repo_name
stringlengths
1
52
repo_creator
stringclasses
6 values
programming_language
stringclasses
4 values
code
stringlengths
0
9.68M
num_lines
int64
1
234k
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package cli import ( "fmt" "os" "github.com/aws/aws-sdk-go/aws" "github.com/aws/aws-sdk-go/service/ssm" "github.com/aws/copilot-cli/internal/pkg/aws/identity" "github.com/aws/copilot-cli/internal/pkg/aws/sessions" "github.com/aws/copilot-cli/internal/pkg/config" "github.com/aws/copilot-cli/internal/pkg/exec" "github.com/aws/copilot-cli/internal/pkg/manifest" "github.com/aws/copilot-cli/internal/pkg/term/prompt" "github.com/aws/copilot-cli/internal/pkg/term/selector" "github.com/aws/copilot-cli/internal/pkg/workspace" "github.com/spf13/afero" "github.com/spf13/cobra" ) const ( jobPackageJobNamePrompt = "Which job would you like to generate a CloudFormation template for?" jobPackageEnvNamePrompt = "Which environment would you like to package this stack for?" ) type packageJobVars struct { name string envName string appName string tag string outputDir string uploadAssets bool showDiff bool } type packageJobOpts struct { packageJobVars // Interfaces to interact with dependencies. ws wsJobDirReader store store runner execRunner sel wsSelector prompt prompter // Subcommand implementing svc_package's Execute() packageCmd actionCommand newPackageCmd func(*packageJobOpts) } func newPackageJobOpts(vars packageJobVars) (*packageJobOpts, error) { sessProvider := sessions.ImmutableProvider(sessions.UserAgentExtras("job package")) defaultSess, err := sessProvider.Default() if err != nil { return nil, err } store := config.NewSSMStore(identity.New(defaultSess), ssm.New(defaultSess), aws.StringValue(defaultSess.Config.Region)) fs := afero.NewOsFs() ws, err := workspace.Use(fs) if err != nil { return nil, err } prompter := prompt.New() opts := &packageJobOpts{ packageJobVars: vars, ws: ws, store: store, runner: exec.NewCmd(), sel: selector.NewLocalWorkloadSelector(prompter, store, ws), prompt: prompter, } opts.newPackageCmd = func(o *packageJobOpts) { opts.packageCmd = &packageSvcOpts{ packageSvcVars: packageSvcVars{ name: o.name, envName: o.envName, appName: o.appName, tag: o.tag, outputDir: o.outputDir, uploadAssets: o.uploadAssets, }, runner: o.runner, ws: ws, store: o.store, templateWriter: os.Stdout, unmarshal: manifest.UnmarshalWorkload, newInterpolator: newManifestInterpolator, paramsWriter: discardFile{}, addonsWriter: discardFile{}, fs: fs, sessProvider: sessProvider, newStackGenerator: newWorkloadStackGenerator, gitShortCommit: imageTagFromGit(o.runner), } } return opts, nil } // Validate returns an error if the values provided by the user are invalid. func (o *packageJobOpts) Validate() error { if o.appName == "" { return errNoAppInWorkspace } if o.name != "" { names, err := o.ws.ListJobs() if err != nil { return fmt.Errorf("list jobs in the workspace: %w", err) } if !contains(o.name, names) { return fmt.Errorf("job '%s' does not exist in the workspace", o.name) } } if o.envName != "" { if _, err := o.store.GetEnvironment(o.appName, o.envName); err != nil { return err } } return nil } // Ask prompts the user for any missing required fields. func (o *packageJobOpts) Ask() error { if err := o.askJobName(); err != nil { return err } if err := o.askEnvName(); err != nil { return err } return nil } // Execute prints the CloudFormation template of the application for the environment. func (o *packageJobOpts) Execute() error { o.newPackageCmd(o) return o.packageCmd.Execute() } // RecommendActions suggests recommended actions before the packaged template is used for deployment. func (o *packageJobOpts) RecommendActions() error { return o.packageCmd.RecommendActions() } func (o *packageJobOpts) askJobName() error { if o.name != "" { return nil } name, err := o.sel.Job(jobPackageJobNamePrompt, "") if err != nil { return fmt.Errorf("select job: %w", err) } o.name = name return nil } func (o *packageJobOpts) askEnvName() error { if o.envName != "" { return nil } name, err := o.sel.Environment(jobPackageEnvNamePrompt, "", o.appName) if err != nil { return fmt.Errorf("select environment: %w", err) } o.envName = name return nil } // buildJobPackageCmd builds the command for printing a job's CloudFormation template. func buildJobPackageCmd() *cobra.Command { vars := packageJobVars{} cmd := &cobra.Command{ Use: "package", Short: "Print the AWS CloudFormation template of a job.", Long: `Print the CloudFormation template used to deploy a job to an environment.`, Example: ` Print the CloudFormation template for the "report-generator" job parametrized for the "test" environment. /code $ copilot job package -n report-generator -e test Write the CloudFormation stack and configuration to a "infrastructure/" sub-directory instead of printing. /startcodeblock $ copilot job package -n report-generator -e test --output-dir ./infrastructure $ ls ./infrastructure report-generator-test.stack.yml report-generator-test.params.yml /endcodeblock`, RunE: runCmdE(func(cmd *cobra.Command, args []string) error { opts, err := newPackageJobOpts(vars) if err != nil { return err } return run(opts) }), } cmd.Flags().StringVarP(&vars.name, nameFlag, nameFlagShort, "", jobFlagDescription) cmd.Flags().StringVarP(&vars.envName, envFlag, envFlagShort, "", envFlagDescription) cmd.Flags().StringVarP(&vars.appName, appFlag, appFlagShort, tryReadingAppName(), appFlagDescription) cmd.Flags().StringVar(&vars.tag, imageTagFlag, "", imageTagFlagDescription) cmd.Flags().StringVar(&vars.outputDir, stackOutputDirFlag, "", stackOutputDirFlagDescription) cmd.Flags().BoolVar(&vars.uploadAssets, uploadAssetsFlag, false, uploadAssetsFlagDescription) cmd.Flags().BoolVar(&vars.showDiff, diffFlag, false, diffFlagDescription) cmd.MarkFlagsMutuallyExclusive(diffFlag, stackOutputDirFlag) cmd.MarkFlagsMutuallyExclusive(diffFlag, uploadAssetsFlag) return cmd }
211
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package cli import ( "errors" "testing" "github.com/aws/copilot-cli/internal/pkg/cli/mocks" "github.com/aws/copilot-cli/internal/pkg/config" "github.com/golang/mock/gomock" "github.com/stretchr/testify/require" ) func TestPackageJobOpts_Validate(t *testing.T) { var ( mockWorkspace *mocks.MockwsJobDirReader mockStore *mocks.Mockstore ) testCases := map[string]struct { inAppName string inEnvName string inJobName string inShowDiff bool inOutputDir string inUploadAssets bool setupMocks func() wantedErrorS string }{ "invalid workspace": { setupMocks: func() { mockWorkspace.EXPECT().ListJobs().Times(0) mockStore.EXPECT().GetEnvironment(gomock.Any(), gomock.Any()).Times(0) }, wantedErrorS: "could not find an application attached to this workspace, please run `app init` first", }, "error while fetching job": { inAppName: "phonetool", inJobName: "resizer", setupMocks: func() { mockWorkspace.EXPECT().ListJobs().Return(nil, errors.New("some error")) mockStore.EXPECT().GetEnvironment(gomock.Any(), gomock.Any()).Times(0) }, wantedErrorS: "list jobs in the workspace: some error", }, "error when job not in workspace": { inAppName: "phonetool", inJobName: "resizer", setupMocks: func() { mockWorkspace.EXPECT().ListJobs().Return([]string{"other-job"}, nil) mockStore.EXPECT().GetEnvironment(gomock.Any(), gomock.Any()).Times(0) }, wantedErrorS: "job 'resizer' does not exist in the workspace", }, "error while fetching environment": { inAppName: "phonetool", inEnvName: "test", setupMocks: func() { mockWorkspace.EXPECT().ListJobs().Times(0) mockStore.EXPECT().GetEnvironment("phonetool", "test").Return(nil, &config.ErrNoSuchEnvironment{ ApplicationName: "phonetool", EnvironmentName: "test", }) }, wantedErrorS: (&config.ErrNoSuchEnvironment{ ApplicationName: "phonetool", EnvironmentName: "test", }).Error(), }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { // GIVEN ctrl := gomock.NewController(t) defer ctrl.Finish() mockWorkspace = mocks.NewMockwsJobDirReader(ctrl) mockStore = mocks.NewMockstore(ctrl) tc.setupMocks() opts := &packageJobOpts{ packageJobVars: packageJobVars{ name: tc.inJobName, envName: tc.inEnvName, appName: tc.inAppName, showDiff: tc.inShowDiff, outputDir: tc.inOutputDir, uploadAssets: tc.inUploadAssets, }, ws: mockWorkspace, store: mockStore, } // WHEN err := opts.Validate() // THEN if tc.wantedErrorS != "" { require.EqualError(t, err, tc.wantedErrorS, "error %v does not match '%s'", err, tc.wantedErrorS) } else { require.NoError(t, err) } }) } } func TestPackageJobOpts_Ask(t *testing.T) { const testAppName = "phonetool" testCases := map[string]struct { inJobName string inEnvName string expectSelector func(m *mocks.MockwsSelector) expectPrompt func(m *mocks.Mockprompter) wantedJobName string wantedEnvName string wantedErrorS string }{ "prompt for all options": { expectSelector: func(m *mocks.MockwsSelector) { m.EXPECT().Job(jobPackageJobNamePrompt, "").Return("resizer", nil) m.EXPECT().Environment(jobPackageEnvNamePrompt, "", testAppName).Return("test", nil) }, expectPrompt: func(m *mocks.Mockprompter) {}, wantedJobName: "resizer", wantedEnvName: "test", }, "prompt only for the job name": { inEnvName: "test", expectSelector: func(m *mocks.MockwsSelector) { m.EXPECT().Job(jobPackageJobNamePrompt, "").Return("resizer", nil) m.EXPECT().Environment(gomock.Any(), gomock.Any(), gomock.Any()).Times(0) }, expectPrompt: func(m *mocks.Mockprompter) { m.EXPECT().Get(gomock.Any(), gomock.Any(), gomock.Any()).Times(0) }, wantedJobName: "resizer", wantedEnvName: "test", }, "prompt only for the env name": { inJobName: "resizer", expectSelector: func(m *mocks.MockwsSelector) { m.EXPECT().Job(gomock.Any(), gomock.Any()).Times(0) m.EXPECT().Environment(jobPackageEnvNamePrompt, "", testAppName).Return("test", nil) }, expectPrompt: func(m *mocks.Mockprompter) { m.EXPECT().Get(gomock.Any(), gomock.Any(), gomock.Any()).Times(0) }, wantedJobName: "resizer", wantedEnvName: "test", }, "don't prompt": { inJobName: "resizer", inEnvName: "test", expectSelector: func(m *mocks.MockwsSelector) { m.EXPECT().Job(gomock.Any(), gomock.Any()).Times(0) m.EXPECT().Environment(gomock.Any(), gomock.Any(), gomock.Any()).Times(0) }, expectPrompt: func(m *mocks.Mockprompter) { m.EXPECT().Get(gomock.Any(), gomock.Any(), gomock.Any()).Times(0) }, wantedJobName: "resizer", wantedEnvName: "test", }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { // GIVEN ctrl := gomock.NewController(t) defer ctrl.Finish() mockSelector := mocks.NewMockwsSelector(ctrl) mockPrompt := mocks.NewMockprompter(ctrl) mockRunner := mocks.NewMockexecRunner(ctrl) tc.expectSelector(mockSelector) tc.expectPrompt(mockPrompt) opts := &packageJobOpts{ packageJobVars: packageJobVars{ name: tc.inJobName, envName: tc.inEnvName, appName: testAppName, }, sel: mockSelector, prompt: mockPrompt, runner: mockRunner, } // WHEN err := opts.Ask() // THEN require.Equal(t, tc.wantedJobName, opts.name) require.Equal(t, tc.wantedEnvName, opts.envName) if tc.wantedErrorS != "" { require.EqualError(t, err, tc.wantedErrorS) } else { require.NoError(t, err) } }) } } func TestPackageJobOpts_Execute(t *testing.T) { testCases := map[string]struct { inVars packageJobVars mockDependencies func(*gomock.Controller, *packageJobOpts) wantedErr error }{ "writes job template without addons": { inVars: packageJobVars{ appName: "ecs-kudos", name: "resizer", envName: "test", tag: "1234", }, mockDependencies: func(ctrl *gomock.Controller, opts *packageJobOpts) { opts.newPackageCmd = func(opts *packageJobOpts) { mockCmd := mocks.NewMockactionCommand(ctrl) mockCmd.EXPECT().Execute().Return(nil) opts.packageCmd = mockCmd } }, wantedErr: nil, }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { // GIVEN ctrl := gomock.NewController(t) defer ctrl.Finish() opts := &packageJobOpts{ packageJobVars: tc.inVars, packageCmd: mocks.NewMockactionCommand(ctrl), } tc.mockDependencies(ctrl, opts) // WHEN err := opts.Execute() // THEN require.Equal(t, tc.wantedErr, err) }) } } func TestPackageJobOpts_RecommendActions(t *testing.T) { testCases := map[string]struct { mockDependencies func(*gomock.Controller, *packageJobOpts) wantedErr error }{ "reuse svc package RecommandActions": { mockDependencies: func(ctrl *gomock.Controller, opts *packageJobOpts) { mockCmd := mocks.NewMockactionCommand(ctrl) mockCmd.EXPECT().RecommendActions().Return(nil) opts.packageCmd = mockCmd }, wantedErr: nil, }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { // GIVEN ctrl := gomock.NewController(t) defer ctrl.Finish() opts := &packageJobOpts{ packageCmd: mocks.NewMockactionCommand(ctrl), } tc.mockDependencies(ctrl, opts) // WHEN err := opts.RecommendActions() // THEN require.Equal(t, tc.wantedErr, err) }) } }
309
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package cli import ( "fmt" "github.com/aws/copilot-cli/internal/pkg/workspace" "github.com/spf13/afero" "github.com/aws/aws-sdk-go/aws" "github.com/aws/aws-sdk-go/aws/session" "github.com/aws/aws-sdk-go/service/ssm" "github.com/aws/copilot-cli/internal/pkg/aws/cloudformation" "github.com/aws/copilot-cli/internal/pkg/aws/identity" "github.com/aws/copilot-cli/internal/pkg/aws/sessions" "github.com/aws/copilot-cli/internal/pkg/aws/stepfunctions" "github.com/aws/copilot-cli/internal/pkg/config" "github.com/aws/copilot-cli/internal/pkg/describe" "github.com/aws/copilot-cli/internal/pkg/runner/jobrunner" "github.com/aws/copilot-cli/internal/pkg/term/log" "github.com/aws/copilot-cli/internal/pkg/term/prompt" "github.com/aws/copilot-cli/internal/pkg/term/selector" "github.com/spf13/cobra" ) type jobRunVars struct { appName string envName string jobName string } type jobRunOpts struct { jobRunVars configStore store sel configSelector ws wsEnvironmentsLister // cached variables. targetEnv *config.Environment sessProvider *sessions.Provider newRunner func() (runner, error) newEnvCompatibilityChecker func() (versionCompatibilityChecker, error) } func newJobRunOpts(vars jobRunVars) (*jobRunOpts, error) { sessProvider := sessions.ImmutableProvider(sessions.UserAgentExtras("job deploy")) defaultSess, err := sessProvider.Default() if err != nil { return nil, err } configStore := config.NewSSMStore(identity.New(defaultSess), ssm.New(defaultSess), aws.StringValue(defaultSess.Config.Region)) ws, err := workspace.Use(afero.NewOsFs()) if err != nil { return nil, err } prompter := prompt.New() opts := &jobRunOpts{ jobRunVars: vars, configStore: configStore, sel: selector.NewConfigSelector(prompter, configStore), ws: ws, sessProvider: sessProvider, } opts.newRunner = func() (runner, error) { sess, err := opts.envSession() if err != nil { return nil, err } return jobrunner.New(&jobrunner.Config{ App: opts.appName, Env: opts.envName, Job: opts.jobName, CFN: cloudformation.New(sess), StateMachine: stepfunctions.New(sess), }), nil } opts.newEnvCompatibilityChecker = func() (versionCompatibilityChecker, error) { envDescriber, err := describe.NewEnvDescriber(describe.NewEnvDescriberConfig{ App: opts.appName, Env: opts.envName, ConfigStore: opts.configStore, }) if err != nil { return nil, fmt.Errorf("new environment compatibility checker: %v", err) } return envDescriber, nil } return opts, nil } // Validate is a no-op for this command. // it's a no-op because all 3 flags are required, and `Validate` only validate optional flags. func (o *jobRunOpts) Validate() error { return nil } // Ask prompts for and validates any required flags. func (o *jobRunOpts) Ask() error { if err := o.validateOrAskApp(); err != nil { return err } if err := o.askJobName(); err != nil { return err } if err := o.askEnvName(); err != nil { return err } return nil } // Execute runs the "job run" command. func (o *jobRunOpts) Execute() error { if err := o.validateEnvCompatible(); err != nil { return err } runner, err := o.newRunner() if err != nil { return err } if err := runner.Run(); err != nil { return fmt.Errorf("execute job %q: %w", o.jobName, err) } log.Successf("Invoked job %q successfully\n", o.jobName) return nil } func (o *jobRunOpts) validateOrAskApp() error { if o.appName != "" { _, err := o.configStore.GetApplication(o.appName) return err } app, err := o.sel.Application(jobAppNamePrompt, wkldAppNameHelpPrompt) if err != nil { return fmt.Errorf("select application: %w", err) } o.appName = app return nil } func (o *jobRunOpts) askJobName() error { if o.jobName != "" { if _, err := o.configStore.GetJob(o.appName, o.jobName); err != nil { return err } return nil } name, err := o.sel.Job("Which job would you like to invoke?", "", o.appName) if err != nil { return fmt.Errorf("select job: %w", err) } o.jobName = name return nil } func (o *jobRunOpts) askEnvName() error { if o.envName != "" { if _, err := o.getTargetEnv(); err != nil { return err } return nil } name, err := o.sel.Environment("Which environment?", "", o.appName) if err != nil { return fmt.Errorf("select environment: %w", err) } o.envName = name return nil } func (o *jobRunOpts) getTargetEnv() (*config.Environment, error) { if o.targetEnv != nil { return o.targetEnv, nil } env, err := o.configStore.GetEnvironment(o.appName, o.envName) if err != nil { return nil, err } o.targetEnv = env return o.targetEnv, nil } func (o *jobRunOpts) envSession() (*session.Session, error) { env, err := o.getTargetEnv() if err != nil { return nil, err } return o.sessProvider.FromRole(env.ManagerRoleARN, env.Region) } func (o *jobRunOpts) validateEnvCompatible() error { envStack, err := o.newEnvCompatibilityChecker() if err != nil { return err } return validateMinEnvVersion(o.ws, envStack, o.appName, o.envName, "v1.12.0", "job run") } func buildJobRunCmd() *cobra.Command { vars := jobRunVars{} cmd := &cobra.Command{ Use: "run", Short: "Invoke a job in an environment.", Long: "Invoke a job in an environment.", Example: ` Run a job named "report-gen" in an application named "report" within a "test" environment /code $ copilot job run -a report -n report-gen -e test`, RunE: runCmdE(func(cmd *cobra.Command, args []string) error { opts, err := newJobRunOpts(vars) if err != nil { return err } return run(opts) }), } cmd.Flags().StringVarP(&vars.appName, appFlag, appFlagShort, tryReadingAppName(), appFlagDescription) cmd.Flags().StringVarP(&vars.jobName, nameFlag, nameFlagShort, "", jobFlagDescription) cmd.Flags().StringVarP(&vars.envName, envFlag, envFlagShort, "", envFlagDescription) return cmd }
233
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package cli import ( "errors" "fmt" "testing" "github.com/aws/copilot-cli/internal/pkg/cli/mocks" "github.com/aws/copilot-cli/internal/pkg/config" "github.com/golang/mock/gomock" "github.com/stretchr/testify/require" ) type jobRunMock struct { configStore *mocks.Mockstore sel *mocks.MockconfigSelector } func TestJobRun_Ask(t *testing.T) { const ( inputApp = "my-app" inputEnv = "my-env" inputJob = "my-job" ) testCases := map[string]struct { inputApp string inputJob string inputEnvName string setupMocks func(mocks jobRunMock) wantedApp string wantedEnv string wantedJob string wantedError error }{ "validate app env and job with all flags passed in": { inputApp: inputApp, inputJob: inputJob, inputEnvName: inputEnv, setupMocks: func(m jobRunMock) { gomock.InOrder( m.configStore.EXPECT().GetApplication("my-app").Return(&config.Application{Name: "my-app"}, nil), m.configStore.EXPECT().GetJob("my-app", "my-job").Return(&config.Workload{}, nil), m.configStore.EXPECT().GetEnvironment("my-app", "my-env").Return(&config.Environment{Name: "my-env"}, nil), ) }, wantedApp: inputApp, wantedEnv: inputEnv, wantedJob: inputJob, }, "prompt for app name": { inputJob: inputJob, inputEnvName: inputEnv, setupMocks: func(m jobRunMock) { gomock.InOrder( m.sel.EXPECT().Application(jobAppNamePrompt, wkldAppNameHelpPrompt).Return("my-app", nil), m.configStore.EXPECT().GetApplication(gomock.Any()).Times(0), m.configStore.EXPECT().GetJob(gomock.Any(), gomock.Any()).AnyTimes(), m.configStore.EXPECT().GetEnvironment(gomock.Any(), gomock.Any()).AnyTimes(), m.sel.EXPECT().Job(gomock.Any(), gomock.Any(), gomock.Any()).Return("my-job", nil).AnyTimes(), m.sel.EXPECT().Environment(gomock.Any(), gomock.Any(), gomock.Any()).Return("my-env", nil).AnyTimes(), ) }, wantedApp: inputApp, wantedEnv: inputEnv, wantedJob: inputJob, }, "returns error if fail to select app": { setupMocks: func(m jobRunMock) { gomock.InOrder( m.sel.EXPECT().Application(jobAppNamePrompt, wkldAppNameHelpPrompt).Return("", errors.New("some error")), ) }, wantedError: fmt.Errorf("select application: some error"), }, "prompt for job and env": { inputApp: inputApp, setupMocks: func(m jobRunMock) { gomock.InOrder( m.configStore.EXPECT().GetApplication(gomock.Any()).AnyTimes(), m.configStore.EXPECT().GetJob(gomock.Any(), gomock.Any()).Times(0), m.configStore.EXPECT().GetEnvironment(gomock.Any(), gomock.Any()).Times(0), m.sel.EXPECT().Job("Which job would you like to invoke?", "", "my-app").Return("my-job", nil), m.sel.EXPECT().Environment("Which environment?", "", "my-app").Return("my-env", nil), ) }, wantedApp: inputApp, wantedEnv: inputEnv, wantedJob: inputJob, }, "return error if fail to select environment": { inputApp: inputApp, inputJob: inputJob, setupMocks: func(m jobRunMock) { gomock.InOrder( m.configStore.EXPECT().GetApplication(gomock.Any()).AnyTimes(), m.configStore.EXPECT().GetEnvironment(gomock.Any(), gomock.Any()).Times(0), m.configStore.EXPECT().GetJob(gomock.Any(), gomock.Any()).AnyTimes(), m.sel.EXPECT().Environment("Which environment?", "", "my-app").Return("", errors.New("some error")), ) }, wantedError: fmt.Errorf("select environment: some error"), }, "return error if fail to select job": { inputApp: inputApp, inputEnvName: inputEnv, setupMocks: func(m jobRunMock) { gomock.InOrder( m.configStore.EXPECT().GetApplication(gomock.Any()).AnyTimes(), m.configStore.EXPECT().GetEnvironment(gomock.Any(), gomock.Any()).AnyTimes(), m.configStore.EXPECT().GetJob(gomock.Any(), gomock.Any()).Times(0), m.sel.EXPECT().Job("Which job would you like to invoke?", "", "my-app").Return("", errors.New("some error")), ) }, wantedError: fmt.Errorf("select job: some error"), }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { ctrl := gomock.NewController(t) defer ctrl.Finish() mockStore := mocks.NewMockstore(ctrl) mockSel := mocks.NewMockconfigSelector(ctrl) tc.setupMocks(jobRunMock{ configStore: mockStore, sel: mockSel, }) jobRun := &jobRunOpts{ jobRunVars: jobRunVars{ envName: tc.inputEnvName, appName: tc.inputApp, jobName: tc.inputJob, }, configStore: mockStore, sel: mockSel, } err := jobRun.Ask() if tc.wantedError != nil { require.EqualError(t, err, tc.wantedError.Error()) } else { require.NoError(t, err) require.Equal(t, tc.wantedApp, jobRun.appName, "expected app name to match") require.Equal(t, tc.wantedJob, jobRun.jobName, "expected job name to match") require.Equal(t, tc.wantedEnv, jobRun.envName, "expected environment name to match") } }) } } func TestJobRun_Execute(t *testing.T) { testCases := map[string]struct { appName string envName string jobName string mockjobRunner func(ctrl *gomock.Controller) runner mockEnvChecker func(ctrl *gomock.Controller) versionCompatibilityChecker wantedError error }{ "successfully invoke job": { jobName: "mockJob", mockjobRunner: func(ctrl *gomock.Controller) runner { m := mocks.NewMockrunner(ctrl) m.EXPECT().Run().Return(nil) return m }, mockEnvChecker: func(ctrl *gomock.Controller) versionCompatibilityChecker { m := mocks.NewMockversionCompatibilityChecker(ctrl) m.EXPECT().Version().Return("v1.12.1", nil) return m }, }, "should return a wrapped error when state machine cannot be run": { jobName: "mockJob", mockjobRunner: func(ctrl *gomock.Controller) runner { m := mocks.NewMockrunner(ctrl) m.EXPECT().Run().Return(errors.New("some error")) return m }, mockEnvChecker: func(ctrl *gomock.Controller) versionCompatibilityChecker { m := mocks.NewMockversionCompatibilityChecker(ctrl) m.EXPECT().Version().Return("v1.12.0", nil) return m }, wantedError: fmt.Errorf(`execute job "mockJob": some error`), }, "should return a wrapped error when environment version cannot be retrieved": { appName: "finance", envName: "test", jobName: "report", mockjobRunner: func(ctrl *gomock.Controller) runner { return nil }, mockEnvChecker: func(ctrl *gomock.Controller) versionCompatibilityChecker { m := mocks.NewMockversionCompatibilityChecker(ctrl) m.EXPECT().Version().Return("", errors.New("some error")) return m }, wantedError: errors.New(`retrieve version of environment stack "test" in application "finance": some error`), }, "should return an error when environment template version is below v1.12.0": { appName: "finance", envName: "test", jobName: "report", mockjobRunner: func(ctrl *gomock.Controller) runner { return nil }, mockEnvChecker: func(ctrl *gomock.Controller) versionCompatibilityChecker { m := mocks.NewMockversionCompatibilityChecker(ctrl) m.EXPECT().Version().Return("v1.11.0", nil) return m }, wantedError: errors.New(`environment "test" is on version "v1.11.0" which does not support the "job run" feature`), }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { ctrl := gomock.NewController(t) defer ctrl.Finish() jobRunOpts := &jobRunOpts{ jobRunVars: jobRunVars{ appName: tc.appName, envName: tc.envName, jobName: tc.jobName, }, newRunner: func() (runner, error) { return tc.mockjobRunner(ctrl), nil }, newEnvCompatibilityChecker: func() (versionCompatibilityChecker, error) { return tc.mockEnvChecker(ctrl), nil }, } err := jobRunOpts.Execute() // THEN if tc.wantedError != nil { require.EqualError(t, err, tc.wantedError.Error()) } else { require.NoError(t, err) } }) } }
257
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package cli import ( "fmt" "io" "path/filepath" "strconv" "strings" "github.com/aws/copilot-cli/internal/pkg/override" "github.com/aws/copilot-cli/internal/pkg/template" "github.com/aws/copilot-cli/internal/pkg/term/log" "github.com/aws/copilot-cli/internal/pkg/term/prompt" "github.com/spf13/afero" ) const ( // IaC options for overrides. cdkIaCTool = "cdk" yamlPatch = "yamlpatch" // IaC toolkit configuration. typescriptCDKLang = "typescript" ) var validIaCTools = []string{ cdkIaCTool, yamlPatch, } var validCDKLangs = []string{ typescriptCDKLang, } type stringWriteCloser interface { fmt.Stringer io.WriteCloser } type closableStringBuilder struct { *strings.Builder } // Close implements the io.Closer interface for a strings.Builder and is a no-op. func (sb *closableStringBuilder) Close() error { return nil } // overrideVars represent common flags for all "[noun] override" commands. type overrideVars struct { name string appName string iacTool string // CDK override engine flags. cdkLang string // We prompt for resources if the user does not opt-in to skipping. skipResources bool resources []template.CFNResource } // overrideOpts represents the command for all "[noun] override" commands. type overrideOpts struct { overrideVars // Interfaces to interact with dependencies. fs afero.Fs cfgStore store prompt prompter cfnPrompt cfnSelector spinner progress dir func() string packageCmd func(w stringWriteCloser) (executor, error) } // Validate returns an error for any invalid optional flags. func (o *overrideOpts) Validate() error { if err := o.validateAppName(); err != nil { return err } return o.validateCDKLang() } // Ask prompts for and validates any required flags. func (o *overrideOpts) Ask() error { if err := o.validateOrAskIaCTool(); err != nil { return err } return o.askResourcesToOverride() } // Execute writes IaC override files to the local workspace. // This method assumes that the IaC tool chosen by the user is valid. func (o *overrideOpts) Execute() error { dir := o.dir() switch o.iacTool { case cdkIaCTool: if err := override.ScaffoldWithCDK(o.fs, dir, o.resources); err != nil { return fmt.Errorf("scaffold CDK application under %q: %v", dir, err) } log.Successf("Created a new CDK application at %q to override resources\n", displayPath(dir)) case yamlPatch: if err := override.ScaffoldWithPatch(o.fs, dir); err != nil { return fmt.Errorf("scaffold CFN YAML patches under %q: %v", dir, err) } log.Successf("Created a YAML patch file under %q to override resources\n", displayPath(dir)) } return nil } // RecommendActions prints optional follow-up actions. func (o *overrideOpts) RecommendActions() error { readmePath := filepath.Join(o.dir(), "README.md") logRecommendedActions([]string{ fmt.Sprintf("Please follow the instructions in %q", displayPath(readmePath)), }) return nil } func (o *overrideOpts) validateAppName() error { if o.appName == "" { return errNoAppInWorkspace } _, err := o.cfgStore.GetApplication(o.appName) if err != nil { return fmt.Errorf("get application %q configuration: %v", o.appName, err) } return nil } func (o *overrideOpts) validateCDKLang() error { for _, valid := range validCDKLangs { if o.cdkLang == valid { return nil } } return fmt.Errorf("%q is not a valid CDK language: must be one of: %s", o.cdkLang, strings.Join(applyAll(validCDKLangs, strconv.Quote), ", ")) } func (o *overrideOpts) validateOrAskIaCTool() error { if o.iacTool == "" { return o.askIaCTool() } return o.validateIaCTool() } func (o *overrideOpts) askIaCTool() error { msg := fmt.Sprintf("Which Infrastructure as Code tool would you like to use to override %q?", o.name) help := `The AWS Cloud Development Kit (CDK) lets you override templates using the expressive power of programming languages. This option is recommended for users that need to override several resources. To learn more about the CDK: https://aws.github.io/copilot-cli/docs/developing/overrides/cdk/ CloudFormation YAML patches is recommended for users that need to override a handful resources or do not want to depend on any other tool. To learn more about CFN yaml patches: https://aws.github.io/copilot-cli/docs/developing/overrides/yamlpatch/` tool, err := o.prompt.SelectOne(msg, help, validIaCTools, prompt.WithFinalMessage("IaC tool:")) if err != nil { return fmt.Errorf("select IaC tool: %v", err) } o.iacTool = tool return nil } func (o *overrideOpts) validateIaCTool() error { for _, valid := range validIaCTools { if o.iacTool == valid { return nil } } return fmt.Errorf("%q is not a valid IaC tool: must be one of: %s", o.iacTool, strings.Join(applyAll(validIaCTools, strconv.Quote), ", ")) } func (o *overrideOpts) askResourcesToOverride() error { if o.skipResources || o.iacTool == yamlPatch { return nil } o.spinner.Start("Generating CloudFormation template for resource selection") buf := &closableStringBuilder{ Builder: new(strings.Builder), } pkgCmd, err := o.packageCmd(buf) if err != nil { o.spinner.Stop("") return err } if err := pkgCmd.Execute(); err != nil { o.spinner.Stop("") return fmt.Errorf("generate CloudFormation template for %q: %v", o.name, err) } o.spinner.Stop("") msg := fmt.Sprintf("Which resources in %q would you like to override?", o.name) resources, err := o.cfnPrompt.Resources(msg, "Resources:", "", buf.String()) if err != nil { return err } o.resources = resources return nil }
209
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package cli import ( "github.com/aws/copilot-cli/cmd/copilot/template" "github.com/aws/copilot-cli/internal/pkg/cli/group" "github.com/spf13/cobra" ) // BuildPipelineCmd is the top level command for pipelines func BuildPipelineCmd() *cobra.Command { cmd := &cobra.Command{ Use: "pipeline", Short: `Commands for pipelines. Continuous delivery pipelines to release services.`, Long: `Commands for pipelines. Continuous delivery pipelines to release services.`, } cmd.AddCommand(buildPipelineInitCmd()) cmd.AddCommand(buildPipelineDeployCmd()) cmd.AddCommand(buildPipelineDeleteCmd()) cmd.AddCommand(buildPipelineShowCmd()) cmd.AddCommand(buildPipelineStatusCmd()) cmd.AddCommand(buildPipelineListCmd()) cmd.SetUsageTemplate(template.Usage) cmd.Annotations = map[string]string{ "group": group.Release, } return cmd }
36
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package cli import ( "errors" "fmt" "os" "strings" "time" "github.com/aws/aws-sdk-go/aws" "github.com/aws/aws-sdk-go/service/ssm" "github.com/aws/copilot-cli/internal/pkg/aws/codepipeline" "github.com/aws/copilot-cli/internal/pkg/aws/identity" rg "github.com/aws/copilot-cli/internal/pkg/aws/resourcegroups" "github.com/aws/copilot-cli/internal/pkg/aws/secretsmanager" "github.com/aws/copilot-cli/internal/pkg/aws/sessions" "github.com/aws/copilot-cli/internal/pkg/config" "github.com/aws/copilot-cli/internal/pkg/deploy" "github.com/aws/copilot-cli/internal/pkg/deploy/cloudformation" "github.com/aws/copilot-cli/internal/pkg/term/color" "github.com/aws/copilot-cli/internal/pkg/term/log" termprogress "github.com/aws/copilot-cli/internal/pkg/term/progress" "github.com/aws/copilot-cli/internal/pkg/term/prompt" "github.com/aws/copilot-cli/internal/pkg/term/selector" "github.com/aws/copilot-cli/internal/pkg/workspace" "github.com/spf13/afero" "github.com/spf13/cobra" ) const ( pipelineDeleteAppNamePrompt = "Which application's pipeline would you like to delete?" pipelineDeleteAppNameHelpPrompt = "An application is a collection of related services." pipelineDeleteConfirmPrompt = "Are you sure you want to delete pipeline %s from application %s?" pipelineDeleteConfirmHelp = "This will delete the deployment pipeline for the services in the workspace." pipelineSecretDeleteConfirmPrompt = "Are you sure you want to delete the source secret %s associated with pipeline %s?" pipelineDeleteSecretConfirmHelp = "This will delete the token associated with the source of your pipeline." fmtPipelineDeletePrompt = "Which deployed pipeline of application %s would you like to delete?" fmtDeletePipelineStart = "Deleting pipeline %s from application %s." fmtDeletePipelineFailed = "Failed to delete pipeline %s from application %s: %v.\n" fmtDeletePipelineComplete = "Deleted pipeline %s from application %s.\n" ) var ( errPipelineDeleteCancelled = errors.New("pipeline delete cancelled - no changes made") ) type deletePipelineVars struct { appName string name string skipConfirmation bool shouldDeleteSecret bool } type deletePipelineOpts struct { deletePipelineVars ghAccessTokenSecretName string // Interfaces to dependencies. pipelineDeployer pipelineDeployer codepipeline pipelineGetter prog progress sel codePipelineSelector prompt prompter secretsmanager secretsManager ws wsPipelineGetter deployedPipelineLister deployedPipelineLister store store // Cached variables. targetPipeline *deploy.Pipeline } func newDeletePipelineOpts(vars deletePipelineVars) (*deletePipelineOpts, error) { ws, err := workspace.Use(afero.NewOsFs()) if err != nil { return nil, err } defaultSess, err := sessions.ImmutableProvider(sessions.UserAgentExtras("pipeline delete")).Default() if err != nil { return nil, fmt.Errorf("default session: %w", err) } ssmStore := config.NewSSMStore(identity.New(defaultSess), ssm.New(defaultSess), aws.StringValue(defaultSess.Config.Region)) prompter := prompt.New() codepipeline := codepipeline.New(defaultSess) pipelineLister := deploy.NewPipelineStore(rg.New(defaultSess)) opts := &deletePipelineOpts{ deletePipelineVars: vars, codepipeline: codepipeline, prog: termprogress.NewSpinner(log.DiagnosticWriter), prompt: prompter, secretsmanager: secretsmanager.New(defaultSess), pipelineDeployer: cloudformation.New(defaultSess, cloudformation.WithProgressTracker(os.Stderr)), deployedPipelineLister: pipelineLister, ws: ws, store: ssmStore, sel: selector.NewAppPipelineSelector(prompter, ssmStore, pipelineLister), } return opts, nil } // Validate returns an error if the flag values for optional fields are invalid. func (o *deletePipelineOpts) Validate() error { return nil } // Ask prompts for and validates required fields. func (o *deletePipelineOpts) Ask() error { if o.appName != "" { if _, err := o.store.GetApplication(o.appName); err != nil { return err } } else { if err := o.askAppName(); err != nil { return err } } if o.name != "" { if _, err := o.getTargetPipeline(); err != nil { return fmt.Errorf("validate pipeline name %s: %w", o.name, err) } } else { pipeline, err := askDeployedPipelineName(o.sel, fmt.Sprintf(fmtPipelineDeletePrompt, color.HighlightUserInput(o.appName)), o.appName) if err != nil { return err } o.name = pipeline.Name o.targetPipeline = &pipeline } if o.skipConfirmation { return nil } deleteConfirmed, err := o.prompt.Confirm( fmt.Sprintf(pipelineDeleteConfirmPrompt, o.name, o.appName), pipelineDeleteConfirmHelp, prompt.WithConfirmFinalMessage()) if err != nil { return fmt.Errorf("pipeline delete confirmation prompt: %w", err) } if !deleteConfirmed { return errPipelineDeleteCancelled } return nil } // Execute deletes the secret and pipeline stack. func (o *deletePipelineOpts) Execute() error { if err := o.getSecret(); err != nil { return err } if err := o.deleteSecret(); err != nil { return err } if err := o.deleteStack(); err != nil { return err } return nil } func (o *deletePipelineOpts) getTargetPipeline() (deploy.Pipeline, error) { if o.targetPipeline != nil { return *o.targetPipeline, nil } pipeline, err := getDeployedPipelineInfo(o.deployedPipelineLister, o.appName, o.name) if err != nil { return deploy.Pipeline{}, err } o.targetPipeline = &pipeline return pipeline, nil } func askDeployedPipelineName(sel codePipelineSelector, msg, appName string) (deploy.Pipeline, error) { pipeline, err := sel.DeployedPipeline(msg, "", appName) if err != nil { return deploy.Pipeline{}, fmt.Errorf("select deployed pipelines: %w", err) } return pipeline, nil } func getDeployedPipelineInfo(lister deployedPipelineLister, app, name string) (deploy.Pipeline, error) { pipelines, err := lister.ListDeployedPipelines(app) if err != nil { return deploy.Pipeline{}, fmt.Errorf("list deployed pipelines: %w", err) } for _, pipeline := range pipelines { if pipeline.Name == name { return pipeline, nil } } return deploy.Pipeline{}, fmt.Errorf("cannot find pipeline named %s", name) } func (o *deletePipelineOpts) askAppName() error { app, err := o.sel.Application(pipelineDeleteAppNamePrompt, pipelineDeleteAppNameHelpPrompt) if err != nil { return fmt.Errorf("select application: %w", err) } o.appName = app return nil } func (o *deletePipelineOpts) getSecret() error { // Look for default secret name for GHv1 access token based on default pipeline name. o.ghAccessTokenSecretName = o.pipelineSecretName() output, err := o.secretsmanager.DescribeSecret(o.ghAccessTokenSecretName) if err != nil { var notFoundErr *secretsmanager.ErrSecretNotFound if errors.As(err, &notFoundErr) { o.ghAccessTokenSecretName = "" return nil } return fmt.Errorf("describe secret %s: %w", o.ghAccessTokenSecretName, err) } for _, tag := range output.Tags { if aws.StringValue(tag.Key) == deploy.AppTagKey && aws.StringValue(tag.Value) == output.CreatedDate.UTC().Format(time.UnixDate) { return nil } } // The secret was found but tags didn't match. o.ghAccessTokenSecretName = "" return nil } // With GHv1 sources, we stored access tokens in SecretsManager. Pipelines generated // prior to Copilot v1.4 have secrets named 'github-token-[appName]-[repoName]'. // Pipelines prior to 1745fee were given default names of `pipeline-[appName]-[repoName]`. // Users may have changed pipeline names, so this is our best-guess approach to // deleting legacy pipeline secrets. func (o *deletePipelineOpts) pipelineSecretName() string { appAndRepo := strings.TrimPrefix(o.name, "pipeline-") return fmt.Sprintf("github-token-%s", appAndRepo) } func (o *deletePipelineOpts) deleteSecret() error { if o.ghAccessTokenSecretName == "" { return nil } // Only pipelines created with GitHubV1 have personal access tokens saved as secrets. if !o.shouldDeleteSecret { confirmDeletion, err := o.prompt.Confirm( fmt.Sprintf(pipelineSecretDeleteConfirmPrompt, o.ghAccessTokenSecretName, o.name), pipelineDeleteSecretConfirmHelp, ) if err != nil { return fmt.Errorf("pipeline delete secret confirmation prompt: %w", err) } if !confirmDeletion { log.Infof("Skipping deletion of secret %s.\n", o.ghAccessTokenSecretName) return nil } } if err := o.secretsmanager.DeleteSecret(o.ghAccessTokenSecretName); err != nil { return err } log.Successf("Deleted secret %s.\n", o.ghAccessTokenSecretName) return nil } func (o *deletePipelineOpts) deleteStack() error { pipeline, err := o.getTargetPipeline() if err != nil { return err } o.prog.Start(fmt.Sprintf(fmtDeletePipelineStart, pipeline.Name, o.appName)) if err := o.pipelineDeployer.DeletePipeline(pipeline); err != nil { o.prog.Stop(log.Serrorf(fmtDeletePipelineFailed, pipeline.Name, o.appName, err)) return err } o.prog.Stop(log.Ssuccessf(fmtDeletePipelineComplete, pipeline.Name, o.appName)) return nil } // RecommendActions is a no-op for this command. func (o *deletePipelineOpts) RecommendActions() error { return nil } // buildPipelineDeleteCmd build the command for deleting an existing pipeline. func buildPipelineDeleteCmd() *cobra.Command { vars := deletePipelineVars{} cmd := &cobra.Command{ Use: "delete", Short: "Deletes the pipeline associated with your workspace.", Example: ` Delete the pipeline associated with your workspace. /code $ copilot pipeline delete `, RunE: runCmdE(func(cmd *cobra.Command, args []string) error { opts, err := newDeletePipelineOpts(vars) if err != nil { return err } return run(opts) }), } cmd.Flags().StringVarP(&vars.appName, appFlag, appFlagShort, tryReadingAppName(), appFlagDescription) cmd.Flags().StringVarP(&vars.name, nameFlag, nameFlagShort, "", pipelineFlagDescription) cmd.Flags().BoolVar(&vars.skipConfirmation, yesFlag, false, yesFlagDescription) cmd.Flags().BoolVar(&vars.shouldDeleteSecret, deleteSecretFlag, false, deleteSecretFlagDescription) return cmd }
321
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package cli import ( "errors" "fmt" "testing" "time" "github.com/aws/aws-sdk-go/aws" sdkSecretsmanager "github.com/aws/aws-sdk-go/service/secretsmanager" "github.com/aws/copilot-cli/internal/pkg/aws/secretsmanager" "github.com/aws/copilot-cli/internal/pkg/deploy" "github.com/aws/copilot-cli/internal/pkg/cli/mocks" "github.com/aws/copilot-cli/internal/pkg/term/log" "github.com/golang/mock/gomock" "github.com/stretchr/testify/require" ) type deletePipelineMocks struct { prompt *mocks.Mockprompter prog *mocks.Mockprogress secretsmanager *mocks.MocksecretsManager deployer *mocks.MockpipelineDeployer ws *mocks.MockwsPipelineGetter store *mocks.Mockstore codepipeline *mocks.MockpipelineGetter sel *mocks.MockcodePipelineSelector deployedPipelineLister *mocks.MockdeployedPipelineLister } func TestDeletePipelineOpts_Ask(t *testing.T) { const ( testAppName = "badgoose" testPipelineName = "pipeline-badgoose-honkpipes" ) testCases := map[string]struct { skipConfirmation bool inAppName string inPipelineName string callMocks func(m deletePipelineMocks) wantedAppName string wantedPipelineName string wantedError error }{ "prompts for app name if empty": { inPipelineName: testPipelineName, skipConfirmation: true, callMocks: func(m deletePipelineMocks) { m.sel.EXPECT().Application(pipelineDeleteAppNamePrompt, pipelineDeleteAppNameHelpPrompt).Return(testAppName, nil) m.deployedPipelineLister.EXPECT().ListDeployedPipelines(testAppName).Return([]deploy.Pipeline{ { Name: testPipelineName, }, }, nil) }, wantedAppName: testAppName, wantedPipelineName: testPipelineName, wantedError: nil, }, "errors if passed-in app name invalid": { skipConfirmation: true, inAppName: "badAppName", callMocks: func(m deletePipelineMocks) { m.store.EXPECT().GetApplication("badAppName").Return(nil, errors.New("some error")) }, wantedError: errors.New("some error"), }, "errors if passed-in pipeline name is invalid": { skipConfirmation: true, inAppName: testAppName, inPipelineName: "badPipelineName", callMocks: func(m deletePipelineMocks) { m.store.EXPECT().GetApplication(testAppName).Return(nil, nil) m.deployedPipelineLister.EXPECT().ListDeployedPipelines(testAppName).Return([]deploy.Pipeline{}, nil) }, wantedAppName: testAppName, wantedError: errors.New("validate pipeline name badPipelineName: cannot find pipeline named badPipelineName"), }, "gets name of legacy pipeline": { skipConfirmation: true, inAppName: testAppName, callMocks: func(m deletePipelineMocks) { m.store.EXPECT().GetApplication(testAppName).Return(nil, nil) m.sel.EXPECT().DeployedPipeline(gomock.Any(), gomock.Any(), testAppName).Return(deploy.Pipeline{ Name: testPipelineName, IsLegacy: true, }, nil) }, wantedAppName: testAppName, wantedPipelineName: testPipelineName, wantedError: nil, }, "error getting pipeline": { skipConfirmation: true, inAppName: testAppName, callMocks: func(m deletePipelineMocks) { m.store.EXPECT().GetApplication(testAppName).Return(nil, nil) m.sel.EXPECT().DeployedPipeline(gomock.Any(), gomock.Any(), testAppName).Return(deploy.Pipeline{}, errors.New("some error")) }, wantedAppName: testAppName, wantedError: errors.New("select deployed pipelines: some error"), }, "skip confirmation works": { skipConfirmation: true, inAppName: testAppName, inPipelineName: testPipelineName, callMocks: func(m deletePipelineMocks) { m.store.EXPECT().GetApplication(testAppName).Return(nil, nil) m.deployedPipelineLister.EXPECT().ListDeployedPipelines(testAppName).Return([]deploy.Pipeline{ { Name: testPipelineName, }, }, nil) }, wantedAppName: testAppName, wantedPipelineName: testPipelineName, wantedError: nil, }, "delete confirmation works": { skipConfirmation: false, inAppName: testAppName, inPipelineName: testPipelineName, callMocks: func(m deletePipelineMocks) { m.store.EXPECT().GetApplication(testAppName).Return(nil, nil) m.deployedPipelineLister.EXPECT().ListDeployedPipelines(testAppName).Return([]deploy.Pipeline{ { Name: testPipelineName, }, }, nil) m.prompt.EXPECT().Confirm( fmt.Sprintf(pipelineDeleteConfirmPrompt, testPipelineName, testAppName), pipelineDeleteConfirmHelp, gomock.Any(), ).Times(1).Return(true, nil) }, wantedAppName: testAppName, wantedPipelineName: testPipelineName, wantedError: nil, }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { // GIVEN ctrl := gomock.NewController(t) defer ctrl.Finish() mockPipelineGetter := mocks.NewMockpipelineGetter(ctrl) mockPrompt := mocks.NewMockprompter(ctrl) mockWorkspace := mocks.NewMockwsPipelineGetter(ctrl) mockStore := mocks.NewMockstore(ctrl) mockSel := mocks.NewMockcodePipelineSelector(ctrl) mocks := deletePipelineMocks{ codepipeline: mockPipelineGetter, prompt: mockPrompt, ws: mockWorkspace, store: mockStore, sel: mockSel, deployedPipelineLister: mocks.NewMockdeployedPipelineLister(ctrl), } tc.callMocks(mocks) opts := &deletePipelineOpts{ deletePipelineVars: deletePipelineVars{ skipConfirmation: tc.skipConfirmation, appName: tc.inAppName, name: tc.inPipelineName, }, codepipeline: mockPipelineGetter, prompt: mockPrompt, ws: mockWorkspace, store: mockStore, sel: mockSel, deployedPipelineLister: mocks.deployedPipelineLister, } // WHEN err := opts.Ask() // THEN if tc.wantedError != nil { require.EqualError(t, err, tc.wantedError.Error()) } else { require.NoError(t, err) require.Equal(t, tc.wantedAppName, opts.appName, "expected app names to match") require.Equal(t, tc.wantedPipelineName, opts.name, "expected pipeline names to match") } }) } } func TestDeletePipelineOpts_Execute(t *testing.T) { const ( testAppName = "badgoose" testPipelineName = "pipeline-badgoose-honkpipes" testPipelineSecret = "github-token-badgoose-honkpipes" ) targetPipeline := deploy.Pipeline{ Name: testPipelineName, AppName: testAppName, IsLegacy: true, } mockTime := time.Now() mockResp := &secretsmanager.DescribeSecretOutput{ CreatedDate: aws.Time(mockTime), Name: aws.String(testPipelineSecret), Tags: []*sdkSecretsmanager.Tag{ { Key: aws.String(deploy.AppTagKey), Value: aws.String(mockTime.UTC().Format(time.UnixDate)), }, }, } mockBadResp := &secretsmanager.DescribeSecretOutput{ CreatedDate: aws.Time(mockTime), Name: aws.String(testPipelineSecret), Tags: []*sdkSecretsmanager.Tag{ { Key: aws.String("someOtherKey"), Value: aws.String(mockTime.UTC().Format(time.UnixDate)), }, }, } testError := errors.New("some error") testCases := map[string]struct { deleteSecret bool inAppName string inPipelineName string setupMocks func(mocks deletePipelineMocks) wantedError error }{ "skips delete secret confirmation (and deletion attempt) if there is no secret": { inAppName: testAppName, inPipelineName: testPipelineName, setupMocks: func(mocks deletePipelineMocks) { gomock.InOrder( mocks.secretsmanager.EXPECT().DescribeSecret(testPipelineSecret).Return(nil, &secretsmanager.ErrSecretNotFound{}), mocks.secretsmanager.EXPECT().DeleteSecret(gomock.Any()).Times(0), mocks.prog.EXPECT().Start(fmt.Sprintf(fmtDeletePipelineStart, testPipelineName, testAppName)), mocks.deployer.EXPECT().DeletePipeline(targetPipeline).Return(nil), mocks.prog.EXPECT().Stop(log.Ssuccessf(fmtDeletePipelineComplete, testPipelineName, testAppName)), ) }, wantedError: nil, }, "skips secret deletion if secret found but tags don't match": { inAppName: testAppName, inPipelineName: testPipelineName, setupMocks: func(mocks deletePipelineMocks) { gomock.InOrder( mocks.secretsmanager.EXPECT().DescribeSecret(testPipelineSecret).Return(mockBadResp, nil), mocks.prog.EXPECT().Start(fmt.Sprintf(fmtDeletePipelineStart, testPipelineName, testAppName)), mocks.deployer.EXPECT().DeletePipeline(targetPipeline).Return(nil), mocks.prog.EXPECT().Stop(log.Ssuccessf(fmtDeletePipelineComplete, testPipelineName, testAppName)), ) }, wantedError: nil, }, "wraps error from DescribeSecret": { inAppName: testAppName, inPipelineName: testPipelineName, setupMocks: func(mocks deletePipelineMocks) { gomock.InOrder( mocks.secretsmanager.EXPECT().DescribeSecret(testPipelineSecret).Return(nil, errors.New("some error")), ) }, wantedError: fmt.Errorf("describe secret %s: some error", testPipelineSecret), }, "skips delete secret confirmation when flag is specified": { deleteSecret: true, inAppName: testAppName, inPipelineName: testPipelineName, setupMocks: func(mocks deletePipelineMocks) { gomock.InOrder( mocks.secretsmanager.EXPECT().DescribeSecret(testPipelineSecret).Return(mockResp, nil), // no confirmation prompt for deleting secret mocks.secretsmanager.EXPECT().DeleteSecret(testPipelineSecret).Return(nil), mocks.prog.EXPECT().Start(fmt.Sprintf(fmtDeletePipelineStart, testPipelineName, testAppName)), mocks.deployer.EXPECT().DeletePipeline(targetPipeline).Return(nil), mocks.prog.EXPECT().Stop(log.Ssuccessf(fmtDeletePipelineComplete, testPipelineName, testAppName)), ) }, wantedError: nil, }, "asks for confirmation when delete secret flag is not specified": { deleteSecret: false, inAppName: testAppName, inPipelineName: testPipelineName, setupMocks: func(mocks deletePipelineMocks) { gomock.InOrder( mocks.secretsmanager.EXPECT().DescribeSecret(testPipelineSecret).Return(mockResp, nil), mocks.prompt.EXPECT().Confirm( fmt.Sprintf(pipelineSecretDeleteConfirmPrompt, testPipelineSecret, testPipelineName), pipelineDeleteSecretConfirmHelp, ).Times(1).Return(true, nil), mocks.secretsmanager.EXPECT().DeleteSecret(testPipelineSecret).Return(nil), mocks.prog.EXPECT().Start(fmt.Sprintf(fmtDeletePipelineStart, testPipelineName, testAppName)), mocks.deployer.EXPECT().DeletePipeline(targetPipeline).Return(nil), mocks.prog.EXPECT().Stop(log.Ssuccessf(fmtDeletePipelineComplete, testPipelineName, testAppName)), ) }, wantedError: nil, }, "does not delete secret if user does not confirm": { deleteSecret: false, inAppName: testAppName, inPipelineName: testPipelineName, setupMocks: func(mocks deletePipelineMocks) { gomock.InOrder( mocks.secretsmanager.EXPECT().DescribeSecret(testPipelineSecret).Return(mockResp, nil), mocks.prompt.EXPECT().Confirm( fmt.Sprintf(pipelineSecretDeleteConfirmPrompt, testPipelineSecret, testPipelineName), pipelineDeleteSecretConfirmHelp, ).Times(1).Return(false, nil), // does not delete secret mocks.secretsmanager.EXPECT().DeleteSecret(testPipelineSecret).Times(0), mocks.prog.EXPECT().Start(fmt.Sprintf(fmtDeletePipelineStart, testPipelineName, testAppName)), mocks.deployer.EXPECT().DeletePipeline(targetPipeline).Times(1).Return(nil), mocks.prog.EXPECT().Stop(log.Ssuccessf(fmtDeletePipelineComplete, testPipelineName, testAppName)), ) }, wantedError: nil, }, "error when deleting stack": { deleteSecret: true, inAppName: testAppName, inPipelineName: testPipelineName, setupMocks: func(mocks deletePipelineMocks) { gomock.InOrder( mocks.secretsmanager.EXPECT().DescribeSecret(testPipelineSecret).Return(mockResp, nil), mocks.secretsmanager.EXPECT().DeleteSecret(testPipelineSecret).Return(nil), mocks.prog.EXPECT().Start(fmt.Sprintf(fmtDeletePipelineStart, testPipelineName, testAppName)), mocks.deployer.EXPECT().DeletePipeline(targetPipeline).Times(1).Return(testError), mocks.prog.EXPECT().Stop(log.Serrorf(fmtDeletePipelineFailed, testPipelineName, testAppName, testError)), ) }, wantedError: testError, }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { // GIVEN ctrl := gomock.NewController(t) defer ctrl.Finish() mockSecretsManager := mocks.NewMocksecretsManager(ctrl) mockProg := mocks.NewMockprogress(ctrl) mockDeployer := mocks.NewMockpipelineDeployer(ctrl) mockPrompter := mocks.NewMockprompter(ctrl) mockWorkspace := mocks.NewMockwsPipelineGetter(ctrl) mocks := deletePipelineMocks{ prompt: mockPrompter, prog: mockProg, secretsmanager: mockSecretsManager, deployer: mockDeployer, ws: mockWorkspace, } tc.setupMocks(mocks) opts := &deletePipelineOpts{ deletePipelineVars: deletePipelineVars{ shouldDeleteSecret: tc.deleteSecret, appName: tc.inAppName, name: tc.inPipelineName, }, secretsmanager: mockSecretsManager, pipelineDeployer: mockDeployer, ws: mockWorkspace, prog: mockProg, prompt: mockPrompter, targetPipeline: &targetPipeline, } // WHEN err := opts.Execute() // THEN if tc.wantedError != nil { require.EqualError(t, err, tc.wantedError.Error()) } }) } }
416
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package cli import ( "bytes" "encoding/json" "errors" "fmt" "io" "os" "path/filepath" "strings" "github.com/aws/aws-sdk-go/service/ssm" "github.com/spf13/afero" "github.com/aws/copilot-cli/internal/pkg/aws/cloudformation" awscloudformation "github.com/aws/copilot-cli/internal/pkg/aws/cloudformation" cs "github.com/aws/copilot-cli/internal/pkg/aws/codestar" "github.com/aws/copilot-cli/internal/pkg/aws/identity" rg "github.com/aws/copilot-cli/internal/pkg/aws/resourcegroups" "github.com/aws/copilot-cli/internal/pkg/aws/sessions" "github.com/aws/copilot-cli/internal/pkg/cli/list" "github.com/aws/copilot-cli/internal/pkg/config" "github.com/aws/copilot-cli/internal/pkg/deploy" deploycfn "github.com/aws/copilot-cli/internal/pkg/deploy/cloudformation" "github.com/aws/copilot-cli/internal/pkg/deploy/cloudformation/stack" "github.com/aws/copilot-cli/internal/pkg/manifest" templatediff "github.com/aws/copilot-cli/internal/pkg/template/diff" "github.com/aws/copilot-cli/internal/pkg/term/color" "github.com/aws/copilot-cli/internal/pkg/term/log" "github.com/aws/copilot-cli/internal/pkg/term/prompt" "github.com/aws/copilot-cli/internal/pkg/term/selector" "github.com/aws/copilot-cli/internal/pkg/workspace" "github.com/aws/aws-sdk-go/aws" "github.com/spf13/cobra" termprogress "github.com/aws/copilot-cli/internal/pkg/term/progress" ) const ( pipelineSelectPrompt = "Select a pipeline from your workspace to deploy" fmtPipelineDeployResourcesStart = "Adding pipeline resources to your application: %s" fmtPipelineDeployResourcesFailed = "Failed to add pipeline resources to your application: %s\n" fmtPipelineDeployResourcesComplete = "Successfully added pipeline resources to your application: %s\n" fmtPipelineDeployStart = "Creating a new pipeline: %s" fmtPipelineDeployFailed = "Failed to create a new pipeline: %s.\n" fmtPipelineDeployComplete = "Successfully created a new pipeline: %s\n" fmtPipelineDeployProposalStart = "Proposing infrastructure changes for the pipeline: %s" fmtPipelineDeployProposalFailed = "Failed to accept changes for pipeline: %s.\n" fmtPipelineDeployProposalComplete = "Successfully deployed pipeline: %s\n" fmtPipelineDeployExistPrompt = "Are you sure you want to redeploy an existing pipeline: %s?" ) const connectionsURL = "https://console.aws.amazon.com/codesuite/settings/connections" type deployPipelineVars struct { appName string name string skipConfirmation bool showDiff bool } type deployPipelineOpts struct { deployPipelineVars pipelineDeployer pipelineDeployer sel wsPipelineSelector prog progress prompt prompter region string store store ws wsPipelineReader codestar codestar diffWriter io.Writer newSvcListCmd func(io.Writer, string) cmd newJobListCmd func(io.Writer, string) cmd pipelineStackConfig func(in *deploy.CreatePipelineInput) pipelineStackConfig configureDeployedPipelineLister func() deployedPipelineLister // cached variables wsAppName string app *config.Application pipeline *workspace.PipelineManifest shouldPromptUpdateConnection bool pipelineMft *manifest.Pipeline svcBuffer *bytes.Buffer jobBuffer *bytes.Buffer } func newDeployPipelineOpts(vars deployPipelineVars) (*deployPipelineOpts, error) { defaultSession, err := sessions.ImmutableProvider(sessions.UserAgentExtras("pipeline deploy")).Default() if err != nil { return nil, fmt.Errorf("default session: %w", err) } store := config.NewSSMStore(identity.New(defaultSession), ssm.New(defaultSession), aws.StringValue(defaultSession.Config.Region)) prompter := prompt.New() ws, err := workspace.Use(afero.NewOsFs()) if err != nil { return nil, err } wsAppName := tryReadingAppName() if vars.appName == "" { vars.appName = wsAppName } opts := &deployPipelineOpts{ ws: ws, pipelineDeployer: deploycfn.New(defaultSession, deploycfn.WithProgressTracker(os.Stderr)), region: aws.StringValue(defaultSession.Config.Region), deployPipelineVars: vars, store: store, prog: termprogress.NewSpinner(log.DiagnosticWriter), prompt: prompter, diffWriter: os.Stdout, sel: selector.NewWsPipelineSelector(prompter, ws), codestar: cs.New(defaultSession), pipelineStackConfig: func(in *deploy.CreatePipelineInput) pipelineStackConfig { return stack.NewPipelineStackConfig(in) }, newSvcListCmd: func(w io.Writer, appName string) cmd { return &listSvcOpts{ listWkldVars: listWkldVars{ appName: appName, }, sel: selector.NewAppEnvSelector(prompt.New(), store), list: &list.SvcListWriter{ Ws: ws, Store: store, Out: w, ShowLocalSvcs: true, OutputJSON: true, }, } }, newJobListCmd: func(w io.Writer, appName string) cmd { return &listJobOpts{ listWkldVars: listWkldVars{ appName: appName, }, sel: selector.NewAppEnvSelector(prompt.New(), store), list: &list.JobListWriter{ Ws: ws, Store: store, Out: w, ShowLocalJobs: true, OutputJSON: true, }, } }, wsAppName: wsAppName, svcBuffer: &bytes.Buffer{}, jobBuffer: &bytes.Buffer{}, } opts.configureDeployedPipelineLister = func() deployedPipelineLister { // Initialize the client only after the appName is asked. return deploy.NewPipelineStore(rg.New(defaultSession)) } return opts, nil } // Validate returns an error if the optional flag values passed by the user are invalid. func (o *deployPipelineOpts) Validate() error { return nil } // Ask prompts the user for any unprovided required fields and validates them. func (o *deployPipelineOpts) Ask() error { if o.wsAppName == "" { return errNoAppInWorkspace } // This command must be run within the app's workspace. if o.appName != "" && o.appName != o.wsAppName { return fmt.Errorf("cannot specify app %s because the workspace is already registered with app %s", o.appName, o.wsAppName) } appConfig, err := o.store.GetApplication(o.wsAppName) if err != nil { return fmt.Errorf("get application %s configuration: %w", o.wsAppName, err) } o.app = appConfig if o.name != "" { return o.validatePipelineName() } return o.askWsPipelineName() } // Execute creates a new pipeline or updates the current pipeline if it already exists. func (o *deployPipelineOpts) Execute() error { // bootstrap pipeline resources o.prog.Start(fmt.Sprintf(fmtPipelineDeployResourcesStart, color.HighlightUserInput(o.appName))) err := o.pipelineDeployer.AddPipelineResourcesToApp(o.app, o.region) if err != nil { o.prog.Stop(log.Serrorf(fmtPipelineDeployResourcesFailed, color.HighlightUserInput(o.appName))) return fmt.Errorf("add pipeline resources to application %s in %s: %w", o.appName, o.region, err) } o.prog.Stop(log.Ssuccessf(fmtPipelineDeployResourcesComplete, color.HighlightUserInput(o.appName))) // Read pipeline manifest. pipeline, err := o.getPipelineMft() if err != nil { return err } // If the source has an existing connection, get the correlating ConnectionARN. connection, ok := pipeline.Source.Properties["connection_name"] if ok { arn, err := o.codestar.GetConnectionARN((connection).(string)) if err != nil { return fmt.Errorf("get connection ARN: %w", err) } pipeline.Source.Properties["connection_arn"] = arn } source, shouldPrompt, err := deploy.PipelineSourceFromManifest(pipeline.Source) if err != nil { return fmt.Errorf("read source from manifest: %w", err) } o.shouldPromptUpdateConnection = shouldPrompt // Convert full manifest path to relative path from workspace root. relPath, err := o.ws.Rel(o.pipeline.Path) if err != nil { return err } // Convert environments to deployment stages. stages, err := o.convertStages(pipeline.Stages) if err != nil { return fmt.Errorf("convert environments to deployment stage: %w", err) } // Get cross-regional resources. artifactBuckets, err := o.getArtifactBuckets() if err != nil { return fmt.Errorf("get cross-regional resources: %w", err) } isLegacy, err := o.isLegacy(pipeline.Name) if err != nil { return err } var build deploy.Build if err = build.Init(pipeline.Build, filepath.Dir(relPath)); err != nil { return err } deployPipelineInput := &deploy.CreatePipelineInput{ AppName: o.appName, Name: pipeline.Name, IsLegacy: isLegacy, Source: source, Build: &build, Stages: stages, ArtifactBuckets: artifactBuckets, AdditionalTags: o.app.Tags, PermissionsBoundary: o.app.PermissionsBoundary, } if o.showDiff { tpl, err := o.pipelineStackConfig(deployPipelineInput).Template() if err != nil { return fmt.Errorf("generate the new template for diff: %w", err) } if err = diff(o, tpl, o.diffWriter); err != nil { var errHasDiff *errHasDiff if !errors.As(err, &errHasDiff) { return err } } if !o.skipConfirmation { contd, err := o.prompt.Confirm(continueDeploymentPrompt, "") if err != nil { return fmt.Errorf("ask whether to continue with the deployment: %w", err) } if !contd { return nil } } } if err := o.deployPipeline(deployPipelineInput); err != nil { return err } return nil } // DeployDiff returns the stringified diff of the template against the deployed template of the pipeline. func (o *deployPipelineOpts) DeployDiff(template string) (string, error) { isLegacy, err := o.isLegacy(o.pipeline.Name) if err != nil { return "", err } tmpl, err := o.pipelineDeployer.Template(stack.NameForPipeline(o.app.Name, o.pipeline.Name, isLegacy)) if err != nil { var errNotFound *awscloudformation.ErrStackNotFound if !errors.As(err, &errNotFound) { return "", fmt.Errorf("retrieve the deployed template for %q: %w", o.pipeline.Name, err) } tmpl = "" } diffTree, err := templatediff.From(tmpl).ParseWithCFNOverriders([]byte(template)) if err != nil { return "", fmt.Errorf("parse the diff against the deployed pipeline stack %q: %w", o.pipeline.Name, err) } buf := strings.Builder{} if err := diffTree.Write(&buf); err != nil { return "", err } return buf.String(), nil } func (o *deployPipelineOpts) isLegacy(inputName string) (bool, error) { lister := o.configureDeployedPipelineLister() pipelines, err := lister.ListDeployedPipelines(o.appName) if err != nil { return false, fmt.Errorf("list deployed pipelines for app %s: %w", o.appName, err) } for _, pipeline := range pipelines { if pipeline.ResourceName == inputName { // NOTE: this is double insurance. A namespaced pipeline's `ResourceName` wouldn't be equal to // `inputName` in the first place, because it would have been namespaced and have random string // appended by CFN. return pipeline.IsLegacy, nil } } return false, nil } func (o *deployPipelineOpts) validatePipelineName() error { pipelines, err := o.ws.ListPipelines() if err != nil { return fmt.Errorf("list pipelines: %w", err) } for _, pipeline := range pipelines { if pipeline.Name == o.name { o.pipeline = &pipeline return nil } } return fmt.Errorf(`pipeline %s not found in the workspace`, color.HighlightUserInput(o.name)) } func (o *deployPipelineOpts) askWsPipelineName() error { pipeline, err := o.sel.WsPipeline(pipelineSelectPrompt, "") if err != nil { return fmt.Errorf("select pipeline: %w", err) } o.pipeline = pipeline return nil } func (o *deployPipelineOpts) getPipelineMft() (*manifest.Pipeline, error) { if o.pipelineMft != nil { return o.pipelineMft, nil } pipelineMft, err := o.ws.ReadPipelineManifest(o.pipeline.Path) if err != nil { return nil, fmt.Errorf("read pipeline manifest: %w", err) } if err := pipelineMft.Validate(); err != nil { return nil, fmt.Errorf("validate pipeline manifest: %w", err) } o.pipelineMft = pipelineMft return pipelineMft, nil } func (o *deployPipelineOpts) convertStages(manifestStages []manifest.PipelineStage) ([]deploy.PipelineStage, error) { var stages []deploy.PipelineStage workloads, err := o.getLocalWorkloads() if err != nil { return nil, err } for _, stage := range manifestStages { env, err := o.store.GetEnvironment(o.appName, stage.Name) if err != nil { return nil, fmt.Errorf("get environment %s in application %s: %w", stage.Name, o.appName, err) } var stg deploy.PipelineStage stg.Init(env, &stage, workloads) stages = append(stages, stg) } return stages, nil } func (o deployPipelineOpts) getLocalWorkloads() ([]string, error) { var localWklds []string if err := o.newSvcListCmd(o.svcBuffer, o.appName).Execute(); err != nil { return nil, fmt.Errorf("get local services: %w", err) } if err := o.newJobListCmd(o.jobBuffer, o.appName).Execute(); err != nil { return nil, fmt.Errorf("get local jobs: %w", err) } svcOutput, jobOutput := &list.ServiceJSONOutput{}, &list.JobJSONOutput{} if err := json.Unmarshal(o.svcBuffer.Bytes(), svcOutput); err != nil { return nil, fmt.Errorf("unmarshal service list output; %w", err) } for _, svc := range svcOutput.Services { localWklds = append(localWklds, svc.Name) } if err := json.Unmarshal(o.jobBuffer.Bytes(), jobOutput); err != nil { return nil, fmt.Errorf("unmarshal job list output; %w", err) } for _, job := range jobOutput.Jobs { localWklds = append(localWklds, job.Name) } return localWklds, nil } func (o *deployPipelineOpts) getArtifactBuckets() ([]deploy.ArtifactBucket, error) { regionalResources, err := o.pipelineDeployer.GetRegionalAppResources(o.app) if err != nil { return nil, err } var buckets []deploy.ArtifactBucket for _, resource := range regionalResources { bucket := deploy.ArtifactBucket{ BucketName: resource.S3Bucket, KeyArn: resource.KMSKeyARN, } buckets = append(buckets, bucket) } return buckets, nil } func (o *deployPipelineOpts) getBucketName() (string, error) { resources, err := o.pipelineDeployer.GetAppResourcesByRegion(o.app, o.region) if err != nil { return "", fmt.Errorf("get app resources: %w", err) } return resources.S3Bucket, nil } func (o *deployPipelineOpts) shouldUpdate() (bool, error) { if o.skipConfirmation { return true, nil } shouldUpdate, err := o.prompt.Confirm(fmt.Sprintf(fmtPipelineDeployExistPrompt, o.pipeline.Name), "") if err != nil { return false, fmt.Errorf("prompt for pipeline deploy: %w", err) } return shouldUpdate, nil } func (o *deployPipelineOpts) deployPipeline(in *deploy.CreatePipelineInput) error { exist, err := o.pipelineDeployer.PipelineExists(in) if err != nil { return fmt.Errorf("check if pipeline exists: %w", err) } // Find the bucket to push the pipeline template to. bucketName, err := o.getBucketName() if err != nil { return fmt.Errorf("get bucket name: %w", err) } if !exist { o.prog.Start(fmt.Sprintf(fmtPipelineDeployStart, color.HighlightUserInput(o.pipeline.Name))) // If the source requires CodeStar Connections, the user is prompted to update the connection status. if o.shouldPromptUpdateConnection { source, ok := in.Source.(interface { ConnectionName() (string, error) }) if !ok { return fmt.Errorf("source %v does not have a connection name", in.Source) } connectionName, err := source.ConnectionName() if err != nil { return fmt.Errorf("parse connection name: %w", err) } log.Infoln() log.Infof("%s Go to %s to update the status of connection %s from PENDING to AVAILABLE.", color.Emphasize("ACTION REQUIRED!"), color.HighlightResource(connectionsURL), color.HighlightUserInput(connectionName)) log.Infoln() } if err := o.pipelineDeployer.CreatePipeline(in, bucketName); err != nil { var alreadyExists *cloudformation.ErrStackAlreadyExists if !errors.As(err, &alreadyExists) { o.prog.Stop(log.Serrorf(fmtPipelineDeployFailed, color.HighlightUserInput(o.pipeline.Name))) return fmt.Errorf("create pipeline: %w", err) } } o.prog.Stop(log.Ssuccessf(fmtPipelineDeployComplete, color.HighlightUserInput(o.pipeline.Name))) return nil } // If the stack already exists - we update it if !o.showDiff { shouldUpdate, err := o.shouldUpdate() if err != nil { return err } if !shouldUpdate { return nil } } o.prog.Start(fmt.Sprintf(fmtPipelineDeployProposalStart, color.HighlightUserInput(o.pipeline.Name))) if err := o.pipelineDeployer.UpdatePipeline(in, bucketName); err != nil { o.prog.Stop(log.Serrorf(fmtPipelineDeployProposalFailed, color.HighlightUserInput(o.pipeline.Name))) return fmt.Errorf("update pipeline: %w", err) } o.prog.Stop(log.Ssuccessf(fmtPipelineDeployProposalComplete, color.HighlightUserInput(o.pipeline.Name))) return nil } // RecommendedActions returns follow-up actions the user can take after successfully executing the command. func (o *deployPipelineOpts) RecommendedActions() []string { return []string{ fmt.Sprintf("Run %s to see the state of your pipeline.", color.HighlightCode("copilot pipeline status")), fmt.Sprintf("Run %s for info about your pipeline.", color.HighlightCode("copilot pipeline show")), } } // BuildPipelineDeployCmd build the command for deploying a new pipeline or updating an existing pipeline. func buildPipelineDeployCmd() *cobra.Command { vars := deployPipelineVars{} cmd := &cobra.Command{ Use: "deploy", Aliases: []string{"update"}, Short: "Deploys a pipeline for the services in your workspace.", Long: `Deploys a pipeline for the services in your workspace, using the environments associated with the application.`, Example: ` Deploys a pipeline for the services and jobs in your workspace. /code $ copilot pipeline deploy `, RunE: runCmdE(func(cmd *cobra.Command, args []string) error { opts, err := newDeployPipelineOpts(vars) if err != nil { return err } return run(opts) }), } cmd.Flags().StringVarP(&vars.appName, appFlag, appFlagShort, "", appFlagDescription) cmd.Flags().StringVarP(&vars.name, nameFlag, nameFlagShort, "", pipelineFlagDescription) cmd.Flags().BoolVar(&vars.skipConfirmation, yesFlag, false, yesFlagDescription) cmd.Flags().BoolVar(&vars.showDiff, diffFlag, false, diffFlagDescription) return cmd }
560
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package cli import ( "bytes" "errors" "fmt" "io" "strings" "testing" "github.com/aws/copilot-cli/internal/pkg/cli/mocks" "github.com/aws/copilot-cli/internal/pkg/config" "github.com/aws/copilot-cli/internal/pkg/deploy" "github.com/aws/copilot-cli/internal/pkg/deploy/cloudformation/stack" "github.com/aws/copilot-cli/internal/pkg/manifest" "github.com/aws/copilot-cli/internal/pkg/term/log" "github.com/aws/copilot-cli/internal/pkg/workspace" "github.com/golang/mock/gomock" "github.com/stretchr/testify/require" ) type deployPipelineMocks struct { store *mocks.Mockstore prompt *mocks.Mockprompter prog *mocks.Mockprogress deployer *mocks.MockpipelineDeployer pipelineStackConfig *mocks.MockpipelineStackConfig mockDiffWriter *strings.Builder ws *mocks.MockwsPipelineReader actionCmd *mocks.MockactionCommand deployedPipelineLister *mocks.MockdeployedPipelineLister } func TestDeployPipelineOpts_Ask(t *testing.T) { const ( testAppName = "badgoose" testPipelineName = "pipeline-badgoose-honkpipes" testPipelineSecret = "github-token-badgoose-honkpipes" ) pipeline := workspace.PipelineManifest{ Name: testPipelineName, Path: "copilot/pipeline.yml", } testCases := map[string]struct { inAppName string inWsAppName string inPipelineName string mockWs func(m *mocks.MockwsPipelineReader) mockSel func(m *mocks.MockwsPipelineSelector) mockStore func(m *mocks.Mockstore) wantedApp string wantedAppConfig *config.Application wantedPipeline *workspace.PipelineManifest wantedError error }{ "return error if can't read app name from workspace file": { inWsAppName: "", mockStore: func(m *mocks.Mockstore) {}, mockWs: func(m *mocks.MockwsPipelineReader) {}, mockSel: func(m *mocks.MockwsPipelineSelector) {}, wantedError: errNoAppInWorkspace, }, "return error if passed-in app name doesn't match workspace app": { inAppName: "badAppName", inWsAppName: testAppName, mockStore: func(m *mocks.Mockstore) {}, mockWs: func(m *mocks.MockwsPipelineReader) {}, mockSel: func(m *mocks.MockwsPipelineSelector) {}, wantedError: errors.New("cannot specify app badAppName because the workspace is already registered with app badgoose"), }, "return error if passed-in app name can't be validated": { inWsAppName: testAppName, inAppName: testAppName, mockStore: func(m *mocks.Mockstore) { m.EXPECT().GetApplication(testAppName).Return(nil, errors.New("some error")) }, mockWs: func(m *mocks.MockwsPipelineReader) {}, mockSel: func(m *mocks.MockwsPipelineSelector) {}, wantedError: errors.New("get application badgoose configuration: some error"), }, "return error if passed-in pipeline name not found": { inAppName: testAppName, inWsAppName: testAppName, inPipelineName: "someOtherPipelineName", mockSel: func(m *mocks.MockwsPipelineSelector) {}, mockStore: func(m *mocks.Mockstore) { m.EXPECT().GetApplication(testAppName).Return(nil, nil) }, mockWs: func(m *mocks.MockwsPipelineReader) { m.EXPECT().ListPipelines().Return([]workspace.PipelineManifest{pipeline}, nil) }, wantedError: errors.New("pipeline someOtherPipelineName not found in the workspace"), }, "return error if fail to select pipeline": { inAppName: testAppName, inWsAppName: testAppName, mockStore: func(m *mocks.Mockstore) { m.EXPECT().GetApplication(testAppName).Return(nil, nil) }, mockSel: func(m *mocks.MockwsPipelineSelector) { m.EXPECT().WsPipeline(gomock.Any(), gomock.Any()).Return(nil, errors.New("some error")) }, mockWs: func(m *mocks.MockwsPipelineReader) {}, wantedError: fmt.Errorf("select pipeline: some error"), }, "success with app flag and pipeline flag": { inWsAppName: testAppName, inAppName: testAppName, inPipelineName: testPipelineName, mockStore: func(m *mocks.Mockstore) { m.EXPECT().GetApplication(testAppName).Return(&config.Application{ Name: testAppName, }, nil) }, mockSel: func(m *mocks.MockwsPipelineSelector) {}, mockWs: func(m *mocks.MockwsPipelineReader) { m.EXPECT().ListPipelines().Return([]workspace.PipelineManifest{pipeline}, nil) }, wantedApp: testAppName, wantedAppConfig: &config.Application{Name: testAppName}, wantedPipeline: &pipeline, wantedError: nil, }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { // GIVEN ctrl := gomock.NewController(t) defer ctrl.Finish() mockSel := mocks.NewMockwsPipelineSelector(ctrl) mockWs := mocks.NewMockwsPipelineReader(ctrl) mockStore := mocks.NewMockstore(ctrl) tc.mockSel(mockSel) tc.mockWs(mockWs) tc.mockStore(mockStore) opts := deployPipelineOpts{ deployPipelineVars: deployPipelineVars{ appName: tc.inAppName, name: tc.inPipelineName, }, wsAppName: tc.inWsAppName, sel: mockSel, ws: mockWs, store: mockStore, } // WHEN err := opts.Ask() // THEN if tc.wantedError != nil { require.EqualError(t, err, tc.wantedError.Error()) } else { require.NoError(t, err) require.Equal(t, tc.wantedPipeline, opts.pipeline) require.Equal(t, tc.wantedApp, opts.appName) require.Equal(t, tc.wantedAppConfig, opts.app) } }) } } func TestDeployPipelineOpts_Execute(t *testing.T) { const ( appName = "badgoose" region = "us-west-2" accountID = "123456789012" pipelineName = "pipepiper" badPipelineName = "pipeline-badgoose-honkpipes" pipelineManifestPath = "someStuff/someMoreStuff/aws-copilot-sample-service/copilot/pipelines/pipepiper/manifest.yml" relativePath = "/copilot/pipelines/pipepiper/manifest.yml" ) mockPipelineManifest := &manifest.Pipeline{ Name: "pipepiper", Version: 1, Source: &manifest.Source{ ProviderName: "GitHub", Properties: map[string]interface{}{ "repository": "aws/somethingCool", "branch": "main", }, }, Stages: []manifest.PipelineStage{ { Name: "chicken", TestCommands: []string{"make test", "echo 'made test'"}, }, { Name: "wings", TestCommands: []string{"echo 'bok bok bok'"}, }, }, } app := config.Application{ AccountID: accountID, Name: appName, Domain: "amazon.com", } mockResources := []*stack.AppRegionalResources{ { S3Bucket: "someBucket", KMSKeyARN: "someKey", }, } mockResource := &stack.AppRegionalResources{ S3Bucket: "someOtherBucket", } mockEnv := &config.Environment{ Name: "test", App: appName, Region: region, AccountID: accountID, } testCases := map[string]struct { inApp *config.Application inAppName string inPipelineName string inRegion string inPipelineFile string callMocks func(m deployPipelineMocks) expectedError error inShowDiff bool }{ "create and deploy pipeline": { inApp: &app, inAppName: appName, inRegion: region, callMocks: func(m deployPipelineMocks) { gomock.InOrder( m.prog.EXPECT().Start(fmt.Sprintf(fmtPipelineDeployResourcesStart, appName)).Times(1), m.deployer.EXPECT().AddPipelineResourcesToApp(&app, region).Return(nil), m.prog.EXPECT().Stop(log.Ssuccessf(fmtPipelineDeployResourcesComplete, appName)).Times(1), m.ws.EXPECT().ReadPipelineManifest(pipelineManifestPath).Return(mockPipelineManifest, nil), m.ws.EXPECT().Rel(pipelineManifestPath).Return(relativePath, nil), m.actionCmd.EXPECT().Execute().Times(2), // convertStages m.store.EXPECT().GetEnvironment(appName, "chicken").Return(mockEnv, nil).Times(1), m.store.EXPECT().GetEnvironment(appName, "wings").Return(mockEnv, nil).Times(1), // getArtifactBuckets m.deployer.EXPECT().GetRegionalAppResources(gomock.Any()).Return(mockResources, nil), // check if the pipeline has been deployed using a legacy naming. m.deployedPipelineLister.EXPECT().ListDeployedPipelines(appName).Return([]deploy.Pipeline{}, nil), // deployPipeline m.deployer.EXPECT().PipelineExists(gomock.Any()).DoAndReturn(func(in *deploy.CreatePipelineInput) (bool, error) { if in.IsLegacy { return false, errors.New("should not be a legacy pipeline") } return false, nil }), m.deployer.EXPECT().GetAppResourcesByRegion(&app, region).Return(mockResource, nil), m.prog.EXPECT().Start(fmt.Sprintf(fmtPipelineDeployStart, pipelineName)).Times(1), m.deployer.EXPECT().CreatePipeline(gomock.Any(), gomock.Any()).DoAndReturn(func(in *deploy.CreatePipelineInput, _ string) error { if in.IsLegacy { return errors.New("should not be a legacy pipeline") } return nil }), m.prog.EXPECT().Stop(log.Ssuccessf(fmtPipelineDeployComplete, pipelineName)).Times(1), ) }, expectedError: nil, }, "update and deploy pipeline with new naming": { inApp: &app, inAppName: appName, inRegion: region, callMocks: func(m deployPipelineMocks) { gomock.InOrder( m.prog.EXPECT().Start(fmt.Sprintf(fmtPipelineDeployResourcesStart, appName)).Times(1), m.deployer.EXPECT().AddPipelineResourcesToApp(&app, region).Return(nil), m.prog.EXPECT().Stop(log.Ssuccessf(fmtPipelineDeployResourcesComplete, appName)).Times(1), m.ws.EXPECT().ReadPipelineManifest(pipelineManifestPath).Return(mockPipelineManifest, nil), m.ws.EXPECT().Rel(pipelineManifestPath).Return(relativePath, nil), m.actionCmd.EXPECT().Execute().Times(2), // convertStages m.store.EXPECT().GetEnvironment(appName, "chicken").Return(mockEnv, nil).Times(1), m.store.EXPECT().GetEnvironment(appName, "wings").Return(mockEnv, nil).Times(1), // getArtifactBuckets m.deployer.EXPECT().GetRegionalAppResources(gomock.Any()).Return(mockResources, nil), // check if the pipeline has been deployed using a legacy naming. m.deployedPipelineLister.EXPECT().ListDeployedPipelines(appName).Return([]deploy.Pipeline{}, nil), // deployPipeline m.deployer.EXPECT().PipelineExists(gomock.Any()).DoAndReturn(func(in *deploy.CreatePipelineInput) (bool, error) { if in.IsLegacy { return false, errors.New("should not be a legacy pipeline") } return true, nil }), m.deployer.EXPECT().GetAppResourcesByRegion(&app, region).Return(mockResource, nil), m.prompt.EXPECT().Confirm(fmt.Sprintf(fmtPipelineDeployExistPrompt, pipelineName), "").Return(true, nil), m.prog.EXPECT().Start(fmt.Sprintf(fmtPipelineDeployProposalStart, pipelineName)).Times(1), m.deployer.EXPECT().UpdatePipeline(gomock.Any(), gomock.Any()).DoAndReturn(func(in *deploy.CreatePipelineInput, _ string) error { if in.IsLegacy { return errors.New("should not be a legacy pipeline") } return nil }), m.prog.EXPECT().Stop(log.Ssuccessf(fmtPipelineDeployProposalComplete, pipelineName)).Times(1), ) }, expectedError: nil, }, "update and deploy pipeline with legacy naming": { inApp: &app, inAppName: appName, inRegion: region, callMocks: func(m deployPipelineMocks) { gomock.InOrder( m.prog.EXPECT().Start(fmt.Sprintf(fmtPipelineDeployResourcesStart, appName)).Times(1), m.deployer.EXPECT().AddPipelineResourcesToApp(&app, region).Return(nil), m.prog.EXPECT().Stop(log.Ssuccessf(fmtPipelineDeployResourcesComplete, appName)).Times(1), m.ws.EXPECT().ReadPipelineManifest(pipelineManifestPath).Return(mockPipelineManifest, nil), m.ws.EXPECT().Rel(pipelineManifestPath).Return(relativePath, nil), m.actionCmd.EXPECT().Execute().Times(2), // convertStages m.store.EXPECT().GetEnvironment(appName, "chicken").Return(mockEnv, nil).Times(1), m.store.EXPECT().GetEnvironment(appName, "wings").Return(mockEnv, nil).Times(1), // getArtifactBuckets m.deployer.EXPECT().GetRegionalAppResources(gomock.Any()).Return(mockResources, nil), // check if the pipeline has been deployed using a legacy naming. m.deployedPipelineLister.EXPECT().ListDeployedPipelines(appName).Return([]deploy.Pipeline{ { ResourceName: pipelineName, IsLegacy: true, }, }, nil), // deployPipeline m.deployer.EXPECT().PipelineExists(gomock.Any()).DoAndReturn(func(in *deploy.CreatePipelineInput) (bool, error) { if !in.IsLegacy { return false, errors.New("should be a legacy pipeline") } return true, nil }), m.deployer.EXPECT().GetAppResourcesByRegion(&app, region).Return(mockResource, nil), m.prompt.EXPECT().Confirm(fmt.Sprintf(fmtPipelineDeployExistPrompt, pipelineName), "").Return(true, nil), m.prog.EXPECT().Start(fmt.Sprintf(fmtPipelineDeployProposalStart, pipelineName)).Times(1), m.deployer.EXPECT().UpdatePipeline(gomock.Any(), gomock.Any()).DoAndReturn(func(in *deploy.CreatePipelineInput, _ string) error { if !in.IsLegacy { return errors.New("should be a legacy pipeline") } return nil }), m.prog.EXPECT().Stop(log.Ssuccessf(fmtPipelineDeployProposalComplete, pipelineName)).Times(1), ) }, expectedError: nil, }, "do not deploy pipeline if decline to redeploy an existing pipeline": { inApp: &app, inAppName: appName, inRegion: region, callMocks: func(m deployPipelineMocks) { gomock.InOrder( m.prog.EXPECT().Start(fmt.Sprintf(fmtPipelineDeployResourcesStart, appName)).Times(1), m.deployer.EXPECT().AddPipelineResourcesToApp(&app, region).Return(nil), m.prog.EXPECT().Stop(log.Ssuccessf(fmtPipelineDeployResourcesComplete, appName)).Times(1), m.ws.EXPECT().ReadPipelineManifest(pipelineManifestPath).Return(mockPipelineManifest, nil), m.ws.EXPECT().Rel(pipelineManifestPath).Return(relativePath, nil), m.actionCmd.EXPECT().Execute().Times(2), // convertStages m.store.EXPECT().GetEnvironment(appName, "chicken").Return(mockEnv, nil).Times(1), m.store.EXPECT().GetEnvironment(appName, "wings").Return(mockEnv, nil).Times(1), // getArtifactBuckets m.deployer.EXPECT().GetRegionalAppResources(gomock.Any()).Return(mockResources, nil), // check if the pipeline has been deployed using a legacy naming. m.deployedPipelineLister.EXPECT().ListDeployedPipelines(appName).Return([]deploy.Pipeline{}, nil), // deployPipeline m.deployer.EXPECT().PipelineExists(gomock.Any()).Return(true, nil), m.deployer.EXPECT().GetAppResourcesByRegion(&app, region).Return(mockResource, nil), m.prompt.EXPECT().Confirm(fmt.Sprintf(fmtPipelineDeployExistPrompt, pipelineName), "").Return(false, nil), ) }, expectedError: nil, }, "returns an error if fails to prompt for pipeline deploy": { inApp: &app, inAppName: appName, inRegion: region, callMocks: func(m deployPipelineMocks) { gomock.InOrder( m.prog.EXPECT().Start(fmt.Sprintf(fmtPipelineDeployResourcesStart, appName)).Times(1), m.deployer.EXPECT().AddPipelineResourcesToApp(&app, region).Return(nil), m.prog.EXPECT().Stop(log.Ssuccessf(fmtPipelineDeployResourcesComplete, appName)).Times(1), m.ws.EXPECT().ReadPipelineManifest(pipelineManifestPath).Return(mockPipelineManifest, nil), m.ws.EXPECT().Rel(pipelineManifestPath).Return(relativePath, nil), m.actionCmd.EXPECT().Execute().Times(2), // convertStages m.store.EXPECT().GetEnvironment(appName, "chicken").Return(mockEnv, nil).Times(1), m.store.EXPECT().GetEnvironment(appName, "wings").Return(mockEnv, nil).Times(1), // getArtifactBuckets m.deployer.EXPECT().GetRegionalAppResources(gomock.Any()).Return(mockResources, nil), // check if the pipeline has been deployed using a legacy naming. m.deployedPipelineLister.EXPECT().ListDeployedPipelines(appName).Return([]deploy.Pipeline{}, nil), // deployPipeline m.deployer.EXPECT().PipelineExists(gomock.Any()).Return(true, nil), m.deployer.EXPECT().GetAppResourcesByRegion(&app, region).Return(mockResource, nil), m.prompt.EXPECT().Confirm(fmt.Sprintf(fmtPipelineDeployExistPrompt, pipelineName), "").Return(false, errors.New("some error")), ) }, expectedError: fmt.Errorf("prompt for pipeline deploy: some error"), }, "returns an error if fail to add pipeline resources to app": { inApp: &app, inRegion: region, inAppName: appName, callMocks: func(m deployPipelineMocks) { gomock.InOrder( m.prog.EXPECT().Start(fmt.Sprintf(fmtPipelineDeployResourcesStart, appName)).Times(1), m.deployer.EXPECT().AddPipelineResourcesToApp(&app, region).Return(errors.New("some error")), m.prog.EXPECT().Stop(log.Serrorf(fmtPipelineDeployResourcesFailed, appName)).Times(1), ) }, expectedError: fmt.Errorf("add pipeline resources to application %s in %s: some error", appName, region), }, "returns an error if fail to read pipeline file": { inApp: &app, inRegion: region, inAppName: appName, callMocks: func(m deployPipelineMocks) { gomock.InOrder( m.prog.EXPECT().Start(fmt.Sprintf(fmtPipelineDeployResourcesStart, appName)).Times(1), m.deployer.EXPECT().AddPipelineResourcesToApp(&app, region).Return(nil), m.prog.EXPECT().Stop(log.Ssuccessf(fmtPipelineDeployResourcesComplete, appName)).Times(1), m.ws.EXPECT().ReadPipelineManifest(pipelineManifestPath).Return(mockPipelineManifest, errors.New("some error")), ) }, expectedError: fmt.Errorf("read pipeline manifest: some error"), }, "returns an error if unable to unmarshal pipeline file": { inApp: &app, inRegion: region, inAppName: appName, callMocks: func(m deployPipelineMocks) { gomock.InOrder( m.prog.EXPECT().Start(fmt.Sprintf(fmtPipelineDeployResourcesStart, appName)).Times(1), m.deployer.EXPECT().AddPipelineResourcesToApp(&app, region).Return(nil), m.prog.EXPECT().Stop(log.Ssuccessf(fmtPipelineDeployResourcesComplete, appName)).Times(1), m.ws.EXPECT().ReadPipelineManifest(pipelineManifestPath).Return(nil, errors.New("some error")), ) }, expectedError: fmt.Errorf("read pipeline manifest: some error"), }, "returns an error if pipeline name fails validation": { inApp: &app, inAppName: appName, inRegion: region, callMocks: func(m deployPipelineMocks) { mockBadPipelineManifest := &manifest.Pipeline{ Name: "12345678101234567820123456783012345678401234567850123456786012345678701234567880123456789012345671001", Version: 1, Source: &manifest.Source{ ProviderName: "GitHub", Properties: map[string]interface{}{ "repository": "aws/somethingCool", "branch": "main", }, }, } gomock.InOrder( m.prog.EXPECT().Start(fmt.Sprintf(fmtPipelineDeployResourcesStart, appName)).Times(1), m.deployer.EXPECT().AddPipelineResourcesToApp(&app, region).Return(nil), m.prog.EXPECT().Stop(log.Ssuccessf(fmtPipelineDeployResourcesComplete, appName)).Times(1), m.ws.EXPECT().ReadPipelineManifest(pipelineManifestPath).Return(mockBadPipelineManifest, nil), ) }, expectedError: fmt.Errorf("validate pipeline manifest: pipeline name '12345678101234567820123456783012345678401234567850123456786012345678701234567880123456789012345671001' must be shorter than 100 characters"), }, "returns an error if provider is not a supported type": { inApp: &app, inAppName: appName, inRegion: region, callMocks: func(m deployPipelineMocks) { mockBadPipelineManifest := &manifest.Pipeline{ Name: badPipelineName, Version: 1, Source: &manifest.Source{ ProviderName: "NotGitHub", Properties: map[string]interface{}{ "access_token_secret": "github-token-badgoose-backend", "repository": "aws/somethingCool", "branch": "main", }, }, } gomock.InOrder( m.prog.EXPECT().Start(fmt.Sprintf(fmtPipelineDeployResourcesStart, appName)).Times(1), m.deployer.EXPECT().AddPipelineResourcesToApp(&app, region).Return(nil), m.prog.EXPECT().Stop(log.Ssuccessf(fmtPipelineDeployResourcesComplete, appName)).Times(1), m.ws.EXPECT().ReadPipelineManifest(pipelineManifestPath).Return(mockBadPipelineManifest, nil), ) }, expectedError: fmt.Errorf("read source from manifest: invalid repo source provider: NotGitHub"), }, "returns an error if unable to convert environments to deployment stage": { inApp: &app, inRegion: region, inAppName: appName, callMocks: func(m deployPipelineMocks) { gomock.InOrder( m.prog.EXPECT().Start(fmt.Sprintf(fmtPipelineDeployResourcesStart, appName)).Times(1), m.deployer.EXPECT().AddPipelineResourcesToApp(&app, region).Return(nil), m.prog.EXPECT().Stop(log.Ssuccessf(fmtPipelineDeployResourcesComplete, appName)).Times(1), m.ws.EXPECT().ReadPipelineManifest(pipelineManifestPath).Return(mockPipelineManifest, nil), m.ws.EXPECT().Rel(pipelineManifestPath).Return(relativePath, nil), m.actionCmd.EXPECT().Execute().Return(errors.New("some error")), ) }, expectedError: fmt.Errorf("convert environments to deployment stage: get local services: some error"), }, "returns an error if fails to get cross-regional resources": { inApp: &app, inRegion: region, inAppName: appName, callMocks: func(m deployPipelineMocks) { gomock.InOrder( m.prog.EXPECT().Start(fmt.Sprintf(fmtPipelineDeployResourcesStart, appName)).Times(1), m.deployer.EXPECT().AddPipelineResourcesToApp(&app, region).Return(nil), m.prog.EXPECT().Stop(log.Ssuccessf(fmtPipelineDeployResourcesComplete, appName)).Times(1), m.ws.EXPECT().ReadPipelineManifest(pipelineManifestPath).Return(mockPipelineManifest, nil), m.ws.EXPECT().Rel(pipelineManifestPath).Return(relativePath, nil), m.actionCmd.EXPECT().Execute().Times(2), // convertStages m.store.EXPECT().GetEnvironment(appName, "chicken").Return(mockEnv, nil).Times(1), m.store.EXPECT().GetEnvironment(appName, "wings").Return(mockEnv, nil).Times(1), // getArtifactBuckets m.deployer.EXPECT().GetRegionalAppResources(gomock.Any()).Return(mockResources, errors.New("some error")), ) }, expectedError: fmt.Errorf("get cross-regional resources: some error"), }, "returns an error if fails to check if pipeline exists": { inApp: &app, inRegion: region, inAppName: appName, callMocks: func(m deployPipelineMocks) { gomock.InOrder( m.prog.EXPECT().Start(fmt.Sprintf(fmtPipelineDeployResourcesStart, appName)).Times(1), m.deployer.EXPECT().AddPipelineResourcesToApp(&app, region).Return(nil), m.prog.EXPECT().Stop(log.Ssuccessf(fmtPipelineDeployResourcesComplete, appName)).Times(1), m.ws.EXPECT().ReadPipelineManifest(pipelineManifestPath).Return(mockPipelineManifest, nil), m.ws.EXPECT().Rel(pipelineManifestPath).Return(relativePath, nil), m.actionCmd.EXPECT().Execute().Times(2), // convertStages m.store.EXPECT().GetEnvironment(appName, "chicken").Return(mockEnv, nil).Times(1), m.store.EXPECT().GetEnvironment(appName, "wings").Return(mockEnv, nil).Times(1), // getArtifactBuckets m.deployer.EXPECT().GetRegionalAppResources(gomock.Any()).Return(mockResources, nil), // check if the pipeline has been deployed using a legacy naming. m.deployedPipelineLister.EXPECT().ListDeployedPipelines(appName).Return([]deploy.Pipeline{}, nil), // deployPipeline m.deployer.EXPECT().PipelineExists(gomock.Any()).Return(false, errors.New("some error")), ) }, expectedError: fmt.Errorf("check if pipeline exists: some error"), }, "returns an error if fails to create pipeline": { inApp: &app, inRegion: region, inAppName: appName, callMocks: func(m deployPipelineMocks) { gomock.InOrder( m.prog.EXPECT().Start(fmt.Sprintf(fmtPipelineDeployResourcesStart, appName)).Times(1), m.deployer.EXPECT().AddPipelineResourcesToApp(&app, region).Return(nil), m.prog.EXPECT().Stop(log.Ssuccessf(fmtPipelineDeployResourcesComplete, appName)).Times(1), m.ws.EXPECT().ReadPipelineManifest(pipelineManifestPath).Return(mockPipelineManifest, nil), m.ws.EXPECT().Rel(pipelineManifestPath).Return(relativePath, nil), m.actionCmd.EXPECT().Execute().Times(2), // convertStages m.store.EXPECT().GetEnvironment(appName, "chicken").Return(mockEnv, nil).Times(1), m.store.EXPECT().GetEnvironment(appName, "wings").Return(mockEnv, nil).Times(1), // getArtifactBuckets m.deployer.EXPECT().GetRegionalAppResources(gomock.Any()).Return(mockResources, nil), // check if the pipeline has been deployed using a legacy naming. m.deployedPipelineLister.EXPECT().ListDeployedPipelines(appName).Return([]deploy.Pipeline{}, nil), // deployPipeline m.deployer.EXPECT().PipelineExists(gomock.Any()).Return(false, nil), m.deployer.EXPECT().GetAppResourcesByRegion(&app, region).Return(mockResource, nil), m.prog.EXPECT().Start(fmt.Sprintf(fmtPipelineDeployStart, pipelineName)).Times(1), m.deployer.EXPECT().CreatePipeline(gomock.Any(), gomock.Any()).Return(errors.New("some error")), m.prog.EXPECT().Stop(log.Serrorf(fmtPipelineDeployFailed, pipelineName)).Times(1), ) }, expectedError: fmt.Errorf("create pipeline: some error"), }, "returns an error if fails to update pipeline": { inApp: &app, inRegion: region, inAppName: appName, callMocks: func(m deployPipelineMocks) { gomock.InOrder( m.prog.EXPECT().Start(fmt.Sprintf(fmtPipelineDeployResourcesStart, appName)).Times(1), m.deployer.EXPECT().AddPipelineResourcesToApp(&app, region).Return(nil), m.prog.EXPECT().Stop(log.Ssuccessf(fmtPipelineDeployResourcesComplete, appName)).Times(1), m.ws.EXPECT().ReadPipelineManifest(pipelineManifestPath).Return(mockPipelineManifest, nil), m.ws.EXPECT().Rel(pipelineManifestPath).Return(relativePath, nil), m.actionCmd.EXPECT().Execute().Times(2), // convertStages m.store.EXPECT().GetEnvironment(appName, "chicken").Return(mockEnv, nil).Times(1), m.store.EXPECT().GetEnvironment(appName, "wings").Return(mockEnv, nil).Times(1), // getArtifactBuckets m.deployer.EXPECT().GetRegionalAppResources(gomock.Any()).Return(mockResources, nil), // check if the pipeline has been deployed using a legacy naming. m.deployedPipelineLister.EXPECT().ListDeployedPipelines(appName).Return([]deploy.Pipeline{}, nil), // deployPipeline m.deployer.EXPECT().PipelineExists(gomock.Any()).Return(true, nil), m.deployer.EXPECT().GetAppResourcesByRegion(&app, region).Return(mockResource, nil), m.prompt.EXPECT().Confirm(fmt.Sprintf(fmtPipelineDeployExistPrompt, pipelineName), "").Return(true, nil), m.prog.EXPECT().Start(fmt.Sprintf(fmtPipelineDeployProposalStart, pipelineName)).Times(1), m.deployer.EXPECT().UpdatePipeline(gomock.Any(), gomock.Any()).Return(errors.New("some error")), m.prog.EXPECT().Stop(log.Serrorf(fmtPipelineDeployProposalFailed, pipelineName)).Times(1), ) }, expectedError: fmt.Errorf("update pipeline: some error"), }, "update and deploy pipeline with specifying build property": { inApp: &app, inAppName: appName, inRegion: region, callMocks: func(m deployPipelineMocks) { mockPipelineManifest := &manifest.Pipeline{ Name: "pipepiper", Version: 1, Source: &manifest.Source{ ProviderName: "GitHub", Properties: map[string]interface{}{ "repository": "aws/somethingCool", "branch": "main", }, }, Build: &manifest.Build{Image: "aws/codebuild/standard:3.0"}, Stages: []manifest.PipelineStage{ { Name: "chicken", RequiresApproval: false, TestCommands: []string{"make test", "echo 'made test'"}, }, { Name: "wings", RequiresApproval: false, TestCommands: []string{"echo 'bok bok bok'"}, }, }, } gomock.InOrder( m.prog.EXPECT().Start(fmt.Sprintf(fmtPipelineDeployResourcesStart, appName)).Times(1), m.deployer.EXPECT().AddPipelineResourcesToApp(&app, region).Return(nil), m.prog.EXPECT().Stop(log.Ssuccessf(fmtPipelineDeployResourcesComplete, appName)).Times(1), m.ws.EXPECT().ReadPipelineManifest(pipelineManifestPath).Return(mockPipelineManifest, nil), m.ws.EXPECT().Rel(pipelineManifestPath).Return(relativePath, nil), m.actionCmd.EXPECT().Execute().Times(2), // convertStages m.store.EXPECT().GetEnvironment(appName, "chicken").Return(mockEnv, nil).Times(1), m.store.EXPECT().GetEnvironment(appName, "wings").Return(mockEnv, nil).Times(1), // getArtifactBuckets m.deployer.EXPECT().GetRegionalAppResources(gomock.Any()).Return(mockResources, nil), // check if the pipeline has been deployed using a legacy naming. m.deployedPipelineLister.EXPECT().ListDeployedPipelines(appName).Return([]deploy.Pipeline{}, nil), // deployPipeline m.deployer.EXPECT().PipelineExists(gomock.Any()).Return(true, nil), m.deployer.EXPECT().GetAppResourcesByRegion(&app, region).Return(mockResource, nil), m.prompt.EXPECT().Confirm(fmt.Sprintf(fmtPipelineDeployExistPrompt, pipelineName), "").Return(true, nil), m.prog.EXPECT().Start(fmt.Sprintf(fmtPipelineDeployProposalStart, pipelineName)).Times(1), m.deployer.EXPECT().UpdatePipeline(gomock.Any(), gomock.Any()).Return(nil), m.prog.EXPECT().Stop(log.Ssuccessf(fmtPipelineDeployProposalComplete, pipelineName)).Times(1), ) }, expectedError: nil, }, "error if failed to generate the template to show diff": { inApp: &app, inAppName: appName, inRegion: region, inShowDiff: true, callMocks: func(m deployPipelineMocks) { gomock.InOrder( m.prog.EXPECT().Start(fmt.Sprintf(fmtPipelineDeployResourcesStart, appName)).Times(1), m.deployer.EXPECT().AddPipelineResourcesToApp(&app, region).Return(nil), m.prog.EXPECT().Stop(log.Ssuccessf(fmtPipelineDeployResourcesComplete, appName)).Times(1), m.ws.EXPECT().ReadPipelineManifest(pipelineManifestPath).Return(mockPipelineManifest, nil), m.ws.EXPECT().Rel(pipelineManifestPath).Return(relativePath, nil), m.actionCmd.EXPECT().Execute().Times(2), // convertStages m.store.EXPECT().GetEnvironment(appName, "chicken").Return(mockEnv, nil).Times(1), m.store.EXPECT().GetEnvironment(appName, "wings").Return(mockEnv, nil).Times(1), // getArtifactBuckets m.deployer.EXPECT().GetRegionalAppResources(gomock.Any()).Return(mockResources, nil), // check if the pipeline has been deployed using a legacy naming. m.deployedPipelineLister.EXPECT().ListDeployedPipelines(appName).Return([]deploy.Pipeline{}, nil), m.pipelineStackConfig.EXPECT().Template().Return("", errors.New("some error")), ) }, expectedError: fmt.Errorf("generate the new template for diff: some error"), }, "failed to fetch the template of deployed stack": { inApp: &app, inAppName: appName, inRegion: region, inShowDiff: true, callMocks: func(m deployPipelineMocks) { gomock.InOrder( m.prog.EXPECT().Start(fmt.Sprintf(fmtPipelineDeployResourcesStart, appName)).Times(1), m.deployer.EXPECT().AddPipelineResourcesToApp(&app, region).Return(nil), m.prog.EXPECT().Stop(log.Ssuccessf(fmtPipelineDeployResourcesComplete, appName)).Times(1), m.ws.EXPECT().ReadPipelineManifest(pipelineManifestPath).Return(mockPipelineManifest, nil), m.ws.EXPECT().Rel(pipelineManifestPath).Return(relativePath, nil), m.actionCmd.EXPECT().Execute().Times(2), // convertStages m.store.EXPECT().GetEnvironment(appName, "chicken").Return(mockEnv, nil).Times(1), m.store.EXPECT().GetEnvironment(appName, "wings").Return(mockEnv, nil).Times(1), // getArtifactBuckets m.deployer.EXPECT().GetRegionalAppResources(gomock.Any()).Return(mockResources, nil), // check if the pipeline has been deployed using a legacy naming. m.deployedPipelineLister.EXPECT().ListDeployedPipelines(appName).Return([]deploy.Pipeline{}, nil), m.pipelineStackConfig.EXPECT().Template().Return("template one", nil), m.deployedPipelineLister.EXPECT().ListDeployedPipelines(appName).Return([]deploy.Pipeline{}, nil), m.deployer.EXPECT().Template(gomock.Any()).Return("", fmt.Errorf("some error"))) }, expectedError: fmt.Errorf("retrieve the deployed template for %q: some error", pipelineName), }, "failed prompt to accept diff": { inApp: &app, inAppName: appName, inRegion: region, inShowDiff: true, callMocks: func(m deployPipelineMocks) { m.prog.EXPECT().Start(fmt.Sprintf(fmtPipelineDeployResourcesStart, appName)).Times(1) m.deployer.EXPECT().AddPipelineResourcesToApp(&app, region).Return(nil) m.prog.EXPECT().Stop(log.Ssuccessf(fmtPipelineDeployResourcesComplete, appName)).Times(1) m.ws.EXPECT().ReadPipelineManifest(pipelineManifestPath).Return(mockPipelineManifest, nil) m.ws.EXPECT().Rel(pipelineManifestPath).Return(relativePath, nil) m.actionCmd.EXPECT().Execute().Times(2) // convertStages m.store.EXPECT().GetEnvironment(appName, "chicken").Return(mockEnv, nil).Times(1) m.store.EXPECT().GetEnvironment(appName, "wings").Return(mockEnv, nil).Times(1) // getArtifactBuckets m.deployer.EXPECT().GetRegionalAppResources(gomock.Any()).Return(mockResources, nil) // check if the pipeline has been deployed using a legacy naming. m.deployedPipelineLister.EXPECT().ListDeployedPipelines(appName).Return([]deploy.Pipeline{}, nil) m.pipelineStackConfig.EXPECT().Template().Return("name: mockEnv\ntype: Environment", nil) m.deployedPipelineLister.EXPECT().ListDeployedPipelines(appName).Return([]deploy.Pipeline{}, nil) m.deployer.EXPECT().Template(gomock.Any()).Return("name: mockEnv\ntype: Environment", nil) m.prompt.EXPECT().Confirm(continueDeploymentPrompt, "").Return(false, errors.New("some error")) }, expectedError: fmt.Errorf("ask whether to continue with the deployment: some error"), }, "successfully show diff and create a new pipeline": { inApp: &app, inAppName: appName, inRegion: region, inShowDiff: true, callMocks: func(m deployPipelineMocks) { m.prog.EXPECT().Start(fmt.Sprintf(fmtPipelineDeployResourcesStart, appName)).Times(1) m.deployer.EXPECT().AddPipelineResourcesToApp(&app, region).Return(nil) m.prog.EXPECT().Stop(log.Ssuccessf(fmtPipelineDeployResourcesComplete, appName)).Times(1) m.ws.EXPECT().ReadPipelineManifest(pipelineManifestPath).Return(mockPipelineManifest, nil) m.ws.EXPECT().Rel(pipelineManifestPath).Return(relativePath, nil) m.actionCmd.EXPECT().Execute().Times(2) // convertStages m.store.EXPECT().GetEnvironment(appName, "chicken").Return(mockEnv, nil).Times(1) m.store.EXPECT().GetEnvironment(appName, "wings").Return(mockEnv, nil).Times(1) // getArtifactBuckets m.deployer.EXPECT().GetRegionalAppResources(gomock.Any()).Return(mockResources, nil) // check if the pipeline has been deployed using a legacy naming. m.deployedPipelineLister.EXPECT().ListDeployedPipelines(appName).Return([]deploy.Pipeline{}, nil) m.deployer.EXPECT().PipelineExists(gomock.Any()).DoAndReturn(func(in *deploy.CreatePipelineInput) (bool, error) { if in.IsLegacy { return false, errors.New("should not be a legacy pipeline") } return false, nil }) m.pipelineStackConfig.EXPECT().Template().Return("name: mockEnv\ntype: Environment", nil) m.deployedPipelineLister.EXPECT().ListDeployedPipelines(appName).Return([]deploy.Pipeline{}, nil) m.deployer.EXPECT().Template(gomock.Any()).Return("name: mockEnv\ntype: Environment", nil) m.prompt.EXPECT().Confirm(continueDeploymentPrompt, "").Return(true, nil) // deployPipeline m.deployer.EXPECT().GetAppResourcesByRegion(&app, region).Return(mockResource, nil) m.prog.EXPECT().Start(fmt.Sprintf(fmtPipelineDeployStart, pipelineName)).Times(1) m.deployer.EXPECT().CreatePipeline(gomock.Any(), gomock.Any()).DoAndReturn(func(in *deploy.CreatePipelineInput, _ string) error { if in.IsLegacy { return errors.New("should not be a legacy pipeline") } return nil }) m.prog.EXPECT().Stop(log.Ssuccessf(fmtPipelineDeployComplete, pipelineName)).Times(1) }, }, "Successfully show diff and redeploy an existing pipeline": { inApp: &app, inAppName: appName, inRegion: region, inShowDiff: true, callMocks: func(m deployPipelineMocks) { m.prog.EXPECT().Start(fmt.Sprintf(fmtPipelineDeployResourcesStart, appName)).Times(1) m.deployer.EXPECT().AddPipelineResourcesToApp(&app, region).Return(nil) m.prog.EXPECT().Stop(log.Ssuccessf(fmtPipelineDeployResourcesComplete, appName)).Times(1) m.ws.EXPECT().ReadPipelineManifest(pipelineManifestPath).Return(mockPipelineManifest, nil) m.ws.EXPECT().Rel(pipelineManifestPath).Return(relativePath, nil) m.actionCmd.EXPECT().Execute().Times(2) // convertStages m.store.EXPECT().GetEnvironment(appName, "chicken").Return(mockEnv, nil).Times(1) m.store.EXPECT().GetEnvironment(appName, "wings").Return(mockEnv, nil).Times(1) // getArtifactBuckets m.deployer.EXPECT().GetRegionalAppResources(gomock.Any()).Return(mockResources, nil) // check if the pipeline has been deployed using a legacy naming. m.deployedPipelineLister.EXPECT().ListDeployedPipelines(appName).Return([]deploy.Pipeline{}, nil) m.pipelineStackConfig.EXPECT().Template().Return("name: mockEnv\ntype: Environment", nil) m.deployedPipelineLister.EXPECT().ListDeployedPipelines(appName).Return([]deploy.Pipeline{}, nil) m.deployer.EXPECT().Template(gomock.Any()).Return("name: mockEnv\ntype: Environment", nil) m.prompt.EXPECT().Confirm(continueDeploymentPrompt, "").Return(true, nil) // deployPipeline m.deployer.EXPECT().PipelineExists(gomock.Any()).DoAndReturn(func(in *deploy.CreatePipelineInput) (bool, error) { if in.IsLegacy { return false, errors.New("should not be a legacy pipeline") } return true, nil }) m.deployer.EXPECT().GetAppResourcesByRegion(&app, region).Return(mockResource, nil) m.prog.EXPECT().Start(fmt.Sprintf(fmtPipelineDeployProposalStart, pipelineName)).Times(1) m.deployer.EXPECT().UpdatePipeline(gomock.Any(), gomock.Any()).DoAndReturn(func(in *deploy.CreatePipelineInput, _ string) error { if in.IsLegacy { return errors.New("should not be a legacy pipeline") } return nil }) m.prog.EXPECT().Stop(log.Ssuccessf(fmtPipelineDeployProposalComplete, pipelineName)).Times(1) }, }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { // GIVEN ctrl := gomock.NewController(t) defer ctrl.Finish() mockPipelineDeployer := mocks.NewMockpipelineDeployer(ctrl) mockStore := mocks.NewMockstore(ctrl) mockWorkspace := mocks.NewMockwsPipelineReader(ctrl) mockProgress := mocks.NewMockprogress(ctrl) mockPrompt := mocks.NewMockprompter(ctrl) mockActionCmd := mocks.NewMockactionCommand(ctrl) mockPipelineStackConfig := mocks.NewMockpipelineStackConfig(ctrl) mocks := deployPipelineMocks{ store: mockStore, prompt: mockPrompt, prog: mockProgress, deployer: mockPipelineDeployer, ws: mockWorkspace, actionCmd: mockActionCmd, pipelineStackConfig: mockPipelineStackConfig, deployedPipelineLister: mocks.NewMockdeployedPipelineLister(ctrl), mockDiffWriter: &strings.Builder{}, } tc.callMocks(mocks) opts := &deployPipelineOpts{ deployPipelineVars: deployPipelineVars{ appName: tc.inAppName, name: tc.inPipelineName, showDiff: tc.inShowDiff, }, pipelineDeployer: mockPipelineDeployer, pipelineStackConfig: func(in *deploy.CreatePipelineInput) pipelineStackConfig { return mockPipelineStackConfig }, ws: mockWorkspace, app: tc.inApp, region: tc.inRegion, store: mockStore, prog: mockProgress, prompt: mockPrompt, diffWriter: &strings.Builder{}, newSvcListCmd: func(w io.Writer, app string) cmd { return mockActionCmd }, newJobListCmd: func(w io.Writer, app string) cmd { return mockActionCmd }, configureDeployedPipelineLister: func() deployedPipelineLister { return mocks.deployedPipelineLister }, pipeline: &workspace.PipelineManifest{ Name: "pipepiper", Path: pipelineManifestPath, }, svcBuffer: bytes.NewBufferString(`{"services":[{"app":"badgoose","name":"frontend","type":""}]}`), jobBuffer: bytes.NewBufferString(`{"jobs":[{"app":"badgoose","name":"backend","type":""}]}`), } // WHEN err := opts.Execute() // THEN if tc.expectedError != nil { require.Error(t, err) require.Equal(t, tc.expectedError.Error(), err.Error()) } else { require.NoError(t, err) } }) } } func TestDeployPipelineOpts_getArtifactBuckets(t *testing.T) { testCases := map[string]struct { mockDeployer func(m *mocks.MockpipelineDeployer) expectedOut []deploy.ArtifactBucket expectedError error }{ "getsBucketInfo": { mockDeployer: func(m *mocks.MockpipelineDeployer) { mockResources := []*stack.AppRegionalResources{ { S3Bucket: "someBucket", KMSKeyARN: "someKey", }, } m.EXPECT().GetRegionalAppResources(gomock.Any()).Return(mockResources, nil) }, expectedOut: []deploy.ArtifactBucket{ { BucketName: "someBucket", KeyArn: "someKey", }, }, }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { // GIVEN ctrl := gomock.NewController(t) defer ctrl.Finish() mockPipelineDeployer := mocks.NewMockpipelineDeployer(ctrl) tc.mockDeployer(mockPipelineDeployer) opts := &deployPipelineOpts{ pipelineDeployer: mockPipelineDeployer, } // WHEN actual, err := opts.getArtifactBuckets() // THEN if tc.expectedError != nil { require.Equal(t, tc.expectedError, err) } else { require.NoError(t, err) require.ElementsMatch(t, tc.expectedOut, actual) } }) } }
1,048
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package cli import ( "bytes" "errors" "fmt" "os" "path" "path/filepath" "regexp" "strconv" "strings" "github.com/aws/copilot-cli/internal/pkg/deploy/cloudformation/stack" "github.com/aws/aws-sdk-go/service/ssm" "github.com/aws/copilot-cli/internal/pkg/aws/identity" rg "github.com/aws/copilot-cli/internal/pkg/aws/resourcegroups" "github.com/dustin/go-humanize/english" "github.com/aws/copilot-cli/internal/pkg/deploy" "github.com/aws/copilot-cli/internal/pkg/exec" "github.com/aws/aws-sdk-go/aws" "github.com/aws/copilot-cli/internal/pkg/term/color" "github.com/aws/copilot-cli/internal/pkg/term/log" "github.com/aws/copilot-cli/internal/pkg/version" "github.com/spf13/cobra" "github.com/dustin/go-humanize" "github.com/aws/copilot-cli/internal/pkg/term/selector" "github.com/aws/copilot-cli/internal/pkg/aws/secretsmanager" "github.com/aws/copilot-cli/internal/pkg/aws/sessions" "github.com/aws/copilot-cli/internal/pkg/config" "github.com/aws/copilot-cli/internal/pkg/deploy/cloudformation" "github.com/aws/copilot-cli/internal/pkg/manifest" "github.com/aws/copilot-cli/internal/pkg/template" "github.com/aws/copilot-cli/internal/pkg/term/prompt" "github.com/aws/copilot-cli/internal/pkg/workspace" "github.com/spf13/afero" ) const ( fmtPipelineInitNamePrompt = "What would you like to %s this pipeline?" pipelineInitNameHelpPrompt = `A unique identifier for your pipeline (e.g., "myRepo-myBranch").` pipelineSelectEnvPrompt = "Which environment would you like to add to your pipeline?" pipelineSelectEnvHelpPrompt = "Adds an environment that corresponds to a deployment stage in your pipeline. Environments are added sequentially." pipelineSelectURLPrompt = "Which repository would you like to use for your pipeline?" pipelineSelectURLHelpPrompt = `The repository linked to your pipeline. Pushing to this repository will trigger your pipeline build stage. Please enter full repository URL, e.g., "https://github.com/myCompany/myRepo", or the owner/rep, e.g., "myCompany/myRepo"` ) const ( workloadsPipelineBuildspecTemplatePath = "cicd/buildspec.yml" environmentsPipelineBuildspecTemplatePath = "cicd/env/buildspec.yml" fmtPipelineStackName = "pipeline-%s-%s" // Ex: "pipeline-appName-repoName" defaultBranch = deploy.DefaultPipelineBranch // For a GitHub repository. githubURL = "github.com" fmtGHRepoURL = "https://%s/%s/%s" // Ex: "https://github.com/repoOwner/repoName" fmtSecretName = "github-token-%s-%s" // Ex: "github-token-appName-repoName" // For a CodeCommit repository. awsURL = "aws.amazon.com" ccIdentifier = "codecommit" fmtCCRepoURL = "https://%s.console.%s/codesuite/codecommit/repositories/%s/browse" // Ex: "https://region.console.aws.amazon.com/codesuite/codecommit/repositories/repoName/browse" // For a Bitbucket repository. bbURL = "bitbucket.org" fmtBBRepoURL = "https://%s/%s/%s" // Ex: "https://bitbucket.org/repoOwner/repoName" ) const ( pipelineTypeWorkloads = "Workloads" pipelineTypeEnvironments = "Environments" ) var pipelineTypes = []string{pipelineTypeWorkloads, pipelineTypeEnvironments} var ( // Filled in via the -ldflags flag at compile time to support pipeline buildspec CLI pulling. binaryS3BucketPath string ) // Pipeline init errors. var ( fmtErrInvalidPipelineProvider = "repository %s must be from a supported provider: %s" ) type pipelineInitializer interface { writeManifest() error writeBuildspec() error } type workloadPipelineInitializer struct { cmd *initPipelineOpts } type envPipelineInitializer struct { cmd *initPipelineOpts } func (ini *workloadPipelineInitializer) writeManifest() error { var stages []manifest.PipelineStage for _, env := range ini.cmd.envConfigs { stage := manifest.PipelineStage{ Name: env.Name, } stages = append(stages, stage) } return ini.cmd.createPipelineManifest(stages) } func (ini *workloadPipelineInitializer) writeBuildspec() error { if err := ini.cmd.createBuildspec(workloadsPipelineBuildspecTemplatePath); err != nil { return err } log.Debugln(`The buildspec contains the commands to push your container images, and generate CloudFormation templates. Update the "build" phase to unit test your services before pushing the images.`) return nil } func (ini *envPipelineInitializer) writeManifest() error { var stages []manifest.PipelineStage for _, env := range ini.cmd.envConfigs { stage := manifest.PipelineStage{ Name: env.Name, Deployments: manifest.Deployments{ "deploy-env": &manifest.Deployment{ TemplatePath: path.Join(deploy.DefaultPipelineArtifactsDir, fmt.Sprintf(envCFNTemplateNameFmt, env.Name)), TemplateConfig: path.Join(deploy.DefaultPipelineArtifactsDir, fmt.Sprintf(envCFNTemplateConfigurationNameFmt, env.Name)), StackName: stack.NameForEnv(ini.cmd.appName, env.Name), }, }, } stages = append(stages, stage) } return ini.cmd.createPipelineManifest(stages) } func (ini *envPipelineInitializer) writeBuildspec() error { if err := ini.cmd.createBuildspec(environmentsPipelineBuildspecTemplatePath); err != nil { return err } log.Debugln(`The buildspec contains the commands to generate CloudFormation templates for your environments.`) return nil } func newPipelineInitializer(cmd *initPipelineOpts) pipelineInitializer { switch cmd.pipelineType { case pipelineTypeWorkloads: return &workloadPipelineInitializer{ cmd: cmd, } case pipelineTypeEnvironments: return &envPipelineInitializer{ cmd: cmd, } } return nil } type initPipelineVars struct { appName string name string // Name of the pipeline environments []string repoURL string repoBranch string githubAccessToken string pipelineType string } type initPipelineOpts struct { initPipelineVars // Interfaces to interact with dependencies. workspace wsPipelineIniter secretsmanager secretsManager parser template.Parser runner execRunner sessProvider sessionProvider cfnClient appResourcesGetter store store prompt prompter sel pipelineEnvSelector pipelineLister deployedPipelineLister // Outputs stored on successful actions. secret string provider string repoName string repoOwner string ccRegion string // Cached variables wsAppName string buffer bytes.Buffer envConfigs []*config.Environment manifestPath string // relative path to pipeline's manifest.yml file } type artifactBucket struct { BucketName string Region string Environments []string } func newInitPipelineOpts(vars initPipelineVars) (*initPipelineOpts, error) { ws, err := workspace.Use(afero.NewOsFs()) if err != nil { return nil, err } p := sessions.ImmutableProvider(sessions.UserAgentExtras("pipeline init")) defaultSession, err := p.Default() if err != nil { return nil, err } ssmStore := config.NewSSMStore(identity.New(defaultSession), ssm.New(defaultSession), aws.StringValue(defaultSession.Config.Region)) prompter := prompt.New() wsAppName := tryReadingAppName() if vars.appName == "" { vars.appName = wsAppName } return &initPipelineOpts{ initPipelineVars: vars, workspace: ws, secretsmanager: secretsmanager.New(defaultSession), parser: template.New(), sessProvider: p, cfnClient: cloudformation.New(defaultSession, cloudformation.WithProgressTracker(os.Stderr)), store: ssmStore, prompt: prompter, sel: selector.NewAppEnvSelector(prompter, ssmStore), runner: exec.NewCmd(), wsAppName: wsAppName, pipelineLister: deploy.NewPipelineStore(rg.New(defaultSession)), }, nil } // Validate returns an error if the optional flag values passed by the user are invalid. func (o *initPipelineOpts) Validate() error { return nil } // Ask prompts for required fields that are not passed in and validates them. func (o *initPipelineOpts) Ask() error { // This command must be executed in the app's workspace because the pipeline manifest and buildspec will be created and stored. if err := validateWorkspaceApp(o.wsAppName, o.appName, o.store); err != nil { return err } o.appName = o.wsAppName if err := o.askOrValidateURL(); err != nil { return err } if err := o.parseRepoDetails(); err != nil { return err } if o.repoBranch == "" { o.getBranch() } if err := o.askOrValidatePipelineName(); err != nil { return err } if err := o.askOrValidatePipelineType(); err != nil { return err } if err := o.validateDuplicatePipeline(); err != nil { return err } if len(o.environments) == 0 { if err := o.askEnvs(); err != nil { return err } } if err := o.validateEnvs(); err != nil { return err } return nil } // Execute writes the pipeline manifest file. func (o *initPipelineOpts) Execute() error { if o.provider == manifest.GithubV1ProviderName { if err := o.storeGitHubAccessToken(); err != nil { return err } } log.Infoln() ini := newPipelineInitializer(o) if err := ini.writeManifest(); err != nil { return err } if err := ini.writeBuildspec(); err != nil { return err } return nil } // RequiredActions returns follow-up actions the user must take after successfully executing the command. func (o *initPipelineOpts) RequiredActions() []string { return []string{ fmt.Sprintf("Commit and push the %s directory to your repository.", color.HighlightResource("copilot/")), fmt.Sprintf("Run %s to create your pipeline.", color.HighlightCode("copilot pipeline deploy")), } } // validateDuplicatePipeline checks that the pipeline name isn't already used // by another pipeline to reduce potential confusion with a legacy pipeline. func (o *initPipelineOpts) validateDuplicatePipeline() error { var allPipelines []string localPipelines, err := o.workspace.ListPipelines() if err != nil { return fmt.Errorf("get local pipelines: %w", err) } for _, pipeline := range localPipelines { allPipelines = append(allPipelines, pipeline.Name) } deployedPipelines, err := o.pipelineLister.ListDeployedPipelines(o.appName) if err != nil { return fmt.Errorf("list deployed pipelines for app %s: %w", o.appName, err) } for _, pipeline := range deployedPipelines { allPipelines = append(allPipelines, pipeline.Name) } fullName := fmt.Sprintf(fmtPipelineStackName, o.appName, o.name) for _, pipeline := range allPipelines { if strings.EqualFold(pipeline, o.name) || strings.EqualFold(pipeline, fullName) { log.Warningf(`You already have a pipeline named '%s'. To deploy the existing pipeline, run %s. To recreate the pipeline, run %s, optionally delete your pipeline.yml/manifest.yml and/or buildspec.yml file(s), then run %s. If you have manually deleted your pipeline.yml/manifest.yml and/or buildspec.yml file(s) for the existing pipeline, Copilot will now generate new default file(s). To create an additional pipeline, run "copilot pipeline init" again, but with a new pipeline name. `, o.name, fmt.Sprintf(`"copilot pipeline deploy --name %s"`, o.name), fmt.Sprintf(`"copilot pipeline delete --name %s"`, o.name), fmt.Sprintf(`"copilot pipeline init --name %s"`, o.name)) return nil } } return nil } func (o *initPipelineOpts) askOrValidatePipelineName() error { if o.name == "" { return o.askPipelineName() } return validatePipelineName(o.name, o.appName) } func (o *initPipelineOpts) askOrValidateURL() error { if o.repoURL == "" { return o.selectURL() } return o.validateURL(o.repoURL) } func (o *initPipelineOpts) askPipelineName() error { promptOpts := []prompt.PromptConfig{ prompt.WithFinalMessage("Pipeline name:"), } // Only show suggestion if [repo]-[branch] is a valid pipeline name. suggestion := strings.ToLower(fmt.Sprintf("%s-%s", o.repoName, o.repoBranch)) if err := validatePipelineName(suggestion, o.appName); err == nil { promptOpts = append(promptOpts, prompt.WithDefaultInput(suggestion)) } name, err := o.prompt.Get(fmt.Sprintf(fmtPipelineInitNamePrompt, color.Emphasize("name")), pipelineInitNameHelpPrompt, func(val interface{}) error { return validatePipelineName(val, o.appName) }, promptOpts...) if err != nil { return fmt.Errorf("get pipeline name: %w", err) } o.name = name return nil } func (o *initPipelineOpts) askOrValidatePipelineType() error { if o.pipelineType != "" { for _, typ := range pipelineTypes { if o.pipelineType == typ { return nil } } return fmt.Errorf("invalid pipeline type %q; must be one of %s", o.pipelineType, english.WordSeries(applyAll(pipelineTypes, strconv.Quote), "or")) } typ, err := o.prompt.SelectOption("What type of continuous delivery pipeline is this?", "A pipeline can be set up to deploy either your workloads or your environments", []prompt.Option{ { Value: pipelineTypeWorkloads, Hint: "Deploy the services or jobs in your workspace", }, { Value: pipelineTypeEnvironments, Hint: "Deploy the environments in your workspace", }, }) if err != nil { return fmt.Errorf("prompt for pipeline type: %w", err) } o.pipelineType = typ return nil } func (o *initPipelineOpts) validateURL(url string) error { // Note: no longer calling `validateDomainName` because if users use git-remote-codecommit // (the HTTPS (GRC) protocol) to connect to CodeCommit, the url does not have any periods. if !strings.Contains(url, githubURL) && !strings.Contains(url, ccIdentifier) && !strings.Contains(url, bbURL) { return fmt.Errorf(fmtErrInvalidPipelineProvider, url, english.WordSeries(manifest.PipelineProviders, "or")) } return nil } // To avoid duplicating calls to GetEnvironment, validate and get config in the same step. func (o *initPipelineOpts) validateEnvs() error { var envConfigs []*config.Environment for _, env := range o.environments { config, err := o.store.GetEnvironment(o.appName, env) if err != nil { return fmt.Errorf("validate environment %s: %w", env, err) } envConfigs = append(envConfigs, config) } o.envConfigs = envConfigs return nil } func (o *initPipelineOpts) askEnvs() error { envs, err := o.sel.Environments(pipelineSelectEnvPrompt, pipelineSelectEnvHelpPrompt, o.appName, func(order int) prompt.PromptConfig { return prompt.WithFinalMessage(fmt.Sprintf("%s stage:", humanize.Ordinal(order))) }) if err != nil { return fmt.Errorf("select environments: %w", err) } o.environments = envs return nil } func (o *initPipelineOpts) parseRepoDetails() error { switch { case strings.Contains(o.repoURL, githubURL): return o.parseGitHubRepoDetails() case strings.Contains(o.repoURL, ccIdentifier): return o.parseCodeCommitRepoDetails() case strings.Contains(o.repoURL, bbURL): return o.parseBitbucketRepoDetails() default: return fmt.Errorf(fmtErrInvalidPipelineProvider, o.repoURL, english.WordSeries(manifest.PipelineProviders, "or")) } } // getBranch fetches the user's current branch as a best-guess of which branch they want their pipeline to follow. If err, insert default branch name. func (o *initPipelineOpts) getBranch() { // Fetches local git branch. err := o.runner.Run("git", []string{"rev-parse", "--abbrev-ref", "HEAD"}, exec.Stdout(&o.buffer)) o.repoBranch = strings.TrimSpace(o.buffer.String()) if err != nil { o.repoBranch = defaultBranch } if strings.TrimSpace(o.buffer.String()) == "" { o.repoBranch = defaultBranch } o.buffer.Reset() log.Infof(`Your pipeline will follow branch '%s'. `, color.HighlightUserInput(o.repoBranch)) } func (o *initPipelineOpts) parseGitHubRepoDetails() error { // If the user uses a flag to specify a GitHub access token, // GitHub version 1 (not CSC) is the provider. o.provider = manifest.GithubProviderName if o.githubAccessToken != "" { o.provider = manifest.GithubV1ProviderName } repoDetails, err := ghRepoURL(o.repoURL).parse() if err != nil { return err } o.repoName = repoDetails.name o.repoOwner = repoDetails.owner return nil } func (o *initPipelineOpts) parseCodeCommitRepoDetails() error { o.provider = manifest.CodeCommitProviderName repoDetails, err := ccRepoURL(o.repoURL).parse() if err != nil { return err } o.repoName = repoDetails.name o.ccRegion = repoDetails.region // If the CodeCommit region is different than that of the app, pipeline init errors out. sess, err := o.sessProvider.Default() if err != nil { return fmt.Errorf("retrieve default session: %w", err) } region := aws.StringValue(sess.Config.Region) if o.ccRegion == "" { o.ccRegion = region } if o.ccRegion != region { return fmt.Errorf("repository %s is in %s, but app %s is in %s; they must be in the same region", o.repoName, o.ccRegion, o.appName, region) } return nil } func (o *initPipelineOpts) parseBitbucketRepoDetails() error { o.provider = manifest.BitbucketProviderName repoDetails, err := bbRepoURL(o.repoURL).parse() if err != nil { return err } o.repoName = repoDetails.name o.repoOwner = repoDetails.owner return nil } func (o *initPipelineOpts) selectURL() error { // Fetches and parses all remote repositories. err := o.runner.Run("git", []string{"remote", "-v"}, exec.Stdout(&o.buffer)) if err != nil { return fmt.Errorf("get remote repository info: %w; make sure you have installed Git and are in a Git repository", err) } urls, err := o.parseGitRemoteResult(strings.TrimSpace(o.buffer.String())) if err != nil { return err } o.buffer.Reset() // If there is only one returned URL, set it rather than prompt to select. if len(urls) == 1 { log.Infof(`Only one git remote detected. Your pipeline will follow '%s'. `, color.HighlightUserInput(urls[0])) o.repoURL = urls[0] return nil } // Prompts user to select a repo URL. url, err := o.prompt.SelectOne( pipelineSelectURLPrompt, pipelineSelectURLHelpPrompt, urls, prompt.WithFinalMessage("Repository URL:"), ) if err != nil { return fmt.Errorf("select URL: %w", err) } o.repoURL = url return nil } // examples: // efekarakus [email protected]:efekarakus/grit.git (fetch) // efekarakus https://github.com/karakuse/grit.git (fetch) // origin https://github.com/koke/grit (fetch) // koke git://github.com/koke/grit.git (push) // https https://git-codecommit.us-west-2.amazonaws.com/v1/repos/aws-sample (fetch) // fed codecommit::us-west-2://aws-sample (fetch) // ssh ssh://git-codecommit.us-west-2.amazonaws.com/v1/repos/aws-sample (push) // bbhttps https://[email protected]/huanjani/aws-copilot-sample-service.git (fetch) // bbssh ssh://[email protected]:teamsinspace/documentation-tests.git (fetch) // parseGitRemoteResults returns just the trimmed middle column (url) of the `git remote -v` results, // and skips urls from unsupported sources. func (o *initPipelineOpts) parseGitRemoteResult(s string) ([]string, error) { var urls []string urlSet := make(map[string]bool) items := strings.Split(s, "\n") for _, item := range items { if !strings.Contains(item, githubURL) && !strings.Contains(item, ccIdentifier) && !strings.Contains(item, bbURL) { continue } cols := strings.Split(item, "\t") url := strings.TrimSpace(strings.TrimSuffix(strings.Split(cols[1], " ")[0], ".git")) urlSet[url] = true } for url := range urlSet { urls = append(urls, url) } return urls, nil } type ghRepoURL string type ghRepoDetails struct { name string owner string } type ccRepoURL string type ccRepoDetails struct { name string region string } type bbRepoURL string type bbRepoDetails struct { name string owner string } func (url ghRepoURL) parse() (ghRepoDetails, error) { urlString := string(url) regexPattern := regexp.MustCompile(`.*(github.com)(:|\/)`) parsedURL := strings.TrimPrefix(urlString, regexPattern.FindString(urlString)) parsedURL = strings.TrimSuffix(parsedURL, ".git") ownerRepo := strings.Split(parsedURL, "/") if len(ownerRepo) != 2 { return ghRepoDetails{}, fmt.Errorf("unable to parse the GitHub repository owner and name from %s: please pass the repository URL with the format `--url https://github.com/{owner}/{repositoryName}`", url) } return ghRepoDetails{ name: ownerRepo[1], owner: ownerRepo[0], }, nil } func (url ccRepoURL) parse() (ccRepoDetails, error) { urlString := string(url) var region string // Parse region. switch { case strings.HasPrefix(urlString, "https://") || strings.HasPrefix(urlString, "ssh://"): parsedURL := strings.Split(urlString, ".") region = parsedURL[1] case strings.HasPrefix(urlString, "codecommit::"): parsedURL := strings.Split(urlString, ":") region = parsedURL[2] case strings.HasPrefix(urlString, "codecommit://"): // Use default profile region. default: return ccRepoDetails{}, fmt.Errorf("unknown CodeCommit URL format: %s", url) } if region != "" { // Double-check that parsed results is a valid region. Source: https://www.regextester.com/109163 match, _ := regexp.MatchString(`(us(-gov)?|ap|ca|cn|eu|sa)-(central|(north|south)?(east|west)?)-\d`, region) if !match { return ccRepoDetails{}, fmt.Errorf("unable to parse the AWS region from %s", url) } } // Parse repo name. parsedForRepo := strings.Split(urlString, "/") if len(parsedForRepo) < 2 { return ccRepoDetails{}, fmt.Errorf("unable to parse the CodeCommit repository name from %s", url) } repoName := parsedForRepo[len(parsedForRepo)-1] return ccRepoDetails{ name: repoName, region: region, }, nil } // Bitbucket URLs, post-parseGitRemoteResults(), may look like: // https://[email protected]/teamsinspace/documentation-tests // ssh://[email protected]:teamsinspace/documentation-tests func (url bbRepoURL) parse() (bbRepoDetails, error) { urlString := string(url) splitURL := strings.Split(urlString, "/") if len(splitURL) < 2 { return bbRepoDetails{}, fmt.Errorf("unable to parse the Bitbucket repository name from %s", url) } repoName := splitURL[len(splitURL)-1] // rather than check for the SSH prefix, split on colon here; HTTPS version will be unaffected. splitRepoOwner := strings.Split(splitURL[len(splitURL)-2], ":") repoOwner := splitRepoOwner[len(splitRepoOwner)-1] return bbRepoDetails{ name: repoName, owner: repoOwner, }, nil } func (o *initPipelineOpts) storeGitHubAccessToken() error { secretName := o.secretName() _, err := o.secretsmanager.CreateSecret(secretName, o.githubAccessToken) if err != nil { var existsErr *secretsmanager.ErrSecretAlreadyExists if !errors.As(err, &existsErr) { return err } log.Successf("Secret already exists for %s! Do nothing.\n", color.HighlightUserInput(o.repoName)) } else { log.Successf("Created the secret %s for pipeline source stage!\n", color.HighlightUserInput(secretName)) } o.secret = secretName return nil } func (o *initPipelineOpts) createPipelineManifest(stages []manifest.PipelineStage) error { provider, err := o.pipelineProvider() if err != nil { return err } manifest, err := manifest.NewPipeline(o.name, provider, stages) if err != nil { return fmt.Errorf("generate a pipeline manifest: %w", err) } var manifestExists bool o.manifestPath, err = o.workspace.WritePipelineManifest(manifest, o.name) if err != nil { e, ok := err.(*workspace.ErrFileExists) if !ok { return fmt.Errorf("write pipeline manifest to workspace: %w", err) } manifestExists = true o.manifestPath = e.FileName } mftPath := displayPath(o.manifestPath) o.manifestPath, err = o.workspace.Rel(o.manifestPath) if err != nil { return err } if manifestExists { log.Infof(`Pipeline manifest file for %s already exists at %s, skipping writing it. Previously set repository URL, branch, and environment stages will remain. `, color.HighlightUserInput(o.repoName), color.HighlightResource(mftPath)) } else { log.Successf("Wrote the pipeline manifest for %s at '%s'\n", color.HighlightUserInput(o.repoName), color.HighlightResource(mftPath)) } log.Debug(`The manifest contains configurations for your pipeline. Update the file to add stages, change the tracked branch, add test commands or manual approval actions. `) return nil } func (o *initPipelineOpts) createBuildspec(buildSpecTemplatePath string) error { artifactBuckets, err := o.artifactBuckets() if err != nil { return err } content, err := o.parser.Parse(buildSpecTemplatePath, struct { BinaryS3BucketPath string Version string ManifestPath string ArtifactBuckets []artifactBucket }{ BinaryS3BucketPath: binaryS3BucketPath, Version: version.Version, ManifestPath: filepath.ToSlash(o.manifestPath), // The manifest path must be rendered in the buildspec with '/' instead of os-specific separator. ArtifactBuckets: artifactBuckets, }) if err != nil { return err } buildspecPath, err := o.workspace.WritePipelineBuildspec(content, o.name) var buildspecExists bool if err != nil { e, ok := err.(*workspace.ErrFileExists) if !ok { return fmt.Errorf("write buildspec to workspace: %w", err) } buildspecExists = true buildspecPath = e.FileName } buildspecPath = displayPath(buildspecPath) if buildspecExists { log.Infof(`Buildspec file for pipeline already exists at %s, skipping writing it. Previously set config will remain. `, color.HighlightResource(buildspecPath)) return nil } log.Successf("Wrote the buildspec for the pipeline's build stage at '%s'\n", color.HighlightResource(buildspecPath)) return nil } func (o *initPipelineOpts) secretName() string { return fmt.Sprintf(fmtSecretName, o.appName, o.repoName) } func (o *initPipelineOpts) pipelineProvider() (manifest.Provider, error) { var config interface{} switch o.provider { case manifest.GithubV1ProviderName: config = &manifest.GitHubV1Properties{ RepositoryURL: fmt.Sprintf(fmtGHRepoURL, githubURL, o.repoOwner, o.repoName), Branch: o.repoBranch, GithubSecretIdKeyName: o.secret, } case manifest.GithubProviderName: config = &manifest.GitHubProperties{ RepositoryURL: fmt.Sprintf(fmtGHRepoURL, githubURL, o.repoOwner, o.repoName), Branch: o.repoBranch, } case manifest.CodeCommitProviderName: config = &manifest.CodeCommitProperties{ RepositoryURL: fmt.Sprintf(fmtCCRepoURL, o.ccRegion, awsURL, o.repoName), Branch: o.repoBranch, } case manifest.BitbucketProviderName: config = &manifest.BitbucketProperties{ RepositoryURL: fmt.Sprintf(fmtBBRepoURL, bbURL, o.repoOwner, o.repoName), Branch: o.repoBranch, } default: return nil, fmt.Errorf("unable to create pipeline source provider for %s", o.repoName) } return manifest.NewProvider(config) } func (o *initPipelineOpts) artifactBuckets() ([]artifactBucket, error) { app, err := o.store.GetApplication(o.appName) if err != nil { return nil, fmt.Errorf("get application %s: %w", o.appName, err) } regionalResources, err := o.cfnClient.GetRegionalAppResources(app) if err != nil { return nil, fmt.Errorf("get regional application resources: %w", err) } var buckets []artifactBucket for _, resource := range regionalResources { var envNames []string for _, env := range o.envConfigs { if env.Region == resource.Region { envNames = append(envNames, env.Name) } } bucket := artifactBucket{ BucketName: resource.S3Bucket, Region: resource.Region, Environments: envNames, } buckets = append(buckets, bucket) } return buckets, nil } // buildPipelineInitCmd build the command for creating a new pipeline. func buildPipelineInitCmd() *cobra.Command { vars := initPipelineVars{} cmd := &cobra.Command{ Use: "init", Short: "Creates a pipeline for the services in your workspace.", Long: `Creates a pipeline for the services in your workspace, using the environments associated with the application.`, Example: ` Create a pipeline for the services in your workspace. /code $ copilot pipeline init \ /code --name frontend-main \ /code --url https://github.com/gitHubUserName/frontend.git \ /code --git-branch main \ /code --environments "stage,prod"`, RunE: runCmdE(func(cmd *cobra.Command, args []string) error { opts, err := newInitPipelineOpts(vars) if err != nil { return err } if err := opts.Validate(); err != nil { return err } if err := opts.Ask(); err != nil { return err } if err := opts.Execute(); err != nil { return err } log.Infoln() log.Infoln("Required follow-up actions:") for _, followup := range opts.RequiredActions() { log.Infof("- %s\n", followup) } return nil }), } cmd.Flags().StringVarP(&vars.appName, appFlag, appFlagShort, "", appFlagDescription) cmd.Flags().StringVarP(&vars.name, nameFlag, nameFlagShort, "", pipelineFlagDescription) cmd.Flags().StringVar(&vars.repoURL, githubURLFlag, "", githubURLFlagDescription) _ = cmd.Flags().MarkHidden(githubURLFlag) cmd.Flags().StringVarP(&vars.repoURL, repoURLFlag, repoURLFlagShort, "", repoURLFlagDescription) cmd.Flags().StringVarP(&vars.githubAccessToken, githubAccessTokenFlag, githubAccessTokenFlagShort, "", githubAccessTokenFlagDescription) _ = cmd.Flags().MarkHidden(githubAccessTokenFlag) cmd.Flags().StringVarP(&vars.repoBranch, gitBranchFlag, gitBranchFlagShort, "", gitBranchFlagDescription) cmd.Flags().StringSliceVarP(&vars.environments, envsFlag, envsFlagShort, []string{}, pipelineEnvsFlagDescription) cmd.Flags().StringVarP(&vars.pipelineType, pipelineTypeFlag, pipelineTypeShort, "", pipelineTypeFlagDescription) return cmd }
918
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package cli import ( "bytes" "errors" "fmt" "testing" "github.com/aws/aws-sdk-go/aws" "github.com/aws/aws-sdk-go/aws/session" "github.com/aws/copilot-cli/internal/pkg/aws/secretsmanager" "github.com/aws/copilot-cli/internal/pkg/cli/mocks" "github.com/aws/copilot-cli/internal/pkg/config" "github.com/aws/copilot-cli/internal/pkg/deploy" "github.com/aws/copilot-cli/internal/pkg/deploy/cloudformation/stack" "github.com/aws/copilot-cli/internal/pkg/template" templatemocks "github.com/aws/copilot-cli/internal/pkg/template/mocks" "github.com/aws/copilot-cli/internal/pkg/workspace" "github.com/golang/mock/gomock" "github.com/stretchr/testify/require" ) type pipelineInitMocks struct { workspace *mocks.MockwsPipelineIniter secretsmanager *mocks.MocksecretsManager parser *templatemocks.MockParser runner *mocks.MockexecRunner sessProvider *mocks.MocksessionProvider cfnClient *mocks.MockappResourcesGetter store *mocks.Mockstore prompt *mocks.Mockprompter sel *mocks.MockpipelineEnvSelector pipelineLister *mocks.MockdeployedPipelineLister } func TestInitPipelineOpts_Ask(t *testing.T) { const ( mockAppName = "my-app" wantedName = "mypipe" ) mockError := errors.New("some error") mockApp := &config.Application{ Name: mockAppName, } githubAnotherURL := "[email protected]:goodGoose/bhaOS.git" githubToken := "hunter2" testCases := map[string]struct { inName string inAppName string inWsAppName string inEnvironments []string inRepoURL string inGitHubAccessToken string inGitBranch string inType string setupMocks func(m pipelineInitMocks) buffer bytes.Buffer expectedBranch string expectedError error }{ "empty workspace app name": { inWsAppName: "", expectedError: errNoAppInWorkspace, }, "invalid app name (not in workspace)": { inWsAppName: "diff-app", inAppName: "ghost-app", expectedError: errors.New("cannot specify app ghost-app because the workspace is already registered with app diff-app"), }, "invalid app name": { inWsAppName: "ghost-app", inAppName: "ghost-app", setupMocks: func(m pipelineInitMocks) { m.store.EXPECT().GetApplication("ghost-app").Return(nil, mockError) }, expectedError: fmt.Errorf("get application ghost-app configuration: some error"), }, "returns error when repository URL is not from a supported git provider": { inWsAppName: mockAppName, inRepoURL: "https://gitlab.company.com/group/project.git", setupMocks: func(m pipelineInitMocks) { m.store.EXPECT().GetApplication(mockAppName).Return(mockApp, nil) }, expectedError: errors.New("repository https://gitlab.company.com/group/project.git must be from a supported provider: GitHub, CodeCommit or Bitbucket"), }, "returns error when GitHub repository URL is of unknown format": { inWsAppName: mockAppName, inRepoURL: "thisisnotevenagithub.comrepository", setupMocks: func(m pipelineInitMocks) { m.store.EXPECT().GetApplication(mockAppName).Return(mockApp, nil) }, expectedError: errors.New("unable to parse the GitHub repository owner and name from thisisnotevenagithub.comrepository: please pass the repository URL with the format `--url https://github.com/{owner}/{repositoryName}`"), }, "returns error when CodeCommit repository URL is of unknown format": { inWsAppName: mockAppName, inRepoURL: "git-codecommitus-west-2amazonaws.com", setupMocks: func(m pipelineInitMocks) { m.store.EXPECT().GetApplication(mockAppName).Return(mockApp, nil) }, expectedError: errors.New("unknown CodeCommit URL format: git-codecommitus-west-2amazonaws.com"), }, "returns error when CodeCommit repository contains unknown region": { inWsAppName: mockAppName, inRepoURL: "codecommit::us-mess-2://repo-man", setupMocks: func(m pipelineInitMocks) { m.store.EXPECT().GetApplication(mockAppName).Return(mockApp, nil) }, expectedError: errors.New("unable to parse the AWS region from codecommit::us-mess-2://repo-man"), }, "returns error when CodeCommit repository region does not match pipeline's region": { inWsAppName: mockAppName, inRepoURL: "codecommit::us-west-2://repo-man", setupMocks: func(m pipelineInitMocks) { m.store.EXPECT().GetApplication(mockAppName).Return(mockApp, nil) m.sessProvider.EXPECT().Default().Return(&session.Session{ Config: &aws.Config{ Region: aws.String("us-east-1"), }, }, nil) }, expectedError: errors.New("repository repo-man is in us-west-2, but app my-app is in us-east-1; they must be in the same region"), }, "returns error when Bitbucket repository URL is of unknown format": { inWsAppName: mockAppName, inRepoURL: "bitbucket.org", setupMocks: func(m pipelineInitMocks) { m.store.EXPECT().GetApplication(mockAppName).Return(mockApp, nil) }, expectedError: errors.New("unable to parse the Bitbucket repository name from bitbucket.org"), }, "successfully detects local branch and sets it": { inWsAppName: mockAppName, inRepoURL: "[email protected]:badgoose/goose.git", inEnvironments: []string{"test"}, inName: wantedName, buffer: *bytes.NewBufferString("devBranch"), setupMocks: func(m pipelineInitMocks) { m.store.EXPECT().GetApplication(mockAppName).Return(mockApp, nil) m.prompt.EXPECT().SelectOption(gomock.Any(), gomock.Any(), gomock.Any()).AnyTimes() m.runner.EXPECT().Run(gomock.Any(), gomock.Any(), gomock.Any()).Return(nil) m.store.EXPECT().GetEnvironment("my-app", "test").Return( &config.Environment{ Name: "test", }, nil) m.pipelineLister.EXPECT().ListDeployedPipelines(mockAppName).Return([]deploy.Pipeline{}, nil) m.workspace.EXPECT().ListPipelines().Return([]workspace.PipelineManifest{}, nil) }, expectedBranch: "devBranch", expectedError: nil, }, "sets 'main' as branch name if error fetching it": { inWsAppName: mockAppName, inRepoURL: "[email protected]:badgoose/goose.git", inEnvironments: []string{"test"}, inName: wantedName, setupMocks: func(m pipelineInitMocks) { m.store.EXPECT().GetApplication(mockAppName).Return(mockApp, nil) m.prompt.EXPECT().SelectOption(gomock.Any(), gomock.Any(), gomock.Any()).AnyTimes() m.runner.EXPECT().Run(gomock.Any(), gomock.Any(), gomock.Any()).Return(nil) m.store.EXPECT().GetEnvironment("my-app", "test").Return( &config.Environment{ Name: "test", }, nil) m.pipelineLister.EXPECT().ListDeployedPipelines(mockAppName).Return([]deploy.Pipeline{}, nil) m.workspace.EXPECT().ListPipelines().Return([]workspace.PipelineManifest{}, nil) }, expectedBranch: "main", expectedError: nil, }, "invalid pipeline name": { inWsAppName: mockAppName, inName: "1234", inRepoURL: githubAnotherURL, inGitBranch: "main", setupMocks: func(m pipelineInitMocks) { m.store.EXPECT().GetApplication("my-app").Return(mockApp, nil) }, expectedError: fmt.Errorf("pipeline name 1234 is invalid: %w", errBasicNameRegexNotMatched), }, "returns an error if fail to get pipeline name": { inWsAppName: mockAppName, inRepoURL: githubAnotherURL, inGitBranch: "main", setupMocks: func(m pipelineInitMocks) { m.store.EXPECT().GetApplication(mockAppName).Return(mockApp, nil) m.prompt.EXPECT().Get(gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any()). Return("", errors.New("mock error")) }, expectedError: fmt.Errorf("get pipeline name: mock error"), }, "invalid pipeline type": { inWsAppName: mockAppName, inRepoURL: githubAnotherURL, inGitBranch: "main", inName: "mock-pipeline", inType: "RandomType", setupMocks: func(m pipelineInitMocks) { m.store.EXPECT().GetApplication(mockAppName).Return(mockApp, nil) }, expectedError: errors.New(`invalid pipeline type "RandomType"; must be one of "Workloads" or "Environments"`), }, "returns an error if fail to get pipeline type": { inWsAppName: mockAppName, inRepoURL: githubAnotherURL, inGitBranch: "main", setupMocks: func(m pipelineInitMocks) { m.store.EXPECT().GetApplication(mockAppName).Return(mockApp, nil) m.prompt.EXPECT().Get(gomock.Eq("What would you like to name this pipeline?"), gomock.Any(), gomock.Any(), gomock.Any()). Return(wantedName, nil) m.prompt.EXPECT().SelectOption(gomock.Eq("What type of continuous delivery pipeline is this?"), gomock.Any(), gomock.Any()). Return("", errors.New("mock error")) }, expectedError: fmt.Errorf("prompt for pipeline type: mock error"), }, "prompt for pipeline name": { inWsAppName: mockAppName, inRepoURL: githubAnotherURL, inGitBranch: "main", inEnvironments: []string{"prod"}, setupMocks: func(m pipelineInitMocks) { m.store.EXPECT().GetApplication(mockAppName).Return(mockApp, nil) m.store.EXPECT().GetEnvironment(mockAppName, "prod"). Return(&config.Environment{Name: "prod"}, nil) m.pipelineLister.EXPECT().ListDeployedPipelines(mockAppName).Return([]deploy.Pipeline{}, nil) m.workspace.EXPECT().ListPipelines().Return([]workspace.PipelineManifest{}, nil) m.prompt.EXPECT().Get(gomock.Eq("What would you like to name this pipeline?"), gomock.Any(), gomock.Any(), gomock.Any()). Return(wantedName, nil) m.prompt.EXPECT().SelectOption(gomock.Any(), gomock.Any(), gomock.Any()).AnyTimes() }, }, "passed-in URL to unsupported repo provider": { inWsAppName: mockAppName, inName: wantedName, inRepoURL: "unsupported.org/repositories/repoName", inEnvironments: []string{"test"}, setupMocks: func(m pipelineInitMocks) { m.store.EXPECT().GetApplication(mockAppName).Return(mockApp, nil) m.prompt.EXPECT().SelectOption(gomock.Any(), gomock.Any(), gomock.Any()).AnyTimes() }, expectedError: errors.New("repository unsupported.org/repositories/repoName must be from a supported provider: GitHub, CodeCommit or Bitbucket"), }, "passed-in invalid environments": { inWsAppName: mockAppName, inName: wantedName, inRepoURL: "https://github.com/badGoose/chaOS", inEnvironments: []string{"test", "prod"}, inGitBranch: "main", setupMocks: func(m pipelineInitMocks) { m.store.EXPECT().GetApplication(mockAppName).Return(mockApp, nil) m.prompt.EXPECT().SelectOption(gomock.Any(), gomock.Any(), gomock.Any()).AnyTimes() m.store.EXPECT().GetEnvironment("my-app", "test").Return(nil, mockError) m.pipelineLister.EXPECT().ListDeployedPipelines(mockAppName).Return([]deploy.Pipeline{}, nil) m.workspace.EXPECT().ListPipelines().Return([]workspace.PipelineManifest{}, nil) }, expectedError: errors.New("validate environment test: some error"), }, "success with GH repo with env and repoURL flags": { inWsAppName: mockAppName, inName: wantedName, inEnvironments: []string{"test", "prod"}, inRepoURL: "https://github.com/badGoose/chaOS", inGitBranch: "main", setupMocks: func(m pipelineInitMocks) { m.store.EXPECT().GetApplication(mockAppName).Return(mockApp, nil) m.prompt.EXPECT().SelectOption(gomock.Any(), gomock.Any(), gomock.Any()).AnyTimes() m.store.EXPECT().GetEnvironment("my-app", "test").Return( &config.Environment{ Name: "test", }, nil) m.store.EXPECT().GetEnvironment("my-app", "prod").Return( &config.Environment{ Name: "prod", }, nil) m.pipelineLister.EXPECT().ListDeployedPipelines(mockAppName).Return([]deploy.Pipeline{}, nil) m.workspace.EXPECT().ListPipelines().Return([]workspace.PipelineManifest{}, nil) }, }, "success with CC repo with env and repoURL flags": { inWsAppName: mockAppName, inName: wantedName, inEnvironments: []string{"test", "prod"}, inRepoURL: "https://git-codecommit.us-west-2.amazonaws.com/v1/repos/repo-man", inGitBranch: "main", setupMocks: func(m pipelineInitMocks) { m.store.EXPECT().GetApplication(mockAppName).Return(mockApp, nil) m.sessProvider.EXPECT().Default().Return(&session.Session{ Config: &aws.Config{ Region: aws.String("us-west-2"), }, }, nil) m.prompt.EXPECT().SelectOption(gomock.Any(), gomock.Any(), gomock.Any()).AnyTimes() m.store.EXPECT().GetEnvironment("my-app", "test").Return( &config.Environment{ Name: "test", }, nil) m.store.EXPECT().GetEnvironment("my-app", "prod").Return( &config.Environment{ Name: "prod", }, nil) m.pipelineLister.EXPECT().ListDeployedPipelines(mockAppName).Return([]deploy.Pipeline{}, nil) m.workspace.EXPECT().ListPipelines().Return([]workspace.PipelineManifest{}, nil) }, }, "no flags, prompts for all input, success case for selecting URL": { inWsAppName: mockAppName, inGitHubAccessToken: githubToken, buffer: *bytes.NewBufferString("archer\[email protected]:goodGoose/bhaOS (fetch)\narcher\thttps://github.com/badGoose/chaOS (push)\narcher\tcodecommit::us-west-2://repo-man (fetch)\n"), setupMocks: func(m pipelineInitMocks) { m.store.EXPECT().GetApplication(mockAppName).Return(mockApp, nil) m.runner.EXPECT().Run(gomock.Any(), gomock.Any(), gomock.Any()).Return(nil) m.runner.EXPECT().Run(gomock.Any(), gomock.Any(), gomock.Any()).Return(nil) m.store.EXPECT().GetEnvironment("my-app", "test").Return(&config.Environment{ Name: "test", Region: "us-west-2", }, nil) m.store.EXPECT().GetEnvironment("my-app", "prod").Return(&config.Environment{ Name: "prod", Region: "us-west-2", }, nil) m.prompt.EXPECT().Get(gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any()).Return(wantedName, nil) m.prompt.EXPECT().SelectOption("What type of continuous delivery pipeline is this?", gomock.Any(), gomock.Any()).Return(pipelineTypeEnvironments, nil) m.prompt.EXPECT().SelectOne(pipelineSelectURLPrompt, gomock.Any(), gomock.Any(), gomock.Any()).Return(githubAnotherURL, nil).Times(1) m.pipelineLister.EXPECT().ListDeployedPipelines(mockAppName).Return([]deploy.Pipeline{}, nil) m.workspace.EXPECT().ListPipelines().Return([]workspace.PipelineManifest{}, nil) m.sel.EXPECT().Environments(pipelineSelectEnvPrompt, gomock.Any(), "my-app", gomock.Any()).Return([]string{"test", "prod"}, nil) }, }, "returns error if fail to list environments": { inWsAppName: mockAppName, inName: wantedName, inRepoURL: githubAnotherURL, inGitBranch: "main", setupMocks: func(m pipelineInitMocks) { m.store.EXPECT().GetApplication(mockAppName).Return(mockApp, nil) m.prompt.EXPECT().SelectOption(gomock.Any(), gomock.Any(), gomock.Any()).AnyTimes() m.pipelineLister.EXPECT().ListDeployedPipelines(mockAppName).Return([]deploy.Pipeline{}, nil) m.workspace.EXPECT().ListPipelines().Return(nil, nil) m.sel.EXPECT().Environments(pipelineSelectEnvPrompt, gomock.Any(), "my-app", gomock.Any()).Return(nil, errors.New("some error")) }, expectedError: fmt.Errorf("select environments: some error"), }, "returns error if fail to select URL": { inWsAppName: mockAppName, inName: wantedName, inRepoURL: "", inEnvironments: []string{}, buffer: *bytes.NewBufferString("archer\[email protected]:goodGoose/bhaOS (fetch)\narcher\thttps://github.com/badGoose/chaOS (push)\n"), setupMocks: func(m pipelineInitMocks) { m.store.EXPECT().GetApplication(mockAppName).Return(mockApp, nil) m.runner.EXPECT().Run(gomock.Any(), gomock.Any(), gomock.Any()).Return(nil) m.prompt.EXPECT().SelectOne(pipelineSelectURLPrompt, gomock.Any(), gomock.Any(), gomock.Any()).Return("", mockError).Times(1) }, expectedError: fmt.Errorf("select URL: some error"), }, "returns error if fail to get env config": { inWsAppName: mockAppName, inName: wantedName, inRepoURL: githubAnotherURL, inGitBranch: "main", inEnvironments: []string{}, setupMocks: func(m pipelineInitMocks) { m.store.EXPECT().GetApplication(mockAppName).Return(mockApp, nil) m.prompt.EXPECT().SelectOption(gomock.Any(), gomock.Any(), gomock.Any()).AnyTimes() m.pipelineLister.EXPECT().ListDeployedPipelines(mockAppName).Return([]deploy.Pipeline{}, nil) m.workspace.EXPECT().ListPipelines().Return(nil, nil) m.sel.EXPECT().Environments(pipelineSelectEnvPrompt, gomock.Any(), "my-app", gomock.Any()).Return([]string{"test", "prod"}, nil) m.store.EXPECT().GetEnvironment("my-app", "test").Return(&config.Environment{ Name: "test", Region: "us-west-2", }, nil) m.store.EXPECT().GetEnvironment("my-app", "prod").Return(nil, errors.New("some error")) }, expectedError: fmt.Errorf("validate environment prod: some error"), }, "skip selector prompt if only one repo URL": { inWsAppName: mockAppName, inName: wantedName, inGitBranch: "main", buffer: *bytes.NewBufferString("archer\[email protected]:goodGoose/bhaOS (fetch)\n"), setupMocks: func(m pipelineInitMocks) { m.store.EXPECT().GetApplication(mockAppName).Return(mockApp, nil) m.prompt.EXPECT().SelectOption(gomock.Any(), gomock.Any(), gomock.Any()).AnyTimes() m.runner.EXPECT().Run(gomock.Any(), gomock.Any(), gomock.Any()).Return(nil) m.pipelineLister.EXPECT().ListDeployedPipelines(mockAppName).Return([]deploy.Pipeline{}, nil) m.workspace.EXPECT().ListPipelines().Return(nil, nil) m.sel.EXPECT().Environments(pipelineSelectEnvPrompt, gomock.Any(), "my-app", gomock.Any()).Return([]string{"test", "prod"}, nil) m.store.EXPECT().GetEnvironment("my-app", "test").Return(&config.Environment{ Name: "test", Region: "us-west-2", }, nil) m.store.EXPECT().GetEnvironment("my-app", "prod").Return(&config.Environment{ Name: "prod", Region: "us-west-2", }, nil) }, }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { // GIVEN ctrl := gomock.NewController(t) defer ctrl.Finish() mocks := pipelineInitMocks{ prompt: mocks.NewMockprompter(ctrl), runner: mocks.NewMockexecRunner(ctrl), sessProvider: mocks.NewMocksessionProvider(ctrl), sel: mocks.NewMockpipelineEnvSelector(ctrl), store: mocks.NewMockstore(ctrl), pipelineLister: mocks.NewMockdeployedPipelineLister(ctrl), workspace: mocks.NewMockwsPipelineIniter(ctrl), } if tc.setupMocks != nil { tc.setupMocks(mocks) } opts := &initPipelineOpts{ initPipelineVars: initPipelineVars{ appName: tc.inAppName, name: tc.inName, environments: tc.inEnvironments, repoURL: tc.inRepoURL, githubAccessToken: tc.inGitHubAccessToken, repoBranch: tc.inGitBranch, pipelineType: tc.inType, }, wsAppName: tc.inWsAppName, prompt: mocks.prompt, runner: mocks.runner, sessProvider: mocks.sessProvider, buffer: tc.buffer, sel: mocks.sel, store: mocks.store, pipelineLister: mocks.pipelineLister, workspace: mocks.workspace, } // WHEN err := opts.Ask() // THEN if tc.expectedError != nil { require.EqualError(t, err, tc.expectedError.Error()) } else { require.NoError(t, err) if tc.expectedBranch != "" { require.Equal(t, tc.expectedBranch, opts.repoBranch) } } }) } } func TestInitPipelineOpts_Execute(t *testing.T) { const ( wantedName = "mypipe" wantedManifestFile = "/pipelines/mypipe/manifest.yml" wantedManifestRelPath = "/copilot/pipelines/mypipe/manifest.yml" wantedBuildspecFile = "/pipelines/mypipe/buildspec.yml" wantedBuildspecRelPath = "/copilot/pipelines/mypipe/buildspec.yml" ) buildspecExistsErr := &workspace.ErrFileExists{FileName: wantedBuildspecFile} manifestExistsErr := &workspace.ErrFileExists{FileName: wantedManifestFile} testCases := map[string]struct { inName string inEnvironments []string inEnvConfigs []*config.Environment inGitHubToken string inRepoURL string inBranch string inAppName string inType string setupMocks func(m pipelineInitMocks) buffer bytes.Buffer expectedError error }{ "creates secret and writes manifest and buildspec for GHV1 provider": { inName: wantedName, inType: pipelineTypeWorkloads, inEnvConfigs: []*config.Environment{ { Name: "test", }, }, inGitHubToken: "hunter2", inRepoURL: "[email protected]:badgoose/goose.git", inAppName: "badgoose", setupMocks: func(m pipelineInitMocks) { m.secretsmanager.EXPECT().CreateSecret("github-token-badgoose-goose", "hunter2").Return("some-arn", nil) m.workspace.EXPECT().WritePipelineManifest(gomock.Any(), wantedName).Return(wantedManifestFile, nil) m.workspace.EXPECT().WritePipelineBuildspec(gomock.Any(), wantedName).Return(wantedBuildspecFile, nil) m.workspace.EXPECT().Rel(wantedManifestFile).Return(wantedManifestRelPath, nil) m.parser.EXPECT().Parse(workloadsPipelineBuildspecTemplatePath, gomock.Any()).Return(&template.Content{ Buffer: bytes.NewBufferString("hello"), }, nil) m.store.EXPECT().GetApplication("badgoose").Return(&config.Application{ Name: "badgoose", }, nil) m.cfnClient.EXPECT().GetRegionalAppResources(&config.Application{ Name: "badgoose", }).Return([]*stack.AppRegionalResources{ { Region: "us-west-2", S3Bucket: "gooseBucket", }, }, nil) }, expectedError: nil, }, "writes workloads pipeline manifest and buildspec for GH(v2) provider": { inName: wantedName, inType: pipelineTypeWorkloads, inEnvConfigs: []*config.Environment{ { Name: "test", }, }, inRepoURL: "[email protected]:badgoose/goose.git", inAppName: "badgoose", setupMocks: func(m pipelineInitMocks) { m.workspace.EXPECT().WritePipelineManifest(gomock.Any(), wantedName).Return(wantedManifestFile, nil) m.workspace.EXPECT().WritePipelineBuildspec(gomock.Any(), wantedName).Return(wantedBuildspecFile, nil) m.workspace.EXPECT().Rel(wantedManifestFile).Return(wantedManifestRelPath, nil) m.parser.EXPECT().Parse(workloadsPipelineBuildspecTemplatePath, gomock.Any()).Return(&template.Content{ Buffer: bytes.NewBufferString("hello"), }, nil) m.store.EXPECT().GetApplication("badgoose").Return(&config.Application{ Name: "badgoose", }, nil) m.cfnClient.EXPECT().GetRegionalAppResources(&config.Application{ Name: "badgoose", }).Return([]*stack.AppRegionalResources{ { Region: "us-west-2", S3Bucket: "gooseBucket", }, }, nil) }, expectedError: nil, }, "writes workloads pipeline manifest and buildspec for CC provider": { inName: wantedName, inType: pipelineTypeWorkloads, inEnvConfigs: []*config.Environment{ { Name: "test", }, }, inRepoURL: "https://git-codecommit.us-west-2.amazonaws.com/v1/repos/goose", inAppName: "badgoose", setupMocks: func(m pipelineInitMocks) { m.workspace.EXPECT().WritePipelineManifest(gomock.Any(), wantedName).Return(wantedManifestFile, nil) m.workspace.EXPECT().WritePipelineBuildspec(gomock.Any(), wantedName).Return(wantedBuildspecFile, nil) m.workspace.EXPECT().Rel(wantedManifestFile).Return(wantedManifestRelPath, nil) m.parser.EXPECT().Parse(workloadsPipelineBuildspecTemplatePath, gomock.Any()).Return(&template.Content{ Buffer: bytes.NewBufferString("hello"), }, nil) m.store.EXPECT().GetApplication("badgoose").Return(&config.Application{ Name: "badgoose", }, nil) m.cfnClient.EXPECT().GetRegionalAppResources(&config.Application{ Name: "badgoose", }).Return([]*stack.AppRegionalResources{ { Region: "us-west-2", S3Bucket: "gooseBucket", }, }, nil) m.sessProvider.EXPECT().Default().Return(&session.Session{ Config: &aws.Config{ Region: aws.String("us-west-2"), }, }, nil) }, expectedError: nil, }, "writes workloads pipeline manifest and buildspec for BB provider": { inName: wantedName, inType: pipelineTypeWorkloads, inEnvConfigs: []*config.Environment{ { Name: "test", }, }, inRepoURL: "https://[email protected]/badgoose/goose.git", inAppName: "badgoose", setupMocks: func(m pipelineInitMocks) { m.workspace.EXPECT().WritePipelineManifest(gomock.Any(), wantedName).Return(wantedManifestFile, nil) m.workspace.EXPECT().WritePipelineBuildspec(gomock.Any(), wantedName).Return(wantedBuildspecFile, nil) m.workspace.EXPECT().Rel(wantedManifestFile).Return(wantedManifestRelPath, nil) m.parser.EXPECT().Parse(workloadsPipelineBuildspecTemplatePath, gomock.Any()).Return(&template.Content{ Buffer: bytes.NewBufferString("hello"), }, nil) m.store.EXPECT().GetApplication("badgoose").Return(&config.Application{ Name: "badgoose", }, nil) m.cfnClient.EXPECT().GetRegionalAppResources(&config.Application{ Name: "badgoose", }).Return([]*stack.AppRegionalResources{ { Region: "us-west-2", S3Bucket: "gooseBucket", }, }, nil) }, expectedError: nil, }, "writes environments pipeline manifest for GH(v2) provider": { inName: wantedName, inType: pipelineTypeEnvironments, inEnvConfigs: []*config.Environment{ { Name: "test", }, }, inRepoURL: "[email protected]:badgoose/goose.git", inAppName: "badgoose", setupMocks: func(m pipelineInitMocks) { m.workspace.EXPECT().WritePipelineManifest(gomock.Any(), wantedName).Return(wantedManifestFile, nil) m.workspace.EXPECT().WritePipelineBuildspec(gomock.Any(), wantedName).Return(wantedBuildspecFile, nil) m.workspace.EXPECT().Rel(wantedManifestFile).Return(wantedManifestRelPath, nil) m.parser.EXPECT().Parse(environmentsPipelineBuildspecTemplatePath, gomock.Any()).Return(&template.Content{ Buffer: bytes.NewBufferString("hello"), }, nil) m.store.EXPECT().GetApplication("badgoose").Return(&config.Application{ Name: "badgoose", }, nil) m.cfnClient.EXPECT().GetRegionalAppResources(&config.Application{ Name: "badgoose", }).Return([]*stack.AppRegionalResources{ { Region: "us-west-2", S3Bucket: "gooseBucket", }, }, nil) }, expectedError: nil, }, "does not return an error if secret already exists": { inName: wantedName, inType: pipelineTypeWorkloads, inEnvConfigs: []*config.Environment{ { Name: "test", }, }, inGitHubToken: "hunter2", inRepoURL: "[email protected]:badgoose/goose.git", inAppName: "badgoose", setupMocks: func(m pipelineInitMocks) { existsErr := &secretsmanager.ErrSecretAlreadyExists{} m.secretsmanager.EXPECT().CreateSecret("github-token-badgoose-goose", "hunter2").Return("", existsErr) m.workspace.EXPECT().WritePipelineManifest(gomock.Any(), wantedName).Return(wantedManifestFile, nil) m.workspace.EXPECT().WritePipelineBuildspec(gomock.Any(), wantedName).Return(wantedBuildspecFile, nil) m.workspace.EXPECT().Rel(wantedManifestFile).Return(wantedManifestRelPath, nil) m.parser.EXPECT().Parse(workloadsPipelineBuildspecTemplatePath, gomock.Any()).Return(&template.Content{ Buffer: bytes.NewBufferString("hello"), }, nil) m.store.EXPECT().GetApplication("badgoose").Return(&config.Application{ Name: "badgoose", }, nil) m.cfnClient.EXPECT().GetRegionalAppResources(&config.Application{ Name: "badgoose", }).Return([]*stack.AppRegionalResources{ { Region: "us-west-2", S3Bucket: "gooseBucket", }, }, nil) }, expectedError: nil, }, "returns an error if can't write manifest": { inName: wantedName, inType: pipelineTypeWorkloads, inEnvConfigs: []*config.Environment{ { Name: "test", }, }, inGitHubToken: "hunter2", inRepoURL: "[email protected]:badgoose/goose.git", inAppName: "badgoose", setupMocks: func(m pipelineInitMocks) { m.secretsmanager.EXPECT().CreateSecret("github-token-badgoose-goose", "hunter2").Return("some-arn", nil) m.workspace.EXPECT().WritePipelineManifest(gomock.Any(), wantedName).Return("", errors.New("some error")) }, expectedError: errors.New("write pipeline manifest to workspace: some error"), }, "returns an error if application cannot be retrieved": { inName: wantedName, inType: pipelineTypeWorkloads, inEnvConfigs: []*config.Environment{ { Name: "test", }, }, inGitHubToken: "hunter2", inRepoURL: "[email protected]:badgoose/goose.git", inAppName: "badgoose", setupMocks: func(m pipelineInitMocks) { m.secretsmanager.EXPECT().CreateSecret("github-token-badgoose-goose", "hunter2").Return("some-arn", nil) m.workspace.EXPECT().WritePipelineManifest(gomock.Any(), wantedName).Return(wantedManifestFile, nil) m.workspace.EXPECT().Rel(wantedManifestFile).Return(wantedManifestRelPath, nil) m.store.EXPECT().GetApplication("badgoose").Return(nil, errors.New("some error")) }, expectedError: errors.New("get application badgoose: some error"), }, "returns an error if can't get regional application resources": { inName: wantedName, inType: pipelineTypeWorkloads, inEnvConfigs: []*config.Environment{ { Name: "test", }, }, inGitHubToken: "hunter2", inRepoURL: "[email protected]:badgoose/goose.git", inAppName: "badgoose", setupMocks: func(m pipelineInitMocks) { m.secretsmanager.EXPECT().CreateSecret("github-token-badgoose-goose", "hunter2").Return("some-arn", nil) m.workspace.EXPECT().WritePipelineManifest(gomock.Any(), wantedName).Return(wantedManifestFile, nil) m.workspace.EXPECT().Rel(wantedManifestFile).Return(wantedManifestRelPath, nil) m.store.EXPECT().GetApplication("badgoose").Return(&config.Application{ Name: "badgoose", }, nil) m.cfnClient.EXPECT().GetRegionalAppResources(&config.Application{ Name: "badgoose", }).Return(nil, errors.New("some error")) }, expectedError: fmt.Errorf("get regional application resources: some error"), }, "returns an error if buildspec cannot be parsed": { inName: wantedName, inType: pipelineTypeWorkloads, inEnvConfigs: []*config.Environment{ { Name: "test", }, }, inGitHubToken: "hunter2", inRepoURL: "[email protected]:badgoose/goose.git", inAppName: "badgoose", setupMocks: func(m pipelineInitMocks) { m.secretsmanager.EXPECT().CreateSecret("github-token-badgoose-goose", "hunter2").Return("some-arn", nil) m.workspace.EXPECT().WritePipelineManifest(gomock.Any(), wantedName).Return(wantedManifestFile, nil) m.workspace.EXPECT().WritePipelineBuildspec(gomock.Any(), wantedName).Times(0) m.workspace.EXPECT().Rel(wantedManifestFile).Return(wantedManifestRelPath, nil) m.parser.EXPECT().Parse(workloadsPipelineBuildspecTemplatePath, gomock.Any()).Return(nil, errors.New("some error")) m.store.EXPECT().GetApplication("badgoose").Return(&config.Application{ Name: "badgoose", }, nil) m.cfnClient.EXPECT().GetRegionalAppResources(&config.Application{ Name: "badgoose", }).Return([]*stack.AppRegionalResources{ { Region: "us-west-2", S3Bucket: "gooseBucket", }, }, nil) }, expectedError: errors.New("some error"), }, "does not return an error if buildspec and manifest already exists": { inName: wantedName, inType: pipelineTypeWorkloads, inEnvConfigs: []*config.Environment{ { Name: "test", }, }, inGitHubToken: "hunter2", inRepoURL: "[email protected]:badgoose/goose.git", inAppName: "badgoose", setupMocks: func(m pipelineInitMocks) { m.secretsmanager.EXPECT().CreateSecret("github-token-badgoose-goose", "hunter2").Return("some-arn", nil) m.workspace.EXPECT().WritePipelineManifest(gomock.Any(), wantedName).Return("", manifestExistsErr) m.workspace.EXPECT().WritePipelineBuildspec(gomock.Any(), wantedName).Return("", buildspecExistsErr) m.workspace.EXPECT().Rel(wantedManifestFile).Return(wantedManifestRelPath, nil) m.parser.EXPECT().Parse(workloadsPipelineBuildspecTemplatePath, gomock.Any()).Return(&template.Content{ Buffer: bytes.NewBufferString("hello"), }, nil) m.store.EXPECT().GetApplication("badgoose").Return(&config.Application{ Name: "badgoose", }, nil) m.cfnClient.EXPECT().GetRegionalAppResources(&config.Application{ Name: "badgoose", }).Return([]*stack.AppRegionalResources{ { Region: "us-west-2", S3Bucket: "gooseBucket", }, }, nil) }, expectedError: nil, }, "returns an error if can't write buildspec": { inName: wantedName, inType: pipelineTypeWorkloads, inEnvConfigs: []*config.Environment{ { Name: "test", }, }, inGitHubToken: "hunter2", inRepoURL: "[email protected]:badgoose/goose.git", inAppName: "badgoose", setupMocks: func(m pipelineInitMocks) { m.secretsmanager.EXPECT().CreateSecret("github-token-badgoose-goose", "hunter2").Return("some-arn", nil) m.workspace.EXPECT().WritePipelineManifest(gomock.Any(), wantedName).Return(wantedManifestFile, nil) m.workspace.EXPECT().Rel(wantedManifestFile).Return(wantedManifestRelPath, nil) m.workspace.EXPECT().WritePipelineBuildspec(gomock.Any(), wantedName).Return("", errors.New("some error")) m.parser.EXPECT().Parse(workloadsPipelineBuildspecTemplatePath, gomock.Any()).Return(&template.Content{ Buffer: bytes.NewBufferString("hello"), }, nil) m.store.EXPECT().GetApplication("badgoose").Return(&config.Application{ Name: "badgoose", }, nil) m.cfnClient.EXPECT().GetRegionalAppResources(&config.Application{ Name: "badgoose", }).Return([]*stack.AppRegionalResources{ { Region: "us-west-2", S3Bucket: "gooseBucket", }, }, nil) }, expectedError: fmt.Errorf("write buildspec to workspace: some error"), }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { // GIVEN ctrl := gomock.NewController(t) defer ctrl.Finish() mocks := pipelineInitMocks{ workspace: mocks.NewMockwsPipelineIniter(ctrl), secretsmanager: mocks.NewMocksecretsManager(ctrl), parser: templatemocks.NewMockParser(ctrl), sessProvider: mocks.NewMocksessionProvider(ctrl), cfnClient: mocks.NewMockappResourcesGetter(ctrl), store: mocks.NewMockstore(ctrl), } if tc.setupMocks != nil { tc.setupMocks(mocks) } opts := &initPipelineOpts{ initPipelineVars: initPipelineVars{ name: tc.inName, githubAccessToken: tc.inGitHubToken, appName: tc.inAppName, repoBranch: tc.inBranch, repoURL: tc.inRepoURL, pipelineType: tc.inType, }, workspace: mocks.workspace, secretsmanager: mocks.secretsmanager, parser: mocks.parser, sessProvider: mocks.sessProvider, store: mocks.store, cfnClient: mocks.cfnClient, buffer: tc.buffer, envConfigs: tc.inEnvConfigs, } // WHEN require.NoError(t, opts.parseRepoDetails()) err := opts.Execute() // THEN if tc.expectedError != nil { require.EqualError(t, err, tc.expectedError.Error()) } else { require.NoError(t, err) } }) } } func TestInitPipelineOpts_parseGitRemoteResult(t *testing.T) { testCases := map[string]struct { inRemoteResult string expectedURLs []string expectedError error }{ "matched format": { inRemoteResult: `badgoose [email protected]:badgoose/grit.git (fetch) badgoose https://github.com/badgoose/cli.git (fetch) origin https://github.com/koke/grit (fetch) koke git://github.com/koke/grit.git (push) https https://git-codecommit.us-west-2.amazonaws.com/v1/repos/aws-sample (fetch) fed codecommit::us-west-2://aws-sample (fetch) ssh ssh://git-codecommit.us-west-2.amazonaws.com/v1/repos/aws-sample (push) bb https://[email protected]/huanjani/aws-copilot-sample-service.git (push)`, expectedURLs: []string{"[email protected]:badgoose/grit", "https://github.com/badgoose/cli", "https://github.com/koke/grit", "git://github.com/koke/grit", "https://git-codecommit.us-west-2.amazonaws.com/v1/repos/aws-sample", "codecommit::us-west-2://aws-sample", "ssh://git-codecommit.us-west-2.amazonaws.com/v1/repos/aws-sample", "https://[email protected]/huanjani/aws-copilot-sample-service"}, }, "don't add to URL list if it is not a GitHub or CodeCommit or Bitbucket URL": { inRemoteResult: `badgoose [email protected]/whatever (fetch)`, expectedURLs: []string{}, }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { // GIVEN opts := &initPipelineOpts{} // WHEN urls, err := opts.parseGitRemoteResult(tc.inRemoteResult) // THEN if tc.expectedError != nil { require.EqualError(t, err, tc.expectedError.Error()) } else { require.ElementsMatch(t, tc.expectedURLs, urls) } }) } } func TestInitPipelineGHRepoURL_parse(t *testing.T) { testCases := map[string]struct { inRepoURL ghRepoURL expectedDetails ghRepoDetails expectedError error }{ "successfully parses name without .git suffix": { inRepoURL: "https://github.com/badgoose/cli", expectedDetails: ghRepoDetails{ name: "cli", owner: "badgoose", }, }, "successfully parses repo name with .git suffix": { inRepoURL: "https://github.com/koke/grit.git", expectedDetails: ghRepoDetails{ name: "grit", owner: "koke", }, }, "returns an error if it is not a github URL": { inRepoURL: "https://git-codecommit.us-east-1.amazonaws.com/v1/repos/whatever", expectedError: fmt.Errorf("unable to parse the GitHub repository owner and name from https://git-codecommit.us-east-1.amazonaws.com/v1/repos/whatever: please pass the repository URL with the format `--url https://github.com/{owner}/{repositoryName}`"), }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { // WHEN details, err := ghRepoURL.parse(tc.inRepoURL) // THEN if tc.expectedError != nil { require.EqualError(t, err, tc.expectedError.Error()) } else { require.Equal(t, tc.expectedDetails, details) } }) } } func TestInitPipelineCCRepoURL_parse(t *testing.T) { testCases := map[string]struct { inRepoURL ccRepoURL expectedDetails ccRepoDetails expectedError error }{ "successfully parses https url": { inRepoURL: "https://git-codecommit.sa-east-1.amazonaws.com/v1/repos/aws-sample", expectedDetails: ccRepoDetails{ name: "aws-sample", region: "sa-east-1", }, }, "successfully parses ssh url": { inRepoURL: "ssh://git-codecommit.us-east-2.amazonaws.com/v1/repos/aws-sample", expectedDetails: ccRepoDetails{ name: "aws-sample", region: "us-east-2", }, }, "successfully parses federated (GRC) url": { inRepoURL: "codecommit::us-gov-west-1://aws-sample", expectedDetails: ccRepoDetails{ name: "aws-sample", region: "us-gov-west-1", }, }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { // WHEN details, err := ccRepoURL.parse(tc.inRepoURL) // THEN if tc.expectedError != nil { require.EqualError(t, err, tc.expectedError.Error()) } else { require.Equal(t, tc.expectedDetails, details) } }) } } func TestInitPipelineBBRepoURL_parse(t *testing.T) { testCases := map[string]struct { inRepoURL bbRepoURL expectedDetails bbRepoDetails expectedError error }{ "successfully parses https url": { inRepoURL: "https://[email protected]/huanjani/aws-copilot-sample-service", expectedDetails: bbRepoDetails{ name: "aws-copilot-sample-service", owner: "huanjani", }, }, "successfully parses ssh url": { inRepoURL: "ssh://[email protected]:huanjani/aws-copilot-sample-service", expectedDetails: bbRepoDetails{ name: "aws-copilot-sample-service", owner: "huanjani", }, }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { // WHEN details, err := bbRepoURL.parse(tc.inRepoURL) // THEN if tc.expectedError != nil { require.EqualError(t, err, tc.expectedError.Error()) } else { require.Equal(t, tc.expectedDetails, details) } }) } }
1,077
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package cli import ( "context" "encoding/json" "fmt" "io" "os" "sort" "sync" "time" "github.com/aws/aws-sdk-go/aws" "github.com/aws/aws-sdk-go/service/ssm" "github.com/aws/copilot-cli/internal/pkg/aws/identity" rg "github.com/aws/copilot-cli/internal/pkg/aws/resourcegroups" "github.com/aws/copilot-cli/internal/pkg/deploy" "github.com/aws/copilot-cli/internal/pkg/describe" "github.com/aws/copilot-cli/internal/pkg/workspace" "github.com/spf13/afero" "golang.org/x/sync/errgroup" "github.com/aws/copilot-cli/internal/pkg/aws/sessions" "github.com/aws/copilot-cli/internal/pkg/config" "github.com/aws/copilot-cli/internal/pkg/term/prompt" "github.com/aws/copilot-cli/internal/pkg/term/selector" "github.com/spf13/cobra" ) const ( pipelineListAppNamePrompt = "Which application are the pipelines in?" pipelineListAppNameHelper = "An application is a collection of related services." pipelineListTimeout = 10 * time.Second ) type listPipelineVars struct { appName string shouldOutputJSON bool shouldShowLocalPipelines bool } type listPipelineOpts struct { listPipelineVars prompt prompter sel configSelector store store w io.Writer workspace wsPipelineGetter pipelineLister deployedPipelineLister newDescriber newPipelineDescriberFunc wsAppName string } type newPipelineDescriberFunc func(pipeline deploy.Pipeline) (describer, error) func newListPipelinesOpts(vars listPipelineVars) (*listPipelineOpts, error) { ws, err := workspace.Use(afero.NewOsFs()) if err != nil { return nil, err } defaultSession, err := sessions.ImmutableProvider(sessions.UserAgentExtras("pipeline ls")).Default() if err != nil { return nil, fmt.Errorf("default session: %w", err) } var wsAppName string if vars.shouldShowLocalPipelines { wsAppName = tryReadingAppName() } store := config.NewSSMStore(identity.New(defaultSession), ssm.New(defaultSession), aws.StringValue(defaultSession.Config.Region)) prompter := prompt.New() return &listPipelineOpts{ listPipelineVars: vars, pipelineLister: deploy.NewPipelineStore(rg.New(defaultSession)), prompt: prompter, sel: selector.NewConfigSelector(prompter, store), store: store, w: os.Stdout, workspace: ws, newDescriber: func(pipeline deploy.Pipeline) (describer, error) { return describe.NewPipelineDescriber(pipeline, false) }, wsAppName: wsAppName, }, nil } // Ask asks for and validates fields that are required but not passed in. func (o *listPipelineOpts) Ask() error { if o.shouldShowLocalPipelines { return validateWorkspaceApp(o.wsAppName, o.appName, o.store) } if o.appName != "" { if _, err := o.store.GetApplication(o.appName); err != nil { return fmt.Errorf("validate application: %w", err) } } else { app, err := o.sel.Application(pipelineListAppNamePrompt, pipelineListAppNameHelper) if err != nil { return fmt.Errorf("select application: %w", err) } o.appName = app } return nil } // Execute writes the pipelines. func (o *listPipelineOpts) Execute() error { ctx, cancel := context.WithTimeout(context.Background(), pipelineListTimeout) defer cancel() switch { case o.shouldShowLocalPipelines && o.shouldOutputJSON: return o.jsonOutputLocal(ctx) case o.shouldShowLocalPipelines: return o.humanOutputLocal() case o.shouldOutputJSON: return o.jsonOutputDeployed(ctx) } return o.humanOutputDeployed() } // jsonOutputLocal prints data about all pipelines in the current workspace. // If a local pipeline has been deployed, data from codepipeline is included. func (o *listPipelineOpts) jsonOutputLocal(ctx context.Context) error { local, err := o.workspace.ListPipelines() if err != nil { return err } deployed, err := getDeployedPipelines(ctx, o.appName, o.pipelineLister, o.newDescriber) if err != nil { return err } cp := make(map[string]*describe.Pipeline) for _, pipeline := range deployed { cp[pipeline.Name] = pipeline } type info struct { Name string `json:"name"` ManifestPath string `json:"manifestPath"` PipelineName string `json:"pipelineName,omitempty"` } var out struct { Pipelines []info `json:"pipelines"` } for _, pipeline := range local { i := info{ Name: pipeline.Name, ManifestPath: pipeline.Path, } if v, ok := cp[pipeline.Name]; ok { i.PipelineName = v.Pipeline.Name } out.Pipelines = append(out.Pipelines, i) } b, err := json.Marshal(out) if err != nil { return fmt.Errorf("marshal pipelines: %w", err) } fmt.Fprintf(o.w, "%s\n", b) return nil } // humanOutputLocal prints the name of all pipelines in the current workspace. func (o *listPipelineOpts) humanOutputLocal() error { local, err := o.workspace.ListPipelines() if err != nil { return err } for _, pipeline := range local { fmt.Fprintln(o.w, pipeline.Name) } return nil } // jsonOutputDeployed prints data about all pipelines in the given app that have been deployed. func (o *listPipelineOpts) jsonOutputDeployed(ctx context.Context) error { pipelines, err := getDeployedPipelines(ctx, o.appName, o.pipelineLister, o.newDescriber) if err != nil { return err } type serializedPipelines struct { Pipelines []*describe.Pipeline `json:"pipelines"` } b, err := json.Marshal(serializedPipelines{Pipelines: pipelines}) if err != nil { return fmt.Errorf("marshal pipelines: %w", err) } fmt.Fprintf(o.w, "%s\n", b) return nil } // humanOutputDeployed prints the name of all pipelines in the given app that have been deployed. func (o *listPipelineOpts) humanOutputDeployed() error { pipelines, err := o.pipelineLister.ListDeployedPipelines(o.appName) if err != nil { return fmt.Errorf("list deployed pipelines: %w", err) } sort.Slice(pipelines, func(i, j int) bool { return pipelines[i].Name < pipelines[j].Name }) for _, p := range pipelines { fmt.Fprintln(o.w, p.Name) } return nil } func getDeployedPipelines(ctx context.Context, app string, lister deployedPipelineLister, newDescriber newPipelineDescriberFunc) ([]*describe.Pipeline, error) { pipelines, err := lister.ListDeployedPipelines(app) if err != nil { return nil, fmt.Errorf("list deployed pipelines: %w", err) } var mux sync.Mutex var res []*describe.Pipeline g, _ := errgroup.WithContext(ctx) for i := range pipelines { pipeline := pipelines[i] g.Go(func() error { d, err := newDescriber(pipeline) if err != nil { return fmt.Errorf("create pipeline describer for %q: %w", pipeline.ResourceName, err) } info, err := d.Describe() if err != nil { return fmt.Errorf("describe pipeline %q: %w", pipeline.ResourceName, err) } p, ok := info.(*describe.Pipeline) if !ok { return fmt.Errorf("unexpected describer for %q: %T", pipeline.ResourceName, info) } mux.Lock() defer mux.Unlock() res = append(res, p) return nil }) } if err := g.Wait(); err != nil { return nil, err } sort.Slice(res, func(i, j int) bool { return res[i].Name < res[j].Name }) return res, nil } // buildPipelineListCmd builds the command for showing a list of all deployed pipelines. func buildPipelineListCmd() *cobra.Command { vars := listPipelineVars{} cmd := &cobra.Command{ Use: "ls", Short: "Lists all the deployed pipelines in an application.", Example: ` Lists all the pipelines for the frontend application. /code $ copilot pipeline ls -a frontend`, RunE: runCmdE(func(cmd *cobra.Command, args []string) error { opts, err := newListPipelinesOpts(vars) if err != nil { return err } if err := opts.Ask(); err != nil { return err } return opts.Execute() }), } cmd.Flags().StringVarP(&vars.appName, appFlag, appFlagShort, tryReadingAppName(), appFlagDescription) cmd.Flags().BoolVar(&vars.shouldOutputJSON, jsonFlag, false, jsonFlagDescription) cmd.Flags().BoolVar(&vars.shouldShowLocalPipelines, localFlag, false, localPipelineFlagDescription) return cmd }
306
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package cli import ( "bytes" "errors" "fmt" "testing" "github.com/aws/copilot-cli/internal/pkg/aws/codepipeline" "github.com/aws/copilot-cli/internal/pkg/cli/mocks" "github.com/aws/copilot-cli/internal/pkg/deploy" "github.com/aws/copilot-cli/internal/pkg/describe" "github.com/aws/copilot-cli/internal/pkg/workspace" "github.com/golang/mock/gomock" "github.com/stretchr/testify/require" ) type pipelineListMocks struct { prompt *mocks.Mockprompter sel *mocks.MockconfigSelector store *mocks.Mockstore workspace *mocks.MockwsPipelineGetter pipelineLister *mocks.MockdeployedPipelineLister describer *mocks.Mockdescriber } func TestPipelineList_Ask(t *testing.T) { testCases := map[string]struct { inputApp string inWsAppName string shouldShowLocalPipelines bool setupMocks func(mocks pipelineListMocks) wantedApp string wantedErr error }{ "success with no flags set": { setupMocks: func(m pipelineListMocks) { m.sel.EXPECT().Application(pipelineListAppNamePrompt, pipelineListAppNameHelper).Return("my-app", nil) }, wantedApp: "my-app", wantedErr: nil, }, "success with app flag set": { inputApp: "my-app", setupMocks: func(m pipelineListMocks) { m.store.EXPECT().GetApplication("my-app").Return(nil, nil) }, wantedApp: "my-app", wantedErr: nil, }, "error if fail to select app": { setupMocks: func(m pipelineListMocks) { m.sel.EXPECT().Application(pipelineListAppNamePrompt, pipelineListAppNameHelper).Return("", errors.New("some error")) }, wantedApp: "my-app", wantedErr: fmt.Errorf("select application: some error"), }, "error if passed-in app doesn't exist": { inputApp: "my-app", setupMocks: func(m pipelineListMocks) { m.store.EXPECT().GetApplication("my-app").Return(nil, errors.New("some error")) }, wantedApp: "", wantedErr: errors.New("validate application: some error"), }, "using workspace successful": { inWsAppName: "my-app", setupMocks: func(m pipelineListMocks) { m.store.EXPECT().GetApplication("my-app").Return(nil, nil) }, shouldShowLocalPipelines: true, }, "--local not in workspace": { inWsAppName: "", shouldShowLocalPipelines: true, wantedErr: errNoAppInWorkspace, }, "--local workspace and app name mismatch": { inWsAppName: "my-app", inputApp: "not-my-app", shouldShowLocalPipelines: true, wantedErr: errors.New("cannot specify app not-my-app because the workspace is already registered with app my-app"), }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { ctrl := gomock.NewController(t) defer ctrl.Finish() mocks := pipelineListMocks{ prompt: mocks.NewMockprompter(ctrl), sel: mocks.NewMockconfigSelector(ctrl), store: mocks.NewMockstore(ctrl), workspace: mocks.NewMockwsPipelineGetter(ctrl), pipelineLister: mocks.NewMockdeployedPipelineLister(ctrl), } if tc.setupMocks != nil { tc.setupMocks(mocks) } opts := &listPipelineOpts{ listPipelineVars: listPipelineVars{ appName: tc.inputApp, shouldShowLocalPipelines: tc.shouldShowLocalPipelines, }, prompt: mocks.prompt, sel: mocks.sel, store: mocks.store, workspace: mocks.workspace, pipelineLister: mocks.pipelineLister, wsAppName: tc.inWsAppName, } err := opts.Ask() if tc.wantedErr != nil { require.EqualError(t, err, tc.wantedErr.Error()) } else { require.NoError(t, err) require.Equal(t, tc.wantedApp, opts.appName, "expected app names to match") } }) } } func TestPipelineList_Execute(t *testing.T) { const ( mockAppName = "coolapp" mockPipelineResourceName = "pipeline-coolapp-my-pipeline-repo-ABCDERANDOMRANDOM" mockPipelineName = "my-pipeline-repo" mockLegacyPipelineResourceName = "bad-goose" mockLegacyPipelineName = "bad-goose" ) mockPipeline := deploy.Pipeline{ AppName: mockAppName, ResourceName: mockPipelineResourceName, Name: mockPipelineName, IsLegacy: false, } mockLegacyPipeline := deploy.Pipeline{ AppName: mockAppName, ResourceName: mockLegacyPipelineResourceName, Name: mockLegacyPipelineName, IsLegacy: true, } mockError := errors.New("mock error") testCases := map[string]struct { shouldOutputJSON bool shouldShowLocalPipelines bool setupMocks func(m pipelineListMocks) expectedContent string expectedErr error }{ "with JSON output": { shouldOutputJSON: true, setupMocks: func(m pipelineListMocks) { m.pipelineLister.EXPECT().ListDeployedPipelines(mockAppName).Return([]deploy.Pipeline{mockPipeline, mockLegacyPipeline}, nil) m.describer.EXPECT().Describe().Return(&describe.Pipeline{ Name: mockLegacyPipelineName, Pipeline: codepipeline.Pipeline{ Name: mockLegacyPipelineResourceName, }, }, nil) m.describer.EXPECT().Describe().Return(&describe.Pipeline{ Name: mockPipelineName, Pipeline: codepipeline.Pipeline{ Name: mockPipelineResourceName, }, }, nil) }, expectedContent: `{"pipelines":[{"name":"bad-goose","pipelineName":"bad-goose","region":"","accountId":"","stages":null,"createdAt":"0001-01-01T00:00:00Z","updatedAt":"0001-01-01T00:00:00Z"},{"name":"my-pipeline-repo","pipelineName":"pipeline-coolapp-my-pipeline-repo-ABCDERANDOMRANDOM","region":"","accountId":"","stages":null,"createdAt":"0001-01-01T00:00:00Z","updatedAt":"0001-01-01T00:00:00Z"}]}` + "\n", }, "with human output": { setupMocks: func(m pipelineListMocks) { m.pipelineLister.EXPECT().ListDeployedPipelines(mockAppName).Return([]deploy.Pipeline{mockPipeline, mockLegacyPipeline}, nil) }, expectedContent: `bad-goose my-pipeline-repo `, }, "with failed call to list pipelines": { shouldOutputJSON: true, setupMocks: func(m pipelineListMocks) { m.pipelineLister.EXPECT().ListDeployedPipelines(mockAppName).Return(nil, mockError) }, expectedErr: fmt.Errorf("list deployed pipelines: mock error"), }, "with failed call to get pipeline info": { shouldOutputJSON: true, setupMocks: func(m pipelineListMocks) { m.pipelineLister.EXPECT().ListDeployedPipelines(mockAppName).Return([]deploy.Pipeline{mockPipeline}, nil) m.describer.EXPECT().Describe().Return(nil, mockError) }, expectedErr: fmt.Errorf(`describe pipeline %q: mock error`, mockPipelineResourceName), }, "ls --local": { shouldShowLocalPipelines: true, setupMocks: func(m pipelineListMocks) { m.workspace.EXPECT().ListPipelines().Return([]workspace.PipelineManifest{{Name: mockLegacyPipeline.Name}, {Name: mockPipeline.Name}}, nil) }, expectedContent: `bad-goose my-pipeline-repo `, }, "ls --local --json with one deployed, one local": { shouldShowLocalPipelines: true, shouldOutputJSON: true, setupMocks: func(m pipelineListMocks) { m.workspace.EXPECT().ListPipelines().Return([]workspace.PipelineManifest{ {Name: mockLegacyPipeline.Name, Path: "/copilot/pipeline.yml"}, {Name: mockPipeline.Name, Path: "/copilot/pipelines/my-pipeline-repo/manifest.yml"}}, nil) m.pipelineLister.EXPECT().ListDeployedPipelines(mockAppName).Return([]deploy.Pipeline{mockPipeline}, nil) m.describer.EXPECT().Describe().Return(&describe.Pipeline{ Name: mockPipelineName, Pipeline: codepipeline.Pipeline{ Name: mockPipelineResourceName, }, }, nil) }, expectedContent: `{"pipelines":[{"name":"bad-goose","manifestPath":"/copilot/pipeline.yml"},{"name":"my-pipeline-repo","manifestPath":"/copilot/pipelines/my-pipeline-repo/manifest.yml","pipelineName":"pipeline-coolapp-my-pipeline-repo-ABCDERANDOMRANDOM"}]}` + "\n", }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { // GIVEN ctrl := gomock.NewController(t) defer ctrl.Finish() mocks := pipelineListMocks{ prompt: mocks.NewMockprompter(ctrl), sel: mocks.NewMockconfigSelector(ctrl), store: mocks.NewMockstore(ctrl), workspace: mocks.NewMockwsPipelineGetter(ctrl), pipelineLister: mocks.NewMockdeployedPipelineLister(ctrl), describer: mocks.NewMockdescriber(ctrl), } if tc.setupMocks != nil { tc.setupMocks(mocks) } b := &bytes.Buffer{} opts := &listPipelineOpts{ listPipelineVars: listPipelineVars{ appName: mockAppName, shouldOutputJSON: tc.shouldOutputJSON, shouldShowLocalPipelines: tc.shouldShowLocalPipelines, }, prompt: mocks.prompt, sel: mocks.sel, store: mocks.store, w: b, workspace: mocks.workspace, pipelineLister: mocks.pipelineLister, newDescriber: func(pipeline deploy.Pipeline) (describer, error) { return mocks.describer, nil }, } // WHEN err := opts.Execute() // THEN if tc.expectedErr != nil { require.EqualError(t, err, tc.expectedErr.Error()) } else { require.Equal(t, tc.expectedContent, b.String()) } }) } }
278
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package cli import ( "bytes" "encoding/json" "fmt" "io" "path/filepath" "github.com/aws/copilot-cli/internal/pkg/cli/list" "github.com/aws/copilot-cli/internal/pkg/config" "github.com/aws/copilot-cli/internal/pkg/deploy" "github.com/aws/copilot-cli/internal/pkg/manifest" ) type packagePipelineVars struct { name string appName string } type packagePipelineOpts struct { packagePipelineVars pipelineDeployer pipelineDeployer tmplWriter io.WriteCloser ws wsPipelineReader codestar codestar store store pipelineStackConfig func(in *deploy.CreatePipelineInput) pipelineStackConfig configureDeployedPipelineLister func() deployedPipelineLister newSvcListCmd func(io.Writer, string) cmd newJobListCmd func(io.Writer, string) cmd //catched variables pipelineMft *manifest.Pipeline app *config.Application svcBuffer *bytes.Buffer jobBuffer *bytes.Buffer } func (o *packagePipelineOpts) Execute() error { pipelines, err := o.ws.ListPipelines() if err != nil { return fmt.Errorf("list all pipelines in the workspace: %w", err) } var pipelinePath string for _, pipeline := range pipelines { if pipeline.Name == o.name { pipelinePath = pipeline.Path break } } if pipelinePath == "" { return fmt.Errorf("pipeline %q not found", o.name) } pipelineMft, err := o.getPipelineMft(pipelinePath) if err != nil { return err } connection, ok := pipelineMft.Source.Properties["connection_name"] if ok { arn, err := o.codestar.GetConnectionARN((connection).(string)) if err != nil { return fmt.Errorf("get connection ARN: %w", err) } pipelineMft.Source.Properties["connection_arn"] = arn } source, _, err := deploy.PipelineSourceFromManifest(pipelineMft.Source) if err != nil { return fmt.Errorf("read source from manifest: %w", err) } relPath, err := o.ws.Rel(pipelinePath) if err != nil { return fmt.Errorf("convert manifest path to relative path: %w", err) } stages, err := o.convertStages(pipelineMft.Stages) if err != nil { return fmt.Errorf("convert environments to deployment stage: %w", err) } appConfig, err := o.store.GetApplication(o.appName) if err != nil { return fmt.Errorf("get application %s configuration: %w", o.appName, err) } o.app = appConfig artifactBuckets, err := o.getArtifactBuckets() if err != nil { return fmt.Errorf("get cross-regional resources: %w", err) } isLegacy, err := o.isLegacy(pipelineMft.Name) if err != nil { return err } var build deploy.Build if err = build.Init(pipelineMft.Build, filepath.Dir(relPath)); err != nil { return err } deployPipelineInput := &deploy.CreatePipelineInput{ AppName: o.appName, Name: o.name, IsLegacy: isLegacy, Source: source, Build: &build, Stages: stages, ArtifactBuckets: artifactBuckets, AdditionalTags: o.app.Tags, PermissionsBoundary: o.app.PermissionsBoundary, } tpl, err := o.pipelineStackConfig(deployPipelineInput).Template() if err != nil { return fmt.Errorf("generate stack template: %w", err) } if _, err := o.tmplWriter.Write([]byte(tpl)); err != nil { return err } o.tmplWriter.Close() return nil } func (o *packagePipelineOpts) getPipelineMft(pipelinePath string) (*manifest.Pipeline, error) { if o.pipelineMft != nil { return o.pipelineMft, nil } pipelineMft, err := o.ws.ReadPipelineManifest(pipelinePath) if err != nil { return nil, fmt.Errorf("read pipeline manifest: %w", err) } if err := pipelineMft.Validate(); err != nil { return nil, fmt.Errorf("validate pipeline manifest: %w", err) } o.pipelineMft = pipelineMft return pipelineMft, nil } func (o *packagePipelineOpts) isLegacy(inputName string) (bool, error) { lister := o.configureDeployedPipelineLister() pipelines, err := lister.ListDeployedPipelines(o.appName) if err != nil { return false, fmt.Errorf("list deployed pipelines for app %s: %w", o.appName, err) } for _, pipeline := range pipelines { if pipeline.ResourceName == inputName { return pipeline.IsLegacy, nil } } return false, nil } func (o *packagePipelineOpts) convertStages(manifestStages []manifest.PipelineStage) ([]deploy.PipelineStage, error) { var stages []deploy.PipelineStage workloads, err := o.getLocalWorkloads() if err != nil { return nil, err } for _, stage := range manifestStages { env, err := o.store.GetEnvironment(o.appName, stage.Name) if err != nil { return nil, fmt.Errorf("get environment %s in application %s: %w", stage.Name, o.appName, err) } var stg deploy.PipelineStage stg.Init(env, &stage, workloads) stages = append(stages, stg) } return stages, nil } func (o packagePipelineOpts) getLocalWorkloads() ([]string, error) { var localWklds []string if err := o.newSvcListCmd(o.svcBuffer, o.appName).Execute(); err != nil { return nil, fmt.Errorf("get local services: %w", err) } if err := o.newJobListCmd(o.jobBuffer, o.appName).Execute(); err != nil { return nil, fmt.Errorf("get local jobs: %w", err) } svcOutput, jobOutput := &list.ServiceJSONOutput{}, &list.JobJSONOutput{} if err := json.Unmarshal(o.svcBuffer.Bytes(), svcOutput); err != nil { return nil, fmt.Errorf("unmarshal service list output; %w", err) } for _, svc := range svcOutput.Services { localWklds = append(localWklds, svc.Name) } if err := json.Unmarshal(o.jobBuffer.Bytes(), jobOutput); err != nil { return nil, fmt.Errorf("unmarshal job list output; %w", err) } for _, job := range jobOutput.Jobs { localWklds = append(localWklds, job.Name) } return localWklds, nil } func (o *packagePipelineOpts) getArtifactBuckets() ([]deploy.ArtifactBucket, error) { regionalResources, err := o.pipelineDeployer.GetRegionalAppResources(o.app) if err != nil { return nil, err } var buckets []deploy.ArtifactBucket for _, resource := range regionalResources { bucket := deploy.ArtifactBucket{ BucketName: resource.S3Bucket, KeyArn: resource.KMSKeyARN, } buckets = append(buckets, bucket) } return buckets, nil }
225
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package cli import ( "bytes" "errors" "fmt" "io" "testing" "github.com/aws/copilot-cli/internal/pkg/cli/mocks" "github.com/aws/copilot-cli/internal/pkg/config" "github.com/aws/copilot-cli/internal/pkg/deploy" "github.com/aws/copilot-cli/internal/pkg/deploy/cloudformation/stack" "github.com/aws/copilot-cli/internal/pkg/manifest" "github.com/aws/copilot-cli/internal/pkg/workspace" "github.com/golang/mock/gomock" "github.com/stretchr/testify/require" ) type packagePipelineMocks struct { store *mocks.Mockstore prompt *mocks.Mockprompter prog *mocks.Mockprogress deployer *mocks.MockpipelineDeployer pipelineStackConfig *mocks.MockpipelineStackConfig ws *mocks.MockwsPipelineReader actionCmd *mocks.MockactionCommand deployedPipelineLister *mocks.MockdeployedPipelineLister } func TestPipelinePackageOpts_Execute(t *testing.T) { const ( appName = "badgoose" region = "us-west-2" accountID = "123456789012" pipelineName = "pipepiper" badPipelineName = "pipeline-badgoose-honkpipes" pipelineManifestPath = "someStuff/someMoreStuff/aws-copilot-sample-service/copilot/pipelines/pipepiper/manifest.yml" relativePath = "/copilot/pipelines/pipepiper/manifest.yml" ) pipeline := workspace.PipelineManifest{ Name: pipelineName, Path: pipelineManifestPath, } mockPipelineManifest := &manifest.Pipeline{ Name: "pipepiper", Version: 1, Source: &manifest.Source{ ProviderName: "GitHub", Properties: map[string]interface{}{ "repository": "aws/somethingCool", "branch": "main", }, }, Stages: []manifest.PipelineStage{ { Name: "chicken", TestCommands: []string{"make test", "echo 'made test'"}, }, { Name: "wings", TestCommands: []string{"echo 'bok bok bok'"}, }, }, } mockResources := []*stack.AppRegionalResources{ { S3Bucket: "someBucket", KMSKeyARN: "someKey", }, } mockEnv := &config.Environment{ Name: "test", App: appName, Region: region, AccountID: accountID, } var someError = errors.New("some error") testCases := map[string]struct { callMocks func(m packagePipelineMocks) expectedError error }{ "returns an error if fail to get the list of pipelines": { callMocks: func(m packagePipelineMocks) { gomock.InOrder( m.ws.EXPECT().ListPipelines().Return(nil, someError), ) }, expectedError: fmt.Errorf("list all pipelines in the workspace: some error"), }, "returns an error if fail to read pipeline file": { callMocks: func(m packagePipelineMocks) { gomock.InOrder( m.ws.EXPECT().ListPipelines().Return([]workspace.PipelineManifest{pipeline}, nil), m.ws.EXPECT().ReadPipelineManifest(pipelineManifestPath).Return(mockPipelineManifest, someError), ) }, expectedError: fmt.Errorf("read pipeline manifest: some error"), }, "returns an error if unable to unmarshal pipeline file": { callMocks: func(m packagePipelineMocks) { gomock.InOrder( m.ws.EXPECT().ListPipelines().Return([]workspace.PipelineManifest{pipeline}, nil), m.ws.EXPECT().ReadPipelineManifest(pipelineManifestPath).Return(nil, someError), ) }, expectedError: fmt.Errorf("read pipeline manifest: some error"), }, "returns an error if pipeline name fails validation": { callMocks: func(m packagePipelineMocks) { mockBadPipelineManifest := &manifest.Pipeline{ Name: "12345678101234567820123456783012345678401234567850123456786012345678701234567880123456789012345671001", Version: 1, Source: &manifest.Source{ ProviderName: "GitHub", Properties: map[string]interface{}{ "repository": "aws/somethingCool", "branch": "main", }, }, } gomock.InOrder( m.ws.EXPECT().ListPipelines().Return([]workspace.PipelineManifest{pipeline}, nil), m.ws.EXPECT().ReadPipelineManifest(pipelineManifestPath).Return(mockBadPipelineManifest, nil), ) }, expectedError: fmt.Errorf("validate pipeline manifest: pipeline name '12345678101234567820123456783012345678401234567850123456786012345678701234567880123456789012345671001' must be shorter than 100 characters"), }, "returns an error if provider is not a supported type": { callMocks: func(m packagePipelineMocks) { mockBadPipelineManifest := &manifest.Pipeline{ Name: badPipelineName, Version: 1, Source: &manifest.Source{ ProviderName: "NotGitHub", Properties: map[string]interface{}{ "access_token_secret": "github-token-badgoose-backend", "repository": "aws/somethingCool", "branch": "main", }, }, } gomock.InOrder( m.ws.EXPECT().ListPipelines().Return([]workspace.PipelineManifest{pipeline}, nil), m.ws.EXPECT().ReadPipelineManifest(pipelineManifestPath).Return(mockBadPipelineManifest, nil), ) }, expectedError: fmt.Errorf("read source from manifest: invalid repo source provider: NotGitHub"), }, "returns an error while converting manifest path to relative path from workspace root": { callMocks: func(m packagePipelineMocks) { gomock.InOrder( m.ws.EXPECT().ListPipelines().Return([]workspace.PipelineManifest{pipeline}, nil), m.ws.EXPECT().ReadPipelineManifest(pipelineManifestPath).Return(mockPipelineManifest, nil), m.ws.EXPECT().Rel(pipelineManifestPath).Return("", someError), ) }, expectedError: fmt.Errorf("convert manifest path to relative path: some error"), }, "returns an error if unable to convert environments to deployment stage": { callMocks: func(m packagePipelineMocks) { gomock.InOrder( m.ws.EXPECT().ListPipelines().Return([]workspace.PipelineManifest{pipeline}, nil), m.ws.EXPECT().ReadPipelineManifest(pipelineManifestPath).Return(mockPipelineManifest, nil), m.ws.EXPECT().Rel(pipelineManifestPath).Return(relativePath, nil), m.actionCmd.EXPECT().Execute().Return(someError), ) }, expectedError: fmt.Errorf("convert environments to deployment stage: get local services: some error"), }, "returns an error if fails to fetch an application": { callMocks: func(m packagePipelineMocks) { gomock.InOrder( m.ws.EXPECT().ListPipelines().Return([]workspace.PipelineManifest{pipeline}, nil), m.ws.EXPECT().ReadPipelineManifest(pipelineManifestPath).Return(mockPipelineManifest, nil), m.ws.EXPECT().Rel(pipelineManifestPath).Return(relativePath, nil), m.actionCmd.EXPECT().Execute().Times(2), // convertStages m.store.EXPECT().GetEnvironment(appName, "chicken").Return(mockEnv, nil).Times(1), m.store.EXPECT().GetEnvironment(appName, "wings").Return(mockEnv, nil).Times(1), m.store.EXPECT().GetApplication(appName).Return(nil, someError), ) }, expectedError: fmt.Errorf("get application %v configuration: some error", appName), }, "returns an error if fails to get cross-regional resources": { callMocks: func(m packagePipelineMocks) { gomock.InOrder( m.ws.EXPECT().ListPipelines().Return([]workspace.PipelineManifest{pipeline}, nil), m.ws.EXPECT().ReadPipelineManifest(pipelineManifestPath).Return(mockPipelineManifest, nil), m.ws.EXPECT().Rel(pipelineManifestPath).Return(relativePath, nil), m.actionCmd.EXPECT().Execute().Times(2), // convertStages m.store.EXPECT().GetEnvironment(appName, "chicken").Return(mockEnv, nil).Times(1), m.store.EXPECT().GetEnvironment(appName, "wings").Return(mockEnv, nil).Times(1), m.store.EXPECT().GetApplication(appName).Return(&config.Application{ Name: appName, }, nil), // getArtifactBuckets m.deployer.EXPECT().GetRegionalAppResources(gomock.Any()).Return(mockResources, someError), ) }, expectedError: fmt.Errorf("get cross-regional resources: some error"), }, "error if failed to generate the template": { callMocks: func(m packagePipelineMocks) { gomock.InOrder( m.ws.EXPECT().ListPipelines().Return([]workspace.PipelineManifest{pipeline}, nil), m.ws.EXPECT().ReadPipelineManifest(pipelineManifestPath).Return(mockPipelineManifest, nil), m.ws.EXPECT().Rel(pipelineManifestPath).Return(relativePath, nil), m.actionCmd.EXPECT().Execute().Times(2), // convertStages m.store.EXPECT().GetEnvironment(appName, "chicken").Return(mockEnv, nil).Times(1), m.store.EXPECT().GetEnvironment(appName, "wings").Return(mockEnv, nil).Times(1), m.store.EXPECT().GetApplication(appName).Return(&config.Application{ Name: appName, }, nil), // getArtifactBuckets m.deployer.EXPECT().GetRegionalAppResources(gomock.Any()).Return(mockResources, nil), // check if the pipeline has been deployed using a legacy naming. m.deployedPipelineLister.EXPECT().ListDeployedPipelines(appName).Return([]deploy.Pipeline{}, nil), m.pipelineStackConfig.EXPECT().Template().Return("", someError), ) }, expectedError: fmt.Errorf("generate stack template: some error"), }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { // GIVEN ctrl := gomock.NewController(t) defer ctrl.Finish() mockPipelineDeployer := mocks.NewMockpipelineDeployer(ctrl) mockStore := mocks.NewMockstore(ctrl) mockWorkspace := mocks.NewMockwsPipelineReader(ctrl) mockProgress := mocks.NewMockprogress(ctrl) mockPrompt := mocks.NewMockprompter(ctrl) mockActionCmd := mocks.NewMockactionCommand(ctrl) mockPipelineStackConfig := mocks.NewMockpipelineStackConfig(ctrl) mocks := packagePipelineMocks{ store: mockStore, prompt: mockPrompt, prog: mockProgress, deployer: mockPipelineDeployer, ws: mockWorkspace, actionCmd: mockActionCmd, pipelineStackConfig: mockPipelineStackConfig, deployedPipelineLister: mocks.NewMockdeployedPipelineLister(ctrl), } tc.callMocks(mocks) opts := &packagePipelineOpts{ packagePipelineVars: packagePipelineVars{ appName: appName, name: pipelineName, }, pipelineDeployer: mockPipelineDeployer, pipelineStackConfig: func(in *deploy.CreatePipelineInput) pipelineStackConfig { return mockPipelineStackConfig }, ws: mockWorkspace, store: mockStore, newSvcListCmd: func(w io.Writer, app string) cmd { return mockActionCmd }, newJobListCmd: func(w io.Writer, app string) cmd { return mockActionCmd }, configureDeployedPipelineLister: func() deployedPipelineLister { return mocks.deployedPipelineLister }, svcBuffer: bytes.NewBufferString(`{"services":[{"app":"badgoose","name":"frontend","type":""}]}`), jobBuffer: bytes.NewBufferString(`{"jobs":[{"app":"badgoose","name":"backend","type":""}]}`), } // WHEN err := opts.Execute() // THEN if tc.expectedError != nil { require.Error(t, err) require.Equal(t, tc.expectedError.Error(), err.Error()) } else { require.NoError(t, err) } }) } }
309
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package cli import ( "fmt" "io" "github.com/aws/copilot-cli/internal/pkg/deploy" "github.com/aws/copilot-cli/internal/pkg/term/color" "github.com/spf13/afero" "github.com/aws/aws-sdk-go/aws" "github.com/aws/aws-sdk-go/service/ssm" "github.com/aws/copilot-cli/internal/pkg/aws/identity" "github.com/aws/copilot-cli/internal/pkg/aws/codepipeline" rg "github.com/aws/copilot-cli/internal/pkg/aws/resourcegroups" "github.com/aws/copilot-cli/internal/pkg/aws/sessions" "github.com/aws/copilot-cli/internal/pkg/config" "github.com/aws/copilot-cli/internal/pkg/describe" "github.com/aws/copilot-cli/internal/pkg/term/log" "github.com/aws/copilot-cli/internal/pkg/term/prompt" "github.com/aws/copilot-cli/internal/pkg/term/selector" "github.com/aws/copilot-cli/internal/pkg/workspace" "github.com/spf13/cobra" ) const ( pipelineShowAppNamePrompt = "Which application's pipelines would you like to show?" pipelineShowAppNameHelpPrompt = "An application is a collection of related services." fmtPipelineShowPrompt = "Which deployed pipeline of application %s would you like to show the details of?" ) type showPipelineVars struct { appName string name string shouldOutputJSON bool shouldOutputResources bool } type showPipelineOpts struct { showPipelineVars // Interfaces to dependencies w io.Writer ws wsPipelineReader store applicationStore codepipeline pipelineGetter describer describer initDescriber func(bool) error sel codePipelineSelector deployedPipelineLister deployedPipelineLister prompt prompter // Cached variables. targetPipeline *deploy.Pipeline } func newShowPipelineOpts(vars showPipelineVars) (*showPipelineOpts, error) { ws, err := workspace.Use(afero.NewOsFs()) if err != nil { return nil, err } defaultSession, err := sessions.ImmutableProvider(sessions.UserAgentExtras("pipeline show")).Default() if err != nil { return nil, fmt.Errorf("default session: %w", err) } codepipeline := codepipeline.New(defaultSession) pipelineLister := deploy.NewPipelineStore(rg.New(defaultSession)) store := config.NewSSMStore(identity.New(defaultSession), ssm.New(defaultSession), aws.StringValue(defaultSession.Config.Region)) prompter := prompt.New() opts := &showPipelineOpts{ showPipelineVars: vars, ws: ws, store: store, codepipeline: codepipeline, deployedPipelineLister: pipelineLister, sel: selector.NewAppPipelineSelector(prompter, store, pipelineLister), prompt: prompter, w: log.OutputWriter, } opts.initDescriber = func(enableResources bool) error { pipeline, err := opts.getTargetPipeline() if err != nil { return err } describer, err := describe.NewPipelineDescriber(pipeline, enableResources) if err != nil { return fmt.Errorf("new pipeline describer: %w", err) } opts.describer = describer return nil } return opts, nil } // Validate returns an error if the optional flag values passed by the user are invalid. func (o *showPipelineOpts) Validate() error { return nil } // Ask prompts for fields that are required but not passed in, and validates those that are. func (o *showPipelineOpts) Ask() error { if o.appName != "" { if _, err := o.store.GetApplication(o.appName); err != nil { return fmt.Errorf("validate application name: %w", err) } } else { if err := o.askAppName(); err != nil { return err } } if o.name != "" { if _, err := o.getTargetPipeline(); err != nil { return fmt.Errorf("validate pipeline name %s: %w", o.name, err) } return nil } pipeline, err := askDeployedPipelineName(o.sel, fmt.Sprintf(fmtPipelineShowPrompt, color.HighlightUserInput(o.appName)), o.appName) if err != nil { return err } o.name = pipeline.Name o.targetPipeline = &pipeline return nil } // Execute shows details about the pipeline. func (o *showPipelineOpts) Execute() error { err := o.initDescriber(o.shouldOutputResources) if err != nil { return err } pipeline, err := o.describer.Describe() if err != nil { return fmt.Errorf("describe pipeline %s: %w", o.name, err) } if o.shouldOutputJSON { data, err := pipeline.JSONString() if err != nil { return err } fmt.Fprint(o.w, data) } else { fmt.Fprint(o.w, pipeline.HumanString()) } return nil } func (o *showPipelineOpts) getTargetPipeline() (deploy.Pipeline, error) { if o.targetPipeline != nil { return *o.targetPipeline, nil } pipeline, err := getDeployedPipelineInfo(o.deployedPipelineLister, o.appName, o.name) if err != nil { return deploy.Pipeline{}, err } o.targetPipeline = &pipeline return pipeline, nil } func (o *showPipelineOpts) askAppName() error { name, err := o.sel.Application(pipelineShowAppNamePrompt, pipelineShowAppNameHelpPrompt) if err != nil { return fmt.Errorf("select application: %w", err) } o.appName = name return nil } // buildPipelineShowCmd build the command for deploying a new pipeline or updating an existing pipeline. func buildPipelineShowCmd() *cobra.Command { vars := showPipelineVars{} cmd := &cobra.Command{ Use: "show", Short: "Shows info about a deployed pipeline for an application.", Long: "Shows info about a deployed pipeline for an application, including information about each stage.", Example: ` Shows info, including resources, about the pipeline "myrepo-mybranch." /code $ copilot pipeline show --name myrepo-mybranch --resources`, RunE: runCmdE(func(cmd *cobra.Command, args []string) error { opts, err := newShowPipelineOpts(vars) if err != nil { return err } return run(opts) }), } cmd.Flags().StringVarP(&vars.name, nameFlag, nameFlagShort, "", pipelineFlagDescription) cmd.Flags().StringVarP(&vars.appName, appFlag, appFlagShort, tryReadingAppName(), appFlagDescription) cmd.Flags().BoolVar(&vars.shouldOutputJSON, jsonFlag, false, jsonFlagDescription) cmd.Flags().BoolVar(&vars.shouldOutputResources, resourcesFlag, false, pipelineResourcesFlagDescription) return cmd }
204
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package cli import ( "bytes" "errors" "fmt" "testing" "github.com/aws/copilot-cli/internal/pkg/config" "github.com/aws/copilot-cli/internal/pkg/deploy" "github.com/aws/copilot-cli/internal/pkg/cli/mocks" "github.com/golang/mock/gomock" "github.com/stretchr/testify/require" ) type showPipelineMocks struct { store *mocks.Mockstore ws *mocks.MockwsPipelineReader prompt *mocks.Mockprompter codepipeline *mocks.MockpipelineGetter sel *mocks.MockcodePipelineSelector deployedPipelineLister *mocks.MockdeployedPipelineLister } func TestPipelineShow_Ask(t *testing.T) { const ( mockAppName = "dinder" mockPipelineName = "pipeline-dinder-badgoose-repo" ) mockError := errors.New("mock error") testCases := map[string]struct { inAppName string inPipelineName string setupMocks func(mocks showPipelineMocks) expectedApp string expectedPipeline string expectedErr error }{ "with valid application name via flag, no pipeline name flag": { inAppName: mockAppName, setupMocks: func(mocks showPipelineMocks) { gomock.InOrder( mocks.store.EXPECT().GetApplication(mockAppName).Return(&config.Application{ Name: "dinder", }, nil), mocks.sel.EXPECT().DeployedPipeline(gomock.Any(), gomock.Any(), mockAppName).Return(deploy.Pipeline{ Name: mockPipelineName, AppName: mockAppName, }, nil), ) }, expectedApp: mockAppName, expectedPipeline: mockPipelineName, expectedErr: nil, }, "error if problem selecting app": { setupMocks: func(mocks showPipelineMocks) { gomock.InOrder( mocks.sel.EXPECT().Application(gomock.Any(), gomock.Any()).Return("", mockError)) }, expectedErr: fmt.Errorf("select application: %w", mockError), }, "with pipeline flag": { inPipelineName: mockPipelineName, inAppName: mockAppName, setupMocks: func(mocks showPipelineMocks) { mocks.store.EXPECT().GetApplication(mockAppName).Return(&config.Application{ Name: "dinder", }, nil) mocks.deployedPipelineLister.EXPECT().ListDeployedPipelines(mockAppName).Return([]deploy.Pipeline{ { Name: mockPipelineName, }, }, nil) }, expectedApp: mockAppName, expectedPipeline: mockPipelineName, expectedErr: nil, }, "prompt if no app name AND no pipeline name": { setupMocks: func(mocks showPipelineMocks) { gomock.InOrder( mocks.sel.EXPECT().Application(gomock.Any(), gomock.Any()).Return(mockAppName, nil)) mocks.sel.EXPECT().DeployedPipeline(gomock.Any(), gomock.Any(), mockAppName).Return(deploy.Pipeline{ Name: mockPipelineName, }, nil) }, expectedApp: mockAppName, expectedPipeline: mockPipelineName, expectedErr: nil, }, "error if invalid name passed in": { inPipelineName: "dander", inAppName: mockAppName, setupMocks: func(mocks showPipelineMocks) { mocks.store.EXPECT().GetApplication(mockAppName).Return(&config.Application{ Name: "dinder", }, nil) mocks.deployedPipelineLister.EXPECT().ListDeployedPipelines(mockAppName).Return([]deploy.Pipeline{}, nil) }, expectedApp: mockAppName, expectedErr: errors.New("validate pipeline name dander: cannot find pipeline named dander"), }, "error occurs when listing deployed pipelines for validation": { inPipelineName: "dander", inAppName: mockAppName, setupMocks: func(mocks showPipelineMocks) { mocks.store.EXPECT().GetApplication(mockAppName).Return(&config.Application{ Name: "dinder", }, nil) mocks.deployedPipelineLister.EXPECT().ListDeployedPipelines(mockAppName).Return([]deploy.Pipeline{}, errors.New("some error")) }, expectedApp: mockAppName, expectedErr: errors.New("validate pipeline name dander: list deployed pipelines: some error"), }, "wraps error when fails to retrieve deployed pipelines to select": { inAppName: mockAppName, inPipelineName: "", setupMocks: func(mocks showPipelineMocks) { gomock.InOrder( mocks.store.EXPECT().GetApplication(mockAppName).Return(&config.Application{ Name: "dinder", }, nil), mocks.sel.EXPECT().DeployedPipeline(gomock.Any(), gomock.Any(), mockAppName).Return(deploy.Pipeline{}, mockError), ) }, expectedErr: fmt.Errorf("select deployed pipelines: %w", mockError), }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { // GIVEN ctrl := gomock.NewController(t) defer ctrl.Finish() mockStore := mocks.NewMockstore(ctrl) mockWorkspace := mocks.NewMockwsPipelineReader(ctrl) mockPrompt := mocks.NewMockprompter(ctrl) mockPipelineSvc := mocks.NewMockpipelineGetter(ctrl) mockSel := mocks.NewMockcodePipelineSelector(ctrl) mockDeployedPipelineLister := mocks.NewMockdeployedPipelineLister(ctrl) mocks := showPipelineMocks{ store: mockStore, ws: mockWorkspace, prompt: mockPrompt, codepipeline: mockPipelineSvc, sel: mockSel, deployedPipelineLister: mockDeployedPipelineLister, } tc.setupMocks(mocks) opts := &showPipelineOpts{ showPipelineVars: showPipelineVars{ appName: tc.inAppName, name: tc.inPipelineName, }, store: mockStore, ws: mockWorkspace, codepipeline: mockPipelineSvc, prompt: mockPrompt, sel: mockSel, deployedPipelineLister: mockDeployedPipelineLister, } // WHEN err := opts.Ask() // THEN if tc.expectedErr != nil { require.EqualError(t, err, tc.expectedErr.Error()) } else { require.NoError(t, err) require.Equal(t, tc.expectedPipeline, opts.name, "expected pipeline name to match") } }) } } func TestPipelineShow_Execute(t *testing.T) { const ( mockPipelineName = "pipeline-dinder-badgoose-repo" ) mockError := errors.New("mock error") mockPipeline := mockDescribeData{ data: "mockData", err: mockError, } testCases := map[string]struct { inPipelineName string setupMocks func(m *mocks.Mockdescriber) shouldOutputJSON bool expectedContent string expectedErr error }{ "happy path": { inPipelineName: mockPipelineName, setupMocks: func(m *mocks.Mockdescriber) { m.EXPECT().Describe().Return(&mockPipeline, nil) }, shouldOutputJSON: false, expectedContent: "mockData", expectedErr: nil, }, "return error if fail to generate JSON output": { inPipelineName: mockPipelineName, setupMocks: func(m *mocks.Mockdescriber) { m.EXPECT().Describe().Return(&mockPipeline, nil) }, shouldOutputJSON: true, expectedErr: mockError, }, "return error if fail to describe pipeline": { inPipelineName: mockPipelineName, setupMocks: func(m *mocks.Mockdescriber) { m.EXPECT().Describe().Return(nil, mockError) }, shouldOutputJSON: false, expectedErr: fmt.Errorf("describe pipeline %s: %w", mockPipelineName, mockError), }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { // GIVEN ctrl := gomock.NewController(t) defer ctrl.Finish() b := &bytes.Buffer{} mockDescriber := mocks.NewMockdescriber(ctrl) tc.setupMocks(mockDescriber) opts := &showPipelineOpts{ showPipelineVars: showPipelineVars{ shouldOutputJSON: tc.shouldOutputJSON, name: tc.inPipelineName, }, describer: mockDescriber, initDescriber: func(bool) error { return nil }, w: b, } // WHEN err := opts.Execute() // THEN if tc.expectedErr != nil { require.EqualError(t, err, tc.expectedErr.Error()) } else { require.NoError(t, err) require.Equal(t, tc.expectedContent, b.String(), "expected output content match") } }) } }
270
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package cli import ( "fmt" "io" "github.com/aws/copilot-cli/internal/pkg/deploy" "github.com/aws/copilot-cli/internal/pkg/term/color" "github.com/spf13/afero" "github.com/aws/aws-sdk-go/aws" "github.com/aws/aws-sdk-go/service/ssm" "github.com/aws/copilot-cli/internal/pkg/aws/identity" "github.com/aws/copilot-cli/internal/pkg/aws/codepipeline" rg "github.com/aws/copilot-cli/internal/pkg/aws/resourcegroups" "github.com/aws/copilot-cli/internal/pkg/aws/sessions" "github.com/aws/copilot-cli/internal/pkg/config" "github.com/aws/copilot-cli/internal/pkg/describe" "github.com/aws/copilot-cli/internal/pkg/term/log" "github.com/aws/copilot-cli/internal/pkg/term/prompt" "github.com/aws/copilot-cli/internal/pkg/term/selector" "github.com/aws/copilot-cli/internal/pkg/workspace" "github.com/spf13/cobra" ) const ( pipelineStatusAppNamePrompt = "Which application's pipeline status would you like to show?" pipelineStatusAppNameHelpPrompt = "An application is a collection of related services." fmtpipelineStatusPrompt = "Which pipeline of %s would you like to show the status of?" ) type pipelineStatusVars struct { appName string shouldOutputJSON bool name string } type pipelineStatusOpts struct { pipelineStatusVars w io.Writer ws wsPipelineReader store store codepipeline pipelineGetter describer describer sel codePipelineSelector prompt prompter initDescriber func(opts *pipelineStatusOpts) error deployedPipelineLister deployedPipelineLister // Cached variables. targetPipeline *deploy.Pipeline } func newPipelineStatusOpts(vars pipelineStatusVars) (*pipelineStatusOpts, error) { ws, err := workspace.Use(afero.NewOsFs()) if err != nil { return nil, err } session, err := sessions.ImmutableProvider(sessions.UserAgentExtras("pipeline status")).Default() if err != nil { return nil, fmt.Errorf("session: %w", err) } codepipeline := codepipeline.New(session) pipelineLister := deploy.NewPipelineStore(rg.New(session)) store := config.NewSSMStore(identity.New(session), ssm.New(session), aws.StringValue(session.Config.Region)) prompter := prompt.New() return &pipelineStatusOpts{ w: log.OutputWriter, pipelineStatusVars: vars, ws: ws, store: store, codepipeline: codepipeline, deployedPipelineLister: pipelineLister, sel: selector.NewAppPipelineSelector(prompter, store, pipelineLister), prompt: prompter, initDescriber: func(o *pipelineStatusOpts) error { pipeline, err := o.getTargetPipeline() if err != nil { return err } d, err := describe.NewPipelineStatusDescriber(pipeline) if err != nil { return fmt.Errorf("new pipeline status describer: %w", err) } o.describer = d return nil }, }, nil } // Validate returns an error if the optional flag values provided by the user are invalid. func (o *pipelineStatusOpts) Validate() error { return nil } // Ask prompts for fields that are required but not passed in, and validates those that are. func (o *pipelineStatusOpts) Ask() error { if o.appName != "" { if _, err := o.store.GetApplication(o.appName); err != nil { return fmt.Errorf("validate application name: %w", err) } } else { if err := o.askAppName(); err != nil { return err } } if o.name != "" { if _, err := o.getTargetPipeline(); err != nil { return fmt.Errorf("validate pipeline name %s: %w", o.name, err) } return nil } pipeline, err := askDeployedPipelineName(o.sel, fmt.Sprintf(fmtpipelineStatusPrompt, color.HighlightUserInput(o.appName)), o.appName) if err != nil { return err } o.name = pipeline.Name o.targetPipeline = &pipeline return nil } // Execute displays the status of the pipeline. func (o *pipelineStatusOpts) Execute() error { err := o.initDescriber(o) if err != nil { return fmt.Errorf("describe status of pipeline: %w", err) } pipelineStatus, err := o.describer.Describe() if err != nil { return fmt.Errorf("describe status of pipeline: %w", err) } if o.shouldOutputJSON { data, err := pipelineStatus.JSONString() if err != nil { return err } fmt.Fprint(o.w, data) } else { fmt.Fprint(o.w, pipelineStatus.HumanString()) } return nil } func (o *pipelineStatusOpts) getTargetPipeline() (deploy.Pipeline, error) { if o.targetPipeline != nil { return *o.targetPipeline, nil } pipeline, err := getDeployedPipelineInfo(o.deployedPipelineLister, o.appName, o.name) if err != nil { return deploy.Pipeline{}, err } o.targetPipeline = &pipeline return pipeline, nil } func (o *pipelineStatusOpts) askAppName() error { name, err := o.sel.Application(pipelineStatusAppNamePrompt, pipelineStatusAppNameHelpPrompt) if err != nil { return fmt.Errorf("select application: %w", err) } o.appName = name return nil } // buildPipelineStatusCmd builds the command for showing the status of a deployed pipeline. func buildPipelineStatusCmd() *cobra.Command { vars := pipelineStatusVars{} cmd := &cobra.Command{ Use: "status", Short: "Shows the status of a pipeline.", Long: "Shows the status of each stage of your pipeline.", Example: ` Shows status of the pipeline "my-repo-my-branch". /code $ copilot pipeline status -n my-repo-my-branch`, RunE: runCmdE(func(cmd *cobra.Command, args []string) error { opts, err := newPipelineStatusOpts(vars) if err != nil { return err } return run(opts) }), } cmd.Flags().StringVarP(&vars.name, nameFlag, nameFlagShort, "", pipelineFlagDescription) cmd.Flags().StringVarP(&vars.appName, appFlag, appFlagShort, tryReadingAppName(), appFlagDescription) cmd.Flags().BoolVar(&vars.shouldOutputJSON, jsonFlag, false, jsonFlagDescription) return cmd }
200
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package cli import ( "bytes" "errors" "fmt" "testing" "github.com/aws/copilot-cli/internal/pkg/config" "github.com/aws/copilot-cli/internal/pkg/deploy" "github.com/aws/copilot-cli/internal/pkg/cli/mocks" "github.com/golang/mock/gomock" "github.com/stretchr/testify/require" ) type pipelineStatusMocks struct { store *mocks.Mockstore ws *mocks.MockwsPipelineReader prompt *mocks.Mockprompter codepipeline *mocks.MockpipelineGetter describer *mocks.Mockdescriber sel *mocks.MockcodePipelineSelector deployedPipelineLister *mocks.MockdeployedPipelineLister } func TestPipelineStatus_Ask(t *testing.T) { const ( mockAppName = "dinder" mockPipelineName = "pipeline-dinder-badgoose-repo" ) mockError := errors.New("mock error") mockTestCommands := []string{"make test", "echo 'honk'"} testCases := map[string]struct { testAppName string testPipelineName string setupMocks func(mocks pipelineStatusMocks) expectedApp string expectedPipeline string expectedTestCommands []string expectedErr error }{ "with invalid app name": { testAppName: mockAppName, setupMocks: func(mocks pipelineStatusMocks) { gomock.InOrder( mocks.store.EXPECT().GetApplication(mockAppName).Return(nil, mockError), ) }, expectedApp: "", expectedErr: fmt.Errorf("validate application name: %w", mockError), }, "prompts for app name if not passed in with flag and name not passed in": { setupMocks: func(mocks pipelineStatusMocks) { gomock.InOrder( mocks.sel.EXPECT().Application(gomock.Any(), gomock.Any()).Return(mockAppName, nil), mocks.sel.EXPECT().DeployedPipeline(gomock.Any(), gomock.Any(), mockAppName).Return(deploy.Pipeline{ Name: mockPipelineName, }, nil), ) }, expectedApp: mockAppName, expectedPipeline: mockPipelineName, expectedErr: nil, }, "errors if fail to select app name": { setupMocks: func(mocks pipelineStatusMocks) { gomock.InOrder( mocks.sel.EXPECT().Application(gomock.Any(), gomock.Any()).Return("", errors.New("some error"))) }, expectedApp: "", expectedErr: errors.New("select application: some error"), }, "retrieves pipeline name from remote": { testAppName: mockAppName, setupMocks: func(mocks pipelineStatusMocks) { gomock.InOrder( mocks.store.EXPECT().GetApplication(mockAppName).Return(&config.Application{ Name: "dinder", }, nil), mocks.sel.EXPECT().DeployedPipeline(gomock.Any(), gomock.Any(), mockAppName).Return(deploy.Pipeline{ Name: mockPipelineName, }, nil), ) }, expectedApp: mockAppName, expectedPipeline: mockPipelineName, expectedErr: nil, }, "wraps error when fails to retrieve pipelines": { testAppName: mockAppName, testPipelineName: "", setupMocks: func(mocks pipelineStatusMocks) { gomock.InOrder( mocks.store.EXPECT().GetApplication(mockAppName).Return(&config.Application{ Name: "dinder", }, nil), mocks.sel.EXPECT().DeployedPipeline(gomock.Any(), gomock.Any(), mockAppName).Return(deploy.Pipeline{}, mockError), ) }, expectedApp: mockAppName, expectedErr: fmt.Errorf("select deployed pipelines: %w", mockError), }, "success with flags": { testAppName: mockAppName, testPipelineName: mockPipelineName, setupMocks: func(mocks pipelineStatusMocks) { gomock.InOrder( mocks.store.EXPECT().GetApplication(mockAppName).Return(&config.Application{ Name: "dinder", }, nil), mocks.deployedPipelineLister.EXPECT().ListDeployedPipelines(mockAppName).Return([]deploy.Pipeline{ { Name: mockPipelineName, }, }, nil), ) }, expectedApp: mockAppName, expectedPipeline: mockPipelineName, expectedTestCommands: mockTestCommands, expectedErr: nil, }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { // GIVEN ctrl := gomock.NewController(t) defer ctrl.Finish() mockStore := mocks.NewMockstore(ctrl) mockWS := mocks.NewMockwsPipelineReader(ctrl) mockPrompt := mocks.NewMockprompter(ctrl) mockPLSvc := mocks.NewMockpipelineGetter(ctrl) mockSel := mocks.NewMockcodePipelineSelector(ctrl) mocks := pipelineStatusMocks{ store: mockStore, ws: mockWS, prompt: mockPrompt, codepipeline: mockPLSvc, sel: mockSel, deployedPipelineLister: mocks.NewMockdeployedPipelineLister(ctrl), } tc.setupMocks(mocks) opts := &pipelineStatusOpts{ pipelineStatusVars: pipelineStatusVars{ appName: tc.testAppName, name: tc.testPipelineName, }, store: mockStore, ws: mockWS, codepipeline: mockPLSvc, sel: mockSel, prompt: mockPrompt, deployedPipelineLister: mocks.deployedPipelineLister, } // WHEN err := opts.Ask() // THEN if tc.expectedErr != nil { require.EqualError(t, err, tc.expectedErr.Error()) } else { require.NoError(t, err) require.Equal(t, tc.expectedApp, opts.appName, "expected app name to match") require.Equal(t, tc.expectedPipeline, opts.name, "expected pipeline name to match") } }) } } func TestPipelineStatus_Execute(t *testing.T) { const ( mockPipelineName = "pipeline-dinder-badgoose-repo" ) mockError := errors.New("mock error") mockPipelineStatus := mockDescribeData{ data: "mockData", err: mockError, } testCases := map[string]struct { shouldOutputJSON bool pipelineName string setupMocks func(m pipelineStatusMocks) expectedContent string expectedError error }{ "errors if fail to return JSON output": { pipelineName: mockPipelineName, shouldOutputJSON: true, setupMocks: func(m pipelineStatusMocks) { m.describer.EXPECT().Describe().Return(&mockPipelineStatus, nil) }, expectedError: mockError, }, "success with HumanString": { pipelineName: mockPipelineName, setupMocks: func(m pipelineStatusMocks) { m.describer.EXPECT().Describe().Return(&mockPipelineStatus, nil) }, expectedContent: "mockData", expectedError: nil, }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { // GIVEN ctrl := gomock.NewController(t) defer ctrl.Finish() b := &bytes.Buffer{} mockDescriber := mocks.NewMockdescriber(ctrl) mocks := pipelineStatusMocks{ describer: mockDescriber, } tc.setupMocks(mocks) opts := &pipelineStatusOpts{ pipelineStatusVars: pipelineStatusVars{ shouldOutputJSON: tc.shouldOutputJSON, name: tc.pipelineName, }, describer: mockDescriber, initDescriber: func(o *pipelineStatusOpts) error { return nil }, w: b, } // WHEN err := opts.Execute() // THEN if tc.expectedError != nil { require.EqualError(t, err, tc.expectedError.Error()) } else { require.NoError(t, err) require.Equal(t, tc.expectedContent, b.String(), "expected output content to match") } }) } }
257
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package cli // progress is the interface to inform the user that a long operation is taking place. type progress interface { // Start starts displaying progress with a label. Start(label string) // Stop ends displaying progress with a label. Stop(label string) }
13
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package cli import "github.com/aws/copilot-cli/internal/pkg/term/prompt" type prompter interface { Get(message, help string, validator prompt.ValidatorFunc, promptOpts ...prompt.PromptConfig) (string, error) GetSecret(message, help string, promptOpts ...prompt.PromptConfig) (string, error) SelectOne(message, help string, options []string, promptOpts ...prompt.PromptConfig) (string, error) MultiSelect(message, help string, options []string, validator prompt.ValidatorFunc, promptOpts ...prompt.PromptConfig) ([]string, error) Confirm(message, help string, promptOpts ...prompt.PromptConfig) (bool, error) SelectOption(message, help string, opts []prompt.Option, promptCfgs ...prompt.PromptConfig) (value string, err error) MultiSelectOptions(message, help string, opts []prompt.Option, promptCfgs ...prompt.PromptConfig) ([]string, error) }
17
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package cli import ( "github.com/aws/copilot-cli/cmd/copilot/template" "github.com/aws/copilot-cli/internal/pkg/cli/group" "github.com/spf13/cobra" ) // BuildSecretCmd is the top level command for secret. func BuildSecretCmd() *cobra.Command { cmd := &cobra.Command{ Use: "secret", Short: `Commands for secrets. Secrets are sensitive information that you need in your application.`, } cmd.AddCommand(buildSecretInitCmd()) cmd.SetUsageTemplate(template.Usage) cmd.Annotations = map[string]string{ "group": group.Extend, } return cmd }
28
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package cli import ( "errors" "fmt" "sort" "strings" "github.com/aws/copilot-cli/internal/pkg/workspace" "github.com/aws/copilot-cli/internal/pkg/describe" "golang.org/x/text/cases" "golang.org/x/text/language" "github.com/aws/copilot-cli/internal/pkg/aws/identity" "github.com/dustin/go-humanize/english" "gopkg.in/yaml.v3" "github.com/aws/aws-sdk-go/aws" awsssm "github.com/aws/aws-sdk-go/service/ssm" "github.com/spf13/afero" "github.com/spf13/cobra" "github.com/aws/copilot-cli/internal/pkg/aws/sessions" "github.com/aws/copilot-cli/internal/pkg/aws/ssm" "github.com/aws/copilot-cli/internal/pkg/config" "github.com/aws/copilot-cli/internal/pkg/deploy" "github.com/aws/copilot-cli/internal/pkg/term/color" "github.com/aws/copilot-cli/internal/pkg/term/log" "github.com/aws/copilot-cli/internal/pkg/term/prompt" "github.com/aws/copilot-cli/internal/pkg/term/selector" ) const ( fmtSecretParameterName = "/copilot/%s/%s/secrets/%s" fmtSecretParameterNameMftExample = "/copilot/${COPILOT_APPLICATION_NAME}/${COPILOT_ENVIRONMENT_NAME}/secrets/%s" ) const ( secretInitAppPrompt = "Which application do you want to add the secret to?" secretInitAppPromptHelp = "The secret can then be versioned by your existing environments inside the application." secretInitSecretNamePrompt = "What would you like to name this secret?" secretInitSecretNamePromptHelp = "The name of the secret, such as 'db_password'." fmtSecretInitSecretValuePrompt = "What is the value of secret %s in environment %s?" fmtSecretInitSecretValuePromptHelp = "If you do not wish to add the secret %s to environment %s, you can leave this blank by pressing 'Enter' without entering any value." ) type secretInitVars struct { appName string name string values map[string]string inputFilePath string overwrite bool } type secretInitOpts struct { secretInitVars shouldShowOverwriteHint bool secretValues map[string]map[string]string store store fs afero.Fs prompter prompter selector appSelector ws wsEnvironmentsLister envCompatibilityChecker map[string]versionCompatibilityChecker secretPutters map[string]secretPutter configureClientsForEnv func(envName string) error readFile func() ([]byte, error) } func newSecretInitOpts(vars secretInitVars) (*secretInitOpts, error) { sessProvider := sessions.ImmutableProvider(sessions.UserAgentExtras("secret init")) defaultSession, err := sessProvider.Default() if err != nil { return nil, err } fs := afero.NewOsFs() ws, err := workspace.Use(afero.NewOsFs()) if err != nil { return nil, err } store := config.NewSSMStore(identity.New(defaultSession), awsssm.New(defaultSession), aws.StringValue(defaultSession.Config.Region)) prompter := prompt.New() opts := secretInitOpts{ secretInitVars: vars, store: store, fs: fs, ws: ws, envCompatibilityChecker: make(map[string]versionCompatibilityChecker), secretPutters: make(map[string]secretPutter), prompter: prompter, selector: selector.NewAppEnvSelector(prompter, store), } opts.configureClientsForEnv = func(envName string) error { checker, err := describe.NewEnvDescriber(describe.NewEnvDescriberConfig{ App: opts.appName, Env: envName, ConfigStore: opts.store, }) if err != nil { return fmt.Errorf("new environment compatibility checker: %v", err) } opts.envCompatibilityChecker[envName] = checker env, err := opts.targetEnv(envName) if err != nil { return err } sess, err := sessProvider.FromRole(env.ManagerRoleARN, env.Region) if err != nil { return fmt.Errorf("create session from environment manager role %s in region %s: %w", env.ManagerRoleARN, env.Region, err) } opts.secretPutters[envName] = ssm.New(sess) return nil } opts.readFile = func() ([]byte, error) { file, err := opts.fs.Open(opts.inputFilePath) if err != nil { return nil, fmt.Errorf("open input file %s: %w", opts.inputFilePath, err) } defer file.Close() f, err := afero.ReadFile(opts.fs, file.Name()) if err != nil { return nil, fmt.Errorf("read input file %s: %w", opts.inputFilePath, err) } return f, nil } return &opts, nil } // Validate returns an error if the flag values passed by the user are invalid. func (o *secretInitOpts) Validate() error { if o.inputFilePath != "" && o.name != "" { return errors.New("cannot specify `--cli-input-yaml` with `--name`") } if o.inputFilePath != "" && o.values != nil { return errors.New("cannot specify `--cli-input-yaml` with `--values`") } if o.appName != "" { _, err := o.store.GetApplication(o.appName) if err != nil { return fmt.Errorf("get application %s: %w", o.appName, err) } if o.values != nil { for env := range o.values { if _, err := o.targetEnv(env); err != nil { return err } } } } if o.name != "" { if err := validateSecretName(o.name); err != nil { return err } } if o.inputFilePath != "" { if _, err := o.fs.Stat(o.inputFilePath); err != nil { return err } } return nil } // Ask prompts the user for any required or important fields that are not provided. func (o *secretInitOpts) Ask() error { if o.overwrite { log.Warningf("You have specified %s flag. Please note that overwriting an existing secret may break your deployed service.\n", color.HighlightCode(fmt.Sprintf("--%s", overwriteFlag))) } if o.inputFilePath != "" { return nil } if err := o.askForAppName(); err != nil { return err } if err := o.askForSecretName(); err != nil { return err } if err := o.askForSecretValues(); err != nil { return err } return nil } // Execute creates or updates the secrets. func (o *secretInitOpts) Execute() error { if o.inputFilePath != "" { secrets, err := o.parseSecretsInputFile() if err != nil { return err } o.secretValues = secrets if err := o.configureClientsAndUpgradeForEnvironments(secrets); err != nil { return err } var errs []*errSecretFailedInSomeEnvironments for secretName, secretValues := range secrets { if err := o.putSecret(secretName, secretValues); err != nil { errs = append(errs, err.(*errSecretFailedInSomeEnvironments)) } log.Infoln("") } if len(errs) != 0 { return &errBatchPutSecretsFailed{ errors: errs, } } return nil } o.secretValues = map[string]map[string]string{ o.name: o.values, } if err := o.configureClientsAndUpgradeForEnvironments(o.secretValues); err != nil { return err } return o.putSecret(o.name, o.values) } func (o *secretInitOpts) configureClientsAndUpgradeForEnvironments(secrets map[string]map[string]string) error { envNames := make(map[string]struct{}) for _, values := range secrets { for envName := range values { envNames[envName] = struct{}{} } } const minEnvVersionForSecretInit = "v1.4.0" for envName := range envNames { if err := o.configureClientsForEnv(envName); err != nil { return err } if err := validateMinEnvVersion(o.ws, o.envCompatibilityChecker[envName], o.appName, envName, minEnvVersionForSecretInit, "secret init"); err != nil { return err } } return nil } func (o *secretInitOpts) putSecret(secretName string, values map[string]string) error { envs := make([]string, 0) for env := range values { envs = append(envs, env) } if len(envs) == 0 { return nil } log.Infof("...Put secret %s to environment %s\n", color.HighlightUserInput(secretName), english.WordSeries(envs, "and")) errorsForEnvironments := make(map[string]error) for envName, value := range values { err := o.putSecretInEnv(secretName, envName, value) if err != nil { errorsForEnvironments[envName] = err continue } } for envName := range errorsForEnvironments { log.Errorf("Failed to put secret %s in environment %s. See error message below.\n", color.HighlightUserInput(secretName), color.HighlightUserInput(envName)) } if len(errorsForEnvironments) != 0 { return &errSecretFailedInSomeEnvironments{ secretName: secretName, errorsForEnvironments: errorsForEnvironments, } } return nil } func (o *secretInitOpts) putSecretInEnv(secretName, envName, value string) error { name := fmt.Sprintf(fmtSecretParameterName, o.appName, envName, secretName) in := ssm.PutSecretInput{ Name: name, Value: value, Overwrite: o.overwrite, Tags: map[string]string{ deploy.AppTagKey: o.appName, deploy.EnvTagKey: envName, }, } out, err := o.secretPutters[envName].PutSecret(in) if err != nil { var targetErr *ssm.ErrParameterAlreadyExists if errors.As(err, &targetErr) { o.shouldShowOverwriteHint = true log.Successf("Secret %s already exists in environment %s as %s. Did not overwrite. \n", color.HighlightUserInput(secretName), color.HighlightUserInput(envName), color.HighlightResource(name)) return nil } return err } version := aws.Int64Value(out.Version) if version != 1 { log.Successln(fmt.Sprintf("Secret %s already exists in environment %s. Overwritten.", name, color.HighlightUserInput(envName))) return nil } log.Successln(fmt.Sprintf("Successfully put secret %s in environment %s as %s.", color.HighlightUserInput(secretName), color.HighlightUserInput(envName), color.HighlightResource(name))) return nil } func (o *secretInitOpts) parseSecretsInputFile() (map[string]map[string]string, error) { raw, err := o.readFile() if err != nil { return nil, err } type inputFile struct { Secrets map[string]map[string]string `yaml:",inline"` } var f inputFile if err := yaml.Unmarshal(raw, &f); err != nil { return nil, fmt.Errorf("unmarshal input file: %w", err) } return f.Secrets, nil } func (o *secretInitOpts) askForAppName() error { if o.appName != "" { return nil } app, err := o.selector.Application(secretInitAppPrompt, secretInitAppPromptHelp) if err != nil { return fmt.Errorf("ask for an application to add the secret to: %w", err) } o.appName = app return nil } func (o *secretInitOpts) askForSecretName() error { if o.name != "" { return nil } name, err := o.prompter.Get(secretInitSecretNamePrompt, secretInitSecretNamePromptHelp, validateSecretName, prompt.WithFinalMessage("Secret name: ")) if err != nil { return fmt.Errorf("ask for the secret name: %w", err) } o.name = name return nil } func (o *secretInitOpts) askForSecretValues() error { if o.values != nil { return nil } envs, err := o.store.ListEnvironments(o.appName) if err != nil { return fmt.Errorf("list environments in app %s: %w", o.appName, err) } if len(envs) == 0 { log.Errorf("Secrets are environment-level resources. Please run %s before running %s.\n", color.HighlightCode("copilot env init"), color.HighlightCode("copilot secret init")) return fmt.Errorf("no environment is found in app %s", o.appName) } values := make(map[string]string) for _, env := range envs { value, err := o.prompter.GetSecret( fmt.Sprintf(fmtSecretInitSecretValuePrompt, color.HighlightUserInput(o.name), env.Name), fmt.Sprintf(fmtSecretInitSecretValuePromptHelp, color.HighlightUserInput(o.name), env.Name), prompt.WithFinalMessage(fmt.Sprintf("%s secret value:", cases.Title(language.English).String(env.Name))), ) if err != nil { return fmt.Errorf("get secret value for %s in environment %s: %w", color.HighlightUserInput(o.name), env.Name, err) } if value != "" { values[env.Name] = value } } o.values = values return nil } // RecommendActions shows recommended actions to do after running `secret init`. func (o *secretInitOpts) RecommendActions() error { secretsManifestExample := "secrets:" for secretName := range o.secretValues { currSecret := fmt.Sprintf("%s: %s", secretName, fmt.Sprintf(fmtSecretParameterNameMftExample, secretName)) secretsManifestExample = fmt.Sprintf("%s\n%s", secretsManifestExample, fmt.Sprintf(" %s", currSecret)) } log.Infoln("You can refer to these secrets from your manifest file by editing the `secrets` section.") log.Infoln(color.HighlightCodeBlock(secretsManifestExample)) return nil } type errSecretFailedInSomeEnvironments struct { secretName string errorsForEnvironments map[string]error } type errBatchPutSecretsFailed struct { errors []*errSecretFailedInSomeEnvironments } func (e *errSecretFailedInSomeEnvironments) Error() string { // Sort failure messages by environment names. var envs []string for env := range e.errorsForEnvironments { envs = append(envs, env) } sort.Strings(envs) out := make([]string, 0) for _, env := range envs { out = append(out, fmt.Sprintf("put secret %s in environment %s: %s", e.secretName, env, e.errorsForEnvironments[env].Error())) } return strings.Join(out, "\n") } func (e *errSecretFailedInSomeEnvironments) name() string { return e.secretName } func (e *errBatchPutSecretsFailed) Error() string { out := []string{ "batch put secrets:", } sort.SliceStable(e.errors, func(i, j int) bool { return e.errors[i].name() < e.errors[j].name() }) for _, err := range e.errors { out = append(out, err.Error()) } return strings.Join(out, "\n") } func (o *secretInitOpts) targetEnv(envName string) (*config.Environment, error) { env, err := o.store.GetEnvironment(o.appName, envName) if err != nil { return nil, fmt.Errorf("get environment %s in application %s: %w", envName, o.appName, err) } return env, nil } // buildSecretInitCmd build the command for creating a new secret or updating an existing one. func buildSecretInitCmd() *cobra.Command { vars := secretInitVars{} cmd := &cobra.Command{ Use: "init", Short: "Create or update secrets in SSM Parameter Store.", Example: ` Create a secret with prompts. /code $ copilot secret init Create a secret named db-password in multiple environments. /code $ copilot secret init --name db-password Create secrets from input.yml. For the format of the YAML file, please see https://aws.github.io/copilot-cli/docs/commands/secret-init/. /code $ copilot secret init --cli-input-yaml input.yml`, RunE: runCmdE(func(cmd *cobra.Command, args []string) error { opts, err := newSecretInitOpts(vars) if err != nil { return err } if err := opts.Validate(); err != nil { return err } if err := opts.Ask(); err != nil { return err } err = opts.Execute() if opts.shouldShowOverwriteHint { log.Warningf("If you want to overwrite an existing secret, use the %s flag.\n", color.HighlightCode(fmt.Sprintf("--%s", overwriteFlag))) } if err != nil { return err } if err := opts.RecommendActions(); err != nil { return err } return nil }), } cmd.Flags().StringVarP(&vars.appName, appFlag, appFlagShort, tryReadingAppName(), appFlagDescription) cmd.Flags().StringVarP(&vars.name, nameFlag, nameFlagShort, "", secretNameFlagDescription) cmd.Flags().StringToStringVar(&vars.values, valuesFlag, nil, secretValuesFlagDescription) cmd.Flags().BoolVar(&vars.overwrite, overwriteFlag, false, secretOverwriteFlagDescription) cmd.Flags().StringVar(&vars.inputFilePath, inputFilePathFlag, "", secretInputFilePathFlagDescription) return cmd }
528
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package cli import ( "errors" "fmt" "path/filepath" "testing" "github.com/aws/aws-sdk-go/aws" "github.com/aws/copilot-cli/internal/pkg/deploy" "github.com/aws/copilot-cli/internal/pkg/config" "github.com/aws/copilot-cli/internal/pkg/aws/ssm" "github.com/aws/copilot-cli/internal/pkg/cli/mocks" "github.com/golang/mock/gomock" "github.com/spf13/afero" "github.com/stretchr/testify/require" ) type secretInitMocks struct { mockFS afero.Fs mockStore *mocks.Mockstore } func TestSecretInitOpts_Validate(t *testing.T) { testCases := map[string]struct { inApp string inName string inValues map[string]string inOverwrite bool inInputFilePath string setupMocks func(m secretInitMocks) wantedError error }{ "skip validation if app flag is not set": { setupMocks: func(m secretInitMocks) {}, }, "valid with input file": { inInputFilePath: "./deep/secrets.yml", inOverwrite: true, setupMocks: func(m secretInitMocks) { m.mockFS.MkdirAll("deep", 0755) afero.WriteFile(m.mockFS, "deep/secrets.yml", []byte("FROM nginx"), 0644) }, }, "valid with name and value": { inName: "where_is_the_dragon", inValues: map[string]string{ "good_village": "on_top_of_the_mountain", "bad_village": "by_the_volcano", }, inApp: "dragon_slaying", inOverwrite: true, setupMocks: func(m secretInitMocks) { m.mockStore.EXPECT().GetApplication("dragon_slaying").Return(&config.Application{}, nil) m.mockStore.EXPECT().GetEnvironment("dragon_slaying", "good_village").Return(&config.Environment{}, nil) m.mockStore.EXPECT().GetEnvironment("dragon_slaying", "bad_village").Return(&config.Environment{}, nil) }, }, "error getting app": { inApp: "dragon_befriending", setupMocks: func(m secretInitMocks) { m.mockStore.EXPECT().GetApplication("dragon_befriending").Return(&config.Application{}, errors.New("some error")) }, wantedError: errors.New("get application dragon_befriending: some error"), }, "error getting env from the app": { inName: "where_is_the_dragon", inValues: map[string]string{ "good_village": "on_top_of_the_mountain", "bad_village": "by_the_volcano", "neutral_village": "there_is_no_such_village", }, inApp: "dragon_slaying", setupMocks: func(m secretInitMocks) { m.mockStore.EXPECT().GetApplication("dragon_slaying").Return(&config.Application{}, nil) m.mockStore.EXPECT().GetEnvironment("dragon_slaying", "good_village").Return(&config.Environment{}, nil).MinTimes(0).MaxTimes(1) m.mockStore.EXPECT().GetEnvironment("dragon_slaying", "bad_village").Return(&config.Environment{}, nil).MinTimes(0).MaxTimes(1) m.mockStore.EXPECT().GetEnvironment("dragon_slaying", "neutral_village").Return(nil, errors.New("some error")) }, wantedError: errors.New("get environment neutral_village in application dragon_slaying: some error"), }, "invalid input file name": { inInputFilePath: "weird/path/to/secrets", setupMocks: func(m secretInitMocks) {}, wantedError: fmt.Errorf("open %s: file does not exist", filepath.FromSlash("weird/path/to/secrets")), }, "error if input file name is specified with name": { inName: "db-password", inInputFilePath: "path/to/file", setupMocks: func(m secretInitMocks) {}, wantedError: errors.New("cannot specify `--cli-input-yaml` with `--name`"), }, "error if input file name is specified with values": { inValues: map[string]string{ "test": "test-db", "prod": "prod-db", }, inInputFilePath: "path/to/file", setupMocks: func(m secretInitMocks) {}, wantedError: errors.New("cannot specify `--cli-input-yaml` with `--values`"), }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { ctrl := gomock.NewController(t) defer ctrl.Finish() mockStore := mocks.NewMockstore(ctrl) opts := secretInitOpts{ secretInitVars: secretInitVars{ appName: tc.inApp, name: tc.inName, values: tc.inValues, inputFilePath: tc.inInputFilePath, overwrite: tc.inOverwrite, }, fs: &afero.Afero{Fs: afero.NewMemMapFs()}, store: mockStore, } m := secretInitMocks{ mockFS: opts.fs, mockStore: mockStore, } tc.setupMocks(m) // WHEN err := opts.Validate() // THEN if tc.wantedError != nil { require.EqualError(t, err, tc.wantedError.Error()) } else { require.NoError(t, err) } }) } } type secretInitAskMocks struct { mockStore *mocks.Mockstore mockPrompter *mocks.Mockprompter mockSelector *mocks.MockappSelector } func TestSecretInitOpts_Ask(t *testing.T) { var ( wantedName = "db-password" wantedApp = "my-app" wantedValues = map[string]string{ "test": "test-password", "dev": "dev-password", "prod": "prod-password", } wantedVars = secretInitVars{ appName: wantedApp, name: wantedName, values: wantedValues, } ) testCases := map[string]struct { inAppName string inName string inValues map[string]string setupMocks func(m secretInitAskMocks) wantedVars secretInitVars wantedError error }{ "prompt to select an app if not specified": { inName: wantedName, inValues: wantedValues, setupMocks: func(m secretInitAskMocks) { m.mockSelector.EXPECT().Application(secretInitAppPrompt, gomock.Any()).Return(wantedApp, nil) }, wantedVars: wantedVars, }, "error prompting to select an app": { setupMocks: func(m secretInitAskMocks) { m.mockSelector.EXPECT().Application(secretInitAppPrompt, gomock.Any()).Return("", errors.New("some error")) }, wantedError: errors.New("ask for an application to add the secret to: some error"), }, "do not prompt for app if specified": { inAppName: wantedApp, inName: wantedName, inValues: wantedValues, setupMocks: func(m secretInitAskMocks) { m.mockSelector.EXPECT().Application(gomock.Any(), gomock.Any()).Times(0) }, wantedVars: secretInitVars{ appName: wantedApp, name: wantedName, values: wantedValues, }, }, "ask for a secret name if not specified": { inAppName: wantedApp, inValues: wantedValues, setupMocks: func(m secretInitAskMocks) { m.mockPrompter.EXPECT().Get(secretInitSecretNamePrompt, gomock.Any(), gomock.Any(), gomock.Any()). Return("db-password", nil) }, wantedVars: wantedVars, }, "error prompting for a secret name": { inAppName: wantedApp, inValues: wantedValues, setupMocks: func(m secretInitAskMocks) { m.mockPrompter.EXPECT().Get(secretInitSecretNamePrompt, gomock.Any(), gomock.Any(), gomock.Any()). Return("", errors.New("some error")) }, wantedError: errors.New("ask for the secret name: some error"), }, "do not ask for a secret name if specified": { inName: "db-password", inAppName: wantedApp, inValues: wantedValues, setupMocks: func(m secretInitAskMocks) { m.mockPrompter.EXPECT().Get(secretInitSecretNamePrompt, gomock.Any(), gomock.Any(), gomock.Any()).Times(0) }, wantedVars: wantedVars, }, "ask for values for each existing environment if not specified": { inAppName: wantedApp, inName: wantedName, setupMocks: func(m secretInitAskMocks) { m.mockStore.EXPECT().ListEnvironments("my-app").Return([]*config.Environment{ { Name: "test", }, { Name: "dev", }, { Name: "prod", }, }, nil) m.mockPrompter.EXPECT().GetSecret(fmt.Sprintf(fmtSecretInitSecretValuePrompt, "db-password", "test"), gomock.Any(), gomock.Any()). Return("test-password", nil) m.mockPrompter.EXPECT().GetSecret(fmt.Sprintf(fmtSecretInitSecretValuePrompt, "db-password", "dev"), gomock.Any(), gomock.Any()). Return("dev-password", nil) m.mockPrompter.EXPECT().GetSecret(fmt.Sprintf(fmtSecretInitSecretValuePrompt, "db-password", "prod"), gomock.Any(), gomock.Any()). Return("prod-password", nil) }, wantedVars: wantedVars, }, "error listing environments": { inAppName: wantedApp, inName: wantedName, setupMocks: func(m secretInitAskMocks) { m.mockStore.EXPECT().ListEnvironments("my-app").Return(nil, errors.New("some error")) }, wantedError: errors.New("list environments in app my-app: some error"), }, "error prompting for values": { inAppName: wantedApp, inName: wantedName, setupMocks: func(m secretInitAskMocks) { m.mockStore.EXPECT().ListEnvironments("my-app").Return([]*config.Environment{ { Name: "test", }, { Name: "dev", }, { Name: "prod", }, }, nil) m.mockPrompter.EXPECT().GetSecret(fmt.Sprintf(fmtSecretInitSecretValuePrompt, "db-password", "test"), gomock.Any(), gomock.Any()). Return("", errors.New("some error")) m.mockPrompter.EXPECT().GetSecret(fmt.Sprintf(fmtSecretInitSecretValuePrompt, "db-password", "dev"), gomock.Any(), gomock.Any()).MinTimes(0).MaxTimes(1) m.mockPrompter.EXPECT().GetSecret(fmt.Sprintf(fmtSecretInitSecretValuePrompt, "db-password", "prod"), gomock.Any(), gomock.Any()).MinTimes(0).MaxTimes(1) }, wantedError: errors.New("get secret value for db-password in environment test: some error"), }, "error if no env is found": { inAppName: wantedApp, inName: wantedName, setupMocks: func(m secretInitAskMocks) { m.mockStore.EXPECT().ListEnvironments(wantedApp).Return([]*config.Environment{}, nil) }, wantedError: errors.New("no environment is found in app my-app"), }, "do not ask for values if specified": { inAppName: wantedApp, inName: wantedName, inValues: wantedValues, setupMocks: func(m secretInitAskMocks) {}, wantedVars: wantedVars, }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { ctrl := gomock.NewController(t) defer ctrl.Finish() m := secretInitAskMocks{ mockPrompter: mocks.NewMockprompter(ctrl), mockSelector: mocks.NewMockappSelector(ctrl), mockStore: mocks.NewMockstore(ctrl), } opts := secretInitOpts{ secretInitVars: secretInitVars{ appName: tc.inAppName, name: tc.inName, values: tc.inValues, }, prompter: m.mockPrompter, store: m.mockStore, selector: m.mockSelector, } tc.setupMocks(m) err := opts.Ask() if tc.wantedError == nil { require.NoError(t, err) require.Equal(t, tc.wantedVars, opts.secretInitVars) } else { require.EqualError(t, tc.wantedError, err.Error()) } }) } } type secretInitExecuteMocks struct { mockStore *mocks.Mockstore mockSecretPutter *mocks.MocksecretPutter mockEnvCompatibilityChecker *mocks.MockversionCompatibilityChecker } func TestSecretInitOpts_Execute(t *testing.T) { var ( testApp = "test-app" testName = "db-password" testValues = map[string]string{ "test": "test-password", "prod": "prod-password", } ) testCases := map[string]struct { inAppName string inName string inValues map[string]string inInputFilePath string inOverwrite bool mockInputFileContent []byte setupMocks func(m secretInitExecuteMocks) wantedError error }{ "successfully create secrets in two environments": { inAppName: testApp, inName: testName, inValues: testValues, setupMocks: func(m secretInitExecuteMocks) { m.mockSecretPutter.EXPECT().PutSecret(ssm.PutSecretInput{ Name: "/copilot/test-app/test/secrets/db-password", Value: "test-password", Overwrite: false, Tags: map[string]string{ deploy.AppTagKey: "test-app", deploy.EnvTagKey: "test", }, }).Return(&ssm.PutSecretOutput{ Version: aws.Int64(1), }, nil) m.mockSecretPutter.EXPECT().PutSecret(ssm.PutSecretInput{ Name: "/copilot/test-app/prod/secrets/db-password", Value: "prod-password", Overwrite: false, Tags: map[string]string{ deploy.AppTagKey: "test-app", deploy.EnvTagKey: "prod", }, }).Return(&ssm.PutSecretOutput{ Version: aws.Int64(1), }, nil) m.mockEnvCompatibilityChecker.EXPECT().Version().Return("v1.10.0", nil).Times(2) }, }, "should make calls to overwrite if overwrite is specified": { inAppName: testApp, inName: testName, inValues: testValues, inOverwrite: true, setupMocks: func(m secretInitExecuteMocks) { m.mockSecretPutter.EXPECT().PutSecret(ssm.PutSecretInput{ Name: "/copilot/test-app/test/secrets/db-password", Value: "test-password", Overwrite: true, Tags: map[string]string{ deploy.AppTagKey: "test-app", deploy.EnvTagKey: "test", }, }).Return(&ssm.PutSecretOutput{ Version: aws.Int64(1), }, nil) m.mockSecretPutter.EXPECT().PutSecret(ssm.PutSecretInput{ Name: "/copilot/test-app/prod/secrets/db-password", Value: "prod-password", Overwrite: true, Tags: map[string]string{ deploy.AppTagKey: "test-app", deploy.EnvTagKey: "prod", }, }).Return(&ssm.PutSecretOutput{ Version: aws.Int64(1), }, nil) m.mockEnvCompatibilityChecker.EXPECT().Version().Return("v1.10.0", nil).Times(2) }, }, "do not throw error if parameter already exists": { inAppName: testApp, inName: testName, inValues: testValues, setupMocks: func(m secretInitExecuteMocks) { m.mockSecretPutter.EXPECT().PutSecret(ssm.PutSecretInput{ Name: "/copilot/test-app/test/secrets/db-password", Value: "test-password", Overwrite: false, Tags: map[string]string{ deploy.AppTagKey: "test-app", deploy.EnvTagKey: "test", }, }).Return(nil, &ssm.ErrParameterAlreadyExists{}) m.mockSecretPutter.EXPECT().PutSecret(ssm.PutSecretInput{ Name: "/copilot/test-app/prod/secrets/db-password", Value: "prod-password", Overwrite: false, Tags: map[string]string{ deploy.AppTagKey: "test-app", deploy.EnvTagKey: "prod", }, }).Return(&ssm.PutSecretOutput{ Version: aws.Int64(1), }, nil) m.mockEnvCompatibilityChecker.EXPECT().Version().Return("v1.10.0", nil).Times(2) }, }, "a secret fails to create in some environments": { inAppName: testApp, inName: testName, inValues: testValues, setupMocks: func(m secretInitExecuteMocks) { m.mockSecretPutter.EXPECT().PutSecret(ssm.PutSecretInput{ Name: "/copilot/test-app/test/secrets/db-password", Value: "test-password", Overwrite: false, Tags: map[string]string{ deploy.AppTagKey: "test-app", deploy.EnvTagKey: "test", }, }).Return(nil, errors.New("some error")) m.mockSecretPutter.EXPECT().PutSecret(ssm.PutSecretInput{ Name: "/copilot/test-app/prod/secrets/db-password", Value: "prod-password", Overwrite: false, Tags: map[string]string{ deploy.AppTagKey: "test-app", deploy.EnvTagKey: "prod", }, }).Return(&ssm.PutSecretOutput{ Version: aws.Int64(1), }, nil) m.mockEnvCompatibilityChecker.EXPECT().Version().Return("v1.10.0", nil).Times(2) }, wantedError: &errSecretFailedInSomeEnvironments{ secretName: testName, errorsForEnvironments: map[string]error{ "test": errors.New("some error"), }, }, }, "some secrets fail to create during a batch operation": { inAppName: testApp, inInputFilePath: "some/file", mockInputFileContent: []byte(`db-password: test: test-password prod: prod-password db-host: test: test-host`), setupMocks: func(m secretInitExecuteMocks) { m.mockSecretPutter.EXPECT().PutSecret(ssm.PutSecretInput{ Name: "/copilot/test-app/test/secrets/db-password", Value: "test-password", Overwrite: false, Tags: map[string]string{ deploy.AppTagKey: "test-app", deploy.EnvTagKey: "test", }, }).Return(nil, errors.New("some error for db-password in test")) m.mockSecretPutter.EXPECT().PutSecret(ssm.PutSecretInput{ Name: "/copilot/test-app/prod/secrets/db-password", Value: "prod-password", Overwrite: false, Tags: map[string]string{ deploy.AppTagKey: "test-app", deploy.EnvTagKey: "prod", }, }).Return(&ssm.PutSecretOutput{ Version: aws.Int64(1), }, nil) m.mockSecretPutter.EXPECT().PutSecret(ssm.PutSecretInput{ Name: "/copilot/test-app/test/secrets/db-host", Value: "test-host", Overwrite: false, Tags: map[string]string{ deploy.AppTagKey: "test-app", deploy.EnvTagKey: "test", }, }).Return(nil, errors.New("some error for db-host in test")) m.mockEnvCompatibilityChecker.EXPECT().Version().Return("v1.10.0", nil).Times(2) }, wantedError: &errBatchPutSecretsFailed{ errors: []*errSecretFailedInSomeEnvironments{ { secretName: "db-password", errorsForEnvironments: map[string]error{ "test": errors.New("some error for db-password in test"), }, }, { secretName: "db-host", errorsForEnvironments: map[string]error{ "test": errors.New("some error for db-host in test"), }, }, }, }, }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { ctrl := gomock.NewController(t) defer ctrl.Finish() m := secretInitExecuteMocks{ mockStore: mocks.NewMockstore(ctrl), mockSecretPutter: mocks.NewMocksecretPutter(ctrl), mockEnvCompatibilityChecker: mocks.NewMockversionCompatibilityChecker(ctrl), } tc.setupMocks(m) opts := secretInitOpts{ secretInitVars: secretInitVars{ appName: tc.inAppName, name: tc.inName, values: tc.inValues, overwrite: tc.inOverwrite, inputFilePath: tc.inInputFilePath, }, store: m.mockStore, secretPutters: make(map[string]secretPutter), envCompatibilityChecker: make(map[string]versionCompatibilityChecker), readFile: func() ([]byte, error) { return tc.mockInputFileContent, nil }, } opts.configureClientsForEnv = func(envName string) error { opts.secretPutters[envName] = m.mockSecretPutter opts.envCompatibilityChecker[envName] = m.mockEnvCompatibilityChecker return nil } err := opts.Execute() if tc.wantedError == nil { require.NoError(t, err) } else { require.EqualError(t, err, tc.wantedError.Error()) } }) } } func Test_SecretInitParseSecretsInputFile(t *testing.T) { t.Run("success", func(t *testing.T) { opts := secretInitOpts{ readFile: func() ([]byte, error) { raw := `db-password: test: test-password prod: prod-password db-host: test: test-host prod: prod-host test-only-secret: test: test-only` return []byte(raw), nil }, } expected := map[string]map[string]string{ "db-password": { "test": "test-password", "prod": "prod-password", }, "db-host": { "test": "test-host", "prod": "prod-host", }, "test-only-secret": { "test": "test-only", }, } secrets, err := opts.parseSecretsInputFile() require.NoError(t, err) require.Equal(t, expected, secrets) }) }
643
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package cli import ( "github.com/aws/copilot-cli/cmd/copilot/template" "github.com/aws/copilot-cli/internal/pkg/cli/group" "github.com/spf13/cobra" ) // BuildStorageCmd is the top level command for storage func BuildStorageCmd() *cobra.Command { cmd := &cobra.Command{ Use: "storage", Short: "Commands for working with storage and databases.", Long: `Commands for working with storage and databases. Augment your services with S3 buckets, NoSQL and SQL databases.`, } cmd.AddCommand(buildStorageInitCmd()) cmd.SetUsageTemplate(template.Usage) cmd.Annotations = map[string]string{ "group": group.Extend, } return cmd }
30
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package cli import ( "encoding" "errors" "fmt" "strconv" "github.com/aws/aws-sdk-go/aws" "github.com/aws/aws-sdk-go/service/ssm" "github.com/aws/copilot-cli/internal/pkg/aws/identity" "github.com/aws/copilot-cli/internal/pkg/aws/sessions" "github.com/aws/copilot-cli/internal/pkg/manifest/manifestinfo" "github.com/dustin/go-humanize/english" "github.com/aws/copilot-cli/internal/pkg/addon" "github.com/aws/copilot-cli/internal/pkg/config" "github.com/aws/copilot-cli/internal/pkg/template" "github.com/aws/copilot-cli/internal/pkg/term/color" "github.com/aws/copilot-cli/internal/pkg/term/log" "github.com/aws/copilot-cli/internal/pkg/term/prompt" "github.com/aws/copilot-cli/internal/pkg/term/selector" "github.com/aws/copilot-cli/internal/pkg/workspace" "github.com/spf13/afero" "github.com/spf13/cobra" "github.com/spf13/pflag" ) const ( dynamoDBStorageType = "DynamoDB" s3StorageType = "S3" rdsStorageType = "Aurora" ) var storageTypes = []string{ dynamoDBStorageType, s3StorageType, rdsStorageType, } // Displayed options for storage types const ( dynamoDBStorageTypeOption = "DynamoDB" s3StorageTypeOption = "S3" rdsStorageTypeOption = "Aurora Serverless" ) const ( s3BucketFriendlyText = "S3 Bucket" dynamoDBTableFriendlyText = "DynamoDB Table" rdsFriendlyText = "Database Cluster" ) const ( lifecycleEnvironmentLevel = "environment" lifecycleWorkloadLevel = "workload" lifecycleEnvironmentFriendlyText = "No, the storage should be created and deleted at the environment level" fmtLifecycleWorkloadFriendlyText = "Yes, the storage should be created and deleted at the same time as %s" ) var validLifecycleOptions = []string{lifecycleWorkloadLevel, lifecycleEnvironmentLevel} // General-purpose prompts, collected for all storage resources. var ( storageInitTypeHelp = `The type of storage you'd like to add to your workload. DynamoDB is a key-value and document database that delivers single-digit millisecond performance at any scale. S3 is a web object store built to store and retrieve any amount of data from anywhere on the Internet. Aurora Serverless is an on-demand autoscaling configuration for Amazon Aurora, a MySQL and PostgreSQL-compatible relational database. ` fmtStorageInitNamePrompt = "What would you like to " + color.Emphasize("name") + " this %s?" storageInitNameHelp = "The name of this storage resource. You can use the following characters: a-zA-Z0-9-_" storageInitSvcPrompt = "Which " + color.Emphasize("workload") + " needs access to the storage?" fmtStorageInitLifecyclePrompt = "Do you want the storage to be created and deleted with the %s service?" ) // DDB-specific questions and help prompts. var ( fmtStorageInitDDBKeyPrompt = "What would you like to name the %s of this %s?" storageInitDDBPartitionKeyHelp = "The partition key of this table. This key, along with the sort key, will make up the primary key." storageInitDDBSortKeyConfirm = "Would you like to add a sort key to this table?" storageInitDDBSortKeyHelp = "The sort key of this table. Without a sort key, the partition key " + color.Emphasize("must") + ` be unique on the table. You must specify a sort key if you wish to add alternate sort keys later.` fmtStorageInitDDBKeyTypePrompt = "What datatype is this %s?" fmtStorageInitDDBKeyTypeHelp = "The datatype to store in the %s. N is number, S is string, B is binary." storageInitDDBLSIPrompt = "Would you like to add any alternate sort keys to this table?" storageInitDDBLSIHelp = `Alternate sort keys create Local Secondary Indexes, which allow you to sort the table using the same partition key but a different sort key. You may specify up to 5 alternate sort keys.` storageInitDDBMoreLSIPrompt = "Would you like to add more alternate sort keys to this table?" storageInitDDBLSINamePrompt = "What would you like to name this " + color.Emphasize("alternate sort key") + "?" storageInitDDBLSINameHelp = "You can use the characters [a-zA-Z0-9.-_]" ) // DynamoDB specific constants and variables. const ( ddbKeyString = "key" ddbStringType = "String" ddbIntType = "Number" ddbBinaryType = "Binary" ) var attributeTypes = []string{ ddbStringType, ddbIntType, ddbBinaryType, } // RDS Aurora Serverless specific questions and help prompts. var ( storageInitRDSInitialDBNamePrompt = "What would you like to name the initial database in your cluster?" storageInitRDSDBEnginePrompt = "Which database engine would you like to use?" ) // RDS Aurora Serverless specific constants and variables. const ( auroraServerlessVersionV1 = "v1" auroraServerlessVersionV2 = "v2" defaultAuroraServerlessVersion = auroraServerlessVersionV2 fmtRDSStorageNameDefault = "%s-cluster" engineTypeMySQL = addon.RDSEngineTypeMySQL engineTypePostgreSQL = addon.RDSEngineTypePostgreSQL ) var auroraServerlessVersions = []string{ auroraServerlessVersionV1, auroraServerlessVersionV2, } var engineTypes = []string{ engineTypeMySQL, engineTypePostgreSQL, } const workloadTypeNonLocal = "Non Local" const ( blobDescriptionParameters = "parameters" blobDescriptionTemplate = "template" ) type initStorageVars struct { storageType string storageName string workloadName string lifecycle string addIngressFrom string // Dynamo DB specific values collected via flags or prompts partitionKey string sortKey string lsiSorts []string // lsi sort keys collected as "name:T" where T is one of [SNB] noLSI bool noSort bool // RDS Aurora Serverless specific values collected via flags or prompts auroraServerlessVersion string rdsEngine string rdsParameterGroup string rdsInitialDBName string } type initStorageOpts struct { initStorageVars appName string fs afero.Fs ws wsReadWriter store store sel wsSelector configSel configSelector prompt prompter // Cached data. workloadType string workloadExists bool } func newStorageInitOpts(vars initStorageVars) (*initStorageOpts, error) { sessProvider := sessions.ImmutableProvider(sessions.UserAgentExtras("storage init")) defaultSession, err := sessProvider.Default() if err != nil { return nil, err } fs := afero.NewOsFs() ws, err := workspace.Use(fs) if err != nil { return nil, err } store := config.NewSSMStore(identity.New(defaultSession), ssm.New(defaultSession), aws.StringValue(defaultSession.Config.Region)) prompter := prompt.New() return &initStorageOpts{ initStorageVars: vars, appName: tryReadingAppName(), fs: fs, store: store, ws: ws, sel: selector.NewLocalWorkloadSelector(prompter, store, ws), configSel: selector.NewConfigSelector(prompter, store), prompt: prompter, }, nil } // Validate returns an error for any invalid optional flags. func (o *initStorageOpts) Validate() error { if o.appName == "" { return errNoAppInWorkspace } if o.addIngressFrom != "" { if err := o.validateAddIngressFrom(); err != nil { return err } } // --no-lsi and --lsi are mutually exclusive. if o.noLSI && len(o.lsiSorts) != 0 { return fmt.Errorf("validate LSI configuration: cannot specify --no-lsi and --lsi options at once") } // --no-sort and --lsi are mutually exclusive. if o.noSort && len(o.lsiSorts) != 0 { return fmt.Errorf("validate LSI configuration: cannot specify --no-sort and --lsi options at once") } if o.auroraServerlessVersion != "" { if err := o.validateServerlessVersion(); err != nil { return err } } return nil } func (o *initStorageOpts) validateAddIngressFrom() error { if o.workloadName != "" { return fmt.Errorf("--%s cannot be specified with --%s", workloadFlag, storageAddIngressFromFlag) } if o.lifecycle == lifecycleWorkloadLevel { return fmt.Errorf("--%s cannot be %s when --%s is used", storageLifecycleFlag, lifecycleWorkloadLevel, storageAddIngressFromFlag) } if o.storageName == "" { return fmt.Errorf("--%s is required when --%s is used", nameFlag, storageAddIngressFromFlag) } if o.storageType == "" { return fmt.Errorf("--%s is required when --%s is used", storageTypeFlag, storageAddIngressFromFlag) } exist, err := o.ws.WorkloadExists(o.addIngressFrom) if err != nil { return fmt.Errorf("check if %s exists in the workspace: %w", o.addIngressFrom, err) } if !exist { return fmt.Errorf("workload %s not found in the workspace", o.addIngressFrom) } return nil } func (o *initStorageOpts) validateServerlessVersion() error { for _, valid := range auroraServerlessVersions { if o.auroraServerlessVersion == valid { return nil } } fmtErrInvalidServerlessVersion := "invalid Aurora Serverless version %s: must be one of %s" return fmt.Errorf(fmtErrInvalidServerlessVersion, o.auroraServerlessVersion, prettify(auroraServerlessVersions)) } // Ask asks for fields that are required but not passed in. func (o *initStorageOpts) Ask() error { if o.addIngressFrom != "" { return nil } if err := o.validateOrAskStorageType(); err != nil { return err } if err := o.askWorkload(); err != nil { return err } // Storage name needs to be asked after workload because for Aurora the default storage name uses the workload name. if err := o.validateOrAskStorageName(); err != nil { return err } if err := o.validateOrAskLifecycle(); err != nil { return err } if err := o.validateWorkloadNameWithLifecycle(); err != nil { return err } switch o.storageType { case dynamoDBStorageType: if err := o.validateOrAskDynamoPartitionKey(); err != nil { return err } if err := o.validateOrAskDynamoSortKey(); err != nil { return err } if err := o.validateOrAskDynamoLSIConfig(); err != nil { return err } case rdsStorageType: if err := o.validateOrAskAuroraEngineType(); err != nil { return err } // Ask for initial db name after engine type since the name needs to be validated accordingly. if err := o.validateOrAskAuroraInitialDBName(); err != nil { return err } } return nil } func (o *initStorageOpts) validateOrAskStorageType() error { if o.storageType != "" { return o.validateStorageType() } options := []prompt.Option{ { Value: dynamoDBStorageType, FriendlyText: dynamoDBStorageTypeOption, Hint: "NoSQL", }, { Value: s3StorageType, FriendlyText: s3StorageTypeOption, Hint: "Objects", }, { Value: rdsStorageType, FriendlyText: rdsStorageTypeOption, Hint: "SQL", }, } result, err := o.prompt.SelectOption(o.storageTypePrompt(), storageInitTypeHelp, options, prompt.WithFinalMessage("Storage type:")) if err != nil { return fmt.Errorf("select storage type: %w", err) } o.storageType = result return o.validateStorageType() } func (o *initStorageOpts) storageTypePrompt() string { if o.workloadName == "" { return "What " + color.Emphasize("type") + " of storage would you like to create?" } return fmt.Sprintf("What "+color.Emphasize("type")+" of storage would you like to associate with %s?", color.HighlightUserInput(o.workloadName)) } func (o *initStorageOpts) validateStorageType() error { if err := validateStorageType(o.storageType, validateStorageTypeOpts{ ws: o.ws, workloadName: o.workloadName, }); err != nil { if errors.Is(err, errRDWSNotConnectedToVPC) { log.Errorf(`Your %s needs to be connected to a VPC in order to use a %s resource. You can enable VPC connectivity by updating your manifest with: %s `, manifestinfo.RequestDrivenWebServiceType, o.storageType, color.HighlightCodeBlock(`network: vpc: placement: private`)) } return err } return nil } func (o *initStorageOpts) validateOrAskStorageName() error { if o.storageName != "" { if err := o.validateStorageName(); err != nil { return fmt.Errorf("validate storage name: %w", err) } return nil } var validator func(interface{}) error var friendlyText string switch o.storageType { case s3StorageType: validator = s3BucketNameValidation friendlyText = s3BucketFriendlyText case dynamoDBStorageType: validator = dynamoTableNameValidation friendlyText = dynamoDBTableFriendlyText case rdsStorageType: return o.askStorageNameWithDefault(rdsFriendlyText, fmt.Sprintf(fmtRDSStorageNameDefault, o.workloadName), rdsNameValidation) } name, err := o.prompt.Get(fmt.Sprintf(fmtStorageInitNamePrompt, color.HighlightUserInput(friendlyText)), storageInitNameHelp, validator, prompt.WithFinalMessage("Storage resource name:")) if err != nil { return fmt.Errorf("input storage name: %w", err) } o.storageName = name return nil } func (o *initStorageOpts) validateStorageName() error { switch o.storageType { case dynamoDBStorageType: return dynamoTableNameValidation(o.storageName) case s3StorageType: return s3BucketNameValidation(o.storageName) case rdsStorageType: return rdsNameValidation(o.storageName) default: // use dynamo since it's a superset of s3 return dynamoTableNameValidation(o.storageName) } } func (o *initStorageOpts) askStorageNameWithDefault(friendlyText, defaultName string, validator func(interface{}) error) error { name, err := o.prompt.Get(fmt.Sprintf(fmtStorageInitNamePrompt, color.HighlightUserInput(friendlyText)), storageInitNameHelp, validator, prompt.WithFinalMessage("Storage resource name:"), prompt.WithDefaultInput(defaultName)) if err != nil { return fmt.Errorf("input storage name: %w", err) } o.storageName = name return nil } func (o *initStorageOpts) askWorkload() error { if o.workloadName != "" { return nil } if o.lifecycle == lifecycleWorkloadLevel { return o.askLocalWorkload() } workload, err := o.configSel.Workload(storageInitSvcPrompt, "", o.appName) if err != nil { return fmt.Errorf("select a workload from app %s: %w", o.appName, err) } o.workloadName = workload return nil } func (o *initStorageOpts) askLocalWorkload() error { workload, err := o.sel.Workload(storageInitSvcPrompt, "") if err != nil { return fmt.Errorf("retrieve local workload names: %w", err) } o.workloadName = workload return nil } func (o *initStorageOpts) validateOrAskLifecycle() error { if o.lifecycle != "" { return o.validateStorageLifecycle() } _, err := o.ws.ReadFile(o.ws.WorkloadAddonFileAbsPath(o.workloadName, fmt.Sprintf("%s.yml", o.storageName))) if err == nil { o.lifecycle = lifecycleWorkloadLevel log.Infof("%s %s %s\n", color.Emphasize("Lifecycle:"), "workload-level", color.Faint.Sprintf("(found %s)", o.ws.WorkloadAddonFilePath(o.workloadName, fmt.Sprintf("%s.yml", o.storageName))), ) return nil } if _, ok := err.(*workspace.ErrFileNotExists); !ok { return fmt.Errorf("check if %s addon exists for %s in workspace: %w", o.storageName, o.workloadName, err) } _, err = o.ws.ReadFile(o.ws.EnvAddonFileAbsPath(fmt.Sprintf("%s.yml", o.storageName))) if err == nil { o.lifecycle = lifecycleEnvironmentLevel log.Infof("%s %s %s\n", color.Emphasize("Lifecycle:"), "environment-level", color.Faint.Sprintf("(found %s)", o.ws.EnvAddonFilePath(fmt.Sprintf("%s.yml", o.storageName))), ) return nil } if _, ok := err.(*workspace.ErrFileNotExists); !ok { return fmt.Errorf("check if %s exists as an environment addon in workspace: %w", o.storageName, err) } options := []prompt.Option{ { Value: lifecycleWorkloadLevel, FriendlyText: fmt.Sprintf(fmtLifecycleWorkloadFriendlyText, color.HighlightUserInput(o.workloadName)), }, { Value: lifecycleEnvironmentLevel, FriendlyText: lifecycleEnvironmentFriendlyText, }, } lifecycle, err := o.prompt.SelectOption( fmt.Sprintf(fmtStorageInitLifecyclePrompt, o.workloadName), "", options, prompt.WithFinalMessage("Lifecycle: ")) if err != nil { return fmt.Errorf("ask for lifecycle: %w", err) } o.lifecycle = lifecycle return nil } func (o *initStorageOpts) validateStorageLifecycle() error { for _, valid := range validLifecycleOptions { if o.lifecycle == valid { return nil } } return fmt.Errorf("invalid lifecycle; must be one of %s", english.OxfordWordSeries(applyAll(validLifecycleOptions, strconv.Quote), "or")) } // validateWorkloadNameWithLifecycle requires the workload to be in the workspace if the storage lifecycle is on workload-level. // Otherwise, it only caches whether the workload is present. func (o *initStorageOpts) validateWorkloadNameWithLifecycle() error { if o.lifecycle == lifecycleEnvironmentLevel { hasEnv, err := o.ws.HasEnvironments() if err != nil { return fmt.Errorf("check if environments directory exists in the workspace: %w", err) } if !hasEnv { return &errNoEnvironmentInWorkspace{} } return nil } if o.lifecycle == lifecycleWorkloadLevel { exists, err := o.ws.WorkloadExists(o.workloadName) if err != nil { return fmt.Errorf("check if %s exists in the workspace: %w", o.workloadName, err) } if !exists { return &errWorkloadNotInWorkspace{ workloadName: o.workloadName, } } } return nil } func (o *initStorageOpts) validateOrAskDynamoPartitionKey() error { if o.partitionKey != "" { if err := validateKey(o.partitionKey); err != nil { return fmt.Errorf("validate partition key: %w", err) } return nil } keyPrompt := fmt.Sprintf(fmtStorageInitDDBKeyPrompt, color.HighlightUserInput("partition key"), color.HighlightUserInput(dynamoDBStorageType), ) key, err := o.prompt.Get(keyPrompt, storageInitDDBPartitionKeyHelp, dynamoAttributeNameValidation, prompt.WithFinalMessage("Partition key:"), ) if err != nil { return fmt.Errorf("get DDB partition key: %w", err) } keyTypePrompt := fmt.Sprintf(fmtStorageInitDDBKeyTypePrompt, ddbKeyString) keyTypeHelp := fmt.Sprintf(fmtStorageInitDDBKeyTypeHelp, ddbKeyString) keyType, err := o.prompt.SelectOne(keyTypePrompt, keyTypeHelp, attributeTypes, prompt.WithFinalMessage("Partition key datatype:"), ) if err != nil { return fmt.Errorf("get DDB partition key datatype: %w", err) } o.partitionKey = key + ":" + keyType return nil } func (o *initStorageOpts) validateOrAskDynamoSortKey() error { if o.sortKey != "" { if err := validateKey(o.sortKey); err != nil { return fmt.Errorf("validate sort key: %w", err) } return nil } // If the user has not specified a sort key and has specified the --no-sort flag we don't have to demand it of them. if o.noSort { return nil } response, err := o.prompt.Confirm(storageInitDDBSortKeyConfirm, storageInitDDBSortKeyHelp, prompt.WithFinalMessage("Sort key?")) if err != nil { return fmt.Errorf("confirm DDB sort key: %w", err) } if !response { o.noSort = true return nil } keyPrompt := fmt.Sprintf(fmtStorageInitDDBKeyPrompt, color.HighlightUserInput("sort key"), color.HighlightUserInput(dynamoDBStorageType), ) key, err := o.prompt.Get(keyPrompt, storageInitDDBSortKeyHelp, dynamoAttributeNameValidation, prompt.WithFinalMessage("Sort key:"), ) if err != nil { return fmt.Errorf("get DDB sort key: %w", err) } keyTypePrompt := fmt.Sprintf(fmtStorageInitDDBKeyTypePrompt, ddbKeyString) keyTypeHelp := fmt.Sprintf(fmtStorageInitDDBKeyTypeHelp, ddbKeyString) keyType, err := o.prompt.SelectOne(keyTypePrompt, keyTypeHelp, attributeTypes, prompt.WithFinalMessage("Sort key datatype:"), ) if err != nil { return fmt.Errorf("get DDB sort key datatype: %w", err) } o.sortKey = key + ":" + keyType return nil } func (o *initStorageOpts) validateOrAskDynamoLSIConfig() error { // LSI has already been specified by flags. if len(o.lsiSorts) > 0 { return validateLSIs(o.lsiSorts) } // If --no-lsi has been specified, there is no need to ask for local secondary indices. if o.noLSI { return nil } // If --no-sort has been specified, there is no need to ask for local secondary indices. if o.noSort { o.noLSI = true return nil } lsiTypePrompt := fmt.Sprintf(fmtStorageInitDDBKeyTypePrompt, color.Emphasize("alternate sort key")) lsiTypeHelp := fmt.Sprintf(fmtStorageInitDDBKeyTypeHelp, "alternate sort key") moreLSI, err := o.prompt.Confirm(storageInitDDBLSIPrompt, storageInitDDBLSIHelp, prompt.WithFinalMessage("Additional sort keys?")) if err != nil { return fmt.Errorf("confirm add alternate sort key: %w", err) } for { if len(o.lsiSorts) > 5 { log.Infoln("You may not specify more than 5 alternate sort keys. Continuing...") moreLSI = false } // This will execute last in the loop if moreLSI is set to false by any confirm prompts. if !moreLSI { o.noLSI = len(o.lsiSorts) == 0 return nil } lsiName, err := o.prompt.Get(storageInitDDBLSINamePrompt, storageInitDDBLSINameHelp, dynamoTableNameValidation, prompt.WithFinalMessage("Alternate Sort Key:"), ) if err != nil { return fmt.Errorf("get DDB alternate sort key name: %w", err) } lsiType, err := o.prompt.SelectOne(lsiTypePrompt, lsiTypeHelp, attributeTypes, prompt.WithFinalMessage("Attribute type:"), ) if err != nil { return fmt.Errorf("get DDB alternate sort key type: %w", err) } o.lsiSorts = append(o.lsiSorts, lsiName+":"+lsiType) moreLSI, err = o.prompt.Confirm( storageInitDDBMoreLSIPrompt, storageInitDDBLSIHelp, prompt.WithFinalMessage("Additional sort keys?"), ) if err != nil { return fmt.Errorf("confirm add alternate sort key: %w", err) } } } func (o *initStorageOpts) validateOrAskAuroraEngineType() error { if o.rdsEngine != "" { return validateEngine(o.rdsEngine) } engine, err := o.prompt.SelectOne(storageInitRDSDBEnginePrompt, "", engineTypes, prompt.WithFinalMessage("Database engine:")) if err != nil { return fmt.Errorf("select database engine: %w", err) } o.rdsEngine = engine return nil } func (o *initStorageOpts) validateOrAskAuroraInitialDBName() error { var validator func(interface{}) error switch o.rdsEngine { case engineTypeMySQL: validator = validateMySQLDBName case engineTypePostgreSQL: validator = validatePostgreSQLDBName default: return errors.New("unknown engine type") } if o.rdsInitialDBName != "" { // The flag input is validated here because it needs engine type to determine which validator to use. return validator(o.rdsInitialDBName) } dbName, err := o.prompt.Get(storageInitRDSInitialDBNamePrompt, "", validator, prompt.WithFinalMessage("Initial database name:")) if err != nil { return fmt.Errorf("input initial database name: %w", err) } o.rdsInitialDBName = dbName return nil } // Execute deploys a new environment with CloudFormation and adds it to SSM. func (o *initStorageOpts) Execute() error { o.consumeFlags() if err := o.checkWorkloadExists(); err != nil { return err } if err := o.readWorkloadType(); err != nil { return err } addonBlobs, err := o.addonBlobs() if err != nil { return err } for _, addon := range addonBlobs { path, err := o.ws.Write(addon.blob, addon.path) if err == nil { log.Successf("Wrote CloudFormation %s at %s\n", addon.description, color.HighlightResource(displayPath(path)), ) continue } var errFileExists *workspace.ErrFileExists if !errors.As(err, &errFileExists) { return err } log.Successf("CloudFormation %s already exists at %s, skipping writing it.\n", addon.description, color.HighlightResource(displayPath(addon.path))) if addon.description == blobDescriptionParameters { log.Infoln(indentBy(color.Faint.Sprintf(addon.recommendedAction()), 2)) } } log.Infoln() return nil } func (o *initStorageOpts) consumeFlags() { if o.addIngressFrom == "" { return } o.workloadName = o.addIngressFrom o.lifecycle = lifecycleEnvironmentLevel if o.storageType == rdsStorageType && o.rdsEngine == "" { o.rdsEngine = addon.RDSEngineTypeMySQL } } func (o *initStorageOpts) checkWorkloadExists() error { exist, err := o.ws.WorkloadExists(o.workloadName) if err != nil { return fmt.Errorf("check if %s exists in the workspace: %w", o.workloadName, err) } o.workloadExists = exist return nil } func (o *initStorageOpts) readWorkloadType() error { if !o.workloadExists { o.workloadType = workloadTypeNonLocal return nil } mft, err := o.ws.ReadWorkloadManifest(o.workloadName) if err != nil { return fmt.Errorf("read manifest for %s: %w", o.workloadName, err) } t, err := mft.WorkloadType() if err != nil { return fmt.Errorf("read 'type' from manifest for %s: %w", o.workloadName, err) } o.workloadType = t return nil } type addonBlob struct { path string description string blob encoding.BinaryMarshaler } func (b *addonBlob) recommendedAction() string { data, err := b.blob.MarshalBinary() if err != nil { return "" // Best effort to read the content in order to make suggestions. } return fmt.Sprintf("Check that %s has the following snippet:\n%s", displayPath(b.path), color.HighlightCodeBlock(string(data))) } func (o *initStorageOpts) addonBlobs() ([]addonBlob, error) { type option struct { lifecycle string storageType string } selection := option{o.lifecycle, o.storageType} switch selection { case option{lifecycleWorkloadLevel, s3StorageType}: return o.wkldS3AddonBlobs() case option{lifecycleWorkloadLevel, dynamoDBStorageType}: return o.wkldDDBAddonBlobs() case option{lifecycleWorkloadLevel, rdsStorageType}: return o.wkldRDSAddonBlobs() case option{lifecycleEnvironmentLevel, s3StorageType}: return o.envS3AddonBlobs() case option{lifecycleEnvironmentLevel, dynamoDBStorageType}: return o.envDDBAddonBlobs() case option{lifecycleEnvironmentLevel, rdsStorageType}: return o.envRDSAddonBlobs() } return nil, fmt.Errorf("storage type %s is not supported yet", o.storageType) } func (o *initStorageOpts) wkldDDBAddonBlobs() ([]addonBlob, error) { props, err := o.ddbProps() if err != nil { return nil, err } return []addonBlob{ { path: o.ws.WorkloadAddonFilePath(o.workloadName, fmt.Sprintf("%s.yml", o.storageName)), description: blobDescriptionTemplate, blob: addon.WorkloadDDBTemplate(props), }, }, nil } func (o *initStorageOpts) envDDBAddonBlobs() ([]addonBlob, error) { ingressBlob := addonBlob{ path: o.ws.WorkloadAddonFilePath(o.workloadName, fmt.Sprintf("%s-access-policy.yml", o.storageName)), description: blobDescriptionTemplate, blob: addon.EnvDDBAccessPolicyTemplate(&addon.AccessPolicyProps{ Name: o.storageName, }), } if o.addIngressFrom != "" { return []addonBlob{ingressBlob}, nil } props, err := o.ddbProps() if err != nil { return nil, err } tmplBlob := addonBlob{ path: o.ws.EnvAddonFilePath(fmt.Sprintf("%s.yml", o.storageName)), description: blobDescriptionTemplate, blob: addon.EnvDDBTemplate(props), } if !o.workloadExists { return []addonBlob{tmplBlob}, nil } return []addonBlob{tmplBlob, ingressBlob}, nil } func (o *initStorageOpts) ddbProps() (*addon.DynamoDBProps, error) { props := addon.DynamoDBProps{ StorageProps: &addon.StorageProps{ Name: o.storageName, }, } if err := props.BuildPartitionKey(o.partitionKey); err != nil { return nil, err } hasSortKey, err := props.BuildSortKey(o.noSort, o.sortKey) if err != nil { return nil, err } if hasSortKey { _, err := props.BuildLocalSecondaryIndex(o.noLSI, o.lsiSorts) if err != nil { return nil, err } } return &props, nil } func (o *initStorageOpts) wkldS3AddonBlobs() ([]addonBlob, error) { return []addonBlob{ { path: o.ws.WorkloadAddonFilePath(o.workloadName, fmt.Sprintf("%s.yml", o.storageName)), description: blobDescriptionTemplate, blob: addon.WorkloadS3Template(o.s3Props()), }, }, nil } func (o *initStorageOpts) envS3AddonBlobs() ([]addonBlob, error) { ingressBlob := addonBlob{ path: o.ws.WorkloadAddonFilePath(o.workloadName, fmt.Sprintf("%s-access-policy.yml", o.storageName)), description: blobDescriptionTemplate, blob: addon.EnvS3AccessPolicyTemplate(&addon.AccessPolicyProps{ Name: o.storageName, }), } if o.addIngressFrom != "" { return []addonBlob{ingressBlob}, nil } tmplBlob := addonBlob{ path: o.ws.EnvAddonFilePath(fmt.Sprintf("%s.yml", o.storageName)), description: blobDescriptionTemplate, blob: addon.EnvS3Template(o.s3Props()), } if !o.workloadExists { return []addonBlob{tmplBlob}, nil } return []addonBlob{tmplBlob, ingressBlob}, nil } func (o *initStorageOpts) s3Props() *addon.S3Props { return &addon.S3Props{ StorageProps: &addon.StorageProps{ Name: o.storageName, }, } } func (o *initStorageOpts) wkldRDSAddonBlobs() ([]addonBlob, error) { props, err := o.rdsProps() if err != nil { return nil, err } var tmplBlob encoding.BinaryMarshaler switch { case o.auroraServerlessVersion == auroraServerlessVersionV1 && o.workloadType == manifestinfo.RequestDrivenWebServiceType: tmplBlob = addon.RDWSServerlessV1Template(props) case o.auroraServerlessVersion == auroraServerlessVersionV1 && o.workloadType != manifestinfo.RequestDrivenWebServiceType: tmplBlob = addon.WorkloadServerlessV1Template(props) case o.auroraServerlessVersion == auroraServerlessVersionV2 && o.workloadType == manifestinfo.RequestDrivenWebServiceType: tmplBlob = addon.RDWSServerlessV2Template(props) case o.auroraServerlessVersion == auroraServerlessVersionV2 && o.workloadType != manifestinfo.RequestDrivenWebServiceType: tmplBlob = addon.WorkloadServerlessV2Template(props) default: return nil, fmt.Errorf("unknown combination of serverless version %q and workload type %q", o.auroraServerlessVersion, o.workloadType) } blobs := []addonBlob{{ path: o.ws.WorkloadAddonFilePath(o.workloadName, fmt.Sprintf("%s.yml", o.storageName)), description: blobDescriptionTemplate, blob: tmplBlob, }} if o.workloadType != manifestinfo.RequestDrivenWebServiceType { return blobs, nil } return append(blobs, addonBlob{ path: o.ws.WorkloadAddonFilePath(o.workloadName, workspace.AddonsParametersFileName), description: blobDescriptionParameters, blob: addon.RDWSParamsForRDS(), }), nil } func (o *initStorageOpts) envRDSAddonBlobs() ([]addonBlob, error) { if o.workloadType == manifestinfo.RequestDrivenWebServiceType { return o.envRDSForRDWSAddonBlobs() } if o.addIngressFrom != "" { return nil, nil } props, err := o.rdsProps() if err != nil { return nil, err } tmplBlob := addonBlob{ path: o.ws.EnvAddonFilePath(fmt.Sprintf("%s.yml", o.storageName)), description: blobDescriptionTemplate, blob: addon.EnvServerlessTemplate(props), } paramBlob := addonBlob{ path: o.ws.EnvAddonFilePath(workspace.AddonsParametersFileName), description: blobDescriptionParameters, blob: addon.EnvParamsForRDS(), } return []addonBlob{tmplBlob, paramBlob}, nil } func (o *initStorageOpts) envRDSForRDWSAddonBlobs() ([]addonBlob, error) { rdwsIngressTmplBlob := addonBlob{ path: o.ws.WorkloadAddonFilePath(o.workloadName, fmt.Sprintf("%s-ingress.yml", o.storageName)), description: blobDescriptionTemplate, blob: addon.EnvServerlessRDWSIngressTemplate(addon.RDSIngressProps{ ClusterName: o.storageName, Engine: o.rdsEngine, }), } rdwsIngressParamBlob := addonBlob{ path: o.ws.WorkloadAddonFilePath(o.workloadName, workspace.AddonsParametersFileName), description: blobDescriptionParameters, blob: addon.RDWSParamsForEnvRDS(), } if o.addIngressFrom != "" { return []addonBlob{rdwsIngressTmplBlob, rdwsIngressParamBlob}, nil } props, err := o.rdsProps() if err != nil { return nil, err } tmplBlob := addonBlob{ path: o.ws.EnvAddonFilePath(fmt.Sprintf("%s.yml", o.storageName)), description: blobDescriptionTemplate, blob: addon.EnvServerlessForRDWSTemplate(props), } paramBlob := addonBlob{ path: o.ws.EnvAddonFilePath(workspace.AddonsParametersFileName), description: blobDescriptionParameters, blob: addon.EnvParamsForRDS(), } if o.workloadExists { return []addonBlob{tmplBlob, paramBlob, rdwsIngressTmplBlob, rdwsIngressParamBlob}, nil } return []addonBlob{tmplBlob, paramBlob}, nil } func (o *initStorageOpts) rdsProps() (addon.RDSProps, error) { envs, err := o.environmentNames() if err != nil { return addon.RDSProps{}, err } return addon.RDSProps{ ClusterName: o.storageName, Engine: o.rdsEngine, InitialDBName: o.rdsInitialDBName, ParameterGroup: o.rdsParameterGroup, Envs: envs, }, nil } func (o *initStorageOpts) environmentNames() ([]string, error) { var envNames []string envs, err := o.store.ListEnvironments(o.appName) if err != nil { return nil, fmt.Errorf("list environments: %w", err) } for _, env := range envs { envNames = append(envNames, env.Name) } return envNames, nil } // RecommendActions returns follow-up actions the user can take after successfully executing the command. func (o *initStorageOpts) RecommendActions() error { switch o.lifecycle { case lifecycleWorkloadLevel: logRecommendedActions(o.actionsForWorkloadStorage()) case lifecycleEnvironmentLevel: logRecommendedActions(o.actionsForEnvStorage()) } return nil } func (o *initStorageOpts) actionsForWorkloadStorage() []string { var ( retrieveEnvVarCode string newVar string ) switch o.storageType { case dynamoDBStorageType, s3StorageType: newVar = template.ToSnakeCaseFunc(template.EnvVarNameFunc(o.storageName)) retrieveEnvVarCode = fmt.Sprintf("const storageName = process.env.%s", newVar) case rdsStorageType: newVar = template.ToSnakeCaseFunc(template.EnvVarSecretFunc(o.storageName)) retrieveEnvVarCode = fmt.Sprintf("const {username, host, dbname, password, port} = JSON.parse(process.env.%s)", newVar) if o.workloadType == manifestinfo.RequestDrivenWebServiceType { newVar = fmt.Sprintf("%s_ARN", newVar) retrieveEnvVarCode = fmt.Sprintf(`const AWS = require('aws-sdk'); const client = new AWS.SecretsManager({ region: process.env.AWS_DEFAULT_REGION, }); const dbSecret = await client.getSecretValue({SecretId: process.env.%s}).promise(); const {username, host, dbname, password, port} = JSON.parse(dbSecret.SecretString);`, newVar) } } actionRetrieveEnvVar := fmt.Sprintf( `Update %s's code to leverage the injected environment variable %s. For example, in JavaScript you can write: %s`, o.workloadName, newVar, color.HighlightCodeBlock(retrieveEnvVarCode)) deployCmd := fmt.Sprintf("copilot deploy --name %s", o.workloadName) actionDeploy := fmt.Sprintf("Run %s to deploy your storage resources.", color.HighlightCode(deployCmd)) return []string{ actionRetrieveEnvVar, actionDeploy, } } func (o *initStorageOpts) actionsForEnvStorage() []string { envDeployAction := fmt.Sprintf("Run %s to deploy your environment storage resources.", color.HighlightCode("copilot env deploy")) svcMftAction := fmt.Sprintf("Update the manifest for your %q workload:\n%s", o.workloadName, color.HighlightCodeBlock(o.manifestSuggestion())) svcDeployAction := fmt.Sprintf("Run %s to deploy the workload so that %s has access to %s storage.", color.HighlightCode(fmt.Sprintf("copilot svc deploy --name %s", o.workloadName)), color.HighlightUserInput(o.workloadName), color.HighlightUserInput(o.storageName)) addIngressAction := fmt.Sprintf("From the workspace where %s is, run:\n%s", color.HighlightUserInput(o.workloadName), color.HighlightCodeBlock(o.addIngressSuggestion())) if envAndWkldWritten := o.addIngressFrom == "" && o.workloadExists; envAndWkldWritten { return []string{envDeployAction, svcMftAction, svcDeployAction} } if onlyEnv := !o.workloadExists; onlyEnv { return []string{envDeployAction, addIngressAction} } if onlyWkld := o.addIngressFrom != ""; onlyWkld { return []string{svcMftAction, svcDeployAction} } return nil } func (o *initStorageOpts) manifestSuggestion() string { logicalIDSafeStorageName := template.StripNonAlphaNumFunc(o.storageName) switch { case o.storageType == s3StorageType: return fmt.Sprintf(`variables: DB_NAME: from_cfn: ${COPILOT_APPLICATION_NAME}-${COPILOT_ENVIRONMENT_NAME}-%sBucketName`, logicalIDSafeStorageName) case o.storageType == dynamoDBStorageType: return fmt.Sprintf(`variables: DB_NAME: from_cfn: ${COPILOT_APPLICATION_NAME}-${COPILOT_ENVIRONMENT_NAME}-%sTableName`, logicalIDSafeStorageName) case o.storageType == rdsStorageType && o.workloadType == manifestinfo.RequestDrivenWebServiceType: return fmt.Sprintf(`secrets: DB_SECRET: from_cfn: ${COPILOT_APPLICATION_NAME}-${COPILOT_ENVIRONMENT_NAME}-%sAuroraSecret`, logicalIDSafeStorageName) case o.storageType == rdsStorageType && o.workloadType != manifestinfo.RequestDrivenWebServiceType: return fmt.Sprintf(`network: vpc: security_groups: - from_cfn: ${COPILOT_APPLICATION_NAME}-${COPILOT_ENVIRONMENT_NAME}-%sSecurityGroup secrets: DB_SECRET: from_cfn: ${COPILOT_APPLICATION_NAME}-${COPILOT_ENVIRONMENT_NAME}-%sAuroraSecret`, logicalIDSafeStorageName, logicalIDSafeStorageName) } return "" } func (o *initStorageOpts) addIngressSuggestion() string { return fmt.Sprintf(`copilot storage init -n %s \ --storage-type %s \ --add-ingress-from %s`, o.storageName, o.storageType, o.workloadName) } type errWorkloadNotInWorkspace struct { workloadName string } func (e *errWorkloadNotInWorkspace) Error() string { return fmt.Sprintf("workload %s not found in the workspace", e.workloadName) } // RecommendActions suggests actions to fix the error. func (e *errWorkloadNotInWorkspace) RecommendActions() string { return fmt.Sprintf("Run %s in the workspace where %s is instead.", color.HighlightCode("copilot storage init"), color.HighlightUserInput(e.workloadName)) } type errNoEnvironmentInWorkspace struct{} func (e *errNoEnvironmentInWorkspace) Error() string { return "environments are not managed in the workspace" } // RecommendActions suggests actions to fix the error. func (e *errNoEnvironmentInWorkspace) RecommendActions() string { return fmt.Sprintf("Run %s in the workspace where environments are managed instaed.", color.HighlightCode("copilot storage init")) } // buildStorageInitCmd builds the command and adds it to the CLI. func buildStorageInitCmd() *cobra.Command { vars := initStorageVars{} cmd := &cobra.Command{ Use: "init", Short: "Creates a new AWS CloudFormation template for a storage resource.", Long: `Creates a new AWS CloudFormation template for a storage resource. Storage resources are addons, either for a workload or the environments.`, Example: ` Create an S3 bucket named "my-bucket" attached to the "frontend" service. /code $ copilot storage init -n my-bucket -t S3 -w frontend -l workload Create an environment S3 bucket fronted by the "api" service. /code $ copilot storage init -n my-bucket -t S3 -w api -l environment Create a DynamoDB table with a sort key. /code $ copilot storage init -n my-table -t DynamoDB -w frontend --partition-key Email:S --sort-key UserId:N --no-lsi Create an RDS Aurora Serverless v2 cluster using PostgreSQL. /code $ copilot storage init -n my-cluster -t Aurora -w frontend --engine PostgreSQL --initial-db testdb`, RunE: runCmdE(func(cmd *cobra.Command, args []string) error { opts, err := newStorageInitOpts(vars) if err != nil { return err } return run(opts) }), } cmd.Flags().StringVarP(&vars.storageName, nameFlag, nameFlagShort, "", storageFlagDescription) cmd.Flags().StringVarP(&vars.storageType, storageTypeFlag, typeFlagShort, "", storageTypeFlagDescription) cmd.Flags().StringVarP(&vars.workloadName, workloadFlag, workloadFlagShort, "", storageWorkloadFlagDescription) cmd.Flags().StringVarP(&vars.lifecycle, storageLifecycleFlag, storageLifecycleShort, "", storageLifecycleFlagDescription) cmd.Flags().StringVarP(&vars.addIngressFrom, storageAddIngressFromFlag, "", "", storageAddIngressFromFlagDescription) cmd.Flags().StringVar(&vars.partitionKey, storagePartitionKeyFlag, "", storagePartitionKeyFlagDescription) cmd.Flags().StringVar(&vars.sortKey, storageSortKeyFlag, "", storageSortKeyFlagDescription) cmd.Flags().StringArrayVar(&vars.lsiSorts, storageLSIConfigFlag, []string{}, storageLSIConfigFlagDescription) cmd.Flags().BoolVar(&vars.noLSI, storageNoLSIFlag, false, storageNoLSIFlagDescription) cmd.Flags().BoolVar(&vars.noSort, storageNoSortFlag, false, storageNoSortFlagDescription) cmd.Flags().StringVar(&vars.auroraServerlessVersion, storageAuroraServerlessVersionFlag, defaultAuroraServerlessVersion, storageAuroraServerlessVersionFlagDescription) cmd.Flags().StringVar(&vars.rdsEngine, storageRDSEngineFlag, "", storageRDSEngineFlagDescription) cmd.Flags().StringVar(&vars.rdsInitialDBName, storageRDSInitialDBFlag, "", storageRDSInitialDBFlagDescription) cmd.Flags().StringVar(&vars.rdsParameterGroup, storageRDSParameterGroupFlag, "", storageRDSParameterGroupFlagDescription) ddbFlags := []string{storagePartitionKeyFlag, storageSortKeyFlag, storageNoSortFlag, storageLSIConfigFlag, storageNoLSIFlag} rdsFlags := []string{storageAuroraServerlessVersionFlag, storageRDSEngineFlag, storageRDSInitialDBFlag, storageRDSParameterGroupFlag} for _, f := range append(ddbFlags, storageAuroraServerlessVersionFlag, storageRDSInitialDBFlag, storageRDSParameterGroupFlag) { cmd.MarkFlagsMutuallyExclusive(storageAddIngressFromFlag, f) } requiredFlags := pflag.NewFlagSet("Required", pflag.ContinueOnError) requiredFlags.AddFlag(cmd.Flags().Lookup(nameFlag)) requiredFlags.AddFlag(cmd.Flags().Lookup(storageTypeFlag)) requiredFlags.AddFlag(cmd.Flags().Lookup(workloadFlag)) requiredFlags.AddFlag(cmd.Flags().Lookup(storageLifecycleFlag)) ddbFlagSet := pflag.NewFlagSet("DynamoDB", pflag.ContinueOnError) for _, f := range ddbFlags { ddbFlagSet.AddFlag(cmd.Flags().Lookup(f)) } auroraFlagSet := pflag.NewFlagSet("Aurora Serverless", pflag.ContinueOnError) for _, f := range rdsFlags { auroraFlagSet.AddFlag(cmd.Flags().Lookup(f)) } optionalFlagSet := pflag.NewFlagSet("Optional", pflag.ContinueOnError) optionalFlagSet.AddFlag(cmd.Flags().Lookup(storageAddIngressFromFlag)) cmd.Annotations = map[string]string{ // The order of the sections we want to display. "sections": `Required,DynamoDB,Aurora Serverless,Optional`, "Required": requiredFlags.FlagUsages(), "DynamoDB": ddbFlagSet.FlagUsages(), "Aurora Serverless": auroraFlagSet.FlagUsages(), "Optional": optionalFlagSet.FlagUsages(), } cmd.SetUsageTemplate(`{{h1 "Usage"}}{{if .Runnable}} {{.UseLine}}{{end}}{{$annotations := .Annotations}}{{$sections := split .Annotations.sections ","}}{{if gt (len $sections) 0}} {{range $i, $sectionName := $sections}}{{h1 (print $sectionName " Flags")}} {{(index $annotations $sectionName) | trimTrailingWhitespaces}}{{if ne (inc $i) (len $sections)}} {{end}}{{end}}{{end}}{{if .HasAvailableInheritedFlags}} {{h1 "Global Flags"}} {{.InheritedFlags.FlagUsages | trimTrailingWhitespaces}}{{end}}{{if .HasExample}} {{h1 "Examples"}}{{code .Example}}{{end}} `) return cmd }
1,297
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package cli import ( "errors" "fmt" "testing" "github.com/aws/copilot-cli/internal/pkg/cli/mocks" "github.com/aws/copilot-cli/internal/pkg/term/color" "github.com/aws/copilot-cli/internal/pkg/workspace" "github.com/golang/mock/gomock" "github.com/stretchr/testify/require" ) type mockStorageInitValidate struct { ws *mocks.MockwsReadWriter store *mocks.Mockstore } func TestStorageInitOpts_Validate(t *testing.T) { testCases := map[string]struct { inAppName string inStorageType string inSvcName string inStorageName string inLifecycle string inAddIngressFrom string inPartition string inSort string inLSISorts []string inNoSort bool inNoLSI bool inServerlessVersion string inEngine string mock func(m *mockStorageInitValidate) wantedErr error }{ "no app in workspace": { mock: func(m *mockStorageInitValidate) {}, wantedErr: errNoAppInWorkspace, }, "fails when --add-ingress-from is accompanied by workload name": { inAppName: "bowie", inAddIngressFrom: "api", inSvcName: "nonamemonster", mock: func(m *mockStorageInitValidate) {}, wantedErr: errors.New("--workload cannot be specified with --add-ingress-from"), }, "fails when --add-ingress-from is accompanied by workload-level lifecycle": { inAppName: "bowie", inAddIngressFrom: "api", inLifecycle: lifecycleWorkloadLevel, mock: func(m *mockStorageInitValidate) {}, wantedErr: errors.New("--lifecycle cannot be workload when --add-ingress-from is used"), }, "fails when --add-ingress-from is not accompanied by storage name": { inAppName: "bowie", inAddIngressFrom: "api", mock: func(m *mockStorageInitValidate) {}, wantedErr: errors.New("--name is required when --add-ingress-from is used"), }, "fails when --add-ingress-from is not accompanied by storage type": { inAppName: "bowie", inAddIngressFrom: "api", inStorageName: "coolbucket", mock: func(m *mockStorageInitValidate) {}, wantedErr: errors.New("--storage-type is required when --add-ingress-from is used"), }, "fails to check if --add-ingress-from workload is in the workspace": { inAppName: "bowie", inAddIngressFrom: "api", inStorageName: "coolbucket", inStorageType: s3StorageType, mock: func(m *mockStorageInitValidate) { m.ws.EXPECT().WorkloadExists("api").Return(false, errors.New("some error")) }, wantedErr: errors.New("check if api exists in the workspace: some error"), }, "fails when --add-ingress-from workload is not in the workspace": { inAppName: "bowie", inAddIngressFrom: "api", inStorageName: "coolbucket", inStorageType: s3StorageType, mock: func(m *mockStorageInitValidate) { m.ws.EXPECT().WorkloadExists("api").Return(false, nil) }, wantedErr: errors.New("workload api not found in the workspace"), }, "fails when --no-lsi and --lsi are both provided": { inAppName: "bowie", inStorageType: dynamoDBStorageType, inLSISorts: []string{"userID:Number"}, inNoLSI: true, mock: func(m *mockStorageInitValidate) {}, wantedErr: fmt.Errorf("validate LSI configuration: cannot specify --no-lsi and --lsi options at once"), }, "fails when --no-sort and --lsi are both provided": { inAppName: "bowie", inStorageType: dynamoDBStorageType, inLSISorts: []string{"userID:Number"}, inNoSort: true, mock: func(m *mockStorageInitValidate) {}, wantedErr: fmt.Errorf("validate LSI configuration: cannot specify --no-sort and --lsi options at once"), }, "successfully validates aurora serverless version v1": { inAppName: "bowie", inStorageType: rdsStorageType, inServerlessVersion: auroraServerlessVersionV1, mock: func(m *mockStorageInitValidate) {}, }, "successfully validates aurora serverless version v2": { inAppName: "bowie", inStorageType: rdsStorageType, inServerlessVersion: auroraServerlessVersionV2, mock: func(m *mockStorageInitValidate) {}, }, "invalid aurora serverless version": { inAppName: "bowie", inStorageType: rdsStorageType, inServerlessVersion: "weird-serverless-version", mock: func(m *mockStorageInitValidate) {}, wantedErr: errors.New("invalid Aurora Serverless version weird-serverless-version: must be one of \"v1\", \"v2\""), }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { // GIVEN ctrl := gomock.NewController(t) defer ctrl.Finish() m := mockStorageInitValidate{ ws: mocks.NewMockwsReadWriter(ctrl), store: mocks.NewMockstore(ctrl), } tc.mock(&m) opts := initStorageOpts{ initStorageVars: initStorageVars{ storageType: tc.inStorageType, storageName: tc.inStorageName, workloadName: tc.inSvcName, lifecycle: tc.inLifecycle, addIngressFrom: tc.inAddIngressFrom, partitionKey: tc.inPartition, sortKey: tc.inSort, lsiSorts: tc.inLSISorts, noLSI: tc.inNoLSI, noSort: tc.inNoSort, auroraServerlessVersion: tc.inServerlessVersion, rdsEngine: tc.inEngine, }, appName: tc.inAppName, ws: m.ws, store: m.store, } // WHEN err := opts.Validate() // THEN if tc.wantedErr != nil { require.EqualError(t, err, tc.wantedErr.Error()) } else { require.NoError(t, err) } }) } } type mockStorageInitAsk struct { prompt *mocks.Mockprompter sel *mocks.MockwsSelector configSel *mocks.MockconfigSelector ws *mocks.MockwsReadWriter } func TestStorageInitOpts_Ask(t *testing.T) { const ( wantedAppName = "bowie" wantedSvcName = "frontend" wantedBucketName = "cool-bucket" ) testCases := map[string]struct { inStorageType string inSvcName string inStorageName string inLifecycle string inAddIngressFrom string mock func(m *mockStorageInitAsk) wantedErr error wantedVars *initStorageVars }{ "prompt for nothing if --add-ingress-from is used": { inAddIngressFrom: "api", mock: func(m *mockStorageInitAsk) {}, }, "invalid storage type": { inStorageType: "box", inSvcName: "frontend", mock: func(m *mockStorageInitAsk) {}, wantedErr: errors.New(`invalid storage type box: must be one of "DynamoDB", "S3", "Aurora"`), }, "asks for storage type": { inSvcName: wantedSvcName, inStorageName: wantedBucketName, inLifecycle: lifecycleWorkloadLevel, mock: func(m *mockStorageInitAsk) { m.ws.EXPECT().WorkloadExists(gomock.Any()).Return(true, nil).AnyTimes() m.prompt.EXPECT().SelectOption(gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any()).Return(s3StorageType, nil) }, wantedVars: &initStorageVars{ storageType: s3StorageType, storageName: wantedBucketName, workloadName: wantedSvcName, lifecycle: lifecycleWorkloadLevel, }, }, "error if storage type not gotten": { inSvcName: wantedSvcName, inStorageName: wantedBucketName, mock: func(m *mockStorageInitAsk) { m.prompt.EXPECT().SelectOption(gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any()).Return("", errors.New("some error")) }, wantedErr: fmt.Errorf("select storage type: some error"), }, "asks for local workload when lifecycle is workload-level": { inStorageName: wantedBucketName, inStorageType: s3StorageType, inLifecycle: lifecycleWorkloadLevel, mock: func(m *mockStorageInitAsk) { m.sel.EXPECT().Workload(gomock.Eq(storageInitSvcPrompt), gomock.Any()).Return(wantedSvcName, nil) m.ws.EXPECT().WorkloadExists(wantedSvcName).Return(true, nil) }, wantedVars: &initStorageVars{ storageType: s3StorageType, storageName: wantedBucketName, workloadName: wantedSvcName, lifecycle: lifecycleWorkloadLevel, }, }, "asks for any workload if lifecycle is otherwise": { inStorageName: wantedBucketName, inStorageType: s3StorageType, inLifecycle: lifecycleEnvironmentLevel, mock: func(m *mockStorageInitAsk) { m.configSel.EXPECT().Workload(gomock.Eq(storageInitSvcPrompt), gomock.Any(), wantedAppName).Return(wantedSvcName, nil) m.ws.EXPECT().HasEnvironments().Return(true, nil) }, wantedVars: &initStorageVars{ storageType: s3StorageType, storageName: wantedBucketName, workloadName: wantedSvcName, lifecycle: lifecycleEnvironmentLevel, }, }, "error if local workload not returned": { inStorageName: wantedBucketName, inStorageType: s3StorageType, inLifecycle: lifecycleWorkloadLevel, mock: func(m *mockStorageInitAsk) { m.sel.EXPECT().Workload(gomock.Eq(storageInitSvcPrompt), gomock.Any()).Return("", errors.New("some error")) }, wantedErr: fmt.Errorf("retrieve local workload names: some error"), }, "error if any workload not returned": { inStorageName: wantedBucketName, inStorageType: s3StorageType, mock: func(m *mockStorageInitAsk) { m.configSel.EXPECT().Workload(gomock.Eq(storageInitSvcPrompt), gomock.Any(), wantedAppName).Return("", errors.New("some error")) }, wantedErr: fmt.Errorf("select a workload from app %s: some error", wantedAppName), }, "successfully validates valid s3 bucket name": { inSvcName: "frontend", inStorageType: s3StorageType, inStorageName: "my-bucket.4", inLifecycle: lifecycleEnvironmentLevel, mock: func(m *mockStorageInitAsk) { m.ws.EXPECT().HasEnvironments().Return(true, nil) m.ws.EXPECT().WorkloadExists(gomock.Any()).Return(true, nil).AnyTimes() }, }, "invalid s3 bucket name": { inSvcName: "frontend", inStorageType: s3StorageType, inStorageName: "mybadbucket???", mock: func(m *mockStorageInitAsk) { m.ws.EXPECT().WorkloadExists(gomock.Any()).Return(true, nil).AnyTimes() }, wantedErr: fmt.Errorf("validate storage name: %w", errValueBadFormatWithPeriod), }, "asks for storage name": { inSvcName: wantedSvcName, inStorageType: s3StorageType, inLifecycle: lifecycleWorkloadLevel, mock: func(m *mockStorageInitAsk) { m.ws.EXPECT().WorkloadExists(gomock.Any()).Return(true, nil) m.prompt.EXPECT().Get(gomock.Eq(fmt.Sprintf(fmtStorageInitNamePrompt, color.HighlightUserInput(s3BucketFriendlyText))), gomock.Any(), gomock.Any(), gomock.Any()). Return(wantedBucketName, nil) }, wantedVars: &initStorageVars{ storageType: s3StorageType, storageName: wantedBucketName, workloadName: wantedSvcName, lifecycle: lifecycleWorkloadLevel, }, }, "error if storage name not returned": { inSvcName: wantedSvcName, inStorageType: s3StorageType, mock: func(m *mockStorageInitAsk) { m.prompt.EXPECT().Get(gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any()).Return("", errors.New("some error")) }, wantedErr: fmt.Errorf("input storage name: some error"), }, "invalid lifecycle": { inSvcName: wantedSvcName, inStorageType: s3StorageType, inStorageName: wantedBucketName, inLifecycle: "immortal", mock: func(m *mockStorageInitAsk) {}, wantedErr: fmt.Errorf(`invalid lifecycle; must be one of "workload" or "environment"`), }, "infer lifecycle to be workload level if the addon is found as a workload addon": { inSvcName: wantedSvcName, inStorageType: s3StorageType, inStorageName: wantedBucketName, mock: func(m *mockStorageInitAsk) { m.ws.EXPECT().WorkloadAddonFileAbsPath(wantedSvcName, fmt.Sprintf("%s.yml", wantedBucketName)).Return("mockWorkloadAddonPath") m.ws.EXPECT().ReadFile("mockWorkloadAddonPath").Return([]byte(""), nil) m.ws.EXPECT().WorkloadAddonFilePath(wantedSvcName, fmt.Sprintf("%s.yml", wantedBucketName)). Return("mockWorkloadAddonPath") // Called in log.Info. m.ws.EXPECT().WorkloadExists(wantedSvcName).Return(true, nil) }, wantedVars: &initStorageVars{ storageType: s3StorageType, storageName: wantedBucketName, workloadName: wantedSvcName, lifecycle: lifecycleWorkloadLevel, }, }, "error reading workload addon": { inSvcName: wantedSvcName, inStorageType: s3StorageType, inStorageName: wantedBucketName, mock: func(m *mockStorageInitAsk) { m.ws.EXPECT().WorkloadAddonFileAbsPath(wantedSvcName, fmt.Sprintf("%s.yml", wantedBucketName)).Return("mockWorkloadAddonPath") m.ws.EXPECT().ReadFile("mockWorkloadAddonPath").Return([]byte(""), errors.New("some error")) }, wantedErr: fmt.Errorf("check if %s addon exists for %s in workspace: some error", wantedBucketName, wantedSvcName), }, "infer lifecycle to be env level if the addon is found as an env addon": { inSvcName: wantedSvcName, inStorageType: s3StorageType, inStorageName: wantedBucketName, mock: func(m *mockStorageInitAsk) { m.ws.EXPECT().WorkloadAddonFileAbsPath(wantedSvcName, fmt.Sprintf("%s.yml", wantedBucketName)).Return("mockWorkloadAddonPath") m.ws.EXPECT().ReadFile("mockWorkloadAddonPath").Return([]byte(""), &workspace.ErrFileNotExists{}) m.ws.EXPECT().EnvAddonFileAbsPath(fmt.Sprintf("%s.yml", wantedBucketName)).Return("mockEnvAddonPath") m.ws.EXPECT().ReadFile("mockEnvAddonPath").Return([]byte(""), nil) m.ws.EXPECT().EnvAddonFilePath(fmt.Sprintf("%s.yml", wantedBucketName)). Return("mockEnvAddonPath") // Called in log.Info. m.ws.EXPECT().HasEnvironments().Return(true, nil) }, wantedVars: &initStorageVars{ storageType: s3StorageType, storageName: wantedBucketName, workloadName: wantedSvcName, lifecycle: lifecycleEnvironmentLevel, }, }, "error reading environment addon": { inSvcName: wantedSvcName, inStorageType: s3StorageType, inStorageName: wantedBucketName, mock: func(m *mockStorageInitAsk) { m.ws.EXPECT().WorkloadAddonFileAbsPath(wantedSvcName, fmt.Sprintf("%s.yml", wantedBucketName)).Return("mockWorkloadAddonPath") m.ws.EXPECT().ReadFile("mockWorkloadAddonPath").Return([]byte(""), &workspace.ErrFileNotExists{}) m.ws.EXPECT().EnvAddonFileAbsPath(fmt.Sprintf("%s.yml", wantedBucketName)).Return("mockEnvAddonPath") m.ws.EXPECT().ReadFile("mockEnvAddonPath").Return([]byte(""), errors.New("some error")) }, wantedErr: fmt.Errorf("check if %s exists as an environment addon in workspace: some error", wantedBucketName), }, "asks for lifecycle": { inSvcName: wantedSvcName, inStorageType: s3StorageType, inStorageName: wantedBucketName, mock: func(m *mockStorageInitAsk) { m.ws.EXPECT().WorkloadAddonFileAbsPath(wantedSvcName, fmt.Sprintf("%s.yml", wantedBucketName)).Return("mockWorkloadAddonPath") m.ws.EXPECT().ReadFile("mockWorkloadAddonPath").Return([]byte(""), &workspace.ErrFileNotExists{}) m.ws.EXPECT().EnvAddonFileAbsPath(fmt.Sprintf("%s.yml", wantedBucketName)).Return("mockEnvAddonPath") m.ws.EXPECT().ReadFile("mockEnvAddonPath").Return([]byte(""), &workspace.ErrFileNotExists{}) m.prompt.EXPECT().SelectOption(fmt.Sprintf(fmtStorageInitLifecyclePrompt, wantedSvcName), gomock.Any(), gomock.Any(), gomock.Any()).Return(lifecycleWorkloadLevel, nil) m.ws.EXPECT().WorkloadExists(gomock.Any()).Return(true, nil) }, wantedVars: &initStorageVars{ storageType: s3StorageType, storageName: wantedBucketName, workloadName: wantedSvcName, lifecycle: lifecycleWorkloadLevel, }, }, "error if lifecycle not gotten": { inSvcName: wantedSvcName, inStorageType: s3StorageType, inStorageName: wantedBucketName, mock: func(m *mockStorageInitAsk) { m.ws.EXPECT().WorkloadAddonFileAbsPath(wantedSvcName, fmt.Sprintf("%s.yml", wantedBucketName)).Return("mockWorkloadAddonPath") m.ws.EXPECT().ReadFile("mockWorkloadAddonPath").Return([]byte(""), &workspace.ErrFileNotExists{}) m.ws.EXPECT().EnvAddonFileAbsPath(fmt.Sprintf("%s.yml", wantedBucketName)).Return("mockEnvAddonPath") m.ws.EXPECT().ReadFile("mockEnvAddonPath").Return([]byte(""), &workspace.ErrFileNotExists{}) m.prompt.EXPECT().SelectOption(fmt.Sprintf(fmtStorageInitLifecyclePrompt, wantedSvcName), gomock.Any(), gomock.Any(), gomock.Any()).Return("", errors.New("some error")) }, wantedErr: errors.New("ask for lifecycle: some error"), }, "error checking if any environment is in workspace": { inStorageType: s3StorageType, inSvcName: "frontend", inStorageName: "my-bucket", inLifecycle: lifecycleEnvironmentLevel, mock: func(m *mockStorageInitAsk) { m.ws.EXPECT().HasEnvironments().Return(false, errors.New("wanted err")) }, wantedErr: errors.New("check if environments directory exists in the workspace: wanted err"), }, "error if environments are not managed in workspace for a env-level storage": { inStorageType: s3StorageType, inSvcName: "frontend", inStorageName: "my-bucket", inLifecycle: lifecycleEnvironmentLevel, mock: func(m *mockStorageInitAsk) { m.ws.EXPECT().HasEnvironments().Return(false, nil) }, wantedErr: errors.New("environments are not managed in the workspace"), }, "error checking if workload is in workspace": { inStorageType: s3StorageType, inSvcName: "frontend", inStorageName: "my-bucket", inLifecycle: lifecycleWorkloadLevel, mock: func(m *mockStorageInitAsk) { m.ws.EXPECT().WorkloadExists(gomock.Eq("frontend")).Return(false, errors.New("wanted err")) }, wantedErr: errors.New("check if frontend exists in the workspace: wanted err"), }, "error if workload is not in workspace for a workload-level storage": { inStorageType: s3StorageType, inSvcName: "frontend", inStorageName: "my-bucket", inLifecycle: lifecycleWorkloadLevel, mock: func(m *mockStorageInitAsk) { m.ws.EXPECT().WorkloadExists(gomock.Eq("frontend")).Return(false, nil) }, wantedErr: errors.New("workload frontend not found in the workspace"), }, "ok if workload is not in workspace for an env-level storage": { inStorageType: s3StorageType, inSvcName: "frontend", inStorageName: "my-bucket", inLifecycle: lifecycleEnvironmentLevel, mock: func(m *mockStorageInitAsk) { m.ws.EXPECT().HasEnvironments().Return(true, nil) m.ws.EXPECT().WorkloadExists(gomock.Eq("frontend")).Times(0) }, }, "no error or asks when fully specified": { inSvcName: wantedSvcName, inStorageType: s3StorageType, inStorageName: wantedBucketName, inLifecycle: lifecycleEnvironmentLevel, mock: func(m *mockStorageInitAsk) { m.ws.EXPECT().HasEnvironments().Return(true, nil) }, }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { // GIVEN ctrl := gomock.NewController(t) defer ctrl.Finish() m := mockStorageInitAsk{ prompt: mocks.NewMockprompter(ctrl), sel: mocks.NewMockwsSelector(ctrl), configSel: mocks.NewMockconfigSelector(ctrl), ws: mocks.NewMockwsReadWriter(ctrl), } opts := initStorageOpts{ initStorageVars: initStorageVars{ storageType: tc.inStorageType, storageName: tc.inStorageName, workloadName: tc.inSvcName, lifecycle: tc.inLifecycle, addIngressFrom: tc.inAddIngressFrom, }, appName: wantedAppName, sel: m.sel, configSel: m.configSel, prompt: m.prompt, ws: m.ws, } tc.mock(&m) // WHEN err := opts.Ask() // THEN if tc.wantedErr != nil { require.EqualError(t, err, tc.wantedErr.Error()) } else { require.NoError(t, err) } if tc.wantedVars != nil { require.Equal(t, *tc.wantedVars, opts.initStorageVars) } }) } } func TestStorageInitOpts_AskDDB(t *testing.T) { const ( wantedSvcName = "frontend" wantedTableName = "my-cool_table.3" wantedPartitionKey = "DogName:String" wantedSortKey = "PhotoId:Number" ) testCases := map[string]struct { inStorageName string inPartition string inSort string inLSISorts []string inNoLSI bool inNoSort bool mock func(m *mockStorageInitAsk) wantedErr error wantedVars *initStorageVars }{ "invalid ddb name": { inStorageName: "badTable!!!", mock: func(m *mockStorageInitAsk) {}, wantedErr: fmt.Errorf("validate storage name: %w", errValueBadFormatWithPeriodUnderscore), }, "invalid partition key": { inStorageName: wantedTableName, inPartition: "bipartite", mock: func(m *mockStorageInitAsk) { m.ws.EXPECT().WorkloadExists(gomock.Any()).Return(true, nil) }, wantedErr: errors.New("validate partition key: value must be of the form <name>:<T> where T is one of S, N, or B"), }, "asks for partition key if not specified": { inStorageName: wantedTableName, inSort: wantedSortKey, inNoLSI: true, mock: func(m *mockStorageInitAsk) { m.ws.EXPECT().WorkloadExists(gomock.Any()).Return(true, nil) keyPrompt := fmt.Sprintf(fmtStorageInitDDBKeyPrompt, color.HighlightUserInput("partition key"), color.HighlightUserInput(dynamoDBStorageType), ) keyTypePrompt := fmt.Sprintf(fmtStorageInitDDBKeyTypePrompt, ddbKeyString) m.prompt.EXPECT().Get(gomock.Eq(keyPrompt), gomock.Any(), gomock.Any(), gomock.Any(), ).Return(wantedPartitionKey, nil) m.prompt.EXPECT().SelectOne(gomock.Eq(keyTypePrompt), gomock.Any(), attributeTypes, gomock.Any(), ).Return(ddbStringType, nil) }, }, "error if fail to return partition key": { inStorageName: wantedTableName, mock: func(m *mockStorageInitAsk) { m.ws.EXPECT().WorkloadExists(gomock.Any()).Return(true, nil) m.prompt.EXPECT().Get(gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any(), ).Return("", errors.New("some error")) }, wantedErr: fmt.Errorf("get DDB partition key: some error"), }, "error if fail to return partition key type": { inStorageName: wantedTableName, mock: func(m *mockStorageInitAsk) { m.ws.EXPECT().WorkloadExists(gomock.Any()).Return(true, nil) m.prompt.EXPECT().Get(gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any(), ).Return(wantedPartitionKey, nil) m.prompt.EXPECT().SelectOne(gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any(), ).Return("", errors.New("some error")) }, wantedErr: fmt.Errorf("get DDB partition key datatype: some error"), }, "invalid sort key": { inStorageName: wantedTableName, inPartition: wantedSortKey, inSort: "allsortofstuff", mock: func(m *mockStorageInitAsk) { m.ws.EXPECT().WorkloadExists(gomock.Any()).Return(true, nil) }, wantedErr: errors.New("validate sort key: value must be of the form <name>:<T> where T is one of S, N, or B"), }, "ask for sort key if not specified": { inStorageName: wantedTableName, inPartition: wantedPartitionKey, inNoLSI: true, mock: func(m *mockStorageInitAsk) { m.ws.EXPECT().WorkloadExists(gomock.Any()).Return(true, nil) m.prompt.EXPECT().Confirm( gomock.Eq(storageInitDDBSortKeyConfirm), gomock.Any(), gomock.Any(), ).Return(true, nil) keyPrompt := fmt.Sprintf(fmtStorageInitDDBKeyPrompt, color.HighlightUserInput("sort key"), color.HighlightUserInput(dynamoDBStorageType), ) keyTypePrompt := fmt.Sprintf(fmtStorageInitDDBKeyTypePrompt, ddbKeyString) m.prompt.EXPECT().Get(gomock.Eq(keyPrompt), gomock.Any(), gomock.Any(), gomock.Any(), ).Return(wantedPartitionKey, nil) m.prompt.EXPECT().SelectOne(gomock.Eq(keyTypePrompt), gomock.Any(), attributeTypes, gomock.Any(), ).Return(ddbStringType, nil) }, }, "error if fail to confirm add sort key": { inStorageName: wantedTableName, inPartition: wantedPartitionKey, mock: func(m *mockStorageInitAsk) { m.ws.EXPECT().WorkloadExists(gomock.Any()).Return(true, nil) m.prompt.EXPECT().Confirm( gomock.Eq(storageInitDDBSortKeyConfirm), gomock.Any(), gomock.Any(), ).Return(false, errors.New("some error")) }, wantedErr: fmt.Errorf("confirm DDB sort key: some error"), }, "error if fail to return sort key": { inStorageName: wantedTableName, inPartition: wantedPartitionKey, mock: func(m *mockStorageInitAsk) { m.ws.EXPECT().WorkloadExists(gomock.Any()).Return(true, nil) m.prompt.EXPECT().Confirm( gomock.Eq(storageInitDDBSortKeyConfirm), gomock.Any(), gomock.Any(), ).Return(true, nil) m.prompt.EXPECT().Get(gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any(), ).Return("", errors.New("some error")) }, wantedErr: fmt.Errorf("get DDB sort key: some error"), }, "error if fail to return sort key type": { inStorageName: wantedTableName, inPartition: wantedPartitionKey, mock: func(m *mockStorageInitAsk) { m.ws.EXPECT().WorkloadExists(gomock.Any()).Return(true, nil) m.prompt.EXPECT().Confirm( gomock.Eq(storageInitDDBSortKeyConfirm), gomock.Any(), gomock.Any(), ).Return(true, nil) m.prompt.EXPECT().Get(gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any(), ).Return(wantedPartitionKey, nil) m.prompt.EXPECT().SelectOne(gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any(), ).Return("", errors.New("some error")) }, wantedErr: fmt.Errorf("get DDB sort key datatype: some error"), }, "don't ask for sort key if no-sort specified": { inStorageName: wantedTableName, inPartition: wantedPartitionKey, inNoSort: true, mock: func(m *mockStorageInitAsk) { m.ws.EXPECT().WorkloadExists(gomock.Any()).Return(true, nil) m.prompt.EXPECT().Confirm( gomock.Eq(storageInitDDBSortKeyConfirm), gomock.Any(), gomock.Any(), ).Times(0) }, }, "ok if --no-lsi and --sort-key are both specified": { inStorageName: wantedTableName, inPartition: wantedPartitionKey, inSort: wantedSortKey, inNoLSI: true, mock: func(m *mockStorageInitAsk) { m.ws.EXPECT().WorkloadExists(gomock.Any()).Return(true, nil) }, }, "don't ask about LSI if no-sort is specified": { inStorageName: wantedTableName, inPartition: wantedPartitionKey, inNoSort: true, mock: func(m *mockStorageInitAsk) { m.ws.EXPECT().WorkloadExists(gomock.Any()).Return(true, nil) m.prompt.EXPECT().Confirm( gomock.Eq(storageInitDDBLSIPrompt), gomock.Eq(storageInitDDBLSIHelp), gomock.Any(), ).Times(0) }, }, "ask for LSI if not specified": { inStorageName: wantedTableName, inPartition: wantedPartitionKey, inSort: wantedSortKey, mock: func(m *mockStorageInitAsk) { m.ws.EXPECT().WorkloadExists(gomock.Any()).Return(true, nil) lsiTypePrompt := fmt.Sprintf(fmtStorageInitDDBKeyTypePrompt, color.Emphasize("alternate sort key")) lsiTypeHelp := fmt.Sprintf(fmtStorageInitDDBKeyTypeHelp, "alternate sort key") m.prompt.EXPECT().Confirm( gomock.Eq(storageInitDDBLSIPrompt), gomock.Eq(storageInitDDBLSIHelp), gomock.Any(), ).Return(true, nil) m.prompt.EXPECT().Get( gomock.Eq(storageInitDDBLSINamePrompt), gomock.Eq(storageInitDDBLSINameHelp), gomock.Any(), gomock.Any(), ).Return("Email", nil) m.prompt.EXPECT().SelectOne( gomock.Eq(lsiTypePrompt), gomock.Eq(lsiTypeHelp), gomock.Eq(attributeTypes), gomock.Any(), ).Return(ddbStringType, nil) m.prompt.EXPECT().Confirm( gomock.Eq(storageInitDDBMoreLSIPrompt), gomock.Eq(storageInitDDBLSIHelp), gomock.Any(), ).Return(false, nil) }, wantedVars: &initStorageVars{ storageName: wantedTableName, workloadName: wantedSvcName, storageType: dynamoDBStorageType, lifecycle: lifecycleWorkloadLevel, partitionKey: wantedPartitionKey, sortKey: wantedSortKey, noLSI: false, lsiSorts: []string{"Email:String"}, }, }, "noLSI is set correctly if no lsis specified": { inStorageName: wantedTableName, inPartition: wantedPartitionKey, inSort: wantedSortKey, mock: func(m *mockStorageInitAsk) { m.ws.EXPECT().WorkloadExists(gomock.Any()).Return(true, nil) m.prompt.EXPECT().Confirm( gomock.Eq(storageInitDDBLSIPrompt), gomock.Eq(storageInitDDBLSIHelp), gomock.Any(), ).Return(false, nil) }, wantedVars: &initStorageVars{ storageName: wantedTableName, workloadName: wantedSvcName, storageType: dynamoDBStorageType, lifecycle: lifecycleWorkloadLevel, partitionKey: wantedPartitionKey, sortKey: wantedSortKey, noLSI: true, }, }, "noLSI is set correctly if no sort key": { inStorageName: wantedTableName, inPartition: wantedPartitionKey, mock: func(m *mockStorageInitAsk) { m.ws.EXPECT().WorkloadExists(gomock.Any()).Return(true, nil) m.prompt.EXPECT().Confirm( gomock.Eq(storageInitDDBSortKeyConfirm), gomock.Eq(storageInitDDBSortKeyHelp), gomock.Any(), ).Return(false, nil) }, wantedVars: &initStorageVars{ storageName: wantedTableName, workloadName: wantedSvcName, storageType: dynamoDBStorageType, lifecycle: lifecycleWorkloadLevel, partitionKey: wantedPartitionKey, noLSI: true, noSort: true, }, }, "error if lsi name misspecified": { inStorageName: wantedTableName, inPartition: wantedPartitionKey, inSort: wantedSortKey, mock: func(m *mockStorageInitAsk) { m.ws.EXPECT().WorkloadExists(gomock.Any()).Return(true, nil) m.prompt.EXPECT().Confirm( gomock.Eq(storageInitDDBLSIPrompt), gomock.Any(), gomock.Any(), ).Return(true, nil) m.prompt.EXPECT().Get(gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any(), ).Return("", errors.New("some error")) }, wantedErr: fmt.Errorf("get DDB alternate sort key name: some error"), }, "errors if fail to confirm lsi": { inStorageName: wantedTableName, inPartition: wantedPartitionKey, inSort: wantedSortKey, mock: func(m *mockStorageInitAsk) { m.ws.EXPECT().WorkloadExists(gomock.Any()).Return(true, nil) m.prompt.EXPECT().Confirm( gomock.Any(), gomock.Any(), gomock.Any(), ).Return(false, errors.New("some error")) }, wantedErr: fmt.Errorf("confirm add alternate sort key: some error"), }, "error if lsi type misspecified": { inStorageName: wantedTableName, inPartition: wantedPartitionKey, inSort: wantedSortKey, mock: func(m *mockStorageInitAsk) { m.ws.EXPECT().WorkloadExists(gomock.Any()).Return(true, nil) m.prompt.EXPECT().Confirm( gomock.Any(), gomock.Any(), gomock.Any(), ).Return(true, nil) m.prompt.EXPECT().Get(gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any(), ).Return("cool", nil) m.prompt.EXPECT().SelectOne(gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any(), ).Return("", errors.New("some error")) }, wantedErr: fmt.Errorf("get DDB alternate sort key type: some error"), }, "do not ask for ddb config when fully specified": { inStorageName: wantedTableName, inPartition: wantedPartitionKey, inSort: wantedSortKey, inLSISorts: []string{"userID:Number", "data:Binary"}, mock: func(m *mockStorageInitAsk) { m.ws.EXPECT().WorkloadExists(gomock.Any()).Return(true, nil) }, }, "successfully validate flags with non-config": { inStorageName: wantedTableName, inPartition: wantedPartitionKey, inNoSort: true, inNoLSI: true, mock: func(m *mockStorageInitAsk) { m.ws.EXPECT().WorkloadExists(gomock.Any()).Return(true, nil) }, }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { // GIVEN ctrl := gomock.NewController(t) defer ctrl.Finish() m := mockStorageInitAsk{ ws: mocks.NewMockwsReadWriter(ctrl), prompt: mocks.NewMockprompter(ctrl), } tc.mock(&m) opts := initStorageOpts{ initStorageVars: initStorageVars{ storageType: dynamoDBStorageType, storageName: tc.inStorageName, workloadName: wantedSvcName, partitionKey: tc.inPartition, sortKey: tc.inSort, lsiSorts: tc.inLSISorts, noLSI: tc.inNoLSI, noSort: tc.inNoSort, lifecycle: lifecycleWorkloadLevel, }, appName: "ddos", prompt: m.prompt, ws: m.ws, } // WHEN err := opts.Ask() // THEN if tc.wantedErr != nil { require.EqualError(t, err, tc.wantedErr.Error()) } else { require.NoError(t, err) } if tc.wantedVars != nil { require.Equal(t, *tc.wantedVars, opts.initStorageVars) } }) } } func TestStorageInitOpts_AskRDS(t *testing.T) { const ( wantedSvcName = "frontend" wantedClusterName = "cookie" wantedServerlessVersion = auroraServerlessVersionV2 wantedInitialDBName = "mydb" wantedDBEngine = engineTypePostgreSQL ) testCases := map[string]struct { inStorageName string inPartition string inSort string inLSISorts []string inNoLSI bool inNoSort bool inServerlessVersion string inDBEngine string inInitialDBName string mock func(m *mockStorageInitAsk) wantedErr error wantedVars *initStorageVars }{ "invalid cluster name": { inStorageName: "wow!such name..:doge", mock: func(m *mockStorageInitAsk) { m.ws.EXPECT().ReadWorkloadManifest(wantedSvcName).Return(workspace.WorkloadManifest("type: Load Balanced Web Service"), nil) }, wantedErr: errors.New("validate storage name: value must start with a letter and followed by alphanumeric letters only"), }, "asks for cluster name for RDS storage": { inDBEngine: wantedDBEngine, inInitialDBName: wantedInitialDBName, mock: func(m *mockStorageInitAsk) { m.ws.EXPECT().HasEnvironments().Return(true, nil).AnyTimes() m.ws.EXPECT().WorkloadExists(gomock.Any()).Return(true, nil).AnyTimes() m.prompt.EXPECT().Get( gomock.Eq("What would you like to name this Database Cluster?"), gomock.Any(), gomock.Any(), gomock.Any(), ).Return(wantedClusterName, nil) m.ws.EXPECT().ReadWorkloadManifest(wantedSvcName).Return(workspace.WorkloadManifest("type: Load Balanced Web Service"), nil) }, wantedVars: &initStorageVars{ storageType: rdsStorageType, storageName: wantedClusterName, workloadName: wantedSvcName, lifecycle: lifecycleEnvironmentLevel, auroraServerlessVersion: wantedServerlessVersion, rdsEngine: wantedDBEngine, rdsInitialDBName: wantedInitialDBName, }, }, "error if cluster name not gotten": { mock: func(m *mockStorageInitAsk) { m.prompt.EXPECT().Get( gomock.Eq("What would you like to name this Database Cluster?"), gomock.Any(), gomock.Any(), gomock.Any(), ).Return("", errors.New("some error")) m.ws.EXPECT().ReadWorkloadManifest(wantedSvcName).Return(workspace.WorkloadManifest("type: Load Balanced Web Service"), nil) }, wantedErr: errors.New("input storage name: some error"), }, "invalid database engine type": { inStorageName: wantedClusterName, inDBEngine: "mysql", mock: func(m *mockStorageInitAsk) { m.ws.EXPECT().ReadWorkloadManifest(wantedSvcName).Return(workspace.WorkloadManifest("type: Load Balanced Web Service"), nil) m.ws.EXPECT().HasEnvironments().Return(true, nil).AnyTimes() m.ws.EXPECT().WorkloadExists(gomock.Any()).Return(true, nil).AnyTimes() }, wantedErr: errors.New("invalid engine type mysql: must be one of \"MySQL\", \"PostgreSQL\""), }, "asks for engine if not specified": { inStorageName: wantedClusterName, inInitialDBName: wantedInitialDBName, mock: func(m *mockStorageInitAsk) { m.ws.EXPECT().HasEnvironments().Return(true, nil).AnyTimes() m.ws.EXPECT().WorkloadExists(gomock.Any()).Return(true, nil).AnyTimes() m.ws.EXPECT().ReadWorkloadManifest(wantedSvcName).Return(workspace.WorkloadManifest("type: Load Balanced Web Service"), nil) m.prompt.EXPECT().SelectOne(gomock.Eq(storageInitRDSDBEnginePrompt), gomock.Any(), gomock.Any(), gomock.Any()). Return(wantedDBEngine, nil) }, wantedVars: &initStorageVars{ storageType: rdsStorageType, storageName: wantedClusterName, workloadName: wantedSvcName, lifecycle: lifecycleEnvironmentLevel, auroraServerlessVersion: wantedServerlessVersion, rdsInitialDBName: wantedInitialDBName, rdsEngine: wantedDBEngine, }, }, "error if engine not gotten": { inStorageName: wantedClusterName, inInitialDBName: wantedInitialDBName, mock: func(m *mockStorageInitAsk) { m.prompt.EXPECT().SelectOne(storageInitRDSDBEnginePrompt, gomock.Any(), gomock.Any(), gomock.Any()). Return("", errors.New("some error")) m.ws.EXPECT().ReadWorkloadManifest(wantedSvcName).Return(workspace.WorkloadManifest("type: Load Balanced Web Service"), nil) m.ws.EXPECT().HasEnvironments().Return(true, nil).AnyTimes() m.ws.EXPECT().WorkloadExists(gomock.Any()).Return(true, nil).AnyTimes() }, wantedErr: errors.New("select database engine: some error"), }, "invalid initial database name": { inStorageName: wantedClusterName, inDBEngine: wantedDBEngine, inInitialDBName: "wow!suchweird??name!", mock: func(m *mockStorageInitAsk) { m.ws.EXPECT().ReadWorkloadManifest(wantedSvcName).Return(workspace.WorkloadManifest("type: Load Balanced Web Service"), nil) m.ws.EXPECT().HasEnvironments().Return(true, nil).AnyTimes() m.ws.EXPECT().WorkloadExists(gomock.Any()).Return(true, nil).AnyTimes() }, wantedErr: errors.New("invalid database name wow!suchweird??name!: must contain only alphanumeric characters and underscore; should start with a letter"), }, "asks for initial database name": { inStorageName: wantedClusterName, inDBEngine: wantedDBEngine, mock: func(m *mockStorageInitAsk) { m.prompt.EXPECT().Get(gomock.Eq(storageInitRDSInitialDBNamePrompt), gomock.Any(), gomock.Any(), gomock.Any()). Return(wantedInitialDBName, nil) m.ws.EXPECT().ReadWorkloadManifest(wantedSvcName).Return(workspace.WorkloadManifest("type: Load Balanced Web Service"), nil) m.ws.EXPECT().HasEnvironments().Return(true, nil).AnyTimes() m.ws.EXPECT().WorkloadExists(gomock.Any()).Return(true, nil).AnyTimes() }, wantedVars: &initStorageVars{ storageType: rdsStorageType, storageName: wantedClusterName, workloadName: wantedSvcName, lifecycle: lifecycleEnvironmentLevel, auroraServerlessVersion: wantedServerlessVersion, rdsEngine: wantedDBEngine, rdsInitialDBName: wantedInitialDBName, }, }, "error if initial database name not gotten": { inStorageName: wantedClusterName, inDBEngine: wantedDBEngine, mock: func(m *mockStorageInitAsk) { m.prompt.EXPECT().Get(storageInitRDSInitialDBNamePrompt, gomock.Any(), gomock.Any(), gomock.Any()). Return("", errors.New("some error")) m.ws.EXPECT().ReadWorkloadManifest(wantedSvcName).Return(workspace.WorkloadManifest("type: Load Balanced Web Service"), nil) m.ws.EXPECT().HasEnvironments().Return(true, nil).AnyTimes() m.ws.EXPECT().WorkloadExists(gomock.Any()).Return(true, nil).AnyTimes() }, wantedErr: fmt.Errorf("input initial database name: some error"), }, "successfully validate rds with full config": { inStorageName: wantedClusterName, inDBEngine: wantedDBEngine, inInitialDBName: wantedInitialDBName, mock: func(m *mockStorageInitAsk) { m.ws.EXPECT().HasEnvironments().Return(true, nil).AnyTimes() m.ws.EXPECT().WorkloadExists(gomock.Any()).Return(true, nil).AnyTimes() m.ws.EXPECT().ReadWorkloadManifest(wantedSvcName).Return(workspace.WorkloadManifest("type: Load Balanced Web Service"), nil) }, }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { // GIVEN ctrl := gomock.NewController(t) defer ctrl.Finish() m := mockStorageInitAsk{ prompt: mocks.NewMockprompter(ctrl), ws: mocks.NewMockwsReadWriter(ctrl), } opts := initStorageOpts{ initStorageVars: initStorageVars{ storageType: rdsStorageType, workloadName: wantedSvcName, storageName: tc.inStorageName, lifecycle: lifecycleEnvironmentLevel, auroraServerlessVersion: wantedServerlessVersion, rdsEngine: tc.inDBEngine, rdsInitialDBName: tc.inInitialDBName, }, appName: "ddos", prompt: m.prompt, ws: m.ws, } tc.mock(&m) // WHEN err := opts.Ask() // THEN if tc.wantedErr != nil { require.EqualError(t, err, tc.wantedErr.Error()) } else { require.NoError(t, err) } if tc.wantedVars != nil { require.Equal(t, *tc.wantedVars, opts.initStorageVars) } }) } } func TestStorageInitOpts_Execute(t *testing.T) { const ( wantedAppName = "ddos" wantedSvcName = "frontend" wantedPartitionKey = "DogName:String" wantedSortKey = "PhotoId:Number" ) fileExistsError := &workspace.ErrFileExists{FileName: "my-file"} testCases := map[string]struct { inStorageType string inSvcName string inStorageName string inAddIngressFrom string inPartition string inSort string inLSISorts []string inNoLSI bool inNoSort bool inServerlessVersion string inEngine string inInitialDBName string inParameterGroup string inLifecycle string mockWS func(m *mocks.MockwsReadWriter) mockStore func(m *mocks.Mockstore) mockWkldAbsent bool wantedErr error }{ "happy calls for wkld S3": { inStorageType: s3StorageType, inSvcName: wantedSvcName, inStorageName: "my-bucket", inLifecycle: lifecycleWorkloadLevel, mockWS: func(m *mocks.MockwsReadWriter) { m.EXPECT().WorkloadExists(wantedSvcName).Return(true, nil) m.EXPECT().ReadWorkloadManifest(wantedSvcName).Return([]byte("type: Worker Service"), nil) m.EXPECT().WorkloadAddonFilePath(gomock.Eq(wantedSvcName), gomock.Eq("my-bucket.yml")).Return("mockPath") m.EXPECT().Write(gomock.Any(), "mockPath").Return("/frontend/addons/my-bucket.yml", nil) }, }, "happy calls for wkld DDB": { inStorageType: dynamoDBStorageType, inSvcName: wantedSvcName, inStorageName: "my-table", inNoLSI: true, inNoSort: true, inPartition: wantedPartitionKey, inLifecycle: lifecycleWorkloadLevel, mockWS: func(m *mocks.MockwsReadWriter) { m.EXPECT().WorkloadExists(wantedSvcName).Return(true, nil) m.EXPECT().ReadWorkloadManifest(wantedSvcName).Return([]byte("type: Worker Service"), nil) m.EXPECT().WorkloadAddonFilePath(gomock.Eq(wantedSvcName), gomock.Eq("my-table.yml")).Return("mockPath") m.EXPECT().Write(gomock.Any(), "mockPath").Return("/frontend/addons/my-table.yml", nil) }, }, "happy calls for wkld DDB with LSI": { inStorageType: dynamoDBStorageType, inSvcName: wantedSvcName, inStorageName: "my-table", inPartition: wantedPartitionKey, inSort: wantedSortKey, inLSISorts: []string{"goodness:Number"}, inLifecycle: lifecycleWorkloadLevel, mockWS: func(m *mocks.MockwsReadWriter) { m.EXPECT().WorkloadExists(wantedSvcName).Return(true, nil) m.EXPECT().ReadWorkloadManifest(wantedSvcName).Return([]byte("type: Worker Service"), nil) m.EXPECT().WorkloadAddonFilePath(gomock.Eq(wantedSvcName), gomock.Eq("my-table.yml")).Return("mockPath") m.EXPECT().Write(gomock.Any(), "mockPath").Return("/frontend/addons/my-table.yml", nil) }, }, "happy calls for wkld RDS with LBWS": { inSvcName: wantedSvcName, inStorageType: rdsStorageType, inStorageName: "mycluster", inServerlessVersion: auroraServerlessVersionV1, inEngine: engineTypeMySQL, inParameterGroup: "mygroup", inLifecycle: lifecycleWorkloadLevel, mockWS: func(m *mocks.MockwsReadWriter) { m.EXPECT().WorkloadExists(wantedSvcName).Return(true, nil) m.EXPECT().ReadWorkloadManifest(wantedSvcName).Return([]byte("type: Worker Service"), nil) m.EXPECT().WorkloadAddonFilePath(gomock.Eq(wantedSvcName), gomock.Eq("mycluster.yml")).Return("mockPath") m.EXPECT().Write(gomock.Any(), "mockPath").Return("/frontend/addons/mycluster.yml", nil) }, mockStore: func(m *mocks.Mockstore) { m.EXPECT().ListEnvironments(gomock.Any()).Times(1) }, }, "happy calls for wkld RDS with a RDWS": { inSvcName: wantedSvcName, inStorageType: rdsStorageType, inStorageName: "mycluster", inServerlessVersion: auroraServerlessVersionV1, inEngine: engineTypeMySQL, inParameterGroup: "mygroup", inLifecycle: lifecycleWorkloadLevel, mockWS: func(m *mocks.MockwsReadWriter) { m.EXPECT().WorkloadExists(wantedSvcName).Return(true, nil) m.EXPECT().ReadWorkloadManifest(wantedSvcName).Return([]byte("type: Request-Driven Web Service"), nil) m.EXPECT().WorkloadAddonFilePath(gomock.Eq(wantedSvcName), gomock.Eq("mycluster.yml")).Return("mockTmplPath") m.EXPECT().Write(gomock.Any(), "mockTmplPath").Return("/frontend/addons/mycluster.yml", nil) m.EXPECT().WorkloadAddonFilePath(gomock.Eq(wantedSvcName), gomock.Eq("addons.parameters.yml")).Return("mockParamsPath") m.EXPECT().Write(gomock.Any(), "mockParamsPath").Return("/frontend/addons/addons.parameters.yml", nil) }, mockStore: func(m *mocks.Mockstore) { m.EXPECT().ListEnvironments(gomock.Any()).Times(1) }, }, "happy calls for env S3": { inStorageType: s3StorageType, inSvcName: wantedSvcName, inStorageName: "my-bucket", inLifecycle: lifecycleEnvironmentLevel, mockWS: func(m *mocks.MockwsReadWriter) { m.EXPECT().WorkloadExists(wantedSvcName).Return(true, nil) m.EXPECT().ReadWorkloadManifest(wantedSvcName).Return([]byte("type: Worker Service"), nil) m.EXPECT().EnvAddonFilePath(gomock.Eq("my-bucket.yml")).Return("mockEnvTemplatePath") m.EXPECT().WorkloadAddonFilePath(gomock.Eq(wantedSvcName), gomock.Eq("my-bucket-access-policy.yml")).Return("mockWkldTemplatePath") m.EXPECT().Write(gomock.Any(), "mockEnvTemplatePath").Return("mockEnvTemplatePath", nil) m.EXPECT().Write(gomock.Any(), "mockWkldTemplatePath").Return("mockWkldTemplatePath", nil) }, }, "happy calls for env DDB": { inStorageType: dynamoDBStorageType, inSvcName: wantedSvcName, inStorageName: "my-table", inNoLSI: true, inNoSort: true, inPartition: wantedPartitionKey, inLifecycle: lifecycleEnvironmentLevel, mockWS: func(m *mocks.MockwsReadWriter) { m.EXPECT().WorkloadExists(wantedSvcName).Return(true, nil) m.EXPECT().ReadWorkloadManifest(wantedSvcName).Return([]byte("type: Worker Service"), nil) m.EXPECT().EnvAddonFilePath(gomock.Eq("my-table.yml")).Return("mockEnvTemplatePath") m.EXPECT().WorkloadAddonFilePath(gomock.Eq(wantedSvcName), gomock.Eq("my-table-access-policy.yml")).Return("mockWkldTemplatePath") m.EXPECT().Write(gomock.Any(), "mockEnvTemplatePath").Return("mockEnvTemplatePath", nil) m.EXPECT().Write(gomock.Any(), "mockWkldTemplatePath").Return("mockWkldTemplatePath", nil) }, }, "happy calls for env DDB with LSI": { inStorageType: dynamoDBStorageType, inSvcName: wantedSvcName, inStorageName: "my-table", inPartition: wantedPartitionKey, inSort: wantedSortKey, inLSISorts: []string{"goodness:Number"}, inLifecycle: lifecycleEnvironmentLevel, mockWS: func(m *mocks.MockwsReadWriter) { m.EXPECT().WorkloadExists(wantedSvcName).Return(true, nil) m.EXPECT().ReadWorkloadManifest(wantedSvcName).Return([]byte("type: Worker Service"), nil) m.EXPECT().EnvAddonFilePath(gomock.Eq("my-table.yml")).Return("mockEnvTemplatePath") m.EXPECT().WorkloadAddonFilePath(gomock.Eq(wantedSvcName), gomock.Eq("my-table-access-policy.yml")).Return("mockWkldTemplatePath") m.EXPECT().Write(gomock.Any(), "mockEnvTemplatePath").Return("mockEnvTemplatePath", nil) m.EXPECT().Write(gomock.Any(), "mockWkldTemplatePath").Return("mockWkldTemplatePath", nil) }, }, "happy calls for env RDS with LBWS": { inSvcName: wantedSvcName, inStorageType: rdsStorageType, inStorageName: "mycluster", inServerlessVersion: auroraServerlessVersionV1, inEngine: engineTypeMySQL, inParameterGroup: "mygroup", inLifecycle: lifecycleEnvironmentLevel, mockWS: func(m *mocks.MockwsReadWriter) { m.EXPECT().WorkloadExists(wantedSvcName).Return(true, nil) m.EXPECT().ReadWorkloadManifest(wantedSvcName).Return([]byte("type: Load-Balanced Web Service"), nil) m.EXPECT().EnvAddonFilePath(gomock.Eq("mycluster.yml")).Return("mockEnvTemplatePath") m.EXPECT().EnvAddonFilePath(gomock.Eq("addons.parameters.yml")).Return("mockEnvParametersPath") m.EXPECT().Write(gomock.Any(), "mockEnvTemplatePath").Return("mockEnvTemplatePath", nil) m.EXPECT().Write(gomock.Any(), "mockEnvParametersPath").Return("mockEnvParametersPath", nil) }, mockStore: func(m *mocks.Mockstore) { m.EXPECT().ListEnvironments(gomock.Any()).Times(1) }, }, "happy calls for env RDS with RDWS": { inSvcName: wantedSvcName, inStorageType: rdsStorageType, inStorageName: "mycluster", inServerlessVersion: auroraServerlessVersionV1, inEngine: engineTypeMySQL, inParameterGroup: "mygroup", inLifecycle: lifecycleEnvironmentLevel, mockWS: func(m *mocks.MockwsReadWriter) { m.EXPECT().WorkloadExists(wantedSvcName).Return(true, nil) m.EXPECT().ReadWorkloadManifest(wantedSvcName).Return([]byte("type: Request-Driven Web Service"), nil) m.EXPECT().EnvAddonFilePath(gomock.Eq("mycluster.yml")).Return("mockEnvTemplatePath") m.EXPECT().EnvAddonFilePath(gomock.Eq("addons.parameters.yml")).Return("mockEnvParametersPath") m.EXPECT().WorkloadAddonFilePath(gomock.Eq(wantedSvcName), gomock.Eq("mycluster-ingress.yml")).Return("mockWkldTmplPath") m.EXPECT().WorkloadAddonFilePath(gomock.Eq(wantedSvcName), gomock.Eq("addons.parameters.yml")).Return("mockWkldParamsPath") m.EXPECT().Write(gomock.Any(), "mockEnvTemplatePath").Return("mockEnvTemplatePath", nil) m.EXPECT().Write(gomock.Any(), "mockEnvParametersPath").Return("mockEnvParametersPath", nil) m.EXPECT().Write(gomock.Any(), "mockWkldTmplPath").Return("mockWkldTmplPath", nil) m.EXPECT().Write(gomock.Any(), "mockWkldParamsPath").Return("mockWkldParamsPath", nil) }, mockStore: func(m *mocks.Mockstore) { m.EXPECT().ListEnvironments(gomock.Any()).Times(1) }, }, "add ingress for env DDB": { inStorageType: dynamoDBStorageType, inStorageName: "my-table", inNoLSI: true, inNoSort: true, inPartition: wantedPartitionKey, inAddIngressFrom: wantedSvcName, mockWS: func(m *mocks.MockwsReadWriter) { m.EXPECT().WorkloadExists(wantedSvcName).Return(true, nil) m.EXPECT().ReadWorkloadManifest(wantedSvcName).Return([]byte("type: Worker Service"), nil) m.EXPECT().WorkloadAddonFilePath(gomock.Eq(wantedSvcName), gomock.Eq("my-table-access-policy.yml")).Return("mockWkldTemplatePath") m.EXPECT().Write(gomock.Any(), "mockWkldTemplatePath").Return("mockWkldTemplatePath", nil) }, }, "add ingress for env S3": { inStorageType: s3StorageType, inStorageName: "my-bucket", inAddIngressFrom: wantedSvcName, mockWS: func(m *mocks.MockwsReadWriter) { m.EXPECT().WorkloadExists(wantedSvcName).Return(true, nil) m.EXPECT().ReadWorkloadManifest(wantedSvcName).Return([]byte("type: Worker Service"), nil) m.EXPECT().WorkloadAddonFilePath(gomock.Eq(wantedSvcName), gomock.Eq("my-bucket-access-policy.yml")).Return("mockWkldTemplatePath") m.EXPECT().Write(gomock.Any(), "mockWkldTemplatePath").Return("mockWkldTemplatePath", nil) }, }, "add ingress for env RDS with LBWS": { inStorageType: rdsStorageType, inStorageName: "mycluster", inAddIngressFrom: wantedSvcName, mockWS: func(m *mocks.MockwsReadWriter) { m.EXPECT().WorkloadExists(wantedSvcName).Return(true, nil) m.EXPECT().ReadWorkloadManifest(wantedSvcName).Return([]byte("type: Load-Balanced Web Service"), nil) }, }, "add ingress for env RDS with RDWS": { inStorageType: rdsStorageType, inStorageName: "mycluster", inAddIngressFrom: wantedSvcName, mockWS: func(m *mocks.MockwsReadWriter) { m.EXPECT().WorkloadExists(wantedSvcName).Return(true, nil) m.EXPECT().ReadWorkloadManifest(wantedSvcName).Return([]byte("type: Request-Driven Web Service"), nil) m.EXPECT().WorkloadAddonFilePath(gomock.Eq(wantedSvcName), gomock.Eq("mycluster-ingress.yml")).Return("mockWkldTmplPath") m.EXPECT().WorkloadAddonFilePath(gomock.Eq(wantedSvcName), gomock.Eq("addons.parameters.yml")).Return("mockWkldParamsPath") m.EXPECT().Write(gomock.Any(), "mockWkldTmplPath").Return("mockWkldTmplPath", nil) m.EXPECT().Write(gomock.Any(), "mockWkldParamsPath").Return("mockWkldParamsPath", nil) }, }, "do not attempt to read manifest or write workload ingress for an env RDS if workload is not in the workspace": { inSvcName: wantedSvcName, inStorageType: rdsStorageType, inStorageName: "mycluster", inServerlessVersion: auroraServerlessVersionV1, inEngine: engineTypeMySQL, inParameterGroup: "mygroup", inLifecycle: lifecycleEnvironmentLevel, mockWS: func(m *mocks.MockwsReadWriter) { m.EXPECT().WorkloadExists(wantedSvcName).Return(false, nil) m.EXPECT().ReadWorkloadManifest(wantedSvcName).Times(0) m.EXPECT().EnvAddonFilePath(gomock.Eq("mycluster.yml")).Return("mockEnvPath") m.EXPECT().EnvAddonFilePath(gomock.Eq("addons.parameters.yml")).Return("mockEnvPath") m.EXPECT().Write(gomock.Any(), gomock.Not(gomock.Eq("mockWkldPath"))).Return("mockEnvTemplatePath", nil).Times(2) }, mockStore: func(m *mocks.Mockstore) { m.EXPECT().ListEnvironments(gomock.Any()).Times(1) }, }, "do not error out if addon exists": { inStorageType: s3StorageType, inSvcName: wantedSvcName, inStorageName: "my-bucket", inLifecycle: lifecycleWorkloadLevel, mockWS: func(m *mocks.MockwsReadWriter) { m.EXPECT().WorkloadExists(wantedSvcName).Return(true, nil) m.EXPECT().ReadWorkloadManifest(wantedSvcName).Return([]byte("type: Worker Service"), nil) m.EXPECT().WorkloadAddonFilePath(gomock.Eq(wantedSvcName), gomock.Eq("my-bucket.yml")).Return("mockPath") m.EXPECT().Write(gomock.Any(), "mockPath").Return("/frontend/addons/my-bucket.yml", nil).Return("", fileExistsError) }, mockStore: func(m *mocks.Mockstore) { m.EXPECT().ListEnvironments(gomock.Any()).AnyTimes() }, }, "unexpected read workload manifest error handled": { inStorageType: s3StorageType, inSvcName: wantedSvcName, inStorageName: "my-bucket", inLifecycle: lifecycleWorkloadLevel, mockWS: func(m *mocks.MockwsReadWriter) { m.EXPECT().WorkloadExists(wantedSvcName).Return(true, nil) m.EXPECT().ReadWorkloadManifest(wantedSvcName).Return(nil, errors.New("some error")) }, wantedErr: errors.New("read manifest for frontend: some error"), }, "unexpected write addon error handled": { inStorageType: s3StorageType, inSvcName: wantedSvcName, inStorageName: "my-bucket", inLifecycle: lifecycleWorkloadLevel, mockWS: func(m *mocks.MockwsReadWriter) { m.EXPECT().WorkloadExists(wantedSvcName).Return(true, nil) m.EXPECT().ReadWorkloadManifest(wantedSvcName).Return([]byte("type: Worker Service"), nil) m.EXPECT().WorkloadAddonFilePath(gomock.Eq(wantedSvcName), gomock.Eq("my-bucket.yml")).Return("mockPath") m.EXPECT().Write(gomock.Any(), "mockPath").Return("", errors.New("some error")) }, wantedErr: fmt.Errorf("some error"), }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { // GIVEN ctrl := gomock.NewController(t) defer ctrl.Finish() mockStore := mocks.NewMockstore(ctrl) mockWS := mocks.NewMockwsReadWriter(ctrl) opts := initStorageOpts{ initStorageVars: initStorageVars{ storageType: tc.inStorageType, storageName: tc.inStorageName, workloadName: tc.inSvcName, lifecycle: tc.inLifecycle, addIngressFrom: tc.inAddIngressFrom, partitionKey: tc.inPartition, sortKey: tc.inSort, lsiSorts: tc.inLSISorts, noLSI: tc.inNoLSI, noSort: tc.inNoSort, auroraServerlessVersion: tc.inServerlessVersion, rdsEngine: tc.inEngine, rdsParameterGroup: tc.inParameterGroup, }, appName: wantedAppName, ws: mockWS, store: mockStore, workloadExists: !tc.mockWkldAbsent, } tc.mockWS(mockWS) if tc.mockStore != nil { tc.mockStore(mockStore) } // WHEN err := opts.Execute() // THEN if tc.wantedErr != nil { require.EqualError(t, err, tc.wantedErr.Error()) } else { require.NoError(t, err) } }) } }
1,527
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package cli import ( "errors" "github.com/aws/copilot-cli/cmd/copilot/template" "github.com/aws/copilot-cli/internal/pkg/cli/group" "github.com/spf13/cobra" ) var errNoAppInWorkspace = errors.New("could not find an application attached to this workspace, please run `app init` first") // BuildSvcCmd is the top level command for service. func BuildSvcCmd() *cobra.Command { cmd := &cobra.Command{ Use: "svc", Short: `Commands for services. Services are long-running ECS or App Runner services.`, Long: `Commands for services. Services are long-running ECS or App Runner services.`, } cmd.AddCommand(buildSvcInitCmd()) cmd.AddCommand(buildSvcListCmd()) cmd.AddCommand(buildSvcPackageCmd()) cmd.AddCommand(buildSvcOverrideCmd()) cmd.AddCommand(buildSvcDeployCmd()) cmd.AddCommand(buildSvcDeleteCmd()) cmd.AddCommand(buildSvcShowCmd()) cmd.AddCommand(buildSvcStatusCmd()) cmd.AddCommand(buildSvcLogsCmd()) cmd.AddCommand(buildSvcExecCmd()) cmd.AddCommand(buildSvcPauseCmd()) cmd.AddCommand(buildSvcResumeCmd()) cmd.SetUsageTemplate(template.Usage) cmd.Annotations = map[string]string{ "group": group.Develop, } return cmd }
46
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 // SPDX-License-Identifier: Apache-2.0 package cli import ( "errors" "fmt" "os" "github.com/aws/aws-sdk-go/aws" "github.com/aws/aws-sdk-go/service/ssm" "github.com/aws/copilot-cli/internal/pkg/aws/identity" awss3 "github.com/aws/copilot-cli/internal/pkg/aws/s3" "github.com/aws/copilot-cli/internal/pkg/cli/clean" "github.com/aws/copilot-cli/internal/pkg/manifest/manifestinfo" "github.com/aws/copilot-cli/internal/pkg/s3" "github.com/aws/copilot-cli/internal/pkg/term/selector" awssession "github.com/aws/aws-sdk-go/aws/session" "github.com/aws/copilot-cli/internal/pkg/aws/ecr" "github.com/aws/copilot-cli/internal/pkg/aws/sessions" "github.com/aws/copilot-cli/internal/pkg/config" "github.com/aws/copilot-cli/internal/pkg/deploy" "github.com/aws/copilot-cli/internal/pkg/deploy/cloudformation" "github.com/aws/copilot-cli/internal/pkg/term/color" "github.com/aws/copilot-cli/internal/pkg/term/log" termprogress "github.com/aws/copilot-cli/internal/pkg/term/progress" "github.com/aws/copilot-cli/internal/pkg/term/prompt" "github.com/spf13/cobra" ) const ( svcDeleteNamePrompt = "Which service would you like to delete?" fmtSvcDeleteConfirmPrompt = "Are you sure you want to delete %s from application %s?" fmtSvcDeleteFromEnvConfirmPrompt = "Are you sure you want to delete %s from environment %s?" svcDeleteConfirmHelp = "This will remove the service from all environments and delete it from your app." svcDeleteFromEnvConfirmHelp = "This will remove the service from just the %s environment." ) var ( errSvcDeleteCancelled = errors.New("svc delete cancelled - no changes made") ) type cleaner interface { Clean() error } type deleteSvcVars struct { appName string skipConfirmation bool name string envName string } type deleteSvcOpts struct { deleteSvcVars // Interfaces to dependencies. store store sess sessionProvider spinner progress prompt prompter sel configSelector appCFN svcRemoverFromApp getSvcCFN func(sess *awssession.Session) wlDeleter getECR func(sess *awssession.Session) imageRemover newSvcCleaner func(sess *awssession.Session, manifestType string) cleaner } func newDeleteSvcOpts(vars deleteSvcVars) (*deleteSvcOpts, error) { sessProvider := sessions.ImmutableProvider(sessions.UserAgentExtras("svc delete")) defaultSession, err := sessProvider.Default() if err != nil { return nil, err } store := config.NewSSMStore(identity.New(defaultSession), ssm.New(defaultSession), aws.StringValue(defaultSession.Config.Region)) prompter := prompt.New() opts := &deleteSvcOpts{ deleteSvcVars: vars, store: store, spinner: termprogress.NewSpinner(log.DiagnosticWriter), prompt: prompter, sess: sessProvider, sel: selector.NewConfigSelector(prompter, store), appCFN: cloudformation.New(defaultSession, cloudformation.WithProgressTracker(os.Stderr)), getSvcCFN: func(sess *awssession.Session) wlDeleter { return cloudformation.New(sess, cloudformation.WithProgressTracker(os.Stderr)) }, getECR: func(sess *awssession.Session) imageRemover { return ecr.New(sess) }, } opts.newSvcCleaner = func(sess *awssession.Session, manifestType string) cleaner { if manifestType == manifestinfo.StaticSiteType { return clean.StaticSite(opts.appName, opts.envName, opts.name, s3.New(sess), awss3.New(sess)) } return &clean.NoOp{} } return opts, nil } // Validate returns an error for any invalid optional flags. func (o *deleteSvcOpts) Validate() error { return nil } // Ask prompts for and validates any required flags. func (o *deleteSvcOpts) Ask() error { if o.appName != "" { if _, err := o.store.GetApplication(o.appName); err != nil { return err } } else { if err := o.askAppName(); err != nil { return err } } if o.name != "" { if _, err := o.store.GetService(o.appName, o.name); err != nil { return err } } else { if err := o.askSvcName(); err != nil { return err } } if o.envName != "" { if err := o.validateEnvName(); err != nil { return err } } if o.skipConfirmation { return nil } // When there's no env name passed in, we'll completely // remove the service from the application. deletePrompt := fmt.Sprintf(fmtSvcDeleteConfirmPrompt, o.name, o.appName) deleteConfirmHelp := svcDeleteConfirmHelp if o.envName != "" { // When a customer provides a particular environment, // we'll just delete the service from that environment - // but keep it in the app. deletePrompt = fmt.Sprintf(fmtSvcDeleteFromEnvConfirmPrompt, o.name, o.envName) deleteConfirmHelp = fmt.Sprintf(svcDeleteFromEnvConfirmHelp, o.envName) } deleteConfirmed, err := o.prompt.Confirm( deletePrompt, deleteConfirmHelp, prompt.WithConfirmFinalMessage()) if err != nil { return fmt.Errorf("svc delete confirmation prompt: %w", err) } if !deleteConfirmed { return errSvcDeleteCancelled } return nil } // Execute deletes the service's CloudFormation stack. // If the service is being removed from the application, Execute will // also delete the ECR repository and the SSM parameter. func (o *deleteSvcOpts) Execute() error { wkld, err := o.store.GetWorkload(o.appName, o.name) if err != nil { return fmt.Errorf("get workload: %w", err) } envs, err := o.appEnvironments() if err != nil { return err } if err := o.deleteStacks(wkld.Type, envs); err != nil { return err } // Skip removing the service from the application if // we are only removing the stack from a particular environment. if !o.needsAppCleanup() { return nil } if err := o.emptyECRRepos(envs); err != nil { return err } if err := o.removeSvcFromApp(); err != nil { return err } if err := o.deleteSSMParam(); err != nil { return err } log.Infoln() log.Successf("Deleted service %s from application %s.\n", o.name, o.appName) return nil } func (o *deleteSvcOpts) validateEnvName() error { if _, err := o.targetEnv(); err != nil { return err } return nil } func (o *deleteSvcOpts) needsAppCleanup() bool { // Only remove from a service from the app if // we're removing it from every environment. // If we're just removing the service from one // env, we keep the app configuration. return o.envName == "" } func (o *deleteSvcOpts) targetEnv() (*config.Environment, error) { env, err := o.store.GetEnvironment(o.appName, o.envName) if err != nil { return nil, fmt.Errorf("get environment %s from config store: %w", o.envName, err) } return env, nil } func (o *deleteSvcOpts) askAppName() error { name, err := o.sel.Application(svcAppNamePrompt, wkldAppNameHelpPrompt) if err != nil { return fmt.Errorf("select application name: %w", err) } o.appName = name return nil } func (o *deleteSvcOpts) askSvcName() error { name, err := o.sel.Service(svcDeleteNamePrompt, "", o.appName) if err != nil { return fmt.Errorf("select service: %w", err) } o.name = name return nil } func (o *deleteSvcOpts) appEnvironments() ([]*config.Environment, error) { var envs []*config.Environment var err error if o.envName != "" { env, err := o.targetEnv() if err != nil { return nil, err } envs = append(envs, env) } else { envs, err = o.store.ListEnvironments(o.appName) if err != nil { return nil, fmt.Errorf("list environments: %w", err) } } return envs, nil } func (o *deleteSvcOpts) deleteStacks(wkldType string, envs []*config.Environment) error { for _, env := range envs { sess, err := o.sess.FromRole(env.ManagerRoleARN, env.Region) if err != nil { return err } if err := o.newSvcCleaner(sess, wkldType).Clean(); err != nil { return fmt.Errorf("clean resources: %w", err) } cfClient := o.getSvcCFN(sess) if err := cfClient.DeleteWorkload(deploy.DeleteWorkloadInput{ Name: o.name, EnvName: env.Name, AppName: o.appName, ExecutionRoleARN: env.ExecutionRoleARN, }); err != nil { return fmt.Errorf("delete service: %w", err) } } return nil } // This is to make mocking easier in unit tests func (o *deleteSvcOpts) emptyECRRepos(envs []*config.Environment) error { var uniqueRegions []string for _, env := range envs { if !contains(env.Region, uniqueRegions) { uniqueRegions = append(uniqueRegions, env.Region) } } // TODO: centralized ECR repo name repoName := fmt.Sprintf("%s/%s", o.appName, o.name) for _, region := range uniqueRegions { sess, err := o.sess.DefaultWithRegion(region) if err != nil { return err } client := o.getECR(sess) if err := client.ClearRepository(repoName); err != nil { return err } } return nil } func (o *deleteSvcOpts) removeSvcFromApp() error { proj, err := o.store.GetApplication(o.appName) if err != nil { return err } if err := o.appCFN.RemoveServiceFromApp(proj, o.name); err != nil { if !isStackSetNotExistsErr(err) { return err } } return nil } func (o *deleteSvcOpts) deleteSSMParam() error { if err := o.store.DeleteService(o.appName, o.name); err != nil { return fmt.Errorf("delete service %s in application %s from config store: %w", o.name, o.appName, err) } return nil } // RecommendActions returns follow-up actions the user can take after successfully executing the command. func (o *deleteSvcOpts) RecommendActions() error { logRecommendedActions([]string{ fmt.Sprintf("Run %s to update the corresponding pipeline if it exists.", color.HighlightCode("copilot pipeline deploy")), }) return nil } // buildSvcDeleteCmd builds the command to delete application(s). func buildSvcDeleteCmd() *cobra.Command { vars := deleteSvcVars{} cmd := &cobra.Command{ Use: "delete", Short: "Deletes a service from an application.", Example: ` Delete the "test" service from the application. /code $ copilot svc delete --name test Delete the "test" service from just the prod environment. /code $ copilot svc delete --name test --env prod Delete the "test" service from the "my-app" application from outside of the workspace. /code $ copilot svc delete --name test --app my-app Delete the "test" service without confirmation prompt. /code $ copilot svc delete --name test --yes`, RunE: runCmdE(func(cmd *cobra.Command, args []string) error { opts, err := newDeleteSvcOpts(vars) if err != nil { return err } return run(opts) }), } cmd.Flags().StringVarP(&vars.appName, appFlag, appFlagShort, tryReadingAppName(), appFlagDescription) cmd.Flags().StringVarP(&vars.name, nameFlag, nameFlagShort, "", svcFlagDescription) cmd.Flags().StringVarP(&vars.envName, envFlag, envFlagShort, "", envFlagDescription) cmd.Flags().BoolVar(&vars.skipConfirmation, yesFlag, false, yesFlagDescription) return cmd }
381
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package cli import ( "errors" "fmt" "testing" "github.com/aws/aws-sdk-go/aws/session" "github.com/aws/copilot-cli/internal/pkg/cli/clean/cleantest" "github.com/aws/copilot-cli/internal/pkg/cli/mocks" "github.com/aws/copilot-cli/internal/pkg/config" "github.com/aws/copilot-cli/internal/pkg/manifest/manifestinfo" "github.com/golang/mock/gomock" "github.com/stretchr/testify/require" ) func TestDeleteSvcOpts_Validate(t *testing.T) { tests := map[string]struct { inAppName string inEnvName string inName string setupMocks func(m *mocks.Mockstore) want error }{ "with no flag set": { inAppName: "phonetool", setupMocks: func(m *mocks.Mockstore) {}, want: nil, }, "with all flags set": { inAppName: "phonetool", inEnvName: "test", inName: "api", setupMocks: func(m *mocks.Mockstore) {}, want: nil, }, "with env flag set": { inAppName: "phonetool", inEnvName: "test", setupMocks: func(m *mocks.Mockstore) {}, want: nil, }, "with svc flag set": { inAppName: "phonetool", inName: "api", setupMocks: func(m *mocks.Mockstore) {}, want: nil, }, } for name, test := range tests { t.Run(name, func(t *testing.T) { ctrl := gomock.NewController(t) defer ctrl.Finish() mockstore := mocks.NewMockstore(ctrl) test.setupMocks(mockstore) opts := deleteSvcOpts{ deleteSvcVars: deleteSvcVars{ appName: test.inAppName, name: test.inName, envName: test.inEnvName, }, store: mockstore, } err := opts.Validate() if test.want != nil { require.EqualError(t, err, test.want.Error()) } else { require.NoError(t, err) } }) } } type svcDeleteAskMocks struct { store *mocks.Mockstore prompt *mocks.Mockprompter sel *mocks.MockconfigSelector } func TestDeleteSvcOpts_Ask(t *testing.T) { const ( testAppName = "phonetool" testSvcName = "api" ) mockError := errors.New("mockError") tests := map[string]struct { skipConfirmation bool inName string envName string appName string mockSel func(m *mocks.MockconfigSelector) mockPrompt func(m *mocks.Mockprompter) setUpMocks func(m *svcDeleteAskMocks) wantedName string wantedError error }{ "validate app name if passed as a flag": { appName: testAppName, inName: testSvcName, skipConfirmation: true, setUpMocks: func(m *svcDeleteAskMocks) { m.store.EXPECT().GetApplication(gomock.Any()).Return(&config.Application{}, nil) m.sel.EXPECT().Application(gomock.Any(), gomock.Any()).Times(0) m.store.EXPECT().GetService(gomock.Any(), gomock.Any()).AnyTimes() }, wantedName: testSvcName, }, "error validating app name": { appName: testAppName, inName: testSvcName, skipConfirmation: true, setUpMocks: func(m *svcDeleteAskMocks) { m.store.EXPECT().GetApplication(gomock.Any()).Return(nil, &config.ErrNoSuchApplication{}) m.sel.EXPECT().Application(gomock.Any(), gomock.Any()).Times(0) }, wantedError: &config.ErrNoSuchApplication{}, }, "should ask for app name": { appName: "", inName: testSvcName, skipConfirmation: true, setUpMocks: func(m *svcDeleteAskMocks) { m.sel.EXPECT().Application(svcAppNamePrompt, wkldAppNameHelpPrompt).Return(testAppName, nil) m.store.EXPECT().GetApplication(gomock.Any()).Times(0) m.store.EXPECT().GetService(gomock.Any(), gomock.Any()).AnyTimes() }, wantedName: testSvcName, }, "validate service name if passed as a flag": { appName: testAppName, inName: testSvcName, skipConfirmation: true, setUpMocks: func(m *svcDeleteAskMocks) { m.store.EXPECT().GetApplication(gomock.Any()).AnyTimes() m.store.EXPECT().GetService(gomock.Any(), gomock.Any()).Return(&config.Workload{}, nil) m.sel.EXPECT().Service(gomock.Any(), gomock.Any(), gomock.Any()).Times(0) }, wantedName: testSvcName, }, "error validating service name": { appName: testAppName, inName: testSvcName, skipConfirmation: true, setUpMocks: func(m *svcDeleteAskMocks) { m.store.EXPECT().GetApplication(gomock.Any()).Return(&config.Application{}, nil) m.store.EXPECT().GetService(gomock.Any(), gomock.Any()).Return(nil, errors.New("some error")) }, wantedError: errors.New("some error"), }, "should ask for service name": { appName: testAppName, inName: "", skipConfirmation: true, setUpMocks: func(m *svcDeleteAskMocks) { m.sel.EXPECT().Service("Which service would you like to delete?", "", testAppName).Return(testSvcName, nil) m.store.EXPECT().GetService(gomock.Any(), gomock.Any()).Times(0) m.store.EXPECT().GetApplication(gomock.Any()).AnyTimes() }, wantedName: testSvcName, }, "returns error if no services found": { appName: testAppName, inName: "", skipConfirmation: true, setUpMocks: func(m *svcDeleteAskMocks) { m.sel.EXPECT().Service("Which service would you like to delete?", "", testAppName).Return("", mockError) m.store.EXPECT().GetApplication(gomock.Any()).AnyTimes() }, wantedError: fmt.Errorf("select service: %w", mockError), }, "returns error if fail to select service": { appName: testAppName, inName: "", skipConfirmation: true, setUpMocks: func(m *svcDeleteAskMocks) { m.sel.EXPECT().Service("Which service would you like to delete?", "", testAppName).Return("", mockError) m.store.EXPECT().GetApplication(gomock.Any()).AnyTimes() }, wantedError: fmt.Errorf("select service: %w", mockError), }, "should skip confirmation": { appName: testAppName, inName: testSvcName, skipConfirmation: true, setUpMocks: func(m *svcDeleteAskMocks) { m.prompt.EXPECT().Confirm(gomock.Any(), gomock.Any(), gomock.Any).Times(0) m.store.EXPECT().GetService(gomock.Any(), gomock.Any()).AnyTimes() m.store.EXPECT().GetApplication(gomock.Any()).AnyTimes() }, wantedName: testSvcName, }, "should wrap error returned from prompter confirmation": { appName: testAppName, inName: testSvcName, skipConfirmation: false, setUpMocks: func(m *svcDeleteAskMocks) { m.prompt.EXPECT().Confirm( fmt.Sprintf(fmtSvcDeleteConfirmPrompt, testSvcName, testAppName), svcDeleteConfirmHelp, gomock.Any(), ).Times(1).Return(true, mockError) m.store.EXPECT().GetService(gomock.Any(), gomock.Any()).AnyTimes() m.store.EXPECT().GetApplication(gomock.Any()).AnyTimes() }, wantedError: fmt.Errorf("svc delete confirmation prompt: %w", mockError), }, "should return error if user does not confirm svc delete": { appName: testAppName, inName: testSvcName, skipConfirmation: false, setUpMocks: func(m *svcDeleteAskMocks) { m.prompt.EXPECT().Confirm( fmt.Sprintf(fmtSvcDeleteConfirmPrompt, testSvcName, testAppName), svcDeleteConfirmHelp, gomock.Any(), ).Times(1).Return(false, nil) m.store.EXPECT().GetService(gomock.Any(), gomock.Any()).AnyTimes() m.store.EXPECT().GetApplication(gomock.Any()).AnyTimes() }, wantedError: errSvcDeleteCancelled, }, "should return error nil if user confirms svc delete": { appName: testAppName, inName: testSvcName, skipConfirmation: false, setUpMocks: func(m *svcDeleteAskMocks) { m.prompt.EXPECT().Confirm( fmt.Sprintf(fmtSvcDeleteConfirmPrompt, testSvcName, testAppName), svcDeleteConfirmHelp, gomock.Any(), ).Times(1).Return(true, nil) m.store.EXPECT().GetService(gomock.Any(), gomock.Any()).AnyTimes() m.store.EXPECT().GetApplication(gomock.Any()).AnyTimes() }, wantedName: testSvcName, }, "should return error nil if user confirms svc delete --env": { appName: testAppName, inName: testSvcName, envName: "test", skipConfirmation: false, setUpMocks: func(m *svcDeleteAskMocks) { m.store.EXPECT().GetEnvironment(testAppName, "test").Return(&config.Environment{}, nil) m.prompt.EXPECT().Confirm( fmt.Sprintf(fmtSvcDeleteFromEnvConfirmPrompt, testSvcName, "test"), fmt.Sprintf(svcDeleteFromEnvConfirmHelp, "test"), gomock.Any(), ).Times(1).Return(true, nil) m.store.EXPECT().GetService(gomock.Any(), gomock.Any()).AnyTimes() m.store.EXPECT().GetApplication(gomock.Any()).AnyTimes() }, wantedName: testSvcName, }, } for name, test := range tests { t.Run(name, func(t *testing.T) { ctrl := gomock.NewController(t) defer ctrl.Finish() mockPrompter := mocks.NewMockprompter(ctrl) mockSel := mocks.NewMockconfigSelector(ctrl) mockStore := mocks.NewMockstore(ctrl) m := &svcDeleteAskMocks{ sel: mockSel, prompt: mockPrompter, store: mockStore, } test.setUpMocks(m) opts := deleteSvcOpts{ deleteSvcVars: deleteSvcVars{ skipConfirmation: test.skipConfirmation, appName: test.appName, name: test.inName, envName: test.envName, }, prompt: m.prompt, sel: m.sel, store: m.store, } got := opts.Ask() if got != nil { require.Equal(t, test.wantedError, got) } else { require.Equal(t, test.wantedName, opts.name) } }) } } type deleteSvcMocks struct { store *mocks.Mockstore secretsmanager *mocks.MocksecretsManager sessProvider *mocks.MocksessionProvider appCFN *mocks.MocksvcRemoverFromApp spinner *mocks.Mockprogress svcCFN *mocks.MockwlDeleter ecr *mocks.MockimageRemover } func TestDeleteSvcOpts_Execute(t *testing.T) { mockSvcName := "backend" mockEnvName := "test" mockAppName := "badgoose" mockEnv := &config.Environment{ App: mockAppName, Name: mockEnvName, ManagerRoleARN: "some-arn", Region: "us-west-2", } mockEnvs := []*config.Environment{mockEnv} mockApp := &config.Application{ Name: mockAppName, } mockRepo := fmt.Sprintf("%s/%s", mockAppName, mockSvcName) testError := errors.New("some error") tests := map[string]struct { inAppName string inEnvName string inSvcName string opts *deleteSvcOpts wkldCleaner cleaner setupMocks func(mocks deleteSvcMocks) wantedError error }{ "happy path with no environment passed in as flag": { opts: &deleteSvcOpts{ deleteSvcVars: deleteSvcVars{ appName: mockAppName, name: mockSvcName, }, newSvcCleaner: func(*session.Session, string) cleaner { return &cleantest.Succeeds{} }, }, setupMocks: func(mocks deleteSvcMocks) { gomock.InOrder( mocks.store.EXPECT().GetWorkload(mockAppName, mockSvcName).Return(&config.Workload{ Type: manifestinfo.LoadBalancedWebServiceType, }, nil), // appEnvironments mocks.store.EXPECT().ListEnvironments(gomock.Eq(mockAppName)).Times(1).Return(mockEnvs, nil), mocks.sessProvider.EXPECT().FromRole(gomock.Any(), gomock.Any()).Return(&session.Session{}, nil), // deleteStacks mocks.svcCFN.EXPECT().DeleteWorkload(gomock.Any()).Return(nil), mocks.sessProvider.EXPECT().DefaultWithRegion(gomock.Any()).Return(&session.Session{}, nil), // emptyECRRepos mocks.ecr.EXPECT().ClearRepository(mockRepo).Return(nil), // removeSvcFromApp mocks.store.EXPECT().GetApplication(mockAppName).Return(mockApp, nil), mocks.appCFN.EXPECT().RemoveServiceFromApp(mockApp, mockSvcName).Return(nil), // deleteSSMParam mocks.store.EXPECT().DeleteService(mockAppName, mockSvcName).Return(nil), ) }, wantedError: nil, }, // A service can be deployed to multiple // environments - and deleting it in one // should not delete it from the entire app. "happy path with environment passed in as flag": { opts: &deleteSvcOpts{ deleteSvcVars: deleteSvcVars{ appName: mockAppName, envName: mockEnvName, name: mockSvcName, }, newSvcCleaner: func(*session.Session, string) cleaner { return &cleantest.Succeeds{} }, }, setupMocks: func(mocks deleteSvcMocks) { gomock.InOrder( mocks.store.EXPECT().GetWorkload(mockAppName, mockSvcName).Return(&config.Workload{ Type: manifestinfo.LoadBalancedWebServiceType, }, nil), // appEnvironments mocks.store.EXPECT().GetEnvironment(mockAppName, mockEnvName).Times(1).Return(mockEnv, nil), mocks.sessProvider.EXPECT().FromRole(gomock.Any(), gomock.Any()).Return(&session.Session{}, nil), // deleteStacks mocks.svcCFN.EXPECT().DeleteWorkload(gomock.Any()).Return(nil), // It should **not** emptyECRRepos mocks.ecr.EXPECT().ClearRepository(gomock.Any()).Return(nil).Times(0), // It should **not** removeSvcFromApp mocks.appCFN.EXPECT().RemoveServiceFromApp(gomock.Any(), gomock.Any()).Return(nil).Times(0), // It should **not** deleteSSMParam mocks.store.EXPECT().DeleteService(gomock.Any(), gomock.Any()).Return(nil).Times(0), ) }, wantedError: nil, }, "error getting workload": { opts: &deleteSvcOpts{ deleteSvcVars: deleteSvcVars{ appName: mockAppName, name: mockSvcName, }, }, setupMocks: func(mocks deleteSvcMocks) { gomock.InOrder( mocks.store.EXPECT().GetWorkload(mockAppName, mockSvcName).Return(nil, errors.New("some error")), ) }, wantedError: errors.New("get workload: some error"), }, "error cleaning workload": { opts: &deleteSvcOpts{ deleteSvcVars: deleteSvcVars{ appName: mockAppName, envName: mockEnvName, name: mockSvcName, }, newSvcCleaner: func(*session.Session, string) cleaner { return &cleantest.Fails{} }, }, setupMocks: func(mocks deleteSvcMocks) { gomock.InOrder( mocks.store.EXPECT().GetWorkload(mockAppName, mockSvcName).Return(&config.Workload{ Type: manifestinfo.LoadBalancedWebServiceType, }, nil), mocks.store.EXPECT().GetEnvironment(mockAppName, mockEnvName).Times(1).Return(mockEnv, nil), mocks.sessProvider.EXPECT().FromRole(gomock.Any(), gomock.Any()).Return(&session.Session{}, nil), ) }, wantedError: errors.New("clean resources: an error"), }, "errors when deleting stack": { opts: &deleteSvcOpts{ deleteSvcVars: deleteSvcVars{ appName: mockAppName, envName: mockEnvName, name: mockSvcName, }, newSvcCleaner: func(*session.Session, string) cleaner { return &cleantest.Succeeds{} }, }, setupMocks: func(mocks deleteSvcMocks) { gomock.InOrder( mocks.store.EXPECT().GetWorkload(mockAppName, mockSvcName).Return(&config.Workload{ Type: manifestinfo.LoadBalancedWebServiceType, }, nil), // appEnvironments mocks.store.EXPECT().GetEnvironment(mockAppName, mockEnvName).Times(1).Return(mockEnv, nil), mocks.sessProvider.EXPECT().FromRole(gomock.Any(), gomock.Any()).Return(&session.Session{}, nil), // deleteStacks mocks.svcCFN.EXPECT().DeleteWorkload(gomock.Any()).Return(testError), ) }, wantedError: fmt.Errorf("delete service: %w", testError), }, } for name, tc := range tests { t.Run(name, func(t *testing.T) { ctrl := gomock.NewController(t) defer ctrl.Finish() mocks := deleteSvcMocks{ store: mocks.NewMockstore(ctrl), secretsmanager: mocks.NewMocksecretsManager(ctrl), sessProvider: mocks.NewMocksessionProvider(ctrl), appCFN: mocks.NewMocksvcRemoverFromApp(ctrl), spinner: mocks.NewMockprogress(ctrl), svcCFN: mocks.NewMockwlDeleter(ctrl), ecr: mocks.NewMockimageRemover(ctrl), } tc.setupMocks(mocks) tc.opts.store = mocks.store tc.opts.sess = mocks.sessProvider tc.opts.spinner = mocks.spinner tc.opts.appCFN = mocks.appCFN tc.opts.getSvcCFN = func(_ *session.Session) wlDeleter { return mocks.svcCFN } tc.opts.getECR = func(_ *session.Session) imageRemover { return mocks.ecr } // WHEN err := tc.opts.Execute() // THEN if tc.wantedError != nil { require.EqualError(t, err, tc.wantedError.Error()) } else { require.NoError(t, err) } }) } }
528
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package cli import ( "errors" "fmt" "io" "os" "path/filepath" "strings" "github.com/aws/aws-sdk-go/aws" "github.com/aws/aws-sdk-go/aws/session" "github.com/aws/aws-sdk-go/service/ssm" "github.com/aws/copilot-cli/internal/pkg/aws/identity" "github.com/aws/copilot-cli/internal/pkg/aws/tags" "github.com/aws/copilot-cli/internal/pkg/deploy/cloudformation/stack" "github.com/aws/copilot-cli/internal/pkg/manifest/manifestinfo" "github.com/aws/copilot-cli/internal/pkg/template" "github.com/aws/copilot-cli/internal/pkg/version" "github.com/spf13/afero" "github.com/spf13/cobra" "github.com/aws/copilot-cli/internal/pkg/aws/sessions" clideploy "github.com/aws/copilot-cli/internal/pkg/cli/deploy" "github.com/aws/copilot-cli/internal/pkg/config" "github.com/aws/copilot-cli/internal/pkg/describe" "github.com/aws/copilot-cli/internal/pkg/exec" "github.com/aws/copilot-cli/internal/pkg/manifest" "github.com/aws/copilot-cli/internal/pkg/term/color" "github.com/aws/copilot-cli/internal/pkg/term/log" termprogress "github.com/aws/copilot-cli/internal/pkg/term/progress" "github.com/aws/copilot-cli/internal/pkg/term/prompt" "github.com/aws/copilot-cli/internal/pkg/term/selector" "github.com/aws/copilot-cli/internal/pkg/workspace" ) type deployWkldVars struct { appName string name string envName string imageTag string resourceTags map[string]string forceNewUpdate bool // NOTE: this variable is not applicable for a job workload currently. disableRollback bool showDiff bool skipDiffPrompt bool // To facilitate unit tests. clientConfigured bool } type deploySvcOpts struct { deployWkldVars store store ws wsWlDirReader unmarshal func([]byte) (manifest.DynamicWorkload, error) newInterpolator func(app, env string) interpolator cmd execRunner sessProvider *sessions.Provider newSvcDeployer func() (workloadDeployer, error) envFeaturesDescriber versionCompatibilityChecker diffWriter io.Writer spinner progress sel wsSelector prompt prompter gitShortCommit string // cached variables targetApp *config.Application targetEnv *config.Environment envSess *session.Session svcType string appliedDynamicMft manifest.DynamicWorkload rootUserARN string deployRecs clideploy.ActionRecommender noDeploy bool } func newSvcDeployOpts(vars deployWkldVars) (*deploySvcOpts, error) { ws, err := workspace.Use(afero.NewOsFs()) if err != nil { return nil, err } sessProvider := sessions.ImmutableProvider(sessions.UserAgentExtras("svc deploy")) defaultSession, err := sessProvider.Default() if err != nil { return nil, err } store := config.NewSSMStore(identity.New(defaultSession), ssm.New(defaultSession), aws.StringValue(defaultSession.Config.Region)) prompter := prompt.New() opts := &deploySvcOpts{ deployWkldVars: vars, store: store, ws: ws, unmarshal: manifest.UnmarshalWorkload, spinner: termprogress.NewSpinner(log.DiagnosticWriter), sel: selector.NewLocalWorkloadSelector(prompter, store, ws), prompt: prompter, newInterpolator: newManifestInterpolator, cmd: exec.NewCmd(), sessProvider: sessProvider, diffWriter: os.Stdout, } opts.newSvcDeployer = func() (workloadDeployer, error) { // NOTE: Defined as a struct member to facilitate unit testing. return newSvcDeployer(opts) } return opts, err } func newSvcDeployer(o *deploySvcOpts) (workloadDeployer, error) { targetApp, err := o.getTargetApp() if err != nil { return nil, err } raw, err := o.ws.ReadWorkloadManifest(o.name) if err != nil { return nil, fmt.Errorf("read manifest file for %s: %w", o.name, err) } ovrdr, err := clideploy.NewOverrider(o.ws.WorkloadOverridesPath(o.name), o.appName, o.envName, afero.NewOsFs(), o.sessProvider) if err != nil { return nil, err } content := o.appliedDynamicMft.Manifest() var deployer workloadDeployer in := clideploy.WorkloadDeployerInput{ SessionProvider: o.sessProvider, Name: o.name, App: targetApp, Env: o.targetEnv, Image: clideploy.ContainerImageIdentifier{ CustomTag: o.imageTag, GitShortCommitTag: o.gitShortCommit, }, Mft: content, RawMft: raw, EnvVersionGetter: o.envFeaturesDescriber, Overrider: ovrdr, } switch t := content.(type) { case *manifest.LoadBalancedWebService: deployer, err = clideploy.NewLBWSDeployer(&in) case *manifest.BackendService: deployer, err = clideploy.NewBackendDeployer(&in) case *manifest.RequestDrivenWebService: deployer, err = clideploy.NewRDWSDeployer(&in) case *manifest.WorkerService: deployer, err = clideploy.NewWorkerSvcDeployer(&in) case *manifest.StaticSite: deployer, err = clideploy.NewStaticSiteDeployer(&in) default: return nil, fmt.Errorf("unknown manifest type %T while creating the CloudFormation stack", t) } if err != nil { return nil, fmt.Errorf("initiate workload deployer: %w", err) } return deployer, nil } func newManifestInterpolator(app, env string) interpolator { return manifest.NewInterpolator(app, env) } // Validate returns an error for any invalid optional flags. func (o *deploySvcOpts) Validate() error { return nil } // Ask prompts for and validates any required flags. func (o *deploySvcOpts) Ask() error { if o.appName != "" { if _, err := o.getTargetApp(); err != nil { return err } } else { // NOTE: This command is required to be executed under a workspace. We don't prompt for it. return errNoAppInWorkspace } if err := o.validateOrAskSvcName(); err != nil { return err } if err := o.validateOrAskEnvName(); err != nil { return err } return nil } // Execute builds and pushes the container image for the service, func (o *deploySvcOpts) Execute() error { if !o.clientConfigured { if err := o.configureClients(); err != nil { return err } } mft, err := workloadManifest(&workloadManifestInput{ name: o.name, appName: o.appName, envName: o.envName, interpolator: o.newInterpolator(o.appName, o.envName), ws: o.ws, unmarshal: o.unmarshal, sess: o.envSess, }) if err != nil { return err } if o.forceNewUpdate && o.svcType == manifestinfo.StaticSiteType { return fmt.Errorf("--%s is not supported for service type %q", forceFlag, manifestinfo.StaticSiteType) } o.appliedDynamicMft = mft if err := validateWorkloadManifestCompatibilityWithEnv(o.ws, o.envFeaturesDescriber, mft, o.envName); err != nil { return err } deployer, err := o.newSvcDeployer() if err != nil { return err } serviceInRegion, err := deployer.IsServiceAvailableInRegion(o.targetEnv.Region) if err != nil { return fmt.Errorf("check if %s is available in region %s: %w", o.svcType, o.targetEnv.Region, err) } if !serviceInRegion { log.Warningf(`%s might not be available in region %s; proceed with caution. `, o.svcType, o.targetEnv.Region) } uploadOut, err := deployer.UploadArtifacts() if err != nil { return fmt.Errorf("upload deploy resources for service %s: %w", o.name, err) } targetApp, err := o.getTargetApp() if err != nil { return err } if o.showDiff { output, err := deployer.GenerateCloudFormationTemplate(&clideploy.GenerateCloudFormationTemplateInput{ StackRuntimeConfiguration: clideploy.StackRuntimeConfiguration{ RootUserARN: o.rootUserARN, Tags: targetApp.Tags, EnvFileARNs: uploadOut.EnvFileARNs, ImageDigests: uploadOut.ImageDigests, AddonsURL: uploadOut.AddonsURL, CustomResourceURLs: uploadOut.CustomResourceURLs, StaticSiteAssetMappingURL: uploadOut.StaticSiteAssetMappingLocation, }, }) if err != nil { return fmt.Errorf("generate the template for workload %q against environment %q: %w", o.name, o.envName, err) } if err := diff(deployer, output.Template, o.diffWriter); err != nil { var errHasDiff *errHasDiff if !errors.As(err, &errHasDiff) { return err } } contd, err := o.skipDiffPrompt, nil if !o.skipDiffPrompt { contd, err = o.prompt.Confirm(continueDeploymentPrompt, "") } if err != nil { return fmt.Errorf("ask whether to continue with the deployment: %w", err) } if !contd { o.noDeploy = true return nil } } deployRecs, err := deployer.DeployWorkload(&clideploy.DeployWorkloadInput{ StackRuntimeConfiguration: clideploy.StackRuntimeConfiguration{ ImageDigests: uploadOut.ImageDigests, EnvFileARNs: uploadOut.EnvFileARNs, AddonsURL: uploadOut.AddonsURL, RootUserARN: o.rootUserARN, Tags: tags.Merge(targetApp.Tags, o.resourceTags), CustomResourceURLs: uploadOut.CustomResourceURLs, StaticSiteAssetMappingURL: uploadOut.StaticSiteAssetMappingLocation, }, Options: clideploy.Options{ ForceNewUpdate: o.forceNewUpdate, DisableRollback: o.disableRollback, }, }) if err != nil { if o.disableRollback { stackName := stack.NameForWorkload(o.targetApp.Name, o.targetEnv.Name, o.name) rollbackCmd := fmt.Sprintf("aws cloudformation rollback-stack --stack-name %s --role-arn %s", stackName, o.targetEnv.ExecutionRoleARN) log.Infof(`It seems like you have disabled automatic stack rollback for this deployment. To debug, you can: * Run %s to inspect the service log. * Visit the AWS console to inspect the errors. After fixing the deployment, you can: 1. Run %s to rollback the deployment. 2. Run %s to make a new deployment. `, color.HighlightCode("copilot svc logs"), color.HighlightCode(rollbackCmd), color.HighlightCode("copilot svc deploy")) } return fmt.Errorf("deploy service %s to environment %s: %w", o.name, o.envName, err) } o.deployRecs = deployRecs log.Successf("Deployed service %s.\n", color.HighlightUserInput(o.name)) return nil } // RecommendActions returns follow-up actions the user can take after successfully executing the command. func (o *deploySvcOpts) RecommendActions() error { if o.noDeploy { return nil } var recommendations []string uriRecs, err := o.uriRecommendedActions() if err != nil { return err } recommendations = append(recommendations, uriRecs...) recommendations = append(recommendations, o.deployRecs.RecommendedActions()...) recommendations = append(recommendations, o.publishRecommendedActions()...) logRecommendedActions(recommendations) return nil } func (o *deploySvcOpts) validateSvcName() error { names, err := o.ws.ListServices() if err != nil { return fmt.Errorf("list services in the workspace: %w", err) } for _, name := range names { if o.name == name { return nil } } return fmt.Errorf("service %s not found in the workspace", color.HighlightUserInput(o.name)) } func (o *deploySvcOpts) validateEnvName() error { if _, err := o.store.GetEnvironment(o.appName, o.envName); err != nil { return fmt.Errorf("get environment %s configuration: %w", o.envName, err) } return nil } func (o *deploySvcOpts) validateOrAskSvcName() error { if o.name != "" { if err := o.validateSvcName(); err != nil { return err } } else { name, err := o.sel.Service("Select a service in your workspace", "") if err != nil { return fmt.Errorf("select service: %w", err) } o.name = name } svc, err := o.store.GetService(o.appName, o.name) if err != nil { return fmt.Errorf("get service %s configuration: %w", o.name, err) } o.svcType = svc.Type return nil } func (o *deploySvcOpts) validateOrAskEnvName() error { if o.envName != "" { return o.validateEnvName() } name, err := o.sel.Environment("Select an environment", "", o.appName) if err != nil { return fmt.Errorf("select environment: %w", err) } o.envName = name return nil } func (o *deploySvcOpts) configureClients() error { o.gitShortCommit = imageTagFromGit(o.cmd) // Best effort assign git tag. env, err := o.store.GetEnvironment(o.appName, o.envName) if err != nil { return fmt.Errorf("get environment %s configuration: %w", o.envName, err) } o.targetEnv = env // client to retrieve an application's resources created with CloudFormation. defaultSess, err := o.sessProvider.Default() if err != nil { return fmt.Errorf("create default session: %w", err) } envSess, err := o.sessProvider.FromRole(env.ManagerRoleARN, env.Region) if err != nil { return err } o.envSess = envSess // client to retrieve caller identity. caller, err := identity.New(defaultSess).Get() if err != nil { return fmt.Errorf("get identity: %w", err) } o.rootUserARN = caller.RootUserARN envDescriber, err := describe.NewEnvDescriber(describe.NewEnvDescriberConfig{ App: o.appName, Env: o.envName, ConfigStore: o.store, }) if err != nil { return err } o.envFeaturesDescriber = envDescriber return nil } type workloadManifestInput struct { name string appName string envName string ws wsWlDirReader interpolator interpolator sess *session.Session unmarshal func([]byte) (manifest.DynamicWorkload, error) } func workloadManifest(in *workloadManifestInput) (manifest.DynamicWorkload, error) { raw, err := in.ws.ReadWorkloadManifest(in.name) if err != nil { return nil, fmt.Errorf("read manifest file for %s: %w", in.name, err) } interpolated, err := in.interpolator.Interpolate(string(raw)) if err != nil { return nil, fmt.Errorf("interpolate environment variables for %s manifest: %w", in.name, err) } mft, err := in.unmarshal([]byte(interpolated)) if err != nil { return nil, fmt.Errorf("unmarshal service %s manifest: %w", in.name, err) } envMft, err := mft.ApplyEnv(in.envName) if err != nil { return nil, fmt.Errorf("apply environment %s override: %w", in.envName, err) } if err := envMft.Validate(); err != nil { return nil, fmt.Errorf("validate manifest against environment %q: %w", in.envName, err) } if err := envMft.Load(in.sess); err != nil { return nil, fmt.Errorf("load dynamic content: %w", err) } return envMft, nil } func validateWorkloadManifestCompatibilityWithEnv(ws wsEnvironmentsLister, env versionCompatibilityChecker, mft manifest.DynamicWorkload, envName string) error { currVersion, err := env.Version() if err != nil { return fmt.Errorf("get environment %q version: %w", envName, err) } if currVersion == version.EnvTemplateBootstrap { return fmt.Errorf(`cannot deploy a service to an undeployed environment. Please run "copilot env deploy --name %s" to deploy the environment first`, envName) } availableFeatures, err := env.AvailableFeatures() if err != nil { return fmt.Errorf("get available features of the %s environment stack: %w", envName, err) } exists := struct{}{} available := make(map[string]struct{}) for _, f := range availableFeatures { available[f] = exists } features := mft.RequiredEnvironmentFeatures() for _, f := range features { if _, ok := available[f]; !ok { logMsg := fmt.Sprintf(`Your manifest configuration requires your environment %q to have the feature %q available.`, envName, template.FriendlyEnvFeatureName(f)) if v := template.LeastVersionForFeature(f); v != "" { logMsg += fmt.Sprintf(` The least environment version that supports the feature is %s.`, v) } logMsg += fmt.Sprintf(" Your environment is on %s.", currVersion) log.Errorln(logMsg) return &errFeatureIncompatibleWithEnvironment{ ws: ws, missingFeature: f, envName: envName, curVersion: currVersion, } } } return nil } func (o *deploySvcOpts) uriRecommendedActions() ([]string, error) { describer, err := describe.NewReachableService(o.appName, o.name, o.store) if err != nil { var errNotAccessible *describe.ErrNonAccessibleServiceType if errors.As(err, &errNotAccessible) { return nil, nil } return nil, err } uri, err := describer.URI(o.envName) if err != nil { return nil, fmt.Errorf("get uri for environment %s: %w", o.envName, err) } network := "over the internet." switch uri.AccessType { case describe.URIAccessTypeInternal: network = "from your internal network." case describe.URIAccessTypeServiceDiscovery: network = "with service discovery." case describe.URIAccessTypeServiceConnect: network = "with service connect." } return []string{ fmt.Sprintf("You can access your service at %s %s", uri.URI, network), }, nil } func (o *deploySvcOpts) publishRecommendedActions() []string { type publisher interface { Publish() []manifest.Topic } mft, ok := o.appliedDynamicMft.Manifest().(publisher) if !ok { return nil } if topics := mft.Publish(); len(topics) == 0 { return nil } return []string{ fmt.Sprintf(`Update %s's code to leverage the injected environment variable "COPILOT_SNS_TOPIC_ARNS". In JavaScript you can write %s.`, o.name, color.HighlightCode("const {<topicName>} = JSON.parse(process.env.COPILOT_SNS_TOPIC_ARNS)")), } } func (o *deploySvcOpts) getTargetApp() (*config.Application, error) { if o.targetApp != nil { return o.targetApp, nil } app, err := o.store.GetApplication(o.appName) if err != nil { return nil, fmt.Errorf("get application %s configuration: %w", o.appName, err) } o.targetApp = app return o.targetApp, nil } type errFeatureIncompatibleWithEnvironment struct { ws wsEnvironmentsLister missingFeature string envName string curVersion string } func (e *errFeatureIncompatibleWithEnvironment) Error() string { if e.curVersion == "" { return fmt.Sprintf("environment %q is not on a version that supports the %q feature", e.envName, template.FriendlyEnvFeatureName(e.missingFeature)) } return fmt.Sprintf("environment %q is on version %q which does not support the %q feature", e.envName, e.curVersion, template.FriendlyEnvFeatureName(e.missingFeature)) } // RecommendActions returns recommended actions to be taken after the error. // Implements main.actionRecommender interface. func (e *errFeatureIncompatibleWithEnvironment) RecommendActions() string { envs, _ := e.ws.ListEnvironments() // Best effort try to detect if env manifest exists. for _, env := range envs { if e.envName == env { return fmt.Sprintf("You can upgrade the %q environment template by running %s.", e.envName, color.HighlightCode(fmt.Sprintf("copilot env deploy --name %s", e.envName))) } } msgs := []string{ "You can upgrade your environment template by running:", fmt.Sprintf("1. Create the directory to store your environment manifest %s.", color.HighlightCode(fmt.Sprintf("mkdir -p %s", filepath.Join("copilot", "environments", e.envName)))), fmt.Sprintf("2. Generate the manifest %s.", color.HighlightCode(fmt.Sprintf("copilot env show -n %s --manifest > %s", e.envName, filepath.Join("copilot", "environments", e.envName, "manifest.yml")))), fmt.Sprintf("3. Deploy the environment stack %s.", color.HighlightCode(fmt.Sprintf("copilot env deploy --name %s", e.envName))), } return strings.Join(msgs, "\n") } type errHasDiff struct{} func (e *errHasDiff) Error() string { return "" } // ExitCode returns 1 for a non-empty diff. func (e *errHasDiff) ExitCode() int { return 1 } func diff(differ templateDiffer, tmpl string, writer io.Writer) error { if out, err := differ.DeployDiff(tmpl); err != nil { return err } else if out != "" { if _, err := writer.Write([]byte(out)); err != nil { return err } return &errHasDiff{} } if _, err := writer.Write([]byte("No changes.\n")); err != nil { return err } return nil } // buildSvcDeployCmd builds the `svc deploy` subcommand. func buildSvcDeployCmd() *cobra.Command { vars := deployWkldVars{} cmd := &cobra.Command{ Use: "deploy", Short: "Deploys a service to an environment.", Long: `Deploys a service to an environment.`, Example: ` Deploys a service named "frontend" to a "test" environment. /code $ copilot svc deploy --name frontend --env test Deploys a service with additional resource tags. /code $ copilot svc deploy --resource-tags source/revision=bb133e7,deployment/initiator=manual`, RunE: runCmdE(func(cmd *cobra.Command, args []string) error { opts, err := newSvcDeployOpts(vars) if err != nil { return err } return run(opts) }), } cmd.Flags().StringVarP(&vars.appName, appFlag, appFlagShort, tryReadingAppName(), appFlagDescription) cmd.Flags().StringVarP(&vars.name, nameFlag, nameFlagShort, "", svcFlagDescription) cmd.Flags().StringVarP(&vars.envName, envFlag, envFlagShort, "", envFlagDescription) cmd.Flags().StringVar(&vars.imageTag, imageTagFlag, "", imageTagFlagDescription) cmd.Flags().StringToStringVar(&vars.resourceTags, resourceTagsFlag, nil, resourceTagsFlagDescription) cmd.Flags().BoolVar(&vars.forceNewUpdate, forceFlag, false, forceFlagDescription) cmd.Flags().BoolVar(&vars.disableRollback, noRollbackFlag, false, noRollbackFlagDescription) cmd.Flags().BoolVar(&vars.showDiff, diffFlag, false, diffFlagDescription) cmd.Flags().BoolVar(&vars.skipDiffPrompt, diffAutoApproveFlag, false, diffAutoApproveFlagDescription) return cmd }
650
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package cli import ( "errors" "fmt" "strings" "testing" "github.com/aws/aws-sdk-go/aws/session" "github.com/aws/copilot-cli/internal/pkg/manifest" "github.com/aws/copilot-cli/internal/pkg/manifest/manifestinfo" "github.com/aws/copilot-cli/internal/pkg/template" "github.com/aws/copilot-cli/internal/pkg/version" "github.com/golang/mock/gomock" "github.com/stretchr/testify/require" clideploy "github.com/aws/copilot-cli/internal/pkg/cli/deploy" "github.com/aws/copilot-cli/internal/pkg/cli/mocks" "github.com/aws/copilot-cli/internal/pkg/config" ) func TestSvcDeployOpts_Validate(t *testing.T) { // There is no validation for svc deploy. } type svcDeployAskMocks struct { store *mocks.Mockstore sel *mocks.MockwsSelector ws *mocks.MockwsWlDirReader } func TestSvcDeployOpts_Ask(t *testing.T) { testCases := map[string]struct { inAppName string inEnvName string inSvcName string setupMocks func(m *svcDeployAskMocks) wantedSvcName string wantedEnvName string wantedError error }{ "validate instead of prompting application name, svc name and environment name": { inAppName: "phonetool", inEnvName: "prod-iad", inSvcName: "frontend", setupMocks: func(m *svcDeployAskMocks) { m.store.EXPECT().GetApplication("phonetool") m.store.EXPECT().GetEnvironment("phonetool", "prod-iad").Return(&config.Environment{Name: "prod-iad"}, nil) m.ws.EXPECT().ListServices().Return([]string{"frontend"}, nil) m.store.EXPECT().GetService("phonetool", "frontend").Return(&config.Workload{}, nil) m.sel.EXPECT().Service(gomock.Any(), gomock.Any()).Times(0) m.sel.EXPECT().Environment(gomock.Any(), gomock.Any(), gomock.Any()).Times(0) }, wantedSvcName: "frontend", wantedEnvName: "prod-iad", }, "error instead of prompting for application name if not provided": { setupMocks: func(m *svcDeployAskMocks) { m.store.EXPECT().GetApplication(gomock.Any()).Times(0) }, wantedError: errNoAppInWorkspace, }, "prompt for service name": { inAppName: "phonetool", inEnvName: "prod-iad", setupMocks: func(m *svcDeployAskMocks) { m.sel.EXPECT().Service("Select a service in your workspace", "").Return("frontend", nil) m.store.EXPECT().GetApplication(gomock.Any()).Times(1) m.store.EXPECT().GetEnvironment("phonetool", "prod-iad").Return(&config.Environment{Name: "prod-iad"}, nil) m.store.EXPECT().GetService("phonetool", "frontend").Return(&config.Workload{}, nil) }, wantedSvcName: "frontend", wantedEnvName: "prod-iad", }, "prompt for environment name": { inAppName: "phonetool", inSvcName: "frontend", setupMocks: func(m *svcDeployAskMocks) { m.sel.EXPECT().Environment(gomock.Any(), gomock.Any(), "phonetool").Return("prod-iad", nil) m.store.EXPECT().GetApplication("phonetool") m.ws.EXPECT().ListServices().Return([]string{"frontend"}, nil) m.store.EXPECT().GetService("phonetool", "frontend").Return(&config.Workload{}, nil) }, wantedSvcName: "frontend", wantedEnvName: "prod-iad", }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { // GIVEN ctrl := gomock.NewController(t) defer ctrl.Finish() m := &svcDeployAskMocks{ store: mocks.NewMockstore(ctrl), sel: mocks.NewMockwsSelector(ctrl), ws: mocks.NewMockwsWlDirReader(ctrl), } tc.setupMocks(m) opts := deploySvcOpts{ deployWkldVars: deployWkldVars{ appName: tc.inAppName, name: tc.inSvcName, envName: tc.inEnvName, }, sel: m.sel, store: m.store, ws: m.ws, } // WHEN err := opts.Ask() // THEN if tc.wantedError == nil { require.NoError(t, err) require.Equal(t, tc.wantedSvcName, opts.name) require.Equal(t, tc.wantedEnvName, opts.envName) } else { require.EqualError(t, err, tc.wantedError.Error()) } }) } } type deployMocks struct { mockDeployer *mocks.MockworkloadDeployer mockInterpolator *mocks.Mockinterpolator mockWsReader *mocks.MockwsWlDirReader mockEnvFeaturesDescriber *mocks.MockversionCompatibilityChecker mockMft *mockWorkloadMft mockDiffWriter *strings.Builder mockPrompter *mocks.Mockprompter } func TestSvcDeployOpts_Execute(t *testing.T) { const ( mockAppName = "phonetool" mockSvcName = "frontend" mockEnvName = "prod-iad" ) mockError := errors.New("some error") testCases := map[string]struct { inShowDiff bool inSkipDiffPrompt bool inForceFlag bool inSvcType string mock func(m *deployMocks) wantedDiff string wantedError error }{ "error out if fail to read workload manifest": { mock: func(m *deployMocks) { m.mockWsReader.EXPECT().ReadWorkloadManifest(mockSvcName).Return(nil, mockError) }, wantedError: fmt.Errorf("read manifest file for frontend: some error"), }, "error out if fail to interpolate workload manifest": { mock: func(m *deployMocks) { m.mockWsReader.EXPECT().ReadWorkloadManifest(mockSvcName).Return([]byte(""), nil) m.mockInterpolator.EXPECT().Interpolate("").Return("", mockError) }, wantedError: fmt.Errorf("interpolate environment variables for frontend manifest: some error"), }, "error if fail to get a list of available features from the environment": { mock: func(m *deployMocks) { m.mockWsReader.EXPECT().ReadWorkloadManifest(mockSvcName).Return([]byte(""), nil) m.mockInterpolator.EXPECT().Interpolate("").Return("", nil) m.mockEnvFeaturesDescriber.EXPECT().Version().Return("v1.mock", nil) m.mockEnvFeaturesDescriber.EXPECT().AvailableFeatures().Return(nil, mockError) }, wantedError: fmt.Errorf("get available features of the prod-iad environment stack: some error"), }, "error out if force deploy for static site service": { inForceFlag: true, inSvcType: manifestinfo.StaticSiteType, mock: func(m *deployMocks) { m.mockWsReader.EXPECT().ReadWorkloadManifest(mockSvcName).Return([]byte(""), nil) m.mockInterpolator.EXPECT().Interpolate("").Return("", nil) }, wantedError: fmt.Errorf(`--force is not supported for service type "Static Site"`), }, "error if some required features are not available in the environment": { mock: func(m *deployMocks) { m.mockWsReader.EXPECT().ReadWorkloadManifest(mockSvcName).Return([]byte(""), nil) m.mockInterpolator.EXPECT().Interpolate("").Return("", nil) m.mockMft = &mockWorkloadMft{ mockRequiredEnvironmentFeatures: func() []string { return []string{"mockFeature1", "mockFeature3"} }, } m.mockEnvFeaturesDescriber.EXPECT().Version().Return("v1.mock", nil) m.mockEnvFeaturesDescriber.EXPECT().AvailableFeatures().Return([]string{"mockFeature1", "mockFeature2"}, nil) }, wantedError: fmt.Errorf(`environment "prod-iad" is on version "v1.mock" which does not support the "mockFeature3" feature`), }, "error if failed to upload artifacts": { mock: func(m *deployMocks) { m.mockWsReader.EXPECT().ReadWorkloadManifest(mockSvcName).Return([]byte(""), nil) m.mockInterpolator.EXPECT().Interpolate("").Return("", nil) m.mockMft = &mockWorkloadMft{ mockRequiredEnvironmentFeatures: func() []string { return []string{"mockFeature1"} }, } m.mockEnvFeaturesDescriber.EXPECT().Version().Return("v1.mock", nil) m.mockEnvFeaturesDescriber.EXPECT().AvailableFeatures().Return([]string{"mockFeature1", "mockFeature2"}, nil) m.mockDeployer.EXPECT().IsServiceAvailableInRegion("").Return(false, nil) m.mockDeployer.EXPECT().UploadArtifacts().Return(nil, mockError) }, wantedError: fmt.Errorf("upload deploy resources for service frontend: some error"), }, "error if failed to generate the template to show diff": { inShowDiff: true, mock: func(m *deployMocks) { m.mockWsReader.EXPECT().ReadWorkloadManifest(mockSvcName).Return([]byte(""), nil) m.mockInterpolator.EXPECT().Interpolate("").Return("", nil) m.mockMft = &mockWorkloadMft{ mockRequiredEnvironmentFeatures: func() []string { return []string{"mockFeature1"} }, } m.mockEnvFeaturesDescriber.EXPECT().Version().Return("v1.mock", nil) m.mockEnvFeaturesDescriber.EXPECT().AvailableFeatures().Return([]string{"mockFeature1", "mockFeature2"}, nil) m.mockDeployer.EXPECT().IsServiceAvailableInRegion("").Return(false, nil) m.mockDeployer.EXPECT().UploadArtifacts().Return(&clideploy.UploadArtifactsOutput{}, nil) m.mockDeployer.EXPECT().GenerateCloudFormationTemplate(gomock.Any()).Return(nil, errors.New("some error")) }, wantedError: fmt.Errorf("generate the template for workload %q against environment %q: some error", mockSvcName, mockEnvName), }, "error if failed to generate the diff": { inShowDiff: true, mock: func(m *deployMocks) { m.mockWsReader.EXPECT().ReadWorkloadManifest(mockSvcName).Return([]byte(""), nil) m.mockInterpolator.EXPECT().Interpolate("").Return("", nil) m.mockMft = &mockWorkloadMft{ mockRequiredEnvironmentFeatures: func() []string { return []string{"mockFeature1"} }, } m.mockEnvFeaturesDescriber.EXPECT().Version().Return("v1.mock", nil) m.mockEnvFeaturesDescriber.EXPECT().AvailableFeatures().Return([]string{"mockFeature1", "mockFeature2"}, nil) m.mockDeployer.EXPECT().IsServiceAvailableInRegion("").Return(false, nil) m.mockDeployer.EXPECT().UploadArtifacts().Return(&clideploy.UploadArtifactsOutput{}, nil) m.mockDeployer.EXPECT().GenerateCloudFormationTemplate(gomock.Any()).Return(&clideploy.GenerateCloudFormationTemplateOutput{}, nil) m.mockDeployer.EXPECT().DeployDiff(gomock.Any()).Return("", errors.New("some error")) }, wantedError: errors.New("some error"), }, "write 'no changes' if there is no diff": { inShowDiff: true, mock: func(m *deployMocks) { m.mockWsReader.EXPECT().ReadWorkloadManifest(mockSvcName).Return([]byte(""), nil) m.mockInterpolator.EXPECT().Interpolate("").Return("", nil) m.mockMft = &mockWorkloadMft{ mockRequiredEnvironmentFeatures: func() []string { return []string{"mockFeature1"} }, } m.mockEnvFeaturesDescriber.EXPECT().Version().Return("v1.mock", nil) m.mockEnvFeaturesDescriber.EXPECT().AvailableFeatures().Return([]string{"mockFeature1", "mockFeature2"}, nil) m.mockDeployer.EXPECT().IsServiceAvailableInRegion("").Return(false, nil) m.mockDeployer.EXPECT().UploadArtifacts().Return(&clideploy.UploadArtifactsOutput{}, nil) m.mockDeployer.EXPECT().GenerateCloudFormationTemplate(gomock.Any()).Return(&clideploy.GenerateCloudFormationTemplateOutput{}, nil) m.mockDeployer.EXPECT().DeployDiff(gomock.Any()).Return("", nil) m.mockDiffWriter = &strings.Builder{} m.mockPrompter.EXPECT().Confirm(gomock.Eq("Continue with the deployment?"), gomock.Any(), gomock.Any()).Return(false, nil) }, wantedDiff: "No changes.\n", }, "write the correct diff": { inShowDiff: true, mock: func(m *deployMocks) { m.mockWsReader.EXPECT().ReadWorkloadManifest(mockSvcName).Return([]byte(""), nil) m.mockInterpolator.EXPECT().Interpolate("").Return("", nil) m.mockMft = &mockWorkloadMft{ mockRequiredEnvironmentFeatures: func() []string { return []string{"mockFeature1"} }, } m.mockEnvFeaturesDescriber.EXPECT().Version().Return("v1.mock", nil) m.mockEnvFeaturesDescriber.EXPECT().AvailableFeatures().Return([]string{"mockFeature1", "mockFeature2"}, nil) m.mockDeployer.EXPECT().IsServiceAvailableInRegion("").Return(false, nil) m.mockDeployer.EXPECT().UploadArtifacts().Return(&clideploy.UploadArtifactsOutput{}, nil) m.mockDeployer.EXPECT().GenerateCloudFormationTemplate(gomock.Any()).Return(&clideploy.GenerateCloudFormationTemplateOutput{}, nil) m.mockDeployer.EXPECT().DeployDiff(gomock.Any()).Return("mock diff", nil) m.mockDiffWriter = &strings.Builder{} m.mockPrompter.EXPECT().Confirm(gomock.Eq("Continue with the deployment?"), gomock.Any(), gomock.Any()).Return(false, nil) }, wantedDiff: "mock diff", }, "error if fail to ask whether to continue the deployment": { inShowDiff: true, mock: func(m *deployMocks) { m.mockWsReader.EXPECT().ReadWorkloadManifest(mockSvcName).Return([]byte(""), nil) m.mockInterpolator.EXPECT().Interpolate("").Return("", nil) m.mockMft = &mockWorkloadMft{ mockRequiredEnvironmentFeatures: func() []string { return []string{"mockFeature1"} }, } m.mockEnvFeaturesDescriber.EXPECT().Version().Return("v1.mock", nil) m.mockEnvFeaturesDescriber.EXPECT().AvailableFeatures().Return([]string{"mockFeature1", "mockFeature2"}, nil) m.mockDeployer.EXPECT().IsServiceAvailableInRegion("").Return(false, nil) m.mockDeployer.EXPECT().UploadArtifacts().Return(&clideploy.UploadArtifactsOutput{}, nil) m.mockDeployer.EXPECT().GenerateCloudFormationTemplate(gomock.Any()).Return(&clideploy.GenerateCloudFormationTemplateOutput{}, nil) m.mockDeployer.EXPECT().DeployDiff(gomock.Any()).Return("mock diff", nil) m.mockDiffWriter = &strings.Builder{} m.mockPrompter.EXPECT().Confirm(gomock.Eq("Continue with the deployment?"), gomock.Any(), gomock.Any()).Return(false, errors.New("some error")) }, wantedError: errors.New("ask whether to continue with the deployment: some error"), }, "do not deploy if asked to": { inShowDiff: true, mock: func(m *deployMocks) { m.mockWsReader.EXPECT().ReadWorkloadManifest(mockSvcName).Return([]byte(""), nil) m.mockInterpolator.EXPECT().Interpolate("").Return("", nil) m.mockMft = &mockWorkloadMft{ mockRequiredEnvironmentFeatures: func() []string { return []string{"mockFeature1"} }, } m.mockEnvFeaturesDescriber.EXPECT().Version().Return("v1.mock", nil) m.mockEnvFeaturesDescriber.EXPECT().AvailableFeatures().Return([]string{"mockFeature1", "mockFeature2"}, nil) m.mockDeployer.EXPECT().IsServiceAvailableInRegion("").Return(false, nil) m.mockDeployer.EXPECT().UploadArtifacts().Return(&clideploy.UploadArtifactsOutput{}, nil) m.mockDeployer.EXPECT().GenerateCloudFormationTemplate(gomock.Any()).Return(&clideploy.GenerateCloudFormationTemplateOutput{}, nil) m.mockDeployer.EXPECT().DeployDiff(gomock.Any()).Return("mock diff", nil) m.mockDiffWriter = &strings.Builder{} m.mockPrompter.EXPECT().Confirm(gomock.Eq("Continue with the deployment?"), gomock.Any(), gomock.Any()).Return(false, nil) m.mockDeployer.EXPECT().DeployWorkload(gomock.Any()).Times(0) }, }, "deploy if asked to": { inShowDiff: true, mock: func(m *deployMocks) { m.mockWsReader.EXPECT().ReadWorkloadManifest(mockSvcName).Return([]byte(""), nil) m.mockInterpolator.EXPECT().Interpolate("").Return("", nil) m.mockMft = &mockWorkloadMft{ mockRequiredEnvironmentFeatures: func() []string { return []string{"mockFeature1"} }, } m.mockEnvFeaturesDescriber.EXPECT().Version().Return("v1.mock", nil) m.mockEnvFeaturesDescriber.EXPECT().AvailableFeatures().Return([]string{"mockFeature1", "mockFeature2"}, nil) m.mockDeployer.EXPECT().IsServiceAvailableInRegion("").Return(false, nil) m.mockDeployer.EXPECT().UploadArtifacts().Return(&clideploy.UploadArtifactsOutput{}, nil) m.mockDeployer.EXPECT().GenerateCloudFormationTemplate(gomock.Any()).Return(&clideploy.GenerateCloudFormationTemplateOutput{}, nil) m.mockDeployer.EXPECT().DeployDiff(gomock.Any()).Return("mock diff", nil) m.mockDiffWriter = &strings.Builder{} m.mockPrompter.EXPECT().Confirm(gomock.Eq("Continue with the deployment?"), gomock.Any(), gomock.Any()).Return(true, nil) m.mockDeployer.EXPECT().DeployWorkload(gomock.Any()).Times(1) }, }, "skip prompt and deploy immediately after diff": { inShowDiff: true, inSkipDiffPrompt: true, mock: func(m *deployMocks) { m.mockWsReader.EXPECT().ReadWorkloadManifest(mockSvcName).Return([]byte(""), nil) m.mockInterpolator.EXPECT().Interpolate("").Return("", nil) m.mockMft = &mockWorkloadMft{ mockRequiredEnvironmentFeatures: func() []string { return []string{"mockFeature1"} }, } m.mockEnvFeaturesDescriber.EXPECT().Version().Return("v1.mock", nil) m.mockEnvFeaturesDescriber.EXPECT().AvailableFeatures().Return([]string{"mockFeature1", "mockFeature2"}, nil) m.mockDeployer.EXPECT().IsServiceAvailableInRegion("").Return(false, nil) m.mockDeployer.EXPECT().UploadArtifacts().Return(&clideploy.UploadArtifactsOutput{}, nil) m.mockDeployer.EXPECT().GenerateCloudFormationTemplate(gomock.Any()).Return(&clideploy.GenerateCloudFormationTemplateOutput{}, nil) m.mockDeployer.EXPECT().DeployDiff(gomock.Any()).Return("mock diff", nil) m.mockDiffWriter = &strings.Builder{} m.mockPrompter.EXPECT().Confirm(gomock.Eq("Continue with the deployment?"), gomock.Any(), gomock.Any()).Times(0) m.mockDeployer.EXPECT().DeployWorkload(gomock.Any()).Times(1) }, }, "error if failed to deploy service": { mock: func(m *deployMocks) { m.mockWsReader.EXPECT().ReadWorkloadManifest(mockSvcName).Return([]byte(""), nil) m.mockInterpolator.EXPECT().Interpolate("").Return("", nil) m.mockMft = &mockWorkloadMft{ mockRequiredEnvironmentFeatures: func() []string { return []string{"mockFeature1"} }, } m.mockEnvFeaturesDescriber.EXPECT().Version().Return("v1.mock", nil) m.mockEnvFeaturesDescriber.EXPECT().AvailableFeatures().Return([]string{"mockFeature1", "mockFeature2"}, nil) m.mockDeployer.EXPECT().UploadArtifacts().Return(&clideploy.UploadArtifactsOutput{}, nil) m.mockDeployer.EXPECT().DeployWorkload(gomock.Any()).Return(nil, mockError) m.mockDeployer.EXPECT().IsServiceAvailableInRegion("").Return(false, nil) }, wantedError: fmt.Errorf("deploy service frontend to environment prod-iad: some error"), }, "success with no recommendations": { mock: func(m *deployMocks) { m.mockWsReader.EXPECT().ReadWorkloadManifest(mockSvcName).Return([]byte(""), nil) m.mockInterpolator.EXPECT().Interpolate("").Return("", nil) m.mockMft = &mockWorkloadMft{ mockRequiredEnvironmentFeatures: func() []string { return []string{"mockFeature1"} }, } m.mockEnvFeaturesDescriber.EXPECT().Version().Return("v1.mock", nil) m.mockEnvFeaturesDescriber.EXPECT().AvailableFeatures().Return([]string{"mockFeature1", "mockFeature2"}, nil) m.mockDeployer.EXPECT().UploadArtifacts().Return(&clideploy.UploadArtifactsOutput{}, nil) m.mockDeployer.EXPECT().DeployWorkload(gomock.Any()).Return(nil, nil) m.mockDeployer.EXPECT().IsServiceAvailableInRegion("").Return(false, nil) }, }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { // GIVEN ctrl := gomock.NewController(t) defer ctrl.Finish() m := &deployMocks{ mockDeployer: mocks.NewMockworkloadDeployer(ctrl), mockInterpolator: mocks.NewMockinterpolator(ctrl), mockWsReader: mocks.NewMockwsWlDirReader(ctrl), mockEnvFeaturesDescriber: mocks.NewMockversionCompatibilityChecker(ctrl), mockPrompter: mocks.NewMockprompter(ctrl), } tc.mock(m) opts := deploySvcOpts{ deployWkldVars: deployWkldVars{ appName: mockAppName, name: mockSvcName, envName: mockEnvName, showDiff: tc.inShowDiff, skipDiffPrompt: tc.inSkipDiffPrompt, forceNewUpdate: tc.inForceFlag, clientConfigured: true, }, svcType: tc.inSvcType, newSvcDeployer: func() (workloadDeployer, error) { return m.mockDeployer, nil }, newInterpolator: func(app, env string) interpolator { return m.mockInterpolator }, ws: m.mockWsReader, unmarshal: func(b []byte) (manifest.DynamicWorkload, error) { return m.mockMft, nil }, envFeaturesDescriber: m.mockEnvFeaturesDescriber, prompt: m.mockPrompter, diffWriter: m.mockDiffWriter, targetApp: &config.Application{}, targetEnv: &config.Environment{}, } // WHEN err := opts.Execute() // THEN if tc.wantedError == nil { require.NoError(t, err) } else { require.EqualError(t, err, tc.wantedError.Error()) } if tc.wantedDiff != "" { require.Equal(t, tc.wantedDiff, m.mockDiffWriter.String()) } }) } } type checkEnvironmentCompatibilityMocks struct { ws *mocks.MockwsEnvironmentsLister versionFeatureGetter *mocks.MockversionCompatibilityChecker requiredEnvironmentFeaturesFunc func() []string } func Test_isManifestCompatibleWithEnvironment(t *testing.T) { mockError := errors.New("some error") testCases := map[string]struct { setupMock func(m *checkEnvironmentCompatibilityMocks) mockManifest *mockWorkloadMft wantedError error }{ "error getting environment version": { setupMock: func(m *checkEnvironmentCompatibilityMocks) { m.versionFeatureGetter.EXPECT().Version().Return("", mockError) }, wantedError: errors.New("get environment \"mockEnv\" version: some error"), }, "error if env is not deployed": { setupMock: func(m *checkEnvironmentCompatibilityMocks) { m.versionFeatureGetter.EXPECT().Version().Return(version.EnvTemplateBootstrap, nil) }, wantedError: errors.New("cannot deploy a service to an undeployed environment. Please run \"copilot env deploy --name mockEnv\" to deploy the environment first"), }, "error getting environment available features": { setupMock: func(m *checkEnvironmentCompatibilityMocks) { m.versionFeatureGetter.EXPECT().Version().Return("mockVersion", nil) m.versionFeatureGetter.EXPECT().AvailableFeatures().Return(nil, mockError) m.requiredEnvironmentFeaturesFunc = func() []string { return nil } }, wantedError: errors.New("get available features of the mockEnv environment stack: some error"), }, "not compatible": { setupMock: func(m *checkEnvironmentCompatibilityMocks) { m.versionFeatureGetter.EXPECT().Version().Return("mockVersion", nil) m.versionFeatureGetter.EXPECT().AvailableFeatures().Return([]string{template.ALBFeatureName}, nil) m.requiredEnvironmentFeaturesFunc = func() []string { return []string{template.InternalALBFeatureName} } }, wantedError: errors.New(`environment "mockEnv" is on version "mockVersion" which does not support the "Internal ALB" feature`), }, "compatible": { setupMock: func(m *checkEnvironmentCompatibilityMocks) { m.versionFeatureGetter.EXPECT().Version().Return("mockVersion", nil) m.versionFeatureGetter.EXPECT().AvailableFeatures().Return([]string{template.ALBFeatureName, template.InternalALBFeatureName}, nil) m.requiredEnvironmentFeaturesFunc = func() []string { return []string{template.InternalALBFeatureName} } }, }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { // GIVEN ctrl := gomock.NewController(t) defer ctrl.Finish() m := &checkEnvironmentCompatibilityMocks{ versionFeatureGetter: mocks.NewMockversionCompatibilityChecker(ctrl), ws: mocks.NewMockwsEnvironmentsLister(ctrl), } tc.setupMock(m) mockManifest := &mockWorkloadMft{ mockRequiredEnvironmentFeatures: m.requiredEnvironmentFeaturesFunc, } // WHEN err := validateWorkloadManifestCompatibilityWithEnv(m.ws, m.versionFeatureGetter, mockManifest, "mockEnv") // THEN if tc.wantedError == nil { require.NoError(t, err) } else { require.EqualError(t, err, tc.wantedError.Error()) } }) } } type mockWorkloadMft struct { mockRequiredEnvironmentFeatures func() []string } func (m *mockWorkloadMft) ApplyEnv(envName string) (manifest.DynamicWorkload, error) { return m, nil } func (m *mockWorkloadMft) Validate() error { return nil } func (m *mockWorkloadMft) Load(sess *session.Session) error { return nil } func (m *mockWorkloadMft) Manifest() interface{} { return nil } func (m *mockWorkloadMft) RequiredEnvironmentFeatures() []string { return m.mockRequiredEnvironmentFeatures() }
592
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package cli import ( "errors" "fmt" "math/rand" "strings" "github.com/aws/aws-sdk-go/service/ssm" "github.com/aws/copilot-cli/internal/pkg/aws/identity" "github.com/aws/copilot-cli/internal/pkg/manifest/manifestinfo" "github.com/aws/aws-sdk-go/aws" "github.com/aws/aws-sdk-go/aws/session" "github.com/aws/copilot-cli/cmd/copilot/template" awsecs "github.com/aws/copilot-cli/internal/pkg/aws/ecs" "github.com/aws/copilot-cli/internal/pkg/aws/sessions" "github.com/aws/copilot-cli/internal/pkg/config" "github.com/aws/copilot-cli/internal/pkg/deploy" "github.com/aws/copilot-cli/internal/pkg/ecs" "github.com/aws/copilot-cli/internal/pkg/exec" "github.com/aws/copilot-cli/internal/pkg/term/color" "github.com/aws/copilot-cli/internal/pkg/term/log" "github.com/aws/copilot-cli/internal/pkg/term/prompt" "github.com/aws/copilot-cli/internal/pkg/term/selector" "github.com/spf13/cobra" ) const ( svcExecNamePrompt = "Into which service would you like to execute?" svcExecNameHelpPrompt = `Copilot runs your command in one of your chosen service's tasks. The task is chosen at random, and the first essential container is used.` ssmPluginInstallPrompt = `Looks like the Session Manager plugin is not installed yet. Would you like to install the plugin to execute into the container?` ssmPluginInstallPromptHelp = `You must install the Session Manager plugin on your local machine to be able to execute into the container See https://docs.aws.amazon.com/systems-manager/latest/userguide/session-manager-working-with-install-plugin.html` ssmPluginUpdatePrompt = `Looks like the Session Manager plugin is using version %s. Would you like to update it to the latest version %s?` ) var ( errSSMPluginCommandInstallCancelled = errors.New("ssm plugin install cancelled") ) type svcExecOpts struct { execVars store store sel deploySelector newSvcDescriber func(*session.Session) serviceDescriber newCommandExecutor func(*session.Session) ecsCommandExecutor ssmPluginManager ssmPluginManager prompter prompter sessProvider sessionProvider // Override in unit test randInt func(int) int } func newSvcExecOpts(vars execVars) (*svcExecOpts, error) { sessProvider := sessions.ImmutableProvider(sessions.UserAgentExtras("svc exec")) defaultSession, err := sessProvider.Default() if err != nil { return nil, err } ssmStore := config.NewSSMStore(identity.New(defaultSession), ssm.New(defaultSession), aws.StringValue(defaultSession.Config.Region)) deployStore, err := deploy.NewStore(sessProvider, ssmStore) if err != nil { return nil, fmt.Errorf("connect to deploy store: %w", err) } return &svcExecOpts{ execVars: vars, store: ssmStore, sel: selector.NewDeploySelect(prompt.New(), ssmStore, deployStore), newSvcDescriber: func(s *session.Session) serviceDescriber { return ecs.New(s) }, newCommandExecutor: func(s *session.Session) ecsCommandExecutor { return awsecs.New(s) }, randInt: func(x int) int { return rand.Intn(x) }, ssmPluginManager: exec.NewSSMPluginCommand(nil), prompter: prompt.New(), sessProvider: sessProvider, }, nil } // Validate returns an error for any invalid optional flags. func (o *svcExecOpts) Validate() error { return validateSSMBinary(o.prompter, o.ssmPluginManager, o.skipConfirmation) } // Ask prompts for and validates any required flags. func (o *svcExecOpts) Ask() error { if err := o.validateOrAskApp(); err != nil { return err } if err := o.validateAndAskSvcEnvName(); err != nil { return err } return nil } // Execute executes a command in a running container. func (o *svcExecOpts) Execute() error { wkld, err := o.store.GetWorkload(o.appName, o.name) if err != nil { return fmt.Errorf("get workload: %w", err) } if wkld.Type == manifestinfo.RequestDrivenWebServiceType { return fmt.Errorf("executing a command in a running container part of a service is not supported for services with type: '%s'", manifestinfo.RequestDrivenWebServiceType) } sess, err := o.envSession() if err != nil { return err } svcDesc, err := o.newSvcDescriber(sess).DescribeService(o.appName, o.envName, o.name) if err != nil { return fmt.Errorf("describe ECS service for %s in environment %s: %w", o.name, o.envName, err) } taskID, err := o.selectTask(awsecs.FilterRunningTasks(svcDesc.Tasks)) if err != nil { return err } container := o.selectContainer() log.Infof("Execute %s in container %s in task %s.\n", color.HighlightCode(o.command), color.HighlightUserInput(container), color.HighlightResource(taskID)) if err = o.newCommandExecutor(sess).ExecuteCommand(awsecs.ExecuteCommandInput{ Cluster: svcDesc.ClusterName, Command: o.command, Container: container, Task: taskID, }); err != nil { var errExecCmd *awsecs.ErrExecuteCommand if errors.As(err, &errExecCmd) { log.Errorf("Failed to execute command %s. Is %s set in your manifest?\n", o.command, color.HighlightCode("exec: true")) } return fmt.Errorf("execute command %s in container %s: %w", o.command, container, err) } return nil } func (o *svcExecOpts) validateOrAskApp() error { if o.appName != "" { _, err := o.store.GetApplication(o.appName) return err } app, err := o.sel.Application(svcAppNamePrompt, wkldAppNameHelpPrompt) if err != nil { return fmt.Errorf("select application: %w", err) } o.appName = app return nil } func (o *svcExecOpts) validateAndAskSvcEnvName() error { if o.envName != "" { if _, err := o.store.GetEnvironment(o.appName, o.envName); err != nil { return err } } if o.name != "" { if _, err := o.store.GetService(o.appName, o.name); err != nil { return err } } // Note: we let prompter handle the case when there is only option for user to choose from. // This is naturally the case when `o.envName != "" && o.name != ""`. deployedService, err := o.sel.DeployedService(svcExecNamePrompt, svcExecNameHelpPrompt, o.appName, selector.WithEnv(o.envName), selector.WithName(o.name)) if err != nil { return fmt.Errorf("select deployed service for application %s: %w", o.appName, err) } o.name = deployedService.Name o.envName = deployedService.Env return nil } func (o *svcExecOpts) envSession() (*session.Session, error) { env, err := o.store.GetEnvironment(o.appName, o.envName) if err != nil { return nil, fmt.Errorf("get environment %s: %w", o.envName, err) } return o.sessProvider.FromRole(env.ManagerRoleARN, env.Region) } func (o *svcExecOpts) selectTask(tasks []*awsecs.Task) (string, error) { if len(tasks) == 0 { return "", fmt.Errorf("found no running task for service %s in environment %s", o.name, o.envName) } if o.taskID != "" { for _, task := range tasks { taskID, err := awsecs.TaskID(aws.StringValue(task.TaskArn)) if err != nil { return "", err } if strings.HasPrefix(taskID, o.taskID) { return taskID, nil } } return "", fmt.Errorf("found no running task whose ID is prefixed with %s", o.taskID) } taskID, err := awsecs.TaskID(aws.StringValue(tasks[o.randInt(len(tasks))].TaskArn)) if err != nil { return "", err } return taskID, nil } func (o *svcExecOpts) selectContainer() string { if o.containerName != "" { return o.containerName } // The first essential container is named with the workload name. return o.name } func validateSSMBinary(prompt prompter, manager ssmPluginManager, skipConfirmation *bool) error { if skipConfirmation != nil && !aws.BoolValue(skipConfirmation) { return nil } err := manager.ValidateBinary() if err == nil { return nil } switch v := err.(type) { case *exec.ErrSSMPluginNotExist: // If ssm plugin is not install, prompt users to install the plugin. if skipConfirmation == nil { confirmInstall, err := prompt.Confirm(ssmPluginInstallPrompt, ssmPluginInstallPromptHelp) if err != nil { return fmt.Errorf("prompt to confirm installing the plugin: %w", err) } if !confirmInstall { return errSSMPluginCommandInstallCancelled } } if err := manager.InstallLatestBinary(); err != nil { return fmt.Errorf("install ssm plugin: %w", err) } return nil case *exec.ErrOutdatedSSMPlugin: // If ssm plugin is not up to date, prompt users to update the plugin. if skipConfirmation == nil { confirmUpdate, err := prompt.Confirm( fmt.Sprintf(ssmPluginUpdatePrompt, v.CurrentVersion, v.LatestVersion), "") if err != nil { return fmt.Errorf("prompt to confirm updating the plugin: %w", err) } if !confirmUpdate { log.Infof(`Alright, we won't update the Session Manager plugin. It might fail to execute if it is not using the latest plugin. `) return nil } } if err := manager.InstallLatestBinary(); err != nil { return fmt.Errorf("update ssm plugin: %w", err) } return nil default: log.Errorf(`Failed to validate the Session Manager plugin. Please install or make sure your SSM plugin is up-to-date: https://docs.aws.amazon.com/systems-manager/latest/userguide/session-manager-working-with-install-plugin.html `) return fmt.Errorf("validate ssm plugin: %w", err) } } // buildSvcExecCmd builds the command for execute a running container in a service. func buildSvcExecCmd() *cobra.Command { vars := execVars{} var skipPrompt bool cmd := &cobra.Command{ Use: "exec", Short: "Execute a command in a running container part of a service.", Example: ` Start an interactive bash session with a task part of the "frontend" service. /code $ copilot svc exec -a my-app -e test -n frontend Runs the 'ls' command in the task prefixed with ID "8c38184" within the "backend" service. /code $ copilot svc exec -a my-app -e test --name backend --task-id 8c38184 --command "ls"`, RunE: runCmdE(func(cmd *cobra.Command, args []string) error { opts, err := newSvcExecOpts(vars) if err != nil { return err } if cmd.Flags().Changed(yesFlag) { opts.skipConfirmation = aws.Bool(false) if skipPrompt { opts.skipConfirmation = aws.Bool(true) } } return run(opts) }), } cmd.Flags().StringVarP(&vars.appName, appFlag, appFlagShort, tryReadingAppName(), appFlagDescription) cmd.Flags().StringVarP(&vars.envName, envFlag, envFlagShort, "", envFlagDescription) cmd.Flags().StringVarP(&vars.name, nameFlag, nameFlagShort, "", nameFlagDescription) cmd.Flags().StringVarP(&vars.command, commandFlag, commandFlagShort, defaultCommand, execCommandFlagDescription) cmd.Flags().StringVar(&vars.taskID, taskIDFlag, "", taskIDFlagDescription) cmd.Flags().StringVar(&vars.containerName, containerFlag, "", containerFlagDescription) cmd.Flags().BoolVar(&skipPrompt, yesFlag, false, execYesFlagDescription) cmd.SetUsageTemplate(template.Usage) return cmd }
311
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package cli import ( "errors" "fmt" "testing" "github.com/aws/aws-sdk-go/aws" "github.com/aws/aws-sdk-go/aws/session" awsecs "github.com/aws/copilot-cli/internal/pkg/aws/ecs" "github.com/aws/copilot-cli/internal/pkg/cli/mocks" "github.com/aws/copilot-cli/internal/pkg/config" "github.com/aws/copilot-cli/internal/pkg/ecs" "github.com/aws/copilot-cli/internal/pkg/exec" "github.com/aws/copilot-cli/internal/pkg/term/selector" "github.com/golang/mock/gomock" "github.com/stretchr/testify/require" ) type execSvcMocks struct { storeSvc *mocks.Mockstore sessProvider *mocks.MocksessionProvider sel *mocks.MockdeploySelector ecsSvcDescriber *mocks.MockserviceDescriber ecsCommandExecutor *mocks.MockecsCommandExecutor ssmPluginManager *mocks.MockssmPluginManager prompter *mocks.Mockprompter } func TestSvcExec_Validate(t *testing.T) { const ( mockApp = "my-app" mockEnv = "my-env" mockSvc = "my-svc" ) mockErr := errors.New("some error") testCases := map[string]struct { inputApp string inputEnv string inputSvc string skipConfirmation *bool setupMocks func(mocks execSvcMocks) wantedError error }{ "skip without installing/updating if yes flag is set to be false": { inputApp: mockApp, inputEnv: mockEnv, inputSvc: mockSvc, skipConfirmation: aws.Bool(false), setupMocks: func(m execSvcMocks) {}, }, "should bubble error if cannot validate ssm plugin": { inputApp: mockApp, inputEnv: mockEnv, inputSvc: mockSvc, setupMocks: func(m execSvcMocks) { m.ssmPluginManager.EXPECT().ValidateBinary().Return(mockErr) }, wantedError: fmt.Errorf("validate ssm plugin: some error"), }, "should bubble error if cannot prompt to confirm install": { inputApp: mockApp, inputEnv: mockEnv, inputSvc: mockSvc, setupMocks: func(m execSvcMocks) { gomock.InOrder( m.ssmPluginManager.EXPECT().ValidateBinary().Return(&exec.ErrSSMPluginNotExist{}), m.prompter.EXPECT().Confirm(ssmPluginInstallPrompt, ssmPluginInstallPromptHelp).Return(false, mockErr), ) }, wantedError: fmt.Errorf("prompt to confirm installing the plugin: some error"), }, "should bubble error if cannot confirm install": { inputApp: mockApp, inputEnv: mockEnv, inputSvc: mockSvc, setupMocks: func(m execSvcMocks) { gomock.InOrder( m.ssmPluginManager.EXPECT().ValidateBinary().Return(&exec.ErrSSMPluginNotExist{}), m.prompter.EXPECT().Confirm(ssmPluginInstallPrompt, ssmPluginInstallPromptHelp). Return(false, nil), ) }, wantedError: errSSMPluginCommandInstallCancelled, }, "should bubble error if cannot install binary": { inputApp: mockApp, inputEnv: mockEnv, inputSvc: mockSvc, setupMocks: func(m execSvcMocks) { gomock.InOrder( m.ssmPluginManager.EXPECT().ValidateBinary().Return(&exec.ErrSSMPluginNotExist{}), m.prompter.EXPECT().Confirm(ssmPluginInstallPrompt, ssmPluginInstallPromptHelp). Return(true, nil), m.ssmPluginManager.EXPECT().InstallLatestBinary().Return(mockErr), ) }, wantedError: fmt.Errorf("install ssm plugin: some error"), }, "should bubble error if cannot prompt to confirm update": { inputApp: mockApp, inputEnv: mockEnv, inputSvc: mockSvc, setupMocks: func(m execSvcMocks) { gomock.InOrder( m.ssmPluginManager.EXPECT().ValidateBinary().Return(&exec.ErrOutdatedSSMPlugin{ CurrentVersion: "mockCurrentVersion", LatestVersion: "mockLatestVersion", }), m.prompter.EXPECT().Confirm(fmt.Sprintf(ssmPluginUpdatePrompt, "mockCurrentVersion", "mockLatestVersion"), ""). Return(false, mockErr), ) }, wantedError: fmt.Errorf("prompt to confirm updating the plugin: some error"), }, "should proceed if cannot confirm update": { inputApp: mockApp, inputEnv: mockEnv, inputSvc: mockSvc, setupMocks: func(m execSvcMocks) { gomock.InOrder( m.ssmPluginManager.EXPECT().ValidateBinary().Return(&exec.ErrOutdatedSSMPlugin{ CurrentVersion: "mockCurrentVersion", LatestVersion: "mockLatestVersion", }), m.prompter.EXPECT().Confirm(fmt.Sprintf(ssmPluginUpdatePrompt, "mockCurrentVersion", "mockLatestVersion"), ""). Return(false, nil), ) }, }, "should bubble error if cannot update the binary": { inputApp: mockApp, inputEnv: mockEnv, inputSvc: mockSvc, setupMocks: func(m execSvcMocks) { gomock.InOrder( m.ssmPluginManager.EXPECT().ValidateBinary().Return(&exec.ErrOutdatedSSMPlugin{ CurrentVersion: "mockCurrentVersion", LatestVersion: "mockLatestVersion", }), m.prompter.EXPECT().Confirm(fmt.Sprintf(ssmPluginUpdatePrompt, "mockCurrentVersion", "mockLatestVersion"), ""). Return(true, nil), m.ssmPluginManager.EXPECT().InstallLatestBinary().Return(mockErr), ) }, wantedError: fmt.Errorf("update ssm plugin: some error"), }, "skip validation if app flag is not set": { inputEnv: mockEnv, inputSvc: mockSvc, setupMocks: func(m execSvcMocks) { gomock.InOrder( m.ssmPluginManager.EXPECT().ValidateBinary().Return(nil), ) }, }, "valid case": { inputApp: mockApp, inputEnv: mockEnv, inputSvc: mockSvc, setupMocks: func(m execSvcMocks) { gomock.InOrder( m.ssmPluginManager.EXPECT().ValidateBinary().Return(nil), ) }, wantedError: nil, }, "valid case with ssm plugin installing": { inputApp: mockApp, inputEnv: mockEnv, inputSvc: mockSvc, setupMocks: func(m execSvcMocks) { gomock.InOrder( m.ssmPluginManager.EXPECT().ValidateBinary().Return(&exec.ErrSSMPluginNotExist{}), m.prompter.EXPECT().Confirm(ssmPluginInstallPrompt, ssmPluginInstallPromptHelp).Return(true, nil), m.ssmPluginManager.EXPECT().InstallLatestBinary().Return(nil), ) }, wantedError: nil, }, "valid case with ssm plugin updating and skip confirming to install": { inputApp: mockApp, inputEnv: mockEnv, inputSvc: mockSvc, skipConfirmation: aws.Bool(true), setupMocks: func(m execSvcMocks) { gomock.InOrder( m.ssmPluginManager.EXPECT().ValidateBinary().Return(&exec.ErrOutdatedSSMPlugin{ CurrentVersion: "mockCurrentVersion", LatestVersion: "mockLatestVersion", }), m.ssmPluginManager.EXPECT().InstallLatestBinary().Return(nil), ) }, wantedError: nil, }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { ctrl := gomock.NewController(t) defer ctrl.Finish() mockStoreReader := mocks.NewMockstore(ctrl) mockSSMPluginManager := mocks.NewMockssmPluginManager(ctrl) mockPrompter := mocks.NewMockprompter(ctrl) mocks := execSvcMocks{ storeSvc: mockStoreReader, ssmPluginManager: mockSSMPluginManager, prompter: mockPrompter, } tc.setupMocks(mocks) execSvcs := &svcExecOpts{ execVars: execVars{ name: tc.inputSvc, appName: tc.inputApp, envName: tc.inputEnv, skipConfirmation: tc.skipConfirmation, }, store: mockStoreReader, ssmPluginManager: mockSSMPluginManager, prompter: mockPrompter, } // WHEN err := execSvcs.Validate() // THEN if tc.wantedError != nil { require.EqualError(t, err, tc.wantedError.Error()) } else { require.NoError(t, err) } }) } } func TestSvcExec_Ask(t *testing.T) { const ( inputApp = "my-app" inputEnv = "my-env" inputSvc = "my-svc" ) testCases := map[string]struct { inputApp string inputEnv string inputSvc string setupMocks func(mocks execSvcMocks) wantedApp string wantedEnv string wantedSvc string wantedError error }{ "validate app env and svc with all flags passed in": { inputApp: inputApp, inputEnv: inputEnv, inputSvc: inputSvc, setupMocks: func(m execSvcMocks) { m.storeSvc.EXPECT().GetApplication("my-app").Return(&config.Application{Name: "my-app"}, nil) m.storeSvc.EXPECT().GetEnvironment("my-app", "my-env").Return(&config.Environment{Name: "my-env"}, nil) m.storeSvc.EXPECT().GetService("my-app", "my-svc").Return(&config.Workload{}, nil) m.sel.EXPECT().DeployedService(svcExecNamePrompt, svcExecNameHelpPrompt, "my-app", gomock.Any(), gomock.Any()). Return(&selector.DeployedService{ Env: "my-env", Name: "my-svc", }, nil) // Let prompter handles the case when svc(env) is definite. }, wantedApp: inputApp, wantedEnv: inputEnv, wantedSvc: inputSvc, }, "prompt for app name": { inputEnv: inputEnv, inputSvc: inputSvc, setupMocks: func(m execSvcMocks) { m.sel.EXPECT().Application(svcAppNamePrompt, wkldAppNameHelpPrompt).Return("my-app", nil) m.storeSvc.EXPECT().GetApplication(gomock.Any()).Times(0) // Don't care about the other calls. m.storeSvc.EXPECT().GetEnvironment(gomock.Any(), gomock.Any()).AnyTimes() m.storeSvc.EXPECT().GetService(gomock.Any(), gomock.Any()).AnyTimes() m.sel.EXPECT().DeployedService(gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any()).Return(&selector.DeployedService{ Env: "my-env", Name: "my-svc", }, nil).AnyTimes() }, wantedApp: inputApp, wantedEnv: inputEnv, wantedSvc: inputSvc, }, "returns error when fail to select apps": { setupMocks: func(m execSvcMocks) { m.sel.EXPECT().Application(svcAppNamePrompt, wkldAppNameHelpPrompt).Return("", errors.New("some error")) }, wantedError: fmt.Errorf("select application: some error"), }, "prompt for svc and env": { inputApp: inputApp, setupMocks: func(m execSvcMocks) { m.storeSvc.EXPECT().GetEnvironment(gomock.Any(), gomock.Any()).Times(0) m.storeSvc.EXPECT().GetService(gomock.Any(), gomock.Any()).Times(0) m.sel.EXPECT().DeployedService(svcExecNamePrompt, svcExecNameHelpPrompt, "my-app", gomock.Any(), gomock.Any()). Return(&selector.DeployedService{ Env: "my-env", Name: "my-svc", }, nil) // Don't care about the other calls. m.storeSvc.EXPECT().GetApplication(gomock.Any()).AnyTimes() }, wantedApp: inputApp, wantedEnv: inputEnv, wantedSvc: inputSvc, }, "returns error when fail to select services": { inputApp: inputApp, setupMocks: func(m execSvcMocks) { m.sel.EXPECT().DeployedService(svcExecNamePrompt, svcExecNameHelpPrompt, "my-app", gomock.Any(), gomock.Any()). Return(nil, fmt.Errorf("some error")) // Don't care about the other calls. m.storeSvc.EXPECT().GetApplication(gomock.Any()).AnyTimes() }, wantedError: fmt.Errorf("select deployed service for application my-app: some error"), }, "success": { setupMocks: func(m execSvcMocks) { gomock.InOrder( m.sel.EXPECT().Application(svcAppNamePrompt, wkldAppNameHelpPrompt).Return("my-app", nil), m.sel.EXPECT().DeployedService(svcExecNamePrompt, svcExecNameHelpPrompt, "my-app", gomock.Any(), gomock.Any()). Return(&selector.DeployedService{ Env: "my-env", Name: "my-svc", }, nil), ) }, wantedApp: inputApp, wantedEnv: inputEnv, wantedSvc: inputSvc, }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { ctrl := gomock.NewController(t) defer ctrl.Finish() mockStoreReader := mocks.NewMockstore(ctrl) mockSelector := mocks.NewMockdeploySelector(ctrl) mocks := execSvcMocks{ storeSvc: mockStoreReader, sel: mockSelector, } tc.setupMocks(mocks) execSvcs := &svcExecOpts{ execVars: execVars{ name: tc.inputSvc, envName: tc.inputEnv, appName: tc.inputApp, }, store: mockStoreReader, sel: mockSelector, } // WHEN err := execSvcs.Ask() // THEN if tc.wantedError != nil { require.EqualError(t, err, tc.wantedError.Error()) } else { require.NoError(t, err) require.Equal(t, tc.wantedApp, execSvcs.appName, "expected app name to match") require.Equal(t, tc.wantedSvc, execSvcs.name, "expected service name to match") require.Equal(t, tc.wantedEnv, execSvcs.envName, "expected service name to match") } }) } } func TestSvcExec_Execute(t *testing.T) { const ( mockTaskARN = "arn:aws:ecs:us-west-2:123456789:task/mockCluster/mockTaskID" mockOtherTaskARN = "arn:aws:ecs:us-west-2:123456789:task/mockCluster/mockTaskID1" ) mockWl := config.Workload{ App: "mockApp", Name: "mockSvc", Type: "Load Balanced Web Service", } mockRDWSWl := config.Workload{ App: "mockApp", Name: "mockSvc", Type: "Request-Driven Web Service", } mockError := errors.New("some error") testCases := map[string]struct { containerName string taskID string setupMocks func(mocks execSvcMocks) wantedError error }{ "return error if fail to get workload": { setupMocks: func(m execSvcMocks) { gomock.InOrder( m.storeSvc.EXPECT().GetWorkload("mockApp", "mockSvc").Return(nil, mockError), ) }, wantedError: fmt.Errorf("get workload: some error"), }, "return error if service type is Request-Driven Web Service": { setupMocks: func(m execSvcMocks) { gomock.InOrder( m.storeSvc.EXPECT().GetWorkload("mockApp", "mockSvc").Return(&mockRDWSWl, nil), ) }, wantedError: fmt.Errorf("executing a command in a running container part of a service is not supported for services with type: 'Request-Driven Web Service'"), }, "return error if fail to get environment": { setupMocks: func(m execSvcMocks) { gomock.InOrder( m.storeSvc.EXPECT().GetWorkload("mockApp", "mockSvc").Return(&mockWl, nil), m.storeSvc.EXPECT().GetEnvironment("mockApp", "mockEnv").Return(nil, mockError), ) }, wantedError: fmt.Errorf("get environment mockEnv: some error"), }, "return error if fail to describe service": { setupMocks: func(m execSvcMocks) { gomock.InOrder( m.storeSvc.EXPECT().GetWorkload("mockApp", "mockSvc").Return(&mockWl, nil), m.storeSvc.EXPECT().GetEnvironment("mockApp", "mockEnv").Return(&config.Environment{ Name: "my-env", }, nil), m.sessProvider.EXPECT().FromRole(gomock.Any(), gomock.Any()).Return(&session.Session{ Config: &aws.Config{ Region: aws.String("mockRegion"), }, }, nil), m.ecsSvcDescriber.EXPECT().DescribeService("mockApp", "mockEnv", "mockSvc").Return(nil, mockError), ) }, wantedError: fmt.Errorf("describe ECS service for mockSvc in environment mockEnv: some error"), }, "return error if no running task found": { setupMocks: func(m execSvcMocks) { gomock.InOrder( m.storeSvc.EXPECT().GetWorkload("mockApp", "mockSvc").Return(&mockWl, nil), m.storeSvc.EXPECT().GetEnvironment("mockApp", "mockEnv").Return(&config.Environment{ Name: "my-env", }, nil), m.sessProvider.EXPECT().FromRole(gomock.Any(), gomock.Any()).Return(&session.Session{ Config: &aws.Config{ Region: aws.String("mockRegion"), }, }, nil), m.ecsSvcDescriber.EXPECT().DescribeService("mockApp", "mockEnv", "mockSvc").Return(&ecs.ServiceDesc{ Tasks: []*awsecs.Task{}, }, nil), ) }, wantedError: fmt.Errorf("found no running task for service mockSvc in environment mockEnv"), }, "return error if fail to find prefixed task": { taskID: "mockTaskID1", setupMocks: func(m execSvcMocks) { gomock.InOrder( m.storeSvc.EXPECT().GetWorkload("mockApp", "mockSvc").Return(&mockWl, nil), m.storeSvc.EXPECT().GetEnvironment("mockApp", "mockEnv").Return(&config.Environment{ Name: "my-env", }, nil), m.sessProvider.EXPECT().FromRole(gomock.Any(), gomock.Any()).Return(&session.Session{ Config: &aws.Config{ Region: aws.String("mockRegion"), }, }, nil), m.ecsSvcDescriber.EXPECT().DescribeService("mockApp", "mockEnv", "mockSvc").Return(&ecs.ServiceDesc{ Tasks: []*awsecs.Task{ { TaskArn: aws.String(mockTaskARN), LastStatus: aws.String("RUNNING"), }, }, }, nil), ) }, wantedError: fmt.Errorf("found no running task whose ID is prefixed with mockTaskID1"), }, "return error if fail to execute command": { containerName: "hello", setupMocks: func(m execSvcMocks) { gomock.InOrder( m.storeSvc.EXPECT().GetWorkload("mockApp", "mockSvc").Return(&mockWl, nil), m.storeSvc.EXPECT().GetEnvironment("mockApp", "mockEnv").Return(&config.Environment{ Name: "my-env", }, nil), m.sessProvider.EXPECT().FromRole(gomock.Any(), gomock.Any()).Return(&session.Session{ Config: &aws.Config{ Region: aws.String("mockRegion"), }, }, nil), m.ecsSvcDescriber.EXPECT().DescribeService("mockApp", "mockEnv", "mockSvc").Return(&ecs.ServiceDesc{ ClusterName: "mockCluster", Tasks: []*awsecs.Task{ { TaskArn: aws.String(mockTaskARN), LastStatus: aws.String("RUNNING"), }, }, }, nil), m.ecsCommandExecutor.EXPECT().ExecuteCommand(awsecs.ExecuteCommandInput{ Cluster: "mockCluster", Container: "hello", Task: "mockTaskID", Command: "mockCommand", }).Return(mockError), ) }, wantedError: fmt.Errorf("execute command mockCommand in container hello: some error"), }, "success": { setupMocks: func(m execSvcMocks) { gomock.InOrder( m.storeSvc.EXPECT().GetWorkload("mockApp", "mockSvc").Return(&mockWl, nil), m.storeSvc.EXPECT().GetEnvironment("mockApp", "mockEnv").Return(&config.Environment{ Name: "my-env", }, nil), m.sessProvider.EXPECT().FromRole(gomock.Any(), gomock.Any()).Return(&session.Session{ Config: &aws.Config{ Region: aws.String("mockRegion"), }, }, nil), m.ecsSvcDescriber.EXPECT().DescribeService("mockApp", "mockEnv", "mockSvc").Return(&ecs.ServiceDesc{ ClusterName: "mockCluster", Tasks: []*awsecs.Task{ { TaskArn: aws.String(mockTaskARN), LastStatus: aws.String("RUNNING"), }, { TaskArn: aws.String(mockOtherTaskARN), LastStatus: aws.String("RUNNING"), }, }, }, nil), m.ecsCommandExecutor.EXPECT().ExecuteCommand(awsecs.ExecuteCommandInput{ Cluster: "mockCluster", Container: "mockSvc", Task: "mockTaskID", Command: "mockCommand", }).Return(nil), ) }, }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { ctrl := gomock.NewController(t) defer ctrl.Finish() mockStoreReader := mocks.NewMockstore(ctrl) mockSvcDescriber := mocks.NewMockserviceDescriber(ctrl) mockCommandExecutor := mocks.NewMockecsCommandExecutor(ctrl) mockSessionProvider := mocks.NewMocksessionProvider(ctrl) mockNewSvcDescriber := func(_ *session.Session) serviceDescriber { return mockSvcDescriber } mockNewCommandExecutor := func(_ *session.Session) ecsCommandExecutor { return mockCommandExecutor } mocks := execSvcMocks{ storeSvc: mockStoreReader, ecsCommandExecutor: mockCommandExecutor, ecsSvcDescriber: mockSvcDescriber, sessProvider: mockSessionProvider, } tc.setupMocks(mocks) execSvcs := &svcExecOpts{ execVars: execVars{ name: "mockSvc", envName: "mockEnv", appName: "mockApp", command: "mockCommand", containerName: tc.containerName, taskID: tc.taskID, }, store: mockStoreReader, newSvcDescriber: mockNewSvcDescriber, newCommandExecutor: mockNewCommandExecutor, randInt: func(i int) int { return 0 }, sessProvider: mockSessionProvider, } // WHEN err := execSvcs.Execute() // THEN if tc.wantedError != nil { require.EqualError(t, err, tc.wantedError.Error()) } else { require.NoError(t, err) } }) } }
629
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package cli import ( "errors" "fmt" "os" "path/filepath" "strconv" "strings" "github.com/aws/aws-sdk-go/service/ssm" "github.com/aws/copilot-cli/internal/pkg/aws/identity" "github.com/aws/copilot-cli/internal/pkg/describe" "github.com/aws/copilot-cli/internal/pkg/manifest/manifestinfo" "github.com/aws/copilot-cli/internal/pkg/version" "github.com/dustin/go-humanize/english" "github.com/aws/aws-sdk-go/aws" "github.com/aws/copilot-cli/internal/pkg/docker/dockerfile" "github.com/aws/copilot-cli/internal/pkg/docker/dockerengine" "github.com/aws/copilot-cli/internal/pkg/aws/sessions" "github.com/aws/copilot-cli/internal/pkg/config" "github.com/aws/copilot-cli/internal/pkg/deploy" "github.com/aws/copilot-cli/internal/pkg/deploy/cloudformation" "github.com/aws/copilot-cli/internal/pkg/exec" "github.com/aws/copilot-cli/internal/pkg/initialize" "github.com/aws/copilot-cli/internal/pkg/manifest" "github.com/aws/copilot-cli/internal/pkg/term/color" "github.com/aws/copilot-cli/internal/pkg/term/log" termprogress "github.com/aws/copilot-cli/internal/pkg/term/progress" "github.com/aws/copilot-cli/internal/pkg/term/prompt" "github.com/aws/copilot-cli/internal/pkg/term/selector" "github.com/aws/copilot-cli/internal/pkg/workspace" "github.com/spf13/afero" "github.com/spf13/cobra" ) const ( wkldInitImagePromptHelp = `The name of an existing Docker image. Images in the Docker Hub registry are available by default. Other repositories are specified with either repository-url/image:tag or repository-url/image@digest` wkldInitAppRunnerImagePromptHelp = `The name of an existing Docker image. App Runner supports images hosted in ECR or ECR Public registries.` ) const ( defaultSvcPortString = "80" service = "service" job = "job" ) var ( fmtSvcInitSvcTypePrompt = "Which %s best represents your service's architecture?" svcInitSvcTypeHelpPrompt = fmt.Sprintf(`A %s is an internet-facing or private HTTP server managed by AWS App Runner that scales based on incoming requests. To learn more see: https://git.io/JEEfb A %s is an internet-facing HTTP server managed by Amazon ECS on AWS Fargate behind a load balancer. To learn more see: https://git.io/JEEJe A %s is a private, non internet-facing service accessible from other services in your VPC. To learn more see: https://git.io/JEEJt A %s is a private service that can consume messages published to topics in your application. To learn more see: https://git.io/JEEJY`, manifestinfo.RequestDrivenWebServiceType, manifestinfo.LoadBalancedWebServiceType, manifestinfo.BackendServiceType, manifestinfo.WorkerServiceType, ) fmtWkldInitNamePrompt = "What do you want to %s this %s?" fmtWkldInitNameHelpPrompt = `The name will uniquely identify this %s within your app %s. Deployed resources (such as your ECR repository, logs) will contain this %[1]s's name and be tagged with it.` fmtWkldInitDockerfilePrompt = "Which " + color.Emphasize("Dockerfile") + " would you like to use for %s?" wkldInitDockerfileHelpPrompt = "Dockerfile to use for building your container image." fmtWkldInitDockerfilePathPrompt = "What is the path to the " + color.Emphasize("Dockerfile") + " for %s?" wkldInitDockerfilePathHelpPrompt = "Path to Dockerfile to use for building your container image." svcInitSvcPortPrompt = "Which %s do you want customer traffic sent to?" svcInitSvcPortHelpPrompt = `The port will be used by the load balancer to route incoming traffic to this service. You should set this to the port which your Dockerfile uses to communicate with the internet.` svcInitPublisherPrompt = "Which topics do you want to subscribe to?" svcInitPublisherHelpPrompt = `A publisher is an existing SNS Topic to which a service publishes messages. These messages can be consumed by the Worker Service.` svcInitIngressTypePrompt = "Would you like to accept traffic from your environment or the internet?" svcInitIngressTypeHelpPrompt = `"Environment" will configure your service as private. "Internet" will configure your service as public.` wkldInitImagePrompt = fmt.Sprintf("What's the %s ([registry/]repository[:tag|@digest]) of the image to use?", color.Emphasize("location")) fmtStaticSiteInitDirFilePrompt = "Which " + color.Emphasize("directories or files") + " would you like to upload for %s?" staticSiteInitDirFileHelpPrompt = "Directories or files to use for building your static site." fmtStaticSiteInitDirFilePathPrompt = "What is the path to the " + color.Emphasize("directory or file") + " for %s?" staticSiteInitDirFilePathHelpPrompt = "Path to directory or file to use for building your static site." ) const ( ingressTypeEnvironment = "Environment" ingressTypeInternet = "Internet" ) var rdwsIngressOptions = []string{ ingressTypeEnvironment, ingressTypeInternet, } var serviceTypeHints = map[string]string{ manifestinfo.RequestDrivenWebServiceType: "App Runner", manifestinfo.LoadBalancedWebServiceType: "Internet to ECS on Fargate", manifestinfo.BackendServiceType: "ECS on Fargate", manifestinfo.WorkerServiceType: "Events to SQS to ECS on Fargate", manifestinfo.StaticSiteType: "Internet to CDN to S3 bucket", } type initWkldVars struct { appName string wkldType string name string dockerfilePath string image string subscriptions []string noSubscribe bool sourcePaths []string allowAppDowngrade bool } type initSvcVars struct { initWkldVars port uint16 ingressType string } type initSvcOpts struct { initSvcVars // Interfaces to interact with dependencies. fs afero.Fs init svcInitializer prompt prompter store store dockerEngine dockerEngine sel dockerfileSelector sourceSel staticSourceSelector topicSel topicSelector mftReader manifestReader // Outputs stored on successful actions. manifestPath string platform *manifest.PlatformString topics []manifest.TopicSubscription staticAssets []manifest.FileUpload // For workspace validation. wsAppName string wsPendingCreation bool // Cache variables df dockerfileParser manifestExists bool additionalFoundPort uint16 // For logging a personalized recommended action with multiple ports. wsRoot string dockerfile func(path string) dockerfileParser initEnvDescriber func(appName, envName string) (envDescriber, error) newAppVersionGetter func(appName string) (versionGetter, error) // Overridden in tests. templateVersion string } func newInitSvcOpts(vars initSvcVars) (*initSvcOpts, error) { fs := afero.NewOsFs() ws, err := workspace.Use(fs) if err != nil { return nil, err } sessProvider := sessions.ImmutableProvider(sessions.UserAgentExtras("svc init")) sess, err := sessProvider.Default() if err != nil { return nil, err } store := config.NewSSMStore(identity.New(sess), ssm.New(sess), aws.StringValue(sess.Config.Region)) prompter := prompt.New() deployStore, err := deploy.NewStore(sessProvider, store) if err != nil { return nil, err } snsSel := selector.NewDeploySelect(prompter, store, deployStore) initSvc := &initialize.WorkloadInitializer{ Store: store, Ws: ws, Prog: termprogress.NewSpinner(log.DiagnosticWriter), Deployer: cloudformation.New(sess, cloudformation.WithProgressTracker(os.Stderr)), } dfSel, err := selector.NewDockerfileSelector(prompter, fs) if err != nil { return nil, err } sourceSel, err := selector.NewLocalFileSelector(prompter, fs, ws) if err != nil { return nil, fmt.Errorf("init a new local file selector: %w", err) } opts := &initSvcOpts{ initSvcVars: vars, store: store, fs: fs, init: initSvc, prompt: prompter, sel: dfSel, topicSel: snsSel, sourceSel: sourceSel, mftReader: ws, newAppVersionGetter: func(appName string) (versionGetter, error) { return describe.NewAppDescriber(appName) }, initEnvDescriber: func(appName string, envName string) (envDescriber, error) { envDescriber, err := describe.NewEnvDescriber(describe.NewEnvDescriberConfig{ App: appName, Env: envName, ConfigStore: store, }) if err != nil { return nil, err } return envDescriber, nil }, dockerEngine: dockerengine.New(exec.NewCmd()), wsAppName: tryReadingAppName(), wsRoot: ws.ProjectRoot(), templateVersion: version.LatestTemplateVersion(), } opts.dockerfile = func(path string) dockerfileParser { if opts.df != nil { return opts.df } opts.df = dockerfile.New(opts.fs, opts.dockerfilePath) return opts.df } return opts, nil } // Validate returns an error for any invalid optional flags. func (o *initSvcOpts) Validate() error { // If this app is pending creation, we'll skip validation. if !o.wsPendingCreation { if err := validateWorkspaceApp(o.wsAppName, o.appName, o.store); err != nil { return err } o.appName = o.wsAppName } if o.dockerfilePath != "" && o.image != "" { return fmt.Errorf("--%s and --%s cannot be specified together", dockerFileFlag, imageFlag) } if o.dockerfilePath != "" { if _, err := o.fs.Stat(o.dockerfilePath); err != nil { return err } } if o.port != 0 { if err := validateSvcPort(o.port); err != nil { return err } } if o.image != "" && o.wkldType == manifestinfo.RequestDrivenWebServiceType { if err := validateAppRunnerImage(o.image); err != nil { return err } } if len(o.sourcePaths) != 0 { if o.wkldType != manifestinfo.StaticSiteType { return fmt.Errorf("'--%s' must be specified with '--%s %q'", sourcesFlag, typeFlag, manifestinfo.StaticSiteType) } if err := o.validateSourcePaths(o.sourcePaths); err != nil { return err } assets, err := o.convertStringsToAssets(o.sourcePaths) if err != nil { return fmt.Errorf("convert source strings to objects: %w", err) } o.staticAssets = assets } if err := validateSubscribe(o.noSubscribe, o.subscriptions); err != nil { return err } if err := o.validateIngressType(); err != nil { return err } return nil } func (o *initSvcOpts) validateSourcePaths(sources []string) error { if o.wsPendingCreation { // This can happen during `copilot init`, that we have to `Validate` before there is a workspace. // In this case, we skip the validation for path, and let `svc deploy` handle the validation. return nil } for _, source := range sources { _, err := o.fs.Stat(filepath.Join(o.wsRoot, source)) if err != nil { return fmt.Errorf("source %q must be a valid path relative to the workspace %q: %w", source, o.wsRoot, err) } } return nil } // Ask prompts for and validates any required flags. func (o *initSvcOpts) Ask() error { // NOTE: we optimize the case where `name` is given as a flag while `wkldType` is not. // In this case, we can try reading the manifest, and set `wkldType` to the value found in the manifest // without having to validate it. We can then short circuit the rest of the prompts for an optimal UX. if o.name != "" && o.wkldType == "" { // Best effort to validate the service name without type. if err := o.validateSvc(); err != nil { return err } shouldSkipAsking, err := o.manifestAlreadyExists() if err != nil { return err } if shouldSkipAsking { return nil } } if o.wkldType != "" { if err := validateSvcType(o.wkldType); err != nil { return err } } else { if err := o.askSvcType(); err != nil { return err } } if o.name == "" { if err := o.askSvcName(); err != nil { return err } } if err := o.validateSvc(); err != nil { return err } if err := o.askIngressType(); err != nil { return err } shouldSkipAsking, err := o.manifestAlreadyExists() if err != nil { return err } if shouldSkipAsking { return nil } return o.askSvcDetails() } // Execute writes the service's manifest file and stores the service in SSM. func (o *initSvcOpts) Execute() error { if !o.allowAppDowngrade { appVersionGetter, err := o.newAppVersionGetter(o.appName) if err != nil { return err } if err := validateAppVersion(appVersionGetter, o.appName, o.templateVersion); err != nil { return err } } // Check for a valid healthcheck and add it to the opts. var hc manifest.ContainerHealthCheck var err error if o.dockerfilePath != "" { hc, err = parseHealthCheck(o.dockerfile(o.dockerfilePath)) if err != nil { log.Warningf("Cannot parse the HEALTHCHECK instruction from the Dockerfile: %v\n", err) } } // If the user passes in an image, their docker engine isn't necessarily running, and we can't do anything with the platform because we're not building the Docker image. if o.image == "" && !o.manifestExists { platform, err := legitimizePlatform(o.dockerEngine, o.wkldType) if err != nil { return err } if platform != "" { o.platform = &platform } } // Environments that are deployed and have​ only private subnets. envs, err := envsWithPrivateSubnetsOnly(o.store, o.initEnvDescriber, o.appName) if err != nil { return err } o.manifestPath, err = o.init.Service(&initialize.ServiceProps{ WorkloadProps: initialize.WorkloadProps{ App: o.appName, Name: o.name, Type: o.wkldType, DockerfilePath: o.dockerfilePath, Image: o.image, Platform: manifest.PlatformArgsOrString{ PlatformString: o.platform, }, Topics: o.topics, PrivateOnlyEnvironments: envs, }, Port: o.port, HealthCheck: hc, Private: strings.EqualFold(o.ingressType, ingressTypeEnvironment), FileUploads: o.staticAssets, }) if err != nil { return err } return nil } // RecommendActions returns follow-up actions the user can take after successfully executing the command. func (o *initSvcOpts) RecommendActions() error { actions := []string{fmt.Sprintf("Update your manifest %s to change the defaults.", color.HighlightResource(o.manifestPath))} // If the Dockerfile exposes multiple ports, log a code block suggesting adding additional rules. if o.additionalFoundPort != 0 { multiplePortsAdditionalPathsAction := fmt.Sprintf(`It looks like your Dockerfile exposes multiple ports. You can specify multiple paths where your service will receive traffic by setting http.additional_rules: %s`, color.HighlightCodeBlock(fmt.Sprintf(`http: path: / additional_rules: - path: /admin target_port: %d`, o.additionalFoundPort))) actions = append(actions, multiplePortsAdditionalPathsAction) } actions = append(actions, fmt.Sprintf("Run %s to deploy your service to a %s environment.", color.HighlightCode(fmt.Sprintf("copilot svc deploy --name %s --env %s", o.name, defaultEnvironmentName)), defaultEnvironmentName)) logRecommendedActions(actions) return nil } func (o *initSvcOpts) askSvcDetails() error { if o.wkldType == manifestinfo.StaticSiteType { return o.askStaticSite() } err := o.askDockerfile() if err != nil { return err } if o.dockerfilePath == "" { if err := o.askImage(); err != nil { return err } } if err := o.askSvcPort(); err != nil { return err } return o.askSvcPublishers() } func (o *initSvcOpts) askSvcType() error { if o.wkldType != "" { return nil } msg := fmt.Sprintf(fmtSvcInitSvcTypePrompt, color.Emphasize("service type")) t, err := o.prompt.SelectOption(msg, svcInitSvcTypeHelpPrompt, svcTypePromptOpts(), prompt.WithFinalMessage("Service type:")) if err != nil { return fmt.Errorf("select service type: %w", err) } o.wkldType = t return nil } func (o *initSvcOpts) validateSvc() error { if err := validateSvcName(o.name, o.wkldType); err != nil { return err } return o.validateDuplicateSvc() } func (o *initSvcOpts) validateDuplicateSvc() error { _, err := o.store.GetService(o.appName, o.name) if err == nil { log.Errorf(`It seems like you are trying to init a service that already exists. To recreate the service, please run: 1. %s. Note: The manifest file will not be deleted and will be used in Step 2. If you'd prefer a new default manifest, please manually delete the existing one. 2. And then %s `, color.HighlightCode(fmt.Sprintf("copilot svc delete --name %s", o.name)), color.HighlightCode(fmt.Sprintf("copilot svc init --name %s", o.name))) return fmt.Errorf("service %s already exists", color.HighlightUserInput(o.name)) } var errNoSuchSvc *config.ErrNoSuchService if !errors.As(err, &errNoSuchSvc) { return fmt.Errorf("validate if service exists: %w", err) } return nil } func (o *initSvcOpts) askStaticSite() error { if len(o.staticAssets) != 0 { return nil } var sources []string var err error if o.wsPendingCreation { sources, err = selector.AskCustomPaths( o.prompt, fmt.Sprintf(fmtStaticSiteInitDirFilePathPrompt, color.HighlightUserInput(o.name)), staticSiteInitDirFilePathHelpPrompt, validateNonEmptyString, // When the workspace is absent, we skip the validation and leave it to `svc deploy`. ) } else { sources, err = o.sourceSel.StaticSources( fmt.Sprintf(fmtStaticSiteInitDirFilePrompt, color.HighlightUserInput(o.name)), staticSiteInitDirFileHelpPrompt, fmt.Sprintf(fmtStaticSiteInitDirFilePathPrompt, color.HighlightUserInput(o.name)), staticSiteInitDirFilePathHelpPrompt, func(val interface{}) error { path, ok := val.(string) if !ok { return errValueNotAString } _, err := o.fs.Stat(filepath.Join(o.wsRoot, path)) if err != nil { return fmt.Errorf("source %q must be a valid path relative to the workspace %q: %w", path, o.wsRoot, err) } return nil }, ) } if err != nil { return err } if o.staticAssets, err = o.convertStringsToAssets(sources); err != nil { return fmt.Errorf("convert source paths to asset objects: %w", err) } return nil } func (o *initSvcOpts) askSvcName() error { name, err := o.prompt.Get( fmt.Sprintf(fmtWkldInitNamePrompt, color.Emphasize("name"), "service"), fmt.Sprintf(fmtWkldInitNameHelpPrompt, service, o.appName), func(val interface{}) error { return validateSvcName(val, o.wkldType) }, prompt.WithFinalMessage("Service name:")) if err != nil { return fmt.Errorf("get service name: %w", err) } o.name = name return nil } func (o *initSvcOpts) askIngressType() error { if o.wkldType != manifestinfo.RequestDrivenWebServiceType || o.ingressType != "" { return nil } var opts []prompt.Option for _, typ := range rdwsIngressOptions { opts = append(opts, prompt.Option{Value: typ}) } t, err := o.prompt.SelectOption(svcInitIngressTypePrompt, svcInitIngressTypeHelpPrompt, opts, prompt.WithFinalMessage("Reachable from:")) if err != nil { return fmt.Errorf("select ingress type: %w", err) } o.ingressType = t return nil } func (o *initSvcOpts) validateIngressType() error { if o.wkldType != manifestinfo.RequestDrivenWebServiceType { return nil } if strings.EqualFold(o.ingressType, "internet") || strings.EqualFold(o.ingressType, "environment") { return nil } return fmt.Errorf("invalid ingress type %q: must be one of %s", o.ingressType, english.OxfordWordSeries(rdwsIngressOptions, "or")) } func (o *initSvcOpts) askImage() error { if o.image != "" { return nil } validator := prompt.RequireNonEmpty promptHelp := wkldInitImagePromptHelp if o.wkldType == manifestinfo.RequestDrivenWebServiceType { promptHelp = wkldInitAppRunnerImagePromptHelp validator = validateAppRunnerImage } image, err := o.prompt.Get( wkldInitImagePrompt, promptHelp, validator, prompt.WithFinalMessage("Image:"), ) if err != nil { return fmt.Errorf("get image location: %w", err) } o.image = image return nil } func (o *initSvcOpts) manifestAlreadyExists() (bool, error) { if o.wsPendingCreation { return false, nil } localMft, err := o.mftReader.ReadWorkloadManifest(o.name) if err != nil { var ( errNotFound *workspace.ErrFileNotExists errWorkspaceNotFound *workspace.ErrWorkspaceNotFound ) if !errors.As(err, &errNotFound) && !errors.As(err, &errWorkspaceNotFound) { return false, fmt.Errorf("read manifest file for service %s: %w", o.name, err) } return false, nil } o.manifestExists = true svcType, err := localMft.WorkloadType() if err != nil { return false, fmt.Errorf(`read "type" field for service %s from local manifest: %w`, o.name, err) } if o.wkldType != "" { if o.wkldType != svcType { return false, fmt.Errorf("manifest file for service %s exists with a different type %s", o.name, svcType) } } else { o.wkldType = svcType } log.Infof("Manifest file for service %s already exists. Skipping configuration.\n", o.name) return true, nil } // isDfSelected indicates if any Dockerfile is in use. func (o *initSvcOpts) askDockerfile() error { if o.dockerfilePath != "" || o.image != "" { return nil } if err := o.dockerEngine.CheckDockerEngineRunning(); err != nil { var errDaemon *dockerengine.ErrDockerDaemonNotResponsive switch { case errors.Is(err, dockerengine.ErrDockerCommandNotFound): log.Info("Docker command is not found; Copilot won't build from a Dockerfile.\n") return nil case errors.As(err, &errDaemon): log.Info("Docker daemon is not responsive; Copilot won't build from a Dockerfile.\n") return nil default: return fmt.Errorf("check if docker engine is running: %w", err) } } df, err := o.sel.Dockerfile( fmt.Sprintf(fmtWkldInitDockerfilePrompt, color.HighlightUserInput(o.name)), fmt.Sprintf(fmtWkldInitDockerfilePathPrompt, color.HighlightUserInput(o.name)), wkldInitDockerfileHelpPrompt, wkldInitDockerfilePathHelpPrompt, func(v interface{}) error { return validatePath(afero.NewOsFs(), v) }, ) if err != nil { return fmt.Errorf("select Dockerfile: %w", err) } if df == selector.DockerfilePromptUseImage { return nil } o.dockerfilePath = df return nil } func (o *initSvcOpts) askSvcPort() (err error) { // If the port flag was set, use that and don't ask. if o.port != 0 { return nil } var ports []dockerfile.Port if o.dockerfilePath != "" && o.image == "" { // Check for exposed ports. ports, err = o.dockerfile(o.dockerfilePath).GetExposedPorts() // Ignore any errors in dockerfile parsing--we'll use the default port instead. if err != nil { log.Debugln(err.Error()) } } defaultPort := defaultSvcPortString if o.dockerfilePath != "" { switch len(ports) { case 0: // There were no ports detected, keep the default port prompt. case 1: o.port = ports[0].Port return nil default: defaultPort = strconv.Itoa(int(ports[0].Port)) } } if o.wkldType == manifestinfo.BackendServiceType || o.wkldType == manifestinfo.WorkerServiceType { return nil } port, err := o.prompt.Get( fmt.Sprintf(svcInitSvcPortPrompt, color.Emphasize("port(s)")), svcInitSvcPortHelpPrompt, validateSvcPort, prompt.WithDefaultInput(defaultPort), prompt.WithFinalMessage("Port:"), ) if err != nil { return fmt.Errorf("get port: %w", err) } portUint, err := strconv.ParseUint(port, 10, 16) if err != nil { return fmt.Errorf("parse port string: %w", err) } o.port = uint16(portUint) // Log a recommended action to update additional rules if multiple ports exposed. for _, foundPort := range ports { // Use the first exposed port in the Dockerfile that wasn't selected for traffic. if foundPort.Port != o.port { o.additionalFoundPort = foundPort.Port break } } return nil } func legitimizePlatform(engine dockerEngine, wkldType string) (manifest.PlatformString, error) { if err := engine.CheckDockerEngineRunning(); err != nil { // This is a best-effort attempt to detect the platform for users. // If docker is not available, we skip this information. var errDaemon *dockerengine.ErrDockerDaemonNotResponsive switch { case errors.Is(err, dockerengine.ErrDockerCommandNotFound): log.Info("Docker command is not found; Copilot won't detect and populate the \"platform\" field in the manifest.\n") return "", nil case errors.As(err, &errDaemon): log.Info("Docker daemon is not responsive; Copilot won't detect and populate the \"platform\" field in the manifest.\n") return "", nil default: return "", fmt.Errorf("check if docker engine is running: %w", err) } } detectedOs, detectedArch, err := engine.GetPlatform() if err != nil { return "", fmt.Errorf("get docker engine platform: %w", err) } redirectedPlatform, err := manifest.RedirectPlatform(detectedOs, detectedArch, wkldType) if err != nil { return "", fmt.Errorf("redirect docker engine platform: %w", err) } if redirectedPlatform == "" { return "", nil } // Return an error if a platform cannot be redirected. if wkldType == manifestinfo.RequestDrivenWebServiceType && detectedOs == manifest.OSWindows { return "", manifest.ErrAppRunnerInvalidPlatformWindows } // Messages are logged only if the platform was redirected. msg := fmt.Sprintf("Architecture type %s has been detected. We will set platform '%s' instead. If you'd rather build and run as architecture type %s, please change the 'platform' field in your workload manifest to '%s'.\n", detectedArch, redirectedPlatform, manifest.ArchARM64, dockerengine.PlatformString(detectedOs, manifest.ArchARM64)) if manifest.IsArmArch(detectedArch) && wkldType == manifestinfo.RequestDrivenWebServiceType { msg = fmt.Sprintf("Architecture type %s has been detected. At this time, %s architectures are not supported for App Runner workloads. We will set platform '%s' instead.\n", detectedArch, detectedArch, redirectedPlatform) } log.Warningf(msg) return manifest.PlatformString(redirectedPlatform), nil } func (o *initSvcOpts) askSvcPublishers() (err error) { if o.wkldType != manifestinfo.WorkerServiceType { return nil } // publishers already specified by flags if len(o.subscriptions) > 0 { var topicSubscriptions []manifest.TopicSubscription for _, sub := range o.subscriptions { sub, err := parseSerializedSubscription(sub) if err != nil { return err } topicSubscriptions = append(topicSubscriptions, sub) } o.topics = topicSubscriptions return nil } // if --no-subscriptions flag specified, no need to ask for publishers if o.noSubscribe { return nil } topics, err := o.topicSel.Topics(svcInitPublisherPrompt, svcInitPublisherHelpPrompt, o.appName) if err != nil { return fmt.Errorf("select publisher: %w", err) } subscriptions := make([]manifest.TopicSubscription, 0, len(topics)) for _, t := range topics { subscriptions = append(subscriptions, manifest.TopicSubscription{ Name: aws.String(t.Name()), Service: aws.String(t.Workload()), }) } o.topics = subscriptions return nil } func validateWorkspaceApp(wsApp, inputApp string, store store) error { if wsApp == "" { // NOTE: This command is required to be executed under a workspace. We don't prompt for it. return errNoAppInWorkspace } // This command must be run within the app's workspace. if inputApp != "" && inputApp != wsApp { return fmt.Errorf("cannot specify app %s because the workspace is already registered with app %s", inputApp, wsApp) } if _, err := store.GetApplication(wsApp); err != nil { return fmt.Errorf("get application %s configuration: %w", wsApp, err) } return nil } func (o initSvcOpts) convertStringsToAssets(sources []string) ([]manifest.FileUpload, error) { assets := make([]manifest.FileUpload, len(sources)) var root string if !o.wsPendingCreation { root = o.wsRoot } for i, source := range sources { info, err := o.fs.Stat(filepath.Join(root, source)) var recursive bool if err == nil && info.IsDir() { // Swallow the error at this point, because the path would have been validated during Validate or Ask, or will // be validated during deploy. recursive = true } assets[i] = manifest.FileUpload{ Source: source, Recursive: recursive, } } return assets, nil } // parseSerializedSubscription parses the service and topic name out of keys specified in the form "service:topicName" func parseSerializedSubscription(input string) (manifest.TopicSubscription, error) { attrs := regexpMatchSubscription.FindStringSubmatch(input) if len(attrs) == 0 { return manifest.TopicSubscription{}, fmt.Errorf("parse subscription from key: %s", input) } return manifest.TopicSubscription{ Name: aws.String(attrs[2]), Service: aws.String(attrs[1]), }, nil } func parseHealthCheck(df dockerfileParser) (manifest.ContainerHealthCheck, error) { hc, err := df.GetHealthCheck() if err != nil { return manifest.ContainerHealthCheck{}, fmt.Errorf("get healthcheck: %w", err) } if hc == nil { return manifest.ContainerHealthCheck{}, nil } return manifest.ContainerHealthCheck{ Interval: &hc.Interval, Timeout: &hc.Timeout, StartPeriod: &hc.StartPeriod, Retries: &hc.Retries, Command: hc.Cmd, }, nil } func svcTypePromptOpts() []prompt.Option { var options []prompt.Option for _, svcType := range manifestinfo.ServiceTypes() { options = append(options, prompt.Option{ Value: svcType, Hint: serviceTypeHints[svcType], }) } return options } // buildSvcInitCmd build the command for creating a new service. func buildSvcInitCmd() *cobra.Command { vars := initSvcVars{} cmd := &cobra.Command{ Use: "init", Short: "Creates a new service in an application.", Long: `Creates a new service in an application. This command is also run as part of "copilot init".`, Example: ` Create a "frontend" load balanced web service. /code $ copilot svc init --name frontend --svc-type "Load Balanced Web Service" --dockerfile ./frontend/Dockerfile Create a "subscribers" backend service. /code $ copilot svc init --name subscribers --svc-type "Backend Service"`, RunE: runCmdE(func(cmd *cobra.Command, args []string) error { opts, err := newInitSvcOpts(vars) if err != nil { return err } if err := opts.Validate(); err != nil { // validate flags return err } log.Warningln("It's best to run this command in the root of your workspace.") if err := opts.Ask(); err != nil { return err } if err := opts.Execute(); err != nil { return err } if err := opts.RecommendActions(); err != nil { return err } return nil }), } cmd.Flags().StringVarP(&vars.appName, appFlag, appFlagShort, "", appFlagDescription) cmd.Flags().StringVarP(&vars.name, nameFlag, nameFlagShort, "", svcFlagDescription) cmd.Flags().StringVarP(&vars.wkldType, svcTypeFlag, typeFlagShort, "", svcTypeFlagDescription) cmd.Flags().StringVarP(&vars.dockerfilePath, dockerFileFlag, dockerFileFlagShort, "", dockerFileFlagDescription) cmd.Flags().StringVarP(&vars.image, imageFlag, imageFlagShort, "", imageFlagDescription) cmd.Flags().Uint16Var(&vars.port, svcPortFlag, 0, svcPortFlagDescription) cmd.Flags().StringArrayVar(&vars.subscriptions, subscribeTopicsFlag, []string{}, subscribeTopicsFlagDescription) cmd.Flags().BoolVar(&vars.noSubscribe, noSubscriptionFlag, false, noSubscriptionFlagDescription) cmd.Flags().StringVar(&vars.ingressType, ingressTypeFlag, "", ingressTypeFlagDescription) cmd.Flags().StringArrayVar(&vars.sourcePaths, sourcesFlag, nil, sourcesFlagDescription) cmd.Flags().BoolVar(&vars.allowAppDowngrade, allowDowngradeFlag, false, allowDowngradeFlagDescription) return cmd }
951
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package cli import ( "errors" "fmt" "path/filepath" "testing" "github.com/aws/aws-sdk-go/aws" "github.com/aws/copilot-cli/internal/pkg/config" "github.com/aws/copilot-cli/internal/pkg/deploy" "github.com/aws/copilot-cli/internal/pkg/docker/dockerengine" "github.com/aws/copilot-cli/internal/pkg/docker/dockerfile" "github.com/aws/copilot-cli/internal/pkg/manifest/manifestinfo" "github.com/aws/copilot-cli/internal/pkg/term/prompt" "github.com/aws/copilot-cli/internal/pkg/workspace" "github.com/aws/copilot-cli/internal/pkg/cli/mocks" "github.com/aws/copilot-cli/internal/pkg/initialize" "github.com/aws/copilot-cli/internal/pkg/manifest" "github.com/golang/mock/gomock" "github.com/spf13/afero" "github.com/stretchr/testify/require" ) type initSvcMocks struct { mockPrompt *mocks.Mockprompter mockSel *mocks.MockdockerfileSelector mocktopicSel *mocks.MocktopicSelector mockSourceSel *mocks.MockstaticSourceSelector mockDockerfile *mocks.MockdockerfileParser mockDockerEngine *mocks.MockdockerEngine mockMftReader *mocks.MockmanifestReader mockStore *mocks.Mockstore mockCachedWSRoot string } func TestSvcInitOpts_Validate(t *testing.T) { testCases := map[string]struct { inSvcType string inSvcName string inDockerfilePath string inImage string inAppName string inSvcPort uint16 inSubscribeTags []string inNoSubscribe bool inIngressType string inSources []string setupMocks func(mocks *initSvcMocks) mockFileSystem func(mockFS afero.Fs) wantedErr error wantedAssets []manifest.FileUpload }{ "fail if using different app name with the workspace": { inAppName: "demo", wantedErr: fmt.Errorf("cannot specify app demo because the workspace is already registered with app phonetool"), }, "fail if cannot validate application": { inAppName: "phonetool", inDockerfilePath: "mockDockerfile", inImage: "mockImage", setupMocks: func(m *initSvcMocks) { m.mockStore.EXPECT().GetApplication("phonetool").Return(nil, errors.New("some error")) }, wantedErr: fmt.Errorf("get application phonetool configuration: some error"), }, "fail if both image and dockerfile are set": { inAppName: "phonetool", inDockerfilePath: "mockDockerfile", inImage: "mockImage", setupMocks: func(m *initSvcMocks) { m.mockStore.EXPECT().GetApplication("phonetool").Return(&config.Application{}, nil) }, wantedErr: fmt.Errorf("--dockerfile and --image cannot be specified together"), }, "fail if image not supported by App Runner": { inAppName: "phonetool", inImage: "amazon/amazon-ecs-sample", inSvcType: manifestinfo.RequestDrivenWebServiceType, setupMocks: func(m *initSvcMocks) { m.mockStore.EXPECT().GetApplication("phonetool").Return(&config.Application{}, nil) }, wantedErr: fmt.Errorf("image amazon/amazon-ecs-sample is not supported by App Runner: value must be an ECR or ECR Public image URI"), }, "invalid dockerfile directory path": { inAppName: "phonetool", inDockerfilePath: "./hello/Dockerfile", setupMocks: func(m *initSvcMocks) { m.mockStore.EXPECT().GetApplication("phonetool").Return(&config.Application{}, nil) }, wantedErr: fmt.Errorf("open %s: file does not exist", filepath.FromSlash("hello/Dockerfile")), }, "fail if both no-subscribe and subscribe are set": { inAppName: "phonetool", inSvcName: "service", inSubscribeTags: []string{"name:svc"}, inNoSubscribe: true, setupMocks: func(m *initSvcMocks) { m.mockStore.EXPECT().GetApplication("phonetool").Return(&config.Application{}, nil) }, wantedErr: errors.New("validate subscribe configuration: cannot specify both --no-subscribe and --subscribe-topics"), }, "rdws invalid ingress type error": { inSvcName: "frontend", inSvcType: "Request-Driven Web Service", inDockerfilePath: "./hello/Dockerfile", inIngressType: "invalid", setupMocks: func(m *initSvcMocks) { m.mockStore.EXPECT().GetApplication("phonetool").Return(&config.Application{}, nil) }, mockFileSystem: func(mockFS afero.Fs) { mockFS.MkdirAll("hello", 0755) afero.WriteFile(mockFS, "hello/Dockerfile", []byte("FROM nginx"), 0644) }, wantedErr: errors.New(`invalid ingress type "invalid": must be one of Environment or Internet`), }, "error if sources flag used without Static Site type": { inSvcName: "frontend", inSvcType: "Load Balanced Web Service", inSources: []string{"goodbye", "hello/there"}, setupMocks: func(m *initSvcMocks) { m.mockStore.EXPECT().GetApplication("phonetool").Return(&config.Application{}, nil) }, wantedErr: errors.New(`'--sources' must be specified with '--type "Static Site"'`), }, "error if sources flag used with invalid sources": { inSvcName: "frontend", inSvcType: "Static Site", inSources: []string{"non-existent path"}, mockFileSystem: func(mockFS afero.Fs) { mockFS.MkdirAll("copilot", 0755) mockFS.MkdirAll("hello", 0755) mockFS.MkdirAll("goodbye", 0755) afero.WriteFile(mockFS, "hello/there", []byte("howdy"), 0644) }, setupMocks: func(m *initSvcMocks) { m.mockCachedWSRoot = "mockRoot" m.mockStore.EXPECT().GetApplication("phonetool").Return(&config.Application{}, nil) }, wantedErr: errors.New(`source "non-existent path" must be a valid path relative to the workspace "mockRoot": open mockRoot/non-existent path: file does not exist`), }, "valid flags": { inSvcName: "frontend", inSvcType: "Load Balanced Web Service", inDockerfilePath: "./hello/Dockerfile", setupMocks: func(m *initSvcMocks) { m.mockStore.EXPECT().GetApplication("phonetool").Return(&config.Application{}, nil) }, mockFileSystem: func(mockFS afero.Fs) { mockFS.MkdirAll("hello", 0755) afero.WriteFile(mockFS, "hello/Dockerfile", []byte("FROM nginx"), 0644) }, }, "valid rdws flags": { inSvcName: "frontend", inSvcType: "Request-Driven Web Service", inDockerfilePath: "./hello/Dockerfile", inIngressType: "Internet", setupMocks: func(m *initSvcMocks) { m.mockStore.EXPECT().GetApplication("phonetool").Return(&config.Application{}, nil) }, mockFileSystem: func(mockFS afero.Fs) { mockFS.MkdirAll("hello", 0755) afero.WriteFile(mockFS, "hello/Dockerfile", []byte("FROM nginx"), 0644) }, }, "valid lbws port flag": { inSvcName: "frontend", inSvcType: "Load Balanced Web Service", inDockerfilePath: "./hello/Dockerfile", inSvcPort: 3000, setupMocks: func(m *initSvcMocks) { m.mockStore.EXPECT().GetApplication("phonetool").Return(&config.Application{}, nil) }, mockFileSystem: func(mockFS afero.Fs) { mockFS.MkdirAll("hello", 0755) afero.WriteFile(mockFS, "hello/Dockerfile", []byte("FROM nginx"), 0644) }, }, "valid static site flag": { inSvcName: "frontend", inSvcType: "Static Site", inSources: []string{"goodbye", "hello/there"}, mockFileSystem: func(mockFS afero.Fs) { mockFS.MkdirAll("copilot", 0755) mockFS.MkdirAll("groot/hello", 0755) mockFS.MkdirAll("groot/goodbye", 0755) afero.WriteFile(mockFS, "groot/hello/there", []byte("howdy"), 0644) }, setupMocks: func(m *initSvcMocks) { m.mockCachedWSRoot = "groot" m.mockStore.EXPECT().GetApplication("phonetool").Return(&config.Application{}, nil) }, wantedAssets: []manifest.FileUpload{ { Source: "goodbye", Recursive: true, }, { Source: "hello/there", Recursive: false, }, }, }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { ctrl := gomock.NewController(t) defer ctrl.Finish() m := initSvcMocks{ mockStore: mocks.NewMockstore(ctrl), } if tc.setupMocks != nil { tc.setupMocks(&m) } opts := initSvcOpts{ initSvcVars: initSvcVars{ initWkldVars: initWkldVars{ wkldType: tc.inSvcType, name: tc.inSvcName, dockerfilePath: tc.inDockerfilePath, image: tc.inImage, appName: tc.inAppName, subscriptions: tc.inSubscribeTags, noSubscribe: tc.inNoSubscribe, sourcePaths: tc.inSources, }, port: tc.inSvcPort, ingressType: tc.inIngressType, }, store: m.mockStore, fs: &afero.Afero{Fs: afero.NewMemMapFs()}, wsAppName: "phonetool", wsRoot: m.mockCachedWSRoot, } if tc.mockFileSystem != nil { tc.mockFileSystem(opts.fs) } // WHEN err := opts.Validate() // THEN if tc.wantedErr != nil { require.EqualError(t, err, tc.wantedErr.Error()) } else { require.NoError(t, err) require.Equal(t, tc.wantedAssets, opts.staticAssets) } }) } } func TestSvcInitOpts_Ask(t *testing.T) { const ( mockAppName = "phonetool" wantedSvcType = manifestinfo.LoadBalancedWebServiceType appRunnerSvcType = manifestinfo.RequestDrivenWebServiceType wantedSvcName = "frontend" badAppRunnerSvcName = "iamoverfortycharacterlongandaninvalidrdwsname" wantedDockerfilePath = "frontend/Dockerfile" wantedSvcPort = 80 wantedImage = "mockImage" mockProjectRoot = "groot" mockFile = "my/mock/file.css" mockDir = "my/mock/dir" ) mockTopic, _ := deploy.NewTopic("arn:aws:sns:us-west-2:123456789012:mockApp-mockEnv-mockWkld-orders", "mockApp", "mockEnv", "mockWkld") mockError := errors.New("mock error") testCases := map[string]struct { inSvcType string inSvcName string inDockerfilePath string inImage string inSvcPort uint16 inSubscribeTags []string inNoSubscribe bool inIngressType string inWsPendingCreation bool mockFileSystem func(mockFS afero.Fs) setupMocks func(mocks *initSvcMocks) wantedErr error wantedAssets []manifest.FileUpload }{ "invalid service type": { inSvcType: "TestSvcType", wantedErr: errors.New(`invalid service type TestSvcType: must be one of "Request-Driven Web Service", "Load Balanced Web Service", "Backend Service", "Worker Service", "Static Site"`), }, "invalid service name": { inSvcType: wantedSvcType, inSvcName: "1234", wantedErr: fmt.Errorf("service name 1234 is invalid: %s", errBasicNameRegexNotMatched), }, "prompt for service name": { inSvcType: wantedSvcType, inSvcPort: wantedSvcPort, inDockerfilePath: wantedDockerfilePath, setupMocks: func(m *initSvcMocks) { m.mockPrompt.EXPECT().Get(gomock.Eq("What do you want to name this service?"), gomock.Any(), gomock.Any(), gomock.Any()). Return(wantedSvcName, nil) m.mockStore.EXPECT().GetService(mockAppName, wantedSvcName).Return(nil, &config.ErrNoSuchService{}) m.mockMftReader.EXPECT().ReadWorkloadManifest(wantedSvcName).Return(nil, &workspace.ErrFileNotExists{FileName: wantedSvcName}) }, wantedErr: nil, }, "returns an error if fail to get service name": { inSvcType: wantedSvcType, inSvcName: "", inSvcPort: wantedSvcPort, inDockerfilePath: wantedDockerfilePath, setupMocks: func(m *initSvcMocks) { m.mockPrompt.EXPECT().Get(gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any()). Return("", errors.New("some error")) }, wantedErr: fmt.Errorf("get service name: some error"), }, "returns an error if service already exists": { inSvcType: wantedSvcType, inSvcName: "", inSvcPort: wantedSvcPort, inDockerfilePath: wantedDockerfilePath, setupMocks: func(m *initSvcMocks) { m.mockPrompt.EXPECT().Get(gomock.Eq("What do you want to name this service?"), gomock.Any(), gomock.Any(), gomock.Any()). Return(wantedSvcName, nil) m.mockStore.EXPECT().GetService(mockAppName, wantedSvcName).Return(&config.Workload{}, nil) }, wantedErr: fmt.Errorf("service frontend already exists"), }, "returns an error if fail to validate service existence": { inSvcType: wantedSvcType, inSvcName: "", inSvcPort: wantedSvcPort, inDockerfilePath: wantedDockerfilePath, setupMocks: func(m *initSvcMocks) { m.mockPrompt.EXPECT().Get(gomock.Eq("What do you want to name this service?"), gomock.Any(), gomock.Any(), gomock.Any()). Return(wantedSvcName, nil) m.mockStore.EXPECT().GetService(mockAppName, wantedSvcName).Return(nil, mockError) }, wantedErr: fmt.Errorf("validate if service exists: mock error"), }, "error if manifest type doesn't match": { inSvcType: "Worker Service", inSvcName: wantedSvcName, setupMocks: func(m *initSvcMocks) { m.mockStore.EXPECT().GetService(mockAppName, wantedSvcName).Return(nil, &config.ErrNoSuchService{}) m.mockMftReader.EXPECT().ReadWorkloadManifest(wantedSvcName).Return([]byte(` type: Backend Service`), nil) }, wantedErr: fmt.Errorf("manifest file for service frontend exists with a different type Backend Service"), }, "skip asking questions if local manifest file exists by flags": { inSvcType: "Worker Service", inSvcName: wantedSvcName, setupMocks: func(m *initSvcMocks) { m.mockStore.EXPECT().GetService(mockAppName, wantedSvcName).Return(nil, &config.ErrNoSuchService{}) m.mockMftReader.EXPECT().ReadWorkloadManifest(wantedSvcName).Return([]byte(` type: Worker Service`), nil) }, }, "error if invalid app runner service name": { inSvcType: "Request-Driven Web Service", inSvcName: badAppRunnerSvcName, setupMocks: func(m *initSvcMocks) {}, wantedErr: fmt.Errorf("service name iamoverfortycharacterlongandaninvalidrdwsname is invalid: value must not exceed 40 characters"), }, "skip asking questions if local manifest file exists by only name flag with minimal check": { inSvcName: badAppRunnerSvcName, setupMocks: func(m *initSvcMocks) { m.mockStore.EXPECT().GetService(mockAppName, badAppRunnerSvcName).Return(nil, &config.ErrNoSuchService{}) m.mockMftReader.EXPECT().ReadWorkloadManifest(badAppRunnerSvcName).Return([]byte(` type: Request-Driven Web Service`), nil) }, }, "return an error if fail to read local manifest": { inSvcType: "Worker Service", inSvcName: wantedSvcName, setupMocks: func(m *initSvcMocks) { m.mockStore.EXPECT().GetService(mockAppName, wantedSvcName).Return(nil, &config.ErrNoSuchService{}) m.mockMftReader.EXPECT().ReadWorkloadManifest(wantedSvcName).Return(nil, mockError) }, wantedErr: fmt.Errorf("read manifest file for service frontend: mock error"), }, "return an error if fail to get service type": { inSvcType: "", inSvcPort: wantedSvcPort, inDockerfilePath: wantedDockerfilePath, setupMocks: func(m *initSvcMocks) { m.mockPrompt.EXPECT().SelectOption(gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any()). Return("", errors.New("some error")) }, wantedErr: fmt.Errorf("select service type: some error"), }, "prompt for service type": { inSvcType: "", inSvcName: wantedSvcName, inSvcPort: wantedSvcPort, inDockerfilePath: wantedDockerfilePath, setupMocks: func(m *initSvcMocks) { m.mockPrompt.EXPECT().SelectOption(gomock.Eq(fmt.Sprintf(fmtSvcInitSvcTypePrompt, "service type")), gomock.Any(), gomock.Eq([]prompt.Option{ { Value: manifestinfo.RequestDrivenWebServiceType, Hint: "App Runner", }, { Value: manifestinfo.LoadBalancedWebServiceType, Hint: "Internet to ECS on Fargate", }, { Value: manifestinfo.BackendServiceType, Hint: "ECS on Fargate", }, { Value: manifestinfo.WorkerServiceType, Hint: "Events to SQS to ECS on Fargate", }, { Value: manifestinfo.StaticSiteType, Hint: "Internet to CDN to S3 bucket", }, }), gomock.Any()). Return(wantedSvcType, nil) m.mockStore.EXPECT().GetService(mockAppName, wantedSvcName).Return(nil, &config.ErrNoSuchService{}).Times(2) m.mockMftReader.EXPECT().ReadWorkloadManifest(wantedSvcName).Return(nil, &workspace.ErrFileNotExists{FileName: wantedSvcName}).Times(2) }, wantedErr: nil, }, "prompt for service type and error if the name is invalid": { inSvcType: "", inSvcName: badAppRunnerSvcName, setupMocks: func(m *initSvcMocks) { m.mockPrompt.EXPECT().SelectOption(gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any()). Return(appRunnerSvcType, nil) m.mockStore.EXPECT().GetService(mockAppName, badAppRunnerSvcName).Return(nil, &config.ErrNoSuchService{}) m.mockMftReader.EXPECT().ReadWorkloadManifest(badAppRunnerSvcName).Return(nil, &workspace.ErrFileNotExists{FileName: badAppRunnerSvcName}) }, wantedErr: fmt.Errorf("service name iamoverfortycharacterlongandaninvalidrdwsname is invalid: value must not exceed 40 characters"), }, "rdws prompt for ingress type": { inSvcType: appRunnerSvcType, inSvcName: wantedSvcName, inSvcPort: wantedSvcPort, inDockerfilePath: wantedDockerfilePath, setupMocks: func(m *initSvcMocks) { m.mockStore.EXPECT().GetService(mockAppName, wantedSvcName).Return(nil, &config.ErrNoSuchService{}) m.mockMftReader.EXPECT().ReadWorkloadManifest(wantedSvcName).Return(nil, &workspace.ErrFileNotExists{FileName: wantedSvcName}) m.mockPrompt.EXPECT().SelectOption(gomock.Eq(svcInitIngressTypePrompt), gomock.Any(), gomock.Eq([]prompt.Option{ { Value: "Environment", }, { Value: "Internet", }, }), gomock.Any()).Return("Environment", nil) }, }, "rdws prompt for ingress type error": { inSvcType: appRunnerSvcType, inSvcName: wantedSvcName, inSvcPort: wantedSvcPort, inDockerfilePath: wantedDockerfilePath, setupMocks: func(m *initSvcMocks) { m.mockStore.EXPECT().GetService(mockAppName, wantedSvcName).Return(nil, &config.ErrNoSuchService{}) m.mockPrompt.EXPECT().SelectOption(gomock.Eq(svcInitIngressTypePrompt), gomock.Any(), gomock.Eq([]prompt.Option{ { Value: "Environment", }, { Value: "Internet", }, }), gomock.Any()).Return("", errors.New("some error")) }, wantedErr: errors.New("select ingress type: some error"), }, "rdws skip ingress type prompt with flag": { inSvcType: appRunnerSvcType, inSvcName: wantedSvcName, inSvcPort: wantedSvcPort, inDockerfilePath: wantedDockerfilePath, inIngressType: ingressTypeInternet, setupMocks: func(m *initSvcMocks) { m.mockStore.EXPECT().GetService(mockAppName, wantedSvcName).Return(nil, &config.ErrNoSuchService{}) m.mockMftReader.EXPECT().ReadWorkloadManifest(wantedSvcName).Return(nil, &workspace.ErrFileNotExists{FileName: wantedSvcName}) }, }, "skip selecting Dockerfile if image flag is set": { inSvcType: wantedSvcType, inSvcName: wantedSvcName, inSvcPort: wantedSvcPort, inImage: "mockImage", inDockerfilePath: "", setupMocks: func(m *initSvcMocks) { m.mockStore.EXPECT().GetService(mockAppName, wantedSvcName).Return(nil, &config.ErrNoSuchService{}) m.mockMftReader.EXPECT().ReadWorkloadManifest(wantedSvcName).Return(nil, &workspace.ErrFileNotExists{FileName: wantedSvcName}) }, }, "return error if failed to check if docker engine is running": { inSvcType: wantedSvcType, inSvcName: wantedSvcName, inSvcPort: wantedSvcPort, setupMocks: func(m *initSvcMocks) { m.mockStore.EXPECT().GetService(mockAppName, wantedSvcName).Return(nil, &config.ErrNoSuchService{}) m.mockMftReader.EXPECT().ReadWorkloadManifest(wantedSvcName).Return(nil, &workspace.ErrFileNotExists{FileName: wantedSvcName}) m.mockDockerEngine.EXPECT().CheckDockerEngineRunning().Return(errors.New("some error")) }, wantedErr: fmt.Errorf("check if docker engine is running: some error"), }, "skip selecting Dockerfile if docker command is not found": { inSvcType: wantedSvcType, inSvcName: wantedSvcName, inSvcPort: wantedSvcPort, setupMocks: func(m *initSvcMocks) { m.mockStore.EXPECT().GetService(mockAppName, wantedSvcName).Return(nil, &config.ErrNoSuchService{}) m.mockMftReader.EXPECT().ReadWorkloadManifest(wantedSvcName).Return(nil, &workspace.ErrFileNotExists{FileName: wantedSvcName}) m.mockPrompt.EXPECT().Get(wkldInitImagePrompt, wkldInitImagePromptHelp, gomock.Any(), gomock.Any()). Return("mockImage", nil) m.mockDockerEngine.EXPECT().CheckDockerEngineRunning().Return(dockerengine.ErrDockerCommandNotFound) }, wantedErr: nil, }, "skip selecting Dockerfile if docker engine is not responsive": { inSvcType: wantedSvcType, inSvcName: wantedSvcName, inSvcPort: wantedSvcPort, setupMocks: func(m *initSvcMocks) { m.mockStore.EXPECT().GetService(mockAppName, wantedSvcName).Return(nil, &config.ErrNoSuchService{}) m.mockMftReader.EXPECT().ReadWorkloadManifest(wantedSvcName).Return(nil, &workspace.ErrFileNotExists{FileName: wantedSvcName}) m.mockPrompt.EXPECT().Get(wkldInitImagePrompt, wkldInitImagePromptHelp, gomock.Any(), gomock.Any()). Return("mockImage", nil) m.mockDockerEngine.EXPECT().CheckDockerEngineRunning().Return(&dockerengine.ErrDockerDaemonNotResponsive{}) }, wantedErr: nil, }, "returns an error if fail to get image location": { inSvcType: wantedSvcType, inSvcName: wantedSvcName, inSvcPort: wantedSvcPort, inDockerfilePath: "", setupMocks: func(m *initSvcMocks) { m.mockStore.EXPECT().GetService(mockAppName, wantedSvcName).Return(nil, &config.ErrNoSuchService{}) m.mockMftReader.EXPECT().ReadWorkloadManifest(wantedSvcName).Return(nil, &workspace.ErrFileNotExists{FileName: wantedSvcName}) m.mockPrompt.EXPECT().Get(wkldInitImagePrompt, wkldInitImagePromptHelp, gomock.Any(), gomock.Any()). Return("", mockError) m.mockSel.EXPECT().Dockerfile( gomock.Eq(fmt.Sprintf(fmtWkldInitDockerfilePrompt, wantedSvcName)), gomock.Eq(fmt.Sprintf(fmtWkldInitDockerfilePathPrompt, wantedSvcName)), gomock.Eq(wkldInitDockerfileHelpPrompt), gomock.Eq(wkldInitDockerfilePathHelpPrompt), gomock.Any(), ).Return("Use an existing image instead", nil) m.mockDockerEngine.EXPECT().CheckDockerEngineRunning().Return(nil) }, wantedErr: fmt.Errorf("get image location: mock error"), }, "using existing image": { inSvcType: wantedSvcType, inSvcName: wantedSvcName, inDockerfilePath: "", setupMocks: func(m *initSvcMocks) { m.mockStore.EXPECT().GetService(mockAppName, wantedSvcName).Return(nil, &config.ErrNoSuchService{}) m.mockMftReader.EXPECT().ReadWorkloadManifest(wantedSvcName).Return(nil, &workspace.ErrFileNotExists{FileName: wantedSvcName}) m.mockPrompt.EXPECT().Get(wkldInitImagePrompt, wkldInitImagePromptHelp, gomock.Any(), gomock.Any()). Return("mockImage", nil) m.mockPrompt.EXPECT().Get(gomock.Eq(fmt.Sprintf(svcInitSvcPortPrompt, "port(s)")), gomock.Any(), gomock.Any(), gomock.Any()). Return(defaultSvcPortString, nil) m.mockSel.EXPECT().Dockerfile( gomock.Eq(fmt.Sprintf(fmtWkldInitDockerfilePrompt, wantedSvcName)), gomock.Eq(fmt.Sprintf(fmtWkldInitDockerfilePathPrompt, wantedSvcName)), gomock.Eq(wkldInitDockerfileHelpPrompt), gomock.Eq(wkldInitDockerfilePathHelpPrompt), gomock.Any(), ).Return("Use an existing image instead", nil) m.mockDockerEngine.EXPECT().CheckDockerEngineRunning().Return(nil) }, }, "select Dockerfile": { inSvcType: wantedSvcType, inSvcName: wantedSvcName, inSvcPort: wantedSvcPort, inDockerfilePath: "", setupMocks: func(m *initSvcMocks) { m.mockStore.EXPECT().GetService(mockAppName, wantedSvcName).Return(nil, &config.ErrNoSuchService{}) m.mockMftReader.EXPECT().ReadWorkloadManifest(wantedSvcName).Return(nil, &workspace.ErrFileNotExists{FileName: wantedSvcName}) m.mockSel.EXPECT().Dockerfile( gomock.Eq(fmt.Sprintf(fmtWkldInitDockerfilePrompt, wantedSvcName)), gomock.Eq(fmt.Sprintf(fmtWkldInitDockerfilePathPrompt, wantedSvcName)), gomock.Eq(wkldInitDockerfileHelpPrompt), gomock.Eq(wkldInitDockerfilePathHelpPrompt), gomock.Any(), ).Return("frontend/Dockerfile", nil) m.mockDockerEngine.EXPECT().CheckDockerEngineRunning().Return(nil) }, wantedErr: nil, }, "returns an error if fail to get Dockerfile": { inSvcType: wantedSvcType, inSvcName: wantedSvcName, inSvcPort: wantedSvcPort, inDockerfilePath: "", setupMocks: func(m *initSvcMocks) { m.mockStore.EXPECT().GetService(mockAppName, wantedSvcName).Return(nil, &config.ErrNoSuchService{}) m.mockMftReader.EXPECT().ReadWorkloadManifest(wantedSvcName).Return(nil, &workspace.ErrFileNotExists{FileName: wantedSvcName}) m.mockSel.EXPECT().Dockerfile( gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any(), ).Return("", errors.New("some error")) m.mockDockerEngine.EXPECT().CheckDockerEngineRunning().Return(nil) }, wantedErr: fmt.Errorf("select Dockerfile: some error"), }, "skip asking for port for backend service": { inSvcType: "Backend Service", inSvcName: wantedSvcName, inDockerfilePath: wantedDockerfilePath, setupMocks: func(m *initSvcMocks) { m.mockStore.EXPECT().GetService(mockAppName, wantedSvcName).Return(nil, &config.ErrNoSuchService{}) m.mockMftReader.EXPECT().ReadWorkloadManifest(wantedSvcName).Return(nil, &workspace.ErrFileNotExists{FileName: wantedSvcName}) m.mockDockerfile.EXPECT().GetExposedPorts().Return(nil, errors.New("no expose")) }, wantedErr: nil, }, "asks for port if not specified": { inSvcType: wantedSvcType, inSvcName: wantedSvcName, inDockerfilePath: wantedDockerfilePath, setupMocks: func(m *initSvcMocks) { m.mockStore.EXPECT().GetService(mockAppName, wantedSvcName).Return(nil, &config.ErrNoSuchService{}) m.mockMftReader.EXPECT().ReadWorkloadManifest(wantedSvcName).Return(nil, &workspace.ErrFileNotExists{FileName: wantedSvcName}) m.mockPrompt.EXPECT().Get(gomock.Eq(fmt.Sprintf(svcInitSvcPortPrompt, "port(s)")), gomock.Any(), gomock.Any(), gomock.Any()). Return(defaultSvcPortString, nil) m.mockDockerfile.EXPECT().GetExposedPorts().Return(nil, errors.New("no expose")) }, wantedErr: nil, }, "errors if port not specified": { inSvcType: wantedSvcType, inSvcName: wantedSvcName, inDockerfilePath: wantedDockerfilePath, setupMocks: func(m *initSvcMocks) { m.mockStore.EXPECT().GetService(mockAppName, wantedSvcName).Return(nil, &config.ErrNoSuchService{}) m.mockMftReader.EXPECT().ReadWorkloadManifest(wantedSvcName).Return(nil, &workspace.ErrFileNotExists{FileName: wantedSvcName}) m.mockPrompt.EXPECT().Get(gomock.Eq(fmt.Sprintf(svcInitSvcPortPrompt, "port(s)")), gomock.Any(), gomock.Any(), gomock.Any()). Return("", errors.New("some error")) m.mockDockerfile.EXPECT().GetExposedPorts().Return(nil, errors.New("expose error")) }, wantedErr: fmt.Errorf("get port: some error"), }, "errors if port out of range": { inSvcType: wantedSvcType, inSvcName: wantedSvcName, inDockerfilePath: wantedDockerfilePath, setupMocks: func(m *initSvcMocks) { m.mockStore.EXPECT().GetService(mockAppName, wantedSvcName).Return(nil, &config.ErrNoSuchService{}) m.mockMftReader.EXPECT().ReadWorkloadManifest(wantedSvcName).Return(nil, &workspace.ErrFileNotExists{FileName: wantedSvcName}) m.mockPrompt.EXPECT().Get(gomock.Eq(fmt.Sprintf(svcInitSvcPortPrompt, "port(s)")), gomock.Any(), gomock.Any(), gomock.Any()). Return("100000", errors.New("some error")) m.mockDockerfile.EXPECT().GetExposedPorts().Return(nil, errors.New("no expose")) }, wantedErr: fmt.Errorf("get port: some error"), }, "don't ask if dockerfile has port": { inSvcType: wantedSvcType, inSvcName: wantedSvcName, inDockerfilePath: wantedDockerfilePath, setupMocks: func(m *initSvcMocks) { m.mockStore.EXPECT().GetService(mockAppName, wantedSvcName).Return(nil, &config.ErrNoSuchService{}) m.mockMftReader.EXPECT().ReadWorkloadManifest(wantedSvcName).Return(nil, &workspace.ErrFileNotExists{FileName: wantedSvcName}) m.mockDockerfile.EXPECT().GetExposedPorts().Return([]dockerfile.Port{{Port: 80, Protocol: "", RawString: "80"}}, nil) }, }, "don't use dockerfile port if flag specified": { inSvcType: wantedSvcType, inSvcName: wantedSvcName, inDockerfilePath: wantedDockerfilePath, inSvcPort: wantedSvcPort, setupMocks: func(m *initSvcMocks) { m.mockStore.EXPECT().GetService(mockAppName, wantedSvcName).Return(nil, &config.ErrNoSuchService{}) m.mockMftReader.EXPECT().ReadWorkloadManifest(wantedSvcName).Return(nil, &workspace.ErrFileNotExists{FileName: wantedSvcName}) }, }, "skip selecting subscriptions if no-subscriptions flag is set": { inSvcType: "Worker Service", inSvcName: wantedSvcName, inSvcPort: wantedSvcPort, inImage: "mockImage", inNoSubscribe: true, setupMocks: func(m *initSvcMocks) { m.mockStore.EXPECT().GetService(mockAppName, wantedSvcName).Return(nil, &config.ErrNoSuchService{}) m.mockMftReader.EXPECT().ReadWorkloadManifest(wantedSvcName).Return(nil, &workspace.ErrFileNotExists{FileName: wantedSvcName}) }, }, "skip selecting subscriptions if subscribe flag is set": { inSvcType: "Worker Service", inSvcName: wantedSvcName, inSvcPort: wantedSvcPort, inImage: "mockImage", inNoSubscribe: false, inSubscribeTags: []string{"svc:name"}, setupMocks: func(m *initSvcMocks) { m.mockStore.EXPECT().GetService(mockAppName, wantedSvcName).Return(nil, &config.ErrNoSuchService{}) m.mockMftReader.EXPECT().ReadWorkloadManifest(wantedSvcName).Return(nil, &workspace.ErrFileNotExists{FileName: wantedSvcName}) }, }, "select subscriptions": { inSvcType: "Worker Service", inSvcName: wantedSvcName, inSvcPort: wantedSvcPort, inImage: "mockImage", inDockerfilePath: "", setupMocks: func(m *initSvcMocks) { m.mockStore.EXPECT().GetService(mockAppName, wantedSvcName).Return(nil, &config.ErrNoSuchService{}) m.mockMftReader.EXPECT().ReadWorkloadManifest(wantedSvcName).Return(nil, &workspace.ErrFileNotExists{FileName: wantedSvcName}) m.mocktopicSel.EXPECT().Topics( gomock.Eq(svcInitPublisherPrompt), gomock.Eq(svcInitPublisherHelpPrompt), gomock.Any(), ).Return([]deploy.Topic{*mockTopic}, nil) }, }, "error if source for static site source not selected successfully": { inSvcType: manifestinfo.StaticSiteType, inSvcName: wantedSvcName, setupMocks: func(m *initSvcMocks) { m.mockStore.EXPECT().GetService(mockAppName, wantedSvcName).Return(nil, &config.ErrNoSuchService{}) m.mockMftReader.EXPECT().ReadWorkloadManifest(wantedSvcName).Return(nil, &workspace.ErrFileNotExists{FileName: wantedSvcName}) m.mockSourceSel.EXPECT().StaticSources(gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any()).Return(nil, mockError) }, wantedErr: fmt.Errorf("mock error"), }, "successfully ask for static site sources and convert to asset objects with dirs marked recursive": { inSvcType: manifestinfo.StaticSiteType, inSvcName: wantedSvcName, mockFileSystem: func(mockFS afero.Fs) { _ = mockFS.MkdirAll(filepath.Join(mockProjectRoot, mockDir), 0755) _ = afero.WriteFile(mockFS, filepath.Join(mockProjectRoot, mockFile), []byte("file guts"), 0644) }, setupMocks: func(m *initSvcMocks) { m.mockStore.EXPECT().GetService(mockAppName, wantedSvcName).Return(nil, &config.ErrNoSuchService{}) m.mockMftReader.EXPECT().ReadWorkloadManifest(wantedSvcName).Return(nil, &workspace.ErrFileNotExists{FileName: wantedSvcName}) m.mockSourceSel.EXPECT().StaticSources(gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any()).Return([]string{mockFile, mockDir}, nil) m.mockCachedWSRoot = mockProjectRoot }, wantedAssets: []manifest.FileUpload{ { Source: mockFile, Recursive: false, }, { Source: mockDir, Recursive: true, }, }, }, "ask for static site source paths rather than providing selector if workspace hasn't been created (`copilot init` workflow)": { inSvcType: manifestinfo.StaticSiteType, inSvcName: wantedSvcName, inWsPendingCreation: true, mockFileSystem: func(mockFS afero.Fs) { _ = mockFS.MkdirAll(mockDir, 0755) _ = afero.WriteFile(mockFS, mockFile, []byte("file guts"), 0644) }, setupMocks: func(m *initSvcMocks) { m.mockStore.EXPECT().GetService(mockAppName, wantedSvcName).Return(nil, &config.ErrNoSuchService{}) m.mockPrompt.EXPECT().Get(gomock.Eq("What is the path to the directory or file for frontend?"), gomock.Eq("Path to directory or file to use for building your static site."), gomock.Any(), gomock.Any()).Return(mockFile, nil) m.mockPrompt.EXPECT().Confirm(gomock.Eq("Would you like to enter another path?"), gomock.Eq("You may add multiple custom paths. Enter 'y' to type another."), gomock.Any()).Return(false, nil) }, wantedAssets: []manifest.FileUpload{ { Source: mockFile, Recursive: false, }, }, }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { // GIVEN ctrl := gomock.NewController(t) defer ctrl.Finish() m := initSvcMocks{ mockPrompt: mocks.NewMockprompter(ctrl), mockDockerfile: mocks.NewMockdockerfileParser(ctrl), mockSel: mocks.NewMockdockerfileSelector(ctrl), mocktopicSel: mocks.NewMocktopicSelector(ctrl), mockSourceSel: mocks.NewMockstaticSourceSelector(ctrl), mockDockerEngine: mocks.NewMockdockerEngine(ctrl), mockMftReader: mocks.NewMockmanifestReader(ctrl), mockStore: mocks.NewMockstore(ctrl), } if tc.setupMocks != nil { tc.setupMocks(&m) } opts := &initSvcOpts{ initSvcVars: initSvcVars{ initWkldVars: initWkldVars{ wkldType: tc.inSvcType, name: tc.inSvcName, image: tc.inImage, dockerfilePath: tc.inDockerfilePath, noSubscribe: tc.inNoSubscribe, subscriptions: tc.inSubscribeTags, appName: mockAppName, }, port: tc.inSvcPort, ingressType: tc.inIngressType, }, store: m.mockStore, fs: &afero.Afero{Fs: afero.NewMemMapFs()}, dockerfile: func(s string) dockerfileParser { return m.mockDockerfile }, df: m.mockDockerfile, prompt: m.mockPrompt, mftReader: m.mockMftReader, sel: m.mockSel, topicSel: m.mocktopicSel, sourceSel: m.mockSourceSel, dockerEngine: m.mockDockerEngine, wsPendingCreation: tc.inWsPendingCreation, wsRoot: m.mockCachedWSRoot, } if tc.mockFileSystem != nil { tc.mockFileSystem(opts.fs) } // WHEN err := opts.Ask() // THEN if tc.wantedErr != nil { require.EqualError(t, err, tc.wantedErr.Error()) } else { require.NoError(t, err) if opts.dockerfilePath != "" { require.Equal(t, wantedDockerfilePath, opts.dockerfilePath) } if opts.image != "" { require.Equal(t, wantedImage, opts.image) } if opts.staticAssets != nil { require.Equal(t, tc.wantedAssets, opts.staticAssets) } } }) } } func TestSvcInitOpts_Execute(t *testing.T) { mockEnvironmentManifest := []byte(`name: test type: Environment network: vpc: id: 'vpc-mockid' subnets: private: - id: 'subnet-1' - id: 'subnet-2' - id: 'subnet-3' - id: 'subnet-4'`) testCases := map[string]struct { mockSvcInit func(m *mocks.MocksvcInitializer) mockDockerfile func(m *mocks.MockdockerfileParser) mockDockerEngine func(m *mocks.MockdockerEngine) mockTopicSel func(m *mocks.MocktopicSelector) mockStore func(m *mocks.Mockstore) mockEnvDescriber func(m *mocks.MockenvDescriber) inSvcPort uint16 inSvcType string inSvcName string inDockerfilePath string inImage string inAppName string inManifestExists bool wantedErr error wantedManifestPath string }{ "success on typical svc props": { inAppName: "sample", inSvcName: "frontend", inDockerfilePath: "./Dockerfile", inSvcType: manifestinfo.LoadBalancedWebServiceType, inSvcPort: 80, mockSvcInit: func(m *mocks.MocksvcInitializer) { m.EXPECT().Service(&initialize.ServiceProps{ WorkloadProps: initialize.WorkloadProps{ App: "sample", Name: "frontend", Type: "Load Balanced Web Service", DockerfilePath: "./Dockerfile", Platform: manifest.PlatformArgsOrString{}, }, Port: 80, }).Return("manifest/path", nil) }, mockDockerfile: func(m *mocks.MockdockerfileParser) { m.EXPECT().GetHealthCheck().Return(nil, nil) }, mockDockerEngine: func(m *mocks.MockdockerEngine) { m.EXPECT().CheckDockerEngineRunning().Return(nil) m.EXPECT().GetPlatform().Return("linux", "amd64", nil) }, mockStore: func(m *mocks.Mockstore) { m.EXPECT().ListEnvironments("sample").Return(nil, nil) }, wantedManifestPath: "manifest/path", }, "backend service": { inAppName: "sample", inSvcName: "frontend", inDockerfilePath: "./Dockerfile", inSvcType: manifestinfo.BackendServiceType, mockSvcInit: func(m *mocks.MocksvcInitializer) { m.EXPECT().Service(&initialize.ServiceProps{ WorkloadProps: initialize.WorkloadProps{ App: "sample", Name: "frontend", Type: "Backend Service", DockerfilePath: "./Dockerfile", Platform: manifest.PlatformArgsOrString{}, }, }).Return("manifest/path", nil) }, mockDockerfile: func(m *mocks.MockdockerfileParser) { m.EXPECT().GetHealthCheck().Return(nil, nil) }, mockDockerEngine: func(m *mocks.MockdockerEngine) { m.EXPECT().CheckDockerEngineRunning().Return(nil) m.EXPECT().GetPlatform().Return("linux", "amd64", nil) }, mockStore: func(m *mocks.Mockstore) { m.EXPECT().ListEnvironments("sample").Return(nil, nil) }, wantedManifestPath: "manifest/path", }, "doesn't attempt to detect and populate the platform if manifest already exists": { inAppName: "sample", inSvcName: "frontend", inDockerfilePath: "./Dockerfile", inSvcType: manifestinfo.LoadBalancedWebServiceType, inSvcPort: 80, inManifestExists: true, mockDockerfile: func(m *mocks.MockdockerfileParser) { m.EXPECT().GetHealthCheck().Return(nil, nil) }, mockDockerEngine: func(m *mocks.MockdockerEngine) { m.EXPECT().CheckDockerEngineRunning().Times(0) m.EXPECT().GetPlatform().Times(0) }, mockSvcInit: func(m *mocks.MocksvcInitializer) { m.EXPECT().Service(&initialize.ServiceProps{ WorkloadProps: initialize.WorkloadProps{ App: "sample", Name: "frontend", Type: "Load Balanced Web Service", DockerfilePath: "./Dockerfile", }, Port: 80, }).Return("manifest/path", nil) }, mockStore: func(m *mocks.Mockstore) { m.EXPECT().ListEnvironments("sample").Return(nil, nil) }, wantedManifestPath: "manifest/path", }, "doesn't complain if docker is unavailable": { inAppName: "sample", inSvcName: "frontend", inDockerfilePath: "./Dockerfile", inSvcType: manifestinfo.LoadBalancedWebServiceType, inSvcPort: 80, mockDockerfile: func(m *mocks.MockdockerfileParser) { m.EXPECT().GetHealthCheck().Return(nil, nil) }, mockDockerEngine: func(m *mocks.MockdockerEngine) { m.EXPECT().CheckDockerEngineRunning().Return(&dockerengine.ErrDockerDaemonNotResponsive{}) m.EXPECT().GetPlatform().Times(0) }, mockSvcInit: func(m *mocks.MocksvcInitializer) { m.EXPECT().Service(&initialize.ServiceProps{ WorkloadProps: initialize.WorkloadProps{ App: "sample", Name: "frontend", Type: "Load Balanced Web Service", DockerfilePath: "./Dockerfile", }, Port: 80, }).Return("manifest/path", nil) }, mockStore: func(m *mocks.Mockstore) { m.EXPECT().ListEnvironments("sample").Return(nil, nil) }, wantedManifestPath: "manifest/path", }, "windows platform": { inAppName: "sample", inSvcName: "frontend", inDockerfilePath: "./Dockerfile", inSvcType: manifestinfo.LoadBalancedWebServiceType, inSvcPort: 80, mockSvcInit: func(m *mocks.MocksvcInitializer) { m.EXPECT().Service(&initialize.ServiceProps{ WorkloadProps: initialize.WorkloadProps{ App: "sample", Name: "frontend", Type: "Load Balanced Web Service", DockerfilePath: "./Dockerfile", Platform: manifest.PlatformArgsOrString{ PlatformString: (*manifest.PlatformString)(aws.String("windows/x86_64")), }, }, Port: 80, }).Return("manifest/path", nil) }, mockDockerfile: func(m *mocks.MockdockerfileParser) { m.EXPECT().GetHealthCheck().Return(nil, nil) }, mockDockerEngine: func(m *mocks.MockdockerEngine) { m.EXPECT().CheckDockerEngineRunning().Return(nil) m.EXPECT().GetPlatform().Return("windows", "amd64", nil) }, mockStore: func(m *mocks.Mockstore) { m.EXPECT().ListEnvironments("sample").Return(nil, nil) }, wantedManifestPath: "manifest/path", }, "ARM architecture redirects to X86_64": { inAppName: "sample", inSvcName: "frontend", inDockerfilePath: "./Dockerfile", inSvcType: manifestinfo.LoadBalancedWebServiceType, inSvcPort: 80, mockSvcInit: func(m *mocks.MocksvcInitializer) { m.EXPECT().Service(&initialize.ServiceProps{ WorkloadProps: initialize.WorkloadProps{ App: "sample", Name: "frontend", Type: "Load Balanced Web Service", DockerfilePath: "./Dockerfile", Platform: manifest.PlatformArgsOrString{ PlatformString: (*manifest.PlatformString)(aws.String("linux/x86_64")), }, }, Port: 80, }).Return("manifest/path", nil) }, mockDockerfile: func(m *mocks.MockdockerfileParser) { m.EXPECT().GetHealthCheck().Return(nil, nil) }, mockDockerEngine: func(m *mocks.MockdockerEngine) { m.EXPECT().CheckDockerEngineRunning().Return(nil) m.EXPECT().GetPlatform().Return("linux", "arm", nil) }, mockStore: func(m *mocks.Mockstore) { m.EXPECT().ListEnvironments("sample").Return(nil, nil) }, wantedManifestPath: "manifest/path", }, "worker service": { inAppName: "sample", inSvcName: "frontend", inDockerfilePath: "./Dockerfile", inSvcType: manifestinfo.WorkerServiceType, mockSvcInit: func(m *mocks.MocksvcInitializer) { m.EXPECT().Service(&initialize.ServiceProps{ WorkloadProps: initialize.WorkloadProps{ App: "sample", Name: "frontend", Type: "Worker Service", DockerfilePath: "./Dockerfile", Platform: manifest.PlatformArgsOrString{}, }, }).Return("manifest/path", nil) }, mockDockerfile: func(m *mocks.MockdockerfileParser) { m.EXPECT().GetHealthCheck().Return(nil, nil) }, mockDockerEngine: func(m *mocks.MockdockerEngine) { m.EXPECT().CheckDockerEngineRunning().Return(nil) m.EXPECT().GetPlatform().Return("linux", "amd64", nil) }, mockTopicSel: func(m *mocks.MocktopicSelector) { m.EXPECT().Topics( gomock.Eq(svcInitPublisherPrompt), gomock.Eq(svcInitPublisherHelpPrompt), gomock.Any(), ).Return([]manifest.TopicSubscription{ { Name: aws.String("thetopic"), Service: aws.String("theservice"), }, }, nil) }, mockStore: func(m *mocks.Mockstore) { m.EXPECT().ListEnvironments("sample").Return(nil, nil) }, wantedManifestPath: "manifest/path", }, "doesn't parse dockerfile if image specified (backend)": { inAppName: "sample", inSvcName: "backend", inDockerfilePath: "", inImage: "nginx:latest", inSvcType: manifestinfo.BackendServiceType, mockSvcInit: func(m *mocks.MocksvcInitializer) { m.EXPECT().Service(&initialize.ServiceProps{ WorkloadProps: initialize.WorkloadProps{ App: "sample", Name: "backend", Type: "Backend Service", Image: "nginx:latest", Platform: manifest.PlatformArgsOrString{}, }, }).Return("manifest/path", nil) }, mockDockerfile: func(m *mocks.MockdockerfileParser) {}, // Be sure that no dockerfile parsing happens. mockStore: func(m *mocks.Mockstore) { m.EXPECT().ListEnvironments("sample").Return(nil, nil) }, wantedManifestPath: "manifest/path", }, "doesn't parse dockerfile if image specified (lb-web)": { inAppName: "sample", inSvcName: "frontend", inDockerfilePath: "", inImage: "nginx:latest", inSvcType: manifestinfo.LoadBalancedWebServiceType, mockSvcInit: func(m *mocks.MocksvcInitializer) { m.EXPECT().Service(&initialize.ServiceProps{ WorkloadProps: initialize.WorkloadProps{ App: "sample", Name: "frontend", Type: "Load Balanced Web Service", Image: "nginx:latest", Platform: manifest.PlatformArgsOrString{}, }, }).Return("manifest/path", nil) }, mockDockerfile: func(m *mocks.MockdockerfileParser) {}, // Be sure that no dockerfile parsing happens. mockStore: func(m *mocks.Mockstore) { m.EXPECT().ListEnvironments("sample").Return(nil, nil) }, wantedManifestPath: "manifest/path", }, "return error if platform detection fails": { mockDockerEngine: func(m *mocks.MockdockerEngine) { m.EXPECT().CheckDockerEngineRunning().Return(nil) m.EXPECT().GetPlatform().Return("", "", errors.New("some error")) }, wantedErr: errors.New("get docker engine platform: some error"), }, "return error if Windows platform attempted with RDWS": { inAppName: "sample", inSvcName: "appRunner", inDockerfilePath: "./Dockerfile", inSvcType: manifestinfo.RequestDrivenWebServiceType, inSvcPort: 80, mockDockerfile: func(m *mocks.MockdockerfileParser) { m.EXPECT().GetHealthCheck().Return(nil, nil) }, mockDockerEngine: func(m *mocks.MockdockerEngine) { m.EXPECT().CheckDockerEngineRunning().Return(nil) m.EXPECT().GetPlatform().Return("windows", "amd64", nil) }, wantedErr: errors.New("redirect docker engine platform: Windows is not supported for App Runner services"), }, "failure": { mockDockerEngine: func(m *mocks.MockdockerEngine) { m.EXPECT().CheckDockerEngineRunning().Return(nil) m.EXPECT().GetPlatform().Return("linux", "amd64", nil) }, mockStore: func(m *mocks.Mockstore) { m.EXPECT().ListEnvironments("").Return(nil, errors.New("some error")) }, wantedErr: errors.New("list environments for application : some error"), }, "initalize a service in environments with only private subnets": { inAppName: "sample", inSvcName: "frontend", inDockerfilePath: "./Dockerfile", inSvcType: manifestinfo.LoadBalancedWebServiceType, inSvcPort: 80, mockSvcInit: func(m *mocks.MocksvcInitializer) { m.EXPECT().Service(&initialize.ServiceProps{ WorkloadProps: initialize.WorkloadProps{ App: "sample", Name: "frontend", Type: "Load Balanced Web Service", DockerfilePath: "./Dockerfile", Platform: manifest.PlatformArgsOrString{}, PrivateOnlyEnvironments: []string{ "test", }, }, Port: 80, }).Return("manifest/path", nil) }, mockDockerfile: func(m *mocks.MockdockerfileParser) { m.EXPECT().GetHealthCheck().Return(nil, nil) }, mockDockerEngine: func(m *mocks.MockdockerEngine) { m.EXPECT().CheckDockerEngineRunning().Return(nil) m.EXPECT().GetPlatform().Return("linux", "amd64", nil) }, mockStore: func(m *mocks.Mockstore) { m.EXPECT().ListEnvironments("sample").Return([]*config.Environment{ { App: "sample", Name: "test", }, }, nil) }, mockEnvDescriber: func(m *mocks.MockenvDescriber) { m.EXPECT().Manifest().Return(mockEnvironmentManifest, nil) }, wantedManifestPath: "manifest/path", }, "error if fail to read the manifest": { inAppName: "sample", inSvcName: "frontend", inDockerfilePath: "./Dockerfile", inSvcType: manifestinfo.LoadBalancedWebServiceType, inSvcPort: 80, mockDockerfile: func(m *mocks.MockdockerfileParser) { m.EXPECT().GetHealthCheck().Return(nil, nil) }, mockDockerEngine: func(m *mocks.MockdockerEngine) { m.EXPECT().CheckDockerEngineRunning().Return(nil) m.EXPECT().GetPlatform().Return("linux", "amd64", nil) }, mockStore: func(m *mocks.Mockstore) { m.EXPECT().ListEnvironments("sample").Return([]*config.Environment{ { App: "sample", Name: "test", }, }, nil) }, mockEnvDescriber: func(m *mocks.MockenvDescriber) { m.EXPECT().Manifest().Return(nil, errors.New("failed to read manifest")) }, wantedErr: errors.New("read the manifest used to deploy environment test: failed to read manifest"), }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { // GIVEN ctrl := gomock.NewController(t) defer ctrl.Finish() mockSvcInitializer := mocks.NewMocksvcInitializer(ctrl) mockDockerfile := mocks.NewMockdockerfileParser(ctrl) mockDockerEngine := mocks.NewMockdockerEngine(ctrl) mockTopicSel := mocks.NewMocktopicSelector(ctrl) mockStore := mocks.NewMockstore(ctrl) mockEnvDescriber := mocks.NewMockenvDescriber(ctrl) if tc.mockStore != nil { tc.mockStore(mockStore) } if tc.mockSvcInit != nil { tc.mockSvcInit(mockSvcInitializer) } if tc.mockDockerfile != nil { tc.mockDockerfile(mockDockerfile) } if tc.mockDockerEngine != nil { tc.mockDockerEngine(mockDockerEngine) } if tc.mockEnvDescriber != nil { tc.mockEnvDescriber(mockEnvDescriber) } opts := initSvcOpts{ initSvcVars: initSvcVars{ initWkldVars: initWkldVars{ appName: tc.inAppName, name: tc.inSvcName, wkldType: tc.inSvcType, dockerfilePath: tc.inDockerfilePath, image: tc.inImage, allowAppDowngrade: true, }, port: tc.inSvcPort, }, init: mockSvcInitializer, dockerfile: func(s string) dockerfileParser { return mockDockerfile }, df: mockDockerfile, dockerEngine: mockDockerEngine, store: mockStore, topicSel: mockTopicSel, manifestExists: tc.inManifestExists, initEnvDescriber: func(string, string) (envDescriber, error) { return mockEnvDescriber, nil }, } // WHEN err := opts.Execute() // THEN if tc.wantedErr == nil { require.NoError(t, err) require.Equal(t, tc.wantedManifestPath, opts.manifestPath) } else { require.EqualError(t, err, tc.wantedErr.Error()) } }) } }
1,396
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package cli import ( "fmt" "os" "github.com/aws/aws-sdk-go/aws" "github.com/aws/aws-sdk-go/service/ssm" "github.com/aws/copilot-cli/internal/pkg/aws/identity" "github.com/aws/copilot-cli/internal/pkg/aws/sessions" "github.com/spf13/afero" "github.com/aws/copilot-cli/internal/pkg/cli/list" "github.com/aws/copilot-cli/internal/pkg/config" "github.com/aws/copilot-cli/internal/pkg/term/prompt" "github.com/aws/copilot-cli/internal/pkg/term/selector" "github.com/aws/copilot-cli/internal/pkg/workspace" "github.com/spf13/cobra" ) type listWkldVars struct { appName string shouldOutputJSON bool shouldShowLocalWorkloads bool } type listSvcOpts struct { listWkldVars // Interfaces to dependencies. sel appSelector list workloadListWriter } func newListSvcOpts(vars listWkldVars) (*listSvcOpts, error) { ws, err := workspace.Use(afero.NewOsFs()) if err != nil { return nil, err } sess, err := sessions.ImmutableProvider(sessions.UserAgentExtras("svc ls")).Default() if err != nil { return nil, fmt.Errorf("default session: %v", err) } store := config.NewSSMStore(identity.New(sess), ssm.New(sess), aws.StringValue(sess.Config.Region)) svcLister := &list.SvcListWriter{ Ws: ws, Store: store, Out: os.Stdout, ShowLocalSvcs: vars.shouldShowLocalWorkloads, OutputJSON: vars.shouldOutputJSON, } return &listSvcOpts{ listWkldVars: vars, list: svcLister, sel: selector.NewAppEnvSelector(prompt.New(), store), }, nil } // Validate is a no-op for this command. func (o *listSvcOpts) Validate() error { return nil } // Ask prompts for and validates any required flags. func (o *listSvcOpts) Ask() error { if o.appName != "" { // NOTE: Skip validating app name here because `Execute` will fail pretty soon with a clear error message. // The validation (config.GetApplication) would only add additional operation time in this particular case. return nil } name, err := o.sel.Application(svcAppNamePrompt, wkldAppNameHelpPrompt) if err != nil { return fmt.Errorf("select application name: %w", err) } o.appName = name return nil } // Execute lists the services through the prompt. func (o *listSvcOpts) Execute() error { if err := o.list.Write(o.appName); err != nil { return err } return nil } // buildSvcListCmd builds the command for listing services in an appication. func buildSvcListCmd() *cobra.Command { vars := listWkldVars{} cmd := &cobra.Command{ Use: "ls", Short: "Lists all the services in an application.", Example: ` Lists all the services for the "myapp" application. /code $ copilot svc ls --app myapp`, RunE: runCmdE(func(cmd *cobra.Command, args []string) error { opts, err := newListSvcOpts(vars) if err != nil { return err } if err := opts.Ask(); err != nil { return err } return opts.Execute() }), } cmd.Flags().StringVarP(&vars.appName, appFlag, appFlagShort, tryReadingAppName(), appFlagDescription) cmd.Flags().BoolVar(&vars.shouldOutputJSON, jsonFlag, false, jsonFlagDescription) cmd.Flags().BoolVar(&vars.shouldShowLocalWorkloads, localFlag, false, localSvcFlagDescription) return cmd }
122
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package cli import ( "fmt" "testing" "github.com/aws/copilot-cli/internal/pkg/cli/mocks" "github.com/golang/mock/gomock" "github.com/stretchr/testify/require" ) func TestListSvcOpts_Execute(t *testing.T) { ctrl := gomock.NewController(t) mockError := fmt.Errorf("error") mockLister := mocks.NewMockworkloadListWriter(ctrl) defer ctrl.Finish() testCases := map[string]struct { opts listSvcOpts mocking func() expectedErr error }{ "with successful call to list.Services": { opts: listSvcOpts{ listWkldVars: listWkldVars{ shouldOutputJSON: true, appName: "coolapp", }, list: mockLister, }, mocking: func() { mockLister.EXPECT(). Write("coolapp"). Return(nil) }, }, "with failed call to list.Services": { opts: listSvcOpts{ listWkldVars: listWkldVars{ appName: "coolapp", }, list: mockLister, }, mocking: func() { mockLister.EXPECT(). Write(gomock.Eq("coolapp")). Return(mockError) }, expectedErr: fmt.Errorf("error"), }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { tc.mocking() err := tc.opts.Execute() if tc.expectedErr != nil { require.EqualError(t, tc.expectedErr, err.Error()) } else { require.NoError(t, err) } }) } } func TestListSvcOpts_Ask(t *testing.T) { testCases := map[string]struct { inApp string mockSel func(m *mocks.MockappSelector) wantedApp string }{ "with no flags set": { mockSel: func(m *mocks.MockappSelector) { m.EXPECT().Application(svcAppNamePrompt, wkldAppNameHelpPrompt).Return("myapp", nil) }, wantedApp: "myapp", }, "with app flag set": { mockSel: func(m *mocks.MockappSelector) { m.EXPECT().Application(gomock.Any(), gomock.Any()).Times(0) }, inApp: "myapp", wantedApp: "myapp", }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { ctrl := gomock.NewController(t) defer ctrl.Finish() mockSel := mocks.NewMockappSelector(ctrl) tc.mockSel(mockSel) listApps := &listSvcOpts{ listWkldVars: listWkldVars{ appName: tc.inApp, }, sel: mockSel, } err := listApps.Ask() require.NoError(t, err) require.Equal(t, tc.wantedApp, listApps.appName, "expected application names to match") }) } }
114
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package cli import ( "errors" "fmt" "io" "sort" "time" awsecs "github.com/aws/copilot-cli/internal/pkg/aws/ecs" "github.com/aws/copilot-cli/internal/pkg/manifest/manifestinfo" "github.com/aws/aws-sdk-go/service/ssm" "github.com/aws/copilot-cli/internal/pkg/aws/identity" "github.com/aws/aws-sdk-go/aws" "github.com/aws/copilot-cli/internal/pkg/aws/sessions" "github.com/aws/copilot-cli/internal/pkg/config" "github.com/aws/copilot-cli/internal/pkg/deploy" "github.com/aws/copilot-cli/internal/pkg/ecs" "github.com/aws/copilot-cli/internal/pkg/logging" "github.com/aws/copilot-cli/internal/pkg/term/log" "github.com/aws/copilot-cli/internal/pkg/term/prompt" "github.com/aws/copilot-cli/internal/pkg/term/selector" "github.com/spf13/cobra" ) const ( svcLogNamePrompt = "Which service's logs would you like to show?" svcLogNameHelpPrompt = "The logs of the indicated deployed service will be shown." cwGetLogEventsLimitMin = 1 cwGetLogEventsLimitMax = 10000 ) var ( noPreviousTasksErr = errors.New("no previously stopped tasks found") ) type wkldLogsVars struct { shouldOutputJSON bool follow bool limit int name string envName string appName string humanStartTime string humanEndTime string taskIDs []string since time.Duration } type svcLogsVars struct { wkldLogsVars logGroup string containerName string previous bool } type svcLogsOpts struct { svcLogsVars wkldLogOpts // Cached variables. targetEnv *config.Environment targetSvcType string } type wkldLogOpts struct { // Internal states. startTime *int64 endTime *int64 // Dependencies. w io.Writer configStore store sessProvider sessionProvider deployStore deployedEnvironmentLister sel deploySelector logsSvc logEventsWriter ecs serviceDescriber initRuntimeClients func() error // Overridden in tests. } func newSvcLogOpts(vars svcLogsVars) (*svcLogsOpts, error) { sessProvider := sessions.ImmutableProvider(sessions.UserAgentExtras("svc logs")) defaultSess, err := sessProvider.Default() if err != nil { return nil, fmt.Errorf("default session: %v", err) } configStore := config.NewSSMStore(identity.New(defaultSess), ssm.New(defaultSess), aws.StringValue(defaultSess.Config.Region)) deployStore, err := deploy.NewStore(sessProvider, configStore) if err != nil { return nil, fmt.Errorf("connect to deploy store: %w", err) } opts := &svcLogsOpts{ svcLogsVars: vars, wkldLogOpts: wkldLogOpts{ w: log.OutputWriter, configStore: configStore, deployStore: deployStore, sel: selector.NewDeploySelect(prompt.New(), configStore, deployStore), }, } opts.initRuntimeClients = func() error { env, err := opts.getTargetEnv() if err != nil { return fmt.Errorf("get environment: %w", err) } sess, err := sessProvider.FromRole(env.ManagerRoleARN, env.Region) if err != nil { return err } opts.ecs = ecs.New(sess) newWorkloadLoggerOpts := &logging.NewWorkloadLoggerOpts{ App: opts.appName, Env: opts.envName, Name: opts.name, Sess: sess, } if opts.targetSvcType != manifestinfo.RequestDrivenWebServiceType { opts.logsSvc = logging.NewECSServiceClient(newWorkloadLoggerOpts) return nil } opts.logsSvc, err = logging.NewAppRunnerServiceLogger(&logging.NewAppRunnerServiceLoggerOpts{ NewWorkloadLoggerOpts: newWorkloadLoggerOpts, ConfigStore: opts.configStore, }) if err != nil { return err } return nil } return opts, nil } // Validate returns an error for any invalid optional flags. func (o *svcLogsOpts) Validate() error { if o.since != 0 && o.humanStartTime != "" { return errors.New("only one of --since or --start-time may be used") } if o.humanEndTime != "" && o.follow { return errors.New("only one of --follow or --end-time may be used") } if o.since != 0 { if o.since < 0 { return fmt.Errorf("--since must be greater than 0") } // round up to the nearest second o.startTime = parseSince(o.since) } if o.humanStartTime != "" { startTime, err := parseRFC3339(o.humanStartTime) if err != nil { return fmt.Errorf(`invalid argument %s for "--start-time" flag: %w`, o.humanStartTime, err) } o.startTime = aws.Int64(startTime) } if o.humanEndTime != "" { endTime, err := parseRFC3339(o.humanEndTime) if err != nil { return fmt.Errorf(`invalid argument %s for "--end-time" flag: %w`, o.humanEndTime, err) } o.endTime = aws.Int64(endTime) } if o.limit != 0 && (o.limit < cwGetLogEventsLimitMin || o.limit > cwGetLogEventsLimitMax) { return fmt.Errorf("--limit %d is out-of-bounds, value must be between %d and %d", o.limit, cwGetLogEventsLimitMin, cwGetLogEventsLimitMax) } if o.previous { if err := o.validatePrevious(); err != nil { return err } } return nil } // Ask prompts for and validates any required flags. func (o *svcLogsOpts) Ask() error { if err := o.validateOrAskApp(); err != nil { return err } return o.validateAndAskSvcEnvName() } // Execute outputs logs of the service. func (o *svcLogsOpts) Execute() error { if err := o.initRuntimeClients(); err != nil { return err } eventsWriter := logging.WriteHumanLogs if o.shouldOutputJSON { eventsWriter = logging.WriteJSONLogs } var limit *int64 if o.limit != 0 { limit = aws.Int64(int64(o.limit)) } if o.previous { taskID, err := o.latestStoppedTaskID() if err != nil { if errors.Is(err, noPreviousTasksErr) { log.Warningln("no previously stopped tasks found") return nil // return nil as we have no stopped tasks. } return err } o.taskIDs = []string{taskID} log.Infoln("previously stopped task:", taskID) } err := o.logsSvc.WriteLogEvents(logging.WriteLogEventsOpts{ Follow: o.follow, Limit: limit, EndTime: o.endTime, StartTime: o.startTime, TaskIDs: o.taskIDs, OnEvents: eventsWriter, ContainerName: o.containerName, LogGroup: o.logGroup, }) if err != nil { return fmt.Errorf("write log events for service %s: %w", o.name, err) } return nil } func (o *svcLogsOpts) latestStoppedTaskID() (string, error) { svcDesc, err := o.ecs.DescribeService(o.appName, o.envName, o.name) if err != nil { return "", fmt.Errorf("describe service %s: %w", o.name, err) } if len(svcDesc.StoppedTasks) > 0 { sort.Slice(svcDesc.StoppedTasks, func(i, j int) bool { return svcDesc.StoppedTasks[i].StoppingAt.After(aws.TimeValue(svcDesc.StoppedTasks[j].StoppingAt)) }) taskID, err := awsecs.TaskID(aws.StringValue(svcDesc.StoppedTasks[0].TaskArn)) if err != nil { return "", err } return taskID, nil } return "", noPreviousTasksErr } func (o *svcLogsOpts) validateOrAskApp() error { if o.appName != "" { _, err := o.configStore.GetApplication(o.appName) return err } app, err := o.sel.Application(svcAppNamePrompt, wkldAppNameHelpPrompt) if err != nil { return fmt.Errorf("select application: %w", err) } o.appName = app return nil } func (o *svcLogsOpts) validateAndAskSvcEnvName() error { if o.envName != "" { if _, err := o.getTargetEnv(); err != nil { return err } } if o.name != "" { if _, err := o.configStore.GetService(o.appName, o.name); err != nil { return err } } // Note: we let prompter handle the case when there is only option for user to choose from. // This is naturally the case when `o.envName != "" && o.name != ""`. deployedService, err := o.sel.DeployedService(svcLogNamePrompt, svcLogNameHelpPrompt, o.appName, selector.WithEnv(o.envName), selector.WithName(o.name)) if err != nil { return fmt.Errorf("select deployed services for application %s: %w", o.appName, err) } if deployedService.SvcType == manifestinfo.RequestDrivenWebServiceType && len(o.taskIDs) != 0 { return fmt.Errorf("cannot use `--tasks` for App Runner service logs") } if deployedService.SvcType == manifestinfo.StaticSiteType { return fmt.Errorf("`svc logs` unavailable for Static Site services") } o.name = deployedService.Name o.envName = deployedService.Env o.targetSvcType = deployedService.SvcType return nil } func (o *svcLogsOpts) validatePrevious() error { if o.previous && len(o.taskIDs) != 0 { return fmt.Errorf("cannot specify both --%s and --%s", previousFlag, tasksFlag) } return nil } func (o *svcLogsOpts) getTargetEnv() (*config.Environment, error) { if o.targetEnv != nil { return o.targetEnv, nil } env, err := o.configStore.GetEnvironment(o.appName, o.envName) if err != nil { return nil, err } o.targetEnv = env return o.targetEnv, nil } func parseSince(since time.Duration) *int64 { sinceSec := int64(since.Round(time.Second).Seconds()) timeNow := time.Now().Add(time.Duration(-sinceSec) * time.Second) return aws.Int64(timeNow.UnixMilli()) } func parseRFC3339(timeStr string) (int64, error) { startTimeTmp, err := time.Parse(time.RFC3339, timeStr) if err != nil { return 0, fmt.Errorf("reading time value %s: %w", timeStr, err) } return startTimeTmp.UnixMilli(), nil } // buildSvcLogsCmd builds the command for displaying service logs in an application. func buildSvcLogsCmd() *cobra.Command { vars := svcLogsVars{} cmd := &cobra.Command{ Use: "logs", Short: "Displays logs of a deployed service.", Example: ` Displays logs of the service "my-svc" in environment "test". /code $ copilot svc logs -n my-svc -e test Displays logs in the last hour. /code $ copilot svc logs --since 1h Displays logs from 2006-01-02T15:04:05 to 2006-01-02T15:05:05. /code $ copilot svc logs --start-time 2006-01-02T15:04:05+00:00 --end-time 2006-01-02T15:05:05+00:00 Displays logs from specific task IDs. /code $ copilot svc logs --tasks 709c7eae05f947f6861b150372ddc443,1de57fd63c6a4920ac416d02add891b9 Displays logs in real time. /code $ copilot svc logs --follow Display logs from specific log group. /code $ copilot svc logs --log-group system`, RunE: runCmdE(func(cmd *cobra.Command, args []string) error { opts, err := newSvcLogOpts(vars) if err != nil { return err } return run(opts) }), } cmd.Flags().StringVarP(&vars.name, nameFlag, nameFlagShort, "", svcFlagDescription) cmd.Flags().StringVarP(&vars.envName, envFlag, envFlagShort, "", envFlagDescription) cmd.Flags().StringVarP(&vars.appName, appFlag, appFlagShort, tryReadingAppName(), appFlagDescription) cmd.Flags().StringVar(&vars.humanStartTime, startTimeFlag, "", startTimeFlagDescription) cmd.Flags().StringVar(&vars.humanEndTime, endTimeFlag, "", endTimeFlagDescription) cmd.Flags().BoolVar(&vars.shouldOutputJSON, jsonFlag, false, jsonFlagDescription) cmd.Flags().BoolVar(&vars.follow, followFlag, false, followFlagDescription) cmd.Flags().DurationVar(&vars.since, sinceFlag, 0, sinceFlagDescription) cmd.Flags().IntVar(&vars.limit, limitFlag, 0, limitFlagDescription) cmd.Flags().StringSliceVar(&vars.taskIDs, tasksFlag, nil, tasksLogsFlagDescription) cmd.Flags().StringVar(&vars.logGroup, logGroupFlag, "", logGroupFlagDescription) cmd.Flags().BoolVarP(&vars.previous, previousFlag, previousFlagShort, false, previousFlagDescription) cmd.Flags().StringVar(&vars.containerName, containerLogFlag, "", containerLogFlagDescription) return cmd }
377
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package cli import ( "errors" "fmt" "testing" "time" "github.com/aws/aws-sdk-go/aws" awsecs "github.com/aws/copilot-cli/internal/pkg/aws/ecs" "github.com/aws/copilot-cli/internal/pkg/ecs" "github.com/aws/copilot-cli/internal/pkg/manifest/manifestinfo" "github.com/aws/copilot-cli/internal/pkg/cli/mocks" "github.com/aws/copilot-cli/internal/pkg/config" "github.com/aws/copilot-cli/internal/pkg/logging" "github.com/aws/copilot-cli/internal/pkg/term/selector" "github.com/golang/mock/gomock" "github.com/stretchr/testify/require" ) type wkldLogsMock struct { configStore *mocks.Mockstore sel *mocks.MockdeploySelector sessProvider *mocks.MocksessionProvider ecs *mocks.MockserviceDescriber logSvcWriter *mocks.MocklogEventsWriter } func TestSvcLogs_Validate(t *testing.T) { const ( mockSince = 1 * time.Minute mockStartTime = "1970-01-01T01:01:01+00:00" mockBadStartTime = "badStartTime" mockEndTime = "1971-01-01T01:01:01+00:00" mockBadEndTime = "badEndTime" ) testCases := map[string]struct { inputApp string inputSvc string inputLimit int inputFollow bool inputEnvName string inputStartTime string inputEndTime string inputSince time.Duration inputPrevious bool inputTaskIDs []string mockstore func(m *mocks.Mockstore) wantedError error }{ "with no flag set": { mockstore: func(m *mocks.Mockstore) {}, }, "returns error if since and startTime flags are set together": { inputSince: mockSince, inputStartTime: mockStartTime, mockstore: func(m *mocks.Mockstore) {}, wantedError: fmt.Errorf("only one of --since or --start-time may be used"), }, "returns error if follow and endTime flags are set together": { inputFollow: true, inputEndTime: mockEndTime, mockstore: func(m *mocks.Mockstore) {}, wantedError: fmt.Errorf("only one of --follow or --end-time may be used"), }, "returns error if invalid start time flag value": { inputStartTime: mockBadStartTime, mockstore: func(m *mocks.Mockstore) {}, wantedError: fmt.Errorf("invalid argument badStartTime for \"--start-time\" flag: reading time value badStartTime: parsing time \"badStartTime\" as \"2006-01-02T15:04:05Z07:00\": cannot parse \"badStartTime\" as \"2006\""), }, "returns error if invalid end time flag value": { inputEndTime: mockBadEndTime, mockstore: func(m *mocks.Mockstore) {}, wantedError: fmt.Errorf("invalid argument badEndTime for \"--end-time\" flag: reading time value badEndTime: parsing time \"badEndTime\" as \"2006-01-02T15:04:05Z07:00\": cannot parse \"badEndTime\" as \"2006\""), }, "returns error if invalid since flag value": { inputSince: -mockSince, mockstore: func(m *mocks.Mockstore) {}, wantedError: fmt.Errorf("--since must be greater than 0"), }, "returns error if limit value is below limit": { inputLimit: -1, mockstore: func(m *mocks.Mockstore) {}, wantedError: fmt.Errorf("--limit -1 is out-of-bounds, value must be between 1 and 10000"), }, "returns error if limit value is above limit": { inputLimit: 10001, mockstore: func(m *mocks.Mockstore) {}, wantedError: fmt.Errorf("--limit 10001 is out-of-bounds, value must be between 1 and 10000"), }, "returns error if both previous and tasks flags are defined": { inputPrevious: true, inputTaskIDs: []string{"taskId"}, mockstore: func(m *mocks.Mockstore) {}, wantedError: fmt.Errorf("cannot specify both --previous and --tasks"), }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { ctrl := gomock.NewController(t) defer ctrl.Finish() mockstore := mocks.NewMockstore(ctrl) tc.mockstore(mockstore) svcLogs := &svcLogsOpts{ svcLogsVars: svcLogsVars{ wkldLogsVars: wkldLogsVars{ follow: tc.inputFollow, limit: tc.inputLimit, envName: tc.inputEnvName, humanStartTime: tc.inputStartTime, humanEndTime: tc.inputEndTime, since: tc.inputSince, name: tc.inputSvc, appName: tc.inputApp, taskIDs: tc.inputTaskIDs, }, previous: tc.inputPrevious, }, wkldLogOpts: wkldLogOpts{ configStore: mockstore, }, } // WHEN err := svcLogs.Validate() // THEN if tc.wantedError != nil { require.EqualError(t, err, tc.wantedError.Error()) } else { require.NoError(t, err) } }) } } func TestSvcLogs_Ask(t *testing.T) { const ( inputApp = "my-app" inputEnv = "my-env" inputSvc = "my-svc" ) testCases := map[string]struct { inputApp string inputSvc string inputEnvName string inputTaskIDs []string setupMocks func(mocks wkldLogsMock) wantedApp string wantedEnv string wantedSvc string wantedError error }{ "validate app env and svc with all flags passed in": { inputApp: inputApp, inputSvc: inputSvc, inputEnvName: inputEnv, setupMocks: func(m wkldLogsMock) { gomock.InOrder( m.configStore.EXPECT().GetApplication("my-app").Return(&config.Application{Name: "my-app"}, nil), m.configStore.EXPECT().GetEnvironment("my-app", "my-env").Return(&config.Environment{Name: "my-env"}, nil), m.configStore.EXPECT().GetService("my-app", "my-svc").Return(&config.Workload{}, nil), m.sel.EXPECT().DeployedService(svcLogNamePrompt, svcLogNameHelpPrompt, "my-app", gomock.Any(), gomock.Any()). Return(&selector.DeployedService{ Env: "my-env", Name: "my-svc", }, nil), // Let prompter handles the case when svc(env) is definite. ) }, wantedApp: inputApp, wantedEnv: inputEnv, wantedSvc: inputSvc, }, "return error if name of Static Site passed in": { inputApp: inputApp, inputSvc: inputSvc, inputEnvName: inputEnv, setupMocks: func(m wkldLogsMock) { gomock.InOrder( m.configStore.EXPECT().GetApplication("my-app").Return(&config.Application{Name: "my-app"}, nil), m.configStore.EXPECT().GetEnvironment("my-app", "my-env").Return(&config.Environment{Name: "my-env"}, nil), m.configStore.EXPECT().GetService("my-app", "my-svc").Return( &config.Workload{ Type: manifestinfo.StaticSiteType, }, nil)) m.sel.EXPECT().DeployedService(gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any()).Return(&selector.DeployedService{ Env: "my-env", Name: "my-svc", SvcType: manifestinfo.StaticSiteType, }, nil) }, wantedError: errors.New("`svc logs` unavailable for Static Site services"), }, "prompt for app name": { inputSvc: inputSvc, inputEnvName: inputEnv, setupMocks: func(m wkldLogsMock) { m.sel.EXPECT().Application(svcAppNamePrompt, wkldAppNameHelpPrompt).Return("my-app", nil) m.configStore.EXPECT().GetApplication(gomock.Any()).Times(0) m.configStore.EXPECT().GetEnvironment(gomock.Any(), gomock.Any()).AnyTimes() m.configStore.EXPECT().GetService(gomock.Any(), gomock.Any()).AnyTimes() m.sel.EXPECT().DeployedService(gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any()).Return(&selector.DeployedService{ Env: "my-env", Name: "my-svc", SvcType: manifestinfo.BackendServiceType, }, nil).AnyTimes() }, wantedApp: inputApp, wantedEnv: inputEnv, wantedSvc: inputSvc, }, "returns error if fail to select app": { setupMocks: func(m wkldLogsMock) { gomock.InOrder( m.sel.EXPECT().Application(svcAppNamePrompt, wkldAppNameHelpPrompt).Return("", errors.New("some error")), ) }, wantedError: fmt.Errorf("select application: some error"), }, "prompt for svc and env": { inputApp: "my-app", setupMocks: func(m wkldLogsMock) { m.configStore.EXPECT().GetApplication(gomock.Any()).AnyTimes() m.configStore.EXPECT().GetEnvironment(gomock.Any(), gomock.Any()).Times(0) m.configStore.EXPECT().GetService(gomock.Any(), gomock.Any()).Times(0) m.sel.EXPECT().DeployedService(svcLogNamePrompt, svcLogNameHelpPrompt, "my-app", gomock.Any(), gomock.Any()). Return(&selector.DeployedService{ Env: "my-env", Name: "my-svc", }, nil) }, wantedApp: inputApp, wantedEnv: inputEnv, wantedSvc: inputSvc, }, "return error if fail to select deployed services": { inputApp: inputApp, setupMocks: func(m wkldLogsMock) { m.configStore.EXPECT().GetApplication(gomock.Any()).AnyTimes() m.configStore.EXPECT().GetEnvironment(gomock.Any(), gomock.Any()).Times(0) m.configStore.EXPECT().GetService(gomock.Any(), gomock.Any()).Times(0) m.sel.EXPECT().DeployedService(svcLogNamePrompt, svcLogNameHelpPrompt, inputApp, gomock.Any(), gomock.Any()). Return(nil, errors.New("some error")) }, wantedError: fmt.Errorf("select deployed services for application my-app: some error"), }, "return error if task ID is used for an RDWS": { inputApp: inputApp, inputTaskIDs: []string{"mockTask1, mockTask2"}, setupMocks: func(m wkldLogsMock) { m.configStore.EXPECT().GetApplication(gomock.Any()).AnyTimes() m.configStore.EXPECT().GetEnvironment(gomock.Any(), gomock.Any()).Times(0) m.configStore.EXPECT().GetService(gomock.Any(), gomock.Any()).Times(0) m.sel.EXPECT().DeployedService(svcLogNamePrompt, svcLogNameHelpPrompt, inputApp, gomock.Any(), gomock.Any()). Return(&selector.DeployedService{ SvcType: manifestinfo.RequestDrivenWebServiceType, }, nil) }, wantedError: errors.New("cannot use `--tasks` for App Runner service logs"), }, "return error if selected svc is of Static Site type": { inputApp: inputApp, setupMocks: func(m wkldLogsMock) { m.configStore.EXPECT().GetApplication(gomock.Any()).AnyTimes() m.configStore.EXPECT().GetEnvironment(gomock.Any(), gomock.Any()).Times(0) m.configStore.EXPECT().GetService(gomock.Any(), gomock.Any()).Times(0) m.sel.EXPECT().DeployedService(svcLogNamePrompt, svcLogNameHelpPrompt, inputApp, gomock.Any(), gomock.Any()). Return(&selector.DeployedService{ SvcType: manifestinfo.StaticSiteType, }, nil) }, wantedError: errors.New("`svc logs` unavailable for Static Site services"), }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { ctrl := gomock.NewController(t) defer ctrl.Finish() mockstore := mocks.NewMockstore(ctrl) mockSel := mocks.NewMockdeploySelector(ctrl) mocks := wkldLogsMock{ configStore: mockstore, sel: mockSel, } tc.setupMocks(mocks) svcLogs := &svcLogsOpts{ svcLogsVars: svcLogsVars{ wkldLogsVars: wkldLogsVars{ envName: tc.inputEnvName, name: tc.inputSvc, appName: tc.inputApp, taskIDs: tc.inputTaskIDs, }, }, wkldLogOpts: wkldLogOpts{ configStore: mockstore, sel: mockSel, }, } // WHEN err := svcLogs.Ask() // THEN if tc.wantedError != nil { require.EqualError(t, err, tc.wantedError.Error()) } else { require.NoError(t, err) require.Equal(t, tc.wantedApp, svcLogs.appName, "expected app name to match") require.Equal(t, tc.wantedSvc, svcLogs.name, "expected service name to match") require.Equal(t, tc.wantedEnv, svcLogs.envName, "expected service name to match") } }) } } func TestSvcLogs_Execute(t *testing.T) { mockTaskARN := "arn:aws:ecs:us-west-2:123456789:task/mockCluster/mockTaskID" mockOtherTaskARN := "arn:aws:ecs:us-west-2:123456789:task/mockCluster/mockTaskID1" mockStartTime := int64(123456789) mockEndTime := int64(987654321) mockLimit := int64(10) var mockNilLimit *int64 testCases := map[string]struct { inputSvc string inputApp string inputEnv string follow bool limit int endTime int64 startTime int64 taskIDs []string inputPreviousTask bool container string logGroup string setupMocks func(mocks wkldLogsMock) wantedError error }{ "success": { inputSvc: "mockSvc", endTime: mockEndTime, startTime: mockStartTime, follow: true, limit: 10, taskIDs: []string{"mockTaskID"}, container: "datadog", setupMocks: func(m wkldLogsMock) { gomock.InOrder( m.logSvcWriter.EXPECT().WriteLogEvents(gomock.Any()).Do(func(param logging.WriteLogEventsOpts) { require.Equal(t, param.TaskIDs, []string{"mockTaskID"}) require.Equal(t, param.EndTime, &mockEndTime) require.Equal(t, param.StartTime, &mockStartTime) require.Equal(t, param.Follow, true) require.Equal(t, param.Limit, &mockLimit) require.Equal(t, param.ContainerName, "datadog") }).Return(nil), ) }, wantedError: nil, }, "success with no limit set": { inputSvc: "mockSvc", endTime: mockEndTime, startTime: mockStartTime, follow: true, taskIDs: []string{"mockTaskID"}, setupMocks: func(m wkldLogsMock) { gomock.InOrder( m.logSvcWriter.EXPECT().WriteLogEvents(gomock.Any()).Do(func(param logging.WriteLogEventsOpts) { require.Equal(t, param.TaskIDs, []string{"mockTaskID"}) require.Equal(t, param.EndTime, &mockEndTime) require.Equal(t, param.StartTime, &mockStartTime) require.Equal(t, param.Follow, true) require.Equal(t, param.Limit, mockNilLimit) }).Return(nil), ) }, wantedError: nil, }, "success with system log group for RDWS": { inputSvc: "mockSvc", startTime: mockStartTime, endTime: mockEndTime, logGroup: "system", setupMocks: func(m wkldLogsMock) { gomock.InOrder( m.logSvcWriter.EXPECT().WriteLogEvents(gomock.Any()).Do(func(param logging.WriteLogEventsOpts) { require.Equal(t, param.TaskIDs, ([]string)(nil)) require.Equal(t, param.EndTime, &mockEndTime) require.Equal(t, param.StartTime, &mockStartTime) require.Equal(t, param.Follow, false) require.Equal(t, param.Limit, (*int64)(nil)) require.Equal(t, param.ContainerName, "") require.Equal(t, param.LogGroup, "system") }).Return(nil), ) }, wantedError: nil, }, "returns error if fail to get event logs": { inputSvc: "mockSvc", setupMocks: func(m wkldLogsMock) { gomock.InOrder( m.logSvcWriter.EXPECT().WriteLogEvents(gomock.Any()). Return(errors.New("some error")), ) }, wantedError: fmt.Errorf("write log events for service mockSvc: some error"), }, "retrieve previously stopped task's logs": { inputSvc: "mockSvc", inputPreviousTask: true, inputApp: "my-app", inputEnv: "my-env", endTime: mockEndTime, startTime: mockStartTime, setupMocks: func(m wkldLogsMock) { gomock.InOrder( m.ecs.EXPECT().DescribeService("my-app", "my-env", "mockSvc").Return(&ecs.ServiceDesc{ ClusterName: "mockCluster", StoppedTasks: []*awsecs.Task{ { TaskArn: aws.String(mockTaskARN), LastStatus: aws.String("STOPPED"), StoppingAt: aws.Time(time.Now()), }, { TaskArn: aws.String(mockOtherTaskARN), LastStatus: aws.String("STOPPED"), StoppingAt: aws.Time(time.Now()), }, }, Tasks: []*awsecs.Task{ { TaskArn: aws.String(mockTaskARN), LastStatus: aws.String("RUNNING"), }, }, }, nil), m.logSvcWriter.EXPECT().WriteLogEvents(gomock.Any()).Do(func(param logging.WriteLogEventsOpts) { require.Equal(t, param.TaskIDs, []string{"mockTaskID1"}) require.Equal(t, param.EndTime, &mockEndTime) require.Equal(t, param.StartTime, &mockStartTime) require.Equal(t, param.Limit, mockNilLimit) }).Return(nil), ) }, wantedError: nil, }, "retrieve warning no previously stopped tasks found, when no stopped task or logs available": { inputSvc: "mockSvc", inputPreviousTask: true, inputApp: "my-app", inputEnv: "my-env", endTime: mockEndTime, startTime: mockStartTime, setupMocks: func(m wkldLogsMock) { gomock.InOrder( m.ecs.EXPECT().DescribeService("my-app", "my-env", "mockSvc").Return(&ecs.ServiceDesc{ ClusterName: "mockCluster", StoppedTasks: []*awsecs.Task{}, Tasks: []*awsecs.Task{ { TaskArn: aws.String(mockTaskARN), LastStatus: aws.String("RUNNING"), }, }, }, nil), ) }, wantedError: nil, }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { ctrl := gomock.NewController(t) defer ctrl.Finish() mockConfigStoreReader := mocks.NewMockstore(ctrl) mockSelector := mocks.NewMockdeploySelector(ctrl) mockSvcDescriber := mocks.NewMockserviceDescriber(ctrl) mockSessionProvider := mocks.NewMocksessionProvider(ctrl) mockLogsSvc := mocks.NewMocklogEventsWriter(ctrl) mocks := wkldLogsMock{ configStore: mockConfigStoreReader, sessProvider: mockSessionProvider, sel: mockSelector, ecs: mockSvcDescriber, logSvcWriter: mockLogsSvc, } tc.setupMocks(mocks) svcLogs := &svcLogsOpts{ svcLogsVars: svcLogsVars{ wkldLogsVars: wkldLogsVars{ name: tc.inputSvc, appName: tc.inputApp, envName: tc.inputEnv, follow: tc.follow, limit: tc.limit, taskIDs: tc.taskIDs, }, previous: tc.inputPreviousTask, containerName: tc.container, logGroup: tc.logGroup, }, wkldLogOpts: wkldLogOpts{ startTime: &tc.startTime, endTime: &tc.endTime, initRuntimeClients: func() error { return nil }, logsSvc: mockLogsSvc, configStore: mockConfigStoreReader, sel: mockSelector, sessProvider: mockSessionProvider, ecs: mockSvcDescriber, }, } // WHEN err := svcLogs.Execute() // THEN if tc.wantedError != nil { require.EqualError(t, err, tc.wantedError.Error()) } else { require.NoError(t, err) } }) } }
577
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package cli import ( "fmt" "github.com/aws/aws-sdk-go/aws" "github.com/aws/aws-sdk-go/service/ssm" "github.com/aws/copilot-cli/internal/pkg/aws/identity" "github.com/aws/copilot-cli/internal/pkg/aws/sessions" "github.com/aws/copilot-cli/internal/pkg/config" "github.com/aws/copilot-cli/internal/pkg/term/log" termprogress "github.com/aws/copilot-cli/internal/pkg/term/progress" "github.com/aws/copilot-cli/internal/pkg/term/prompt" "github.com/aws/copilot-cli/internal/pkg/term/selector" "github.com/aws/copilot-cli/internal/pkg/workspace" "github.com/spf13/afero" "github.com/spf13/cobra" ) type overrideWorkloadVars struct { overrideVars envName string // Optional. } type overrideWorkloadOpts struct { envName string *overrideOpts // Interfaces to interact with dependencies. ws wsWlDirReader wsPrompt wsSelector validateOrAskName func() error } func newOverrideWorkloadOpts(vars overrideWorkloadVars) (*overrideWorkloadOpts, error) { fs := afero.NewOsFs() ws, err := workspace.Use(fs) if err != nil { return nil, err } sessProvider := sessions.ImmutableProvider(sessions.UserAgentExtras("svc override")) defaultSess, err := sessProvider.Default() if err != nil { return nil, fmt.Errorf("default session: %v", err) } cfgStore := config.NewSSMStore(identity.New(defaultSess), ssm.New(defaultSess), aws.StringValue(defaultSess.Config.Region)) prompt := prompt.New() cmd := &overrideWorkloadOpts{ envName: vars.envName, overrideOpts: &overrideOpts{ overrideVars: vars.overrideVars, fs: fs, cfgStore: cfgStore, prompt: prompt, cfnPrompt: selector.NewCFNSelector(prompt), spinner: termprogress.NewSpinner(log.DiagnosticWriter), }, ws: ws, wsPrompt: selector.NewLocalWorkloadSelector(prompt, cfgStore, ws), } return cmd, nil } func newOverrideSvcOpts(vars overrideWorkloadVars) (*overrideWorkloadOpts, error) { cmd, err := newOverrideWorkloadOpts(vars) if err != nil { return nil, err } cmd.validateOrAskName = cmd.validateOrAskServiceName cmd.overrideOpts.packageCmd = cmd.newSvcPackageCmd return cmd, nil } // Validate returns an error for any invalid optional flags. func (o *overrideWorkloadOpts) Validate() error { if err := o.overrideOpts.Validate(); err != nil { return err } return o.validateEnvName() } // Ask prompts for and validates any required flags. func (o *overrideWorkloadOpts) Ask() error { if err := o.validateOrAskName(); err != nil { return err } return o.overrideOpts.Ask() } // Execute writes IaC override files to the local workspace. // This method assumes that the IaC tool chosen by the user is valid. func (o *overrideWorkloadOpts) Execute() error { o.overrideOpts.dir = func() string { return o.ws.WorkloadOverridesPath(o.name) } return o.overrideOpts.Execute() } func (o *overrideWorkloadOpts) validateEnvName() error { if o.envName == "" { return nil } _, err := o.cfgStore.GetEnvironment(o.appName, o.envName) if err != nil { return fmt.Errorf("get environment %q configuration: %v", o.envName, err) } return nil } func (o *overrideWorkloadOpts) validateOrAskServiceName() error { if o.name == "" { return o.askServiceName() } return o.validateServiceName() } func (o *overrideWorkloadOpts) validateServiceName() error { names, err := o.ws.ListServices() if err != nil { return fmt.Errorf("list services in the workspace: %v", err) } if !contains(o.name, names) { return fmt.Errorf("service %q does not exist in the workspace", o.name) } return nil } func (o *overrideWorkloadOpts) askServiceName() error { name, err := o.wsPrompt.Service("Which service's resources would you like to override?", "") if err != nil { return fmt.Errorf("select service name from workspace: %v", err) } o.name = name return nil } func (o *overrideWorkloadOpts) newSvcPackageCmd(tplBuf stringWriteCloser) (executor, error) { envName, err := o.targetEnvName() if err != nil { return nil, err } cmd, err := newPackageSvcOpts(packageSvcVars{ name: o.name, envName: envName, appName: o.appName, }) if err != nil { return nil, err } cmd.templateWriter = tplBuf return cmd, nil } // targetEnvName returns the name of the environment to use when running "svc package". // If the user does not explicitly provide an environment, default to a random environment. func (o *overrideWorkloadOpts) targetEnvName() (string, error) { if o.envName != "" { return o.envName, nil } envs, err := o.cfgStore.ListEnvironments(o.appName) if err != nil { return "", fmt.Errorf("list environments in application %q: %v", o.appName, err) } if len(envs) == 0 { return "", fmt.Errorf("no environments found in application %q", o.appName) } return envs[0].Name, nil } func buildSvcOverrideCmd() *cobra.Command { vars := overrideWorkloadVars{} cmd := &cobra.Command{ Use: "override", Short: "Override the AWS CloudFormation template of a service.", Long: `Scaffold Infrastructure as Code (IaC) extension files for a service. The generated files allow you to extend and override the Copilot-generated AWS CloudFormation template. You can edit the files to change existing resource properties, delete or add new resources to the service's template.`, Example: ` Create a new Cloud Development Kit application to override the "frontend" service template. /code $ copilot svc override -n frontend --tool cdk`, RunE: runCmdE(func(cmd *cobra.Command, args []string) error { opts, err := newOverrideSvcOpts(vars) if err != nil { return err } return run(opts) }), } cmd.Flags().StringVarP(&vars.name, nameFlag, nameFlagShort, "", svcFlagDescription) cmd.Flags().StringVarP(&vars.envName, envFlag, envFlagShort, "", overrideEnvFlagDescription) cmd.Flags().StringVarP(&vars.appName, appFlag, appFlagShort, tryReadingAppName(), appFlagDescription) cmd.Flags().StringVar(&vars.iacTool, iacToolFlag, "", iacToolFlagDescription) cmd.Flags().StringVar(&vars.cdkLang, cdkLanguageFlag, typescriptCDKLang, cdkLanguageFlagDescription) cmd.Flags().BoolVar(&vars.skipResources, skipResourcesFlag, false, skipResourcesFlagDescription) return cmd }
203
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package cli import ( "errors" "fmt" "path/filepath" "testing" "github.com/aws/copilot-cli/internal/pkg/cli/mocks" "github.com/aws/copilot-cli/internal/pkg/config" "github.com/aws/copilot-cli/internal/pkg/template" "github.com/golang/mock/gomock" "github.com/spf13/afero" "github.com/stretchr/testify/require" ) func TestOverrideSvc_Validate(t *testing.T) { t.Run("validate application", func(t *testing.T) { testCases := map[string]struct { appName string initMocks func(ctrl *gomock.Controller, cmd *overrideWorkloadOpts) wanted error }{ "return an error if the workspace has no application associated with": { wanted: errNoAppInWorkspace, }, "return a wrapped error if the workspace's application cannot be fetched from the Config Store": { appName: "demo", initMocks: func(ctrl *gomock.Controller, cmd *overrideWorkloadOpts) { mockSSM := mocks.NewMockstore(ctrl) mockSSM.EXPECT().GetApplication(gomock.Any()).Return(nil, errors.New("some error")) cmd.cfgStore = mockSSM }, wanted: errors.New(`get application "demo" configuration: some error`), }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { // GIVEN ctrl := gomock.NewController(t) defer ctrl.Finish() vars := overrideVars{appName: tc.appName} cmd := &overrideWorkloadOpts{ overrideOpts: &overrideOpts{ overrideVars: vars, }, } if tc.initMocks != nil { tc.initMocks(ctrl, cmd) } // WHEN err := cmd.Validate() // THEN if tc.wanted != nil { require.EqualError(t, err, tc.wanted.Error()) } else { require.NoError(t, err) } }) } }) t.Run("validate environment name", func(t *testing.T) { testCases := map[string]struct { envName string initMocks func(ctrl *gomock.Controller, cmd *overrideWorkloadOpts) wanted error }{ "skip validating if environment name is empty": { initMocks: func(ctrl *gomock.Controller, cmd *overrideWorkloadOpts) { mockSSM := mocks.NewMockstore(ctrl) mockSSM.EXPECT().GetApplication(gomock.Any()).AnyTimes() cmd.cfgStore = mockSSM }, }, "return a wrapped error if the environment flag value does not exist": { envName: "test", initMocks: func(ctrl *gomock.Controller, cmd *overrideWorkloadOpts) { mockSSM := mocks.NewMockstore(ctrl) mockSSM.EXPECT().GetApplication(gomock.Any()).AnyTimes() mockSSM.EXPECT().GetEnvironment(gomock.Any(), gomock.Any()).Return(nil, &config.ErrNoSuchEnvironment{}) cmd.cfgStore = mockSSM }, wanted: errors.New(`get environment "test" configuration`), }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { // GIVEN ctrl := gomock.NewController(t) defer ctrl.Finish() vars := overrideVars{appName: "demo", cdkLang: "typescript"} cmd := &overrideWorkloadOpts{ envName: tc.envName, overrideOpts: &overrideOpts{ overrideVars: vars, }, } if tc.initMocks != nil { tc.initMocks(ctrl, cmd) } // WHEN err := cmd.Validate() // THEN if tc.wanted != nil { require.ErrorContains(t, err, tc.wanted.Error()) } else { require.NoError(t, err) } }) } }) t.Run("validate CDK language", func(t *testing.T) { testCases := map[string]struct { lang string wanted error }{ "return an error when an unknown language is selected": { lang: "python", wanted: errors.New(`"python" is not a valid CDK language: must be one of: "typescript"`), }, "typescript is a valid CDK language": { lang: "typescript", }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { // GIVEN ctrl := gomock.NewController(t) defer ctrl.Finish() mockSSM := mocks.NewMockstore(ctrl) mockSSM.EXPECT().GetApplication(gomock.Any()).Return(nil, nil) vars := overrideVars{appName: "demo", cdkLang: tc.lang} cmd := &overrideWorkloadOpts{ overrideOpts: &overrideOpts{ overrideVars: vars, cfgStore: mockSSM, }, } // WHEN err := cmd.Validate() // THEN if tc.wanted != nil { require.EqualError(t, err, tc.wanted.Error()) } else { require.NoError(t, err) } }) } }) } func TestOverrideSvc_Ask(t *testing.T) { t.Run("ask or validate service name", func(t *testing.T) { testCases := map[string]struct { name string initMocks func(ctrl *gomock.Controller, cmd *overrideWorkloadOpts) wanted error }{ "validation passes if service exists in local workspace": { name: "frontend", initMocks: func(ctrl *gomock.Controller, cmd *overrideWorkloadOpts) { mockWS := mocks.NewMockwsWlDirReader(ctrl) mockWS.EXPECT().ListServices().Return([]string{"backend", "frontend", "worker"}, nil) cmd.ws = mockWS }, }, "return a wrapped error if local services cannot be retrieved from workspace": { name: "frontend", initMocks: func(ctrl *gomock.Controller, cmd *overrideWorkloadOpts) { mockWS := mocks.NewMockwsWlDirReader(ctrl) mockWS.EXPECT().ListServices().Return(nil, errors.New("some error")) cmd.ws = mockWS }, wanted: errors.New("list services in the workspace: some error"), }, "return an error if service does not exist in the workspace": { name: "frontend", initMocks: func(ctrl *gomock.Controller, cmd *overrideWorkloadOpts) { mockWS := mocks.NewMockwsWlDirReader(ctrl) mockWS.EXPECT().ListServices().Return([]string{"backend"}, nil) cmd.ws = mockWS }, wanted: errors.New(`service "frontend" does not exist in the workspace`), }, "should ask for the local service name if flag is not provided": { name: "", initMocks: func(ctrl *gomock.Controller, cmd *overrideWorkloadOpts) { mockPrompt := mocks.NewMockwsSelector(ctrl) mockPrompt.EXPECT().Service(gomock.Any(), gomock.Any()) cmd.wsPrompt = mockPrompt }, }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { // GIVEN ctrl := gomock.NewController(t) defer ctrl.Finish() mockCfnPrompt := mocks.NewMockcfnSelector(ctrl) mockCfnPrompt.EXPECT().Resources(gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any()).AnyTimes() vars := overrideVars{name: tc.name, appName: "demo", iacTool: "cdk"} cmd := &overrideWorkloadOpts{ overrideOpts: &overrideOpts{ overrideVars: vars, cfgStore: mocks.NewMockstore(ctrl), cfnPrompt: mockCfnPrompt, packageCmd: func(_ stringWriteCloser) (executor, error) { mockCmd := mocks.NewMockexecutor(ctrl) mockCmd.EXPECT().Execute().AnyTimes() return mockCmd, nil }, spinner: &spinnerTestDouble{}, }, } cmd.validateOrAskName = cmd.validateOrAskServiceName tc.initMocks(ctrl, cmd) // WHEN err := cmd.Ask() // THEN if tc.wanted != nil { require.EqualError(t, err, tc.wanted.Error()) } else { require.NoError(t, err) } }) } }) t.Run("ask or validate IaC tool", func(t *testing.T) { testCases := map[string]struct { iacTool string initMocks func(ctrl *gomock.Controller, cmd *overrideWorkloadOpts) wanted error }{ "validation passes if IaC tool is a valid option": { iacTool: "cdk", wanted: nil, }, "return an error if IaC tool flag value is invalid": { iacTool: "terraform", wanted: errors.New(`"terraform" is not a valid IaC tool: must be one of: "cdk", "yamlpatch"`), }, "should ask for IaC tool name if flag is not provided": { initMocks: func(ctrl *gomock.Controller, cmd *overrideWorkloadOpts) { mockPrompt := mocks.NewMockprompter(ctrl) mockPrompt.EXPECT().SelectOne(gomock.Any(), gomock.Any(), []string{"cdk", "yamlpatch"}, gomock.Any()) cmd.prompt = mockPrompt }, }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { // GIVEN ctrl := gomock.NewController(t) defer ctrl.Finish() mockSSM := mocks.NewMockstore(ctrl) mockWS := mocks.NewMockwsWlDirReader(ctrl) mockWS.EXPECT().ListServices().Return([]string{"frontend"}, nil).AnyTimes() mockCfnPrompt := mocks.NewMockcfnSelector(ctrl) mockCfnPrompt.EXPECT().Resources(gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any()).AnyTimes() vars := overrideVars{appName: "demo", name: "frontend", iacTool: tc.iacTool} cmd := &overrideWorkloadOpts{ overrideOpts: &overrideOpts{ overrideVars: vars, cfgStore: mockSSM, cfnPrompt: mockCfnPrompt, packageCmd: func(_ stringWriteCloser) (executor, error) { mockCmd := mocks.NewMockexecutor(ctrl) mockCmd.EXPECT().Execute().AnyTimes() return mockCmd, nil }, spinner: &spinnerTestDouble{}, }, ws: mockWS, } cmd.validateOrAskName = cmd.validateOrAskServiceName if tc.initMocks != nil { tc.initMocks(ctrl, cmd) } // WHEN err := cmd.Ask() // THEN if tc.wanted != nil { require.EqualError(t, err, tc.wanted.Error()) } else { require.NoError(t, err) } }) } }) t.Run("ask for which template resources to override", func(t *testing.T) { testCases := map[string]struct { skip bool initMocks func(ctrl *gomock.Controller, cmd *overrideWorkloadOpts) wanted error }{ "should skip prompting for resources if the user opts-in to generating empty files": { skip: true, initMocks: func(ctrl *gomock.Controller, cmd *overrideWorkloadOpts) { mockPrompt := mocks.NewMockcfnSelector(ctrl) mockPrompt.EXPECT().Resources(gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any()).Times(0) cmd.cfnPrompt = mockPrompt }, }, "should return an error if package command cannot be initialized": { initMocks: func(ctrl *gomock.Controller, cmd *overrideWorkloadOpts) { cmd.packageCmd = func(_ stringWriteCloser) (executor, error) { return nil, errors.New("init fail") } }, wanted: errors.New("init fail"), }, "should return a wrapped error if package command fails to execute": { initMocks: func(ctrl *gomock.Controller, cmd *overrideWorkloadOpts) { mockPkgCmd := mocks.NewMockexecutor(ctrl) mockPkgCmd.EXPECT().Execute().Return(errors.New("some error")) cmd.packageCmd = func(_ stringWriteCloser) (executor, error) { return mockPkgCmd, nil } }, wanted: errors.New(`generate CloudFormation template for "frontend": some error`), }, "should prompt for CloudFormation resources in a template": { initMocks: func(ctrl *gomock.Controller, cmd *overrideWorkloadOpts) { mockPkgCmd := mocks.NewMockexecutor(ctrl) mockPkgCmd.EXPECT().Execute().Return(nil) mockPrompt := mocks.NewMockcfnSelector(ctrl) template := ` Resources: Queue: Type: AWS::SQS::Queue Service: Type: AWS::ECS::Service ` mockPrompt.EXPECT().Resources(gomock.Any(), gomock.Any(), gomock.Any(), template).Return(nil, nil) cmd.packageCmd = func(w stringWriteCloser) (executor, error) { _, _ = w.Write([]byte(template)) return mockPkgCmd, nil } cmd.cfnPrompt = mockPrompt }, }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { // GIVEN ctrl := gomock.NewController(t) defer ctrl.Finish() mockSSM := mocks.NewMockstore(ctrl) mockWS := mocks.NewMockwsWlDirReader(ctrl) mockWS.EXPECT().ListServices().Return([]string{"frontend"}, nil).AnyTimes() vars := overrideVars{appName: "demo", name: "frontend", iacTool: "cdk", skipResources: tc.skip} cmd := &overrideWorkloadOpts{ overrideOpts: &overrideOpts{ overrideVars: vars, cfgStore: mockSSM, spinner: &spinnerTestDouble{}, }, ws: mockWS, } cmd.validateOrAskName = cmd.validateOrAskServiceName tc.initMocks(ctrl, cmd) // WHEN err := cmd.Ask() // THEN if tc.wanted != nil { require.EqualError(t, err, tc.wanted.Error()) } else { require.NoError(t, err) } }) } }) } func TestOverrideSvc_Execute(t *testing.T) { t.Run("with the CDK", func(t *testing.T) { testCases := map[string]struct { resources []template.CFNResource initMocks func(ctrl *gomock.Controller, cmd *overrideWorkloadOpts) wanted error }{ "should succeed creating IaC files without any resources": { initMocks: func(ctrl *gomock.Controller, cmd *overrideWorkloadOpts) { fs := afero.NewMemMapFs() ws := mocks.NewMockwsWlDirReader(ctrl) ws.EXPECT().WorkloadOverridesPath(gomock.Any()).Return(filepath.Join("copilot", "frontend", "overrides")) cmd.ws = ws cmd.fs = fs }, }, "should succeed creating IaC files with resources": { resources: []template.CFNResource{ { Type: "AWS::ECS::Service", LogicalID: "Service", }, }, initMocks: func(ctrl *gomock.Controller, cmd *overrideWorkloadOpts) { fs := afero.NewMemMapFs() ws := mocks.NewMockwsWlDirReader(ctrl) ws.EXPECT().WorkloadOverridesPath(gomock.Any()).Return(filepath.Join("copilot", "frontend", "overrides")) cmd.ws = ws cmd.fs = fs }, }, "should return a wrapped error if override files already exists": { initMocks: func(ctrl *gomock.Controller, cmd *overrideWorkloadOpts) { dir := filepath.Join("copilot", "frontend", "overrides") fs := afero.NewMemMapFs() _ = fs.MkdirAll(dir, 0755) _ = afero.WriteFile(fs, filepath.Join(dir, "cdk.json"), []byte("content"), 0755) ws := mocks.NewMockwsWlDirReader(ctrl) ws.EXPECT().WorkloadOverridesPath(gomock.Any()).Return(dir) cmd.ws = ws cmd.fs = fs }, wanted: fmt.Errorf("scaffold CDK application under %q", filepath.Join("copilot", "frontend", "overrides")), }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { // GIVEN ctrl := gomock.NewController(t) defer ctrl.Finish() vars := overrideVars{appName: "demo", name: "frontend", iacTool: "cdk", resources: tc.resources} cmd := &overrideWorkloadOpts{ overrideOpts: &overrideOpts{ overrideVars: vars, }, } tc.initMocks(ctrl, cmd) // WHEN err := cmd.Execute() // THEN if tc.wanted != nil { require.ErrorContains(t, err, tc.wanted.Error()) } else { require.NoError(t, err) } }) } }) }
475
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package cli import ( "errors" "fmt" "io" "os" "path/filepath" "github.com/aws/aws-sdk-go/aws" "github.com/aws/aws-sdk-go/aws/session" "github.com/aws/aws-sdk-go/service/ssm" clideploy "github.com/aws/copilot-cli/internal/pkg/cli/deploy" "github.com/aws/copilot-cli/internal/pkg/deploy" "github.com/aws/copilot-cli/internal/pkg/describe" "github.com/aws/copilot-cli/internal/pkg/exec" "github.com/aws/copilot-cli/internal/pkg/manifest" "github.com/spf13/afero" "github.com/spf13/cobra" "github.com/aws/copilot-cli/internal/pkg/aws/identity" "github.com/aws/copilot-cli/internal/pkg/aws/sessions" "github.com/aws/copilot-cli/internal/pkg/config" "github.com/aws/copilot-cli/internal/pkg/term/prompt" "github.com/aws/copilot-cli/internal/pkg/term/selector" "github.com/aws/copilot-cli/internal/pkg/workspace" ) const ( svcPackageSvcNamePrompt = "Which service would you like to generate a CloudFormation template for?" svcPackageEnvNamePrompt = "Which environment would you like to package this stack for?" ) type packageSvcVars struct { name string envName string appName string tag string outputDir string uploadAssets bool showDiff bool // To facilitate unit tests. clientConfigured bool } type packageSvcOpts struct { packageSvcVars // Interfaces to interact with dependencies. ws wsWlDirReader fs afero.Fs store store templateWriter io.WriteCloser paramsWriter io.WriteCloser addonsWriter io.WriteCloser diffWriter io.Writer runner execRunner sessProvider *sessions.Provider sel wsSelector unmarshal func([]byte) (manifest.DynamicWorkload, error) newInterpolator func(app, env string) interpolator newStackGenerator func(*packageSvcOpts) (workloadStackGenerator, error) envFeaturesDescriber versionCompatibilityChecker gitShortCommit string // cached variables targetApp *config.Application targetEnv *config.Environment envSess *session.Session appliedDynamicMft manifest.DynamicWorkload rootUserARN string } func newPackageSvcOpts(vars packageSvcVars) (*packageSvcOpts, error) { fs := afero.NewOsFs() ws, err := workspace.Use(fs) if err != nil { return nil, err } sessProvider := sessions.ImmutableProvider(sessions.UserAgentExtras("svc package")) defaultSess, err := sessProvider.Default() if err != nil { return nil, fmt.Errorf("default session: %v", err) } store := config.NewSSMStore(identity.New(defaultSess), ssm.New(defaultSess), aws.StringValue(defaultSess.Config.Region)) prompter := prompt.New() opts := &packageSvcOpts{ packageSvcVars: vars, store: store, ws: ws, fs: fs, unmarshal: manifest.UnmarshalWorkload, runner: exec.NewCmd(), sel: selector.NewLocalWorkloadSelector(prompter, store, ws), templateWriter: os.Stdout, paramsWriter: discardFile{}, addonsWriter: discardFile{}, diffWriter: os.Stdout, newInterpolator: newManifestInterpolator, sessProvider: sessProvider, newStackGenerator: newWorkloadStackGenerator, } return opts, nil } func newWorkloadStackGenerator(o *packageSvcOpts) (workloadStackGenerator, error) { targetApp, err := o.getTargetApp() if err != nil { return nil, err } targetEnv, err := o.getTargetEnv() if err != nil { return nil, err } raw, err := o.ws.ReadWorkloadManifest(o.name) if err != nil { return nil, fmt.Errorf("read manifest file for %s: %w", o.name, err) } ovrdr, err := clideploy.NewOverrider(o.ws.WorkloadOverridesPath(o.name), o.appName, o.envName, o.fs, o.sessProvider) if err != nil { return nil, err } content := o.appliedDynamicMft.Manifest() var deployer workloadStackGenerator in := clideploy.WorkloadDeployerInput{ SessionProvider: o.sessProvider, Name: o.name, App: targetApp, Env: targetEnv, Image: clideploy.ContainerImageIdentifier{ CustomTag: o.tag, GitShortCommitTag: o.gitShortCommit, }, Mft: content, RawMft: raw, EnvVersionGetter: o.envFeaturesDescriber, Overrider: ovrdr, } switch t := content.(type) { case *manifest.LoadBalancedWebService: deployer, err = clideploy.NewLBWSDeployer(&in) case *manifest.BackendService: deployer, err = clideploy.NewBackendDeployer(&in) case *manifest.RequestDrivenWebService: deployer, err = clideploy.NewRDWSDeployer(&in) case *manifest.WorkerService: deployer, err = clideploy.NewWorkerSvcDeployer(&in) case *manifest.ScheduledJob: deployer, err = clideploy.NewJobDeployer(&in) case *manifest.StaticSite: deployer, err = clideploy.NewStaticSiteDeployer(&in) default: return nil, fmt.Errorf("unknown manifest type %T while creating the CloudFormation stack", t) } if err != nil { return nil, fmt.Errorf("initiate workload template generator: %w", err) } return deployer, nil } // Validate returns an error for any invalid optional flags. func (o *packageSvcOpts) Validate() error { return nil } // Ask prompts for and validates any required flags. func (o *packageSvcOpts) Ask() error { if o.appName != "" { if _, err := o.getTargetApp(); err != nil { return err } } else { // NOTE: This command is required to be executed under a workspace. We don't prompt for it. return errNoAppInWorkspace } if err := o.validateOrAskSvcName(); err != nil { return err } if err := o.validateOrAskEnvName(); err != nil { return err } return nil } // Execute prints the CloudFormation template of the application for the environment. func (o *packageSvcOpts) Execute() error { if !o.clientConfigured { if err := o.configureClients(); err != nil { return err } } if o.outputDir != "" { if err := o.setOutputFileWriters(); err != nil { return err } } targetEnv, err := o.getTargetEnv() if err != nil { return nil } gen, err := o.getStackGenerator(targetEnv) if err != nil { return err } stack, err := o.getWorkloadStack(gen) if err != nil { return err } if o.showDiff { if err := diff(gen, stack.template, o.diffWriter); err != nil { var errHasDiff *errHasDiff if errors.As(err, &errHasDiff) { return err } return &errDiffNotAvailable{ parentErr: err, } } } if err := o.writeAndClose(o.templateWriter, stack.template); err != nil { return err } if err := o.writeAndClose(o.paramsWriter, stack.parameters); err != nil { return err } addonsTemplate, err := gen.AddonsTemplate() switch { case err != nil: return fmt.Errorf("retrieve addons template: %w", err) case addonsTemplate == "": return nil } // Addons template won't show up without setting --output-dir flag. if o.outputDir != "" { if err := o.setAddonsFileWriter(); err != nil { return err } } return o.writeAndClose(o.addonsWriter, addonsTemplate) } func (o *packageSvcOpts) validateOrAskSvcName() error { if o.name != "" { names, err := o.ws.ListServices() if err != nil { return fmt.Errorf("list services in the workspace: %w", err) } if !contains(o.name, names) { return fmt.Errorf("service '%s' does not exist in the workspace", o.name) } return nil } name, err := o.sel.Service(svcPackageSvcNamePrompt, "") if err != nil { return fmt.Errorf("select service: %w", err) } o.name = name return nil } func (o *packageSvcOpts) validateOrAskEnvName() error { if o.envName != "" { _, err := o.getTargetEnv() return err } name, err := o.sel.Environment(svcPackageEnvNamePrompt, "", o.appName) if err != nil { return fmt.Errorf("select environment: %w", err) } o.envName = name return nil } func (o *packageSvcOpts) configureClients() error { o.gitShortCommit = imageTagFromGit(o.runner) // Best effort assign git tag. // client to retrieve an application's resources created with CloudFormation. defaultSess, err := o.sessProvider.Default() if err != nil { return fmt.Errorf("create default session: %w", err) } targetEnv, err := o.getTargetEnv() if err != nil { return err } envSess, err := o.sessProvider.FromRole(targetEnv.ManagerRoleARN, targetEnv.Region) if err != nil { return err } o.envSess = envSess // client to retrieve caller identity. caller, err := identity.New(defaultSess).Get() if err != nil { return fmt.Errorf("get identity: %w", err) } o.rootUserARN = caller.RootUserARN envDescriber, err := describe.NewEnvDescriber(describe.NewEnvDescriberConfig{ App: o.appName, Env: o.envName, ConfigStore: o.store, }) if err != nil { return err } o.envFeaturesDescriber = envDescriber return nil } type cfnStackConfig struct { template string parameters string } func (o *packageSvcOpts) getStackGenerator(env *config.Environment) (workloadStackGenerator, error) { mft, err := workloadManifest(&workloadManifestInput{ name: o.name, appName: o.appName, envName: o.envName, interpolator: o.newInterpolator(o.appName, o.envName), ws: o.ws, unmarshal: o.unmarshal, sess: o.envSess, }) if err != nil { return nil, err } o.appliedDynamicMft = mft if err := validateWorkloadManifestCompatibilityWithEnv(o.ws, o.envFeaturesDescriber, o.appliedDynamicMft, o.envName); err != nil { return nil, err } return o.newStackGenerator(o) } // getWorkloadStack returns the CloudFormation stack's template and its parameters for the service. func (o *packageSvcOpts) getWorkloadStack(generator workloadStackGenerator) (*cfnStackConfig, error) { targetApp, err := o.getTargetApp() if err != nil { return nil, err } var uploadOut clideploy.UploadArtifactsOutput if o.uploadAssets { out, err := generator.UploadArtifacts() if err != nil { return nil, fmt.Errorf("upload resources required for deployment for %s: %w", o.name, err) } uploadOut = *out } output, err := generator.GenerateCloudFormationTemplate(&clideploy.GenerateCloudFormationTemplateInput{ StackRuntimeConfiguration: clideploy.StackRuntimeConfiguration{ RootUserARN: o.rootUserARN, Tags: targetApp.Tags, EnvFileARNs: uploadOut.EnvFileARNs, ImageDigests: uploadOut.ImageDigests, AddonsURL: uploadOut.AddonsURL, CustomResourceURLs: uploadOut.CustomResourceURLs, StaticSiteAssetMappingURL: uploadOut.StaticSiteAssetMappingLocation, }, }) if err != nil { return nil, fmt.Errorf("generate workload %s template against environment %s: %w", o.name, o.envName, err) } return &cfnStackConfig{ template: output.Template, parameters: output.Parameters}, nil } // setOutputFileWriters creates the output directory, and updates the template and param writers to file writers in the directory. func (o *packageSvcOpts) setOutputFileWriters() error { if err := o.fs.MkdirAll(o.outputDir, 0755); err != nil { return fmt.Errorf("create directory %s: %w", o.outputDir, err) } templatePath := filepath.Join(o.outputDir, fmt.Sprintf(deploy.WorkloadCfnTemplateNameFormat, o.name, o.envName)) templateFile, err := o.fs.Create(templatePath) if err != nil { return fmt.Errorf("create file %s: %w", templatePath, err) } o.templateWriter = templateFile paramsPath := filepath.Join(o.outputDir, fmt.Sprintf(deploy.WorkloadCfnTemplateConfigurationNameFormat, o.name, o.envName)) paramsFile, err := o.fs.Create(paramsPath) if err != nil { return fmt.Errorf("create file %s: %w", paramsPath, err) } o.paramsWriter = paramsFile return nil } func (o *packageSvcOpts) setAddonsFileWriter() error { addonsPath := filepath.Join(o.outputDir, fmt.Sprintf(deploy.AddonsCfnTemplateNameFormat, o.name)) addonsFile, err := o.fs.Create(addonsPath) if err != nil { return fmt.Errorf("create file %s: %w", addonsPath, err) } o.addonsWriter = addonsFile return nil } func (o *packageSvcOpts) getTargetApp() (*config.Application, error) { if o.targetApp != nil { return o.targetApp, nil } app, err := o.store.GetApplication(o.appName) if err != nil { return nil, fmt.Errorf("get application %s configuration: %w", o.appName, err) } o.targetApp = app return o.targetApp, nil } func (o *packageSvcOpts) getTargetEnv() (*config.Environment, error) { if o.targetEnv != nil { return o.targetEnv, nil } env, err := o.store.GetEnvironment(o.appName, o.envName) if err != nil { return nil, fmt.Errorf("get environment %s: %w", o.envName, err) } o.targetEnv = env return o.targetEnv, nil } func (o *packageSvcOpts) writeAndClose(wc io.WriteCloser, dat string) error { if _, err := wc.Write([]byte(dat)); err != nil { return err } return wc.Close() } // RecommendActions is a no-op. func (o *packageSvcOpts) RecommendActions() error { return nil } type errDiffNotAvailable struct { parentErr error } // Unwrap returns the parent error that is wrapped inside errDiffNotAvailable. func (e *errDiffNotAvailable) Unwrap() error { return e.parentErr } func (e *errDiffNotAvailable) Error() string { return e.parentErr.Error() } // ExitCode returns 2 when a diff is unavailable due to a parent error. func (e *errDiffNotAvailable) ExitCode() int { return 2 } func contains(s string, items []string) bool { for _, item := range items { if s == item { return true } } return false } // buildSvcPackageCmd builds the command for printing a service's CloudFormation template. func buildSvcPackageCmd() *cobra.Command { vars := packageSvcVars{} cmd := &cobra.Command{ Use: "package", Short: "Print the AWS CloudFormation template of a service.", Long: `Print the CloudFormation template used to deploy a service to an environment.`, Example: ` Print the CloudFormation template for the "frontend" service parametrized for the "test" environment. /code $ copilot svc package -n frontend -e test Write the CloudFormation stack and configuration to a "infrastructure/" sub-directory instead of stdout. /startcodeblock $ copilot svc package -n frontend -e test --output-dir ./infrastructure $ ls ./infrastructure frontend-test.stack.yml frontend-test.params.json /endcodeblock`, RunE: runCmdE(func(cmd *cobra.Command, args []string) error { opts, err := newPackageSvcOpts(vars) if err != nil { return err } return run(opts) }), } cmd.Flags().StringVarP(&vars.name, nameFlag, nameFlagShort, "", svcFlagDescription) cmd.Flags().StringVarP(&vars.envName, envFlag, envFlagShort, "", envFlagDescription) cmd.Flags().StringVarP(&vars.appName, appFlag, appFlagShort, tryReadingAppName(), appFlagDescription) cmd.Flags().StringVar(&vars.tag, imageTagFlag, "", imageTagFlagDescription) cmd.Flags().StringVar(&vars.outputDir, stackOutputDirFlag, "", stackOutputDirFlagDescription) cmd.Flags().BoolVar(&vars.uploadAssets, uploadAssetsFlag, false, uploadAssetsFlagDescription) cmd.Flags().BoolVar(&vars.showDiff, diffFlag, false, diffFlagDescription) cmd.MarkFlagsMutuallyExclusive(diffFlag, stackOutputDirFlag) cmd.MarkFlagsMutuallyExclusive(diffFlag, uploadAssetsFlag) return cmd }
513
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package cli import ( "bytes" "errors" "io" "testing" "github.com/golang/mock/gomock" "github.com/stretchr/testify/require" "github.com/aws/copilot-cli/internal/pkg/cli/deploy" "github.com/aws/copilot-cli/internal/pkg/cli/mocks" "github.com/aws/copilot-cli/internal/pkg/config" "github.com/aws/copilot-cli/internal/pkg/manifest" ) type svcPackageAskMock struct { store *mocks.Mockstore sel *mocks.MockwsSelector ws *mocks.MockwsWlDirReader } func TestPackageSvcOpts_Ask(t *testing.T) { testCases := map[string]struct { inAppName string inSvcName string inEnvName string setupMocks func(m svcPackageAskMock) wantedAppName string wantedSvcName string wantedEnvName string wantedError error }{ "validate instead of prompting application name, svc name and environment name": { inAppName: "phonetool", inEnvName: "prod-iad", inSvcName: "frontend", setupMocks: func(m svcPackageAskMock) { m.store.EXPECT().GetApplication("phonetool") m.store.EXPECT().GetEnvironment("phonetool", "prod-iad").Return(&config.Environment{Name: "prod-iad"}, nil) m.ws.EXPECT().ListServices().Return([]string{"frontend"}, nil) m.sel.EXPECT().Service(gomock.Any(), gomock.Any()).Times(0) m.sel.EXPECT().Environment(gomock.Any(), gomock.Any(), gomock.Any()).Times(0) }, wantedAppName: "phonetool", wantedSvcName: "frontend", wantedEnvName: "prod-iad", }, "error instead of prompting for application name if not provided": { setupMocks: func(m svcPackageAskMock) { m.store.EXPECT().GetApplication(gomock.Any()).Times(0) }, wantedError: errNoAppInWorkspace, }, "prompt for the service name": { inAppName: "phonetool", inEnvName: "test", setupMocks: func(m svcPackageAskMock) { m.sel.EXPECT().Service("Which service would you like to generate a CloudFormation template for?", ""). Return("frontend", nil) m.ws.EXPECT().ListServices().Times(0) m.store.EXPECT().GetApplication(gomock.Any()).AnyTimes() m.store.EXPECT().GetEnvironment(gomock.Any(), gomock.Any()).AnyTimes() }, wantedAppName: "phonetool", wantedSvcName: "frontend", wantedEnvName: "test", }, "prompt for the env name": { inAppName: "phonetool", inSvcName: "frontend", setupMocks: func(m svcPackageAskMock) { m.sel.EXPECT().Environment(gomock.Any(), gomock.Any(), "phonetool").Return("prod-iad", nil) m.store.EXPECT().GetEnvironment(gomock.Any(), gomock.Any()).Times(0) m.store.EXPECT().GetApplication("phonetool").AnyTimes() m.ws.EXPECT().ListServices().Return([]string{"frontend"}, nil).AnyTimes() }, wantedAppName: "phonetool", wantedSvcName: "frontend", wantedEnvName: "prod-iad", }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { // GIVEN ctrl := gomock.NewController(t) defer ctrl.Finish() m := svcPackageAskMock{ store: mocks.NewMockstore(ctrl), sel: mocks.NewMockwsSelector(ctrl), ws: mocks.NewMockwsWlDirReader(ctrl), } tc.setupMocks(m) opts := &packageSvcOpts{ packageSvcVars: packageSvcVars{ name: tc.inSvcName, envName: tc.inEnvName, appName: tc.inAppName, }, sel: m.sel, store: m.store, ws: m.ws, runner: mocks.NewMockexecRunner(ctrl), } // WHEN err := opts.Ask() // THEN if tc.wantedError != nil { require.EqualError(t, err, tc.wantedError.Error()) } else { require.NoError(t, err) require.Equal(t, tc.wantedAppName, opts.appName) require.Equal(t, tc.wantedSvcName, opts.name) require.Equal(t, tc.wantedEnvName, opts.envName) } }) } } type svcPackageExecuteMock struct { ws *mocks.MockwsWlDirReader generator *mocks.MockworkloadStackGenerator interpolator *mocks.Mockinterpolator envFeaturesDescriber *mocks.MockversionCompatibilityChecker mft *mockWorkloadMft } type mockWriteCloser struct { w io.Writer } func (wc mockWriteCloser) Write(p []byte) (n int, err error) { return wc.w.Write(p) } func (wc mockWriteCloser) Close() error { return nil } func TestPackageSvcOpts_Execute(t *testing.T) { const ( mockARN = "mockARN" mockDigest = "mockDigest" lbwsMft = `name: api type: Load Balanced Web Service image: build: ./Dockerfile port: 80 http: path: 'api' cpu: 256 memory: 512 count: 1` rdwsMft = `name: api type: Request-Driven Web Service image: build: ./Dockerfile port: 80 http: alias: 'hunter.com' cpu: 256 memory: 512 count: 1` ) testCases := map[string]struct { inVars packageSvcVars setupMocks func(m *svcPackageExecuteMock) wantedStack string wantedParams string wantedAddons string wantedDiff string wantedErr error }{ "fail to get the diff": { inVars: packageSvcVars{ name: "api", clientConfigured: true, showDiff: true, }, setupMocks: func(m *svcPackageExecuteMock) { m.ws.EXPECT().ReadWorkloadManifest("api").Return([]byte(lbwsMft), nil) m.interpolator.EXPECT().Interpolate(lbwsMft).Return(lbwsMft, nil) m.mft = &mockWorkloadMft{ mockRequiredEnvironmentFeatures: func() []string { return []string{} }, } m.envFeaturesDescriber.EXPECT().Version().Return("v1.mock", nil) m.envFeaturesDescriber.EXPECT().AvailableFeatures().Return([]string{}, nil) m.generator.EXPECT().GenerateCloudFormationTemplate(gomock.Any()).Return(&deploy.GenerateCloudFormationTemplateOutput{ Template: "mystack", Parameters: "myparams", }, nil) m.generator.EXPECT().DeployDiff(gomock.Eq("mystack")).Return("", errors.New("some error")) }, wantedErr: &errDiffNotAvailable{parentErr: errors.New("some error")}, }, "writes the diff": { inVars: packageSvcVars{ name: "api", clientConfigured: true, showDiff: true, }, setupMocks: func(m *svcPackageExecuteMock) { m.ws.EXPECT().ReadWorkloadManifest("api").Return([]byte(lbwsMft), nil) m.interpolator.EXPECT().Interpolate(lbwsMft).Return(lbwsMft, nil) m.mft = &mockWorkloadMft{ mockRequiredEnvironmentFeatures: func() []string { return []string{} }, } m.envFeaturesDescriber.EXPECT().Version().Return("v1.mock", nil) m.envFeaturesDescriber.EXPECT().AvailableFeatures().Return([]string{}, nil) m.generator.EXPECT().GenerateCloudFormationTemplate(gomock.Any()).Return(&deploy.GenerateCloudFormationTemplateOutput{ Template: "mystack", Parameters: "myparams", }, nil) m.generator.EXPECT().DeployDiff(gomock.Eq("mystack")).Return("mock diff", nil) }, wantedDiff: "mock diff", wantedErr: &errHasDiff{}, }, "writes service template without addons": { inVars: packageSvcVars{ appName: "ecs-kudos", name: "api", envName: "test", tag: "1234", clientConfigured: true, uploadAssets: true, }, setupMocks: func(m *svcPackageExecuteMock) { m.ws.EXPECT().ReadWorkloadManifest("api").Return([]byte(lbwsMft), nil) m.generator.EXPECT().UploadArtifacts().Return(&deploy.UploadArtifactsOutput{ ImageDigests: map[string]deploy.ContainerImageIdentifier{ "api": { Digest: mockDigest, }, }, }, nil) m.generator.EXPECT().GenerateCloudFormationTemplate(&deploy.GenerateCloudFormationTemplateInput{ StackRuntimeConfiguration: deploy.StackRuntimeConfiguration{ ImageDigests: map[string]deploy.ContainerImageIdentifier{ "api": { Digest: mockDigest, }, }, RootUserARN: mockARN, }, }).Return(&deploy.GenerateCloudFormationTemplateOutput{ Template: "mystack", Parameters: "myparams", }, nil) m.interpolator.EXPECT().Interpolate(lbwsMft).Return(lbwsMft, nil) m.generator.EXPECT().AddonsTemplate().Return("", nil) m.envFeaturesDescriber.EXPECT().Version().Return("v1.mock", nil) m.mft = &mockWorkloadMft{ mockRequiredEnvironmentFeatures: func() []string { return []string{} }, } m.envFeaturesDescriber.EXPECT().AvailableFeatures().Return([]string{}, nil) }, wantedStack: "mystack", wantedParams: "myparams", }, "writes request-driven web service template with custom resource": { inVars: packageSvcVars{ appName: "ecs-kudos", name: "api", envName: "test", tag: "1234", clientConfigured: true, }, setupMocks: func(m *svcPackageExecuteMock) { m.ws.EXPECT().ReadWorkloadManifest("api").Return([]byte(rdwsMft), nil) m.interpolator.EXPECT().Interpolate(rdwsMft).Return(rdwsMft, nil) m.generator.EXPECT().AddonsTemplate().Return("", nil) m.envFeaturesDescriber.EXPECT().Version().Return("v1.mock", nil) m.mft = &mockWorkloadMft{ mockRequiredEnvironmentFeatures: func() []string { return []string{} }, } m.envFeaturesDescriber.EXPECT().AvailableFeatures().Return([]string{}, nil) m.generator.EXPECT().GenerateCloudFormationTemplate(&deploy.GenerateCloudFormationTemplateInput{ StackRuntimeConfiguration: deploy.StackRuntimeConfiguration{ RootUserARN: mockARN, }, }).Return(&deploy.GenerateCloudFormationTemplateOutput{ Template: "mystack", Parameters: "myparams", }, nil) }, wantedStack: "mystack", wantedParams: "myparams", }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { // GIVEN ctrl := gomock.NewController(t) defer ctrl.Finish() stackBuf := new(bytes.Buffer) paramsBuf := new(bytes.Buffer) addonsBuf := new(bytes.Buffer) diffBuff := new(bytes.Buffer) m := &svcPackageExecuteMock{ ws: mocks.NewMockwsWlDirReader(ctrl), generator: mocks.NewMockworkloadStackGenerator(ctrl), interpolator: mocks.NewMockinterpolator(ctrl), envFeaturesDescriber: mocks.NewMockversionCompatibilityChecker(ctrl), } tc.setupMocks(m) opts := &packageSvcOpts{ packageSvcVars: tc.inVars, templateWriter: mockWriteCloser{w: stackBuf}, paramsWriter: mockWriteCloser{w: paramsBuf}, addonsWriter: mockWriteCloser{w: addonsBuf}, diffWriter: mockWriteCloser{w: diffBuff}, unmarshal: func(b []byte) (manifest.DynamicWorkload, error) { return m.mft, nil }, rootUserARN: mockARN, ws: m.ws, newInterpolator: func(_, _ string) interpolator { return m.interpolator }, newStackGenerator: func(_ *packageSvcOpts) (workloadStackGenerator, error) { return m.generator, nil }, envFeaturesDescriber: m.envFeaturesDescriber, targetApp: &config.Application{}, targetEnv: &config.Environment{}, } // WHEN err := opts.Execute() // THEN if tc.wantedErr != nil { require.Equal(t, err, tc.wantedErr) } else { require.NoError(t, err) } require.Equal(t, stackBuf.String(), tc.wantedStack) require.Equal(t, paramsBuf.String(), tc.wantedParams) require.Equal(t, addonsBuf.String(), tc.wantedAddons) require.Equal(t, diffBuff.String(), tc.wantedDiff) }) } }
372
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package cli import ( "errors" "fmt" "github.com/aws/aws-sdk-go/aws" "github.com/aws/aws-sdk-go/service/ssm" "github.com/aws/copilot-cli/internal/pkg/aws/identity" "github.com/aws/copilot-cli/internal/pkg/manifest/manifestinfo" "github.com/aws/copilot-cli/internal/pkg/aws/apprunner" "github.com/aws/copilot-cli/internal/pkg/aws/sessions" "github.com/aws/copilot-cli/internal/pkg/config" "github.com/aws/copilot-cli/internal/pkg/deploy" "github.com/aws/copilot-cli/internal/pkg/describe" "github.com/aws/copilot-cli/internal/pkg/term/color" "github.com/aws/copilot-cli/internal/pkg/term/log" termprogress "github.com/aws/copilot-cli/internal/pkg/term/progress" "github.com/aws/copilot-cli/internal/pkg/term/prompt" "github.com/aws/copilot-cli/internal/pkg/term/selector" "github.com/spf13/cobra" ) const ( svcPauseAppNamePrompt = "Which application is the service in?" svcPauseNamePrompt = "Which service of %s would you like to pause?" svcPauseSvcNameHelpPrompt = "The selected service will be paused." fmtSvcPauseStart = "Pausing service %s in environment %s." fmtsvcPauseFailed = "Failed to pause service %s in environment %s.\n" fmtSvcPauseSucceed = "Paused service %s in environment %s.\n" fmtSvcPauseConfirmPrompt = "Are you sure you want to stop processing requests for service %s?" ) type svcPauseVars struct { svcName string envName string appName string skipConfirmation bool } type svcPauseOpts struct { svcPauseVars store store prompt prompter sel deploySelector client servicePauser initSvcPause func() error svcARN string prog progress // cached variables. targetEnv *config.Environment } func newSvcPauseOpts(vars svcPauseVars) (*svcPauseOpts, error) { sessProvider := sessions.ImmutableProvider(sessions.UserAgentExtras("svc pause")) defaultSess, err := sessProvider.Default() if err != nil { return nil, fmt.Errorf("default session: %v", err) } configStore := config.NewSSMStore(identity.New(defaultSess), ssm.New(defaultSess), aws.StringValue(defaultSess.Config.Region)) deployStore, err := deploy.NewStore(sessProvider, configStore) if err != nil { return nil, fmt.Errorf("connect to deploy store: %w", err) } prompter := prompt.New() opts := &svcPauseOpts{ svcPauseVars: vars, store: configStore, prompt: prompter, sel: selector.NewDeploySelect(prompt.New(), configStore, deployStore), prog: termprogress.NewSpinner(log.DiagnosticWriter), } opts.initSvcPause = func() error { env, err := opts.getTargetEnv() if err != nil { return err } wl, err := configStore.GetWorkload(opts.appName, opts.svcName) if err != nil { return fmt.Errorf("get workload: %w", err) } if wl.Type != manifestinfo.RequestDrivenWebServiceType { return fmt.Errorf("pausing a service is only supported for services with type: %s", manifestinfo.RequestDrivenWebServiceType) } sess, err := sessProvider.FromRole(env.ManagerRoleARN, env.Region) if err != nil { return err } opts.client = apprunner.New(sess) d, err := describe.NewRDWebServiceDescriber(describe.NewServiceConfig{ App: opts.appName, Svc: opts.svcName, ConfigStore: opts.store, }) if err != nil { return err } opts.svcARN, err = d.ServiceARN(opts.envName) if err != nil { return fmt.Errorf("retrieve ServiceARN for %s: %w", opts.svcName, err) } return nil } return opts, nil } // Validate returns an error for any invalid optional flags. func (o *svcPauseOpts) Validate() error { return nil } // Ask prompts for and validates any required flags. func (o *svcPauseOpts) Ask() error { if err := o.validateOrAskApp(); err != nil { return err } if err := o.validateAndAskSvcEnvName(); err != nil { return err } if o.skipConfirmation { return nil } pauseConfirmed, err := o.prompt.Confirm(fmt.Sprintf(fmtSvcPauseConfirmPrompt, color.HighlightUserInput(o.svcName)), "", prompt.WithConfirmFinalMessage()) if err != nil { return fmt.Errorf("svc pause confirmation prompt: %w", err) } if !pauseConfirmed { return errors.New("svc pause cancelled - no changes made") } return nil } func (o *svcPauseOpts) validateOrAskApp() error { if o.appName != "" { _, err := o.store.GetApplication(o.appName) return err } app, err := o.sel.Application(svcPauseAppNamePrompt, wkldAppNameHelpPrompt) if err != nil { return fmt.Errorf("select application: %w", err) } o.appName = app return nil } func (o *svcPauseOpts) validateAndAskSvcEnvName() error { if o.envName != "" { if _, err := o.getTargetEnv(); err != nil { return err } } if o.svcName != "" { if _, err := o.store.GetService(o.appName, o.svcName); err != nil { return err } } // Note: we let prompter handle the case when there is only option for user to choose from. // This is naturally the case when `o.envName != "" && o.svcName != ""`. deployedService, err := o.sel.DeployedService( fmt.Sprintf(svcPauseNamePrompt, color.HighlightUserInput(o.appName)), svcPauseSvcNameHelpPrompt, o.appName, selector.WithEnv(o.envName), selector.WithName(o.svcName), selector.WithServiceTypesFilter([]string{manifestinfo.RequestDrivenWebServiceType}), ) if err != nil { return fmt.Errorf("select deployed services for application %s: %w", o.appName, err) } o.svcName = deployedService.Name o.envName = deployedService.Env return nil } // Execute pause the running App Runner service. func (o *svcPauseOpts) Execute() error { if err := o.initSvcPause(); err != nil { return err } log.Warningln("Your service will be unavailable while paused. You can resume the service once the pause operation is complete.") o.prog.Start(fmt.Sprintf(fmtSvcPauseStart, o.svcName, o.envName)) err := o.client.PauseService(o.svcARN) if err != nil { o.prog.Stop(log.Serrorf(fmtsvcPauseFailed, o.svcName, o.envName)) return err } o.prog.Stop(log.Ssuccessf(fmtSvcPauseSucceed, o.svcName, o.envName)) return nil } func (o *svcPauseOpts) getTargetEnv() (*config.Environment, error) { if o.targetEnv != nil { return o.targetEnv, nil } env, err := o.store.GetEnvironment(o.appName, o.envName) if err != nil { return nil, fmt.Errorf("get environment: %w", err) } o.targetEnv = env return o.targetEnv, nil } // RecommendActions returns follow-up actions the user can take after successfully executing the command. func (o *svcPauseOpts) RecommendActions() error { logRecommendedActions([]string{ fmt.Sprintf("Run %s to start processing requests again.", color.HighlightCode(fmt.Sprintf("copilot svc resume -n %s", o.svcName))), }) return nil } // buildSvcPauseCmd builds the command for pausing the running service. func buildSvcPauseCmd() *cobra.Command { vars := svcPauseVars{} cmd := &cobra.Command{ Use: "pause", Short: "Pause running App Runner service.", Long: "Pause running App Runner service.", Example: ` Pause running App Runner service "my-svc". /code $ copilot svc pause -n my-svc`, RunE: runCmdE(func(cmd *cobra.Command, args []string) error { opts, err := newSvcPauseOpts(vars) if err != nil { return err } return run(opts) }), } cmd.Flags().StringVarP(&vars.svcName, nameFlag, nameFlagShort, "", svcFlagDescription) cmd.Flags().StringVarP(&vars.envName, envFlag, envFlagShort, "", envFlagDescription) cmd.Flags().StringVarP(&vars.appName, appFlag, appFlagShort, tryReadingAppName(), appFlagDescription) cmd.Flags().BoolVar(&vars.skipConfirmation, yesFlag, false, yesFlagDescription) return cmd }
249
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package cli import ( "errors" "fmt" "testing" "github.com/golang/mock/gomock" "github.com/stretchr/testify/require" "github.com/aws/copilot-cli/internal/pkg/cli/mocks" "github.com/aws/copilot-cli/internal/pkg/config" "github.com/aws/copilot-cli/internal/pkg/term/log" "github.com/aws/copilot-cli/internal/pkg/term/selector" ) func TestSvcPause_Validate(t *testing.T) { // NOTE: No optional flag to `copilot svc pause` needs to be validated. } type svcPauseAskMock struct { store *mocks.Mockstore sel *mocks.MockdeploySelector prompt *mocks.Mockprompter } func TestSvcPause_Ask(t *testing.T) { const ( inputApp = "my-app" inputEnv = "my-env" inputSvc = "my-svc" ) mockError := errors.New("some error") testCases := map[string]struct { inputApp string inputSvc string inputEnvironment string skipConfirmation bool setupMocks func(m svcPauseAskMock) mockSelector func(m *mocks.MockdeploySelector) mockPrompt func(m *mocks.Mockprompter) wantedApp string wantedEnv string wantedSvc string wantedError error }{ "validate app env and svc with all flags passed in": { inputApp: inputApp, inputSvc: inputSvc, inputEnvironment: inputEnv, skipConfirmation: true, setupMocks: func(m svcPauseAskMock) { gomock.InOrder( m.store.EXPECT().GetApplication("my-app").Return(&config.Application{Name: "my-app"}, nil), m.store.EXPECT().GetEnvironment("my-app", "my-env").Return(&config.Environment{Name: "my-env"}, nil), m.store.EXPECT().GetService("my-app", "my-svc").Return(&config.Workload{}, nil), ) m.sel.EXPECT().DeployedService(fmt.Sprintf(svcPauseNamePrompt, inputApp), svcPauseSvcNameHelpPrompt, "my-app", gomock.Any(), gomock.Any(), gomock.Any()). Return(&selector.DeployedService{ Env: "my-env", Name: "my-svc", }, nil) // Let prompter handles the case when svc(env) is definite. m.prompt.EXPECT().Confirm(gomock.Any(), gomock.Any(), gomock.Any()).AnyTimes() }, wantedApp: inputApp, wantedEnv: inputEnv, wantedSvc: inputSvc, }, "prompt for app name": { inputSvc: inputSvc, inputEnvironment: inputEnv, skipConfirmation: true, setupMocks: func(m svcPauseAskMock) { m.sel.EXPECT().Application(svcPauseAppNamePrompt, wkldAppNameHelpPrompt).Return("my-app", nil) m.store.EXPECT().GetApplication(gomock.Any()).Times(0) m.store.EXPECT().GetEnvironment(gomock.Any(), gomock.Any()).AnyTimes() m.store.EXPECT().GetService(gomock.Any(), gomock.Any()).AnyTimes() m.sel.EXPECT().DeployedService(gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any()). Return(&selector.DeployedService{ Env: "my-env", Name: "my-svc", }, nil).AnyTimes() m.prompt.EXPECT().Confirm(gomock.Any(), gomock.Any(), gomock.Any()).AnyTimes() }, wantedApp: inputApp, wantedEnv: inputEnv, wantedSvc: inputSvc, }, "errors if failed to select application": { skipConfirmation: true, setupMocks: func(m svcPauseAskMock) { m.sel.EXPECT().Application(svcPauseAppNamePrompt, wkldAppNameHelpPrompt).Return("", errors.New("some error")) }, wantedError: fmt.Errorf("select application: some error"), }, "prompt for svc and env": { inputApp: "my-app", skipConfirmation: true, setupMocks: func(m svcPauseAskMock) { m.store.EXPECT().GetApplication(gomock.Any()).AnyTimes() m.store.EXPECT().GetEnvironment(gomock.Any(), gomock.Any()).Times(0) m.store.EXPECT().GetService(gomock.Any(), gomock.Any()).Times(0) m.sel.EXPECT().DeployedService(fmt.Sprintf(svcPauseNamePrompt, inputApp), svcPauseSvcNameHelpPrompt, "my-app", gomock.Any(), gomock.Any(), gomock.Any()). Return(&selector.DeployedService{ Env: "my-env", Name: "my-svc", }, nil) }, wantedApp: inputApp, wantedEnv: inputEnv, wantedSvc: inputSvc, }, "errors if failed to select deployed service": { inputApp: inputApp, skipConfirmation: true, setupMocks: func(m svcPauseAskMock) { m.store.EXPECT().GetApplication(gomock.Any()).AnyTimes() m.store.EXPECT().GetEnvironment(gomock.Any(), gomock.Any()).Times(0) m.store.EXPECT().GetService(gomock.Any(), gomock.Any()).Times(0) m.sel.EXPECT().DeployedService(fmt.Sprintf(svcPauseNamePrompt, inputApp), svcPauseSvcNameHelpPrompt, inputApp, gomock.Any(), gomock.Any(), gomock.Any()). Return(nil, errors.New("some error")) }, wantedError: fmt.Errorf("select deployed services for application my-app: some error"), }, "should wrap error returned from prompter confirmation": { inputApp: "mockApp", inputSvc: "mockSvc", inputEnvironment: "mockEnv", skipConfirmation: false, setupMocks: func(m svcPauseAskMock) { m.store.EXPECT().GetApplication(gomock.Any()).AnyTimes() m.store.EXPECT().GetEnvironment(gomock.Any(), gomock.Any()).AnyTimes() m.store.EXPECT().GetService(gomock.Any(), gomock.Any()).AnyTimes() m.sel.EXPECT().DeployedService(gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any()). Return(&selector.DeployedService{ Env: "my-env", Name: "my-svc", }, nil) m.prompt.EXPECT().Confirm("Are you sure you want to stop processing requests for service my-svc?", "", gomock.Any()). Times(1).Return(true, mockError) }, wantedError: fmt.Errorf("svc pause confirmation prompt: %w", mockError), }, "should return error if user doesn't confirm svc pause": { inputApp: "mockApp", inputSvc: "mockSvc", inputEnvironment: "mockEnv", skipConfirmation: false, setupMocks: func(m svcPauseAskMock) { m.store.EXPECT().GetApplication(gomock.Any()).AnyTimes() m.store.EXPECT().GetEnvironment(gomock.Any(), gomock.Any()).AnyTimes() m.store.EXPECT().GetService(gomock.Any(), gomock.Any()).AnyTimes() m.sel.EXPECT().DeployedService(gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any()). Return(&selector.DeployedService{ Env: "my-env", Name: "my-svc", }, nil) m.prompt.EXPECT().Confirm("Are you sure you want to stop processing requests for service my-svc?", "", gomock.Any()). Times(1).Return(false, nil) }, wantedError: errors.New("svc pause cancelled - no changes made"), }, "user confirms svc pause": { inputApp: inputApp, inputSvc: inputSvc, inputEnvironment: inputEnv, skipConfirmation: false, setupMocks: func(m svcPauseAskMock) { m.store.EXPECT().GetApplication(gomock.Any()).AnyTimes() m.store.EXPECT().GetEnvironment(gomock.Any(), gomock.Any()).AnyTimes() m.store.EXPECT().GetService(gomock.Any(), gomock.Any()).AnyTimes() m.sel.EXPECT().DeployedService(gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any()). Return(&selector.DeployedService{ Env: "my-env", Name: "my-svc", }, nil) m.prompt.EXPECT().Confirm("Are you sure you want to stop processing requests for service my-svc?", "", gomock.Any()). Times(1).Return(true, nil) }, wantedApp: inputApp, wantedEnv: inputEnv, wantedSvc: inputSvc, }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { ctrl := gomock.NewController(t) defer ctrl.Finish() m := svcPauseAskMock{ store: mocks.NewMockstore(ctrl), sel: mocks.NewMockdeploySelector(ctrl), prompt: mocks.NewMockprompter(ctrl), } tc.setupMocks(m) svcPause := &svcPauseOpts{ svcPauseVars: svcPauseVars{ skipConfirmation: tc.skipConfirmation, svcName: tc.inputSvc, envName: tc.inputEnvironment, appName: tc.inputApp, }, sel: m.sel, prompt: m.prompt, store: m.store, } // WHEN err := svcPause.Ask() // THEN if tc.wantedError != nil { require.EqualError(t, err, tc.wantedError.Error()) } else { require.NoError(t, err) require.Equal(t, tc.wantedApp, svcPause.appName, "expected app name to match") require.Equal(t, tc.wantedSvc, svcPause.svcName, "expected service name to match") require.Equal(t, tc.wantedEnv, svcPause.envName, "expected service name to match") } }) } } func TestSvcPause_Execute(t *testing.T) { mockError := errors.New("some error") testCases := map[string]struct { mocking func(t *testing.T, mockPauser *mocks.MockservicePauser, mockProgress *mocks.Mockprogress) wantedError error }{ "errors if failed to pause the service": { mocking: func(t *testing.T, mockPauser *mocks.MockservicePauser, mockProgress *mocks.Mockprogress) { mockProgress.EXPECT().Start("Pausing service mock-svc in environment mock-env.") mockPauser.EXPECT().PauseService("mock-svc-arn").Return(mockError) mockProgress.EXPECT().Stop(log.Serrorf("Failed to pause service mock-svc in environment mock-env.\n")) }, wantedError: fmt.Errorf("some error"), }, "success": { mocking: func(t *testing.T, mockPauser *mocks.MockservicePauser, mockProgress *mocks.Mockprogress) { mockProgress.EXPECT().Start("Pausing service mock-svc in environment mock-env.") mockPauser.EXPECT().PauseService("mock-svc-arn").Return(nil) mockProgress.EXPECT().Stop(log.Ssuccessf("Paused service mock-svc in environment mock-env.\n")) }, }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { ctrl := gomock.NewController(t) defer ctrl.Finish() mockStore := mocks.NewMockstore(ctrl) mockServicePauser := mocks.NewMockservicePauser(ctrl) mockProgress := mocks.NewMockprogress(ctrl) tc.mocking(t, mockServicePauser, mockProgress) svcPause := &svcPauseOpts{ svcPauseVars: svcPauseVars{ svcName: "mock-svc", envName: "mock-env", appName: "mock-app", }, svcARN: "mock-svc-arn", store: mockStore, client: mockServicePauser, prog: mockProgress, initSvcPause: func() error { return nil }, } // WHEN err := svcPause.Execute() // THEN if tc.wantedError != nil { require.EqualError(t, err, tc.wantedError.Error()) } else { require.NoError(t, err) } }) } }
289
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package cli import ( "fmt" "github.com/aws/aws-sdk-go/aws" "github.com/aws/aws-sdk-go/service/ssm" "github.com/aws/copilot-cli/internal/pkg/aws/identity" "github.com/aws/copilot-cli/internal/pkg/manifest/manifestinfo" "github.com/aws/copilot-cli/internal/pkg/aws/apprunner" "github.com/aws/copilot-cli/internal/pkg/aws/sessions" "github.com/aws/copilot-cli/internal/pkg/config" "github.com/aws/copilot-cli/internal/pkg/deploy" "github.com/aws/copilot-cli/internal/pkg/describe" "github.com/aws/copilot-cli/internal/pkg/term/color" "github.com/aws/copilot-cli/internal/pkg/term/log" termprogress "github.com/aws/copilot-cli/internal/pkg/term/progress" "github.com/aws/copilot-cli/internal/pkg/term/prompt" "github.com/aws/copilot-cli/internal/pkg/term/selector" "github.com/spf13/cobra" ) const ( svcResumeSvcNamePrompt = "Which service of %s would you like to resume?" svcResumeSvcNameHelpPrompt = "The selected service will be resumed." fmtSvcResumeStarted = "Resuming service %s in environment %s." fmtSvcResumeFailed = "Failed to resume service %s in environment %s: %v\n" fmtSvcResumeSuccess = "Resumed service %s in environment %s.\n" ) type resumeSvcVars struct { appName string svcName string envName string } type resumeSvcInitClients func() error type resumeSvcOpts struct { resumeSvcVars store store serviceResumer serviceResumer apprunnerDescriber apprunnerServiceDescriber spinner progress sel deploySelector initClients resumeSvcInitClients } // Validate returns an error for any invalid optional flags. func (o *resumeSvcOpts) Validate() error { return nil } // Ask prompts for and validates any required flags. func (o *resumeSvcOpts) Ask() error { if err := o.validateOrAskApp(); err != nil { return err } return o.validateAndAskSvcEnvName() } // Execute resumes the service through the prompt. func (o *resumeSvcOpts) Execute() error { if o.svcName == "" { return nil } if err := o.initClients(); err != nil { return err } svcARN, err := o.apprunnerDescriber.ServiceARN(o.envName) if err != nil { return err } o.spinner.Start(fmt.Sprintf(fmtSvcResumeStarted, o.svcName, o.envName)) if err := o.serviceResumer.ResumeService(svcARN); err != nil { o.spinner.Stop(log.Serrorf(fmtSvcResumeFailed, o.svcName, o.envName, err)) return err } o.spinner.Stop(log.Ssuccessf(fmtSvcResumeSuccess, o.svcName, o.envName)) return nil } func (o *resumeSvcOpts) validateOrAskApp() error { if o.appName != "" { _, err := o.store.GetApplication(o.appName) return err } appName, err := o.sel.Application(svcAppNamePrompt, wkldAppNameHelpPrompt) if err != nil { return fmt.Errorf("select application: %w", err) } o.appName = appName return nil } func (o *resumeSvcOpts) validateAndAskSvcEnvName() error { if o.envName != "" { if _, err := o.store.GetEnvironment(o.appName, o.envName); err != nil { return err } } if o.svcName != "" { if _, err := o.store.GetService(o.appName, o.svcName); err != nil { return err } } // Note: we let prompter handle the case when there is only option for user to choose from. // This is naturally the case when `o.envName != "" && o.svcName != ""`. deployedService, err := o.sel.DeployedService( fmt.Sprintf(svcResumeSvcNamePrompt, color.HighlightUserInput(o.appName)), svcResumeSvcNameHelpPrompt, o.appName, selector.WithEnv(o.envName), selector.WithName(o.svcName), selector.WithServiceTypesFilter([]string{manifestinfo.RequestDrivenWebServiceType}), ) if err != nil { return fmt.Errorf("select deployed service for application %s: %w", o.appName, err) } o.svcName = deployedService.Name o.envName = deployedService.Env return nil } func newResumeSvcOpts(vars resumeSvcVars) (*resumeSvcOpts, error) { sessProvider := sessions.ImmutableProvider(sessions.UserAgentExtras("svc resume")) defaultSess, err := sessProvider.Default() if err != nil { return nil, fmt.Errorf("default session: %v", err) } configStore := config.NewSSMStore(identity.New(defaultSess), ssm.New(defaultSess), aws.StringValue(defaultSess.Config.Region)) deployStore, err := deploy.NewStore(sessProvider, configStore) if err != nil { return nil, fmt.Errorf("connect to deploy store: %w", err) } opts := &resumeSvcOpts{ resumeSvcVars: vars, store: configStore, sel: selector.NewDeploySelect(prompt.New(), configStore, deployStore), spinner: termprogress.NewSpinner(log.DiagnosticWriter), } opts.initClients = func() error { var a *apprunner.AppRunner var d *describe.RDWebServiceDescriber env, err := configStore.GetEnvironment(opts.appName, opts.envName) if err != nil { return fmt.Errorf("get environment: %w", err) } svc, err := opts.store.GetService(opts.appName, opts.svcName) if err != nil { return err } switch svc.Type { case manifestinfo.RequestDrivenWebServiceType: sess, err := sessProvider.FromRole(env.ManagerRoleARN, env.Region) if err != nil { return err } a = apprunner.New(sess) d, err = describe.NewRDWebServiceDescriber(describe.NewServiceConfig{ App: opts.appName, Svc: opts.svcName, ConfigStore: configStore, }) if err != nil { return err } default: return fmt.Errorf("invalid service type %s", svc.Type) } if err != nil { return fmt.Errorf("creating describer for service %s in environment %s and application %s: %w", opts.svcName, opts.envName, opts.appName, err) } opts.serviceResumer = a opts.apprunnerDescriber = d return nil } return opts, nil } // buildSvcResumeCmd builds the command for resuming services in an application. func buildSvcResumeCmd() *cobra.Command { vars := resumeSvcVars{} cmd := &cobra.Command{ Use: "resume", Short: "Resumes a paused service.", Long: "Resumes a paused service.", Example: ` Resumes the service named "my-svc" in the "test" environment. /code $ copilot svc resume --name my-svc --env test`, RunE: runCmdE(func(cmd *cobra.Command, args []string) error { opts, err := newResumeSvcOpts(vars) if err != nil { return err } return run(opts) }), } cmd.Flags().StringVarP(&vars.appName, appFlag, appFlagShort, tryReadingAppName(), appFlagDescription) cmd.Flags().StringVarP(&vars.svcName, nameFlag, nameFlagShort, "", svcFlagDescription) cmd.Flags().StringVarP(&vars.envName, envFlag, envFlagShort, "", envFlagDescription) return cmd }
215
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package cli import ( "errors" "fmt" "testing" "github.com/golang/mock/gomock" "github.com/stretchr/testify/require" "github.com/aws/copilot-cli/internal/pkg/cli/mocks" "github.com/aws/copilot-cli/internal/pkg/config" "github.com/aws/copilot-cli/internal/pkg/term/log" "github.com/aws/copilot-cli/internal/pkg/term/selector" ) func TestResumeSvcOpts_Validate(t *testing.T) { // NOTE: No optional flag to `copilot svc pause` needs to be validated. } type svcResumeAskMock struct { store *mocks.Mockstore sel *mocks.MockdeploySelector } func TestResumeSvcOpts_Ask(t *testing.T) { const ( testAppName = "phonetool" testEnvName = "test" testSvcName = "api" ) mockError := fmt.Errorf("mockError") tests := map[string]struct { skipConfirmation bool inputSvc string inputEnv string inputApp string setupMocks func(m svcResumeAskMock) wantedApp string wantedEnv string wantedSvc string wantedError error }{ "validate app env and svc with all flags passed in": { inputApp: testAppName, inputSvc: testSvcName, inputEnv: testEnvName, setupMocks: func(m svcResumeAskMock) { gomock.InOrder( m.store.EXPECT().GetApplication("phonetool").Return(&config.Application{Name: "phonetool"}, nil), m.store.EXPECT().GetEnvironment("phonetool", "test").Return(&config.Environment{Name: "test"}, nil), m.store.EXPECT().GetService("phonetool", "api").Return(&config.Workload{}, nil), ) m.sel.EXPECT().DeployedService(fmt.Sprintf(svcResumeSvcNamePrompt, testAppName), svcResumeSvcNameHelpPrompt, "phonetool", gomock.Any(), gomock.Any(), gomock.Any()). Return(&selector.DeployedService{ Env: "test", Name: "api", }, nil) // Let prompter handles the case when svc(env) is definite. }, wantedApp: testAppName, wantedEnv: testEnvName, wantedSvc: testSvcName, }, "prompt for app name": { inputEnv: testEnvName, inputSvc: testSvcName, skipConfirmation: true, setupMocks: func(m svcResumeAskMock) { m.sel.EXPECT().Application(svcAppNamePrompt, wkldAppNameHelpPrompt).Return("phonetool", nil) m.store.EXPECT().GetApplication(gomock.Any()).Times(0) m.store.EXPECT().GetEnvironment(gomock.Any(), gomock.Any()).AnyTimes() m.store.EXPECT().GetService(gomock.Any(), gomock.Any()).AnyTimes() m.sel.EXPECT().DeployedService(gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any()). Return(&selector.DeployedService{ Env: testEnvName, Name: testSvcName, }, nil).AnyTimes() }, wantedApp: testAppName, wantedEnv: testEnvName, wantedSvc: testSvcName, }, "errors if failed to select application": { skipConfirmation: true, setupMocks: func(m svcResumeAskMock) { m.sel.EXPECT().Application(svcAppNamePrompt, wkldAppNameHelpPrompt).Return("", errors.New("some error")) }, wantedError: fmt.Errorf("select application: some error"), }, "prompt for service and env": { inputApp: testAppName, inputEnv: "", inputSvc: "", skipConfirmation: true, setupMocks: func(m svcResumeAskMock) { m.store.EXPECT().GetApplication(gomock.Any()).AnyTimes() m.store.EXPECT().GetEnvironment(gomock.Any(), gomock.Any()).Times(0) m.store.EXPECT().GetService(gomock.Any(), gomock.Any()).Times(0) m.sel.EXPECT().DeployedService("Which service of phonetool would you like to resume?", svcResumeSvcNameHelpPrompt, testAppName, gomock.Any(), gomock.Any(), gomock.Any()). Return(&selector.DeployedService{ Env: testEnvName, Name: testSvcName, }, nil) }, wantedApp: testAppName, wantedEnv: testEnvName, wantedSvc: testSvcName, }, "returns error if fails to select service": { inputApp: testAppName, inputEnv: "", inputSvc: "", skipConfirmation: true, setupMocks: func(m svcResumeAskMock) { m.store.EXPECT().GetApplication(gomock.Any()).AnyTimes() m.store.EXPECT().GetEnvironment(gomock.Any(), gomock.Any()).Times(0) m.store.EXPECT().GetService(gomock.Any(), gomock.Any()).Times(0) m.sel.EXPECT().DeployedService("Which service of phonetool would you like to resume?", svcResumeSvcNameHelpPrompt, testAppName, gomock.Any(), gomock.Any(), gomock.Any()). Return(nil, mockError) }, wantedError: fmt.Errorf("select deployed service for application phonetool: %w", mockError), }, } for name, test := range tests { t.Run(name, func(t *testing.T) { ctrl := gomock.NewController(t) defer ctrl.Finish() m := svcResumeAskMock{ store: mocks.NewMockstore(ctrl), sel: mocks.NewMockdeploySelector(ctrl), } test.setupMocks(m) opts := resumeSvcOpts{ resumeSvcVars: resumeSvcVars{ appName: test.inputApp, svcName: test.inputSvc, envName: test.inputEnv, }, sel: m.sel, store: m.store, } err := opts.Ask() // THEN if test.wantedError != nil { require.EqualError(t, err, test.wantedError.Error()) } else { require.NoError(t, err) require.Equal(t, test.wantedApp, opts.appName, "expected app name to match") require.Equal(t, test.wantedSvc, opts.svcName, "expected service name to match") require.Equal(t, test.wantedEnv, opts.envName, "expected service name to match") } }) } } type resumeSvcMocks struct { store *mocks.Mockstore spinner *mocks.Mockprogress serviceResumer *mocks.MockserviceResumer apprunnerDescriber *mocks.MockapprunnerServiceDescriber } func TestResumeSvcOpts_Execute(t *testing.T) { const ( testAppName = "phonetool" testEnvName = "test" testSvcName = "phonetool" testSvcARN = "service-arn" ) mockError := fmt.Errorf("mockError") tests := map[string]struct { appName string envName string svcName string setupMocks func(mocks *resumeSvcMocks) wantedError error }{ "happy path": { appName: testAppName, envName: testEnvName, svcName: testSvcName, setupMocks: func(m *resumeSvcMocks) { m.apprunnerDescriber.EXPECT().ServiceARN(testEnvName).Return(testSvcARN, nil) gomock.InOrder( m.spinner.EXPECT().Start("Resuming service phonetool in environment test."), m.serviceResumer.EXPECT().ResumeService(testSvcARN).Return(nil), m.spinner.EXPECT().Stop(log.Ssuccessf("Resumed service phonetool in environment test.\n")), ) }, wantedError: nil, }, "return error if fails to retrieve service ARN": { appName: testAppName, envName: testEnvName, svcName: testSvcName, setupMocks: func(m *resumeSvcMocks) { m.apprunnerDescriber.EXPECT().ServiceARN(testEnvName).Return("", mockError) }, wantedError: mockError, }, "should display failure spinner and return error if ResumeService fails": { appName: testAppName, envName: testEnvName, svcName: testSvcName, setupMocks: func(m *resumeSvcMocks) { m.apprunnerDescriber.EXPECT().ServiceARN(testEnvName).Return(testSvcARN, nil) gomock.InOrder( m.spinner.EXPECT().Start("Resuming service phonetool in environment test."), m.serviceResumer.EXPECT().ResumeService(testSvcARN).Return(mockError), m.spinner.EXPECT().Stop(log.Serrorf("Failed to resume service phonetool in environment test: mockError\n")), ) }, wantedError: mockError, }, } for name, test := range tests { t.Run(name, func(t *testing.T) { ctrl := gomock.NewController(t) defer ctrl.Finish() // GIVEN mockstore := mocks.NewMockstore(ctrl) mockSpinner := mocks.NewMockprogress(ctrl) mockserviceResumer := mocks.NewMockserviceResumer(ctrl) mockapprunnerDescriber := mocks.NewMockapprunnerServiceDescriber(ctrl) mocks := &resumeSvcMocks{ store: mockstore, spinner: mockSpinner, serviceResumer: mockserviceResumer, apprunnerDescriber: mockapprunnerDescriber, } test.setupMocks(mocks) opts := resumeSvcOpts{ resumeSvcVars: resumeSvcVars{ appName: test.appName, envName: test.envName, svcName: test.svcName, }, store: mockstore, spinner: mockSpinner, serviceResumer: mockserviceResumer, apprunnerDescriber: mockapprunnerDescriber, initClients: func() error { return nil }, } // WHEN err := opts.Execute() // THEN if test.wantedError != nil { require.EqualError(t, err, test.wantedError.Error()) } else { require.NoError(t, err) } }) } }
280
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package cli import ( "errors" "fmt" "io" "strings" "unicode" "github.com/aws/aws-sdk-go/aws" "github.com/aws/aws-sdk-go/service/ssm" "github.com/aws/copilot-cli/internal/pkg/aws/identity" "github.com/aws/copilot-cli/internal/pkg/aws/sessions" "github.com/aws/copilot-cli/internal/pkg/manifest/manifestinfo" "github.com/aws/copilot-cli/internal/pkg/config" "github.com/aws/copilot-cli/internal/pkg/deploy" "github.com/aws/copilot-cli/internal/pkg/describe" "github.com/aws/copilot-cli/internal/pkg/term/color" "github.com/aws/copilot-cli/internal/pkg/term/log" "github.com/aws/copilot-cli/internal/pkg/term/prompt" "github.com/aws/copilot-cli/internal/pkg/term/selector" "github.com/spf13/cobra" ) const ( svcShowSvcNamePrompt = "Which service of %s would you like to show?" svcShowSvcNameHelpPrompt = "The details of a service will be shown (e.g., endpoint URL, CPU, Memory)." ) type showSvcVars struct { appName string svcName string shouldOutputJSON bool shouldOutputResources bool outputManifestForEnv string } type showSvcOpts struct { showSvcVars w io.Writer store store describer workloadDescriber sel configSelector initDescriber func() error // Overridden in tests. // Cached variables. targetSvc *config.Workload } func newShowSvcOpts(vars showSvcVars) (*showSvcOpts, error) { sessProvider := sessions.ImmutableProvider(sessions.UserAgentExtras("svc show")) defaultSess, err := sessProvider.Default() if err != nil { return nil, fmt.Errorf("default session: %v", err) } ssmStore := config.NewSSMStore(identity.New(defaultSess), ssm.New(defaultSess), aws.StringValue(defaultSess.Config.Region)) deployStore, err := deploy.NewStore(sessProvider, ssmStore) if err != nil { return nil, fmt.Errorf("connect to deploy store: %w", err) } opts := &showSvcOpts{ showSvcVars: vars, store: ssmStore, w: log.OutputWriter, sel: selector.NewConfigSelector(prompt.New(), ssmStore), } opts.initDescriber = func() error { var d workloadDescriber svc, err := opts.getTargetSvc() if err != nil { return err } config := describe.NewServiceConfig{ App: opts.appName, Svc: opts.svcName, ConfigStore: ssmStore, DeployStore: deployStore, EnableResources: opts.shouldOutputResources, } switch svc.Type { case manifestinfo.LoadBalancedWebServiceType: d, err = describe.NewLBWebServiceDescriber(config) case manifestinfo.RequestDrivenWebServiceType: d, err = describe.NewRDWebServiceDescriber(config) case manifestinfo.BackendServiceType: d, err = describe.NewBackendServiceDescriber(config) case manifestinfo.WorkerServiceType: d, err = describe.NewWorkerServiceDescriber(config) case manifestinfo.StaticSiteType: d, err = describe.NewStaticSiteDescriber(config) default: return fmt.Errorf(`service type %q is not supported for %s`, svc.Type, color.HighlightCode("svc show")) } if err != nil { return fmt.Errorf("creating describer for service %s in application %s: %w", opts.svcName, opts.appName, err) } opts.describer = d return nil } return opts, nil } // Validate returns an error for any invalid optional flags. func (o *showSvcOpts) Validate() error { return nil } // Ask prompts for and validates any required flags. func (o *showSvcOpts) Ask() error { if err := o.validateOrAskApp(); err != nil { return err } return o.validateOrAskSvcName() } // Execute shows the services through the prompt. func (o *showSvcOpts) Execute() error { if o.svcName == "" { return nil } if err := o.initDescriber(); err != nil { return err } if o.outputManifestForEnv != "" { return o.writeManifest() } svc, err := o.describer.Describe() if err != nil { return fmt.Errorf("describe service %s: %w", o.svcName, err) } if o.shouldOutputJSON { data, err := svc.JSONString() if err != nil { return err } fmt.Fprint(o.w, data) } else { fmt.Fprint(o.w, svc.HumanString()) } return nil } func (o *showSvcOpts) validateOrAskApp() error { if o.appName != "" { _, err := o.store.GetApplication(o.appName) return err } appName, err := o.sel.Application(svcAppNamePrompt, wkldAppNameHelpPrompt) if err != nil { return fmt.Errorf("select application name: %w", err) } o.appName = appName return nil } func (o *showSvcOpts) validateOrAskSvcName() error { if o.svcName != "" { _, err := o.getTargetSvc() return err } svcName, err := o.sel.Service(fmt.Sprintf(svcShowSvcNamePrompt, color.HighlightUserInput(o.appName)), svcShowSvcNameHelpPrompt, o.appName) if err != nil { return fmt.Errorf("select service for application %s: %w", o.appName, err) } o.svcName = svcName return nil } func (o *showSvcOpts) getTargetSvc() (*config.Workload, error) { if o.targetSvc != nil { return o.targetSvc, nil } svc, err := o.store.GetService(o.appName, o.svcName) if err != nil { return nil, err } o.targetSvc = svc return o.targetSvc, nil } func (o *showSvcOpts) writeManifest() error { out, err := o.describer.Manifest(o.outputManifestForEnv) if err != nil { var errNotFound *describe.ErrManifestNotFoundInTemplate if errors.As(err, &errNotFound) { log.Infof("You must deploy a new version of your service before printing its manifest:\n%s\n", color.HighlightCodeBlock(fmt.Sprintf(" copilot deploy -n %s -e %s", o.svcName, o.outputManifestForEnv))) } return fmt.Errorf("fetch manifest for service %q in environment %q: %v", o.svcName, o.outputManifestForEnv, err) } fmt.Fprintln(o.w, strings.TrimRightFunc(string(out), unicode.IsSpace)) return nil } // buildSvcShowCmd builds the command for showing services in an application. func buildSvcShowCmd() *cobra.Command { vars := showSvcVars{} cmd := &cobra.Command{ Use: "show", Short: "Shows info about a deployed service per environment.", Long: "Shows info about a deployed service, including endpoints, capacity and related resources per environment.", Example: ` Print service configuration in deployed environments. /code $ copilot svc show -n api Print manifest file used for deploying service "api" in the "prod" environment. /code $ copilot svc show -n api --manifest prod`, RunE: runCmdE(func(cmd *cobra.Command, args []string) error { opts, err := newShowSvcOpts(vars) if err != nil { return err } return run(opts) }), } cmd.Flags().StringVarP(&vars.appName, appFlag, appFlagShort, tryReadingAppName(), appFlagDescription) cmd.Flags().StringVarP(&vars.svcName, nameFlag, nameFlagShort, "", svcFlagDescription) cmd.Flags().BoolVar(&vars.shouldOutputJSON, jsonFlag, false, jsonFlagDescription) cmd.Flags().BoolVar(&vars.shouldOutputResources, resourcesFlag, false, svcResourcesFlagDescription) cmd.Flags().StringVar(&vars.outputManifestForEnv, manifestFlag, "", svcManifestFlagDescription) cmd.MarkFlagsMutuallyExclusive(jsonFlag, manifestFlag) cmd.MarkFlagsMutuallyExclusive(resourcesFlag, manifestFlag) return cmd }
239
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package cli import ( "bytes" "errors" "fmt" "testing" "github.com/golang/mock/gomock" "github.com/stretchr/testify/require" "github.com/aws/copilot-cli/internal/pkg/cli/mocks" "github.com/aws/copilot-cli/internal/pkg/config" ) type showSvcMocks struct { storeSvc *mocks.Mockstore describer *mocks.MockworkloadDescriber ws *mocks.MockwsSvcReader sel *mocks.MockconfigSelector } type mockDescribeData struct { data string err error } func (m *mockDescribeData) HumanString() string { return m.data } func (m *mockDescribeData) JSONString() (string, error) { return m.data, m.err } func TestSvcShow_Validate(t *testing.T) { // NOTE: no optional flag needs to be validated for this command. } func TestSvcShow_Ask(t *testing.T) { testCases := map[string]struct { inputApp string inputSvc string setupMocks func(mocks showSvcMocks) wantedApp string wantedSvc string wantedError error }{ "validate instead of prompting application name and svc name": { inputApp: "my-app", inputSvc: "my-svc", setupMocks: func(m showSvcMocks) { m.storeSvc.EXPECT().GetApplication("my-app").Return(&config.Application{}, nil) m.storeSvc.EXPECT().GetService("my-app", "my-svc").Return(&config.Workload{}, nil) }, wantedApp: "my-app", wantedSvc: "my-svc", }, "prompt for app name": { inputSvc: "my-svc", setupMocks: func(m showSvcMocks) { m.sel.EXPECT().Application(gomock.Any(), gomock.Any(), gomock.Any()).Return("my-app", nil) m.storeSvc.EXPECT().GetApplication("my-app").Times(0) m.storeSvc.EXPECT().GetService("my-app", "my-svc").AnyTimes() }, wantedApp: "my-app", wantedSvc: "my-svc", }, "error when fail to select apps": { inputSvc: "my-svc", setupMocks: func(m showSvcMocks) { m.sel.EXPECT().Application(svcAppNamePrompt, wkldAppNameHelpPrompt).Return("", errors.New("some error")) }, wantedError: fmt.Errorf("select application name: some error"), }, "prompt for service name": { inputApp: "my-app", setupMocks: func(m showSvcMocks) { m.sel.EXPECT().Service(fmt.Sprintf(svcShowSvcNamePrompt, "my-app"), svcShowSvcNameHelpPrompt, "my-app").Return("my-svc", nil) m.storeSvc.EXPECT().GetService("my-app", "my-svc").Times(0) m.storeSvc.EXPECT().GetApplication("my-app").AnyTimes() m.sel.EXPECT().Application(svcAppNamePrompt, wkldAppNameHelpPrompt).AnyTimes() }, wantedApp: "my-app", wantedSvc: "my-svc", }, "error when fail to select services": { setupMocks: func(m showSvcMocks) { gomock.InOrder( m.sel.EXPECT().Application(svcAppNamePrompt, wkldAppNameHelpPrompt).Return("my-app", nil), m.sel.EXPECT().Service(fmt.Sprintf(svcShowSvcNamePrompt, "my-app"), svcShowSvcNameHelpPrompt, "my-app").Return("", errors.New("some error")), ) }, wantedError: fmt.Errorf("select service for application my-app: some error"), }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { ctrl := gomock.NewController(t) defer ctrl.Finish() mockStoreReader := mocks.NewMockstore(ctrl) mockWorkspace := mocks.NewMockwsSvcReader(ctrl) mockSelector := mocks.NewMockconfigSelector(ctrl) mocks := showSvcMocks{ storeSvc: mockStoreReader, ws: mockWorkspace, sel: mockSelector, } tc.setupMocks(mocks) showSvcs := &showSvcOpts{ showSvcVars: showSvcVars{ svcName: tc.inputSvc, appName: tc.inputApp, }, store: mockStoreReader, sel: mockSelector, } // WHEN err := showSvcs.Ask() // THEN if tc.wantedError != nil { require.EqualError(t, err, tc.wantedError.Error()) } else { require.NoError(t, err) require.Equal(t, tc.wantedApp, showSvcs.appName, "expected app name to match") require.Equal(t, tc.wantedSvc, showSvcs.svcName, "expected service name to match") } }) } } func TestSvcShow_Execute(t *testing.T) { appName := "my-app" webSvc := mockDescribeData{ data: "mockData", err: errors.New("some error"), } testCases := map[string]struct { inputSvc string shouldOutputJSON bool outputManifestForEnv string setupMocks func(mocks showSvcMocks) wantedContent string wantedError error }{ "noop if service name is empty": { setupMocks: func(m showSvcMocks) { m.describer.EXPECT().Describe().Times(0) }, }, "print configuration by default": { inputSvc: "my-svc", setupMocks: func(m showSvcMocks) { gomock.InOrder( m.describer.EXPECT().Describe().Return(&webSvc, nil), ) }, wantedContent: "mockData", }, "print manifest file trimmed with spaces if --manifest is provided": { inputSvc: "my-svc", outputManifestForEnv: "test", setupMocks: func(m showSvcMocks) { m.describer.EXPECT().Manifest(gomock.Any()).Return([]byte("name: my-svc\n\n\n "), nil) }, wantedContent: "name: my-svc\n", }, "return error if fail to generate JSON output": { inputSvc: "my-svc", shouldOutputJSON: true, setupMocks: func(m showSvcMocks) { gomock.InOrder( m.describer.EXPECT().Describe().Return(&webSvc, nil), ) }, wantedError: fmt.Errorf("some error"), }, "return error if fail to describe service": { inputSvc: "my-svc", setupMocks: func(m showSvcMocks) { gomock.InOrder( m.describer.EXPECT().Describe().Return(nil, errors.New("some error")), ) }, wantedError: fmt.Errorf("describe service my-svc: some error"), }, "return wrapped error if --manifest is provided and stack cannot be retrieved": { inputSvc: "my-svc", outputManifestForEnv: "test", setupMocks: func(m showSvcMocks) { m.describer.EXPECT().Manifest(gomock.Any()).Return(nil, errors.New("some error")) }, wantedError: errors.New(`fetch manifest for service "my-svc" in environment "test": some error`), }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { ctrl := gomock.NewController(t) defer ctrl.Finish() b := &bytes.Buffer{} mockSvcDescriber := mocks.NewMockworkloadDescriber(ctrl) mocks := showSvcMocks{ describer: mockSvcDescriber, } tc.setupMocks(mocks) showSvcs := &showSvcOpts{ showSvcVars: showSvcVars{ appName: appName, svcName: tc.inputSvc, shouldOutputJSON: tc.shouldOutputJSON, outputManifestForEnv: tc.outputManifestForEnv, }, describer: mockSvcDescriber, initDescriber: func() error { return nil }, w: b, } // WHEN err := showSvcs.Execute() // THEN if tc.wantedError != nil { require.EqualError(t, err, tc.wantedError.Error()) } else { require.NoError(t, err) require.Equal(t, tc.wantedContent, b.String(), "expected output content match") } }) } }
258
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package cli import ( "fmt" "io" "github.com/aws/aws-sdk-go/aws" "github.com/aws/aws-sdk-go/service/ssm" "github.com/aws/copilot-cli/internal/pkg/aws/identity" "github.com/aws/copilot-cli/internal/pkg/aws/sessions" "github.com/aws/copilot-cli/internal/pkg/manifest/manifestinfo" "github.com/aws/copilot-cli/internal/pkg/config" "github.com/aws/copilot-cli/internal/pkg/deploy" "github.com/aws/copilot-cli/internal/pkg/describe" "github.com/aws/copilot-cli/internal/pkg/term/log" "github.com/aws/copilot-cli/internal/pkg/term/prompt" "github.com/aws/copilot-cli/internal/pkg/term/selector" "github.com/spf13/cobra" ) const ( svcStatusNamePrompt = "Which service's status would you like to show?" svcStatusNameHelpPrompt = "Displays the service's task status, most recent deployment and alarm statuses." ) type svcStatusVars struct { shouldOutputJSON bool svcName string envName string appName string } type svcStatusOpts struct { svcStatusVars w io.Writer store store statusDescriber statusDescriber sel deploySelector initStatusDescriber func(*svcStatusOpts) error } func newSvcStatusOpts(vars svcStatusVars) (*svcStatusOpts, error) { sessProvider := sessions.ImmutableProvider(sessions.UserAgentExtras("svc status")) defaultSess, err := sessProvider.Default() if err != nil { return nil, fmt.Errorf("default session: %v", err) } configStore := config.NewSSMStore(identity.New(defaultSess), ssm.New(defaultSess), aws.StringValue(defaultSess.Config.Region)) deployStore, err := deploy.NewStore(sessProvider, configStore) if err != nil { return nil, fmt.Errorf("connect to deploy store: %w", err) } return &svcStatusOpts{ svcStatusVars: vars, store: configStore, w: log.OutputWriter, sel: selector.NewDeploySelect(prompt.New(), configStore, deployStore), initStatusDescriber: func(o *svcStatusOpts) error { wkld, err := configStore.GetWorkload(o.appName, o.svcName) if err != nil { return fmt.Errorf("retrieve %s from application %s: %w", o.appName, o.svcName, err) } switch wkld.Type { case manifestinfo.RequestDrivenWebServiceType: d, err := describe.NewAppRunnerStatusDescriber(&describe.NewServiceStatusConfig{ App: o.appName, Env: o.envName, Svc: o.svcName, ConfigStore: configStore, }) if err != nil { return fmt.Errorf("create status describer for App Runner service %s in application %s: %w", o.svcName, o.appName, err) } o.statusDescriber = d case manifestinfo.StaticSiteType: d, err := describe.NewStaticSiteStatusDescriber(&describe.NewServiceStatusConfig{ App: o.appName, Env: o.envName, Svc: o.svcName, ConfigStore: configStore, }) if err != nil { return fmt.Errorf("create status describer for Static Site service %s in application %s: %w", o.svcName, o.appName, err) } o.statusDescriber = d default: d, err := describe.NewECSStatusDescriber(&describe.NewServiceStatusConfig{ App: o.appName, Env: o.envName, Svc: o.svcName, ConfigStore: configStore, }) if err != nil { return fmt.Errorf("create status describer for service %s in application %s: %w", o.svcName, o.appName, err) } o.statusDescriber = d } return nil }, }, nil } // Validate returns an error for any invalid optional flags. func (o *svcStatusOpts) Validate() error { return nil } // Ask prompts for and validates any required flags. func (o *svcStatusOpts) Ask() error { if err := o.validateOrAskApp(); err != nil { return err } return o.validateAndAskSvcEnvName() } // Execute displays the status of the service. func (o *svcStatusOpts) Execute() error { err := o.initStatusDescriber(o) if err != nil { return err } svcStatus, err := o.statusDescriber.Describe() if err != nil { return fmt.Errorf("describe status of service %s: %w", o.svcName, err) } if o.shouldOutputJSON { data, err := svcStatus.JSONString() if err != nil { return err } fmt.Fprint(o.w, data) } else { fmt.Fprint(o.w, svcStatus.HumanString()) } return nil } func (o *svcStatusOpts) validateOrAskApp() error { if o.appName != "" { _, err := o.store.GetApplication(o.appName) return err } app, err := o.sel.Application(svcAppNamePrompt, wkldAppNameHelpPrompt) if err != nil { return fmt.Errorf("select application: %w", err) } o.appName = app return nil } func (o *svcStatusOpts) validateAndAskSvcEnvName() error { if o.envName != "" { if _, err := o.store.GetEnvironment(o.appName, o.envName); err != nil { return err } } if o.svcName != "" { if _, err := o.store.GetService(o.appName, o.svcName); err != nil { return err } } // Note: we let prompter handle the case when there is only option for user to choose from. // This is naturally the case when `o.envName != "" && o.svcName != ""`. deployedService, err := o.sel.DeployedService(svcStatusNamePrompt, svcStatusNameHelpPrompt, o.appName, selector.WithEnv(o.envName), selector.WithName(o.svcName)) if err != nil { return fmt.Errorf("select deployed services for application %s: %w", o.appName, err) } o.svcName = deployedService.Name o.envName = deployedService.Env return nil } // buildSvcStatusCmd builds the command for showing the status of a deployed service. func buildSvcStatusCmd() *cobra.Command { vars := svcStatusVars{} cmd := &cobra.Command{ Use: "status", Short: "Shows status of a deployed service.", Long: "Shows status of a deployed service's task status, most recent deployment and alarm statuses.", Example: ` Shows status of the deployed service "my-svc" /code $ copilot svc status -n my-svc`, RunE: runCmdE(func(cmd *cobra.Command, args []string) error { opts, err := newSvcStatusOpts(vars) if err != nil { return err } return run(opts) }), } cmd.Flags().StringVarP(&vars.svcName, nameFlag, nameFlagShort, "", svcFlagDescription) cmd.Flags().StringVarP(&vars.envName, envFlag, envFlagShort, "", envFlagDescription) cmd.Flags().StringVarP(&vars.appName, appFlag, appFlagShort, tryReadingAppName(), appFlagDescription) cmd.Flags().BoolVar(&vars.shouldOutputJSON, jsonFlag, false, jsonFlagDescription) return cmd }
206
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package cli import ( "bytes" "errors" "fmt" "testing" "github.com/golang/mock/gomock" "github.com/stretchr/testify/require" "github.com/aws/copilot-cli/internal/pkg/cli/mocks" "github.com/aws/copilot-cli/internal/pkg/config" "github.com/aws/copilot-cli/internal/pkg/term/selector" ) func TestSvcStatus_Validate(t *testing.T) { // NOTE: No optional flag to `copilot svc pause` needs to be validated. } type svcStatusAskMock struct { store *mocks.Mockstore sel *mocks.MockdeploySelector } func TestSvcStatus_Ask(t *testing.T) { const ( testAppName = "phonetool" testEnvName = "test" testSvcName = "api" ) mockError := errors.New("some error") testCases := map[string]struct { inputApp string inputSvc string inputEnv string setupMocks func(m svcStatusAskMock) wantedApp string wantedEnv string wantedSvc string wantedError error }{ "validate app env and svc with all flags passed in": { inputApp: testAppName, inputSvc: testSvcName, inputEnv: testEnvName, setupMocks: func(m svcStatusAskMock) { gomock.InOrder( m.store.EXPECT().GetApplication("phonetool").Return(&config.Application{Name: "phonetool"}, nil), m.store.EXPECT().GetEnvironment("phonetool", "test").Return(&config.Environment{Name: "test"}, nil), m.store.EXPECT().GetService("phonetool", "api").Return(&config.Workload{}, nil), ) m.sel.EXPECT().DeployedService(svcStatusNamePrompt, svcStatusNameHelpPrompt, "phonetool", gomock.Any(), gomock.Any()). Return(&selector.DeployedService{ Env: "test", Name: "api", }, nil) // Let prompter handles the case when svc(env) is definite. }, wantedApp: testAppName, wantedEnv: testEnvName, wantedSvc: testSvcName, }, "prompt for app name": { inputEnv: testEnvName, inputSvc: testSvcName, setupMocks: func(m svcStatusAskMock) { m.sel.EXPECT().Application(svcAppNamePrompt, wkldAppNameHelpPrompt).Return("phonetool", nil) m.store.EXPECT().GetApplication(gomock.Any()).Times(0) m.store.EXPECT().GetEnvironment(gomock.Any(), gomock.Any()).AnyTimes() m.store.EXPECT().GetService(gomock.Any(), gomock.Any()).AnyTimes() m.sel.EXPECT().DeployedService(gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any()). Return(&selector.DeployedService{ Env: testEnvName, Name: testSvcName, }, nil).AnyTimes() }, wantedApp: testAppName, wantedEnv: testEnvName, wantedSvc: testSvcName, }, "errors if failed to select application": { setupMocks: func(m svcStatusAskMock) { m.sel.EXPECT().Application(svcAppNamePrompt, wkldAppNameHelpPrompt).Return("", errors.New("some error")) }, wantedError: fmt.Errorf("select application: some error"), }, "prompt for service and env": { inputApp: testAppName, setupMocks: func(m svcStatusAskMock) { m.store.EXPECT().GetApplication(gomock.Any()).AnyTimes() m.store.EXPECT().GetEnvironment(gomock.Any(), gomock.Any()).Times(0) m.store.EXPECT().GetService(gomock.Any(), gomock.Any()).Times(0) m.sel.EXPECT().DeployedService(svcStatusNamePrompt, svcStatusNameHelpPrompt, testAppName, gomock.Any(), gomock.Any()). Return(&selector.DeployedService{ Env: testEnvName, Name: testSvcName, }, nil) }, wantedApp: testAppName, wantedEnv: testEnvName, wantedSvc: testSvcName, }, "errors if failed to select deployed service": { inputApp: "mockApp", setupMocks: func(m svcStatusAskMock) { m.store.EXPECT().GetApplication(gomock.Any()).AnyTimes() m.store.EXPECT().GetEnvironment(gomock.Any(), gomock.Any()).Times(0) m.store.EXPECT().GetService(gomock.Any(), gomock.Any()).Times(0) m.sel.EXPECT().DeployedService(svcStatusNamePrompt, svcStatusNameHelpPrompt, "mockApp", gomock.Any(), gomock.Any()).Return(nil, mockError) }, wantedError: fmt.Errorf("select deployed services for application mockApp: some error"), }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { ctrl := gomock.NewController(t) defer ctrl.Finish() m := svcStatusAskMock{ store: mocks.NewMockstore(ctrl), sel: mocks.NewMockdeploySelector(ctrl), } tc.setupMocks(m) svcStatus := &svcStatusOpts{ svcStatusVars: svcStatusVars{ svcName: tc.inputSvc, envName: tc.inputEnv, appName: tc.inputApp, }, sel: m.sel, store: m.store, } // WHEN err := svcStatus.Ask() // THEN if tc.wantedError != nil { require.EqualError(t, err, tc.wantedError.Error()) } else { require.NoError(t, err) require.Equal(t, tc.wantedApp, svcStatus.appName, "expected app name to match") require.Equal(t, tc.wantedSvc, svcStatus.svcName, "expected service name to match") require.Equal(t, tc.wantedEnv, svcStatus.envName, "expected service name to match") } }) } } func TestSvcStatus_Execute(t *testing.T) { mockError := errors.New("some error") testCases := map[string]struct { shouldOutputJSON bool mockStatusDescriber func(m *mocks.MockstatusDescriber) wantedError error }{ "errors if failed to describe the status of the service": { mockStatusDescriber: func(m *mocks.MockstatusDescriber) { m.EXPECT().Describe().Return(nil, mockError) }, wantedError: fmt.Errorf("describe status of service mockSvc: some error"), }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { ctrl := gomock.NewController(t) defer ctrl.Finish() b := &bytes.Buffer{} mockStatusDescriber := mocks.NewMockstatusDescriber(ctrl) tc.mockStatusDescriber(mockStatusDescriber) svcStatus := &svcStatusOpts{ svcStatusVars: svcStatusVars{ svcName: "mockSvc", envName: "mockEnv", shouldOutputJSON: tc.shouldOutputJSON, appName: "mockApp", }, statusDescriber: mockStatusDescriber, initStatusDescriber: func(*svcStatusOpts) error { return nil }, w: b, } // WHEN err := svcStatus.Execute() // THEN if tc.wantedError != nil { require.EqualError(t, err, tc.wantedError.Error()) } else { require.NoError(t, err) require.NotEmpty(t, b.String(), "expected output content to not be empty") } }) } }
205
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package cli import ( "github.com/aws/copilot-cli/cmd/copilot/template" "github.com/aws/copilot-cli/internal/pkg/cli/group" "github.com/spf13/cobra" ) // BuildTaskCmd is the top level command for task. func BuildTaskCmd() *cobra.Command { cmd := &cobra.Command{ Use: "task", Short: `Commands for tasks. One-off Amazon ECS tasks that terminate once their work is done.`, } cmd.AddCommand(BuildTaskRunCmd()) cmd.AddCommand(buildTaskExecCmd()) cmd.AddCommand(BuildTaskDeleteCmd()) cmd.SetUsageTemplate(template.Usage) cmd.Annotations = map[string]string{ "group": group.Develop, } return cmd }
30
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package cli import ( "errors" "fmt" "os" "github.com/aws/copilot-cli/internal/pkg/aws/s3" "github.com/spf13/afero" "github.com/aws/aws-sdk-go/service/ssm" "github.com/aws/copilot-cli/internal/pkg/aws/identity" "github.com/aws/aws-sdk-go/aws" "github.com/aws/aws-sdk-go/aws/session" awscfn "github.com/aws/copilot-cli/internal/pkg/aws/cloudformation" "github.com/aws/copilot-cli/internal/pkg/aws/ecr" "github.com/aws/copilot-cli/internal/pkg/aws/sessions" "github.com/aws/copilot-cli/internal/pkg/config" "github.com/aws/copilot-cli/internal/pkg/deploy" "github.com/aws/copilot-cli/internal/pkg/deploy/cloudformation" "github.com/aws/copilot-cli/internal/pkg/ecs" "github.com/aws/copilot-cli/internal/pkg/term/color" "github.com/aws/copilot-cli/internal/pkg/term/log" termprogress "github.com/aws/copilot-cli/internal/pkg/term/progress" "github.com/aws/copilot-cli/internal/pkg/term/prompt" "github.com/aws/copilot-cli/internal/pkg/term/selector" "github.com/aws/copilot-cli/internal/pkg/workspace" "github.com/spf13/cobra" ) const ( taskDeleteNamePrompt = "Which task would you like to delete?" taskDeleteAppPrompt = "Which application would you like to delete a task from?" taskDeleteEnvPrompt = "Which environment would you like to delete a task from?" fmtTaskDeleteDefaultConfirmPrompt = "Are you sure you want to delete %s from the default cluster?" fmtTaskDeleteFromEnvConfirmPrompt = "Are you sure you want to delete %s from application %s and environment %s?" taskDeleteConfirmHelp = "This will delete the task's stack and stop all current executions." ) var errTaskDeleteCancelled = errors.New("task delete cancelled - no changes made") type deleteTaskVars struct { name string app string env string skipConfirmation bool defaultCluster bool } type deleteTaskOpts struct { deleteTaskVars wsAppName string // Dependencies to interact with other modules store store prompt prompter spinner progress provider sessionProvider sel wsSelector // Generators for env-specific clients newTaskSel func(session *session.Session) cfTaskSelector newTaskStopper func(session *session.Session) taskStopper newImageRemover func(session *session.Session) imageRemover newBucketEmptier func(session *session.Session) bucketEmptier newStackManager func(session *session.Session) taskStackManager // Cached variables session *session.Session stackInfo *deploy.TaskStackInfo } func newDeleteTaskOpts(vars deleteTaskVars) (*deleteTaskOpts, error) { ws, err := workspace.Use(afero.NewOsFs()) if err != nil { return nil, err } sessProvider := sessions.ImmutableProvider(sessions.UserAgentExtras("task delete")) defaultSess, err := sessProvider.Default() if err != nil { return nil, fmt.Errorf("default session: %v", err) } store := config.NewSSMStore(identity.New(defaultSess), ssm.New(defaultSess), aws.StringValue(defaultSess.Config.Region)) prompter := prompt.New() return &deleteTaskOpts{ deleteTaskVars: vars, wsAppName: tryReadingAppName(), store: store, spinner: termprogress.NewSpinner(log.DiagnosticWriter), prompt: prompter, provider: sessProvider, sel: selector.NewLocalWorkloadSelector(prompter, store, ws), newTaskSel: func(session *session.Session) cfTaskSelector { cfn := cloudformation.New(session, cloudformation.WithProgressTracker(os.Stderr)) return selector.NewCFTaskSelect(prompter, store, cfn) }, newTaskStopper: func(session *session.Session) taskStopper { return ecs.New(session) }, newStackManager: func(session *session.Session) taskStackManager { return cloudformation.New(session, cloudformation.WithProgressTracker(os.Stderr)) }, newImageRemover: func(session *session.Session) imageRemover { return ecr.New(session) }, newBucketEmptier: func(session *session.Session) bucketEmptier { return s3.New(session) }, }, nil } // Validate checks that flag inputs are valid. func (o *deleteTaskOpts) Validate() error { if o.name != "" { if err := basicNameValidation(o.name); err != nil { return err } } // If default flag specified, if err := o.validateFlagsWithDefaultCluster(); err != nil { return err } if err := o.validateFlagsWithEnv(); err != nil { return err } return nil } func (o *deleteTaskOpts) validateFlagsWithEnv() error { if o.app != "" { if _, err := o.store.GetApplication(o.app); err != nil { return fmt.Errorf("get application: %w", err) } } if o.app != "" && o.env != "" { if _, err := o.store.GetEnvironment(o.app, o.env); err != nil { return fmt.Errorf("get environment: %w", err) } if err := o.validateTaskName(); err != nil { return fmt.Errorf("get task: %w", err) } } return nil } func (o *deleteTaskOpts) validateTaskName() error { if o.name != "" { // If fully specified, validate that the stack exists and is a task. // This check prevents the command from stopping arbitrary tasks or emptying arbitrary ECR // repositories. _, err := o.getTaskInfo() if err != nil { return err } } return nil } func (o *deleteTaskOpts) validateFlagsWithDefaultCluster() error { if !o.defaultCluster { return nil } // If app is specified and the same as the workspace app, don't throw an error. // If app is not the same as the workspace app, either // a) there is no WS app and it's specified erroneously, in which case we should error // b) there is a WS app and the flag has been set to a different app, in which case we should error. // The app flag defaults to the WS app so there's an edge case where it's possible to specify // `copilot task delete --app ws-app --default` and not error out, but this should be taken as // specifying "default". if o.app != o.wsAppName { return fmt.Errorf("cannot specify both `--app` and `--default`") } if o.env != "" { return fmt.Errorf("cannot specify both `--env` and `--default`") } if err := o.validateTaskName(); err != nil { return fmt.Errorf("get task: %w", err) } return nil } func (o *deleteTaskOpts) askAppName() error { if o.defaultCluster { return nil } if o.app != "" { return nil } app, err := o.sel.Application(taskDeleteAppPrompt, "", appEnvOptionNone) if err != nil { return fmt.Errorf("select application name: %w", err) } if app == appEnvOptionNone { o.env = "" o.defaultCluster = true return nil } o.app = app return nil } func (o *deleteTaskOpts) askEnvName() error { if o.defaultCluster { return nil } if o.env != "" { return nil } env, err := o.sel.Environment(taskDeleteEnvPrompt, "", o.app, appEnvOptionNone) if err != nil { return fmt.Errorf("select environment: %w", err) } if env == appEnvOptionNone { o.env = "" o.app = "" o.defaultCluster = true return nil } o.env = env return nil } // Ask prompts for missing information and fills in gaps. func (o *deleteTaskOpts) Ask() error { if err := o.askAppName(); err != nil { return err } if err := o.askEnvName(); err != nil { return err } if err := o.askTaskName(); err != nil { return err } if o.skipConfirmation { return nil } // Confirm deletion deletePrompt := fmt.Sprintf(fmtTaskDeleteDefaultConfirmPrompt, color.HighlightUserInput(o.name)) if o.env != "" && o.app != "" { deletePrompt = fmt.Sprintf( fmtTaskDeleteFromEnvConfirmPrompt, color.HighlightUserInput(o.name), color.HighlightUserInput(o.app), color.HighlightUserInput(o.env), ) } deleteConfirmed, err := o.prompt.Confirm( deletePrompt, taskDeleteConfirmHelp, prompt.WithConfirmFinalMessage()) if err != nil { return fmt.Errorf("task delete confirmation prompt: %w", err) } if !deleteConfirmed { return errTaskDeleteCancelled } return nil } func (o *deleteTaskOpts) getSession() (*session.Session, error) { if o.session != nil { return o.session, nil } if o.defaultCluster { sess, err := o.provider.Default() if err != nil { return nil, err } o.session = sess return sess, nil } // Get environment manager role for deleting stack. env, err := o.store.GetEnvironment(o.app, o.env) if err != nil { return nil, err } sess, err := o.provider.FromRole(env.ManagerRoleARN, env.Region) if err != nil { return nil, err } o.session = sess return sess, nil } func (o *deleteTaskOpts) askTaskName() error { if o.name != "" { return nil } sess, err := o.getSession() if err != nil { return fmt.Errorf("get task select session: %w", err) } sel := o.newTaskSel(sess) if o.defaultCluster { task, err := sel.Task(taskDeleteNamePrompt, "", selector.TaskWithDefaultCluster()) if err != nil { return fmt.Errorf("select task from default cluster: %w", err) } o.name = task return nil } task, err := sel.Task(taskDeleteNamePrompt, "", selector.TaskWithAppEnv(o.app, o.env)) if err != nil { return fmt.Errorf("select task from environment: %w", err) } o.name = task return nil } func (o *deleteTaskOpts) Execute() error { if err := o.stopTasks(); err != nil { return err } if err := o.clearECRRepository(); err != nil { return err } if err := o.deleteStack(); err != nil { return err } return nil } func (o *deleteTaskOpts) stopTasks() error { sess, err := o.getSession() if err != nil { return fmt.Errorf("get session: %w", err) } o.spinner.Start(fmt.Sprintf("Stopping all running tasks in family %s.", color.HighlightUserInput(o.name))) // Stop tasks. if o.defaultCluster { if err = o.newTaskStopper(sess).StopDefaultClusterTasks(o.name); err != nil { o.spinner.Stop(log.Serrorln("Error stopping running tasks in default cluster.")) return fmt.Errorf("stop running tasks in family %s: %w", o.name, err) } } else { if err = o.newTaskStopper(sess).StopOneOffTasks(o.app, o.env, o.name); err != nil { o.spinner.Stop(log.Serrorln("Error stopping running tasks in environment.")) return fmt.Errorf("stop running tasks in family %s: %w", o.name, err) } } o.spinner.Stop(log.Ssuccessf("Stopped all running tasks in family %s.\n", color.HighlightUserInput(o.name))) return nil } func (o *deleteTaskOpts) clearECRRepository() error { // ECR Deletion happens from the default profile in app delete. We can do it here too by getting // a default session in whichever region we're deleting from. var defaultSess *session.Session var err error defaultSess, err = o.getSession() if err != nil { return err } if !o.defaultCluster { regionalSession, err := o.getSession() if err != nil { return err } defaultSess, err = o.provider.DefaultWithRegion(aws.StringValue(regionalSession.Config.Region)) if err != nil { return fmt.Errorf("get default session for ECR deletion: %s", err) } } // Best effort to construct ECR repo name. ecrRepoName := fmt.Sprintf(deploy.FmtTaskECRRepoName, o.name) o.spinner.Start(fmt.Sprintf("Emptying ECR repository for task %s.", color.HighlightUserInput(o.name))) err = o.newImageRemover(defaultSess).ClearRepository(ecrRepoName) if err != nil { o.spinner.Stop(log.Serrorln("Error emptying ECR repository.")) return fmt.Errorf("empty ECR repository for task %s: %w", o.name, err) } o.spinner.Stop(log.Ssuccessf("Emptied ECR repository for task %s.\n", color.HighlightUserInput(o.name))) return nil } func (o *deleteTaskOpts) emptyS3Bucket(info *deploy.TaskStackInfo) error { o.spinner.Start(fmt.Sprintf("Emptying S3 bucket for task %s.", color.HighlightUserInput(o.name))) err := o.newBucketEmptier(o.session).EmptyBucket(info.BucketName) if err != nil { o.spinner.Stop(log.Serrorln("Error emptying S3 bucket.")) return fmt.Errorf("empty S3 bucket for task %s: %w", o.name, err) } o.spinner.Stop(log.Ssuccessf("Emptied S3 bucket for task %s.\n", color.HighlightUserInput(o.name))) return nil } // getTaskInfo returns a struct of information about the task, including the app and env it's deployed to, if // applicable, and the ARN of any CF role it's associated with. func (o *deleteTaskOpts) getTaskInfo() (*deploy.TaskStackInfo, error) { if o.stackInfo != nil { return o.stackInfo, nil } sess, err := o.getSession() if err != nil { return nil, err } info, err := o.newStackManager(sess).GetTaskStack(o.name) if err != nil { return nil, err } o.stackInfo = info return info, nil } func (o *deleteTaskOpts) deleteStack() error { sess, err := o.getSession() if err != nil { return err } info, err := o.getTaskInfo() if err != nil { // If the stack doesn't exist, don't error. var errStackNotExist *awscfn.ErrStackNotFound if errors.As(err, &errStackNotExist) { return nil } return err } if info == nil { // Stack does not exist; skip deleting it. return nil } if info.BucketName != "" { if err := o.emptyS3Bucket(info); err != nil { return err } } o.spinner.Start(fmt.Sprintf("Deleting CloudFormation stack for task %s.", color.HighlightUserInput(o.name))) err = o.newStackManager(sess).DeleteTask(*info) if err != nil { o.spinner.Stop(log.Serrorln("Error deleting CloudFormation stack.")) return fmt.Errorf("delete stack for task %s: %w", o.name, err) } o.spinner.Stop(log.Ssuccessf("Deleted resources of task %s.\n", color.HighlightUserInput(o.name))) return nil } func (o *deleteTaskOpts) RecommendActions() error { return nil } // BuildTaskDeleteCmd builds the command to delete application(s). func BuildTaskDeleteCmd() *cobra.Command { vars := deleteTaskVars{} cmd := &cobra.Command{ Use: "delete", Short: "Deletes a one-off task from an application or default cluster.", Example: ` Delete the "test" task from the default cluster. /code $ copilot task delete --name test --default Delete the "db-migrate" task from the prod environment. /code $ copilot task delete --name db-migrate --env prod Delete the "test" task without confirmation prompt. /code $ copilot task delete --name test --yes`, RunE: runCmdE(func(cmd *cobra.Command, args []string) error { opts, err := newDeleteTaskOpts(vars) if err != nil { return err } return run(opts) }), } cmd.Flags().StringVarP(&vars.app, appFlag, appFlagShort, tryReadingAppName(), appFlagDescription) cmd.Flags().StringVarP(&vars.name, nameFlag, nameFlagShort, "", svcFlagDescription) cmd.Flags().StringVarP(&vars.env, envFlag, envFlagShort, "", envFlagDescription) cmd.Flags().BoolVar(&vars.skipConfirmation, yesFlag, false, yesFlagDescription) cmd.Flags().BoolVar(&vars.defaultCluster, taskDefaultFlag, false, taskDeleteDefaultFlagDescription) return cmd }
509
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package cli import ( "errors" "testing" "github.com/aws/aws-sdk-go/aws" "github.com/aws/aws-sdk-go/aws/session" awscfn "github.com/aws/copilot-cli/internal/pkg/aws/cloudformation" "github.com/aws/copilot-cli/internal/pkg/cli/mocks" "github.com/aws/copilot-cli/internal/pkg/config" "github.com/aws/copilot-cli/internal/pkg/deploy" "github.com/golang/mock/gomock" "github.com/stretchr/testify/require" ) type validateMocks struct { store *mocks.Mockstore cfn *mocks.MocktaskStackManager provider *mocks.MocksessionProvider } func TestDeleteTaskOpts_Validate(t *testing.T) { testCases := map[string]struct { inAppName string inEnvName string inName string inDefaultCluster bool setupMocks func(m validateMocks) want error }{ "with only app flag": { inAppName: "phonetool", setupMocks: func(m validateMocks) { m.store.EXPECT().GetApplication("phonetool").Return(&config.Application{Name: "phonetool"}, nil) }, want: nil, }, "with no flags": { setupMocks: func(m validateMocks) {}, want: nil, }, "with app/env flags set": { inAppName: "phonetool", inEnvName: "test", setupMocks: func(m validateMocks) { m.store.EXPECT().GetApplication("phonetool").Return(&config.Application{Name: "phonetool"}, nil) m.store.EXPECT().GetEnvironment("phonetool", "test").Return(&config.Environment{Name: "test", App: "phonetool"}, nil) }, want: nil, }, "with all flags": { inAppName: "phonetool", inEnvName: "test", inName: "oneoff", setupMocks: func(m validateMocks) { m.store.EXPECT().GetApplication("phonetool").Return(&config.Application{Name: "phonetool"}, nil) m.store.EXPECT().GetEnvironment("phonetool", "test").Return(&config.Environment{Name: "test", App: "phonetool"}, nil) m.store.EXPECT().GetEnvironment("phonetool", "test").Return(&config.Environment{Name: "test", App: "phonetool"}, nil) m.provider.EXPECT().FromRole(gomock.Any(), gomock.Any()).Return(&session.Session{}, nil) m.cfn.EXPECT().GetTaskStack("oneoff") }, want: nil, }, "task does not exist": { inAppName: "phonetool", inEnvName: "test", inName: "oneoff", want: errors.New("get task: some error"), setupMocks: func(m validateMocks) { m.store.EXPECT().GetApplication("phonetool").Return(&config.Application{Name: "phonetool"}, nil) m.store.EXPECT().GetEnvironment("phonetool", "test").Return(&config.Environment{Name: "test", App: "phonetool"}, nil) m.store.EXPECT().GetEnvironment("phonetool", "test").Return(&config.Environment{Name: "test", App: "phonetool"}, nil) m.provider.EXPECT().FromRole(gomock.Any(), gomock.Any()).Return(&session.Session{}, nil) m.cfn.EXPECT().GetTaskStack("oneoff").Return(nil, errors.New("some error")) }, }, "with default cluster flag set": { inDefaultCluster: true, inName: "oneoff", setupMocks: func(m validateMocks) { m.provider.EXPECT().Default().Return(&session.Session{}, nil) m.cfn.EXPECT().GetTaskStack("oneoff") }, want: nil, }, "with default cluster and env flag": { inDefaultCluster: true, inEnvName: "test", inAppName: "phonetool", setupMocks: func(m validateMocks) {}, want: errors.New("cannot specify both `--app` and `--default`"), }, "with error getting app": { inAppName: "phonetool", inEnvName: "test", setupMocks: func(m validateMocks) { m.store.EXPECT().GetApplication("phonetool").Return(nil, errors.New("some error")) }, want: errors.New("get application: some error"), }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { // GIVEN ctrl := gomock.NewController(t) defer ctrl.Finish() mockstore := mocks.NewMockstore(ctrl) mocktaskStackManager := mocks.NewMocktaskStackManager(ctrl) mocks := validateMocks{ store: mockstore, cfn: mocktaskStackManager, provider: mocks.NewMocksessionProvider(ctrl), } tc.setupMocks(mocks) opts := deleteTaskOpts{ deleteTaskVars: deleteTaskVars{ skipConfirmation: false, app: tc.inAppName, env: tc.inEnvName, name: tc.inName, defaultCluster: tc.inDefaultCluster, }, store: mockstore, newStackManager: func(_ *session.Session) taskStackManager { return mocktaskStackManager }, provider: mocks.provider, } // WHEN err := opts.Validate() // THEN if tc.want != nil { require.EqualError(t, err, tc.want.Error()) } else { require.NoError(t, err) } }) } } func TestDeleteTaskOpts_Ask(t *testing.T) { testCases := map[string]struct { inAppName string inEnvName string inName string inDefaultCluster bool inSkipConfirmation bool mockStore func(m *mocks.Mockstore) mockSel func(m *mocks.MockwsSelector) mockTaskSelect func(m *mocks.MockcfTaskSelector) mockSess func(m *mocks.MocksessionProvider) mockPrompter func(m *mocks.Mockprompter) wantErr string }{ "all flags specified": { inAppName: "phonetool", inEnvName: "test", inName: "abcd", inSkipConfirmation: true, mockStore: func(m *mocks.Mockstore) {}, mockSel: func(m *mocks.MockwsSelector) {}, mockTaskSelect: func(m *mocks.MockcfTaskSelector) {}, mockSess: func(m *mocks.MocksessionProvider) {}, mockPrompter: func(m *mocks.Mockprompter) {}, }, "name flag not specified": { inAppName: "phonetool", inEnvName: "test", mockStore: func(m *mocks.Mockstore) { // This call is in GetSession when an environment is specified and we need to get the Manager Role's session. m.EXPECT().GetEnvironment("phonetool", "test").Return(&config.Environment{Name: "test", App: "phonetool"}, nil) }, mockSel: func(m *mocks.MockwsSelector) {}, mockTaskSelect: func(m *mocks.MockcfTaskSelector) { m.EXPECT().Task(taskDeleteNamePrompt, "", gomock.Any()).Return("abc", nil) }, mockSess: func(m *mocks.MocksessionProvider) { m.EXPECT().FromRole(gomock.Any(), gomock.Any()).Return(&session.Session{}, nil) }, mockPrompter: func(m *mocks.Mockprompter) { m.EXPECT().Confirm("Are you sure you want to delete abc from application phonetool and environment test?", gomock.Any(), gomock.Any()).Return(true, nil) }, }, "name flag not specified and confirm cancelled": { inAppName: "phonetool", inEnvName: "test", mockStore: func(m *mocks.Mockstore) { // This call is in GetSession when an environment is specified and we need to get the Manager Role's session. m.EXPECT().GetEnvironment("phonetool", "test").Return(&config.Environment{Name: "test", App: "phonetool"}, nil) }, mockSel: func(m *mocks.MockwsSelector) {}, mockTaskSelect: func(m *mocks.MockcfTaskSelector) { m.EXPECT().Task(taskDeleteNamePrompt, "", gomock.Any()).Return("abc", nil) }, mockSess: func(m *mocks.MocksessionProvider) { m.EXPECT().FromRole(gomock.Any(), gomock.Any()).Return(&session.Session{}, nil) }, mockPrompter: func(m *mocks.Mockprompter) { m.EXPECT().Confirm("Are you sure you want to delete abc from application phonetool and environment test?", gomock.Any(), gomock.Any()).Return(false, nil) }, wantErr: "task delete cancelled - no changes made", }, "default flag specified": { inDefaultCluster: true, mockStore: func(m *mocks.Mockstore) { }, mockSel: func(m *mocks.MockwsSelector) {}, mockTaskSelect: func(m *mocks.MockcfTaskSelector) { m.EXPECT().Task(taskDeleteNamePrompt, "", gomock.Any()).Return("abc", nil) }, mockSess: func(m *mocks.MocksessionProvider) { m.EXPECT().Default().Return(&session.Session{}, nil) }, mockPrompter: func(m *mocks.Mockprompter) { m.EXPECT().Confirm("Are you sure you want to delete abc from the default cluster?", gomock.Any(), gomock.Any()).Return(true, nil) }, }, "no flags specified": { mockStore: func(m *mocks.Mockstore) { // This call is in GetSession when an environment is specified and we need to get the Manager Role's session. m.EXPECT().GetEnvironment("phonetool", "test").Return(&config.Environment{Name: "test", App: "phonetool"}, nil) }, mockSel: func(m *mocks.MockwsSelector) { m.EXPECT().Application(taskDeleteAppPrompt, "", appEnvOptionNone).Return("phonetool", nil) m.EXPECT().Environment(taskDeleteEnvPrompt, "", "phonetool", appEnvOptionNone).Return("test", nil) }, mockTaskSelect: func(m *mocks.MockcfTaskSelector) { m.EXPECT().Task(taskDeleteNamePrompt, "", gomock.Any()).Return("abc", nil) }, mockSess: func(m *mocks.MocksessionProvider) { m.EXPECT().FromRole(gomock.Any(), gomock.Any()).Return(&session.Session{}, nil) }, mockPrompter: func(m *mocks.Mockprompter) { m.EXPECT().Confirm("Are you sure you want to delete abc from application phonetool and environment test?", gomock.Any(), gomock.Any()).Return(true, nil) }, }, "no flags specified (default path)": { mockStore: func(m *mocks.Mockstore) {}, mockSel: func(m *mocks.MockwsSelector) { m.EXPECT().Application(taskDeleteAppPrompt, "", appEnvOptionNone).Return(appEnvOptionNone, nil) }, mockTaskSelect: func(m *mocks.MockcfTaskSelector) { m.EXPECT().Task(taskDeleteNamePrompt, "", gomock.Any()).Return("abc", nil) }, mockSess: func(m *mocks.MocksessionProvider) { m.EXPECT().Default().Return(&session.Session{}, nil) }, mockPrompter: func(m *mocks.Mockprompter) { m.EXPECT().Confirm("Are you sure you want to delete abc from the default cluster?", gomock.Any(), gomock.Any()).Return(true, nil) }, }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { // GIVEN ctrl := gomock.NewController(t) defer ctrl.Finish() mockStore := mocks.NewMockstore(ctrl) mockSel := mocks.NewMockwsSelector(ctrl) mockSess := mocks.NewMocksessionProvider(ctrl) mockTaskSel := mocks.NewMockcfTaskSelector(ctrl) mockPrompt := mocks.NewMockprompter(ctrl) tc.mockStore(mockStore) tc.mockSel(mockSel) tc.mockSess(mockSess) tc.mockTaskSelect(mockTaskSel) tc.mockPrompter(mockPrompt) opts := deleteTaskOpts{ deleteTaskVars: deleteTaskVars{ skipConfirmation: tc.inSkipConfirmation, defaultCluster: tc.inDefaultCluster, app: tc.inAppName, env: tc.inEnvName, name: tc.inName, }, store: mockStore, sel: mockSel, provider: mockSess, prompt: mockPrompt, newTaskSel: func(sess *session.Session) cfTaskSelector { return mockTaskSel }, } // WHEN err := opts.Ask() // THEN if tc.wantErr != "" { require.EqualError(t, err, tc.wantErr) } else { require.NoError(t, err) } }) } } type deleteTaskMocks struct { store *mocks.Mockstore sess *mocks.MocksessionProvider ecr *mocks.MockimageRemover s3 *mocks.MockbucketEmptier ecs *mocks.MocktaskStopper cfn *mocks.MocktaskStackManager spinner *mocks.Mockprogress } func TestDeleteTaskOpts_Execute(t *testing.T) { mockApp := "phonetool" mockEnvName := "pdx" mockTaskName := "hide-snacks" mockTaskStackName := "task-hide-snacks" mockTaskRepoName := "copilot-hide-snacks" mockManagerARN := "arn:aws:iam:us-west-2:123456789:role/abc" mockEnv := &config.Environment{ Name: mockEnvName, Region: "us-west-2", ManagerRoleARN: mockManagerARN, } mockAppEnvTask := &deploy.TaskStackInfo{ App: mockApp, Env: mockEnvName, RoleARN: mockManagerARN, StackName: mockTaskStackName, BucketName: "arn:aws:s3:::bucket", } mockDefaultTask := deploy.TaskStackInfo{ StackName: mockTaskStackName, BucketName: "arn:aws:s3:::bucket", } mockDefaultTaskNoBucket := deploy.TaskStackInfo{ StackName: mockTaskStackName, } mockError := errors.New("some error") testCases := map[string]struct { inDefault bool inApp string inEnv string inName string setupMocks func(mocks deleteTaskMocks) wantedErr error }{ "success with app/env": { inApp: mockApp, inEnv: mockEnvName, inName: mockTaskName, setupMocks: func(m deleteTaskMocks) { m.sess.EXPECT().FromRole(mockEnv.ManagerRoleARN, mockEnv.Region).Return(&session.Session{ Config: &aws.Config{ Region: aws.String("mockRegion"), }, }, nil) m.sess.EXPECT().DefaultWithRegion("mockRegion").Return(&session.Session{}, nil) gomock.InOrder( m.store.EXPECT().GetEnvironment(mockApp, mockEnvName).Return(mockEnv, nil), m.spinner.EXPECT().Start(gomock.Any()), m.ecs.EXPECT().StopOneOffTasks(mockApp, mockEnvName, mockTaskName).Return(nil), m.spinner.EXPECT().Stop(gomock.Any()), m.spinner.EXPECT().Start(gomock.Any()), m.ecr.EXPECT().ClearRepository(mockTaskRepoName).Return(nil), m.spinner.EXPECT().Stop(gomock.Any()), m.cfn.EXPECT().GetTaskStack(mockTaskName).Return(mockAppEnvTask, nil), m.spinner.EXPECT().Start(gomock.Any()), m.s3.EXPECT().EmptyBucket(gomock.Any()).Return(nil), m.spinner.EXPECT().Stop(gomock.Any()), m.spinner.EXPECT().Start(gomock.Any()), m.cfn.EXPECT().DeleteTask(*mockAppEnvTask).Return(nil), m.spinner.EXPECT().Stop(gomock.Any()), ) }, }, "success with default cluster": { inDefault: true, inName: mockTaskName, setupMocks: func(m deleteTaskMocks) { gomock.InOrder( m.sess.EXPECT().Default().Return(&session.Session{}, nil), m.spinner.EXPECT().Start(gomock.Any()), m.ecs.EXPECT().StopDefaultClusterTasks(mockTaskName).Return(nil), m.spinner.EXPECT().Stop(gomock.Any()), m.spinner.EXPECT().Start(gomock.Any()), m.ecr.EXPECT().ClearRepository(mockTaskRepoName).Return(nil), m.spinner.EXPECT().Stop(gomock.Any()), m.cfn.EXPECT().GetTaskStack(mockTaskName).Return(&mockDefaultTask, nil), m.spinner.EXPECT().Start(gomock.Any()), m.s3.EXPECT().EmptyBucket(gomock.Any()).Return(nil), m.spinner.EXPECT().Stop(gomock.Any()), m.spinner.EXPECT().Start(gomock.Any()), m.cfn.EXPECT().DeleteTask(mockDefaultTask).Return(nil), m.spinner.EXPECT().Stop(gomock.Any()), ) }, }, "success with default cluster and no S3 bucket": { inDefault: true, inName: mockTaskName, setupMocks: func(m deleteTaskMocks) { gomock.InOrder( m.sess.EXPECT().Default().Return(&session.Session{}, nil), m.spinner.EXPECT().Start(gomock.Any()), m.ecs.EXPECT().StopDefaultClusterTasks(mockTaskName).Return(nil), m.spinner.EXPECT().Stop(gomock.Any()), m.spinner.EXPECT().Start(gomock.Any()), m.ecr.EXPECT().ClearRepository(mockTaskRepoName).Return(nil), m.spinner.EXPECT().Stop(gomock.Any()), m.cfn.EXPECT().GetTaskStack(mockTaskName).Return(&mockDefaultTaskNoBucket, nil), m.spinner.EXPECT().Start(gomock.Any()), m.cfn.EXPECT().DeleteTask(mockDefaultTaskNoBucket).Return(nil), m.spinner.EXPECT().Stop(gomock.Any()), ) }, }, "error when getting environment": { inApp: mockApp, inEnv: mockEnvName, inName: mockTaskName, wantedErr: errors.New("get session: some error"), setupMocks: func(m deleteTaskMocks) { gomock.InOrder( m.store.EXPECT().GetEnvironment(mockApp, mockEnvName).Return(nil, mockError), ) }, }, "error deleting task stack": { inApp: mockApp, inEnv: mockEnvName, inName: mockTaskName, wantedErr: errors.New("delete stack for task hide-snacks: some error"), setupMocks: func(m deleteTaskMocks) { m.sess.EXPECT().FromRole(mockEnv.ManagerRoleARN, mockEnv.Region).Return(&session.Session{ Config: &aws.Config{ Region: aws.String("mockRegion"), }, }, nil) m.sess.EXPECT().DefaultWithRegion("mockRegion").Return(&session.Session{}, nil) gomock.InOrder( m.store.EXPECT().GetEnvironment(mockApp, mockEnvName).Return(mockEnv, nil), m.spinner.EXPECT().Start(gomock.Any()), m.ecs.EXPECT().StopOneOffTasks(mockApp, mockEnvName, mockTaskName).Return(nil), m.spinner.EXPECT().Stop(gomock.Any()), m.spinner.EXPECT().Start(gomock.Any()), m.ecr.EXPECT().ClearRepository(mockTaskRepoName).Return(nil), m.spinner.EXPECT().Stop(gomock.Any()), m.cfn.EXPECT().GetTaskStack(mockTaskName).Return(mockAppEnvTask, nil), m.spinner.EXPECT().Start(gomock.Any()), m.s3.EXPECT().EmptyBucket(gomock.Any()).Return(nil), m.spinner.EXPECT().Stop(gomock.Any()), m.spinner.EXPECT().Start(gomock.Any()), m.cfn.EXPECT().DeleteTask(*mockAppEnvTask).Return(mockError), m.spinner.EXPECT().Stop(gomock.Any()), ) }, }, "task stack does not exist (idempotency check)": { inApp: mockApp, inEnv: mockEnvName, inName: mockTaskName, setupMocks: func(m deleteTaskMocks) { mockErrStackNotFound := awscfn.ErrStackNotFound{} m.sess.EXPECT().FromRole(mockEnv.ManagerRoleARN, mockEnv.Region).Return(&session.Session{ Config: &aws.Config{ Region: aws.String("mockRegion"), }, }, nil) m.sess.EXPECT().DefaultWithRegion("mockRegion").Return(&session.Session{}, nil) gomock.InOrder( m.store.EXPECT().GetEnvironment(mockApp, mockEnvName).Return(mockEnv, nil), m.spinner.EXPECT().Start(gomock.Any()), m.ecs.EXPECT().StopOneOffTasks(mockApp, mockEnvName, mockTaskName).Return(nil), m.spinner.EXPECT().Stop(gomock.Any()), m.spinner.EXPECT().Start(gomock.Any()), m.ecr.EXPECT().ClearRepository(mockTaskRepoName).Return(nil), m.spinner.EXPECT().Stop(gomock.Any()), m.cfn.EXPECT().GetTaskStack(mockTaskName).Return(nil, &mockErrStackNotFound), ) }, }, "error clearing ecr repo": { inApp: mockApp, inEnv: mockEnvName, inName: mockTaskName, wantedErr: errors.New("empty ECR repository for task hide-snacks: some error"), setupMocks: func(m deleteTaskMocks) { m.sess.EXPECT().FromRole(mockEnv.ManagerRoleARN, mockEnv.Region).Return(&session.Session{ Config: &aws.Config{ Region: aws.String("mockRegion"), }, }, nil) m.sess.EXPECT().DefaultWithRegion("mockRegion").Return(&session.Session{}, nil) gomock.InOrder( m.store.EXPECT().GetEnvironment(mockApp, mockEnvName).Return(mockEnv, nil), m.spinner.EXPECT().Start(gomock.Any()), m.ecs.EXPECT().StopOneOffTasks(mockApp, mockEnvName, mockTaskName).Return(nil), m.spinner.EXPECT().Stop(gomock.Any()), m.spinner.EXPECT().Start(gomock.Any()), m.ecr.EXPECT().ClearRepository(mockTaskRepoName).Return(mockError), m.spinner.EXPECT().Stop(gomock.Any()), ) }, }, "error clearing s3 bucket": { inApp: mockApp, inEnv: mockEnvName, inName: mockTaskName, wantedErr: errors.New("empty S3 bucket for task hide-snacks: some error"), setupMocks: func(m deleteTaskMocks) { m.sess.EXPECT().FromRole(mockEnv.ManagerRoleARN, mockEnv.Region).Return(&session.Session{ Config: &aws.Config{ Region: aws.String("mockRegion"), }, }, nil) m.sess.EXPECT().DefaultWithRegion("mockRegion").Return(&session.Session{}, nil) gomock.InOrder( m.store.EXPECT().GetEnvironment(mockApp, mockEnvName).Return(mockEnv, nil), m.spinner.EXPECT().Start(gomock.Any()), m.ecs.EXPECT().StopOneOffTasks(mockApp, mockEnvName, mockTaskName).Return(nil), m.spinner.EXPECT().Stop(gomock.Any()), m.spinner.EXPECT().Start(gomock.Any()), m.ecr.EXPECT().ClearRepository(mockTaskRepoName).Return(nil), m.spinner.EXPECT().Stop(gomock.Any()), m.cfn.EXPECT().GetTaskStack(mockTaskName).Return(mockAppEnvTask, nil), m.spinner.EXPECT().Start(gomock.Any()), m.s3.EXPECT().EmptyBucket(gomock.Any()).Return(mockError), m.spinner.EXPECT().Stop(gomock.Any()), ) }, }, "error stopping app/env tasks": { inApp: mockApp, inEnv: mockEnvName, inName: mockTaskName, wantedErr: errors.New("stop running tasks in family hide-snacks: some error"), setupMocks: func(m deleteTaskMocks) { m.sess.EXPECT().FromRole(mockEnv.ManagerRoleARN, mockEnv.Region).Return(&session.Session{ Config: &aws.Config{ Region: aws.String("mockRegion"), }, }, nil) gomock.InOrder( m.store.EXPECT().GetEnvironment(mockApp, mockEnvName).Return(mockEnv, nil), m.spinner.EXPECT().Start(gomock.Any()), m.ecs.EXPECT().StopOneOffTasks(mockApp, mockEnvName, mockTaskName).Return(mockError), m.spinner.EXPECT().Stop(gomock.Any()), ) }, }, "error getting task stack": { inApp: mockApp, inEnv: mockEnvName, inName: mockTaskName, wantedErr: errors.New("some error"), setupMocks: func(m deleteTaskMocks) { m.sess.EXPECT().FromRole(mockEnv.ManagerRoleARN, mockEnv.Region).Return(&session.Session{ Config: &aws.Config{ Region: aws.String("mockRegion"), }, }, nil) m.sess.EXPECT().DefaultWithRegion("mockRegion").Return(&session.Session{}, nil) gomock.InOrder( m.store.EXPECT().GetEnvironment(mockApp, mockEnvName).Return(mockEnv, nil), m.spinner.EXPECT().Start(gomock.Any()), m.ecs.EXPECT().StopOneOffTasks(mockApp, mockEnvName, mockTaskName).Return(nil), m.spinner.EXPECT().Stop(gomock.Any()), m.spinner.EXPECT().Start(gomock.Any()), m.ecr.EXPECT().ClearRepository(mockTaskRepoName).Return(nil), m.spinner.EXPECT().Stop(gomock.Any()), m.cfn.EXPECT().GetTaskStack(mockTaskName).Return(nil, mockError), ) }, }, "error stopping default cluster tasks": { inDefault: true, inName: mockTaskName, wantedErr: errors.New("stop running tasks in family hide-snacks: some error"), setupMocks: func(m deleteTaskMocks) { m.sess.EXPECT().Default().Return(&session.Session{}, nil) gomock.InOrder( m.spinner.EXPECT().Start(gomock.Any()), m.ecs.EXPECT().StopDefaultClusterTasks(mockTaskName).Return(mockError), m.spinner.EXPECT().Stop(gomock.Any()), ) }, }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { ctrl := gomock.NewController(t) defer ctrl.Finish() // GIVEN mockstore := mocks.NewMockstore(ctrl) mockECR := mocks.NewMockimageRemover(ctrl) mockS3 := mocks.NewMockbucketEmptier(ctrl) mockCFN := mocks.NewMocktaskStackManager(ctrl) mockECS := mocks.NewMocktaskStopper(ctrl) //mockSession := sessions.NewProvider() mockSession := mocks.NewMocksessionProvider(ctrl) mockSpinner := mocks.NewMockprogress(ctrl) mockGetECR := func(_ *session.Session) imageRemover { return mockECR } mockGetS3 := func(_ *session.Session) bucketEmptier { return mockS3 } mockGetECS := func(_ *session.Session) taskStopper { return mockECS } mockGetCFN := func(_ *session.Session) taskStackManager { return mockCFN } mocks := deleteTaskMocks{ store: mockstore, sess: mockSession, ecr: mockECR, s3: mockS3, ecs: mockECS, cfn: mockCFN, spinner: mockSpinner, } tc.setupMocks(mocks) opts := deleteTaskOpts{ deleteTaskVars: deleteTaskVars{ app: tc.inApp, env: tc.inEnv, name: tc.inName, defaultCluster: tc.inDefault, }, store: mockstore, provider: mockSession, spinner: mockSpinner, newImageRemover: mockGetECR, newBucketEmptier: mockGetS3, newStackManager: mockGetCFN, newTaskStopper: mockGetECS, } // WHEN err := opts.Execute() // THEN if tc.wantedErr != nil { require.EqualError(t, err, tc.wantedErr.Error()) } else { require.NoError(t, err) } }) } }
704
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package cli import ( "fmt" "github.com/aws/aws-sdk-go/service/ssm" "github.com/aws/copilot-cli/internal/pkg/aws/identity" "github.com/aws/aws-sdk-go/aws" "github.com/aws/aws-sdk-go/aws/session" "github.com/aws/copilot-cli/cmd/copilot/template" awsecs "github.com/aws/copilot-cli/internal/pkg/aws/ecs" "github.com/aws/copilot-cli/internal/pkg/aws/sessions" "github.com/aws/copilot-cli/internal/pkg/config" "github.com/aws/copilot-cli/internal/pkg/ecs" "github.com/aws/copilot-cli/internal/pkg/exec" "github.com/aws/copilot-cli/internal/pkg/term/color" "github.com/aws/copilot-cli/internal/pkg/term/log" "github.com/aws/copilot-cli/internal/pkg/term/prompt" "github.com/aws/copilot-cli/internal/pkg/term/selector" "github.com/spf13/cobra" ) const ( useDefaultClusterOption = "None (run in default cluster)" ) var ( taskExecTaskPrompt = fmt.Sprintf("Which %s would you like to execute into?", color.Emphasize("task")) taskExecTaskHelpPrompt = fmt.Sprintf("By default we'll execute into the first %s of the task.", color.Emphasize("essential container")) taskExecAppNamePrompt = fmt.Sprintf("In which %s are you running your %s?", color.Emphasize("application"), color.Emphasize("task")) taskExecAppNameHelpPrompt = fmt.Sprintf(`Select the application that your task is deployed to. Select %s to execute in a task running in your default cluster instead of any existing application.`, color.Emphasize(useDefaultClusterOption)) taskExecEnvNamePrompt = fmt.Sprintf("In which %s are you running your %s?", color.Emphasize("environment"), color.Emphasize("task")) taskExecEnvNameHelpPrompt = fmt.Sprintf(`Select the environment that your task is deployed to. Select %s to execute in a task running in your default cluster instead of any existing environment.`, color.Emphasize(useDefaultClusterOption)) ) type taskExecVars struct { execVars useDefault bool } type taskExecOpts struct { taskExecVars store store ssmPluginManager ssmPluginManager prompter prompter newTaskSel func(*session.Session) runningTaskSelector configSel appEnvSelector newCommandExecutor func(*session.Session) ecsCommandExecutor provider sessionProvider task *awsecs.Task } func newTaskExecOpts(vars taskExecVars) (*taskExecOpts, error) { sessProvider := sessions.ImmutableProvider(sessions.UserAgentExtras("task exec")) defaultSess, err := sessProvider.Default() if err != nil { return nil, fmt.Errorf("default session: %v", err) } ssmStore := config.NewSSMStore(identity.New(defaultSess), ssm.New(defaultSess), aws.StringValue(defaultSess.Config.Region)) prompter := prompt.New() return &taskExecOpts{ taskExecVars: vars, store: ssmStore, ssmPluginManager: exec.NewSSMPluginCommand(nil), prompter: prompter, newTaskSel: func(sess *session.Session) runningTaskSelector { return selector.NewTaskSelector(prompter, ecs.New(sess)) }, configSel: selector.NewConfigSelector(prompter, ssmStore), newCommandExecutor: func(s *session.Session) ecsCommandExecutor { return awsecs.New(s) }, provider: sessProvider, }, nil } // Validate returns an error if the values provided by the user are invalid. func (o *taskExecOpts) Validate() error { if o.useDefault && (o.appName != tryReadingAppName() || o.envName != "") { return fmt.Errorf("cannot specify both default flag and app or env flags") } if o.appName != "" { if _, err := o.store.GetApplication(o.appName); err != nil { return err } if o.envName != "" { if _, err := o.store.GetEnvironment(o.appName, o.envName); err != nil { return err } } } return validateSSMBinary(o.prompter, o.ssmPluginManager, o.skipConfirmation) } // Ask asks for fields that are required but not passed in. func (o *taskExecOpts) Ask() error { if o.useDefault { return o.selectTaskInDefaultCluster() } if o.appName == "" { appName, err := o.configSel.Application(taskExecAppNamePrompt, taskExecAppNameHelpPrompt, useDefaultClusterOption) if err != nil { return fmt.Errorf("select application: %w", err) } if appName == useDefaultClusterOption { o.useDefault = true return o.selectTaskInDefaultCluster() } o.appName = appName } if o.envName == "" { envName, err := o.configSel.Environment(taskExecEnvNamePrompt, taskExecEnvNameHelpPrompt, o.appName, useDefaultClusterOption) if err != nil { return fmt.Errorf("select environment: %w", err) } if envName == useDefaultClusterOption { o.useDefault = true return o.selectTaskInDefaultCluster() } o.envName = envName } return o.selectTaskInAppEnvCluster() } // Execute executes a command in a running container. func (o *taskExecOpts) Execute() error { sess, err := o.configSession() if err != nil { return err } cluster, container := aws.StringValue(o.task.ClusterArn), aws.StringValue(o.task.Containers[0].Name) taskID, err := awsecs.TaskID(aws.StringValue(o.task.TaskArn)) if err != nil { return fmt.Errorf("parse task ARN %s: %w", aws.StringValue(o.task.TaskArn), err) } log.Infof("Execute %s in container %s in task %s.\n", color.HighlightCode(o.command), color.HighlightUserInput(container), color.HighlightResource(taskID)) if err = o.newCommandExecutor(sess).ExecuteCommand(awsecs.ExecuteCommandInput{ Cluster: cluster, Command: o.command, Container: container, Task: taskID, }); err != nil { return fmt.Errorf("execute command %s in container %s: %w", o.command, container, err) } return nil } func (o *taskExecOpts) selectTaskInDefaultCluster() error { sess, err := o.provider.Default() if err != nil { return fmt.Errorf("create default session: %w", err) } task, err := o.newTaskSel(sess).RunningTask(taskExecTaskPrompt, taskExecTaskHelpPrompt, selector.WithDefault(), selector.WithTaskGroup(o.name), selector.WithTaskID(o.taskID)) if err != nil { return fmt.Errorf("select running task in default cluster: %w", err) } o.task = task return nil } func (o *taskExecOpts) selectTaskInAppEnvCluster() error { env, err := o.store.GetEnvironment(o.appName, o.envName) if err != nil { return fmt.Errorf("get environment %s: %w", o.envName, err) } sess, err := o.provider.FromRole(env.ManagerRoleARN, env.Region) if err != nil { return fmt.Errorf("get session from role %s and region %s: %w", env.ManagerRoleARN, env.Region, err) } task, err := o.newTaskSel(sess).RunningTask(taskExecTaskPrompt, taskExecTaskHelpPrompt, selector.WithAppEnv(o.appName, o.envName), selector.WithTaskGroup(o.name), selector.WithTaskID(o.taskID)) if err != nil { return fmt.Errorf("select running task in environment %s: %w", o.envName, err) } o.task = task return nil } func (o *taskExecOpts) configSession() (*session.Session, error) { if o.useDefault { return o.provider.Default() } env, err := o.store.GetEnvironment(o.appName, o.envName) if err != nil { return nil, fmt.Errorf("get environment %s: %w", o.envName, err) } return o.provider.FromRole(env.ManagerRoleARN, env.Region) } // buildTaskExecCmd builds the command for execute a running container in a one-off task. func buildTaskExecCmd() *cobra.Command { var skipPrompt bool vars := taskExecVars{} cmd := &cobra.Command{ Use: "exec", Short: "Execute a command in a running container part of a task.", Example: ` Start an interactive bash session with a task in task group "db-migrate" in the "test" environment under the current workspace. /code $ copilot task exec -e test -n db-migrate Runs the 'cat progress.csv' command in the task prefixed with ID "1848c38" part of the "db-migrate" task group. /code $ copilot task exec --name db-migrate --task-id 1848c38 --command "cat progress.csv" Start an interactive bash session with a task prefixed with ID "38c3818" in the default cluster. /code $ copilot task exec --default --task-id 38c3818`, RunE: runCmdE(func(cmd *cobra.Command, args []string) error { opts, err := newTaskExecOpts(vars) if err != nil { return err } if cmd.Flags().Changed(yesFlag) { opts.skipConfirmation = aws.Bool(false) if skipPrompt { opts.skipConfirmation = aws.Bool(true) } } return run(opts) }), } cmd.Flags().StringVarP(&vars.appName, appFlag, appFlagShort, tryReadingAppName(), appFlagDescription) cmd.Flags().StringVarP(&vars.envName, envFlag, envFlagShort, "", envFlagDescription) cmd.Flags().StringVarP(&vars.name, nameFlag, nameFlagShort, "", nameFlagDescription) cmd.Flags().StringVarP(&vars.command, commandFlag, commandFlagShort, defaultCommand, execCommandFlagDescription) cmd.Flags().StringVar(&vars.taskID, taskIDFlag, "", taskIDFlagDescription) cmd.Flags().BoolVar(&vars.useDefault, taskDefaultFlag, false, taskExecDefaultFlagDescription) cmd.Flags().BoolVar(&skipPrompt, yesFlag, false, execYesFlagDescription) cmd.SetUsageTemplate(template.Usage) return cmd }
239
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package cli import ( "errors" "fmt" "testing" "github.com/aws/aws-sdk-go/aws" "github.com/aws/aws-sdk-go/aws/session" awsecs "github.com/aws/aws-sdk-go/service/ecs" "github.com/aws/copilot-cli/internal/pkg/aws/ecs" "github.com/aws/copilot-cli/internal/pkg/cli/mocks" "github.com/aws/copilot-cli/internal/pkg/config" "github.com/golang/mock/gomock" "github.com/stretchr/testify/require" ) type execTaskMocks struct { storeSvc *mocks.Mockstore configSel *mocks.MockappEnvSelector taskSel *mocks.MockrunningTaskSelector commandExec *mocks.MockecsCommandExecutor ssmPluginManager *mocks.MockssmPluginManager provider *mocks.MocksessionProvider } func TestTaskExec_Validate(t *testing.T) { const ( mockApp = "my-app" mockEnv = "my-env" ) mockErr := errors.New("some error") testCases := map[string]struct { inApp string inEnv string inTaskGroup string useDefault bool setupMocks func(mocks execTaskMocks) wantedError error }{ "should bubble error if specify both default and app": { inApp: mockApp, useDefault: true, setupMocks: func(m execTaskMocks) {}, wantedError: fmt.Errorf("cannot specify both default flag and app or env flags"), }, "should bubble error if specify both default and env": { inEnv: mockEnv, useDefault: true, setupMocks: func(m execTaskMocks) {}, wantedError: fmt.Errorf("cannot specify both default flag and app or env flags"), }, "should bubble error if failed to get app": { inApp: mockApp, setupMocks: func(m execTaskMocks) { m.storeSvc.EXPECT().GetApplication(mockApp).Return(nil, mockErr) }, wantedError: fmt.Errorf("some error"), }, "should bubble error if failed to get env": { inApp: mockApp, inEnv: mockEnv, setupMocks: func(m execTaskMocks) { m.storeSvc.EXPECT().GetApplication(mockApp).Return(&config.Application{}, nil) m.storeSvc.EXPECT().GetEnvironment(mockApp, mockEnv).Return(nil, mockErr) }, wantedError: fmt.Errorf("some error"), }, "skip validation if app flag is not set": { inEnv: mockEnv, setupMocks: func(m execTaskMocks) { m.ssmPluginManager.EXPECT().ValidateBinary().Return(nil) }, }, "success": { inApp: mockApp, inEnv: mockEnv, setupMocks: func(m execTaskMocks) { m.storeSvc.EXPECT().GetApplication(mockApp).Return(&config.Application{}, nil) m.storeSvc.EXPECT().GetEnvironment(mockApp, mockEnv).Return(&config.Environment{}, nil) m.ssmPluginManager.EXPECT().ValidateBinary().Return(nil) }, }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { ctrl := gomock.NewController(t) defer ctrl.Finish() mockStoreReader := mocks.NewMockstore(ctrl) mockSSMValidator := mocks.NewMockssmPluginManager(ctrl) mocks := execTaskMocks{ storeSvc: mockStoreReader, ssmPluginManager: mockSSMValidator, } tc.setupMocks(mocks) execTasks := &taskExecOpts{ taskExecVars: taskExecVars{ execVars: execVars{ name: tc.inTaskGroup, appName: tc.inApp, envName: tc.inEnv, }, useDefault: tc.useDefault, }, store: mockStoreReader, ssmPluginManager: mockSSMValidator, } // WHEN err := execTasks.Validate() // THEN if tc.wantedError != nil { require.EqualError(t, err, tc.wantedError.Error()) } else { require.NoError(t, err) } }) } } func TestTaskExec_Ask(t *testing.T) { const ( mockApp = "my-app" mockEnv = "my-env" ) mockTask := &ecs.Task{ TaskArn: aws.String("mockTaskARN"), } mockErr := errors.New("some error") testCases := map[string]struct { inApp string inEnv string inTaskGroup string inTaskID string useDefault bool setupMocks func(mocks execTaskMocks) wantedError error wantedTask *ecs.Task wantedUseDefault bool }{ "should bubble error if fail to select task in default cluster": { useDefault: true, setupMocks: func(m execTaskMocks) { m.provider.EXPECT().Default().Return(&session.Session{}, nil) m.taskSel.EXPECT().RunningTask(taskExecTaskPrompt, taskExecTaskHelpPrompt, gomock.Any(), gomock.Any(), gomock.Any()).Return(nil, mockErr) }, wantedError: fmt.Errorf("select running task in default cluster: some error"), }, "should bubble error if fail to select application": { setupMocks: func(m execTaskMocks) { m.configSel.EXPECT().Application(taskExecAppNamePrompt, taskExecAppNameHelpPrompt, useDefaultClusterOption). Return("", mockErr) }, wantedError: fmt.Errorf("select application: some error"), }, "should bubble error if fail to select environment": { inApp: mockApp, setupMocks: func(m execTaskMocks) { m.configSel.EXPECT().Environment(taskExecEnvNamePrompt, taskExecEnvNameHelpPrompt, mockApp, useDefaultClusterOption). Return("", mockErr) }, wantedError: fmt.Errorf("select environment: some error"), }, "should bubble error if fail to get environment": { inApp: mockApp, inEnv: mockEnv, setupMocks: func(m execTaskMocks) { m.storeSvc.EXPECT().GetEnvironment(mockApp, mockEnv).Return(nil, mockErr) }, wantedError: fmt.Errorf("get environment my-env: some error"), }, "should bubble error if fail to select running task in env cluster": { inApp: mockApp, inEnv: mockEnv, setupMocks: func(m execTaskMocks) { m.storeSvc.EXPECT().GetEnvironment(mockApp, mockEnv).Return(&config.Environment{}, nil) m.provider.EXPECT().FromRole(gomock.Any(), gomock.Any()) m.taskSel.EXPECT().RunningTask(taskExecTaskPrompt, taskExecTaskHelpPrompt, gomock.Any(), gomock.Any(), gomock.Any()).Return(nil, mockErr) }, wantedError: fmt.Errorf("select running task in environment my-env: some error"), }, "success with default flag set": { useDefault: true, setupMocks: func(m execTaskMocks) { m.provider.EXPECT().Default().Return(&session.Session{}, nil) m.taskSel.EXPECT().RunningTask(taskExecTaskPrompt, taskExecTaskHelpPrompt, gomock.Any(), gomock.Any(), gomock.Any()).Return(mockTask, nil) }, wantedTask: mockTask, wantedUseDefault: true, }, "success with default option chose": { setupMocks: func(m execTaskMocks) { m.provider.EXPECT().Default().Return(&session.Session{}, nil) m.configSel.EXPECT().Application(taskExecAppNamePrompt, taskExecAppNameHelpPrompt, useDefaultClusterOption). Return(useDefaultClusterOption, nil) m.taskSel.EXPECT().RunningTask(taskExecTaskPrompt, taskExecTaskHelpPrompt, gomock.Any(), gomock.Any(), gomock.Any()).Return(mockTask, nil) }, wantedTask: mockTask, wantedUseDefault: true, }, "success with env cluster": { setupMocks: func(m execTaskMocks) { m.configSel.EXPECT().Application(taskExecAppNamePrompt, taskExecAppNameHelpPrompt, useDefaultClusterOption). Return(mockApp, nil) m.configSel.EXPECT().Environment(taskExecEnvNamePrompt, taskExecEnvNameHelpPrompt, mockApp, useDefaultClusterOption). Return(mockEnv, nil) m.storeSvc.EXPECT().GetEnvironment(mockApp, mockEnv).Return(&config.Environment{}, nil) m.provider.EXPECT().FromRole(gomock.Any(), gomock.Any()) m.taskSel.EXPECT().RunningTask(taskExecTaskPrompt, taskExecTaskHelpPrompt, gomock.Any(), gomock.Any(), gomock.Any()).Return(mockTask, nil) }, wantedTask: mockTask, wantedUseDefault: false, }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { ctrl := gomock.NewController(t) defer ctrl.Finish() mockStoreReader := mocks.NewMockstore(ctrl) mockConfigSel := mocks.NewMockappEnvSelector(ctrl) mockTaskSel := mocks.NewMockrunningTaskSelector(ctrl) mockNewTaskSel := func(_ *session.Session) runningTaskSelector { return mockTaskSel } mockProvider := mocks.NewMocksessionProvider(ctrl) mocks := execTaskMocks{ storeSvc: mockStoreReader, configSel: mockConfigSel, taskSel: mockTaskSel, provider: mockProvider, } tc.setupMocks(mocks) execTasks := &taskExecOpts{ taskExecVars: taskExecVars{ execVars: execVars{ name: tc.inTaskGroup, appName: tc.inApp, envName: tc.inEnv, taskID: tc.inTaskID, }, useDefault: tc.useDefault, }, store: mockStoreReader, newTaskSel: mockNewTaskSel, configSel: mockConfigSel, provider: mockProvider, } // WHEN err := execTasks.Ask() // THEN if tc.wantedError != nil { require.EqualError(t, err, tc.wantedError.Error()) } else { require.NoError(t, err) require.Equal(t, tc.wantedTask, execTasks.task) require.Equal(t, tc.wantedUseDefault, execTasks.useDefault) } }) } } func TestTaskExec_Execute(t *testing.T) { const ( mockApp = "my-app" mockEnv = "my-env" mockCommand = "mockCommand" mockBadTaskARN = "mockBadTaskARN" mockTaskARN = "arn:aws:ecs:us-west-2:123456789:task/4082490ee6c245e09d2145010aa1ba8d" mockTaskID = "4082490ee6c245e09d2145010aa1ba8d" mockClusterARN = "mockClusterARN" mockContainerName = "mockContainerName" ) mockTask := &ecs.Task{ TaskArn: aws.String(mockTaskARN), ClusterArn: aws.String(mockClusterARN), Containers: []*awsecs.Container{ { Name: aws.String(mockContainerName), }, }, } mockErr := errors.New("some error") testCases := map[string]struct { inTask *ecs.Task inUseDefault bool setupMocks func(mocks execTaskMocks) wantedError error }{ "should bubble error if fail to get environment": { setupMocks: func(m execTaskMocks) { m.storeSvc.EXPECT().GetEnvironment(mockApp, mockEnv).Return(nil, mockErr) }, wantedError: fmt.Errorf("get environment my-env: some error"), }, "should bubble error if fail to parse task id": { inUseDefault: true, inTask: &ecs.Task{ TaskArn: aws.String(mockBadTaskARN), ClusterArn: aws.String(mockClusterARN), Containers: []*awsecs.Container{ { Name: aws.String(mockContainerName), }, }, }, setupMocks: func(m execTaskMocks) { m.provider.EXPECT().Default() }, wantedError: fmt.Errorf("parse task ARN mockBadTaskARN: parse ECS task ARN: arn: invalid prefix"), }, "should bubble error if fail to execute commands": { inTask: mockTask, inUseDefault: true, setupMocks: func(m execTaskMocks) { m.provider.EXPECT().Default() m.commandExec.EXPECT().ExecuteCommand(ecs.ExecuteCommandInput{ Cluster: mockClusterARN, Command: mockCommand, Container: mockContainerName, Task: mockTaskID, }).Return(mockErr) }, wantedError: fmt.Errorf("execute command mockCommand in container mockContainerName: some error"), }, "success": { inTask: mockTask, setupMocks: func(m execTaskMocks) { m.storeSvc.EXPECT().GetEnvironment(mockApp, mockEnv).Return(&config.Environment{}, nil) m.provider.EXPECT().FromRole(gomock.Any(), gomock.Any()) m.commandExec.EXPECT().ExecuteCommand(ecs.ExecuteCommandInput{ Cluster: mockClusterARN, Command: mockCommand, Container: mockContainerName, Task: mockTaskID, }).Return(nil) }, }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { ctrl := gomock.NewController(t) defer ctrl.Finish() mockStoreReader := mocks.NewMockstore(ctrl) mockCommandExec := mocks.NewMockecsCommandExecutor(ctrl) mockNewCommandExec := func(_ *session.Session) ecsCommandExecutor { return mockCommandExec } mocks := execTaskMocks{ storeSvc: mockStoreReader, commandExec: mockCommandExec, provider: mocks.NewMocksessionProvider(ctrl), } tc.setupMocks(mocks) execTasks := &taskExecOpts{ taskExecVars: taskExecVars{ execVars: execVars{ appName: mockApp, envName: mockEnv, command: mockCommand, }, useDefault: tc.inUseDefault, }, task: tc.inTask, store: mockStoreReader, newCommandExecutor: mockNewCommandExec, provider: mocks.provider, } // WHEN err := execTasks.Execute() // THEN if tc.wantedError != nil { require.EqualError(t, err, tc.wantedError.Error()) } else { require.NoError(t, err) } }) } }
422
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package cli import ( "bytes" "context" "errors" "fmt" "os" "path/filepath" "strings" "github.com/aws/copilot-cli/internal/pkg/aws/partitions" "github.com/aws/copilot-cli/internal/pkg/aws/s3" "github.com/aws/copilot-cli/internal/pkg/exec" "github.com/aws/copilot-cli/internal/pkg/template/artifactpath" "golang.org/x/mod/semver" "github.com/aws/aws-sdk-go/aws" "github.com/aws/aws-sdk-go/service/ssm" "github.com/aws/copilot-cli/internal/pkg/aws/identity" "github.com/spf13/pflag" "github.com/aws/copilot-cli/internal/pkg/manifest" "github.com/aws/copilot-cli/internal/pkg/template" "github.com/aws/copilot-cli/internal/pkg/docker/dockerengine" "github.com/aws/aws-sdk-go/aws/arn" awscloudformation "github.com/aws/copilot-cli/internal/pkg/aws/cloudformation" "github.com/aws/copilot-cli/internal/pkg/aws/ecr" "github.com/aws/copilot-cli/internal/pkg/describe" "github.com/aws/copilot-cli/internal/pkg/logging" "github.com/aws/copilot-cli/internal/pkg/term/prompt" "github.com/aws/aws-sdk-go/aws/session" "github.com/aws/copilot-cli/internal/pkg/aws/ec2" awsecs "github.com/aws/copilot-cli/internal/pkg/aws/ecs" "github.com/aws/copilot-cli/internal/pkg/aws/sessions" "github.com/aws/copilot-cli/internal/pkg/config" "github.com/aws/copilot-cli/internal/pkg/deploy" "github.com/aws/copilot-cli/internal/pkg/deploy/cloudformation" "github.com/aws/copilot-cli/internal/pkg/ecs" "github.com/aws/copilot-cli/internal/pkg/repository" "github.com/aws/copilot-cli/internal/pkg/task" "github.com/aws/copilot-cli/internal/pkg/term/color" "github.com/aws/copilot-cli/internal/pkg/term/log" termprogress "github.com/aws/copilot-cli/internal/pkg/term/progress" "github.com/aws/copilot-cli/internal/pkg/term/selector" "github.com/dustin/go-humanize/english" "github.com/google/shlex" "github.com/spf13/afero" "github.com/spf13/cobra" ) const ( appEnvOptionNone = "None (run in default VPC)" defaultDockerfilePath = "Dockerfile" imageTagLatest = "latest" shortTaskIDLength = 8 ) const ( envFileExt = ".env" fmtTaskRunEnvUploadStart = "Uploading env file to S3: %s" fmtTaskRunEnvUploadFailed = "Failed to upload your env file to S3: %s\n" fmtTaskRunEnvUploadComplete = "Successfully uploaded your env file to S3: %s\n" ) const ( workloadTypeJob = "job" workloadTypeSvc = "svc" workloadTypeInvalid = "invalid" ) const ( fmtImageURI = "%s:%s" ) var ( errNumNotPositive = errors.New("number of tasks must be positive") errCPUNotPositive = errors.New("CPU units must be positive") errMemNotPositive = errors.New("memory must be positive") ) var ( taskRunAppPrompt = fmt.Sprintf("In which %s would you like to run this %s?", color.Emphasize("application"), color.Emphasize("task")) taskRunEnvPrompt = fmt.Sprintf("In which %s would you like to run this %s?", color.Emphasize("environment"), color.Emphasize("task")) taskRunAppPromptHelp = fmt.Sprintf(`Task will be deployed to the selected application. Select %s to run the task in your default VPC instead of any existing application.`, color.Emphasize(appEnvOptionNone)) taskRunEnvPromptHelp = fmt.Sprintf(`Task will be deployed to the selected environment. Select %s to run the task in your default VPC instead of any existing environment.`, color.Emphasize(appEnvOptionNone)) ) var ( taskSecretsPermissionPrompt = "Do you grant permission to the ECS/Fargate agent for these secrets?" taskSecretsPermissionPromptHelp = "ECS/Fargate agent needs the permissions in order to fetch the secrets and inject them into your container." ) type runTaskVars struct { count int cpu int memory int groupName string image string dockerfilePath string dockerfileContextPath string imageTag string taskRole string executionRole string cluster string subnets []string securityGroups []string env string appName string useDefaultSubnetsAndCluster bool envVars map[string]string envFile string secrets map[string]string acknowledgeSecretsAccess bool command string entrypoint string resourceTags map[string]string follow bool generateCommandTarget string os string arch string } type runTaskOpts struct { runTaskVars isDockerfileSet bool nFlag int // Interfaces to interact with dependencies. fs afero.Fs store store sel appEnvSelector spinner progress prompt prompter // Fields below are configured at runtime. deployer taskDeployer repository repositoryService runner taskRunner eventsWriter eventsWriter defaultClusterGetter defaultClusterGetter publicIPGetter publicIPGetter provider sessionProvider sess *session.Session targetEnvironment *config.Environment // Configurer functions. configureRuntimeOpts func() error configureRepository func() error // NOTE: configureEventsWriter is only called when tailing logs (i.e. --follow is specified) configureEventsWriter func(tasks []*task.Task) configureECSServiceDescriber func(session *session.Session) ecs.ECSServiceDescriber configureServiceDescriber func(session *session.Session) ecs.ServiceDescriber configureJobDescriber func(session *session.Session) ecs.JobDescriber configureUploader func(session *session.Session) uploader // Functions to generate a task run command. runTaskRequestFromECSService func(client ecs.ECSServiceDescriber, cluster, service string) (*ecs.RunTaskRequest, error) runTaskRequestFromService func(client ecs.ServiceDescriber, app, env, svc string) (*ecs.RunTaskRequest, error) runTaskRequestFromJob func(client ecs.JobDescriber, app, env, job string) (*ecs.RunTaskRequest, error) // Cached variables. ssmParamSecrets map[string]string secretsManagerSecrets map[string]string envFileARN string envCompatibilityChecker func(app, env string) (versionCompatibilityChecker, error) } func newTaskRunOpts(vars runTaskVars) (*runTaskOpts, error) { sessProvider := sessions.ImmutableProvider(sessions.UserAgentExtras("task run")) defaultSess, err := sessProvider.Default() if err != nil { return nil, fmt.Errorf("default session: %v", err) } prompter := prompt.New() store := config.NewSSMStore(identity.New(defaultSess), ssm.New(defaultSess), aws.StringValue(defaultSess.Config.Region)) opts := runTaskOpts{ runTaskVars: vars, fs: &afero.Afero{Fs: afero.NewOsFs()}, store: store, prompt: prompter, sel: selector.NewAppEnvSelector(prompter, store), spinner: termprogress.NewSpinner(log.DiagnosticWriter), provider: sessProvider, secretsManagerSecrets: make(map[string]string), ssmParamSecrets: make(map[string]string), } opts.configureRuntimeOpts = func() error { opts.runner, err = opts.configureRunner() if err != nil { return fmt.Errorf("configure task runner: %w", err) } opts.deployer = cloudformation.New(opts.sess, cloudformation.WithProgressTracker(os.Stderr)) opts.defaultClusterGetter = awsecs.New(opts.sess) opts.publicIPGetter = ec2.New(opts.sess) return nil } opts.configureRepository = func() error { repoName := fmt.Sprintf(deploy.FmtTaskECRRepoName, opts.groupName) opts.repository = repository.New(ecr.New(opts.sess), repoName) return nil } opts.configureEventsWriter = func(tasks []*task.Task) { opts.eventsWriter = logging.NewTaskClient(opts.sess, opts.groupName, tasks) } opts.configureECSServiceDescriber = func(session *session.Session) ecs.ECSServiceDescriber { return awsecs.New(session) } opts.configureServiceDescriber = func(session *session.Session) ecs.ServiceDescriber { return ecs.New(session) } opts.configureJobDescriber = func(session *session.Session) ecs.JobDescriber { return ecs.New(session) } opts.configureUploader = func(session *session.Session) uploader { return s3.New(session) } opts.envCompatibilityChecker = func(app, env string) (versionCompatibilityChecker, error) { envDescriber, err := describe.NewEnvDescriber(describe.NewEnvDescriberConfig{ App: app, Env: env, ConfigStore: opts.store, }) if err != nil { return nil, fmt.Errorf("new environment compatibility checker: %v", err) } return envDescriber, nil } opts.runTaskRequestFromECSService = ecs.RunTaskRequestFromECSService opts.runTaskRequestFromService = ecs.RunTaskRequestFromService opts.runTaskRequestFromJob = ecs.RunTaskRequestFromJob return &opts, nil } func (o *runTaskOpts) configureRunner() (taskRunner, error) { vpcGetter := ec2.New(o.sess) ecsService := awsecs.New(o.sess) if o.env != "" { deployStore, err := deploy.NewStore(o.provider, o.store) if err != nil { return nil, fmt.Errorf("connect to copilot deploy store: %w", err) } d, err := describe.NewEnvDescriber(describe.NewEnvDescriberConfig{ App: o.appName, Env: o.env, ConfigStore: o.store, DeployStore: deployStore, EnableResources: false, // We don't need to show detailed resources. }) if err != nil { return nil, fmt.Errorf("create describer for environment %s in application %s: %w", o.env, o.appName, err) } ecsClient := ecs.New(o.sess) return &task.EnvRunner{ Count: o.count, GroupName: o.groupName, App: o.appName, Env: o.env, SecurityGroups: o.securityGroups, OS: o.os, VPCGetter: vpcGetter, ClusterGetter: ecsClient, Starter: ecsService, EnvironmentDescriber: d, NonZeroExitCodeGetter: ecsClient, }, nil } return &task.ConfigRunner{ Count: o.count, GroupName: o.groupName, Cluster: o.cluster, Subnets: o.subnets, SecurityGroups: o.securityGroups, OS: o.os, VPCGetter: vpcGetter, ClusterGetter: ecsService, Starter: ecsService, NonZeroExitCodeGetter: ecs.New(o.sess), }, nil } func (o *runTaskOpts) configureSessAndEnv() error { var sess *session.Session var env *config.Environment if o.env != "" { var err error env, err = o.targetEnv(o.appName, o.env) if err != nil { return err } sess, err = o.provider.FromRole(env.ManagerRoleARN, env.Region) if err != nil { return fmt.Errorf("get session from role %s and region %s: %w", env.ManagerRoleARN, env.Region, err) } } else { var err error sess, err = o.provider.Default() if err != nil { return fmt.Errorf("get default session: %w", err) } } o.targetEnvironment = env o.sess = sess return nil } // Validate returns an error if the flag values passed by the user are invalid. func (o *runTaskOpts) Validate() error { if o.generateCommandTarget != "" { if o.nFlag >= 2 { return errors.New("cannot specify `--generate-cmd` with any other flag") } } if o.count <= 0 { return errNumNotPositive } if o.groupName != "" { if err := basicNameValidation(o.groupName); err != nil { return err } } if o.image != "" && o.isDockerfileSet { return errors.New("cannot specify both `--image` and `--dockerfile`") } if o.image != "" && o.dockerfileContextPath != "" { return errors.New("cannot specify both `--image` and `--build-context`") } if o.isDockerfileSet { if _, err := o.fs.Stat(o.dockerfilePath); err != nil { return fmt.Errorf("invalid `--dockerfile` path: %w", err) } } if o.dockerfileContextPath != "" { if _, err := o.fs.Stat(o.dockerfileContextPath); err != nil { return fmt.Errorf("invalid `--build-context` path: %w", err) } } if noOS, noArch := o.os == "", o.arch == ""; noOS != noArch { return fmt.Errorf("must specify either both `--%s` and `--%s` or neither", osFlag, archFlag) } if err := o.validatePlatform(); err != nil { return err } if o.cpu <= 0 { return errCPUNotPositive } if o.memory <= 0 { return errMemNotPositive } if err := o.validateFlagsWithCluster(); err != nil { return err } if err := o.validateFlagsWithDefaultCluster(); err != nil { return err } if err := o.validateFlagsWithSubnets(); err != nil { return err } if err := o.validateFlagsWithWindows(); err != nil { return err } if o.appName != "" { if err := o.validateAppName(); err != nil { return err } } if o.env != "" { if err := o.validateEnvName(); err != nil { return err } } for _, value := range o.secrets { if !isSSM(value) && !isSecretsManager(value) { return fmt.Errorf("must specify a valid secrets ARN") } } if o.envFile != "" { if filepath.Ext(o.envFile) != envFileExt { return fmt.Errorf("environment file %s specified in --%s must have a %s file extension", o.envFile, envFileFlag, envFileExt) } } return nil } func isSSM(value string) bool { // For SSM parameter you can specify it as ARN or name if it exists in the same Region as the task you are launching. return !template.IsARNFunc(value) || strings.Contains(value, ":ssm:") } func isSecretsManager(value string) bool { return template.IsARNFunc(value) && strings.Contains(value, ":secretsmanager:") } func (o *runTaskOpts) getCategorizedSecrets() (map[string]string, map[string]string) { if len(o.ssmParamSecrets) > 0 || len(o.secretsManagerSecrets) > 0 { return o.secretsManagerSecrets, o.ssmParamSecrets } for name, value := range o.secrets { if isSSM(value) { o.ssmParamSecrets[name] = value } if isSecretsManager(value) { o.secretsManagerSecrets[name] = value } } return o.secretsManagerSecrets, o.ssmParamSecrets } func (o *runTaskOpts) confirmSecretsAccess() error { if o.executionRole != "" { return nil } if o.appName != "" || o.env != "" { return nil } if o.acknowledgeSecretsAccess { return nil } secretsManagerSecrets, ssmParamSecrets := o.getCategorizedSecrets() log.Info("Looks like ") if len(ssmParamSecrets) > 0 { log.Infoln("you're requesting ssm:GetParameters to the following SSM parameters:") } else { log.Infoln("you're requesting secretsmanager:GetSecretValue to the following Secrets Manager secrets:") } for _, value := range ssmParamSecrets { log.Infoln("* " + value) } if len(ssmParamSecrets) > 0 && len(secretsManagerSecrets) > 0 { log.Infoln("\nand secretsmanager:GetSecretValue to the following Secrets Manager secrets:") } for _, value := range secretsManagerSecrets { log.Infoln("* " + value) } secretsAccessConfirmed, err := o.prompt.Confirm(taskSecretsPermissionPrompt, taskSecretsPermissionPromptHelp) if err != nil { return fmt.Errorf("prompt to confirm secrets access: %w", err) } if !secretsAccessConfirmed { return errors.New("access to secrets denied") } return nil } func (o *runTaskOpts) validateEnvCompatibilityForGenerateJobCmd(app, env string) error { envStack, err := o.envCompatibilityChecker(app, env) if err != nil { return err } version, err := envStack.Version() if err != nil { return fmt.Errorf("retrieve version of environment stack %q in application %q: %v", env, app, err) } // The '--generate-cmd' flag was introduced in env v1.4.0. In env v1.8.0, EnvManagerRole took over, but //"states:DescribeStateMachine" permissions weren't added until 1.12.2. if semver.Compare(version, "v1.12.2") < 0 { return &errFeatureIncompatibleWithEnvironment{ missingFeature: "task run --generate-cmd", envName: env, curVersion: version, } } return nil } func (o *runTaskOpts) validatePlatform() error { if o.os == "" { return nil } o.os = strings.ToUpper(o.os) o.arch = strings.ToUpper(o.arch) validPlatforms := task.ValidCFNPlatforms for _, validPlatform := range validPlatforms { if dockerengine.PlatformString(o.os, o.arch) == validPlatform { return nil } } return fmt.Errorf("platform %s is invalid; %s: %s", dockerengine.PlatformString(o.os, o.arch), english.PluralWord(len(validPlatforms), "the valid platform is", "valid platforms are"), english.WordSeries(validPlatforms, "and")) } func (o *runTaskOpts) validateFlagsWithCluster() error { if o.cluster == "" { return nil } if o.appName != "" { return fmt.Errorf("cannot specify both `--app` and `--cluster`") } if o.env != "" { return fmt.Errorf("cannot specify both `--env` and `--cluster`") } if o.useDefaultSubnetsAndCluster { return fmt.Errorf("cannot specify both `--default` and `--cluster`") } return nil } func (o *runTaskOpts) validateFlagsWithDefaultCluster() error { if !o.useDefaultSubnetsAndCluster { return nil } if o.subnets != nil { return fmt.Errorf("cannot specify both `--subnets` and `--default`") } if o.appName != "" { return fmt.Errorf("cannot specify both `--app` and `--default`") } if o.env != "" { return fmt.Errorf("cannot specify both `--env` and `--default`") } return nil } func (o *runTaskOpts) validateFlagsWithSubnets() error { if o.subnets == nil { return nil } if o.useDefaultSubnetsAndCluster { return fmt.Errorf("cannot specify both `--subnets` and `--default`") } if o.appName != "" { return fmt.Errorf("cannot specify both `--subnets` and `--app`") } if o.env != "" { return fmt.Errorf("cannot specify both `--subnets` and `--env`") } return nil } func (o *runTaskOpts) validateFlagsWithWindows() error { if !isWindowsOS(o.os) { return nil } if o.cpu < manifest.MinWindowsTaskCPU { return fmt.Errorf("CPU is %d, but it must be at least %d for a Windows-based task", o.cpu, manifest.MinWindowsTaskCPU) } if o.memory < manifest.MinWindowsTaskMemory { return fmt.Errorf("memory is %d, but it must be at least %d for a Windows-based task", o.memory, manifest.MinWindowsTaskMemory) } return nil } func isWindowsOS(os string) bool { return task.IsValidWindowsOS(os) } // Ask prompts the user for any required or important fields that are not provided. func (o *runTaskOpts) Ask() error { if o.generateCommandTarget != "" { return nil } if o.shouldPromptForAppEnv() { if err := o.askAppName(); err != nil { return err } if err := o.askEnvName(); err != nil { return err } } if len(o.secrets) > 0 { if err := o.confirmSecretsAccess(); err != nil { return err } } return nil } func (o *runTaskOpts) shouldPromptForAppEnv() bool { // NOTE: if security groups are specified but subnets are not, then we use the default subnets with the // specified security groups. useDefault := o.useDefaultSubnetsAndCluster || (o.securityGroups != nil && o.subnets == nil && o.cluster == "") useConfig := o.subnets != nil || o.cluster != "" // if user hasn't specified that they want to use the default subnets, and that they didn't provide specific subnets // that they want to use, then we prompt. return !useDefault && !useConfig } // Execute deploys and runs the task. func (o *runTaskOpts) Execute() error { if o.generateCommandTarget != "" { return o.generateCommand() } if o.groupName == "" { dir, err := os.Getwd() if err != nil { log.Errorf("Cannot retrieve working directory, please use --%s to specify a task group name.\n", taskGroupNameFlag) return fmt.Errorf("get working directory: %v", err) } o.groupName = strings.ToLower(filepath.Base(dir)) } // NOTE: all runtime options must be configured only after session is configured if err := o.configureSessAndEnv(); err != nil { return err } if err := o.configureRuntimeOpts(); err != nil { return err } if o.env == "" && o.cluster == "" { hasDefaultCluster, err := o.defaultClusterGetter.HasDefaultCluster() if err != nil { return fmt.Errorf(`find "default" cluster to deploy the task to: %v`, err) } if !hasDefaultCluster { log.Errorf( "Looks like there is no \"default\" cluster in your region!\nPlease run %s to create the cluster first, and then re-run %s.\n", color.HighlightCode("aws ecs create-cluster"), color.HighlightCode("copilot task run"), ) return errors.New(`cannot find a "default" cluster to deploy the task to`) } } if err := o.deployTaskResources(); err != nil { return err } // NOTE: repository has to be configured only after task resources are deployed if err := o.configureRepository(); err != nil { return err } var shouldUpdate bool if o.envFile != "" { envFileARN, err := o.deployEnvFile() if err != nil { return fmt.Errorf("deploy env file %s: %w", o.envFile, err) } o.envFileARN = envFileARN shouldUpdate = true } // NOTE: if image is not provided, then we build the image and push to ECR repo if o.image == "" { uri, err := o.repository.Login() if err != nil { return fmt.Errorf("login to docker: %w", err) } tag := imageTagLatest if o.imageTag != "" { tag = o.imageTag } o.image = fmt.Sprintf(fmtImageURI, uri, tag) if err := o.buildAndPushImage(uri); err != nil { return err } shouldUpdate = true } if shouldUpdate { if err := o.updateTaskResources(); err != nil { return err } } tasks, err := o.runTask() if err != nil { if strings.Contains(err.Error(), "AccessDeniedException") && strings.Contains(err.Error(), "unable to pull secrets") && o.appName != "" && o.env != "" { log.Error(`It looks like your task is not able to pull the secrets. Did you tag your secrets with the "copilot-application" and "copilot-environment" tags? `) } return err } o.showPublicIPs(tasks) if o.follow { o.configureEventsWriter(tasks) if err := o.displayLogStream(); err != nil { return err } if err := o.runner.CheckNonZeroExitCode(tasks); err != nil { return err } } return nil } func (o *runTaskOpts) generateCommand() error { command, err := o.runTaskCommand() if err != nil { return err } cliString, err := command.CLIString() if err != nil { return err } log.Infoln(cliString) return nil } func (o *runTaskOpts) runTaskCommand() (cliStringer, error) { var cmd cliStringer if arn.IsARN(o.generateCommandTarget) { clusterName, serviceName, err := o.parseARN() if err != nil { return nil, err } sess, err := o.provider.Default() if err != nil { return nil, fmt.Errorf("get default session: %s", err) } return o.runTaskCommandFromECSService(sess, clusterName, serviceName) } parts := strings.Split(o.generateCommandTarget, "/") switch len(parts) { case 2: clusterName, serviceName := parts[0], parts[1] sess, err := o.provider.Default() if err != nil { return nil, fmt.Errorf("get default session: %s", err) } cmd, err = o.runTaskCommandFromECSService(sess, clusterName, serviceName) if err != nil { return nil, err } case 3: appName, envName, workloadName := parts[0], parts[1], parts[2] env, err := o.targetEnv(appName, envName) if err != nil { return nil, err } sess, err := o.provider.FromRole(env.ManagerRoleARN, env.Region) if err != nil { return nil, fmt.Errorf("get environment session: %s", err) } cmd, err = o.runTaskCommandFromWorkload(sess, appName, envName, workloadName) if err != nil { return nil, err } default: return nil, errors.New("invalid input to --generate-cmd: must be of format <cluster>/<service> or <app>/<env>/<workload>") } return cmd, nil } func (o *runTaskOpts) parseARN() (string, string, error) { svcARN := awsecs.ServiceArn(o.generateCommandTarget) clusterName, err := svcARN.ClusterName() if err != nil { return "", "", fmt.Errorf("extract cluster name from arn %s: %w", svcARN, err) } serviceName, err := svcARN.ServiceName() if err != nil { return "", "", fmt.Errorf("extract service name from arn %s: %w", svcARN, err) } return clusterName, serviceName, nil } func (o *runTaskOpts) runTaskCommandFromECSService(sess *session.Session, clusterName, serviceName string) (cliStringer, error) { cmd, err := o.runTaskRequestFromECSService(o.configureECSServiceDescriber(sess), clusterName, serviceName) if err != nil { var errMultipleContainers *ecs.ErrMultipleContainersInTaskDef if errors.As(err, &errMultipleContainers) { log.Errorln("`copilot task run` does not support running more than one container.") } return nil, fmt.Errorf("generate task run command from ECS service %s: %w", clusterName+"/"+serviceName, err) } return cmd, nil } func (o *runTaskOpts) runTaskCommandFromWorkload(sess *session.Session, appName, envName, workloadName string) (cliStringer, error) { workloadType, err := o.workloadType(appName, workloadName) if err != nil { return nil, err } var cmd cliStringer switch workloadType { case workloadTypeJob: if err := o.validateEnvCompatibilityForGenerateJobCmd(appName, envName); err != nil { return nil, err } cmd, err = o.runTaskRequestFromJob(o.configureJobDescriber(sess), appName, envName, workloadName) if err != nil { return nil, fmt.Errorf("generate task run command from job %s of application %s deployed in environment %s: %w", workloadName, appName, envName, err) } case workloadTypeSvc: cmd, err = o.runTaskRequestFromService(o.configureServiceDescriber(sess), appName, envName, workloadName) if err != nil { return nil, fmt.Errorf("generate task run command from service %s of application %s deployed in environment %s: %w", workloadName, appName, envName, err) } } return cmd, nil } func (o *runTaskOpts) workloadType(appName, workloadName string) (string, error) { _, err := o.store.GetJob(appName, workloadName) if err == nil { return workloadTypeJob, nil } var errNoSuchJob *config.ErrNoSuchJob if !errors.As(err, &errNoSuchJob) { return "", fmt.Errorf("determine whether workload %s is a job: %w", workloadName, err) } _, err = o.store.GetService(appName, workloadName) if err == nil { return workloadTypeSvc, nil } var errNoSuchService *config.ErrNoSuchService if !errors.As(err, &errNoSuchService) { return "", fmt.Errorf("determine whether workload %s is a service: %w", workloadName, err) } return workloadTypeInvalid, fmt.Errorf("workload %s is neither a service nor a job", workloadName) } func (o *runTaskOpts) displayLogStream() error { if err := o.eventsWriter.WriteEventsUntilStopped(); err != nil { return fmt.Errorf("write events: %w", err) } log.Infof("%s %s stopped.\n", english.PluralWord(o.count, "Task", ""), english.PluralWord(o.count, "has", "have")) return nil } func (o *runTaskOpts) runTask() ([]*task.Task, error) { o.spinner.Start(fmt.Sprintf("Waiting for %s to be running for %s.", english.Plural(o.count, "task", ""), o.groupName)) tasks, err := o.runner.Run() if err != nil { o.spinner.Stop(log.Serrorf("Failed to run %s.\n\n", o.groupName)) return nil, fmt.Errorf("run task %s: %w", o.groupName, err) } o.spinner.Stop(log.Ssuccessf("%s %s %s running.\n\n", english.PluralWord(o.count, "Task", ""), o.groupName, english.PluralWord(o.count, "is", "are"))) return tasks, nil } func (o *runTaskOpts) showPublicIPs(tasks []*task.Task) { publicIPs := make(map[string]string) for _, t := range tasks { if t.ENI == "" { continue } ip, err := o.publicIPGetter.PublicIP(t.ENI) // We will just not show the ip address if an error occurs. if err == nil { publicIPs[t.TaskARN] = ip } } if len(publicIPs) == 0 { return } log.Infof("%s associated with the %s %s:\n", english.PluralWord(len(publicIPs), "The public IP", "Public IPs"), english.PluralWord(len(publicIPs), "task", "tasks"), english.PluralWord(len(publicIPs), "is", "are")) for taskARN, ip := range publicIPs { if len(taskARN) >= shortTaskIDLength { taskARN = taskARN[len(taskARN)-shortTaskIDLength:] } log.Infof("- %s (for %s)\n", ip, taskARN) } } func (o *runTaskOpts) buildAndPushImage(uri string) error { var additionalTags []string if o.imageTag != "" { additionalTags = append(additionalTags, o.imageTag) } ctx := filepath.Dir(o.dockerfilePath) if o.dockerfileContextPath != "" { ctx = o.dockerfileContextPath } buildArgs := &dockerengine.BuildArguments{ URI: uri, Dockerfile: o.dockerfilePath, Context: ctx, Tags: append([]string{imageTagLatest}, additionalTags...), } buildArgsList, err := buildArgs.GenerateDockerBuildArgs(dockerengine.New(exec.NewCmd())) if err != nil { return fmt.Errorf("generate docker build args: %w", err) } log.Infof("Building your container image: docker %s\n", strings.Join(buildArgsList, " ")) if _, err := o.repository.BuildAndPush(context.Background(), buildArgs, log.DiagnosticWriter); err != nil { return fmt.Errorf("build and push image: %w", err) } return nil } func (o *runTaskOpts) deployTaskResources() error { if err := o.deploy(); err != nil { return fmt.Errorf("provision resources for task %s: %w", o.groupName, err) } return nil } func (o *runTaskOpts) updateTaskResources() error { if err := o.deploy(); err != nil { return fmt.Errorf("update resources for task %s: %w", o.groupName, err) } return nil } func (o *runTaskOpts) deploy() error { var deployOpts []awscloudformation.StackOption if o.env != "" { deployOpts = []awscloudformation.StackOption{awscloudformation.WithRoleARN(o.targetEnvironment.ExecutionRoleARN)} } var boundaryPolicy string if o.appName != "" { app, err := o.store.GetApplication(o.appName) if err != nil { return fmt.Errorf("get application: %w", err) } boundaryPolicy = app.PermissionsBoundary } secretsManagerSecrets, ssmParamSecrets := o.getCategorizedSecrets() entrypoint, err := shlex.Split(o.entrypoint) if err != nil { return fmt.Errorf("split entrypoint %s into tokens using shell-style rules: %w", o.entrypoint, err) } command, err := shlex.Split(o.command) if err != nil { return fmt.Errorf("split command %s into tokens using shell-style rules: %w", o.command, err) } input := &deploy.CreateTaskResourcesInput{ Name: o.groupName, CPU: o.cpu, Memory: o.memory, Image: o.image, PermissionsBoundary: boundaryPolicy, TaskRole: o.taskRole, ExecutionRole: o.executionRole, Command: command, EntryPoint: entrypoint, EnvVars: o.envVars, EnvFileARN: o.envFileARN, SSMParamSecrets: ssmParamSecrets, SecretsManagerSecrets: secretsManagerSecrets, OS: o.os, Arch: o.arch, App: o.appName, Env: o.env, AdditionalTags: o.resourceTags, } return o.deployer.DeployTask(input, deployOpts...) } // deployEnvFileIfNeeded uploads the env file if needed, ensures that an S3 bucket is available, and returns the ARN of uploaded file. func (o *runTaskOpts) deployEnvFile() (string, error) { if o.envFile == "" { return "", nil } info, err := o.deployer.GetTaskStack(o.groupName) if err != nil { return "", fmt.Errorf("deploy env file: %w", err) } // push env file o.spinner.Start(fmt.Sprintf(fmtTaskRunEnvUploadStart, color.HighlightUserInput(o.envFile))) envFileARN, err := o.pushEnvFileToS3(info.BucketName) if err != nil { o.spinner.Stop(log.Serrorf(fmtTaskRunEnvUploadFailed, color.HighlightUserInput(o.envFile))) return "", err } o.spinner.Stop(log.Ssuccessf(fmtTaskRunEnvUploadComplete, color.HighlightUserInput(o.envFile))) return envFileARN, nil } // pushEnvFileToS3 reads an env file from disk, uploads it to a unique path, and then returns the ARN of the env file. func (o *runTaskOpts) pushEnvFileToS3(bucket string) (string, error) { content, err := afero.ReadFile(o.fs, o.envFile) if err != nil { return "", fmt.Errorf("read env file %s: %w", o.envFile, err) } reader := bytes.NewReader(content) uploader := o.configureUploader(o.sess) url, err := uploader.Upload(bucket, artifactpath.EnvFiles(o.envFile, content), reader) if err != nil { return "", fmt.Errorf("put env file %s artifact to bucket %s: %w", o.envFile, bucket, err) } bucket, key, err := s3.ParseURL(url) if err != nil { return "", fmt.Errorf("parse s3 url: %w", err) } // The app and environment are always within the same partition. partition, err := partitions.Region(aws.StringValue(o.sess.Config.Region)).Partition() if err != nil { return "", err } return s3.FormatARN(partition.ID(), fmt.Sprintf("%s/%s", bucket, key)), nil } func (o *runTaskOpts) validateAppName() error { if _, err := o.store.GetApplication(o.appName); err != nil { return fmt.Errorf("get application: %w", err) } return nil } func (o *runTaskOpts) validateEnvName() error { if o.appName != "" { if _, err := o.targetEnv(o.appName, o.env); err != nil { return err } } else { return errNoAppInWorkspace } return nil } func (o *runTaskOpts) askAppName() error { if o.appName != "" { return nil } // If the application is empty then the user wants to run in the default VPC. Do not prompt for an environment name. app, err := o.sel.Application(taskRunAppPrompt, taskRunAppPromptHelp, appEnvOptionNone) if err != nil { return fmt.Errorf("ask for application: %w", err) } if app == appEnvOptionNone { return nil } o.appName = app return nil } func (o *runTaskOpts) askEnvName() error { if o.env != "" { return nil } // If the application is empty then the user wants to run in the default VPC. Do not prompt for an environment name. if o.appName == "" || o.subnets != nil { return nil } env, err := o.sel.Environment(taskRunEnvPrompt, taskRunEnvPromptHelp, o.appName, appEnvOptionNone) if err != nil { return fmt.Errorf("ask for environment: %w", err) } if env == appEnvOptionNone { return nil } o.env = env return nil } func (o *runTaskOpts) targetEnv(appName, envName string) (*config.Environment, error) { env, err := o.store.GetEnvironment(appName, envName) if err != nil { return nil, fmt.Errorf("get environment %s config: %w", o.env, err) } return env, nil } // BuildTaskRunCmd build the command for running a new task func BuildTaskRunCmd() *cobra.Command { vars := runTaskVars{} cmd := &cobra.Command{ Use: "run", Short: "Run a one-off task on Amazon ECS.", Example: ` Run a task using your local Dockerfile and display log streams after the task is running. You will be prompted to specify an environment for the tasks to run in. /code $ copilot task run Run a task named "db-migrate" in the "test" environment under the current workspace. /code $ copilot task run -n db-migrate --env test Run 4 tasks with 2GB memory, an existing image, and a custom task role. /code $ copilot task run --count 4 --memory 2048 --image=rds-migrate --task-role migrate-role Run a task with environment variables. /code $ copilot task run --env-vars name=myName,user=myUser Run a task using the current workspace with specific subnets and security groups. /code $ copilot task run --subnets subnet-123,subnet-456 --security-groups sg-123,sg-456 Run a task with a command. /code $ copilot task run --command "python migrate-script.py"`, RunE: runCmdE(func(cmd *cobra.Command, args []string) error { opts, err := newTaskRunOpts(vars) if err != nil { return err } opts.nFlag = cmd.Flags().NFlag() if cmd.Flags().Changed(dockerFileFlag) { opts.isDockerfileSet = true } return run(opts) }), } // add flags to comments. cmd.Flags().StringVarP(&vars.groupName, taskGroupNameFlag, nameFlagShort, "", taskGroupFlagDescription) cmd.Flags().StringVar(&vars.dockerfilePath, dockerFileFlag, defaultDockerfilePath, dockerFileFlagDescription) cmd.Flags().StringVar(&vars.dockerfileContextPath, dockerFileContextFlag, "", dockerFileContextFlagDescription) cmd.Flags().StringVarP(&vars.image, imageFlag, imageFlagShort, "", imageFlagDescription) cmd.Flags().StringVar(&vars.imageTag, imageTagFlag, "", taskImageTagFlagDescription) cmd.Flags().StringVar(&vars.appName, appFlag, "", taskAppFlagDescription) cmd.Flags().StringVar(&vars.env, envFlag, "", taskEnvFlagDescription) cmd.Flags().StringVar(&vars.cluster, clusterFlag, "", clusterFlagDescription) cmd.Flags().BoolVar(&vars.acknowledgeSecretsAccess, acknowledgeSecretsAccessFlag, false, acknowledgeSecretsAccessDescription) cmd.Flags().StringSliceVar(&vars.subnets, subnetsFlag, nil, subnetsFlagDescription) cmd.Flags().StringSliceVar(&vars.securityGroups, securityGroupsFlag, nil, securityGroupsFlagDescription) cmd.Flags().BoolVar(&vars.useDefaultSubnetsAndCluster, taskDefaultFlag, false, taskRunDefaultFlagDescription) cmd.Flags().IntVar(&vars.count, countFlag, 1, countFlagDescription) cmd.Flags().IntVar(&vars.cpu, cpuFlag, 256, cpuFlagDescription) cmd.Flags().IntVar(&vars.memory, memoryFlag, 512, memoryFlagDescription) cmd.Flags().StringVar(&vars.taskRole, taskRoleFlag, "", taskRoleFlagDescription) cmd.Flags().StringVar(&vars.executionRole, executionRoleFlag, "", executionRoleFlagDescription) cmd.Flags().StringVar(&vars.os, osFlag, "", osFlagDescription) cmd.Flags().StringVar(&vars.arch, archFlag, "", archFlagDescription) cmd.Flags().StringToStringVar(&vars.envVars, envVarsFlag, nil, envVarsFlagDescription) cmd.Flags().StringVar(&vars.envFile, envFileFlag, "", envFileFlagDescription) cmd.Flags().StringToStringVar(&vars.secrets, secretsFlag, nil, secretsFlagDescription) cmd.Flags().StringVar(&vars.command, commandFlag, "", runCommandFlagDescription) cmd.Flags().StringVar(&vars.entrypoint, entrypointFlag, "", entrypointFlagDescription) cmd.Flags().StringToStringVar(&vars.resourceTags, resourceTagsFlag, nil, resourceTagsFlagDescription) cmd.Flags().BoolVar(&vars.follow, followFlag, false, followFlagDescription) cmd.Flags().StringVar(&vars.generateCommandTarget, generateCommandFlag, "", generateCommandFlagDescription) // group flags. nameFlags := pflag.NewFlagSet("Name", pflag.ContinueOnError) nameFlags.AddFlag(cmd.Flags().Lookup(taskGroupNameFlag)) buildFlags := pflag.NewFlagSet("Build", pflag.ContinueOnError) buildFlags.AddFlag(cmd.Flags().Lookup(dockerFileFlag)) buildFlags.AddFlag(cmd.Flags().Lookup(dockerFileContextFlag)) buildFlags.AddFlag(cmd.Flags().Lookup(imageFlag)) buildFlags.AddFlag(cmd.Flags().Lookup(imageTagFlag)) placementFlags := pflag.NewFlagSet("Placement", pflag.ContinueOnError) placementFlags.AddFlag(cmd.Flags().Lookup(appFlag)) placementFlags.AddFlag(cmd.Flags().Lookup(envFlag)) placementFlags.AddFlag(cmd.Flags().Lookup(clusterFlag)) placementFlags.AddFlag(cmd.Flags().Lookup(subnetsFlag)) placementFlags.AddFlag(cmd.Flags().Lookup(securityGroupsFlag)) placementFlags.AddFlag(cmd.Flags().Lookup(taskDefaultFlag)) taskFlags := pflag.NewFlagSet("Task", pflag.ContinueOnError) taskFlags.AddFlag(cmd.Flags().Lookup(countFlag)) taskFlags.AddFlag(cmd.Flags().Lookup(cpuFlag)) taskFlags.AddFlag(cmd.Flags().Lookup(memoryFlag)) taskFlags.AddFlag(cmd.Flags().Lookup(taskRoleFlag)) taskFlags.AddFlag(cmd.Flags().Lookup(executionRoleFlag)) taskFlags.AddFlag(cmd.Flags().Lookup(osFlag)) taskFlags.AddFlag(cmd.Flags().Lookup(archFlag)) taskFlags.AddFlag(cmd.Flags().Lookup(envVarsFlag)) taskFlags.AddFlag(cmd.Flags().Lookup(envFileFlag)) taskFlags.AddFlag(cmd.Flags().Lookup(secretsFlag)) taskFlags.AddFlag(cmd.Flags().Lookup(commandFlag)) taskFlags.AddFlag(cmd.Flags().Lookup(entrypointFlag)) taskFlags.AddFlag(cmd.Flags().Lookup(resourceTagsFlag)) utilityFlags := pflag.NewFlagSet("Utility", pflag.ContinueOnError) utilityFlags.AddFlag(cmd.Flags().Lookup(followFlag)) utilityFlags.AddFlag(cmd.Flags().Lookup(generateCommandFlag)) utilityFlags.AddFlag(cmd.Flags().Lookup(acknowledgeSecretsAccessFlag)) // prettify help menu. cmd.Annotations = map[string]string{ "name": nameFlags.FlagUsages(), "build": buildFlags.FlagUsages(), "placement": placementFlags.FlagUsages(), "task": taskFlags.FlagUsages(), "utility": utilityFlags.FlagUsages(), } cmd.SetUsageTemplate(`{{h1 "Usage"}} {{- if .Runnable}} {{.UseLine}} {{- end }} {{h1 "Name Flags"}} {{(index .Annotations "name") | trimTrailingWhitespaces}} {{h1 "Build Flags"}} {{(index .Annotations "build") | trimTrailingWhitespaces}} {{h1 "Placement Flags"}} {{(index .Annotations "placement") | trimTrailingWhitespaces}} {{h1 "Task Configuration Flags"}} {{(index .Annotations "task") | trimTrailingWhitespaces}} {{h1 "Utility Flags"}} {{(index .Annotations "utility") | trimTrailingWhitespaces}} {{if .HasExample }} {{- h1 "Examples"}} {{- code .Example}} {{- end}} `) return cmd }
1,303
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package cli import ( "bytes" "context" "errors" "fmt" "path/filepath" "testing" "github.com/aws/aws-sdk-go/aws" "github.com/aws/aws-sdk-go/aws/session" "github.com/aws/copilot-cli/internal/pkg/deploy" "github.com/aws/copilot-cli/internal/pkg/docker/dockerengine" "github.com/aws/copilot-cli/internal/pkg/ecs" ecsMocks "github.com/aws/copilot-cli/internal/pkg/ecs/mocks" "github.com/aws/copilot-cli/internal/pkg/cli/mocks" "github.com/aws/copilot-cli/internal/pkg/task" "github.com/aws/copilot-cli/internal/pkg/config" "github.com/golang/mock/gomock" "github.com/spf13/afero" "github.com/stretchr/testify/require" ) type basicOpts struct { inCount int inCPU int inMemory int } var defaultOpts = basicOpts{ inCount: 1, inCPU: 256, inMemory: 512, } type spinnerTestDouble struct { startFn func(string) stopFn func(string) } // Assert that spinnerTestDouble implements the [progress] interface. var _ progress = (*spinnerTestDouble)(nil) func (s *spinnerTestDouble) Start(label string) { if s.startFn != nil { s.startFn(label) } } func (s *spinnerTestDouble) Stop(label string) { if s.stopFn != nil { s.stopFn(label) } } func TestTaskRunOpts_Validate(t *testing.T) { testCases := map[string]struct { basicOpts inName string inImage string inDockerfilePath string inDockerfileContextPath string inTaskRole string inEnv string inCluster string inSubnets []string inSecurityGroups []string inEnvVars map[string]string inEnvFile string inSecrets map[string]string inCommand string inEntryPoint string inOS string inArch string inDefault bool inGenerateCommandTarget string appName string isDockerfileSet bool mockStore func(m *mocks.Mockstore) mockFileSystem func(mockFS afero.Fs) wantedError error }{ "valid with no flag": { basicOpts: defaultOpts, wantedError: nil, }, "valid with flags image and env": { basicOpts: defaultOpts, inName: "my-task", inImage: "113459295.dkr.ecr.ap-northeast-1.amazonaws.com/my-app", inTaskRole: "exec-role", inEnv: "dev", inEnvVars: map[string]string{ "NAME": "my-app", "ENV": "dev", }, inSecrets: map[string]string{ "quiet": "barky doggo", }, inCommand: "echo hello world", inEntryPoint: "exec 'enter here'", appName: "my-app", mockStore: func(m *mocks.Mockstore) { m.EXPECT().GetApplication("my-app").Return(&config.Application{ Name: "my-app", }, nil) m.EXPECT().GetEnvironment("my-app", "dev").Return(&config.Environment{ App: "my-app", Name: "dev", }, nil) }, wantedError: nil, }, "valid without flags image and env": { basicOpts: defaultOpts, inName: "my-task", inDockerfilePath: "hello/world/Dockerfile", inTaskRole: "exec-role", inSubnets: []string{"subnet-10d938jds"}, inSecurityGroups: []string{"sg-0d9sjdk", "sg-d33kds99"}, inEnvVars: map[string]string{ "NAME": "pj", "ENV": "dev", }, inCommand: "echo hello world", mockFileSystem: func(mockFS afero.Fs) { mockFS.MkdirAll("hello/world", 0755) afero.WriteFile(mockFS, "hello/world/Dockerfile", []byte("FROM nginx"), 0644) }, wantedError: nil, }, "invalid with os but not arch": { basicOpts: defaultOpts, inOS: "WINDOWS_SERVER_2019_CORE", wantedError: errors.New("must specify either both `--platform-os` and `--platform-arch` or neither"), }, "invalid with arch but not os": { basicOpts: defaultOpts, inArch: "X86_64", wantedError: errors.New("must specify either both `--platform-os` and `--platform-arch` or neither"), }, "invalid platform": { basicOpts: defaultOpts, inOS: "OStrich", inArch: "MAD666", wantedError: errors.New("platform OSTRICH/MAD666 is invalid; valid platforms are: WINDOWS_SERVER_2019_CORE/X86_64, WINDOWS_SERVER_2019_FULL/X86_64, WINDOWS_SERVER_2022_CORE/X86_64, WINDOWS_SERVER_2022_FULL/X86_64, LINUX/X86_64 and LINUX/ARM64"), }, "uppercase any lowercase before validating": { basicOpts: basicOpts{ inCount: 1, inCPU: 1024, inMemory: 2048, }, inOS: "windows_server_2019_core", inArch: "x86_64", wantedError: nil, }, "invalid number of tasks": { basicOpts: basicOpts{ inCount: -1, inCPU: 256, inMemory: 512, }, wantedError: errNumNotPositive, }, "invalid number of CPU units": { basicOpts: basicOpts{ inCount: 1, inCPU: -15, inMemory: 512, }, wantedError: errCPUNotPositive, }, "invalid number of CPU units for Windows task": { basicOpts: basicOpts{ inCount: 1, inCPU: 260, inMemory: 512, }, inOS: "WINDOWS_SERVER_2019_CORE", inArch: "X86_64", wantedError: errors.New("CPU is 260, but it must be at least 1024 for a Windows-based task"), }, "invalid memory": { basicOpts: basicOpts{ inCount: 1, inCPU: 256, inMemory: -1024, }, wantedError: errMemNotPositive, }, "invalid memory for Windows task": { basicOpts: basicOpts{ inCount: 1, inCPU: 1024, inMemory: 2000, }, inOS: "WINDOWS_SERVER_2019_CORE", inArch: "X86_64", wantedError: errors.New("memory is 2000, but it must be at least 2048 for a Windows-based task"), }, "both build context and image name specified": { basicOpts: defaultOpts, inImage: "113459295.dkr.ecr.ap-northeast-1.amazonaws.com/my-app", inDockerfileContextPath: "../../other", wantedError: errors.New("cannot specify both `--image` and `--build-context`"), }, "both dockerfile and image name specified": { basicOpts: defaultOpts, inImage: "113459295.dkr.ecr.ap-northeast-1.amazonaws.com/my-app", isDockerfileSet: true, wantedError: errors.New("cannot specify both `--image` and `--dockerfile`"), }, "invalid dockerfile path": { basicOpts: defaultOpts, inDockerfilePath: "world/hello/Dockerfile", isDockerfileSet: true, wantedError: fmt.Errorf("invalid `--dockerfile` path: open %s: file does not exist", filepath.FromSlash("world/hello/Dockerfile")), }, "invalid build context path": { basicOpts: defaultOpts, inDockerfileContextPath: "world/hello/Dockerfile", wantedError: fmt.Errorf("invalid `--build-context` path: open %s: file does not exist", filepath.FromSlash("world/hello/Dockerfile")), }, "specified app exists": { basicOpts: defaultOpts, appName: "my-app", mockStore: func(m *mocks.Mockstore) { m.EXPECT().GetApplication("my-app").Return(&config.Application{ Name: "my-app", }, nil) }, wantedError: nil, }, "unknown app": { basicOpts: defaultOpts, appName: "my-app", mockStore: func(m *mocks.Mockstore) { m.EXPECT().GetApplication("my-app").Return(nil, &config.ErrNoSuchApplication{ ApplicationName: "my-app", AccountID: "115", Region: "us-east-1", }) }, wantedError: errors.New("get application: couldn't find an application named my-app in account 115 and region us-east-1"), }, "env exists in app": { basicOpts: defaultOpts, appName: "my-app", inEnv: "dev", mockStore: func(m *mocks.Mockstore) { m.EXPECT().GetEnvironment("my-app", "dev").Return(&config.Environment{ App: "my-app", Name: "dev", }, nil) m.EXPECT().GetApplication("my-app").Return(&config.Application{ Name: "my-app", }, nil) }, wantedError: nil, }, "unknown env in app": { basicOpts: defaultOpts, appName: "my-app", inEnv: "dev", mockStore: func(m *mocks.Mockstore) { m.EXPECT().GetEnvironment("my-app", "dev").Return(nil, &config.ErrNoSuchEnvironment{ ApplicationName: "my-app", EnvironmentName: "dev", }) m.EXPECT().GetApplication("my-app").Return(&config.Application{ Name: "my-app", }, nil) }, wantedError: errors.New("get environment dev config: couldn't find environment dev in the application my-app"), }, "no workspace": { basicOpts: defaultOpts, inEnv: "test", wantedError: errNoAppInWorkspace, }, "both environment and subnets specified": { basicOpts: defaultOpts, inEnv: "test", inSubnets: []string{"subnet id"}, wantedError: errors.New("cannot specify both `--subnets` and `--env`"), }, "both application and subnets specified": { basicOpts: defaultOpts, appName: "my-app", inSubnets: []string{"subnet id"}, wantedError: errors.New("cannot specify both `--subnets` and `--app`"), }, "both default and subnets specified": { basicOpts: defaultOpts, inDefault: true, inSubnets: []string{"subnet id"}, wantedError: errors.New("cannot specify both `--subnets` and `--default`"), }, "both cluster and default specified": { basicOpts: defaultOpts, inDefault: true, inCluster: "special-cluster", wantedError: errors.New("cannot specify both `--default` and `--cluster`"), }, "both cluster and application specified": { basicOpts: defaultOpts, inCluster: "special-cluster", appName: "my-app", wantedError: errors.New("cannot specify both `--app` and `--cluster`"), }, "both cluster and environment specified": { basicOpts: defaultOpts, inCluster: "special-cluster", inEnv: "my-env", wantedError: errors.New("cannot specify both `--env` and `--cluster`"), }, "generate-cmd specified with another flag": { basicOpts: defaultOpts, inGenerateCommandTarget: "cluster/service", // nFlag is set to 2. wantedError: errors.New("cannot specify `--generate-cmd` with any other flag"), }, "invalid env file extension": { basicOpts: defaultOpts, inEnvFile: "test.efdnv", wantedError: errors.New("environment file test.efdnv specified in --env-file must have a .env file extension"), }, "valid env file extension": { basicOpts: defaultOpts, inEnvFile: "test.env", wantedError: nil, }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { ctrl := gomock.NewController(t) defer ctrl.Finish() mockStore := mocks.NewMockstore(ctrl) opts := runTaskOpts{ runTaskVars: runTaskVars{ appName: tc.appName, count: tc.inCount, cpu: tc.inCPU, memory: tc.inMemory, groupName: tc.inName, image: tc.inImage, env: tc.inEnv, taskRole: tc.inTaskRole, cluster: tc.inCluster, subnets: tc.inSubnets, securityGroups: tc.inSecurityGroups, dockerfilePath: tc.inDockerfilePath, dockerfileContextPath: tc.inDockerfileContextPath, envVars: tc.inEnvVars, envFile: tc.inEnvFile, secrets: tc.inSecrets, command: tc.inCommand, entrypoint: tc.inEntryPoint, useDefaultSubnetsAndCluster: tc.inDefault, generateCommandTarget: tc.inGenerateCommandTarget, os: tc.inOS, arch: tc.inArch, }, isDockerfileSet: tc.isDockerfileSet, nFlag: 2, fs: &afero.Afero{Fs: afero.NewMemMapFs()}, store: mockStore, } if tc.mockFileSystem != nil { tc.mockFileSystem(opts.fs) } if tc.mockStore != nil { tc.mockStore(mockStore) } err := opts.Validate() if tc.wantedError != nil { require.EqualError(t, err, tc.wantedError.Error()) } else { require.NoError(t, err) } }) } } func TestTaskRunOpts_Ask(t *testing.T) { testCases := map[string]struct { inName string inCluster string inSubnets []string inSecurityGroups []string inDefault bool inEnv string appName string inSecrets map[string]string inSsmParamSecrets map[string]string inSecretsManagerSecrets map[string]string inAcknowledgeSecretsAccess bool inExecutionRole string mockSel func(m *mocks.MockappEnvSelector) mockPrompt func(m *mocks.Mockprompter) wantedError error wantedApp string wantedEnv string wantedName string }{ "selected an existing application": { mockPrompt: func(m *mocks.Mockprompter) { m.EXPECT().Get(gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any()).AnyTimes() }, mockSel: func(m *mocks.MockappEnvSelector) { m.EXPECT().Application(taskRunAppPrompt, gomock.Any(), appEnvOptionNone).Return("app", nil) m.EXPECT().Environment(taskRunEnvPrompt, gomock.Any(), gomock.Any(), gomock.Any()).Times(1) }, wantedApp: "app", }, "selected None app": { mockPrompt: func(m *mocks.Mockprompter) { m.EXPECT().Get(gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any()).AnyTimes() }, mockSel: func(m *mocks.MockappEnvSelector) { m.EXPECT().Application(taskRunAppPrompt, gomock.Any(), appEnvOptionNone).Return(appEnvOptionNone, nil) }, wantedApp: "", }, "don't prompt for app when under a workspace or app flag is specified": { appName: "my-app", inDefault: true, mockPrompt: func(m *mocks.Mockprompter) { m.EXPECT().Get(gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any()).AnyTimes() }, mockSel: func(m *mocks.MockappEnvSelector) { m.EXPECT().Application(taskRunAppPrompt, gomock.Any(), gomock.Any()).Times(0) m.EXPECT().Environment(taskRunEnvPrompt, gomock.Any(), gomock.Any(), appEnvOptionNone).AnyTimes() }, wantedApp: "my-app", }, "don't prompt for env if env is provided": { inEnv: "test", appName: "my-app", mockPrompt: func(m *mocks.Mockprompter) { m.EXPECT().Get(gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any()).AnyTimes() }, mockSel: func(m *mocks.MockappEnvSelector) { m.EXPECT().Environment(gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any()).Times(0) }, wantedEnv: "test", wantedApp: "my-app", }, "don't prompt for env if no workspace and selected None app": { mockPrompt: func(m *mocks.Mockprompter) { m.EXPECT().Get(gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any()).AnyTimes() }, mockSel: func(m *mocks.MockappEnvSelector) { m.EXPECT().Application(gomock.Any(), gomock.Any(), appEnvOptionNone).Return(appEnvOptionNone, nil) m.EXPECT().Environment(gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any()).Times(0) }, wantedEnv: "", }, "don't prompt for app if using default": { inDefault: true, mockPrompt: func(m *mocks.Mockprompter) { m.EXPECT().Get(gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any()).AnyTimes() }, mockSel: func(m *mocks.MockappEnvSelector) { m.EXPECT().Application(taskRunAppPrompt, gomock.Any(), gomock.Any()).Times(0) m.EXPECT().Environment(taskRunEnvPrompt, gomock.Any(), gomock.Any(), appEnvOptionNone).AnyTimes() }, wantedApp: "", }, "don't prompt for env if using default": { inDefault: true, mockPrompt: func(m *mocks.Mockprompter) { m.EXPECT().Get(gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any()).AnyTimes() }, mockSel: func(m *mocks.MockappEnvSelector) { m.EXPECT().Application(gomock.Any(), gomock.Any(), appEnvOptionNone).AnyTimes() m.EXPECT().Environment(gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any()).Times(0) }, wantedEnv: "", }, "don't prompt for app if subnets are specified": { inSubnets: []string{"subnet-1"}, mockPrompt: func(m *mocks.Mockprompter) { m.EXPECT().Get(gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any()).AnyTimes() }, mockSel: func(m *mocks.MockappEnvSelector) { m.EXPECT().Application(taskRunAppPrompt, gomock.Any(), gomock.Any()).Times(0) m.EXPECT().Environment(taskRunEnvPrompt, gomock.Any(), gomock.Any(), appEnvOptionNone).AnyTimes() }, }, "don't prompt for app if cluster is specified": { inCluster: "cluster-1", mockPrompt: func(m *mocks.Mockprompter) { m.EXPECT().Get(gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any()).AnyTimes() }, mockSel: func(m *mocks.MockappEnvSelector) { m.EXPECT().Application(taskRunAppPrompt, gomock.Any(), gomock.Any()).AnyTimes() m.EXPECT().Environment(taskRunEnvPrompt, gomock.Any(), gomock.Any(), appEnvOptionNone).Times(0) }, }, "don't prompt for env if subnets are specified": { inSubnets: []string{"subnet-1"}, mockPrompt: func(m *mocks.Mockprompter) { m.EXPECT().Get(gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any()).AnyTimes() }, mockSel: func(m *mocks.MockappEnvSelector) { m.EXPECT().Application(taskRunAppPrompt, gomock.Any(), gomock.Any()).AnyTimes() m.EXPECT().Environment(taskRunEnvPrompt, gomock.Any(), gomock.Any(), appEnvOptionNone).Times(0) }, }, "don't prompt for env if cluster is specified": { inCluster: "cluster-1", mockPrompt: func(m *mocks.Mockprompter) { m.EXPECT().Get(gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any()).AnyTimes() }, mockSel: func(m *mocks.MockappEnvSelector) { m.EXPECT().Application(taskRunAppPrompt, gomock.Any(), gomock.Any()).AnyTimes() m.EXPECT().Environment(taskRunEnvPrompt, gomock.Any(), gomock.Any(), appEnvOptionNone).Times(0) }, }, "don't prompt for app if security groups are specified": { inSecurityGroups: []string{"sg-1"}, mockPrompt: func(m *mocks.Mockprompter) { m.EXPECT().Get(gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any()).AnyTimes() }, mockSel: func(m *mocks.MockappEnvSelector) { m.EXPECT().Application(taskRunAppPrompt, gomock.Any(), gomock.Any()).Times(0) m.EXPECT().Environment(taskRunEnvPrompt, gomock.Any(), gomock.Any(), appEnvOptionNone).AnyTimes() }, }, "don't prompt for env if security groups are specified": { inSecurityGroups: []string{"sg-1"}, mockPrompt: func(m *mocks.Mockprompter) { m.EXPECT().Get(gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any()).AnyTimes() }, mockSel: func(m *mocks.MockappEnvSelector) { m.EXPECT().Application(taskRunAppPrompt, gomock.Any(), gomock.Any()).AnyTimes() m.EXPECT().Environment(taskRunEnvPrompt, gomock.Any(), gomock.Any(), appEnvOptionNone).Times(0) }, }, "selected an existing environment": { appName: "my-app", mockPrompt: func(m *mocks.Mockprompter) { m.EXPECT().Get(gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any()).AnyTimes() }, mockSel: func(m *mocks.MockappEnvSelector) { m.EXPECT().Environment(taskRunEnvPrompt, gomock.Any(), "my-app", appEnvOptionNone).Return("test", nil) }, wantedEnv: "test", wantedApp: "my-app", }, "selected None env": { appName: "my-app", mockPrompt: func(m *mocks.Mockprompter) { m.EXPECT().Get(gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any()).AnyTimes() }, mockSel: func(m *mocks.MockappEnvSelector) { m.EXPECT().Environment(taskRunEnvPrompt, gomock.Any(), "my-app", appEnvOptionNone).Return(appEnvOptionNone, nil) }, wantedEnv: "", wantedApp: "my-app", }, "error selecting environment": { appName: "my-app", mockPrompt: func(m *mocks.Mockprompter) { m.EXPECT().Get(gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any()).AnyTimes() }, mockSel: func(m *mocks.MockappEnvSelector) { m.EXPECT().Environment(taskRunEnvPrompt, gomock.Any(), gomock.Any(), appEnvOptionNone). Return("", fmt.Errorf("error selecting environment")) }, wantedError: errors.New("ask for environment: error selecting environment"), }, "When secrets are provided without app and env leads to a secret access permission prompt": { inSecrets: map[string]string{ "quiet": "shh", }, inSsmParamSecrets: map[string]string{ "quiet": "shh", }, inSecretsManagerSecrets: map[string]string{ "quiet": "shh", }, inCluster: "cluster-1", mockPrompt: func(m *mocks.Mockprompter) { m.EXPECT().Confirm(taskSecretsPermissionPrompt, taskSecretsPermissionPromptHelp).Return(true, nil) }, }, "secret access permission prompt is skipped when acknowledge-secret-access flag is provided": { inSecrets: map[string]string{ "quiet": "shh", }, inCluster: "cluster-1", inAcknowledgeSecretsAccess: true, mockPrompt: func(m *mocks.Mockprompter) { m.EXPECT().Confirm(taskSecretsPermissionPrompt, taskSecretsPermissionPromptHelp).Times(0) }, }, "secret access permission prompt is skipped when execution-role is provided": { inSecrets: map[string]string{ "quiet": "shh", }, inCluster: "cluster-1", inExecutionRole: "test-role", mockPrompt: func(m *mocks.Mockprompter) { m.EXPECT().Confirm(taskSecretsPermissionPrompt, taskSecretsPermissionPromptHelp).Times(0) }, }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { ctrl := gomock.NewController(t) defer ctrl.Finish() mockSel := mocks.NewMockappEnvSelector(ctrl) mockPrompter := mocks.NewMockprompter(ctrl) if tc.mockSel != nil { tc.mockSel(mockSel) } if tc.mockPrompt != nil { tc.mockPrompt(mockPrompter) } opts := runTaskOpts{ runTaskVars: runTaskVars{ appName: tc.appName, groupName: tc.inName, env: tc.inEnv, useDefaultSubnetsAndCluster: tc.inDefault, subnets: tc.inSubnets, securityGroups: tc.inSecurityGroups, cluster: tc.inCluster, acknowledgeSecretsAccess: tc.inAcknowledgeSecretsAccess, secrets: tc.inSecrets, executionRole: tc.inExecutionRole, }, sel: mockSel, prompt: mockPrompter, secretsManagerSecrets: tc.inSecretsManagerSecrets, ssmParamSecrets: tc.inSsmParamSecrets, } err := opts.Ask() if tc.wantedError == nil { require.NoError(t, err) require.Equal(t, tc.wantedEnv, opts.env) require.Equal(t, tc.wantedApp, opts.appName) if tc.wantedName != "" { require.Equal(t, tc.wantedName, opts.groupName) } } else { require.EqualError(t, tc.wantedError, err.Error()) } }) } } type runTaskMocks struct { deployer *mocks.MocktaskDeployer repository *mocks.MockrepositoryService runner *mocks.MocktaskRunner store *mocks.Mockstore eventsWriter *mocks.MockeventsWriter defaultClusterGetter *mocks.MockdefaultClusterGetter publicIPGetter *mocks.MockpublicIPGetter provider *mocks.MocksessionProvider uploader *mocks.Mockuploader } func mockHasDefaultCluster(m runTaskMocks) { m.defaultClusterGetter.EXPECT().HasDefaultCluster().Return(true, nil).AnyTimes() } func mockRepositoryAnytime(m runTaskMocks) { m.repository.EXPECT().Login().AnyTimes() m.repository.EXPECT().BuildAndPush(context.Background(), gomock.Any(), gomock.Any()).AnyTimes() } func TestTaskRunOpts_Execute(t *testing.T) { const ( inGroupName = "my-task" mockRepoURI = "uri/repo" tag = "tag" ) ctx := context.Background() defaultBuildArguments := dockerengine.BuildArguments{ URI: mockRepoURI, Context: filepath.Dir(defaultDockerfilePath), Tags: []string{imageTagLatest}, } testCases := map[string]struct { inSecrets map[string]string inImage string inTag string inDockerCtx string inFollow bool inCommand string inEntryPoint string inEnvFile string inApp string inEnv string setupFs func(fs *afero.Afero) setupMocks func(m runTaskMocks) wantedError error }{ "check if default cluster exists if deploying to default cluster": { setupMocks: func(m runTaskMocks) { m.provider.EXPECT().Default().Return(&session.Session{}, nil) m.store.EXPECT().GetEnvironment(gomock.Any(), gomock.Any()).AnyTimes() m.defaultClusterGetter.EXPECT().HasDefaultCluster().Return(true, nil) m.deployer.EXPECT().DeployTask(gomock.Any()).Return(nil).AnyTimes() mockRepositoryAnytime(m) m.runner.EXPECT().Run().AnyTimes() }, }, "do not check for default cluster if deploying to environment": { inEnv: "test", setupMocks: func(m runTaskMocks) { m.defaultClusterGetter.EXPECT().HasDefaultCluster().Times(0) m.store.EXPECT(). GetEnvironment(gomock.Any(), "test"). Return(&config.Environment{ ExecutionRoleARN: "env execution role", }, nil) m.provider.EXPECT().FromRole(gomock.Any(), gomock.Any()) m.deployer.EXPECT().DeployTask(gomock.Any(), gomock.Any()).Return(nil).AnyTimes() mockRepositoryAnytime(m) m.runner.EXPECT().Run().AnyTimes() }, }, "error deploying resources": { setupMocks: func(m runTaskMocks) { m.provider.EXPECT().Default().Return(&session.Session{}, nil) m.store.EXPECT().GetEnvironment(gomock.Any(), gomock.Any()).AnyTimes() m.deployer.EXPECT().DeployTask(&deploy.CreateTaskResourcesInput{ Name: inGroupName, Image: "", Command: []string{}, EntryPoint: []string{}, }).Return(errors.New("error deploying")) mockHasDefaultCluster(m) }, wantedError: errors.New("provision resources for task my-task: error deploying"), }, "error performing docker login": { setupMocks: func(m runTaskMocks) { m.provider.EXPECT().Default().Return(&session.Session{}, nil) m.store.EXPECT().GetEnvironment(gomock.Any(), gomock.Any()).AnyTimes() m.deployer.EXPECT().DeployTask(&deploy.CreateTaskResourcesInput{ Name: inGroupName, Image: "", Command: []string{}, EntryPoint: []string{}, }).Return(nil) m.repository.EXPECT().Login().Return(mockRepoURI, errors.New("some error")) mockHasDefaultCluster(m) }, wantedError: errors.New("login to docker: some error"), }, "error updating resources": { setupMocks: func(m runTaskMocks) { m.provider.EXPECT().Default().Return(&session.Session{}, nil) m.store.EXPECT().GetEnvironment(gomock.Any(), gomock.Any()).AnyTimes() m.deployer.EXPECT().DeployTask(&deploy.CreateTaskResourcesInput{ Name: inGroupName, Image: "", Command: []string{}, EntryPoint: []string{}, }).Return(nil) m.repository.EXPECT().Login().Return(mockRepoURI, nil) m.repository.EXPECT().BuildAndPush(ctx, gomock.Any(), gomock.Any()) m.deployer.EXPECT().DeployTask(&deploy.CreateTaskResourcesInput{ Name: inGroupName, Image: "uri/repo:latest", Command: []string{}, EntryPoint: []string{}, }).Times(1).Return(errors.New("error updating")) mockHasDefaultCluster(m) }, wantedError: errors.New("update resources for task my-task: error updating"), }, "error running tasks": { setupMocks: func(m runTaskMocks) { m.provider.EXPECT().Default().Return(&session.Session{}, nil) m.store.EXPECT().GetEnvironment(gomock.Any(), gomock.Any()).AnyTimes() m.deployer.EXPECT().DeployTask(gomock.Any()).Return(nil).Times(2) mockRepositoryAnytime(m) m.runner.EXPECT().Run().Return(nil, errors.New("error running")) mockHasDefaultCluster(m) }, wantedError: errors.New("run task my-task: error running"), }, "deploy with execution role option if env is not empty": { inEnv: "test", setupMocks: func(m runTaskMocks) { m.store.EXPECT().GetEnvironment(gomock.Any(), "test"). Return(&config.Environment{ ExecutionRoleARN: "env execution role", }, nil) m.provider.EXPECT().FromRole(gomock.Any(), gomock.Any()) m.deployer.EXPECT().DeployTask(gomock.Any(), gomock.Len(1)).AnyTimes() // NOTE: matching length because gomock is unable to match function arguments. mockRepositoryAnytime(m) m.runner.EXPECT().Run().AnyTimes() m.defaultClusterGetter.EXPECT().HasDefaultCluster().Times(0) }, }, "deploy without execution role option if env is empty": { setupMocks: func(m runTaskMocks) { m.provider.EXPECT().Default().Return(&session.Session{}, nil) m.store.EXPECT().GetEnvironment(gomock.Any(), gomock.Any()).Times(0) m.deployer.EXPECT().DeployTask(gomock.Any(), gomock.Len(0)).AnyTimes() // NOTE: matching length because gomock is unable to match function arguments. mockRepositoryAnytime(m) m.runner.EXPECT().Run().AnyTimes() mockHasDefaultCluster(m) }, }, "append 'latest' to image tag": { inTag: tag, setupMocks: func(m runTaskMocks) { m.provider.EXPECT().Default().Return(&session.Session{}, nil) m.store.EXPECT().GetEnvironment(gomock.Any(), gomock.Any()).AnyTimes() m.deployer.EXPECT().DeployTask(gomock.Any()).AnyTimes() m.repository.EXPECT().Login().Return(mockRepoURI, nil) m.repository.EXPECT().BuildAndPush(ctx, gomock.Eq( &dockerengine.BuildArguments{ URI: mockRepoURI, Context: filepath.Dir(defaultDockerfilePath), Tags: []string{imageTagLatest, tag}, }), gomock.Any(), ) m.runner.EXPECT().Run().AnyTimes() mockHasDefaultCluster(m) }, }, "should use provided docker build context instead of dockerfile path": { inDockerCtx: "../../other", setupMocks: func(m runTaskMocks) { m.provider.EXPECT().Default().Return(&session.Session{}, nil) m.store.EXPECT().GetEnvironment(gomock.Any(), gomock.Any()).AnyTimes() m.deployer.EXPECT().DeployTask(gomock.Any()).AnyTimes() m.repository.EXPECT().Login().Return(mockRepoURI, nil) m.repository.EXPECT().BuildAndPush(ctx, gomock.Eq( &dockerengine.BuildArguments{ URI: mockRepoURI, Context: "../../other", Tags: []string{imageTagLatest}, }), gomock.Any(), ) m.runner.EXPECT().Run().AnyTimes() mockHasDefaultCluster(m) }, }, "update image to task resource if image is not provided": { inCommand: `/bin/sh -c "curl $ECS_CONTAINER_METADATA_URI_V4"`, inEntryPoint: `exec "some command"`, setupMocks: func(m runTaskMocks) { m.provider.EXPECT().Default().Return(&session.Session{}, nil) m.store.EXPECT().GetEnvironment(gomock.Any(), gomock.Any()).AnyTimes() m.deployer.EXPECT().DeployTask(&deploy.CreateTaskResourcesInput{ Name: inGroupName, Image: "", Command: []string{"/bin/sh", "-c", "curl $ECS_CONTAINER_METADATA_URI_V4"}, EntryPoint: []string{"exec", "some command"}, }).Times(1).Return(nil) m.repository.EXPECT().Login().Return(mockRepoURI, nil) m.repository.EXPECT().BuildAndPush(ctx, gomock.Eq(&defaultBuildArguments), gomock.Any()) m.deployer.EXPECT().DeployTask(&deploy.CreateTaskResourcesInput{ Name: inGroupName, Image: "uri/repo:latest", Command: []string{"/bin/sh", "-c", "curl $ECS_CONTAINER_METADATA_URI_V4"}, EntryPoint: []string{"exec", "some command"}, }).Times(1).Return(nil) m.runner.EXPECT().Run().AnyTimes() mockHasDefaultCluster(m) }, }, "fail to get ENI information for some tasks": { setupMocks: func(m runTaskMocks) { m.provider.EXPECT().Default().Return(&session.Session{}, nil) m.deployer.EXPECT().DeployTask(gomock.Any()).AnyTimes() m.runner.EXPECT().Run().Return([]*task.Task{ { TaskARN: "task-1", ENI: "eni-1", }, { TaskARN: "task-2", }, { TaskARN: "task-3", }, }, nil) m.publicIPGetter.EXPECT().PublicIP("eni-1").Return("1.2.3", nil) mockHasDefaultCluster(m) mockRepositoryAnytime(m) }, }, "fail to get public ips": { setupMocks: func(m runTaskMocks) { m.provider.EXPECT().Default().Return(&session.Session{}, nil) m.deployer.EXPECT().DeployTask(gomock.Any()).AnyTimes() m.runner.EXPECT().Run().Return([]*task.Task{ { TaskARN: "task-1", ENI: "eni-1", }, }, nil) m.publicIPGetter.EXPECT().PublicIP("eni-1").Return("", errors.New("some error")) mockHasDefaultCluster(m) mockRepositoryAnytime(m) }, // wantedError is nil because we will just not show the IP address if we can't instead of erroring out. }, "fail to write events": { inFollow: true, inImage: "image", setupMocks: func(m runTaskMocks) { m.provider.EXPECT().Default().Return(&session.Session{}, nil) m.deployer.EXPECT().DeployTask(gomock.Any()).AnyTimes() m.runner.EXPECT().Run().Return([]*task.Task{ { TaskARN: "task-1", ENI: "eni-1", }, }, nil) m.publicIPGetter.EXPECT().PublicIP("eni-1").Return("1.2.3", nil) m.eventsWriter.EXPECT().WriteEventsUntilStopped().Times(1). Return(errors.New("error writing events")) mockHasDefaultCluster(m) }, wantedError: errors.New("write events: error writing events"), }, "error getting app config (to look for permissions boundary policy)": { inApp: "my-app", inEnv: "test", setupMocks: func(m runTaskMocks) { m.store.EXPECT().GetEnvironment(gomock.Any(), "test"). Return(&config.Environment{ ExecutionRoleARN: "env execution role", }, nil) m.provider.EXPECT().FromRole(gomock.Any(), gomock.Any()) m.store.EXPECT().GetApplication("my-app").Return(nil, errors.New("some error")) m.deployer.EXPECT().DeployTask(gomock.Any(), gomock.Len(1)).AnyTimes() // NOTE: matching length because gomock is unable to match function arguments. mockRepositoryAnytime(m) m.runner.EXPECT().Run().AnyTimes() m.defaultClusterGetter.EXPECT().HasDefaultCluster().Times(0) }, wantedError: fmt.Errorf("provision resources for task %s: get application: some error", "my-task"), }, "env file happy path": { inEnvFile: "testdir/../magic.env", inApp: "my-app", inImage: "some-image", setupFs: func(fs *afero.Afero) { afero.Fs.Mkdir(fs, "testdir", 0755) afero.WriteFile(fs, "magic.env", []byte("SOMETHING=VALUE"), 0644) }, setupMocks: func(m runTaskMocks) { region := "us-east-35" m.provider.EXPECT().Default().Return(&session.Session{ Config: &aws.Config{ // uh oh, new leaked region Region: aws.String(region), }, }, nil) m.defaultClusterGetter.EXPECT().HasDefaultCluster().Return(true, nil) info := deploy.TaskStackInfo{BucketName: "arn:aws:s3:::bigbucket"} m.store.EXPECT().GetApplication("my-app").Return(&config.Application{Name: "my-app"}, nil).Times(2) m.deployer.EXPECT().GetTaskStack(inGroupName).Return(&info, nil) key := "manual/env-files/magic.env/4963d64294508aa3fa103ccac5ad1537944c577d469608ddccad09b6f79b6406.env" url := "https://bigbucket.s3-us-west-2.amazonaws.com/" + key m.uploader.EXPECT().Upload("arn:aws:s3:::bigbucket", key, bytes.NewReader([]byte("SOMETHING=VALUE"))).Return(url, nil) m.deployer.EXPECT().DeployTask(gomock.Any(), gomock.Any()).Return(nil).AnyTimes() mockRepositoryAnytime(m) m.runner.EXPECT().Run().AnyTimes() }, }, "env file not found": { inEnvFile: "sadness.env", inApp: "my-app", setupMocks: func(m runTaskMocks) { region := "us-east-35" m.provider.EXPECT().Default().Return(&session.Session{ Config: &aws.Config{ // uh oh, new leaked region Region: aws.String(region), }, }, nil) m.defaultClusterGetter.EXPECT().HasDefaultCluster().Return(true, nil) info := deploy.TaskStackInfo{BucketName: "arn:aws:s3:::bigbucket"} m.store.EXPECT().GetApplication("my-app").Return(&config.Application{Name: "my-app"}, nil) m.deployer.EXPECT().GetTaskStack(inGroupName).Return(&info, nil) m.deployer.EXPECT().DeployTask(gomock.Any(), gomock.Any()).Return(nil) }, wantedError: errors.New("deploy env file sadness.env: read env file sadness.env: open sadness.env: file does not exist"), }, "env file pipeline resource add fail": { inEnvFile: "testdir/../magic.env", inApp: "my-app", setupFs: func(fs *afero.Afero) { afero.Fs.Mkdir(fs, "testdir", 0755) afero.WriteFile(fs, "magic.env", []byte("SOMETHING=VALUE"), 0644) }, setupMocks: func(m runTaskMocks) { region := "us-east-35" m.deployer.EXPECT().DeployTask(gomock.Any(), gomock.Any()).Return(nil) m.provider.EXPECT().Default().Return(&session.Session{ Config: &aws.Config{ // uh oh, new leaked region Region: aws.String(region), }, }, nil) m.defaultClusterGetter.EXPECT().HasDefaultCluster().Return(true, nil) m.store.EXPECT().GetApplication("my-app").Return(&config.Application{Name: "my-app"}, nil) m.deployer.EXPECT().GetTaskStack(inGroupName).Return(nil, errors.New("hull breach in sector 3")) }, wantedError: errors.New("deploy env file testdir/../magic.env: deploy env file: hull breach in sector 3"), }, "env file s3 upload failure": { inEnvFile: "testdir/../magic.env", inApp: "my-app", setupFs: func(fs *afero.Afero) { afero.Fs.Mkdir(fs, "testdir", 0755) afero.WriteFile(fs, "magic.env", []byte("SOMETHING=VALUE"), 0644) }, setupMocks: func(m runTaskMocks) { region := "us-east-35" m.deployer.EXPECT().DeployTask(gomock.Any(), gomock.Any()).Return(nil) m.provider.EXPECT().Default().Return(&session.Session{ Config: &aws.Config{ // uh oh, new leaked region Region: aws.String(region), }, }, nil) m.defaultClusterGetter.EXPECT().HasDefaultCluster().Return(true, nil) info := deploy.TaskStackInfo{BucketName: "arn:aws:s3:::bigbucket"} m.store.EXPECT().GetApplication("my-app").Return(&config.Application{Name: "my-app"}, nil) m.deployer.EXPECT().GetTaskStack(inGroupName).Return(&info, nil) key := "manual/env-files/magic.env/4963d64294508aa3fa103ccac5ad1537944c577d469608ddccad09b6f79b6406.env" arn := "arn:aws:s3:::bigbucket/" + key m.uploader.EXPECT().Upload("arn:aws:s3:::bigbucket", key, bytes.NewReader([]byte("SOMETHING=VALUE"))).Return(arn, errors.New("out of floppy disks")) }, wantedError: errors.New("deploy env file testdir/../magic.env: put env file testdir/../magic.env artifact to bucket arn:aws:s3:::bigbucket: out of floppy disks"), }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { ctrl := gomock.NewController(t) defer ctrl.Finish() fs := &afero.Afero{Fs: afero.NewMemMapFs()} if tc.setupFs != nil { tc.setupFs(fs) } mocks := runTaskMocks{ deployer: mocks.NewMocktaskDeployer(ctrl), repository: mocks.NewMockrepositoryService(ctrl), runner: mocks.NewMocktaskRunner(ctrl), store: mocks.NewMockstore(ctrl), eventsWriter: mocks.NewMockeventsWriter(ctrl), defaultClusterGetter: mocks.NewMockdefaultClusterGetter(ctrl), publicIPGetter: mocks.NewMockpublicIPGetter(ctrl), provider: mocks.NewMocksessionProvider(ctrl), uploader: mocks.NewMockuploader(ctrl), } tc.setupMocks(mocks) opts := &runTaskOpts{ runTaskVars: runTaskVars{ groupName: inGroupName, image: tc.inImage, imageTag: tc.inTag, dockerfileContextPath: tc.inDockerCtx, appName: tc.inApp, env: tc.inEnv, follow: tc.inFollow, secrets: tc.inSecrets, command: tc.inCommand, entrypoint: tc.inEntryPoint, envFile: tc.inEnvFile, }, spinner: &spinnerTestDouble{}, store: mocks.store, provider: mocks.provider, fs: fs.Fs, } opts.configureRuntimeOpts = func() error { opts.runner = mocks.runner opts.deployer = mocks.deployer opts.defaultClusterGetter = mocks.defaultClusterGetter opts.publicIPGetter = mocks.publicIPGetter return nil } opts.configureRepository = func() error { opts.repository = mocks.repository return nil } opts.configureEventsWriter = func(tasks []*task.Task) { opts.eventsWriter = mocks.eventsWriter } opts.configureUploader = func(session *session.Session) uploader { return mocks.uploader } err := opts.Execute() if tc.wantedError != nil { require.EqualError(t, err, tc.wantedError.Error()) } else { require.NoError(t, err) } }) } } type mockRunTaskRequester struct { mockRunTaskRequestFromECSService func(client ecs.ECSServiceDescriber, cluster string, service string) (*ecs.RunTaskRequest, error) mockRunTaskRequestFromService func(client ecs.ServiceDescriber, app, env, svc string) (*ecs.RunTaskRequest, error) mockRunTaskRequestFromJob func(client ecs.JobDescriber, app, env, job string) (*ecs.RunTaskRequest, error) } type taskRunMocks struct { store *mocks.Mockstore provider *mocks.MocksessionProvider envCompatibilityChecker *mocks.MockversionCompatibilityChecker } func TestTaskRunOpts_runTaskCommand(t *testing.T) { wantedCommand := ecs.RunTaskRequest{} testCases := map[string]struct { inGenerateCommandTarget string setUpMocks func(m *taskRunMocks) mockRunTaskRequester mockRunTaskRequester wantedCommand *ecs.RunTaskRequest wantedError error }{ "should generate a command given an service ARN": { inGenerateCommandTarget: "arn:aws:ecs:us-east-1:123456789012:service/crowded-cluster/good-service", setUpMocks: func(m *taskRunMocks) { m.provider.EXPECT().Default() }, mockRunTaskRequester: mockRunTaskRequester{ mockRunTaskRequestFromECSService: func(client ecs.ECSServiceDescriber, cluster string, service string) (*ecs.RunTaskRequest, error) { return &wantedCommand, nil }, }, wantedCommand: &wantedCommand, }, "fail to generate a command given a service ARN": { inGenerateCommandTarget: "arn:aws:ecs:us-east-1:123456789012:service/crowded-cluster/good-service", setUpMocks: func(m *taskRunMocks) { m.provider.EXPECT().Default() }, mockRunTaskRequester: mockRunTaskRequester{ mockRunTaskRequestFromECSService: func(client ecs.ECSServiceDescriber, cluster string, service string) (*ecs.RunTaskRequest, error) { return nil, errors.New("some error") }, }, wantedError: fmt.Errorf("generate task run command from ECS service crowded-cluster/good-service: some error"), }, "should generate a command given a cluster/service target": { inGenerateCommandTarget: "crowded-cluster/good-service", setUpMocks: func(m *taskRunMocks) { m.provider.EXPECT().Default() }, mockRunTaskRequester: mockRunTaskRequester{ mockRunTaskRequestFromECSService: func(client ecs.ECSServiceDescriber, cluster string, service string) (*ecs.RunTaskRequest, error) { return &wantedCommand, nil }, }, wantedCommand: &wantedCommand, }, "fail to generate a command given a cluster/service target": { inGenerateCommandTarget: "crowded-cluster/good-service", setUpMocks: func(m *taskRunMocks) { m.provider.EXPECT().Default() }, mockRunTaskRequester: mockRunTaskRequester{ mockRunTaskRequestFromECSService: func(client ecs.ECSServiceDescriber, cluster string, service string) (*ecs.RunTaskRequest, error) { return nil, errors.New("some error") }, }, wantedError: fmt.Errorf("generate task run command from ECS service crowded-cluster/good-service: some error"), }, "should generate a command given an app/env/svc target": { inGenerateCommandTarget: "good-app/good-env/good-service", setUpMocks: func(m *taskRunMocks) { m.store.EXPECT().GetEnvironment("good-app", "good-env").Return(&config.Environment{ ManagerRoleARN: "mock-role", Region: "mock-region", }, nil) m.provider.EXPECT().FromRole("mock-role", "mock-region") m.store.EXPECT().GetJob("good-app", "good-service").Return(nil, &config.ErrNoSuchJob{}) m.store.EXPECT().GetService("good-app", "good-service").Return(&config.Workload{}, nil) }, mockRunTaskRequester: mockRunTaskRequester{ mockRunTaskRequestFromService: func(client ecs.ServiceDescriber, app, env, svc string) (*ecs.RunTaskRequest, error) { return &wantedCommand, nil }, }, wantedCommand: &wantedCommand, }, "fail to generate a command given an app/env/svc target": { inGenerateCommandTarget: "good-app/good-env/good-service", setUpMocks: func(m *taskRunMocks) { m.store.EXPECT().GetEnvironment("good-app", "good-env").Return(&config.Environment{ ManagerRoleARN: "mock-role", Region: "mock-region", }, nil) m.provider.EXPECT().FromRole("mock-role", "mock-region") m.store.EXPECT().GetJob("good-app", "good-service").Return(nil, &config.ErrNoSuchJob{}) m.store.EXPECT().GetService("good-app", "good-service").Return(&config.Workload{}, nil) }, mockRunTaskRequester: mockRunTaskRequester{ mockRunTaskRequestFromService: func(client ecs.ServiceDescriber, app, env, svc string) (*ecs.RunTaskRequest, error) { return nil, errors.New("some error") }, }, wantedError: fmt.Errorf("generate task run command from service good-service of application good-app deployed in environment good-env: some error"), }, "should generate a command given an app/env/job target": { inGenerateCommandTarget: "good-app/good-env/good-job", setUpMocks: func(m *taskRunMocks) { m.store.EXPECT().GetEnvironment("good-app", "good-env").Return(&config.Environment{ ManagerRoleARN: "mock-role", Region: "mock-region", }, nil) m.provider.EXPECT().FromRole("mock-role", "mock-region") m.store.EXPECT().GetJob("good-app", "good-job").Return(&config.Workload{}, nil) m.envCompatibilityChecker.EXPECT().Version().Return("v1.12.2", nil) }, mockRunTaskRequester: mockRunTaskRequester{ mockRunTaskRequestFromJob: func(client ecs.JobDescriber, app, env, svc string) (*ecs.RunTaskRequest, error) { return &wantedCommand, nil }, }, wantedCommand: &wantedCommand, }, "fail to generate a command given an app/env/job target": { inGenerateCommandTarget: "good-app/good-env/good-job", setUpMocks: func(m *taskRunMocks) { m.store.EXPECT().GetEnvironment("good-app", "good-env").Return(&config.Environment{ ManagerRoleARN: "mock-role", Region: "mock-region", }, nil) m.provider.EXPECT().FromRole("mock-role", "mock-region") m.store.EXPECT().GetJob("good-app", "good-job").Return(&config.Workload{}, nil) m.envCompatibilityChecker.EXPECT().Version().Return("v1.12.2", nil) }, mockRunTaskRequester: mockRunTaskRequester{ mockRunTaskRequestFromJob: func(client ecs.JobDescriber, app, env, svc string) (*ecs.RunTaskRequest, error) { return nil, errors.New("some error") }, }, wantedError: fmt.Errorf("generate task run command from job good-job of application good-app deployed in environment good-env: some error"), }, "error out if fail to get env version when target is job": { inGenerateCommandTarget: "good-app/good-env/good-job", setUpMocks: func(m *taskRunMocks) { m.store.EXPECT().GetEnvironment("good-app", "good-env").Return(&config.Environment{ ManagerRoleARN: "mock-role", Region: "mock-region", }, nil) m.provider.EXPECT().FromRole("mock-role", "mock-region") m.store.EXPECT().GetJob("good-app", "good-job").Return(&config.Workload{}, nil) m.envCompatibilityChecker.EXPECT().Version().Return("", errors.New("some error")) }, wantedError: fmt.Errorf(`retrieve version of environment stack "good-env" in application "good-app": some error`), }, "error out if env version doesn't support `--generate-cmd` for jobs": { inGenerateCommandTarget: "good-app/good-env/good-job", setUpMocks: func(m *taskRunMocks) { m.store.EXPECT().GetEnvironment("good-app", "good-env").Return(&config.Environment{ ManagerRoleARN: "mock-role", Region: "mock-region", }, nil) m.provider.EXPECT().FromRole("mock-role", "mock-region") m.store.EXPECT().GetJob("good-app", "good-job").Return(&config.Workload{}, nil) m.envCompatibilityChecker.EXPECT().Version().Return("v1.9.0", nil) }, wantedError: fmt.Errorf(`environment "good-env" is on version "v1.9.0" which does not support the "task run --generate-cmd" feature`), }, "fail to determine if the workload is a job given an app/env/workload target": { inGenerateCommandTarget: "good-app/good-env/bad-workload", setUpMocks: func(m *taskRunMocks) { m.store.EXPECT().GetEnvironment("good-app", "good-env").Return(&config.Environment{ ManagerRoleARN: "mock-role", Region: "mock-region", }, nil) m.provider.EXPECT().FromRole("mock-role", "mock-region") m.store.EXPECT().GetJob("good-app", "bad-workload").Return(nil, errors.New("some error")) }, wantedError: fmt.Errorf("determine whether workload bad-workload is a job: some error"), }, "fail to determine if the workload is a service given an app/env/workload target": { inGenerateCommandTarget: "good-app/good-env/bad-workload", setUpMocks: func(m *taskRunMocks) { m.store.EXPECT().GetEnvironment("good-app", "good-env").Return(&config.Environment{ ManagerRoleARN: "mock-role", Region: "mock-region", }, nil) m.provider.EXPECT().FromRole("mock-role", "mock-region") m.store.EXPECT().GetJob("good-app", "bad-workload").Return(nil, &config.ErrNoSuchJob{}) m.store.EXPECT().GetService("good-app", "bad-workload").Return(nil, errors.New("some error")) }, wantedError: fmt.Errorf("determine whether workload bad-workload is a service: some error"), }, "workload is neither a job nor a service": { inGenerateCommandTarget: "good-app/good-env/bad-workload", setUpMocks: func(m *taskRunMocks) { m.store.EXPECT().GetEnvironment("good-app", "good-env").Return(&config.Environment{ ManagerRoleARN: "mock-role", Region: "mock-region", }, nil) m.provider.EXPECT().FromRole("mock-role", "mock-region") m.store.EXPECT().GetJob("good-app", "bad-workload").Return(nil, &config.ErrNoSuchJob{}) m.store.EXPECT().GetService("good-app", "bad-workload").Return(nil, &config.ErrNoSuchService{}) }, wantedError: fmt.Errorf("workload bad-workload is neither a service nor a job"), }, "invalid input": { inGenerateCommandTarget: "invalid/illegal/not-good/input/is/bad", setUpMocks: func(m *taskRunMocks) {}, wantedError: errors.New("invalid input to --generate-cmd: must be of format <cluster>/<service> or <app>/<env>/<workload>"), }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { ctrl := gomock.NewController(t) defer ctrl.Finish() m := &taskRunMocks{ store: mocks.NewMockstore(ctrl), provider: mocks.NewMocksessionProvider(ctrl), envCompatibilityChecker: mocks.NewMockversionCompatibilityChecker(ctrl), } if tc.setUpMocks != nil { tc.setUpMocks(m) } opts := &runTaskOpts{ runTaskVars: runTaskVars{ generateCommandTarget: tc.inGenerateCommandTarget, }, store: m.store, provider: m.provider, configureECSServiceDescriber: func(session *session.Session) ecs.ECSServiceDescriber { return ecsMocks.NewMockECSServiceDescriber(ctrl) }, configureJobDescriber: func(session *session.Session) ecs.JobDescriber { return ecsMocks.NewMockJobDescriber(ctrl) }, configureServiceDescriber: func(session *session.Session) ecs.ServiceDescriber { return ecsMocks.NewMockServiceDescriber(ctrl) }, runTaskRequestFromECSService: tc.mockRunTaskRequester.mockRunTaskRequestFromECSService, runTaskRequestFromService: tc.mockRunTaskRequester.mockRunTaskRequestFromService, runTaskRequestFromJob: tc.mockRunTaskRequester.mockRunTaskRequestFromJob, envCompatibilityChecker: func(app, env string) (versionCompatibilityChecker, error) { return m.envCompatibilityChecker, nil }, } got, err := opts.runTaskCommand() if tc.wantedError != nil { require.EqualError(t, err, tc.wantedError.Error()) } else { require.NoError(t, err) require.Equal(t, tc.wantedCommand, got) } }) } }
1,483
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package cli import ( "errors" "fmt" "net" "regexp" "strconv" "strings" "time" "gopkg.in/yaml.v3" "github.com/robfig/cron/v3" "github.com/spf13/afero" "github.com/aws/aws-sdk-go/aws" "github.com/aws/copilot-cli/internal/pkg/addon" "github.com/aws/copilot-cli/internal/pkg/aws/apprunner" "github.com/aws/copilot-cli/internal/pkg/manifest" "github.com/aws/copilot-cli/internal/pkg/manifest/manifestinfo" ) const basicNameRegex = `^[a-z][a-z0-9\-]+$` var errBasicNameRegexNotMatched = errors.New("value must have a length of at least 2, start with a letter, contain only lower-case letters, numbers, and hyphens, and have no consecutive or trailing hyphen") var ( errValueEmpty = errors.New("value must not be empty") errValueTooLong = errors.New("value must not exceed 255 characters") errValueNotAString = errors.New("value must be a string") errValueReserved = errors.New("value is reserved") errValueNotAStringSlice = errors.New("value must be a string slice") errValueNotAValidPath = errors.New("value must be a valid path") errValueNotAnIPNet = errors.New("value must be a valid IP address range (example: 10.0.0.0/16)") errValueNotIPNetSlice = errors.New("value must be a valid slice of IP address range (example: 10.0.0.0/16,10.0.1.0/16)") errPortInvalid = errors.New("value must be in range 1-65535") errDomainInvalid = errors.New("value must contain at least one '.' character") errDurationInvalid = errors.New("value must be a valid Go duration string (example: 1h30m)") errDurationBadUnits = errors.New("duration cannot be in units smaller than a second") errScheduleInvalid = errors.New("value must be a valid cron expression (examples: @weekly; @every 30m; 0 0 * * 0)") ) // Addons validation errors. var ( fmtErrInvalidStorageType = "invalid storage type %s: must be one of %s" // S3 errors. errS3ValueBadSize = errors.New("value must be between 3 and 63 characters in length") errS3ValueBadFormat = errors.New("value must not contain consecutive periods or dashes, or be formatted as IP address") errS3ValueTrailingDash = errors.New("value must not have trailing -") // DDB errors. errValueBadFormatWithPeriod = errors.New("value must contain only lowercase alphanumeric characters and .-") errDDBValueBadSize = errors.New("value must be between 3 and 255 characters in length") errDDBAttributeBadSize = errors.New("value must be between 1 and 255 characters in length") errValueBadFormatWithPeriodUnderscore = errors.New("value must contain only alphanumeric characters and ._-") errDDBAttributeBadFormat = errors.New("value must be of the form <name>:<T> where T is one of S, N, or B") errTooManyLSIKeys = errors.New("number of specified LSI sort keys must be 5 or less") // Aurora-Serverless-specific errors. errInvalidRDSNameCharacters = errors.New("value must start with a letter and followed by alphanumeric letters only") errRDWSNotConnectedToVPC = fmt.Errorf("%s requires a VPC connection", manifestinfo.RequestDrivenWebServiceType) fmtErrInvalidEngineType = "invalid engine type %s: must be one of %s" fmtErrInvalidDBNameCharacters = "invalid database name %s: must contain only alphanumeric characters and underscore; should start with a letter" errInvalidSecretNameCharacters = errors.New("value must contain only letters, numbers, periods, hyphens and underscores") // Topic subscription errors. errMissingPublishTopicField = errors.New("field `publish.topics[].name` cannot be empty") errInvalidPubSubTopicName = errors.New("topic names can only contain letters, numbers, underscores, and hyphens") errSubscribeBadFormat = errors.New("value must be of the form <serviceName>:<topicName>") ) const fmtErrValueBadSize = "value must be between %d and %d characters in length" // App Runner validation errors. var ( errAppRunnerSvcNameTooLong = errors.New("value must not exceed 40 characters") errAppRunnerImageNotSupported = errors.New("value must be an ECR or ECR Public image URI") ) // Pipelines const ( maxPipelineStackNameLen = 128 fmtErrPipelineNameTooLong = "value must not exceed %d characters" ) var ( emptyIPNet = net.IPNet{} emptyIP = net.IP{} ) // matches alphanumeric, ._-, from 3 to 255 characters long // https://docs.aws.amazon.com/amazondynamodb/latest/developerguide/HowItWorks.NamingRulesDataTypes.html var ddbRegExp = regexp.MustCompile(`^[a-zA-Z0-9\-\.\_]+$`) // s3 validation expressions. // s3RegExp matches alphanumeric, .- from 3 to 63 characters long. // punctuationRegExp matches consecutive dashes or periods. // trailingPunctRegExp matches a trailing dash. // ipAddressRegExp checks for a bucket in the format of an IP address. // https://docs.aws.amazon.com/awscloudtrail/latest/userguide/cloudtrail-s3-bucket-naming-requirements.html // The punctuation and trailing punctuation guidelines also apply to ECR repositories, though // the requirements are not documented. var ( s3RegExp = regexp.MustCompile("" + `^` + // start of line. `[a-z0-9\.\-]{3,63}` + // Main match: lowercase alphanumerics, ., - from 3-63 characters. `$`, // end of line. ) punctuationRegExp = regexp.MustCompile( `[\.\-]{2,}`, // Check for consecutive periods or dashes. ) trailingPunctRegExp = regexp.MustCompile( `[\-\.]$`, // Check for trailing dash or dot. ) ipAddressRegexp = regexp.MustCompile( `^(?:\d{1,3}\.){3}\d{1,3}$`, // Match any 1-3 digits in xxx.xxx.xxx.xxx format. ) domainNameRegexp = regexp.MustCompile(`\.`) // Check for at least one dot in domain name. awsScheduleRegexp = regexp.MustCompile(`(?:rate|cron)\(.*\)`) // Check for strings of the form rate(*) or cron(*). ) // RDS Aurora Serverless validation expressions. var ( // Referred to name constraints here: https://docs.aws.amazon.com/AmazonRDS/latest/AuroraUserGuide/Aurora.CreateInstance.html#Aurora.CreateInstance.Settings // However, the doc on name constraints is somewhat misleading. // PostgreSQL db name cannot start with an underscore (doc says it must begin with a letter or an underscore). // MySQL db name can contain underscores (not limited to alphanumeric as described in the doc). dbNameCharacterRegExp = regexp.MustCompile("" + "^" + // Start of string. "[A-Za-z]" + // Starts with a letter. "[0-9A-Za-z_]*" + // Subsequent characters can be letters, underscores or digits "$", // End of string. ) // The storage name for RDS storage type is used as the logical ID of the Aurora Serverless DB cluster in the CFN template. // When creating the DB cluster, CFN will use the logical ID to generate a DB cluster identifier. // Since the logical ID has stricter character restrictions than cluster identifier, we only need to check if the // starting character is a letter. // https://docs.aws.amazon.com/AmazonRDS/latest/AuroraUserGuide/Aurora.CreateInstance.html#Aurora.CreateInstance.Settings // https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/resources-section-structure.html rdsStorageNameRegExp = regexp.MustCompile("" + "^" + // Start of string. "[A-Za-z]" + // Starts with a letter. The DB cluster identifier must start with a letter. `[a-zA-Z0-9\-\.\_]*` + // Followed by alphanumeric, ._-. Refers to POSIX portable file name character set. "$", // End of string. ) ) // SSM secret parameter name validation expression. // https://docs.aws.amazon.com/systems-manager/latest/APIReference/API_PutParameter.html#systemsmanager-PutParameter-request-Name var secretParameterNameRegExp = regexp.MustCompile("^[a-zA-Z0-9_.-]+$") var ( awsSNSTopicRegexp = regexp.MustCompile(`^[a-zA-Z0-9_-]*$`) // Validates that an expression contains only letters, numbers, underscores, and hyphens. regexpMatchSubscription = regexp.MustCompile(`^(\S+):(\S+)`) // Validates that an expression contains the format serviceName:topicName ) const regexpFindAllMatches = -1 // reservedWorkloadNames is a constant map of reserved workload names that users are not allowed to name their workloads func reservedWorkloadNames() map[string]bool { return map[string]bool{ "pipelines": true, // reserved to avoid directory conflict with copilot pipelines "environments": true, // reserved to avoid directory conflict with copilot environments } } func validateAppNameString(val interface{}) error { if err := basicNameValidation(val); err != nil { return fmt.Errorf("application name %v is invalid: %w", val, err) } return nil } func validateSvcName(val interface{}, svcType string) error { var err error switch svcType { case manifestinfo.RequestDrivenWebServiceType: err = validateAppRunnerSvcName(val) default: err = basicNameValidation(val) } if err != nil { return fmt.Errorf("service name %v is invalid: %w", val, err) } if err := validateNotReservedWorkloadName(val); err != nil { return fmt.Errorf("service name %v is invalid: %w", val, err) } return nil } func validateNotReservedWorkloadName(val interface{}) error { name, ok := val.(string) switch { case !ok: return errValueNotAString case reservedWorkloadNames()[name]: return errValueReserved } return nil } func validateSvcPort(val interface{}) error { if err := basicPortValidation(val); err != nil { return fmt.Errorf("port %v is invalid: %w", val, err) } return nil } func validateSvcType(val interface{}) error { svcType, ok := val.(string) if !ok { return errValueNotAString } return validateWorkloadType(svcType, manifestinfo.ServiceTypes(), service) } func validateWorkloadType(wkldType string, validTypes []string, errFlavor string) error { for _, validType := range validTypes { if wkldType == validType { return nil } } return fmt.Errorf("invalid %s type %s: must be one of %s", errFlavor, wkldType, prettify(validTypes)) } func validateJobType(val interface{}) error { jobType, ok := val.(string) if !ok { return errValueNotAString } return validateWorkloadType(jobType, manifestinfo.JobTypes(), job) } func validateJobName(val interface{}) error { if err := basicNameValidation(val); err != nil { return fmt.Errorf("job name %v is invalid: %w", val, err) } if err := validateNotReservedWorkloadName(val); err != nil { return fmt.Errorf("service name %v is invalid: %w", val, err) } return nil } func validatePipelineName(val interface{}, appName string) error { // compute the longest name a user can name their pipeline for this app // since we prefix their name with 'pipeline-[app]-'. the limit is required // because it's the name we give the cfn stack for the pipeline. maxNameLen := maxPipelineStackNameLen - len(fmt.Sprintf(fmtPipelineStackName, appName, "")) errFmt := "pipeline name %v is invalid: %w" if err := basicNameValidation(val); err != nil { return fmt.Errorf(errFmt, val, err) } name, ok := val.(string) switch { case !ok: return fmt.Errorf(errFmt, val, errValueNotAString) case len(name) > maxNameLen: err := fmt.Errorf(fmtErrPipelineNameTooLong, maxNameLen) return fmt.Errorf(errFmt, val, err) } return nil } func validateSchedule(sched interface{}) error { s, ok := sched.(string) if !ok { return errValueNotAString } return validateCron(s) } func validateAppRunnerImage(img interface{}) error { if err := apprunnerImageValidation(img); err != nil { return fmt.Errorf("image %s is not supported by App Runner: %w", img, err) } return nil } func validateTimeout(timeout interface{}) error { t, ok := timeout.(string) if !ok { return errValueNotAString } if err := validateDuration(t, 1*time.Second); err != nil { return fmt.Errorf("timeout value %s is invalid: %w", t, err) } return nil } func validateRate(rate interface{}) error { r, ok := rate.(string) if !ok { return errValueNotAString } return validateDuration(r, 60*time.Second) } func validateDomainName(val interface{}) error { domainName, ok := val.(string) if !ok { return errValueNotAString } dots := domainNameRegexp.FindAllString(domainName, regexpFindAllMatches) if dots == nil { return errDomainInvalid } return nil } func validatePath(fs afero.Fs, val interface{}) error { path, ok := val.(string) if !ok { return errValueNotAString } if path == "" { return errValueEmpty } _, err := fs.Stat(path) if err != nil { return errValueNotAValidPath } return nil } func validateNonEmptyString(val interface{}) error { path, ok := val.(string) if !ok { return errValueNotAString } if path == "" { return errValueEmpty } return nil } type validateStorageTypeOpts struct { ws manifestReader workloadName string } func validateStorageType(val interface{}, opts validateStorageTypeOpts) error { storageType, ok := val.(string) if !ok { return errValueNotAString } if !contains(storageType, storageTypes) { return fmt.Errorf(fmtErrInvalidStorageType, storageType, prettify(storageTypes)) } if storageType == rdsStorageType { return validateAuroraStorageType(opts.ws, opts.workloadName) } return nil } func validateAuroraStorageType(ws manifestReader, workloadName string) error { if workloadName == "" { return nil // Workload not yet selected while validating storage type flag. } mft, err := ws.ReadWorkloadManifest(workloadName) if err != nil { return fmt.Errorf("invalid storage type %s: read manifest file for %s: %w", rdsStorageType, workloadName, err) } mftType, err := mft.WorkloadType() if err != nil { return fmt.Errorf("invalid storage type %s: read type of workload from manifest file for %s: %w", rdsStorageType, workloadName, err) } if mftType != manifestinfo.RequestDrivenWebServiceType { return nil } data := struct { Network manifest.RequestDrivenWebServiceNetworkConfig `yaml:"network"` }{} if err := yaml.Unmarshal(mft, &data); err != nil { return fmt.Errorf("invalid storage type %s: unmarshal manifest for %s to read network config: %w", rdsStorageType, workloadName, err) } if data.Network.IsEmpty() { return fmt.Errorf("invalid storage type %s: %w", rdsStorageType, errRDWSNotConnectedToVPC) } return nil } func validateMySQLDBName(val interface{}) error { const ( minMySQLDBNameLength = 1 maxMySQLDBNameLength = 64 ) dbName, ok := val.(string) if !ok { return errValueNotAString } // Check for db name length. if len(dbName) < minMySQLDBNameLength || len(dbName) > maxMySQLDBNameLength { return fmt.Errorf(fmtErrValueBadSize, minMySQLDBNameLength, maxMySQLDBNameLength) } return validateDBNameCharacters(dbName) } func validateAppRunnerSvcName(val interface{}) error { const maxNameLen = 40 name, ok := val.(string) if !ok { return errValueNotAString } if len(name) > maxNameLen { return errAppRunnerSvcNameTooLong } return basicNameValidation(val) } func validatePostgreSQLDBName(val interface{}) error { const ( minPostgreSQLDBNameLength = 1 maxPostgreSQLDBNameLength = 63 ) dbName, ok := val.(string) if !ok { return errValueNotAString } // Check for db name length. if len(dbName) < minPostgreSQLDBNameLength || len(dbName) > maxPostgreSQLDBNameLength { return fmt.Errorf(fmtErrValueBadSize, minPostgreSQLDBNameLength, maxPostgreSQLDBNameLength) } return validateDBNameCharacters(dbName) } func validateDBNameCharacters(name string) error { // Check for character constraints. match := dbNameCharacterRegExp.FindStringSubmatch(name) if match != nil { return nil } return fmt.Errorf(fmtErrInvalidDBNameCharacters, name) } func validateEngine(val interface{}) error { engine, ok := val.(string) if !ok { return errValueNotAString } for _, valid := range engineTypes { if engine == valid { return nil } } return fmt.Errorf(fmtErrInvalidEngineType, engine, prettify(engineTypes)) } func validateEnvironmentName(val interface{}) error { if err := basicNameValidation(val); err != nil { return fmt.Errorf("environment name %v is invalid: %w", val, err) } return nil } func basicNameValidation(val interface{}) error { s, ok := val.(string) if !ok { return errValueNotAString } if s == "" { return errValueEmpty } if len(s) > 255 { return errValueTooLong } if !isCorrectFormat(s) { return errBasicNameRegexNotMatched } return nil } func validateCron(sched string) error { // If the schedule is wrapped in aws terms `rate()` or `cron()`, don't validate it-- // instead, pass it in as-is for serverside validation. AWS cron is weird (year field, nonstandard wildcards) // so for edge cases we need to support it awsSchedMatch := awsScheduleRegexp.FindStringSubmatch(sched) if awsSchedMatch != nil { return nil } every := "@every " if strings.HasPrefix(sched, every) { if err := validateDuration(sched[len(every):], 60*time.Second); err != nil { if err == errDurationInvalid { return fmt.Errorf("interval %s must include a valid Go duration string (example: @every 1h30m)", sched) } return fmt.Errorf("interval %s is invalid: %s", sched, err) } } _, err := cron.ParseStandard(sched) if err != nil { return fmt.Errorf("schedule %s is invalid: %s", sched, errScheduleInvalid) } return nil } func validateDuration(duration string, min time.Duration) error { parsedDuration, err := time.ParseDuration(duration) if err != nil { return errDurationInvalid } // This checks if the duration has parts smaller than a whole second. if parsedDuration > parsedDuration.Truncate(time.Second) { return errDurationBadUnits } if parsedDuration < min { return fmt.Errorf("duration must be %v or greater", min) } return nil } func isCorrectFormat(s string) bool { valid, err := regexp.MatchString(basicNameRegex, s) if err != nil { return false // bubble up error? } // Check for bad punctuation (no consecutive dashes or dots) formatMatch := punctuationRegExp.FindStringSubmatch(s) if len(formatMatch) != 0 { return false } trailingMatch := trailingPunctRegExp.FindStringSubmatch(s) if len(trailingMatch) != 0 { return false } return valid } func apprunnerImageValidation(val interface{}) error { strVal, ok := val.(string) if ok && apprunner.ImageIsSupported(strVal) { return nil } return errAppRunnerImageNotSupported } func basicPortValidation(val interface{}) error { var err error switch val := val.(type) { case []byte: err = bytePortValidation(val) case string: err = stringPortValidation(val) case uint16: if val == 0 { err = errPortInvalid } default: err = errPortInvalid } return err } func bytePortValidation(val []byte) error { s := string(val) err := stringPortValidation(s) if err != nil { return err } return nil } func stringPortValidation(val string) error { portList := strings.Split(val, ",") for _, port := range portList { port64, err := strconv.ParseUint(port, 10, 64) if err != nil { return errPortInvalid } if port64 < 1 || port64 > 65535 { return errPortInvalid } } return nil } // s3 bucket names: 'a-z0-9.-' func s3BucketNameValidation(val interface{}) error { const minS3Length = 3 const maxS3Length = 63 s, ok := val.(string) if !ok { return errValueNotAString } if len(s) < minS3Length || len(s) > maxS3Length { return errS3ValueBadSize } // check for correct character set nameMatch := s3RegExp.FindStringSubmatch(s) if len(nameMatch) == 0 { return errValueBadFormatWithPeriod } // Check for bad punctuation (no consecutive dashes or dots) formatMatch := punctuationRegExp.FindStringSubmatch(s) if len(formatMatch) != 0 { return errS3ValueBadFormat } dashMatch := trailingPunctRegExp.FindStringSubmatch(s) if len(dashMatch) != 0 { return errS3ValueTrailingDash } ipMatch := ipAddressRegexp.FindStringSubmatch(s) if len(ipMatch) != 0 { return errS3ValueBadFormat } return nil } // Dynamo table names: 'a-zA-Z0-9.-_' func dynamoTableNameValidation(val interface{}) error { // https://docs.aws.amazon.com/amazondynamodb/latest/developerguide/HowItWorks.NamingRulesDataTypes.html const minDDBTableNameLength = 3 const maxDDBTableNameLength = 255 s, ok := val.(string) if !ok { return errValueNotAString } if len(s) < minDDBTableNameLength || len(s) > maxDDBTableNameLength { return errDDBValueBadSize } m := ddbRegExp.FindStringSubmatch(s) if len(m) == 0 { return errValueBadFormatWithPeriodUnderscore } return nil } // Dynamo attribute names: 1 to 255 characters func dynamoAttributeNameValidation(val interface{}) error { // https://docs.aws.amazon.com/amazondynamodb/latest/developerguide/HowItWorks.NamingRulesDataTypes.html const minDDBAttributeNameLength = 1 const maxDDBAttributeNameLength = 255 s, ok := val.(string) if !ok { return errValueNotAString } if len(s) < minDDBAttributeNameLength || len(s) > maxDDBAttributeNameLength { return errDDBAttributeBadSize } return nil } // RDS storage name: '[a-zA-Z][a-zA-Z0-9]*' func rdsNameValidation(val interface{}) error { // This length constrains needs to satisfy: 1. logical ID length; 2. DB Cluster identifier length. // For 1. logical ID, there is no documented length limit. // For 2. DB Cluster identifier, the maximal length is 63. // DB Cluster identifier is auto-generated by CFN using the cluster's logical ID, which is the storage name appended // by "DBCluster". Hence the maximal length of the storage name is 63 - len("DBCluster") const minRDSNameLength = 1 const maxRDSNameLength = 63 - len("DBCluster") s, ok := val.(string) if !ok { return errValueNotAString } if len(s) < minRDSNameLength || len(s) > maxRDSNameLength { return fmt.Errorf(fmtErrValueBadSize, minRDSNameLength, maxRDSNameLength) } m := rdsStorageNameRegExp.FindStringSubmatch(s) if m == nil { return errInvalidRDSNameCharacters } return nil } func validateKey(val interface{}) error { s, ok := val.(string) if !ok { return errValueNotAString } attr, err := addon.DDBAttributeFromKey(s) if err != nil { return errDDBAttributeBadFormat } err = dynamoAttributeNameValidation(*attr.Name) if err != nil { return err } err = validateDynamoDataType(*attr.DataType) if err != nil { return err } return nil } func validateDynamoDataType(val interface{}) error { s, ok := val.(string) if !ok { return errValueNotAString } if !strings.Contains("SNB", strings.ToUpper(s)) { return errDDBAttributeBadFormat } return nil } func validateLSIs(val interface{}) error { s, ok := val.([]string) if !ok { return errValueNotAStringSlice } if len(s) > 5 { return errTooManyLSIKeys } for _, att := range s { err := validateKey(att) if err != nil { return err } } return nil } func validateSubscribe(noSubscription bool, subscribeTags []string) error { // --no-subscriptions and --subscribe are mutually exclusive. if noSubscription && len(subscribeTags) != 0 { return fmt.Errorf("validate subscribe configuration: cannot specify both --%s and --%s", noSubscriptionFlag, subscribeTopicsFlag) } if len(subscribeTags) != 0 { if err := validateSubscriptions(subscribeTags); err != nil { return err } } return nil } func validateSubscriptions(val interface{}) error { s, ok := val.([]string) if !ok { return errValueNotAStringSlice } for _, sub := range s { err := validateSubscriptionKey(sub) if err != nil { return err } } return nil } func validateSubscriptionKey(val interface{}) error { s, ok := val.(string) if !ok { return errValueNotAString } sub, err := parseSerializedSubscription(s) if err != nil { return errSubscribeBadFormat } if err := validatePubSubName(aws.StringValue(sub.Name)); err != nil { return fmt.Errorf("invalid topic subscription topic name `%s`: %w", aws.StringValue(sub.Name), err) } if err = basicNameValidation(aws.StringValue(sub.Service)); err != nil { return fmt.Errorf("invalid topic subscription service name `%s`: %w", aws.StringValue(sub.Service), err) } return nil } // ValidatePubSubName validates naming is correct for topics in publishing/subscribing cases, such as naming for a // SNS Topic intended for a publisher. func validatePubSubName(name string) error { if len(name) == 0 { return errMissingPublishTopicField } // Name must contain letters, numbers, and can't use special characters besides underscores and hyphens. if !awsSNSTopicRegexp.MatchString(name) { return errInvalidPubSubTopicName } return nil } func prettify(inputStrings []string) string { prettyTypes := applyAll(inputStrings, strconv.Quote) return strings.Join(prettyTypes, ", ") } func validateCIDR(val interface{}) error { s, ok := val.(string) if !ok { return errValueNotAString } ip, _, err := net.ParseCIDR(s) if err != nil || ip.String() == emptyIP.String() { return errValueNotAnIPNet } return nil } func validatePublicSubnetsCIDR(numAZs int) func(v interface{}) error { return func(v interface{}) error { s, ok := v.(string) if !ok { return errValueNotAString } if numCIDRs := len(strings.Split(s, ",")); numCIDRs != numAZs { return fmt.Errorf("number of public subnet CIDRs (%d) does not match number of AZs (%d)", numCIDRs, numAZs) } return validateCIDRSlice(v) } } func validatePrivateSubnetsCIDR(numAZs int) func(v interface{}) error { return func(v interface{}) error { s, ok := v.(string) if !ok { return errValueNotAString } if numCIDRs := len(strings.Split(s, ",")); numCIDRs != numAZs { return fmt.Errorf("number of private subnet CIDRs (%d) does not match number of AZs (%d)", numCIDRs, numAZs) } return validateCIDRSlice(v) } } func validateCIDRSlice(val interface{}) error { s, ok := val.(string) if !ok { return errValueNotAString } slice := strings.Split(s, ",") if len(slice) == 0 { return errValueNotIPNetSlice } for _, str := range slice { if err := validateCIDR(str); err != nil { return errValueNotIPNetSlice } } return nil } func validateSecretName(val interface{}) error { const minSecretNameLength = 1 const maxSecretNameLength = 2048 - (len("/copilot/") + len("/") + len("/secrets/")) s, ok := val.(string) if !ok { return errValueNotAString } if len(s) < minSecretNameLength || len(s) > maxSecretNameLength { return fmt.Errorf(fmtErrValueBadSize, minSecretNameLength, maxSecretNameLength) } m := secretParameterNameRegExp.FindStringSubmatch(s) if m == nil { return errInvalidSecretNameCharacters } return nil }
886
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package cli import ( "errors" "fmt" "strings" "testing" "github.com/aws/copilot-cli/internal/pkg/manifest/manifestinfo" "github.com/aws/copilot-cli/internal/pkg/workspace" "github.com/spf13/afero" "github.com/stretchr/testify/require" ) type testCase struct { input interface{} want error } var basicNameTestCases = map[string]testCase{ "string as input": { input: "chicken1234", want: nil, }, "number as input": { input: 1234, want: errValueNotAString, }, "bool as input": { input: false, want: errValueNotAString, }, "string with invalid characters": { input: "myProject!", want: errBasicNameRegexNotMatched, }, "empty string": { input: "", want: errValueEmpty, }, "invalid length string": { input: strings.Repeat("s", 256), want: errValueTooLong, }, "does not start with letter": { input: "123chicken", want: errBasicNameRegexNotMatched, }, "contains upper-case letters": { input: "badGoose", want: errBasicNameRegexNotMatched, }, } func TestValidateAppName(t *testing.T) { // Any project-specific name validations can be added here testCases := map[string]testCase{ "contains emoji": { input: "😀", want: errBasicNameRegexNotMatched, }, } for name, tc := range basicNameTestCases { t.Run(name, func(t *testing.T) { got := validateAppNameString(tc.input) require.True(t, errors.Is(got, tc.want)) }) } for name, tc := range testCases { t.Run(name, func(t *testing.T) { got := validateAppNameString(tc.input) require.True(t, errors.Is(got, tc.want)) }) } } func TestValidateSvcName(t *testing.T) { testCases := map[string]struct { val interface{} svcType string wanted error }{ "string as input": { val: "hello", svcType: manifestinfo.LoadBalancedWebServiceType, wanted: nil, }, "number as input": { val: 1234, wanted: errValueNotAString, }, "string with invalid characters": { val: "mySvc!", wanted: errBasicNameRegexNotMatched, }, "longer than 40 characters for app runner services": { val: strings.Repeat("x", 41), svcType: manifestinfo.RequestDrivenWebServiceType, wanted: errAppRunnerSvcNameTooLong, }, "invalid length string": { val: strings.Repeat("s", 256), svcType: manifestinfo.LoadBalancedWebServiceType, wanted: errValueTooLong, }, "does not start with letter": { val: "123chicken", svcType: manifestinfo.BackendServiceType, wanted: errBasicNameRegexNotMatched, }, "contains upper-case letters": { val: "badGoose", svcType: manifestinfo.LoadBalancedWebServiceType, wanted: errBasicNameRegexNotMatched, }, "is not a reserved name": { val: "pipelines", svcType: manifestinfo.LoadBalancedWebServiceType, wanted: errValueReserved, }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { got := validateSvcName(tc.val, tc.svcType) require.True(t, errors.Is(got, tc.wanted), "got %v instead of %v", got, tc.wanted) }) } } func TestValidateEnvironmentName(t *testing.T) { testCases := basicNameTestCases for name, tc := range testCases { t.Run(name, func(t *testing.T) { got := validateEnvironmentName(tc.input) require.True(t, errors.Is(got, tc.want)) }) } } func TestValidatePipelineName(t *testing.T) { testCases := map[string]struct { val interface{} appName string wanted error wantedErrorSuffix string }{ "string as input": { val: "hello", wanted: nil, }, "number as input": { val: 1234, wanted: errValueNotAString, }, "string with invalid characters": { val: "myPipe!", wanted: errBasicNameRegexNotMatched, }, "longer than 128 characters": { val: strings.Repeat("s", 129), wantedErrorSuffix: fmt.Sprintf(fmtErrPipelineNameTooLong, 118), }, "longer than 128 characters with pipeline-[app]": { val: strings.Repeat("x", 114), appName: "myApp", wantedErrorSuffix: fmt.Sprintf(fmtErrPipelineNameTooLong, 113), }, "does not start with letter": { val: "123chicken", wanted: errBasicNameRegexNotMatched, }, "starts with a dash": { val: "-beta", wanted: errBasicNameRegexNotMatched, }, "contains upper-case letters": { val: "badGoose", wanted: errBasicNameRegexNotMatched, }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { got := validatePipelineName(tc.val, tc.appName) if tc.wantedErrorSuffix != "" { require.True(t, strings.HasSuffix(got.Error(), tc.wantedErrorSuffix), "got %v instead of %v", got, tc.wantedErrorSuffix) return } require.True(t, errors.Is(got, tc.wanted), "got %v instead of %v", got, tc.wanted) }) } } func TestValidateS3Name(t *testing.T) { testCases := map[string]testCase{ "good case": { input: "happy-s3-bucket", want: nil, }, "contains punctuation": { input: "sadbucket!", want: errValueBadFormatWithPeriod, }, "contains spaces": { input: "bowie is a good dog", want: errValueBadFormatWithPeriod, }, "leading whitespace": { input: " a-Very-GOOD-dog-indeed", want: errValueBadFormatWithPeriod, }, "too long": { input: "sitting-in-the-morning-sun-ill-be-sitting-when-the-evening-comes-watching-the-ships-roll-in", want: errS3ValueBadSize, }, "too short": { input: "oh", want: errS3ValueBadSize, }, "consecutive dots": { input: "b.u..cket", want: errS3ValueBadFormat, }, "trailing dash": { input: "bucket-", want: errS3ValueTrailingDash, }, "consecutive -.": { input: "bu.-cket", want: errS3ValueBadFormat, }, "ip address format": { input: "123.455.999.000", want: errS3ValueBadFormat, }, "non-ip-address numbers and dots": { input: "124.333.333.333.333", want: nil, }, "capital letters in bucket name": { input: "BADbucketname", want: errValueBadFormatWithPeriod, }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { got := s3BucketNameValidation(tc.input) require.True(t, errors.Is(got, tc.want)) }) } } func TestValidateDDBName(t *testing.T) { testCases := map[string]testCase{ "good case": { input: "dynamo_table-1", want: nil, }, "too short": { input: "p", want: errDDBValueBadSize, }, "too long": { input: "i-met-a-traveller-from-an-antique-land-who-said_two-vast-and-trunkless-legs-of-stone_stand-in-the-desert-near-them-on-the-sand_half-sunk-a-shattered-visage-lies-whose-frown_and-wrinkled-lip-and-sneer-of-cold-command_tell-that-its-sculptor-well-those-passions-read_which-yet-survive-stamped-on-these-lifeless-things", want: errDDBValueBadSize, }, "bad character": { input: "badgoose!?", want: errValueBadFormatWithPeriodUnderscore, }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { got := dynamoTableNameValidation(tc.input) t.Logf("error: %v", got) require.True(t, errors.Is(got, tc.want)) }) } } func TestValidateRDSName(t *testing.T) { testCases := map[string]testCase{ "good case": { input: "goodname", want: nil, }, "too long": { input: "AprilisthecruellestmonthbreedingLilacsoutofthedeadlanda", want: fmt.Errorf("value must be between 1 and %d characters in length", 63-len("DBCluster")), }, "bad character": { input: "not-good!", want: errInvalidRDSNameCharacters, }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { got := rdsNameValidation(tc.input) if tc.want != nil { require.EqualError(t, got, tc.want.Error()) } }) } } func TestValidatePath(t *testing.T) { testCases := map[string]struct { input interface{} want error }{ "not a string": { input: 123, want: errValueNotAString, }, "empty string": { input: "", want: errValueEmpty, }, "invalid path": { input: "../Dockerfile", want: errValueNotAValidPath, }, "returns nil if valid absolute path": { input: "frontend/Dockerfile", want: nil, }, "returns nil if valid relative path": { input: "frontend/../backend/Dockerfile", want: nil, }, } for path, tc := range testCases { t.Run(path, func(t *testing.T) { // GIVEN fs := &afero.Afero{Fs: afero.NewMemMapFs()} fs.MkdirAll("frontend", 0755) fs.MkdirAll("backend", 0755) afero.WriteFile(fs, "frontend/Dockerfile", []byte("FROM nginx"), 0644) afero.WriteFile(fs, "backend/Dockerfile", []byte("FROM nginx"), 0644) // WHEN got := validatePath(fs, tc.input) // THEN if tc.want == nil { require.Nil(t, got) } else { require.EqualError(t, tc.want, got.Error()) } }) } } type mockManifestReader struct { out workspace.WorkloadManifest err error } func (m mockManifestReader) ReadWorkloadManifest(name string) (workspace.WorkloadManifest, error) { return m.out, m.err } func TestValidateStorageType(t *testing.T) { testCases := map[string]struct { input string optionals validateStorageTypeOpts want error }{ "should allow S3 addons": { input: "S3", want: nil, }, "should allow DynamoDB allows": { input: "DynamoDB", want: nil, }, "should return an error if a storage type does not exist": { input: "Dropbox", want: fmt.Errorf(fmtErrInvalidStorageType, "Dropbox", prettify(storageTypes)), }, "should allow Aurora if workload name is not yet specified": { input: "Aurora", want: nil, }, "should return an error if manifest file cannot be read while initializing an Aurora storage type": { input: "Aurora", optionals: validateStorageTypeOpts{ ws: mockManifestReader{ err: errors.New("some error"), }, workloadName: "api", }, want: errors.New("invalid storage type Aurora: read manifest file for api: some error"), }, "should allow Aurora if the workload type is not a RDWS": { input: "Aurora", optionals: validateStorageTypeOpts{ ws: mockManifestReader{ out: []byte(` name: api type: Load Balanced Web Service `), }, workloadName: "api", }, }, "should return an error if Aurora is selected for a RDWS while not connected to a VPC": { input: "Aurora", optionals: validateStorageTypeOpts{ ws: mockManifestReader{ out: []byte(` name: api type: Request-Driven Web Service `), }, workloadName: "api", }, want: errors.New("invalid storage type Aurora: Request-Driven Web Service requires a VPC connection"), }, "should succeed if Aurora is selected and RDWS is connected to a VPC": { input: "Aurora", optionals: validateStorageTypeOpts{ ws: mockManifestReader{ out: []byte(` name: api type: Request-Driven Web Service network: vpc: placement: private `), }, workloadName: "api", }, }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { got := validateStorageType(tc.input, tc.optionals) if tc.want == nil { require.NoError(t, got) } else { require.EqualError(t, got, tc.want.Error()) } }) } } func TestValidateKey(t *testing.T) { testCases := map[string]struct { input string want error }{ "good key": { input: "userID:S", want: nil, }, "bad key with space": { input: "user ID:S", want: errDDBAttributeBadFormat, }, "nonsense key": { input: "sfueir555'/", want: errDDBAttributeBadFormat, }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { got := validateKey(tc.input) require.Equal(t, tc.want, got) }) } } func TestValidateLSIs(t *testing.T) { testCases := map[string]struct { inputAttributes []string inputLSIs []string wantError error }{ "good case": { inputLSIs: []string{"userID:S"}, wantError: nil, }, "bad lsi structure": { inputLSIs: []string{"userID"}, wantError: errDDBAttributeBadFormat, }, "too many lsis": { inputLSIs: []string{"bowie:S", "clyde:S", "keno:S", "kava:S", "meow:S", "hana:S"}, wantError: errTooManyLSIKeys, }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { got := validateLSIs(tc.inputLSIs) if tc.wantError != nil { require.EqualError(t, got, tc.wantError.Error()) } else { require.Nil(t, got) } }) } } func TestValidateCIDR(t *testing.T) { testCases := map[string]struct { inputCIDR string wantError error }{ "good case": { inputCIDR: "10.10.10.10/24", wantError: nil, }, "bad case": { inputCIDR: "10.10.10.10", wantError: errValueNotAnIPNet, }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { got := validateCIDR(tc.inputCIDR) if tc.wantError != nil { require.EqualError(t, got, tc.wantError.Error()) } else { require.Nil(t, got) } }) } } func Test_validatePublicSubnetsCIDR(t *testing.T) { testCases := map[string]struct { in string numAZs int wantedErr string }{ "returns nil if CIDRs are valid and match number of available AZs": { in: "10.10.10.10/24,10.10.10.10/24", numAZs: 2, }, "returns err if number of CIDRs is not equal to number of available AZs": { in: "10.10.10.10/24,10.10.10.10/24", numAZs: 3, wantedErr: "number of public subnet CIDRs (2) does not match number of AZs (3)", }, "returns err if input is not valid CIDR fmt": { in: "10.10.10.10,10.10.10.10", numAZs: 2, wantedErr: errValueNotIPNetSlice.Error(), }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { actual := validatePublicSubnetsCIDR(tc.numAZs)(tc.in) if tc.wantedErr == "" { require.NoError(t, actual) } else { require.EqualError(t, actual, tc.wantedErr) } }) } } func Test_validatePrivateSubnetsCIDR(t *testing.T) { testCases := map[string]struct { in string numAZs int wantedErr string }{ "returns nil if CIDRs are valid and match number of available AZs": { in: "10.10.10.10/24,10.10.10.10/24", numAZs: 2, }, "returns err if number of CIDRs is not equal to number of available AZs": { in: "10.10.10.10/24,10.10.10.10/24", numAZs: 3, wantedErr: "number of private subnet CIDRs (2) does not match number of AZs (3)", }, "returns err if input is not valid CIDR fmt": { in: "10.10.10.10,10.10.10.10", numAZs: 2, wantedErr: errValueNotIPNetSlice.Error(), }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { actual := validatePrivateSubnetsCIDR(tc.numAZs)(tc.in) if tc.wantedErr == "" { require.NoError(t, actual) } else { require.EqualError(t, actual, tc.wantedErr) } }) } } func TestIsCorrectFormat(t *testing.T) { testCases := map[string]struct { input string isLegit bool }{ "numbers only input": { input: "1234", isLegit: false, }, "lower-case alphabetic input only": { input: "badgoose", isLegit: true, }, "alphanumeric string input": { input: "abc123", isLegit: true, }, "contains hyphen": { input: "bad-goose", isLegit: true, }, "non-alphanumeric string input": { input: "bad-goose!", isLegit: false, }, "starts with non-letter": { input: "1bad-goose", isLegit: false, }, "contains capital letter": { input: "badGoose", isLegit: false, }, "contains consecutive dashes": { input: "bad--goose", isLegit: false, }, "contains trailing dash": { input: "badgoose-", isLegit: false, }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { got := isCorrectFormat(tc.input) require.Equal(t, tc.isLegit, got) }) } } func TestValidateCron(t *testing.T) { testCases := map[string]struct { input string shouldPass bool }{ "valid cron expression": { input: "* * * * *", shouldPass: true, }, "invalid cron": { input: "* * * * ? *", shouldPass: false, }, "valid schedule descriptor": { input: "@every 5m", shouldPass: true, }, "invalid schedule": { input: "@every 5 minutes", shouldPass: false, }, "bypass with rate()": { input: "rate(la la la)", shouldPass: true, }, "bypass with cron()": { input: "cron(0 9 3W * ? *)", shouldPass: true, }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { got := validateCron(tc.input) if tc.shouldPass { require.NoError(t, got) } else { require.NotNil(t, got) } }) } } func TestValidateEngine(t *testing.T) { testCases := map[string]testCase{ "mysql": { input: "MySQL", want: nil, }, "postgresql": { input: "PostgreSQL", want: nil, }, "invalid engine type": { input: "weird-engine", want: errors.New("invalid engine type weird-engine: must be one of \"MySQL\", \"PostgreSQL\""), }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { got := validateEngine(tc.input) if tc.want != nil { require.EqualError(t, got, tc.want.Error()) } else { require.NoError(t, got) } }) } } func TestValidateMySQLDBName(t *testing.T) { testCases := map[string]testCase{ "good case": { input: "my_db_123_", want: nil, }, "too long": { input: "April-is-the-cruellest-month-breeding-Lilacs-out-of-the-dead-land-m", want: errors.New("value must be between 1 and 64 characters in length"), }, "bad character": { input: "bad_db_name:(", want: fmt.Errorf(fmtErrInvalidDBNameCharacters, "bad_db_name:("), }, "bad starting character": { input: "_not_good", want: fmt.Errorf(fmtErrInvalidDBNameCharacters, "_not_good"), }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { got := validateMySQLDBName(tc.input) if tc.want != nil { require.EqualError(t, got, tc.want.Error()) } else { require.NoError(t, got) } }) } } func TestValidatePostgreSQLDBName(t *testing.T) { testCases := map[string]testCase{ "good case": { input: "my_db_123_", want: nil, }, "too long": { input: "April-is-the-cruellest-month-breeding-Lilacs-out-of-the-dead-land-m", want: errors.New("value must be between 1 and 63 characters in length"), }, "bad character": { input: "bad_db_name:(", want: fmt.Errorf(fmtErrInvalidDBNameCharacters, "bad_db_name:("), }, "bad starting character": { input: "_not_good", want: fmt.Errorf(fmtErrInvalidDBNameCharacters, "_not_good"), }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { got := validatePostgreSQLDBName(tc.input) if tc.want != nil { require.EqualError(t, got, tc.want.Error()) } else { require.NoError(t, got) } }) } } func TestValidateSecretName(t *testing.T) { testCases := map[string]testCase{ "bad character": { input: "bad!", want: errInvalidSecretNameCharacters, }, "bad character space": { input: "bad ", want: errInvalidSecretNameCharacters, }, "secret name too short": { input: "", want: fmt.Errorf(fmtErrValueBadSize, 1, 2048-(len("/copilot/")+len("/")+len("/secrets/"))), }, "secret name too long": { input: string(make([]rune, 2048)), want: fmt.Errorf(fmtErrValueBadSize, 1, 2048-(len("/copilot/")+len("/")+len("/secrets/"))), }, "valid secret name": { input: "secret.name", }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { got := validateSecretName(tc.input) if tc.want != nil { require.EqualError(t, got, tc.want.Error()) } else { require.NoError(t, got) } }) } } func Test_validatePubSubTopicName(t *testing.T) { testCases := map[string]struct { inName string wantErr error }{ "valid topic name": { inName: "a-Perfectly_V4l1dString", }, "error when no topic name": { inName: "", wantErr: errMissingPublishTopicField, }, "error when invalid topic name": { inName: "OHNO~/`...,", wantErr: errInvalidPubSubTopicName, }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { err := validatePubSubName(tc.inName) if tc.wantErr == nil { require.NoError(t, err) } else { require.EqualError(t, err, tc.wantErr.Error()) } }) } } func Test_validateSubscriptionKey(t *testing.T) { testCases := map[string]struct { inSub interface{} wantErr error }{ "valid subscription": { inSub: "svc:topic", wantErr: nil, }, "error when non string": { inSub: true, wantErr: errValueNotAString, }, "error when bad format": { inSub: "svctopic", wantErr: errSubscribeBadFormat, }, "error when bad publisher name": { inSub: "svc:@@@@@@@h", wantErr: fmt.Errorf("invalid topic subscription topic name `@@@@@@@h`: %w", errInvalidPubSubTopicName), }, "error when bad svc name": { inSub: "n#######:topic", wantErr: fmt.Errorf("invalid topic subscription service name `n#######`: %w", errBasicNameRegexNotMatched), }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { err := validateSubscriptionKey(tc.inSub) if tc.wantErr == nil { require.NoError(t, err) } else { require.EqualError(t, err, tc.wantErr.Error()) } }) } } func Test_validateSubscribe(t *testing.T) { testCases := map[string]struct { inNoSubscriptions bool inSubscribeTags []string wantErr error }{ "valid subscription": { inNoSubscriptions: false, inSubscribeTags: []string{"svc1:topic1", "svc2:topic2"}, wantErr: nil, }, "no error when no subscriptions": { inNoSubscriptions: true, inSubscribeTags: nil, wantErr: nil, }, "error when no-subscriptions and subscribe": { inNoSubscriptions: true, inSubscribeTags: []string{"svc1:topic1", "svc2:topic2"}, wantErr: errors.New("validate subscribe configuration: cannot specify both --no-subscribe and --subscribe-topics"), }, "error when bad subscription tag": { inNoSubscriptions: false, inSubscribeTags: []string{"svc:topic", "svc:@@@@@@@h"}, wantErr: fmt.Errorf("invalid topic subscription topic name `@@@@@@@h`: %w", errInvalidPubSubTopicName), }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { err := validateSubscribe(tc.inNoSubscriptions, tc.inSubscribeTags) if tc.wantErr == nil { require.NoError(t, err) } else { require.EqualError(t, err, tc.wantErr.Error()) } }) } } func TestValidateJobName(t *testing.T) { testCases := map[string]struct { val interface{} wanted error }{ "string as input": { val: "hello", wanted: nil, }, "number as input": { val: 1234, wanted: errValueNotAString, }, "is not a reserved name": { val: "pipelines", wanted: errValueReserved, }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { got := validateJobName(tc.val) require.True(t, errors.Is(got, tc.wanted), "got %v instead of %v", got, tc.wanted) }) } }
976
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 // Package cli contains the copilot subcommands. package cli import ( "fmt" "runtime" "github.com/aws/copilot-cli/cmd/copilot/template" "github.com/aws/copilot-cli/internal/pkg/cli/group" "github.com/aws/copilot-cli/internal/pkg/version" "github.com/spf13/cobra" ) // BuildVersionCmd builds the command for displaying the version func BuildVersionCmd() *cobra.Command { cmd := &cobra.Command{ Use: "version", Short: "Print the version number.", RunE: runCmdE(func(cmd *cobra.Command, args []string) error { fmt.Printf("version: %s, built for %s\n", version.Version, runtime.GOOS) return nil }), Annotations: map[string]string{ "group": group.Settings, }, } cmd.SetUsageTemplate(template.Usage) return cmd }
34
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 // package clean provides structs that clean resources deployed // by Copilot. It is used prior to deleting a workload or environment // so that the corresponding CloudFormation stack delete runs successfully. package clean // NoOp does nothing. type NoOp struct{} // Clean returns nil. func (*NoOp) Clean() error { return nil }
16
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package clean import ( "errors" "fmt" "github.com/aws/copilot-cli/internal/pkg/s3" ) type bucketResourceGetter interface { BucketName(app, env, wkld string) (string, error) } type bucketEmptier interface { EmptyBucket(string) error } // StaticSiteCleaner is used to clean up resources created for a static site. type StaticSiteCleaner struct { app, env, svc string bucketResourceGetter bucketResourceGetter bucketEmptier bucketEmptier } // StaticSite returns an initialized static site cleaner. func StaticSite(app, env, svc string, rg bucketResourceGetter, emptier bucketEmptier) *StaticSiteCleaner { return &StaticSiteCleaner{ app: app, env: env, svc: svc, bucketResourceGetter: rg, bucketEmptier: emptier, } } // Clean looks for the S3 bucket for the service. If no bucket is found, // it returns no error. If a bucket is found, it is emptied. func (s *StaticSiteCleaner) Clean() error { bucket, err := s.bucketResourceGetter.BucketName(s.app, s.env, s.svc) if err != nil { var notFound *s3.ErrNotFound if errors.As(err, &notFound) { // bucket doesn't exist, no need to clean up return nil } return fmt.Errorf("get bucket name: %w", err) } if err := s.bucketEmptier.EmptyBucket(bucket); err != nil { return fmt.Errorf("empty bucket: %w", err) } return nil }
57
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package clean import ( "errors" "testing" "github.com/stretchr/testify/require" ) type bucketResourceGetterDouble struct { BucketNameFn func(app, env, wkld string) (string, error) } func (b *bucketResourceGetterDouble) BucketName(app, env, wkld string) (string, error) { return b.BucketNameFn(app, env, wkld) } type bucketEmptierDouble struct { EmptyBucketFn func(bucket string) error } func (b *bucketEmptierDouble) EmptyBucket(bucket string) error { return b.EmptyBucketFn(bucket) } func TestStaticSite_CleanResources(t *testing.T) { tests := map[string]struct { cleaner *StaticSiteCleaner expected string }{ "error getting bucket": { cleaner: &StaticSiteCleaner{ bucketResourceGetter: &bucketResourceGetterDouble{ BucketNameFn: func(app, env, wkld string) (string, error) { return "", errors.New("some error") }, }, }, expected: "get bucket name: some error", }, "error emptying bucket": { cleaner: &StaticSiteCleaner{ bucketResourceGetter: &bucketResourceGetterDouble{ BucketNameFn: func(_, _, _ string) (string, error) { return "bucket", nil }, }, bucketEmptier: &bucketEmptierDouble{ EmptyBucketFn: func(_ string) error { return errors.New("some error") }, }, }, expected: "empty bucket: some error", }, "happy path": { cleaner: &StaticSiteCleaner{ bucketResourceGetter: &bucketResourceGetterDouble{ BucketNameFn: func(_, _, _ string) (string, error) { return "bucket", nil }, }, bucketEmptier: &bucketEmptierDouble{ EmptyBucketFn: func(_ string) error { return nil }, }, }, }, } for name, tc := range tests { t.Run(name, func(t *testing.T) { err := tc.cleaner.Clean() if tc.expected != "" { require.EqualError(t, err, tc.expected) return } require.NoError(t, err) }) } }
86
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 // cleantest provides stubs for cli.wkldCleaner. package cleantest import "errors" // Succeeds stubs cli.wkldCleaner and simulates success. type Succeeds struct{} // Clean succeeds. func (*Succeeds) Clean() error { return nil } // Fails stubs cli.wkldCleaner and simulates failure. type Fails struct{} // Clean fails. func (*Fails) Clean() error { return errors.New("an error") }
24
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package deploy import ( "fmt" "github.com/aws/aws-sdk-go/aws/session" "github.com/aws/copilot-cli/internal/pkg/aws/acm" awsecs "github.com/aws/copilot-cli/internal/pkg/aws/ecs" "github.com/aws/copilot-cli/internal/pkg/aws/partitions" "github.com/aws/copilot-cli/internal/pkg/deploy/cloudformation" "github.com/aws/copilot-cli/internal/pkg/deploy/cloudformation/stack" "github.com/aws/copilot-cli/internal/pkg/deploy/upload/customresource" "github.com/aws/copilot-cli/internal/pkg/ecs" "github.com/aws/copilot-cli/internal/pkg/manifest" "github.com/aws/copilot-cli/internal/pkg/manifest/manifestinfo" "github.com/aws/copilot-cli/internal/pkg/template" ) type backendSvcDeployer struct { *svcDeployer backendMft *manifest.BackendService // Overriden in tests. aliasCertValidator aliasCertValidator newStack func() cloudformation.StackConfiguration } // NewBackendDeployer is the constructor for backendSvcDeployer. func NewBackendDeployer(in *WorkloadDeployerInput) (*backendSvcDeployer, error) { in.customResources = backendCustomResources svcDeployer, err := newSvcDeployer(in) if err != nil { return nil, err } bsMft, ok := in.Mft.(*manifest.BackendService) if !ok { return nil, fmt.Errorf("manifest is not of type %s", manifestinfo.BackendServiceType) } return &backendSvcDeployer{ svcDeployer: svcDeployer, backendMft: bsMft, aliasCertValidator: acm.New(svcDeployer.envSess), }, nil } func backendCustomResources(fs template.Reader) ([]*customresource.CustomResource, error) { crs, err := customresource.Backend(fs) if err != nil { return nil, fmt.Errorf("read custom resources for a %q: %w", manifestinfo.BackendServiceType, err) } return crs, nil } // IsServiceAvailableInRegion checks if service type exist in the given region. func (backendSvcDeployer) IsServiceAvailableInRegion(region string) (bool, error) { return partitions.IsAvailableInRegion(awsecs.EndpointsID, region) } // UploadArtifacts uploads the deployment artifacts such as the container image, custom resources, addons and env files. func (d *backendSvcDeployer) UploadArtifacts() (*UploadArtifactsOutput, error) { return d.uploadArtifacts(d.uploadContainerImages, d.uploadArtifactsToS3, d.uploadCustomResources) } // GenerateCloudFormationTemplate generates a CloudFormation template and parameters for a workload. func (d *backendSvcDeployer) GenerateCloudFormationTemplate(in *GenerateCloudFormationTemplateInput) ( *GenerateCloudFormationTemplateOutput, error) { output, err := d.stackConfiguration(&in.StackRuntimeConfiguration) if err != nil { return nil, err } return d.generateCloudFormationTemplate(output.conf) } // DeployWorkload deploys a backend service using CloudFormation. func (d *backendSvcDeployer) DeployWorkload(in *DeployWorkloadInput) (ActionRecommender, error) { stackConfigOutput, err := d.stackConfiguration(&in.StackRuntimeConfiguration) if err != nil { return nil, err } if err := d.deploy(in.Options, *stackConfigOutput); err != nil { return nil, err } return noopActionRecommender{}, nil } func (d *backendSvcDeployer) stackConfiguration(in *StackRuntimeConfiguration) (*svcStackConfigurationOutput, error) { rc, err := d.runtimeConfig(in) if err != nil { return nil, err } if err := d.validateALBRuntime(); err != nil { return nil, err } var conf cloudformation.StackConfiguration switch { case d.newStack != nil: conf = d.newStack() default: conf, err = stack.NewBackendService(stack.BackendServiceConfig{ App: d.app, EnvManifest: d.envConfig, Manifest: d.backendMft, RawManifest: d.rawMft, ArtifactBucketName: d.resources.S3Bucket, RuntimeConfig: *rc, Addons: d.addons, }) if err != nil { return nil, fmt.Errorf("create stack configuration: %w", err) } } return &svcStackConfigurationOutput{ conf: cloudformation.WrapWithTemplateOverrider(conf, d.overrider), svcUpdater: d.newSvcUpdater(func(s *session.Session) serviceForceUpdater { return ecs.New(s) }), }, nil } func (d *backendSvcDeployer) validateALBRuntime() error { if d.backendMft.HTTP.IsEmpty() { return nil } if err := d.validateRuntimeRoutingRule(d.backendMft.HTTP.Main); err != nil { return fmt.Errorf(`validate ALB runtime configuration for "http": %w`, err) } for idx, rule := range d.backendMft.HTTP.AdditionalRoutingRules { if err := d.validateRuntimeRoutingRule(rule); err != nil { return fmt.Errorf(`validate ALB runtime configuration for "http.additional_rules[%d]": %w`, idx, err) } } return nil } func (d *backendSvcDeployer) validateRuntimeRoutingRule(rule manifest.RoutingRule) error { if rule.IsEmpty() { return nil } hasImportedCerts := len(d.envConfig.HTTPConfig.Private.Certificates) != 0 switch { case rule.Alias.IsEmpty() && hasImportedCerts: return &errSvcWithNoALBAliasDeployingToEnvWithImportedCerts{ name: d.name, envName: d.env.Name, } case rule.Alias.IsEmpty(): return nil case !hasImportedCerts: return fmt.Errorf(`cannot specify "alias" in an environment without imported certs`) } aliases, err := rule.Alias.ToStringSlice() if err != nil { return fmt.Errorf("convert aliases to string slice: %w", err) } if err := d.aliasCertValidator.ValidateCertAliases(aliases, d.envConfig.HTTPConfig.Private.Certificates); err != nil { return fmt.Errorf("validate aliases against the imported certificate for env %s: %w", d.env.Name, err) } return nil }
167
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package deploy import ( "errors" "testing" "time" "github.com/aws/copilot-cli/internal/pkg/deploy/cloudformation" "github.com/aws/copilot-cli/internal/pkg/deploy/cloudformation/stack" "github.com/aws/copilot-cli/internal/pkg/override" "gopkg.in/yaml.v3" "github.com/aws/aws-sdk-go/aws" "github.com/aws/aws-sdk-go/aws/session" "github.com/aws/copilot-cli/internal/pkg/cli/deploy/mocks" "github.com/aws/copilot-cli/internal/pkg/config" "github.com/aws/copilot-cli/internal/pkg/manifest" "github.com/golang/mock/gomock" "github.com/stretchr/testify/require" ) func TestBackendSvcDeployer_GenerateCloudFormationTemplate(t *testing.T) { t.Run("ensure resulting CloudFormation template custom resource paths are empty", func(t *testing.T) { // GIVEN backend := mockBackendServiceDeployer() // WHEN out, err := backend.GenerateCloudFormationTemplate(&GenerateCloudFormationTemplateInput{}) // THEN require.NoError(t, err) type lambdaFn struct { Properties struct { Code struct { S3Bucket string `yaml:"S3bucket"` S3Key string `yaml:"S3Key"` } `yaml:"Code"` } `yaml:"Properties"` } dat := struct { Resources struct { EnvControllerFunction lambdaFn `yaml:"EnvControllerFunction"` RulePriorityFunction lambdaFn `yaml:"RulePriorityFunction"` } `yaml:"Resources"` }{} require.NoError(t, yaml.Unmarshal([]byte(out.Template), &dat)) require.Empty(t, dat.Resources.EnvControllerFunction.Properties.Code.S3Bucket) require.Empty(t, dat.Resources.EnvControllerFunction.Properties.Code.S3Key) require.Empty(t, dat.Resources.RulePriorityFunction.Properties.Code.S3Bucket) require.Empty(t, dat.Resources.RulePriorityFunction.Properties.Code.S3Key) }) } func TestBackendSvcDeployer_stackConfiguration(t *testing.T) { const ( mockAppName = "mock-app" mockEnvName = "mock-env" mockSvcName = "mock-svc" ) tests := map[string]struct { App *config.Application Env *config.Environment Manifest *manifest.BackendService // Cached variables. inEnvironmentConfig func() *manifest.Environment setupMocks func(m *deployMocks) expectedErr string }{ "success if alb not configured": { App: &config.Application{ Name: mockAppName, }, Env: &config.Environment{ Name: mockEnvName, }, Manifest: &manifest.BackendService{}, setupMocks: func(m *deployMocks) { m.mockEndpointGetter.EXPECT().ServiceDiscoveryEndpoint().Return(mockAppName+".local", nil) m.mockEnvVersionGetter.EXPECT().Version().Return("v1.42.0", nil) }, }, "failure if alias configured, no env certs": { App: &config.Application{ Name: mockAppName, }, Env: &config.Environment{ Name: mockEnvName, }, Manifest: &manifest.BackendService{ BackendServiceConfig: manifest.BackendServiceConfig{ HTTP: manifest.HTTP{ Main: manifest.RoutingRule{ Alias: manifest.Alias{ AdvancedAliases: []manifest.AdvancedAlias{ {Alias: aws.String("go.dev")}, }, }, }, }, }, }, setupMocks: func(m *deployMocks) { m.mockEndpointGetter.EXPECT().ServiceDiscoveryEndpoint().Return(mockAppName+".local", nil) m.mockEnvVersionGetter.EXPECT().Version().Return("v1.42.0", nil) }, expectedErr: `validate ALB runtime configuration for "http": cannot specify "alias" in an environment without imported certs`, }, "failure if cert validation fails": { App: &config.Application{ Name: mockAppName, }, Env: &config.Environment{ Name: mockEnvName, }, inEnvironmentConfig: func() *manifest.Environment { envConfig := &manifest.Environment{} envConfig.HTTPConfig.Private.Certificates = []string{"mockCertARN"} return envConfig }, Manifest: &manifest.BackendService{ BackendServiceConfig: manifest.BackendServiceConfig{ HTTP: manifest.HTTP{ Main: manifest.RoutingRule{ Alias: manifest.Alias{ AdvancedAliases: []manifest.AdvancedAlias{ {Alias: aws.String("go.dev")}, }, }, }, }, }, }, setupMocks: func(m *deployMocks) { m.mockEndpointGetter.EXPECT().ServiceDiscoveryEndpoint().Return(mockAppName+".local", nil) m.mockEnvVersionGetter.EXPECT().Version().Return("v1.42.0", nil) m.mockValidator.EXPECT().ValidateCertAliases([]string{"go.dev"}, []string{"mockCertARN"}).Return(errors.New("some error")) }, expectedErr: "validate ALB runtime configuration for \"http\": validate aliases against the imported certificate for env mock-env: some error", }, "success if cert validation succeeds": { App: &config.Application{ Name: mockAppName, }, Env: &config.Environment{ Name: mockEnvName, }, inEnvironmentConfig: func() *manifest.Environment { envConfig := &manifest.Environment{} envConfig.HTTPConfig.Private.Certificates = []string{"mockCertARN"} return envConfig }, Manifest: &manifest.BackendService{ BackendServiceConfig: manifest.BackendServiceConfig{ HTTP: manifest.HTTP{ Main: manifest.RoutingRule{ Alias: manifest.Alias{ AdvancedAliases: []manifest.AdvancedAlias{ {Alias: aws.String("go.dev")}, }, }, }, AdditionalRoutingRules: []manifest.RoutingRule{ { Alias: manifest.Alias{ AdvancedAliases: []manifest.AdvancedAlias{ {Alias: aws.String("go.test")}, }, }, }, }, }, }, }, setupMocks: func(m *deployMocks) { m.mockEndpointGetter.EXPECT().ServiceDiscoveryEndpoint().Return(mockAppName+".local", nil) m.mockEnvVersionGetter.EXPECT().Version().Return("v1.42.0", nil) m.mockValidator.EXPECT().ValidateCertAliases([]string{"go.dev"}, []string{"mockCertARN"}).Return(nil) m.mockValidator.EXPECT().ValidateCertAliases([]string{"go.test"}, []string{"mockCertARN"}).Return(nil) }, }, "failure if env has imported certs but no alias set": { App: &config.Application{ Name: mockAppName, }, Env: &config.Environment{ Name: mockEnvName, }, inEnvironmentConfig: func() *manifest.Environment { envConfig := &manifest.Environment{} envConfig.HTTPConfig.Private.Certificates = []string{"mockCertARN"} return envConfig }, Manifest: &manifest.BackendService{ BackendServiceConfig: manifest.BackendServiceConfig{ HTTP: manifest.HTTP{ Main: manifest.RoutingRule{ Path: aws.String("/"), }, }, }, }, setupMocks: func(m *deployMocks) { m.mockEndpointGetter.EXPECT().ServiceDiscoveryEndpoint().Return(mockAppName+".local", nil) m.mockEnvVersionGetter.EXPECT().Version().Return("v1.42.0", nil) }, expectedErr: `validate ALB runtime configuration for "http": cannot deploy service mock-svc without "alias" to environment mock-env with certificate imported`, }, "failure if env has imported certs but no alias set in additional rules": { App: &config.Application{ Name: mockAppName, }, Env: &config.Environment{ Name: mockEnvName, }, inEnvironmentConfig: func() *manifest.Environment { envConfig := &manifest.Environment{} envConfig.HTTPConfig.Private.Certificates = []string{"mockCertARN"} return envConfig }, Manifest: &manifest.BackendService{ BackendServiceConfig: manifest.BackendServiceConfig{ HTTP: manifest.HTTP{ Main: manifest.RoutingRule{ Path: aws.String("/"), Alias: manifest.Alias{ AdvancedAliases: []manifest.AdvancedAlias{ {Alias: aws.String("go.test")}, }, }, }, AdditionalRoutingRules: []manifest.RoutingRule{ { Path: aws.String("/admin"), }, }, }, }, }, setupMocks: func(m *deployMocks) { m.mockEndpointGetter.EXPECT().ServiceDiscoveryEndpoint().Return(mockAppName+".local", nil) m.mockEnvVersionGetter.EXPECT().Version().Return("v1.42.0", nil) m.mockValidator.EXPECT().ValidateCertAliases([]string{"go.test"}, []string{"mockCertARN"}).Return(nil) }, expectedErr: `validate ALB runtime configuration for "http.additional_rules[0]": cannot deploy service mock-svc without "alias" to environment mock-env with certificate imported`, }, "success if env has imported certs but alb not configured": { App: &config.Application{ Name: mockAppName, }, Env: &config.Environment{ Name: mockEnvName, CustomConfig: &config.CustomizeEnv{ ImportCertARNs: []string{"mockCertARN"}, }, }, Manifest: &manifest.BackendService{}, setupMocks: func(m *deployMocks) { m.mockEndpointGetter.EXPECT().ServiceDiscoveryEndpoint().Return(mockAppName+".local", nil) m.mockEnvVersionGetter.EXPECT().Version().Return("v1.42.0", nil) }, }, } for name, tc := range tests { t.Run(name, func(t *testing.T) { ctrl := gomock.NewController(t) defer ctrl.Finish() m := &deployMocks{ mockEndpointGetter: mocks.NewMockendpointGetter(ctrl), mockValidator: mocks.NewMockaliasCertValidator(ctrl), mockEnvVersionGetter: mocks.NewMockversionGetter(ctrl), } if tc.setupMocks != nil { tc.setupMocks(m) } if tc.inEnvironmentConfig == nil { tc.inEnvironmentConfig = func() *manifest.Environment { return &manifest.Environment{} } } deployer := &backendSvcDeployer{ svcDeployer: &svcDeployer{ workloadDeployer: &workloadDeployer{ name: mockSvcName, app: tc.App, env: tc.Env, endpointGetter: m.mockEndpointGetter, resources: &stack.AppRegionalResources{}, envConfig: tc.inEnvironmentConfig(), envVersionGetter: m.mockEnvVersionGetter, }, newSvcUpdater: func(f func(*session.Session) serviceForceUpdater) serviceForceUpdater { return nil }, }, backendMft: tc.Manifest, aliasCertValidator: m.mockValidator, newStack: func() cloudformation.StackConfiguration { return new(stubCloudFormationStack) }, } _, err := deployer.stackConfiguration(&StackRuntimeConfiguration{}) if tc.expectedErr != "" { require.EqualError(t, err, tc.expectedErr) } else { require.NoError(t, err) } }) } } func mockBackendServiceDeployer(opts ...func(*backendSvcDeployer)) *backendSvcDeployer { deployer := &backendSvcDeployer{ svcDeployer: &svcDeployer{ workloadDeployer: &workloadDeployer{ name: "example", app: &config.Application{ Name: "demo", }, env: &config.Environment{ App: "demo", Name: "test", }, resources: &stack.AppRegionalResources{}, envConfig: new(manifest.Environment), endpointGetter: &mockEndpointGetter{endpoint: "demo.test.local"}, envVersionGetter: &mockEnvVersionGetter{version: "v1.0.0"}, overrider: new(override.Noop), }, newSvcUpdater: func(f func(*session.Session) serviceForceUpdater) serviceForceUpdater { return nil }, now: func() time.Time { return time.Date(2020, 11, 23, 0, 0, 0, 0, time.UTC) }, }, backendMft: &manifest.BackendService{ Workload: manifest.Workload{ Name: aws.String("example"), }, BackendServiceConfig: manifest.BackendServiceConfig{ TaskConfig: manifest.TaskConfig{ Count: manifest.Count{ Value: aws.Int(1), }, }, ImageConfig: manifest.ImageWithHealthcheckAndOptionalPort{ ImageWithOptionalPort: manifest.ImageWithOptionalPort{ Image: manifest.Image{ ImageLocationOrBuild: manifest.ImageLocationOrBuild{ Build: manifest.BuildArgsOrString{BuildString: aws.String("/Dockerfile")}, }, }, Port: aws.Uint16(80), }, }, }, }, newStack: func() cloudformation.StackConfiguration { return new(stubCloudFormationStack) }, } for _, opt := range opts { opt(deployer) } return deployer }
381
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package deploy import ( "context" "errors" "fmt" "io" "os" "sort" "strings" "sync" awscfn "github.com/aws/aws-sdk-go/service/cloudformation" "github.com/aws/copilot-cli/internal/pkg/addon" "github.com/aws/copilot-cli/internal/pkg/aws/cloudformation" awscloudformation "github.com/aws/copilot-cli/internal/pkg/aws/cloudformation" "github.com/aws/copilot-cli/internal/pkg/aws/ec2" "github.com/aws/copilot-cli/internal/pkg/aws/elbv2" "github.com/aws/copilot-cli/internal/pkg/aws/partitions" awss3 "github.com/aws/copilot-cli/internal/pkg/aws/s3" "github.com/aws/copilot-cli/internal/pkg/aws/sessions" "github.com/aws/copilot-cli/internal/pkg/cli/deploy/patch" "github.com/aws/copilot-cli/internal/pkg/config" "github.com/aws/copilot-cli/internal/pkg/deploy" deploycfn "github.com/aws/copilot-cli/internal/pkg/deploy/cloudformation" cfnstack "github.com/aws/copilot-cli/internal/pkg/deploy/cloudformation/stack" "github.com/aws/copilot-cli/internal/pkg/deploy/upload/customresource" "github.com/aws/copilot-cli/internal/pkg/describe" "github.com/aws/copilot-cli/internal/pkg/describe/stack" "github.com/aws/copilot-cli/internal/pkg/manifest" "github.com/aws/copilot-cli/internal/pkg/override" "github.com/aws/copilot-cli/internal/pkg/template" "github.com/aws/copilot-cli/internal/pkg/template/artifactpath" "github.com/aws/copilot-cli/internal/pkg/template/diff" "github.com/aws/copilot-cli/internal/pkg/term/log" termprogress "github.com/aws/copilot-cli/internal/pkg/term/progress" "github.com/spf13/afero" "golang.org/x/sync/errgroup" ) // WorkspaceAddonsReaderPathGetter reads addons from a workspace and the path of a workspace. type WorkspaceAddonsReaderPathGetter interface { addon.WorkspaceAddonsReader Path() string } type appResourcesGetter interface { GetAppResourcesByRegion(app *config.Application, region string) (*cfnstack.AppRegionalResources, error) } type environmentDeployer interface { UpdateAndRenderEnvironment(conf deploycfn.StackConfiguration, bucketARN string, opts ...cloudformation.StackOption) error DeployedEnvironmentParameters(app, env string) ([]*awscfn.Parameter, error) ForceUpdateOutputID(app, env string) (string, error) } type patcher interface { EnsureManagerRoleIsAllowedToUpload(bucketName string) error } type prefixListGetter interface { CloudFrontManagedPrefixListID() (string, error) } type envDescriber interface { ValidateCFServiceDomainAliases() error Params() (map[string]string, error) } type lbDescriber interface { DescribeRule(context.Context, string) (elbv2.Rule, error) } type stackDescriber interface { Resources() ([]*stack.Resource, error) } type addons struct { stack stackBuilder err error } type envDeployer struct { app *config.Application env *config.Environment // Dependencies to upload artifacts. templateFS template.Reader s3 uploader prefixListGetter prefixListGetter // Dependencies to deploy an environment. appCFN appResourcesGetter envDeployer environmentDeployer tmplGetter deployedTemplateGetter patcher patcher newStack func(input *cfnstack.EnvConfig, forceUpdateID string, prevParams []*awscfn.Parameter) (deploycfn.StackConfiguration, error) envDescriber envDescriber lbDescriber lbDescriber newServiceStackDescriber func(string) stackDescriber // Dependencies for parsing addons. ws WorkspaceAddonsReaderPathGetter parseAddonsOnce sync.Once parseAddons func() (stackBuilder, error) // Cached variables. appRegionalResources *cfnstack.AppRegionalResources addons addons } // NewEnvDeployerInput contains information needed to construct an environment deployer. type NewEnvDeployerInput struct { App *config.Application Env *config.Environment SessionProvider *sessions.Provider ConfigStore describe.ConfigStoreSvc Workspace WorkspaceAddonsReaderPathGetter Overrider Overrider } // NewEnvDeployer constructs an environment deployer. func NewEnvDeployer(in *NewEnvDeployerInput) (*envDeployer, error) { defaultSession, err := in.SessionProvider.Default() if err != nil { return nil, fmt.Errorf("get default session: %w", err) } envRegionSession, err := in.SessionProvider.DefaultWithRegion(in.Env.Region) if err != nil { return nil, fmt.Errorf("get default session in env region %s: %w", in.Env.Region, err) } envManagerSession, err := in.SessionProvider.FromRole(in.Env.ManagerRoleARN, in.Env.Region) if err != nil { return nil, fmt.Errorf("get env session: %w", err) } envDescriber, err := describe.NewEnvDescriber(describe.NewEnvDescriberConfig{ App: in.App.Name, Env: in.Env.Name, ConfigStore: in.ConfigStore, }) if err != nil { return nil, fmt.Errorf("initialize env describer: %w", err) } overrider := in.Overrider if overrider == nil { overrider = new(override.Noop) } cfnClient := deploycfn.New(envManagerSession, deploycfn.WithProgressTracker(os.Stderr)) deployer := &envDeployer{ app: in.App, env: in.Env, templateFS: template.New(), s3: awss3.New(envManagerSession), prefixListGetter: ec2.New(envRegionSession), appCFN: deploycfn.New(defaultSession, deploycfn.WithProgressTracker(os.Stderr)), envDeployer: cfnClient, tmplGetter: cfnClient, patcher: &patch.EnvironmentPatcher{ Prog: termprogress.NewSpinner(log.DiagnosticWriter), TemplatePatcher: cfnClient, Env: in.Env, }, newStack: func(in *cfnstack.EnvConfig, lastForceUpdateID string, oldParams []*awscfn.Parameter) (deploycfn.StackConfiguration, error) { stack, err := cfnstack.NewEnvConfigFromExistingStack(in, lastForceUpdateID, oldParams) if err != nil { return nil, err } return deploycfn.WrapWithTemplateOverrider(stack, overrider), nil }, envDescriber: envDescriber, lbDescriber: elbv2.New(envManagerSession), newServiceStackDescriber: func(svc string) stackDescriber { return stack.NewStackDescriber(cfnstack.NameForWorkload(in.App.Name, in.Env.Name, svc), envManagerSession) }, ws: in.Workspace, } deployer.parseAddons = func() (stackBuilder, error) { deployer.parseAddonsOnce.Do(func() { deployer.addons.stack, deployer.addons.err = addon.ParseFromEnv(deployer.ws) }) return deployer.addons.stack, deployer.addons.err } return deployer, nil } // Validate returns an error if the environment manifest is incompatible with services and application configurations. func (d *envDeployer) Validate(mft *manifest.Environment) error { return d.validateCDN(mft) } // UploadEnvArtifactsOutput holds URLs of artifacts pushed to S3 buckets. type UploadEnvArtifactsOutput struct { AddonsURL string CustomResourceURLs map[string]string } // UploadArtifacts uploads the deployment artifacts for the environment. func (d *envDeployer) UploadArtifacts() (*UploadEnvArtifactsOutput, error) { resources, err := d.getAppRegionalResources() if err != nil { return nil, err } if err := d.patcher.EnsureManagerRoleIsAllowedToUpload(resources.S3Bucket); err != nil { return nil, fmt.Errorf("ensure env manager role has permissions to upload: %w", err) } customResourceURLs, err := d.uploadCustomResources(resources.S3Bucket) if err != nil { return nil, err } addonsURL, err := d.uploadAddons(resources.S3Bucket) if err != nil { return nil, err } return &UploadEnvArtifactsOutput{ AddonsURL: addonsURL, CustomResourceURLs: customResourceURLs, }, nil } // DeployDiff returns the stringified diff of the template against the deployed template of the environment. func (d *envDeployer) DeployDiff(template string) (string, error) { tmpl, err := d.tmplGetter.Template(cfnstack.NameForEnv(d.app.Name, d.env.Name)) if err != nil { var errNotFound *awscloudformation.ErrStackNotFound if !errors.As(err, &errNotFound) { return "", fmt.Errorf("retrieve the deployed template for %q: %w", d.env.Name, err) } tmpl = "" } diffTree, err := diff.From(tmpl).ParseWithCFNOverriders([]byte(template)) if err != nil { return "", fmt.Errorf("parse the diff against the deployed env stack %q: %w", d.env.Name, err) } buf := strings.Builder{} if err := diffTree.Write(&buf); err != nil { return "", err } return buf.String(), nil } // AddonsTemplate returns the environment addons template. func (d *envDeployer) AddonsTemplate() (string, error) { addons, err := d.parseAddons() if err != nil { var notFoundErr *addon.ErrAddonsNotFound if !errors.As(err, &notFoundErr) { return "", fmt.Errorf("parse environment addons: %w", err) } return "", nil } tmpl, err := addons.Template() if err != nil { return "", fmt.Errorf("render addons template: %w", err) } return tmpl, nil } // DeployEnvironmentInput contains information used to deploy the environment. type DeployEnvironmentInput struct { RootUserARN string AddonsURL string CustomResourcesURLs map[string]string Manifest *manifest.Environment ForceNewUpdate bool RawManifest []byte PermissionsBoundary string DisableRollback bool Version string } // GenerateCloudFormationTemplate returns the environment stack's template and parameter configuration. func (d *envDeployer) GenerateCloudFormationTemplate(in *DeployEnvironmentInput) (*GenerateCloudFormationTemplateOutput, error) { stackInput, err := d.buildStackInput(in) if err != nil { return nil, err } oldParams, err := d.envDeployer.DeployedEnvironmentParameters(d.app.Name, d.env.Name) if err != nil { return nil, fmt.Errorf("describe environment stack parameters: %w", err) } lastForceUpdateID, err := d.envDeployer.ForceUpdateOutputID(d.app.Name, d.env.Name) if err != nil { return nil, fmt.Errorf("retrieve environment stack force update ID: %w", err) } stack, err := d.newStack(stackInput, lastForceUpdateID, oldParams) if err != nil { return nil, err } tpl, err := stack.Template() if err != nil { return nil, fmt.Errorf("generate stack template: %w", err) } params, err := stack.SerializedParameters() if err != nil { return nil, fmt.Errorf("generate stack template parameters: %w", err) } return &GenerateCloudFormationTemplateOutput{ Template: tpl, Parameters: params, }, nil } // DeployEnvironment deploys an environment using CloudFormation. func (d *envDeployer) DeployEnvironment(in *DeployEnvironmentInput) error { stackInput, err := d.buildStackInput(in) if err != nil { return err } oldParams, err := d.envDeployer.DeployedEnvironmentParameters(d.app.Name, d.env.Name) if err != nil { return fmt.Errorf("describe environment stack parameters: %w", err) } lastForceUpdateID, err := d.envDeployer.ForceUpdateOutputID(d.app.Name, d.env.Name) if err != nil { return fmt.Errorf("retrieve environment stack force update ID: %w", err) } opts := []awscloudformation.StackOption{ awscloudformation.WithRoleARN(d.env.ExecutionRoleARN), } if in.DisableRollback { opts = append(opts, awscloudformation.WithDisableRollback()) } stack, err := d.newStack(stackInput, lastForceUpdateID, oldParams) if err != nil { return err } return d.envDeployer.UpdateAndRenderEnvironment(stack, stackInput.ArtifactBucketARN, opts...) } func (d *envDeployer) getAppRegionalResources() (*cfnstack.AppRegionalResources, error) { if d.appRegionalResources != nil { return d.appRegionalResources, nil } resources, err := d.appCFN.GetAppResourcesByRegion(d.app, d.env.Region) if err != nil { return nil, fmt.Errorf("get app resources in region %s: %w", d.env.Region, err) } if resources.S3Bucket == "" { return nil, fmt.Errorf("cannot find the S3 artifact bucket in region %s", d.env.Region) } return resources, nil } func (d *envDeployer) uploadCustomResources(bucket string) (map[string]string, error) { crs, err := customresource.Env(d.templateFS) if err != nil { return nil, fmt.Errorf("read custom resources for environment %s: %w", d.env.Name, err) } urls, err := customresource.Upload(func(key string, dat io.Reader) (url string, err error) { return d.s3.Upload(bucket, key, dat) }, crs) if err != nil { return nil, fmt.Errorf("upload custom resources to bucket %s: %w", bucket, err) } return urls, nil } func (d *envDeployer) uploadAddons(bucket string) (string, error) { addons, err := d.parseAddons() if err != nil { var notFoundErr *addon.ErrAddonsNotFound if !errors.As(err, &notFoundErr) { return "", fmt.Errorf("parse environment addons: %w", err) } return "", nil } pkgConfig := addon.PackageConfig{ Bucket: bucket, Uploader: d.s3, WorkspacePath: d.ws.Path(), FS: afero.NewOsFs(), } if err := addons.Package(pkgConfig); err != nil { return "", fmt.Errorf("package environment addons: %w", err) } tmpl, err := addons.Template() if err != nil { return "", fmt.Errorf("render addons template: %w", err) } url, err := d.s3.Upload(bucket, artifactpath.EnvironmentAddons([]byte(tmpl)), strings.NewReader(tmpl)) if err != nil { return "", fmt.Errorf("upload addons template to bucket %s: %w", bucket, err) } return url, nil } func (d *envDeployer) buildStackInput(in *DeployEnvironmentInput) (*cfnstack.EnvConfig, error) { resources, err := d.getAppRegionalResources() if err != nil { return nil, err } partition, err := partitions.Region(d.env.Region).Partition() if err != nil { return nil, err } cidrPrefixListIDs, err := d.cidrPrefixLists(in) if err != nil { return nil, err } addons, err := d.buildAddonsInput(resources.Region, resources.S3Bucket, in.AddonsURL) if err != nil { return nil, err } return &cfnstack.EnvConfig{ Name: d.env.Name, App: deploy.AppInformation{ Name: d.app.Name, Domain: d.app.Domain, AccountPrincipalARN: in.RootUserARN, }, AdditionalTags: d.app.Tags, Addons: addons, CustomResourcesURLs: in.CustomResourcesURLs, ArtifactBucketARN: awss3.FormatARN(partition.ID(), resources.S3Bucket), ArtifactBucketKeyARN: resources.KMSKeyARN, CIDRPrefixListIDs: cidrPrefixListIDs, PublicALBSourceIPs: d.publicALBSourceIPs(in), Mft: in.Manifest, ForceUpdate: in.ForceNewUpdate, RawMft: in.RawManifest, PermissionsBoundary: in.PermissionsBoundary, Version: in.Version, }, nil } func (d *envDeployer) buildAddonsInput(region, bucket, uploadURL string) (*cfnstack.Addons, error) { parsedAddons, err := d.parseAddons() if err != nil { var notFoundErr *addon.ErrAddonsNotFound if errors.As(err, &notFoundErr) { return nil, nil } return nil, err } if uploadURL != "" { return &cfnstack.Addons{ S3ObjectURL: uploadURL, Stack: parsedAddons, }, nil } tpl, err := parsedAddons.Template() if err != nil { return nil, fmt.Errorf("render addons template: %w", err) } return &cfnstack.Addons{ S3ObjectURL: awss3.URL(region, bucket, artifactpath.EnvironmentAddons([]byte(tpl))), Stack: parsedAddons, }, nil } // lbServiceRedirects returns true if svc's HTTP listener rule redirects. We only check // HTTPListenerRuleWithDomain because HTTPListenerRule doesn't ever redirect. func (d *envDeployer) lbServiceRedirects(ctx context.Context, svc string) (bool, error) { stackDescriber := d.newServiceStackDescriber(svc) resources, err := stackDescriber.Resources() if err != nil { return false, fmt.Errorf("get stack resources: %w", err) } var ruleARN string for _, res := range resources { if res.LogicalID == template.LogicalIDHTTPListenerRuleWithDomain { ruleARN = res.PhysicalID break } } if ruleARN == "" { // this will happen if the service doesn't support https. return false, nil } rule, err := d.lbDescriber.DescribeRule(ctx, ruleARN) if err != nil { return false, fmt.Errorf("describe listener rule %q: %w", ruleARN, err) } return rule.HasRedirectAction(), nil } func (d *envDeployer) validateCDN(mft *manifest.Environment) error { isManagedCDNEnabled := mft.CDNEnabled() && !mft.HasImportedPublicALBCerts() && d.app.Domain != "" if isManagedCDNEnabled { // With managed domain, if the customer isn't using `alias` the A-records are inserted in the service stack as each service domain is unique. // However, when clients enable CloudFront, they would need to update all their existing records to now point to the distribution. // Hence, we force users to use `alias` and let the records be written in the environment stack instead. if err := d.envDescriber.ValidateCFServiceDomainAliases(); err != nil { return err } } if mft.CDNEnabled() && mft.CDNDoesTLSTermination() { err := d.validateALBWorkloadsDontRedirect() var redirErr *errEnvHasPublicServicesWithRedirect switch { case errors.As(err, &redirErr) && mft.IsPublicLBIngressRestrictedToCDN(): return err case errors.As(err, &redirErr): log.Warningln(redirErr.warning()) case err != nil: return fmt.Errorf("enable TLS termination on CDN: %w", err) } } return nil } // validateALBWorkloadsDontRedirect verifies that none of the public ALB Workloads // in this environment have a redirect in their HTTPWithDomain listener. // If any services redirect, an error is returned. func (d *envDeployer) validateALBWorkloadsDontRedirect() error { params, err := d.envDescriber.Params() if err != nil { return fmt.Errorf("get env params: %w", err) } if params[cfnstack.EnvParamALBWorkloadsKey] == "" { return nil } services := strings.Split(params[cfnstack.EnvParamALBWorkloadsKey], ",") g, ctx := errgroup.WithContext(context.Background()) var badServices []string var badServicesMu sync.Mutex for i := range services { svc := services[i] g.Go(func() error { redirects, err := d.lbServiceRedirects(ctx, svc) switch { case err != nil: return fmt.Errorf("verify service %q: %w", svc, err) case redirects: badServicesMu.Lock() defer badServicesMu.Unlock() badServices = append(badServices, svc) } return nil }) } if err := g.Wait(); err != nil { return err } if len(badServices) > 0 { sort.Strings(badServices) return &errEnvHasPublicServicesWithRedirect{ services: badServices, } } return nil } func (d *envDeployer) cidrPrefixLists(in *DeployEnvironmentInput) ([]string, error) { var cidrPrefixListIDs []string // Check if ingress is allowed from cloudfront if in.Manifest == nil || !in.Manifest.IsPublicLBIngressRestrictedToCDN() { return nil, nil } cfManagedPrefixListID, err := d.cfManagedPrefixListID() if err != nil { return nil, err } cidrPrefixListIDs = append(cidrPrefixListIDs, cfManagedPrefixListID) return cidrPrefixListIDs, nil } func (d *envDeployer) publicALBSourceIPs(in *DeployEnvironmentInput) []string { if in.Manifest == nil || len(in.Manifest.GetPublicALBSourceIPs()) == 0 { return nil } ips := make([]string, len(in.Manifest.GetPublicALBSourceIPs())) for i, sourceIP := range in.Manifest.GetPublicALBSourceIPs() { ips[i] = string(sourceIP) } return ips } func (d *envDeployer) cfManagedPrefixListID() (string, error) { id, err := d.prefixListGetter.CloudFrontManagedPrefixListID() if err != nil { return "", fmt.Errorf("retrieve CloudFront managed prefix list id: %w", err) } return id, nil }
595
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package deploy import ( "bytes" "errors" "fmt" "io" "strings" "testing" cfnclient "github.com/aws/copilot-cli/internal/pkg/aws/cloudformation" "github.com/aws/copilot-cli/internal/pkg/deploy/cloudformation" cfnmocks "github.com/aws/copilot-cli/internal/pkg/deploy/cloudformation/mocks" "github.com/aws/aws-sdk-go/aws" awscfn "github.com/aws/aws-sdk-go/service/cloudformation" awselb "github.com/aws/aws-sdk-go/service/elbv2" "github.com/aws/copilot-cli/internal/pkg/addon" "github.com/aws/copilot-cli/internal/pkg/aws/elbv2" "github.com/aws/copilot-cli/internal/pkg/cli/deploy/mocks" "github.com/aws/copilot-cli/internal/pkg/config" cfnstack "github.com/aws/copilot-cli/internal/pkg/deploy/cloudformation/stack" "github.com/aws/copilot-cli/internal/pkg/deploy/upload/customresource" "github.com/aws/copilot-cli/internal/pkg/describe/stack" "github.com/aws/copilot-cli/internal/pkg/manifest" "github.com/aws/copilot-cli/internal/pkg/template/artifactpath" "github.com/aws/copilot-cli/internal/pkg/term/log" "github.com/golang/mock/gomock" "github.com/stretchr/testify/require" ) type envDeployerMocks struct { s3 *mocks.Mockuploader prefixListGetter *mocks.MockprefixListGetter appCFN *mocks.MockappResourcesGetter envDeployer *mocks.MockenvironmentDeployer patcher *mocks.Mockpatcher stackSerializer *cfnmocks.MockStackConfiguration envDescriber *mocks.MockenvDescriber lbDescriber *mocks.MocklbDescriber stackDescribers map[string]*mocks.MockstackDescriber ws *mocks.MockWorkspaceAddonsReaderPathGetter parseAddons func() (stackBuilder, error) addons *mocks.MockstackBuilder } func TestEnvDeployer_UploadArtifacts(t *testing.T) { const ( mockEnvRegion = "mockEnvRegion" ) mockApp := &config.Application{} testCases := map[string]struct { setUpMocks func(m *envDeployerMocks) wantedAddonsURL string wantedCustomResourceURLs map[string]string wantedError error }{ "fail to get app resource by region": { setUpMocks: func(m *envDeployerMocks) { m.appCFN.EXPECT().GetAppResourcesByRegion(mockApp, mockEnvRegion).Return(nil, errors.New("some error")) }, wantedError: fmt.Errorf("get app resources in region %s: some error", mockEnvRegion), }, "fail to find S3 bucket in the region": { setUpMocks: func(m *envDeployerMocks) { m.appCFN.EXPECT().GetAppResourcesByRegion(mockApp, mockEnvRegion).Return(&cfnstack.AppRegionalResources{}, nil) }, wantedError: fmt.Errorf("cannot find the S3 artifact bucket in region %s", mockEnvRegion), }, "fail to patch the environment": { setUpMocks: func(m *envDeployerMocks) { m.appCFN.EXPECT().GetAppResourcesByRegion(mockApp, mockEnvRegion).Return(&cfnstack.AppRegionalResources{ S3Bucket: "mockS3Bucket", }, nil) m.patcher.EXPECT().EnsureManagerRoleIsAllowedToUpload("mockS3Bucket").Return(errors.New("some error")) }, wantedError: errors.New("ensure env manager role has permissions to upload: some error"), }, "fail to upload custom resource scripts": { setUpMocks: func(m *envDeployerMocks) { m.appCFN.EXPECT().GetAppResourcesByRegion(mockApp, mockEnvRegion).Return(&cfnstack.AppRegionalResources{ S3Bucket: "mockS3Bucket", }, nil) m.patcher.EXPECT().EnsureManagerRoleIsAllowedToUpload("mockS3Bucket").Return(nil) m.s3.EXPECT().Upload("mockS3Bucket", gomock.Any(), gomock.Any()).AnyTimes().Return("", fmt.Errorf("some error")) }, wantedError: errors.New("upload custom resources to bucket mockS3Bucket"), }, "fail to parse addons": { setUpMocks: func(m *envDeployerMocks) { m.appCFN.EXPECT().GetAppResourcesByRegion(mockApp, mockEnvRegion).Return(&cfnstack.AppRegionalResources{ S3Bucket: "mockS3Bucket", }, nil) m.patcher.EXPECT().EnsureManagerRoleIsAllowedToUpload("mockS3Bucket").Return(nil) m.s3.EXPECT().Upload("mockS3Bucket", gomock.Any(), gomock.Any()).AnyTimes().Return("", nil) m.parseAddons = func() (stackBuilder, error) { return nil, errors.New("some error") } }, wantedError: errors.New("parse environment addons: some error"), }, "fail to package addons asset": { setUpMocks: func(m *envDeployerMocks) { m.appCFN.EXPECT().GetAppResourcesByRegion(mockApp, mockEnvRegion).Return(&cfnstack.AppRegionalResources{ S3Bucket: "mockS3Bucket", }, nil) m.patcher.EXPECT().EnsureManagerRoleIsAllowedToUpload("mockS3Bucket").Return(nil) m.s3.EXPECT().Upload("mockS3Bucket", gomock.Any(), gomock.Any()).AnyTimes().Return("", nil) m.parseAddons = func() (stackBuilder, error) { return m.addons, nil } m.ws.EXPECT().Path().Return("mockPath") m.addons.EXPECT().Package(gomock.Any()).Return(errors.New("some error")) }, wantedError: errors.New("package environment addons: some error"), }, "fail to render addons template": { setUpMocks: func(m *envDeployerMocks) { m.appCFN.EXPECT().GetAppResourcesByRegion(mockApp, mockEnvRegion).Return(&cfnstack.AppRegionalResources{ S3Bucket: "mockS3Bucket", }, nil) m.patcher.EXPECT().EnsureManagerRoleIsAllowedToUpload("mockS3Bucket").Return(nil) m.s3.EXPECT().Upload("mockS3Bucket", gomock.Any(), gomock.Any()).AnyTimes().Return("", nil) m.parseAddons = func() (stackBuilder, error) { return m.addons, nil } m.ws.EXPECT().Path().Return("mockPath") m.addons.EXPECT().Package(gomock.Any()).Return(nil) m.addons.EXPECT().Template().Return("", errors.New("some error")) }, wantedError: errors.New("render addons template: some error"), }, "fail to upload addons template": { setUpMocks: func(m *envDeployerMocks) { m.appCFN.EXPECT().GetAppResourcesByRegion(mockApp, mockEnvRegion).Return(&cfnstack.AppRegionalResources{ S3Bucket: "mockS3Bucket", }, nil) m.patcher.EXPECT().EnsureManagerRoleIsAllowedToUpload("mockS3Bucket").Return(nil) m.s3.EXPECT().Upload("mockS3Bucket", gomock.Not(artifactpath.EnvironmentAddons([]byte("mockAddons"))), gomock.Any()).AnyTimes().Return("", nil) m.parseAddons = func() (stackBuilder, error) { return m.addons, nil } m.ws.EXPECT().Path().Return("mockPath") m.addons.EXPECT().Package(gomock.Any()).Return(nil) m.addons.EXPECT().Template().Return("mockAddons", nil) m.s3.EXPECT().Upload("mockS3Bucket", artifactpath.EnvironmentAddons([]byte("mockAddons")), gomock.Any()). Return("", errors.New("some error")) }, wantedError: errors.New("upload addons template to bucket mockS3Bucket: some error"), }, "success with addons and custom resources URLs": { setUpMocks: func(m *envDeployerMocks) { m.appCFN.EXPECT().GetAppResourcesByRegion(mockApp, mockEnvRegion).Return(&cfnstack.AppRegionalResources{ S3Bucket: "mockS3Bucket", }, nil) m.patcher.EXPECT().EnsureManagerRoleIsAllowedToUpload("mockS3Bucket").Return(nil) m.s3.EXPECT().Upload("mockS3Bucket", gomock.Not(artifactpath.EnvironmentAddons([]byte("mockAddons"))), gomock.Any()).AnyTimes().Return("", nil) m.parseAddons = func() (stackBuilder, error) { return m.addons, nil } m.ws.EXPECT().Path().Return("mockPath") m.addons.EXPECT().Package(gomock.Any()).Return(nil) m.addons.EXPECT().Template().Return("mockAddons", nil) m.s3.EXPECT().Upload("mockS3Bucket", artifactpath.EnvironmentAddons([]byte("mockAddons")), gomock.Any()). Return("mockAddonsURL", nil) }, wantedAddonsURL: "mockAddonsURL", wantedCustomResourceURLs: map[string]string{ "CertificateReplicatorFunction": "", "CertificateValidationFunction": "", "CustomDomainFunction": "", "DNSDelegationFunction": "", "UniqueJSONValuesFunction": "", }, }, "success with only custom resource URLs returned": { setUpMocks: func(m *envDeployerMocks) { m.appCFN.EXPECT().GetAppResourcesByRegion(mockApp, mockEnvRegion).Return(&cfnstack.AppRegionalResources{ S3Bucket: "mockS3Bucket", }, nil) m.patcher.EXPECT().EnsureManagerRoleIsAllowedToUpload("mockS3Bucket").Return(nil) crs, err := customresource.Env(fakeTemplateFS()) require.NoError(t, err) m.s3.EXPECT().Upload("mockS3Bucket", gomock.Any(), gomock.Any()).DoAndReturn(func(_, key string, _ io.Reader) (url string, err error) { for _, cr := range crs { if strings.Contains(key, strings.ToLower(cr.Name())) { return "", nil } } return "", errors.New("did not match any custom resource") }).Times(len(crs)) m.parseAddons = func() (stackBuilder, error) { return nil, &addon.ErrAddonsNotFound{} } }, wantedCustomResourceURLs: map[string]string{ "CertificateReplicatorFunction": "", "CertificateValidationFunction": "", "CustomDomainFunction": "", "DNSDelegationFunction": "", "UniqueJSONValuesFunction": "", }, }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { ctrl := gomock.NewController(t) defer ctrl.Finish() m := &envDeployerMocks{ appCFN: mocks.NewMockappResourcesGetter(ctrl), s3: mocks.NewMockuploader(ctrl), patcher: mocks.NewMockpatcher(ctrl), ws: mocks.NewMockWorkspaceAddonsReaderPathGetter(ctrl), addons: mocks.NewMockstackBuilder(ctrl), } tc.setUpMocks(m) mockEnv := &config.Environment{ Name: "mockEnv", ManagerRoleARN: "mockManagerRoleARN", Region: mockEnvRegion, App: "mockApp", } d := envDeployer{ app: mockApp, env: mockEnv, appCFN: m.appCFN, s3: m.s3, patcher: m.patcher, templateFS: fakeTemplateFS(), ws: m.ws, parseAddons: m.parseAddons, } got, gotErr := d.UploadArtifacts() if tc.wantedError != nil { require.Contains(t, gotErr.Error(), tc.wantedError.Error()) } else { require.NoError(t, gotErr) require.Equal(t, tc.wantedCustomResourceURLs, got.CustomResourceURLs) require.Equal(t, tc.wantedAddonsURL, got.AddonsURL) } }) } } func TestEnvDeployer_DeployDiff(t *testing.T) { testCases := map[string]struct { inTemplate string setUpMocks func(m *deployDiffMocks) wanted string checkErr func(t *testing.T, gotErr error) }{ "error getting the deployed template": { setUpMocks: func(m *deployDiffMocks) { m.mockDeployedTmplGetter. EXPECT().Template(gomock.Eq(cfnstack.NameForEnv("mockApp", "mockEnv"))). Return("", errors.New("some error")) }, checkErr: func(t *testing.T, gotErr error) { require.EqualError(t, gotErr, `retrieve the deployed template for "mockEnv": some error`) }, }, "error parsing the diff against the deployed template": { inTemplate: `!!!???what a weird template`, setUpMocks: func(m *deployDiffMocks) { m.mockDeployedTmplGetter.EXPECT(). Template(gomock.Eq(cfnstack.NameForEnv("mockApp", "mockEnv"))). Return("wow such template", nil) }, checkErr: func(t *testing.T, gotErr error) { require.ErrorContains(t, gotErr, `parse the diff against the deployed env stack "mockEnv"`) }, }, "get the correct diff": { inTemplate: `peace: and love`, setUpMocks: func(m *deployDiffMocks) { m.mockDeployedTmplGetter.EXPECT(). Template(gomock.Eq(cfnstack.NameForEnv("mockApp", "mockEnv"))). Return("peace: und Liebe", nil) }, wanted: `~ peace: und Liebe -> and love `, }, "get the correct diff when there is no deployed diff": { inTemplate: `peace: and love`, setUpMocks: func(m *deployDiffMocks) { m.mockDeployedTmplGetter.EXPECT(). Template(gomock.Eq(cfnstack.NameForEnv("mockApp", "mockEnv"))). Return("", &cfnclient.ErrStackNotFound{}) }, wanted: `+ peace: and love `, }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { ctrl := gomock.NewController(t) defer ctrl.Finish() m := &deployDiffMocks{ mockDeployedTmplGetter: mocks.NewMockdeployedTemplateGetter(ctrl), } tc.setUpMocks(m) deployer := envDeployer{ app: &config.Application{ Name: "mockApp", }, env: &config.Environment{ Name: "mockEnv", }, tmplGetter: m.mockDeployedTmplGetter, } got, gotErr := deployer.DeployDiff(tc.inTemplate) if tc.checkErr != nil { tc.checkErr(t, gotErr) } else { require.NoError(t, gotErr) require.Equal(t, tc.wanted, got) } }) } } func TestEnvDeployer_AddonsTemplate(t *testing.T) { testCases := map[string]struct { setUpMocks func(m *envDeployerMocks) wanted string wantedError error }{ "error rendering addons template": { setUpMocks: func(m *envDeployerMocks) { m.parseAddons = func() (stackBuilder, error) { return m.addons, nil } m.addons.EXPECT().Template().Return("", errors.New("some error")) }, wantedError: errors.New("render addons template: some error"), }, "return empty string when no addons is found": { setUpMocks: func(m *envDeployerMocks) { m.parseAddons = func() (stackBuilder, error) { return nil, &addon.ErrAddonsNotFound{} } }, }, "return the addon template": { setUpMocks: func(m *envDeployerMocks) { m.parseAddons = func() (stackBuilder, error) { return m.addons, nil } m.addons.EXPECT().Template().Return("mockAddonsTemplate", nil) }, wanted: "mockAddonsTemplate", }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { ctrl := gomock.NewController(t) defer ctrl.Finish() m := &envDeployerMocks{ addons: mocks.NewMockstackBuilder(ctrl), } tc.setUpMocks(m) d := envDeployer{ parseAddons: m.parseAddons, } got, gotErr := d.AddonsTemplate() if tc.wantedError != nil { require.EqualError(t, gotErr, tc.wantedError.Error()) } else { require.NoError(t, gotErr) require.Equal(t, got, tc.wanted) } }) } } func TestEnvDeployer_GenerateCloudFormationTemplate(t *testing.T) { const ( mockEnvRegion = "us-west-2" mockAppName = "mockApp" mockEnvName = "mockEnv" ) mockError := errors.New("some error") mockApp := &config.Application{ Name: mockAppName, } testCases := map[string]struct { inManifest manifest.Environment setUpMocks func(m *envDeployerMocks, ctrl *gomock.Controller) wantedTemplate string wantedParams string wantedError error }{ "fail to get app resources by region": { setUpMocks: func(m *envDeployerMocks, _ *gomock.Controller) { m.appCFN.EXPECT().GetAppResourcesByRegion(gomock.Any(), gomock.Any()). Return(nil, mockError) }, wantedError: errors.New("get app resources in region us-west-2: some error"), }, "fail to get existing parameters": { setUpMocks: func(m *envDeployerMocks, _ *gomock.Controller) { m.appCFN.EXPECT().GetAppResourcesByRegion(gomock.Any(), gomock.Any()).Return(&cfnstack.AppRegionalResources{ S3Bucket: "mockS3Bucket", }, nil) m.parseAddons = func() (stackBuilder, error) { return nil, &addon.ErrAddonsNotFound{} } m.envDeployer.EXPECT().DeployedEnvironmentParameters(gomock.Any(), gomock.Any()).Return(nil, mockError) }, wantedError: errors.New("describe environment stack parameters: some error"), }, "fail to get existing force update ID": { setUpMocks: func(m *envDeployerMocks, _ *gomock.Controller) { m.appCFN.EXPECT().GetAppResourcesByRegion(gomock.Any(), gomock.Any()).Return(&cfnstack.AppRegionalResources{ S3Bucket: "mockS3Bucket", }, nil) m.parseAddons = func() (stackBuilder, error) { return nil, &addon.ErrAddonsNotFound{} } m.envDeployer.EXPECT().DeployedEnvironmentParameters(gomock.Any(), gomock.Any()).Return(nil, nil) m.envDeployer.EXPECT().ForceUpdateOutputID(gomock.Any(), gomock.Any()).Return("", mockError) }, wantedError: errors.New("retrieve environment stack force update ID: some error"), }, "fail to generate stack template": { setUpMocks: func(m *envDeployerMocks, _ *gomock.Controller) { m.appCFN.EXPECT().GetAppResourcesByRegion(gomock.Any(), gomock.Any()).Return(&cfnstack.AppRegionalResources{ S3Bucket: "mockS3Bucket", }, nil) m.parseAddons = func() (stackBuilder, error) { return nil, &addon.ErrAddonsNotFound{} } m.envDeployer.EXPECT().DeployedEnvironmentParameters(gomock.Any(), gomock.Any()).Return(nil, nil) m.envDeployer.EXPECT().ForceUpdateOutputID(gomock.Any(), gomock.Any()).Return("", nil) m.stackSerializer.EXPECT().Template().Return("", mockError) }, wantedError: errors.New("generate stack template: some error"), }, "fail to generate stack parameters": { setUpMocks: func(m *envDeployerMocks, _ *gomock.Controller) { m.appCFN.EXPECT().GetAppResourcesByRegion(gomock.Any(), gomock.Any()).Return(&cfnstack.AppRegionalResources{ S3Bucket: "mockS3Bucket", }, nil) m.parseAddons = func() (stackBuilder, error) { return nil, &addon.ErrAddonsNotFound{} } m.envDeployer.EXPECT().DeployedEnvironmentParameters(gomock.Any(), gomock.Any()).Return(nil, nil) m.envDeployer.EXPECT().ForceUpdateOutputID(gomock.Any(), gomock.Any()).Return("", nil) m.stackSerializer.EXPECT().Template().Return("", nil) m.stackSerializer.EXPECT().SerializedParameters().Return("", mockError) }, wantedError: errors.New("generate stack template parameters: some error"), }, "return an error when addons cannot be parsed due to unknown reasons": { setUpMocks: func(m *envDeployerMocks, _ *gomock.Controller) { m.appCFN.EXPECT().GetAppResourcesByRegion(mockApp, mockEnvRegion).Return(&cfnstack.AppRegionalResources{ S3Bucket: "mockS3Bucket", }, nil) m.parseAddons = func() (stackBuilder, error) { return nil, mockError } }, wantedError: errors.New("some error"), }, "return an error if the URL isn't provided and addons template cannot be retrieved": { setUpMocks: func(m *envDeployerMocks, ctrl *gomock.Controller) { m.appCFN.EXPECT().GetAppResourcesByRegion(mockApp, mockEnvRegion).Return(&cfnstack.AppRegionalResources{ S3Bucket: "mockS3Bucket", }, nil) m.parseAddons = func() (stackBuilder, error) { mockStack := mocks.NewMockstackBuilder(ctrl) mockStack.EXPECT().Template().Return("", mockError) return mockStack, nil } }, wantedError: errors.New("render addons template: some error"), }, "successfully return environment template without addons": { setUpMocks: func(m *envDeployerMocks, _ *gomock.Controller) { m.appCFN.EXPECT().GetAppResourcesByRegion(mockApp, mockEnvRegion).Return(&cfnstack.AppRegionalResources{ S3Bucket: "mockS3Bucket", }, nil) m.parseAddons = func() (stackBuilder, error) { return nil, &addon.ErrAddonsNotFound{} } m.envDeployer.EXPECT().DeployedEnvironmentParameters(mockAppName, mockEnvName).Return(nil, nil) m.envDeployer.EXPECT().ForceUpdateOutputID(gomock.Any(), gomock.Any()).Return("", nil) m.stackSerializer.EXPECT().Template().Return("aloo", nil) m.stackSerializer.EXPECT().SerializedParameters().Return("gobi", nil) }, wantedTemplate: "aloo", wantedParams: "gobi", }, "successfully return environment template with addons": { setUpMocks: func(m *envDeployerMocks, ctrl *gomock.Controller) { m.appCFN.EXPECT().GetAppResourcesByRegion(mockApp, mockEnvRegion).Return(&cfnstack.AppRegionalResources{ S3Bucket: "mockS3Bucket", }, nil) m.parseAddons = func() (stackBuilder, error) { mockStack := mocks.NewMockstackBuilder(ctrl) mockStack.EXPECT().Template().Return("template", nil) return mockStack, nil } m.envDeployer.EXPECT().DeployedEnvironmentParameters(mockAppName, mockEnvName).Return(nil, nil) m.envDeployer.EXPECT().ForceUpdateOutputID(gomock.Any(), gomock.Any()).Return("", nil) m.stackSerializer.EXPECT().Template().Return("aloo", nil) m.stackSerializer.EXPECT().SerializedParameters().Return("gobi", nil) }, wantedTemplate: "aloo", wantedParams: "gobi", }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { ctrl := gomock.NewController(t) defer ctrl.Finish() m := &envDeployerMocks{ appCFN: mocks.NewMockappResourcesGetter(ctrl), envDeployer: mocks.NewMockenvironmentDeployer(ctrl), stackSerializer: cfnmocks.NewMockStackConfiguration(ctrl), } tc.setUpMocks(m, ctrl) d := envDeployer{ app: mockApp, env: &config.Environment{ Name: mockEnvName, Region: mockEnvRegion, }, appCFN: m.appCFN, envDeployer: m.envDeployer, newStack: func(_ *cfnstack.EnvConfig, _ string, _ []*awscfn.Parameter) (cloudformation.StackConfiguration, error) { return m.stackSerializer, nil }, parseAddons: m.parseAddons, } actual, err := d.GenerateCloudFormationTemplate(&DeployEnvironmentInput{ Manifest: &tc.inManifest, }) if tc.wantedError != nil { require.EqualError(t, err, tc.wantedError.Error()) } else { require.NoError(t, err) require.Equal(t, tc.wantedTemplate, actual.Template) require.Equal(t, tc.wantedParams, actual.Parameters) } }) } } func TestEnvDeployer_DeployEnvironment(t *testing.T) { const ( mockManagerRoleARN = "mockManagerRoleARN" mockEnvRegion = "us-west-2" mockAppName = "mockApp" mockEnvName = "mockEnv" ) mockApp := &config.Application{ Name: mockAppName, } testCases := map[string]struct { setUpMocks func(m *envDeployerMocks) inManifest *manifest.Environment inDisableRollback bool wantedError error }{ "fail to get app resources by region": { setUpMocks: func(m *envDeployerMocks) { m.appCFN.EXPECT().GetAppResourcesByRegion(mockApp, mockEnvRegion). Return(nil, errors.New("some error")) }, wantedError: fmt.Errorf("get app resources in region %s: some error", mockEnvRegion), }, "fail to get prefix list id": { setUpMocks: func(m *envDeployerMocks) { m.appCFN.EXPECT().GetAppResourcesByRegion(mockApp, mockEnvRegion).Return(&cfnstack.AppRegionalResources{ S3Bucket: "mockS3Bucket", }, nil) m.prefixListGetter.EXPECT().CloudFrontManagedPrefixListID().Return("", errors.New("some error")) }, inManifest: &manifest.Environment{ EnvironmentConfig: manifest.EnvironmentConfig{ HTTPConfig: manifest.EnvironmentHTTPConfig{ Public: manifest.PublicHTTPConfig{ DeprecatedSG: manifest.DeprecatedALBSecurityGroupsConfig{ DeprecatedIngress: manifest.DeprecatedIngress{ RestrictiveIngress: manifest.RestrictiveIngress{ CDNIngress: aws.Bool(true), }, }, }, }, }, }, }, wantedError: fmt.Errorf("retrieve CloudFront managed prefix list id: some error"), }, "prefix list not retrieved when manifest not present": { setUpMocks: func(m *envDeployerMocks) { m.appCFN.EXPECT().GetAppResourcesByRegion(mockApp, mockEnvRegion).Return(&cfnstack.AppRegionalResources{ S3Bucket: "mockS3Bucket", }, nil) m.envDeployer.EXPECT().DeployedEnvironmentParameters(gomock.Any(), gomock.Any()).Return(nil, nil) m.envDeployer.EXPECT().ForceUpdateOutputID(gomock.Any(), gomock.Any()).Return("", nil) m.prefixListGetter.EXPECT().CloudFrontManagedPrefixListID().Return("mockPrefixListID", nil).Times(0) m.parseAddons = func() (stackBuilder, error) { return nil, &addon.ErrAddonsNotFound{} } m.envDeployer.EXPECT().UpdateAndRenderEnvironment(gomock.Any(), gomock.Any(), gomock.Any()).Return(nil) }, inManifest: nil, }, "fail to get existing parameters": { setUpMocks: func(m *envDeployerMocks) { m.appCFN.EXPECT().GetAppResourcesByRegion(gomock.Any(), gomock.Any()).Return(&cfnstack.AppRegionalResources{ S3Bucket: "mockS3Bucket", }, nil) m.parseAddons = func() (stackBuilder, error) { return nil, &addon.ErrAddonsNotFound{} } m.envDeployer.EXPECT().DeployedEnvironmentParameters(gomock.Any(), gomock.Any()).Return(nil, errors.New("some error")) }, wantedError: errors.New("describe environment stack parameters: some error"), }, "fail to get existing force update ID": { setUpMocks: func(m *envDeployerMocks) { m.appCFN.EXPECT().GetAppResourcesByRegion(gomock.Any(), gomock.Any()).Return(&cfnstack.AppRegionalResources{ S3Bucket: "mockS3Bucket", }, nil) m.parseAddons = func() (stackBuilder, error) { return nil, &addon.ErrAddonsNotFound{} } m.envDeployer.EXPECT().DeployedEnvironmentParameters(gomock.Any(), gomock.Any()).Return(nil, nil) m.envDeployer.EXPECT().ForceUpdateOutputID(gomock.Any(), gomock.Any()).Return("", errors.New("some error")) }, wantedError: errors.New("retrieve environment stack force update ID: some error"), }, "fail to deploy environment": { setUpMocks: func(m *envDeployerMocks) { m.appCFN.EXPECT().GetAppResourcesByRegion(mockApp, mockEnvRegion).Return(&cfnstack.AppRegionalResources{ S3Bucket: "mockS3Bucket", }, nil) m.prefixListGetter.EXPECT().CloudFrontManagedPrefixListID().Return("mockPrefixListID", nil).Times(0) m.parseAddons = func() (stackBuilder, error) { return nil, &addon.ErrAddonsNotFound{} } m.envDeployer.EXPECT().DeployedEnvironmentParameters(gomock.Any(), gomock.Any()).Return(nil, nil) m.envDeployer.EXPECT().ForceUpdateOutputID(gomock.Any(), gomock.Any()).Return("", nil) m.envDeployer.EXPECT().UpdateAndRenderEnvironment(gomock.Any(), gomock.Any(), gomock.Any()).Return(errors.New("some error")) }, wantedError: errors.New("some error"), }, "successful environment deployment": { setUpMocks: func(m *envDeployerMocks) { m.appCFN.EXPECT().GetAppResourcesByRegion(mockApp, mockEnvRegion).Return(&cfnstack.AppRegionalResources{ S3Bucket: "mockS3Bucket", }, nil) m.prefixListGetter.EXPECT().CloudFrontManagedPrefixListID().Return("mockPrefixListID", nil).Times(0) m.parseAddons = func() (stackBuilder, error) { return nil, &addon.ErrAddonsNotFound{} } m.envDeployer.EXPECT().DeployedEnvironmentParameters(gomock.Any(), gomock.Any()).Return(nil, nil) m.envDeployer.EXPECT().ForceUpdateOutputID(gomock.Any(), gomock.Any()).Return("", nil) m.envDeployer.EXPECT().UpdateAndRenderEnvironment(gomock.Any(), gomock.Any(), gomock.Any()).Return(nil) }, }, "successful environment deployment, no rollback": { inDisableRollback: true, setUpMocks: func(m *envDeployerMocks) { m.appCFN.EXPECT().GetAppResourcesByRegion(mockApp, mockEnvRegion).Return(&cfnstack.AppRegionalResources{ S3Bucket: "mockS3Bucket", }, nil) m.prefixListGetter.EXPECT().CloudFrontManagedPrefixListID().Return("mockPrefixListID", nil).Times(0) m.parseAddons = func() (stackBuilder, error) { return nil, &addon.ErrAddonsNotFound{} } m.envDeployer.EXPECT().DeployedEnvironmentParameters(gomock.Any(), gomock.Any()).Return(nil, nil) m.envDeployer.EXPECT().ForceUpdateOutputID(gomock.Any(), gomock.Any()).Return("", nil) m.envDeployer.EXPECT().UpdateAndRenderEnvironment(gomock.Any(), gomock.Any(), gomock.Len(2)).Return(nil) }, }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { ctrl := gomock.NewController(t) defer ctrl.Finish() m := &envDeployerMocks{ appCFN: mocks.NewMockappResourcesGetter(ctrl), envDeployer: mocks.NewMockenvironmentDeployer(ctrl), prefixListGetter: mocks.NewMockprefixListGetter(ctrl), stackSerializer: cfnmocks.NewMockStackConfiguration(ctrl), } tc.setUpMocks(m) d := envDeployer{ app: mockApp, env: &config.Environment{ Name: mockEnvName, ManagerRoleARN: mockManagerRoleARN, Region: mockEnvRegion, }, appCFN: m.appCFN, envDeployer: m.envDeployer, prefixListGetter: m.prefixListGetter, parseAddons: m.parseAddons, newStack: func(_ *cfnstack.EnvConfig, _ string, _ []*awscfn.Parameter) (cloudformation.StackConfiguration, error) { return m.stackSerializer, nil }, } mockIn := &DeployEnvironmentInput{ RootUserARN: "mockRootUserARN", CustomResourcesURLs: map[string]string{ "mockResource": "mockURL", }, Manifest: tc.inManifest, DisableRollback: tc.inDisableRollback, } gotErr := d.DeployEnvironment(mockIn) if tc.wantedError != nil { require.EqualError(t, gotErr, tc.wantedError.Error()) } else { require.NoError(t, gotErr) } }) } } func TestEnvDeployer_Validate(t *testing.T) { listenerRuleNoRedirect := elbv2.Rule{ Actions: []*awselb.Action{ { Type: aws.String(awselb.ActionTypeEnumForward), }, }, } listenerRuleWithRedirect := elbv2.Rule{ Actions: []*awselb.Action{ { Type: aws.String(awselb.ActionTypeEnumRedirect), }, }, } mftCDNTerminateTLSAndHTTPCert := &manifest.Environment{ EnvironmentConfig: manifest.EnvironmentConfig{ HTTPConfig: manifest.EnvironmentHTTPConfig{ Public: manifest.PublicHTTPConfig{ Certificates: []string{"mockCertARN"}, }, }, CDNConfig: manifest.EnvironmentCDNConfig{ Config: manifest.AdvancedCDNConfig{ TerminateTLS: aws.Bool(true), }, }, }, } mftCDNTerminateTLS := &manifest.Environment{ EnvironmentConfig: manifest.EnvironmentConfig{ CDNConfig: manifest.EnvironmentCDNConfig{ Config: manifest.AdvancedCDNConfig{ Certificate: aws.String("mockCDNCertARN"), TerminateTLS: aws.Bool(true), }, }, }, } tests := map[string]struct { app *config.Application mft *manifest.Environment setUpMocks func(*envDeployerMocks, *gomock.Controller) expected string expectedStdErr string }{ "cdn enabled, domain imported, no public http certs, and validate aliases fails": { app: &config.Application{ Domain: "example.com", }, mft: &manifest.Environment{ EnvironmentConfig: manifest.EnvironmentConfig{ CDNConfig: manifest.EnvironmentCDNConfig{ Enabled: aws.Bool(true), }, }, }, setUpMocks: func(m *envDeployerMocks, ctrl *gomock.Controller) { m.envDescriber.EXPECT().ValidateCFServiceDomainAliases().Return(errors.New("some error")) }, expected: "some error", }, "cdn enabled, domain imported, no public http certs, and validate aliases succeeds": { app: &config.Application{ Domain: "example.com", }, mft: &manifest.Environment{ EnvironmentConfig: manifest.EnvironmentConfig{ CDNConfig: manifest.EnvironmentCDNConfig{ Enabled: aws.Bool(true), }, }, }, setUpMocks: func(m *envDeployerMocks, ctrl *gomock.Controller) { m.envDescriber.EXPECT().ValidateCFServiceDomainAliases().Return(nil) }, }, "cdn tls termination enabled, fail to get env stack params": { app: &config.Application{}, mft: mftCDNTerminateTLSAndHTTPCert, setUpMocks: func(m *envDeployerMocks, ctrl *gomock.Controller) { m.envDescriber.EXPECT().Params().Return(nil, errors.New("some error")) }, expected: "enable TLS termination on CDN: get env params: some error", }, "cdn tls termination enabled, skip if no services deployed": { app: &config.Application{}, mft: mftCDNTerminateTLSAndHTTPCert, setUpMocks: func(m *envDeployerMocks, ctrl *gomock.Controller) { m.stackDescribers = map[string]*mocks.MockstackDescriber{ "svc1": mocks.NewMockstackDescriber(ctrl), } m.envDescriber.EXPECT().Params().Return(map[string]string{}, nil) }, }, "cdn tls termination enabled, fail to get service resources": { app: &config.Application{}, mft: mftCDNTerminateTLSAndHTTPCert, setUpMocks: func(m *envDeployerMocks, ctrl *gomock.Controller) { m.stackDescribers = map[string]*mocks.MockstackDescriber{ "svc1": mocks.NewMockstackDescriber(ctrl), } m.envDescriber.EXPECT().Params().Return(map[string]string{ "ALBWorkloads": "svc1", }, nil) m.stackDescribers["svc1"].EXPECT().Resources().Return(nil, errors.New("some error")) }, expected: `enable TLS termination on CDN: verify service "svc1": get stack resources: some error`, }, "cdn tls termination enabled, fail to check listener rule": { app: &config.Application{}, mft: mftCDNTerminateTLSAndHTTPCert, setUpMocks: func(m *envDeployerMocks, ctrl *gomock.Controller) { m.stackDescribers = map[string]*mocks.MockstackDescriber{ "svc1": mocks.NewMockstackDescriber(ctrl), } m.envDescriber.EXPECT().Params().Return(map[string]string{ "ALBWorkloads": "svc1", }, nil) m.stackDescribers["svc1"].EXPECT().Resources().Return([]*stack.Resource{ { LogicalID: "HTTPListenerRuleWithDomain", PhysicalID: "svc1RuleARN", }, }, nil) m.lbDescriber.EXPECT().DescribeRule(gomock.Any(), "svc1RuleARN").Return(elbv2.Rule{}, errors.New("some error")) }, expected: `enable TLS termination on CDN: verify service "svc1": describe listener rule "svc1RuleARN": some error`, }, "cdn tls termination enabled, warn with one service that doesn't redirect, two that do redirect": { app: &config.Application{}, mft: mftCDNTerminateTLSAndHTTPCert, setUpMocks: func(m *envDeployerMocks, ctrl *gomock.Controller) { m.stackDescribers = map[string]*mocks.MockstackDescriber{ "svc1": mocks.NewMockstackDescriber(ctrl), "svc2": mocks.NewMockstackDescriber(ctrl), "svc3": mocks.NewMockstackDescriber(ctrl), } m.envDescriber.EXPECT().Params().Return(map[string]string{ "ALBWorkloads": "svc1,svc2,svc3", }, nil) m.stackDescribers["svc1"].EXPECT().Resources().Return([]*stack.Resource{ { LogicalID: "HTTPListenerRuleWithDomain", PhysicalID: "svc1RuleARN", }, }, nil) m.stackDescribers["svc2"].EXPECT().Resources().Return([]*stack.Resource{ { LogicalID: "HTTPListenerRuleWithDomain", PhysicalID: "svc2RuleARN", }, }, nil) m.stackDescribers["svc3"].EXPECT().Resources().Return([]*stack.Resource{ { LogicalID: "HTTPListenerRuleWithDomain", PhysicalID: "svc3RuleARN", }, }, nil) m.lbDescriber.EXPECT().DescribeRule(gomock.Any(), "svc1RuleARN").Return(listenerRuleWithRedirect, nil) m.lbDescriber.EXPECT().DescribeRule(gomock.Any(), "svc2RuleARN").Return(listenerRuleNoRedirect, nil) m.lbDescriber.EXPECT().DescribeRule(gomock.Any(), "svc3RuleARN").Return(listenerRuleWithRedirect, nil) }, expectedStdErr: fmt.Sprintf(`Note: Services "svc1" and "svc3" redirect HTTP traffic to HTTPS. These services will not be reachable through the CDN. To fix this, set the following field in each manifest: %s http: redirect_to_https: false %s and run %scopilot svc deploy%s. If you'd like to use these services without a CDN, ensure each service's A record is pointed to the ALB. `, "```", "```", "`", "`"), // ugh }, "cdn tls termination enabled, warn with one service that doesn't redirect, two that do redirect, alb ingress restricted to cdn": { app: &config.Application{}, mft: &manifest.Environment{ EnvironmentConfig: manifest.EnvironmentConfig{ HTTPConfig: manifest.EnvironmentHTTPConfig{ Public: manifest.PublicHTTPConfig{ Certificates: []string{"mockCertARN"}, DeprecatedSG: manifest.DeprecatedALBSecurityGroupsConfig{ DeprecatedIngress: manifest.DeprecatedIngress{ RestrictiveIngress: manifest.RestrictiveIngress{ CDNIngress: aws.Bool(true), }, }, }, }, }, CDNConfig: manifest.EnvironmentCDNConfig{ Config: manifest.AdvancedCDNConfig{ TerminateTLS: aws.Bool(true), }, }, }, }, setUpMocks: func(m *envDeployerMocks, ctrl *gomock.Controller) { m.stackDescribers = map[string]*mocks.MockstackDescriber{ "svc1": mocks.NewMockstackDescriber(ctrl), "svc2": mocks.NewMockstackDescriber(ctrl), "svc3": mocks.NewMockstackDescriber(ctrl), } m.envDescriber.EXPECT().Params().Return(map[string]string{ "ALBWorkloads": "svc1,svc2,svc3", }, nil) m.stackDescribers["svc1"].EXPECT().Resources().Return([]*stack.Resource{ { LogicalID: "HTTPListenerRuleWithDomain", PhysicalID: "svc1RuleARN", }, }, nil) m.stackDescribers["svc2"].EXPECT().Resources().Return([]*stack.Resource{ { LogicalID: "HTTPListenerRuleWithDomain", PhysicalID: "svc2RuleARN", }, }, nil) m.stackDescribers["svc3"].EXPECT().Resources().Return([]*stack.Resource{ { LogicalID: "HTTPListenerRuleWithDomain", PhysicalID: "svc3RuleARN", }, }, nil) m.lbDescriber.EXPECT().DescribeRule(gomock.Any(), "svc1RuleARN").Return(listenerRuleWithRedirect, nil) m.lbDescriber.EXPECT().DescribeRule(gomock.Any(), "svc2RuleARN").Return(listenerRuleNoRedirect, nil) m.lbDescriber.EXPECT().DescribeRule(gomock.Any(), "svc3RuleARN").Return(listenerRuleWithRedirect, nil) }, expected: "2 services redirect HTTP to HTTPS", }, "cdn tls termination enabled, success with three services that don't redirect": { app: &config.Application{}, mft: mftCDNTerminateTLSAndHTTPCert, setUpMocks: func(m *envDeployerMocks, ctrl *gomock.Controller) { m.stackDescribers = map[string]*mocks.MockstackDescriber{ "svc1": mocks.NewMockstackDescriber(ctrl), "svc2": mocks.NewMockstackDescriber(ctrl), "svc3": mocks.NewMockstackDescriber(ctrl), } m.envDescriber.EXPECT().Params().Return(map[string]string{ "ALBWorkloads": "svc1,svc2,svc3", }, nil) m.stackDescribers["svc1"].EXPECT().Resources().Return([]*stack.Resource{ { LogicalID: "HTTPListenerRuleWithDomain", PhysicalID: "svc1RuleARN", }, }, nil) m.stackDescribers["svc2"].EXPECT().Resources().Return([]*stack.Resource{ { LogicalID: "HTTPListenerRuleWithDomain", PhysicalID: "svc2RuleARN", }, }, nil) m.stackDescribers["svc3"].EXPECT().Resources().Return([]*stack.Resource{ { LogicalID: "HTTPListenerRuleWithDomain", PhysicalID: "svc3RuleARN", }, }, nil) m.lbDescriber.EXPECT().DescribeRule(gomock.Any(), "svc1RuleARN").Return(listenerRuleNoRedirect, nil) m.lbDescriber.EXPECT().DescribeRule(gomock.Any(), "svc2RuleARN").Return(listenerRuleNoRedirect, nil) m.lbDescriber.EXPECT().DescribeRule(gomock.Any(), "svc3RuleARN").Return(listenerRuleNoRedirect, nil) }, }, "cdn tls termination enabled, one http only service deployed": { app: &config.Application{}, mft: mftCDNTerminateTLS, setUpMocks: func(m *envDeployerMocks, ctrl *gomock.Controller) { m.stackDescribers = map[string]*mocks.MockstackDescriber{ "svc1": mocks.NewMockstackDescriber(ctrl), } m.envDescriber.EXPECT().Params().Return(map[string]string{ "ALBWorkloads": "svc1", }, nil) m.stackDescribers["svc1"].EXPECT().Resources().Return([]*stack.Resource{ { LogicalID: "HTTPListenerRuleWithDomain", PhysicalID: "svc1RuleARN", }, }, nil) m.lbDescriber.EXPECT().DescribeRule(gomock.Any(), "svc1RuleARN").Return(listenerRuleNoRedirect, nil) }, }, } for name, tc := range tests { t.Run(name, func(t *testing.T) { ctrl := gomock.NewController(t) defer ctrl.Finish() m := &envDeployerMocks{ envDescriber: mocks.NewMockenvDescriber(ctrl), lbDescriber: mocks.NewMocklbDescriber(ctrl), } if tc.setUpMocks != nil { tc.setUpMocks(m, ctrl) } d := &envDeployer{ app: tc.app, env: &config.Environment{ Name: aws.StringValue(tc.mft.Name), }, envDescriber: m.envDescriber, lbDescriber: m.lbDescriber, newServiceStackDescriber: func(svc string) stackDescriber { return m.stackDescribers[svc] }, } buf := &bytes.Buffer{} log.DiagnosticWriter = buf err := d.Validate(tc.mft) if tc.expected != "" { require.EqualError(t, err, tc.expected) } else { require.NoError(t, err) } if tc.expectedStdErr != "" { require.Equal(t, tc.expectedStdErr, buf.String()) } }) } }
1,064
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package deploy import ( "fmt" "strconv" "strings" "github.com/aws/copilot-cli/internal/pkg/term/color" "github.com/dustin/go-humanize/english" ) type errSvcWithNoALBAliasDeployingToEnvWithImportedCerts struct { name string envName string } func (e *errSvcWithNoALBAliasDeployingToEnvWithImportedCerts) Error() string { return fmt.Sprintf(`cannot deploy service %s without "alias" to environment %s with certificate imported`, e.name, e.envName) } type errSvcWithALBAliasHostedZoneWithCDNEnabled struct { envName string } func (e *errSvcWithALBAliasHostedZoneWithCDNEnabled) Error() string { return fmt.Sprintf("cannot specify alias hosted zones when cdn is enabled in environment %q", e.envName) } // RecommendActions returns recommended actions to be taken after the error. // Implements main.actionRecommender interface. func (e *errSvcWithALBAliasHostedZoneWithCDNEnabled) RecommendActions() string { msgs := []string{ "If you already have a Load Balanced Web Service deployed, you can switch to CDN by:", " 1. Updating the A-record value to be the CDN distribution domain name.", fmt.Sprintf(" 2. Removing the %s setting from the service manifest.", color.HighlightCode(`"http.alias.hosted_zone"`)), fmt.Sprintf(" 3. Redeploying the service via %s.", color.HighlightCode("copilot svc deploy")), } return strings.Join(msgs, "\n") } type errEnvHasPublicServicesWithRedirect struct { services []string } func (e *errEnvHasPublicServicesWithRedirect) Error() string { return fmt.Sprintf("%v %s HTTP to HTTPS", len(e.services), english.PluralWord(len(e.services), "service redirects", "services redirect"), ) } // RecommendActions returns recommended actions to be taken after the error. // Implements main.actionRecommender interface. func (e *errEnvHasPublicServicesWithRedirect) RecommendActions() string { n := len(e.services) quoted := make([]string, len(e.services)) for i := range e.services { quoted[i] = strconv.Quote(e.services[i]) } return fmt.Sprintf(`%s %s %s HTTP traffic to HTTPS. %s To fix this, set the following field in %s manifest: %s and run %s.`, english.PluralWord(n, "Service", "Services"), english.OxfordWordSeries(quoted, "and"), english.PluralWord(n, "redirects", "redirect"), color.Emphasize(english.PluralWord(n, "This service", "These services")+" will not be reachable through the CDN."), english.PluralWord(n, "its", "each"), color.HighlightCodeBlock("http:\n redirect_to_https: false"), color.HighlightCode("copilot svc deploy"), ) } func (e *errEnvHasPublicServicesWithRedirect) warning() string { return fmt.Sprintf(`%s If you'd like to use %s without a CDN, ensure %s A record is pointed to the ALB.`, e.RecommendActions(), english.PluralWord(len(e.services), "this service", "these services"), english.PluralWord(len(e.services), "its", "each service's"), ) }
87
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package deploy import ( "fmt" awscloudformation "github.com/aws/copilot-cli/internal/pkg/aws/cloudformation" awsecs "github.com/aws/copilot-cli/internal/pkg/aws/ecs" "github.com/aws/copilot-cli/internal/pkg/aws/partitions" "github.com/aws/copilot-cli/internal/pkg/deploy/cloudformation" "github.com/aws/copilot-cli/internal/pkg/deploy/cloudformation/stack" "github.com/aws/copilot-cli/internal/pkg/deploy/upload/customresource" "github.com/aws/copilot-cli/internal/pkg/manifest" "github.com/aws/copilot-cli/internal/pkg/manifest/manifestinfo" "github.com/aws/copilot-cli/internal/pkg/template" ) type jobDeployer struct { *workloadDeployer jobMft *manifest.ScheduledJob // Overriden in tests. newStack func() cloudformation.StackConfiguration } // IsServiceAvailableInRegion checks if service type exist in the given region. func (jobDeployer) IsServiceAvailableInRegion(region string) (bool, error) { return partitions.IsAvailableInRegion(awsecs.EndpointsID, region) } // NewJobDeployer is the constructor for jobDeployer. func NewJobDeployer(in *WorkloadDeployerInput) (*jobDeployer, error) { in.customResources = scheduledJobCustomResources wkldDeployer, err := newWorkloadDeployer(in) if err != nil { return nil, err } jobMft, ok := in.Mft.(*manifest.ScheduledJob) if !ok { return nil, fmt.Errorf("manifest is not of type %s", manifestinfo.ScheduledJobType) } return &jobDeployer{ workloadDeployer: wkldDeployer, jobMft: jobMft, }, nil } func scheduledJobCustomResources(fs template.Reader) ([]*customresource.CustomResource, error) { crs, err := customresource.ScheduledJob(fs) if err != nil { return nil, fmt.Errorf("read custom resources for a %q: %w", manifestinfo.ScheduledJobType, err) } return crs, nil } // UploadArtifacts uploads the deployment artifacts such as the container image, custom resources, addons and env files. func (d *jobDeployer) UploadArtifacts() (*UploadArtifactsOutput, error) { return d.uploadArtifacts(d.uploadContainerImages, d.uploadArtifactsToS3, d.uploadCustomResources) } // GenerateCloudFormationTemplate generates a CloudFormation template and parameters for a workload. func (d *jobDeployer) GenerateCloudFormationTemplate(in *GenerateCloudFormationTemplateInput) ( *GenerateCloudFormationTemplateOutput, error) { output, err := d.stackConfiguration(&in.StackRuntimeConfiguration) if err != nil { return nil, err } return d.generateCloudFormationTemplate(output.conf) } // DeployWorkload deploys a job using CloudFormation. func (d *jobDeployer) DeployWorkload(in *DeployWorkloadInput) (ActionRecommender, error) { opts := []awscloudformation.StackOption{ awscloudformation.WithRoleARN(d.env.ExecutionRoleARN), } if in.DisableRollback { opts = append(opts, awscloudformation.WithDisableRollback()) } stackConfigOutput, err := d.stackConfiguration(&in.StackRuntimeConfiguration) if err != nil { return nil, err } if err := d.deployer.DeployService(stackConfigOutput.conf, d.resources.S3Bucket, opts...); err != nil { return nil, fmt.Errorf("deploy job: %w", err) } return noopActionRecommender{}, nil } type jobStackConfigurationOutput struct { conf cloudformation.StackConfiguration } func (d *jobDeployer) stackConfiguration(in *StackRuntimeConfiguration) (*jobStackConfigurationOutput, error) { rc, err := d.runtimeConfig(in) if err != nil { return nil, err } var conf cloudformation.StackConfiguration switch { case d.newStack != nil: conf = d.newStack() default: conf, err = stack.NewScheduledJob(stack.ScheduledJobConfig{ App: d.app, Env: d.env.Name, Manifest: d.jobMft, RawManifest: d.rawMft, ArtifactBucketName: d.resources.S3Bucket, RuntimeConfig: *rc, Addons: d.addons, }) if err != nil { return nil, fmt.Errorf("create stack configuration: %w", err) } } return &jobStackConfigurationOutput{ conf: cloudformation.WrapWithTemplateOverrider(conf, d.overrider), }, nil }
124
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package deploy import ( "testing" "github.com/aws/copilot-cli/internal/pkg/deploy/cloudformation" "github.com/aws/copilot-cli/internal/pkg/deploy/cloudformation/stack" "github.com/stretchr/testify/require" "gopkg.in/yaml.v3" "github.com/aws/aws-sdk-go/aws" "github.com/aws/copilot-cli/internal/pkg/config" "github.com/aws/copilot-cli/internal/pkg/manifest" "github.com/aws/copilot-cli/internal/pkg/override" ) func TestJobDeployer_GenerateCloudFormationTemplate(t *testing.T) { t.Run("ensure resulting CloudFormation template custom resource paths are empty", func(t *testing.T) { // GIVEN job := mockJobDeployer() // WHEN out, err := job.GenerateCloudFormationTemplate(&GenerateCloudFormationTemplateInput{}) // THEN require.NoError(t, err) type lambdaFn struct { Properties struct { Code struct { S3Bucket string `yaml:"S3bucket"` S3Key string `yaml:"S3Key"` } `yaml:"Code"` } `yaml:"Properties"` } dat := struct { Resources struct { EnvControllerFunction lambdaFn `yaml:"EnvControllerFunction"` } `yaml:"Resources"` }{} require.NoError(t, yaml.Unmarshal([]byte(out.Template), &dat)) require.Empty(t, dat.Resources.EnvControllerFunction.Properties.Code.S3Bucket) require.Empty(t, dat.Resources.EnvControllerFunction.Properties.Code.S3Key) }) } func mockJobDeployer(opts ...func(*jobDeployer)) *jobDeployer { deployer := &jobDeployer{ workloadDeployer: &workloadDeployer{ name: "example", app: &config.Application{ Name: "demo", }, env: &config.Environment{ App: "demo", Name: "test", }, resources: &stack.AppRegionalResources{}, envConfig: new(manifest.Environment), endpointGetter: &mockEndpointGetter{endpoint: "demo.test.local"}, envVersionGetter: &mockEnvVersionGetter{version: "v1.0.0"}, overrider: new(override.Noop), }, jobMft: &manifest.ScheduledJob{ Workload: manifest.Workload{ Name: aws.String("example"), }, ScheduledJobConfig: manifest.ScheduledJobConfig{ TaskConfig: manifest.TaskConfig{ Count: manifest.Count{ Value: aws.Int(1), }, }, On: manifest.JobTriggerConfig{ Schedule: aws.String("@daily"), }, ImageConfig: manifest.ImageWithHealthcheck{ Image: manifest.Image{ ImageLocationOrBuild: manifest.ImageLocationOrBuild{ Build: manifest.BuildArgsOrString{BuildString: aws.String("/Dockerfile")}, }, }, }, }, }, newStack: func() cloudformation.StackConfiguration { return new(stubCloudFormationStack) }, } for _, opt := range opts { opt(deployer) } return deployer }
100
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package deploy import ( "fmt" "github.com/aws/aws-sdk-go/aws" "github.com/aws/aws-sdk-go/aws/session" "github.com/aws/copilot-cli/internal/pkg/aws/acm" "github.com/aws/copilot-cli/internal/pkg/aws/cloudfront" awsecs "github.com/aws/copilot-cli/internal/pkg/aws/ecs" "github.com/aws/copilot-cli/internal/pkg/aws/partitions" "github.com/aws/copilot-cli/internal/pkg/config" "github.com/aws/copilot-cli/internal/pkg/deploy" "github.com/aws/copilot-cli/internal/pkg/deploy/cloudformation" "github.com/aws/copilot-cli/internal/pkg/deploy/cloudformation/stack" "github.com/aws/copilot-cli/internal/pkg/deploy/upload/customresource" "github.com/aws/copilot-cli/internal/pkg/describe" "github.com/aws/copilot-cli/internal/pkg/ecs" "github.com/aws/copilot-cli/internal/pkg/manifest" "github.com/aws/copilot-cli/internal/pkg/manifest/manifestinfo" "github.com/aws/copilot-cli/internal/pkg/template" "github.com/aws/copilot-cli/internal/pkg/term/color" "github.com/aws/copilot-cli/internal/pkg/term/log" "github.com/aws/copilot-cli/internal/pkg/version" ) var ( ecsALBAliasUsedWithoutDomainFriendlyText = fmt.Sprintf(`To use %s, your application must be: * Associated with a domain: %s * Or, using imported certificates to your environment: %s `, color.HighlightCode("http.alias"), color.HighlightCode("copilot app init --domain example.com"), color.HighlightCode("copilot env init --import-cert-arns arn:aws:acm:us-east-1:123456789012:certificate/12345678-1234-1234-1234-123456789012")) ecsNLBAliasUsedWithoutDomainFriendlyText = fmt.Sprintf("To use %s, your application must be associated with a domain: %s", color.HighlightCode("nlb.alias"), color.HighlightCode("copilot app init --domain example.com")) ) type publicCIDRBlocksGetter interface { PublicCIDRBlocks() ([]string, error) } type lbWebSvcDeployer struct { *svcDeployer appVersionGetter versionGetter publicCIDRBlocksGetter publicCIDRBlocksGetter lbMft *manifest.LoadBalancedWebService // Overriden in tests. newAliasCertValidator func(optionalRegion *string) aliasCertValidator newStack func() cloudformation.StackConfiguration } // NewLBWSDeployer is the constructor for lbWebSvcDeployer. func NewLBWSDeployer(in *WorkloadDeployerInput) (*lbWebSvcDeployer, error) { in.customResources = lbwsCustomResources svcDeployer, err := newSvcDeployer(in) if err != nil { return nil, err } versionGetter, err := describe.NewAppDescriber(in.App.Name) if err != nil { return nil, fmt.Errorf("new app describer for application %s: %w", in.App.Name, err) } deployStore, err := deploy.NewStore(in.SessionProvider, svcDeployer.store) if err != nil { return nil, fmt.Errorf("new deploy store: %w", err) } envDescriber, err := describe.NewEnvDescriber(describe.NewEnvDescriberConfig{ App: in.App.Name, Env: in.Env.Name, ConfigStore: svcDeployer.store, DeployStore: deployStore, }) if err != nil { return nil, fmt.Errorf("create describer for environment %s in application %s: %w", in.Env.Name, in.App.Name, err) } lbMft, ok := in.Mft.(*manifest.LoadBalancedWebService) if !ok { return nil, fmt.Errorf("manifest is not of type %s", manifestinfo.LoadBalancedWebServiceType) } return &lbWebSvcDeployer{ svcDeployer: svcDeployer, appVersionGetter: versionGetter, publicCIDRBlocksGetter: envDescriber, lbMft: lbMft, newAliasCertValidator: func(optionalRegion *string) aliasCertValidator { sess := svcDeployer.envSess.Copy(&aws.Config{ Region: optionalRegion, }) return acm.New(sess) }, }, nil } func lbwsCustomResources(fs template.Reader) ([]*customresource.CustomResource, error) { crs, err := customresource.LBWS(fs) if err != nil { return nil, fmt.Errorf("read custom resources for a %q: %w", manifestinfo.LoadBalancedWebServiceType, err) } return crs, nil } // IsServiceAvailableInRegion checks if service type exist in the given region. func (lbWebSvcDeployer) IsServiceAvailableInRegion(region string) (bool, error) { return partitions.IsAvailableInRegion(awsecs.EndpointsID, region) } // UploadArtifacts uploads the deployment artifacts such as the container image, custom resources, addons and env files. func (d *lbWebSvcDeployer) UploadArtifacts() (*UploadArtifactsOutput, error) { return d.uploadArtifacts(d.uploadContainerImages, d.uploadArtifactsToS3, d.uploadCustomResources) } // GenerateCloudFormationTemplate generates a CloudFormation template and parameters for a workload. func (d *lbWebSvcDeployer) GenerateCloudFormationTemplate(in *GenerateCloudFormationTemplateInput) ( *GenerateCloudFormationTemplateOutput, error) { output, err := d.stackConfiguration(&in.StackRuntimeConfiguration) if err != nil { return nil, err } return d.generateCloudFormationTemplate(output.conf) } // DeployWorkload deploys a load balanced web service using CloudFormation. func (d *lbWebSvcDeployer) DeployWorkload(in *DeployWorkloadInput) (ActionRecommender, error) { stackConfigOutput, err := d.stackConfiguration(&in.StackRuntimeConfiguration) if err != nil { return nil, err } if err := d.deploy(in.Options, *stackConfigOutput); err != nil { return nil, err } return noopActionRecommender{}, nil } func (d *lbWebSvcDeployer) stackConfiguration(in *StackRuntimeConfiguration) (*svcStackConfigurationOutput, error) { rc, err := d.runtimeConfig(in) if err != nil { return nil, err } if err := d.validateALBRuntime(); err != nil { return nil, err } if err := d.validateNLBRuntime(); err != nil { return nil, err } var opts []stack.LoadBalancedWebServiceOption if !d.lbMft.NLBConfig.IsEmpty() { cidrBlocks, err := d.publicCIDRBlocksGetter.PublicCIDRBlocks() if err != nil { return nil, fmt.Errorf("get public CIDR blocks information from the VPC of environment %s: %w", d.env.Name, err) } opts = append(opts, stack.WithNLB(cidrBlocks)) } var conf cloudformation.StackConfiguration switch { case d.newStack != nil: conf = d.newStack() default: conf, err = stack.NewLoadBalancedWebService(stack.LoadBalancedWebServiceConfig{ App: d.app, EnvManifest: d.envConfig, Manifest: d.lbMft, RawManifest: d.rawMft, ArtifactBucketName: d.resources.S3Bucket, RuntimeConfig: *rc, RootUserARN: in.RootUserARN, Addons: d.addons, }, opts...) if err != nil { return nil, fmt.Errorf("create stack configuration: %w", err) } } return &svcStackConfigurationOutput{ conf: cloudformation.WrapWithTemplateOverrider(conf, d.overrider), svcUpdater: d.newSvcUpdater(func(s *session.Session) serviceForceUpdater { return ecs.New(s) }), }, nil } func (d *lbWebSvcDeployer) validateALBRuntime() error { if err := d.validateRuntimeRoutingRule(d.lbMft.HTTPOrBool.Main); err != nil { return fmt.Errorf(`validate ALB runtime configuration for "http": %w`, err) } for idx, rule := range d.lbMft.HTTPOrBool.AdditionalRoutingRules { if err := d.validateRuntimeRoutingRule(rule); err != nil { return fmt.Errorf(`validate ALB runtime configuration for "http.additional_rule[%d]": %w`, idx, err) } } return nil } func (d *lbWebSvcDeployer) validateRuntimeRoutingRule(rule manifest.RoutingRule) error { hasALBCerts := len(d.envConfig.HTTPConfig.Public.Certificates) != 0 hasCDNCerts := d.envConfig.CDNConfig.Config.Certificate != nil hasImportedCerts := hasALBCerts || hasCDNCerts if rule.RedirectToHTTPS != nil && d.app.Domain == "" && !hasImportedCerts { return fmt.Errorf("cannot configure http to https redirect without having a domain associated with the app %q or importing any certificates in env %q", d.app.Name, d.env.Name) } if rule.Alias.IsEmpty() { if hasImportedCerts { return &errSvcWithNoALBAliasDeployingToEnvWithImportedCerts{ name: d.name, envName: d.env.Name, } } return nil } importedHostedZones := rule.Alias.HostedZones() if len(importedHostedZones) != 0 { if !hasImportedCerts { return fmt.Errorf("cannot specify alias hosted zones %v when no certificates are imported in environment %q", importedHostedZones, d.env.Name) } if d.envConfig.CDNEnabled() { return &errSvcWithALBAliasHostedZoneWithCDNEnabled{ envName: d.env.Name, } } } if hasImportedCerts { aliases, err := rule.Alias.ToStringSlice() if err != nil { return fmt.Errorf("convert aliases to string slice: %w", err) } if hasALBCerts { albCertValidator := d.newAliasCertValidator(nil) if err := albCertValidator.ValidateCertAliases(aliases, d.envConfig.HTTPConfig.Public.Certificates); err != nil { return fmt.Errorf("validate aliases against the imported public ALB certificate for env %s: %w", d.env.Name, err) } } if hasCDNCerts { cfCertValidator := d.newAliasCertValidator(aws.String(cloudfront.CertRegion)) if err := cfCertValidator.ValidateCertAliases(aliases, []string{*d.envConfig.CDNConfig.Config.Certificate}); err != nil { return fmt.Errorf("validate aliases against the imported CDN certificate for env %s: %w", d.env.Name, err) } } return nil } if d.app.Domain != "" { err := validateMinAppVersion(d.app.Name, aws.StringValue(d.lbMft.Name), d.appVersionGetter, version.AppTemplateMinAlias) if err != nil { return fmt.Errorf("alias not supported: %w", err) } if err := validateLBWSAlias(rule.Alias, d.app, d.env.Name); err != nil { return fmt.Errorf(`validate 'alias': %w`, err) } return nil } log.Errorf(ecsALBAliasUsedWithoutDomainFriendlyText) return fmt.Errorf(`cannot specify "alias" when application is not associated with a domain and env %s doesn't import one or more certificates`, d.env.Name) } func (d *lbWebSvcDeployer) validateNLBRuntime() error { if d.lbMft.NLBConfig.Aliases.IsEmpty() { return nil } hasImportedCerts := len(d.envConfig.HTTPConfig.Public.Certificates) != 0 if hasImportedCerts { return fmt.Errorf("cannot specify nlb.alias when env %s imports one or more certificates", d.env.Name) } if d.app.Domain == "" { log.Errorf(ecsNLBAliasUsedWithoutDomainFriendlyText) return fmt.Errorf("cannot specify nlb.alias when application is not associated with a domain") } err := validateMinAppVersion(d.app.Name, aws.StringValue(d.lbMft.Name), d.appVersionGetter, version.AppTemplateMinAlias) if err != nil { return fmt.Errorf("alias not supported: %w", err) } if err := validateLBWSAlias(d.lbMft.NLBConfig.Aliases, d.app, d.env.Name); err != nil { return fmt.Errorf(`validate 'nlb.alias': %w`, err) } return nil } func validateLBWSAlias(alias manifest.Alias, app *config.Application, envName string) error { if alias.IsEmpty() { return nil } aliases, err := alias.ToStringSlice() if err != nil { return err } return validateAliases(app, envName, aliases...) }
300
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package deploy import ( "testing" "time" "github.com/aws/copilot-cli/internal/pkg/deploy/cloudformation" "github.com/aws/copilot-cli/internal/pkg/deploy/cloudformation/stack" "github.com/aws/copilot-cli/internal/pkg/template" "gopkg.in/yaml.v3" "github.com/stretchr/testify/require" "github.com/aws/copilot-cli/internal/pkg/config" "github.com/aws/aws-sdk-go/aws" "github.com/aws/aws-sdk-go/aws/session" "github.com/aws/copilot-cli/internal/pkg/manifest" "github.com/aws/copilot-cli/internal/pkg/override" ) func TestLbWebSvcDeployer_GenerateCloudFormationTemplate(t *testing.T) { t.Run("ensure resulting CloudFormation template custom resource paths are empty", func(t *testing.T) { // GIVEN lbws := mockLoadBalancedWebServiceDeployer() // WHEN out, err := lbws.GenerateCloudFormationTemplate(&GenerateCloudFormationTemplateInput{}) // THEN require.NoError(t, err) type lambdaFn struct { Properties struct { Code struct { S3Bucket string `yaml:"S3bucket"` S3Key string `yaml:"S3Key"` } `yaml:"Code"` } `yaml:"Properties"` } dat := struct { Resources struct { EnvControllerFunction lambdaFn `yaml:"EnvControllerFunction"` RulePriorityFunction lambdaFn `yaml:"RulePriorityFunction"` } `yaml:"Resources"` }{} require.NoError(t, yaml.Unmarshal([]byte(out.Template), &dat)) require.Empty(t, dat.Resources.EnvControllerFunction.Properties.Code.S3Bucket) require.Empty(t, dat.Resources.EnvControllerFunction.Properties.Code.S3Key) require.Empty(t, dat.Resources.RulePriorityFunction.Properties.Code.S3Bucket) require.Empty(t, dat.Resources.RulePriorityFunction.Properties.Code.S3Key) }) } func mockLoadBalancedWebServiceDeployer(opts ...func(deployer *lbWebSvcDeployer)) *lbWebSvcDeployer { deployer := &lbWebSvcDeployer{ svcDeployer: &svcDeployer{ workloadDeployer: &workloadDeployer{ name: "example", app: &config.Application{ Name: "demo", }, env: &config.Environment{ App: "demo", Name: "test", }, resources: &stack.AppRegionalResources{}, envConfig: new(manifest.Environment), endpointGetter: &mockEndpointGetter{endpoint: "demo.test.local"}, envVersionGetter: &mockEnvVersionGetter{version: "v1.0.0"}, overrider: new(override.Noop), templateFS: template.New(), customResources: lbwsCustomResources, }, newSvcUpdater: func(f func(*session.Session) serviceForceUpdater) serviceForceUpdater { return nil }, now: func() time.Time { return time.Date(2020, 11, 23, 0, 0, 0, 0, time.UTC) }, }, lbMft: &manifest.LoadBalancedWebService{ Workload: manifest.Workload{ Name: aws.String("example"), }, LoadBalancedWebServiceConfig: manifest.LoadBalancedWebServiceConfig{ TaskConfig: manifest.TaskConfig{ Count: manifest.Count{ Value: aws.Int(1), }, }, ImageConfig: manifest.ImageWithPortAndHealthcheck{ ImageWithPort: manifest.ImageWithPort{ Image: manifest.Image{ ImageLocationOrBuild: manifest.ImageLocationOrBuild{ Build: manifest.BuildArgsOrString{BuildString: aws.String("/Dockerfile")}, }, }, Port: aws.Uint16(80), }, }, HTTPOrBool: manifest.HTTPOrBool{ HTTP: manifest.HTTP{ Main: manifest.RoutingRule{ Path: aws.String("/"), }, }, }, }, }, newStack: func() cloudformation.StackConfiguration { return new(stubCloudFormationStack) }, } for _, opt := range opts { opt(deployer) } return deployer }
127
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package deploy import ( "errors" "fmt" "github.com/aws/copilot-cli/internal/pkg/override" "github.com/aws/copilot-cli/internal/pkg/term/log" "github.com/spf13/afero" ) // An Overrider transforms the content in body to out. type Overrider interface { Override(body []byte) (out []byte, err error) } // UserAgentAdder is the interface that adds values to the User-Agent HTTP request header. type UserAgentAdder interface { UserAgentExtras(extras ...string) } // NewOverrider looks up if a CDK or YAMLPatch Overrider exists at pathsToOverriderDir and initializes the respective Overrider. // If the directory is empty, then returns a noop Overrider. func NewOverrider(pathToOverridesDir, app, env string, fs afero.Fs, sess UserAgentAdder) (Overrider, error) { info, err := override.Lookup(pathToOverridesDir, fs) if err != nil { var errNotExist *override.ErrNotExist if errors.As(err, &errNotExist) { return new(override.Noop), nil } return nil, fmt.Errorf("look up overrider at %q: %w", pathToOverridesDir, err) } switch { case info.IsCDK(): sess.UserAgentExtras("override cdk") return override.WithCDK(info.Path(), override.CDKOpts{ // Write out-of-band info from sub-commands to stderr as users expect stdout to only // contain the final override output. ExecWriter: log.DiagnosticWriter, FS: fs, EnvVars: map[string]string{ "COPILOT_APPLICATION_NAME": app, "COPILOT_ENVIRONMENT_NAME": env, }, }), nil case info.IsYAMLPatch(): sess.UserAgentExtras("override yamlpatch") return override.WithPatch(info.Path(), override.PatchOpts{ FS: fs, }), nil default: return new(override.Noop), nil } }
58
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package deploy import ( "path/filepath" "testing" "github.com/aws/copilot-cli/internal/pkg/override" "github.com/stretchr/testify/require" "github.com/spf13/afero" ) type mockSessProvider struct { UserAgent []string } func (m *mockSessProvider) UserAgentExtras(extras ...string) { m.UserAgent = append(m.UserAgent, extras...) } func TestNewOverrider(t *testing.T) { t.Run("should return override.Noop when the directory does not exist", func(t *testing.T) { // GIVEN fs := afero.NewMemMapFs() // WHEN ovrdr, err := NewOverrider("overrides", "demo", "test", fs, new(mockSessProvider)) // THEN require.NoError(t, err) _, ok := ovrdr.(*override.Noop) require.True(t, ok) }) t.Run("should return a wrapped error when the directory is not empty but cannot be identified", func(t *testing.T) { // GIVEN fs := afero.NewMemMapFs() _ = fs.MkdirAll("overrides", 0755) // WHEN _, err := NewOverrider("overrides", "demo", "test", fs, new(mockSessProvider)) // THEN require.ErrorContains(t, err, `look up overrider at "overrides":`) }) t.Run("should initialize a CDK overrider", func(t *testing.T) { // GIVEN fs := afero.NewMemMapFs() _ = fs.MkdirAll("overrides", 0755) _ = afero.WriteFile(fs, filepath.Join("overrides", "cdk.json"), []byte(""), 0755) _ = afero.WriteFile(fs, filepath.Join("overrides", "package.json"), []byte(""), 0755) _ = afero.WriteFile(fs, filepath.Join("overrides", "stack.ts"), []byte(""), 0755) sess := new(mockSessProvider) // WHEN ovrdr, err := NewOverrider("overrides", "demo", "test", fs, sess) // THEN require.NoError(t, err) _, ok := ovrdr.(*override.CDK) require.True(t, ok) require.Contains(t, sess.UserAgent, "override cdk") }) }
67
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package deploy import ( "errors" "fmt" "regexp" "github.com/aws/aws-sdk-go/aws" "github.com/aws/aws-sdk-go/aws/session" "github.com/aws/copilot-cli/internal/pkg/apprunner" awsapprunner "github.com/aws/copilot-cli/internal/pkg/aws/apprunner" "github.com/aws/copilot-cli/internal/pkg/aws/partitions" "github.com/aws/copilot-cli/internal/pkg/aws/s3" "github.com/aws/copilot-cli/internal/pkg/config" "github.com/aws/copilot-cli/internal/pkg/deploy" "github.com/aws/copilot-cli/internal/pkg/deploy/cloudformation" "github.com/aws/copilot-cli/internal/pkg/deploy/cloudformation/stack" "github.com/aws/copilot-cli/internal/pkg/deploy/upload/customresource" "github.com/aws/copilot-cli/internal/pkg/describe" "github.com/aws/copilot-cli/internal/pkg/manifest" "github.com/aws/copilot-cli/internal/pkg/manifest/manifestinfo" "github.com/aws/copilot-cli/internal/pkg/template" "github.com/aws/copilot-cli/internal/pkg/term/color" "github.com/aws/copilot-cli/internal/pkg/term/log" "github.com/aws/copilot-cli/internal/pkg/version" ) var rdwsAliasUsedWithoutDomainFriendlyText = fmt.Sprintf("To use %s, your application must be associated with a domain: %s.\n", color.HighlightCode("http.alias"), color.HighlightCode("copilot app init --domain example.com")) type rdwsDeployer struct { *svcDeployer rdwsMft *manifest.RequestDrivenWebService // Overriden in tests. customResourceS3Client uploader appVersionGetter versionGetter newStack func() cloudformation.StackConfiguration } // NewRDWSDeployer is the constructor for RDWSDeployer. func NewRDWSDeployer(in *WorkloadDeployerInput) (*rdwsDeployer, error) { in.customResources = rdwsCustomResources svcDeployer, err := newSvcDeployer(in) if err != nil { return nil, err } versionGetter, err := describe.NewAppDescriber(in.App.Name) if err != nil { return nil, fmt.Errorf("new app describer for application %s: %w", in.App.Name, err) } rdwsMft, ok := in.Mft.(*manifest.RequestDrivenWebService) if !ok { return nil, fmt.Errorf("manifest is not of type %s", manifestinfo.RequestDrivenWebServiceType) } return &rdwsDeployer{ svcDeployer: svcDeployer, customResourceS3Client: s3.New(svcDeployer.defaultSessWithEnvRegion), appVersionGetter: versionGetter, rdwsMft: rdwsMft, }, nil } func rdwsCustomResources(fs template.Reader) ([]*customresource.CustomResource, error) { crs, err := customresource.RDWS(fs) if err != nil { return nil, fmt.Errorf("read custom resources for a %q: %w", manifestinfo.RequestDrivenWebServiceType, err) } return crs, nil } // IsServiceAvailableInRegion checks if service type exist in the given region. func (rdwsDeployer) IsServiceAvailableInRegion(region string) (bool, error) { return partitions.IsAvailableInRegion(awsapprunner.EndpointsID, region) } // UploadArtifacts uploads the deployment artifacts such as the container image, custom resources, addons and env files. func (d *rdwsDeployer) UploadArtifacts() (*UploadArtifactsOutput, error) { return d.uploadArtifacts(d.uploadContainerImages, d.uploadArtifactsToS3, d.uploadCustomResources) } type rdwsDeployOutput struct { rdwsAlias string } // RecommendedActions returns the recommended actions after deployment. func (d *rdwsDeployOutput) RecommendedActions() []string { if d.rdwsAlias == "" { return nil } return []string{fmt.Sprintf(`The validation process for https://%s can take more than 15 minutes. Please visit %s to check the validation status.`, d.rdwsAlias, color.Emphasize("https://console.aws.amazon.com/apprunner/home"))} } // GenerateCloudFormationTemplate generates a CloudFormation template and parameters for a workload. func (d *rdwsDeployer) GenerateCloudFormationTemplate(in *GenerateCloudFormationTemplateInput) ( *GenerateCloudFormationTemplateOutput, error) { output, err := d.stackConfiguration(&in.StackRuntimeConfiguration) if err != nil { return nil, err } return d.generateCloudFormationTemplate(output.conf) } // DeployWorkload deploys a request driven web service using CloudFormation. func (d *rdwsDeployer) DeployWorkload(in *DeployWorkloadInput) (ActionRecommender, error) { stackConfigOutput, err := d.stackConfiguration(&in.StackRuntimeConfiguration) if err != nil { return nil, err } if err := d.deploy(in.Options, stackConfigOutput.svcStackConfigurationOutput); err != nil { return nil, err } return &rdwsDeployOutput{ rdwsAlias: stackConfigOutput.rdSvcAlias, }, nil } type rdwsStackConfigurationOutput struct { svcStackConfigurationOutput rdSvcAlias string } func (d *rdwsDeployer) stackConfiguration(in *StackRuntimeConfiguration) (*rdwsStackConfigurationOutput, error) { rc, err := d.runtimeConfig(in) if err != nil { return nil, err } if d.app.Domain == "" && d.rdwsMft.Alias != nil { log.Errorf(rdwsAliasUsedWithoutDomainFriendlyText) return nil, errors.New("alias specified when application is not associated with a domain") } var conf cloudformation.StackConfiguration switch { case d.newStack != nil: conf = d.newStack() default: conf, err = stack.NewRequestDrivenWebService(stack.RequestDrivenWebServiceConfig{ App: deploy.AppInformation{ Name: d.app.Name, Domain: d.app.Domain, PermissionsBoundary: d.app.PermissionsBoundary, AccountPrincipalARN: in.RootUserARN, }, Env: d.env.Name, Manifest: d.rdwsMft, RawManifest: d.rawMft, ArtifactBucketName: d.resources.S3Bucket, RuntimeConfig: *rc, Addons: d.addons, }) if err != nil { return nil, fmt.Errorf("create stack configuration: %w", err) } } if d.rdwsMft.Alias == nil { return &rdwsStackConfigurationOutput{ svcStackConfigurationOutput: svcStackConfigurationOutput{ conf: cloudformation.WrapWithTemplateOverrider(conf, d.overrider), svcUpdater: d.newSvcUpdater(func(s *session.Session) serviceForceUpdater { return apprunner.New(s) }), }, }, nil } if err = validateRDSvcAliasAndAppVersion(d.name, aws.StringValue(d.rdwsMft.Alias), d.env.Name, d.app, d.appVersionGetter); err != nil { return nil, err } return &rdwsStackConfigurationOutput{ svcStackConfigurationOutput: svcStackConfigurationOutput{ conf: cloudformation.WrapWithTemplateOverrider(conf, d.overrider), svcUpdater: d.newSvcUpdater(func(s *session.Session) serviceForceUpdater { return apprunner.New(s) }), }, rdSvcAlias: aws.StringValue(d.rdwsMft.Alias), }, nil } func validateRDSvcAliasAndAppVersion(svcName, alias, envName string, app *config.Application, appVersionGetter versionGetter) error { if alias == "" { return nil } if err := validateMinAppVersion(app.Name, svcName, appVersionGetter, version.AppTemplateMinAlias); err != nil { return fmt.Errorf("alias not supported: %w", err) } // Alias should be within root hosted zone. aliasInvalidLog := fmt.Sprintf(`%s of %s field should match the pattern <subdomain>.%s Where <subdomain> cannot be the application name. `, color.HighlightUserInput(alias), color.HighlightCode("http.alias"), app.Domain) if err := checkUnsupportedRDSvcAlias(alias, envName, app); err != nil { log.Errorf(aliasInvalidLog) return err } // Example: subdomain.domain regRootHostedZone, err := regexp.Compile(fmt.Sprintf(`^([^\.]+\.)%s`, app.Domain)) if err != nil { return err } if regRootHostedZone.MatchString(alias) { return nil } log.Errorf(aliasInvalidLog) return fmt.Errorf("alias is not supported in hosted zones that are not managed by Copilot") } func checkUnsupportedRDSvcAlias(alias, envName string, app *config.Application) error { var regEnvHostedZone, regAppHostedZone *regexp.Regexp var err error // Example: subdomain.env.app.domain, env.app.domain if regEnvHostedZone, err = regexp.Compile(fmt.Sprintf(`^([^\.]+\.)?%s.%s.%s`, envName, app.Name, app.Domain)); err != nil { return err } // Example: subdomain.app.domain, app.domain if regAppHostedZone, err = regexp.Compile(fmt.Sprintf(`^([^\.]+\.)?%s.%s`, app.Name, app.Domain)); err != nil { return err } if regEnvHostedZone.MatchString(alias) { return fmt.Errorf("%s is an environment-level alias, which is not supported yet", alias) } if regAppHostedZone.MatchString(alias) { return fmt.Errorf("%s is an application-level alias, which is not supported yet", alias) } if alias == app.Domain { return fmt.Errorf("%s is a root domain alias, which is not supported yet", alias) } return nil }
246
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package deploy import ( "errors" "fmt" "testing" "time" "github.com/aws/copilot-cli/internal/pkg/deploy/cloudformation" "github.com/aws/copilot-cli/internal/pkg/override" "gopkg.in/yaml.v3" "github.com/aws/aws-sdk-go/aws" "github.com/aws/aws-sdk-go/aws/session" "github.com/aws/copilot-cli/internal/pkg/cli/deploy/mocks" "github.com/aws/copilot-cli/internal/pkg/config" "github.com/aws/copilot-cli/internal/pkg/deploy/cloudformation/stack" "github.com/aws/copilot-cli/internal/pkg/manifest" "github.com/golang/mock/gomock" "github.com/stretchr/testify/require" ) func TestRdwsDeployer_GenerateCloudFormationTemplate(t *testing.T) { t.Run("ensure resulting CloudFormation template custom resource paths are empty", func(t *testing.T) { // GIVEN rdws := mockRDWSDeployer() // WHEN out, err := rdws.GenerateCloudFormationTemplate(&GenerateCloudFormationTemplateInput{}) // THEN require.NoError(t, err) type lambdaFn struct { Properties struct { Code struct { S3Bucket string `yaml:"S3bucket"` S3Key string `yaml:"S3Key"` } `yaml:"Code"` } `yaml:"Properties"` } dat := struct { Resources struct { EnvControllerFunction lambdaFn `yaml:"EnvControllerFunction"` } `yaml:"Resources"` }{} require.NoError(t, yaml.Unmarshal([]byte(out.Template), &dat)) require.Empty(t, dat.Resources.EnvControllerFunction.Properties.Code.S3Bucket) require.Empty(t, dat.Resources.EnvControllerFunction.Properties.Code.S3Key) }) } type deployRDSvcMocks struct { mockAppVersionGetter *mocks.MockversionGetter mockEnvVersionGetter *mocks.MockversionGetter mockEndpointGetter *mocks.MockendpointGetter } func TestSvcDeployOpts_rdWebServiceStackConfiguration(t *testing.T) { const ( mockAppName = "mockApp" mockEnvName = "mockEnv" mockName = "mockWkld" mockAddonsURL = "mockAddonsURL" mockBucket = "mockBucket" ) mockResources := &stack.AppRegionalResources{ S3Bucket: mockBucket, } tests := map[string]struct { inAlias string inApp *config.Application inEnvironment *config.Environment mock func(m *deployRDSvcMocks) wantAlias string wantErr error }{ "alias used while app is not associated with a domain": { inAlias: "v1.mockDomain", inEnvironment: &config.Environment{ Name: mockEnvName, Region: "us-west-2", }, inApp: &config.Application{ Name: mockAppName, }, mock: func(m *deployRDSvcMocks) { m.mockEndpointGetter.EXPECT().ServiceDiscoveryEndpoint().Return("mockApp.local", nil) m.mockEnvVersionGetter.EXPECT().Version().Return("v1.42.0", nil) }, wantErr: errors.New("alias specified when application is not associated with a domain"), }, "invalid alias with unknown domain": { inAlias: "v1.someRandomDomain", inEnvironment: &config.Environment{ Name: mockEnvName, Region: "us-west-2", }, inApp: &config.Application{ Name: mockAppName, Domain: "mockDomain", }, mock: func(m *deployRDSvcMocks) { m.mockAppVersionGetter.EXPECT().Version().Return("v1.0.0", nil) m.mockEndpointGetter.EXPECT().ServiceDiscoveryEndpoint().Return("mockApp.local", nil) m.mockEnvVersionGetter.EXPECT().Version().Return("v1.42.0", nil) }, wantErr: fmt.Errorf("alias is not supported in hosted zones that are not managed by Copilot"), }, "invalid environment level alias": { inAlias: "mockEnv.mockApp.mockDomain", inEnvironment: &config.Environment{ Name: mockEnvName, Region: "us-west-2", }, inApp: &config.Application{ Name: mockAppName, Domain: "mockDomain", }, mock: func(m *deployRDSvcMocks) { m.mockAppVersionGetter.EXPECT().Version().Return("v1.0.0", nil) m.mockEndpointGetter.EXPECT().ServiceDiscoveryEndpoint().Return("mockApp.local", nil) m.mockEnvVersionGetter.EXPECT().Version().Return("v1.42.0", nil) }, wantErr: fmt.Errorf("mockEnv.mockApp.mockDomain is an environment-level alias, which is not supported yet"), }, "invalid application level alias": { inAlias: "someSub.mockApp.mockDomain", inEnvironment: &config.Environment{ Name: mockEnvName, Region: "us-west-2", }, inApp: &config.Application{ Name: mockAppName, Domain: "mockDomain", }, mock: func(m *deployRDSvcMocks) { m.mockAppVersionGetter.EXPECT().Version().Return("v1.0.0", nil) m.mockEndpointGetter.EXPECT().ServiceDiscoveryEndpoint().Return("mockApp.local", nil) m.mockEnvVersionGetter.EXPECT().Version().Return("v1.42.0", nil) }, wantErr: fmt.Errorf("someSub.mockApp.mockDomain is an application-level alias, which is not supported yet"), }, "invalid root level alias": { inAlias: "mockDomain", inEnvironment: &config.Environment{ Name: mockEnvName, Region: "us-west-2", }, inApp: &config.Application{ Name: mockAppName, Domain: "mockDomain", }, mock: func(m *deployRDSvcMocks) { m.mockAppVersionGetter.EXPECT().Version().Return("v1.0.0", nil) m.mockEndpointGetter.EXPECT().ServiceDiscoveryEndpoint().Return("mockApp.local", nil) m.mockEnvVersionGetter.EXPECT().Version().Return("v1.42.0", nil) }, wantErr: fmt.Errorf("mockDomain is a root domain alias, which is not supported yet"), }, "success": { inAlias: "v1.mockDomain", inEnvironment: &config.Environment{ Name: mockEnvName, Region: "us-west-2", }, inApp: &config.Application{ Name: mockAppName, Domain: "mockDomain", }, mock: func(m *deployRDSvcMocks) { m.mockAppVersionGetter.EXPECT().Version().Return("v1.0.0", nil) m.mockEndpointGetter.EXPECT().ServiceDiscoveryEndpoint().Return("mockApp.local", nil) m.mockEnvVersionGetter.EXPECT().Version().Return("v1.42.0", nil) }, wantAlias: "v1.mockDomain", }, } for name, tc := range tests { t.Run(name, func(t *testing.T) { ctrl := gomock.NewController(t) defer ctrl.Finish() m := &deployRDSvcMocks{ mockAppVersionGetter: mocks.NewMockversionGetter(ctrl), mockEnvVersionGetter: mocks.NewMockversionGetter(ctrl), mockEndpointGetter: mocks.NewMockendpointGetter(ctrl), } tc.mock(m) deployer := rdwsDeployer{ svcDeployer: &svcDeployer{ workloadDeployer: &workloadDeployer{ name: mockName, app: tc.inApp, env: tc.inEnvironment, resources: mockResources, endpointGetter: m.mockEndpointGetter, envVersionGetter: m.mockEnvVersionGetter, }, newSvcUpdater: func(f func(*session.Session) serviceForceUpdater) serviceForceUpdater { return nil }, }, appVersionGetter: m.mockAppVersionGetter, rdwsMft: &manifest.RequestDrivenWebService{ Workload: manifest.Workload{ Name: aws.String(mockName), }, RequestDrivenWebServiceConfig: manifest.RequestDrivenWebServiceConfig{ ImageConfig: manifest.ImageWithPort{ Image: manifest.Image{ ImageLocationOrBuild: manifest.ImageLocationOrBuild{ Build: manifest.BuildArgsOrString{BuildString: aws.String("/Dockerfile")}, }, }, Port: aws.Uint16(80), }, RequestDrivenWebServiceHttpConfig: manifest.RequestDrivenWebServiceHttpConfig{ Alias: aws.String(tc.inAlias), }, }, }, newStack: func() cloudformation.StackConfiguration { return new(stubCloudFormationStack) }, } got, gotErr := deployer.stackConfiguration(&StackRuntimeConfiguration{ AddonsURL: mockAddonsURL, }) if tc.wantErr != nil { require.EqualError(t, gotErr, tc.wantErr.Error()) } else { require.NoError(t, gotErr) require.Equal(t, tc.wantAlias, got.rdSvcAlias) } }) } } func mockRDWSDeployer(opts ...func(*rdwsDeployer)) *rdwsDeployer { deployer := &rdwsDeployer{ svcDeployer: &svcDeployer{ workloadDeployer: &workloadDeployer{ name: "example", app: &config.Application{ Name: "demo", }, env: &config.Environment{ App: "demo", Name: "test", }, resources: &stack.AppRegionalResources{}, envConfig: new(manifest.Environment), endpointGetter: &mockEndpointGetter{endpoint: "demo.test.local"}, envVersionGetter: &mockEnvVersionGetter{version: "v1.0.0"}, overrider: new(override.Noop), }, newSvcUpdater: func(f func(*session.Session) serviceForceUpdater) serviceForceUpdater { return nil }, now: func() time.Time { return time.Date(2020, 11, 23, 0, 0, 0, 0, time.UTC) }, }, rdwsMft: &manifest.RequestDrivenWebService{ Workload: manifest.Workload{ Name: aws.String("example"), }, RequestDrivenWebServiceConfig: manifest.RequestDrivenWebServiceConfig{ ImageConfig: manifest.ImageWithPort{ Image: manifest.Image{ ImageLocationOrBuild: manifest.ImageLocationOrBuild{ Location: aws.String("111111111111.dkr.ecr.us-west-2.amazonaws.com/nginx:latest"), }, }, Port: aws.Uint16(80), }, InstanceConfig: manifest.AppRunnerInstanceConfig{ CPU: aws.Int(1024), Memory: aws.Int(2048), }, }, }, newStack: func() cloudformation.StackConfiguration { return new(stubCloudFormationStack) }, } for _, opt := range opts { opt(deployer) } return deployer }
308
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package deploy import ( "fmt" "io" "path/filepath" awscloudformation "github.com/aws/copilot-cli/internal/pkg/aws/cloudformation" "github.com/aws/copilot-cli/internal/pkg/aws/partitions" "github.com/aws/copilot-cli/internal/pkg/aws/s3" "github.com/aws/copilot-cli/internal/pkg/deploy/cloudformation" "github.com/aws/copilot-cli/internal/pkg/deploy/cloudformation/stack" "github.com/aws/copilot-cli/internal/pkg/deploy/upload/asset" "github.com/aws/copilot-cli/internal/pkg/deploy/upload/customresource" "github.com/aws/copilot-cli/internal/pkg/describe" "github.com/aws/copilot-cli/internal/pkg/manifest" "github.com/aws/copilot-cli/internal/pkg/manifest/manifestinfo" "github.com/aws/copilot-cli/internal/pkg/template" "github.com/aws/copilot-cli/internal/pkg/version" "github.com/aws/copilot-cli/internal/pkg/workspace" "github.com/spf13/afero" ) const artifactBucketAssetsDir = "local-assets" type fileUploader interface { UploadFiles(files []manifest.FileUpload) (string, error) } type staticSiteDeployer struct { *svcDeployer appVersionGetter versionGetter staticSiteMft *manifest.StaticSite fs afero.Fs uploader fileUploader newStack func(*stack.StaticSiteConfig) (*stack.StaticSite, error) // cached. wsRoot string } // NewStaticSiteDeployer is the constructor for staticSiteDeployer. func NewStaticSiteDeployer(in *WorkloadDeployerInput) (*staticSiteDeployer, error) { in.customResources = staticSiteCustomResources svcDeployer, err := newSvcDeployer(in) if err != nil { return nil, err } versionGetter, err := describe.NewAppDescriber(in.App.Name) if err != nil { return nil, fmt.Errorf("new app describer for application %s: %w", in.App.Name, err) } mft, ok := in.Mft.(*manifest.StaticSite) if !ok { return nil, fmt.Errorf("manifest is not of type %s", manifestinfo.StaticSiteType) } ws, err := workspace.Use(svcDeployer.fs) if err != nil { return nil, err } return &staticSiteDeployer{ svcDeployer: svcDeployer, appVersionGetter: versionGetter, staticSiteMft: mft, fs: svcDeployer.fs, uploader: &asset.ArtifactBucketUploader{ FS: svcDeployer.fs, AssetDir: artifactBucketAssetsDir, AssetMappingFileDir: fmt.Sprintf("%s/environments/%s/workloads/%s/mapping", artifactBucketAssetsDir, svcDeployer.env.Name, svcDeployer.name), Upload: func(path string, data io.Reader) error { _, err := svcDeployer.s3Client.Upload(svcDeployer.resources.S3Bucket, path, data) return err }, }, wsRoot: ws.ProjectRoot(), newStack: stack.NewStaticSite, }, nil } func staticSiteCustomResources(fs template.Reader) ([]*customresource.CustomResource, error) { crs, err := customresource.StaticSite(fs) if err != nil { return nil, fmt.Errorf("read custom resources for a %q: %w", manifestinfo.StaticSiteType, err) } return crs, nil } // IsServiceAvailableInRegion checks if service type exist in the given region. func (*staticSiteDeployer) IsServiceAvailableInRegion(region string) (bool, error) { return partitions.IsAvailableInRegion(s3.EndpointsID, region) } // GenerateCloudFormationTemplate generates a CloudFormation template and parameters for a workload. func (d *staticSiteDeployer) GenerateCloudFormationTemplate(in *GenerateCloudFormationTemplateInput) ( *GenerateCloudFormationTemplateOutput, error) { conf, err := d.stackConfiguration(&in.StackRuntimeConfiguration) if err != nil { return nil, err } return d.generateCloudFormationTemplate(conf) } // DeployWorkload deploys a static site service using CloudFormation. func (d *staticSiteDeployer) DeployWorkload(in *DeployWorkloadInput) (ActionRecommender, error) { conf, err := d.stackConfiguration(&in.StackRuntimeConfiguration) if err != nil { return nil, err } if err := d.deploy(in.Options, svcStackConfigurationOutput{conf: conf}); err != nil { return nil, err } return noopActionRecommender{}, nil } func (d *staticSiteDeployer) deploy(deployOptions Options, stackConfigOutput svcStackConfigurationOutput) error { opts := []awscloudformation.StackOption{ awscloudformation.WithRoleARN(d.env.ExecutionRoleARN), } if deployOptions.DisableRollback { opts = append(opts, awscloudformation.WithDisableRollback()) } if err := d.deployer.DeployService(stackConfigOutput.conf, d.resources.S3Bucket, opts...); err != nil { return fmt.Errorf("deploy service: %w", err) } return nil } // UploadArtifacts uploads static assets to the app stackset bucket. func (d *staticSiteDeployer) UploadArtifacts() (*UploadArtifactsOutput, error) { return d.uploadArtifacts(d.uploadStaticFiles, d.uploadArtifactsToS3, d.uploadCustomResources) } func (d *staticSiteDeployer) uploadStaticFiles(out *UploadArtifactsOutput) error { if err := d.validateSources(); err != nil { return err } fullPathSources, err := d.convertSources() if err != nil { return err } path, err := d.uploader.UploadFiles(fullPathSources) if err != nil { return fmt.Errorf("upload static files: %w", err) } out.StaticSiteAssetMappingLocation = s3.Location(d.resources.S3Bucket, path) return nil } func (d *staticSiteDeployer) stackConfiguration(in *StackRuntimeConfiguration) (cloudformation.StackConfiguration, error) { rc, err := d.runtimeConfig(in) if err != nil { return nil, err } if err := d.validateAlias(); err != nil { return nil, err } if err := validateMinAppVersion(d.app.Name, d.name, d.appVersionGetter, version.AppTemplateMinStaticSite); err != nil { return nil, fmt.Errorf("static sites not supported: %w", err) } conf, err := d.newStack(&stack.StaticSiteConfig{ App: d.app, EnvManifest: d.envConfig, Manifest: d.staticSiteMft, RawManifest: d.rawMft, ArtifactBucketName: d.resources.S3Bucket, RuntimeConfig: *rc, RootUserARN: in.RootUserARN, Addons: d.addons, AssetMappingURL: in.StaticSiteAssetMappingURL, }) if err != nil { return nil, fmt.Errorf("create stack configuration: %w", err) } return cloudformation.WrapWithTemplateOverrider(conf, d.overrider), nil } func (d *staticSiteDeployer) validateSources() error { for _, upload := range d.staticSiteMft.FileUploads { _, err := d.fs.Stat(filepath.Join(d.wsRoot, upload.Source)) if err != nil { return fmt.Errorf("source %q must be a valid path relative to the workspace root %q: %w", upload.Source, d.wsRoot, err) } } return nil } // convertSources transforms the source's path relative to the project root into the absolute path. func (d *staticSiteDeployer) convertSources() ([]manifest.FileUpload, error) { convertedFileUploads := make([]manifest.FileUpload, len(d.staticSiteMft.FileUploads)) for i, upload := range d.staticSiteMft.FileUploads { convertedFileUploads[i] = manifest.FileUpload{ Source: filepath.Join(d.wsRoot, upload.Source), Destination: upload.Destination, Recursive: upload.Recursive, Exclude: upload.Exclude, Reinclude: upload.Reinclude, } } return convertedFileUploads, nil } func (d *staticSiteDeployer) validateAlias() error { if d.staticSiteMft.HTTP.Alias == "" { return nil } hasImportedCerts := len(d.envConfig.HTTPConfig.Public.Certificates) != 0 if hasImportedCerts { return fmt.Errorf("cannot specify alias when env %q imports one or more certificates", d.env.Name) } if d.app.Domain == "" { return fmt.Errorf("cannot specify alias when application is not associated with a domain") } return validateAliases(d.app, d.env.Name, d.staticSiteMft.HTTP.Alias) }
221
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package deploy import ( "errors" "fmt" "testing" "github.com/aws/aws-sdk-go/aws" "github.com/aws/copilot-cli/internal/pkg/cli/deploy/mocks" "github.com/aws/copilot-cli/internal/pkg/config" "github.com/aws/copilot-cli/internal/pkg/deploy/cloudformation/stack" "github.com/aws/copilot-cli/internal/pkg/deploy/upload/customresource" "github.com/aws/copilot-cli/internal/pkg/manifest" "github.com/aws/copilot-cli/internal/pkg/manifest/manifestinfo" "github.com/aws/copilot-cli/internal/pkg/template" "github.com/golang/mock/gomock" "github.com/spf13/afero" "github.com/stretchr/testify/require" ) func TestStaticSiteDeployer_UploadArtifacts(t *testing.T) { type mockDeps struct { uploader *mocks.MockfileUploader fs func() afero.Fs cachedWSRoot string } tests := map[string]struct { mock func(m *mockDeps) expected *UploadArtifactsOutput wantErr error }{ "error if failed to upload": { mock: func(m *mockDeps) { m.cachedWSRoot = "mockRoot" m.fs = func() afero.Fs { fs := afero.NewMemMapFs() _ = fs.Mkdir("mockRoot/assets/", 0755) return fs } m.uploader.EXPECT().UploadFiles(gomock.Any()).Return("", errors.New("some error")) }, wantErr: fmt.Errorf("upload static files: some error"), }, "error if source path does not exist": { mock: func(m *mockDeps) { m.cachedWSRoot = "mockRoot" m.fs = func() afero.Fs { fs := afero.NewMemMapFs() _ = fs.Mkdir("mockrOOt/assets/", 0755) return fs } }, wantErr: errors.New(`source "assets" must be a valid path relative to the workspace root "mockRoot": open mockRoot/assets: file does not exist`), }, "success": { mock: func(m *mockDeps) { m.cachedWSRoot = "mockRoot" m.fs = func() afero.Fs { fs := afero.NewMemMapFs() _ = fs.Mkdir("mockRoot/assets/", 0755) return fs } m.uploader.EXPECT().UploadFiles([]manifest.FileUpload{ { Source: "mockRoot/assets", Destination: "static", Recursive: true, Exclude: manifest.StringSliceOrString{ String: aws.String("*.manifest"), }, }, }).Return("asdf", nil) }, expected: &UploadArtifactsOutput{ CustomResourceURLs: map[string]string{}, StaticSiteAssetMappingLocation: "s3://mockArtifactBucket/asdf", }, }, } for name, tc := range tests { t.Run(name, func(t *testing.T) { ctrl := gomock.NewController(t) defer ctrl.Finish() m := &mockDeps{ uploader: mocks.NewMockfileUploader(ctrl), } if tc.mock != nil { tc.mock(m) } deployer := &staticSiteDeployer{ svcDeployer: &svcDeployer{ workloadDeployer: &workloadDeployer{ customResources: func(fs template.Reader) ([]*customresource.CustomResource, error) { return nil, nil }, mft: &mockWorkloadMft{}, resources: &stack.AppRegionalResources{ S3Bucket: "mockArtifactBucket", }, }, }, staticSiteMft: &manifest.StaticSite{ StaticSiteConfig: manifest.StaticSiteConfig{ FileUploads: []manifest.FileUpload{ { Source: "assets", Destination: "static", Recursive: true, Exclude: manifest.StringSliceOrString{ String: aws.String("*.manifest"), }, }, }, }, }, uploader: m.uploader, fs: m.fs(), wsRoot: m.cachedWSRoot, } actual, err := deployer.UploadArtifacts() if tc.wantErr != nil { require.EqualError(t, err, tc.wantErr.Error()) } else { require.NoError(t, err) require.Equal(t, tc.expected, actual) } }) } } func TestStaticSiteDeployer_stackConfiguration(t *testing.T) { tests := map[string]struct { deployer *staticSiteDeployer wantErr string wantTemplate string }{ "error getting service discovery endpoint": { deployer: &staticSiteDeployer{ svcDeployer: &svcDeployer{ workloadDeployer: &workloadDeployer{ endpointGetter: &endpointGetterDouble{ ServiceDiscoveryEndpointFn: ReturnsValues("", errors.New("some error")), }, }, }, }, wantErr: "get service discovery endpoint: some error", }, "error getting env version": { deployer: &staticSiteDeployer{ svcDeployer: &svcDeployer{ workloadDeployer: &workloadDeployer{ env: &config.Environment{ Name: "mockEnv", }, endpointGetter: &endpointGetterDouble{ ServiceDiscoveryEndpointFn: ReturnsValues("", error(nil)), }, envVersionGetter: &versionGetterDouble{ VersionFn: ReturnsValues("", errors.New("some error")), }, }, }, }, wantErr: `get version of environment "mockEnv": some error`, }, "error getting app version": { deployer: &staticSiteDeployer{ svcDeployer: &svcDeployer{ workloadDeployer: &workloadDeployer{ app: &config.Application{ Name: "mockApp", }, env: &config.Environment{}, endpointGetter: &endpointGetterDouble{ ServiceDiscoveryEndpointFn: ReturnsValues("", error(nil)), }, envVersionGetter: &versionGetterDouble{ VersionFn: ReturnsValues("", error(nil)), }, }, }, appVersionGetter: &versionGetterDouble{ VersionFn: ReturnsValues("", errors.New("some error")), }, staticSiteMft: &manifest.StaticSite{}, }, wantErr: `static sites not supported: get version for app "mockApp": some error`, }, "error bc app version out of date": { deployer: &staticSiteDeployer{ svcDeployer: &svcDeployer{ workloadDeployer: &workloadDeployer{ app: &config.Application{}, env: &config.Environment{}, endpointGetter: &endpointGetterDouble{ ServiceDiscoveryEndpointFn: ReturnsValues("", error(nil)), }, envVersionGetter: &versionGetterDouble{ VersionFn: ReturnsValues("", error(nil)), }, }, }, appVersionGetter: &versionGetterDouble{ VersionFn: ReturnsValues("v1.1.0", error(nil)), }, staticSiteMft: &manifest.StaticSite{}, }, wantErr: `static sites not supported: app version must be >= v1.2.0`, }, "error bc alias specified and env has imported certs": { deployer: &staticSiteDeployer{ svcDeployer: &svcDeployer{ workloadDeployer: &workloadDeployer{ app: &config.Application{}, env: &config.Environment{ Name: "mockEnv", }, envConfig: &manifest.Environment{ EnvironmentConfig: manifest.EnvironmentConfig{ HTTPConfig: manifest.EnvironmentHTTPConfig{ Public: manifest.PublicHTTPConfig{ Certificates: []string{"mockCert"}, }, }, }, }, endpointGetter: &endpointGetterDouble{ ServiceDiscoveryEndpointFn: ReturnsValues("", error(nil)), }, envVersionGetter: &versionGetterDouble{ VersionFn: ReturnsValues("", error(nil)), }, resources: &stack.AppRegionalResources{}, }, }, appVersionGetter: &versionGetterDouble{ VersionFn: ReturnsValues("v1.2.0", error(nil)), }, staticSiteMft: &manifest.StaticSite{ StaticSiteConfig: manifest.StaticSiteConfig{ HTTP: manifest.StaticSiteHTTP{ Alias: "hi.com", }, }, }, }, wantErr: `cannot specify alias when env "mockEnv" imports one or more certificates`, }, "error bc alias specified no domain imported": { deployer: &staticSiteDeployer{ svcDeployer: &svcDeployer{ workloadDeployer: &workloadDeployer{ app: &config.Application{}, env: &config.Environment{}, envConfig: &manifest.Environment{}, endpointGetter: &endpointGetterDouble{ ServiceDiscoveryEndpointFn: ReturnsValues("", error(nil)), }, envVersionGetter: &versionGetterDouble{ VersionFn: ReturnsValues("", error(nil)), }, resources: &stack.AppRegionalResources{}, }, }, appVersionGetter: &versionGetterDouble{ VersionFn: ReturnsValues("v1.2.0", error(nil)), }, staticSiteMft: &manifest.StaticSite{ StaticSiteConfig: manifest.StaticSiteConfig{ HTTP: manifest.StaticSiteHTTP{ Alias: "hi.com", }, }, }, }, wantErr: `cannot specify alias when application is not associated with a domain`, }, "error bc invalid alias": { deployer: &staticSiteDeployer{ svcDeployer: &svcDeployer{ workloadDeployer: &workloadDeployer{ app: &config.Application{ Name: "mockApp", Domain: "example.com", }, env: &config.Environment{ Name: "mockEnv", }, envConfig: &manifest.Environment{}, endpointGetter: &endpointGetterDouble{ ServiceDiscoveryEndpointFn: ReturnsValues("", error(nil)), }, envVersionGetter: &versionGetterDouble{ VersionFn: ReturnsValues("", error(nil)), }, resources: &stack.AppRegionalResources{}, }, }, appVersionGetter: &versionGetterDouble{ VersionFn: ReturnsValues("v1.2.0", error(nil)), }, staticSiteMft: &manifest.StaticSite{ StaticSiteConfig: manifest.StaticSiteConfig{ HTTP: manifest.StaticSiteHTTP{ Alias: "hi.com", }, }, }, }, wantErr: `alias "hi.com" is not supported in hosted zones managed by Copilot`, }, "error creating stack": { deployer: &staticSiteDeployer{ svcDeployer: &svcDeployer{ workloadDeployer: &workloadDeployer{ app: &config.Application{}, env: &config.Environment{}, endpointGetter: &endpointGetterDouble{ ServiceDiscoveryEndpointFn: ReturnsValues("", error(nil)), }, envVersionGetter: &versionGetterDouble{ VersionFn: ReturnsValues("", error(nil)), }, resources: &stack.AppRegionalResources{}, }, }, appVersionGetter: &versionGetterDouble{ VersionFn: ReturnsValues("v1.2.0", error(nil)), }, staticSiteMft: &manifest.StaticSite{}, newStack: func(*stack.StaticSiteConfig) (*stack.StaticSite, error) { return nil, errors.New("some error") }, }, wantErr: `create stack configuration: some error`, }, "success": { deployer: &staticSiteDeployer{ svcDeployer: &svcDeployer{ workloadDeployer: &workloadDeployer{ app: &config.Application{}, env: &config.Environment{}, endpointGetter: &endpointGetterDouble{ ServiceDiscoveryEndpointFn: ReturnsValues("", error(nil)), }, envVersionGetter: &versionGetterDouble{ VersionFn: ReturnsValues("", error(nil)), }, resources: &stack.AppRegionalResources{}, }, }, appVersionGetter: &versionGetterDouble{ VersionFn: ReturnsValues("v1.2.0", error(nil)), }, staticSiteMft: &manifest.StaticSite{}, newStack: func(*stack.StaticSiteConfig) (*stack.StaticSite, error) { return nil, nil }, }, }, "success with alias": { deployer: &staticSiteDeployer{ svcDeployer: &svcDeployer{ workloadDeployer: &workloadDeployer{ app: &config.Application{ Name: "mockApp", Domain: "example.com", }, env: &config.Environment{ Name: "mockEnv", }, envConfig: &manifest.Environment{}, endpointGetter: &endpointGetterDouble{ ServiceDiscoveryEndpointFn: ReturnsValues("", error(nil)), }, envVersionGetter: &versionGetterDouble{ VersionFn: ReturnsValues("", error(nil)), }, resources: &stack.AppRegionalResources{}, }, }, appVersionGetter: &versionGetterDouble{ VersionFn: ReturnsValues("v1.2.0", error(nil)), }, staticSiteMft: &manifest.StaticSite{ StaticSiteConfig: manifest.StaticSiteConfig{ HTTP: manifest.StaticSiteHTTP{ Alias: "hi.mockApp.example.com", }, }, }, newStack: func(*stack.StaticSiteConfig) (*stack.StaticSite, error) { return nil, nil }, }, }, "success with overrider": { deployer: &staticSiteDeployer{ svcDeployer: &svcDeployer{ workloadDeployer: &workloadDeployer{ app: &config.Application{ Name: "mockApp", Domain: "example.com", }, env: &config.Environment{ Name: "mockEnv", }, envConfig: &manifest.Environment{}, endpointGetter: &endpointGetterDouble{ ServiceDiscoveryEndpointFn: ReturnsValues("", error(nil)), }, envVersionGetter: &versionGetterDouble{ VersionFn: ReturnsValues("", error(nil)), }, resources: &stack.AppRegionalResources{}, overrider: &mockOverrider{}, }, }, appVersionGetter: &versionGetterDouble{ VersionFn: ReturnsValues("v1.2.0", error(nil)), }, staticSiteMft: &manifest.StaticSite{ StaticSiteConfig: manifest.StaticSiteConfig{ HTTP: manifest.StaticSiteHTTP{ Alias: "hi.mockApp.example.com", }, }, }, newStack: func(*stack.StaticSiteConfig) (*stack.StaticSite, error) { return stack.NewStaticSite(&stack.StaticSiteConfig{ EnvManifest: &manifest.Environment{ Workload: manifest.Workload{ Name: aws.String("mockEnv"), }, }, App: &config.Application{ Name: "mockApp", }, Manifest: &manifest.StaticSite{ Workload: manifest.Workload{ Name: aws.String("static"), Type: aws.String(manifestinfo.StaticSiteType), }, }, RuntimeConfig: stack.RuntimeConfig{ Region: "us-west-2", }, ArtifactBucketName: "mockBucket", }) }, }, wantTemplate: "mockOverride", }, } for name, tc := range tests { t.Run(name, func(t *testing.T) { out, gotErr := tc.deployer.stackConfiguration(&StackRuntimeConfiguration{}) if tc.wantErr != "" { require.EqualError(t, gotErr, tc.wantErr) return } require.NoError(t, gotErr) if tc.wantTemplate != "" { s, err := out.Template() require.NoError(t, err) require.Equal(t, tc.wantTemplate, s) } }) } } func ReturnsValues[A, B any](a A, b B) func() (A, B) { return func() (A, B) { return a, b } } type mockOverrider struct{} func (o *mockOverrider) Override(body []byte) (out []byte, err error) { return []byte("mockOverride"), nil }
493
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 // Package deploy holds the structures to deploy a workload. package deploy import ( "errors" "fmt" "io" "regexp" "time" "github.com/aws/aws-sdk-go/aws/session" "golang.org/x/mod/semver" awscloudformation "github.com/aws/copilot-cli/internal/pkg/aws/cloudformation" "github.com/aws/copilot-cli/internal/pkg/config" "github.com/aws/copilot-cli/internal/pkg/deploy/cloudformation" "github.com/aws/copilot-cli/internal/pkg/term/color" "github.com/aws/copilot-cli/internal/pkg/term/log" ) type uploader interface { Upload(bucket, key string, data io.Reader) (string, error) } type versionGetter interface { Version() (string, error) } type serviceForceUpdater interface { ForceUpdateService(app, env, svc string) error LastUpdatedAt(app, env, svc string) (time.Time, error) } type aliasCertValidator interface { ValidateCertAliases(aliases []string, certs []string) error } type svcDeployer struct { *workloadDeployer newSvcUpdater func(func(*session.Session) serviceForceUpdater) serviceForceUpdater now func() time.Time } func newSvcDeployer(in *WorkloadDeployerInput) (*svcDeployer, error) { wkldDeployer, err := newWorkloadDeployer(in) if err != nil { return nil, err } return &svcDeployer{ workloadDeployer: wkldDeployer, newSvcUpdater: func(f func(*session.Session) serviceForceUpdater) serviceForceUpdater { return f(wkldDeployer.envSess) }, now: time.Now, }, nil } func (d *svcDeployer) deploy(deployOptions Options, stackConfigOutput svcStackConfigurationOutput) error { opts := []awscloudformation.StackOption{ awscloudformation.WithRoleARN(d.env.ExecutionRoleARN), } if deployOptions.DisableRollback { opts = append(opts, awscloudformation.WithDisableRollback()) } cmdRunAt := d.now() if err := d.deployer.DeployService(stackConfigOutput.conf, d.resources.S3Bucket, opts...); err != nil { var errEmptyCS *awscloudformation.ErrChangeSetEmpty if !errors.As(err, &errEmptyCS) { return fmt.Errorf("deploy service: %w", err) } if !deployOptions.ForceNewUpdate { log.Warningln("Set --force to force an update for the service.") return fmt.Errorf("deploy service: %w", err) } } // Force update the service if --force is set and the service is not updated by the CFN. if deployOptions.ForceNewUpdate { lastUpdatedAt, err := stackConfigOutput.svcUpdater.LastUpdatedAt(d.app.Name, d.env.Name, d.name) if err != nil { return fmt.Errorf("get the last updated deployment time for %s: %w", d.name, err) } if cmdRunAt.After(lastUpdatedAt) { if err := d.forceDeploy(&forceDeployInput{ spinner: d.spinner, svcUpdater: stackConfigOutput.svcUpdater, }); err != nil { return err } } } return nil } type svcStackConfigurationOutput struct { conf cloudformation.StackConfiguration svcUpdater serviceForceUpdater } type errAppOutOfDate struct { svc string curVersion string neededVersion string } func (e *errAppOutOfDate) Error() string { return fmt.Sprintf("app version must be >= %s", e.neededVersion) } func (e *errAppOutOfDate) RecommendActions() string { return fmt.Sprintf(`Cannot deploy service %q because the current application version %q is incompatible. To upgrade the application, please run %s. (see https://aws.github.io/copilot-cli/docs/credentials/#application-credentials) `, e.svc, e.curVersion, color.HighlightCode("copilot app upgrade")) } func validateMinAppVersion(app, svc string, appVersionGetter versionGetter, minVersion string) error { appVersion, err := appVersionGetter.Version() if err != nil { return fmt.Errorf("get version for app %q: %w", app, err) } diff := semver.Compare(appVersion, minVersion) if diff < 0 { return &errAppOutOfDate{ svc: svc, curVersion: appVersion, neededVersion: minVersion, } } return nil } func validateAliases(app *config.Application, env string, aliases ...string) error { // Alias should be within either env, app, or root hosted zone. regRoot, err := regexp.Compile(fmt.Sprintf(`^([^\.]+\.)?%s`, app.Domain)) if err != nil { return err } regApp, err := regexp.Compile(fmt.Sprintf(`^([^\.]+\.)?%s.%s`, app.Name, app.Domain)) if err != nil { return err } regEnv, err := regexp.Compile(fmt.Sprintf(`^([^\.]+\.)?%s.%s.%s`, env, app.Name, app.Domain)) if err != nil { return err } regexps := []*regexp.Regexp{regRoot, regApp, regEnv} validate := func(alias string) error { for _, reg := range regexps { if reg.MatchString(alias) { return nil } } return &errInvalidAlias{ alias: alias, app: app, env: env, } } for _, alias := range aliases { if err := validate(alias); err != nil { return err } } return nil } type errInvalidAlias struct { alias string app *config.Application env string } func (e *errInvalidAlias) Error() string { return fmt.Sprintf("alias %q is not supported in hosted zones managed by Copilot", e.alias) } func (e *errInvalidAlias) RecommmendActions() string { return fmt.Sprintf(`Copilot-managed aliases must match one of the following patterns: - <name>.%s.%s.%s - %s.%s.%s - <name>.%s.%s - %s.%s - <name>.%s - %s `, e.env, e.app.Name, e.app.Domain, e.env, e.app.Name, e.app.Domain, e.app.Name, e.app.Domain, e.app.Name, e.app.Domain, e.app.Domain, e.app.Domain) }
201
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package deploy type versionGetterDouble struct { VersionFn func() (string, error) } func (d *versionGetterDouble) Version() (string, error) { return d.VersionFn() }
13
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package deploy import ( "fmt" "strings" "github.com/aws/aws-sdk-go/aws" "github.com/aws/aws-sdk-go/aws/arn" "github.com/aws/aws-sdk-go/aws/session" awsecs "github.com/aws/copilot-cli/internal/pkg/aws/ecs" "github.com/aws/copilot-cli/internal/pkg/aws/partitions" "github.com/aws/copilot-cli/internal/pkg/deploy" "github.com/aws/copilot-cli/internal/pkg/deploy/cloudformation" "github.com/aws/copilot-cli/internal/pkg/deploy/cloudformation/stack" "github.com/aws/copilot-cli/internal/pkg/deploy/upload/customresource" "github.com/aws/copilot-cli/internal/pkg/ecs" "github.com/aws/copilot-cli/internal/pkg/manifest" "github.com/aws/copilot-cli/internal/pkg/manifest/manifestinfo" "github.com/aws/copilot-cli/internal/pkg/template" "github.com/aws/copilot-cli/internal/pkg/term/color" "golang.org/x/text/cases" "golang.org/x/text/language" ) var ( fmtErrTopicSubscriptionNotAllowed = "SNS topic %s does not exist in environment %s" resourceNameFormat = "%s-%s-%s-%s" // Format for copilot resource names of form app-env-svc-name ) type snsTopicsLister interface { ListSNSTopics(appName string, envName string) ([]deploy.Topic, error) } type workerSvcDeployer struct { *svcDeployer wsMft *manifest.WorkerService // Overriden in tests. topicLister snsTopicsLister newStack func() cloudformation.StackConfiguration } // IsServiceAvailableInRegion checks if service type exist in the given region. func (workerSvcDeployer) IsServiceAvailableInRegion(region string) (bool, error) { return partitions.IsAvailableInRegion(awsecs.EndpointsID, region) } // NewWorkerSvcDeployer is the constructor for workerSvcDeployer. func NewWorkerSvcDeployer(in *WorkloadDeployerInput) (*workerSvcDeployer, error) { in.customResources = workerCustomResources svcDeployer, err := newSvcDeployer(in) if err != nil { return nil, err } deployStore, err := deploy.NewStore(in.SessionProvider, svcDeployer.store) if err != nil { return nil, fmt.Errorf("new deploy store: %w", err) } wsMft, ok := in.Mft.(*manifest.WorkerService) if !ok { return nil, fmt.Errorf("manifest is not of type %s", manifestinfo.WorkerServiceType) } return &workerSvcDeployer{ svcDeployer: svcDeployer, topicLister: deployStore, wsMft: wsMft, }, nil } func workerCustomResources(fs template.Reader) ([]*customresource.CustomResource, error) { crs, err := customresource.Worker(fs) if err != nil { return nil, fmt.Errorf("read custom resources for a %q: %w", manifestinfo.WorkerServiceType, err) } return crs, nil } // UploadArtifacts uploads the deployment artifacts such as the container image, custom resources, addons and env files. func (d *workerSvcDeployer) UploadArtifacts() (*UploadArtifactsOutput, error) { return d.uploadArtifacts(d.uploadContainerImages, d.uploadArtifactsToS3, d.uploadCustomResources) } type workerSvcDeployOutput struct { subs []manifest.TopicSubscription } // RecommendedActions returns the recommended actions after deployment. func (d *workerSvcDeployOutput) RecommendedActions() []string { if d.subs == nil { return nil } retrieveEnvVarCode := "const eventsQueueURI = process.env.COPILOT_QUEUE_URI" actionRetrieveEnvVar := fmt.Sprintf( `Update worker service code to leverage the injected environment variable "COPILOT_QUEUE_URI". In JavaScript you can write %s.`, color.HighlightCode(retrieveEnvVarCode), ) recs := []string{actionRetrieveEnvVar} topicQueueNames := d.buildWorkerQueueNames() if topicQueueNames == "" { return recs } retrieveTopicQueueEnvVarCode := fmt.Sprintf("const {%s} = JSON.parse(process.env.COPILOT_TOPIC_QUEUE_URIS)", topicQueueNames) actionRetrieveTopicQueues := fmt.Sprintf( `You can retrieve topic-specific queues by writing %s.`, color.HighlightCode(retrieveTopicQueueEnvVarCode), ) recs = append(recs, actionRetrieveTopicQueues) return recs } // GenerateCloudFormationTemplate generates a CloudFormation template and parameters for a workload. func (d *workerSvcDeployer) GenerateCloudFormationTemplate(in *GenerateCloudFormationTemplateInput) ( *GenerateCloudFormationTemplateOutput, error) { output, err := d.stackConfiguration(&in.StackRuntimeConfiguration) if err != nil { return nil, err } return d.generateCloudFormationTemplate(output.conf) } // DeployWorkload deploys a worker service using CloudFormation. func (d *workerSvcDeployer) DeployWorkload(in *DeployWorkloadInput) (ActionRecommender, error) { stackConfigOutput, err := d.stackConfiguration(&in.StackRuntimeConfiguration) if err != nil { return nil, err } if err := d.deploy(in.Options, stackConfigOutput.svcStackConfigurationOutput); err != nil { return nil, err } return &workerSvcDeployOutput{ subs: stackConfigOutput.subscriptions, }, nil } func (d *workerSvcDeployOutput) buildWorkerQueueNames() string { var queueNames []string for _, subscription := range d.subs { if subscription.Queue.IsEmpty() { continue } svc := template.StripNonAlphaNumFunc(aws.StringValue(subscription.Service)) topic := template.StripNonAlphaNumFunc(aws.StringValue(subscription.Name)) queueNames = append(queueNames, fmt.Sprintf("%s%sEventsQueue", svc, cases.Title(language.English).String(topic))) } return strings.Join(queueNames, ", ") } type workerSvcStackConfigurationOutput struct { svcStackConfigurationOutput subscriptions []manifest.TopicSubscription } func (d *workerSvcDeployer) stackConfiguration(in *StackRuntimeConfiguration) (*workerSvcStackConfigurationOutput, error) { rc, err := d.runtimeConfig(in) if err != nil { return nil, err } var topics []deploy.Topic topics, err = d.topicLister.ListSNSTopics(d.app.Name, d.env.Name) if err != nil { return nil, fmt.Errorf("get SNS topics for app %s and environment %s: %w", d.app.Name, d.env.Name, err) } var topicARNs []string for _, topic := range topics { topicARNs = append(topicARNs, topic.ARN()) } subs := d.wsMft.Subscriptions() if err = validateTopicsExist(subs, topicARNs, d.app.Name, d.env.Name); err != nil { return nil, err } var conf cloudformation.StackConfiguration switch { case d.newStack != nil: conf = d.newStack() default: conf, err = stack.NewWorkerService(stack.WorkerServiceConfig{ App: d.app, Env: d.env.Name, Manifest: d.wsMft, RawManifest: d.rawMft, ArtifactBucketName: d.resources.S3Bucket, RuntimeConfig: *rc, Addons: d.addons, }) if err != nil { return nil, fmt.Errorf("create stack configuration: %w", err) } } return &workerSvcStackConfigurationOutput{ svcStackConfigurationOutput: svcStackConfigurationOutput{ conf: cloudformation.WrapWithTemplateOverrider(conf, d.overrider), svcUpdater: d.newSvcUpdater(func(s *session.Session) serviceForceUpdater { return ecs.New(s) }), }, subscriptions: subs, }, nil } func validateTopicsExist(subscriptions []manifest.TopicSubscription, topicARNs []string, app, env string) error { validTopicResources := make([]string, 0, len(topicARNs)) for _, topic := range topicARNs { parsedTopic, err := arn.Parse(topic) if err != nil { continue } validTopicResources = append(validTopicResources, parsedTopic.Resource) } for _, ts := range subscriptions { topicName := fmt.Sprintf(resourceNameFormat, app, env, aws.StringValue(ts.Service), aws.StringValue(ts.Name)) if !contains(topicName, validTopicResources) { return fmt.Errorf(fmtErrTopicSubscriptionNotAllowed, topicName, env) } } return nil } func contains(s string, items []string) bool { for _, item := range items { if s == item { return true } } return false }
234
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package deploy import ( "errors" "fmt" "testing" "time" "github.com/aws/copilot-cli/internal/pkg/deploy/cloudformation" "github.com/aws/copilot-cli/internal/pkg/override" "gopkg.in/yaml.v3" "github.com/aws/aws-sdk-go/aws" "github.com/aws/aws-sdk-go/aws/session" "github.com/aws/copilot-cli/internal/pkg/cli/deploy/mocks" "github.com/aws/copilot-cli/internal/pkg/config" "github.com/aws/copilot-cli/internal/pkg/deploy" "github.com/aws/copilot-cli/internal/pkg/deploy/cloudformation/stack" "github.com/aws/copilot-cli/internal/pkg/manifest" "github.com/golang/mock/gomock" "github.com/stretchr/testify/require" ) func TestWorkerSvcDeployer_GenerateCloudFormationTemplate(t *testing.T) { t.Run("ensure resulting CloudFormation template custom resource paths are empty", func(t *testing.T) { // GIVEN worker := mockWorkerServiceDeployer() // WHEN out, err := worker.GenerateCloudFormationTemplate(&GenerateCloudFormationTemplateInput{}) // THEN require.NoError(t, err) type lambdaFn struct { Properties struct { Code struct { S3Bucket string `yaml:"S3bucket"` S3Key string `yaml:"S3Key"` } `yaml:"Code"` } `yaml:"Properties"` } dat := struct { Resources struct { EnvControllerFunction lambdaFn `yaml:"EnvControllerFunction"` BacklogPerTaskCalculatorFunction lambdaFn `yaml:"BacklogPerTaskCalculatorFunction"` } `yaml:"Resources"` }{} require.NoError(t, yaml.Unmarshal([]byte(out.Template), &dat)) require.Empty(t, dat.Resources.EnvControllerFunction.Properties.Code.S3Bucket) require.Empty(t, dat.Resources.EnvControllerFunction.Properties.Code.S3Key) require.Empty(t, dat.Resources.BacklogPerTaskCalculatorFunction.Properties.Code.S3Bucket) require.Empty(t, dat.Resources.BacklogPerTaskCalculatorFunction.Properties.Code.S3Key) }) } func TestSvcDeployOpts_stackConfiguration_worker(t *testing.T) { mockError := errors.New("some error") topic, _ := deploy.NewTopic("arn:aws:sns:us-west-2:0123456789012:mockApp-mockEnv-mockwkld-givesdogs", "mockApp", "mockEnv", "mockwkld") const ( mockAppName = "mockApp" mockEnvName = "mockEnv" mockName = "mockwkld" mockBucket = "mockBucket" ) mockResources := &stack.AppRegionalResources{ S3Bucket: mockBucket, } mockTopics := []manifest.TopicSubscription{ { Name: aws.String("givesdogs"), Service: aws.String("mockwkld"), }, } tests := map[string]struct { inAlias string inApp *config.Application inEnvironment *config.Environment inBuildRequire bool mock func(m *deployMocks) wantErr error wantedSubscriptions []manifest.TopicSubscription }{ "fail to get deployed topics": { inEnvironment: &config.Environment{ Name: mockEnvName, Region: "us-west-2", }, inApp: &config.Application{ Name: mockAppName, Domain: "mockDomain", }, mock: func(m *deployMocks) { m.mockEndpointGetter.EXPECT().ServiceDiscoveryEndpoint().Return("mockApp.local", nil) m.mockEnvVersionGetter.EXPECT().Version().Return("v1.42.0", nil) m.mockSNSTopicsLister.EXPECT().ListSNSTopics(mockAppName, mockEnvName).Return(nil, mockError) }, wantErr: fmt.Errorf("get SNS topics for app mockApp and environment mockEnv: %w", mockError), }, "success": { inEnvironment: &config.Environment{ Name: mockEnvName, Region: "us-west-2", }, inApp: &config.Application{ Name: mockAppName, Domain: "mockDomain", }, mock: func(m *deployMocks) { m.mockEndpointGetter.EXPECT().ServiceDiscoveryEndpoint().Return("mockEnv.mockApp.local", nil) m.mockEnvVersionGetter.EXPECT().Version().Return("v1.42.0", nil) m.mockSNSTopicsLister.EXPECT().ListSNSTopics(mockAppName, mockEnvName).Return([]deploy.Topic{ *topic, }, nil) }, wantedSubscriptions: mockTopics, }, } for name, tc := range tests { t.Run(name, func(t *testing.T) { ctrl := gomock.NewController(t) defer ctrl.Finish() m := &deployMocks{ mockEndpointGetter: mocks.NewMockendpointGetter(ctrl), mockSNSTopicsLister: mocks.NewMocksnsTopicsLister(ctrl), mockEnvVersionGetter: mocks.NewMockversionGetter(ctrl), } tc.mock(m) deployer := workerSvcDeployer{ svcDeployer: &svcDeployer{ workloadDeployer: &workloadDeployer{ name: mockName, app: tc.inApp, env: tc.inEnvironment, resources: mockResources, endpointGetter: m.mockEndpointGetter, envVersionGetter: m.mockEnvVersionGetter, }, newSvcUpdater: func(f func(*session.Session) serviceForceUpdater) serviceForceUpdater { return nil }, }, topicLister: m.mockSNSTopicsLister, wsMft: &manifest.WorkerService{ Workload: manifest.Workload{ Name: aws.String(mockName), }, WorkerServiceConfig: manifest.WorkerServiceConfig{ ImageConfig: manifest.ImageWithHealthcheck{ Image: manifest.Image{ ImageLocationOrBuild: manifest.ImageLocationOrBuild{ Build: manifest.BuildArgsOrString{BuildString: aws.String("/Dockerfile")}, }, }, }, Subscribe: manifest.SubscribeConfig{ Topics: mockTopics, }, }, }, newStack: func() cloudformation.StackConfiguration { return new(stubCloudFormationStack) }, } got, gotErr := deployer.stackConfiguration(&StackRuntimeConfiguration{}) if tc.wantErr != nil { require.EqualError(t, gotErr, tc.wantErr.Error()) } else { require.NoError(t, gotErr) require.ElementsMatch(t, tc.wantedSubscriptions, got.subscriptions) } }) } } func Test_validateTopicsExist(t *testing.T) { mockApp := "app" mockEnv := "env" mockAllowedTopics := []string{ "arn:aws:sqs:us-west-2:123456789012:app-env-database-events", "arn:aws:sqs:us-west-2:123456789012:app-env-database-orders", "arn:aws:sqs:us-west-2:123456789012:app-env-api-events", } duration10Hours := 10 * time.Hour testGoodTopics := []manifest.TopicSubscription{ { Name: aws.String("events"), Service: aws.String("database"), }, { Name: aws.String("orders"), Service: aws.String("database"), Queue: manifest.SQSQueueOrBool{ Advanced: manifest.SQSQueue{ Retention: &duration10Hours, }, }, }, } testCases := map[string]struct { inTopics []manifest.TopicSubscription inTopicARNs []string wantErr string }{ "empty subscriptions": { inTopics: nil, inTopicARNs: mockAllowedTopics, }, "topics are valid": { inTopics: testGoodTopics, inTopicARNs: mockAllowedTopics, }, "topic is invalid": { inTopics: testGoodTopics, inTopicARNs: []string{}, wantErr: "SNS topic app-env-database-events does not exist in environment env", }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { err := validateTopicsExist(tc.inTopics, tc.inTopicARNs, mockApp, mockEnv) if tc.wantErr != "" { require.EqualError(t, err, tc.wantErr) } else { require.NoError(t, err) } }) } } func mockWorkerServiceDeployer(opts ...func(*workerSvcDeployer)) *workerSvcDeployer { deployer := &workerSvcDeployer{ svcDeployer: &svcDeployer{ workloadDeployer: &workloadDeployer{ name: "example", app: &config.Application{ Name: "demo", }, env: &config.Environment{ App: "demo", Name: "test", }, resources: &stack.AppRegionalResources{}, envConfig: new(manifest.Environment), endpointGetter: &mockEndpointGetter{endpoint: "demo.test.local"}, envVersionGetter: &mockEnvVersionGetter{version: "v1.0.0"}, overrider: new(override.Noop), }, newSvcUpdater: func(f func(*session.Session) serviceForceUpdater) serviceForceUpdater { return nil }, now: func() time.Time { return time.Date(2020, 11, 23, 0, 0, 0, 0, time.UTC) }, }, topicLister: &mockTopicLister{}, wsMft: &manifest.WorkerService{ Workload: manifest.Workload{ Name: aws.String("example"), }, WorkerServiceConfig: manifest.WorkerServiceConfig{ TaskConfig: manifest.TaskConfig{ Count: manifest.Count{ Value: aws.Int(1), }, }, ImageConfig: manifest.ImageWithHealthcheck{ Image: manifest.Image{ ImageLocationOrBuild: manifest.ImageLocationOrBuild{ Build: manifest.BuildArgsOrString{BuildString: aws.String("/Dockerfile")}, }, }, }, }, }, newStack: func() cloudformation.StackConfiguration { return new(stubCloudFormationStack) }, } for _, opt := range opts { opt(deployer) } return deployer }
297
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package deploy import ( "bytes" "context" "errors" "fmt" "io" "os" "path/filepath" "strings" "sync" "time" "github.com/aws/aws-sdk-go/aws" "github.com/aws/aws-sdk-go/aws/session" "github.com/aws/aws-sdk-go/service/ssm" "github.com/aws/copilot-cli/internal/pkg/addon" awscloudformation "github.com/aws/copilot-cli/internal/pkg/aws/cloudformation" "github.com/aws/copilot-cli/internal/pkg/aws/ecr" "github.com/aws/copilot-cli/internal/pkg/aws/identity" "github.com/aws/copilot-cli/internal/pkg/aws/partitions" "github.com/aws/copilot-cli/internal/pkg/aws/s3" "github.com/aws/copilot-cli/internal/pkg/aws/sessions" "github.com/aws/copilot-cli/internal/pkg/config" "github.com/aws/copilot-cli/internal/pkg/deploy/cloudformation" "github.com/aws/copilot-cli/internal/pkg/deploy/cloudformation/stack" "github.com/aws/copilot-cli/internal/pkg/deploy/upload/customresource" "github.com/aws/copilot-cli/internal/pkg/describe" "github.com/aws/copilot-cli/internal/pkg/docker/dockerengine" "github.com/aws/copilot-cli/internal/pkg/exec" "github.com/aws/copilot-cli/internal/pkg/manifest" "github.com/aws/copilot-cli/internal/pkg/repository" "github.com/aws/copilot-cli/internal/pkg/template" "github.com/aws/copilot-cli/internal/pkg/template/artifactpath" "github.com/aws/copilot-cli/internal/pkg/template/diff" "github.com/aws/copilot-cli/internal/pkg/term/color" "github.com/aws/copilot-cli/internal/pkg/term/cursor" "github.com/aws/copilot-cli/internal/pkg/term/log" termprogress "github.com/aws/copilot-cli/internal/pkg/term/progress" "github.com/aws/copilot-cli/internal/pkg/term/syncbuffer" "github.com/aws/copilot-cli/internal/pkg/version" "github.com/aws/copilot-cli/internal/pkg/workspace" "github.com/spf13/afero" "golang.org/x/sync/errgroup" ) const ( fmtForceUpdateSvcStart = "Forcing an update for service %s from environment %s" fmtForceUpdateSvcFailed = "Failed to force an update for service %s from environment %s: %v.\n" fmtForceUpdateSvcComplete = "Forced an update for service %s from environment %s.\n" ) const ( imageTagLatest = "latest" ) const ( labelForBuilder = "com.aws.copilot.image.builder" labelForVersion = "com.aws.copilot.image.version" labelForContainerName = "com.aws.copilot.image.container.name" ) const ( paddingInSpacesForBuildAndPush = 5 pollIntervalForBuildAndPush = 60 * time.Millisecond defaultNumLinesForBuildAndPush = 5 ) // ActionRecommender contains methods that output action recommendation. type ActionRecommender interface { RecommendedActions() []string } type noopActionRecommender struct{} func (noopActionRecommender) RecommendedActions() []string { return nil } type repositoryService interface { Login() (string, error) BuildAndPush(ctx context.Context, args *dockerengine.BuildArguments, w io.Writer) (string, error) } type templater interface { Template() (string, error) } type stackBuilder interface { templater Parameters() (string, error) Package(addon.PackageConfig) error } type stackSerializer interface { templater SerializedParameters() (string, error) } type endpointGetter interface { ServiceDiscoveryEndpoint() (string, error) } type serviceDeployer interface { DeployService(conf cloudformation.StackConfiguration, bucketName string, opts ...awscloudformation.StackOption) error } type deployedTemplateGetter interface { Template(stackName string) (string, error) } type spinner interface { Start(label string) Stop(label string) } type labeledTermPrinter interface { IsDone() bool Print() } type dockerEngineRunChecker interface { CheckDockerEngineRunning() error } // StackRuntimeConfiguration contains runtime configuration for a workload CloudFormation stack. type StackRuntimeConfiguration struct { ImageDigests map[string]ContainerImageIdentifier // Container name to image. EnvFileARNs map[string]string AddonsURL string RootUserARN string Tags map[string]string CustomResourceURLs map[string]string StaticSiteAssetMappingURL string } // DeployWorkloadInput is the input of DeployWorkload. type DeployWorkloadInput struct { StackRuntimeConfiguration Options } // Options specifies options for the deployment. type Options struct { ForceNewUpdate bool DisableRollback bool } // GenerateCloudFormationTemplateInput is the input of GenerateCloudFormationTemplate. type GenerateCloudFormationTemplateInput struct { StackRuntimeConfiguration } // GenerateCloudFormationTemplateOutput is the output of GenerateCloudFormationTemplate. type GenerateCloudFormationTemplateOutput struct { Template string Parameters string } type workloadDeployer struct { name string app *config.Application env *config.Environment image ContainerImageIdentifier resources *stack.AppRegionalResources mft interface{} rawMft []byte workspacePath string // Dependencies. fs afero.Fs s3Client uploader addons stackBuilder repository repositoryService deployer serviceDeployer tmplGetter deployedTemplateGetter endpointGetter endpointGetter spinner spinner templateFS template.Reader envVersionGetter versionGetter overrider Overrider docker dockerEngineRunChecker customResources customResourcesFunc labeledTermPrinter func(fw syncbuffer.FileWriter, bufs []*syncbuffer.LabeledSyncBuffer, opts ...syncbuffer.LabeledTermPrinterOption) labeledTermPrinter // Cached variables. defaultSess *session.Session defaultSessWithEnvRegion *session.Session envSess *session.Session store *config.Store envConfig *manifest.Environment } // WorkloadDeployerInput is the input to for workloadDeployer constructor. type WorkloadDeployerInput struct { SessionProvider *sessions.Provider Name string App *config.Application Env *config.Environment Image ContainerImageIdentifier Mft interface{} // Interpolated, applied, and unmarshaled manifest. RawMft []byte // Content of the manifest file without any transformations. EnvVersionGetter versionGetter Overrider Overrider // Workload specific configuration. customResources customResourcesFunc } // ContainerImageIdentifier is the configuration of the image digest and tags of an ECR image. type ContainerImageIdentifier struct { Digest string CustomTag string GitShortCommitTag string } // newWorkloadDeployer is the constructor for workloadDeployer. func newWorkloadDeployer(in *WorkloadDeployerInput) (*workloadDeployer, error) { ws, err := workspace.Use(afero.NewOsFs()) if err != nil { return nil, err } defaultSession, err := in.SessionProvider.Default() if err != nil { return nil, fmt.Errorf("create default: %w", err) } envSession, err := in.SessionProvider.FromRole(in.Env.ManagerRoleARN, in.Env.Region) if err != nil { return nil, fmt.Errorf("create env session with region %s: %w", in.Env.Region, err) } defaultSessEnvRegion, err := in.SessionProvider.DefaultWithRegion(in.Env.Region) if err != nil { return nil, fmt.Errorf("create default session with region %s: %w", in.Env.Region, err) } resources, err := cloudformation.New(defaultSession, cloudformation.WithProgressTracker(os.Stderr)).GetAppResourcesByRegion(in.App, in.Env.Region) if err != nil { return nil, fmt.Errorf("get application %s resources from region %s: %w", in.App.Name, in.Env.Region, err) } var addons stackBuilder addons, err = addon.ParseFromWorkload(in.Name, ws) if err != nil { var notFoundErr *addon.ErrAddonsNotFound if !errors.As(err, &notFoundErr) { return nil, fmt.Errorf("parse addons stack for workload %s: %w", in.Name, err) } addons = nil // so that we can check for no addons with nil comparison } repoName := fmt.Sprintf("%s/%s", in.App.Name, in.Name) repository := repository.NewWithURI( ecr.New(defaultSessEnvRegion), repoName, resources.RepositoryURLs[in.Name]) store := config.NewSSMStore(identity.New(defaultSession), ssm.New(defaultSession), aws.StringValue(defaultSession.Config.Region)) envDescriber, err := describe.NewEnvDescriber(describe.NewEnvDescriberConfig{ App: in.App.Name, Env: in.Env.Name, ConfigStore: store, }) if err != nil { return nil, err } mft, err := envDescriber.Manifest() if err != nil { return nil, fmt.Errorf("read the manifest used to deploy environment %s: %w", in.Env.Name, err) } envConfig, err := manifest.UnmarshalEnvironment(mft) if err != nil { return nil, fmt.Errorf("unmarshal the manifest used to deploy environment %s: %w", in.Env.Name, err) } cfn := cloudformation.New(envSession, cloudformation.WithProgressTracker(os.Stderr)) labeledTermPrinter := func(fw syncbuffer.FileWriter, bufs []*syncbuffer.LabeledSyncBuffer, opts ...syncbuffer.LabeledTermPrinterOption) labeledTermPrinter { return syncbuffer.NewLabeledTermPrinter(fw, bufs, opts...) } docker := dockerengine.New(exec.NewCmd()) return &workloadDeployer{ name: in.Name, app: in.App, env: in.Env, image: in.Image, resources: resources, workspacePath: ws.Path(), fs: afero.NewOsFs(), s3Client: s3.New(envSession), addons: addons, repository: repository, deployer: cfn, tmplGetter: cfn, endpointGetter: envDescriber, spinner: termprogress.NewSpinner(log.DiagnosticWriter), templateFS: template.New(), envVersionGetter: in.EnvVersionGetter, overrider: in.Overrider, docker: docker, customResources: in.customResources, defaultSess: defaultSession, defaultSessWithEnvRegion: defaultSessEnvRegion, envSess: envSession, store: store, envConfig: envConfig, labeledTermPrinter: labeledTermPrinter, mft: in.Mft, rawMft: in.RawMft, }, nil } // DeployDiff returns the stringified diff of the template against the deployed template of the workload. func (d *workloadDeployer) DeployDiff(template string) (string, error) { tmpl, err := d.tmplGetter.Template(stack.NameForWorkload(d.app.Name, d.env.Name, d.name)) if err != nil { var errNotFound *awscloudformation.ErrStackNotFound if !errors.As(err, &errNotFound) { return "", fmt.Errorf("retrieve the deployed template for %q: %w", d.name, err) } tmpl = "" } diffTree, err := diff.From(tmpl).ParseWithCFNOverriders([]byte(template)) if err != nil { return "", fmt.Errorf("parse the diff against the deployed %q in environment %q: %w", d.name, d.env.Name, err) } buf := strings.Builder{} if err := diffTree.Write(&buf); err != nil { return "", err } return buf.String(), nil } // AddonsTemplate returns this workload's addon template. func (d *workloadDeployer) AddonsTemplate() (string, error) { if d.addons == nil { return "", nil } return d.addons.Template() } func (d *workloadDeployer) generateCloudFormationTemplate(conf stackSerializer) ( *GenerateCloudFormationTemplateOutput, error) { tpl, err := conf.Template() if err != nil { return nil, err } params, err := conf.SerializedParameters() if err != nil { return nil, fmt.Errorf("generate stack template parameters: %w", err) } return &GenerateCloudFormationTemplateOutput{ Template: tpl, Parameters: params, }, nil } type forceDeployInput struct { spinner spinner svcUpdater serviceForceUpdater } func (d *workloadDeployer) forceDeploy(in *forceDeployInput) error { in.spinner.Start(fmt.Sprintf(fmtForceUpdateSvcStart, color.HighlightUserInput(d.name), color.HighlightUserInput(d.env.Name))) if err := in.svcUpdater.ForceUpdateService(d.app.Name, d.env.Name, d.name); err != nil { errLog := fmt.Sprintf(fmtForceUpdateSvcFailed, color.HighlightUserInput(d.name), color.HighlightUserInput(d.env.Name), err) var terr timeoutError if errors.As(err, &terr) { errLog = fmt.Sprintf("%s Run %s to check for the fail reason.\n", errLog, color.HighlightCode(fmt.Sprintf("copilot svc status --name %s --env %s", d.name, d.env.Name))) } in.spinner.Stop(log.Serror(errLog)) return fmt.Errorf("force an update for service %s: %w", d.name, err) } in.spinner.Stop(log.Ssuccessf(fmtForceUpdateSvcComplete, color.HighlightUserInput(d.name), color.HighlightUserInput(d.env.Name))) return nil } // Tag returns the tag that should be used to reference the image. // If the user provided their own tag then just use that // Otherwise, return git short commit id. func (img ContainerImageIdentifier) Tag() string { if img.CustomTag != "" { return img.CustomTag } return img.GitShortCommitTag } func (d *workloadDeployer) uploadContainerImages(out *UploadArtifactsOutput) error { // If it is built from local Dockerfile, build and push to the ECR repo. buildArgsPerContainer, err := buildArgsPerContainer(d.name, d.workspacePath, d.image, d.mft) if err != nil { return err } if len(buildArgsPerContainer) == 0 { return nil } if err := d.docker.CheckDockerEngineRunning(); err != nil { return fmt.Errorf("check if docker engine is running: %w", err) } uri, err := d.repository.Login() if err != nil { return fmt.Errorf("login to image repository: %w", err) } var digestsMu sync.Mutex out.ImageDigests = make(map[string]ContainerImageIdentifier, len(buildArgsPerContainer)) var labeledBuffers []*syncbuffer.LabeledSyncBuffer g, ctx := errgroup.WithContext(context.Background()) cursor := cursor.New() cursor.Hide() for name, buildArgs := range buildArgsPerContainer { // create a copy of loop variables to avoid data race. name := name buildArgs := buildArgs buildArgs.URI = uri buildArgsList, err := buildArgs.GenerateDockerBuildArgs(dockerengine.New(exec.NewCmd())) if err != nil { return fmt.Errorf("generate docker build args for %q: %w", name, err) } buf := syncbuffer.New() labeledBuffers = append(labeledBuffers, buf.WithLabel(fmt.Sprintf("Building your container image %q: docker %s", name, strings.Join(buildArgsList, " ")))) pr, pw := io.Pipe() g.Go(func() error { defer pw.Close() digest, err := d.repository.BuildAndPush(ctx, buildArgs, pw) if err != nil { return fmt.Errorf("build and push the image %q: %w", name, err) } digestsMu.Lock() defer digestsMu.Unlock() out.ImageDigests[name] = ContainerImageIdentifier{ Digest: digest, CustomTag: d.image.CustomTag, GitShortCommitTag: d.image.GitShortCommitTag, } return nil }) g.Go(func() error { if err := buf.Copy(pr); err != nil { return fmt.Errorf("copy build and push output for %q: %w", name, err) } return nil }) } opts := []syncbuffer.LabeledTermPrinterOption{syncbuffer.WithPadding(paddingInSpacesForBuildAndPush)} if os.Getenv("CI") != "true" { opts = append(opts, syncbuffer.WithNumLines(defaultNumLinesForBuildAndPush)) } ltp := d.labeledTermPrinter(os.Stderr, labeledBuffers, opts...) g.Go(func() error { for { ltp.Print() if ltp.IsDone() { return nil } select { case <-ctx.Done(): return nil case <-time.After(pollIntervalForBuildAndPush): } } }) if err := g.Wait(); err != nil { return err } return nil } func buildArgsPerContainer(name, workspacePath string, img ContainerImageIdentifier, unmarshaledManifest interface{}) (map[string]*dockerengine.BuildArguments, error) { type dfArgs interface { BuildArgs(rootDirectory string) (map[string]*manifest.DockerBuildArgs, error) ContainerPlatform() string } mf, ok := unmarshaledManifest.(dfArgs) if !ok { return nil, fmt.Errorf("%T does not have required methods BuildArgs() and ContainerPlatform()", name) } argsPerContainer, err := mf.BuildArgs(workspacePath) if err != nil { return nil, fmt.Errorf("check if manifest requires building from local Dockerfile: %w", err) } dArgs := make(map[string]*dockerengine.BuildArguments, len(argsPerContainer)) for container, buildArgs := range argsPerContainer { tags := []string{imageTagLatest} if img.Tag() != "" { tags = append(tags, img.Tag()) } if container != name { tags = []string{fmt.Sprintf("%s-%s", container, imageTagLatest)} if img.GitShortCommitTag != "" { tags = append(tags, fmt.Sprintf("%s-%s", container, img.GitShortCommitTag)) } } labels := make(map[string]string, 3) labels[labelForBuilder] = "copilot-cli" if version.Version != "" { labels[labelForVersion] = version.Version } labels[labelForContainerName] = container dArgs[container] = &dockerengine.BuildArguments{ Dockerfile: aws.StringValue(buildArgs.Dockerfile), Context: aws.StringValue(buildArgs.Context), Args: buildArgs.Args, CacheFrom: buildArgs.CacheFrom, Target: aws.StringValue(buildArgs.Target), Platform: mf.ContainerPlatform(), Tags: tags, Labels: labels, } } return dArgs, nil } func (d *workloadDeployer) uploadArtifactsToS3(out *UploadArtifactsOutput) error { var err error out.EnvFileARNs, err = d.pushEnvFilesToS3Bucket(&pushEnvFilesToS3BucketInput{ fs: d.fs, uploader: d.s3Client, }) if err != nil { return err } out.AddonsURL, err = d.pushAddonsTemplateToS3Bucket() if err != nil { return err } return nil } type customResourcesFunc func(fs template.Reader) ([]*customresource.CustomResource, error) // UploadArtifactsOutput is the output of UploadArtifacts. type UploadArtifactsOutput struct { ImageDigests map[string]ContainerImageIdentifier // Container name to image. EnvFileARNs map[string]string // map[container name]envFileARN AddonsURL string CustomResourceURLs map[string]string StaticSiteAssetMappingLocation string } // uploadArtifactFunc uploads an artifact and updates out // with any relevant information to be returned by uploadArtifacts. type uploadArtifactFunc func(out *UploadArtifactsOutput) error // uploadArtifacts runs each of the uploadArtifact functions sequentially and returns // the output built by each of those functions. It short-circuts and returns // the error if one of steps returns an error. func (d *workloadDeployer) uploadArtifacts(steps ...uploadArtifactFunc) (*UploadArtifactsOutput, error) { out := &UploadArtifactsOutput{} for _, step := range steps { if err := step(out); err != nil { return nil, err } } return out, nil } func (d *workloadDeployer) uploadCustomResources(out *UploadArtifactsOutput) error { crs, err := d.customResources(d.templateFS) if err != nil { return err } urls, err := customresource.Upload(func(key string, contents io.Reader) (string, error) { return d.s3Client.Upload(d.resources.S3Bucket, key, contents) }, crs) if err != nil { return fmt.Errorf("upload custom resources for %q: %w", d.name, err) } out.CustomResourceURLs = urls return nil } type pushEnvFilesToS3BucketInput struct { fs afero.Fs uploader uploader } // pushEnvFilesToS3Bucket collects all environment files required by the workload container and any sidecars, // uploads each one exactly once, and returns a map structured in the following way. map[containerName]envFileARN // Example content: // // { // "frontend": "arn:aws:s3:::bucket/key1", // "firelens_log_router": "arn:aws:s3:::bucket/key2", // "nginx": "arn:aws:s3:::bucket/key1" // } func (d *workloadDeployer) pushEnvFilesToS3Bucket(in *pushEnvFilesToS3BucketInput) (map[string]string, error) { envFilesByContainer := envFiles(d.mft) uniqueEnvFiles := make(map[string][]string) // Invert the map of containers to env files to get the unique env files to upload. for container, path := range envFilesByContainer { if path == "" { continue } if containers, ok := uniqueEnvFiles[path]; !ok { uniqueEnvFiles[path] = []string{container} } else { uniqueEnvFiles[path] = append(containers, container) } } if len(uniqueEnvFiles) == 0 { return nil, nil } // Upload each file to s3 exactly once and generate its ARN. // Save those ARNs in a map from container name to env file ARN and return. envFileARNs := make(map[string]string) for path, containers := range uniqueEnvFiles { content, err := afero.ReadFile(in.fs, filepath.Join(d.workspacePath, path)) if err != nil { return nil, fmt.Errorf("read env file %s: %w", path, err) } reader := bytes.NewReader(content) url, err := in.uploader.Upload(d.resources.S3Bucket, artifactpath.EnvFiles(path, content), reader) if err != nil { return nil, fmt.Errorf("put env file %s artifact to bucket %s: %w", path, d.resources.S3Bucket, err) } bucket, key, err := s3.ParseURL(url) if err != nil { return nil, fmt.Errorf("parse s3 url: %w", err) } // The app and environment are always within the same partition. partition, err := partitions.Region(d.env.Region).Partition() if err != nil { return nil, err } for _, container := range containers { envFileARNs[container] = s3.FormatARN(partition.ID(), fmt.Sprintf("%s/%s", bucket, key)) } } return envFileARNs, nil } // envFiles gets a map from container name to env file for all containers in the task, // including sidecars and Firelens logging. func envFiles(unmarshaledManifest interface{}) map[string]string { type envFile interface { EnvFiles() map[string]string } mf, ok := unmarshaledManifest.(envFile) if ok { return mf.EnvFiles() } // If the manifest type doesn't support envFiles, ignore and move forward. return nil } func (d *workloadDeployer) pushAddonsTemplateToS3Bucket() (string, error) { if d.addons == nil { return "", nil } config := addon.PackageConfig{ Bucket: d.resources.S3Bucket, Uploader: d.s3Client, WorkspacePath: d.workspacePath, FS: afero.NewOsFs(), } if err := d.addons.Package(config); err != nil { return "", fmt.Errorf("package addons: %w", err) } tmpl, err := d.addons.Template() if err != nil { return "", fmt.Errorf("retrieve addons template: %w", err) } reader := strings.NewReader(tmpl) url, err := d.s3Client.Upload(d.resources.S3Bucket, artifactpath.Addons(d.name, []byte(tmpl)), reader) if err != nil { return "", fmt.Errorf("put addons artifact to bucket %s: %w", d.resources.S3Bucket, err) } return url, nil } func (d *workloadDeployer) runtimeConfig(in *StackRuntimeConfiguration) (*stack.RuntimeConfig, error) { endpoint, err := d.endpointGetter.ServiceDiscoveryEndpoint() if err != nil { return nil, fmt.Errorf("get service discovery endpoint: %w", err) } envVersion, err := d.envVersionGetter.Version() if err != nil { return nil, fmt.Errorf("get version of environment %q: %w", d.env.Name, err) } if len(in.ImageDigests) == 0 { return &stack.RuntimeConfig{ AddonsTemplateURL: in.AddonsURL, EnvFileARNs: in.EnvFileARNs, AdditionalTags: in.Tags, ServiceDiscoveryEndpoint: endpoint, AccountID: d.env.AccountID, Region: d.env.Region, CustomResourcesURL: in.CustomResourceURLs, EnvVersion: envVersion, }, nil } images := make(map[string]stack.ECRImage, len(in.ImageDigests)) for container, img := range in.ImageDigests { // Currently we do not tag sidecar container images with custom tag provided by the user. // This is the reason for having different ImageTag for main and sidecar container images // that is needed to create CloudFormation stack. imageTag := img.Tag() if container != d.name { imageTag = img.GitShortCommitTag } images[container] = stack.ECRImage{ RepoURL: d.resources.RepositoryURLs[d.name], ImageTag: imageTag, Digest: img.Digest, MainContainerName: d.name, ContainerName: container, } } return &stack.RuntimeConfig{ AddonsTemplateURL: in.AddonsURL, EnvFileARNs: in.EnvFileARNs, AdditionalTags: in.Tags, PushedImages: images, ServiceDiscoveryEndpoint: endpoint, AccountID: d.env.AccountID, Region: d.env.Region, CustomResourcesURL: in.CustomResourceURLs, EnvVersion: envVersion, }, nil } type timeoutError interface { error Timeout() bool }
735
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package deploy import ( "bytes" "errors" "fmt" "io" "path/filepath" "strings" "testing" "time" cloudformation0 "github.com/aws/copilot-cli/internal/pkg/deploy/cloudformation" "github.com/aws/copilot-cli/internal/pkg/version" "github.com/spf13/afero" "github.com/aws/aws-sdk-go/aws" "github.com/aws/aws-sdk-go/aws/session" sdkcfn "github.com/aws/aws-sdk-go/service/cloudformation" "github.com/aws/copilot-cli/internal/pkg/aws/cloudformation" "github.com/aws/copilot-cli/internal/pkg/aws/ecs" "github.com/aws/copilot-cli/internal/pkg/cli/deploy/mocks" "github.com/aws/copilot-cli/internal/pkg/config" "github.com/aws/copilot-cli/internal/pkg/deploy" "github.com/aws/copilot-cli/internal/pkg/deploy/cloudformation/stack" "github.com/aws/copilot-cli/internal/pkg/deploy/upload/customresource" "github.com/aws/copilot-cli/internal/pkg/docker/dockerengine" "github.com/aws/copilot-cli/internal/pkg/manifest" "github.com/aws/copilot-cli/internal/pkg/override" "github.com/aws/copilot-cli/internal/pkg/template" "github.com/aws/copilot-cli/internal/pkg/term/color" "github.com/aws/copilot-cli/internal/pkg/term/log" "github.com/aws/copilot-cli/internal/pkg/term/syncbuffer" "github.com/golang/mock/gomock" "github.com/stretchr/testify/require" ) type endpointGetterDouble struct { ServiceDiscoveryEndpointFn func() (string, error) } func (d *endpointGetterDouble) ServiceDiscoveryEndpoint() (string, error) { return d.ServiceDiscoveryEndpointFn() } type deployMocks struct { mockRepositoryService *mocks.MockrepositoryService mockEndpointGetter *mocks.MockendpointGetter mockSpinner *mocks.Mockspinner mockPublicCIDRBlocksGetter *mocks.MockpublicCIDRBlocksGetter mockSNSTopicsLister *mocks.MocksnsTopicsLister mockServiceDeployer *mocks.MockserviceDeployer mockServiceForceUpdater *mocks.MockserviceForceUpdater mockAddons *mocks.MockstackBuilder mockUploader *mocks.Mockuploader mockAppVersionGetter *mocks.MockversionGetter mockEnvVersionGetter *mocks.MockversionGetter mockFileSystem afero.Fs mockValidator *mocks.MockaliasCertValidator mockLabeledTermPrinter *mocks.MocklabeledTermPrinter mockdockerEngineRunChecker *mocks.MockdockerEngineRunChecker } type mockTemplateFS struct { read func(path string) (*template.Content, error) } // Read implements the template.Reader interface. func (fs *mockTemplateFS) Read(path string) (*template.Content, error) { return fs.read(path) } func fakeTemplateFS() *mockTemplateFS { return &mockTemplateFS{ read: func(path string) (*template.Content, error) { return &template.Content{ Buffer: bytes.NewBufferString("fake content"), }, nil }, } } type mockEndpointGetter struct { endpoint string err error } // ServiceDiscoveryEndpoint implements the endpointGetter interface. func (m *mockEndpointGetter) ServiceDiscoveryEndpoint() (string, error) { return m.endpoint, m.err } type mockEnvVersionGetter struct { version string err error } // Version implements the envVersionGetter interface. func (m *mockEnvVersionGetter) Version() (string, error) { return m.version, m.err } type mockTopicLister struct { topics []deploy.Topic err error } // ListSNSTopics implements the snsTopicsLister interface. func (m *mockTopicLister) ListSNSTopics(_, _ string) ([]deploy.Topic, error) { return m.topics, m.err } type mockWorkloadMft struct { fileName string dockerBuildArgs map[string]*manifest.DockerBuildArgs workloadName string customEnvFiles map[string]string } func (m *mockWorkloadMft) EnvFiles() map[string]string { if m.customEnvFiles != nil { return m.customEnvFiles } return map[string]string{ m.workloadName: m.fileName, } } func (m *mockWorkloadMft) BuildArgs(rootDirectory string) (map[string]*manifest.DockerBuildArgs, error) { return m.dockerBuildArgs, nil } func (m *mockWorkloadMft) ContainerPlatform() string { return "mockContainerPlatform" } // stubCloudFormationStack implements the cloudformation.StackConfiguration interface. type stubCloudFormationStack struct{} func (s *stubCloudFormationStack) StackName() string { return "demo" } func (s *stubCloudFormationStack) Template() (string, error) { return ` Resources: Queue: Type: AWS::SQS::Queue`, nil } func (s *stubCloudFormationStack) Parameters() ([]*sdkcfn.Parameter, error) { return []*sdkcfn.Parameter{}, nil } func (s *stubCloudFormationStack) Tags() []*sdkcfn.Tag { return []*sdkcfn.Tag{} } func (s *stubCloudFormationStack) SerializedParameters() (string, error) { return "", nil } func mockEnvFilePath(path string) string { return fmt.Sprintf("%s/%s/%s/%s.env", "manual", "env-files", path, "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855") } func TestWorkloadDeployer_UploadArtifacts(t *testing.T) { const ( mockName = "mockWkld" mockEnvName = "test" mockAppName = "press" mockURI = "mockRepoURI" mockWorkspacePath = "." mockEnvFile = "foo.env" mockS3Bucket = "mockBucket" mockAddonsS3URL = "https://mockS3DomainName/mockPath" mockBadEnvFileS3URL = "badURL" mockEnvFileS3URL = "https://stackset-demo-infrastruc-pipelinebuiltartifactbuc-11dj7ctf52wyf.s3.us-west-2.amazonaws.com/manual/1638391936/env" mockEnvFileS3URL2 = "https://stackset-demo-infrastruc-pipelinebuiltartifactbuc-11dj7ctf52wyf.s3.us-west-2.amazonaws.com/manual/1638391936/envbar" mockEnvFileS3ARN = "arn:aws:s3:::stackset-demo-infrastruc-pipelinebuiltartifactbuc-11dj7ctf52wyf/manual/1638391936/env" mockEnvFileS3ARN2 = "arn:aws:s3:::stackset-demo-infrastruc-pipelinebuiltartifactbuc-11dj7ctf52wyf/manual/1638391936/envbar" ) var mockEnvFilesOutput = map[string]string{"mockWkld": mockEnvFileS3ARN} mockResources := &stack.AppRegionalResources{ S3Bucket: mockS3Bucket, } mockAddonPath := fmt.Sprintf("%s/%s/%s/%s.yml", "manual", "addons", mockName, "1307990e6ba5ca145eb35e99182a9bec46531bc54ddf656a602c780fa0240dee") mockError := errors.New("some error") type artifactsUploader interface { UploadArtifacts() (*UploadArtifactsOutput, error) } tests := map[string]struct { inEnvFile string customEnvFiles map[string]string inRegion string inMockUserTag string inMockGitTag string inDockerBuildArgs map[string]*manifest.DockerBuildArgs mock func(t *testing.T, m *deployMocks) mockServiceDeployer func(deployer *workloadDeployer) artifactsUploader customResourcesFunc customResourcesFunc wantAddonsURL string wantEnvFileARNs map[string]string wantImages map[string]ContainerImageIdentifier wantBuildRequired bool wantErr error }{ "error if docker engine is not running": { inMockUserTag: "v1.0", inDockerBuildArgs: map[string]*manifest.DockerBuildArgs{ "mockWkld": { Dockerfile: aws.String("mockDockerfile"), Context: aws.String("mockContext"), }, }, mock: func(t *testing.T, m *deployMocks) { m.mockdockerEngineRunChecker.EXPECT().CheckDockerEngineRunning().Return(errors.New("some error")) }, wantErr: fmt.Errorf("check if docker engine is running: some error"), }, "error if failed to build and push image": { inMockUserTag: "v1.0", inDockerBuildArgs: map[string]*manifest.DockerBuildArgs{ "mockWkld": { Dockerfile: aws.String("mockDockerfile"), Context: aws.String("mockContext"), }, }, mock: func(t *testing.T, m *deployMocks) { m.mockdockerEngineRunChecker.EXPECT().CheckDockerEngineRunning().Return(nil) m.mockRepositoryService.EXPECT().Login().Return(mockURI, nil) m.mockRepositoryService.EXPECT().BuildAndPush(gomock.Any(), &dockerengine.BuildArguments{ URI: mockURI, Dockerfile: "mockDockerfile", Context: "mockContext", Platform: "mockContainerPlatform", Tags: []string{"latest", "v1.0"}, Labels: map[string]string{ "com.aws.copilot.image.builder": "copilot-cli", "com.aws.copilot.image.container.name": "mockWkld", }, }, gomock.Any()).Return("", mockError) m.mockLabeledTermPrinter.EXPECT().IsDone().Return(true).AnyTimes() m.mockLabeledTermPrinter.EXPECT().Print().AnyTimes() }, wantErr: fmt.Errorf("build and push the image \"mockWkld\": some error"), }, "build and push image with usertag successfully": { inMockUserTag: "v1.0", inMockGitTag: "gitTag", inDockerBuildArgs: map[string]*manifest.DockerBuildArgs{ "mockWkld": { Dockerfile: aws.String("mockDockerfile"), Context: aws.String("mockContext"), }, }, mock: func(t *testing.T, m *deployMocks) { m.mockdockerEngineRunChecker.EXPECT().CheckDockerEngineRunning().Return(nil) m.mockRepositoryService.EXPECT().Login().Return(mockURI, nil) m.mockRepositoryService.EXPECT().BuildAndPush(gomock.Any(), &dockerengine.BuildArguments{ URI: mockURI, Dockerfile: "mockDockerfile", Context: "mockContext", Platform: "mockContainerPlatform", Tags: []string{"latest", "v1.0"}, Labels: map[string]string{ "com.aws.copilot.image.builder": "copilot-cli", "com.aws.copilot.image.container.name": "mockWkld", }, }, gomock.Any()).Return("mockDigest", nil) m.mockLabeledTermPrinter.EXPECT().IsDone().Return(true).AnyTimes() m.mockLabeledTermPrinter.EXPECT().Print().AnyTimes() m.mockAddons = nil }, wantImages: map[string]ContainerImageIdentifier{ mockName: { Digest: "mockDigest", CustomTag: "v1.0", GitShortCommitTag: "gitTag", }, }, }, "build and push image with gitshortcommit successfully": { inMockGitTag: "gitTag", inDockerBuildArgs: map[string]*manifest.DockerBuildArgs{ "mockWkld": { Dockerfile: aws.String("mockDockerfile"), Context: aws.String("mockContext"), }, }, mock: func(t *testing.T, m *deployMocks) { m.mockdockerEngineRunChecker.EXPECT().CheckDockerEngineRunning().Return(nil) m.mockRepositoryService.EXPECT().Login().Return(mockURI, nil) m.mockRepositoryService.EXPECT().BuildAndPush(gomock.Any(), &dockerengine.BuildArguments{ URI: mockURI, Dockerfile: "mockDockerfile", Context: "mockContext", Platform: "mockContainerPlatform", Tags: []string{"latest", "gitTag"}, Labels: map[string]string{ "com.aws.copilot.image.builder": "copilot-cli", "com.aws.copilot.image.container.name": "mockWkld", }, }, gomock.Any()).Return("mockDigest", nil) m.mockLabeledTermPrinter.EXPECT().IsDone().Return(true).AnyTimes() m.mockLabeledTermPrinter.EXPECT().Print().AnyTimes() m.mockAddons = nil }, wantImages: map[string]ContainerImageIdentifier{ mockName: { Digest: "mockDigest", GitShortCommitTag: "gitTag", }, }, }, "build and push sidecar container images only with git tag succesfully": { inDockerBuildArgs: map[string]*manifest.DockerBuildArgs{ "nginx": { Dockerfile: aws.String("sidecarMockDockerfile"), Context: aws.String("sidecarMockContext"), }, "logging": { Dockerfile: aws.String("web/Dockerfile"), Context: aws.String("Users/bowie"), }, }, inMockGitTag: "gitTag", mock: func(t *testing.T, m *deployMocks) { m.mockdockerEngineRunChecker.EXPECT().CheckDockerEngineRunning().Return(nil) m.mockRepositoryService.EXPECT().Login().Return(mockURI, nil) m.mockRepositoryService.EXPECT().BuildAndPush(gomock.Any(), &dockerengine.BuildArguments{ URI: mockURI, Dockerfile: "sidecarMockDockerfile", Context: "sidecarMockContext", Platform: "mockContainerPlatform", Tags: []string{fmt.Sprintf("nginx-%s", "latest"), fmt.Sprintf("nginx-%s", "gitTag")}, Labels: map[string]string{ "com.aws.copilot.image.builder": "copilot-cli", "com.aws.copilot.image.container.name": "nginx", }, }, gomock.Any()).Return("sidecarMockDigest1", nil) m.mockRepositoryService.EXPECT().BuildAndPush(gomock.Any(), &dockerengine.BuildArguments{ URI: mockURI, Dockerfile: "web/Dockerfile", Context: "Users/bowie", Platform: "mockContainerPlatform", Tags: []string{"logging-latest", fmt.Sprintf("logging-%s", "gitTag")}, Labels: map[string]string{ "com.aws.copilot.image.builder": "copilot-cli", "com.aws.copilot.image.container.name": "logging", }, }, gomock.Any()).Return("sidecarMockDigest2", nil) m.mockLabeledTermPrinter.EXPECT().IsDone().Return(true).AnyTimes() m.mockLabeledTermPrinter.EXPECT().Print().AnyTimes() m.mockAddons = nil }, wantImages: map[string]ContainerImageIdentifier{ "nginx": { Digest: "sidecarMockDigest1", GitShortCommitTag: "gitTag", }, "logging": { Digest: "sidecarMockDigest2", GitShortCommitTag: "gitTag", }, }, }, "should retrieve Load Balanced Web Service custom resource URLs": { mock: func(t *testing.T, m *deployMocks) { // Ignore addon uploads. m.mockAddons = nil // Ensure all custom resources were uploaded. crs, err := customresource.LBWS(fakeTemplateFS()) require.NoError(t, err) m.mockUploader.EXPECT().Upload(mockS3Bucket, gomock.Any(), gomock.Any()).DoAndReturn(func(_, key string, _ io.Reader) (url string, err error) { for _, cr := range crs { if strings.Contains(key, strings.ToLower(cr.Name())) { return "", nil } } return "", errors.New("did not match any custom resource") }).Times(len(crs)) }, customResourcesFunc: func(fs template.Reader) ([]*customresource.CustomResource, error) { return customresource.LBWS(fs) }, mockServiceDeployer: func(deployer *workloadDeployer) artifactsUploader { return &lbWebSvcDeployer{ svcDeployer: &svcDeployer{ workloadDeployer: deployer, }, } }, }, "should retrieve Backend Service custom resource URLs": { mock: func(t *testing.T, m *deployMocks) { // Ignore addon uploads. m.mockAddons = nil // Ensure all custom resources were uploaded. crs, err := customresource.Backend(fakeTemplateFS()) require.NoError(t, err) m.mockUploader.EXPECT().Upload(mockS3Bucket, gomock.Any(), gomock.Any()).DoAndReturn(func(_, key string, _ io.Reader) (url string, err error) { for _, cr := range crs { if strings.Contains(key, strings.ToLower(cr.Name())) { return "", nil } } return "", errors.New("did not match any custom resource") }).Times(len(crs)) }, customResourcesFunc: func(fs template.Reader) ([]*customresource.CustomResource, error) { return customresource.Backend(fs) }, mockServiceDeployer: func(deployer *workloadDeployer) artifactsUploader { return &backendSvcDeployer{ svcDeployer: &svcDeployer{ workloadDeployer: deployer, }, } }, }, "should retrieve Worker Service custom resource URLs": { mock: func(t *testing.T, m *deployMocks) { // Ignore addon uploads. m.mockAddons = nil // Ensure all custom resources were uploaded. crs, err := customresource.Worker(fakeTemplateFS()) require.NoError(t, err) m.mockUploader.EXPECT().Upload(mockS3Bucket, gomock.Any(), gomock.Any()).DoAndReturn(func(_, key string, _ io.Reader) (url string, err error) { for _, cr := range crs { if strings.Contains(key, strings.ToLower(cr.Name())) { return "", nil } } return "", errors.New("did not match any custom resource") }).Times(len(crs)) }, customResourcesFunc: func(fs template.Reader) ([]*customresource.CustomResource, error) { return customresource.Worker(fs) }, mockServiceDeployer: func(deployer *workloadDeployer) artifactsUploader { return &workerSvcDeployer{ svcDeployer: &svcDeployer{ workloadDeployer: deployer, }, } }, }, "should retrieve Request-Driven Web Service custom resource URLs": { mock: func(t *testing.T, m *deployMocks) { // Ignore addon uploads. m.mockAddons = nil // Ensure all custom resources were uploaded. crs, err := customresource.RDWS(fakeTemplateFS()) require.NoError(t, err) m.mockUploader.EXPECT().Upload(mockS3Bucket, gomock.Any(), gomock.Any()).DoAndReturn(func(_, key string, _ io.Reader) (url string, err error) { for _, cr := range crs { if strings.Contains(key, strings.ToLower(cr.Name())) { return "", nil } } return "", errors.New("did not match any custom resource") }).Times(len(crs)) }, customResourcesFunc: func(fs template.Reader) ([]*customresource.CustomResource, error) { return customresource.RDWS(fs) }, mockServiceDeployer: func(deployer *workloadDeployer) artifactsUploader { return &rdwsDeployer{ svcDeployer: &svcDeployer{ workloadDeployer: deployer, }, } }, }, "should retrieve Scheduled Job custom resource URLs": { mock: func(t *testing.T, m *deployMocks) { // Ignore addon uploads. m.mockAddons = nil // Ensure all custom resources were uploaded. crs, err := customresource.ScheduledJob(fakeTemplateFS()) require.NoError(t, err) m.mockUploader.EXPECT().Upload(mockS3Bucket, gomock.Any(), gomock.Any()).DoAndReturn(func(_, key string, _ io.Reader) (url string, err error) { for _, cr := range crs { if strings.Contains(key, strings.ToLower(cr.Name())) { return "", nil } } return "", errors.New("did not match any custom resource") }).Times(len(crs)) }, customResourcesFunc: func(fs template.Reader) ([]*customresource.CustomResource, error) { return customresource.ScheduledJob(fs) }, mockServiceDeployer: func(deployer *workloadDeployer) artifactsUploader { return &jobDeployer{ workloadDeployer: deployer, } }, }, "error if fail to read env file": { inEnvFile: mockEnvFile, mock: func(t *testing.T, m *deployMocks) {}, wantErr: fmt.Errorf("read env file foo.env: open foo.env: file does not exist"), }, "successfully share one env file between containers": { customEnvFiles: map[string]string{"nginx": mockEnvFile, mockName: mockEnvFile}, inRegion: "us-west-2", mock: func(t *testing.T, m *deployMocks) { m.mockFileSystem.Create(filepath.Join(mockWorkspacePath, mockEnvFile)) m.mockUploader.EXPECT().Upload(mockS3Bucket, mockEnvFilePath(mockEnvFile), gomock.Any()).Return(mockEnvFileS3URL, nil) m.mockAddons.EXPECT().Package(gomock.Any()).Return(nil) m.mockAddons.EXPECT().Template().Return("", nil) m.mockUploader.EXPECT().Upload(gomock.Any(), gomock.Any(), gomock.Any()).Return(mockAddonsS3URL, nil) }, wantEnvFileARNs: map[string]string{"nginx": mockEnvFileS3ARN, mockName: mockEnvFileS3ARN}, wantAddonsURL: mockAddonsS3URL, }, "upload multiple env files": { customEnvFiles: map[string]string{"nginx": mockEnvFile, mockName: "bar.env"}, inRegion: "us-west-2", mock: func(t *testing.T, m *deployMocks) { m.mockFileSystem.Create(filepath.Join(mockWorkspacePath, mockEnvFile)) m.mockUploader.EXPECT().Upload(mockS3Bucket, mockEnvFilePath(mockEnvFile), gomock.Any()).Return(mockEnvFileS3URL, nil) m.mockFileSystem.Create(filepath.Join(mockWorkspacePath, "bar.env")) m.mockUploader.EXPECT().Upload(mockS3Bucket, mockEnvFilePath("bar.env"), gomock.Any()).Return(mockEnvFileS3URL2, nil) m.mockAddons.EXPECT().Package(gomock.Any()).Return(nil) m.mockAddons.EXPECT().Template().Return("", nil) m.mockUploader.EXPECT().Upload(gomock.Any(), gomock.Any(), gomock.Any()).Return(mockAddonsS3URL, nil) }, wantEnvFileARNs: map[string]string{"nginx": mockEnvFileS3ARN, mockName: mockEnvFileS3ARN2}, wantAddonsURL: mockAddonsS3URL, }, "success with no env files present but logging sidecar exists": { inRegion: "us-west-2", customEnvFiles: map[string]string{manifest.FirelensContainerName: "", mockName: ""}, mock: func(t *testing.T, m *deployMocks) { m.mockAddons.EXPECT().Package(gomock.Any()).Return(nil) m.mockAddons.EXPECT().Template().Return("", nil) m.mockUploader.EXPECT().Upload(gomock.Any(), gomock.Any(), gomock.Any()).Return(mockAddonsS3URL, nil) }, wantEnvFileARNs: nil, wantAddonsURL: mockAddonsS3URL, }, "error if fail to put env file to s3 bucket": { inEnvFile: mockEnvFile, mock: func(t *testing.T, m *deployMocks) { m.mockFileSystem.Create(filepath.Join(mockWorkspacePath, mockEnvFile)) m.mockUploader.EXPECT().Upload(mockS3Bucket, mockEnvFilePath(mockEnvFile), gomock.Any()). Return("", mockError) }, wantErr: fmt.Errorf("put env file foo.env artifact to bucket mockBucket: some error"), }, "error if fail to parse s3 url": { inEnvFile: mockEnvFile, mock: func(t *testing.T, m *deployMocks) { m.mockFileSystem.Create(filepath.Join(mockWorkspacePath, mockEnvFile)) m.mockUploader.EXPECT().Upload(mockS3Bucket, mockEnvFilePath(mockEnvFile), gomock.Any()). Return(mockBadEnvFileS3URL, nil) }, wantErr: fmt.Errorf("parse s3 url: cannot parse S3 URL badURL into bucket name and key"), }, "error if fail to find the partition": { inEnvFile: mockEnvFile, inRegion: "sun-south-0", mock: func(t *testing.T, m *deployMocks) { m.mockFileSystem.Create(filepath.Join(mockWorkspacePath, mockEnvFile)) m.mockUploader.EXPECT().Upload(mockS3Bucket, mockEnvFilePath(mockEnvFile), gomock.Any()). Return(mockEnvFileS3URL, nil) }, wantErr: fmt.Errorf("find the partition for region sun-south-0"), }, "should push addons template to S3 bucket": { inEnvFile: mockEnvFile, inRegion: "us-west-2", mock: func(t *testing.T, m *deployMocks) { m.mockFileSystem.Create(filepath.Join(mockWorkspacePath, mockEnvFile)) m.mockUploader.EXPECT().Upload(mockS3Bucket, mockEnvFilePath(mockEnvFile), gomock.Any()). Return(mockEnvFileS3URL, nil) m.mockAddons.EXPECT().Package(gomock.Any()).Return(nil) m.mockAddons.EXPECT().Template().Return("some data", nil) m.mockUploader.EXPECT().Upload(mockS3Bucket, mockAddonPath, gomock.Any()). Return(mockAddonsS3URL, nil) }, wantAddonsURL: mockAddonsS3URL, wantEnvFileARNs: mockEnvFilesOutput, }, "should return error if fail to upload to S3 bucket": { inRegion: "us-west-2", mock: func(t *testing.T, m *deployMocks) { m.mockAddons.EXPECT().Package(gomock.Any()).Return(nil) m.mockAddons.EXPECT().Template().Return("some data", nil) m.mockUploader.EXPECT().Upload(mockS3Bucket, mockAddonPath, gomock.Any()). Return("", mockError) }, wantErr: fmt.Errorf("put addons artifact to bucket mockBucket: some error"), }, "should return empty url if the service doesn't have any addons and env files": { mock: func(t *testing.T, m *deployMocks) { m.mockAddons = nil }, }, "should fail if packaging addons fails": { mock: func(t *testing.T, m *deployMocks) { m.mockAddons.EXPECT().Package(gomock.Any()).Return(mockError) }, wantErr: fmt.Errorf("package addons: %w", mockError), }, "should fail if addons template can't be created": { mock: func(t *testing.T, m *deployMocks) { m.mockAddons.EXPECT().Package(gomock.Any()).Return(nil) m.mockAddons.EXPECT().Template().Return("", mockError) }, wantErr: fmt.Errorf("retrieve addons template: %w", mockError), }, } for name, tc := range tests { t.Run(name, func(t *testing.T) { ctrl := gomock.NewController(t) defer ctrl.Finish() m := &deployMocks{ mockUploader: mocks.NewMockuploader(ctrl), mockAddons: mocks.NewMockstackBuilder(ctrl), mockRepositoryService: mocks.NewMockrepositoryService(ctrl), mockFileSystem: afero.NewMemMapFs(), mockLabeledTermPrinter: mocks.NewMocklabeledTermPrinter(ctrl), mockdockerEngineRunChecker: mocks.NewMockdockerEngineRunChecker(ctrl), } tc.mock(t, m) crFn := tc.customResourcesFunc if crFn == nil { crFn = func(fs template.Reader) ([]*customresource.CustomResource, error) { return nil, nil } } wkldDeployer := &workloadDeployer{ name: mockName, env: &config.Environment{ Name: mockEnvName, Region: tc.inRegion, }, app: &config.Application{ Name: mockAppName, }, resources: mockResources, image: ContainerImageIdentifier{ CustomTag: tc.inMockUserTag, GitShortCommitTag: tc.inMockGitTag, }, workspacePath: mockWorkspacePath, mft: &mockWorkloadMft{ workloadName: mockName, fileName: tc.inEnvFile, customEnvFiles: tc.customEnvFiles, dockerBuildArgs: tc.inDockerBuildArgs, }, fs: m.mockFileSystem, s3Client: m.mockUploader, docker: m.mockdockerEngineRunChecker, repository: m.mockRepositoryService, templateFS: fakeTemplateFS(), overrider: new(override.Noop), customResources: crFn, labeledTermPrinter: func(fw syncbuffer.FileWriter, bufs []*syncbuffer.LabeledSyncBuffer, opts ...syncbuffer.LabeledTermPrinterOption) labeledTermPrinter { return m.mockLabeledTermPrinter }, } if m.mockAddons != nil { wkldDeployer.addons = m.mockAddons } var deployer artifactsUploader deployer = &lbWebSvcDeployer{ svcDeployer: &svcDeployer{ workloadDeployer: wkldDeployer, }, } if tc.mockServiceDeployer != nil { deployer = tc.mockServiceDeployer(wkldDeployer) } got, gotErr := deployer.UploadArtifacts() if tc.wantErr != nil { require.EqualError(t, gotErr, tc.wantErr.Error()) } else { require.NoError(t, gotErr) require.Equal(t, tc.wantAddonsURL, got.AddonsURL) require.Equal(t, tc.wantEnvFileARNs, got.EnvFileARNs) require.Equal(t, tc.wantImages, got.ImageDigests) } }) } } func TestWorkloadDeployer_DeployWorkload(t *testing.T) { mockError := errors.New("some error") const ( mockAppName = "mockApp" mockEnvName = "mockEnv" mockName = "mockWkld" mockS3Bucket = "mockBucket" ) mockMultiAliases := []manifest.AdvancedAlias{ { Alias: aws.String("example.com"), }, { Alias: aws.String("foobar.com"), }, } mockAlias := []manifest.AdvancedAlias{ { Alias: aws.String("mockAlias"), }, } mockCertARNs := []string{"mockCertARN"} mockCDNCertARN := "mockCDNCertARN" mockResources := &stack.AppRegionalResources{ S3Bucket: mockS3Bucket, } mockNowTime := time.Unix(1494505750, 0) mockBeforeTime := time.Unix(1494505743, 0) mockAfterTime := time.Unix(1494505756, 0) tests := map[string]struct { inAliases manifest.Alias inNLB manifest.NetworkLoadBalancerConfiguration inApp *config.Application inEnvironment *config.Environment inForceDeploy bool inDisableRollback bool inRedirectToHTTPS *bool // Cached variables. inEnvironmentConfig func() *manifest.Environment mock func(m *deployMocks) wantErr error }{ "fail to get service discovery endpoint": { mock: func(m *deployMocks) { m.mockEndpointGetter.EXPECT().ServiceDiscoveryEndpoint().Return("", mockError) }, wantErr: fmt.Errorf("get service discovery endpoint: some error"), }, "fail to get env version": { inEnvironment: &config.Environment{ Name: mockEnvName, }, mock: func(m *deployMocks) { m.mockEndpointGetter.EXPECT().ServiceDiscoveryEndpoint().Return("mockApp.local", nil) m.mockEnvVersionGetter.EXPECT().Version().Return("", errors.New("some error")) }, wantErr: fmt.Errorf(`get version of environment "mockEnv": some error`), }, "fail if alias is not specified with env has imported certs": { inEnvironment: &config.Environment{ Name: mockEnvName, Region: "us-west-2", }, inEnvironmentConfig: func() *manifest.Environment { envConfig := &manifest.Environment{} envConfig.HTTPConfig.Public.Certificates = mockCertARNs return envConfig }, inApp: &config.Application{ Name: mockAppName, }, mock: func(m *deployMocks) { m.mockEndpointGetter.EXPECT().ServiceDiscoveryEndpoint().Return("mockApp.local", nil) m.mockEnvVersionGetter.EXPECT().Version().Return("v1.42.0", nil) }, wantErr: fmt.Errorf(`validate ALB runtime configuration for "http": cannot deploy service mockWkld without "alias" to environment mockEnv with certificate imported`), }, "fail if http redirect to https configured without custom domain": { inRedirectToHTTPS: aws.Bool(true), inEnvironment: &config.Environment{ Name: mockEnvName, Region: "us-west-2", }, inEnvironmentConfig: func() *manifest.Environment { return &manifest.Environment{} }, inApp: &config.Application{ Name: mockAppName, }, mock: func(m *deployMocks) { m.mockEndpointGetter.EXPECT().ServiceDiscoveryEndpoint().Return("mockApp.local", nil) m.mockEnvVersionGetter.EXPECT().Version().Return("v1.42.0", nil) }, wantErr: fmt.Errorf(`validate ALB runtime configuration for "http": cannot configure http to https redirect without having a domain associated with the app "mockApp" or importing any certificates in env "mockEnv"`), }, "cannot specify alias hosted zone when no certificates are imported in the env": { inEnvironment: &config.Environment{ Name: mockEnvName, Region: "us-east-1", }, inEnvironmentConfig: func() *manifest.Environment { envConfig := &manifest.Environment{} return envConfig }, inAliases: manifest.Alias{ AdvancedAliases: []manifest.AdvancedAlias{ { Alias: aws.String("example.com"), HostedZone: aws.String("mockHostedZone1"), }, { Alias: aws.String("foobar.com"), HostedZone: aws.String("mockHostedZone2"), }, }, }, inApp: &config.Application{ Name: mockAppName, }, mock: func(m *deployMocks) { m.mockEndpointGetter.EXPECT().ServiceDiscoveryEndpoint().Return("mockApp.local", nil) m.mockEnvVersionGetter.EXPECT().Version().Return("v1.42.0", nil) }, wantErr: fmt.Errorf("validate ALB runtime configuration for \"http\": cannot specify alias hosted zones [mockHostedZone1 mockHostedZone2] when no certificates are imported in environment \"mockEnv\""), }, "cannot specify alias hosted zone when cdn is enabled": { inEnvironment: &config.Environment{ Name: mockEnvName, Region: "us-east-1", }, inEnvironmentConfig: func() *manifest.Environment { envConfig := &manifest.Environment{} envConfig.HTTPConfig.Public.Certificates = mockCertARNs envConfig.CDNConfig.Config.Certificate = aws.String(mockCDNCertARN) return envConfig }, inAliases: manifest.Alias{ AdvancedAliases: []manifest.AdvancedAlias{ { Alias: aws.String("example.com"), HostedZone: aws.String("mockHostedZone1"), }, { Alias: aws.String("foobar.com"), HostedZone: aws.String("mockHostedZone2"), }, }, }, inApp: &config.Application{ Name: mockAppName, }, mock: func(m *deployMocks) { m.mockEndpointGetter.EXPECT().ServiceDiscoveryEndpoint().Return("mockApp.local", nil) m.mockEnvVersionGetter.EXPECT().Version().Return("v1.42.0", nil) }, wantErr: fmt.Errorf("validate ALB runtime configuration for \"http\": cannot specify alias hosted zones when cdn is enabled in environment \"mockEnv\""), }, "fail to validate certificate aliases": { inEnvironment: &config.Environment{ Name: mockEnvName, Region: "us-west-2", }, inEnvironmentConfig: func() *manifest.Environment { envConfig := &manifest.Environment{} envConfig.HTTPConfig.Public.Certificates = mockCertARNs return envConfig }, inAliases: manifest.Alias{ AdvancedAliases: mockMultiAliases, }, inApp: &config.Application{ Name: mockAppName, }, mock: func(m *deployMocks) { m.mockEndpointGetter.EXPECT().ServiceDiscoveryEndpoint().Return("mockApp.local", nil) m.mockEnvVersionGetter.EXPECT().Version().Return("v1.42.0", nil) m.mockValidator.EXPECT().ValidateCertAliases([]string{"example.com", "foobar.com"}, mockCertARNs).Return(mockError) }, wantErr: fmt.Errorf("validate ALB runtime configuration for \"http\": validate aliases against the imported public ALB certificate for env mockEnv: some error"), }, "fail to validate cdn certificate aliases": { inEnvironment: &config.Environment{ Name: mockEnvName, Region: "us-east-1", }, inEnvironmentConfig: func() *manifest.Environment { envConfig := &manifest.Environment{} envConfig.HTTPConfig.Public.Certificates = mockCertARNs envConfig.CDNConfig.Config.Certificate = aws.String(mockCDNCertARN) return envConfig }, inAliases: manifest.Alias{ AdvancedAliases: mockMultiAliases, }, inApp: &config.Application{ Name: mockAppName, }, mock: func(m *deployMocks) { m.mockEndpointGetter.EXPECT().ServiceDiscoveryEndpoint().Return("mockApp.local", nil) m.mockEnvVersionGetter.EXPECT().Version().Return("v1.42.0", nil) m.mockValidator.EXPECT().ValidateCertAliases([]string{"example.com", "foobar.com"}, mockCertARNs).Return(nil) m.mockValidator.EXPECT().ValidateCertAliases([]string{"example.com", "foobar.com"}, []string{mockCDNCertARN}).Return(mockError) }, wantErr: fmt.Errorf("validate ALB runtime configuration for \"http\": validate aliases against the imported CDN certificate for env mockEnv: some error"), }, "fail to get public CIDR blocks": { inNLB: manifest.NetworkLoadBalancerConfiguration{ Listener: manifest.NetworkLoadBalancerListener{ Port: aws.String("443/tcp"), }, }, inEnvironment: &config.Environment{ Name: mockEnvName, Region: "us-west-2", }, inApp: &config.Application{ Name: mockAppName, }, mock: func(m *deployMocks) { m.mockEndpointGetter.EXPECT().ServiceDiscoveryEndpoint().Return("mockApp.local", nil) m.mockEnvVersionGetter.EXPECT().Version().Return("v1.42.0", nil) m.mockPublicCIDRBlocksGetter.EXPECT().PublicCIDRBlocks().Return(nil, errors.New("some error")) }, wantErr: fmt.Errorf("get public CIDR blocks information from the VPC of environment mockEnv: some error"), }, "alias used while app is not associated with a domain": { inAliases: manifest.Alias{AdvancedAliases: mockAlias}, inEnvironment: &config.Environment{ Name: mockEnvName, Region: "us-west-2", }, inApp: &config.Application{ Name: mockAppName, }, mock: func(m *deployMocks) { m.mockEndpointGetter.EXPECT().ServiceDiscoveryEndpoint().Return("mockApp.local", nil) m.mockEnvVersionGetter.EXPECT().Version().Return("v1.42.0", nil) }, wantErr: errors.New(`validate ALB runtime configuration for "http": cannot specify "alias" when application is not associated with a domain and env mockEnv doesn't import one or more certificates`), }, "nlb alias used while app is not associated with a domain": { inNLB: manifest.NetworkLoadBalancerConfiguration{ Listener: manifest.NetworkLoadBalancerListener{ Port: aws.String("80"), }, Aliases: manifest.Alias{AdvancedAliases: mockAlias}, }, inEnvironment: &config.Environment{ Name: mockEnvName, Region: "us-west-2", }, inApp: &config.Application{ Name: mockAppName, }, mock: func(m *deployMocks) { m.mockEndpointGetter.EXPECT().ServiceDiscoveryEndpoint().Return("mockApp.local", nil) m.mockEnvVersionGetter.EXPECT().Version().Return("v1.42.0", nil) }, wantErr: errors.New("cannot specify nlb.alias when application is not associated with a domain"), }, "nlb alias used while env has imported certs": { inAliases: manifest.Alias{AdvancedAliases: mockAlias}, inNLB: manifest.NetworkLoadBalancerConfiguration{ Listener: manifest.NetworkLoadBalancerListener{ Port: aws.String("80"), }, Aliases: manifest.Alias{AdvancedAliases: mockAlias}, }, inEnvironment: &config.Environment{ Name: mockEnvName, Region: "us-west-2", }, inEnvironmentConfig: func() *manifest.Environment { envConfig := &manifest.Environment{} envConfig.HTTPConfig.Public.Certificates = mockCertARNs return envConfig }, inApp: &config.Application{ Name: mockAppName, }, mock: func(m *deployMocks) { m.mockEndpointGetter.EXPECT().ServiceDiscoveryEndpoint().Return("mockApp.local", nil) m.mockEnvVersionGetter.EXPECT().Version().Return("v1.42.0", nil) m.mockValidator.EXPECT().ValidateCertAliases([]string{"mockAlias"}, mockCertARNs).Return(nil).Times(2) }, wantErr: errors.New("cannot specify nlb.alias when env mockEnv imports one or more certificates"), }, "fail to get app version": { inAliases: manifest.Alias{AdvancedAliases: mockAlias}, inEnvironment: &config.Environment{ Name: mockEnvName, Region: "us-west-2", }, inApp: &config.Application{ Name: mockAppName, Domain: "mockDomain", }, mock: func(m *deployMocks) { m.mockAppVersionGetter.EXPECT().Version().Return("", mockError) m.mockEndpointGetter.EXPECT().ServiceDiscoveryEndpoint().Return("mockApp.local", nil) m.mockEnvVersionGetter.EXPECT().Version().Return("v1.42.0", nil) }, wantErr: fmt.Errorf("validate ALB runtime configuration for \"http\": alias not supported: get version for app %q: %w", mockAppName, mockError), }, "fail to enable https alias because of incompatible app version": { inAliases: manifest.Alias{AdvancedAliases: mockAlias}, inEnvironment: &config.Environment{ Name: mockEnvName, Region: "us-west-2", }, inApp: &config.Application{ Name: mockAppName, Domain: "mockDomain", }, mock: func(m *deployMocks) { m.mockAppVersionGetter.EXPECT().Version().Return("v0.0.0", nil) m.mockEndpointGetter.EXPECT().ServiceDiscoveryEndpoint().Return("mockApp.local", nil) m.mockEnvVersionGetter.EXPECT().Version().Return("v1.42.0", nil) }, wantErr: fmt.Errorf("validate ALB runtime configuration for \"http\": alias not supported: app version must be >= %s", version.AppTemplateMinAlias), }, "fail to enable nlb alias because of incompatible app version": { inNLB: manifest.NetworkLoadBalancerConfiguration{ Listener: manifest.NetworkLoadBalancerListener{ Port: aws.String("80"), }, Aliases: manifest.Alias{AdvancedAliases: mockAlias}, }, inEnvironment: &config.Environment{ Name: mockEnvName, Region: "us-west-2", }, inApp: &config.Application{ Name: mockAppName, Domain: "mockDomain", }, mock: func(m *deployMocks) { m.mockAppVersionGetter.EXPECT().Version().Return("v0.0.0", nil) m.mockEndpointGetter.EXPECT().ServiceDiscoveryEndpoint().Return("mockApp.local", nil) m.mockEnvVersionGetter.EXPECT().Version().Return("v1.42.0", nil) }, wantErr: fmt.Errorf("alias not supported: app version must be >= %s", version.AppTemplateMinAlias), }, "fail to enable https alias because of invalid alias": { inAliases: manifest.Alias{AdvancedAliases: []manifest.AdvancedAlias{ {Alias: aws.String("v1.v2.mockDomain")}, }}, inEnvironment: &config.Environment{ Name: mockEnvName, Region: "us-west-2", }, inApp: &config.Application{ Name: mockAppName, Domain: "mockDomain", }, mock: func(m *deployMocks) { m.mockAppVersionGetter.EXPECT().Version().Return("v1.0.0", nil) m.mockEndpointGetter.EXPECT().ServiceDiscoveryEndpoint().Return("mockApp.local", nil) m.mockEnvVersionGetter.EXPECT().Version().Return("v1.42.0", nil) }, wantErr: fmt.Errorf(`validate ALB runtime configuration for "http": validate 'alias': alias "v1.v2.mockDomain" is not supported in hosted zones managed by Copilot`), }, "fail to enable nlb alias because of invalid alias": { inNLB: manifest.NetworkLoadBalancerConfiguration{ Listener: manifest.NetworkLoadBalancerListener{ Port: aws.String("80"), }, Aliases: manifest.Alias{AdvancedAliases: []manifest.AdvancedAlias{ {Alias: aws.String("v1.v2.mockDomain")}, }}, }, inEnvironment: &config.Environment{ Name: mockEnvName, Region: "us-west-2", }, inApp: &config.Application{ Name: mockAppName, Domain: "mockDomain", }, mock: func(m *deployMocks) { m.mockAppVersionGetter.EXPECT().Version().Return("v1.0.0", nil) m.mockEndpointGetter.EXPECT().ServiceDiscoveryEndpoint().Return("mockApp.local", nil) m.mockEnvVersionGetter.EXPECT().Version().Return("v1.42.0", nil) }, wantErr: fmt.Errorf(`validate 'nlb.alias': alias "v1.v2.mockDomain" is not supported in hosted zones managed by Copilot`), }, "error if fail to deploy service": { inEnvironment: &config.Environment{ Name: mockEnvName, Region: "us-west-2", }, inApp: &config.Application{ Name: mockAppName, }, mock: func(m *deployMocks) { m.mockEndpointGetter.EXPECT().ServiceDiscoveryEndpoint().Return("mockApp.local", nil) m.mockEnvVersionGetter.EXPECT().Version().Return("v1.42.0", nil) m.mockServiceDeployer.EXPECT().DeployService(gomock.Any(), "mockBucket", gomock.Any()).Return(errors.New("some error")) }, wantErr: fmt.Errorf("deploy service: some error"), }, "error if change set is empty but force flag is not set": { inEnvironment: &config.Environment{ Name: mockEnvName, Region: "us-west-2", }, inApp: &config.Application{ Name: mockAppName, }, mock: func(m *deployMocks) { m.mockEndpointGetter.EXPECT().ServiceDiscoveryEndpoint().Return("mockApp.local", nil) m.mockEnvVersionGetter.EXPECT().Version().Return("v1.42.0", nil) m.mockServiceDeployer.EXPECT().DeployService(gomock.Any(), "mockBucket", gomock.Any()).Return(cloudformation.NewMockErrChangeSetEmpty()) }, wantErr: fmt.Errorf("deploy service: change set with name mockChangeSet for stack mockStack has no changes"), }, "error if fail to get last update time when force an update": { inForceDeploy: true, inEnvironment: &config.Environment{ Name: mockEnvName, Region: "us-west-2", }, inApp: &config.Application{ Name: mockAppName, }, mock: func(m *deployMocks) { m.mockEndpointGetter.EXPECT().ServiceDiscoveryEndpoint().Return("mockApp.local", nil) m.mockEnvVersionGetter.EXPECT().Version().Return("v1.42.0", nil) m.mockServiceDeployer.EXPECT().DeployService(gomock.Any(), "mockBucket", gomock.Any()). Return(nil) m.mockServiceForceUpdater.EXPECT().LastUpdatedAt(mockAppName, mockEnvName, mockName). Return(time.Time{}, mockError) }, wantErr: fmt.Errorf("get the last updated deployment time for mockWkld: some error"), }, "skip force updating when cmd run time is after the last update time": { inForceDeploy: true, inEnvironment: &config.Environment{ Name: mockEnvName, Region: "us-west-2", }, inApp: &config.Application{ Name: mockAppName, }, mock: func(m *deployMocks) { m.mockEndpointGetter.EXPECT().ServiceDiscoveryEndpoint().Return("mockApp.local", nil) m.mockEnvVersionGetter.EXPECT().Version().Return("v1.42.0", nil) m.mockServiceDeployer.EXPECT().DeployService(gomock.Any(), "mockBucket", gomock.Any()). Return(nil) m.mockServiceForceUpdater.EXPECT().LastUpdatedAt(mockAppName, mockEnvName, mockName). Return(mockAfterTime, nil) }, }, "error if fail to force an update": { inForceDeploy: true, inEnvironment: &config.Environment{ Name: mockEnvName, Region: "us-west-2", }, inApp: &config.Application{ Name: mockAppName, }, mock: func(m *deployMocks) { m.mockEndpointGetter.EXPECT().ServiceDiscoveryEndpoint().Return("mockApp.local", nil) m.mockEnvVersionGetter.EXPECT().Version().Return("v1.42.0", nil) m.mockServiceDeployer.EXPECT().DeployService(gomock.Any(), "mockBucket", gomock.Any()). Return(cloudformation.NewMockErrChangeSetEmpty()) m.mockServiceForceUpdater.EXPECT().LastUpdatedAt(mockAppName, mockEnvName, mockName). Return(mockBeforeTime, nil) m.mockSpinner.EXPECT().Start(fmt.Sprintf(fmtForceUpdateSvcStart, mockName, mockEnvName)) m.mockServiceForceUpdater.EXPECT().ForceUpdateService(mockAppName, mockEnvName, mockName).Return(mockError) m.mockSpinner.EXPECT().Stop(log.Serrorf(fmtForceUpdateSvcFailed, mockName, mockEnvName, mockError)) }, wantErr: fmt.Errorf("force an update for service mockWkld: some error"), }, "error if fail to force an update because of timeout": { inForceDeploy: true, inEnvironment: &config.Environment{ Name: mockEnvName, Region: "us-west-2", }, inApp: &config.Application{ Name: mockAppName, }, mock: func(m *deployMocks) { m.mockEndpointGetter.EXPECT().ServiceDiscoveryEndpoint().Return("mockApp.local", nil) m.mockEnvVersionGetter.EXPECT().Version().Return("v1.42.0", nil) m.mockServiceDeployer.EXPECT().DeployService(gomock.Any(), "mockBucket", gomock.Any()). Return(cloudformation.NewMockErrChangeSetEmpty()) m.mockServiceForceUpdater.EXPECT().LastUpdatedAt(mockAppName, mockEnvName, mockName). Return(mockBeforeTime, nil) m.mockSpinner.EXPECT().Start(fmt.Sprintf(fmtForceUpdateSvcStart, mockName, mockEnvName)) m.mockServiceForceUpdater.EXPECT().ForceUpdateService(mockAppName, mockEnvName, mockName). Return(&ecs.ErrWaitServiceStableTimeout{}) m.mockSpinner.EXPECT().Stop( log.Serror(fmt.Sprintf("%s Run %s to check for the fail reason.\n", fmt.Sprintf(fmtForceUpdateSvcFailed, mockName, mockEnvName, &ecs.ErrWaitServiceStableTimeout{}), color.HighlightCode(fmt.Sprintf("copilot svc status --name %s --env %s", mockName, mockEnvName))))) }, wantErr: fmt.Errorf("force an update for service mockWkld: max retries 0 exceeded"), }, "skip validating": { inEnvironment: &config.Environment{ Name: mockEnvName, Region: "us-west-2", }, inApp: &config.Application{ Name: mockAppName, Domain: "mockDomain", }, mock: func(m *deployMocks) { m.mockEndpointGetter.EXPECT().ServiceDiscoveryEndpoint().Return("mockApp.local", nil) m.mockEnvVersionGetter.EXPECT().Version().Return("v1.42.0", nil) m.mockServiceDeployer.EXPECT().DeployService(gomock.Any(), "mockBucket", gomock.Any()).Return(nil) }, }, "success": { inAliases: manifest.Alias{ AdvancedAliases: mockMultiAliases, }, inEnvironment: &config.Environment{ Name: mockEnvName, Region: "us-west-2", }, inEnvironmentConfig: func() *manifest.Environment { envConfig := &manifest.Environment{} envConfig.HTTPConfig.Public.Certificates = mockCertARNs return envConfig }, inApp: &config.Application{ Name: mockAppName, Domain: "mockDomain", }, mock: func(m *deployMocks) { m.mockEndpointGetter.EXPECT().ServiceDiscoveryEndpoint().Return("mockApp.local", nil) m.mockEnvVersionGetter.EXPECT().Version().Return("v1.42.0", nil) m.mockValidator.EXPECT().ValidateCertAliases([]string{"example.com", "foobar.com"}, mockCertARNs).Return(nil).Times(2) m.mockServiceDeployer.EXPECT().DeployService(gomock.Any(), "mockBucket", gomock.Any()).Return(nil) }, }, "success with http redirect disabled and alb certs imported": { inRedirectToHTTPS: aws.Bool(false), inAliases: manifest.Alias{ AdvancedAliases: mockMultiAliases, }, inEnvironment: &config.Environment{ Name: mockEnvName, Region: "us-west-2", }, inEnvironmentConfig: func() *manifest.Environment { envConfig := &manifest.Environment{} envConfig.HTTPConfig.Public.Certificates = mockCertARNs return envConfig }, inApp: &config.Application{ Name: mockAppName, }, mock: func(m *deployMocks) { m.mockEndpointGetter.EXPECT().ServiceDiscoveryEndpoint().Return("mockApp.local", nil) m.mockEnvVersionGetter.EXPECT().Version().Return("v1.42.0", nil) m.mockValidator.EXPECT().ValidateCertAliases([]string{"example.com", "foobar.com"}, mockCertARNs).Return(nil).Times(2) m.mockServiceDeployer.EXPECT().DeployService(gomock.Any(), "mockBucket", gomock.Any()).Return(nil) }, }, "success with only cdn certs imported": { inAliases: manifest.Alias{ AdvancedAliases: mockMultiAliases, }, inEnvironment: &config.Environment{ Name: mockEnvName, Region: "us-west-2", }, inEnvironmentConfig: func() *manifest.Environment { envConfig := &manifest.Environment{} envConfig.CDNConfig.Config.Certificate = aws.String(mockCDNCertARN) return envConfig }, inApp: &config.Application{ Name: mockAppName, }, mock: func(m *deployMocks) { m.mockEndpointGetter.EXPECT().ServiceDiscoveryEndpoint().Return("mockApp.local", nil) m.mockEnvVersionGetter.EXPECT().Version().Return("v1.42.0", nil) m.mockValidator.EXPECT().ValidateCertAliases([]string{"example.com", "foobar.com"}, []string{mockCDNCertARN}).Return(nil).Times(2) m.mockServiceDeployer.EXPECT().DeployService(gomock.Any(), "mockBucket", gomock.Any()).Return(nil) }, }, "success with http redirect disabled and domain imported": { inRedirectToHTTPS: aws.Bool(false), inAliases: manifest.Alias{ AdvancedAliases: []manifest.AdvancedAlias{ { Alias: aws.String("hi.mockDomain"), }, }, }, inEnvironment: &config.Environment{ Name: mockEnvName, Region: "us-west-2", }, inEnvironmentConfig: func() *manifest.Environment { envConfig := &manifest.Environment{} return envConfig }, inApp: &config.Application{ Name: mockAppName, Domain: "mockDomain", }, mock: func(m *deployMocks) { m.mockEndpointGetter.EXPECT().ServiceDiscoveryEndpoint().Return("mockApp.local", nil) m.mockEnvVersionGetter.EXPECT().Version().Return("v1.42.0", nil) m.mockAppVersionGetter.EXPECT().Version().Return("v1.0.0", nil).Times(2) m.mockServiceDeployer.EXPECT().DeployService(gomock.Any(), "mockBucket", gomock.Any()).Return(nil) }, }, "success with force update": { inForceDeploy: true, inEnvironment: &config.Environment{ Name: mockEnvName, Region: "us-west-2", }, inApp: &config.Application{ Name: mockAppName, }, mock: func(m *deployMocks) { m.mockEndpointGetter.EXPECT().ServiceDiscoveryEndpoint().Return("mockApp.local", nil) m.mockEnvVersionGetter.EXPECT().Version().Return("v1.42.0", nil) m.mockServiceDeployer.EXPECT().DeployService(gomock.Any(), "mockBucket", gomock.Any()). Return(cloudformation.NewMockErrChangeSetEmpty()) m.mockServiceForceUpdater.EXPECT().LastUpdatedAt(mockAppName, mockEnvName, mockName). Return(mockBeforeTime, nil) m.mockSpinner.EXPECT().Start(fmt.Sprintf(fmtForceUpdateSvcStart, mockName, mockEnvName)) m.mockServiceForceUpdater.EXPECT().ForceUpdateService(mockAppName, mockEnvName, mockName).Return(nil) m.mockSpinner.EXPECT().Stop(log.Ssuccessf(fmtForceUpdateSvcComplete, mockName, mockEnvName)) }, }, } for name, tc := range tests { t.Run(name, func(t *testing.T) { ctrl := gomock.NewController(t) defer ctrl.Finish() m := &deployMocks{ mockAppVersionGetter: mocks.NewMockversionGetter(ctrl), mockEnvVersionGetter: mocks.NewMockversionGetter(ctrl), mockEndpointGetter: mocks.NewMockendpointGetter(ctrl), mockServiceDeployer: mocks.NewMockserviceDeployer(ctrl), mockServiceForceUpdater: mocks.NewMockserviceForceUpdater(ctrl), mockSpinner: mocks.NewMockspinner(ctrl), mockPublicCIDRBlocksGetter: mocks.NewMockpublicCIDRBlocksGetter(ctrl), mockValidator: mocks.NewMockaliasCertValidator(ctrl), } tc.mock(m) if tc.inEnvironmentConfig == nil { tc.inEnvironmentConfig = func() *manifest.Environment { return &manifest.Environment{} } } deployer := lbWebSvcDeployer{ svcDeployer: &svcDeployer{ workloadDeployer: &workloadDeployer{ name: mockName, app: tc.inApp, env: tc.inEnvironment, envConfig: tc.inEnvironmentConfig(), resources: mockResources, deployer: m.mockServiceDeployer, endpointGetter: m.mockEndpointGetter, spinner: m.mockSpinner, envVersionGetter: m.mockEnvVersionGetter, overrider: new(override.Noop), }, newSvcUpdater: func(f func(*session.Session) serviceForceUpdater) serviceForceUpdater { return m.mockServiceForceUpdater }, now: func() time.Time { return mockNowTime }, }, appVersionGetter: m.mockAppVersionGetter, publicCIDRBlocksGetter: m.mockPublicCIDRBlocksGetter, newAliasCertValidator: func(region *string) aliasCertValidator { return m.mockValidator }, lbMft: &manifest.LoadBalancedWebService{ Workload: manifest.Workload{ Name: aws.String(mockName), }, LoadBalancedWebServiceConfig: manifest.LoadBalancedWebServiceConfig{ ImageConfig: manifest.ImageWithPortAndHealthcheck{ ImageWithPort: manifest.ImageWithPort{ Image: manifest.Image{ ImageLocationOrBuild: manifest.ImageLocationOrBuild{ Build: manifest.BuildArgsOrString{BuildString: aws.String("/Dockerfile")}, }, }, Port: aws.Uint16(80), }, }, HTTPOrBool: manifest.HTTPOrBool{ HTTP: manifest.HTTP{ Main: manifest.RoutingRule{ Path: aws.String("/"), Alias: tc.inAliases, RedirectToHTTPS: tc.inRedirectToHTTPS, }, AdditionalRoutingRules: []manifest.RoutingRule{ { Path: aws.String("/admin"), Alias: tc.inAliases, RedirectToHTTPS: tc.inRedirectToHTTPS, }, }, }, }, NLBConfig: tc.inNLB, }, }, newStack: func() cloudformation0.StackConfiguration { return new(stubCloudFormationStack) }, } _, gotErr := deployer.DeployWorkload(&DeployWorkloadInput{ Options: Options{ ForceNewUpdate: tc.inForceDeploy, DisableRollback: tc.inDisableRollback, }, }) if tc.wantErr != nil { require.EqualError(t, gotErr, tc.wantErr.Error()) } else { require.NoError(t, gotErr) } }) } } func TestUploadArtifacts(t *testing.T) { d := &workloadDeployer{} errFunc := func(out *UploadArtifactsOutput) error { return errors.New("test error") } noErrFunc := func(out *UploadArtifactsOutput) error { out.AddonsURL = "an addons url" return nil } out, err := d.uploadArtifacts(noErrFunc, errFunc) require.EqualError(t, err, "test error") require.Nil(t, out) out, err = d.uploadArtifacts(errFunc, noErrFunc) require.EqualError(t, err, "test error") require.Nil(t, out) out, err = d.uploadArtifacts(noErrFunc) require.NoError(t, err) require.Equal(t, &UploadArtifactsOutput{AddonsURL: "an addons url"}, out) } type deployDiffMocks struct { mockDeployedTmplGetter *mocks.MockdeployedTemplateGetter } func TestWorkloadDeployer_DeployDiff(t *testing.T) { testCases := map[string]struct { inTemplate string setUpMocks func(m *deployDiffMocks) wanted string checkErr func(t *testing.T, gotErr error) }{ "error getting the deployed template": { setUpMocks: func(m *deployDiffMocks) { m.mockDeployedTmplGetter. EXPECT().Template(gomock.Eq(stack.NameForWorkload("mockApp", "mockEnv", "mockSvc"))). Return("", errors.New("some error")) }, checkErr: func(t *testing.T, gotErr error) { require.EqualError(t, gotErr, `retrieve the deployed template for "mockSvc": some error`) }, }, "error parsing the diff against the deployed template": { inTemplate: `!!!???what a weird template`, setUpMocks: func(m *deployDiffMocks) { m.mockDeployedTmplGetter.EXPECT(). Template(gomock.Eq(stack.NameForWorkload("mockApp", "mockEnv", "mockSvc"))). Return("wow such template", nil) }, checkErr: func(t *testing.T, gotErr error) { require.ErrorContains(t, gotErr, `parse the diff against the deployed "mockSvc" in environment "mockEnv"`) }, }, "get the correct diff": { inTemplate: `peace: and love`, setUpMocks: func(m *deployDiffMocks) { m.mockDeployedTmplGetter.EXPECT(). Template(gomock.Eq(stack.NameForWorkload("mockApp", "mockEnv", "mockSvc"))). Return("peace: und Liebe", nil) }, wanted: `~ peace: und Liebe -> and love `, }, "get the correct diff when there is no deployed diff": { inTemplate: `peace: and love`, setUpMocks: func(m *deployDiffMocks) { m.mockDeployedTmplGetter.EXPECT(). Template(gomock.Eq(stack.NameForWorkload("mockApp", "mockEnv", "mockSvc"))). Return("", &cloudformation.ErrStackNotFound{}) }, wanted: `+ peace: and love `, }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { ctrl := gomock.NewController(t) defer ctrl.Finish() m := &deployDiffMocks{ mockDeployedTmplGetter: mocks.NewMockdeployedTemplateGetter(ctrl), } tc.setUpMocks(m) deployer := workloadDeployer{ name: "mockSvc", app: &config.Application{ Name: "mockApp", }, env: &config.Environment{ Name: "mockEnv", }, tmplGetter: m.mockDeployedTmplGetter, } got, gotErr := deployer.DeployDiff(tc.inTemplate) if tc.checkErr != nil { tc.checkErr(t, gotErr) } else { require.NoError(t, gotErr) require.Equal(t, tc.wanted, got) } }) } }
1,557
copilot-cli
aws
Go
// Code generated by MockGen. DO NOT EDIT. // Source: ./internal/pkg/cli/deploy/backend.go // Package mocks is a generated GoMock package. package mocks
6
copilot-cli
aws
Go
// Code generated by MockGen. DO NOT EDIT. // Source: ./internal/pkg/cli/deploy/env.go // Package mocks is a generated GoMock package. package mocks import ( context "context" reflect "reflect" cloudformation "github.com/aws/aws-sdk-go/service/cloudformation" cloudformation0 "github.com/aws/copilot-cli/internal/pkg/aws/cloudformation" elbv2 "github.com/aws/copilot-cli/internal/pkg/aws/elbv2" config "github.com/aws/copilot-cli/internal/pkg/config" cloudformation1 "github.com/aws/copilot-cli/internal/pkg/deploy/cloudformation" stack "github.com/aws/copilot-cli/internal/pkg/deploy/cloudformation/stack" stack0 "github.com/aws/copilot-cli/internal/pkg/describe/stack" gomock "github.com/golang/mock/gomock" ) // MockWorkspaceAddonsReaderPathGetter is a mock of WorkspaceAddonsReaderPathGetter interface. type MockWorkspaceAddonsReaderPathGetter struct { ctrl *gomock.Controller recorder *MockWorkspaceAddonsReaderPathGetterMockRecorder } // MockWorkspaceAddonsReaderPathGetterMockRecorder is the mock recorder for MockWorkspaceAddonsReaderPathGetter. type MockWorkspaceAddonsReaderPathGetterMockRecorder struct { mock *MockWorkspaceAddonsReaderPathGetter } // NewMockWorkspaceAddonsReaderPathGetter creates a new mock instance. func NewMockWorkspaceAddonsReaderPathGetter(ctrl *gomock.Controller) *MockWorkspaceAddonsReaderPathGetter { mock := &MockWorkspaceAddonsReaderPathGetter{ctrl: ctrl} mock.recorder = &MockWorkspaceAddonsReaderPathGetterMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockWorkspaceAddonsReaderPathGetter) EXPECT() *MockWorkspaceAddonsReaderPathGetterMockRecorder { return m.recorder } // EnvAddonFileAbsPath mocks base method. func (m *MockWorkspaceAddonsReaderPathGetter) EnvAddonFileAbsPath(fName string) string { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "EnvAddonFileAbsPath", fName) ret0, _ := ret[0].(string) return ret0 } // EnvAddonFileAbsPath indicates an expected call of EnvAddonFileAbsPath. func (mr *MockWorkspaceAddonsReaderPathGetterMockRecorder) EnvAddonFileAbsPath(fName interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "EnvAddonFileAbsPath", reflect.TypeOf((*MockWorkspaceAddonsReaderPathGetter)(nil).EnvAddonFileAbsPath), fName) } // EnvAddonsAbsPath mocks base method. func (m *MockWorkspaceAddonsReaderPathGetter) EnvAddonsAbsPath() string { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "EnvAddonsAbsPath") ret0, _ := ret[0].(string) return ret0 } // EnvAddonsAbsPath indicates an expected call of EnvAddonsAbsPath. func (mr *MockWorkspaceAddonsReaderPathGetterMockRecorder) EnvAddonsAbsPath() *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "EnvAddonsAbsPath", reflect.TypeOf((*MockWorkspaceAddonsReaderPathGetter)(nil).EnvAddonsAbsPath)) } // ListFiles mocks base method. func (m *MockWorkspaceAddonsReaderPathGetter) ListFiles(dirPath string) ([]string, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "ListFiles", dirPath) ret0, _ := ret[0].([]string) ret1, _ := ret[1].(error) return ret0, ret1 } // ListFiles indicates an expected call of ListFiles. func (mr *MockWorkspaceAddonsReaderPathGetterMockRecorder) ListFiles(dirPath interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ListFiles", reflect.TypeOf((*MockWorkspaceAddonsReaderPathGetter)(nil).ListFiles), dirPath) } // Path mocks base method. func (m *MockWorkspaceAddonsReaderPathGetter) Path() string { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "Path") ret0, _ := ret[0].(string) return ret0 } // Path indicates an expected call of Path. func (mr *MockWorkspaceAddonsReaderPathGetterMockRecorder) Path() *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Path", reflect.TypeOf((*MockWorkspaceAddonsReaderPathGetter)(nil).Path)) } // ReadFile mocks base method. func (m *MockWorkspaceAddonsReaderPathGetter) ReadFile(fPath string) ([]byte, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "ReadFile", fPath) ret0, _ := ret[0].([]byte) ret1, _ := ret[1].(error) return ret0, ret1 } // ReadFile indicates an expected call of ReadFile. func (mr *MockWorkspaceAddonsReaderPathGetterMockRecorder) ReadFile(fPath interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ReadFile", reflect.TypeOf((*MockWorkspaceAddonsReaderPathGetter)(nil).ReadFile), fPath) } // WorkloadAddonFileAbsPath mocks base method. func (m *MockWorkspaceAddonsReaderPathGetter) WorkloadAddonFileAbsPath(wkldName, fName string) string { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "WorkloadAddonFileAbsPath", wkldName, fName) ret0, _ := ret[0].(string) return ret0 } // WorkloadAddonFileAbsPath indicates an expected call of WorkloadAddonFileAbsPath. func (mr *MockWorkspaceAddonsReaderPathGetterMockRecorder) WorkloadAddonFileAbsPath(wkldName, fName interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "WorkloadAddonFileAbsPath", reflect.TypeOf((*MockWorkspaceAddonsReaderPathGetter)(nil).WorkloadAddonFileAbsPath), wkldName, fName) } // WorkloadAddonsAbsPath mocks base method. func (m *MockWorkspaceAddonsReaderPathGetter) WorkloadAddonsAbsPath(name string) string { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "WorkloadAddonsAbsPath", name) ret0, _ := ret[0].(string) return ret0 } // WorkloadAddonsAbsPath indicates an expected call of WorkloadAddonsAbsPath. func (mr *MockWorkspaceAddonsReaderPathGetterMockRecorder) WorkloadAddonsAbsPath(name interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "WorkloadAddonsAbsPath", reflect.TypeOf((*MockWorkspaceAddonsReaderPathGetter)(nil).WorkloadAddonsAbsPath), name) } // MockappResourcesGetter is a mock of appResourcesGetter interface. type MockappResourcesGetter struct { ctrl *gomock.Controller recorder *MockappResourcesGetterMockRecorder } // MockappResourcesGetterMockRecorder is the mock recorder for MockappResourcesGetter. type MockappResourcesGetterMockRecorder struct { mock *MockappResourcesGetter } // NewMockappResourcesGetter creates a new mock instance. func NewMockappResourcesGetter(ctrl *gomock.Controller) *MockappResourcesGetter { mock := &MockappResourcesGetter{ctrl: ctrl} mock.recorder = &MockappResourcesGetterMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockappResourcesGetter) EXPECT() *MockappResourcesGetterMockRecorder { return m.recorder } // GetAppResourcesByRegion mocks base method. func (m *MockappResourcesGetter) GetAppResourcesByRegion(app *config.Application, region string) (*stack.AppRegionalResources, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "GetAppResourcesByRegion", app, region) ret0, _ := ret[0].(*stack.AppRegionalResources) ret1, _ := ret[1].(error) return ret0, ret1 } // GetAppResourcesByRegion indicates an expected call of GetAppResourcesByRegion. func (mr *MockappResourcesGetterMockRecorder) GetAppResourcesByRegion(app, region interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetAppResourcesByRegion", reflect.TypeOf((*MockappResourcesGetter)(nil).GetAppResourcesByRegion), app, region) } // MockenvironmentDeployer is a mock of environmentDeployer interface. type MockenvironmentDeployer struct { ctrl *gomock.Controller recorder *MockenvironmentDeployerMockRecorder } // MockenvironmentDeployerMockRecorder is the mock recorder for MockenvironmentDeployer. type MockenvironmentDeployerMockRecorder struct { mock *MockenvironmentDeployer } // NewMockenvironmentDeployer creates a new mock instance. func NewMockenvironmentDeployer(ctrl *gomock.Controller) *MockenvironmentDeployer { mock := &MockenvironmentDeployer{ctrl: ctrl} mock.recorder = &MockenvironmentDeployerMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockenvironmentDeployer) EXPECT() *MockenvironmentDeployerMockRecorder { return m.recorder } // DeployedEnvironmentParameters mocks base method. func (m *MockenvironmentDeployer) DeployedEnvironmentParameters(app, env string) ([]*cloudformation.Parameter, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "DeployedEnvironmentParameters", app, env) ret0, _ := ret[0].([]*cloudformation.Parameter) ret1, _ := ret[1].(error) return ret0, ret1 } // DeployedEnvironmentParameters indicates an expected call of DeployedEnvironmentParameters. func (mr *MockenvironmentDeployerMockRecorder) DeployedEnvironmentParameters(app, env interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DeployedEnvironmentParameters", reflect.TypeOf((*MockenvironmentDeployer)(nil).DeployedEnvironmentParameters), app, env) } // ForceUpdateOutputID mocks base method. func (m *MockenvironmentDeployer) ForceUpdateOutputID(app, env string) (string, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "ForceUpdateOutputID", app, env) ret0, _ := ret[0].(string) ret1, _ := ret[1].(error) return ret0, ret1 } // ForceUpdateOutputID indicates an expected call of ForceUpdateOutputID. func (mr *MockenvironmentDeployerMockRecorder) ForceUpdateOutputID(app, env interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ForceUpdateOutputID", reflect.TypeOf((*MockenvironmentDeployer)(nil).ForceUpdateOutputID), app, env) } // UpdateAndRenderEnvironment mocks base method. func (m *MockenvironmentDeployer) UpdateAndRenderEnvironment(conf cloudformation1.StackConfiguration, bucketARN string, opts ...cloudformation0.StackOption) error { m.ctrl.T.Helper() varargs := []interface{}{conf, bucketARN} for _, a := range opts { varargs = append(varargs, a) } ret := m.ctrl.Call(m, "UpdateAndRenderEnvironment", varargs...) ret0, _ := ret[0].(error) return ret0 } // UpdateAndRenderEnvironment indicates an expected call of UpdateAndRenderEnvironment. func (mr *MockenvironmentDeployerMockRecorder) UpdateAndRenderEnvironment(conf, bucketARN interface{}, opts ...interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() varargs := append([]interface{}{conf, bucketARN}, opts...) return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "UpdateAndRenderEnvironment", reflect.TypeOf((*MockenvironmentDeployer)(nil).UpdateAndRenderEnvironment), varargs...) } // Mockpatcher is a mock of patcher interface. type Mockpatcher struct { ctrl *gomock.Controller recorder *MockpatcherMockRecorder } // MockpatcherMockRecorder is the mock recorder for Mockpatcher. type MockpatcherMockRecorder struct { mock *Mockpatcher } // NewMockpatcher creates a new mock instance. func NewMockpatcher(ctrl *gomock.Controller) *Mockpatcher { mock := &Mockpatcher{ctrl: ctrl} mock.recorder = &MockpatcherMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *Mockpatcher) EXPECT() *MockpatcherMockRecorder { return m.recorder } // EnsureManagerRoleIsAllowedToUpload mocks base method. func (m *Mockpatcher) EnsureManagerRoleIsAllowedToUpload(bucketName string) error { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "EnsureManagerRoleIsAllowedToUpload", bucketName) ret0, _ := ret[0].(error) return ret0 } // EnsureManagerRoleIsAllowedToUpload indicates an expected call of EnsureManagerRoleIsAllowedToUpload. func (mr *MockpatcherMockRecorder) EnsureManagerRoleIsAllowedToUpload(bucketName interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "EnsureManagerRoleIsAllowedToUpload", reflect.TypeOf((*Mockpatcher)(nil).EnsureManagerRoleIsAllowedToUpload), bucketName) } // MockprefixListGetter is a mock of prefixListGetter interface. type MockprefixListGetter struct { ctrl *gomock.Controller recorder *MockprefixListGetterMockRecorder } // MockprefixListGetterMockRecorder is the mock recorder for MockprefixListGetter. type MockprefixListGetterMockRecorder struct { mock *MockprefixListGetter } // NewMockprefixListGetter creates a new mock instance. func NewMockprefixListGetter(ctrl *gomock.Controller) *MockprefixListGetter { mock := &MockprefixListGetter{ctrl: ctrl} mock.recorder = &MockprefixListGetterMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockprefixListGetter) EXPECT() *MockprefixListGetterMockRecorder { return m.recorder } // CloudFrontManagedPrefixListID mocks base method. func (m *MockprefixListGetter) CloudFrontManagedPrefixListID() (string, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "CloudFrontManagedPrefixListID") ret0, _ := ret[0].(string) ret1, _ := ret[1].(error) return ret0, ret1 } // CloudFrontManagedPrefixListID indicates an expected call of CloudFrontManagedPrefixListID. func (mr *MockprefixListGetterMockRecorder) CloudFrontManagedPrefixListID() *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "CloudFrontManagedPrefixListID", reflect.TypeOf((*MockprefixListGetter)(nil).CloudFrontManagedPrefixListID)) } // MockenvDescriber is a mock of envDescriber interface. type MockenvDescriber struct { ctrl *gomock.Controller recorder *MockenvDescriberMockRecorder } // MockenvDescriberMockRecorder is the mock recorder for MockenvDescriber. type MockenvDescriberMockRecorder struct { mock *MockenvDescriber } // NewMockenvDescriber creates a new mock instance. func NewMockenvDescriber(ctrl *gomock.Controller) *MockenvDescriber { mock := &MockenvDescriber{ctrl: ctrl} mock.recorder = &MockenvDescriberMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockenvDescriber) EXPECT() *MockenvDescriberMockRecorder { return m.recorder } // Params mocks base method. func (m *MockenvDescriber) Params() (map[string]string, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "Params") ret0, _ := ret[0].(map[string]string) ret1, _ := ret[1].(error) return ret0, ret1 } // Params indicates an expected call of Params. func (mr *MockenvDescriberMockRecorder) Params() *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Params", reflect.TypeOf((*MockenvDescriber)(nil).Params)) } // ValidateCFServiceDomainAliases mocks base method. func (m *MockenvDescriber) ValidateCFServiceDomainAliases() error { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "ValidateCFServiceDomainAliases") ret0, _ := ret[0].(error) return ret0 } // ValidateCFServiceDomainAliases indicates an expected call of ValidateCFServiceDomainAliases. func (mr *MockenvDescriberMockRecorder) ValidateCFServiceDomainAliases() *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ValidateCFServiceDomainAliases", reflect.TypeOf((*MockenvDescriber)(nil).ValidateCFServiceDomainAliases)) } // MocklbDescriber is a mock of lbDescriber interface. type MocklbDescriber struct { ctrl *gomock.Controller recorder *MocklbDescriberMockRecorder } // MocklbDescriberMockRecorder is the mock recorder for MocklbDescriber. type MocklbDescriberMockRecorder struct { mock *MocklbDescriber } // NewMocklbDescriber creates a new mock instance. func NewMocklbDescriber(ctrl *gomock.Controller) *MocklbDescriber { mock := &MocklbDescriber{ctrl: ctrl} mock.recorder = &MocklbDescriberMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MocklbDescriber) EXPECT() *MocklbDescriberMockRecorder { return m.recorder } // DescribeRule mocks base method. func (m *MocklbDescriber) DescribeRule(arg0 context.Context, arg1 string) (elbv2.Rule, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "DescribeRule", arg0, arg1) ret0, _ := ret[0].(elbv2.Rule) ret1, _ := ret[1].(error) return ret0, ret1 } // DescribeRule indicates an expected call of DescribeRule. func (mr *MocklbDescriberMockRecorder) DescribeRule(arg0, arg1 interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DescribeRule", reflect.TypeOf((*MocklbDescriber)(nil).DescribeRule), arg0, arg1) } // MockstackDescriber is a mock of stackDescriber interface. type MockstackDescriber struct { ctrl *gomock.Controller recorder *MockstackDescriberMockRecorder } // MockstackDescriberMockRecorder is the mock recorder for MockstackDescriber. type MockstackDescriberMockRecorder struct { mock *MockstackDescriber } // NewMockstackDescriber creates a new mock instance. func NewMockstackDescriber(ctrl *gomock.Controller) *MockstackDescriber { mock := &MockstackDescriber{ctrl: ctrl} mock.recorder = &MockstackDescriberMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockstackDescriber) EXPECT() *MockstackDescriberMockRecorder { return m.recorder } // Resources mocks base method. func (m *MockstackDescriber) Resources() ([]*stack0.Resource, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "Resources") ret0, _ := ret[0].([]*stack0.Resource) ret1, _ := ret[1].(error) return ret0, ret1 } // Resources indicates an expected call of Resources. func (mr *MockstackDescriberMockRecorder) Resources() *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Resources", reflect.TypeOf((*MockstackDescriber)(nil).Resources)) }
456
copilot-cli
aws
Go
// Code generated by MockGen. DO NOT EDIT. // Source: ./internal/pkg/cli/deploy/job.go // Package mocks is a generated GoMock package. package mocks
6
copilot-cli
aws
Go
// Code generated by MockGen. DO NOT EDIT. // Source: ./internal/pkg/cli/deploy/lbws.go // Package mocks is a generated GoMock package. package mocks import ( reflect "reflect" gomock "github.com/golang/mock/gomock" ) // MockpublicCIDRBlocksGetter is a mock of publicCIDRBlocksGetter interface. type MockpublicCIDRBlocksGetter struct { ctrl *gomock.Controller recorder *MockpublicCIDRBlocksGetterMockRecorder } // MockpublicCIDRBlocksGetterMockRecorder is the mock recorder for MockpublicCIDRBlocksGetter. type MockpublicCIDRBlocksGetterMockRecorder struct { mock *MockpublicCIDRBlocksGetter } // NewMockpublicCIDRBlocksGetter creates a new mock instance. func NewMockpublicCIDRBlocksGetter(ctrl *gomock.Controller) *MockpublicCIDRBlocksGetter { mock := &MockpublicCIDRBlocksGetter{ctrl: ctrl} mock.recorder = &MockpublicCIDRBlocksGetterMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockpublicCIDRBlocksGetter) EXPECT() *MockpublicCIDRBlocksGetterMockRecorder { return m.recorder } // PublicCIDRBlocks mocks base method. func (m *MockpublicCIDRBlocksGetter) PublicCIDRBlocks() ([]string, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "PublicCIDRBlocks") ret0, _ := ret[0].([]string) ret1, _ := ret[1].(error) return ret0, ret1 } // PublicCIDRBlocks indicates an expected call of PublicCIDRBlocks. func (mr *MockpublicCIDRBlocksGetterMockRecorder) PublicCIDRBlocks() *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "PublicCIDRBlocks", reflect.TypeOf((*MockpublicCIDRBlocksGetter)(nil).PublicCIDRBlocks)) }
50
copilot-cli
aws
Go
// Code generated by MockGen. DO NOT EDIT. // Source: ./internal/pkg/cli/deploy/rdws.go // Package mocks is a generated GoMock package. package mocks
6
copilot-cli
aws
Go
// Code generated by MockGen. DO NOT EDIT. // Source: ./internal/pkg/cli/deploy/static_site.go // Package mocks is a generated GoMock package. package mocks import ( reflect "reflect" manifest "github.com/aws/copilot-cli/internal/pkg/manifest" gomock "github.com/golang/mock/gomock" ) // MockfileUploader is a mock of fileUploader interface. type MockfileUploader struct { ctrl *gomock.Controller recorder *MockfileUploaderMockRecorder } // MockfileUploaderMockRecorder is the mock recorder for MockfileUploader. type MockfileUploaderMockRecorder struct { mock *MockfileUploader } // NewMockfileUploader creates a new mock instance. func NewMockfileUploader(ctrl *gomock.Controller) *MockfileUploader { mock := &MockfileUploader{ctrl: ctrl} mock.recorder = &MockfileUploaderMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockfileUploader) EXPECT() *MockfileUploaderMockRecorder { return m.recorder } // UploadFiles mocks base method. func (m *MockfileUploader) UploadFiles(files []manifest.FileUpload) (string, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "UploadFiles", files) ret0, _ := ret[0].(string) ret1, _ := ret[1].(error) return ret0, ret1 } // UploadFiles indicates an expected call of UploadFiles. func (mr *MockfileUploaderMockRecorder) UploadFiles(files interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "UploadFiles", reflect.TypeOf((*MockfileUploader)(nil).UploadFiles), files) }
51
copilot-cli
aws
Go
// Code generated by MockGen. DO NOT EDIT. // Source: ./internal/pkg/cli/deploy/svc.go // Package mocks is a generated GoMock package. package mocks import ( io "io" reflect "reflect" time "time" gomock "github.com/golang/mock/gomock" ) // Mockuploader is a mock of uploader interface. type Mockuploader struct { ctrl *gomock.Controller recorder *MockuploaderMockRecorder } // MockuploaderMockRecorder is the mock recorder for Mockuploader. type MockuploaderMockRecorder struct { mock *Mockuploader } // NewMockuploader creates a new mock instance. func NewMockuploader(ctrl *gomock.Controller) *Mockuploader { mock := &Mockuploader{ctrl: ctrl} mock.recorder = &MockuploaderMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *Mockuploader) EXPECT() *MockuploaderMockRecorder { return m.recorder } // Upload mocks base method. func (m *Mockuploader) Upload(bucket, key string, data io.Reader) (string, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "Upload", bucket, key, data) ret0, _ := ret[0].(string) ret1, _ := ret[1].(error) return ret0, ret1 } // Upload indicates an expected call of Upload. func (mr *MockuploaderMockRecorder) Upload(bucket, key, data interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Upload", reflect.TypeOf((*Mockuploader)(nil).Upload), bucket, key, data) } // MockversionGetter is a mock of versionGetter interface. type MockversionGetter struct { ctrl *gomock.Controller recorder *MockversionGetterMockRecorder } // MockversionGetterMockRecorder is the mock recorder for MockversionGetter. type MockversionGetterMockRecorder struct { mock *MockversionGetter } // NewMockversionGetter creates a new mock instance. func NewMockversionGetter(ctrl *gomock.Controller) *MockversionGetter { mock := &MockversionGetter{ctrl: ctrl} mock.recorder = &MockversionGetterMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockversionGetter) EXPECT() *MockversionGetterMockRecorder { return m.recorder } // Version mocks base method. func (m *MockversionGetter) Version() (string, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "Version") ret0, _ := ret[0].(string) ret1, _ := ret[1].(error) return ret0, ret1 } // Version indicates an expected call of Version. func (mr *MockversionGetterMockRecorder) Version() *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Version", reflect.TypeOf((*MockversionGetter)(nil).Version)) } // MockserviceForceUpdater is a mock of serviceForceUpdater interface. type MockserviceForceUpdater struct { ctrl *gomock.Controller recorder *MockserviceForceUpdaterMockRecorder } // MockserviceForceUpdaterMockRecorder is the mock recorder for MockserviceForceUpdater. type MockserviceForceUpdaterMockRecorder struct { mock *MockserviceForceUpdater } // NewMockserviceForceUpdater creates a new mock instance. func NewMockserviceForceUpdater(ctrl *gomock.Controller) *MockserviceForceUpdater { mock := &MockserviceForceUpdater{ctrl: ctrl} mock.recorder = &MockserviceForceUpdaterMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockserviceForceUpdater) EXPECT() *MockserviceForceUpdaterMockRecorder { return m.recorder } // ForceUpdateService mocks base method. func (m *MockserviceForceUpdater) ForceUpdateService(app, env, svc string) error { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "ForceUpdateService", app, env, svc) ret0, _ := ret[0].(error) return ret0 } // ForceUpdateService indicates an expected call of ForceUpdateService. func (mr *MockserviceForceUpdaterMockRecorder) ForceUpdateService(app, env, svc interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ForceUpdateService", reflect.TypeOf((*MockserviceForceUpdater)(nil).ForceUpdateService), app, env, svc) } // LastUpdatedAt mocks base method. func (m *MockserviceForceUpdater) LastUpdatedAt(app, env, svc string) (time.Time, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "LastUpdatedAt", app, env, svc) ret0, _ := ret[0].(time.Time) ret1, _ := ret[1].(error) return ret0, ret1 } // LastUpdatedAt indicates an expected call of LastUpdatedAt. func (mr *MockserviceForceUpdaterMockRecorder) LastUpdatedAt(app, env, svc interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "LastUpdatedAt", reflect.TypeOf((*MockserviceForceUpdater)(nil).LastUpdatedAt), app, env, svc) } // MockaliasCertValidator is a mock of aliasCertValidator interface. type MockaliasCertValidator struct { ctrl *gomock.Controller recorder *MockaliasCertValidatorMockRecorder } // MockaliasCertValidatorMockRecorder is the mock recorder for MockaliasCertValidator. type MockaliasCertValidatorMockRecorder struct { mock *MockaliasCertValidator } // NewMockaliasCertValidator creates a new mock instance. func NewMockaliasCertValidator(ctrl *gomock.Controller) *MockaliasCertValidator { mock := &MockaliasCertValidator{ctrl: ctrl} mock.recorder = &MockaliasCertValidatorMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockaliasCertValidator) EXPECT() *MockaliasCertValidatorMockRecorder { return m.recorder } // ValidateCertAliases mocks base method. func (m *MockaliasCertValidator) ValidateCertAliases(aliases, certs []string) error { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "ValidateCertAliases", aliases, certs) ret0, _ := ret[0].(error) return ret0 } // ValidateCertAliases indicates an expected call of ValidateCertAliases. func (mr *MockaliasCertValidatorMockRecorder) ValidateCertAliases(aliases, certs interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ValidateCertAliases", reflect.TypeOf((*MockaliasCertValidator)(nil).ValidateCertAliases), aliases, certs) }
179
copilot-cli
aws
Go
// Code generated by MockGen. DO NOT EDIT. // Source: ./internal/pkg/cli/deploy/worker.go // Package mocks is a generated GoMock package. package mocks import ( reflect "reflect" deploy "github.com/aws/copilot-cli/internal/pkg/deploy" gomock "github.com/golang/mock/gomock" ) // MocksnsTopicsLister is a mock of snsTopicsLister interface. type MocksnsTopicsLister struct { ctrl *gomock.Controller recorder *MocksnsTopicsListerMockRecorder } // MocksnsTopicsListerMockRecorder is the mock recorder for MocksnsTopicsLister. type MocksnsTopicsListerMockRecorder struct { mock *MocksnsTopicsLister } // NewMocksnsTopicsLister creates a new mock instance. func NewMocksnsTopicsLister(ctrl *gomock.Controller) *MocksnsTopicsLister { mock := &MocksnsTopicsLister{ctrl: ctrl} mock.recorder = &MocksnsTopicsListerMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MocksnsTopicsLister) EXPECT() *MocksnsTopicsListerMockRecorder { return m.recorder } // ListSNSTopics mocks base method. func (m *MocksnsTopicsLister) ListSNSTopics(appName, envName string) ([]deploy.Topic, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "ListSNSTopics", appName, envName) ret0, _ := ret[0].([]deploy.Topic) ret1, _ := ret[1].(error) return ret0, ret1 } // ListSNSTopics indicates an expected call of ListSNSTopics. func (mr *MocksnsTopicsListerMockRecorder) ListSNSTopics(appName, envName interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ListSNSTopics", reflect.TypeOf((*MocksnsTopicsLister)(nil).ListSNSTopics), appName, envName) }
51
copilot-cli
aws
Go
// Code generated by MockGen. DO NOT EDIT. // Source: ./internal/pkg/cli/deploy/workload.go // Package mocks is a generated GoMock package. package mocks import ( context "context" io "io" reflect "reflect" addon "github.com/aws/copilot-cli/internal/pkg/addon" cloudformation "github.com/aws/copilot-cli/internal/pkg/aws/cloudformation" cloudformation0 "github.com/aws/copilot-cli/internal/pkg/deploy/cloudformation" dockerengine "github.com/aws/copilot-cli/internal/pkg/docker/dockerengine" gomock "github.com/golang/mock/gomock" ) // MockActionRecommender is a mock of ActionRecommender interface. type MockActionRecommender struct { ctrl *gomock.Controller recorder *MockActionRecommenderMockRecorder } // MockActionRecommenderMockRecorder is the mock recorder for MockActionRecommender. type MockActionRecommenderMockRecorder struct { mock *MockActionRecommender } // NewMockActionRecommender creates a new mock instance. func NewMockActionRecommender(ctrl *gomock.Controller) *MockActionRecommender { mock := &MockActionRecommender{ctrl: ctrl} mock.recorder = &MockActionRecommenderMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockActionRecommender) EXPECT() *MockActionRecommenderMockRecorder { return m.recorder } // RecommendedActions mocks base method. func (m *MockActionRecommender) RecommendedActions() []string { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "RecommendedActions") ret0, _ := ret[0].([]string) return ret0 } // RecommendedActions indicates an expected call of RecommendedActions. func (mr *MockActionRecommenderMockRecorder) RecommendedActions() *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "RecommendedActions", reflect.TypeOf((*MockActionRecommender)(nil).RecommendedActions)) } // MockrepositoryService is a mock of repositoryService interface. type MockrepositoryService struct { ctrl *gomock.Controller recorder *MockrepositoryServiceMockRecorder } // MockrepositoryServiceMockRecorder is the mock recorder for MockrepositoryService. type MockrepositoryServiceMockRecorder struct { mock *MockrepositoryService } // NewMockrepositoryService creates a new mock instance. func NewMockrepositoryService(ctrl *gomock.Controller) *MockrepositoryService { mock := &MockrepositoryService{ctrl: ctrl} mock.recorder = &MockrepositoryServiceMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockrepositoryService) EXPECT() *MockrepositoryServiceMockRecorder { return m.recorder } // BuildAndPush mocks base method. func (m *MockrepositoryService) BuildAndPush(ctx context.Context, args *dockerengine.BuildArguments, w io.Writer) (string, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "BuildAndPush", ctx, args, w) ret0, _ := ret[0].(string) ret1, _ := ret[1].(error) return ret0, ret1 } // BuildAndPush indicates an expected call of BuildAndPush. func (mr *MockrepositoryServiceMockRecorder) BuildAndPush(ctx, args, w interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "BuildAndPush", reflect.TypeOf((*MockrepositoryService)(nil).BuildAndPush), ctx, args, w) } // Login mocks base method. func (m *MockrepositoryService) Login() (string, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "Login") ret0, _ := ret[0].(string) ret1, _ := ret[1].(error) return ret0, ret1 } // Login indicates an expected call of Login. func (mr *MockrepositoryServiceMockRecorder) Login() *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Login", reflect.TypeOf((*MockrepositoryService)(nil).Login)) } // Mocktemplater is a mock of templater interface. type Mocktemplater struct { ctrl *gomock.Controller recorder *MocktemplaterMockRecorder } // MocktemplaterMockRecorder is the mock recorder for Mocktemplater. type MocktemplaterMockRecorder struct { mock *Mocktemplater } // NewMocktemplater creates a new mock instance. func NewMocktemplater(ctrl *gomock.Controller) *Mocktemplater { mock := &Mocktemplater{ctrl: ctrl} mock.recorder = &MocktemplaterMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *Mocktemplater) EXPECT() *MocktemplaterMockRecorder { return m.recorder } // Template mocks base method. func (m *Mocktemplater) Template() (string, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "Template") ret0, _ := ret[0].(string) ret1, _ := ret[1].(error) return ret0, ret1 } // Template indicates an expected call of Template. func (mr *MocktemplaterMockRecorder) Template() *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Template", reflect.TypeOf((*Mocktemplater)(nil).Template)) } // MockstackBuilder is a mock of stackBuilder interface. type MockstackBuilder struct { ctrl *gomock.Controller recorder *MockstackBuilderMockRecorder } // MockstackBuilderMockRecorder is the mock recorder for MockstackBuilder. type MockstackBuilderMockRecorder struct { mock *MockstackBuilder } // NewMockstackBuilder creates a new mock instance. func NewMockstackBuilder(ctrl *gomock.Controller) *MockstackBuilder { mock := &MockstackBuilder{ctrl: ctrl} mock.recorder = &MockstackBuilderMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockstackBuilder) EXPECT() *MockstackBuilderMockRecorder { return m.recorder } // Package mocks base method. func (m *MockstackBuilder) Package(arg0 addon.PackageConfig) error { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "Package", arg0) ret0, _ := ret[0].(error) return ret0 } // Package indicates an expected call of Package. func (mr *MockstackBuilderMockRecorder) Package(arg0 interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Package", reflect.TypeOf((*MockstackBuilder)(nil).Package), arg0) } // Parameters mocks base method. func (m *MockstackBuilder) Parameters() (string, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "Parameters") ret0, _ := ret[0].(string) ret1, _ := ret[1].(error) return ret0, ret1 } // Parameters indicates an expected call of Parameters. func (mr *MockstackBuilderMockRecorder) Parameters() *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Parameters", reflect.TypeOf((*MockstackBuilder)(nil).Parameters)) } // Template mocks base method. func (m *MockstackBuilder) Template() (string, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "Template") ret0, _ := ret[0].(string) ret1, _ := ret[1].(error) return ret0, ret1 } // Template indicates an expected call of Template. func (mr *MockstackBuilderMockRecorder) Template() *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Template", reflect.TypeOf((*MockstackBuilder)(nil).Template)) } // MockstackSerializer is a mock of stackSerializer interface. type MockstackSerializer struct { ctrl *gomock.Controller recorder *MockstackSerializerMockRecorder } // MockstackSerializerMockRecorder is the mock recorder for MockstackSerializer. type MockstackSerializerMockRecorder struct { mock *MockstackSerializer } // NewMockstackSerializer creates a new mock instance. func NewMockstackSerializer(ctrl *gomock.Controller) *MockstackSerializer { mock := &MockstackSerializer{ctrl: ctrl} mock.recorder = &MockstackSerializerMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockstackSerializer) EXPECT() *MockstackSerializerMockRecorder { return m.recorder } // SerializedParameters mocks base method. func (m *MockstackSerializer) SerializedParameters() (string, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "SerializedParameters") ret0, _ := ret[0].(string) ret1, _ := ret[1].(error) return ret0, ret1 } // SerializedParameters indicates an expected call of SerializedParameters. func (mr *MockstackSerializerMockRecorder) SerializedParameters() *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "SerializedParameters", reflect.TypeOf((*MockstackSerializer)(nil).SerializedParameters)) } // Template mocks base method. func (m *MockstackSerializer) Template() (string, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "Template") ret0, _ := ret[0].(string) ret1, _ := ret[1].(error) return ret0, ret1 } // Template indicates an expected call of Template. func (mr *MockstackSerializerMockRecorder) Template() *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Template", reflect.TypeOf((*MockstackSerializer)(nil).Template)) } // MockendpointGetter is a mock of endpointGetter interface. type MockendpointGetter struct { ctrl *gomock.Controller recorder *MockendpointGetterMockRecorder } // MockendpointGetterMockRecorder is the mock recorder for MockendpointGetter. type MockendpointGetterMockRecorder struct { mock *MockendpointGetter } // NewMockendpointGetter creates a new mock instance. func NewMockendpointGetter(ctrl *gomock.Controller) *MockendpointGetter { mock := &MockendpointGetter{ctrl: ctrl} mock.recorder = &MockendpointGetterMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockendpointGetter) EXPECT() *MockendpointGetterMockRecorder { return m.recorder } // ServiceDiscoveryEndpoint mocks base method. func (m *MockendpointGetter) ServiceDiscoveryEndpoint() (string, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "ServiceDiscoveryEndpoint") ret0, _ := ret[0].(string) ret1, _ := ret[1].(error) return ret0, ret1 } // ServiceDiscoveryEndpoint indicates an expected call of ServiceDiscoveryEndpoint. func (mr *MockendpointGetterMockRecorder) ServiceDiscoveryEndpoint() *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ServiceDiscoveryEndpoint", reflect.TypeOf((*MockendpointGetter)(nil).ServiceDiscoveryEndpoint)) } // MockserviceDeployer is a mock of serviceDeployer interface. type MockserviceDeployer struct { ctrl *gomock.Controller recorder *MockserviceDeployerMockRecorder } // MockserviceDeployerMockRecorder is the mock recorder for MockserviceDeployer. type MockserviceDeployerMockRecorder struct { mock *MockserviceDeployer } // NewMockserviceDeployer creates a new mock instance. func NewMockserviceDeployer(ctrl *gomock.Controller) *MockserviceDeployer { mock := &MockserviceDeployer{ctrl: ctrl} mock.recorder = &MockserviceDeployerMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockserviceDeployer) EXPECT() *MockserviceDeployerMockRecorder { return m.recorder } // DeployService mocks base method. func (m *MockserviceDeployer) DeployService(conf cloudformation0.StackConfiguration, bucketName string, opts ...cloudformation.StackOption) error { m.ctrl.T.Helper() varargs := []interface{}{conf, bucketName} for _, a := range opts { varargs = append(varargs, a) } ret := m.ctrl.Call(m, "DeployService", varargs...) ret0, _ := ret[0].(error) return ret0 } // DeployService indicates an expected call of DeployService. func (mr *MockserviceDeployerMockRecorder) DeployService(conf, bucketName interface{}, opts ...interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() varargs := append([]interface{}{conf, bucketName}, opts...) return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DeployService", reflect.TypeOf((*MockserviceDeployer)(nil).DeployService), varargs...) } // MockdeployedTemplateGetter is a mock of deployedTemplateGetter interface. type MockdeployedTemplateGetter struct { ctrl *gomock.Controller recorder *MockdeployedTemplateGetterMockRecorder } // MockdeployedTemplateGetterMockRecorder is the mock recorder for MockdeployedTemplateGetter. type MockdeployedTemplateGetterMockRecorder struct { mock *MockdeployedTemplateGetter } // NewMockdeployedTemplateGetter creates a new mock instance. func NewMockdeployedTemplateGetter(ctrl *gomock.Controller) *MockdeployedTemplateGetter { mock := &MockdeployedTemplateGetter{ctrl: ctrl} mock.recorder = &MockdeployedTemplateGetterMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockdeployedTemplateGetter) EXPECT() *MockdeployedTemplateGetterMockRecorder { return m.recorder } // Template mocks base method. func (m *MockdeployedTemplateGetter) Template(stackName string) (string, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "Template", stackName) ret0, _ := ret[0].(string) ret1, _ := ret[1].(error) return ret0, ret1 } // Template indicates an expected call of Template. func (mr *MockdeployedTemplateGetterMockRecorder) Template(stackName interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Template", reflect.TypeOf((*MockdeployedTemplateGetter)(nil).Template), stackName) } // Mockspinner is a mock of spinner interface. type Mockspinner struct { ctrl *gomock.Controller recorder *MockspinnerMockRecorder } // MockspinnerMockRecorder is the mock recorder for Mockspinner. type MockspinnerMockRecorder struct { mock *Mockspinner } // NewMockspinner creates a new mock instance. func NewMockspinner(ctrl *gomock.Controller) *Mockspinner { mock := &Mockspinner{ctrl: ctrl} mock.recorder = &MockspinnerMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *Mockspinner) EXPECT() *MockspinnerMockRecorder { return m.recorder } // Start mocks base method. func (m *Mockspinner) Start(label string) { m.ctrl.T.Helper() m.ctrl.Call(m, "Start", label) } // Start indicates an expected call of Start. func (mr *MockspinnerMockRecorder) Start(label interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Start", reflect.TypeOf((*Mockspinner)(nil).Start), label) } // Stop mocks base method. func (m *Mockspinner) Stop(label string) { m.ctrl.T.Helper() m.ctrl.Call(m, "Stop", label) } // Stop indicates an expected call of Stop. func (mr *MockspinnerMockRecorder) Stop(label interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Stop", reflect.TypeOf((*Mockspinner)(nil).Stop), label) } // MocklabeledTermPrinter is a mock of labeledTermPrinter interface. type MocklabeledTermPrinter struct { ctrl *gomock.Controller recorder *MocklabeledTermPrinterMockRecorder } // MocklabeledTermPrinterMockRecorder is the mock recorder for MocklabeledTermPrinter. type MocklabeledTermPrinterMockRecorder struct { mock *MocklabeledTermPrinter } // NewMocklabeledTermPrinter creates a new mock instance. func NewMocklabeledTermPrinter(ctrl *gomock.Controller) *MocklabeledTermPrinter { mock := &MocklabeledTermPrinter{ctrl: ctrl} mock.recorder = &MocklabeledTermPrinterMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MocklabeledTermPrinter) EXPECT() *MocklabeledTermPrinterMockRecorder { return m.recorder } // IsDone mocks base method. func (m *MocklabeledTermPrinter) IsDone() bool { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "IsDone") ret0, _ := ret[0].(bool) return ret0 } // IsDone indicates an expected call of IsDone. func (mr *MocklabeledTermPrinterMockRecorder) IsDone() *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "IsDone", reflect.TypeOf((*MocklabeledTermPrinter)(nil).IsDone)) } // Print mocks base method. func (m *MocklabeledTermPrinter) Print() { m.ctrl.T.Helper() m.ctrl.Call(m, "Print") } // Print indicates an expected call of Print. func (mr *MocklabeledTermPrinterMockRecorder) Print() *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Print", reflect.TypeOf((*MocklabeledTermPrinter)(nil).Print)) } // MockdockerEngineRunChecker is a mock of dockerEngineRunChecker interface. type MockdockerEngineRunChecker struct { ctrl *gomock.Controller recorder *MockdockerEngineRunCheckerMockRecorder } // MockdockerEngineRunCheckerMockRecorder is the mock recorder for MockdockerEngineRunChecker. type MockdockerEngineRunCheckerMockRecorder struct { mock *MockdockerEngineRunChecker } // NewMockdockerEngineRunChecker creates a new mock instance. func NewMockdockerEngineRunChecker(ctrl *gomock.Controller) *MockdockerEngineRunChecker { mock := &MockdockerEngineRunChecker{ctrl: ctrl} mock.recorder = &MockdockerEngineRunCheckerMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockdockerEngineRunChecker) EXPECT() *MockdockerEngineRunCheckerMockRecorder { return m.recorder } // CheckDockerEngineRunning mocks base method. func (m *MockdockerEngineRunChecker) CheckDockerEngineRunning() error { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "CheckDockerEngineRunning") ret0, _ := ret[0].(error) return ret0 } // CheckDockerEngineRunning indicates an expected call of CheckDockerEngineRunning. func (mr *MockdockerEngineRunCheckerMockRecorder) CheckDockerEngineRunning() *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "CheckDockerEngineRunning", reflect.TypeOf((*MockdockerEngineRunChecker)(nil).CheckDockerEngineRunning)) } // MocktimeoutError is a mock of timeoutError interface. type MocktimeoutError struct { ctrl *gomock.Controller recorder *MocktimeoutErrorMockRecorder } // MocktimeoutErrorMockRecorder is the mock recorder for MocktimeoutError. type MocktimeoutErrorMockRecorder struct { mock *MocktimeoutError } // NewMocktimeoutError creates a new mock instance. func NewMocktimeoutError(ctrl *gomock.Controller) *MocktimeoutError { mock := &MocktimeoutError{ctrl: ctrl} mock.recorder = &MocktimeoutErrorMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MocktimeoutError) EXPECT() *MocktimeoutErrorMockRecorder { return m.recorder } // Error mocks base method. func (m *MocktimeoutError) Error() string { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "Error") ret0, _ := ret[0].(string) return ret0 } // Error indicates an expected call of Error. func (mr *MocktimeoutErrorMockRecorder) Error() *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Error", reflect.TypeOf((*MocktimeoutError)(nil).Error)) } // Timeout mocks base method. func (m *MocktimeoutError) Timeout() bool { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "Timeout") ret0, _ := ret[0].(bool) return ret0 } // Timeout indicates an expected call of Timeout. func (mr *MocktimeoutErrorMockRecorder) Timeout() *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Timeout", reflect.TypeOf((*MocktimeoutError)(nil).Timeout)) }
568
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package patch import ( "errors" "fmt" "strings" "github.com/aws/aws-sdk-go/aws/endpoints" "github.com/aws/copilot-cli/internal/pkg/aws/cloudformation" "github.com/aws/copilot-cli/internal/pkg/aws/s3" "github.com/aws/copilot-cli/internal/pkg/config" "github.com/aws/copilot-cli/internal/pkg/deploy/cloudformation/stack" "github.com/aws/copilot-cli/internal/pkg/term/log" "github.com/aws/copilot-cli/internal/pkg/version" "golang.org/x/mod/semver" "gopkg.in/yaml.v3" ) type environmentTemplateUpdateGetter interface { Template(stackName string) (string, error) UpdateEnvironmentTemplate(appName, envName, templateBody, cfnExecRoleARN string) error } type progress interface { Start(label string) Stop(label string) } // EnvironmentPatcher checks if the environment needs a patch and perform the patch when necessary. type EnvironmentPatcher struct { Prog progress Env *config.Environment TemplatePatcher environmentTemplateUpdateGetter } // EnsureManagerRoleIsAllowedToUpload checks if the environment manager role has the necessary permissions to upload // objects to bucket and patches the permissions if not. func (p *EnvironmentPatcher) EnsureManagerRoleIsAllowedToUpload(bucket string) error { body, err := p.TemplatePatcher.Template(stack.NameForEnv(p.Env.App, p.Env.Name)) if err != nil { return fmt.Errorf("get environment template for %q: %w", p.Env.Name, err) } ok, err := isManagerRoleAllowedToUpload(body) if err != nil { return err } if ok { return nil } return p.grantManagerRolePermissionToUpload(p.Env.App, p.Env.Name, p.Env.ExecutionRoleARN, body, s3.FormatARN(endpoints.AwsPartitionID, bucket)) } func (p *EnvironmentPatcher) grantManagerRolePermissionToUpload(app, env, execRole, body, bucketARN string) error { // Detect which line number the EnvironmentManagerRole's PolicyDocument Statement is at. // We will add additional permissions after that line. type Template struct { Resources struct { ManagerRole struct { Properties struct { Policies []struct { Document struct { Statements yaml.Node `yaml:"Statement"` } `yaml:"PolicyDocument"` } `yaml:"Policies"` } `yaml:"Properties"` } `yaml:"EnvironmentManagerRole"` } `yaml:"Resources"` } var tpl Template if err := yaml.Unmarshal([]byte(body), &tpl); err != nil { return fmt.Errorf("unmarshal environment template to find EnvironmentManagerRole policy statement: %v", err) } if len(tpl.Resources.ManagerRole.Properties.Policies) == 0 { return errors.New("unable to find policies for the EnvironmentManagerRole") } // lines and columns are 1-indexed, so we have to subtract one from each. statementLineIndex := tpl.Resources.ManagerRole.Properties.Policies[0].Document.Statements.Line - 1 numSpaces := tpl.Resources.ManagerRole.Properties.Policies[0].Document.Statements.Column - 1 pad := strings.Repeat(" ", numSpaces) // Create the additional permissions needed with the appropriate indentation. permissions := fmt.Sprintf(`- Sid: PatchPutObjectsToArtifactBucket Effect: Allow Action: - s3:PutObject - s3:PutObjectAcl Resource: - %s - %s/*`, bucketARN, bucketARN) permissions = pad + strings.Replace(permissions, "\n", "\n"+pad, -1) // Add the new permissions to the body. lines := strings.Split(body, "\n") linesBefore := lines[:statementLineIndex] linesAfter := lines[statementLineIndex:] updatedLines := append(linesBefore, append(strings.Split(permissions, "\n"), linesAfter...)...) updatedBody := strings.Join(updatedLines, "\n") // Update the Environment template with the new content. // CloudFormation is the only entity that's allowed to update the EnvManagerRole so we have to go through this route. // See #3556. var errEmptyChangeSet *cloudformation.ErrChangeSetEmpty p.Prog.Start("Update the environment's manager role with permission to upload artifacts to S3") err := p.TemplatePatcher.UpdateEnvironmentTemplate(app, env, updatedBody, execRole) if err != nil && !errors.As(err, &errEmptyChangeSet) { p.Prog.Stop(log.Serrorln("Unable to update the environment's manager role with upload artifacts permission")) return fmt.Errorf("update environment template with PutObject permissions: %v", err) } p.Prog.Stop(log.Ssuccessln("Updated the environment's manager role with permissions to upload artifacts to S3")) return nil } func isManagerRoleAllowedToUpload(body string) (bool, error) { type Template struct { Metadata struct { Version string `yaml:"Version"` } `yaml:"Metadata"` } var tpl Template if err := yaml.Unmarshal([]byte(body), &tpl); err != nil { return false, fmt.Errorf("unmarshal environment template to detect Metadata.Version: %v", err) } if tpl.Metadata.Version == version.EnvTemplateBootstrap { // "bootstrap" version is introduced after v1.9.0. The environment manager roles must have had the permissions. return true, nil } if !semver.IsValid(tpl.Metadata.Version) { // The template doesn't contain a version. return false, nil } if semver.Compare(tpl.Metadata.Version, "v1.9.0") < 0 { // The permissions to grant the EnvManagerRole to upload artifacts was granted with template v1.9.0. return false, nil } return true, nil }
140
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package patch import ( "errors" "fmt" "testing" "github.com/aws/copilot-cli/internal/pkg/aws/cloudformation" "github.com/aws/copilot-cli/internal/pkg/cli/deploy/patch/mocks" "github.com/aws/copilot-cli/internal/pkg/config" "github.com/aws/copilot-cli/internal/pkg/deploy/cloudformation/stack" "github.com/golang/mock/gomock" "github.com/stretchr/testify/require" ) type envPatcherMock struct { templatePatcher *mocks.MockenvironmentTemplateUpdateGetter prog *mocks.Mockprogress } func TestEnvironmentPatcher_EnsureManagerRoleIsAllowedToUpload(t *testing.T) { testCases := map[string]struct { setupMocks func(m *envPatcherMock) wantedError error }{ "error getting environment template": { setupMocks: func(m *envPatcherMock) { m.templatePatcher.EXPECT().Template(stack.NameForEnv("mockApp", "mockEnv")). Return("", errors.New("some error")) }, wantedError: errors.New(`get environment template for "mockEnv": some error`), }, "error updating the environment template with the patch": { setupMocks: func(m *envPatcherMock) { m.templatePatcher.EXPECT().Template(stack.NameForEnv("mockApp", "mockEnv")). Return(` Metadata: Version: v1.7.0 Resources: EnvironmentManagerRole: Properties: Policies: - PolicyDocument: Statement: - Sid: CloudwatchLogs OtherResource:`, nil) m.prog.EXPECT().Start(gomock.Any()) m.templatePatcher.EXPECT().UpdateEnvironmentTemplate("mockApp", "mockEnv", ` Metadata: Version: v1.7.0 Resources: EnvironmentManagerRole: Properties: Policies: - PolicyDocument: Statement: - Sid: PatchPutObjectsToArtifactBucket Effect: Allow Action: - s3:PutObject - s3:PutObjectAcl Resource: - arn:aws:s3:::mockBucket - arn:aws:s3:::mockBucket/* - Sid: CloudwatchLogs OtherResource:`, "mockExecutionRoleARN").Return(errors.New("some error")) m.prog.EXPECT().Stop(gomock.Any()) }, wantedError: errors.New("update environment template with PutObject permissions: some error"), }, "success when template version is later than v1.9.0": { setupMocks: func(m *envPatcherMock) { m.templatePatcher.EXPECT().Template(stack.NameForEnv("mockApp", "mockEnv")). Return(` Metadata: Version: v1.9.0`, nil) }, }, "should upgrade non-legacy environments and ignore ErrChangeSet if the environment template already has permissions to upload artifacts": { setupMocks: func(m *envPatcherMock) { m.templatePatcher.EXPECT().Template(stack.NameForEnv("mockApp", "mockEnv")).Return(` Metadata: Version: v1.1.0 Resources: EnvironmentManagerRole: Properties: Policies: - PolicyDocument: Statement: - Sid: PatchPutObjectsToArtifactBucket Effect: Allow Action: - s3:PutObject - s3:PutObjectAcl Resource: - arn:aws:s3:::mockBucket - arn:aws:s3:::mockBucket/* `, nil) m.prog.EXPECT().Start(gomock.Any()) m.templatePatcher.EXPECT().UpdateEnvironmentTemplate(gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any()).Return(fmt.Errorf("wrapped err: %w", &cloudformation.ErrChangeSetEmpty{})) m.prog.EXPECT().Stop(gomock.Any()) }, }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { ctrl := gomock.NewController(t) defer ctrl.Finish() m := &envPatcherMock{ templatePatcher: mocks.NewMockenvironmentTemplateUpdateGetter(ctrl), prog: mocks.NewMockprogress(ctrl), } tc.setupMocks(m) p := EnvironmentPatcher{ Env: &config.Environment{ App: "mockApp", Name: "mockEnv", ExecutionRoleARN: "mockExecutionRoleARN", }, TemplatePatcher: m.templatePatcher, Prog: m.prog, } got := p.EnsureManagerRoleIsAllowedToUpload("mockBucket") if tc.wantedError != nil { require.EqualError(t, got, tc.wantedError.Error()) } else { require.NoError(t, got) } }) } }
138
copilot-cli
aws
Go
// Code generated by MockGen. DO NOT EDIT. // Source: ./internal/pkg/cli/deploy/patch/env.go // Package mocks is a generated GoMock package. package mocks import ( reflect "reflect" gomock "github.com/golang/mock/gomock" ) // MockenvironmentTemplateUpdateGetter is a mock of environmentTemplateUpdateGetter interface. type MockenvironmentTemplateUpdateGetter struct { ctrl *gomock.Controller recorder *MockenvironmentTemplateUpdateGetterMockRecorder } // MockenvironmentTemplateUpdateGetterMockRecorder is the mock recorder for MockenvironmentTemplateUpdateGetter. type MockenvironmentTemplateUpdateGetterMockRecorder struct { mock *MockenvironmentTemplateUpdateGetter } // NewMockenvironmentTemplateUpdateGetter creates a new mock instance. func NewMockenvironmentTemplateUpdateGetter(ctrl *gomock.Controller) *MockenvironmentTemplateUpdateGetter { mock := &MockenvironmentTemplateUpdateGetter{ctrl: ctrl} mock.recorder = &MockenvironmentTemplateUpdateGetterMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockenvironmentTemplateUpdateGetter) EXPECT() *MockenvironmentTemplateUpdateGetterMockRecorder { return m.recorder } // Template mocks base method. func (m *MockenvironmentTemplateUpdateGetter) Template(stackName string) (string, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "Template", stackName) ret0, _ := ret[0].(string) ret1, _ := ret[1].(error) return ret0, ret1 } // Template indicates an expected call of Template. func (mr *MockenvironmentTemplateUpdateGetterMockRecorder) Template(stackName interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Template", reflect.TypeOf((*MockenvironmentTemplateUpdateGetter)(nil).Template), stackName) } // UpdateEnvironmentTemplate mocks base method. func (m *MockenvironmentTemplateUpdateGetter) UpdateEnvironmentTemplate(appName, envName, templateBody, cfnExecRoleARN string) error { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "UpdateEnvironmentTemplate", appName, envName, templateBody, cfnExecRoleARN) ret0, _ := ret[0].(error) return ret0 } // UpdateEnvironmentTemplate indicates an expected call of UpdateEnvironmentTemplate. func (mr *MockenvironmentTemplateUpdateGetterMockRecorder) UpdateEnvironmentTemplate(appName, envName, templateBody, cfnExecRoleARN interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "UpdateEnvironmentTemplate", reflect.TypeOf((*MockenvironmentTemplateUpdateGetter)(nil).UpdateEnvironmentTemplate), appName, envName, templateBody, cfnExecRoleARN) } // Mockprogress is a mock of progress interface. type Mockprogress struct { ctrl *gomock.Controller recorder *MockprogressMockRecorder } // MockprogressMockRecorder is the mock recorder for Mockprogress. type MockprogressMockRecorder struct { mock *Mockprogress } // NewMockprogress creates a new mock instance. func NewMockprogress(ctrl *gomock.Controller) *Mockprogress { mock := &Mockprogress{ctrl: ctrl} mock.recorder = &MockprogressMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *Mockprogress) EXPECT() *MockprogressMockRecorder { return m.recorder } // Start mocks base method. func (m *Mockprogress) Start(label string) { m.ctrl.T.Helper() m.ctrl.Call(m, "Start", label) } // Start indicates an expected call of Start. func (mr *MockprogressMockRecorder) Start(label interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Start", reflect.TypeOf((*Mockprogress)(nil).Start), label) } // Stop mocks base method. func (m *Mockprogress) Stop(label string) { m.ctrl.T.Helper() m.ctrl.Call(m, "Stop", label) } // Stop indicates an expected call of Stop. func (mr *MockprogressMockRecorder) Stop(label interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Stop", reflect.TypeOf((*Mockprogress)(nil).Stop), label) }
111