forked from toolshed/abra
		
	Compare commits
	
		
			15 Commits
		
	
	
		
			cp-enhance
			...
			recipe-ini
		
	
	| Author | SHA1 | Date | |
|---|---|---|---|
| c23d2d34b9 | |||
| 0643df6d73 | |||
| e9b99fe921 | |||
| 4920dfedb3 | |||
| 0a3624c15b | |||
| 
						
						
							
						
						c5687dfbd7
	
				 | 
					
					
						|||
| ca91abbed9 | |||
| d4727db8f9 | |||
| af8cd1f67a | |||
| 
						
						
							
						
						cdd7516e54
	
				 | 
					
					
						|||
| 99e3ed416f | |||
| 02b726db02 | |||
| 2de6934322 | |||
| 
						
						
							
						
						cb49cf06d1
	
				 | 
					
					
						|||
| 
						
						
							
						
						9affda8a70
	
				 | 
					
					
						
@ -1,414 +1,296 @@
 | 
			
		||||
package app
 | 
			
		||||
 | 
			
		||||
import (
 | 
			
		||||
	"archive/tar"
 | 
			
		||||
	"context"
 | 
			
		||||
	"fmt"
 | 
			
		||||
	"io"
 | 
			
		||||
	"os"
 | 
			
		||||
	"path/filepath"
 | 
			
		||||
	"strings"
 | 
			
		||||
	"time"
 | 
			
		||||
 | 
			
		||||
	"coopcloud.tech/abra/cli/internal"
 | 
			
		||||
	"coopcloud.tech/abra/pkg/autocomplete"
 | 
			
		||||
	"coopcloud.tech/abra/pkg/client"
 | 
			
		||||
	"coopcloud.tech/abra/pkg/config"
 | 
			
		||||
	containerPkg "coopcloud.tech/abra/pkg/container"
 | 
			
		||||
	recipePkg "coopcloud.tech/abra/pkg/recipe"
 | 
			
		||||
	"coopcloud.tech/abra/pkg/upstream/container"
 | 
			
		||||
	"github.com/docker/cli/cli/command"
 | 
			
		||||
	"github.com/docker/docker/api/types"
 | 
			
		||||
	"github.com/docker/docker/api/types/filters"
 | 
			
		||||
	dockerClient "github.com/docker/docker/client"
 | 
			
		||||
	"github.com/docker/docker/pkg/archive"
 | 
			
		||||
	"github.com/klauspost/pgzip"
 | 
			
		||||
	"coopcloud.tech/abra/pkg/recipe"
 | 
			
		||||
	"github.com/sirupsen/logrus"
 | 
			
		||||
	"github.com/urfave/cli"
 | 
			
		||||
)
 | 
			
		||||
 | 
			
		||||
type backupConfig struct {
 | 
			
		||||
	preHookCmd  string
 | 
			
		||||
	postHookCmd string
 | 
			
		||||
	backupPaths []string
 | 
			
		||||
var snapshot string
 | 
			
		||||
var snapshotFlag = &cli.StringFlag{
 | 
			
		||||
	Name:        "snapshot, s",
 | 
			
		||||
	Usage:       "Lists specific snapshot",
 | 
			
		||||
	Destination: &snapshot,
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
var appBackupCommand = cli.Command{
 | 
			
		||||
	Name:      "backup",
 | 
			
		||||
	Aliases:   []string{"bk"},
 | 
			
		||||
	Usage:     "Run app backup",
 | 
			
		||||
	ArgsUsage: "<domain> [<service>]",
 | 
			
		||||
var includePath string
 | 
			
		||||
var includePathFlag = &cli.StringFlag{
 | 
			
		||||
	Name:        "path, p",
 | 
			
		||||
	Usage:       "Include path",
 | 
			
		||||
	Destination: &includePath,
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
var resticRepo string
 | 
			
		||||
var resticRepoFlag = &cli.StringFlag{
 | 
			
		||||
	Name:        "repo, r",
 | 
			
		||||
	Usage:       "Restic repository",
 | 
			
		||||
	Destination: &resticRepo,
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
var appBackupListCommand = cli.Command{
 | 
			
		||||
	Name:    "list",
 | 
			
		||||
	Aliases: []string{"ls"},
 | 
			
		||||
	Flags: []cli.Flag{
 | 
			
		||||
		internal.DebugFlag,
 | 
			
		||||
		internal.OfflineFlag,
 | 
			
		||||
		internal.ChaosFlag,
 | 
			
		||||
		snapshotFlag,
 | 
			
		||||
		includePathFlag,
 | 
			
		||||
	},
 | 
			
		||||
	Before:       internal.SubCommandBefore,
 | 
			
		||||
	Usage:        "List all backups",
 | 
			
		||||
	BashComplete: autocomplete.AppNameComplete,
 | 
			
		||||
	Description: `
 | 
			
		||||
Run an app backup.
 | 
			
		||||
 | 
			
		||||
A backup command and pre/post hook commands are defined in the recipe
 | 
			
		||||
configuration. Abra reads this configuration and run the comands in the context
 | 
			
		||||
of the deployed services. Pass <service> if you only want to back up a single
 | 
			
		||||
service. All backups are placed in the ~/.abra/backups directory.
 | 
			
		||||
 | 
			
		||||
A single backup file is produced for all backup paths specified for a service.
 | 
			
		||||
If we have the following backup configuration:
 | 
			
		||||
 | 
			
		||||
    - "backupbot.backup.path=/var/lib/foo,/var/lib/bar"
 | 
			
		||||
 | 
			
		||||
And we run "abra app backup example.com app", Abra will produce a file that
 | 
			
		||||
looks like:
 | 
			
		||||
 | 
			
		||||
    ~/.abra/backups/example_com_app_609341138.tar.gz
 | 
			
		||||
 | 
			
		||||
This file is a compressed archive which contains all backup paths. To see paths, run:
 | 
			
		||||
 | 
			
		||||
    tar -tf ~/.abra/backups/example_com_app_609341138.tar.gz
 | 
			
		||||
 | 
			
		||||
(Make sure to change the name of the backup file)
 | 
			
		||||
 | 
			
		||||
This single file can be used to restore your app. See "abra app restore" for more.
 | 
			
		||||
`,
 | 
			
		||||
	Action: func(c *cli.Context) error {
 | 
			
		||||
		app := internal.ValidateApp(c)
 | 
			
		||||
 | 
			
		||||
		recipe, err := recipePkg.Get(app.Recipe, internal.Offline)
 | 
			
		||||
		if err != nil {
 | 
			
		||||
		if err := recipe.EnsureExists(app.Recipe); err != nil {
 | 
			
		||||
			logrus.Fatal(err)
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		if !internal.Chaos {
 | 
			
		||||
			if err := recipePkg.EnsureIsClean(app.Recipe); err != nil {
 | 
			
		||||
			if err := recipe.EnsureIsClean(app.Recipe); err != nil {
 | 
			
		||||
				logrus.Fatal(err)
 | 
			
		||||
			}
 | 
			
		||||
 | 
			
		||||
			if !internal.Offline {
 | 
			
		||||
				if err := recipePkg.EnsureUpToDate(app.Recipe); err != nil {
 | 
			
		||||
				if err := recipe.EnsureUpToDate(app.Recipe); err != nil {
 | 
			
		||||
					logrus.Fatal(err)
 | 
			
		||||
				}
 | 
			
		||||
			}
 | 
			
		||||
 | 
			
		||||
			if err := recipePkg.EnsureLatest(app.Recipe); err != nil {
 | 
			
		||||
			if err := recipe.EnsureLatest(app.Recipe); err != nil {
 | 
			
		||||
				logrus.Fatal(err)
 | 
			
		||||
			}
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		backupConfigs := make(map[string]backupConfig)
 | 
			
		||||
		for _, service := range recipe.Config.Services {
 | 
			
		||||
			if backupsEnabled, ok := service.Deploy.Labels["backupbot.backup"]; ok {
 | 
			
		||||
				if backupsEnabled == "true" {
 | 
			
		||||
					fullServiceName := fmt.Sprintf("%s_%s", app.StackName(), service.Name)
 | 
			
		||||
					bkConfig := backupConfig{}
 | 
			
		||||
 | 
			
		||||
					logrus.Debugf("backup config detected for %s", fullServiceName)
 | 
			
		||||
 | 
			
		||||
					if paths, ok := service.Deploy.Labels["backupbot.backup.path"]; ok {
 | 
			
		||||
						logrus.Debugf("detected backup paths for %s: %s", fullServiceName, paths)
 | 
			
		||||
						bkConfig.backupPaths = strings.Split(paths, ",")
 | 
			
		||||
					}
 | 
			
		||||
 | 
			
		||||
					if preHookCmd, ok := service.Deploy.Labels["backupbot.backup.pre-hook"]; ok {
 | 
			
		||||
						logrus.Debugf("detected pre-hook command for %s: %s", fullServiceName, preHookCmd)
 | 
			
		||||
						bkConfig.preHookCmd = preHookCmd
 | 
			
		||||
					}
 | 
			
		||||
 | 
			
		||||
					if postHookCmd, ok := service.Deploy.Labels["backupbot.backup.post-hook"]; ok {
 | 
			
		||||
						logrus.Debugf("detected post-hook command for %s: %s", fullServiceName, postHookCmd)
 | 
			
		||||
						bkConfig.postHookCmd = postHookCmd
 | 
			
		||||
					}
 | 
			
		||||
 | 
			
		||||
					backupConfigs[service.Name] = bkConfig
 | 
			
		||||
				}
 | 
			
		||||
			}
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		cl, err := client.New(app.Server)
 | 
			
		||||
		if err != nil {
 | 
			
		||||
			logrus.Fatal(err)
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		serviceName := c.Args().Get(1)
 | 
			
		||||
		if serviceName != "" {
 | 
			
		||||
			backupConfig, ok := backupConfigs[serviceName]
 | 
			
		||||
			if !ok {
 | 
			
		||||
				logrus.Fatalf("no backup config for %s? does %s exist?", serviceName, serviceName)
 | 
			
		||||
			}
 | 
			
		||||
		targetContainer, err := internal.RetrieveBackupBotContainer(cl)
 | 
			
		||||
		if err != nil {
 | 
			
		||||
			logrus.Fatal(err)
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
			logrus.Infof("running backup for the %s service", serviceName)
 | 
			
		||||
		execEnv := []string{fmt.Sprintf("SERVICE=%s", app.Domain)}
 | 
			
		||||
		if snapshot != "" {
 | 
			
		||||
			logrus.Debugf("including SNAPSHOT=%s in backupbot exec invocation", snapshot)
 | 
			
		||||
			execEnv = append(execEnv, fmt.Sprintf("SNAPSHOT=%s", snapshot))
 | 
			
		||||
		}
 | 
			
		||||
		if includePath != "" {
 | 
			
		||||
			logrus.Debugf("including INCLUDE_PATH=%s in backupbot exec invocation", includePath)
 | 
			
		||||
			execEnv = append(execEnv, fmt.Sprintf("INCLUDE_PATH=%s", includePath))
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
			if err := runBackup(cl, app, serviceName, backupConfig); err != nil {
 | 
			
		||||
				logrus.Fatal(err)
 | 
			
		||||
			}
 | 
			
		||||
		} else {
 | 
			
		||||
			if len(backupConfigs) == 0 {
 | 
			
		||||
				logrus.Fatalf("no backup configs discovered for %s?", app.Name)
 | 
			
		||||
			}
 | 
			
		||||
 | 
			
		||||
			for serviceName, backupConfig := range backupConfigs {
 | 
			
		||||
				logrus.Infof("running backup for the %s service", serviceName)
 | 
			
		||||
 | 
			
		||||
				if err := runBackup(cl, app, serviceName, backupConfig); err != nil {
 | 
			
		||||
					logrus.Fatal(err)
 | 
			
		||||
				}
 | 
			
		||||
			}
 | 
			
		||||
		if err := internal.RunBackupCmdRemote(cl, "ls", targetContainer.ID, execEnv); err != nil {
 | 
			
		||||
			logrus.Fatal(err)
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		return nil
 | 
			
		||||
	},
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// TimeStamp generates a file name friendly timestamp.
 | 
			
		||||
func TimeStamp() string {
 | 
			
		||||
	ts := time.Now().UTC().Format(time.RFC3339)
 | 
			
		||||
	return strings.Replace(ts, ":", "-", -1)
 | 
			
		||||
}
 | 
			
		||||
var appBackupDownloadCommand = cli.Command{
 | 
			
		||||
	Name:    "download",
 | 
			
		||||
	Aliases: []string{"d"},
 | 
			
		||||
	Flags: []cli.Flag{
 | 
			
		||||
		internal.DebugFlag,
 | 
			
		||||
		internal.OfflineFlag,
 | 
			
		||||
		snapshotFlag,
 | 
			
		||||
		includePathFlag,
 | 
			
		||||
	},
 | 
			
		||||
	Before:       internal.SubCommandBefore,
 | 
			
		||||
	Usage:        "Download a backup",
 | 
			
		||||
	BashComplete: autocomplete.AppNameComplete,
 | 
			
		||||
	Action: func(c *cli.Context) error {
 | 
			
		||||
		app := internal.ValidateApp(c)
 | 
			
		||||
 | 
			
		||||
// runBackup does the actual backup logic.
 | 
			
		||||
func runBackup(cl *dockerClient.Client, app config.App, serviceName string, bkConfig backupConfig) error {
 | 
			
		||||
	if len(bkConfig.backupPaths) == 0 {
 | 
			
		||||
		return fmt.Errorf("backup paths are empty for %s?", serviceName)
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	// FIXME: avoid instantiating a new CLI
 | 
			
		||||
	dcli, err := command.NewDockerCli()
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		return err
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	filters := filters.NewArgs()
 | 
			
		||||
	filters.Add("name", fmt.Sprintf("^%s_%s", app.StackName(), serviceName))
 | 
			
		||||
 | 
			
		||||
	targetContainer, err := containerPkg.GetContainer(context.Background(), cl, filters, true)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		return err
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	fullServiceName := fmt.Sprintf("%s_%s", app.StackName(), serviceName)
 | 
			
		||||
	if bkConfig.preHookCmd != "" {
 | 
			
		||||
		splitCmd := internal.SafeSplit(bkConfig.preHookCmd)
 | 
			
		||||
 | 
			
		||||
		logrus.Debugf("split pre-hook command for %s into %s", fullServiceName, splitCmd)
 | 
			
		||||
 | 
			
		||||
		preHookExecOpts := types.ExecConfig{
 | 
			
		||||
			AttachStderr: true,
 | 
			
		||||
			AttachStdin:  true,
 | 
			
		||||
			AttachStdout: true,
 | 
			
		||||
			Cmd:          splitCmd,
 | 
			
		||||
			Detach:       false,
 | 
			
		||||
			Tty:          true,
 | 
			
		||||
		if err := recipe.EnsureExists(app.Recipe); err != nil {
 | 
			
		||||
			logrus.Fatal(err)
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		if err := container.RunExec(dcli, cl, targetContainer.ID, &preHookExecOpts); err != nil {
 | 
			
		||||
			return fmt.Errorf("failed to run %s on %s: %s", bkConfig.preHookCmd, targetContainer.ID, err.Error())
 | 
			
		||||
		if !internal.Chaos {
 | 
			
		||||
			if err := recipe.EnsureIsClean(app.Recipe); err != nil {
 | 
			
		||||
				logrus.Fatal(err)
 | 
			
		||||
			}
 | 
			
		||||
 | 
			
		||||
			if !internal.Offline {
 | 
			
		||||
				if err := recipe.EnsureUpToDate(app.Recipe); err != nil {
 | 
			
		||||
					logrus.Fatal(err)
 | 
			
		||||
				}
 | 
			
		||||
			}
 | 
			
		||||
 | 
			
		||||
			if err := recipe.EnsureLatest(app.Recipe); err != nil {
 | 
			
		||||
				logrus.Fatal(err)
 | 
			
		||||
			}
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		logrus.Infof("succesfully ran %s pre-hook command: %s", fullServiceName, bkConfig.preHookCmd)
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	var tempBackupPaths []string
 | 
			
		||||
	for _, remoteBackupPath := range bkConfig.backupPaths {
 | 
			
		||||
		sanitisedPath := strings.ReplaceAll(remoteBackupPath, "/", "_")
 | 
			
		||||
		localBackupPath := filepath.Join(config.BACKUP_DIR, fmt.Sprintf("%s%s_%s.tar.gz", fullServiceName, sanitisedPath, TimeStamp()))
 | 
			
		||||
		logrus.Debugf("temporarily backing up %s:%s to %s", fullServiceName, remoteBackupPath, localBackupPath)
 | 
			
		||||
 | 
			
		||||
		logrus.Infof("backing up %s:%s", fullServiceName, remoteBackupPath)
 | 
			
		||||
 | 
			
		||||
		content, _, err := cl.CopyFromContainer(context.Background(), targetContainer.ID, remoteBackupPath)
 | 
			
		||||
		cl, err := client.New(app.Server)
 | 
			
		||||
		if err != nil {
 | 
			
		||||
			logrus.Debugf("failed to copy %s from container: %s", remoteBackupPath, err.Error())
 | 
			
		||||
			if err := cleanupTempArchives(tempBackupPaths); err != nil {
 | 
			
		||||
				return fmt.Errorf("failed to clean up temporary archives: %s", err.Error())
 | 
			
		||||
			logrus.Fatal(err)
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		targetContainer, err := internal.RetrieveBackupBotContainer(cl)
 | 
			
		||||
		if err != nil {
 | 
			
		||||
			logrus.Fatal(err)
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		execEnv := []string{fmt.Sprintf("SERVICE=%s", app.Domain)}
 | 
			
		||||
		if snapshot != "" {
 | 
			
		||||
			logrus.Debugf("including SNAPSHOT=%s in backupbot exec invocation", snapshot)
 | 
			
		||||
			execEnv = append(execEnv, fmt.Sprintf("SNAPSHOT=%s", snapshot))
 | 
			
		||||
		}
 | 
			
		||||
		if includePath != "" {
 | 
			
		||||
			logrus.Debugf("including INCLUDE_PATH=%s in backupbot exec invocation", includePath)
 | 
			
		||||
			execEnv = append(execEnv, fmt.Sprintf("INCLUDE_PATH=%s", includePath))
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		if err := internal.RunBackupCmdRemote(cl, "download", targetContainer.ID, execEnv); err != nil {
 | 
			
		||||
			logrus.Fatal(err)
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		remoteBackupDir := "/tmp/backup.tar.gz"
 | 
			
		||||
		currentWorkingDir := "."
 | 
			
		||||
		if err = CopyFromContainer(cl, targetContainer.ID, remoteBackupDir, currentWorkingDir); err != nil {
 | 
			
		||||
			logrus.Fatal(err)
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		fmt.Println("backup successfully downloaded to current working directory")
 | 
			
		||||
 | 
			
		||||
		return nil
 | 
			
		||||
	},
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
var appBackupCreateCommand = cli.Command{
 | 
			
		||||
	Name:    "create",
 | 
			
		||||
	Aliases: []string{"c"},
 | 
			
		||||
	Flags: []cli.Flag{
 | 
			
		||||
		internal.DebugFlag,
 | 
			
		||||
		internal.OfflineFlag,
 | 
			
		||||
		resticRepoFlag,
 | 
			
		||||
	},
 | 
			
		||||
	Before:       internal.SubCommandBefore,
 | 
			
		||||
	Usage:        "Create a new backup",
 | 
			
		||||
	BashComplete: autocomplete.AppNameComplete,
 | 
			
		||||
	Action: func(c *cli.Context) error {
 | 
			
		||||
		app := internal.ValidateApp(c)
 | 
			
		||||
 | 
			
		||||
		if err := recipe.EnsureExists(app.Recipe); err != nil {
 | 
			
		||||
			logrus.Fatal(err)
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		if !internal.Chaos {
 | 
			
		||||
			if err := recipe.EnsureIsClean(app.Recipe); err != nil {
 | 
			
		||||
				logrus.Fatal(err)
 | 
			
		||||
			}
 | 
			
		||||
			return fmt.Errorf("failed to copy %s from container: %s", remoteBackupPath, err.Error())
 | 
			
		||||
		}
 | 
			
		||||
		defer content.Close()
 | 
			
		||||
 | 
			
		||||
		_, srcBase := archive.SplitPathDirEntry(remoteBackupPath)
 | 
			
		||||
		preArchive := archive.RebaseArchiveEntries(content, srcBase, remoteBackupPath)
 | 
			
		||||
		if err := copyToFile(localBackupPath, preArchive); err != nil {
 | 
			
		||||
			logrus.Debugf("failed to create tar archive (%s): %s", localBackupPath, err.Error())
 | 
			
		||||
			if err := cleanupTempArchives(tempBackupPaths); err != nil {
 | 
			
		||||
				return fmt.Errorf("failed to clean up temporary archives: %s", err.Error())
 | 
			
		||||
			if !internal.Offline {
 | 
			
		||||
				if err := recipe.EnsureUpToDate(app.Recipe); err != nil {
 | 
			
		||||
					logrus.Fatal(err)
 | 
			
		||||
				}
 | 
			
		||||
			}
 | 
			
		||||
			return fmt.Errorf("failed to create tar archive (%s): %s", localBackupPath, err.Error())
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		tempBackupPaths = append(tempBackupPaths, localBackupPath)
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	logrus.Infof("compressing and merging archives...")
 | 
			
		||||
 | 
			
		||||
	if err := mergeArchives(tempBackupPaths, fullServiceName); err != nil {
 | 
			
		||||
		logrus.Debugf("failed to merge archive files: %s", err.Error())
 | 
			
		||||
		if err := cleanupTempArchives(tempBackupPaths); err != nil {
 | 
			
		||||
			return fmt.Errorf("failed to clean up temporary archives: %s", err.Error())
 | 
			
		||||
		}
 | 
			
		||||
		return fmt.Errorf("failed to merge archive files: %s", err.Error())
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	if err := cleanupTempArchives(tempBackupPaths); err != nil {
 | 
			
		||||
		return fmt.Errorf("failed to clean up temporary archives: %s", err.Error())
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	if bkConfig.postHookCmd != "" {
 | 
			
		||||
		splitCmd := internal.SafeSplit(bkConfig.postHookCmd)
 | 
			
		||||
 | 
			
		||||
		logrus.Debugf("split post-hook command for %s into %s", fullServiceName, splitCmd)
 | 
			
		||||
 | 
			
		||||
		postHookExecOpts := types.ExecConfig{
 | 
			
		||||
			AttachStderr: true,
 | 
			
		||||
			AttachStdin:  true,
 | 
			
		||||
			AttachStdout: true,
 | 
			
		||||
			Cmd:          splitCmd,
 | 
			
		||||
			Detach:       false,
 | 
			
		||||
			Tty:          true,
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		if err := container.RunExec(dcli, cl, targetContainer.ID, &postHookExecOpts); err != nil {
 | 
			
		||||
			return err
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		logrus.Infof("succesfully ran %s post-hook command: %s", fullServiceName, bkConfig.postHookCmd)
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	return nil
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func copyToFile(outfile string, r io.Reader) error {
 | 
			
		||||
	tmpFile, err := os.CreateTemp(filepath.Dir(outfile), ".tar_temp")
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		return err
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	tmpPath := tmpFile.Name()
 | 
			
		||||
 | 
			
		||||
	_, err = io.Copy(tmpFile, r)
 | 
			
		||||
	tmpFile.Close()
 | 
			
		||||
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		os.Remove(tmpPath)
 | 
			
		||||
		return err
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	if err = os.Rename(tmpPath, outfile); err != nil {
 | 
			
		||||
		os.Remove(tmpPath)
 | 
			
		||||
		return err
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	return nil
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func cleanupTempArchives(tarPaths []string) error {
 | 
			
		||||
	for _, tarPath := range tarPaths {
 | 
			
		||||
		if err := os.RemoveAll(tarPath); err != nil {
 | 
			
		||||
			return err
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		logrus.Debugf("remove temporary archive file %s", tarPath)
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	return nil
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func mergeArchives(tarPaths []string, serviceName string) error {
 | 
			
		||||
	var out io.Writer
 | 
			
		||||
	var cout *pgzip.Writer
 | 
			
		||||
 | 
			
		||||
	localBackupPath := filepath.Join(config.BACKUP_DIR, fmt.Sprintf("%s_%s.tar.gz", serviceName, TimeStamp()))
 | 
			
		||||
 | 
			
		||||
	fout, err := os.Create(localBackupPath)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		return fmt.Errorf("Failed to open %s: %s", localBackupPath, err)
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	defer fout.Close()
 | 
			
		||||
	out = fout
 | 
			
		||||
 | 
			
		||||
	cout = pgzip.NewWriter(out)
 | 
			
		||||
	out = cout
 | 
			
		||||
 | 
			
		||||
	tw := tar.NewWriter(out)
 | 
			
		||||
 | 
			
		||||
	for _, tarPath := range tarPaths {
 | 
			
		||||
		if err := addTar(tw, tarPath); err != nil {
 | 
			
		||||
			return fmt.Errorf("failed to merge %s: %v", tarPath, err)
 | 
			
		||||
		}
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	if err := tw.Close(); err != nil {
 | 
			
		||||
		return fmt.Errorf("failed to close tar writer %v", err)
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	if cout != nil {
 | 
			
		||||
		if err := cout.Flush(); err != nil {
 | 
			
		||||
			return fmt.Errorf("failed to flush: %s", err)
 | 
			
		||||
		} else if err = cout.Close(); err != nil {
 | 
			
		||||
			return fmt.Errorf("failed to close compressed writer: %s", err)
 | 
			
		||||
		}
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	logrus.Infof("backed up %s to %s", serviceName, localBackupPath)
 | 
			
		||||
 | 
			
		||||
	return nil
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func addTar(tw *tar.Writer, pth string) (err error) {
 | 
			
		||||
	var tr *tar.Reader
 | 
			
		||||
	var rc io.ReadCloser
 | 
			
		||||
	var hdr *tar.Header
 | 
			
		||||
 | 
			
		||||
	if tr, rc, err = openTarFile(pth); err != nil {
 | 
			
		||||
		return
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	for {
 | 
			
		||||
		if hdr, err = tr.Next(); err != nil {
 | 
			
		||||
			if err == io.EOF {
 | 
			
		||||
				err = nil
 | 
			
		||||
			if err := recipe.EnsureLatest(app.Recipe); err != nil {
 | 
			
		||||
				logrus.Fatal(err)
 | 
			
		||||
			}
 | 
			
		||||
			break
 | 
			
		||||
		}
 | 
			
		||||
		if err = tw.WriteHeader(hdr); err != nil {
 | 
			
		||||
			break
 | 
			
		||||
		} else if _, err = io.Copy(tw, tr); err != nil {
 | 
			
		||||
			break
 | 
			
		||||
 | 
			
		||||
		cl, err := client.New(app.Server)
 | 
			
		||||
		if err != nil {
 | 
			
		||||
			logrus.Fatal(err)
 | 
			
		||||
		}
 | 
			
		||||
	}
 | 
			
		||||
	if err == nil {
 | 
			
		||||
		err = rc.Close()
 | 
			
		||||
	} else {
 | 
			
		||||
		rc.Close()
 | 
			
		||||
	}
 | 
			
		||||
	return
 | 
			
		||||
 | 
			
		||||
		targetContainer, err := internal.RetrieveBackupBotContainer(cl)
 | 
			
		||||
		if err != nil {
 | 
			
		||||
			logrus.Fatal(err)
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		execEnv := []string{fmt.Sprintf("SERVICE=%s", app.Domain)}
 | 
			
		||||
		if resticRepo != "" {
 | 
			
		||||
			logrus.Debugf("including RESTIC_REPO=%s in backupbot exec invocation", resticRepo)
 | 
			
		||||
			execEnv = append(execEnv, fmt.Sprintf("RESTIC_REPO=%s", resticRepo))
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		if err := internal.RunBackupCmdRemote(cl, "create", targetContainer.ID, execEnv); err != nil {
 | 
			
		||||
			logrus.Fatal(err)
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		return nil
 | 
			
		||||
	},
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func openTarFile(pth string) (tr *tar.Reader, rc io.ReadCloser, err error) {
 | 
			
		||||
	var fin *os.File
 | 
			
		||||
	var n int
 | 
			
		||||
	buff := make([]byte, 1024)
 | 
			
		||||
var appBackupSnapshotsCommand = cli.Command{
 | 
			
		||||
	Name:    "snapshots",
 | 
			
		||||
	Aliases: []string{"s"},
 | 
			
		||||
	Flags: []cli.Flag{
 | 
			
		||||
		internal.DebugFlag,
 | 
			
		||||
		internal.OfflineFlag,
 | 
			
		||||
		snapshotFlag,
 | 
			
		||||
	},
 | 
			
		||||
	Before:       internal.SubCommandBefore,
 | 
			
		||||
	Usage:        "List backup snapshots",
 | 
			
		||||
	BashComplete: autocomplete.AppNameComplete,
 | 
			
		||||
	Action: func(c *cli.Context) error {
 | 
			
		||||
		app := internal.ValidateApp(c)
 | 
			
		||||
 | 
			
		||||
	if fin, err = os.Open(pth); err != nil {
 | 
			
		||||
		return
 | 
			
		||||
	}
 | 
			
		||||
		if err := recipe.EnsureExists(app.Recipe); err != nil {
 | 
			
		||||
			logrus.Fatal(err)
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
	if n, err = fin.Read(buff); err != nil {
 | 
			
		||||
		fin.Close()
 | 
			
		||||
		return
 | 
			
		||||
	} else if n == 0 {
 | 
			
		||||
		fin.Close()
 | 
			
		||||
		err = fmt.Errorf("%s is empty", pth)
 | 
			
		||||
		return
 | 
			
		||||
	}
 | 
			
		||||
		if !internal.Chaos {
 | 
			
		||||
			if err := recipe.EnsureIsClean(app.Recipe); err != nil {
 | 
			
		||||
				logrus.Fatal(err)
 | 
			
		||||
			}
 | 
			
		||||
 | 
			
		||||
	if _, err = fin.Seek(0, 0); err != nil {
 | 
			
		||||
		fin.Close()
 | 
			
		||||
		return
 | 
			
		||||
	}
 | 
			
		||||
			if !internal.Offline {
 | 
			
		||||
				if err := recipe.EnsureUpToDate(app.Recipe); err != nil {
 | 
			
		||||
					logrus.Fatal(err)
 | 
			
		||||
				}
 | 
			
		||||
			}
 | 
			
		||||
 | 
			
		||||
	rc = fin
 | 
			
		||||
	tr = tar.NewReader(rc)
 | 
			
		||||
			if err := recipe.EnsureLatest(app.Recipe); err != nil {
 | 
			
		||||
				logrus.Fatal(err)
 | 
			
		||||
			}
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
	return tr, rc, nil
 | 
			
		||||
		cl, err := client.New(app.Server)
 | 
			
		||||
		if err != nil {
 | 
			
		||||
			logrus.Fatal(err)
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		targetContainer, err := internal.RetrieveBackupBotContainer(cl)
 | 
			
		||||
		if err != nil {
 | 
			
		||||
			logrus.Fatal(err)
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		execEnv := []string{fmt.Sprintf("SERVICE=%s", app.Domain)}
 | 
			
		||||
		if snapshot != "" {
 | 
			
		||||
			logrus.Debugf("including SNAPSHOT=%s in backupbot exec invocation", snapshot)
 | 
			
		||||
			execEnv = append(execEnv, fmt.Sprintf("SNAPSHOT=%s", snapshot))
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		if err := internal.RunBackupCmdRemote(cl, "snapshots", targetContainer.ID, execEnv); err != nil {
 | 
			
		||||
			logrus.Fatal(err)
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		return nil
 | 
			
		||||
	},
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
var appBackupCommand = cli.Command{
 | 
			
		||||
	Name:      "backup",
 | 
			
		||||
	Aliases:   []string{"b"},
 | 
			
		||||
	Usage:     "Manage app backups",
 | 
			
		||||
	ArgsUsage: "<domain>",
 | 
			
		||||
	Subcommands: []cli.Command{
 | 
			
		||||
		appBackupListCommand,
 | 
			
		||||
		appBackupSnapshotsCommand,
 | 
			
		||||
		appBackupDownloadCommand,
 | 
			
		||||
		appBackupCreateCommand,
 | 
			
		||||
	},
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
@ -76,9 +76,9 @@ And if you want to copy that file back to your current working directory locally
 | 
			
		||||
		logrus.Debugf("retrieved %s as target container on %s", formatter.ShortenID(container.ID), app.Server)
 | 
			
		||||
 | 
			
		||||
		if toContainer {
 | 
			
		||||
			err = copyToContainer(cl, container.ID, srcPath, dstPath)
 | 
			
		||||
			err = CopyToContainer(cl, container.ID, srcPath, dstPath)
 | 
			
		||||
		} else {
 | 
			
		||||
			err = copyFromContainer(cl, container.ID, srcPath, dstPath)
 | 
			
		||||
			err = CopyFromContainer(cl, container.ID, srcPath, dstPath)
 | 
			
		||||
		}
 | 
			
		||||
		if err != nil {
 | 
			
		||||
			logrus.Fatal(err)
 | 
			
		||||
@ -106,9 +106,9 @@ func parseSrcAndDst(src, dst string) (srcPath string, dstPath string, service st
 | 
			
		||||
	return "", "", "", false, errServiceMissing
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// copyToContainer copies a file or directory from the local file system to the container.
 | 
			
		||||
// CopyToContainer copies a file or directory from the local file system to the container.
 | 
			
		||||
// See the possible copy modes and their documentation.
 | 
			
		||||
func copyToContainer(cl *dockerClient.Client, containerID, srcPath, dstPath string) error {
 | 
			
		||||
func CopyToContainer(cl *dockerClient.Client, containerID, srcPath, dstPath string) error {
 | 
			
		||||
	srcStat, err := os.Stat(srcPath)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		return fmt.Errorf("local %s ", err)
 | 
			
		||||
@ -140,7 +140,7 @@ func copyToContainer(cl *dockerClient.Client, containerID, srcPath, dstPath stri
 | 
			
		||||
		if err != nil {
 | 
			
		||||
			return err
 | 
			
		||||
		}
 | 
			
		||||
		if err := container.RunExec(dcli, cl, containerID, &types.ExecConfig{
 | 
			
		||||
		if _, err := container.RunExec(dcli, cl, containerID, &types.ExecConfig{
 | 
			
		||||
			AttachStderr: true,
 | 
			
		||||
			AttachStdin:  true,
 | 
			
		||||
			AttachStdout: true,
 | 
			
		||||
@ -179,7 +179,7 @@ func copyToContainer(cl *dockerClient.Client, containerID, srcPath, dstPath stri
 | 
			
		||||
		if err != nil {
 | 
			
		||||
			return err
 | 
			
		||||
		}
 | 
			
		||||
		if err := container.RunExec(dcli, cl, containerID, &types.ExecConfig{
 | 
			
		||||
		if _, err := container.RunExec(dcli, cl, containerID, &types.ExecConfig{
 | 
			
		||||
			AttachStderr: true,
 | 
			
		||||
			AttachStdin:  true,
 | 
			
		||||
			AttachStdout: true,
 | 
			
		||||
@ -194,9 +194,9 @@ func copyToContainer(cl *dockerClient.Client, containerID, srcPath, dstPath stri
 | 
			
		||||
	return nil
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// copyFromContainer copies a file or directory from the given container to the local file system.
 | 
			
		||||
// CopyFromContainer copies a file or directory from the given container to the local file system.
 | 
			
		||||
// See the possible copy modes and their documentation.
 | 
			
		||||
func copyFromContainer(cl *dockerClient.Client, containerID, srcPath, dstPath string) error {
 | 
			
		||||
func CopyFromContainer(cl *dockerClient.Client, containerID, srcPath, dstPath string) error {
 | 
			
		||||
	srcStat, err := cl.ContainerStatPath(context.Background(), containerID, srcPath)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		if errdefs.IsNotFound(err) {
 | 
			
		||||
 | 
			
		||||
							
								
								
									
										145
									
								
								cli/app/logs.go
									
									
									
									
									
								
							
							
						
						
									
										145
									
								
								cli/app/logs.go
									
									
									
									
									
								
							@ -2,75 +2,26 @@ package app
 | 
			
		||||
 | 
			
		||||
import (
 | 
			
		||||
	"context"
 | 
			
		||||
	"fmt"
 | 
			
		||||
	"io"
 | 
			
		||||
	"os"
 | 
			
		||||
	"slices"
 | 
			
		||||
	"sync"
 | 
			
		||||
	"time"
 | 
			
		||||
 | 
			
		||||
	"coopcloud.tech/abra/cli/internal"
 | 
			
		||||
	"coopcloud.tech/abra/pkg/autocomplete"
 | 
			
		||||
	"coopcloud.tech/abra/pkg/client"
 | 
			
		||||
	"coopcloud.tech/abra/pkg/config"
 | 
			
		||||
	"coopcloud.tech/abra/pkg/recipe"
 | 
			
		||||
	"coopcloud.tech/abra/pkg/service"
 | 
			
		||||
	"coopcloud.tech/abra/pkg/upstream/stack"
 | 
			
		||||
	"github.com/docker/docker/api/types"
 | 
			
		||||
	"github.com/docker/docker/api/types/filters"
 | 
			
		||||
	"github.com/docker/docker/api/types/swarm"
 | 
			
		||||
	dockerClient "github.com/docker/docker/client"
 | 
			
		||||
	"github.com/sirupsen/logrus"
 | 
			
		||||
	"github.com/urfave/cli"
 | 
			
		||||
)
 | 
			
		||||
 | 
			
		||||
var logOpts = types.ContainerLogsOptions{
 | 
			
		||||
	ShowStderr: true,
 | 
			
		||||
	ShowStdout: true,
 | 
			
		||||
	Since:      "",
 | 
			
		||||
	Until:      "",
 | 
			
		||||
	Timestamps: true,
 | 
			
		||||
	Follow:     true,
 | 
			
		||||
	Tail:       "20",
 | 
			
		||||
	Details:    false,
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// stackLogs lists logs for all stack services
 | 
			
		||||
func stackLogs(c *cli.Context, app config.App, client *dockerClient.Client) {
 | 
			
		||||
	filters, err := app.Filters(true, false)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		logrus.Fatal(err)
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	serviceOpts := types.ServiceListOptions{Filters: filters}
 | 
			
		||||
	services, err := client.ServiceList(context.Background(), serviceOpts)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		logrus.Fatal(err)
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	var wg sync.WaitGroup
 | 
			
		||||
	for _, service := range services {
 | 
			
		||||
		wg.Add(1)
 | 
			
		||||
		go func(s string) {
 | 
			
		||||
			if internal.StdErrOnly {
 | 
			
		||||
				logOpts.ShowStdout = false
 | 
			
		||||
			}
 | 
			
		||||
 | 
			
		||||
			logs, err := client.ServiceLogs(context.Background(), s, logOpts)
 | 
			
		||||
			if err != nil {
 | 
			
		||||
				logrus.Fatal(err)
 | 
			
		||||
			}
 | 
			
		||||
			defer logs.Close()
 | 
			
		||||
 | 
			
		||||
			_, err = io.Copy(os.Stdout, logs)
 | 
			
		||||
			if err != nil && err != io.EOF {
 | 
			
		||||
				logrus.Fatal(err)
 | 
			
		||||
			}
 | 
			
		||||
		}(service.ID)
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	wg.Wait()
 | 
			
		||||
 | 
			
		||||
	os.Exit(0)
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
var appLogsCommand = cli.Command{
 | 
			
		||||
	Name:      "logs",
 | 
			
		||||
	Aliases:   []string{"l"},
 | 
			
		||||
@ -105,46 +56,84 @@ var appLogsCommand = cli.Command{
 | 
			
		||||
			logrus.Fatalf("%s is not deployed?", app.Name)
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		logOpts.Since = internal.SinceLogs
 | 
			
		||||
 | 
			
		||||
		serviceName := c.Args().Get(1)
 | 
			
		||||
		if serviceName == "" {
 | 
			
		||||
			logrus.Debugf("tailing logs for all %s services", app.Recipe)
 | 
			
		||||
			stackLogs(c, app, cl)
 | 
			
		||||
		} else {
 | 
			
		||||
			logrus.Debugf("tailing logs for %s", serviceName)
 | 
			
		||||
			if err := tailServiceLogs(c, cl, app, serviceName); err != nil {
 | 
			
		||||
				logrus.Fatal(err)
 | 
			
		||||
			}
 | 
			
		||||
		serviceNames := []string{}
 | 
			
		||||
		if serviceName != "" {
 | 
			
		||||
			serviceNames = []string{serviceName}
 | 
			
		||||
		}
 | 
			
		||||
		err = tailLogs(cl, app, serviceNames)
 | 
			
		||||
		if err != nil {
 | 
			
		||||
			logrus.Fatal(err)
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		return nil
 | 
			
		||||
	},
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func tailServiceLogs(c *cli.Context, cl *dockerClient.Client, app config.App, serviceName string) error {
 | 
			
		||||
	filters := filters.NewArgs()
 | 
			
		||||
	filters.Add("name", fmt.Sprintf("%s_%s", app.StackName(), serviceName))
 | 
			
		||||
 | 
			
		||||
	chosenService, err := service.GetService(context.Background(), cl, filters, internal.NoInput)
 | 
			
		||||
// tailLogs prints logs for the given app with optional service names to be
 | 
			
		||||
// filtered on. It also checks if the latest task is not runnning and then
 | 
			
		||||
// prints the past tasks.
 | 
			
		||||
func tailLogs(cl *dockerClient.Client, app config.App, serviceNames []string) error {
 | 
			
		||||
	f, err := app.Filters(true, false, serviceNames...)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		logrus.Fatal(err)
 | 
			
		||||
		return err
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	if internal.StdErrOnly {
 | 
			
		||||
		logOpts.ShowStdout = false
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	logs, err := cl.ServiceLogs(context.Background(), chosenService.ID, logOpts)
 | 
			
		||||
	services, err := cl.ServiceList(context.Background(), types.ServiceListOptions{Filters: f})
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		logrus.Fatal(err)
 | 
			
		||||
		return err
 | 
			
		||||
	}
 | 
			
		||||
	defer logs.Close()
 | 
			
		||||
 | 
			
		||||
	_, err = io.Copy(os.Stdout, logs)
 | 
			
		||||
	if err != nil && err != io.EOF {
 | 
			
		||||
		logrus.Fatal(err)
 | 
			
		||||
	var wg sync.WaitGroup
 | 
			
		||||
	for _, service := range services {
 | 
			
		||||
		filters := filters.NewArgs()
 | 
			
		||||
		filters.Add("name", service.Spec.Name)
 | 
			
		||||
		tasks, err := cl.TaskList(context.Background(), types.TaskListOptions{Filters: f})
 | 
			
		||||
		if err != nil {
 | 
			
		||||
			return err
 | 
			
		||||
		}
 | 
			
		||||
		if len(tasks) > 0 {
 | 
			
		||||
			// Need to sort the tasks by the CreatedAt field in the inverse order.
 | 
			
		||||
			// Otherwise they are in the reversed order and not sorted properly.
 | 
			
		||||
			slices.SortFunc[[]swarm.Task](tasks, func(t1, t2 swarm.Task) int {
 | 
			
		||||
				return int(t2.Meta.CreatedAt.Unix() - t1.Meta.CreatedAt.Unix())
 | 
			
		||||
			})
 | 
			
		||||
			lastTask := tasks[0].Status
 | 
			
		||||
			if lastTask.State != swarm.TaskStateRunning {
 | 
			
		||||
				for _, task := range tasks {
 | 
			
		||||
					logrus.Errorf("[%s] %s State %s: %s", service.Spec.Name, task.Meta.CreatedAt.Format(time.RFC3339), task.Status.State, task.Status.Err)
 | 
			
		||||
				}
 | 
			
		||||
			}
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		// Collect the logs in a go routine, so the logs from all services are
 | 
			
		||||
		// collected in parallel.
 | 
			
		||||
		wg.Add(1)
 | 
			
		||||
		go func(serviceID string) {
 | 
			
		||||
			logs, err := cl.ServiceLogs(context.Background(), serviceID, types.ContainerLogsOptions{
 | 
			
		||||
				ShowStderr: true,
 | 
			
		||||
				ShowStdout: !internal.StdErrOnly,
 | 
			
		||||
				Since:      internal.SinceLogs,
 | 
			
		||||
				Until:      "",
 | 
			
		||||
				Timestamps: true,
 | 
			
		||||
				Follow:     true,
 | 
			
		||||
				Tail:       "20",
 | 
			
		||||
				Details:    false,
 | 
			
		||||
			})
 | 
			
		||||
			if err != nil {
 | 
			
		||||
				logrus.Fatal(err)
 | 
			
		||||
			}
 | 
			
		||||
			defer logs.Close()
 | 
			
		||||
 | 
			
		||||
			_, err = io.Copy(os.Stdout, logs)
 | 
			
		||||
			if err != nil && err != io.EOF {
 | 
			
		||||
				logrus.Fatal(err)
 | 
			
		||||
			}
 | 
			
		||||
		}(service.ID)
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	// Wait for all log streams to be closed.
 | 
			
		||||
	wg.Wait()
 | 
			
		||||
 | 
			
		||||
	return nil
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
@ -54,9 +54,17 @@ var appNewCommand = cli.Command{
 | 
			
		||||
		internal.OfflineFlag,
 | 
			
		||||
		internal.ChaosFlag,
 | 
			
		||||
	},
 | 
			
		||||
	Before:       internal.SubCommandBefore,
 | 
			
		||||
	ArgsUsage:    "[<recipe>]",
 | 
			
		||||
	BashComplete: autocomplete.RecipeNameComplete,
 | 
			
		||||
	Before:    internal.SubCommandBefore,
 | 
			
		||||
	ArgsUsage: "[<recipe>] [<version>]",
 | 
			
		||||
	BashComplete: func(ctx *cli.Context) {
 | 
			
		||||
		args := ctx.Args()
 | 
			
		||||
		switch len(args) {
 | 
			
		||||
		case 0:
 | 
			
		||||
			autocomplete.RecipeNameComplete(ctx)
 | 
			
		||||
		case 1:
 | 
			
		||||
			autocomplete.RecipeVersionComplete(ctx.Args().Get(0))
 | 
			
		||||
		}
 | 
			
		||||
	},
 | 
			
		||||
	Action: func(c *cli.Context) error {
 | 
			
		||||
		recipe := internal.ValidateRecipe(c)
 | 
			
		||||
 | 
			
		||||
@ -69,8 +77,14 @@ var appNewCommand = cli.Command{
 | 
			
		||||
					logrus.Fatal(err)
 | 
			
		||||
				}
 | 
			
		||||
			}
 | 
			
		||||
			if err := recipePkg.EnsureLatest(recipe.Name); err != nil {
 | 
			
		||||
				logrus.Fatal(err)
 | 
			
		||||
			if c.Args().Get(1) == "" {
 | 
			
		||||
				if err := recipePkg.EnsureLatest(recipe.Name); err != nil {
 | 
			
		||||
					logrus.Fatal(err)
 | 
			
		||||
				}
 | 
			
		||||
			} else {
 | 
			
		||||
				if err := recipePkg.EnsureVersion(recipe.Name, c.Args().Get(1)); err != nil {
 | 
			
		||||
					logrus.Fatal(err)
 | 
			
		||||
				}
 | 
			
		||||
			}
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
@ -108,7 +122,7 @@ var appNewCommand = cli.Command{
 | 
			
		||||
			}
 | 
			
		||||
 | 
			
		||||
			envSamplePath := path.Join(config.RECIPES_DIR, recipe.Name, ".env.sample")
 | 
			
		||||
			secretsConfig, err := secret.ReadSecretsConfig(envSamplePath, composeFiles, recipe.Name)
 | 
			
		||||
			secretsConfig, err := secret.ReadSecretsConfig(envSamplePath, composeFiles, config.StackName(internal.Domain))
 | 
			
		||||
			if err != nil {
 | 
			
		||||
				return err
 | 
			
		||||
			}
 | 
			
		||||
@ -168,14 +182,8 @@ var appNewCommand = cli.Command{
 | 
			
		||||
type AppSecrets map[string]string
 | 
			
		||||
 | 
			
		||||
// createSecrets creates all secrets for a new app.
 | 
			
		||||
func createSecrets(cl *dockerClient.Client, secretsConfig map[string]secret.SecretValue, sanitisedAppName string) (AppSecrets, error) {
 | 
			
		||||
	// NOTE(d1): trim to match app.StackName() implementation
 | 
			
		||||
	if len(sanitisedAppName) > 45 {
 | 
			
		||||
		logrus.Debugf("trimming %s to %s to avoid runtime limits", sanitisedAppName, sanitisedAppName[:45])
 | 
			
		||||
		sanitisedAppName = sanitisedAppName[:45]
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	secrets, err := secret.GenerateSecrets(cl, secretsConfig, sanitisedAppName, internal.NewAppServer)
 | 
			
		||||
func createSecrets(cl *dockerClient.Client, secretsConfig map[string]secret.Secret, sanitisedAppName string) (AppSecrets, error) {
 | 
			
		||||
	secrets, err := secret.GenerateSecrets(cl, secretsConfig, internal.NewAppServer)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		return nil, err
 | 
			
		||||
	}
 | 
			
		||||
@ -217,7 +225,7 @@ func ensureDomainFlag(recipe recipe.Recipe, server string) error {
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// promptForSecrets asks if we should generate secrets for a new app.
 | 
			
		||||
func promptForSecrets(recipeName string, secretsConfig map[string]secret.SecretValue) error {
 | 
			
		||||
func promptForSecrets(recipeName string, secretsConfig map[string]secret.Secret) error {
 | 
			
		||||
	if len(secretsConfig) == 0 {
 | 
			
		||||
		logrus.Debugf("%s has no secrets to generate, skipping...", recipeName)
 | 
			
		||||
		return nil
 | 
			
		||||
 | 
			
		||||
@ -3,7 +3,9 @@ package app
 | 
			
		||||
import (
 | 
			
		||||
	"context"
 | 
			
		||||
	"fmt"
 | 
			
		||||
	"log"
 | 
			
		||||
	"os"
 | 
			
		||||
	"time"
 | 
			
		||||
 | 
			
		||||
	"coopcloud.tech/abra/cli/internal"
 | 
			
		||||
	"coopcloud.tech/abra/pkg/autocomplete"
 | 
			
		||||
@ -124,9 +126,11 @@ flag.
 | 
			
		||||
 | 
			
		||||
		if len(vols) > 0 {
 | 
			
		||||
			for _, vol := range vols {
 | 
			
		||||
				err := cl.VolumeRemove(context.Background(), vol, internal.Force) // last argument is for force removing
 | 
			
		||||
				err = retryFunc(5, func() error {
 | 
			
		||||
					return cl.VolumeRemove(context.Background(), vol, internal.Force) // last argument is for force removing
 | 
			
		||||
				})
 | 
			
		||||
				if err != nil {
 | 
			
		||||
					logrus.Fatal(err)
 | 
			
		||||
					log.Fatalf("removing volumes failed: %s", err)
 | 
			
		||||
				}
 | 
			
		||||
				logrus.Info(fmt.Sprintf("volume %s removed", vol))
 | 
			
		||||
			}
 | 
			
		||||
@ -143,3 +147,21 @@ flag.
 | 
			
		||||
		return nil
 | 
			
		||||
	},
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// retryFunc retries the given function for the given retries. After the nth
 | 
			
		||||
// retry it waits (n + 1)^2 seconds before the next retry (starting with n=0).
 | 
			
		||||
// It returns an error if the function still failed after the last retry.
 | 
			
		||||
func retryFunc(retries int, fn func() error) error {
 | 
			
		||||
	for i := 0; i < retries; i++ {
 | 
			
		||||
		err := fn()
 | 
			
		||||
		if err == nil {
 | 
			
		||||
			return nil
 | 
			
		||||
		}
 | 
			
		||||
		if i+1 < retries {
 | 
			
		||||
			sleep := time.Duration(i+1) * time.Duration(i+1)
 | 
			
		||||
			logrus.Infof("%s: waiting %d seconds before next retry", err, sleep)
 | 
			
		||||
			time.Sleep(sleep * time.Second)
 | 
			
		||||
		}
 | 
			
		||||
	}
 | 
			
		||||
	return fmt.Errorf("%d retries failed", retries)
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
							
								
								
									
										26
									
								
								cli/app/remove_test.go
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										26
									
								
								cli/app/remove_test.go
									
									
									
									
									
										Normal file
									
								
							@ -0,0 +1,26 @@
 | 
			
		||||
package app
 | 
			
		||||
 | 
			
		||||
import (
 | 
			
		||||
	"fmt"
 | 
			
		||||
	"testing"
 | 
			
		||||
)
 | 
			
		||||
 | 
			
		||||
func TestRetryFunc(t *testing.T) {
 | 
			
		||||
	err := retryFunc(1, func() error { return nil })
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		t.Errorf("should not return an error: %s", err)
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	i := 0
 | 
			
		||||
	fn := func() error {
 | 
			
		||||
		i++
 | 
			
		||||
		return fmt.Errorf("oh no, something went wrong!")
 | 
			
		||||
	}
 | 
			
		||||
	err = retryFunc(2, fn)
 | 
			
		||||
	if err == nil {
 | 
			
		||||
		t.Error("should return an error")
 | 
			
		||||
	}
 | 
			
		||||
	if i != 2 {
 | 
			
		||||
		t.Errorf("The function should have been called 1 times, got %d", i)
 | 
			
		||||
	}
 | 
			
		||||
}
 | 
			
		||||
@ -1,223 +1,82 @@
 | 
			
		||||
package app
 | 
			
		||||
 | 
			
		||||
import (
 | 
			
		||||
	"context"
 | 
			
		||||
	"errors"
 | 
			
		||||
	"fmt"
 | 
			
		||||
	"os"
 | 
			
		||||
 | 
			
		||||
	"coopcloud.tech/abra/cli/internal"
 | 
			
		||||
	"coopcloud.tech/abra/pkg/autocomplete"
 | 
			
		||||
	"coopcloud.tech/abra/pkg/client"
 | 
			
		||||
	"coopcloud.tech/abra/pkg/config"
 | 
			
		||||
	containerPkg "coopcloud.tech/abra/pkg/container"
 | 
			
		||||
	"coopcloud.tech/abra/pkg/recipe"
 | 
			
		||||
	recipePkg "coopcloud.tech/abra/pkg/recipe"
 | 
			
		||||
	"coopcloud.tech/abra/pkg/upstream/container"
 | 
			
		||||
	"github.com/docker/cli/cli/command"
 | 
			
		||||
	"github.com/docker/docker/api/types"
 | 
			
		||||
	"github.com/docker/docker/api/types/filters"
 | 
			
		||||
	dockerClient "github.com/docker/docker/client"
 | 
			
		||||
	"github.com/docker/docker/pkg/archive"
 | 
			
		||||
	"github.com/sirupsen/logrus"
 | 
			
		||||
	"github.com/urfave/cli"
 | 
			
		||||
)
 | 
			
		||||
 | 
			
		||||
type restoreConfig struct {
 | 
			
		||||
	preHookCmd  string
 | 
			
		||||
	postHookCmd string
 | 
			
		||||
var targetPath string
 | 
			
		||||
var targetPathFlag = &cli.StringFlag{
 | 
			
		||||
	Name:        "target, t",
 | 
			
		||||
	Usage:       "Target path",
 | 
			
		||||
	Destination: &targetPath,
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
var appRestoreCommand = cli.Command{
 | 
			
		||||
	Name:      "restore",
 | 
			
		||||
	Aliases:   []string{"rs"},
 | 
			
		||||
	Usage:     "Run app restore",
 | 
			
		||||
	ArgsUsage: "<domain> <service> <file>",
 | 
			
		||||
	Usage:     "Restore an app backup",
 | 
			
		||||
	ArgsUsage: "<domain> <service>",
 | 
			
		||||
	Flags: []cli.Flag{
 | 
			
		||||
		internal.DebugFlag,
 | 
			
		||||
		internal.OfflineFlag,
 | 
			
		||||
		internal.ChaosFlag,
 | 
			
		||||
		targetPathFlag,
 | 
			
		||||
	},
 | 
			
		||||
	Before:       internal.SubCommandBefore,
 | 
			
		||||
	BashComplete: autocomplete.AppNameComplete,
 | 
			
		||||
	Description: `
 | 
			
		||||
Run an app restore.
 | 
			
		||||
 | 
			
		||||
Pre/post hook commands are defined in the recipe configuration. Abra reads this
 | 
			
		||||
configuration and run the comands in the context of the service before
 | 
			
		||||
restoring the backup.
 | 
			
		||||
 | 
			
		||||
Unlike "abra app backup", restore must be run on a per-service basis. You can
 | 
			
		||||
not restore all services in one go. Backup files produced by Abra are
 | 
			
		||||
compressed archives which use absolute paths. This allows Abra to restore
 | 
			
		||||
according to standard tar command logic, i.e. the backup will be restored to
 | 
			
		||||
the path it was originally backed up from.
 | 
			
		||||
 | 
			
		||||
Example:
 | 
			
		||||
 | 
			
		||||
    abra app restore example.com app ~/.abra/backups/example_com_app_609341138.tar.gz
 | 
			
		||||
`,
 | 
			
		||||
	Action: func(c *cli.Context) error {
 | 
			
		||||
		app := internal.ValidateApp(c)
 | 
			
		||||
 | 
			
		||||
		recipe, err := recipe.Get(app.Recipe, internal.Offline)
 | 
			
		||||
		if err != nil {
 | 
			
		||||
		if err := recipe.EnsureExists(app.Recipe); err != nil {
 | 
			
		||||
			logrus.Fatal(err)
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		if !internal.Chaos {
 | 
			
		||||
			if err := recipePkg.EnsureIsClean(app.Recipe); err != nil {
 | 
			
		||||
			if err := recipe.EnsureIsClean(app.Recipe); err != nil {
 | 
			
		||||
				logrus.Fatal(err)
 | 
			
		||||
			}
 | 
			
		||||
 | 
			
		||||
			if !internal.Offline {
 | 
			
		||||
				if err := recipePkg.EnsureUpToDate(app.Recipe); err != nil {
 | 
			
		||||
				if err := recipe.EnsureUpToDate(app.Recipe); err != nil {
 | 
			
		||||
					logrus.Fatal(err)
 | 
			
		||||
				}
 | 
			
		||||
			}
 | 
			
		||||
 | 
			
		||||
			if err := recipePkg.EnsureLatest(app.Recipe); err != nil {
 | 
			
		||||
			if err := recipe.EnsureLatest(app.Recipe); err != nil {
 | 
			
		||||
				logrus.Fatal(err)
 | 
			
		||||
			}
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		serviceName := c.Args().Get(1)
 | 
			
		||||
		if serviceName == "" {
 | 
			
		||||
			internal.ShowSubcommandHelpAndError(c, errors.New("missing <service>?"))
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		backupPath := c.Args().Get(2)
 | 
			
		||||
		if backupPath == "" {
 | 
			
		||||
			internal.ShowSubcommandHelpAndError(c, errors.New("missing <file>?"))
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		if _, err := os.Stat(backupPath); err != nil {
 | 
			
		||||
			if os.IsNotExist(err) {
 | 
			
		||||
				logrus.Fatalf("%s doesn't exist?", backupPath)
 | 
			
		||||
			}
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		restoreConfigs := make(map[string]restoreConfig)
 | 
			
		||||
		for _, service := range recipe.Config.Services {
 | 
			
		||||
			if restoreEnabled, ok := service.Deploy.Labels["backupbot.restore"]; ok {
 | 
			
		||||
				if restoreEnabled == "true" {
 | 
			
		||||
					fullServiceName := fmt.Sprintf("%s_%s", app.StackName(), service.Name)
 | 
			
		||||
					rsConfig := restoreConfig{}
 | 
			
		||||
 | 
			
		||||
					logrus.Debugf("restore config detected for %s", fullServiceName)
 | 
			
		||||
 | 
			
		||||
					if preHookCmd, ok := service.Deploy.Labels["backupbot.restore.pre-hook"]; ok {
 | 
			
		||||
						logrus.Debugf("detected pre-hook command for %s: %s", fullServiceName, preHookCmd)
 | 
			
		||||
						rsConfig.preHookCmd = preHookCmd
 | 
			
		||||
					}
 | 
			
		||||
 | 
			
		||||
					if postHookCmd, ok := service.Deploy.Labels["backupbot.restore.post-hook"]; ok {
 | 
			
		||||
						logrus.Debugf("detected post-hook command for %s: %s", fullServiceName, postHookCmd)
 | 
			
		||||
						rsConfig.postHookCmd = postHookCmd
 | 
			
		||||
					}
 | 
			
		||||
 | 
			
		||||
					restoreConfigs[service.Name] = rsConfig
 | 
			
		||||
				}
 | 
			
		||||
			}
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		rsConfig, ok := restoreConfigs[serviceName]
 | 
			
		||||
		if !ok {
 | 
			
		||||
			rsConfig = restoreConfig{}
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		cl, err := client.New(app.Server)
 | 
			
		||||
		if err != nil {
 | 
			
		||||
			logrus.Fatal(err)
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		if err := runRestore(cl, app, backupPath, serviceName, rsConfig); err != nil {
 | 
			
		||||
		targetContainer, err := internal.RetrieveBackupBotContainer(cl)
 | 
			
		||||
		if err != nil {
 | 
			
		||||
			logrus.Fatal(err)
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		execEnv := []string{fmt.Sprintf("SERVICE=%s", app.Domain)}
 | 
			
		||||
		if snapshot != "" {
 | 
			
		||||
			logrus.Debugf("including SNAPSHOT=%s in backupbot exec invocation", snapshot)
 | 
			
		||||
			execEnv = append(execEnv, fmt.Sprintf("SNAPSHOT=%s", snapshot))
 | 
			
		||||
		}
 | 
			
		||||
		if targetPath != "" {
 | 
			
		||||
			logrus.Debugf("including TARGET=%s in backupbot exec invocation", targetPath)
 | 
			
		||||
			execEnv = append(execEnv, fmt.Sprintf("TARGET=%s", targetPath))
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		if err := internal.RunBackupCmdRemote(cl, "restore", targetContainer.ID, execEnv); err != nil {
 | 
			
		||||
			logrus.Fatal(err)
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		return nil
 | 
			
		||||
	},
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// runRestore does the actual restore logic.
 | 
			
		||||
func runRestore(cl *dockerClient.Client, app config.App, backupPath, serviceName string, rsConfig restoreConfig) error {
 | 
			
		||||
	// FIXME: avoid instantiating a new CLI
 | 
			
		||||
	dcli, err := command.NewDockerCli()
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		return err
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	filters := filters.NewArgs()
 | 
			
		||||
	filters.Add("name", fmt.Sprintf("^%s_%s", app.StackName(), serviceName))
 | 
			
		||||
 | 
			
		||||
	targetContainer, err := containerPkg.GetContainer(context.Background(), cl, filters, true)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		return err
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	fullServiceName := fmt.Sprintf("%s_%s", app.StackName(), serviceName)
 | 
			
		||||
	if rsConfig.preHookCmd != "" {
 | 
			
		||||
		splitCmd := internal.SafeSplit(rsConfig.preHookCmd)
 | 
			
		||||
 | 
			
		||||
		logrus.Debugf("split pre-hook command for %s into %s", fullServiceName, splitCmd)
 | 
			
		||||
 | 
			
		||||
		preHookExecOpts := types.ExecConfig{
 | 
			
		||||
			AttachStderr: true,
 | 
			
		||||
			AttachStdin:  true,
 | 
			
		||||
			AttachStdout: true,
 | 
			
		||||
			Cmd:          splitCmd,
 | 
			
		||||
			Detach:       false,
 | 
			
		||||
			Tty:          true,
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		if err := container.RunExec(dcli, cl, targetContainer.ID, &preHookExecOpts); err != nil {
 | 
			
		||||
			return err
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		logrus.Infof("succesfully ran %s pre-hook command: %s", fullServiceName, rsConfig.preHookCmd)
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	backupReader, err := os.Open(backupPath)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		return err
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	content, err := archive.DecompressStream(backupReader)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		return err
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	// NOTE(d1): we use absolute paths so tar knows what to do. it will restore
 | 
			
		||||
	// files according to the paths set in the compressed archive
 | 
			
		||||
	restorePath := "/"
 | 
			
		||||
 | 
			
		||||
	copyOpts := types.CopyToContainerOptions{AllowOverwriteDirWithFile: false, CopyUIDGID: false}
 | 
			
		||||
	if err := cl.CopyToContainer(context.Background(), targetContainer.ID, restorePath, content, copyOpts); err != nil {
 | 
			
		||||
		return err
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	logrus.Infof("restored %s to %s", backupPath, fullServiceName)
 | 
			
		||||
 | 
			
		||||
	if rsConfig.postHookCmd != "" {
 | 
			
		||||
		splitCmd := internal.SafeSplit(rsConfig.postHookCmd)
 | 
			
		||||
 | 
			
		||||
		logrus.Debugf("split post-hook command for %s into %s", fullServiceName, splitCmd)
 | 
			
		||||
 | 
			
		||||
		postHookExecOpts := types.ExecConfig{
 | 
			
		||||
			AttachStderr: true,
 | 
			
		||||
			AttachStdin:  true,
 | 
			
		||||
			AttachStdout: true,
 | 
			
		||||
			Cmd:          splitCmd,
 | 
			
		||||
			Detach:       false,
 | 
			
		||||
			Tty:          true,
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		if err := container.RunExec(dcli, cl, targetContainer.ID, &postHookExecOpts); err != nil {
 | 
			
		||||
			return err
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		logrus.Infof("succesfully ran %s post-hook command: %s", fullServiceName, rsConfig.postHookCmd)
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	return nil
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
@ -91,7 +91,7 @@ var appRunCommand = cli.Command{
 | 
			
		||||
			logrus.Fatal(err)
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		if err := container.RunExec(dcli, cl, targetContainer.ID, &execCreateOpts); err != nil {
 | 
			
		||||
		if _, err := container.RunExec(dcli, cl, targetContainer.ID, &execCreateOpts); err != nil {
 | 
			
		||||
			logrus.Fatal(err)
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
@ -91,7 +91,7 @@ var appSecretGenerateCommand = cli.Command{
 | 
			
		||||
			logrus.Fatal(err)
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		secrets, err := secret.ReadSecretsConfig(app.Path, composeFiles, app.Recipe)
 | 
			
		||||
		secrets, err := secret.ReadSecretsConfig(app.Path, composeFiles, app.StackName())
 | 
			
		||||
		if err != nil {
 | 
			
		||||
			logrus.Fatal(err)
 | 
			
		||||
		}
 | 
			
		||||
@ -104,7 +104,7 @@ var appSecretGenerateCommand = cli.Command{
 | 
			
		||||
				logrus.Fatalf("%s doesn't exist in the env config?", secretName)
 | 
			
		||||
			}
 | 
			
		||||
			s.Version = secretVersion
 | 
			
		||||
			secrets = map[string]secret.SecretValue{
 | 
			
		||||
			secrets = map[string]secret.Secret{
 | 
			
		||||
				secretName: s,
 | 
			
		||||
			}
 | 
			
		||||
		}
 | 
			
		||||
@ -114,7 +114,7 @@ var appSecretGenerateCommand = cli.Command{
 | 
			
		||||
			logrus.Fatal(err)
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		secretVals, err := secret.GenerateSecrets(cl, secrets, app.StackName(), app.Server)
 | 
			
		||||
		secretVals, err := secret.GenerateSecrets(cl, secrets, app.Server)
 | 
			
		||||
		if err != nil {
 | 
			
		||||
			logrus.Fatal(err)
 | 
			
		||||
		}
 | 
			
		||||
@ -274,7 +274,7 @@ Example:
 | 
			
		||||
			logrus.Fatal(err)
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		secrets, err := secret.ReadSecretsConfig(app.Path, composeFiles, app.Recipe)
 | 
			
		||||
		secrets, err := secret.ReadSecretsConfig(app.Path, composeFiles, app.StackName())
 | 
			
		||||
		if err != nil {
 | 
			
		||||
			logrus.Fatal(err)
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
@ -1,35 +1,67 @@
 | 
			
		||||
package internal
 | 
			
		||||
 | 
			
		||||
import (
 | 
			
		||||
	"strings"
 | 
			
		||||
	"context"
 | 
			
		||||
 | 
			
		||||
	"coopcloud.tech/abra/pkg/config"
 | 
			
		||||
	containerPkg "coopcloud.tech/abra/pkg/container"
 | 
			
		||||
	"coopcloud.tech/abra/pkg/service"
 | 
			
		||||
	"coopcloud.tech/abra/pkg/upstream/container"
 | 
			
		||||
	"github.com/docker/cli/cli/command"
 | 
			
		||||
	"github.com/docker/docker/api/types"
 | 
			
		||||
	"github.com/docker/docker/api/types/filters"
 | 
			
		||||
	dockerClient "github.com/docker/docker/client"
 | 
			
		||||
	"github.com/sirupsen/logrus"
 | 
			
		||||
)
 | 
			
		||||
 | 
			
		||||
// SafeSplit splits up a string into a list of commands safely.
 | 
			
		||||
func SafeSplit(s string) []string {
 | 
			
		||||
	split := strings.Split(s, " ")
 | 
			
		||||
 | 
			
		||||
	var result []string
 | 
			
		||||
	var inquote string
 | 
			
		||||
	var block string
 | 
			
		||||
	for _, i := range split {
 | 
			
		||||
		if inquote == "" {
 | 
			
		||||
			if strings.HasPrefix(i, "'") || strings.HasPrefix(i, "\"") {
 | 
			
		||||
				inquote = string(i[0])
 | 
			
		||||
				block = strings.TrimPrefix(i, inquote) + " "
 | 
			
		||||
			} else {
 | 
			
		||||
				result = append(result, i)
 | 
			
		||||
			}
 | 
			
		||||
		} else {
 | 
			
		||||
			if !strings.HasSuffix(i, inquote) {
 | 
			
		||||
				block += i + " "
 | 
			
		||||
			} else {
 | 
			
		||||
				block += strings.TrimSuffix(i, inquote)
 | 
			
		||||
				inquote = ""
 | 
			
		||||
				result = append(result, block)
 | 
			
		||||
				block = ""
 | 
			
		||||
			}
 | 
			
		||||
		}
 | 
			
		||||
// RetrieveBackupBotContainer gets the deployed backupbot container.
 | 
			
		||||
func RetrieveBackupBotContainer(cl *dockerClient.Client) (types.Container, error) {
 | 
			
		||||
	ctx := context.Background()
 | 
			
		||||
	chosenService, err := service.GetServiceByLabel(ctx, cl, config.BackupbotLabel, NoInput)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		return types.Container{}, err
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	return result
 | 
			
		||||
	logrus.Debugf("retrieved %s as backup enabled service", chosenService.Spec.Name)
 | 
			
		||||
 | 
			
		||||
	filters := filters.NewArgs()
 | 
			
		||||
	filters.Add("name", chosenService.Spec.Name)
 | 
			
		||||
	targetContainer, err := containerPkg.GetContainer(
 | 
			
		||||
		ctx,
 | 
			
		||||
		cl,
 | 
			
		||||
		filters,
 | 
			
		||||
		NoInput,
 | 
			
		||||
	)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		return types.Container{}, err
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	return targetContainer, nil
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// RunBackupCmdRemote runs a backup related command on a remote backupbot container.
 | 
			
		||||
func RunBackupCmdRemote(cl *dockerClient.Client, backupCmd string, containerID string, execEnv []string) error {
 | 
			
		||||
	execBackupListOpts := types.ExecConfig{
 | 
			
		||||
		AttachStderr: true,
 | 
			
		||||
		AttachStdin:  true,
 | 
			
		||||
		AttachStdout: true,
 | 
			
		||||
		Cmd:          []string{"/usr/bin/backup", "--", backupCmd},
 | 
			
		||||
		Detach:       false,
 | 
			
		||||
		Env:          execEnv,
 | 
			
		||||
		Tty:          true,
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	logrus.Debugf("running backup %s on %s with exec config %v", backupCmd, containerID, execBackupListOpts)
 | 
			
		||||
 | 
			
		||||
	// FIXME: avoid instantiating a new CLI
 | 
			
		||||
	dcli, err := command.NewDockerCli()
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		return err
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	if _, err := container.RunExec(dcli, cl, containerID, &execBackupListOpts); err != nil {
 | 
			
		||||
		return err
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	return nil
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
@ -238,6 +238,22 @@ var RemoteUserFlag = &cli.StringFlag{
 | 
			
		||||
	Destination: &RemoteUser,
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
var GitName string
 | 
			
		||||
var GitNameFlag = &cli.StringFlag{
 | 
			
		||||
	Name:        "git-name, gn",
 | 
			
		||||
	Value:       "",
 | 
			
		||||
	Usage:       "Git (user) name to do commits with",
 | 
			
		||||
	Destination: &GitName,
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
var GitEmail string
 | 
			
		||||
var GitEmailFlag = &cli.StringFlag{
 | 
			
		||||
	Name:        "git-email, ge",
 | 
			
		||||
	Value:       "",
 | 
			
		||||
	Usage:       "Git email name to do commits with",
 | 
			
		||||
	Destination: &GitEmail,
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// SubCommandBefore wires up pre-action machinery (e.g. --debug handling).
 | 
			
		||||
func SubCommandBefore(c *cli.Context) error {
 | 
			
		||||
	if Debug {
 | 
			
		||||
 | 
			
		||||
@ -60,7 +60,7 @@ func RunCmdRemote(cl *dockerClient.Client, app config.App, abraSh, serviceName,
 | 
			
		||||
		Tty:          false,
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	if err := container.RunExec(dcli, cl, targetContainer.ID, &execCreateOpts); err != nil {
 | 
			
		||||
	if _, err := container.RunExec(dcli, cl, targetContainer.ID, &execCreateOpts); err != nil {
 | 
			
		||||
		logrus.Infof("%s does not exist for %s, use /bin/sh as fallback", shell, app.Name)
 | 
			
		||||
		shell = "/bin/sh"
 | 
			
		||||
	}
 | 
			
		||||
@ -85,7 +85,7 @@ func RunCmdRemote(cl *dockerClient.Client, app config.App, abraSh, serviceName,
 | 
			
		||||
		execCreateOpts.Tty = false
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	if err := container.RunExec(dcli, cl, targetContainer.ID, &execCreateOpts); err != nil {
 | 
			
		||||
	if _, err := container.RunExec(dcli, cl, targetContainer.ID, &execCreateOpts); err != nil {
 | 
			
		||||
		return err
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
@ -3,6 +3,7 @@ package recipe
 | 
			
		||||
import (
 | 
			
		||||
	"coopcloud.tech/abra/cli/internal"
 | 
			
		||||
	"coopcloud.tech/abra/pkg/autocomplete"
 | 
			
		||||
	"coopcloud.tech/abra/pkg/formatter"
 | 
			
		||||
	"coopcloud.tech/abra/pkg/recipe"
 | 
			
		||||
	"github.com/sirupsen/logrus"
 | 
			
		||||
	"github.com/urfave/cli"
 | 
			
		||||
@ -17,26 +18,31 @@ var recipeFetchCommand = cli.Command{
 | 
			
		||||
	Flags: []cli.Flag{
 | 
			
		||||
		internal.DebugFlag,
 | 
			
		||||
		internal.NoInputFlag,
 | 
			
		||||
		internal.OfflineFlag,
 | 
			
		||||
	},
 | 
			
		||||
	Before:       internal.SubCommandBefore,
 | 
			
		||||
	BashComplete: autocomplete.RecipeNameComplete,
 | 
			
		||||
	Action: func(c *cli.Context) error {
 | 
			
		||||
		recipeName := c.Args().First()
 | 
			
		||||
 | 
			
		||||
		if recipeName != "" {
 | 
			
		||||
			internal.ValidateRecipe(c)
 | 
			
		||||
			if err := recipe.Ensure(recipeName); err != nil {
 | 
			
		||||
				logrus.Fatal(err)
 | 
			
		||||
			}
 | 
			
		||||
			return nil
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		if err := recipe.EnsureExists(recipeName); err != nil {
 | 
			
		||||
		catalogue, err := recipe.ReadRecipeCatalogue(internal.Offline)
 | 
			
		||||
		if err != nil {
 | 
			
		||||
			logrus.Fatal(err)
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		if err := recipe.EnsureUpToDate(recipeName); err != nil {
 | 
			
		||||
			logrus.Fatal(err)
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		if err := recipe.EnsureLatest(recipeName); err != nil {
 | 
			
		||||
			logrus.Fatal(err)
 | 
			
		||||
		catlBar := formatter.CreateProgressbar(len(catalogue), "fetching latest recipes...")
 | 
			
		||||
		for recipeName := range catalogue {
 | 
			
		||||
			if err := recipe.Ensure(recipeName); err != nil {
 | 
			
		||||
				logrus.Error(err)
 | 
			
		||||
			}
 | 
			
		||||
			catlBar.Add(1)
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		return nil
 | 
			
		||||
 | 
			
		||||
@ -4,7 +4,6 @@ import (
 | 
			
		||||
	"bytes"
 | 
			
		||||
	"errors"
 | 
			
		||||
	"fmt"
 | 
			
		||||
	"io/ioutil"
 | 
			
		||||
	"os"
 | 
			
		||||
	"path"
 | 
			
		||||
	"text/template"
 | 
			
		||||
@ -37,6 +36,8 @@ var recipeNewCommand = cli.Command{
 | 
			
		||||
		internal.DebugFlag,
 | 
			
		||||
		internal.NoInputFlag,
 | 
			
		||||
		internal.OfflineFlag,
 | 
			
		||||
		internal.GitNameFlag,
 | 
			
		||||
		internal.GitEmailFlag,
 | 
			
		||||
	},
 | 
			
		||||
	Before:    internal.SubCommandBefore,
 | 
			
		||||
	Usage:     "Create a new recipe",
 | 
			
		||||
@ -92,14 +93,14 @@ recipe and domain in the sample environment config).
 | 
			
		||||
				logrus.Fatal(err)
 | 
			
		||||
			}
 | 
			
		||||
 | 
			
		||||
			if err := ioutil.WriteFile(path, templated.Bytes(), 0644); err != nil {
 | 
			
		||||
			if err := os.WriteFile(path, templated.Bytes(), 0644); err != nil {
 | 
			
		||||
				logrus.Fatal(err)
 | 
			
		||||
			}
 | 
			
		||||
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		newGitRepo := path.Join(config.RECIPES_DIR, recipeName)
 | 
			
		||||
		if err := git.Init(newGitRepo, true); err != nil {
 | 
			
		||||
		if err := git.Init(newGitRepo, true, internal.GitName, internal.GitEmail); err != nil {
 | 
			
		||||
			logrus.Fatal(err)
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
@ -1,7 +1,9 @@
 | 
			
		||||
package recipe
 | 
			
		||||
 | 
			
		||||
import (
 | 
			
		||||
	"errors"
 | 
			
		||||
	"fmt"
 | 
			
		||||
	"os"
 | 
			
		||||
	"path"
 | 
			
		||||
	"strconv"
 | 
			
		||||
	"strings"
 | 
			
		||||
@ -140,7 +142,7 @@ your SSH keys configured on your account.
 | 
			
		||||
 | 
			
		||||
// getImageVersions retrieves image versions for a recipe
 | 
			
		||||
func getImageVersions(recipe recipe.Recipe) (map[string]string, error) {
 | 
			
		||||
	var services = make(map[string]string)
 | 
			
		||||
	services := make(map[string]string)
 | 
			
		||||
 | 
			
		||||
	missingTag := false
 | 
			
		||||
	for _, service := range recipe.Config.Services {
 | 
			
		||||
@ -207,6 +209,10 @@ func createReleaseFromTag(recipe recipe.Recipe, tagString, mainAppVersion string
 | 
			
		||||
		tagString = fmt.Sprintf("%s+%s", tag.String(), mainAppVersion)
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	if err := addReleaseNotes(recipe, tagString); err != nil {
 | 
			
		||||
		logrus.Fatal(err)
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	if err := commitRelease(recipe, tagString); err != nil {
 | 
			
		||||
		logrus.Fatal(err)
 | 
			
		||||
	}
 | 
			
		||||
@ -237,6 +243,82 @@ func getTagCreateOptions(tag string) (git.CreateTagOptions, error) {
 | 
			
		||||
	return git.CreateTagOptions{Message: msg}, nil
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// addReleaseNotes checks if the release/next release note exists and moves the
 | 
			
		||||
// file to release/<tag>.
 | 
			
		||||
func addReleaseNotes(recipe recipe.Recipe, tag string) error {
 | 
			
		||||
	repoPath := path.Join(config.RECIPES_DIR, recipe.Name)
 | 
			
		||||
	tagReleaseNotePath := path.Join(repoPath, "release", tag)
 | 
			
		||||
	if _, err := os.Stat(tagReleaseNotePath); err == nil {
 | 
			
		||||
		// Release note for current tag already exist exists.
 | 
			
		||||
		return nil
 | 
			
		||||
	} else if !errors.Is(err, os.ErrNotExist) {
 | 
			
		||||
		return err
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	nextReleaseNotePath := path.Join(repoPath, "release", "next")
 | 
			
		||||
	if _, err := os.Stat(nextReleaseNotePath); err == nil {
 | 
			
		||||
		// release/next note exists. Move it to release/<tag>
 | 
			
		||||
		if internal.Dry {
 | 
			
		||||
			logrus.Debugf("dry run: move release note from 'next' to %s", tag)
 | 
			
		||||
			return nil
 | 
			
		||||
		}
 | 
			
		||||
		if !internal.NoInput {
 | 
			
		||||
			prompt := &survey.Input{
 | 
			
		||||
				Message: "Use release note in release/next?",
 | 
			
		||||
			}
 | 
			
		||||
			var addReleaseNote bool
 | 
			
		||||
			if err := survey.AskOne(prompt, &addReleaseNote); err != nil {
 | 
			
		||||
				return err
 | 
			
		||||
			}
 | 
			
		||||
			if !addReleaseNote {
 | 
			
		||||
				return nil
 | 
			
		||||
			}
 | 
			
		||||
		}
 | 
			
		||||
		err := os.Rename(nextReleaseNotePath, tagReleaseNotePath)
 | 
			
		||||
		if err != nil {
 | 
			
		||||
			return err
 | 
			
		||||
		}
 | 
			
		||||
		err = gitPkg.Add(repoPath, path.Join("release", "next"), internal.Dry)
 | 
			
		||||
		if err != nil {
 | 
			
		||||
			return err
 | 
			
		||||
		}
 | 
			
		||||
		err = gitPkg.Add(repoPath, path.Join("release", tag), internal.Dry)
 | 
			
		||||
		if err != nil {
 | 
			
		||||
			return err
 | 
			
		||||
		}
 | 
			
		||||
	} else if !errors.Is(err, os.ErrNotExist) {
 | 
			
		||||
		return err
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	// No release note exists for the current release.
 | 
			
		||||
	if internal.NoInput {
 | 
			
		||||
		return nil
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	prompt := &survey.Input{
 | 
			
		||||
		Message: "Release Note (leave empty for no release note)",
 | 
			
		||||
	}
 | 
			
		||||
	var releaseNote string
 | 
			
		||||
	if err := survey.AskOne(prompt, &releaseNote); err != nil {
 | 
			
		||||
		return err
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	if releaseNote == "" {
 | 
			
		||||
		return nil
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	err := os.WriteFile(tagReleaseNotePath, []byte(releaseNote), 0o644)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		return err
 | 
			
		||||
	}
 | 
			
		||||
	err = gitPkg.Add(repoPath, path.Join("release", tag), internal.Dry)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		return err
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	return nil
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func commitRelease(recipe recipe.Recipe, tag string) error {
 | 
			
		||||
	if internal.Dry {
 | 
			
		||||
		logrus.Debugf("dry run: no changes committed")
 | 
			
		||||
@ -404,6 +486,10 @@ func createReleaseFromPreviousTag(tagString, mainAppVersion string, recipe recip
 | 
			
		||||
		}
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	if err := addReleaseNotes(recipe, tagString); err != nil {
 | 
			
		||||
		logrus.Fatal(err)
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	if err := commitRelease(recipe, tagString); err != nil {
 | 
			
		||||
		logrus.Fatalf("failed to commit changes: %s", err.Error())
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
							
								
								
									
										4
									
								
								go.mod
									
									
									
									
									
								
							
							
						
						
									
										4
									
								
								go.mod
									
									
									
									
									
								
							@ -4,7 +4,7 @@ go 1.21
 | 
			
		||||
 | 
			
		||||
require (
 | 
			
		||||
	coopcloud.tech/tagcmp v0.0.0-20211103052201-885b22f77d52
 | 
			
		||||
	git.coopcloud.tech/coop-cloud/godotenv v1.5.2-0.20231130100106-7462d91acefd
 | 
			
		||||
	git.coopcloud.tech/coop-cloud/godotenv v1.5.2-0.20231130100509-01bff8284355
 | 
			
		||||
	github.com/AlecAivazis/survey/v2 v2.3.7
 | 
			
		||||
	github.com/Gurpartap/logrus-stack v0.0.0-20170710170904-89c00d8a28f4
 | 
			
		||||
	github.com/docker/cli v24.0.7+incompatible
 | 
			
		||||
@ -12,6 +12,7 @@ require (
 | 
			
		||||
	github.com/docker/docker v24.0.7+incompatible
 | 
			
		||||
	github.com/docker/go-units v0.5.0
 | 
			
		||||
	github.com/go-git/go-git/v5 v5.10.0
 | 
			
		||||
	github.com/google/go-cmp v0.5.9
 | 
			
		||||
	github.com/moby/sys/signal v0.7.0
 | 
			
		||||
	github.com/moby/term v0.5.0
 | 
			
		||||
	github.com/olekukonko/tablewriter v0.0.5
 | 
			
		||||
@ -47,7 +48,6 @@ require (
 | 
			
		||||
	github.com/gogo/protobuf v1.3.2 // indirect
 | 
			
		||||
	github.com/golang/groupcache v0.0.0-20210331224755-41bb18bfe9da // indirect
 | 
			
		||||
	github.com/golang/protobuf v1.5.3 // indirect
 | 
			
		||||
	github.com/google/go-cmp v0.5.9 // indirect
 | 
			
		||||
	github.com/hashicorp/go-cleanhttp v0.5.2 // indirect
 | 
			
		||||
	github.com/imdario/mergo v0.3.12 // indirect
 | 
			
		||||
	github.com/inconshreveable/mousetrap v1.0.0 // indirect
 | 
			
		||||
 | 
			
		||||
							
								
								
									
										5
									
								
								go.sum
									
									
									
									
									
								
							
							
						
						
									
										5
									
								
								go.sum
									
									
									
									
									
								
							@ -51,8 +51,8 @@ coopcloud.tech/tagcmp v0.0.0-20211103052201-885b22f77d52/go.mod h1:ESVm0wQKcbcFi
 | 
			
		||||
dario.cat/mergo v1.0.0 h1:AGCNq9Evsj31mOgNPcLyXc+4PNABt905YmuqPYYpBWk=
 | 
			
		||||
dario.cat/mergo v1.0.0/go.mod h1:uNxQE+84aUszobStD9th8a29P2fMDhsBdgRYvZOxGmk=
 | 
			
		||||
dmitri.shuralyov.com/gpu/mtl v0.0.0-20190408044501-666a987793e9/go.mod h1:H6x//7gZCb22OMCxBHrMx7a5I7Hp++hsVxbQ4BYO7hU=
 | 
			
		||||
git.coopcloud.tech/coop-cloud/godotenv v1.5.2-0.20231130100106-7462d91acefd h1:dctCkMhcsgIWMrkB1Br8S0RJF17eG+LKiqcXXVr3mdU=
 | 
			
		||||
git.coopcloud.tech/coop-cloud/godotenv v1.5.2-0.20231130100106-7462d91acefd/go.mod h1:Q8V1zbtPAlzYSr/Dvky3wS6x58IQAl3rot2me1oSO2Q=
 | 
			
		||||
git.coopcloud.tech/coop-cloud/godotenv v1.5.2-0.20231130100509-01bff8284355 h1:tCv2B4qoN6RMheKDnCzIafOkWS5BB1h7hwhmo+9bVeE=
 | 
			
		||||
git.coopcloud.tech/coop-cloud/godotenv v1.5.2-0.20231130100509-01bff8284355/go.mod h1:Q8V1zbtPAlzYSr/Dvky3wS6x58IQAl3rot2me1oSO2Q=
 | 
			
		||||
github.com/AdaLogics/go-fuzz-headers v0.0.0-20230106234847-43070de90fa1 h1:EKPd1INOIyr5hWOWhvpmQpY6tKjeG0hT1s3AMC/9fic=
 | 
			
		||||
github.com/AdaLogics/go-fuzz-headers v0.0.0-20230106234847-43070de90fa1/go.mod h1:VzwV+t+dZ9j/H867F1M2ziD+yLHtB46oM35FxxMJ4d0=
 | 
			
		||||
github.com/AlecAivazis/survey/v2 v2.3.7 h1:6I/u8FvytdGsgonrYsVn2t8t4QiRnh6QSTqkkhIiSjQ=
 | 
			
		||||
@ -1315,7 +1315,6 @@ golang.org/x/sys v0.2.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
 | 
			
		||||
golang.org/x/sys v0.3.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
 | 
			
		||||
golang.org/x/sys v0.5.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
 | 
			
		||||
golang.org/x/sys v0.6.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
 | 
			
		||||
golang.org/x/sys v0.13.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
 | 
			
		||||
golang.org/x/sys v0.14.0 h1:Vz7Qs629MkJkGyHxUlRHizWJRG2j8fbQKjELVSNhy7Q=
 | 
			
		||||
golang.org/x/sys v0.14.0/go.mod h1:/VUhepiaJMQUp4+oa/7Zr1D23ma6VTLIYjOOTFZPUcA=
 | 
			
		||||
golang.org/x/term v0.0.0-20201117132131-f5c789dd3221/go.mod h1:Nr5EML6q2oocZ2LXRh80K7BxOlk5/8JxuGnuhpl+muw=
 | 
			
		||||
 | 
			
		||||
@ -51,6 +51,20 @@ func RecipeNameComplete(c *cli.Context) {
 | 
			
		||||
	}
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// RecipeVersionComplete completes versions for the recipe.
 | 
			
		||||
func RecipeVersionComplete(recipeName string) {
 | 
			
		||||
	catl, err := recipe.ReadRecipeCatalogue(false)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		logrus.Warn(err)
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	for _, v := range catl[recipeName].Versions {
 | 
			
		||||
		for v2 := range v {
 | 
			
		||||
			fmt.Println(v2)
 | 
			
		||||
		}
 | 
			
		||||
	}
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// ServerNameComplete completes server names.
 | 
			
		||||
func ServerNameComplete(c *cli.Context) {
 | 
			
		||||
	files, err := config.LoadAppFiles("")
 | 
			
		||||
 | 
			
		||||
@ -50,34 +50,61 @@ type App struct {
 | 
			
		||||
	Path   string
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// StackName gets whatever the docker safe (uses the right delimiting
 | 
			
		||||
// character, e.g. "_") stack name is for the app. In general, you don't want
 | 
			
		||||
// to use this to show anything to end-users, you want use a.Name instead.
 | 
			
		||||
// See documentation of config.StackName
 | 
			
		||||
func (a App) StackName() string {
 | 
			
		||||
	if _, exists := a.Env["STACK_NAME"]; exists {
 | 
			
		||||
		return a.Env["STACK_NAME"]
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	stackName := SanitiseAppName(a.Name)
 | 
			
		||||
 | 
			
		||||
	if len(stackName) > 45 {
 | 
			
		||||
		logrus.Debugf("trimming %s to %s to avoid runtime limits", stackName, stackName[:45])
 | 
			
		||||
		stackName = stackName[:45]
 | 
			
		||||
	}
 | 
			
		||||
	stackName := StackName(a.Name)
 | 
			
		||||
 | 
			
		||||
	a.Env["STACK_NAME"] = stackName
 | 
			
		||||
 | 
			
		||||
	return stackName
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// Filters retrieves exact app filters for querying the container runtime. Due
 | 
			
		||||
// to upstream issues, filtering works different depending on what you're
 | 
			
		||||
// StackName gets whatever the docker safe (uses the right delimiting
 | 
			
		||||
// character, e.g. "_") stack name is for the app. In general, you don't want
 | 
			
		||||
// to use this to show anything to end-users, you want use a.Name instead.
 | 
			
		||||
func StackName(appName string) string {
 | 
			
		||||
	stackName := SanitiseAppName(appName)
 | 
			
		||||
 | 
			
		||||
	if len(stackName) > 45 {
 | 
			
		||||
		logrus.Debugf("trimming %s to %s to avoid runtime limits", stackName, stackName[:45])
 | 
			
		||||
		stackName = stackName[:45]
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	return stackName
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// Filters retrieves app filters for querying the container runtime. By default
 | 
			
		||||
// it filters on all services in the app. It is also possible to pass an
 | 
			
		||||
// otional list of service names, which get filtered instead.
 | 
			
		||||
//
 | 
			
		||||
// Due to upstream issues, filtering works different depending on what you're
 | 
			
		||||
// querying. So, for example, secrets don't work with regex! The caller needs
 | 
			
		||||
// to implement their own validation that the right secrets are matched. In
 | 
			
		||||
// order to handle these cases, we provide the `appendServiceNames` /
 | 
			
		||||
// `exactMatch` modifiers.
 | 
			
		||||
func (a App) Filters(appendServiceNames, exactMatch bool) (filters.Args, error) {
 | 
			
		||||
func (a App) Filters(appendServiceNames, exactMatch bool, services ...string) (filters.Args, error) {
 | 
			
		||||
	filters := filters.NewArgs()
 | 
			
		||||
	if len(services) > 0 {
 | 
			
		||||
		for _, serviceName := range services {
 | 
			
		||||
			filters.Add("name", ServiceFilter(a.StackName(), serviceName, exactMatch))
 | 
			
		||||
		}
 | 
			
		||||
		return filters, nil
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	// When not appending the service name, just add one filter for the whole
 | 
			
		||||
	// stack.
 | 
			
		||||
	if !appendServiceNames {
 | 
			
		||||
		f := fmt.Sprintf("%s", a.StackName())
 | 
			
		||||
		if exactMatch {
 | 
			
		||||
			f = fmt.Sprintf("^%s", f)
 | 
			
		||||
		}
 | 
			
		||||
		filters.Add("name", f)
 | 
			
		||||
		return filters, nil
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	composeFiles, err := GetComposeFiles(a.Recipe, a.Env)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
@ -91,28 +118,23 @@ func (a App) Filters(appendServiceNames, exactMatch bool) (filters.Args, error)
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	for _, service := range compose.Services {
 | 
			
		||||
		var filter string
 | 
			
		||||
 | 
			
		||||
		if appendServiceNames {
 | 
			
		||||
			if exactMatch {
 | 
			
		||||
				filter = fmt.Sprintf("^%s_%s", a.StackName(), service.Name)
 | 
			
		||||
			} else {
 | 
			
		||||
				filter = fmt.Sprintf("%s_%s", a.StackName(), service.Name)
 | 
			
		||||
			}
 | 
			
		||||
		} else {
 | 
			
		||||
			if exactMatch {
 | 
			
		||||
				filter = fmt.Sprintf("^%s", a.StackName())
 | 
			
		||||
			} else {
 | 
			
		||||
				filter = fmt.Sprintf("%s", a.StackName())
 | 
			
		||||
			}
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		filters.Add("name", filter)
 | 
			
		||||
		f := ServiceFilter(a.StackName(), service.Name, exactMatch)
 | 
			
		||||
		filters.Add("name", f)
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	return filters, nil
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// ServiceFilter creates a filter string for filtering a service in the docker
 | 
			
		||||
// container runtime. When exact match is true, it uses regex to match the
 | 
			
		||||
// string exactly.
 | 
			
		||||
func ServiceFilter(stack, service string, exact bool) string {
 | 
			
		||||
	if exact {
 | 
			
		||||
		return fmt.Sprintf("^%s_%s", stack, service)
 | 
			
		||||
	}
 | 
			
		||||
	return fmt.Sprintf("%s_%s", stack, service)
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// ByServer sort a slice of Apps
 | 
			
		||||
type ByServer []App
 | 
			
		||||
 | 
			
		||||
@ -333,7 +355,7 @@ func TemplateAppEnvSample(recipeName, appName, server, domain string) error {
 | 
			
		||||
		return fmt.Errorf("%s already exists?", appEnvPath)
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	err = ioutil.WriteFile(appEnvPath, envSample, 0664)
 | 
			
		||||
	err = ioutil.WriteFile(appEnvPath, envSample, 0o664)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		return err
 | 
			
		||||
	}
 | 
			
		||||
@ -595,7 +617,7 @@ func GetLabel(compose *composetypes.Config, stackName string, label string) stri
 | 
			
		||||
 | 
			
		||||
// GetTimeoutFromLabel reads the timeout value from docker label "coop-cloud.${STACK_NAME}.TIMEOUT" and returns 50 as default value
 | 
			
		||||
func GetTimeoutFromLabel(compose *composetypes.Config, stackName string) (int, error) {
 | 
			
		||||
	var timeout = 50 // Default Timeout
 | 
			
		||||
	timeout := 50 // Default Timeout
 | 
			
		||||
	var err error = nil
 | 
			
		||||
	if timeoutLabel := GetLabel(compose, stackName, "timeout"); timeoutLabel != "" {
 | 
			
		||||
		logrus.Debugf("timeout label: %s", timeoutLabel)
 | 
			
		||||
 | 
			
		||||
@ -1,12 +1,15 @@
 | 
			
		||||
package config_test
 | 
			
		||||
 | 
			
		||||
import (
 | 
			
		||||
	"encoding/json"
 | 
			
		||||
	"fmt"
 | 
			
		||||
	"reflect"
 | 
			
		||||
	"testing"
 | 
			
		||||
 | 
			
		||||
	"coopcloud.tech/abra/pkg/config"
 | 
			
		||||
	"coopcloud.tech/abra/pkg/recipe"
 | 
			
		||||
	"github.com/docker/docker/api/types/filters"
 | 
			
		||||
	"github.com/google/go-cmp/cmp"
 | 
			
		||||
	"github.com/stretchr/testify/assert"
 | 
			
		||||
)
 | 
			
		||||
 | 
			
		||||
@ -106,3 +109,89 @@ func TestGetComposeFilesError(t *testing.T) {
 | 
			
		||||
		}
 | 
			
		||||
	}
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func TestFilters(t *testing.T) {
 | 
			
		||||
	oldDir := config.RECIPES_DIR
 | 
			
		||||
	config.RECIPES_DIR = "./testdir"
 | 
			
		||||
	defer func() {
 | 
			
		||||
		config.RECIPES_DIR = oldDir
 | 
			
		||||
	}()
 | 
			
		||||
 | 
			
		||||
	app, err := config.NewApp(config.AppEnv{
 | 
			
		||||
		"DOMAIN": "test.example.com",
 | 
			
		||||
		"RECIPE": "test-recipe",
 | 
			
		||||
	}, "test_example_com", config.AppFile{
 | 
			
		||||
		Path:   "./testdir/filtertest.end",
 | 
			
		||||
		Server: "local",
 | 
			
		||||
	})
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		t.Fatal(err)
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	f, err := app.Filters(false, false)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		t.Error(err)
 | 
			
		||||
	}
 | 
			
		||||
	compareFilter(t, f, map[string]map[string]bool{
 | 
			
		||||
		"name": {
 | 
			
		||||
			"test_example_com": true,
 | 
			
		||||
		},
 | 
			
		||||
	})
 | 
			
		||||
 | 
			
		||||
	f2, err := app.Filters(false, true)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		t.Error(err)
 | 
			
		||||
	}
 | 
			
		||||
	compareFilter(t, f2, map[string]map[string]bool{
 | 
			
		||||
		"name": {
 | 
			
		||||
			"^test_example_com": true,
 | 
			
		||||
		},
 | 
			
		||||
	})
 | 
			
		||||
 | 
			
		||||
	f3, err := app.Filters(true, false)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		t.Error(err)
 | 
			
		||||
	}
 | 
			
		||||
	compareFilter(t, f3, map[string]map[string]bool{
 | 
			
		||||
		"name": {
 | 
			
		||||
			"test_example_com_bar": true,
 | 
			
		||||
			"test_example_com_foo": true,
 | 
			
		||||
		},
 | 
			
		||||
	})
 | 
			
		||||
 | 
			
		||||
	f4, err := app.Filters(true, true)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		t.Error(err)
 | 
			
		||||
	}
 | 
			
		||||
	compareFilter(t, f4, map[string]map[string]bool{
 | 
			
		||||
		"name": {
 | 
			
		||||
			"^test_example_com_bar": true,
 | 
			
		||||
			"^test_example_com_foo": true,
 | 
			
		||||
		},
 | 
			
		||||
	})
 | 
			
		||||
 | 
			
		||||
	f5, err := app.Filters(false, false, "foo")
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		t.Error(err)
 | 
			
		||||
	}
 | 
			
		||||
	compareFilter(t, f5, map[string]map[string]bool{
 | 
			
		||||
		"name": {
 | 
			
		||||
			"test_example_com_foo": true,
 | 
			
		||||
		},
 | 
			
		||||
	})
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func compareFilter(t *testing.T, f1 filters.Args, f2 map[string]map[string]bool) {
 | 
			
		||||
	t.Helper()
 | 
			
		||||
	j1, err := f1.MarshalJSON()
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		t.Error(err)
 | 
			
		||||
	}
 | 
			
		||||
	j2, err := json.Marshal(f2)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		t.Error(err)
 | 
			
		||||
	}
 | 
			
		||||
	if diff := cmp.Diff(string(j2), string(j1)); diff != "" {
 | 
			
		||||
		t.Errorf("filters mismatch (-want +got):\n%s", diff)
 | 
			
		||||
	}
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
@ -36,6 +36,8 @@ var REPOS_BASE_URL = "https://git.coopcloud.tech/coop-cloud"
 | 
			
		||||
var CATALOGUE_JSON_REPO_NAME = "recipes-catalogue-json"
 | 
			
		||||
var SSH_URL_TEMPLATE = "ssh://git@git.coopcloud.tech:2222/coop-cloud/%s.git"
 | 
			
		||||
 | 
			
		||||
var BackupbotLabel = "coop-cloud.backupbot.enabled"
 | 
			
		||||
 | 
			
		||||
// envVarModifiers is a list of env var modifier strings. These are added to
 | 
			
		||||
// env vars as comments and modify their processing by Abra, e.g. determining
 | 
			
		||||
// how long secrets should be.
 | 
			
		||||
 | 
			
		||||
							
								
								
									
										2
									
								
								pkg/config/testdir/filtertest.env
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										2
									
								
								pkg/config/testdir/filtertest.env
									
									
									
									
									
										Normal file
									
								
							@ -0,0 +1,2 @@
 | 
			
		||||
RECIPE=test-recipe
 | 
			
		||||
DOMAIN=test.example.com
 | 
			
		||||
							
								
								
									
										6
									
								
								pkg/config/testdir/test-recipe/compose.yml
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										6
									
								
								pkg/config/testdir/test-recipe/compose.yml
									
									
									
									
									
										Normal file
									
								
							@ -0,0 +1,6 @@
 | 
			
		||||
version: "3.8"
 | 
			
		||||
services:
 | 
			
		||||
  foo:
 | 
			
		||||
    image: debian
 | 
			
		||||
  bar:
 | 
			
		||||
    image: debian
 | 
			
		||||
@ -28,7 +28,7 @@ func GetContainer(c context.Context, cl *client.Client, filters filters.Args, no
 | 
			
		||||
		return types.Container{}, fmt.Errorf("no containers matching the %v filter found?", filter)
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	if len(containers) != 1 {
 | 
			
		||||
	if len(containers) > 1 {
 | 
			
		||||
		var containersRaw []string
 | 
			
		||||
		for _, container := range containers {
 | 
			
		||||
			containerName := strings.Join(container.Names, " ")
 | 
			
		||||
 | 
			
		||||
							
								
								
									
										27
									
								
								pkg/git/add.go
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										27
									
								
								pkg/git/add.go
									
									
									
									
									
										Normal file
									
								
							@ -0,0 +1,27 @@
 | 
			
		||||
package git
 | 
			
		||||
 | 
			
		||||
import (
 | 
			
		||||
	"github.com/go-git/go-git/v5"
 | 
			
		||||
	"github.com/sirupsen/logrus"
 | 
			
		||||
)
 | 
			
		||||
 | 
			
		||||
// Add adds a file to the git index.
 | 
			
		||||
func Add(repoPath, path string, dryRun bool) error {
 | 
			
		||||
	repo, err := git.PlainOpen(repoPath)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		return err
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	worktree, err := repo.Worktree()
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		return err
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	if dryRun {
 | 
			
		||||
		logrus.Debugf("dry run: adding %s", path)
 | 
			
		||||
	} else {
 | 
			
		||||
		worktree.Add(path)
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	return nil
 | 
			
		||||
}
 | 
			
		||||
@ -1,35 +1,41 @@
 | 
			
		||||
package git
 | 
			
		||||
 | 
			
		||||
import (
 | 
			
		||||
	"fmt"
 | 
			
		||||
 | 
			
		||||
	"github.com/go-git/go-git/v5"
 | 
			
		||||
	gitPkg "github.com/go-git/go-git/v5"
 | 
			
		||||
	"github.com/go-git/go-git/v5/plumbing/object"
 | 
			
		||||
	"github.com/sirupsen/logrus"
 | 
			
		||||
)
 | 
			
		||||
 | 
			
		||||
// Init inits a new repo and commits all the stuff if you want
 | 
			
		||||
func Init(repoPath string, commit bool) error {
 | 
			
		||||
	if _, err := gitPkg.PlainInit(repoPath, false); err != nil {
 | 
			
		||||
		logrus.Fatal(err)
 | 
			
		||||
func Init(repoPath string, commit bool, gitName, gitEmail string) error {
 | 
			
		||||
	if _, err := git.PlainInit(repoPath, false); err != nil {
 | 
			
		||||
		return fmt.Errorf("git init: %s", err)
 | 
			
		||||
	}
 | 
			
		||||
	logrus.Debugf("initialised new git repo in %s", repoPath)
 | 
			
		||||
 | 
			
		||||
	if commit {
 | 
			
		||||
		commitRepo, err := git.PlainOpen(repoPath)
 | 
			
		||||
		if err != nil {
 | 
			
		||||
			logrus.Fatal(err)
 | 
			
		||||
			return fmt.Errorf("git open: %s", err)
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		commitWorktree, err := commitRepo.Worktree()
 | 
			
		||||
		if err != nil {
 | 
			
		||||
			logrus.Fatal(err)
 | 
			
		||||
			return fmt.Errorf("git worktree: %s", err)
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		if err := commitWorktree.AddWithOptions(&git.AddOptions{All: true}); err != nil {
 | 
			
		||||
			return err
 | 
			
		||||
			return fmt.Errorf("git add: %s", err)
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		if _, err = commitWorktree.Commit("init", &git.CommitOptions{}); err != nil {
 | 
			
		||||
			return err
 | 
			
		||||
		var author *object.Signature
 | 
			
		||||
		if gitName != "" && gitEmail != "" {
 | 
			
		||||
			author = &object.Signature{Name: gitName, Email: gitEmail}
 | 
			
		||||
		}
 | 
			
		||||
		if _, err = commitWorktree.Commit("init", &git.CommitOptions{Author: author}); err != nil {
 | 
			
		||||
			return fmt.Errorf("git commit: %s", err)
 | 
			
		||||
		}
 | 
			
		||||
		logrus.Debugf("init committed all files for new git repo in %s", repoPath)
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
@ -264,6 +264,20 @@ func (r Recipe) SampleEnv() (map[string]string, error) {
 | 
			
		||||
	return sampleEnv, nil
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// Ensure makes sure the recipe exists, is up to date and has the latest version checked out.
 | 
			
		||||
func Ensure(recipeName string) error {
 | 
			
		||||
	if err := EnsureExists(recipeName); err != nil {
 | 
			
		||||
		return err
 | 
			
		||||
	}
 | 
			
		||||
	if err := EnsureUpToDate(recipeName); err != nil {
 | 
			
		||||
		return err
 | 
			
		||||
	}
 | 
			
		||||
	if err := EnsureLatest(recipeName); err != nil {
 | 
			
		||||
		return err
 | 
			
		||||
	}
 | 
			
		||||
	return nil
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// EnsureExists ensures that a recipe is locally cloned
 | 
			
		||||
func EnsureExists(recipeName string) error {
 | 
			
		||||
	recipeDir := path.Join(config.RECIPES_DIR, recipeName)
 | 
			
		||||
 | 
			
		||||
@ -21,11 +21,24 @@ import (
 | 
			
		||||
	"github.com/sirupsen/logrus"
 | 
			
		||||
)
 | 
			
		||||
 | 
			
		||||
// SecretValue represents a parsed `SECRET_FOO=v1 # length=bar` env var config
 | 
			
		||||
// secret definition.
 | 
			
		||||
type SecretValue struct {
 | 
			
		||||
// Secret represents a secret.
 | 
			
		||||
type Secret struct {
 | 
			
		||||
	// Version comes from the secret version environment variable.
 | 
			
		||||
	// For example:
 | 
			
		||||
	//  SECRET_FOO=v1
 | 
			
		||||
	Version string
 | 
			
		||||
	Length  int
 | 
			
		||||
	// Length comes from the length modifier at the secret version environment
 | 
			
		||||
	// variable. For Example:
 | 
			
		||||
	//   SECRET_FOO=v1 # length=12
 | 
			
		||||
	Length int
 | 
			
		||||
	// RemoteName is the name of the secret on the server. For example:
 | 
			
		||||
	//   name: ${STACK_NAME}_test_pass_two_${SECRET_TEST_PASS_TWO_VERSION}
 | 
			
		||||
	// With the following:
 | 
			
		||||
	//   STACK_NAME=test_example_com
 | 
			
		||||
	//   SECRET_TEST_PASS_TWO_VERSION=v2
 | 
			
		||||
	// Will have this remote name:
 | 
			
		||||
	//   test_example_com_test_pass_two_v2
 | 
			
		||||
	RemoteName string
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// GeneratePasswords generates passwords.
 | 
			
		||||
@ -67,17 +80,20 @@ func GeneratePassphrases(count uint) ([]string, error) {
 | 
			
		||||
// and some times you don't (as the caller). We need to be able to handle the
 | 
			
		||||
// "app new" case where we pass in the .env.sample and the "secret generate"
 | 
			
		||||
// case where the app is created.
 | 
			
		||||
func ReadSecretsConfig(appEnvPath string, composeFiles []string, recipeName string) (map[string]SecretValue, error) {
 | 
			
		||||
func ReadSecretsConfig(appEnvPath string, composeFiles []string, stackName string) (map[string]Secret, error) {
 | 
			
		||||
	appEnv, appModifiers, err := config.ReadEnvWithModifiers(appEnvPath)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		return nil, err
 | 
			
		||||
	}
 | 
			
		||||
	// Set the STACK_NAME to be able to generate the remote name correctly.
 | 
			
		||||
	appEnv["STACK_NAME"] = stackName
 | 
			
		||||
 | 
			
		||||
	opts := stack.Deploy{Composefiles: composeFiles}
 | 
			
		||||
	config, err := loader.LoadComposefile(opts, appEnv)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		return nil, err
 | 
			
		||||
	}
 | 
			
		||||
	// Read the compose files without injecting environment variables.
 | 
			
		||||
	configWithoutEnv, err := loader.LoadComposefile(opts, map[string]string{}, loader.SkipInterpolation)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		return nil, err
 | 
			
		||||
@ -95,7 +111,7 @@ func ReadSecretsConfig(appEnvPath string, composeFiles []string, recipeName stri
 | 
			
		||||
		return nil, nil
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	secretValues := map[string]SecretValue{}
 | 
			
		||||
	secretValues := map[string]Secret{}
 | 
			
		||||
	for secretId, secretConfig := range config.Secrets {
 | 
			
		||||
		if string(secretConfig.Name[len(secretConfig.Name)-1]) == "_" {
 | 
			
		||||
			return nil, fmt.Errorf("missing version for secret? (%s)", secretId)
 | 
			
		||||
@ -108,15 +124,19 @@ func ReadSecretsConfig(appEnvPath string, composeFiles []string, recipeName stri
 | 
			
		||||
 | 
			
		||||
		lastIdx := strings.LastIndex(secretConfig.Name, "_")
 | 
			
		||||
		secretVersion := secretConfig.Name[lastIdx+1:]
 | 
			
		||||
		value := SecretValue{Version: secretVersion}
 | 
			
		||||
		value := Secret{Version: secretVersion, RemoteName: secretConfig.Name}
 | 
			
		||||
 | 
			
		||||
		// Check if the length modifier is set for this secret.
 | 
			
		||||
		for k, v := range appModifiers {
 | 
			
		||||
		for envName, modifierValues := range appModifiers {
 | 
			
		||||
			// configWithoutEnv contains the raw name as defined in the compose.yaml
 | 
			
		||||
			if !strings.Contains(configWithoutEnv.Secrets[secretId].Name, k) {
 | 
			
		||||
			// The name will look something like this:
 | 
			
		||||
			//   name: ${STACK_NAME}_test_pass_two_${SECRET_TEST_PASS_TWO_VERSION}
 | 
			
		||||
			// To check if the current modifier is for the current secret we check
 | 
			
		||||
			// if the raw name contains the env name (e.g. SECRET_TEST_PASS_TWO_VERSION).
 | 
			
		||||
			if !strings.Contains(configWithoutEnv.Secrets[secretId].Name, envName) {
 | 
			
		||||
				continue
 | 
			
		||||
			}
 | 
			
		||||
			lengthRaw, ok := v["length"]
 | 
			
		||||
			lengthRaw, ok := modifierValues["length"]
 | 
			
		||||
			if ok {
 | 
			
		||||
				length, err := strconv.Atoi(lengthRaw)
 | 
			
		||||
				if err != nil {
 | 
			
		||||
@ -133,7 +153,7 @@ func ReadSecretsConfig(appEnvPath string, composeFiles []string, recipeName stri
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// GenerateSecrets generates secrets locally and sends them to a remote server for storage.
 | 
			
		||||
func GenerateSecrets(cl *dockerClient.Client, secrets map[string]SecretValue, appName, server string) (map[string]string, error) {
 | 
			
		||||
func GenerateSecrets(cl *dockerClient.Client, secrets map[string]Secret, server string) (map[string]string, error) {
 | 
			
		||||
	secretsGenerated := map[string]string{}
 | 
			
		||||
	var mutex sync.Mutex
 | 
			
		||||
	var wg sync.WaitGroup
 | 
			
		||||
@ -141,11 +161,10 @@ func GenerateSecrets(cl *dockerClient.Client, secrets map[string]SecretValue, ap
 | 
			
		||||
	for n, v := range secrets {
 | 
			
		||||
		wg.Add(1)
 | 
			
		||||
 | 
			
		||||
		go func(secretName string, secret SecretValue) {
 | 
			
		||||
		go func(secretName string, secret Secret) {
 | 
			
		||||
			defer wg.Done()
 | 
			
		||||
 | 
			
		||||
			secretRemoteName := fmt.Sprintf("%s_%s_%s", appName, secretName, secret.Version)
 | 
			
		||||
			logrus.Debugf("attempting to generate and store %s on %s", secretRemoteName, server)
 | 
			
		||||
			logrus.Debugf("attempting to generate and store %s on %s", secret.RemoteName, server)
 | 
			
		||||
 | 
			
		||||
			if secret.Length > 0 {
 | 
			
		||||
				passwords, err := GeneratePasswords(1, uint(secret.Length))
 | 
			
		||||
@ -154,9 +173,9 @@ func GenerateSecrets(cl *dockerClient.Client, secrets map[string]SecretValue, ap
 | 
			
		||||
					return
 | 
			
		||||
				}
 | 
			
		||||
 | 
			
		||||
				if err := client.StoreSecret(cl, secretRemoteName, passwords[0], server); err != nil {
 | 
			
		||||
				if err := client.StoreSecret(cl, secret.RemoteName, passwords[0], server); err != nil {
 | 
			
		||||
					if strings.Contains(err.Error(), "AlreadyExists") {
 | 
			
		||||
						logrus.Warnf("%s already exists, moving on...", secretRemoteName)
 | 
			
		||||
						logrus.Warnf("%s already exists, moving on...", secret.RemoteName)
 | 
			
		||||
						ch <- nil
 | 
			
		||||
					} else {
 | 
			
		||||
						ch <- err
 | 
			
		||||
@ -174,9 +193,9 @@ func GenerateSecrets(cl *dockerClient.Client, secrets map[string]SecretValue, ap
 | 
			
		||||
					return
 | 
			
		||||
				}
 | 
			
		||||
 | 
			
		||||
				if err := client.StoreSecret(cl, secretRemoteName, passphrases[0], server); err != nil {
 | 
			
		||||
				if err := client.StoreSecret(cl, secret.RemoteName, passphrases[0], server); err != nil {
 | 
			
		||||
					if strings.Contains(err.Error(), "AlreadyExists") {
 | 
			
		||||
						logrus.Warnf("%s already exists, moving on...", secretRemoteName)
 | 
			
		||||
						logrus.Warnf("%s already exists, moving on...", secret.RemoteName)
 | 
			
		||||
						ch <- nil
 | 
			
		||||
					} else {
 | 
			
		||||
						ch <- err
 | 
			
		||||
@ -225,7 +244,7 @@ func PollSecretsStatus(cl *dockerClient.Client, app config.App) (secretStatuses,
 | 
			
		||||
		return secStats, err
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	secretsConfig, err := ReadSecretsConfig(app.Path, composeFiles, app.Recipe)
 | 
			
		||||
	secretsConfig, err := ReadSecretsConfig(app.Path, composeFiles, app.StackName())
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		return secStats, err
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
@ -1,42 +1,30 @@
 | 
			
		||||
package secret
 | 
			
		||||
 | 
			
		||||
import (
 | 
			
		||||
	"path"
 | 
			
		||||
	"testing"
 | 
			
		||||
 | 
			
		||||
	"coopcloud.tech/abra/pkg/config"
 | 
			
		||||
	"coopcloud.tech/abra/pkg/recipe"
 | 
			
		||||
	"coopcloud.tech/abra/pkg/upstream/stack"
 | 
			
		||||
	loader "coopcloud.tech/abra/pkg/upstream/stack"
 | 
			
		||||
	"github.com/stretchr/testify/assert"
 | 
			
		||||
)
 | 
			
		||||
 | 
			
		||||
func TestReadSecretsConfig(t *testing.T) {
 | 
			
		||||
	offline := true
 | 
			
		||||
	recipe, err := recipe.Get("matrix-synapse", offline)
 | 
			
		||||
	composeFiles := []string{"./testdir/compose.yaml"}
 | 
			
		||||
	secretsFromConfig, err := ReadSecretsConfig("./testdir/.env.sample", composeFiles, "test_example_com")
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		t.Fatal(err)
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	sampleEnv, err := recipe.SampleEnv()
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		t.Fatal(err)
 | 
			
		||||
	}
 | 
			
		||||
	// Simple secret
 | 
			
		||||
	assert.Equal(t, "test_example_com_test_pass_one_v2", secretsFromConfig["test_pass_one"].RemoteName)
 | 
			
		||||
	assert.Equal(t, "v2", secretsFromConfig["test_pass_one"].Version)
 | 
			
		||||
	assert.Equal(t, 0, secretsFromConfig["test_pass_one"].Length)
 | 
			
		||||
 | 
			
		||||
	composeFiles := []string{path.Join(config.RECIPES_DIR, recipe.Name, "compose.yml")}
 | 
			
		||||
	envSamplePath := path.Join(config.RECIPES_DIR, recipe.Name, ".env.sample")
 | 
			
		||||
	secretsFromConfig, err := ReadSecretsConfig(envSamplePath, composeFiles, recipe.Name)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		t.Fatal(err)
 | 
			
		||||
	}
 | 
			
		||||
	// Has a length modifier
 | 
			
		||||
	assert.Equal(t, "test_example_com_test_pass_two_v1", secretsFromConfig["test_pass_two"].RemoteName)
 | 
			
		||||
	assert.Equal(t, "v1", secretsFromConfig["test_pass_two"].Version)
 | 
			
		||||
	assert.Equal(t, 10, secretsFromConfig["test_pass_two"].Length)
 | 
			
		||||
 | 
			
		||||
	opts := stack.Deploy{Composefiles: composeFiles}
 | 
			
		||||
	config, err := loader.LoadComposefile(opts, sampleEnv)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		t.Fatal(err)
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	for secretId := range config.Secrets {
 | 
			
		||||
		assert.Contains(t, secretsFromConfig, secretId)
 | 
			
		||||
	}
 | 
			
		||||
	// Secret name does not include the secret id
 | 
			
		||||
	assert.Equal(t, "test_example_com_pass_three_v2", secretsFromConfig["test_pass_three"].RemoteName)
 | 
			
		||||
	assert.Equal(t, "v2", secretsFromConfig["test_pass_three"].Version)
 | 
			
		||||
	assert.Equal(t, 0, secretsFromConfig["test_pass_three"].Length)
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
							
								
								
									
										3
									
								
								pkg/secret/testdir/.env.sample
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										3
									
								
								pkg/secret/testdir/.env.sample
									
									
									
									
									
										Normal file
									
								
							@ -0,0 +1,3 @@
 | 
			
		||||
SECRET_TEST_PASS_ONE_VERSION=v2
 | 
			
		||||
SECRET_TEST_PASS_TWO_VERSION=v1 # length=10
 | 
			
		||||
SECRET_TEST_PASS_THREE_VERSION=v2
 | 
			
		||||
							
								
								
									
										21
									
								
								pkg/secret/testdir/compose.yaml
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										21
									
								
								pkg/secret/testdir/compose.yaml
									
									
									
									
									
										Normal file
									
								
							@ -0,0 +1,21 @@
 | 
			
		||||
---
 | 
			
		||||
version: "3.8"
 | 
			
		||||
 | 
			
		||||
services:
 | 
			
		||||
  app:
 | 
			
		||||
    image: nginx:1.21.0
 | 
			
		||||
    secrets:
 | 
			
		||||
      - test_pass_one
 | 
			
		||||
      - test_pass_two
 | 
			
		||||
      - test_pass_three
 | 
			
		||||
 | 
			
		||||
secrets:
 | 
			
		||||
  test_pass_one:
 | 
			
		||||
    external: true
 | 
			
		||||
    name: ${STACK_NAME}_test_pass_one_${SECRET_TEST_PASS_ONE_VERSION}  # should be removed
 | 
			
		||||
  test_pass_two:
 | 
			
		||||
    external: true
 | 
			
		||||
    name: ${STACK_NAME}_test_pass_two_${SECRET_TEST_PASS_TWO_VERSION}
 | 
			
		||||
  test_pass_three:
 | 
			
		||||
    external: true
 | 
			
		||||
    name: ${STACK_NAME}_pass_three_${SECRET_TEST_PASS_THREE_VERSION} # secretId and name don't match
 | 
			
		||||
@ -14,6 +14,70 @@ import (
 | 
			
		||||
	"github.com/sirupsen/logrus"
 | 
			
		||||
)
 | 
			
		||||
 | 
			
		||||
// GetService retrieves a service container based on a label. If prompt is true
 | 
			
		||||
// and the retrievd count of service containers does not match 1, then a prompt
 | 
			
		||||
// is presented to let the user choose. An error is returned when no service is
 | 
			
		||||
// found.
 | 
			
		||||
func GetServiceByLabel(c context.Context, cl *client.Client, label string, prompt bool) (swarm.Service, error) {
 | 
			
		||||
	services, err := cl.ServiceList(c, types.ServiceListOptions{})
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		return swarm.Service{}, err
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	if len(services) == 0 {
 | 
			
		||||
		return swarm.Service{}, fmt.Errorf("no services deployed?")
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	var matchingServices []swarm.Service
 | 
			
		||||
	for _, service := range services {
 | 
			
		||||
		if enabled, exists := service.Spec.Labels[label]; exists && enabled == "true" {
 | 
			
		||||
			matchingServices = append(matchingServices, service)
 | 
			
		||||
		}
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	if len(matchingServices) == 0 {
 | 
			
		||||
		return swarm.Service{}, fmt.Errorf("no services deployed matching label '%s'?", label)
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	if len(matchingServices) > 1 {
 | 
			
		||||
		var servicesRaw []string
 | 
			
		||||
		for _, service := range matchingServices {
 | 
			
		||||
			serviceName := service.Spec.Name
 | 
			
		||||
			created := formatter.HumanDuration(service.CreatedAt.Unix())
 | 
			
		||||
			servicesRaw = append(servicesRaw, fmt.Sprintf("%s (created %v)", serviceName, created))
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		if !prompt {
 | 
			
		||||
			err := fmt.Errorf("expected 1 service but found %v: %s", len(matchingServices), strings.Join(servicesRaw, " "))
 | 
			
		||||
			return swarm.Service{}, err
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		logrus.Warnf("ambiguous service list received, prompting for input")
 | 
			
		||||
 | 
			
		||||
		var response string
 | 
			
		||||
		prompt := &survey.Select{
 | 
			
		||||
			Message: "which service are you looking for?",
 | 
			
		||||
			Options: servicesRaw,
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		if err := survey.AskOne(prompt, &response); err != nil {
 | 
			
		||||
			return swarm.Service{}, err
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		chosenService := strings.TrimSpace(strings.Split(response, " ")[0])
 | 
			
		||||
		for _, service := range matchingServices {
 | 
			
		||||
			serviceName := strings.ToLower(service.Spec.Name)
 | 
			
		||||
			if serviceName == chosenService {
 | 
			
		||||
				return service, nil
 | 
			
		||||
			}
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		logrus.Panic("failed to match chosen service")
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	return matchingServices[0], nil
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// GetService retrieves a service container. If prompt is true and the retrievd
 | 
			
		||||
// count of service containers does not match 1, then a prompt is presented to
 | 
			
		||||
// let the user choose. A count of 0 is handled gracefully.
 | 
			
		||||
 | 
			
		||||
@ -13,7 +13,10 @@ import (
 | 
			
		||||
	"github.com/sirupsen/logrus"
 | 
			
		||||
)
 | 
			
		||||
 | 
			
		||||
func RunExec(dockerCli command.Cli, client *apiclient.Client, containerID string, execConfig *types.ExecConfig) error {
 | 
			
		||||
// RunExec runs a command on a remote container. io.Writer corresponds to the
 | 
			
		||||
// command output.
 | 
			
		||||
func RunExec(dockerCli command.Cli, client *apiclient.Client, containerID string,
 | 
			
		||||
	execConfig *types.ExecConfig) (io.Writer, error) {
 | 
			
		||||
	ctx := context.Background()
 | 
			
		||||
 | 
			
		||||
	// We need to check the tty _before_ we do the ContainerExecCreate, because
 | 
			
		||||
@ -21,22 +24,22 @@ func RunExec(dockerCli command.Cli, client *apiclient.Client, containerID string
 | 
			
		||||
	// there's no easy way to clean those up). But also in order to make "not
 | 
			
		||||
	// exist" errors take precedence we do a dummy inspect first.
 | 
			
		||||
	if _, err := client.ContainerInspect(ctx, containerID); err != nil {
 | 
			
		||||
		return err
 | 
			
		||||
		return nil, err
 | 
			
		||||
	}
 | 
			
		||||
	if !execConfig.Detach {
 | 
			
		||||
		if err := dockerCli.In().CheckTty(execConfig.AttachStdin, execConfig.Tty); err != nil {
 | 
			
		||||
			return err
 | 
			
		||||
			return nil, err
 | 
			
		||||
		}
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	response, err := client.ContainerExecCreate(ctx, containerID, *execConfig)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		return err
 | 
			
		||||
		return nil, err
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	execID := response.ID
 | 
			
		||||
	if execID == "" {
 | 
			
		||||
		return errors.New("exec ID empty")
 | 
			
		||||
		return nil, errors.New("exec ID empty")
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	if execConfig.Detach {
 | 
			
		||||
@ -44,13 +47,13 @@ func RunExec(dockerCli command.Cli, client *apiclient.Client, containerID string
 | 
			
		||||
			Detach: execConfig.Detach,
 | 
			
		||||
			Tty:    execConfig.Tty,
 | 
			
		||||
		}
 | 
			
		||||
		return client.ContainerExecStart(ctx, execID, execStartCheck)
 | 
			
		||||
		return nil, client.ContainerExecStart(ctx, execID, execStartCheck)
 | 
			
		||||
	}
 | 
			
		||||
	return interactiveExec(ctx, dockerCli, client, execConfig, execID)
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func interactiveExec(ctx context.Context, dockerCli command.Cli, client *apiclient.Client,
 | 
			
		||||
	execConfig *types.ExecConfig, execID string) error {
 | 
			
		||||
	execConfig *types.ExecConfig, execID string) (io.Writer, error) {
 | 
			
		||||
	// Interactive exec requested.
 | 
			
		||||
	var (
 | 
			
		||||
		out, stderr io.Writer
 | 
			
		||||
@ -76,7 +79,7 @@ func interactiveExec(ctx context.Context, dockerCli command.Cli, client *apiclie
 | 
			
		||||
	}
 | 
			
		||||
	resp, err := client.ContainerExecAttach(ctx, execID, execStartCheck)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		return err
 | 
			
		||||
		return out, err
 | 
			
		||||
	}
 | 
			
		||||
	defer resp.Close()
 | 
			
		||||
 | 
			
		||||
@ -107,10 +110,10 @@ func interactiveExec(ctx context.Context, dockerCli command.Cli, client *apiclie
 | 
			
		||||
 | 
			
		||||
	if err := <-errCh; err != nil {
 | 
			
		||||
		logrus.Debugf("Error hijack: %s", err)
 | 
			
		||||
		return err
 | 
			
		||||
		return out, err
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	return getExecExitStatus(ctx, client, execID)
 | 
			
		||||
	return out, getExecExitStatus(ctx, client, execID)
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func getExecExitStatus(ctx context.Context, client apiclient.ContainerAPIClient, execID string) error {
 | 
			
		||||
 | 
			
		||||
@ -65,17 +65,19 @@ function install_abra_release {
 | 
			
		||||
 | 
			
		||||
  checksums=$(wget -q -O- $checksums_url)
 | 
			
		||||
  checksum=$(echo "$checksums" | grep "$FILENAME" - | sed -En 's/([0-9a-f]{64})\s+'"$FILENAME"'.*/\1/p')
 | 
			
		||||
  abra_download="/tmp/abra-download"
 | 
			
		||||
 | 
			
		||||
  echo "downloading $ABRA_VERSION $PLATFORM binary release for abra..."
 | 
			
		||||
  wget -q "$release_url" -O "$HOME/.local/bin/.abra-download"
 | 
			
		||||
  localsum=$(sha256sum $HOME/.local/bin/.abra-download | sed -En 's/([0-9a-f]{64})\s+.*/\1/p')
 | 
			
		||||
 | 
			
		||||
  wget -q "$release_url" -O $abra_download 
 | 
			
		||||
  localsum=$(sha256sum $abra_download | sed -En 's/([0-9a-f]{64})\s+.*/\1/p')
 | 
			
		||||
  echo "checking if checksums match..."
 | 
			
		||||
  if [[ "$localsum" != "$checksum" ]]; then
 | 
			
		||||
      print_checksum_error
 | 
			
		||||
      exit 1
 | 
			
		||||
  fi
 | 
			
		||||
  echo "$(tput setaf 2)check successful!$(tput sgr0)"
 | 
			
		||||
  mv "$HOME/.local/bin/.abra-download" "$HOME/.local/bin/abra"
 | 
			
		||||
  mv "$abra_download" "$HOME/.local/bin/abra"
 | 
			
		||||
  chmod +x "$HOME/.local/bin/abra"
 | 
			
		||||
 | 
			
		||||
  x=$(echo $PATH | grep $HOME/.local/bin)
 | 
			
		||||
 | 
			
		||||
@ -19,31 +19,6 @@ setup(){
 | 
			
		||||
  _common_setup
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
_mkfile() {
 | 
			
		||||
  run bash -c "echo $2 > $1"
 | 
			
		||||
  assert_success
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
_mkfile_remote() {
 | 
			
		||||
  run $ABRA app run "$TEST_APP_DOMAIN" app "bash -c \"echo $2 > $1\""
 | 
			
		||||
  assert_success
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
_mkdir() {
 | 
			
		||||
  run bash -c "mkdir -p $1"
 | 
			
		||||
  assert_success
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
_rm() {
 | 
			
		||||
  run rm -rf "$1"
 | 
			
		||||
  assert_success
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
_rm_remote() {
 | 
			
		||||
  run "$ABRA" app run "$TEST_APP_DOMAIN" app rm -rf "$1"
 | 
			
		||||
  assert_success
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
@test "validate app argument" {
 | 
			
		||||
  run $ABRA app cp
 | 
			
		||||
  assert_failure
 | 
			
		||||
 | 
			
		||||
@ -18,9 +18,24 @@ setup(){
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
teardown(){
 | 
			
		||||
  load "$PWD/tests/integration/helpers/common"
 | 
			
		||||
  _rm_app
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
@test "autocomplete" {
 | 
			
		||||
  run $ABRA app new --generate-bash-completion
 | 
			
		||||
  assert_success
 | 
			
		||||
  assert_output --partial "traefik"
 | 
			
		||||
  assert_output --partial "abra-test-recipe"
 | 
			
		||||
 | 
			
		||||
  # Note: this test needs to be updated when a new version of the test recipe is published.
 | 
			
		||||
  run $ABRA app new abra-test-recipe --generate-bash-completion
 | 
			
		||||
  assert_success
 | 
			
		||||
  assert_output "0.1.0+1.20.0
 | 
			
		||||
0.1.1+1.20.2
 | 
			
		||||
0.2.0+1.21.0"
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
@test "create new app" {
 | 
			
		||||
  run $ABRA app new "$TEST_RECIPE" \
 | 
			
		||||
    --no-input \
 | 
			
		||||
@ -28,10 +43,29 @@ teardown(){
 | 
			
		||||
    --domain "$TEST_APP_DOMAIN"
 | 
			
		||||
  assert_success
 | 
			
		||||
  assert_exists "$ABRA_DIR/servers/$TEST_SERVER/$TEST_APP_DOMAIN.env"
 | 
			
		||||
 | 
			
		||||
  run git -C "$ABRA_DIR/recipes/$TEST_RECIPE" status
 | 
			
		||||
  assert_output --partial "Your branch is up to date with 'origin/main'."
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
@test "create new app with version" {
 | 
			
		||||
  run $ABRA app new "$TEST_RECIPE" 0.1.1+1.20.2 \
 | 
			
		||||
    --no-input \
 | 
			
		||||
    --server "$TEST_SERVER" \
 | 
			
		||||
    --domain "$TEST_APP_DOMAIN"
 | 
			
		||||
  assert_success
 | 
			
		||||
  assert_exists "$ABRA_DIR/servers/$TEST_SERVER/$TEST_APP_DOMAIN.env"
 | 
			
		||||
 | 
			
		||||
  run git -C "$ABRA_DIR/recipes/$TEST_RECIPE" log -1
 | 
			
		||||
  assert_output --partial "453db7121c0a56a7a8f15378f18fe3bf21ccfdef"
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
@test "does not overwrite existing env files" {
 | 
			
		||||
  _new_app
 | 
			
		||||
  run $ABRA app new "$TEST_RECIPE" \
 | 
			
		||||
    --no-input \
 | 
			
		||||
    --server "$TEST_SERVER" \
 | 
			
		||||
    --domain "$TEST_APP_DOMAIN"
 | 
			
		||||
  assert_success
 | 
			
		||||
 | 
			
		||||
  run $ABRA app new "$TEST_RECIPE" \
 | 
			
		||||
    --no-input \
 | 
			
		||||
@ -74,8 +108,7 @@ teardown(){
 | 
			
		||||
    --no-input \
 | 
			
		||||
    --chaos \
 | 
			
		||||
    --server "$TEST_SERVER" \
 | 
			
		||||
    --domain "$TEST_APP_DOMAIN" \
 | 
			
		||||
    --secrets
 | 
			
		||||
    --domain "$TEST_APP_DOMAIN"
 | 
			
		||||
  assert_success
 | 
			
		||||
  assert_exists "$ABRA_DIR/servers/$TEST_SERVER/$TEST_APP_DOMAIN.env"
 | 
			
		||||
 | 
			
		||||
@ -88,18 +121,17 @@ teardown(){
 | 
			
		||||
  assert_success
 | 
			
		||||
 | 
			
		||||
  run git -C "$ABRA_DIR/recipes/$TEST_RECIPE" status
 | 
			
		||||
  assert_output --partial 'behind 3'
 | 
			
		||||
  assert_output --partial "Your branch is behind 'origin/main' by 3 commits, and can be fast-forwarded."
 | 
			
		||||
 | 
			
		||||
  run $ABRA app new "$TEST_RECIPE" \
 | 
			
		||||
    --no-input \
 | 
			
		||||
    --server "$TEST_SERVER" \
 | 
			
		||||
    --domain "$TEST_APP_DOMAIN" \
 | 
			
		||||
    --secrets
 | 
			
		||||
    --domain "$TEST_APP_DOMAIN"
 | 
			
		||||
  assert_success
 | 
			
		||||
  assert_exists "$ABRA_DIR/servers/$TEST_SERVER/$TEST_APP_DOMAIN.env"
 | 
			
		||||
 | 
			
		||||
  run git -C "$ABRA_DIR/recipes/$TEST_RECIPE" status
 | 
			
		||||
  refute_output --partial 'behind 3'
 | 
			
		||||
  assert_output --partial "Your branch is up to date with 'origin/main'."
 | 
			
		||||
 | 
			
		||||
  _reset_recipe
 | 
			
		||||
}
 | 
			
		||||
@ -109,7 +141,7 @@ teardown(){
 | 
			
		||||
  assert_success
 | 
			
		||||
 | 
			
		||||
  run git -C "$ABRA_DIR/recipes/$TEST_RECIPE" status
 | 
			
		||||
  assert_output --partial 'behind 3'
 | 
			
		||||
  assert_output --partial "Your branch is behind 'origin/main' by 3 commits, and can be fast-forwarded."
 | 
			
		||||
 | 
			
		||||
  # NOTE(d1): need to use --chaos to force same commit
 | 
			
		||||
  run $ABRA app new "$TEST_RECIPE" \
 | 
			
		||||
@ -117,13 +149,12 @@ teardown(){
 | 
			
		||||
    --offline \
 | 
			
		||||
    --chaos \
 | 
			
		||||
    --server "$TEST_SERVER" \
 | 
			
		||||
    --domain "$TEST_APP_DOMAIN" \
 | 
			
		||||
    --secrets
 | 
			
		||||
    --domain "$TEST_APP_DOMAIN"
 | 
			
		||||
  assert_success
 | 
			
		||||
  assert_exists "$ABRA_DIR/servers/$TEST_SERVER/$TEST_APP_DOMAIN.env"
 | 
			
		||||
 | 
			
		||||
  run git -C "$ABRA_DIR/recipes/$TEST_RECIPE" status
 | 
			
		||||
  assert_output --partial 'behind 3'
 | 
			
		||||
  assert_output --partial "Your branch is behind 'origin/main' by 3 commits, and can be fast-forwarded."
 | 
			
		||||
 | 
			
		||||
  _reset_recipe
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
@ -104,10 +104,7 @@ teardown(){
 | 
			
		||||
 | 
			
		||||
  _undeploy_app
 | 
			
		||||
 | 
			
		||||
  # NOTE(d1): to let the stack come down before nuking volumes
 | 
			
		||||
  sleep 5
 | 
			
		||||
 | 
			
		||||
  run $ABRA app volume rm "$TEST_APP_DOMAIN" --force
 | 
			
		||||
  run $ABRA app volume rm "$TEST_APP_DOMAIN"
 | 
			
		||||
  assert_success
 | 
			
		||||
 | 
			
		||||
  run $ABRA app volume ls "$TEST_APP_DOMAIN"
 | 
			
		||||
@ -132,9 +129,6 @@ teardown(){
 | 
			
		||||
 | 
			
		||||
  _undeploy_app
 | 
			
		||||
 | 
			
		||||
  # NOTE(d1): to let the stack come down before nuking volumes
 | 
			
		||||
  sleep 5
 | 
			
		||||
 | 
			
		||||
  run $ABRA app rm "$TEST_APP_DOMAIN" --no-input
 | 
			
		||||
  assert_success
 | 
			
		||||
  assert_output --partial 'test-volume'
 | 
			
		||||
 | 
			
		||||
@ -5,6 +5,7 @@ _common_setup() {
 | 
			
		||||
  bats_load_library bats-assert
 | 
			
		||||
  bats_load_library bats-file
 | 
			
		||||
 | 
			
		||||
  load "$PWD/tests/integration/helpers/file"
 | 
			
		||||
  load "$PWD/tests/integration/helpers/app"
 | 
			
		||||
  load "$PWD/tests/integration/helpers/git"
 | 
			
		||||
  load "$PWD/tests/integration/helpers/recipe"
 | 
			
		||||
 | 
			
		||||
							
								
								
									
										24
									
								
								tests/integration/helpers/file.bash
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										24
									
								
								tests/integration/helpers/file.bash
									
									
									
									
									
										Normal file
									
								
							@ -0,0 +1,24 @@
 | 
			
		||||
_mkfile() {
 | 
			
		||||
  run bash -c "echo $2 > $1"
 | 
			
		||||
  assert_success
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
_mkfile_remote() {
 | 
			
		||||
  run $ABRA app run "$TEST_APP_DOMAIN" app "bash -c \"echo $2 > $1\""
 | 
			
		||||
  assert_success
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
_mkdir() {
 | 
			
		||||
  run bash -c "mkdir -p $1"
 | 
			
		||||
  assert_success
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
_rm() {
 | 
			
		||||
  run rm -rf "$1"
 | 
			
		||||
  assert_success
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
_rm_remote() {
 | 
			
		||||
  run "$ABRA" app run "$TEST_APP_DOMAIN" app rm -rf "$1"
 | 
			
		||||
  assert_success
 | 
			
		||||
}
 | 
			
		||||
@ -28,3 +28,10 @@ _reset_tags() {
 | 
			
		||||
  assert_success
 | 
			
		||||
  refute_output '0'
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
_set_git_author() {
 | 
			
		||||
  run git -C "$ABRA_DIR/recipes/$TEST_RECIPE" config --local user.email test@example.com
 | 
			
		||||
  assert_success
 | 
			
		||||
  run git -C "$ABRA_DIR/recipes/$TEST_RECIPE" config --local user.name test
 | 
			
		||||
  assert_success
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
@ -5,7 +5,17 @@ setup() {
 | 
			
		||||
  _common_setup
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
@test "recipe fetch" {
 | 
			
		||||
@test "recipe fetch all" {
 | 
			
		||||
  run rm -rf "$ABRA_DIR/recipes/matrix-synapse"
 | 
			
		||||
  assert_success
 | 
			
		||||
  assert_not_exists "$ABRA_DIR/recipes/matrix-synapse"
 | 
			
		||||
 | 
			
		||||
  run $ABRA recipe fetch
 | 
			
		||||
  assert_success
 | 
			
		||||
  assert_exists "$ABRA_DIR/recipes/matrix-synapse"
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
@test "recipe fetch single recipe" {
 | 
			
		||||
  run rm -rf "$ABRA_DIR/recipes/matrix-synapse"
 | 
			
		||||
  assert_success
 | 
			
		||||
  assert_not_exists "$ABRA_DIR/recipes/matrix-synapse"
 | 
			
		||||
 | 
			
		||||
@ -23,14 +23,14 @@ teardown(){
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
@test "create new recipe" {
 | 
			
		||||
  run $ABRA recipe new foobar
 | 
			
		||||
  run $ABRA recipe new foobar --git-name foo --git-email foo@example.com
 | 
			
		||||
  assert_success
 | 
			
		||||
  assert_output --partial 'Your new foobar recipe has been created'
 | 
			
		||||
  assert_exists "$ABRA_DIR/recipes/foobar"
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
@test "create new app from new recipe" {
 | 
			
		||||
  run $ABRA recipe new foobar
 | 
			
		||||
  run $ABRA recipe new foobar --git-name foo --git-email foo@example.com
 | 
			
		||||
  assert_success
 | 
			
		||||
 | 
			
		||||
  run $ABRA app new foobar \
 | 
			
		||||
 | 
			
		||||
@ -15,6 +15,11 @@ teardown_file(){
 | 
			
		||||
setup(){
 | 
			
		||||
  load "$PWD/tests/integration/helpers/common"
 | 
			
		||||
  _common_setup
 | 
			
		||||
  _set_git_author
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
teardown() {
 | 
			
		||||
  _reset_recipe
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
@test "validate recipe argument" {
 | 
			
		||||
@ -51,8 +56,6 @@ setup(){
 | 
			
		||||
  run git -C "$ABRA_DIR/recipes/$TEST_RECIPE" tag --list
 | 
			
		||||
  assert_success
 | 
			
		||||
  assert_output --partial '0.2.1+1.21.6'
 | 
			
		||||
 | 
			
		||||
  _reset_recipe
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
# NOTE(d1): this test can't assert hardcoded versions since we upgrade a minor
 | 
			
		||||
@ -81,8 +84,6 @@ setup(){
 | 
			
		||||
  run git -C "$ABRA_DIR/recipes/$TEST_RECIPE" tag --list
 | 
			
		||||
  assert_success
 | 
			
		||||
  assert_output --regexp '0\.3\.0\+1\.2.*'
 | 
			
		||||
 | 
			
		||||
  _reset_recipe "$TEST_RECIPE"
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
@test "unknown files not committed" {
 | 
			
		||||
@ -100,6 +101,21 @@ setup(){
 | 
			
		||||
  run git -C "$ABRA_DIR/recipes/$TEST_RECIPE" rm foo
 | 
			
		||||
  assert_failure
 | 
			
		||||
  assert_output --partial "fatal: pathspec 'foo' did not match any files"
 | 
			
		||||
 | 
			
		||||
  _reset_recipe
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
# NOTE: relies on 0.2.x being the last minor version
 | 
			
		||||
@test "release with next release note" {
 | 
			
		||||
  _mkfile "$ABRA_DIR/recipes/$TEST_RECIPE/release/next" "those are some release notes for the next release"
 | 
			
		||||
  run git -C "$ABRA_DIR/recipes/$TEST_RECIPE" add release/next
 | 
			
		||||
  assert_success
 | 
			
		||||
  run git -C "$ABRA_DIR/recipes/$TEST_RECIPE" commit -m "added some release notes"
 | 
			
		||||
  assert_success
 | 
			
		||||
 | 
			
		||||
  run $ABRA recipe release  "$TEST_RECIPE" --no-input  --minor
 | 
			
		||||
  assert_success
 | 
			
		||||
  assert_output --partial 'no -p/--publish passed, not publishing'
 | 
			
		||||
 | 
			
		||||
  assert_not_exists "$ABRA_DIR/recipes/$TEST_RECIPE/release/next"
 | 
			
		||||
  assert_exists "$ABRA_DIR/recipes/$TEST_RECIPE/release/0.3.0+1.21.0"
 | 
			
		||||
  assert_file_contains "$ABRA_DIR/recipes/$TEST_RECIPE/release/0.3.0+1.21.0" "those are some release notes for the next release"
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
		Reference in New Issue
	
	Block a user