNSValueFlag = &cli.StringFlag{ | ||||
| 	Name:        "record-value, rv", | ||||
| 	Value:       "", | ||||
| 	Usage:       "Domain name record value (e.g. 192.168.1.1)", | ||||
| 	Destination: &DNSValue, | ||||
| } | ||||
|  | ||||
| var DNSTTL string | ||||
| var DNSTTLFlag = &cli.StringFlag{ | ||||
| 	Name:        "record-ttl, rl", | ||||
| 	Value:       "600s", | ||||
| 	Usage:       "Domain name TTL value (seconds)", | ||||
| 	Destination: &DNSTTL, | ||||
| } | ||||
|  | ||||
| var DNSPriority int | ||||
|  | ||||
| var DNSPriorityFlag = &cli.IntFlag{ | ||||
| 	Name:        "record-priority, rp", | ||||
| 	Value:       10, | ||||
| 	Usage:       "Domain name priority value", | ||||
| 	Destination: &DNSPriority, | ||||
| } | ||||
|  | ||||
| var ServerProvider string | ||||
|  | ||||
| var ServerProviderFlag = &cli.StringFlag{ | ||||
| 	Name:        "provider, p", | ||||
| 	Usage:       "3rd party server provider", | ||||
| 	Destination: &ServerProvider, | ||||
| } | ||||
|  | ||||
| var CapsulInstanceURL string | ||||
|  | ||||
| var CapsulInstanceURLFlag = &cli.StringFlag{ | ||||
| 	Name:        "capsul-url, cu", | ||||
| 	Value:       "yolo.servers.coop", | ||||
| 	Usage:       "capsul instance URL", | ||||
| 	Destination: &CapsulInstanceURL, | ||||
| } | ||||
|  | ||||
| var CapsulName string | ||||
|  | ||||
| var CapsulNameFlag = &cli.StringFlag{ | ||||
| 	Name:        "capsul-name, cn", | ||||
| 	Value:       "", | ||||
| 	Usage:       "capsul name", | ||||
| 	Destination: &CapsulName, | ||||
| } | ||||
|  | ||||
| var CapsulType string | ||||
|  | ||||
| var CapsulTypeFlag = &cli.StringFlag{ | ||||
| 	Name:        "capsul-type, ct", | ||||
| 	Value:       "f1-xs", | ||||
| 	Usage:       "capsul type", | ||||
| 	Destination: &CapsulType, | ||||
| } | ||||
|  | ||||
| var CapsulImage string | ||||
|  | ||||
| var CapsulImageFlag = &cli.StringFlag{ | ||||
| 	Name:        "capsul-image, ci", | ||||
| 	Value:       "debian10", | ||||
| 	Usage:       "capsul image", | ||||
| 	Destination: &CapsulImage, | ||||
| } | ||||
|  | ||||
| var CapsulSSHKeys cli.StringSlice | ||||
| var CapsulSSHKeysFlag = &cli.StringSliceFlag{ | ||||
| 	Name:  "capsul-ssh-keys, cs", | ||||
| 	Usage: "capsul SSH key", | ||||
| 	Value: &CapsulSSHKeys, | ||||
| } | ||||
|  | ||||
| var CapsulAPIToken string | ||||
|  | ||||
| var CapsulAPITokenFlag = &cli.StringFlag{ | ||||
| 	Name:        "capsul-token, ca", | ||||
| 	Usage:       "capsul API token", | ||||
| 	EnvVar:      "CAPSUL_TOKEN", | ||||
| 	Destination: &CapsulAPIToken, | ||||
| } | ||||
|  | ||||
| var HetznerCloudName string | ||||
|  | ||||
| var HetznerCloudNameFlag = &cli.StringFlag{ | ||||
| 	Name:        "hetzner-name, hn", | ||||
| 	Value:       "", | ||||
| 	Usage:       "hetzner cloud name", | ||||
| 	Destination: &HetznerCloudName, | ||||
| } | ||||
|  | ||||
| var HetznerCloudType string | ||||
|  | ||||
| var HetznerCloudTypeFlag = &cli.StringFlag{ | ||||
| 	Name:        "hetzner-type, ht", | ||||
| 	Usage:       "hetzner cloud type", | ||||
| 	Destination: &HetznerCloudType, | ||||
| 	Value:       "cx11", | ||||
| } | ||||
|  | ||||
| var HetznerCloudImage string | ||||
|  | ||||
| var HetznerCloudImageFlag = &cli.StringFlag{ | ||||
| 	Name:        "hetzner-image, hi", | ||||
| 	Usage:       "hetzner cloud image", | ||||
| 	Value:       "debian-10", | ||||
| 	Destination: &HetznerCloudImage, | ||||
| } | ||||
|  | ||||
| var HetznerCloudSSHKeys cli.StringSlice | ||||
|  | ||||
| var HetznerCloudSSHKeysFlag = &cli.StringSliceFlag{ | ||||
| 	Name:  "hetzner-ssh-keys, hs", | ||||
| 	Usage: "hetzner cloud SSH keys (e.g. me@foo.com)", | ||||
| 	Value: &HetznerCloudSSHKeys, | ||||
| } | ||||
|  | ||||
| var HetznerCloudLocation string | ||||
|  | ||||
| var HetznerCloudLocationFlag = &cli.StringFlag{ | ||||
| 	Name:        "hetzner-location, hl", | ||||
| 	Usage:       "hetzner cloud server location", | ||||
| 	Value:       "hel1", | ||||
| 	Destination: &HetznerCloudLocation, | ||||
| } | ||||
|  | ||||
| var HetznerCloudAPIToken string | ||||
|  | ||||
| var HetznerCloudAPITokenFlag = &cli.StringFlag{ | ||||
| 	Name:        "hetzner-token, ha", | ||||
| 	Usage:       "hetzner cloud API token", | ||||
| 	EnvVar:      "HCLOUD_TOKEN", | ||||
| 	Destination: &HetznerCloudAPIToken, | ||||
| } | ||||
|  | ||||
| // Debug stores the variable from DebugFlag. | ||||
| var Debug bool | ||||
|  | ||||
| @ -243,6 +85,26 @@ var DebugFlag = &cli.BoolFlag{ | ||||
| 	Usage:       "Show DEBUG messages", | ||||
| } | ||||
|  | ||||
| // Offline stores the variable from OfflineFlag. | ||||
| var Offline bool | ||||
|  | ||||
| // DebugFlag turns on/off offline mode. | ||||
| var OfflineFlag = &cli.BoolFlag{ | ||||
| 	Name:        "offline, o", | ||||
| 	Destination: &Offline, | ||||
| 	Usage:       "Prefer offline & filesystem access when possible", | ||||
| } | ||||
|  | ||||
| // ReleaseNotes stores the variable from ReleaseNotesFlag. | ||||
| var ReleaseNotes bool | ||||
|  | ||||
| // ReleaseNotesFlag turns on/off printing only release notes when upgrading. | ||||
| var ReleaseNotesFlag = &cli.BoolFlag{ | ||||
| 	Name:        "releasenotes, r", | ||||
| 	Destination: &ReleaseNotes, | ||||
| 	Usage:       "Only show release notes", | ||||
| } | ||||
|  | ||||
| // MachineReadable stores the variable from MachineReadableFlag | ||||
| var MachineReadable bool | ||||
|  | ||||
| @ -260,7 +122,7 @@ var RC bool | ||||
| var RCFlag = &cli.BoolFlag{ | ||||
| 	Name:        "rc, r", | ||||
| 	Destination: &RC, | ||||
| 	Usage:       "Insatll the latest release candidate", | ||||
| 	Usage:       "Install the latest release candidate", | ||||
| } | ||||
|  | ||||
| var Major bool | ||||
| @ -328,6 +190,14 @@ var StdErrOnlyFlag = &cli.BoolFlag{ | ||||
| 	Destination: &StdErrOnly, | ||||
| } | ||||
|  | ||||
| var SinceLogs string | ||||
| var SinceLogsFlag = &cli.StringFlag{ | ||||
| 	Name:        "since, S", | ||||
| 	Value:       "", | ||||
| 	Usage:       "tail logs since YYYY-MM-DDTHH:MM:SSZ", | ||||
| 	Destination: &SinceLogs, | ||||
| } | ||||
|  | ||||
| var DontWaitConverge bool | ||||
| var DontWaitConvergeFlag = &cli.BoolFlag{ | ||||
| 	Name:        "no-converge-checks, c", | ||||
|  | ||||
| @ -2,10 +2,109 @@ package internal | ||||
|  | ||||
| import ( | ||||
| 	"bufio" | ||||
| 	"context" | ||||
| 	"fmt" | ||||
| 	"io/ioutil" | ||||
| 	"os/exec" | ||||
| 	"strings" | ||||
|  | ||||
| 	"coopcloud.tech/abra/pkg/config" | ||||
| 	containerPkg "coopcloud.tech/abra/pkg/container" | ||||
| 	"coopcloud.tech/abra/pkg/formatter" | ||||
| 	"coopcloud.tech/abra/pkg/upstream/container" | ||||
| 	"github.com/docker/cli/cli/command" | ||||
| 	"github.com/docker/docker/api/types" | ||||
| 	"github.com/docker/docker/api/types/filters" | ||||
| 	dockerClient "github.com/docker/docker/client" | ||||
| 	"github.com/docker/docker/pkg/archive" | ||||
| 	"github.com/sirupsen/logrus" | ||||
| ) | ||||
|  | ||||
| // RunCmdRemote executes an abra.sh command in the target service | ||||
| func RunCmdRemote(cl *dockerClient.Client, app config.App, abraSh, serviceName, cmdName, cmdArgs string) error { | ||||
| 	filters := filters.NewArgs() | ||||
| 	filters.Add("name", fmt.Sprintf("^%s_%s", app.StackName(), serviceName)) | ||||
|  | ||||
| 	targetContainer, err := containerPkg.GetContainer(context.Background(), cl, filters, false) | ||||
| 	if err != nil { | ||||
| 		return err | ||||
| 	} | ||||
|  | ||||
| 	logrus.Debugf("retrieved %s as target container on %s", formatter.ShortenID(targetContainer.ID), app.Server) | ||||
|  | ||||
| 	toTarOpts := &archive.TarOptions{NoOverwriteDirNonDir: true, Compression: archive.Gzip} | ||||
| 	content, err := archive.TarWithOptions(abraSh, toTarOpts) | ||||
| 	if err != nil { | ||||
| 		return err | ||||
| 	} | ||||
|  | ||||
| 	copyOpts := types.CopyToContainerOptions{AllowOverwriteDirWithFile: false, CopyUIDGID: false} | ||||
| 	if err := cl.CopyToContainer(context.Background(), targetContainer.ID, "/tmp", content, copyOpts); err != nil { | ||||
| 		return err | ||||
| 	} | ||||
|  | ||||
| 	// FIXME: avoid instantiating a new CLI | ||||
| 	dcli, err := command.NewDockerCli() | ||||
| 	if err != nil { | ||||
| 		return err | ||||
| 	} | ||||
|  | ||||
| 	shell := "/bin/bash" | ||||
| 	findShell := []string{"test", "-e", shell} | ||||
| 	execCreateOpts := types.ExecConfig{ | ||||
| 		AttachStderr: true, | ||||
| 		AttachStdin:  true, | ||||
| 		AttachStdout: true, | ||||
| 		Cmd:          findShell, | ||||
| 		Detach:       false, | ||||
| 		Tty:          false, | ||||
| 	} | ||||
|  | ||||
| 	if _, err := container.RunExec(dcli, cl, targetContainer.ID, &execCreateOpts); err != nil { | ||||
| 		logrus.Infof("%s does not exist for %s, use /bin/sh as fallback", shell, app.Name) | ||||
| 		shell = "/bin/sh" | ||||
| 	} | ||||
|  | ||||
| 	var cmd []string | ||||
| 	if cmdArgs != "" { | ||||
| 		cmd = []string{shell, "-c", fmt.Sprintf("TARGET=%s; APP_NAME=%s; STACK_NAME=%s; . /tmp/abra.sh; %s %s", serviceName, app.Name, app.StackName(), cmdName, cmdArgs)} | ||||
| 	} else { | ||||
| 		cmd = []string{shell, "-c", fmt.Sprintf("TARGET=%s; APP_NAME=%s; STACK_NAME=%s; . /tmp/abra.sh; %s", serviceName, app.Name, app.StackName(), cmdName)} | ||||
| 	} | ||||
|  | ||||
| 	logrus.Debugf("running command: %s", strings.Join(cmd, " ")) | ||||
|  | ||||
| 	if RemoteUser != "" { | ||||
| 		logrus.Debugf("running command with user %s", RemoteUser) | ||||
| 		execCreateOpts.User = RemoteUser | ||||
| 	} | ||||
|  | ||||
| 	execCreateOpts.Cmd = cmd | ||||
| 	execCreateOpts.Tty = true | ||||
| 	if Tty { | ||||
| 		execCreateOpts.Tty = false | ||||
| 	} | ||||
|  | ||||
| 	if _, err := container.RunExec(dcli, cl, targetContainer.ID, &execCreateOpts); err != nil { | ||||
| 		return err | ||||
| 	} | ||||
|  | ||||
| 	return nil | ||||
| } | ||||
|  | ||||
| func EnsureCommand(abraSh, recipeName, execCmd string) error { | ||||
| 	bytes, err := ioutil.ReadFile(abraSh) | ||||
| 	if err != nil { | ||||
| 		return err | ||||
| 	} | ||||
|  | ||||
| 	if !strings.Contains(string(bytes), execCmd) { | ||||
| 		return fmt.Errorf("%s doesn't have a %s function", recipeName, execCmd) | ||||
| 	} | ||||
|  | ||||
| 	return nil | ||||
| } | ||||
|  | ||||
| // RunCmd runs a shell command and streams stdout/stderr in real-time. | ||||
| func RunCmd(cmd *exec.Cmd) error { | ||||
| 	r, err := cmd.StdoutPipe() | ||||
|  | ||||
| @ -1,165 +1,136 @@ | ||||
| package internal | ||||
|  | ||||
| import ( | ||||
| 	"context" | ||||
| 	"fmt" | ||||
| 	"io/ioutil" | ||||
| 	"os" | ||||
| 	"path" | ||||
| 	"strings" | ||||
|  | ||||
| 	"coopcloud.tech/abra/pkg/client" | ||||
| 	"coopcloud.tech/abra/pkg/config" | ||||
| 	"coopcloud.tech/abra/pkg/dns" | ||||
| 	"coopcloud.tech/abra/pkg/formatter" | ||||
| 	"coopcloud.tech/abra/pkg/git" | ||||
| 	"coopcloud.tech/abra/pkg/lint" | ||||
| 	"coopcloud.tech/abra/pkg/recipe" | ||||
| 	"coopcloud.tech/abra/pkg/upstream/stack" | ||||
| 	"github.com/AlecAivazis/survey/v2" | ||||
| 	dockerClient "github.com/docker/docker/client" | ||||
| 	"github.com/sirupsen/logrus" | ||||
| 	"github.com/urfave/cli" | ||||
| ) | ||||
|  | ||||
| // DeployAction is the main command-line action for this package | ||||
| func DeployAction(c *cli.Context) error { | ||||
| 	app := ValidateApp(c) | ||||
| // NewVersionOverview shows an upgrade or downgrade overview | ||||
| func NewVersionOverview(app config.App, currentVersion, newVersion, releaseNotes string) error { | ||||
| 	tableCol := []string{"server", "recipe", "config", "domain", "current version", "to be deployed"} | ||||
| 	table := formatter.CreateTable(tableCol) | ||||
|  | ||||
| 	cl, err := client.New(app.Server) | ||||
| 	if err != nil { | ||||
| 		logrus.Fatal(err) | ||||
| 	deployConfig := "compose.yml" | ||||
| 	if composeFiles, ok := app.Env["COMPOSE_FILE"]; ok { | ||||
| 		deployConfig = strings.Join(strings.Split(composeFiles, ":"), "\n") | ||||
| 	} | ||||
|  | ||||
| 	if !Chaos { | ||||
| 		if err := recipe.EnsureUpToDate(app.Recipe); err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
| 	server := app.Server | ||||
| 	if app.Server == "default" { | ||||
| 		server = "local" | ||||
| 	} | ||||
|  | ||||
| 	r, err := recipe.Get(app.Recipe) | ||||
| 	if err != nil { | ||||
| 		logrus.Fatal(err) | ||||
| 	} | ||||
| 	table.Append([]string{server, app.Recipe, deployConfig, app.Domain, currentVersion, newVersion}) | ||||
| 	table.Render() | ||||
|  | ||||
| 	if err := lint.LintForErrors(r); err != nil { | ||||
| 		logrus.Fatal(err) | ||||
| 	} | ||||
|  | ||||
| 	logrus.Debugf("checking whether %s is already deployed", app.StackName()) | ||||
|  | ||||
| 	isDeployed, deployedVersion, err := stack.IsDeployed(context.Background(), cl, app.StackName()) | ||||
| 	if err != nil { | ||||
| 		logrus.Fatal(err) | ||||
| 	} | ||||
|  | ||||
| 	if isDeployed { | ||||
| 		if Force || Chaos { | ||||
| 			logrus.Warnf("%s is already deployed but continuing (--force/--chaos)", app.Name) | ||||
| 		} else { | ||||
| 			logrus.Fatalf("%s is already deployed", app.Name) | ||||
| 		} | ||||
| 	} | ||||
|  | ||||
| 	version := deployedVersion | ||||
| 	if version == "unknown" && !Chaos { | ||||
| 		catl, err := recipe.ReadRecipeCatalogue() | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
| 		versions, err := recipe.GetRecipeCatalogueVersions(app.Recipe, catl) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
| 		if len(versions) > 0 { | ||||
| 			version = versions[len(versions)-1] | ||||
| 			logrus.Debugf("choosing %s as version to deploy", version) | ||||
| 			if err := recipe.EnsureVersion(app.Recipe, version); err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
| 		} else { | ||||
| 			head, err := git.GetRecipeHead(app.Recipe) | ||||
| 			if err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
| 			version = formatter.SmallSHA(head.String()) | ||||
| 			logrus.Warn("no versions detected, using latest commit") | ||||
| 			if err := recipe.EnsureLatest(app.Recipe); err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
| 		} | ||||
| 	} | ||||
|  | ||||
| 	if version == "unknown" && !Chaos { | ||||
| 		logrus.Debugf("choosing %s as version to deploy", version) | ||||
| 		if err := recipe.EnsureVersion(app.Recipe, version); err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
| 	} | ||||
|  | ||||
| 	if version != "unknown" && !Chaos { | ||||
| 		if err := recipe.EnsureVersion(app.Recipe, version); err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
| 	} | ||||
|  | ||||
| 	if Chaos { | ||||
| 		logrus.Warnf("chaos mode engaged") | ||||
| 		var err error | ||||
| 		version, err = recipe.ChaosVersion(app.Recipe) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
| 	} | ||||
|  | ||||
| 	abraShPath := fmt.Sprintf("%s/%s/%s", config.RECIPES_DIR, app.Recipe, "abra.sh") | ||||
| 	abraShEnv, err := config.ReadAbraShEnvVars(abraShPath) | ||||
| 	if err != nil { | ||||
| 		logrus.Fatal(err) | ||||
| 	} | ||||
| 	for k, v := range abraShEnv { | ||||
| 		app.Env[k] = v | ||||
| 	} | ||||
|  | ||||
| 	composeFiles, err := config.GetAppComposeFiles(app.Recipe, app.Env) | ||||
| 	if err != nil { | ||||
| 		logrus.Fatal(err) | ||||
| 	} | ||||
| 	deployOpts := stack.Deploy{ | ||||
| 		Composefiles: composeFiles, | ||||
| 		Namespace:    app.StackName(), | ||||
| 		Prune:        false, | ||||
| 		ResolveImage: stack.ResolveImageAlways, | ||||
| 	} | ||||
| 	compose, err := config.GetAppComposeConfig(app.Name, deployOpts, app.Env) | ||||
| 	if err != nil { | ||||
| 		logrus.Fatal(err) | ||||
| 	} | ||||
| 	config.ExposeAllEnv(app.StackName(), compose, app.Env) | ||||
| 	config.SetRecipeLabel(compose, app.StackName(), app.Recipe) | ||||
| 	config.SetChaosLabel(compose, app.StackName(), Chaos) | ||||
| 	config.SetUpdateLabel(compose, app.StackName(), app.Env) | ||||
|  | ||||
| 	if err := DeployOverview(app, version, "continue with deployment?"); err != nil { | ||||
| 		logrus.Fatal(err) | ||||
| 	} | ||||
|  | ||||
| 	if !NoDomainChecks { | ||||
| 		domainName, ok := app.Env["DOMAIN"] | ||||
| 		if ok { | ||||
| 			if _, err = dns.EnsureDomainsResolveSameIPv4(domainName, app.Server); err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
| 		} else { | ||||
| 			logrus.Warn("skipping domain checks as no DOMAIN=... configured for app") | ||||
| 		} | ||||
| 	if releaseNotes != "" && newVersion != "" { | ||||
| 		fmt.Println() | ||||
| 		fmt.Print(releaseNotes) | ||||
| 	} else { | ||||
| 		logrus.Warn("skipping domain checks as requested") | ||||
| 		logrus.Warnf("no release notes available for %s", newVersion) | ||||
| 	} | ||||
|  | ||||
| 	if err := stack.RunDeploy(cl, deployOpts, compose, app.Name, DontWaitConverge); err != nil { | ||||
| 		logrus.Fatal(err) | ||||
| 	if NoInput { | ||||
| 		return nil | ||||
| 	} | ||||
|  | ||||
| 	response := false | ||||
| 	prompt := &survey.Confirm{ | ||||
| 		Message: "continue with deployment?", | ||||
| 	} | ||||
|  | ||||
| 	if err := survey.AskOne(prompt, &response); err != nil { | ||||
| 		return err | ||||
| 	} | ||||
|  | ||||
| 	if !response { | ||||
| 		logrus.Fatal("exiting as requested") | ||||
| 	} | ||||
|  | ||||
| 	return nil | ||||
| } | ||||
|  | ||||
| // GetReleaseNotes prints release notes for a recipe version | ||||
| func GetReleaseNotes(recipeName, version string) (string, error) { | ||||
| 	if version == "" { | ||||
| 		return "", nil | ||||
| 	} | ||||
|  | ||||
| 	fpath := path.Join(config.RECIPES_DIR, recipeName, "release", version) | ||||
|  | ||||
| 	if _, err := os.Stat(fpath); !os.IsNotExist(err) { | ||||
| 		releaseNotes, err := ioutil.ReadFile(fpath) | ||||
| 		if err != nil { | ||||
| 			return "", err | ||||
| 		} | ||||
| 		withTitle := fmt.Sprintf("%s release notes:\n%s", version, string(releaseNotes)) | ||||
| 		return withTitle, nil | ||||
| 	} | ||||
|  | ||||
| 	return "", nil | ||||
| } | ||||
|  | ||||
| // PostCmds parses a string of commands and executes them inside of the respective services | ||||
| // the commands string must have the following format: | ||||
| // "<service> <command> <arguments>|<service> <command> <arguments>|... " | ||||
| func PostCmds(cl *dockerClient.Client, app config.App, commands string) error { | ||||
| 	abraSh := path.Join(config.RECIPES_DIR, app.Recipe, "abra.sh") | ||||
| 	if _, err := os.Stat(abraSh); err != nil { | ||||
| 		if os.IsNotExist(err) { | ||||
| 			return fmt.Errorf(fmt.Sprintf("%s does not exist for %s?", abraSh, app.Name)) | ||||
| 		} | ||||
| 		return err | ||||
| 	} | ||||
|  | ||||
| 	for _, command := range strings.Split(commands, "|") { | ||||
| 		commandParts := strings.Split(command, " ") | ||||
| 		if len(commandParts) < 2 { | ||||
| 			return fmt.Errorf(fmt.Sprintf("not enough arguments: %s", command)) | ||||
| 		} | ||||
| 		targetServiceName := commandParts[0] | ||||
| 		cmdName := commandParts[1] | ||||
| 		parsedCmdArgs := "" | ||||
| 		if len(commandParts) > 2 { | ||||
| 			parsedCmdArgs = fmt.Sprintf("%s ", strings.Join(commandParts[2:], " ")) | ||||
| 		} | ||||
| 		logrus.Infof("running post-command '%s %s' in container %s", cmdName, parsedCmdArgs, targetServiceName) | ||||
|  | ||||
| 		if err := EnsureCommand(abraSh, app.Recipe, cmdName); err != nil { | ||||
| 			return err | ||||
| 		} | ||||
|  | ||||
| 		serviceNames, err := config.GetAppServiceNames(app.Name) | ||||
| 		if err != nil { | ||||
| 			return err | ||||
| 		} | ||||
|  | ||||
| 		matchingServiceName := false | ||||
| 		for _, serviceName := range serviceNames { | ||||
| 			if serviceName == targetServiceName { | ||||
| 				matchingServiceName = true | ||||
| 			} | ||||
| 		} | ||||
|  | ||||
| 		if !matchingServiceName { | ||||
| 			return fmt.Errorf(fmt.Sprintf("no service %s for %s?", targetServiceName, app.Name)) | ||||
| 		} | ||||
|  | ||||
| 		logrus.Debugf("running command %s %s within the context of %s_%s", cmdName, parsedCmdArgs, app.StackName(), targetServiceName) | ||||
|  | ||||
| 		Tty = true | ||||
| 		if err := RunCmdRemote(cl, app, abraSh, targetServiceName, cmdName, parsedCmdArgs); err != nil { | ||||
| 			return err | ||||
| 		} | ||||
| 	} | ||||
| 	return nil | ||||
| } | ||||
|  | ||||
| @ -200,75 +171,3 @@ func DeployOverview(app config.App, version, message string) error { | ||||
|  | ||||
| 	return nil | ||||
| } | ||||
|  | ||||
| // NewVersionOverview shows an upgrade or downgrade overview | ||||
| func NewVersionOverview(app config.App, currentVersion, newVersion, releaseNotes string) error { | ||||
| 	tableCol := []string{"server", "recipe", "config", "domain", "current version", "to be deployed"} | ||||
| 	table := formatter.CreateTable(tableCol) | ||||
|  | ||||
| 	deployConfig := "compose.yml" | ||||
| 	if composeFiles, ok := app.Env["COMPOSE_FILE"]; ok { | ||||
| 		deployConfig = strings.Join(strings.Split(composeFiles, ":"), "\n") | ||||
| 	} | ||||
|  | ||||
| 	server := app.Server | ||||
| 	if app.Server == "default" { | ||||
| 		server = "local" | ||||
| 	} | ||||
|  | ||||
| 	table.Append([]string{server, app.Recipe, deployConfig, app.Domain, currentVersion, newVersion}) | ||||
| 	table.Render() | ||||
|  | ||||
| 	if releaseNotes == "" { | ||||
| 		var err error | ||||
| 		releaseNotes, err = GetReleaseNotes(app.Recipe, newVersion) | ||||
| 		if err != nil { | ||||
| 			return err | ||||
| 		} | ||||
| 	} | ||||
|  | ||||
| 	if releaseNotes != "" && newVersion != "" { | ||||
| 		fmt.Println() | ||||
| 		fmt.Println(fmt.Sprintf("%s release notes:\n\n%s", newVersion, releaseNotes)) | ||||
| 	} else { | ||||
| 		logrus.Warnf("no release notes available for %s", newVersion) | ||||
| 	} | ||||
|  | ||||
| 	if NoInput { | ||||
| 		return nil | ||||
| 	} | ||||
|  | ||||
| 	response := false | ||||
| 	prompt := &survey.Confirm{ | ||||
| 		Message: "continue with deployment?", | ||||
| 	} | ||||
|  | ||||
| 	if err := survey.AskOne(prompt, &response); err != nil { | ||||
| 		return err | ||||
| 	} | ||||
|  | ||||
| 	if !response { | ||||
| 		logrus.Fatal("exiting as requested") | ||||
| 	} | ||||
|  | ||||
| 	return nil | ||||
| } | ||||
|  | ||||
| // GetReleaseNotes prints release notes for a recipe version | ||||
| func GetReleaseNotes(recipeName, version string) (string, error) { | ||||
| 	if version == "" { | ||||
| 		return "", nil | ||||
| 	} | ||||
|  | ||||
| 	fpath := path.Join(config.RECIPES_DIR, recipeName, "release", version) | ||||
|  | ||||
| 	if _, err := os.Stat(fpath); !os.IsNotExist(err) { | ||||
| 		releaseNotes, err := ioutil.ReadFile(fpath) | ||||
| 		if err != nil { | ||||
| 			return "", err | ||||
| 		} | ||||
| 		return string(releaseNotes), nil | ||||
| 	} | ||||
|  | ||||
| 	return "", nil | ||||
| } | ||||
|  | ||||
| @ -1,197 +0,0 @@ | ||||
| package internal | ||||
|  | ||||
| import ( | ||||
| 	"fmt" | ||||
| 	"path" | ||||
|  | ||||
| 	"coopcloud.tech/abra/pkg/app" | ||||
| 	"coopcloud.tech/abra/pkg/client" | ||||
| 	"coopcloud.tech/abra/pkg/config" | ||||
| 	"coopcloud.tech/abra/pkg/formatter" | ||||
| 	"coopcloud.tech/abra/pkg/jsontable" | ||||
| 	"coopcloud.tech/abra/pkg/recipe" | ||||
| 	recipePkg "coopcloud.tech/abra/pkg/recipe" | ||||
| 	"coopcloud.tech/abra/pkg/secret" | ||||
| 	"github.com/AlecAivazis/survey/v2" | ||||
| 	dockerClient "github.com/docker/docker/client" | ||||
| 	"github.com/sirupsen/logrus" | ||||
| 	"github.com/urfave/cli" | ||||
| ) | ||||
|  | ||||
| // AppSecrets represents all app secrest | ||||
| type AppSecrets map[string]string | ||||
|  | ||||
| // RecipeName is used for configuring recipe name programmatically | ||||
| var RecipeName string | ||||
|  | ||||
| // createSecrets creates all secrets for a new app. | ||||
| func createSecrets(cl *dockerClient.Client, sanitisedAppName string) (AppSecrets, error) { | ||||
| 	appEnvPath := path.Join(config.ABRA_DIR, "servers", NewAppServer, fmt.Sprintf("%s.env", Domain)) | ||||
| 	appEnv, err := config.ReadEnv(appEnvPath) | ||||
| 	if err != nil { | ||||
| 		return nil, err | ||||
| 	} | ||||
|  | ||||
| 	secretEnvVars := secret.ReadSecretEnvVars(appEnv) | ||||
| 	secrets, err := secret.GenerateSecrets(cl, secretEnvVars, sanitisedAppName, NewAppServer) | ||||
| 	if err != nil { | ||||
| 		return nil, err | ||||
| 	} | ||||
|  | ||||
| 	if Pass { | ||||
| 		for secretName := range secrets { | ||||
| 			secretValue := secrets[secretName] | ||||
| 			if err := secret.PassInsertSecret(secretValue, secretName, Domain, NewAppServer); err != nil { | ||||
| 				return nil, err | ||||
| 			} | ||||
| 		} | ||||
| 	} | ||||
| 	return secrets, nil | ||||
| } | ||||
|  | ||||
| // ensureDomainFlag checks if the domain flag was used. if not, asks the user for it/ | ||||
| func ensureDomainFlag(recipe recipe.Recipe, server string) error { | ||||
| 	if Domain == "" && !NoInput { | ||||
| 		prompt := &survey.Input{ | ||||
| 			Message: "Specify app domain", | ||||
| 			Default: fmt.Sprintf("%s.%s", recipe.Name, server), | ||||
| 		} | ||||
| 		if err := survey.AskOne(prompt, &Domain); err != nil { | ||||
| 			return err | ||||
| 		} | ||||
| 	} | ||||
|  | ||||
| 	if Domain == "" { | ||||
| 		return fmt.Errorf("no domain provided") | ||||
| 	} | ||||
|  | ||||
| 	return nil | ||||
| } | ||||
|  | ||||
| // promptForSecrets asks if we should generate secrets for a new app. | ||||
| func promptForSecrets(appName string) error { | ||||
| 	app, err := app.Get(appName) | ||||
| 	if err != nil { | ||||
| 		return err | ||||
| 	} | ||||
|  | ||||
| 	secretEnvVars := secret.ReadSecretEnvVars(app.Env) | ||||
| 	if len(secretEnvVars) == 0 { | ||||
| 		logrus.Debugf("%s has no secrets to generate, skipping...", app.Recipe) | ||||
| 		return nil | ||||
| 	} | ||||
|  | ||||
| 	if !Secrets && !NoInput { | ||||
| 		prompt := &survey.Confirm{ | ||||
| 			Message: "Generate app secrets?", | ||||
| 		} | ||||
| 		if err := survey.AskOne(prompt, &Secrets); err != nil { | ||||
| 			return err | ||||
| 		} | ||||
| 	} | ||||
|  | ||||
| 	return nil | ||||
| } | ||||
|  | ||||
| // ensureServerFlag checks if the server flag was used. if not, asks the user for it. | ||||
| func ensureServerFlag() error { | ||||
| 	servers, err := config.GetServers() | ||||
| 	if err != nil { | ||||
| 		return err | ||||
| 	} | ||||
|  | ||||
| 	if NewAppServer == "" && !NoInput { | ||||
| 		prompt := &survey.Select{ | ||||
| 			Message: "Select app server:", | ||||
| 			Options: servers, | ||||
| 		} | ||||
| 		if err := survey.AskOne(prompt, &NewAppServer); err != nil { | ||||
| 			return err | ||||
| 		} | ||||
| 	} | ||||
|  | ||||
| 	if NewAppServer == "" { | ||||
| 		return fmt.Errorf("no server provided") | ||||
| 	} | ||||
|  | ||||
| 	return nil | ||||
| } | ||||
|  | ||||
| // NewAction is the new app creation logic | ||||
| func NewAction(c *cli.Context) error { | ||||
| 	recipe := ValidateRecipeWithPrompt(c, false) | ||||
|  | ||||
| 	if err := recipePkg.EnsureUpToDate(recipe.Name); err != nil { | ||||
| 		logrus.Fatal(err) | ||||
| 	} | ||||
|  | ||||
| 	if err := ensureServerFlag(); err != nil { | ||||
| 		logrus.Fatal(err) | ||||
| 	} | ||||
|  | ||||
| 	if err := ensureDomainFlag(recipe, NewAppServer); err != nil { | ||||
| 		logrus.Fatal(err) | ||||
| 	} | ||||
|  | ||||
| 	sanitisedAppName := config.SanitiseAppName(Domain) | ||||
| 	logrus.Debugf("%s sanitised as %s for new app", Domain, sanitisedAppName) | ||||
|  | ||||
| 	if err := config.TemplateAppEnvSample(recipe.Name, Domain, NewAppServer, Domain); err != nil { | ||||
| 		logrus.Fatal(err) | ||||
| 	} | ||||
|  | ||||
| 	if err := promptForSecrets(Domain); err != nil { | ||||
| 		logrus.Fatal(err) | ||||
| 	} | ||||
|  | ||||
| 	cl, err := client.New(NewAppServer) | ||||
| 	if err != nil { | ||||
| 		logrus.Fatal(err) | ||||
| 	} | ||||
|  | ||||
| 	var secrets AppSecrets | ||||
| 	var secretTable *jsontable.JSONTable | ||||
| 	if Secrets { | ||||
| 		secrets, err := createSecrets(cl, sanitisedAppName) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		secretCols := []string{"Name", "Value"} | ||||
| 		secretTable = formatter.CreateTable(secretCols) | ||||
| 		for secret := range secrets { | ||||
| 			secretTable.Append([]string{secret, secrets[secret]}) | ||||
| 		} | ||||
|  | ||||
| 	} | ||||
|  | ||||
| 	if NewAppServer == "default" { | ||||
| 		NewAppServer = "local" | ||||
| 	} | ||||
|  | ||||
| 	tableCol := []string{"server", "recipe", "domain"} | ||||
| 	table := formatter.CreateTable(tableCol) | ||||
| 	table.Append([]string{NewAppServer, recipe.Name, Domain}) | ||||
|  | ||||
| 	fmt.Println("") | ||||
| 	fmt.Println(fmt.Sprintf("A new %s app has been created! Here is an overview:", recipe.Name)) | ||||
| 	fmt.Println("") | ||||
| 	table.Render() | ||||
| 	fmt.Println("") | ||||
| 	fmt.Println("You can configure this app by running the following:") | ||||
| 	fmt.Println(fmt.Sprintf("\n    abra app config %s", Domain)) | ||||
| 	fmt.Println("") | ||||
| 	fmt.Println("You can deploy this app by running the following:") | ||||
| 	fmt.Println(fmt.Sprintf("\n    abra app deploy %s", Domain)) | ||||
| 	fmt.Println("") | ||||
|  | ||||
| 	if len(secrets) > 0 { | ||||
| 		fmt.Println("Here are your generated secrets:") | ||||
| 		fmt.Println("") | ||||
| 		secretTable.Render() | ||||
| 		fmt.Println("") | ||||
| 		logrus.Warn("generated secrets are not shown again, please take note of them *now*") | ||||
| 	} | ||||
|  | ||||
| 	return nil | ||||
| } | ||||
| @ -6,7 +6,7 @@ import ( | ||||
| 	"coopcloud.tech/abra/pkg/formatter" | ||||
| 	"coopcloud.tech/abra/pkg/recipe" | ||||
| 	"github.com/AlecAivazis/survey/v2" | ||||
| 	"github.com/docker/distribution/reference" | ||||
| 	"github.com/distribution/reference" | ||||
| 	"github.com/sirupsen/logrus" | ||||
| ) | ||||
|  | ||||
|  | ||||
| @ -2,8 +2,6 @@ package internal | ||||
|  | ||||
| import ( | ||||
| 	"errors" | ||||
| 	"fmt" | ||||
| 	"os" | ||||
| 	"strings" | ||||
|  | ||||
| 	"coopcloud.tech/abra/pkg/app" | ||||
| @ -14,52 +12,14 @@ import ( | ||||
| 	"github.com/urfave/cli" | ||||
| ) | ||||
|  | ||||
| // AppName is used for configuring app name programmatically | ||||
| var AppName string | ||||
|  | ||||
| // ValidateRecipe ensures the recipe arg is valid. | ||||
| func ValidateRecipe(c *cli.Context, ensureLatest bool) recipe.Recipe { | ||||
| 	recipeName := c.Args().First() | ||||
|  | ||||
| 	if recipeName == "" { | ||||
| 		ShowSubcommandHelpAndError(c, errors.New("no recipe name provided")) | ||||
| 	} | ||||
|  | ||||
| 	chosenRecipe, err := recipe.Get(recipeName) | ||||
| 	if err != nil { | ||||
| 		if c.Command.Name == "generate" { | ||||
| 			if strings.Contains(err.Error(), "missing a compose") { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
| 			logrus.Warn(err) | ||||
| 		} else { | ||||
| 			if strings.Contains(err.Error(), "template_driver is not allowed") { | ||||
| 				logrus.Warnf("ensure %s recipe compose.* files include \"version: '3.8'\"", recipeName) | ||||
| 			} | ||||
| 			logrus.Fatalf("unable to validate recipe: %s", err) | ||||
| 		} | ||||
| 	} | ||||
|  | ||||
| 	if ensureLatest { | ||||
| 		if err := recipe.EnsureLatest(recipeName); err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
| 	} | ||||
|  | ||||
| 	logrus.Debugf("validated %s as recipe argument", recipeName) | ||||
|  | ||||
| 	return chosenRecipe | ||||
| } | ||||
|  | ||||
| // ValidateRecipeWithPrompt ensures a recipe argument is present before | ||||
| // validating, asking for input if required. | ||||
| func ValidateRecipeWithPrompt(c *cli.Context, ensureLatest bool) recipe.Recipe { | ||||
| func ValidateRecipe(c *cli.Context) recipe.Recipe { | ||||
| 	recipeName := c.Args().First() | ||||
|  | ||||
| 	if recipeName == "" && !NoInput { | ||||
| 		var recipes []string | ||||
|  | ||||
| 		catl, err := recipe.ReadRecipeCatalogue() | ||||
| 		catl, err := recipe.ReadRecipeCatalogue(Offline) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
| @ -93,23 +53,22 @@ func ValidateRecipeWithPrompt(c *cli.Context, ensureLatest bool) recipe.Recipe { | ||||
| 		} | ||||
| 	} | ||||
|  | ||||
| 	if RecipeName != "" { | ||||
| 		recipeName = RecipeName | ||||
| 		logrus.Debugf("programmatically setting recipe name to %s", recipeName) | ||||
| 	} | ||||
|  | ||||
| 	if recipeName == "" { | ||||
| 		ShowSubcommandHelpAndError(c, errors.New("no recipe name provided")) | ||||
| 	} | ||||
|  | ||||
| 	chosenRecipe, err := recipe.Get(recipeName) | ||||
| 	chosenRecipe, err := recipe.Get(recipeName, Offline) | ||||
| 	if err != nil { | ||||
| 		logrus.Fatal(err) | ||||
| 	} | ||||
|  | ||||
| 	if ensureLatest { | ||||
| 		if err := recipe.EnsureLatest(recipeName); err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		if c.Command.Name == "generate" { | ||||
| 			if strings.Contains(err.Error(), "missing a compose") { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
| 			logrus.Warn(err) | ||||
| 		} else { | ||||
| 			if strings.Contains(err.Error(), "template_driver is not allowed") { | ||||
| 				logrus.Warnf("ensure %s recipe compose.* files include \"version: '3.8'\"", recipeName) | ||||
| 			} | ||||
| 			logrus.Fatalf("unable to validate recipe: %s", err) | ||||
| 		} | ||||
| 	} | ||||
|  | ||||
| @ -122,11 +81,6 @@ func ValidateRecipeWithPrompt(c *cli.Context, ensureLatest bool) recipe.Recipe { | ||||
| func ValidateApp(c *cli.Context) config.App { | ||||
| 	appName := c.Args().First() | ||||
|  | ||||
| 	if AppName != "" { | ||||
| 		appName = AppName | ||||
| 		logrus.Debugf("programmatically setting app name to %s", appName) | ||||
| 	} | ||||
|  | ||||
| 	if appName == "" { | ||||
| 		ShowSubcommandHelpAndError(c, errors.New("no app provided")) | ||||
| 	} | ||||
| @ -136,10 +90,6 @@ func ValidateApp(c *cli.Context) config.App { | ||||
| 		logrus.Fatal(err) | ||||
| 	} | ||||
|  | ||||
| 	if err := recipe.EnsureExists(app.Recipe); err != nil { | ||||
| 		logrus.Fatal(err) | ||||
| 	} | ||||
|  | ||||
| 	logrus.Debugf("validated %s as app argument", appName) | ||||
|  | ||||
| 	return app | ||||
| @ -208,309 +158,15 @@ func ValidateServer(c *cli.Context) string { | ||||
| 		} | ||||
| 	} | ||||
|  | ||||
| 	if !matched { | ||||
| 		ShowSubcommandHelpAndError(c, errors.New("server doesn't exist?")) | ||||
| 	} | ||||
|  | ||||
| 	if serverName == "" { | ||||
| 		ShowSubcommandHelpAndError(c, errors.New("no server provided")) | ||||
| 	} | ||||
|  | ||||
| 	if !matched { | ||||
| 		ShowSubcommandHelpAndError(c, errors.New("server doesn't exist?")) | ||||
| 	} | ||||
|  | ||||
| 	logrus.Debugf("validated %s as server argument", serverName) | ||||
|  | ||||
| 	return serverName | ||||
| } | ||||
|  | ||||
| // EnsureDNSProvider ensures a DNS provider is chosen. | ||||
| func EnsureDNSProvider() error { | ||||
| 	if DNSProvider == "" && !NoInput { | ||||
| 		prompt := &survey.Select{ | ||||
| 			Message: "Select DNS provider", | ||||
| 			Options: []string{"gandi"}, | ||||
| 		} | ||||
|  | ||||
| 		if err := survey.AskOne(prompt, &DNSProvider); err != nil { | ||||
| 			return err | ||||
| 		} | ||||
| 	} | ||||
|  | ||||
| 	if DNSProvider == "" { | ||||
| 		return fmt.Errorf("missing DNS provider?") | ||||
| 	} | ||||
|  | ||||
| 	return nil | ||||
| } | ||||
|  | ||||
| // EnsureDNSTypeFlag ensures a DNS type flag is present. | ||||
| func EnsureDNSTypeFlag(c *cli.Context) error { | ||||
| 	if DNSType == "" && !NoInput { | ||||
| 		prompt := &survey.Input{ | ||||
| 			Message: "Specify DNS record type", | ||||
| 			Default: "A", | ||||
| 		} | ||||
| 		if err := survey.AskOne(prompt, &DNSType); err != nil { | ||||
| 			return err | ||||
| 		} | ||||
| 	} | ||||
|  | ||||
| 	if DNSType == "" { | ||||
| 		ShowSubcommandHelpAndError(c, errors.New("no record type provided")) | ||||
| 	} | ||||
|  | ||||
| 	return nil | ||||
| } | ||||
|  | ||||
| // EnsureDNSNameFlag ensures a DNS name flag is present. | ||||
| func EnsureDNSNameFlag(c *cli.Context) error { | ||||
| 	if DNSName == "" && !NoInput { | ||||
| 		prompt := &survey.Input{ | ||||
| 			Message: "Specify DNS record name", | ||||
| 			Default: "mysubdomain", | ||||
| 		} | ||||
| 		if err := survey.AskOne(prompt, &DNSName); err != nil { | ||||
| 			return err | ||||
| 		} | ||||
| 	} | ||||
|  | ||||
| 	if DNSName == "" { | ||||
| 		ShowSubcommandHelpAndError(c, errors.New("no record name provided")) | ||||
| 	} | ||||
|  | ||||
| 	return nil | ||||
| } | ||||
|  | ||||
| // EnsureDNSValueFlag ensures a DNS value flag is present. | ||||
| func EnsureDNSValueFlag(c *cli.Context) error { | ||||
| 	if DNSValue == "" && !NoInput { | ||||
| 		prompt := &survey.Input{ | ||||
| 			Message: "Specify DNS record value", | ||||
| 			Default: "192.168.1.2", | ||||
| 		} | ||||
| 		if err := survey.AskOne(prompt, &DNSValue); err != nil { | ||||
| 			return err | ||||
| 		} | ||||
| 	} | ||||
|  | ||||
| 	if DNSValue == "" { | ||||
| 		ShowSubcommandHelpAndError(c, errors.New("no record value provided")) | ||||
| 	} | ||||
|  | ||||
| 	return nil | ||||
| } | ||||
|  | ||||
| // EnsureZoneArgument ensures a zone argument is present. | ||||
| func EnsureZoneArgument(c *cli.Context) (string, error) { | ||||
| 	zone := c.Args().First() | ||||
|  | ||||
| 	if zone == "" && !NoInput { | ||||
| 		prompt := &survey.Input{ | ||||
| 			Message: "Specify a domain name zone", | ||||
| 			Default: "example.com", | ||||
| 		} | ||||
|  | ||||
| 		if err := survey.AskOne(prompt, &zone); err != nil { | ||||
| 			return zone, err | ||||
| 		} | ||||
| 	} | ||||
|  | ||||
| 	if zone == "" { | ||||
| 		ShowSubcommandHelpAndError(c, errors.New("no zone value provided")) | ||||
| 	} | ||||
|  | ||||
| 	return zone, nil | ||||
| } | ||||
|  | ||||
| // EnsureServerProvider ensures a 3rd party server provider is chosen. | ||||
| func EnsureServerProvider() error { | ||||
| 	if ServerProvider == "" && !NoInput { | ||||
| 		prompt := &survey.Select{ | ||||
| 			Message: "Select server provider", | ||||
| 			Options: []string{"capsul", "hetzner-cloud"}, | ||||
| 		} | ||||
|  | ||||
| 		if err := survey.AskOne(prompt, &ServerProvider); err != nil { | ||||
| 			return err | ||||
| 		} | ||||
| 	} | ||||
|  | ||||
| 	if ServerProvider == "" { | ||||
| 		return fmt.Errorf("missing server provider?") | ||||
| 	} | ||||
|  | ||||
| 	return nil | ||||
| } | ||||
|  | ||||
| // EnsureNewCapsulVPSFlags ensure all flags are present. | ||||
| func EnsureNewCapsulVPSFlags(c *cli.Context) error { | ||||
| 	if CapsulName == "" && !NoInput { | ||||
| 		prompt := &survey.Input{ | ||||
| 			Message: "specify capsul name", | ||||
| 		} | ||||
| 		if err := survey.AskOne(prompt, &CapsulName); err != nil { | ||||
| 			return err | ||||
| 		} | ||||
| 	} | ||||
|  | ||||
| 	if !NoInput { | ||||
| 		prompt := &survey.Input{ | ||||
| 			Message: "specify capsul instance URL", | ||||
| 			Default: CapsulInstanceURL, | ||||
| 		} | ||||
| 		if err := survey.AskOne(prompt, &CapsulInstanceURL); err != nil { | ||||
| 			return err | ||||
| 		} | ||||
| 	} | ||||
|  | ||||
| 	if !NoInput { | ||||
| 		prompt := &survey.Input{ | ||||
| 			Message: "specify capsul type", | ||||
| 			Default: CapsulType, | ||||
| 		} | ||||
| 		if err := survey.AskOne(prompt, &CapsulType); err != nil { | ||||
| 			return err | ||||
| 		} | ||||
| 	} | ||||
|  | ||||
| 	if !NoInput { | ||||
| 		prompt := &survey.Input{ | ||||
| 			Message: "specify capsul image", | ||||
| 			Default: CapsulImage, | ||||
| 		} | ||||
| 		if err := survey.AskOne(prompt, &CapsulImage); err != nil { | ||||
| 			return err | ||||
| 		} | ||||
| 	} | ||||
|  | ||||
| 	if len(CapsulSSHKeys.Value()) == 0 && !NoInput { | ||||
| 		var sshKeys string | ||||
| 		prompt := &survey.Input{ | ||||
| 			Message: "specify capsul SSH keys (e.g. me@foo.com)", | ||||
| 			Default: "", | ||||
| 		} | ||||
| 		if err := survey.AskOne(prompt, &CapsulSSHKeys); err != nil { | ||||
| 			return err | ||||
| 		} | ||||
| 		CapsulSSHKeys = cli.StringSlice(strings.Split(sshKeys, ",")) | ||||
| 	} | ||||
|  | ||||
| 	if CapsulAPIToken == "" && !NoInput { | ||||
| 		token, ok := os.LookupEnv("CAPSUL_TOKEN") | ||||
| 		if !ok { | ||||
| 			prompt := &survey.Input{ | ||||
| 				Message: "specify capsul API token", | ||||
| 			} | ||||
| 			if err := survey.AskOne(prompt, &CapsulAPIToken); err != nil { | ||||
| 				return err | ||||
| 			} | ||||
| 		} else { | ||||
| 			CapsulAPIToken = token | ||||
| 		} | ||||
| 	} | ||||
|  | ||||
| 	if CapsulName == "" { | ||||
| 		ShowSubcommandHelpAndError(c, fmt.Errorf("missing capsul name?")) | ||||
| 	} | ||||
| 	if CapsulInstanceURL == "" { | ||||
| 		ShowSubcommandHelpAndError(c, fmt.Errorf("missing capsul instance url?")) | ||||
| 	} | ||||
| 	if CapsulType == "" { | ||||
| 		ShowSubcommandHelpAndError(c, fmt.Errorf("missing capsul type?")) | ||||
| 	} | ||||
| 	if CapsulImage == "" { | ||||
| 		ShowSubcommandHelpAndError(c, fmt.Errorf("missing capsul image?")) | ||||
| 	} | ||||
| 	if len(CapsulSSHKeys.Value()) == 0 { | ||||
| 		ShowSubcommandHelpAndError(c, fmt.Errorf("missing capsul ssh keys?")) | ||||
| 	} | ||||
| 	if CapsulAPIToken == "" { | ||||
| 		ShowSubcommandHelpAndError(c, fmt.Errorf("missing capsul API token?")) | ||||
| 	} | ||||
|  | ||||
| 	return nil | ||||
| } | ||||
|  | ||||
| // EnsureNewHetznerCloudVPSFlags ensure all flags are present. | ||||
| func EnsureNewHetznerCloudVPSFlags(c *cli.Context) error { | ||||
| 	if HetznerCloudName == "" && !NoInput { | ||||
| 		prompt := &survey.Input{ | ||||
| 			Message: "specify hetzner cloud VPS name", | ||||
| 		} | ||||
| 		if err := survey.AskOne(prompt, &HetznerCloudName); err != nil { | ||||
| 			return err | ||||
| 		} | ||||
| 	} | ||||
|  | ||||
| 	if !NoInput { | ||||
| 		prompt := &survey.Input{ | ||||
| 			Message: "specify hetzner cloud VPS type", | ||||
| 			Default: HetznerCloudType, | ||||
| 		} | ||||
| 		if err := survey.AskOne(prompt, &HetznerCloudType); err != nil { | ||||
| 			return err | ||||
| 		} | ||||
| 	} | ||||
|  | ||||
| 	if !NoInput { | ||||
| 		prompt := &survey.Input{ | ||||
| 			Message: "specify hetzner cloud VPS image", | ||||
| 			Default: HetznerCloudImage, | ||||
| 		} | ||||
| 		if err := survey.AskOne(prompt, &HetznerCloudImage); err != nil { | ||||
| 			return err | ||||
| 		} | ||||
| 	} | ||||
|  | ||||
| 	if len(HetznerCloudSSHKeys.Value()) == 0 && !NoInput { | ||||
| 		var sshKeys string | ||||
| 		prompt := &survey.Input{ | ||||
| 			Message: "specify hetzner cloud SSH keys (e.g. me@foo.com)", | ||||
| 			Default: "", | ||||
| 		} | ||||
| 		if err := survey.AskOne(prompt, &sshKeys); err != nil { | ||||
| 			return err | ||||
| 		} | ||||
| 		HetznerCloudSSHKeys = cli.StringSlice(strings.Split(sshKeys, ",")) | ||||
| 	} | ||||
|  | ||||
| 	if !NoInput { | ||||
| 		prompt := &survey.Input{ | ||||
| 			Message: "specify hetzner cloud VPS location", | ||||
| 			Default: HetznerCloudLocation, | ||||
| 		} | ||||
| 		if err := survey.AskOne(prompt, &HetznerCloudLocation); err != nil { | ||||
| 			return err | ||||
| 		} | ||||
| 	} | ||||
|  | ||||
| 	if HetznerCloudAPIToken == "" && !NoInput { | ||||
| 		token, ok := os.LookupEnv("HCLOUD_TOKEN") | ||||
| 		if !ok { | ||||
| 			prompt := &survey.Input{ | ||||
| 				Message: "specify hetzner cloud API token", | ||||
| 			} | ||||
| 			if err := survey.AskOne(prompt, &HetznerCloudAPIToken); err != nil { | ||||
| 				return err | ||||
| 			} | ||||
| 		} else { | ||||
| 			HetznerCloudAPIToken = token | ||||
| 		} | ||||
| 	} | ||||
|  | ||||
| 	if HetznerCloudName == "" { | ||||
| 		ShowSubcommandHelpAndError(c, fmt.Errorf("missing hetzner cloud VPS name?")) | ||||
| 	} | ||||
| 	if HetznerCloudType == "" { | ||||
| 		ShowSubcommandHelpAndError(c, fmt.Errorf("missing hetzner cloud VPS type?")) | ||||
| 	} | ||||
| 	if HetznerCloudImage == "" { | ||||
| 		ShowSubcommandHelpAndError(c, fmt.Errorf("missing hetzner cloud image?")) | ||||
| 	} | ||||
| 	if HetznerCloudLocation == "" { | ||||
| 		ShowSubcommandHelpAndError(c, fmt.Errorf("missing hetzner cloud VPS location?")) | ||||
| 	} | ||||
| 	if HetznerCloudAPIToken == "" { | ||||
| 		ShowSubcommandHelpAndError(c, fmt.Errorf("missing hetzner cloud API token?")) | ||||
| 	} | ||||
|  | ||||
| 	return nil | ||||
| } | ||||
|  | ||||
							
								
								
									
										40
									
								
								cli/recipe/diff.go
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										40
									
								
								cli/recipe/diff.go
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,40 @@ | ||||
| package recipe | ||||
|  | ||||
| import ( | ||||
| 	"path" | ||||
|  | ||||
| 	"coopcloud.tech/abra/cli/internal" | ||||
| 	"coopcloud.tech/abra/pkg/autocomplete" | ||||
| 	"coopcloud.tech/abra/pkg/config" | ||||
| 	gitPkg "coopcloud.tech/abra/pkg/git" | ||||
| 	"github.com/sirupsen/logrus" | ||||
| 	"github.com/urfave/cli" | ||||
| ) | ||||
|  | ||||
| var recipeDiffCommand = cli.Command{ | ||||
| 	Name:        "diff", | ||||
| 	Usage:       "Show unstaged changes in recipe config", | ||||
| 	Description: "Due to limitations in our underlying Git dependency, this command requires /usr/bin/git.", | ||||
| 	Aliases:     []string{"d"}, | ||||
| 	ArgsUsage:   "<recipe>", | ||||
| 	Flags: []cli.Flag{ | ||||
| 		internal.DebugFlag, | ||||
| 		internal.NoInputFlag, | ||||
| 	}, | ||||
| 	Before:       internal.SubCommandBefore, | ||||
| 	BashComplete: autocomplete.RecipeNameComplete, | ||||
| 	Action: func(c *cli.Context) error { | ||||
| 		recipeName := c.Args().First() | ||||
|  | ||||
| 		if recipeName != "" { | ||||
| 			internal.ValidateRecipe(c) | ||||
| 		} | ||||
|  | ||||
| 		recipeDir := path.Join(config.RECIPES_DIR, recipeName) | ||||
| 		if err := gitPkg.DiffUnstaged(recipeDir); err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		return nil | ||||
| 	}, | ||||
| } | ||||
| @ -3,6 +3,7 @@ package recipe | ||||
| import ( | ||||
| 	"coopcloud.tech/abra/cli/internal" | ||||
| 	"coopcloud.tech/abra/pkg/autocomplete" | ||||
| 	"coopcloud.tech/abra/pkg/formatter" | ||||
| 	"coopcloud.tech/abra/pkg/recipe" | ||||
| 	"github.com/sirupsen/logrus" | ||||
| 	"github.com/urfave/cli" | ||||
| @ -10,29 +11,38 @@ import ( | ||||
|  | ||||
| var recipeFetchCommand = cli.Command{ | ||||
| 	Name:        "fetch", | ||||
| 	Usage:       "Fetch recipe local copies", | ||||
| 	Usage:       "Fetch recipe(s)", | ||||
| 	Aliases:     []string{"f"}, | ||||
| 	ArgsUsage:   "[<recipe>]", | ||||
| 	Description: "Fetchs all recipes without arguments.", | ||||
| 	Description: "Retrieves all recipes if no <recipe> argument is passed", | ||||
| 	Flags: []cli.Flag{ | ||||
| 		internal.DebugFlag, | ||||
| 		internal.NoInputFlag, | ||||
| 		internal.OfflineFlag, | ||||
| 	}, | ||||
| 	Before:       internal.SubCommandBefore, | ||||
| 	BashComplete: autocomplete.RecipeNameComplete, | ||||
| 	Action: func(c *cli.Context) error { | ||||
| 		recipeName := c.Args().First() | ||||
| 		if recipeName != "" { | ||||
| 			internal.ValidateRecipe(c, true) | ||||
| 			return nil // ValidateRecipe ensures latest checkout | ||||
| 			internal.ValidateRecipe(c) | ||||
| 			if err := recipe.Ensure(recipeName); err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
| 			return nil | ||||
| 		} | ||||
|  | ||||
| 		repos, err := recipe.ReadReposMetadata() | ||||
| 		catalogue, err := recipe.ReadRecipeCatalogue(internal.Offline) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		if err := recipe.UpdateRepositories(repos, recipeName); err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		catlBar := formatter.CreateProgressbar(len(catalogue), "fetching latest recipes...") | ||||
| 		for recipeName := range catalogue { | ||||
| 			if err := recipe.Ensure(recipeName); err != nil { | ||||
| 				logrus.Error(err) | ||||
| 			} | ||||
| 			catlBar.Add(1) | ||||
| 		} | ||||
|  | ||||
| 		return nil | ||||
|  | ||||
| @ -20,16 +20,35 @@ var recipeLintCommand = cli.Command{ | ||||
| 	Flags: []cli.Flag{ | ||||
| 		internal.DebugFlag, | ||||
| 		internal.OnlyErrorFlag, | ||||
| 		internal.OfflineFlag, | ||||
| 		internal.NoInputFlag, | ||||
| 		internal.ChaosFlag, | ||||
| 	}, | ||||
| 	Before:       internal.SubCommandBefore, | ||||
| 	BashComplete: autocomplete.RecipeNameComplete, | ||||
| 	Action: func(c *cli.Context) error { | ||||
| 		recipe := internal.ValidateRecipe(c, true) | ||||
| 		recipe := internal.ValidateRecipe(c) | ||||
|  | ||||
| 		if err := recipePkg.EnsureUpToDate(recipe.Name); err != nil { | ||||
| 		if err := recipePkg.EnsureExists(recipe.Name); err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		if !internal.Chaos { | ||||
| 			if err := recipePkg.EnsureIsClean(recipe.Name); err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
|  | ||||
| 			if !internal.Offline { | ||||
| 				if err := recipePkg.EnsureUpToDate(recipe.Name); err != nil { | ||||
| 					logrus.Fatal(err) | ||||
| 				} | ||||
| 			} | ||||
|  | ||||
| 			if err := recipePkg.EnsureLatest(recipe.Name); err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
| 		} | ||||
|  | ||||
| 		tableCol := []string{"ref", "rule", "severity", "satisfied", "skipped", "resolve"} | ||||
| 		table := formatter.CreateTable(tableCol) | ||||
|  | ||||
| @ -49,7 +68,7 @@ var recipeLintCommand = cli.Command{ | ||||
|  | ||||
| 				skippedOutput := "-" | ||||
| 				if skipped { | ||||
| 					skippedOutput = "yes" | ||||
| 					skippedOutput = "✅" | ||||
| 				} | ||||
|  | ||||
| 				satisfied := false | ||||
| @ -68,9 +87,9 @@ var recipeLintCommand = cli.Command{ | ||||
| 					} | ||||
| 				} | ||||
|  | ||||
| 				satisfiedOutput := "yes" | ||||
| 				satisfiedOutput := "✅" | ||||
| 				if !satisfied { | ||||
| 					satisfiedOutput = "NO" | ||||
| 					satisfiedOutput = "❌" | ||||
| 					if skipped { | ||||
| 						satisfiedOutput = "-" | ||||
| 					} | ||||
|  | ||||
| @ -29,10 +29,11 @@ var recipeListCommand = cli.Command{ | ||||
| 		internal.DebugFlag, | ||||
| 		internal.MachineReadableFlag, | ||||
| 		patternFlag, | ||||
| 		internal.OfflineFlag, | ||||
| 	}, | ||||
| 	Before: internal.SubCommandBefore, | ||||
| 	Action: func(c *cli.Context) error { | ||||
| 		catl, err := recipe.ReadRecipeCatalogue() | ||||
| 		catl, err := recipe.ReadRecipeCatalogue(internal.Offline) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err.Error()) | ||||
| 		} | ||||
|  | ||||
| @ -36,6 +36,7 @@ var recipeNewCommand = cli.Command{ | ||||
| 	Flags: []cli.Flag{ | ||||
| 		internal.DebugFlag, | ||||
| 		internal.NoInputFlag, | ||||
| 		internal.OfflineFlag, | ||||
| 	}, | ||||
| 	Before:    internal.SubCommandBefore, | ||||
| 	Usage:     "Create a new recipe", | ||||
|  | ||||
| @ -30,5 +30,7 @@ manner. Abra supports convenient automation for recipe maintainenace, see the | ||||
| 		recipeSyncCommand, | ||||
| 		recipeUpgradeCommand, | ||||
| 		recipeVersionCommand, | ||||
| 		recipeResetCommand, | ||||
| 		recipeDiffCommand, | ||||
| 	}, | ||||
| } | ||||
|  | ||||
| @ -1,7 +1,9 @@ | ||||
| package recipe | ||||
|  | ||||
| import ( | ||||
| 	"errors" | ||||
| 	"fmt" | ||||
| 	"os" | ||||
| 	"path" | ||||
| 	"strconv" | ||||
| 	"strings" | ||||
| @ -15,7 +17,7 @@ import ( | ||||
| 	recipePkg "coopcloud.tech/abra/pkg/recipe" | ||||
| 	"coopcloud.tech/tagcmp" | ||||
| 	"github.com/AlecAivazis/survey/v2" | ||||
| 	"github.com/docker/distribution/reference" | ||||
| 	"github.com/distribution/reference" | ||||
| 	"github.com/go-git/go-git/v5" | ||||
| 	"github.com/sirupsen/logrus" | ||||
| 	"github.com/urfave/cli" | ||||
| @ -54,11 +56,12 @@ your SSH keys configured on your account. | ||||
| 		internal.MinorFlag, | ||||
| 		internal.PatchFlag, | ||||
| 		internal.PublishFlag, | ||||
| 		internal.OfflineFlag, | ||||
| 	}, | ||||
| 	Before:       internal.SubCommandBefore, | ||||
| 	BashComplete: autocomplete.RecipeNameComplete, | ||||
| 	Action: func(c *cli.Context) error { | ||||
| 		recipe := internal.ValidateRecipeWithPrompt(c, false) | ||||
| 		recipe := internal.ValidateRecipe(c) | ||||
|  | ||||
| 		imagesTmp, err := getImageVersions(recipe) | ||||
| 		if err != nil { | ||||
| @ -105,6 +108,18 @@ your SSH keys configured on your account. | ||||
| 			} | ||||
| 		} | ||||
|  | ||||
| 		isClean, err := gitPkg.IsClean(recipe.Dir()) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		if !isClean { | ||||
| 			logrus.Infof("%s currently has these unstaged changes 👇", recipe.Name) | ||||
| 			if err := gitPkg.DiffUnstaged(recipe.Dir()); err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
| 		} | ||||
|  | ||||
| 		if len(tags) > 0 { | ||||
| 			logrus.Warnf("previous git tags detected, assuming this is a new semver release") | ||||
| 			if err := createReleaseFromPreviousTag(tagString, mainAppVersion, recipe, tags); err != nil { | ||||
| @ -127,7 +142,7 @@ your SSH keys configured on your account. | ||||
|  | ||||
| // getImageVersions retrieves image versions for a recipe | ||||
| func getImageVersions(recipe recipe.Recipe) (map[string]string, error) { | ||||
| 	var services = make(map[string]string) | ||||
| 	services := make(map[string]string) | ||||
|  | ||||
| 	missingTag := false | ||||
| 	for _, service := range recipe.Config.Services { | ||||
| @ -194,6 +209,10 @@ func createReleaseFromTag(recipe recipe.Recipe, tagString, mainAppVersion string | ||||
| 		tagString = fmt.Sprintf("%s+%s", tag.String(), mainAppVersion) | ||||
| 	} | ||||
|  | ||||
| 	if err := addReleaseNotes(recipe, tagString); err != nil { | ||||
| 		logrus.Fatal(err) | ||||
| 	} | ||||
|  | ||||
| 	if err := commitRelease(recipe, tagString); err != nil { | ||||
| 		logrus.Fatal(err) | ||||
| 	} | ||||
| @ -224,6 +243,82 @@ func getTagCreateOptions(tag string) (git.CreateTagOptions, error) { | ||||
| 	return git.CreateTagOptions{Message: msg}, nil | ||||
| } | ||||
|  | ||||
| // addReleaseNotes checks if the release/next release note exists and moves the | ||||
| // file to release/<tag>. | ||||
| func addReleaseNotes(recipe recipe.Recipe, tag string) error { | ||||
| 	repoPath := path.Join(config.RECIPES_DIR, recipe.Name) | ||||
| 	tagReleaseNotePath := path.Join(repoPath, "release", tag) | ||||
| 	if _, err := os.Stat(tagReleaseNotePath); err == nil { | ||||
| 		// Release note for current tag already exist exists. | ||||
| 		return nil | ||||
| 	} else if !errors.Is(err, os.ErrNotExist) { | ||||
| 		return err | ||||
| 	} | ||||
|  | ||||
| 	nextReleaseNotePath := path.Join(repoPath, "release", "next") | ||||
| 	if _, err := os.Stat(nextReleaseNotePath); err == nil { | ||||
| 		// release/next note exists. Move it to release/<tag> | ||||
| 		if internal.Dry { | ||||
| 			logrus.Debugf("dry run: move release note from 'next' to %s", tag) | ||||
| 			return nil | ||||
| 		} | ||||
| 		if !internal.NoInput { | ||||
| 			prompt := &survey.Input{ | ||||
| 				Message: "Use release note in release/next?", | ||||
| 			} | ||||
| 			var addReleaseNote bool | ||||
| 			if err := survey.AskOne(prompt, &addReleaseNote); err != nil { | ||||
| 				return err | ||||
| 			} | ||||
| 			if !addReleaseNote { | ||||
| 				return nil | ||||
| 			} | ||||
| 		} | ||||
| 		err := os.Rename(nextReleaseNotePath, tagReleaseNotePath) | ||||
| 		if err != nil { | ||||
| 			return err | ||||
| 		} | ||||
| 		err = gitPkg.Add(repoPath, path.Join("release", "next"), internal.Dry) | ||||
| 		if err != nil { | ||||
| 			return err | ||||
| 		} | ||||
| 		err = gitPkg.Add(repoPath, path.Join("release", tag), internal.Dry) | ||||
| 		if err != nil { | ||||
| 			return err | ||||
| 		} | ||||
| 	} else if !errors.Is(err, os.ErrNotExist) { | ||||
| 		return err | ||||
| 	} | ||||
|  | ||||
| 	// No release note exists for the current release. | ||||
| 	if internal.NoInput { | ||||
| 		return nil | ||||
| 	} | ||||
|  | ||||
| 	prompt := &survey.Input{ | ||||
| 		Message: "Release Note (leave empty for no release note)", | ||||
| 	} | ||||
| 	var releaseNote string | ||||
| 	if err := survey.AskOne(prompt, &releaseNote); err != nil { | ||||
| 		return err | ||||
| 	} | ||||
|  | ||||
| 	if releaseNote == "" { | ||||
| 		return nil | ||||
| 	} | ||||
|  | ||||
| 	err := os.WriteFile(tagReleaseNotePath, []byte(releaseNote), 0o644) | ||||
| 	if err != nil { | ||||
| 		return err | ||||
| 	} | ||||
| 	err = gitPkg.Add(repoPath, path.Join("release", tag), internal.Dry) | ||||
| 	if err != nil { | ||||
| 		return err | ||||
| 	} | ||||
|  | ||||
| 	return nil | ||||
| } | ||||
|  | ||||
| func commitRelease(recipe recipe.Recipe, tag string) error { | ||||
| 	if internal.Dry { | ||||
| 		logrus.Debugf("dry run: no changes committed") | ||||
| @ -243,7 +338,7 @@ func commitRelease(recipe recipe.Recipe, tag string) error { | ||||
|  | ||||
| 	msg := fmt.Sprintf("chore: publish %s release", tag) | ||||
| 	repoPath := path.Join(config.RECIPES_DIR, recipe.Name) | ||||
| 	if err := gitPkg.Commit(repoPath, ".", msg, internal.Dry); err != nil { | ||||
| 	if err := gitPkg.Commit(repoPath, msg, internal.Dry); err != nil { | ||||
| 		return err | ||||
| 	} | ||||
|  | ||||
| @ -391,6 +486,10 @@ func createReleaseFromPreviousTag(tagString, mainAppVersion string, recipe recip | ||||
| 		} | ||||
| 	} | ||||
|  | ||||
| 	if err := addReleaseNotes(recipe, tagString); err != nil { | ||||
| 		logrus.Fatal(err) | ||||
| 	} | ||||
|  | ||||
| 	if err := commitRelease(recipe, tagString); err != nil { | ||||
| 		logrus.Fatalf("failed to commit changes: %s", err.Error()) | ||||
| 	} | ||||
|  | ||||
							
								
								
									
										56
									
								
								cli/recipe/reset.go
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										56
									
								
								cli/recipe/reset.go
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,56 @@ | ||||
| package recipe | ||||
|  | ||||
| import ( | ||||
| 	"path" | ||||
|  | ||||
| 	"coopcloud.tech/abra/cli/internal" | ||||
| 	"coopcloud.tech/abra/pkg/autocomplete" | ||||
| 	"coopcloud.tech/abra/pkg/config" | ||||
| 	"github.com/go-git/go-git/v5" | ||||
| 	"github.com/sirupsen/logrus" | ||||
| 	"github.com/urfave/cli" | ||||
| ) | ||||
|  | ||||
| var recipeResetCommand = cli.Command{ | ||||
| 	Name:        "reset", | ||||
| 	Usage:       "Remove all unstaged changes from recipe config", | ||||
| 	Description: "WARNING, this will delete your changes. Be Careful.", | ||||
| 	Aliases:     []string{"rs"}, | ||||
| 	ArgsUsage:   "<recipe>", | ||||
| 	Flags: []cli.Flag{ | ||||
| 		internal.DebugFlag, | ||||
| 		internal.NoInputFlag, | ||||
| 	}, | ||||
| 	Before:       internal.SubCommandBefore, | ||||
| 	BashComplete: autocomplete.RecipeNameComplete, | ||||
| 	Action: func(c *cli.Context) error { | ||||
| 		recipeName := c.Args().First() | ||||
|  | ||||
| 		if recipeName != "" { | ||||
| 			internal.ValidateRecipe(c) | ||||
| 		} | ||||
|  | ||||
| 		repoPath := path.Join(config.RECIPES_DIR, recipeName) | ||||
| 		repo, err := git.PlainOpen(repoPath) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		ref, err := repo.Head() | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		worktree, err := repo.Worktree() | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		opts := &git.ResetOptions{Commit: ref.Hash(), Mode: git.HardReset} | ||||
| 		if err := worktree.Reset(opts); err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		return nil | ||||
| 	}, | ||||
| } | ||||
| @ -8,6 +8,7 @@ import ( | ||||
| 	"coopcloud.tech/abra/cli/internal" | ||||
| 	"coopcloud.tech/abra/pkg/autocomplete" | ||||
| 	"coopcloud.tech/abra/pkg/config" | ||||
| 	gitPkg "coopcloud.tech/abra/pkg/git" | ||||
| 	"coopcloud.tech/tagcmp" | ||||
| 	"github.com/AlecAivazis/survey/v2" | ||||
| 	"github.com/go-git/go-git/v5" | ||||
| @ -40,8 +41,9 @@ Where <version> can be specifed on the command-line or Abra can attempt to | ||||
| auto-generate it for you. The <recipe> configuration will be updated on the | ||||
| local file system. | ||||
| `, | ||||
| 	BashComplete: autocomplete.RecipeNameComplete, | ||||
| 	Action: func(c *cli.Context) error { | ||||
| 		recipe := internal.ValidateRecipeWithPrompt(c, false) | ||||
| 		recipe := internal.ValidateRecipe(c) | ||||
|  | ||||
| 		mainApp, err := internal.GetMainAppImage(recipe) | ||||
| 		if err != nil { | ||||
| @ -63,6 +65,9 @@ local file system. | ||||
| 		nextTag := c.Args().Get(1) | ||||
| 		if len(tags) == 0 && nextTag == "" { | ||||
| 			logrus.Warnf("no git tags found for %s", recipe.Name) | ||||
| 			if internal.NoInput { | ||||
| 				logrus.Fatalf("unable to continue, input required for initial version") | ||||
| 			} | ||||
| 			fmt.Println(fmt.Sprintf(` | ||||
| The following options are two types of initial semantic version that you can | ||||
| pick for %s that will be published in the recipe catalogue. This follows the | ||||
| @ -117,6 +122,7 @@ likely to change. | ||||
| 			if err := iter.ForEach(func(ref *plumbing.Reference) error { | ||||
| 				obj, err := repo.TagObject(ref.Hash()) | ||||
| 				if err != nil { | ||||
| 					logrus.Fatal("Tag at commit ", ref.Hash(), " is unannotated or otherwise broken. Please fix it.") | ||||
| 					return err | ||||
| 				} | ||||
|  | ||||
| @ -193,7 +199,17 @@ likely to change. | ||||
| 			logrus.Infof("dry run: not syncing label %s for recipe %s", nextTag, recipe.Name) | ||||
| 		} | ||||
|  | ||||
| 		isClean, err := gitPkg.IsClean(recipe.Dir()) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
| 		if !isClean { | ||||
| 			logrus.Infof("%s currently has these unstaged changes 👇", recipe.Name) | ||||
| 			if err := gitPkg.DiffUnstaged(recipe.Dir()); err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
| 		} | ||||
|  | ||||
| 		return nil | ||||
| 	}, | ||||
| 	BashComplete: autocomplete.RecipeNameComplete, | ||||
| } | ||||
|  | ||||
| @ -2,6 +2,7 @@ package recipe | ||||
|  | ||||
| import ( | ||||
| 	"bufio" | ||||
| 	"encoding/json" | ||||
| 	"fmt" | ||||
| 	"os" | ||||
| 	"path" | ||||
| @ -13,10 +14,11 @@ import ( | ||||
| 	"coopcloud.tech/abra/pkg/client" | ||||
| 	"coopcloud.tech/abra/pkg/config" | ||||
| 	"coopcloud.tech/abra/pkg/formatter" | ||||
| 	gitPkg "coopcloud.tech/abra/pkg/git" | ||||
| 	recipePkg "coopcloud.tech/abra/pkg/recipe" | ||||
| 	"coopcloud.tech/tagcmp" | ||||
| 	"github.com/AlecAivazis/survey/v2" | ||||
| 	"github.com/docker/distribution/reference" | ||||
| 	"github.com/distribution/reference" | ||||
| 	"github.com/sirupsen/logrus" | ||||
| 	"github.com/urfave/cli" | ||||
| ) | ||||
| @ -26,6 +28,15 @@ type imgPin struct { | ||||
| 	version tagcmp.Tag | ||||
| } | ||||
|  | ||||
| // anUpgrade represents a single service upgrade (as within a recipe), and the list of tags that it can be upgraded to, | ||||
| // for serialization purposes. | ||||
| type anUpgrade struct { | ||||
| 	Service     string   `json:"service"` | ||||
| 	Image       string   `json:"image"` | ||||
| 	Tag         string   `json:"tag"` | ||||
| 	UpgradeTags []string `json:"upgrades"` | ||||
| } | ||||
|  | ||||
| var recipeUpgradeCommand = cli.Command{ | ||||
| 	Name:    "upgrade", | ||||
| 	Aliases: []string{"u"}, | ||||
| @ -47,24 +58,37 @@ You may invoke this command in "wizard" mode and be prompted for input: | ||||
|  | ||||
|     abra recipe upgrade | ||||
| `, | ||||
| 	BashComplete: autocomplete.RecipeNameComplete, | ||||
| 	ArgsUsage:    "<recipe>", | ||||
| 	ArgsUsage: "<recipe>", | ||||
| 	Flags: []cli.Flag{ | ||||
| 		internal.DebugFlag, | ||||
| 		internal.NoInputFlag, | ||||
| 		internal.PatchFlag, | ||||
| 		internal.MinorFlag, | ||||
| 		internal.MajorFlag, | ||||
| 		internal.MachineReadableFlag, | ||||
| 		internal.AllTagsFlag, | ||||
| 	}, | ||||
| 	Before: internal.SubCommandBefore, | ||||
| 	Before:       internal.SubCommandBefore, | ||||
| 	BashComplete: autocomplete.RecipeNameComplete, | ||||
| 	Action: func(c *cli.Context) error { | ||||
| 		recipe := internal.ValidateRecipeWithPrompt(c, true) | ||||
| 		recipe := internal.ValidateRecipe(c) | ||||
|  | ||||
| 		if err := recipePkg.EnsureIsClean(recipe.Name); err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		if err := recipePkg.EnsureExists(recipe.Name); err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		if err := recipePkg.EnsureUpToDate(recipe.Name); err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		if err := recipePkg.EnsureLatest(recipe.Name); err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		bumpType := btoi(internal.Major)*4 + btoi(internal.Minor)*2 + btoi(internal.Patch) | ||||
| 		if bumpType != 0 { | ||||
| 			// a bitwise check if the number is a power of 2 | ||||
| @ -73,6 +97,13 @@ You may invoke this command in "wizard" mode and be prompted for input: | ||||
| 			} | ||||
| 		} | ||||
|  | ||||
| 		if internal.MachineReadable { | ||||
| 			// -m implies -n in this case | ||||
| 			internal.NoInput = true | ||||
| 		} | ||||
|  | ||||
| 		upgradeList := make(map[string]anUpgrade) | ||||
|  | ||||
| 		// check for versions file and load pinned versions | ||||
| 		versionsPresent := false | ||||
| 		recipeDir := path.Join(config.RECIPES_DIR, recipe.Name) | ||||
| @ -164,7 +195,7 @@ You may invoke this command in "wizard" mode and be prompted for input: | ||||
| 				continue // skip on to the next tag and don't update any compose files | ||||
| 			} | ||||
|  | ||||
| 			catlVersions, err := recipePkg.VersionsOfService(recipe.Name, service.Name) | ||||
| 			catlVersions, err := recipePkg.VersionsOfService(recipe.Name, service.Name, internal.Offline) | ||||
| 			if err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
| @ -239,14 +270,37 @@ You may invoke this command in "wizard" mode and be prompted for input: | ||||
| 						} | ||||
| 					} | ||||
|  | ||||
| 					prompt := &survey.Select{ | ||||
| 						Message: msg, | ||||
| 						Help:    "enter / return to confirm, choose 'skip' to not upgrade this tag, vim mode is enabled", | ||||
| 						VimMode: true, | ||||
| 						Options: compatibleStrings, | ||||
| 					// there is always at least the item "skip" in compatibleStrings (a list of | ||||
| 					// possible upgradable tags) and at least one other tag. | ||||
| 					upgradableTags := compatibleStrings[1:] | ||||
| 					upgrade := anUpgrade{ | ||||
| 						Service:     service.Name, | ||||
| 						Image:       image, | ||||
| 						Tag:         tag.String(), | ||||
| 						UpgradeTags: make([]string, len(upgradableTags)), | ||||
| 					} | ||||
| 					if err := survey.AskOne(prompt, &upgradeTag); err != nil { | ||||
| 						logrus.Fatal(err) | ||||
|  | ||||
| 					for n, s := range upgradableTags { | ||||
| 						var sb strings.Builder | ||||
| 						if _, err := sb.WriteString(s); err != nil { | ||||
| 						} | ||||
| 						upgrade.UpgradeTags[n] = sb.String() | ||||
| 					} | ||||
|  | ||||
| 					upgradeList[upgrade.Service] = upgrade | ||||
|  | ||||
| 					if internal.NoInput { | ||||
| 						upgradeTag = "skip" | ||||
| 					} else { | ||||
| 						prompt := &survey.Select{ | ||||
| 							Message: msg, | ||||
| 							Help:    "enter / return to confirm, choose 'skip' to not upgrade this tag, vim mode is enabled", | ||||
| 							VimMode: true, | ||||
| 							Options: compatibleStrings, | ||||
| 						} | ||||
| 						if err := survey.AskOne(prompt, &upgradeTag); err != nil { | ||||
| 							logrus.Fatal(err) | ||||
| 						} | ||||
| 					} | ||||
| 				} | ||||
| 			} | ||||
| @ -259,7 +313,40 @@ You may invoke this command in "wizard" mode and be prompted for input: | ||||
| 					logrus.Infof("tag upgraded from %s to %s for %s", tag.String(), upgradeTag, image) | ||||
| 				} | ||||
| 			} else { | ||||
| 				logrus.Warnf("not upgrading %s, skipping as requested", image) | ||||
| 				if !internal.NoInput { | ||||
| 					logrus.Warnf("not upgrading %s, skipping as requested", image) | ||||
| 				} | ||||
| 			} | ||||
| 		} | ||||
|  | ||||
| 		if internal.NoInput { | ||||
| 			if internal.MachineReadable { | ||||
| 				jsonstring, err := json.Marshal(upgradeList) | ||||
| 				if err != nil { | ||||
| 					logrus.Fatal(err) | ||||
| 				} | ||||
|  | ||||
| 				fmt.Println(string(jsonstring)) | ||||
|  | ||||
| 				return nil | ||||
| 			} | ||||
|  | ||||
| 			for _, upgrade := range upgradeList { | ||||
| 				logrus.Infof("can upgrade service: %s, image: %s, tag: %s ::\n", upgrade.Service, upgrade.Image, upgrade.Tag) | ||||
| 				for _, utag := range upgrade.UpgradeTags { | ||||
| 					logrus.Infof("    %s\n", utag) | ||||
| 				} | ||||
| 			} | ||||
| 		} | ||||
|  | ||||
| 		isClean, err := gitPkg.IsClean(recipeDir) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
| 		if !isClean { | ||||
| 			logrus.Infof("%s currently has these unstaged changes 👇", recipe.Name) | ||||
| 			if err := gitPkg.DiffUnstaged(recipeDir); err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
| 		} | ||||
|  | ||||
|  | ||||
| @ -1,54 +1,86 @@ | ||||
| package recipe | ||||
|  | ||||
| import ( | ||||
| 	"fmt" | ||||
| 	"sort" | ||||
|  | ||||
| 	"coopcloud.tech/abra/cli/internal" | ||||
| 	"coopcloud.tech/abra/pkg/autocomplete" | ||||
| 	"coopcloud.tech/abra/pkg/formatter" | ||||
| 	recipePkg "coopcloud.tech/abra/pkg/recipe" | ||||
| 	"github.com/olekukonko/tablewriter" | ||||
| 	"github.com/sirupsen/logrus" | ||||
| 	"github.com/urfave/cli" | ||||
| ) | ||||
|  | ||||
| func sortServiceByName(versions [][]string) func(i, j int) bool { | ||||
| 	return func(i, j int) bool { | ||||
| 		// NOTE(d1): corresponds to the `tableCol` definition below | ||||
| 		if versions[i][1] == "app" { | ||||
| 			return true | ||||
| 		} | ||||
| 		return versions[i][1] < versions[j][1] | ||||
| 	} | ||||
| } | ||||
|  | ||||
| var recipeVersionCommand = cli.Command{ | ||||
| 	Name:      "versions", | ||||
| 	Aliases:   []string{"v"}, | ||||
| 	Usage:     "List recipe versions", | ||||
| 	ArgsUsage: "<recipe>", | ||||
| 	Name:        "versions", | ||||
| 	Aliases:     []string{"v"}, | ||||
| 	Usage:       "List recipe versions", | ||||
| 	ArgsUsage:   "<recipe>", | ||||
| 	Description: "Versions are read from the recipe catalogue.", | ||||
| 	Flags: []cli.Flag{ | ||||
| 		internal.DebugFlag, | ||||
| 		internal.OfflineFlag, | ||||
| 		internal.NoInputFlag, | ||||
| 		internal.MachineReadableFlag, | ||||
| 	}, | ||||
| 	Before:       internal.SubCommandBefore, | ||||
| 	BashComplete: autocomplete.RecipeNameComplete, | ||||
| 	Action: func(c *cli.Context) error { | ||||
| 		recipe := internal.ValidateRecipe(c, false) | ||||
| 		recipe := internal.ValidateRecipe(c) | ||||
|  | ||||
| 		catalogue, err := recipePkg.ReadRecipeCatalogue() | ||||
| 		catl, err := recipePkg.ReadRecipeCatalogue(internal.Offline) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		recipeMeta, ok := catalogue[recipe.Name] | ||||
| 		recipeMeta, ok := catl[recipe.Name] | ||||
| 		if !ok { | ||||
| 			logrus.Fatalf("%s recipe doesn't exist?", recipe.Name) | ||||
| 			logrus.Fatalf("%s is not published on the catalogue?", recipe.Name) | ||||
| 		} | ||||
|  | ||||
| 		tableCol := []string{"Version", "Service", "Image", "Tag"} | ||||
| 		table := formatter.CreateTable(tableCol) | ||||
| 		if len(recipeMeta.Versions) == 0 { | ||||
| 			logrus.Fatalf("%s has no catalogue published versions?", recipe.Name) | ||||
| 		} | ||||
|  | ||||
| 		tableCols := []string{"version", "service", "image", "tag"} | ||||
| 		aggregated_table := formatter.CreateTable(tableCols) | ||||
| 		for i := len(recipeMeta.Versions) - 1; i >= 0; i-- { | ||||
| 			for tag, meta := range recipeMeta.Versions[i] { | ||||
| 			table := formatter.CreateTable(tableCols) | ||||
| 			for version, meta := range recipeMeta.Versions[i] { | ||||
| 				var versions [][]string | ||||
| 				for service, serviceMeta := range meta { | ||||
| 					table.Append([]string{tag, service, serviceMeta.Image, serviceMeta.Tag}) | ||||
| 					versions = append(versions, []string{version, service, serviceMeta.Image, serviceMeta.Tag}) | ||||
| 				} | ||||
|  | ||||
| 				sort.Slice(versions, sortServiceByName(versions)) | ||||
|  | ||||
| 				for _, version := range versions { | ||||
| 					table.Append(version) | ||||
| 					aggregated_table.Append(version) | ||||
| 				} | ||||
|  | ||||
| 				if !internal.MachineReadable { | ||||
| 					table.SetAutoMergeCellsByColumnIndex([]int{0}) | ||||
| 					table.SetAlignment(tablewriter.ALIGN_LEFT) | ||||
| 					table.Render() | ||||
| 					fmt.Println() | ||||
| 				} | ||||
| 			} | ||||
| 		} | ||||
|  | ||||
| 		table.SetAutoMergeCells(true) | ||||
|  | ||||
| 		if table.NumLines() > 0 { | ||||
| 			table.Render() | ||||
| 		} else { | ||||
| 			logrus.Fatalf("%s has no published versions?", recipe.Name) | ||||
| 		if internal.MachineReadable { | ||||
| 			aggregated_table.JSONRender() | ||||
| 		} | ||||
|  | ||||
| 		return nil | ||||
|  | ||||
| @ -1,82 +0,0 @@ | ||||
| package record | ||||
|  | ||||
| import ( | ||||
| 	"context" | ||||
| 	"fmt" | ||||
| 	"strconv" | ||||
|  | ||||
| 	"coopcloud.tech/abra/cli/internal" | ||||
| 	gandiPkg "coopcloud.tech/abra/pkg/dns/gandi" | ||||
| 	"coopcloud.tech/abra/pkg/formatter" | ||||
| 	"github.com/libdns/gandi" | ||||
| 	"github.com/sirupsen/logrus" | ||||
| 	"github.com/urfave/cli" | ||||
| ) | ||||
|  | ||||
| // RecordListCommand lists domains. | ||||
| var RecordListCommand = cli.Command{ | ||||
| 	Name:      "list", | ||||
| 	Usage:     "List domain name records", | ||||
| 	Aliases:   []string{"ls"}, | ||||
| 	ArgsUsage: "<zone>", | ||||
| 	Flags: []cli.Flag{ | ||||
| 		internal.DebugFlag, | ||||
| 		internal.DNSProviderFlag, | ||||
| 	}, | ||||
| 	Before: internal.SubCommandBefore, | ||||
| 	Description: ` | ||||
| List all domain name records managed by a 3rd party provider for a specific | ||||
| zone. | ||||
|  | ||||
| You must specify a zone (e.g. example.com) under which your domain name records | ||||
| are listed. This zone must already be created on your provider account. | ||||
| `, | ||||
| 	Action: func(c *cli.Context) error { | ||||
| 		if err := internal.EnsureDNSProvider(); err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		zone, err := internal.EnsureZoneArgument(c) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		var provider gandi.Provider | ||||
| 		switch internal.DNSProvider { | ||||
| 		case "gandi": | ||||
| 			provider, err = gandiPkg.New() | ||||
| 			if err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
| 		default: | ||||
| 			logrus.Fatalf("%s is not a supported DNS provider", internal.DNSProvider) | ||||
| 		} | ||||
|  | ||||
| 		records, err := provider.GetRecords(context.Background(), zone) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		tableCol := []string{"type", "name", "value", "TTL", "priority"} | ||||
| 		table := formatter.CreateTable(tableCol) | ||||
|  | ||||
| 		for _, record := range records { | ||||
| 			value := record.Value | ||||
| 			if len(record.Value) > 30 { | ||||
| 				value = fmt.Sprintf("%s...", record.Value[:30]) | ||||
| 			} | ||||
|  | ||||
| 			table.Append([]string{ | ||||
| 				record.Type, | ||||
| 				record.Name, | ||||
| 				value, | ||||
| 				record.TTL.String(), | ||||
| 				strconv.Itoa(record.Priority), | ||||
| 			}) | ||||
| 		} | ||||
|  | ||||
| 		table.Render() | ||||
|  | ||||
| 		return nil | ||||
| 	}, | ||||
| } | ||||
| @ -1,148 +0,0 @@ | ||||
| package record | ||||
|  | ||||
| import ( | ||||
| 	"context" | ||||
| 	"fmt" | ||||
| 	"strconv" | ||||
|  | ||||
| 	"coopcloud.tech/abra/cli/internal" | ||||
| 	"coopcloud.tech/abra/pkg/dns" | ||||
| 	gandiPkg "coopcloud.tech/abra/pkg/dns/gandi" | ||||
| 	"coopcloud.tech/abra/pkg/formatter" | ||||
| 	"github.com/libdns/gandi" | ||||
| 	"github.com/libdns/libdns" | ||||
| 	"github.com/sirupsen/logrus" | ||||
| 	"github.com/urfave/cli" | ||||
| ) | ||||
|  | ||||
| // RecordNewCommand creates a new domain name record. | ||||
| var RecordNewCommand = cli.Command{ | ||||
| 	Name:      "new", | ||||
| 	Usage:     "Create a new domain record", | ||||
| 	Aliases:   []string{"n"}, | ||||
| 	ArgsUsage: "<zone>", | ||||
| 	Flags: []cli.Flag{ | ||||
| 		internal.DebugFlag, | ||||
| 		internal.NoInputFlag, | ||||
| 		internal.DNSProviderFlag, | ||||
| 		internal.DNSTypeFlag, | ||||
| 		internal.DNSNameFlag, | ||||
| 		internal.DNSValueFlag, | ||||
| 		internal.DNSTTLFlag, | ||||
| 		internal.DNSPriorityFlag, | ||||
| 	}, | ||||
| 	Before: internal.SubCommandBefore, | ||||
| 	Description: ` | ||||
| Create a new domain name record for a specific zone. | ||||
|  | ||||
| You must specify a zone (e.g. example.com) under which your domain name records | ||||
| are listed. This zone must already be created on your provider account. | ||||
|  | ||||
| Example: | ||||
|  | ||||
|     abra record new foo.com -p gandi -t A -n myapp -v 192.168.178.44 | ||||
|  | ||||
| You may also invoke this command in "wizard" mode and be prompted for input: | ||||
|  | ||||
|     abra record new | ||||
| `, | ||||
| 	Action: func(c *cli.Context) error { | ||||
| 		zone, err := internal.EnsureZoneArgument(c) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		if err := internal.EnsureDNSProvider(); err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		var provider gandi.Provider | ||||
| 		switch internal.DNSProvider { | ||||
| 		case "gandi": | ||||
| 			provider, err = gandiPkg.New() | ||||
| 			if err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
| 		default: | ||||
| 			logrus.Fatalf("%s is not a supported DNS provider", internal.DNSProvider) | ||||
| 		} | ||||
|  | ||||
| 		if err := internal.EnsureDNSTypeFlag(c); err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		if err := internal.EnsureDNSNameFlag(c); err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		if err := internal.EnsureDNSValueFlag(c); err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		ttl, err := dns.GetTTL(internal.DNSTTL) | ||||
| 		if err != nil { | ||||
| 			return err | ||||
| 		} | ||||
|  | ||||
| 		record := libdns.Record{ | ||||
| 			Type:  internal.DNSType, | ||||
| 			Name:  internal.DNSName, | ||||
| 			Value: internal.DNSValue, | ||||
| 			TTL:   ttl, | ||||
| 		} | ||||
|  | ||||
| 		if internal.DNSType == "MX" || internal.DNSType == "SRV" || internal.DNSType == "URI" { | ||||
| 			record.Priority = internal.DNSPriority | ||||
| 		} | ||||
|  | ||||
| 		records, err := provider.GetRecords(context.Background(), zone) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		for _, existingRecord := range records { | ||||
| 			if existingRecord.Type == record.Type && | ||||
| 				existingRecord.Name == record.Name && | ||||
| 				existingRecord.Value == record.Value { | ||||
| 				logrus.Fatalf("%s record for %s already exists?", record.Type, zone) | ||||
| 			} | ||||
| 		} | ||||
|  | ||||
| 		createdRecords, err := provider.SetRecords( | ||||
| 			context.Background(), | ||||
| 			zone, | ||||
| 			[]libdns.Record{record}, | ||||
| 		) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		if len(createdRecords) == 0 { | ||||
| 			logrus.Fatal("provider library reports that no record was created?") | ||||
| 		} | ||||
|  | ||||
| 		createdRecord := createdRecords[0] | ||||
|  | ||||
| 		tableCol := []string{"type", "name", "value", "TTL", "priority"} | ||||
| 		table := formatter.CreateTable(tableCol) | ||||
|  | ||||
| 		value := createdRecord.Value | ||||
| 		if len(createdRecord.Value) > 30 { | ||||
| 			value = fmt.Sprintf("%s...", createdRecord.Value[:30]) | ||||
| 		} | ||||
|  | ||||
| 		table.Append([]string{ | ||||
| 			createdRecord.Type, | ||||
| 			createdRecord.Name, | ||||
| 			value, | ||||
| 			createdRecord.TTL.String(), | ||||
| 			strconv.Itoa(createdRecord.Priority), | ||||
| 		}) | ||||
|  | ||||
| 		table.Render() | ||||
|  | ||||
| 		logrus.Info("record created") | ||||
|  | ||||
| 		return nil | ||||
| 	}, | ||||
| } | ||||
| @ -1,37 +0,0 @@ | ||||
| package record | ||||
|  | ||||
| import ( | ||||
| 	"github.com/urfave/cli" | ||||
| ) | ||||
|  | ||||
| // RecordCommand supports managing DNS entries. | ||||
| var RecordCommand = cli.Command{ | ||||
| 	Name:      "record", | ||||
| 	Usage:     "Manage domain name records", | ||||
| 	Aliases:   []string{"rc"}, | ||||
| 	ArgsUsage: "<record>", | ||||
| 	Description: ` | ||||
| Manage domain name records via 3rd party providers such as Gandi DNS. It | ||||
| supports listing, creating and removing all types of records that you might | ||||
| need for managing Co-op Cloud apps. | ||||
|  | ||||
| The following providers are supported: | ||||
|  | ||||
|     Gandi DNS https://www.gandi.net | ||||
|  | ||||
| You need an account with such a provider already. Typically, you need to | ||||
| provide an API token on the Abra command-line when using these commands so that | ||||
| you can authenticate with your provider account. | ||||
|  | ||||
| New providers can be integrated, we welcome change sets. See the underlying DNS | ||||
| library documentation for more. It supports many existing providers and allows | ||||
| to implement new provider support easily. | ||||
|  | ||||
|     https://pkg.go.dev/github.com/libdns/libdns | ||||
| `, | ||||
| 	Subcommands: []cli.Command{ | ||||
| 		RecordListCommand, | ||||
| 		RecordNewCommand, | ||||
| 		RecordRemoveCommand, | ||||
| 	}, | ||||
| } | ||||
| @ -1,136 +0,0 @@ | ||||
| package record | ||||
|  | ||||
| import ( | ||||
| 	"context" | ||||
| 	"fmt" | ||||
| 	"strconv" | ||||
|  | ||||
| 	"coopcloud.tech/abra/cli/internal" | ||||
| 	gandiPkg "coopcloud.tech/abra/pkg/dns/gandi" | ||||
| 	"coopcloud.tech/abra/pkg/formatter" | ||||
| 	"github.com/AlecAivazis/survey/v2" | ||||
| 	"github.com/libdns/gandi" | ||||
| 	"github.com/libdns/libdns" | ||||
| 	"github.com/sirupsen/logrus" | ||||
| 	"github.com/urfave/cli" | ||||
| ) | ||||
|  | ||||
| // RecordRemoveCommand lists domains. | ||||
| var RecordRemoveCommand = cli.Command{ | ||||
| 	Name:      "remove", | ||||
| 	Usage:     "Remove a domain name record", | ||||
| 	Aliases:   []string{"rm"}, | ||||
| 	ArgsUsage: "<zone>", | ||||
| 	Flags: []cli.Flag{ | ||||
| 		internal.DebugFlag, | ||||
| 		internal.NoInputFlag, | ||||
| 		internal.DNSProviderFlag, | ||||
| 		internal.DNSTypeFlag, | ||||
| 		internal.DNSNameFlag, | ||||
| 	}, | ||||
| 	Before: internal.SubCommandBefore, | ||||
| 	Description: ` | ||||
| Remove a domain name record for a specific zone. | ||||
|  | ||||
| It uses the type of record and name to match existing records and choose one | ||||
| for deletion. You must specify a zone (e.g. example.com) under which your | ||||
| domain name records are listed. This zone must already be created on your | ||||
| provider account. | ||||
|  | ||||
| Example: | ||||
|  | ||||
|     abra record remove foo.com -p gandi -t A -n myapp | ||||
|  | ||||
| You may also invoke this command in "wizard" mode and be prompted for input: | ||||
|  | ||||
|     abra record rm | ||||
| `, | ||||
| 	Action: func(c *cli.Context) error { | ||||
| 		zone, err := internal.EnsureZoneArgument(c) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		if err := internal.EnsureDNSProvider(); err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		var provider gandi.Provider | ||||
| 		switch internal.DNSProvider { | ||||
| 		case "gandi": | ||||
| 			provider, err = gandiPkg.New() | ||||
| 			if err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
| 		default: | ||||
| 			logrus.Fatalf("%s is not a supported DNS provider", internal.DNSProvider) | ||||
| 		} | ||||
|  | ||||
| 		if err := internal.EnsureDNSTypeFlag(c); err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		if err := internal.EnsureDNSNameFlag(c); err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		records, err := provider.GetRecords(context.Background(), zone) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		var toDelete libdns.Record | ||||
| 		for _, record := range records { | ||||
| 			if record.Type == internal.DNSType && record.Name == internal.DNSName { | ||||
| 				toDelete = record | ||||
| 				break | ||||
| 			} | ||||
| 		} | ||||
|  | ||||
| 		if (libdns.Record{}) == toDelete { | ||||
| 			logrus.Fatal("provider library reports no matching record?") | ||||
| 		} | ||||
|  | ||||
| 		tableCol := []string{"type", "name", "value", "TTL", "priority"} | ||||
| 		table := formatter.CreateTable(tableCol) | ||||
|  | ||||
| 		value := toDelete.Value | ||||
| 		if len(toDelete.Value) > 30 { | ||||
| 			value = fmt.Sprintf("%s...", toDelete.Value[:30]) | ||||
| 		} | ||||
|  | ||||
| 		table.Append([]string{ | ||||
| 			toDelete.Type, | ||||
| 			toDelete.Name, | ||||
| 			value, | ||||
| 			toDelete.TTL.String(), | ||||
| 			strconv.Itoa(toDelete.Priority), | ||||
| 		}) | ||||
|  | ||||
| 		table.Render() | ||||
|  | ||||
| 		if !internal.NoInput { | ||||
| 			response := false | ||||
| 			prompt := &survey.Confirm{ | ||||
| 				Message: "continue with record deletion?", | ||||
| 			} | ||||
|  | ||||
| 			if err := survey.AskOne(prompt, &response); err != nil { | ||||
| 				return err | ||||
| 			} | ||||
|  | ||||
| 			if !response { | ||||
| 				logrus.Fatal("exiting as requested") | ||||
| 			} | ||||
| 		} | ||||
|  | ||||
| 		_, err = provider.DeleteRecords(context.Background(), zone, []libdns.Record{toDelete}) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		logrus.Info("record successfully deleted") | ||||
|  | ||||
| 		return nil | ||||
| 	}, | ||||
| } | ||||
| @ -53,7 +53,7 @@ func cleanUp(domainName string) { | ||||
| // Docker manages SSH connection details. These are stored to disk in | ||||
| // ~/.docker. Abra can manage this completely for the user, so it's an | ||||
| // implementation detail. | ||||
| func newContext(c *cli.Context, domainName, username, port string) error { | ||||
| func newContext(c *cli.Context, domainName string) error { | ||||
| 	store := contextPkg.NewDefaultDockerContextStore() | ||||
| 	contexts, err := store.Store.List() | ||||
| 	if err != nil { | ||||
| @ -67,9 +67,9 @@ func newContext(c *cli.Context, domainName, username, port string) error { | ||||
| 		} | ||||
| 	} | ||||
|  | ||||
| 	logrus.Debugf("creating context with domain %s, username %s and port %s", domainName, username, port) | ||||
| 	logrus.Debugf("creating context with domain %s", domainName) | ||||
|  | ||||
| 	if err := client.CreateContext(domainName, username, port); err != nil { | ||||
| 	if err := client.CreateContext(domainName); err != nil { | ||||
| 		return err | ||||
| 	} | ||||
|  | ||||
| @ -158,12 +158,7 @@ developer machine. | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		hostConfig, err := sshPkg.GetHostConfig(domainName) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		if err := newContext(c, domainName, hostConfig.User, hostConfig.Port); err != nil { | ||||
| 		if err := newContext(c, domainName); err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
|  | ||||
| @ -28,6 +28,7 @@ var serverListCommand = cli.Command{ | ||||
| 		problemsFilterFlag, | ||||
| 		internal.DebugFlag, | ||||
| 		internal.MachineReadableFlag, | ||||
| 		internal.OfflineFlag, | ||||
| 	}, | ||||
| 	Before: internal.SubCommandBefore, | ||||
| 	Action: func(c *cli.Context) error { | ||||
| @ -39,11 +40,7 @@ var serverListCommand = cli.Command{ | ||||
|  | ||||
| 		tableColumns := []string{"name", "host", "user", "port"} | ||||
| 		table := formatter.CreateTable(tableColumns) | ||||
| 		if internal.MachineReadable { | ||||
| 			defer table.JSONRender() | ||||
| 		} else { | ||||
| 			defer table.Render() | ||||
| 		} | ||||
|  | ||||
| 		serverNames, err := config.ReadServerNames() | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| @ -63,6 +60,17 @@ var serverListCommand = cli.Command{ | ||||
| 					if err != nil { | ||||
| 						logrus.Fatal(err) | ||||
| 					} | ||||
|  | ||||
| 					if sp.Host == "" { | ||||
| 						sp.Host = "unknown" | ||||
| 					} | ||||
| 					if sp.User == "" { | ||||
| 						sp.User = "unknown" | ||||
| 					} | ||||
| 					if sp.Port == "" { | ||||
| 						sp.Port = "unknown" | ||||
| 					} | ||||
|  | ||||
| 					row = []string{serverName, sp.Host, sp.User, sp.Port} | ||||
| 				} | ||||
| 			} | ||||
| @ -76,14 +84,27 @@ var serverListCommand = cli.Command{ | ||||
| 			} | ||||
|  | ||||
| 			if problemsFilter { | ||||
| 				if row[1] == "unknown" { | ||||
| 					table.Append(row) | ||||
| 				for _, val := range row { | ||||
| 					if val == "unknown" { | ||||
| 						table.Append(row) | ||||
| 						break | ||||
| 					} | ||||
| 				} | ||||
| 			} else { | ||||
| 				table.Append(row) | ||||
| 			} | ||||
| 		} | ||||
|  | ||||
| 		if internal.MachineReadable { | ||||
| 			table.JSONRender() | ||||
| 		} else { | ||||
| 			if problemsFilter && table.NumLines() == 0 { | ||||
| 				logrus.Info("all servers wired up correctly 👏") | ||||
| 			} else { | ||||
| 				table.Render() | ||||
| 			} | ||||
| 		} | ||||
|  | ||||
| 		return nil | ||||
| 	}, | ||||
| } | ||||
|  | ||||
| @ -1,260 +0,0 @@ | ||||
| package server | ||||
|  | ||||
| import ( | ||||
| 	"context" | ||||
| 	"fmt" | ||||
| 	"strings" | ||||
|  | ||||
| 	"coopcloud.tech/abra/cli/internal" | ||||
| 	"coopcloud.tech/abra/pkg/formatter" | ||||
| 	"coopcloud.tech/libcapsul" | ||||
| 	"github.com/AlecAivazis/survey/v2" | ||||
| 	"github.com/hetznercloud/hcloud-go/hcloud" | ||||
| 	"github.com/sirupsen/logrus" | ||||
| 	"github.com/urfave/cli" | ||||
| ) | ||||
|  | ||||
| func newHetznerCloudVPS(c *cli.Context) error { | ||||
| 	if err := internal.EnsureNewHetznerCloudVPSFlags(c); err != nil { | ||||
| 		return err | ||||
| 	} | ||||
|  | ||||
| 	client := hcloud.NewClient(hcloud.WithToken(internal.HetznerCloudAPIToken)) | ||||
|  | ||||
| 	var sshKeysRaw []string | ||||
| 	var sshKeys []*hcloud.SSHKey | ||||
| 	for _, sshKey := range c.StringSlice("hetzner-ssh-keys") { | ||||
| 		if sshKey == "" { | ||||
| 			continue | ||||
| 		} | ||||
|  | ||||
| 		sshKey, _, err := client.SSHKey.GetByName(context.Background(), sshKey) | ||||
| 		if err != nil { | ||||
| 			return err | ||||
| 		} | ||||
| 		sshKeys = append(sshKeys, sshKey) | ||||
| 		sshKeysRaw = append(sshKeysRaw, sshKey.Name) | ||||
| 	} | ||||
|  | ||||
| 	serverOpts := hcloud.ServerCreateOpts{ | ||||
| 		Name:       internal.HetznerCloudName, | ||||
| 		ServerType: &hcloud.ServerType{Name: internal.HetznerCloudType}, | ||||
| 		Image:      &hcloud.Image{Name: internal.HetznerCloudImage}, | ||||
| 		SSHKeys:    sshKeys, | ||||
| 		Location:   &hcloud.Location{Name: internal.HetznerCloudLocation}, | ||||
| 	} | ||||
|  | ||||
| 	sshKeyIDs := strings.Join(sshKeysRaw, "\n") | ||||
| 	if sshKeyIDs == "" { | ||||
| 		sshKeyIDs = "N/A (password auth)" | ||||
| 	} | ||||
|  | ||||
| 	tableColumns := []string{"name", "type", "image", "ssh-keys", "location"} | ||||
| 	table := formatter.CreateTable(tableColumns) | ||||
| 	table.Append([]string{ | ||||
| 		internal.HetznerCloudName, | ||||
| 		internal.HetznerCloudType, | ||||
| 		internal.HetznerCloudImage, | ||||
| 		sshKeyIDs, | ||||
| 		internal.HetznerCloudLocation, | ||||
| 	}) | ||||
| 	table.Render() | ||||
|  | ||||
| 	response := false | ||||
| 	prompt := &survey.Confirm{ | ||||
| 		Message: "continue with hetzner cloud VPS creation?", | ||||
| 	} | ||||
|  | ||||
| 	if err := survey.AskOne(prompt, &response); err != nil { | ||||
| 		return err | ||||
| 	} | ||||
|  | ||||
| 	if !response { | ||||
| 		logrus.Fatal("exiting as requested") | ||||
| 	} | ||||
|  | ||||
| 	res, _, err := client.Server.Create(context.Background(), serverOpts) | ||||
| 	if err != nil { | ||||
| 		return err | ||||
| 	} | ||||
|  | ||||
| 	var rootPassword string | ||||
| 	if len(sshKeys) > 0 { | ||||
| 		rootPassword = "N/A (using SSH keys)" | ||||
| 	} else { | ||||
| 		rootPassword = res.RootPassword | ||||
| 	} | ||||
|  | ||||
| 	ip := res.Server.PublicNet.IPv4.IP.String() | ||||
|  | ||||
| 	fmt.Println(fmt.Sprintf(` | ||||
| Your new Hetzner Cloud VPS has successfully been created! Here are the details: | ||||
|  | ||||
|     name: %s | ||||
|     IP address: %s | ||||
|     root password: %s | ||||
|  | ||||
| You can access this new VPS via SSH using the following command: | ||||
|  | ||||
|     ssh root@%s | ||||
|  | ||||
| Please note, this server is not managed by Abra yet (i.e. "abra server ls" will | ||||
| not list this server)! You will need to assign a domain name record (manually | ||||
| or by using "abra record new") and add the server to your Abra configuration | ||||
| ("abra server add") to have a working server that you can deploy Co-op Cloud | ||||
| apps to. | ||||
|  | ||||
| When setting up domain name records, you probably want to set up the following | ||||
| 2 A records. This supports deploying apps to your root domain (e.g. | ||||
| example.com) and other apps on sub-domains (e.g. foo.example.com, | ||||
| bar.example.com). | ||||
|  | ||||
|     @  1800 IN A %s | ||||
|     *  1800 IN A %s | ||||
| 	`, | ||||
| 		internal.HetznerCloudName, ip, rootPassword, | ||||
| 		ip, ip, ip, | ||||
| 	)) | ||||
|  | ||||
| 	return nil | ||||
| } | ||||
|  | ||||
| func newCapsulVPS(c *cli.Context) error { | ||||
| 	if err := internal.EnsureNewCapsulVPSFlags(c); err != nil { | ||||
| 		return err | ||||
| 	} | ||||
|  | ||||
| 	capsulCreateURL := fmt.Sprintf("https://%s/api/capsul/create", internal.CapsulInstanceURL) | ||||
|  | ||||
| 	var sshKeys []string | ||||
| 	for _, sshKey := range c.StringSlice("capsul-ssh-keys") { | ||||
| 		if sshKey == "" { | ||||
| 			continue | ||||
| 		} | ||||
| 		sshKeys = append(sshKeys, sshKey) | ||||
| 	} | ||||
|  | ||||
| 	tableColumns := []string{"instance", "name", "type", "image", "ssh-keys"} | ||||
| 	table := formatter.CreateTable(tableColumns) | ||||
| 	table.Append([]string{ | ||||
| 		internal.CapsulInstanceURL, | ||||
| 		internal.CapsulName, | ||||
| 		internal.CapsulType, | ||||
| 		internal.CapsulImage, | ||||
| 		strings.Join(sshKeys, "\n"), | ||||
| 	}) | ||||
| 	table.Render() | ||||
|  | ||||
| 	response := false | ||||
| 	prompt := &survey.Confirm{ | ||||
| 		Message: "continue with capsul creation?", | ||||
| 	} | ||||
|  | ||||
| 	if err := survey.AskOne(prompt, &response); err != nil { | ||||
| 		return err | ||||
| 	} | ||||
|  | ||||
| 	if !response { | ||||
| 		logrus.Fatal("exiting as requested") | ||||
| 	} | ||||
|  | ||||
| 	capsulClient := libcapsul.New(capsulCreateURL, internal.CapsulAPIToken) | ||||
| 	resp, err := capsulClient.Create( | ||||
| 		internal.CapsulName, | ||||
| 		internal.CapsulType, | ||||
| 		internal.CapsulImage, | ||||
| 		sshKeys, | ||||
| 	) | ||||
| 	if err != nil { | ||||
| 		return err | ||||
| 	} | ||||
|  | ||||
| 	fmt.Println(fmt.Sprintf(` | ||||
| Your new Capsul has successfully been created! Here are the details: | ||||
|  | ||||
|     Capsul name: %s | ||||
|     Capsul ID:   %v | ||||
|  | ||||
| You will need to log into your Capsul instance web interface to retrieve the IP | ||||
| address. You can learn all about how to get SSH access to your new Capsul on: | ||||
|  | ||||
|     %s/about-ssh | ||||
|  | ||||
| Please note, this server is not managed by Abra yet (i.e. "abra server ls" will | ||||
| not list this server)! You will need to assign a domain name record (manually | ||||
| or by using "abra record new") and add the server to your Abra configuration | ||||
| ("abra server add") to have a working server that you can deploy Co-op Cloud | ||||
| apps to. | ||||
|  | ||||
| When setting up domain name records, you probably want to set up the following | ||||
| 2 A records. This supports deploying apps to your root domain (e.g. | ||||
| example.com) and other apps on sub-domains (e.g. foo.example.com, | ||||
| bar.example.com). | ||||
|  | ||||
|     @  1800 IN A <your-capsul-ip> | ||||
|     *  1800 IN A <your-capsul-ip> | ||||
| 	`, internal.CapsulName, resp.ID, internal.CapsulInstanceURL)) | ||||
|  | ||||
| 	return nil | ||||
| } | ||||
|  | ||||
| var serverNewCommand = cli.Command{ | ||||
| 	Name:    "new", | ||||
| 	Aliases: []string{"n"}, | ||||
| 	Usage:   "Create a new server using a 3rd party provider", | ||||
| 	Description: ` | ||||
| Create a new server via a 3rd party provider. | ||||
|  | ||||
| The following providers are supported: | ||||
|  | ||||
| 		Capsul https://git.cyberia.club/Cyberia/capsul-flask | ||||
|     Hetzner Cloud https://docs.hetzner.com/cloud | ||||
|  | ||||
| You may invoke this command in "wizard" mode and be prompted for input: | ||||
|  | ||||
|     abra record new | ||||
|  | ||||
| API tokens are read from the environment if specified, e.g. | ||||
|  | ||||
|     export HCLOUD_TOKEN=... | ||||
| `, | ||||
| 	Flags: []cli.Flag{ | ||||
| 		internal.DebugFlag, | ||||
| 		internal.NoInputFlag, | ||||
| 		internal.ServerProviderFlag, | ||||
|  | ||||
| 		// Capsul | ||||
| 		internal.CapsulInstanceURLFlag, | ||||
| 		internal.CapsulTypeFlag, | ||||
| 		internal.CapsulImageFlag, | ||||
| 		internal.CapsulSSHKeysFlag, | ||||
| 		internal.CapsulAPITokenFlag, | ||||
|  | ||||
| 		// Hetzner | ||||
| 		internal.HetznerCloudNameFlag, | ||||
| 		internal.HetznerCloudTypeFlag, | ||||
| 		internal.HetznerCloudImageFlag, | ||||
| 		internal.HetznerCloudSSHKeysFlag, | ||||
| 		internal.HetznerCloudLocationFlag, | ||||
| 		internal.HetznerCloudAPITokenFlag, | ||||
| 	}, | ||||
| 	Before: internal.SubCommandBefore, | ||||
| 	Action: func(c *cli.Context) error { | ||||
| 		if err := internal.EnsureServerProvider(); err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		switch internal.ServerProvider { | ||||
| 		case "capsul": | ||||
| 			if err := newCapsulVPS(c); err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
| 		case "hetzner-cloud": | ||||
| 			if err := newHetznerCloudVPS(c); err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
| 		} | ||||
|  | ||||
| 		return nil | ||||
| 	}, | ||||
| } | ||||
							
								
								
									
										103
									
								
								cli/server/prune.go
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										103
									
								
								cli/server/prune.go
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,103 @@ | ||||
| package server | ||||
|  | ||||
| import ( | ||||
| 	"context" | ||||
|  | ||||
| 	"coopcloud.tech/abra/cli/internal" | ||||
| 	"coopcloud.tech/abra/pkg/autocomplete" | ||||
| 	"coopcloud.tech/abra/pkg/client" | ||||
| 	"coopcloud.tech/abra/pkg/formatter" | ||||
| 	"github.com/docker/docker/api/types/filters" | ||||
| 	"github.com/sirupsen/logrus" | ||||
| 	"github.com/urfave/cli" | ||||
| ) | ||||
|  | ||||
| var allFilter bool | ||||
|  | ||||
| var allFilterFlag = &cli.BoolFlag{ | ||||
| 	Name:        "all, a", | ||||
| 	Usage:       "Remove all unused images not just dangling ones", | ||||
| 	Destination: &allFilter, | ||||
| } | ||||
|  | ||||
| var volumesFilter bool | ||||
|  | ||||
| var volumesFilterFlag = &cli.BoolFlag{ | ||||
| 	Name:        "volumes, v", | ||||
| 	Usage:       "Prune volumes. This will remove app data, Be Careful!", | ||||
| 	Destination: &volumesFilter, | ||||
| } | ||||
|  | ||||
| var serverPruneCommand = cli.Command{ | ||||
| 	Name:    "prune", | ||||
| 	Aliases: []string{"p"}, | ||||
| 	Usage:   "Prune a managed server; Runs a docker system prune", | ||||
| 	Description: ` | ||||
| Prunes unused containers, networks, and dangling images. | ||||
|  | ||||
| If passing "-v/--volumes" then volumes not connected to a deployed app will | ||||
| also be removed. This can result in unwanted data loss if not used carefully. | ||||
| 	`, | ||||
| 	ArgsUsage: "[<server>]", | ||||
| 	Flags: []cli.Flag{ | ||||
| 		allFilterFlag, | ||||
| 		volumesFilterFlag, | ||||
| 		internal.DebugFlag, | ||||
| 		internal.OfflineFlag, | ||||
| 		internal.NoInputFlag, | ||||
| 	}, | ||||
| 	Before:       internal.SubCommandBefore, | ||||
| 	BashComplete: autocomplete.ServerNameComplete, | ||||
| 	Action: func(c *cli.Context) error { | ||||
| 		serverName := internal.ValidateServer(c) | ||||
|  | ||||
| 		cl, err := client.New(serverName) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		var args filters.Args | ||||
|  | ||||
| 		ctx := context.Background() | ||||
| 		cr, err := cl.ContainersPrune(ctx, args) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		cntSpaceReclaimed := formatter.ByteCountSI(cr.SpaceReclaimed) | ||||
| 		logrus.Infof("containers pruned: %d; space reclaimed: %s", len(cr.ContainersDeleted), cntSpaceReclaimed) | ||||
|  | ||||
| 		nr, err := cl.NetworksPrune(ctx, args) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		logrus.Infof("networks pruned: %d", len(nr.NetworksDeleted)) | ||||
|  | ||||
| 		pruneFilters := filters.NewArgs() | ||||
| 		if allFilter { | ||||
| 			logrus.Debugf("removing all images, not only dangling ones") | ||||
| 			pruneFilters.Add("dangling", "false") | ||||
| 		} | ||||
|  | ||||
| 		ir, err := cl.ImagesPrune(ctx, pruneFilters) | ||||
| 		if err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		imgSpaceReclaimed := formatter.ByteCountSI(ir.SpaceReclaimed) | ||||
| 		logrus.Infof("images pruned: %d; space reclaimed: %s", len(ir.ImagesDeleted), imgSpaceReclaimed) | ||||
|  | ||||
| 		if volumesFilter { | ||||
| 			vr, err := cl.VolumesPrune(ctx, args) | ||||
| 			if err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
|  | ||||
| 			volSpaceReclaimed := formatter.ByteCountSI(vr.SpaceReclaimed) | ||||
| 			logrus.Infof("volumes pruned: %d; space reclaimed: %s", len(vr.VolumesDeleted), volSpaceReclaimed) | ||||
| 		} | ||||
|  | ||||
| 		return nil | ||||
| 	}, | ||||
| } | ||||
| @ -1,174 +1,38 @@ | ||||
| package server | ||||
|  | ||||
| import ( | ||||
| 	"context" | ||||
| 	"fmt" | ||||
| 	"os" | ||||
| 	"path/filepath" | ||||
|  | ||||
| 	"coopcloud.tech/abra/cli/internal" | ||||
| 	"coopcloud.tech/abra/pkg/autocomplete" | ||||
| 	"coopcloud.tech/abra/pkg/client" | ||||
| 	"coopcloud.tech/abra/pkg/config" | ||||
| 	"coopcloud.tech/abra/pkg/formatter" | ||||
| 	"github.com/AlecAivazis/survey/v2" | ||||
| 	"github.com/hetznercloud/hcloud-go/hcloud" | ||||
| 	"github.com/sirupsen/logrus" | ||||
| 	"github.com/urfave/cli" | ||||
| ) | ||||
|  | ||||
| var rmServer bool | ||||
| var rmServerFlag = &cli.BoolFlag{ | ||||
| 	Name:        "server, s", | ||||
| 	Usage:       "remove the actual server also", | ||||
| 	Destination: &rmServer, | ||||
| } | ||||
|  | ||||
| func rmHetznerCloudVPS(c *cli.Context) error { | ||||
| 	if internal.HetznerCloudName == "" && !internal.NoInput { | ||||
| 		prompt := &survey.Input{ | ||||
| 			Message: "specify hetzner cloud VPS name", | ||||
| 		} | ||||
| 		if err := survey.AskOne(prompt, &internal.HetznerCloudName); err != nil { | ||||
| 			return err | ||||
| 		} | ||||
| 	} | ||||
|  | ||||
| 	if internal.HetznerCloudAPIToken == "" && !internal.NoInput { | ||||
| 		token, ok := os.LookupEnv("HCLOUD_TOKEN") | ||||
| 		if !ok { | ||||
| 			prompt := &survey.Input{ | ||||
| 				Message: "specify hetzner cloud API token", | ||||
| 			} | ||||
| 			if err := survey.AskOne(prompt, &internal.HetznerCloudAPIToken); err != nil { | ||||
| 				return err | ||||
| 			} | ||||
| 		} else { | ||||
| 			internal.HetznerCloudAPIToken = token | ||||
| 		} | ||||
| 	} | ||||
|  | ||||
| 	client := hcloud.NewClient(hcloud.WithToken(internal.HetznerCloudAPIToken)) | ||||
|  | ||||
| 	server, _, err := client.Server.Get(context.Background(), internal.HetznerCloudName) | ||||
| 	if err != nil { | ||||
| 		return err | ||||
| 	} | ||||
|  | ||||
| 	if server == nil { | ||||
| 		logrus.Fatalf("library provider reports that %s doesn't exist?", internal.HetznerCloudName) | ||||
| 	} | ||||
|  | ||||
| 	fmt.Println(fmt.Sprintf(` | ||||
| You have requested that Abra delete the following server (%s). Please be | ||||
| absolutely sure that this is indeed the server that you would like to have | ||||
| removed. There will be no going back once you confirm, the server will be | ||||
| destroyed. | ||||
| `, server.Name)) | ||||
|  | ||||
| 	tableColumns := []string{"name", "type", "image", "location"} | ||||
| 	table := formatter.CreateTable(tableColumns) | ||||
| 	table.Append([]string{ | ||||
| 		server.Name, | ||||
| 		server.ServerType.Name, | ||||
| 		server.Image.Name, | ||||
| 		server.Datacenter.Name, | ||||
| 	}) | ||||
| 	table.Render() | ||||
|  | ||||
| 	response := false | ||||
| 	prompt := &survey.Confirm{ | ||||
| 		Message: "continue with hetzner cloud VPS removal?", | ||||
| 	} | ||||
|  | ||||
| 	if err := survey.AskOne(prompt, &response); err != nil { | ||||
| 		return err | ||||
| 	} | ||||
|  | ||||
| 	if !response { | ||||
| 		logrus.Fatal("exiting as requested") | ||||
| 	} | ||||
|  | ||||
| 	_, err = client.Server.Delete(context.Background(), server) | ||||
| 	if err != nil { | ||||
| 		return err | ||||
| 	} | ||||
|  | ||||
| 	logrus.Infof("%s has been deleted from your hetzner cloud account", internal.HetznerCloudName) | ||||
|  | ||||
| 	return nil | ||||
| } | ||||
|  | ||||
| var serverRemoveCommand = cli.Command{ | ||||
| 	Name:      "remove", | ||||
| 	Aliases:   []string{"rm"}, | ||||
| 	ArgsUsage: "[<server>]", | ||||
| 	ArgsUsage: "<server>", | ||||
| 	Usage:     "Remove a managed server", | ||||
| 	Description: ` | ||||
| Remova a server from Abra management. | ||||
| 	Description: `Remove a managed server. | ||||
|  | ||||
| Depending on whether you used a 3rd party provider to create this server ("abra | ||||
| server new"), you can also destroy the virtual server as well. Pass | ||||
| "--server/-s" to tell Abra to try to delete this VPS. | ||||
|  | ||||
| Otherwise, Abra will remove the internal bookkeeping (~/.abra/servers/...) and | ||||
| underlying client connection context. This server will then be lost in time, | ||||
| like tears in rain. | ||||
| Abra will remove the internal bookkeeping (~/.abra/servers/...) and underlying | ||||
| client connection context. This server will then be lost in time, like tears in | ||||
| rain. | ||||
| `, | ||||
| 	Flags: []cli.Flag{ | ||||
| 		internal.DebugFlag, | ||||
| 		internal.NoInputFlag, | ||||
| 		rmServerFlag, | ||||
| 		internal.ServerProviderFlag, | ||||
|  | ||||
| 		// Hetzner | ||||
| 		internal.HetznerCloudNameFlag, | ||||
| 		internal.HetznerCloudAPITokenFlag, | ||||
| 		internal.OfflineFlag, | ||||
| 	}, | ||||
| 	Before: internal.SubCommandBefore, | ||||
| 	Before:       internal.SubCommandBefore, | ||||
| 	BashComplete: autocomplete.ServerNameComplete, | ||||
| 	Action: func(c *cli.Context) error { | ||||
| 		serverName := internal.ValidateServer(c) | ||||
|  | ||||
| 		warnMsg := `Did not pass -s/--server for actual server deletion, prompting! | ||||
|  | ||||
| Abra doesn't currently know if it helped you create this server with one of the | ||||
| 3rd party integrations (e.g. Capsul). You have a choice here to actually, | ||||
| really and finally destroy this server using those integrations. If you want to | ||||
| do this, choose Yes. | ||||
|  | ||||
| If you just want to remove the server config files & context, choose No. | ||||
| ` | ||||
|  | ||||
| 		if !rmServer { | ||||
| 			logrus.Warn(fmt.Sprintf(warnMsg)) | ||||
|  | ||||
| 			response := false | ||||
| 			prompt := &survey.Confirm{ | ||||
| 				Message: "delete actual live server?", | ||||
| 			} | ||||
| 			if err := survey.AskOne(prompt, &response); err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
| 			if response { | ||||
| 				logrus.Info("setting -s/--server and attempting to remove actual server") | ||||
| 				rmServer = true | ||||
| 			} | ||||
| 		} | ||||
|  | ||||
| 		if rmServer { | ||||
| 			if err := internal.EnsureServerProvider(); err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
|  | ||||
| 			switch internal.ServerProvider { | ||||
| 			case "capsul": | ||||
| 				logrus.Warn("capsul provider does not support automatic removal yet, sorry!") | ||||
| 			case "hetzner-cloud": | ||||
| 				if err := rmHetznerCloudVPS(c); err != nil { | ||||
| 					logrus.Fatal(err) | ||||
| 				} | ||||
| 			} | ||||
| 		} | ||||
|  | ||||
| 		if err := client.DeleteContext(serverName); err != nil { | ||||
| 			logrus.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| @ -9,18 +9,10 @@ var ServerCommand = cli.Command{ | ||||
| 	Name:    "server", | ||||
| 	Aliases: []string{"s"}, | ||||
| 	Usage:   "Manage servers", | ||||
| 	Description: ` | ||||
| Create, manage and remove servers using 3rd party integrations.  | ||||
|  | ||||
| Servers can be created from scratch using the "abra server new" command. If you | ||||
| already have a server, you can add it to your configuration using "abra server | ||||
| add". Abra can provision servers so that they are ready to deploy Co-op Cloud | ||||
| recipes, see available flags on "abra server add" for more. | ||||
| `, | ||||
| 	Subcommands: []cli.Command{ | ||||
| 		serverNewCommand, | ||||
| 		serverAddCommand, | ||||
| 		serverListCommand, | ||||
| 		serverRemoveCommand, | ||||
| 		serverPruneCommand, | ||||
| 	}, | ||||
| } | ||||
|  | ||||
| @ -48,6 +48,7 @@ var Notify = cli.Command{ | ||||
| 	Flags: []cli.Flag{ | ||||
| 		internal.DebugFlag, | ||||
| 		majorFlag, | ||||
| 		internal.OfflineFlag, | ||||
| 	}, | ||||
| 	Before: internal.SubCommandBefore, | ||||
| 	Description: ` | ||||
| @ -96,6 +97,7 @@ var UpgradeApp = cli.Command{ | ||||
| 		internal.ChaosFlag, | ||||
| 		majorFlag, | ||||
| 		allFlag, | ||||
| 		internal.OfflineFlag, | ||||
| 	}, | ||||
| 	Before: internal.SubCommandBefore, | ||||
| 	Description: ` | ||||
| @ -146,7 +148,7 @@ update chaos deployments use the "--chaos" flag. Use it with care. | ||||
| 	}, | ||||
| } | ||||
|  | ||||
| // getLabel reads docker labels in the format of "coop-cloud.${STACK_NAME}.${LABEL}". | ||||
| // getLabel reads docker labels from running services in the format of "coop-cloud.${STACK_NAME}.${LABEL}". | ||||
| func getLabel(cl *dockerclient.Client, stackName string, label string) (string, error) { | ||||
| 	filter := filters.NewArgs() | ||||
| 	filter.Add("label", fmt.Sprintf("%s=%s", convert.LabelNamespace, stackName)) | ||||
| @ -168,7 +170,7 @@ func getLabel(cl *dockerclient.Client, stackName string, label string) (string, | ||||
| 	return "", nil | ||||
| } | ||||
|  | ||||
| // getBoolLabel reads a boolean docker label. | ||||
| // getBoolLabel reads a boolean docker label from running services | ||||
| func getBoolLabel(cl *dockerclient.Client, stackName string, label string) (bool, error) { | ||||
| 	lableValue, err := getLabel(cl, stackName, label) | ||||
| 	if err != nil { | ||||
| @ -270,7 +272,7 @@ func getDeployedVersion(cl *dockerclient.Client, stackName string, recipeName st | ||||
| // flag is set. | ||||
| func getAvailableUpgrades(cl *dockerclient.Client, stackName string, recipeName string, | ||||
| 	deployedVersion string) ([]string, error) { | ||||
| 	catl, err := recipe.ReadRecipeCatalogue() | ||||
| 	catl, err := recipe.ReadRecipeCatalogue(internal.Offline) | ||||
| 	if err != nil { | ||||
| 		return nil, err | ||||
| 	} | ||||
| @ -281,7 +283,8 @@ func getAvailableUpgrades(cl *dockerclient.Client, stackName string, recipeName | ||||
| 	} | ||||
|  | ||||
| 	if len(versions) == 0 { | ||||
| 		return nil, fmt.Errorf("no published releases for %s in the recipe catalogue?", recipeName) | ||||
| 		logrus.Warnf("no published releases for %s in the recipe catalogue?", recipeName) | ||||
| 		return nil, nil | ||||
| 	} | ||||
|  | ||||
| 	var availableUpgrades []string | ||||
| @ -313,7 +316,7 @@ func getAvailableUpgrades(cl *dockerclient.Client, stackName string, recipeName | ||||
|  | ||||
| // processRecipeRepoVersion clones, pulls, checks out the version and lints the | ||||
| // recipe repository. | ||||
| func processRecipeRepoVersion(recipeName string, version string) error { | ||||
| func processRecipeRepoVersion(recipeName, version string) error { | ||||
| 	if err := recipe.EnsureExists(recipeName); err != nil { | ||||
| 		return err | ||||
| 	} | ||||
| @ -326,7 +329,7 @@ func processRecipeRepoVersion(recipeName string, version string) error { | ||||
| 		return err | ||||
| 	} | ||||
|  | ||||
| 	if r, err := recipe.Get(recipeName); err != nil { | ||||
| 	if r, err := recipe.Get(recipeName, internal.Offline); err != nil { | ||||
| 		return err | ||||
| 	} else if err := lint.LintForErrors(r); err != nil { | ||||
| 		return err | ||||
| @ -361,7 +364,7 @@ func createDeployConfig(recipeName string, stackName string, env config.AppEnv) | ||||
| 		ResolveImage: stack.ResolveImageAlways, | ||||
| 	} | ||||
|  | ||||
| 	composeFiles, err := config.GetAppComposeFiles(recipeName, env) | ||||
| 	composeFiles, err := config.GetComposeFiles(recipeName, env) | ||||
| 	if err != nil { | ||||
| 		return nil, deployOpts, err | ||||
| 	} | ||||
| @ -383,9 +386,9 @@ func createDeployConfig(recipeName string, stackName string, env config.AppEnv) | ||||
| } | ||||
|  | ||||
| // tryUpgrade performs the upgrade if all the requirements are fulfilled. | ||||
| func tryUpgrade(cl *dockerclient.Client, stackName string, recipeName string) error { | ||||
| func tryUpgrade(cl *dockerclient.Client, stackName, recipeName string) error { | ||||
| 	if recipeName == "" { | ||||
| 		logrus.Debugf("Don't update %s due to missing recipe name", stackName) | ||||
| 		logrus.Debugf("don't update %s due to missing recipe name", stackName) | ||||
| 		return nil | ||||
| 	} | ||||
|  | ||||
| @ -395,7 +398,7 @@ func tryUpgrade(cl *dockerclient.Client, stackName string, recipeName string) er | ||||
| 	} | ||||
|  | ||||
| 	if chaos && !internal.Chaos { | ||||
| 		logrus.Debugf("Don't update %s due to chaos deployment.", stackName) | ||||
| 		logrus.Debugf("don't update %s due to chaos deployment", stackName) | ||||
| 		return nil | ||||
| 	} | ||||
|  | ||||
| @ -405,7 +408,7 @@ func tryUpgrade(cl *dockerclient.Client, stackName string, recipeName string) er | ||||
| 	} | ||||
|  | ||||
| 	if !updatesEnabled { | ||||
| 		logrus.Debugf("Don't update %s due to disabling auto updates or missing ENABLE_AUTOUPDATE env.", stackName) | ||||
| 		logrus.Debugf("don't update %s due to disabled auto updates or missing ENABLE_AUTO_UPDATE env", stackName) | ||||
| 		return nil | ||||
| 	} | ||||
|  | ||||
| @ -415,7 +418,7 @@ func tryUpgrade(cl *dockerclient.Client, stackName string, recipeName string) er | ||||
| 	} | ||||
|  | ||||
| 	if upgradeVersion == "" { | ||||
| 		logrus.Debugf("Don't update %s due to no new version.", stackName) | ||||
| 		logrus.Debugf("don't update %s due to no new version", stackName) | ||||
| 		return nil | ||||
| 	} | ||||
|  | ||||
| @ -425,7 +428,8 @@ func tryUpgrade(cl *dockerclient.Client, stackName string, recipeName string) er | ||||
| } | ||||
|  | ||||
| // upgrade performs all necessary steps to upgrade an app. | ||||
| func upgrade(cl *dockerclient.Client, stackName string, recipeName string, upgradeVersion string) error { | ||||
| func upgrade(cl *dockerclient.Client, stackName, recipeName, | ||||
| 	upgradeVersion string) error { | ||||
| 	env, err := getEnv(cl, stackName) | ||||
| 	if err != nil { | ||||
| 		return err | ||||
| @ -451,7 +455,7 @@ func upgrade(cl *dockerclient.Client, stackName string, recipeName string, upgra | ||||
| 		return err | ||||
| 	} | ||||
|  | ||||
| 	logrus.Infof("Upgrade %s (%s) to version %s", stackName, recipeName, upgradeVersion) | ||||
| 	logrus.Infof("upgrade %s (%s) to version %s", stackName, recipeName, upgradeVersion) | ||||
|  | ||||
| 	err = stack.RunDeploy(cl, deployOpts, compose, stackName, true) | ||||
|  | ||||
|  | ||||
							
								
								
									
										143
									
								
								go.mod
									
									
									
									
									
								
							
							
						
						
									
										143
									
								
								go.mod
									
									
									
									
									
								
							| @ -1,50 +1,133 @@ | ||||
| module coopcloud.tech/abra | ||||
|  | ||||
| go 1.16 | ||||
| go 1.21 | ||||
|  | ||||
| require ( | ||||
| 	coopcloud.tech/tagcmp v0.0.0-20211103052201-885b22f77d52 | ||||
| 	github.com/AlecAivazis/survey/v2 v2.3.6 | ||||
| 	github.com/Autonomic-Cooperative/godotenv v1.3.1-0.20210731094149-b031ea1211e7 | ||||
| 	coopcloud.tech/tagcmp v0.0.0-20230809071031-eb3e7758d4eb | ||||
| 	git.coopcloud.tech/coop-cloud/godotenv v1.5.2-0.20231130100509-01bff8284355 | ||||
| 	github.com/AlecAivazis/survey/v2 v2.3.7 | ||||
| 	github.com/Gurpartap/logrus-stack v0.0.0-20170710170904-89c00d8a28f4 | ||||
| 	github.com/docker/cli v20.10.23+incompatible | ||||
| 	github.com/docker/distribution v2.8.1+incompatible | ||||
| 	github.com/docker/docker v20.10.23+incompatible | ||||
| 	github.com/distribution/distribution v2.8.3+incompatible | ||||
| 	github.com/docker/cli v26.1.4+incompatible | ||||
| 	github.com/docker/docker v26.1.4+incompatible | ||||
| 	github.com/docker/go-units v0.5.0 | ||||
| 	github.com/go-git/go-git/v5 v5.5.2 | ||||
| 	github.com/hetznercloud/hcloud-go v1.39.0 | ||||
| 	github.com/go-git/go-git/v5 v5.12.0 | ||||
| 	github.com/google/go-cmp v0.6.0 | ||||
| 	github.com/moby/sys/signal v0.7.0 | ||||
| 	github.com/moby/term v0.0.0-20210619224110-3f7ff695adc6 | ||||
| 	github.com/moby/term v0.5.0 | ||||
| 	github.com/olekukonko/tablewriter v0.0.5 | ||||
| 	github.com/pkg/errors v0.9.1 | ||||
| 	github.com/schollz/progressbar/v3 v3.13.0 | ||||
| 	github.com/sirupsen/logrus v1.9.0 | ||||
| 	gotest.tools/v3 v3.4.0 | ||||
| 	github.com/schollz/progressbar/v3 v3.14.4 | ||||
| 	github.com/sirupsen/logrus v1.9.3 | ||||
| 	gotest.tools/v3 v3.5.1 | ||||
| ) | ||||
|  | ||||
| require ( | ||||
| 	dario.cat/mergo v1.0.0 // indirect | ||||
| 	github.com/Azure/go-ansiterm v0.0.0-20230124172434-306776ec8161 // indirect | ||||
| 	github.com/BurntSushi/toml v1.4.0 // indirect | ||||
| 	github.com/Microsoft/go-winio v0.6.2 // indirect | ||||
| 	github.com/ProtonMail/go-crypto v1.0.0 // indirect | ||||
| 	github.com/beorn7/perks v1.0.1 // indirect | ||||
| 	github.com/cenkalti/backoff/v4 v4.3.0 // indirect | ||||
| 	github.com/cespare/xxhash/v2 v2.3.0 // indirect | ||||
| 	github.com/cloudflare/circl v1.3.9 // indirect | ||||
| 	github.com/containerd/log v0.1.0 // indirect | ||||
| 	github.com/cpuguy83/go-md2man/v2 v2.0.4 // indirect | ||||
| 	github.com/cyphar/filepath-securejoin v0.2.5 // indirect | ||||
| 	github.com/davecgh/go-spew v1.1.1 // indirect | ||||
| 	github.com/distribution/reference v0.6.0 // indirect | ||||
| 	github.com/docker/distribution v2.7.1+incompatible // indirect | ||||
| 	github.com/docker/go v1.5.1-1.0.20160303222718-d30aec9fd63c // indirect | ||||
| 	github.com/docker/go-connections v0.5.0 // indirect | ||||
| 	github.com/docker/go-metrics v0.0.1 // indirect | ||||
| 	github.com/docker/libtrust v0.0.0-20160708172513-aabc10ec26b7 // indirect | ||||
| 	github.com/emirpasic/gods v1.18.1 // indirect | ||||
| 	github.com/felixge/httpsnoop v1.0.4 // indirect | ||||
| 	github.com/ghodss/yaml v1.0.0 // indirect | ||||
| 	github.com/go-git/gcfg v1.5.1-0.20230307220236-3a3c6141e376 // indirect | ||||
| 	github.com/go-git/go-billy/v5 v5.5.0 // indirect | ||||
| 	github.com/go-logr/logr v1.4.2 // indirect | ||||
| 	github.com/go-logr/stdr v1.2.2 // indirect | ||||
| 	github.com/gogo/protobuf v1.3.2 // indirect | ||||
| 	github.com/golang/groupcache v0.0.0-20210331224755-41bb18bfe9da // indirect | ||||
| 	github.com/grpc-ecosystem/grpc-gateway/v2 v2.20.0 // indirect | ||||
| 	github.com/hashicorp/go-cleanhttp v0.5.2 // indirect | ||||
| 	github.com/inconshreveable/mousetrap v1.1.0 // indirect | ||||
| 	github.com/jbenet/go-context v0.0.0-20150711004518-d14ea06fba99 // indirect | ||||
| 	github.com/kballard/go-shellquote v0.0.0-20180428030007-95032a82bc51 // indirect | ||||
| 	github.com/kevinburke/ssh_config v1.2.0 // indirect | ||||
| 	github.com/klauspost/compress v1.17.9 // indirect | ||||
| 	github.com/mattn/go-colorable v0.1.13 // indirect | ||||
| 	github.com/mattn/go-isatty v0.0.20 // indirect | ||||
| 	github.com/mattn/go-runewidth v0.0.15 // indirect | ||||
| 	github.com/mgutz/ansi v0.0.0-20200706080929-d51e80ef957d // indirect | ||||
| 	github.com/miekg/pkcs11 v1.1.1 // indirect | ||||
| 	github.com/mitchellh/colorstring v0.0.0-20190213212951-d06e56a500db // indirect | ||||
| 	github.com/mitchellh/mapstructure v1.5.0 // indirect | ||||
| 	github.com/moby/docker-image-spec v1.3.1 // indirect | ||||
| 	github.com/moby/sys/user v0.1.0 // indirect | ||||
| 	github.com/morikuni/aec v1.0.0 // indirect | ||||
| 	github.com/opencontainers/go-digest v1.0.0 // indirect | ||||
| 	github.com/opencontainers/runc v1.1.13 // indirect | ||||
| 	github.com/pjbgf/sha1cd v0.3.0 // indirect | ||||
| 	github.com/pmezard/go-difflib v1.0.0 // indirect | ||||
| 	github.com/prometheus/client_model v0.6.1 // indirect | ||||
| 	github.com/prometheus/common v0.54.0 // indirect | ||||
| 	github.com/prometheus/procfs v0.15.1 // indirect | ||||
| 	github.com/rivo/uniseg v0.4.7 // indirect | ||||
| 	github.com/russross/blackfriday/v2 v2.1.0 // indirect | ||||
| 	github.com/skeema/knownhosts v1.2.2 // indirect | ||||
| 	github.com/spf13/pflag v1.0.5 // indirect | ||||
| 	github.com/xanzy/ssh-agent v0.3.3 // indirect | ||||
| 	github.com/xeipuuv/gojsonreference v0.0.0-20180127040603-bd5ef7bd5415 // indirect | ||||
| 	github.com/xeipuuv/gojsonschema v1.2.0 // indirect | ||||
| 	go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp v0.52.0 // indirect | ||||
| 	go.opentelemetry.io/otel v1.27.0 // indirect | ||||
| 	go.opentelemetry.io/otel/exporters/otlp/otlpmetric/otlpmetricgrpc v1.27.0 // indirect | ||||
| 	go.opentelemetry.io/otel/exporters/otlp/otlptrace v1.27.0 // indirect | ||||
| 	go.opentelemetry.io/otel/exporters/otlp/otlptrace/otlptracegrpc v1.27.0 // indirect | ||||
| 	go.opentelemetry.io/otel/metric v1.27.0 // indirect | ||||
| 	go.opentelemetry.io/otel/sdk v1.27.0 // indirect | ||||
| 	go.opentelemetry.io/otel/sdk/metric v1.27.0 // indirect | ||||
| 	go.opentelemetry.io/otel/trace v1.27.0 // indirect | ||||
| 	go.opentelemetry.io/proto/otlp v1.3.1 // indirect | ||||
| 	golang.org/x/crypto v0.24.0 // indirect | ||||
| 	golang.org/x/net v0.26.0 // indirect | ||||
| 	golang.org/x/sync v0.7.0 // indirect | ||||
| 	golang.org/x/term v0.21.0 // indirect | ||||
| 	golang.org/x/text v0.16.0 // indirect | ||||
| 	golang.org/x/time v0.5.0 // indirect | ||||
| 	google.golang.org/genproto/googleapis/api v0.0.0-20240617180043-68d350f18fd4 // indirect | ||||
| 	google.golang.org/genproto/googleapis/rpc v0.0.0-20240617180043-68d350f18fd4 // indirect | ||||
| 	google.golang.org/grpc v1.64.0 // indirect | ||||
| 	google.golang.org/protobuf v1.34.2 // indirect | ||||
| 	gopkg.in/warnings.v0 v0.1.2 // indirect | ||||
| 	gopkg.in/yaml.v2 v2.4.0 // indirect | ||||
| 	gopkg.in/yaml.v3 v3.0.1 // indirect | ||||
| ) | ||||
|  | ||||
| require ( | ||||
| 	coopcloud.tech/libcapsul v0.0.0-20211022074848-c35e78fe3f3e | ||||
| 	github.com/buger/goterm v1.0.4 | ||||
| 	github.com/containerd/containerd v1.5.9 // indirect | ||||
| 	github.com/containerd/containerd v1.7.18 // indirect | ||||
| 	github.com/containers/image v3.0.2+incompatible | ||||
| 	github.com/containers/storage v1.38.2 // indirect | ||||
| 	github.com/decentral1se/passgen v1.0.1 | ||||
| 	github.com/docker/docker-credential-helpers v0.6.4 // indirect | ||||
| 	github.com/docker/docker-credential-helpers v0.8.2 // indirect | ||||
| 	github.com/facebookgo/stack v0.0.0-20160209184415-751773369052 // indirect | ||||
| 	github.com/fvbommel/sortorder v1.0.2 // indirect | ||||
| 	github.com/fvbommel/sortorder v1.1.0 // indirect | ||||
| 	github.com/google/shlex v0.0.0-20191202100458-e7afc7fbc510 // indirect | ||||
| 	github.com/gorilla/mux v1.8.0 // indirect | ||||
| 	github.com/hashicorp/go-retryablehttp v0.7.2 | ||||
| 	github.com/klauspost/pgzip v1.2.5 | ||||
| 	github.com/libdns/gandi v1.0.2 | ||||
| 	github.com/libdns/libdns v0.2.1 | ||||
| 	github.com/moby/sys/mount v0.2.0 // indirect | ||||
| 	github.com/opencontainers/image-spec v1.0.3-0.20211202193544-a5463b7f9c84 // indirect | ||||
| 	github.com/sergi/go-diff v1.2.0 // indirect | ||||
| 	github.com/spf13/cobra v1.3.0 // indirect | ||||
| 	github.com/gorilla/mux v1.8.1 // indirect | ||||
| 	github.com/hashicorp/go-retryablehttp v0.7.7 | ||||
| 	github.com/moby/patternmatcher v0.6.0 // indirect | ||||
| 	github.com/moby/sys/sequential v0.5.0 // indirect | ||||
| 	github.com/opencontainers/image-spec v1.1.0 // indirect | ||||
| 	github.com/prometheus/client_golang v1.19.1 // indirect | ||||
| 	github.com/sergi/go-diff v1.3.2-0.20230802210424-5b0b94c5c0d3 // indirect | ||||
| 	github.com/spf13/cobra v1.8.1 // indirect | ||||
| 	github.com/stretchr/testify v1.9.0 | ||||
| 	github.com/theupdateframework/notary v0.7.0 // indirect | ||||
| 	github.com/urfave/cli v1.22.9 | ||||
| 	github.com/xeipuuv/gojsonpointer v0.0.0-20190809123943-df4f5c81cb3b // indirect | ||||
| 	golang.org/x/crypto v0.5.0 // indirect | ||||
| 	golang.org/x/sys v0.5.0 | ||||
| 	github.com/urfave/cli v1.22.15 | ||||
| 	github.com/xeipuuv/gojsonpointer v0.0.0-20190905194746-02993c407bfb // indirect | ||||
| 	golang.org/x/sys v0.21.0 | ||||
| ) | ||||
|  | ||||
| @ -9,7 +9,7 @@ import ( | ||||
| 	"github.com/urfave/cli" | ||||
| ) | ||||
|  | ||||
| // AppNameComplete copletes app names | ||||
| // AppNameComplete copletes app names. | ||||
| func AppNameComplete(c *cli.Context) { | ||||
| 	appNames, err := config.GetAppNames() | ||||
| 	if err != nil { | ||||
| @ -25,9 +25,19 @@ func AppNameComplete(c *cli.Context) { | ||||
| 	} | ||||
| } | ||||
|  | ||||
| // RecipeNameComplete completes recipe names | ||||
| func ServiceNameComplete(appName string) { | ||||
| 	serviceNames, err := config.GetAppServiceNames(appName) | ||||
| 	if err != nil { | ||||
| 		return | ||||
| 	} | ||||
| 	for _, s := range serviceNames { | ||||
| 		fmt.Println(s) | ||||
| 	} | ||||
| } | ||||
|  | ||||
| // RecipeNameComplete completes recipe names. | ||||
| func RecipeNameComplete(c *cli.Context) { | ||||
| 	catl, err := recipe.ReadRecipeCatalogue() | ||||
| 	catl, err := recipe.ReadRecipeCatalogue(false) | ||||
| 	if err != nil { | ||||
| 		logrus.Warn(err) | ||||
| 	} | ||||
| @ -41,7 +51,37 @@ func RecipeNameComplete(c *cli.Context) { | ||||
| 	} | ||||
| } | ||||
|  | ||||
| // SubcommandComplete completes subcommands. | ||||
| // RecipeVersionComplete completes versions for the recipe. | ||||
| func RecipeVersionComplete(recipeName string) { | ||||
| 	catl, err := recipe.ReadRecipeCatalogue(false) | ||||
| 	if err != nil { | ||||
| 		logrus.Warn(err) | ||||
| 	} | ||||
|  | ||||
| 	for _, v := range catl[recipeName].Versions { | ||||
| 		for v2 := range v { | ||||
| 			fmt.Println(v2) | ||||
| 		} | ||||
| 	} | ||||
| } | ||||
|  | ||||
| // ServerNameComplete completes server names. | ||||
| func ServerNameComplete(c *cli.Context) { | ||||
| 	files, err := config.LoadAppFiles("") | ||||
| 	if err != nil { | ||||
| 		logrus.Fatal(err) | ||||
| 	} | ||||
|  | ||||
| 	if c.NArg() > 0 { | ||||
| 		return | ||||
| 	} | ||||
|  | ||||
| 	for _, appFile := range files { | ||||
| 		fmt.Println(appFile.Server) | ||||
| 	} | ||||
| } | ||||
|  | ||||
| // SubcommandComplete completes sub-commands. | ||||
| func SubcommandComplete(c *cli.Context) { | ||||
| 	if c.NArg() > 0 { | ||||
| 		return | ||||
| @ -52,7 +92,6 @@ func SubcommandComplete(c *cli.Context) { | ||||
| 		"autocomplete", | ||||
| 		"catalogue", | ||||
| 		"recipe", | ||||
| 		"record", | ||||
| 		"server", | ||||
| 		"upgrade", | ||||
| 	} | ||||
|  | ||||
| @ -12,49 +12,11 @@ import ( | ||||
| 	"github.com/sirupsen/logrus" | ||||
| ) | ||||
|  | ||||
| // CatalogueSkipList is all the repos that are not recipes. | ||||
| var CatalogueSkipList = map[string]bool{ | ||||
| 	"abra":                        true, | ||||
| 	"abra-apps":                   true, | ||||
| 	"abra-aur":                    true, | ||||
| 	"abra-bash":                   true, | ||||
| 	"abra-capsul":                 true, | ||||
| 	"abra-gandi":                  true, | ||||
| 	"abra-hetzner":                true, | ||||
| 	"apps":                        true, | ||||
| 	"aur-abra-git":                true, | ||||
| 	"auto-recipes-catalogue-json": true, | ||||
| 	"auto-mirror":                 true, | ||||
| 	"backup-bot":                  true, | ||||
| 	"backup-bot-two":              true, | ||||
| 	"beta.coopcloud.tech":         true, | ||||
| 	"comrade-renovate-bot":        true, | ||||
| 	"coopcloud.tech":              true, | ||||
| 	"coturn":                      true, | ||||
| 	"docker-cp-deploy":            true, | ||||
| 	"docker-dind-bats-kcov":       true, | ||||
| 	"docs.coopcloud.tech":         true, | ||||
| 	"drone-abra":                  true, | ||||
| 	"example":                     true, | ||||
| 	"gardening":                   true, | ||||
| 	"go-abra":                     true, | ||||
| 	"organising":                  true, | ||||
| 	"pyabra":                      true, | ||||
| 	"radicle-seed-node":           true, | ||||
| 	"recipes-catalogue-json":      true, | ||||
| 	"recipes-wishlist":            true, | ||||
| 	"recipes.coopcloud.tech":      true, | ||||
| 	"stack-ssh-deploy":            true, | ||||
| 	"swarm-cronjob":               true, | ||||
| 	"tagcmp":                      true, | ||||
| 	"traefik-cert-dumper":         true, | ||||
| 	"tyop":                        true, | ||||
| } | ||||
|  | ||||
| // EnsureCatalogue ensures that the catalogue is cloned locally & present. | ||||
| func EnsureCatalogue() error { | ||||
| 	catalogueDir := path.Join(config.ABRA_DIR, "catalogue") | ||||
| 	if _, err := os.Stat(catalogueDir); err != nil && os.IsNotExist(err) { | ||||
| 		logrus.Warnf("local recipe catalogue is missing, retrieving now") | ||||
| 		url := fmt.Sprintf("%s/%s.git", config.REPOS_BASE_URL, config.CATALOGUE_JSON_REPO_NAME) | ||||
| 		if err := gitPkg.Clone(catalogueDir, url); err != nil { | ||||
| 			return err | ||||
| @ -66,9 +28,8 @@ func EnsureCatalogue() error { | ||||
| 	return nil | ||||
| } | ||||
|  | ||||
| // EnsureUpToDate ensures that the local catalogue has no unstaged changes as | ||||
| // is up to date. This is useful to run before doing catalogue generation. | ||||
| func EnsureUpToDate() error { | ||||
| // EnsureIsClean makes sure that the catalogue has no unstaged changes. | ||||
| func EnsureIsClean() error { | ||||
| 	isClean, err := gitPkg.IsClean(config.CATALOGUE_DIR) | ||||
| 	if err != nil { | ||||
| 		return err | ||||
| @ -79,6 +40,11 @@ func EnsureUpToDate() error { | ||||
| 		return fmt.Errorf(msg, config.CATALOGUE_DIR) | ||||
| 	} | ||||
|  | ||||
| 	return nil | ||||
| } | ||||
|  | ||||
| // EnsureUpToDate ensures that the local catalogue is up to date. | ||||
| func EnsureUpToDate() error { | ||||
| 	repo, err := git.PlainOpen(config.CATALOGUE_DIR) | ||||
| 	if err != nil { | ||||
| 		return err | ||||
|  | ||||
| @ -26,7 +26,7 @@ func New(serverName string) (*client.Client, error) { | ||||
| 	if serverName != "default" { | ||||
| 		context, err := GetContext(serverName) | ||||
| 		if err != nil { | ||||
| 			return nil, err | ||||
| 			return nil, fmt.Errorf("unknown server, run \"abra server add %s\"?", serverName) | ||||
| 		} | ||||
|  | ||||
| 		ctxEndpoint, err := contextPkg.GetContextEndpoint(context) | ||||
|  | ||||
| @ -14,19 +14,16 @@ import ( | ||||
|  | ||||
| type Context = contextStore.Metadata | ||||
|  | ||||
| func CreateContext(contextName string, user string, port string) error { | ||||
| 	host := contextName | ||||
| 	if user != "" { | ||||
| 		host = fmt.Sprintf("%s@%s", user, host) | ||||
| 	} | ||||
| 	if port != "" { | ||||
| 		host = fmt.Sprintf("%s:%s", host, port) | ||||
| 	} | ||||
| 	host = fmt.Sprintf("ssh://%s", host) | ||||
| // CreateContext creates a new Docker context. | ||||
| func CreateContext(contextName string) error { | ||||
| 	host := fmt.Sprintf("ssh://%s", contextName) | ||||
|  | ||||
| 	if err := createContext(contextName, host); err != nil { | ||||
| 		return err | ||||
| 	} | ||||
|  | ||||
| 	logrus.Debugf("created the %s context", contextName) | ||||
|  | ||||
| 	return nil | ||||
| } | ||||
|  | ||||
|  | ||||
| @ -6,7 +6,7 @@ import ( | ||||
|  | ||||
| 	"github.com/containers/image/docker" | ||||
| 	"github.com/containers/image/types" | ||||
| 	"github.com/docker/distribution/reference" | ||||
| 	"github.com/distribution/reference" | ||||
| ) | ||||
|  | ||||
| // GetRegistryTags retrieves all tags of an image from a container registry. | ||||
|  | ||||
| @ -2,14 +2,17 @@ package client | ||||
|  | ||||
| import ( | ||||
| 	"context" | ||||
| 	"fmt" | ||||
| 	"time" | ||||
|  | ||||
| 	"github.com/docker/docker/api/types" | ||||
| 	"github.com/docker/docker/api/types/filters" | ||||
| 	"github.com/docker/docker/api/types/volume" | ||||
| 	"github.com/docker/docker/client" | ||||
| 	"github.com/sirupsen/logrus" | ||||
| ) | ||||
|  | ||||
| func GetVolumes(cl *client.Client, ctx context.Context, server string, fs filters.Args) ([]*types.Volume, error) { | ||||
| 	volumeListOKBody, err := cl.VolumeList(ctx, fs) | ||||
| func GetVolumes(cl *client.Client, ctx context.Context, server string, fs filters.Args) ([]*volume.Volume, error) { | ||||
| 	volumeListOKBody, err := cl.VolumeList(ctx, volume.ListOptions{Filters: fs}) | ||||
| 	volumeList := volumeListOKBody.Volumes | ||||
| 	if err != nil { | ||||
| 		return volumeList, err | ||||
| @ -18,7 +21,7 @@ func GetVolumes(cl *client.Client, ctx context.Context, server string, fs filter | ||||
| 	return volumeList, nil | ||||
| } | ||||
|  | ||||
| func GetVolumeNames(volumes []*types.Volume) []string { | ||||
| func GetVolumeNames(volumes []*volume.Volume) []string { | ||||
| 	var volumeNames []string | ||||
|  | ||||
| 	for _, vol := range volumes { | ||||
| @ -28,13 +31,32 @@ func GetVolumeNames(volumes []*types.Volume) []string { | ||||
| 	return volumeNames | ||||
| } | ||||
|  | ||||
| func RemoveVolumes(cl *client.Client, ctx context.Context, server string, volumeNames []string, force bool) error { | ||||
| func RemoveVolumes(cl *client.Client, ctx context.Context, volumeNames []string, force bool, retries int) error { | ||||
| 	for _, volName := range volumeNames { | ||||
| 		err := cl.VolumeRemove(ctx, volName, force) | ||||
| 		err := retryFunc(5, func() error { | ||||
| 			return cl.VolumeRemove(context.Background(), volName, force) | ||||
| 		}) | ||||
| 		if err != nil { | ||||
| 			return err | ||||
| 			return fmt.Errorf("volume %s: %s", volName, err) | ||||
| 		} | ||||
| 	} | ||||
|  | ||||
| 	return nil | ||||
| } | ||||
|  | ||||
| // retryFunc retries the given function for the given retries. After the nth | ||||
| // retry it waits (n + 1)^2 seconds before the next retry (starting with n=0). | ||||
| // It returns an error if the function still failed after the last retry. | ||||
| func retryFunc(retries int, fn func() error) error { | ||||
| 	for i := 0; i < retries; i++ { | ||||
| 		err := fn() | ||||
| 		if err == nil { | ||||
| 			return nil | ||||
| 		} | ||||
| 		if i+1 < retries { | ||||
| 			sleep := time.Duration(i+1) * time.Duration(i+1) | ||||
| 			logrus.Infof("%s: waiting %d seconds before next retry", err, sleep) | ||||
| 			time.Sleep(sleep * time.Second) | ||||
| 		} | ||||
| 	} | ||||
| 	return fmt.Errorf("%d retries failed", retries) | ||||
| } | ||||
|  | ||||
							
								
								
									
										26
									
								
								pkg/client/volumes_test.go
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										26
									
								
								pkg/client/volumes_test.go
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,26 @@ | ||||
| package client | ||||
|  | ||||
| import ( | ||||
| 	"fmt" | ||||
| 	"testing" | ||||
| ) | ||||
|  | ||||
| func TestRetryFunc(t *testing.T) { | ||||
| 	err := retryFunc(1, func() error { return nil }) | ||||
| 	if err != nil { | ||||
| 		t.Errorf("should not return an error: %s", err) | ||||
| 	} | ||||
|  | ||||
| 	i := 0 | ||||
| 	fn := func() error { | ||||
| 		i++ | ||||
| 		return fmt.Errorf("oh no, something went wrong!") | ||||
| 	} | ||||
| 	err = retryFunc(2, fn) | ||||
| 	if err == nil { | ||||
| 		t.Error("should return an error") | ||||
| 	} | ||||
| 	if i != 2 { | ||||
| 		t.Errorf("The function should have been called 1 times, got %d", i) | ||||
| 	} | ||||
| } | ||||
| @ -11,8 +11,8 @@ import ( | ||||
| 	"coopcloud.tech/abra/pkg/formatter" | ||||
| 	"coopcloud.tech/abra/pkg/upstream/stack" | ||||
| 	loader "coopcloud.tech/abra/pkg/upstream/stack" | ||||
| 	"github.com/distribution/reference" | ||||
| 	composetypes "github.com/docker/cli/cli/compose/types" | ||||
| 	"github.com/docker/distribution/reference" | ||||
| 	"github.com/sirupsen/logrus" | ||||
| ) | ||||
|  | ||||
| @ -122,7 +122,7 @@ func UpdateLabel(pattern, serviceName, label, recipeName string) error { | ||||
|  | ||||
| 		discovered := false | ||||
| 		for oldLabel, value := range service.Deploy.Labels { | ||||
| 			if strings.HasPrefix(oldLabel, "coop-cloud") { | ||||
| 			if strings.HasPrefix(oldLabel, "coop-cloud") && strings.Contains(oldLabel, "version") { | ||||
| 				discovered = true | ||||
|  | ||||
| 				bytes, err := ioutil.ReadFile(composeFile) | ||||
|  | ||||
| @ -25,6 +25,9 @@ import ( | ||||
| // AppEnv is a map of the values in an apps env config | ||||
| type AppEnv = map[string]string | ||||
|  | ||||
| // AppModifiers is a map of modifiers in an apps env config | ||||
| type AppModifiers = map[string]map[string]string | ||||
|  | ||||
| // AppName is AppName | ||||
| type AppName = string | ||||
|  | ||||
| @ -47,36 +50,63 @@ type App struct { | ||||
| 	Path   string | ||||
| } | ||||
|  | ||||
| // StackName gets whatever the docker safe (uses the right delimiting | ||||
| // character, e.g. "_") stack name is for the app. In general, you don't want | ||||
| // to use this to show anything to end-users, you want use a.Name instead. | ||||
| // See documentation of config.StackName | ||||
| func (a App) StackName() string { | ||||
| 	if _, exists := a.Env["STACK_NAME"]; exists { | ||||
| 		return a.Env["STACK_NAME"] | ||||
| 	} | ||||
|  | ||||
| 	stackName := SanitiseAppName(a.Name) | ||||
|  | ||||
| 	if len(stackName) > 45 { | ||||
| 		logrus.Debugf("trimming %s to %s to avoid runtime limits", stackName, stackName[:45]) | ||||
| 		stackName = stackName[:45] | ||||
| 	} | ||||
| 	stackName := StackName(a.Name) | ||||
|  | ||||
| 	a.Env["STACK_NAME"] = stackName | ||||
|  | ||||
| 	return stackName | ||||
| } | ||||
|  | ||||
| // Filters retrieves exact app filters for querying the container runtime. Due | ||||
| // to upstream issues, filtering works different depending on what you're | ||||
| // StackName gets whatever the docker safe (uses the right delimiting | ||||
| // character, e.g. "_") stack name is for the app. In general, you don't want | ||||
| // to use this to show anything to end-users, you want use a.Name instead. | ||||
| func StackName(appName string) string { | ||||
| 	stackName := SanitiseAppName(appName) | ||||
|  | ||||
| 	if len(stackName) > MAX_SANITISED_APP_NAME_LENGTH { | ||||
| 		logrus.Debugf("trimming %s to %s to avoid runtime limits", stackName, stackName[:MAX_SANITISED_APP_NAME_LENGTH]) | ||||
| 		stackName = stackName[:MAX_SANITISED_APP_NAME_LENGTH] | ||||
| 	} | ||||
|  | ||||
| 	return stackName | ||||
| } | ||||
|  | ||||
| // Filters retrieves app filters for querying the container runtime. By default | ||||
| // it filters on all services in the app. It is also possible to pass an | ||||
| // otional list of service names, which get filtered instead. | ||||
| // | ||||
| // Due to upstream issues, filtering works different depending on what you're | ||||
| // querying. So, for example, secrets don't work with regex! The caller needs | ||||
| // to implement their own validation that the right secrets are matched. In | ||||
| // order to handle these cases, we provide the `appendServiceNames` / | ||||
| // `exactMatch` modifiers. | ||||
| func (a App) Filters(appendServiceNames, exactMatch bool) (filters.Args, error) { | ||||
| func (a App) Filters(appendServiceNames, exactMatch bool, services ...string) (filters.Args, error) { | ||||
| 	filters := filters.NewArgs() | ||||
| 	if len(services) > 0 { | ||||
| 		for _, serviceName := range services { | ||||
| 			filters.Add("name", ServiceFilter(a.StackName(), serviceName, exactMatch)) | ||||
| 		} | ||||
| 		return filters, nil | ||||
| 	} | ||||
|  | ||||
| 	composeFiles, err := GetAppComposeFiles(a.Recipe, a.Env) | ||||
| 	// When not appending the service name, just add one filter for the whole | ||||
| 	// stack. | ||||
| 	if !appendServiceNames { | ||||
| 		f := fmt.Sprintf("%s", a.StackName()) | ||||
| 		if exactMatch { | ||||
| 			f = fmt.Sprintf("^%s", f) | ||||
| 		} | ||||
| 		filters.Add("name", f) | ||||
| 		return filters, nil | ||||
| 	} | ||||
|  | ||||
| 	composeFiles, err := GetComposeFiles(a.Recipe, a.Env) | ||||
| 	if err != nil { | ||||
| 		return filters, err | ||||
| 	} | ||||
| @ -88,28 +118,23 @@ func (a App) Filters(appendServiceNames, exactMatch bool) (filters.Args, error) | ||||
| 	} | ||||
|  | ||||
| 	for _, service := range compose.Services { | ||||
| 		var filter string | ||||
|  | ||||
| 		if appendServiceNames { | ||||
| 			if exactMatch { | ||||
| 				filter = fmt.Sprintf("^%s_%s", a.StackName(), service.Name) | ||||
| 			} else { | ||||
| 				filter = fmt.Sprintf("%s_%s", a.StackName(), service.Name) | ||||
| 			} | ||||
| 		} else { | ||||
| 			if exactMatch { | ||||
| 				filter = fmt.Sprintf("^%s", a.StackName()) | ||||
| 			} else { | ||||
| 				filter = fmt.Sprintf("%s", a.StackName()) | ||||
| 			} | ||||
| 		} | ||||
|  | ||||
| 		filters.Add("name", filter) | ||||
| 		f := ServiceFilter(a.StackName(), service.Name, exactMatch) | ||||
| 		filters.Add("name", f) | ||||
| 	} | ||||
|  | ||||
| 	return filters, nil | ||||
| } | ||||
|  | ||||
| // ServiceFilter creates a filter string for filtering a service in the docker | ||||
| // container runtime. When exact match is true, it uses regex to match the | ||||
| // string exactly. | ||||
| func ServiceFilter(stack, service string, exact bool) string { | ||||
| 	if exact { | ||||
| 		return fmt.Sprintf("^%s_%s", stack, service) | ||||
| 	} | ||||
| 	return fmt.Sprintf("%s_%s", stack, service) | ||||
| } | ||||
|  | ||||
| // ByServer sort a slice of Apps | ||||
| type ByServer []App | ||||
|  | ||||
| @ -149,7 +174,7 @@ func (a ByName) Less(i, j int) bool { | ||||
| 	return strings.ToLower(a[i].Name) < strings.ToLower(a[j].Name) | ||||
| } | ||||
|  | ||||
| func readAppEnvFile(appFile AppFile, name AppName) (App, error) { | ||||
| func ReadAppEnvFile(appFile AppFile, name AppName) (App, error) { | ||||
| 	env, err := ReadEnv(appFile.Path) | ||||
| 	if err != nil { | ||||
| 		return App{}, fmt.Errorf("env file for %s couldn't be read: %s", name, err.Error()) | ||||
| @ -157,7 +182,7 @@ func readAppEnvFile(appFile AppFile, name AppName) (App, error) { | ||||
|  | ||||
| 	logrus.Debugf("read env %s from %s", env, appFile.Path) | ||||
|  | ||||
| 	app, err := newApp(env, name, appFile) | ||||
| 	app, err := NewApp(env, name, appFile) | ||||
| 	if err != nil { | ||||
| 		return App{}, fmt.Errorf("env file for %s has issues: %s", name, err.Error()) | ||||
| 	} | ||||
| @ -165,15 +190,15 @@ func readAppEnvFile(appFile AppFile, name AppName) (App, error) { | ||||
| 	return app, nil | ||||
| } | ||||
|  | ||||
| // newApp creates new App object | ||||
| func newApp(env AppEnv, name string, appFile AppFile) (App, error) { | ||||
| // NewApp creates new App object | ||||
| func NewApp(env AppEnv, name string, appFile AppFile) (App, error) { | ||||
| 	domain := env["DOMAIN"] | ||||
|  | ||||
| 	recipe, exists := env["RECIPE"] | ||||
| 	if !exists { | ||||
| 		recipe, exists = env["TYPE"] | ||||
| 		if !exists { | ||||
| 			return App{}, fmt.Errorf("%s is missing the RECIPE env var", name) | ||||
| 			return App{}, fmt.Errorf("%s is missing the TYPE env var?", name) | ||||
| 		} | ||||
| 	} | ||||
|  | ||||
| @ -232,7 +257,7 @@ func GetApp(apps AppFiles, name AppName) (App, error) { | ||||
| 		return App{}, fmt.Errorf("cannot find app with name %s", name) | ||||
| 	} | ||||
|  | ||||
| 	app, err := readAppEnvFile(appFile, name) | ||||
| 	app, err := ReadAppEnvFile(appFile, name) | ||||
| 	if err != nil { | ||||
| 		return App{}, err | ||||
| 	} | ||||
| @ -277,7 +302,7 @@ func GetAppServiceNames(appName string) ([]string, error) { | ||||
| 		return serviceNames, err | ||||
| 	} | ||||
|  | ||||
| 	composeFiles, err := GetAppComposeFiles(app.Recipe, app.Env) | ||||
| 	composeFiles, err := GetComposeFiles(app.Recipe, app.Env) | ||||
| 	if err != nil { | ||||
| 		return serviceNames, err | ||||
| 	} | ||||
| @ -326,11 +351,11 @@ func TemplateAppEnvSample(recipeName, appName, server, domain string) error { | ||||
| 	} | ||||
|  | ||||
| 	appEnvPath := path.Join(ABRA_DIR, "servers", server, fmt.Sprintf("%s.env", appName)) | ||||
| 	if _, err := os.Stat(appEnvPath); os.IsExist(err) { | ||||
| 	if _, err := os.Stat(appEnvPath); !os.IsNotExist(err) { | ||||
| 		return fmt.Errorf("%s already exists?", appEnvPath) | ||||
| 	} | ||||
|  | ||||
| 	err = ioutil.WriteFile(appEnvPath, envSample, 0664) | ||||
| 	err = ioutil.WriteFile(appEnvPath, envSample, 0o664) | ||||
| 	if err != nil { | ||||
| 		return err | ||||
| 	} | ||||
| @ -369,13 +394,6 @@ func GetAppStatuses(apps []App, MachineReadable bool) (map[string]map[string]str | ||||
| 		} | ||||
| 	} | ||||
|  | ||||
| 	for server := range servers { | ||||
| 		// validate that all server connections work | ||||
| 		if _, err := client.New(server); err != nil { | ||||
| 			return statuses, err | ||||
| 		} | ||||
| 	} | ||||
|  | ||||
| 	var bar *progressbar.ProgressBar | ||||
| 	if !MachineReadable { | ||||
| 		bar = formatter.CreateProgressbar(len(servers), "querying remote servers...") | ||||
| @ -410,7 +428,25 @@ func GetAppStatuses(apps []App, MachineReadable bool) (map[string]map[string]str | ||||
| 				result["status"] = "deployed" | ||||
| 			} | ||||
|  | ||||
| 			labelKey := fmt.Sprintf("coop-cloud.%s.version", name) | ||||
| 			labelKey := fmt.Sprintf("coop-cloud.%s.chaos", name) | ||||
| 			chaos, ok := service.Spec.Labels[labelKey] | ||||
| 			if ok { | ||||
| 				result["chaos"] = chaos | ||||
| 			} | ||||
|  | ||||
| 			labelKey = fmt.Sprintf("coop-cloud.%s.chaos-version", name) | ||||
| 			if chaosVersion, ok := service.Spec.Labels[labelKey]; ok { | ||||
| 				result["chaosVersion"] = chaosVersion | ||||
| 			} | ||||
|  | ||||
| 			labelKey = fmt.Sprintf("coop-cloud.%s.autoupdate", name) | ||||
| 			if autoUpdate, ok := service.Spec.Labels[labelKey]; ok { | ||||
| 				result["autoUpdate"] = autoUpdate | ||||
| 			} else { | ||||
| 				result["autoUpdate"] = "false" | ||||
| 			} | ||||
|  | ||||
| 			labelKey = fmt.Sprintf("coop-cloud.%s.version", name) | ||||
| 			if version, ok := service.Spec.Labels[labelKey]; ok { | ||||
| 				result["version"] = version | ||||
| 			} else { | ||||
| @ -426,26 +462,56 @@ func GetAppStatuses(apps []App, MachineReadable bool) (map[string]map[string]str | ||||
| 	return statuses, nil | ||||
| } | ||||
|  | ||||
| // GetAppComposeFiles gets the list of compose files for an app which should be | ||||
| // merged into a composetypes.Config while respecting the COMPOSE_FILE env var. | ||||
| func GetAppComposeFiles(recipe string, appEnv AppEnv) ([]string, error) { | ||||
| // ensurePathExists ensures that a path exists. | ||||
| func ensurePathExists(path string) error { | ||||
| 	if _, err := os.Stat(path); err != nil && os.IsNotExist(err) { | ||||
| 		return err | ||||
| 	} | ||||
| 	return nil | ||||
| } | ||||
|  | ||||
| // GetComposeFiles gets the list of compose files for an app (or recipe if you | ||||
| // don't already have an app) which should be merged into a composetypes.Config | ||||
| // while respecting the COMPOSE_FILE env var. | ||||
| func GetComposeFiles(recipe string, appEnv AppEnv) ([]string, error) { | ||||
| 	var composeFiles []string | ||||
|  | ||||
| 	if _, ok := appEnv["COMPOSE_FILE"]; !ok { | ||||
| 		logrus.Debug("no COMPOSE_FILE detected, loading compose.yml") | ||||
| 	composeFileEnvVar, ok := appEnv["COMPOSE_FILE"] | ||||
| 	if !ok { | ||||
| 		path := fmt.Sprintf("%s/%s/compose.yml", RECIPES_DIR, recipe) | ||||
| 		if err := ensurePathExists(path); err != nil { | ||||
| 			return composeFiles, err | ||||
| 		} | ||||
| 		logrus.Debugf("no COMPOSE_FILE detected, loading default: %s", path) | ||||
| 		composeFiles = append(composeFiles, path) | ||||
| 		return composeFiles, nil | ||||
| 	} | ||||
|  | ||||
| 	composeFileEnvVar := appEnv["COMPOSE_FILE"] | ||||
| 	envVars := strings.Split(composeFileEnvVar, ":") | ||||
| 	logrus.Debugf("COMPOSE_FILE detected (%s), loading %s", composeFileEnvVar, strings.Join(envVars, ", ")) | ||||
| 	for _, file := range strings.Split(composeFileEnvVar, ":") { | ||||
| 	if !strings.Contains(composeFileEnvVar, ":") { | ||||
| 		path := fmt.Sprintf("%s/%s/%s", RECIPES_DIR, recipe, composeFileEnvVar) | ||||
| 		if err := ensurePathExists(path); err != nil { | ||||
| 			return composeFiles, err | ||||
| 		} | ||||
| 		logrus.Debugf("COMPOSE_FILE detected, loading %s", path) | ||||
| 		composeFiles = append(composeFiles, path) | ||||
| 		return composeFiles, nil | ||||
| 	} | ||||
|  | ||||
| 	numComposeFiles := strings.Count(composeFileEnvVar, ":") + 1 | ||||
| 	envVars := strings.SplitN(composeFileEnvVar, ":", numComposeFiles) | ||||
| 	if len(envVars) != numComposeFiles { | ||||
| 		return composeFiles, fmt.Errorf("COMPOSE_FILE (=\"%s\") parsing failed?", composeFileEnvVar) | ||||
| 	} | ||||
|  | ||||
| 	for _, file := range envVars { | ||||
| 		path := fmt.Sprintf("%s/%s/%s", RECIPES_DIR, recipe, file) | ||||
| 		if err := ensurePathExists(path); err != nil { | ||||
| 			return composeFiles, err | ||||
| 		} | ||||
| 		composeFiles = append(composeFiles, path) | ||||
| 	} | ||||
|  | ||||
| 	logrus.Debugf("COMPOSE_FILE detected (%s), loading %s", composeFileEnvVar, strings.Join(envVars, ", ")) | ||||
| 	logrus.Debugf("retrieved %s configs for %s", strings.Join(composeFiles, ", "), recipe) | ||||
|  | ||||
| 	return composeFiles, nil | ||||
| @ -506,6 +572,17 @@ func SetChaosLabel(compose *composetypes.Config, stackName string, chaos bool) { | ||||
| 	} | ||||
| } | ||||
|  | ||||
| // SetChaosVersionLabel adds the label 'coop-cloud.${STACK_NAME}.chaos-version=$(GIT_COMMIT)' to the app container | ||||
| func SetChaosVersionLabel(compose *composetypes.Config, stackName string, chaosVersion string) { | ||||
| 	for _, service := range compose.Services { | ||||
| 		if service.Name == "app" { | ||||
| 			logrus.Debugf("set label 'coop-cloud.%s.chaos-version' to %v for %s", stackName, chaosVersion, stackName) | ||||
| 			labelKey := fmt.Sprintf("coop-cloud.%s.chaos-version", stackName) | ||||
| 			service.Deploy.Labels[labelKey] = chaosVersion | ||||
| 		} | ||||
| 	} | ||||
| } | ||||
|  | ||||
| // SetUpdateLabel adds env ENABLE_AUTO_UPDATE as label to enable/disable the | ||||
| // auto update process for this app. The default if this variable is not set is to disable | ||||
| // the auto update process. | ||||
| @ -522,3 +599,29 @@ func SetUpdateLabel(compose *composetypes.Config, stackName string, appEnv AppEn | ||||
| 		} | ||||
| 	} | ||||
| } | ||||
|  | ||||
| // GetLabel reads docker labels in the format of "coop-cloud.${STACK_NAME}.${LABEL}" from the local compose files | ||||
| func GetLabel(compose *composetypes.Config, stackName string, label string) string { | ||||
| 	for _, service := range compose.Services { | ||||
| 		if service.Name == "app" { | ||||
| 			labelKey := fmt.Sprintf("coop-cloud.%s.%s", stackName, label) | ||||
| 			logrus.Debugf("get label '%s'", labelKey) | ||||
| 			if labelValue, ok := service.Deploy.Labels[labelKey]; ok { | ||||
| 				return labelValue | ||||
| 			} | ||||
| 		} | ||||
| 	} | ||||
| 	logrus.Debugf("no %s label found for %s", label, stackName) | ||||
| 	return "" | ||||
| } | ||||
|  | ||||
| // GetTimeoutFromLabel reads the timeout value from docker label "coop-cloud.${STACK_NAME}.TIMEOUT" and returns 50 as default value | ||||
| func GetTimeoutFromLabel(compose *composetypes.Config, stackName string) (int, error) { | ||||
| 	timeout := 50 // Default Timeout | ||||
| 	var err error = nil | ||||
| 	if timeoutLabel := GetLabel(compose, stackName, "timeout"); timeoutLabel != "" { | ||||
| 		logrus.Debugf("timeout label: %s", timeoutLabel) | ||||
| 		timeout, err = strconv.Atoi(timeoutLabel) | ||||
| 	} | ||||
| 	return timeout, err | ||||
| } | ||||
|  | ||||
| @ -1,36 +1,197 @@ | ||||
| package config | ||||
| package config_test | ||||
|  | ||||
| import ( | ||||
| 	"encoding/json" | ||||
| 	"fmt" | ||||
| 	"reflect" | ||||
| 	"testing" | ||||
|  | ||||
| 	"coopcloud.tech/abra/pkg/config" | ||||
| 	"coopcloud.tech/abra/pkg/recipe" | ||||
| 	"github.com/docker/docker/api/types/filters" | ||||
| 	"github.com/google/go-cmp/cmp" | ||||
| 	"github.com/stretchr/testify/assert" | ||||
| ) | ||||
|  | ||||
| func TestNewApp(t *testing.T) { | ||||
| 	app, err := newApp(expectedAppEnv, appName, expectedAppFile) | ||||
| 	app, err := config.NewApp(ExpectedAppEnv, AppName, ExpectedAppFile) | ||||
| 	if err != nil { | ||||
| 		t.Fatal(err) | ||||
| 	} | ||||
| 	if !reflect.DeepEqual(app, expectedApp) { | ||||
| 		t.Fatalf("did not get expected app type. Expected: %s; Got: %s", app, expectedApp) | ||||
| 	if !reflect.DeepEqual(app, ExpectedApp) { | ||||
| 		t.Fatalf("did not get expected app type. Expected: %s; Got: %s", app, ExpectedApp) | ||||
| 	} | ||||
| } | ||||
|  | ||||
| func TestReadAppEnvFile(t *testing.T) { | ||||
| 	app, err := readAppEnvFile(expectedAppFile, appName) | ||||
| 	app, err := config.ReadAppEnvFile(ExpectedAppFile, AppName) | ||||
| 	if err != nil { | ||||
| 		t.Fatal(err) | ||||
| 	} | ||||
| 	if !reflect.DeepEqual(app, expectedApp) { | ||||
| 		t.Fatalf("did not get expected app type. Expected: %s; Got: %s", app, expectedApp) | ||||
| 	if !reflect.DeepEqual(app, ExpectedApp) { | ||||
| 		t.Fatalf("did not get expected app type. Expected: %s; Got: %s", app, ExpectedApp) | ||||
| 	} | ||||
| } | ||||
|  | ||||
| func TestGetApp(t *testing.T) { | ||||
| 	app, err := GetApp(expectedAppFiles, appName) | ||||
| 	app, err := config.GetApp(ExpectedAppFiles, AppName) | ||||
| 	if err != nil { | ||||
| 		t.Fatal(err) | ||||
| 	} | ||||
| 	if !reflect.DeepEqual(app, expectedApp) { | ||||
| 		t.Fatalf("did not get expected app type. Expected: %s; Got: %s", app, expectedApp) | ||||
| 	if !reflect.DeepEqual(app, ExpectedApp) { | ||||
| 		t.Fatalf("did not get expected app type. Expected: %s; Got: %s", app, ExpectedApp) | ||||
| 	} | ||||
| } | ||||
|  | ||||
| func TestGetComposeFiles(t *testing.T) { | ||||
| 	offline := true | ||||
| 	r, err := recipe.Get("abra-test-recipe", offline) | ||||
| 	if err != nil { | ||||
| 		t.Fatal(err) | ||||
| 	} | ||||
|  | ||||
| 	tests := []struct { | ||||
| 		appEnv       map[string]string | ||||
| 		composeFiles []string | ||||
| 	}{ | ||||
| 		{ | ||||
| 			map[string]string{}, | ||||
| 			[]string{ | ||||
| 				fmt.Sprintf("%s/%s/compose.yml", config.RECIPES_DIR, r.Name), | ||||
| 			}, | ||||
| 		}, | ||||
| 		{ | ||||
| 			map[string]string{"COMPOSE_FILE": "compose.yml"}, | ||||
| 			[]string{ | ||||
| 				fmt.Sprintf("%s/%s/compose.yml", config.RECIPES_DIR, r.Name), | ||||
| 			}, | ||||
| 		}, | ||||
| 		{ | ||||
| 			map[string]string{"COMPOSE_FILE": "compose.extra_secret.yml"}, | ||||
| 			[]string{ | ||||
| 				fmt.Sprintf("%s/%s/compose.extra_secret.yml", config.RECIPES_DIR, r.Name), | ||||
| 			}, | ||||
| 		}, | ||||
| 		{ | ||||
| 			map[string]string{"COMPOSE_FILE": "compose.yml:compose.extra_secret.yml"}, | ||||
| 			[]string{ | ||||
| 				fmt.Sprintf("%s/%s/compose.yml", config.RECIPES_DIR, r.Name), | ||||
| 				fmt.Sprintf("%s/%s/compose.extra_secret.yml", config.RECIPES_DIR, r.Name), | ||||
| 			}, | ||||
| 		}, | ||||
| 	} | ||||
|  | ||||
| 	for _, test := range tests { | ||||
| 		composeFiles, err := config.GetComposeFiles(r.Name, test.appEnv) | ||||
| 		if err != nil { | ||||
| 			t.Fatal(err) | ||||
| 		} | ||||
| 		assert.Equal(t, composeFiles, test.composeFiles) | ||||
| 	} | ||||
| } | ||||
|  | ||||
| func TestGetComposeFilesError(t *testing.T) { | ||||
| 	offline := true | ||||
| 	r, err := recipe.Get("abra-test-recipe", offline) | ||||
| 	if err != nil { | ||||
| 		t.Fatal(err) | ||||
| 	} | ||||
|  | ||||
| 	tests := []struct{ appEnv map[string]string }{ | ||||
| 		{map[string]string{"COMPOSE_FILE": "compose.yml::compose.foo.yml"}}, | ||||
| 		{map[string]string{"COMPOSE_FILE": "doesnt.exist.yml"}}, | ||||
| 	} | ||||
|  | ||||
| 	for _, test := range tests { | ||||
| 		_, err := config.GetComposeFiles(r.Name, test.appEnv) | ||||
| 		if err == nil { | ||||
| 			t.Fatalf("should have failed: %v", test.appEnv) | ||||
| 		} | ||||
| 	} | ||||
| } | ||||
|  | ||||
| func TestFilters(t *testing.T) { | ||||
| 	oldDir := config.RECIPES_DIR | ||||
| 	config.RECIPES_DIR = "./testdir" | ||||
| 	defer func() { | ||||
| 		config.RECIPES_DIR = oldDir | ||||
| 	}() | ||||
|  | ||||
| 	app, err := config.NewApp(config.AppEnv{ | ||||
| 		"DOMAIN": "test.example.com", | ||||
| 		"RECIPE": "test-recipe", | ||||
| 	}, "test_example_com", config.AppFile{ | ||||
| 		Path:   "./testdir/filtertest.end", | ||||
| 		Server: "local", | ||||
| 	}) | ||||
| 	if err != nil { | ||||
| 		t.Fatal(err) | ||||
| 	} | ||||
|  | ||||
| 	f, err := app.Filters(false, false) | ||||
| 	if err != nil { | ||||
| 		t.Error(err) | ||||
| 	} | ||||
| 	compareFilter(t, f, map[string]map[string]bool{ | ||||
| 		"name": { | ||||
| 			"test_example_com": true, | ||||
| 		}, | ||||
| 	}) | ||||
|  | ||||
| 	f2, err := app.Filters(false, true) | ||||
| 	if err != nil { | ||||
| 		t.Error(err) | ||||
| 	} | ||||
| 	compareFilter(t, f2, map[string]map[string]bool{ | ||||
| 		"name": { | ||||
| 			"^test_example_com": true, | ||||
| 		}, | ||||
| 	}) | ||||
|  | ||||
| 	f3, err := app.Filters(true, false) | ||||
| 	if err != nil { | ||||
| 		t.Error(err) | ||||
| 	} | ||||
| 	compareFilter(t, f3, map[string]map[string]bool{ | ||||
| 		"name": { | ||||
| 			"test_example_com_bar": true, | ||||
| 			"test_example_com_foo": true, | ||||
| 		}, | ||||
| 	}) | ||||
|  | ||||
| 	f4, err := app.Filters(true, true) | ||||
| 	if err != nil { | ||||
| 		t.Error(err) | ||||
| 	} | ||||
| 	compareFilter(t, f4, map[string]map[string]bool{ | ||||
| 		"name": { | ||||
| 			"^test_example_com_bar": true, | ||||
| 			"^test_example_com_foo": true, | ||||
| 		}, | ||||
| 	}) | ||||
|  | ||||
| 	f5, err := app.Filters(false, false, "foo") | ||||
| 	if err != nil { | ||||
| 		t.Error(err) | ||||
| 	} | ||||
| 	compareFilter(t, f5, map[string]map[string]bool{ | ||||
| 		"name": { | ||||
| 			"test_example_com_foo": true, | ||||
| 		}, | ||||
| 	}) | ||||
| } | ||||
|  | ||||
| func compareFilter(t *testing.T, f1 filters.Args, f2 map[string]map[string]bool) { | ||||
| 	t.Helper() | ||||
| 	j1, err := f1.MarshalJSON() | ||||
| 	if err != nil { | ||||
| 		t.Error(err) | ||||
| 	} | ||||
| 	j2, err := json.Marshal(f2) | ||||
| 	if err != nil { | ||||
| 		t.Error(err) | ||||
| 	} | ||||
| 	if diff := cmp.Diff(string(j2), string(j1)); diff != "" { | ||||
| 		t.Errorf("filters mismatch (-want +got):\n%s", diff) | ||||
| 	} | ||||
| } | ||||
|  | ||||
| @ -8,13 +8,24 @@ import ( | ||||
| 	"os" | ||||
| 	"path" | ||||
| 	"path/filepath" | ||||
| 	"regexp" | ||||
| 	"sort" | ||||
| 	"strings" | ||||
|  | ||||
| 	"github.com/Autonomic-Cooperative/godotenv" | ||||
| 	"git.coopcloud.tech/coop-cloud/godotenv" | ||||
| 	"github.com/sirupsen/logrus" | ||||
| ) | ||||
|  | ||||
| var ABRA_DIR = os.ExpandEnv("$HOME/.abra") | ||||
| // getBaseDir retrieves the Abra base directory. | ||||
| func getBaseDir() string { | ||||
| 	home := os.ExpandEnv("$HOME/.abra") | ||||
| 	if customAbraDir, exists := os.LookupEnv("ABRA_DIR"); exists && customAbraDir != "" { | ||||
| 		home = customAbraDir | ||||
| 	} | ||||
| 	return home | ||||
| } | ||||
|  | ||||
| var ABRA_DIR = getBaseDir() | ||||
| var SERVERS_DIR = path.Join(ABRA_DIR, "servers") | ||||
| var RECIPES_DIR = path.Join(ABRA_DIR, "recipes") | ||||
| var VENDOR_DIR = path.Join(ABRA_DIR, "vendor") | ||||
| @ -25,6 +36,16 @@ var REPOS_BASE_URL = "https://git.coopcloud.tech/coop-cloud" | ||||
| var CATALOGUE_JSON_REPO_NAME = "recipes-catalogue-json" | ||||
| var SSH_URL_TEMPLATE = "ssh://git@git.coopcloud.tech:2222/coop-cloud/%s.git" | ||||
|  | ||||
| const MAX_SANITISED_APP_NAME_LENGTH = 45 | ||||
| const MAX_DOCKER_SECRET_LENGTH = 64 | ||||
|  | ||||
| var BackupbotLabel = "coop-cloud.backupbot.enabled" | ||||
|  | ||||
| // envVarModifiers is a list of env var modifier strings. These are added to | ||||
| // env vars as comments and modify their processing by Abra, e.g. determining | ||||
| // how long secrets should be. | ||||
| var envVarModifiers = []string{"length"} | ||||
|  | ||||
| // GetServers retrieves all servers. | ||||
| func GetServers() ([]string, error) { | ||||
| 	var servers []string | ||||
| @ -41,16 +62,30 @@ func GetServers() ([]string, error) { | ||||
|  | ||||
| // ReadEnv loads an app envivornment into a map. | ||||
| func ReadEnv(filePath string) (AppEnv, error) { | ||||
| 	var envFile AppEnv | ||||
| 	var envVars AppEnv | ||||
|  | ||||
| 	envFile, err := godotenv.Read(filePath) | ||||
| 	envVars, _, err := godotenv.Read(filePath) | ||||
| 	if err != nil { | ||||
| 		return nil, err | ||||
| 	} | ||||
|  | ||||
| 	logrus.Debugf("read %s from %s", envFile, filePath) | ||||
| 	logrus.Debugf("read %s from %s", envVars, filePath) | ||||
|  | ||||
| 	return envFile, nil | ||||
| 	return envVars, nil | ||||
| } | ||||
|  | ||||
| // ReadEnv loads an app envivornment and their modifiers in two different maps. | ||||
| func ReadEnvWithModifiers(filePath string) (AppEnv, AppModifiers, error) { | ||||
| 	var envVars AppEnv | ||||
|  | ||||
| 	envVars, mods, err := godotenv.Read(filePath) | ||||
| 	if err != nil { | ||||
| 		return nil, mods, err | ||||
| 	} | ||||
|  | ||||
| 	logrus.Debugf("read %s from %s", envVars, filePath) | ||||
|  | ||||
| 	return envVars, mods, nil | ||||
| } | ||||
|  | ||||
| // ReadServerNames retrieves all server names. | ||||
| @ -140,22 +175,107 @@ func ReadAbraShEnvVars(abraSh string) (map[string]string, error) { | ||||
| 		} | ||||
| 		return envVars, err | ||||
| 	} | ||||
| 	defer file.Close() | ||||
|  | ||||
| 	exportRegex, err := regexp.Compile(`^export\s+(\w+=\w+)`) | ||||
| 	if err != nil { | ||||
| 		return envVars, err | ||||
| 	} | ||||
|  | ||||
| 	scanner := bufio.NewScanner(file) | ||||
| 	for scanner.Scan() { | ||||
| 		line := scanner.Text() | ||||
| 		if strings.Contains(line, "export") { | ||||
| 			splitVals := strings.Split(line, "export ") | ||||
| 		txt := scanner.Text() | ||||
| 		if exportRegex.MatchString(txt) { | ||||
| 			splitVals := strings.Split(txt, "export ") | ||||
| 			envVarDef := splitVals[len(splitVals)-1] | ||||
| 			keyVal := strings.Split(envVarDef, "=") | ||||
| 			if len(keyVal) != 2 { | ||||
| 				return envVars, fmt.Errorf("couldn't parse %s", line) | ||||
| 				return envVars, fmt.Errorf("couldn't parse %s", txt) | ||||
| 			} | ||||
| 			envVars[keyVal[0]] = keyVal[1] | ||||
| 		} | ||||
| 	} | ||||
|  | ||||
| 	logrus.Debugf("read %s from %s", envVars, abraSh) | ||||
| 	if len(envVars) > 0 { | ||||
| 		logrus.Debugf("read %s from %s", envVars, abraSh) | ||||
| 	} else { | ||||
| 		logrus.Debugf("read 0 env var exports from %s", abraSh) | ||||
| 	} | ||||
|  | ||||
| 	return envVars, nil | ||||
| } | ||||
|  | ||||
| type EnvVar struct { | ||||
| 	Name    string | ||||
| 	Present bool | ||||
| } | ||||
|  | ||||
| func CheckEnv(app App) ([]EnvVar, error) { | ||||
| 	var envVars []EnvVar | ||||
|  | ||||
| 	envSamplePath := path.Join(RECIPES_DIR, app.Recipe, ".env.sample") | ||||
| 	if _, err := os.Stat(envSamplePath); err != nil { | ||||
| 		if os.IsNotExist(err) { | ||||
| 			return envVars, fmt.Errorf("%s does not exist?", envSamplePath) | ||||
| 		} | ||||
| 		return envVars, err | ||||
| 	} | ||||
|  | ||||
| 	envSample, err := ReadEnv(envSamplePath) | ||||
| 	if err != nil { | ||||
| 		return envVars, err | ||||
| 	} | ||||
|  | ||||
| 	var keys []string | ||||
| 	for key := range envSample { | ||||
| 		keys = append(keys, key) | ||||
| 	} | ||||
|  | ||||
| 	sort.Strings(keys) | ||||
|  | ||||
| 	for _, key := range keys { | ||||
| 		if _, ok := app.Env[key]; ok { | ||||
| 			envVars = append(envVars, EnvVar{Name: key, Present: true}) | ||||
| 		} else { | ||||
| 			envVars = append(envVars, EnvVar{Name: key, Present: false}) | ||||
| 		} | ||||
| 	} | ||||
|  | ||||
| 	return envVars, nil | ||||
| } | ||||
|  | ||||
| // ReadAbraShCmdNames reads the names of commands. | ||||
| func ReadAbraShCmdNames(abraSh string) ([]string, error) { | ||||
| 	var cmdNames []string | ||||
|  | ||||
| 	file, err := os.Open(abraSh) | ||||
| 	if err != nil { | ||||
| 		if os.IsNotExist(err) { | ||||
| 			return cmdNames, nil | ||||
| 		} | ||||
| 		return cmdNames, err | ||||
| 	} | ||||
| 	defer file.Close() | ||||
|  | ||||
| 	cmdNameRegex, err := regexp.Compile(`(\w+)(\(\).*\{)`) | ||||
| 	if err != nil { | ||||
| 		return cmdNames, err | ||||
| 	} | ||||
|  | ||||
| 	scanner := bufio.NewScanner(file) | ||||
| 	for scanner.Scan() { | ||||
| 		line := scanner.Text() | ||||
| 		matches := cmdNameRegex.FindStringSubmatch(line) | ||||
| 		if len(matches) > 0 { | ||||
| 			cmdNames = append(cmdNames, matches[1]) | ||||
| 		} | ||||
| 	} | ||||
|  | ||||
| 	if len(cmdNames) > 0 { | ||||
| 		logrus.Debugf("read %s from %s", strings.Join(cmdNames, " "), abraSh) | ||||
| 	} else { | ||||
| 		logrus.Debugf("read 0 command names from %s", abraSh) | ||||
| 	} | ||||
|  | ||||
| 	return cmdNames, nil | ||||
| } | ||||
|  | ||||
| @ -1,60 +1,69 @@ | ||||
| package config | ||||
| package config_test | ||||
|  | ||||
| import ( | ||||
| 	"fmt" | ||||
| 	"os" | ||||
| 	"path" | ||||
| 	"reflect" | ||||
| 	"slices" | ||||
| 	"strings" | ||||
| 	"testing" | ||||
|  | ||||
| 	"coopcloud.tech/abra/pkg/config" | ||||
| 	"coopcloud.tech/abra/pkg/recipe" | ||||
| ) | ||||
|  | ||||
| var testFolder = os.ExpandEnv("$PWD/../../tests/resources/test_folder") | ||||
| var validAbraConf = os.ExpandEnv("$PWD/../../tests/resources/valid_abra_config") | ||||
| var ( | ||||
| 	TestFolder    = os.ExpandEnv("$PWD/../../tests/resources/test_folder") | ||||
| 	ValidAbraConf = os.ExpandEnv("$PWD/../../tests/resources/valid_abra_config") | ||||
| ) | ||||
|  | ||||
| // make sure these are in alphabetical order | ||||
| var tFolders = []string{"folder1", "folder2"} | ||||
| var tFiles = []string{"bar.env", "foo.env"} | ||||
| var ( | ||||
| 	TFolders = []string{"folder1", "folder2"} | ||||
| 	TFiles   = []string{"bar.env", "foo.env"} | ||||
| ) | ||||
|  | ||||
| var appName = "ecloud" | ||||
| var serverName = "evil.corp" | ||||
| var ( | ||||
| 	AppName    = "ecloud" | ||||
| 	ServerName = "evil.corp" | ||||
| ) | ||||
|  | ||||
| var expectedAppEnv = AppEnv{ | ||||
| var ExpectedAppEnv = config.AppEnv{ | ||||
| 	"DOMAIN": "ecloud.evil.corp", | ||||
| 	"RECIPE": "ecloud", | ||||
| } | ||||
|  | ||||
| var expectedApp = App{ | ||||
| 	Name:   appName, | ||||
| 	Recipe: expectedAppEnv["RECIPE"], | ||||
| 	Domain: expectedAppEnv["DOMAIN"], | ||||
| 	Env:    expectedAppEnv, | ||||
| 	Path:   expectedAppFile.Path, | ||||
| 	Server: expectedAppFile.Server, | ||||
| var ExpectedApp = config.App{ | ||||
| 	Name:   AppName, | ||||
| 	Recipe: ExpectedAppEnv["RECIPE"], | ||||
| 	Domain: ExpectedAppEnv["DOMAIN"], | ||||
| 	Env:    ExpectedAppEnv, | ||||
| 	Path:   ExpectedAppFile.Path, | ||||
| 	Server: ExpectedAppFile.Server, | ||||
| } | ||||
|  | ||||
| var expectedAppFile = AppFile{ | ||||
| 	Path:   path.Join(validAbraConf, "servers", serverName, appName+".env"), | ||||
| 	Server: serverName, | ||||
| var ExpectedAppFile = config.AppFile{ | ||||
| 	Path:   path.Join(ValidAbraConf, "servers", ServerName, AppName+".env"), | ||||
| 	Server: ServerName, | ||||
| } | ||||
|  | ||||
| var expectedAppFiles = map[string]AppFile{ | ||||
| 	appName: expectedAppFile, | ||||
| var ExpectedAppFiles = map[string]config.AppFile{ | ||||
| 	AppName: ExpectedAppFile, | ||||
| } | ||||
|  | ||||
| // var expectedServerNames = []string{"evil.corp"} | ||||
|  | ||||
| func TestGetAllFoldersInDirectory(t *testing.T) { | ||||
| 	folders, err := GetAllFoldersInDirectory(testFolder) | ||||
| 	folders, err := config.GetAllFoldersInDirectory(TestFolder) | ||||
| 	if err != nil { | ||||
| 		t.Fatal(err) | ||||
| 	} | ||||
| 	if !reflect.DeepEqual(folders, tFolders) { | ||||
| 		t.Fatalf("did not get expected folders. Expected: (%s), Got: (%s)", strings.Join(tFolders, ","), strings.Join(folders, ",")) | ||||
| 	if !reflect.DeepEqual(folders, TFolders) { | ||||
| 		t.Fatalf("did not get expected folders. Expected: (%s), Got: (%s)", strings.Join(TFolders, ","), strings.Join(folders, ",")) | ||||
| 	} | ||||
| } | ||||
|  | ||||
| func TestGetAllFilesInDirectory(t *testing.T) { | ||||
| 	files, err := GetAllFilesInDirectory(testFolder) | ||||
| 	files, err := config.GetAllFilesInDirectory(TestFolder) | ||||
| 	if err != nil { | ||||
| 		t.Fatal(err) | ||||
| 	} | ||||
| @ -62,23 +71,205 @@ func TestGetAllFilesInDirectory(t *testing.T) { | ||||
| 	for _, file := range files { | ||||
| 		fileNames = append(fileNames, file.Name()) | ||||
| 	} | ||||
| 	if !reflect.DeepEqual(fileNames, tFiles) { | ||||
| 		t.Fatalf("did not get expected files. Expected: (%s), Got: (%s)", strings.Join(tFiles, ","), strings.Join(fileNames, ",")) | ||||
| 	if !reflect.DeepEqual(fileNames, TFiles) { | ||||
| 		t.Fatalf("did not get expected files. Expected: (%s), Got: (%s)", strings.Join(TFiles, ","), strings.Join(fileNames, ",")) | ||||
| 	} | ||||
| } | ||||
|  | ||||
| func TestReadEnv(t *testing.T) { | ||||
| 	env, err := ReadEnv(expectedAppFile.Path) | ||||
| 	env, err := config.ReadEnv(ExpectedAppFile.Path) | ||||
| 	if err != nil { | ||||
| 		t.Fatal(err) | ||||
| 	} | ||||
| 	if !reflect.DeepEqual(env, expectedAppEnv) { | ||||
| 	if !reflect.DeepEqual(env, ExpectedAppEnv) { | ||||
| 		t.Fatalf( | ||||
| 			"did not get expected application settings. Expected: DOMAIN=%s RECIPE=%s; Got: DOMAIN=%s RECIPE=%s", | ||||
| 			expectedAppEnv["DOMAIN"], | ||||
| 			expectedAppEnv["RECIPE"], | ||||
| 			ExpectedAppEnv["DOMAIN"], | ||||
| 			ExpectedAppEnv["RECIPE"], | ||||
| 			env["DOMAIN"], | ||||
| 			env["RECIPE"], | ||||
| 		) | ||||
| 	} | ||||
| } | ||||
|  | ||||
| func TestReadAbraShEnvVars(t *testing.T) { | ||||
| 	offline := true | ||||
| 	r, err := recipe.Get("abra-test-recipe", offline) | ||||
| 	if err != nil { | ||||
| 		t.Fatal(err) | ||||
| 	} | ||||
|  | ||||
| 	abraShPath := fmt.Sprintf("%s/%s/%s", config.RECIPES_DIR, r.Name, "abra.sh") | ||||
| 	abraShEnv, err := config.ReadAbraShEnvVars(abraShPath) | ||||
| 	if err != nil { | ||||
| 		t.Fatal(err) | ||||
| 	} | ||||
|  | ||||
| 	if len(abraShEnv) == 0 { | ||||
| 		t.Error("at least one env var should be exported") | ||||
| 	} | ||||
|  | ||||
| 	if _, ok := abraShEnv["INNER_FOO"]; ok { | ||||
| 		t.Error("INNER_FOO should not be exported") | ||||
| 	} | ||||
|  | ||||
| 	if _, ok := abraShEnv["INNER_BAZ"]; ok { | ||||
| 		t.Error("INNER_BAZ should not be exported") | ||||
| 	} | ||||
|  | ||||
| 	if _, ok := abraShEnv["OUTER_FOO"]; !ok { | ||||
| 		t.Error("OUTER_FOO should be exported") | ||||
| 	} | ||||
| } | ||||
|  | ||||
| func TestReadAbraShCmdNames(t *testing.T) { | ||||
| 	offline := true | ||||
| 	r, err := recipe.Get("abra-test-recipe", offline) | ||||
| 	if err != nil { | ||||
| 		t.Fatal(err) | ||||
| 	} | ||||
|  | ||||
| 	abraShPath := fmt.Sprintf("%s/%s/%s", config.RECIPES_DIR, r.Name, "abra.sh") | ||||
| 	cmdNames, err := config.ReadAbraShCmdNames(abraShPath) | ||||
| 	if err != nil { | ||||
| 		t.Fatal(err) | ||||
| 	} | ||||
|  | ||||
| 	if len(cmdNames) == 0 { | ||||
| 		t.Error("at least one command name should be found") | ||||
| 	} | ||||
|  | ||||
| 	expectedCmdNames := []string{"test_cmd", "test_cmd_args"} | ||||
| 	for _, cmdName := range expectedCmdNames { | ||||
| 		if !slices.Contains(cmdNames, cmdName) { | ||||
| 			t.Fatalf("%s should have been found in %s", cmdName, abraShPath) | ||||
| 		} | ||||
| 	} | ||||
| } | ||||
|  | ||||
| func TestCheckEnv(t *testing.T) { | ||||
| 	offline := true | ||||
| 	r, err := recipe.Get("abra-test-recipe", offline) | ||||
| 	if err != nil { | ||||
| 		t.Fatal(err) | ||||
| 	} | ||||
|  | ||||
| 	envSamplePath := path.Join(config.RECIPES_DIR, r.Name, ".env.sample") | ||||
| 	envSample, err := config.ReadEnv(envSamplePath) | ||||
| 	if err != nil { | ||||
| 		t.Fatal(err) | ||||
| 	} | ||||
|  | ||||
| 	app := config.App{ | ||||
| 		Name:   "test-app", | ||||
| 		Recipe: r.Name, | ||||
| 		Domain: "example.com", | ||||
| 		Env:    envSample, | ||||
| 		Path:   "example.com.env", | ||||
| 		Server: "example.com", | ||||
| 	} | ||||
|  | ||||
| 	envVars, err := config.CheckEnv(app) | ||||
| 	if err != nil { | ||||
| 		t.Fatal(err) | ||||
| 	} | ||||
|  | ||||
| 	for _, envVar := range envVars { | ||||
| 		if !envVar.Present { | ||||
| 			t.Fatalf("%s should be present", envVar.Name) | ||||
| 		} | ||||
| 	} | ||||
| } | ||||
|  | ||||
| func TestCheckEnvError(t *testing.T) { | ||||
| 	offline := true | ||||
| 	r, err := recipe.Get("abra-test-recipe", offline) | ||||
| 	if err != nil { | ||||
| 		t.Fatal(err) | ||||
| 	} | ||||
|  | ||||
| 	envSamplePath := path.Join(config.RECIPES_DIR, r.Name, ".env.sample") | ||||
| 	envSample, err := config.ReadEnv(envSamplePath) | ||||
| 	if err != nil { | ||||
| 		t.Fatal(err) | ||||
| 	} | ||||
|  | ||||
| 	delete(envSample, "DOMAIN") | ||||
|  | ||||
| 	app := config.App{ | ||||
| 		Name:   "test-app", | ||||
| 		Recipe: r.Name, | ||||
| 		Domain: "example.com", | ||||
| 		Env:    envSample, | ||||
| 		Path:   "example.com.env", | ||||
| 		Server: "example.com", | ||||
| 	} | ||||
|  | ||||
| 	envVars, err := config.CheckEnv(app) | ||||
| 	if err != nil { | ||||
| 		t.Fatal(err) | ||||
| 	} | ||||
|  | ||||
| 	for _, envVar := range envVars { | ||||
| 		if envVar.Name == "DOMAIN" && envVar.Present { | ||||
| 			t.Fatalf("%s should not be present", envVar.Name) | ||||
| 		} | ||||
| 	} | ||||
| } | ||||
|  | ||||
| func TestEnvVarCommentsRemoved(t *testing.T) { | ||||
| 	offline := true | ||||
| 	r, err := recipe.Get("abra-test-recipe", offline) | ||||
| 	if err != nil { | ||||
| 		t.Fatal(err) | ||||
| 	} | ||||
|  | ||||
| 	envSamplePath := path.Join(config.RECIPES_DIR, r.Name, ".env.sample") | ||||
| 	envSample, err := config.ReadEnv(envSamplePath) | ||||
| 	if err != nil { | ||||
| 		t.Fatal(err) | ||||
| 	} | ||||
|  | ||||
| 	envVar, exists := envSample["WITH_COMMENT"] | ||||
| 	if !exists { | ||||
| 		t.Fatal("WITH_COMMENT env var should be present in .env.sample") | ||||
| 	} | ||||
|  | ||||
| 	if strings.Contains(envVar, "should be removed") { | ||||
| 		t.Fatalf("comment from '%s' should be removed", envVar) | ||||
| 	} | ||||
|  | ||||
| 	envVar, exists = envSample["SECRET_TEST_PASS_TWO_VERSION"] | ||||
| 	if !exists { | ||||
| 		t.Fatal("WITH_COMMENT env var should be present in .env.sample") | ||||
| 	} | ||||
|  | ||||
| 	if strings.Contains(envVar, "length") { | ||||
| 		t.Fatal("comment from env var SECRET_TEST_PASS_TWO_VERSION should have been removed") | ||||
| 	} | ||||
| } | ||||
|  | ||||
| func TestEnvVarModifiersIncluded(t *testing.T) { | ||||
| 	offline := true | ||||
| 	r, err := recipe.Get("abra-test-recipe", offline) | ||||
| 	if err != nil { | ||||
| 		t.Fatal(err) | ||||
| 	} | ||||
|  | ||||
| 	envSamplePath := path.Join(config.RECIPES_DIR, r.Name, ".env.sample") | ||||
| 	envSample, modifiers, err := config.ReadEnvWithModifiers(envSamplePath) | ||||
| 	if err != nil { | ||||
| 		t.Fatal(err) | ||||
| 	} | ||||
|  | ||||
| 	if !strings.Contains(envSample["SECRET_TEST_PASS_TWO_VERSION"], "v1") { | ||||
| 		t.Errorf("value should be 'v1', got: '%s'", envSample["SECRET_TEST_PASS_TWO_VERSION"]) | ||||
| 	} | ||||
| 	if modifiers == nil || modifiers["SECRET_TEST_PASS_TWO_VERSION"] == nil { | ||||
| 		t.Errorf("no modifiers included") | ||||
| 	} else { | ||||
| 		if modifiers["SECRET_TEST_PASS_TWO_VERSION"]["length"] != "10" { | ||||
| 			t.Errorf("length modifier should be '10', got: '%s'", modifiers["SECRET_TEST_PASS_TWO_VERSION"]["length"]) | ||||
| 		} | ||||
| 	} | ||||
| } | ||||
|  | ||||
							
								
								
									
										2
									
								
								pkg/config/testdir/filtertest.env
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										2
									
								
								pkg/config/testdir/filtertest.env
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,2 @@ | ||||
| RECIPE=test-recipe | ||||
| DOMAIN=test.example.com | ||||
							
								
								
									
										6
									
								
								pkg/config/testdir/test-recipe/compose.yml
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										6
									
								
								pkg/config/testdir/test-recipe/compose.yml
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,6 @@ | ||||
| version: "3.8" | ||||
| services: | ||||
|   foo: | ||||
|     image: debian | ||||
|   bar: | ||||
|     image: debian | ||||
| @ -8,6 +8,7 @@ import ( | ||||
| 	"coopcloud.tech/abra/pkg/formatter" | ||||
| 	"github.com/AlecAivazis/survey/v2" | ||||
| 	"github.com/docker/docker/api/types" | ||||
| 	containerTypes "github.com/docker/docker/api/types/container" | ||||
| 	"github.com/docker/docker/api/types/filters" | ||||
| 	"github.com/docker/docker/client" | ||||
| 	"github.com/sirupsen/logrus" | ||||
| @ -17,7 +18,7 @@ import ( | ||||
| // count of containers does not match 1, then a prompt is presented to let the | ||||
| // user choose. A count of 0 is handled gracefully. | ||||
| func GetContainer(c context.Context, cl *client.Client, filters filters.Args, noInput bool) (types.Container, error) { | ||||
| 	containerOpts := types.ContainerListOptions{Filters: filters} | ||||
| 	containerOpts := containerTypes.ListOptions{Filters: filters} | ||||
| 	containers, err := cl.ContainerList(c, containerOpts) | ||||
| 	if err != nil { | ||||
| 		return types.Container{}, err | ||||
| @ -28,7 +29,7 @@ func GetContainer(c context.Context, cl *client.Client, filters filters.Args, no | ||||
| 		return types.Container{}, fmt.Errorf("no containers matching the %v filter found?", filter) | ||||
| 	} | ||||
|  | ||||
| 	if len(containers) != 1 { | ||||
| 	if len(containers) > 1 { | ||||
| 		var containersRaw []string | ||||
| 		for _, container := range containers { | ||||
| 			containerName := strings.Join(container.Names, " ") | ||||
| @ -68,3 +69,15 @@ func GetContainer(c context.Context, cl *client.Client, filters filters.Args, no | ||||
|  | ||||
| 	return containers[0], nil | ||||
| } | ||||
|  | ||||
| // GetContainerFromStackAndService retrieves the container for the given stack and service. | ||||
| func GetContainerFromStackAndService(cl *client.Client, stack, service string) (types.Container, error) { | ||||
| 	filters := filters.NewArgs() | ||||
| 	filters.Add("name", fmt.Sprintf("^%s_%s", stack, service)) | ||||
|  | ||||
| 	container, err := GetContainer(context.Background(), cl, filters, true) | ||||
| 	if err != nil { | ||||
| 		return types.Container{}, err | ||||
| 	} | ||||
| 	return container, nil | ||||
| } | ||||
|  | ||||
| @ -8,22 +8,19 @@ import ( | ||||
| 	"github.com/docker/cli/cli/context" | ||||
| 	contextStore "github.com/docker/cli/cli/context/store" | ||||
| 	cliflags "github.com/docker/cli/cli/flags" | ||||
| 	"github.com/moby/term" | ||||
| ) | ||||
|  | ||||
| func NewDefaultDockerContextStore() *command.ContextStoreWithDefault { | ||||
| 	_, _, stderr := term.StdStreams() | ||||
| 	dockerConfig := dConfig.LoadDefaultConfigFile(stderr) | ||||
| 	contextDir := dConfig.ContextStoreDir() | ||||
| 	storeConfig := command.DefaultContextStoreConfig() | ||||
| 	store := newContextStore(contextDir, storeConfig) | ||||
|  | ||||
| 	opts := &cliflags.CommonOptions{Context: "default"} | ||||
| 	opts := &cliflags.ClientOptions{Context: "default"} | ||||
|  | ||||
| 	dockerContextStore := &command.ContextStoreWithDefault{ | ||||
| 		Store: store, | ||||
| 		Resolver: func() (*command.DefaultContext, error) { | ||||
| 			return command.ResolveDefaultContext(opts, dockerConfig, storeConfig, stderr) | ||||
| 			return command.ResolveDefaultContext(opts, storeConfig) | ||||
| 		}, | ||||
| 	} | ||||
|  | ||||
|  | ||||
| @ -3,39 +3,20 @@ package dns | ||||
| import ( | ||||
| 	"fmt" | ||||
| 	"net" | ||||
| 	"os" | ||||
| 	"time" | ||||
| 
 | ||||
| 	"github.com/AlecAivazis/survey/v2" | ||||
| 	"github.com/sirupsen/logrus" | ||||
| ) | ||||
| 
 | ||||
| // NewToken constructs a new DNS provider token. | ||||
| func NewToken(provider, providerTokenEnvVar string) (string, error) { | ||||
| 	if token, present := os.LookupEnv(providerTokenEnvVar); present { | ||||
| 		return token, nil | ||||
| 	} | ||||
| 
 | ||||
| 	logrus.Debugf("no %s in environment, asking via stdin", providerTokenEnvVar) | ||||
| 
 | ||||
| 	var token string | ||||
| 	prompt := &survey.Input{ | ||||
| 		Message: fmt.Sprintf("%s API token?", provider), | ||||
| 	} | ||||
| 	if err := survey.AskOne(prompt, &token); err != nil { | ||||
| 		return "", err | ||||
| 	} | ||||
| 
 | ||||
| 	return token, nil | ||||
| } | ||||
| 
 | ||||
| // EnsureIPv4 ensures that an ipv4 address is set for a domain name | ||||
| func EnsureIPv4(domainName string) (string, error) { | ||||
| 	ipv4, err := net.ResolveIPAddr("ip", domainName) | ||||
| 	ipv4, err := net.ResolveIPAddr("ip4", domainName) | ||||
| 	if err != nil { | ||||
| 		return "", err | ||||
| 	} | ||||
| 
 | ||||
| 	// NOTE(d1): e.g. when there is only an ipv6 record available | ||||
| 	if ipv4 == nil { | ||||
| 		return "", fmt.Errorf("unable to resolve ipv4 address for %s", domainName) | ||||
| 	} | ||||
| 
 | ||||
| 	return ipv4.String(), nil | ||||
| } | ||||
| 
 | ||||
| @ -72,12 +53,3 @@ func EnsureDomainsResolveSameIPv4(domainName, server string) (string, error) { | ||||
| 
 | ||||
| 	return ipv4, nil | ||||
| } | ||||
| 
 | ||||
| // GetTTL parses a ttl string into a duration | ||||
| func GetTTL(ttl string) (time.Duration, error) { | ||||
| 	val, err := time.ParseDuration(ttl) | ||||
| 	if err != nil { | ||||
| 		return val, err | ||||
| 	} | ||||
| 	return val, nil | ||||
| } | ||||
							
								
								
									
										64
									
								
								pkg/dns/dns_test.go
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										64
									
								
								pkg/dns/dns_test.go
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,64 @@ | ||||
| package dns | ||||
|  | ||||
| import ( | ||||
| 	"fmt" | ||||
| 	"testing" | ||||
|  | ||||
| 	"gotest.tools/v3/assert" | ||||
| ) | ||||
|  | ||||
| func TestEnsureDomainsResolveSameIPv4(t *testing.T) { | ||||
| 	tests := []struct { | ||||
| 		domainName     string | ||||
| 		serverName     string | ||||
| 		shouldValidate bool | ||||
| 	}{ | ||||
| 		// NOTE(d1): DNS records get checked, so use something that is maintained | ||||
| 		// within the federation. if you're here because of a failing test, try | ||||
| 		// `dig +short <domain>` to ensure stuff matches first! If flakyness | ||||
| 		// becomes an issue we can look into mocking | ||||
| 		{"docs.coopcloud.tech", "coopcloud.tech", true}, | ||||
| 		{"docs.coopcloud.tech", "swarm.autonomic.zone", true}, | ||||
|  | ||||
| 		// NOTE(d1): special case handling for "--local" | ||||
| 		{"", "default", true}, | ||||
| 		{"", "local", true}, | ||||
|  | ||||
| 		{"", "", false}, | ||||
| 		{"123", "", false}, | ||||
| 	} | ||||
|  | ||||
| 	for _, test := range tests { | ||||
| 		_, err := EnsureDomainsResolveSameIPv4(test.domainName, test.serverName) | ||||
| 		if err != nil && test.shouldValidate { | ||||
| 			t.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		if err == nil && !test.shouldValidate { | ||||
| 			t.Fatal(fmt.Errorf("should have failed but did not: %v", test)) | ||||
| 		} | ||||
| 	} | ||||
| } | ||||
|  | ||||
| func TestEnsureIpv4(t *testing.T) { | ||||
| 	// NOTE(d1): DNS records get checked, so use something that is maintained | ||||
| 	// within the federation. if you're here because of a failing test, try `dig | ||||
| 	// +short <domain>` to ensure stuff matches first! If flakyness becomes an | ||||
| 	// issue we can look into mocking | ||||
| 	domainName := "collabora.ostrom.collective.tools" | ||||
| 	serverName := "ostrom.collective.tools" | ||||
|  | ||||
| 	for i := 0; i < 15; i++ { | ||||
| 		domainIpv4, err := EnsureIPv4(domainName) | ||||
| 		if err != nil { | ||||
| 			t.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		serverIpv4, err := EnsureIPv4(serverName) | ||||
| 		if err != nil { | ||||
| 			t.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		assert.Equal(t, domainIpv4, serverIpv4) | ||||
| 	} | ||||
| } | ||||
| @ -1,15 +0,0 @@ | ||||
| package gandi | ||||
|  | ||||
| import ( | ||||
| 	"coopcloud.tech/abra/pkg/dns" | ||||
| 	"github.com/libdns/gandi" | ||||
| ) | ||||
|  | ||||
| // New constructs a new DNs provider. | ||||
| func New() (gandi.Provider, error) { | ||||
| 	token, err := dns.NewToken("Gandi", "GANDI_TOKEN") | ||||
| 	if err != nil { | ||||
| 		return gandi.Provider{}, err | ||||
| 	} | ||||
| 	return gandi.Provider{APIToken: token}, nil | ||||
| } | ||||
| @ -1,6 +1,7 @@ | ||||
| package formatter | ||||
|  | ||||
| import ( | ||||
| 	"fmt" | ||||
| 	"os" | ||||
| 	"strings" | ||||
| 	"time" | ||||
| @ -70,3 +71,21 @@ func StripTagMeta(image string) string { | ||||
|  | ||||
| 	return image | ||||
| } | ||||
|  | ||||
| // ByteCountSI presents a human friendly representation of a byte count. See | ||||
| // https://yourbasic.org/golang/formatting-byte-size-to-human-readable-format. | ||||
| func ByteCountSI(b uint64) string { | ||||
| 	const unit = 1000 | ||||
|  | ||||
| 	if b < unit { | ||||
| 		return fmt.Sprintf("%d B", b) | ||||
| 	} | ||||
|  | ||||
| 	div, exp := uint64(unit), 0 | ||||
| 	for n := b / unit; n >= unit; n /= unit { | ||||
| 		div *= unit | ||||
| 		exp++ | ||||
| 	} | ||||
|  | ||||
| 	return fmt.Sprintf("%.1f %cB", float64(b)/float64(div), "kMGTPE"[exp]) | ||||
| } | ||||
|  | ||||
							
								
								
									
										27
									
								
								pkg/git/add.go
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										27
									
								
								pkg/git/add.go
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,27 @@ | ||||
| package git | ||||
|  | ||||
| import ( | ||||
| 	"github.com/go-git/go-git/v5" | ||||
| 	"github.com/sirupsen/logrus" | ||||
| ) | ||||
|  | ||||
| // Add adds a file to the git index. | ||||
| func Add(repoPath, path string, dryRun bool) error { | ||||
| 	repo, err := git.PlainOpen(repoPath) | ||||
| 	if err != nil { | ||||
| 		return err | ||||
| 	} | ||||
|  | ||||
| 	worktree, err := repo.Worktree() | ||||
| 	if err != nil { | ||||
| 		return err | ||||
| 	} | ||||
|  | ||||
| 	if dryRun { | ||||
| 		logrus.Debugf("dry run: adding %s", path) | ||||
| 	} else { | ||||
| 		worktree.Add(path) | ||||
| 	} | ||||
|  | ||||
| 	return nil | ||||
| } | ||||
| @ -8,7 +8,7 @@ import ( | ||||
| ) | ||||
|  | ||||
| // Commit runs a git commit | ||||
| func Commit(repoPath, glob, commitMessage string, dryRun bool) error { | ||||
| func Commit(repoPath, commitMessage string, dryRun bool) error { | ||||
| 	if commitMessage == "" { | ||||
| 		return fmt.Errorf("no commit message specified?") | ||||
| 	} | ||||
| @ -33,17 +33,8 @@ func Commit(repoPath, glob, commitMessage string, dryRun bool) error { | ||||
| 	} | ||||
|  | ||||
| 	if !dryRun { | ||||
| 		err = commitWorktree.AddGlob(glob) | ||||
| 		if err != nil { | ||||
| 			return err | ||||
| 		} | ||||
| 		logrus.Debugf("staged %s for commit", glob) | ||||
| 	} else { | ||||
| 		logrus.Debugf("dry run: did not stage %s for commit", glob) | ||||
| 	} | ||||
|  | ||||
| 	if !dryRun { | ||||
| 		_, err = commitWorktree.Commit(commitMessage, &git.CommitOptions{}) | ||||
| 		// NOTE(d1): `All: true` does not include untracked files | ||||
| 		_, err = commitWorktree.Commit(commitMessage, &git.CommitOptions{All: true}) | ||||
| 		if err != nil { | ||||
| 			return err | ||||
| 		} | ||||
|  | ||||
							
								
								
									
										42
									
								
								pkg/git/diff.go
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										42
									
								
								pkg/git/diff.go
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,42 @@ | ||||
| package git | ||||
|  | ||||
| import ( | ||||
| 	"fmt" | ||||
| 	"os/exec" | ||||
|  | ||||
| 	"github.com/sirupsen/logrus" | ||||
| ) | ||||
|  | ||||
| // getGitDiffArgs builds the `git diff` invocation args. It removes the usage | ||||
| // of a pager and ensures that colours are specified even when Git might detect | ||||
| // otherwise. | ||||
| func getGitDiffArgs(repoPath string) []string { | ||||
| 	return []string{ | ||||
| 		"-C", | ||||
| 		repoPath, | ||||
| 		"--no-pager", | ||||
| 		"-c", | ||||
| 		"color.diff=always", | ||||
| 		"diff", | ||||
| 	} | ||||
| } | ||||
|  | ||||
| // DiffUnstaged shows a `git diff`. Due to limitations in the underlying go-git | ||||
| // library, this implementation requires the /usr/bin/git binary. It gracefully | ||||
| // skips if it cannot find the command on the system. | ||||
| func DiffUnstaged(path string) error { | ||||
| 	if _, err := exec.LookPath("git"); err != nil { | ||||
| 		logrus.Warnf("unable to locate git command, cannot output diff") | ||||
| 		return nil | ||||
| 	} | ||||
|  | ||||
| 	gitDiffArgs := getGitDiffArgs(path) | ||||
| 	diff, err := exec.Command("git", gitDiffArgs...).Output() | ||||
| 	if err != nil { | ||||
| 		return nil | ||||
| 	} | ||||
|  | ||||
| 	fmt.Print(string(diff)) | ||||
|  | ||||
| 	return nil | ||||
| } | ||||
| @ -3,6 +3,7 @@ package jsontable | ||||
| import ( | ||||
| 	"fmt" | ||||
| 	"io" | ||||
| 	"strings" | ||||
|  | ||||
| 	"github.com/olekukonko/tablewriter" | ||||
| ) | ||||
| @ -109,6 +110,9 @@ func (t *JSONTable) _JSONRenderInner() { | ||||
| 		} | ||||
| 		writeChar(t.out, '{') | ||||
| 		for keyidx, key := range t.keys { | ||||
| 			key := strings.ToLower(key) | ||||
| 			key = strings.ReplaceAll(key, " ", "-") | ||||
|  | ||||
| 			value := "nil" | ||||
| 			if keyidx < len(row) { | ||||
| 				value = row[keyidx] | ||||
| @ -138,10 +142,8 @@ func (t *JSONTable) JSONRender() { | ||||
|  | ||||
| 		if t.hasCaption { | ||||
| 			fmt.Fprintf(t.out, "\"%s\":\"%s\",", t.captionLabel, t.caption) | ||||
|  | ||||
| 		} | ||||
| 		fmt.Fprintf(t.out, "\"%s\":", t.dataLabel) | ||||
|  | ||||
| 	} | ||||
|  | ||||
| 	// write list | ||||
| @ -191,6 +193,12 @@ func (t *JSONTable) SetAutoMergeCellsByColumnIndex(cols []int) { | ||||
| 	t.tbl.SetAutoMergeCellsByColumnIndex(cols) | ||||
| } | ||||
|  | ||||
| // Stuff we should implement but we just proxy for now. | ||||
| func (t *JSONTable) SetAlignment(align int) { | ||||
| 	// FIXME | ||||
| 	t.tbl.SetAlignment(align) | ||||
| } | ||||
|  | ||||
| func (t *JSONTable) SetAutoMergeCells(auto bool) { | ||||
| 	// FIXME | ||||
| 	t.tbl.SetAutoMergeCells(auto) | ||||
|  | ||||
| @ -10,7 +10,9 @@ import ( | ||||
| 	"coopcloud.tech/abra/pkg/recipe" | ||||
| 	recipePkg "coopcloud.tech/abra/pkg/recipe" | ||||
| 	"coopcloud.tech/tagcmp" | ||||
| 	"github.com/docker/distribution/reference" | ||||
| 	"github.com/distribution/reference" | ||||
| 	"github.com/go-git/go-git/v5" | ||||
| 	"github.com/go-git/go-git/v5/plumbing" | ||||
| 	"github.com/sirupsen/logrus" | ||||
| ) | ||||
|  | ||||
| @ -113,6 +115,13 @@ var LintRules = map[string][]LintRule{ | ||||
| 			HowToResolve: "upload your recipe to git.coopcloud.tech/coop-cloud/...", | ||||
| 			Function:     LintHasRecipeRepo, | ||||
| 		}, | ||||
| 		{ | ||||
| 			Ref:          "R015", | ||||
| 			Level:        "warn", | ||||
| 			Description:  "long secret names", | ||||
| 			HowToResolve: "reduce length of secret names to 12 chars", | ||||
| 			Function:     LintSecretLengths, | ||||
| 		}, | ||||
| 	}, | ||||
| 	"error": { | ||||
| 		{ | ||||
| @ -151,6 +160,13 @@ var LintRules = map[string][]LintRule{ | ||||
| 			HowToResolve: "vendor config versions in an abra.sh", | ||||
| 			Function:     LintAbraShVendors, | ||||
| 		}, | ||||
| 		{ | ||||
| 			Ref:          "R014", | ||||
| 			Level:        "error", | ||||
| 			Description:  "only annotated tags used for recipe version", | ||||
| 			HowToResolve: "replace lightweight tag with annotated tag", | ||||
| 			Function:     LintValidTags, | ||||
| 		}, | ||||
| 	}, | ||||
| } | ||||
|  | ||||
| @ -324,7 +340,7 @@ func LintImagePresent(recipe recipe.Recipe) (bool, error) { | ||||
| } | ||||
|  | ||||
| func LintHasPublishedVersion(recipe recipe.Recipe) (bool, error) { | ||||
| 	catl, err := recipePkg.ReadRecipeCatalogue() | ||||
| 	catl, err := recipePkg.ReadRecipeCatalogue(false) | ||||
| 	if err != nil { | ||||
| 		logrus.Fatal(err) | ||||
| 	} | ||||
| @ -391,3 +407,44 @@ func LintHasRecipeRepo(recipe recipe.Recipe) (bool, error) { | ||||
|  | ||||
| 	return true, nil | ||||
| } | ||||
|  | ||||
| func LintSecretLengths(recipe recipe.Recipe) (bool, error) { | ||||
| 	for name := range recipe.Config.Secrets { | ||||
| 		if len(name) > 12 { | ||||
| 			return false, fmt.Errorf("secret %s is longer than 12 characters", name) | ||||
| 		} | ||||
| 	} | ||||
|  | ||||
| 	return true, nil | ||||
| } | ||||
|  | ||||
| func LintValidTags(recipe recipe.Recipe) (bool, error) { | ||||
| 	recipeDir := path.Join(config.RECIPES_DIR, recipe.Name) | ||||
|  | ||||
| 	repo, err := git.PlainOpen(recipeDir) | ||||
| 	if err != nil { | ||||
| 		return false, fmt.Errorf("unable to open %s: %s", recipeDir, err) | ||||
| 	} | ||||
|  | ||||
| 	iter, err := repo.Tags() | ||||
| 	if err != nil { | ||||
| 		logrus.Fatalf("unable to list local tags for %s", recipe.Name) | ||||
| 	} | ||||
|  | ||||
| 	if err := iter.ForEach(func(ref *plumbing.Reference) error { | ||||
| 		_, err := repo.TagObject(ref.Hash()) | ||||
| 		if err != nil { | ||||
| 			switch err { | ||||
| 			case plumbing.ErrObjectNotFound: | ||||
| 				return fmt.Errorf("invalid lightweight tag detected") | ||||
| 			default: | ||||
| 				return err | ||||
| 			} | ||||
| 		} | ||||
| 		return nil | ||||
| 	}); err != nil { | ||||
| 		return false, nil | ||||
| 	} | ||||
|  | ||||
| 	return true, nil | ||||
| } | ||||
|  | ||||
| @ -2,15 +2,15 @@ package recipe | ||||
|  | ||||
| import ( | ||||
| 	"encoding/json" | ||||
| 	"errors" | ||||
| 	"fmt" | ||||
| 	"io/ioutil" | ||||
| 	"os" | ||||
| 	"path" | ||||
| 	"path/filepath" | ||||
| 	"slices" | ||||
| 	"sort" | ||||
| 	"strconv" | ||||
| 	"strings" | ||||
| 	"time" | ||||
|  | ||||
| 	"coopcloud.tech/abra/pkg/catalogue" | ||||
| 	"coopcloud.tech/abra/pkg/compose" | ||||
| @ -21,10 +21,10 @@ import ( | ||||
| 	"coopcloud.tech/abra/pkg/upstream/stack" | ||||
| 	loader "coopcloud.tech/abra/pkg/upstream/stack" | ||||
| 	"coopcloud.tech/abra/pkg/web" | ||||
| 	"coopcloud.tech/tagcmp" | ||||
| 	"github.com/distribution/reference" | ||||
| 	composetypes "github.com/docker/cli/cli/compose/types" | ||||
| 	"github.com/docker/distribution/reference" | ||||
| 	"github.com/go-git/go-git/v5" | ||||
| 	gitConfig "github.com/go-git/go-git/v5/config" | ||||
| 	"github.com/go-git/go-git/v5/plumbing" | ||||
| 	"github.com/sirupsen/logrus" | ||||
| ) | ||||
| @ -32,7 +32,7 @@ import ( | ||||
| // RecipeCatalogueURL is the only current recipe catalogue available. | ||||
| const RecipeCatalogueURL = "https://recipes.coopcloud.tech/recipes.json" | ||||
|  | ||||
| // ReposMetadataURL is the recipe repository metadata | ||||
| // ReposMetadataURL is the recipe repository metadata. | ||||
| const ReposMetadataURL = "https://git.coopcloud.tech/api/v1/orgs/coop-cloud/repos" | ||||
|  | ||||
| // tag represents a git tag. | ||||
| @ -64,6 +64,11 @@ type RecipeMeta struct { | ||||
| 	Website       string         `json:"website"` | ||||
| } | ||||
|  | ||||
| // TopicMeta represents a list of topics for a repository. | ||||
| type TopicMeta struct { | ||||
| 	Topics []string `json:"topics"` | ||||
| } | ||||
|  | ||||
| // LatestVersion returns the latest version of a recipe. | ||||
| func (r RecipeMeta) LatestVersion() string { | ||||
| 	var version string | ||||
| @ -206,7 +211,7 @@ func (r Recipe) Tags() ([]string, error) { | ||||
| } | ||||
|  | ||||
| // Get retrieves a recipe. | ||||
| func Get(recipeName string) (Recipe, error) { | ||||
| func Get(recipeName string, offline bool) (Recipe, error) { | ||||
| 	if err := EnsureExists(recipeName); err != nil { | ||||
| 		return Recipe{}, err | ||||
| 	} | ||||
| @ -233,11 +238,12 @@ func Get(recipeName string) (Recipe, error) { | ||||
| 		return Recipe{}, err | ||||
| 	} | ||||
|  | ||||
| 	meta, err := GetRecipeMeta(recipeName) | ||||
| 	meta, err := GetRecipeMeta(recipeName, offline) | ||||
| 	if err != nil { | ||||
| 		if strings.Contains(err.Error(), "does not exist") { | ||||
| 		switch err.(type) { | ||||
| 		case RecipeMissingFromCatalogue: | ||||
| 			meta = RecipeMeta{} | ||||
| 		} else { | ||||
| 		default: | ||||
| 			return Recipe{}, err | ||||
| 		} | ||||
| 	} | ||||
| @ -249,6 +255,29 @@ func Get(recipeName string) (Recipe, error) { | ||||
| 	}, nil | ||||
| } | ||||
|  | ||||
| func (r Recipe) SampleEnv() (map[string]string, error) { | ||||
| 	envSamplePath := path.Join(config.RECIPES_DIR, r.Name, ".env.sample") | ||||
| 	sampleEnv, err := config.ReadEnv(envSamplePath) | ||||
| 	if err != nil { | ||||
| 		return sampleEnv, fmt.Errorf("unable to discover .env.sample for %s", r.Name) | ||||
| 	} | ||||
| 	return sampleEnv, nil | ||||
| } | ||||
|  | ||||
| // Ensure makes sure the recipe exists, is up to date and has the latest version checked out. | ||||
| func Ensure(recipeName string) error { | ||||
| 	if err := EnsureExists(recipeName); err != nil { | ||||
| 		return err | ||||
| 	} | ||||
| 	if err := EnsureUpToDate(recipeName); err != nil { | ||||
| 		return err | ||||
| 	} | ||||
| 	if err := EnsureLatest(recipeName); err != nil { | ||||
| 		return err | ||||
| 	} | ||||
| 	return nil | ||||
| } | ||||
|  | ||||
| // EnsureExists ensures that a recipe is locally cloned | ||||
| func EnsureExists(recipeName string) error { | ||||
| 	recipeDir := path.Join(config.RECIPES_DIR, recipeName) | ||||
| @ -272,15 +301,6 @@ func EnsureExists(recipeName string) error { | ||||
| func EnsureVersion(recipeName, version string) error { | ||||
| 	recipeDir := path.Join(config.RECIPES_DIR, recipeName) | ||||
|  | ||||
| 	isClean, err := gitPkg.IsClean(recipeDir) | ||||
| 	if err != nil { | ||||
| 		return err | ||||
| 	} | ||||
|  | ||||
| 	if !isClean { | ||||
| 		return fmt.Errorf("%s has locally unstaged changes", recipeName) | ||||
| 	} | ||||
|  | ||||
| 	if err := gitPkg.EnsureGitRepo(recipeDir); err != nil { | ||||
| 		return err | ||||
| 	} | ||||
| @ -307,10 +327,13 @@ func EnsureVersion(recipeName, version string) error { | ||||
| 		return err | ||||
| 	} | ||||
|  | ||||
| 	logrus.Debugf("read %s as tags for recipe %s", strings.Join(parsedTags, ", "), recipeName) | ||||
| 	joinedTags := strings.Join(parsedTags, ", ") | ||||
| 	if joinedTags != "" { | ||||
| 		logrus.Debugf("read %s as tags for recipe %s", joinedTags, recipeName) | ||||
| 	} | ||||
|  | ||||
| 	if tagRef.String() == "" { | ||||
| 		return fmt.Errorf("no published release discovered for %s", recipeName) | ||||
| 		return fmt.Errorf("the local copy of %s doesn't seem to have version %s available?", recipeName, version) | ||||
| 	} | ||||
|  | ||||
| 	worktree, err := repo.Worktree() | ||||
| @ -332,25 +355,31 @@ func EnsureVersion(recipeName, version string) error { | ||||
| 	return nil | ||||
| } | ||||
|  | ||||
| // EnsureLatest makes sure the latest commit is checked out for a local recipe repository | ||||
| func EnsureLatest(recipeName string) error { | ||||
| // EnsureIsClean makes sure that the recipe repository has no unstaged changes. | ||||
| func EnsureIsClean(recipeName string) error { | ||||
| 	recipeDir := path.Join(config.RECIPES_DIR, recipeName) | ||||
|  | ||||
| 	isClean, err := gitPkg.IsClean(recipeDir) | ||||
| 	if err != nil { | ||||
| 		return err | ||||
| 		return fmt.Errorf("unable to check git clean status in %s: %s", recipeDir, err) | ||||
| 	} | ||||
|  | ||||
| 	if !isClean { | ||||
| 		return fmt.Errorf("%s has locally unstaged changes", recipeName) | ||||
| 		msg := "%s (%s) has locally unstaged changes? please commit/remove your changes before proceeding" | ||||
| 		return fmt.Errorf(msg, recipeName, recipeDir) | ||||
| 	} | ||||
|  | ||||
| 	return nil | ||||
| } | ||||
|  | ||||
| // EnsureLatest makes sure the latest commit is checked out for a local recipe repository | ||||
| func EnsureLatest(recipeName string) error { | ||||
| 	recipeDir := path.Join(config.RECIPES_DIR, recipeName) | ||||
|  | ||||
| 	if err := gitPkg.EnsureGitRepo(recipeDir); err != nil { | ||||
| 		return err | ||||
| 	} | ||||
|  | ||||
| 	logrus.Debugf("attempting to open git repository in %s", recipeDir) | ||||
|  | ||||
| 	repo, err := git.PlainOpen(recipeDir) | ||||
| 	if err != nil { | ||||
| 		return err | ||||
| @ -361,21 +390,11 @@ func EnsureLatest(recipeName string) error { | ||||
| 		return err | ||||
| 	} | ||||
|  | ||||
| 	meta, err := GetRecipeMeta(recipeName) | ||||
| 	branch, err := gitPkg.GetDefaultBranch(repo, recipeDir) | ||||
| 	if err != nil { | ||||
| 		return err | ||||
| 	} | ||||
|  | ||||
| 	var branch plumbing.ReferenceName | ||||
| 	if meta.DefaultBranch != "" { | ||||
| 		branch = plumbing.ReferenceName(fmt.Sprintf("refs/heads/%s", meta.DefaultBranch)) | ||||
| 	} else { | ||||
| 		branch, err = gitPkg.GetDefaultBranch(repo, recipeDir) | ||||
| 		if err != nil { | ||||
| 			return err | ||||
| 		} | ||||
| 	} | ||||
|  | ||||
| 	checkOutOpts := &git.CheckoutOptions{ | ||||
| 		Create: false, | ||||
| 		Force:  true, | ||||
| @ -432,7 +451,7 @@ func GetVersionLabelLocal(recipe Recipe) (string, error) { | ||||
|  | ||||
| 	for _, service := range recipe.Config.Services { | ||||
| 		for label, value := range service.Deploy.Labels { | ||||
| 			if strings.HasPrefix(label, "coop-cloud") { | ||||
| 			if strings.HasPrefix(label, "coop-cloud") && strings.Contains(label, "version") { | ||||
| 				return value, nil | ||||
| 			} | ||||
| 		} | ||||
| @ -581,16 +600,6 @@ func GetStringInBetween(recipeName, str, start, end string) (result string, err | ||||
| func EnsureUpToDate(recipeName string) error { | ||||
| 	recipeDir := path.Join(config.RECIPES_DIR, recipeName) | ||||
|  | ||||
| 	isClean, err := gitPkg.IsClean(recipeDir) | ||||
| 	if err != nil { | ||||
| 		return fmt.Errorf("unable to check git clean status in %s: %s", recipeDir, err) | ||||
| 	} | ||||
|  | ||||
| 	if !isClean { | ||||
| 		msg := "%s (%s) has locally unstaged changes? please commit/remove your changes before proceeding" | ||||
| 		return fmt.Errorf(msg, recipeName, recipeDir) | ||||
| 	} | ||||
|  | ||||
| 	repo, err := git.PlainOpen(recipeDir) | ||||
| 	if err != nil { | ||||
| 		return fmt.Errorf("unable to open %s: %s", recipeDir, err) | ||||
| @ -616,12 +625,7 @@ func EnsureUpToDate(recipeName string) error { | ||||
| 		return fmt.Errorf("unable to check out default branch in %s: %s", recipeDir, err) | ||||
| 	} | ||||
|  | ||||
| 	fetchOpts := &git.FetchOptions{ | ||||
| 		Tags: git.AllTags, | ||||
| 		RefSpecs: []gitConfig.RefSpec{ | ||||
| 			gitConfig.RefSpec(fmt.Sprintf("%s:%s", branch, branch)), | ||||
| 		}, | ||||
| 	} | ||||
| 	fetchOpts := &git.FetchOptions{Tags: git.AllTags} | ||||
| 	if err := repo.Fetch(fetchOpts); err != nil { | ||||
| 		if !strings.Contains(err.Error(), "already up-to-date") { | ||||
| 			return fmt.Errorf("unable to fetch tags in %s: %s", recipeDir, err) | ||||
| @ -645,78 +649,20 @@ func EnsureUpToDate(recipeName string) error { | ||||
| 	return nil | ||||
| } | ||||
|  | ||||
| type CatalogueOfflineError struct { | ||||
| 	msg string | ||||
| } | ||||
|  | ||||
| func (e *CatalogueOfflineError) Error() string { | ||||
| 	return fmt.Sprintf("catalogue offline: %s", e.msg) | ||||
| } | ||||
|  | ||||
| // recipeCatalogueFSIsLatest checks whether the recipe catalogue stored locally | ||||
| // is up to date. | ||||
| func recipeCatalogueFSIsLatest() (bool, error) { | ||||
| 	httpClient := web.NewHTTPRetryClient() | ||||
| 	res, err := httpClient.Head(RecipeCatalogueURL) | ||||
| 	if err != nil { | ||||
| 		return false, &CatalogueOfflineError{err.Error()} | ||||
| 	} | ||||
|  | ||||
| 	lastModified := res.Header["Last-Modified"][0] | ||||
| 	parsed, err := time.Parse(time.RFC1123, lastModified) | ||||
| 	if err != nil { | ||||
| 		return false, err | ||||
| 	} | ||||
|  | ||||
| 	info, err := os.Stat(config.RECIPES_JSON) | ||||
| 	if err != nil { | ||||
| 		if os.IsNotExist(err) { | ||||
| 			logrus.Debugf("no recipe catalogue found in file system cache") | ||||
| 			return false, nil | ||||
| 		} | ||||
| 		return false, err | ||||
| 	} | ||||
|  | ||||
| 	localModifiedTime := info.ModTime().Unix() | ||||
| 	remoteModifiedTime := parsed.Unix() | ||||
|  | ||||
| 	if localModifiedTime < remoteModifiedTime { | ||||
| 		logrus.Debug("file system cached recipe catalogue is out-of-date") | ||||
| 		return false, nil | ||||
| 	} | ||||
|  | ||||
| 	logrus.Debug("file system cached recipe catalogue is up-to-date") | ||||
|  | ||||
| 	return true, nil | ||||
| } | ||||
|  | ||||
| // ReadRecipeCatalogue reads the recipe catalogue. | ||||
| func ReadRecipeCatalogue() (RecipeCatalogue, error) { | ||||
| func ReadRecipeCatalogue(offline bool) (RecipeCatalogue, error) { | ||||
| 	recipes := make(RecipeCatalogue) | ||||
|  | ||||
| 	if err := catalogue.EnsureCatalogue(); err != nil { | ||||
| 		return nil, err | ||||
| 	} | ||||
|  | ||||
| 	recipeFSIsLatest, err := recipeCatalogueFSIsLatest() | ||||
| 	if err != nil { | ||||
| 		var offlineErr *CatalogueOfflineError | ||||
| 		if errors.As(err, &offlineErr) { | ||||
| 			logrus.Error(err) | ||||
| 			logrus.Error("unable to retrieve catalogue from internet, using local copy.") | ||||
| 			recipeFSIsLatest = true | ||||
| 		} else { | ||||
| 	if !offline { | ||||
| 		if err := catalogue.EnsureUpToDate(); err != nil { | ||||
| 			return nil, err | ||||
| 		} | ||||
| 	} | ||||
|  | ||||
| 	if !recipeFSIsLatest { | ||||
| 		if err := readRecipeCatalogueWeb(&recipes); err != nil { | ||||
| 			return nil, err | ||||
| 		} | ||||
| 		return recipes, nil | ||||
| 	} | ||||
|  | ||||
| 	if err := readRecipeCatalogueFS(&recipes); err != nil { | ||||
| 		return nil, err | ||||
| 	} | ||||
| @ -740,31 +686,11 @@ func readRecipeCatalogueFS(target interface{}) error { | ||||
| 	return nil | ||||
| } | ||||
|  | ||||
| // readRecipeCatalogueWeb reads the catalogue from the web. | ||||
| func readRecipeCatalogueWeb(target interface{}) error { | ||||
| 	if err := web.ReadJSON(RecipeCatalogueURL, &target); err != nil { | ||||
| 		return err | ||||
| 	} | ||||
|  | ||||
| 	recipesJSON, err := json.MarshalIndent(target, "", "    ") | ||||
| 	if err != nil { | ||||
| 		return err | ||||
| 	} | ||||
|  | ||||
| 	if err := ioutil.WriteFile(config.RECIPES_JSON, recipesJSON, 0764); err != nil { | ||||
| 		return err | ||||
| 	} | ||||
|  | ||||
| 	logrus.Debugf("read recipe catalogue from web at %s", RecipeCatalogueURL) | ||||
|  | ||||
| 	return nil | ||||
| } | ||||
|  | ||||
| // VersionsOfService lists the version of a service. | ||||
| func VersionsOfService(recipe, serviceName string) ([]string, error) { | ||||
| func VersionsOfService(recipe, serviceName string, offline bool) ([]string, error) { | ||||
| 	var versions []string | ||||
|  | ||||
| 	catalogue, err := ReadRecipeCatalogue() | ||||
| 	catalogue, err := ReadRecipeCatalogue(offline) | ||||
| 	if err != nil { | ||||
| 		return nil, err | ||||
| 	} | ||||
| @ -789,20 +715,26 @@ func VersionsOfService(recipe, serviceName string) ([]string, error) { | ||||
| 	return versions, nil | ||||
| } | ||||
|  | ||||
| // RecipeMissingFromCatalogue signifies a recipe is not present in the catalogue. | ||||
| type RecipeMissingFromCatalogue struct{ err string } | ||||
|  | ||||
| // Error outputs the error message. | ||||
| func (r RecipeMissingFromCatalogue) Error() string { | ||||
| 	return r.err | ||||
| } | ||||
|  | ||||
| // GetRecipeMeta retrieves the recipe metadata from the recipe catalogue. | ||||
| func GetRecipeMeta(recipeName string) (RecipeMeta, error) { | ||||
| 	catl, err := ReadRecipeCatalogue() | ||||
| func GetRecipeMeta(recipeName string, offline bool) (RecipeMeta, error) { | ||||
| 	catl, err := ReadRecipeCatalogue(offline) | ||||
| 	if err != nil { | ||||
| 		return RecipeMeta{}, err | ||||
| 	} | ||||
|  | ||||
| 	recipeMeta, ok := catl[recipeName] | ||||
| 	if !ok { | ||||
| 		return RecipeMeta{}, fmt.Errorf("recipe %s does not exist?", recipeName) | ||||
| 	} | ||||
|  | ||||
| 	if err := EnsureExists(recipeName); err != nil { | ||||
| 		return RecipeMeta{}, err | ||||
| 		return RecipeMeta{}, RecipeMissingFromCatalogue{ | ||||
| 			err: fmt.Sprintf("recipe %s does not exist?", recipeName), | ||||
| 		} | ||||
| 	} | ||||
|  | ||||
| 	logrus.Debugf("recipe metadata retrieved for %s", recipeName) | ||||
| @ -910,7 +842,16 @@ func ReadReposMetadata() (RepoCatalogue, error) { | ||||
| 		} | ||||
|  | ||||
| 		for idx, repo := range reposList { | ||||
| 			reposMeta[repo.Name] = reposList[idx] | ||||
| 			var topicMeta TopicMeta | ||||
|  | ||||
| 			topicsURL := getReposTopicUrl(repo.Name) | ||||
| 			if err := web.ReadJSON(topicsURL, &topicMeta); err != nil { | ||||
| 				return reposMeta, err | ||||
| 			} | ||||
|  | ||||
| 			if slices.Contains(topicMeta.Topics, "recipe") && repo.Name != "example" { | ||||
| 				reposMeta[repo.Name] = reposList[idx] | ||||
| 			} | ||||
| 		} | ||||
|  | ||||
| 		pageIdx++ | ||||
| @ -923,9 +864,8 @@ func ReadReposMetadata() (RepoCatalogue, error) { | ||||
| } | ||||
|  | ||||
| // GetRecipeVersions retrieves all recipe versions. | ||||
| func GetRecipeVersions(recipeName string) (RecipeVersions, error) { | ||||
| func GetRecipeVersions(recipeName string, offline bool) (RecipeVersions, error) { | ||||
| 	versions := RecipeVersions{} | ||||
|  | ||||
| 	recipeDir := path.Join(config.RECIPES_DIR, recipeName) | ||||
|  | ||||
| 	logrus.Debugf("attempting to open git repository in %s", recipeDir) | ||||
| @ -962,7 +902,7 @@ func GetRecipeVersions(recipeName string) (RecipeVersions, error) { | ||||
|  | ||||
| 		logrus.Debugf("successfully checked out %s in %s", ref.Name(), recipeDir) | ||||
|  | ||||
| 		recipe, err := Get(recipeName) | ||||
| 		recipe, err := Get(recipeName, offline) | ||||
| 		if err != nil { | ||||
| 			return err | ||||
| 		} | ||||
| @ -1006,11 +946,52 @@ func GetRecipeVersions(recipeName string) (RecipeVersions, error) { | ||||
| 		return versions, err | ||||
| 	} | ||||
|  | ||||
| 	sortRecipeVersions(versions) | ||||
|  | ||||
| 	logrus.Debugf("collected %s for %s", versions, recipeName) | ||||
|  | ||||
| 	return versions, nil | ||||
| } | ||||
|  | ||||
| // sortRecipeVersions sorts the recipe semver versions | ||||
| func sortRecipeVersions(versions RecipeVersions) { | ||||
| 	sort.Slice(versions, func(i, j int) bool { | ||||
| 		version1, err := tagcmp.Parse(getVersionString(versions[i])) | ||||
| 		if err != nil { | ||||
| 			panic(err) | ||||
| 		} | ||||
| 		version2, err := tagcmp.Parse(getVersionString(versions[j])) | ||||
| 		if err != nil { | ||||
| 			panic(err) | ||||
| 		} | ||||
| 		return version1.IsLessThan(version2) | ||||
| 	}) | ||||
| } | ||||
|  | ||||
| // getVersionString returns the version string from RecipeVersions | ||||
| func getVersionString(versionMap map[string]map[string]ServiceMeta) string { | ||||
| 	// Assuming there's only one key in versionMap | ||||
| 	for k := range versionMap { | ||||
| 		return k | ||||
| 	} | ||||
| 	return "" | ||||
| } | ||||
|  | ||||
| // sortVersionStrings sorts a list of semver version strings | ||||
| func sortVersionStrings(versions []string) { | ||||
| 	sort.Slice(versions, func(i, j int) bool { | ||||
| 		version1, err := tagcmp.Parse(versions[i]) | ||||
| 		if err != nil { | ||||
| 			panic(err) | ||||
| 		} | ||||
| 		version2, err := tagcmp.Parse(versions[j]) | ||||
| 		if err != nil { | ||||
| 			panic(err) | ||||
| 		} | ||||
| 		return version1.IsLessThan(version2) | ||||
| 	}) | ||||
| } | ||||
|  | ||||
| // GetRecipeCatalogueVersions list the recipe versions listed in the recipe catalogue. | ||||
| func GetRecipeCatalogueVersions(recipeName string, catl RecipeCatalogue) ([]string, error) { | ||||
| 	var versions []string | ||||
| @ -1023,6 +1004,8 @@ func GetRecipeCatalogueVersions(recipeName string, catl RecipeCatalogue) ([]stri | ||||
| 		} | ||||
| 	} | ||||
|  | ||||
| 	sortVersionStrings(versions) | ||||
|  | ||||
| 	return versions, nil | ||||
| } | ||||
|  | ||||
| @ -1049,22 +1032,12 @@ func UpdateRepositories(repos RepoCatalogue, recipeName string) error { | ||||
| 				retrieveBar.Add(1) | ||||
| 				return | ||||
| 			} | ||||
| 			if _, exists := catalogue.CatalogueSkipList[rm.Name]; exists { | ||||
| 				ch <- rm.Name | ||||
| 				retrieveBar.Add(1) | ||||
| 				return | ||||
| 			} | ||||
|  | ||||
| 			recipeDir := path.Join(config.RECIPES_DIR, rm.Name) | ||||
|  | ||||
| 			if err := gitPkg.Clone(recipeDir, rm.CloneURL); err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
|  | ||||
| 			if err := EnsureUpToDate(rm.Name); err != nil { | ||||
| 				logrus.Fatal(err) | ||||
| 			} | ||||
|  | ||||
| 			ch <- rm.Name | ||||
| 			retrieveBar.Add(1) | ||||
| 		}(repoMeta) | ||||
| @ -1076,3 +1049,8 @@ func UpdateRepositories(repos RepoCatalogue, recipeName string) error { | ||||
|  | ||||
| 	return nil | ||||
| } | ||||
|  | ||||
| // getReposTopicUrl retrieves the repository specific topic listing. | ||||
| func getReposTopicUrl(repoName string) string { | ||||
| 	return fmt.Sprintf("https://git.coopcloud.tech/api/v1/repos/coop-cloud/%s/topics", repoName) | ||||
| } | ||||
|  | ||||
							
								
								
									
										31
									
								
								pkg/recipe/recipe_test.go
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										31
									
								
								pkg/recipe/recipe_test.go
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,31 @@ | ||||
| package recipe | ||||
|  | ||||
| import ( | ||||
| 	"testing" | ||||
|  | ||||
| 	"github.com/stretchr/testify/assert" | ||||
| ) | ||||
|  | ||||
| func TestGetVersionLabelLocalDoesNotUseTimeoutLabel(t *testing.T) { | ||||
| 	offline := true | ||||
| 	recipe, err := Get("traefik", offline) | ||||
| 	if err != nil { | ||||
| 		t.Fatal(err) | ||||
| 	} | ||||
|  | ||||
| 	for i := 1; i < 1000; i++ { | ||||
| 		label, err := GetVersionLabelLocal(recipe) | ||||
| 		if err != nil { | ||||
| 			t.Fatal(err) | ||||
| 		} | ||||
|  | ||||
| 		// NOTE(d1): this is potentially quite a brittle unit test as it needs to | ||||
| 		// hardcode the default timeout label to ensure that the label parser never | ||||
| 		// returns it. hopefully this won't fail too often! if you're here because | ||||
| 		// of a failure, just update the `defaultTimeoutLabel` value & permalink | ||||
| 		// below | ||||
| 		// https://git.coopcloud.tech/coop-cloud/traefik/src/commit/ac3a47fe8ca3ef92db84f64cfedfbb348000faee/.env.sample#L2 | ||||
| 		defaultTimeoutLabel := "300" | ||||
| 		assert.NotEqual(t, label, defaultTimeoutLabel) | ||||
| 	} | ||||
| } | ||||
| @ -4,24 +4,41 @@ | ||||
| package secret | ||||
|  | ||||
| import ( | ||||
| 	"context" | ||||
| 	"fmt" | ||||
| 	"regexp" | ||||
| 	"slices" | ||||
| 	"strconv" | ||||
| 	"strings" | ||||
| 	"sync" | ||||
|  | ||||
| 	"coopcloud.tech/abra/pkg/client" | ||||
| 	"coopcloud.tech/abra/pkg/config" | ||||
| 	"coopcloud.tech/abra/pkg/upstream/stack" | ||||
| 	loader "coopcloud.tech/abra/pkg/upstream/stack" | ||||
| 	"github.com/decentral1se/passgen" | ||||
| 	"github.com/docker/docker/api/types" | ||||
| 	dockerClient "github.com/docker/docker/client" | ||||
| 	"github.com/sirupsen/logrus" | ||||
| ) | ||||
|  | ||||
| // secretValue represents a parsed `SECRET_FOO=v1 # length=bar` env var config | ||||
| // secret definition. | ||||
| type secretValue struct { | ||||
| // Secret represents a secret. | ||||
| type Secret struct { | ||||
| 	// Version comes from the secret version environment variable. | ||||
| 	// For example: | ||||
| 	//  SECRET_FOO=v1 | ||||
| 	Version string | ||||
| 	Length  int | ||||
| 	// Length comes from the length modifier at the secret version environment | ||||
| 	// variable. For Example: | ||||
| 	//   SECRET_FOO=v1 # length=12 | ||||
| 	Length int | ||||
| 	// RemoteName is the name of the secret on the server. For example: | ||||
| 	//   name: ${STACK_NAME}_test_pass_two_${SECRET_TEST_PASS_TWO_VERSION} | ||||
| 	// With the following: | ||||
| 	//   STACK_NAME=test_example_com | ||||
| 	//   SECRET_TEST_PASS_TWO_VERSION=v2 | ||||
| 	// Will have this remote name: | ||||
| 	//   test_example_com_test_pass_two_v2 | ||||
| 	RemoteName string | ||||
| } | ||||
|  | ||||
| // GeneratePasswords generates passwords. | ||||
| @ -31,7 +48,6 @@ func GeneratePasswords(count, length uint) ([]string, error) { | ||||
| 		length, | ||||
| 		passgen.AlphabetDefault, | ||||
| 	) | ||||
|  | ||||
| 	if err != nil { | ||||
| 		return nil, err | ||||
| 	} | ||||
| @ -50,7 +66,6 @@ func GeneratePassphrases(count uint) ([]string, error) { | ||||
| 		passgen.PassphraseCasingDefault, | ||||
| 		passgen.WordListDefault, | ||||
| 	) | ||||
|  | ||||
| 	if err != nil { | ||||
| 		return nil, err | ||||
| 	} | ||||
| @ -60,96 +75,111 @@ func GeneratePassphrases(count uint) ([]string, error) { | ||||
| 	return passphrases, nil | ||||
| } | ||||
|  | ||||
| // ReadSecretEnvVars reads secret env vars from an app env var config. | ||||
| func ReadSecretEnvVars(appEnv config.AppEnv) map[string]string { | ||||
| 	secretEnvVars := make(map[string]string) | ||||
| // ReadSecretsConfig reads secret names/versions from the recipe config. The | ||||
| // function generalises appEnv/composeFiles because some times you have an app | ||||
| // and some times you don't (as the caller). We need to be able to handle the | ||||
| // "app new" case where we pass in the .env.sample and the "secret generate" | ||||
| // case where the app is created. | ||||
| func ReadSecretsConfig(appEnvPath string, composeFiles []string, stackName string) (map[string]Secret, error) { | ||||
| 	appEnv, appModifiers, err := config.ReadEnvWithModifiers(appEnvPath) | ||||
| 	if err != nil { | ||||
| 		return nil, err | ||||
| 	} | ||||
| 	// Set the STACK_NAME to be able to generate the remote name correctly. | ||||
| 	appEnv["STACK_NAME"] = stackName | ||||
|  | ||||
| 	for envVar := range appEnv { | ||||
| 		regex := regexp.MustCompile(`^SECRET.*VERSION.*`) | ||||
| 		if string(regex.Find([]byte(envVar))) != "" { | ||||
| 			secretEnvVars[envVar] = appEnv[envVar] | ||||
| 	opts := stack.Deploy{Composefiles: composeFiles} | ||||
| 	composeConfig, err := loader.LoadComposefile(opts, appEnv) | ||||
| 	if err != nil { | ||||
| 		return nil, err | ||||
| 	} | ||||
| 	// Read the compose files without injecting environment variables. | ||||
| 	configWithoutEnv, err := loader.LoadComposefile(opts, map[string]string{}, loader.SkipInterpolation) | ||||
| 	if err != nil { | ||||
| 		return nil, err | ||||
| 	} | ||||
|  | ||||
| 	var enabledSecrets []string | ||||
| 	for _, service := range composeConfig.Services { | ||||
| 		for _, secret := range service.Secrets { | ||||
| 			enabledSecrets = append(enabledSecrets, secret.Source) | ||||
| 		} | ||||
| 	} | ||||
|  | ||||
| 	logrus.Debugf("read %s as secrets from %s", secretEnvVars, appEnv) | ||||
|  | ||||
| 	return secretEnvVars | ||||
| } | ||||
|  | ||||
| func ParseSecretEnvVarName(secretEnvVar string) string { | ||||
| 	withoutPrefix := strings.TrimPrefix(secretEnvVar, "SECRET_") | ||||
| 	withoutSuffix := strings.TrimSuffix(withoutPrefix, "_VERSION") | ||||
| 	name := strings.ToLower(withoutSuffix) | ||||
| 	logrus.Debugf("parsed %s as name from %s", name, secretEnvVar) | ||||
| 	return name | ||||
| } | ||||
|  | ||||
| func ParseGeneratedSecretName(secret string, appEnv config.App) string { | ||||
| 	name := fmt.Sprintf("%s_", appEnv.StackName()) | ||||
| 	withoutAppName := strings.TrimPrefix(secret, name) | ||||
| 	idx := strings.LastIndex(withoutAppName, "_") | ||||
| 	parsed := withoutAppName[:idx] | ||||
| 	logrus.Debugf("parsed %s as name from %s", parsed, secret) | ||||
| 	return parsed | ||||
| } | ||||
|  | ||||
| func ParseSecretEnvVarValue(secret string) (secretValue, error) { | ||||
| 	values := strings.Split(secret, "#") | ||||
| 	if len(values) == 0 { | ||||
| 		return secretValue{}, fmt.Errorf("unable to parse %s", secret) | ||||
| 	if len(enabledSecrets) == 0 { | ||||
| 		logrus.Debugf("not generating app secrets, none enabled in recipe config") | ||||
| 		return nil, nil | ||||
| 	} | ||||
|  | ||||
| 	if len(values) == 1 { | ||||
| 		return secretValue{Version: values[0], Length: 0}, nil | ||||
| 	secretValues := map[string]Secret{} | ||||
| 	for secretId, secretConfig := range composeConfig.Secrets { | ||||
| 		if string(secretConfig.Name[len(secretConfig.Name)-1]) == "_" { | ||||
| 			return nil, fmt.Errorf("missing version for secret? (%s)", secretId) | ||||
| 		} | ||||
|  | ||||
| 		if !(slices.Contains(enabledSecrets, secretId)) { | ||||
| 			logrus.Warnf("%s not enabled in recipe config, skipping", secretId) | ||||
| 			continue | ||||
| 		} | ||||
|  | ||||
| 		lastIdx := strings.LastIndex(secretConfig.Name, "_") | ||||
| 		secretVersion := secretConfig.Name[lastIdx+1:] | ||||
| 		value := Secret{Version: secretVersion, RemoteName: secretConfig.Name} | ||||
|  | ||||
| 		if len(value.RemoteName) > config.MAX_DOCKER_SECRET_LENGTH { | ||||
| 			return nil, fmt.Errorf("secret %s is > %d chars when combined with %s", secretId, config.MAX_DOCKER_SECRET_LENGTH, stackName) | ||||
| 		} | ||||
|  | ||||
| 		// Check if the length modifier is set for this secret. | ||||
| 		for envName, modifierValues := range appModifiers { | ||||
| 			// configWithoutEnv contains the raw name as defined in the compose.yaml | ||||
| 			// The name will look something like this: | ||||
| 			//   name: ${STACK_NAME}_test_pass_two_${SECRET_TEST_PASS_TWO_VERSION} | ||||
| 			// To check if the current modifier is for the current secret we check | ||||
| 			// if the raw name contains the env name (e.g. SECRET_TEST_PASS_TWO_VERSION). | ||||
| 			if !strings.Contains(configWithoutEnv.Secrets[secretId].Name, envName) { | ||||
| 				continue | ||||
| 			} | ||||
| 			lengthRaw, ok := modifierValues["length"] | ||||
| 			if ok { | ||||
| 				length, err := strconv.Atoi(lengthRaw) | ||||
| 				if err != nil { | ||||
| 					return nil, err | ||||
| 				} | ||||
| 				value.Length = length | ||||
| 			} | ||||
| 			break | ||||
| 		} | ||||
| 		secretValues[secretId] = value | ||||
| 	} | ||||
|  | ||||
| 	split := strings.Split(values[1], "=") | ||||
| 	parsed := split[len(split)-1] | ||||
| 	stripped := strings.ReplaceAll(parsed, " ", "") | ||||
| 	length, err := strconv.Atoi(stripped) | ||||
| 	if err != nil { | ||||
| 		return secretValue{}, err | ||||
| 	} | ||||
| 	version := strings.ReplaceAll(values[0], " ", "") | ||||
|  | ||||
| 	logrus.Debugf("parsed version %s and length '%v' from %s", version, length, secret) | ||||
|  | ||||
| 	return secretValue{Version: version, Length: length}, nil | ||||
| 	return secretValues, nil | ||||
| } | ||||
|  | ||||
| // GenerateSecrets generates secrets locally and sends them to a remote server for storage. | ||||
| func GenerateSecrets(cl *dockerClient.Client, secretEnvVars map[string]string, appName, server string) (map[string]string, error) { | ||||
| 	secrets := make(map[string]string) | ||||
|  | ||||
| func GenerateSecrets(cl *dockerClient.Client, secrets map[string]Secret, server string) (map[string]string, error) { | ||||
| 	secretsGenerated := map[string]string{} | ||||
| 	var mutex sync.Mutex | ||||
| 	var wg sync.WaitGroup | ||||
| 	ch := make(chan error, len(secretEnvVars)) | ||||
| 	for secretEnvVar := range secretEnvVars { | ||||
| 	ch := make(chan error, len(secrets)) | ||||
| 	for n, v := range secrets { | ||||
| 		wg.Add(1) | ||||
|  | ||||
| 		go func(s string) { | ||||
| 		go func(secretName string, secret Secret) { | ||||
| 			defer wg.Done() | ||||
|  | ||||
| 			secretName := ParseSecretEnvVarName(s) | ||||
| 			secretValue, err := ParseSecretEnvVarValue(secretEnvVars[s]) | ||||
| 			if err != nil { | ||||
| 				ch <- err | ||||
| 				return | ||||
| 			} | ||||
| 			logrus.Debugf("attempting to generate and store %s on %s", secret.RemoteName, server) | ||||
|  | ||||
| 			secretRemoteName := fmt.Sprintf("%s_%s_%s", appName, secretName, secretValue.Version) | ||||
| 			logrus.Debugf("attempting to generate and store %s on %s", secretRemoteName, server) | ||||
|  | ||||
| 			if secretValue.Length > 0 { | ||||
| 				passwords, err := GeneratePasswords(1, uint(secretValue.Length)) | ||||
| 			if secret.Length > 0 { | ||||
| 				passwords, err := GeneratePasswords(1, uint(secret.Length)) | ||||
| 				if err != nil { | ||||
| 					ch <- err | ||||
| 					return | ||||
| 				} | ||||
|  | ||||
| 				if err := client.StoreSecret(cl, secretRemoteName, passwords[0], server); err != nil { | ||||
| 				if err := client.StoreSecret(cl, secret.RemoteName, passwords[0], server); err != nil { | ||||
| 					if strings.Contains(err.Error(), "AlreadyExists") { | ||||
| 						logrus.Warnf("%s already exists, moving on...", secretRemoteName) | ||||
| 						logrus.Warnf("%s already exists, moving on...", secret.RemoteName) | ||||
| 						ch <- nil | ||||
| 					} else { | ||||
| 						ch <- err | ||||
| @ -159,7 +189,7 @@ func GenerateSecrets(cl *dockerClient.Client, secretEnvVars map[string]string, a | ||||
|  | ||||
| 				mutex.Lock() | ||||
| 				defer mutex.Unlock() | ||||
| 				secrets[secretName] = passwords[0] | ||||
| 				secretsGenerated[secretName] = passwords[0] | ||||
| 			} else { | ||||
| 				passphrases, err := GeneratePassphrases(1) | ||||
| 				if err != nil { | ||||
| @ -167,9 +197,9 @@ func GenerateSecrets(cl *dockerClient.Client, secretEnvVars map[string]string, a | ||||
| 					return | ||||
| 				} | ||||
|  | ||||
| 				if err := client.StoreSecret(cl, secretRemoteName, passphrases[0], server); err != nil { | ||||
| 				if err := client.StoreSecret(cl, secret.RemoteName, passphrases[0], server); err != nil { | ||||
| 					if strings.Contains(err.Error(), "AlreadyExists") { | ||||
| 						logrus.Warnf("%s already exists, moving on...", secretRemoteName) | ||||
| 						logrus.Warnf("%s already exists, moving on...", secret.RemoteName) | ||||
| 						ch <- nil | ||||
| 					} else { | ||||
| 						ch <- err | ||||
| @ -179,22 +209,80 @@ func GenerateSecrets(cl *dockerClient.Client, secretEnvVars map[string]string, a | ||||
|  | ||||
| 				mutex.Lock() | ||||
| 				defer mutex.Unlock() | ||||
| 				secrets[secretName] = passphrases[0] | ||||
| 				secretsGenerated[secretName] = passphrases[0] | ||||
| 			} | ||||
| 			ch <- nil | ||||
| 		}(secretEnvVar) | ||||
| 		}(n, v) | ||||
| 	} | ||||
|  | ||||
| 	wg.Wait() | ||||
|  | ||||
| 	for range secretEnvVars { | ||||
| 	for range secrets { | ||||
| 		err := <-ch | ||||
| 		if err != nil { | ||||
| 			return nil, err | ||||
| 		} | ||||
| 	} | ||||
|  | ||||
| 	logrus.Debugf("generated and stored %s on %s", secrets, server) | ||||
| 	logrus.Debugf("generated and stored %v on %s", secrets, server) | ||||
|  | ||||
| 	return secrets, nil | ||||
| 	return secretsGenerated, nil | ||||
| } | ||||
|  | ||||
| type secretStatus struct { | ||||
| 	LocalName       string | ||||
| 	RemoteName      string | ||||
| 	Version         string | ||||
| 	CreatedOnRemote bool | ||||
| } | ||||
|  | ||||
| type secretStatuses []secretStatus | ||||
|  | ||||
| // PollSecretsStatus checks status of secrets by comparing the local recipe | ||||
| // config and deploymend server state. | ||||
| func PollSecretsStatus(cl *dockerClient.Client, app config.App) (secretStatuses, error) { | ||||
| 	var secStats secretStatuses | ||||
|  | ||||
| 	composeFiles, err := config.GetComposeFiles(app.Recipe, app.Env) | ||||
| 	if err != nil { | ||||
| 		return secStats, err | ||||
| 	} | ||||
|  | ||||
| 	secretsConfig, err := ReadSecretsConfig(app.Path, composeFiles, app.StackName()) | ||||
| 	if err != nil { | ||||
| 		return secStats, err | ||||
| 	} | ||||
|  | ||||
| 	filters, err := app.Filters(false, false) | ||||
| 	if err != nil { | ||||
| 		return secStats, err | ||||
| 	} | ||||
|  | ||||
| 	secretList, err := cl.SecretList(context.Background(), types.SecretListOptions{Filters: filters}) | ||||
| 	if err != nil { | ||||
| 		return secStats, err | ||||
| 	} | ||||
|  | ||||
| 	remoteSecretNames := make(map[string]bool) | ||||
| 	for _, cont := range secretList { | ||||
| 		remoteSecretNames[cont.Spec.Annotations.Name] = true | ||||
| 	} | ||||
|  | ||||
| 	for secretName, val := range secretsConfig { | ||||
| 		createdRemote := false | ||||
|  | ||||
| 		secretRemoteName := fmt.Sprintf("%s_%s_%s", app.StackName(), secretName, val.Version) | ||||
| 		if _, ok := remoteSecretNames[secretRemoteName]; ok { | ||||
| 			createdRemote = true | ||||
| 		} | ||||
|  | ||||
| 		secStats = append(secStats, secretStatus{ | ||||
| 			LocalName:       secretName, | ||||
| 			RemoteName:      secretRemoteName, | ||||
| 			Version:         val.Version, | ||||
| 			CreatedOnRemote: createdRemote, | ||||
| 		}) | ||||
| 	} | ||||
|  | ||||
| 	return secStats, nil | ||||
| } | ||||
|  | ||||
							
								
								
									
										39
									
								
								pkg/secret/secret_test.go
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										39
									
								
								pkg/secret/secret_test.go
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,39 @@ | ||||
| package secret | ||||
|  | ||||
| import ( | ||||
| 	"testing" | ||||
|  | ||||
| 	"github.com/stretchr/testify/assert" | ||||
| ) | ||||
|  | ||||
| func TestReadSecretsConfig(t *testing.T) { | ||||
| 	composeFiles := []string{"./testdir/compose.yaml"} | ||||
| 	secretsFromConfig, err := ReadSecretsConfig("./testdir/.env.sample", composeFiles, "test_example_com") | ||||
| 	if err != nil { | ||||
| 		t.Fatal(err) | ||||
| 	} | ||||
|  | ||||
| 	// Simple secret | ||||
| 	assert.Equal(t, "test_example_com_test_pass_one_v2", secretsFromConfig["test_pass_one"].RemoteName) | ||||
| 	assert.Equal(t, "v2", secretsFromConfig["test_pass_one"].Version) | ||||
| 	assert.Equal(t, 0, secretsFromConfig["test_pass_one"].Length) | ||||
|  | ||||
| 	// Has a length modifier | ||||
| 	assert.Equal(t, "test_example_com_test_pass_two_v1", secretsFromConfig["test_pass_two"].RemoteName) | ||||
| 	assert.Equal(t, "v1", secretsFromConfig["test_pass_two"].Version) | ||||
| 	assert.Equal(t, 10, secretsFromConfig["test_pass_two"].Length) | ||||
|  | ||||
| 	// Secret name does not include the secret id | ||||
| 	assert.Equal(t, "test_example_com_pass_three_v2", secretsFromConfig["test_pass_three"].RemoteName) | ||||
| 	assert.Equal(t, "v2", secretsFromConfig["test_pass_three"].Version) | ||||
| 	assert.Equal(t, 0, secretsFromConfig["test_pass_three"].Length) | ||||
| } | ||||
|  | ||||
| func TestReadSecretsConfigWithLongDomain(t *testing.T) { | ||||
| 	composeFiles := []string{"./testdir/compose.yaml"} | ||||
| 	_, err := ReadSecretsConfig("./testdir/.env.sample", composeFiles, "should_break_on_forty_eight_char_stack_nameeeeee") | ||||
| 	if err == nil { | ||||
| 		t.Fatal("expected failure, stack name is too long") | ||||
| 	} | ||||
| 	assert.Contains(t, err.Error(), "is > 64 chars") | ||||
| } | ||||
							
								
								
									
										3
									
								
								pkg/secret/testdir/.env.sample
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										3
									
								
								pkg/secret/testdir/.env.sample
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,3 @@ | ||||
| SECRET_TEST_PASS_ONE_VERSION=v2 | ||||
| SECRET_TEST_PASS_TWO_VERSION=v1 # length=10 | ||||
| SECRET_TEST_PASS_THREE_VERSION=v2 | ||||
							
								
								
									
										21
									
								
								pkg/secret/testdir/compose.yaml
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										21
									
								
								pkg/secret/testdir/compose.yaml
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,21 @@ | ||||
| --- | ||||
| version: "3.8" | ||||
|  | ||||
| services: | ||||
|   app: | ||||
|     image: nginx:1.21.0 | ||||
|     secrets: | ||||
|       - test_pass_one | ||||
|       - test_pass_two | ||||
|       - test_pass_three | ||||
|  | ||||
| secrets: | ||||
|   test_pass_one: | ||||
|     external: true | ||||
|     name: ${STACK_NAME}_test_pass_one_${SECRET_TEST_PASS_ONE_VERSION}  # should be removed | ||||
|   test_pass_two: | ||||
|     external: true | ||||
|     name: ${STACK_NAME}_test_pass_two_${SECRET_TEST_PASS_TWO_VERSION} | ||||
|   test_pass_three: | ||||
|     external: true | ||||
|     name: ${STACK_NAME}_pass_three_${SECRET_TEST_PASS_THREE_VERSION} # secretId and name don't match | ||||
| @ -14,6 +14,70 @@ import ( | ||||
| 	"github.com/sirupsen/logrus" | ||||
| ) | ||||
|  | ||||
| // GetService retrieves a service container based on a label. If prompt is true | ||||
| // and the retrievd count of service containers does not match 1, then a prompt | ||||
| // is presented to let the user choose. An error is returned when no service is | ||||
| // found. | ||||
| func GetServiceByLabel(c context.Context, cl *client.Client, label string, prompt bool) (swarm.Service, error) { | ||||
| 	services, err := cl.ServiceList(c, types.ServiceListOptions{}) | ||||
| 	if err != nil { | ||||
| 		return swarm.Service{}, err | ||||
| 	} | ||||
|  | ||||
| 	if len(services) == 0 { | ||||
| 		return swarm.Service{}, fmt.Errorf("no services deployed?") | ||||
| 	} | ||||
|  | ||||
| 	var matchingServices []swarm.Service | ||||
| 	for _, service := range services { | ||||
| 		if enabled, exists := service.Spec.Labels[label]; exists && enabled == "true" { | ||||
| 			matchingServices = append(matchingServices, service) | ||||
| 		} | ||||
| 	} | ||||
|  | ||||
| 	if len(matchingServices) == 0 { | ||||
| 		return swarm.Service{}, fmt.Errorf("no services deployed matching label '%s'?", label) | ||||
| 	} | ||||
|  | ||||
| 	if len(matchingServices) > 1 { | ||||
| 		var servicesRaw []string | ||||
| 		for _, service := range matchingServices { | ||||
| 			serviceName := service.Spec.Name | ||||
| 			created := formatter.HumanDuration(service.CreatedAt.Unix()) | ||||
| 			servicesRaw = append(servicesRaw, fmt.Sprintf("%s (created %v)", serviceName, created)) | ||||
| 		} | ||||
|  | ||||
| 		if !prompt { | ||||
| 			err := fmt.Errorf("expected 1 service but found %v: %s", len(matchingServices), strings.Join(servicesRaw, " ")) | ||||
| 			return swarm.Service{}, err | ||||
| 		} | ||||
|  | ||||
| 		logrus.Warnf("ambiguous service list received, prompting for input") | ||||
|  | ||||
| 		var response string | ||||
| 		prompt := &survey.Select{ | ||||
| 			Message: "which service are you looking for?", | ||||
| 			Options: servicesRaw, | ||||
| 		} | ||||
|  | ||||
| 		if err := survey.AskOne(prompt, &response); err != nil { | ||||
| 			return swarm.Service{}, err | ||||
| 		} | ||||
|  | ||||
| 		chosenService := strings.TrimSpace(strings.Split(response, " ")[0]) | ||||
| 		for _, service := range matchingServices { | ||||
| 			serviceName := strings.ToLower(service.Spec.Name) | ||||
| 			if serviceName == chosenService { | ||||
| 				return service, nil | ||||
| 			} | ||||
| 		} | ||||
|  | ||||
| 		logrus.Panic("failed to match chosen service") | ||||
| 	} | ||||
|  | ||||
| 	return matchingServices[0], nil | ||||
| } | ||||
|  | ||||
| // GetService retrieves a service container. If prompt is true and the retrievd | ||||
| // count of service containers does not match 1, then a prompt is presented to | ||||
| // let the user choose. A count of 0 is handled gracefully. | ||||
|  | ||||
| @ -2,73 +2,14 @@ package ssh | ||||
|  | ||||
| import ( | ||||
| 	"fmt" | ||||
| 	"os/exec" | ||||
| 	"strings" | ||||
|  | ||||
| 	"github.com/sirupsen/logrus" | ||||
| ) | ||||
|  | ||||
| // HostConfig is a SSH host config. | ||||
| type HostConfig struct { | ||||
| 	Host         string | ||||
| 	IdentityFile string | ||||
| 	Port         string | ||||
| 	User         string | ||||
| } | ||||
|  | ||||
| // String presents a human friendly output for the HostConfig. | ||||
| func (h HostConfig) String() string { | ||||
| 	return fmt.Sprintf( | ||||
| 		"{host: %s, username: %s, port: %s, identityfile: %s}", | ||||
| 		h.Host, | ||||
| 		h.User, | ||||
| 		h.Port, | ||||
| 		h.IdentityFile, | ||||
| 	) | ||||
| } | ||||
|  | ||||
| // GetHostConfig retrieves a ~/.ssh/config config for a host using /usr/bin/ssh | ||||
| // directly. We therefore maintain consistent interop with this standard | ||||
| // tooling. This is useful because SSH confuses a lot of people and having to | ||||
| // learn how two tools (`ssh` and `abra`) handle SSH connection details instead | ||||
| // of one (just `ssh`) is Not Cool. Here's to less bug reports on this topic! | ||||
| func GetHostConfig(hostname string) (HostConfig, error) { | ||||
| 	var hostConfig HostConfig | ||||
|  | ||||
| 	out, err := exec.Command("ssh", "-G", hostname).Output() | ||||
| 	if err != nil { | ||||
| 		return hostConfig, err | ||||
| 	} | ||||
|  | ||||
| 	for _, line := range strings.Split(string(out), "\n") { | ||||
| 		entries := strings.Split(line, " ") | ||||
| 		for idx, entry := range entries { | ||||
| 			if entry == "hostname" { | ||||
| 				hostConfig.Host = entries[idx+1] | ||||
| 			} | ||||
| 			if entry == "user" { | ||||
| 				hostConfig.User = entries[idx+1] | ||||
| 			} | ||||
| 			if entry == "port" { | ||||
| 				hostConfig.Port = entries[idx+1] | ||||
| 			} | ||||
| 			if entry == "identityfile" { | ||||
| 				if hostConfig.IdentityFile == "" { | ||||
| 					hostConfig.IdentityFile = entries[idx+1] | ||||
| 				} | ||||
| 			} | ||||
| 		} | ||||
| 	} | ||||
|  | ||||
| 	logrus.Debugf("retrieved ssh config for %s: %s", hostname, hostConfig.String()) | ||||
|  | ||||
| 	return hostConfig, nil | ||||
| } | ||||
|  | ||||
| // Fatal is a error output wrapper which aims to make SSH failures easier to | ||||
| // parse through re-wording. | ||||
| func Fatal(hostname string, err error) error { | ||||
| 	out := err.Error() | ||||
|  | ||||
| 	if strings.Contains(out, "Host key verification failed.") { | ||||
| 		return fmt.Errorf("SSH host key verification failed for %s", hostname) | ||||
| 	} else if strings.Contains(out, "Could not resolve hostname") { | ||||
| @ -77,7 +18,9 @@ func Fatal(hostname string, err error) error { | ||||
| 		return fmt.Errorf("connection timed out for %s", hostname) | ||||
| 	} else if strings.Contains(out, "Permission denied") { | ||||
| 		return fmt.Errorf("ssh auth: permission denied for %s", hostname) | ||||
| 	} else { | ||||
| 		return err | ||||
| 	} else if strings.Contains(out, "Network is unreachable") { | ||||
| 		return fmt.Errorf("unable to connect to %s, network is unreachable?", hostname) | ||||
| 	} | ||||
|  | ||||
| 	return err | ||||
| } | ||||
|  | ||||
| @ -16,12 +16,12 @@ import ( | ||||
| // GetConnectionHelper returns Docker-specific connection helper for the given URL. | ||||
| // GetConnectionHelper returns nil without error when no helper is registered for the scheme. | ||||
| // | ||||
| // ssh://<user>@<host> URL requires Docker 18.09 or later on the remote host. | ||||
| // ssh://<host> URL requires Docker 18.09 or later on the remote host. | ||||
| func GetConnectionHelper(daemonURL string) (*connhelper.ConnectionHelper, error) { | ||||
| 	return getConnectionHelper(daemonURL, []string{"-o ConnectTimeout=5"}) | ||||
| 	return getConnectionHelper(daemonURL) | ||||
| } | ||||
|  | ||||
| func getConnectionHelper(daemonURL string, sshFlags []string) (*connhelper.ConnectionHelper, error) { | ||||
| func getConnectionHelper(daemonURL string) (*connhelper.ConnectionHelper, error) { | ||||
| 	url, err := url.Parse(daemonURL) | ||||
| 	if err != nil { | ||||
| 		return nil, err | ||||
| @ -35,7 +35,7 @@ func getConnectionHelper(daemonURL string, sshFlags []string) (*connhelper.Conne | ||||
|  | ||||
| 		return &connhelper.ConnectionHelper{ | ||||
| 			Dialer: func(ctx context.Context, network, addr string) (net.Conn, error) { | ||||
| 				return New(ctx, "ssh", append(sshFlags, ctxConnDetails.Args("docker", "system", "dial-stdio")...)...) | ||||
| 				return New(ctx, "ssh", ctxConnDetails.Args("docker", "system", "dial-stdio")...) | ||||
| 			}, | ||||
| 			Host: "http://docker.example.com", | ||||
| 		}, nil | ||||
| @ -45,6 +45,7 @@ func getConnectionHelper(daemonURL string, sshFlags []string) (*connhelper.Conne | ||||
| 	return nil, err | ||||
| } | ||||
|  | ||||
| // NewConnectionHelper creates new connection helper for a remote docker daemon. | ||||
| func NewConnectionHelper(daemonURL string) (*connhelper.ConnectionHelper, error) { | ||||
| 	helper, err := GetConnectionHelper(daemonURL) | ||||
| 	if err != nil { | ||||
| @ -73,6 +74,7 @@ func getDockerEndpoint(host string) (docker.Endpoint, error) { | ||||
| 	return ep, nil | ||||
| } | ||||
|  | ||||
| // GetDockerEndpointMetadataAndTLS retrieves the docker endpoint and TLS info for a remote host. | ||||
| func GetDockerEndpointMetadataAndTLS(host string) (docker.EndpointMeta, *dCliContextStore.EndpointTLSData, error) { | ||||
| 	ep, err := getDockerEndpoint(host) | ||||
| 	if err != nil { | ||||
|  | ||||
Some files were not shown because too many files have changed in this diff Show More
		Reference in New Issue
	
	Block a user
	