forked from toolshed/abra
		
	Compare commits
	
		
			1 Commits
		
	
	
		
			recipe-ini
			...
			cp-enhance
		
	
	| Author | SHA1 | Date | |
|---|---|---|---|
| 296b2e0312 | 
| @ -1,296 +1,414 @@ | |||||||
| package app | package app | ||||||
|  |  | ||||||
| import ( | import ( | ||||||
|  | 	"archive/tar" | ||||||
|  | 	"context" | ||||||
| 	"fmt" | 	"fmt" | ||||||
|  | 	"io" | ||||||
|  | 	"os" | ||||||
|  | 	"path/filepath" | ||||||
|  | 	"strings" | ||||||
|  | 	"time" | ||||||
|  |  | ||||||
| 	"coopcloud.tech/abra/cli/internal" | 	"coopcloud.tech/abra/cli/internal" | ||||||
| 	"coopcloud.tech/abra/pkg/autocomplete" | 	"coopcloud.tech/abra/pkg/autocomplete" | ||||||
| 	"coopcloud.tech/abra/pkg/client" | 	"coopcloud.tech/abra/pkg/client" | ||||||
| 	"coopcloud.tech/abra/pkg/recipe" | 	"coopcloud.tech/abra/pkg/config" | ||||||
|  | 	containerPkg "coopcloud.tech/abra/pkg/container" | ||||||
|  | 	recipePkg "coopcloud.tech/abra/pkg/recipe" | ||||||
|  | 	"coopcloud.tech/abra/pkg/upstream/container" | ||||||
|  | 	"github.com/docker/cli/cli/command" | ||||||
|  | 	"github.com/docker/docker/api/types" | ||||||
|  | 	"github.com/docker/docker/api/types/filters" | ||||||
|  | 	dockerClient "github.com/docker/docker/client" | ||||||
|  | 	"github.com/docker/docker/pkg/archive" | ||||||
|  | 	"github.com/klauspost/pgzip" | ||||||
| 	"github.com/sirupsen/logrus" | 	"github.com/sirupsen/logrus" | ||||||
| 	"github.com/urfave/cli" | 	"github.com/urfave/cli" | ||||||
| ) | ) | ||||||
|  |  | ||||||
| var snapshot string | type backupConfig struct { | ||||||
| var snapshotFlag = &cli.StringFlag{ | 	preHookCmd  string | ||||||
| 	Name:        "snapshot, s", | 	postHookCmd string | ||||||
| 	Usage:       "Lists specific snapshot", | 	backupPaths []string | ||||||
| 	Destination: &snapshot, |  | ||||||
| } |  | ||||||
|  |  | ||||||
| var includePath string |  | ||||||
| var includePathFlag = &cli.StringFlag{ |  | ||||||
| 	Name:        "path, p", |  | ||||||
| 	Usage:       "Include path", |  | ||||||
| 	Destination: &includePath, |  | ||||||
| } |  | ||||||
|  |  | ||||||
| var resticRepo string |  | ||||||
| var resticRepoFlag = &cli.StringFlag{ |  | ||||||
| 	Name:        "repo, r", |  | ||||||
| 	Usage:       "Restic repository", |  | ||||||
| 	Destination: &resticRepo, |  | ||||||
| } |  | ||||||
|  |  | ||||||
| var appBackupListCommand = cli.Command{ |  | ||||||
| 	Name:    "list", |  | ||||||
| 	Aliases: []string{"ls"}, |  | ||||||
| 	Flags: []cli.Flag{ |  | ||||||
| 		internal.DebugFlag, |  | ||||||
| 		internal.OfflineFlag, |  | ||||||
| 		snapshotFlag, |  | ||||||
| 		includePathFlag, |  | ||||||
| 	}, |  | ||||||
| 	Before:       internal.SubCommandBefore, |  | ||||||
| 	Usage:        "List all backups", |  | ||||||
| 	BashComplete: autocomplete.AppNameComplete, |  | ||||||
| 	Action: func(c *cli.Context) error { |  | ||||||
| 		app := internal.ValidateApp(c) |  | ||||||
|  |  | ||||||
| 		if err := recipe.EnsureExists(app.Recipe); err != nil { |  | ||||||
| 			logrus.Fatal(err) |  | ||||||
| 		} |  | ||||||
|  |  | ||||||
| 		if !internal.Chaos { |  | ||||||
| 			if err := recipe.EnsureIsClean(app.Recipe); err != nil { |  | ||||||
| 				logrus.Fatal(err) |  | ||||||
| 			} |  | ||||||
|  |  | ||||||
| 			if !internal.Offline { |  | ||||||
| 				if err := recipe.EnsureUpToDate(app.Recipe); err != nil { |  | ||||||
| 					logrus.Fatal(err) |  | ||||||
| 				} |  | ||||||
| 			} |  | ||||||
|  |  | ||||||
| 			if err := recipe.EnsureLatest(app.Recipe); err != nil { |  | ||||||
| 				logrus.Fatal(err) |  | ||||||
| 			} |  | ||||||
| 		} |  | ||||||
|  |  | ||||||
| 		cl, err := client.New(app.Server) |  | ||||||
| 		if err != nil { |  | ||||||
| 			logrus.Fatal(err) |  | ||||||
| 		} |  | ||||||
|  |  | ||||||
| 		targetContainer, err := internal.RetrieveBackupBotContainer(cl) |  | ||||||
| 		if err != nil { |  | ||||||
| 			logrus.Fatal(err) |  | ||||||
| 		} |  | ||||||
|  |  | ||||||
| 		execEnv := []string{fmt.Sprintf("SERVICE=%s", app.Domain)} |  | ||||||
| 		if snapshot != "" { |  | ||||||
| 			logrus.Debugf("including SNAPSHOT=%s in backupbot exec invocation", snapshot) |  | ||||||
| 			execEnv = append(execEnv, fmt.Sprintf("SNAPSHOT=%s", snapshot)) |  | ||||||
| 		} |  | ||||||
| 		if includePath != "" { |  | ||||||
| 			logrus.Debugf("including INCLUDE_PATH=%s in backupbot exec invocation", includePath) |  | ||||||
| 			execEnv = append(execEnv, fmt.Sprintf("INCLUDE_PATH=%s", includePath)) |  | ||||||
| 		} |  | ||||||
|  |  | ||||||
| 		if err := internal.RunBackupCmdRemote(cl, "ls", targetContainer.ID, execEnv); err != nil { |  | ||||||
| 			logrus.Fatal(err) |  | ||||||
| 		} |  | ||||||
|  |  | ||||||
| 		return nil |  | ||||||
| 	}, |  | ||||||
| } |  | ||||||
|  |  | ||||||
| var appBackupDownloadCommand = cli.Command{ |  | ||||||
| 	Name:    "download", |  | ||||||
| 	Aliases: []string{"d"}, |  | ||||||
| 	Flags: []cli.Flag{ |  | ||||||
| 		internal.DebugFlag, |  | ||||||
| 		internal.OfflineFlag, |  | ||||||
| 		snapshotFlag, |  | ||||||
| 		includePathFlag, |  | ||||||
| 	}, |  | ||||||
| 	Before:       internal.SubCommandBefore, |  | ||||||
| 	Usage:        "Download a backup", |  | ||||||
| 	BashComplete: autocomplete.AppNameComplete, |  | ||||||
| 	Action: func(c *cli.Context) error { |  | ||||||
| 		app := internal.ValidateApp(c) |  | ||||||
|  |  | ||||||
| 		if err := recipe.EnsureExists(app.Recipe); err != nil { |  | ||||||
| 			logrus.Fatal(err) |  | ||||||
| 		} |  | ||||||
|  |  | ||||||
| 		if !internal.Chaos { |  | ||||||
| 			if err := recipe.EnsureIsClean(app.Recipe); err != nil { |  | ||||||
| 				logrus.Fatal(err) |  | ||||||
| 			} |  | ||||||
|  |  | ||||||
| 			if !internal.Offline { |  | ||||||
| 				if err := recipe.EnsureUpToDate(app.Recipe); err != nil { |  | ||||||
| 					logrus.Fatal(err) |  | ||||||
| 				} |  | ||||||
| 			} |  | ||||||
|  |  | ||||||
| 			if err := recipe.EnsureLatest(app.Recipe); err != nil { |  | ||||||
| 				logrus.Fatal(err) |  | ||||||
| 			} |  | ||||||
| 		} |  | ||||||
|  |  | ||||||
| 		cl, err := client.New(app.Server) |  | ||||||
| 		if err != nil { |  | ||||||
| 			logrus.Fatal(err) |  | ||||||
| 		} |  | ||||||
|  |  | ||||||
| 		targetContainer, err := internal.RetrieveBackupBotContainer(cl) |  | ||||||
| 		if err != nil { |  | ||||||
| 			logrus.Fatal(err) |  | ||||||
| 		} |  | ||||||
|  |  | ||||||
| 		execEnv := []string{fmt.Sprintf("SERVICE=%s", app.Domain)} |  | ||||||
| 		if snapshot != "" { |  | ||||||
| 			logrus.Debugf("including SNAPSHOT=%s in backupbot exec invocation", snapshot) |  | ||||||
| 			execEnv = append(execEnv, fmt.Sprintf("SNAPSHOT=%s", snapshot)) |  | ||||||
| 		} |  | ||||||
| 		if includePath != "" { |  | ||||||
| 			logrus.Debugf("including INCLUDE_PATH=%s in backupbot exec invocation", includePath) |  | ||||||
| 			execEnv = append(execEnv, fmt.Sprintf("INCLUDE_PATH=%s", includePath)) |  | ||||||
| 		} |  | ||||||
|  |  | ||||||
| 		if err := internal.RunBackupCmdRemote(cl, "download", targetContainer.ID, execEnv); err != nil { |  | ||||||
| 			logrus.Fatal(err) |  | ||||||
| 		} |  | ||||||
|  |  | ||||||
| 		remoteBackupDir := "/tmp/backup.tar.gz" |  | ||||||
| 		currentWorkingDir := "." |  | ||||||
| 		if err = CopyFromContainer(cl, targetContainer.ID, remoteBackupDir, currentWorkingDir); err != nil { |  | ||||||
| 			logrus.Fatal(err) |  | ||||||
| 		} |  | ||||||
|  |  | ||||||
| 		fmt.Println("backup successfully downloaded to current working directory") |  | ||||||
|  |  | ||||||
| 		return nil |  | ||||||
| 	}, |  | ||||||
| } |  | ||||||
|  |  | ||||||
| var appBackupCreateCommand = cli.Command{ |  | ||||||
| 	Name:    "create", |  | ||||||
| 	Aliases: []string{"c"}, |  | ||||||
| 	Flags: []cli.Flag{ |  | ||||||
| 		internal.DebugFlag, |  | ||||||
| 		internal.OfflineFlag, |  | ||||||
| 		resticRepoFlag, |  | ||||||
| 	}, |  | ||||||
| 	Before:       internal.SubCommandBefore, |  | ||||||
| 	Usage:        "Create a new backup", |  | ||||||
| 	BashComplete: autocomplete.AppNameComplete, |  | ||||||
| 	Action: func(c *cli.Context) error { |  | ||||||
| 		app := internal.ValidateApp(c) |  | ||||||
|  |  | ||||||
| 		if err := recipe.EnsureExists(app.Recipe); err != nil { |  | ||||||
| 			logrus.Fatal(err) |  | ||||||
| 		} |  | ||||||
|  |  | ||||||
| 		if !internal.Chaos { |  | ||||||
| 			if err := recipe.EnsureIsClean(app.Recipe); err != nil { |  | ||||||
| 				logrus.Fatal(err) |  | ||||||
| 			} |  | ||||||
|  |  | ||||||
| 			if !internal.Offline { |  | ||||||
| 				if err := recipe.EnsureUpToDate(app.Recipe); err != nil { |  | ||||||
| 					logrus.Fatal(err) |  | ||||||
| 				} |  | ||||||
| 			} |  | ||||||
|  |  | ||||||
| 			if err := recipe.EnsureLatest(app.Recipe); err != nil { |  | ||||||
| 				logrus.Fatal(err) |  | ||||||
| 			} |  | ||||||
| 		} |  | ||||||
|  |  | ||||||
| 		cl, err := client.New(app.Server) |  | ||||||
| 		if err != nil { |  | ||||||
| 			logrus.Fatal(err) |  | ||||||
| 		} |  | ||||||
|  |  | ||||||
| 		targetContainer, err := internal.RetrieveBackupBotContainer(cl) |  | ||||||
| 		if err != nil { |  | ||||||
| 			logrus.Fatal(err) |  | ||||||
| 		} |  | ||||||
|  |  | ||||||
| 		execEnv := []string{fmt.Sprintf("SERVICE=%s", app.Domain)} |  | ||||||
| 		if resticRepo != "" { |  | ||||||
| 			logrus.Debugf("including RESTIC_REPO=%s in backupbot exec invocation", resticRepo) |  | ||||||
| 			execEnv = append(execEnv, fmt.Sprintf("RESTIC_REPO=%s", resticRepo)) |  | ||||||
| 		} |  | ||||||
|  |  | ||||||
| 		if err := internal.RunBackupCmdRemote(cl, "create", targetContainer.ID, execEnv); err != nil { |  | ||||||
| 			logrus.Fatal(err) |  | ||||||
| 		} |  | ||||||
|  |  | ||||||
| 		return nil |  | ||||||
| 	}, |  | ||||||
| } |  | ||||||
|  |  | ||||||
| var appBackupSnapshotsCommand = cli.Command{ |  | ||||||
| 	Name:    "snapshots", |  | ||||||
| 	Aliases: []string{"s"}, |  | ||||||
| 	Flags: []cli.Flag{ |  | ||||||
| 		internal.DebugFlag, |  | ||||||
| 		internal.OfflineFlag, |  | ||||||
| 		snapshotFlag, |  | ||||||
| 	}, |  | ||||||
| 	Before:       internal.SubCommandBefore, |  | ||||||
| 	Usage:        "List backup snapshots", |  | ||||||
| 	BashComplete: autocomplete.AppNameComplete, |  | ||||||
| 	Action: func(c *cli.Context) error { |  | ||||||
| 		app := internal.ValidateApp(c) |  | ||||||
|  |  | ||||||
| 		if err := recipe.EnsureExists(app.Recipe); err != nil { |  | ||||||
| 			logrus.Fatal(err) |  | ||||||
| 		} |  | ||||||
|  |  | ||||||
| 		if !internal.Chaos { |  | ||||||
| 			if err := recipe.EnsureIsClean(app.Recipe); err != nil { |  | ||||||
| 				logrus.Fatal(err) |  | ||||||
| 			} |  | ||||||
|  |  | ||||||
| 			if !internal.Offline { |  | ||||||
| 				if err := recipe.EnsureUpToDate(app.Recipe); err != nil { |  | ||||||
| 					logrus.Fatal(err) |  | ||||||
| 				} |  | ||||||
| 			} |  | ||||||
|  |  | ||||||
| 			if err := recipe.EnsureLatest(app.Recipe); err != nil { |  | ||||||
| 				logrus.Fatal(err) |  | ||||||
| 			} |  | ||||||
| 		} |  | ||||||
|  |  | ||||||
| 		cl, err := client.New(app.Server) |  | ||||||
| 		if err != nil { |  | ||||||
| 			logrus.Fatal(err) |  | ||||||
| 		} |  | ||||||
|  |  | ||||||
| 		targetContainer, err := internal.RetrieveBackupBotContainer(cl) |  | ||||||
| 		if err != nil { |  | ||||||
| 			logrus.Fatal(err) |  | ||||||
| 		} |  | ||||||
|  |  | ||||||
| 		execEnv := []string{fmt.Sprintf("SERVICE=%s", app.Domain)} |  | ||||||
| 		if snapshot != "" { |  | ||||||
| 			logrus.Debugf("including SNAPSHOT=%s in backupbot exec invocation", snapshot) |  | ||||||
| 			execEnv = append(execEnv, fmt.Sprintf("SNAPSHOT=%s", snapshot)) |  | ||||||
| 		} |  | ||||||
|  |  | ||||||
| 		if err := internal.RunBackupCmdRemote(cl, "snapshots", targetContainer.ID, execEnv); err != nil { |  | ||||||
| 			logrus.Fatal(err) |  | ||||||
| 		} |  | ||||||
|  |  | ||||||
| 		return nil |  | ||||||
| 	}, |  | ||||||
| } | } | ||||||
|  |  | ||||||
| var appBackupCommand = cli.Command{ | var appBackupCommand = cli.Command{ | ||||||
| 	Name:      "backup", | 	Name:      "backup", | ||||||
| 	Aliases:   []string{"b"}, | 	Aliases:   []string{"bk"}, | ||||||
| 	Usage:     "Manage app backups", | 	Usage:     "Run app backup", | ||||||
| 	ArgsUsage: "<domain>", | 	ArgsUsage: "<domain> [<service>]", | ||||||
| 	Subcommands: []cli.Command{ | 	Flags: []cli.Flag{ | ||||||
| 		appBackupListCommand, | 		internal.DebugFlag, | ||||||
| 		appBackupSnapshotsCommand, | 		internal.OfflineFlag, | ||||||
| 		appBackupDownloadCommand, | 		internal.ChaosFlag, | ||||||
| 		appBackupCreateCommand, | 	}, | ||||||
|  | 	Before:       internal.SubCommandBefore, | ||||||
|  | 	BashComplete: autocomplete.AppNameComplete, | ||||||
|  | 	Description: ` | ||||||
|  | Run an app backup. | ||||||
|  |  | ||||||
|  | A backup command and pre/post hook commands are defined in the recipe | ||||||
|  | configuration. Abra reads this configuration and run the comands in the context | ||||||
|  | of the deployed services. Pass <service> if you only want to back up a single | ||||||
|  | service. All backups are placed in the ~/.abra/backups directory. | ||||||
|  |  | ||||||
|  | A single backup file is produced for all backup paths specified for a service. | ||||||
|  | If we have the following backup configuration: | ||||||
|  |  | ||||||
|  |     - "backupbot.backup.path=/var/lib/foo,/var/lib/bar" | ||||||
|  |  | ||||||
|  | And we run "abra app backup example.com app", Abra will produce a file that | ||||||
|  | looks like: | ||||||
|  |  | ||||||
|  |     ~/.abra/backups/example_com_app_609341138.tar.gz | ||||||
|  |  | ||||||
|  | This file is a compressed archive which contains all backup paths. To see paths, run: | ||||||
|  |  | ||||||
|  |     tar -tf ~/.abra/backups/example_com_app_609341138.tar.gz | ||||||
|  |  | ||||||
|  | (Make sure to change the name of the backup file) | ||||||
|  |  | ||||||
|  | This single file can be used to restore your app. See "abra app restore" for more. | ||||||
|  | `, | ||||||
|  | 	Action: func(c *cli.Context) error { | ||||||
|  | 		app := internal.ValidateApp(c) | ||||||
|  |  | ||||||
|  | 		recipe, err := recipePkg.Get(app.Recipe, internal.Offline) | ||||||
|  | 		if err != nil { | ||||||
|  | 			logrus.Fatal(err) | ||||||
|  | 		} | ||||||
|  |  | ||||||
|  | 		if !internal.Chaos { | ||||||
|  | 			if err := recipePkg.EnsureIsClean(app.Recipe); err != nil { | ||||||
|  | 				logrus.Fatal(err) | ||||||
|  | 			} | ||||||
|  |  | ||||||
|  | 			if !internal.Offline { | ||||||
|  | 				if err := recipePkg.EnsureUpToDate(app.Recipe); err != nil { | ||||||
|  | 					logrus.Fatal(err) | ||||||
|  | 				} | ||||||
|  | 			} | ||||||
|  |  | ||||||
|  | 			if err := recipePkg.EnsureLatest(app.Recipe); err != nil { | ||||||
|  | 				logrus.Fatal(err) | ||||||
|  | 			} | ||||||
|  | 		} | ||||||
|  |  | ||||||
|  | 		backupConfigs := make(map[string]backupConfig) | ||||||
|  | 		for _, service := range recipe.Config.Services { | ||||||
|  | 			if backupsEnabled, ok := service.Deploy.Labels["backupbot.backup"]; ok { | ||||||
|  | 				if backupsEnabled == "true" { | ||||||
|  | 					fullServiceName := fmt.Sprintf("%s_%s", app.StackName(), service.Name) | ||||||
|  | 					bkConfig := backupConfig{} | ||||||
|  |  | ||||||
|  | 					logrus.Debugf("backup config detected for %s", fullServiceName) | ||||||
|  |  | ||||||
|  | 					if paths, ok := service.Deploy.Labels["backupbot.backup.path"]; ok { | ||||||
|  | 						logrus.Debugf("detected backup paths for %s: %s", fullServiceName, paths) | ||||||
|  | 						bkConfig.backupPaths = strings.Split(paths, ",") | ||||||
|  | 					} | ||||||
|  |  | ||||||
|  | 					if preHookCmd, ok := service.Deploy.Labels["backupbot.backup.pre-hook"]; ok { | ||||||
|  | 						logrus.Debugf("detected pre-hook command for %s: %s", fullServiceName, preHookCmd) | ||||||
|  | 						bkConfig.preHookCmd = preHookCmd | ||||||
|  | 					} | ||||||
|  |  | ||||||
|  | 					if postHookCmd, ok := service.Deploy.Labels["backupbot.backup.post-hook"]; ok { | ||||||
|  | 						logrus.Debugf("detected post-hook command for %s: %s", fullServiceName, postHookCmd) | ||||||
|  | 						bkConfig.postHookCmd = postHookCmd | ||||||
|  | 					} | ||||||
|  |  | ||||||
|  | 					backupConfigs[service.Name] = bkConfig | ||||||
|  | 				} | ||||||
|  | 			} | ||||||
|  | 		} | ||||||
|  |  | ||||||
|  | 		cl, err := client.New(app.Server) | ||||||
|  | 		if err != nil { | ||||||
|  | 			logrus.Fatal(err) | ||||||
|  | 		} | ||||||
|  |  | ||||||
|  | 		serviceName := c.Args().Get(1) | ||||||
|  | 		if serviceName != "" { | ||||||
|  | 			backupConfig, ok := backupConfigs[serviceName] | ||||||
|  | 			if !ok { | ||||||
|  | 				logrus.Fatalf("no backup config for %s? does %s exist?", serviceName, serviceName) | ||||||
|  | 			} | ||||||
|  |  | ||||||
|  | 			logrus.Infof("running backup for the %s service", serviceName) | ||||||
|  |  | ||||||
|  | 			if err := runBackup(cl, app, serviceName, backupConfig); err != nil { | ||||||
|  | 				logrus.Fatal(err) | ||||||
|  | 			} | ||||||
|  | 		} else { | ||||||
|  | 			if len(backupConfigs) == 0 { | ||||||
|  | 				logrus.Fatalf("no backup configs discovered for %s?", app.Name) | ||||||
|  | 			} | ||||||
|  |  | ||||||
|  | 			for serviceName, backupConfig := range backupConfigs { | ||||||
|  | 				logrus.Infof("running backup for the %s service", serviceName) | ||||||
|  |  | ||||||
|  | 				if err := runBackup(cl, app, serviceName, backupConfig); err != nil { | ||||||
|  | 					logrus.Fatal(err) | ||||||
|  | 				} | ||||||
|  | 			} | ||||||
|  | 		} | ||||||
|  |  | ||||||
|  | 		return nil | ||||||
| 	}, | 	}, | ||||||
| } | } | ||||||
|  |  | ||||||
|  | // TimeStamp generates a file name friendly timestamp. | ||||||
|  | func TimeStamp() string { | ||||||
|  | 	ts := time.Now().UTC().Format(time.RFC3339) | ||||||
|  | 	return strings.Replace(ts, ":", "-", -1) | ||||||
|  | } | ||||||
|  |  | ||||||
|  | // runBackup does the actual backup logic. | ||||||
|  | func runBackup(cl *dockerClient.Client, app config.App, serviceName string, bkConfig backupConfig) error { | ||||||
|  | 	if len(bkConfig.backupPaths) == 0 { | ||||||
|  | 		return fmt.Errorf("backup paths are empty for %s?", serviceName) | ||||||
|  | 	} | ||||||
|  |  | ||||||
|  | 	// FIXME: avoid instantiating a new CLI | ||||||
|  | 	dcli, err := command.NewDockerCli() | ||||||
|  | 	if err != nil { | ||||||
|  | 		return err | ||||||
|  | 	} | ||||||
|  |  | ||||||
|  | 	filters := filters.NewArgs() | ||||||
|  | 	filters.Add("name", fmt.Sprintf("^%s_%s", app.StackName(), serviceName)) | ||||||
|  |  | ||||||
|  | 	targetContainer, err := containerPkg.GetContainer(context.Background(), cl, filters, true) | ||||||
|  | 	if err != nil { | ||||||
|  | 		return err | ||||||
|  | 	} | ||||||
|  |  | ||||||
|  | 	fullServiceName := fmt.Sprintf("%s_%s", app.StackName(), serviceName) | ||||||
|  | 	if bkConfig.preHookCmd != "" { | ||||||
|  | 		splitCmd := internal.SafeSplit(bkConfig.preHookCmd) | ||||||
|  |  | ||||||
|  | 		logrus.Debugf("split pre-hook command for %s into %s", fullServiceName, splitCmd) | ||||||
|  |  | ||||||
|  | 		preHookExecOpts := types.ExecConfig{ | ||||||
|  | 			AttachStderr: true, | ||||||
|  | 			AttachStdin:  true, | ||||||
|  | 			AttachStdout: true, | ||||||
|  | 			Cmd:          splitCmd, | ||||||
|  | 			Detach:       false, | ||||||
|  | 			Tty:          true, | ||||||
|  | 		} | ||||||
|  |  | ||||||
|  | 		if err := container.RunExec(dcli, cl, targetContainer.ID, &preHookExecOpts); err != nil { | ||||||
|  | 			return fmt.Errorf("failed to run %s on %s: %s", bkConfig.preHookCmd, targetContainer.ID, err.Error()) | ||||||
|  | 		} | ||||||
|  |  | ||||||
|  | 		logrus.Infof("succesfully ran %s pre-hook command: %s", fullServiceName, bkConfig.preHookCmd) | ||||||
|  | 	} | ||||||
|  |  | ||||||
|  | 	var tempBackupPaths []string | ||||||
|  | 	for _, remoteBackupPath := range bkConfig.backupPaths { | ||||||
|  | 		sanitisedPath := strings.ReplaceAll(remoteBackupPath, "/", "_") | ||||||
|  | 		localBackupPath := filepath.Join(config.BACKUP_DIR, fmt.Sprintf("%s%s_%s.tar.gz", fullServiceName, sanitisedPath, TimeStamp())) | ||||||
|  | 		logrus.Debugf("temporarily backing up %s:%s to %s", fullServiceName, remoteBackupPath, localBackupPath) | ||||||
|  |  | ||||||
|  | 		logrus.Infof("backing up %s:%s", fullServiceName, remoteBackupPath) | ||||||
|  |  | ||||||
|  | 		content, _, err := cl.CopyFromContainer(context.Background(), targetContainer.ID, remoteBackupPath) | ||||||
|  | 		if err != nil { | ||||||
|  | 			logrus.Debugf("failed to copy %s from container: %s", remoteBackupPath, err.Error()) | ||||||
|  | 			if err := cleanupTempArchives(tempBackupPaths); err != nil { | ||||||
|  | 				return fmt.Errorf("failed to clean up temporary archives: %s", err.Error()) | ||||||
|  | 			} | ||||||
|  | 			return fmt.Errorf("failed to copy %s from container: %s", remoteBackupPath, err.Error()) | ||||||
|  | 		} | ||||||
|  | 		defer content.Close() | ||||||
|  |  | ||||||
|  | 		_, srcBase := archive.SplitPathDirEntry(remoteBackupPath) | ||||||
|  | 		preArchive := archive.RebaseArchiveEntries(content, srcBase, remoteBackupPath) | ||||||
|  | 		if err := copyToFile(localBackupPath, preArchive); err != nil { | ||||||
|  | 			logrus.Debugf("failed to create tar archive (%s): %s", localBackupPath, err.Error()) | ||||||
|  | 			if err := cleanupTempArchives(tempBackupPaths); err != nil { | ||||||
|  | 				return fmt.Errorf("failed to clean up temporary archives: %s", err.Error()) | ||||||
|  | 			} | ||||||
|  | 			return fmt.Errorf("failed to create tar archive (%s): %s", localBackupPath, err.Error()) | ||||||
|  | 		} | ||||||
|  |  | ||||||
|  | 		tempBackupPaths = append(tempBackupPaths, localBackupPath) | ||||||
|  | 	} | ||||||
|  |  | ||||||
|  | 	logrus.Infof("compressing and merging archives...") | ||||||
|  |  | ||||||
|  | 	if err := mergeArchives(tempBackupPaths, fullServiceName); err != nil { | ||||||
|  | 		logrus.Debugf("failed to merge archive files: %s", err.Error()) | ||||||
|  | 		if err := cleanupTempArchives(tempBackupPaths); err != nil { | ||||||
|  | 			return fmt.Errorf("failed to clean up temporary archives: %s", err.Error()) | ||||||
|  | 		} | ||||||
|  | 		return fmt.Errorf("failed to merge archive files: %s", err.Error()) | ||||||
|  | 	} | ||||||
|  |  | ||||||
|  | 	if err := cleanupTempArchives(tempBackupPaths); err != nil { | ||||||
|  | 		return fmt.Errorf("failed to clean up temporary archives: %s", err.Error()) | ||||||
|  | 	} | ||||||
|  |  | ||||||
|  | 	if bkConfig.postHookCmd != "" { | ||||||
|  | 		splitCmd := internal.SafeSplit(bkConfig.postHookCmd) | ||||||
|  |  | ||||||
|  | 		logrus.Debugf("split post-hook command for %s into %s", fullServiceName, splitCmd) | ||||||
|  |  | ||||||
|  | 		postHookExecOpts := types.ExecConfig{ | ||||||
|  | 			AttachStderr: true, | ||||||
|  | 			AttachStdin:  true, | ||||||
|  | 			AttachStdout: true, | ||||||
|  | 			Cmd:          splitCmd, | ||||||
|  | 			Detach:       false, | ||||||
|  | 			Tty:          true, | ||||||
|  | 		} | ||||||
|  |  | ||||||
|  | 		if err := container.RunExec(dcli, cl, targetContainer.ID, &postHookExecOpts); err != nil { | ||||||
|  | 			return err | ||||||
|  | 		} | ||||||
|  |  | ||||||
|  | 		logrus.Infof("succesfully ran %s post-hook command: %s", fullServiceName, bkConfig.postHookCmd) | ||||||
|  | 	} | ||||||
|  |  | ||||||
|  | 	return nil | ||||||
|  | } | ||||||
|  |  | ||||||
|  | func copyToFile(outfile string, r io.Reader) error { | ||||||
|  | 	tmpFile, err := os.CreateTemp(filepath.Dir(outfile), ".tar_temp") | ||||||
|  | 	if err != nil { | ||||||
|  | 		return err | ||||||
|  | 	} | ||||||
|  |  | ||||||
|  | 	tmpPath := tmpFile.Name() | ||||||
|  |  | ||||||
|  | 	_, err = io.Copy(tmpFile, r) | ||||||
|  | 	tmpFile.Close() | ||||||
|  |  | ||||||
|  | 	if err != nil { | ||||||
|  | 		os.Remove(tmpPath) | ||||||
|  | 		return err | ||||||
|  | 	} | ||||||
|  |  | ||||||
|  | 	if err = os.Rename(tmpPath, outfile); err != nil { | ||||||
|  | 		os.Remove(tmpPath) | ||||||
|  | 		return err | ||||||
|  | 	} | ||||||
|  |  | ||||||
|  | 	return nil | ||||||
|  | } | ||||||
|  |  | ||||||
|  | func cleanupTempArchives(tarPaths []string) error { | ||||||
|  | 	for _, tarPath := range tarPaths { | ||||||
|  | 		if err := os.RemoveAll(tarPath); err != nil { | ||||||
|  | 			return err | ||||||
|  | 		} | ||||||
|  |  | ||||||
|  | 		logrus.Debugf("remove temporary archive file %s", tarPath) | ||||||
|  | 	} | ||||||
|  |  | ||||||
|  | 	return nil | ||||||
|  | } | ||||||
|  |  | ||||||
|  | func mergeArchives(tarPaths []string, serviceName string) error { | ||||||
|  | 	var out io.Writer | ||||||
|  | 	var cout *pgzip.Writer | ||||||
|  |  | ||||||
|  | 	localBackupPath := filepath.Join(config.BACKUP_DIR, fmt.Sprintf("%s_%s.tar.gz", serviceName, TimeStamp())) | ||||||
|  |  | ||||||
|  | 	fout, err := os.Create(localBackupPath) | ||||||
|  | 	if err != nil { | ||||||
|  | 		return fmt.Errorf("Failed to open %s: %s", localBackupPath, err) | ||||||
|  | 	} | ||||||
|  |  | ||||||
|  | 	defer fout.Close() | ||||||
|  | 	out = fout | ||||||
|  |  | ||||||
|  | 	cout = pgzip.NewWriter(out) | ||||||
|  | 	out = cout | ||||||
|  |  | ||||||
|  | 	tw := tar.NewWriter(out) | ||||||
|  |  | ||||||
|  | 	for _, tarPath := range tarPaths { | ||||||
|  | 		if err := addTar(tw, tarPath); err != nil { | ||||||
|  | 			return fmt.Errorf("failed to merge %s: %v", tarPath, err) | ||||||
|  | 		} | ||||||
|  | 	} | ||||||
|  |  | ||||||
|  | 	if err := tw.Close(); err != nil { | ||||||
|  | 		return fmt.Errorf("failed to close tar writer %v", err) | ||||||
|  | 	} | ||||||
|  |  | ||||||
|  | 	if cout != nil { | ||||||
|  | 		if err := cout.Flush(); err != nil { | ||||||
|  | 			return fmt.Errorf("failed to flush: %s", err) | ||||||
|  | 		} else if err = cout.Close(); err != nil { | ||||||
|  | 			return fmt.Errorf("failed to close compressed writer: %s", err) | ||||||
|  | 		} | ||||||
|  | 	} | ||||||
|  |  | ||||||
|  | 	logrus.Infof("backed up %s to %s", serviceName, localBackupPath) | ||||||
|  |  | ||||||
|  | 	return nil | ||||||
|  | } | ||||||
|  |  | ||||||
|  | func addTar(tw *tar.Writer, pth string) (err error) { | ||||||
|  | 	var tr *tar.Reader | ||||||
|  | 	var rc io.ReadCloser | ||||||
|  | 	var hdr *tar.Header | ||||||
|  |  | ||||||
|  | 	if tr, rc, err = openTarFile(pth); err != nil { | ||||||
|  | 		return | ||||||
|  | 	} | ||||||
|  |  | ||||||
|  | 	for { | ||||||
|  | 		if hdr, err = tr.Next(); err != nil { | ||||||
|  | 			if err == io.EOF { | ||||||
|  | 				err = nil | ||||||
|  | 			} | ||||||
|  | 			break | ||||||
|  | 		} | ||||||
|  | 		if err = tw.WriteHeader(hdr); err != nil { | ||||||
|  | 			break | ||||||
|  | 		} else if _, err = io.Copy(tw, tr); err != nil { | ||||||
|  | 			break | ||||||
|  | 		} | ||||||
|  | 	} | ||||||
|  | 	if err == nil { | ||||||
|  | 		err = rc.Close() | ||||||
|  | 	} else { | ||||||
|  | 		rc.Close() | ||||||
|  | 	} | ||||||
|  | 	return | ||||||
|  | } | ||||||
|  |  | ||||||
|  | func openTarFile(pth string) (tr *tar.Reader, rc io.ReadCloser, err error) { | ||||||
|  | 	var fin *os.File | ||||||
|  | 	var n int | ||||||
|  | 	buff := make([]byte, 1024) | ||||||
|  |  | ||||||
|  | 	if fin, err = os.Open(pth); err != nil { | ||||||
|  | 		return | ||||||
|  | 	} | ||||||
|  |  | ||||||
|  | 	if n, err = fin.Read(buff); err != nil { | ||||||
|  | 		fin.Close() | ||||||
|  | 		return | ||||||
|  | 	} else if n == 0 { | ||||||
|  | 		fin.Close() | ||||||
|  | 		err = fmt.Errorf("%s is empty", pth) | ||||||
|  | 		return | ||||||
|  | 	} | ||||||
|  |  | ||||||
|  | 	if _, err = fin.Seek(0, 0); err != nil { | ||||||
|  | 		fin.Close() | ||||||
|  | 		return | ||||||
|  | 	} | ||||||
|  |  | ||||||
|  | 	rc = fin | ||||||
|  | 	tr = tar.NewReader(rc) | ||||||
|  |  | ||||||
|  | 	return tr, rc, nil | ||||||
|  | } | ||||||
|  | |||||||
| @ -76,9 +76,9 @@ And if you want to copy that file back to your current working directory locally | |||||||
| 		logrus.Debugf("retrieved %s as target container on %s", formatter.ShortenID(container.ID), app.Server) | 		logrus.Debugf("retrieved %s as target container on %s", formatter.ShortenID(container.ID), app.Server) | ||||||
|  |  | ||||||
| 		if toContainer { | 		if toContainer { | ||||||
| 			err = CopyToContainer(cl, container.ID, srcPath, dstPath) | 			err = copyToContainer(cl, container.ID, srcPath, dstPath) | ||||||
| 		} else { | 		} else { | ||||||
| 			err = CopyFromContainer(cl, container.ID, srcPath, dstPath) | 			err = copyFromContainer(cl, container.ID, srcPath, dstPath) | ||||||
| 		} | 		} | ||||||
| 		if err != nil { | 		if err != nil { | ||||||
| 			logrus.Fatal(err) | 			logrus.Fatal(err) | ||||||
| @ -106,9 +106,9 @@ func parseSrcAndDst(src, dst string) (srcPath string, dstPath string, service st | |||||||
| 	return "", "", "", false, errServiceMissing | 	return "", "", "", false, errServiceMissing | ||||||
| } | } | ||||||
|  |  | ||||||
| // CopyToContainer copies a file or directory from the local file system to the container. | // copyToContainer copies a file or directory from the local file system to the container. | ||||||
| // See the possible copy modes and their documentation. | // See the possible copy modes and their documentation. | ||||||
| func CopyToContainer(cl *dockerClient.Client, containerID, srcPath, dstPath string) error { | func copyToContainer(cl *dockerClient.Client, containerID, srcPath, dstPath string) error { | ||||||
| 	srcStat, err := os.Stat(srcPath) | 	srcStat, err := os.Stat(srcPath) | ||||||
| 	if err != nil { | 	if err != nil { | ||||||
| 		return fmt.Errorf("local %s ", err) | 		return fmt.Errorf("local %s ", err) | ||||||
| @ -140,7 +140,7 @@ func CopyToContainer(cl *dockerClient.Client, containerID, srcPath, dstPath stri | |||||||
| 		if err != nil { | 		if err != nil { | ||||||
| 			return err | 			return err | ||||||
| 		} | 		} | ||||||
| 		if _, err := container.RunExec(dcli, cl, containerID, &types.ExecConfig{ | 		if err := container.RunExec(dcli, cl, containerID, &types.ExecConfig{ | ||||||
| 			AttachStderr: true, | 			AttachStderr: true, | ||||||
| 			AttachStdin:  true, | 			AttachStdin:  true, | ||||||
| 			AttachStdout: true, | 			AttachStdout: true, | ||||||
| @ -179,7 +179,7 @@ func CopyToContainer(cl *dockerClient.Client, containerID, srcPath, dstPath stri | |||||||
| 		if err != nil { | 		if err != nil { | ||||||
| 			return err | 			return err | ||||||
| 		} | 		} | ||||||
| 		if _, err := container.RunExec(dcli, cl, containerID, &types.ExecConfig{ | 		if err := container.RunExec(dcli, cl, containerID, &types.ExecConfig{ | ||||||
| 			AttachStderr: true, | 			AttachStderr: true, | ||||||
| 			AttachStdin:  true, | 			AttachStdin:  true, | ||||||
| 			AttachStdout: true, | 			AttachStdout: true, | ||||||
| @ -194,9 +194,9 @@ func CopyToContainer(cl *dockerClient.Client, containerID, srcPath, dstPath stri | |||||||
| 	return nil | 	return nil | ||||||
| } | } | ||||||
|  |  | ||||||
| // CopyFromContainer copies a file or directory from the given container to the local file system. | // copyFromContainer copies a file or directory from the given container to the local file system. | ||||||
| // See the possible copy modes and their documentation. | // See the possible copy modes and their documentation. | ||||||
| func CopyFromContainer(cl *dockerClient.Client, containerID, srcPath, dstPath string) error { | func copyFromContainer(cl *dockerClient.Client, containerID, srcPath, dstPath string) error { | ||||||
| 	srcStat, err := cl.ContainerStatPath(context.Background(), containerID, srcPath) | 	srcStat, err := cl.ContainerStatPath(context.Background(), containerID, srcPath) | ||||||
| 	if err != nil { | 	if err != nil { | ||||||
| 		if errdefs.IsNotFound(err) { | 		if errdefs.IsNotFound(err) { | ||||||
|  | |||||||
							
								
								
									
										145
									
								
								cli/app/logs.go
									
									
									
									
									
								
							
							
						
						
									
										145
									
								
								cli/app/logs.go
									
									
									
									
									
								
							| @ -2,26 +2,75 @@ package app | |||||||
|  |  | ||||||
| import ( | import ( | ||||||
| 	"context" | 	"context" | ||||||
|  | 	"fmt" | ||||||
| 	"io" | 	"io" | ||||||
| 	"os" | 	"os" | ||||||
| 	"slices" |  | ||||||
| 	"sync" | 	"sync" | ||||||
| 	"time" |  | ||||||
|  |  | ||||||
| 	"coopcloud.tech/abra/cli/internal" | 	"coopcloud.tech/abra/cli/internal" | ||||||
| 	"coopcloud.tech/abra/pkg/autocomplete" | 	"coopcloud.tech/abra/pkg/autocomplete" | ||||||
| 	"coopcloud.tech/abra/pkg/client" | 	"coopcloud.tech/abra/pkg/client" | ||||||
| 	"coopcloud.tech/abra/pkg/config" | 	"coopcloud.tech/abra/pkg/config" | ||||||
| 	"coopcloud.tech/abra/pkg/recipe" | 	"coopcloud.tech/abra/pkg/recipe" | ||||||
|  | 	"coopcloud.tech/abra/pkg/service" | ||||||
| 	"coopcloud.tech/abra/pkg/upstream/stack" | 	"coopcloud.tech/abra/pkg/upstream/stack" | ||||||
| 	"github.com/docker/docker/api/types" | 	"github.com/docker/docker/api/types" | ||||||
| 	"github.com/docker/docker/api/types/filters" | 	"github.com/docker/docker/api/types/filters" | ||||||
| 	"github.com/docker/docker/api/types/swarm" |  | ||||||
| 	dockerClient "github.com/docker/docker/client" | 	dockerClient "github.com/docker/docker/client" | ||||||
| 	"github.com/sirupsen/logrus" | 	"github.com/sirupsen/logrus" | ||||||
| 	"github.com/urfave/cli" | 	"github.com/urfave/cli" | ||||||
| ) | ) | ||||||
|  |  | ||||||
|  | var logOpts = types.ContainerLogsOptions{ | ||||||
|  | 	ShowStderr: true, | ||||||
|  | 	ShowStdout: true, | ||||||
|  | 	Since:      "", | ||||||
|  | 	Until:      "", | ||||||
|  | 	Timestamps: true, | ||||||
|  | 	Follow:     true, | ||||||
|  | 	Tail:       "20", | ||||||
|  | 	Details:    false, | ||||||
|  | } | ||||||
|  |  | ||||||
|  | // stackLogs lists logs for all stack services | ||||||
|  | func stackLogs(c *cli.Context, app config.App, client *dockerClient.Client) { | ||||||
|  | 	filters, err := app.Filters(true, false) | ||||||
|  | 	if err != nil { | ||||||
|  | 		logrus.Fatal(err) | ||||||
|  | 	} | ||||||
|  |  | ||||||
|  | 	serviceOpts := types.ServiceListOptions{Filters: filters} | ||||||
|  | 	services, err := client.ServiceList(context.Background(), serviceOpts) | ||||||
|  | 	if err != nil { | ||||||
|  | 		logrus.Fatal(err) | ||||||
|  | 	} | ||||||
|  |  | ||||||
|  | 	var wg sync.WaitGroup | ||||||
|  | 	for _, service := range services { | ||||||
|  | 		wg.Add(1) | ||||||
|  | 		go func(s string) { | ||||||
|  | 			if internal.StdErrOnly { | ||||||
|  | 				logOpts.ShowStdout = false | ||||||
|  | 			} | ||||||
|  |  | ||||||
|  | 			logs, err := client.ServiceLogs(context.Background(), s, logOpts) | ||||||
|  | 			if err != nil { | ||||||
|  | 				logrus.Fatal(err) | ||||||
|  | 			} | ||||||
|  | 			defer logs.Close() | ||||||
|  |  | ||||||
|  | 			_, err = io.Copy(os.Stdout, logs) | ||||||
|  | 			if err != nil && err != io.EOF { | ||||||
|  | 				logrus.Fatal(err) | ||||||
|  | 			} | ||||||
|  | 		}(service.ID) | ||||||
|  | 	} | ||||||
|  |  | ||||||
|  | 	wg.Wait() | ||||||
|  |  | ||||||
|  | 	os.Exit(0) | ||||||
|  | } | ||||||
|  |  | ||||||
| var appLogsCommand = cli.Command{ | var appLogsCommand = cli.Command{ | ||||||
| 	Name:      "logs", | 	Name:      "logs", | ||||||
| 	Aliases:   []string{"l"}, | 	Aliases:   []string{"l"}, | ||||||
| @ -56,84 +105,46 @@ var appLogsCommand = cli.Command{ | |||||||
| 			logrus.Fatalf("%s is not deployed?", app.Name) | 			logrus.Fatalf("%s is not deployed?", app.Name) | ||||||
| 		} | 		} | ||||||
|  |  | ||||||
|  | 		logOpts.Since = internal.SinceLogs | ||||||
|  |  | ||||||
| 		serviceName := c.Args().Get(1) | 		serviceName := c.Args().Get(1) | ||||||
| 		serviceNames := []string{} | 		if serviceName == "" { | ||||||
| 		if serviceName != "" { | 			logrus.Debugf("tailing logs for all %s services", app.Recipe) | ||||||
| 			serviceNames = []string{serviceName} | 			stackLogs(c, app, cl) | ||||||
| 		} | 		} else { | ||||||
| 		err = tailLogs(cl, app, serviceNames) | 			logrus.Debugf("tailing logs for %s", serviceName) | ||||||
| 		if err != nil { | 			if err := tailServiceLogs(c, cl, app, serviceName); err != nil { | ||||||
| 			logrus.Fatal(err) | 				logrus.Fatal(err) | ||||||
|  | 			} | ||||||
| 		} | 		} | ||||||
|  |  | ||||||
| 		return nil | 		return nil | ||||||
| 	}, | 	}, | ||||||
| } | } | ||||||
|  |  | ||||||
| // tailLogs prints logs for the given app with optional service names to be | func tailServiceLogs(c *cli.Context, cl *dockerClient.Client, app config.App, serviceName string) error { | ||||||
| // filtered on. It also checks if the latest task is not runnning and then | 	filters := filters.NewArgs() | ||||||
| // prints the past tasks. | 	filters.Add("name", fmt.Sprintf("%s_%s", app.StackName(), serviceName)) | ||||||
| func tailLogs(cl *dockerClient.Client, app config.App, serviceNames []string) error { |  | ||||||
| 	f, err := app.Filters(true, false, serviceNames...) | 	chosenService, err := service.GetService(context.Background(), cl, filters, internal.NoInput) | ||||||
| 	if err != nil { | 	if err != nil { | ||||||
| 		return err | 		logrus.Fatal(err) | ||||||
| 	} | 	} | ||||||
|  |  | ||||||
| 	services, err := cl.ServiceList(context.Background(), types.ServiceListOptions{Filters: f}) | 	if internal.StdErrOnly { | ||||||
|  | 		logOpts.ShowStdout = false | ||||||
|  | 	} | ||||||
|  |  | ||||||
|  | 	logs, err := cl.ServiceLogs(context.Background(), chosenService.ID, logOpts) | ||||||
| 	if err != nil { | 	if err != nil { | ||||||
| 		return err | 		logrus.Fatal(err) | ||||||
| 	} | 	} | ||||||
|  | 	defer logs.Close() | ||||||
|  |  | ||||||
| 	var wg sync.WaitGroup | 	_, err = io.Copy(os.Stdout, logs) | ||||||
| 	for _, service := range services { | 	if err != nil && err != io.EOF { | ||||||
| 		filters := filters.NewArgs() | 		logrus.Fatal(err) | ||||||
| 		filters.Add("name", service.Spec.Name) |  | ||||||
| 		tasks, err := cl.TaskList(context.Background(), types.TaskListOptions{Filters: f}) |  | ||||||
| 		if err != nil { |  | ||||||
| 			return err |  | ||||||
| 		} |  | ||||||
| 		if len(tasks) > 0 { |  | ||||||
| 			// Need to sort the tasks by the CreatedAt field in the inverse order. |  | ||||||
| 			// Otherwise they are in the reversed order and not sorted properly. |  | ||||||
| 			slices.SortFunc[[]swarm.Task](tasks, func(t1, t2 swarm.Task) int { |  | ||||||
| 				return int(t2.Meta.CreatedAt.Unix() - t1.Meta.CreatedAt.Unix()) |  | ||||||
| 			}) |  | ||||||
| 			lastTask := tasks[0].Status |  | ||||||
| 			if lastTask.State != swarm.TaskStateRunning { |  | ||||||
| 				for _, task := range tasks { |  | ||||||
| 					logrus.Errorf("[%s] %s State %s: %s", service.Spec.Name, task.Meta.CreatedAt.Format(time.RFC3339), task.Status.State, task.Status.Err) |  | ||||||
| 				} |  | ||||||
| 			} |  | ||||||
| 		} |  | ||||||
|  |  | ||||||
| 		// Collect the logs in a go routine, so the logs from all services are |  | ||||||
| 		// collected in parallel. |  | ||||||
| 		wg.Add(1) |  | ||||||
| 		go func(serviceID string) { |  | ||||||
| 			logs, err := cl.ServiceLogs(context.Background(), serviceID, types.ContainerLogsOptions{ |  | ||||||
| 				ShowStderr: true, |  | ||||||
| 				ShowStdout: !internal.StdErrOnly, |  | ||||||
| 				Since:      internal.SinceLogs, |  | ||||||
| 				Until:      "", |  | ||||||
| 				Timestamps: true, |  | ||||||
| 				Follow:     true, |  | ||||||
| 				Tail:       "20", |  | ||||||
| 				Details:    false, |  | ||||||
| 			}) |  | ||||||
| 			if err != nil { |  | ||||||
| 				logrus.Fatal(err) |  | ||||||
| 			} |  | ||||||
| 			defer logs.Close() |  | ||||||
|  |  | ||||||
| 			_, err = io.Copy(os.Stdout, logs) |  | ||||||
| 			if err != nil && err != io.EOF { |  | ||||||
| 				logrus.Fatal(err) |  | ||||||
| 			} |  | ||||||
| 		}(service.ID) |  | ||||||
| 	} | 	} | ||||||
|  |  | ||||||
| 	// Wait for all log streams to be closed. |  | ||||||
| 	wg.Wait() |  | ||||||
|  |  | ||||||
| 	return nil | 	return nil | ||||||
| } | } | ||||||
|  | |||||||
| @ -54,17 +54,9 @@ var appNewCommand = cli.Command{ | |||||||
| 		internal.OfflineFlag, | 		internal.OfflineFlag, | ||||||
| 		internal.ChaosFlag, | 		internal.ChaosFlag, | ||||||
| 	}, | 	}, | ||||||
| 	Before:    internal.SubCommandBefore, | 	Before:       internal.SubCommandBefore, | ||||||
| 	ArgsUsage: "[<recipe>] [<version>]", | 	ArgsUsage:    "[<recipe>]", | ||||||
| 	BashComplete: func(ctx *cli.Context) { | 	BashComplete: autocomplete.RecipeNameComplete, | ||||||
| 		args := ctx.Args() |  | ||||||
| 		switch len(args) { |  | ||||||
| 		case 0: |  | ||||||
| 			autocomplete.RecipeNameComplete(ctx) |  | ||||||
| 		case 1: |  | ||||||
| 			autocomplete.RecipeVersionComplete(ctx.Args().Get(0)) |  | ||||||
| 		} |  | ||||||
| 	}, |  | ||||||
| 	Action: func(c *cli.Context) error { | 	Action: func(c *cli.Context) error { | ||||||
| 		recipe := internal.ValidateRecipe(c) | 		recipe := internal.ValidateRecipe(c) | ||||||
|  |  | ||||||
| @ -77,14 +69,8 @@ var appNewCommand = cli.Command{ | |||||||
| 					logrus.Fatal(err) | 					logrus.Fatal(err) | ||||||
| 				} | 				} | ||||||
| 			} | 			} | ||||||
| 			if c.Args().Get(1) == "" { | 			if err := recipePkg.EnsureLatest(recipe.Name); err != nil { | ||||||
| 				if err := recipePkg.EnsureLatest(recipe.Name); err != nil { | 				logrus.Fatal(err) | ||||||
| 					logrus.Fatal(err) |  | ||||||
| 				} |  | ||||||
| 			} else { |  | ||||||
| 				if err := recipePkg.EnsureVersion(recipe.Name, c.Args().Get(1)); err != nil { |  | ||||||
| 					logrus.Fatal(err) |  | ||||||
| 				} |  | ||||||
| 			} | 			} | ||||||
| 		} | 		} | ||||||
|  |  | ||||||
| @ -122,7 +108,7 @@ var appNewCommand = cli.Command{ | |||||||
| 			} | 			} | ||||||
|  |  | ||||||
| 			envSamplePath := path.Join(config.RECIPES_DIR, recipe.Name, ".env.sample") | 			envSamplePath := path.Join(config.RECIPES_DIR, recipe.Name, ".env.sample") | ||||||
| 			secretsConfig, err := secret.ReadSecretsConfig(envSamplePath, composeFiles, config.StackName(internal.Domain)) | 			secretsConfig, err := secret.ReadSecretsConfig(envSamplePath, composeFiles, recipe.Name) | ||||||
| 			if err != nil { | 			if err != nil { | ||||||
| 				return err | 				return err | ||||||
| 			} | 			} | ||||||
| @ -182,8 +168,14 @@ var appNewCommand = cli.Command{ | |||||||
| type AppSecrets map[string]string | type AppSecrets map[string]string | ||||||
|  |  | ||||||
| // createSecrets creates all secrets for a new app. | // createSecrets creates all secrets for a new app. | ||||||
| func createSecrets(cl *dockerClient.Client, secretsConfig map[string]secret.Secret, sanitisedAppName string) (AppSecrets, error) { | func createSecrets(cl *dockerClient.Client, secretsConfig map[string]secret.SecretValue, sanitisedAppName string) (AppSecrets, error) { | ||||||
| 	secrets, err := secret.GenerateSecrets(cl, secretsConfig, internal.NewAppServer) | 	// NOTE(d1): trim to match app.StackName() implementation | ||||||
|  | 	if len(sanitisedAppName) > 45 { | ||||||
|  | 		logrus.Debugf("trimming %s to %s to avoid runtime limits", sanitisedAppName, sanitisedAppName[:45]) | ||||||
|  | 		sanitisedAppName = sanitisedAppName[:45] | ||||||
|  | 	} | ||||||
|  |  | ||||||
|  | 	secrets, err := secret.GenerateSecrets(cl, secretsConfig, sanitisedAppName, internal.NewAppServer) | ||||||
| 	if err != nil { | 	if err != nil { | ||||||
| 		return nil, err | 		return nil, err | ||||||
| 	} | 	} | ||||||
| @ -225,7 +217,7 @@ func ensureDomainFlag(recipe recipe.Recipe, server string) error { | |||||||
| } | } | ||||||
|  |  | ||||||
| // promptForSecrets asks if we should generate secrets for a new app. | // promptForSecrets asks if we should generate secrets for a new app. | ||||||
| func promptForSecrets(recipeName string, secretsConfig map[string]secret.Secret) error { | func promptForSecrets(recipeName string, secretsConfig map[string]secret.SecretValue) error { | ||||||
| 	if len(secretsConfig) == 0 { | 	if len(secretsConfig) == 0 { | ||||||
| 		logrus.Debugf("%s has no secrets to generate, skipping...", recipeName) | 		logrus.Debugf("%s has no secrets to generate, skipping...", recipeName) | ||||||
| 		return nil | 		return nil | ||||||
|  | |||||||
| @ -3,9 +3,7 @@ package app | |||||||
| import ( | import ( | ||||||
| 	"context" | 	"context" | ||||||
| 	"fmt" | 	"fmt" | ||||||
| 	"log" |  | ||||||
| 	"os" | 	"os" | ||||||
| 	"time" |  | ||||||
|  |  | ||||||
| 	"coopcloud.tech/abra/cli/internal" | 	"coopcloud.tech/abra/cli/internal" | ||||||
| 	"coopcloud.tech/abra/pkg/autocomplete" | 	"coopcloud.tech/abra/pkg/autocomplete" | ||||||
| @ -126,11 +124,9 @@ flag. | |||||||
|  |  | ||||||
| 		if len(vols) > 0 { | 		if len(vols) > 0 { | ||||||
| 			for _, vol := range vols { | 			for _, vol := range vols { | ||||||
| 				err = retryFunc(5, func() error { | 				err := cl.VolumeRemove(context.Background(), vol, internal.Force) // last argument is for force removing | ||||||
| 					return cl.VolumeRemove(context.Background(), vol, internal.Force) // last argument is for force removing |  | ||||||
| 				}) |  | ||||||
| 				if err != nil { | 				if err != nil { | ||||||
| 					log.Fatalf("removing volumes failed: %s", err) | 					logrus.Fatal(err) | ||||||
| 				} | 				} | ||||||
| 				logrus.Info(fmt.Sprintf("volume %s removed", vol)) | 				logrus.Info(fmt.Sprintf("volume %s removed", vol)) | ||||||
| 			} | 			} | ||||||
| @ -147,21 +143,3 @@ flag. | |||||||
| 		return nil | 		return nil | ||||||
| 	}, | 	}, | ||||||
| } | } | ||||||
|  |  | ||||||
| // retryFunc retries the given function for the given retries. After the nth |  | ||||||
| // retry it waits (n + 1)^2 seconds before the next retry (starting with n=0). |  | ||||||
| // It returns an error if the function still failed after the last retry. |  | ||||||
| func retryFunc(retries int, fn func() error) error { |  | ||||||
| 	for i := 0; i < retries; i++ { |  | ||||||
| 		err := fn() |  | ||||||
| 		if err == nil { |  | ||||||
| 			return nil |  | ||||||
| 		} |  | ||||||
| 		if i+1 < retries { |  | ||||||
| 			sleep := time.Duration(i+1) * time.Duration(i+1) |  | ||||||
| 			logrus.Infof("%s: waiting %d seconds before next retry", err, sleep) |  | ||||||
| 			time.Sleep(sleep * time.Second) |  | ||||||
| 		} |  | ||||||
| 	} |  | ||||||
| 	return fmt.Errorf("%d retries failed", retries) |  | ||||||
| } |  | ||||||
|  | |||||||
| @ -1,26 +0,0 @@ | |||||||
| package app |  | ||||||
|  |  | ||||||
| import ( |  | ||||||
| 	"fmt" |  | ||||||
| 	"testing" |  | ||||||
| ) |  | ||||||
|  |  | ||||||
| func TestRetryFunc(t *testing.T) { |  | ||||||
| 	err := retryFunc(1, func() error { return nil }) |  | ||||||
| 	if err != nil { |  | ||||||
| 		t.Errorf("should not return an error: %s", err) |  | ||||||
| 	} |  | ||||||
|  |  | ||||||
| 	i := 0 |  | ||||||
| 	fn := func() error { |  | ||||||
| 		i++ |  | ||||||
| 		return fmt.Errorf("oh no, something went wrong!") |  | ||||||
| 	} |  | ||||||
| 	err = retryFunc(2, fn) |  | ||||||
| 	if err == nil { |  | ||||||
| 		t.Error("should return an error") |  | ||||||
| 	} |  | ||||||
| 	if i != 2 { |  | ||||||
| 		t.Errorf("The function should have been called 1 times, got %d", i) |  | ||||||
| 	} |  | ||||||
| } |  | ||||||
| @ -1,82 +1,223 @@ | |||||||
| package app | package app | ||||||
|  |  | ||||||
| import ( | import ( | ||||||
|  | 	"context" | ||||||
|  | 	"errors" | ||||||
| 	"fmt" | 	"fmt" | ||||||
|  | 	"os" | ||||||
|  |  | ||||||
| 	"coopcloud.tech/abra/cli/internal" | 	"coopcloud.tech/abra/cli/internal" | ||||||
| 	"coopcloud.tech/abra/pkg/autocomplete" | 	"coopcloud.tech/abra/pkg/autocomplete" | ||||||
| 	"coopcloud.tech/abra/pkg/client" | 	"coopcloud.tech/abra/pkg/client" | ||||||
|  | 	"coopcloud.tech/abra/pkg/config" | ||||||
|  | 	containerPkg "coopcloud.tech/abra/pkg/container" | ||||||
| 	"coopcloud.tech/abra/pkg/recipe" | 	"coopcloud.tech/abra/pkg/recipe" | ||||||
|  | 	recipePkg "coopcloud.tech/abra/pkg/recipe" | ||||||
|  | 	"coopcloud.tech/abra/pkg/upstream/container" | ||||||
|  | 	"github.com/docker/cli/cli/command" | ||||||
|  | 	"github.com/docker/docker/api/types" | ||||||
|  | 	"github.com/docker/docker/api/types/filters" | ||||||
|  | 	dockerClient "github.com/docker/docker/client" | ||||||
|  | 	"github.com/docker/docker/pkg/archive" | ||||||
| 	"github.com/sirupsen/logrus" | 	"github.com/sirupsen/logrus" | ||||||
| 	"github.com/urfave/cli" | 	"github.com/urfave/cli" | ||||||
| ) | ) | ||||||
|  |  | ||||||
| var targetPath string | type restoreConfig struct { | ||||||
| var targetPathFlag = &cli.StringFlag{ | 	preHookCmd  string | ||||||
| 	Name:        "target, t", | 	postHookCmd string | ||||||
| 	Usage:       "Target path", |  | ||||||
| 	Destination: &targetPath, |  | ||||||
| } | } | ||||||
|  |  | ||||||
| var appRestoreCommand = cli.Command{ | var appRestoreCommand = cli.Command{ | ||||||
| 	Name:      "restore", | 	Name:      "restore", | ||||||
| 	Aliases:   []string{"rs"}, | 	Aliases:   []string{"rs"}, | ||||||
| 	Usage:     "Restore an app backup", | 	Usage:     "Run app restore", | ||||||
| 	ArgsUsage: "<domain> <service>", | 	ArgsUsage: "<domain> <service> <file>", | ||||||
| 	Flags: []cli.Flag{ | 	Flags: []cli.Flag{ | ||||||
| 		internal.DebugFlag, | 		internal.DebugFlag, | ||||||
| 		internal.OfflineFlag, | 		internal.OfflineFlag, | ||||||
| 		targetPathFlag, | 		internal.ChaosFlag, | ||||||
| 	}, | 	}, | ||||||
| 	Before:       internal.SubCommandBefore, | 	Before:       internal.SubCommandBefore, | ||||||
| 	BashComplete: autocomplete.AppNameComplete, | 	BashComplete: autocomplete.AppNameComplete, | ||||||
|  | 	Description: ` | ||||||
|  | Run an app restore. | ||||||
|  |  | ||||||
|  | Pre/post hook commands are defined in the recipe configuration. Abra reads this | ||||||
|  | configuration and run the comands in the context of the service before | ||||||
|  | restoring the backup. | ||||||
|  |  | ||||||
|  | Unlike "abra app backup", restore must be run on a per-service basis. You can | ||||||
|  | not restore all services in one go. Backup files produced by Abra are | ||||||
|  | compressed archives which use absolute paths. This allows Abra to restore | ||||||
|  | according to standard tar command logic, i.e. the backup will be restored to | ||||||
|  | the path it was originally backed up from. | ||||||
|  |  | ||||||
|  | Example: | ||||||
|  |  | ||||||
|  |     abra app restore example.com app ~/.abra/backups/example_com_app_609341138.tar.gz | ||||||
|  | `, | ||||||
| 	Action: func(c *cli.Context) error { | 	Action: func(c *cli.Context) error { | ||||||
| 		app := internal.ValidateApp(c) | 		app := internal.ValidateApp(c) | ||||||
|  |  | ||||||
| 		if err := recipe.EnsureExists(app.Recipe); err != nil { | 		recipe, err := recipe.Get(app.Recipe, internal.Offline) | ||||||
|  | 		if err != nil { | ||||||
| 			logrus.Fatal(err) | 			logrus.Fatal(err) | ||||||
| 		} | 		} | ||||||
|  |  | ||||||
| 		if !internal.Chaos { | 		if !internal.Chaos { | ||||||
| 			if err := recipe.EnsureIsClean(app.Recipe); err != nil { | 			if err := recipePkg.EnsureIsClean(app.Recipe); err != nil { | ||||||
| 				logrus.Fatal(err) | 				logrus.Fatal(err) | ||||||
| 			} | 			} | ||||||
|  |  | ||||||
| 			if !internal.Offline { | 			if !internal.Offline { | ||||||
| 				if err := recipe.EnsureUpToDate(app.Recipe); err != nil { | 				if err := recipePkg.EnsureUpToDate(app.Recipe); err != nil { | ||||||
| 					logrus.Fatal(err) | 					logrus.Fatal(err) | ||||||
| 				} | 				} | ||||||
| 			} | 			} | ||||||
|  |  | ||||||
| 			if err := recipe.EnsureLatest(app.Recipe); err != nil { | 			if err := recipePkg.EnsureLatest(app.Recipe); err != nil { | ||||||
| 				logrus.Fatal(err) | 				logrus.Fatal(err) | ||||||
| 			} | 			} | ||||||
| 		} | 		} | ||||||
|  |  | ||||||
|  | 		serviceName := c.Args().Get(1) | ||||||
|  | 		if serviceName == "" { | ||||||
|  | 			internal.ShowSubcommandHelpAndError(c, errors.New("missing <service>?")) | ||||||
|  | 		} | ||||||
|  |  | ||||||
|  | 		backupPath := c.Args().Get(2) | ||||||
|  | 		if backupPath == "" { | ||||||
|  | 			internal.ShowSubcommandHelpAndError(c, errors.New("missing <file>?")) | ||||||
|  | 		} | ||||||
|  |  | ||||||
|  | 		if _, err := os.Stat(backupPath); err != nil { | ||||||
|  | 			if os.IsNotExist(err) { | ||||||
|  | 				logrus.Fatalf("%s doesn't exist?", backupPath) | ||||||
|  | 			} | ||||||
|  | 		} | ||||||
|  |  | ||||||
|  | 		restoreConfigs := make(map[string]restoreConfig) | ||||||
|  | 		for _, service := range recipe.Config.Services { | ||||||
|  | 			if restoreEnabled, ok := service.Deploy.Labels["backupbot.restore"]; ok { | ||||||
|  | 				if restoreEnabled == "true" { | ||||||
|  | 					fullServiceName := fmt.Sprintf("%s_%s", app.StackName(), service.Name) | ||||||
|  | 					rsConfig := restoreConfig{} | ||||||
|  |  | ||||||
|  | 					logrus.Debugf("restore config detected for %s", fullServiceName) | ||||||
|  |  | ||||||
|  | 					if preHookCmd, ok := service.Deploy.Labels["backupbot.restore.pre-hook"]; ok { | ||||||
|  | 						logrus.Debugf("detected pre-hook command for %s: %s", fullServiceName, preHookCmd) | ||||||
|  | 						rsConfig.preHookCmd = preHookCmd | ||||||
|  | 					} | ||||||
|  |  | ||||||
|  | 					if postHookCmd, ok := service.Deploy.Labels["backupbot.restore.post-hook"]; ok { | ||||||
|  | 						logrus.Debugf("detected post-hook command for %s: %s", fullServiceName, postHookCmd) | ||||||
|  | 						rsConfig.postHookCmd = postHookCmd | ||||||
|  | 					} | ||||||
|  |  | ||||||
|  | 					restoreConfigs[service.Name] = rsConfig | ||||||
|  | 				} | ||||||
|  | 			} | ||||||
|  | 		} | ||||||
|  |  | ||||||
|  | 		rsConfig, ok := restoreConfigs[serviceName] | ||||||
|  | 		if !ok { | ||||||
|  | 			rsConfig = restoreConfig{} | ||||||
|  | 		} | ||||||
|  |  | ||||||
| 		cl, err := client.New(app.Server) | 		cl, err := client.New(app.Server) | ||||||
| 		if err != nil { | 		if err != nil { | ||||||
| 			logrus.Fatal(err) | 			logrus.Fatal(err) | ||||||
| 		} | 		} | ||||||
|  |  | ||||||
| 		targetContainer, err := internal.RetrieveBackupBotContainer(cl) | 		if err := runRestore(cl, app, backupPath, serviceName, rsConfig); err != nil { | ||||||
| 		if err != nil { |  | ||||||
| 			logrus.Fatal(err) |  | ||||||
| 		} |  | ||||||
|  |  | ||||||
| 		execEnv := []string{fmt.Sprintf("SERVICE=%s", app.Domain)} |  | ||||||
| 		if snapshot != "" { |  | ||||||
| 			logrus.Debugf("including SNAPSHOT=%s in backupbot exec invocation", snapshot) |  | ||||||
| 			execEnv = append(execEnv, fmt.Sprintf("SNAPSHOT=%s", snapshot)) |  | ||||||
| 		} |  | ||||||
| 		if targetPath != "" { |  | ||||||
| 			logrus.Debugf("including TARGET=%s in backupbot exec invocation", targetPath) |  | ||||||
| 			execEnv = append(execEnv, fmt.Sprintf("TARGET=%s", targetPath)) |  | ||||||
| 		} |  | ||||||
|  |  | ||||||
| 		if err := internal.RunBackupCmdRemote(cl, "restore", targetContainer.ID, execEnv); err != nil { |  | ||||||
| 			logrus.Fatal(err) | 			logrus.Fatal(err) | ||||||
| 		} | 		} | ||||||
|  |  | ||||||
| 		return nil | 		return nil | ||||||
| 	}, | 	}, | ||||||
| } | } | ||||||
|  |  | ||||||
|  | // runRestore does the actual restore logic. | ||||||
|  | func runRestore(cl *dockerClient.Client, app config.App, backupPath, serviceName string, rsConfig restoreConfig) error { | ||||||
|  | 	// FIXME: avoid instantiating a new CLI | ||||||
|  | 	dcli, err := command.NewDockerCli() | ||||||
|  | 	if err != nil { | ||||||
|  | 		return err | ||||||
|  | 	} | ||||||
|  |  | ||||||
|  | 	filters := filters.NewArgs() | ||||||
|  | 	filters.Add("name", fmt.Sprintf("^%s_%s", app.StackName(), serviceName)) | ||||||
|  |  | ||||||
|  | 	targetContainer, err := containerPkg.GetContainer(context.Background(), cl, filters, true) | ||||||
|  | 	if err != nil { | ||||||
|  | 		return err | ||||||
|  | 	} | ||||||
|  |  | ||||||
|  | 	fullServiceName := fmt.Sprintf("%s_%s", app.StackName(), serviceName) | ||||||
|  | 	if rsConfig.preHookCmd != "" { | ||||||
|  | 		splitCmd := internal.SafeSplit(rsConfig.preHookCmd) | ||||||
|  |  | ||||||
|  | 		logrus.Debugf("split pre-hook command for %s into %s", fullServiceName, splitCmd) | ||||||
|  |  | ||||||
|  | 		preHookExecOpts := types.ExecConfig{ | ||||||
|  | 			AttachStderr: true, | ||||||
|  | 			AttachStdin:  true, | ||||||
|  | 			AttachStdout: true, | ||||||
|  | 			Cmd:          splitCmd, | ||||||
|  | 			Detach:       false, | ||||||
|  | 			Tty:          true, | ||||||
|  | 		} | ||||||
|  |  | ||||||
|  | 		if err := container.RunExec(dcli, cl, targetContainer.ID, &preHookExecOpts); err != nil { | ||||||
|  | 			return err | ||||||
|  | 		} | ||||||
|  |  | ||||||
|  | 		logrus.Infof("succesfully ran %s pre-hook command: %s", fullServiceName, rsConfig.preHookCmd) | ||||||
|  | 	} | ||||||
|  |  | ||||||
|  | 	backupReader, err := os.Open(backupPath) | ||||||
|  | 	if err != nil { | ||||||
|  | 		return err | ||||||
|  | 	} | ||||||
|  |  | ||||||
|  | 	content, err := archive.DecompressStream(backupReader) | ||||||
|  | 	if err != nil { | ||||||
|  | 		return err | ||||||
|  | 	} | ||||||
|  |  | ||||||
|  | 	// NOTE(d1): we use absolute paths so tar knows what to do. it will restore | ||||||
|  | 	// files according to the paths set in the compressed archive | ||||||
|  | 	restorePath := "/" | ||||||
|  |  | ||||||
|  | 	copyOpts := types.CopyToContainerOptions{AllowOverwriteDirWithFile: false, CopyUIDGID: false} | ||||||
|  | 	if err := cl.CopyToContainer(context.Background(), targetContainer.ID, restorePath, content, copyOpts); err != nil { | ||||||
|  | 		return err | ||||||
|  | 	} | ||||||
|  |  | ||||||
|  | 	logrus.Infof("restored %s to %s", backupPath, fullServiceName) | ||||||
|  |  | ||||||
|  | 	if rsConfig.postHookCmd != "" { | ||||||
|  | 		splitCmd := internal.SafeSplit(rsConfig.postHookCmd) | ||||||
|  |  | ||||||
|  | 		logrus.Debugf("split post-hook command for %s into %s", fullServiceName, splitCmd) | ||||||
|  |  | ||||||
|  | 		postHookExecOpts := types.ExecConfig{ | ||||||
|  | 			AttachStderr: true, | ||||||
|  | 			AttachStdin:  true, | ||||||
|  | 			AttachStdout: true, | ||||||
|  | 			Cmd:          splitCmd, | ||||||
|  | 			Detach:       false, | ||||||
|  | 			Tty:          true, | ||||||
|  | 		} | ||||||
|  |  | ||||||
|  | 		if err := container.RunExec(dcli, cl, targetContainer.ID, &postHookExecOpts); err != nil { | ||||||
|  | 			return err | ||||||
|  | 		} | ||||||
|  |  | ||||||
|  | 		logrus.Infof("succesfully ran %s post-hook command: %s", fullServiceName, rsConfig.postHookCmd) | ||||||
|  | 	} | ||||||
|  |  | ||||||
|  | 	return nil | ||||||
|  | } | ||||||
|  | |||||||
| @ -91,7 +91,7 @@ var appRunCommand = cli.Command{ | |||||||
| 			logrus.Fatal(err) | 			logrus.Fatal(err) | ||||||
| 		} | 		} | ||||||
|  |  | ||||||
| 		if _, err := container.RunExec(dcli, cl, targetContainer.ID, &execCreateOpts); err != nil { | 		if err := container.RunExec(dcli, cl, targetContainer.ID, &execCreateOpts); err != nil { | ||||||
| 			logrus.Fatal(err) | 			logrus.Fatal(err) | ||||||
| 		} | 		} | ||||||
|  |  | ||||||
|  | |||||||
| @ -91,7 +91,7 @@ var appSecretGenerateCommand = cli.Command{ | |||||||
| 			logrus.Fatal(err) | 			logrus.Fatal(err) | ||||||
| 		} | 		} | ||||||
|  |  | ||||||
| 		secrets, err := secret.ReadSecretsConfig(app.Path, composeFiles, app.StackName()) | 		secrets, err := secret.ReadSecretsConfig(app.Path, composeFiles, app.Recipe) | ||||||
| 		if err != nil { | 		if err != nil { | ||||||
| 			logrus.Fatal(err) | 			logrus.Fatal(err) | ||||||
| 		} | 		} | ||||||
| @ -104,7 +104,7 @@ var appSecretGenerateCommand = cli.Command{ | |||||||
| 				logrus.Fatalf("%s doesn't exist in the env config?", secretName) | 				logrus.Fatalf("%s doesn't exist in the env config?", secretName) | ||||||
| 			} | 			} | ||||||
| 			s.Version = secretVersion | 			s.Version = secretVersion | ||||||
| 			secrets = map[string]secret.Secret{ | 			secrets = map[string]secret.SecretValue{ | ||||||
| 				secretName: s, | 				secretName: s, | ||||||
| 			} | 			} | ||||||
| 		} | 		} | ||||||
| @ -114,7 +114,7 @@ var appSecretGenerateCommand = cli.Command{ | |||||||
| 			logrus.Fatal(err) | 			logrus.Fatal(err) | ||||||
| 		} | 		} | ||||||
|  |  | ||||||
| 		secretVals, err := secret.GenerateSecrets(cl, secrets, app.Server) | 		secretVals, err := secret.GenerateSecrets(cl, secrets, app.StackName(), app.Server) | ||||||
| 		if err != nil { | 		if err != nil { | ||||||
| 			logrus.Fatal(err) | 			logrus.Fatal(err) | ||||||
| 		} | 		} | ||||||
| @ -274,7 +274,7 @@ Example: | |||||||
| 			logrus.Fatal(err) | 			logrus.Fatal(err) | ||||||
| 		} | 		} | ||||||
|  |  | ||||||
| 		secrets, err := secret.ReadSecretsConfig(app.Path, composeFiles, app.StackName()) | 		secrets, err := secret.ReadSecretsConfig(app.Path, composeFiles, app.Recipe) | ||||||
| 		if err != nil { | 		if err != nil { | ||||||
| 			logrus.Fatal(err) | 			logrus.Fatal(err) | ||||||
| 		} | 		} | ||||||
|  | |||||||
| @ -1,67 +1,35 @@ | |||||||
| package internal | package internal | ||||||
|  |  | ||||||
| import ( | import ( | ||||||
| 	"context" | 	"strings" | ||||||
|  |  | ||||||
| 	"coopcloud.tech/abra/pkg/config" |  | ||||||
| 	containerPkg "coopcloud.tech/abra/pkg/container" |  | ||||||
| 	"coopcloud.tech/abra/pkg/service" |  | ||||||
| 	"coopcloud.tech/abra/pkg/upstream/container" |  | ||||||
| 	"github.com/docker/cli/cli/command" |  | ||||||
| 	"github.com/docker/docker/api/types" |  | ||||||
| 	"github.com/docker/docker/api/types/filters" |  | ||||||
| 	dockerClient "github.com/docker/docker/client" |  | ||||||
| 	"github.com/sirupsen/logrus" |  | ||||||
| ) | ) | ||||||
|  |  | ||||||
| // RetrieveBackupBotContainer gets the deployed backupbot container. | // SafeSplit splits up a string into a list of commands safely. | ||||||
| func RetrieveBackupBotContainer(cl *dockerClient.Client) (types.Container, error) { | func SafeSplit(s string) []string { | ||||||
| 	ctx := context.Background() | 	split := strings.Split(s, " ") | ||||||
| 	chosenService, err := service.GetServiceByLabel(ctx, cl, config.BackupbotLabel, NoInput) |  | ||||||
| 	if err != nil { | 	var result []string | ||||||
| 		return types.Container{}, err | 	var inquote string | ||||||
|  | 	var block string | ||||||
|  | 	for _, i := range split { | ||||||
|  | 		if inquote == "" { | ||||||
|  | 			if strings.HasPrefix(i, "'") || strings.HasPrefix(i, "\"") { | ||||||
|  | 				inquote = string(i[0]) | ||||||
|  | 				block = strings.TrimPrefix(i, inquote) + " " | ||||||
|  | 			} else { | ||||||
|  | 				result = append(result, i) | ||||||
|  | 			} | ||||||
|  | 		} else { | ||||||
|  | 			if !strings.HasSuffix(i, inquote) { | ||||||
|  | 				block += i + " " | ||||||
|  | 			} else { | ||||||
|  | 				block += strings.TrimSuffix(i, inquote) | ||||||
|  | 				inquote = "" | ||||||
|  | 				result = append(result, block) | ||||||
|  | 				block = "" | ||||||
|  | 			} | ||||||
|  | 		} | ||||||
| 	} | 	} | ||||||
|  |  | ||||||
| 	logrus.Debugf("retrieved %s as backup enabled service", chosenService.Spec.Name) | 	return result | ||||||
|  |  | ||||||
| 	filters := filters.NewArgs() |  | ||||||
| 	filters.Add("name", chosenService.Spec.Name) |  | ||||||
| 	targetContainer, err := containerPkg.GetContainer( |  | ||||||
| 		ctx, |  | ||||||
| 		cl, |  | ||||||
| 		filters, |  | ||||||
| 		NoInput, |  | ||||||
| 	) |  | ||||||
| 	if err != nil { |  | ||||||
| 		return types.Container{}, err |  | ||||||
| 	} |  | ||||||
|  |  | ||||||
| 	return targetContainer, nil |  | ||||||
| } |  | ||||||
|  |  | ||||||
| // RunBackupCmdRemote runs a backup related command on a remote backupbot container. |  | ||||||
| func RunBackupCmdRemote(cl *dockerClient.Client, backupCmd string, containerID string, execEnv []string) error { |  | ||||||
| 	execBackupListOpts := types.ExecConfig{ |  | ||||||
| 		AttachStderr: true, |  | ||||||
| 		AttachStdin:  true, |  | ||||||
| 		AttachStdout: true, |  | ||||||
| 		Cmd:          []string{"/usr/bin/backup", "--", backupCmd}, |  | ||||||
| 		Detach:       false, |  | ||||||
| 		Env:          execEnv, |  | ||||||
| 		Tty:          true, |  | ||||||
| 	} |  | ||||||
|  |  | ||||||
| 	logrus.Debugf("running backup %s on %s with exec config %v", backupCmd, containerID, execBackupListOpts) |  | ||||||
|  |  | ||||||
| 	// FIXME: avoid instantiating a new CLI |  | ||||||
| 	dcli, err := command.NewDockerCli() |  | ||||||
| 	if err != nil { |  | ||||||
| 		return err |  | ||||||
| 	} |  | ||||||
|  |  | ||||||
| 	if _, err := container.RunExec(dcli, cl, containerID, &execBackupListOpts); err != nil { |  | ||||||
| 		return err |  | ||||||
| 	} |  | ||||||
|  |  | ||||||
| 	return nil |  | ||||||
| } | } | ||||||
|  | |||||||
| @ -238,22 +238,6 @@ var RemoteUserFlag = &cli.StringFlag{ | |||||||
| 	Destination: &RemoteUser, | 	Destination: &RemoteUser, | ||||||
| } | } | ||||||
|  |  | ||||||
| var GitName string |  | ||||||
| var GitNameFlag = &cli.StringFlag{ |  | ||||||
| 	Name:        "git-name, gn", |  | ||||||
| 	Value:       "", |  | ||||||
| 	Usage:       "Git (user) name to do commits with", |  | ||||||
| 	Destination: &GitName, |  | ||||||
| } |  | ||||||
|  |  | ||||||
| var GitEmail string |  | ||||||
| var GitEmailFlag = &cli.StringFlag{ |  | ||||||
| 	Name:        "git-email, ge", |  | ||||||
| 	Value:       "", |  | ||||||
| 	Usage:       "Git email name to do commits with", |  | ||||||
| 	Destination: &GitEmail, |  | ||||||
| } |  | ||||||
|  |  | ||||||
| // SubCommandBefore wires up pre-action machinery (e.g. --debug handling). | // SubCommandBefore wires up pre-action machinery (e.g. --debug handling). | ||||||
| func SubCommandBefore(c *cli.Context) error { | func SubCommandBefore(c *cli.Context) error { | ||||||
| 	if Debug { | 	if Debug { | ||||||
|  | |||||||
| @ -60,7 +60,7 @@ func RunCmdRemote(cl *dockerClient.Client, app config.App, abraSh, serviceName, | |||||||
| 		Tty:          false, | 		Tty:          false, | ||||||
| 	} | 	} | ||||||
|  |  | ||||||
| 	if _, err := container.RunExec(dcli, cl, targetContainer.ID, &execCreateOpts); err != nil { | 	if err := container.RunExec(dcli, cl, targetContainer.ID, &execCreateOpts); err != nil { | ||||||
| 		logrus.Infof("%s does not exist for %s, use /bin/sh as fallback", shell, app.Name) | 		logrus.Infof("%s does not exist for %s, use /bin/sh as fallback", shell, app.Name) | ||||||
| 		shell = "/bin/sh" | 		shell = "/bin/sh" | ||||||
| 	} | 	} | ||||||
| @ -85,7 +85,7 @@ func RunCmdRemote(cl *dockerClient.Client, app config.App, abraSh, serviceName, | |||||||
| 		execCreateOpts.Tty = false | 		execCreateOpts.Tty = false | ||||||
| 	} | 	} | ||||||
|  |  | ||||||
| 	if _, err := container.RunExec(dcli, cl, targetContainer.ID, &execCreateOpts); err != nil { | 	if err := container.RunExec(dcli, cl, targetContainer.ID, &execCreateOpts); err != nil { | ||||||
| 		return err | 		return err | ||||||
| 	} | 	} | ||||||
|  |  | ||||||
|  | |||||||
| @ -3,7 +3,6 @@ package recipe | |||||||
| import ( | import ( | ||||||
| 	"coopcloud.tech/abra/cli/internal" | 	"coopcloud.tech/abra/cli/internal" | ||||||
| 	"coopcloud.tech/abra/pkg/autocomplete" | 	"coopcloud.tech/abra/pkg/autocomplete" | ||||||
| 	"coopcloud.tech/abra/pkg/formatter" |  | ||||||
| 	"coopcloud.tech/abra/pkg/recipe" | 	"coopcloud.tech/abra/pkg/recipe" | ||||||
| 	"github.com/sirupsen/logrus" | 	"github.com/sirupsen/logrus" | ||||||
| 	"github.com/urfave/cli" | 	"github.com/urfave/cli" | ||||||
| @ -18,31 +17,26 @@ var recipeFetchCommand = cli.Command{ | |||||||
| 	Flags: []cli.Flag{ | 	Flags: []cli.Flag{ | ||||||
| 		internal.DebugFlag, | 		internal.DebugFlag, | ||||||
| 		internal.NoInputFlag, | 		internal.NoInputFlag, | ||||||
| 		internal.OfflineFlag, |  | ||||||
| 	}, | 	}, | ||||||
| 	Before:       internal.SubCommandBefore, | 	Before:       internal.SubCommandBefore, | ||||||
| 	BashComplete: autocomplete.RecipeNameComplete, | 	BashComplete: autocomplete.RecipeNameComplete, | ||||||
| 	Action: func(c *cli.Context) error { | 	Action: func(c *cli.Context) error { | ||||||
| 		recipeName := c.Args().First() | 		recipeName := c.Args().First() | ||||||
|  |  | ||||||
| 		if recipeName != "" { | 		if recipeName != "" { | ||||||
| 			internal.ValidateRecipe(c) | 			internal.ValidateRecipe(c) | ||||||
| 			if err := recipe.Ensure(recipeName); err != nil { |  | ||||||
| 				logrus.Fatal(err) |  | ||||||
| 			} |  | ||||||
| 			return nil |  | ||||||
| 		} | 		} | ||||||
|  |  | ||||||
| 		catalogue, err := recipe.ReadRecipeCatalogue(internal.Offline) | 		if err := recipe.EnsureExists(recipeName); err != nil { | ||||||
| 		if err != nil { |  | ||||||
| 			logrus.Fatal(err) | 			logrus.Fatal(err) | ||||||
| 		} | 		} | ||||||
|  |  | ||||||
| 		catlBar := formatter.CreateProgressbar(len(catalogue), "fetching latest recipes...") | 		if err := recipe.EnsureUpToDate(recipeName); err != nil { | ||||||
| 		for recipeName := range catalogue { | 			logrus.Fatal(err) | ||||||
| 			if err := recipe.Ensure(recipeName); err != nil { | 		} | ||||||
| 				logrus.Error(err) |  | ||||||
| 			} | 		if err := recipe.EnsureLatest(recipeName); err != nil { | ||||||
| 			catlBar.Add(1) | 			logrus.Fatal(err) | ||||||
| 		} | 		} | ||||||
|  |  | ||||||
| 		return nil | 		return nil | ||||||
|  | |||||||
| @ -4,6 +4,7 @@ import ( | |||||||
| 	"bytes" | 	"bytes" | ||||||
| 	"errors" | 	"errors" | ||||||
| 	"fmt" | 	"fmt" | ||||||
|  | 	"io/ioutil" | ||||||
| 	"os" | 	"os" | ||||||
| 	"path" | 	"path" | ||||||
| 	"text/template" | 	"text/template" | ||||||
| @ -36,8 +37,6 @@ var recipeNewCommand = cli.Command{ | |||||||
| 		internal.DebugFlag, | 		internal.DebugFlag, | ||||||
| 		internal.NoInputFlag, | 		internal.NoInputFlag, | ||||||
| 		internal.OfflineFlag, | 		internal.OfflineFlag, | ||||||
| 		internal.GitNameFlag, |  | ||||||
| 		internal.GitEmailFlag, |  | ||||||
| 	}, | 	}, | ||||||
| 	Before:    internal.SubCommandBefore, | 	Before:    internal.SubCommandBefore, | ||||||
| 	Usage:     "Create a new recipe", | 	Usage:     "Create a new recipe", | ||||||
| @ -93,14 +92,14 @@ recipe and domain in the sample environment config). | |||||||
| 				logrus.Fatal(err) | 				logrus.Fatal(err) | ||||||
| 			} | 			} | ||||||
|  |  | ||||||
| 			if err := os.WriteFile(path, templated.Bytes(), 0644); err != nil { | 			if err := ioutil.WriteFile(path, templated.Bytes(), 0644); err != nil { | ||||||
| 				logrus.Fatal(err) | 				logrus.Fatal(err) | ||||||
| 			} | 			} | ||||||
|  |  | ||||||
| 		} | 		} | ||||||
|  |  | ||||||
| 		newGitRepo := path.Join(config.RECIPES_DIR, recipeName) | 		newGitRepo := path.Join(config.RECIPES_DIR, recipeName) | ||||||
| 		if err := git.Init(newGitRepo, true, internal.GitName, internal.GitEmail); err != nil { | 		if err := git.Init(newGitRepo, true); err != nil { | ||||||
| 			logrus.Fatal(err) | 			logrus.Fatal(err) | ||||||
| 		} | 		} | ||||||
|  |  | ||||||
|  | |||||||
| @ -1,9 +1,7 @@ | |||||||
| package recipe | package recipe | ||||||
|  |  | ||||||
| import ( | import ( | ||||||
| 	"errors" |  | ||||||
| 	"fmt" | 	"fmt" | ||||||
| 	"os" |  | ||||||
| 	"path" | 	"path" | ||||||
| 	"strconv" | 	"strconv" | ||||||
| 	"strings" | 	"strings" | ||||||
| @ -142,7 +140,7 @@ your SSH keys configured on your account. | |||||||
|  |  | ||||||
| // getImageVersions retrieves image versions for a recipe | // getImageVersions retrieves image versions for a recipe | ||||||
| func getImageVersions(recipe recipe.Recipe) (map[string]string, error) { | func getImageVersions(recipe recipe.Recipe) (map[string]string, error) { | ||||||
| 	services := make(map[string]string) | 	var services = make(map[string]string) | ||||||
|  |  | ||||||
| 	missingTag := false | 	missingTag := false | ||||||
| 	for _, service := range recipe.Config.Services { | 	for _, service := range recipe.Config.Services { | ||||||
| @ -209,10 +207,6 @@ func createReleaseFromTag(recipe recipe.Recipe, tagString, mainAppVersion string | |||||||
| 		tagString = fmt.Sprintf("%s+%s", tag.String(), mainAppVersion) | 		tagString = fmt.Sprintf("%s+%s", tag.String(), mainAppVersion) | ||||||
| 	} | 	} | ||||||
|  |  | ||||||
| 	if err := addReleaseNotes(recipe, tagString); err != nil { |  | ||||||
| 		logrus.Fatal(err) |  | ||||||
| 	} |  | ||||||
|  |  | ||||||
| 	if err := commitRelease(recipe, tagString); err != nil { | 	if err := commitRelease(recipe, tagString); err != nil { | ||||||
| 		logrus.Fatal(err) | 		logrus.Fatal(err) | ||||||
| 	} | 	} | ||||||
| @ -243,82 +237,6 @@ func getTagCreateOptions(tag string) (git.CreateTagOptions, error) { | |||||||
| 	return git.CreateTagOptions{Message: msg}, nil | 	return git.CreateTagOptions{Message: msg}, nil | ||||||
| } | } | ||||||
|  |  | ||||||
| // addReleaseNotes checks if the release/next release note exists and moves the |  | ||||||
| // file to release/<tag>. |  | ||||||
| func addReleaseNotes(recipe recipe.Recipe, tag string) error { |  | ||||||
| 	repoPath := path.Join(config.RECIPES_DIR, recipe.Name) |  | ||||||
| 	tagReleaseNotePath := path.Join(repoPath, "release", tag) |  | ||||||
| 	if _, err := os.Stat(tagReleaseNotePath); err == nil { |  | ||||||
| 		// Release note for current tag already exist exists. |  | ||||||
| 		return nil |  | ||||||
| 	} else if !errors.Is(err, os.ErrNotExist) { |  | ||||||
| 		return err |  | ||||||
| 	} |  | ||||||
|  |  | ||||||
| 	nextReleaseNotePath := path.Join(repoPath, "release", "next") |  | ||||||
| 	if _, err := os.Stat(nextReleaseNotePath); err == nil { |  | ||||||
| 		// release/next note exists. Move it to release/<tag> |  | ||||||
| 		if internal.Dry { |  | ||||||
| 			logrus.Debugf("dry run: move release note from 'next' to %s", tag) |  | ||||||
| 			return nil |  | ||||||
| 		} |  | ||||||
| 		if !internal.NoInput { |  | ||||||
| 			prompt := &survey.Input{ |  | ||||||
| 				Message: "Use release note in release/next?", |  | ||||||
| 			} |  | ||||||
| 			var addReleaseNote bool |  | ||||||
| 			if err := survey.AskOne(prompt, &addReleaseNote); err != nil { |  | ||||||
| 				return err |  | ||||||
| 			} |  | ||||||
| 			if !addReleaseNote { |  | ||||||
| 				return nil |  | ||||||
| 			} |  | ||||||
| 		} |  | ||||||
| 		err := os.Rename(nextReleaseNotePath, tagReleaseNotePath) |  | ||||||
| 		if err != nil { |  | ||||||
| 			return err |  | ||||||
| 		} |  | ||||||
| 		err = gitPkg.Add(repoPath, path.Join("release", "next"), internal.Dry) |  | ||||||
| 		if err != nil { |  | ||||||
| 			return err |  | ||||||
| 		} |  | ||||||
| 		err = gitPkg.Add(repoPath, path.Join("release", tag), internal.Dry) |  | ||||||
| 		if err != nil { |  | ||||||
| 			return err |  | ||||||
| 		} |  | ||||||
| 	} else if !errors.Is(err, os.ErrNotExist) { |  | ||||||
| 		return err |  | ||||||
| 	} |  | ||||||
|  |  | ||||||
| 	// No release note exists for the current release. |  | ||||||
| 	if internal.NoInput { |  | ||||||
| 		return nil |  | ||||||
| 	} |  | ||||||
|  |  | ||||||
| 	prompt := &survey.Input{ |  | ||||||
| 		Message: "Release Note (leave empty for no release note)", |  | ||||||
| 	} |  | ||||||
| 	var releaseNote string |  | ||||||
| 	if err := survey.AskOne(prompt, &releaseNote); err != nil { |  | ||||||
| 		return err |  | ||||||
| 	} |  | ||||||
|  |  | ||||||
| 	if releaseNote == "" { |  | ||||||
| 		return nil |  | ||||||
| 	} |  | ||||||
|  |  | ||||||
| 	err := os.WriteFile(tagReleaseNotePath, []byte(releaseNote), 0o644) |  | ||||||
| 	if err != nil { |  | ||||||
| 		return err |  | ||||||
| 	} |  | ||||||
| 	err = gitPkg.Add(repoPath, path.Join("release", tag), internal.Dry) |  | ||||||
| 	if err != nil { |  | ||||||
| 		return err |  | ||||||
| 	} |  | ||||||
|  |  | ||||||
| 	return nil |  | ||||||
| } |  | ||||||
|  |  | ||||||
| func commitRelease(recipe recipe.Recipe, tag string) error { | func commitRelease(recipe recipe.Recipe, tag string) error { | ||||||
| 	if internal.Dry { | 	if internal.Dry { | ||||||
| 		logrus.Debugf("dry run: no changes committed") | 		logrus.Debugf("dry run: no changes committed") | ||||||
| @ -486,10 +404,6 @@ func createReleaseFromPreviousTag(tagString, mainAppVersion string, recipe recip | |||||||
| 		} | 		} | ||||||
| 	} | 	} | ||||||
|  |  | ||||||
| 	if err := addReleaseNotes(recipe, tagString); err != nil { |  | ||||||
| 		logrus.Fatal(err) |  | ||||||
| 	} |  | ||||||
|  |  | ||||||
| 	if err := commitRelease(recipe, tagString); err != nil { | 	if err := commitRelease(recipe, tagString); err != nil { | ||||||
| 		logrus.Fatalf("failed to commit changes: %s", err.Error()) | 		logrus.Fatalf("failed to commit changes: %s", err.Error()) | ||||||
| 	} | 	} | ||||||
|  | |||||||
							
								
								
									
										4
									
								
								go.mod
									
									
									
									
									
								
							
							
						
						
									
										4
									
								
								go.mod
									
									
									
									
									
								
							| @ -4,7 +4,7 @@ go 1.21 | |||||||
|  |  | ||||||
| require ( | require ( | ||||||
| 	coopcloud.tech/tagcmp v0.0.0-20211103052201-885b22f77d52 | 	coopcloud.tech/tagcmp v0.0.0-20211103052201-885b22f77d52 | ||||||
| 	git.coopcloud.tech/coop-cloud/godotenv v1.5.2-0.20231130100509-01bff8284355 | 	git.coopcloud.tech/coop-cloud/godotenv v1.5.2-0.20231130100106-7462d91acefd | ||||||
| 	github.com/AlecAivazis/survey/v2 v2.3.7 | 	github.com/AlecAivazis/survey/v2 v2.3.7 | ||||||
| 	github.com/Gurpartap/logrus-stack v0.0.0-20170710170904-89c00d8a28f4 | 	github.com/Gurpartap/logrus-stack v0.0.0-20170710170904-89c00d8a28f4 | ||||||
| 	github.com/docker/cli v24.0.7+incompatible | 	github.com/docker/cli v24.0.7+incompatible | ||||||
| @ -12,7 +12,6 @@ require ( | |||||||
| 	github.com/docker/docker v24.0.7+incompatible | 	github.com/docker/docker v24.0.7+incompatible | ||||||
| 	github.com/docker/go-units v0.5.0 | 	github.com/docker/go-units v0.5.0 | ||||||
| 	github.com/go-git/go-git/v5 v5.10.0 | 	github.com/go-git/go-git/v5 v5.10.0 | ||||||
| 	github.com/google/go-cmp v0.5.9 |  | ||||||
| 	github.com/moby/sys/signal v0.7.0 | 	github.com/moby/sys/signal v0.7.0 | ||||||
| 	github.com/moby/term v0.5.0 | 	github.com/moby/term v0.5.0 | ||||||
| 	github.com/olekukonko/tablewriter v0.0.5 | 	github.com/olekukonko/tablewriter v0.0.5 | ||||||
| @ -48,6 +47,7 @@ require ( | |||||||
| 	github.com/gogo/protobuf v1.3.2 // indirect | 	github.com/gogo/protobuf v1.3.2 // indirect | ||||||
| 	github.com/golang/groupcache v0.0.0-20210331224755-41bb18bfe9da // indirect | 	github.com/golang/groupcache v0.0.0-20210331224755-41bb18bfe9da // indirect | ||||||
| 	github.com/golang/protobuf v1.5.3 // indirect | 	github.com/golang/protobuf v1.5.3 // indirect | ||||||
|  | 	github.com/google/go-cmp v0.5.9 // indirect | ||||||
| 	github.com/hashicorp/go-cleanhttp v0.5.2 // indirect | 	github.com/hashicorp/go-cleanhttp v0.5.2 // indirect | ||||||
| 	github.com/imdario/mergo v0.3.12 // indirect | 	github.com/imdario/mergo v0.3.12 // indirect | ||||||
| 	github.com/inconshreveable/mousetrap v1.0.0 // indirect | 	github.com/inconshreveable/mousetrap v1.0.0 // indirect | ||||||
|  | |||||||
							
								
								
									
										5
									
								
								go.sum
									
									
									
									
									
								
							
							
						
						
									
										5
									
								
								go.sum
									
									
									
									
									
								
							| @ -51,8 +51,8 @@ coopcloud.tech/tagcmp v0.0.0-20211103052201-885b22f77d52/go.mod h1:ESVm0wQKcbcFi | |||||||
| dario.cat/mergo v1.0.0 h1:AGCNq9Evsj31mOgNPcLyXc+4PNABt905YmuqPYYpBWk= | dario.cat/mergo v1.0.0 h1:AGCNq9Evsj31mOgNPcLyXc+4PNABt905YmuqPYYpBWk= | ||||||
| dario.cat/mergo v1.0.0/go.mod h1:uNxQE+84aUszobStD9th8a29P2fMDhsBdgRYvZOxGmk= | dario.cat/mergo v1.0.0/go.mod h1:uNxQE+84aUszobStD9th8a29P2fMDhsBdgRYvZOxGmk= | ||||||
| dmitri.shuralyov.com/gpu/mtl v0.0.0-20190408044501-666a987793e9/go.mod h1:H6x//7gZCb22OMCxBHrMx7a5I7Hp++hsVxbQ4BYO7hU= | dmitri.shuralyov.com/gpu/mtl v0.0.0-20190408044501-666a987793e9/go.mod h1:H6x//7gZCb22OMCxBHrMx7a5I7Hp++hsVxbQ4BYO7hU= | ||||||
| git.coopcloud.tech/coop-cloud/godotenv v1.5.2-0.20231130100509-01bff8284355 h1:tCv2B4qoN6RMheKDnCzIafOkWS5BB1h7hwhmo+9bVeE= | git.coopcloud.tech/coop-cloud/godotenv v1.5.2-0.20231130100106-7462d91acefd h1:dctCkMhcsgIWMrkB1Br8S0RJF17eG+LKiqcXXVr3mdU= | ||||||
| git.coopcloud.tech/coop-cloud/godotenv v1.5.2-0.20231130100509-01bff8284355/go.mod h1:Q8V1zbtPAlzYSr/Dvky3wS6x58IQAl3rot2me1oSO2Q= | git.coopcloud.tech/coop-cloud/godotenv v1.5.2-0.20231130100106-7462d91acefd/go.mod h1:Q8V1zbtPAlzYSr/Dvky3wS6x58IQAl3rot2me1oSO2Q= | ||||||
| github.com/AdaLogics/go-fuzz-headers v0.0.0-20230106234847-43070de90fa1 h1:EKPd1INOIyr5hWOWhvpmQpY6tKjeG0hT1s3AMC/9fic= | github.com/AdaLogics/go-fuzz-headers v0.0.0-20230106234847-43070de90fa1 h1:EKPd1INOIyr5hWOWhvpmQpY6tKjeG0hT1s3AMC/9fic= | ||||||
| github.com/AdaLogics/go-fuzz-headers v0.0.0-20230106234847-43070de90fa1/go.mod h1:VzwV+t+dZ9j/H867F1M2ziD+yLHtB46oM35FxxMJ4d0= | github.com/AdaLogics/go-fuzz-headers v0.0.0-20230106234847-43070de90fa1/go.mod h1:VzwV+t+dZ9j/H867F1M2ziD+yLHtB46oM35FxxMJ4d0= | ||||||
| github.com/AlecAivazis/survey/v2 v2.3.7 h1:6I/u8FvytdGsgonrYsVn2t8t4QiRnh6QSTqkkhIiSjQ= | github.com/AlecAivazis/survey/v2 v2.3.7 h1:6I/u8FvytdGsgonrYsVn2t8t4QiRnh6QSTqkkhIiSjQ= | ||||||
| @ -1315,6 +1315,7 @@ golang.org/x/sys v0.2.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg= | |||||||
| golang.org/x/sys v0.3.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg= | golang.org/x/sys v0.3.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg= | ||||||
| golang.org/x/sys v0.5.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg= | golang.org/x/sys v0.5.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg= | ||||||
| golang.org/x/sys v0.6.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg= | golang.org/x/sys v0.6.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg= | ||||||
|  | golang.org/x/sys v0.13.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg= | ||||||
| golang.org/x/sys v0.14.0 h1:Vz7Qs629MkJkGyHxUlRHizWJRG2j8fbQKjELVSNhy7Q= | golang.org/x/sys v0.14.0 h1:Vz7Qs629MkJkGyHxUlRHizWJRG2j8fbQKjELVSNhy7Q= | ||||||
| golang.org/x/sys v0.14.0/go.mod h1:/VUhepiaJMQUp4+oa/7Zr1D23ma6VTLIYjOOTFZPUcA= | golang.org/x/sys v0.14.0/go.mod h1:/VUhepiaJMQUp4+oa/7Zr1D23ma6VTLIYjOOTFZPUcA= | ||||||
| golang.org/x/term v0.0.0-20201117132131-f5c789dd3221/go.mod h1:Nr5EML6q2oocZ2LXRh80K7BxOlk5/8JxuGnuhpl+muw= | golang.org/x/term v0.0.0-20201117132131-f5c789dd3221/go.mod h1:Nr5EML6q2oocZ2LXRh80K7BxOlk5/8JxuGnuhpl+muw= | ||||||
|  | |||||||
| @ -51,20 +51,6 @@ func RecipeNameComplete(c *cli.Context) { | |||||||
| 	} | 	} | ||||||
| } | } | ||||||
|  |  | ||||||
| // RecipeVersionComplete completes versions for the recipe. |  | ||||||
| func RecipeVersionComplete(recipeName string) { |  | ||||||
| 	catl, err := recipe.ReadRecipeCatalogue(false) |  | ||||||
| 	if err != nil { |  | ||||||
| 		logrus.Warn(err) |  | ||||||
| 	} |  | ||||||
|  |  | ||||||
| 	for _, v := range catl[recipeName].Versions { |  | ||||||
| 		for v2 := range v { |  | ||||||
| 			fmt.Println(v2) |  | ||||||
| 		} |  | ||||||
| 	} |  | ||||||
| } |  | ||||||
|  |  | ||||||
| // ServerNameComplete completes server names. | // ServerNameComplete completes server names. | ||||||
| func ServerNameComplete(c *cli.Context) { | func ServerNameComplete(c *cli.Context) { | ||||||
| 	files, err := config.LoadAppFiles("") | 	files, err := config.LoadAppFiles("") | ||||||
|  | |||||||
| @ -50,61 +50,34 @@ type App struct { | |||||||
| 	Path   string | 	Path   string | ||||||
| } | } | ||||||
|  |  | ||||||
| // See documentation of config.StackName | // StackName gets whatever the docker safe (uses the right delimiting | ||||||
|  | // character, e.g. "_") stack name is for the app. In general, you don't want | ||||||
|  | // to use this to show anything to end-users, you want use a.Name instead. | ||||||
| func (a App) StackName() string { | func (a App) StackName() string { | ||||||
| 	if _, exists := a.Env["STACK_NAME"]; exists { | 	if _, exists := a.Env["STACK_NAME"]; exists { | ||||||
| 		return a.Env["STACK_NAME"] | 		return a.Env["STACK_NAME"] | ||||||
| 	} | 	} | ||||||
|  |  | ||||||
| 	stackName := StackName(a.Name) | 	stackName := SanitiseAppName(a.Name) | ||||||
|  |  | ||||||
| 	a.Env["STACK_NAME"] = stackName |  | ||||||
|  |  | ||||||
| 	return stackName |  | ||||||
| } |  | ||||||
|  |  | ||||||
| // StackName gets whatever the docker safe (uses the right delimiting |  | ||||||
| // character, e.g. "_") stack name is for the app. In general, you don't want |  | ||||||
| // to use this to show anything to end-users, you want use a.Name instead. |  | ||||||
| func StackName(appName string) string { |  | ||||||
| 	stackName := SanitiseAppName(appName) |  | ||||||
|  |  | ||||||
| 	if len(stackName) > 45 { | 	if len(stackName) > 45 { | ||||||
| 		logrus.Debugf("trimming %s to %s to avoid runtime limits", stackName, stackName[:45]) | 		logrus.Debugf("trimming %s to %s to avoid runtime limits", stackName, stackName[:45]) | ||||||
| 		stackName = stackName[:45] | 		stackName = stackName[:45] | ||||||
| 	} | 	} | ||||||
|  |  | ||||||
|  | 	a.Env["STACK_NAME"] = stackName | ||||||
|  |  | ||||||
| 	return stackName | 	return stackName | ||||||
| } | } | ||||||
|  |  | ||||||
| // Filters retrieves app filters for querying the container runtime. By default | // Filters retrieves exact app filters for querying the container runtime. Due | ||||||
| // it filters on all services in the app. It is also possible to pass an | // to upstream issues, filtering works different depending on what you're | ||||||
| // otional list of service names, which get filtered instead. |  | ||||||
| // |  | ||||||
| // Due to upstream issues, filtering works different depending on what you're |  | ||||||
| // querying. So, for example, secrets don't work with regex! The caller needs | // querying. So, for example, secrets don't work with regex! The caller needs | ||||||
| // to implement their own validation that the right secrets are matched. In | // to implement their own validation that the right secrets are matched. In | ||||||
| // order to handle these cases, we provide the `appendServiceNames` / | // order to handle these cases, we provide the `appendServiceNames` / | ||||||
| // `exactMatch` modifiers. | // `exactMatch` modifiers. | ||||||
| func (a App) Filters(appendServiceNames, exactMatch bool, services ...string) (filters.Args, error) { | func (a App) Filters(appendServiceNames, exactMatch bool) (filters.Args, error) { | ||||||
| 	filters := filters.NewArgs() | 	filters := filters.NewArgs() | ||||||
| 	if len(services) > 0 { |  | ||||||
| 		for _, serviceName := range services { |  | ||||||
| 			filters.Add("name", ServiceFilter(a.StackName(), serviceName, exactMatch)) |  | ||||||
| 		} |  | ||||||
| 		return filters, nil |  | ||||||
| 	} |  | ||||||
|  |  | ||||||
| 	// When not appending the service name, just add one filter for the whole |  | ||||||
| 	// stack. |  | ||||||
| 	if !appendServiceNames { |  | ||||||
| 		f := fmt.Sprintf("%s", a.StackName()) |  | ||||||
| 		if exactMatch { |  | ||||||
| 			f = fmt.Sprintf("^%s", f) |  | ||||||
| 		} |  | ||||||
| 		filters.Add("name", f) |  | ||||||
| 		return filters, nil |  | ||||||
| 	} |  | ||||||
|  |  | ||||||
| 	composeFiles, err := GetComposeFiles(a.Recipe, a.Env) | 	composeFiles, err := GetComposeFiles(a.Recipe, a.Env) | ||||||
| 	if err != nil { | 	if err != nil { | ||||||
| @ -118,23 +91,28 @@ func (a App) Filters(appendServiceNames, exactMatch bool, services ...string) (f | |||||||
| 	} | 	} | ||||||
|  |  | ||||||
| 	for _, service := range compose.Services { | 	for _, service := range compose.Services { | ||||||
| 		f := ServiceFilter(a.StackName(), service.Name, exactMatch) | 		var filter string | ||||||
| 		filters.Add("name", f) |  | ||||||
|  | 		if appendServiceNames { | ||||||
|  | 			if exactMatch { | ||||||
|  | 				filter = fmt.Sprintf("^%s_%s", a.StackName(), service.Name) | ||||||
|  | 			} else { | ||||||
|  | 				filter = fmt.Sprintf("%s_%s", a.StackName(), service.Name) | ||||||
|  | 			} | ||||||
|  | 		} else { | ||||||
|  | 			if exactMatch { | ||||||
|  | 				filter = fmt.Sprintf("^%s", a.StackName()) | ||||||
|  | 			} else { | ||||||
|  | 				filter = fmt.Sprintf("%s", a.StackName()) | ||||||
|  | 			} | ||||||
|  | 		} | ||||||
|  |  | ||||||
|  | 		filters.Add("name", filter) | ||||||
| 	} | 	} | ||||||
|  |  | ||||||
| 	return filters, nil | 	return filters, nil | ||||||
| } | } | ||||||
|  |  | ||||||
| // ServiceFilter creates a filter string for filtering a service in the docker |  | ||||||
| // container runtime. When exact match is true, it uses regex to match the |  | ||||||
| // string exactly. |  | ||||||
| func ServiceFilter(stack, service string, exact bool) string { |  | ||||||
| 	if exact { |  | ||||||
| 		return fmt.Sprintf("^%s_%s", stack, service) |  | ||||||
| 	} |  | ||||||
| 	return fmt.Sprintf("%s_%s", stack, service) |  | ||||||
| } |  | ||||||
|  |  | ||||||
| // ByServer sort a slice of Apps | // ByServer sort a slice of Apps | ||||||
| type ByServer []App | type ByServer []App | ||||||
|  |  | ||||||
| @ -355,7 +333,7 @@ func TemplateAppEnvSample(recipeName, appName, server, domain string) error { | |||||||
| 		return fmt.Errorf("%s already exists?", appEnvPath) | 		return fmt.Errorf("%s already exists?", appEnvPath) | ||||||
| 	} | 	} | ||||||
|  |  | ||||||
| 	err = ioutil.WriteFile(appEnvPath, envSample, 0o664) | 	err = ioutil.WriteFile(appEnvPath, envSample, 0664) | ||||||
| 	if err != nil { | 	if err != nil { | ||||||
| 		return err | 		return err | ||||||
| 	} | 	} | ||||||
| @ -617,7 +595,7 @@ func GetLabel(compose *composetypes.Config, stackName string, label string) stri | |||||||
|  |  | ||||||
| // GetTimeoutFromLabel reads the timeout value from docker label "coop-cloud.${STACK_NAME}.TIMEOUT" and returns 50 as default value | // GetTimeoutFromLabel reads the timeout value from docker label "coop-cloud.${STACK_NAME}.TIMEOUT" and returns 50 as default value | ||||||
| func GetTimeoutFromLabel(compose *composetypes.Config, stackName string) (int, error) { | func GetTimeoutFromLabel(compose *composetypes.Config, stackName string) (int, error) { | ||||||
| 	timeout := 50 // Default Timeout | 	var timeout = 50 // Default Timeout | ||||||
| 	var err error = nil | 	var err error = nil | ||||||
| 	if timeoutLabel := GetLabel(compose, stackName, "timeout"); timeoutLabel != "" { | 	if timeoutLabel := GetLabel(compose, stackName, "timeout"); timeoutLabel != "" { | ||||||
| 		logrus.Debugf("timeout label: %s", timeoutLabel) | 		logrus.Debugf("timeout label: %s", timeoutLabel) | ||||||
|  | |||||||
| @ -1,15 +1,12 @@ | |||||||
| package config_test | package config_test | ||||||
|  |  | ||||||
| import ( | import ( | ||||||
| 	"encoding/json" |  | ||||||
| 	"fmt" | 	"fmt" | ||||||
| 	"reflect" | 	"reflect" | ||||||
| 	"testing" | 	"testing" | ||||||
|  |  | ||||||
| 	"coopcloud.tech/abra/pkg/config" | 	"coopcloud.tech/abra/pkg/config" | ||||||
| 	"coopcloud.tech/abra/pkg/recipe" | 	"coopcloud.tech/abra/pkg/recipe" | ||||||
| 	"github.com/docker/docker/api/types/filters" |  | ||||||
| 	"github.com/google/go-cmp/cmp" |  | ||||||
| 	"github.com/stretchr/testify/assert" | 	"github.com/stretchr/testify/assert" | ||||||
| ) | ) | ||||||
|  |  | ||||||
| @ -109,89 +106,3 @@ func TestGetComposeFilesError(t *testing.T) { | |||||||
| 		} | 		} | ||||||
| 	} | 	} | ||||||
| } | } | ||||||
|  |  | ||||||
| func TestFilters(t *testing.T) { |  | ||||||
| 	oldDir := config.RECIPES_DIR |  | ||||||
| 	config.RECIPES_DIR = "./testdir" |  | ||||||
| 	defer func() { |  | ||||||
| 		config.RECIPES_DIR = oldDir |  | ||||||
| 	}() |  | ||||||
|  |  | ||||||
| 	app, err := config.NewApp(config.AppEnv{ |  | ||||||
| 		"DOMAIN": "test.example.com", |  | ||||||
| 		"RECIPE": "test-recipe", |  | ||||||
| 	}, "test_example_com", config.AppFile{ |  | ||||||
| 		Path:   "./testdir/filtertest.end", |  | ||||||
| 		Server: "local", |  | ||||||
| 	}) |  | ||||||
| 	if err != nil { |  | ||||||
| 		t.Fatal(err) |  | ||||||
| 	} |  | ||||||
|  |  | ||||||
| 	f, err := app.Filters(false, false) |  | ||||||
| 	if err != nil { |  | ||||||
| 		t.Error(err) |  | ||||||
| 	} |  | ||||||
| 	compareFilter(t, f, map[string]map[string]bool{ |  | ||||||
| 		"name": { |  | ||||||
| 			"test_example_com": true, |  | ||||||
| 		}, |  | ||||||
| 	}) |  | ||||||
|  |  | ||||||
| 	f2, err := app.Filters(false, true) |  | ||||||
| 	if err != nil { |  | ||||||
| 		t.Error(err) |  | ||||||
| 	} |  | ||||||
| 	compareFilter(t, f2, map[string]map[string]bool{ |  | ||||||
| 		"name": { |  | ||||||
| 			"^test_example_com": true, |  | ||||||
| 		}, |  | ||||||
| 	}) |  | ||||||
|  |  | ||||||
| 	f3, err := app.Filters(true, false) |  | ||||||
| 	if err != nil { |  | ||||||
| 		t.Error(err) |  | ||||||
| 	} |  | ||||||
| 	compareFilter(t, f3, map[string]map[string]bool{ |  | ||||||
| 		"name": { |  | ||||||
| 			"test_example_com_bar": true, |  | ||||||
| 			"test_example_com_foo": true, |  | ||||||
| 		}, |  | ||||||
| 	}) |  | ||||||
|  |  | ||||||
| 	f4, err := app.Filters(true, true) |  | ||||||
| 	if err != nil { |  | ||||||
| 		t.Error(err) |  | ||||||
| 	} |  | ||||||
| 	compareFilter(t, f4, map[string]map[string]bool{ |  | ||||||
| 		"name": { |  | ||||||
| 			"^test_example_com_bar": true, |  | ||||||
| 			"^test_example_com_foo": true, |  | ||||||
| 		}, |  | ||||||
| 	}) |  | ||||||
|  |  | ||||||
| 	f5, err := app.Filters(false, false, "foo") |  | ||||||
| 	if err != nil { |  | ||||||
| 		t.Error(err) |  | ||||||
| 	} |  | ||||||
| 	compareFilter(t, f5, map[string]map[string]bool{ |  | ||||||
| 		"name": { |  | ||||||
| 			"test_example_com_foo": true, |  | ||||||
| 		}, |  | ||||||
| 	}) |  | ||||||
| } |  | ||||||
|  |  | ||||||
| func compareFilter(t *testing.T, f1 filters.Args, f2 map[string]map[string]bool) { |  | ||||||
| 	t.Helper() |  | ||||||
| 	j1, err := f1.MarshalJSON() |  | ||||||
| 	if err != nil { |  | ||||||
| 		t.Error(err) |  | ||||||
| 	} |  | ||||||
| 	j2, err := json.Marshal(f2) |  | ||||||
| 	if err != nil { |  | ||||||
| 		t.Error(err) |  | ||||||
| 	} |  | ||||||
| 	if diff := cmp.Diff(string(j2), string(j1)); diff != "" { |  | ||||||
| 		t.Errorf("filters mismatch (-want +got):\n%s", diff) |  | ||||||
| 	} |  | ||||||
| } |  | ||||||
|  | |||||||
| @ -36,8 +36,6 @@ var REPOS_BASE_URL = "https://git.coopcloud.tech/coop-cloud" | |||||||
| var CATALOGUE_JSON_REPO_NAME = "recipes-catalogue-json" | var CATALOGUE_JSON_REPO_NAME = "recipes-catalogue-json" | ||||||
| var SSH_URL_TEMPLATE = "ssh://git@git.coopcloud.tech:2222/coop-cloud/%s.git" | var SSH_URL_TEMPLATE = "ssh://git@git.coopcloud.tech:2222/coop-cloud/%s.git" | ||||||
|  |  | ||||||
| var BackupbotLabel = "coop-cloud.backupbot.enabled" |  | ||||||
|  |  | ||||||
| // envVarModifiers is a list of env var modifier strings. These are added to | // envVarModifiers is a list of env var modifier strings. These are added to | ||||||
| // env vars as comments and modify their processing by Abra, e.g. determining | // env vars as comments and modify their processing by Abra, e.g. determining | ||||||
| // how long secrets should be. | // how long secrets should be. | ||||||
|  | |||||||
| @ -1,2 +0,0 @@ | |||||||
| RECIPE=test-recipe |  | ||||||
| DOMAIN=test.example.com |  | ||||||
| @ -1,6 +0,0 @@ | |||||||
| version: "3.8" |  | ||||||
| services: |  | ||||||
|   foo: |  | ||||||
|     image: debian |  | ||||||
|   bar: |  | ||||||
|     image: debian |  | ||||||
| @ -28,7 +28,7 @@ func GetContainer(c context.Context, cl *client.Client, filters filters.Args, no | |||||||
| 		return types.Container{}, fmt.Errorf("no containers matching the %v filter found?", filter) | 		return types.Container{}, fmt.Errorf("no containers matching the %v filter found?", filter) | ||||||
| 	} | 	} | ||||||
|  |  | ||||||
| 	if len(containers) > 1 { | 	if len(containers) != 1 { | ||||||
| 		var containersRaw []string | 		var containersRaw []string | ||||||
| 		for _, container := range containers { | 		for _, container := range containers { | ||||||
| 			containerName := strings.Join(container.Names, " ") | 			containerName := strings.Join(container.Names, " ") | ||||||
|  | |||||||
| @ -1,27 +0,0 @@ | |||||||
| package git |  | ||||||
|  |  | ||||||
| import ( |  | ||||||
| 	"github.com/go-git/go-git/v5" |  | ||||||
| 	"github.com/sirupsen/logrus" |  | ||||||
| ) |  | ||||||
|  |  | ||||||
| // Add adds a file to the git index. |  | ||||||
| func Add(repoPath, path string, dryRun bool) error { |  | ||||||
| 	repo, err := git.PlainOpen(repoPath) |  | ||||||
| 	if err != nil { |  | ||||||
| 		return err |  | ||||||
| 	} |  | ||||||
|  |  | ||||||
| 	worktree, err := repo.Worktree() |  | ||||||
| 	if err != nil { |  | ||||||
| 		return err |  | ||||||
| 	} |  | ||||||
|  |  | ||||||
| 	if dryRun { |  | ||||||
| 		logrus.Debugf("dry run: adding %s", path) |  | ||||||
| 	} else { |  | ||||||
| 		worktree.Add(path) |  | ||||||
| 	} |  | ||||||
|  |  | ||||||
| 	return nil |  | ||||||
| } |  | ||||||
| @ -1,41 +1,35 @@ | |||||||
| package git | package git | ||||||
|  |  | ||||||
| import ( | import ( | ||||||
| 	"fmt" |  | ||||||
|  |  | ||||||
| 	"github.com/go-git/go-git/v5" | 	"github.com/go-git/go-git/v5" | ||||||
| 	"github.com/go-git/go-git/v5/plumbing/object" | 	gitPkg "github.com/go-git/go-git/v5" | ||||||
| 	"github.com/sirupsen/logrus" | 	"github.com/sirupsen/logrus" | ||||||
| ) | ) | ||||||
|  |  | ||||||
| // Init inits a new repo and commits all the stuff if you want | // Init inits a new repo and commits all the stuff if you want | ||||||
| func Init(repoPath string, commit bool, gitName, gitEmail string) error { | func Init(repoPath string, commit bool) error { | ||||||
| 	if _, err := git.PlainInit(repoPath, false); err != nil { | 	if _, err := gitPkg.PlainInit(repoPath, false); err != nil { | ||||||
| 		return fmt.Errorf("git init: %s", err) | 		logrus.Fatal(err) | ||||||
| 	} | 	} | ||||||
| 	logrus.Debugf("initialised new git repo in %s", repoPath) | 	logrus.Debugf("initialised new git repo in %s", repoPath) | ||||||
|  |  | ||||||
| 	if commit { | 	if commit { | ||||||
| 		commitRepo, err := git.PlainOpen(repoPath) | 		commitRepo, err := git.PlainOpen(repoPath) | ||||||
| 		if err != nil { | 		if err != nil { | ||||||
| 			return fmt.Errorf("git open: %s", err) | 			logrus.Fatal(err) | ||||||
| 		} | 		} | ||||||
|  |  | ||||||
| 		commitWorktree, err := commitRepo.Worktree() | 		commitWorktree, err := commitRepo.Worktree() | ||||||
| 		if err != nil { | 		if err != nil { | ||||||
| 			return fmt.Errorf("git worktree: %s", err) | 			logrus.Fatal(err) | ||||||
| 		} | 		} | ||||||
|  |  | ||||||
| 		if err := commitWorktree.AddWithOptions(&git.AddOptions{All: true}); err != nil { | 		if err := commitWorktree.AddWithOptions(&git.AddOptions{All: true}); err != nil { | ||||||
| 			return fmt.Errorf("git add: %s", err) | 			return err | ||||||
| 		} | 		} | ||||||
|  |  | ||||||
| 		var author *object.Signature | 		if _, err = commitWorktree.Commit("init", &git.CommitOptions{}); err != nil { | ||||||
| 		if gitName != "" && gitEmail != "" { | 			return err | ||||||
| 			author = &object.Signature{Name: gitName, Email: gitEmail} |  | ||||||
| 		} |  | ||||||
| 		if _, err = commitWorktree.Commit("init", &git.CommitOptions{Author: author}); err != nil { |  | ||||||
| 			return fmt.Errorf("git commit: %s", err) |  | ||||||
| 		} | 		} | ||||||
| 		logrus.Debugf("init committed all files for new git repo in %s", repoPath) | 		logrus.Debugf("init committed all files for new git repo in %s", repoPath) | ||||||
| 	} | 	} | ||||||
|  | |||||||
| @ -264,20 +264,6 @@ func (r Recipe) SampleEnv() (map[string]string, error) { | |||||||
| 	return sampleEnv, nil | 	return sampleEnv, nil | ||||||
| } | } | ||||||
|  |  | ||||||
| // Ensure makes sure the recipe exists, is up to date and has the latest version checked out. |  | ||||||
| func Ensure(recipeName string) error { |  | ||||||
| 	if err := EnsureExists(recipeName); err != nil { |  | ||||||
| 		return err |  | ||||||
| 	} |  | ||||||
| 	if err := EnsureUpToDate(recipeName); err != nil { |  | ||||||
| 		return err |  | ||||||
| 	} |  | ||||||
| 	if err := EnsureLatest(recipeName); err != nil { |  | ||||||
| 		return err |  | ||||||
| 	} |  | ||||||
| 	return nil |  | ||||||
| } |  | ||||||
|  |  | ||||||
| // EnsureExists ensures that a recipe is locally cloned | // EnsureExists ensures that a recipe is locally cloned | ||||||
| func EnsureExists(recipeName string) error { | func EnsureExists(recipeName string) error { | ||||||
| 	recipeDir := path.Join(config.RECIPES_DIR, recipeName) | 	recipeDir := path.Join(config.RECIPES_DIR, recipeName) | ||||||
|  | |||||||
| @ -21,24 +21,11 @@ import ( | |||||||
| 	"github.com/sirupsen/logrus" | 	"github.com/sirupsen/logrus" | ||||||
| ) | ) | ||||||
|  |  | ||||||
| // Secret represents a secret. | // SecretValue represents a parsed `SECRET_FOO=v1 # length=bar` env var config | ||||||
| type Secret struct { | // secret definition. | ||||||
| 	// Version comes from the secret version environment variable. | type SecretValue struct { | ||||||
| 	// For example: |  | ||||||
| 	//  SECRET_FOO=v1 |  | ||||||
| 	Version string | 	Version string | ||||||
| 	// Length comes from the length modifier at the secret version environment | 	Length  int | ||||||
| 	// variable. For Example: |  | ||||||
| 	//   SECRET_FOO=v1 # length=12 |  | ||||||
| 	Length int |  | ||||||
| 	// RemoteName is the name of the secret on the server. For example: |  | ||||||
| 	//   name: ${STACK_NAME}_test_pass_two_${SECRET_TEST_PASS_TWO_VERSION} |  | ||||||
| 	// With the following: |  | ||||||
| 	//   STACK_NAME=test_example_com |  | ||||||
| 	//   SECRET_TEST_PASS_TWO_VERSION=v2 |  | ||||||
| 	// Will have this remote name: |  | ||||||
| 	//   test_example_com_test_pass_two_v2 |  | ||||||
| 	RemoteName string |  | ||||||
| } | } | ||||||
|  |  | ||||||
| // GeneratePasswords generates passwords. | // GeneratePasswords generates passwords. | ||||||
| @ -80,20 +67,17 @@ func GeneratePassphrases(count uint) ([]string, error) { | |||||||
| // and some times you don't (as the caller). We need to be able to handle the | // and some times you don't (as the caller). We need to be able to handle the | ||||||
| // "app new" case where we pass in the .env.sample and the "secret generate" | // "app new" case where we pass in the .env.sample and the "secret generate" | ||||||
| // case where the app is created. | // case where the app is created. | ||||||
| func ReadSecretsConfig(appEnvPath string, composeFiles []string, stackName string) (map[string]Secret, error) { | func ReadSecretsConfig(appEnvPath string, composeFiles []string, recipeName string) (map[string]SecretValue, error) { | ||||||
| 	appEnv, appModifiers, err := config.ReadEnvWithModifiers(appEnvPath) | 	appEnv, appModifiers, err := config.ReadEnvWithModifiers(appEnvPath) | ||||||
| 	if err != nil { | 	if err != nil { | ||||||
| 		return nil, err | 		return nil, err | ||||||
| 	} | 	} | ||||||
| 	// Set the STACK_NAME to be able to generate the remote name correctly. |  | ||||||
| 	appEnv["STACK_NAME"] = stackName |  | ||||||
|  |  | ||||||
| 	opts := stack.Deploy{Composefiles: composeFiles} | 	opts := stack.Deploy{Composefiles: composeFiles} | ||||||
| 	config, err := loader.LoadComposefile(opts, appEnv) | 	config, err := loader.LoadComposefile(opts, appEnv) | ||||||
| 	if err != nil { | 	if err != nil { | ||||||
| 		return nil, err | 		return nil, err | ||||||
| 	} | 	} | ||||||
| 	// Read the compose files without injecting environment variables. |  | ||||||
| 	configWithoutEnv, err := loader.LoadComposefile(opts, map[string]string{}, loader.SkipInterpolation) | 	configWithoutEnv, err := loader.LoadComposefile(opts, map[string]string{}, loader.SkipInterpolation) | ||||||
| 	if err != nil { | 	if err != nil { | ||||||
| 		return nil, err | 		return nil, err | ||||||
| @ -111,7 +95,7 @@ func ReadSecretsConfig(appEnvPath string, composeFiles []string, stackName strin | |||||||
| 		return nil, nil | 		return nil, nil | ||||||
| 	} | 	} | ||||||
|  |  | ||||||
| 	secretValues := map[string]Secret{} | 	secretValues := map[string]SecretValue{} | ||||||
| 	for secretId, secretConfig := range config.Secrets { | 	for secretId, secretConfig := range config.Secrets { | ||||||
| 		if string(secretConfig.Name[len(secretConfig.Name)-1]) == "_" { | 		if string(secretConfig.Name[len(secretConfig.Name)-1]) == "_" { | ||||||
| 			return nil, fmt.Errorf("missing version for secret? (%s)", secretId) | 			return nil, fmt.Errorf("missing version for secret? (%s)", secretId) | ||||||
| @ -124,19 +108,15 @@ func ReadSecretsConfig(appEnvPath string, composeFiles []string, stackName strin | |||||||
|  |  | ||||||
| 		lastIdx := strings.LastIndex(secretConfig.Name, "_") | 		lastIdx := strings.LastIndex(secretConfig.Name, "_") | ||||||
| 		secretVersion := secretConfig.Name[lastIdx+1:] | 		secretVersion := secretConfig.Name[lastIdx+1:] | ||||||
| 		value := Secret{Version: secretVersion, RemoteName: secretConfig.Name} | 		value := SecretValue{Version: secretVersion} | ||||||
|  |  | ||||||
| 		// Check if the length modifier is set for this secret. | 		// Check if the length modifier is set for this secret. | ||||||
| 		for envName, modifierValues := range appModifiers { | 		for k, v := range appModifiers { | ||||||
| 			// configWithoutEnv contains the raw name as defined in the compose.yaml | 			// configWithoutEnv contains the raw name as defined in the compose.yaml | ||||||
| 			// The name will look something like this: | 			if !strings.Contains(configWithoutEnv.Secrets[secretId].Name, k) { | ||||||
| 			//   name: ${STACK_NAME}_test_pass_two_${SECRET_TEST_PASS_TWO_VERSION} |  | ||||||
| 			// To check if the current modifier is for the current secret we check |  | ||||||
| 			// if the raw name contains the env name (e.g. SECRET_TEST_PASS_TWO_VERSION). |  | ||||||
| 			if !strings.Contains(configWithoutEnv.Secrets[secretId].Name, envName) { |  | ||||||
| 				continue | 				continue | ||||||
| 			} | 			} | ||||||
| 			lengthRaw, ok := modifierValues["length"] | 			lengthRaw, ok := v["length"] | ||||||
| 			if ok { | 			if ok { | ||||||
| 				length, err := strconv.Atoi(lengthRaw) | 				length, err := strconv.Atoi(lengthRaw) | ||||||
| 				if err != nil { | 				if err != nil { | ||||||
| @ -153,7 +133,7 @@ func ReadSecretsConfig(appEnvPath string, composeFiles []string, stackName strin | |||||||
| } | } | ||||||
|  |  | ||||||
| // GenerateSecrets generates secrets locally and sends them to a remote server for storage. | // GenerateSecrets generates secrets locally and sends them to a remote server for storage. | ||||||
| func GenerateSecrets(cl *dockerClient.Client, secrets map[string]Secret, server string) (map[string]string, error) { | func GenerateSecrets(cl *dockerClient.Client, secrets map[string]SecretValue, appName, server string) (map[string]string, error) { | ||||||
| 	secretsGenerated := map[string]string{} | 	secretsGenerated := map[string]string{} | ||||||
| 	var mutex sync.Mutex | 	var mutex sync.Mutex | ||||||
| 	var wg sync.WaitGroup | 	var wg sync.WaitGroup | ||||||
| @ -161,10 +141,11 @@ func GenerateSecrets(cl *dockerClient.Client, secrets map[string]Secret, server | |||||||
| 	for n, v := range secrets { | 	for n, v := range secrets { | ||||||
| 		wg.Add(1) | 		wg.Add(1) | ||||||
|  |  | ||||||
| 		go func(secretName string, secret Secret) { | 		go func(secretName string, secret SecretValue) { | ||||||
| 			defer wg.Done() | 			defer wg.Done() | ||||||
|  |  | ||||||
| 			logrus.Debugf("attempting to generate and store %s on %s", secret.RemoteName, server) | 			secretRemoteName := fmt.Sprintf("%s_%s_%s", appName, secretName, secret.Version) | ||||||
|  | 			logrus.Debugf("attempting to generate and store %s on %s", secretRemoteName, server) | ||||||
|  |  | ||||||
| 			if secret.Length > 0 { | 			if secret.Length > 0 { | ||||||
| 				passwords, err := GeneratePasswords(1, uint(secret.Length)) | 				passwords, err := GeneratePasswords(1, uint(secret.Length)) | ||||||
| @ -173,9 +154,9 @@ func GenerateSecrets(cl *dockerClient.Client, secrets map[string]Secret, server | |||||||
| 					return | 					return | ||||||
| 				} | 				} | ||||||
|  |  | ||||||
| 				if err := client.StoreSecret(cl, secret.RemoteName, passwords[0], server); err != nil { | 				if err := client.StoreSecret(cl, secretRemoteName, passwords[0], server); err != nil { | ||||||
| 					if strings.Contains(err.Error(), "AlreadyExists") { | 					if strings.Contains(err.Error(), "AlreadyExists") { | ||||||
| 						logrus.Warnf("%s already exists, moving on...", secret.RemoteName) | 						logrus.Warnf("%s already exists, moving on...", secretRemoteName) | ||||||
| 						ch <- nil | 						ch <- nil | ||||||
| 					} else { | 					} else { | ||||||
| 						ch <- err | 						ch <- err | ||||||
| @ -193,9 +174,9 @@ func GenerateSecrets(cl *dockerClient.Client, secrets map[string]Secret, server | |||||||
| 					return | 					return | ||||||
| 				} | 				} | ||||||
|  |  | ||||||
| 				if err := client.StoreSecret(cl, secret.RemoteName, passphrases[0], server); err != nil { | 				if err := client.StoreSecret(cl, secretRemoteName, passphrases[0], server); err != nil { | ||||||
| 					if strings.Contains(err.Error(), "AlreadyExists") { | 					if strings.Contains(err.Error(), "AlreadyExists") { | ||||||
| 						logrus.Warnf("%s already exists, moving on...", secret.RemoteName) | 						logrus.Warnf("%s already exists, moving on...", secretRemoteName) | ||||||
| 						ch <- nil | 						ch <- nil | ||||||
| 					} else { | 					} else { | ||||||
| 						ch <- err | 						ch <- err | ||||||
| @ -244,7 +225,7 @@ func PollSecretsStatus(cl *dockerClient.Client, app config.App) (secretStatuses, | |||||||
| 		return secStats, err | 		return secStats, err | ||||||
| 	} | 	} | ||||||
|  |  | ||||||
| 	secretsConfig, err := ReadSecretsConfig(app.Path, composeFiles, app.StackName()) | 	secretsConfig, err := ReadSecretsConfig(app.Path, composeFiles, app.Recipe) | ||||||
| 	if err != nil { | 	if err != nil { | ||||||
| 		return secStats, err | 		return secStats, err | ||||||
| 	} | 	} | ||||||
|  | |||||||
| @ -1,30 +1,42 @@ | |||||||
| package secret | package secret | ||||||
|  |  | ||||||
| import ( | import ( | ||||||
|  | 	"path" | ||||||
| 	"testing" | 	"testing" | ||||||
|  |  | ||||||
|  | 	"coopcloud.tech/abra/pkg/config" | ||||||
|  | 	"coopcloud.tech/abra/pkg/recipe" | ||||||
|  | 	"coopcloud.tech/abra/pkg/upstream/stack" | ||||||
|  | 	loader "coopcloud.tech/abra/pkg/upstream/stack" | ||||||
| 	"github.com/stretchr/testify/assert" | 	"github.com/stretchr/testify/assert" | ||||||
| ) | ) | ||||||
|  |  | ||||||
| func TestReadSecretsConfig(t *testing.T) { | func TestReadSecretsConfig(t *testing.T) { | ||||||
| 	composeFiles := []string{"./testdir/compose.yaml"} | 	offline := true | ||||||
| 	secretsFromConfig, err := ReadSecretsConfig("./testdir/.env.sample", composeFiles, "test_example_com") | 	recipe, err := recipe.Get("matrix-synapse", offline) | ||||||
| 	if err != nil { | 	if err != nil { | ||||||
| 		t.Fatal(err) | 		t.Fatal(err) | ||||||
| 	} | 	} | ||||||
|  |  | ||||||
| 	// Simple secret | 	sampleEnv, err := recipe.SampleEnv() | ||||||
| 	assert.Equal(t, "test_example_com_test_pass_one_v2", secretsFromConfig["test_pass_one"].RemoteName) | 	if err != nil { | ||||||
| 	assert.Equal(t, "v2", secretsFromConfig["test_pass_one"].Version) | 		t.Fatal(err) | ||||||
| 	assert.Equal(t, 0, secretsFromConfig["test_pass_one"].Length) | 	} | ||||||
|  |  | ||||||
| 	// Has a length modifier | 	composeFiles := []string{path.Join(config.RECIPES_DIR, recipe.Name, "compose.yml")} | ||||||
| 	assert.Equal(t, "test_example_com_test_pass_two_v1", secretsFromConfig["test_pass_two"].RemoteName) | 	envSamplePath := path.Join(config.RECIPES_DIR, recipe.Name, ".env.sample") | ||||||
| 	assert.Equal(t, "v1", secretsFromConfig["test_pass_two"].Version) | 	secretsFromConfig, err := ReadSecretsConfig(envSamplePath, composeFiles, recipe.Name) | ||||||
| 	assert.Equal(t, 10, secretsFromConfig["test_pass_two"].Length) | 	if err != nil { | ||||||
|  | 		t.Fatal(err) | ||||||
|  | 	} | ||||||
|  |  | ||||||
| 	// Secret name does not include the secret id | 	opts := stack.Deploy{Composefiles: composeFiles} | ||||||
| 	assert.Equal(t, "test_example_com_pass_three_v2", secretsFromConfig["test_pass_three"].RemoteName) | 	config, err := loader.LoadComposefile(opts, sampleEnv) | ||||||
| 	assert.Equal(t, "v2", secretsFromConfig["test_pass_three"].Version) | 	if err != nil { | ||||||
| 	assert.Equal(t, 0, secretsFromConfig["test_pass_three"].Length) | 		t.Fatal(err) | ||||||
|  | 	} | ||||||
|  |  | ||||||
|  | 	for secretId := range config.Secrets { | ||||||
|  | 		assert.Contains(t, secretsFromConfig, secretId) | ||||||
|  | 	} | ||||||
| } | } | ||||||
|  | |||||||
| @ -1,3 +0,0 @@ | |||||||
| SECRET_TEST_PASS_ONE_VERSION=v2 |  | ||||||
| SECRET_TEST_PASS_TWO_VERSION=v1 # length=10 |  | ||||||
| SECRET_TEST_PASS_THREE_VERSION=v2 |  | ||||||
| @ -1,21 +0,0 @@ | |||||||
| --- |  | ||||||
| version: "3.8" |  | ||||||
|  |  | ||||||
| services: |  | ||||||
|   app: |  | ||||||
|     image: nginx:1.21.0 |  | ||||||
|     secrets: |  | ||||||
|       - test_pass_one |  | ||||||
|       - test_pass_two |  | ||||||
|       - test_pass_three |  | ||||||
|  |  | ||||||
| secrets: |  | ||||||
|   test_pass_one: |  | ||||||
|     external: true |  | ||||||
|     name: ${STACK_NAME}_test_pass_one_${SECRET_TEST_PASS_ONE_VERSION}  # should be removed |  | ||||||
|   test_pass_two: |  | ||||||
|     external: true |  | ||||||
|     name: ${STACK_NAME}_test_pass_two_${SECRET_TEST_PASS_TWO_VERSION} |  | ||||||
|   test_pass_three: |  | ||||||
|     external: true |  | ||||||
|     name: ${STACK_NAME}_pass_three_${SECRET_TEST_PASS_THREE_VERSION} # secretId and name don't match |  | ||||||
| @ -14,70 +14,6 @@ import ( | |||||||
| 	"github.com/sirupsen/logrus" | 	"github.com/sirupsen/logrus" | ||||||
| ) | ) | ||||||
|  |  | ||||||
| // GetService retrieves a service container based on a label. If prompt is true |  | ||||||
| // and the retrievd count of service containers does not match 1, then a prompt |  | ||||||
| // is presented to let the user choose. An error is returned when no service is |  | ||||||
| // found. |  | ||||||
| func GetServiceByLabel(c context.Context, cl *client.Client, label string, prompt bool) (swarm.Service, error) { |  | ||||||
| 	services, err := cl.ServiceList(c, types.ServiceListOptions{}) |  | ||||||
| 	if err != nil { |  | ||||||
| 		return swarm.Service{}, err |  | ||||||
| 	} |  | ||||||
|  |  | ||||||
| 	if len(services) == 0 { |  | ||||||
| 		return swarm.Service{}, fmt.Errorf("no services deployed?") |  | ||||||
| 	} |  | ||||||
|  |  | ||||||
| 	var matchingServices []swarm.Service |  | ||||||
| 	for _, service := range services { |  | ||||||
| 		if enabled, exists := service.Spec.Labels[label]; exists && enabled == "true" { |  | ||||||
| 			matchingServices = append(matchingServices, service) |  | ||||||
| 		} |  | ||||||
| 	} |  | ||||||
|  |  | ||||||
| 	if len(matchingServices) == 0 { |  | ||||||
| 		return swarm.Service{}, fmt.Errorf("no services deployed matching label '%s'?", label) |  | ||||||
| 	} |  | ||||||
|  |  | ||||||
| 	if len(matchingServices) > 1 { |  | ||||||
| 		var servicesRaw []string |  | ||||||
| 		for _, service := range matchingServices { |  | ||||||
| 			serviceName := service.Spec.Name |  | ||||||
| 			created := formatter.HumanDuration(service.CreatedAt.Unix()) |  | ||||||
| 			servicesRaw = append(servicesRaw, fmt.Sprintf("%s (created %v)", serviceName, created)) |  | ||||||
| 		} |  | ||||||
|  |  | ||||||
| 		if !prompt { |  | ||||||
| 			err := fmt.Errorf("expected 1 service but found %v: %s", len(matchingServices), strings.Join(servicesRaw, " ")) |  | ||||||
| 			return swarm.Service{}, err |  | ||||||
| 		} |  | ||||||
|  |  | ||||||
| 		logrus.Warnf("ambiguous service list received, prompting for input") |  | ||||||
|  |  | ||||||
| 		var response string |  | ||||||
| 		prompt := &survey.Select{ |  | ||||||
| 			Message: "which service are you looking for?", |  | ||||||
| 			Options: servicesRaw, |  | ||||||
| 		} |  | ||||||
|  |  | ||||||
| 		if err := survey.AskOne(prompt, &response); err != nil { |  | ||||||
| 			return swarm.Service{}, err |  | ||||||
| 		} |  | ||||||
|  |  | ||||||
| 		chosenService := strings.TrimSpace(strings.Split(response, " ")[0]) |  | ||||||
| 		for _, service := range matchingServices { |  | ||||||
| 			serviceName := strings.ToLower(service.Spec.Name) |  | ||||||
| 			if serviceName == chosenService { |  | ||||||
| 				return service, nil |  | ||||||
| 			} |  | ||||||
| 		} |  | ||||||
|  |  | ||||||
| 		logrus.Panic("failed to match chosen service") |  | ||||||
| 	} |  | ||||||
|  |  | ||||||
| 	return matchingServices[0], nil |  | ||||||
| } |  | ||||||
|  |  | ||||||
| // GetService retrieves a service container. If prompt is true and the retrievd | // GetService retrieves a service container. If prompt is true and the retrievd | ||||||
| // count of service containers does not match 1, then a prompt is presented to | // count of service containers does not match 1, then a prompt is presented to | ||||||
| // let the user choose. A count of 0 is handled gracefully. | // let the user choose. A count of 0 is handled gracefully. | ||||||
|  | |||||||
| @ -13,10 +13,7 @@ import ( | |||||||
| 	"github.com/sirupsen/logrus" | 	"github.com/sirupsen/logrus" | ||||||
| ) | ) | ||||||
|  |  | ||||||
| // RunExec runs a command on a remote container. io.Writer corresponds to the | func RunExec(dockerCli command.Cli, client *apiclient.Client, containerID string, execConfig *types.ExecConfig) error { | ||||||
| // command output. |  | ||||||
| func RunExec(dockerCli command.Cli, client *apiclient.Client, containerID string, |  | ||||||
| 	execConfig *types.ExecConfig) (io.Writer, error) { |  | ||||||
| 	ctx := context.Background() | 	ctx := context.Background() | ||||||
|  |  | ||||||
| 	// We need to check the tty _before_ we do the ContainerExecCreate, because | 	// We need to check the tty _before_ we do the ContainerExecCreate, because | ||||||
| @ -24,22 +21,22 @@ func RunExec(dockerCli command.Cli, client *apiclient.Client, containerID string | |||||||
| 	// there's no easy way to clean those up). But also in order to make "not | 	// there's no easy way to clean those up). But also in order to make "not | ||||||
| 	// exist" errors take precedence we do a dummy inspect first. | 	// exist" errors take precedence we do a dummy inspect first. | ||||||
| 	if _, err := client.ContainerInspect(ctx, containerID); err != nil { | 	if _, err := client.ContainerInspect(ctx, containerID); err != nil { | ||||||
| 		return nil, err | 		return err | ||||||
| 	} | 	} | ||||||
| 	if !execConfig.Detach { | 	if !execConfig.Detach { | ||||||
| 		if err := dockerCli.In().CheckTty(execConfig.AttachStdin, execConfig.Tty); err != nil { | 		if err := dockerCli.In().CheckTty(execConfig.AttachStdin, execConfig.Tty); err != nil { | ||||||
| 			return nil, err | 			return err | ||||||
| 		} | 		} | ||||||
| 	} | 	} | ||||||
|  |  | ||||||
| 	response, err := client.ContainerExecCreate(ctx, containerID, *execConfig) | 	response, err := client.ContainerExecCreate(ctx, containerID, *execConfig) | ||||||
| 	if err != nil { | 	if err != nil { | ||||||
| 		return nil, err | 		return err | ||||||
| 	} | 	} | ||||||
|  |  | ||||||
| 	execID := response.ID | 	execID := response.ID | ||||||
| 	if execID == "" { | 	if execID == "" { | ||||||
| 		return nil, errors.New("exec ID empty") | 		return errors.New("exec ID empty") | ||||||
| 	} | 	} | ||||||
|  |  | ||||||
| 	if execConfig.Detach { | 	if execConfig.Detach { | ||||||
| @ -47,13 +44,13 @@ func RunExec(dockerCli command.Cli, client *apiclient.Client, containerID string | |||||||
| 			Detach: execConfig.Detach, | 			Detach: execConfig.Detach, | ||||||
| 			Tty:    execConfig.Tty, | 			Tty:    execConfig.Tty, | ||||||
| 		} | 		} | ||||||
| 		return nil, client.ContainerExecStart(ctx, execID, execStartCheck) | 		return client.ContainerExecStart(ctx, execID, execStartCheck) | ||||||
| 	} | 	} | ||||||
| 	return interactiveExec(ctx, dockerCli, client, execConfig, execID) | 	return interactiveExec(ctx, dockerCli, client, execConfig, execID) | ||||||
| } | } | ||||||
|  |  | ||||||
| func interactiveExec(ctx context.Context, dockerCli command.Cli, client *apiclient.Client, | func interactiveExec(ctx context.Context, dockerCli command.Cli, client *apiclient.Client, | ||||||
| 	execConfig *types.ExecConfig, execID string) (io.Writer, error) { | 	execConfig *types.ExecConfig, execID string) error { | ||||||
| 	// Interactive exec requested. | 	// Interactive exec requested. | ||||||
| 	var ( | 	var ( | ||||||
| 		out, stderr io.Writer | 		out, stderr io.Writer | ||||||
| @ -79,7 +76,7 @@ func interactiveExec(ctx context.Context, dockerCli command.Cli, client *apiclie | |||||||
| 	} | 	} | ||||||
| 	resp, err := client.ContainerExecAttach(ctx, execID, execStartCheck) | 	resp, err := client.ContainerExecAttach(ctx, execID, execStartCheck) | ||||||
| 	if err != nil { | 	if err != nil { | ||||||
| 		return out, err | 		return err | ||||||
| 	} | 	} | ||||||
| 	defer resp.Close() | 	defer resp.Close() | ||||||
|  |  | ||||||
| @ -110,10 +107,10 @@ func interactiveExec(ctx context.Context, dockerCli command.Cli, client *apiclie | |||||||
|  |  | ||||||
| 	if err := <-errCh; err != nil { | 	if err := <-errCh; err != nil { | ||||||
| 		logrus.Debugf("Error hijack: %s", err) | 		logrus.Debugf("Error hijack: %s", err) | ||||||
| 		return out, err | 		return err | ||||||
| 	} | 	} | ||||||
|  |  | ||||||
| 	return out, getExecExitStatus(ctx, client, execID) | 	return getExecExitStatus(ctx, client, execID) | ||||||
| } | } | ||||||
|  |  | ||||||
| func getExecExitStatus(ctx context.Context, client apiclient.ContainerAPIClient, execID string) error { | func getExecExitStatus(ctx context.Context, client apiclient.ContainerAPIClient, execID string) error { | ||||||
|  | |||||||
| @ -65,19 +65,17 @@ function install_abra_release { | |||||||
|  |  | ||||||
|   checksums=$(wget -q -O- $checksums_url) |   checksums=$(wget -q -O- $checksums_url) | ||||||
|   checksum=$(echo "$checksums" | grep "$FILENAME" - | sed -En 's/([0-9a-f]{64})\s+'"$FILENAME"'.*/\1/p') |   checksum=$(echo "$checksums" | grep "$FILENAME" - | sed -En 's/([0-9a-f]{64})\s+'"$FILENAME"'.*/\1/p') | ||||||
|   abra_download="/tmp/abra-download" |  | ||||||
|  |  | ||||||
|   echo "downloading $ABRA_VERSION $PLATFORM binary release for abra..." |   echo "downloading $ABRA_VERSION $PLATFORM binary release for abra..." | ||||||
|  |   wget -q "$release_url" -O "$HOME/.local/bin/.abra-download" | ||||||
|   wget -q "$release_url" -O $abra_download  |   localsum=$(sha256sum $HOME/.local/bin/.abra-download | sed -En 's/([0-9a-f]{64})\s+.*/\1/p') | ||||||
|   localsum=$(sha256sum $abra_download | sed -En 's/([0-9a-f]{64})\s+.*/\1/p') |  | ||||||
|   echo "checking if checksums match..." |   echo "checking if checksums match..." | ||||||
|   if [[ "$localsum" != "$checksum" ]]; then |   if [[ "$localsum" != "$checksum" ]]; then | ||||||
|       print_checksum_error |       print_checksum_error | ||||||
|       exit 1 |       exit 1 | ||||||
|   fi |   fi | ||||||
|   echo "$(tput setaf 2)check successful!$(tput sgr0)" |   echo "$(tput setaf 2)check successful!$(tput sgr0)" | ||||||
|   mv "$abra_download" "$HOME/.local/bin/abra" |   mv "$HOME/.local/bin/.abra-download" "$HOME/.local/bin/abra" | ||||||
|   chmod +x "$HOME/.local/bin/abra" |   chmod +x "$HOME/.local/bin/abra" | ||||||
|  |  | ||||||
|   x=$(echo $PATH | grep $HOME/.local/bin) |   x=$(echo $PATH | grep $HOME/.local/bin) | ||||||
|  | |||||||
| @ -19,6 +19,31 @@ setup(){ | |||||||
|   _common_setup |   _common_setup | ||||||
| } | } | ||||||
|  |  | ||||||
|  | _mkfile() { | ||||||
|  |   run bash -c "echo $2 > $1" | ||||||
|  |   assert_success | ||||||
|  | } | ||||||
|  |  | ||||||
|  | _mkfile_remote() { | ||||||
|  |   run $ABRA app run "$TEST_APP_DOMAIN" app "bash -c \"echo $2 > $1\"" | ||||||
|  |   assert_success | ||||||
|  | } | ||||||
|  |  | ||||||
|  | _mkdir() { | ||||||
|  |   run bash -c "mkdir -p $1" | ||||||
|  |   assert_success | ||||||
|  | } | ||||||
|  |  | ||||||
|  | _rm() { | ||||||
|  |   run rm -rf "$1" | ||||||
|  |   assert_success | ||||||
|  | } | ||||||
|  |  | ||||||
|  | _rm_remote() { | ||||||
|  |   run "$ABRA" app run "$TEST_APP_DOMAIN" app rm -rf "$1" | ||||||
|  |   assert_success | ||||||
|  | } | ||||||
|  |  | ||||||
| @test "validate app argument" { | @test "validate app argument" { | ||||||
|   run $ABRA app cp |   run $ABRA app cp | ||||||
|   assert_failure |   assert_failure | ||||||
|  | |||||||
| @ -18,24 +18,9 @@ setup(){ | |||||||
| } | } | ||||||
|  |  | ||||||
| teardown(){ | teardown(){ | ||||||
|   load "$PWD/tests/integration/helpers/common" |  | ||||||
|   _rm_app |   _rm_app | ||||||
| } | } | ||||||
|  |  | ||||||
| @test "autocomplete" { |  | ||||||
|   run $ABRA app new --generate-bash-completion |  | ||||||
|   assert_success |  | ||||||
|   assert_output --partial "traefik" |  | ||||||
|   assert_output --partial "abra-test-recipe" |  | ||||||
|  |  | ||||||
|   # Note: this test needs to be updated when a new version of the test recipe is published. |  | ||||||
|   run $ABRA app new abra-test-recipe --generate-bash-completion |  | ||||||
|   assert_success |  | ||||||
|   assert_output "0.1.0+1.20.0 |  | ||||||
| 0.1.1+1.20.2 |  | ||||||
| 0.2.0+1.21.0" |  | ||||||
| } |  | ||||||
|  |  | ||||||
| @test "create new app" { | @test "create new app" { | ||||||
|   run $ABRA app new "$TEST_RECIPE" \ |   run $ABRA app new "$TEST_RECIPE" \ | ||||||
|     --no-input \ |     --no-input \ | ||||||
| @ -43,29 +28,10 @@ teardown(){ | |||||||
|     --domain "$TEST_APP_DOMAIN" |     --domain "$TEST_APP_DOMAIN" | ||||||
|   assert_success |   assert_success | ||||||
|   assert_exists "$ABRA_DIR/servers/$TEST_SERVER/$TEST_APP_DOMAIN.env" |   assert_exists "$ABRA_DIR/servers/$TEST_SERVER/$TEST_APP_DOMAIN.env" | ||||||
|  |  | ||||||
|   run git -C "$ABRA_DIR/recipes/$TEST_RECIPE" status |  | ||||||
|   assert_output --partial "Your branch is up to date with 'origin/main'." |  | ||||||
| } |  | ||||||
|  |  | ||||||
| @test "create new app with version" { |  | ||||||
|   run $ABRA app new "$TEST_RECIPE" 0.1.1+1.20.2 \ |  | ||||||
|     --no-input \ |  | ||||||
|     --server "$TEST_SERVER" \ |  | ||||||
|     --domain "$TEST_APP_DOMAIN" |  | ||||||
|   assert_success |  | ||||||
|   assert_exists "$ABRA_DIR/servers/$TEST_SERVER/$TEST_APP_DOMAIN.env" |  | ||||||
|  |  | ||||||
|   run git -C "$ABRA_DIR/recipes/$TEST_RECIPE" log -1 |  | ||||||
|   assert_output --partial "453db7121c0a56a7a8f15378f18fe3bf21ccfdef" |  | ||||||
| } | } | ||||||
|  |  | ||||||
| @test "does not overwrite existing env files" { | @test "does not overwrite existing env files" { | ||||||
|   run $ABRA app new "$TEST_RECIPE" \ |   _new_app | ||||||
|     --no-input \ |  | ||||||
|     --server "$TEST_SERVER" \ |  | ||||||
|     --domain "$TEST_APP_DOMAIN" |  | ||||||
|   assert_success |  | ||||||
|  |  | ||||||
|   run $ABRA app new "$TEST_RECIPE" \ |   run $ABRA app new "$TEST_RECIPE" \ | ||||||
|     --no-input \ |     --no-input \ | ||||||
| @ -108,7 +74,8 @@ teardown(){ | |||||||
|     --no-input \ |     --no-input \ | ||||||
|     --chaos \ |     --chaos \ | ||||||
|     --server "$TEST_SERVER" \ |     --server "$TEST_SERVER" \ | ||||||
|     --domain "$TEST_APP_DOMAIN" |     --domain "$TEST_APP_DOMAIN" \ | ||||||
|  |     --secrets | ||||||
|   assert_success |   assert_success | ||||||
|   assert_exists "$ABRA_DIR/servers/$TEST_SERVER/$TEST_APP_DOMAIN.env" |   assert_exists "$ABRA_DIR/servers/$TEST_SERVER/$TEST_APP_DOMAIN.env" | ||||||
|  |  | ||||||
| @ -121,17 +88,18 @@ teardown(){ | |||||||
|   assert_success |   assert_success | ||||||
|  |  | ||||||
|   run git -C "$ABRA_DIR/recipes/$TEST_RECIPE" status |   run git -C "$ABRA_DIR/recipes/$TEST_RECIPE" status | ||||||
|   assert_output --partial "Your branch is behind 'origin/main' by 3 commits, and can be fast-forwarded." |   assert_output --partial 'behind 3' | ||||||
|  |  | ||||||
|   run $ABRA app new "$TEST_RECIPE" \ |   run $ABRA app new "$TEST_RECIPE" \ | ||||||
|     --no-input \ |     --no-input \ | ||||||
|     --server "$TEST_SERVER" \ |     --server "$TEST_SERVER" \ | ||||||
|     --domain "$TEST_APP_DOMAIN" |     --domain "$TEST_APP_DOMAIN" \ | ||||||
|  |     --secrets | ||||||
|   assert_success |   assert_success | ||||||
|   assert_exists "$ABRA_DIR/servers/$TEST_SERVER/$TEST_APP_DOMAIN.env" |   assert_exists "$ABRA_DIR/servers/$TEST_SERVER/$TEST_APP_DOMAIN.env" | ||||||
|  |  | ||||||
|   run git -C "$ABRA_DIR/recipes/$TEST_RECIPE" status |   run git -C "$ABRA_DIR/recipes/$TEST_RECIPE" status | ||||||
|   assert_output --partial "Your branch is up to date with 'origin/main'." |   refute_output --partial 'behind 3' | ||||||
|  |  | ||||||
|   _reset_recipe |   _reset_recipe | ||||||
| } | } | ||||||
| @ -141,7 +109,7 @@ teardown(){ | |||||||
|   assert_success |   assert_success | ||||||
|  |  | ||||||
|   run git -C "$ABRA_DIR/recipes/$TEST_RECIPE" status |   run git -C "$ABRA_DIR/recipes/$TEST_RECIPE" status | ||||||
|   assert_output --partial "Your branch is behind 'origin/main' by 3 commits, and can be fast-forwarded." |   assert_output --partial 'behind 3' | ||||||
|  |  | ||||||
|   # NOTE(d1): need to use --chaos to force same commit |   # NOTE(d1): need to use --chaos to force same commit | ||||||
|   run $ABRA app new "$TEST_RECIPE" \ |   run $ABRA app new "$TEST_RECIPE" \ | ||||||
| @ -149,12 +117,13 @@ teardown(){ | |||||||
|     --offline \ |     --offline \ | ||||||
|     --chaos \ |     --chaos \ | ||||||
|     --server "$TEST_SERVER" \ |     --server "$TEST_SERVER" \ | ||||||
|     --domain "$TEST_APP_DOMAIN" |     --domain "$TEST_APP_DOMAIN" \ | ||||||
|  |     --secrets | ||||||
|   assert_success |   assert_success | ||||||
|   assert_exists "$ABRA_DIR/servers/$TEST_SERVER/$TEST_APP_DOMAIN.env" |   assert_exists "$ABRA_DIR/servers/$TEST_SERVER/$TEST_APP_DOMAIN.env" | ||||||
|  |  | ||||||
|   run git -C "$ABRA_DIR/recipes/$TEST_RECIPE" status |   run git -C "$ABRA_DIR/recipes/$TEST_RECIPE" status | ||||||
|   assert_output --partial "Your branch is behind 'origin/main' by 3 commits, and can be fast-forwarded." |   assert_output --partial 'behind 3' | ||||||
|  |  | ||||||
|   _reset_recipe |   _reset_recipe | ||||||
| } | } | ||||||
|  | |||||||
| @ -104,7 +104,10 @@ teardown(){ | |||||||
|  |  | ||||||
|   _undeploy_app |   _undeploy_app | ||||||
|  |  | ||||||
|   run $ABRA app volume rm "$TEST_APP_DOMAIN" |   # NOTE(d1): to let the stack come down before nuking volumes | ||||||
|  |   sleep 5 | ||||||
|  |  | ||||||
|  |   run $ABRA app volume rm "$TEST_APP_DOMAIN" --force | ||||||
|   assert_success |   assert_success | ||||||
|  |  | ||||||
|   run $ABRA app volume ls "$TEST_APP_DOMAIN" |   run $ABRA app volume ls "$TEST_APP_DOMAIN" | ||||||
| @ -129,6 +132,9 @@ teardown(){ | |||||||
|  |  | ||||||
|   _undeploy_app |   _undeploy_app | ||||||
|  |  | ||||||
|  |   # NOTE(d1): to let the stack come down before nuking volumes | ||||||
|  |   sleep 5 | ||||||
|  |  | ||||||
|   run $ABRA app rm "$TEST_APP_DOMAIN" --no-input |   run $ABRA app rm "$TEST_APP_DOMAIN" --no-input | ||||||
|   assert_success |   assert_success | ||||||
|   assert_output --partial 'test-volume' |   assert_output --partial 'test-volume' | ||||||
|  | |||||||
| @ -5,7 +5,6 @@ _common_setup() { | |||||||
|   bats_load_library bats-assert |   bats_load_library bats-assert | ||||||
|   bats_load_library bats-file |   bats_load_library bats-file | ||||||
|  |  | ||||||
|   load "$PWD/tests/integration/helpers/file" |  | ||||||
|   load "$PWD/tests/integration/helpers/app" |   load "$PWD/tests/integration/helpers/app" | ||||||
|   load "$PWD/tests/integration/helpers/git" |   load "$PWD/tests/integration/helpers/git" | ||||||
|   load "$PWD/tests/integration/helpers/recipe" |   load "$PWD/tests/integration/helpers/recipe" | ||||||
|  | |||||||
| @ -1,24 +0,0 @@ | |||||||
| _mkfile() { |  | ||||||
|   run bash -c "echo $2 > $1" |  | ||||||
|   assert_success |  | ||||||
| } |  | ||||||
|  |  | ||||||
| _mkfile_remote() { |  | ||||||
|   run $ABRA app run "$TEST_APP_DOMAIN" app "bash -c \"echo $2 > $1\"" |  | ||||||
|   assert_success |  | ||||||
| } |  | ||||||
|  |  | ||||||
| _mkdir() { |  | ||||||
|   run bash -c "mkdir -p $1" |  | ||||||
|   assert_success |  | ||||||
| } |  | ||||||
|  |  | ||||||
| _rm() { |  | ||||||
|   run rm -rf "$1" |  | ||||||
|   assert_success |  | ||||||
| } |  | ||||||
|  |  | ||||||
| _rm_remote() { |  | ||||||
|   run "$ABRA" app run "$TEST_APP_DOMAIN" app rm -rf "$1" |  | ||||||
|   assert_success |  | ||||||
| } |  | ||||||
| @ -28,10 +28,3 @@ _reset_tags() { | |||||||
|   assert_success |   assert_success | ||||||
|   refute_output '0' |   refute_output '0' | ||||||
| } | } | ||||||
|  |  | ||||||
| _set_git_author() { |  | ||||||
|   run git -C "$ABRA_DIR/recipes/$TEST_RECIPE" config --local user.email test@example.com |  | ||||||
|   assert_success |  | ||||||
|   run git -C "$ABRA_DIR/recipes/$TEST_RECIPE" config --local user.name test |  | ||||||
|   assert_success |  | ||||||
| } |  | ||||||
|  | |||||||
| @ -5,17 +5,7 @@ setup() { | |||||||
|   _common_setup |   _common_setup | ||||||
| } | } | ||||||
|  |  | ||||||
| @test "recipe fetch all" { | @test "recipe fetch" { | ||||||
|   run rm -rf "$ABRA_DIR/recipes/matrix-synapse" |  | ||||||
|   assert_success |  | ||||||
|   assert_not_exists "$ABRA_DIR/recipes/matrix-synapse" |  | ||||||
|  |  | ||||||
|   run $ABRA recipe fetch |  | ||||||
|   assert_success |  | ||||||
|   assert_exists "$ABRA_DIR/recipes/matrix-synapse" |  | ||||||
| } |  | ||||||
|  |  | ||||||
| @test "recipe fetch single recipe" { |  | ||||||
|   run rm -rf "$ABRA_DIR/recipes/matrix-synapse" |   run rm -rf "$ABRA_DIR/recipes/matrix-synapse" | ||||||
|   assert_success |   assert_success | ||||||
|   assert_not_exists "$ABRA_DIR/recipes/matrix-synapse" |   assert_not_exists "$ABRA_DIR/recipes/matrix-synapse" | ||||||
|  | |||||||
| @ -23,14 +23,14 @@ teardown(){ | |||||||
| } | } | ||||||
|  |  | ||||||
| @test "create new recipe" { | @test "create new recipe" { | ||||||
|   run $ABRA recipe new foobar --git-name foo --git-email foo@example.com |   run $ABRA recipe new foobar | ||||||
|   assert_success |   assert_success | ||||||
|   assert_output --partial 'Your new foobar recipe has been created' |   assert_output --partial 'Your new foobar recipe has been created' | ||||||
|   assert_exists "$ABRA_DIR/recipes/foobar" |   assert_exists "$ABRA_DIR/recipes/foobar" | ||||||
| } | } | ||||||
|  |  | ||||||
| @test "create new app from new recipe" { | @test "create new app from new recipe" { | ||||||
|   run $ABRA recipe new foobar --git-name foo --git-email foo@example.com |   run $ABRA recipe new foobar | ||||||
|   assert_success |   assert_success | ||||||
|  |  | ||||||
|   run $ABRA app new foobar \ |   run $ABRA app new foobar \ | ||||||
|  | |||||||
| @ -15,11 +15,6 @@ teardown_file(){ | |||||||
| setup(){ | setup(){ | ||||||
|   load "$PWD/tests/integration/helpers/common" |   load "$PWD/tests/integration/helpers/common" | ||||||
|   _common_setup |   _common_setup | ||||||
|   _set_git_author |  | ||||||
| } |  | ||||||
|  |  | ||||||
| teardown() { |  | ||||||
|   _reset_recipe |  | ||||||
| } | } | ||||||
|  |  | ||||||
| @test "validate recipe argument" { | @test "validate recipe argument" { | ||||||
| @ -56,6 +51,8 @@ teardown() { | |||||||
|   run git -C "$ABRA_DIR/recipes/$TEST_RECIPE" tag --list |   run git -C "$ABRA_DIR/recipes/$TEST_RECIPE" tag --list | ||||||
|   assert_success |   assert_success | ||||||
|   assert_output --partial '0.2.1+1.21.6' |   assert_output --partial '0.2.1+1.21.6' | ||||||
|  |  | ||||||
|  |   _reset_recipe | ||||||
| } | } | ||||||
|  |  | ||||||
| # NOTE(d1): this test can't assert hardcoded versions since we upgrade a minor | # NOTE(d1): this test can't assert hardcoded versions since we upgrade a minor | ||||||
| @ -84,6 +81,8 @@ teardown() { | |||||||
|   run git -C "$ABRA_DIR/recipes/$TEST_RECIPE" tag --list |   run git -C "$ABRA_DIR/recipes/$TEST_RECIPE" tag --list | ||||||
|   assert_success |   assert_success | ||||||
|   assert_output --regexp '0\.3\.0\+1\.2.*' |   assert_output --regexp '0\.3\.0\+1\.2.*' | ||||||
|  |  | ||||||
|  |   _reset_recipe "$TEST_RECIPE" | ||||||
| } | } | ||||||
|  |  | ||||||
| @test "unknown files not committed" { | @test "unknown files not committed" { | ||||||
| @ -101,21 +100,6 @@ teardown() { | |||||||
|   run git -C "$ABRA_DIR/recipes/$TEST_RECIPE" rm foo |   run git -C "$ABRA_DIR/recipes/$TEST_RECIPE" rm foo | ||||||
|   assert_failure |   assert_failure | ||||||
|   assert_output --partial "fatal: pathspec 'foo' did not match any files" |   assert_output --partial "fatal: pathspec 'foo' did not match any files" | ||||||
| } |  | ||||||
|  |   _reset_recipe | ||||||
| # NOTE: relies on 0.2.x being the last minor version |  | ||||||
| @test "release with next release note" { |  | ||||||
|   _mkfile "$ABRA_DIR/recipes/$TEST_RECIPE/release/next" "those are some release notes for the next release" |  | ||||||
|   run git -C "$ABRA_DIR/recipes/$TEST_RECIPE" add release/next |  | ||||||
|   assert_success |  | ||||||
|   run git -C "$ABRA_DIR/recipes/$TEST_RECIPE" commit -m "added some release notes" |  | ||||||
|   assert_success |  | ||||||
|  |  | ||||||
|   run $ABRA recipe release  "$TEST_RECIPE" --no-input  --minor |  | ||||||
|   assert_success |  | ||||||
|   assert_output --partial 'no -p/--publish passed, not publishing' |  | ||||||
|  |  | ||||||
|   assert_not_exists "$ABRA_DIR/recipes/$TEST_RECIPE/release/next" |  | ||||||
|   assert_exists "$ABRA_DIR/recipes/$TEST_RECIPE/release/0.3.0+1.21.0" |  | ||||||
|   assert_file_contains "$ABRA_DIR/recipes/$TEST_RECIPE/release/0.3.0+1.21.0" "those are some release notes for the next release" |  | ||||||
| } | } | ||||||
|  | |||||||
		Reference in New Issue
	
	Block a user