repo_name
stringlengths 1
52
| repo_creator
stringclasses 6
values | programming_language
stringclasses 4
values | code
stringlengths 0
9.68M
| num_lines
int64 1
234k
|
---|---|---|---|---|
copilot-cli | aws | Go | // Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
// SPDX-License-Identifier: Apache-2.0
// Package groups contains the names of command groups.
package group
// Categories for each top level command in the CLI.
const (
GettingStarted = "Getting Started"
Develop = "Develop"
Settings = "Settings"
Release = "Release"
Extend = "Extend"
Debug = "Debug"
)
| 16 |
copilot-cli | aws | Go | // Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
// SPDX-License-Identifier: Apache-2.0
package list
import (
"encoding/json"
"fmt"
"io"
"strings"
"text/tabwriter"
"github.com/aws/copilot-cli/internal/pkg/config"
)
const (
// Display settings.
minCellWidth = 20 // minimum number of characters in a table's cell.
tabWidth = 4 // number of characters in between columns.
cellPaddingWidth = 2 // number of padding characters added by default to a cell.
paddingChar = ' ' // character in between columns.
noAdditionalFormatting = 0
// Workload types.
jobWorkloadType = "job"
svcWorkloadType = "service"
)
// Store wraps the methods required for interacting with config stores.
type Store interface {
GetApplication(appName string) (*config.Application, error)
ListJobs(appName string) ([]*config.Workload, error)
ListServices(appName string) ([]*config.Workload, error)
}
// Workspace wraps the methods required to interact with a local workspace.
type Workspace interface {
ListJobs() ([]string, error)
ListServices() ([]string, error)
}
// JobListWriter holds all the metadata and clients needed to list all jobs in a given
// workspace or app in a human- or machine-readable format.
type JobListWriter struct {
// Output configuration options.
ShowLocalJobs bool
OutputJSON bool
Store Store // Client to retrieve application configuration and job metadata.
Ws Workspace // Client to retrieve local jobs.
Out io.Writer // The writer where output will be written.
}
// SvcListWriter holds all the metadata and clients needed to list all services in a given
// workspace or app in a human- or machine-readable format.
type SvcListWriter struct {
ShowLocalSvcs bool
OutputJSON bool
Store Store // Client to retrieve application configuration and service metadata.
Ws Workspace // Client to retrieve local jobs.
Out io.Writer // The writer where output will be written.
}
// ServiceJSONOutput is the output struct for service list.
type ServiceJSONOutput struct {
Services []*config.Workload `json:"services"`
}
// JobJSONOutput is the output struct for job list.
type JobJSONOutput struct {
Jobs []*config.Workload `json:"jobs"`
}
// Jobs lists all jobs, either locally or in the workspace, and writes the output to a writer.
func (l *JobListWriter) Write(appName string) error {
if _, err := l.Store.GetApplication(appName); err != nil {
return fmt.Errorf("get application: %w", err)
}
wklds, err := l.Store.ListJobs(appName)
if err != nil {
return fmt.Errorf("get %s names: %w", jobWorkloadType, err)
}
if l.ShowLocalJobs {
localWklds, err := l.Ws.ListJobs()
if err != nil {
return fmt.Errorf("get local %s names: %w", jobWorkloadType, err)
}
wklds = filterByName(wklds, localWklds)
}
if l.OutputJSON {
data, err := l.jsonOutputJobs(wklds)
if err != nil {
return err
}
fmt.Fprint(l.Out, data)
} else {
humanOutput(wklds, l.Out)
}
return nil
}
// Write lists all services, either locally or in the workspace, and writes the output to a writer.
func (l *SvcListWriter) Write(appName string) error {
if _, err := l.Store.GetApplication(appName); err != nil {
return fmt.Errorf("get application: %w", err)
}
wklds, err := l.Store.ListServices(appName)
if err != nil {
return fmt.Errorf("get %s names: %w", svcWorkloadType, err)
}
if l.ShowLocalSvcs {
localWklds, err := l.Ws.ListServices()
if err != nil {
return fmt.Errorf("get local %s names: %w", svcWorkloadType, err)
}
wklds = filterByName(wklds, localWklds)
}
if l.OutputJSON {
data, err := l.jsonOutputSvcs(wklds)
if err != nil {
return err
}
fmt.Fprint(l.Out, data)
} else {
humanOutput(wklds, l.Out)
}
return nil
}
func filterByName(wklds []*config.Workload, wantedNames []string) []*config.Workload {
isWanted := make(map[string]bool)
for _, name := range wantedNames {
isWanted[name] = true
}
var filtered []*config.Workload
for _, wkld := range wklds {
if isWanted[wkld.Name] {
filtered = append(filtered, wkld)
}
}
return filtered
}
func underline(headings []string) []string {
var lines []string
for _, heading := range headings {
line := strings.Repeat("-", len(heading))
lines = append(lines, line)
}
return lines
}
func humanOutput(wklds []*config.Workload, w io.Writer) {
writer := tabwriter.NewWriter(w, minCellWidth, tabWidth, cellPaddingWidth, paddingChar, noAdditionalFormatting)
headers := []string{"Name", "Type"}
fmt.Fprintf(writer, "%s\n", strings.Join(headers, "\t"))
fmt.Fprintf(writer, "%s\n", strings.Join(underline(headers), "\t"))
for _, wkld := range wklds {
fmt.Fprintf(writer, "%s\t%s\n", wkld.Name, wkld.Type)
}
writer.Flush()
}
func (l *SvcListWriter) jsonOutputSvcs(svcs []*config.Workload) (string, error) {
b, err := json.Marshal(ServiceJSONOutput{Services: svcs})
if err != nil {
return "", fmt.Errorf("marshal services: %w", err)
}
return fmt.Sprintf("%s\n", b), nil
}
func (l *JobListWriter) jsonOutputJobs(jobs []*config.Workload) (string, error) {
b, err := json.Marshal(JobJSONOutput{Jobs: jobs})
if err != nil {
return "", fmt.Errorf("marshal jobs: %w", err)
}
return fmt.Sprintf("%s\n", b), nil
}
| 180 |
copilot-cli | aws | Go | // Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
// SPDX-License-Identifier: Apache-2.0
package list
import (
"bytes"
"fmt"
"testing"
"github.com/aws/copilot-cli/internal/pkg/cli/list/mocks"
"github.com/aws/copilot-cli/internal/pkg/config"
"github.com/golang/mock/gomock"
"github.com/stretchr/testify/require"
)
func TestList_JobListWriter(t *testing.T) {
ctrl := gomock.NewController(t)
mockError := fmt.Errorf("error")
mockStore := mocks.NewMockStore(ctrl)
mockWs := mocks.NewMockWorkspace(ctrl)
mockAppName := "barnyard"
testCases := map[string]struct {
inputAppName string
inputWriteJSON bool
inputListLocal bool
wantedError error
wantedContent string
mocking func()
}{
"should succeed writing human readable": {
inputAppName: mockAppName,
inputWriteJSON: false,
wantedContent: `Name Type
---- ----
badgoose Scheduled Job
farmer Scheduled Job
`,
mocking: func() {
mockStore.EXPECT().
GetApplication(gomock.Eq("barnyard")).
Return(&config.Application{}, nil)
mockStore.
EXPECT().
ListJobs(gomock.Eq("barnyard")).
Return([]*config.Workload{
{Name: "badgoose", Type: "Scheduled Job"},
{Name: "farmer", Type: "Scheduled Job"},
}, nil)
},
},
"should succeed writing json": {
inputAppName: mockAppName,
inputWriteJSON: true,
wantedContent: `{"jobs":[{"app":"","name":"badgoose","type":"Scheduled Job"},{"app":"","name":"farmer","type":"Scheduled Job"}]}
`,
mocking: func() {
mockStore.EXPECT().
GetApplication(gomock.Eq("barnyard")).
Return(&config.Application{}, nil)
mockStore.
EXPECT().
ListJobs(gomock.Eq("barnyard")).
Return([]*config.Workload{
{Name: "badgoose", Type: "Scheduled Job"},
{Name: "farmer", Type: "Scheduled Job"},
}, nil)
},
},
"with bad application name": {
inputAppName: mockAppName,
wantedError: fmt.Errorf("get application: error"),
mocking: func() {
mockStore.EXPECT().
GetApplication(gomock.Eq("barnyard")).
Return(nil, mockError)
mockStore.
EXPECT().
ListJobs(gomock.Eq("barnyard")).
Times(0)
},
},
"listing local jobs": {
inputAppName: mockAppName,
inputListLocal: true,
wantedContent: "Name Type\n---- ----\nbadgoose Scheduled Job\n",
mocking: func() {
mockStore.EXPECT().GetApplication("barnyard").
Return(&config.Application{}, nil)
mockStore.EXPECT().ListJobs("barnyard").
Return([]*config.Workload{
{Name: "badgoose", Type: "Scheduled Job"},
{Name: "farmer", Type: "Scheduled Job"},
}, nil)
mockWs.EXPECT().ListJobs().Return([]string{"badgoose"}, nil)
},
},
"with failed call to ListJobs": {
inputAppName: mockAppName,
wantedError: fmt.Errorf("get job names: error"),
mocking: func() {
mockStore.EXPECT().GetApplication("barnyard").
Return(&config.Application{}, nil)
mockStore.EXPECT().ListJobs("barnyard").
Return(nil, mockError)
},
},
"with no local jobs": {
inputAppName: mockAppName,
inputListLocal: true,
wantedContent: "Name Type\n---- ----\n",
mocking: func() {
mockStore.EXPECT().GetApplication("barnyard").
Return(&config.Application{}, nil)
mockStore.EXPECT().ListJobs("barnyard").
Return([]*config.Workload{
{Name: "badgoose", Type: "Scheduled Job"},
{Name: "farmer", Type: "Scheduled Job"},
}, nil)
mockWs.EXPECT().ListJobs().Return([]string{}, nil)
},
},
"with no local jobs json": {
inputAppName: mockAppName,
inputWriteJSON: true,
inputListLocal: true,
wantedContent: "{\"jobs\":null}\n",
mocking: func() {
mockStore.EXPECT().GetApplication("barnyard").
Return(&config.Application{}, nil)
mockStore.EXPECT().ListJobs("barnyard").
Return([]*config.Workload{
{Name: "badgoose", Type: "Scheduled Job"},
{Name: "farmer", Type: "Scheduled Job"},
}, nil)
mockWs.EXPECT().ListJobs().Return([]string{""}, nil)
},
},
}
for name, tc := range testCases {
t.Run(name, func(t *testing.T) {
b := &bytes.Buffer{}
tc.mocking()
list := &JobListWriter{
Ws: mockWs,
Store: mockStore,
Out: b,
ShowLocalJobs: tc.inputListLocal,
OutputJSON: tc.inputWriteJSON,
}
// WHEN
err := list.Write(tc.inputAppName)
if tc.wantedError != nil {
require.EqualError(t, tc.wantedError, err.Error())
} else {
require.Equal(t, tc.wantedContent, b.String())
}
})
}
}
func TestList_SvcListWriter(t *testing.T) {
ctrl := gomock.NewController(t)
mockError := fmt.Errorf("error")
mockStore := mocks.NewMockStore(ctrl)
mockWs := mocks.NewMockWorkspace(ctrl)
mockAppName := "barnyard"
testCases := map[string]struct {
inputAppName string
inputWriteJSON bool
inputListLocal bool
wantedError error
wantedContent string
mocking func()
}{
"should succeed writing human readable": {
inputAppName: mockAppName,
inputWriteJSON: false,
wantedContent: "Name Type\n---- ----\ntrough Backend Service\ngaggle Load Balanced Web Service\n",
mocking: func() {
mockStore.EXPECT().
GetApplication(gomock.Eq("barnyard")).
Return(&config.Application{}, nil)
mockStore.
EXPECT().
ListServices(gomock.Eq("barnyard")).
Return([]*config.Workload{
{Name: "trough", Type: "Backend Service"},
{Name: "gaggle", Type: "Load Balanced Web Service"},
}, nil)
},
},
"should succeed writing json": {
inputAppName: mockAppName,
inputWriteJSON: true,
wantedContent: `{"services":[{"app":"","name":"trough","type":"Backend Service"},{"app":"","name":"gaggle","type":"Load Balanced Web Service"}]}
`,
mocking: func() {
mockStore.EXPECT().
GetApplication(gomock.Eq("barnyard")).
Return(&config.Application{}, nil)
mockStore.
EXPECT().
ListServices(gomock.Eq("barnyard")).
Return([]*config.Workload{
{Name: "trough", Type: "Backend Service"},
{Name: "gaggle", Type: "Load Balanced Web Service"},
}, nil)
},
},
"with bad application name": {
inputAppName: mockAppName,
wantedError: fmt.Errorf("get application: error"),
mocking: func() {
mockStore.EXPECT().
GetApplication(gomock.Eq("barnyard")).
Return(nil, mockError)
mockStore.
EXPECT().
ListServices(gomock.Eq("barnyard")).
Times(0)
},
},
"listing local services": {
inputAppName: mockAppName,
inputListLocal: true,
wantedContent: "Name Type\n---- ----\ntrough Backend Service\n",
mocking: func() {
mockStore.EXPECT().GetApplication("barnyard").
Return(&config.Application{}, nil)
mockStore.EXPECT().ListServices("barnyard").
Return([]*config.Workload{
{Name: "trough", Type: "Backend Service"},
{Name: "gaggle", Type: "Load Balanced Web Service"},
}, nil)
mockWs.EXPECT().ListServices().Return([]string{"trough"}, nil)
},
},
"with failed call to ListJobs": {
inputAppName: mockAppName,
wantedError: fmt.Errorf("get service names: error"),
mocking: func() {
mockStore.EXPECT().GetApplication("barnyard").
Return(&config.Application{}, nil)
mockStore.EXPECT().ListServices("barnyard").
Return(nil, mockError)
},
},
"with no local services": {
inputAppName: mockAppName,
inputListLocal: true,
wantedContent: "Name Type\n---- ----\n",
mocking: func() {
mockStore.EXPECT().GetApplication("barnyard").
Return(&config.Application{}, nil)
mockStore.EXPECT().ListServices("barnyard").
Return([]*config.Workload{
{Name: "trough", Type: "Backend Service"},
{Name: "gaggle", Type: "Load Balanced Web Service"},
}, nil)
mockWs.EXPECT().ListServices().Return([]string{}, nil)
},
},
"with no local services json": {
inputAppName: mockAppName,
inputWriteJSON: true,
inputListLocal: true,
wantedContent: "{\"services\":null}\n",
mocking: func() {
mockStore.EXPECT().GetApplication("barnyard").
Return(&config.Application{}, nil)
mockStore.EXPECT().ListServices("barnyard").
Return([]*config.Workload{
{Name: "trough", Type: "Backend Service"},
{Name: "gaggle", Type: "Load Balanced Web Service"},
}, nil)
mockWs.EXPECT().ListServices().Return([]string{}, nil)
},
},
}
for name, tc := range testCases {
t.Run(name, func(t *testing.T) {
b := &bytes.Buffer{}
tc.mocking()
list := &SvcListWriter{
Ws: mockWs,
Store: mockStore,
Out: b,
ShowLocalSvcs: tc.inputListLocal,
OutputJSON: tc.inputWriteJSON,
}
// WHEN
err := list.Write(tc.inputAppName)
if tc.wantedError != nil {
require.EqualError(t, tc.wantedError, err.Error())
} else {
require.Equal(t, tc.wantedContent, b.String())
}
})
}
}
| 342 |
copilot-cli | aws | Go | // Code generated by MockGen. DO NOT EDIT.
// Source: ./internal/pkg/cli/list/list.go
// Package mocks is a generated GoMock package.
package mocks
import (
reflect "reflect"
config "github.com/aws/copilot-cli/internal/pkg/config"
gomock "github.com/golang/mock/gomock"
)
// MockStore is a mock of Store interface.
type MockStore struct {
ctrl *gomock.Controller
recorder *MockStoreMockRecorder
}
// MockStoreMockRecorder is the mock recorder for MockStore.
type MockStoreMockRecorder struct {
mock *MockStore
}
// NewMockStore creates a new mock instance.
func NewMockStore(ctrl *gomock.Controller) *MockStore {
mock := &MockStore{ctrl: ctrl}
mock.recorder = &MockStoreMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockStore) EXPECT() *MockStoreMockRecorder {
return m.recorder
}
// GetApplication mocks base method.
func (m *MockStore) GetApplication(appName string) (*config.Application, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "GetApplication", appName)
ret0, _ := ret[0].(*config.Application)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// GetApplication indicates an expected call of GetApplication.
func (mr *MockStoreMockRecorder) GetApplication(appName interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetApplication", reflect.TypeOf((*MockStore)(nil).GetApplication), appName)
}
// ListJobs mocks base method.
func (m *MockStore) ListJobs(appName string) ([]*config.Workload, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "ListJobs", appName)
ret0, _ := ret[0].([]*config.Workload)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// ListJobs indicates an expected call of ListJobs.
func (mr *MockStoreMockRecorder) ListJobs(appName interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ListJobs", reflect.TypeOf((*MockStore)(nil).ListJobs), appName)
}
// ListServices mocks base method.
func (m *MockStore) ListServices(appName string) ([]*config.Workload, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "ListServices", appName)
ret0, _ := ret[0].([]*config.Workload)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// ListServices indicates an expected call of ListServices.
func (mr *MockStoreMockRecorder) ListServices(appName interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ListServices", reflect.TypeOf((*MockStore)(nil).ListServices), appName)
}
// MockWorkspace is a mock of Workspace interface.
type MockWorkspace struct {
ctrl *gomock.Controller
recorder *MockWorkspaceMockRecorder
}
// MockWorkspaceMockRecorder is the mock recorder for MockWorkspace.
type MockWorkspaceMockRecorder struct {
mock *MockWorkspace
}
// NewMockWorkspace creates a new mock instance.
func NewMockWorkspace(ctrl *gomock.Controller) *MockWorkspace {
mock := &MockWorkspace{ctrl: ctrl}
mock.recorder = &MockWorkspaceMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockWorkspace) EXPECT() *MockWorkspaceMockRecorder {
return m.recorder
}
// ListJobs mocks base method.
func (m *MockWorkspace) ListJobs() ([]string, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "ListJobs")
ret0, _ := ret[0].([]string)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// ListJobs indicates an expected call of ListJobs.
func (mr *MockWorkspaceMockRecorder) ListJobs() *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ListJobs", reflect.TypeOf((*MockWorkspace)(nil).ListJobs))
}
// ListServices mocks base method.
func (m *MockWorkspace) ListServices() ([]string, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "ListServices")
ret0, _ := ret[0].([]string)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// ListServices indicates an expected call of ListServices.
func (mr *MockWorkspaceMockRecorder) ListServices() *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ListServices", reflect.TypeOf((*MockWorkspace)(nil).ListServices))
}
| 134 |
copilot-cli | aws | Go | // Code generated by MockGen. DO NOT EDIT.
// Source: ./internal/pkg/cli/completion.go
// Package mocks is a generated GoMock package.
package mocks
import (
io "io"
reflect "reflect"
gomock "github.com/golang/mock/gomock"
)
// MockshellCompleter is a mock of shellCompleter interface.
type MockshellCompleter struct {
ctrl *gomock.Controller
recorder *MockshellCompleterMockRecorder
}
// MockshellCompleterMockRecorder is the mock recorder for MockshellCompleter.
type MockshellCompleterMockRecorder struct {
mock *MockshellCompleter
}
// NewMockshellCompleter creates a new mock instance.
func NewMockshellCompleter(ctrl *gomock.Controller) *MockshellCompleter {
mock := &MockshellCompleter{ctrl: ctrl}
mock.recorder = &MockshellCompleterMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockshellCompleter) EXPECT() *MockshellCompleterMockRecorder {
return m.recorder
}
// GenBashCompletion mocks base method.
func (m *MockshellCompleter) GenBashCompletion(w io.Writer) error {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "GenBashCompletion", w)
ret0, _ := ret[0].(error)
return ret0
}
// GenBashCompletion indicates an expected call of GenBashCompletion.
func (mr *MockshellCompleterMockRecorder) GenBashCompletion(w interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GenBashCompletion", reflect.TypeOf((*MockshellCompleter)(nil).GenBashCompletion), w)
}
// GenFishCompletion mocks base method.
func (m *MockshellCompleter) GenFishCompletion(w io.Writer, includeDesc bool) error {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "GenFishCompletion", w, includeDesc)
ret0, _ := ret[0].(error)
return ret0
}
// GenFishCompletion indicates an expected call of GenFishCompletion.
func (mr *MockshellCompleterMockRecorder) GenFishCompletion(w, includeDesc interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GenFishCompletion", reflect.TypeOf((*MockshellCompleter)(nil).GenFishCompletion), w, includeDesc)
}
// GenZshCompletion mocks base method.
func (m *MockshellCompleter) GenZshCompletion(w io.Writer) error {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "GenZshCompletion", w)
ret0, _ := ret[0].(error)
return ret0
}
// GenZshCompletion indicates an expected call of GenZshCompletion.
func (mr *MockshellCompleterMockRecorder) GenZshCompletion(w interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GenZshCompletion", reflect.TypeOf((*MockshellCompleter)(nil).GenZshCompletion), w)
}
| 78 |
copilot-cli | aws | Go | // Code generated by MockGen. DO NOT EDIT.
// Source: ./internal/pkg/cli/identity.go
// Package mocks is a generated GoMock package.
package mocks
import (
reflect "reflect"
identity "github.com/aws/copilot-cli/internal/pkg/aws/identity"
gomock "github.com/golang/mock/gomock"
)
// MockidentityService is a mock of identityService interface.
type MockidentityService struct {
ctrl *gomock.Controller
recorder *MockidentityServiceMockRecorder
}
// MockidentityServiceMockRecorder is the mock recorder for MockidentityService.
type MockidentityServiceMockRecorder struct {
mock *MockidentityService
}
// NewMockidentityService creates a new mock instance.
func NewMockidentityService(ctrl *gomock.Controller) *MockidentityService {
mock := &MockidentityService{ctrl: ctrl}
mock.recorder = &MockidentityServiceMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockidentityService) EXPECT() *MockidentityServiceMockRecorder {
return m.recorder
}
// Get mocks base method.
func (m *MockidentityService) Get() (identity.Caller, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "Get")
ret0, _ := ret[0].(identity.Caller)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// Get indicates an expected call of Get.
func (mr *MockidentityServiceMockRecorder) Get() *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Get", reflect.TypeOf((*MockidentityService)(nil).Get))
}
| 51 |
copilot-cli | aws | Go | // Code generated by MockGen. DO NOT EDIT.
// Source: ./internal/pkg/cli/interfaces.go
// Package mocks is a generated GoMock package.
package mocks
import (
context "context"
encoding "encoding"
io "io"
reflect "reflect"
session "github.com/aws/aws-sdk-go/aws/session"
cloudformation "github.com/aws/copilot-cli/internal/pkg/aws/cloudformation"
codepipeline "github.com/aws/copilot-cli/internal/pkg/aws/codepipeline"
ec2 "github.com/aws/copilot-cli/internal/pkg/aws/ec2"
ecs "github.com/aws/copilot-cli/internal/pkg/aws/ecs"
secretsmanager "github.com/aws/copilot-cli/internal/pkg/aws/secretsmanager"
ssm "github.com/aws/copilot-cli/internal/pkg/aws/ssm"
deploy "github.com/aws/copilot-cli/internal/pkg/cli/deploy"
config "github.com/aws/copilot-cli/internal/pkg/config"
deploy0 "github.com/aws/copilot-cli/internal/pkg/deploy"
cloudformation0 "github.com/aws/copilot-cli/internal/pkg/deploy/cloudformation"
stack "github.com/aws/copilot-cli/internal/pkg/deploy/cloudformation/stack"
describe "github.com/aws/copilot-cli/internal/pkg/describe"
dockerengine "github.com/aws/copilot-cli/internal/pkg/docker/dockerengine"
dockerfile "github.com/aws/copilot-cli/internal/pkg/docker/dockerfile"
ecs0 "github.com/aws/copilot-cli/internal/pkg/ecs"
exec "github.com/aws/copilot-cli/internal/pkg/exec"
initialize "github.com/aws/copilot-cli/internal/pkg/initialize"
logging "github.com/aws/copilot-cli/internal/pkg/logging"
manifest "github.com/aws/copilot-cli/internal/pkg/manifest"
task "github.com/aws/copilot-cli/internal/pkg/task"
template "github.com/aws/copilot-cli/internal/pkg/template"
prompt "github.com/aws/copilot-cli/internal/pkg/term/prompt"
selector "github.com/aws/copilot-cli/internal/pkg/term/selector"
workspace "github.com/aws/copilot-cli/internal/pkg/workspace"
gomock "github.com/golang/mock/gomock"
)
// Mockcmd is a mock of cmd interface.
type Mockcmd struct {
ctrl *gomock.Controller
recorder *MockcmdMockRecorder
}
// MockcmdMockRecorder is the mock recorder for Mockcmd.
type MockcmdMockRecorder struct {
mock *Mockcmd
}
// NewMockcmd creates a new mock instance.
func NewMockcmd(ctrl *gomock.Controller) *Mockcmd {
mock := &Mockcmd{ctrl: ctrl}
mock.recorder = &MockcmdMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *Mockcmd) EXPECT() *MockcmdMockRecorder {
return m.recorder
}
// Ask mocks base method.
func (m *Mockcmd) Ask() error {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "Ask")
ret0, _ := ret[0].(error)
return ret0
}
// Ask indicates an expected call of Ask.
func (mr *MockcmdMockRecorder) Ask() *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Ask", reflect.TypeOf((*Mockcmd)(nil).Ask))
}
// Execute mocks base method.
func (m *Mockcmd) Execute() error {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "Execute")
ret0, _ := ret[0].(error)
return ret0
}
// Execute indicates an expected call of Execute.
func (mr *MockcmdMockRecorder) Execute() *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Execute", reflect.TypeOf((*Mockcmd)(nil).Execute))
}
// Validate mocks base method.
func (m *Mockcmd) Validate() error {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "Validate")
ret0, _ := ret[0].(error)
return ret0
}
// Validate indicates an expected call of Validate.
func (mr *MockcmdMockRecorder) Validate() *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Validate", reflect.TypeOf((*Mockcmd)(nil).Validate))
}
// MockactionCommand is a mock of actionCommand interface.
type MockactionCommand struct {
ctrl *gomock.Controller
recorder *MockactionCommandMockRecorder
}
// MockactionCommandMockRecorder is the mock recorder for MockactionCommand.
type MockactionCommandMockRecorder struct {
mock *MockactionCommand
}
// NewMockactionCommand creates a new mock instance.
func NewMockactionCommand(ctrl *gomock.Controller) *MockactionCommand {
mock := &MockactionCommand{ctrl: ctrl}
mock.recorder = &MockactionCommandMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockactionCommand) EXPECT() *MockactionCommandMockRecorder {
return m.recorder
}
// Ask mocks base method.
func (m *MockactionCommand) Ask() error {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "Ask")
ret0, _ := ret[0].(error)
return ret0
}
// Ask indicates an expected call of Ask.
func (mr *MockactionCommandMockRecorder) Ask() *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Ask", reflect.TypeOf((*MockactionCommand)(nil).Ask))
}
// Execute mocks base method.
func (m *MockactionCommand) Execute() error {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "Execute")
ret0, _ := ret[0].(error)
return ret0
}
// Execute indicates an expected call of Execute.
func (mr *MockactionCommandMockRecorder) Execute() *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Execute", reflect.TypeOf((*MockactionCommand)(nil).Execute))
}
// RecommendActions mocks base method.
func (m *MockactionCommand) RecommendActions() error {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "RecommendActions")
ret0, _ := ret[0].(error)
return ret0
}
// RecommendActions indicates an expected call of RecommendActions.
func (mr *MockactionCommandMockRecorder) RecommendActions() *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "RecommendActions", reflect.TypeOf((*MockactionCommand)(nil).RecommendActions))
}
// Validate mocks base method.
func (m *MockactionCommand) Validate() error {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "Validate")
ret0, _ := ret[0].(error)
return ret0
}
// Validate indicates an expected call of Validate.
func (mr *MockactionCommandMockRecorder) Validate() *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Validate", reflect.TypeOf((*MockactionCommand)(nil).Validate))
}
// MockserviceStore is a mock of serviceStore interface.
type MockserviceStore struct {
ctrl *gomock.Controller
recorder *MockserviceStoreMockRecorder
}
// MockserviceStoreMockRecorder is the mock recorder for MockserviceStore.
type MockserviceStoreMockRecorder struct {
mock *MockserviceStore
}
// NewMockserviceStore creates a new mock instance.
func NewMockserviceStore(ctrl *gomock.Controller) *MockserviceStore {
mock := &MockserviceStore{ctrl: ctrl}
mock.recorder = &MockserviceStoreMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockserviceStore) EXPECT() *MockserviceStoreMockRecorder {
return m.recorder
}
// CreateService mocks base method.
func (m *MockserviceStore) CreateService(svc *config.Workload) error {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "CreateService", svc)
ret0, _ := ret[0].(error)
return ret0
}
// CreateService indicates an expected call of CreateService.
func (mr *MockserviceStoreMockRecorder) CreateService(svc interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "CreateService", reflect.TypeOf((*MockserviceStore)(nil).CreateService), svc)
}
// DeleteService mocks base method.
func (m *MockserviceStore) DeleteService(appName, svcName string) error {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "DeleteService", appName, svcName)
ret0, _ := ret[0].(error)
return ret0
}
// DeleteService indicates an expected call of DeleteService.
func (mr *MockserviceStoreMockRecorder) DeleteService(appName, svcName interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DeleteService", reflect.TypeOf((*MockserviceStore)(nil).DeleteService), appName, svcName)
}
// GetService mocks base method.
func (m *MockserviceStore) GetService(appName, svcName string) (*config.Workload, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "GetService", appName, svcName)
ret0, _ := ret[0].(*config.Workload)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// GetService indicates an expected call of GetService.
func (mr *MockserviceStoreMockRecorder) GetService(appName, svcName interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetService", reflect.TypeOf((*MockserviceStore)(nil).GetService), appName, svcName)
}
// ListServices mocks base method.
func (m *MockserviceStore) ListServices(appName string) ([]*config.Workload, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "ListServices", appName)
ret0, _ := ret[0].([]*config.Workload)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// ListServices indicates an expected call of ListServices.
func (mr *MockserviceStoreMockRecorder) ListServices(appName interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ListServices", reflect.TypeOf((*MockserviceStore)(nil).ListServices), appName)
}
// MockjobStore is a mock of jobStore interface.
type MockjobStore struct {
ctrl *gomock.Controller
recorder *MockjobStoreMockRecorder
}
// MockjobStoreMockRecorder is the mock recorder for MockjobStore.
type MockjobStoreMockRecorder struct {
mock *MockjobStore
}
// NewMockjobStore creates a new mock instance.
func NewMockjobStore(ctrl *gomock.Controller) *MockjobStore {
mock := &MockjobStore{ctrl: ctrl}
mock.recorder = &MockjobStoreMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockjobStore) EXPECT() *MockjobStoreMockRecorder {
return m.recorder
}
// CreateJob mocks base method.
func (m *MockjobStore) CreateJob(job *config.Workload) error {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "CreateJob", job)
ret0, _ := ret[0].(error)
return ret0
}
// CreateJob indicates an expected call of CreateJob.
func (mr *MockjobStoreMockRecorder) CreateJob(job interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "CreateJob", reflect.TypeOf((*MockjobStore)(nil).CreateJob), job)
}
// DeleteJob mocks base method.
func (m *MockjobStore) DeleteJob(appName, jobName string) error {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "DeleteJob", appName, jobName)
ret0, _ := ret[0].(error)
return ret0
}
// DeleteJob indicates an expected call of DeleteJob.
func (mr *MockjobStoreMockRecorder) DeleteJob(appName, jobName interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DeleteJob", reflect.TypeOf((*MockjobStore)(nil).DeleteJob), appName, jobName)
}
// GetJob mocks base method.
func (m *MockjobStore) GetJob(appName, jobName string) (*config.Workload, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "GetJob", appName, jobName)
ret0, _ := ret[0].(*config.Workload)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// GetJob indicates an expected call of GetJob.
func (mr *MockjobStoreMockRecorder) GetJob(appName, jobName interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetJob", reflect.TypeOf((*MockjobStore)(nil).GetJob), appName, jobName)
}
// ListJobs mocks base method.
func (m *MockjobStore) ListJobs(appName string) ([]*config.Workload, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "ListJobs", appName)
ret0, _ := ret[0].([]*config.Workload)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// ListJobs indicates an expected call of ListJobs.
func (mr *MockjobStoreMockRecorder) ListJobs(appName interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ListJobs", reflect.TypeOf((*MockjobStore)(nil).ListJobs), appName)
}
// MockwlStore is a mock of wlStore interface.
type MockwlStore struct {
ctrl *gomock.Controller
recorder *MockwlStoreMockRecorder
}
// MockwlStoreMockRecorder is the mock recorder for MockwlStore.
type MockwlStoreMockRecorder struct {
mock *MockwlStore
}
// NewMockwlStore creates a new mock instance.
func NewMockwlStore(ctrl *gomock.Controller) *MockwlStore {
mock := &MockwlStore{ctrl: ctrl}
mock.recorder = &MockwlStoreMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockwlStore) EXPECT() *MockwlStoreMockRecorder {
return m.recorder
}
// GetWorkload mocks base method.
func (m *MockwlStore) GetWorkload(appName, name string) (*config.Workload, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "GetWorkload", appName, name)
ret0, _ := ret[0].(*config.Workload)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// GetWorkload indicates an expected call of GetWorkload.
func (mr *MockwlStoreMockRecorder) GetWorkload(appName, name interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetWorkload", reflect.TypeOf((*MockwlStore)(nil).GetWorkload), appName, name)
}
// ListWorkloads mocks base method.
func (m *MockwlStore) ListWorkloads(appName string) ([]*config.Workload, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "ListWorkloads", appName)
ret0, _ := ret[0].([]*config.Workload)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// ListWorkloads indicates an expected call of ListWorkloads.
func (mr *MockwlStoreMockRecorder) ListWorkloads(appName interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ListWorkloads", reflect.TypeOf((*MockwlStore)(nil).ListWorkloads), appName)
}
// MockworkloadListWriter is a mock of workloadListWriter interface.
type MockworkloadListWriter struct {
ctrl *gomock.Controller
recorder *MockworkloadListWriterMockRecorder
}
// MockworkloadListWriterMockRecorder is the mock recorder for MockworkloadListWriter.
type MockworkloadListWriterMockRecorder struct {
mock *MockworkloadListWriter
}
// NewMockworkloadListWriter creates a new mock instance.
func NewMockworkloadListWriter(ctrl *gomock.Controller) *MockworkloadListWriter {
mock := &MockworkloadListWriter{ctrl: ctrl}
mock.recorder = &MockworkloadListWriterMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockworkloadListWriter) EXPECT() *MockworkloadListWriterMockRecorder {
return m.recorder
}
// Write mocks base method.
func (m *MockworkloadListWriter) Write(appName string) error {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "Write", appName)
ret0, _ := ret[0].(error)
return ret0
}
// Write indicates an expected call of Write.
func (mr *MockworkloadListWriterMockRecorder) Write(appName interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Write", reflect.TypeOf((*MockworkloadListWriter)(nil).Write), appName)
}
// MockapplicationStore is a mock of applicationStore interface.
type MockapplicationStore struct {
ctrl *gomock.Controller
recorder *MockapplicationStoreMockRecorder
}
// MockapplicationStoreMockRecorder is the mock recorder for MockapplicationStore.
type MockapplicationStoreMockRecorder struct {
mock *MockapplicationStore
}
// NewMockapplicationStore creates a new mock instance.
func NewMockapplicationStore(ctrl *gomock.Controller) *MockapplicationStore {
mock := &MockapplicationStore{ctrl: ctrl}
mock.recorder = &MockapplicationStoreMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockapplicationStore) EXPECT() *MockapplicationStoreMockRecorder {
return m.recorder
}
// CreateApplication mocks base method.
func (m *MockapplicationStore) CreateApplication(app *config.Application) error {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "CreateApplication", app)
ret0, _ := ret[0].(error)
return ret0
}
// CreateApplication indicates an expected call of CreateApplication.
func (mr *MockapplicationStoreMockRecorder) CreateApplication(app interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "CreateApplication", reflect.TypeOf((*MockapplicationStore)(nil).CreateApplication), app)
}
// DeleteApplication mocks base method.
func (m *MockapplicationStore) DeleteApplication(name string) error {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "DeleteApplication", name)
ret0, _ := ret[0].(error)
return ret0
}
// DeleteApplication indicates an expected call of DeleteApplication.
func (mr *MockapplicationStoreMockRecorder) DeleteApplication(name interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DeleteApplication", reflect.TypeOf((*MockapplicationStore)(nil).DeleteApplication), name)
}
// GetApplication mocks base method.
func (m *MockapplicationStore) GetApplication(appName string) (*config.Application, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "GetApplication", appName)
ret0, _ := ret[0].(*config.Application)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// GetApplication indicates an expected call of GetApplication.
func (mr *MockapplicationStoreMockRecorder) GetApplication(appName interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetApplication", reflect.TypeOf((*MockapplicationStore)(nil).GetApplication), appName)
}
// ListApplications mocks base method.
func (m *MockapplicationStore) ListApplications() ([]*config.Application, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "ListApplications")
ret0, _ := ret[0].([]*config.Application)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// ListApplications indicates an expected call of ListApplications.
func (mr *MockapplicationStoreMockRecorder) ListApplications() *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ListApplications", reflect.TypeOf((*MockapplicationStore)(nil).ListApplications))
}
// UpdateApplication mocks base method.
func (m *MockapplicationStore) UpdateApplication(app *config.Application) error {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "UpdateApplication", app)
ret0, _ := ret[0].(error)
return ret0
}
// UpdateApplication indicates an expected call of UpdateApplication.
func (mr *MockapplicationStoreMockRecorder) UpdateApplication(app interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "UpdateApplication", reflect.TypeOf((*MockapplicationStore)(nil).UpdateApplication), app)
}
// MockapplicationCreator is a mock of applicationCreator interface.
type MockapplicationCreator struct {
ctrl *gomock.Controller
recorder *MockapplicationCreatorMockRecorder
}
// MockapplicationCreatorMockRecorder is the mock recorder for MockapplicationCreator.
type MockapplicationCreatorMockRecorder struct {
mock *MockapplicationCreator
}
// NewMockapplicationCreator creates a new mock instance.
func NewMockapplicationCreator(ctrl *gomock.Controller) *MockapplicationCreator {
mock := &MockapplicationCreator{ctrl: ctrl}
mock.recorder = &MockapplicationCreatorMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockapplicationCreator) EXPECT() *MockapplicationCreatorMockRecorder {
return m.recorder
}
// CreateApplication mocks base method.
func (m *MockapplicationCreator) CreateApplication(app *config.Application) error {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "CreateApplication", app)
ret0, _ := ret[0].(error)
return ret0
}
// CreateApplication indicates an expected call of CreateApplication.
func (mr *MockapplicationCreatorMockRecorder) CreateApplication(app interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "CreateApplication", reflect.TypeOf((*MockapplicationCreator)(nil).CreateApplication), app)
}
// MockapplicationUpdater is a mock of applicationUpdater interface.
type MockapplicationUpdater struct {
ctrl *gomock.Controller
recorder *MockapplicationUpdaterMockRecorder
}
// MockapplicationUpdaterMockRecorder is the mock recorder for MockapplicationUpdater.
type MockapplicationUpdaterMockRecorder struct {
mock *MockapplicationUpdater
}
// NewMockapplicationUpdater creates a new mock instance.
func NewMockapplicationUpdater(ctrl *gomock.Controller) *MockapplicationUpdater {
mock := &MockapplicationUpdater{ctrl: ctrl}
mock.recorder = &MockapplicationUpdaterMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockapplicationUpdater) EXPECT() *MockapplicationUpdaterMockRecorder {
return m.recorder
}
// UpdateApplication mocks base method.
func (m *MockapplicationUpdater) UpdateApplication(app *config.Application) error {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "UpdateApplication", app)
ret0, _ := ret[0].(error)
return ret0
}
// UpdateApplication indicates an expected call of UpdateApplication.
func (mr *MockapplicationUpdaterMockRecorder) UpdateApplication(app interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "UpdateApplication", reflect.TypeOf((*MockapplicationUpdater)(nil).UpdateApplication), app)
}
// MockapplicationGetter is a mock of applicationGetter interface.
type MockapplicationGetter struct {
ctrl *gomock.Controller
recorder *MockapplicationGetterMockRecorder
}
// MockapplicationGetterMockRecorder is the mock recorder for MockapplicationGetter.
type MockapplicationGetterMockRecorder struct {
mock *MockapplicationGetter
}
// NewMockapplicationGetter creates a new mock instance.
func NewMockapplicationGetter(ctrl *gomock.Controller) *MockapplicationGetter {
mock := &MockapplicationGetter{ctrl: ctrl}
mock.recorder = &MockapplicationGetterMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockapplicationGetter) EXPECT() *MockapplicationGetterMockRecorder {
return m.recorder
}
// GetApplication mocks base method.
func (m *MockapplicationGetter) GetApplication(appName string) (*config.Application, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "GetApplication", appName)
ret0, _ := ret[0].(*config.Application)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// GetApplication indicates an expected call of GetApplication.
func (mr *MockapplicationGetterMockRecorder) GetApplication(appName interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetApplication", reflect.TypeOf((*MockapplicationGetter)(nil).GetApplication), appName)
}
// MockapplicationLister is a mock of applicationLister interface.
type MockapplicationLister struct {
ctrl *gomock.Controller
recorder *MockapplicationListerMockRecorder
}
// MockapplicationListerMockRecorder is the mock recorder for MockapplicationLister.
type MockapplicationListerMockRecorder struct {
mock *MockapplicationLister
}
// NewMockapplicationLister creates a new mock instance.
func NewMockapplicationLister(ctrl *gomock.Controller) *MockapplicationLister {
mock := &MockapplicationLister{ctrl: ctrl}
mock.recorder = &MockapplicationListerMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockapplicationLister) EXPECT() *MockapplicationListerMockRecorder {
return m.recorder
}
// ListApplications mocks base method.
func (m *MockapplicationLister) ListApplications() ([]*config.Application, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "ListApplications")
ret0, _ := ret[0].([]*config.Application)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// ListApplications indicates an expected call of ListApplications.
func (mr *MockapplicationListerMockRecorder) ListApplications() *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ListApplications", reflect.TypeOf((*MockapplicationLister)(nil).ListApplications))
}
// MockapplicationDeleter is a mock of applicationDeleter interface.
type MockapplicationDeleter struct {
ctrl *gomock.Controller
recorder *MockapplicationDeleterMockRecorder
}
// MockapplicationDeleterMockRecorder is the mock recorder for MockapplicationDeleter.
type MockapplicationDeleterMockRecorder struct {
mock *MockapplicationDeleter
}
// NewMockapplicationDeleter creates a new mock instance.
func NewMockapplicationDeleter(ctrl *gomock.Controller) *MockapplicationDeleter {
mock := &MockapplicationDeleter{ctrl: ctrl}
mock.recorder = &MockapplicationDeleterMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockapplicationDeleter) EXPECT() *MockapplicationDeleterMockRecorder {
return m.recorder
}
// DeleteApplication mocks base method.
func (m *MockapplicationDeleter) DeleteApplication(name string) error {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "DeleteApplication", name)
ret0, _ := ret[0].(error)
return ret0
}
// DeleteApplication indicates an expected call of DeleteApplication.
func (mr *MockapplicationDeleterMockRecorder) DeleteApplication(name interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DeleteApplication", reflect.TypeOf((*MockapplicationDeleter)(nil).DeleteApplication), name)
}
// MockenvironmentStore is a mock of environmentStore interface.
type MockenvironmentStore struct {
ctrl *gomock.Controller
recorder *MockenvironmentStoreMockRecorder
}
// MockenvironmentStoreMockRecorder is the mock recorder for MockenvironmentStore.
type MockenvironmentStoreMockRecorder struct {
mock *MockenvironmentStore
}
// NewMockenvironmentStore creates a new mock instance.
func NewMockenvironmentStore(ctrl *gomock.Controller) *MockenvironmentStore {
mock := &MockenvironmentStore{ctrl: ctrl}
mock.recorder = &MockenvironmentStoreMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockenvironmentStore) EXPECT() *MockenvironmentStoreMockRecorder {
return m.recorder
}
// CreateEnvironment mocks base method.
func (m *MockenvironmentStore) CreateEnvironment(env *config.Environment) error {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "CreateEnvironment", env)
ret0, _ := ret[0].(error)
return ret0
}
// CreateEnvironment indicates an expected call of CreateEnvironment.
func (mr *MockenvironmentStoreMockRecorder) CreateEnvironment(env interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "CreateEnvironment", reflect.TypeOf((*MockenvironmentStore)(nil).CreateEnvironment), env)
}
// DeleteEnvironment mocks base method.
func (m *MockenvironmentStore) DeleteEnvironment(appName, environmentName string) error {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "DeleteEnvironment", appName, environmentName)
ret0, _ := ret[0].(error)
return ret0
}
// DeleteEnvironment indicates an expected call of DeleteEnvironment.
func (mr *MockenvironmentStoreMockRecorder) DeleteEnvironment(appName, environmentName interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DeleteEnvironment", reflect.TypeOf((*MockenvironmentStore)(nil).DeleteEnvironment), appName, environmentName)
}
// GetEnvironment mocks base method.
func (m *MockenvironmentStore) GetEnvironment(appName, environmentName string) (*config.Environment, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "GetEnvironment", appName, environmentName)
ret0, _ := ret[0].(*config.Environment)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// GetEnvironment indicates an expected call of GetEnvironment.
func (mr *MockenvironmentStoreMockRecorder) GetEnvironment(appName, environmentName interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetEnvironment", reflect.TypeOf((*MockenvironmentStore)(nil).GetEnvironment), appName, environmentName)
}
// ListEnvironments mocks base method.
func (m *MockenvironmentStore) ListEnvironments(appName string) ([]*config.Environment, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "ListEnvironments", appName)
ret0, _ := ret[0].([]*config.Environment)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// ListEnvironments indicates an expected call of ListEnvironments.
func (mr *MockenvironmentStoreMockRecorder) ListEnvironments(appName interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ListEnvironments", reflect.TypeOf((*MockenvironmentStore)(nil).ListEnvironments), appName)
}
// MockenvironmentCreator is a mock of environmentCreator interface.
type MockenvironmentCreator struct {
ctrl *gomock.Controller
recorder *MockenvironmentCreatorMockRecorder
}
// MockenvironmentCreatorMockRecorder is the mock recorder for MockenvironmentCreator.
type MockenvironmentCreatorMockRecorder struct {
mock *MockenvironmentCreator
}
// NewMockenvironmentCreator creates a new mock instance.
func NewMockenvironmentCreator(ctrl *gomock.Controller) *MockenvironmentCreator {
mock := &MockenvironmentCreator{ctrl: ctrl}
mock.recorder = &MockenvironmentCreatorMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockenvironmentCreator) EXPECT() *MockenvironmentCreatorMockRecorder {
return m.recorder
}
// CreateEnvironment mocks base method.
func (m *MockenvironmentCreator) CreateEnvironment(env *config.Environment) error {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "CreateEnvironment", env)
ret0, _ := ret[0].(error)
return ret0
}
// CreateEnvironment indicates an expected call of CreateEnvironment.
func (mr *MockenvironmentCreatorMockRecorder) CreateEnvironment(env interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "CreateEnvironment", reflect.TypeOf((*MockenvironmentCreator)(nil).CreateEnvironment), env)
}
// MockenvironmentGetter is a mock of environmentGetter interface.
type MockenvironmentGetter struct {
ctrl *gomock.Controller
recorder *MockenvironmentGetterMockRecorder
}
// MockenvironmentGetterMockRecorder is the mock recorder for MockenvironmentGetter.
type MockenvironmentGetterMockRecorder struct {
mock *MockenvironmentGetter
}
// NewMockenvironmentGetter creates a new mock instance.
func NewMockenvironmentGetter(ctrl *gomock.Controller) *MockenvironmentGetter {
mock := &MockenvironmentGetter{ctrl: ctrl}
mock.recorder = &MockenvironmentGetterMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockenvironmentGetter) EXPECT() *MockenvironmentGetterMockRecorder {
return m.recorder
}
// GetEnvironment mocks base method.
func (m *MockenvironmentGetter) GetEnvironment(appName, environmentName string) (*config.Environment, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "GetEnvironment", appName, environmentName)
ret0, _ := ret[0].(*config.Environment)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// GetEnvironment indicates an expected call of GetEnvironment.
func (mr *MockenvironmentGetterMockRecorder) GetEnvironment(appName, environmentName interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetEnvironment", reflect.TypeOf((*MockenvironmentGetter)(nil).GetEnvironment), appName, environmentName)
}
// MockenvironmentLister is a mock of environmentLister interface.
type MockenvironmentLister struct {
ctrl *gomock.Controller
recorder *MockenvironmentListerMockRecorder
}
// MockenvironmentListerMockRecorder is the mock recorder for MockenvironmentLister.
type MockenvironmentListerMockRecorder struct {
mock *MockenvironmentLister
}
// NewMockenvironmentLister creates a new mock instance.
func NewMockenvironmentLister(ctrl *gomock.Controller) *MockenvironmentLister {
mock := &MockenvironmentLister{ctrl: ctrl}
mock.recorder = &MockenvironmentListerMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockenvironmentLister) EXPECT() *MockenvironmentListerMockRecorder {
return m.recorder
}
// ListEnvironments mocks base method.
func (m *MockenvironmentLister) ListEnvironments(appName string) ([]*config.Environment, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "ListEnvironments", appName)
ret0, _ := ret[0].([]*config.Environment)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// ListEnvironments indicates an expected call of ListEnvironments.
func (mr *MockenvironmentListerMockRecorder) ListEnvironments(appName interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ListEnvironments", reflect.TypeOf((*MockenvironmentLister)(nil).ListEnvironments), appName)
}
// MockwsEnvironmentsLister is a mock of wsEnvironmentsLister interface.
type MockwsEnvironmentsLister struct {
ctrl *gomock.Controller
recorder *MockwsEnvironmentsListerMockRecorder
}
// MockwsEnvironmentsListerMockRecorder is the mock recorder for MockwsEnvironmentsLister.
type MockwsEnvironmentsListerMockRecorder struct {
mock *MockwsEnvironmentsLister
}
// NewMockwsEnvironmentsLister creates a new mock instance.
func NewMockwsEnvironmentsLister(ctrl *gomock.Controller) *MockwsEnvironmentsLister {
mock := &MockwsEnvironmentsLister{ctrl: ctrl}
mock.recorder = &MockwsEnvironmentsListerMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockwsEnvironmentsLister) EXPECT() *MockwsEnvironmentsListerMockRecorder {
return m.recorder
}
// ListEnvironments mocks base method.
func (m *MockwsEnvironmentsLister) ListEnvironments() ([]string, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "ListEnvironments")
ret0, _ := ret[0].([]string)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// ListEnvironments indicates an expected call of ListEnvironments.
func (mr *MockwsEnvironmentsListerMockRecorder) ListEnvironments() *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ListEnvironments", reflect.TypeOf((*MockwsEnvironmentsLister)(nil).ListEnvironments))
}
// MockenvironmentDeleter is a mock of environmentDeleter interface.
type MockenvironmentDeleter struct {
ctrl *gomock.Controller
recorder *MockenvironmentDeleterMockRecorder
}
// MockenvironmentDeleterMockRecorder is the mock recorder for MockenvironmentDeleter.
type MockenvironmentDeleterMockRecorder struct {
mock *MockenvironmentDeleter
}
// NewMockenvironmentDeleter creates a new mock instance.
func NewMockenvironmentDeleter(ctrl *gomock.Controller) *MockenvironmentDeleter {
mock := &MockenvironmentDeleter{ctrl: ctrl}
mock.recorder = &MockenvironmentDeleterMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockenvironmentDeleter) EXPECT() *MockenvironmentDeleterMockRecorder {
return m.recorder
}
// DeleteEnvironment mocks base method.
func (m *MockenvironmentDeleter) DeleteEnvironment(appName, environmentName string) error {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "DeleteEnvironment", appName, environmentName)
ret0, _ := ret[0].(error)
return ret0
}
// DeleteEnvironment indicates an expected call of DeleteEnvironment.
func (mr *MockenvironmentDeleterMockRecorder) DeleteEnvironment(appName, environmentName interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DeleteEnvironment", reflect.TypeOf((*MockenvironmentDeleter)(nil).DeleteEnvironment), appName, environmentName)
}
// Mockstore is a mock of store interface.
type Mockstore struct {
ctrl *gomock.Controller
recorder *MockstoreMockRecorder
}
// MockstoreMockRecorder is the mock recorder for Mockstore.
type MockstoreMockRecorder struct {
mock *Mockstore
}
// NewMockstore creates a new mock instance.
func NewMockstore(ctrl *gomock.Controller) *Mockstore {
mock := &Mockstore{ctrl: ctrl}
mock.recorder = &MockstoreMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *Mockstore) EXPECT() *MockstoreMockRecorder {
return m.recorder
}
// CreateApplication mocks base method.
func (m *Mockstore) CreateApplication(app *config.Application) error {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "CreateApplication", app)
ret0, _ := ret[0].(error)
return ret0
}
// CreateApplication indicates an expected call of CreateApplication.
func (mr *MockstoreMockRecorder) CreateApplication(app interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "CreateApplication", reflect.TypeOf((*Mockstore)(nil).CreateApplication), app)
}
// CreateEnvironment mocks base method.
func (m *Mockstore) CreateEnvironment(env *config.Environment) error {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "CreateEnvironment", env)
ret0, _ := ret[0].(error)
return ret0
}
// CreateEnvironment indicates an expected call of CreateEnvironment.
func (mr *MockstoreMockRecorder) CreateEnvironment(env interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "CreateEnvironment", reflect.TypeOf((*Mockstore)(nil).CreateEnvironment), env)
}
// CreateJob mocks base method.
func (m *Mockstore) CreateJob(job *config.Workload) error {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "CreateJob", job)
ret0, _ := ret[0].(error)
return ret0
}
// CreateJob indicates an expected call of CreateJob.
func (mr *MockstoreMockRecorder) CreateJob(job interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "CreateJob", reflect.TypeOf((*Mockstore)(nil).CreateJob), job)
}
// CreateService mocks base method.
func (m *Mockstore) CreateService(svc *config.Workload) error {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "CreateService", svc)
ret0, _ := ret[0].(error)
return ret0
}
// CreateService indicates an expected call of CreateService.
func (mr *MockstoreMockRecorder) CreateService(svc interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "CreateService", reflect.TypeOf((*Mockstore)(nil).CreateService), svc)
}
// DeleteApplication mocks base method.
func (m *Mockstore) DeleteApplication(name string) error {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "DeleteApplication", name)
ret0, _ := ret[0].(error)
return ret0
}
// DeleteApplication indicates an expected call of DeleteApplication.
func (mr *MockstoreMockRecorder) DeleteApplication(name interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DeleteApplication", reflect.TypeOf((*Mockstore)(nil).DeleteApplication), name)
}
// DeleteEnvironment mocks base method.
func (m *Mockstore) DeleteEnvironment(appName, environmentName string) error {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "DeleteEnvironment", appName, environmentName)
ret0, _ := ret[0].(error)
return ret0
}
// DeleteEnvironment indicates an expected call of DeleteEnvironment.
func (mr *MockstoreMockRecorder) DeleteEnvironment(appName, environmentName interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DeleteEnvironment", reflect.TypeOf((*Mockstore)(nil).DeleteEnvironment), appName, environmentName)
}
// DeleteJob mocks base method.
func (m *Mockstore) DeleteJob(appName, jobName string) error {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "DeleteJob", appName, jobName)
ret0, _ := ret[0].(error)
return ret0
}
// DeleteJob indicates an expected call of DeleteJob.
func (mr *MockstoreMockRecorder) DeleteJob(appName, jobName interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DeleteJob", reflect.TypeOf((*Mockstore)(nil).DeleteJob), appName, jobName)
}
// DeleteService mocks base method.
func (m *Mockstore) DeleteService(appName, svcName string) error {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "DeleteService", appName, svcName)
ret0, _ := ret[0].(error)
return ret0
}
// DeleteService indicates an expected call of DeleteService.
func (mr *MockstoreMockRecorder) DeleteService(appName, svcName interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DeleteService", reflect.TypeOf((*Mockstore)(nil).DeleteService), appName, svcName)
}
// GetApplication mocks base method.
func (m *Mockstore) GetApplication(appName string) (*config.Application, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "GetApplication", appName)
ret0, _ := ret[0].(*config.Application)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// GetApplication indicates an expected call of GetApplication.
func (mr *MockstoreMockRecorder) GetApplication(appName interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetApplication", reflect.TypeOf((*Mockstore)(nil).GetApplication), appName)
}
// GetEnvironment mocks base method.
func (m *Mockstore) GetEnvironment(appName, environmentName string) (*config.Environment, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "GetEnvironment", appName, environmentName)
ret0, _ := ret[0].(*config.Environment)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// GetEnvironment indicates an expected call of GetEnvironment.
func (mr *MockstoreMockRecorder) GetEnvironment(appName, environmentName interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetEnvironment", reflect.TypeOf((*Mockstore)(nil).GetEnvironment), appName, environmentName)
}
// GetJob mocks base method.
func (m *Mockstore) GetJob(appName, jobName string) (*config.Workload, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "GetJob", appName, jobName)
ret0, _ := ret[0].(*config.Workload)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// GetJob indicates an expected call of GetJob.
func (mr *MockstoreMockRecorder) GetJob(appName, jobName interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetJob", reflect.TypeOf((*Mockstore)(nil).GetJob), appName, jobName)
}
// GetService mocks base method.
func (m *Mockstore) GetService(appName, svcName string) (*config.Workload, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "GetService", appName, svcName)
ret0, _ := ret[0].(*config.Workload)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// GetService indicates an expected call of GetService.
func (mr *MockstoreMockRecorder) GetService(appName, svcName interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetService", reflect.TypeOf((*Mockstore)(nil).GetService), appName, svcName)
}
// GetWorkload mocks base method.
func (m *Mockstore) GetWorkload(appName, name string) (*config.Workload, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "GetWorkload", appName, name)
ret0, _ := ret[0].(*config.Workload)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// GetWorkload indicates an expected call of GetWorkload.
func (mr *MockstoreMockRecorder) GetWorkload(appName, name interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetWorkload", reflect.TypeOf((*Mockstore)(nil).GetWorkload), appName, name)
}
// ListApplications mocks base method.
func (m *Mockstore) ListApplications() ([]*config.Application, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "ListApplications")
ret0, _ := ret[0].([]*config.Application)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// ListApplications indicates an expected call of ListApplications.
func (mr *MockstoreMockRecorder) ListApplications() *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ListApplications", reflect.TypeOf((*Mockstore)(nil).ListApplications))
}
// ListEnvironments mocks base method.
func (m *Mockstore) ListEnvironments(appName string) ([]*config.Environment, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "ListEnvironments", appName)
ret0, _ := ret[0].([]*config.Environment)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// ListEnvironments indicates an expected call of ListEnvironments.
func (mr *MockstoreMockRecorder) ListEnvironments(appName interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ListEnvironments", reflect.TypeOf((*Mockstore)(nil).ListEnvironments), appName)
}
// ListJobs mocks base method.
func (m *Mockstore) ListJobs(appName string) ([]*config.Workload, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "ListJobs", appName)
ret0, _ := ret[0].([]*config.Workload)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// ListJobs indicates an expected call of ListJobs.
func (mr *MockstoreMockRecorder) ListJobs(appName interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ListJobs", reflect.TypeOf((*Mockstore)(nil).ListJobs), appName)
}
// ListServices mocks base method.
func (m *Mockstore) ListServices(appName string) ([]*config.Workload, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "ListServices", appName)
ret0, _ := ret[0].([]*config.Workload)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// ListServices indicates an expected call of ListServices.
func (mr *MockstoreMockRecorder) ListServices(appName interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ListServices", reflect.TypeOf((*Mockstore)(nil).ListServices), appName)
}
// ListWorkloads mocks base method.
func (m *Mockstore) ListWorkloads(appName string) ([]*config.Workload, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "ListWorkloads", appName)
ret0, _ := ret[0].([]*config.Workload)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// ListWorkloads indicates an expected call of ListWorkloads.
func (mr *MockstoreMockRecorder) ListWorkloads(appName interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ListWorkloads", reflect.TypeOf((*Mockstore)(nil).ListWorkloads), appName)
}
// UpdateApplication mocks base method.
func (m *Mockstore) UpdateApplication(app *config.Application) error {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "UpdateApplication", app)
ret0, _ := ret[0].(error)
return ret0
}
// UpdateApplication indicates an expected call of UpdateApplication.
func (mr *MockstoreMockRecorder) UpdateApplication(app interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "UpdateApplication", reflect.TypeOf((*Mockstore)(nil).UpdateApplication), app)
}
// MockdeployedEnvironmentLister is a mock of deployedEnvironmentLister interface.
type MockdeployedEnvironmentLister struct {
ctrl *gomock.Controller
recorder *MockdeployedEnvironmentListerMockRecorder
}
// MockdeployedEnvironmentListerMockRecorder is the mock recorder for MockdeployedEnvironmentLister.
type MockdeployedEnvironmentListerMockRecorder struct {
mock *MockdeployedEnvironmentLister
}
// NewMockdeployedEnvironmentLister creates a new mock instance.
func NewMockdeployedEnvironmentLister(ctrl *gomock.Controller) *MockdeployedEnvironmentLister {
mock := &MockdeployedEnvironmentLister{ctrl: ctrl}
mock.recorder = &MockdeployedEnvironmentListerMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockdeployedEnvironmentLister) EXPECT() *MockdeployedEnvironmentListerMockRecorder {
return m.recorder
}
// IsServiceDeployed mocks base method.
func (m *MockdeployedEnvironmentLister) IsServiceDeployed(appName, envName, svcName string) (bool, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "IsServiceDeployed", appName, envName, svcName)
ret0, _ := ret[0].(bool)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// IsServiceDeployed indicates an expected call of IsServiceDeployed.
func (mr *MockdeployedEnvironmentListerMockRecorder) IsServiceDeployed(appName, envName, svcName interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "IsServiceDeployed", reflect.TypeOf((*MockdeployedEnvironmentLister)(nil).IsServiceDeployed), appName, envName, svcName)
}
// ListDeployedJobs mocks base method.
func (m *MockdeployedEnvironmentLister) ListDeployedJobs(appName, envName string) ([]string, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "ListDeployedJobs", appName, envName)
ret0, _ := ret[0].([]string)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// ListDeployedJobs indicates an expected call of ListDeployedJobs.
func (mr *MockdeployedEnvironmentListerMockRecorder) ListDeployedJobs(appName, envName interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ListDeployedJobs", reflect.TypeOf((*MockdeployedEnvironmentLister)(nil).ListDeployedJobs), appName, envName)
}
// ListDeployedServices mocks base method.
func (m *MockdeployedEnvironmentLister) ListDeployedServices(appName, envName string) ([]string, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "ListDeployedServices", appName, envName)
ret0, _ := ret[0].([]string)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// ListDeployedServices indicates an expected call of ListDeployedServices.
func (mr *MockdeployedEnvironmentListerMockRecorder) ListDeployedServices(appName, envName interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ListDeployedServices", reflect.TypeOf((*MockdeployedEnvironmentLister)(nil).ListDeployedServices), appName, envName)
}
// ListEnvironmentsDeployedTo mocks base method.
func (m *MockdeployedEnvironmentLister) ListEnvironmentsDeployedTo(appName, svcName string) ([]string, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "ListEnvironmentsDeployedTo", appName, svcName)
ret0, _ := ret[0].([]string)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// ListEnvironmentsDeployedTo indicates an expected call of ListEnvironmentsDeployedTo.
func (mr *MockdeployedEnvironmentListerMockRecorder) ListEnvironmentsDeployedTo(appName, svcName interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ListEnvironmentsDeployedTo", reflect.TypeOf((*MockdeployedEnvironmentLister)(nil).ListEnvironmentsDeployedTo), appName, svcName)
}
// ListSNSTopics mocks base method.
func (m *MockdeployedEnvironmentLister) ListSNSTopics(appName, envName string) ([]deploy0.Topic, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "ListSNSTopics", appName, envName)
ret0, _ := ret[0].([]deploy0.Topic)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// ListSNSTopics indicates an expected call of ListSNSTopics.
func (mr *MockdeployedEnvironmentListerMockRecorder) ListSNSTopics(appName, envName interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ListSNSTopics", reflect.TypeOf((*MockdeployedEnvironmentLister)(nil).ListSNSTopics), appName, envName)
}
// MocksecretsManager is a mock of secretsManager interface.
type MocksecretsManager struct {
ctrl *gomock.Controller
recorder *MocksecretsManagerMockRecorder
}
// MocksecretsManagerMockRecorder is the mock recorder for MocksecretsManager.
type MocksecretsManagerMockRecorder struct {
mock *MocksecretsManager
}
// NewMocksecretsManager creates a new mock instance.
func NewMocksecretsManager(ctrl *gomock.Controller) *MocksecretsManager {
mock := &MocksecretsManager{ctrl: ctrl}
mock.recorder = &MocksecretsManagerMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MocksecretsManager) EXPECT() *MocksecretsManagerMockRecorder {
return m.recorder
}
// CreateSecret mocks base method.
func (m *MocksecretsManager) CreateSecret(secretName, secretString string) (string, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "CreateSecret", secretName, secretString)
ret0, _ := ret[0].(string)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// CreateSecret indicates an expected call of CreateSecret.
func (mr *MocksecretsManagerMockRecorder) CreateSecret(secretName, secretString interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "CreateSecret", reflect.TypeOf((*MocksecretsManager)(nil).CreateSecret), secretName, secretString)
}
// DeleteSecret mocks base method.
func (m *MocksecretsManager) DeleteSecret(secretName string) error {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "DeleteSecret", secretName)
ret0, _ := ret[0].(error)
return ret0
}
// DeleteSecret indicates an expected call of DeleteSecret.
func (mr *MocksecretsManagerMockRecorder) DeleteSecret(secretName interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DeleteSecret", reflect.TypeOf((*MocksecretsManager)(nil).DeleteSecret), secretName)
}
// DescribeSecret mocks base method.
func (m *MocksecretsManager) DescribeSecret(secretName string) (*secretsmanager.DescribeSecretOutput, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "DescribeSecret", secretName)
ret0, _ := ret[0].(*secretsmanager.DescribeSecretOutput)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// DescribeSecret indicates an expected call of DescribeSecret.
func (mr *MocksecretsManagerMockRecorder) DescribeSecret(secretName interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DescribeSecret", reflect.TypeOf((*MocksecretsManager)(nil).DescribeSecret), secretName)
}
// MocksecretCreator is a mock of secretCreator interface.
type MocksecretCreator struct {
ctrl *gomock.Controller
recorder *MocksecretCreatorMockRecorder
}
// MocksecretCreatorMockRecorder is the mock recorder for MocksecretCreator.
type MocksecretCreatorMockRecorder struct {
mock *MocksecretCreator
}
// NewMocksecretCreator creates a new mock instance.
func NewMocksecretCreator(ctrl *gomock.Controller) *MocksecretCreator {
mock := &MocksecretCreator{ctrl: ctrl}
mock.recorder = &MocksecretCreatorMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MocksecretCreator) EXPECT() *MocksecretCreatorMockRecorder {
return m.recorder
}
// CreateSecret mocks base method.
func (m *MocksecretCreator) CreateSecret(secretName, secretString string) (string, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "CreateSecret", secretName, secretString)
ret0, _ := ret[0].(string)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// CreateSecret indicates an expected call of CreateSecret.
func (mr *MocksecretCreatorMockRecorder) CreateSecret(secretName, secretString interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "CreateSecret", reflect.TypeOf((*MocksecretCreator)(nil).CreateSecret), secretName, secretString)
}
// MocksecretDeleter is a mock of secretDeleter interface.
type MocksecretDeleter struct {
ctrl *gomock.Controller
recorder *MocksecretDeleterMockRecorder
}
// MocksecretDeleterMockRecorder is the mock recorder for MocksecretDeleter.
type MocksecretDeleterMockRecorder struct {
mock *MocksecretDeleter
}
// NewMocksecretDeleter creates a new mock instance.
func NewMocksecretDeleter(ctrl *gomock.Controller) *MocksecretDeleter {
mock := &MocksecretDeleter{ctrl: ctrl}
mock.recorder = &MocksecretDeleterMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MocksecretDeleter) EXPECT() *MocksecretDeleterMockRecorder {
return m.recorder
}
// DeleteSecret mocks base method.
func (m *MocksecretDeleter) DeleteSecret(secretName string) error {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "DeleteSecret", secretName)
ret0, _ := ret[0].(error)
return ret0
}
// DeleteSecret indicates an expected call of DeleteSecret.
func (mr *MocksecretDeleterMockRecorder) DeleteSecret(secretName interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DeleteSecret", reflect.TypeOf((*MocksecretDeleter)(nil).DeleteSecret), secretName)
}
// DescribeSecret mocks base method.
func (m *MocksecretDeleter) DescribeSecret(secretName string) (*secretsmanager.DescribeSecretOutput, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "DescribeSecret", secretName)
ret0, _ := ret[0].(*secretsmanager.DescribeSecretOutput)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// DescribeSecret indicates an expected call of DescribeSecret.
func (mr *MocksecretDeleterMockRecorder) DescribeSecret(secretName interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DescribeSecret", reflect.TypeOf((*MocksecretDeleter)(nil).DescribeSecret), secretName)
}
// MockimageBuilderPusher is a mock of imageBuilderPusher interface.
type MockimageBuilderPusher struct {
ctrl *gomock.Controller
recorder *MockimageBuilderPusherMockRecorder
}
// MockimageBuilderPusherMockRecorder is the mock recorder for MockimageBuilderPusher.
type MockimageBuilderPusherMockRecorder struct {
mock *MockimageBuilderPusher
}
// NewMockimageBuilderPusher creates a new mock instance.
func NewMockimageBuilderPusher(ctrl *gomock.Controller) *MockimageBuilderPusher {
mock := &MockimageBuilderPusher{ctrl: ctrl}
mock.recorder = &MockimageBuilderPusherMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockimageBuilderPusher) EXPECT() *MockimageBuilderPusherMockRecorder {
return m.recorder
}
// BuildAndPush mocks base method.
func (m *MockimageBuilderPusher) BuildAndPush(ctx context.Context, args *dockerengine.BuildArguments, w io.Writer) (string, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "BuildAndPush", ctx, args, w)
ret0, _ := ret[0].(string)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// BuildAndPush indicates an expected call of BuildAndPush.
func (mr *MockimageBuilderPusherMockRecorder) BuildAndPush(ctx, args, w interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "BuildAndPush", reflect.TypeOf((*MockimageBuilderPusher)(nil).BuildAndPush), ctx, args, w)
}
// MockrepositoryLogin is a mock of repositoryLogin interface.
type MockrepositoryLogin struct {
ctrl *gomock.Controller
recorder *MockrepositoryLoginMockRecorder
}
// MockrepositoryLoginMockRecorder is the mock recorder for MockrepositoryLogin.
type MockrepositoryLoginMockRecorder struct {
mock *MockrepositoryLogin
}
// NewMockrepositoryLogin creates a new mock instance.
func NewMockrepositoryLogin(ctrl *gomock.Controller) *MockrepositoryLogin {
mock := &MockrepositoryLogin{ctrl: ctrl}
mock.recorder = &MockrepositoryLoginMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockrepositoryLogin) EXPECT() *MockrepositoryLoginMockRecorder {
return m.recorder
}
// Login mocks base method.
func (m *MockrepositoryLogin) Login() (string, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "Login")
ret0, _ := ret[0].(string)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// Login indicates an expected call of Login.
func (mr *MockrepositoryLoginMockRecorder) Login() *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Login", reflect.TypeOf((*MockrepositoryLogin)(nil).Login))
}
// MockrepositoryService is a mock of repositoryService interface.
type MockrepositoryService struct {
ctrl *gomock.Controller
recorder *MockrepositoryServiceMockRecorder
}
// MockrepositoryServiceMockRecorder is the mock recorder for MockrepositoryService.
type MockrepositoryServiceMockRecorder struct {
mock *MockrepositoryService
}
// NewMockrepositoryService creates a new mock instance.
func NewMockrepositoryService(ctrl *gomock.Controller) *MockrepositoryService {
mock := &MockrepositoryService{ctrl: ctrl}
mock.recorder = &MockrepositoryServiceMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockrepositoryService) EXPECT() *MockrepositoryServiceMockRecorder {
return m.recorder
}
// BuildAndPush mocks base method.
func (m *MockrepositoryService) BuildAndPush(ctx context.Context, args *dockerengine.BuildArguments, w io.Writer) (string, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "BuildAndPush", ctx, args, w)
ret0, _ := ret[0].(string)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// BuildAndPush indicates an expected call of BuildAndPush.
func (mr *MockrepositoryServiceMockRecorder) BuildAndPush(ctx, args, w interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "BuildAndPush", reflect.TypeOf((*MockrepositoryService)(nil).BuildAndPush), ctx, args, w)
}
// Login mocks base method.
func (m *MockrepositoryService) Login() (string, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "Login")
ret0, _ := ret[0].(string)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// Login indicates an expected call of Login.
func (mr *MockrepositoryServiceMockRecorder) Login() *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Login", reflect.TypeOf((*MockrepositoryService)(nil).Login))
}
// MocklogEventsWriter is a mock of logEventsWriter interface.
type MocklogEventsWriter struct {
ctrl *gomock.Controller
recorder *MocklogEventsWriterMockRecorder
}
// MocklogEventsWriterMockRecorder is the mock recorder for MocklogEventsWriter.
type MocklogEventsWriterMockRecorder struct {
mock *MocklogEventsWriter
}
// NewMocklogEventsWriter creates a new mock instance.
func NewMocklogEventsWriter(ctrl *gomock.Controller) *MocklogEventsWriter {
mock := &MocklogEventsWriter{ctrl: ctrl}
mock.recorder = &MocklogEventsWriterMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MocklogEventsWriter) EXPECT() *MocklogEventsWriterMockRecorder {
return m.recorder
}
// WriteLogEvents mocks base method.
func (m *MocklogEventsWriter) WriteLogEvents(opts logging.WriteLogEventsOpts) error {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "WriteLogEvents", opts)
ret0, _ := ret[0].(error)
return ret0
}
// WriteLogEvents indicates an expected call of WriteLogEvents.
func (mr *MocklogEventsWriterMockRecorder) WriteLogEvents(opts interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "WriteLogEvents", reflect.TypeOf((*MocklogEventsWriter)(nil).WriteLogEvents), opts)
}
// MockexecRunner is a mock of execRunner interface.
type MockexecRunner struct {
ctrl *gomock.Controller
recorder *MockexecRunnerMockRecorder
}
// MockexecRunnerMockRecorder is the mock recorder for MockexecRunner.
type MockexecRunnerMockRecorder struct {
mock *MockexecRunner
}
// NewMockexecRunner creates a new mock instance.
func NewMockexecRunner(ctrl *gomock.Controller) *MockexecRunner {
mock := &MockexecRunner{ctrl: ctrl}
mock.recorder = &MockexecRunnerMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockexecRunner) EXPECT() *MockexecRunnerMockRecorder {
return m.recorder
}
// Run mocks base method.
func (m *MockexecRunner) Run(name string, args []string, options ...exec.CmdOption) error {
m.ctrl.T.Helper()
varargs := []interface{}{name, args}
for _, a := range options {
varargs = append(varargs, a)
}
ret := m.ctrl.Call(m, "Run", varargs...)
ret0, _ := ret[0].(error)
return ret0
}
// Run indicates an expected call of Run.
func (mr *MockexecRunnerMockRecorder) Run(name, args interface{}, options ...interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
varargs := append([]interface{}{name, args}, options...)
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Run", reflect.TypeOf((*MockexecRunner)(nil).Run), varargs...)
}
// MockeventsWriter is a mock of eventsWriter interface.
type MockeventsWriter struct {
ctrl *gomock.Controller
recorder *MockeventsWriterMockRecorder
}
// MockeventsWriterMockRecorder is the mock recorder for MockeventsWriter.
type MockeventsWriterMockRecorder struct {
mock *MockeventsWriter
}
// NewMockeventsWriter creates a new mock instance.
func NewMockeventsWriter(ctrl *gomock.Controller) *MockeventsWriter {
mock := &MockeventsWriter{ctrl: ctrl}
mock.recorder = &MockeventsWriterMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockeventsWriter) EXPECT() *MockeventsWriterMockRecorder {
return m.recorder
}
// WriteEventsUntilStopped mocks base method.
func (m *MockeventsWriter) WriteEventsUntilStopped() error {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "WriteEventsUntilStopped")
ret0, _ := ret[0].(error)
return ret0
}
// WriteEventsUntilStopped indicates an expected call of WriteEventsUntilStopped.
func (mr *MockeventsWriterMockRecorder) WriteEventsUntilStopped() *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "WriteEventsUntilStopped", reflect.TypeOf((*MockeventsWriter)(nil).WriteEventsUntilStopped))
}
// MockdefaultSessionProvider is a mock of defaultSessionProvider interface.
type MockdefaultSessionProvider struct {
ctrl *gomock.Controller
recorder *MockdefaultSessionProviderMockRecorder
}
// MockdefaultSessionProviderMockRecorder is the mock recorder for MockdefaultSessionProvider.
type MockdefaultSessionProviderMockRecorder struct {
mock *MockdefaultSessionProvider
}
// NewMockdefaultSessionProvider creates a new mock instance.
func NewMockdefaultSessionProvider(ctrl *gomock.Controller) *MockdefaultSessionProvider {
mock := &MockdefaultSessionProvider{ctrl: ctrl}
mock.recorder = &MockdefaultSessionProviderMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockdefaultSessionProvider) EXPECT() *MockdefaultSessionProviderMockRecorder {
return m.recorder
}
// Default mocks base method.
func (m *MockdefaultSessionProvider) Default() (*session.Session, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "Default")
ret0, _ := ret[0].(*session.Session)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// Default indicates an expected call of Default.
func (mr *MockdefaultSessionProviderMockRecorder) Default() *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Default", reflect.TypeOf((*MockdefaultSessionProvider)(nil).Default))
}
// MockregionalSessionProvider is a mock of regionalSessionProvider interface.
type MockregionalSessionProvider struct {
ctrl *gomock.Controller
recorder *MockregionalSessionProviderMockRecorder
}
// MockregionalSessionProviderMockRecorder is the mock recorder for MockregionalSessionProvider.
type MockregionalSessionProviderMockRecorder struct {
mock *MockregionalSessionProvider
}
// NewMockregionalSessionProvider creates a new mock instance.
func NewMockregionalSessionProvider(ctrl *gomock.Controller) *MockregionalSessionProvider {
mock := &MockregionalSessionProvider{ctrl: ctrl}
mock.recorder = &MockregionalSessionProviderMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockregionalSessionProvider) EXPECT() *MockregionalSessionProviderMockRecorder {
return m.recorder
}
// DefaultWithRegion mocks base method.
func (m *MockregionalSessionProvider) DefaultWithRegion(region string) (*session.Session, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "DefaultWithRegion", region)
ret0, _ := ret[0].(*session.Session)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// DefaultWithRegion indicates an expected call of DefaultWithRegion.
func (mr *MockregionalSessionProviderMockRecorder) DefaultWithRegion(region interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DefaultWithRegion", reflect.TypeOf((*MockregionalSessionProvider)(nil).DefaultWithRegion), region)
}
// MocksessionFromRoleProvider is a mock of sessionFromRoleProvider interface.
type MocksessionFromRoleProvider struct {
ctrl *gomock.Controller
recorder *MocksessionFromRoleProviderMockRecorder
}
// MocksessionFromRoleProviderMockRecorder is the mock recorder for MocksessionFromRoleProvider.
type MocksessionFromRoleProviderMockRecorder struct {
mock *MocksessionFromRoleProvider
}
// NewMocksessionFromRoleProvider creates a new mock instance.
func NewMocksessionFromRoleProvider(ctrl *gomock.Controller) *MocksessionFromRoleProvider {
mock := &MocksessionFromRoleProvider{ctrl: ctrl}
mock.recorder = &MocksessionFromRoleProviderMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MocksessionFromRoleProvider) EXPECT() *MocksessionFromRoleProviderMockRecorder {
return m.recorder
}
// FromRole mocks base method.
func (m *MocksessionFromRoleProvider) FromRole(roleARN, region string) (*session.Session, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "FromRole", roleARN, region)
ret0, _ := ret[0].(*session.Session)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// FromRole indicates an expected call of FromRole.
func (mr *MocksessionFromRoleProviderMockRecorder) FromRole(roleARN, region interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "FromRole", reflect.TypeOf((*MocksessionFromRoleProvider)(nil).FromRole), roleARN, region)
}
// MocksessionFromStaticProvider is a mock of sessionFromStaticProvider interface.
type MocksessionFromStaticProvider struct {
ctrl *gomock.Controller
recorder *MocksessionFromStaticProviderMockRecorder
}
// MocksessionFromStaticProviderMockRecorder is the mock recorder for MocksessionFromStaticProvider.
type MocksessionFromStaticProviderMockRecorder struct {
mock *MocksessionFromStaticProvider
}
// NewMocksessionFromStaticProvider creates a new mock instance.
func NewMocksessionFromStaticProvider(ctrl *gomock.Controller) *MocksessionFromStaticProvider {
mock := &MocksessionFromStaticProvider{ctrl: ctrl}
mock.recorder = &MocksessionFromStaticProviderMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MocksessionFromStaticProvider) EXPECT() *MocksessionFromStaticProviderMockRecorder {
return m.recorder
}
// FromStaticCreds mocks base method.
func (m *MocksessionFromStaticProvider) FromStaticCreds(accessKeyID, secretAccessKey, sessionToken string) (*session.Session, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "FromStaticCreds", accessKeyID, secretAccessKey, sessionToken)
ret0, _ := ret[0].(*session.Session)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// FromStaticCreds indicates an expected call of FromStaticCreds.
func (mr *MocksessionFromStaticProviderMockRecorder) FromStaticCreds(accessKeyID, secretAccessKey, sessionToken interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "FromStaticCreds", reflect.TypeOf((*MocksessionFromStaticProvider)(nil).FromStaticCreds), accessKeyID, secretAccessKey, sessionToken)
}
// MocksessionFromProfileProvider is a mock of sessionFromProfileProvider interface.
type MocksessionFromProfileProvider struct {
ctrl *gomock.Controller
recorder *MocksessionFromProfileProviderMockRecorder
}
// MocksessionFromProfileProviderMockRecorder is the mock recorder for MocksessionFromProfileProvider.
type MocksessionFromProfileProviderMockRecorder struct {
mock *MocksessionFromProfileProvider
}
// NewMocksessionFromProfileProvider creates a new mock instance.
func NewMocksessionFromProfileProvider(ctrl *gomock.Controller) *MocksessionFromProfileProvider {
mock := &MocksessionFromProfileProvider{ctrl: ctrl}
mock.recorder = &MocksessionFromProfileProviderMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MocksessionFromProfileProvider) EXPECT() *MocksessionFromProfileProviderMockRecorder {
return m.recorder
}
// FromProfile mocks base method.
func (m *MocksessionFromProfileProvider) FromProfile(name string) (*session.Session, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "FromProfile", name)
ret0, _ := ret[0].(*session.Session)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// FromProfile indicates an expected call of FromProfile.
func (mr *MocksessionFromProfileProviderMockRecorder) FromProfile(name interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "FromProfile", reflect.TypeOf((*MocksessionFromProfileProvider)(nil).FromProfile), name)
}
// MocksessionProvider is a mock of sessionProvider interface.
type MocksessionProvider struct {
ctrl *gomock.Controller
recorder *MocksessionProviderMockRecorder
}
// MocksessionProviderMockRecorder is the mock recorder for MocksessionProvider.
type MocksessionProviderMockRecorder struct {
mock *MocksessionProvider
}
// NewMocksessionProvider creates a new mock instance.
func NewMocksessionProvider(ctrl *gomock.Controller) *MocksessionProvider {
mock := &MocksessionProvider{ctrl: ctrl}
mock.recorder = &MocksessionProviderMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MocksessionProvider) EXPECT() *MocksessionProviderMockRecorder {
return m.recorder
}
// Default mocks base method.
func (m *MocksessionProvider) Default() (*session.Session, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "Default")
ret0, _ := ret[0].(*session.Session)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// Default indicates an expected call of Default.
func (mr *MocksessionProviderMockRecorder) Default() *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Default", reflect.TypeOf((*MocksessionProvider)(nil).Default))
}
// DefaultWithRegion mocks base method.
func (m *MocksessionProvider) DefaultWithRegion(region string) (*session.Session, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "DefaultWithRegion", region)
ret0, _ := ret[0].(*session.Session)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// DefaultWithRegion indicates an expected call of DefaultWithRegion.
func (mr *MocksessionProviderMockRecorder) DefaultWithRegion(region interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DefaultWithRegion", reflect.TypeOf((*MocksessionProvider)(nil).DefaultWithRegion), region)
}
// FromProfile mocks base method.
func (m *MocksessionProvider) FromProfile(name string) (*session.Session, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "FromProfile", name)
ret0, _ := ret[0].(*session.Session)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// FromProfile indicates an expected call of FromProfile.
func (mr *MocksessionProviderMockRecorder) FromProfile(name interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "FromProfile", reflect.TypeOf((*MocksessionProvider)(nil).FromProfile), name)
}
// FromRole mocks base method.
func (m *MocksessionProvider) FromRole(roleARN, region string) (*session.Session, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "FromRole", roleARN, region)
ret0, _ := ret[0].(*session.Session)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// FromRole indicates an expected call of FromRole.
func (mr *MocksessionProviderMockRecorder) FromRole(roleARN, region interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "FromRole", reflect.TypeOf((*MocksessionProvider)(nil).FromRole), roleARN, region)
}
// FromStaticCreds mocks base method.
func (m *MocksessionProvider) FromStaticCreds(accessKeyID, secretAccessKey, sessionToken string) (*session.Session, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "FromStaticCreds", accessKeyID, secretAccessKey, sessionToken)
ret0, _ := ret[0].(*session.Session)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// FromStaticCreds indicates an expected call of FromStaticCreds.
func (mr *MocksessionProviderMockRecorder) FromStaticCreds(accessKeyID, secretAccessKey, sessionToken interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "FromStaticCreds", reflect.TypeOf((*MocksessionProvider)(nil).FromStaticCreds), accessKeyID, secretAccessKey, sessionToken)
}
// Mockdescriber is a mock of describer interface.
type Mockdescriber struct {
ctrl *gomock.Controller
recorder *MockdescriberMockRecorder
}
// MockdescriberMockRecorder is the mock recorder for Mockdescriber.
type MockdescriberMockRecorder struct {
mock *Mockdescriber
}
// NewMockdescriber creates a new mock instance.
func NewMockdescriber(ctrl *gomock.Controller) *Mockdescriber {
mock := &Mockdescriber{ctrl: ctrl}
mock.recorder = &MockdescriberMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *Mockdescriber) EXPECT() *MockdescriberMockRecorder {
return m.recorder
}
// Describe mocks base method.
func (m *Mockdescriber) Describe() (describe.HumanJSONStringer, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "Describe")
ret0, _ := ret[0].(describe.HumanJSONStringer)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// Describe indicates an expected call of Describe.
func (mr *MockdescriberMockRecorder) Describe() *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Describe", reflect.TypeOf((*Mockdescriber)(nil).Describe))
}
// MockworkloadDescriber is a mock of workloadDescriber interface.
type MockworkloadDescriber struct {
ctrl *gomock.Controller
recorder *MockworkloadDescriberMockRecorder
}
// MockworkloadDescriberMockRecorder is the mock recorder for MockworkloadDescriber.
type MockworkloadDescriberMockRecorder struct {
mock *MockworkloadDescriber
}
// NewMockworkloadDescriber creates a new mock instance.
func NewMockworkloadDescriber(ctrl *gomock.Controller) *MockworkloadDescriber {
mock := &MockworkloadDescriber{ctrl: ctrl}
mock.recorder = &MockworkloadDescriberMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockworkloadDescriber) EXPECT() *MockworkloadDescriberMockRecorder {
return m.recorder
}
// Describe mocks base method.
func (m *MockworkloadDescriber) Describe() (describe.HumanJSONStringer, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "Describe")
ret0, _ := ret[0].(describe.HumanJSONStringer)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// Describe indicates an expected call of Describe.
func (mr *MockworkloadDescriberMockRecorder) Describe() *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Describe", reflect.TypeOf((*MockworkloadDescriber)(nil).Describe))
}
// Manifest mocks base method.
func (m *MockworkloadDescriber) Manifest(arg0 string) ([]byte, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "Manifest", arg0)
ret0, _ := ret[0].([]byte)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// Manifest indicates an expected call of Manifest.
func (mr *MockworkloadDescriberMockRecorder) Manifest(arg0 interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Manifest", reflect.TypeOf((*MockworkloadDescriber)(nil).Manifest), arg0)
}
// MockwsFileDeleter is a mock of wsFileDeleter interface.
type MockwsFileDeleter struct {
ctrl *gomock.Controller
recorder *MockwsFileDeleterMockRecorder
}
// MockwsFileDeleterMockRecorder is the mock recorder for MockwsFileDeleter.
type MockwsFileDeleterMockRecorder struct {
mock *MockwsFileDeleter
}
// NewMockwsFileDeleter creates a new mock instance.
func NewMockwsFileDeleter(ctrl *gomock.Controller) *MockwsFileDeleter {
mock := &MockwsFileDeleter{ctrl: ctrl}
mock.recorder = &MockwsFileDeleterMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockwsFileDeleter) EXPECT() *MockwsFileDeleterMockRecorder {
return m.recorder
}
// DeleteWorkspaceFile mocks base method.
func (m *MockwsFileDeleter) DeleteWorkspaceFile() error {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "DeleteWorkspaceFile")
ret0, _ := ret[0].(error)
return ret0
}
// DeleteWorkspaceFile indicates an expected call of DeleteWorkspaceFile.
func (mr *MockwsFileDeleterMockRecorder) DeleteWorkspaceFile() *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DeleteWorkspaceFile", reflect.TypeOf((*MockwsFileDeleter)(nil).DeleteWorkspaceFile))
}
// MockmanifestReader is a mock of manifestReader interface.
type MockmanifestReader struct {
ctrl *gomock.Controller
recorder *MockmanifestReaderMockRecorder
}
// MockmanifestReaderMockRecorder is the mock recorder for MockmanifestReader.
type MockmanifestReaderMockRecorder struct {
mock *MockmanifestReader
}
// NewMockmanifestReader creates a new mock instance.
func NewMockmanifestReader(ctrl *gomock.Controller) *MockmanifestReader {
mock := &MockmanifestReader{ctrl: ctrl}
mock.recorder = &MockmanifestReaderMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockmanifestReader) EXPECT() *MockmanifestReaderMockRecorder {
return m.recorder
}
// ReadWorkloadManifest mocks base method.
func (m *MockmanifestReader) ReadWorkloadManifest(name string) (workspace.WorkloadManifest, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "ReadWorkloadManifest", name)
ret0, _ := ret[0].(workspace.WorkloadManifest)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// ReadWorkloadManifest indicates an expected call of ReadWorkloadManifest.
func (mr *MockmanifestReaderMockRecorder) ReadWorkloadManifest(name interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ReadWorkloadManifest", reflect.TypeOf((*MockmanifestReader)(nil).ReadWorkloadManifest), name)
}
// MockenvironmentManifestWriter is a mock of environmentManifestWriter interface.
type MockenvironmentManifestWriter struct {
ctrl *gomock.Controller
recorder *MockenvironmentManifestWriterMockRecorder
}
// MockenvironmentManifestWriterMockRecorder is the mock recorder for MockenvironmentManifestWriter.
type MockenvironmentManifestWriterMockRecorder struct {
mock *MockenvironmentManifestWriter
}
// NewMockenvironmentManifestWriter creates a new mock instance.
func NewMockenvironmentManifestWriter(ctrl *gomock.Controller) *MockenvironmentManifestWriter {
mock := &MockenvironmentManifestWriter{ctrl: ctrl}
mock.recorder = &MockenvironmentManifestWriterMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockenvironmentManifestWriter) EXPECT() *MockenvironmentManifestWriterMockRecorder {
return m.recorder
}
// WriteEnvironmentManifest mocks base method.
func (m *MockenvironmentManifestWriter) WriteEnvironmentManifest(arg0 encoding.BinaryMarshaler, arg1 string) (string, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "WriteEnvironmentManifest", arg0, arg1)
ret0, _ := ret[0].(string)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// WriteEnvironmentManifest indicates an expected call of WriteEnvironmentManifest.
func (mr *MockenvironmentManifestWriterMockRecorder) WriteEnvironmentManifest(arg0, arg1 interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "WriteEnvironmentManifest", reflect.TypeOf((*MockenvironmentManifestWriter)(nil).WriteEnvironmentManifest), arg0, arg1)
}
// MockworkspacePathGetter is a mock of workspacePathGetter interface.
type MockworkspacePathGetter struct {
ctrl *gomock.Controller
recorder *MockworkspacePathGetterMockRecorder
}
// MockworkspacePathGetterMockRecorder is the mock recorder for MockworkspacePathGetter.
type MockworkspacePathGetterMockRecorder struct {
mock *MockworkspacePathGetter
}
// NewMockworkspacePathGetter creates a new mock instance.
func NewMockworkspacePathGetter(ctrl *gomock.Controller) *MockworkspacePathGetter {
mock := &MockworkspacePathGetter{ctrl: ctrl}
mock.recorder = &MockworkspacePathGetterMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockworkspacePathGetter) EXPECT() *MockworkspacePathGetterMockRecorder {
return m.recorder
}
// Path mocks base method.
func (m *MockworkspacePathGetter) Path() string {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "Path")
ret0, _ := ret[0].(string)
return ret0
}
// Path indicates an expected call of Path.
func (mr *MockworkspacePathGetterMockRecorder) Path() *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Path", reflect.TypeOf((*MockworkspacePathGetter)(nil).Path))
}
// MockwsPipelineManifestReader is a mock of wsPipelineManifestReader interface.
type MockwsPipelineManifestReader struct {
ctrl *gomock.Controller
recorder *MockwsPipelineManifestReaderMockRecorder
}
// MockwsPipelineManifestReaderMockRecorder is the mock recorder for MockwsPipelineManifestReader.
type MockwsPipelineManifestReaderMockRecorder struct {
mock *MockwsPipelineManifestReader
}
// NewMockwsPipelineManifestReader creates a new mock instance.
func NewMockwsPipelineManifestReader(ctrl *gomock.Controller) *MockwsPipelineManifestReader {
mock := &MockwsPipelineManifestReader{ctrl: ctrl}
mock.recorder = &MockwsPipelineManifestReaderMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockwsPipelineManifestReader) EXPECT() *MockwsPipelineManifestReaderMockRecorder {
return m.recorder
}
// ReadPipelineManifest mocks base method.
func (m *MockwsPipelineManifestReader) ReadPipelineManifest(path string) (*manifest.Pipeline, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "ReadPipelineManifest", path)
ret0, _ := ret[0].(*manifest.Pipeline)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// ReadPipelineManifest indicates an expected call of ReadPipelineManifest.
func (mr *MockwsPipelineManifestReaderMockRecorder) ReadPipelineManifest(path interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ReadPipelineManifest", reflect.TypeOf((*MockwsPipelineManifestReader)(nil).ReadPipelineManifest), path)
}
// MockrelPath is a mock of relPath interface.
type MockrelPath struct {
ctrl *gomock.Controller
recorder *MockrelPathMockRecorder
}
// MockrelPathMockRecorder is the mock recorder for MockrelPath.
type MockrelPathMockRecorder struct {
mock *MockrelPath
}
// NewMockrelPath creates a new mock instance.
func NewMockrelPath(ctrl *gomock.Controller) *MockrelPath {
mock := &MockrelPath{ctrl: ctrl}
mock.recorder = &MockrelPathMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockrelPath) EXPECT() *MockrelPathMockRecorder {
return m.recorder
}
// Rel mocks base method.
func (m *MockrelPath) Rel(path string) (string, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "Rel", path)
ret0, _ := ret[0].(string)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// Rel indicates an expected call of Rel.
func (mr *MockrelPathMockRecorder) Rel(path interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Rel", reflect.TypeOf((*MockrelPath)(nil).Rel), path)
}
// MockwsPipelineIniter is a mock of wsPipelineIniter interface.
type MockwsPipelineIniter struct {
ctrl *gomock.Controller
recorder *MockwsPipelineIniterMockRecorder
}
// MockwsPipelineIniterMockRecorder is the mock recorder for MockwsPipelineIniter.
type MockwsPipelineIniterMockRecorder struct {
mock *MockwsPipelineIniter
}
// NewMockwsPipelineIniter creates a new mock instance.
func NewMockwsPipelineIniter(ctrl *gomock.Controller) *MockwsPipelineIniter {
mock := &MockwsPipelineIniter{ctrl: ctrl}
mock.recorder = &MockwsPipelineIniterMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockwsPipelineIniter) EXPECT() *MockwsPipelineIniterMockRecorder {
return m.recorder
}
// ListPipelines mocks base method.
func (m *MockwsPipelineIniter) ListPipelines() ([]workspace.PipelineManifest, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "ListPipelines")
ret0, _ := ret[0].([]workspace.PipelineManifest)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// ListPipelines indicates an expected call of ListPipelines.
func (mr *MockwsPipelineIniterMockRecorder) ListPipelines() *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ListPipelines", reflect.TypeOf((*MockwsPipelineIniter)(nil).ListPipelines))
}
// Rel mocks base method.
func (m *MockwsPipelineIniter) Rel(path string) (string, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "Rel", path)
ret0, _ := ret[0].(string)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// Rel indicates an expected call of Rel.
func (mr *MockwsPipelineIniterMockRecorder) Rel(path interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Rel", reflect.TypeOf((*MockwsPipelineIniter)(nil).Rel), path)
}
// WritePipelineBuildspec mocks base method.
func (m *MockwsPipelineIniter) WritePipelineBuildspec(marshaler encoding.BinaryMarshaler, name string) (string, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "WritePipelineBuildspec", marshaler, name)
ret0, _ := ret[0].(string)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// WritePipelineBuildspec indicates an expected call of WritePipelineBuildspec.
func (mr *MockwsPipelineIniterMockRecorder) WritePipelineBuildspec(marshaler, name interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "WritePipelineBuildspec", reflect.TypeOf((*MockwsPipelineIniter)(nil).WritePipelineBuildspec), marshaler, name)
}
// WritePipelineManifest mocks base method.
func (m *MockwsPipelineIniter) WritePipelineManifest(marshaler encoding.BinaryMarshaler, name string) (string, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "WritePipelineManifest", marshaler, name)
ret0, _ := ret[0].(string)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// WritePipelineManifest indicates an expected call of WritePipelineManifest.
func (mr *MockwsPipelineIniterMockRecorder) WritePipelineManifest(marshaler, name interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "WritePipelineManifest", reflect.TypeOf((*MockwsPipelineIniter)(nil).WritePipelineManifest), marshaler, name)
}
// MockserviceLister is a mock of serviceLister interface.
type MockserviceLister struct {
ctrl *gomock.Controller
recorder *MockserviceListerMockRecorder
}
// MockserviceListerMockRecorder is the mock recorder for MockserviceLister.
type MockserviceListerMockRecorder struct {
mock *MockserviceLister
}
// NewMockserviceLister creates a new mock instance.
func NewMockserviceLister(ctrl *gomock.Controller) *MockserviceLister {
mock := &MockserviceLister{ctrl: ctrl}
mock.recorder = &MockserviceListerMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockserviceLister) EXPECT() *MockserviceListerMockRecorder {
return m.recorder
}
// ListServices mocks base method.
func (m *MockserviceLister) ListServices() ([]string, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "ListServices")
ret0, _ := ret[0].([]string)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// ListServices indicates an expected call of ListServices.
func (mr *MockserviceListerMockRecorder) ListServices() *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ListServices", reflect.TypeOf((*MockserviceLister)(nil).ListServices))
}
// MockwsSvcReader is a mock of wsSvcReader interface.
type MockwsSvcReader struct {
ctrl *gomock.Controller
recorder *MockwsSvcReaderMockRecorder
}
// MockwsSvcReaderMockRecorder is the mock recorder for MockwsSvcReader.
type MockwsSvcReaderMockRecorder struct {
mock *MockwsSvcReader
}
// NewMockwsSvcReader creates a new mock instance.
func NewMockwsSvcReader(ctrl *gomock.Controller) *MockwsSvcReader {
mock := &MockwsSvcReader{ctrl: ctrl}
mock.recorder = &MockwsSvcReaderMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockwsSvcReader) EXPECT() *MockwsSvcReaderMockRecorder {
return m.recorder
}
// ListServices mocks base method.
func (m *MockwsSvcReader) ListServices() ([]string, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "ListServices")
ret0, _ := ret[0].([]string)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// ListServices indicates an expected call of ListServices.
func (mr *MockwsSvcReaderMockRecorder) ListServices() *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ListServices", reflect.TypeOf((*MockwsSvcReader)(nil).ListServices))
}
// ReadWorkloadManifest mocks base method.
func (m *MockwsSvcReader) ReadWorkloadManifest(name string) (workspace.WorkloadManifest, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "ReadWorkloadManifest", name)
ret0, _ := ret[0].(workspace.WorkloadManifest)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// ReadWorkloadManifest indicates an expected call of ReadWorkloadManifest.
func (mr *MockwsSvcReaderMockRecorder) ReadWorkloadManifest(name interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ReadWorkloadManifest", reflect.TypeOf((*MockwsSvcReader)(nil).ReadWorkloadManifest), name)
}
// MockjobLister is a mock of jobLister interface.
type MockjobLister struct {
ctrl *gomock.Controller
recorder *MockjobListerMockRecorder
}
// MockjobListerMockRecorder is the mock recorder for MockjobLister.
type MockjobListerMockRecorder struct {
mock *MockjobLister
}
// NewMockjobLister creates a new mock instance.
func NewMockjobLister(ctrl *gomock.Controller) *MockjobLister {
mock := &MockjobLister{ctrl: ctrl}
mock.recorder = &MockjobListerMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockjobLister) EXPECT() *MockjobListerMockRecorder {
return m.recorder
}
// ListJobs mocks base method.
func (m *MockjobLister) ListJobs() ([]string, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "ListJobs")
ret0, _ := ret[0].([]string)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// ListJobs indicates an expected call of ListJobs.
func (mr *MockjobListerMockRecorder) ListJobs() *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ListJobs", reflect.TypeOf((*MockjobLister)(nil).ListJobs))
}
// MockwsJobReader is a mock of wsJobReader interface.
type MockwsJobReader struct {
ctrl *gomock.Controller
recorder *MockwsJobReaderMockRecorder
}
// MockwsJobReaderMockRecorder is the mock recorder for MockwsJobReader.
type MockwsJobReaderMockRecorder struct {
mock *MockwsJobReader
}
// NewMockwsJobReader creates a new mock instance.
func NewMockwsJobReader(ctrl *gomock.Controller) *MockwsJobReader {
mock := &MockwsJobReader{ctrl: ctrl}
mock.recorder = &MockwsJobReaderMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockwsJobReader) EXPECT() *MockwsJobReaderMockRecorder {
return m.recorder
}
// ListJobs mocks base method.
func (m *MockwsJobReader) ListJobs() ([]string, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "ListJobs")
ret0, _ := ret[0].([]string)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// ListJobs indicates an expected call of ListJobs.
func (mr *MockwsJobReaderMockRecorder) ListJobs() *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ListJobs", reflect.TypeOf((*MockwsJobReader)(nil).ListJobs))
}
// ReadWorkloadManifest mocks base method.
func (m *MockwsJobReader) ReadWorkloadManifest(name string) (workspace.WorkloadManifest, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "ReadWorkloadManifest", name)
ret0, _ := ret[0].(workspace.WorkloadManifest)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// ReadWorkloadManifest indicates an expected call of ReadWorkloadManifest.
func (mr *MockwsJobReaderMockRecorder) ReadWorkloadManifest(name interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ReadWorkloadManifest", reflect.TypeOf((*MockwsJobReader)(nil).ReadWorkloadManifest), name)
}
// MockwlLister is a mock of wlLister interface.
type MockwlLister struct {
ctrl *gomock.Controller
recorder *MockwlListerMockRecorder
}
// MockwlListerMockRecorder is the mock recorder for MockwlLister.
type MockwlListerMockRecorder struct {
mock *MockwlLister
}
// NewMockwlLister creates a new mock instance.
func NewMockwlLister(ctrl *gomock.Controller) *MockwlLister {
mock := &MockwlLister{ctrl: ctrl}
mock.recorder = &MockwlListerMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockwlLister) EXPECT() *MockwlListerMockRecorder {
return m.recorder
}
// ListWorkloads mocks base method.
func (m *MockwlLister) ListWorkloads() ([]string, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "ListWorkloads")
ret0, _ := ret[0].([]string)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// ListWorkloads indicates an expected call of ListWorkloads.
func (mr *MockwlListerMockRecorder) ListWorkloads() *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ListWorkloads", reflect.TypeOf((*MockwlLister)(nil).ListWorkloads))
}
// MockwsWorkloadReader is a mock of wsWorkloadReader interface.
type MockwsWorkloadReader struct {
ctrl *gomock.Controller
recorder *MockwsWorkloadReaderMockRecorder
}
// MockwsWorkloadReaderMockRecorder is the mock recorder for MockwsWorkloadReader.
type MockwsWorkloadReaderMockRecorder struct {
mock *MockwsWorkloadReader
}
// NewMockwsWorkloadReader creates a new mock instance.
func NewMockwsWorkloadReader(ctrl *gomock.Controller) *MockwsWorkloadReader {
mock := &MockwsWorkloadReader{ctrl: ctrl}
mock.recorder = &MockwsWorkloadReaderMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockwsWorkloadReader) EXPECT() *MockwsWorkloadReaderMockRecorder {
return m.recorder
}
// ReadFile mocks base method.
func (m *MockwsWorkloadReader) ReadFile(path string) ([]byte, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "ReadFile", path)
ret0, _ := ret[0].([]byte)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// ReadFile indicates an expected call of ReadFile.
func (mr *MockwsWorkloadReaderMockRecorder) ReadFile(path interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ReadFile", reflect.TypeOf((*MockwsWorkloadReader)(nil).ReadFile), path)
}
// ReadWorkloadManifest mocks base method.
func (m *MockwsWorkloadReader) ReadWorkloadManifest(name string) (workspace.WorkloadManifest, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "ReadWorkloadManifest", name)
ret0, _ := ret[0].(workspace.WorkloadManifest)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// ReadWorkloadManifest indicates an expected call of ReadWorkloadManifest.
func (mr *MockwsWorkloadReaderMockRecorder) ReadWorkloadManifest(name interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ReadWorkloadManifest", reflect.TypeOf((*MockwsWorkloadReader)(nil).ReadWorkloadManifest), name)
}
// WorkloadAddonFileAbsPath mocks base method.
func (m *MockwsWorkloadReader) WorkloadAddonFileAbsPath(wkldName, fName string) string {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "WorkloadAddonFileAbsPath", wkldName, fName)
ret0, _ := ret[0].(string)
return ret0
}
// WorkloadAddonFileAbsPath indicates an expected call of WorkloadAddonFileAbsPath.
func (mr *MockwsWorkloadReaderMockRecorder) WorkloadAddonFileAbsPath(wkldName, fName interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "WorkloadAddonFileAbsPath", reflect.TypeOf((*MockwsWorkloadReader)(nil).WorkloadAddonFileAbsPath), wkldName, fName)
}
// WorkloadAddonFilePath mocks base method.
func (m *MockwsWorkloadReader) WorkloadAddonFilePath(wkldName, fName string) string {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "WorkloadAddonFilePath", wkldName, fName)
ret0, _ := ret[0].(string)
return ret0
}
// WorkloadAddonFilePath indicates an expected call of WorkloadAddonFilePath.
func (mr *MockwsWorkloadReaderMockRecorder) WorkloadAddonFilePath(wkldName, fName interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "WorkloadAddonFilePath", reflect.TypeOf((*MockwsWorkloadReader)(nil).WorkloadAddonFilePath), wkldName, fName)
}
// WorkloadExists mocks base method.
func (m *MockwsWorkloadReader) WorkloadExists(name string) (bool, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "WorkloadExists", name)
ret0, _ := ret[0].(bool)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// WorkloadExists indicates an expected call of WorkloadExists.
func (mr *MockwsWorkloadReaderMockRecorder) WorkloadExists(name interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "WorkloadExists", reflect.TypeOf((*MockwsWorkloadReader)(nil).WorkloadExists), name)
}
// MockwsWorkloadReadWriter is a mock of wsWorkloadReadWriter interface.
type MockwsWorkloadReadWriter struct {
ctrl *gomock.Controller
recorder *MockwsWorkloadReadWriterMockRecorder
}
// MockwsWorkloadReadWriterMockRecorder is the mock recorder for MockwsWorkloadReadWriter.
type MockwsWorkloadReadWriterMockRecorder struct {
mock *MockwsWorkloadReadWriter
}
// NewMockwsWorkloadReadWriter creates a new mock instance.
func NewMockwsWorkloadReadWriter(ctrl *gomock.Controller) *MockwsWorkloadReadWriter {
mock := &MockwsWorkloadReadWriter{ctrl: ctrl}
mock.recorder = &MockwsWorkloadReadWriterMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockwsWorkloadReadWriter) EXPECT() *MockwsWorkloadReadWriterMockRecorder {
return m.recorder
}
// ReadFile mocks base method.
func (m *MockwsWorkloadReadWriter) ReadFile(path string) ([]byte, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "ReadFile", path)
ret0, _ := ret[0].([]byte)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// ReadFile indicates an expected call of ReadFile.
func (mr *MockwsWorkloadReadWriterMockRecorder) ReadFile(path interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ReadFile", reflect.TypeOf((*MockwsWorkloadReadWriter)(nil).ReadFile), path)
}
// ReadWorkloadManifest mocks base method.
func (m *MockwsWorkloadReadWriter) ReadWorkloadManifest(name string) (workspace.WorkloadManifest, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "ReadWorkloadManifest", name)
ret0, _ := ret[0].(workspace.WorkloadManifest)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// ReadWorkloadManifest indicates an expected call of ReadWorkloadManifest.
func (mr *MockwsWorkloadReadWriterMockRecorder) ReadWorkloadManifest(name interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ReadWorkloadManifest", reflect.TypeOf((*MockwsWorkloadReadWriter)(nil).ReadWorkloadManifest), name)
}
// WorkloadAddonFileAbsPath mocks base method.
func (m *MockwsWorkloadReadWriter) WorkloadAddonFileAbsPath(wkldName, fName string) string {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "WorkloadAddonFileAbsPath", wkldName, fName)
ret0, _ := ret[0].(string)
return ret0
}
// WorkloadAddonFileAbsPath indicates an expected call of WorkloadAddonFileAbsPath.
func (mr *MockwsWorkloadReadWriterMockRecorder) WorkloadAddonFileAbsPath(wkldName, fName interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "WorkloadAddonFileAbsPath", reflect.TypeOf((*MockwsWorkloadReadWriter)(nil).WorkloadAddonFileAbsPath), wkldName, fName)
}
// WorkloadAddonFilePath mocks base method.
func (m *MockwsWorkloadReadWriter) WorkloadAddonFilePath(wkldName, fName string) string {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "WorkloadAddonFilePath", wkldName, fName)
ret0, _ := ret[0].(string)
return ret0
}
// WorkloadAddonFilePath indicates an expected call of WorkloadAddonFilePath.
func (mr *MockwsWorkloadReadWriterMockRecorder) WorkloadAddonFilePath(wkldName, fName interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "WorkloadAddonFilePath", reflect.TypeOf((*MockwsWorkloadReadWriter)(nil).WorkloadAddonFilePath), wkldName, fName)
}
// WorkloadExists mocks base method.
func (m *MockwsWorkloadReadWriter) WorkloadExists(name string) (bool, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "WorkloadExists", name)
ret0, _ := ret[0].(bool)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// WorkloadExists indicates an expected call of WorkloadExists.
func (mr *MockwsWorkloadReadWriterMockRecorder) WorkloadExists(name interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "WorkloadExists", reflect.TypeOf((*MockwsWorkloadReadWriter)(nil).WorkloadExists), name)
}
// Write mocks base method.
func (m *MockwsWorkloadReadWriter) Write(content encoding.BinaryMarshaler, path string) (string, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "Write", content, path)
ret0, _ := ret[0].(string)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// Write indicates an expected call of Write.
func (mr *MockwsWorkloadReadWriterMockRecorder) Write(content, path interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Write", reflect.TypeOf((*MockwsWorkloadReadWriter)(nil).Write), content, path)
}
// MockwsReadWriter is a mock of wsReadWriter interface.
type MockwsReadWriter struct {
ctrl *gomock.Controller
recorder *MockwsReadWriterMockRecorder
}
// MockwsReadWriterMockRecorder is the mock recorder for MockwsReadWriter.
type MockwsReadWriterMockRecorder struct {
mock *MockwsReadWriter
}
// NewMockwsReadWriter creates a new mock instance.
func NewMockwsReadWriter(ctrl *gomock.Controller) *MockwsReadWriter {
mock := &MockwsReadWriter{ctrl: ctrl}
mock.recorder = &MockwsReadWriterMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockwsReadWriter) EXPECT() *MockwsReadWriterMockRecorder {
return m.recorder
}
// EnvAddonFileAbsPath mocks base method.
func (m *MockwsReadWriter) EnvAddonFileAbsPath(fName string) string {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "EnvAddonFileAbsPath", fName)
ret0, _ := ret[0].(string)
return ret0
}
// EnvAddonFileAbsPath indicates an expected call of EnvAddonFileAbsPath.
func (mr *MockwsReadWriterMockRecorder) EnvAddonFileAbsPath(fName interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "EnvAddonFileAbsPath", reflect.TypeOf((*MockwsReadWriter)(nil).EnvAddonFileAbsPath), fName)
}
// EnvAddonFilePath mocks base method.
func (m *MockwsReadWriter) EnvAddonFilePath(fName string) string {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "EnvAddonFilePath", fName)
ret0, _ := ret[0].(string)
return ret0
}
// EnvAddonFilePath indicates an expected call of EnvAddonFilePath.
func (mr *MockwsReadWriterMockRecorder) EnvAddonFilePath(fName interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "EnvAddonFilePath", reflect.TypeOf((*MockwsReadWriter)(nil).EnvAddonFilePath), fName)
}
// EnvOverridesPath mocks base method.
func (m *MockwsReadWriter) EnvOverridesPath() string {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "EnvOverridesPath")
ret0, _ := ret[0].(string)
return ret0
}
// EnvOverridesPath indicates an expected call of EnvOverridesPath.
func (mr *MockwsReadWriterMockRecorder) EnvOverridesPath() *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "EnvOverridesPath", reflect.TypeOf((*MockwsReadWriter)(nil).EnvOverridesPath))
}
// HasEnvironments mocks base method.
func (m *MockwsReadWriter) HasEnvironments() (bool, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "HasEnvironments")
ret0, _ := ret[0].(bool)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// HasEnvironments indicates an expected call of HasEnvironments.
func (mr *MockwsReadWriterMockRecorder) HasEnvironments() *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "HasEnvironments", reflect.TypeOf((*MockwsReadWriter)(nil).HasEnvironments))
}
// ListEnvironments mocks base method.
func (m *MockwsReadWriter) ListEnvironments() ([]string, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "ListEnvironments")
ret0, _ := ret[0].([]string)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// ListEnvironments indicates an expected call of ListEnvironments.
func (mr *MockwsReadWriterMockRecorder) ListEnvironments() *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ListEnvironments", reflect.TypeOf((*MockwsReadWriter)(nil).ListEnvironments))
}
// ReadEnvironmentManifest mocks base method.
func (m *MockwsReadWriter) ReadEnvironmentManifest(mftDirName string) (workspace.EnvironmentManifest, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "ReadEnvironmentManifest", mftDirName)
ret0, _ := ret[0].(workspace.EnvironmentManifest)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// ReadEnvironmentManifest indicates an expected call of ReadEnvironmentManifest.
func (mr *MockwsReadWriterMockRecorder) ReadEnvironmentManifest(mftDirName interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ReadEnvironmentManifest", reflect.TypeOf((*MockwsReadWriter)(nil).ReadEnvironmentManifest), mftDirName)
}
// ReadFile mocks base method.
func (m *MockwsReadWriter) ReadFile(path string) ([]byte, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "ReadFile", path)
ret0, _ := ret[0].([]byte)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// ReadFile indicates an expected call of ReadFile.
func (mr *MockwsReadWriterMockRecorder) ReadFile(path interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ReadFile", reflect.TypeOf((*MockwsReadWriter)(nil).ReadFile), path)
}
// ReadWorkloadManifest mocks base method.
func (m *MockwsReadWriter) ReadWorkloadManifest(name string) (workspace.WorkloadManifest, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "ReadWorkloadManifest", name)
ret0, _ := ret[0].(workspace.WorkloadManifest)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// ReadWorkloadManifest indicates an expected call of ReadWorkloadManifest.
func (mr *MockwsReadWriterMockRecorder) ReadWorkloadManifest(name interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ReadWorkloadManifest", reflect.TypeOf((*MockwsReadWriter)(nil).ReadWorkloadManifest), name)
}
// WorkloadAddonFileAbsPath mocks base method.
func (m *MockwsReadWriter) WorkloadAddonFileAbsPath(wkldName, fName string) string {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "WorkloadAddonFileAbsPath", wkldName, fName)
ret0, _ := ret[0].(string)
return ret0
}
// WorkloadAddonFileAbsPath indicates an expected call of WorkloadAddonFileAbsPath.
func (mr *MockwsReadWriterMockRecorder) WorkloadAddonFileAbsPath(wkldName, fName interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "WorkloadAddonFileAbsPath", reflect.TypeOf((*MockwsReadWriter)(nil).WorkloadAddonFileAbsPath), wkldName, fName)
}
// WorkloadAddonFilePath mocks base method.
func (m *MockwsReadWriter) WorkloadAddonFilePath(wkldName, fName string) string {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "WorkloadAddonFilePath", wkldName, fName)
ret0, _ := ret[0].(string)
return ret0
}
// WorkloadAddonFilePath indicates an expected call of WorkloadAddonFilePath.
func (mr *MockwsReadWriterMockRecorder) WorkloadAddonFilePath(wkldName, fName interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "WorkloadAddonFilePath", reflect.TypeOf((*MockwsReadWriter)(nil).WorkloadAddonFilePath), wkldName, fName)
}
// WorkloadExists mocks base method.
func (m *MockwsReadWriter) WorkloadExists(name string) (bool, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "WorkloadExists", name)
ret0, _ := ret[0].(bool)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// WorkloadExists indicates an expected call of WorkloadExists.
func (mr *MockwsReadWriterMockRecorder) WorkloadExists(name interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "WorkloadExists", reflect.TypeOf((*MockwsReadWriter)(nil).WorkloadExists), name)
}
// Write mocks base method.
func (m *MockwsReadWriter) Write(content encoding.BinaryMarshaler, path string) (string, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "Write", content, path)
ret0, _ := ret[0].(string)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// Write indicates an expected call of Write.
func (mr *MockwsReadWriterMockRecorder) Write(content, path interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Write", reflect.TypeOf((*MockwsReadWriter)(nil).Write), content, path)
}
// MockwsJobDirReader is a mock of wsJobDirReader interface.
type MockwsJobDirReader struct {
ctrl *gomock.Controller
recorder *MockwsJobDirReaderMockRecorder
}
// MockwsJobDirReaderMockRecorder is the mock recorder for MockwsJobDirReader.
type MockwsJobDirReaderMockRecorder struct {
mock *MockwsJobDirReader
}
// NewMockwsJobDirReader creates a new mock instance.
func NewMockwsJobDirReader(ctrl *gomock.Controller) *MockwsJobDirReader {
mock := &MockwsJobDirReader{ctrl: ctrl}
mock.recorder = &MockwsJobDirReaderMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockwsJobDirReader) EXPECT() *MockwsJobDirReaderMockRecorder {
return m.recorder
}
// ListJobs mocks base method.
func (m *MockwsJobDirReader) ListJobs() ([]string, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "ListJobs")
ret0, _ := ret[0].([]string)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// ListJobs indicates an expected call of ListJobs.
func (mr *MockwsJobDirReaderMockRecorder) ListJobs() *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ListJobs", reflect.TypeOf((*MockwsJobDirReader)(nil).ListJobs))
}
// Path mocks base method.
func (m *MockwsJobDirReader) Path() string {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "Path")
ret0, _ := ret[0].(string)
return ret0
}
// Path indicates an expected call of Path.
func (mr *MockwsJobDirReaderMockRecorder) Path() *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Path", reflect.TypeOf((*MockwsJobDirReader)(nil).Path))
}
// ReadWorkloadManifest mocks base method.
func (m *MockwsJobDirReader) ReadWorkloadManifest(name string) (workspace.WorkloadManifest, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "ReadWorkloadManifest", name)
ret0, _ := ret[0].(workspace.WorkloadManifest)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// ReadWorkloadManifest indicates an expected call of ReadWorkloadManifest.
func (mr *MockwsJobDirReaderMockRecorder) ReadWorkloadManifest(name interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ReadWorkloadManifest", reflect.TypeOf((*MockwsJobDirReader)(nil).ReadWorkloadManifest), name)
}
// MockwsWlDirReader is a mock of wsWlDirReader interface.
type MockwsWlDirReader struct {
ctrl *gomock.Controller
recorder *MockwsWlDirReaderMockRecorder
}
// MockwsWlDirReaderMockRecorder is the mock recorder for MockwsWlDirReader.
type MockwsWlDirReaderMockRecorder struct {
mock *MockwsWlDirReader
}
// NewMockwsWlDirReader creates a new mock instance.
func NewMockwsWlDirReader(ctrl *gomock.Controller) *MockwsWlDirReader {
mock := &MockwsWlDirReader{ctrl: ctrl}
mock.recorder = &MockwsWlDirReaderMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockwsWlDirReader) EXPECT() *MockwsWlDirReaderMockRecorder {
return m.recorder
}
// ListEnvironments mocks base method.
func (m *MockwsWlDirReader) ListEnvironments() ([]string, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "ListEnvironments")
ret0, _ := ret[0].([]string)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// ListEnvironments indicates an expected call of ListEnvironments.
func (mr *MockwsWlDirReaderMockRecorder) ListEnvironments() *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ListEnvironments", reflect.TypeOf((*MockwsWlDirReader)(nil).ListEnvironments))
}
// ListJobs mocks base method.
func (m *MockwsWlDirReader) ListJobs() ([]string, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "ListJobs")
ret0, _ := ret[0].([]string)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// ListJobs indicates an expected call of ListJobs.
func (mr *MockwsWlDirReaderMockRecorder) ListJobs() *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ListJobs", reflect.TypeOf((*MockwsWlDirReader)(nil).ListJobs))
}
// ListServices mocks base method.
func (m *MockwsWlDirReader) ListServices() ([]string, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "ListServices")
ret0, _ := ret[0].([]string)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// ListServices indicates an expected call of ListServices.
func (mr *MockwsWlDirReaderMockRecorder) ListServices() *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ListServices", reflect.TypeOf((*MockwsWlDirReader)(nil).ListServices))
}
// ListWorkloads mocks base method.
func (m *MockwsWlDirReader) ListWorkloads() ([]string, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "ListWorkloads")
ret0, _ := ret[0].([]string)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// ListWorkloads indicates an expected call of ListWorkloads.
func (mr *MockwsWlDirReaderMockRecorder) ListWorkloads() *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ListWorkloads", reflect.TypeOf((*MockwsWlDirReader)(nil).ListWorkloads))
}
// Path mocks base method.
func (m *MockwsWlDirReader) Path() string {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "Path")
ret0, _ := ret[0].(string)
return ret0
}
// Path indicates an expected call of Path.
func (mr *MockwsWlDirReaderMockRecorder) Path() *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Path", reflect.TypeOf((*MockwsWlDirReader)(nil).Path))
}
// ReadWorkloadManifest mocks base method.
func (m *MockwsWlDirReader) ReadWorkloadManifest(name string) (workspace.WorkloadManifest, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "ReadWorkloadManifest", name)
ret0, _ := ret[0].(workspace.WorkloadManifest)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// ReadWorkloadManifest indicates an expected call of ReadWorkloadManifest.
func (mr *MockwsWlDirReaderMockRecorder) ReadWorkloadManifest(name interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ReadWorkloadManifest", reflect.TypeOf((*MockwsWlDirReader)(nil).ReadWorkloadManifest), name)
}
// Summary mocks base method.
func (m *MockwsWlDirReader) Summary() (*workspace.Summary, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "Summary")
ret0, _ := ret[0].(*workspace.Summary)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// Summary indicates an expected call of Summary.
func (mr *MockwsWlDirReaderMockRecorder) Summary() *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Summary", reflect.TypeOf((*MockwsWlDirReader)(nil).Summary))
}
// WorkloadOverridesPath mocks base method.
func (m *MockwsWlDirReader) WorkloadOverridesPath(arg0 string) string {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "WorkloadOverridesPath", arg0)
ret0, _ := ret[0].(string)
return ret0
}
// WorkloadOverridesPath indicates an expected call of WorkloadOverridesPath.
func (mr *MockwsWlDirReaderMockRecorder) WorkloadOverridesPath(arg0 interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "WorkloadOverridesPath", reflect.TypeOf((*MockwsWlDirReader)(nil).WorkloadOverridesPath), arg0)
}
// MockwsEnvironmentReader is a mock of wsEnvironmentReader interface.
type MockwsEnvironmentReader struct {
ctrl *gomock.Controller
recorder *MockwsEnvironmentReaderMockRecorder
}
// MockwsEnvironmentReaderMockRecorder is the mock recorder for MockwsEnvironmentReader.
type MockwsEnvironmentReaderMockRecorder struct {
mock *MockwsEnvironmentReader
}
// NewMockwsEnvironmentReader creates a new mock instance.
func NewMockwsEnvironmentReader(ctrl *gomock.Controller) *MockwsEnvironmentReader {
mock := &MockwsEnvironmentReader{ctrl: ctrl}
mock.recorder = &MockwsEnvironmentReaderMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockwsEnvironmentReader) EXPECT() *MockwsEnvironmentReaderMockRecorder {
return m.recorder
}
// EnvAddonFileAbsPath mocks base method.
func (m *MockwsEnvironmentReader) EnvAddonFileAbsPath(fName string) string {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "EnvAddonFileAbsPath", fName)
ret0, _ := ret[0].(string)
return ret0
}
// EnvAddonFileAbsPath indicates an expected call of EnvAddonFileAbsPath.
func (mr *MockwsEnvironmentReaderMockRecorder) EnvAddonFileAbsPath(fName interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "EnvAddonFileAbsPath", reflect.TypeOf((*MockwsEnvironmentReader)(nil).EnvAddonFileAbsPath), fName)
}
// EnvAddonFilePath mocks base method.
func (m *MockwsEnvironmentReader) EnvAddonFilePath(fName string) string {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "EnvAddonFilePath", fName)
ret0, _ := ret[0].(string)
return ret0
}
// EnvAddonFilePath indicates an expected call of EnvAddonFilePath.
func (mr *MockwsEnvironmentReaderMockRecorder) EnvAddonFilePath(fName interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "EnvAddonFilePath", reflect.TypeOf((*MockwsEnvironmentReader)(nil).EnvAddonFilePath), fName)
}
// EnvOverridesPath mocks base method.
func (m *MockwsEnvironmentReader) EnvOverridesPath() string {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "EnvOverridesPath")
ret0, _ := ret[0].(string)
return ret0
}
// EnvOverridesPath indicates an expected call of EnvOverridesPath.
func (mr *MockwsEnvironmentReaderMockRecorder) EnvOverridesPath() *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "EnvOverridesPath", reflect.TypeOf((*MockwsEnvironmentReader)(nil).EnvOverridesPath))
}
// HasEnvironments mocks base method.
func (m *MockwsEnvironmentReader) HasEnvironments() (bool, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "HasEnvironments")
ret0, _ := ret[0].(bool)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// HasEnvironments indicates an expected call of HasEnvironments.
func (mr *MockwsEnvironmentReaderMockRecorder) HasEnvironments() *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "HasEnvironments", reflect.TypeOf((*MockwsEnvironmentReader)(nil).HasEnvironments))
}
// ListEnvironments mocks base method.
func (m *MockwsEnvironmentReader) ListEnvironments() ([]string, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "ListEnvironments")
ret0, _ := ret[0].([]string)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// ListEnvironments indicates an expected call of ListEnvironments.
func (mr *MockwsEnvironmentReaderMockRecorder) ListEnvironments() *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ListEnvironments", reflect.TypeOf((*MockwsEnvironmentReader)(nil).ListEnvironments))
}
// ReadEnvironmentManifest mocks base method.
func (m *MockwsEnvironmentReader) ReadEnvironmentManifest(mftDirName string) (workspace.EnvironmentManifest, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "ReadEnvironmentManifest", mftDirName)
ret0, _ := ret[0].(workspace.EnvironmentManifest)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// ReadEnvironmentManifest indicates an expected call of ReadEnvironmentManifest.
func (mr *MockwsEnvironmentReaderMockRecorder) ReadEnvironmentManifest(mftDirName interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ReadEnvironmentManifest", reflect.TypeOf((*MockwsEnvironmentReader)(nil).ReadEnvironmentManifest), mftDirName)
}
// MockwsPipelineReader is a mock of wsPipelineReader interface.
type MockwsPipelineReader struct {
ctrl *gomock.Controller
recorder *MockwsPipelineReaderMockRecorder
}
// MockwsPipelineReaderMockRecorder is the mock recorder for MockwsPipelineReader.
type MockwsPipelineReaderMockRecorder struct {
mock *MockwsPipelineReader
}
// NewMockwsPipelineReader creates a new mock instance.
func NewMockwsPipelineReader(ctrl *gomock.Controller) *MockwsPipelineReader {
mock := &MockwsPipelineReader{ctrl: ctrl}
mock.recorder = &MockwsPipelineReaderMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockwsPipelineReader) EXPECT() *MockwsPipelineReaderMockRecorder {
return m.recorder
}
// ListPipelines mocks base method.
func (m *MockwsPipelineReader) ListPipelines() ([]workspace.PipelineManifest, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "ListPipelines")
ret0, _ := ret[0].([]workspace.PipelineManifest)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// ListPipelines indicates an expected call of ListPipelines.
func (mr *MockwsPipelineReaderMockRecorder) ListPipelines() *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ListPipelines", reflect.TypeOf((*MockwsPipelineReader)(nil).ListPipelines))
}
// ListWorkloads mocks base method.
func (m *MockwsPipelineReader) ListWorkloads() ([]string, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "ListWorkloads")
ret0, _ := ret[0].([]string)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// ListWorkloads indicates an expected call of ListWorkloads.
func (mr *MockwsPipelineReaderMockRecorder) ListWorkloads() *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ListWorkloads", reflect.TypeOf((*MockwsPipelineReader)(nil).ListWorkloads))
}
// ReadPipelineManifest mocks base method.
func (m *MockwsPipelineReader) ReadPipelineManifest(path string) (*manifest.Pipeline, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "ReadPipelineManifest", path)
ret0, _ := ret[0].(*manifest.Pipeline)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// ReadPipelineManifest indicates an expected call of ReadPipelineManifest.
func (mr *MockwsPipelineReaderMockRecorder) ReadPipelineManifest(path interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ReadPipelineManifest", reflect.TypeOf((*MockwsPipelineReader)(nil).ReadPipelineManifest), path)
}
// Rel mocks base method.
func (m *MockwsPipelineReader) Rel(path string) (string, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "Rel", path)
ret0, _ := ret[0].(string)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// Rel indicates an expected call of Rel.
func (mr *MockwsPipelineReaderMockRecorder) Rel(path interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Rel", reflect.TypeOf((*MockwsPipelineReader)(nil).Rel), path)
}
// MockwsPipelineGetter is a mock of wsPipelineGetter interface.
type MockwsPipelineGetter struct {
ctrl *gomock.Controller
recorder *MockwsPipelineGetterMockRecorder
}
// MockwsPipelineGetterMockRecorder is the mock recorder for MockwsPipelineGetter.
type MockwsPipelineGetterMockRecorder struct {
mock *MockwsPipelineGetter
}
// NewMockwsPipelineGetter creates a new mock instance.
func NewMockwsPipelineGetter(ctrl *gomock.Controller) *MockwsPipelineGetter {
mock := &MockwsPipelineGetter{ctrl: ctrl}
mock.recorder = &MockwsPipelineGetterMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockwsPipelineGetter) EXPECT() *MockwsPipelineGetterMockRecorder {
return m.recorder
}
// ListPipelines mocks base method.
func (m *MockwsPipelineGetter) ListPipelines() ([]workspace.PipelineManifest, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "ListPipelines")
ret0, _ := ret[0].([]workspace.PipelineManifest)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// ListPipelines indicates an expected call of ListPipelines.
func (mr *MockwsPipelineGetterMockRecorder) ListPipelines() *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ListPipelines", reflect.TypeOf((*MockwsPipelineGetter)(nil).ListPipelines))
}
// ListWorkloads mocks base method.
func (m *MockwsPipelineGetter) ListWorkloads() ([]string, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "ListWorkloads")
ret0, _ := ret[0].([]string)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// ListWorkloads indicates an expected call of ListWorkloads.
func (mr *MockwsPipelineGetterMockRecorder) ListWorkloads() *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ListWorkloads", reflect.TypeOf((*MockwsPipelineGetter)(nil).ListWorkloads))
}
// ReadPipelineManifest mocks base method.
func (m *MockwsPipelineGetter) ReadPipelineManifest(path string) (*manifest.Pipeline, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "ReadPipelineManifest", path)
ret0, _ := ret[0].(*manifest.Pipeline)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// ReadPipelineManifest indicates an expected call of ReadPipelineManifest.
func (mr *MockwsPipelineGetterMockRecorder) ReadPipelineManifest(path interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ReadPipelineManifest", reflect.TypeOf((*MockwsPipelineGetter)(nil).ReadPipelineManifest), path)
}
// MockwsAppManager is a mock of wsAppManager interface.
type MockwsAppManager struct {
ctrl *gomock.Controller
recorder *MockwsAppManagerMockRecorder
}
// MockwsAppManagerMockRecorder is the mock recorder for MockwsAppManager.
type MockwsAppManagerMockRecorder struct {
mock *MockwsAppManager
}
// NewMockwsAppManager creates a new mock instance.
func NewMockwsAppManager(ctrl *gomock.Controller) *MockwsAppManager {
mock := &MockwsAppManager{ctrl: ctrl}
mock.recorder = &MockwsAppManagerMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockwsAppManager) EXPECT() *MockwsAppManagerMockRecorder {
return m.recorder
}
// Summary mocks base method.
func (m *MockwsAppManager) Summary() (*workspace.Summary, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "Summary")
ret0, _ := ret[0].(*workspace.Summary)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// Summary indicates an expected call of Summary.
func (mr *MockwsAppManagerMockRecorder) Summary() *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Summary", reflect.TypeOf((*MockwsAppManager)(nil).Summary))
}
// MockwsAppManagerDeleter is a mock of wsAppManagerDeleter interface.
type MockwsAppManagerDeleter struct {
ctrl *gomock.Controller
recorder *MockwsAppManagerDeleterMockRecorder
}
// MockwsAppManagerDeleterMockRecorder is the mock recorder for MockwsAppManagerDeleter.
type MockwsAppManagerDeleterMockRecorder struct {
mock *MockwsAppManagerDeleter
}
// NewMockwsAppManagerDeleter creates a new mock instance.
func NewMockwsAppManagerDeleter(ctrl *gomock.Controller) *MockwsAppManagerDeleter {
mock := &MockwsAppManagerDeleter{ctrl: ctrl}
mock.recorder = &MockwsAppManagerDeleterMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockwsAppManagerDeleter) EXPECT() *MockwsAppManagerDeleterMockRecorder {
return m.recorder
}
// DeleteWorkspaceFile mocks base method.
func (m *MockwsAppManagerDeleter) DeleteWorkspaceFile() error {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "DeleteWorkspaceFile")
ret0, _ := ret[0].(error)
return ret0
}
// DeleteWorkspaceFile indicates an expected call of DeleteWorkspaceFile.
func (mr *MockwsAppManagerDeleterMockRecorder) DeleteWorkspaceFile() *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DeleteWorkspaceFile", reflect.TypeOf((*MockwsAppManagerDeleter)(nil).DeleteWorkspaceFile))
}
// Summary mocks base method.
func (m *MockwsAppManagerDeleter) Summary() (*workspace.Summary, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "Summary")
ret0, _ := ret[0].(*workspace.Summary)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// Summary indicates an expected call of Summary.
func (mr *MockwsAppManagerDeleterMockRecorder) Summary() *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Summary", reflect.TypeOf((*MockwsAppManagerDeleter)(nil).Summary))
}
// MockwsWriter is a mock of wsWriter interface.
type MockwsWriter struct {
ctrl *gomock.Controller
recorder *MockwsWriterMockRecorder
}
// MockwsWriterMockRecorder is the mock recorder for MockwsWriter.
type MockwsWriterMockRecorder struct {
mock *MockwsWriter
}
// NewMockwsWriter creates a new mock instance.
func NewMockwsWriter(ctrl *gomock.Controller) *MockwsWriter {
mock := &MockwsWriter{ctrl: ctrl}
mock.recorder = &MockwsWriterMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockwsWriter) EXPECT() *MockwsWriterMockRecorder {
return m.recorder
}
// Write mocks base method.
func (m *MockwsWriter) Write(content encoding.BinaryMarshaler, path string) (string, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "Write", content, path)
ret0, _ := ret[0].(string)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// Write indicates an expected call of Write.
func (mr *MockwsWriterMockRecorder) Write(content, path interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Write", reflect.TypeOf((*MockwsWriter)(nil).Write), content, path)
}
// Mockuploader is a mock of uploader interface.
type Mockuploader struct {
ctrl *gomock.Controller
recorder *MockuploaderMockRecorder
}
// MockuploaderMockRecorder is the mock recorder for Mockuploader.
type MockuploaderMockRecorder struct {
mock *Mockuploader
}
// NewMockuploader creates a new mock instance.
func NewMockuploader(ctrl *gomock.Controller) *Mockuploader {
mock := &Mockuploader{ctrl: ctrl}
mock.recorder = &MockuploaderMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *Mockuploader) EXPECT() *MockuploaderMockRecorder {
return m.recorder
}
// Upload mocks base method.
func (m *Mockuploader) Upload(bucket, key string, data io.Reader) (string, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "Upload", bucket, key, data)
ret0, _ := ret[0].(string)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// Upload indicates an expected call of Upload.
func (mr *MockuploaderMockRecorder) Upload(bucket, key, data interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Upload", reflect.TypeOf((*Mockuploader)(nil).Upload), bucket, key, data)
}
// MockbucketEmptier is a mock of bucketEmptier interface.
type MockbucketEmptier struct {
ctrl *gomock.Controller
recorder *MockbucketEmptierMockRecorder
}
// MockbucketEmptierMockRecorder is the mock recorder for MockbucketEmptier.
type MockbucketEmptierMockRecorder struct {
mock *MockbucketEmptier
}
// NewMockbucketEmptier creates a new mock instance.
func NewMockbucketEmptier(ctrl *gomock.Controller) *MockbucketEmptier {
mock := &MockbucketEmptier{ctrl: ctrl}
mock.recorder = &MockbucketEmptierMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockbucketEmptier) EXPECT() *MockbucketEmptierMockRecorder {
return m.recorder
}
// EmptyBucket mocks base method.
func (m *MockbucketEmptier) EmptyBucket(bucket string) error {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "EmptyBucket", bucket)
ret0, _ := ret[0].(error)
return ret0
}
// EmptyBucket indicates an expected call of EmptyBucket.
func (mr *MockbucketEmptierMockRecorder) EmptyBucket(bucket interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "EmptyBucket", reflect.TypeOf((*MockbucketEmptier)(nil).EmptyBucket), bucket)
}
// MockenvironmentDeployer is a mock of environmentDeployer interface.
type MockenvironmentDeployer struct {
ctrl *gomock.Controller
recorder *MockenvironmentDeployerMockRecorder
}
// MockenvironmentDeployerMockRecorder is the mock recorder for MockenvironmentDeployer.
type MockenvironmentDeployerMockRecorder struct {
mock *MockenvironmentDeployer
}
// NewMockenvironmentDeployer creates a new mock instance.
func NewMockenvironmentDeployer(ctrl *gomock.Controller) *MockenvironmentDeployer {
mock := &MockenvironmentDeployer{ctrl: ctrl}
mock.recorder = &MockenvironmentDeployerMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockenvironmentDeployer) EXPECT() *MockenvironmentDeployerMockRecorder {
return m.recorder
}
// CreateAndRenderEnvironment mocks base method.
func (m *MockenvironmentDeployer) CreateAndRenderEnvironment(conf cloudformation0.StackConfiguration, bucketARN string) error {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "CreateAndRenderEnvironment", conf, bucketARN)
ret0, _ := ret[0].(error)
return ret0
}
// CreateAndRenderEnvironment indicates an expected call of CreateAndRenderEnvironment.
func (mr *MockenvironmentDeployerMockRecorder) CreateAndRenderEnvironment(conf, bucketARN interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "CreateAndRenderEnvironment", reflect.TypeOf((*MockenvironmentDeployer)(nil).CreateAndRenderEnvironment), conf, bucketARN)
}
// DeleteEnvironment mocks base method.
func (m *MockenvironmentDeployer) DeleteEnvironment(appName, envName, cfnExecRoleARN string) error {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "DeleteEnvironment", appName, envName, cfnExecRoleARN)
ret0, _ := ret[0].(error)
return ret0
}
// DeleteEnvironment indicates an expected call of DeleteEnvironment.
func (mr *MockenvironmentDeployerMockRecorder) DeleteEnvironment(appName, envName, cfnExecRoleARN interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DeleteEnvironment", reflect.TypeOf((*MockenvironmentDeployer)(nil).DeleteEnvironment), appName, envName, cfnExecRoleARN)
}
// GetEnvironment mocks base method.
func (m *MockenvironmentDeployer) GetEnvironment(appName, envName string) (*config.Environment, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "GetEnvironment", appName, envName)
ret0, _ := ret[0].(*config.Environment)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// GetEnvironment indicates an expected call of GetEnvironment.
func (mr *MockenvironmentDeployerMockRecorder) GetEnvironment(appName, envName interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetEnvironment", reflect.TypeOf((*MockenvironmentDeployer)(nil).GetEnvironment), appName, envName)
}
// Template mocks base method.
func (m *MockenvironmentDeployer) Template(stackName string) (string, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "Template", stackName)
ret0, _ := ret[0].(string)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// Template indicates an expected call of Template.
func (mr *MockenvironmentDeployerMockRecorder) Template(stackName interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Template", reflect.TypeOf((*MockenvironmentDeployer)(nil).Template), stackName)
}
// UpdateEnvironmentTemplate mocks base method.
func (m *MockenvironmentDeployer) UpdateEnvironmentTemplate(appName, envName, templateBody, cfnExecRoleARN string) error {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "UpdateEnvironmentTemplate", appName, envName, templateBody, cfnExecRoleARN)
ret0, _ := ret[0].(error)
return ret0
}
// UpdateEnvironmentTemplate indicates an expected call of UpdateEnvironmentTemplate.
func (mr *MockenvironmentDeployerMockRecorder) UpdateEnvironmentTemplate(appName, envName, templateBody, cfnExecRoleARN interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "UpdateEnvironmentTemplate", reflect.TypeOf((*MockenvironmentDeployer)(nil).UpdateEnvironmentTemplate), appName, envName, templateBody, cfnExecRoleARN)
}
// MockwlDeleter is a mock of wlDeleter interface.
type MockwlDeleter struct {
ctrl *gomock.Controller
recorder *MockwlDeleterMockRecorder
}
// MockwlDeleterMockRecorder is the mock recorder for MockwlDeleter.
type MockwlDeleterMockRecorder struct {
mock *MockwlDeleter
}
// NewMockwlDeleter creates a new mock instance.
func NewMockwlDeleter(ctrl *gomock.Controller) *MockwlDeleter {
mock := &MockwlDeleter{ctrl: ctrl}
mock.recorder = &MockwlDeleterMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockwlDeleter) EXPECT() *MockwlDeleterMockRecorder {
return m.recorder
}
// DeleteWorkload mocks base method.
func (m *MockwlDeleter) DeleteWorkload(in deploy0.DeleteWorkloadInput) error {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "DeleteWorkload", in)
ret0, _ := ret[0].(error)
return ret0
}
// DeleteWorkload indicates an expected call of DeleteWorkload.
func (mr *MockwlDeleterMockRecorder) DeleteWorkload(in interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DeleteWorkload", reflect.TypeOf((*MockwlDeleter)(nil).DeleteWorkload), in)
}
// MocksvcRemoverFromApp is a mock of svcRemoverFromApp interface.
type MocksvcRemoverFromApp struct {
ctrl *gomock.Controller
recorder *MocksvcRemoverFromAppMockRecorder
}
// MocksvcRemoverFromAppMockRecorder is the mock recorder for MocksvcRemoverFromApp.
type MocksvcRemoverFromAppMockRecorder struct {
mock *MocksvcRemoverFromApp
}
// NewMocksvcRemoverFromApp creates a new mock instance.
func NewMocksvcRemoverFromApp(ctrl *gomock.Controller) *MocksvcRemoverFromApp {
mock := &MocksvcRemoverFromApp{ctrl: ctrl}
mock.recorder = &MocksvcRemoverFromAppMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MocksvcRemoverFromApp) EXPECT() *MocksvcRemoverFromAppMockRecorder {
return m.recorder
}
// RemoveServiceFromApp mocks base method.
func (m *MocksvcRemoverFromApp) RemoveServiceFromApp(app *config.Application, svcName string) error {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "RemoveServiceFromApp", app, svcName)
ret0, _ := ret[0].(error)
return ret0
}
// RemoveServiceFromApp indicates an expected call of RemoveServiceFromApp.
func (mr *MocksvcRemoverFromAppMockRecorder) RemoveServiceFromApp(app, svcName interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "RemoveServiceFromApp", reflect.TypeOf((*MocksvcRemoverFromApp)(nil).RemoveServiceFromApp), app, svcName)
}
// MockjobRemoverFromApp is a mock of jobRemoverFromApp interface.
type MockjobRemoverFromApp struct {
ctrl *gomock.Controller
recorder *MockjobRemoverFromAppMockRecorder
}
// MockjobRemoverFromAppMockRecorder is the mock recorder for MockjobRemoverFromApp.
type MockjobRemoverFromAppMockRecorder struct {
mock *MockjobRemoverFromApp
}
// NewMockjobRemoverFromApp creates a new mock instance.
func NewMockjobRemoverFromApp(ctrl *gomock.Controller) *MockjobRemoverFromApp {
mock := &MockjobRemoverFromApp{ctrl: ctrl}
mock.recorder = &MockjobRemoverFromAppMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockjobRemoverFromApp) EXPECT() *MockjobRemoverFromAppMockRecorder {
return m.recorder
}
// RemoveJobFromApp mocks base method.
func (m *MockjobRemoverFromApp) RemoveJobFromApp(app *config.Application, jobName string) error {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "RemoveJobFromApp", app, jobName)
ret0, _ := ret[0].(error)
return ret0
}
// RemoveJobFromApp indicates an expected call of RemoveJobFromApp.
func (mr *MockjobRemoverFromAppMockRecorder) RemoveJobFromApp(app, jobName interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "RemoveJobFromApp", reflect.TypeOf((*MockjobRemoverFromApp)(nil).RemoveJobFromApp), app, jobName)
}
// MockimageRemover is a mock of imageRemover interface.
type MockimageRemover struct {
ctrl *gomock.Controller
recorder *MockimageRemoverMockRecorder
}
// MockimageRemoverMockRecorder is the mock recorder for MockimageRemover.
type MockimageRemoverMockRecorder struct {
mock *MockimageRemover
}
// NewMockimageRemover creates a new mock instance.
func NewMockimageRemover(ctrl *gomock.Controller) *MockimageRemover {
mock := &MockimageRemover{ctrl: ctrl}
mock.recorder = &MockimageRemoverMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockimageRemover) EXPECT() *MockimageRemoverMockRecorder {
return m.recorder
}
// ClearRepository mocks base method.
func (m *MockimageRemover) ClearRepository(repoName string) error {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "ClearRepository", repoName)
ret0, _ := ret[0].(error)
return ret0
}
// ClearRepository indicates an expected call of ClearRepository.
func (mr *MockimageRemoverMockRecorder) ClearRepository(repoName interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ClearRepository", reflect.TypeOf((*MockimageRemover)(nil).ClearRepository), repoName)
}
// MockpipelineDeployer is a mock of pipelineDeployer interface.
type MockpipelineDeployer struct {
ctrl *gomock.Controller
recorder *MockpipelineDeployerMockRecorder
}
// MockpipelineDeployerMockRecorder is the mock recorder for MockpipelineDeployer.
type MockpipelineDeployerMockRecorder struct {
mock *MockpipelineDeployer
}
// NewMockpipelineDeployer creates a new mock instance.
func NewMockpipelineDeployer(ctrl *gomock.Controller) *MockpipelineDeployer {
mock := &MockpipelineDeployer{ctrl: ctrl}
mock.recorder = &MockpipelineDeployerMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockpipelineDeployer) EXPECT() *MockpipelineDeployerMockRecorder {
return m.recorder
}
// AddPipelineResourcesToApp mocks base method.
func (m *MockpipelineDeployer) AddPipelineResourcesToApp(app *config.Application, region string) error {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "AddPipelineResourcesToApp", app, region)
ret0, _ := ret[0].(error)
return ret0
}
// AddPipelineResourcesToApp indicates an expected call of AddPipelineResourcesToApp.
func (mr *MockpipelineDeployerMockRecorder) AddPipelineResourcesToApp(app, region interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "AddPipelineResourcesToApp", reflect.TypeOf((*MockpipelineDeployer)(nil).AddPipelineResourcesToApp), app, region)
}
// CreatePipeline mocks base method.
func (m *MockpipelineDeployer) CreatePipeline(env *deploy0.CreatePipelineInput, bucketName string) error {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "CreatePipeline", env, bucketName)
ret0, _ := ret[0].(error)
return ret0
}
// CreatePipeline indicates an expected call of CreatePipeline.
func (mr *MockpipelineDeployerMockRecorder) CreatePipeline(env, bucketName interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "CreatePipeline", reflect.TypeOf((*MockpipelineDeployer)(nil).CreatePipeline), env, bucketName)
}
// DeletePipeline mocks base method.
func (m *MockpipelineDeployer) DeletePipeline(pipeline deploy0.Pipeline) error {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "DeletePipeline", pipeline)
ret0, _ := ret[0].(error)
return ret0
}
// DeletePipeline indicates an expected call of DeletePipeline.
func (mr *MockpipelineDeployerMockRecorder) DeletePipeline(pipeline interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DeletePipeline", reflect.TypeOf((*MockpipelineDeployer)(nil).DeletePipeline), pipeline)
}
// GetAppResourcesByRegion mocks base method.
func (m *MockpipelineDeployer) GetAppResourcesByRegion(app *config.Application, region string) (*stack.AppRegionalResources, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "GetAppResourcesByRegion", app, region)
ret0, _ := ret[0].(*stack.AppRegionalResources)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// GetAppResourcesByRegion indicates an expected call of GetAppResourcesByRegion.
func (mr *MockpipelineDeployerMockRecorder) GetAppResourcesByRegion(app, region interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetAppResourcesByRegion", reflect.TypeOf((*MockpipelineDeployer)(nil).GetAppResourcesByRegion), app, region)
}
// GetRegionalAppResources mocks base method.
func (m *MockpipelineDeployer) GetRegionalAppResources(app *config.Application) ([]*stack.AppRegionalResources, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "GetRegionalAppResources", app)
ret0, _ := ret[0].([]*stack.AppRegionalResources)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// GetRegionalAppResources indicates an expected call of GetRegionalAppResources.
func (mr *MockpipelineDeployerMockRecorder) GetRegionalAppResources(app interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetRegionalAppResources", reflect.TypeOf((*MockpipelineDeployer)(nil).GetRegionalAppResources), app)
}
// PipelineExists mocks base method.
func (m *MockpipelineDeployer) PipelineExists(env *deploy0.CreatePipelineInput) (bool, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "PipelineExists", env)
ret0, _ := ret[0].(bool)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// PipelineExists indicates an expected call of PipelineExists.
func (mr *MockpipelineDeployerMockRecorder) PipelineExists(env interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "PipelineExists", reflect.TypeOf((*MockpipelineDeployer)(nil).PipelineExists), env)
}
// Template mocks base method.
func (m *MockpipelineDeployer) Template(stackName string) (string, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "Template", stackName)
ret0, _ := ret[0].(string)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// Template indicates an expected call of Template.
func (mr *MockpipelineDeployerMockRecorder) Template(stackName interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Template", reflect.TypeOf((*MockpipelineDeployer)(nil).Template), stackName)
}
// UpdatePipeline mocks base method.
func (m *MockpipelineDeployer) UpdatePipeline(env *deploy0.CreatePipelineInput, bucketName string) error {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "UpdatePipeline", env, bucketName)
ret0, _ := ret[0].(error)
return ret0
}
// UpdatePipeline indicates an expected call of UpdatePipeline.
func (mr *MockpipelineDeployerMockRecorder) UpdatePipeline(env, bucketName interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "UpdatePipeline", reflect.TypeOf((*MockpipelineDeployer)(nil).UpdatePipeline), env, bucketName)
}
// MockappDeployer is a mock of appDeployer interface.
type MockappDeployer struct {
ctrl *gomock.Controller
recorder *MockappDeployerMockRecorder
}
// MockappDeployerMockRecorder is the mock recorder for MockappDeployer.
type MockappDeployerMockRecorder struct {
mock *MockappDeployer
}
// NewMockappDeployer creates a new mock instance.
func NewMockappDeployer(ctrl *gomock.Controller) *MockappDeployer {
mock := &MockappDeployer{ctrl: ctrl}
mock.recorder = &MockappDeployerMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockappDeployer) EXPECT() *MockappDeployerMockRecorder {
return m.recorder
}
// AddEnvToApp mocks base method.
func (m *MockappDeployer) AddEnvToApp(opts *cloudformation0.AddEnvToAppOpts) error {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "AddEnvToApp", opts)
ret0, _ := ret[0].(error)
return ret0
}
// AddEnvToApp indicates an expected call of AddEnvToApp.
func (mr *MockappDeployerMockRecorder) AddEnvToApp(opts interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "AddEnvToApp", reflect.TypeOf((*MockappDeployer)(nil).AddEnvToApp), opts)
}
// AddJobToApp mocks base method.
func (m *MockappDeployer) AddJobToApp(app *config.Application, jobName string, opts ...cloudformation0.AddWorkloadToAppOpt) error {
m.ctrl.T.Helper()
varargs := []interface{}{app, jobName}
for _, a := range opts {
varargs = append(varargs, a)
}
ret := m.ctrl.Call(m, "AddJobToApp", varargs...)
ret0, _ := ret[0].(error)
return ret0
}
// AddJobToApp indicates an expected call of AddJobToApp.
func (mr *MockappDeployerMockRecorder) AddJobToApp(app, jobName interface{}, opts ...interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
varargs := append([]interface{}{app, jobName}, opts...)
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "AddJobToApp", reflect.TypeOf((*MockappDeployer)(nil).AddJobToApp), varargs...)
}
// AddServiceToApp mocks base method.
func (m *MockappDeployer) AddServiceToApp(app *config.Application, svcName string, opts ...cloudformation0.AddWorkloadToAppOpt) error {
m.ctrl.T.Helper()
varargs := []interface{}{app, svcName}
for _, a := range opts {
varargs = append(varargs, a)
}
ret := m.ctrl.Call(m, "AddServiceToApp", varargs...)
ret0, _ := ret[0].(error)
return ret0
}
// AddServiceToApp indicates an expected call of AddServiceToApp.
func (mr *MockappDeployerMockRecorder) AddServiceToApp(app, svcName interface{}, opts ...interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
varargs := append([]interface{}{app, svcName}, opts...)
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "AddServiceToApp", reflect.TypeOf((*MockappDeployer)(nil).AddServiceToApp), varargs...)
}
// DelegateDNSPermissions mocks base method.
func (m *MockappDeployer) DelegateDNSPermissions(app *config.Application, accountID string) error {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "DelegateDNSPermissions", app, accountID)
ret0, _ := ret[0].(error)
return ret0
}
// DelegateDNSPermissions indicates an expected call of DelegateDNSPermissions.
func (mr *MockappDeployerMockRecorder) DelegateDNSPermissions(app, accountID interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DelegateDNSPermissions", reflect.TypeOf((*MockappDeployer)(nil).DelegateDNSPermissions), app, accountID)
}
// DeleteApp mocks base method.
func (m *MockappDeployer) DeleteApp(name string) error {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "DeleteApp", name)
ret0, _ := ret[0].(error)
return ret0
}
// DeleteApp indicates an expected call of DeleteApp.
func (mr *MockappDeployerMockRecorder) DeleteApp(name interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DeleteApp", reflect.TypeOf((*MockappDeployer)(nil).DeleteApp), name)
}
// DeployApp mocks base method.
func (m *MockappDeployer) DeployApp(in *deploy0.CreateAppInput) error {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "DeployApp", in)
ret0, _ := ret[0].(error)
return ret0
}
// DeployApp indicates an expected call of DeployApp.
func (mr *MockappDeployerMockRecorder) DeployApp(in interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DeployApp", reflect.TypeOf((*MockappDeployer)(nil).DeployApp), in)
}
// MockappResourcesGetter is a mock of appResourcesGetter interface.
type MockappResourcesGetter struct {
ctrl *gomock.Controller
recorder *MockappResourcesGetterMockRecorder
}
// MockappResourcesGetterMockRecorder is the mock recorder for MockappResourcesGetter.
type MockappResourcesGetterMockRecorder struct {
mock *MockappResourcesGetter
}
// NewMockappResourcesGetter creates a new mock instance.
func NewMockappResourcesGetter(ctrl *gomock.Controller) *MockappResourcesGetter {
mock := &MockappResourcesGetter{ctrl: ctrl}
mock.recorder = &MockappResourcesGetterMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockappResourcesGetter) EXPECT() *MockappResourcesGetterMockRecorder {
return m.recorder
}
// GetAppResourcesByRegion mocks base method.
func (m *MockappResourcesGetter) GetAppResourcesByRegion(app *config.Application, region string) (*stack.AppRegionalResources, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "GetAppResourcesByRegion", app, region)
ret0, _ := ret[0].(*stack.AppRegionalResources)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// GetAppResourcesByRegion indicates an expected call of GetAppResourcesByRegion.
func (mr *MockappResourcesGetterMockRecorder) GetAppResourcesByRegion(app, region interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetAppResourcesByRegion", reflect.TypeOf((*MockappResourcesGetter)(nil).GetAppResourcesByRegion), app, region)
}
// GetRegionalAppResources mocks base method.
func (m *MockappResourcesGetter) GetRegionalAppResources(app *config.Application) ([]*stack.AppRegionalResources, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "GetRegionalAppResources", app)
ret0, _ := ret[0].([]*stack.AppRegionalResources)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// GetRegionalAppResources indicates an expected call of GetRegionalAppResources.
func (mr *MockappResourcesGetterMockRecorder) GetRegionalAppResources(app interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetRegionalAppResources", reflect.TypeOf((*MockappResourcesGetter)(nil).GetRegionalAppResources), app)
}
// MocktaskDeployer is a mock of taskDeployer interface.
type MocktaskDeployer struct {
ctrl *gomock.Controller
recorder *MocktaskDeployerMockRecorder
}
// MocktaskDeployerMockRecorder is the mock recorder for MocktaskDeployer.
type MocktaskDeployerMockRecorder struct {
mock *MocktaskDeployer
}
// NewMocktaskDeployer creates a new mock instance.
func NewMocktaskDeployer(ctrl *gomock.Controller) *MocktaskDeployer {
mock := &MocktaskDeployer{ctrl: ctrl}
mock.recorder = &MocktaskDeployerMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MocktaskDeployer) EXPECT() *MocktaskDeployerMockRecorder {
return m.recorder
}
// DeployTask mocks base method.
func (m *MocktaskDeployer) DeployTask(input *deploy0.CreateTaskResourcesInput, opts ...cloudformation.StackOption) error {
m.ctrl.T.Helper()
varargs := []interface{}{input}
for _, a := range opts {
varargs = append(varargs, a)
}
ret := m.ctrl.Call(m, "DeployTask", varargs...)
ret0, _ := ret[0].(error)
return ret0
}
// DeployTask indicates an expected call of DeployTask.
func (mr *MocktaskDeployerMockRecorder) DeployTask(input interface{}, opts ...interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
varargs := append([]interface{}{input}, opts...)
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DeployTask", reflect.TypeOf((*MocktaskDeployer)(nil).DeployTask), varargs...)
}
// GetTaskStack mocks base method.
func (m *MocktaskDeployer) GetTaskStack(taskName string) (*deploy0.TaskStackInfo, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "GetTaskStack", taskName)
ret0, _ := ret[0].(*deploy0.TaskStackInfo)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// GetTaskStack indicates an expected call of GetTaskStack.
func (mr *MocktaskDeployerMockRecorder) GetTaskStack(taskName interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetTaskStack", reflect.TypeOf((*MocktaskDeployer)(nil).GetTaskStack), taskName)
}
// MocktaskStackManager is a mock of taskStackManager interface.
type MocktaskStackManager struct {
ctrl *gomock.Controller
recorder *MocktaskStackManagerMockRecorder
}
// MocktaskStackManagerMockRecorder is the mock recorder for MocktaskStackManager.
type MocktaskStackManagerMockRecorder struct {
mock *MocktaskStackManager
}
// NewMocktaskStackManager creates a new mock instance.
func NewMocktaskStackManager(ctrl *gomock.Controller) *MocktaskStackManager {
mock := &MocktaskStackManager{ctrl: ctrl}
mock.recorder = &MocktaskStackManagerMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MocktaskStackManager) EXPECT() *MocktaskStackManagerMockRecorder {
return m.recorder
}
// DeleteTask mocks base method.
func (m *MocktaskStackManager) DeleteTask(task deploy0.TaskStackInfo) error {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "DeleteTask", task)
ret0, _ := ret[0].(error)
return ret0
}
// DeleteTask indicates an expected call of DeleteTask.
func (mr *MocktaskStackManagerMockRecorder) DeleteTask(task interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DeleteTask", reflect.TypeOf((*MocktaskStackManager)(nil).DeleteTask), task)
}
// GetTaskStack mocks base method.
func (m *MocktaskStackManager) GetTaskStack(taskName string) (*deploy0.TaskStackInfo, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "GetTaskStack", taskName)
ret0, _ := ret[0].(*deploy0.TaskStackInfo)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// GetTaskStack indicates an expected call of GetTaskStack.
func (mr *MocktaskStackManagerMockRecorder) GetTaskStack(taskName interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetTaskStack", reflect.TypeOf((*MocktaskStackManager)(nil).GetTaskStack), taskName)
}
// MocktaskRunner is a mock of taskRunner interface.
type MocktaskRunner struct {
ctrl *gomock.Controller
recorder *MocktaskRunnerMockRecorder
}
// MocktaskRunnerMockRecorder is the mock recorder for MocktaskRunner.
type MocktaskRunnerMockRecorder struct {
mock *MocktaskRunner
}
// NewMocktaskRunner creates a new mock instance.
func NewMocktaskRunner(ctrl *gomock.Controller) *MocktaskRunner {
mock := &MocktaskRunner{ctrl: ctrl}
mock.recorder = &MocktaskRunnerMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MocktaskRunner) EXPECT() *MocktaskRunnerMockRecorder {
return m.recorder
}
// CheckNonZeroExitCode mocks base method.
func (m *MocktaskRunner) CheckNonZeroExitCode(arg0 []*task.Task) error {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "CheckNonZeroExitCode", arg0)
ret0, _ := ret[0].(error)
return ret0
}
// CheckNonZeroExitCode indicates an expected call of CheckNonZeroExitCode.
func (mr *MocktaskRunnerMockRecorder) CheckNonZeroExitCode(arg0 interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "CheckNonZeroExitCode", reflect.TypeOf((*MocktaskRunner)(nil).CheckNonZeroExitCode), arg0)
}
// Run mocks base method.
func (m *MocktaskRunner) Run() ([]*task.Task, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "Run")
ret0, _ := ret[0].([]*task.Task)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// Run indicates an expected call of Run.
func (mr *MocktaskRunnerMockRecorder) Run() *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Run", reflect.TypeOf((*MocktaskRunner)(nil).Run))
}
// MockdefaultClusterGetter is a mock of defaultClusterGetter interface.
type MockdefaultClusterGetter struct {
ctrl *gomock.Controller
recorder *MockdefaultClusterGetterMockRecorder
}
// MockdefaultClusterGetterMockRecorder is the mock recorder for MockdefaultClusterGetter.
type MockdefaultClusterGetterMockRecorder struct {
mock *MockdefaultClusterGetter
}
// NewMockdefaultClusterGetter creates a new mock instance.
func NewMockdefaultClusterGetter(ctrl *gomock.Controller) *MockdefaultClusterGetter {
mock := &MockdefaultClusterGetter{ctrl: ctrl}
mock.recorder = &MockdefaultClusterGetterMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockdefaultClusterGetter) EXPECT() *MockdefaultClusterGetterMockRecorder {
return m.recorder
}
// HasDefaultCluster mocks base method.
func (m *MockdefaultClusterGetter) HasDefaultCluster() (bool, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "HasDefaultCluster")
ret0, _ := ret[0].(bool)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// HasDefaultCluster indicates an expected call of HasDefaultCluster.
func (mr *MockdefaultClusterGetterMockRecorder) HasDefaultCluster() *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "HasDefaultCluster", reflect.TypeOf((*MockdefaultClusterGetter)(nil).HasDefaultCluster))
}
// Mockdeployer is a mock of deployer interface.
type Mockdeployer struct {
ctrl *gomock.Controller
recorder *MockdeployerMockRecorder
}
// MockdeployerMockRecorder is the mock recorder for Mockdeployer.
type MockdeployerMockRecorder struct {
mock *Mockdeployer
}
// NewMockdeployer creates a new mock instance.
func NewMockdeployer(ctrl *gomock.Controller) *Mockdeployer {
mock := &Mockdeployer{ctrl: ctrl}
mock.recorder = &MockdeployerMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *Mockdeployer) EXPECT() *MockdeployerMockRecorder {
return m.recorder
}
// AddEnvToApp mocks base method.
func (m *Mockdeployer) AddEnvToApp(opts *cloudformation0.AddEnvToAppOpts) error {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "AddEnvToApp", opts)
ret0, _ := ret[0].(error)
return ret0
}
// AddEnvToApp indicates an expected call of AddEnvToApp.
func (mr *MockdeployerMockRecorder) AddEnvToApp(opts interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "AddEnvToApp", reflect.TypeOf((*Mockdeployer)(nil).AddEnvToApp), opts)
}
// AddJobToApp mocks base method.
func (m *Mockdeployer) AddJobToApp(app *config.Application, jobName string, opts ...cloudformation0.AddWorkloadToAppOpt) error {
m.ctrl.T.Helper()
varargs := []interface{}{app, jobName}
for _, a := range opts {
varargs = append(varargs, a)
}
ret := m.ctrl.Call(m, "AddJobToApp", varargs...)
ret0, _ := ret[0].(error)
return ret0
}
// AddJobToApp indicates an expected call of AddJobToApp.
func (mr *MockdeployerMockRecorder) AddJobToApp(app, jobName interface{}, opts ...interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
varargs := append([]interface{}{app, jobName}, opts...)
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "AddJobToApp", reflect.TypeOf((*Mockdeployer)(nil).AddJobToApp), varargs...)
}
// AddPipelineResourcesToApp mocks base method.
func (m *Mockdeployer) AddPipelineResourcesToApp(app *config.Application, region string) error {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "AddPipelineResourcesToApp", app, region)
ret0, _ := ret[0].(error)
return ret0
}
// AddPipelineResourcesToApp indicates an expected call of AddPipelineResourcesToApp.
func (mr *MockdeployerMockRecorder) AddPipelineResourcesToApp(app, region interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "AddPipelineResourcesToApp", reflect.TypeOf((*Mockdeployer)(nil).AddPipelineResourcesToApp), app, region)
}
// AddServiceToApp mocks base method.
func (m *Mockdeployer) AddServiceToApp(app *config.Application, svcName string, opts ...cloudformation0.AddWorkloadToAppOpt) error {
m.ctrl.T.Helper()
varargs := []interface{}{app, svcName}
for _, a := range opts {
varargs = append(varargs, a)
}
ret := m.ctrl.Call(m, "AddServiceToApp", varargs...)
ret0, _ := ret[0].(error)
return ret0
}
// AddServiceToApp indicates an expected call of AddServiceToApp.
func (mr *MockdeployerMockRecorder) AddServiceToApp(app, svcName interface{}, opts ...interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
varargs := append([]interface{}{app, svcName}, opts...)
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "AddServiceToApp", reflect.TypeOf((*Mockdeployer)(nil).AddServiceToApp), varargs...)
}
// CreateAndRenderEnvironment mocks base method.
func (m *Mockdeployer) CreateAndRenderEnvironment(conf cloudformation0.StackConfiguration, bucketARN string) error {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "CreateAndRenderEnvironment", conf, bucketARN)
ret0, _ := ret[0].(error)
return ret0
}
// CreateAndRenderEnvironment indicates an expected call of CreateAndRenderEnvironment.
func (mr *MockdeployerMockRecorder) CreateAndRenderEnvironment(conf, bucketARN interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "CreateAndRenderEnvironment", reflect.TypeOf((*Mockdeployer)(nil).CreateAndRenderEnvironment), conf, bucketARN)
}
// CreatePipeline mocks base method.
func (m *Mockdeployer) CreatePipeline(env *deploy0.CreatePipelineInput, bucketName string) error {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "CreatePipeline", env, bucketName)
ret0, _ := ret[0].(error)
return ret0
}
// CreatePipeline indicates an expected call of CreatePipeline.
func (mr *MockdeployerMockRecorder) CreatePipeline(env, bucketName interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "CreatePipeline", reflect.TypeOf((*Mockdeployer)(nil).CreatePipeline), env, bucketName)
}
// DelegateDNSPermissions mocks base method.
func (m *Mockdeployer) DelegateDNSPermissions(app *config.Application, accountID string) error {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "DelegateDNSPermissions", app, accountID)
ret0, _ := ret[0].(error)
return ret0
}
// DelegateDNSPermissions indicates an expected call of DelegateDNSPermissions.
func (mr *MockdeployerMockRecorder) DelegateDNSPermissions(app, accountID interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DelegateDNSPermissions", reflect.TypeOf((*Mockdeployer)(nil).DelegateDNSPermissions), app, accountID)
}
// DeleteApp mocks base method.
func (m *Mockdeployer) DeleteApp(name string) error {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "DeleteApp", name)
ret0, _ := ret[0].(error)
return ret0
}
// DeleteApp indicates an expected call of DeleteApp.
func (mr *MockdeployerMockRecorder) DeleteApp(name interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DeleteApp", reflect.TypeOf((*Mockdeployer)(nil).DeleteApp), name)
}
// DeleteEnvironment mocks base method.
func (m *Mockdeployer) DeleteEnvironment(appName, envName, cfnExecRoleARN string) error {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "DeleteEnvironment", appName, envName, cfnExecRoleARN)
ret0, _ := ret[0].(error)
return ret0
}
// DeleteEnvironment indicates an expected call of DeleteEnvironment.
func (mr *MockdeployerMockRecorder) DeleteEnvironment(appName, envName, cfnExecRoleARN interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DeleteEnvironment", reflect.TypeOf((*Mockdeployer)(nil).DeleteEnvironment), appName, envName, cfnExecRoleARN)
}
// DeletePipeline mocks base method.
func (m *Mockdeployer) DeletePipeline(pipeline deploy0.Pipeline) error {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "DeletePipeline", pipeline)
ret0, _ := ret[0].(error)
return ret0
}
// DeletePipeline indicates an expected call of DeletePipeline.
func (mr *MockdeployerMockRecorder) DeletePipeline(pipeline interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DeletePipeline", reflect.TypeOf((*Mockdeployer)(nil).DeletePipeline), pipeline)
}
// DeployApp mocks base method.
func (m *Mockdeployer) DeployApp(in *deploy0.CreateAppInput) error {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "DeployApp", in)
ret0, _ := ret[0].(error)
return ret0
}
// DeployApp indicates an expected call of DeployApp.
func (mr *MockdeployerMockRecorder) DeployApp(in interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DeployApp", reflect.TypeOf((*Mockdeployer)(nil).DeployApp), in)
}
// GetAppResourcesByRegion mocks base method.
func (m *Mockdeployer) GetAppResourcesByRegion(app *config.Application, region string) (*stack.AppRegionalResources, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "GetAppResourcesByRegion", app, region)
ret0, _ := ret[0].(*stack.AppRegionalResources)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// GetAppResourcesByRegion indicates an expected call of GetAppResourcesByRegion.
func (mr *MockdeployerMockRecorder) GetAppResourcesByRegion(app, region interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetAppResourcesByRegion", reflect.TypeOf((*Mockdeployer)(nil).GetAppResourcesByRegion), app, region)
}
// GetEnvironment mocks base method.
func (m *Mockdeployer) GetEnvironment(appName, envName string) (*config.Environment, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "GetEnvironment", appName, envName)
ret0, _ := ret[0].(*config.Environment)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// GetEnvironment indicates an expected call of GetEnvironment.
func (mr *MockdeployerMockRecorder) GetEnvironment(appName, envName interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetEnvironment", reflect.TypeOf((*Mockdeployer)(nil).GetEnvironment), appName, envName)
}
// GetRegionalAppResources mocks base method.
func (m *Mockdeployer) GetRegionalAppResources(app *config.Application) ([]*stack.AppRegionalResources, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "GetRegionalAppResources", app)
ret0, _ := ret[0].([]*stack.AppRegionalResources)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// GetRegionalAppResources indicates an expected call of GetRegionalAppResources.
func (mr *MockdeployerMockRecorder) GetRegionalAppResources(app interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetRegionalAppResources", reflect.TypeOf((*Mockdeployer)(nil).GetRegionalAppResources), app)
}
// ListTaskStacks mocks base method.
func (m *Mockdeployer) ListTaskStacks(appName, envName string) ([]deploy0.TaskStackInfo, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "ListTaskStacks", appName, envName)
ret0, _ := ret[0].([]deploy0.TaskStackInfo)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// ListTaskStacks indicates an expected call of ListTaskStacks.
func (mr *MockdeployerMockRecorder) ListTaskStacks(appName, envName interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ListTaskStacks", reflect.TypeOf((*Mockdeployer)(nil).ListTaskStacks), appName, envName)
}
// PipelineExists mocks base method.
func (m *Mockdeployer) PipelineExists(env *deploy0.CreatePipelineInput) (bool, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "PipelineExists", env)
ret0, _ := ret[0].(bool)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// PipelineExists indicates an expected call of PipelineExists.
func (mr *MockdeployerMockRecorder) PipelineExists(env interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "PipelineExists", reflect.TypeOf((*Mockdeployer)(nil).PipelineExists), env)
}
// Template mocks base method.
func (m *Mockdeployer) Template(stackName string) (string, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "Template", stackName)
ret0, _ := ret[0].(string)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// Template indicates an expected call of Template.
func (mr *MockdeployerMockRecorder) Template(stackName interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Template", reflect.TypeOf((*Mockdeployer)(nil).Template), stackName)
}
// UpdateEnvironmentTemplate mocks base method.
func (m *Mockdeployer) UpdateEnvironmentTemplate(appName, envName, templateBody, cfnExecRoleARN string) error {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "UpdateEnvironmentTemplate", appName, envName, templateBody, cfnExecRoleARN)
ret0, _ := ret[0].(error)
return ret0
}
// UpdateEnvironmentTemplate indicates an expected call of UpdateEnvironmentTemplate.
func (mr *MockdeployerMockRecorder) UpdateEnvironmentTemplate(appName, envName, templateBody, cfnExecRoleARN interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "UpdateEnvironmentTemplate", reflect.TypeOf((*Mockdeployer)(nil).UpdateEnvironmentTemplate), appName, envName, templateBody, cfnExecRoleARN)
}
// UpdatePipeline mocks base method.
func (m *Mockdeployer) UpdatePipeline(env *deploy0.CreatePipelineInput, bucketName string) error {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "UpdatePipeline", env, bucketName)
ret0, _ := ret[0].(error)
return ret0
}
// UpdatePipeline indicates an expected call of UpdatePipeline.
func (mr *MockdeployerMockRecorder) UpdatePipeline(env, bucketName interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "UpdatePipeline", reflect.TypeOf((*Mockdeployer)(nil).UpdatePipeline), env, bucketName)
}
// MockdomainHostedZoneGetter is a mock of domainHostedZoneGetter interface.
type MockdomainHostedZoneGetter struct {
ctrl *gomock.Controller
recorder *MockdomainHostedZoneGetterMockRecorder
}
// MockdomainHostedZoneGetterMockRecorder is the mock recorder for MockdomainHostedZoneGetter.
type MockdomainHostedZoneGetterMockRecorder struct {
mock *MockdomainHostedZoneGetter
}
// NewMockdomainHostedZoneGetter creates a new mock instance.
func NewMockdomainHostedZoneGetter(ctrl *gomock.Controller) *MockdomainHostedZoneGetter {
mock := &MockdomainHostedZoneGetter{ctrl: ctrl}
mock.recorder = &MockdomainHostedZoneGetterMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockdomainHostedZoneGetter) EXPECT() *MockdomainHostedZoneGetterMockRecorder {
return m.recorder
}
// DomainHostedZoneID mocks base method.
func (m *MockdomainHostedZoneGetter) DomainHostedZoneID(domainName string) (string, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "DomainHostedZoneID", domainName)
ret0, _ := ret[0].(string)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// DomainHostedZoneID indicates an expected call of DomainHostedZoneID.
func (mr *MockdomainHostedZoneGetterMockRecorder) DomainHostedZoneID(domainName interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DomainHostedZoneID", reflect.TypeOf((*MockdomainHostedZoneGetter)(nil).DomainHostedZoneID), domainName)
}
// ValidateDomainOwnership mocks base method.
func (m *MockdomainHostedZoneGetter) ValidateDomainOwnership(domainName string) error {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "ValidateDomainOwnership", domainName)
ret0, _ := ret[0].(error)
return ret0
}
// ValidateDomainOwnership indicates an expected call of ValidateDomainOwnership.
func (mr *MockdomainHostedZoneGetterMockRecorder) ValidateDomainOwnership(domainName interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ValidateDomainOwnership", reflect.TypeOf((*MockdomainHostedZoneGetter)(nil).ValidateDomainOwnership), domainName)
}
// MockdockerfileParser is a mock of dockerfileParser interface.
type MockdockerfileParser struct {
ctrl *gomock.Controller
recorder *MockdockerfileParserMockRecorder
}
// MockdockerfileParserMockRecorder is the mock recorder for MockdockerfileParser.
type MockdockerfileParserMockRecorder struct {
mock *MockdockerfileParser
}
// NewMockdockerfileParser creates a new mock instance.
func NewMockdockerfileParser(ctrl *gomock.Controller) *MockdockerfileParser {
mock := &MockdockerfileParser{ctrl: ctrl}
mock.recorder = &MockdockerfileParserMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockdockerfileParser) EXPECT() *MockdockerfileParserMockRecorder {
return m.recorder
}
// GetExposedPorts mocks base method.
func (m *MockdockerfileParser) GetExposedPorts() ([]dockerfile.Port, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "GetExposedPorts")
ret0, _ := ret[0].([]dockerfile.Port)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// GetExposedPorts indicates an expected call of GetExposedPorts.
func (mr *MockdockerfileParserMockRecorder) GetExposedPorts() *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetExposedPorts", reflect.TypeOf((*MockdockerfileParser)(nil).GetExposedPorts))
}
// GetHealthCheck mocks base method.
func (m *MockdockerfileParser) GetHealthCheck() (*dockerfile.HealthCheck, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "GetHealthCheck")
ret0, _ := ret[0].(*dockerfile.HealthCheck)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// GetHealthCheck indicates an expected call of GetHealthCheck.
func (mr *MockdockerfileParserMockRecorder) GetHealthCheck() *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetHealthCheck", reflect.TypeOf((*MockdockerfileParser)(nil).GetHealthCheck))
}
// MockstatusDescriber is a mock of statusDescriber interface.
type MockstatusDescriber struct {
ctrl *gomock.Controller
recorder *MockstatusDescriberMockRecorder
}
// MockstatusDescriberMockRecorder is the mock recorder for MockstatusDescriber.
type MockstatusDescriberMockRecorder struct {
mock *MockstatusDescriber
}
// NewMockstatusDescriber creates a new mock instance.
func NewMockstatusDescriber(ctrl *gomock.Controller) *MockstatusDescriber {
mock := &MockstatusDescriber{ctrl: ctrl}
mock.recorder = &MockstatusDescriberMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockstatusDescriber) EXPECT() *MockstatusDescriberMockRecorder {
return m.recorder
}
// Describe mocks base method.
func (m *MockstatusDescriber) Describe() (describe.HumanJSONStringer, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "Describe")
ret0, _ := ret[0].(describe.HumanJSONStringer)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// Describe indicates an expected call of Describe.
func (mr *MockstatusDescriberMockRecorder) Describe() *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Describe", reflect.TypeOf((*MockstatusDescriber)(nil).Describe))
}
// MockenvDescriber is a mock of envDescriber interface.
type MockenvDescriber struct {
ctrl *gomock.Controller
recorder *MockenvDescriberMockRecorder
}
// MockenvDescriberMockRecorder is the mock recorder for MockenvDescriber.
type MockenvDescriberMockRecorder struct {
mock *MockenvDescriber
}
// NewMockenvDescriber creates a new mock instance.
func NewMockenvDescriber(ctrl *gomock.Controller) *MockenvDescriber {
mock := &MockenvDescriber{ctrl: ctrl}
mock.recorder = &MockenvDescriberMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockenvDescriber) EXPECT() *MockenvDescriberMockRecorder {
return m.recorder
}
// Describe mocks base method.
func (m *MockenvDescriber) Describe() (*describe.EnvDescription, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "Describe")
ret0, _ := ret[0].(*describe.EnvDescription)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// Describe indicates an expected call of Describe.
func (mr *MockenvDescriberMockRecorder) Describe() *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Describe", reflect.TypeOf((*MockenvDescriber)(nil).Describe))
}
// Manifest mocks base method.
func (m *MockenvDescriber) Manifest() ([]byte, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "Manifest")
ret0, _ := ret[0].([]byte)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// Manifest indicates an expected call of Manifest.
func (mr *MockenvDescriberMockRecorder) Manifest() *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Manifest", reflect.TypeOf((*MockenvDescriber)(nil).Manifest))
}
// PublicCIDRBlocks mocks base method.
func (m *MockenvDescriber) PublicCIDRBlocks() ([]string, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "PublicCIDRBlocks")
ret0, _ := ret[0].([]string)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// PublicCIDRBlocks indicates an expected call of PublicCIDRBlocks.
func (mr *MockenvDescriberMockRecorder) PublicCIDRBlocks() *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "PublicCIDRBlocks", reflect.TypeOf((*MockenvDescriber)(nil).PublicCIDRBlocks))
}
// ValidateCFServiceDomainAliases mocks base method.
func (m *MockenvDescriber) ValidateCFServiceDomainAliases() error {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "ValidateCFServiceDomainAliases")
ret0, _ := ret[0].(error)
return ret0
}
// ValidateCFServiceDomainAliases indicates an expected call of ValidateCFServiceDomainAliases.
func (mr *MockenvDescriberMockRecorder) ValidateCFServiceDomainAliases() *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ValidateCFServiceDomainAliases", reflect.TypeOf((*MockenvDescriber)(nil).ValidateCFServiceDomainAliases))
}
// MockversionCompatibilityChecker is a mock of versionCompatibilityChecker interface.
type MockversionCompatibilityChecker struct {
ctrl *gomock.Controller
recorder *MockversionCompatibilityCheckerMockRecorder
}
// MockversionCompatibilityCheckerMockRecorder is the mock recorder for MockversionCompatibilityChecker.
type MockversionCompatibilityCheckerMockRecorder struct {
mock *MockversionCompatibilityChecker
}
// NewMockversionCompatibilityChecker creates a new mock instance.
func NewMockversionCompatibilityChecker(ctrl *gomock.Controller) *MockversionCompatibilityChecker {
mock := &MockversionCompatibilityChecker{ctrl: ctrl}
mock.recorder = &MockversionCompatibilityCheckerMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockversionCompatibilityChecker) EXPECT() *MockversionCompatibilityCheckerMockRecorder {
return m.recorder
}
// AvailableFeatures mocks base method.
func (m *MockversionCompatibilityChecker) AvailableFeatures() ([]string, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "AvailableFeatures")
ret0, _ := ret[0].([]string)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// AvailableFeatures indicates an expected call of AvailableFeatures.
func (mr *MockversionCompatibilityCheckerMockRecorder) AvailableFeatures() *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "AvailableFeatures", reflect.TypeOf((*MockversionCompatibilityChecker)(nil).AvailableFeatures))
}
// Version mocks base method.
func (m *MockversionCompatibilityChecker) Version() (string, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "Version")
ret0, _ := ret[0].(string)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// Version indicates an expected call of Version.
func (mr *MockversionCompatibilityCheckerMockRecorder) Version() *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Version", reflect.TypeOf((*MockversionCompatibilityChecker)(nil).Version))
}
// MockversionGetter is a mock of versionGetter interface.
type MockversionGetter struct {
ctrl *gomock.Controller
recorder *MockversionGetterMockRecorder
}
// MockversionGetterMockRecorder is the mock recorder for MockversionGetter.
type MockversionGetterMockRecorder struct {
mock *MockversionGetter
}
// NewMockversionGetter creates a new mock instance.
func NewMockversionGetter(ctrl *gomock.Controller) *MockversionGetter {
mock := &MockversionGetter{ctrl: ctrl}
mock.recorder = &MockversionGetterMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockversionGetter) EXPECT() *MockversionGetterMockRecorder {
return m.recorder
}
// Version mocks base method.
func (m *MockversionGetter) Version() (string, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "Version")
ret0, _ := ret[0].(string)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// Version indicates an expected call of Version.
func (mr *MockversionGetterMockRecorder) Version() *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Version", reflect.TypeOf((*MockversionGetter)(nil).Version))
}
// MockappUpgrader is a mock of appUpgrader interface.
type MockappUpgrader struct {
ctrl *gomock.Controller
recorder *MockappUpgraderMockRecorder
}
// MockappUpgraderMockRecorder is the mock recorder for MockappUpgrader.
type MockappUpgraderMockRecorder struct {
mock *MockappUpgrader
}
// NewMockappUpgrader creates a new mock instance.
func NewMockappUpgrader(ctrl *gomock.Controller) *MockappUpgrader {
mock := &MockappUpgrader{ctrl: ctrl}
mock.recorder = &MockappUpgraderMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockappUpgrader) EXPECT() *MockappUpgraderMockRecorder {
return m.recorder
}
// UpgradeApplication mocks base method.
func (m *MockappUpgrader) UpgradeApplication(in *deploy0.CreateAppInput) error {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "UpgradeApplication", in)
ret0, _ := ret[0].(error)
return ret0
}
// UpgradeApplication indicates an expected call of UpgradeApplication.
func (mr *MockappUpgraderMockRecorder) UpgradeApplication(in interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "UpgradeApplication", reflect.TypeOf((*MockappUpgrader)(nil).UpgradeApplication), in)
}
// MockpipelineGetter is a mock of pipelineGetter interface.
type MockpipelineGetter struct {
ctrl *gomock.Controller
recorder *MockpipelineGetterMockRecorder
}
// MockpipelineGetterMockRecorder is the mock recorder for MockpipelineGetter.
type MockpipelineGetterMockRecorder struct {
mock *MockpipelineGetter
}
// NewMockpipelineGetter creates a new mock instance.
func NewMockpipelineGetter(ctrl *gomock.Controller) *MockpipelineGetter {
mock := &MockpipelineGetter{ctrl: ctrl}
mock.recorder = &MockpipelineGetterMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockpipelineGetter) EXPECT() *MockpipelineGetterMockRecorder {
return m.recorder
}
// GetPipeline mocks base method.
func (m *MockpipelineGetter) GetPipeline(pipelineName string) (*codepipeline.Pipeline, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "GetPipeline", pipelineName)
ret0, _ := ret[0].(*codepipeline.Pipeline)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// GetPipeline indicates an expected call of GetPipeline.
func (mr *MockpipelineGetterMockRecorder) GetPipeline(pipelineName interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetPipeline", reflect.TypeOf((*MockpipelineGetter)(nil).GetPipeline), pipelineName)
}
// MockdeployedPipelineLister is a mock of deployedPipelineLister interface.
type MockdeployedPipelineLister struct {
ctrl *gomock.Controller
recorder *MockdeployedPipelineListerMockRecorder
}
// MockdeployedPipelineListerMockRecorder is the mock recorder for MockdeployedPipelineLister.
type MockdeployedPipelineListerMockRecorder struct {
mock *MockdeployedPipelineLister
}
// NewMockdeployedPipelineLister creates a new mock instance.
func NewMockdeployedPipelineLister(ctrl *gomock.Controller) *MockdeployedPipelineLister {
mock := &MockdeployedPipelineLister{ctrl: ctrl}
mock.recorder = &MockdeployedPipelineListerMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockdeployedPipelineLister) EXPECT() *MockdeployedPipelineListerMockRecorder {
return m.recorder
}
// ListDeployedPipelines mocks base method.
func (m *MockdeployedPipelineLister) ListDeployedPipelines(appName string) ([]deploy0.Pipeline, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "ListDeployedPipelines", appName)
ret0, _ := ret[0].([]deploy0.Pipeline)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// ListDeployedPipelines indicates an expected call of ListDeployedPipelines.
func (mr *MockdeployedPipelineListerMockRecorder) ListDeployedPipelines(appName interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ListDeployedPipelines", reflect.TypeOf((*MockdeployedPipelineLister)(nil).ListDeployedPipelines), appName)
}
// Mockexecutor is a mock of executor interface.
type Mockexecutor struct {
ctrl *gomock.Controller
recorder *MockexecutorMockRecorder
}
// MockexecutorMockRecorder is the mock recorder for Mockexecutor.
type MockexecutorMockRecorder struct {
mock *Mockexecutor
}
// NewMockexecutor creates a new mock instance.
func NewMockexecutor(ctrl *gomock.Controller) *Mockexecutor {
mock := &Mockexecutor{ctrl: ctrl}
mock.recorder = &MockexecutorMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *Mockexecutor) EXPECT() *MockexecutorMockRecorder {
return m.recorder
}
// Execute mocks base method.
func (m *Mockexecutor) Execute() error {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "Execute")
ret0, _ := ret[0].(error)
return ret0
}
// Execute indicates an expected call of Execute.
func (mr *MockexecutorMockRecorder) Execute() *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Execute", reflect.TypeOf((*Mockexecutor)(nil).Execute))
}
// MockexecuteAsker is a mock of executeAsker interface.
type MockexecuteAsker struct {
ctrl *gomock.Controller
recorder *MockexecuteAskerMockRecorder
}
// MockexecuteAskerMockRecorder is the mock recorder for MockexecuteAsker.
type MockexecuteAskerMockRecorder struct {
mock *MockexecuteAsker
}
// NewMockexecuteAsker creates a new mock instance.
func NewMockexecuteAsker(ctrl *gomock.Controller) *MockexecuteAsker {
mock := &MockexecuteAsker{ctrl: ctrl}
mock.recorder = &MockexecuteAskerMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockexecuteAsker) EXPECT() *MockexecuteAskerMockRecorder {
return m.recorder
}
// Ask mocks base method.
func (m *MockexecuteAsker) Ask() error {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "Ask")
ret0, _ := ret[0].(error)
return ret0
}
// Ask indicates an expected call of Ask.
func (mr *MockexecuteAskerMockRecorder) Ask() *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Ask", reflect.TypeOf((*MockexecuteAsker)(nil).Ask))
}
// Execute mocks base method.
func (m *MockexecuteAsker) Execute() error {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "Execute")
ret0, _ := ret[0].(error)
return ret0
}
// Execute indicates an expected call of Execute.
func (mr *MockexecuteAskerMockRecorder) Execute() *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Execute", reflect.TypeOf((*MockexecuteAsker)(nil).Execute))
}
// MockappSelector is a mock of appSelector interface.
type MockappSelector struct {
ctrl *gomock.Controller
recorder *MockappSelectorMockRecorder
}
// MockappSelectorMockRecorder is the mock recorder for MockappSelector.
type MockappSelectorMockRecorder struct {
mock *MockappSelector
}
// NewMockappSelector creates a new mock instance.
func NewMockappSelector(ctrl *gomock.Controller) *MockappSelector {
mock := &MockappSelector{ctrl: ctrl}
mock.recorder = &MockappSelectorMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockappSelector) EXPECT() *MockappSelectorMockRecorder {
return m.recorder
}
// Application mocks base method.
func (m *MockappSelector) Application(prompt, help string, additionalOpts ...string) (string, error) {
m.ctrl.T.Helper()
varargs := []interface{}{prompt, help}
for _, a := range additionalOpts {
varargs = append(varargs, a)
}
ret := m.ctrl.Call(m, "Application", varargs...)
ret0, _ := ret[0].(string)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// Application indicates an expected call of Application.
func (mr *MockappSelectorMockRecorder) Application(prompt, help interface{}, additionalOpts ...interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
varargs := append([]interface{}{prompt, help}, additionalOpts...)
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Application", reflect.TypeOf((*MockappSelector)(nil).Application), varargs...)
}
// MockappEnvSelector is a mock of appEnvSelector interface.
type MockappEnvSelector struct {
ctrl *gomock.Controller
recorder *MockappEnvSelectorMockRecorder
}
// MockappEnvSelectorMockRecorder is the mock recorder for MockappEnvSelector.
type MockappEnvSelectorMockRecorder struct {
mock *MockappEnvSelector
}
// NewMockappEnvSelector creates a new mock instance.
func NewMockappEnvSelector(ctrl *gomock.Controller) *MockappEnvSelector {
mock := &MockappEnvSelector{ctrl: ctrl}
mock.recorder = &MockappEnvSelectorMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockappEnvSelector) EXPECT() *MockappEnvSelectorMockRecorder {
return m.recorder
}
// Application mocks base method.
func (m *MockappEnvSelector) Application(prompt, help string, additionalOpts ...string) (string, error) {
m.ctrl.T.Helper()
varargs := []interface{}{prompt, help}
for _, a := range additionalOpts {
varargs = append(varargs, a)
}
ret := m.ctrl.Call(m, "Application", varargs...)
ret0, _ := ret[0].(string)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// Application indicates an expected call of Application.
func (mr *MockappEnvSelectorMockRecorder) Application(prompt, help interface{}, additionalOpts ...interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
varargs := append([]interface{}{prompt, help}, additionalOpts...)
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Application", reflect.TypeOf((*MockappEnvSelector)(nil).Application), varargs...)
}
// Environment mocks base method.
func (m *MockappEnvSelector) Environment(prompt, help, app string, additionalOpts ...string) (string, error) {
m.ctrl.T.Helper()
varargs := []interface{}{prompt, help, app}
for _, a := range additionalOpts {
varargs = append(varargs, a)
}
ret := m.ctrl.Call(m, "Environment", varargs...)
ret0, _ := ret[0].(string)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// Environment indicates an expected call of Environment.
func (mr *MockappEnvSelectorMockRecorder) Environment(prompt, help, app interface{}, additionalOpts ...interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
varargs := append([]interface{}{prompt, help, app}, additionalOpts...)
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Environment", reflect.TypeOf((*MockappEnvSelector)(nil).Environment), varargs...)
}
// MockcfnSelector is a mock of cfnSelector interface.
type MockcfnSelector struct {
ctrl *gomock.Controller
recorder *MockcfnSelectorMockRecorder
}
// MockcfnSelectorMockRecorder is the mock recorder for MockcfnSelector.
type MockcfnSelectorMockRecorder struct {
mock *MockcfnSelector
}
// NewMockcfnSelector creates a new mock instance.
func NewMockcfnSelector(ctrl *gomock.Controller) *MockcfnSelector {
mock := &MockcfnSelector{ctrl: ctrl}
mock.recorder = &MockcfnSelectorMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockcfnSelector) EXPECT() *MockcfnSelectorMockRecorder {
return m.recorder
}
// Resources mocks base method.
func (m *MockcfnSelector) Resources(msg, finalMsg, help, body string) ([]template.CFNResource, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "Resources", msg, finalMsg, help, body)
ret0, _ := ret[0].([]template.CFNResource)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// Resources indicates an expected call of Resources.
func (mr *MockcfnSelectorMockRecorder) Resources(msg, finalMsg, help, body interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Resources", reflect.TypeOf((*MockcfnSelector)(nil).Resources), msg, finalMsg, help, body)
}
// MockconfigSelector is a mock of configSelector interface.
type MockconfigSelector struct {
ctrl *gomock.Controller
recorder *MockconfigSelectorMockRecorder
}
// MockconfigSelectorMockRecorder is the mock recorder for MockconfigSelector.
type MockconfigSelectorMockRecorder struct {
mock *MockconfigSelector
}
// NewMockconfigSelector creates a new mock instance.
func NewMockconfigSelector(ctrl *gomock.Controller) *MockconfigSelector {
mock := &MockconfigSelector{ctrl: ctrl}
mock.recorder = &MockconfigSelectorMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockconfigSelector) EXPECT() *MockconfigSelectorMockRecorder {
return m.recorder
}
// Application mocks base method.
func (m *MockconfigSelector) Application(prompt, help string, additionalOpts ...string) (string, error) {
m.ctrl.T.Helper()
varargs := []interface{}{prompt, help}
for _, a := range additionalOpts {
varargs = append(varargs, a)
}
ret := m.ctrl.Call(m, "Application", varargs...)
ret0, _ := ret[0].(string)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// Application indicates an expected call of Application.
func (mr *MockconfigSelectorMockRecorder) Application(prompt, help interface{}, additionalOpts ...interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
varargs := append([]interface{}{prompt, help}, additionalOpts...)
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Application", reflect.TypeOf((*MockconfigSelector)(nil).Application), varargs...)
}
// Environment mocks base method.
func (m *MockconfigSelector) Environment(prompt, help, app string, additionalOpts ...string) (string, error) {
m.ctrl.T.Helper()
varargs := []interface{}{prompt, help, app}
for _, a := range additionalOpts {
varargs = append(varargs, a)
}
ret := m.ctrl.Call(m, "Environment", varargs...)
ret0, _ := ret[0].(string)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// Environment indicates an expected call of Environment.
func (mr *MockconfigSelectorMockRecorder) Environment(prompt, help, app interface{}, additionalOpts ...interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
varargs := append([]interface{}{prompt, help, app}, additionalOpts...)
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Environment", reflect.TypeOf((*MockconfigSelector)(nil).Environment), varargs...)
}
// Job mocks base method.
func (m *MockconfigSelector) Job(prompt, help, app string) (string, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "Job", prompt, help, app)
ret0, _ := ret[0].(string)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// Job indicates an expected call of Job.
func (mr *MockconfigSelectorMockRecorder) Job(prompt, help, app interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Job", reflect.TypeOf((*MockconfigSelector)(nil).Job), prompt, help, app)
}
// Service mocks base method.
func (m *MockconfigSelector) Service(prompt, help, app string) (string, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "Service", prompt, help, app)
ret0, _ := ret[0].(string)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// Service indicates an expected call of Service.
func (mr *MockconfigSelectorMockRecorder) Service(prompt, help, app interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Service", reflect.TypeOf((*MockconfigSelector)(nil).Service), prompt, help, app)
}
// Workload mocks base method.
func (m *MockconfigSelector) Workload(prompt, help, app string) (string, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "Workload", prompt, help, app)
ret0, _ := ret[0].(string)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// Workload indicates an expected call of Workload.
func (mr *MockconfigSelectorMockRecorder) Workload(prompt, help, app interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Workload", reflect.TypeOf((*MockconfigSelector)(nil).Workload), prompt, help, app)
}
// MockdeploySelector is a mock of deploySelector interface.
type MockdeploySelector struct {
ctrl *gomock.Controller
recorder *MockdeploySelectorMockRecorder
}
// MockdeploySelectorMockRecorder is the mock recorder for MockdeploySelector.
type MockdeploySelectorMockRecorder struct {
mock *MockdeploySelector
}
// NewMockdeploySelector creates a new mock instance.
func NewMockdeploySelector(ctrl *gomock.Controller) *MockdeploySelector {
mock := &MockdeploySelector{ctrl: ctrl}
mock.recorder = &MockdeploySelectorMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockdeploySelector) EXPECT() *MockdeploySelectorMockRecorder {
return m.recorder
}
// Application mocks base method.
func (m *MockdeploySelector) Application(prompt, help string, additionalOpts ...string) (string, error) {
m.ctrl.T.Helper()
varargs := []interface{}{prompt, help}
for _, a := range additionalOpts {
varargs = append(varargs, a)
}
ret := m.ctrl.Call(m, "Application", varargs...)
ret0, _ := ret[0].(string)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// Application indicates an expected call of Application.
func (mr *MockdeploySelectorMockRecorder) Application(prompt, help interface{}, additionalOpts ...interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
varargs := append([]interface{}{prompt, help}, additionalOpts...)
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Application", reflect.TypeOf((*MockdeploySelector)(nil).Application), varargs...)
}
// DeployedJob mocks base method.
func (m *MockdeploySelector) DeployedJob(prompt, help, app string, opts ...selector.GetDeployedWorkloadOpts) (*selector.DeployedJob, error) {
m.ctrl.T.Helper()
varargs := []interface{}{prompt, help, app}
for _, a := range opts {
varargs = append(varargs, a)
}
ret := m.ctrl.Call(m, "DeployedJob", varargs...)
ret0, _ := ret[0].(*selector.DeployedJob)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// DeployedJob indicates an expected call of DeployedJob.
func (mr *MockdeploySelectorMockRecorder) DeployedJob(prompt, help, app interface{}, opts ...interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
varargs := append([]interface{}{prompt, help, app}, opts...)
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DeployedJob", reflect.TypeOf((*MockdeploySelector)(nil).DeployedJob), varargs...)
}
// DeployedService mocks base method.
func (m *MockdeploySelector) DeployedService(prompt, help, app string, opts ...selector.GetDeployedWorkloadOpts) (*selector.DeployedService, error) {
m.ctrl.T.Helper()
varargs := []interface{}{prompt, help, app}
for _, a := range opts {
varargs = append(varargs, a)
}
ret := m.ctrl.Call(m, "DeployedService", varargs...)
ret0, _ := ret[0].(*selector.DeployedService)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// DeployedService indicates an expected call of DeployedService.
func (mr *MockdeploySelectorMockRecorder) DeployedService(prompt, help, app interface{}, opts ...interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
varargs := append([]interface{}{prompt, help, app}, opts...)
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DeployedService", reflect.TypeOf((*MockdeploySelector)(nil).DeployedService), varargs...)
}
// MockpipelineEnvSelector is a mock of pipelineEnvSelector interface.
type MockpipelineEnvSelector struct {
ctrl *gomock.Controller
recorder *MockpipelineEnvSelectorMockRecorder
}
// MockpipelineEnvSelectorMockRecorder is the mock recorder for MockpipelineEnvSelector.
type MockpipelineEnvSelectorMockRecorder struct {
mock *MockpipelineEnvSelector
}
// NewMockpipelineEnvSelector creates a new mock instance.
func NewMockpipelineEnvSelector(ctrl *gomock.Controller) *MockpipelineEnvSelector {
mock := &MockpipelineEnvSelector{ctrl: ctrl}
mock.recorder = &MockpipelineEnvSelectorMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockpipelineEnvSelector) EXPECT() *MockpipelineEnvSelectorMockRecorder {
return m.recorder
}
// Environments mocks base method.
func (m *MockpipelineEnvSelector) Environments(prompt, help, app string, finalMsgFunc func(int) prompt.PromptConfig) ([]string, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "Environments", prompt, help, app, finalMsgFunc)
ret0, _ := ret[0].([]string)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// Environments indicates an expected call of Environments.
func (mr *MockpipelineEnvSelectorMockRecorder) Environments(prompt, help, app, finalMsgFunc interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Environments", reflect.TypeOf((*MockpipelineEnvSelector)(nil).Environments), prompt, help, app, finalMsgFunc)
}
// MockwsPipelineSelector is a mock of wsPipelineSelector interface.
type MockwsPipelineSelector struct {
ctrl *gomock.Controller
recorder *MockwsPipelineSelectorMockRecorder
}
// MockwsPipelineSelectorMockRecorder is the mock recorder for MockwsPipelineSelector.
type MockwsPipelineSelectorMockRecorder struct {
mock *MockwsPipelineSelector
}
// NewMockwsPipelineSelector creates a new mock instance.
func NewMockwsPipelineSelector(ctrl *gomock.Controller) *MockwsPipelineSelector {
mock := &MockwsPipelineSelector{ctrl: ctrl}
mock.recorder = &MockwsPipelineSelectorMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockwsPipelineSelector) EXPECT() *MockwsPipelineSelectorMockRecorder {
return m.recorder
}
// WsPipeline mocks base method.
func (m *MockwsPipelineSelector) WsPipeline(prompt, help string) (*workspace.PipelineManifest, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "WsPipeline", prompt, help)
ret0, _ := ret[0].(*workspace.PipelineManifest)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// WsPipeline indicates an expected call of WsPipeline.
func (mr *MockwsPipelineSelectorMockRecorder) WsPipeline(prompt, help interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "WsPipeline", reflect.TypeOf((*MockwsPipelineSelector)(nil).WsPipeline), prompt, help)
}
// MockwsEnvironmentSelector is a mock of wsEnvironmentSelector interface.
type MockwsEnvironmentSelector struct {
ctrl *gomock.Controller
recorder *MockwsEnvironmentSelectorMockRecorder
}
// MockwsEnvironmentSelectorMockRecorder is the mock recorder for MockwsEnvironmentSelector.
type MockwsEnvironmentSelectorMockRecorder struct {
mock *MockwsEnvironmentSelector
}
// NewMockwsEnvironmentSelector creates a new mock instance.
func NewMockwsEnvironmentSelector(ctrl *gomock.Controller) *MockwsEnvironmentSelector {
mock := &MockwsEnvironmentSelector{ctrl: ctrl}
mock.recorder = &MockwsEnvironmentSelectorMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockwsEnvironmentSelector) EXPECT() *MockwsEnvironmentSelectorMockRecorder {
return m.recorder
}
// LocalEnvironment mocks base method.
func (m *MockwsEnvironmentSelector) LocalEnvironment(msg, help string) (string, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "LocalEnvironment", msg, help)
ret0, _ := ret[0].(string)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// LocalEnvironment indicates an expected call of LocalEnvironment.
func (mr *MockwsEnvironmentSelectorMockRecorder) LocalEnvironment(msg, help interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "LocalEnvironment", reflect.TypeOf((*MockwsEnvironmentSelector)(nil).LocalEnvironment), msg, help)
}
// MockcodePipelineSelector is a mock of codePipelineSelector interface.
type MockcodePipelineSelector struct {
ctrl *gomock.Controller
recorder *MockcodePipelineSelectorMockRecorder
}
// MockcodePipelineSelectorMockRecorder is the mock recorder for MockcodePipelineSelector.
type MockcodePipelineSelectorMockRecorder struct {
mock *MockcodePipelineSelector
}
// NewMockcodePipelineSelector creates a new mock instance.
func NewMockcodePipelineSelector(ctrl *gomock.Controller) *MockcodePipelineSelector {
mock := &MockcodePipelineSelector{ctrl: ctrl}
mock.recorder = &MockcodePipelineSelectorMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockcodePipelineSelector) EXPECT() *MockcodePipelineSelectorMockRecorder {
return m.recorder
}
// Application mocks base method.
func (m *MockcodePipelineSelector) Application(prompt, help string, additionalOpts ...string) (string, error) {
m.ctrl.T.Helper()
varargs := []interface{}{prompt, help}
for _, a := range additionalOpts {
varargs = append(varargs, a)
}
ret := m.ctrl.Call(m, "Application", varargs...)
ret0, _ := ret[0].(string)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// Application indicates an expected call of Application.
func (mr *MockcodePipelineSelectorMockRecorder) Application(prompt, help interface{}, additionalOpts ...interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
varargs := append([]interface{}{prompt, help}, additionalOpts...)
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Application", reflect.TypeOf((*MockcodePipelineSelector)(nil).Application), varargs...)
}
// DeployedPipeline mocks base method.
func (m *MockcodePipelineSelector) DeployedPipeline(prompt, help, app string) (deploy0.Pipeline, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "DeployedPipeline", prompt, help, app)
ret0, _ := ret[0].(deploy0.Pipeline)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// DeployedPipeline indicates an expected call of DeployedPipeline.
func (mr *MockcodePipelineSelectorMockRecorder) DeployedPipeline(prompt, help, app interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DeployedPipeline", reflect.TypeOf((*MockcodePipelineSelector)(nil).DeployedPipeline), prompt, help, app)
}
// MockwsSelector is a mock of wsSelector interface.
type MockwsSelector struct {
ctrl *gomock.Controller
recorder *MockwsSelectorMockRecorder
}
// MockwsSelectorMockRecorder is the mock recorder for MockwsSelector.
type MockwsSelectorMockRecorder struct {
mock *MockwsSelector
}
// NewMockwsSelector creates a new mock instance.
func NewMockwsSelector(ctrl *gomock.Controller) *MockwsSelector {
mock := &MockwsSelector{ctrl: ctrl}
mock.recorder = &MockwsSelectorMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockwsSelector) EXPECT() *MockwsSelectorMockRecorder {
return m.recorder
}
// Application mocks base method.
func (m *MockwsSelector) Application(prompt, help string, additionalOpts ...string) (string, error) {
m.ctrl.T.Helper()
varargs := []interface{}{prompt, help}
for _, a := range additionalOpts {
varargs = append(varargs, a)
}
ret := m.ctrl.Call(m, "Application", varargs...)
ret0, _ := ret[0].(string)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// Application indicates an expected call of Application.
func (mr *MockwsSelectorMockRecorder) Application(prompt, help interface{}, additionalOpts ...interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
varargs := append([]interface{}{prompt, help}, additionalOpts...)
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Application", reflect.TypeOf((*MockwsSelector)(nil).Application), varargs...)
}
// Environment mocks base method.
func (m *MockwsSelector) Environment(prompt, help, app string, additionalOpts ...string) (string, error) {
m.ctrl.T.Helper()
varargs := []interface{}{prompt, help, app}
for _, a := range additionalOpts {
varargs = append(varargs, a)
}
ret := m.ctrl.Call(m, "Environment", varargs...)
ret0, _ := ret[0].(string)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// Environment indicates an expected call of Environment.
func (mr *MockwsSelectorMockRecorder) Environment(prompt, help, app interface{}, additionalOpts ...interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
varargs := append([]interface{}{prompt, help, app}, additionalOpts...)
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Environment", reflect.TypeOf((*MockwsSelector)(nil).Environment), varargs...)
}
// Job mocks base method.
func (m *MockwsSelector) Job(prompt, help string) (string, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "Job", prompt, help)
ret0, _ := ret[0].(string)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// Job indicates an expected call of Job.
func (mr *MockwsSelectorMockRecorder) Job(prompt, help interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Job", reflect.TypeOf((*MockwsSelector)(nil).Job), prompt, help)
}
// Service mocks base method.
func (m *MockwsSelector) Service(prompt, help string) (string, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "Service", prompt, help)
ret0, _ := ret[0].(string)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// Service indicates an expected call of Service.
func (mr *MockwsSelectorMockRecorder) Service(prompt, help interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Service", reflect.TypeOf((*MockwsSelector)(nil).Service), prompt, help)
}
// Workload mocks base method.
func (m *MockwsSelector) Workload(msg, help string) (string, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "Workload", msg, help)
ret0, _ := ret[0].(string)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// Workload indicates an expected call of Workload.
func (mr *MockwsSelectorMockRecorder) Workload(msg, help interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Workload", reflect.TypeOf((*MockwsSelector)(nil).Workload), msg, help)
}
// MockstaticSourceSelector is a mock of staticSourceSelector interface.
type MockstaticSourceSelector struct {
ctrl *gomock.Controller
recorder *MockstaticSourceSelectorMockRecorder
}
// MockstaticSourceSelectorMockRecorder is the mock recorder for MockstaticSourceSelector.
type MockstaticSourceSelectorMockRecorder struct {
mock *MockstaticSourceSelector
}
// NewMockstaticSourceSelector creates a new mock instance.
func NewMockstaticSourceSelector(ctrl *gomock.Controller) *MockstaticSourceSelector {
mock := &MockstaticSourceSelector{ctrl: ctrl}
mock.recorder = &MockstaticSourceSelectorMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockstaticSourceSelector) EXPECT() *MockstaticSourceSelectorMockRecorder {
return m.recorder
}
// StaticSources mocks base method.
func (m *MockstaticSourceSelector) StaticSources(selPrompt, selHelp, anotherPathPrompt, anotherPathHelp string, pathValidator prompt.ValidatorFunc) ([]string, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "StaticSources", selPrompt, selHelp, anotherPathPrompt, anotherPathHelp, pathValidator)
ret0, _ := ret[0].([]string)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// StaticSources indicates an expected call of StaticSources.
func (mr *MockstaticSourceSelectorMockRecorder) StaticSources(selPrompt, selHelp, anotherPathPrompt, anotherPathHelp, pathValidator interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "StaticSources", reflect.TypeOf((*MockstaticSourceSelector)(nil).StaticSources), selPrompt, selHelp, anotherPathPrompt, anotherPathHelp, pathValidator)
}
// MockscheduleSelector is a mock of scheduleSelector interface.
type MockscheduleSelector struct {
ctrl *gomock.Controller
recorder *MockscheduleSelectorMockRecorder
}
// MockscheduleSelectorMockRecorder is the mock recorder for MockscheduleSelector.
type MockscheduleSelectorMockRecorder struct {
mock *MockscheduleSelector
}
// NewMockscheduleSelector creates a new mock instance.
func NewMockscheduleSelector(ctrl *gomock.Controller) *MockscheduleSelector {
mock := &MockscheduleSelector{ctrl: ctrl}
mock.recorder = &MockscheduleSelectorMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockscheduleSelector) EXPECT() *MockscheduleSelectorMockRecorder {
return m.recorder
}
// Schedule mocks base method.
func (m *MockscheduleSelector) Schedule(scheduleTypePrompt, scheduleTypeHelp string, scheduleValidator, rateValidator prompt.ValidatorFunc) (string, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "Schedule", scheduleTypePrompt, scheduleTypeHelp, scheduleValidator, rateValidator)
ret0, _ := ret[0].(string)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// Schedule indicates an expected call of Schedule.
func (mr *MockscheduleSelectorMockRecorder) Schedule(scheduleTypePrompt, scheduleTypeHelp, scheduleValidator, rateValidator interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Schedule", reflect.TypeOf((*MockscheduleSelector)(nil).Schedule), scheduleTypePrompt, scheduleTypeHelp, scheduleValidator, rateValidator)
}
// MockcfTaskSelector is a mock of cfTaskSelector interface.
type MockcfTaskSelector struct {
ctrl *gomock.Controller
recorder *MockcfTaskSelectorMockRecorder
}
// MockcfTaskSelectorMockRecorder is the mock recorder for MockcfTaskSelector.
type MockcfTaskSelectorMockRecorder struct {
mock *MockcfTaskSelector
}
// NewMockcfTaskSelector creates a new mock instance.
func NewMockcfTaskSelector(ctrl *gomock.Controller) *MockcfTaskSelector {
mock := &MockcfTaskSelector{ctrl: ctrl}
mock.recorder = &MockcfTaskSelectorMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockcfTaskSelector) EXPECT() *MockcfTaskSelectorMockRecorder {
return m.recorder
}
// Task mocks base method.
func (m *MockcfTaskSelector) Task(prompt, help string, opts ...selector.GetDeployedTaskOpts) (string, error) {
m.ctrl.T.Helper()
varargs := []interface{}{prompt, help}
for _, a := range opts {
varargs = append(varargs, a)
}
ret := m.ctrl.Call(m, "Task", varargs...)
ret0, _ := ret[0].(string)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// Task indicates an expected call of Task.
func (mr *MockcfTaskSelectorMockRecorder) Task(prompt, help interface{}, opts ...interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
varargs := append([]interface{}{prompt, help}, opts...)
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Task", reflect.TypeOf((*MockcfTaskSelector)(nil).Task), varargs...)
}
// MockdockerfileSelector is a mock of dockerfileSelector interface.
type MockdockerfileSelector struct {
ctrl *gomock.Controller
recorder *MockdockerfileSelectorMockRecorder
}
// MockdockerfileSelectorMockRecorder is the mock recorder for MockdockerfileSelector.
type MockdockerfileSelectorMockRecorder struct {
mock *MockdockerfileSelector
}
// NewMockdockerfileSelector creates a new mock instance.
func NewMockdockerfileSelector(ctrl *gomock.Controller) *MockdockerfileSelector {
mock := &MockdockerfileSelector{ctrl: ctrl}
mock.recorder = &MockdockerfileSelectorMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockdockerfileSelector) EXPECT() *MockdockerfileSelectorMockRecorder {
return m.recorder
}
// Dockerfile mocks base method.
func (m *MockdockerfileSelector) Dockerfile(selPrompt, notFoundPrompt, selHelp, notFoundHelp string, pv prompt.ValidatorFunc) (string, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "Dockerfile", selPrompt, notFoundPrompt, selHelp, notFoundHelp, pv)
ret0, _ := ret[0].(string)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// Dockerfile indicates an expected call of Dockerfile.
func (mr *MockdockerfileSelectorMockRecorder) Dockerfile(selPrompt, notFoundPrompt, selHelp, notFoundHelp, pv interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Dockerfile", reflect.TypeOf((*MockdockerfileSelector)(nil).Dockerfile), selPrompt, notFoundPrompt, selHelp, notFoundHelp, pv)
}
// MocktopicSelector is a mock of topicSelector interface.
type MocktopicSelector struct {
ctrl *gomock.Controller
recorder *MocktopicSelectorMockRecorder
}
// MocktopicSelectorMockRecorder is the mock recorder for MocktopicSelector.
type MocktopicSelectorMockRecorder struct {
mock *MocktopicSelector
}
// NewMocktopicSelector creates a new mock instance.
func NewMocktopicSelector(ctrl *gomock.Controller) *MocktopicSelector {
mock := &MocktopicSelector{ctrl: ctrl}
mock.recorder = &MocktopicSelectorMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MocktopicSelector) EXPECT() *MocktopicSelectorMockRecorder {
return m.recorder
}
// Topics mocks base method.
func (m *MocktopicSelector) Topics(prompt, help, app string) ([]deploy0.Topic, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "Topics", prompt, help, app)
ret0, _ := ret[0].([]deploy0.Topic)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// Topics indicates an expected call of Topics.
func (mr *MocktopicSelectorMockRecorder) Topics(prompt, help, app interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Topics", reflect.TypeOf((*MocktopicSelector)(nil).Topics), prompt, help, app)
}
// Mockec2Selector is a mock of ec2Selector interface.
type Mockec2Selector struct {
ctrl *gomock.Controller
recorder *Mockec2SelectorMockRecorder
}
// Mockec2SelectorMockRecorder is the mock recorder for Mockec2Selector.
type Mockec2SelectorMockRecorder struct {
mock *Mockec2Selector
}
// NewMockec2Selector creates a new mock instance.
func NewMockec2Selector(ctrl *gomock.Controller) *Mockec2Selector {
mock := &Mockec2Selector{ctrl: ctrl}
mock.recorder = &Mockec2SelectorMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *Mockec2Selector) EXPECT() *Mockec2SelectorMockRecorder {
return m.recorder
}
// Subnets mocks base method.
func (m *Mockec2Selector) Subnets(input selector.SubnetsInput) ([]string, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "Subnets", input)
ret0, _ := ret[0].([]string)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// Subnets indicates an expected call of Subnets.
func (mr *Mockec2SelectorMockRecorder) Subnets(input interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Subnets", reflect.TypeOf((*Mockec2Selector)(nil).Subnets), input)
}
// VPC mocks base method.
func (m *Mockec2Selector) VPC(prompt, help string) (string, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "VPC", prompt, help)
ret0, _ := ret[0].(string)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// VPC indicates an expected call of VPC.
func (mr *Mockec2SelectorMockRecorder) VPC(prompt, help interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "VPC", reflect.TypeOf((*Mockec2Selector)(nil).VPC), prompt, help)
}
// MockcredsSelector is a mock of credsSelector interface.
type MockcredsSelector struct {
ctrl *gomock.Controller
recorder *MockcredsSelectorMockRecorder
}
// MockcredsSelectorMockRecorder is the mock recorder for MockcredsSelector.
type MockcredsSelectorMockRecorder struct {
mock *MockcredsSelector
}
// NewMockcredsSelector creates a new mock instance.
func NewMockcredsSelector(ctrl *gomock.Controller) *MockcredsSelector {
mock := &MockcredsSelector{ctrl: ctrl}
mock.recorder = &MockcredsSelectorMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockcredsSelector) EXPECT() *MockcredsSelectorMockRecorder {
return m.recorder
}
// Creds mocks base method.
func (m *MockcredsSelector) Creds(prompt, help string) (*session.Session, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "Creds", prompt, help)
ret0, _ := ret[0].(*session.Session)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// Creds indicates an expected call of Creds.
func (mr *MockcredsSelectorMockRecorder) Creds(prompt, help interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Creds", reflect.TypeOf((*MockcredsSelector)(nil).Creds), prompt, help)
}
// Mockec2Client is a mock of ec2Client interface.
type Mockec2Client struct {
ctrl *gomock.Controller
recorder *Mockec2ClientMockRecorder
}
// Mockec2ClientMockRecorder is the mock recorder for Mockec2Client.
type Mockec2ClientMockRecorder struct {
mock *Mockec2Client
}
// NewMockec2Client creates a new mock instance.
func NewMockec2Client(ctrl *gomock.Controller) *Mockec2Client {
mock := &Mockec2Client{ctrl: ctrl}
mock.recorder = &Mockec2ClientMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *Mockec2Client) EXPECT() *Mockec2ClientMockRecorder {
return m.recorder
}
// HasDNSSupport mocks base method.
func (m *Mockec2Client) HasDNSSupport(vpcID string) (bool, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "HasDNSSupport", vpcID)
ret0, _ := ret[0].(bool)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// HasDNSSupport indicates an expected call of HasDNSSupport.
func (mr *Mockec2ClientMockRecorder) HasDNSSupport(vpcID interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "HasDNSSupport", reflect.TypeOf((*Mockec2Client)(nil).HasDNSSupport), vpcID)
}
// ListAZs mocks base method.
func (m *Mockec2Client) ListAZs() ([]ec2.AZ, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "ListAZs")
ret0, _ := ret[0].([]ec2.AZ)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// ListAZs indicates an expected call of ListAZs.
func (mr *Mockec2ClientMockRecorder) ListAZs() *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ListAZs", reflect.TypeOf((*Mockec2Client)(nil).ListAZs))
}
// MockserviceResumer is a mock of serviceResumer interface.
type MockserviceResumer struct {
ctrl *gomock.Controller
recorder *MockserviceResumerMockRecorder
}
// MockserviceResumerMockRecorder is the mock recorder for MockserviceResumer.
type MockserviceResumerMockRecorder struct {
mock *MockserviceResumer
}
// NewMockserviceResumer creates a new mock instance.
func NewMockserviceResumer(ctrl *gomock.Controller) *MockserviceResumer {
mock := &MockserviceResumer{ctrl: ctrl}
mock.recorder = &MockserviceResumerMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockserviceResumer) EXPECT() *MockserviceResumerMockRecorder {
return m.recorder
}
// ResumeService mocks base method.
func (m *MockserviceResumer) ResumeService(arg0 string) error {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "ResumeService", arg0)
ret0, _ := ret[0].(error)
return ret0
}
// ResumeService indicates an expected call of ResumeService.
func (mr *MockserviceResumerMockRecorder) ResumeService(arg0 interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ResumeService", reflect.TypeOf((*MockserviceResumer)(nil).ResumeService), arg0)
}
// MockjobInitializer is a mock of jobInitializer interface.
type MockjobInitializer struct {
ctrl *gomock.Controller
recorder *MockjobInitializerMockRecorder
}
// MockjobInitializerMockRecorder is the mock recorder for MockjobInitializer.
type MockjobInitializerMockRecorder struct {
mock *MockjobInitializer
}
// NewMockjobInitializer creates a new mock instance.
func NewMockjobInitializer(ctrl *gomock.Controller) *MockjobInitializer {
mock := &MockjobInitializer{ctrl: ctrl}
mock.recorder = &MockjobInitializerMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockjobInitializer) EXPECT() *MockjobInitializerMockRecorder {
return m.recorder
}
// Job mocks base method.
func (m *MockjobInitializer) Job(props *initialize.JobProps) (string, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "Job", props)
ret0, _ := ret[0].(string)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// Job indicates an expected call of Job.
func (mr *MockjobInitializerMockRecorder) Job(props interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Job", reflect.TypeOf((*MockjobInitializer)(nil).Job), props)
}
// MocksvcInitializer is a mock of svcInitializer interface.
type MocksvcInitializer struct {
ctrl *gomock.Controller
recorder *MocksvcInitializerMockRecorder
}
// MocksvcInitializerMockRecorder is the mock recorder for MocksvcInitializer.
type MocksvcInitializerMockRecorder struct {
mock *MocksvcInitializer
}
// NewMocksvcInitializer creates a new mock instance.
func NewMocksvcInitializer(ctrl *gomock.Controller) *MocksvcInitializer {
mock := &MocksvcInitializer{ctrl: ctrl}
mock.recorder = &MocksvcInitializerMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MocksvcInitializer) EXPECT() *MocksvcInitializerMockRecorder {
return m.recorder
}
// Service mocks base method.
func (m *MocksvcInitializer) Service(props *initialize.ServiceProps) (string, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "Service", props)
ret0, _ := ret[0].(string)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// Service indicates an expected call of Service.
func (mr *MocksvcInitializerMockRecorder) Service(props interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Service", reflect.TypeOf((*MocksvcInitializer)(nil).Service), props)
}
// MockroleDeleter is a mock of roleDeleter interface.
type MockroleDeleter struct {
ctrl *gomock.Controller
recorder *MockroleDeleterMockRecorder
}
// MockroleDeleterMockRecorder is the mock recorder for MockroleDeleter.
type MockroleDeleterMockRecorder struct {
mock *MockroleDeleter
}
// NewMockroleDeleter creates a new mock instance.
func NewMockroleDeleter(ctrl *gomock.Controller) *MockroleDeleter {
mock := &MockroleDeleter{ctrl: ctrl}
mock.recorder = &MockroleDeleterMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockroleDeleter) EXPECT() *MockroleDeleterMockRecorder {
return m.recorder
}
// DeleteRole mocks base method.
func (m *MockroleDeleter) DeleteRole(arg0 string) error {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "DeleteRole", arg0)
ret0, _ := ret[0].(error)
return ret0
}
// DeleteRole indicates an expected call of DeleteRole.
func (mr *MockroleDeleterMockRecorder) DeleteRole(arg0 interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DeleteRole", reflect.TypeOf((*MockroleDeleter)(nil).DeleteRole), arg0)
}
// MockpolicyLister is a mock of policyLister interface.
type MockpolicyLister struct {
ctrl *gomock.Controller
recorder *MockpolicyListerMockRecorder
}
// MockpolicyListerMockRecorder is the mock recorder for MockpolicyLister.
type MockpolicyListerMockRecorder struct {
mock *MockpolicyLister
}
// NewMockpolicyLister creates a new mock instance.
func NewMockpolicyLister(ctrl *gomock.Controller) *MockpolicyLister {
mock := &MockpolicyLister{ctrl: ctrl}
mock.recorder = &MockpolicyListerMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockpolicyLister) EXPECT() *MockpolicyListerMockRecorder {
return m.recorder
}
// ListPolicyNames mocks base method.
func (m *MockpolicyLister) ListPolicyNames() ([]string, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "ListPolicyNames")
ret0, _ := ret[0].([]string)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// ListPolicyNames indicates an expected call of ListPolicyNames.
func (mr *MockpolicyListerMockRecorder) ListPolicyNames() *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ListPolicyNames", reflect.TypeOf((*MockpolicyLister)(nil).ListPolicyNames))
}
// MockserviceDescriber is a mock of serviceDescriber interface.
type MockserviceDescriber struct {
ctrl *gomock.Controller
recorder *MockserviceDescriberMockRecorder
}
// MockserviceDescriberMockRecorder is the mock recorder for MockserviceDescriber.
type MockserviceDescriberMockRecorder struct {
mock *MockserviceDescriber
}
// NewMockserviceDescriber creates a new mock instance.
func NewMockserviceDescriber(ctrl *gomock.Controller) *MockserviceDescriber {
mock := &MockserviceDescriber{ctrl: ctrl}
mock.recorder = &MockserviceDescriberMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockserviceDescriber) EXPECT() *MockserviceDescriberMockRecorder {
return m.recorder
}
// DescribeService mocks base method.
func (m *MockserviceDescriber) DescribeService(app, env, svc string) (*ecs0.ServiceDesc, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "DescribeService", app, env, svc)
ret0, _ := ret[0].(*ecs0.ServiceDesc)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// DescribeService indicates an expected call of DescribeService.
func (mr *MockserviceDescriberMockRecorder) DescribeService(app, env, svc interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DescribeService", reflect.TypeOf((*MockserviceDescriber)(nil).DescribeService), app, env, svc)
}
// MockapprunnerServiceDescriber is a mock of apprunnerServiceDescriber interface.
type MockapprunnerServiceDescriber struct {
ctrl *gomock.Controller
recorder *MockapprunnerServiceDescriberMockRecorder
}
// MockapprunnerServiceDescriberMockRecorder is the mock recorder for MockapprunnerServiceDescriber.
type MockapprunnerServiceDescriberMockRecorder struct {
mock *MockapprunnerServiceDescriber
}
// NewMockapprunnerServiceDescriber creates a new mock instance.
func NewMockapprunnerServiceDescriber(ctrl *gomock.Controller) *MockapprunnerServiceDescriber {
mock := &MockapprunnerServiceDescriber{ctrl: ctrl}
mock.recorder = &MockapprunnerServiceDescriberMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockapprunnerServiceDescriber) EXPECT() *MockapprunnerServiceDescriberMockRecorder {
return m.recorder
}
// ServiceARN mocks base method.
func (m *MockapprunnerServiceDescriber) ServiceARN(env string) (string, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "ServiceARN", env)
ret0, _ := ret[0].(string)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// ServiceARN indicates an expected call of ServiceARN.
func (mr *MockapprunnerServiceDescriberMockRecorder) ServiceARN(env interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ServiceARN", reflect.TypeOf((*MockapprunnerServiceDescriber)(nil).ServiceARN), env)
}
// MockecsCommandExecutor is a mock of ecsCommandExecutor interface.
type MockecsCommandExecutor struct {
ctrl *gomock.Controller
recorder *MockecsCommandExecutorMockRecorder
}
// MockecsCommandExecutorMockRecorder is the mock recorder for MockecsCommandExecutor.
type MockecsCommandExecutorMockRecorder struct {
mock *MockecsCommandExecutor
}
// NewMockecsCommandExecutor creates a new mock instance.
func NewMockecsCommandExecutor(ctrl *gomock.Controller) *MockecsCommandExecutor {
mock := &MockecsCommandExecutor{ctrl: ctrl}
mock.recorder = &MockecsCommandExecutorMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockecsCommandExecutor) EXPECT() *MockecsCommandExecutorMockRecorder {
return m.recorder
}
// ExecuteCommand mocks base method.
func (m *MockecsCommandExecutor) ExecuteCommand(in ecs.ExecuteCommandInput) error {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "ExecuteCommand", in)
ret0, _ := ret[0].(error)
return ret0
}
// ExecuteCommand indicates an expected call of ExecuteCommand.
func (mr *MockecsCommandExecutorMockRecorder) ExecuteCommand(in interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ExecuteCommand", reflect.TypeOf((*MockecsCommandExecutor)(nil).ExecuteCommand), in)
}
// MockssmPluginManager is a mock of ssmPluginManager interface.
type MockssmPluginManager struct {
ctrl *gomock.Controller
recorder *MockssmPluginManagerMockRecorder
}
// MockssmPluginManagerMockRecorder is the mock recorder for MockssmPluginManager.
type MockssmPluginManagerMockRecorder struct {
mock *MockssmPluginManager
}
// NewMockssmPluginManager creates a new mock instance.
func NewMockssmPluginManager(ctrl *gomock.Controller) *MockssmPluginManager {
mock := &MockssmPluginManager{ctrl: ctrl}
mock.recorder = &MockssmPluginManagerMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockssmPluginManager) EXPECT() *MockssmPluginManagerMockRecorder {
return m.recorder
}
// InstallLatestBinary mocks base method.
func (m *MockssmPluginManager) InstallLatestBinary() error {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "InstallLatestBinary")
ret0, _ := ret[0].(error)
return ret0
}
// InstallLatestBinary indicates an expected call of InstallLatestBinary.
func (mr *MockssmPluginManagerMockRecorder) InstallLatestBinary() *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "InstallLatestBinary", reflect.TypeOf((*MockssmPluginManager)(nil).InstallLatestBinary))
}
// ValidateBinary mocks base method.
func (m *MockssmPluginManager) ValidateBinary() error {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "ValidateBinary")
ret0, _ := ret[0].(error)
return ret0
}
// ValidateBinary indicates an expected call of ValidateBinary.
func (mr *MockssmPluginManagerMockRecorder) ValidateBinary() *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ValidateBinary", reflect.TypeOf((*MockssmPluginManager)(nil).ValidateBinary))
}
// MocktaskStopper is a mock of taskStopper interface.
type MocktaskStopper struct {
ctrl *gomock.Controller
recorder *MocktaskStopperMockRecorder
}
// MocktaskStopperMockRecorder is the mock recorder for MocktaskStopper.
type MocktaskStopperMockRecorder struct {
mock *MocktaskStopper
}
// NewMocktaskStopper creates a new mock instance.
func NewMocktaskStopper(ctrl *gomock.Controller) *MocktaskStopper {
mock := &MocktaskStopper{ctrl: ctrl}
mock.recorder = &MocktaskStopperMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MocktaskStopper) EXPECT() *MocktaskStopperMockRecorder {
return m.recorder
}
// StopDefaultClusterTasks mocks base method.
func (m *MocktaskStopper) StopDefaultClusterTasks(familyName string) error {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "StopDefaultClusterTasks", familyName)
ret0, _ := ret[0].(error)
return ret0
}
// StopDefaultClusterTasks indicates an expected call of StopDefaultClusterTasks.
func (mr *MocktaskStopperMockRecorder) StopDefaultClusterTasks(familyName interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "StopDefaultClusterTasks", reflect.TypeOf((*MocktaskStopper)(nil).StopDefaultClusterTasks), familyName)
}
// StopOneOffTasks mocks base method.
func (m *MocktaskStopper) StopOneOffTasks(app, env, family string) error {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "StopOneOffTasks", app, env, family)
ret0, _ := ret[0].(error)
return ret0
}
// StopOneOffTasks indicates an expected call of StopOneOffTasks.
func (mr *MocktaskStopperMockRecorder) StopOneOffTasks(app, env, family interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "StopOneOffTasks", reflect.TypeOf((*MocktaskStopper)(nil).StopOneOffTasks), app, env, family)
}
// StopWorkloadTasks mocks base method.
func (m *MocktaskStopper) StopWorkloadTasks(app, env, workload string) error {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "StopWorkloadTasks", app, env, workload)
ret0, _ := ret[0].(error)
return ret0
}
// StopWorkloadTasks indicates an expected call of StopWorkloadTasks.
func (mr *MocktaskStopperMockRecorder) StopWorkloadTasks(app, env, workload interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "StopWorkloadTasks", reflect.TypeOf((*MocktaskStopper)(nil).StopWorkloadTasks), app, env, workload)
}
// MockserviceLinkedRoleCreator is a mock of serviceLinkedRoleCreator interface.
type MockserviceLinkedRoleCreator struct {
ctrl *gomock.Controller
recorder *MockserviceLinkedRoleCreatorMockRecorder
}
// MockserviceLinkedRoleCreatorMockRecorder is the mock recorder for MockserviceLinkedRoleCreator.
type MockserviceLinkedRoleCreatorMockRecorder struct {
mock *MockserviceLinkedRoleCreator
}
// NewMockserviceLinkedRoleCreator creates a new mock instance.
func NewMockserviceLinkedRoleCreator(ctrl *gomock.Controller) *MockserviceLinkedRoleCreator {
mock := &MockserviceLinkedRoleCreator{ctrl: ctrl}
mock.recorder = &MockserviceLinkedRoleCreatorMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockserviceLinkedRoleCreator) EXPECT() *MockserviceLinkedRoleCreatorMockRecorder {
return m.recorder
}
// CreateECSServiceLinkedRole mocks base method.
func (m *MockserviceLinkedRoleCreator) CreateECSServiceLinkedRole() error {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "CreateECSServiceLinkedRole")
ret0, _ := ret[0].(error)
return ret0
}
// CreateECSServiceLinkedRole indicates an expected call of CreateECSServiceLinkedRole.
func (mr *MockserviceLinkedRoleCreatorMockRecorder) CreateECSServiceLinkedRole() *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "CreateECSServiceLinkedRole", reflect.TypeOf((*MockserviceLinkedRoleCreator)(nil).CreateECSServiceLinkedRole))
}
// MockroleTagsLister is a mock of roleTagsLister interface.
type MockroleTagsLister struct {
ctrl *gomock.Controller
recorder *MockroleTagsListerMockRecorder
}
// MockroleTagsListerMockRecorder is the mock recorder for MockroleTagsLister.
type MockroleTagsListerMockRecorder struct {
mock *MockroleTagsLister
}
// NewMockroleTagsLister creates a new mock instance.
func NewMockroleTagsLister(ctrl *gomock.Controller) *MockroleTagsLister {
mock := &MockroleTagsLister{ctrl: ctrl}
mock.recorder = &MockroleTagsListerMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockroleTagsLister) EXPECT() *MockroleTagsListerMockRecorder {
return m.recorder
}
// ListRoleTags mocks base method.
func (m *MockroleTagsLister) ListRoleTags(arg0 string) (map[string]string, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "ListRoleTags", arg0)
ret0, _ := ret[0].(map[string]string)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// ListRoleTags indicates an expected call of ListRoleTags.
func (mr *MockroleTagsListerMockRecorder) ListRoleTags(arg0 interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ListRoleTags", reflect.TypeOf((*MockroleTagsLister)(nil).ListRoleTags), arg0)
}
// MockroleManager is a mock of roleManager interface.
type MockroleManager struct {
ctrl *gomock.Controller
recorder *MockroleManagerMockRecorder
}
// MockroleManagerMockRecorder is the mock recorder for MockroleManager.
type MockroleManagerMockRecorder struct {
mock *MockroleManager
}
// NewMockroleManager creates a new mock instance.
func NewMockroleManager(ctrl *gomock.Controller) *MockroleManager {
mock := &MockroleManager{ctrl: ctrl}
mock.recorder = &MockroleManagerMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockroleManager) EXPECT() *MockroleManagerMockRecorder {
return m.recorder
}
// CreateECSServiceLinkedRole mocks base method.
func (m *MockroleManager) CreateECSServiceLinkedRole() error {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "CreateECSServiceLinkedRole")
ret0, _ := ret[0].(error)
return ret0
}
// CreateECSServiceLinkedRole indicates an expected call of CreateECSServiceLinkedRole.
func (mr *MockroleManagerMockRecorder) CreateECSServiceLinkedRole() *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "CreateECSServiceLinkedRole", reflect.TypeOf((*MockroleManager)(nil).CreateECSServiceLinkedRole))
}
// DeleteRole mocks base method.
func (m *MockroleManager) DeleteRole(arg0 string) error {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "DeleteRole", arg0)
ret0, _ := ret[0].(error)
return ret0
}
// DeleteRole indicates an expected call of DeleteRole.
func (mr *MockroleManagerMockRecorder) DeleteRole(arg0 interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DeleteRole", reflect.TypeOf((*MockroleManager)(nil).DeleteRole), arg0)
}
// ListRoleTags mocks base method.
func (m *MockroleManager) ListRoleTags(arg0 string) (map[string]string, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "ListRoleTags", arg0)
ret0, _ := ret[0].(map[string]string)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// ListRoleTags indicates an expected call of ListRoleTags.
func (mr *MockroleManagerMockRecorder) ListRoleTags(arg0 interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ListRoleTags", reflect.TypeOf((*MockroleManager)(nil).ListRoleTags), arg0)
}
// MockstackExistChecker is a mock of stackExistChecker interface.
type MockstackExistChecker struct {
ctrl *gomock.Controller
recorder *MockstackExistCheckerMockRecorder
}
// MockstackExistCheckerMockRecorder is the mock recorder for MockstackExistChecker.
type MockstackExistCheckerMockRecorder struct {
mock *MockstackExistChecker
}
// NewMockstackExistChecker creates a new mock instance.
func NewMockstackExistChecker(ctrl *gomock.Controller) *MockstackExistChecker {
mock := &MockstackExistChecker{ctrl: ctrl}
mock.recorder = &MockstackExistCheckerMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockstackExistChecker) EXPECT() *MockstackExistCheckerMockRecorder {
return m.recorder
}
// Exists mocks base method.
func (m *MockstackExistChecker) Exists(arg0 string) (bool, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "Exists", arg0)
ret0, _ := ret[0].(bool)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// Exists indicates an expected call of Exists.
func (mr *MockstackExistCheckerMockRecorder) Exists(arg0 interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Exists", reflect.TypeOf((*MockstackExistChecker)(nil).Exists), arg0)
}
// MockrunningTaskSelector is a mock of runningTaskSelector interface.
type MockrunningTaskSelector struct {
ctrl *gomock.Controller
recorder *MockrunningTaskSelectorMockRecorder
}
// MockrunningTaskSelectorMockRecorder is the mock recorder for MockrunningTaskSelector.
type MockrunningTaskSelectorMockRecorder struct {
mock *MockrunningTaskSelector
}
// NewMockrunningTaskSelector creates a new mock instance.
func NewMockrunningTaskSelector(ctrl *gomock.Controller) *MockrunningTaskSelector {
mock := &MockrunningTaskSelector{ctrl: ctrl}
mock.recorder = &MockrunningTaskSelectorMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockrunningTaskSelector) EXPECT() *MockrunningTaskSelectorMockRecorder {
return m.recorder
}
// RunningTask mocks base method.
func (m *MockrunningTaskSelector) RunningTask(prompt, help string, opts ...selector.TaskOpts) (*ecs.Task, error) {
m.ctrl.T.Helper()
varargs := []interface{}{prompt, help}
for _, a := range opts {
varargs = append(varargs, a)
}
ret := m.ctrl.Call(m, "RunningTask", varargs...)
ret0, _ := ret[0].(*ecs.Task)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// RunningTask indicates an expected call of RunningTask.
func (mr *MockrunningTaskSelectorMockRecorder) RunningTask(prompt, help interface{}, opts ...interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
varargs := append([]interface{}{prompt, help}, opts...)
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "RunningTask", reflect.TypeOf((*MockrunningTaskSelector)(nil).RunningTask), varargs...)
}
// MockdockerEngine is a mock of dockerEngine interface.
type MockdockerEngine struct {
ctrl *gomock.Controller
recorder *MockdockerEngineMockRecorder
}
// MockdockerEngineMockRecorder is the mock recorder for MockdockerEngine.
type MockdockerEngineMockRecorder struct {
mock *MockdockerEngine
}
// NewMockdockerEngine creates a new mock instance.
func NewMockdockerEngine(ctrl *gomock.Controller) *MockdockerEngine {
mock := &MockdockerEngine{ctrl: ctrl}
mock.recorder = &MockdockerEngineMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockdockerEngine) EXPECT() *MockdockerEngineMockRecorder {
return m.recorder
}
// CheckDockerEngineRunning mocks base method.
func (m *MockdockerEngine) CheckDockerEngineRunning() error {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "CheckDockerEngineRunning")
ret0, _ := ret[0].(error)
return ret0
}
// CheckDockerEngineRunning indicates an expected call of CheckDockerEngineRunning.
func (mr *MockdockerEngineMockRecorder) CheckDockerEngineRunning() *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "CheckDockerEngineRunning", reflect.TypeOf((*MockdockerEngine)(nil).CheckDockerEngineRunning))
}
// GetPlatform mocks base method.
func (m *MockdockerEngine) GetPlatform() (string, string, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "GetPlatform")
ret0, _ := ret[0].(string)
ret1, _ := ret[1].(string)
ret2, _ := ret[2].(error)
return ret0, ret1, ret2
}
// GetPlatform indicates an expected call of GetPlatform.
func (mr *MockdockerEngineMockRecorder) GetPlatform() *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetPlatform", reflect.TypeOf((*MockdockerEngine)(nil).GetPlatform))
}
// Mockcodestar is a mock of codestar interface.
type Mockcodestar struct {
ctrl *gomock.Controller
recorder *MockcodestarMockRecorder
}
// MockcodestarMockRecorder is the mock recorder for Mockcodestar.
type MockcodestarMockRecorder struct {
mock *Mockcodestar
}
// NewMockcodestar creates a new mock instance.
func NewMockcodestar(ctrl *gomock.Controller) *Mockcodestar {
mock := &Mockcodestar{ctrl: ctrl}
mock.recorder = &MockcodestarMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *Mockcodestar) EXPECT() *MockcodestarMockRecorder {
return m.recorder
}
// GetConnectionARN mocks base method.
func (m *Mockcodestar) GetConnectionARN(arg0 string) (string, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "GetConnectionARN", arg0)
ret0, _ := ret[0].(string)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// GetConnectionARN indicates an expected call of GetConnectionARN.
func (mr *MockcodestarMockRecorder) GetConnectionARN(arg0 interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetConnectionARN", reflect.TypeOf((*Mockcodestar)(nil).GetConnectionARN), arg0)
}
// MockpublicIPGetter is a mock of publicIPGetter interface.
type MockpublicIPGetter struct {
ctrl *gomock.Controller
recorder *MockpublicIPGetterMockRecorder
}
// MockpublicIPGetterMockRecorder is the mock recorder for MockpublicIPGetter.
type MockpublicIPGetterMockRecorder struct {
mock *MockpublicIPGetter
}
// NewMockpublicIPGetter creates a new mock instance.
func NewMockpublicIPGetter(ctrl *gomock.Controller) *MockpublicIPGetter {
mock := &MockpublicIPGetter{ctrl: ctrl}
mock.recorder = &MockpublicIPGetterMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockpublicIPGetter) EXPECT() *MockpublicIPGetterMockRecorder {
return m.recorder
}
// PublicIP mocks base method.
func (m *MockpublicIPGetter) PublicIP(ENI string) (string, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "PublicIP", ENI)
ret0, _ := ret[0].(string)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// PublicIP indicates an expected call of PublicIP.
func (mr *MockpublicIPGetterMockRecorder) PublicIP(ENI interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "PublicIP", reflect.TypeOf((*MockpublicIPGetter)(nil).PublicIP), ENI)
}
// MockcliStringer is a mock of cliStringer interface.
type MockcliStringer struct {
ctrl *gomock.Controller
recorder *MockcliStringerMockRecorder
}
// MockcliStringerMockRecorder is the mock recorder for MockcliStringer.
type MockcliStringerMockRecorder struct {
mock *MockcliStringer
}
// NewMockcliStringer creates a new mock instance.
func NewMockcliStringer(ctrl *gomock.Controller) *MockcliStringer {
mock := &MockcliStringer{ctrl: ctrl}
mock.recorder = &MockcliStringerMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockcliStringer) EXPECT() *MockcliStringerMockRecorder {
return m.recorder
}
// CLIString mocks base method.
func (m *MockcliStringer) CLIString() (string, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "CLIString")
ret0, _ := ret[0].(string)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// CLIString indicates an expected call of CLIString.
func (mr *MockcliStringerMockRecorder) CLIString() *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "CLIString", reflect.TypeOf((*MockcliStringer)(nil).CLIString))
}
// MocksecretPutter is a mock of secretPutter interface.
type MocksecretPutter struct {
ctrl *gomock.Controller
recorder *MocksecretPutterMockRecorder
}
// MocksecretPutterMockRecorder is the mock recorder for MocksecretPutter.
type MocksecretPutterMockRecorder struct {
mock *MocksecretPutter
}
// NewMocksecretPutter creates a new mock instance.
func NewMocksecretPutter(ctrl *gomock.Controller) *MocksecretPutter {
mock := &MocksecretPutter{ctrl: ctrl}
mock.recorder = &MocksecretPutterMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MocksecretPutter) EXPECT() *MocksecretPutterMockRecorder {
return m.recorder
}
// PutSecret mocks base method.
func (m *MocksecretPutter) PutSecret(in ssm.PutSecretInput) (*ssm.PutSecretOutput, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "PutSecret", in)
ret0, _ := ret[0].(*ssm.PutSecretOutput)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// PutSecret indicates an expected call of PutSecret.
func (mr *MocksecretPutterMockRecorder) PutSecret(in interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "PutSecret", reflect.TypeOf((*MocksecretPutter)(nil).PutSecret), in)
}
// MockservicePauser is a mock of servicePauser interface.
type MockservicePauser struct {
ctrl *gomock.Controller
recorder *MockservicePauserMockRecorder
}
// MockservicePauserMockRecorder is the mock recorder for MockservicePauser.
type MockservicePauserMockRecorder struct {
mock *MockservicePauser
}
// NewMockservicePauser creates a new mock instance.
func NewMockservicePauser(ctrl *gomock.Controller) *MockservicePauser {
mock := &MockservicePauser{ctrl: ctrl}
mock.recorder = &MockservicePauserMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockservicePauser) EXPECT() *MockservicePauserMockRecorder {
return m.recorder
}
// PauseService mocks base method.
func (m *MockservicePauser) PauseService(svcARN string) error {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "PauseService", svcARN)
ret0, _ := ret[0].(error)
return ret0
}
// PauseService indicates an expected call of PauseService.
func (mr *MockservicePauserMockRecorder) PauseService(svcARN interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "PauseService", reflect.TypeOf((*MockservicePauser)(nil).PauseService), svcARN)
}
// Mockinterpolator is a mock of interpolator interface.
type Mockinterpolator struct {
ctrl *gomock.Controller
recorder *MockinterpolatorMockRecorder
}
// MockinterpolatorMockRecorder is the mock recorder for Mockinterpolator.
type MockinterpolatorMockRecorder struct {
mock *Mockinterpolator
}
// NewMockinterpolator creates a new mock instance.
func NewMockinterpolator(ctrl *gomock.Controller) *Mockinterpolator {
mock := &Mockinterpolator{ctrl: ctrl}
mock.recorder = &MockinterpolatorMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *Mockinterpolator) EXPECT() *MockinterpolatorMockRecorder {
return m.recorder
}
// Interpolate mocks base method.
func (m *Mockinterpolator) Interpolate(s string) (string, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "Interpolate", s)
ret0, _ := ret[0].(string)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// Interpolate indicates an expected call of Interpolate.
func (mr *MockinterpolatorMockRecorder) Interpolate(s interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Interpolate", reflect.TypeOf((*Mockinterpolator)(nil).Interpolate), s)
}
// MockworkloadDeployer is a mock of workloadDeployer interface.
type MockworkloadDeployer struct {
ctrl *gomock.Controller
recorder *MockworkloadDeployerMockRecorder
}
// MockworkloadDeployerMockRecorder is the mock recorder for MockworkloadDeployer.
type MockworkloadDeployerMockRecorder struct {
mock *MockworkloadDeployer
}
// NewMockworkloadDeployer creates a new mock instance.
func NewMockworkloadDeployer(ctrl *gomock.Controller) *MockworkloadDeployer {
mock := &MockworkloadDeployer{ctrl: ctrl}
mock.recorder = &MockworkloadDeployerMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockworkloadDeployer) EXPECT() *MockworkloadDeployerMockRecorder {
return m.recorder
}
// DeployDiff mocks base method.
func (m *MockworkloadDeployer) DeployDiff(inTmpl string) (string, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "DeployDiff", inTmpl)
ret0, _ := ret[0].(string)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// DeployDiff indicates an expected call of DeployDiff.
func (mr *MockworkloadDeployerMockRecorder) DeployDiff(inTmpl interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DeployDiff", reflect.TypeOf((*MockworkloadDeployer)(nil).DeployDiff), inTmpl)
}
// DeployWorkload mocks base method.
func (m *MockworkloadDeployer) DeployWorkload(in *deploy.DeployWorkloadInput) (deploy.ActionRecommender, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "DeployWorkload", in)
ret0, _ := ret[0].(deploy.ActionRecommender)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// DeployWorkload indicates an expected call of DeployWorkload.
func (mr *MockworkloadDeployerMockRecorder) DeployWorkload(in interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DeployWorkload", reflect.TypeOf((*MockworkloadDeployer)(nil).DeployWorkload), in)
}
// GenerateCloudFormationTemplate mocks base method.
func (m *MockworkloadDeployer) GenerateCloudFormationTemplate(in *deploy.GenerateCloudFormationTemplateInput) (*deploy.GenerateCloudFormationTemplateOutput, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "GenerateCloudFormationTemplate", in)
ret0, _ := ret[0].(*deploy.GenerateCloudFormationTemplateOutput)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// GenerateCloudFormationTemplate indicates an expected call of GenerateCloudFormationTemplate.
func (mr *MockworkloadDeployerMockRecorder) GenerateCloudFormationTemplate(in interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GenerateCloudFormationTemplate", reflect.TypeOf((*MockworkloadDeployer)(nil).GenerateCloudFormationTemplate), in)
}
// IsServiceAvailableInRegion mocks base method.
func (m *MockworkloadDeployer) IsServiceAvailableInRegion(region string) (bool, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "IsServiceAvailableInRegion", region)
ret0, _ := ret[0].(bool)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// IsServiceAvailableInRegion indicates an expected call of IsServiceAvailableInRegion.
func (mr *MockworkloadDeployerMockRecorder) IsServiceAvailableInRegion(region interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "IsServiceAvailableInRegion", reflect.TypeOf((*MockworkloadDeployer)(nil).IsServiceAvailableInRegion), region)
}
// UploadArtifacts mocks base method.
func (m *MockworkloadDeployer) UploadArtifacts() (*deploy.UploadArtifactsOutput, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "UploadArtifacts")
ret0, _ := ret[0].(*deploy.UploadArtifactsOutput)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// UploadArtifacts indicates an expected call of UploadArtifacts.
func (mr *MockworkloadDeployerMockRecorder) UploadArtifacts() *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "UploadArtifacts", reflect.TypeOf((*MockworkloadDeployer)(nil).UploadArtifacts))
}
// MocktemplateDiffer is a mock of templateDiffer interface.
type MocktemplateDiffer struct {
ctrl *gomock.Controller
recorder *MocktemplateDifferMockRecorder
}
// MocktemplateDifferMockRecorder is the mock recorder for MocktemplateDiffer.
type MocktemplateDifferMockRecorder struct {
mock *MocktemplateDiffer
}
// NewMocktemplateDiffer creates a new mock instance.
func NewMocktemplateDiffer(ctrl *gomock.Controller) *MocktemplateDiffer {
mock := &MocktemplateDiffer{ctrl: ctrl}
mock.recorder = &MocktemplateDifferMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MocktemplateDiffer) EXPECT() *MocktemplateDifferMockRecorder {
return m.recorder
}
// DeployDiff mocks base method.
func (m *MocktemplateDiffer) DeployDiff(inTmpl string) (string, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "DeployDiff", inTmpl)
ret0, _ := ret[0].(string)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// DeployDiff indicates an expected call of DeployDiff.
func (mr *MocktemplateDifferMockRecorder) DeployDiff(inTmpl interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DeployDiff", reflect.TypeOf((*MocktemplateDiffer)(nil).DeployDiff), inTmpl)
}
// MockworkloadStackGenerator is a mock of workloadStackGenerator interface.
type MockworkloadStackGenerator struct {
ctrl *gomock.Controller
recorder *MockworkloadStackGeneratorMockRecorder
}
// MockworkloadStackGeneratorMockRecorder is the mock recorder for MockworkloadStackGenerator.
type MockworkloadStackGeneratorMockRecorder struct {
mock *MockworkloadStackGenerator
}
// NewMockworkloadStackGenerator creates a new mock instance.
func NewMockworkloadStackGenerator(ctrl *gomock.Controller) *MockworkloadStackGenerator {
mock := &MockworkloadStackGenerator{ctrl: ctrl}
mock.recorder = &MockworkloadStackGeneratorMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockworkloadStackGenerator) EXPECT() *MockworkloadStackGeneratorMockRecorder {
return m.recorder
}
// AddonsTemplate mocks base method.
func (m *MockworkloadStackGenerator) AddonsTemplate() (string, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "AddonsTemplate")
ret0, _ := ret[0].(string)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// AddonsTemplate indicates an expected call of AddonsTemplate.
func (mr *MockworkloadStackGeneratorMockRecorder) AddonsTemplate() *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "AddonsTemplate", reflect.TypeOf((*MockworkloadStackGenerator)(nil).AddonsTemplate))
}
// DeployDiff mocks base method.
func (m *MockworkloadStackGenerator) DeployDiff(inTmpl string) (string, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "DeployDiff", inTmpl)
ret0, _ := ret[0].(string)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// DeployDiff indicates an expected call of DeployDiff.
func (mr *MockworkloadStackGeneratorMockRecorder) DeployDiff(inTmpl interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DeployDiff", reflect.TypeOf((*MockworkloadStackGenerator)(nil).DeployDiff), inTmpl)
}
// GenerateCloudFormationTemplate mocks base method.
func (m *MockworkloadStackGenerator) GenerateCloudFormationTemplate(in *deploy.GenerateCloudFormationTemplateInput) (*deploy.GenerateCloudFormationTemplateOutput, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "GenerateCloudFormationTemplate", in)
ret0, _ := ret[0].(*deploy.GenerateCloudFormationTemplateOutput)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// GenerateCloudFormationTemplate indicates an expected call of GenerateCloudFormationTemplate.
func (mr *MockworkloadStackGeneratorMockRecorder) GenerateCloudFormationTemplate(in interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GenerateCloudFormationTemplate", reflect.TypeOf((*MockworkloadStackGenerator)(nil).GenerateCloudFormationTemplate), in)
}
// UploadArtifacts mocks base method.
func (m *MockworkloadStackGenerator) UploadArtifacts() (*deploy.UploadArtifactsOutput, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "UploadArtifacts")
ret0, _ := ret[0].(*deploy.UploadArtifactsOutput)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// UploadArtifacts indicates an expected call of UploadArtifacts.
func (mr *MockworkloadStackGeneratorMockRecorder) UploadArtifacts() *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "UploadArtifacts", reflect.TypeOf((*MockworkloadStackGenerator)(nil).UploadArtifacts))
}
// Mockrunner is a mock of runner interface.
type Mockrunner struct {
ctrl *gomock.Controller
recorder *MockrunnerMockRecorder
}
// MockrunnerMockRecorder is the mock recorder for Mockrunner.
type MockrunnerMockRecorder struct {
mock *Mockrunner
}
// NewMockrunner creates a new mock instance.
func NewMockrunner(ctrl *gomock.Controller) *Mockrunner {
mock := &Mockrunner{ctrl: ctrl}
mock.recorder = &MockrunnerMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *Mockrunner) EXPECT() *MockrunnerMockRecorder {
return m.recorder
}
// Run mocks base method.
func (m *Mockrunner) Run() error {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "Run")
ret0, _ := ret[0].(error)
return ret0
}
// Run indicates an expected call of Run.
func (mr *MockrunnerMockRecorder) Run() *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Run", reflect.TypeOf((*Mockrunner)(nil).Run))
}
// MockenvDeployer is a mock of envDeployer interface.
type MockenvDeployer struct {
ctrl *gomock.Controller
recorder *MockenvDeployerMockRecorder
}
// MockenvDeployerMockRecorder is the mock recorder for MockenvDeployer.
type MockenvDeployerMockRecorder struct {
mock *MockenvDeployer
}
// NewMockenvDeployer creates a new mock instance.
func NewMockenvDeployer(ctrl *gomock.Controller) *MockenvDeployer {
mock := &MockenvDeployer{ctrl: ctrl}
mock.recorder = &MockenvDeployerMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockenvDeployer) EXPECT() *MockenvDeployerMockRecorder {
return m.recorder
}
// DeployDiff mocks base method.
func (m *MockenvDeployer) DeployDiff(inTmpl string) (string, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "DeployDiff", inTmpl)
ret0, _ := ret[0].(string)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// DeployDiff indicates an expected call of DeployDiff.
func (mr *MockenvDeployerMockRecorder) DeployDiff(inTmpl interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DeployDiff", reflect.TypeOf((*MockenvDeployer)(nil).DeployDiff), inTmpl)
}
// DeployEnvironment mocks base method.
func (m *MockenvDeployer) DeployEnvironment(in *deploy.DeployEnvironmentInput) error {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "DeployEnvironment", in)
ret0, _ := ret[0].(error)
return ret0
}
// DeployEnvironment indicates an expected call of DeployEnvironment.
func (mr *MockenvDeployerMockRecorder) DeployEnvironment(in interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DeployEnvironment", reflect.TypeOf((*MockenvDeployer)(nil).DeployEnvironment), in)
}
// GenerateCloudFormationTemplate mocks base method.
func (m *MockenvDeployer) GenerateCloudFormationTemplate(in *deploy.DeployEnvironmentInput) (*deploy.GenerateCloudFormationTemplateOutput, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "GenerateCloudFormationTemplate", in)
ret0, _ := ret[0].(*deploy.GenerateCloudFormationTemplateOutput)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// GenerateCloudFormationTemplate indicates an expected call of GenerateCloudFormationTemplate.
func (mr *MockenvDeployerMockRecorder) GenerateCloudFormationTemplate(in interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GenerateCloudFormationTemplate", reflect.TypeOf((*MockenvDeployer)(nil).GenerateCloudFormationTemplate), in)
}
// UploadArtifacts mocks base method.
func (m *MockenvDeployer) UploadArtifacts() (*deploy.UploadEnvArtifactsOutput, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "UploadArtifacts")
ret0, _ := ret[0].(*deploy.UploadEnvArtifactsOutput)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// UploadArtifacts indicates an expected call of UploadArtifacts.
func (mr *MockenvDeployerMockRecorder) UploadArtifacts() *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "UploadArtifacts", reflect.TypeOf((*MockenvDeployer)(nil).UploadArtifacts))
}
// Validate mocks base method.
func (m *MockenvDeployer) Validate(arg0 *manifest.Environment) error {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "Validate", arg0)
ret0, _ := ret[0].(error)
return ret0
}
// Validate indicates an expected call of Validate.
func (mr *MockenvDeployerMockRecorder) Validate(arg0 interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Validate", reflect.TypeOf((*MockenvDeployer)(nil).Validate), arg0)
}
// MockenvPackager is a mock of envPackager interface.
type MockenvPackager struct {
ctrl *gomock.Controller
recorder *MockenvPackagerMockRecorder
}
// MockenvPackagerMockRecorder is the mock recorder for MockenvPackager.
type MockenvPackagerMockRecorder struct {
mock *MockenvPackager
}
// NewMockenvPackager creates a new mock instance.
func NewMockenvPackager(ctrl *gomock.Controller) *MockenvPackager {
mock := &MockenvPackager{ctrl: ctrl}
mock.recorder = &MockenvPackagerMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockenvPackager) EXPECT() *MockenvPackagerMockRecorder {
return m.recorder
}
// AddonsTemplate mocks base method.
func (m *MockenvPackager) AddonsTemplate() (string, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "AddonsTemplate")
ret0, _ := ret[0].(string)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// AddonsTemplate indicates an expected call of AddonsTemplate.
func (mr *MockenvPackagerMockRecorder) AddonsTemplate() *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "AddonsTemplate", reflect.TypeOf((*MockenvPackager)(nil).AddonsTemplate))
}
// DeployDiff mocks base method.
func (m *MockenvPackager) DeployDiff(inTmpl string) (string, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "DeployDiff", inTmpl)
ret0, _ := ret[0].(string)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// DeployDiff indicates an expected call of DeployDiff.
func (mr *MockenvPackagerMockRecorder) DeployDiff(inTmpl interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DeployDiff", reflect.TypeOf((*MockenvPackager)(nil).DeployDiff), inTmpl)
}
// GenerateCloudFormationTemplate mocks base method.
func (m *MockenvPackager) GenerateCloudFormationTemplate(in *deploy.DeployEnvironmentInput) (*deploy.GenerateCloudFormationTemplateOutput, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "GenerateCloudFormationTemplate", in)
ret0, _ := ret[0].(*deploy.GenerateCloudFormationTemplateOutput)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// GenerateCloudFormationTemplate indicates an expected call of GenerateCloudFormationTemplate.
func (mr *MockenvPackagerMockRecorder) GenerateCloudFormationTemplate(in interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GenerateCloudFormationTemplate", reflect.TypeOf((*MockenvPackager)(nil).GenerateCloudFormationTemplate), in)
}
// UploadArtifacts mocks base method.
func (m *MockenvPackager) UploadArtifacts() (*deploy.UploadEnvArtifactsOutput, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "UploadArtifacts")
ret0, _ := ret[0].(*deploy.UploadEnvArtifactsOutput)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// UploadArtifacts indicates an expected call of UploadArtifacts.
func (mr *MockenvPackagerMockRecorder) UploadArtifacts() *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "UploadArtifacts", reflect.TypeOf((*MockenvPackager)(nil).UploadArtifacts))
}
// Validate mocks base method.
func (m *MockenvPackager) Validate(arg0 *manifest.Environment) error {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "Validate", arg0)
ret0, _ := ret[0].(error)
return ret0
}
// Validate indicates an expected call of Validate.
func (mr *MockenvPackagerMockRecorder) Validate(arg0 interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Validate", reflect.TypeOf((*MockenvPackager)(nil).Validate), arg0)
}
// MockpipelineStackConfig is a mock of pipelineStackConfig interface.
type MockpipelineStackConfig struct {
ctrl *gomock.Controller
recorder *MockpipelineStackConfigMockRecorder
}
// MockpipelineStackConfigMockRecorder is the mock recorder for MockpipelineStackConfig.
type MockpipelineStackConfigMockRecorder struct {
mock *MockpipelineStackConfig
}
// NewMockpipelineStackConfig creates a new mock instance.
func NewMockpipelineStackConfig(ctrl *gomock.Controller) *MockpipelineStackConfig {
mock := &MockpipelineStackConfig{ctrl: ctrl}
mock.recorder = &MockpipelineStackConfigMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockpipelineStackConfig) EXPECT() *MockpipelineStackConfigMockRecorder {
return m.recorder
}
// Template mocks base method.
func (m *MockpipelineStackConfig) Template() (string, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "Template")
ret0, _ := ret[0].(string)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// Template indicates an expected call of Template.
func (mr *MockpipelineStackConfigMockRecorder) Template() *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Template", reflect.TypeOf((*MockpipelineStackConfig)(nil).Template))
}
| 7,704 |
copilot-cli | aws | Go | // Code generated by MockGen. DO NOT EDIT.
// Source: ./internal/pkg/cli/progress.go
// Package mocks is a generated GoMock package.
package mocks
import (
reflect "reflect"
gomock "github.com/golang/mock/gomock"
)
// Mockprogress is a mock of progress interface.
type Mockprogress struct {
ctrl *gomock.Controller
recorder *MockprogressMockRecorder
}
// MockprogressMockRecorder is the mock recorder for Mockprogress.
type MockprogressMockRecorder struct {
mock *Mockprogress
}
// NewMockprogress creates a new mock instance.
func NewMockprogress(ctrl *gomock.Controller) *Mockprogress {
mock := &Mockprogress{ctrl: ctrl}
mock.recorder = &MockprogressMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *Mockprogress) EXPECT() *MockprogressMockRecorder {
return m.recorder
}
// Start mocks base method.
func (m *Mockprogress) Start(label string) {
m.ctrl.T.Helper()
m.ctrl.Call(m, "Start", label)
}
// Start indicates an expected call of Start.
func (mr *MockprogressMockRecorder) Start(label interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Start", reflect.TypeOf((*Mockprogress)(nil).Start), label)
}
// Stop mocks base method.
func (m *Mockprogress) Stop(label string) {
m.ctrl.T.Helper()
m.ctrl.Call(m, "Stop", label)
}
// Stop indicates an expected call of Stop.
func (mr *MockprogressMockRecorder) Stop(label interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Stop", reflect.TypeOf((*Mockprogress)(nil).Stop), label)
}
| 59 |
copilot-cli | aws | Go | // Code generated by MockGen. DO NOT EDIT.
// Source: ./internal/pkg/cli/prompter.go
// Package mocks is a generated GoMock package.
package mocks
import (
reflect "reflect"
prompt "github.com/aws/copilot-cli/internal/pkg/term/prompt"
gomock "github.com/golang/mock/gomock"
)
// Mockprompter is a mock of prompter interface.
type Mockprompter struct {
ctrl *gomock.Controller
recorder *MockprompterMockRecorder
}
// MockprompterMockRecorder is the mock recorder for Mockprompter.
type MockprompterMockRecorder struct {
mock *Mockprompter
}
// NewMockprompter creates a new mock instance.
func NewMockprompter(ctrl *gomock.Controller) *Mockprompter {
mock := &Mockprompter{ctrl: ctrl}
mock.recorder = &MockprompterMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *Mockprompter) EXPECT() *MockprompterMockRecorder {
return m.recorder
}
// Confirm mocks base method.
func (m *Mockprompter) Confirm(message, help string, promptOpts ...prompt.PromptConfig) (bool, error) {
m.ctrl.T.Helper()
varargs := []interface{}{message, help}
for _, a := range promptOpts {
varargs = append(varargs, a)
}
ret := m.ctrl.Call(m, "Confirm", varargs...)
ret0, _ := ret[0].(bool)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// Confirm indicates an expected call of Confirm.
func (mr *MockprompterMockRecorder) Confirm(message, help interface{}, promptOpts ...interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
varargs := append([]interface{}{message, help}, promptOpts...)
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Confirm", reflect.TypeOf((*Mockprompter)(nil).Confirm), varargs...)
}
// Get mocks base method.
func (m *Mockprompter) Get(message, help string, validator prompt.ValidatorFunc, promptOpts ...prompt.PromptConfig) (string, error) {
m.ctrl.T.Helper()
varargs := []interface{}{message, help, validator}
for _, a := range promptOpts {
varargs = append(varargs, a)
}
ret := m.ctrl.Call(m, "Get", varargs...)
ret0, _ := ret[0].(string)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// Get indicates an expected call of Get.
func (mr *MockprompterMockRecorder) Get(message, help, validator interface{}, promptOpts ...interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
varargs := append([]interface{}{message, help, validator}, promptOpts...)
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Get", reflect.TypeOf((*Mockprompter)(nil).Get), varargs...)
}
// GetSecret mocks base method.
func (m *Mockprompter) GetSecret(message, help string, promptOpts ...prompt.PromptConfig) (string, error) {
m.ctrl.T.Helper()
varargs := []interface{}{message, help}
for _, a := range promptOpts {
varargs = append(varargs, a)
}
ret := m.ctrl.Call(m, "GetSecret", varargs...)
ret0, _ := ret[0].(string)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// GetSecret indicates an expected call of GetSecret.
func (mr *MockprompterMockRecorder) GetSecret(message, help interface{}, promptOpts ...interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
varargs := append([]interface{}{message, help}, promptOpts...)
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetSecret", reflect.TypeOf((*Mockprompter)(nil).GetSecret), varargs...)
}
// MultiSelect mocks base method.
func (m *Mockprompter) MultiSelect(message, help string, options []string, validator prompt.ValidatorFunc, promptOpts ...prompt.PromptConfig) ([]string, error) {
m.ctrl.T.Helper()
varargs := []interface{}{message, help, options, validator}
for _, a := range promptOpts {
varargs = append(varargs, a)
}
ret := m.ctrl.Call(m, "MultiSelect", varargs...)
ret0, _ := ret[0].([]string)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// MultiSelect indicates an expected call of MultiSelect.
func (mr *MockprompterMockRecorder) MultiSelect(message, help, options, validator interface{}, promptOpts ...interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
varargs := append([]interface{}{message, help, options, validator}, promptOpts...)
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "MultiSelect", reflect.TypeOf((*Mockprompter)(nil).MultiSelect), varargs...)
}
// MultiSelectOptions mocks base method.
func (m *Mockprompter) MultiSelectOptions(message, help string, opts []prompt.Option, promptCfgs ...prompt.PromptConfig) ([]string, error) {
m.ctrl.T.Helper()
varargs := []interface{}{message, help, opts}
for _, a := range promptCfgs {
varargs = append(varargs, a)
}
ret := m.ctrl.Call(m, "MultiSelectOptions", varargs...)
ret0, _ := ret[0].([]string)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// MultiSelectOptions indicates an expected call of MultiSelectOptions.
func (mr *MockprompterMockRecorder) MultiSelectOptions(message, help, opts interface{}, promptCfgs ...interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
varargs := append([]interface{}{message, help, opts}, promptCfgs...)
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "MultiSelectOptions", reflect.TypeOf((*Mockprompter)(nil).MultiSelectOptions), varargs...)
}
// SelectOne mocks base method.
func (m *Mockprompter) SelectOne(message, help string, options []string, promptOpts ...prompt.PromptConfig) (string, error) {
m.ctrl.T.Helper()
varargs := []interface{}{message, help, options}
for _, a := range promptOpts {
varargs = append(varargs, a)
}
ret := m.ctrl.Call(m, "SelectOne", varargs...)
ret0, _ := ret[0].(string)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// SelectOne indicates an expected call of SelectOne.
func (mr *MockprompterMockRecorder) SelectOne(message, help, options interface{}, promptOpts ...interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
varargs := append([]interface{}{message, help, options}, promptOpts...)
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "SelectOne", reflect.TypeOf((*Mockprompter)(nil).SelectOne), varargs...)
}
// SelectOption mocks base method.
func (m *Mockprompter) SelectOption(message, help string, opts []prompt.Option, promptCfgs ...prompt.PromptConfig) (string, error) {
m.ctrl.T.Helper()
varargs := []interface{}{message, help, opts}
for _, a := range promptCfgs {
varargs = append(varargs, a)
}
ret := m.ctrl.Call(m, "SelectOption", varargs...)
ret0, _ := ret[0].(string)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// SelectOption indicates an expected call of SelectOption.
func (mr *MockprompterMockRecorder) SelectOption(message, help, opts interface{}, promptCfgs ...interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
varargs := append([]interface{}{message, help, opts}, promptCfgs...)
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "SelectOption", reflect.TypeOf((*Mockprompter)(nil).SelectOption), varargs...)
}
| 176 |
copilot-cli | aws | Go | // Code generated by MockGen. DO NOT EDIT.
// Source: ./internal/pkg/cli/env_delete.go
// Package mocks is a generated GoMock package.
package mocks
import (
reflect "reflect"
resourcegroupstaggingapi "github.com/aws/aws-sdk-go/service/resourcegroupstaggingapi"
gomock "github.com/golang/mock/gomock"
)
// MockresourceGetter is a mock of resourceGetter interface.
type MockresourceGetter struct {
ctrl *gomock.Controller
recorder *MockresourceGetterMockRecorder
}
// MockresourceGetterMockRecorder is the mock recorder for MockresourceGetter.
type MockresourceGetterMockRecorder struct {
mock *MockresourceGetter
}
// NewMockresourceGetter creates a new mock instance.
func NewMockresourceGetter(ctrl *gomock.Controller) *MockresourceGetter {
mock := &MockresourceGetter{ctrl: ctrl}
mock.recorder = &MockresourceGetterMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockresourceGetter) EXPECT() *MockresourceGetterMockRecorder {
return m.recorder
}
// GetResources mocks base method.
func (m *MockresourceGetter) GetResources(arg0 *resourcegroupstaggingapi.GetResourcesInput) (*resourcegroupstaggingapi.GetResourcesOutput, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "GetResources", arg0)
ret0, _ := ret[0].(*resourcegroupstaggingapi.GetResourcesOutput)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// GetResources indicates an expected call of GetResources.
func (mr *MockresourceGetterMockRecorder) GetResources(arg0 interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetResources", reflect.TypeOf((*MockresourceGetter)(nil).GetResources), arg0)
}
| 51 |
copilot-cli | aws | Go | // Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
// SPDX-License-Identifier: Apache-2.0
package config
import (
"encoding/json"
"fmt"
"github.com/aws/aws-sdk-go/aws"
"github.com/aws/aws-sdk-go/aws/awserr"
"github.com/aws/aws-sdk-go/service/ssm"
)
// Application is a named collection of environments and services.
type Application struct {
Name string `json:"name"` // Name of an Application. Must be unique amongst other apps in the same account.
AccountID string `json:"account"` // AccountID this app is mastered in.
PermissionsBoundary string `json:"permissionsBoundary,omitempty"` // Existing IAM permissions boundary.
Domain string `json:"domain"` // Existing domain name in Route53. An empty domain name means the user does not have one.
DomainHostedZoneID string `json:"domainHostedZoneID"` // Existing domain hosted zone in Route53. An empty domain name means the user does not have one.
Version string `json:"version"` // The version of the app layout in the underlying datastore (e.g. SSM).
Tags map[string]string `json:"tags,omitempty"` // Labels to apply to resources created within the app.
}
// CreateApplication instantiates a new application, validates its uniqueness and stores it in SSM.
func (s *Store) CreateApplication(application *Application) error {
applicationPath := fmt.Sprintf(fmtApplicationPath, application.Name)
application.Version = schemaVersion
data, err := marshal(application)
if err != nil {
return fmt.Errorf("serializing application %s: %w", application.Name, err)
}
_, err = s.ssm.PutParameter(&ssm.PutParameterInput{
Name: aws.String(applicationPath),
Description: aws.String("Copilot Application"),
Type: aws.String(ssm.ParameterTypeString),
Value: aws.String(data),
Tags: []*ssm.Tag{
{
Key: aws.String("copilot-application"),
Value: aws.String(application.Name),
},
},
})
if err != nil {
if aerr, ok := err.(awserr.Error); ok {
switch aerr.Code() {
case ssm.ErrCodeParameterAlreadyExists:
return nil
}
}
return fmt.Errorf("create application %s: %w", application.Name, err)
}
return nil
}
// UpdateApplication updates the data in SSM about an application.
func (s *Store) UpdateApplication(application *Application) error {
applicationPath := fmt.Sprintf(fmtApplicationPath, application.Name)
application.Version = schemaVersion
data, err := marshal(application)
if err != nil {
return fmt.Errorf("serializing application %s: %w", application.Name, err)
}
if _, err = s.ssm.PutParameter(&ssm.PutParameterInput{
Name: aws.String(applicationPath),
Description: aws.String("Copilot Application"),
Type: aws.String(ssm.ParameterTypeString),
Value: aws.String(data),
Overwrite: aws.Bool(true),
}); err != nil {
return fmt.Errorf("update application %s: %w", application.Name, err)
}
return nil
}
// GetApplication fetches an application by name. If it can't be found, return a ErrNoSuchApplication
func (s *Store) GetApplication(applicationName string) (*Application, error) {
applicationPath := fmt.Sprintf(fmtApplicationPath, applicationName)
applicationParam, err := s.ssm.GetParameter(&ssm.GetParameterInput{
Name: aws.String(applicationPath),
})
if err != nil {
if aerr, ok := err.(awserr.Error); ok {
switch aerr.Code() {
case ssm.ErrCodeParameterNotFound:
account, region := s.getCallerAccountAndRegion()
return nil, &ErrNoSuchApplication{
ApplicationName: applicationName,
AccountID: account,
Region: region,
}
}
}
return nil, fmt.Errorf("get application %s: %w", applicationName, err)
}
var application Application
if err := json.Unmarshal([]byte(*applicationParam.Parameter.Value), &application); err != nil {
return nil, fmt.Errorf("read configuration for application %s: %w", applicationName, err)
}
return &application, nil
}
// ListApplications returns the list of existing applications in the customer's account and region.
func (s *Store) ListApplications() ([]*Application, error) {
var applications []*Application
serializedApplications, err := s.listParams(rootApplicationPath)
if err != nil {
return nil, fmt.Errorf("list applications: %w", err)
}
for _, serializedApplication := range serializedApplications {
var application Application
if err := json.Unmarshal([]byte(*serializedApplication), &application); err != nil {
return nil, fmt.Errorf("read application configuration: %w", err)
}
applications = append(applications, &application)
}
return applications, nil
}
// DeleteApplication deletes the SSM parameter related to the application.
func (s *Store) DeleteApplication(name string) error {
paramName := fmt.Sprintf(fmtApplicationPath, name)
_, err := s.ssm.DeleteParameter(&ssm.DeleteParameterInput{
Name: aws.String(paramName),
})
if err != nil {
awserr, ok := err.(awserr.Error)
if !ok {
return err
}
if awserr.Code() == ssm.ErrCodeParameterNotFound {
return nil
}
return fmt.Errorf("delete SSM param %s: %w", paramName, awserr)
}
return nil
}
| 153 |
copilot-cli | aws | Go | // Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
// SPDX-License-Identifier: Apache-2.0
package config
import (
"errors"
"fmt"
"testing"
"github.com/aws/aws-sdk-go/aws"
"github.com/aws/aws-sdk-go/aws/awserr"
"github.com/aws/aws-sdk-go/service/ssm"
"github.com/aws/copilot-cli/internal/pkg/aws/identity"
"github.com/stretchr/testify/require"
)
func TestStore_ListApplications(t *testing.T) {
testApplication := Application{Name: "chicken", Version: "1.0"}
testApplicationString, err := marshal(testApplication)
require.NoError(t, err, "Marshal application should not fail")
cowApplication := Application{Name: "cow", Version: "1.0"}
cowApplicationString, err := marshal(cowApplication)
require.NoError(t, err, "Marshal application should not fail")
lastPageInPaginatedResp := false
testCases := map[string]struct {
mockGetParametersByPath func(t *testing.T, param *ssm.GetParametersByPathInput) (*ssm.GetParametersByPathOutput, error)
wantedApplicationNames []string
wantedErr error
}{
"with multiple existing applications": {
mockGetParametersByPath: func(t *testing.T, param *ssm.GetParametersByPathInput) (output *ssm.GetParametersByPathOutput, e error) {
require.Equal(t, rootApplicationPath, *param.Path)
return &ssm.GetParametersByPathOutput{
Parameters: []*ssm.Parameter{
{
Name: aws.String("/copilot/applications/chicken"),
Value: aws.String(testApplicationString),
},
{
Name: aws.String("/copilot/applications/cow"),
Value: aws.String(cowApplicationString),
},
},
}, nil
},
wantedApplicationNames: []string{"chicken", "cow"},
wantedErr: nil,
},
"with malformed json": {
mockGetParametersByPath: func(t *testing.T, param *ssm.GetParametersByPathInput) (output *ssm.GetParametersByPathOutput, e error) {
require.Equal(t, rootApplicationPath, *param.Path)
return &ssm.GetParametersByPathOutput{
Parameters: []*ssm.Parameter{
{
Name: aws.String("/copilot/applications/chicken"),
Value: aws.String("oops"),
},
},
}, nil
},
wantedErr: fmt.Errorf("read application configuration: invalid character 'o' looking for beginning of value"),
},
"with SSM error": {
mockGetParametersByPath: func(t *testing.T, param *ssm.GetParametersByPathInput) (output *ssm.GetParametersByPathOutput, e error) {
require.Equal(t, rootApplicationPath, *param.Path)
return nil, fmt.Errorf("broken")
},
wantedApplicationNames: nil,
wantedErr: fmt.Errorf("list applications: broken"),
},
"with paginated response": {
mockGetParametersByPath: func(t *testing.T, param *ssm.GetParametersByPathInput) (output *ssm.GetParametersByPathOutput, e error) {
require.Equal(t, rootApplicationPath, *param.Path)
// this closure references the `lastPageInPaginatedResp` variable
// in order to determine the content of the response.
if !lastPageInPaginatedResp {
lastPageInPaginatedResp = true
return &ssm.GetParametersByPathOutput{
Parameters: []*ssm.Parameter{
{
Name: aws.String("/copilot/applications/chicken"),
Value: aws.String(testApplicationString),
},
},
NextToken: aws.String("more"),
}, nil
}
return &ssm.GetParametersByPathOutput{
Parameters: []*ssm.Parameter{
{
Name: aws.String("/copilot/applications/cow"),
Value: aws.String(cowApplicationString),
},
},
}, nil
},
wantedApplicationNames: []string{"chicken", "cow"},
wantedErr: nil,
},
}
for name, tc := range testCases {
t.Run(name, func(t *testing.T) {
// GIVEN
lastPageInPaginatedResp = false
store := &Store{
ssm: &mockSSM{
t: t,
mockGetParametersByPath: tc.mockGetParametersByPath,
},
}
// WHEN
apps, err := store.ListApplications()
// THEN
if tc.wantedErr != nil {
require.EqualError(t, err, tc.wantedErr.Error())
} else {
var names []string
for _, a := range apps {
names = append(names, a.Name)
}
require.ElementsMatch(t, tc.wantedApplicationNames, names)
}
})
}
}
func TestStore_GetApplication(t *testing.T) {
testApplication := Application{Name: "chicken", AccountID: "1234", Version: "1.0"}
testApplicationString, err := marshal(testApplication)
testApplicationPath := fmt.Sprintf(fmtApplicationPath, testApplication.Name)
require.NoError(t, err, "Marshal application should not fail")
testCases := map[string]struct {
mockGetParameter func(t *testing.T, param *ssm.GetParameterInput) (*ssm.GetParameterOutput, error)
mockIdentityServiceGet func() (identity.Caller, error)
wantedApplication Application
wantedErr error
}{
"with existing application": {
mockGetParameter: func(t *testing.T, param *ssm.GetParameterInput) (*ssm.GetParameterOutput, error) {
require.Equal(t, testApplicationPath, *param.Name)
return &ssm.GetParameterOutput{
Parameter: &ssm.Parameter{
Name: aws.String(testApplicationPath),
Value: aws.String(testApplicationString),
},
}, nil
},
wantedApplication: testApplication,
wantedErr: nil,
},
"with no existing application": {
mockGetParameter: func(t *testing.T, param *ssm.GetParameterInput) (*ssm.GetParameterOutput, error) {
require.Equal(t, testApplicationPath, *param.Name)
return nil, awserr.New(ssm.ErrCodeParameterNotFound, "No Parameter", fmt.Errorf("No Parameter"))
},
mockIdentityServiceGet: func() (identity.Caller, error) {
return identity.Caller{
Account: "12345",
}, nil
},
wantedErr: &ErrNoSuchApplication{
ApplicationName: "chicken",
AccountID: "12345",
Region: "us-west-2",
},
},
"with no existing application and failed STS call": {
mockGetParameter: func(t *testing.T, param *ssm.GetParameterInput) (*ssm.GetParameterOutput, error) {
require.Equal(t, testApplicationPath, *param.Name)
return nil, awserr.New(ssm.ErrCodeParameterNotFound, "No Parameter", fmt.Errorf("No Parameter"))
},
mockIdentityServiceGet: func() (identity.Caller, error) {
return identity.Caller{}, fmt.Errorf("Error")
},
wantedErr: &ErrNoSuchApplication{
ApplicationName: "chicken",
AccountID: "unknown",
Region: "us-west-2",
},
},
"with malformed json": {
mockGetParameter: func(t *testing.T, param *ssm.GetParameterInput) (*ssm.GetParameterOutput, error) {
require.Equal(t, testApplicationPath, *param.Name)
return &ssm.GetParameterOutput{
Parameter: &ssm.Parameter{
Name: aws.String(testApplicationPath),
Value: aws.String("oops"),
},
}, nil
},
wantedErr: fmt.Errorf("read configuration for application chicken: invalid character 'o' looking for beginning of value"),
},
"with SSM error": {
mockGetParameter: func(t *testing.T, param *ssm.GetParameterInput) (*ssm.GetParameterOutput, error) {
require.Equal(t, testApplicationPath, *param.Name)
return nil, fmt.Errorf("broken")
},
wantedErr: fmt.Errorf("get application chicken: broken"),
},
}
for name, tc := range testCases {
t.Run(name, func(t *testing.T) {
// GIVEN
store := &Store{
ssm: &mockSSM{
t: t,
mockGetParameter: tc.mockGetParameter,
},
sts: mockIdentityService{
mockIdentityServiceGet: tc.mockIdentityServiceGet,
},
appRegion: "us-west-2",
}
// WHEN
app, err := store.GetApplication("chicken")
// THEN
if tc.wantedErr != nil {
require.EqualError(t, err, tc.wantedErr.Error())
} else {
require.Equal(t, tc.wantedApplication, *app)
}
})
}
}
func TestStore_CreateApplication(t *testing.T) {
tagForApplicationParam := []*ssm.Tag{
{
Key: aws.String("copilot-application"),
Value: aws.String("phonetool"),
},
}
testCases := map[string]struct {
inApplication *Application
mockPutParameter func(t *testing.T, param *ssm.PutParameterInput) (*ssm.PutParameterOutput, error)
wantedErr error
}{
"with no existing application": {
inApplication: &Application{Name: "phonetool", AccountID: "1234", Domain: "phonetool.com", DomainHostedZoneID: "mockHostedZoneID", Tags: map[string]string{"owner": "boss"}},
mockPutParameter: func(t *testing.T, param *ssm.PutParameterInput) (*ssm.PutParameterOutput, error) {
require.Equal(t, fmt.Sprintf(fmtApplicationPath, "phonetool"), *param.Name)
require.Equal(t, fmt.Sprintf(`{"name":"phonetool","account":"1234","domain":"phonetool.com","domainHostedZoneID":"mockHostedZoneID","version":"%s","tags":{"owner":"boss"}}`, schemaVersion), *param.Value)
require.Equal(t, tagForApplicationParam, param.Tags)
return &ssm.PutParameterOutput{
Version: aws.Int64(1),
}, nil
},
wantedErr: nil,
},
"with existing application": {
inApplication: &Application{Name: "phonetool", AccountID: "1234"},
mockPutParameter: func(t *testing.T, param *ssm.PutParameterInput) (*ssm.PutParameterOutput, error) {
require.Equal(t, tagForApplicationParam, param.Tags)
return nil, awserr.New(ssm.ErrCodeParameterAlreadyExists, "Already exists", fmt.Errorf("Already Exists"))
},
wantedErr: nil,
},
"with SSM error": {
inApplication: &Application{Name: "phonetool", AccountID: "1234"},
mockPutParameter: func(t *testing.T, param *ssm.PutParameterInput) (*ssm.PutParameterOutput, error) {
require.Equal(t, tagForApplicationParam, param.Tags)
return nil, fmt.Errorf("broken")
},
wantedErr: fmt.Errorf("create application phonetool: broken"),
},
}
for name, tc := range testCases {
t.Run(name, func(t *testing.T) {
store := &Store{
ssm: &mockSSM{
t: t,
mockPutParameter: tc.mockPutParameter,
},
}
// WHEN
err := store.CreateApplication(tc.inApplication)
// THEN
if tc.wantedErr != nil {
require.EqualError(t, err, tc.wantedErr.Error())
} else {
require.NoError(t, err)
}
})
}
}
func TestStore_UpdateApplication(t *testing.T) {
testCases := map[string]struct {
inApplication *Application
mockPutParameter func(t *testing.T, param *ssm.PutParameterInput) (*ssm.PutParameterOutput, error)
wantedErr error
}{
"success": {
inApplication: &Application{Name: "phonetool", AccountID: "1234", Domain: "phonetool.com", DomainHostedZoneID: "mockHostedZoneID", Tags: map[string]string{"owner": "boss"}},
mockPutParameter: func(t *testing.T, param *ssm.PutParameterInput) (*ssm.PutParameterOutput, error) {
require.Equal(t, fmt.Sprintf(fmtApplicationPath, "phonetool"), *param.Name)
require.Equal(t, fmt.Sprintf(`{"name":"phonetool","account":"1234","domain":"phonetool.com","domainHostedZoneID":"mockHostedZoneID","version":"%s","tags":{"owner":"boss"}}`, schemaVersion), *param.Value)
return &ssm.PutParameterOutput{
Version: aws.Int64(1),
}, nil
},
wantedErr: nil,
},
"with SSM error": {
inApplication: &Application{Name: "phonetool", AccountID: "1234"},
mockPutParameter: func(t *testing.T, param *ssm.PutParameterInput) (*ssm.PutParameterOutput, error) {
return nil, fmt.Errorf("broken")
},
wantedErr: fmt.Errorf("update application phonetool: broken"),
},
}
for name, tc := range testCases {
t.Run(name, func(t *testing.T) {
store := &Store{
ssm: &mockSSM{
t: t,
mockPutParameter: tc.mockPutParameter,
},
}
// WHEN
err := store.UpdateApplication(tc.inApplication)
// THEN
if tc.wantedErr != nil {
require.EqualError(t, err, tc.wantedErr.Error())
} else {
require.NoError(t, err)
}
})
}
}
func TestDeleteApplication(t *testing.T) {
mockApplicationName := "mockApplicationName"
mockError := errors.New("mockError")
tests := map[string]struct {
mockDeleteParameter func(t *testing.T, in *ssm.DeleteParameterInput) (*ssm.DeleteParameterOutput, error)
want error
}{
"should return nil given success": {
mockDeleteParameter: func(t *testing.T, in *ssm.DeleteParameterInput) (*ssm.DeleteParameterOutput, error) {
require.Equal(t, fmt.Sprintf(fmtApplicationPath, mockApplicationName), *in.Name)
return &ssm.DeleteParameterOutput{}, nil
},
want: nil,
},
"should return nil given paramter not found error code": {
mockDeleteParameter: func(t *testing.T, in *ssm.DeleteParameterInput) (*ssm.DeleteParameterOutput, error) {
require.Equal(t, fmt.Sprintf(fmtApplicationPath, mockApplicationName), *in.Name)
return nil, awserr.New(ssm.ErrCodeParameterNotFound, "whatevs", mockError)
},
want: nil,
},
"should return unhandled non-awserr": {
mockDeleteParameter: func(t *testing.T, in *ssm.DeleteParameterInput) (*ssm.DeleteParameterOutput, error) {
require.Equal(t, fmt.Sprintf(fmtApplicationPath, mockApplicationName), *in.Name)
return nil, mockError
},
want: mockError,
},
}
for name, test := range tests {
t.Run(name, func(t *testing.T) {
store := &Store{
ssm: &mockSSM{
t: t,
mockDeleteParameter: test.mockDeleteParameter,
},
}
got := store.DeleteApplication(mockApplicationName)
require.Equal(t, test.want, got)
})
}
}
| 409 |
copilot-cli | aws | Go | // Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
// SPDX-License-Identifier: Apache-2.0
package config
import (
"encoding/json"
"fmt"
"sort"
"github.com/aws/aws-sdk-go/aws"
"github.com/aws/aws-sdk-go/aws/awserr"
"github.com/aws/aws-sdk-go/service/ssm"
)
// Environment represents a deployment environment in an application.
type Environment struct {
App string `json:"app"` // Name of the app this environment belongs to.
Name string `json:"name"` // Name of the environment, must be unique within a App.
Region string `json:"region"` // Name of the region this environment is stored in.
AccountID string `json:"accountID"` // Account ID of the account this environment is stored in.
RegistryURL string `json:"registryURL"` // URL For ECR Registry for this environment.
ExecutionRoleARN string `json:"executionRoleARN"` // ARN used by CloudFormation to make modification to the environment stack.
ManagerRoleARN string `json:"managerRoleARN"` // ARN for the manager role assumed to manipulate the environment and its services.
// Fields that store user configuration is no longer updated, but kept for retrofitting purpose.
CustomConfig *CustomizeEnv `json:"customConfig,omitempty"` // Deprecated. Custom environment configuration by users. This configuration is now available in the env manifest.
Telemetry *Telemetry `json:"telemetry,omitempty"` // Deprecated. Optional environment telemetry features. This configuration is now available in the env manifest.
}
// CustomizeEnv represents the custom environment config.
type CustomizeEnv struct {
ImportVPC *ImportVPC `json:"importVPC,omitempty"`
VPCConfig *AdjustVPC `json:"adjustVPC,omitempty"`
ImportCertARNs []string `json:"importCertARNs,omitempty"`
InternalALBSubnets []string `json:"internalALBSubnets,omitempty"`
EnableInternalALBVPCIngress bool `json:"enableInternalALBVPCIngress,omitempty"`
}
// IsEmpty returns true if CustomizeEnv is an empty struct.
func (c *CustomizeEnv) IsEmpty() bool {
if c == nil {
return true
}
return c.ImportVPC == nil && c.VPCConfig == nil && len(c.ImportCertARNs) == 0 && len(c.InternalALBSubnets) == 0 && !c.EnableInternalALBVPCIngress
}
// ImportVPC holds the fields to import VPC resources.
type ImportVPC struct {
ID string `json:"id"` // ID for the VPC.
PublicSubnetIDs []string `json:"publicSubnetIDs"`
PrivateSubnetIDs []string `json:"privateSubnetIDs"`
}
// AdjustVPC holds the fields to adjust default VPC resources.
type AdjustVPC struct {
CIDR string `json:"cidr"` // CIDR range for the VPC.
AZs []string `json:"availabilityZoneNames"`
PublicSubnetCIDRs []string `json:"publicSubnetCIDRs"`
PrivateSubnetCIDRs []string `json:"privateSubnetCIDRs"`
}
// Telemetry represents optional observability and monitoring configuration.
type Telemetry struct {
EnableContainerInsights bool `json:"containerInsights"`
}
// CreateEnvironment instantiates a new environment within an existing App. Skip if
// the environment already exists in the App.
func (s *Store) CreateEnvironment(environment *Environment) error {
if _, err := s.GetApplication(environment.App); err != nil {
return err
}
environmentPath := fmt.Sprintf(fmtEnvParamPath, environment.App, environment.Name)
data, err := marshal(environment)
if err != nil {
return fmt.Errorf("serializing environment %s: %w", environment.Name, err)
}
_, err = s.ssm.PutParameter(&ssm.PutParameterInput{
Name: aws.String(environmentPath),
Description: aws.String(fmt.Sprintf("The %s deployment stage", environment.Name)),
Type: aws.String(ssm.ParameterTypeString),
Value: aws.String(data),
Tags: []*ssm.Tag{
{
Key: aws.String("copilot-application"),
Value: aws.String(environment.App),
},
{
Key: aws.String("copilot-environment"),
Value: aws.String(environment.Name),
},
},
})
if err != nil {
if aerr, ok := err.(awserr.Error); ok {
switch aerr.Code() {
case ssm.ErrCodeParameterAlreadyExists:
return nil
}
}
return fmt.Errorf("create environment %s in application %s: %w", environment.Name, environment.App, err)
}
return nil
}
// GetEnvironment gets an environment belonging to a particular application by name. If no environment is found
// it returns ErrNoSuchEnvironment.
func (s *Store) GetEnvironment(appName string, environmentName string) (*Environment, error) {
environmentPath := fmt.Sprintf(fmtEnvParamPath, appName, environmentName)
environmentParam, err := s.ssm.GetParameter(&ssm.GetParameterInput{
Name: aws.String(environmentPath),
})
if err != nil {
if aerr, ok := err.(awserr.Error); ok {
switch aerr.Code() {
case ssm.ErrCodeParameterNotFound:
return nil, &ErrNoSuchEnvironment{
ApplicationName: appName,
EnvironmentName: environmentName,
}
}
}
return nil, fmt.Errorf("get environment %s in application %s: %w", environmentName, appName, err)
}
var env Environment
err = json.Unmarshal([]byte(*environmentParam.Parameter.Value), &env)
if err != nil {
return nil, fmt.Errorf("read configuration for environment %s in application %s: %w", environmentName, appName, err)
}
return &env, nil
}
// ListEnvironments returns all environments belonging to a particular application.
func (s *Store) ListEnvironments(appName string) ([]*Environment, error) {
var environments []*Environment
environmentsPath := fmt.Sprintf(rootEnvParamPath, appName)
serializedEnvs, err := s.listParams(environmentsPath)
if err != nil {
return nil, fmt.Errorf("list environments for application %s: %w", appName, err)
}
for _, serializedEnv := range serializedEnvs {
var env Environment
if err := json.Unmarshal([]byte(*serializedEnv), &env); err != nil {
return nil, fmt.Errorf("read environment configuration for application %s: %w", appName, err)
}
environments = append(environments, &env)
}
sort.SliceStable(environments, func(i, j int) bool { return environments[i].Name < environments[j].Name })
return environments, nil
}
// DeleteEnvironment removes an environment from SSM.
// If the environment does not exist in the store or is successfully deleted then returns nil. Otherwise, returns an error.
func (s *Store) DeleteEnvironment(appName, environmentName string) error {
paramName := fmt.Sprintf(fmtEnvParamPath, appName, environmentName)
_, err := s.ssm.DeleteParameter(&ssm.DeleteParameterInput{
Name: aws.String(paramName),
})
if err != nil {
if aerr, ok := err.(awserr.Error); ok {
switch aerr.Code() {
case ssm.ErrCodeParameterNotFound:
return nil
}
}
return fmt.Errorf("delete environment %s from application %s: %w", environmentName, appName, err)
}
return nil
}
| 178 |
copilot-cli | aws | Go | // Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
// SPDX-License-Identifier: Apache-2.0
package config
import (
"errors"
"fmt"
"testing"
"github.com/aws/aws-sdk-go/aws"
"github.com/aws/aws-sdk-go/aws/awserr"
"github.com/aws/aws-sdk-go/service/ssm"
"github.com/stretchr/testify/require"
)
func TestStore_ListEnvironments(t *testing.T) {
testEnvironment := Environment{Name: "test", AccountID: "12345", App: "chicken", Region: "us-west-2s"}
testEnvironmentString, err := marshal(testEnvironment)
testEnvironmentPath := fmt.Sprintf(fmtEnvParamPath, testEnvironment.App, testEnvironment.Name)
require.NoError(t, err, "Marshal test environment should not fail")
prodPDXEnv := Environment{Name: "prod-pdx", AccountID: "12345", App: "chicken", Region: "us-west-2"}
prodPDXEnvString, err := marshal(prodPDXEnv)
prodPDXEnvPath := fmt.Sprintf(fmtEnvParamPath, prodPDXEnv.App, prodPDXEnv.Name)
require.NoError(t, err, "Marshal pdx environment should not fail")
prodIADEnv := Environment{Name: "prod-iad", AccountID: "12345", App: "chicken", Region: "us-east-1"}
prodIADEnvString, err := marshal(prodIADEnv)
prodIADEnvPath := fmt.Sprintf(fmtEnvParamPath, prodIADEnv.App, prodIADEnv.Name)
require.NoError(t, err, "Marshal iad environment should not fail")
environmentPath := fmt.Sprintf(rootEnvParamPath, testEnvironment.App)
lastPageInPaginatedResp := false
testCases := map[string]struct {
mockGetParametersByPath func(t *testing.T, param *ssm.GetParametersByPathInput) (*ssm.GetParametersByPathOutput, error)
wantedEnvironments []Environment
wantedErr error
}{
"with multiple existing environments": {
mockGetParametersByPath: func(t *testing.T, param *ssm.GetParametersByPathInput) (output *ssm.GetParametersByPathOutput, e error) {
require.Equal(t, environmentPath, *param.Path)
return &ssm.GetParametersByPathOutput{
Parameters: []*ssm.Parameter{
{
Name: aws.String(prodIADEnvPath),
Value: aws.String(prodIADEnvString),
},
{
Name: aws.String(testEnvironmentPath),
Value: aws.String(testEnvironmentString),
},
},
}, nil
},
wantedEnvironments: []Environment{prodIADEnv, testEnvironment},
wantedErr: nil,
},
"with malformed json": {
mockGetParametersByPath: func(t *testing.T, param *ssm.GetParametersByPathInput) (output *ssm.GetParametersByPathOutput, e error) {
require.Equal(t, environmentPath, *param.Path)
return &ssm.GetParametersByPathOutput{
Parameters: []*ssm.Parameter{
{
Name: aws.String(testEnvironmentPath),
Value: aws.String("oops"),
},
},
}, nil
},
wantedErr: fmt.Errorf("read environment configuration for application chicken: invalid character 'o' looking for beginning of value"),
},
"with SSM error": {
mockGetParametersByPath: func(t *testing.T, param *ssm.GetParametersByPathInput) (output *ssm.GetParametersByPathOutput, e error) {
require.Equal(t, environmentPath, *param.Path)
return nil, fmt.Errorf("broken")
},
wantedErr: fmt.Errorf("list environments for application chicken: broken"),
},
"with paginated response": {
mockGetParametersByPath: func(t *testing.T, param *ssm.GetParametersByPathInput) (output *ssm.GetParametersByPathOutput, e error) {
require.Equal(t, environmentPath, *param.Path)
if !lastPageInPaginatedResp {
lastPageInPaginatedResp = true
return &ssm.GetParametersByPathOutput{
Parameters: []*ssm.Parameter{
{
Name: aws.String(prodPDXEnvPath), // Return "pdx" first on purpose to test if alphabetical ordering is maintained.
Value: aws.String(prodPDXEnvString),
},
},
NextToken: aws.String("more"),
}, nil
}
return &ssm.GetParametersByPathOutput{
Parameters: []*ssm.Parameter{
{
Name: aws.String(prodIADEnvPath),
Value: aws.String(prodIADEnvString),
},
{
Name: aws.String(testEnvironmentPath), // Return "test" at the end to make sure prod environments are listed last.
Value: aws.String(testEnvironmentString),
},
},
}, nil
},
wantedEnvironments: []Environment{prodIADEnv, prodPDXEnv, testEnvironment},
wantedErr: nil,
},
}
for name, tc := range testCases {
t.Run(name, func(t *testing.T) {
// GIVEN
lastPageInPaginatedResp = false
store := &Store{
ssm: &mockSSM{
t: t,
mockGetParametersByPath: tc.mockGetParametersByPath,
},
}
// WHEN
envPointers, err := store.ListEnvironments("chicken")
// THEN
if tc.wantedErr != nil {
require.EqualError(t, err, tc.wantedErr.Error())
} else {
var environments []Environment
for _, e := range envPointers {
environments = append(environments, *e)
}
require.Equal(t, tc.wantedEnvironments, environments)
}
})
}
}
func TestStore_GetEnvironment(t *testing.T) {
testEnvironment := Environment{Name: "test", AccountID: "12345", App: "chicken", Region: "us-west-2s"}
testEnvironmentString, err := marshal(testEnvironment)
testEnvironmentPath := fmt.Sprintf(fmtEnvParamPath, testEnvironment.App, testEnvironment.Name)
require.NoError(t, err, "Marshal environment should not fail")
testCases := map[string]struct {
mockGetParameter func(t *testing.T, param *ssm.GetParameterInput) (*ssm.GetParameterOutput, error)
wantedEnvironment Environment
wantedErr error
}{
"with existing environment": {
mockGetParameter: func(t *testing.T, param *ssm.GetParameterInput) (*ssm.GetParameterOutput, error) {
require.Equal(t, testEnvironmentPath, *param.Name)
return &ssm.GetParameterOutput{
Parameter: &ssm.Parameter{
Name: aws.String(testEnvironmentPath),
Value: aws.String(testEnvironmentString),
},
}, nil
},
wantedEnvironment: testEnvironment,
wantedErr: nil,
},
"with no existing environment": {
mockGetParameter: func(t *testing.T, param *ssm.GetParameterInput) (*ssm.GetParameterOutput, error) {
require.Equal(t, testEnvironmentPath, *param.Name)
return nil, awserr.New(ssm.ErrCodeParameterNotFound, "bloop", nil)
},
wantedErr: &ErrNoSuchEnvironment{
ApplicationName: testEnvironment.App,
EnvironmentName: testEnvironment.Name,
},
},
"with malformed json": {
mockGetParameter: func(t *testing.T, param *ssm.GetParameterInput) (*ssm.GetParameterOutput, error) {
require.Equal(t, testEnvironmentPath, *param.Name)
return &ssm.GetParameterOutput{
Parameter: &ssm.Parameter{
Name: aws.String(testEnvironmentPath),
Value: aws.String("oops"),
},
}, nil
},
wantedErr: fmt.Errorf("read configuration for environment test in application chicken: invalid character 'o' looking for beginning of value"),
},
"with SSM error": {
mockGetParameter: func(t *testing.T, param *ssm.GetParameterInput) (*ssm.GetParameterOutput, error) {
return nil, fmt.Errorf("broken")
},
wantedErr: fmt.Errorf("get environment test in application chicken: broken"),
},
}
for name, tc := range testCases {
t.Run(name, func(t *testing.T) {
// GIVEN
store := &Store{
ssm: &mockSSM{
t: t,
mockGetParameter: tc.mockGetParameter,
},
}
// WHEN
env, err := store.GetEnvironment("chicken", "test")
// THEN
if tc.wantedErr != nil {
require.EqualError(t, err, tc.wantedErr.Error())
} else {
require.Equal(t, tc.wantedEnvironment, *env)
}
})
}
}
func TestStore_CreateEnvironment(t *testing.T) {
testApplication := Application{Name: "chicken", Version: "1.0"}
testApplicationString, err := marshal(testApplication)
testApplicationPath := fmt.Sprintf(fmtApplicationPath, testApplication.Name)
require.NoError(t, err, "Marshal application should not fail")
testCustomConfig := &CustomizeEnv{
ImportVPC: &ImportVPC{
ID: "mockID",
PrivateSubnetIDs: []string{"mockPrivateSubnet"},
PublicSubnetIDs: []string{"mockPublicSubnet"},
},
VPCConfig: &AdjustVPC{
CIDR: "mockCIDR",
PrivateSubnetCIDRs: []string{"mockSubnetCIDR"},
PublicSubnetCIDRs: []string{"mockSubnetCIDR"},
},
}
testEnvironment := Environment{Name: "test", App: testApplication.Name, AccountID: "1234", Region: "us-west-2", CustomConfig: testCustomConfig}
testEnvironmentString, err := marshal(testEnvironment)
testEnvironmentPath := fmt.Sprintf(fmtEnvParamPath, testEnvironment.App, testEnvironment.Name)
require.NoError(t, err, "Marshal environment should not fail")
tagsForEnvParam := []*ssm.Tag{
{
Key: aws.String("copilot-application"),
Value: aws.String(testEnvironment.App),
},
{
Key: aws.String("copilot-environment"),
Value: aws.String(testEnvironment.Name),
},
}
testCases := map[string]struct {
mockGetParameter func(t *testing.T, param *ssm.GetParameterInput) (*ssm.GetParameterOutput, error)
mockPutParameter func(t *testing.T, param *ssm.PutParameterInput) (*ssm.PutParameterOutput, error)
wantedErr error
}{
"with no existing environment": {
mockPutParameter: func(t *testing.T, param *ssm.PutParameterInput) (*ssm.PutParameterOutput, error) {
require.Equal(t, testEnvironmentPath, *param.Name)
require.Equal(t, testEnvironmentString, *param.Value)
require.Equal(t, tagsForEnvParam, param.Tags)
return &ssm.PutParameterOutput{
Version: aws.Int64(1),
}, nil
},
mockGetParameter: func(t *testing.T, param *ssm.GetParameterInput) (*ssm.GetParameterOutput, error) {
require.Equal(t, testApplicationPath, *param.Name)
return &ssm.GetParameterOutput{
Parameter: &ssm.Parameter{
Name: aws.String(testApplicationPath),
Value: aws.String(testApplicationString),
},
}, nil
},
wantedErr: nil,
},
"with existing environment": {
mockPutParameter: func(t *testing.T, param *ssm.PutParameterInput) (*ssm.PutParameterOutput, error) {
require.Equal(t, testEnvironmentPath, *param.Name)
require.Equal(t, tagsForEnvParam, param.Tags)
return nil, awserr.New(ssm.ErrCodeParameterAlreadyExists, "Already exists", fmt.Errorf("Already Exists"))
},
mockGetParameter: func(t *testing.T, param *ssm.GetParameterInput) (*ssm.GetParameterOutput, error) {
require.Equal(t, testApplicationPath, *param.Name)
return &ssm.GetParameterOutput{
Parameter: &ssm.Parameter{
Name: aws.String(testApplicationPath),
Value: aws.String(testApplicationString),
},
}, nil
},
wantedErr: nil,
},
"with SSM error": {
mockPutParameter: func(t *testing.T, param *ssm.PutParameterInput) (*ssm.PutParameterOutput, error) {
require.Equal(t, tagsForEnvParam, param.Tags)
return nil, fmt.Errorf("broken")
},
mockGetParameter: func(t *testing.T, param *ssm.GetParameterInput) (*ssm.GetParameterOutput, error) {
require.Equal(t, testApplicationPath, *param.Name)
return &ssm.GetParameterOutput{
Parameter: &ssm.Parameter{
Name: aws.String(testApplicationPath),
Value: aws.String(testApplicationString),
},
}, nil
},
wantedErr: fmt.Errorf("create environment test in application chicken: broken"),
},
}
for name, tc := range testCases {
t.Run(name, func(t *testing.T) {
// GIVEN
store := &Store{
ssm: &mockSSM{
t: t,
mockPutParameter: tc.mockPutParameter,
mockGetParameter: tc.mockGetParameter,
},
}
// WHEN
err := store.CreateEnvironment(&Environment{
Name: testEnvironment.Name,
App: testEnvironment.App,
AccountID: testEnvironment.AccountID,
Region: testEnvironment.Region,
CustomConfig: testEnvironment.CustomConfig,
})
// THEN
if tc.wantedErr != nil {
require.EqualError(t, err, tc.wantedErr.Error())
}
})
}
}
func TestStore_DeleteEnvironment(t *testing.T) {
testCases := map[string]struct {
inApplicationName string
inEnvName string
mockDeleteParam func(t *testing.T, in *ssm.DeleteParameterInput) (*ssm.DeleteParameterOutput, error)
wantedError error
}{
"parameter is already deleted": {
inApplicationName: "phonetool",
inEnvName: "test",
mockDeleteParam: func(t *testing.T, in *ssm.DeleteParameterInput) (*ssm.DeleteParameterOutput, error) {
return nil, awserr.New(ssm.ErrCodeParameterNotFound, "Not found", nil)
},
},
"unexpected error": {
inApplicationName: "phonetool",
inEnvName: "test",
mockDeleteParam: func(t *testing.T, in *ssm.DeleteParameterInput) (*ssm.DeleteParameterOutput, error) {
return nil, errors.New("some error")
},
wantedError: errors.New("delete environment test from application phonetool: some error"),
},
"successfully deleted param": {
inApplicationName: "phonetool",
inEnvName: "test",
mockDeleteParam: func(t *testing.T, in *ssm.DeleteParameterInput) (*ssm.DeleteParameterOutput, error) {
wantedPath := fmt.Sprintf(fmtEnvParamPath, "phonetool", "test")
require.Equal(t, wantedPath, *in.Name)
return nil, nil
},
},
}
for name, tc := range testCases {
t.Run(name, func(t *testing.T) {
// GIVEN
store := &Store{
ssm: &mockSSM{
t: t,
mockDeleteParameter: tc.mockDeleteParam,
},
}
// WHEN
err := store.DeleteEnvironment(tc.inApplicationName, tc.inEnvName)
// THEN
if tc.wantedError != nil {
require.EqualError(t, err, tc.wantedError.Error())
} else {
require.NoError(t, err)
}
})
}
}
| 403 |
copilot-cli | aws | Go | // Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
// SPDX-License-Identifier: Apache-2.0
package config
import "fmt"
// ErrNoSuchApplication means an application couldn't be found within a specific account and region.
type ErrNoSuchApplication struct {
ApplicationName string
AccountID string
Region string
}
// Is returns whether the provided error equals this error.
func (e *ErrNoSuchApplication) Is(target error) bool {
t, ok := target.(*ErrNoSuchApplication)
if !ok {
return false
}
return e.ApplicationName == t.ApplicationName &&
e.AccountID == t.AccountID &&
e.Region == t.Region
}
func (e *ErrNoSuchApplication) Error() string {
return fmt.Sprintf("couldn't find an application named %s in account %s and region %s",
e.ApplicationName, e.AccountID, e.Region)
}
// ErrNoSuchEnvironment means a specific environment couldn't be found in a specific project.
type ErrNoSuchEnvironment struct {
ApplicationName string
EnvironmentName string
}
// Is returns whether the provided error equals this error.
func (e *ErrNoSuchEnvironment) Is(target error) bool {
t, ok := target.(*ErrNoSuchEnvironment)
if !ok {
return false
}
return e.ApplicationName == t.ApplicationName &&
e.EnvironmentName == t.EnvironmentName
}
func (e *ErrNoSuchEnvironment) Error() string {
return fmt.Sprintf("couldn't find environment %s in the application %s",
e.EnvironmentName, e.ApplicationName)
}
// ErrNoSuchService means a specific service couldn't be found in a specific application.
type ErrNoSuchService struct {
App string
Name string
}
// Is returns whether the provided error equals this error.
func (e *ErrNoSuchService) Is(target error) bool {
t, ok := target.(*ErrNoSuchService)
if !ok {
return false
}
return e.App == t.App &&
e.Name == t.Name
}
func (e *ErrNoSuchService) Error() string {
return fmt.Sprintf("couldn't find service %s in the application %s",
e.Name, e.App)
}
// ErrNoSuchJob means a specific job couldn't be found in a specific application.
type ErrNoSuchJob struct {
App string
Name string
}
// Is returns whether the provided error equals this error.
func (e *ErrNoSuchJob) Is(target error) bool {
t, ok := target.(*ErrNoSuchJob)
if !ok {
return false
}
return e.App == t.App &&
e.Name == t.Name
}
func (e *ErrNoSuchJob) Error() string {
return fmt.Sprintf("couldn't find job %s in the application %s",
e.Name, e.App)
}
// errNoSuchWorkload means a workload couldn't be found in a specific application.
type errNoSuchWorkload struct {
App string
Name string
}
// Is returns whether the provided error equals this error
func (e *errNoSuchWorkload) Is(target error) bool {
t, ok := target.(*errNoSuchWorkload)
if !ok {
return false
}
return e.App == t.App &&
e.Name == t.Name
}
func (e *errNoSuchWorkload) Error() string {
return fmt.Sprintf("couldn't find %s in the application %s", e.Name, e.App)
}
| 113 |
copilot-cli | aws | Go | // Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
// SPDX-License-Identifier: Apache-2.0
package config
import (
"errors"
"testing"
"github.com/stretchr/testify/require"
)
func TestErrNoSuchApplication(t *testing.T) {
err := &ErrNoSuchApplication{ApplicationName: "chicken", AccountID: "12345", Region: "us-west-2"}
require.EqualError(t, err, "couldn't find an application named chicken in account 12345 and region us-west-2")
}
func TestErrNoSuchApplication_Is(t *testing.T) {
err := &ErrNoSuchApplication{ApplicationName: "chicken", AccountID: "12345", Region: "us-west-2"}
testCases := map[string]struct {
wantedSame bool
otherError error
}{
"errors are same": {
wantedSame: true,
otherError: &ErrNoSuchApplication{ApplicationName: "chicken", AccountID: "12345", Region: "us-west-2"},
},
"errors have different values": {
wantedSame: false,
otherError: &ErrNoSuchApplication{ApplicationName: "rooster", AccountID: "12345", Region: "us-west-2"},
},
"errors are different type": {
wantedSame: false,
otherError: errors.New("different error"),
},
}
for name, tc := range testCases {
t.Run(name, func(t *testing.T) {
require.Equal(t, err.Is(tc.otherError), tc.wantedSame)
})
}
}
func TestErrNoSuchEnvironment(t *testing.T) {
err := &ErrNoSuchEnvironment{EnvironmentName: "test", ApplicationName: "chicken"}
require.EqualError(t, err, "couldn't find environment test in the application chicken")
}
func TestErrNoSuchEnvironment_Is(t *testing.T) {
err := &ErrNoSuchEnvironment{EnvironmentName: "test", ApplicationName: "chicken"}
testCases := map[string]struct {
wantedSame bool
otherError error
}{
"errors are same": {
wantedSame: true,
otherError: &ErrNoSuchEnvironment{EnvironmentName: "test", ApplicationName: "chicken"},
},
"errors have different values": {
wantedSame: false,
otherError: &ErrNoSuchEnvironment{EnvironmentName: "test", ApplicationName: "rooster"},
},
"errors are different type": {
wantedSame: false,
otherError: errors.New("different error"),
},
}
for name, tc := range testCases {
t.Run(name, func(t *testing.T) {
require.Equal(t, err.Is(tc.otherError), tc.wantedSame)
})
}
}
func TestErrNoSuchService(t *testing.T) {
err := &ErrNoSuchService{Name: "api", App: "chicken"}
require.EqualError(t, err, "couldn't find service api in the application chicken")
}
func TestErrNoSuchService_Is(t *testing.T) {
err := &ErrNoSuchService{Name: "api", App: "chicken"}
testCases := map[string]struct {
wantedSame bool
otherError error
}{
"errors are same": {
wantedSame: true,
otherError: &ErrNoSuchService{Name: "api", App: "chicken"},
},
"errors have different values": {
wantedSame: false,
otherError: &ErrNoSuchService{Name: "api", App: "rooster"},
},
"errors are different type": {
wantedSame: false,
otherError: errors.New("different error"),
},
}
for name, tc := range testCases {
t.Run(name, func(t *testing.T) {
require.Equal(t, err.Is(tc.otherError), tc.wantedSame)
})
}
}
func TestErrNoSuchJob(t *testing.T) {
err := &ErrNoSuchJob{Name: "mailer", App: "cool"}
require.EqualError(t, err, "couldn't find job mailer in the application cool")
}
func TestErrNoSuchJob_Is(t *testing.T) {
err := &ErrNoSuchJob{Name: "mailer", App: "cool"}
testCases := map[string]struct {
wantedSame bool
otherError error
}{
"errors are same": {
wantedSame: true,
otherError: &ErrNoSuchJob{Name: "mailer", App: "cool"},
},
"errors have different values": {
wantedSame: false,
otherError: &ErrNoSuchJob{Name: "ranker", App: "cool"},
},
"errors are different types": {
wantedSame: false,
otherError: errors.New("something else broke"),
},
}
for name, tc := range testCases {
t.Run(name, func(t *testing.T) {
require.Equal(t, err.Is(tc.otherError), tc.wantedSame)
})
}
}
| 135 |
copilot-cli | aws | Go | // Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
// SPDX-License-Identifier: Apache-2.0
/*
Package config implements CRUD operations for application, environment, service and
pipeline configuration. This configuration contains the Copilot applications
a customer has, and the environments and pipelines associated with each
application.
*/
package config
import (
"encoding/json"
"log"
"github.com/aws/aws-sdk-go/aws"
"github.com/aws/aws-sdk-go/service/ssm"
"github.com/aws/copilot-cli/internal/pkg/aws/identity"
)
// Parameter name formats for resources in an application. Applications are laid out in SSM
// based on path - each parameter's key has a certain format, and you can have
// hierarchies based on that format. Applications are at the root of the hierarchy.
// Searching SSM for all parameters with the `rootApplicationPath` key will give you
// all the application keys, for example.
// current schema Version for Apps.
const schemaVersion = "1.0"
// schema formats supported in current schemaVersion. NOTE: May change to map in the future.
const (
rootApplicationPath = "/copilot/applications/"
fmtApplicationPath = "/copilot/applications/%s"
rootEnvParamPath = "/copilot/applications/%s/environments/"
fmtEnvParamPath = "/copilot/applications/%s/environments/%s" // path for an environment in an application
rootWkldParamPath = "/copilot/applications/%s/components/"
fmtWkldParamPath = "/copilot/applications/%s/components/%s" // path for a workload in an application
)
// IAMIdentityGetter is the interface to get information about the IAM user or role whose credentials are used to make AWS requests.
type IAMIdentityGetter interface {
Get() (identity.Caller, error)
}
// SSM is the interface for the AWS SSM client.
type SSM interface {
PutParameter(in *ssm.PutParameterInput) (*ssm.PutParameterOutput, error)
GetParametersByPath(in *ssm.GetParametersByPathInput) (*ssm.GetParametersByPathOutput, error)
GetParameter(in *ssm.GetParameterInput) (*ssm.GetParameterOutput, error)
DeleteParameter(in *ssm.DeleteParameterInput) (*ssm.DeleteParameterOutput, error)
}
// Store is in charge of fetching and creating applications, environment, services and other workloads, and pipeline configuration in SSM.
type Store struct {
sts IAMIdentityGetter
ssm SSM
appRegion string
}
// NewSSMStore returns a new store, allowing you to query or create Applications, Environments, Services, and other workloads.
func NewSSMStore(sts IAMIdentityGetter, ssm SSM, appRegion string) *Store {
return &Store{
sts: sts,
ssm: ssm,
appRegion: appRegion,
}
}
func (s *Store) listParams(path string) ([]*string, error) {
var serializedParams []*string
var nextToken *string
for {
params, err := s.ssm.GetParametersByPath(&ssm.GetParametersByPathInput{
Path: aws.String(path),
Recursive: aws.Bool(false),
NextToken: nextToken,
})
if err != nil {
return nil, err
}
for _, param := range params.Parameters {
serializedParams = append(serializedParams, param.Value)
}
nextToken = params.NextToken
if nextToken == nil {
break
}
}
return serializedParams, nil
}
// Retrieves the caller's Account ID with a best effort. If it fails to fetch the Account ID,
// this returns "unknown".
func (s *Store) getCallerAccountAndRegion() (string, string) {
identity, err := s.sts.Get()
region := s.appRegion
if err != nil {
log.Printf("Failed to get caller's Account ID %v", err)
return "unknown", region
}
return identity.Account, region
}
func marshal(e interface{}) (string, error) {
b, err := json.Marshal(e)
if err != nil {
return "", err
}
return string(b), nil
}
| 115 |
copilot-cli | aws | Go | //go:build integration
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
// SPDX-License-Identifier: Apache-2.0
package config_test
import (
"math/rand"
"testing"
"time"
"github.com/aws/aws-sdk-go/aws"
"github.com/aws/aws-sdk-go/service/ssm"
"github.com/aws/copilot-cli/internal/pkg/aws/identity"
"github.com/aws/copilot-cli/internal/pkg/aws/sessions"
"github.com/aws/copilot-cli/internal/pkg/config"
"github.com/stretchr/testify/require"
)
func init() {
rand.Seed(time.Now().UnixNano())
}
func Test_SSM_Application_Integration(t *testing.T) {
defaultSess, err := sessions.ImmutableProvider().Default()
require.NoError(t, err)
store := config.NewSSMStore(identity.New(defaultSess), ssm.New(defaultSess), aws.StringValue(defaultSess.Config.Region))
applicationToCreate := config.Application{Name: randStringBytes(10), Version: "1.0"}
defer store.DeleteApplication(applicationToCreate.Name)
t.Run("Create, Get and List Applications", func(t *testing.T) {
// Create our first application
err := store.CreateApplication(&applicationToCreate)
require.NoError(t, err)
// Can't overwrite an existing application
err = store.CreateApplication(&applicationToCreate)
require.NoError(t, err)
// Fetch the application back from SSM
application, err := store.GetApplication(applicationToCreate.Name)
require.NoError(t, err)
require.Equal(t, applicationToCreate, *application)
// List returns a non-empty list of applications
applications, err := store.ListApplications()
require.NoError(t, err)
require.NotEmpty(t, applications)
})
}
func Test_SSM_Environment_Integration(t *testing.T) {
defaultSess, err := sessions.ImmutableProvider().Default()
require.NoError(t, err)
store := config.NewSSMStore(identity.New(defaultSess), ssm.New(defaultSess), aws.StringValue(defaultSess.Config.Region))
applicationToCreate := config.Application{Name: randStringBytes(10), Version: "1.0"}
testEnvironment := config.Environment{Name: "test", App: applicationToCreate.Name, Region: "us-west-2", AccountID: " 1234"}
prodEnvironment := config.Environment{Name: "prod", App: applicationToCreate.Name, Region: "us-west-2", AccountID: " 1234"}
defer func() {
store.DeleteEnvironment(applicationToCreate.Name, testEnvironment.Name)
store.DeleteEnvironment(applicationToCreate.Name, prodEnvironment.Name)
store.DeleteApplication(applicationToCreate.Name)
}()
t.Run("Create, Get and List Environments", func(t *testing.T) {
// Create our first application
err := store.CreateApplication(&applicationToCreate)
require.NoError(t, err)
// Make sure there are no envs with our new application
envs, err := store.ListEnvironments(applicationToCreate.Name)
require.NoError(t, err)
require.Empty(t, envs)
// Add our environments
err = store.CreateEnvironment(&testEnvironment)
require.NoError(t, err)
err = store.CreateEnvironment(&prodEnvironment)
require.NoError(t, err)
// Skip and do not return error if environment already exists
err = store.CreateEnvironment(&prodEnvironment)
require.NoError(t, err)
// Wait for consistency to kick in (ssm path commands are eventually consistent)
time.Sleep(5 * time.Second)
// Make sure all the environments are under our application
envs, err = store.ListEnvironments(applicationToCreate.Name)
require.NoError(t, err)
var environments []config.Environment
for _, e := range envs {
environments = append(environments, *e)
}
require.ElementsMatch(t, environments, []config.Environment{testEnvironment, prodEnvironment})
// Fetch our saved environments, one by one
env, err := store.GetEnvironment(applicationToCreate.Name, testEnvironment.Name)
require.NoError(t, err)
require.Equal(t, testEnvironment, *env)
env, err = store.GetEnvironment(applicationToCreate.Name, prodEnvironment.Name)
require.NoError(t, err)
require.Equal(t, prodEnvironment, *env)
})
}
func Test_SSM_Service_Integration(t *testing.T) {
defaultSess, err := sessions.ImmutableProvider().Default()
require.NoError(t, err)
store := config.NewSSMStore(identity.New(defaultSess), ssm.New(defaultSess), aws.StringValue(defaultSess.Config.Region))
applicationToCreate := config.Application{Name: randStringBytes(10), Version: "1.0"}
apiService := config.Workload{Name: "api", App: applicationToCreate.Name, Type: "Load Balanced Web Service"}
feService := config.Workload{Name: "front-end", App: applicationToCreate.Name, Type: "Load Balanced Web Service"}
defer func() {
store.DeleteService(applicationToCreate.Name, apiService.Name)
store.DeleteService(applicationToCreate.Name, feService.Name)
store.DeleteApplication(applicationToCreate.Name)
}()
t.Run("Create, Get and List Applications", func(t *testing.T) {
// Create our first application
err := store.CreateApplication(&applicationToCreate)
require.NoError(t, err)
// Make sure there are no svcs with our new application
svcs, err := store.ListServices(applicationToCreate.Name)
require.NoError(t, err)
require.Empty(t, svcs)
// Add our services
err = store.CreateService(&apiService)
require.NoError(t, err)
err = store.CreateService(&feService)
require.NoError(t, err)
// Skip and do not return error if services already exists
err = store.CreateService(&feService)
require.NoError(t, err)
// Wait for consistency to kick in (ssm path commands are eventually consistent)
time.Sleep(5 * time.Second)
// Make sure all the svcs are under our application
svcs, err = store.ListServices(applicationToCreate.Name)
require.NoError(t, err)
var services []config.Workload
for _, s := range svcs {
services = append(services, *s)
}
require.ElementsMatch(t, services, []config.Workload{apiService, feService})
// Fetch our saved svcs, one by one
svc, err := store.GetService(applicationToCreate.Name, apiService.Name)
require.NoError(t, err)
require.Equal(t, apiService, *svc)
svc, err = store.GetService(applicationToCreate.Name, feService.Name)
require.NoError(t, err)
require.Equal(t, feService, *svc)
})
}
const letterBytes = "abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ"
func randStringBytes(n int) string {
b := make([]byte, n)
for i := range b {
b[i] = letterBytes[rand.Intn(len(letterBytes))]
}
return string(b)
}
| 181 |
copilot-cli | aws | Go | // Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
// SPDX-License-Identifier: Apache-2.0
package config
import (
"testing"
"github.com/aws/aws-sdk-go/service/ssm"
"github.com/aws/aws-sdk-go/service/ssm/ssmiface"
"github.com/aws/copilot-cli/internal/pkg/aws/identity"
)
type mockSSM struct {
ssmiface.SSMAPI
t *testing.T
mockPutParameter func(t *testing.T, param *ssm.PutParameterInput) (*ssm.PutParameterOutput, error)
mockGetParametersByPath func(t *testing.T, param *ssm.GetParametersByPathInput) (*ssm.GetParametersByPathOutput, error)
mockGetParameter func(t *testing.T, param *ssm.GetParameterInput) (*ssm.GetParameterOutput, error)
mockDeleteParameter func(t *testing.T, param *ssm.DeleteParameterInput) (*ssm.DeleteParameterOutput, error)
}
func (m *mockSSM) PutParameter(in *ssm.PutParameterInput) (*ssm.PutParameterOutput, error) {
return m.mockPutParameter(m.t, in)
}
func (m *mockSSM) GetParametersByPath(in *ssm.GetParametersByPathInput) (*ssm.GetParametersByPathOutput, error) {
return m.mockGetParametersByPath(m.t, in)
}
func (m *mockSSM) GetParameter(in *ssm.GetParameterInput) (*ssm.GetParameterOutput, error) {
return m.mockGetParameter(m.t, in)
}
func (m *mockSSM) DeleteParameter(in *ssm.DeleteParameterInput) (*ssm.DeleteParameterOutput, error) {
return m.mockDeleteParameter(m.t, in)
}
type mockIdentityService struct {
mockIdentityServiceGet func() (identity.Caller, error)
}
func (m mockIdentityService) Get() (identity.Caller, error) {
return m.mockIdentityServiceGet()
}
| 46 |
copilot-cli | aws | Go | // Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
// SPDX-License-Identifier: Apache-2.0
package config
import (
"encoding/json"
"errors"
"fmt"
"github.com/aws/aws-sdk-go/aws"
"github.com/aws/aws-sdk-go/aws/awserr"
"github.com/aws/aws-sdk-go/service/ssm"
"github.com/aws/copilot-cli/internal/pkg/manifest/manifestinfo"
)
// Workload represents a deployable long-running service or task.
type Workload struct {
App string `json:"app"` // Name of the app this workload belongs to.
Name string `json:"name"` // Name of the workload, which must be unique within an app.
Type string `json:"type"` // Type of the workload (ex: Load Balanced Web Service, etc)
}
// CreateService instantiates a new service within an existing application. Skip if
// the service already exists in the application.
func (s *Store) CreateService(svc *Workload) error {
if err := s.createWorkload(svc); err != nil {
return fmt.Errorf("create service %s in application %s: %w", svc.Name, svc.App, err)
}
return nil
}
// CreateJob instantiates a new job within an existing application. Skip if the job already
// exists in the application.
func (s *Store) CreateJob(job *Workload) error {
if err := s.createWorkload(job); err != nil {
return fmt.Errorf("create job %s in application %s: %w", job.Name, job.App, err)
}
return nil
}
func (s *Store) createWorkload(wkld *Workload) error {
if _, err := s.GetApplication(wkld.App); err != nil {
return err
}
wkldPath := fmt.Sprintf(fmtWkldParamPath, wkld.App, wkld.Name)
data, err := marshal(wkld)
if err != nil {
return fmt.Errorf("serialize data: %w", err)
}
_, err = s.ssm.PutParameter(&ssm.PutParameterInput{
Name: aws.String(wkldPath),
Description: aws.String(fmt.Sprintf("Copilot %s %s", wkld.Type, wkld.Name)),
Type: aws.String(ssm.ParameterTypeString),
Value: aws.String(data),
Tags: []*ssm.Tag{
{
Key: aws.String("copilot-application"),
Value: aws.String(wkld.App),
},
{
Key: aws.String("copilot-service"),
Value: aws.String(wkld.Name),
},
},
})
if err != nil {
if aerr, ok := err.(awserr.Error); ok {
switch aerr.Code() {
case ssm.ErrCodeParameterAlreadyExists:
return nil
}
}
return err
}
return nil
}
// GetService gets a service belonging to a particular application by name. If no job or svc is found
// it returns ErrNoSuchService.
func (s *Store) GetService(appName, svcName string) (*Workload, error) {
param, err := s.getWorkloadParam(appName, svcName)
if err != nil {
var errNoSuchWkld *errNoSuchWorkload
if errors.As(err, &errNoSuchWkld) {
return nil, &ErrNoSuchService{
App: appName,
Name: svcName,
}
}
return nil, err
}
var svc Workload
err = json.Unmarshal(param, &svc)
if err != nil {
return nil, fmt.Errorf("read configuration for service %s in application %s: %w", svcName, appName, err)
}
if !manifestinfo.IsTypeAService(svc.Type) {
return nil, &ErrNoSuchService{
App: appName,
Name: svcName,
}
}
return &svc, nil
}
// GetJob gets a job belonging to a particular application by name. If no job by that name is found,
// it returns ErrNoSuchJob.
func (s *Store) GetJob(appName, jobName string) (*Workload, error) {
param, err := s.getWorkloadParam(appName, jobName)
if err != nil {
var errNoSuchWkld *errNoSuchWorkload
if errors.As(err, &errNoSuchWkld) {
return nil, &ErrNoSuchJob{
App: appName,
Name: jobName,
}
}
return nil, err
}
var job Workload
err = json.Unmarshal(param, &job)
if err != nil {
return nil, fmt.Errorf("read configuration for job %s in application %s: %w", jobName, appName, err)
}
if !manifestinfo.IsTypeAJob(job.Type) {
return nil, &ErrNoSuchJob{
App: appName,
Name: jobName,
}
}
return &job, nil
}
// GetWorkload gets a workload belonging to an application by name.
func (s *Store) GetWorkload(appName, name string) (*Workload, error) {
param, err := s.getWorkloadParam(appName, name)
if err != nil {
return nil, err
}
var wl Workload
err = json.Unmarshal(param, &wl)
if err != nil {
return nil, fmt.Errorf("read configuration for %s in application %s: %w", name, appName, err)
}
return &wl, nil
}
func (s *Store) getWorkloadParam(appName, name string) ([]byte, error) {
wlPath := fmt.Sprintf(fmtWkldParamPath, appName, name)
wlParam, err := s.ssm.GetParameter(&ssm.GetParameterInput{
Name: aws.String(wlPath),
})
if err != nil {
if aerr, ok := err.(awserr.Error); ok {
switch aerr.Code() {
case ssm.ErrCodeParameterNotFound:
return nil, &errNoSuchWorkload{
App: appName,
Name: name,
}
}
}
return nil, err
}
return []byte(*wlParam.Parameter.Value), nil
}
// ListServices returns all services belonging to a particular application.
func (s *Store) ListServices(appName string) ([]*Workload, error) {
wklds, err := s.listWorkloads(appName)
if err != nil {
return nil, fmt.Errorf("read service configuration for application %s: %w", appName, err)
}
var services []*Workload
for _, wkld := range wklds {
if manifestinfo.IsTypeAService(wkld.Type) {
services = append(services, wkld)
}
}
return services, nil
}
// ListJobs returns all jobs belonging to a particular application.
func (s *Store) ListJobs(appName string) ([]*Workload, error) {
wklds, err := s.listWorkloads(appName)
if err != nil {
return nil, fmt.Errorf("read job configuration for application %s: %w", appName, err)
}
var jobs []*Workload
for _, wkld := range wklds {
if manifestinfo.IsTypeAJob(wkld.Type) {
jobs = append(jobs, wkld)
}
}
return jobs, nil
}
// ListWorkloads returns all workloads belonging to a particular application.
func (s *Store) ListWorkloads(appName string) ([]*Workload, error) {
wklds, err := s.listWorkloads(appName)
if err != nil {
return nil, fmt.Errorf("read workload configuration for application %s: %w", appName, err)
}
return wklds, nil
}
func (s *Store) listWorkloads(appName string) ([]*Workload, error) {
var workloads []*Workload
workloadsPath := fmt.Sprintf(rootWkldParamPath, appName)
serializedWklds, err := s.listParams(workloadsPath)
if err != nil {
return nil, err
}
for _, serializedWkld := range serializedWklds {
var wkld Workload
if err := json.Unmarshal([]byte(*serializedWkld), &wkld); err != nil {
return nil, err
}
workloads = append(workloads, &wkld)
}
return workloads, nil
}
// DeleteService removes a service from SSM.
// If the service does not exist in the store or is successfully deleted then returns nil. Otherwise, returns an error.
func (s *Store) DeleteService(appName, svcName string) error {
if err := s.deleteWorkload(appName, svcName); err != nil {
return fmt.Errorf("delete service %s from application %s: %w", svcName, appName, err)
}
return nil
}
// DeleteJob removes a job from SSM.
// If the job does not exist in the store or is successfully deleted then returns nil. Otherwise, returns an error.
func (s *Store) DeleteJob(appName, jobName string) error {
if err := s.deleteWorkload(appName, jobName); err != nil {
return fmt.Errorf("delete job %s from application %s: %w", jobName, appName, err)
}
return nil
}
func (s *Store) deleteWorkload(appName, wkldName string) error {
paramName := fmt.Sprintf(fmtWkldParamPath, appName, wkldName)
_, err := s.ssm.DeleteParameter(&ssm.DeleteParameterInput{
Name: aws.String(paramName),
})
if err != nil {
if aerr, ok := err.(awserr.Error); ok {
switch aerr.Code() {
case ssm.ErrCodeParameterNotFound:
return nil
}
}
return err
}
return nil
}
| 271 |
copilot-cli | aws | Go | // Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
// SPDX-License-Identifier: Apache-2.0
package config
import (
"errors"
"fmt"
"testing"
"github.com/aws/aws-sdk-go/aws"
"github.com/aws/aws-sdk-go/aws/awserr"
"github.com/aws/aws-sdk-go/service/ssm"
"github.com/stretchr/testify/require"
)
func TestStore_ListServices(t *testing.T) {
frontendService := Workload{Name: "fe", App: "chicken", Type: "Load Balanced Web Service"}
frontendServiceString, err := marshal(frontendService)
frontendServicePath := fmt.Sprintf(fmtWkldParamPath, frontendService.App, frontendService.Name)
require.NoError(t, err, "Marshal svc should not fail")
apiService := Workload{Name: "api", App: "chicken", Type: "Load Balanced Web Service"}
apiServiceString, err := marshal(apiService)
apiServicePath := fmt.Sprintf(fmtWkldParamPath, apiService.App, apiService.Name)
require.NoError(t, err, "Marshal svc should not fail")
servicePath := fmt.Sprintf(rootWkldParamPath, frontendService.App)
lastPageInPaginatedResp := false
testCases := map[string]struct {
mockGetParametersByPath func(t *testing.T, param *ssm.GetParametersByPathInput) (*ssm.GetParametersByPathOutput, error)
wantedSvcs []Workload
wantedErr error
}{
"with multiple existing svcs": {
mockGetParametersByPath: func(t *testing.T, param *ssm.GetParametersByPathInput) (output *ssm.GetParametersByPathOutput, e error) {
require.Equal(t, servicePath, *param.Path)
return &ssm.GetParametersByPathOutput{
Parameters: []*ssm.Parameter{
{
Name: aws.String(frontendServicePath),
Value: aws.String(frontendServiceString),
},
{
Name: aws.String(apiServicePath),
Value: aws.String(apiServiceString),
},
},
}, nil
},
wantedSvcs: []Workload{apiService, frontendService},
wantedErr: nil,
},
"with malformed json": {
mockGetParametersByPath: func(t *testing.T, param *ssm.GetParametersByPathInput) (output *ssm.GetParametersByPathOutput, e error) {
require.Equal(t, servicePath, *param.Path)
return &ssm.GetParametersByPathOutput{
Parameters: []*ssm.Parameter{
{
Name: aws.String(apiServicePath),
Value: aws.String("oops"),
},
},
}, nil
},
wantedErr: fmt.Errorf("read service configuration for application chicken: invalid character 'o' looking for beginning of value"),
},
"with SSM error": {
mockGetParametersByPath: func(t *testing.T, param *ssm.GetParametersByPathInput) (output *ssm.GetParametersByPathOutput, e error) {
require.Equal(t, servicePath, *param.Path)
return nil, fmt.Errorf("broken")
},
wantedErr: fmt.Errorf("read service configuration for application chicken: broken"),
},
"with paginated response": {
mockGetParametersByPath: func(t *testing.T, param *ssm.GetParametersByPathInput) (output *ssm.GetParametersByPathOutput, e error) {
require.Equal(t, servicePath, *param.Path)
if !lastPageInPaginatedResp {
lastPageInPaginatedResp = true
return &ssm.GetParametersByPathOutput{
Parameters: []*ssm.Parameter{
{
Name: aws.String(frontendServicePath),
Value: aws.String(frontendServiceString),
},
},
NextToken: aws.String("more"),
}, nil
}
return &ssm.GetParametersByPathOutput{
Parameters: []*ssm.Parameter{
{
Name: aws.String(apiServicePath),
Value: aws.String(apiServiceString),
},
},
}, nil
},
wantedSvcs: []Workload{apiService, frontendService},
wantedErr: nil,
},
}
for name, tc := range testCases {
t.Run(name, func(t *testing.T) {
// GIVEN
lastPageInPaginatedResp = false
store := &Store{
ssm: &mockSSM{
t: t,
mockGetParametersByPath: tc.mockGetParametersByPath,
},
}
// WHEN
svcPointers, err := store.ListServices("chicken")
// THEN
if tc.wantedErr != nil {
require.EqualError(t, err, tc.wantedErr.Error())
} else {
var services []Workload
for _, s := range svcPointers {
services = append(services, *s)
}
require.ElementsMatch(t, tc.wantedSvcs, services)
}
})
}
}
func TestStore_ListWorkloads(t *testing.T) {
frontendService := Workload{Name: "fe", App: "chicken", Type: "Load Balanced Fargate Service"}
frontendServiceString, err := marshal(frontendService)
frontendServicePath := fmt.Sprintf(fmtWkldParamPath, frontendService.App, frontendService.Name)
require.NoError(t, err, "Marshal svc should not fail")
mailerJob := Workload{Name: "mailer", App: "chicken", Type: "Scheduled Job"}
mailerJobString, err := marshal(mailerJob)
mailerJobPath := fmt.Sprintf(fmtWkldParamPath, mailerJob.App, mailerJob.Name)
require.NoError(t, err, "Marshal job should not fail")
workloadPath := fmt.Sprintf(rootWkldParamPath, mailerJob.App)
testCases := map[string]struct {
mockGetParametersByPath func(t *testing.T, param *ssm.GetParametersByPathInput) (*ssm.GetParametersByPathOutput, error)
wantedWls []Workload
wantedErr error
}{
"with existing workloads": {
mockGetParametersByPath: func(t *testing.T, param *ssm.GetParametersByPathInput) (output *ssm.GetParametersByPathOutput, e error) {
require.Equal(t, workloadPath, *param.Path)
return &ssm.GetParametersByPathOutput{
Parameters: []*ssm.Parameter{
{
Name: aws.String(mailerJobPath),
Value: aws.String(mailerJobString),
},
{
Name: aws.String(frontendServicePath),
Value: aws.String(frontendServiceString),
},
},
}, nil
},
wantedWls: []Workload{mailerJob, frontendService},
wantedErr: nil,
},
"with job": {
mockGetParametersByPath: func(t *testing.T, param *ssm.GetParametersByPathInput) (output *ssm.GetParametersByPathOutput, e error) {
require.Equal(t, workloadPath, *param.Path)
return &ssm.GetParametersByPathOutput{
Parameters: []*ssm.Parameter{
{
Name: aws.String(mailerJobPath),
Value: aws.String(mailerJobString),
},
},
}, nil
},
wantedWls: []Workload{mailerJob},
wantedErr: nil,
},
}
for name, tc := range testCases {
t.Run(name, func(t *testing.T) {
//GIVEN
store := &Store{
ssm: &mockSSM{
t: t,
mockGetParametersByPath: tc.mockGetParametersByPath,
},
}
// WHEN
wlPointers, err := store.ListWorkloads("chicken")
// THEN
if tc.wantedErr != nil {
require.EqualError(t, err, tc.wantedErr.Error())
} else {
var wls []Workload
for _, w := range wlPointers {
wls = append(wls, *w)
}
require.ElementsMatch(t, tc.wantedWls, wls)
}
})
}
}
func TestStore_ListJobs(t *testing.T) {
frontendService := Workload{Name: "fe", App: "chicken", Type: "Load Balanced Fargate Service"}
frontendServiceString, err := marshal(frontendService)
frontendServicePath := fmt.Sprintf(fmtWkldParamPath, frontendService.App, frontendService.Name)
require.NoError(t, err, "Marshal svc should not fail")
mailerJob := Workload{Name: "mailer", App: "chicken", Type: "Scheduled Job"}
mailerJobString, err := marshal(mailerJob)
mailerJobPath := fmt.Sprintf(fmtWkldParamPath, mailerJob.App, mailerJob.Name)
require.NoError(t, err, "Marshal job should not fail")
analyticsJob := Workload{Name: "analyzer", App: "chicken", Type: "Scheduled Job"}
analyticsJobString, err := marshal(analyticsJob)
analyticsJobPath := fmt.Sprintf(fmtWkldParamPath, analyticsJob.App, analyticsJob.Name)
require.NoError(t, err, "Marshal job should not fail")
workloadPath := fmt.Sprintf(rootWkldParamPath, mailerJob.App)
testCases := map[string]struct {
mockGetParametersByPath func(t *testing.T, param *ssm.GetParametersByPathInput) (*ssm.GetParametersByPathOutput, error)
wantedJobs []Workload
wantedErr error
}{
"with existing jobs": {
mockGetParametersByPath: func(t *testing.T, param *ssm.GetParametersByPathInput) (output *ssm.GetParametersByPathOutput, e error) {
require.Equal(t, workloadPath, *param.Path)
return &ssm.GetParametersByPathOutput{
Parameters: []*ssm.Parameter{
{
Name: aws.String(mailerJobPath),
Value: aws.String(mailerJobString),
},
{
Name: aws.String(analyticsJobPath),
Value: aws.String(analyticsJobString),
},
},
}, nil
},
wantedJobs: []Workload{mailerJob, analyticsJob},
wantedErr: nil,
},
"with service and job": {
mockGetParametersByPath: func(t *testing.T, param *ssm.GetParametersByPathInput) (output *ssm.GetParametersByPathOutput, e error) {
require.Equal(t, workloadPath, *param.Path)
return &ssm.GetParametersByPathOutput{
Parameters: []*ssm.Parameter{
{
Name: aws.String(mailerJobPath),
Value: aws.String(mailerJobString),
},
{
Name: aws.String(frontendServicePath),
Value: aws.String(frontendServiceString),
},
},
}, nil
},
wantedJobs: []Workload{mailerJob},
wantedErr: nil,
},
}
for name, tc := range testCases {
t.Run(name, func(t *testing.T) {
//GIVEN
store := &Store{
ssm: &mockSSM{
t: t,
mockGetParametersByPath: tc.mockGetParametersByPath,
},
}
// WHEN
jobPointers, err := store.ListJobs("chicken")
// THEN
if tc.wantedErr != nil {
require.EqualError(t, err, tc.wantedErr.Error())
} else {
var jobs []Workload
for _, j := range jobPointers {
jobs = append(jobs, *j)
}
require.ElementsMatch(t, tc.wantedJobs, jobs)
}
})
}
}
func TestStore_GetService(t *testing.T) {
testService := Workload{Name: "api", App: "chicken", Type: "Load Balanced Web Service"}
testServiceString, err := marshal(testService)
testServicePath := fmt.Sprintf(fmtWkldParamPath, testService.App, testService.Name)
require.NoError(t, err, "Marshal svc should not fail")
testCases := map[string]struct {
mockGetParameter func(t *testing.T, param *ssm.GetParameterInput) (*ssm.GetParameterOutput, error)
wantedSvc Workload
wantedErr error
}{
"with existing service": {
mockGetParameter: func(t *testing.T, param *ssm.GetParameterInput) (*ssm.GetParameterOutput, error) {
require.Equal(t, testServicePath, *param.Name)
return &ssm.GetParameterOutput{
Parameter: &ssm.Parameter{
Name: aws.String(testServicePath),
Value: aws.String(testServiceString),
},
}, nil
},
wantedSvc: testService,
wantedErr: nil,
},
"with no existing svc": {
mockGetParameter: func(t *testing.T, param *ssm.GetParameterInput) (*ssm.GetParameterOutput, error) {
require.Equal(t, testServicePath, *param.Name)
return nil, awserr.New(ssm.ErrCodeParameterNotFound, "bloop", nil)
},
wantedErr: errors.New("couldn't find service api in the application chicken"),
},
"with malformed json": {
mockGetParameter: func(t *testing.T, param *ssm.GetParameterInput) (*ssm.GetParameterOutput, error) {
require.Equal(t, testServicePath, *param.Name)
return &ssm.GetParameterOutput{
Parameter: &ssm.Parameter{
Name: aws.String(testServicePath),
Value: aws.String("oops"),
},
}, nil
},
wantedErr: fmt.Errorf("read configuration for service api in application chicken: invalid character 'o' looking for beginning of value"),
},
"with SSM error": {
mockGetParameter: func(t *testing.T, param *ssm.GetParameterInput) (*ssm.GetParameterOutput, error) {
return nil, fmt.Errorf("broken")
},
wantedErr: fmt.Errorf("broken"),
},
}
for name, tc := range testCases {
t.Run(name, func(t *testing.T) {
// GIVEN
store := &Store{
ssm: &mockSSM{
t: t,
mockGetParameter: tc.mockGetParameter,
},
}
// WHEN
svc, err := store.GetService("chicken", "api")
// THEN
if tc.wantedErr != nil {
require.EqualError(t, err, tc.wantedErr.Error())
} else {
require.Equal(t, tc.wantedSvc, *svc)
}
})
}
}
func TestStore_GetJob(t *testing.T) {
mailerJob := Workload{Name: "mailer", App: "chicken", Type: "Scheduled Job"}
mailerJobString, err := marshal(mailerJob)
mailerJobPath := fmt.Sprintf(fmtWkldParamPath, mailerJob.App, mailerJob.Name)
require.NoError(t, err, "Marshal job should not fail")
testService := Workload{Name: "mailer", App: "chicken", Type: "Load Balanced Fargate Service"}
testServiceString, err := marshal(testService)
testServicePath := fmt.Sprintf(fmtWkldParamPath, testService.App, testService.Name)
require.NoError(t, err, "Marshal svc should not fail")
testCases := map[string]struct {
mockGetParameter func(t *testing.T, param *ssm.GetParameterInput) (*ssm.GetParameterOutput, error)
wantedJob Workload
wantedErr error
}{
"with existing job": {
mockGetParameter: func(t *testing.T, param *ssm.GetParameterInput) (*ssm.GetParameterOutput, error) {
require.Equal(t, mailerJobPath, *param.Name)
return &ssm.GetParameterOutput{
Parameter: &ssm.Parameter{
Name: aws.String(mailerJobPath),
Value: aws.String(mailerJobString),
},
}, nil
},
wantedJob: mailerJob,
wantedErr: nil,
},
"with no existing job": {
mockGetParameter: func(t *testing.T, param *ssm.GetParameterInput) (*ssm.GetParameterOutput, error) {
require.Equal(t, mailerJobPath, *param.Name)
return nil, awserr.New(ssm.ErrCodeParameterNotFound, "bloop", nil)
},
wantedErr: errors.New("couldn't find job mailer in the application chicken"),
},
"with existing service": {
mockGetParameter: func(t *testing.T, param *ssm.GetParameterInput) (*ssm.GetParameterOutput, error) {
require.Equal(t, mailerJobPath, *param.Name)
return &ssm.GetParameterOutput{
Parameter: &ssm.Parameter{
Name: aws.String(testServicePath),
Value: aws.String(testServiceString),
},
}, nil
},
wantedErr: &ErrNoSuchJob{
App: mailerJob.App,
Name: mailerJob.Name,
},
},
}
for name, tc := range testCases {
t.Run(name, func(t *testing.T) {
// GIVEN
store := &Store{
ssm: &mockSSM{
t: t,
mockGetParameter: tc.mockGetParameter,
},
}
// WHEN
job, err := store.GetJob("chicken", "mailer")
// THEN
if tc.wantedErr != nil {
require.EqualError(t, err, tc.wantedErr.Error())
} else {
require.Equal(t, tc.wantedJob, *job)
}
})
}
}
func TestStore_CreateService(t *testing.T) {
testApplication := Application{Name: "chicken", Version: "1.0"}
testApplicationString, err := marshal(testApplication)
testApplicationPath := fmt.Sprintf(fmtApplicationPath, testApplication.Name)
require.NoError(t, err, "Marshal app should not fail")
testService := Workload{Name: "api", App: testApplication.Name, Type: "Load Balanced Fargate Service"}
testServiceString, err := marshal(testService)
testServicePath := fmt.Sprintf(fmtWkldParamPath, testService.App, testService.Name)
require.NoError(t, err, "Marshal svc should not fail")
tagsForServiceParam := []*ssm.Tag{
{
Key: aws.String("copilot-application"),
Value: aws.String(testApplication.Name),
},
{
Key: aws.String("copilot-service"),
Value: aws.String(testService.Name),
},
}
testCases := map[string]struct {
mockGetParameter func(t *testing.T, param *ssm.GetParameterInput) (*ssm.GetParameterOutput, error)
mockPutParameter func(t *testing.T, param *ssm.PutParameterInput) (*ssm.PutParameterOutput, error)
wantedErr error
}{
"with no existing svc": {
mockPutParameter: func(t *testing.T, param *ssm.PutParameterInput) (*ssm.PutParameterOutput, error) {
require.Equal(t, testServicePath, *param.Name)
require.Equal(t, testServiceString, *param.Value)
require.Equal(t, tagsForServiceParam, param.Tags)
return &ssm.PutParameterOutput{
Version: aws.Int64(1),
}, nil
},
mockGetParameter: func(t *testing.T, param *ssm.GetParameterInput) (*ssm.GetParameterOutput, error) {
require.Equal(t, testApplicationPath, *param.Name)
return &ssm.GetParameterOutput{
Parameter: &ssm.Parameter{
Name: aws.String(testApplicationPath),
Value: aws.String(testApplicationString),
},
}, nil
},
},
"with existing svc": {
mockPutParameter: func(t *testing.T, param *ssm.PutParameterInput) (*ssm.PutParameterOutput, error) {
require.Equal(t, testServicePath, *param.Name)
require.Equal(t, tagsForServiceParam, param.Tags)
return nil, awserr.New(ssm.ErrCodeParameterAlreadyExists, "Already exists", fmt.Errorf("Already Exists"))
},
mockGetParameter: func(t *testing.T, param *ssm.GetParameterInput) (*ssm.GetParameterOutput, error) {
require.Equal(t, testApplicationPath, *param.Name)
return &ssm.GetParameterOutput{
Parameter: &ssm.Parameter{
Name: aws.String(testApplicationPath),
Value: aws.String(testApplicationString),
},
}, nil
},
wantedErr: nil,
},
"with SSM error": {
mockPutParameter: func(t *testing.T, param *ssm.PutParameterInput) (*ssm.PutParameterOutput, error) {
require.Equal(t, tagsForServiceParam, param.Tags)
return nil, fmt.Errorf("broken")
},
mockGetParameter: func(t *testing.T, param *ssm.GetParameterInput) (*ssm.GetParameterOutput, error) {
require.Equal(t, testApplicationPath, *param.Name)
return &ssm.GetParameterOutput{
Parameter: &ssm.Parameter{
Name: aws.String(testApplicationPath),
Value: aws.String(testApplicationString),
},
}, nil
},
wantedErr: fmt.Errorf("create service api in application chicken: broken"),
},
}
for name, tc := range testCases {
t.Run(name, func(t *testing.T) {
// GIVEN
store := &Store{
ssm: &mockSSM{
t: t,
mockPutParameter: tc.mockPutParameter,
mockGetParameter: tc.mockGetParameter,
},
}
// WHEN
err := store.CreateService(&Workload{
Name: testService.Name,
App: testService.App,
Type: testService.Type})
// THEN
if tc.wantedErr != nil {
require.EqualError(t, err, tc.wantedErr.Error())
}
})
}
}
func TestDeleteService(t *testing.T) {
mockApplicationName := "mockApplicationName"
mockSvcName := "mockSvcName"
mockError := errors.New("mockError")
tests := map[string]struct {
mockDeleteParam func(t *testing.T, in *ssm.DeleteParameterInput) (*ssm.DeleteParameterOutput, error)
want error
}{
"parameter is already deleted": {
mockDeleteParam: func(t *testing.T, in *ssm.DeleteParameterInput) (*ssm.DeleteParameterOutput, error) {
return nil, awserr.New(ssm.ErrCodeParameterNotFound, "Not found", nil)
},
},
"unexpected error": {
mockDeleteParam: func(t *testing.T, in *ssm.DeleteParameterInput) (*ssm.DeleteParameterOutput, error) {
return nil, mockError
},
want: fmt.Errorf("delete service %s from application %s: %w", mockSvcName, mockApplicationName, mockError),
},
"successfully deleted param": {
mockDeleteParam: func(t *testing.T, in *ssm.DeleteParameterInput) (*ssm.DeleteParameterOutput, error) {
wantedPath := fmt.Sprintf(fmtWkldParamPath, mockApplicationName, mockSvcName)
require.Equal(t, wantedPath, *in.Name)
return nil, nil
},
},
}
for name, test := range tests {
t.Run(name, func(t *testing.T) {
s := &Store{
ssm: &mockSSM{
t: t,
mockDeleteParameter: test.mockDeleteParam,
},
}
got := s.DeleteService(mockApplicationName, mockSvcName)
require.Equal(t, test.want, got)
})
}
}
| 608 |
copilot-cli | aws | Go | // Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
// SPDX-License-Identifier: Apache-2.0
// Package deploy holds the structures to deploy infrastructure resources.
// This file defines application deployment resources.
package deploy
import (
"fmt"
"github.com/aws/aws-sdk-go/aws/arn"
)
const appDNSDelegationRoleName = "DNSDelegationRole"
// CreateAppInput holds the fields required to create an application stack set.
type CreateAppInput struct {
Name string // Name of the application that needs to be created.
AccountID string // AWS account ID to administrate the application.
DNSDelegationAccounts []string // Accounts to grant DNS access to for this application.
DomainName string // DNS Name used for this application.
DomainHostedZoneID string // Hosted Zone ID for the domain.
PermissionsBoundary string // Name of the IAM Managed Policy to set a permissions boundary.
AdditionalTags map[string]string // AdditionalTags are labels applied to resources under the application.
Version string // The version of the application template to create the stack/stackset. If empty, creates the legacy stack/stackset.
}
// AppInformation holds information about the application that need to be propagated to the env stacks and workload stacks.
type AppInformation struct {
AccountPrincipalARN string
Domain string
Name string
PermissionsBoundary string
}
// DNSDelegationRole returns the ARN of the app's DNS delegation role.
func (a *AppInformation) DNSDelegationRole() string {
if a.AccountPrincipalARN == "" || a.Domain == "" {
return ""
}
appRole, err := arn.Parse(a.AccountPrincipalARN)
if err != nil {
return ""
}
return fmt.Sprintf("arn:%s:iam::%s:role/%s", appRole.Partition, appRole.AccountID, DNSDelegationRoleName(a.Name))
}
// DNSDelegationRoleName returns the DNSDelegation role name of the app.
func DNSDelegationRoleName(appName string) string {
return fmt.Sprintf("%s-%s", appName, appDNSDelegationRoleName)
}
| 53 |
copilot-cli | aws | Go | // Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
// SPDX-License-Identifier: Apache-2.0
package deploy
import (
"testing"
"github.com/stretchr/testify/require"
)
func TestAppInformation_DNSDelegationRole(t *testing.T) {
testCases := map[string]struct {
in *AppInformation
want string
}{
"without tools account ARN": {
want: "",
in: &AppInformation{
AccountPrincipalARN: "",
Domain: "ecs.aws",
},
},
"without DNS": {
want: "",
in: &AppInformation{
AccountPrincipalARN: "",
Domain: "ecs.aws",
},
},
"with invalid tools principal": {
want: "",
in: &AppInformation{
AccountPrincipalARN: "0000000",
Domain: "ecs.aws",
},
},
"with dns and tools principal": {
want: "arn:aws:iam::0000000:role/-DNSDelegationRole",
in: &AppInformation{
AccountPrincipalARN: "arn:aws:iam::0000000:root",
Domain: "ecs.aws",
},
},
}
for name, tc := range testCases {
t.Run(name, func(t *testing.T) {
require.Equal(t, tc.want, tc.in.DNSDelegationRole())
})
}
}
| 54 |
copilot-cli | aws | Go | // Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
// SPDX-License-Identifier: Apache-2.0
// Package deploy holds the structures to deploy infrastructure resources.
package deploy
import (
"fmt"
"sort"
"github.com/aws/aws-sdk-go/aws/arn"
"github.com/aws/aws-sdk-go/aws/session"
"github.com/aws/copilot-cli/internal/pkg/manifest/manifestinfo"
rg "github.com/aws/copilot-cli/internal/pkg/aws/resourcegroups"
"github.com/aws/copilot-cli/internal/pkg/config"
)
const (
// AppTagKey is tag key for Copilot app.
AppTagKey = "copilot-application"
// EnvTagKey is tag key for Copilot env.
EnvTagKey = "copilot-environment"
// ServiceTagKey is tag key for Copilot service.
ServiceTagKey = "copilot-service"
// PipelineTagKey is tag key for Copilot pipeline.
PipelineTagKey = "copilot-pipeline"
// TaskTagKey is tag key for Copilot task.
TaskTagKey = "copilot-task"
)
const (
stackResourceType = "cloudformation:stack"
pipelineResourceType = "codepipeline:pipeline"
snsResourceType = "sns"
// fmtSNSTopicNamePrefix holds the App-Env-Workload- components of a topic name
fmtSNSTopicNamePrefix = "%s-%s-%s-"
snsServiceName = "sns"
)
// ResourceGetter retrieves a group of resources that satisfy certain conditions, such as tags.
type ResourceGetter interface {
GetResourcesByTags(resourceType string, tags map[string]string) ([]*rg.Resource, error)
}
// ConfigStoreClient wraps config store methods utilized by deploy store.
type ConfigStoreClient interface {
GetEnvironment(appName string, environmentName string) (*config.Environment, error)
ListEnvironments(appName string) ([]*config.Environment, error)
ListWorkloads(appName string) ([]*config.Workload, error)
GetService(appName, svcName string) (*config.Workload, error)
GetJob(appName, jobname string) (*config.Workload, error)
}
// SessionProvider is the interface to provide configuration for the AWS SDK's service clients.
type SessionProvider interface {
FromRole(roleARN, region string) (*session.Session, error)
}
// Store fetches information on deployed services.
type Store struct {
configStore ConfigStoreClient
newRgClientFromIDs func(string, string) (ResourceGetter, error)
newRgClientFromRole func(string, string) (ResourceGetter, error)
}
// NewStore returns a new store.
func NewStore(sessProvider SessionProvider, store ConfigStoreClient) (*Store, error) {
s := &Store{
configStore: store,
}
s.newRgClientFromIDs = func(appName, envName string) (ResourceGetter, error) {
env, err := s.configStore.GetEnvironment(appName, envName)
if err != nil {
return nil, fmt.Errorf("get environment config %s: %w", envName, err)
}
sess, err := sessProvider.FromRole(env.ManagerRoleARN, env.Region)
if err != nil {
return nil, fmt.Errorf("create new session from env role: %w", err)
}
return rg.New(sess), nil
}
s.newRgClientFromRole = func(roleARN, region string) (ResourceGetter, error) {
sess, err := sessProvider.FromRole(roleARN, region)
if err != nil {
return nil, fmt.Errorf("create new session from env role: %w", err)
}
return rg.New(sess), nil
}
return s, nil
}
// Pipeline is a deployed pipeline.
type Pipeline struct {
// The name of the application that the pipeline is associated with.
AppName string
// The pipeline resource name (physical resource ID) generated by CloudFormation.
ResourceName string
// The name given by user in the pipeline manifest.
Name string
// Whether the pipeline follows legacy-naming, i.e. not namespaced with "pipeline-app-".
IsLegacy bool
}
// PipelineStore fetches information on deployed pipelines.
type PipelineStore struct {
getter ResourceGetter
}
// NewPipelineStore returns a new PipelineStore.
func NewPipelineStore(getter ResourceGetter) *PipelineStore {
return &PipelineStore{
getter: getter,
}
}
// ListDeployedPipelines returns a list of names of deployed pipelines by looking up
// pipeline resources with tags.
func (p *PipelineStore) ListDeployedPipelines(appName string) ([]Pipeline, error) {
var pipelines []Pipeline
pipelineResources, err := p.getter.GetResourcesByTags(pipelineResourceType, map[string]string{
AppTagKey: appName,
})
if err != nil {
return nil, fmt.Errorf("get pipeline resources by tags for app %s: %w", appName, err)
}
for _, pipelineRes := range pipelineResources {
resourceName, err := getPipelineResourceName(pipelineRes.ARN)
if err != nil {
return nil, err
}
pipeline := Pipeline{
ResourceName: resourceName,
AppName: appName,
}
if name, ok := pipelineRes.Tags[PipelineTagKey]; !ok {
pipeline.IsLegacy = true
pipeline.Name = resourceName // A legacy-named pipeline's resource name is the same as pipeline name.
} else {
pipeline.Name = name
}
pipelines = append(pipelines, pipeline)
}
return pipelines, nil
}
// ListDeployedServices returns the names of deployed services in an environment.
func (s *Store) ListDeployedServices(appName string, envName string) ([]string, error) {
return s.listDeployedWorkloads(appName, envName, manifestinfo.ServiceTypes())
}
// ListDeployedJobs returns the names of deployed jobs in an environment.
func (s *Store) ListDeployedJobs(appName string, envName string) ([]string, error) {
return s.listDeployedWorkloads(appName, envName, manifestinfo.JobTypes())
}
func (s *Store) listDeployedWorkloads(appName string, envName string, workloadType []string) ([]string, error) {
allWorkloads, err := s.configStore.ListWorkloads(appName)
if err != nil {
return nil, fmt.Errorf("list all workloads in application %s: %w", appName, err)
}
filteredWorkloadNames := make(map[string]bool)
for _, wkld := range allWorkloads {
for _, t := range workloadType {
if wkld.Type != t {
continue
}
filteredWorkloadNames[wkld.Name] = true
}
}
rgClient, err := s.newRgClientFromIDs(appName, envName)
if err != nil {
return nil, err
}
resources, err := rgClient.GetResourcesByTags(stackResourceType, map[string]string{
AppTagKey: appName,
EnvTagKey: envName,
})
if err != nil {
return nil, fmt.Errorf("get resources by Copilot tags: %w", err)
}
var wklds []string
for _, resource := range resources {
name := resource.Tags[ServiceTagKey]
if name == "" || contains(name, wklds) {
// To avoid listing duplicate service entry in a case when service has addons stack.
continue
}
if _, ok := filteredWorkloadNames[name]; ok {
wklds = append(wklds, name)
}
}
sort.Strings(wklds)
return wklds, nil
}
// ListSNSTopics returns a list of SNS topics deployed to the current environment and tagged with
// Copilot identifiers.
func (s *Store) ListSNSTopics(appName string, envName string) ([]Topic, error) {
rgClient, err := s.newRgClientFromIDs(appName, envName)
if err != nil {
return nil, err
}
topics, err := rgClient.GetResourcesByTags(snsResourceType, map[string]string{
AppTagKey: appName,
EnvTagKey: envName,
})
if err != nil {
return nil, err
}
var out []Topic
for _, r := range topics {
// If the topic doesn't have a specific workload tag, don't return it.
if _, ok := r.Tags[ServiceTagKey]; !ok {
continue
}
t, err := NewTopic(r.ARN, appName, envName, r.Tags[ServiceTagKey])
if err != nil {
// If there's an error parsing the topic ARN, don't include it in the list of topics.
// This includes times where the topic name does not match its tags, or the name
// is invalid.
switch err {
case errInvalidARN:
// This error indicates that the returned ARN is not parseable.
return nil, err
default:
continue
}
}
out = append(out, *t)
}
return out, nil
}
func contains(name string, names []string) bool {
for _, n := range names {
if name == n {
return true
}
}
return false
}
type result struct {
name string
err error
}
func (s *Store) deployedServices(rgClient ResourceGetter, app, env, svc string) result {
resources, err := rgClient.GetResourcesByTags(stackResourceType, map[string]string{
AppTagKey: app,
EnvTagKey: env,
ServiceTagKey: svc,
})
if err != nil {
return result{err: fmt.Errorf("get resources by Copilot tags: %w", err)}
}
// If no resources found, the resp length is 0.
var res result
if len(resources) != 0 {
res.name = env
}
return res
}
// ListEnvironmentsDeployedTo returns all the environment that a service is deployed in.
func (s *Store) ListEnvironmentsDeployedTo(appName string, svcName string) ([]string, error) {
envs, err := s.configStore.ListEnvironments(appName)
if err != nil {
return nil, fmt.Errorf("list environment for app %s: %w", appName, err)
}
deployedEnv := make(chan result, len(envs))
defer close(deployedEnv)
for _, env := range envs {
go func(env *config.Environment) {
rgClient, err := s.newRgClientFromRole(env.ManagerRoleARN, env.Region)
if err != nil {
deployedEnv <- result{err: err}
return
}
deployedEnv <- s.deployedServices(rgClient, appName, env.Name, svcName)
}(env)
}
var envsWithDeployment []string
for i := 0; i < len(envs); i++ {
env := <-deployedEnv
if env.err != nil {
return nil, env.err
}
if env.name != "" {
envsWithDeployment = append(envsWithDeployment, env.name)
}
}
return envsWithDeployment, nil
}
// IsServiceDeployed returns whether a service is deployed in an environment or not.
func (s *Store) IsServiceDeployed(appName string, envName string, svcName string) (bool, error) {
return s.isWorkloadDeployed(appName, envName, svcName)
}
// IsJobDeployed returns whether a job is deployed in an environment or not by checking for a state machine.
func (s *Store) IsJobDeployed(appName, envName, jobName string) (bool, error) {
return s.isWorkloadDeployed(appName, envName, jobName)
}
func (s *Store) isWorkloadDeployed(appName, envName, name string) (bool, error) {
rgClient, err := s.newRgClientFromIDs(appName, envName)
if err != nil {
return false, err
}
stacks, err := rgClient.GetResourcesByTags(stackResourceType, map[string]string{
AppTagKey: appName,
EnvTagKey: envName,
ServiceTagKey: name,
})
if err != nil {
return false, fmt.Errorf("get resources by Copilot tags: %w", err)
}
if len(stacks) != 0 {
return true, nil
}
return false, nil
}
func getPipelineResourceName(resourceArn string) (string, error) {
parsedArn, err := arn.Parse(resourceArn)
if err != nil {
return "", fmt.Errorf("parse pipeline ARN: %s", resourceArn)
}
return parsedArn.Resource, nil
}
| 342 |
copilot-cli | aws | Go | // Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
// SPDX-License-Identifier: Apache-2.0
package deploy
import (
"errors"
"fmt"
"testing"
"github.com/aws/aws-sdk-go/aws/arn"
"github.com/aws/copilot-cli/internal/pkg/manifest/manifestinfo"
rg "github.com/aws/copilot-cli/internal/pkg/aws/resourcegroups"
"github.com/aws/copilot-cli/internal/pkg/config"
"github.com/aws/copilot-cli/internal/pkg/deploy/mocks"
"github.com/golang/mock/gomock"
"github.com/stretchr/testify/require"
)
type storeMock struct {
rgGetter *mocks.MockResourceGetter
configStore *mocks.MockConfigStoreClient
}
func TestStore_ListDeployedServices(t *testing.T) {
testCases := map[string]struct {
inputApp string
inputEnv string
setupMocks func(mocks storeMock)
wantedError error
wantedSvcs []string
}{
"return error if fail to get resources by tag": {
inputApp: "mockApp",
inputEnv: "mockEnv",
setupMocks: func(m storeMock) {
gomock.InOrder(
m.configStore.EXPECT().ListWorkloads("mockApp").Return([]*config.Workload{}, nil),
m.rgGetter.EXPECT().GetResourcesByTags(stackResourceType, map[string]string{
AppTagKey: "mockApp",
EnvTagKey: "mockEnv",
}).Return(nil, errors.New("some error")),
)
},
wantedError: fmt.Errorf("get resources by Copilot tags: some error"),
},
"return nil if no services are found": {
inputApp: "mockApp",
inputEnv: "mockEnv",
setupMocks: func(m storeMock) {
gomock.InOrder(
m.configStore.EXPECT().ListWorkloads("mockApp").Return([]*config.Workload{}, nil),
m.rgGetter.EXPECT().GetResourcesByTags(stackResourceType, map[string]string{
AppTagKey: "mockApp",
EnvTagKey: "mockEnv",
}).Return([]*rg.Resource{{ARN: "mockARN", Tags: map[string]string{}}}, nil),
)
},
wantedSvcs: nil,
},
"return error if fail to get config service": {
inputApp: "mockApp",
inputEnv: "mockEnv",
setupMocks: func(m storeMock) {
gomock.InOrder(
m.configStore.EXPECT().ListWorkloads("mockApp").Return(nil, errors.New("some error")),
m.rgGetter.EXPECT().GetResourcesByTags(stackResourceType, map[string]string{
AppTagKey: "mockApp",
EnvTagKey: "mockEnv",
}).Times(0),
)
},
wantedError: fmt.Errorf("list all workloads in application mockApp: some error"),
},
"success": {
inputApp: "mockApp",
inputEnv: "mockEnv",
setupMocks: func(m storeMock) {
gomock.InOrder(
m.configStore.EXPECT().ListWorkloads("mockApp").Return([]*config.Workload{
{
App: "mockApp",
Name: "mockSvc1",
Type: manifestinfo.LoadBalancedWebServiceType,
},
{
App: "mockApp",
Name: "mockSvc2",
Type: manifestinfo.RequestDrivenWebServiceType,
},
{
App: "mockApp",
Name: "mockJob",
Type: manifestinfo.ScheduledJobType,
},
}, nil),
m.rgGetter.EXPECT().GetResourcesByTags(stackResourceType, map[string]string{
AppTagKey: "mockApp",
EnvTagKey: "mockEnv",
}).Return([]*rg.Resource{{ARN: "mockARN1", Tags: map[string]string{ServiceTagKey: "mockSvc1"}},
{ARN: "mockARN2", Tags: map[string]string{ServiceTagKey: "mockSvc2"}}}, nil),
)
},
wantedSvcs: []string{"mockSvc1", "mockSvc2"},
},
}
for name, tc := range testCases {
t.Run(name, func(t *testing.T) {
ctrl := gomock.NewController(t)
defer ctrl.Finish()
mockConfigStore := mocks.NewMockConfigStoreClient(ctrl)
mockRgGetter := mocks.NewMockResourceGetter(ctrl)
mocks := storeMock{
rgGetter: mockRgGetter,
configStore: mockConfigStore,
}
tc.setupMocks(mocks)
store := &Store{
configStore: mockConfigStore,
newRgClientFromIDs: func(string, string) (ResourceGetter, error) { return mockRgGetter, nil },
}
// WHEN
svcs, err := store.ListDeployedServices(tc.inputApp, tc.inputEnv)
// THEN
if tc.wantedError != nil {
require.EqualError(t, err, tc.wantedError.Error())
require.ElementsMatch(t, svcs, tc.wantedSvcs)
} else {
require.NoError(t, err)
}
})
}
}
func TestStore_ListDeployedJobs(t *testing.T) {
testCases := map[string]struct {
inputApp string
inputEnv string
setupMocks func(mocks storeMock)
wantedError error
wantedSvcs []string
}{
"success": {
inputApp: "mockApp",
inputEnv: "mockEnv",
setupMocks: func(m storeMock) {
gomock.InOrder(
m.configStore.EXPECT().ListWorkloads("mockApp").Return([]*config.Workload{
{
App: "mockApp",
Name: "mockSvc1",
Type: manifestinfo.LoadBalancedWebServiceType,
},
{
App: "mockApp",
Name: "mockSvc2",
Type: manifestinfo.RequestDrivenWebServiceType,
},
{
App: "mockApp",
Name: "mockJob1",
Type: manifestinfo.ScheduledJobType,
},
{
App: "mockApp",
Name: "mockJob2",
Type: manifestinfo.ScheduledJobType,
},
}, nil),
m.rgGetter.EXPECT().GetResourcesByTags(stackResourceType, map[string]string{
AppTagKey: "mockApp",
EnvTagKey: "mockEnv",
}).Return([]*rg.Resource{{ARN: "mockARN1", Tags: map[string]string{ServiceTagKey: "mockJob1"}},
{ARN: "mockARN2", Tags: map[string]string{ServiceTagKey: "mockJob2"}}}, nil),
)
},
wantedSvcs: []string{"mockJob1", "mockJob2"},
},
"return nil if no jobs are found": {
inputApp: "mockApp",
inputEnv: "mockEnv",
setupMocks: func(m storeMock) {
gomock.InOrder(
m.configStore.EXPECT().ListWorkloads("mockApp").Return([]*config.Workload{}, nil),
m.rgGetter.EXPECT().GetResourcesByTags(stackResourceType, map[string]string{
AppTagKey: "mockApp",
EnvTagKey: "mockEnv",
}).Return([]*rg.Resource{{ARN: "mockARN", Tags: map[string]string{}}}, nil),
)
},
},
}
for name, tc := range testCases {
t.Run(name, func(t *testing.T) {
ctrl := gomock.NewController(t)
defer ctrl.Finish()
mockConfigStore := mocks.NewMockConfigStoreClient(ctrl)
mockRgGetter := mocks.NewMockResourceGetter(ctrl)
mocks := storeMock{
rgGetter: mockRgGetter,
configStore: mockConfigStore,
}
tc.setupMocks(mocks)
store := &Store{
configStore: mockConfigStore,
newRgClientFromIDs: func(string, string) (ResourceGetter, error) { return mockRgGetter, nil },
}
// WHEN
jobs, err := store.ListDeployedJobs(tc.inputApp, tc.inputEnv)
// THEN
if tc.wantedError != nil {
require.EqualError(t, err, tc.wantedError.Error())
require.ElementsMatch(t, jobs, tc.wantedSvcs)
} else {
require.NoError(t, err)
}
})
}
}
func TestStore_ListEnvironmentsDeployedTo(t *testing.T) {
testCases := map[string]struct {
inputApp string
inputSvc string
setupMocks func(mocks storeMock)
wantedError error
wantedEnvs []string
}{
"return error if fail to list all config environments": {
inputApp: "mockApp",
inputSvc: "mockSvc",
setupMocks: func(m storeMock) {
gomock.InOrder(
m.configStore.EXPECT().ListEnvironments("mockApp").Return(nil, errors.New("some error")),
)
},
wantedError: fmt.Errorf("list environment for app mockApp: some error"),
},
"return error if fail to get resources by tags": {
inputApp: "mockApp",
inputSvc: "mockSvc",
setupMocks: func(m storeMock) {
gomock.InOrder(
m.configStore.EXPECT().ListEnvironments("mockApp").Return([]*config.Environment{
{
App: "mockApp",
Name: "mockEnv",
},
}, nil),
m.rgGetter.EXPECT().GetResourcesByTags(stackResourceType, map[string]string{
AppTagKey: "mockApp",
EnvTagKey: "mockEnv",
ServiceTagKey: "mockSvc",
}).Return(nil, errors.New("some error")),
)
},
wantedError: fmt.Errorf("get resources by Copilot tags: some error"),
},
"success": {
inputApp: "mockApp",
inputSvc: "mockSvc",
setupMocks: func(m storeMock) {
m.configStore.EXPECT().ListEnvironments("mockApp").Return([]*config.Environment{
{
App: "mockApp",
Name: "mockEnv1",
},
{
App: "mockApp",
Name: "mockEnv2",
},
}, nil)
m.rgGetter.EXPECT().GetResourcesByTags(stackResourceType, map[string]string{
AppTagKey: "mockApp",
EnvTagKey: "mockEnv1",
ServiceTagKey: "mockSvc",
}).Return([]*rg.Resource{{ARN: "mockSvcARN"}}, nil)
m.rgGetter.EXPECT().GetResourcesByTags(stackResourceType, map[string]string{
AppTagKey: "mockApp",
EnvTagKey: "mockEnv2",
ServiceTagKey: "mockSvc",
}).Return([]*rg.Resource{}, nil)
},
wantedEnvs: []string{"mockEnv1"},
},
}
for name, tc := range testCases {
t.Run(name, func(t *testing.T) {
ctrl := gomock.NewController(t)
defer ctrl.Finish()
mockConfigStore := mocks.NewMockConfigStoreClient(ctrl)
mockRgGetter := mocks.NewMockResourceGetter(ctrl)
mocks := storeMock{
rgGetter: mockRgGetter,
configStore: mockConfigStore,
}
tc.setupMocks(mocks)
store := &Store{
configStore: mockConfigStore,
newRgClientFromRole: func(string, string) (ResourceGetter, error) { return mockRgGetter, nil },
}
// WHEN
envs, err := store.ListEnvironmentsDeployedTo(tc.inputApp, tc.inputSvc)
// THEN
if tc.wantedError != nil {
require.EqualError(t, err, tc.wantedError.Error())
require.ElementsMatch(t, envs, tc.wantedEnvs)
} else {
require.NoError(t, err)
}
})
}
}
func TestStore_IsServiceDeployed(t *testing.T) {
testCases := map[string]struct {
inputApp string
inputEnv string
inputSvc string
setupMocks func(mocks storeMock)
wantedError error
wantedDeployed bool
}{
"return error if fail to get resources by tags": {
inputApp: "mockApp",
inputEnv: "mockEnv",
inputSvc: "mockSvc",
setupMocks: func(m storeMock) {
gomock.InOrder(
m.rgGetter.EXPECT().GetResourcesByTags(stackResourceType, map[string]string{
AppTagKey: "mockApp",
EnvTagKey: "mockEnv",
ServiceTagKey: "mockSvc",
}).Return(nil, errors.New("some error")),
)
},
wantedError: fmt.Errorf("get resources by Copilot tags: some error"),
},
"success with false": {
inputApp: "mockApp",
inputEnv: "mockEnv",
inputSvc: "mockSvc",
setupMocks: func(m storeMock) {
gomock.InOrder(
m.rgGetter.EXPECT().GetResourcesByTags(stackResourceType, map[string]string{
AppTagKey: "mockApp",
EnvTagKey: "mockEnv",
ServiceTagKey: "mockSvc",
}).Return([]*rg.Resource{}, nil),
)
},
wantedDeployed: false,
},
"success with true": {
inputApp: "mockApp",
inputEnv: "mockEnv",
inputSvc: "mockSvc",
setupMocks: func(m storeMock) {
gomock.InOrder(
m.rgGetter.EXPECT().GetResourcesByTags(stackResourceType, map[string]string{
AppTagKey: "mockApp",
EnvTagKey: "mockEnv",
ServiceTagKey: "mockSvc",
}).Return([]*rg.Resource{{ARN: "mockSvcARN"}}, nil),
)
},
wantedDeployed: true,
},
}
for name, tc := range testCases {
t.Run(name, func(t *testing.T) {
ctrl := gomock.NewController(t)
defer ctrl.Finish()
mockConfigStore := mocks.NewMockConfigStoreClient(ctrl)
mockRgGetter := mocks.NewMockResourceGetter(ctrl)
mocks := storeMock{
rgGetter: mockRgGetter,
configStore: mockConfigStore,
}
tc.setupMocks(mocks)
store := &Store{
configStore: mockConfigStore,
newRgClientFromIDs: func(string, string) (ResourceGetter, error) { return mockRgGetter, nil },
}
// WHEN
deployed, err := store.IsServiceDeployed(tc.inputApp, tc.inputEnv, tc.inputSvc)
// THEN
if tc.wantedError != nil {
require.EqualError(t, err, tc.wantedError.Error())
require.Equal(t, deployed, tc.wantedDeployed)
} else {
require.NoError(t, err)
}
})
}
}
func Test_IsJobDeployed(t *testing.T) {
testCases := map[string]struct {
inputApp string
inputEnv string
inputJob string
setupMocks func(mocks storeMock)
wantedError error
wantedDeployed bool
}{
"return error if fail to get resources by tags": {
inputApp: "mockApp",
inputEnv: "mockEnv",
inputJob: "mockJob",
setupMocks: func(m storeMock) {
gomock.InOrder(
m.rgGetter.EXPECT().GetResourcesByTags(stackResourceType, map[string]string{
AppTagKey: "mockApp",
EnvTagKey: "mockEnv",
ServiceTagKey: "mockJob",
}).Return(nil, errors.New("some error")),
)
},
wantedError: fmt.Errorf("get resources by Copilot tags: some error"),
},
"success with false": {
inputApp: "mockApp",
inputEnv: "mockEnv",
inputJob: "mockJob",
setupMocks: func(m storeMock) {
gomock.InOrder(
m.rgGetter.EXPECT().GetResourcesByTags(stackResourceType, map[string]string{
AppTagKey: "mockApp",
EnvTagKey: "mockEnv",
ServiceTagKey: "mockJob",
}).Return([]*rg.Resource{}, nil),
)
},
wantedDeployed: false,
},
"success with true": {
inputApp: "mockApp",
inputEnv: "mockEnv",
inputJob: "mockJob",
setupMocks: func(m storeMock) {
gomock.InOrder(
m.rgGetter.EXPECT().GetResourcesByTags(stackResourceType, map[string]string{
AppTagKey: "mockApp",
EnvTagKey: "mockEnv",
ServiceTagKey: "mockJob",
}).Return([]*rg.Resource{{ARN: "mockJobARN"}}, nil),
)
},
wantedDeployed: true,
},
}
for name, tc := range testCases {
t.Run(name, func(t *testing.T) {
ctrl := gomock.NewController(t)
defer ctrl.Finish()
mockConfigStore := mocks.NewMockConfigStoreClient(ctrl)
mockRgGetter := mocks.NewMockResourceGetter(ctrl)
mocks := storeMock{
rgGetter: mockRgGetter,
configStore: mockConfigStore,
}
tc.setupMocks(mocks)
store := &Store{
configStore: mockConfigStore,
newRgClientFromIDs: func(string, string) (ResourceGetter, error) { return mockRgGetter, nil },
}
// WHEN
deployed, err := store.IsJobDeployed(tc.inputApp, tc.inputEnv, tc.inputJob)
// THEN
if tc.wantedError != nil {
require.EqualError(t, err, tc.wantedError.Error())
require.Equal(t, deployed, tc.wantedDeployed)
} else {
require.NoError(t, err)
}
})
}
}
func TestStore_ListSNSTopics(t *testing.T) {
testCases := map[string]struct {
inputApp string
inputEnv string
setupMocks func(mocks storeMock)
wantedError error
wantedTopics []Topic
}{
"return error if fail to get resources by tag": {
inputApp: "mockApp",
inputEnv: "mockEnv",
setupMocks: func(m storeMock) {
gomock.InOrder(
m.rgGetter.EXPECT().GetResourcesByTags(snsResourceType, map[string]string{
AppTagKey: "mockApp",
EnvTagKey: "mockEnv",
}).Return(nil, errors.New("some error")),
)
},
wantedError: fmt.Errorf("some error"),
},
"return nil if no topics are found": {
inputApp: "mockApp",
inputEnv: "mockEnv",
setupMocks: func(m storeMock) {
gomock.InOrder(
m.rgGetter.EXPECT().GetResourcesByTags(snsResourceType, map[string]string{
AppTagKey: "mockApp",
EnvTagKey: "mockEnv",
}).Return([]*rg.Resource{{ARN: "mockARN", Tags: map[string]string{}}}, nil),
)
},
wantedTopics: nil,
},
"return nil if the only topic doesn't have workload tag": {
inputApp: "mockApp",
inputEnv: "mockEnv",
setupMocks: func(m storeMock) {
gomock.InOrder(
m.rgGetter.EXPECT().GetResourcesByTags(snsResourceType, map[string]string{
AppTagKey: "mockApp",
EnvTagKey: "mockEnv",
}).Return([]*rg.Resource{
{
ARN: "arn:aws:sns:us-west-2:012345678912:mockApp-mockEnv-mockSvc1-topic",
Tags: map[string]string{},
},
}, nil),
)
},
wantedTopics: []Topic{},
},
"success": {
inputApp: "mockApp",
inputEnv: "mockEnv",
setupMocks: func(m storeMock) {
m.rgGetter.EXPECT().GetResourcesByTags(
snsResourceType,
map[string]string{
AppTagKey: "mockApp",
EnvTagKey: "mockEnv",
},
).Return(
[]*rg.Resource{
{
ARN: "arn:aws:sns:us-west-2:012345678912:mockApp-mockEnv-mockSvc1-topic",
Tags: map[string]string{ServiceTagKey: "mockSvc1"},
}, {
ARN: "arn:aws:sns:us-west-2:012345678912:mockApp-mockEnv-mockSvc2-events",
Tags: map[string]string{ServiceTagKey: "mockSvc2"},
},
},
nil,
)
},
wantedTopics: []Topic{
{
awsARN: arn.ARN{
Partition: "aws",
Region: "us-west-2",
Service: "sns",
AccountID: "012345678912",
Resource: "mockApp-mockEnv-mockSvc1-topic",
},
prefix: "mockApp-mockEnv-mockSvc1-",
wkld: "mockSvc1",
name: "topic",
},
{
awsARN: arn.ARN{
Partition: "aws",
Region: "us-west-2",
Service: "sns",
AccountID: "012345678912",
Resource: "mockApp-mockEnv-mockSvc2-events",
},
prefix: "mockApp-mockEnv-mockSvc2-",
wkld: "mockSvc2",
name: "events",
},
},
},
}
for name, tc := range testCases {
t.Run(name, func(t *testing.T) {
ctrl := gomock.NewController(t)
defer ctrl.Finish()
mockConfigStore := mocks.NewMockConfigStoreClient(ctrl)
mockRgGetter := mocks.NewMockResourceGetter(ctrl)
mocks := storeMock{
rgGetter: mockRgGetter,
configStore: mockConfigStore,
}
tc.setupMocks(mocks)
store := &Store{
configStore: mockConfigStore,
newRgClientFromIDs: func(string, string) (ResourceGetter, error) { return mockRgGetter, nil },
}
// WHEN
topics, err := store.ListSNSTopics(tc.inputApp, tc.inputEnv)
// THEN
if tc.wantedError != nil {
require.EqualError(t, err, tc.wantedError.Error())
require.ElementsMatch(t, topics, tc.wantedTopics)
} else {
require.NoError(t, err)
}
})
}
}
func TestPipelineStore_ListDeployedPipelines(t *testing.T) {
const (
mockAppName = "mockApp"
mockLegacyPipelineARN = "arn:aws:codepipeline:us-west-2:1234567890:pipeline-dinder-badgoose-repo"
mockPipelineARN = "arn:aws:codepipeline:us-west-2:1234567890:pipeline-my-pipeline-repo"
)
testCases := map[string]struct {
setupMocks func(mocks storeMock)
wantedError error
wantedPipelines []Pipeline
}{
"return error if fail to get resources by tag": {
setupMocks: func(m storeMock) {
m.rgGetter.EXPECT().GetResourcesByTags(pipelineResourceType, map[string]string{
AppTagKey: "mockApp",
}).Return(nil, errors.New("some error"))
},
wantedError: fmt.Errorf("get pipeline resources by tags for app mockApp: some error"),
},
"return error if fail to parse pipeline ARN": {
setupMocks: func(m storeMock) {
m.rgGetter.EXPECT().GetResourcesByTags(pipelineResourceType, map[string]string{
AppTagKey: "mockApp",
}).Return([]*rg.Resource{
{
ARN: "badARN",
},
}, nil)
},
wantedError: fmt.Errorf("parse pipeline ARN: badARN"),
},
"success": {
setupMocks: func(m storeMock) {
m.rgGetter.EXPECT().GetResourcesByTags(pipelineResourceType, map[string]string{
AppTagKey: "mockApp",
}).Return([]*rg.Resource{
{
ARN: mockLegacyPipelineARN,
Tags: map[string]string{
AppTagKey: mockAppName,
},
},
{
ARN: mockPipelineARN,
Tags: map[string]string{
AppTagKey: mockAppName,
PipelineTagKey: "my-pipeline-repo",
},
},
}, nil)
},
wantedPipelines: []Pipeline{
{
ResourceName: "pipeline-dinder-badgoose-repo",
IsLegacy: true,
AppName: mockAppName,
},
{
ResourceName: "my-pipeline-repo",
IsLegacy: false,
AppName: mockAppName,
},
},
},
}
for name, tc := range testCases {
t.Run(name, func(t *testing.T) {
ctrl := gomock.NewController(t)
defer ctrl.Finish()
mockRgGetter := mocks.NewMockResourceGetter(ctrl)
mocks := storeMock{
rgGetter: mockRgGetter,
}
tc.setupMocks(mocks)
store := &PipelineStore{
getter: mocks.rgGetter,
}
// WHEN
pipelines, err := store.ListDeployedPipelines(mockAppName)
// THEN
if tc.wantedError != nil {
require.EqualError(t, err, tc.wantedError.Error())
require.ElementsMatch(t, pipelines, tc.wantedPipelines)
} else {
require.NoError(t, err)
}
})
}
}
| 792 |
copilot-cli | aws | Go | // Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
// SPDX-License-Identifier: Apache-2.0
// Package deploy holds the structures to deploy infrastructure resources.
// This file defines environment deployment resources.
package deploy
import (
"github.com/aws/copilot-cli/internal/pkg/config"
)
// CreateEnvironmentResponse holds the created environment on successful deployment.
// Otherwise, the environment is set to nil and a descriptive error is returned.
type CreateEnvironmentResponse struct {
Env *config.Environment
Err error
}
| 18 |
copilot-cli | aws | Go | // Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
// SPDX-License-Identifier: Apache-2.0
// Package deploy holds the structures to deploy infrastructure resources.
// This file defines pipeline deployment resources.
package deploy
import (
"errors"
"fmt"
"path"
"path/filepath"
"regexp"
"sort"
"strings"
"gopkg.in/yaml.v3"
"github.com/aws/copilot-cli/internal/pkg/graph"
"github.com/aws/copilot-cli/internal/pkg/config"
"github.com/aws/copilot-cli/internal/pkg/manifest"
"github.com/aws/aws-sdk-go/aws/arn"
)
// DefaultPipelineBranch is the default repository branch to use for pipeline.
const DefaultPipelineBranch = "main"
const (
fmtInvalidRepo = "unable to parse the repository from the URL %+v"
fmtErrMissingProperty = "missing `%s` in properties"
fmtErrPropertyNotAString = "property `%s` is not a string"
defaultPipelineBuildImage = "aws/codebuild/amazonlinux2-x86_64-standard:4.0"
defaultPipelineEnvironmentType = "LINUX_CONTAINER"
// DefaultPipelineArtifactsDir is the default folder to output Copilot-generated templates.
DefaultPipelineArtifactsDir = "infrastructure"
)
var (
// NOTE: this is duplicated from validate.go
// Ex: https://github.com/koke/grit
ghRepoExp = regexp.MustCompile(`(https:\/\/github\.com\/|)(?P<owner>.+)\/(?P<repo>.+)`)
// Ex: https://git-codecommit.us-west-2.amazonaws.com/v1/repos/aws-sample/browse
ccRepoExp = regexp.MustCompile(`(https:\/\/(?P<region>.+).console.aws.amazon.com\/codesuite\/codecommit\/repositories\/(?P<repo>.+)(\/browse))`)
// Ex: https://bitbucket.org/repoOwner/repoName
bbRepoExp = regexp.MustCompile(`(https:\/\/bitbucket.org\/)(?P<owner>.+)\/(?P<repo>.+)`)
)
// CreatePipelineInput represents the fields required to deploy a pipeline.
type CreatePipelineInput struct {
// Name of the application this pipeline belongs to
AppName string
// Name of the pipeline
Name string
// IsLegacy should be set to true if the pipeline has been deployed using a legacy non-namespaced name; otherwise it is false.
IsLegacy bool
// The source code provider for this pipeline
Source interface{}
// The build project settings for this pipeline
Build *Build
// The stages of the pipeline. The order of stages in this list
// will be the order we deploy to.
Stages []PipelineStage
// A list of artifact buckets and corresponding KMS keys that will
// be used in this pipeline.
ArtifactBuckets []ArtifactBucket
// AdditionalTags are labels applied to resources under the application.
AdditionalTags map[string]string
// PermissionsBoundary is the name of an IAM policy to set a permissions boundary.
PermissionsBoundary string
}
// Build represents CodeBuild project used in the CodePipeline
// to build and test Docker image.
type Build struct {
// The URI that identifies the Docker image to use for this build project.
Image string
EnvironmentType string
BuildspecPath string
AdditionalPolicyDocument string
}
// Init populates the fields in Build by parsing the manifest file's "build" section.
func (b *Build) Init(mfBuild *manifest.Build, mfDirPath string) error {
image := defaultPipelineBuildImage
environmentType := defaultPipelineEnvironmentType
path := filepath.Join(mfDirPath, "buildspec.yml")
if mfBuild != nil && mfBuild.Image != "" {
image = mfBuild.Image
}
if mfBuild != nil && mfBuild.Buildspec != "" {
path = mfBuild.Buildspec
}
if strings.Contains(image, "aarch64") {
environmentType = "ARM_CONTAINER"
}
if mfBuild != nil && !mfBuild.AdditionalPolicy.Document.IsZero() {
additionalPolicy, err := yaml.Marshal(&mfBuild.AdditionalPolicy.Document)
if err != nil {
return fmt.Errorf("marshal `additional_policy.PolicyDocument` in pipeline manifest: %v", err)
}
b.AdditionalPolicyDocument = strings.TrimSpace(string(additionalPolicy))
}
b.Image = image
b.EnvironmentType = environmentType
b.BuildspecPath = filepath.ToSlash(path) // Buildspec path must be with '/' because CloudFormation expects forward-slash separated file path.
return nil
}
// ArtifactBucket represents an S3 bucket used by the CodePipeline to store
// intermediate artifacts produced by the pipeline.
type ArtifactBucket struct {
// The name of the S3 bucket.
BucketName string
// The ARN of the KMS key used to en/decrypt artifacts stored in this bucket.
KeyArn string
}
// Region parses out the region from the ARN of the KMS key associated with
// the artifact bucket.
func (a *ArtifactBucket) Region() (string, error) {
// We assume the bucket and the key are in the same AWS region.
parsedArn, err := arn.Parse(a.KeyArn)
if err != nil {
return "", fmt.Errorf("failed to parse region out of key ARN: %s, error: %w",
a.BucketName, err)
}
return parsedArn.Region, nil
}
// GitHubV1Source defines the source of the artifacts to be built and deployed. This version uses personal access tokens
// and is not recommended. https://docs.aws.amazon.com/codepipeline/latest/userguide/update-github-action-connections.html
type GitHubV1Source struct {
ProviderName string
Branch string
RepositoryURL GitHubURL
PersonalAccessTokenSecretID string
}
// GitHubSource (version 2) defines the source of the artifacts to be built and deployed. This version uses CodeStar
// Connections to authenticate access to the remote repo.
type GitHubSource struct {
ProviderName string
Branch string
RepositoryURL GitHubURL
ConnectionARN string
OutputArtifactFormat string
}
// GitHubURL is the common type for repo URLs for both GitHubSource versions:
// GitHubV1 (w/ access tokens) and GitHub (V2 w CodeStar Connections).
type GitHubURL string
// CodeCommitSource defines the (CC) source of the artifacts to be built and deployed.
type CodeCommitSource struct {
ProviderName string
Branch string
RepositoryURL string
OutputArtifactFormat string
}
// BitbucketSource defines the (BB) source of the artifacts to be built and deployed.
type BitbucketSource struct {
ProviderName string
Branch string
RepositoryURL string
ConnectionARN string
OutputArtifactFormat string
}
func convertRequiredProperty(properties map[string]interface{}, key string) (string, error) {
v, ok := properties[key]
if !ok {
return "", fmt.Errorf(fmtErrMissingProperty, key)
}
vStr, ok := v.(string)
if !ok {
return "", fmt.Errorf(fmtErrPropertyNotAString, key)
}
return vStr, nil
}
func convertOptionalProperty(properties map[string]interface{}, key string, defaultValue string) (string, error) {
v, ok := properties[key]
if !ok {
return defaultValue, nil
}
vStr, ok := v.(string)
if !ok {
return "", fmt.Errorf(fmtErrPropertyNotAString, key)
}
return vStr, nil
}
// PipelineSourceFromManifest processes manifest info about the source based on provider type.
// The return boolean is true for CodeStar Connections sources that require a polling prompt.
func PipelineSourceFromManifest(mfSource *manifest.Source) (source interface{}, shouldPrompt bool, err error) {
branch, err := convertOptionalProperty(mfSource.Properties, "branch", DefaultPipelineBranch)
if err != nil {
return nil, false, err
}
repository, err := convertRequiredProperty(mfSource.Properties, "repository")
if err != nil {
return nil, false, err
}
outputFormat, err := convertOptionalProperty(mfSource.Properties, "output_artifact_format", "")
if err != nil {
return nil, false, err
}
switch mfSource.ProviderName {
case manifest.GithubV1ProviderName:
token, err := convertRequiredProperty(mfSource.Properties, "access_token_secret")
if err != nil {
return nil, false, err
}
return &GitHubV1Source{
ProviderName: manifest.GithubV1ProviderName,
Branch: branch,
RepositoryURL: GitHubURL(repository),
PersonalAccessTokenSecretID: token,
}, false, nil
case manifest.GithubProviderName:
// If the creation of the user's pipeline manifest predates Copilot's conversion to GHv2/CSC, the provider
// listed in the manifest will be "GitHub," not "GitHubV1." To differentiate it from the new default
// "GitHub," which refers to v2, we check for the presence of a secret, indicating a v1 GitHub connection.
if mfSource.Properties["access_token_secret"] != nil {
return &GitHubV1Source{
ProviderName: manifest.GithubV1ProviderName,
Branch: branch,
RepositoryURL: GitHubURL(repository),
PersonalAccessTokenSecretID: (mfSource.Properties["access_token_secret"]).(string),
}, false, nil
} else {
// If an existing CSC connection is being used, don't prompt to update connection from 'PENDING' to 'AVAILABLE'.
connection, ok := mfSource.Properties["connection_arn"]
repo := &GitHubSource{
ProviderName: manifest.GithubProviderName,
Branch: branch,
RepositoryURL: GitHubURL(repository),
OutputArtifactFormat: outputFormat,
}
if !ok {
return repo, true, nil
}
repo.ConnectionARN = connection.(string)
return repo, false, nil
}
case manifest.CodeCommitProviderName:
return &CodeCommitSource{
ProviderName: manifest.CodeCommitProviderName,
Branch: branch,
RepositoryURL: repository,
OutputArtifactFormat: outputFormat,
}, false, nil
case manifest.BitbucketProviderName:
// If an existing CSC connection is being used, don't prompt to update connection from 'PENDING' to 'AVAILABLE'.
connection, ok := mfSource.Properties["connection_arn"]
repo := &BitbucketSource{
ProviderName: manifest.BitbucketProviderName,
Branch: branch,
RepositoryURL: repository,
OutputArtifactFormat: outputFormat,
}
if !ok {
return repo, true, nil
}
repo.ConnectionARN = connection.(string)
return repo, false, nil
default:
return nil, false, fmt.Errorf("invalid repo source provider: %s", mfSource.ProviderName)
}
}
// GitHubPersonalAccessTokenSecretID returns the ID of the secret in the
// Secrets manager, which stores the GitHub Personal Access token if the
// provider is "GitHubV1".
func (s *GitHubV1Source) GitHubPersonalAccessTokenSecretID() (string, error) {
if s.PersonalAccessTokenSecretID == "" {
return "", errors.New("the GitHub token secretID is not configured")
}
return s.PersonalAccessTokenSecretID, nil
}
// Connection returns the ARN correlated with a ConnectionName in the pipeline manifest.
func (s *BitbucketSource) Connection() string {
return s.ConnectionARN
}
// Connection returns the ARN correlated with a ConnectionName in the pipeline manifest.
func (s *GitHubSource) Connection() string {
return s.ConnectionARN
}
// parse parses the owner and repo name from the GH repo URL, which was formatted and assigned in cli/pipeline_init.go.
func (url GitHubURL) parse() (owner, repo string, err error) {
if url == "" {
return "", "", fmt.Errorf("unable to locate the repository")
}
match := ghRepoExp.FindStringSubmatch(string(url))
if len(match) == 0 {
return "", "", fmt.Errorf(fmtInvalidRepo, url)
}
matches := make(map[string]string)
for i, name := range ghRepoExp.SubexpNames() {
if i != 0 && name != "" {
matches[name] = match[i]
}
}
return matches["owner"], matches["repo"], nil
}
// parseRepo parses the region (not returned) and repo name from the CC repo URL, which was formatted and assigned in cli/pipeline_init.go.
func (s *CodeCommitSource) parseRepo() (string, error) {
// NOTE: 'region' is not currently parsed out as a Source property, but this enables that possibility.
if s.RepositoryURL == "" {
return "", fmt.Errorf("unable to locate the repository")
}
match := ccRepoExp.FindStringSubmatch(s.RepositoryURL)
if len(match) == 0 {
return "", fmt.Errorf(fmtInvalidRepo, s.RepositoryURL)
}
matches := make(map[string]string)
for i, name := range ccRepoExp.SubexpNames() {
if i != 0 && name != "" {
matches[name] = match[i]
}
}
return matches["repo"], nil
}
// parseOwnerAndRepo parses the owner and repo name from the BB repo URL, which was formatted and assigned in cli/pipeline_init.go.
func (s *BitbucketSource) parseOwnerAndRepo() (owner, repo string, err error) {
if s.RepositoryURL == "" {
return "", "", fmt.Errorf("unable to locate the repository")
}
match := bbRepoExp.FindStringSubmatch(s.RepositoryURL)
if len(match) == 0 {
return "", "", fmt.Errorf(fmtInvalidRepo, s.RepositoryURL)
}
matches := make(map[string]string)
for i, name := range bbRepoExp.SubexpNames() {
if i != 0 && name != "" {
matches[name] = match[i]
}
}
return matches["owner"], matches["repo"], nil
}
// ConnectionName generates a string of maximum length 32 to be used as a CodeStar Connections ConnectionName.
// If there is a duplicate ConnectionName generated by CFN, the previous one is replaced. (Duplicate names
// generated by the aws cli don't have to be unique for some reason.)
// See https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-codestarconnections-connection.html#cfn-codestarconnections-connection-connectionname
const (
maxOwnerLength = 5
maxRepoLength = 18
fmtConnectionName = "copilot-%s-%s"
)
// ConnectionName generates a recognizable string by which the connection may be identified.
func (s *BitbucketSource) ConnectionName() (string, error) {
owner, repo, err := s.parseOwnerAndRepo()
if err != nil {
return "", fmt.Errorf("parse owner and repo to generate connection name: %w", err)
}
return formatConnectionName(owner, repo), nil
}
// ConnectionName generates a recognizable string by which the connection may be identified.
func (s *GitHubSource) ConnectionName() (string, error) {
owner, repo, err := s.RepositoryURL.parse()
if err != nil {
return "", fmt.Errorf("parse owner and repo to generate connection name: %w", err)
}
return formatConnectionName(owner, repo), nil
}
func formatConnectionName(owner, repo string) string {
if len(owner) > maxOwnerLength {
owner = owner[:maxOwnerLength]
}
if len(repo) > maxRepoLength {
repo = repo[:maxRepoLength]
}
return fmt.Sprintf(fmtConnectionName, owner, repo)
}
// Repository returns the repository portion. For example,
// given "aws/amazon-copilot", this function returns "amazon-copilot".
func (s *GitHubV1Source) Repository() (string, error) {
_, repo, err := s.RepositoryURL.parse()
if err != nil {
return "", err
}
return repo, nil
}
// Repository returns the repository portion. For CodeStar Connections,
// this needs to be in the format "some-user/my-repo."
func (s *BitbucketSource) Repository() (string, error) {
owner, repo, err := s.parseOwnerAndRepo()
if err != nil {
return "", err
}
return fmt.Sprintf("%s/%s", owner, repo), nil
}
// Repository returns the repository portion. For CodeStar Connections,
// this needs to be in the format "some-user/my-repo."
func (s *GitHubSource) Repository() (string, error) {
owner, repo, err := s.RepositoryURL.parse()
if err != nil {
return "", err
}
return fmt.Sprintf("%s/%s", owner, repo), nil
}
// Repository returns the repository portion. For example,
// given "aws/amazon-copilot", this function returns "amazon-copilot".
func (s *CodeCommitSource) Repository() (string, error) {
repo, err := s.parseRepo()
if err != nil {
return "", err
}
return repo, nil
}
// Owner returns the repository owner portion. For example,
// given "aws/amazon-copilot", this function returns "aws".
func (s *GitHubSource) Owner() (string, error) {
owner, _, err := s.RepositoryURL.parse()
if err != nil {
return "", err
}
return owner, nil
}
// Owner returns the repository owner portion. For example,
// given "aws/amazon-copilot", this function returns "aws".
func (s *GitHubV1Source) Owner() (string, error) {
owner, _, err := s.RepositoryURL.parse()
if err != nil {
return "", err
}
return owner, nil
}
type associatedEnvironment struct {
// Name of the environment, must be unique within an application.
// This is also the name of the pipeline stage.
Name string
// The region this environment is created in.
Region string
// AppName represents the application name the environment is part of.
AppName string
// AccountID of the account this environment is stored in.
AccountID string
}
// PipelineStage represents configuration for each deployment stage
// of a workspace. A stage consists of the Config Environment the pipeline
// is deploying to, the containerized services that will be deployed, and
// test commands, if the user has opted to add any.
type PipelineStage struct {
*associatedEnvironment
requiresApproval bool
testCommands []string
execRoleARN string
envManagerRoleARN string
deployments manifest.Deployments
}
// Init populates the fields in PipelineStage against a target environment,
// the user's manifest config, and any local workload names.
func (stg *PipelineStage) Init(env *config.Environment, mftStage *manifest.PipelineStage, workloads []string) {
stg.associatedEnvironment = &associatedEnvironment{
AppName: env.App,
Name: mftStage.Name,
Region: env.Region,
AccountID: env.AccountID,
}
deployments := mftStage.Deployments
if len(deployments) == 0 {
// Transform local workloads into the manifest.Deployments format if the manifest doesn't have any deployment config.
deployments = make(manifest.Deployments)
for _, workload := range workloads {
deployments[workload] = nil
}
}
stg.deployments = deployments
stg.requiresApproval = mftStage.RequiresApproval
stg.testCommands = mftStage.TestCommands
stg.execRoleARN = env.ExecutionRoleARN
stg.envManagerRoleARN = env.ManagerRoleARN
}
// Name returns the stage's name.
func (stg *PipelineStage) Name() string {
return stg.associatedEnvironment.Name
}
// Approval returns a manual approval action for the stage.
// If the stage does not require approval, then returns nil.
func (stg *PipelineStage) Approval() *ManualApprovalAction {
if !stg.requiresApproval {
return nil
}
return &ManualApprovalAction{
name: stg.associatedEnvironment.Name,
}
}
// Region returns the AWS region name, such as "us-west-2", where the deployments will occur.
func (stg *PipelineStage) Region() string {
return stg.associatedEnvironment.Region
}
// ExecRoleARN returns the IAM role assumed by CloudFormation to create or update resources defined in a template.
func (stg *PipelineStage) ExecRoleARN() string {
return stg.execRoleARN
}
// EnvManagerRoleARN returns the IAM role used to create or update CloudFormation stacks in an environment.
func (stg *PipelineStage) EnvManagerRoleARN() string {
return stg.envManagerRoleARN
}
// Test returns a test for the stage.
// If the stage does not have any test commands, then returns nil.
func (stg *PipelineStage) Test() (*TestCommandsAction, error) {
if len(stg.testCommands) == 0 {
return nil, nil
}
var prevActions []orderedRunner
deployActions, err := stg.Deployments()
if err != nil {
return nil, err
}
for i := range deployActions {
prevActions = append(prevActions, &deployActions[i])
}
return &TestCommandsAction{
action: action{
prevActions: prevActions,
},
commands: stg.testCommands,
}, nil
}
// Deployments returns a list of deploy actions for the pipeline.
func (stg *PipelineStage) Deployments() ([]DeployAction, error) {
var prevActions []orderedRunner
if approval := stg.Approval(); approval != nil {
prevActions = append(prevActions, approval)
}
topo, err := graph.TopologicalOrder(stg.buildDeploymentsGraph())
if err != nil {
return nil, fmt.Errorf("find an ordering for deployments: %v", err)
}
var actions []DeployAction
for name, conf := range stg.deployments {
actions = append(actions, DeployAction{
action: action{
prevActions: prevActions,
},
name: name,
envName: stg.associatedEnvironment.Name,
appName: stg.AppName,
override: conf,
ranker: topo,
})
}
sort.Slice(actions, func(i, j int) bool {
return actions[i].Name() < actions[j].Name()
})
return actions, nil
}
func (stg *PipelineStage) buildDeploymentsGraph() *graph.Graph[string] {
var names []string
for name := range stg.deployments {
names = append(names, name)
}
digraph := graph.New(names...)
for name, conf := range stg.deployments {
if conf == nil {
continue
}
for _, dependency := range conf.DependsOn {
digraph.Add(graph.Edge[string]{
From: dependency, // Dependency must be completed before name.
To: name,
})
}
}
return digraph
}
type orderedRunner interface {
RunOrder() int
}
// action represents a generic CodePipeline action.
type action struct {
prevActions []orderedRunner // The last actions to be executed immediately before this action.
}
// RunOrder returns the order in which the action should run. A higher numbers means the action is run later.
// Actions with the same RunOrder run in parallel.
func (a *action) RunOrder() int {
max := 0
for _, prevAction := range a.prevActions {
if cur := prevAction.RunOrder(); cur > max {
max = cur
}
}
return max + 1
}
// ManualApprovalAction represents a stage approval action.
type ManualApprovalAction struct {
action
name string // Name of the stage to approve.
}
// Name returns the name of the CodePipeline approval action for the stage.
func (a *ManualApprovalAction) Name() string {
return fmt.Sprintf("ApprovePromotionTo-%s", a.name)
}
type ranker interface {
Rank(name string) (int, bool)
}
// DeployAction represents a CodePipeline action of category "Deploy" for a cloudformation stack.
type DeployAction struct {
action
name string
envName string
appName string
override *manifest.Deployment // User defined settings over Copilot's defaults.
ranker ranker // Interface to rank this deployment action against others in the same stage.
}
// Name returns the name of the CodePipeline deploy action for a workload.
func (a *DeployAction) Name() string {
return fmt.Sprintf("CreateOrUpdate-%s-%s", a.name, a.envName)
}
// StackName returns the name of the workload stack to create or update.
func (a *DeployAction) StackName() string {
if a.override != nil && a.override.StackName != "" {
return a.override.StackName
}
return fmt.Sprintf("%s-%s-%s", a.appName, a.envName, a.name)
}
// TemplatePath returns the path of the CloudFormation template file generated during the build phase.
func (a *DeployAction) TemplatePath() string {
if a.override != nil && a.override.TemplatePath != "" {
return a.override.TemplatePath
}
// Use path.Join instead of filepath to join with "/" instead of OS-specific file separators.
return path.Join(DefaultPipelineArtifactsDir, fmt.Sprintf(WorkloadCfnTemplateNameFormat, a.name, a.envName))
}
// TemplateConfigPath returns the path of the CloudFormation template config file generated during the build phase.
func (a *DeployAction) TemplateConfigPath() string {
if a.override != nil && a.override.TemplateConfig != "" {
return a.override.TemplateConfig
}
// Use path.Join instead of filepath to join with "/" instead of OS-specific file separators.
return path.Join(DefaultPipelineArtifactsDir, fmt.Sprintf(WorkloadCfnTemplateConfigurationNameFormat, a.name, a.envName))
}
// RunOrder returns the order in which the action should run.
func (a *DeployAction) RunOrder() int {
rank, _ := a.ranker.Rank(a.name) // The deployment is guaranteed to be in the ranker.
return a.action.RunOrder() /* baseline */ + rank
}
// TestCommandsAction represents a CodePipeline action of category "Test" to validate deployments.
type TestCommandsAction struct {
action
commands []string
}
// Name returns the name of the test action.
func (a *TestCommandsAction) Name() string {
return "TestCommands"
}
// Commands returns the list commands to run part of the test action.
func (a *TestCommandsAction) Commands() []string {
return a.commands
}
| 729 |
copilot-cli | aws | Go | // Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
// SPDX-License-Identifier: Apache-2.0
package deploy
import (
"errors"
"testing"
"gopkg.in/yaml.v3"
"github.com/aws/copilot-cli/internal/pkg/config"
"github.com/aws/copilot-cli/internal/pkg/manifest"
"github.com/aws/aws-sdk-go/aws"
"github.com/stretchr/testify/require"
)
func TestPipelineSourceFromManifest(t *testing.T) {
testCases := map[string]struct {
mfSource *manifest.Source
expectedDeploySource interface{}
expectedShouldPrompt bool
expectedErr error
}{
"transforms GitHubV1 source": {
mfSource: &manifest.Source{
ProviderName: manifest.GithubV1ProviderName,
Properties: map[string]interface{}{
"branch": "test",
"repository": "some/repository/URL",
"access_token_secret": "secretiveSecret",
},
},
expectedDeploySource: &GitHubV1Source{
ProviderName: manifest.GithubV1ProviderName,
Branch: "test",
RepositoryURL: "some/repository/URL",
PersonalAccessTokenSecretID: "secretiveSecret",
},
expectedShouldPrompt: false,
expectedErr: nil,
},
"error out if using GitHubV1 while not having access token secret": {
mfSource: &manifest.Source{
ProviderName: manifest.GithubV1ProviderName,
Properties: map[string]interface{}{
"branch": "test",
"repository": "some/repository/URL",
},
},
expectedShouldPrompt: false,
expectedErr: errors.New("missing `access_token_secret` in properties"),
},
"error out if a string property is not a string": {
mfSource: &manifest.Source{
ProviderName: manifest.GithubV1ProviderName,
Properties: map[string]interface{}{
"branch": "test",
"repository": []int{1, 2, 3},
},
},
expectedShouldPrompt: false,
expectedErr: errors.New("property `repository` is not a string"),
},
"transforms GitHub (v2) source without existing connection": {
mfSource: &manifest.Source{
ProviderName: manifest.GithubProviderName,
Properties: map[string]interface{}{
"branch": "test",
"repository": "some/repository/URL",
},
},
expectedDeploySource: &GitHubSource{
ProviderName: manifest.GithubProviderName,
Branch: "test",
RepositoryURL: "some/repository/URL",
},
expectedShouldPrompt: true,
expectedErr: nil,
},
"transforms GitHub (v2) source with existing connection": {
mfSource: &manifest.Source{
ProviderName: manifest.GithubProviderName,
Properties: map[string]interface{}{
"branch": "test",
"repository": "some/repository/URL",
"connection_arn": "barnARN",
},
},
expectedDeploySource: &GitHubSource{
ProviderName: manifest.GithubProviderName,
Branch: "test",
RepositoryURL: "some/repository/URL",
ConnectionARN: "barnARN",
},
expectedShouldPrompt: false,
expectedErr: nil,
},
"transforms Bitbucket source without existing connection": {
mfSource: &manifest.Source{
ProviderName: manifest.BitbucketProviderName,
Properties: map[string]interface{}{
"branch": "test",
"repository": "some/repository/URL",
},
},
expectedDeploySource: &BitbucketSource{
ProviderName: manifest.BitbucketProviderName,
Branch: "test",
RepositoryURL: "some/repository/URL",
},
expectedShouldPrompt: true,
expectedErr: nil,
},
"transforms Bitbucket source with existing connection": {
mfSource: &manifest.Source{
ProviderName: manifest.BitbucketProviderName,
Properties: map[string]interface{}{
"branch": "test",
"repository": "some/repository/URL",
"connection_arn": "yarnARN",
},
},
expectedDeploySource: &BitbucketSource{
ProviderName: manifest.BitbucketProviderName,
Branch: "test",
RepositoryURL: "some/repository/URL",
ConnectionARN: "yarnARN",
},
expectedShouldPrompt: false,
expectedErr: nil,
},
"transforms CodeCommit source": {
mfSource: &manifest.Source{
ProviderName: manifest.CodeCommitProviderName,
Properties: map[string]interface{}{
"branch": "test",
"repository": "some/repository/URL",
"output_artifact_format": "testFormat",
},
},
expectedDeploySource: &CodeCommitSource{
ProviderName: manifest.CodeCommitProviderName,
Branch: "test",
RepositoryURL: "some/repository/URL",
OutputArtifactFormat: "testFormat",
},
expectedShouldPrompt: false,
expectedErr: nil,
},
"use default branch `main` if branch is not configured": {
mfSource: &manifest.Source{
ProviderName: manifest.CodeCommitProviderName,
Properties: map[string]interface{}{
"repository": "some/repository/URL",
},
},
expectedDeploySource: &CodeCommitSource{
ProviderName: manifest.CodeCommitProviderName,
Branch: "main",
RepositoryURL: "some/repository/URL",
},
expectedShouldPrompt: false,
expectedErr: nil,
},
"error out if repository is not configured": {
mfSource: &manifest.Source{
ProviderName: manifest.CodeCommitProviderName,
Properties: map[string]interface{}{},
},
expectedShouldPrompt: false,
expectedErr: errors.New("missing `repository` in properties"),
},
"errors if user changed provider name in manifest to unsupported source": {
mfSource: &manifest.Source{
ProviderName: "BitCommitHubBucket",
Properties: map[string]interface{}{
"branch": "test",
"repository": "some/repository/URL",
},
},
expectedDeploySource: nil,
expectedShouldPrompt: false,
expectedErr: errors.New("invalid repo source provider: BitCommitHubBucket"),
},
}
for name, tc := range testCases {
t.Run(name, func(t *testing.T) {
source, shouldPrompt, err := PipelineSourceFromManifest(tc.mfSource)
if tc.expectedErr != nil {
require.EqualError(t, err, tc.expectedErr.Error())
} else {
require.NoError(t, err)
require.Equal(t, tc.expectedDeploySource, source, "mismatched source")
require.Equal(t, tc.expectedShouldPrompt, shouldPrompt, "mismatched bool for prompting")
}
})
}
}
func TestPipelineBuild_Init(t *testing.T) {
const (
defaultImage = "aws/codebuild/amazonlinux2-x86_64-standard:4.0"
defaultEnvType = "LINUX_CONTAINER"
)
yamlNode := yaml.Node{}
policyDocument := []byte(`
Statement:
Action: '*'
Effect: Allow
Resource: '*'
Version: 2012-10-17`)
require.NoError(t, yaml.Unmarshal(policyDocument, &yamlNode))
testCases := map[string]struct {
mfBuild *manifest.Build
mfDirPath string
expectedBuild Build
}{
"set default image and env type if not specified in manifest; override default if buildspec path in manifest": {
mfBuild: &manifest.Build{
Buildspec: "some/path",
},
expectedBuild: Build{
Image: defaultImage,
EnvironmentType: defaultEnvType,
BuildspecPath: "some/path",
},
},
"set image according to manifest": {
mfBuild: &manifest.Build{
Image: "aws/codebuild/standard:3.0",
Buildspec: "some/path",
},
expectedBuild: Build{
Image: "aws/codebuild/standard:3.0",
EnvironmentType: defaultEnvType,
BuildspecPath: "some/path",
},
},
"set image according to manifest (ARM based)": {
mfBuild: &manifest.Build{
Image: "aws/codebuild/amazonlinux2-aarch64-standard:2.0",
Buildspec: "some/path",
},
expectedBuild: Build{
Image: "aws/codebuild/amazonlinux2-aarch64-standard:2.0",
EnvironmentType: "ARM_CONTAINER",
BuildspecPath: "some/path",
},
},
"additional policy is not empty": {
mfBuild: &manifest.Build{
Image: "aws/codebuild/amazonlinux2-aarch64-standard:2.0",
Buildspec: "some/path",
AdditionalPolicy: struct {
Document yaml.Node `yaml:"PolicyDocument,omitempty"`
}{
Document: yamlNode,
},
},
expectedBuild: Build{
Image: "aws/codebuild/amazonlinux2-aarch64-standard:2.0",
EnvironmentType: "ARM_CONTAINER",
BuildspecPath: "some/path",
AdditionalPolicyDocument: "Statement:\n Action: '*'\n Effect: Allow\n Resource: '*'\nVersion: 2012-10-17",
},
},
"additional policy is empty": {
mfBuild: &manifest.Build{
Image: "aws/codebuild/amazonlinux2-aarch64-standard:2.0",
Buildspec: "some/path",
},
expectedBuild: Build{
Image: "aws/codebuild/amazonlinux2-aarch64-standard:2.0",
EnvironmentType: "ARM_CONTAINER",
BuildspecPath: "some/path",
AdditionalPolicyDocument: "",
},
},
"by default convert legacy manifest path to buildspec path": {
mfDirPath: "copilot/",
expectedBuild: Build{
Image: defaultImage,
EnvironmentType: defaultEnvType,
BuildspecPath: "copilot/buildspec.yml",
},
},
"by default convert non-legacy manifest path to buildspec path": {
mfDirPath: "copilot/pipelines/my-pipeline/",
expectedBuild: Build{
Image: defaultImage,
EnvironmentType: defaultEnvType,
BuildspecPath: "copilot/pipelines/my-pipeline/buildspec.yml",
},
},
}
for name, tc := range testCases {
t.Run(name, func(t *testing.T) {
var build Build
build.Init(tc.mfBuild, tc.mfDirPath)
require.Equal(t, tc.expectedBuild, build, "mismatched build")
})
}
}
func TestParseOwnerAndRepo(t *testing.T) {
testCases := map[string]struct {
src *GitHubSource
expectedErrMsg *string
expectedOwner string
expectedRepo string
}{
"missing repository property": {
src: &GitHubSource{
RepositoryURL: "",
Branch: "main",
},
expectedErrMsg: aws.String("unable to locate the repository"),
},
"valid GH repository property": {
src: &GitHubSource{
RepositoryURL: "chicken/wings",
},
expectedErrMsg: nil,
expectedOwner: "chicken",
expectedRepo: "wings",
},
"valid full GH repository name": {
src: &GitHubSource{
RepositoryURL: "https://github.com/badgoose/chaOS",
},
expectedErrMsg: nil,
expectedOwner: "badgoose",
expectedRepo: "chaOS",
},
}
for name, tc := range testCases {
t.Run(name, func(t *testing.T) {
owner, repo, err := tc.src.RepositoryURL.parse()
if tc.expectedErrMsg != nil {
require.Contains(t, err.Error(), *tc.expectedErrMsg)
} else {
require.NoError(t, err, "expected error")
require.Equal(t, tc.expectedOwner, owner, "mismatched owner")
require.Equal(t, tc.expectedRepo, repo, "mismatched repo")
}
})
}
}
func TestPipelineStage_Init(t *testing.T) {
var stg PipelineStage
stg.Init(&config.Environment{
Name: "test",
App: "badgoose",
Region: "us-west-2",
AccountID: "123456789012",
ManagerRoleARN: "arn:aws:iam::123456789012:role/badgoose-test-EnvManagerRole",
ExecutionRoleARN: "arn:aws:iam::123456789012:role/badgoose-test-CFNExecutionRole",
}, &manifest.PipelineStage{
Name: "test",
RequiresApproval: true,
TestCommands: []string{"make test", "echo \"made test\""},
}, []string{"frontend", "backend"})
t.Run("stage name matches the environment's name", func(t *testing.T) {
require.Equal(t, "test", stg.Name())
})
t.Run("stage region matches the environment's region", func(t *testing.T) {
require.Equal(t, "us-west-2", stg.Region())
})
t.Run("stage env manager role ARN matches the environment's config", func(t *testing.T) {
require.Equal(t, "arn:aws:iam::123456789012:role/badgoose-test-EnvManagerRole", stg.EnvManagerRoleARN())
})
t.Run("stage exec role ARN matches the environment's config", func(t *testing.T) {
require.Equal(t, "arn:aws:iam::123456789012:role/badgoose-test-CFNExecutionRole", stg.ExecRoleARN())
})
t.Run("number of expected deployments match", func(t *testing.T) {
deployments, err := stg.Deployments()
require.NoError(t, err)
require.Equal(t, 2, len(deployments))
})
t.Run("manual approval button", func(t *testing.T) {
require.NotNil(t, stg.Approval(), "should require approval action for stages when the manifest requires it")
stg := PipelineStage{}
require.Nil(t, stg.Approval(), "should return nil by default")
})
}
func TestPipelineStage_Deployments(t *testing.T) {
testCases := map[string]struct {
stg *PipelineStage
wantedRunOrder map[string]int
wantedTemplateOrder []string
wantedErr error
}{
"should return an error when the deployments contain a cycle": {
stg: func() *PipelineStage {
// Create a pipeline with a self-depending deployment.
var stg PipelineStage
stg.Init(&config.Environment{Name: "test"}, &manifest.PipelineStage{
Name: "test",
Deployments: map[string]*manifest.Deployment{
"api": {
DependsOn: []string{"api"},
},
},
}, nil)
return &stg
}(),
wantedErr: errors.New("find an ordering for deployments: graph contains a cycle: api"),
},
"should return the expected run orders": {
stg: func() *PipelineStage {
// Create a pipeline with a manual approval and 4 deployments.
var stg PipelineStage
stg.Init(&config.Environment{Name: "test"}, &manifest.PipelineStage{
Name: "test",
RequiresApproval: true,
Deployments: map[string]*manifest.Deployment{
"frontend": {
DependsOn: []string{"orders", "payments"},
},
"orders": {
DependsOn: []string{"warehouse"},
},
"payments": nil,
"warehouse": nil,
},
}, nil)
return &stg
}(),
wantedRunOrder: map[string]int{
"CreateOrUpdate-frontend-test": 4,
"CreateOrUpdate-orders-test": 3,
"CreateOrUpdate-payments-test": 2,
"CreateOrUpdate-warehouse-test": 2,
},
},
"deployments should be alphabetically sorted so that integration tests are deterministic": {
stg: func() *PipelineStage {
// Create a pipeline with all local workloads deployed in parallel.
var stg PipelineStage
stg.Init(&config.Environment{Name: "test"}, &manifest.PipelineStage{
Name: "test",
}, []string{"b", "a", "d", "c"})
return &stg
}(),
wantedRunOrder: map[string]int{
"CreateOrUpdate-a-test": 1,
"CreateOrUpdate-b-test": 1,
"CreateOrUpdate-c-test": 1,
"CreateOrUpdate-d-test": 1,
},
wantedTemplateOrder: []string{"CreateOrUpdate-a-test", "CreateOrUpdate-b-test", "CreateOrUpdate-c-test", "CreateOrUpdate-d-test"},
},
}
for name, tc := range testCases {
t.Run(name, func(t *testing.T) {
deployments, err := tc.stg.Deployments()
if tc.wantedErr != nil {
require.EqualError(t, err, tc.wantedErr.Error())
} else {
require.NoError(t, err)
for _, deployment := range deployments {
wanted, ok := tc.wantedRunOrder[deployment.Name()]
require.True(t, ok, "expected deployment named %s to be created", deployment.Name())
require.Equal(t, wanted, deployment.RunOrder(), "order for deployment %s does not match", deployment.Name())
}
for i, wanted := range tc.wantedTemplateOrder {
require.Equal(t, wanted, deployments[i].Name(), "deployment name at index %d do not match", i)
}
}
})
}
}
type mockAction struct {
order int
}
func (ma mockAction) RunOrder() int {
return ma.order
}
func TestAction_RunOrder(t *testing.T) {
testCases := map[string]struct {
previous []orderedRunner
wanted int
}{
"should return 1 when there are no previous actions": {
wanted: 1,
},
"should return the max of previous actions + 1": {
previous: []orderedRunner{
mockAction{order: 8},
mockAction{order: 7},
mockAction{order: 9},
mockAction{order: 8},
},
wanted: 10,
},
}
for name, tc := range testCases {
t.Run(name, func(t *testing.T) {
// GIVEN
action := action{
prevActions: tc.previous,
}
// THEN
require.Equal(t, tc.wanted, action.RunOrder())
})
}
}
func TestManualApprovalAction_Name(t *testing.T) {
action := ManualApprovalAction{
name: "test",
}
require.Equal(t, "ApprovePromotionTo-test", action.Name())
}
func TestDeployAction_Name(t *testing.T) {
action := DeployAction{
name: "frontend",
envName: "test",
}
require.Equal(t, "CreateOrUpdate-frontend-test", action.Name())
}
func TestDeployAction_StackName(t *testing.T) {
testCases := map[string]struct {
in DeployAction
wanted string
}{
"should default to app-env-name when user does not override the stack name": {
in: DeployAction{
name: "frontend",
envName: "test",
appName: "phonetool",
},
wanted: "phonetool-test-frontend",
},
"should use custom user override stack name when present": {
in: DeployAction{
override: &manifest.Deployment{
StackName: "other-stack",
},
},
wanted: "other-stack",
},
}
for name, tc := range testCases {
t.Run(name, func(t *testing.T) {
require.Equal(t, tc.wanted, tc.in.StackName())
})
}
}
func TestDeployAction_TemplatePath(t *testing.T) {
testCases := map[string]struct {
in DeployAction
wanted string
}{
"default location for workload templates": {
in: DeployAction{
name: "frontend",
envName: "test",
},
wanted: "infrastructure/frontend-test.stack.yml",
},
"should use custom override template path when present": {
in: DeployAction{
override: &manifest.Deployment{
TemplatePath: "infrastructure/custom.yml",
},
},
wanted: "infrastructure/custom.yml",
},
}
for name, tc := range testCases {
t.Run(name, func(t *testing.T) {
require.Equal(t, tc.wanted, tc.in.TemplatePath())
})
}
}
func TestDeployAction_TemplateConfigPath(t *testing.T) {
testCases := map[string]struct {
in DeployAction
wanted string
}{
"default location for workload template configs": {
in: DeployAction{
name: "frontend",
envName: "test",
},
wanted: "infrastructure/frontend-test.params.json",
},
"should use custom override template config path when present": {
in: DeployAction{
override: &manifest.Deployment{
TemplateConfig: "infrastructure/custom.params.json",
},
},
wanted: "infrastructure/custom.params.json",
},
}
for name, tc := range testCases {
t.Run(name, func(t *testing.T) {
require.Equal(t, tc.wanted, tc.in.TemplateConfigPath())
})
}
}
type mockRanker struct {
rank int
ok bool
}
func (m mockRanker) Rank(name string) (int, bool) {
return m.rank, m.ok
}
func TestDeployAction_RunOrder(t *testing.T) {
// GIVEN
ranker := mockRanker{rank: 2}
past := []orderedRunner{
mockAction{
order: 3,
},
}
in := DeployAction{
action: action{prevActions: past},
ranker: ranker,
}
// THEN
require.Equal(t, 6, in.RunOrder(), "should be past actions + 1 + rank")
}
func TestTestCommandsAction_Name(t *testing.T) {
require.Equal(t, "TestCommands", (&TestCommandsAction{}).Name())
}
func TestParseRepo(t *testing.T) {
testCases := map[string]struct {
src *CodeCommitSource
expectedErr error
expectedOwner string
expectedRepo string
}{
"missing repository property": {
src: &CodeCommitSource{
RepositoryURL: "",
},
expectedErr: errors.New("unable to locate the repository"),
},
"unable to parse repository name from URL": {
src: &CodeCommitSource{
RepositoryURL: "https://hahahaha.wrong.URL/repositories/wings/browse",
},
expectedErr: errors.New("unable to parse the repository from the URL https://hahahaha.wrong.URL/repositories/wings/browse"),
expectedOwner: "",
expectedRepo: "wings",
},
"valid full CC repository name": {
src: &CodeCommitSource{
RepositoryURL: "https://us-west-2.console.aws.amazon.com/codesuite/codecommit/repositories/wings/browse",
},
expectedOwner: "",
expectedRepo: "wings",
},
}
for name, tc := range testCases {
t.Run(name, func(t *testing.T) {
repo, err := tc.src.parseRepo()
if tc.expectedErr != nil {
require.EqualError(t, err, tc.expectedErr.Error())
} else {
require.NoError(t, err, "expected error")
require.Equal(t, tc.expectedRepo, repo, "mismatched repo")
}
})
}
}
| 705 |
copilot-cli | aws | Go | // Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
// SPDX-License-Identifier: Apache-2.0
// Package deploy holds the structures to deploy infrastructure resources.
// This file defines workload deployment resources.
package deploy
import (
"errors"
"fmt"
"strings"
"github.com/aws/aws-sdk-go/aws/arn"
)
var (
errInvalidTopicARN = errors.New("ARN is not a Copilot SNS topic")
errInvalidARN = errors.New("invalid ARN format")
errInvalidARNService = errors.New("ARN is not an SNS topic")
errInvalidComponent = errors.New("topic must be initialized with valid app, env, and workload")
)
var (
fmtTopicDescription = "%s (%s)"
)
// Topic holds information about a Copilot SNS topic and its ARN, ID, and Name.
type Topic struct {
awsARN arn.ARN
prefix string
wkld string
name string
}
// NewTopic creates a new Topic struct, validating the ARN as a Copilot-managed SNS topic.
// This function will
func NewTopic(inputARN string, app, env, wkld string) (*Topic, error) {
if app == "" || env == "" || wkld == "" {
return nil, errInvalidComponent
}
parsedARN, err := arn.Parse(inputARN)
if err != nil {
return nil, errInvalidARN
}
if parsedARN.Service != snsServiceName {
return nil, errInvalidARNService
}
t := &Topic{
prefix: fmt.Sprintf(fmtSNSTopicNamePrefix, app, env, wkld),
wkld: wkld,
awsARN: parsedARN,
}
if err = t.validateAndExtractName(); err != nil {
return nil, err
}
return t, nil
}
// ARN returns the full ARN of the SNS topic.
func (t Topic) ARN() string {
return t.awsARN.String()
}
// String returns the human-readable string which contains the topic name and workload it's associated with.
// Example: arn:aws:us-west-2:sns:123456789012:app-env-wkld-topic -> topic (wkld)
func (t Topic) String() string {
return fmt.Sprintf(fmtTopicDescription, t.name, t.wkld)
}
// Workload returns the workload associated with the given topic.
func (t Topic) Workload() string { return t.wkld }
// Name returns the name of the given topic.
func (t Topic) Name() string { return t.name }
// validateAndExtractName determines whether the given ARN is a Copilot-valid SNS topic ARN.
// It extracts the topic name from the ARN resource field.
func (t *Topic) validateAndExtractName() error {
// Check that the topic name has the correct app-env-workload prefix.
if !strings.HasPrefix(t.awsARN.Resource, t.prefix) {
return errInvalidTopicARN
}
// Check that the topic resources ID has a postfix AFTER that prefix.
if len(t.awsARN.Resource)-len(t.prefix) == 0 {
return errInvalidTopicARN
}
t.name = t.awsARN.Resource[len(t.prefix):]
return nil
}
| 98 |
copilot-cli | aws | Go | // Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
// SPDX-License-Identifier: Apache-2.0
package deploy
import (
"testing"
"github.com/stretchr/testify/require"
)
const (
mockGoodARN = "arn:aws:sns:us-west-2:12345678012:app-env-svc-topic"
mockBadARN = "arn:aws:sns:us-west-2:12345678012:topic"
mockApp = "app"
mockEnv = "env"
mockSvc = "svc"
)
func TestTopic_String(t *testing.T) {
testCases := map[string]struct {
inputARN string
inputApp string
inputEnv string
inputWkld string
wanted string
wantedError error
}{
"good arn": {
inputARN: mockGoodARN,
inputApp: mockApp,
inputEnv: mockEnv,
inputWkld: mockSvc,
wanted: "topic (svc)",
},
"bad arn format": {
inputARN: "bad arn",
wantedError: errInvalidARN,
inputApp: mockApp,
inputEnv: mockEnv,
inputWkld: mockSvc,
},
"bad arn: non-copilot topic": {
inputARN: mockBadARN,
inputApp: mockApp,
inputEnv: mockEnv,
inputWkld: mockSvc,
wantedError: errInvalidTopicARN,
},
"bad arn: arn for non-sns service": {
inputARN: "arn:aws:s3:::bucketname",
inputApp: mockApp,
inputEnv: mockEnv,
inputWkld: mockSvc,
wantedError: errInvalidARNService,
},
}
for name, tc := range testCases {
t.Run(name, func(t *testing.T) {
topic, err := NewTopic(tc.inputARN, tc.inputApp, tc.inputEnv, tc.inputWkld)
if tc.wantedError != nil {
require.EqualError(t, err, tc.wantedError.Error())
} else {
require.NoError(t, err)
require.Equal(t, tc.wanted, topic.String())
}
})
}
}
| 73 |
copilot-cli | aws | Go | // Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
// SPDX-License-Identifier: Apache-2.0
// Package deploy holds the structures to deploy infrastructure resources.
// This file defines service deployment resources.
package deploy
import (
"fmt"
"strings"
)
// FmtTaskECRRepoName is the pattern used to generate the ECR repository's name
const FmtTaskECRRepoName = "copilot-%s"
// CreateTaskResourcesInput holds the fields required to create a task stack.
type CreateTaskResourcesInput struct {
Name string
CPU int
Memory int
Image string
PermissionsBoundary string
TaskRole string
ExecutionRole string
Command []string
EntryPoint []string
EnvVars map[string]string
EnvFileARN string
SSMParamSecrets map[string]string
SecretsManagerSecrets map[string]string
OS string
Arch string
App string
Env string
AdditionalTags map[string]string
}
// TaskStackInfo contains essential information about a Copilot task stack
type TaskStackInfo struct {
StackName string
App string
Env string
RoleARN string
BucketName string
}
// TaskName returns the name of the one-off task. This is the same as the value of the
// copilot-task tag. For example, a stack called "task-db-migrate" will have the TaskName "db-migrate"
func (t TaskStackInfo) TaskName() string {
return strings.SplitN(t.StackName, "-", 2)[1]
}
// ECRRepoName returns the name of the ECR repo for the one-off task.
func (t TaskStackInfo) ECRRepoName() string {
return fmt.Sprintf(FmtTaskECRRepoName, t.TaskName())
}
| 63 |
copilot-cli | aws | Go | // Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
// SPDX-License-Identifier: Apache-2.0
// Package deploy holds the structures to deploy infrastructure resources.
// This file defines workload deployment resources.
package deploy
const (
// WorkloadCfnTemplateNameFormat is the base output file name when `service package`
// or `job package` is called. This is also used to render the pipeline CFN template.
WorkloadCfnTemplateNameFormat = "%s-%s.stack.yml"
// WorkloadCfnTemplateConfigurationNameFormat is the base output configuration
// file name when `service package` or `job package is called. It's also used to
// render the pipeline CFN template.
WorkloadCfnTemplateConfigurationNameFormat = "%s-%s.params.json"
// AddonsCfnTemplateNameFormat is the addons output file name when `service package`
// is called.
AddonsCfnTemplateNameFormat = "%s.addons.stack.yml"
)
// DeleteWorkloadInput holds the fields required to delete a workload.
type DeleteWorkloadInput struct {
Name string
EnvName string
AppName string
ExecutionRoleARN string
}
| 28 |
copilot-cli | aws | Go | // Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
// SPDX-License-Identifier: Apache-2.0
package cloudformation
import (
"context"
"errors"
"fmt"
"time"
"github.com/aws/copilot-cli/internal/pkg/stream"
"github.com/aws/copilot-cli/internal/pkg/version"
"golang.org/x/sync/errgroup"
"github.com/aws/copilot-cli/internal/pkg/term/log"
"github.com/aws/copilot-cli/internal/pkg/term/progress"
sdkcloudformation "github.com/aws/aws-sdk-go/service/cloudformation"
sdkcloudformationiface "github.com/aws/aws-sdk-go/service/cloudformation/cloudformationiface"
"github.com/aws/copilot-cli/internal/pkg/aws/cloudformation"
"github.com/aws/copilot-cli/internal/pkg/aws/cloudformation/stackset"
"github.com/aws/copilot-cli/internal/pkg/config"
"github.com/aws/copilot-cli/internal/pkg/deploy"
"github.com/aws/copilot-cli/internal/pkg/deploy/cloudformation/stack"
)
// DeployApp sets up everything required for our application-wide resources.
// These resources include things that are regional, rather than scoped to a particular
// environment, such as ECR Repos, CodePipeline KMS keys & S3 buckets.
// We deploy application resources through StackSets - that way we can have one
// template that we update and all regional stacks are updated.
func (cf CloudFormation) DeployApp(in *deploy.CreateAppInput) error {
appConfig := stack.NewAppStackConfig(in)
s, err := toStack(appConfig)
if err != nil {
return err
}
if err := cf.executeAndRenderChangeSet(cf.newCreateChangeSetInput(cf.console, s)); err != nil {
var alreadyExists *cloudformation.ErrStackAlreadyExists
if !errors.As(err, &alreadyExists) {
return err
}
}
blankAppTemplate, err := appConfig.ResourceTemplate(&stack.AppResourcesConfig{
App: appConfig.Name,
})
if err != nil {
return err
}
stackSetAdminRoleARN, err := appConfig.StackSetAdminRoleARN(cf.region)
if err != nil {
return fmt.Errorf("get stack set administrator role arn: %w", err)
}
return cf.appStackSet.Create(appConfig.StackSetName(), blankAppTemplate,
stackset.WithDescription(appConfig.StackSetDescription()),
stackset.WithExecutionRoleName(appConfig.StackSetExecutionRoleName()),
stackset.WithAdministrationRoleARN(stackSetAdminRoleARN),
stackset.WithTags(toMap(appConfig.Tags())))
}
// UpgradeApplication upgrades the application stack to the latest version.
func (cf CloudFormation) UpgradeApplication(in *deploy.CreateAppInput) error {
appConfig := stack.NewAppStackConfig(in)
appStack, err := cf.cfnClient.Describe(appConfig.StackName())
if err != nil {
return fmt.Errorf("get existing application infrastructure stack: %w", err)
}
in.DNSDelegationAccounts = stack.DNSDelegatedAccountsForStack(appStack.SDK())
in.AdditionalTags = toMap(appStack.Tags)
appConfig = stack.NewAppStackConfig(in)
if err := cf.upgradeAppStack(appConfig); err != nil {
var empty *cloudformation.ErrChangeSetEmpty
if !errors.As(err, &empty) {
return fmt.Errorf("upgrade stack %q: %w", appConfig.StackName(), err)
}
}
return cf.upgradeAppStackSet(appConfig)
}
func (cf CloudFormation) upgradeAppStackSet(config *stack.AppStackConfig) error {
for {
ssName := config.StackSetName()
if err := cf.appStackSet.WaitForStackSetLastOperationComplete(ssName); err != nil {
return fmt.Errorf("wait for stack set %s last operation complete: %w", ssName, err)
}
previouslyDeployedConfig, err := cf.getLastDeployedAppConfig(config)
if err != nil {
return err
}
previouslyDeployedConfig.Version += 1
err = cf.deployAppConfig(config, previouslyDeployedConfig, true /* updating template resources should update all instances*/)
if err == nil {
return nil
}
var stackSetOutOfDateErr *stackset.ErrStackSetOutOfDate
if errors.As(err, &stackSetOutOfDateErr) {
continue
}
return err
}
}
func (cf CloudFormation) upgradeAppStack(conf *stack.AppStackConfig) error {
s, err := toStack(conf)
if err != nil {
return err
}
in := &executeAndRenderChangeSetInput{
stackName: s.Name,
stackDescription: fmt.Sprintf("Creating the infrastructure for the %s app.", s.Name),
}
in.createChangeSet = func() (changeSetID string, err error) {
spinner := progress.NewSpinner(cf.console)
label := fmt.Sprintf("Proposing infrastructure changes for %s.", s.Name)
spinner.Start(label)
defer stopSpinner(spinner, err, label)
changeSetID, err = cf.cfnClient.Update(s)
if err != nil {
return "", err
}
return changeSetID, nil
}
return cf.executeAndRenderChangeSet(in)
}
// DelegateDNSPermissions grants the provided account ID the ability to write to this application's
// DNS HostedZone. This allows us to perform cross account DNS delegation.
func (cf CloudFormation) DelegateDNSPermissions(app *config.Application, accountID string) error {
deployApp := deploy.CreateAppInput{
Name: app.Name,
AccountID: app.AccountID,
DomainName: app.Domain,
DomainHostedZoneID: app.DomainHostedZoneID,
Version: version.LatestTemplateVersion(),
}
appConfig := stack.NewAppStackConfig(&deployApp)
appStack, err := cf.cfnClient.Describe(appConfig.StackName())
if err != nil {
return fmt.Errorf("getting existing application infrastructure stack: %w", err)
}
dnsDelegatedAccounts := stack.DNSDelegatedAccountsForStack(appStack.SDK())
deployApp.DNSDelegationAccounts = append(dnsDelegatedAccounts, accountID)
s, err := toStack(stack.NewAppStackConfig(&deployApp))
if err != nil {
return err
}
if err := cf.cfnClient.UpdateAndWait(s); err != nil {
var errNoUpdates *cloudformation.ErrChangeSetEmpty
if errors.As(err, &errNoUpdates) {
return nil
}
return fmt.Errorf("updating application to allow DNS delegation: %w", err)
}
return nil
}
// GetAppResourcesByRegion fetches all the regional resources for a particular region.
func (cf CloudFormation) GetAppResourcesByRegion(app *config.Application, region string) (*stack.AppRegionalResources, error) {
resources, err := cf.getResourcesForStackInstances(app, ®ion)
if err != nil {
return nil, fmt.Errorf("describing application resources: %w", err)
}
if len(resources) == 0 {
return nil, fmt.Errorf("no regional resources for application %s in region %s found", app.Name, region)
}
return resources[0], nil
}
// GetRegionalAppResources fetches all the regional resources for a particular application.
func (cf CloudFormation) GetRegionalAppResources(app *config.Application) ([]*stack.AppRegionalResources, error) {
resources, err := cf.getResourcesForStackInstances(app, nil)
if err != nil {
return nil, fmt.Errorf("describing application resources: %w", err)
}
return resources, nil
}
func (cf CloudFormation) getResourcesForStackInstances(app *config.Application, region *string) ([]*stack.AppRegionalResources, error) {
appConfig := stack.NewAppStackConfig(&deploy.CreateAppInput{
Name: app.Name,
AccountID: app.AccountID,
})
opts := []stackset.InstanceSummariesOption{
stackset.FilterSummariesByAccountID(app.AccountID),
}
if region != nil {
opts = append(opts, stackset.FilterSummariesByRegion(*region))
}
summaries, err := cf.appStackSet.InstanceSummaries(appConfig.StackSetName(), opts...)
if err != nil {
return nil, err
}
var regionalResources []*stack.AppRegionalResources
for _, summary := range summaries {
// Since these stacks will likely be in another region, we can't use
// the default cf client. Instead, we'll have to create a new client
// configured with the stack's region.
regionalCFClient := cf.regionalClient(summary.Region)
cfStack, err := regionalCFClient.Describe(summary.StackID)
if err != nil {
return nil, fmt.Errorf("getting outputs for stack %s in region %s: %w", summary.StackID, summary.Region, err)
}
regionalResource, err := stack.ToAppRegionalResources(cfStack.SDK())
if err != nil {
return nil, err
}
regionalResource.Region = summary.Region
regionalResources = append(regionalResources, regionalResource)
}
return regionalResources, nil
}
// AddWorkloadToAppOpt allows passing optional parameters to AddServiceToApp.
type AddWorkloadToAppOpt func(*stack.AppResourcesWorkload)
// AddWorkloadToAppOptWithoutECR adds a workload to app without creating an ECR repo.
func AddWorkloadToAppOptWithoutECR(s *stack.AppResourcesWorkload) {
s.WithECR = false
}
// AddServiceToApp attempts to add new service specific resources to the application resource stack.
// Currently, this means that we'll set up an ECR repo with a policy for all envs to be able
// to pull from it.
func (cf CloudFormation) AddServiceToApp(app *config.Application, svcName string, opts ...AddWorkloadToAppOpt) error {
if err := cf.addWorkloadToApp(app, svcName, opts...); err != nil {
return fmt.Errorf("adding service %s resources to application %s: %w", svcName, app.Name, err)
}
return nil
}
// AddJobToApp attempts to add new job-specific resources to the application resource stack.
// Currently, this means that we'll set up an ECR repo with a policy for all envs to be able
// to pull from it.
func (cf CloudFormation) AddJobToApp(app *config.Application, jobName string, opts ...AddWorkloadToAppOpt) error {
if err := cf.addWorkloadToApp(app, jobName, opts...); err != nil {
return fmt.Errorf("adding job %s resources to application %s: %w", jobName, app.Name, err)
}
return nil
}
func (cf CloudFormation) addWorkloadToApp(app *config.Application, wlName string, opts ...AddWorkloadToAppOpt) error {
appConfig := stack.NewAppStackConfig(&deploy.CreateAppInput{
Name: app.Name,
AccountID: app.AccountID,
AdditionalTags: app.Tags,
Version: version.LatestTemplateVersion(),
})
previouslyDeployedConfig, err := cf.getLastDeployedAppConfig(appConfig)
if err != nil {
return err
}
// We'll generate a new list of Accounts to add to our application
// infrastructure by appending the environment's account if it
// doesn't already exist.
var wlList []stack.AppResourcesWorkload
shouldAddNewWl := true
for _, wl := range previouslyDeployedConfig.Workloads {
wlList = append(wlList, wl)
if wl.Name == wlName {
shouldAddNewWl = false
}
}
if !shouldAddNewWl {
return nil
}
newAppResourcesService := &stack.AppResourcesWorkload{
Name: wlName,
WithECR: true,
}
for _, opt := range opts {
opt(newAppResourcesService)
}
wlList = append(wlList, *newAppResourcesService)
newDeploymentConfig := stack.AppResourcesConfig{
Version: previouslyDeployedConfig.Version + 1,
Workloads: wlList,
Accounts: previouslyDeployedConfig.Accounts,
App: appConfig.Name,
}
if err := cf.deployAppConfig(appConfig, &newDeploymentConfig, shouldAddNewWl); err != nil {
return err
}
return nil
}
// RemoveServiceFromApp attempts to remove service-specific resources (ECR repositories) from the application resource stack.
func (cf CloudFormation) RemoveServiceFromApp(app *config.Application, svcName string) error {
if err := cf.removeWorkloadFromApp(app, svcName); err != nil {
return fmt.Errorf("removing %s service resources from application: %w", svcName, err)
}
return nil
}
// RemoveJobFromApp attempts to remove job-specific resources (ECR repositories) from the application resource stack.
func (cf CloudFormation) RemoveJobFromApp(app *config.Application, jobName string) error {
if err := cf.removeWorkloadFromApp(app, jobName); err != nil {
return fmt.Errorf("removing %s job resources from application: %w", jobName, err)
}
return nil
}
func (cf CloudFormation) removeWorkloadFromApp(app *config.Application, wlName string) error {
appConfig := stack.NewAppStackConfig(&deploy.CreateAppInput{
Name: app.Name,
AccountID: app.AccountID,
AdditionalTags: app.Tags,
Version: version.LatestTemplateVersion(),
})
previouslyDeployedConfig, err := cf.getLastDeployedAppConfig(appConfig)
if err != nil {
return fmt.Errorf("get previous application %s config: %w", app.Name, err)
}
// We'll generate a new list of Accounts to remove the account associated
// with the input workload to be removed.
var wlList []stack.AppResourcesWorkload
shouldRemoveWl := false
for _, wl := range previouslyDeployedConfig.Workloads {
if wl.Name == wlName {
shouldRemoveWl = true
continue
}
wlList = append(wlList, wl)
}
if !shouldRemoveWl {
return nil
}
newDeploymentConfig := stack.AppResourcesConfig{
Version: previouslyDeployedConfig.Version + 1,
Workloads: wlList,
Accounts: previouslyDeployedConfig.Accounts,
App: appConfig.Name,
}
if err := cf.deployAppConfig(appConfig, &newDeploymentConfig, shouldRemoveWl); err != nil {
return err
}
return nil
}
// AddEnvToAppOpts contains the parameters to call AddEnvToApp.
type AddEnvToAppOpts struct {
App *config.Application
EnvName string
EnvAccountID string
EnvRegion string
}
// AddEnvToApp takes a new environment and updates the application configuration
// with new Account IDs in resource policies (KMS Keys and ECR Repos) - and
// sets up a new stack instance if the environment is in a new region.
func (cf CloudFormation) AddEnvToApp(opts *AddEnvToAppOpts) error {
appConfig := stack.NewAppStackConfig(&deploy.CreateAppInput{
Name: opts.App.Name,
AccountID: opts.App.AccountID,
AdditionalTags: opts.App.Tags,
Version: version.LatestTemplateVersion(),
})
previouslyDeployedConfig, err := cf.getLastDeployedAppConfig(appConfig)
if err != nil {
return fmt.Errorf("getting previous deployed stackset %w", err)
}
// We'll generate a new list of Accounts to add to our application
// infrastructure by appending the environment's account if it
// doesn't already exist.
var accountList []string
shouldAddNewAccountID := true
for _, accountID := range previouslyDeployedConfig.Accounts {
accountList = append(accountList, accountID)
if accountID == opts.EnvAccountID {
shouldAddNewAccountID = false
}
}
if shouldAddNewAccountID {
accountList = append(accountList, opts.EnvAccountID)
}
newDeploymentConfig := stack.AppResourcesConfig{
Version: previouslyDeployedConfig.Version + 1,
Workloads: previouslyDeployedConfig.Workloads,
Accounts: accountList,
App: appConfig.Name,
}
if err := cf.deployAppConfig(appConfig, &newDeploymentConfig, shouldAddNewAccountID); err != nil {
return fmt.Errorf("adding %s environment resources to application: %w", opts.EnvName, err)
}
if err := cf.addNewAppStackInstances(appConfig, previouslyDeployedConfig, opts.EnvRegion); err != nil {
return fmt.Errorf("adding new stack instance for environment %s: %w", opts.EnvName, err)
}
return nil
}
var getRegionFromClient = func(client sdkcloudformationiface.CloudFormationAPI) (string, error) {
concrete, ok := client.(*sdkcloudformation.CloudFormation)
if !ok {
return "", errors.New("failed to retrieve the region")
}
return *concrete.Client.Config.Region, nil
}
// AddPipelineResourcesToApp conditionally adds resources needed to support
// a pipeline in the application region (i.e. the same region that hosts our SSM store).
// This is necessary because the application region might not contain any environment.
func (cf CloudFormation) AddPipelineResourcesToApp(
app *config.Application, appRegion string) error {
appConfig := stack.NewAppStackConfig(&deploy.CreateAppInput{
Name: app.Name,
AccountID: app.AccountID,
Version: version.LatestTemplateVersion(),
})
resourcesConfig, err := cf.getLastDeployedAppConfig(appConfig)
if err != nil {
return err
}
// conditionally create a new stack instance in the application region
// if there's no existing stack instance.
if err := cf.addNewAppStackInstances(appConfig, resourcesConfig, appRegion); err != nil {
return fmt.Errorf("failed to add stack instance for pipeline, application: %s, region: %s, error: %w",
app.Name, appRegion, err)
}
return nil
}
func (cf CloudFormation) deployAppConfig(appConfig *stack.AppStackConfig, resources *stack.AppResourcesConfig, hasInstanceUpdates bool) error {
newTemplateToDeploy, err := appConfig.ResourceTemplate(resources)
if err != nil {
return err
}
// Every time we deploy the StackSet, we include a version field in the stack metadata.
// When we go to update the StackSet, we include that version + 1 as the "Operation ID".
// This ensures that we don't overwrite any changes that may have been applied between
// us reading the stack and actually updating it.
// As an example:
// * We read the stack with Version 1
// * Someone else reads the stack with Version 1
// * We update the StackSet with Version 2, the update completes.
// * Someone else tries to update the StackSet with their stale version 2.
// * "2" has already been used as an operation ID, and the stale write fails.
stackSetAdminRoleARN, err := appConfig.StackSetAdminRoleARN(cf.region)
if err != nil {
return fmt.Errorf("get stack set administrator role arn: %w", err)
}
renderInput := renderStackSetInput{
name: appConfig.StackSetName(),
template: newTemplateToDeploy,
hasInstanceUpdates: hasInstanceUpdates,
createOpFn: func() (string, error) {
return cf.appStackSet.Update(appConfig.StackSetName(), newTemplateToDeploy,
stackset.WithOperationID(fmt.Sprintf("%d", resources.Version)),
stackset.WithDescription(appConfig.StackSetDescription()),
stackset.WithExecutionRoleName(appConfig.StackSetExecutionRoleName()),
stackset.WithAdministrationRoleARN(stackSetAdminRoleARN),
stackset.WithTags(toMap(appConfig.Tags())))
},
now: time.Now,
}
return cf.renderStackSet(renderInput)
}
// addNewAppStackInstances takes an environment and determines if we need to create a new
// stack instance. We only spin up a new stack instance if the env is in a new region.
func (cf CloudFormation) addNewAppStackInstances(appConfig *stack.AppStackConfig, resourcesConfig *stack.AppResourcesConfig, region string) error {
summaries, err := cf.appStackSet.InstanceSummaries(appConfig.StackSetName())
if err != nil {
return err
}
// We only want to deploy a new StackInstance if we're
// adding an environment in a new region.
shouldDeployNewStackInstance := true
for _, summary := range summaries {
if summary.Region == region {
shouldDeployNewStackInstance = false
}
}
if !shouldDeployNewStackInstance {
return nil
}
template, err := appConfig.ResourceTemplate(resourcesConfig)
if err != nil {
return err
}
// Set up a new Stack Instance for the new region. The Stack Instance will inherit the latest StackSet template.
renderInput := renderStackSetInput{
name: appConfig.StackSetName(),
template: template,
hasInstanceUpdates: shouldDeployNewStackInstance,
createOpFn: func() (string, error) {
return cf.appStackSet.CreateInstances(appConfig.StackSetName(), []string{appConfig.AccountID}, []string{region})
},
now: time.Now,
}
return cf.renderStackSet(renderInput)
}
func (cf CloudFormation) getLastDeployedAppConfig(appConfig *stack.AppStackConfig) (*stack.AppResourcesConfig, error) {
// Check the existing deploy stack template. From that template, we'll parse out the list of services and accounts that
// are deployed in the stack.
descr, err := cf.appStackSet.Describe(appConfig.StackSetName())
if err != nil {
return nil, err
}
previouslyDeployedConfig, err := stack.AppConfigFrom(&descr.Template)
if err != nil {
return nil, fmt.Errorf("parse previous deployed stackset %w", err)
}
previouslyDeployedConfig.App = appConfig.Name
return previouslyDeployedConfig, nil
}
// DeleteApp deletes all application specific StackSet and Stack resources.
func (cf CloudFormation) DeleteApp(appName string) error {
spinner := progress.NewSpinner(cf.console)
spinner.Start(fmt.Sprintf("Delete regional resources for application %q", appName))
stackSetName := fmt.Sprintf("%s-infrastructure", appName)
if err := cf.deleteStackSetInstances(stackSetName); err != nil {
spinner.Stop(log.Serrorf("Error deleting regional resources for application %q\n", appName))
return err
}
if err := cf.appStackSet.Delete(stackSetName); err != nil {
spinner.Stop(log.Serrorf("Error deleting regional resources for application %q\n", appName))
return err
}
spinner.Stop(log.Ssuccessf("Deleted regional resources for application %q\n", appName))
stackName := fmt.Sprintf("%s-infrastructure-roles", appName)
description := fmt.Sprintf("Delete application roles stack %s", stackName)
return cf.deleteAndRenderStack(stackName, description, func() error {
return cf.cfnClient.DeleteAndWait(stackName)
})
}
func (cf CloudFormation) deleteStackSetInstances(name string) error {
opID, err := cf.appStackSet.DeleteAllInstances(name)
if err != nil {
if IsEmptyErr(err) {
return nil
}
return err
}
return cf.appStackSet.WaitForOperation(name, opID)
}
type renderStackSetInput struct {
name string // Name of the stack set.
template string // Template body for stack set instances.
hasInstanceUpdates bool // True when the stack set update will force instances to also be updated.
createOpFn func() (string, error) // Function to create a stack set operation.
now func() time.Time
}
func (cf CloudFormation) renderStackSetImpl(in renderStackSetInput) error {
titles, err := cloudformation.ParseTemplateDescriptions(in.template)
if err != nil {
return fmt.Errorf("parse resource descriptions from stack set template: %w", err)
}
// Start the operation.
timestamp := in.now()
opID, err := in.createOpFn()
if err != nil {
return err
}
// Collect streamers.
setStreamer := stream.NewStackSetStreamer(cf.appStackSet, in.name, opID, timestamp)
var stackStreamers []*stream.StackStreamer
if in.hasInstanceUpdates {
stackStreamers, err = setStreamer.InstanceStreamers(func(region string) stream.StackEventsDescriber {
return cf.regionalClient(region)
})
if err != nil {
return fmt.Errorf("retrieve stack instance streamers: %w", err)
}
}
streamers := []stream.Streamer{setStreamer}
for _, streamer := range stackStreamers {
streamers = append(streamers, streamer)
}
// Collect renderers
renderers := stackSetRenderers(setStreamer, stackStreamers, titles)
// Render.
waitCtx, cancelWait := context.WithTimeout(context.Background(), waitForStackTimeout)
defer cancelWait()
g, ctx := errgroup.WithContext(waitCtx)
for _, streamer := range streamers {
streamer := streamer // Create a new instance of streamer for the goroutine.
g.Go(func() error {
return stream.Stream(ctx, streamer)
})
}
g.Go(func() error {
_, err := progress.Render(ctx, progress.NewTabbedFileWriter(cf.console), progress.MultiRenderer(renderers...))
return err
})
if err := g.Wait(); err != nil {
return fmt.Errorf("render progress of stack set %q: %w", in.name, err)
}
return nil
}
func stackSetRenderers(setStreamer *stream.StackSetStreamer, stackStreamers []*stream.StackStreamer, resourceTitles map[string]string) []progress.DynamicRenderer {
noStyle := progress.RenderOptions{}
renderers := []progress.DynamicRenderer{
progress.ListeningStackSetRenderer(setStreamer, fmt.Sprintf("Update regional resources with stack set %q", setStreamer.Name()), noStyle),
}
for _, streamer := range stackStreamers {
title := fmt.Sprintf("Update stack set instance %q", streamer.Name())
if region, ok := streamer.Region(); ok {
title = fmt.Sprintf("Update resources in region %q", region)
}
r := progress.ListeningStackRenderer(streamer, streamer.Name(), title, resourceTitles, progress.NestedRenderOptions(noStyle))
renderers = append(renderers, r)
}
return renderers
}
| 648 |
copilot-cli | aws | Go | // Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
// SPDX-License-Identifier: Apache-2.0
package cloudformation
import (
"errors"
"fmt"
"strings"
"testing"
"time"
"github.com/aws/aws-sdk-go/aws"
awscfn "github.com/aws/aws-sdk-go/service/cloudformation"
"github.com/aws/aws-sdk-go/service/cloudformation/cloudformationiface"
"github.com/aws/copilot-cli/internal/pkg/aws/cloudformation"
"github.com/aws/copilot-cli/internal/pkg/aws/cloudformation/cloudformationtest"
"github.com/aws/copilot-cli/internal/pkg/aws/cloudformation/stackset"
"github.com/aws/copilot-cli/internal/pkg/config"
"github.com/aws/copilot-cli/internal/pkg/deploy"
"github.com/aws/copilot-cli/internal/pkg/deploy/cloudformation/mocks"
"github.com/aws/copilot-cli/internal/pkg/deploy/cloudformation/stack"
"github.com/golang/mock/gomock"
"github.com/stretchr/testify/require"
"gopkg.in/yaml.v3"
)
func TestCloudFormation_DeployApp(t *testing.T) {
mockApp := &deploy.CreateAppInput{
Name: "testapp",
AccountID: "1234",
Version: "v1.29.0",
}
testCases := map[string]struct {
mockStack func(ctrl *gomock.Controller) cfnClient
mockStackSet func(t *testing.T, ctrl *gomock.Controller) stackSetClient
region string
want error
}{
"should return an error if infrastructure roles stack fails": {
mockStack: func(ctrl *gomock.Controller) cfnClient {
m := mocks.NewMockcfnClient(ctrl)
m.EXPECT().Create(gomock.Any()).Return("", errors.New("error creating stack"))
m.EXPECT().ErrorEvents(gomock.Any()).Return(nil, nil) // No additional error descriptions.
return m
},
mockStackSet: func(t *testing.T, ctrl *gomock.Controller) stackSetClient {
return nil
},
want: errors.New("error creating stack"),
},
"should return a wrapped error if region is invalid when populating the admin role arn": {
region: "bad-region",
mockStack: func(ctrl *gomock.Controller) cfnClient {
m := mocks.NewMockcfnClient(ctrl)
m.EXPECT().Create(gomock.Any()).Return("", &cloudformation.ErrStackAlreadyExists{})
return m
},
mockStackSet: func(t *testing.T, ctrl *gomock.Controller) stackSetClient {
return nil
},
want: fmt.Errorf("get stack set administrator role arn: find the partition for region bad-region"),
},
"should return nil if there are no updates": {
region: "us-west-2",
mockStack: func(ctrl *gomock.Controller) cfnClient {
m := mocks.NewMockcfnClient(ctrl)
m.EXPECT().Create(gomock.Any()).Return("", &cloudformation.ErrStackAlreadyExists{})
return m
},
mockStackSet: func(t *testing.T, ctrl *gomock.Controller) stackSetClient {
m := mocks.NewMockstackSetClient(ctrl)
m.EXPECT().Create(gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any()).
Return(nil)
return m
},
},
"should return nil if infrastructure roles stackset created for the first time": {
region: "us-west-2",
mockStack: func(ctrl *gomock.Controller) cfnClient {
m := mocks.NewMockcfnClient(ctrl)
m.EXPECT().Create(gomock.Any()).Return("", nil)
return m
},
mockStackSet: func(t *testing.T, ctrl *gomock.Controller) stackSetClient {
m := mocks.NewMockstackSetClient(ctrl)
m.EXPECT().Create(gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any()).
Return(nil).
Do(func(name, _ string, _ ...stackset.CreateOrUpdateOption) {
require.Equal(t, "testapp-infrastructure", name)
})
return m
},
},
}
for name, tc := range testCases {
t.Run(name, func(t *testing.T) {
// GIVEN
ctrl := gomock.NewController(t)
defer ctrl.Finish()
cf := CloudFormation{
cfnClient: tc.mockStack(ctrl),
appStackSet: tc.mockStackSet(t, ctrl),
region: tc.region,
console: new(discardFile),
}
// WHEN
got := cf.DeployApp(mockApp)
// THEN
if tc.want != nil {
require.EqualError(t, tc.want, got.Error())
} else {
require.NoError(t, got)
}
})
}
}
func TestCloudFormation_UpgradeApplication(t *testing.T) {
testCases := map[string]struct {
mockDeployer func(t *testing.T, ctrl *gomock.Controller) *CloudFormation
wantedErr error
}{
"error if fail to get existing application infrastructure stack": {
mockDeployer: func(t *testing.T, ctrl *gomock.Controller) *CloudFormation {
return &CloudFormation{
cfnClient: &cloudformationtest.Double{
DescribeFn: func(string) (*cloudformation.StackDescription, error) {
return nil, errors.New("some error")
},
},
}
},
wantedErr: fmt.Errorf("get existing application infrastructure stack: some error"),
},
"error if fail to update app stack": {
mockDeployer: func(t *testing.T, ctrl *gomock.Controller) *CloudFormation {
return &CloudFormation{
cfnClient: &cloudformationtest.Double{
DescribeFn: func(string) (*cloudformation.StackDescription, error) {
return &cloudformation.StackDescription{}, nil
},
UpdateFn: func(*cloudformation.Stack) (string, error) {
return "", fmt.Errorf("some error")
},
},
renderStackSet: func(input renderStackSetInput) error {
return nil
},
}
},
wantedErr: fmt.Errorf(`upgrade stack "phonetool-infrastructure-roles": some error`),
},
// TODO test tags manually
"error if fail to describe app change set": {
mockDeployer: func(t *testing.T, ctrl *gomock.Controller) *CloudFormation {
return &CloudFormation{
cfnClient: &cloudformationtest.Double{
DescribeFn: func(string) (*cloudformation.StackDescription, error) {
return &cloudformation.StackDescription{}, nil
},
UpdateFn: func(*cloudformation.Stack) (string, error) {
return "", nil
},
DescribeChangeSetFn: func(changeSetID, stackName string) (*cloudformation.ChangeSetDescription, error) {
return nil, errors.New("some error")
},
},
}
},
wantedErr: fmt.Errorf(`upgrade stack "phonetool-infrastructure-roles": some error`),
},
"error if fail to get app change set template": {
mockDeployer: func(t *testing.T, ctrl *gomock.Controller) *CloudFormation {
return &CloudFormation{
cfnClient: &cloudformationtest.Double{
DescribeFn: func(string) (*cloudformation.StackDescription, error) {
return &cloudformation.StackDescription{}, nil
},
UpdateFn: func(*cloudformation.Stack) (string, error) {
return "", nil
},
DescribeChangeSetFn: func(changeSetID, stackName string) (*cloudformation.ChangeSetDescription, error) {
return &cloudformation.ChangeSetDescription{}, nil
},
TemplateBodyFromChangeSetFn: func(changeSetID, stackName string) (string, error) {
return "", errors.New("some error")
},
},
}
},
wantedErr: fmt.Errorf(`upgrade stack "phonetool-infrastructure-roles": some error`),
},
"error if fail to wait until stack set last operation complete": {
mockDeployer: func(t *testing.T, ctrl *gomock.Controller) *CloudFormation {
mockAppStackSet := mocks.NewMockstackSetClient(ctrl)
mockAppStackSet.EXPECT().WaitForStackSetLastOperationComplete("phonetool-infrastructure").Return(errors.New("some error"))
return &CloudFormation{
console: mockFileWriter{Writer: &strings.Builder{}},
cfnClient: &cloudformationtest.Double{
DescribeFn: func(string) (*cloudformation.StackDescription, error) {
return &cloudformation.StackDescription{}, nil
},
UpdateFn: func(*cloudformation.Stack) (string, error) {
return "", nil
},
DescribeChangeSetFn: func(changeSetID, stackName string) (*cloudformation.ChangeSetDescription, error) {
return &cloudformation.ChangeSetDescription{}, nil
},
TemplateBodyFromChangeSetFn: func(changeSetID, stackName string) (string, error) {
return ``, nil
},
DescribeStackEventsFn: func(input *awscfn.DescribeStackEventsInput) (*awscfn.DescribeStackEventsOutput, error) {
// just finish the renderer on the first Describe call
return &awscfn.DescribeStackEventsOutput{
StackEvents: []*awscfn.StackEvent{
{
Timestamp: aws.Time(time.Now().Add(1 * time.Hour)),
LogicalResourceId: aws.String("phonetool-infrastructure-roles"),
ResourceStatus: aws.String(awscfn.StackStatusUpdateComplete),
},
},
}, nil
},
},
appStackSet: mockAppStackSet,
}
},
wantedErr: fmt.Errorf(`wait for stack set phonetool-infrastructure last operation complete: some error`),
},
"success": {
mockDeployer: func(t *testing.T, ctrl *gomock.Controller) *CloudFormation {
mockAppStackSet := mocks.NewMockstackSetClient(ctrl)
mockAppStackSet.EXPECT().WaitForStackSetLastOperationComplete("phonetool-infrastructure").Return(nil)
mockAppStackSet.EXPECT().Describe("phonetool-infrastructure").Return(stackset.Description{}, nil)
mockAppStackSet.EXPECT().Update(gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any()).
Return("", nil)
return &CloudFormation{
console: mockFileWriter{Writer: &strings.Builder{}},
cfnClient: &cloudformationtest.Double{
DescribeFn: func(string) (*cloudformation.StackDescription, error) {
return &cloudformation.StackDescription{}, nil
},
UpdateFn: func(*cloudformation.Stack) (string, error) {
return "", nil
},
DescribeChangeSetFn: func(changeSetID, stackName string) (*cloudformation.ChangeSetDescription, error) {
return &cloudformation.ChangeSetDescription{}, nil
},
TemplateBodyFromChangeSetFn: func(changeSetID, stackName string) (string, error) {
return ``, nil
},
DescribeStackEventsFn: func(input *awscfn.DescribeStackEventsInput) (*awscfn.DescribeStackEventsOutput, error) {
return &awscfn.DescribeStackEventsOutput{
StackEvents: []*awscfn.StackEvent{
{
Timestamp: aws.Time(time.Now().Add(1 * time.Hour)),
LogicalResourceId: aws.String("phonetool-infrastructure-roles"),
ResourceStatus: aws.String(awscfn.StackStatusUpdateComplete),
},
},
}, nil
},
},
appStackSet: mockAppStackSet,
region: "us-west-2",
renderStackSet: func(input renderStackSetInput) error {
_, err := input.createOpFn()
return err
},
}
},
},
"success with multiple tries and waitings": {
mockDeployer: func(t *testing.T, ctrl *gomock.Controller) *CloudFormation {
mockAppStackSet := mocks.NewMockstackSetClient(ctrl)
mockAppStackSet.EXPECT().WaitForStackSetLastOperationComplete("phonetool-infrastructure").Return(nil)
mockAppStackSet.EXPECT().Describe("phonetool-infrastructure").Return(stackset.Description{}, nil)
mockAppStackSet.EXPECT().Update(gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any()).
Return("", &stackset.ErrStackSetOutOfDate{})
mockAppStackSet.EXPECT().WaitForStackSetLastOperationComplete("phonetool-infrastructure").Return(nil)
mockAppStackSet.EXPECT().Describe("phonetool-infrastructure").Return(stackset.Description{}, nil)
mockAppStackSet.EXPECT().Update(gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any()).
Return("", nil)
return &CloudFormation{
console: mockFileWriter{Writer: &strings.Builder{}},
cfnClient: &cloudformationtest.Double{
DescribeFn: func(string) (*cloudformation.StackDescription, error) {
return &cloudformation.StackDescription{}, nil
},
UpdateFn: func(*cloudformation.Stack) (string, error) {
return "", nil
},
DescribeChangeSetFn: func(changeSetID, stackName string) (*cloudformation.ChangeSetDescription, error) {
return &cloudformation.ChangeSetDescription{}, nil
},
TemplateBodyFromChangeSetFn: func(changeSetID, stackName string) (string, error) {
return ``, nil
},
DescribeStackEventsFn: func(input *awscfn.DescribeStackEventsInput) (*awscfn.DescribeStackEventsOutput, error) {
return &awscfn.DescribeStackEventsOutput{
StackEvents: []*awscfn.StackEvent{
{
Timestamp: aws.Time(time.Now().Add(1 * time.Hour)),
LogicalResourceId: aws.String("phonetool-infrastructure-roles"),
ResourceStatus: aws.String(awscfn.StackStatusUpdateComplete),
},
},
}, nil
},
},
appStackSet: mockAppStackSet,
region: "us-west-2",
renderStackSet: func(input renderStackSetInput) error {
_, err := input.createOpFn()
return err
},
}
},
},
}
for name, tc := range testCases {
t.Run(name, func(t *testing.T) {
// GIVEN
ctrl := gomock.NewController(t)
defer ctrl.Finish()
cf := tc.mockDeployer(t, ctrl)
// WHEN
err := cf.UpgradeApplication(&deploy.CreateAppInput{
Name: "phonetool",
})
// THEN
if tc.wantedErr != nil {
require.EqualError(t, err, tc.wantedErr.Error())
} else {
require.NoError(t, err)
}
})
}
}
func TestCloudFormation_AddEnvToApp(t *testing.T) {
mockApp := config.Application{
Name: "testapp",
AccountID: "1234",
}
testCases := map[string]struct {
mockStackSet func(t *testing.T, ctrl *gomock.Controller) stackSetClient
app *config.Application
env *config.Environment
want error
}{
"with no existing deployments and adding an env": {
app: &mockApp,
env: &config.Environment{Name: "test", AccountID: "1234", Region: "us-west-2"},
mockStackSet: func(t *testing.T, ctrl *gomock.Controller) stackSetClient {
m := mocks.NewMockstackSetClient(ctrl)
body, err := yaml.Marshal(stack.DeployedAppMetadata{})
require.NoError(t, err)
m.EXPECT().Describe(gomock.Any()).Return(stackset.Description{
Template: string(body),
}, nil)
m.EXPECT().Update(gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any()).
Return("", nil).
Do(func(_, _ string, ops ...stackset.CreateOrUpdateOption) {
actual := &awscfn.UpdateStackSetInput{}
ops[0](actual)
wanted := &awscfn.UpdateStackSetInput{}
stackset.WithOperationID("1")(wanted)
require.Equal(t, actual, wanted)
})
m.EXPECT().InstanceSummaries(gomock.Any()).Return([]stackset.InstanceSummary{}, nil)
m.EXPECT().CreateInstances(gomock.Any(), []string{"1234"}, []string{"us-west-2"}).Return("", nil)
return m
},
},
"with no new account ID added": {
app: &mockApp,
env: &config.Environment{Name: "test", AccountID: "1234", Region: "us-west-2"},
mockStackSet: func(t *testing.T, ctrl *gomock.Controller) stackSetClient {
m := mocks.NewMockstackSetClient(ctrl)
body, err := yaml.Marshal(stack.DeployedAppMetadata{
Metadata: stack.AppResources{
AppResourcesConfig: stack.AppResourcesConfig{
Accounts: []string{"1234"},
},
},
})
require.NoError(t, err)
m.EXPECT().Describe(gomock.Any()).Return(stackset.Description{
Template: string(body),
}, nil)
m.EXPECT().Update(gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any()).
Return("", nil)
m.EXPECT().InstanceSummaries(gomock.Any()).Return([]stackset.InstanceSummary{}, nil)
m.EXPECT().CreateInstances(gomock.Any(), []string{"1234"}, []string{"us-west-2"}).Return("", nil)
return m
},
},
"with existing stack instances in same region but different account (no new stack instances, but update stackset)": {
app: &mockApp,
env: &config.Environment{Name: "test", AccountID: "1234", Region: "us-west-2"},
mockStackSet: func(t *testing.T, ctrl *gomock.Controller) stackSetClient {
m := mocks.NewMockstackSetClient(ctrl)
body, err := yaml.Marshal(stack.DeployedAppMetadata{
Metadata: stack.AppResources{
AppResourcesConfig: stack.AppResourcesConfig{
Accounts: []string{"1234"},
Version: 1,
},
},
})
require.NoError(t, err)
m.EXPECT().Describe(gomock.Any()).Return(stackset.Description{
Template: string(body),
}, nil)
m.EXPECT().Update(gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any()).
Return("", nil).
Do(func(_, _ string, ops ...stackset.CreateOrUpdateOption) {
actual := &awscfn.UpdateStackSetInput{}
ops[0](actual)
wanted := &awscfn.UpdateStackSetInput{}
stackset.WithOperationID("2")(wanted)
require.Equal(t, actual, wanted)
})
m.EXPECT().InstanceSummaries(gomock.Any()).Return([]stackset.InstanceSummary{
{
Region: "us-west-2",
Account: "1234",
},
}, nil)
m.EXPECT().CreateInstances(gomock.Any(), gomock.Any(), gomock.Any()).Times(0)
return m
},
},
}
for name, tc := range testCases {
t.Run(name, func(t *testing.T) {
// GIVEN
ctrl := gomock.NewController(t)
defer ctrl.Finish()
cf := CloudFormation{
appStackSet: tc.mockStackSet(t, ctrl),
region: "us-west-2",
renderStackSet: func(input renderStackSetInput) error {
_, err := input.createOpFn()
return err
},
}
got := cf.AddEnvToApp(&AddEnvToAppOpts{
App: tc.app,
EnvName: tc.env.Name,
EnvAccountID: tc.env.AccountID,
EnvRegion: tc.env.Region,
})
if tc.want != nil {
require.EqualError(t, got, tc.want.Error())
} else {
require.NoError(t, got)
}
})
}
}
func TestCloudFormation_AddPipelineResourcesToApp(t *testing.T) {
mockApp := config.Application{
Name: "testapp",
AccountID: "1234",
}
testCases := map[string]struct {
app *config.Application
mockStackSet func(t *testing.T, ctrl *gomock.Controller) stackSetClient
getRegionFromClient func(client cloudformationiface.CloudFormationAPI) (string, error)
expectedErr error
}{
"with no existing account nor environment, add pipeline supporting resources": {
app: &mockApp,
mockStackSet: func(t *testing.T, ctrl *gomock.Controller) stackSetClient {
m := mocks.NewMockstackSetClient(ctrl)
m.EXPECT().InstanceSummaries(gomock.Any()).Return([]stackset.InstanceSummary{}, nil)
body, err := yaml.Marshal(stack.DeployedAppMetadata{})
require.NoError(t, err)
m.EXPECT().Describe(gomock.Any()).Return(stackset.Description{
Template: string(body),
}, nil)
m.EXPECT().CreateInstances(gomock.Any(), []string{"1234"}, []string{"us-west-2"}).Return("1", nil)
return m
},
getRegionFromClient: func(client cloudformationiface.CloudFormationAPI) (string, error) {
return "us-west-2", nil
},
},
"with existing account and existing environment in a region, should not add pipeline supporting resources": {
app: &mockApp,
mockStackSet: func(t *testing.T, ctrl *gomock.Controller) stackSetClient {
m := mocks.NewMockstackSetClient(ctrl)
m.EXPECT().InstanceSummaries(gomock.Any()).Return([]stackset.InstanceSummary{
{
Region: "us-west-2",
Account: mockApp.AccountID,
},
}, nil)
body, err := yaml.Marshal(stack.DeployedAppMetadata{})
require.NoError(t, err)
m.EXPECT().Describe(gomock.Any()).Return(stackset.Description{
Template: string(body),
}, nil)
m.EXPECT().CreateInstances(gomock.Any(), gomock.Any(), gomock.Any()).Times(0)
return m
},
getRegionFromClient: func(client cloudformationiface.CloudFormationAPI) (string, error) {
return "us-west-2", nil
},
},
}
actual := getRegionFromClient // FIXME refactor using defer func
for name, tc := range testCases {
t.Run(name, func(t *testing.T) {
ctrl := gomock.NewController(t)
defer ctrl.Finish()
cf := CloudFormation{
appStackSet: tc.mockStackSet(t, ctrl),
renderStackSet: func(input renderStackSetInput) error {
_, err := input.createOpFn()
return err
},
}
getRegionFromClient = tc.getRegionFromClient
got := cf.AddPipelineResourcesToApp(tc.app, "us-west-2")
if tc.expectedErr != nil {
require.EqualError(t, got, tc.expectedErr.Error())
} else {
require.NoError(t, got)
}
})
}
getRegionFromClient = actual
}
func TestCloudFormation_AddServiceToApp(t *testing.T) {
mockApp := config.Application{
Name: "testapp",
AccountID: "1234",
}
testCases := map[string]struct {
app *config.Application
svcName string
mockStackSet func(t *testing.T, ctrl *gomock.Controller) stackSetClient
want error
}{
"with no existing deployments and adding a service": {
app: &mockApp,
svcName: "TestSvc",
mockStackSet: func(t *testing.T, ctrl *gomock.Controller) stackSetClient {
m := mocks.NewMockstackSetClient(ctrl)
m.EXPECT().Describe(gomock.Any()).Return(stackset.Description{
Template: `Metadata:
Version:
Services: []`,
}, nil)
m.EXPECT().Update(gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any()).
Return("", nil).
Do(func(_, template string, _ ...stackset.CreateOrUpdateOption) {
configToDeploy, err := stack.AppConfigFrom(&template)
require.NoError(t, err)
require.ElementsMatch(t, []stack.AppResourcesWorkload{{Name: "TestSvc", WithECR: true}}, configToDeploy.Workloads)
require.Empty(t, configToDeploy.Accounts, "there should be no new accounts to deploy")
require.Equal(t, 1, configToDeploy.Version)
})
return m
},
},
"with new app to existing app with existing services": {
app: &mockApp,
svcName: "test",
mockStackSet: func(t *testing.T, ctrl *gomock.Controller) stackSetClient {
m := mocks.NewMockstackSetClient(ctrl)
m.EXPECT().Describe(gomock.Any()).Return(stackset.Description{
Template: `Metadata:
Version: 1
Services:
- firsttest`,
}, nil)
m.EXPECT().Update(gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any()).
Return("", nil).
Do(func(_, template string, _ ...stackset.CreateOrUpdateOption) {
configToDeploy, err := stack.AppConfigFrom(&template)
require.NoError(t, err)
require.ElementsMatch(t, []stack.AppResourcesWorkload{
{Name: "test", WithECR: true},
{Name: "firsttest", WithECR: true},
}, configToDeploy.Workloads)
require.Empty(t, configToDeploy.Accounts, "there should be no new accounts to deploy")
require.Equal(t, 2, configToDeploy.Version)
})
return m
},
},
"with existing service to existing app with existing services": {
app: &mockApp,
svcName: "test",
mockStackSet: func(t *testing.T, ctrl *gomock.Controller) stackSetClient {
m := mocks.NewMockstackSetClient(ctrl)
m.EXPECT().Describe(gomock.Any()).Return(stackset.Description{
Template: `Metadata:
Version: 1
Services:
- test`,
}, nil)
m.EXPECT().Update(gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any()).
Times(0)
return m
},
},
}
for name, tc := range testCases {
t.Run(name, func(t *testing.T) {
ctrl := gomock.NewController(t)
defer ctrl.Finish()
cf := CloudFormation{
appStackSet: tc.mockStackSet(t, ctrl),
region: "us-west-2",
renderStackSet: func(input renderStackSetInput) error {
_, err := input.createOpFn()
return err
},
}
got := cf.AddServiceToApp(tc.app, tc.svcName)
if tc.want != nil {
require.EqualError(t, got, tc.want.Error())
} else {
require.NoError(t, got)
}
})
}
}
func TestCloudFormation_RemoveServiceFromApp(t *testing.T) {
mockApp := &config.Application{
Name: "testapp",
AccountID: "1234",
}
tests := map[string]struct {
service string
mockStackSet func(t *testing.T, ctrl *gomock.Controller) stackSetClient
want error
}{
"should remove input service from the stack set": {
service: "test",
mockStackSet: func(t *testing.T, ctrl *gomock.Controller) stackSetClient {
m := mocks.NewMockstackSetClient(ctrl)
m.EXPECT().Describe(gomock.Any()).Return(stackset.Description{
Template: `Metadata:
Version: 1
Services:
- firsttest
- test`,
}, nil)
m.EXPECT().Update(gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any()).
Return("", nil).
Do(func(_, template string, opts ...stackset.CreateOrUpdateOption) {
configToDeploy, err := stack.AppConfigFrom(&template)
require.NoError(t, err)
require.ElementsMatch(t, []stack.AppResourcesWorkload{{Name: "firsttest", WithECR: true}}, configToDeploy.Workloads)
require.Empty(t, configToDeploy.Accounts, "config account list should be empty")
require.Equal(t, 2, configToDeploy.Version)
require.Equal(t, 5, len(opts))
})
return m
},
},
}
for name, tc := range tests {
t.Run(name, func(t *testing.T) {
ctrl := gomock.NewController(t)
defer ctrl.Finish()
cf := CloudFormation{
appStackSet: tc.mockStackSet(t, ctrl),
region: "us-west-2",
renderStackSet: func(input renderStackSetInput) error {
_, err := input.createOpFn()
return err
},
}
got := cf.RemoveServiceFromApp(mockApp, tc.service)
require.Equal(t, tc.want, got)
})
}
}
func TestCloudFormation_GetRegionalAppResources(t *testing.T) {
mockApp := config.Application{Name: "app", AccountID: "12345"}
testCases := map[string]struct {
createRegionalMockClient func(ctrl *gomock.Controller) cfnClient
mockStackSet func(t *testing.T, ctrl *gomock.Controller) stackSetClient
wantedResource stack.AppRegionalResources
want error
}{
"should describe stack instances and convert to AppRegionalResources": {
wantedResource: stack.AppRegionalResources{
KMSKeyARN: "arn:aws:kms:us-west-2:01234567890:key/0000",
S3Bucket: "tests3-bucket-us-west-2",
Region: "us-east-9",
RepositoryURLs: map[string]string{},
},
createRegionalMockClient: func(ctrl *gomock.Controller) cfnClient {
m := mocks.NewMockcfnClient(ctrl)
m.EXPECT().Describe("cross-region-stack").Return(mockValidAppResourceStack(), nil)
return m
},
mockStackSet: func(t *testing.T, ctrl *gomock.Controller) stackSetClient {
m := mocks.NewMockstackSetClient(ctrl)
m.EXPECT().InstanceSummaries(gomock.Any(), gomock.Any()).
Return([]stackset.InstanceSummary{
{
StackID: "cross-region-stack",
Region: "us-east-9",
},
}, nil).
Do(func(_ string, opt stackset.InstanceSummariesOption) {
wanted := &awscfn.ListStackInstancesInput{
StackInstanceAccount: aws.String("12345"),
}
actual := &awscfn.ListStackInstancesInput{}
opt(actual)
require.Equal(t, wanted, actual)
})
return m
},
},
"should propagate describe errors": {
want: fmt.Errorf("describing application resources: getting outputs for stack cross-region-stack in region us-east-9: error calling cloudformation"),
createRegionalMockClient: func(ctrl *gomock.Controller) cfnClient {
m := mocks.NewMockcfnClient(ctrl)
m.EXPECT().Describe("cross-region-stack").Return(nil, errors.New("error calling cloudformation"))
return m
},
mockStackSet: func(t *testing.T, ctrl *gomock.Controller) stackSetClient {
m := mocks.NewMockstackSetClient(ctrl)
m.EXPECT().InstanceSummaries(gomock.Any(), gomock.Any()).Return([]stackset.InstanceSummary{
{
StackID: "cross-region-stack",
Region: "us-east-9",
},
}, nil)
return m
},
},
"should propagate list stack instances errors": {
want: fmt.Errorf("describing application resources: error"),
mockStackSet: func(t *testing.T, ctrl *gomock.Controller) stackSetClient {
m := mocks.NewMockstackSetClient(ctrl)
m.EXPECT().InstanceSummaries(gomock.Any(), gomock.Any()).Return(nil, errors.New("error"))
return m
},
},
}
for name, tc := range testCases {
t.Run(name, func(t *testing.T) {
// GIVEN
ctrl := gomock.NewController(t)
defer ctrl.Finish()
cf := CloudFormation{
regionalClient: func(region string) cfnClient {
return tc.createRegionalMockClient(ctrl)
},
appStackSet: tc.mockStackSet(t, ctrl),
}
// WHEN
got, err := cf.GetRegionalAppResources(&mockApp)
// THEN
if tc.want != nil {
require.Error(t, err)
require.EqualError(t, err, tc.want.Error())
} else {
require.True(t, len(got) == 1, "Expected only one resource")
// Assert that the application resources are the same.
require.Equal(t, tc.wantedResource, *got[0])
}
})
}
}
func TestCloudFormation_GetAppResourcesByRegion(t *testing.T) {
mockApp := config.Application{Name: "app", AccountID: "12345"}
testCases := map[string]struct {
createRegionalMockClient func(ctrl *gomock.Controller) cfnClient
mockStackSet func(t *testing.T, ctrl *gomock.Controller) stackSetClient
wantedResource stack.AppRegionalResources
region string
want error
}{
"should describe stack instances and convert to AppRegionalResources": {
wantedResource: stack.AppRegionalResources{
KMSKeyARN: "arn:aws:kms:us-west-2:01234567890:key/0000",
S3Bucket: "tests3-bucket-us-west-2",
Region: "us-east-9",
RepositoryURLs: map[string]string{},
},
region: "us-east-9",
createRegionalMockClient: func(ctrl *gomock.Controller) cfnClient {
m := mocks.NewMockcfnClient(ctrl)
m.EXPECT().Describe("cross-region-stack").Return(mockValidAppResourceStack(), nil)
return m
},
mockStackSet: func(t *testing.T, ctrl *gomock.Controller) stackSetClient {
m := mocks.NewMockstackSetClient(ctrl)
m.EXPECT().InstanceSummaries(gomock.Any(), gomock.Any(), gomock.Any()).
Return([]stackset.InstanceSummary{
{
StackID: "cross-region-stack",
Region: "us-east-9",
},
}, nil).
Do(func(_ string, opts ...stackset.InstanceSummariesOption) {
wanted := &awscfn.ListStackInstancesInput{
StackInstanceAccount: aws.String("12345"),
StackInstanceRegion: aws.String("us-east-9"),
}
actual := &awscfn.ListStackInstancesInput{}
optAcc, optRegion := opts[0], opts[1]
optAcc(actual)
optRegion(actual)
require.Equal(t, wanted, actual)
})
return m
},
},
"should error when resources are found": {
want: fmt.Errorf("no regional resources for application app in region us-east-9 found"),
region: "us-east-9",
mockStackSet: func(t *testing.T, ctrl *gomock.Controller) stackSetClient {
m := mocks.NewMockstackSetClient(ctrl)
m.EXPECT().InstanceSummaries(gomock.Any(), gomock.Any(), gomock.Any()).Return([]stackset.InstanceSummary{}, nil)
return m
},
},
}
for name, tc := range testCases {
t.Run(name, func(t *testing.T) {
// GIVEN
ctrl := gomock.NewController(t)
defer ctrl.Finish()
cf := CloudFormation{
regionalClient: func(region string) cfnClient {
return tc.createRegionalMockClient(ctrl)
},
appStackSet: tc.mockStackSet(t, ctrl),
}
// WHEN
got, err := cf.GetAppResourcesByRegion(&mockApp, tc.region)
// THEN
if tc.want != nil {
require.Error(t, err)
require.EqualError(t, err, tc.want.Error())
} else {
require.NotNil(t, got)
// Assert that the application resources are the same.
require.Equal(t, tc.wantedResource, *got)
}
})
}
}
func TestCloudFormation_DelegateDNSPermissions(t *testing.T) {
testCases := map[string]struct {
app *config.Application
accountID string
createMock func(ctrl *gomock.Controller) cfnClient
want error
}{
"Calls Update Stack": {
app: &config.Application{
AccountID: "1234",
Name: "app",
Domain: "amazon.com",
},
createMock: func(ctrl *gomock.Controller) cfnClient {
m := mocks.NewMockcfnClient(ctrl)
m.EXPECT().Describe(gomock.Any()).Return(mockAppRolesStack("stackname", map[string]string{
"AppDNSDelegatedAccounts": "1234",
}), nil)
m.EXPECT().UpdateAndWait(gomock.Any()).Return(nil)
return m
},
},
"Returns error from Describe Stack": {
app: &config.Application{
AccountID: "1234",
Name: "app",
Domain: "amazon.com",
},
want: fmt.Errorf("getting existing application infrastructure stack: error"),
createMock: func(ctrl *gomock.Controller) cfnClient {
m := mocks.NewMockcfnClient(ctrl)
m.EXPECT().Describe(gomock.Any()).Return(nil, errors.New("error"))
return m
},
},
"Returns nil if there are no changeset updates from deployChangeSet": {
app: &config.Application{
AccountID: "1234",
Name: "app",
Domain: "amazon.com",
},
want: nil,
createMock: func(ctrl *gomock.Controller) cfnClient {
m := mocks.NewMockcfnClient(ctrl)
m.EXPECT().Describe(gomock.Any()).Return(mockAppRolesStack("stackname", map[string]string{
"AppDNSDelegatedAccounts": "1234",
}), nil)
m.EXPECT().UpdateAndWait(gomock.Any()).Return(&cloudformation.ErrChangeSetEmpty{})
return m
},
},
"Returns error from Update Stack": {
app: &config.Application{
AccountID: "1234",
Name: "app",
Domain: "amazon.com",
},
want: fmt.Errorf("updating application to allow DNS delegation: error"),
createMock: func(ctrl *gomock.Controller) cfnClient {
m := mocks.NewMockcfnClient(ctrl)
m.EXPECT().Describe(gomock.Any()).Return(mockAppRolesStack("stackname", map[string]string{
"AppDNSDelegatedAccounts": "1234",
}), nil)
m.EXPECT().UpdateAndWait(gomock.Any()).Return(errors.New("error"))
return m
},
},
}
for name, tc := range testCases {
t.Run(name, func(t *testing.T) {
// GIVEN
ctrl := gomock.NewController(t)
defer ctrl.Finish()
cf := CloudFormation{
cfnClient: tc.createMock(ctrl),
}
// WHEN
got := cf.DelegateDNSPermissions(tc.app, tc.accountID)
// THEN
if tc.want != nil {
require.EqualError(t, tc.want, got.Error())
} else {
require.NoError(t, got)
}
})
}
}
func mockValidAppResourceStack() *cloudformation.StackDescription {
return mockAppResourceStack("stack", map[string]string{
"KMSKeyARN": "arn:aws:kms:us-west-2:01234567890:key/0000",
"PipelineBucket": "tests3-bucket-us-west-2",
})
}
func mockAppResourceStack(stackArn string, outputs map[string]string) *cloudformation.StackDescription {
outputList := []*awscfn.Output{}
for key, val := range outputs {
outputList = append(outputList, &awscfn.Output{
OutputKey: aws.String(key),
OutputValue: aws.String(val),
})
}
return &cloudformation.StackDescription{
StackId: aws.String(stackArn),
Outputs: outputList,
}
}
func mockAppRolesStack(stackArn string, parameters map[string]string) *cloudformation.StackDescription {
parametersList := []*awscfn.Parameter{}
for key, val := range parameters {
parametersList = append(parametersList, &awscfn.Parameter{
ParameterKey: aws.String(key),
ParameterValue: aws.String(val),
})
}
return &cloudformation.StackDescription{
StackId: aws.String(stackArn),
StackStatus: aws.String("UPDATE_COMPLETE"),
Parameters: parametersList,
}
}
func TestCloudFormation_DeleteApp(t *testing.T) {
tests := map[string]struct {
appName string
createMock func(ctrl *gomock.Controller) cfnClient
mockStackSet func(ctrl *gomock.Controller) stackSetClient
want error
}{
"should delete stackset and then infrastructure roles": {
appName: "testApp",
createMock: func(ctrl *gomock.Controller) cfnClient {
m := mocks.NewMockcfnClient(ctrl)
m.EXPECT().TemplateBody("testApp-infrastructure-roles").Return("", nil)
m.EXPECT().Describe(gomock.Any()).Return(&cloudformation.StackDescription{
StackId: aws.String("some stack"),
}, nil)
m.EXPECT().DeleteAndWait("testApp-infrastructure-roles").Return(&cloudformation.ErrStackNotFound{})
m.EXPECT().DescribeStackEvents(gomock.Any()).Return(&awscfn.DescribeStackEventsOutput{}, nil).AnyTimes()
return m
},
mockStackSet: func(ctrl *gomock.Controller) stackSetClient {
m := mocks.NewMockstackSetClient(ctrl)
m.EXPECT().DeleteAllInstances("testApp-infrastructure").Return("1", nil)
m.EXPECT().WaitForOperation("testApp-infrastructure", "1").Return(nil)
m.EXPECT().Delete("testApp-infrastructure").Return(nil)
return m
},
},
"should skip waiting for delete instance operation if the stack set is already deleted": {
appName: "testApp",
createMock: func(ctrl *gomock.Controller) cfnClient {
m := mocks.NewMockcfnClient(ctrl)
m.EXPECT().TemplateBody(gomock.Any()).Return("", nil)
m.EXPECT().Describe(gomock.Any()).Return(&cloudformation.StackDescription{
StackId: aws.String("some stack"),
}, nil)
m.EXPECT().DeleteAndWait(gomock.Any()).Return(&cloudformation.ErrStackNotFound{})
m.EXPECT().DescribeStackEvents(gomock.Any()).Return(&awscfn.DescribeStackEventsOutput{}, nil).AnyTimes()
return m
},
mockStackSet: func(ctrl *gomock.Controller) stackSetClient {
m := mocks.NewMockstackSetClient(ctrl)
m.EXPECT().DeleteAllInstances(gomock.Any()).Return("", &stackset.ErrStackSetNotFound{})
m.EXPECT().Delete(gomock.Any()).Return(nil)
return m
},
},
}
for name, tc := range tests {
t.Run(name, func(t *testing.T) {
// GIVEN
ctrl := gomock.NewController(t)
defer ctrl.Finish()
cf := CloudFormation{
cfnClient: tc.createMock(ctrl),
appStackSet: tc.mockStackSet(ctrl),
console: new(discardFile),
}
// WHEN
got := cf.DeleteApp(tc.appName)
// THEN
require.Equal(t, tc.want, got)
})
}
}
func TestCloudFormation_RenderStackSet(t *testing.T) {
testDate := time.Date(2020, time.November, 23, 18, 0, 0, 0, time.UTC)
testCases := map[string]struct {
in renderStackSetInput
mock func(t *testing.T, ctrl *gomock.Controller) CloudFormation
wantedErr error
}{
"should return the error if a stack set operation cannot be created": {
in: renderStackSetInput{
hasInstanceUpdates: true,
createOpFn: func() (string, error) {
return "", errors.New("some error")
},
now: func() time.Time {
return testDate
},
},
mock: func(t *testing.T, ctrl *gomock.Controller) CloudFormation {
return CloudFormation{}
},
wantedErr: errors.New("some error"),
},
"should return a wrapped error if stack set instance streamers cannot be retrieved": {
in: renderStackSetInput{
name: "demo-infra",
hasInstanceUpdates: true,
createOpFn: func() (string, error) {
return "1", nil
},
now: func() time.Time {
return testDate
},
},
mock: func(t *testing.T, ctrl *gomock.Controller) CloudFormation {
m := mocks.NewMockstackSetClient(ctrl)
m.EXPECT().InstanceSummaries(gomock.Any(), gomock.Any()).Return(nil, errors.New("some error"))
return CloudFormation{
appStackSet: m,
}
},
wantedErr: errors.New(`retrieve stack instance streamers`),
},
"cancel all goroutines if a streamer fails": {
in: renderStackSetInput{
name: "demo-infra",
hasInstanceUpdates: true,
createOpFn: func() (string, error) {
return "1", nil
},
now: func() time.Time {
return testDate
},
},
mock: func(t *testing.T, ctrl *gomock.Controller) CloudFormation {
mockStackSet := mocks.NewMockstackSetClient(ctrl)
mockStackSet.EXPECT().InstanceSummaries(gomock.Any(), gomock.Any()).Return([]stackset.InstanceSummary{
{
StackID: "stackset-instance-demo-infra",
Account: "1111",
Region: "us-west-2",
Status: "RUNNING",
},
}, nil)
mockStackSet.EXPECT().DescribeOperation(gomock.Any(), gomock.Any()).Return(stackset.Operation{
Status: "RUNNING",
}, nil).AnyTimes()
mockStack := mocks.NewMockcfnClient(ctrl)
mockStack.EXPECT().DescribeStackEvents(gomock.Any()).
Return(nil, errors.New("some error")).AnyTimes()
return CloudFormation{
appStackSet: mockStackSet,
cfnClient: mockStack,
regionalClient: func(_ string) cfnClient {
return mockStack
},
console: mockFileWriter{
Writer: new(strings.Builder),
},
}
},
wantedErr: errors.New(`render progress of stack set "demo-infra"`),
},
}
for name, tc := range testCases {
t.Run(name, func(t *testing.T) {
// GIVEN
ctrl := gomock.NewController(t)
defer ctrl.Finish()
client := tc.mock(t, ctrl)
// WHEN
err := client.renderStackSetImpl(tc.in)
// THEN
if tc.wantedErr != nil {
require.ErrorContains(t, err, tc.wantedErr.Error())
} else {
require.NoError(t, err)
}
})
}
}
| 1,207 |
copilot-cli | aws | Go | // Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
// SPDX-License-Identifier: Apache-2.0
// Package cloudformation provides functionality to deploy CLI concepts with AWS CloudFormation.
package cloudformation
import (
"context"
"errors"
"fmt"
"io"
"os"
"strings"
"time"
"github.com/aws/aws-sdk-go/aws"
"github.com/aws/aws-sdk-go/aws/session"
sdkcloudformation "github.com/aws/aws-sdk-go/service/cloudformation"
"github.com/aws/copilot-cli/internal/pkg/aws/cloudformation"
"github.com/aws/copilot-cli/internal/pkg/aws/cloudformation/stackset"
"github.com/aws/copilot-cli/internal/pkg/aws/cloudwatch"
"github.com/aws/copilot-cli/internal/pkg/aws/codepipeline"
"github.com/aws/copilot-cli/internal/pkg/aws/codestar"
"github.com/aws/copilot-cli/internal/pkg/aws/ecs"
"github.com/aws/copilot-cli/internal/pkg/aws/s3"
"github.com/aws/copilot-cli/internal/pkg/deploy"
"github.com/aws/copilot-cli/internal/pkg/stream"
"github.com/aws/copilot-cli/internal/pkg/term/color"
"github.com/aws/copilot-cli/internal/pkg/term/log"
"github.com/aws/copilot-cli/internal/pkg/term/progress"
"golang.org/x/sync/errgroup"
)
const (
// waitForStackTimeout is how long we're willing to wait for a stack to go from in progress to a complete state.
waitForStackTimeout = 1*time.Hour + 30*time.Minute
// CloudFormation resource types.
ecsServiceResourceType = "AWS::ECS::Service"
envControllerResourceType = "Custom::EnvControllerFunction"
)
// CloudFormation's error types to compare against.
var (
errNotFound *cloudformation.ErrStackNotFound
)
// StackConfiguration represents the set of methods needed to deploy a cloudformation stack.
type StackConfiguration interface {
StackName() string
Template() (string, error)
Parameters() ([]*sdkcloudformation.Parameter, error)
Tags() []*sdkcloudformation.Tag
SerializedParameters() (string, error)
}
// An Overrider transforms the content in body to out.
type Overrider interface {
Override(body []byte) (out []byte, err error)
}
// overridableStack is a StackConfiguration with overrides applied.
type overridableStack struct {
StackConfiguration
overrider Overrider
}
// Template returns the overriden CloudFormation stack template.
func (s *overridableStack) Template() (string, error) {
tpl, err := s.StackConfiguration.Template()
if err != nil {
return "", fmt.Errorf("generate stack template: %w", err)
}
out, err := s.overrider.Override([]byte(tpl))
if err != nil {
return "", fmt.Errorf("override template: %w", err)
}
return string(out), nil
}
// WrapWithTemplateOverrider returns a wrapped stack, such that Template calls returns an overriden stack template.
func WrapWithTemplateOverrider(stack StackConfiguration, overrider Overrider) StackConfiguration {
return &overridableStack{
StackConfiguration: stack,
overrider: overrider,
}
}
type ecsClient interface {
stream.ECSServiceDescriber
}
type cwClient interface {
stream.CloudWatchDescriber
}
type cfnClient interface {
// Methods augmented by the aws wrapper struct.
Create(*cloudformation.Stack) (string, error)
CreateAndWait(*cloudformation.Stack) error
WaitForCreate(ctx context.Context, stackName string) error
Update(*cloudformation.Stack) (string, error)
UpdateAndWait(*cloudformation.Stack) error
WaitForUpdate(ctx context.Context, stackName string) error
Delete(stackName string) error
DeleteAndWait(stackName string) error
DeleteAndWaitWithRoleARN(stackName, roleARN string) error
Describe(stackName string) (*cloudformation.StackDescription, error)
DescribeChangeSet(changeSetID, stackName string) (*cloudformation.ChangeSetDescription, error)
TemplateBody(stackName string) (string, error)
TemplateBodyFromChangeSet(changeSetID, stackName string) (string, error)
Events(stackName string) ([]cloudformation.StackEvent, error)
ListStacksWithTags(tags map[string]string) ([]cloudformation.StackDescription, error)
ErrorEvents(stackName string) ([]cloudformation.StackEvent, error)
Outputs(stack *cloudformation.Stack) (map[string]string, error)
StackResources(name string) ([]*cloudformation.StackResource, error)
Metadata(opts cloudformation.MetadataOpts) (string, error)
// Methods vended by the aws sdk struct.
DescribeStackEvents(*sdkcloudformation.DescribeStackEventsInput) (*sdkcloudformation.DescribeStackEventsOutput, error)
}
type codeStarClient interface {
WaitUntilConnectionStatusAvailable(ctx context.Context, connectionARN string) error
}
type codePipelineClient interface {
RetryStageExecution(pipelineName, stageName string) error
}
type s3Client interface {
Upload(bucket, fileName string, data io.Reader) (string, error)
}
type stackSetClient interface {
Create(name, template string, opts ...stackset.CreateOrUpdateOption) error
CreateInstances(name string, accounts, regions []string) (string, error)
CreateInstancesAndWait(name string, accounts, regions []string) error
Update(name, template string, opts ...stackset.CreateOrUpdateOption) (string, error)
UpdateAndWait(name, template string, opts ...stackset.CreateOrUpdateOption) error
Describe(name string) (stackset.Description, error)
DescribeOperation(name, opID string) (stackset.Operation, error)
InstanceSummaries(name string, opts ...stackset.InstanceSummariesOption) ([]stackset.InstanceSummary, error)
DeleteAllInstances(name string) (string, error)
Delete(name string) error
WaitForStackSetLastOperationComplete(name string) error
WaitForOperation(name, opID string) error
}
// OptFn represents an optional configuration function for the CloudFormation client.
type OptFn func(cfn *CloudFormation)
// WithProgressTracker updates the CloudFormation client to write stack updates to a file.
func WithProgressTracker(fw progress.FileWriter) OptFn {
return func(cfn *CloudFormation) {
cfn.console = fw
}
}
// discardFile represents a fake file where all Writes succeeds and are not written anywhere.
type discardFile struct{}
// Write implements the io.Writer interface and discards p.
func (f *discardFile) Write(p []byte) (n int, err error) { return io.Discard.Write(p) }
// Fd returns stderr as the file descriptor.
// The file descriptor value shouldn't matter as long as it's a valid value as all writes are gone to io.Discard.
func (f *discardFile) Fd() uintptr {
return os.Stderr.Fd()
}
// CloudFormation wraps the CloudFormationAPI interface
type CloudFormation struct {
cfnClient cfnClient
codeStarClient codeStarClient
cpClient codePipelineClient
ecsClient ecsClient
cwClient cwClient
regionalClient func(region string) cfnClient
appStackSet stackSetClient
s3Client s3Client
region string
console progress.FileWriter
// cached variables.
cachedDeployedStack *cloudformation.StackDescription
// Overridden in tests.
renderStackSet func(input renderStackSetInput) error
}
// New returns a configured CloudFormation client.
func New(sess *session.Session, opts ...OptFn) CloudFormation {
client := CloudFormation{
cfnClient: cloudformation.New(sess),
codeStarClient: codestar.New(sess),
cpClient: codepipeline.New(sess),
ecsClient: ecs.New(sess),
cwClient: cloudwatch.New(sess),
regionalClient: func(region string) cfnClient {
return cloudformation.New(sess.Copy(&aws.Config{
Region: aws.String(region),
}))
},
appStackSet: stackset.New(sess),
s3Client: s3.New(sess),
region: aws.StringValue(sess.Config.Region),
console: new(discardFile),
}
for _, opt := range opts {
opt(&client)
}
client.renderStackSet = client.renderStackSetImpl
return client
}
// Template returns a deployed stack's template.
func (cf CloudFormation) Template(stackName string) (string, error) {
return cf.cfnClient.TemplateBody(stackName)
}
// IsEmptyErr returns true if the error occurred because the cloudformation resource does not exist or does not contain any sub-resources.
func IsEmptyErr(err error) bool {
type isEmpty interface {
IsEmpty() bool
}
var emptyErr isEmpty
return errors.As(err, &emptyErr)
}
// errorEvents returns the list of status reasons of failed resource events
func (cf CloudFormation) errorEvents(stackName string) ([]string, error) {
events, err := cf.cfnClient.ErrorEvents(stackName)
if err != nil {
return nil, err
}
var reasons []string
for _, event := range events {
// CFN error messages end with a '. (Service' and only the first sentence is useful, the rest is error codes.
reasons = append(reasons, strings.Split(aws.StringValue(event.ResourceStatusReason), ". (Service")[0])
}
return reasons, nil
}
type executeAndRenderChangeSetInput struct {
stackName string
stackDescription string
createChangeSet func() (string, error)
}
func (cf CloudFormation) newCreateChangeSetInput(w progress.FileWriter, stack *cloudformation.Stack) *executeAndRenderChangeSetInput {
in := &executeAndRenderChangeSetInput{
stackName: stack.Name,
stackDescription: fmt.Sprintf("Creating the infrastructure for stack %s", stack.Name),
}
in.createChangeSet = func() (string, error) {
spinner := progress.NewSpinner(w)
label := fmt.Sprintf("Proposing infrastructure changes for stack %s", stack.Name)
spinner.Start(label)
var errAlreadyExists *cloudformation.ErrStackAlreadyExists
changeSetID, err := cf.cfnClient.Create(stack)
if err != nil && !errors.As(err, &errAlreadyExists) {
spinner.Stop(log.Serrorf("%s\n", label))
return "", cf.handleStackError(stack.Name, err)
}
spinner.Stop(log.Ssuccessf("%s\n", label))
return changeSetID, err
}
return in
}
func (cf CloudFormation) newUpsertChangeSetInput(w progress.FileWriter, stack *cloudformation.Stack) *executeAndRenderChangeSetInput {
in := &executeAndRenderChangeSetInput{
stackName: stack.Name,
stackDescription: fmt.Sprintf("Creating the infrastructure for stack %s", stack.Name),
}
in.createChangeSet = func() (changeSetID string, err error) {
spinner := progress.NewSpinner(w)
label := fmt.Sprintf("Proposing infrastructure changes for stack %s", stack.Name)
spinner.Start(label)
changeSetID, err = cf.cfnClient.Create(stack)
if err == nil {
// Successfully created the change set to create the stack.
spinner.Stop(log.Ssuccessf("%s\n", label))
return changeSetID, nil
}
var errAlreadyExists *cloudformation.ErrStackAlreadyExists
if !errors.As(err, &errAlreadyExists) {
// Unexpected error trying to create a stack.
spinner.Stop(log.Serrorf("%s\n", label))
return "", cf.handleStackError(stack.Name, err)
}
// We have to create an update stack change set instead.
in.stackDescription = fmt.Sprintf("Updating the infrastructure for stack %s", stack.Name)
changeSetID, err = cf.cfnClient.Update(stack)
if err != nil {
msg := log.Serrorf("%s\n", label)
var errChangeSetEmpty *cloudformation.ErrChangeSetEmpty
if errors.As(err, &errChangeSetEmpty) {
msg = fmt.Sprintf("- No new infrastructure changes for stack %s\n", stack.Name)
}
spinner.Stop(msg)
return "", cf.handleStackError(stack.Name, err)
}
spinner.Stop(log.Ssuccessf("%s\n", label))
return changeSetID, nil
}
return in
}
func (cf CloudFormation) executeAndRenderChangeSet(in *executeAndRenderChangeSetInput) error {
changeSetID, err := in.createChangeSet()
if err != nil {
return err
}
if _, ok := cf.console.(*discardFile); ok { // If we don't have to render skip the additional network calls.
return nil
}
waitCtx, cancelWait := context.WithTimeout(context.Background(), waitForStackTimeout)
defer cancelWait()
g, ctx := errgroup.WithContext(waitCtx)
renderer, err := cf.createChangeSetRenderer(g, ctx, changeSetID, in.stackName, in.stackDescription, progress.RenderOptions{})
if err != nil {
return err
}
g.Go(func() error {
_, err := progress.Render(ctx, progress.NewTabbedFileWriter(cf.console), renderer)
return err
})
if err := g.Wait(); err != nil {
return err
}
if err := cf.errOnFailedStack(in.stackName); err != nil {
return err
}
return nil
}
func (cf CloudFormation) createChangeSetRenderer(group *errgroup.Group, ctx context.Context, changeSetID, stackName, description string, opts progress.RenderOptions) (progress.DynamicRenderer, error) {
changeSet, err := cf.cfnClient.DescribeChangeSet(changeSetID, stackName)
if err != nil {
return nil, err
}
body, err := cf.cfnClient.TemplateBodyFromChangeSet(changeSetID, stackName)
if err != nil {
return nil, err
}
descriptions, err := cloudformation.ParseTemplateDescriptions(body)
if err != nil {
return nil, fmt.Errorf("parse cloudformation template for resource descriptions: %w", err)
}
streamer := stream.NewStackStreamer(cf.cfnClient, stackName, changeSet.CreationTime)
children, err := cf.changeRenderers(changeRenderersInput{
g: group,
ctx: ctx,
stackName: stackName,
stackStreamer: streamer,
changes: changeSet.Changes,
changeSetTimestamp: changeSet.CreationTime,
descriptions: descriptions,
opts: progress.NestedRenderOptions(opts),
})
if err != nil {
return nil, err
}
renderer := progress.ListeningChangeSetRenderer(streamer, stackName, description, children, opts)
group.Go(func() error {
return stream.Stream(ctx, streamer)
})
return renderer, nil
}
type changeRenderersInput struct {
g *errgroup.Group // Group that all goroutines belong.
ctx context.Context // Context associated with the group.
stackName string // Name of the stack.
stackStreamer progress.StackSubscriber // Streamer for the stack where changes belong.
changes []*sdkcloudformation.Change // List of changes that will be applied to the stack.
changeSetTimestamp time.Time // ChangeSet creation time.
descriptions map[string]string // Descriptions for the logical IDs of the changes.
opts progress.RenderOptions // Display options that should be applied to the changes.
}
// changeRenderers filters changes by resources that have a description and returns the appropriate progress.Renderer for each resource type.
func (cf CloudFormation) changeRenderers(in changeRenderersInput) ([]progress.Renderer, error) {
var resources []progress.Renderer
for _, change := range in.changes {
logicalID := aws.StringValue(change.ResourceChange.LogicalResourceId)
description, ok := in.descriptions[logicalID]
if !ok {
continue
}
var renderer progress.Renderer
switch {
case aws.StringValue(change.ResourceChange.ResourceType) == envControllerResourceType:
r, err := cf.createEnvControllerRenderer(&envControllerRendererInput{
g: in.g,
ctx: in.ctx,
workloadStackName: in.stackName,
workloadTimestamp: in.changeSetTimestamp,
change: change,
description: description,
serviceStack: in.stackStreamer,
renderOpts: in.opts,
})
if err != nil {
return nil, err
}
renderer = r
case aws.StringValue(change.ResourceChange.ResourceType) == ecsServiceResourceType:
renderer = progress.ListeningECSServiceResourceRenderer(progress.ECSServiceRendererCfg{
Streamer: in.stackStreamer,
ECSClient: cf.ecsClient,
CWClient: cf.cwClient,
LogicalID: logicalID,
Description: description,
},
progress.ECSServiceRendererOpts{
Group: in.g,
Ctx: in.ctx,
RenderOpts: in.opts,
})
case change.ResourceChange.ChangeSetId != nil:
// The resource change is a nested stack.
changeSetID := aws.StringValue(change.ResourceChange.ChangeSetId)
stackName := parseStackNameFromARN(aws.StringValue(change.ResourceChange.PhysicalResourceId))
r, err := cf.createChangeSetRenderer(in.g, in.ctx, changeSetID, stackName, description, in.opts)
if err != nil {
return nil, err
}
renderer = r
default:
renderer = progress.ListeningResourceRenderer(in.stackStreamer, logicalID, description, progress.ResourceRendererOpts{
RenderOpts: in.opts,
})
}
resources = append(resources, renderer)
}
return resources, nil
}
type envControllerRendererInput struct {
g *errgroup.Group
ctx context.Context
workloadStackName string
workloadTimestamp time.Time
change *sdkcloudformation.Change
description string
serviceStack progress.StackSubscriber
renderOpts progress.RenderOptions
}
func (cf CloudFormation) createEnvControllerRenderer(in *envControllerRendererInput) (progress.DynamicRenderer, error) {
workload, err := cf.cfnClient.Describe(in.workloadStackName)
if err != nil {
return nil, err
}
envStackName := fmt.Sprintf("%s-%s", parseAppNameFromTags(workload.Tags), parseEnvNameFromTags(workload.Tags))
body, err := cf.cfnClient.TemplateBody(envStackName)
if err != nil {
return nil, err
}
envResourceDescriptions, err := cloudformation.ParseTemplateDescriptions(body)
if err != nil {
return nil, fmt.Errorf("parse cloudformation template for resource descriptions: %w", err)
}
envStreamer := stream.NewStackStreamer(cf.cfnClient, envStackName, in.workloadTimestamp)
ctx, cancel := context.WithCancel(in.ctx)
in.g.Go(func() error {
if err := stream.Stream(ctx, envStreamer); err != nil {
if errors.Is(err, context.Canceled) {
// The stack streamer was canceled on purposed, do not return an error.
// This occurs if we detect that the environment stack has no updates.
return nil
}
return err
}
return nil
})
return progress.ListeningEnvControllerRenderer(progress.EnvControllerConfig{
Description: in.description,
RenderOpts: in.renderOpts,
ActionStreamer: in.serviceStack,
ActionLogicalID: aws.StringValue(in.change.ResourceChange.LogicalResourceId),
EnvStreamer: envStreamer,
CancelEnvStream: cancel,
EnvStackName: envStackName,
EnvResources: envResourceDescriptions,
}), nil
}
type renderStackInput struct {
group *errgroup.Group // Group of go routines.
// Stack metadata.
stackName string // Name of the stack.
stackID string // ID of the stack.
description string // Descriptive text for the stack mutation.
descriptionFor map[string]string // Descriptive text for each resource in the stack.
startTime time.Time // Timestamp for when the stack mutation started.
}
func (cf CloudFormation) stackRenderer(ctx context.Context, in renderStackInput) progress.DynamicRenderer {
streamer := stream.NewStackStreamer(cf.cfnClient, in.stackID, in.startTime)
renderer := progress.ListeningStackRenderer(streamer, in.stackName, in.description, in.descriptionFor, progress.RenderOptions{})
in.group.Go(func() error {
return stream.Stream(ctx, streamer)
})
return renderer
}
func (cf CloudFormation) deleteAndRenderStack(name, description string, deleteFn func() error) error {
body, err := cf.cfnClient.TemplateBody(name)
if err != nil {
if !errors.As(err, &errNotFound) {
return fmt.Errorf("get template body of stack %q: %w", name, err)
}
return nil // stack already deleted.
}
descriptionFor, err := cloudformation.ParseTemplateDescriptions(body)
if err != nil {
return fmt.Errorf("parse resource descriptions in template of stack %q: %w", name, err)
}
stack, err := cf.cfnClient.Describe(name)
if err != nil {
if !errors.As(err, &errNotFound) {
return fmt.Errorf("retrieve the stack ID for stack %q: %w", name, err)
}
return nil // stack already deleted.
}
waitCtx, cancelWait := context.WithTimeout(context.Background(), waitForStackTimeout)
defer cancelWait()
g, ctx := errgroup.WithContext(waitCtx)
now := time.Now()
g.Go(deleteFn)
renderer := cf.stackRenderer(ctx, renderStackInput{
group: g,
stackID: aws.StringValue(stack.StackId),
stackName: name,
description: description,
descriptionFor: descriptionFor,
startTime: now,
})
g.Go(func() error {
w := progress.NewTabbedFileWriter(cf.console)
nl, err := progress.Render(ctx, w, renderer)
if err != nil {
return fmt.Errorf("render stack %q progress: %w", name, err)
}
_, err = progress.EraseAndRender(w, progress.LineRenderer(log.Ssuccess(description), 0), nl)
if err != nil {
return fmt.Errorf("erase and render stack %q progress: %w", name, err)
}
return nil
})
if err := g.Wait(); err != nil {
if !errors.As(err, &errNotFound) {
return err
}
}
return nil
}
type errFailedService struct {
stackName string
resourceType string
status string
}
func (e *errFailedService) RecommendActions() string {
if e.resourceType == "AWS::AppRunner::Service" {
return fmt.Sprintf("You may fix the error by updating the service code or the manifest configuration.\n"+
"You can then retry deploying your service by running %s.", color.HighlightCode("copilot svc deploy"))
}
return ""
}
func (e *errFailedService) Error() string {
return fmt.Sprintf("stack %s did not complete successfully and exited with status %s", e.stackName, e.status)
}
func (cf CloudFormation) errOnFailedStack(stackName string) error {
stack, err := cf.cfnClient.Describe(stackName)
if err != nil {
return err
}
status := aws.StringValue(stack.StackStatus)
if cloudformation.StackStatus(status).IsFailure() {
events, _ := cf.cfnClient.ErrorEvents(stackName)
var failedResourceType string
if len(events) > 0 {
failedResourceType = aws.StringValue(events[0].ResourceType)
}
return &errFailedService{
stackName: stackName,
resourceType: failedResourceType,
status: status,
}
}
return nil
}
func toStack(config StackConfiguration) (*cloudformation.Stack, error) {
template, err := config.Template()
if err != nil {
return nil, err
}
stack := cloudformation.NewStack(config.StackName(), template)
stack.Parameters, err = config.Parameters()
if err != nil {
return nil, err
}
stack.Tags = config.Tags()
return stack, nil
}
func toStackFromS3(config StackConfiguration, s3url string) (*cloudformation.Stack, error) {
stack := cloudformation.NewStackWithURL(config.StackName(), s3url)
var err error
stack.Parameters, err = config.Parameters()
if err != nil {
return nil, err
}
stack.Tags = config.Tags()
return stack, nil
}
func toMap(tags []*sdkcloudformation.Tag) map[string]string {
m := make(map[string]string)
for _, t := range tags {
m[aws.StringValue(t.Key)] = aws.StringValue(t.Value)
}
return m
}
// parseStackNameFromARN retrieves "my-nested-stack" from an input like:
// arn:aws:cloudformation:us-west-2:123456789012:stack/my-nested-stack/d0a825a0-e4cd-xmpl-b9fb-061c69e99205
func parseStackNameFromARN(stackARN string) string {
return strings.Split(stackARN, "/")[1]
}
func parseAppNameFromTags(tags []*sdkcloudformation.Tag) string {
for _, t := range tags {
if aws.StringValue(t.Key) == deploy.AppTagKey {
return aws.StringValue(t.Value)
}
}
return ""
}
func parseEnvNameFromTags(tags []*sdkcloudformation.Tag) string {
for _, t := range tags {
if aws.StringValue(t.Key) == deploy.EnvTagKey {
return aws.StringValue(t.Value)
}
}
return ""
}
func stopSpinner(spinner *progress.Spinner, err error, label string) {
if err == nil {
spinner.Stop(log.Ssuccessf("%s\n", label))
return
}
var existsErr *cloudformation.ErrStackAlreadyExists
if errors.As(err, &existsErr) {
spinner.Stop(log.Ssuccessf("%s\n", label))
return
}
spinner.Stop(log.Serrorf("%s\n", label))
}
| 680 |
copilot-cli | aws | Go | //go:build integration
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
// SPDX-License-Identifier: Apache-2.0
package cloudformation_test
import (
"fmt"
"io"
"math/rand"
"os"
"strconv"
"strings"
"testing"
"time"
"github.com/aws/aws-sdk-go/aws"
"github.com/aws/aws-sdk-go/aws/awserr"
"github.com/aws/aws-sdk-go/aws/session"
awsCF "github.com/aws/aws-sdk-go/service/cloudformation"
"github.com/aws/aws-sdk-go/service/s3"
"github.com/aws/aws-sdk-go/service/s3/s3manager"
"github.com/aws/copilot-cli/internal/pkg/aws/iam"
"github.com/aws/copilot-cli/internal/pkg/aws/identity"
awss3 "github.com/aws/copilot-cli/internal/pkg/aws/s3"
"github.com/aws/copilot-cli/internal/pkg/config"
"github.com/aws/copilot-cli/internal/pkg/deploy"
"github.com/aws/copilot-cli/internal/pkg/deploy/cloudformation"
"github.com/aws/copilot-cli/internal/pkg/deploy/cloudformation/stack"
"github.com/aws/copilot-cli/internal/pkg/deploy/upload/customresource"
"github.com/aws/copilot-cli/internal/pkg/manifest"
"github.com/aws/copilot-cli/internal/pkg/template"
"github.com/aws/copilot-cli/internal/pkg/version"
"github.com/stretchr/testify/require"
)
const (
fmtIAMRoleARN = "arn:aws:iam::%s:role/%s"
fmtCFNExecutionRoleID = "%s-%s-CFNExecutionRole"
fmtEnvManagerRoleID = "%s-%s-EnvManagerRole"
)
func init() {
rand.Seed(time.Now().UnixNano())
}
func Test_App_Infrastructure(t *testing.T) {
sess, err := testSession(nil)
require.NoError(t, err)
identity := identity.New(sess)
callerInfo, err := identity.Get()
require.NoError(t, err)
require.NoError(t, err)
deployer := cloudformation.New(sess, cloudformation.WithProgressTracker(os.Stderr))
cfClient := awsCF.New(sess)
require.NoError(t, err)
version.Version = "v1.28.0"
t.Run("Deploys Application Admin Roles to CloudFormation and Creates StackSet", func(t *testing.T) {
app := config.Application{Name: randStringBytes(10), AccountID: callerInfo.Account}
appRoleStackName := fmt.Sprintf("%s-infrastructure-roles", app.Name)
appStackSetName := fmt.Sprintf("%s-infrastructure", app.Name)
// Given our stack doesn't exist
roleStackOutput, err := cfClient.DescribeStacks(&awsCF.DescribeStacksInput{
StackName: aws.String(appRoleStackName),
})
require.Error(t, err)
require.True(t, len(roleStackOutput.Stacks) == 0, "Stack %s should not exist.", appRoleStackName)
// Make sure we delete the stacks after the test is done
defer func() {
cfClient.DeleteStack(&awsCF.DeleteStackInput{
StackName: aws.String(appRoleStackName),
})
cfClient.DeleteStackSet(&awsCF.DeleteStackSetInput{
StackSetName: aws.String(appStackSetName),
})
cfClient.WaitUntilStackDeleteComplete(&awsCF.DescribeStacksInput{
StackName: aws.String(appRoleStackName),
})
}()
err = deployer.DeployApp(&deploy.CreateAppInput{
Name: app.Name,
AccountID: app.AccountID,
Version: version.LatestTemplateVersion(),
})
require.NoError(t, err)
// Query using our resources as well:
resources, err := deployer.GetRegionalAppResources(&app)
require.NoError(t, err)
require.True(t, len(resources) == 0, "No resources for %s should exist.", appRoleStackName)
// We should create the application StackSet
_, err = cfClient.DescribeStackSet(&awsCF.DescribeStackSetInput{
StackSetName: aws.String(appStackSetName),
})
require.NoError(t, err)
// We should create the application roles stack
roleStackOutput, err = cfClient.DescribeStacks(&awsCF.DescribeStacksInput{
StackName: aws.String(appRoleStackName),
})
require.NoError(t, err)
require.True(t, len(roleStackOutput.Stacks) == 1, "Stack %s should have been deployed.", appRoleStackName)
deployedStack := roleStackOutput.Stacks[0]
expectedResultsForKey := map[string]func(*awsCF.Output){
"ExecutionRoleARN": func(output *awsCF.Output) {
require.True(t,
strings.HasSuffix(*output.OutputValue, fmt.Sprintf("role/%s-executionrole", app.Name)),
fmt.Sprintf("ExecutionRoleARN should be named {app}-executionrole but was %s", *output.OutputValue))
},
"AdministrationRoleARN": func(output *awsCF.Output) {
require.True(t,
strings.HasSuffix(*output.OutputValue, fmt.Sprintf("role/%s-adminrole", app.Name)),
fmt.Sprintf("AdministrationRoleARN should be named {app}-adminrole but was %s", *output.OutputValue))
},
"TemplateVersion": func(output *awsCF.Output) {
require.Equal(t, *output.OutputValue, version.LatestTemplateVersion(),
fmt.Sprintf("TemplateVersion should be %s but was %s", version.LatestTemplateVersion(), *output.OutputValue))
},
}
require.True(t, len(deployedStack.Outputs) == len(expectedResultsForKey),
"There should have been %d output values - instead there were %d. The value of the CF stack was %s",
len(expectedResultsForKey),
len(deployedStack.Outputs),
deployedStack.GoString(),
)
for _, output := range deployedStack.Outputs {
key := *output.OutputKey
validationFunction := expectedResultsForKey[key]
require.NotNil(t, validationFunction, "Unexpected output key %s in stack.", key)
validationFunction(output)
}
})
t.Run("Deploys Application Infrastructure (KMS Key, ECR Repo, S3 Bucket)", func(t *testing.T) {
app := config.Application{Name: randStringBytes(10), AccountID: callerInfo.Account}
appRoleStackName := fmt.Sprintf("%s-infrastructure-roles", app.Name)
appStackSetName := fmt.Sprintf("%s-infrastructure", app.Name)
// Make sure we delete the stacks after the test is done
defer func() {
// Clean up any StackInstances we may have created.
if stackInstances, err := cfClient.ListStackInstances(&awsCF.ListStackInstancesInput{
StackSetName: aws.String(appStackSetName),
}); err == nil && stackInstances.Summaries != nil && stackInstances.Summaries[0] != nil {
appStackInstance := stackInstances.Summaries[0]
cfClient.DeleteStackInstances(&awsCF.DeleteStackInstancesInput{
Accounts: []*string{appStackInstance.Account},
Regions: []*string{appStackInstance.Region},
RetainStacks: aws.Bool(false),
StackSetName: appStackInstance.StackSetId,
})
cfClient.WaitUntilStackDeleteComplete(&awsCF.DescribeStacksInput{
StackName: appStackInstance.StackId,
})
}
// Delete the StackSet once all the StackInstances are cleaned up
cfClient.DeleteStackSet(&awsCF.DeleteStackSetInput{
StackSetName: aws.String(appStackSetName),
})
cfClient.DeleteStack(&awsCF.DeleteStackInput{
StackName: aws.String(appRoleStackName),
})
}()
// Given our stack doesn't exist
roleStackOutput, err := cfClient.DescribeStacks(&awsCF.DescribeStacksInput{
StackName: aws.String(appRoleStackName),
})
require.Error(t, err)
require.True(t, len(roleStackOutput.Stacks) == 0, "Stack %s should not exist.", appRoleStackName)
err = deployer.DeployApp(&deploy.CreateAppInput{
Name: app.Name,
AccountID: app.AccountID,
Version: version.LatestTemplateVersion(),
})
require.NoError(t, err)
// Add a service only
err = deployer.AddServiceToApp(
&app,
"mysvc",
)
require.NoError(t, err)
// Add a service with dash
err = deployer.AddServiceToApp(
&app,
"mysvc-frontend",
)
require.NoError(t, err)
// No new substacks should be created
stackInstances, err := cfClient.ListStackInstances(&awsCF.ListStackInstancesInput{
StackSetName: aws.String(appStackSetName),
})
require.NoError(t, err)
require.Equal(t, 0, len(stackInstances.Summaries), "Adding apps to an application without any envs shouldn't create any stack instances.")
// Add an environment only
err = deployer.AddEnvToApp(
&cloudformation.AddEnvToAppOpts{
App: &app,
EnvName: "test",
EnvAccountID: callerInfo.Account,
EnvRegion: *sess.Config.Region,
},
)
require.NoError(t, err)
// Query using our GetRegionalAppResources function.
resources, err := deployer.GetRegionalAppResources(&app)
require.NoError(t, err)
require.True(t, len(resources) == 1, "One stack should exist.")
stackResources := resources[0]
require.True(t, len(stackResources.RepositoryURLs) == 2, "Two repos should exist")
require.True(t, stackResources.RepositoryURLs["mysvc-frontend"] != "", "Repo URL shouldn't be blank")
require.True(t, stackResources.RepositoryURLs["mysvc"] != "", "Repo URL shouldn't be blank")
require.True(t, stackResources.S3Bucket != "", "S3 Bucket shouldn't be blank")
require.True(t, stackResources.KMSKeyARN != "", "KMSKey ARN shouldn't be blank")
// Validate resources by comparing physical output of the stacks.
stackInstances, err = cfClient.ListStackInstances(&awsCF.ListStackInstancesInput{
StackSetName: aws.String(appStackSetName),
})
require.NoError(t, err)
require.Equal(t, 1, len(stackInstances.Summaries), "Adding an env should create a new stack instance.")
appStackInstance := stackInstances.Summaries[0]
// We should create the application roles stack
appInfraStacks, err := cfClient.DescribeStacks(&awsCF.DescribeStacksInput{
StackName: appStackInstance.StackId,
})
require.NoError(t, err)
deployedStack := appInfraStacks.Stacks[0]
expectedResultsForKey := map[string]func(*awsCF.Output){
"KMSKeyARN": func(output *awsCF.Output) {
require.NotNil(t,
*output.OutputValue,
"KMSKeyARN should not be nil")
},
"PipelineBucket": func(output *awsCF.Output) {
require.NotNil(t,
*output.OutputValue,
"PipelineBucket should not be nil")
},
"TemplateVersion": func(output *awsCF.Output) {
require.Equal(t, *output.OutputValue, version.LatestTemplateVersion(),
fmt.Sprintf("TemplateVersion should be %s but was %s", version.LatestTemplateVersion(), *output.OutputValue))
},
"ECRRepomysvc": func(output *awsCF.Output) {
require.True(t,
strings.HasSuffix(*output.OutputValue, fmt.Sprintf("repository/%s/mysvc", app.Name)),
fmt.Sprintf("ECRRepomysvc should be suffixed with repository/{app}/mysvc but was %s", *output.OutputValue))
},
// We replace dashes with the word DASH for logical IDss
"ECRRepomysvcDASHfrontend": func(output *awsCF.Output) {
require.True(t,
strings.HasSuffix(*output.OutputValue, fmt.Sprintf("repository/%s/mysvc-frontend", app.Name)),
fmt.Sprintf("ECRRepomysvcDASHfrontend should be suffixed with repository/{app}/mysvc but was %s", *output.OutputValue))
},
"StackSetOpId": func(output *awsCF.Output) {
opID, err := strconv.Atoi(*output.OutputValue)
require.NoError(t, err)
require.GreaterOrEqual(t, opID, 1,
fmt.Sprintf("StackSetOpId should be > 1 but was %s", *output.OutputValue))
},
}
require.True(t, len(deployedStack.Outputs) == len(expectedResultsForKey),
"There should have been %d output values - instead there were %d. The value of the CF stack was %s",
len(expectedResultsForKey),
len(deployedStack.Outputs),
deployedStack.GoString(),
)
for _, output := range deployedStack.Outputs {
key := *output.OutputKey
validationFunction := expectedResultsForKey[key]
require.NotNil(t, validationFunction, "Unexpected output key %s in stack.", key)
validationFunction(output)
}
})
t.Run("Deploys supporting infrastructure for pipeline (KMS Key, S3 Bucket)", func(t *testing.T) {
app := config.Application{Name: randStringBytes(10), AccountID: callerInfo.Account}
appRoleStackName := fmt.Sprintf("%s-infrastructure-roles", app.Name)
appStackSetName := fmt.Sprintf("%s-infrastructure", app.Name)
// Make sure we delete the stacks after the test is done
defer func() {
// Clean up any StackInstances we may have created.
if stackInstances, err := cfClient.ListStackInstances(&awsCF.ListStackInstancesInput{
StackSetName: aws.String(appStackSetName),
}); err == nil && stackInstances.Summaries != nil && stackInstances.Summaries[0] != nil {
appStackInstance := stackInstances.Summaries[0]
cfClient.DeleteStackInstances(&awsCF.DeleteStackInstancesInput{
Accounts: []*string{appStackInstance.Account},
Regions: []*string{appStackInstance.Region},
RetainStacks: aws.Bool(false),
StackSetName: appStackInstance.StackSetId,
})
cfClient.WaitUntilStackDeleteComplete(&awsCF.DescribeStacksInput{
StackName: appStackInstance.StackId,
})
}
// Delete the StackSet once all the StackInstances are cleaned up
cfClient.DeleteStackSet(&awsCF.DeleteStackSetInput{
StackSetName: aws.String(appStackSetName),
})
cfClient.DeleteStack(&awsCF.DeleteStackInput{
StackName: aws.String(appRoleStackName),
})
}()
// Given our stack doesn't exist
_, err := cfClient.DescribeStacks(&awsCF.DescribeStacksInput{
StackName: aws.String(appRoleStackName),
})
require.Error(t, err, "DescribeStacks should return an error because the stack does not exist")
awsErr, ok := err.(awserr.Error)
require.True(t, ok, "the returned error should be an awserr")
require.Equal(t, awsErr.Code(), "ValidationError")
require.Contains(t, awsErr.Message(), "does not exist", "the returned error should indicate that the stack does not exist")
// create a stackset
err = deployer.DeployApp(&deploy.CreateAppInput{
Name: app.Name,
AccountID: app.AccountID,
Version: version.LatestTemplateVersion(),
})
require.NoError(t, err)
// Add resources needed to support a pipeline in a region
err = deployer.AddPipelineResourcesToApp(&app, *sess.Config.Region)
require.NoError(t, err)
// Add another pipeline to the same application and region. This should not create
// Additional stack instance
err = deployer.AddPipelineResourcesToApp(&app, *sess.Config.Region)
require.NoError(t, err)
stackInstances, err := cfClient.ListStackInstances(&awsCF.ListStackInstancesInput{
StackSetName: aws.String(appStackSetName),
})
require.NoError(t, err)
require.Equal(t, 1, len(stackInstances.Summaries), "Adding 2 pipelines to the same application should not create 2 stack instances")
// add an environment should not create new stack instance in the same region
err = deployer.AddEnvToApp(&cloudformation.AddEnvToAppOpts{
App: &app,
EnvName: "test",
EnvAccountID: callerInfo.Account,
EnvRegion: *sess.Config.Region,
})
require.NoError(t, err)
stackInstances, err = cfClient.ListStackInstances(&awsCF.ListStackInstancesInput{
StackSetName: aws.String(appStackSetName),
})
require.NoError(t, err)
require.Equal(t, 1, len(stackInstances.Summaries), "Adding 2 pipelines to the same application should not create 2 stack instances")
// Ensure the bucket and KMS key were created
resources, err := deployer.GetRegionalAppResources(&app)
require.NoError(t, err)
require.True(t, len(resources) == 1, "One stack should exist.")
stackResources := resources[0]
require.True(t, stackResources.S3Bucket != "", "S3 Bucket shouldn't be blank")
require.True(t, stackResources.KMSKeyARN != "", "KMSKey ARN shouldn't be blank")
})
}
// This test can take quite long as it spins up a CloudFormation stack
// and then waits for it to be deleted. If you find your CF stack
// is failing to be spun up because you've reached some limits, try
// switching your default region by running aws configure.
func Test_Environment_Deployment_Integration(t *testing.T) {
version.Version = "v1.28.0"
sess, err := testSession(nil)
require.NoError(t, err)
deployer := cloudformation.New(sess, cloudformation.WithProgressTracker(os.Stderr))
cfClient := awsCF.New(sess)
identity := identity.New(sess)
s3ManagerClient := s3manager.NewUploader(sess)
s3Client := awss3.New(sess)
iamClient := iam.New(sess)
id, err := identity.Get()
require.NoError(t, err)
envName := randStringBytes(10)
appName := randStringBytes(10)
bucketName := randStringBytes(10)
environmentToDeploy := stack.EnvConfig{
Name: envName,
App: deploy.AppInformation{
Name: appName,
AccountPrincipalARN: id.RootUserARN,
},
Version: version.LatestTemplateVersion(),
}
envStackName := fmt.Sprintf("%s-%s", environmentToDeploy.App.Name, environmentToDeploy.Name)
// Given our stack doesn't exist
output, err := cfClient.DescribeStacks(&awsCF.DescribeStacksInput{
StackName: aws.String(envStackName),
})
require.Error(t, err)
require.True(t, len(output.Stacks) == 0, "Stack %s should not exist.", envStackName)
// Create a temporary S3 bucket to store custom resource scripts.
_, err = s3ManagerClient.S3.CreateBucket(&s3.CreateBucketInput{
Bucket: aws.String(bucketName),
})
require.NoError(t, err)
// Make sure we delete the stack after the test is done.
defer func() {
_, err := cfClient.DeleteStack(&awsCF.DeleteStackInput{
StackName: aws.String(envStackName),
})
require.NoError(t, err)
err = deleteEnvRoles(appName, envName, id.Account, iamClient)
require.NoError(t, err)
err = s3Client.EmptyBucket(bucketName)
require.NoError(t, err)
_, err = s3ManagerClient.S3.DeleteBucket(&s3.DeleteBucketInput{
Bucket: aws.String(bucketName),
})
require.NoError(t, err)
}()
t.Run("Deploys bootstrap resources for the environment to CloudFormation", func(t *testing.T) {
bucketARN := fmt.Sprintf("arn:aws:s3:::%s", bucketName)
environmentToDeploy.ArtifactBucketKeyARN = "arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab"
environmentToDeploy.ArtifactBucketARN = bucketARN
// Deploy the environment and wait for it to be complete
require.NoError(t, deployer.CreateAndRenderEnvironment(stack.NewBootstrapEnvStackConfig(&environmentToDeploy), bucketARN))
// Ensure that the new stack exists
output, err := cfClient.DescribeStacks(&awsCF.DescribeStacksInput{
StackName: aws.String(envStackName),
})
require.NoError(t, err)
require.True(t, len(output.Stacks) == 1, "Stack %s should have been deployed.", envStackName)
deployedStack := output.Stacks[0]
expectedResultsForKey := map[string]func(*awsCF.Output){
"EnvironmentManagerRoleARN": func(output *awsCF.Output) {
require.Equal(t,
fmt.Sprintf("%s-EnvironmentManagerRoleARN", envStackName),
*output.ExportName,
"Should export EnvironmentManagerRole ARN")
require.True(t,
strings.HasSuffix(*output.OutputValue, fmt.Sprintf("role/%s-EnvManagerRole", envStackName)),
"EnvironmentManagerRole ARN value should not be nil.")
},
"CFNExecutionRoleARN": func(output *awsCF.Output) {
require.Equal(t,
fmt.Sprintf("%s-CFNExecutionRoleARN", envStackName),
*output.ExportName,
"Should export CRNExecutionRole ARN")
require.True(t,
strings.HasSuffix(*output.OutputValue, fmt.Sprintf("role/%s-CFNExecutionRole", envStackName)),
"CRNExecutionRole ARN value should not be nil.")
},
}
require.True(t, len(deployedStack.Outputs) == len(expectedResultsForKey),
"There should have been %d output values - instead there were %d. The value of the CF stack was %s",
len(expectedResultsForKey),
len(deployedStack.Outputs),
deployedStack.GoString(),
)
for _, output := range deployedStack.Outputs {
key := *output.OutputKey
validationFunction := expectedResultsForKey[key]
require.NotNil(t, validationFunction, "Unexpected output key %s in stack.", key)
validationFunction(output)
}
})
t.Run("Deploys an environment to CloudFormation", func(t *testing.T) {
crs, err := customresource.Env(template.New())
require.NoError(t, err)
urls, err := customresource.Upload(func(key string, dat io.Reader) (url string, err error) {
return s3Client.Upload(bucketName, key, dat)
}, crs)
require.NoError(t, err)
environmentToDeploy.CustomResourcesURLs = urls
environmentToDeploy.ArtifactBucketKeyARN = "arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab"
environmentToDeploy.ArtifactBucketARN = fmt.Sprintf("arn:aws:s3:::%s", bucketName)
environmentToDeploy.Mft = &manifest.Environment{
Workload: manifest.Workload{
Name: aws.String(envName),
Type: aws.String("Environment"),
},
}
// Deploy the environment and wait for it to be complete.
oldParams, err := deployer.DeployedEnvironmentParameters(environmentToDeploy.App.Name, environmentToDeploy.Name)
require.NoError(t, err)
lastForceUpdateID, err := deployer.ForceUpdateOutputID(environmentToDeploy.App.Name, environmentToDeploy.Name)
require.NoError(t, err)
conf, err := stack.NewEnvConfigFromExistingStack(&environmentToDeploy, lastForceUpdateID, oldParams)
require.NoError(t, err)
// Deploy the environment and wait for it to be complete.
require.NoError(t, deployer.UpdateAndRenderEnvironment(conf, environmentToDeploy.ArtifactBucketARN))
// Ensure that the updated stack still exists.
output, err := cfClient.DescribeStacks(&awsCF.DescribeStacksInput{
StackName: aws.String(envStackName),
})
require.NoError(t, err)
require.True(t, len(output.Stacks) == 1, "Stack %s should have been deployed.", envStackName)
deployedStack := output.Stacks[0]
expectedResultsForKey := map[string]func(*awsCF.Output){
"EnabledFeatures": func(output *awsCF.Output) {
require.Equal(t, ",,,,,", aws.StringValue(output.OutputValue), "no env features enabled by default")
},
"EnvironmentManagerRoleARN": func(output *awsCF.Output) {
require.Equal(t,
fmt.Sprintf("%s-EnvironmentManagerRoleARN", envStackName),
*output.ExportName,
"Should export EnvironmentManagerRole ARN")
require.True(t,
strings.HasSuffix(*output.OutputValue, fmt.Sprintf("role/%s-EnvManagerRole", envStackName)),
"EnvironmentManagerRole ARN value should not be nil.")
},
"CFNExecutionRoleARN": func(output *awsCF.Output) {
require.Equal(t,
fmt.Sprintf("%s-CFNExecutionRoleARN", envStackName),
*output.ExportName,
"Should export CRNExecutionRole ARN")
require.True(t,
strings.HasSuffix(*output.OutputValue, fmt.Sprintf("role/%s-CFNExecutionRole", envStackName)),
"CRNExecutionRole ARN value should not be nil.")
},
"ClusterId": func(output *awsCF.Output) {
require.Equal(t,
fmt.Sprintf("%s-ClusterId", envStackName),
*output.ExportName,
"Should export Cluster as stackname-ClusterId")
require.NotNil(t,
output.OutputValue,
"Cluster value should not be nil")
},
"PrivateSubnets": func(output *awsCF.Output) {
require.Equal(t,
fmt.Sprintf("%s-PrivateSubnets", envStackName),
*output.ExportName,
"Should PrivateSubnets as stackname-PrivateSubnets")
require.NotNil(t,
output.OutputValue,
"Private Subnet values should not be nil")
},
"VpcId": func(output *awsCF.Output) {
require.Equal(t,
fmt.Sprintf("%s-VpcId", envStackName),
*output.ExportName,
"Should export VpcId as stackname-VpcId")
require.NotNil(t,
output.OutputValue,
"VpcId value should not be nil")
},
"PublicSubnets": func(output *awsCF.Output) {
require.Equal(t,
fmt.Sprintf("%s-PublicSubnets", envStackName),
*output.ExportName,
"Should export PublicSubnets as stackname-PublicSubnets")
require.NotNil(t,
output.OutputValue,
"PublicSubnets value should not be nil")
},
"ServiceDiscoveryNamespaceID": func(output *awsCF.Output) {
require.Equal(t,
fmt.Sprintf("%s-ServiceDiscoveryNamespaceID", envStackName),
*output.ExportName,
"Should export ServiceDiscoveryNamespaceID as stackname-ServiceDiscoveryNamespaceID")
require.NotNil(t,
output.OutputValue,
"ServiceDiscoveryNamespaceID value should not be nil")
},
"InternetGatewayID": func(output *awsCF.Output) {
require.Equal(t,
fmt.Sprintf("%s-InternetGatewayID", envStackName),
*output.ExportName,
"Should export InternetGatewayID as stackname-InternetGatewayID")
require.NotNil(t,
output.OutputValue,
"InternetGatewayID value should not be nil")
},
"PublicRouteTableID": func(output *awsCF.Output) {
require.Equal(t,
fmt.Sprintf("%s-PublicRouteTableID", envStackName),
*output.ExportName,
"Should export PublicRouteTableID as stackname-PublicRouteTableID when creating environment with default VPC")
require.NotNil(t,
output.OutputValue,
"PublicRouteTableID value should not be nil")
},
"EnvironmentSecurityGroup": func(output *awsCF.Output) {
require.Equal(t,
fmt.Sprintf("%s-EnvironmentSecurityGroup", envStackName),
*output.ExportName,
"Should export EnvironmentSecurityGroup as stackname-EnvironmentSecurityGroup")
require.NotNil(t,
output.OutputValue,
"EnvironmentSecurityGroup value should not be nil")
},
"LastForceDeployID": func(output *awsCF.Output) {
require.Equal(t, lastForceUpdateID, aws.StringValue(output.OutputValue), "last force update id does not change by default")
},
}
require.True(t, len(deployedStack.Outputs) == len(expectedResultsForKey),
"There should have been %d output values - instead there were %d. The value of the CF stack was %s",
len(expectedResultsForKey),
len(deployedStack.Outputs),
deployedStack.GoString(),
)
for _, output := range deployedStack.Outputs {
key := *output.OutputKey
validationFunction := expectedResultsForKey[key]
require.NotNil(t, validationFunction, "Unexpected output key %s in stack.", key)
validationFunction(output)
}
})
}
const letterBytes = "abcdefghijklmnopqrstuvwxyz"
func testSession(region *string) (*session.Session, error) {
if region == nil {
return session.NewSessionWithOptions(session.Options{
SharedConfigState: session.SharedConfigEnable,
})
}
// override with the provided region
return session.NewSessionWithOptions(session.Options{
Config: aws.Config{
CredentialsChainVerboseErrors: aws.Bool(true),
Region: region,
},
SharedConfigState: session.SharedConfigEnable,
})
}
func randStringBytes(n int) string {
b := make([]byte, n)
for i := range b {
b[i] = letterBytes[rand.Intn(len(letterBytes))]
}
return string(b)
}
func deleteEnvRoles(app, env, accountNumber string, iam *iam.IAM) error {
cfnExecRoleID := fmt.Sprintf(fmtCFNExecutionRoleID, app, env)
envManagerRoleID := fmt.Sprintf(fmtEnvManagerRoleID, app, env)
cfnExecutionRoleARN := fmt.Sprintf(fmtIAMRoleARN, accountNumber, cfnExecRoleID)
envManagerRoleARN := fmt.Sprintf(fmtIAMRoleARN, accountNumber, envManagerRoleID)
err := iam.DeleteRole(cfnExecutionRoleARN)
if err != nil {
return err
}
err = iam.DeleteRole(envManagerRoleARN)
if err != nil {
return err
}
return nil
}
| 702 |
copilot-cli | aws | Go | // Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
// SPDX-License-Identifier: Apache-2.0
package cloudformation
import (
"errors"
"fmt"
"io"
"strings"
"testing"
"time"
"github.com/aws/copilot-cli/internal/pkg/aws/cloudformation/stackset"
"github.com/aws/copilot-cli/internal/pkg/deploy/cloudformation/stack"
"github.com/aws/aws-sdk-go/aws"
sdkcloudformation "github.com/aws/aws-sdk-go/service/cloudformation"
awsecs "github.com/aws/aws-sdk-go/service/ecs"
"github.com/aws/copilot-cli/internal/pkg/aws/cloudformation"
"github.com/aws/copilot-cli/internal/pkg/aws/ecs"
"github.com/aws/copilot-cli/internal/pkg/deploy/cloudformation/mocks"
"github.com/golang/mock/gomock"
"github.com/stretchr/testify/require"
)
type mockOverrider struct {
out []byte
err error
}
func (m *mockOverrider) Override(_ []byte) ([]byte, error) {
return m.out, m.err
}
func TestWrapWithTemplateOverrider(t *testing.T) {
t.Run("should return the overriden Template", func(t *testing.T) {
// GIVEN
var stack StackConfiguration = &mockStackConfig{template: "hello"}
ovrdr := &mockOverrider{out: []byte("bye")}
// WHEN
stack = WrapWithTemplateOverrider(stack, ovrdr)
tpl, err := stack.Template()
// THEN
require.NoError(t, err)
require.Equal(t, "bye", tpl)
})
t.Run("should return a wrapped error when Override call fails", func(t *testing.T) {
// GIVEN
var stack StackConfiguration = &mockStackConfig{template: "hello"}
ovrdr := &mockOverrider{err: errors.New("some error")}
// WHEN
stack = WrapWithTemplateOverrider(stack, ovrdr)
_, err := stack.Template()
// THEN
require.EqualError(t, err, "override template: some error")
})
}
func TestIsEmptyErr(t *testing.T) {
testCases := map[string]struct {
err error
wanted bool
}{
"should return true when the error is an ErrStackSetNotFound": {
err: &stackset.ErrStackSetNotFound{},
wanted: true,
},
"should return true when the error is an ErrStackSetInstancesNotFound": {
err: &stackset.ErrStackSetInstancesNotFound{},
wanted: true,
},
"should return false on any other error": {
err: errors.New("some error"),
},
}
for name, tc := range testCases {
t.Run(name, func(t *testing.T) {
require.Equal(t, tc.wanted, IsEmptyErr(tc.err))
})
}
}
type mockFileWriter struct {
io.Writer
}
func (m mockFileWriter) Fd() uintptr { return 0 }
func testDeployWorkload_OnPushToS3Failure(t *testing.T, when func(cf CloudFormation) error) {
// GIVEN
ctrl := gomock.NewController(t)
defer ctrl.Finish()
wantedErr := errors.New("some error")
mS3Client := mocks.NewMocks3Client(ctrl)
mS3Client.EXPECT().Upload("mockBucket", gomock.Any(), gomock.Any()).Return("", wantedErr)
buf := new(strings.Builder)
client := CloudFormation{
s3Client: mS3Client,
console: mockFileWriter{Writer: buf},
}
// WHEN
err := when(client)
// THEN
require.True(t, errors.Is(err, wantedErr), `expected returned error to be wrapped with "some error"`)
}
func testDeployWorkload_OnCreateChangeSetFailure(t *testing.T, when func(cf CloudFormation) error) {
// GIVEN
ctrl := gomock.NewController(t)
defer ctrl.Finish()
wantedErr := errors.New("some error")
mS3Client := mocks.NewMocks3Client(ctrl)
mS3Client.EXPECT().Upload(gomock.Any(), gomock.Any(), gomock.Any()).Return("", nil)
m := mocks.NewMockcfnClient(ctrl)
m.EXPECT().Create(gomock.Any()).Return("", wantedErr)
m.EXPECT().ErrorEvents(gomock.Any()).Return(nil, nil)
buf := new(strings.Builder)
client := CloudFormation{cfnClient: m, s3Client: mS3Client, console: mockFileWriter{Writer: buf}}
// WHEN
err := when(client)
// THEN
require.True(t, errors.Is(err, wantedErr), `expected returned error to be wrapped with "some error"`)
}
func testDeployWorkload_OnUpdateChangeSetFailure(t *testing.T, when func(cf CloudFormation) error) {
// GIVEN
ctrl := gomock.NewController(t)
defer ctrl.Finish()
wantedErr := errors.New("some error")
mS3Client := mocks.NewMocks3Client(ctrl)
mS3Client.EXPECT().Upload(gomock.Any(), gomock.Any(), gomock.Any()).Return("", nil)
m := mocks.NewMockcfnClient(ctrl)
m.EXPECT().Create(gomock.Any()).Return("", &cloudformation.ErrStackAlreadyExists{})
m.EXPECT().Update(gomock.Any()).Return("", wantedErr)
m.EXPECT().ErrorEvents(gomock.Any()).Return(nil, nil)
buf := new(strings.Builder)
client := CloudFormation{cfnClient: m, s3Client: mS3Client, console: mockFileWriter{Writer: buf}}
// WHEN
err := when(client)
// THEN
require.True(t, errors.Is(err, wantedErr), `expected returned error to be wrapped with "some error"`)
}
func testDeployWorkload_OnDescribeChangeSetFailure(t *testing.T, when func(cf CloudFormation) error) {
// GIVEN
ctrl := gomock.NewController(t)
defer ctrl.Finish()
mS3Client := mocks.NewMocks3Client(ctrl)
mS3Client.EXPECT().Upload(gomock.Any(), gomock.Any(), gomock.Any()).Return("", nil)
m := mocks.NewMockcfnClient(ctrl)
m.EXPECT().Create(gomock.Any()).Return("1234", nil)
m.EXPECT().DescribeChangeSet(gomock.Any(), gomock.Any()).Return(nil, errors.New("DescribeChangeSet error"))
buf := new(strings.Builder)
client := CloudFormation{cfnClient: m, s3Client: mS3Client, console: mockFileWriter{Writer: buf}}
// WHEN
err := when(client)
// THEN
require.EqualError(t, err, "DescribeChangeSet error")
}
func testDeployWorkload_OnTemplateBodyFailure(t *testing.T, when func(cf CloudFormation) error) {
// GIVEN
ctrl := gomock.NewController(t)
defer ctrl.Finish()
mS3Client := mocks.NewMocks3Client(ctrl)
mS3Client.EXPECT().Upload(gomock.Any(), gomock.Any(), gomock.Any()).Return("", nil)
m := mocks.NewMockcfnClient(ctrl)
m.EXPECT().Create(gomock.Any()).Return("1234", nil)
m.EXPECT().DescribeChangeSet(gomock.Any(), gomock.Any()).Return(&cloudformation.ChangeSetDescription{}, nil)
m.EXPECT().TemplateBodyFromChangeSet(gomock.Any(), gomock.Any()).Return("", errors.New("TemplateBody error"))
buf := new(strings.Builder)
client := CloudFormation{cfnClient: m, s3Client: mS3Client, console: mockFileWriter{Writer: buf}}
// WHEN
err := when(client)
// THEN
require.EqualError(t, err, "TemplateBody error")
}
func testDeployWorkload_StackStreamerFailureShouldCancelRenderer(t *testing.T, when func(cf CloudFormation) error) {
// GIVEN
ctrl := gomock.NewController(t)
defer ctrl.Finish()
wantedErr := errors.New("streamer error")
mS3Client := mocks.NewMocks3Client(ctrl)
mS3Client.EXPECT().Upload(gomock.Any(), gomock.Any(), gomock.Any()).Return("", nil)
m := mocks.NewMockcfnClient(ctrl)
m.EXPECT().Create(gomock.Any()).Return("1234", nil)
m.EXPECT().DescribeChangeSet(gomock.Any(), gomock.Any()).Return(&cloudformation.ChangeSetDescription{}, nil)
m.EXPECT().TemplateBodyFromChangeSet(gomock.Any(), gomock.Any()).Return("", nil)
m.EXPECT().DescribeStackEvents(gomock.Any()).Return(nil, wantedErr)
buf := new(strings.Builder)
client := CloudFormation{cfnClient: m, s3Client: mS3Client, console: mockFileWriter{Writer: buf}}
// WHEN
err := when(client)
// THEN
require.True(t, errors.Is(err, wantedErr), "expected streamer error to be wrapped and returned")
}
func testDeployWorkload_StreamUntilStackCreationFails(t *testing.T, stackName string, when func(cf CloudFormation) error) {
// GIVEN
ctrl := gomock.NewController(t)
defer ctrl.Finish()
mS3Client := mocks.NewMocks3Client(ctrl)
mS3Client.EXPECT().Upload(gomock.Any(), gomock.Any(), gomock.Any()).Return("", nil)
m := mocks.NewMockcfnClient(ctrl)
m.EXPECT().Create(gomock.Any()).Return("1234", nil)
m.EXPECT().DescribeChangeSet(gomock.Any(), gomock.Any()).Return(&cloudformation.ChangeSetDescription{}, nil)
m.EXPECT().TemplateBodyFromChangeSet(gomock.Any(), gomock.Any()).Return("", nil)
m.EXPECT().DescribeStackEvents(gomock.Any()).Return(&sdkcloudformation.DescribeStackEventsOutput{
StackEvents: []*sdkcloudformation.StackEvent{
{
EventId: aws.String("2"),
LogicalResourceId: aws.String(stackName),
PhysicalResourceId: aws.String("AWS::CloudFormation::Stack"),
ResourceStatus: aws.String("CREATE_FAILED"), // Send failure event for stack.
Timestamp: aws.Time(time.Now()),
},
},
}, nil).AnyTimes()
m.EXPECT().Describe(stackName).Return(&cloudformation.StackDescription{
StackStatus: aws.String("CREATE_FAILED"),
}, nil)
m.EXPECT().ErrorEvents(stackName).Return(
[]cloudformation.StackEvent{
{
EventId: aws.String("2"),
LogicalResourceId: aws.String(stackName),
PhysicalResourceId: aws.String("AWS::AppRunner::Service"),
ResourceStatus: aws.String("CREATE_FAILED"), // Send failure event for stack.
Timestamp: aws.Time(time.Now()),
},
}, nil)
buf := new(strings.Builder)
client := CloudFormation{cfnClient: m, s3Client: mS3Client, console: mockFileWriter{Writer: buf}}
// WHEN
err := when(client)
// THEN
require.EqualError(t, err, fmt.Sprintf("stack %s did not complete successfully and exited with status CREATE_FAILED", stackName))
}
func testDeployWorkload_RenderNewlyCreatedStackWithECSService(t *testing.T, stackName string, when func(cf CloudFormation) error) {
// GIVEN
ctrl := gomock.NewController(t)
defer ctrl.Finish()
mS3Client := mocks.NewMocks3Client(ctrl)
mS3Client.EXPECT().Upload("mockBucket", gomock.Any(), gomock.Any()).Return("mockURL", nil)
mockCFN := mocks.NewMockcfnClient(ctrl)
mockECS := mocks.NewMockecsClient(ctrl)
deploymentTime := time.Date(2020, time.November, 23, 18, 0, 0, 0, time.UTC)
mockCFN.EXPECT().Create(gomock.Any()).Return("1234", nil)
mockCFN.EXPECT().DescribeChangeSet("1234", stackName).Return(&cloudformation.ChangeSetDescription{
Changes: []*sdkcloudformation.Change{
{
ResourceChange: &sdkcloudformation.ResourceChange{
LogicalResourceId: aws.String("Service"),
ResourceType: aws.String("AWS::ECS::Service"),
},
},
},
}, nil)
mockCFN.EXPECT().TemplateBodyFromChangeSet("1234", stackName).Return(`
Resources:
Service:
Metadata:
'aws:copilot:description': 'My ECS Service'
Type: AWS::ECS::Service
`, nil)
mockCFN.EXPECT().DescribeStackEvents(&sdkcloudformation.DescribeStackEventsInput{
StackName: aws.String(stackName),
}).Return(&sdkcloudformation.DescribeStackEventsOutput{
StackEvents: []*sdkcloudformation.StackEvent{
{
EventId: aws.String("1"),
LogicalResourceId: aws.String("Service"),
PhysicalResourceId: aws.String("arn:aws:ecs:us-west-2:1111:service/cluster/service"),
ResourceType: aws.String("AWS::ECS::Service"),
ResourceStatus: aws.String("CREATE_IN_PROGRESS"),
Timestamp: aws.Time(deploymentTime),
},
{
EventId: aws.String("2"),
LogicalResourceId: aws.String("Service"),
PhysicalResourceId: aws.String("arn:aws:ecs:us-west-2:1111:service/cluster/service"),
ResourceType: aws.String("AWS::ECS::Service"),
ResourceStatus: aws.String("CREATE_COMPLETE"),
Timestamp: aws.Time(deploymentTime),
},
{
EventId: aws.String("3"),
LogicalResourceId: aws.String(stackName),
ResourceType: aws.String("AWS::CloudFormation::Stack"),
ResourceStatus: aws.String("CREATE_COMPLETE"),
Timestamp: aws.Time(deploymentTime),
},
},
}, nil).AnyTimes()
mockECS.EXPECT().Service("cluster", "service").Return(&ecs.Service{
Deployments: []*awsecs.Deployment{
{
RolloutState: aws.String("COMPLETED"),
Status: aws.String("PRIMARY"),
TaskDefinition: aws.String("arn:aws:ecs:us-west-2:1111:task-definition/hello:10"),
UpdatedAt: aws.Time(deploymentTime),
},
},
}, nil)
mockCFN.EXPECT().Describe(stackName).Return(&cloudformation.StackDescription{
StackStatus: aws.String("CREATE_COMPLETE"),
}, nil)
buf := new(strings.Builder)
client := CloudFormation{cfnClient: mockCFN, ecsClient: mockECS, s3Client: mS3Client, console: mockFileWriter{Writer: buf}}
// WHEN
err := when(client)
// THEN
require.NoError(t, err)
require.Contains(t, buf.String(), "My ECS Service", "resource should be rendered")
require.Contains(t, buf.String(), "PRIMARY", "Status of the service should be rendered")
require.Contains(t, buf.String(), "[completed]", "Rollout state of service should be rendered")
}
func testDeployWorkload_WithEnvControllerRenderer_NoStackUpdates(t *testing.T, svcStackName string, when func(cf CloudFormation) error) {
// GIVEN
ctrl := gomock.NewController(t)
defer ctrl.Finish()
mS3Client := mocks.NewMocks3Client(ctrl)
mS3Client.EXPECT().Upload("mockBucket", gomock.Any(), gomock.Any()).Return("mockURL", nil)
mockCFN := mocks.NewMockcfnClient(ctrl)
deploymentTime := time.Date(2020, time.November, 23, 18, 0, 0, 0, time.UTC)
mockCFN.EXPECT().Create(gomock.Any()).Return("1234", nil)
mockCFN.EXPECT().DescribeChangeSet("1234", svcStackName).Return(&cloudformation.ChangeSetDescription{
Changes: []*sdkcloudformation.Change{
{
ResourceChange: &sdkcloudformation.ResourceChange{
LogicalResourceId: aws.String("EnvControllerAction"),
ResourceType: aws.String("Custom::EnvControllerFunction"),
Action: aws.String(sdkcloudformation.ChangeActionAdd),
},
},
},
}, nil)
mockCFN.EXPECT().TemplateBodyFromChangeSet("1234", svcStackName).Return(`
Resources:
EnvControllerAction:
Metadata:
'aws:copilot:description': "Updating environment"
`, nil)
mockCFN.EXPECT().Describe(svcStackName).Return(&cloudformation.StackDescription{
Tags: []*sdkcloudformation.Tag{
{
Key: aws.String("copilot-application"),
Value: aws.String("my-app"),
},
{
Key: aws.String("copilot-environment"),
Value: aws.String("my-env"),
},
},
}, nil)
mockCFN.EXPECT().TemplateBody("my-app-my-env").Return(`
Resources:
PublicLoadBalancer:
Metadata:
'aws:copilot:description': "Updating ALB"
`, nil)
mockCFN.EXPECT().DescribeStackEvents(&sdkcloudformation.DescribeStackEventsInput{
StackName: aws.String(svcStackName),
}).Return(&sdkcloudformation.DescribeStackEventsOutput{
StackEvents: []*sdkcloudformation.StackEvent{
{
EventId: aws.String("1"),
LogicalResourceId: aws.String(svcStackName),
ResourceType: aws.String("AWS::CloudFormation::Stack"),
ResourceStatus: aws.String("CREATE_COMPLETE"),
Timestamp: aws.Time(deploymentTime),
},
},
}, nil).AnyTimes()
mockCFN.EXPECT().DescribeStackEvents(&sdkcloudformation.DescribeStackEventsInput{
StackName: aws.String("my-app-my-env"),
}).Return(&sdkcloudformation.DescribeStackEventsOutput{
StackEvents: []*sdkcloudformation.StackEvent{}, // No updates for the env stack.
}, nil).AnyTimes()
mockCFN.EXPECT().Describe(svcStackName).Return(&cloudformation.StackDescription{
StackStatus: aws.String("CREATE_COMPLETE"),
}, nil)
buf := new(strings.Builder)
client := CloudFormation{cfnClient: mockCFN, s3Client: mS3Client, console: mockFileWriter{Writer: buf}}
// WHEN
err := when(client)
// THEN
require.NoError(t, err)
require.Contains(t, buf.String(), "Updating environment", "env stack description is rendered")
}
func testDeployWorkload_RenderNewlyCreatedStackWithAddons(t *testing.T, stackName string, when func(cf CloudFormation) error) {
ctrl := gomock.NewController(t)
defer ctrl.Finish()
m := mocks.NewMockcfnClient(ctrl)
mS3Client := mocks.NewMocks3Client(ctrl)
mS3Client.EXPECT().Upload("mockBucket", "manual/templates/myapp-myenv-mysvc/5cde0f1298f41f7d1c8b907a36992a7a513225a2615bd6e307bf1a9149b06b40.yml", gomock.Any()).Return("mockURL", nil)
// Mocks for the parent stack.
m.EXPECT().Create(gomock.Any()).Return("1234", nil)
m.EXPECT().DescribeChangeSet("1234", stackName).Return(&cloudformation.ChangeSetDescription{
Changes: []*sdkcloudformation.Change{
{
ResourceChange: &sdkcloudformation.ResourceChange{
LogicalResourceId: aws.String("Cluster"),
PhysicalResourceId: aws.String("AWS::ECS::Cluster"),
},
},
{
ResourceChange: &sdkcloudformation.ResourceChange{
ChangeSetId: aws.String("5678"),
LogicalResourceId: aws.String("AddonsStack"),
PhysicalResourceId: aws.String("arn:aws:cloudformation:us-west-2:12345:stack/my-nested-stack/d0a825a0-e4cd-xmpl-b9fb-061c69e99205"),
},
},
},
}, nil)
m.EXPECT().TemplateBodyFromChangeSet("1234", stackName).Return(`
Resources:
Cluster:
Metadata:
'aws:copilot:description': 'An ECS cluster'
Type: AWS::ECS::Cluster
AddonsStack:
Metadata:
'aws:copilot:description': 'An Addons CloudFormation Stack for your additional AWS resources'
Type: AWS::CloudFormation::Stack
`, nil)
m.EXPECT().DescribeStackEvents(&sdkcloudformation.DescribeStackEventsInput{
StackName: aws.String(stackName),
}).Return(&sdkcloudformation.DescribeStackEventsOutput{
StackEvents: []*sdkcloudformation.StackEvent{
{
EventId: aws.String("1"),
LogicalResourceId: aws.String("Cluster"),
PhysicalResourceId: aws.String("AWS::ECS::Cluster"),
ResourceStatus: aws.String("CREATE_COMPLETE"),
Timestamp: aws.Time(time.Now()),
},
{
EventId: aws.String("2"),
LogicalResourceId: aws.String("AddonsStack"),
PhysicalResourceId: aws.String("AWS::CloudFormation::Stack"),
ResourceStatus: aws.String("CREATE_COMPLETE"),
Timestamp: aws.Time(time.Now()),
},
{
EventId: aws.String("3"),
LogicalResourceId: aws.String(stackName),
PhysicalResourceId: aws.String("AWS::CloudFormation::Stack"),
ResourceStatus: aws.String("CREATE_COMPLETE"),
Timestamp: aws.Time(time.Now()),
},
},
}, nil).AnyTimes()
m.EXPECT().Describe(stackName).Return(&cloudformation.StackDescription{
StackStatus: aws.String("CREATE_COMPLETE"),
}, nil)
// Mocks for the addons stack.
m.EXPECT().DescribeChangeSet("5678", "my-nested-stack").Return(&cloudformation.ChangeSetDescription{
Changes: []*sdkcloudformation.Change{
{
ResourceChange: &sdkcloudformation.ResourceChange{
LogicalResourceId: aws.String("MyTable"),
PhysicalResourceId: aws.String("AWS::DynamoDB::Table"),
},
},
},
}, nil)
m.EXPECT().TemplateBodyFromChangeSet("5678", "my-nested-stack").Return(`
Resources:
MyTable:
Metadata:
'aws:copilot:description': 'A DynamoDB table to store data'
Type: AWS::DynamoDB::Table`, nil)
m.EXPECT().DescribeStackEvents(&sdkcloudformation.DescribeStackEventsInput{
StackName: aws.String("my-nested-stack"),
}).Return(&sdkcloudformation.DescribeStackEventsOutput{
StackEvents: []*sdkcloudformation.StackEvent{
{
EventId: aws.String("1"),
LogicalResourceId: aws.String("MyTable"),
PhysicalResourceId: aws.String("AWS::DynamoDB::Table"),
ResourceStatus: aws.String("CREATE_COMPLETE"),
Timestamp: aws.Time(time.Now()),
},
{
EventId: aws.String("2"),
LogicalResourceId: aws.String("my-nested-stack"),
PhysicalResourceId: aws.String("AWS::CloudFormation::Stack"),
ResourceStatus: aws.String("CREATE_COMPLETE"),
Timestamp: aws.Time(time.Now()),
},
},
}, nil).AnyTimes()
buf := new(strings.Builder)
client := CloudFormation{cfnClient: m, s3Client: mS3Client, console: mockFileWriter{Writer: buf}}
// WHEN
err := when(client)
// THEN
require.NoError(t, err)
require.Contains(t, buf.String(), "An ECS cluster")
require.Contains(t, buf.String(), "An Addons CloudFormation Stack for your additional AWS resources")
require.Contains(t, buf.String(), "A DynamoDB table to store data")
}
func testDeployTask_OnCreateChangeSetFailure(t *testing.T, when func(cf CloudFormation) error) {
// GIVEN
ctrl := gomock.NewController(t)
defer ctrl.Finish()
wantedErr := errors.New("some error")
m := mocks.NewMockcfnClient(ctrl)
m.EXPECT().Create(gomock.Any()).Return("", wantedErr)
m.EXPECT().ErrorEvents(gomock.Any()).Return(nil, nil)
buf := new(strings.Builder)
client := CloudFormation{cfnClient: m, console: mockFileWriter{Writer: buf}}
// WHEN
err := when(client)
// THEN
require.True(t, errors.Is(err, wantedErr), `expected returned error to be wrapped with "some error"`)
}
func testDeployTask_ReturnNilOnEmptyChangeSetWhileUpdatingStack(t *testing.T, when func(cf CloudFormation) error) {
// GIVEN
ctrl := gomock.NewController(t)
defer ctrl.Finish()
wantedErr := &cloudformation.ErrChangeSetEmpty{}
m := mocks.NewMockcfnClient(ctrl)
m.EXPECT().Create(gomock.Any()).Return("", &cloudformation.ErrStackAlreadyExists{})
m.EXPECT().Update(gomock.Any()).Return("", wantedErr)
m.EXPECT().ErrorEvents(gomock.Any()).Return(nil, nil)
buf := new(strings.Builder)
client := CloudFormation{cfnClient: m, console: mockFileWriter{Writer: buf}}
// WHEN
err := when(client)
// THEN
require.Nil(t, err, "should not fail if the changeset is empty")
}
func testDeployTask_OnUpdateChangeSetFailure(t *testing.T, when func(cf CloudFormation) error) {
// GIVEN
ctrl := gomock.NewController(t)
defer ctrl.Finish()
wantedErr := errors.New("some error")
m := mocks.NewMockcfnClient(ctrl)
m.EXPECT().Create(gomock.Any()).Return("", &cloudformation.ErrStackAlreadyExists{})
m.EXPECT().Update(gomock.Any()).Return("", wantedErr)
m.EXPECT().ErrorEvents(gomock.Any()).Return(nil, nil)
buf := new(strings.Builder)
client := CloudFormation{cfnClient: m, console: mockFileWriter{Writer: buf}}
// WHEN
err := when(client)
// THEN
require.True(t, errors.Is(err, wantedErr), `expected returned error to be wrapped with "some error"`)
}
func testDeployTask_OnDescribeChangeSetFailure(t *testing.T, when func(cf CloudFormation) error) {
// GIVEN
ctrl := gomock.NewController(t)
defer ctrl.Finish()
m := mocks.NewMockcfnClient(ctrl)
m.EXPECT().Create(gomock.Any()).Return("1234", nil)
m.EXPECT().DescribeChangeSet(gomock.Any(), gomock.Any()).Return(nil, errors.New("DescribeChangeSet error"))
buf := new(strings.Builder)
client := CloudFormation{cfnClient: m, console: mockFileWriter{Writer: buf}}
// WHEN
err := when(client)
// THEN
require.EqualError(t, err, "DescribeChangeSet error")
}
func testDeployTask_OnTemplateBodyFailure(t *testing.T, when func(cf CloudFormation) error) {
// GIVEN
ctrl := gomock.NewController(t)
defer ctrl.Finish()
m := mocks.NewMockcfnClient(ctrl)
m.EXPECT().Create(gomock.Any()).Return("1234", nil)
m.EXPECT().DescribeChangeSet(gomock.Any(), gomock.Any()).Return(&cloudformation.ChangeSetDescription{}, nil)
m.EXPECT().TemplateBodyFromChangeSet(gomock.Any(), gomock.Any()).Return("", errors.New("TemplateBody error"))
buf := new(strings.Builder)
client := CloudFormation{cfnClient: m, console: mockFileWriter{Writer: buf}}
// WHEN
err := when(client)
// THEN
require.EqualError(t, err, "TemplateBody error")
}
func testDeployTask_StackStreamerFailureShouldCancelRenderer(t *testing.T, when func(cf CloudFormation) error) {
// GIVEN
ctrl := gomock.NewController(t)
defer ctrl.Finish()
wantedErr := errors.New("streamer error")
m := mocks.NewMockcfnClient(ctrl)
m.EXPECT().Create(gomock.Any()).Return("1234", nil)
m.EXPECT().DescribeChangeSet(gomock.Any(), gomock.Any()).Return(&cloudformation.ChangeSetDescription{}, nil)
m.EXPECT().TemplateBodyFromChangeSet(gomock.Any(), gomock.Any()).Return("", nil)
m.EXPECT().DescribeStackEvents(gomock.Any()).Return(nil, wantedErr)
buf := new(strings.Builder)
client := CloudFormation{cfnClient: m, console: mockFileWriter{Writer: buf}}
// WHEN
err := when(client)
// THEN
require.True(t, errors.Is(err, wantedErr), "expected streamer error to be wrapped and returned")
}
func testDeployTask_StreamUntilStackCreationFails(t *testing.T, stackName string, when func(cf CloudFormation) error) {
// GIVEN
ctrl := gomock.NewController(t)
defer ctrl.Finish()
m := mocks.NewMockcfnClient(ctrl)
m.EXPECT().Create(gomock.Any()).Return("1234", nil)
m.EXPECT().DescribeChangeSet(gomock.Any(), gomock.Any()).Return(&cloudformation.ChangeSetDescription{}, nil)
m.EXPECT().TemplateBodyFromChangeSet(gomock.Any(), gomock.Any()).Return("", nil)
m.EXPECT().DescribeStackEvents(gomock.Any()).Return(&sdkcloudformation.DescribeStackEventsOutput{
StackEvents: []*sdkcloudformation.StackEvent{
{
EventId: aws.String("2"),
LogicalResourceId: aws.String(stackName),
PhysicalResourceId: aws.String("AWS::CloudFormation::Stack"),
ResourceStatus: aws.String("CREATE_FAILED"), // Send failure event for stack.
Timestamp: aws.Time(time.Now()),
},
},
}, nil).AnyTimes()
m.EXPECT().Describe(stackName).Return(&cloudformation.StackDescription{
StackStatus: aws.String("CREATE_FAILED"),
}, nil)
m.EXPECT().ErrorEvents(stackName).Return(
[]cloudformation.StackEvent{
{
EventId: aws.String("2"),
LogicalResourceId: aws.String(stackName),
PhysicalResourceId: aws.String("AWS::AppRunner::Service"),
ResourceStatus: aws.String("CREATE_FAILED"), // Send failure event for stack.
Timestamp: aws.Time(time.Now()),
},
}, nil)
buf := new(strings.Builder)
client := CloudFormation{cfnClient: m, console: mockFileWriter{Writer: buf}}
// WHEN
err := when(client)
// THEN
require.EqualError(t, err, fmt.Sprintf("stack %s did not complete successfully and exited with status CREATE_FAILED", stackName))
}
func testDeployTask_RenderNewlyCreatedStackWithAddons(t *testing.T, stackName string, when func(cf CloudFormation) error) {
ctrl := gomock.NewController(t)
defer ctrl.Finish()
m := mocks.NewMockcfnClient(ctrl)
// Mocks for the parent stack.
m.EXPECT().Create(gomock.Any()).Return("1234", nil)
m.EXPECT().DescribeChangeSet("1234", stackName).Return(&cloudformation.ChangeSetDescription{
Changes: []*sdkcloudformation.Change{
{
ResourceChange: &sdkcloudformation.ResourceChange{
LogicalResourceId: aws.String("Cluster"),
PhysicalResourceId: aws.String("AWS::ECS::Cluster"),
},
},
{
ResourceChange: &sdkcloudformation.ResourceChange{
ChangeSetId: aws.String("5678"),
LogicalResourceId: aws.String("AddonsStack"),
PhysicalResourceId: aws.String("arn:aws:cloudformation:us-west-2:12345:stack/my-nested-stack/d0a825a0-e4cd-xmpl-b9fb-061c69e99205"),
},
},
},
}, nil)
m.EXPECT().TemplateBodyFromChangeSet("1234", stackName).Return(`
Resources:
Cluster:
Metadata:
'aws:copilot:description': 'An ECS cluster'
Type: AWS::ECS::Cluster
AddonsStack:
Metadata:
'aws:copilot:description': 'An Addons CloudFormation Stack for your additional AWS resources'
Type: AWS::CloudFormation::Stack
`, nil)
m.EXPECT().DescribeStackEvents(&sdkcloudformation.DescribeStackEventsInput{
StackName: aws.String(stackName),
}).Return(&sdkcloudformation.DescribeStackEventsOutput{
StackEvents: []*sdkcloudformation.StackEvent{
{
EventId: aws.String("1"),
LogicalResourceId: aws.String("Cluster"),
PhysicalResourceId: aws.String("AWS::ECS::Cluster"),
ResourceStatus: aws.String("CREATE_COMPLETE"),
Timestamp: aws.Time(time.Now()),
},
{
EventId: aws.String("2"),
LogicalResourceId: aws.String("AddonsStack"),
PhysicalResourceId: aws.String("AWS::CloudFormation::Stack"),
ResourceStatus: aws.String("CREATE_COMPLETE"),
Timestamp: aws.Time(time.Now()),
},
{
EventId: aws.String("3"),
LogicalResourceId: aws.String(stackName),
PhysicalResourceId: aws.String("AWS::CloudFormation::Stack"),
ResourceStatus: aws.String("CREATE_COMPLETE"),
Timestamp: aws.Time(time.Now()),
},
},
}, nil).AnyTimes()
m.EXPECT().Describe(stackName).Return(&cloudformation.StackDescription{
StackStatus: aws.String("CREATE_COMPLETE"),
}, nil)
// Mocks for the addons stack.
m.EXPECT().DescribeChangeSet("5678", "my-nested-stack").Return(&cloudformation.ChangeSetDescription{
Changes: []*sdkcloudformation.Change{
{
ResourceChange: &sdkcloudformation.ResourceChange{
LogicalResourceId: aws.String("MyTable"),
PhysicalResourceId: aws.String("AWS::DynamoDB::Table"),
},
},
},
}, nil)
m.EXPECT().TemplateBodyFromChangeSet("5678", "my-nested-stack").Return(`
Resources:
MyTable:
Metadata:
'aws:copilot:description': 'A DynamoDB table to store data'
Type: AWS::DynamoDB::Table`, nil)
m.EXPECT().DescribeStackEvents(&sdkcloudformation.DescribeStackEventsInput{
StackName: aws.String("my-nested-stack"),
}).Return(&sdkcloudformation.DescribeStackEventsOutput{
StackEvents: []*sdkcloudformation.StackEvent{
{
EventId: aws.String("1"),
LogicalResourceId: aws.String("MyTable"),
PhysicalResourceId: aws.String("AWS::DynamoDB::Table"),
ResourceStatus: aws.String("CREATE_COMPLETE"),
Timestamp: aws.Time(time.Now()),
},
{
EventId: aws.String("2"),
LogicalResourceId: aws.String("my-nested-stack"),
PhysicalResourceId: aws.String("AWS::CloudFormation::Stack"),
ResourceStatus: aws.String("CREATE_COMPLETE"),
Timestamp: aws.Time(time.Now()),
},
},
}, nil).AnyTimes()
buf := new(strings.Builder)
client := CloudFormation{cfnClient: m, console: mockFileWriter{Writer: buf}}
// WHEN
err := when(client)
// THEN
require.NoError(t, err)
require.Contains(t, buf.String(), "An ECS cluster")
require.Contains(t, buf.String(), "An Addons CloudFormation Stack for your additional AWS resources")
require.Contains(t, buf.String(), "A DynamoDB table to store data")
}
func TestCloudFormation_Template(t *testing.T) {
inStackName := stack.NameForEnv("phonetool", "test")
testCases := map[string]struct {
inClient func(ctrl *gomock.Controller) *mocks.MockcfnClient
wantedTemplate string
wantedError error
}{
"error getting the template body": {
inClient: func(ctrl *gomock.Controller) *mocks.MockcfnClient {
m := mocks.NewMockcfnClient(ctrl)
m.EXPECT().TemplateBody("phonetool-test").Return("", errors.New("some error"))
return m
},
wantedError: errors.New("some error"),
},
"returns the template body": {
inClient: func(ctrl *gomock.Controller) *mocks.MockcfnClient {
m := mocks.NewMockcfnClient(ctrl)
m.EXPECT().TemplateBody("phonetool-test").Return("mockTemplate", nil)
return m
},
wantedTemplate: "mockTemplate",
},
}
for name, tc := range testCases {
t.Run(name, func(t *testing.T) {
// GIVEN
ctrl := gomock.NewController(t)
defer ctrl.Finish()
cf := &CloudFormation{
cfnClient: tc.inClient(ctrl),
}
// WHEN
got, gotErr := cf.Template(inStackName)
if tc.wantedError != nil {
require.EqualError(t, gotErr, tc.wantedError.Error())
} else {
require.NoError(t, gotErr)
require.Equal(t, tc.wantedTemplate, got)
}
})
}
}
| 865 |
copilot-cli | aws | Go | // Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
// SPDX-License-Identifier: Apache-2.0
// Package cloudformation provides functionality to deploy ECS resources with AWS CloudFormation.
package cloudformation
import (
"context"
"fmt"
"github.com/aws/aws-sdk-go/aws/arn"
"github.com/aws/copilot-cli/internal/pkg/template"
"github.com/aws/copilot-cli/internal/pkg/version"
"gopkg.in/yaml.v3"
"github.com/aws/aws-sdk-go/aws"
awscfn "github.com/aws/aws-sdk-go/service/cloudformation"
"github.com/aws/copilot-cli/internal/pkg/aws/cloudformation"
"github.com/aws/copilot-cli/internal/pkg/config"
"github.com/aws/copilot-cli/internal/pkg/deploy"
"github.com/aws/copilot-cli/internal/pkg/deploy/cloudformation/stack"
"github.com/aws/copilot-cli/internal/pkg/term/progress"
)
// CreateAndRenderEnvironment creates the CloudFormation stack for an environment, and render the stack creation to out.
func (cf CloudFormation) CreateAndRenderEnvironment(conf StackConfiguration, bucketARN string) error {
cfnStack, err := cf.toUploadedStack(bucketARN, conf)
if err != nil {
return err
}
in := newRenderEnvironmentInput(cfnStack)
in.createChangeSet = func() (changeSetID string, err error) {
spinner := progress.NewSpinner(cf.console)
label := fmt.Sprintf("Proposing infrastructure changes for the %s environment.", cfnStack.Name)
spinner.Start(label)
defer stopSpinner(spinner, err, label)
changeSetID, err = cf.cfnClient.Create(cfnStack)
if err != nil {
return "", err
}
return changeSetID, nil
}
return cf.executeAndRenderChangeSet(in)
}
// UpdateAndRenderEnvironment updates the CloudFormation stack for an environment, and render the stack creation to out.
func (cf CloudFormation) UpdateAndRenderEnvironment(conf StackConfiguration, bucketARN string, opts ...cloudformation.StackOption) error {
cfnStack, err := cf.toUploadedStack(bucketARN, conf)
if err != nil {
return err
}
for _, opt := range opts {
opt(cfnStack)
}
in := newRenderEnvironmentInput(cfnStack)
in.createChangeSet = func() (changeSetID string, err error) {
spinner := progress.NewSpinner(cf.console)
label := fmt.Sprintf("Proposing infrastructure changes for the %s environment.", cfnStack.Name)
spinner.Start(label)
defer stopSpinner(spinner, err, label)
changeSetID, err = cf.cfnClient.Update(cfnStack)
if err != nil {
return "", err
}
return changeSetID, nil
}
return cf.executeAndRenderChangeSet(in)
}
func newRenderEnvironmentInput(cfnStack *cloudformation.Stack) *executeAndRenderChangeSetInput {
return &executeAndRenderChangeSetInput{
stackName: cfnStack.Name,
stackDescription: fmt.Sprintf("Creating the infrastructure for the %s environment.", cfnStack.Name),
}
}
// DeleteEnvironment deletes the CloudFormation stack of an environment.
func (cf CloudFormation) DeleteEnvironment(appName, envName, cfnExecRoleARN string) error {
stackName := stack.NameForEnv(appName, envName)
description := fmt.Sprintf("Delete environment stack %s", stackName)
return cf.deleteAndRenderStack(stackName, description, func() error {
return cf.cfnClient.DeleteAndWaitWithRoleARN(stackName, cfnExecRoleARN)
})
}
// GetEnvironment returns the Environment metadata from the CloudFormation stack.
func (cf CloudFormation) GetEnvironment(appName, envName string) (*config.Environment, error) {
conf := stack.NewBootstrapEnvStackConfig(&stack.EnvConfig{
App: deploy.AppInformation{
Name: appName,
},
Name: envName,
})
descr, err := cf.cfnClient.Describe(conf.StackName())
if err != nil {
return nil, err
}
return conf.ToEnvMetadata(descr.SDK())
}
// ForceUpdateOutputID returns the environment stack's last force update ID.
func (cf CloudFormation) ForceUpdateOutputID(app, env string) (string, error) {
stackDescr, err := cf.cachedStack(stack.NameForEnv(app, env))
if err != nil {
return "", err
}
for _, output := range stackDescr.Outputs {
if aws.StringValue(output.OutputKey) == template.LastForceDeployIDOutputName {
return aws.StringValue(output.OutputValue), nil
}
}
return "", nil
}
// DeployedEnvironmentParameters returns the environment stack's parameters.
func (cf CloudFormation) DeployedEnvironmentParameters(appName, envName string) ([]*awscfn.Parameter, error) {
isInitial, err := cf.isInitialDeployment(appName, envName)
if err != nil {
return nil, err
}
if isInitial {
return nil, nil
}
out, err := cf.cachedStack(stack.NameForEnv(appName, envName))
if err != nil {
return nil, err
}
return out.Parameters, nil
}
// UpdateEnvironmentTemplate updates the cloudformation stack's template body while maintaining the parameters and tags.
func (cf CloudFormation) UpdateEnvironmentTemplate(appName, envName, templateBody, cfnExecRoleARN string) error {
stackName := stack.NameForEnv(appName, envName)
descr, err := cf.cfnClient.Describe(stackName)
if err != nil {
return fmt.Errorf("describe stack %s: %w", stackName, err)
}
s := cloudformation.NewStack(stackName, templateBody)
s.Parameters = descr.Parameters
s.Tags = descr.Tags
s.RoleARN = aws.String(cfnExecRoleARN)
return cf.cfnClient.UpdateAndWait(s)
}
func (cf CloudFormation) toUploadedStack(artifactBucketARN string, stackConfig StackConfiguration) (*cloudformation.Stack, error) {
bucketARN, err := arn.Parse(artifactBucketARN)
if err != nil {
return nil, err
}
url, err := cf.uploadStackTemplateToS3(bucketARN.Resource, stackConfig)
if err != nil {
return nil, err
}
cfnStack, err := toStackFromS3(stackConfig, url)
if err != nil {
return nil, err
}
return cfnStack, nil
}
func (cf CloudFormation) waitAndDescribeStack(stackName string) (*cloudformation.StackDescription, error) {
var (
stackDescription *cloudformation.StackDescription
err error
)
for {
stackDescription, err = cf.cfnClient.Describe(stackName)
if err != nil {
return nil, fmt.Errorf("describe stack %s: %w", stackName, err)
}
if cloudformation.StackStatus(aws.StringValue(stackDescription.StackStatus)).InProgress() {
// There is already an update happening to the environment stack.
// Best-effort try to wait for the existing update to be over before retrying.
_ = cf.cfnClient.WaitForUpdate(context.Background(), stackName)
continue
}
break
}
return stackDescription, err
}
func (cf CloudFormation) cachedStack(stackName string) (*cloudformation.StackDescription, error) {
if cf.cachedDeployedStack != nil {
return cf.cachedDeployedStack, nil
}
stackDescr, err := cf.waitAndDescribeStack(stackName)
if err != nil {
return nil, err
}
cf.cachedDeployedStack = stackDescr
return cf.cachedDeployedStack, nil
}
// isInitialDeployment returns whether this is the first deployment of the environment stack.
func (cf CloudFormation) isInitialDeployment(appName, envName string) (bool, error) {
raw, err := cf.cfnClient.Metadata(cloudformation.MetadataWithStackName(stack.NameForEnv(appName, envName)))
if err != nil {
return false, fmt.Errorf("get metadata of stack %q: %w", stack.NameForEnv(appName, envName), err)
}
metadata := struct {
Version string `yaml:"Version"`
}{}
if err := yaml.Unmarshal([]byte(raw), &metadata); err != nil {
return false, fmt.Errorf("unmarshal Metadata property to read Version: %w", err)
}
return metadata.Version == version.EnvTemplateBootstrap, nil
}
| 209 |
copilot-cli | aws | Go | // Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
// SPDX-License-Identifier: Apache-2.0
package cloudformation
import (
"errors"
"testing"
"github.com/aws/aws-sdk-go/aws"
awscfn "github.com/aws/aws-sdk-go/service/cloudformation"
"github.com/aws/copilot-cli/internal/pkg/aws/cloudformation"
"github.com/aws/copilot-cli/internal/pkg/deploy/cloudformation/mocks"
"github.com/aws/copilot-cli/internal/pkg/template"
"github.com/golang/mock/gomock"
"github.com/stretchr/testify/require"
)
func TestCloudFormation_DeployedEnvironmentParameters(t *testing.T) {
testCases := map[string]struct {
inAppName string
inEnvName string
inClient func(ctrl *gomock.Controller) *mocks.MockcfnClient
wantedParams []*awscfn.Parameter
wantedErr error
}{
"error retrieving metadata": {
inAppName: "phonetool",
inEnvName: "test",
inClient: func(ctrl *gomock.Controller) *mocks.MockcfnClient {
m := mocks.NewMockcfnClient(ctrl)
m.EXPECT().Metadata(gomock.Any()).Return("", errors.New("some error"))
return m
},
wantedErr: errors.New("get metadata of stack \"phonetool-test\": some error"),
},
"returns nil if the version is bootstrap": {
inAppName: "phonetool",
inEnvName: "test",
inClient: func(ctrl *gomock.Controller) *mocks.MockcfnClient {
m := mocks.NewMockcfnClient(ctrl)
m.EXPECT().Metadata(gomock.Any()).Return(`Version: bootstrap`, nil)
return m
},
},
"should return stack parameters from a stack description": {
inAppName: "phonetool",
inEnvName: "test",
inClient: func(ctrl *gomock.Controller) *mocks.MockcfnClient {
m := mocks.NewMockcfnClient(ctrl)
m.EXPECT().Metadata(gomock.Any()).Return(`Version: `, nil)
m.EXPECT().Describe("phonetool-test").Return(&cloudformation.StackDescription{
Parameters: []*awscfn.Parameter{
{
ParameterKey: aws.String("name"),
ParameterValue: aws.String("test"),
},
},
}, nil)
return m
},
wantedParams: []*awscfn.Parameter{
{
ParameterKey: aws.String("name"),
ParameterValue: aws.String("test"),
},
},
},
"should return the error as is from a failed stack description": {
inAppName: "phonetool",
inEnvName: "test",
inClient: func(ctrl *gomock.Controller) *mocks.MockcfnClient {
m := mocks.NewMockcfnClient(ctrl)
m.EXPECT().Metadata(gomock.Any()).Return(`Version: v1.21.0`, nil)
m.EXPECT().Describe(gomock.Any()).Return(nil, errors.New("some error"))
return m
},
wantedErr: errors.New("describe stack phonetool-test: some error"),
},
}
for name, tc := range testCases {
t.Run(name, func(t *testing.T) {
// GIVEN
ctrl := gomock.NewController(t)
defer ctrl.Finish()
cf := &CloudFormation{
cfnClient: tc.inClient(ctrl),
}
// WHEN
actual, err := cf.DeployedEnvironmentParameters(tc.inAppName, tc.inEnvName)
if tc.wantedErr != nil {
require.EqualError(t, err, tc.wantedErr.Error())
} else {
require.NoError(t, err)
require.ElementsMatch(t, tc.wantedParams, actual)
}
})
}
}
func TestCloudFormation_ForceUpdateID(t *testing.T) {
testCases := map[string]struct {
inClient func(ctrl *gomock.Controller) *mocks.MockcfnClient
wanted string
wantedErr error
}{
"should return stack parameters from a stack description": {
inClient: func(ctrl *gomock.Controller) *mocks.MockcfnClient {
m := mocks.NewMockcfnClient(ctrl)
m.EXPECT().Describe("phonetool-test").Return(&cloudformation.StackDescription{
Outputs: []*awscfn.Output{
{
OutputKey: aws.String(template.LastForceDeployIDOutputName),
OutputValue: aws.String("mockForceUpdateID"),
},
},
}, nil)
return m
},
wanted: "mockForceUpdateID",
},
"error describing the stack": {
inClient: func(ctrl *gomock.Controller) *mocks.MockcfnClient {
m := mocks.NewMockcfnClient(ctrl)
m.EXPECT().Describe(gomock.Any()).Return(nil, errors.New("some error"))
return m
},
wantedErr: errors.New("describe stack phonetool-test: some error"),
},
}
for name, tc := range testCases {
t.Run(name, func(t *testing.T) {
// GIVEN
ctrl := gomock.NewController(t)
defer ctrl.Finish()
cf := &CloudFormation{
cfnClient: tc.inClient(ctrl),
}
// WHEN
actual, err := cf.ForceUpdateOutputID("phonetool", "test")
if tc.wantedErr != nil {
require.EqualError(t, err, tc.wantedErr.Error())
} else {
require.NoError(t, err)
require.Equal(t, tc.wanted, actual)
}
})
}
}
func TestCloudFormation_UpdateEnvironmentTemplate(t *testing.T) {
testCases := map[string]struct {
inAppName string
inEnvName string
inTemplateBody string
inExecRoleARN string
inClient func(t *testing.T, ctrl *gomock.Controller) *mocks.MockcfnClient
wantedError error
}{
"wraps error if describe fails": {
inAppName: "phonetool",
inEnvName: "test",
inClient: func(t *testing.T, ctrl *gomock.Controller) *mocks.MockcfnClient {
m := mocks.NewMockcfnClient(ctrl)
m.EXPECT().Describe(gomock.Any()).Return(nil, errors.New("some error"))
return m
},
wantedError: errors.New("describe stack phonetool-test: some error"),
},
"uses existing parameters, tags, and passed in new template and role arn on success": {
inAppName: "phonetool",
inEnvName: "test",
inTemplateBody: "hello",
inExecRoleARN: "arn",
inClient: func(t *testing.T, ctrl *gomock.Controller) *mocks.MockcfnClient {
m := mocks.NewMockcfnClient(ctrl)
params := []*awscfn.Parameter{
{
ParameterKey: aws.String("ALBWorkloads"),
ParameterValue: aws.String("frontend"),
},
}
tags := []*awscfn.Tag{
{
Key: aws.String("copilot-application"),
Value: aws.String("phonetool"),
},
}
m.EXPECT().Describe("phonetool-test").Return(&cloudformation.StackDescription{
Parameters: params,
Tags: tags,
}, nil)
m.EXPECT().UpdateAndWait(gomock.Any()).Return(nil).
Do(func(s *cloudformation.Stack) {
require.Equal(t, "phonetool-test", s.Name)
require.Equal(t, params, s.Parameters)
require.Equal(t, tags, s.Tags)
require.Equal(t, "hello", s.TemplateBody)
require.Equal(t, aws.String("arn"), s.RoleARN)
})
return m
},
},
}
for name, tc := range testCases {
t.Run(name, func(t *testing.T) {
// GIVEN
ctrl := gomock.NewController(t)
defer ctrl.Finish()
cf := &CloudFormation{
cfnClient: tc.inClient(t, ctrl),
}
// WHEN
err := cf.UpdateEnvironmentTemplate(tc.inAppName, tc.inEnvName, tc.inTemplateBody, tc.inExecRoleARN)
// THEN
if tc.wantedError != nil {
require.EqualError(t, err, tc.wantedError.Error())
} else {
require.NoError(t, err)
}
})
}
}
| 236 |
copilot-cli | aws | Go | // Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
// SPDX-License-Identifier: Apache-2.0
// Package cloudformation provides functionality to deploy ECS resources with AWS CloudFormation.
// This file defines API for deploying a pipeline.
package cloudformation
import (
"context"
"errors"
"fmt"
"strings"
"time"
"github.com/aws/aws-sdk-go/aws"
"github.com/aws/copilot-cli/internal/pkg/aws/cloudformation"
"github.com/aws/copilot-cli/internal/pkg/deploy"
"github.com/aws/copilot-cli/internal/pkg/deploy/cloudformation/stack"
)
const (
sourceStage = "Source"
connectionARNKey = "PipelineConnectionARN"
fmtPipelineCfnTemplateName = "%s.pipeline.stack.yml"
cfnLogicalResourceIDPipeline = "Pipeline"
cfnResourceTypePipeline = "AWS::CodePipeline::Pipeline"
)
// PipelineExists checks if the pipeline with the provided config exists.
func (cf CloudFormation) PipelineExists(in *deploy.CreatePipelineInput) (bool, error) {
stackConfig := stack.NewPipelineStackConfig(in)
_, err := cf.cfnClient.Describe(stackConfig.StackName())
if err != nil {
var stackNotFound *cloudformation.ErrStackNotFound
if !errors.As(err, &stackNotFound) {
return false, err
}
return false, nil
}
return true, nil
}
// CreatePipeline sets up a new CodePipeline for deploying services.
func (cf CloudFormation) CreatePipeline(in *deploy.CreatePipelineInput, bucketName string) error {
templateURL, err := cf.pushTemplateToS3Bucket(bucketName, stack.NewPipelineStackConfig(in))
if err != nil {
return err
}
stackConfig := stack.NewPipelineStackConfig(in)
s, err := toStackFromS3(stackConfig, templateURL)
if err != nil {
return err
}
err = cf.cfnClient.CreateAndWait(s)
if err != nil {
return err
}
output, err := cf.cfnClient.Outputs(s)
if err != nil {
return err
}
// If the pipeline has a PipelineConnectionARN in the output map, indicating that it is has a CodeStarConnections source provider, the user needs to update the connection status; Copilot will wait until that happens.
if output[connectionARNKey] == "" {
return nil
}
ctx, cancel := context.WithDeadline(context.Background(), time.Now().Add(45*time.Minute))
defer cancel()
if err = cf.codeStarClient.WaitUntilConnectionStatusAvailable(ctx, output[connectionARNKey]); err != nil {
return err
}
pipelineResourceName, err := cf.pipelinePhysicalResourceID(stackConfig.StackName())
if err != nil {
return err
}
if err = cf.cpClient.RetryStageExecution(pipelineResourceName, sourceStage); err != nil {
return err
}
return nil
}
func (cf CloudFormation) pipelinePhysicalResourceID(stackName string) (string, error) {
stackResources, err := cf.cfnClient.StackResources(stackName)
if err != nil {
return "", err
}
for _, resource := range stackResources {
if aws.StringValue(resource.LogicalResourceId) == cfnLogicalResourceIDPipeline && aws.StringValue(resource.ResourceType) == cfnResourceTypePipeline {
return aws.StringValue(resource.PhysicalResourceId), nil
}
}
return "", fmt.Errorf(`cannot find a resource in stack %s with logical ID "%s" of type "%s"`, stackName, cfnLogicalResourceIDPipeline, cfnResourceTypePipeline)
}
// UpdatePipeline updates an existing CodePipeline for deploying services.
func (cf CloudFormation) UpdatePipeline(in *deploy.CreatePipelineInput, bucketName string) error {
templateURL, err := cf.pushTemplateToS3Bucket(bucketName, stack.NewPipelineStackConfig(in))
if err != nil {
return err
}
s, err := toStackFromS3(stack.NewPipelineStackConfig(in), templateURL)
if err != nil {
return err
}
if err := cf.cfnClient.UpdateAndWait(s); err != nil {
var errNoUpdates *cloudformation.ErrChangeSetEmpty
if errors.As(err, &errNoUpdates) {
return nil
}
return fmt.Errorf("update pipeline: %w", err)
}
return nil
}
// DeletePipeline removes the CodePipeline stack.
func (cf CloudFormation) DeletePipeline(pipeline deploy.Pipeline) error {
return cf.cfnClient.DeleteAndWait(stack.NameForPipeline(pipeline.AppName, pipeline.Name, pipeline.IsLegacy))
}
func (cf CloudFormation) pushTemplateToS3Bucket(bucket string, config StackConfiguration) (string, error) {
template, err := config.Template()
if err != nil {
return "", fmt.Errorf("generate template: %w", err)
}
reader := strings.NewReader(template)
url, err := cf.s3Client.Upload(bucket, fmt.Sprintf(fmtPipelineCfnTemplateName, config.StackName()), reader)
if err != nil {
return "", fmt.Errorf("upload pipeline template to S3 bucket %s: %w", bucket, err)
}
return url, nil
}
| 134 |
copilot-cli | aws | Go | // Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
// SPDX-License-Identifier: Apache-2.0
package cloudformation
import (
"errors"
"fmt"
"testing"
"github.com/golang/mock/gomock"
"github.com/stretchr/testify/require"
"github.com/aws/aws-sdk-go/aws"
"github.com/aws/copilot-cli/internal/pkg/aws/cloudformation"
"github.com/aws/copilot-cli/internal/pkg/deploy"
"github.com/aws/copilot-cli/internal/pkg/deploy/cloudformation/mocks"
)
const defaultImage = "aws/codebuild/amazonlinux2-x86_64-standard:3.0"
func TestCloudFormation_PipelineExists(t *testing.T) {
in := &deploy.CreatePipelineInput{
AppName: "kudos",
Name: "cicd",
}
testCases := map[string]struct {
createMock func(ctrl *gomock.Controller) cfnClient
wantedExists bool
wantedErr error
}{
"return false and error on unexpected failure": {
createMock: func(ctrl *gomock.Controller) cfnClient {
m := mocks.NewMockcfnClient(ctrl)
m.EXPECT().Describe(gomock.Any()).Return(nil, errors.New("some error"))
return m
},
wantedErr: errors.New("some error"),
},
"return false if stack does not exist": {
createMock: func(ctrl *gomock.Controller) cfnClient {
m := mocks.NewMockcfnClient(ctrl)
m.EXPECT().Describe(gomock.Any()).Return(nil, fmt.Errorf("describe stack: %w", &cloudformation.ErrStackNotFound{}))
return m
},
wantedExists: false,
},
"returns true if stack exists": {
createMock: func(ctrl *gomock.Controller) cfnClient {
m := mocks.NewMockcfnClient(ctrl)
m.EXPECT().Describe(gomock.Any()).Return(nil, nil)
return m
},
wantedExists: true,
},
}
for name, tc := range testCases {
t.Run(name, func(t *testing.T) {
// GIVEN
ctrl := gomock.NewController(t)
defer ctrl.Finish()
c := CloudFormation{
cfnClient: tc.createMock(ctrl),
}
// WHEN
exists, err := c.PipelineExists(in)
// THEN
require.Equal(t, tc.wantedExists, exists)
require.Equal(t, tc.wantedErr, err)
})
}
}
func TestCloudFormation_CreatePipeline(t *testing.T) {
in := &deploy.CreatePipelineInput{
AppName: "kudos",
Name: "cicd",
Source: &deploy.BitbucketSource{
RepositoryURL: "https://bitbucket.org/aws/somethingCool",
ProviderName: "Bitbucket",
Branch: "main",
},
Build: &deploy.Build{
Image: defaultImage,
},
Stages: nil,
ArtifactBuckets: nil,
}
mockS3BucketName := "BitterBucket"
mockURL := "templateURL"
testCases := map[string]struct {
createCfnMock func(ctrl *gomock.Controller) cfnClient
createCsMock func(ctrl *gomock.Controller) codeStarClient
createCpMock func(ctrl *gomock.Controller) codePipelineClient
createS3Mock func(ctrl *gomock.Controller) s3Client
wantedErr error
}{
"exits successfully with base case (no connection)": {
createCfnMock: func(ctrl *gomock.Controller) cfnClient {
m := mocks.NewMockcfnClient(ctrl)
m.EXPECT().CreateAndWait(gomock.Any()).Times(1)
m.EXPECT().Outputs(gomock.Any()).Return(nil, nil)
return m
},
createS3Mock: func(ctrl *gomock.Controller) s3Client {
m := mocks.NewMocks3Client(ctrl)
m.EXPECT().Upload(mockS3BucketName, gomock.Any(), gomock.Any()).Return(mockURL, nil)
return m
},
createCsMock: func(ctrl *gomock.Controller) codeStarClient {
m := mocks.NewMockcodeStarClient(ctrl)
m.EXPECT().WaitUntilConnectionStatusAvailable(gomock.Any(), "mockConnectionARN").Times(0)
return m
},
createCpMock: func(ctrl *gomock.Controller) codePipelineClient {
m := mocks.NewMockcodePipelineClient(ctrl)
m.EXPECT().RetryStageExecution(gomock.Any(), gomock.Any()).Times(0)
return m
},
wantedErr: nil,
},
"exits successfully with connection update to wait for": {
createCfnMock: func(ctrl *gomock.Controller) cfnClient {
m := mocks.NewMockcfnClient(ctrl)
m.EXPECT().CreateAndWait(gomock.Any()).Times(1)
m.EXPECT().Outputs(gomock.Any()).Return(
map[string]string{
"PipelineConnectionARN": "mockConnectionARN",
}, nil)
m.EXPECT().StackResources(gomock.Any()).Return([]*cloudformation.StackResource{
{
LogicalResourceId: aws.String(cfnLogicalResourceIDPipeline),
ResourceType: aws.String(cfnResourceTypePipeline),
PhysicalResourceId: aws.String("mockPipelineResourceID"),
},
}, nil)
return m
},
createS3Mock: func(ctrl *gomock.Controller) s3Client {
m := mocks.NewMocks3Client(ctrl)
m.EXPECT().Upload(mockS3BucketName, gomock.Any(), gomock.Any()).Return(mockURL, nil)
return m
},
createCsMock: func(ctrl *gomock.Controller) codeStarClient {
m := mocks.NewMockcodeStarClient(ctrl)
m.EXPECT().WaitUntilConnectionStatusAvailable(gomock.Any(), "mockConnectionARN").Return(nil)
return m
},
createCpMock: func(ctrl *gomock.Controller) codePipelineClient {
m := mocks.NewMockcodePipelineClient(ctrl)
m.EXPECT().RetryStageExecution("mockPipelineResourceID", gomock.Any()).Return(nil)
return m
},
wantedErr: nil,
},
"returns err if fail to create and wait": {
createCfnMock: func(ctrl *gomock.Controller) cfnClient {
m := mocks.NewMockcfnClient(ctrl)
m.EXPECT().CreateAndWait(gomock.Any()).Return(errors.New("some error"))
m.EXPECT().Outputs(gomock.Any()).Times(0)
return m
},
createS3Mock: func(ctrl *gomock.Controller) s3Client {
m := mocks.NewMocks3Client(ctrl)
m.EXPECT().Upload(mockS3BucketName, gomock.Any(), gomock.Any()).Return(mockURL, nil)
return m
},
createCsMock: func(ctrl *gomock.Controller) codeStarClient {
m := mocks.NewMockcodeStarClient(ctrl)
m.EXPECT().WaitUntilConnectionStatusAvailable(gomock.Any(), "mockConnectionARN").Times(0)
return m
},
createCpMock: func(ctrl *gomock.Controller) codePipelineClient {
m := mocks.NewMockcodePipelineClient(ctrl)
m.EXPECT().RetryStageExecution(gomock.Any(), gomock.Any()).Times(0)
return m
},
wantedErr: fmt.Errorf("some error"),
},
"returns error if fails to upload template to S3 bucket": {
createCfnMock: func(ctrl *gomock.Controller) cfnClient {
m := mocks.NewMockcfnClient(ctrl)
m.EXPECT().CreateAndWait(gomock.Any()).Times(0)
m.EXPECT().Outputs(gomock.Any()).Times(0)
return m
},
createS3Mock: func(ctrl *gomock.Controller) s3Client {
m := mocks.NewMocks3Client(ctrl)
m.EXPECT().Upload(mockS3BucketName, gomock.Any(), gomock.Any()).Return("", errors.New("some error"))
return m
},
createCsMock: func(ctrl *gomock.Controller) codeStarClient {
m := mocks.NewMockcodeStarClient(ctrl)
m.EXPECT().WaitUntilConnectionStatusAvailable(gomock.Any(), "mockConnectionARN").Times(0)
return m
},
createCpMock: func(ctrl *gomock.Controller) codePipelineClient {
m := mocks.NewMockcodePipelineClient(ctrl)
m.EXPECT().RetryStageExecution(gomock.Any(), gomock.Any()).Times(0)
return m
},
wantedErr: fmt.Errorf("upload pipeline template to S3 bucket %s: some error", "BitterBucket"),
},
"returns err if retrieving outputs fails": {
createCfnMock: func(ctrl *gomock.Controller) cfnClient {
m := mocks.NewMockcfnClient(ctrl)
m.EXPECT().CreateAndWait(gomock.Any()).Times(1)
m.EXPECT().Outputs(gomock.Any()).Return(nil, errors.New("some error"))
return m
},
createS3Mock: func(ctrl *gomock.Controller) s3Client {
m := mocks.NewMocks3Client(ctrl)
m.EXPECT().Upload(mockS3BucketName, gomock.Any(), gomock.Any()).Return(mockURL, nil)
return m
},
createCsMock: func(ctrl *gomock.Controller) codeStarClient {
m := mocks.NewMockcodeStarClient(ctrl)
m.EXPECT().WaitUntilConnectionStatusAvailable(gomock.Any(), "mockConnectionARN").Times(0)
return m
},
createCpMock: func(ctrl *gomock.Controller) codePipelineClient {
m := mocks.NewMockcodePipelineClient(ctrl)
m.EXPECT().RetryStageExecution(gomock.Any(), gomock.Any()).Times(0)
return m
},
wantedErr: fmt.Errorf("some error"),
},
"returns err if unsuccessful in waiting for status to become available": {
createCfnMock: func(ctrl *gomock.Controller) cfnClient {
m := mocks.NewMockcfnClient(ctrl)
m.EXPECT().CreateAndWait(gomock.Any()).Times(1)
m.EXPECT().Outputs(gomock.Any()).Return(map[string]string{
"PipelineConnectionARN": "mockConnectionARN",
}, nil)
return m
},
createS3Mock: func(ctrl *gomock.Controller) s3Client {
m := mocks.NewMocks3Client(ctrl)
m.EXPECT().Upload(mockS3BucketName, gomock.Any(), gomock.Any()).Return(mockURL, nil)
return m
},
createCsMock: func(ctrl *gomock.Controller) codeStarClient {
m := mocks.NewMockcodeStarClient(ctrl)
m.EXPECT().WaitUntilConnectionStatusAvailable(gomock.Any(), "mockConnectionARN").Return(errors.New("some error"))
return m
},
createCpMock: func(ctrl *gomock.Controller) codePipelineClient {
m := mocks.NewMockcodePipelineClient(ctrl)
m.EXPECT().RetryStageExecution(gomock.Any(), gomock.Any()).Times(0)
return m
},
wantedErr: fmt.Errorf("some error"),
},
"returns err if error occurs when retrieving pipeline physical id": {
createCfnMock: func(ctrl *gomock.Controller) cfnClient {
m := mocks.NewMockcfnClient(ctrl)
m.EXPECT().CreateAndWait(gomock.Any()).Times(1)
m.EXPECT().Outputs(gomock.Any()).Return(map[string]string{
"PipelineConnectionARN": "mockConnectionARN",
}, nil)
m.EXPECT().StackResources(gomock.Any()).Return(nil, errors.New("some error"))
return m
},
createS3Mock: func(ctrl *gomock.Controller) s3Client {
m := mocks.NewMocks3Client(ctrl)
m.EXPECT().Upload(mockS3BucketName, gomock.Any(), gomock.Any()).Return(mockURL, nil)
return m
},
createCsMock: func(ctrl *gomock.Controller) codeStarClient {
m := mocks.NewMockcodeStarClient(ctrl)
m.EXPECT().WaitUntilConnectionStatusAvailable(gomock.Any(), "mockConnectionARN").Return(nil)
return m
},
createCpMock: func(ctrl *gomock.Controller) codePipelineClient {
m := mocks.NewMockcodePipelineClient(ctrl)
m.EXPECT().RetryStageExecution(gomock.Any(), gomock.Any()).Times(0)
return m
},
wantedErr: fmt.Errorf("some error"),
},
"returns err if unable to find pipeline resource from stack": {
createCfnMock: func(ctrl *gomock.Controller) cfnClient {
m := mocks.NewMockcfnClient(ctrl)
m.EXPECT().CreateAndWait(gomock.Any()).Times(1)
m.EXPECT().Outputs(gomock.Any()).Return(map[string]string{
"PipelineConnectionARN": "mockConnectionARN",
}, nil)
m.EXPECT().StackResources(gomock.Any()).Return([]*cloudformation.StackResource{}, nil)
return m
},
createS3Mock: func(ctrl *gomock.Controller) s3Client {
m := mocks.NewMocks3Client(ctrl)
m.EXPECT().Upload(mockS3BucketName, gomock.Any(), gomock.Any()).Return(mockURL, nil)
return m
},
createCsMock: func(ctrl *gomock.Controller) codeStarClient {
m := mocks.NewMockcodeStarClient(ctrl)
m.EXPECT().WaitUntilConnectionStatusAvailable(gomock.Any(), "mockConnectionARN").Return(nil)
return m
},
createCpMock: func(ctrl *gomock.Controller) codePipelineClient {
m := mocks.NewMockcodePipelineClient(ctrl)
m.EXPECT().RetryStageExecution(gomock.Any(), gomock.Any()).Times(0)
return m
},
wantedErr: fmt.Errorf(`cannot find a resource in stack pipeline-kudos-cicd with logical ID "Pipeline" of type "AWS::CodePipeline::Pipeline"`),
},
"returns err if unsuccessful in retrying stage execution": {
createCfnMock: func(ctrl *gomock.Controller) cfnClient {
m := mocks.NewMockcfnClient(ctrl)
m.EXPECT().CreateAndWait(gomock.Any()).Times(1)
m.EXPECT().Outputs(gomock.Any()).Return(map[string]string{
"PipelineConnectionARN": "mockConnectionARN",
}, nil)
m.EXPECT().StackResources(gomock.Any()).Return([]*cloudformation.StackResource{
{
LogicalResourceId: aws.String(cfnLogicalResourceIDPipeline),
ResourceType: aws.String(cfnResourceTypePipeline),
PhysicalResourceId: aws.String("mockPipelineResourceID"),
},
}, nil)
return m
},
createS3Mock: func(ctrl *gomock.Controller) s3Client {
m := mocks.NewMocks3Client(ctrl)
m.EXPECT().Upload(mockS3BucketName, gomock.Any(), gomock.Any()).Return(mockURL, nil)
return m
},
createCsMock: func(ctrl *gomock.Controller) codeStarClient {
m := mocks.NewMockcodeStarClient(ctrl)
m.EXPECT().WaitUntilConnectionStatusAvailable(gomock.Any(), "mockConnectionARN").Return(nil)
return m
},
createCpMock: func(ctrl *gomock.Controller) codePipelineClient {
m := mocks.NewMockcodePipelineClient(ctrl)
m.EXPECT().RetryStageExecution("mockPipelineResourceID", gomock.Any()).Return(errors.New("some error"))
return m
},
wantedErr: fmt.Errorf("some error"),
},
}
for name, tc := range testCases {
t.Run(name, func(t *testing.T) {
// GIVEN
ctrl := gomock.NewController(t)
defer ctrl.Finish()
c := CloudFormation{
cfnClient: tc.createCfnMock(ctrl),
codeStarClient: tc.createCsMock(ctrl),
cpClient: tc.createCpMock(ctrl),
s3Client: tc.createS3Mock(ctrl),
}
// WHEN
err := c.CreatePipeline(in, mockS3BucketName)
// THEN
if tc.wantedErr != nil {
require.EqualError(t, err, tc.wantedErr.Error())
} else {
require.NoError(t, err)
}
})
}
}
func TestCloudFormation_UpdatePipeline(t *testing.T) {
in := &deploy.CreatePipelineInput{
AppName: "kudos",
Name: "cicd",
Source: &deploy.GitHubSource{
RepositoryURL: "aws/somethingCool",
Branch: "main",
},
Build: &deploy.Build{
Image: defaultImage,
},
Stages: nil,
ArtifactBuckets: nil,
}
mockS3BucketName := "BitterBucket"
mockURL := "templateURL"
testCases := map[string]struct {
createMock func(ctrl *gomock.Controller) cfnClient
createS3Mock func(ctrl *gomock.Controller) s3Client
wantedErr error
}{
"exits successfully if there are no updates": {
createMock: func(ctrl *gomock.Controller) cfnClient {
m := mocks.NewMockcfnClient(ctrl)
m.EXPECT().UpdateAndWait(gomock.Any()).Return(&cloudformation.ErrChangeSetEmpty{})
return m
},
createS3Mock: func(ctrl *gomock.Controller) s3Client {
m := mocks.NewMocks3Client(ctrl)
m.EXPECT().Upload(mockS3BucketName, gomock.Any(), gomock.Any()).Return(mockURL, nil)
return m
},
wantedErr: nil,
},
"returns an error if can't push template to S3 bucket": {
createMock: func(ctrl *gomock.Controller) cfnClient {
m := mocks.NewMockcfnClient(ctrl)
//m.EXPECT().UpdateAndWait(gomock.Any()).Return(&cloudformation.ErrChangeSetEmpty{})
return m
},
createS3Mock: func(ctrl *gomock.Controller) s3Client {
m := mocks.NewMocks3Client(ctrl)
m.EXPECT().Upload(mockS3BucketName, gomock.Any(), gomock.Any()).Return("", errors.New("some error"))
return m
},
wantedErr: fmt.Errorf("upload pipeline template to S3 bucket %s: some error", "BitterBucket"),
},
}
for name, tc := range testCases {
t.Run(name, func(t *testing.T) {
// GIVEN
ctrl := gomock.NewController(t)
defer ctrl.Finish()
c := CloudFormation{
cfnClient: tc.createMock(ctrl),
s3Client: tc.createS3Mock(ctrl),
}
// WHEN
err := c.UpdatePipeline(in, mockS3BucketName)
// THEN
if tc.wantedErr != nil {
require.EqualError(t, err, tc.wantedErr.Error())
} else {
require.NoError(t, err)
}
})
}
}
| 443 |
copilot-cli | aws | Go | // Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
// SPDX-License-Identifier: Apache-2.0
package cloudformation
import (
"errors"
"fmt"
"github.com/aws/aws-sdk-go/aws"
"github.com/aws/copilot-cli/internal/pkg/aws/cloudformation"
"github.com/aws/copilot-cli/internal/pkg/deploy"
"github.com/aws/copilot-cli/internal/pkg/deploy/cloudformation/stack"
)
// DeployTask deploys a task stack, renders the deployment to out until it is done.
// If the task stack doesn't exist, then it creates the stack.
// If the task stack already exists, it updates the stack.
// If the task stack doesn't have any changes, it returns nil
func (cf CloudFormation) DeployTask(input *deploy.CreateTaskResourcesInput, opts ...cloudformation.StackOption) error {
conf := stack.NewTaskStackConfig(input)
stack, err := toStack(conf)
if err != nil {
return err
}
for _, opt := range opts {
opt(stack)
}
if err := cf.executeAndRenderChangeSet(cf.newUpsertChangeSetInput(cf.console, stack)); err != nil {
var errChangeSetEmpty *cloudformation.ErrChangeSetEmpty
if !errors.As(err, &errChangeSetEmpty) {
return err
}
}
return nil
}
// ListTaskStacks returns all the CF stacks which represent one-off copilot tasks in a given application's environments.
func (cf CloudFormation) ListTaskStacks(appName, envName string) ([]deploy.TaskStackInfo, error) {
taskAppEnvTags := map[string]string{
deploy.TaskTagKey: "",
deploy.AppTagKey: appName,
deploy.EnvTagKey: envName,
}
tasks, err := cf.cfnClient.ListStacksWithTags(taskAppEnvTags)
if err != nil {
return nil, err
}
var outputTaskStacks []deploy.TaskStackInfo
for _, task := range tasks {
outputTaskStacks = append(outputTaskStacks, deploy.TaskStackInfo{
StackName: aws.StringValue(task.StackName),
App: appName,
Env: envName,
RoleARN: aws.StringValue(task.RoleARN),
})
}
return outputTaskStacks, nil
}
// GetTaskStack grabs information about the given one-off task's cloudformation stack
// and returns it to the user in a convenient struct.
func (cf CloudFormation) GetTaskStack(taskName string) (*deploy.TaskStackInfo, error) {
stackName := string(stack.NameForTask(taskName))
desc, err := cf.cfnClient.Describe(stackName)
if err != nil {
return nil, err
}
info := deploy.TaskStackInfo{
StackName: stackName,
RoleARN: aws.StringValue(desc.RoleARN),
}
var isTask bool
for _, tag := range desc.Tags {
switch aws.StringValue(tag.Key) {
case deploy.AppTagKey:
info.App = aws.StringValue(tag.Value)
case deploy.EnvTagKey:
info.Env = aws.StringValue(tag.Value)
case deploy.TaskTagKey:
isTask = true
}
}
for _, out := range desc.Outputs {
switch aws.StringValue(out.OutputKey) {
case stack.TaskOutputS3Bucket:
info.BucketName = aws.StringValue(out.OutputValue)
}
}
if !isTask {
return nil, fmt.Errorf("%s is not a Copilot task stack", stackName)
}
return &info, nil
}
// ListDefaultTaskStacks returns all the CF stacks created by copilot but not associated with an application.
func (cf CloudFormation) ListDefaultTaskStacks() ([]deploy.TaskStackInfo, error) {
tasks, err := cf.cfnClient.ListStacksWithTags(map[string]string{deploy.TaskTagKey: ""})
if err != nil {
return nil, err
}
var outputTaskStacks []deploy.TaskStackInfo
for _, task := range tasks {
// Eliminate tasks which are tagged for a particular copilot app or env.
var hasAppTag, hasEnvTag bool
for _, tag := range task.Tags {
if aws.StringValue(tag.Key) == deploy.AppTagKey {
hasAppTag = true
}
if aws.StringValue(tag.Key) == deploy.EnvTagKey {
hasEnvTag = true
}
}
if hasAppTag || hasEnvTag {
continue
}
outputTaskStacks = append(outputTaskStacks, deploy.TaskStackInfo{
StackName: aws.StringValue(task.StackName),
})
}
return outputTaskStacks, nil
}
// DeleteTask deletes a Copilot-created one-off task stack using the RoleARN that stack was created with.
// If there is no role arn specified, it tries to delete the stack using the default session.
func (cf CloudFormation) DeleteTask(task deploy.TaskStackInfo) error {
if task.RoleARN != "" {
return cf.cfnClient.DeleteAndWaitWithRoleARN(task.StackName, task.RoleARN)
}
return cf.cfnClient.DeleteAndWait(task.StackName)
}
| 136 |
copilot-cli | aws | Go | // Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
// SPDX-License-Identifier: Apache-2.0
package cloudformation
import (
"errors"
"testing"
"github.com/aws/aws-sdk-go/aws"
awscfn "github.com/aws/aws-sdk-go/service/cloudformation"
"github.com/aws/copilot-cli/internal/pkg/deploy"
"github.com/aws/copilot-cli/internal/pkg/aws/cloudformation"
"github.com/stretchr/testify/require"
"github.com/aws/copilot-cli/internal/pkg/deploy/cloudformation/mocks"
"github.com/golang/mock/gomock"
)
func TestCloudFormation_DeployTask(t *testing.T) {
mockTask := &deploy.CreateTaskResourcesInput{
Name: "hello",
}
when := func(cf CloudFormation) error {
return cf.DeployTask(mockTask)
}
t.Run("returns a wrapped error if creating a change set fails", func(t *testing.T) {
testDeployTask_OnCreateChangeSetFailure(t, when)
})
t.Run("calls Update if stack is already created and returns wrapped error if Update fails", func(t *testing.T) {
testDeployTask_OnUpdateChangeSetFailure(t, when)
})
t.Run("returns nil if the change set is empty when calling Update", func(t *testing.T) {
testDeployTask_ReturnNilOnEmptyChangeSetWhileUpdatingStack(t, when)
})
t.Run("returns an error when the ChangeSet cannot be described for stack changes before rendering", func(t *testing.T) {
testDeployTask_OnDescribeChangeSetFailure(t, when)
})
t.Run("returns an error when stack template body cannot be retrieved to parse resource descriptions", func(t *testing.T) {
testDeployTask_OnTemplateBodyFailure(t, when)
})
t.Run("returns a wrapped error if a streamer fails and cancels the renderer", func(t *testing.T) {
testDeployTask_StackStreamerFailureShouldCancelRenderer(t, when)
})
t.Run("returns an error if stack creation fails", func(t *testing.T) {
testDeployTask_StreamUntilStackCreationFails(t, "task-hello", when)
})
t.Run("renders a stack with addons template if stack creation is successful", func(t *testing.T) {
testDeployTask_RenderNewlyCreatedStackWithAddons(t, "task-hello", when)
})
}
var mockDescription1 = &cloudformation.StackDescription{
Tags: []*awscfn.Tag{
{
Key: aws.String("copilot-task"),
},
{
Key: aws.String("copilot-application"),
Value: aws.String("appname"),
},
{
Key: aws.String("copilot-environment"),
Value: aws.String("test"),
},
},
StackName: aws.String("task-database"),
RoleARN: aws.String("arn:aws:iam::123456789012:role/appname-test-CFNExecutionRole"),
}
var mockDescription2 = &cloudformation.StackDescription{
Tags: []*awscfn.Tag{
{
Key: aws.String("copilot-task"),
},
{
Key: aws.String("copilot-application"),
Value: aws.String("otherapp"),
},
{
Key: aws.String("copilot-environment"),
Value: aws.String("test"),
},
},
StackName: aws.String("task-example"),
RoleARN: aws.String("arn:aws:iam::123456789012:role/otherapp-staging-CFNExecutionRole"),
}
var mockDescription3 = &cloudformation.StackDescription{
Tags: []*awscfn.Tag{
{
Key: aws.String("copilot-task"),
},
},
StackName: aws.String("task-default"),
RoleARN: aws.String(""),
}
func TestCloudFormation_ListTaskStacks(t *testing.T) {
testCases := map[string]struct {
inAppName string
mockClient func(*mocks.MockcfnClient)
wantedErr string
wantedTasks []deploy.TaskStackInfo
}{
"successfully gets task stacks while excluding wrongly tagged stack": {
inAppName: "appname",
mockClient: func(m *mocks.MockcfnClient) {
m.EXPECT().ListStacksWithTags(map[string]string{
"copilot-application": "appname",
"copilot-environment": "test",
"copilot-task": "",
}).Return([]cloudformation.StackDescription{
*mockDescription1,
}, nil)
},
wantedTasks: []deploy.TaskStackInfo{
{
StackName: "task-database",
App: "appname",
Env: "test",
RoleARN: aws.StringValue(mockDescription1.RoleARN),
},
},
},
"error listing stacks": {
inAppName: "appname",
mockClient: func(m *mocks.MockcfnClient) {
m.EXPECT().ListStacksWithTags(gomock.Any()).Return(nil, errors.New("some error"))
},
wantedErr: "some error",
},
}
for name, tc := range testCases {
t.Run(name, func(t *testing.T) {
// GIVEN
ctrl := gomock.NewController(t)
defer ctrl.Finish()
mockCf := mocks.NewMockcfnClient(ctrl)
tc.mockClient(mockCf)
cf := CloudFormation{cfnClient: mockCf}
// WHEN
tasks, err := cf.ListTaskStacks("appname", "test")
if tc.wantedErr != "" {
require.EqualError(t, err, tc.wantedErr)
} else {
require.Equal(t, tc.wantedTasks, tasks)
}
})
}
}
func TestCloudFormation_GetTaskDefaultStackInfo(t *testing.T) {
testCases := map[string]struct {
inAppName string
mockClient func(*mocks.MockcfnClient)
wantedErr string
wantedTasks []deploy.TaskStackInfo
}{
"successfully gets task stacks while excluding wrongly tagged stack": {
inAppName: "appname",
mockClient: func(m *mocks.MockcfnClient) {
m.EXPECT().ListStacksWithTags(map[string]string{
"copilot-task": "",
}).Return([]cloudformation.StackDescription{
*mockDescription1,
*mockDescription2,
*mockDescription3,
}, nil)
},
wantedTasks: []deploy.TaskStackInfo{
{
StackName: "task-default",
},
},
},
"error listing stacks": {
inAppName: "appname",
mockClient: func(m *mocks.MockcfnClient) {
m.EXPECT().ListStacksWithTags(gomock.Any()).Return(nil, errors.New("some error"))
},
wantedErr: "some error",
},
}
for name, tc := range testCases {
t.Run(name, func(t *testing.T) {
// GIVEN
ctrl := gomock.NewController(t)
defer ctrl.Finish()
mockCf := mocks.NewMockcfnClient(ctrl)
tc.mockClient(mockCf)
cf := CloudFormation{cfnClient: mockCf}
// WHEN
tasks, err := cf.ListDefaultTaskStacks()
if tc.wantedErr != "" {
require.EqualError(t, err, tc.wantedErr)
} else {
require.Equal(t, tc.wantedTasks, tasks)
}
})
}
}
| 215 |
copilot-cli | aws | Go | // Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
// SPDX-License-Identifier: Apache-2.0
package cloudformation
import (
"fmt"
"strings"
"github.com/aws/copilot-cli/internal/pkg/aws/cloudformation"
"github.com/aws/copilot-cli/internal/pkg/deploy"
"github.com/aws/copilot-cli/internal/pkg/template/artifactpath"
)
// DeployService deploys a service stack and renders progress updates to out until the deployment is done.
// If the service stack doesn't exist, then it creates the stack.
// If the service stack already exists, it updates the stack.
func (cf CloudFormation) DeployService(conf StackConfiguration, bucketName string, opts ...cloudformation.StackOption) error {
templateURL, err := cf.uploadStackTemplateToS3(bucketName, conf)
if err != nil {
return err
}
stack, err := toStackFromS3(conf, templateURL)
if err != nil {
return err
}
for _, opt := range opts {
opt(stack)
}
return cf.executeAndRenderChangeSet(cf.newUpsertChangeSetInput(cf.console, stack))
}
type uploadableStack interface {
StackName() string
Template() (string, error)
}
func (cf CloudFormation) uploadStackTemplateToS3(bucket string, stack uploadableStack) (string, error) {
tmpl, err := stack.Template()
if err != nil {
return "", fmt.Errorf("generate template: %w", err)
}
url, err := cf.s3Client.Upload(bucket, artifactpath.CFNTemplate(stack.StackName(), []byte(tmpl)), strings.NewReader(tmpl))
if err != nil {
return "", err
}
return url, nil
}
func (cf CloudFormation) handleStackError(stackName string, err error) error {
if err == nil {
return nil
}
reasons, describeErr := cf.errorEvents(stackName)
if describeErr != nil {
return fmt.Errorf("%w: describe stack: %v", err, describeErr)
}
if len(reasons) == 0 {
return err
}
return fmt.Errorf("%w: %s", err, reasons[0])
}
// DeleteWorkload removes the CloudFormation stack of a deployed workload.
func (cf CloudFormation) DeleteWorkload(in deploy.DeleteWorkloadInput) error {
stackName := fmt.Sprintf("%s-%s-%s", in.AppName, in.EnvName, in.Name)
description := fmt.Sprintf("Delete stack %s", stackName)
return cf.deleteAndRenderStack(stackName, description, func() error {
return cf.cfnClient.DeleteAndWaitWithRoleARN(stackName, in.ExecutionRoleARN)
})
}
| 72 |
copilot-cli | aws | Go | // Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
// SPDX-License-Identifier: Apache-2.0
package cloudformation
import (
"errors"
"testing"
"github.com/aws/copilot-cli/internal/pkg/aws/cloudformation"
"github.com/aws/aws-sdk-go/aws"
sdkcloudformation "github.com/aws/aws-sdk-go/service/cloudformation"
"github.com/aws/copilot-cli/internal/pkg/deploy"
"github.com/aws/copilot-cli/internal/pkg/deploy/cloudformation/mocks"
"github.com/golang/mock/gomock"
"github.com/stretchr/testify/require"
)
type mockStackConfig struct {
name string
template string
tags map[string]string
parameters map[string]string
}
func (m *mockStackConfig) StackName() string {
return m.name
}
func (m *mockStackConfig) Template() (string, error) {
return m.template, nil
}
func (m *mockStackConfig) Parameters() ([]*sdkcloudformation.Parameter, error) {
var params []*sdkcloudformation.Parameter
for k, v := range m.parameters {
params = append(params, &sdkcloudformation.Parameter{
ParameterKey: aws.String(k),
ParameterValue: aws.String(v),
})
}
return params, nil
}
func (m *mockStackConfig) SerializedParameters() (string, error) {
return "", nil
}
func (m *mockStackConfig) Tags() []*sdkcloudformation.Tag {
var tags []*sdkcloudformation.Tag
for k, v := range m.tags {
tags = append(tags, &sdkcloudformation.Tag{
Key: aws.String(k),
Value: aws.String(v),
})
}
return tags
}
func TestCloudFormation_DeployService(t *testing.T) {
serviceConfig := &mockStackConfig{
name: "myapp-myenv-mysvc",
template: "template",
parameters: map[string]string{
"port": "80",
},
tags: map[string]string{
"app": "myapp",
},
}
when := func(cf CloudFormation) error {
return cf.DeployService(serviceConfig, "mockBucket")
}
t.Run("returns a wrapped error if pushing to s3 bucket fails", func(t *testing.T) {
testDeployWorkload_OnPushToS3Failure(t, when)
})
t.Run("returns a wrapped error if creating a change set fails", func(t *testing.T) {
testDeployWorkload_OnCreateChangeSetFailure(t, when)
})
t.Run("calls Update if stack is already created and returns wrapped error if Update fails", func(t *testing.T) {
testDeployWorkload_OnUpdateChangeSetFailure(t, when)
})
t.Run("returns an error when the ChangeSet cannot be described for stack changes before rendering", func(t *testing.T) {
testDeployWorkload_OnDescribeChangeSetFailure(t, when)
})
t.Run("returns an error when stack template body cannot be retrieved to parse resource descriptions", func(t *testing.T) {
testDeployWorkload_OnTemplateBodyFailure(t, when)
})
t.Run("returns a wrapped error if a streamer fails and cancels the renderer", func(t *testing.T) {
testDeployWorkload_StackStreamerFailureShouldCancelRenderer(t, when)
})
t.Run("returns an error if stack creation fails", func(t *testing.T) {
testDeployWorkload_StreamUntilStackCreationFails(t, "myapp-myenv-mysvc", when)
})
t.Run("renders a stack with an EnvController that triggers no Env Stack updates", func(t *testing.T) {
testDeployWorkload_WithEnvControllerRenderer_NoStackUpdates(t, "myapp-myenv-mysvc", when)
})
t.Run("renders a stack with an ECS service", func(t *testing.T) {
testDeployWorkload_RenderNewlyCreatedStackWithECSService(t, "myapp-myenv-mysvc", when)
})
t.Run("renders a stack with addons template if stack creation is successful", func(t *testing.T) {
testDeployWorkload_RenderNewlyCreatedStackWithAddons(t, "myapp-myenv-mysvc", when)
})
}
func TestCloudFormation_DeleteWorkload(t *testing.T) {
in := deploy.DeleteWorkloadInput{
Name: "webhook",
EnvName: "test",
AppName: "kudos",
}
testCases := map[string]struct {
createMock func(ctrl *gomock.Controller) cfnClient
wanted error
}{
"should short-circuit if the stack is already deleted when retrieving the template body": {
createMock: func(ctrl *gomock.Controller) cfnClient {
m := mocks.NewMockcfnClient(ctrl)
m.EXPECT().TemplateBody(gomock.Any()).Return("", &cloudformation.ErrStackNotFound{})
return m
},
},
"should return a wrapped error if retrieving the template body fails unexpectedly": {
createMock: func(ctrl *gomock.Controller) cfnClient {
m := mocks.NewMockcfnClient(ctrl)
m.EXPECT().TemplateBody(gomock.Any()).Return("", errors.New("some error"))
return m
},
wanted: errors.New(`get template body of stack "kudos-test-webhook": some error`),
},
"should short-circuit if stack is deleted while retrieving the stack ID": {
createMock: func(ctrl *gomock.Controller) cfnClient {
m := mocks.NewMockcfnClient(ctrl)
m.EXPECT().TemplateBody(gomock.Any()).Return("", nil)
m.EXPECT().Describe(gomock.Any()).Return(nil, &cloudformation.ErrStackNotFound{})
return m
},
},
"should return a wrapped error if retrieving the stack ID fails unexpectedly": {
createMock: func(ctrl *gomock.Controller) cfnClient {
m := mocks.NewMockcfnClient(ctrl)
m.EXPECT().TemplateBody(gomock.Any()).Return("", nil)
m.EXPECT().Describe(gomock.Any()).Return(nil, errors.New("some error"))
return m
},
wanted: errors.New(`retrieve the stack ID for stack "kudos-test-webhook": some error`),
},
"should return the error as is if the deletion function fails unexpectedly": {
createMock: func(ctrl *gomock.Controller) cfnClient {
m := mocks.NewMockcfnClient(ctrl)
m.EXPECT().TemplateBody(gomock.Any()).Return("", nil)
m.EXPECT().Describe(gomock.Any()).Return(&cloudformation.StackDescription{
StackId: aws.String("stack/webhook/1111"),
}, nil)
m.EXPECT().DeleteAndWaitWithRoleARN(gomock.Any(), gomock.Any()).Return(errors.New("some error"))
m.EXPECT().DescribeStackEvents(gomock.Any()).Return(&sdkcloudformation.DescribeStackEventsOutput{}, nil).AnyTimes()
return m
},
wanted: errors.New("some error"),
},
"should return the error as is if the progress renderer fails unexpectedly": {
createMock: func(ctrl *gomock.Controller) cfnClient {
m := mocks.NewMockcfnClient(ctrl)
m.EXPECT().TemplateBody(gomock.Any()).Return("", nil)
m.EXPECT().Describe(gomock.Any()).Return(&cloudformation.StackDescription{
StackId: aws.String("stack/webhook/1111"),
}, nil)
m.EXPECT().DeleteAndWaitWithRoleARN(gomock.Any(), gomock.Any()).Return(nil)
m.EXPECT().DescribeStackEvents(gomock.Any()).Return(nil, errors.New("some error"))
return m
},
wanted: errors.New("describe stack events stack/webhook/1111: some error"),
},
"should return nil if the deletion function tries to delete an already deleted stack": {
createMock: func(ctrl *gomock.Controller) cfnClient {
m := mocks.NewMockcfnClient(ctrl)
m.EXPECT().TemplateBody(gomock.Any()).Return("", nil)
m.EXPECT().Describe(gomock.Any()).Return(&cloudformation.StackDescription{
StackId: aws.String("stack/webhook/1111"),
}, nil)
m.EXPECT().DeleteAndWaitWithRoleARN(gomock.Any(), gomock.Any()).Return(&cloudformation.ErrStackNotFound{})
m.EXPECT().DescribeStackEvents(gomock.Any()).Return(&sdkcloudformation.DescribeStackEventsOutput{}, nil).AnyTimes()
return m
},
},
}
for name, tc := range testCases {
t.Run(name, func(t *testing.T) {
// GIVEN
ctrl := gomock.NewController(t)
defer ctrl.Finish()
c := CloudFormation{
cfnClient: tc.createMock(ctrl),
console: new(discardFile),
}
// WHEN
err := c.DeleteWorkload(in)
// THEN
if tc.wanted != nil {
require.EqualError(t, err, tc.wanted.Error())
} else {
require.NoError(t, err)
}
})
}
}
| 214 |
copilot-cli | aws | Go | // Code generated by MockGen. DO NOT EDIT.
// Source: ./internal/pkg/deploy/cloudformation/cloudformation.go
// Package mocks is a generated GoMock package.
package mocks
import (
context "context"
io "io"
reflect "reflect"
cloudformation "github.com/aws/aws-sdk-go/service/cloudformation"
cloudformation0 "github.com/aws/copilot-cli/internal/pkg/aws/cloudformation"
stackset "github.com/aws/copilot-cli/internal/pkg/aws/cloudformation/stackset"
cloudwatch "github.com/aws/copilot-cli/internal/pkg/aws/cloudwatch"
ecs "github.com/aws/copilot-cli/internal/pkg/aws/ecs"
gomock "github.com/golang/mock/gomock"
)
// MockStackConfiguration is a mock of StackConfiguration interface.
type MockStackConfiguration struct {
ctrl *gomock.Controller
recorder *MockStackConfigurationMockRecorder
}
// MockStackConfigurationMockRecorder is the mock recorder for MockStackConfiguration.
type MockStackConfigurationMockRecorder struct {
mock *MockStackConfiguration
}
// NewMockStackConfiguration creates a new mock instance.
func NewMockStackConfiguration(ctrl *gomock.Controller) *MockStackConfiguration {
mock := &MockStackConfiguration{ctrl: ctrl}
mock.recorder = &MockStackConfigurationMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockStackConfiguration) EXPECT() *MockStackConfigurationMockRecorder {
return m.recorder
}
// Parameters mocks base method.
func (m *MockStackConfiguration) Parameters() ([]*cloudformation.Parameter, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "Parameters")
ret0, _ := ret[0].([]*cloudformation.Parameter)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// Parameters indicates an expected call of Parameters.
func (mr *MockStackConfigurationMockRecorder) Parameters() *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Parameters", reflect.TypeOf((*MockStackConfiguration)(nil).Parameters))
}
// SerializedParameters mocks base method.
func (m *MockStackConfiguration) SerializedParameters() (string, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "SerializedParameters")
ret0, _ := ret[0].(string)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// SerializedParameters indicates an expected call of SerializedParameters.
func (mr *MockStackConfigurationMockRecorder) SerializedParameters() *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "SerializedParameters", reflect.TypeOf((*MockStackConfiguration)(nil).SerializedParameters))
}
// StackName mocks base method.
func (m *MockStackConfiguration) StackName() string {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "StackName")
ret0, _ := ret[0].(string)
return ret0
}
// StackName indicates an expected call of StackName.
func (mr *MockStackConfigurationMockRecorder) StackName() *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "StackName", reflect.TypeOf((*MockStackConfiguration)(nil).StackName))
}
// Tags mocks base method.
func (m *MockStackConfiguration) Tags() []*cloudformation.Tag {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "Tags")
ret0, _ := ret[0].([]*cloudformation.Tag)
return ret0
}
// Tags indicates an expected call of Tags.
func (mr *MockStackConfigurationMockRecorder) Tags() *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Tags", reflect.TypeOf((*MockStackConfiguration)(nil).Tags))
}
// Template mocks base method.
func (m *MockStackConfiguration) Template() (string, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "Template")
ret0, _ := ret[0].(string)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// Template indicates an expected call of Template.
func (mr *MockStackConfigurationMockRecorder) Template() *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Template", reflect.TypeOf((*MockStackConfiguration)(nil).Template))
}
// MockOverrider is a mock of Overrider interface.
type MockOverrider struct {
ctrl *gomock.Controller
recorder *MockOverriderMockRecorder
}
// MockOverriderMockRecorder is the mock recorder for MockOverrider.
type MockOverriderMockRecorder struct {
mock *MockOverrider
}
// NewMockOverrider creates a new mock instance.
func NewMockOverrider(ctrl *gomock.Controller) *MockOverrider {
mock := &MockOverrider{ctrl: ctrl}
mock.recorder = &MockOverriderMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockOverrider) EXPECT() *MockOverriderMockRecorder {
return m.recorder
}
// Override mocks base method.
func (m *MockOverrider) Override(body []byte) ([]byte, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "Override", body)
ret0, _ := ret[0].([]byte)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// Override indicates an expected call of Override.
func (mr *MockOverriderMockRecorder) Override(body interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Override", reflect.TypeOf((*MockOverrider)(nil).Override), body)
}
// MockecsClient is a mock of ecsClient interface.
type MockecsClient struct {
ctrl *gomock.Controller
recorder *MockecsClientMockRecorder
}
// MockecsClientMockRecorder is the mock recorder for MockecsClient.
type MockecsClientMockRecorder struct {
mock *MockecsClient
}
// NewMockecsClient creates a new mock instance.
func NewMockecsClient(ctrl *gomock.Controller) *MockecsClient {
mock := &MockecsClient{ctrl: ctrl}
mock.recorder = &MockecsClientMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockecsClient) EXPECT() *MockecsClientMockRecorder {
return m.recorder
}
// Service mocks base method.
func (m *MockecsClient) Service(clusterName, serviceName string) (*ecs.Service, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "Service", clusterName, serviceName)
ret0, _ := ret[0].(*ecs.Service)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// Service indicates an expected call of Service.
func (mr *MockecsClientMockRecorder) Service(clusterName, serviceName interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Service", reflect.TypeOf((*MockecsClient)(nil).Service), clusterName, serviceName)
}
// MockcwClient is a mock of cwClient interface.
type MockcwClient struct {
ctrl *gomock.Controller
recorder *MockcwClientMockRecorder
}
// MockcwClientMockRecorder is the mock recorder for MockcwClient.
type MockcwClientMockRecorder struct {
mock *MockcwClient
}
// NewMockcwClient creates a new mock instance.
func NewMockcwClient(ctrl *gomock.Controller) *MockcwClient {
mock := &MockcwClient{ctrl: ctrl}
mock.recorder = &MockcwClientMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockcwClient) EXPECT() *MockcwClientMockRecorder {
return m.recorder
}
// AlarmStatuses mocks base method.
func (m *MockcwClient) AlarmStatuses(opts ...cloudwatch.DescribeAlarmOpts) ([]cloudwatch.AlarmStatus, error) {
m.ctrl.T.Helper()
varargs := []interface{}{}
for _, a := range opts {
varargs = append(varargs, a)
}
ret := m.ctrl.Call(m, "AlarmStatuses", varargs...)
ret0, _ := ret[0].([]cloudwatch.AlarmStatus)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// AlarmStatuses indicates an expected call of AlarmStatuses.
func (mr *MockcwClientMockRecorder) AlarmStatuses(opts ...interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "AlarmStatuses", reflect.TypeOf((*MockcwClient)(nil).AlarmStatuses), opts...)
}
// MockcfnClient is a mock of cfnClient interface.
type MockcfnClient struct {
ctrl *gomock.Controller
recorder *MockcfnClientMockRecorder
}
// MockcfnClientMockRecorder is the mock recorder for MockcfnClient.
type MockcfnClientMockRecorder struct {
mock *MockcfnClient
}
// NewMockcfnClient creates a new mock instance.
func NewMockcfnClient(ctrl *gomock.Controller) *MockcfnClient {
mock := &MockcfnClient{ctrl: ctrl}
mock.recorder = &MockcfnClientMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockcfnClient) EXPECT() *MockcfnClientMockRecorder {
return m.recorder
}
// Create mocks base method.
func (m *MockcfnClient) Create(arg0 *cloudformation0.Stack) (string, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "Create", arg0)
ret0, _ := ret[0].(string)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// Create indicates an expected call of Create.
func (mr *MockcfnClientMockRecorder) Create(arg0 interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Create", reflect.TypeOf((*MockcfnClient)(nil).Create), arg0)
}
// CreateAndWait mocks base method.
func (m *MockcfnClient) CreateAndWait(arg0 *cloudformation0.Stack) error {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "CreateAndWait", arg0)
ret0, _ := ret[0].(error)
return ret0
}
// CreateAndWait indicates an expected call of CreateAndWait.
func (mr *MockcfnClientMockRecorder) CreateAndWait(arg0 interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "CreateAndWait", reflect.TypeOf((*MockcfnClient)(nil).CreateAndWait), arg0)
}
// Delete mocks base method.
func (m *MockcfnClient) Delete(stackName string) error {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "Delete", stackName)
ret0, _ := ret[0].(error)
return ret0
}
// Delete indicates an expected call of Delete.
func (mr *MockcfnClientMockRecorder) Delete(stackName interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Delete", reflect.TypeOf((*MockcfnClient)(nil).Delete), stackName)
}
// DeleteAndWait mocks base method.
func (m *MockcfnClient) DeleteAndWait(stackName string) error {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "DeleteAndWait", stackName)
ret0, _ := ret[0].(error)
return ret0
}
// DeleteAndWait indicates an expected call of DeleteAndWait.
func (mr *MockcfnClientMockRecorder) DeleteAndWait(stackName interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DeleteAndWait", reflect.TypeOf((*MockcfnClient)(nil).DeleteAndWait), stackName)
}
// DeleteAndWaitWithRoleARN mocks base method.
func (m *MockcfnClient) DeleteAndWaitWithRoleARN(stackName, roleARN string) error {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "DeleteAndWaitWithRoleARN", stackName, roleARN)
ret0, _ := ret[0].(error)
return ret0
}
// DeleteAndWaitWithRoleARN indicates an expected call of DeleteAndWaitWithRoleARN.
func (mr *MockcfnClientMockRecorder) DeleteAndWaitWithRoleARN(stackName, roleARN interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DeleteAndWaitWithRoleARN", reflect.TypeOf((*MockcfnClient)(nil).DeleteAndWaitWithRoleARN), stackName, roleARN)
}
// Describe mocks base method.
func (m *MockcfnClient) Describe(stackName string) (*cloudformation0.StackDescription, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "Describe", stackName)
ret0, _ := ret[0].(*cloudformation0.StackDescription)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// Describe indicates an expected call of Describe.
func (mr *MockcfnClientMockRecorder) Describe(stackName interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Describe", reflect.TypeOf((*MockcfnClient)(nil).Describe), stackName)
}
// DescribeChangeSet mocks base method.
func (m *MockcfnClient) DescribeChangeSet(changeSetID, stackName string) (*cloudformation0.ChangeSetDescription, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "DescribeChangeSet", changeSetID, stackName)
ret0, _ := ret[0].(*cloudformation0.ChangeSetDescription)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// DescribeChangeSet indicates an expected call of DescribeChangeSet.
func (mr *MockcfnClientMockRecorder) DescribeChangeSet(changeSetID, stackName interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DescribeChangeSet", reflect.TypeOf((*MockcfnClient)(nil).DescribeChangeSet), changeSetID, stackName)
}
// DescribeStackEvents mocks base method.
func (m *MockcfnClient) DescribeStackEvents(arg0 *cloudformation.DescribeStackEventsInput) (*cloudformation.DescribeStackEventsOutput, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "DescribeStackEvents", arg0)
ret0, _ := ret[0].(*cloudformation.DescribeStackEventsOutput)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// DescribeStackEvents indicates an expected call of DescribeStackEvents.
func (mr *MockcfnClientMockRecorder) DescribeStackEvents(arg0 interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DescribeStackEvents", reflect.TypeOf((*MockcfnClient)(nil).DescribeStackEvents), arg0)
}
// ErrorEvents mocks base method.
func (m *MockcfnClient) ErrorEvents(stackName string) ([]cloudformation0.StackEvent, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "ErrorEvents", stackName)
ret0, _ := ret[0].([]cloudformation0.StackEvent)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// ErrorEvents indicates an expected call of ErrorEvents.
func (mr *MockcfnClientMockRecorder) ErrorEvents(stackName interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ErrorEvents", reflect.TypeOf((*MockcfnClient)(nil).ErrorEvents), stackName)
}
// Events mocks base method.
func (m *MockcfnClient) Events(stackName string) ([]cloudformation0.StackEvent, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "Events", stackName)
ret0, _ := ret[0].([]cloudformation0.StackEvent)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// Events indicates an expected call of Events.
func (mr *MockcfnClientMockRecorder) Events(stackName interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Events", reflect.TypeOf((*MockcfnClient)(nil).Events), stackName)
}
// ListStacksWithTags mocks base method.
func (m *MockcfnClient) ListStacksWithTags(tags map[string]string) ([]cloudformation0.StackDescription, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "ListStacksWithTags", tags)
ret0, _ := ret[0].([]cloudformation0.StackDescription)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// ListStacksWithTags indicates an expected call of ListStacksWithTags.
func (mr *MockcfnClientMockRecorder) ListStacksWithTags(tags interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ListStacksWithTags", reflect.TypeOf((*MockcfnClient)(nil).ListStacksWithTags), tags)
}
// Metadata mocks base method.
func (m *MockcfnClient) Metadata(opts cloudformation0.MetadataOpts) (string, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "Metadata", opts)
ret0, _ := ret[0].(string)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// Metadata indicates an expected call of Metadata.
func (mr *MockcfnClientMockRecorder) Metadata(opts interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Metadata", reflect.TypeOf((*MockcfnClient)(nil).Metadata), opts)
}
// Outputs mocks base method.
func (m *MockcfnClient) Outputs(stack *cloudformation0.Stack) (map[string]string, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "Outputs", stack)
ret0, _ := ret[0].(map[string]string)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// Outputs indicates an expected call of Outputs.
func (mr *MockcfnClientMockRecorder) Outputs(stack interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Outputs", reflect.TypeOf((*MockcfnClient)(nil).Outputs), stack)
}
// StackResources mocks base method.
func (m *MockcfnClient) StackResources(name string) ([]*cloudformation0.StackResource, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "StackResources", name)
ret0, _ := ret[0].([]*cloudformation0.StackResource)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// StackResources indicates an expected call of StackResources.
func (mr *MockcfnClientMockRecorder) StackResources(name interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "StackResources", reflect.TypeOf((*MockcfnClient)(nil).StackResources), name)
}
// TemplateBody mocks base method.
func (m *MockcfnClient) TemplateBody(stackName string) (string, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "TemplateBody", stackName)
ret0, _ := ret[0].(string)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// TemplateBody indicates an expected call of TemplateBody.
func (mr *MockcfnClientMockRecorder) TemplateBody(stackName interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "TemplateBody", reflect.TypeOf((*MockcfnClient)(nil).TemplateBody), stackName)
}
// TemplateBodyFromChangeSet mocks base method.
func (m *MockcfnClient) TemplateBodyFromChangeSet(changeSetID, stackName string) (string, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "TemplateBodyFromChangeSet", changeSetID, stackName)
ret0, _ := ret[0].(string)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// TemplateBodyFromChangeSet indicates an expected call of TemplateBodyFromChangeSet.
func (mr *MockcfnClientMockRecorder) TemplateBodyFromChangeSet(changeSetID, stackName interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "TemplateBodyFromChangeSet", reflect.TypeOf((*MockcfnClient)(nil).TemplateBodyFromChangeSet), changeSetID, stackName)
}
// Update mocks base method.
func (m *MockcfnClient) Update(arg0 *cloudformation0.Stack) (string, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "Update", arg0)
ret0, _ := ret[0].(string)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// Update indicates an expected call of Update.
func (mr *MockcfnClientMockRecorder) Update(arg0 interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Update", reflect.TypeOf((*MockcfnClient)(nil).Update), arg0)
}
// UpdateAndWait mocks base method.
func (m *MockcfnClient) UpdateAndWait(arg0 *cloudformation0.Stack) error {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "UpdateAndWait", arg0)
ret0, _ := ret[0].(error)
return ret0
}
// UpdateAndWait indicates an expected call of UpdateAndWait.
func (mr *MockcfnClientMockRecorder) UpdateAndWait(arg0 interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "UpdateAndWait", reflect.TypeOf((*MockcfnClient)(nil).UpdateAndWait), arg0)
}
// WaitForCreate mocks base method.
func (m *MockcfnClient) WaitForCreate(ctx context.Context, stackName string) error {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "WaitForCreate", ctx, stackName)
ret0, _ := ret[0].(error)
return ret0
}
// WaitForCreate indicates an expected call of WaitForCreate.
func (mr *MockcfnClientMockRecorder) WaitForCreate(ctx, stackName interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "WaitForCreate", reflect.TypeOf((*MockcfnClient)(nil).WaitForCreate), ctx, stackName)
}
// WaitForUpdate mocks base method.
func (m *MockcfnClient) WaitForUpdate(ctx context.Context, stackName string) error {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "WaitForUpdate", ctx, stackName)
ret0, _ := ret[0].(error)
return ret0
}
// WaitForUpdate indicates an expected call of WaitForUpdate.
func (mr *MockcfnClientMockRecorder) WaitForUpdate(ctx, stackName interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "WaitForUpdate", reflect.TypeOf((*MockcfnClient)(nil).WaitForUpdate), ctx, stackName)
}
// MockcodeStarClient is a mock of codeStarClient interface.
type MockcodeStarClient struct {
ctrl *gomock.Controller
recorder *MockcodeStarClientMockRecorder
}
// MockcodeStarClientMockRecorder is the mock recorder for MockcodeStarClient.
type MockcodeStarClientMockRecorder struct {
mock *MockcodeStarClient
}
// NewMockcodeStarClient creates a new mock instance.
func NewMockcodeStarClient(ctrl *gomock.Controller) *MockcodeStarClient {
mock := &MockcodeStarClient{ctrl: ctrl}
mock.recorder = &MockcodeStarClientMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockcodeStarClient) EXPECT() *MockcodeStarClientMockRecorder {
return m.recorder
}
// WaitUntilConnectionStatusAvailable mocks base method.
func (m *MockcodeStarClient) WaitUntilConnectionStatusAvailable(ctx context.Context, connectionARN string) error {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "WaitUntilConnectionStatusAvailable", ctx, connectionARN)
ret0, _ := ret[0].(error)
return ret0
}
// WaitUntilConnectionStatusAvailable indicates an expected call of WaitUntilConnectionStatusAvailable.
func (mr *MockcodeStarClientMockRecorder) WaitUntilConnectionStatusAvailable(ctx, connectionARN interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "WaitUntilConnectionStatusAvailable", reflect.TypeOf((*MockcodeStarClient)(nil).WaitUntilConnectionStatusAvailable), ctx, connectionARN)
}
// MockcodePipelineClient is a mock of codePipelineClient interface.
type MockcodePipelineClient struct {
ctrl *gomock.Controller
recorder *MockcodePipelineClientMockRecorder
}
// MockcodePipelineClientMockRecorder is the mock recorder for MockcodePipelineClient.
type MockcodePipelineClientMockRecorder struct {
mock *MockcodePipelineClient
}
// NewMockcodePipelineClient creates a new mock instance.
func NewMockcodePipelineClient(ctrl *gomock.Controller) *MockcodePipelineClient {
mock := &MockcodePipelineClient{ctrl: ctrl}
mock.recorder = &MockcodePipelineClientMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockcodePipelineClient) EXPECT() *MockcodePipelineClientMockRecorder {
return m.recorder
}
// RetryStageExecution mocks base method.
func (m *MockcodePipelineClient) RetryStageExecution(pipelineName, stageName string) error {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "RetryStageExecution", pipelineName, stageName)
ret0, _ := ret[0].(error)
return ret0
}
// RetryStageExecution indicates an expected call of RetryStageExecution.
func (mr *MockcodePipelineClientMockRecorder) RetryStageExecution(pipelineName, stageName interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "RetryStageExecution", reflect.TypeOf((*MockcodePipelineClient)(nil).RetryStageExecution), pipelineName, stageName)
}
// Mocks3Client is a mock of s3Client interface.
type Mocks3Client struct {
ctrl *gomock.Controller
recorder *Mocks3ClientMockRecorder
}
// Mocks3ClientMockRecorder is the mock recorder for Mocks3Client.
type Mocks3ClientMockRecorder struct {
mock *Mocks3Client
}
// NewMocks3Client creates a new mock instance.
func NewMocks3Client(ctrl *gomock.Controller) *Mocks3Client {
mock := &Mocks3Client{ctrl: ctrl}
mock.recorder = &Mocks3ClientMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *Mocks3Client) EXPECT() *Mocks3ClientMockRecorder {
return m.recorder
}
// Upload mocks base method.
func (m *Mocks3Client) Upload(bucket, fileName string, data io.Reader) (string, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "Upload", bucket, fileName, data)
ret0, _ := ret[0].(string)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// Upload indicates an expected call of Upload.
func (mr *Mocks3ClientMockRecorder) Upload(bucket, fileName, data interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Upload", reflect.TypeOf((*Mocks3Client)(nil).Upload), bucket, fileName, data)
}
// MockstackSetClient is a mock of stackSetClient interface.
type MockstackSetClient struct {
ctrl *gomock.Controller
recorder *MockstackSetClientMockRecorder
}
// MockstackSetClientMockRecorder is the mock recorder for MockstackSetClient.
type MockstackSetClientMockRecorder struct {
mock *MockstackSetClient
}
// NewMockstackSetClient creates a new mock instance.
func NewMockstackSetClient(ctrl *gomock.Controller) *MockstackSetClient {
mock := &MockstackSetClient{ctrl: ctrl}
mock.recorder = &MockstackSetClientMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockstackSetClient) EXPECT() *MockstackSetClientMockRecorder {
return m.recorder
}
// Create mocks base method.
func (m *MockstackSetClient) Create(name, template string, opts ...stackset.CreateOrUpdateOption) error {
m.ctrl.T.Helper()
varargs := []interface{}{name, template}
for _, a := range opts {
varargs = append(varargs, a)
}
ret := m.ctrl.Call(m, "Create", varargs...)
ret0, _ := ret[0].(error)
return ret0
}
// Create indicates an expected call of Create.
func (mr *MockstackSetClientMockRecorder) Create(name, template interface{}, opts ...interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
varargs := append([]interface{}{name, template}, opts...)
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Create", reflect.TypeOf((*MockstackSetClient)(nil).Create), varargs...)
}
// CreateInstances mocks base method.
func (m *MockstackSetClient) CreateInstances(name string, accounts, regions []string) (string, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "CreateInstances", name, accounts, regions)
ret0, _ := ret[0].(string)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// CreateInstances indicates an expected call of CreateInstances.
func (mr *MockstackSetClientMockRecorder) CreateInstances(name, accounts, regions interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "CreateInstances", reflect.TypeOf((*MockstackSetClient)(nil).CreateInstances), name, accounts, regions)
}
// CreateInstancesAndWait mocks base method.
func (m *MockstackSetClient) CreateInstancesAndWait(name string, accounts, regions []string) error {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "CreateInstancesAndWait", name, accounts, regions)
ret0, _ := ret[0].(error)
return ret0
}
// CreateInstancesAndWait indicates an expected call of CreateInstancesAndWait.
func (mr *MockstackSetClientMockRecorder) CreateInstancesAndWait(name, accounts, regions interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "CreateInstancesAndWait", reflect.TypeOf((*MockstackSetClient)(nil).CreateInstancesAndWait), name, accounts, regions)
}
// Delete mocks base method.
func (m *MockstackSetClient) Delete(name string) error {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "Delete", name)
ret0, _ := ret[0].(error)
return ret0
}
// Delete indicates an expected call of Delete.
func (mr *MockstackSetClientMockRecorder) Delete(name interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Delete", reflect.TypeOf((*MockstackSetClient)(nil).Delete), name)
}
// DeleteAllInstances mocks base method.
func (m *MockstackSetClient) DeleteAllInstances(name string) (string, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "DeleteAllInstances", name)
ret0, _ := ret[0].(string)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// DeleteAllInstances indicates an expected call of DeleteAllInstances.
func (mr *MockstackSetClientMockRecorder) DeleteAllInstances(name interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DeleteAllInstances", reflect.TypeOf((*MockstackSetClient)(nil).DeleteAllInstances), name)
}
// Describe mocks base method.
func (m *MockstackSetClient) Describe(name string) (stackset.Description, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "Describe", name)
ret0, _ := ret[0].(stackset.Description)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// Describe indicates an expected call of Describe.
func (mr *MockstackSetClientMockRecorder) Describe(name interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Describe", reflect.TypeOf((*MockstackSetClient)(nil).Describe), name)
}
// DescribeOperation mocks base method.
func (m *MockstackSetClient) DescribeOperation(name, opID string) (stackset.Operation, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "DescribeOperation", name, opID)
ret0, _ := ret[0].(stackset.Operation)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// DescribeOperation indicates an expected call of DescribeOperation.
func (mr *MockstackSetClientMockRecorder) DescribeOperation(name, opID interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DescribeOperation", reflect.TypeOf((*MockstackSetClient)(nil).DescribeOperation), name, opID)
}
// InstanceSummaries mocks base method.
func (m *MockstackSetClient) InstanceSummaries(name string, opts ...stackset.InstanceSummariesOption) ([]stackset.InstanceSummary, error) {
m.ctrl.T.Helper()
varargs := []interface{}{name}
for _, a := range opts {
varargs = append(varargs, a)
}
ret := m.ctrl.Call(m, "InstanceSummaries", varargs...)
ret0, _ := ret[0].([]stackset.InstanceSummary)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// InstanceSummaries indicates an expected call of InstanceSummaries.
func (mr *MockstackSetClientMockRecorder) InstanceSummaries(name interface{}, opts ...interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
varargs := append([]interface{}{name}, opts...)
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "InstanceSummaries", reflect.TypeOf((*MockstackSetClient)(nil).InstanceSummaries), varargs...)
}
// Update mocks base method.
func (m *MockstackSetClient) Update(name, template string, opts ...stackset.CreateOrUpdateOption) (string, error) {
m.ctrl.T.Helper()
varargs := []interface{}{name, template}
for _, a := range opts {
varargs = append(varargs, a)
}
ret := m.ctrl.Call(m, "Update", varargs...)
ret0, _ := ret[0].(string)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// Update indicates an expected call of Update.
func (mr *MockstackSetClientMockRecorder) Update(name, template interface{}, opts ...interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
varargs := append([]interface{}{name, template}, opts...)
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Update", reflect.TypeOf((*MockstackSetClient)(nil).Update), varargs...)
}
// UpdateAndWait mocks base method.
func (m *MockstackSetClient) UpdateAndWait(name, template string, opts ...stackset.CreateOrUpdateOption) error {
m.ctrl.T.Helper()
varargs := []interface{}{name, template}
for _, a := range opts {
varargs = append(varargs, a)
}
ret := m.ctrl.Call(m, "UpdateAndWait", varargs...)
ret0, _ := ret[0].(error)
return ret0
}
// UpdateAndWait indicates an expected call of UpdateAndWait.
func (mr *MockstackSetClientMockRecorder) UpdateAndWait(name, template interface{}, opts ...interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
varargs := append([]interface{}{name, template}, opts...)
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "UpdateAndWait", reflect.TypeOf((*MockstackSetClient)(nil).UpdateAndWait), varargs...)
}
// WaitForOperation mocks base method.
func (m *MockstackSetClient) WaitForOperation(name, opID string) error {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "WaitForOperation", name, opID)
ret0, _ := ret[0].(error)
return ret0
}
// WaitForOperation indicates an expected call of WaitForOperation.
func (mr *MockstackSetClientMockRecorder) WaitForOperation(name, opID interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "WaitForOperation", reflect.TypeOf((*MockstackSetClient)(nil).WaitForOperation), name, opID)
}
// WaitForStackSetLastOperationComplete mocks base method.
func (m *MockstackSetClient) WaitForStackSetLastOperationComplete(name string) error {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "WaitForStackSetLastOperationComplete", name)
ret0, _ := ret[0].(error)
return ret0
}
// WaitForStackSetLastOperationComplete indicates an expected call of WaitForStackSetLastOperationComplete.
func (mr *MockstackSetClientMockRecorder) WaitForStackSetLastOperationComplete(name interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "WaitForStackSetLastOperationComplete", reflect.TypeOf((*MockstackSetClient)(nil).WaitForStackSetLastOperationComplete), name)
}
| 878 |
copilot-cli | aws | Go | // Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
// SPDX-License-Identifier: Apache-2.0
package stack
import (
"fmt"
"sort"
"strings"
"github.com/aws/aws-sdk-go/aws"
"github.com/aws/aws-sdk-go/service/cloudformation"
"gopkg.in/yaml.v3"
"github.com/aws/copilot-cli/internal/pkg/aws/ecr"
"github.com/aws/copilot-cli/internal/pkg/aws/partitions"
"github.com/aws/copilot-cli/internal/pkg/deploy"
"github.com/aws/copilot-cli/internal/pkg/template"
)
// DeployedAppMetadata wraps the Metadata field of a deployed
// application StackSet.
type DeployedAppMetadata struct {
Metadata AppResources `yaml:"Metadata"`
}
// AppResources is a configuration for a deployed Application StackSet.
type AppResources struct {
AppResourcesConfig `yaml:",inline"`
}
// AppResourcesConfig is a configuration for a deployed Application StackSet.
type AppResourcesConfig struct {
Accounts []string `yaml:"Accounts"`
Services []string `yaml:"Services"` // Deprecated since v1.2.0: Use Workloads instead of Services.
Workloads []AppResourcesWorkload `yaml:"Workloads"`
App string `yaml:"App"`
Version int `yaml:"Version"`
}
// AppResourcesWorkload is a workload configuration for a deployed Application StackSet
type AppResourcesWorkload struct {
Name string `yaml:"Name"`
WithECR bool `yaml:"WithECR"`
}
// UnmarshalYAML overrides the default YAML unmarshaling logic for the Image
// struct, allowing it to perform more complex unmarshaling behavior.
// This method implements the yaml.Unmarshaler (v3) interface.
func (s *AppResources) UnmarshalYAML(value *yaml.Node) error {
if err := value.Decode(&s.AppResourcesConfig); err != nil {
return err
}
for _, svc := range s.AppResourcesConfig.Services {
s.AppResourcesConfig.Workloads = append(s.AppResourcesConfig.Workloads, AppResourcesWorkload{
Name: svc,
WithECR: true,
})
}
s.Services = nil
return nil
}
// AppStackConfig is for providing all the values to set up an
// environment stack and to interpret the outputs from it.
type AppStackConfig struct {
*deploy.CreateAppInput
parser template.ReadParser
}
// AppRegionalResources represent application resources that are regional.
type AppRegionalResources struct {
Region string // The region these resources are in.
KMSKeyARN string // A KMS Key ARN for encrypting Pipeline artifacts.
S3Bucket string // A bucket used for any Copilot artifacts that must be stored in S3 (pipelines, env files, etc).
RepositoryURLs map[string]string // The image repository URLs by service name.
}
const (
appTemplatePath = "app/app.yml"
appResourcesTemplatePath = "app/cf.yml"
appAdminRoleParamName = "AdminRoleName"
appExecutionRoleParamName = "ExecutionRoleName"
appDNSDelegationRoleParamName = "DNSDelegationRoleName"
appOutputKMSKey = "KMSKeyARN" // Name of the CloudFormation Output that holds the KMS Key ARN to encrypt artifact buckets.
appOutputS3Bucket = "PipelineBucket" // Name of the CloudFormation Output that holds the Artifact Bucket name.
appOutputECRRepoPrefix = "ECRRepo" // Prefix of the CloudFormation Output name that holds the ECR image repository ARN for each service.
appDNSDelegatedAccountsKey = "AppDNSDelegatedAccounts"
appDomainNameKey = "AppDomainName"
appDomainHostedZoneIDKey = "AppDomainHostedZoneID"
appNameKey = "AppName"
// arn:${partition}:iam::${account}:role/${roleName}
fmtStackSetAdminRoleARN = "arn:%s:iam::%s:role/%s"
)
var cfTemplateFunctions = map[string]interface{}{
"logicalIDSafe": template.ReplaceDashesFunc,
}
// AppConfigFrom takes a template file and extracts the metadata block,
// and parses it into an AppStackConfig
func AppConfigFrom(template *string) (*AppResourcesConfig, error) {
resourceConfig := DeployedAppMetadata{}
err := yaml.Unmarshal([]byte(*template), &resourceConfig)
return &resourceConfig.Metadata.AppResourcesConfig, err
}
// NewAppStackConfig sets up a struct which can provide values to CloudFormation for
// spinning up an environment.
func NewAppStackConfig(in *deploy.CreateAppInput) *AppStackConfig {
return &AppStackConfig{
CreateAppInput: in,
parser: template.New(),
}
}
// Template returns the application CloudFormation template.
func (c *AppStackConfig) Template() (string, error) {
content, err := c.parser.Parse(appTemplatePath, struct {
TemplateVersion string
AppDNSDelegatedAccounts []string
Domain string
Name string
PermissionsBoundary string
}{
c.Version,
c.dnsDelegationAccounts(),
c.DomainName,
c.Name,
c.PermissionsBoundary,
}, template.WithFuncs(map[string]any{
"join": strings.Join,
}))
if err != nil {
return "", err
}
return content.String(), nil
}
// ResourceTemplate generates a StackSet template with all the Application-wide resources (ECR Repos, KMS keys, S3 buckets)
func (c *AppStackConfig) ResourceTemplate(config *AppResourcesConfig) (string, error) {
// Sort the account IDs and Services so that the template we generate is deterministic
sort.Strings(config.Accounts)
sort.SliceStable(config.Workloads, func(i, j int) bool {
return config.Workloads[i].Name < config.Workloads[j].Name
})
content, err := c.parser.Parse(appResourcesTemplatePath, struct {
*AppResourcesConfig
ServiceTagKey string
TemplateVersion string
}{
config,
deploy.ServiceTagKey,
c.Version,
}, template.WithFuncs(cfTemplateFunctions))
if err != nil {
return "", err
}
return content.String(), err
}
// Parameters returns a list of parameters which accompany the app CloudFormation template.
func (c *AppStackConfig) Parameters() ([]*cloudformation.Parameter, error) {
return []*cloudformation.Parameter{
{
ParameterKey: aws.String(appAdminRoleParamName),
ParameterValue: aws.String(c.stackSetAdminRoleName()),
},
{
ParameterKey: aws.String(appExecutionRoleParamName),
ParameterValue: aws.String(c.StackSetExecutionRoleName()),
},
{
ParameterKey: aws.String(appDNSDelegatedAccountsKey),
ParameterValue: aws.String(strings.Join(c.dnsDelegationAccounts(), ",")),
},
{
ParameterKey: aws.String(appDomainNameKey),
ParameterValue: aws.String(c.DomainName),
},
{
ParameterKey: aws.String(appDomainHostedZoneIDKey),
ParameterValue: aws.String(c.DomainHostedZoneID),
},
{
ParameterKey: aws.String(appNameKey),
ParameterValue: aws.String(c.Name),
},
{
ParameterKey: aws.String(appDNSDelegationRoleParamName),
ParameterValue: aws.String(deploy.DNSDelegationRoleName(c.Name)),
},
}, nil
}
// SerializedParameters returns the CloudFormation stack's parameters serialized to a JSON document.
func (s *AppStackConfig) SerializedParameters() (string, error) {
// No-op for now.
return "", nil
}
// Tags returns the tags that should be applied to the Application CloudFormation stack.
func (c *AppStackConfig) Tags() []*cloudformation.Tag {
return mergeAndFlattenTags(c.AdditionalTags, map[string]string{
deploy.AppTagKey: c.Name,
})
}
// StackName returns the name of the CloudFormation stack (based on the application name).
func (c *AppStackConfig) StackName() string {
return NameForAppStack(c.Name)
}
// StackSetName returns the name of the CloudFormation StackSet (based on the application name).
func (c *AppStackConfig) StackSetName() string {
return NameForAppStackSet(c.Name)
}
// StackSetDescription returns the description of the StackSet for application resources.
func (c *AppStackConfig) StackSetDescription() string {
return "ECS CLI Application Resources (ECR repos, KMS keys, S3 buckets)"
}
func (c *AppStackConfig) stackSetAdminRoleName() string {
return fmt.Sprintf("%s-adminrole", c.Name)
}
// StackSetAdminRoleARN returns the role ARN of the role used to administer the Application
// StackSet.
func (c *AppStackConfig) StackSetAdminRoleARN(region string) (string, error) {
partition, err := partitions.Region(region).Partition()
if err != nil {
return "", err
}
return fmt.Sprintf(fmtStackSetAdminRoleARN, partition.ID(), c.AccountID, c.stackSetAdminRoleName()), nil
}
// StackSetExecutionRoleName returns the role name of the role used to actually create
// Application resources.
func (c *AppStackConfig) StackSetExecutionRoleName() string {
return fmt.Sprintf("%s-executionrole", c.Name)
}
func (c *AppStackConfig) dnsDelegationAccounts() []string {
accounts := append(c.CreateAppInput.DNSDelegationAccounts, c.CreateAppInput.AccountID)
accountIDs := make(map[string]bool)
var uniqueAccountIDs []string
for _, entry := range accounts {
if _, value := accountIDs[entry]; !value {
accountIDs[entry] = true
uniqueAccountIDs = append(uniqueAccountIDs, entry)
}
}
return uniqueAccountIDs
}
// ToAppRegionalResources takes an Application Resource Stack Instance stack, reads the output resources
// and returns a modeled ProjectRegionalResources.
func ToAppRegionalResources(stack *cloudformation.Stack) (*AppRegionalResources, error) {
regionalResources := AppRegionalResources{
RepositoryURLs: map[string]string{},
}
for _, output := range stack.Outputs {
key := *output.OutputKey
value := *output.OutputValue
switch {
case key == appOutputKMSKey:
regionalResources.KMSKeyARN = value
case key == appOutputS3Bucket:
regionalResources.S3Bucket = value
case strings.HasPrefix(key, appOutputECRRepoPrefix):
// If the output starts with the ECR Repo Prefix,
// we'll pull the ARN out and construct a URL from it.
uri, err := ecr.URIFromARN(value)
if err != nil {
return nil, err
}
// The service name for this repo is the Logical ID without
// the ECR Repo prefix.
safeSvcName := strings.TrimPrefix(key, appOutputECRRepoPrefix)
// It's possible we had to sanitize the service name (removing dashes),
// so return it back to its original form.
originalSvcName := template.DashReplacedLogicalIDToOriginal(safeSvcName)
regionalResources.RepositoryURLs[originalSvcName] = uri
}
}
// Check to make sure the KMS key and S3 bucket exist in the stack. There isn't guranteed
// to be any ECR repos (for a brand new env without any services), so we don't validate that.
if regionalResources.KMSKeyARN == "" {
return nil, fmt.Errorf("couldn't find KMS output key %s in stack %s", appOutputKMSKey, *stack.StackId)
}
if regionalResources.S3Bucket == "" {
return nil, fmt.Errorf("couldn't find S3 bucket output key %s in stack %s", appOutputS3Bucket, *stack.StackId)
}
return ®ionalResources, nil
}
// DNSDelegatedAccountsForStack looks through a stack's parameters for
// the parameter which stores the comma seperated list of account IDs
// which are permitted for DNS delegation.
func DNSDelegatedAccountsForStack(stack *cloudformation.Stack) []string {
for _, parameter := range stack.Parameters {
if *parameter.ParameterKey == appDNSDelegatedAccountsKey {
return strings.Split(*parameter.ParameterValue, ",")
}
}
return []string{}
}
| 315 |
copilot-cli | aws | Go | // Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
// SPDX-License-Identifier: Apache-2.0
package stack
import (
"bytes"
"errors"
"fmt"
"testing"
"github.com/aws/aws-sdk-go/aws"
"github.com/aws/aws-sdk-go/service/cloudformation"
"github.com/aws/copilot-cli/internal/pkg/deploy"
"github.com/aws/copilot-cli/internal/pkg/template"
"github.com/aws/copilot-cli/internal/pkg/template/mocks"
"github.com/golang/mock/gomock"
"github.com/stretchr/testify/require"
"gopkg.in/yaml.v3"
)
const (
mockTemplate = "mockTemplate"
)
func TestAppTemplate(t *testing.T) {
testCases := map[string]struct {
inVersion string
mockDependencies func(ctrl *gomock.Controller, c *AppStackConfig)
wantedTemplate string
wantedError error
}{
"should return error given template not found": {
mockDependencies: func(ctrl *gomock.Controller, c *AppStackConfig) {
m := mocks.NewMockReadParser(ctrl)
m.EXPECT().Parse(gomock.Any(), gomock.Any(), gomock.Any()).Return(nil, errors.New("some error"))
c.parser = m
},
wantedError: errors.New("some error"),
},
"success": {
inVersion: "v1.0.0",
mockDependencies: func(ctrl *gomock.Controller, c *AppStackConfig) {
m := mocks.NewMockReadParser(ctrl)
m.EXPECT().Parse(appTemplatePath, struct {
TemplateVersion string
AppDNSDelegatedAccounts []string
Domain string
Name string
PermissionsBoundary string
}{
"v1.0.0",
[]string{"123456"},
"",
"demo",
"",
}, gomock.Any()).Return(&template.Content{
Buffer: bytes.NewBufferString("template"),
}, nil)
c.parser = m
},
wantedTemplate: "template",
},
}
for name, tc := range testCases {
t.Run(name, func(t *testing.T) {
// GIVEN
ctrl := gomock.NewController(t)
defer ctrl.Finish()
appStack := &AppStackConfig{
CreateAppInput: &deploy.CreateAppInput{
Version: tc.inVersion,
AccountID: "123456",
Name: "demo",
DomainName: "",
PermissionsBoundary: "",
},
}
tc.mockDependencies(ctrl, appStack)
// WHEN
got, err := appStack.Template()
// THEN
require.Equal(t, tc.wantedError, err)
require.Equal(t, tc.wantedTemplate, got)
})
}
}
func TestDNSDelegationAccounts(t *testing.T) {
testCases := map[string]struct {
given *deploy.CreateAppInput
want []string
}{
"should append app account": {
given: &deploy.CreateAppInput{
AccountID: "1234",
},
want: []string{"1234"},
},
"should ignore duplicates": {
given: &deploy.CreateAppInput{
AccountID: "1234",
DNSDelegationAccounts: []string{"1234"},
},
want: []string{"1234"},
},
"should return a set": {
given: &deploy.CreateAppInput{
AccountID: "1234",
DNSDelegationAccounts: []string{"4567"},
},
want: []string{"1234", "4567"},
},
}
for name, tc := range testCases {
t.Run(name, func(t *testing.T) {
appStack := &AppStackConfig{
CreateAppInput: tc.given,
}
got := appStack.dnsDelegationAccounts()
require.ElementsMatch(t, tc.want, got)
})
}
}
func TestAppResourceTemplate(t *testing.T) {
testCases := map[string]struct {
given *AppResourcesConfig
mockDependencies func(ctrl *gomock.Controller, c *AppStackConfig)
wantedTemplate string
wantedError error
}{
"should return error when template cannot be parsed": {
given: &AppResourcesConfig{},
mockDependencies: func(ctrl *gomock.Controller, c *AppStackConfig) {
m := mocks.NewMockReadParser(ctrl)
m.EXPECT().Parse(gomock.Any(), gomock.Any(), gomock.Any()).Return(nil, errors.New("some error"))
c.parser = m
},
wantedError: errors.New("some error"),
},
"should render template after sorting": {
given: &AppResourcesConfig{
Accounts: []string{"4567", "1234"},
Workloads: []AppResourcesWorkload{
{Name: "svc-2"},
{Name: "svc-1"},
},
Version: 1,
App: "testapp",
},
mockDependencies: func(ctrl *gomock.Controller, c *AppStackConfig) {
m := mocks.NewMockReadParser(ctrl)
m.EXPECT().Parse(appResourcesTemplatePath, struct {
*AppResourcesConfig
ServiceTagKey string
TemplateVersion string
}{
&AppResourcesConfig{
Accounts: []string{"1234", "4567"},
Workloads: []AppResourcesWorkload{
{Name: "svc-1"},
{Name: "svc-2"},
},
Version: 1,
App: "testapp",
},
deploy.ServiceTagKey,
"",
}, gomock.Any()).Return(&template.Content{
Buffer: bytes.NewBufferString("template"),
}, nil)
c.parser = m
},
wantedTemplate: "template",
},
}
for name, tc := range testCases {
t.Run(name, func(t *testing.T) {
ctrl := gomock.NewController(t)
defer ctrl.Finish()
appStack := &AppStackConfig{
CreateAppInput: &deploy.CreateAppInput{Name: "testapp", AccountID: "1234"},
}
tc.mockDependencies(ctrl, appStack)
got, err := appStack.ResourceTemplate(tc.given)
require.Equal(t, tc.wantedError, err)
require.Equal(t, tc.wantedTemplate, got)
})
}
}
func TestAppParameters(t *testing.T) {
expectedParams := []*cloudformation.Parameter{
{
ParameterKey: aws.String(appAdminRoleParamName),
ParameterValue: aws.String("testapp-adminrole"),
},
{
ParameterKey: aws.String(appExecutionRoleParamName),
ParameterValue: aws.String("testapp-executionrole"),
},
{
ParameterKey: aws.String(appDNSDelegatedAccountsKey),
ParameterValue: aws.String("1234"),
},
{
ParameterKey: aws.String(appDomainNameKey),
ParameterValue: aws.String("amazon.com"),
},
{
ParameterKey: aws.String(appDomainHostedZoneIDKey),
ParameterValue: aws.String("mockHostedZoneID"),
},
{
ParameterKey: aws.String(appDNSDelegationRoleParamName),
ParameterValue: aws.String("testapp-DNSDelegationRole"),
},
{
ParameterKey: aws.String(appNameKey),
ParameterValue: aws.String("testapp"),
},
}
app := &AppStackConfig{
CreateAppInput: &deploy.CreateAppInput{Name: "testapp", AccountID: "1234", DomainName: "amazon.com", DomainHostedZoneID: "mockHostedZoneID"},
}
params, _ := app.Parameters()
require.ElementsMatch(t, expectedParams, params)
}
func TestAppTags(t *testing.T) {
app := &AppStackConfig{
CreateAppInput: &deploy.CreateAppInput{
Name: "testapp",
AccountID: "1234",
AdditionalTags: map[string]string{
"confidentiality": "public",
"owner": "finance",
deploy.AppTagKey: "overrideapp",
},
},
}
expectedTags := []*cloudformation.Tag{
{
Key: aws.String(deploy.AppTagKey),
Value: aws.String(app.Name),
},
{
Key: aws.String("confidentiality"),
Value: aws.String("public"),
},
{
Key: aws.String("owner"),
Value: aws.String("finance"),
},
}
require.ElementsMatch(t, expectedTags, app.Tags())
}
func TestToRegionalResources(t *testing.T) {
testCases := map[string]struct {
givenStackOutputs map[string]string
wantedResource AppRegionalResources
wantedErr error
}{
"should generate fully formed resource": {
givenStackOutputs: map[string]string{
appOutputKMSKey: "arn:aws:kms:us-west-2:01234567890:key/0000",
appOutputS3Bucket: "tests3-bucket-us-west-2",
"ECRRepofrontDASHend": "arn:aws:ecr:us-west-2:0123456789:repository/app/front-end",
"ECRRepobackDASHend": "arn:aws:ecr:us-west-2:0123456789:repository/app/back-end",
},
wantedResource: AppRegionalResources{
KMSKeyARN: "arn:aws:kms:us-west-2:01234567890:key/0000",
S3Bucket: "tests3-bucket-us-west-2",
RepositoryURLs: map[string]string{
"front-end": "0123456789.dkr.ecr.us-west-2.amazonaws.com/app/front-end",
"back-end": "0123456789.dkr.ecr.us-west-2.amazonaws.com/app/back-end",
},
},
},
"should return error when no bucket exists": {
givenStackOutputs: map[string]string{
appOutputKMSKey: "arn:aws:kms:us-west-2:01234567890:key/0000",
"ECRRepofrontDASHend": "arn:aws:ecr:us-west-2:0123456789:repository/app/front-end",
"ECRRepobackDASHend": "arn:aws:ecr:us-west-2:0123456789:repository/app/back-end",
},
wantedErr: fmt.Errorf("couldn't find S3 bucket output key PipelineBucket in stack stack"),
},
"should return error when no kms key exists": {
givenStackOutputs: map[string]string{
appOutputS3Bucket: "tests3-bucket-us-west-2",
"ECRRepofrontDASHend": "arn:aws:ecr:us-west-2:0123456789:repository/app/front-end",
"ECRRepobackDASHend": "arn:aws:ecr:us-west-2:0123456789:repository/app/back-end",
},
wantedErr: fmt.Errorf("couldn't find KMS output key KMSKeyARN in stack stack"),
},
}
for name, tc := range testCases {
t.Run(name, func(t *testing.T) {
got, err := ToAppRegionalResources(mockAppResourceStack("stack", tc.givenStackOutputs))
if tc.wantedErr != nil {
require.EqualError(t, tc.wantedErr, err.Error())
} else {
require.NoError(t, err)
require.Equal(t, tc.wantedResource, *got)
}
})
}
}
func TestDNSDelegatedAccountsForStack(t *testing.T) {
testCases := map[string]struct {
given map[string]string
want []string
}{
"should read from parameter and parse comma seperated list": {
given: map[string]string{
appDNSDelegatedAccountsKey: "1234,5678",
},
want: []string{"1234", "5678"},
},
"should return empty when no field is found": {
given: map[string]string{
"not a real field": "ok",
},
want: []string{},
},
}
for name, tc := range testCases {
t.Run(name, func(t *testing.T) {
got := DNSDelegatedAccountsForStack(mockAppRolesStack("stack", tc.given))
require.ElementsMatch(t, tc.want, got)
})
}
}
func mockAppResourceStack(stackArn string, outputs map[string]string) *cloudformation.Stack {
outputList := []*cloudformation.Output{}
for key, val := range outputs {
outputList = append(outputList, &cloudformation.Output{
OutputKey: aws.String(key),
OutputValue: aws.String(val),
})
}
return &cloudformation.Stack{
StackId: aws.String(stackArn),
Outputs: outputList,
}
}
func mockAppRolesStack(stackArn string, parameters map[string]string) *cloudformation.Stack {
parameterList := []*cloudformation.Parameter{}
for key, val := range parameters {
parameterList = append(parameterList, &cloudformation.Parameter{
ParameterKey: aws.String(key),
ParameterValue: aws.String(val),
})
}
return &cloudformation.Stack{
StackId: aws.String(stackArn),
Parameters: parameterList,
}
}
func TestAppStackName(t *testing.T) {
app := &AppStackConfig{
CreateAppInput: &deploy.CreateAppInput{Name: "testapp", AccountID: "1234"},
}
require.Equal(t, fmt.Sprintf("%s-infrastructure-roles", app.Name), app.StackName())
}
func TestAppStackSetName(t *testing.T) {
app := &AppStackConfig{
CreateAppInput: &deploy.CreateAppInput{Name: "testapp", AccountID: "1234"},
}
require.Equal(t, fmt.Sprintf("%s-infrastructure", app.Name), app.StackSetName())
}
func TestTemplateToAppConfig(t *testing.T) {
given := `AWSTemplateFormatVersion: '2010-09-09'
Description: Cross-regional resources to support the CodePipeline for a workspace
Metadata:
Version: 7
Services:
- testsvc1
- testsvc2
Accounts:
- 0000000000
`
config, err := AppConfigFrom(&given)
require.NoError(t, err)
require.Equal(t, AppResourcesConfig{
Accounts: []string{"0000000000"},
Version: 7,
Workloads: []AppResourcesWorkload{
{Name: "testsvc1", WithECR: true},
{Name: "testsvc2", WithECR: true},
},
}, *config)
}
func TestAppResourcesService_UnmarshalYAML(t *testing.T) {
testCases := map[string]struct {
in []byte
wanted AppResourcesConfig
wantedError error
}{
"unmarshal legacy service config": {
in: []byte(`Services:
- frontend
- backend
TemplateVersion: 'v1.1.0'
Version: 6
App: demo
Accounts:
- 1234567890`),
wanted: AppResourcesConfig{
Workloads: []AppResourcesWorkload{
{Name: "frontend", WithECR: true},
{Name: "backend", WithECR: true},
},
Accounts: []string{"1234567890"},
Version: 6,
App: "demo",
},
},
"unmarshal new service config": {
in: []byte(`Workloads:
- Name: frontend
WithECR: true
- Name: backend
WithECR: false
TemplateVersion: 'v1.1.0'
Version: 6
App: demo
Accounts:
- 1234567890`),
wanted: AppResourcesConfig{
Workloads: []AppResourcesWorkload{
{Name: "frontend", WithECR: true},
{Name: "backend", WithECR: false},
},
Accounts: []string{"1234567890"},
Version: 6,
App: "demo",
},
},
}
for name, tc := range testCases {
t.Run(name, func(t *testing.T) {
var s AppResources
err := yaml.Unmarshal(tc.in, &s)
if tc.wantedError != nil {
require.EqualError(t, err, tc.wantedError.Error())
} else {
require.NoError(t, err)
require.Equal(t, tc.wanted, s.AppResourcesConfig)
}
})
}
}
| 481 |
copilot-cli | aws | Go | // Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
// SPDX-License-Identifier: Apache-2.0
package stack
import (
"fmt"
"strconv"
"strings"
"github.com/aws/aws-sdk-go/aws"
"github.com/aws/aws-sdk-go/service/cloudformation"
"github.com/aws/copilot-cli/internal/pkg/config"
"github.com/aws/copilot-cli/internal/pkg/deploy/upload/customresource"
"github.com/aws/copilot-cli/internal/pkg/manifest"
"github.com/aws/copilot-cli/internal/pkg/manifest/manifestinfo"
"github.com/aws/copilot-cli/internal/pkg/template"
"github.com/aws/copilot-cli/internal/pkg/template/override"
)
// BackendService represents the configuration needed to create a CloudFormation stack from a backend service manifest.
type BackendService struct {
*ecsWkld
manifest *manifest.BackendService
httpsEnabled bool
albEnabled bool
parser backendSvcReadParser
}
// BackendServiceConfig contains data required to initialize a backend service stack.
type BackendServiceConfig struct {
App *config.Application
EnvManifest *manifest.Environment
Manifest *manifest.BackendService
ArtifactBucketName string
RawManifest []byte // Content of the manifest file without any transformations.
RuntimeConfig RuntimeConfig
Addons NestedStackConfigurer
}
// NewBackendService creates a new BackendService stack from a manifest file.
func NewBackendService(conf BackendServiceConfig) (*BackendService, error) {
crs, err := customresource.Backend(fs)
if err != nil {
return nil, fmt.Errorf("backend service custom resources: %w", err)
}
conf.RuntimeConfig.loadCustomResourceURLs(conf.ArtifactBucketName, uploadableCRs(crs).convert())
b := &BackendService{
ecsWkld: &ecsWkld{
wkld: &wkld{
name: aws.StringValue(conf.Manifest.Name),
env: aws.StringValue(conf.EnvManifest.Name),
app: conf.App.Name,
permBound: conf.App.PermissionsBoundary,
artifactBucketName: conf.ArtifactBucketName,
rc: conf.RuntimeConfig,
image: conf.Manifest.ImageConfig.Image,
rawManifest: conf.RawManifest,
parser: fs,
addons: conf.Addons,
},
logging: conf.Manifest.Logging,
sidecars: conf.Manifest.Sidecars,
tc: conf.Manifest.TaskConfig,
taskDefOverrideFunc: override.CloudFormationTemplate,
},
manifest: conf.Manifest,
parser: fs,
albEnabled: !conf.Manifest.HTTP.IsEmpty(),
}
if len(conf.EnvManifest.HTTPConfig.Private.Certificates) != 0 {
b.httpsEnabled = b.albEnabled
}
return b, nil
}
// Template returns the CloudFormation template for the backend service.
func (s *BackendService) Template() (string, error) {
crs, err := convertCustomResources(s.rc.CustomResourcesURL)
if err != nil {
return "", err
}
addonsParams, err := s.addonsParameters()
if err != nil {
return "", err
}
addonsOutputs, err := s.addonsOutputs()
if err != nil {
return "", err
}
exposedPorts, err := s.manifest.ExposedPorts()
if err != nil {
return "", fmt.Errorf("parse exposed ports in service manifest %s: %w", s.name, err)
}
sidecars, err := convertSidecars(s.manifest.Sidecars, exposedPorts.PortsForContainer, s.rc)
if err != nil {
return "", fmt.Errorf("convert the sidecar configuration for service %s: %w", s.name, err)
}
publishers, err := convertPublish(s.manifest.Publish(), s.rc.AccountID, s.rc.Region, s.app, s.env, s.name)
if err != nil {
return "", fmt.Errorf(`convert "publish" field for service %s: %w`, s.name, err)
}
advancedCount, err := convertAdvancedCount(s.manifest.Count.AdvancedCount)
if err != nil {
return "", fmt.Errorf("convert the advanced count configuration for service %s: %w", s.name, err)
}
var autoscaling *template.AutoscalingOpts
var desiredCountOnSpot *int
var capacityProviders []*template.CapacityProviderStrategy
if advancedCount != nil {
autoscaling = advancedCount.Autoscaling
desiredCountOnSpot = advancedCount.Spot
capacityProviders = advancedCount.Cps
}
entrypoint, err := convertEntryPoint(s.manifest.EntryPoint)
if err != nil {
return "", err
}
command, err := convertCommand(s.manifest.Command)
if err != nil {
return "", err
}
var scConfig *template.ServiceConnect
if s.manifest.Network.Connect.Enabled() {
scConfig = convertServiceConnect(s.manifest.Network.Connect)
}
targetContainer, targetContainerPort, err := s.manifest.HTTP.Main.Target(exposedPorts)
if err != nil {
return "", err
}
albListenerConfig, err := s.convertALBListener()
if err != nil {
return "", err
}
content, err := s.parser.ParseBackendService(template.WorkloadOpts{
// Workload parameters.
AppName: s.app,
EnvName: s.env,
EnvVersion: s.rc.EnvVersion,
SerializedManifest: string(s.rawManifest),
WorkloadType: manifestinfo.BackendServiceType,
WorkloadName: s.name,
// Configuration for the main container.
EntryPoint: entrypoint,
Command: command,
HealthCheck: convertContainerHealthCheck(s.manifest.BackendServiceConfig.ImageConfig.HealthCheck),
PortMappings: convertPortMappings(exposedPorts.PortsForContainer[s.name]),
Secrets: convertSecrets(s.manifest.BackendServiceConfig.Secrets),
Variables: convertEnvVars(s.manifest.BackendServiceConfig.Variables),
// Additional options that are common between **all** workload templates.
AddonsExtraParams: addonsParams,
Autoscaling: autoscaling,
CapacityProviders: capacityProviders,
CredentialsParameter: aws.StringValue(s.manifest.ImageConfig.Image.Credentials),
DeploymentConfiguration: convertDeploymentConfig(s.manifest.DeployConfig),
DesiredCountOnSpot: desiredCountOnSpot,
DependsOn: convertDependsOn(s.manifest.ImageConfig.Image.DependsOn),
DockerLabels: s.manifest.ImageConfig.Image.DockerLabels,
ExecuteCommand: convertExecuteCommand(&s.manifest.ExecuteCommand),
LogConfig: convertLogging(s.manifest.Logging),
NestedStack: addonsOutputs,
Network: convertNetworkConfig(s.manifest.Network),
Publish: publishers,
PermissionsBoundary: s.permBound,
Platform: convertPlatform(s.manifest.Platform),
Storage: convertStorageOpts(s.manifest.Name, s.manifest.Storage),
// ALB configs.
ALBEnabled: s.albEnabled,
HTTPTargetContainer: template.HTTPTargetContainer{
Port: targetContainerPort,
Name: targetContainer,
},
GracePeriod: s.convertGracePeriod(),
ALBListener: albListenerConfig,
// Custom Resource Config.
CustomResources: crs,
// Sidecar config.
Sidecars: sidecars,
// service connect and service discovery options.
ServiceConnect: scConfig,
ServiceDiscoveryEndpoint: s.rc.ServiceDiscoveryEndpoint,
// Additional options for request driven web service templates.
Observability: template.ObservabilityOpts{
Tracing: strings.ToUpper(aws.StringValue(s.manifest.Observability.Tracing)),
},
})
if err != nil {
return "", fmt.Errorf("parse backend service template: %w", err)
}
overriddenTpl, err := s.taskDefOverrideFunc(convertTaskDefOverrideRules(s.manifest.TaskDefOverrides), content.Bytes())
if err != nil {
return "", fmt.Errorf("apply task definition overrides: %w", err)
}
return string(overriddenTpl), nil
}
// Parameters returns the list of CloudFormation parameters used by the template.
func (s *BackendService) Parameters() ([]*cloudformation.Parameter, error) {
params, err := s.ecsWkld.Parameters()
if err != nil {
return nil, err
}
exposedPorts, err := s.manifest.ExposedPorts()
if err != nil {
return nil, fmt.Errorf("parse exposed ports in service manifest %s: %w", s.name, err)
}
targetContainer, targetPort, err := s.manifest.HTTP.Main.Target(exposedPorts)
if err != nil {
return nil, err
}
if targetPort == "" {
targetPort = s.manifest.MainContainerPort()
}
params = append(params, []*cloudformation.Parameter{
{
ParameterKey: aws.String(WorkloadContainerPortParamKey),
ParameterValue: aws.String(s.manifest.MainContainerPort()),
},
{
ParameterKey: aws.String(WorkloadTargetContainerParamKey),
ParameterValue: aws.String(targetContainer),
},
{
ParameterKey: aws.String(WorkloadTargetPortParamKey),
ParameterValue: aws.String(targetPort),
},
}...)
if !s.manifest.HTTP.IsEmpty() {
params = append(params, []*cloudformation.Parameter{
{
ParameterKey: aws.String(WorkloadRulePathParamKey),
ParameterValue: s.manifest.HTTP.Main.Path,
},
{
ParameterKey: aws.String(WorkloadHTTPSParamKey),
ParameterValue: aws.String(strconv.FormatBool(s.httpsEnabled)),
},
}...)
}
return params, nil
}
// SerializedParameters returns the CloudFormation stack's parameters serialized to a JSON document.
func (s *BackendService) SerializedParameters() (string, error) {
return serializeTemplateConfig(s.wkld.parser, s)
}
| 265 |
copilot-cli | aws | Go | //go:build integration || localintegration
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
// SPDX-License-Identifier: Apache-2.0
package stack_test
import (
"encoding/json"
"fmt"
"os"
"path/filepath"
"testing"
"github.com/aws/copilot-cli/internal/pkg/config"
"github.com/aws/copilot-cli/internal/pkg/deploy/cloudformation/stack"
"github.com/aws/copilot-cli/internal/pkg/manifest"
"github.com/golang/mock/gomock"
"github.com/stretchr/testify/require"
"gopkg.in/yaml.v3"
)
func TestBackendService_TemplateAndParamsGeneration(t *testing.T) {
const (
appName = "my-app"
)
envName := "my-env"
testDir := filepath.Join("testdata", "workloads", "backend")
tests := map[string]struct {
ManifestPath string
TemplatePath string
ParamsPath string
EnvImportedCertARNs []string
}{
"simple": {
ManifestPath: filepath.Join(testDir, "simple-manifest.yml"),
TemplatePath: filepath.Join(testDir, "simple-template.yml"),
ParamsPath: filepath.Join(testDir, "simple-params.json"),
},
"simple without port config": {
ManifestPath: filepath.Join(testDir, "simple-manifest-without-port-config.yml"),
TemplatePath: filepath.Join(testDir, "simple-template-without-port-config.yml"),
ParamsPath: filepath.Join(testDir, "simple-params-without-port-config.json"),
},
"http only path configured": {
ManifestPath: filepath.Join(testDir, "http-only-path-manifest.yml"),
TemplatePath: filepath.Join(testDir, "http-only-path-template.yml"),
ParamsPath: filepath.Join(testDir, "http-only-path-params.json"),
},
"http full config": {
ManifestPath: filepath.Join(testDir, "http-full-config-manifest.yml"),
TemplatePath: filepath.Join(testDir, "http-full-config-template.yml"),
ParamsPath: filepath.Join(testDir, "http-full-config-params.json"),
},
"https path and alias configured": {
ManifestPath: filepath.Join(testDir, "https-path-alias-manifest.yml"),
TemplatePath: filepath.Join(testDir, "https-path-alias-template.yml"),
ParamsPath: filepath.Join(testDir, "https-path-alias-params.json"),
EnvImportedCertARNs: []string{"exampleComCertARN"},
},
"http with autoscaling by requests configured": {
ManifestPath: filepath.Join(testDir, "http-autoscaling-manifest.yml"),
TemplatePath: filepath.Join(testDir, "http-autoscaling-template.yml"),
ParamsPath: filepath.Join(testDir, "http-autoscaling-params.json"),
},
}
// run tests
for name, tc := range tests {
t.Run(name, func(t *testing.T) {
ctrl := gomock.NewController(t)
defer ctrl.Finish()
// parse files
manifestBytes, err := os.ReadFile(tc.ManifestPath)
require.NoError(t, err)
tmplBytes, err := os.ReadFile(tc.TemplatePath)
require.NoError(t, err)
paramsBytes, err := os.ReadFile(tc.ParamsPath)
require.NoError(t, err)
dynamicMft, err := manifest.UnmarshalWorkload([]byte(manifestBytes))
require.NoError(t, err)
require.NoError(t, dynamicMft.Validate())
mft := dynamicMft.Manifest()
envConfig := &manifest.Environment{
Workload: manifest.Workload{
Name: &envName,
},
}
envConfig.HTTPConfig.Private.Certificates = tc.EnvImportedCertARNs
serializer, err := stack.NewBackendService(stack.BackendServiceConfig{
App: &config.Application{
Name: appName,
},
EnvManifest: envConfig,
ArtifactBucketName: "bucket",
Manifest: mft.(*manifest.BackendService),
RuntimeConfig: stack.RuntimeConfig{
ServiceDiscoveryEndpoint: fmt.Sprintf("%s.%s.local", envName, appName),
EnvVersion: "v1.42.0",
},
})
require.NoError(t, err)
// validate generated template
tmpl, err := serializer.Template()
require.NoError(t, err)
var actualTmpl map[any]any
require.NoError(t, yaml.Unmarshal([]byte(tmpl), &actualTmpl))
// change the random DynamicDesiredCountAction UpdateID to an expected value
if v, ok := actualTmpl["Resources"]; ok {
if v, ok := v.(map[string]any)["DynamicDesiredCountAction"]; ok {
if v, ok := v.(map[string]any)["Properties"]; ok {
if v, ok := v.(map[string]any); ok {
v["UpdateID"] = "AVeryRandomUUID"
}
}
}
}
resetCustomResourceLocations(actualTmpl)
var expectedTmpl map[any]any
require.NoError(t, yaml.Unmarshal(tmplBytes, &expectedTmpl))
compareStackTemplate(t, expectedTmpl, actualTmpl)
// validate generated params
params, err := serializer.SerializedParameters()
require.NoError(t, err)
var actualParams map[string]any
require.NoError(t, json.Unmarshal([]byte(params), &actualParams))
var expectedParams map[string]any
require.NoError(t, json.Unmarshal(paramsBytes, &expectedParams))
require.Equal(t, expectedParams, actualParams, "param mismatch")
})
}
}
| 144 |
copilot-cli | aws | Go | // Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
// SPDX-License-Identifier: Apache-2.0
package stack
import (
"bytes"
"errors"
"fmt"
"testing"
"time"
"github.com/aws/copilot-cli/internal/pkg/template/templatetest"
"github.com/aws/copilot-cli/internal/pkg/config"
"github.com/aws/copilot-cli/internal/pkg/manifest/manifestinfo"
"github.com/aws/aws-sdk-go/aws"
"github.com/aws/aws-sdk-go/service/cloudformation"
"github.com/aws/copilot-cli/internal/pkg/addon"
"github.com/aws/copilot-cli/internal/pkg/deploy/cloudformation/stack/mocks"
"github.com/aws/copilot-cli/internal/pkg/manifest"
"github.com/aws/copilot-cli/internal/pkg/template"
"github.com/golang/mock/gomock"
"github.com/stretchr/testify/require"
)
// Test settings for container healthchecks in the backend service manifest.
var (
testInterval = 5 * time.Second
testRetries = 3
testTimeout = 10 * time.Second
testStartPeriod = 0 * time.Second
testServiceName = "frontend"
testDockerfile = "./frontend/Dockerfile"
)
func TestBackendService_Template(t *testing.T) {
t.Cleanup(func() {
fs = realEmbedFS
})
fs = templatetest.Stub{}
t.Run("returns a wrapped error when addons template parsing fails", func(t *testing.T) {
// GIVEN
svc, err := NewBackendService(BackendServiceConfig{
App: &config.Application{},
EnvManifest: &manifest.Environment{},
Manifest: &manifest.BackendService{
Workload: manifest.Workload{
Name: aws.String("api"),
},
},
ArtifactBucketName: "mockBucket",
Addons: mockAddons{tplErr: errors.New("some error")},
})
require.NoError(t, err)
// WHEN
_, err = svc.Template()
// THEN
require.EqualError(t, err, "generate addons template for api: some error")
})
t.Run("returns a wrapped error when addons parameter parsing fails", func(t *testing.T) {
// GIVEN
svc, err := NewBackendService(BackendServiceConfig{
App: &config.Application{},
EnvManifest: &manifest.Environment{},
Manifest: &manifest.BackendService{
Workload: manifest.Workload{
Name: aws.String("api"),
},
},
ArtifactBucketName: "mockBucket",
Addons: mockAddons{paramsErr: errors.New("some error")},
})
require.NoError(t, err)
// WHEN
_, err = svc.Template()
// THEN
require.EqualError(t, err, "parse addons parameters for api: some error")
})
t.Run("returns an error when failed to parse sidecar's exposed port", func(t *testing.T) {
// GIVEN
mft := manifest.NewBackendService(manifest.BackendServiceProps{
WorkloadProps: manifest.WorkloadProps{
Name: "api",
Dockerfile: testDockerfile,
},
Port: 8080,
})
mft.Sidecars = map[string]*manifest.SidecarConfig{
"xray": {
Port: aws.String("80/80/80"),
},
}
svc, err := NewBackendService(BackendServiceConfig{
App: &config.Application{},
EnvManifest: &manifest.Environment{},
Manifest: mft,
ArtifactBucketName: "mockBucket",
Addons: mockAddons{},
})
require.NoError(t, err)
// WHEN
_, err = svc.Template()
// THEN
require.EqualError(t, err, "parse exposed ports in service manifest api: cannot parse port mapping from 80/80/80")
})
t.Run("returns an error when failed to convert sidecar configuration", func(t *testing.T) {
// GIVEN
mft := manifest.NewBackendService(manifest.BackendServiceProps{
WorkloadProps: manifest.WorkloadProps{
Name: "api",
Dockerfile: testDockerfile,
},
Port: 8080,
})
mft.Sidecars = map[string]*manifest.SidecarConfig{
"xray": {
Port: aws.String("80"),
ImageOverride: manifest.ImageOverride{
Command: manifest.CommandOverride{
String: aws.String("[bad'command]"),
},
},
},
}
svc, err := NewBackendService(BackendServiceConfig{
App: &config.Application{},
EnvManifest: &manifest.Environment{},
Manifest: mft,
ArtifactBucketName: "mockBucket",
Addons: mockAddons{},
})
require.NoError(t, err)
// WHEN
_, err = svc.Template()
// THEN
require.EqualError(t, err, `convert the sidecar configuration for service api: convert "command" to string slice: convert string into tokens using shell-style rules: EOF found when expecting closing quote`)
})
t.Run("returns an error when failed to parse autoscaling template", func(t *testing.T) {
// GIVEN
mft := manifest.NewBackendService(manifest.BackendServiceProps{
WorkloadProps: manifest.WorkloadProps{
Name: "api",
Dockerfile: testDockerfile,
},
Port: 8080,
})
badRange := manifest.IntRangeBand("badRange")
mft.Count.AdvancedCount = manifest.AdvancedCount{
Range: manifest.Range{
Value: &badRange,
},
}
svc, err := NewBackendService(BackendServiceConfig{
App: &config.Application{},
EnvManifest: &manifest.Environment{},
Manifest: mft,
ArtifactBucketName: "mockBucket",
Addons: mockAddons{},
})
require.NoError(t, err)
// WHEN
_, err = svc.Template()
// THEN
require.EqualError(t, err, "convert the advanced count configuration for service api: invalid range value badRange. Should be in format of ${min}-${max}")
})
t.Run("returns wrapped error when failed to parse the template", func(t *testing.T) {
// GIVEN
ctrl := gomock.NewController(t)
defer ctrl.Finish()
parser := mocks.NewMockbackendSvcReadParser(ctrl)
parser.EXPECT().ParseBackendService(gomock.Any()).Return(nil, errors.New("some error"))
mft := manifest.NewBackendService(manifest.BackendServiceProps{
WorkloadProps: manifest.WorkloadProps{
Name: "api",
Dockerfile: testDockerfile,
},
Port: 8080,
})
svc, err := NewBackendService(BackendServiceConfig{
App: &config.Application{},
EnvManifest: &manifest.Environment{},
Manifest: mft,
ArtifactBucketName: "mockBucket",
Addons: mockAddons{},
})
svc.parser = parser
require.NoError(t, err)
// WHEN
_, err = svc.Template()
// THEN
require.EqualError(t, err, "parse backend service template: some error")
})
t.Run("renders template without a load balancer", func(t *testing.T) {
// GIVEN
ctrl := gomock.NewController(t)
defer ctrl.Finish()
mft := manifest.NewBackendService(manifest.BackendServiceProps{
WorkloadProps: manifest.WorkloadProps{
Name: "api",
Dockerfile: testDockerfile,
},
Port: 8080,
HealthCheck: manifest.ContainerHealthCheck{
Command: []string{"CMD-SHELL", "curl -f http://localhost/ || exit 1"},
Interval: &testInterval,
Retries: &testRetries,
Timeout: &testTimeout,
StartPeriod: &testStartPeriod,
},
})
mft.EntryPoint = manifest.EntryPointOverride{
String: nil,
StringSlice: []string{"enter", "from"},
}
mft.Command = manifest.CommandOverride{
String: nil,
StringSlice: []string{"here"},
}
mft.ExecuteCommand = manifest.ExecuteCommand{Enable: aws.Bool(true)}
mft.DeployConfig = manifest.DeploymentConfig{
DeploymentControllerConfig: manifest.DeploymentControllerConfig{
Rolling: aws.String("recreate"),
}}
privatePlacement := manifest.PrivateSubnetPlacement
mft.Network.VPC.Placement = manifest.PlacementArgOrString{
PlacementString: &privatePlacement,
}
mft.Network.VPC.SecurityGroups = manifest.SecurityGroupsIDsOrConfig{}
var actual template.WorkloadOpts
parser := mocks.NewMockbackendSvcReadParser(ctrl)
parser.EXPECT().ParseBackendService(gomock.Any()).DoAndReturn(func(in template.WorkloadOpts) (*template.Content, error) {
actual = in // Capture the translated object.
return &template.Content{Buffer: bytes.NewBufferString("template")}, nil
})
addons := mockAddons{
tpl: `
Resources:
MyTable:
Type: AWS::DynamoDB::Table
Outputs:
MyTable:
Value: !Ref MyTable`,
params: "",
}
svc, err := NewBackendService(BackendServiceConfig{
App: &config.Application{
Name: "phonetool",
},
EnvManifest: &manifest.Environment{
Workload: manifest.Workload{
Name: aws.String("test"),
},
},
ArtifactBucketName: "mockBucket",
Manifest: mft,
RuntimeConfig: RuntimeConfig{
PushedImages: map[string]ECRImage{
"test": {
RepoURL: testImageRepoURL,
ImageTag: testImageTag,
},
},
CustomResourcesURL: map[string]string{
"EnvControllerFunction": "https://my-bucket.s3.Region.amazonaws.com/sha1/envcontroller.zip",
"DynamicDesiredCountFunction": "https://my-bucket.s3.Region.amazonaws.com/sha2/count.zip",
},
},
Addons: addons,
})
svc.parser = parser
require.NoError(t, err)
// WHEN
_, err = svc.Template()
// THEN
require.NoError(t, err)
require.Equal(t, template.WorkloadOpts{
AppName: "phonetool",
EnvName: "test",
WorkloadName: "api",
WorkloadType: manifestinfo.BackendServiceType,
HealthCheck: &template.ContainerHealthCheck{
Command: []string{"CMD-SHELL", "curl -f http://localhost/ || exit 1"},
Interval: aws.Int64(5),
Retries: aws.Int64(3),
StartPeriod: aws.Int64(0),
Timeout: aws.Int64(10),
},
HTTPTargetContainer: template.HTTPTargetContainer{
Port: "8080",
Name: "api",
},
GracePeriod: aws.Int64(manifest.DefaultHealthCheckGracePeriod),
CustomResources: map[string]template.S3ObjectLocation{
"EnvControllerFunction": {
Bucket: "my-bucket",
Key: "sha1/envcontroller.zip",
},
"DynamicDesiredCountFunction": {
Bucket: "my-bucket",
Key: "sha2/count.zip",
},
},
ExecuteCommand: &template.ExecuteCommandOpts{},
NestedStack: &template.WorkloadNestedStackOpts{
StackName: addon.StackName,
VariableOutputs: []string{"MyTable"},
},
Network: template.NetworkOpts{
AssignPublicIP: template.DisablePublicIP,
SubnetsType: template.PrivateSubnetsPlacement,
SecurityGroups: []template.SecurityGroup{},
},
DeploymentConfiguration: template.DeploymentConfigurationOpts{
MinHealthyPercent: 0,
MaxPercent: 100,
},
EntryPoint: []string{"enter", "from"},
Command: []string{"here"},
PortMappings: []*template.PortMapping{
{
Protocol: "tcp",
ContainerName: "api",
ContainerPort: 8080,
},
},
}, actual)
})
t.Run("renders template with internal load balancer", func(t *testing.T) {
// GIVEN
ctrl := gomock.NewController(t)
defer ctrl.Finish()
mft := manifest.NewBackendService(manifest.BackendServiceProps{
WorkloadProps: manifest.WorkloadProps{
Name: "api",
Dockerfile: testDockerfile,
},
Port: 8080,
HealthCheck: manifest.ContainerHealthCheck{
Command: []string{"CMD-SHELL", "curl -f http://localhost/ || exit 1"},
Interval: &testInterval,
Retries: &testRetries,
Timeout: &testTimeout,
StartPeriod: &testStartPeriod,
},
})
mft.EntryPoint = manifest.EntryPointOverride{
String: nil,
StringSlice: []string{"enter", "from"},
}
mft.Command = manifest.CommandOverride{
String: nil,
StringSlice: []string{"here"},
}
mft.ExecuteCommand = manifest.ExecuteCommand{Enable: aws.Bool(true)}
mft.DeployConfig = manifest.DeploymentConfig{
DeploymentControllerConfig: manifest.DeploymentControllerConfig{
Rolling: aws.String("recreate"),
}}
mft.HTTP = manifest.HTTP{
Main: manifest.RoutingRule{
Path: aws.String("/albPath"),
HealthCheck: manifest.HealthCheckArgsOrString{
Union: manifest.AdvancedToUnion[string](manifest.HTTPHealthCheckArgs{
Path: aws.String("/healthz"),
Port: aws.Int(4200),
SuccessCodes: aws.String("418"),
HealthyThreshold: aws.Int64(64),
UnhealthyThreshold: aws.Int64(63),
Timeout: (*time.Duration)(aws.Int64(int64(62 * time.Second))),
Interval: (*time.Duration)(aws.Int64(int64(61 * time.Second))),
GracePeriod: (*time.Duration)(aws.Int64(int64(1 * time.Minute))),
}),
},
Stickiness: aws.Bool(true),
DeregistrationDelay: (*time.Duration)(aws.Int64(int64(59 * time.Second))),
AllowedSourceIps: []manifest.IPNet{"10.0.1.0/24"},
TargetContainer: aws.String("envoy"),
},
}
mft.Sidecars = map[string]*manifest.SidecarConfig{
"envoy": {
Image: manifest.Union[*string, manifest.ImageLocationOrBuild]{
Advanced: manifest.ImageLocationOrBuild{
Build: manifest.BuildArgsOrString{
BuildString: aws.String("./Dockerfile"),
},
},
},
Port: aws.String("443"),
},
"nginx": {
Image: manifest.Union[*string, manifest.ImageLocationOrBuild]{
Basic: aws.String("mockImageURL"),
},
},
}
privatePlacement := manifest.PrivateSubnetPlacement
mft.Network.VPC.Placement = manifest.PlacementArgOrString{
PlacementString: &privatePlacement,
}
mft.Network.VPC.SecurityGroups = manifest.SecurityGroupsIDsOrConfig{}
var actual template.WorkloadOpts
parser := mocks.NewMockbackendSvcReadParser(ctrl)
parser.EXPECT().ParseBackendService(gomock.Any()).DoAndReturn(func(in template.WorkloadOpts) (*template.Content, error) {
actual = in // Capture the translated object.
return &template.Content{Buffer: bytes.NewBufferString("template")}, nil
})
addons := mockAddons{
tpl: `
Resources:
MyTable:
Type: AWS::DynamoDB::Table
Outputs:
MyTable:
Value: !Ref MyTable`,
params: "",
}
svc, err := NewBackendService(BackendServiceConfig{
App: &config.Application{
Name: "phonetool",
},
EnvManifest: &manifest.Environment{
Workload: manifest.Workload{
Name: aws.String("test"),
},
},
Manifest: mft,
RuntimeConfig: RuntimeConfig{
PushedImages: map[string]ECRImage{
"test": {
RepoURL: testImageRepoURL,
ImageTag: testImageTag,
MainContainerName: "test",
ContainerName: "test",
},
"envoy": {
RepoURL: testImageRepoURL,
ImageTag: testImageTag,
MainContainerName: "test",
ContainerName: "envoy",
},
},
},
Addons: addons,
ArtifactBucketName: "my-bucket",
})
svc.parser = parser
require.NoError(t, err)
// WHEN
_, err = svc.Template()
// THEN
require.NoError(t, err)
require.Equal(t, template.WorkloadOpts{
AppName: "phonetool",
EnvName: "test",
WorkloadName: "api",
WorkloadType: manifestinfo.BackendServiceType,
HealthCheck: &template.ContainerHealthCheck{
Command: []string{"CMD-SHELL", "curl -f http://localhost/ || exit 1"},
Interval: aws.Int64(5),
Retries: aws.Int64(3),
StartPeriod: aws.Int64(0),
Timeout: aws.Int64(10),
},
Sidecars: []*template.SidecarOpts{
{
Name: "envoy",
Image: aws.String(fmt.Sprintf("%s:%s-%s", testImageRepoURL, "envoy", testImageTag)),
PortMappings: []*template.PortMapping{
{
Protocol: "tcp",
ContainerName: "envoy",
ContainerPort: 443,
},
},
},
{
Name: "nginx",
Image: aws.String("mockImageURL"),
PortMappings: []*template.PortMapping{},
},
},
HTTPTargetContainer: template.HTTPTargetContainer{
Name: "envoy",
Port: "443",
},
CustomResources: map[string]template.S3ObjectLocation{
"EnvControllerFunction": {
Bucket: "my-bucket",
Key: "manual/scripts/custom-resources/envcontrollerfunction/8932747ba5dbff619d89b92d0033ef1d04f7dd1b055e073254907d4e38e3976d.zip",
},
"DynamicDesiredCountFunction": {
Bucket: "my-bucket",
Key: "manual/scripts/custom-resources/dynamicdesiredcountfunction/8932747ba5dbff619d89b92d0033ef1d04f7dd1b055e073254907d4e38e3976d.zip",
},
"RulePriorityFunction": {
Bucket: "my-bucket",
Key: "manual/scripts/custom-resources/rulepriorityfunction/8932747ba5dbff619d89b92d0033ef1d04f7dd1b055e073254907d4e38e3976d.zip",
},
},
ExecuteCommand: &template.ExecuteCommandOpts{},
NestedStack: &template.WorkloadNestedStackOpts{
StackName: addon.StackName,
VariableOutputs: []string{"MyTable"},
},
Network: template.NetworkOpts{
AssignPublicIP: template.DisablePublicIP,
SubnetsType: template.PrivateSubnetsPlacement,
SecurityGroups: []template.SecurityGroup{},
},
DeploymentConfiguration: template.DeploymentConfigurationOpts{
MinHealthyPercent: 0,
MaxPercent: 100,
},
EntryPoint: []string{"enter", "from"},
Command: []string{"here"},
GracePeriod: aws.Int64(60),
ALBListener: &template.ALBListener{
Rules: []template.ALBListenerRule{
{
Path: "/albPath",
TargetContainer: "envoy",
TargetPort: "443",
HTTPHealthCheck: template.HTTPHealthCheckOpts{
HealthCheckPath: "/healthz",
GracePeriod: 60,
Port: "4200",
SuccessCodes: "418",
HealthyThreshold: aws.Int64(64),
UnhealthyThreshold: aws.Int64(63),
Interval: aws.Int64(61),
Timeout: aws.Int64(62),
},
DeregistrationDelay: aws.Int64(int64(59)),
AllowedSourceIps: []string{
"10.0.1.0/24",
},
Stickiness: "true",
},
},
HostedZoneAliases: template.AliasesForHostedZone{},
MainContainerPort: "8080",
},
ALBEnabled: true,
PortMappings: []*template.PortMapping{
{
Protocol: "tcp",
ContainerName: "api",
ContainerPort: 8080,
},
},
}, actual)
})
}
func TestBackendService_Parameters(t *testing.T) {
testBackendSvcManifest := manifest.NewBackendService(manifest.BackendServiceProps{
WorkloadProps: manifest.WorkloadProps{
Name: testServiceName,
Dockerfile: testDockerfile,
},
Port: 8080,
HealthCheck: manifest.ContainerHealthCheck{
Command: []string{"CMD-SHELL", "curl -f http://localhost/ || exit 1"},
Interval: &testInterval,
Retries: &testRetries,
Timeout: &testTimeout,
StartPeriod: &testStartPeriod,
},
})
conf := &BackendService{
ecsWkld: &ecsWkld{
wkld: &wkld{
name: aws.StringValue(testBackendSvcManifest.Name),
env: testEnvName,
app: testAppName,
image: manifest.Image{
ImageLocationOrBuild: manifest.ImageLocationOrBuild{
Location: aws.String("mockLocation"),
},
},
},
tc: testBackendSvcManifest.BackendServiceConfig.TaskConfig,
},
manifest: testBackendSvcManifest,
}
// WHEN
params, _ := conf.Parameters()
// THEN
require.ElementsMatch(t, []*cloudformation.Parameter{
{
ParameterKey: aws.String(WorkloadAppNameParamKey),
ParameterValue: aws.String("phonetool"),
},
{
ParameterKey: aws.String(WorkloadEnvNameParamKey),
ParameterValue: aws.String("test"),
},
{
ParameterKey: aws.String(WorkloadNameParamKey),
ParameterValue: aws.String("frontend"),
},
{
ParameterKey: aws.String(WorkloadContainerImageParamKey),
ParameterValue: aws.String("mockLocation"),
},
{
ParameterKey: aws.String(WorkloadContainerPortParamKey),
ParameterValue: aws.String("8080"),
},
{
ParameterKey: aws.String(WorkloadTaskCPUParamKey),
ParameterValue: aws.String("256"),
},
{
ParameterKey: aws.String(WorkloadTaskMemoryParamKey),
ParameterValue: aws.String("512"),
},
{
ParameterKey: aws.String(WorkloadTaskCountParamKey),
ParameterValue: aws.String("1"),
},
{
ParameterKey: aws.String(WorkloadLogRetentionParamKey),
ParameterValue: aws.String("30"),
},
{
ParameterKey: aws.String(WorkloadAddonsTemplateURLParamKey),
ParameterValue: aws.String(""),
},
{
ParameterKey: aws.String(WorkloadEnvFileARNParamKey),
ParameterValue: aws.String(""),
},
{
ParameterKey: aws.String(WorkloadTargetContainerParamKey),
ParameterValue: aws.String("frontend"),
},
{
ParameterKey: aws.String(WorkloadTargetPortParamKey),
ParameterValue: aws.String("8080"),
},
}, params)
}
| 683 |
copilot-cli | aws | Go | //go:build integration || localintegration
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
// SPDX-License-Identifier: Apache-2.0
package stack_test
import (
"os"
"path/filepath"
"testing"
"github.com/aws/copilot-cli/internal/pkg/config"
"github.com/aws/copilot-cli/internal/pkg/deploy"
"github.com/aws/copilot-cli/internal/pkg/deploy/cloudformation/stack"
"github.com/aws/copilot-cli/internal/pkg/manifest"
"github.com/stretchr/testify/require"
"gopkg.in/yaml.v3"
)
// TestBB_Pipeline_Template ensures that the CloudFormation template generated for a pipeline matches our pre-defined template.
func TestBB_Pipeline_Template(t *testing.T) {
var build deploy.Build
build.Init(nil, "copilot/pipelines/phonetool-pipeline/")
var stage deploy.PipelineStage
stage.Init(&config.Environment{
App: "phonetool",
Name: "test",
Region: "us-west-2",
AccountID: "1111",
ExecutionRoleARN: "arn:aws:iam::1111:role/phonetool-test-CFNExecutionRole",
ManagerRoleARN: "arn:aws:iam::1111:role/phonetool-test-EnvManagerRole",
}, &manifest.PipelineStage{
Name: "test",
TestCommands: []string{`echo "test"`},
}, []string{"api"})
ps := stack.NewPipelineStackConfig(&deploy.CreatePipelineInput{
AppName: "phonetool",
Name: "phonetool-pipeline",
Source: &deploy.BitbucketSource{
ProviderName: manifest.BitbucketProviderName,
RepositoryURL: "https://bitbucket.org/huanjani/sample",
Branch: "main",
OutputArtifactFormat: "CODEBUILD_CLONE_REF",
},
Build: &build,
Stages: []deploy.PipelineStage{stage},
ArtifactBuckets: []deploy.ArtifactBucket{
{
BucketName: "fancy-bucket",
KeyArn: "arn:aws:kms:us-west-2:1111:key/abcd",
},
},
AdditionalTags: nil,
})
actual, err := ps.Template()
require.NoError(t, err, "template should have rendered successfully")
actualInBytes := []byte(actual)
m1 := make(map[interface{}]interface{})
require.NoError(t, yaml.Unmarshal(actualInBytes, m1))
wanted, err := os.ReadFile(filepath.Join("testdata", "pipeline", "bb_template.yaml"))
require.NoError(t, err, "should be able to read expected template file")
wantedInBytes := []byte(wanted)
m2 := make(map[interface{}]interface{})
require.NoError(t, yaml.Unmarshal(wantedInBytes, m2))
require.Equal(t, m2, m1)
}
| 72 |
copilot-cli | aws | Go | //go:build integration || localintegration
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
// SPDX-License-Identifier: Apache-2.0
package stack_test
import (
"os"
"path/filepath"
"testing"
"github.com/aws/copilot-cli/internal/pkg/config"
"github.com/aws/copilot-cli/internal/pkg/manifest"
"github.com/stretchr/testify/require"
"gopkg.in/yaml.v3"
"github.com/aws/copilot-cli/internal/pkg/deploy"
"github.com/aws/copilot-cli/internal/pkg/deploy/cloudformation/stack"
)
// TestCC_Pipeline_Template ensures that the CloudFormation template generated for a pipeline matches our pre-defined template.
func TestCC_Pipeline_Template(t *testing.T) {
var build deploy.Build
build.Init(nil, "copilot/pipelines/phonetool-pipeline/")
var stage deploy.PipelineStage
stage.Init(&config.Environment{
App: "phonetool",
Name: "staging-test",
Region: "us-west-2",
AccountID: "1111",
ExecutionRoleARN: "arn:aws:iam::1111:role/phonetool-staging-test-CFNExecutionRole",
ManagerRoleARN: "arn:aws:iam::1111:role/phonetool-staging-test-EnvManagerRole",
}, &manifest.PipelineStage{
Name: "staging-test",
TestCommands: []string{`echo "test"`},
}, []string{"api"})
ps := stack.NewPipelineStackConfig(&deploy.CreatePipelineInput{
AppName: "phonetool",
Name: "phonetool-pipeline",
Source: &deploy.CodeCommitSource{
ProviderName: manifest.CodeCommitProviderName,
RepositoryURL: "https://us-west-2.console.aws.amazon.com/codesuite/codecommit/repositories/aws-sample/browse",
Branch: "main",
OutputArtifactFormat: "CODEBUILD_CLONE_REF",
},
Build: &build,
Stages: []deploy.PipelineStage{stage},
ArtifactBuckets: []deploy.ArtifactBucket{
{
BucketName: "fancy-bucket",
KeyArn: "arn:aws:kms:us-west-2:1111:key/abcd",
},
},
AdditionalTags: nil,
})
actual, err := ps.Template()
require.NoError(t, err, "template should have rendered successfully")
actualInBytes := []byte(actual)
m1 := make(map[interface{}]interface{})
require.NoError(t, yaml.Unmarshal(actualInBytes, m1))
wanted, err := os.ReadFile(filepath.Join("testdata", "pipeline", "cc_template.yaml"))
require.NoError(t, err, "should be able to read expected template file")
wantedInBytes := []byte(wanted)
m2 := make(map[interface{}]interface{})
require.NoError(t, yaml.Unmarshal(wantedInBytes, m2))
require.Equal(t, m2, m1)
}
| 74 |
copilot-cli | aws | Go | //go:build integration || localintegration
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
// SPDX-License-Identifier: Apache-2.0
package stack_test
import (
"os"
"path/filepath"
"testing"
"github.com/aws/copilot-cli/internal/pkg/config"
"github.com/aws/copilot-cli/internal/pkg/manifest"
"github.com/stretchr/testify/require"
"gopkg.in/yaml.v3"
"github.com/aws/copilot-cli/internal/pkg/deploy"
"github.com/aws/copilot-cli/internal/pkg/deploy/cloudformation/stack"
)
const (
pipelineManifestPath = "dd_manifest.yaml"
pipelineStackPath = "dd_stack_template.yaml"
)
// TestDD_Pipeline_Template ensures that the CloudFormation template generated for a pipeline matches our pre-defined template.
func TestDD_Pipeline_Template(t *testing.T) {
path := filepath.Join("testdata", "pipeline", pipelineManifestPath)
manifestBytes, err := os.ReadFile(path)
require.NoError(t, err)
pipelineMft, err := manifest.UnmarshalPipeline([]byte(manifestBytes))
require.NoError(t, err)
var build deploy.Build
if err = build.Init(pipelineMft.Build, ""); err != nil {
t.Errorf("build init: %v", err)
}
source, _, err := deploy.PipelineSourceFromManifest(pipelineMft.Source)
var stage deploy.PipelineStage
stage.Init(&config.Environment{
App: "phonetool",
Name: "test",
Region: "us-west-2",
AccountID: "1111",
ExecutionRoleARN: "arn:aws:iam::1111:role/phonetool-test-CFNExecutionRole",
ManagerRoleARN: "arn:aws:iam::1111:role/phonetool-test-EnvManagerRole",
}, &manifest.PipelineStage{
Name: "test",
TestCommands: []string{`echo "test"`},
}, []string{"api"})
serializer := stack.NewPipelineStackConfig(&deploy.CreatePipelineInput{
AppName: "phonetool",
Build: &build,
Source: source,
Stages: []deploy.PipelineStage{stage},
ArtifactBuckets: []deploy.ArtifactBucket{
{
BucketName: "fancy-bucket",
KeyArn: "arn:aws:kms:us-west-2:1111:key/abcd",
},
},
AdditionalTags: nil,
})
actual, err := serializer.Template()
require.NoError(t, err, "template should have rendered successfully")
actualInBytes := []byte(actual)
m1 := make(map[any]any)
require.NoError(t, yaml.Unmarshal(actualInBytes, m1))
wanted, err := os.ReadFile(filepath.Join("testdata", "pipeline", pipelineStackPath))
require.NoError(t, err, "should be able to read expected template file")
wantedInBytes := []byte(wanted)
m2 := make(map[any]any)
require.NoError(t, yaml.Unmarshal(wantedInBytes, m2))
require.Equal(t, m2, m1)
}
| 85 |
copilot-cli | aws | Go | // Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
// SPDX-License-Identifier: Apache-2.0
// Package stack provides functionality to transform manifest files and additional runtime
// configuration into CloudFormation stacks.
package stack
| 7 |
copilot-cli | aws | Go | // Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
// SPDX-License-Identifier: Apache-2.0
package stack
import "github.com/aws/copilot-cli/internal/pkg/template"
type loadBalancedWebSvcReadParser interface {
template.ReadParser
ParseLoadBalancedWebService(template.WorkloadOpts) (*template.Content, error)
}
type backendSvcReadParser interface {
template.ReadParser
ParseBackendService(template.WorkloadOpts) (*template.Content, error)
}
type requestDrivenWebSvcReadParser interface {
template.ReadParser
ParseRequestDrivenWebService(template.WorkloadOpts) (*template.Content, error)
}
type workerSvcReadParser interface {
template.ReadParser
ParseWorkerService(template.WorkloadOpts) (*template.Content, error)
}
type staticSiteReadParser interface {
template.ReadParser
ParseStaticSite(template.WorkloadOpts) (*template.Content, error)
}
type scheduledJobReadParser interface {
template.ReadParser
ParseScheduledJob(template.WorkloadOpts) (*template.Content, error)
}
type envReadParser interface {
template.ReadParser
ParseEnv(data *template.EnvOpts) (*template.Content, error)
ParseEnvBootstrap(data *template.EnvOpts, options ...template.ParseOption) (*template.Content, error)
}
// embedFS is the interface to parse any embedded templates.
type embedFS interface {
backendSvcReadParser
loadBalancedWebSvcReadParser
requestDrivenWebSvcReadParser
staticSiteReadParser
scheduledJobReadParser
workerSvcReadParser
envReadParser
}
var (
realEmbedFS embedFS = template.New()
fs = realEmbedFS
)
| 59 |
copilot-cli | aws | Go | // Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
// SPDX-License-Identifier: Apache-2.0
package stack
import (
"fmt"
"github.com/aws/copilot-cli/internal/pkg/aws/s3"
"github.com/aws/copilot-cli/internal/pkg/deploy/upload/customresource"
"github.com/aws/aws-sdk-go/aws"
"github.com/aws/aws-sdk-go/aws/arn"
"github.com/aws/aws-sdk-go/service/cloudformation"
"github.com/aws/copilot-cli/internal/pkg/config"
"github.com/aws/copilot-cli/internal/pkg/deploy"
"github.com/aws/copilot-cli/internal/pkg/manifest"
"github.com/aws/copilot-cli/internal/pkg/template"
"github.com/google/uuid"
)
// Parameter keys.
const (
EnvParamAliasesKey = "Aliases"
EnvParamALBWorkloadsKey = "ALBWorkloads"
EnvParamServiceDiscoveryEndpoint = "ServiceDiscoveryEndpoint"
envParamAppNameKey = "AppName"
envParamEnvNameKey = "EnvironmentName"
envParamToolsAccountPrincipalKey = "ToolsAccountPrincipalARN"
envParamAppDNSKey = "AppDNSName"
envParamAppDNSDelegationRoleKey = "AppDNSDelegationRole"
envParamInternalALBWorkloadsKey = "InternalALBWorkloads"
envParamEFSWorkloadsKey = "EFSWorkloads"
envParamNATWorkloadsKey = "NATWorkloads"
envParamAppRunnerPrivateWorkloadsKey = "AppRunnerPrivateWorkloads"
envParamCreateHTTPSListenerKey = "CreateHTTPSListener"
envParamCreateInternalHTTPSListenerKey = "CreateInternalHTTPSListener"
)
// Output keys.
const (
EnvOutputVPCID = "VpcId"
EnvOutputPublicSubnets = "PublicSubnets"
EnvOutputPrivateSubnets = "PrivateSubnets"
envOutputCFNExecutionRoleARN = "CFNExecutionRoleARN"
envOutputManagerRoleKey = "EnvironmentManagerRoleARN"
)
const (
// DefaultVPCCIDR is the default CIDR used for a manged VPC.
DefaultVPCCIDR = "10.0.0.0/16"
)
var (
// DefaultPublicSubnetCIDRs contains two default CIDRs for the two managed public subnets.
DefaultPublicSubnetCIDRs = []string{"10.0.0.0/24", "10.0.1.0/24"}
// DefaultPrivateSubnetCIDRs contains two default CIDRs for the two managed private subnets.
DefaultPrivateSubnetCIDRs = []string{"10.0.2.0/24", "10.0.3.0/24"}
)
var fmtServiceDiscoveryEndpoint = "%s.%s.local"
// Addons contains information about a packaged addons.
type Addons struct {
S3ObjectURL string // S3ObjectURL is the URL where the addons template is uploaded.
Stack NestedStackConfigurer // Stack generates the template and the parameters to the addons.
}
// EnvConfig holds the fields required to deploy an environment.
type EnvConfig struct {
Name string // Name of the environment, must be unique within an application.
Version string // The version of the environment template to create the stack. If empty, creates the legacy stack.
// Application regional configurations.
App deploy.AppInformation // Information about the application that the environment belongs to, include app name, DNS name, the principal ARN of the account.
AdditionalTags map[string]string // AdditionalTags are labels applied to resources under the application.
ArtifactBucketARN string // ARN of the regional application bucket.
ArtifactBucketKeyARN string // ARN of the KMS key used to encrypt the contents in the regional application bucket.
PermissionsBoundary string // Optional. An IAM Managed Policy name used as permissions boundary for IAM roles.
// Runtime configurations.
Addons *Addons
CustomResourcesURLs map[string]string // Mapping of Custom Resource Function Name to the S3 URL where the function zip file is stored.
// User inputs.
ImportVPCConfig *config.ImportVPC // Optional configuration if users have an existing VPC.
AdjustVPCConfig *config.AdjustVPC // Optional configuration if users want to override default VPC configuration.
ImportCertARNs []string // Optional configuration if users want to import certificates.
InternalALBSubnets []string // Optional configuration if users want to specify internal ALB placement.
AllowVPCIngress bool // Optional configuration to allow access to internal ALB from ports 80/443.
CIDRPrefixListIDs []string // Optional configuration to specify public security group ingress based on prefix lists.
PublicALBSourceIPs []string // Optional configuration to specify public security group ingress based on customer given source IPs.
InternalLBSourceIPs []string // Optional configuration to specify private security group ingress based on customer given source IPs.
Telemetry *config.Telemetry // Optional observability and monitoring configuration.
Mft *manifest.Environment // Unmarshaled and interpolated manifest object.
RawMft []byte // Content of the environment manifest without any modifications.
ForceUpdate bool
}
func (cfg *EnvConfig) loadCustomResourceURLs(crs []uploadable) error {
if len(cfg.CustomResourcesURLs) != 0 {
return nil
}
bucket, _, err := s3.ParseARN(cfg.ArtifactBucketARN)
if err != nil {
return fmt.Errorf("parse artifact bucket ARN: %w", err)
}
cfg.CustomResourcesURLs = make(map[string]string, len(crs))
for _, cr := range crs {
cfg.CustomResourcesURLs[cr.Name()] = s3.Location(bucket, cr.ArtifactPath())
}
return nil
}
// Env is for providing all the values to set up an
// environment stack and to interpret the outputs from it.
type Env struct {
in *EnvConfig
lastForceUpdateID string
prevParams []*cloudformation.Parameter
parser envReadParser
}
// NewEnvStackConfig returns a CloudFormation stack configuration for deploying a brand-new environment.
func NewEnvStackConfig(input *EnvConfig) (*Env, error) {
crs, err := customresource.Env(fs)
if err != nil {
return nil, fmt.Errorf("environment custom resources: %w", err)
}
if err := input.loadCustomResourceURLs(uploadableCRs(crs).convert()); err != nil {
return nil, err
}
return &Env{
in: input,
parser: fs,
}, nil
}
// NewEnvConfigFromExistingStack returns a CloudFormation stack configuration for updating an environment.
func NewEnvConfigFromExistingStack(in *EnvConfig, lastForceUpdateID string, prevParams []*cloudformation.Parameter) (*Env, error) {
crs, err := customresource.Env(fs)
if err != nil {
return nil, fmt.Errorf("environment custom resources: %w", err)
}
if err := in.loadCustomResourceURLs(uploadableCRs(crs).convert()); err != nil {
return nil, err
}
return &Env{
in: in,
prevParams: prevParams,
lastForceUpdateID: lastForceUpdateID,
parser: fs,
}, nil
}
// Template returns the environment CloudFormation template.
func (e *Env) Template() (string, error) {
crs, err := convertCustomResources(e.in.CustomResourcesURLs)
if err != nil {
return "", err
}
var addons *template.Addons
if e.in.Addons != nil {
extraParams, err := e.in.Addons.Stack.Parameters()
if err != nil {
return "", fmt.Errorf("parse extra parameters for environment addons: %w", err)
}
addons = &template.Addons{
URL: e.in.Addons.S3ObjectURL,
ExtraParams: extraParams,
}
}
vpcConfig, err := e.vpcConfig()
if err != nil {
return "", err
}
forceUpdateID := e.lastForceUpdateID
if e.in.ForceUpdate {
id, err := uuid.NewRandom()
if err != nil {
return "", fmt.Errorf("generate uuid for a forced update: %s", err)
}
forceUpdateID = id.String()
}
content, err := e.parser.ParseEnv(&template.EnvOpts{
AppName: e.in.App.Name,
EnvName: e.in.Name,
CustomResources: crs,
Addons: addons,
ArtifactBucketARN: e.in.ArtifactBucketARN,
ArtifactBucketKeyARN: e.in.ArtifactBucketKeyARN,
PermissionsBoundary: e.in.PermissionsBoundary,
PublicHTTPConfig: e.publicHTTPConfig(),
VPCConfig: vpcConfig,
PrivateHTTPConfig: e.privateHTTPConfig(),
Telemetry: e.telemetryConfig(),
CDNConfig: e.cdnConfig(),
LatestVersion: e.in.Version,
SerializedManifest: string(e.in.RawMft),
ForceUpdateID: forceUpdateID,
DelegateDNS: e.in.App.Domain != "",
})
if err != nil {
return "", err
}
return content.String(), nil
}
// Parameters returns the parameters to be passed into an environment CloudFormation template.
func (e *Env) Parameters() ([]*cloudformation.Parameter, error) {
httpsListener := "false"
if len(e.importPublicCertARNs()) != 0 || e.in.App.Domain != "" {
httpsListener = "true"
}
internalHTTPSListener := "false"
if len(e.importPrivateCertARNs()) != 0 {
internalHTTPSListener = "true"
}
currParams := []*cloudformation.Parameter{
{
ParameterKey: aws.String(envParamAppNameKey),
ParameterValue: aws.String(e.in.App.Name),
},
{
ParameterKey: aws.String(envParamEnvNameKey),
ParameterValue: aws.String(e.in.Name),
},
{
ParameterKey: aws.String(envParamToolsAccountPrincipalKey),
ParameterValue: aws.String(e.in.App.AccountPrincipalARN),
},
{
ParameterKey: aws.String(envParamAppDNSKey),
ParameterValue: aws.String(e.in.App.Domain),
},
{
ParameterKey: aws.String(envParamAppDNSDelegationRoleKey),
ParameterValue: aws.String(e.in.App.DNSDelegationRole()),
},
{
ParameterKey: aws.String(EnvParamServiceDiscoveryEndpoint),
ParameterValue: aws.String(fmt.Sprintf(fmtServiceDiscoveryEndpoint, e.in.Name, e.in.App.Name)),
},
{
ParameterKey: aws.String(envParamCreateHTTPSListenerKey),
ParameterValue: aws.String(httpsListener),
},
{
ParameterKey: aws.String(envParamCreateInternalHTTPSListenerKey),
ParameterValue: aws.String(internalHTTPSListener),
},
{
ParameterKey: aws.String(EnvParamAliasesKey),
ParameterValue: aws.String(""),
},
{
ParameterKey: aws.String(EnvParamALBWorkloadsKey),
ParameterValue: aws.String(""),
},
{
ParameterKey: aws.String(envParamInternalALBWorkloadsKey),
ParameterValue: aws.String(""),
},
{
ParameterKey: aws.String(envParamEFSWorkloadsKey),
ParameterValue: aws.String(""),
},
{
ParameterKey: aws.String(envParamNATWorkloadsKey),
ParameterValue: aws.String(""),
},
{
ParameterKey: aws.String(envParamAppRunnerPrivateWorkloadsKey),
ParameterValue: aws.String(""),
},
}
if e.prevParams == nil {
return currParams, nil
}
// If we're creating a stack configuration for an existing environment stack, ensure the previous env controller
// managed parameters are using the previous value.
return e.transformParameters(currParams, e.prevParams, transformEnvControllerParameters, e.transformServiceDiscoveryEndpoint)
}
// SerializedParameters returns the CloudFormation stack's parameters serialized to a JSON document.
func (e *Env) SerializedParameters() (string, error) {
return serializeTemplateConfig(e.parser, e)
}
// Tags returns the tags that should be applied to the environment CloudFormation stack.
func (e *Env) Tags() []*cloudformation.Tag {
return mergeAndFlattenTags(e.in.AdditionalTags, map[string]string{
deploy.AppTagKey: e.in.App.Name,
deploy.EnvTagKey: e.in.Name,
})
}
// StackName returns the name of the CloudFormation stack (based on the app and env names).
func (e *Env) StackName() string {
return NameForEnv(e.in.App.Name, e.in.Name)
}
type transformParameterFunc func(new, old *cloudformation.Parameter) *cloudformation.Parameter
// transformParameters removes or transforms each of the current parameters and does not add any new parameters.
// This means that parameters that exist only in the old template are left out.
// The parameter`transformFunc` are functions that transform a parameter, given its value in the new template and the old template.
// Each transform functions should keep the following in mind:
// 1. It should return `nil` if the parameter should be removed.
// 2. The transform functions are applied in a convolutional manner.
// 3. If the parameter `old` is passed in as `nil`, the parameter does not exist in the old template.
func (e *Env) transformParameters(currParams, oldParams []*cloudformation.Parameter, transformFunc ...transformParameterFunc) ([]*cloudformation.Parameter, error) {
// Make a map out of `currParams` and out of `oldParams`.
curr := make(map[string]*cloudformation.Parameter)
for _, p := range currParams {
curr[aws.StringValue(p.ParameterKey)] = p
}
old := make(map[string]*cloudformation.Parameter)
for _, p := range oldParams {
old[aws.StringValue(p.ParameterKey)] = p
}
// Remove or transform each of the current parameters.
var params []*cloudformation.Parameter
for k, p := range curr {
currP := p
for _, transform := range transformFunc {
currP = transform(currP, old[k])
}
if currP != nil {
params = append(params, currP)
}
}
return params, nil
}
// transformEnvControllerParameters transforms an env-controller managed parameter.
// If the parameter exists in the old template, it returns the old parameter assuming that old.ParameterKey = new.ParameterKey.
// Otherwise, it returns its new default value.
func transformEnvControllerParameters(new, old *cloudformation.Parameter) *cloudformation.Parameter {
if new == nil {
return nil
}
isEnvControllerManaged := make(map[string]struct{})
for _, f := range template.AvailableEnvFeatures() {
isEnvControllerManaged[f] = struct{}{}
}
if _, ok := isEnvControllerManaged[aws.StringValue(new.ParameterKey)]; !ok {
return new
}
if old == nil { // The EnvController-managed parameter doesn't exist in the old stack. Use the new value.
return new
}
// Ideally, we would return `&cloudformation.Parameter{ ParameterKey: new.ParameterKey, UsePreviousValue: true}`.
// Unfortunately CodePipeline template config does not support it.
// https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/continuous-delivery-codepipeline-cfn-artifacts.html#w2ab1c21c15c15
return old
}
// transformServiceDiscoveryEndpoint transforms the service discovery endpoint parameter.
// If the parameter exists in the old template, it uses its previous value.
// Otherwise, it uses a default value of `<app>.local`.
func (e *Env) transformServiceDiscoveryEndpoint(new, old *cloudformation.Parameter) *cloudformation.Parameter {
if new == nil {
return nil
}
if aws.StringValue(new.ParameterKey) != EnvParamServiceDiscoveryEndpoint {
return new
}
if old == nil {
return &cloudformation.Parameter{
ParameterKey: new.ParameterKey,
ParameterValue: aws.String(fmt.Sprintf(`%s.local`, e.in.App.Name)),
}
}
// Ideally, we would return `&cloudformation.Parameter{ ParameterKey: new.ParameterKey, UsePreviousValue: true}`.
// Unfortunately CodePipeline template config does not support it.
// https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/continuous-delivery-codepipeline-cfn-artifacts.html#w2ab1c21c15c15
return old
}
// NewBootstrapEnvStackConfig sets up a BootstrapEnv struct.
func NewBootstrapEnvStackConfig(input *EnvConfig) *BootstrapEnv {
return &BootstrapEnv{
in: input,
parser: template.New(),
}
}
// BootstrapEnv contains information for creating a stack bootstrapping environment resources.
type BootstrapEnv Env
// Template returns the CloudFormation template to bootstrap environment resources.
func (e *BootstrapEnv) Template() (string, error) {
content, err := e.parser.ParseEnvBootstrap(&template.EnvOpts{
ArtifactBucketARN: e.in.ArtifactBucketARN,
ArtifactBucketKeyARN: e.in.ArtifactBucketKeyARN,
PermissionsBoundary: e.in.PermissionsBoundary,
})
if err != nil {
return "", err
}
return content.String(), nil
}
// Parameters returns the parameters to be passed into the bootstrap stack's CloudFormation template.
func (e *BootstrapEnv) Parameters() ([]*cloudformation.Parameter, error) {
return []*cloudformation.Parameter{
{
ParameterKey: aws.String(envParamAppNameKey),
ParameterValue: aws.String(e.in.App.Name),
},
{
ParameterKey: aws.String(envParamEnvNameKey),
ParameterValue: aws.String(e.in.Name),
},
{
ParameterKey: aws.String(envParamToolsAccountPrincipalKey),
ParameterValue: aws.String(e.in.App.AccountPrincipalARN),
},
}, nil
}
// SerializedParameters returns the CloudFormation stack's parameters serialized
// to a YAML document annotated with comments for readability to users.
func (e *BootstrapEnv) SerializedParameters() (string, error) {
// No-op for now.
return "", nil
}
// Tags returns the tags that should be applied to the bootstrap CloudFormation stack.
func (e *BootstrapEnv) Tags() []*cloudformation.Tag {
return (*Env)(e).Tags()
}
// StackName returns the name of the CloudFormation stack (based on the app and env names).
func (e *BootstrapEnv) StackName() string {
return (*Env)(e).StackName()
}
// ToEnvMetadata inspects an environment cloudformation stack and constructs an environment
// struct out of it (including resources like ECR Repo).
func (e *BootstrapEnv) ToEnvMetadata(stack *cloudformation.Stack) (*config.Environment, error) {
stackARN, err := arn.Parse(*stack.StackId)
if err != nil {
return nil, fmt.Errorf("couldn't extract region and account from stack ID %s: %w", *stack.StackId, err)
}
stackOutputs := make(map[string]string)
for _, output := range stack.Outputs {
stackOutputs[*output.OutputKey] = *output.OutputValue
}
return &config.Environment{
Name: e.in.Name,
App: e.in.App.Name,
Region: stackARN.Region,
AccountID: stackARN.AccountID,
ManagerRoleARN: stackOutputs[envOutputManagerRoleKey],
ExecutionRoleARN: stackOutputs[envOutputCFNExecutionRoleARN],
}, nil
}
func (e *Env) cdnConfig() *template.CDNConfig {
if e.in.Mft == nil || !e.in.Mft.CDNEnabled() {
return nil
}
mftConfig := e.in.Mft.CDNConfig.Config
config := &template.CDNConfig{
ImportedCertificate: mftConfig.Certificate,
TerminateTLS: aws.BoolValue(mftConfig.TerminateTLS),
}
if !mftConfig.Static.IsEmpty() {
config.Static = &template.CDNStaticAssetConfig{
ImportedBucket: mftConfig.Static.Location,
Path: mftConfig.Static.Path,
Alias: mftConfig.Static.Alias,
}
}
return config
}
func (e *Env) publicHTTPConfig() template.PublicHTTPConfig {
return template.PublicHTTPConfig{
HTTPConfig: template.HTTPConfig{
ImportedCertARNs: e.importPublicCertARNs(),
SSLPolicy: e.getPublicSSLPolicy(),
},
PublicALBSourceIPs: e.in.PublicALBSourceIPs,
CIDRPrefixListIDs: e.in.CIDRPrefixListIDs,
ELBAccessLogs: convertELBAccessLogsConfig(e.in.Mft),
}
}
func (e *Env) privateHTTPConfig() template.PrivateHTTPConfig {
return template.PrivateHTTPConfig{
HTTPConfig: template.HTTPConfig{
ImportedCertARNs: e.importPrivateCertARNs(),
SSLPolicy: e.getPrivateSSLPolicy(),
},
CustomALBSubnets: e.internalALBSubnets(),
}
}
func (e *Env) vpcConfig() (template.VPCConfig, error) {
securityGroupConfig, err := convertEnvSecurityGroupCfg(e.in.Mft)
if err != nil {
return template.VPCConfig{}, err
}
flowLogs, err := convertFlowLogsConfig(e.in.Mft)
if err != nil {
return template.VPCConfig{}, err
}
return template.VPCConfig{
Imported: e.importVPC(),
Managed: e.managedVPC(),
AllowVPCIngress: e.in.Mft.HTTPConfig.Private.HasVPCIngress(),
SecurityGroupConfig: securityGroupConfig,
FlowLogs: flowLogs,
}, nil
}
func (e *Env) importVPC() *template.ImportVPC {
// If a manifest is present, it is the only place we look at.
if e.in.Mft != nil {
return e.in.Mft.Network.VPC.ImportedVPC()
}
// Fallthrough to SSM config.
if e.in.ImportVPCConfig == nil {
return nil
}
return &template.ImportVPC{
ID: e.in.ImportVPCConfig.ID,
PublicSubnetIDs: e.in.ImportVPCConfig.PublicSubnetIDs,
PrivateSubnetIDs: e.in.ImportVPCConfig.PrivateSubnetIDs,
}
}
func (e *Env) managedVPC() template.ManagedVPC {
defaultManagedVPC := template.ManagedVPC{
CIDR: DefaultVPCCIDR,
PublicSubnetCIDRs: DefaultPublicSubnetCIDRs,
PrivateSubnetCIDRs: DefaultPrivateSubnetCIDRs,
}
// If a manifest is present, it is the only place we look at.
if e.in.Mft != nil {
if v := e.in.Mft.Network.VPC.ManagedVPC(); v != nil {
return *v
}
return defaultManagedVPC
}
// Fallthrough to SSM config.
if e.in.AdjustVPCConfig == nil {
return defaultManagedVPC
}
return template.ManagedVPC{
CIDR: e.in.AdjustVPCConfig.CIDR,
AZs: e.in.AdjustVPCConfig.AZs,
PublicSubnetCIDRs: e.in.AdjustVPCConfig.PublicSubnetCIDRs,
PrivateSubnetCIDRs: e.in.AdjustVPCConfig.PrivateSubnetCIDRs,
}
}
func (e *Env) telemetryConfig() *template.Telemetry {
// If a manifest is present, it is the only place we look at.
if e.in.Mft != nil {
return &template.Telemetry{
EnableContainerInsights: aws.BoolValue(e.in.Mft.Observability.ContainerInsights),
}
}
// Fallthrough to SSM config.
if e.in.Telemetry == nil {
// For environments before Copilot v1.14.0, `Telemetry` is nil.
return nil
}
return &template.Telemetry{
// For environments after v1.14.0, and v1.20.0, `Telemetry` is never nil,
// and `EnableContainerInsights` is either true or false.
EnableContainerInsights: e.in.Telemetry.EnableContainerInsights,
}
}
func (e *Env) importPublicCertARNs() []string {
// If a manifest is present, it is the only place we look at.
if e.in.Mft != nil {
return e.in.Mft.HTTPConfig.Public.Certificates
}
// Fallthrough to SSM config.
if e.in.ImportVPCConfig != nil && len(e.in.ImportVPCConfig.PublicSubnetIDs) == 0 {
return nil
}
return e.in.ImportCertARNs
}
func (e *Env) importPrivateCertARNs() []string {
// If a manifest is present, it is the only place we look at.
if e.in.Mft != nil {
return e.in.Mft.HTTPConfig.Private.Certificates
}
// Fallthrough to SSM config.
if e.in.ImportVPCConfig != nil && len(e.in.ImportVPCConfig.PublicSubnetIDs) == 0 {
return e.in.ImportCertARNs
}
return nil
}
func (e *Env) internalALBSubnets() []string {
// If a manifest is present, it is the only place we look.
if e.in.Mft != nil {
return e.in.Mft.HTTPConfig.Private.InternalALBSubnets
}
// Fallthrough to SSM config.
return e.in.InternalALBSubnets
}
func (e *Env) getPublicSSLPolicy() *string {
return e.in.Mft.EnvironmentConfig.HTTPConfig.Public.SSLPolicy
}
func (e *Env) getPrivateSSLPolicy() *string {
return e.in.Mft.EnvironmentConfig.HTTPConfig.Private.SSLPolicy
}
| 628 |
copilot-cli | aws | Go | //go:build integration || localintegration
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
// SPDX-License-Identifier: Apache-2.0
package stack_test
import (
"fmt"
"os"
"path/filepath"
"reflect"
"strings"
"testing"
"github.com/aws/copilot-cli/internal/pkg/manifest"
"gopkg.in/yaml.v3"
"github.com/aws/copilot-cli/internal/pkg/deploy"
"github.com/aws/copilot-cli/internal/pkg/deploy/cloudformation/stack"
"github.com/stretchr/testify/require"
)
func TestEnvStack_Template(t *testing.T) {
testCases := map[string]struct {
input *stack.EnvConfig
wantedFileName string
}{
"generate template with embedded manifest file with container insights and cloudfront imported bucket and advanced access logs": {
input: func() *stack.EnvConfig {
rawMft := `name: test
type: Environment
# Create the public ALB with certificates attached.
cdn:
certificate: viewer-cert
static_assets:
location: cf-s3-ecs-demo-bucket.s3.us-west-2.amazonaws.com
alias: example.com
path: static/*
http:
public:
ingress:
cdn: true
source_ips:
- 1.1.1.1
- 2.2.2.2
access_logs:
bucket_name: accesslogsbucket
prefix: accesslogsbucketprefix
certificates:
- cert-1
- cert-2
private:
security_groups:
ingress:
from_vpc: true
observability:
container_insights: true # Enable container insights.`
var mft manifest.Environment
err := yaml.Unmarshal([]byte(rawMft), &mft)
require.NoError(t, err)
return &stack.EnvConfig{
Version: "1.x",
App: deploy.AppInformation{
AccountPrincipalARN: "arn:aws:iam::000000000:root",
Name: "demo",
},
Name: "test",
CIDRPrefixListIDs: []string{"pl-mockid"},
PublicALBSourceIPs: []string{"1.1.1.1", "2.2.2.2"},
ArtifactBucketARN: "arn:aws:s3:::mockbucket",
ArtifactBucketKeyARN: "arn:aws:kms:us-west-2:000000000:key/1234abcd-12ab-34cd-56ef-1234567890ab",
Mft: &mft,
RawMft: []byte(rawMft),
}
}(),
wantedFileName: "template-with-cloudfront-observability.yml",
},
"generate template with default access logs": {
input: func() *stack.EnvConfig {
rawMft := `name: test
type: Environment
http:
public:
access_logs: true`
var mft manifest.Environment
err := yaml.Unmarshal([]byte(rawMft), &mft)
require.NoError(t, err)
return &stack.EnvConfig{
Version: "1.x",
App: deploy.AppInformation{
AccountPrincipalARN: "arn:aws:iam::000000000:root",
Name: "demo",
},
Name: "test",
ArtifactBucketARN: "arn:aws:s3:::mockbucket",
ArtifactBucketKeyARN: "arn:aws:kms:us-west-2:000000000:key/1234abcd-12ab-34cd-56ef-1234567890ab",
Mft: &mft,
RawMft: []byte(rawMft),
}
}(),
wantedFileName: "template-with-default-access-log-config.yml",
},
"generate template with embedded manifest file with custom security groups rules added by the customer": {
input: func() *stack.EnvConfig {
rawMft := `name: test
type: Environment
# Create the public ALB with certificates attached.
http:
public:
certificates:
- cert-1
- cert-2
observability:
container_insights: true # Enable container insights.
network:
vpc:
security_group:
ingress:
- ip_protocol: tcp
ports: 10
cidr: 0.0.0.0
- ip_protocol: tcp
ports: 1-10
cidr: 0.0.0.0
egress:
- ip_protocol: tcp
ports: 0-65535
cidr: 0.0.0.0`
var mft manifest.Environment
err := yaml.Unmarshal([]byte(rawMft), &mft)
require.NoError(t, err)
return &stack.EnvConfig{
Version: "1.x",
App: deploy.AppInformation{
AccountPrincipalARN: "arn:aws:iam::000000000:root",
Name: "demo",
},
Name: "test",
ArtifactBucketARN: "arn:aws:s3:::mockbucket",
ArtifactBucketKeyARN: "arn:aws:kms:us-west-2:000000000:key/1234abcd-12ab-34cd-56ef-1234567890ab",
Mft: &mft,
RawMft: []byte(rawMft),
}
}(),
wantedFileName: "template-with-custom-security-group.yml",
},
"generate template with embedded manifest file with imported certificates and SSL Policy and empty security groups rules added by the customer": {
input: func() *stack.EnvConfig {
rawMft := `name: test
type: Environment
# Create the public ALB with certificates attached.
http:
public:
certificates:
- cert-1
- cert-2
ssl_policy: ELBSecurityPolicy-FS-1-1-2019-08
observability:
container_insights: true # Enable container insights.
security_group:
ingress:
egress:`
var mft manifest.Environment
err := yaml.Unmarshal([]byte(rawMft), &mft)
require.NoError(t, err)
return &stack.EnvConfig{
Version: "1.x",
App: deploy.AppInformation{
AccountPrincipalARN: "arn:aws:iam::000000000:root",
Name: "demo",
},
Name: "test",
ArtifactBucketARN: "arn:aws:s3:::mockbucket",
ArtifactBucketKeyARN: "arn:aws:kms:us-west-2:000000000:key/1234abcd-12ab-34cd-56ef-1234567890ab",
Mft: &mft,
RawMft: []byte(rawMft),
}
}(),
wantedFileName: "template-with-imported-certs-sslpolicy-custom-empty-security-group.yml",
},
"generate template with custom resources": {
input: func() *stack.EnvConfig {
rawMft := `name: test
type: Environment`
var mft manifest.Environment
err := yaml.Unmarshal([]byte(rawMft), &mft)
require.NoError(t, err)
return &stack.EnvConfig{
Version: "1.x",
App: deploy.AppInformation{
AccountPrincipalARN: "arn:aws:iam::000000000:root",
Name: "demo",
},
Name: "test",
ArtifactBucketARN: "arn:aws:s3:::mockbucket",
ArtifactBucketKeyARN: "arn:aws:kms:us-west-2:000000000:key/1234abcd-12ab-34cd-56ef-1234567890ab",
Mft: &mft,
RawMft: []byte(rawMft),
}
}(),
wantedFileName: "template-with-basic-manifest.yml",
},
"generate template with default vpc and flowlogs is on": {
input: func() *stack.EnvConfig {
rawMft := `name: test
type: Environment
network:
vpc:
flow_logs:
retention: 60`
var mft manifest.Environment
err := yaml.Unmarshal([]byte(rawMft), &mft)
require.NoError(t, err)
return &stack.EnvConfig{
Version: "1.x",
App: deploy.AppInformation{
AccountPrincipalARN: "arn:aws:iam::000000000:root",
Name: "demo",
},
Name: "test",
ArtifactBucketARN: "arn:aws:s3:::mockbucket",
ArtifactBucketKeyARN: "arn:aws:kms:us-west-2:000000000:key/1234abcd-12ab-34cd-56ef-1234567890ab",
Mft: &mft,
RawMft: []byte(rawMft),
}
}(),
wantedFileName: "template-with-defaultvpc-flowlogs.yml",
},
"generate template with imported vpc and flowlogs is on": {
input: func() *stack.EnvConfig {
rawMft := `name: test
type: Environment
network:
vpc:
id: 'vpc-12345'
subnets:
public:
- id: 'subnet-11111'
- id: 'subnet-22222'
private:
- id: 'subnet-33333'
- id: 'subnet-44444'
flow_logs: on`
var mft manifest.Environment
err := yaml.Unmarshal([]byte(rawMft), &mft)
require.NoError(t, err)
return &stack.EnvConfig{
Version: "1.x",
App: deploy.AppInformation{
AccountPrincipalARN: "arn:aws:iam::000000000:root",
Name: "demo",
},
Name: "test",
ArtifactBucketARN: "arn:aws:s3:::mockbucket",
ArtifactBucketKeyARN: "arn:aws:kms:us-west-2:000000000:key/1234abcd-12ab-34cd-56ef-1234567890ab",
Mft: &mft,
RawMft: []byte(rawMft),
}
}(),
wantedFileName: "template-with-importedvpc-flowlogs.yml",
},
}
for name, tc := range testCases {
t.Run(name, func(t *testing.T) {
// GIVEN
wanted, err := os.ReadFile(filepath.Join("testdata", "environments", tc.wantedFileName))
require.NoError(t, err, "read wanted template")
wantedObj := make(map[any]any)
require.NoError(t, yaml.Unmarshal(wanted, wantedObj))
// WHEN
envStack, err := stack.NewEnvStackConfig(tc.input)
require.NoError(t, err)
actual, err := envStack.Template()
require.NoError(t, err, "serialize template")
actualObj := make(map[any]any)
require.NoError(t, yaml.Unmarshal([]byte(actual), actualObj))
actualMetadata := actualObj["Metadata"].(map[string]any) // We remove the Version from the expected template, as the latest env version always changes.
delete(actualMetadata, "Version")
// Strip new lines when comparing outputs.
actualObj["Metadata"].(map[string]any)["Manifest"] = strings.TrimSpace(actualObj["Metadata"].(map[string]any)["Manifest"].(string))
wantedObj["Metadata"].(map[string]any)["Manifest"] = strings.TrimSpace(wantedObj["Metadata"].(map[string]any)["Manifest"].(string))
// THEN
resetCustomResourceLocations(actualObj)
compareStackTemplate(t, wantedObj, actualObj)
})
}
}
func TestEnvStack_Regression(t *testing.T) {
testCases := map[string]struct {
originalManifest *stack.EnvConfig
newManifest *stack.EnvConfig
}{
"should produce the same template after migrating load balancer ingress fields": {
originalManifest: func() *stack.EnvConfig {
rawMft := `name: test
type: Environment
# Create the public ALB with certificates attached.
cdn:
certificate: viewer-cert
http:
public:
security_groups:
ingress:
restrict_to:
cdn: true
access_logs:
bucket_name: accesslogsbucket
prefix: accesslogsbucketprefix
certificates:
- cert-1
- cert-2
private:
security_groups:
ingress:
from_vpc: true
observability:
container_insights: true # Enable container insights.`
var mft manifest.Environment
err := yaml.Unmarshal([]byte(rawMft), &mft)
require.NoError(t, err)
return &stack.EnvConfig{
Version: "1.x",
App: deploy.AppInformation{
AccountPrincipalARN: "arn:aws:iam::000000000:root",
Name: "demo",
},
Name: "test",
CIDRPrefixListIDs: []string{"pl-mockid"},
ArtifactBucketARN: "arn:aws:s3:::mockbucket",
ArtifactBucketKeyARN: "arn:aws:kms:us-west-2:000000000:key/1234abcd-12ab-34cd-56ef-1234567890ab",
Mft: &mft,
RawMft: []byte(rawMft),
}
}(),
newManifest: func() *stack.EnvConfig {
rawMft := `name: test
type: Environment
# Create the public ALB with certificates attached.
cdn:
certificate: viewer-cert
http:
public:
ingress:
cdn: true
access_logs:
bucket_name: accesslogsbucket
prefix: accesslogsbucketprefix
certificates:
- cert-1
- cert-2
private:
ingress:
vpc: true
observability:
container_insights: true # Enable container insights.`
var mft manifest.Environment
err := yaml.Unmarshal([]byte(rawMft), &mft)
require.NoError(t, err)
return &stack.EnvConfig{
Version: "1.x",
App: deploy.AppInformation{
AccountPrincipalARN: "arn:aws:iam::000000000:root",
Name: "demo",
},
Name: "test",
CIDRPrefixListIDs: []string{"pl-mockid"},
ArtifactBucketARN: "arn:aws:s3:::mockbucket",
ArtifactBucketKeyARN: "arn:aws:kms:us-west-2:000000000:key/1234abcd-12ab-34cd-56ef-1234567890ab",
Mft: &mft,
RawMft: []byte(rawMft),
}
}(),
},
}
for name, tc := range testCases {
t.Run(name, func(t *testing.T) {
// WHEN
originalStack, err := stack.NewEnvStackConfig(tc.originalManifest)
require.NoError(t, err)
originalTmpl, err := originalStack.Template()
require.NoError(t, err, "should serialize the template given the original environment manifest")
originalObj := make(map[any]any)
require.NoError(t, yaml.Unmarshal([]byte(originalTmpl), originalObj))
newStack, err := stack.NewEnvStackConfig(tc.newManifest)
require.NoError(t, err)
newTmpl, err := newStack.Template()
require.NoError(t, err, "should serialize the template given a migrated environment manifest")
newObj := make(map[any]any)
require.NoError(t, yaml.Unmarshal([]byte(newTmpl), newObj))
// Delete because manifest could be different.
delete(originalObj["Metadata"].(map[string]any), "Manifest")
delete(newObj["Metadata"].(map[string]any), "Manifest")
resetCustomResourceLocations(originalObj)
resetCustomResourceLocations(newObj)
compareStackTemplate(t, originalObj, newObj)
})
}
}
func compareStackTemplate(t *testing.T, wantedObj, actualObj map[any]any) {
actual, wanted := reflect.ValueOf(actualObj), reflect.ValueOf(wantedObj)
compareStackTemplateSection(t, reflect.ValueOf("Description"), wanted, actual)
compareStackTemplateSection(t, reflect.ValueOf("Metadata"), wanted, actual)
compareStackTemplateSection(t, reflect.ValueOf("Parameters"), wanted, actual)
compareStackTemplateSection(t, reflect.ValueOf("Conditions"), wanted, actual)
compareStackTemplateSection(t, reflect.ValueOf("Outputs"), wanted, actual)
// Compare each resource.
actualResources, wantedResources := actual.MapIndex(reflect.ValueOf("Resources")).Elem(), wanted.MapIndex(reflect.ValueOf("Resources")).Elem()
actualResourceNames, wantedResourceNames := actualResources.MapKeys(), wantedResources.MapKeys()
for _, key := range actualResourceNames {
compareStackTemplateSection(t, key, wantedResources, actualResources)
}
for _, key := range wantedResourceNames {
compareStackTemplateSection(t, key, wantedResources, actualResources)
}
}
func compareStackTemplateSection(t *testing.T, key, wanted, actual reflect.Value) {
actualExist, wantedExist := actual.MapIndex(key).IsValid(), wanted.MapIndex(key).IsValid()
if !actualExist && !wantedExist {
return
}
require.True(t, actualExist,
fmt.Sprintf("%q does not exist in the actual template", key.Interface()))
require.True(t, wantedExist,
fmt.Sprintf("%q does not exist in the expected template", key.Interface()))
require.Equal(t, actual.MapIndex(key).Interface(), wanted.MapIndex(key).Interface(),
fmt.Sprintf("Comparing %q", key.Interface()))
}
func resetCustomResourceLocations(template map[any]any) {
resources := template["Resources"].(map[string]any)
functions := []string{
"EnvControllerFunction", "DynamicDesiredCountFunction", "BacklogPerTaskCalculatorFunction",
"RulePriorityFunction", "NLBCustomDomainFunction", "NLBCertValidatorFunction",
"CustomDomainFunction", "CertificateValidationFunction", "DNSDelegationFunction",
"CertificateReplicatorFunction", "UniqueJSONValuesFunction", "TriggerStateMachineFunction",
}
for _, fnName := range functions {
resource, ok := resources[fnName]
if !ok {
continue
}
fn := resource.(map[string]any)
props := fn["Properties"].(map[string]any)
delete(props, "Code")
}
}
| 459 |
copilot-cli | aws | Go | // Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
// SPDX-License-Identifier: Apache-2.0
package stack
import (
"bytes"
"errors"
"fmt"
"testing"
"github.com/aws/copilot-cli/internal/pkg/template/templatetest"
"github.com/aws/aws-sdk-go/aws"
"github.com/aws/aws-sdk-go/service/cloudformation"
"github.com/aws/copilot-cli/internal/pkg/config"
"github.com/aws/copilot-cli/internal/pkg/deploy"
"github.com/aws/copilot-cli/internal/pkg/deploy/cloudformation/stack/mocks"
"github.com/aws/copilot-cli/internal/pkg/manifest"
"github.com/aws/copilot-cli/internal/pkg/template"
"github.com/golang/mock/gomock"
"github.com/stretchr/testify/require"
)
func TestEnv_Template(t *testing.T) {
t.Cleanup(func() {
fs = realEmbedFS
})
t.Run("error parsing template", func(t *testing.T) {
ctrl := gomock.NewController(t)
defer ctrl.Finish()
// GIVEN
inEnvConfig := mockDeployEnvironmentInput()
mockParser := mocks.NewMockembedFS(ctrl)
fs = mockParser
// EXPECT
mockParser.EXPECT().Read(gomock.Any()).Return(&template.Content{Buffer: bytes.NewBufferString("data")}, nil).AnyTimes()
mockParser.EXPECT().ParseEnv(gomock.Any()).Return(nil, errors.New("some error"))
// WHEN
envStack, err := NewEnvConfigFromExistingStack(inEnvConfig, "mockPreviousForceUpdateID", nil)
require.NoError(t, err)
_, err = envStack.Template()
// THEN
require.EqualError(t, errors.New("some error"), err.Error())
})
t.Run("error parsing addons extra parameters", func(t *testing.T) {
ctrl := gomock.NewController(t)
defer ctrl.Finish()
// GIVEN
inEnvConfig := mockDeployEnvironmentInput()
mockAddonsConfig := mocks.NewMockNestedStackConfigurer(ctrl)
inEnvConfig.Addons = &Addons{
S3ObjectURL: "mockAddonsURL",
Stack: mockAddonsConfig,
}
fs = templatetest.Stub{}
// EXPECT
mockAddonsConfig.EXPECT().Parameters().Return("", errors.New("some error"))
// WHEN
envStack, err := NewEnvConfigFromExistingStack(inEnvConfig, "mockPreviousForceUpdateID", nil)
require.NoError(t, err)
_, err = envStack.Template()
// THEN
require.EqualError(t, errors.New("parse extra parameters for environment addons: some error"), err.Error())
})
t.Run("should contain addons information when addons are present", func(t *testing.T) {
ctrl := gomock.NewController(t)
defer ctrl.Finish()
// GIVEN
inEnvConfig := mockDeployEnvironmentInput()
mockAddonsConfig := mocks.NewMockNestedStackConfigurer(ctrl)
mockAddonsConfig.EXPECT().Parameters().Return("mockAddonsExtraParameters", nil)
inEnvConfig.Addons = &Addons{
S3ObjectURL: "mockAddonsURL",
Stack: mockAddonsConfig,
}
mockParser := mocks.NewMockembedFS(ctrl)
mockParser.EXPECT().Read(gomock.Any()).Return(&template.Content{Buffer: bytes.NewBufferString("data")}, nil).AnyTimes()
mockParser.EXPECT().ParseEnv(gomock.Any()).DoAndReturn(func(data *template.EnvOpts) (*template.Content, error) {
require.Equal(t, &template.Addons{
URL: "mockAddonsURL",
ExtraParams: "mockAddonsExtraParameters",
}, data.Addons)
return &template.Content{Buffer: bytes.NewBufferString("mockTemplate")}, nil
})
fs = mockParser
// WHEN
envStack, err := NewEnvConfigFromExistingStack(inEnvConfig, "mockPreviousForceUpdateID", nil)
require.NoError(t, err)
got, err := envStack.Template()
// THEN
require.NoError(t, err)
require.Equal(t, mockTemplate, got)
})
t.Run("should use new force update ID when asked", func(t *testing.T) {
ctrl := gomock.NewController(t)
defer ctrl.Finish()
// GIVEN
inEnvConfig := mockDeployEnvironmentInput()
inEnvConfig.ForceUpdate = true
mockParser := mocks.NewMockembedFS(ctrl)
mockParser.EXPECT().Read(gomock.Any()).Return(&template.Content{Buffer: bytes.NewBufferString("data")}, nil).AnyTimes()
mockParser.EXPECT().ParseEnv(gomock.Any()).DoAndReturn(func(data *template.EnvOpts) (*template.Content, error) {
require.NotEqual(t, "mockPreviousForceUpdateID", data.ForceUpdateID)
return &template.Content{Buffer: bytes.NewBufferString("mockTemplate")}, nil
})
fs = mockParser
// WHEN
envStack, err := NewEnvConfigFromExistingStack(inEnvConfig, "mockPreviousForceUpdateID", nil)
require.NoError(t, err)
got, err := envStack.Template()
// THEN
require.NoError(t, err)
require.Equal(t, mockTemplate, got)
})
t.Run("should return template body when present", func(t *testing.T) {
ctrl := gomock.NewController(t)
defer ctrl.Finish()
// GIVEN
inEnvConfig := mockDeployEnvironmentInput()
mockParser := mocks.NewMockembedFS(ctrl)
mockParser.EXPECT().Read(gomock.Any()).Return(&template.Content{Buffer: bytes.NewBufferString("data")}, nil).AnyTimes()
mockParser.EXPECT().ParseEnv(gomock.Any()).DoAndReturn(func(data *template.EnvOpts) (*template.Content, error) {
require.Equal(t, &template.EnvOpts{
AppName: "project",
EnvName: "env",
VPCConfig: template.VPCConfig{
Imported: nil,
Managed: template.ManagedVPC{
CIDR: DefaultVPCCIDR,
PrivateSubnetCIDRs: DefaultPrivateSubnetCIDRs,
PublicSubnetCIDRs: DefaultPublicSubnetCIDRs,
},
SecurityGroupConfig: nil,
FlowLogs: nil,
},
CustomResources: map[string]template.S3ObjectLocation{
"CertificateValidationFunction": {
Bucket: "mockbucket",
Key: "mockkey1",
},
"DNSDelegationFunction": {
Bucket: "mockbucket",
Key: "mockkey2",
},
"CustomDomainFunction": {
Bucket: "mockbucket",
Key: "mockkey4",
},
},
Telemetry: &template.Telemetry{
EnableContainerInsights: false,
},
ArtifactBucketARN: "arn:aws:s3:::mockbucket",
SerializedManifest: "name: env\ntype: Environment\n",
ForceUpdateID: "mockPreviousForceUpdateID",
}, data)
return &template.Content{Buffer: bytes.NewBufferString("mockTemplate")}, nil
})
fs = mockParser
// WHEN
envStack, err := NewEnvConfigFromExistingStack(inEnvConfig, "mockPreviousForceUpdateID", nil)
require.NoError(t, err)
got, err := envStack.Template()
// THEN
require.NoError(t, err)
require.Equal(t, mockTemplate, got)
})
t.Run("should return template body with local custom resources when not uploaded", func(t *testing.T) {
ctrl := gomock.NewController(t)
defer ctrl.Finish()
// GIVEN
inEnvConfig := mockDeployEnvironmentInput()
inEnvConfig.CustomResourcesURLs = nil
mockParser := mocks.NewMockembedFS(ctrl)
mockParser.EXPECT().Read(gomock.Any()).Return(&template.Content{Buffer: bytes.NewBufferString("data")}, nil).AnyTimes()
mockParser.EXPECT().ParseEnv(gomock.Any()).DoAndReturn(func(data *template.EnvOpts) (*template.Content, error) {
require.Equal(t, map[string]template.S3ObjectLocation{
"CertificateReplicatorFunction": {
Bucket: "mockbucket",
Key: "manual/scripts/custom-resources/certificatereplicatorfunction/8932747ba5dbff619d89b92d0033ef1d04f7dd1b055e073254907d4e38e3976d.zip",
},
"CertificateValidationFunction": {
Bucket: "mockbucket",
Key: "manual/scripts/custom-resources/certificatevalidationfunction/8932747ba5dbff619d89b92d0033ef1d04f7dd1b055e073254907d4e38e3976d.zip",
},
"DNSDelegationFunction": {
Bucket: "mockbucket",
Key: "manual/scripts/custom-resources/dnsdelegationfunction/8932747ba5dbff619d89b92d0033ef1d04f7dd1b055e073254907d4e38e3976d.zip",
},
"UniqueJSONValuesFunction": {
Bucket: "mockbucket",
Key: "manual/scripts/custom-resources/uniquejsonvaluesfunction/8932747ba5dbff619d89b92d0033ef1d04f7dd1b055e073254907d4e38e3976d.zip",
},
"CustomDomainFunction": {
Bucket: "mockbucket",
Key: "manual/scripts/custom-resources/customdomainfunction/8932747ba5dbff619d89b92d0033ef1d04f7dd1b055e073254907d4e38e3976d.zip",
},
}, data.CustomResources)
return &template.Content{Buffer: bytes.NewBufferString("mockTemplate")}, nil
})
fs = mockParser
// WHEN
envStack, err := NewEnvConfigFromExistingStack(inEnvConfig, "mockPreviousForceUpdateID", nil)
require.NoError(t, err)
got, err := envStack.Template()
// THEN
require.NoError(t, err)
require.Equal(t, mockTemplate, got)
})
}
func TestEnv_Parameters(t *testing.T) {
t.Cleanup(func() {
fs = realEmbedFS
})
fs = templatetest.Stub{}
deploymentInput := mockDeployEnvironmentInput()
deploymentInputWithDNS := mockDeployEnvironmentInput()
deploymentInputWithDNS.App.Domain = "ecs.aws"
deploymentInputWithPrivateDNS := mockDeployEnvironmentInput()
deploymentInputWithPrivateDNS.Mft.HTTPConfig.Private.Certificates = []string{"arn:aws:acm:us-east-1:123456789012:certificate/12345678-1234-1234-1234-123456789012"}
testCases := map[string]struct {
input *EnvConfig
oldParams []*cloudformation.Parameter
want []*cloudformation.Parameter
}{
"without DNS": {
input: deploymentInput,
want: []*cloudformation.Parameter{
{
ParameterKey: aws.String(envParamAppNameKey),
ParameterValue: aws.String(deploymentInput.App.Name),
},
{
ParameterKey: aws.String(envParamEnvNameKey),
ParameterValue: aws.String(deploymentInput.Name),
},
{
ParameterKey: aws.String(envParamToolsAccountPrincipalKey),
ParameterValue: aws.String(deploymentInput.App.AccountPrincipalARN),
},
{
ParameterKey: aws.String(envParamAppDNSKey),
ParameterValue: aws.String(""),
},
{
ParameterKey: aws.String(envParamAppDNSDelegationRoleKey),
ParameterValue: aws.String(""),
},
{
ParameterKey: aws.String(EnvParamAliasesKey),
ParameterValue: aws.String(""),
},
{
ParameterKey: aws.String(EnvParamALBWorkloadsKey),
ParameterValue: aws.String(""),
},
{
ParameterKey: aws.String(envParamInternalALBWorkloadsKey),
ParameterValue: aws.String(""),
},
{
ParameterKey: aws.String(envParamEFSWorkloadsKey),
ParameterValue: aws.String(""),
},
{
ParameterKey: aws.String(envParamNATWorkloadsKey),
ParameterValue: aws.String(""),
},
{
ParameterKey: aws.String(EnvParamServiceDiscoveryEndpoint),
ParameterValue: aws.String("env.project.local"),
},
{
ParameterKey: aws.String(envParamCreateHTTPSListenerKey),
ParameterValue: aws.String("false"),
},
{
ParameterKey: aws.String(envParamCreateInternalHTTPSListenerKey),
ParameterValue: aws.String("false"),
},
{
ParameterKey: aws.String(envParamAppRunnerPrivateWorkloadsKey),
ParameterValue: aws.String(""),
},
},
},
"with DNS": {
input: deploymentInputWithDNS,
want: []*cloudformation.Parameter{
{
ParameterKey: aws.String(envParamAppNameKey),
ParameterValue: aws.String(deploymentInputWithDNS.App.Name),
},
{
ParameterKey: aws.String(envParamEnvNameKey),
ParameterValue: aws.String(deploymentInputWithDNS.Name),
},
{
ParameterKey: aws.String(envParamToolsAccountPrincipalKey),
ParameterValue: aws.String(deploymentInputWithDNS.App.AccountPrincipalARN),
},
{
ParameterKey: aws.String(envParamAppDNSKey),
ParameterValue: aws.String(deploymentInputWithDNS.App.Domain),
},
{
ParameterKey: aws.String(envParamAppDNSDelegationRoleKey),
ParameterValue: aws.String("arn:aws:iam::000000000:role/project-DNSDelegationRole"),
},
{
ParameterKey: aws.String(EnvParamServiceDiscoveryEndpoint),
ParameterValue: aws.String("env.project.local"),
},
{
ParameterKey: aws.String(envParamCreateHTTPSListenerKey),
ParameterValue: aws.String("true"),
},
{
ParameterKey: aws.String(EnvParamAliasesKey),
ParameterValue: aws.String(""),
},
{
ParameterKey: aws.String(EnvParamALBWorkloadsKey),
ParameterValue: aws.String(""),
},
{
ParameterKey: aws.String(envParamInternalALBWorkloadsKey),
ParameterValue: aws.String(""),
},
{
ParameterKey: aws.String(envParamEFSWorkloadsKey),
ParameterValue: aws.String(""),
},
{
ParameterKey: aws.String(envParamNATWorkloadsKey),
ParameterValue: aws.String(""),
},
{
ParameterKey: aws.String(envParamCreateInternalHTTPSListenerKey),
ParameterValue: aws.String("false"),
},
{
ParameterKey: aws.String(envParamAppRunnerPrivateWorkloadsKey),
ParameterValue: aws.String(""),
},
},
},
"with private DNS only": {
input: deploymentInputWithPrivateDNS,
want: []*cloudformation.Parameter{
{
ParameterKey: aws.String(envParamAppNameKey),
ParameterValue: aws.String(deploymentInput.App.Name),
},
{
ParameterKey: aws.String(envParamEnvNameKey),
ParameterValue: aws.String(deploymentInput.Name),
},
{
ParameterKey: aws.String(envParamToolsAccountPrincipalKey),
ParameterValue: aws.String(deploymentInput.App.AccountPrincipalARN),
},
{
ParameterKey: aws.String(envParamAppDNSKey),
ParameterValue: aws.String(""),
},
{
ParameterKey: aws.String(envParamAppDNSDelegationRoleKey),
ParameterValue: aws.String(""),
},
{
ParameterKey: aws.String(EnvParamAliasesKey),
ParameterValue: aws.String(""),
},
{
ParameterKey: aws.String(EnvParamALBWorkloadsKey),
ParameterValue: aws.String(""),
},
{
ParameterKey: aws.String(envParamInternalALBWorkloadsKey),
ParameterValue: aws.String(""),
},
{
ParameterKey: aws.String(envParamEFSWorkloadsKey),
ParameterValue: aws.String(""),
},
{
ParameterKey: aws.String(envParamNATWorkloadsKey),
ParameterValue: aws.String(""),
},
{
ParameterKey: aws.String(EnvParamServiceDiscoveryEndpoint),
ParameterValue: aws.String("env.project.local"),
},
{
ParameterKey: aws.String(envParamCreateHTTPSListenerKey),
ParameterValue: aws.String("false"),
},
{
ParameterKey: aws.String(envParamCreateInternalHTTPSListenerKey),
ParameterValue: aws.String("true"),
},
{
ParameterKey: aws.String(envParamAppRunnerPrivateWorkloadsKey),
ParameterValue: aws.String(""),
},
},
},
"should use default value for new EnvControllerParameters": {
input: deploymentInput,
oldParams: []*cloudformation.Parameter{
{
ParameterKey: aws.String(EnvParamALBWorkloadsKey),
ParameterValue: aws.String("frontend,backend"),
},
{
ParameterKey: aws.String(envParamNATWorkloadsKey),
ParameterValue: aws.String("backend"),
},
{
ParameterKey: aws.String(EnvParamAliasesKey),
ParameterValue: aws.String(""),
},
{
ParameterKey: aws.String(envParamEFSWorkloadsKey),
ParameterValue: aws.String(""),
},
{
ParameterKey: aws.String(envParamAppNameKey),
ParameterValue: aws.String(deploymentInput.App.Name),
},
{
ParameterKey: aws.String(envParamEnvNameKey),
ParameterValue: aws.String(deploymentInput.Name),
},
{
ParameterKey: aws.String(envParamToolsAccountPrincipalKey),
ParameterValue: aws.String(deploymentInput.App.AccountPrincipalARN),
},
{
ParameterKey: aws.String(envParamAppDNSKey),
ParameterValue: aws.String(""),
},
{
ParameterKey: aws.String(envParamAppDNSDelegationRoleKey),
ParameterValue: aws.String(""),
},
{
ParameterKey: aws.String(EnvParamServiceDiscoveryEndpoint),
ParameterValue: aws.String("mockenv.mockapp.local"),
},
{
ParameterKey: aws.String(envParamCreateHTTPSListenerKey),
ParameterValue: aws.String("false"),
},
{
ParameterKey: aws.String(envParamCreateInternalHTTPSListenerKey),
ParameterValue: aws.String("false"),
},
{
ParameterKey: aws.String(envParamAppRunnerPrivateWorkloadsKey),
ParameterValue: aws.String("rdws-backend"),
},
},
want: []*cloudformation.Parameter{
{
ParameterKey: aws.String(envParamAppNameKey),
ParameterValue: aws.String(deploymentInput.App.Name),
},
{
ParameterKey: aws.String(envParamEnvNameKey),
ParameterValue: aws.String(deploymentInput.Name),
},
{
ParameterKey: aws.String(envParamToolsAccountPrincipalKey),
ParameterValue: aws.String(deploymentInput.App.AccountPrincipalARN),
},
{
ParameterKey: aws.String(envParamAppDNSKey),
ParameterValue: aws.String(""),
},
{
ParameterKey: aws.String(envParamAppDNSDelegationRoleKey),
ParameterValue: aws.String(""),
},
{
ParameterKey: aws.String(EnvParamAliasesKey),
ParameterValue: aws.String(""),
},
{
ParameterKey: aws.String(EnvParamALBWorkloadsKey),
ParameterValue: aws.String("frontend,backend"),
},
{
ParameterKey: aws.String(envParamInternalALBWorkloadsKey),
ParameterValue: aws.String(""),
},
{
ParameterKey: aws.String(envParamEFSWorkloadsKey),
ParameterValue: aws.String(""),
},
{
ParameterKey: aws.String(envParamNATWorkloadsKey),
ParameterValue: aws.String("backend"),
},
{
ParameterKey: aws.String(EnvParamServiceDiscoveryEndpoint),
ParameterValue: aws.String("mockenv.mockapp.local"),
},
{
ParameterKey: aws.String(envParamCreateHTTPSListenerKey),
ParameterValue: aws.String("false"),
},
{
ParameterKey: aws.String(envParamCreateInternalHTTPSListenerKey),
ParameterValue: aws.String("false"),
},
{
ParameterKey: aws.String(envParamAppRunnerPrivateWorkloadsKey),
ParameterValue: aws.String("rdws-backend"),
},
},
},
"should retain the values from EnvControllerParameters": {
input: deploymentInput,
oldParams: []*cloudformation.Parameter{
{
ParameterKey: aws.String(EnvParamALBWorkloadsKey),
ParameterValue: aws.String("frontend,backend"),
},
{
ParameterKey: aws.String(envParamNATWorkloadsKey),
ParameterValue: aws.String("backend"),
},
{
ParameterKey: aws.String(envParamAppRunnerPrivateWorkloadsKey),
ParameterValue: aws.String("rdws-backend"),
},
{
ParameterKey: aws.String(EnvParamAliasesKey),
ParameterValue: aws.String(""),
},
{
ParameterKey: aws.String(envParamInternalALBWorkloadsKey),
ParameterValue: aws.String(""),
},
{
ParameterKey: aws.String(envParamEFSWorkloadsKey),
ParameterValue: aws.String(""),
},
{
ParameterKey: aws.String(envParamAppNameKey),
ParameterValue: aws.String(deploymentInput.App.Name),
},
{
ParameterKey: aws.String(envParamEnvNameKey),
ParameterValue: aws.String(deploymentInput.Name),
},
{
ParameterKey: aws.String(envParamToolsAccountPrincipalKey),
ParameterValue: aws.String(deploymentInput.App.AccountPrincipalARN),
},
{
ParameterKey: aws.String(envParamAppDNSKey),
ParameterValue: aws.String(""),
},
{
ParameterKey: aws.String(envParamAppDNSDelegationRoleKey),
ParameterValue: aws.String(""),
},
{
ParameterKey: aws.String(EnvParamServiceDiscoveryEndpoint),
ParameterValue: aws.String("mockenv.mockapp.local"),
},
{
ParameterKey: aws.String(envParamCreateHTTPSListenerKey),
ParameterValue: aws.String("false"),
},
{
ParameterKey: aws.String(envParamCreateInternalHTTPSListenerKey),
ParameterValue: aws.String("false"),
},
},
want: []*cloudformation.Parameter{
{
ParameterKey: aws.String(envParamAppNameKey),
ParameterValue: aws.String(deploymentInput.App.Name),
},
{
ParameterKey: aws.String(envParamEnvNameKey),
ParameterValue: aws.String(deploymentInput.Name),
},
{
ParameterKey: aws.String(envParamToolsAccountPrincipalKey),
ParameterValue: aws.String(deploymentInput.App.AccountPrincipalARN),
},
{
ParameterKey: aws.String(envParamAppDNSKey),
ParameterValue: aws.String(""),
},
{
ParameterKey: aws.String(envParamAppDNSDelegationRoleKey),
ParameterValue: aws.String(""),
},
{
ParameterKey: aws.String(EnvParamAliasesKey),
ParameterValue: aws.String(""),
},
{
ParameterKey: aws.String(EnvParamALBWorkloadsKey),
ParameterValue: aws.String("frontend,backend"),
},
{
ParameterKey: aws.String(envParamInternalALBWorkloadsKey),
ParameterValue: aws.String(""),
},
{
ParameterKey: aws.String(envParamEFSWorkloadsKey),
ParameterValue: aws.String(""),
},
{
ParameterKey: aws.String(envParamNATWorkloadsKey),
ParameterValue: aws.String("backend"),
},
{
ParameterKey: aws.String(EnvParamServiceDiscoveryEndpoint),
ParameterValue: aws.String("mockenv.mockapp.local"),
},
{
ParameterKey: aws.String(envParamCreateHTTPSListenerKey),
ParameterValue: aws.String("false"),
},
{
ParameterKey: aws.String(envParamCreateInternalHTTPSListenerKey),
ParameterValue: aws.String("false"),
},
{
ParameterKey: aws.String(envParamAppRunnerPrivateWorkloadsKey),
ParameterValue: aws.String("rdws-backend"),
},
},
},
"should not include old parameters that are deleted": {
input: deploymentInput,
oldParams: []*cloudformation.Parameter{
{
ParameterKey: aws.String("deprecated"),
},
{
ParameterKey: aws.String(EnvParamALBWorkloadsKey),
ParameterValue: aws.String(""),
},
{
ParameterKey: aws.String(envParamNATWorkloadsKey),
ParameterValue: aws.String(""),
},
{
ParameterKey: aws.String(EnvParamAliasesKey),
ParameterValue: aws.String(""),
},
{
ParameterKey: aws.String(envParamInternalALBWorkloadsKey),
ParameterValue: aws.String(""),
},
{
ParameterKey: aws.String(envParamEFSWorkloadsKey),
ParameterValue: aws.String(""),
},
{
ParameterKey: aws.String(envParamAppNameKey),
ParameterValue: aws.String(deploymentInput.App.Name),
},
{
ParameterKey: aws.String(envParamEnvNameKey),
ParameterValue: aws.String(deploymentInput.Name),
},
{
ParameterKey: aws.String(envParamToolsAccountPrincipalKey),
ParameterValue: aws.String(deploymentInput.App.AccountPrincipalARN),
},
{
ParameterKey: aws.String(envParamAppDNSKey),
ParameterValue: aws.String(""),
},
{
ParameterKey: aws.String(envParamAppDNSDelegationRoleKey),
ParameterValue: aws.String(""),
},
{
ParameterKey: aws.String(EnvParamServiceDiscoveryEndpoint),
ParameterValue: aws.String("mockenv.mockapp.local"),
},
{
ParameterKey: aws.String(envParamCreateHTTPSListenerKey),
ParameterValue: aws.String("false"),
},
{
ParameterKey: aws.String(envParamCreateInternalHTTPSListenerKey),
ParameterValue: aws.String("false"),
},
{
ParameterKey: aws.String(envParamAppRunnerPrivateWorkloadsKey),
ParameterValue: aws.String(""),
},
},
want: []*cloudformation.Parameter{
{
ParameterKey: aws.String(envParamAppNameKey),
ParameterValue: aws.String(deploymentInput.App.Name),
},
{
ParameterKey: aws.String(envParamEnvNameKey),
ParameterValue: aws.String(deploymentInput.Name),
},
{
ParameterKey: aws.String(envParamToolsAccountPrincipalKey),
ParameterValue: aws.String(deploymentInput.App.AccountPrincipalARN),
},
{
ParameterKey: aws.String(envParamAppDNSKey),
ParameterValue: aws.String(""),
},
{
ParameterKey: aws.String(envParamAppDNSDelegationRoleKey),
ParameterValue: aws.String(""),
},
{
ParameterKey: aws.String(EnvParamAliasesKey),
ParameterValue: aws.String(""),
},
{
ParameterKey: aws.String(EnvParamALBWorkloadsKey),
ParameterValue: aws.String(""),
},
{
ParameterKey: aws.String(envParamInternalALBWorkloadsKey),
ParameterValue: aws.String(""),
},
{
ParameterKey: aws.String(envParamEFSWorkloadsKey),
ParameterValue: aws.String(""),
},
{
ParameterKey: aws.String(envParamNATWorkloadsKey),
ParameterValue: aws.String(""),
},
{
ParameterKey: aws.String(EnvParamServiceDiscoveryEndpoint),
ParameterValue: aws.String("mockenv.mockapp.local"),
},
{
ParameterKey: aws.String(envParamCreateHTTPSListenerKey),
ParameterValue: aws.String("false"),
},
{
ParameterKey: aws.String(envParamCreateInternalHTTPSListenerKey),
ParameterValue: aws.String("false"),
},
{
ParameterKey: aws.String(envParamAppRunnerPrivateWorkloadsKey),
ParameterValue: aws.String(""),
},
},
},
"should reuse old service discovery endpoint value": {
input: deploymentInput,
oldParams: []*cloudformation.Parameter{
{
ParameterKey: aws.String(EnvParamServiceDiscoveryEndpoint),
ParameterValue: aws.String("app.local"),
},
{
ParameterKey: aws.String(EnvParamALBWorkloadsKey),
ParameterValue: aws.String(""),
},
{
ParameterKey: aws.String(envParamNATWorkloadsKey),
ParameterValue: aws.String(""),
},
{
ParameterKey: aws.String(EnvParamAliasesKey),
ParameterValue: aws.String(""),
},
{
ParameterKey: aws.String(envParamInternalALBWorkloadsKey),
ParameterValue: aws.String(""),
},
{
ParameterKey: aws.String(envParamEFSWorkloadsKey),
ParameterValue: aws.String(""),
},
{
ParameterKey: aws.String(envParamAppNameKey),
ParameterValue: aws.String(deploymentInput.App.Name),
},
{
ParameterKey: aws.String(envParamEnvNameKey),
ParameterValue: aws.String(deploymentInput.Name),
},
{
ParameterKey: aws.String(envParamToolsAccountPrincipalKey),
ParameterValue: aws.String(deploymentInput.App.AccountPrincipalARN),
},
{
ParameterKey: aws.String(envParamAppDNSKey),
ParameterValue: aws.String(""),
},
{
ParameterKey: aws.String(envParamAppDNSDelegationRoleKey),
ParameterValue: aws.String(""),
},
{
ParameterKey: aws.String(envParamCreateHTTPSListenerKey),
ParameterValue: aws.String("false"),
},
{
ParameterKey: aws.String(envParamCreateInternalHTTPSListenerKey),
ParameterValue: aws.String("false"),
},
{
ParameterKey: aws.String(envParamAppRunnerPrivateWorkloadsKey),
ParameterValue: aws.String(""),
},
},
want: []*cloudformation.Parameter{
{
ParameterKey: aws.String(envParamAppNameKey),
ParameterValue: aws.String(deploymentInput.App.Name),
},
{
ParameterKey: aws.String(envParamEnvNameKey),
ParameterValue: aws.String(deploymentInput.Name),
},
{
ParameterKey: aws.String(envParamToolsAccountPrincipalKey),
ParameterValue: aws.String(deploymentInput.App.AccountPrincipalARN),
},
{
ParameterKey: aws.String(envParamAppDNSKey),
ParameterValue: aws.String(""),
},
{
ParameterKey: aws.String(envParamAppDNSDelegationRoleKey),
ParameterValue: aws.String(""),
},
{
ParameterKey: aws.String(EnvParamAliasesKey),
ParameterValue: aws.String(""),
},
{
ParameterKey: aws.String(EnvParamALBWorkloadsKey),
ParameterValue: aws.String(""),
},
{
ParameterKey: aws.String(envParamInternalALBWorkloadsKey),
ParameterValue: aws.String(""),
},
{
ParameterKey: aws.String(envParamEFSWorkloadsKey),
ParameterValue: aws.String(""),
},
{
ParameterKey: aws.String(envParamNATWorkloadsKey),
ParameterValue: aws.String(""),
},
{
ParameterKey: aws.String(EnvParamServiceDiscoveryEndpoint),
ParameterValue: aws.String("app.local"),
},
{
ParameterKey: aws.String(envParamCreateHTTPSListenerKey),
ParameterValue: aws.String("false"),
},
{
ParameterKey: aws.String(envParamCreateInternalHTTPSListenerKey),
ParameterValue: aws.String("false"),
},
{
ParameterKey: aws.String(envParamAppRunnerPrivateWorkloadsKey),
ParameterValue: aws.String(""),
},
},
},
"should use app.local endpoint service discovery endpoint if it is a new parameter": {
input: deploymentInput,
oldParams: []*cloudformation.Parameter{
{
ParameterKey: aws.String(EnvParamALBWorkloadsKey),
ParameterValue: aws.String(""),
},
{
ParameterKey: aws.String(envParamAppNameKey),
ParameterValue: aws.String(deploymentInput.App.Name),
},
{
ParameterKey: aws.String(envParamEnvNameKey),
ParameterValue: aws.String(deploymentInput.Name),
},
{
ParameterKey: aws.String(envParamToolsAccountPrincipalKey),
ParameterValue: aws.String(deploymentInput.App.AccountPrincipalARN),
},
{
ParameterKey: aws.String(envParamAppDNSKey),
ParameterValue: aws.String(""),
},
{
ParameterKey: aws.String(envParamAppDNSDelegationRoleKey),
ParameterValue: aws.String(""),
},
{
ParameterKey: aws.String(envParamAppRunnerPrivateWorkloadsKey),
ParameterValue: aws.String(""),
},
},
want: []*cloudformation.Parameter{
{
ParameterKey: aws.String(envParamAppNameKey),
ParameterValue: aws.String(deploymentInput.App.Name),
},
{
ParameterKey: aws.String(envParamEnvNameKey),
ParameterValue: aws.String(deploymentInput.Name),
},
{
ParameterKey: aws.String(envParamToolsAccountPrincipalKey),
ParameterValue: aws.String(deploymentInput.App.AccountPrincipalARN),
},
{
ParameterKey: aws.String(envParamAppDNSKey),
ParameterValue: aws.String(""),
},
{
ParameterKey: aws.String(envParamAppDNSDelegationRoleKey),
ParameterValue: aws.String(""),
},
{
ParameterKey: aws.String(EnvParamAliasesKey),
ParameterValue: aws.String(""),
},
{
ParameterKey: aws.String(EnvParamALBWorkloadsKey),
ParameterValue: aws.String(""),
},
{
ParameterKey: aws.String(envParamInternalALBWorkloadsKey),
ParameterValue: aws.String(""),
},
{
ParameterKey: aws.String(envParamEFSWorkloadsKey),
ParameterValue: aws.String(""),
},
{
ParameterKey: aws.String(envParamNATWorkloadsKey),
ParameterValue: aws.String(""),
},
{
ParameterKey: aws.String(EnvParamServiceDiscoveryEndpoint),
ParameterValue: aws.String("project.local"),
},
{
ParameterKey: aws.String(envParamCreateHTTPSListenerKey),
ParameterValue: aws.String("false"),
},
{
ParameterKey: aws.String(envParamCreateInternalHTTPSListenerKey),
ParameterValue: aws.String("false"),
},
{
ParameterKey: aws.String(envParamAppRunnerPrivateWorkloadsKey),
ParameterValue: aws.String(""),
},
},
},
}
for name, tc := range testCases {
t.Run(name, func(t *testing.T) {
env, err := NewEnvConfigFromExistingStack(tc.input, "", tc.oldParams)
require.NoError(t, err)
params, err := env.Parameters()
require.NoError(t, err)
require.ElementsMatch(t, tc.want, params)
})
}
}
func TestEnv_Tags(t *testing.T) {
env := &Env{
in: &EnvConfig{
Name: "env",
App: deploy.AppInformation{
Name: "project",
},
AdditionalTags: map[string]string{
"owner": "boss",
deploy.AppTagKey: "overrideproject",
},
},
}
expectedTags := []*cloudformation.Tag{
{
Key: aws.String(deploy.AppTagKey),
Value: aws.String("project"), // Ignore user's overrides.
},
{
Key: aws.String(deploy.EnvTagKey),
Value: aws.String("env"),
},
{
Key: aws.String("owner"),
Value: aws.String("boss"),
},
}
require.ElementsMatch(t, expectedTags, env.Tags())
}
func TestStackName(t *testing.T) {
deploymentInput := mockDeployEnvironmentInput()
env := &Env{
in: deploymentInput,
}
require.Equal(t, fmt.Sprintf("%s-%s", deploymentInput.App.Name, deploymentInput.Name), env.StackName())
}
func TestBootstrapEnv_Template(t *testing.T) {
testCases := map[string]struct {
in *EnvConfig
setupMock func(m *mocks.MockenvReadParser)
expectedOutput string
wantedError error
}{
"error parsing the template": {
in: &EnvConfig{},
setupMock: func(m *mocks.MockenvReadParser) {
m.EXPECT().ParseEnvBootstrap(gomock.Any(), gomock.Any()).Return(nil, errors.New("some error"))
},
wantedError: errors.New("some error"),
},
"should return template body when present": {
in: &EnvConfig{
ArtifactBucketARN: "mockBucketARN",
ArtifactBucketKeyARN: "mockBucketKeyARN",
},
setupMock: func(m *mocks.MockenvReadParser) {
m.EXPECT().ParseEnvBootstrap(gomock.Any(), gomock.Any()).DoAndReturn(func(data *template.EnvOpts, options ...template.ParseOption) (*template.Content, error) {
require.Equal(t, &template.EnvOpts{
ArtifactBucketARN: "mockBucketARN",
ArtifactBucketKeyARN: "mockBucketKeyARN",
}, data)
return &template.Content{Buffer: bytes.NewBufferString("mockTemplate")}, nil
})
},
expectedOutput: "mockTemplate",
},
}
for name, tc := range testCases {
t.Run(name, func(t *testing.T) {
// GIVEN
ctrl := gomock.NewController(t)
defer ctrl.Finish()
mockParser := mocks.NewMockenvReadParser(ctrl)
tc.setupMock(mockParser)
bootstrapStack := &BootstrapEnv{
in: tc.in,
parser: mockParser,
}
// WHEN
got, err := bootstrapStack.Template()
// THEN
if tc.wantedError != nil {
require.EqualError(t, err, tc.wantedError.Error())
} else {
require.NoError(t, err)
require.Equal(t, tc.expectedOutput, got)
}
})
}
}
func TestBootstrapEnv_Parameters(t *testing.T) {
testCases := map[string]struct {
input *EnvConfig
want []*cloudformation.Parameter
}{
"returns correct parameters": {
input: &EnvConfig{
App: deploy.AppInformation{
Name: "mockApp",
AccountPrincipalARN: "mockAccountPrincipalARN",
},
Name: "mockEnv",
},
want: []*cloudformation.Parameter{
{
ParameterKey: aws.String(envParamAppNameKey),
ParameterValue: aws.String("mockApp"),
},
{
ParameterKey: aws.String(envParamToolsAccountPrincipalKey),
ParameterValue: aws.String("mockAccountPrincipalARN"),
},
{
ParameterKey: aws.String(envParamEnvNameKey),
ParameterValue: aws.String("mockEnv"),
},
},
},
}
for name, tc := range testCases {
t.Run(name, func(t *testing.T) {
bootstrap := &BootstrapEnv{
in: tc.input,
}
params, err := bootstrap.Parameters()
require.NoError(t, err)
require.ElementsMatch(t, tc.want, params)
})
}
}
func TestBootstrapEnv_Tags(t *testing.T) {
bootstrap := &BootstrapEnv{
in: &EnvConfig{
Name: "env",
App: deploy.AppInformation{
Name: "project",
},
AdditionalTags: map[string]string{
"owner": "boss",
deploy.AppTagKey: "overrideproject",
},
},
}
expectedTags := []*cloudformation.Tag{
{
Key: aws.String(deploy.AppTagKey),
Value: aws.String("project"), // Ignore user's overrides.
},
{
Key: aws.String(deploy.EnvTagKey),
Value: aws.String("env"),
},
{
Key: aws.String("owner"),
Value: aws.String("boss"),
},
}
require.ElementsMatch(t, expectedTags, bootstrap.Tags())
}
func TestBootstrapEnv_StackName(t *testing.T) {
bootstrap := &BootstrapEnv{
in: &EnvConfig{
App: deploy.AppInformation{
Name: "mockApp",
},
Name: "mockEnv",
},
}
require.Equal(t, "mockApp-mockEnv", bootstrap.StackName())
}
func TestBootstrapEnv_ToEnv(t *testing.T) {
mockDeployInput := mockDeployEnvironmentInput()
testCases := map[string]struct {
expectedEnv config.Environment
mockStack *cloudformation.Stack
want error
}{
"should return error if Stack ID is invalid": {
want: fmt.Errorf("couldn't extract region and account from stack ID : arn: invalid prefix"),
mockStack: mockEnvironmentStack("", "", ""),
},
"should return a well formed environment": {
mockStack: mockEnvironmentStack(
"arn:aws:cloudformation:eu-west-3:902697171733:stack/project-env",
"arn:aws:iam::902697171733:role/phonetool-test-EnvManagerRole",
"arn:aws:iam::902697171733:role/phonetool-test-CFNExecutionRole"),
expectedEnv: config.Environment{
Name: mockDeployInput.Name,
App: mockDeployInput.App.Name,
AccountID: "902697171733",
Region: "eu-west-3",
ManagerRoleARN: "arn:aws:iam::902697171733:role/phonetool-test-EnvManagerRole",
ExecutionRoleARN: "arn:aws:iam::902697171733:role/phonetool-test-CFNExecutionRole",
},
},
}
for name, tc := range testCases {
t.Run(name, func(t *testing.T) {
envStack := &BootstrapEnv{
in: mockDeployInput,
}
got, err := envStack.ToEnvMetadata(tc.mockStack)
if tc.want != nil {
require.EqualError(t, tc.want, err.Error())
} else {
require.NoError(t, err)
require.Equal(t, tc.expectedEnv, *got)
}
})
}
}
func mockEnvironmentStack(stackArn, managerRoleARN, executionRoleARN string) *cloudformation.Stack {
return &cloudformation.Stack{
StackId: aws.String(stackArn),
Outputs: []*cloudformation.Output{
{
OutputKey: aws.String(envOutputManagerRoleKey),
OutputValue: aws.String(managerRoleARN),
},
{
OutputKey: aws.String(envOutputCFNExecutionRoleARN),
OutputValue: aws.String(executionRoleARN),
},
},
}
}
func mockDeployEnvironmentInput() *EnvConfig {
return &EnvConfig{
Name: "env",
App: deploy.AppInformation{
Name: "project",
AccountPrincipalARN: "arn:aws:iam::000000000:root",
},
CustomResourcesURLs: map[string]string{
"CertificateValidationFunction": "https://mockbucket.s3-us-west-2.amazonaws.com/mockkey1",
"DNSDelegationFunction": "https://mockbucket.s3-us-west-2.amazonaws.com/mockkey2",
"CustomDomainFunction": "https://mockbucket.s3-us-west-2.amazonaws.com/mockkey4",
},
ArtifactBucketARN: "arn:aws:s3:::mockbucket",
Mft: &manifest.Environment{
Workload: manifest.Workload{
Name: aws.String("env"),
Type: aws.String("Environment"),
},
},
RawMft: []byte(`name: env
type: Environment
`),
}
}
| 1,282 |
copilot-cli | aws | Go | // Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
// SPDX-License-Identifier: Apache-2.0
package stack_test
import (
"os"
"path/filepath"
"testing"
"github.com/aws/copilot-cli/internal/pkg/config"
"github.com/aws/copilot-cli/internal/pkg/manifest"
"gopkg.in/yaml.v3"
"github.com/aws/copilot-cli/internal/pkg/deploy"
"github.com/aws/copilot-cli/internal/pkg/deploy/cloudformation/stack"
"github.com/stretchr/testify/require"
)
// TestGHv1Pipeline_Template ensures that the CloudFormation template generated for a pipeline matches our pre-defined template.
func TestGHv1Pipeline_Template(t *testing.T) {
var stage deploy.PipelineStage
stage.Init(&config.Environment{
App: "phonetool",
Name: "test",
Region: "us-west-2",
AccountID: "1111",
ExecutionRoleARN: "arn:aws:iam::1111:role/phonetool-test-CFNExecutionRole",
ManagerRoleARN: "arn:aws:iam::1111:role/phonetool-test-EnvManagerRole",
}, &manifest.PipelineStage{
Name: "test",
TestCommands: []string{`echo "test"`},
}, []string{"api"})
ps := stack.NewPipelineStackConfig(&deploy.CreatePipelineInput{
AppName: "phonetool",
Name: "phonetool-pipeline",
Source: &deploy.GitHubV1Source{
ProviderName: manifest.GithubV1ProviderName,
RepositoryURL: "https://github.com/aws/phonetool",
Branch: "mainline",
PersonalAccessTokenSecretID: "my secret",
},
Build: &deploy.Build{
Image: "aws/codebuild/amazonlinux2-x86_64-standard:3.0",
EnvironmentType: "LINUX_CONTAINER",
BuildspecPath: "copilot/buildspec.yml",
},
Stages: []deploy.PipelineStage{stage},
ArtifactBuckets: []deploy.ArtifactBucket{
{
BucketName: "fancy-bucket",
KeyArn: "arn:aws:kms:us-west-2:1111:key/abcd",
},
},
AdditionalTags: nil,
})
actual, err := ps.Template()
require.NoError(t, err, "template should have rendered successfully")
actualInBytes := []byte(actual)
m1 := make(map[interface{}]interface{})
require.NoError(t, yaml.Unmarshal(actualInBytes, m1))
wanted, err := os.ReadFile(filepath.Join("testdata", "pipeline", "ghv1_template.yml"))
require.NoError(t, err, "should be able to read expected template file")
wantedInBytes := []byte(wanted)
m2 := make(map[interface{}]interface{})
require.NoError(t, yaml.Unmarshal(wantedInBytes, m2))
require.Equal(t, m2, m1)
}
| 73 |
copilot-cli | aws | Go | //go:build integration || localintegration
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
// SPDX-License-Identifier: Apache-2.0
package stack_test
import (
"os"
"path/filepath"
"testing"
"github.com/aws/copilot-cli/internal/pkg/config"
"github.com/aws/copilot-cli/internal/pkg/manifest"
"gopkg.in/yaml.v3"
"github.com/aws/copilot-cli/internal/pkg/deploy"
"github.com/aws/copilot-cli/internal/pkg/deploy/cloudformation/stack"
"github.com/stretchr/testify/require"
)
// TestGHPipeline_Template ensures that the CloudFormation template generated for a pipeline matches our pre-defined template.
func TestGHPipeline_Template(t *testing.T) {
var build deploy.Build
build.Init(nil, "copilot/pipelines/phonetool-pipeline/")
var stage deploy.PipelineStage
stage.Init(&config.Environment{
App: "phonetool",
Name: "test",
Region: "us-west-2",
AccountID: "1111",
ExecutionRoleARN: "arn:aws:iam::1111:role/phonetool-test-CFNExecutionRole",
ManagerRoleARN: "arn:aws:iam::1111:role/phonetool-test-EnvManagerRole",
}, &manifest.PipelineStage{
Name: "test",
TestCommands: []string{`echo "test"`},
RequiresApproval: true,
}, []string{"api", "frontend"})
ps := stack.NewPipelineStackConfig(&deploy.CreatePipelineInput{
AppName: "phonetool",
Name: "phonetool-pipeline",
Source: &deploy.GitHubSource{
ProviderName: manifest.GithubProviderName,
RepositoryURL: "https://github.com/aws/phonetool",
Branch: "mainline",
},
Build: &build,
Stages: []deploy.PipelineStage{stage},
ArtifactBuckets: []deploy.ArtifactBucket{
{
BucketName: "fancy-bucket",
KeyArn: "arn:aws:kms:us-west-2:1111:key/abcd",
},
},
AdditionalTags: nil,
})
actual, err := ps.Template()
require.NoError(t, err, "template should have rendered successfully")
actualInBytes := []byte(actual)
m1 := make(map[interface{}]interface{})
require.NoError(t, yaml.Unmarshal(actualInBytes, m1))
wanted, err := os.ReadFile(filepath.Join("testdata", "pipeline", "gh_template.yaml"))
require.NoError(t, err, "should be able to read expected template file")
wantedInBytes := []byte(wanted)
m2 := make(map[interface{}]interface{})
require.NoError(t, yaml.Unmarshal(wantedInBytes, m2))
require.Equal(t, m2, m1)
}
| 73 |
copilot-cli | aws | Go | //go:build integration || localintegration
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
// SPDX-License-Identifier: Apache-2.0
package stack_test
import (
"fmt"
"os"
"path/filepath"
"regexp"
"testing"
"github.com/spf13/afero"
"gopkg.in/yaml.v3"
"github.com/aws/aws-sdk-go/aws"
"github.com/aws/aws-sdk-go/aws/session"
"github.com/aws/copilot-cli/internal/pkg/addon"
"github.com/aws/copilot-cli/internal/pkg/config"
"github.com/aws/copilot-cli/internal/pkg/deploy/cloudformation/stack"
"github.com/aws/copilot-cli/internal/pkg/manifest"
"github.com/aws/copilot-cli/internal/pkg/workspace"
"github.com/stretchr/testify/require"
)
const (
svcGrpcManifestPath = "svc-grpc-manifest.yml"
)
func TestGrpcLoadBalancedWebService_Template(t *testing.T) {
testCases := map[string]struct {
envName string
svcStackPath string
svcParamsPath string
}{
"default env": {
envName: "test",
svcStackPath: "svc-grpc-test.stack.yml",
svcParamsPath: "svc-grpc-test.params.json",
},
}
path := filepath.Join("testdata", "workloads", svcGrpcManifestPath)
manifestBytes, err := os.ReadFile(path)
require.NoError(t, err)
for name, tc := range testCases {
interpolated, err := manifest.NewInterpolator(appName, tc.envName).Interpolate(string(manifestBytes))
require.NoError(t, err)
mft, err := manifest.UnmarshalWorkload([]byte(interpolated))
require.NoError(t, err)
envMft, err := mft.ApplyEnv(tc.envName)
require.NoError(t, err)
err = envMft.Validate()
require.NoError(t, err)
err = envMft.Load(session.New())
require.NoError(t, err)
content := envMft.Manifest()
v, ok := content.(*manifest.LoadBalancedWebService)
require.True(t, ok)
// Create in-memory mock file system.
wd, err := os.Getwd()
require.NoError(t, err)
fs := afero.NewMemMapFs()
_ = fs.MkdirAll(fmt.Sprintf("%s/copilot", wd), 0755)
_ = afero.WriteFile(fs, fmt.Sprintf("%s/copilot/.workspace", wd), []byte(fmt.Sprintf("---\napplication: %s", "DavidsApp")), 0644)
require.NoError(t, err)
ws, err := workspace.Use(fs)
_, err = addon.ParseFromWorkload(aws.StringValue(v.Name), ws)
var notFound *addon.ErrAddonsNotFound
require.ErrorAs(t, err, ¬Found)
envConfig := &manifest.Environment{
Workload: manifest.Workload{
Name: &tc.envName,
},
}
envConfig.HTTPConfig.Public.Certificates = []string{"mockCertARN"}
svcDiscoveryEndpointName := fmt.Sprintf("%s.%s.local", tc.envName, appName)
serializer, err := stack.NewLoadBalancedWebService(stack.LoadBalancedWebServiceConfig{
App: &config.Application{Name: appName},
EnvManifest: envConfig,
Manifest: v,
ArtifactBucketName: "bucket",
RuntimeConfig: stack.RuntimeConfig{
ServiceDiscoveryEndpoint: svcDiscoveryEndpointName,
AccountID: "123456789123",
Region: "us-west-2",
EnvVersion: "v1.42.0",
},
})
tpl, err := serializer.Template()
require.NoError(t, err, "template should render")
regExpGUID := regexp.MustCompile(`([a-f\d]{8}-)([a-f\d]{4}-){3}([a-f\d]{12})`) // Matches random guids
testName := fmt.Sprintf("CF Template should be equal/%s", name)
t.Run(testName, func(t *testing.T) {
actualBytes := []byte(tpl)
// Cut random GUID from template.
actualBytes = regExpGUID.ReplaceAll(actualBytes, []byte("RandomGUID"))
mActual := make(map[interface{}]interface{})
require.NoError(t, yaml.Unmarshal(actualBytes, mActual))
expected, err := os.ReadFile(filepath.Join("testdata", "workloads", tc.svcStackPath))
require.NoError(t, err, "should be able to read expected bytes")
expectedBytes := []byte(expected)
mExpected := make(map[interface{}]interface{})
require.NoError(t, yaml.Unmarshal(expectedBytes, mExpected))
resetCustomResourceLocations(mActual)
compareStackTemplate(t, mExpected, mActual)
})
testName = fmt.Sprintf("Parameter values should render properly/%s", name)
t.Run(testName, func(t *testing.T) {
actualParams, err := serializer.SerializedParameters()
require.NoError(t, err)
path := filepath.Join("testdata", "workloads", tc.svcParamsPath)
wantedCFNParamsBytes, err := os.ReadFile(path)
require.NoError(t, err)
require.Equal(t, string(wantedCFNParamsBytes), actualParams)
})
}
}
| 131 |
copilot-cli | aws | Go | //go:build integration || localintegration
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
// SPDX-License-Identifier: Apache-2.0
package stack_test
import (
"fmt"
"os"
"path/filepath"
"regexp"
"testing"
"gopkg.in/yaml.v3"
"github.com/aws/aws-sdk-go/aws"
"github.com/aws/aws-sdk-go/aws/session"
"github.com/aws/copilot-cli/internal/pkg/addon"
"github.com/aws/copilot-cli/internal/pkg/config"
"github.com/aws/copilot-cli/internal/pkg/deploy/cloudformation/stack"
"github.com/aws/copilot-cli/internal/pkg/manifest"
"github.com/aws/copilot-cli/internal/pkg/workspace"
"github.com/spf13/afero"
"github.com/stretchr/testify/require"
)
const (
nlbSvcManifestPath = "svc-nlb-manifest.yml"
)
func TestNetworkLoadBalancedWebService_Template(t *testing.T) {
testCases := map[string]struct {
envName string
svcStackPath string
svcParamsPath string
}{
"test env": {
envName: "test",
svcStackPath: "svc-nlb-test.stack.yml",
svcParamsPath: "svc-nlb-test.params.json",
},
"dev env": {
envName: "dev",
svcStackPath: "svc-nlb-dev.stack.yml",
svcParamsPath: "svc-nlb-dev.params.json",
},
"prod env": {
envName: "prod",
svcStackPath: "svc-nlb-prod.stack.yml",
svcParamsPath: "svc-nlb-prod.params.json",
},
}
val, exist := os.LookupEnv("TAG")
require.NoError(t, os.Setenv("TAG", "cicdtest"))
defer func() {
if !exist {
require.NoError(t, os.Unsetenv("TAG"))
return
}
require.NoError(t, os.Setenv("TAG", val))
}()
path := filepath.Join("testdata", "workloads", nlbSvcManifestPath)
manifestBytes, err := os.ReadFile(path)
require.NoError(t, err)
for name, tc := range testCases {
interpolated, err := manifest.NewInterpolator(appName, tc.envName).Interpolate(string(manifestBytes))
require.NoError(t, err)
mft, err := manifest.UnmarshalWorkload([]byte(interpolated))
require.NoError(t, err)
envMft, err := mft.ApplyEnv(tc.envName)
require.NoError(t, err)
err = envMft.Validate()
require.NoError(t, err)
err = envMft.Load(session.New())
require.NoError(t, err)
content := envMft.Manifest()
v, ok := content.(*manifest.LoadBalancedWebService)
require.True(t, ok)
// Create in-memory mock file system.
wd, err := os.Getwd()
require.NoError(t, err)
fs := afero.NewMemMapFs()
_ = fs.MkdirAll(fmt.Sprintf("%s/copilot", wd), 0755)
_ = afero.WriteFile(fs, fmt.Sprintf("%s/copilot/.workspace", wd), []byte(fmt.Sprintf("---\napplication: %s", "DavidsApp")), 0644)
require.NoError(t, err)
ws, err := workspace.Use(fs)
require.NoError(t, err)
_, err = addon.ParseFromWorkload(aws.StringValue(v.Name), ws)
var notFound *addon.ErrAddonsNotFound
require.ErrorAs(t, err, ¬Found)
svcDiscoveryEndpointName := fmt.Sprintf("%s.%s.local", tc.envName, appName)
envConfig := &manifest.Environment{
Workload: manifest.Workload{
Name: &tc.envName,
},
}
serializer, err := stack.NewLoadBalancedWebService(stack.LoadBalancedWebServiceConfig{
App: &config.Application{Name: appName, Domain: "example.com"},
EnvManifest: envConfig,
Manifest: v,
ArtifactBucketName: "bucket",
RuntimeConfig: stack.RuntimeConfig{
ServiceDiscoveryEndpoint: svcDiscoveryEndpointName,
AccountID: "123456789123",
Region: "us-west-2",
EnvVersion: "v1.42.0",
},
RootUserARN: "arn:aws:iam::123456789123:root",
}, stack.WithNLB([]string{"10.0.0.0/24", "10.1.0.0/24"}))
tpl, err := serializer.Template()
require.NoError(t, err, "template should render")
regExpGUID := regexp.MustCompile(`([a-f\d]{8}-)([a-f\d]{4}-){3}([a-f\d]{12})`) // Matches random guids
testName := fmt.Sprintf("CF Template should be equal/%s", name)
t.Run(testName, func(t *testing.T) {
actualBytes := []byte(tpl)
// Cut random GUID from template.
actualBytes = regExpGUID.ReplaceAll(actualBytes, []byte("RandomGUID"))
mActual := make(map[interface{}]interface{})
require.NoError(t, yaml.Unmarshal(actualBytes, mActual))
expected, err := os.ReadFile(filepath.Join("testdata", "workloads", tc.svcStackPath))
require.NoError(t, err, "should be able to read expected bytes")
expectedBytes := []byte(expected)
mExpected := make(map[interface{}]interface{})
require.NoError(t, yaml.Unmarshal(expectedBytes, mExpected))
resetCustomResourceLocations(mActual)
compareStackTemplate(t, mExpected, mActual)
})
testName = fmt.Sprintf("Parameter values should render properly/%s", name)
t.Run(testName, func(t *testing.T) {
actualParams, err := serializer.SerializedParameters()
require.NoError(t, err)
path := filepath.Join("testdata", "workloads", tc.svcParamsPath)
wantedCFNParamsBytes, err := os.ReadFile(path)
require.NoError(t, err)
require.Equal(t, string(wantedCFNParamsBytes), actualParams)
})
}
}
| 152 |
copilot-cli | aws | Go | //go:build integration || localintegration
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
// SPDX-License-Identifier: Apache-2.0
package stack_test
import (
"fmt"
"os"
"path/filepath"
"regexp"
"testing"
"github.com/aws/aws-sdk-go/aws"
"github.com/aws/aws-sdk-go/aws/session"
"github.com/aws/copilot-cli/internal/pkg/addon"
"github.com/aws/copilot-cli/internal/pkg/config"
"github.com/aws/copilot-cli/internal/pkg/deploy/cloudformation/stack"
"github.com/aws/copilot-cli/internal/pkg/workspace"
"github.com/spf13/afero"
"gopkg.in/yaml.v3"
"github.com/aws/copilot-cli/internal/pkg/manifest"
"github.com/stretchr/testify/require"
)
const (
svcManifestPath = "svc-manifest.yml"
)
func TestLoadBalancedWebService_TemplateInteg(t *testing.T) {
testCases := map[string]struct {
envName string
svcStackPath string
svcParamsPath string
}{
"default env": {
envName: "test",
svcStackPath: "svc-test.stack.yml",
svcParamsPath: "svc-test.params.json",
},
"staging env": {
envName: "staging",
svcStackPath: "svc-staging.stack.yml",
svcParamsPath: "svc-staging.params.json",
},
"prod env": {
envName: "prod",
svcStackPath: "svc-prod.stack.yml",
svcParamsPath: "svc-prod.params.json",
},
}
val, exist := os.LookupEnv("TAG")
require.NoError(t, os.Setenv("TAG", "cicdtest"))
defer func() {
if !exist {
require.NoError(t, os.Unsetenv("TAG"))
return
}
require.NoError(t, os.Setenv("TAG", val))
}()
path := filepath.Join("testdata", "workloads", svcManifestPath)
manifestBytes, err := os.ReadFile(path)
require.NoError(t, err)
for name, tc := range testCases {
interpolated, err := manifest.NewInterpolator(appName, tc.envName).Interpolate(string(manifestBytes))
require.NoError(t, err)
mft, err := manifest.UnmarshalWorkload([]byte(interpolated))
require.NoError(t, err)
envMft, err := mft.ApplyEnv(tc.envName)
require.NoError(t, err)
err = envMft.Validate()
require.NoError(t, err)
err = envMft.Load(session.New())
require.NoError(t, err)
content := envMft.Manifest()
v, ok := content.(*manifest.LoadBalancedWebService)
require.True(t, ok)
// Create in-memory mock file system.
wd, err := os.Getwd()
require.NoError(t, err)
fs := afero.NewMemMapFs()
_ = fs.MkdirAll(fmt.Sprintf("%s/copilot", wd), 0755)
_ = afero.WriteFile(fs, fmt.Sprintf("%s/copilot/.workspace", wd), []byte(fmt.Sprintf("---\napplication: %s", "DavidsApp")), 0644)
require.NoError(t, err)
ws, err := workspace.Use(fs)
require.NoError(t, err)
_, err = addon.ParseFromWorkload(aws.StringValue(v.Name), ws)
var notFound *addon.ErrAddonsNotFound
require.ErrorAs(t, err, ¬Found)
svcDiscoveryEndpointName := fmt.Sprintf("%s.%s.local", tc.envName, appName)
envConfig := &manifest.Environment{
Workload: manifest.Workload{
Name: &tc.envName,
},
}
envConfig.HTTPConfig.Public.Certificates = []string{"mockCertARN"}
serializer, err := stack.NewLoadBalancedWebService(stack.LoadBalancedWebServiceConfig{
App: &config.Application{Name: appName},
EnvManifest: envConfig,
Manifest: v,
ArtifactBucketName: "bucket",
RuntimeConfig: stack.RuntimeConfig{
ServiceDiscoveryEndpoint: svcDiscoveryEndpointName,
AccountID: "123456789123",
Region: "us-west-2",
EnvVersion: "v1.42.0",
},
})
require.NoError(t, err, "stack should be able to be initialized")
tpl, err := serializer.Template()
require.NoError(t, err, "template should render")
regExpGUID := regexp.MustCompile(`([a-f\d]{8}-)([a-f\d]{4}-){3}([a-f\d]{12})`) // Matches random guids
testName := fmt.Sprintf("CF Template should be equal/%s", name)
t.Run(testName, func(t *testing.T) {
actualBytes := []byte(tpl)
// Cut random GUID from template.
actualBytes = regExpGUID.ReplaceAll(actualBytes, []byte("RandomGUID"))
mActual := make(map[interface{}]interface{})
require.NoError(t, yaml.Unmarshal(actualBytes, mActual))
expected, err := os.ReadFile(filepath.Join("testdata", "workloads", tc.svcStackPath))
require.NoError(t, err, "should be able to read expected bytes")
expectedBytes := []byte(expected)
mExpected := make(map[interface{}]interface{})
require.NoError(t, yaml.Unmarshal(expectedBytes, mExpected))
resetCustomResourceLocations(mActual)
compareStackTemplate(t, mExpected, mActual)
})
testName = fmt.Sprintf("Parameter values should render properly/%s", name)
t.Run(testName, func(t *testing.T) {
actualParams, err := serializer.SerializedParameters()
require.NoError(t, err)
path := filepath.Join("testdata", "workloads", tc.svcParamsPath)
wantedCFNParamsBytes, err := os.ReadFile(path)
require.NoError(t, err)
require.Equal(t, string(wantedCFNParamsBytes), actualParams)
})
}
}
| 153 |
copilot-cli | aws | Go | // Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
// SPDX-License-Identifier: Apache-2.0
package stack
import (
"fmt"
"strconv"
"strings"
"github.com/aws/aws-sdk-go/aws"
"github.com/aws/aws-sdk-go/service/cloudformation"
"github.com/aws/copilot-cli/internal/pkg/config"
"github.com/aws/copilot-cli/internal/pkg/deploy"
"github.com/aws/copilot-cli/internal/pkg/deploy/upload/customresource"
"github.com/aws/copilot-cli/internal/pkg/manifest"
"github.com/aws/copilot-cli/internal/pkg/manifest/manifestinfo"
"github.com/aws/copilot-cli/internal/pkg/template"
"github.com/aws/copilot-cli/internal/pkg/template/override"
)
// Parameter logical IDs for a load balanced web service.
const (
LBWebServiceDNSDelegatedParamKey = "DNSDelegated"
LBWebServiceNLBAliasesParamKey = "NLBAliases"
LBWebServiceNLBPortParamKey = "NLBPort"
)
// LoadBalancedWebService represents the configuration needed to create a CloudFormation stack from a load balanced web service manifest.
type LoadBalancedWebService struct {
*ecsWkld
manifest *manifest.LoadBalancedWebService
httpsEnabled bool
dnsDelegationEnabled bool
publicSubnetCIDRBlocks []string
appInfo deploy.AppInformation
parser loadBalancedWebSvcReadParser
}
// LoadBalancedWebServiceOption is used to configuring an optional field for LoadBalancedWebService.
type LoadBalancedWebServiceOption func(s *LoadBalancedWebService)
// WithNLB enables Network Load Balancer in a LoadBalancedWebService.
func WithNLB(cidrBlocks []string) func(s *LoadBalancedWebService) {
return func(s *LoadBalancedWebService) {
s.publicSubnetCIDRBlocks = cidrBlocks
}
}
// LoadBalancedWebServiceConfig contains fields to configure LoadBalancedWebService.
type LoadBalancedWebServiceConfig struct {
App *config.Application
EnvManifest *manifest.Environment
Manifest *manifest.LoadBalancedWebService
RawManifest []byte // Content of the manifest file without any transformations.
RuntimeConfig RuntimeConfig
RootUserARN string
ArtifactBucketName string
Addons NestedStackConfigurer
}
// NewLoadBalancedWebService creates a new CFN stack with an ECS service from a manifest file, given the options.
func NewLoadBalancedWebService(conf LoadBalancedWebServiceConfig,
opts ...LoadBalancedWebServiceOption) (*LoadBalancedWebService, error) {
crs, err := customresource.LBWS(fs)
if err != nil {
return nil, fmt.Errorf("load balanced web service custom resources: %w", err)
}
conf.RuntimeConfig.loadCustomResourceURLs(conf.ArtifactBucketName, uploadableCRs(crs).convert())
var dnsDelegationEnabled, httpsEnabled bool
var appInfo deploy.AppInformation
if conf.App.Domain != "" {
dnsDelegationEnabled = true
appInfo = deploy.AppInformation{
Name: conf.App.Name,
Domain: conf.App.Domain,
AccountPrincipalARN: conf.RootUserARN,
}
httpsEnabled = true
}
certImported := len(conf.EnvManifest.HTTPConfig.Public.Certificates) != 0
if certImported {
httpsEnabled = true
dnsDelegationEnabled = false
}
if conf.Manifest.HTTPOrBool.Disabled() {
httpsEnabled = false
}
s := &LoadBalancedWebService{
ecsWkld: &ecsWkld{
wkld: &wkld{
name: aws.StringValue(conf.Manifest.Name),
env: aws.StringValue(conf.EnvManifest.Name),
app: conf.App.Name,
permBound: conf.App.PermissionsBoundary,
artifactBucketName: conf.ArtifactBucketName,
rc: conf.RuntimeConfig,
image: conf.Manifest.ImageConfig.Image,
rawManifest: conf.RawManifest,
parser: fs,
addons: conf.Addons,
},
logging: conf.Manifest.Logging,
sidecars: conf.Manifest.Sidecars,
tc: conf.Manifest.TaskConfig,
taskDefOverrideFunc: override.CloudFormationTemplate,
},
manifest: conf.Manifest,
httpsEnabled: httpsEnabled,
appInfo: appInfo,
dnsDelegationEnabled: dnsDelegationEnabled,
parser: fs,
}
for _, opt := range opts {
opt(s)
}
return s, nil
}
// Template returns the CloudFormation template for the service parametrized for the environment.
func (s *LoadBalancedWebService) Template() (string, error) {
crs, err := convertCustomResources(s.rc.CustomResourcesURL)
if err != nil {
return "", err
}
addonsParams, err := s.addonsParameters()
if err != nil {
return "", err
}
addonsOutputs, err := s.addonsOutputs()
if err != nil {
return "", err
}
exposedPorts, err := s.manifest.ExposedPorts()
if err != nil {
return "", fmt.Errorf("parse exposed ports in service manifest %s: %w", s.name, err)
}
sidecars, err := convertSidecars(s.manifest.Sidecars, exposedPorts.PortsForContainer, s.rc)
if err != nil {
return "", fmt.Errorf("convert the sidecar configuration for service %s: %w", s.name, err)
}
publishers, err := convertPublish(s.manifest.Publish(), s.rc.AccountID, s.rc.Region, s.app, s.env, s.name)
if err != nil {
return "", fmt.Errorf(`convert "publish" field for service %s: %w`, s.name, err)
}
advancedCount, err := convertAdvancedCount(s.manifest.Count.AdvancedCount)
if err != nil {
return "", fmt.Errorf("convert the advanced count configuration for service %s: %w", s.name, err)
}
var autoscaling *template.AutoscalingOpts
var desiredCountOnSpot *int
var capacityProviders []*template.CapacityProviderStrategy
if advancedCount != nil {
autoscaling = advancedCount.Autoscaling
desiredCountOnSpot = advancedCount.Spot
capacityProviders = advancedCount.Cps
}
entrypoint, err := convertEntryPoint(s.manifest.EntryPoint)
if err != nil {
return "", err
}
command, err := convertCommand(s.manifest.Command)
if err != nil {
return "", err
}
nlbConfig, err := s.convertNetworkLoadBalancer()
if err != nil {
return "", err
}
albListenerConfig, err := s.convertALBListener()
if err != nil {
return "", err
}
var scConfig *template.ServiceConnect
if s.manifest.Network.Connect.Enabled() {
scConfig = convertServiceConnect(s.manifest.Network.Connect)
}
targetContainer, targetContainerPort, err := s.manifest.HTTPOrBool.Main.Target(exposedPorts)
if err != nil {
return "", err
}
// Set container-level feature flag.
logConfig := convertLogging(s.manifest.Logging)
content, err := s.parser.ParseLoadBalancedWebService(template.WorkloadOpts{
// Workload parameters.
AppName: s.app,
EnvName: s.env,
EnvVersion: s.rc.EnvVersion,
SerializedManifest: string(s.rawManifest),
WorkloadName: s.name,
WorkloadType: manifestinfo.LoadBalancedWebServiceType,
// Configuration for the main container.
Command: command,
EntryPoint: entrypoint,
HealthCheck: convertContainerHealthCheck(s.manifest.ImageConfig.HealthCheck),
PortMappings: convertPortMappings(exposedPorts.PortsForContainer[s.name]),
Secrets: convertSecrets(s.manifest.TaskConfig.Secrets),
Variables: convertEnvVars(s.manifest.TaskConfig.Variables),
// Additional options that are common between **all** workload templates.
AddonsExtraParams: addonsParams,
Autoscaling: autoscaling,
CapacityProviders: capacityProviders,
CredentialsParameter: aws.StringValue(s.manifest.ImageConfig.Image.Credentials),
DesiredCountOnSpot: desiredCountOnSpot,
DeploymentConfiguration: convertDeploymentConfig(s.manifest.DeployConfig),
DependsOn: convertDependsOn(s.manifest.ImageConfig.Image.DependsOn),
DockerLabels: s.manifest.ImageConfig.Image.DockerLabels,
ExecuteCommand: convertExecuteCommand(&s.manifest.ExecuteCommand),
LogConfig: logConfig,
NestedStack: addonsOutputs,
Network: convertNetworkConfig(s.manifest.Network),
Publish: publishers,
PermissionsBoundary: s.permBound,
Platform: convertPlatform(s.manifest.Platform),
Storage: convertStorageOpts(s.manifest.Name, s.manifest.Storage),
// ALB configs.
ALBEnabled: !s.manifest.HTTPOrBool.Disabled(),
HTTPTargetContainer: template.HTTPTargetContainer{
Port: targetContainerPort,
Name: targetContainer,
},
GracePeriod: s.convertGracePeriod(),
ALBListener: albListenerConfig,
// NLB configs.
AppDNSName: nlbConfig.appDNSName,
AppDNSDelegationRole: nlbConfig.appDNSDelegationRole,
NLB: nlbConfig.settings,
// service connect and service discovery options.
ServiceConnect: scConfig,
ServiceDiscoveryEndpoint: s.rc.ServiceDiscoveryEndpoint,
// Additional options for request driven web service templates.
Observability: template.ObservabilityOpts{
Tracing: strings.ToUpper(aws.StringValue(s.manifest.Observability.Tracing)),
},
// Sidecar configs.
Sidecars: sidecars,
// Custom Resource Config.
CustomResources: crs,
})
if err != nil {
return "", err
}
overriddenTpl, err := s.taskDefOverrideFunc(convertTaskDefOverrideRules(s.manifest.TaskDefOverrides), content.Bytes())
if err != nil {
return "", fmt.Errorf("apply task definition overrides: %w", err)
}
return string(overriddenTpl), nil
}
// Parameters returns the list of CloudFormation parameters used by the template.
func (s *LoadBalancedWebService) Parameters() ([]*cloudformation.Parameter, error) {
wkldParams, err := s.ecsWkld.Parameters()
if err != nil {
return nil, err
}
exposedPorts, err := s.manifest.ExposedPorts()
if err != nil {
return nil, fmt.Errorf("parse exposed ports in service manifest %s: %w", s.name, err)
}
targetContainer, targetPort, err := s.manifest.HTTPOrBool.Main.Target(exposedPorts)
if err != nil {
return nil, err
}
wkldParams = append(wkldParams, []*cloudformation.Parameter{
{
ParameterKey: aws.String(WorkloadContainerPortParamKey),
ParameterValue: aws.String(s.manifest.MainContainerPort()),
},
{
ParameterKey: aws.String(LBWebServiceDNSDelegatedParamKey),
ParameterValue: aws.String(strconv.FormatBool(s.dnsDelegationEnabled)),
},
{
ParameterKey: aws.String(WorkloadTargetContainerParamKey),
ParameterValue: aws.String(targetContainer),
},
{
ParameterKey: aws.String(WorkloadTargetPortParamKey),
ParameterValue: aws.String(targetPort),
},
}...)
if !s.manifest.HTTPOrBool.Disabled() {
wkldParams = append(wkldParams, []*cloudformation.Parameter{
{
ParameterKey: aws.String(WorkloadRulePathParamKey),
ParameterValue: s.manifest.HTTPOrBool.Main.Path,
},
{
ParameterKey: aws.String(WorkloadHTTPSParamKey),
ParameterValue: aws.String(strconv.FormatBool(s.httpsEnabled)),
},
}...)
}
if !s.manifest.NLBConfig.IsEmpty() {
port, _, err := manifest.ParsePortMapping(s.manifest.NLBConfig.Listener.Port)
if err != nil {
return nil, err
}
wkldParams = append(wkldParams, []*cloudformation.Parameter{
{
ParameterKey: aws.String(LBWebServiceNLBAliasesParamKey),
ParameterValue: aws.String(s.manifest.NLBConfig.Aliases.ToString()),
},
{
ParameterKey: aws.String(LBWebServiceNLBPortParamKey),
ParameterValue: port,
},
}...)
}
return wkldParams, nil
}
// SerializedParameters returns the CloudFormation stack's parameters serialized to a JSON document.
func (s *LoadBalancedWebService) SerializedParameters() (string, error) {
return serializeTemplateConfig(s.wkld.parser, s)
}
| 336 |
copilot-cli | aws | Go | // Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
// SPDX-License-Identifier: Apache-2.0
package stack
import (
"bytes"
"errors"
"fmt"
"testing"
"github.com/aws/copilot-cli/internal/pkg/template/templatetest"
"github.com/aws/copilot-cli/internal/pkg/config"
"github.com/aws/copilot-cli/internal/pkg/manifest/manifestinfo"
"github.com/aws/aws-sdk-go/aws"
"github.com/aws/aws-sdk-go/service/cloudformation"
"github.com/aws/copilot-cli/internal/pkg/addon"
"github.com/aws/copilot-cli/internal/pkg/deploy"
"github.com/aws/copilot-cli/internal/pkg/deploy/cloudformation/stack/mocks"
"github.com/aws/copilot-cli/internal/pkg/manifest"
"github.com/aws/copilot-cli/internal/pkg/template"
"github.com/aws/copilot-cli/internal/pkg/template/override"
"github.com/golang/mock/gomock"
"github.com/stretchr/testify/require"
)
const (
testEnvName = "test"
testAppName = "phonetool"
testImageRepoURL = "111111111111.dkr.ecr.us-west-2.amazonaws.com/phonetool/frontend"
testImageTag = "manual-bf3678c"
)
type mockAddons struct {
tpl string
tplErr error
params string
paramsErr error
}
func (m mockAddons) Template() (string, error) {
if m.tplErr != nil {
return "", m.tplErr
}
return m.tpl, nil
}
func (m mockAddons) Parameters() (string, error) {
if m.paramsErr != nil {
return "", m.paramsErr
}
return m.params, nil
}
var mockCloudFormationOverrideFunc = func(overrideRules []override.Rule, origTemp []byte) ([]byte, error) {
return origTemp, nil
}
func TestLoadBalancedWebService_StackName(t *testing.T) {
testCases := map[string]struct {
inSvcName string
inEnvName string
inAppName string
wantedStackName string
}{
"valid stack name": {
inSvcName: "frontend",
inEnvName: "test",
inAppName: "phonetool",
wantedStackName: "phonetool-test-frontend",
},
"longer than 128 characters": {
inSvcName: "whatisthishorriblylongservicenamethatcantfitintocloudformationwhatarewesupposedtodoaboutthisaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa",
inEnvName: "test",
inAppName: "phonetool",
wantedStackName: "phonetool-test-whatisthishorriblylongservicenamethatcantfitintocloudformationwhatarewesupposedtodoaboutthisaaaaaaaaaaaaaaaaaaaaa",
},
}
for name, tc := range testCases {
t.Run(name, func(t *testing.T) {
// GIVEN
conf := &LoadBalancedWebService{
ecsWkld: &ecsWkld{
wkld: &wkld{
name: tc.inSvcName,
env: tc.inEnvName,
app: tc.inAppName,
},
},
}
// WHEN
n := conf.StackName()
// THEN
require.Equal(t, tc.wantedStackName, n, "expected stack names to be equal")
})
}
}
func TestLoadBalancedWebService_Template(t *testing.T) {
t.Cleanup(func() {
fs = realEmbedFS
})
fs = templatetest.Stub{}
t.Run("returns a wrapped error when addons template parsing fails", func(t *testing.T) {
// GIVEN
lbws, err := NewLoadBalancedWebService(LoadBalancedWebServiceConfig{
App: &config.Application{},
EnvManifest: &manifest.Environment{},
ArtifactBucketName: "mockBucket",
Manifest: &manifest.LoadBalancedWebService{
Workload: manifest.Workload{
Name: aws.String("frontend"),
},
},
Addons: mockAddons{tplErr: errors.New("some error")},
})
require.NoError(t, err)
// WHEN
_, err = lbws.Template()
// THEN
require.EqualError(t, err, "generate addons template for frontend: some error")
})
t.Run("returns a wrapped error when addons parameter parsing fails", func(t *testing.T) {
// GIVEN
lbws, err := NewLoadBalancedWebService(LoadBalancedWebServiceConfig{
App: &config.Application{},
EnvManifest: &manifest.Environment{},
ArtifactBucketName: "mockBucket",
Manifest: &manifest.LoadBalancedWebService{
Workload: manifest.Workload{
Name: aws.String("frontend"),
},
},
Addons: mockAddons{paramsErr: errors.New("some error")},
})
require.NoError(t, err)
// WHEN
_, err = lbws.Template()
// THEN
require.EqualError(t, err, "parse addons parameters for frontend: some error")
})
t.Run("returns the error when parsing the service template fails", func(t *testing.T) {
// GIVEN
ctrl := gomock.NewController(t)
defer ctrl.Finish()
parser := mocks.NewMockloadBalancedWebSvcReadParser(ctrl)
parser.EXPECT().ParseLoadBalancedWebService(gomock.Any()).Return(nil, errors.New("some error"))
addons := mockAddons{
tpl: `
Resources:
AdditionalResourcesPolicy:
Type: AWS::IAM::ManagedPolicy
Outputs:
AdditionalResourcesPolicyArn:
Value: hello`,
}
lbws, err := NewLoadBalancedWebService(LoadBalancedWebServiceConfig{
App: &config.Application{},
EnvManifest: &manifest.Environment{},
ArtifactBucketName: "mockBucket",
Manifest: &manifest.LoadBalancedWebService{},
Addons: addons,
}, func(s *LoadBalancedWebService) {
s.parser = parser
})
require.NoError(t, err)
// WHEN
_, err = lbws.Template()
// THEN
require.EqualError(t, err, "some error")
})
t.Run("renders all manifest fields into template without any addons", func(t *testing.T) {
// GIVEN
ctrl := gomock.NewController(t)
defer ctrl.Finish()
mft := manifest.NewLoadBalancedWebService(&manifest.LoadBalancedWebServiceProps{
WorkloadProps: &manifest.WorkloadProps{
Name: "frontend",
Dockerfile: "frontend/Dockerfile",
},
Path: "frontend",
Port: 80,
})
mft.ImageConfig.HealthCheck = manifest.ContainerHealthCheck{
Retries: aws.Int(5),
}
mft.HTTPOrBool.Main.Alias = manifest.Alias{AdvancedAliases: []manifest.AdvancedAlias{
{
Alias: aws.String("mockAlias"),
HostedZone: aws.String("mockHostedZone"),
},
}}
mft.EntryPoint = manifest.EntryPointOverride{
String: nil,
StringSlice: []string{"/bin/echo", "hello"},
}
mft.Command = manifest.CommandOverride{
String: nil,
StringSlice: []string{"world"},
}
mft.Network.Connect = manifest.ServiceConnectBoolOrArgs{
ServiceConnectArgs: manifest.ServiceConnectArgs{
Alias: aws.String("frontend"),
},
}
var actual template.WorkloadOpts
parser := mocks.NewMockloadBalancedWebSvcReadParser(ctrl)
parser.EXPECT().ParseLoadBalancedWebService(gomock.Any()).DoAndReturn(func(in template.WorkloadOpts) (*template.Content, error) {
actual = in // Capture the translated object.
return &template.Content{Buffer: bytes.NewBufferString("template")}, nil
})
lbws, err := NewLoadBalancedWebService(LoadBalancedWebServiceConfig{
App: &config.Application{
Name: "phonetool",
Domain: "phonetool.com",
},
EnvManifest: &manifest.Environment{
Workload: manifest.Workload{
Name: aws.String("test"),
},
},
Manifest: mft,
RuntimeConfig: RuntimeConfig{
PushedImages: map[string]ECRImage{
"test": {
RepoURL: testImageRepoURL,
ImageTag: testImageTag,
},
},
AccountID: "0123456789012",
Region: "us-west-2",
},
Addons: mockAddons{},
ArtifactBucketName: "bucket",
}, func(s *LoadBalancedWebService) {
s.parser = parser
})
require.NoError(t, err)
// WHEN
_, err = lbws.Template()
// THEN
require.NoError(t, err)
require.Equal(t, template.WorkloadOpts{
AppName: "phonetool",
EnvName: "test",
WorkloadName: "frontend",
WorkloadType: manifestinfo.LoadBalancedWebServiceType,
HTTPTargetContainer: template.HTTPTargetContainer{
Name: "frontend",
Port: "80",
},
ServiceConnect: &template.ServiceConnect{
Alias: aws.String("frontend"),
},
HealthCheck: &template.ContainerHealthCheck{
Command: []string{"CMD-SHELL", "curl -f http://localhost/ || exit 1"},
Interval: aws.Int64(10),
StartPeriod: aws.Int64(0),
Timeout: aws.Int64(5),
Retries: aws.Int64(5),
},
CustomResources: map[string]template.S3ObjectLocation{
"DynamicDesiredCountFunction": {
Bucket: "bucket",
Key: "manual/scripts/custom-resources/dynamicdesiredcountfunction/8932747ba5dbff619d89b92d0033ef1d04f7dd1b055e073254907d4e38e3976d.zip",
},
"EnvControllerFunction": {
Bucket: "bucket",
Key: "manual/scripts/custom-resources/envcontrollerfunction/8932747ba5dbff619d89b92d0033ef1d04f7dd1b055e073254907d4e38e3976d.zip",
},
"NLBCertValidatorFunction": {
Bucket: "bucket",
Key: "manual/scripts/custom-resources/nlbcertvalidatorfunction/8932747ba5dbff619d89b92d0033ef1d04f7dd1b055e073254907d4e38e3976d.zip",
},
"NLBCustomDomainFunction": {
Bucket: "bucket",
Key: "manual/scripts/custom-resources/nlbcustomdomainfunction/8932747ba5dbff619d89b92d0033ef1d04f7dd1b055e073254907d4e38e3976d.zip",
},
"RulePriorityFunction": {
Bucket: "bucket",
Key: "manual/scripts/custom-resources/rulepriorityfunction/8932747ba5dbff619d89b92d0033ef1d04f7dd1b055e073254907d4e38e3976d.zip",
},
},
Network: template.NetworkOpts{
AssignPublicIP: template.EnablePublicIP,
SubnetsType: template.PublicSubnetsPlacement,
SecurityGroups: []template.SecurityGroup{},
},
DeploymentConfiguration: template.DeploymentConfigurationOpts{
MinHealthyPercent: 100,
MaxPercent: 200,
},
EntryPoint: []string{"/bin/echo", "hello"},
Command: []string{"world"},
ALBListener: &template.ALBListener{
Rules: []template.ALBListenerRule{
{
Path: "/frontend",
TargetContainer: "frontend",
TargetPort: "80",
Aliases: []string{
"mockAlias",
},
HTTPHealthCheck: template.HTTPHealthCheckOpts{
HealthCheckPath: "/",
GracePeriod: 60,
Port: "",
SuccessCodes: "",
},
Stickiness: "false",
RedirectToHTTPS: true,
DeregistrationDelay: aws.Int64(int64(60)),
},
},
IsHTTPS: true,
HostedZoneAliases: template.AliasesForHostedZone{
"mockHostedZone": {
"mockAlias",
},
},
},
GracePeriod: aws.Int64(int64(60)),
ALBEnabled: true,
PortMappings: []*template.PortMapping{
{
Protocol: "tcp",
ContainerPort: 80,
ContainerName: "frontend",
},
},
}, actual)
})
t.Run("renders a template with addons", func(t *testing.T) {
// GIVEN
ctrl := gomock.NewController(t)
defer ctrl.Finish()
mft := manifest.NewLoadBalancedWebService(&manifest.LoadBalancedWebServiceProps{
WorkloadProps: &manifest.WorkloadProps{
Name: "frontend",
Dockerfile: "frontend/Dockerfile",
},
Path: "frontend",
Port: 80,
})
var actual template.WorkloadOpts
parser := mocks.NewMockloadBalancedWebSvcReadParser(ctrl)
parser.EXPECT().ParseLoadBalancedWebService(gomock.Any()).DoAndReturn(func(in template.WorkloadOpts) (*template.Content, error) {
actual = in // Capture the translated object.
return &template.Content{Buffer: bytes.NewBufferString("template")}, nil
})
addons := mockAddons{
tpl: `Resources:
AdditionalResourcesPolicy:
Type: AWS::IAM::ManagedPolicy
Properties:
PolicyDocument:
Statement:
- Effect: Allow
Action: '*'
Resource: '*'
MySecret:
Type: AWS::SecretsManager::Secret
Properties:
Description: 'This is my rds instance secret'
GenerateSecretString:
SecretStringTemplate: '{"username": "admin"}'
GenerateStringKey: 'password'
PasswordLength: 16
ExcludeCharacters: '"@/\'
Outputs:
AdditionalResourcesPolicyArn:
Value: !Ref AdditionalResourcesPolicy
MySecretArn:
Value: !Ref MySecret
Hello:
Value: hello`,
params: "ServiceName: !GetAtt Service.Name",
}
lbws, err := NewLoadBalancedWebService(LoadBalancedWebServiceConfig{
App: &config.Application{
Name: "phonetool",
},
EnvManifest: &manifest.Environment{
Workload: manifest.Workload{
Name: aws.String("test"),
},
},
ArtifactBucketName: "mockBucket",
Manifest: mft,
Addons: addons,
}, func(s *LoadBalancedWebService) {
s.parser = parser
})
require.NoError(t, err)
// WHEN
_, err = lbws.Template()
// THEN
require.NoError(t, err)
require.Equal(t, "ServiceName: !GetAtt Service.Name", actual.AddonsExtraParams)
require.Equal(t, &template.WorkloadNestedStackOpts{
StackName: addon.StackName,
VariableOutputs: []string{"Hello"},
SecretOutputs: []string{"MySecretArn"},
PolicyOutputs: []string{"AdditionalResourcesPolicyArn"},
}, actual.NestedStack)
})
t.Run("should set the target group container to sidecar", func(t *testing.T) {
// GIVEN
ctrl := gomock.NewController(t)
defer ctrl.Finish()
mft := manifest.NewLoadBalancedWebService(&manifest.LoadBalancedWebServiceProps{
WorkloadProps: &manifest.WorkloadProps{
Name: "frontend",
Dockerfile: "frontend/Dockerfile",
},
Path: "frontend",
Port: 80,
})
mft.HTTPOrBool.Main.TargetContainer = aws.String("envoy")
mft.Sidecars = map[string]*manifest.SidecarConfig{
"envoy": {
Port: aws.String("443"),
},
}
var actual template.WorkloadOpts
parser := mocks.NewMockloadBalancedWebSvcReadParser(ctrl)
parser.EXPECT().ParseLoadBalancedWebService(gomock.Any()).DoAndReturn(func(in template.WorkloadOpts) (*template.Content, error) {
actual = in // Capture the translated object.
return &template.Content{Buffer: bytes.NewBufferString("template")}, nil
})
lbws, err := NewLoadBalancedWebService(LoadBalancedWebServiceConfig{
App: &config.Application{
Name: "phonetool",
},
EnvManifest: &manifest.Environment{
Workload: manifest.Workload{
Name: aws.String("test"),
},
},
ArtifactBucketName: "mockBucket",
Manifest: mft,
Addons: mockAddons{},
}, func(s *LoadBalancedWebService) {
s.parser = parser
})
require.NoError(t, err)
// WHEN
_, err = lbws.Template()
// THEN
require.NoError(t, err)
require.Equal(t, template.HTTPTargetContainer{
Port: "443",
Name: "envoy",
}, actual.HTTPTargetContainer)
})
}
func TestLoadBalancedWebService_Parameters(t *testing.T) {
baseProps := &manifest.LoadBalancedWebServiceProps{
WorkloadProps: &manifest.WorkloadProps{
Name: "frontend",
Dockerfile: "frontend/Dockerfile",
},
Path: "frontend",
Port: 80,
}
expectedParams := []*cloudformation.Parameter{
{
ParameterKey: aws.String(WorkloadAppNameParamKey),
ParameterValue: aws.String("phonetool"),
},
{
ParameterKey: aws.String(WorkloadEnvNameParamKey),
ParameterValue: aws.String("test"),
},
{
ParameterKey: aws.String(WorkloadNameParamKey),
ParameterValue: aws.String("frontend"),
},
{
ParameterKey: aws.String(WorkloadContainerImageParamKey),
ParameterValue: aws.String("111111111111.dkr.ecr.us-west-2.amazonaws.com/phonetool/frontend:manual-bf3678c"),
},
{
ParameterKey: aws.String(WorkloadContainerPortParamKey),
ParameterValue: aws.String("80"),
},
{
ParameterKey: aws.String(WorkloadTaskCPUParamKey),
ParameterValue: aws.String("256"),
},
{
ParameterKey: aws.String(WorkloadTaskMemoryParamKey),
ParameterValue: aws.String("512"),
},
{
ParameterKey: aws.String(WorkloadLogRetentionParamKey),
ParameterValue: aws.String("30"),
},
{
ParameterKey: aws.String(WorkloadAddonsTemplateURLParamKey),
ParameterValue: aws.String(""),
},
{
ParameterKey: aws.String(WorkloadEnvFileARNParamKey),
ParameterValue: aws.String(""),
},
}
testCases := map[string]struct {
httpsEnabled bool
dnsDelegationEnabled bool
setupManifest func(*manifest.LoadBalancedWebService)
expectedParams []*cloudformation.Parameter
expectedErr error
}{
"HTTPS Enabled": {
httpsEnabled: true,
setupManifest: func(service *manifest.LoadBalancedWebService) {
countRange := manifest.IntRangeBand("2-100")
service.Count = manifest.Count{
Value: aws.Int(1),
AdvancedCount: manifest.AdvancedCount{
Range: manifest.Range{
Value: &countRange,
},
},
}
},
expectedParams: append(expectedParams, []*cloudformation.Parameter{
{
ParameterKey: aws.String(WorkloadHTTPSParamKey),
ParameterValue: aws.String("true"),
},
{
ParameterKey: aws.String(WorkloadTargetContainerParamKey),
ParameterValue: aws.String("frontend"),
},
{
ParameterKey: aws.String(WorkloadTargetPortParamKey),
ParameterValue: aws.String("80"),
},
{
ParameterKey: aws.String(WorkloadTaskCountParamKey),
ParameterValue: aws.String("2"),
},
{
ParameterKey: aws.String(WorkloadRulePathParamKey),
ParameterValue: aws.String("frontend"),
},
{
ParameterKey: aws.String(LBWebServiceDNSDelegatedParamKey),
ParameterValue: aws.String("false"),
},
}...),
},
"HTTPS Not Enabled": {
httpsEnabled: false,
setupManifest: func(service *manifest.LoadBalancedWebService) {
countRange := manifest.IntRangeBand("2-100")
service.Count = manifest.Count{
Value: aws.Int(1),
AdvancedCount: manifest.AdvancedCount{
Range: manifest.Range{
Value: &countRange,
},
},
}
},
expectedParams: append(expectedParams, []*cloudformation.Parameter{
{
ParameterKey: aws.String(WorkloadRulePathParamKey),
ParameterValue: aws.String("frontend"),
},
{
ParameterKey: aws.String(WorkloadHTTPSParamKey),
ParameterValue: aws.String("false"),
},
{
ParameterKey: aws.String(WorkloadTargetContainerParamKey),
ParameterValue: aws.String("frontend"),
},
{
ParameterKey: aws.String(WorkloadTargetPortParamKey),
ParameterValue: aws.String("80"),
},
{
ParameterKey: aws.String(WorkloadTaskCountParamKey),
ParameterValue: aws.String("2"),
},
{
ParameterKey: aws.String(LBWebServiceDNSDelegatedParamKey),
ParameterValue: aws.String("false"),
},
}...),
},
"with sidecar container": {
httpsEnabled: true,
setupManifest: func(service *manifest.LoadBalancedWebService) {
service.HTTPOrBool.Main.TargetContainer = aws.String("xray")
service.Sidecars = map[string]*manifest.SidecarConfig{
"xray": {
Port: aws.String("5000"),
},
}
},
expectedParams: append(expectedParams, []*cloudformation.Parameter{
{
ParameterKey: aws.String(WorkloadRulePathParamKey),
ParameterValue: aws.String("frontend"),
},
{
ParameterKey: aws.String(WorkloadHTTPSParamKey),
ParameterValue: aws.String("true"),
},
{
ParameterKey: aws.String(WorkloadTargetContainerParamKey),
ParameterValue: aws.String("xray"),
},
{
ParameterKey: aws.String(WorkloadTargetPortParamKey),
ParameterValue: aws.String("5000"),
},
{
ParameterKey: aws.String(WorkloadTaskCountParamKey),
ParameterValue: aws.String("1"),
},
{
ParameterKey: aws.String(LBWebServiceDNSDelegatedParamKey),
ParameterValue: aws.String("false"),
},
}...),
},
"exec enabled": {
httpsEnabled: false,
setupManifest: func(service *manifest.LoadBalancedWebService) {
service.ExecuteCommand = manifest.ExecuteCommand{
Enable: aws.Bool(false),
Config: manifest.ExecuteCommandConfig{
Enable: aws.Bool(true),
},
}
},
expectedParams: append(expectedParams, []*cloudformation.Parameter{
{
ParameterKey: aws.String(WorkloadRulePathParamKey),
ParameterValue: aws.String("frontend"),
},
{
ParameterKey: aws.String(WorkloadHTTPSParamKey),
ParameterValue: aws.String("false"),
},
{
ParameterKey: aws.String(WorkloadTargetContainerParamKey),
ParameterValue: aws.String("frontend"),
},
{
ParameterKey: aws.String(WorkloadTargetPortParamKey),
ParameterValue: aws.String("80"),
},
{
ParameterKey: aws.String(WorkloadTaskCountParamKey),
ParameterValue: aws.String("1"),
},
{
ParameterKey: aws.String(LBWebServiceDNSDelegatedParamKey),
ParameterValue: aws.String("false"),
},
}...),
},
"dns delegation enabled": {
httpsEnabled: false,
dnsDelegationEnabled: true,
setupManifest: func(service *manifest.LoadBalancedWebService) {
service.ExecuteCommand = manifest.ExecuteCommand{
Enable: aws.Bool(false),
Config: manifest.ExecuteCommandConfig{
Enable: aws.Bool(true),
},
}
},
expectedParams: append(expectedParams, []*cloudformation.Parameter{
{
ParameterKey: aws.String(WorkloadRulePathParamKey),
ParameterValue: aws.String("frontend"),
},
{
ParameterKey: aws.String(WorkloadHTTPSParamKey),
ParameterValue: aws.String("false"),
},
{
ParameterKey: aws.String(WorkloadTargetContainerParamKey),
ParameterValue: aws.String("frontend"),
},
{
ParameterKey: aws.String(WorkloadTargetPortParamKey),
ParameterValue: aws.String("80"),
},
{
ParameterKey: aws.String(WorkloadTaskCountParamKey),
ParameterValue: aws.String("1"),
},
{
ParameterKey: aws.String(LBWebServiceDNSDelegatedParamKey),
ParameterValue: aws.String("true"),
},
}...),
},
"nlb enabled": {
setupManifest: func(service *manifest.LoadBalancedWebService) {
service.NLBConfig = manifest.NetworkLoadBalancerConfiguration{
Listener: manifest.NetworkLoadBalancerListener{
Port: aws.String("443/tcp"),
},
}
},
expectedParams: append(expectedParams, []*cloudformation.Parameter{
{
ParameterKey: aws.String(WorkloadRulePathParamKey),
ParameterValue: aws.String("frontend"),
},
{
ParameterKey: aws.String(WorkloadHTTPSParamKey),
ParameterValue: aws.String("false"),
},
{
ParameterKey: aws.String(WorkloadTargetContainerParamKey),
ParameterValue: aws.String("frontend"),
},
{
ParameterKey: aws.String(WorkloadTargetPortParamKey),
ParameterValue: aws.String("80"),
},
{
ParameterKey: aws.String(WorkloadTaskCountParamKey),
ParameterValue: aws.String("1"),
},
{
ParameterKey: aws.String(LBWebServiceDNSDelegatedParamKey),
ParameterValue: aws.String("false"),
},
{
ParameterKey: aws.String(LBWebServiceNLBPortParamKey),
ParameterValue: aws.String("443"),
},
{
ParameterKey: aws.String(LBWebServiceNLBAliasesParamKey),
ParameterValue: aws.String(""),
},
}...),
},
"nlb alias enabled": {
setupManifest: func(service *manifest.LoadBalancedWebService) {
service.NLBConfig = manifest.NetworkLoadBalancerConfiguration{
Listener: manifest.NetworkLoadBalancerListener{
Port: aws.String("443/tcp"),
},
Aliases: manifest.Alias{
AdvancedAliases: []manifest.AdvancedAlias{
{Alias: aws.String("example.com")},
{Alias: aws.String("v1.example.com")},
},
},
}
},
expectedParams: append(expectedParams, []*cloudformation.Parameter{
{
ParameterKey: aws.String(WorkloadRulePathParamKey),
ParameterValue: aws.String("frontend"),
},
{
ParameterKey: aws.String(WorkloadHTTPSParamKey),
ParameterValue: aws.String("false"),
},
{
ParameterKey: aws.String(WorkloadTargetContainerParamKey),
ParameterValue: aws.String("frontend"),
},
{
ParameterKey: aws.String(WorkloadTargetPortParamKey),
ParameterValue: aws.String("80"),
},
{
ParameterKey: aws.String(WorkloadTaskCountParamKey),
ParameterValue: aws.String("1"),
},
{
ParameterKey: aws.String(LBWebServiceDNSDelegatedParamKey),
ParameterValue: aws.String("false"),
},
{
ParameterKey: aws.String(LBWebServiceNLBPortParamKey),
ParameterValue: aws.String("443"),
},
{
ParameterKey: aws.String(LBWebServiceNLBAliasesParamKey),
ParameterValue: aws.String("example.com,v1.example.com"),
},
}...),
},
"do not render http params when disabled": {
setupManifest: func(service *manifest.LoadBalancedWebService) {
service.HTTPOrBool = manifest.HTTPOrBool{
Enabled: aws.Bool(false),
}
},
expectedParams: append(expectedParams, []*cloudformation.Parameter{
{
ParameterKey: aws.String(WorkloadTargetContainerParamKey),
ParameterValue: aws.String("frontend"),
},
{
ParameterKey: aws.String(WorkloadTargetPortParamKey),
ParameterValue: aws.String("80"),
},
{
ParameterKey: aws.String(WorkloadTaskCountParamKey),
ParameterValue: aws.String("1"),
},
{
ParameterKey: aws.String(LBWebServiceDNSDelegatedParamKey),
ParameterValue: aws.String("false"),
},
}...),
},
"with bad count": {
httpsEnabled: true,
setupManifest: func(service *manifest.LoadBalancedWebService) {
badCountRange := manifest.IntRangeBand("badCount")
service.Count = manifest.Count{
AdvancedCount: manifest.AdvancedCount{
Range: manifest.Range{
Value: &badCountRange,
},
},
}
},
expectedErr: fmt.Errorf("parse task count value badCount: invalid range value badCount. Should be in format of ${min}-${max}"),
},
}
for name, tc := range testCases {
t.Run(name, func(t *testing.T) {
testManifest := manifest.NewLoadBalancedWebService(baseProps)
tc.setupManifest(testManifest)
// GIVEN
conf := &LoadBalancedWebService{
ecsWkld: &ecsWkld{
wkld: &wkld{
name: aws.StringValue(testManifest.Name),
env: testEnvName,
app: testAppName,
rc: RuntimeConfig{
PushedImages: map[string]ECRImage{
aws.StringValue(testManifest.Name): {
RepoURL: testImageRepoURL,
ImageTag: testImageTag,
},
},
},
},
tc: testManifest.TaskConfig,
},
manifest: testManifest,
httpsEnabled: tc.httpsEnabled,
dnsDelegationEnabled: tc.dnsDelegationEnabled,
}
// WHEN
params, err := conf.Parameters()
// THEN
if err == nil {
require.ElementsMatch(t, tc.expectedParams, params)
} else {
require.EqualError(t, tc.expectedErr, err.Error())
}
})
}
}
func TestLoadBalancedWebService_SerializedParameters(t *testing.T) {
testLBWebServiceManifest := manifest.NewLoadBalancedWebService(&manifest.LoadBalancedWebServiceProps{
WorkloadProps: &manifest.WorkloadProps{
Name: "frontend",
Dockerfile: "frontend/Dockerfile",
},
Path: "frontend",
Port: 80,
})
c := &LoadBalancedWebService{
ecsWkld: &ecsWkld{
wkld: &wkld{
name: "frontend",
env: testEnvName,
app: testAppName,
rc: RuntimeConfig{
PushedImages: map[string]ECRImage{
"frontend": {
RepoURL: testImageRepoURL,
ImageTag: testImageTag,
},
},
AdditionalTags: map[string]string{
"owner": "boss",
},
},
},
tc: testLBWebServiceManifest.TaskConfig,
},
manifest: testLBWebServiceManifest,
}
params, err := c.SerializedParameters()
require.NoError(t, err)
require.Equal(t, params, `{
"Parameters": {
"AddonsTemplateURL": "",
"AppName": "phonetool",
"ContainerImage": "111111111111.dkr.ecr.us-west-2.amazonaws.com/phonetool/frontend:manual-bf3678c",
"ContainerPort": "80",
"DNSDelegated": "false",
"EnvFileARN": "",
"EnvName": "test",
"HTTPSEnabled": "false",
"LogRetention": "30",
"RulePath": "frontend",
"TargetContainer": "frontend",
"TargetPort": "80",
"TaskCPU": "256",
"TaskCount": "1",
"TaskMemory": "512",
"WorkloadName": "frontend"
},
"Tags": {
"copilot-application": "phonetool",
"copilot-environment": "test",
"copilot-service": "frontend",
"owner": "boss"
}
}`)
}
func TestLoadBalancedWebService_Tags(t *testing.T) {
// GIVEN
var testLBWebServiceManifest = manifest.NewLoadBalancedWebService(&manifest.LoadBalancedWebServiceProps{
WorkloadProps: &manifest.WorkloadProps{
Name: "frontend",
Dockerfile: "frontend/Dockerfile",
},
Path: "frontend",
Port: 80,
})
conf := &LoadBalancedWebService{
ecsWkld: &ecsWkld{
wkld: &wkld{
name: aws.StringValue(testLBWebServiceManifest.Name),
env: testEnvName,
app: testAppName,
rc: RuntimeConfig{
PushedImages: map[string]ECRImage{
"frontend": {
RepoURL: testImageRepoURL,
ImageTag: testImageTag,
},
},
AdditionalTags: map[string]string{
"owner": "boss",
deploy.AppTagKey: "overrideapp",
deploy.EnvTagKey: "overrideenv",
deploy.ServiceTagKey: "overridesvc",
},
},
},
},
manifest: testLBWebServiceManifest,
}
// WHEN
tags := conf.Tags()
// THEN
require.Equal(t, []*cloudformation.Tag{
{
Key: aws.String(deploy.AppTagKey),
Value: aws.String("phonetool"),
},
{
Key: aws.String(deploy.EnvTagKey),
Value: aws.String("test"),
},
{
Key: aws.String(deploy.ServiceTagKey),
Value: aws.String("frontend"),
},
{
Key: aws.String("owner"),
Value: aws.String("boss"),
},
}, tags)
}
| 1,040 |
copilot-cli | aws | Go | // Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
// SPDX-License-Identifier: Apache-2.0
package stack
import (
"fmt"
"strings"
)
const (
// taskStackPrefix is used elsewhere to list CF stacks
taskStackPrefix = "task-"
// After v1.16, pipeline stack names are namespaced with a prefix of "pipeline-${appName}-".
fmtPipelineNamespaced = "pipeline-%s-%s"
)
// TaskStackName holds the name of a Copilot one-off task stack.
type TaskStackName string
// TaskName returns the name of the task family, generated from the stack name
func (t TaskStackName) TaskName() string {
return strings.SplitN(string(t), "-", 2)[1]
}
// NameForWorkload returns the stack name for a workload.
func NameForWorkload(app, env, name string) string {
// stack name limit constrained by CFN https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/cfn-using-console-create-stack-parameters.html
const maxLen = 128
stackName := fmt.Sprintf("%s-%s-%s", app, env, name)
if len(stackName) > maxLen {
return stackName[:maxLen]
}
return stackName
}
// NameForEnv returns the stack name for an environment.
func NameForEnv(app, env string) string {
return fmt.Sprintf("%s-%s", app, env)
}
// NameForTask returns the stack name for a task.
func NameForTask(task string) TaskStackName {
return TaskStackName(taskStackPrefix + task)
}
// NameForAppStack returns the stack name for an app.
func NameForAppStack(app string) string {
return fmt.Sprintf("%s-infrastructure-roles", app)
}
// NameForAppStackSet returns the stackset name for an app.
func NameForAppStackSet(app string) string {
return fmt.Sprintf("%s-infrastructure", app)
}
// NameForPipeline returns the stack name for a pipeline, depending on whether it has been deployed using the legacy scheme.
// Note that it doesn't cut name to length of 128 like service stack name. It expects CloudFormation to error out
// when the name is to long.
func NameForPipeline(app string, pipeline string, isLegacy bool) string {
if isLegacy {
return pipeline
}
return fmt.Sprintf(fmtPipelineNamespaced, app, pipeline)
}
| 68 |
copilot-cli | aws | Go | // Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
// SPDX-License-Identifier: Apache-2.0
package stack
import (
"testing"
"github.com/stretchr/testify/require"
)
func TestTaskName(t *testing.T) {
taskStackName := TaskStackName("foo-bar")
name := taskStackName.TaskName()
require.Equal(t, name, "bar")
}
func TestNameForEnv(t *testing.T) {
name := NameForEnv("foo", "bar")
require.Equal(t, name, "foo-bar")
}
func TestNameForTask(t *testing.T) {
name := NameForTask("foo")
require.Equal(t, name, TaskStackName("task-foo"))
}
func TestNameForAppStack(t *testing.T) {
name := NameForAppStack("foo")
require.Equal(t, name, "foo-infrastructure-roles")
}
func TestNameForAppStackSet(t *testing.T) {
name := NameForAppStackSet("foo")
require.Equal(t, name, "foo-infrastructure")
}
| 42 |
copilot-cli | aws | Go | // Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
// SPDX-License-Identifier: Apache-2.0
package stack
import (
"github.com/aws/aws-sdk-go/service/cloudformation"
"github.com/aws/copilot-cli/internal/pkg/template"
"github.com/aws/copilot-cli/internal/pkg/deploy"
)
const (
pipelineCfnTemplatePath = "cicd/pipeline_cfn.yml"
)
type pipelineStackConfig struct {
*deploy.CreatePipelineInput
parser template.Parser
}
// NewPipelineStackConfig sets up a struct which can provide values to CloudFormation for
// spinning up a pipeline.
func NewPipelineStackConfig(in *deploy.CreatePipelineInput) *pipelineStackConfig {
return &pipelineStackConfig{
CreatePipelineInput: in,
parser: template.New(),
}
}
// StackName returns the name of the CloudFormation stack.
func (p *pipelineStackConfig) StackName() string {
return NameForPipeline(p.AppName, p.Name, p.IsLegacy)
}
// Template returns the CloudFormation template for the service parametrized for the environment.
func (p *pipelineStackConfig) Template() (string, error) {
content, err := p.parser.Parse(pipelineCfnTemplatePath, p, template.WithFuncs(cfTemplateFunctions), template.WithFuncs(map[string]interface{}{
"isCodeStarConnection": func(source interface{}) bool {
type connectionName interface {
ConnectionName() (string, error)
}
_, ok := source.(connectionName)
return ok
},
}))
if err != nil {
return "", err
}
return content.String(), nil
}
// SerializedParameters returns the CloudFormation stack's parameters serialized to a JSON document.
func (s *pipelineStackConfig) SerializedParameters() (string, error) {
// No-op for now.
return "", nil
}
// Parameters returns the list of CloudFormation parameters used by the template.
func (p *pipelineStackConfig) Parameters() ([]*cloudformation.Parameter, error) {
return nil, nil
}
// Tags returns the tags that should be applied to the pipeline CloudFormation stack.
func (p *pipelineStackConfig) Tags() []*cloudformation.Tag {
defaultTags := map[string]string{
deploy.AppTagKey: p.AppName,
}
if !p.IsLegacy {
defaultTags[deploy.PipelineTagKey] = p.Name
}
return mergeAndFlattenTags(p.AdditionalTags, defaultTags)
}
| 74 |
copilot-cli | aws | Go | // Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
// SPDX-License-Identifier: Apache-2.0
package stack
import (
"bytes"
"errors"
"fmt"
"testing"
"github.com/aws/aws-sdk-go/aws"
"github.com/aws/aws-sdk-go/service/cloudformation"
"github.com/aws/copilot-cli/internal/pkg/template"
"github.com/aws/copilot-cli/internal/pkg/template/mocks"
"github.com/golang/mock/gomock"
"github.com/stretchr/testify/require"
"github.com/aws/copilot-cli/internal/pkg/deploy"
)
const (
projectName = "chickenProject"
pipelineName = "wingspipeline"
toolsAccountID = "012345678910"
defaultBranch = "main"
)
func TestPipelineParameters(t *testing.T) {
pipeline := NewPipelineStackConfig(
mockCreatePipelineInput(),
)
params, _ := pipeline.Parameters()
require.Nil(t, params, "pipeline cloudformation template should not expose any parameters")
}
func TestPipelineTags(t *testing.T) {
testCases := map[string]struct {
in *deploy.CreatePipelineInput
wantedTags []*cloudformation.Tag
}{
"pipeline with legacy naming": {
in: &deploy.CreatePipelineInput{
AppName: projectName,
Name: pipelineName,
IsLegacy: true,
},
wantedTags: []*cloudformation.Tag{
{
Key: aws.String(deploy.AppTagKey),
Value: aws.String(projectName),
},
},
},
"pipeline with namespaced naming and additional tags": {
in: mockCreatePipelineInput(),
wantedTags: []*cloudformation.Tag{
{
Key: aws.String(deploy.AppTagKey),
Value: aws.String(projectName),
},
{
Key: aws.String(deploy.PipelineTagKey),
Value: aws.String(pipelineName),
},
{
Key: aws.String("owner"),
Value: aws.String("boss"),
},
},
},
}
for name, tc := range testCases {
t.Run(name, func(t *testing.T) {
pipeline := NewPipelineStackConfig(
tc.in,
)
require.ElementsMatch(t, tc.wantedTags, pipeline.Tags())
})
}
}
func TestPipelineStackName(t *testing.T) {
testCases := map[string]struct {
in *deploy.CreatePipelineInput
wantedStackName string
}{
"pipeline with legacy naming": {
in: &deploy.CreatePipelineInput{
AppName: projectName,
Name: pipelineName,
IsLegacy: true,
},
wantedStackName: pipelineName,
},
"pipeline with namespaced naming and additional tags": {
in: mockCreatePipelineInput(),
wantedStackName: fmt.Sprintf("pipeline-%s-%s", projectName, pipelineName),
},
}
for name, tc := range testCases {
t.Run(name, func(t *testing.T) {
pipeline := NewPipelineStackConfig(
tc.in,
)
require.Equal(t, tc.wantedStackName, pipeline.StackName(), "unexpected StackName")
})
}
}
func TestPipelineStackConfig_Template(t *testing.T) {
testCases := map[string]struct {
in *deploy.CreatePipelineInput
mockDependencies func(ctrl *gomock.Controller, c *pipelineStackConfig)
wantedTemplate string
wantedError error
}{
"error parsing file": {
in: mockCreatePipelineInput(),
mockDependencies: func(ctrl *gomock.Controller, c *pipelineStackConfig) {
m := mocks.NewMockReadParser(ctrl)
m.EXPECT().Parse(pipelineCfnTemplatePath, c, gomock.Any()).Return(nil, errors.New("some error"))
c.parser = m
},
wantedError: errors.New("some error"),
},
"successfully parses file": {
in: mockCreatePipelineInput(),
mockDependencies: func(ctrl *gomock.Controller, c *pipelineStackConfig) {
m := mocks.NewMockReadParser(ctrl)
m.EXPECT().Parse(pipelineCfnTemplatePath, c, gomock.Any()).Return(&template.Content{
Buffer: bytes.NewBufferString("pipeline"),
}, nil)
c.parser = m
},
wantedTemplate: "pipeline",
},
}
for name, tc := range testCases {
t.Run(name, func(t *testing.T) {
// GIVEN
ctrl := gomock.NewController(t)
defer ctrl.Finish()
c := &pipelineStackConfig{
CreatePipelineInput: tc.in,
}
tc.mockDependencies(ctrl, c)
// WHEN
template, err := c.Template()
// THEN
require.Equal(t, tc.wantedError, err)
require.Equal(t, tc.wantedTemplate, template)
})
}
}
func mockCreatePipelineInput() *deploy.CreatePipelineInput {
return &deploy.CreatePipelineInput{
AppName: projectName,
Name: pipelineName,
Source: &deploy.GitHubSource{
RepositoryURL: "hencrice/amazon-ecs-cli-v2",
Branch: defaultBranch,
},
Stages: []deploy.PipelineStage{},
ArtifactBuckets: []deploy.ArtifactBucket{
{
BucketName: "chicken-us-east-1",
KeyArn: fmt.Sprintf("arn:aws:kms:us-east-1:%s:key/30131d3f-c30f-4d49-beaa-cf4bfc07f34e", toolsAccountID),
},
{
BucketName: "chicken-us-west-2",
KeyArn: fmt.Sprintf("arn:aws:kms:us-west-2:%s:key/80de5f7f-422d-4dff-8f4d-01f6ec5715bc", toolsAccountID),
},
// assume the pipeline is hosted in a region that does not contain any copilot environment
{
BucketName: "chicken-us-west-1",
KeyArn: fmt.Sprintf("arn:aws:kms:us-west-1:%s:key/75668c57-ec4b-4d0c-b880-8dc3fa78f6d1", toolsAccountID),
},
},
AdditionalTags: map[string]string{
"owner": "boss",
},
}
}
| 194 |
copilot-cli | aws | Go | // Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
// SPDX-License-Identifier: Apache-2.0
package stack
import (
"fmt"
"strings"
"github.com/aws/aws-sdk-go/aws"
"github.com/aws/copilot-cli/internal/pkg/deploy"
"github.com/aws/copilot-cli/internal/pkg/deploy/upload/customresource"
"github.com/aws/copilot-cli/internal/pkg/manifest"
"github.com/aws/copilot-cli/internal/pkg/manifest/manifestinfo"
"github.com/aws/copilot-cli/internal/pkg/template"
)
var awsSDKLayerForRegion = map[string]*string{
"ap-northeast-1": aws.String("arn:aws:lambda:ap-northeast-1:249908578461:layer:AWSLambda-Node-AWS-SDK:15"),
"us-east-1": aws.String("arn:aws:lambda:us-east-1:668099181075:layer:AWSLambda-Node-AWS-SDK:15"),
"ap-southeast-1": aws.String("arn:aws:lambda:ap-southeast-1:468957933125:layer:AWSLambda-Node-AWS-SDK:14"),
"eu-west-1": aws.String("arn:aws:lambda:eu-west-1:399891621064:layer:AWSLambda-Node-AWS-SDK:14"),
"us-west-1": aws.String("arn:aws:lambda:us-west-1:325793726646:layer:AWSLambda-Node-AWS-SDK:15"),
"ap-northeast-2": aws.String("arn:aws:lambda:ap-northeast-2:296580773974:layer:AWSLambda-Node-AWS-SDK:14"),
"ap-south-1": aws.String("arn:aws:lambda:ap-south-1:631267018583:layer:AWSLambda-Node-AWS-SDK:14"),
"ap-southeast-2": aws.String("arn:aws:lambda:ap-southeast-2:817496625479:layer:AWSLambda-Node-AWS-SDK:14"),
"ca-central-1": aws.String("arn:aws:lambda:ca-central-1:778625758767:layer:AWSLambda-Node-AWS-SDK:14"),
"eu-central-1": aws.String("arn:aws:lambda:eu-central-1:292169987271:layer:AWSLambda-Node-AWS-SDK:14"),
"eu-west-2": aws.String("arn:aws:lambda:eu-west-2:142628438157:layer:AWSLambda-Node-AWS-SDK:14"),
"sa-east-1": aws.String("arn:aws:lambda:sa-east-1:640010853179:layer:AWSLambda-Node-AWS-SDK:14"),
"us-east-2": aws.String("arn:aws:lambda:us-east-2:259788987135:layer:AWSLambda-Node-AWS-SDK:14"),
"us-west-2": aws.String("arn:aws:lambda:us-west-2:420165488524:layer:AWSLambda-Node-AWS-SDK:14"),
"af-south-1": aws.String("arn:aws:lambda:af-south-1:392341123054:layer:AWSLambda-Node-AWS-SDK:7"),
"ap-east-1": aws.String("arn:aws:lambda:ap-east-1:118857876118:layer:AWSLambda-Node-AWS-SDK:14"),
"ap-northeast-3": aws.String("arn:aws:lambda:ap-northeast-3:961244031340:layer:AWSLambda-Node-AWS-SDK:14"),
"eu-north-1": aws.String("arn:aws:lambda:eu-north-1:642425348156:layer:AWSLambda-Node-AWS-SDK:14"),
"eu-south-1": aws.String("arn:aws:lambda:eu-south-1:426215560912:layer:AWSLambda-Node-AWS-SDK:7"),
"eu-west-3": aws.String("arn:aws:lambda:eu-west-3:959311844005:layer:AWSLambda-Node-AWS-SDK:14"),
"me-south-1": aws.String("arn:aws:lambda:me-south-1:507411403535:layer:AWSLambda-Node-AWS-SDK:10"),
}
// RequestDrivenWebService represents the configuration needed to create a CloudFormation stack from a request-drive web service manifest.
type RequestDrivenWebService struct {
*appRunnerWkld
manifest *manifest.RequestDrivenWebService
app deploy.AppInformation
parser requestDrivenWebSvcReadParser
}
// RequestDrivenWebServiceConfig contains data required to initialize a request-driven web service stack.
type RequestDrivenWebServiceConfig struct {
App deploy.AppInformation
Env string
Manifest *manifest.RequestDrivenWebService
RawManifest []byte
ArtifactBucketName string
RuntimeConfig RuntimeConfig
Addons NestedStackConfigurer
}
// NewRequestDrivenWebService creates a new RequestDrivenWebService stack from a manifest file.
func NewRequestDrivenWebService(cfg RequestDrivenWebServiceConfig) (*RequestDrivenWebService, error) {
crs, err := customresource.RDWS(fs)
if err != nil {
return nil, fmt.Errorf("request-driven web service custom resources: %w", err)
}
cfg.RuntimeConfig.loadCustomResourceURLs(cfg.ArtifactBucketName, uploadableCRs(crs).convert())
return &RequestDrivenWebService{
appRunnerWkld: &appRunnerWkld{
wkld: &wkld{
name: aws.StringValue(cfg.Manifest.Name),
env: cfg.Env,
app: cfg.App.Name,
permBound: cfg.App.PermissionsBoundary,
artifactBucketName: cfg.ArtifactBucketName,
rc: cfg.RuntimeConfig,
image: cfg.Manifest.ImageConfig.Image,
rawManifest: cfg.RawManifest,
addons: cfg.Addons,
parser: fs,
},
instanceConfig: cfg.Manifest.InstanceConfig,
imageConfig: cfg.Manifest.ImageConfig,
healthCheckConfig: cfg.Manifest.HealthCheckConfiguration,
},
app: cfg.App,
manifest: cfg.Manifest,
parser: fs,
}, nil
}
// Template returns the CloudFormation template for the service parametrized for the environment.
func (s *RequestDrivenWebService) Template() (string, error) {
crs, err := convertCustomResources(s.rc.CustomResourcesURL)
if err != nil {
return "", err
}
networkConfig := convertRDWSNetworkConfig(s.manifest.Network)
addonsParams, err := s.addonsParameters()
if err != nil {
return "", err
}
addonsOutputs, err := s.addonsOutputs()
if err != nil {
return "", err
}
var layerARN, dnsDelegationRole, dnsName *string
if s.manifest.Alias != nil {
dnsDelegationRole, dnsName = convertAppInformation(s.app)
layerARN = awsSDKLayerForRegion[s.rc.Region]
}
publishers, err := convertPublish(s.manifest.Publish(), s.rc.AccountID, s.rc.Region, s.app.Name, s.env, s.name)
if err != nil {
return "", fmt.Errorf(`convert "publish" field for service %s: %w`, s.name, err)
}
content, err := s.parser.ParseRequestDrivenWebService(template.WorkloadOpts{
AppName: s.wkld.app,
EnvName: s.env,
WorkloadName: s.name,
SerializedManifest: string(s.rawManifest),
EnvVersion: s.rc.EnvVersion,
Variables: convertEnvVars(s.manifest.Variables),
StartCommand: s.manifest.StartCommand,
Tags: s.manifest.Tags,
NestedStack: addonsOutputs,
AddonsExtraParams: addonsParams,
EnableHealthCheck: !s.healthCheckConfig.IsZero(),
WorkloadType: manifestinfo.RequestDrivenWebServiceType,
Alias: s.manifest.Alias,
CustomResources: crs,
AWSSDKLayer: layerARN,
AppDNSDelegationRole: dnsDelegationRole,
AppDNSName: dnsName,
Network: networkConfig,
Publish: publishers,
ServiceDiscoveryEndpoint: s.rc.ServiceDiscoveryEndpoint,
Observability: template.ObservabilityOpts{
Tracing: strings.ToUpper(aws.StringValue(s.manifest.Observability.Tracing)),
},
PermissionsBoundary: s.permBound,
Private: aws.BoolValue(s.manifest.Private.Basic) || s.manifest.Private.Advanced.Endpoint != nil,
AppRunnerVPCEndpoint: s.manifest.Private.Advanced.Endpoint,
Count: s.manifest.Count,
Secrets: convertSecrets(s.manifest.RequestDrivenWebServiceConfig.Secrets),
})
if err != nil {
return "", err
}
return content.String(), nil
}
// SerializedParameters returns the CloudFormation stack's parameters serialized to a JSON document.
func (s *RequestDrivenWebService) SerializedParameters() (string, error) {
return serializeTemplateConfig(s.wkld.parser, s)
}
| 161 |
copilot-cli | aws | Go | //go:build integration || localintegration
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
// SPDX-License-Identifier: Apache-2.0
package stack_test
import (
"fmt"
"os"
"path/filepath"
"testing"
"github.com/aws/aws-sdk-go/aws"
"github.com/aws/aws-sdk-go/aws/session"
"github.com/aws/copilot-cli/internal/pkg/addon"
"github.com/aws/copilot-cli/internal/pkg/deploy"
"github.com/aws/copilot-cli/internal/pkg/deploy/cloudformation/stack"
"github.com/aws/copilot-cli/internal/pkg/manifest"
"github.com/aws/copilot-cli/internal/pkg/workspace"
"github.com/spf13/afero"
"github.com/stretchr/testify/require"
"gopkg.in/yaml.v3"
)
func TestRDWS_Template(t *testing.T) {
const manifestFileName = "rdws-manifest.yml"
testCases := map[string]struct {
envName string
svcStackPath string
}{
"test env": {
envName: "test",
svcStackPath: "rdws-test.stack.yml",
},
"prod env": {
envName: "prod",
svcStackPath: "rdws-prod.stack.yml",
},
}
// Read manifest.
manifestBytes, err := os.ReadFile(filepath.Join("testdata", "workloads", manifestFileName))
require.NoError(t, err, "read manifest file")
mft, err := manifest.UnmarshalWorkload(manifestBytes)
require.NoError(t, err, "unmarshal manifest file")
for _, tc := range testCases {
envMft, err := mft.ApplyEnv(tc.envName)
require.NoError(t, err, "apply test env to manifest")
err = envMft.Validate()
require.NoError(t, err)
err = envMft.Load(session.New())
require.NoError(t, err)
content := envMft.Manifest()
v, ok := content.(*manifest.RequestDrivenWebService)
require.True(t, ok)
// Create in-memory mock file system.
wd, err := os.Getwd()
require.NoError(t, err)
fs := afero.NewMemMapFs()
_ = fs.MkdirAll(fmt.Sprintf("%s/copilot", wd), 0755)
_ = afero.WriteFile(fs, fmt.Sprintf("%s/copilot/.workspace", wd), []byte(fmt.Sprintf("---\napplication: %s", "DavidsApp")), 0644)
require.NoError(t, err)
ws, err := workspace.Use(fs)
require.NoError(t, err)
_, err = addon.ParseFromWorkload(aws.StringValue(v.Name), ws)
var notFound *addon.ErrAddonsNotFound
require.ErrorAs(t, err, ¬Found)
// Read wanted stack template.
wantedTemplate, err := os.ReadFile(filepath.Join("testdata", "workloads", tc.svcStackPath))
require.NoError(t, err, "read cloudformation stack")
// Read actual stack template.
serializer, err := stack.NewRequestDrivenWebService(stack.RequestDrivenWebServiceConfig{
App: deploy.AppInformation{
Name: appName,
},
Env: tc.envName,
Manifest: v,
ArtifactBucketName: "bucket",
RuntimeConfig: stack.RuntimeConfig{
AccountID: "123456789123",
Region: "us-west-2",
EnvVersion: "v1.42.0",
},
})
require.NoError(t, err, "create rdws serializer")
actualTemplate, err := serializer.Template()
require.NoError(t, err, "get cloudformation template for rdws")
// Compare the two.
wanted := make(map[interface{}]interface{})
require.NoError(t, yaml.Unmarshal(wantedTemplate, wanted), "unmarshal wanted template to map[interface{}]interface{}")
actual := make(map[interface{}]interface{})
require.NoError(t, yaml.Unmarshal([]byte(actualTemplate), actual), "unmarshal actual template to map[interface{}]interface{}")
resetCustomResourceLocations(actual)
compareStackTemplate(t, wanted, actual)
}
}
| 105 |
copilot-cli | aws | Go | // Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
// SPDX-License-Identifier: Apache-2.0
package stack
import (
"bytes"
"errors"
"fmt"
"testing"
"github.com/aws/copilot-cli/internal/pkg/template/templatetest"
"github.com/aws/copilot-cli/internal/pkg/deploy"
"github.com/aws/copilot-cli/internal/pkg/addon"
"github.com/aws/copilot-cli/internal/pkg/manifest/manifestinfo"
"github.com/aws/aws-sdk-go/aws"
"github.com/aws/aws-sdk-go/service/cloudformation"
"github.com/aws/copilot-cli/internal/pkg/deploy/cloudformation/stack/mocks"
"github.com/aws/copilot-cli/internal/pkg/manifest"
"github.com/aws/copilot-cli/internal/pkg/template"
"github.com/golang/mock/gomock"
"github.com/stretchr/testify/require"
)
var (
testPrivatePlacement = manifest.PrivateSubnetPlacement
)
var testRDWebServiceManifest = &manifest.RequestDrivenWebService{
Workload: manifest.Workload{
Name: aws.String(testServiceName),
Type: aws.String(manifestinfo.RequestDrivenWebServiceType),
},
RequestDrivenWebServiceConfig: manifest.RequestDrivenWebServiceConfig{
ImageConfig: manifest.ImageWithPort{
Port: aws.Uint16(80),
},
InstanceConfig: manifest.AppRunnerInstanceConfig{
CPU: aws.Int(256),
Memory: aws.Int(512),
},
Variables: map[string]manifest.Variable{
"LOG_LEVEL": {},
"NODE_ENV": {},
},
Secrets: map[string]manifest.Secret{"foo": {}},
RequestDrivenWebServiceHttpConfig: manifest.RequestDrivenWebServiceHttpConfig{
HealthCheckConfiguration: manifest.HealthCheckArgsOrString{
Union: manifest.BasicToUnion[string, manifest.HTTPHealthCheckArgs]("/"),
},
},
Tags: map[string]string{
"owner": "jeff",
},
},
}
func TestRequestDrivenWebService_NewRequestDrivenWebService(t *testing.T) {
t.Cleanup(func() {
fs = realEmbedFS
})
fs = templatetest.Stub{}
type testInput struct {
mft *manifest.RequestDrivenWebService
env string
rc RuntimeConfig
bucketName string
appInfo deploy.AppInformation
urls map[string]string
}
testCases := map[string]struct {
input testInput
mockDependencies func(t *testing.T, ctrl *gomock.Controller, c *RequestDrivenWebService)
wantedStack *RequestDrivenWebService
wantedError error
}{
"should return RequestDrivenWebService": {
input: testInput{
mft: testRDWebServiceManifest,
env: testEnvName,
rc: RuntimeConfig{
Region: "us-west-2",
},
appInfo: deploy.AppInformation{
Name: testAppName,
},
bucketName: "mockbucket",
urls: map[string]string{
"custom-domain-app-runner": "mockURL1",
"aws-sdk-layer": "mockURL2",
},
},
wantedStack: &RequestDrivenWebService{
appRunnerWkld: &appRunnerWkld{
wkld: &wkld{
name: aws.StringValue(testRDWebServiceManifest.Name),
env: testEnvName,
app: testAppName,
rc: RuntimeConfig{
CustomResourcesURL: map[string]string{
"CustomDomainFunction": "https://.s3.us-west-2.amazonaws.com/manual/scripts/custom-resources/customdomainfunction/8932747ba5dbff619d89b92d0033ef1d04f7dd1b055e073254907d4e38e3976d.zip",
"EnvControllerFunction": "https://.s3.us-west-2.amazonaws.com/manual/scripts/custom-resources/envcontrollerfunction/8932747ba5dbff619d89b92d0033ef1d04f7dd1b055e073254907d4e38e3976d.zip",
},
Region: "us-west-2",
},
image: testRDWebServiceManifest.ImageConfig.Image,
},
instanceConfig: testRDWebServiceManifest.InstanceConfig,
imageConfig: testRDWebServiceManifest.ImageConfig,
},
manifest: testRDWebServiceManifest,
app: deploy.AppInformation{
Name: testAppName,
},
},
},
}
for name, tc := range testCases {
t.Run(name, func(t *testing.T) {
ctrl := gomock.NewController(t)
defer ctrl.Finish()
addons := mocks.NewMockNestedStackConfigurer(ctrl)
stack, err := NewRequestDrivenWebService(RequestDrivenWebServiceConfig{
App: tc.input.appInfo,
Env: tc.input.env,
Manifest: tc.input.mft,
RuntimeConfig: tc.input.rc,
Addons: addons,
})
require.Equal(t, tc.wantedError, err)
require.Equal(t, tc.wantedStack.name, stack.name)
require.Equal(t, tc.wantedStack.env, stack.env)
require.Equal(t, tc.wantedStack.app, stack.app)
require.Equal(t, tc.wantedStack.rc, stack.rc)
require.Equal(t, tc.wantedStack.image, stack.image)
require.Equal(t, tc.wantedStack.manifest, stack.manifest)
require.Equal(t, tc.wantedStack.instanceConfig, stack.instanceConfig)
require.Equal(t, tc.wantedStack.imageConfig, stack.imageConfig)
require.NotNil(t, stack.addons)
})
}
}
func TestRequestDrivenWebService_Template(t *testing.T) {
const mockSD = "app.env.svc.local.com"
testCases := map[string]struct {
inCustomResourceURLs map[string]string
inManifest func(manifest manifest.RequestDrivenWebService) manifest.RequestDrivenWebService
mockDependencies func(t *testing.T, ctrl *gomock.Controller, c *RequestDrivenWebService)
wantedTemplate string
wantedError error
}{
"should throw an error if addons template cannot be parsed": {
mockDependencies: func(t *testing.T, ctrl *gomock.Controller, c *RequestDrivenWebService) {
mockParser := mocks.NewMockrequestDrivenWebSvcReadParser(ctrl)
addons := mockAddons{tplErr: errors.New("some error")}
c.parser = mockParser
c.wkld.addons = addons
},
wantedError: fmt.Errorf("generate addons template for %s: %w", testServiceName, errors.New("some error")),
},
"should be able to parse custom resource URLs when alias is enabled": {
inManifest: func(mft manifest.RequestDrivenWebService) manifest.RequestDrivenWebService {
mft.Alias = aws.String("convex.domain.com")
mft.Network.VPC.Placement = manifest.PlacementArgOrString{
PlacementString: &testPrivatePlacement,
}
return mft
},
inCustomResourceURLs: map[string]string{
template.AppRunnerCustomDomainLambdaFileName: "https://mockbucket.s3-us-east-1.amazonaws.com/mockURL1",
},
mockDependencies: func(t *testing.T, ctrl *gomock.Controller, c *RequestDrivenWebService) {
mockParser := mocks.NewMockrequestDrivenWebSvcReadParser(ctrl)
addons := mockAddons{}
mockParser.EXPECT().ParseRequestDrivenWebService(gomock.Any()).DoAndReturn(func(actual template.WorkloadOpts) (*template.Content, error) {
require.Equal(t, template.WorkloadOpts{
AppName: "phonetool",
EnvName: "test",
WorkloadName: "frontend",
WorkloadType: manifestinfo.RequestDrivenWebServiceType,
Variables: map[string]template.Variable{
"LOG_LEVEL": template.PlainVariable(""),
"NODE_ENV": template.PlainVariable(""),
},
Secrets: map[string]template.Secret{"foo": template.SecretFromPlainSSMOrARN("")},
Tags: c.manifest.Tags,
Count: c.manifest.Count,
EnableHealthCheck: true,
Alias: aws.String("convex.domain.com"),
CustomResources: map[string]template.S3ObjectLocation{
template.AppRunnerCustomDomainLambdaFileName: {
Bucket: "mockbucket",
Key: "mockURL1",
},
},
Network: template.NetworkOpts{
SubnetsType: "PrivateSubnets",
},
ServiceDiscoveryEndpoint: mockSD,
AWSSDKLayer: aws.String("arn:aws:lambda:us-west-2:420165488524:layer:AWSLambda-Node-AWS-SDK:14"),
}, actual)
return &template.Content{Buffer: bytes.NewBufferString("template")}, nil
})
c.parser = mockParser
c.wkld.addons = addons
},
wantedTemplate: "template",
},
"should parse template without addons/ directory": {
mockDependencies: func(t *testing.T, ctrl *gomock.Controller, c *RequestDrivenWebService) {
mockParser := mocks.NewMockrequestDrivenWebSvcReadParser(ctrl)
addons := mockAddons{}
mockParser.EXPECT().ParseRequestDrivenWebService(gomock.Any()).DoAndReturn(func(actual template.WorkloadOpts) (*template.Content, error) {
require.Equal(t, template.WorkloadOpts{
AppName: "phonetool",
EnvName: "test",
WorkloadName: "frontend",
WorkloadType: manifestinfo.RequestDrivenWebServiceType,
Variables: convertEnvVars(c.manifest.Variables),
Secrets: convertSecrets(c.manifest.RequestDrivenWebServiceConfig.Secrets),
Tags: c.manifest.Tags,
ServiceDiscoveryEndpoint: mockSD,
EnableHealthCheck: true,
CustomResources: make(map[string]template.S3ObjectLocation),
}, actual)
return &template.Content{Buffer: bytes.NewBufferString("template")}, nil
})
c.parser = mockParser
c.addons = addons
},
wantedTemplate: "template",
},
"should parse template with addons": {
mockDependencies: func(t *testing.T, ctrl *gomock.Controller, c *RequestDrivenWebService) {
mockParser := mocks.NewMockrequestDrivenWebSvcReadParser(ctrl)
addons := mockAddons{
tpl: `Resources:
AdditionalResourcesPolicy:
Type: AWS::IAM::ManagedPolicy
Properties:
PolicyDocument:
Statement:
- Effect: Allow
Action: '*'
Resource: '*'
DDBTable:
Type: AWS::DynamoDB::Table
Properties:
TableName: 'Hello'
Outputs:
AdditionalResourcesPolicyArn:
Value: !Ref AdditionalResourcesPolicy
DDBTableName:
Value: !Ref DDBTable
Hello:
Value: hello`,
}
mockParser.EXPECT().ParseRequestDrivenWebService(gomock.Any()).DoAndReturn(func(actual template.WorkloadOpts) (*template.Content, error) {
require.Equal(t, template.WorkloadOpts{
AppName: "phonetool",
EnvName: "test",
WorkloadName: "frontend",
WorkloadType: manifestinfo.RequestDrivenWebServiceType,
Variables: convertEnvVars(c.manifest.Variables),
Secrets: convertSecrets(c.manifest.RequestDrivenWebServiceConfig.Secrets),
Tags: c.manifest.Tags,
ServiceDiscoveryEndpoint: mockSD,
NestedStack: &template.WorkloadNestedStackOpts{
StackName: addon.StackName,
VariableOutputs: []string{"DDBTableName", "Hello"},
PolicyOutputs: []string{"AdditionalResourcesPolicyArn"},
},
CustomResources: make(map[string]template.S3ObjectLocation),
EnableHealthCheck: true,
}, actual)
return &template.Content{Buffer: bytes.NewBufferString("template")}, nil
})
c.parser = mockParser
c.addons = addons
},
wantedTemplate: "template",
},
"should return parsing error": {
mockDependencies: func(t *testing.T, ctrl *gomock.Controller, c *RequestDrivenWebService) {
mockParser := mocks.NewMockrequestDrivenWebSvcReadParser(ctrl)
addons := mockAddons{}
mockParser.EXPECT().ParseRequestDrivenWebService(gomock.Any()).Return(nil, errors.New("parsing error"))
c.parser = mockParser
c.addons = addons
},
wantedError: errors.New("parsing error"),
},
"should return error if a custom resource url cannot be parsed when alias is enabled": {
inManifest: func(manifest manifest.RequestDrivenWebService) manifest.RequestDrivenWebService {
manifest.Alias = aws.String("convex.domain.com")
return manifest
},
inCustomResourceURLs: map[string]string{
"CustomDomainFunction": "such-a-weird-url",
},
mockDependencies: func(t *testing.T, ctrl *gomock.Controller, c *RequestDrivenWebService) {
addons := mockAddons{}
c.wkld.addons = addons
},
wantedError: errors.New(`convert custom resource "CustomDomainFunction" url: cannot parse S3 URL such-a-weird-url into bucket name and key`),
},
}
for name, tc := range testCases {
t.Run(name, func(t *testing.T) {
// GIVEN
ctrl := gomock.NewController(t)
defer ctrl.Finish()
mft := *testRDWebServiceManifest
if tc.inManifest != nil {
mft = tc.inManifest(mft)
}
conf := &RequestDrivenWebService{
appRunnerWkld: &appRunnerWkld{
wkld: &wkld{
name: testServiceName,
env: testEnvName,
app: testAppName,
rc: RuntimeConfig{
PushedImages: map[string]ECRImage{
"testServiceName": {
RepoURL: testImageRepoURL,
ImageTag: testImageTag,
},
},
ServiceDiscoveryEndpoint: mockSD,
AccountID: "0123456789012",
Region: "us-west-2",
CustomResourcesURL: tc.inCustomResourceURLs,
},
},
healthCheckConfig: mft.HealthCheckConfiguration,
},
manifest: &mft,
}
tc.mockDependencies(t, ctrl, conf)
// WHEN
template, err := conf.Template()
// THEN
if tc.wantedError != nil {
require.EqualError(t, err, tc.wantedError.Error())
require.Equal(t, "", template)
} else {
require.NoError(t, err)
require.Equal(t, tc.wantedTemplate, template)
}
})
}
}
func TestRequestDrivenWebService_Parameters(t *testing.T) {
testCases := map[string]struct {
imageConfig manifest.ImageWithPort
instanceConfig manifest.AppRunnerInstanceConfig
wantedParams []*cloudformation.Parameter
wantedError error
}{
"all required fields specified": {
imageConfig: manifest.ImageWithPort{
Image: manifest.Image{
ImageLocationOrBuild: manifest.ImageLocationOrBuild{
Location: aws.String("public.ecr.aws/aws-containers/hello-app-runner:latest"),
},
},
Port: aws.Uint16(80),
},
instanceConfig: manifest.AppRunnerInstanceConfig{
CPU: aws.Int(1024),
Memory: aws.Int(1024),
},
wantedParams: []*cloudformation.Parameter{{
ParameterKey: aws.String("AppName"),
ParameterValue: aws.String("phonetool"),
}, {
ParameterKey: aws.String("EnvName"),
ParameterValue: aws.String("test"),
}, {
ParameterKey: aws.String("WorkloadName"),
ParameterValue: aws.String("frontend"),
}, {
ParameterKey: aws.String("ContainerImage"),
ParameterValue: aws.String("public.ecr.aws/aws-containers/hello-app-runner:latest"),
}, {
ParameterKey: aws.String("AddonsTemplateURL"),
ParameterValue: aws.String(""),
}, {
ParameterKey: aws.String(RDWkldImageRepositoryType),
ParameterValue: aws.String("ECR_PUBLIC"),
}, {
ParameterKey: aws.String(WorkloadContainerPortParamKey),
ParameterValue: aws.String("80"),
}, {
ParameterKey: aws.String(RDWkldInstanceCPUParamKey),
ParameterValue: aws.String("1024"),
}, {
ParameterKey: aws.String(RDWkldInstanceMemoryParamKey),
ParameterValue: aws.String("1024"),
}},
},
"error when port unspecified": {
imageConfig: manifest.ImageWithPort{
Image: manifest.Image{
ImageLocationOrBuild: manifest.ImageLocationOrBuild{
Location: aws.String("public.ecr.aws/aws-containers/hello-app-runner:latest"),
},
},
},
instanceConfig: manifest.AppRunnerInstanceConfig{
CPU: aws.Int(1024),
Memory: aws.Int(1024),
},
wantedError: errors.New("field `image.port` is required for Request Driven Web Services"),
},
"error when CPU unspecified": {
imageConfig: manifest.ImageWithPort{
Port: aws.Uint16(80),
Image: manifest.Image{
ImageLocationOrBuild: manifest.ImageLocationOrBuild{
Location: aws.String("public.ecr.aws/aws-containers/hello-app-runner:latest"),
},
},
},
instanceConfig: manifest.AppRunnerInstanceConfig{
Memory: aws.Int(1024),
},
wantedError: errors.New("field `cpu` is required for Request Driven Web Services"),
},
"error when memory unspecified": {
imageConfig: manifest.ImageWithPort{
Port: aws.Uint16(80),
Image: manifest.Image{
ImageLocationOrBuild: manifest.ImageLocationOrBuild{
Location: aws.String("public.ecr.aws/aws-containers/hello-app-runner:latest"),
},
},
},
instanceConfig: manifest.AppRunnerInstanceConfig{
CPU: aws.Int(1024),
},
wantedError: errors.New("field `memory` is required for Request Driven Web Services"),
},
}
for name, tc := range testCases {
t.Run(name, func(t *testing.T) {
c := &RequestDrivenWebService{
appRunnerWkld: &appRunnerWkld{
wkld: &wkld{
name: aws.StringValue(testRDWebServiceManifest.Name),
env: testEnvName,
app: testAppName,
image: tc.imageConfig.Image,
},
instanceConfig: tc.instanceConfig,
imageConfig: tc.imageConfig,
},
manifest: testRDWebServiceManifest,
}
p, err := c.Parameters()
if tc.wantedError != nil {
require.EqualError(t, err, tc.wantedError.Error())
} else {
require.NoError(t, err)
require.Equal(t, tc.wantedParams, p)
}
})
}
}
func TestRequestDrivenWebService_SerializedParameters(t *testing.T) {
c := &RequestDrivenWebService{
appRunnerWkld: &appRunnerWkld{
wkld: &wkld{
name: aws.StringValue(testRDWebServiceManifest.Name),
env: testEnvName,
app: testAppName,
rc: RuntimeConfig{
PushedImages: map[string]ECRImage{
aws.StringValue(testRDWebServiceManifest.Name): {
RepoURL: testImageRepoURL,
ImageTag: testImageTag,
},
},
},
},
instanceConfig: testRDWebServiceManifest.InstanceConfig,
imageConfig: testRDWebServiceManifest.ImageConfig,
},
manifest: testRDWebServiceManifest,
}
params, err := c.SerializedParameters()
require.NoError(t, err)
require.Equal(t, params, `{
"Parameters": {
"AddonsTemplateURL": "",
"AppName": "phonetool",
"ContainerImage": "111111111111.dkr.ecr.us-west-2.amazonaws.com/phonetool/frontend:manual-bf3678c",
"ContainerPort": "80",
"EnvName": "test",
"ImageRepositoryType": "ECR",
"InstanceCPU": "256",
"InstanceMemory": "512",
"WorkloadName": "frontend"
},
"Tags": {
"copilot-application": "phonetool",
"copilot-environment": "test",
"copilot-service": "frontend"
}
}`)
}
| 533 |
copilot-cli | aws | Go | // Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
// SPDX-License-Identifier: Apache-2.0
package stack
import (
"errors"
"fmt"
"regexp"
"strings"
"time"
"unicode"
"github.com/aws/aws-sdk-go/aws"
"github.com/aws/aws-sdk-go/service/cloudformation"
"github.com/aws/copilot-cli/internal/pkg/config"
"github.com/aws/copilot-cli/internal/pkg/deploy/upload/customresource"
"github.com/aws/copilot-cli/internal/pkg/manifest"
"github.com/aws/copilot-cli/internal/pkg/manifest/manifestinfo"
"github.com/aws/copilot-cli/internal/pkg/template"
"github.com/aws/copilot-cli/internal/pkg/template/override"
"github.com/robfig/cron/v3"
)
// Parameter logical IDs for a scheduled job
const (
ScheduledJobScheduleParamKey = "Schedule"
)
// ScheduledJob represents the configuration needed to create a Cloudformation stack from a
// scheduled job manfiest.
type ScheduledJob struct {
*ecsWkld
manifest *manifest.ScheduledJob
parser scheduledJobReadParser
}
var (
fmtRateScheduleExpression = "rate(%d %s)" // rate({duration} {units})
fmtCronScheduleExpression = "cron(%s)"
awsScheduleRegexp = regexp.MustCompile(`((?:rate|cron)\(.*\)|none)`) // Validates that an expression is of the form rate(xyz) or cron(abc) or value 'none'
)
const (
// Cron expressions in AWS Cloudwatch are of the form "M H DoM Mo DoW Y"
// We use these predefined schedules when a customer specifies "@daily" or "@annually"
// to fulfill the predefined schedules spec defined at
// https://godoc.org/github.com/robfig/cron#hdr-Predefined_schedules
// AWS requires that cron expressions use a ? wildcard for either DoM or DoW
// so we represent that here.
// M H mD Mo wD Y
cronHourly = "0 * * * ? *" // at minute 0
cronDaily = "0 0 * * ? *" // at midnight
cronWeekly = "0 0 ? * 1 *" // at midnight on sunday
cronMonthly = "0 0 1 * ? *" // at midnight on the first of the month
cronYearly = "0 0 1 1 ? *" // at midnight on January 1
)
const (
hourly = "@hourly"
daily = "@daily"
midnight = "@midnight"
weekly = "@weekly"
monthly = "@monthly"
yearly = "@yearly"
annually = "@annually"
every = "@every "
)
type errScheduleInvalid struct {
reason error
}
func (e errScheduleInvalid) Error() string {
return fmt.Sprintf("schedule is not valid cron, rate, or preset: %v", e.reason)
}
type errDurationInvalid struct {
reason error
}
func (e errDurationInvalid) Error() string {
return fmt.Sprintf("parse duration: %v", e.reason)
}
// ScheduledJobConfig contains data required to initialize a scheduled job stack.
type ScheduledJobConfig struct {
App *config.Application
Env string
Manifest *manifest.ScheduledJob
ArtifactBucketName string
RawManifest []byte
RuntimeConfig RuntimeConfig
Addons NestedStackConfigurer
}
// NewScheduledJob creates a new ScheduledJob stack from a manifest file.
func NewScheduledJob(cfg ScheduledJobConfig) (*ScheduledJob, error) {
crs, err := customresource.ScheduledJob(fs)
if err != nil {
return nil, fmt.Errorf("scheduled job custom resources: %w", err)
}
cfg.RuntimeConfig.loadCustomResourceURLs(cfg.ArtifactBucketName, uploadableCRs(crs).convert())
return &ScheduledJob{
ecsWkld: &ecsWkld{
wkld: &wkld{
name: aws.StringValue(cfg.Manifest.Name),
env: cfg.Env,
app: cfg.App.Name,
permBound: cfg.App.PermissionsBoundary,
artifactBucketName: cfg.ArtifactBucketName,
rc: cfg.RuntimeConfig,
image: cfg.Manifest.ImageConfig.Image,
rawManifest: cfg.RawManifest,
parser: fs,
addons: cfg.Addons,
},
sidecars: cfg.Manifest.Sidecars,
logging: cfg.Manifest.Logging,
tc: cfg.Manifest.TaskConfig,
taskDefOverrideFunc: override.CloudFormationTemplate,
},
manifest: cfg.Manifest,
parser: fs,
}, nil
}
// Template returns the CloudFormation template for the scheduled job.
func (j *ScheduledJob) Template() (string, error) {
addonsParams, err := j.addonsParameters()
if err != nil {
return "", err
}
addonsOutputs, err := j.addonsOutputs()
if err != nil {
return "", err
}
exposedPorts, err := j.manifest.ExposedPorts()
if err != nil {
return "", fmt.Errorf("parse exposed ports in service manifest %s: %w", j.name, err)
}
sidecars, err := convertSidecars(j.manifest.Sidecars, exposedPorts.PortsForContainer, j.rc)
if err != nil {
return "", fmt.Errorf("convert the sidecar configuration for job %s: %w", j.name, err)
}
publishers, err := convertPublish(j.manifest.Publish(), j.rc.AccountID, j.rc.Region, j.app, j.env, j.name)
if err != nil {
return "", fmt.Errorf(`convert "publish" field for job %s: %w`, j.name, err)
}
schedule, err := j.awsSchedule()
if err != nil {
return "", fmt.Errorf("convert schedule for job %s: %w", j.name, err)
}
stateMachine, err := j.stateMachineOpts()
if err != nil {
return "", fmt.Errorf("convert retry/timeout config for job %s: %w", j.name, err)
}
crs, err := convertCustomResources(j.rc.CustomResourcesURL)
if err != nil {
return "", err
}
entrypoint, err := convertEntryPoint(j.manifest.EntryPoint)
if err != nil {
return "", err
}
command, err := convertCommand(j.manifest.Command)
if err != nil {
return "", err
}
content, err := j.parser.ParseScheduledJob(template.WorkloadOpts{
SerializedManifest: string(j.rawManifest),
Variables: convertEnvVars(j.manifest.Variables),
Secrets: convertSecrets(j.manifest.Secrets),
WorkloadType: manifestinfo.ScheduledJobType,
NestedStack: addonsOutputs,
AddonsExtraParams: addonsParams,
Sidecars: sidecars,
ScheduleExpression: schedule,
StateMachine: stateMachine,
HealthCheck: convertContainerHealthCheck(j.manifest.ImageConfig.HealthCheck),
LogConfig: convertLogging(j.manifest.Logging),
DockerLabels: j.manifest.ImageConfig.Image.DockerLabels,
Storage: convertStorageOpts(j.manifest.Name, j.manifest.Storage),
Network: convertNetworkConfig(j.manifest.Network),
EntryPoint: entrypoint,
Command: command,
DependsOn: convertDependsOn(j.manifest.ImageConfig.Image.DependsOn),
CredentialsParameter: aws.StringValue(j.manifest.ImageConfig.Image.Credentials),
ServiceDiscoveryEndpoint: j.rc.ServiceDiscoveryEndpoint,
Publish: publishers,
Platform: convertPlatform(j.manifest.Platform),
EnvVersion: j.rc.EnvVersion,
CustomResources: crs,
PermissionsBoundary: j.permBound,
})
if err != nil {
return "", fmt.Errorf("parse scheduled job template: %w", err)
}
overriddenTpl, err := j.taskDefOverrideFunc(convertTaskDefOverrideRules(j.manifest.TaskDefOverrides), content.Bytes())
if err != nil {
return "", fmt.Errorf("apply task definition overrides: %w", err)
}
return string(overriddenTpl), nil
}
// Parameters returns the list of CloudFormation parameters used by the template.
func (j *ScheduledJob) Parameters() ([]*cloudformation.Parameter, error) {
wkldParams, err := j.ecsWkld.Parameters()
if err != nil {
return nil, err
}
schedule, err := j.awsSchedule()
if err != nil {
return nil, err
}
return append(wkldParams, []*cloudformation.Parameter{
{
ParameterKey: aws.String(ScheduledJobScheduleParamKey),
ParameterValue: aws.String(schedule),
},
}...), nil
}
// SerializedParameters returns the CloudFormation stack's parameters serialized to a JSON document.
func (j *ScheduledJob) SerializedParameters() (string, error) {
return serializeTemplateConfig(j.wkld.parser, j)
}
// awsSchedule converts the Schedule string to the format required by Cloudwatch Events
// https://docs.aws.amazon.com/lambda/latest/dg/services-cloudwatchevents-expressions.html
// Cron expressions must have an sixth "year" field, and must contain at least one ? (either-or)
// in either day-of-month or day-of-week.
// Day-of-week expressions are zero-indexed in Golang but one-indexed in AWS.
// @every cron definition strings are converted to rates.
// All others become cron expressions.
// Exception is made for strings of the form "rate( )" or "cron( )". These are accepted as-is and
// validated server-side by CloudFormation.
func (j *ScheduledJob) awsSchedule() (string, error) {
schedule := aws.StringValue(j.manifest.On.Schedule)
if schedule == "" {
return "", fmt.Errorf(`missing required field "schedule" in manifest for job %s`, j.name)
}
// If the schedule uses default CloudWatch Events syntax, pass it through for server-side validation.
if match := awsScheduleRegexp.FindStringSubmatch(schedule); match != nil {
return aws.StringValue(j.manifest.On.Schedule), nil
}
// Try parsing the string as a cron expression to validate it.
if _, err := cron.ParseStandard(schedule); err != nil {
return "", errScheduleInvalid{reason: err}
}
var scheduleExpression string
var err error
switch {
case strings.HasPrefix(schedule, every):
scheduleExpression, err = toRate(schedule[len(every):])
if err != nil {
return "", fmt.Errorf("parse fixed interval: %w", err)
}
case strings.HasPrefix(schedule, "@"):
scheduleExpression, err = toFixedSchedule(schedule)
if err != nil {
return "", fmt.Errorf("parse preset schedule: %w", err)
}
case schedule == "none":
scheduleExpression = schedule // Keep expression as "none" when the job is disabled.
default:
scheduleExpression, err = toAWSCron(schedule)
if err != nil {
return "", fmt.Errorf("parse cron schedule: %w", err)
}
}
return scheduleExpression, nil
}
// toRate converts a cron "@every" directive to a rate expression defined in minutes.
// example input: @every 1h30m
//
// output: rate(90 minutes)
func toRate(duration string) (string, error) {
d, err := time.ParseDuration(duration)
if err != nil {
return "", errDurationInvalid{reason: err}
}
// Check that rates are not specified in units smaller than minutes
if d != d.Truncate(time.Minute) {
return "", fmt.Errorf("duration must be a whole number of minutes or hours")
}
if d < time.Minute*1 {
return "", errors.New("duration must be greater than or equal to 1 minute")
}
minutes := int(d.Minutes())
if minutes == 1 {
return fmt.Sprintf(fmtRateScheduleExpression, minutes, "minute"), nil
}
return fmt.Sprintf(fmtRateScheduleExpression, minutes, "minutes"), nil
}
// toFixedSchedule converts cron predefined schedules into AWS-flavored cron expressions.
// (https://godoc.org/github.com/robfig/cron#hdr-Predefined_schedules)
// Example input: @daily
//
// output: cron(0 0 * * ? *)
// input: @annually
// output: cron(0 0 1 1 ? *)
func toFixedSchedule(schedule string) (string, error) {
switch {
case strings.HasPrefix(schedule, hourly):
return fmt.Sprintf(fmtCronScheduleExpression, cronHourly), nil
case strings.HasPrefix(schedule, midnight):
fallthrough
case strings.HasPrefix(schedule, daily):
return fmt.Sprintf(fmtCronScheduleExpression, cronDaily), nil
case strings.HasPrefix(schedule, weekly):
return fmt.Sprintf(fmtCronScheduleExpression, cronWeekly), nil
case strings.HasPrefix(schedule, monthly):
return fmt.Sprintf(fmtCronScheduleExpression, cronMonthly), nil
case strings.HasPrefix(schedule, annually):
fallthrough
case strings.HasPrefix(schedule, yearly):
return fmt.Sprintf(fmtCronScheduleExpression, cronYearly), nil
default:
return "", fmt.Errorf("unrecognized preset schedule %s", schedule)
}
}
func awsCronFieldSpecified(input string) bool {
return !strings.ContainsAny(input, "*?")
}
// toAWSCron converts "standard" 5-element crons into the AWS preferred syntax
// cron(* * * * ? *)
// MIN HOU DOM MON DOW YEA
// EITHER DOM or DOW must be specified as ? (either-or operator)
// BOTH DOM and DOW cannot be specified
// DOW numbers run 1-7, not 0-6
// Example input: 0 9 * * 1-5 (at 9 am, Monday-Friday)
//
// : cron(0 9 ? * 2-6 *) (adds required ? operator, increments DOW to 1-index, adds year)
func toAWSCron(schedule string) (string, error) {
const (
MIN = iota
HOU
DOM
MON
DOW
)
// Split the cron into its components. We can do this because it'll already have been validated.
// Use https://golang.org/pkg/strings/#Fields since it handles consecutive whitespace.
sched := strings.Fields(schedule)
// Check whether the Day of Week and Day of Month fields have a ?
// Possible conversion:
// * * * * * ==> * * * * ?
// 0 9 * * 1 ==> 0 9 ? * 1
// 0 9 1 * * ==> 0 9 1 * ?
switch {
// If both are unspecified, convert DOW to a ? and DOM to *
case !awsCronFieldSpecified(sched[DOM]) && !awsCronFieldSpecified(sched[DOW]):
sched[DOW] = "?"
sched[DOM] = "*"
// If DOM is * or ? and DOW is specified, convert DOM to ?
case !awsCronFieldSpecified(sched[DOM]) && awsCronFieldSpecified(sched[DOW]):
sched[DOM] = "?"
// If DOW is * or ? and DOM is specified, convert DOW to ?
case !awsCronFieldSpecified(sched[DOW]) && awsCronFieldSpecified(sched[DOM]):
sched[DOW] = "?"
// Error if both DOM and DOW are specified
default:
return "", errors.New("cannot specify both DOW and DOM in cron expression")
}
// Increment the DOW by one if specified as a number
// https://play.golang.org/p/_1uxt0zJneb
var newDOW []rune
for _, c := range sched[DOW] {
if unicode.IsDigit(c) {
newDOW = append(newDOW, c+1)
} else {
newDOW = append(newDOW, c)
}
}
// We don't need to use a string builder here because this will only ever have a max of
// about 50 characters (SUN-MON,MON-TUE,TUE-WED,... is the longest possible string here)
sched[DOW] = string(newDOW)
// Add "every year" to 5-element crons to comply with AWS
sched = append(sched, "*")
return fmt.Sprintf(fmtCronScheduleExpression, strings.Join(sched, " ")), nil
}
// StateMachine converts the Timeout and Retries fields to an instance of template.StateMachineOpts
// It also performs basic validations to provide a fast feedback loop to the customer.
func (j *ScheduledJob) stateMachineOpts() (*template.StateMachineOpts, error) {
var timeoutSeconds *int
if inTimeout := aws.StringValue(j.manifest.Timeout); inTimeout != "" {
parsedTimeout, err := time.ParseDuration(inTimeout)
if err != nil {
return nil, errDurationInvalid{reason: err}
}
if parsedTimeout < 1*time.Second {
return nil, errors.New("timeout must be greater than or equal to 1 second")
}
if parsedTimeout != parsedTimeout.Truncate(time.Second) {
return nil, errors.New("timeout must be a whole number of seconds, minutes, or hours")
}
timeoutSeconds = aws.Int(int(parsedTimeout.Seconds()))
}
var retries *int
if inRetries := aws.IntValue(j.manifest.Retries); inRetries != 0 {
if inRetries < 0 {
return nil, errors.New("number of retries cannot be negative")
}
retries = aws.Int(inRetries)
}
return &template.StateMachineOpts{
Timeout: timeoutSeconds,
Retries: retries,
}, nil
}
| 432 |
copilot-cli | aws | Go | //go:build integration || localintegration
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
// SPDX-License-Identifier: Apache-2.0
package stack_test
import (
"fmt"
"os"
"path/filepath"
"testing"
"github.com/aws/aws-sdk-go/aws"
"github.com/aws/aws-sdk-go/aws/session"
"github.com/aws/copilot-cli/internal/pkg/addon"
"github.com/aws/copilot-cli/internal/pkg/config"
"github.com/aws/copilot-cli/internal/pkg/deploy/cloudformation/stack"
"github.com/aws/copilot-cli/internal/pkg/manifest"
"github.com/aws/copilot-cli/internal/pkg/workspace"
"github.com/spf13/afero"
"github.com/stretchr/testify/require"
"gopkg.in/yaml.v3"
)
const (
jobManifestPath = "job-manifest.yml"
jobStackPath = "job-test.stack.yml"
jobParamsPath = "job-test.params.json"
envControllerPath = "custom-resources/env-controller.js"
)
func TestScheduledJob_Template(t *testing.T) {
path := filepath.Join("testdata", "workloads", jobManifestPath)
manifestBytes, err := os.ReadFile(path)
require.NoError(t, err)
mft, err := manifest.UnmarshalWorkload(manifestBytes)
require.NoError(t, err)
envMft, err := mft.ApplyEnv(envName)
require.NoError(t, err)
err = envMft.Validate()
require.NoError(t, err)
err = envMft.Load(session.New())
require.NoError(t, err)
content := envMft.Manifest()
v, ok := content.(*manifest.ScheduledJob)
require.True(t, ok)
// Create in-memory mock file system.
wd, err := os.Getwd()
require.NoError(t, err)
fs := afero.NewMemMapFs()
_ = fs.MkdirAll(fmt.Sprintf("%s/copilot", wd), 0755)
_ = afero.WriteFile(fs, fmt.Sprintf("%s/copilot/.workspace", wd), []byte(fmt.Sprintf("---\napplication: %s", "DavidsApp")), 0644)
require.NoError(t, err)
ws, err := workspace.Use(fs)
require.NoError(t, err)
_, err = addon.ParseFromWorkload(aws.StringValue(v.Name), ws)
var notFound *addon.ErrAddonsNotFound
require.ErrorAs(t, err, ¬Found)
serializer, err := stack.NewScheduledJob(stack.ScheduledJobConfig{
App: &config.Application{
Name: appName,
},
Env: envName,
Manifest: v,
ArtifactBucketName: "bucket",
RuntimeConfig: stack.RuntimeConfig{
ServiceDiscoveryEndpoint: "test.my-app.local",
AccountID: "123456789123",
Region: "us-west-2",
EnvVersion: "v1.42.0",
},
})
tpl, err := serializer.Template()
require.NoError(t, err, "template should render")
t.Run("CF Template should be equal", func(t *testing.T) {
actualBytes := []byte(tpl)
mActual := make(map[interface{}]interface{})
require.NoError(t, yaml.Unmarshal(actualBytes, mActual))
expected, err := os.ReadFile(filepath.Join("testdata", "workloads", jobStackPath))
require.NoError(t, err, "should be able to read expected bytes")
expectedBytes := []byte(expected)
mExpected := make(map[interface{}]interface{})
require.NoError(t, yaml.Unmarshal(expectedBytes, mExpected))
// Cut out zip file from EnvControllerAction
resetCustomResourceLocations(mActual)
compareStackTemplate(t, mExpected, mActual)
})
t.Run("Parameter values should render properly", func(t *testing.T) {
actualParams, err := serializer.SerializedParameters()
require.NoError(t, err)
path := filepath.Join("testdata", "workloads", jobParamsPath)
wantedCFNParamsBytes, err := os.ReadFile(path)
require.NoError(t, err)
require.Equal(t, string(wantedCFNParamsBytes), actualParams)
})
}
| 109 |
copilot-cli | aws | Go | // Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
// SPDX-License-Identifier: Apache-2.0
package stack
import (
"bytes"
"errors"
"fmt"
"testing"
"github.com/aws/aws-sdk-go/aws"
"github.com/aws/aws-sdk-go/service/cloudformation"
"github.com/aws/copilot-cli/internal/pkg/addon"
"github.com/aws/copilot-cli/internal/pkg/deploy/cloudformation/stack/mocks"
"github.com/aws/copilot-cli/internal/pkg/manifest"
"github.com/aws/copilot-cli/internal/pkg/manifest/manifestinfo"
"github.com/aws/copilot-cli/internal/pkg/template"
"github.com/golang/mock/gomock"
"github.com/stretchr/testify/require"
)
// mockAddons is declared in lb_web_svc_test.go
const (
testJobAppName = "cuteoverload"
testJobEnvName = "test"
testJobImageRepoURL = "123456789012.dkr.ecr.us-west-2.amazonaws.com/cuteoverload/mailer"
testJobImageTag = "stable"
)
func TestScheduledJob_Template(t *testing.T) {
testScheduledJobManifest := manifest.NewScheduledJob(&manifest.ScheduledJobProps{
WorkloadProps: &manifest.WorkloadProps{
Name: "mailer",
Dockerfile: "mailer/Dockerfile",
},
Schedule: "@daily",
Timeout: "1h30m",
Retries: 3,
})
testScheduledJobManifest.EntryPoint = manifest.EntryPointOverride{
String: nil,
StringSlice: []string{"/bin/echo", "hello"},
}
testScheduledJobManifest.Command = manifest.CommandOverride{
String: nil,
StringSlice: []string{"world"},
}
testScheduledJobManifest.Network.VPC.Placement = manifest.PlacementArgOrString{
PlacementArgs: manifest.PlacementArgs{
Subnets: manifest.SubnetListOrArgs{
IDs: []string{"id1", "id2"},
},
},
}
testCases := map[string]struct {
mockDependencies func(t *testing.T, ctrl *gomock.Controller, j *ScheduledJob)
wantedTemplate string
wantedError error
}{
"render template without addons successfully": {
mockDependencies: func(t *testing.T, ctrl *gomock.Controller, j *ScheduledJob) {
m := mocks.NewMockscheduledJobReadParser(ctrl)
m.EXPECT().ParseScheduledJob(gomock.Any()).DoAndReturn(func(actual template.WorkloadOpts) (*template.Content, error) {
require.Equal(t, template.WorkloadOpts{
WorkloadType: manifestinfo.ScheduledJobType,
ScheduleExpression: "cron(0 0 * * ? *)",
StateMachine: &template.StateMachineOpts{
Timeout: aws.Int(5400),
Retries: aws.Int(3),
},
Network: template.NetworkOpts{
AssignPublicIP: template.DisablePublicIP,
SubnetIDs: []string{"id1", "id2"},
SecurityGroups: []template.SecurityGroup{},
},
EntryPoint: []string{"/bin/echo", "hello"},
Command: []string{"world"},
CustomResources: make(map[string]template.S3ObjectLocation),
}, actual)
return &template.Content{Buffer: bytes.NewBufferString("template")}, nil
})
addons := mockAddons{}
j.parser = m
j.wkld.addons = addons
},
wantedTemplate: "template",
},
"render template with addons": {
mockDependencies: func(t *testing.T, ctrl *gomock.Controller, j *ScheduledJob) {
m := mocks.NewMockscheduledJobReadParser(ctrl)
m.EXPECT().ParseScheduledJob(gomock.Any()).DoAndReturn(func(actual template.WorkloadOpts) (*template.Content, error) {
require.Equal(t, template.WorkloadOpts{
WorkloadType: manifestinfo.ScheduledJobType,
NestedStack: &template.WorkloadNestedStackOpts{
StackName: addon.StackName,
VariableOutputs: []string{"Hello"},
SecretOutputs: []string{"MySecretArn"},
PolicyOutputs: []string{"AdditionalResourcesPolicyArn"},
},
AddonsExtraParams: `ServiceName: !GetAtt Service.Name
DiscoveryServiceArn: !GetAtt DiscoveryService.Arn`,
ScheduleExpression: "cron(0 0 * * ? *)",
StateMachine: &template.StateMachineOpts{
Timeout: aws.Int(5400),
Retries: aws.Int(3),
},
Network: template.NetworkOpts{
AssignPublicIP: template.DisablePublicIP,
SubnetIDs: []string{"id1", "id2"},
SecurityGroups: []template.SecurityGroup{},
},
EntryPoint: []string{"/bin/echo", "hello"},
Command: []string{"world"},
CustomResources: make(map[string]template.S3ObjectLocation),
}, actual)
return &template.Content{Buffer: bytes.NewBufferString("template")}, nil
})
addons := mockAddons{
tpl: `Resources:
AdditionalResourcesPolicy:
Type: AWS::IAM::ManagedPolicy
Properties:
PolicyDocument:
Statement:
- Effect: Allow
Action: '*'
Resource: '*'
MySecret:
Type: AWS::SecretsManager::Secret
Properties:
Description: 'This is my rds instance secret'
GenerateSecretString:
SecretStringTemplate: '{"username": "admin"}'
GenerateStringKey: 'password'
PasswordLength: 16
ExcludeCharacters: '"@/\'
Outputs:
AdditionalResourcesPolicyArn:
Value: !Ref AdditionalResourcesPolicy
MySecretArn:
Value: !Ref MySecret
Hello:
Value: hello`,
params: `ServiceName: !GetAtt Service.Name
DiscoveryServiceArn: !GetAtt DiscoveryService.Arn`,
}
j.parser = m
j.wkld.addons = addons
},
wantedTemplate: "template",
},
"error parsing addons": {
mockDependencies: func(t *testing.T, ctrl *gomock.Controller, j *ScheduledJob) {
addons := mockAddons{tplErr: errors.New("some error")}
j.wkld.addons = addons
},
wantedError: fmt.Errorf("generate addons template for %s: %w", aws.StringValue(testScheduledJobManifest.Name), errors.New("some error")),
},
"template parsing error": {
mockDependencies: func(t *testing.T, ctrl *gomock.Controller, j *ScheduledJob) {
m := mocks.NewMockscheduledJobReadParser(ctrl)
m.EXPECT().ParseScheduledJob(gomock.Any()).Return(nil, errors.New("some error"))
addons := mockAddons{}
j.parser = m
j.wkld.addons = addons
},
wantedError: fmt.Errorf("parse scheduled job template: some error"),
},
}
for name, tc := range testCases {
t.Run(name, func(t *testing.T) {
// GIVEN
ctrl := gomock.NewController(t)
defer ctrl.Finish()
conf := &ScheduledJob{
ecsWkld: &ecsWkld{
wkld: &wkld{
name: aws.StringValue(testScheduledJobManifest.Name),
env: testJobEnvName,
app: testJobAppName,
rc: RuntimeConfig{
PushedImages: map[string]ECRImage{
"testServiceName": {
RepoURL: testImageRepoURL,
ImageTag: testImageTag,
},
},
AccountID: "0123456789012",
Region: "us-west-2",
},
},
taskDefOverrideFunc: mockCloudFormationOverrideFunc,
},
manifest: testScheduledJobManifest,
}
tc.mockDependencies(t, ctrl, conf)
// WHEN
template, err := conf.Template()
// THEN
if tc.wantedError != nil {
require.EqualError(t, err, tc.wantedError.Error())
} else {
require.NoError(t, err)
require.Equal(t, tc.wantedTemplate, template)
}
})
}
}
func TestScheduledJob_awsSchedule(t *testing.T) {
testCases := map[string]struct {
inputSchedule string
wantedSchedule string
wantedError error
wantedErrorType interface{}
}{
"simple rate": {
inputSchedule: "@every 1h30m",
wantedSchedule: "rate(90 minutes)",
},
"missing schedule": {
inputSchedule: "",
wantedError: errors.New(`missing required field "schedule" in manifest for job mailer`),
},
"one minute rate": {
inputSchedule: "@every 1m",
wantedSchedule: "rate(1 minute)",
},
"round to minute if using small units": {
inputSchedule: "@every 60000ms",
wantedSchedule: "rate(1 minute)",
},
"malformed rate": {
inputSchedule: "@every 402 seconds",
wantedErrorType: &errScheduleInvalid{},
},
"malformed cron": {
inputSchedule: "every 4m",
wantedErrorType: &errScheduleInvalid{},
},
"correctly converts predefined schedule": {
inputSchedule: "@daily",
wantedSchedule: "cron(0 0 * * ? *)",
},
"unrecognized predefined schedule": {
inputSchedule: "@minutely",
wantedErrorType: &errScheduleInvalid{},
},
"correctly converts cron with all asterisks": {
inputSchedule: "* * * * *",
wantedSchedule: "cron(* * * * ? *)",
},
"correctly converts cron with one ? in DOW": {
inputSchedule: "* * * * ?",
wantedSchedule: "cron(* * * * ? *)",
},
"correctly converts cron with one ? in DOM": {
inputSchedule: "* * ? * *",
wantedSchedule: "cron(* * * * ? *)",
},
"correctly convert two ? in DOW and DOM": {
inputSchedule: "* * ? * ?",
wantedSchedule: "cron(* * * * ? *)",
},
"correctly converts cron with specified DOW": {
inputSchedule: "* * * * MON-FRI",
wantedSchedule: "cron(* * ? * MON-FRI *)",
},
"correctly parse provided ? with DOW": {
inputSchedule: "* * ? * MON",
wantedSchedule: "cron(* * ? * MON *)",
},
"correctly parse provided ? with DOM": {
inputSchedule: "* * 1 * ?",
wantedSchedule: "cron(* * 1 * ? *)",
},
"correctly converts cron with specified DOM": {
inputSchedule: "* * 1 * *",
wantedSchedule: "cron(* * 1 * ? *)",
},
"correctly increments 0-indexed DOW": {
inputSchedule: "* * ? * 2-6",
wantedSchedule: "cron(* * ? * 3-7 *)",
},
"zero-indexed DOW with un?ed DOM": {
inputSchedule: "* * * * 2-6",
wantedSchedule: "cron(* * ? * 3-7 *)",
},
"returns error if both DOM and DOW specified": {
inputSchedule: "* * 1 * SUN",
wantedError: errors.New("parse cron schedule: cannot specify both DOW and DOM in cron expression"),
},
"returns error if fixed interval less than one minute": {
inputSchedule: "@every -5m",
wantedError: errors.New("parse fixed interval: duration must be greater than or equal to 1 minute"),
},
"returns error if fixed interval is 0": {
inputSchedule: "@every 0m",
wantedError: errors.New("parse fixed interval: duration must be greater than or equal to 1 minute"),
},
"error on non-whole-number of minutes": {
inputSchedule: "@every 89s",
wantedError: errors.New("parse fixed interval: duration must be a whole number of minutes or hours"),
},
"error on too many inputs": {
inputSchedule: "* * * * * *",
wantedErrorType: &errScheduleInvalid{},
},
"cron syntax error": {
inputSchedule: "* * * malformed *",
wantedErrorType: &errScheduleInvalid{},
},
"passthrogh AWS flavored cron": {
inputSchedule: "cron(0 * * * ? *)",
wantedSchedule: "cron(0 * * * ? *)",
},
"passthrough AWS flavored rate": {
inputSchedule: "rate(5 minutes)",
wantedSchedule: "rate(5 minutes)",
},
"passthrough 'none' case": {
inputSchedule: "none",
wantedSchedule: "none",
},
}
for name, tc := range testCases {
t.Run(name, func(t *testing.T) {
// GIVEN
job := &ScheduledJob{
ecsWkld: &ecsWkld{
wkld: &wkld{
name: "mailer",
},
},
manifest: &manifest.ScheduledJob{
ScheduledJobConfig: manifest.ScheduledJobConfig{
On: manifest.JobTriggerConfig{
Schedule: aws.String(tc.inputSchedule),
},
},
},
}
// WHEN
parsedSchedule, err := job.awsSchedule()
// THEN
if tc.wantedErrorType != nil {
ok := errors.As(err, &tc.wantedErrorType)
require.True(t, ok)
require.NotEmpty(t, tc.wantedErrorType)
} else if tc.wantedError != nil {
require.EqualError(t, err, tc.wantedError.Error())
} else {
require.NoError(t, err)
require.Equal(t, tc.wantedSchedule, parsedSchedule)
}
})
}
}
func TestScheduledJob_stateMachine(t *testing.T) {
testCases := map[string]struct {
inputTimeout string
inputRetries int
wantedConfig template.StateMachineOpts
wantedError error
wantedErrorType interface{}
}{
"timeout and retries": {
inputTimeout: "3h",
inputRetries: 5,
wantedConfig: template.StateMachineOpts{
Timeout: aws.Int(10800),
Retries: aws.Int(5),
},
},
"just timeout": {
inputTimeout: "1h",
wantedConfig: template.StateMachineOpts{
Timeout: aws.Int(3600),
Retries: nil,
},
},
"just retries": {
inputRetries: 2,
wantedConfig: template.StateMachineOpts{
Timeout: nil,
Retries: aws.Int(2),
},
},
"negative retries": {
inputRetries: -4,
wantedError: errors.New("number of retries cannot be negative"),
},
"timeout too small": {
inputTimeout: "500ms",
wantedError: errors.New("timeout must be greater than or equal to 1 second"),
},
"invalid timeout": {
inputTimeout: "5 hours",
wantedErrorType: &errDurationInvalid{},
},
"timeout non-integer number of seconds": {
inputTimeout: "1s40ms",
wantedError: errors.New("timeout must be a whole number of seconds, minutes, or hours"),
},
}
for name, tc := range testCases {
t.Run(name, func(t *testing.T) {
// GIVEN
job := &ScheduledJob{
ecsWkld: &ecsWkld{
wkld: &wkld{
name: "mailer",
},
},
manifest: &manifest.ScheduledJob{
ScheduledJobConfig: manifest.ScheduledJobConfig{
JobFailureHandlerConfig: manifest.JobFailureHandlerConfig{
Retries: aws.Int(tc.inputRetries),
Timeout: aws.String(tc.inputTimeout),
},
},
},
}
// WHEN
parsedStateMachine, err := job.stateMachineOpts()
// THEN
if tc.wantedError != nil {
require.EqualError(t, err, tc.wantedError.Error())
} else if tc.wantedErrorType != nil {
require.True(t, errors.As(err, tc.wantedErrorType))
} else {
require.NoError(t, err)
require.Equal(t, aws.IntValue(tc.wantedConfig.Retries), aws.IntValue(parsedStateMachine.Retries))
require.Equal(t, aws.IntValue(tc.wantedConfig.Timeout), aws.IntValue(parsedStateMachine.Timeout))
}
})
}
}
func TestScheduledJob_Parameters(t *testing.T) {
baseProps := &manifest.ScheduledJobProps{
WorkloadProps: &manifest.WorkloadProps{
Name: "frontend",
Dockerfile: "frontend/Dockerfile",
},
Schedule: "@daily",
}
testScheduledJobManifest := manifest.NewScheduledJob(baseProps)
testScheduledJobManifest.Count = manifest.Count{
Value: aws.Int(1),
}
expectedParams := []*cloudformation.Parameter{
{
ParameterKey: aws.String(WorkloadAppNameParamKey),
ParameterValue: aws.String("phonetool"),
},
{
ParameterKey: aws.String(WorkloadEnvNameParamKey),
ParameterValue: aws.String("test"),
},
{
ParameterKey: aws.String(WorkloadNameParamKey),
ParameterValue: aws.String("frontend"),
},
{
ParameterKey: aws.String(WorkloadContainerImageParamKey),
ParameterValue: aws.String("111111111111.dkr.ecr.us-west-2.amazonaws.com/phonetool/frontend:manual-bf3678c"),
},
{
ParameterKey: aws.String(WorkloadTaskCPUParamKey),
ParameterValue: aws.String("256"),
},
{
ParameterKey: aws.String(WorkloadTaskMemoryParamKey),
ParameterValue: aws.String("512"),
},
{
ParameterKey: aws.String(WorkloadTaskCountParamKey),
ParameterValue: aws.String("1"),
},
{
ParameterKey: aws.String(WorkloadLogRetentionParamKey),
ParameterValue: aws.String("30"),
},
{
ParameterKey: aws.String(WorkloadAddonsTemplateURLParamKey),
ParameterValue: aws.String(""),
},
{
ParameterKey: aws.String(WorkloadEnvFileARNParamKey),
ParameterValue: aws.String(""),
},
{
ParameterKey: aws.String(ScheduledJobScheduleParamKey),
ParameterValue: aws.String("cron(0 0 * * ? *)"),
},
}
testCases := map[string]struct {
httpsEnabled bool
manifest *manifest.ScheduledJob
expectedParams []*cloudformation.Parameter
expectedErr error
}{
"renders all parameters": {
manifest: testScheduledJobManifest,
expectedParams: expectedParams,
},
}
for name, tc := range testCases {
t.Run(name, func(t *testing.T) {
// GIVEN
conf := &ScheduledJob{
ecsWkld: &ecsWkld{
wkld: &wkld{
name: aws.StringValue(tc.manifest.Name),
env: testEnvName,
app: testAppName,
rc: RuntimeConfig{
PushedImages: map[string]ECRImage{
"frontend": {
RepoURL: testImageRepoURL,
ImageTag: testImageTag,
},
},
},
},
tc: tc.manifest.TaskConfig,
},
manifest: tc.manifest,
}
// WHEN
params, err := conf.Parameters()
// THEN
if err == nil {
require.ElementsMatch(t, tc.expectedParams, params)
} else {
require.EqualError(t, tc.expectedErr, err.Error())
}
})
}
}
func TestScheduledJob_SerializedParameters(t *testing.T) {
testScheduledJobManifest := manifest.NewScheduledJob(&manifest.ScheduledJobProps{
WorkloadProps: &manifest.WorkloadProps{
Name: "mailer",
Dockerfile: "mailer/Dockerfile",
},
Schedule: "@daily",
Timeout: "1h30m",
Retries: 3,
})
c := &ScheduledJob{
ecsWkld: &ecsWkld{
wkld: &wkld{
name: aws.StringValue(testScheduledJobManifest.Name),
env: testEnvName,
app: testAppName,
rc: RuntimeConfig{
PushedImages: map[string]ECRImage{
aws.StringValue(testScheduledJobManifest.Name): {
RepoURL: testImageRepoURL,
ImageTag: testImageTag,
},
},
AdditionalTags: map[string]string{
"owner": "boss",
},
},
},
tc: testScheduledJobManifest.TaskConfig,
},
manifest: testScheduledJobManifest,
}
params, err := c.SerializedParameters()
require.NoError(t, err)
require.Equal(t, params, `{
"Parameters": {
"AddonsTemplateURL": "",
"AppName": "phonetool",
"ContainerImage": "111111111111.dkr.ecr.us-west-2.amazonaws.com/phonetool/frontend:manual-bf3678c",
"EnvFileARN": "",
"EnvName": "test",
"LogRetention": "30",
"Schedule": "cron(0 0 * * ? *)",
"TaskCPU": "256",
"TaskCount": "1",
"TaskMemory": "512",
"WorkloadName": "mailer"
},
"Tags": {
"copilot-application": "phonetool",
"copilot-environment": "test",
"copilot-service": "mailer",
"owner": "boss"
}
}`)
}
| 611 |
copilot-cli | aws | Go | //go:build integration || localintegration
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
// SPDX-License-Identifier: Apache-2.0
package stack_test
import (
"fmt"
"os"
"path/filepath"
"testing"
"github.com/aws/aws-sdk-go/aws"
"github.com/aws/copilot-cli/internal/pkg/addon"
"github.com/aws/copilot-cli/internal/pkg/config"
"github.com/aws/copilot-cli/internal/pkg/deploy/cloudformation/stack"
"github.com/aws/copilot-cli/internal/pkg/manifest"
"github.com/aws/copilot-cli/internal/pkg/workspace"
"github.com/spf13/afero"
"github.com/stretchr/testify/require"
)
const (
autoScalingManifestPath = "manifest.yml"
appName = "my-app"
imageURL = "mockImageURL"
imageTag = "latest"
)
var envName = "test"
func Test_Stack_Local_Integration(t *testing.T) {
const (
wantedAutoScalingCFNTemplatePath = "autoscaling-svc-cf.yml"
wantedAutoScalingCFNParameterPath = "cf.params.json"
wantedOverrideCFNTemplatePath = "override-cf.yml"
)
path := filepath.Join("testdata", "stacklocal", autoScalingManifestPath)
wantedManifestBytes, err := os.ReadFile(path)
require.NoError(t, err)
mft, err := manifest.UnmarshalWorkload(wantedManifestBytes)
require.NoError(t, err)
content := mft.Manifest()
v, ok := content.(*manifest.LoadBalancedWebService)
require.Equal(t, ok, true)
// Create in-memory mock file system.
wd, err := os.Getwd()
require.NoError(t, err)
fs := afero.NewMemMapFs()
_ = fs.MkdirAll(fmt.Sprintf("%s/copilot", wd), 0755)
_ = afero.WriteFile(fs, fmt.Sprintf("%s/copilot/.workspace", wd), []byte(fmt.Sprintf("---\napplication: %s", "DavidsApp")), 0644)
require.NoError(t, err)
ws, err := workspace.Use(fs)
require.NoError(t, err)
_, err = addon.ParseFromWorkload(aws.StringValue(v.Name), ws)
var notFound *addon.ErrAddonsNotFound
require.ErrorAs(t, err, ¬Found)
envConfig := &manifest.Environment{
Workload: manifest.Workload{
Name: &envName,
},
}
envConfig.HTTPConfig.Public.Certificates = []string{"mockCertARN"}
serializer, err := stack.NewLoadBalancedWebService(stack.LoadBalancedWebServiceConfig{
App: &config.Application{Name: appName},
EnvManifest: envConfig,
Manifest: v,
ArtifactBucketName: "bucket",
RuntimeConfig: stack.RuntimeConfig{
PushedImages: map[string]stack.ECRImage{
aws.StringValue(v.Name): {
RepoURL: imageURL,
ImageTag: imageTag,
},
},
EnvVersion: "v1.42.0",
},
})
require.NoError(t, err)
tpl, err := serializer.Template()
require.NoError(t, err)
t.Run("CloudFormation template must contain autoscaling resources", func(t *testing.T) {
path := filepath.Join("testdata", "stacklocal", wantedAutoScalingCFNTemplatePath)
wantedCFNBytes, err := os.ReadFile(path)
require.NoError(t, err)
require.Contains(t, tpl, string(wantedCFNBytes))
})
t.Run("CloudFormation template must be overridden correctly", func(t *testing.T) {
path := filepath.Join("testdata", "stacklocal", wantedOverrideCFNTemplatePath)
wantedCFNBytes, err := os.ReadFile(path)
require.NoError(t, err)
require.Contains(t, tpl, string(wantedCFNBytes))
})
t.Run("CloudFormation template parameter values must match", func(t *testing.T) {
params, err := serializer.SerializedParameters()
require.NoError(t, err)
path := filepath.Join("testdata", "stacklocal", wantedAutoScalingCFNParameterPath)
wantedCFNParamsBytes, err := os.ReadFile(path)
require.NoError(t, err)
require.Equal(t, params, string(wantedCFNParamsBytes))
})
}
| 118 |
copilot-cli | aws | Go | // Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
// SPDX-License-Identifier: Apache-2.0
package stack
import (
"fmt"
"github.com/aws/aws-sdk-go/aws"
"github.com/aws/aws-sdk-go/service/cloudformation"
"github.com/aws/copilot-cli/internal/pkg/aws/s3"
"github.com/aws/copilot-cli/internal/pkg/config"
"github.com/aws/copilot-cli/internal/pkg/deploy"
"github.com/aws/copilot-cli/internal/pkg/deploy/upload/customresource"
"github.com/aws/copilot-cli/internal/pkg/manifest"
"github.com/aws/copilot-cli/internal/pkg/manifest/manifestinfo"
"github.com/aws/copilot-cli/internal/pkg/template"
)
// StaticSite represents the configuration needed to create a CloudFormation stack from a static site service manifest.
type StaticSite struct {
*wkld
manifest *manifest.StaticSite
dnsDelegationEnabled bool
appInfo deploy.AppInformation
parser staticSiteReadParser
assetMappingURL string
}
// StaticSiteConfig contains fields to configure StaticSite.
type StaticSiteConfig struct {
App *config.Application
EnvManifest *manifest.Environment
Manifest *manifest.StaticSite
RawManifest []byte // Content of the manifest file without any transformations.
RuntimeConfig RuntimeConfig
RootUserARN string
ArtifactBucketName string
Addons NestedStackConfigurer
AssetMappingURL string
}
// NewStaticSite creates a new CFN stack from a manifest file, given the options.
func NewStaticSite(cfg *StaticSiteConfig) (*StaticSite, error) {
crs, err := customresource.StaticSite(fs)
if err != nil {
return nil, fmt.Errorf("static site custom resources: %w", err)
}
cfg.RuntimeConfig.loadCustomResourceURLs(cfg.ArtifactBucketName, uploadableCRs(crs).convert())
var dnsDelegationEnabled bool
var appInfo deploy.AppInformation
if cfg.App.Domain != "" {
dnsDelegationEnabled = true
appInfo = deploy.AppInformation{
Name: cfg.App.Name,
Domain: cfg.App.Domain,
AccountPrincipalARN: cfg.RootUserARN,
}
}
return &StaticSite{
wkld: &wkld{
name: aws.StringValue(cfg.Manifest.Name),
env: aws.StringValue(cfg.EnvManifest.Name),
app: cfg.App.Name,
permBound: cfg.App.PermissionsBoundary,
artifactBucketName: cfg.ArtifactBucketName,
rc: cfg.RuntimeConfig,
rawManifest: cfg.RawManifest,
parser: fs,
addons: cfg.Addons,
},
manifest: cfg.Manifest,
dnsDelegationEnabled: dnsDelegationEnabled,
appInfo: appInfo,
parser: fs,
assetMappingURL: cfg.AssetMappingURL,
}, nil
}
// Template returns the CloudFormation template for the service parametrized for the environment.
func (s *StaticSite) Template() (string, error) {
crs, err := convertCustomResources(s.rc.CustomResourcesURL)
if err != nil {
return "", err
}
addonsParams, err := s.addonsParameters()
if err != nil {
return "", err
}
addonsOutputs, err := s.addonsOutputs()
if err != nil {
return "", err
}
var bucket, path string
if s.assetMappingURL != "" {
bucket, path, err = s3.ParseURL(s.assetMappingURL)
if err != nil {
return "", err
}
}
dnsDelegationRole, dnsName := convertAppInformation(s.appInfo)
content, err := s.parser.ParseStaticSite(template.WorkloadOpts{
// Workload parameters.
AppName: s.app,
EnvName: s.env,
EnvVersion: s.rc.EnvVersion,
SerializedManifest: string(s.rawManifest),
WorkloadName: s.name,
WorkloadType: manifestinfo.StaticSiteType,
// Additional options that are common between **all** workload templates.
AddonsExtraParams: addonsParams,
NestedStack: addonsOutputs,
PermissionsBoundary: s.permBound,
// Custom Resource Config.
CustomResources: crs,
AppDNSName: dnsName,
AppDNSDelegationRole: dnsDelegationRole,
AssetMappingFileBucket: bucket,
AssetMappingFilePath: path,
StaticSiteAlias: s.manifest.HTTP.Alias,
})
if err != nil {
return "", err
}
return content.String(), nil
}
// Parameters returns the list of CloudFormation parameters used by the template.
func (s *StaticSite) Parameters() ([]*cloudformation.Parameter, error) {
return []*cloudformation.Parameter{
{
ParameterKey: aws.String(WorkloadAppNameParamKey),
ParameterValue: aws.String(s.app),
},
{
ParameterKey: aws.String(WorkloadEnvNameParamKey),
ParameterValue: aws.String(s.env),
},
{
ParameterKey: aws.String(WorkloadNameParamKey),
ParameterValue: aws.String(s.name),
},
{
ParameterKey: aws.String(WorkloadAddonsTemplateURLParamKey),
ParameterValue: aws.String(s.rc.AddonsTemplateURL),
},
}, nil
}
// SerializedParameters returns the CloudFormation stack's parameters serialized to a JSON document.
func (s *StaticSite) SerializedParameters() (string, error) {
return serializeTemplateConfig(s.wkld.parser, s)
}
| 160 |
copilot-cli | aws | Go | //go:build integration || localintegration
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
// SPDX-License-Identifier: Apache-2.0
package stack_test
import (
"encoding/json"
"os"
"path/filepath"
"testing"
"github.com/aws/copilot-cli/internal/pkg/config"
"github.com/aws/copilot-cli/internal/pkg/deploy/cloudformation/stack"
"github.com/aws/copilot-cli/internal/pkg/manifest"
"github.com/golang/mock/gomock"
"github.com/stretchr/testify/require"
"gopkg.in/yaml.v3"
)
func TestStaticSiteService_TemplateAndParamsGeneration(t *testing.T) {
const (
appName = "my-app"
)
envName := "my-env"
testDir := filepath.Join("testdata", "workloads")
tests := map[string]struct {
ManifestPath string
TemplatePath string
ParamsPath string
EnvImportedCertARNs []string
}{
"simple": {
ManifestPath: filepath.Join(testDir, "static-site-manifest.yml"),
TemplatePath: filepath.Join(testDir, "static-site.stack.yml"),
ParamsPath: filepath.Join(testDir, "static-site.params.json"),
},
}
// run tests
for name, tc := range tests {
t.Run(name, func(t *testing.T) {
ctrl := gomock.NewController(t)
defer ctrl.Finish()
// parse files
manifestBytes, err := os.ReadFile(tc.ManifestPath)
require.NoError(t, err)
tmplBytes, err := os.ReadFile(tc.TemplatePath)
require.NoError(t, err)
paramsBytes, err := os.ReadFile(tc.ParamsPath)
require.NoError(t, err)
dynamicMft, err := manifest.UnmarshalWorkload([]byte(manifestBytes))
require.NoError(t, err)
require.NoError(t, dynamicMft.Validate())
mft := dynamicMft.Manifest()
envConfig := &manifest.Environment{
Workload: manifest.Workload{
Name: &envName,
},
}
serializer, err := stack.NewStaticSite(&stack.StaticSiteConfig{
App: &config.Application{
Name: appName,
Domain: "example.com",
},
EnvManifest: envConfig,
Manifest: mft.(*manifest.StaticSite),
RuntimeConfig: stack.RuntimeConfig{
EnvVersion: "v1.42.0",
Region: "us-west-2",
},
ArtifactBucketName: "bucket",
AssetMappingURL: "s3://stackset-bucket/mappingfile",
RootUserARN: "arn:aws:iam::123456789123:root",
})
require.NoError(t, err)
// validate generated template
tmpl, err := serializer.Template()
require.NoError(t, err)
var actualTmpl map[any]any
require.NoError(t, yaml.Unmarshal([]byte(tmpl), &actualTmpl))
resetCustomResourceLocations(actualTmpl)
var expectedTmpl map[any]any
require.NoError(t, yaml.Unmarshal(tmplBytes, &expectedTmpl))
compareStackTemplate(t, expectedTmpl, actualTmpl)
// validate generated params
params, err := serializer.SerializedParameters()
require.NoError(t, err)
var actualParams map[string]any
require.NoError(t, json.Unmarshal([]byte(params), &actualParams))
var expectedParams map[string]any
require.NoError(t, json.Unmarshal(paramsBytes, &expectedParams))
require.Equal(t, expectedParams, actualParams, "param mismatch")
})
}
}
| 107 |
copilot-cli | aws | Go | // Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
// SPDX-License-Identifier: Apache-2.0
package stack
import (
"errors"
"testing"
"github.com/aws/copilot-cli/internal/pkg/config"
"github.com/aws/copilot-cli/internal/pkg/deploy"
"github.com/aws/copilot-cli/internal/pkg/deploy/cloudformation/stack/mocks"
"github.com/aws/copilot-cli/internal/pkg/manifest/manifestinfo"
"github.com/aws/copilot-cli/internal/pkg/template/templatetest"
"github.com/golang/mock/gomock"
"github.com/aws/aws-sdk-go/aws"
"github.com/aws/aws-sdk-go/service/cloudformation"
"github.com/aws/copilot-cli/internal/pkg/manifest"
"github.com/stretchr/testify/require"
)
var testStaticSiteManifest = &manifest.StaticSite{
Workload: manifest.Workload{
Name: aws.String(testServiceName),
Type: aws.String(manifestinfo.StaticSiteType),
},
}
func TestStaticSite_NewStaticSite(t *testing.T) {
t.Cleanup(func() {
fs = realEmbedFS
})
fs = templatetest.Stub{}
type testInput struct {
mft *manifest.StaticSite
env string
rc RuntimeConfig
app string
urls map[string]string
}
testCases := map[string]struct {
input testInput
mockDependencies func(t *testing.T, ctrl *gomock.Controller, c *RequestDrivenWebService)
wantedStack *StaticSite
wantedError error
}{
"should return StaticSite": {
input: testInput{
mft: testStaticSiteManifest,
env: testEnvName,
rc: RuntimeConfig{
Region: "us-west-2",
},
app: testAppName,
urls: map[string]string{
"custom-domain-app-runner": "mockURL1",
"aws-sdk-layer": "mockURL2",
},
},
wantedStack: &StaticSite{
wkld: &wkld{
name: aws.StringValue(testStaticSiteManifest.Name),
env: testEnvName,
app: testAppName,
rc: RuntimeConfig{
CustomResourcesURL: map[string]string{
"CertificateValidationFunction": "https://mockBucket.s3.us-west-2.amazonaws.com/manual/scripts/custom-resources/certificatevalidationfunction/8932747ba5dbff619d89b92d0033ef1d04f7dd1b055e073254907d4e38e3976d.zip",
"CustomDomainFunction": "https://mockBucket.s3.us-west-2.amazonaws.com/manual/scripts/custom-resources/customdomainfunction/8932747ba5dbff619d89b92d0033ef1d04f7dd1b055e073254907d4e38e3976d.zip",
"TriggerStateMachineFunction": "https://mockBucket.s3.us-west-2.amazonaws.com/manual/scripts/custom-resources/triggerstatemachinefunction/8932747ba5dbff619d89b92d0033ef1d04f7dd1b055e073254907d4e38e3976d.zip",
},
Region: "us-west-2",
},
},
manifest: testStaticSiteManifest,
appInfo: deploy.AppInformation{
Name: testAppName,
},
},
},
}
for name, tc := range testCases {
t.Run(name, func(t *testing.T) {
ctrl := gomock.NewController(t)
defer ctrl.Finish()
addons := mocks.NewMockNestedStackConfigurer(ctrl)
stack, err := NewStaticSite(&StaticSiteConfig{
EnvManifest: &manifest.Environment{
Workload: manifest.Workload{
Name: &tc.input.env,
},
},
App: &config.Application{
Name: tc.input.app,
},
Manifest: tc.input.mft,
RuntimeConfig: tc.input.rc,
ArtifactBucketName: "mockBucket",
Addons: addons,
})
require.Equal(t, tc.wantedError, err)
require.Equal(t, tc.wantedStack.name, stack.name)
require.Equal(t, tc.wantedStack.env, stack.env)
require.Equal(t, tc.wantedStack.app, stack.app)
require.Equal(t, tc.wantedStack.rc, stack.rc)
require.Equal(t, tc.wantedStack.image, stack.image)
require.Equal(t, tc.wantedStack.manifest, stack.manifest)
require.NotNil(t, stack.addons)
})
}
}
func TestStaticSite_Template(t *testing.T) {
t.Cleanup(func() {
fs = realEmbedFS
})
fs = templatetest.Stub{}
t.Run("returns a wrapped error when addons template parsing fails", func(t *testing.T) {
// GIVEN
static, err := NewStaticSite(&StaticSiteConfig{
App: &config.Application{},
EnvManifest: &manifest.Environment{},
Manifest: &manifest.StaticSite{
Workload: manifest.Workload{
Name: aws.String("frontend"),
},
},
ArtifactBucketName: "mockBucket",
RuntimeConfig: RuntimeConfig{
Region: "us-west-2",
},
Addons: mockAddons{tplErr: errors.New("some error")},
})
require.NoError(t, err)
// WHEN
_, err = static.Template()
// THEN
require.EqualError(t, err, "generate addons template for frontend: some error")
})
t.Run("returns a wrapped error when addons parameter parsing fails", func(t *testing.T) {
// GIVEN
static, err := NewStaticSite(&StaticSiteConfig{
App: &config.Application{},
EnvManifest: &manifest.Environment{},
Manifest: &manifest.StaticSite{
Workload: manifest.Workload{
Name: aws.String("frontend"),
},
},
ArtifactBucketName: "mockBucket",
RuntimeConfig: RuntimeConfig{
Region: "us-west-2",
},
Addons: mockAddons{paramsErr: errors.New("some error")},
})
require.NoError(t, err)
// WHEN
_, err = static.Template()
// THEN
require.EqualError(t, err, "parse addons parameters for frontend: some error")
})
t.Run("returns a wrapped error when asset mapping url is invalid", func(t *testing.T) {
// GIVEN
addons := mockAddons{
tpl: `
Resources:
AdditionalResourcesPolicy:
Type: AWS::IAM::ManagedPolicy
Outputs:
AdditionalResourcesPolicyArn:
Value: hello`,
}
static, err := NewStaticSite(&StaticSiteConfig{
App: &config.Application{},
EnvManifest: &manifest.Environment{},
Manifest: &manifest.StaticSite{},
Addons: addons,
ArtifactBucketName: "mockBucket",
RuntimeConfig: RuntimeConfig{
Region: "us-west-2",
},
AssetMappingURL: "notAnS3URL",
})
require.NoError(t, err)
// WHEN
_, err = static.Template()
// THEN
require.EqualError(t, err, "cannot parse S3 URL notAnS3URL into bucket name and key")
})
t.Run("returns the error when parsing the service template fails", func(t *testing.T) {
// GIVEN
ctrl := gomock.NewController(t)
defer ctrl.Finish()
parser := mocks.NewMockstaticSiteReadParser(ctrl)
parser.EXPECT().ParseStaticSite(gomock.Any()).Return(nil, errors.New("some error"))
addons := mockAddons{
tpl: `
Resources:
AdditionalResourcesPolicy:
Type: AWS::IAM::ManagedPolicy
Outputs:
AdditionalResourcesPolicyArn:
Value: hello`,
}
static, err := NewStaticSite(&StaticSiteConfig{
App: &config.Application{},
EnvManifest: &manifest.Environment{},
Manifest: &manifest.StaticSite{},
Addons: addons,
ArtifactBucketName: "mockBucket",
RuntimeConfig: RuntimeConfig{
Region: "us-west-2",
},
AssetMappingURL: "s3://bucket/path/to/file",
})
static.parser = parser
require.NoError(t, err)
// WHEN
_, err = static.Template()
// THEN
require.EqualError(t, err, "some error")
})
}
func TestStaticSite_Parameters(t *testing.T) {
t.Cleanup(func() {
fs = realEmbedFS
})
fs = templatetest.Stub{}
testCases := map[string]struct {
expectedParams []*cloudformation.Parameter
expectedErr error
}{
"HTTPS Enabled": {
expectedParams: []*cloudformation.Parameter{
{
ParameterKey: aws.String(WorkloadAppNameParamKey),
ParameterValue: aws.String("phonetool"),
},
{
ParameterKey: aws.String(WorkloadEnvNameParamKey),
ParameterValue: aws.String("test"),
},
{
ParameterKey: aws.String(WorkloadNameParamKey),
ParameterValue: aws.String("frontend"),
},
{
ParameterKey: aws.String(WorkloadAddonsTemplateURLParamKey),
ParameterValue: aws.String("mockURL"),
},
},
},
}
for name, tc := range testCases {
t.Run(name, func(t *testing.T) {
testManifest := manifest.NewStaticSite(manifest.StaticSiteProps{
Name: "frontend",
})
// GIVEN
conf, err := NewStaticSite(&StaticSiteConfig{
App: &config.Application{
Name: testAppName,
},
RuntimeConfig: RuntimeConfig{
AddonsTemplateURL: "mockURL",
},
EnvManifest: &manifest.Environment{
Workload: manifest.Workload{
Name: aws.String(testEnvName),
},
},
Manifest: testManifest,
})
require.NoError(t, err)
// WHEN
params, err := conf.Parameters()
// THEN
if err == nil {
require.ElementsMatch(t, tc.expectedParams, params)
} else {
require.EqualError(t, tc.expectedErr, err.Error())
}
})
}
}
func TestStaticSite_SerializedParameters(t *testing.T) {
t.Cleanup(func() {
fs = realEmbedFS
})
fs = templatetest.Stub{}
c, _ := NewStaticSite(&StaticSiteConfig{
EnvManifest: &manifest.Environment{
Workload: manifest.Workload{
Name: aws.String(testEnvName),
},
},
App: &config.Application{
Name: testAppName,
},
Manifest: testStaticSiteManifest,
RuntimeConfig: RuntimeConfig{
AdditionalTags: map[string]string{
"owner": "copilot",
},
},
})
params, err := c.SerializedParameters()
require.NoError(t, err)
require.Equal(t, params, `{
"Parameters": {
"AddonsTemplateURL": "",
"AppName": "phonetool",
"EnvName": "test",
"WorkloadName": "frontend"
},
"Tags": {
"copilot-application": "phonetool",
"copilot-environment": "test",
"copilot-service": "frontend",
"owner": "copilot"
}
}`)
}
| 349 |
copilot-cli | aws | Go | // Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
// SPDX-License-Identifier: Apache-2.0
package stack
import (
"sort"
"github.com/aws/aws-sdk-go/aws"
"github.com/aws/aws-sdk-go/service/cloudformation"
"github.com/aws/copilot-cli/internal/pkg/aws/tags"
)
func mergeAndFlattenTags(additionalTags map[string]string, cliTags map[string]string) []*cloudformation.Tag {
var flatTags []*cloudformation.Tag
for k, v := range tags.Merge(additionalTags, cliTags) {
flatTags = append(flatTags, &cloudformation.Tag{
Key: aws.String(k),
Value: aws.String(v),
})
}
sort.SliceStable(flatTags, func(i, j int) bool { return aws.StringValue(flatTags[i].Key) < aws.StringValue(flatTags[j].Key) })
return flatTags
}
| 25 |
copilot-cli | aws | Go | // Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
// SPDX-License-Identifier: Apache-2.0
package stack
import (
"fmt"
"strconv"
"strings"
"github.com/aws/copilot-cli/internal/pkg/deploy"
"github.com/aws/copilot-cli/internal/pkg/template"
"github.com/aws/aws-sdk-go/aws"
"github.com/aws/aws-sdk-go/service/cloudformation"
)
const (
taskTemplatePath = "task/cf.yml"
taskNameParamKey = "TaskName"
taskCPUParamKey = "TaskCPU"
taskMemoryParamKey = "TaskMemory"
taskLogRetentionParamKey = "LogRetention"
taskContainerImageParamKey = "ContainerImage"
taskTaskRoleParamKey = "TaskRole"
taskCommandParamKey = "Command"
taskEntryPointParamKey = "EntryPoint"
taskEnvFileARNParamKey = "EnvFileARN"
taskOSParamKey = "OS"
taskArchParamKey = "Arch"
// TaskOutputS3Bucket is the CFN stack output logical ID for a task's S3 bucket.
TaskOutputS3Bucket = "S3Bucket"
taskLogRetentionInDays = "1"
)
type taskStackConfig struct {
*deploy.CreateTaskResourcesInput
parser template.ReadParser
}
// NewTaskStackConfig sets up a struct that provides stack configurations for CloudFormation
// to deploy the task resources stack.
func NewTaskStackConfig(taskOpts *deploy.CreateTaskResourcesInput) *taskStackConfig {
return &taskStackConfig{
CreateTaskResourcesInput: taskOpts,
parser: template.New(),
}
}
// StackName returns the name of the CloudFormation stack for the task.
func (t *taskStackConfig) StackName() string {
return string(NameForTask(t.Name))
}
var cfnFuntion = map[string]interface{}{
"isARN": template.IsARNFunc,
"trimSlashPrefix": template.TrimSlashPrefix,
}
// Template returns the task CloudFormation template.
func (t *taskStackConfig) Template() (string, error) {
content, err := t.parser.Parse(taskTemplatePath, struct {
EnvVars map[string]string
SSMParamSecrets map[string]string
SecretsManagerSecrets map[string]string
App string
Env string
ExecutionRole string
PermissionsBoundary string
}{
EnvVars: t.EnvVars,
SSMParamSecrets: t.SSMParamSecrets,
SecretsManagerSecrets: t.SecretsManagerSecrets,
App: t.App,
Env: t.Env,
ExecutionRole: t.ExecutionRole,
PermissionsBoundary: t.PermissionsBoundary,
}, template.WithFuncs(cfnFuntion))
if err != nil {
return "", fmt.Errorf("read template for task stack: %w", err)
}
return content.String(), nil
}
// Parameters returns the parameter values to be passed to the task CloudFormation template.
func (t *taskStackConfig) Parameters() ([]*cloudformation.Parameter, error) {
return []*cloudformation.Parameter{
{
ParameterKey: aws.String(taskNameParamKey),
ParameterValue: aws.String(t.Name),
},
{
ParameterKey: aws.String(taskCPUParamKey),
ParameterValue: aws.String(strconv.Itoa(t.CPU)),
},
{
ParameterKey: aws.String(taskMemoryParamKey),
ParameterValue: aws.String(strconv.Itoa(t.Memory)),
},
{
ParameterKey: aws.String(taskLogRetentionParamKey),
ParameterValue: aws.String(taskLogRetentionInDays),
},
{
ParameterKey: aws.String(taskContainerImageParamKey),
ParameterValue: aws.String(t.Image),
},
{
ParameterKey: aws.String(taskTaskRoleParamKey),
ParameterValue: aws.String(t.TaskRole),
},
{
ParameterKey: aws.String(taskCommandParamKey),
ParameterValue: aws.String(strings.Join(t.Command, ",")),
},
{
ParameterKey: aws.String(taskEntryPointParamKey),
ParameterValue: aws.String(strings.Join(t.EntryPoint, ",")),
},
{
ParameterKey: aws.String(taskEnvFileARNParamKey),
ParameterValue: aws.String(t.EnvFileARN),
},
{
ParameterKey: aws.String(taskOSParamKey),
ParameterValue: aws.String(t.OS),
},
{
ParameterKey: aws.String(taskArchParamKey),
ParameterValue: aws.String(t.Arch),
},
}, nil
}
// SerializedParameters returns the CloudFormation stack's parameters serialized
// to a YAML document annotated with comments for readability to users.
func (s *taskStackConfig) SerializedParameters() (string, error) {
// No-op for now.
return "", nil
}
// Tags returns the tags that should be applied to the task CloudFormation.
func (t *taskStackConfig) Tags() []*cloudformation.Tag {
tags := map[string]string{
deploy.TaskTagKey: t.Name,
}
if t.Env != "" {
tags[deploy.AppTagKey] = t.App
tags[deploy.EnvTagKey] = t.Env
}
return mergeAndFlattenTags(t.AdditionalTags, tags)
}
| 159 |
copilot-cli | aws | Go | // Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
// SPDX-License-Identifier: Apache-2.0
package stack
import (
"bytes"
"errors"
"testing"
"github.com/aws/copilot-cli/internal/pkg/deploy"
"github.com/aws/aws-sdk-go/aws"
"github.com/aws/aws-sdk-go/service/cloudformation"
"github.com/aws/copilot-cli/internal/pkg/template"
"github.com/aws/copilot-cli/internal/pkg/template/mocks"
"github.com/golang/mock/gomock"
"github.com/stretchr/testify/require"
)
const (
testTaskName = "my-task"
)
func TestTaskStackConfig_Template(t *testing.T) {
testCases := map[string]struct {
mockReadParser func(m *mocks.MockReadParser)
wantedTemplate string
wantedError error
}{
"should return error if unable to read": {
mockReadParser: func(m *mocks.MockReadParser) {
m.EXPECT().Parse(taskTemplatePath, gomock.Any(), gomock.Any()).Return(nil, errors.New("error reading template"))
},
wantedError: errors.New("read template for task stack: error reading template"),
},
"should return template body when present": {
mockReadParser: func(m *mocks.MockReadParser) {
m.EXPECT().Parse(taskTemplatePath, gomock.Any(), gomock.Any()).Return(&template.Content{
Buffer: bytes.NewBufferString("This is the task template"),
}, nil)
},
wantedTemplate: "This is the task template",
},
}
for name, tc := range testCases {
t.Run(name, func(t *testing.T) {
ctrl := gomock.NewController(t)
defer ctrl.Finish()
mockReadParser := mocks.NewMockReadParser(ctrl)
if tc.mockReadParser != nil {
tc.mockReadParser(mockReadParser)
}
taskInput := deploy.CreateTaskResourcesInput{}
taskStackConfig := &taskStackConfig{
CreateTaskResourcesInput: &taskInput,
parser: mockReadParser,
}
got, err := taskStackConfig.Template()
if tc.wantedError != nil {
require.EqualError(t, tc.wantedError, err.Error())
} else {
require.Equal(t, tc.wantedTemplate, got)
}
})
}
}
func TestTaskStackConfig_Parameters(t *testing.T) {
expectedParams := []*cloudformation.Parameter{
{
ParameterKey: aws.String(taskNameParamKey),
ParameterValue: aws.String("my-task"),
},
{
ParameterKey: aws.String(taskContainerImageParamKey),
ParameterValue: aws.String("7456.dkr.ecr.us-east-2.amazonaws.com/my-task:0.1"),
},
{
ParameterKey: aws.String(taskCPUParamKey),
ParameterValue: aws.String("256"),
},
{
ParameterKey: aws.String(taskMemoryParamKey),
ParameterValue: aws.String("512"),
},
{
ParameterKey: aws.String(taskLogRetentionParamKey),
ParameterValue: aws.String(taskLogRetentionInDays),
},
{
ParameterKey: aws.String(taskTaskRoleParamKey),
ParameterValue: aws.String("task-role"),
},
{
ParameterKey: aws.String(taskCommandParamKey),
ParameterValue: aws.String("echo hooray"),
},
{
ParameterKey: aws.String(taskEntryPointParamKey),
ParameterValue: aws.String("exec,some command"),
},
{
ParameterKey: aws.String(taskEnvFileARNParamKey),
ParameterValue: aws.String("arn:aws:s3:::somebucket/manual/1638391936/env"),
},
{
ParameterKey: aws.String(taskOSParamKey),
ParameterValue: aws.String(""),
},
{
ParameterKey: aws.String(taskArchParamKey),
ParameterValue: aws.String(""),
},
}
taskInput := deploy.CreateTaskResourcesInput{
Name: "my-task",
CPU: 256,
Memory: 512,
Image: "7456.dkr.ecr.us-east-2.amazonaws.com/my-task:0.1",
TaskRole: "task-role",
EnvFileARN: "arn:aws:s3:::somebucket/manual/1638391936/env",
Command: []string{"echo hooray"},
EntryPoint: []string{"exec", "some command"},
}
task := &taskStackConfig{
CreateTaskResourcesInput: &taskInput,
}
params, _ := task.Parameters()
require.ElementsMatch(t, expectedParams, params)
}
func TestTaskStackConfig_StackName(t *testing.T) {
taskInput := deploy.CreateTaskResourcesInput{
Name: "my-task",
}
task := &taskStackConfig{
CreateTaskResourcesInput: &taskInput,
}
got := task.StackName()
require.Equal(t, got, taskStackPrefix+testTaskName)
}
func TestTaskStackConfig_Tags(t *testing.T) {
testCases := map[string]struct {
input deploy.CreateTaskResourcesInput
expectedTags []*cloudformation.Tag
}{
"with app and env": {
input: deploy.CreateTaskResourcesInput{
Name: "my-task",
App: "my-app",
Env: "test",
},
expectedTags: []*cloudformation.Tag{
{
Key: aws.String(deploy.TaskTagKey),
Value: aws.String("my-task"),
},
{
Key: aws.String(deploy.AppTagKey),
Value: aws.String("my-app"),
},
{
Key: aws.String(deploy.EnvTagKey),
Value: aws.String("test"),
},
},
},
"input without app or env": {
input: deploy.CreateTaskResourcesInput{
Name: "my-task",
Env: "",
},
expectedTags: []*cloudformation.Tag{
{
Key: aws.String(deploy.TaskTagKey),
Value: aws.String("my-task"),
},
},
},
}
for name, tc := range testCases {
t.Run(name, func(t *testing.T) {
taskStackConfig := &taskStackConfig{
CreateTaskResourcesInput: &tc.input,
}
tags := taskStackConfig.Tags()
require.ElementsMatch(t, tc.expectedTags, tags)
})
}
}
| 211 |
copilot-cli | aws | Go | // Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
// SPDX-License-Identifier: Apache-2.0
package stack
import (
"encoding/json"
"fmt"
"hash/crc32"
"sort"
"strconv"
"strings"
"time"
"github.com/aws/copilot-cli/internal/pkg/deploy/upload/customresource"
"github.com/aws/copilot-cli/internal/pkg/aws/partitions"
"github.com/aws/copilot-cli/internal/pkg/deploy"
"github.com/aws/copilot-cli/internal/pkg/template/override"
"github.com/aws/copilot-cli/internal/pkg/aws/s3"
"github.com/aws/aws-sdk-go/aws"
"github.com/aws/copilot-cli/internal/pkg/manifest"
"github.com/aws/copilot-cli/internal/pkg/template"
)
const (
enabled = "ENABLED"
disabled = "DISABLED"
)
// SQS Queue field values.
const (
sqsDedupeScopeMessageGroup = "messageGroup"
sqsFIFOThroughputLimitPerMessageGroupId = "perMessageGroupId"
)
// Default values for EFS options
const (
defaultRootDirectory = "/"
defaultIAM = disabled
defaultReadOnly = true
defaultWritePermission = false
defaultNLBProtocol = manifest.TCP
)
// Supported capacityproviders for Fargate services
const (
capacityProviderFargateSpot = "FARGATE_SPOT"
capacityProviderFargate = "FARGATE"
)
// MinimumHealthyPercent and MaximumPercent configurations as per deployment strategy.
const (
minHealthyPercentRecreate = 0
maxPercentRecreate = 100
minHealthyPercentDefault = 100
maxPercentDefault = 200
)
var (
taskDefOverrideRulePrefixes = []string{"Resources", "TaskDefinition", "Properties"}
subnetPlacementForTemplate = map[manifest.PlacementString]string{
manifest.PrivateSubnetPlacement: template.PrivateSubnetsPlacement,
manifest.PublicSubnetPlacement: template.PublicSubnetsPlacement,
}
)
func convertPortMappings(exposedPorts []manifest.ExposedPort) []*template.PortMapping {
portMapping := make([]*template.PortMapping, len(exposedPorts))
for idx, exposedPort := range exposedPorts {
portMapping[idx] = &template.PortMapping{
ContainerPort: exposedPort.Port,
Protocol: exposedPort.Protocol,
ContainerName: exposedPort.ContainerName,
}
}
return portMapping
}
// convertSidecars converts the manifest sidecar configuration into a format parsable by the templates pkg.
func convertSidecars(s map[string]*manifest.SidecarConfig, exposedPorts map[string][]manifest.ExposedPort, rc RuntimeConfig) ([]*template.SidecarOpts, error) {
var sidecars []*template.SidecarOpts
if s == nil {
return nil, nil
}
// Sort the sidecars so that the order is consistent and the integration test won't be flaky.
keys := make([]string, 0, len(s))
for k := range s {
keys = append(keys, k)
}
sort.Strings(keys)
for _, name := range keys {
config := s[name]
imageURI := rc.PushedImages[name].URI()
if uri, hasLocation := config.ImageURI(); hasLocation {
imageURI = uri
}
entrypoint, err := convertEntryPoint(config.EntryPoint)
if err != nil {
return nil, err
}
command, err := convertCommand(config.Command)
if err != nil {
return nil, err
}
mp := convertSidecarMountPoints(config.MountPoints)
sidecars = append(sidecars, &template.SidecarOpts{
Name: name,
Image: aws.String(imageURI),
Essential: config.Essential,
CredsParam: config.CredsParam,
Secrets: convertSecrets(config.Secrets),
Variables: convertEnvVars(config.Variables),
Storage: template.SidecarStorageOpts{
MountPoints: mp,
},
DockerLabels: config.DockerLabels,
DependsOn: convertDependsOn(config.DependsOn),
EntryPoint: entrypoint,
HealthCheck: convertContainerHealthCheck(config.HealthCheck),
Command: command,
PortMappings: convertPortMappings(exposedPorts[name]),
})
}
return sidecars, nil
}
func convertContainerHealthCheck(hc manifest.ContainerHealthCheck) *template.ContainerHealthCheck {
if hc.IsEmpty() {
return nil
}
// Make sure that unset fields in the healthcheck gets a default value.
hc.ApplyIfNotSet(manifest.NewDefaultContainerHealthCheck())
return &template.ContainerHealthCheck{
Command: hc.Command,
Interval: aws.Int64(int64(hc.Interval.Seconds())),
Retries: aws.Int64(int64(aws.IntValue(hc.Retries))),
StartPeriod: aws.Int64(int64(hc.StartPeriod.Seconds())),
Timeout: aws.Int64(int64(hc.Timeout.Seconds())),
}
}
func convertHostedZone(alias manifest.Alias, defaultHostedZone *string) (template.AliasesForHostedZone, error) {
aliasesFor := make(map[string][]string)
if len(alias.AdvancedAliases) != 0 {
for _, alias := range alias.AdvancedAliases {
if alias.HostedZone != nil {
if isDuplicateAliasEntry(aliasesFor[*alias.HostedZone], aws.StringValue(alias.Alias)) {
continue
}
aliasesFor[*alias.HostedZone] = append(aliasesFor[*alias.HostedZone], *alias.Alias)
continue
}
if defaultHostedZone != nil {
if isDuplicateAliasEntry(aliasesFor[*defaultHostedZone], aws.StringValue(alias.Alias)) {
continue
}
aliasesFor[*defaultHostedZone] = append(aliasesFor[*defaultHostedZone], *alias.Alias)
}
}
return aliasesFor, nil
}
if defaultHostedZone == nil {
return aliasesFor, nil
}
aliases, err := alias.ToStringSlice()
if err != nil {
return nil, err
}
for _, alias := range aliases {
if isDuplicateAliasEntry(aliasesFor[*defaultHostedZone], alias) {
continue
}
aliasesFor[*defaultHostedZone] = append(aliasesFor[*defaultHostedZone], alias)
}
return aliasesFor, nil
}
func isDuplicateAliasEntry(aliasList []string, alias string) bool {
for _, entry := range aliasList {
if entry == alias {
return true
}
}
return false
}
// convertDependsOn converts image and sidecar depends on fields to have upper case statuses.
func convertDependsOn(d manifest.DependsOn) map[string]string {
if d == nil {
return nil
}
dependsOn := make(map[string]string)
for name, status := range d {
dependsOn[name] = strings.ToUpper(status)
}
return dependsOn
}
func convertAdvancedCount(a manifest.AdvancedCount) (*template.AdvancedCount, error) {
if a.IsEmpty() {
return nil, nil
}
autoscaling, err := convertAutoscaling(a)
if err != nil {
return nil, err
}
return &template.AdvancedCount{
Spot: a.Spot,
Autoscaling: autoscaling,
Cps: convertCapacityProviders(a),
}, nil
}
// convertCapacityProviders transforms the manifest fields into a format
// parsable by the templates pkg.
func convertCapacityProviders(a manifest.AdvancedCount) []*template.CapacityProviderStrategy {
if a.Spot == nil && a.Range.RangeConfig.SpotFrom == nil {
return nil
}
var cps []*template.CapacityProviderStrategy
// if Spot specified as count, then weight on Spot CPS should be 1
cps = append(cps, &template.CapacityProviderStrategy{
Weight: aws.Int(1),
CapacityProvider: capacityProviderFargateSpot,
})
rc := a.Range.RangeConfig
// Return if only spot is specified as count
if rc.SpotFrom == nil {
return cps
}
// Scaling with spot
spotFrom := aws.IntValue(rc.SpotFrom)
min := aws.IntValue(rc.Min)
// If spotFrom value is greater than or equal to the autoscaling min,
// then the base value on the Fargate capacity provider must be set
// to one less than spotFrom
if spotFrom >= min {
base := spotFrom - 1
if base < 0 {
base = 0
}
fgCapacity := &template.CapacityProviderStrategy{
Base: aws.Int(base),
Weight: aws.Int(0),
CapacityProvider: capacityProviderFargate,
}
cps = append(cps, fgCapacity)
}
return cps
}
// convertCooldown converts a service manifest cooldown struct into a format parsable
// by the templates pkg.
func convertCooldown(c manifest.Cooldown) template.Cooldown {
if c.IsEmpty() {
return template.Cooldown{}
}
cooldown := template.Cooldown{}
if c.ScaleInCooldown != nil {
scaleInTime := float64(*c.ScaleInCooldown) / float64(time.Second)
cooldown.ScaleInCooldown = aws.Float64(scaleInTime)
}
if c.ScaleOutCooldown != nil {
scaleOutTime := float64(*c.ScaleOutCooldown) / float64(time.Second)
cooldown.ScaleOutCooldown = aws.Float64(scaleOutTime)
}
return cooldown
}
// convertScalingCooldown handles the logic of converting generalized and specific cooldowns set
// into the scaling cooldown used in the Auto Scaling configuration.
func convertScalingCooldown(specCooldown, genCooldown manifest.Cooldown) template.Cooldown {
cooldown := convertCooldown(genCooldown)
specTemplateCooldown := convertCooldown(specCooldown)
if specCooldown.ScaleInCooldown != nil {
cooldown.ScaleInCooldown = specTemplateCooldown.ScaleInCooldown
}
if specCooldown.ScaleOutCooldown != nil {
cooldown.ScaleOutCooldown = specTemplateCooldown.ScaleOutCooldown
}
return cooldown
}
// convertAutoscaling converts the service's Auto Scaling configuration into a format parsable
// by the templates pkg.
func convertAutoscaling(a manifest.AdvancedCount) (*template.AutoscalingOpts, error) {
if a.IsEmpty() {
return nil, nil
}
if a.Spot != nil {
return nil, nil
}
min, max, err := a.Range.Parse()
if err != nil {
return nil, err
}
autoscalingOpts := template.AutoscalingOpts{
MinCapacity: &min,
MaxCapacity: &max,
}
if a.CPU.Value != nil {
autoscalingOpts.CPU = aws.Float64(float64(*a.CPU.Value))
}
if a.CPU.ScalingConfig.Value != nil {
autoscalingOpts.CPU = aws.Float64(float64(*a.CPU.ScalingConfig.Value))
}
if a.Memory.Value != nil {
autoscalingOpts.Memory = aws.Float64(float64(*a.Memory.Value))
}
if a.Memory.ScalingConfig.Value != nil {
autoscalingOpts.Memory = aws.Float64(float64(*a.Memory.ScalingConfig.Value))
}
if a.Requests.Value != nil {
autoscalingOpts.Requests = aws.Float64(float64(*a.Requests.Value))
}
if a.Requests.ScalingConfig.Value != nil {
autoscalingOpts.Requests = aws.Float64(float64(*a.Requests.ScalingConfig.Value))
}
if a.ResponseTime.Value != nil {
responseTime := float64(*a.ResponseTime.Value) / float64(time.Second)
autoscalingOpts.ResponseTime = aws.Float64(responseTime)
}
if a.ResponseTime.ScalingConfig.Value != nil {
responseTime := float64(*a.ResponseTime.ScalingConfig.Value) / float64(time.Second)
autoscalingOpts.ResponseTime = aws.Float64(responseTime)
}
autoscalingOpts.CPUCooldown = convertScalingCooldown(a.CPU.ScalingConfig.Cooldown, a.Cooldown)
autoscalingOpts.MemCooldown = convertScalingCooldown(a.Memory.ScalingConfig.Cooldown, a.Cooldown)
autoscalingOpts.ReqCooldown = convertScalingCooldown(a.Requests.ScalingConfig.Cooldown, a.Cooldown)
autoscalingOpts.RespTimeCooldown = convertScalingCooldown(a.ResponseTime.ScalingConfig.Cooldown, a.Cooldown)
autoscalingOpts.QueueDelayCooldown = convertScalingCooldown(a.QueueScaling.Cooldown, a.Cooldown)
if !a.QueueScaling.IsEmpty() {
acceptableBacklog, err := a.QueueScaling.AcceptableBacklogPerTask()
if err != nil {
return nil, err
}
autoscalingOpts.QueueDelay = &template.AutoscalingQueueDelayOpts{
AcceptableBacklogPerTask: acceptableBacklog,
}
}
return &autoscalingOpts, nil
}
// convertHTTPHealthCheck converts the ALB health check configuration into a format parsable by the templates pkg.
func convertHTTPHealthCheck(hc *manifest.HealthCheckArgsOrString) template.HTTPHealthCheckOpts {
opts := template.HTTPHealthCheckOpts{
HealthCheckPath: manifest.DefaultHealthCheckPath,
GracePeriod: manifest.DefaultHealthCheckGracePeriod,
HealthyThreshold: hc.Advanced.HealthyThreshold,
UnhealthyThreshold: hc.Advanced.UnhealthyThreshold,
SuccessCodes: aws.StringValue(hc.Advanced.SuccessCodes),
}
if hc.IsZero() {
return opts
}
if hc.IsBasic() {
opts.HealthCheckPath = convertPath(hc.Basic)
return opts
}
if hc.Advanced.Path != nil {
opts.HealthCheckPath = convertPath(*hc.Advanced.Path)
}
if hc.Advanced.Port != nil {
opts.Port = strconv.Itoa(aws.IntValue(hc.Advanced.Port))
}
if hc.Advanced.Interval != nil {
opts.Interval = aws.Int64(int64(hc.Advanced.Interval.Seconds()))
}
if hc.Advanced.Timeout != nil {
opts.Timeout = aws.Int64(int64(hc.Advanced.Timeout.Seconds()))
}
if hc.Advanced.GracePeriod != nil {
opts.GracePeriod = int64(hc.Advanced.GracePeriod.Seconds())
}
return opts
}
// convertNLBHealthCheck converts the NLB health check configuration into a format parsable by the templates pkg.
func convertNLBHealthCheck(nlbHC *manifest.NLBHealthCheckArgs) template.NLBHealthCheck {
hc := template.NLBHealthCheck{
HealthyThreshold: nlbHC.HealthyThreshold,
UnhealthyThreshold: nlbHC.UnhealthyThreshold,
GracePeriod: aws.Int64(int64(manifest.DefaultHealthCheckGracePeriod)),
}
if nlbHC.Port != nil {
hc.Port = strconv.Itoa(aws.IntValue(nlbHC.Port))
}
if nlbHC.Timeout != nil {
hc.Timeout = aws.Int64(int64(nlbHC.Timeout.Seconds()))
}
if nlbHC.Interval != nil {
hc.Interval = aws.Int64(int64(nlbHC.Interval.Seconds()))
}
if nlbHC.GracePeriod != nil {
hc.GracePeriod = aws.Int64(int64(nlbHC.GracePeriod.Seconds()))
}
return hc
}
type networkLoadBalancerConfig struct {
settings *template.NetworkLoadBalancer
// If a domain is associated these values are not empty.
appDNSDelegationRole *string
appDNSName *string
}
func convertELBAccessLogsConfig(mft *manifest.Environment) *template.ELBAccessLogs {
elbAccessLogsArgs, isELBAccessLogsSet := mft.ELBAccessLogs()
if !isELBAccessLogsSet {
return nil
}
if elbAccessLogsArgs == nil {
return &template.ELBAccessLogs{}
}
return &template.ELBAccessLogs{
BucketName: aws.StringValue(elbAccessLogsArgs.BucketName),
Prefix: aws.StringValue(elbAccessLogsArgs.Prefix),
}
}
// convertFlowLogsConfig converts the VPC FlowLog configuration into a format parsable by the templates pkg.
func convertFlowLogsConfig(mft *manifest.Environment) (*template.VPCFlowLogs, error) {
vpcFlowLogs := mft.EnvironmentConfig.Network.VPC.FlowLogs
if vpcFlowLogs.IsZero() {
return nil, nil
}
retentionInDays := aws.Int(14)
if vpcFlowLogs.Advanced.Retention != nil {
retentionInDays = vpcFlowLogs.Advanced.Retention
}
return &template.VPCFlowLogs{
Retention: retentionInDays,
}, nil
}
func convertEnvSecurityGroupCfg(mft *manifest.Environment) (*template.SecurityGroupConfig, error) {
securityGroupConfig, isSecurityConfigSet := mft.EnvSecurityGroup()
if !isSecurityConfigSet {
return nil, nil
}
var ingress = make([]template.SecurityGroupRule, len(securityGroupConfig.Ingress))
var egress = make([]template.SecurityGroupRule, len(securityGroupConfig.Egress))
for idx, ingressValue := range securityGroupConfig.Ingress {
ingress[idx].IpProtocol = ingressValue.IpProtocol
ingress[idx].CidrIP = ingressValue.CidrIP
if fromPort, toPort, err := ingressValue.GetPorts(); err != nil {
return nil, err
} else {
ingress[idx].ToPort = toPort
ingress[idx].FromPort = fromPort
}
}
for idx, egressValue := range securityGroupConfig.Egress {
egress[idx].IpProtocol = egressValue.IpProtocol
egress[idx].CidrIP = egressValue.CidrIP
if fromPort, toPort, err := egressValue.GetPorts(); err != nil {
return nil, err
} else {
egress[idx].ToPort = toPort
egress[idx].FromPort = fromPort
}
}
return &template.SecurityGroupConfig{
Ingress: ingress,
Egress: egress,
}, nil
}
func (s *LoadBalancedWebService) convertALBListener() (*template.ALBListener, error) {
rrConfig := s.manifest.HTTPOrBool
if rrConfig.Disabled() || rrConfig.IsEmpty() {
return nil, nil
}
var rules []template.ALBListenerRule
var aliasesFor template.AliasesForHostedZone
for _, routingRule := range rrConfig.RoutingRules() {
httpRedirect := true
if routingRule.RedirectToHTTPS != nil {
httpRedirect = aws.BoolValue(routingRule.RedirectToHTTPS)
}
rule, err := routingRuleConfigConverter{
rule: routingRule,
manifest: s.manifest,
httpsEnabled: s.httpsEnabled,
redirectToHTTPS: httpRedirect,
}.convert()
if err != nil {
return nil, err
}
rules = append(rules, *rule)
aliasesFor, err = convertHostedZone(rrConfig.Main.Alias, rrConfig.Main.HostedZone)
if err != nil {
return nil, err
}
}
return &template.ALBListener{
Rules: rules,
IsHTTPS: s.httpsEnabled,
HostedZoneAliases: aliasesFor,
}, nil
}
func (s *BackendService) convertALBListener() (*template.ALBListener, error) {
rrConfig := s.manifest.HTTP
if rrConfig.IsEmpty() {
return nil, nil
}
var rules []template.ALBListenerRule
var hostedZoneAliases template.AliasesForHostedZone
for _, routingRule := range rrConfig.RoutingRules() {
rule, err := routingRuleConfigConverter{
rule: routingRule,
manifest: s.manifest,
httpsEnabled: s.httpsEnabled,
redirectToHTTPS: s.httpsEnabled,
}.convert()
if err != nil {
return nil, err
}
rules = append(rules, *rule)
hostedZoneAliases, err = convertHostedZone(rrConfig.Main.Alias, rrConfig.Main.HostedZone)
if err != nil {
return nil, err
}
}
return &template.ALBListener{
Rules: rules,
IsHTTPS: s.httpsEnabled,
MainContainerPort: s.manifest.MainContainerPort(),
HostedZoneAliases: hostedZoneAliases,
}, nil
}
func (s *BackendService) convertGracePeriod() *int64 {
if s.manifest.HTTP.Main.HealthCheck.Advanced.GracePeriod != nil {
return aws.Int64(int64(s.manifest.HTTP.Main.HealthCheck.Advanced.GracePeriod.Seconds()))
}
return aws.Int64(int64(manifest.DefaultHealthCheckGracePeriod))
}
type loadBalancerTargeter interface {
MainContainerPort() string
ExposedPorts() (manifest.ExposedPortsIndex, error)
}
type routingRuleConfigConverter struct {
rule manifest.RoutingRule
manifest loadBalancerTargeter
httpsEnabled bool
redirectToHTTPS bool
}
// convertPath attempts to standardize manifest paths on '/path' or '/' patterns.
// - If the path starts with a / (including '/'), return it unmodified.
// - Otherwise, prepend a leading '/' character.
//
// CFN health check and path patterns expect a leading '/', so we do that here instead of in the template.
//
// Empty strings, if they make it to this point, are converted to '/'.
func convertPath(path string) string {
if path == "" {
return "/"
}
if path[0] == '/' {
return path
}
return "/" + path
}
func (conv routingRuleConfigConverter) convert() (*template.ALBListenerRule, error) {
var aliases []string
var err error
exposedPorts, err := conv.manifest.ExposedPorts()
if err != nil {
return nil, err
}
targetContainer, targetPort, err := conv.rule.Target(exposedPorts)
if err != nil {
return nil, err
}
if conv.httpsEnabled {
aliases, err = convertAlias(conv.rule.Alias)
if err != nil {
return nil, err
}
}
config := &template.ALBListenerRule{
Path: convertPath(aws.StringValue(conv.rule.Path)),
TargetContainer: targetContainer,
TargetPort: targetPort,
Aliases: aliases,
HTTPHealthCheck: convertHTTPHealthCheck(&conv.rule.HealthCheck),
AllowedSourceIps: convertAllowedSourceIPs(conv.rule.AllowedSourceIps),
Stickiness: strconv.FormatBool(aws.BoolValue(conv.rule.Stickiness)),
HTTPVersion: aws.StringValue(convertHTTPVersion(conv.rule.ProtocolVersion)),
RedirectToHTTPS: conv.redirectToHTTPS,
DeregistrationDelay: convertDeregistrationDelay(conv.rule.DeregistrationDelay),
}
return config, nil
}
func convertDeregistrationDelay(delay *time.Duration) *int64 {
if delay == nil {
return aws.Int64(int64(manifest.DefaultDeregistrationDelay))
}
return aws.Int64(int64(delay.Seconds()))
}
type nlbListeners []template.NetworkLoadBalancerListener
// isCertRequired returns true if any of the NLB listeners have protocol as TLS set.
func (ls nlbListeners) isCertRequired() bool {
for _, listener := range ls {
if listener.Protocol == manifest.TLS {
return true
}
}
return false
}
func (s *LoadBalancedWebService) convertNetworkLoadBalancer() (networkLoadBalancerConfig, error) {
nlbConfig := s.manifest.NLBConfig
if nlbConfig.IsEmpty() {
return networkLoadBalancerConfig{}, nil
}
exposedPorts, err := s.manifest.ExposedPorts()
if err != nil {
return networkLoadBalancerConfig{}, err
}
listeners := make(nlbListeners, len(nlbConfig.NLBListeners()))
for idx, listener := range nlbConfig.NLBListeners() {
// Parse targetContainer and targetPort for the Network Load Balancer targets.
targetContainer, targetPort, err := listener.Target(exposedPorts)
if err != nil {
return networkLoadBalancerConfig{}, err
}
// Parse listener port and protocol.
port, protocol, err := manifest.ParsePortMapping(listener.Port)
if err != nil {
return networkLoadBalancerConfig{}, err
}
if protocol == nil {
protocol = aws.String(defaultNLBProtocol)
}
listeners[idx] = template.NetworkLoadBalancerListener{
Port: aws.StringValue(port),
Protocol: strings.ToUpper(aws.StringValue(protocol)),
TargetContainer: targetContainer,
TargetPort: targetPort,
SSLPolicy: listener.SSLPolicy,
HealthCheck: convertNLBHealthCheck(&listener.HealthCheck),
Stickiness: listener.Stickiness,
DeregistrationDelay: convertDeregistrationDelay(listener.DeregistrationDelay),
}
}
aliases, err := convertAlias(nlbConfig.Aliases)
if err != nil {
return networkLoadBalancerConfig{}, fmt.Errorf(`convert "nlb.alias" to string slice: %w`, err)
}
config := networkLoadBalancerConfig{
settings: &template.NetworkLoadBalancer{
PublicSubnetCIDRs: s.publicSubnetCIDRBlocks,
Listener: listeners,
Aliases: aliases,
MainContainerPort: s.manifest.MainContainerPort(),
CertificateRequired: listeners.isCertRequired(),
},
}
if s.dnsDelegationEnabled {
dnsDelegationRole, dnsName := convertAppInformation(s.appInfo)
config.appDNSName = dnsName
config.appDNSDelegationRole = dnsDelegationRole
}
return config, nil
}
func (s *LoadBalancedWebService) convertGracePeriod() *int64 {
if s.manifest.HTTPOrBool.Main.HealthCheck.Advanced.GracePeriod != nil {
return aws.Int64(int64(s.manifest.HTTPOrBool.Main.HealthCheck.Advanced.GracePeriod.Seconds()))
}
if s.manifest.NLBConfig.Listener.HealthCheck.GracePeriod != nil {
return aws.Int64(int64(s.manifest.NLBConfig.Listener.HealthCheck.GracePeriod.Seconds()))
}
return aws.Int64(int64(manifest.DefaultHealthCheckGracePeriod))
}
func convertExecuteCommand(e *manifest.ExecuteCommand) *template.ExecuteCommandOpts {
if e.Config.IsEmpty() && !aws.BoolValue(e.Enable) {
return nil
}
return &template.ExecuteCommandOpts{}
}
func convertAllowedSourceIPs(allowedSourceIPs []manifest.IPNet) []string {
var sourceIPs []string
for _, ipNet := range allowedSourceIPs {
sourceIPs = append(sourceIPs, string(ipNet))
}
return sourceIPs
}
func convertServiceConnect(s manifest.ServiceConnectBoolOrArgs) *template.ServiceConnect {
return &template.ServiceConnect{
Alias: s.ServiceConnectArgs.Alias,
}
}
func convertLogging(lc manifest.Logging) *template.LogConfigOpts {
if lc.IsEmpty() {
return nil
}
return &template.LogConfigOpts{
Image: lc.LogImage(),
ConfigFile: lc.ConfigFile,
EnableMetadata: lc.GetEnableMetadata(),
Destination: lc.Destination,
SecretOptions: convertSecrets(lc.SecretOptions),
Variables: convertEnvVars(lc.Variables),
Secrets: convertSecrets(lc.Secrets),
}
}
func convertTaskDefOverrideRules(inRules []manifest.OverrideRule) []override.Rule {
var res []override.Rule
suffixStr := strings.Join(taskDefOverrideRulePrefixes, override.PathSegmentSeparator)
for _, r := range inRules {
res = append(res, override.Rule{
Path: strings.Join([]string{suffixStr, r.Path}, override.PathSegmentSeparator),
Value: r.Value,
})
}
return res
}
// convertStorageOpts converts a manifest Storage field into template data structures which can be used
// to execute CFN templates
func convertStorageOpts(wlName *string, in manifest.Storage) *template.StorageOpts {
if in.IsEmpty() {
return nil
}
return &template.StorageOpts{
Ephemeral: convertEphemeral(in.Ephemeral),
ReadonlyRootFS: in.ReadonlyRootFS,
Volumes: convertVolumes(in.Volumes),
MountPoints: convertMountPoints(in.Volumes),
EFSPerms: convertEFSPermissions(in.Volumes),
ManagedVolumeInfo: convertManagedFSInfo(wlName, in.Volumes),
}
}
func convertEphemeral(in *int) *int {
// Min value for extensible ephemeral storage is 21; if customer specifies 20, which is the default size,
// we shouldn't let CF error out. Instead, we'll just omit it from the config.
if aws.IntValue(in) == 20 {
return nil
}
return in
}
// convertSidecarMountPoints is used to convert from manifest to template objects.
func convertSidecarMountPoints(in []manifest.SidecarMountPoint) []*template.MountPoint {
if len(in) == 0 {
return nil
}
var output []*template.MountPoint
for _, smp := range in {
output = append(output, convertMountPoint(smp.SourceVolume, smp.ContainerPath, smp.ReadOnly))
}
return output
}
func convertMountPoint(sourceVolume, containerPath *string, readOnly *bool) *template.MountPoint {
// readOnly defaults to true.
oReadOnly := aws.Bool(defaultReadOnly)
if readOnly != nil {
oReadOnly = readOnly
}
return &template.MountPoint{
ReadOnly: oReadOnly,
ContainerPath: containerPath,
SourceVolume: sourceVolume,
}
}
func convertMountPoints(input map[string]*manifest.Volume) []*template.MountPoint {
if len(input) == 0 {
return nil
}
var output []*template.MountPoint
for name, volume := range input {
output = append(output, convertMountPoint(aws.String(name), volume.ContainerPath, volume.ReadOnly))
}
return output
}
func convertEFSPermissions(input map[string]*manifest.Volume) []*template.EFSPermission {
var output []*template.EFSPermission
for _, volume := range input {
// If there's no EFS configuration, we don't need to generate any permissions.
if volume.EmptyVolume() {
continue
}
// If EFS is explicitly disabled, we don't need to generate permisisons.
if volume.EFS.Disabled() {
continue
}
// Managed FS permissions are rendered separately in the template.
if volume.EFS.UseManagedFS() {
continue
}
// Write defaults to false.
write := defaultWritePermission
if volume.ReadOnly != nil {
write = !aws.BoolValue(volume.ReadOnly)
}
accessPointID := volume.EFS.Advanced.AuthConfig.AccessPointID
output = append(output, &template.EFSPermission{
Write: write,
AccessPointID: accessPointID,
FilesystemID: volume.EFS.Advanced.FileSystemID,
})
}
return output
}
func convertManagedFSInfo(wlName *string, input map[string]*manifest.Volume) *template.ManagedVolumeCreationInfo {
var output *template.ManagedVolumeCreationInfo
for name, volume := range input {
if volume.EmptyVolume() || !volume.EFS.UseManagedFS() {
continue
}
uid := volume.EFS.Advanced.UID
gid := volume.EFS.Advanced.GID
if uid == nil && gid == nil {
crc := aws.Uint32(getRandomUIDGID(wlName))
uid = crc
gid = crc
}
output = &template.ManagedVolumeCreationInfo{
Name: aws.String(name),
DirName: wlName,
UID: uid,
GID: gid,
}
}
return output
}
// getRandomUIDGID returns the 32-bit checksum of the service name for use as CreationInfo in the EFS Access Point.
// See https://stackoverflow.com/a/14210379/5890422 for discussion of the possibility of collisions in CRC32 with
// small numbers of hashes.
func getRandomUIDGID(name *string) uint32 {
return crc32.ChecksumIEEE([]byte(aws.StringValue(name)))
}
func convertVolumes(input map[string]*manifest.Volume) []*template.Volume {
var output []*template.Volume
for name, volume := range input {
// Volumes can contain either:
// a) an EFS configuration, which must be valid
// b) no EFS configuration, in which case the volume is created using task scratch storage in order to share
// data between containers.
// If EFS is not configured, just add the name to create an empty volume and continue.
if volume.EmptyVolume() {
output = append(
output,
&template.Volume{
Name: aws.String(name),
},
)
continue
}
// If we're using managed EFS, continue.
if volume.EFS.UseManagedFS() {
continue
}
// Convert EFS configuration to template struct.
output = append(
output,
&template.Volume{
Name: aws.String(name),
EFS: convertEFSConfiguration(volume.EFS.Advanced),
},
)
}
return output
}
func convertEFSConfiguration(in manifest.EFSVolumeConfiguration) *template.EFSVolumeConfiguration {
// Set default values correctly.
rootDir := in.RootDirectory
if aws.StringValue(rootDir) == "" {
rootDir = aws.String(defaultRootDirectory)
}
// Set default values for IAM and AccessPointID
iam := aws.String(defaultIAM)
if in.AuthConfig.IsEmpty() {
return &template.EFSVolumeConfiguration{
Filesystem: in.FileSystemID,
RootDirectory: rootDir,
IAM: iam,
}
}
// AuthConfig exists; check the properties.
if aws.BoolValue(in.AuthConfig.IAM) {
iam = aws.String(enabled)
}
return &template.EFSVolumeConfiguration{
Filesystem: in.FileSystemID,
RootDirectory: rootDir,
IAM: iam,
AccessPointID: in.AuthConfig.AccessPointID,
}
}
func convertNetworkConfig(network manifest.NetworkConfig) template.NetworkOpts {
if network.IsEmpty() {
return template.NetworkOpts{
AssignPublicIP: template.EnablePublicIP,
SubnetsType: template.PublicSubnetsPlacement,
}
}
opts := template.NetworkOpts{
AssignPublicIP: template.EnablePublicIP,
SubnetsType: template.PublicSubnetsPlacement,
}
inSGs := network.VPC.SecurityGroups.GetIDs()
outSGs := make([]template.SecurityGroup, len(inSGs))
for i, sg := range inSGs {
if sg.Plain != nil {
outSGs[i] = template.PlainSecurityGroup(aws.StringValue(sg.Plain))
} else {
outSGs[i] = template.ImportedSecurityGroup(aws.StringValue(sg.FromCFN.Name))
}
}
opts.SecurityGroups = outSGs
opts.DenyDefaultSecurityGroup = network.VPC.SecurityGroups.IsDefaultSecurityGroupDenied()
placement := network.VPC.Placement
if placement.IsEmpty() {
return opts
}
if placement.PlacementString != nil {
if *placement.PlacementString == manifest.PrivateSubnetPlacement {
opts.AssignPublicIP = template.DisablePublicIP
}
opts.SubnetsType = subnetPlacementForTemplate[*placement.PlacementString]
return opts
}
opts.AssignPublicIP = template.DisablePublicIP
opts.SubnetsType = ""
opts.SubnetIDs = placement.PlacementArgs.Subnets.IDs
return opts
}
func convertRDWSNetworkConfig(network manifest.RequestDrivenWebServiceNetworkConfig) template.NetworkOpts {
opts := template.NetworkOpts{}
if network.IsEmpty() {
return opts
}
placement := network.VPC.Placement
if placement.IsEmpty() {
return opts
}
if placement.PlacementString != nil {
opts.SubnetsType = subnetPlacementForTemplate[*placement.PlacementString]
return opts
}
opts.SubnetIDs = placement.PlacementArgs.Subnets.IDs
return opts
}
func convertAlias(alias manifest.Alias) ([]string, error) {
out, err := alias.ToStringSlice()
if err != nil {
return nil, fmt.Errorf(`convert "http.alias" to string slice: %w`, err)
}
return out, nil
}
func convertEntryPoint(entrypoint manifest.EntryPointOverride) ([]string, error) {
out, err := entrypoint.ToStringSlice()
if err != nil {
return nil, fmt.Errorf(`convert "entrypoint" to string slice: %w`, err)
}
return out, nil
}
func convertDeploymentControllerConfig(in manifest.DeploymentControllerConfig) template.DeploymentConfigurationOpts {
out := template.DeploymentConfigurationOpts{
MinHealthyPercent: minHealthyPercentDefault,
MaxPercent: maxPercentDefault,
}
if strings.EqualFold(aws.StringValue(in.Rolling), manifest.ECSRecreateRollingUpdateStrategy) {
out.MinHealthyPercent = minHealthyPercentRecreate
out.MaxPercent = maxPercentRecreate
}
return out
}
func convertDeploymentConfig(in manifest.DeploymentConfig) template.DeploymentConfigurationOpts {
out := convertDeploymentControllerConfig(in.DeploymentControllerConfig)
out.Rollback = template.RollingUpdateRollbackConfig{
AlarmNames: in.RollbackAlarms.Basic,
CPUUtilization: in.RollbackAlarms.Advanced.CPUUtilization,
MemoryUtilization: in.RollbackAlarms.Advanced.MemoryUtilization,
}
return out
}
func convertWorkerDeploymentConfig(in manifest.WorkerDeploymentConfig) template.DeploymentConfigurationOpts {
out := convertDeploymentControllerConfig(in.DeploymentControllerConfig)
out.Rollback = template.RollingUpdateRollbackConfig{
AlarmNames: in.WorkerRollbackAlarms.Basic,
CPUUtilization: in.WorkerRollbackAlarms.Advanced.CPUUtilization,
MemoryUtilization: in.WorkerRollbackAlarms.Advanced.MemoryUtilization,
MessagesDelayed: in.WorkerRollbackAlarms.Advanced.MessagesDelayed,
}
return out
}
func convertCommand(command manifest.CommandOverride) ([]string, error) {
out, err := command.ToStringSlice()
if err != nil {
return nil, fmt.Errorf(`convert "command" to string slice: %w`, err)
}
return out, nil
}
func convertPublish(topics []manifest.Topic, accountID, region, app, env, svc string) (*template.PublishOpts, error) {
if len(topics) == 0 {
return nil, nil
}
partition, err := partitions.Region(region).Partition()
if err != nil {
return nil, err
}
var publishers template.PublishOpts
// convert the topics to template Topics
for _, topic := range topics {
var fifoConfig *template.FIFOTopicConfig
if topic.FIFO.IsEnabled() {
fifoConfig = &template.FIFOTopicConfig{}
if !topic.FIFO.Advanced.IsEmpty() {
fifoConfig = &template.FIFOTopicConfig{
ContentBasedDeduplication: topic.FIFO.Advanced.ContentBasedDeduplication,
}
}
}
publishers.Topics = append(publishers.Topics, &template.Topic{
Name: topic.Name,
FIFOTopicConfig: fifoConfig,
AccountID: accountID,
Partition: partition.ID(),
Region: region,
App: app,
Env: env,
Svc: svc,
})
}
return &publishers, nil
}
func convertSubscribe(s *manifest.WorkerService) (*template.SubscribeOpts, error) {
if s.Subscribe.Topics == nil {
return nil, nil
}
var subscriptions template.SubscribeOpts
for _, sb := range s.Subscriptions() {
ts, err := convertTopicSubscription(sb)
if err != nil {
return nil, err
}
subscriptions.Topics = append(subscriptions.Topics, ts)
}
subscriptions.Queue = convertQueue(s.Subscribe.Queue)
return &subscriptions, nil
}
func convertTopicSubscription(t manifest.TopicSubscription) (
*template.TopicSubscription, error) {
filterPolicy, err := convertFilterPolicy(t.FilterPolicy)
if err != nil {
return nil, err
}
if aws.BoolValue(t.Queue.Enabled) {
return &template.TopicSubscription{
Name: t.Name,
Service: t.Service,
Queue: &template.SQSQueue{},
FilterPolicy: filterPolicy,
}, nil
}
return &template.TopicSubscription{
Name: t.Name,
Service: t.Service,
Queue: convertQueue(t.Queue.Advanced),
FilterPolicy: filterPolicy,
}, nil
}
func convertFilterPolicy(filterPolicy map[string]interface{}) (*string, error) {
if len(filterPolicy) == 0 {
return nil, nil
}
bytes, err := json.Marshal(filterPolicy)
if err != nil {
return nil, fmt.Errorf(`convert "filter_policy" to a JSON string: %w`, err)
}
return aws.String(string(bytes)), nil
}
func convertQueue(in manifest.SQSQueue) *template.SQSQueue {
if in.IsEmpty() {
return nil
}
queue := &template.SQSQueue{
Retention: convertRetention(in.Retention),
Delay: convertDelay(in.Delay),
Timeout: convertTimeout(in.Timeout),
DeadLetter: convertDeadLetter(in.DeadLetter),
}
if !in.FIFO.IsEnabled() {
return queue
}
if aws.BoolValue(in.FIFO.Enable) {
queue.FIFOQueueConfig = &template.FIFOQueueConfig{}
return queue
}
if !in.FIFO.Advanced.IsEmpty() {
queue.FIFOQueueConfig = &template.FIFOQueueConfig{
ContentBasedDeduplication: in.FIFO.Advanced.ContentBasedDeduplication,
DeduplicationScope: in.FIFO.Advanced.DeduplicationScope,
FIFOThroughputLimit: in.FIFO.Advanced.FIFOThroughputLimit,
}
if aws.BoolValue(in.FIFO.Advanced.HighThroughputFifo) {
queue.FIFOQueueConfig.FIFOThroughputLimit = aws.String(sqsFIFOThroughputLimitPerMessageGroupId)
queue.FIFOQueueConfig.DeduplicationScope = aws.String(sqsDedupeScopeMessageGroup)
}
}
return queue
}
func convertTime(t *time.Duration) *int64 {
if t == nil {
return nil
}
return aws.Int64(int64(t.Seconds()))
}
func convertRetention(t *time.Duration) *int64 {
return convertTime(t)
}
func convertDelay(t *time.Duration) *int64 {
return convertTime(t)
}
func convertTimeout(t *time.Duration) *int64 {
return convertTime(t)
}
func convertDeadLetter(d manifest.DeadLetterQueue) *template.DeadLetterQueue {
if d.IsEmpty() {
return nil
}
return &template.DeadLetterQueue{
Tries: d.Tries,
}
}
func convertAppInformation(app deploy.AppInformation) (delegationRole *string, domain *string) {
role := app.DNSDelegationRole()
if role != "" {
delegationRole = &role
}
if app.Domain != "" {
domain = &app.Domain
}
return
}
func convertPlatform(platform manifest.PlatformArgsOrString) template.RuntimePlatformOpts {
if platform.IsEmpty() {
return template.RuntimePlatformOpts{}
}
os := template.OSLinux
switch platform.OS() {
case manifest.OSWindows, manifest.OSWindowsServer2019Core:
os = template.OSWindowsServer2019Core
case manifest.OSWindowsServer2019Full:
os = template.OSWindowsServer2019Full
case manifest.OSWindowsServer2022Core:
os = template.OSWindowsServer2022Core
case manifest.OSWindowsServer2022Full:
os = template.OSWindowsServer2022Full
}
arch := template.ArchX86
if manifest.IsArmArch(platform.Arch()) {
arch = template.ArchARM64
}
return template.RuntimePlatformOpts{
OS: os,
Arch: arch,
}
}
func convertHTTPVersion(protocolVersion *string) *string {
if protocolVersion == nil {
return nil
}
pv := strings.ToUpper(*protocolVersion)
return &pv
}
func convertEnvVars(variables map[string]manifest.Variable) map[string]template.Variable {
if len(variables) == 0 {
return nil
}
m := make(map[string]template.Variable, len(variables))
for name, variable := range variables {
if variable.RequiresImport() {
m[name] = template.ImportedVariable(variable.Value())
continue
}
m[name] = template.PlainVariable(variable.Value())
}
return m
}
// convertSecrets converts the manifest Secrets into a format parsable by the templates pkg.
func convertSecrets(secrets map[string]manifest.Secret) map[string]template.Secret {
if len(secrets) == 0 {
return nil
}
m := make(map[string]template.Secret, len(secrets))
var tplSecret template.Secret
for name, mftSecret := range secrets {
switch {
case mftSecret.IsSecretsManagerName():
tplSecret = template.SecretFromSecretsManager(mftSecret.Value())
case mftSecret.RequiresImport():
tplSecret = template.SecretFromImportedSSMOrARN(mftSecret.Value())
default:
tplSecret = template.SecretFromPlainSSMOrARN(mftSecret.Value())
}
m[name] = tplSecret
}
return m
}
func convertCustomResources(urlForFunc map[string]string) (map[string]template.S3ObjectLocation, error) {
out := make(map[string]template.S3ObjectLocation)
for fn, url := range urlForFunc {
bucket, key, err := s3.ParseURL(url)
if err != nil {
return nil, fmt.Errorf("convert custom resource %q url: %w", fn, err)
}
out[fn] = template.S3ObjectLocation{
Bucket: bucket,
Key: key,
}
}
return out, nil
}
type uploadableCRs []*customresource.CustomResource
func (in uploadableCRs) convert() []uploadable {
out := make([]uploadable, len(in))
for i, cr := range in {
out[i] = cr
}
return out
}
| 1,320 |
copilot-cli | aws | Go | // Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
// SPDX-License-Identifier: Apache-2.0
package stack
import (
"errors"
"fmt"
"testing"
"time"
"github.com/aws/aws-sdk-go/aws"
"github.com/aws/copilot-cli/internal/pkg/manifest"
"github.com/aws/copilot-cli/internal/pkg/template"
"github.com/aws/copilot-cli/internal/pkg/template/override"
"github.com/stretchr/testify/require"
"gopkg.in/yaml.v3"
)
func Test_convertSidecar(t *testing.T) {
mockRunTimeConfig := RuntimeConfig{
PushedImages: map[string]ECRImage{
"foo": {
RepoURL: "535307839156.dkr.ecr.us-west-2.amazonaws.com/web",
ImageTag: "v1.0",
Digest: "abcdef",
MainContainerName: "mockMainContainer",
ContainerName: "foo",
},
},
}
mockImage := aws.String(fmt.Sprintf("%s:%s-%s", mockRunTimeConfig.PushedImages["foo"].RepoURL, "foo", mockRunTimeConfig.PushedImages["foo"].ImageTag))
mockMap := map[string]template.Variable{"foo": template.PlainVariable("")}
mockSecrets := map[string]template.Secret{"foo": template.SecretFromPlainSSMOrARN("")}
mockCredsParam := aws.String("mockCredsParam")
mockExposedPorts := map[string][]manifest.ExposedPort{
"foo": {
{
Protocol: "tcp",
ContainerName: "foo",
Port: uint16(2000),
},
},
}
testCases := map[string]struct {
inEssential bool
inLabels map[string]string
inDependsOn map[string]string
inImageOverride manifest.ImageOverride
inHealthCheck manifest.ContainerHealthCheck
circDepContainers []string
wanted *template.SidecarOpts
wantedErr error
}{
"good port without protocol": {
inEssential: true,
wanted: &template.SidecarOpts{
Name: "foo",
CredsParam: mockCredsParam,
Image: mockImage,
Secrets: mockSecrets,
Variables: mockMap,
Essential: aws.Bool(true),
PortMappings: []*template.PortMapping{
{
Protocol: "tcp",
ContainerName: "foo",
ContainerPort: uint16(2000),
},
},
},
},
"good port with protocol": {
inEssential: true,
wanted: &template.SidecarOpts{
Name: "foo",
CredsParam: mockCredsParam,
Image: mockImage,
Secrets: mockSecrets,
Variables: mockMap,
Essential: aws.Bool(true),
PortMappings: []*template.PortMapping{
{
Protocol: "tcp",
ContainerName: "foo",
ContainerPort: uint16(2000),
},
},
},
},
"good container dependencies": {
inEssential: true,
inDependsOn: map[string]string{
"frontend": "start",
},
wanted: &template.SidecarOpts{
Name: "foo",
CredsParam: mockCredsParam,
Image: mockImage,
Secrets: mockSecrets,
Variables: mockMap,
Essential: aws.Bool(true),
DependsOn: map[string]string{
"frontend": "START",
},
PortMappings: []*template.PortMapping{
{
Protocol: "tcp",
ContainerName: "foo",
ContainerPort: uint16(2000),
},
},
},
},
"specify essential as false": {
inEssential: false,
inLabels: map[string]string{
"com.amazonaws.ecs.copilot.sidecar.description": "wow",
},
wanted: &template.SidecarOpts{
Name: "foo",
CredsParam: mockCredsParam,
Image: mockImage,
Secrets: mockSecrets,
Variables: mockMap,
Essential: aws.Bool(false),
DockerLabels: map[string]string{
"com.amazonaws.ecs.copilot.sidecar.description": "wow",
},
PortMappings: []*template.PortMapping{
{
Protocol: "tcp",
ContainerName: "foo",
ContainerPort: uint16(2000),
},
},
},
},
"do not specify image override": {
wanted: &template.SidecarOpts{
Name: "foo",
CredsParam: mockCredsParam,
Image: mockImage,
Secrets: mockSecrets,
Variables: mockMap,
Essential: aws.Bool(false),
EntryPoint: nil,
Command: nil,
PortMappings: []*template.PortMapping{
{
Protocol: "tcp",
ContainerName: "foo",
ContainerPort: uint16(2000),
},
},
},
},
"specify entrypoint as a string": {
inImageOverride: manifest.ImageOverride{
EntryPoint: manifest.EntryPointOverride{String: aws.String("bin")},
},
wanted: &template.SidecarOpts{
Name: "foo",
CredsParam: mockCredsParam,
Image: mockImage,
Secrets: mockSecrets,
Variables: mockMap,
Essential: aws.Bool(false),
EntryPoint: []string{"bin"},
Command: nil,
PortMappings: []*template.PortMapping{
{
Protocol: "tcp",
ContainerName: "foo",
ContainerPort: uint16(2000),
},
},
},
},
"specify entrypoint as a string slice": {
inImageOverride: manifest.ImageOverride{
EntryPoint: manifest.EntryPointOverride{StringSlice: []string{"bin", "arg"}},
},
wanted: &template.SidecarOpts{
Name: "foo",
CredsParam: mockCredsParam,
Image: mockImage,
Secrets: mockSecrets,
Variables: mockMap,
Essential: aws.Bool(false),
EntryPoint: []string{"bin", "arg"},
Command: nil,
PortMappings: []*template.PortMapping{
{
Protocol: "tcp",
ContainerName: "foo",
ContainerPort: uint16(2000),
},
},
},
},
"specify command as a string": {
inImageOverride: manifest.ImageOverride{
Command: manifest.CommandOverride{String: aws.String("arg")},
},
wanted: &template.SidecarOpts{
Name: "foo",
CredsParam: mockCredsParam,
Image: mockImage,
Secrets: mockSecrets,
Variables: mockMap,
Essential: aws.Bool(false),
EntryPoint: nil,
Command: []string{"arg"},
PortMappings: []*template.PortMapping{
{
Protocol: "tcp",
ContainerName: "foo",
ContainerPort: uint16(2000),
},
},
},
},
"specify command as a string slice": {
inImageOverride: manifest.ImageOverride{
Command: manifest.CommandOverride{StringSlice: []string{"arg1", "arg2"}},
},
wanted: &template.SidecarOpts{
Name: "foo",
CredsParam: mockCredsParam,
Image: mockImage,
Secrets: mockSecrets,
Variables: mockMap,
Essential: aws.Bool(false),
EntryPoint: nil,
Command: []string{"arg1", "arg2"},
PortMappings: []*template.PortMapping{
{
Protocol: "tcp",
ContainerName: "foo",
ContainerPort: uint16(2000),
},
},
},
},
"with health check": {
inHealthCheck: manifest.ContainerHealthCheck{
Command: []string{"foo", "bar"},
},
wanted: &template.SidecarOpts{
Name: "foo",
CredsParam: mockCredsParam,
Image: mockImage,
Secrets: mockSecrets,
Variables: mockMap,
Essential: aws.Bool(false),
HealthCheck: &template.ContainerHealthCheck{
Command: []string{"foo", "bar"},
Interval: aws.Int64(10),
Retries: aws.Int64(2),
StartPeriod: aws.Int64(0),
Timeout: aws.Int64(5),
},
PortMappings: []*template.PortMapping{
{
Protocol: "tcp",
ContainerName: "foo",
ContainerPort: uint16(2000),
},
},
},
},
}
for name, tc := range testCases {
t.Run(name, func(t *testing.T) {
sidecar := map[string]*manifest.SidecarConfig{
"foo": {
CredsParam: mockCredsParam,
Image: manifest.Union[*string, manifest.ImageLocationOrBuild]{
Advanced: manifest.ImageLocationOrBuild{
Build: manifest.BuildArgsOrString{
BuildString: aws.String("./Dockerfile"),
},
},
},
Secrets: map[string]manifest.Secret{"foo": {}},
Variables: map[string]manifest.Variable{"foo": {}},
Essential: aws.Bool(tc.inEssential),
DockerLabels: tc.inLabels,
DependsOn: tc.inDependsOn,
ImageOverride: tc.inImageOverride,
HealthCheck: tc.inHealthCheck,
},
}
got, err := convertSidecars(sidecar, mockExposedPorts, mockRunTimeConfig)
if tc.wantedErr != nil {
require.EqualError(t, err, tc.wantedErr.Error())
} else {
require.NoError(t, err)
require.Equal(t, tc.wanted, got[0])
}
})
}
}
func Test_convertAdvancedCount(t *testing.T) {
mockRange := manifest.IntRangeBand("1-10")
timeMinute := time.Second * 60
perc := manifest.Percentage(70)
mockConfig := manifest.ScalingConfigOrT[manifest.Percentage]{
ScalingConfig: manifest.AdvancedScalingConfig[manifest.Percentage]{
Value: &perc,
Cooldown: manifest.Cooldown{
ScaleInCooldown: &timeMinute,
},
},
}
testCases := map[string]struct {
input manifest.AdvancedCount
expected *template.AdvancedCount
expectedErr error
}{
"success with generalized cooldown": {
input: manifest.AdvancedCount{
Range: manifest.Range{
Value: &mockRange,
},
Cooldown: manifest.Cooldown{
ScaleInCooldown: &timeMinute,
ScaleOutCooldown: &timeMinute,
},
},
expected: &template.AdvancedCount{
Autoscaling: &template.AutoscalingOpts{
MinCapacity: aws.Int(1),
MaxCapacity: aws.Int(10),
CPUCooldown: template.Cooldown{
ScaleInCooldown: aws.Float64(60),
ScaleOutCooldown: aws.Float64(60),
},
MemCooldown: template.Cooldown{
ScaleInCooldown: aws.Float64(60),
ScaleOutCooldown: aws.Float64(60),
},
ReqCooldown: template.Cooldown{
ScaleInCooldown: aws.Float64(60),
ScaleOutCooldown: aws.Float64(60),
},
RespTimeCooldown: template.Cooldown{
ScaleInCooldown: aws.Float64(60),
ScaleOutCooldown: aws.Float64(60),
},
QueueDelayCooldown: template.Cooldown{
ScaleInCooldown: aws.Float64(60),
ScaleOutCooldown: aws.Float64(60),
},
},
},
},
"success with spot count": {
input: manifest.AdvancedCount{
Spot: aws.Int(1),
},
expected: &template.AdvancedCount{
Spot: aws.Int(1),
Cps: []*template.CapacityProviderStrategy{
{
Weight: aws.Int(1),
CapacityProvider: capacityProviderFargateSpot,
},
},
},
},
"success with fargate autoscaling": {
input: manifest.AdvancedCount{
Range: manifest.Range{
Value: &mockRange,
},
CPU: mockConfig,
},
expected: &template.AdvancedCount{
Autoscaling: &template.AutoscalingOpts{
MinCapacity: aws.Int(1),
MaxCapacity: aws.Int(10),
CPU: aws.Float64(70),
CPUCooldown: template.Cooldown{
ScaleInCooldown: aws.Float64(60),
},
},
},
},
"success with spot autoscaling": {
input: manifest.AdvancedCount{
Range: manifest.Range{
RangeConfig: manifest.RangeConfig{
Min: aws.Int(2),
Max: aws.Int(20),
SpotFrom: aws.Int(5),
},
},
CPU: mockConfig,
},
expected: &template.AdvancedCount{
Autoscaling: &template.AutoscalingOpts{
MinCapacity: aws.Int(2),
MaxCapacity: aws.Int(20),
CPU: aws.Float64(70),
CPUCooldown: template.Cooldown{
ScaleInCooldown: aws.Float64(60),
},
},
Cps: []*template.CapacityProviderStrategy{
{
Weight: aws.Int(1),
CapacityProvider: capacityProviderFargateSpot,
},
{
Base: aws.Int(4),
Weight: aws.Int(0),
CapacityProvider: capacityProviderFargate,
},
},
},
},
}
for name, tc := range testCases {
t.Run(name, func(t *testing.T) {
actual, err := convertAdvancedCount(tc.input)
if tc.expectedErr != nil {
require.EqualError(t, err, tc.expectedErr.Error())
} else {
require.NoError(t, err)
require.Equal(t, tc.expected, actual)
}
})
}
}
func Test_convertCapacityProviders(t *testing.T) {
mockRange := manifest.IntRangeBand("1-10")
minCapacity := 1
spotFrom := 3
testCases := map[string]struct {
input manifest.AdvancedCount
expected []*template.CapacityProviderStrategy
}{
"with spot as desiredCount": {
input: manifest.AdvancedCount{
Spot: aws.Int(3),
},
expected: []*template.CapacityProviderStrategy{
{
Weight: aws.Int(1),
CapacityProvider: capacityProviderFargateSpot,
},
},
},
"with scaling only on spot": {
input: manifest.AdvancedCount{
Range: manifest.Range{
RangeConfig: manifest.RangeConfig{
Min: aws.Int(minCapacity),
Max: aws.Int(10),
SpotFrom: aws.Int(minCapacity),
},
},
},
expected: []*template.CapacityProviderStrategy{
{
Weight: aws.Int(1),
CapacityProvider: capacityProviderFargateSpot,
},
{
Base: aws.Int(0),
Weight: aws.Int(0),
CapacityProvider: capacityProviderFargate,
},
},
},
"with scaling into spot": {
input: manifest.AdvancedCount{
Range: manifest.Range{
RangeConfig: manifest.RangeConfig{
Min: aws.Int(minCapacity),
Max: aws.Int(10),
SpotFrom: aws.Int(spotFrom),
},
},
},
expected: []*template.CapacityProviderStrategy{
{
Weight: aws.Int(1),
CapacityProvider: capacityProviderFargateSpot,
},
{
Base: aws.Int(spotFrom - 1),
Weight: aws.Int(0),
CapacityProvider: capacityProviderFargate,
},
},
},
"with min equaling spot_from": {
input: manifest.AdvancedCount{
Range: manifest.Range{
RangeConfig: manifest.RangeConfig{
Min: aws.Int(2),
Max: aws.Int(10),
SpotFrom: aws.Int(2),
},
},
},
expected: []*template.CapacityProviderStrategy{
{
Weight: aws.Int(1),
CapacityProvider: capacityProviderFargateSpot,
},
{
Base: aws.Int(1),
Weight: aws.Int(0),
CapacityProvider: capacityProviderFargate,
},
},
},
"returns nil if no spot config specified": {
input: manifest.AdvancedCount{
Range: manifest.Range{
Value: &mockRange,
},
},
expected: nil,
},
"returns nil if no spot config specified with min max": {
input: manifest.AdvancedCount{
Range: manifest.Range{
RangeConfig: manifest.RangeConfig{
Min: aws.Int(1),
Max: aws.Int(10),
},
},
},
expected: nil,
},
}
for name, tc := range testCases {
t.Run(name, func(t *testing.T) {
actual := convertCapacityProviders(tc.input)
require.Equal(t, tc.expected, actual)
})
}
}
func Test_convertAutoscaling(t *testing.T) {
var (
respTime = 512 * time.Millisecond
mockRange = manifest.IntRangeBand("1-100")
badRange = manifest.IntRangeBand("badRange")
mockRequests = manifest.ScalingConfigOrT[int]{
Value: aws.Int(1000),
}
mockResponseTime = manifest.ScalingConfigOrT[time.Duration]{
Value: &respTime,
}
perc = manifest.Percentage(70)
timeMinute = time.Second * 60
mockCPU = manifest.ScalingConfigOrT[manifest.Percentage]{
ScalingConfig: manifest.AdvancedScalingConfig[manifest.Percentage]{
Value: &perc,
Cooldown: manifest.Cooldown{
ScaleInCooldown: &timeMinute,
ScaleOutCooldown: &timeMinute,
},
},
}
mockMem = manifest.ScalingConfigOrT[manifest.Percentage]{
Value: &perc,
}
)
testAcceptableLatency := 10 * time.Minute
testAvgProcessingTime := 250 * time.Millisecond
testCases := map[string]struct {
input manifest.AdvancedCount
wanted *template.AutoscalingOpts
wantedErr error
}{
"invalid range": {
input: manifest.AdvancedCount{
Range: manifest.Range{
Value: &badRange,
},
},
wantedErr: fmt.Errorf("invalid range value badRange. Should be in format of ${min}-${max}"),
},
"success": {
input: manifest.AdvancedCount{
Range: manifest.Range{
Value: &mockRange,
},
CPU: mockCPU,
Memory: mockMem,
Requests: mockRequests,
ResponseTime: mockResponseTime,
},
wanted: &template.AutoscalingOpts{
MaxCapacity: aws.Int(100),
MinCapacity: aws.Int(1),
CPU: aws.Float64(70),
Memory: aws.Float64(70),
CPUCooldown: template.Cooldown{
ScaleInCooldown: aws.Float64(60),
ScaleOutCooldown: aws.Float64(60),
},
Requests: aws.Float64(1000),
ResponseTime: aws.Float64(0.512),
},
},
"success with range subfields": {
input: manifest.AdvancedCount{
Range: manifest.Range{
RangeConfig: manifest.RangeConfig{
Min: aws.Int(5),
Max: aws.Int(10),
SpotFrom: aws.Int(5),
},
},
CPU: mockCPU,
Memory: mockMem,
Requests: mockRequests,
ResponseTime: mockResponseTime,
},
wanted: &template.AutoscalingOpts{
MaxCapacity: aws.Int(10),
MinCapacity: aws.Int(5),
CPU: aws.Float64(70),
Memory: aws.Float64(70),
CPUCooldown: template.Cooldown{
ScaleInCooldown: aws.Float64(60),
ScaleOutCooldown: aws.Float64(60),
},
Requests: aws.Float64(1000),
ResponseTime: aws.Float64(0.512),
},
},
"success with queue autoscaling": {
input: manifest.AdvancedCount{
Range: manifest.Range{
RangeConfig: manifest.RangeConfig{
Min: aws.Int(5),
Max: aws.Int(10),
SpotFrom: aws.Int(5),
},
},
QueueScaling: manifest.QueueScaling{
AcceptableLatency: &testAcceptableLatency,
AvgProcessingTime: &testAvgProcessingTime,
Cooldown: manifest.Cooldown{
ScaleInCooldown: &timeMinute,
},
},
},
wanted: &template.AutoscalingOpts{
MaxCapacity: aws.Int(10),
MinCapacity: aws.Int(5),
QueueDelayCooldown: template.Cooldown{
ScaleInCooldown: aws.Float64(60),
},
QueueDelay: &template.AutoscalingQueueDelayOpts{
AcceptableBacklogPerTask: 2400,
},
},
},
"returns nil if spot specified": {
input: manifest.AdvancedCount{
Spot: aws.Int(5),
},
wanted: nil,
},
}
for name, tc := range testCases {
t.Run(name, func(t *testing.T) {
got, err := convertAutoscaling(tc.input)
if tc.wantedErr != nil {
require.EqualError(t, err, tc.wantedErr.Error())
} else {
require.NoError(t, err)
require.Equal(t, tc.wanted, got)
}
})
}
}
func Test_convertPath(t *testing.T) {
testCases := map[string]struct {
inPath string
wanted string
}{
"success with basic case": {
inPath: "/",
wanted: "/",
},
"adds leading / to naked path": {
inPath: "app",
wanted: "/app",
},
"leading / path unchanged": {
inPath: "/app",
wanted: "/app",
},
"empty path converted to /": {
inPath: "",
wanted: "/",
},
}
for name, tc := range testCases {
t.Run(name, func(t *testing.T) {
got := convertPath(tc.inPath)
require.Equal(t, tc.wanted, got)
})
}
}
func Test_convertTaskDefOverrideRules(t *testing.T) {
testCases := map[string]struct {
inRule []manifest.OverrideRule
wanted []override.Rule
}{
"should have proper prefix": {
inRule: []manifest.OverrideRule{
{
Path: "ContainerDefinitions[0].Ulimits[-].HardLimit",
Value: yaml.Node{},
},
},
wanted: []override.Rule{
{
Path: "Resources.TaskDefinition.Properties.ContainerDefinitions[0].Ulimits[-].HardLimit",
Value: yaml.Node{},
},
},
},
}
for name, tc := range testCases {
t.Run(name, func(t *testing.T) {
got := convertTaskDefOverrideRules(tc.inRule)
require.Equal(t, tc.wanted, got)
})
}
}
func Test_convertHTTPHealthCheck(t *testing.T) {
// These are used by reference to represent the output of the manifest.durationp function.
duration15Seconds := 15 * time.Second
duration60Seconds := 60 * time.Second
testCases := map[string]struct {
input manifest.HealthCheckArgsOrString
wantedOpts template.HTTPHealthCheckOpts
}{
"no fields indicated in manifest": {
wantedOpts: template.HTTPHealthCheckOpts{
HealthCheckPath: "/",
GracePeriod: 60,
},
},
"just Path": {
input: manifest.HealthCheckArgsOrString{
Union: manifest.BasicToUnion[string, manifest.HTTPHealthCheckArgs]("path"),
},
wantedOpts: template.HTTPHealthCheckOpts{
HealthCheckPath: "/path",
GracePeriod: 60,
},
},
"path behaves correctly with leading /": {
input: manifest.HealthCheckArgsOrString{
Union: manifest.BasicToUnion[string, manifest.HTTPHealthCheckArgs]("/path"),
},
wantedOpts: template.HTTPHealthCheckOpts{
HealthCheckPath: "/path",
GracePeriod: 60,
},
},
"just HealthyThreshold": {
input: manifest.HealthCheckArgsOrString{
Union: manifest.AdvancedToUnion[string](manifest.HTTPHealthCheckArgs{
HealthyThreshold: aws.Int64(5),
}),
},
wantedOpts: template.HTTPHealthCheckOpts{
HealthCheckPath: "/",
HealthyThreshold: aws.Int64(5),
GracePeriod: 60,
},
},
"just UnhealthyThreshold": {
input: manifest.HealthCheckArgsOrString{
Union: manifest.AdvancedToUnion[string](manifest.HTTPHealthCheckArgs{
UnhealthyThreshold: aws.Int64(5),
}),
},
wantedOpts: template.HTTPHealthCheckOpts{
HealthCheckPath: "/",
UnhealthyThreshold: aws.Int64(5),
GracePeriod: 60,
},
},
"just Interval": {
input: manifest.HealthCheckArgsOrString{
Union: manifest.AdvancedToUnion[string](manifest.HTTPHealthCheckArgs{
Interval: &duration15Seconds,
}),
},
wantedOpts: template.HTTPHealthCheckOpts{
HealthCheckPath: "/",
Interval: aws.Int64(15),
GracePeriod: 60,
},
},
"just Timeout": {
input: manifest.HealthCheckArgsOrString{
Union: manifest.AdvancedToUnion[string](manifest.HTTPHealthCheckArgs{
Timeout: &duration15Seconds,
}),
},
wantedOpts: template.HTTPHealthCheckOpts{
HealthCheckPath: "/",
Timeout: aws.Int64(15),
GracePeriod: 60,
},
},
"just SuccessCodes": {
input: manifest.HealthCheckArgsOrString{
Union: manifest.AdvancedToUnion[string](manifest.HTTPHealthCheckArgs{
SuccessCodes: aws.String("200,301"),
}),
},
wantedOpts: template.HTTPHealthCheckOpts{
HealthCheckPath: "/",
SuccessCodes: "200,301",
GracePeriod: 60,
},
},
"just Port": {
input: manifest.HealthCheckArgsOrString{
Union: manifest.AdvancedToUnion[string](manifest.HTTPHealthCheckArgs{
Port: aws.Int(8000),
}),
},
wantedOpts: template.HTTPHealthCheckOpts{
HealthCheckPath: "/",
Port: "8000",
GracePeriod: 60,
},
},
"all values changed in manifest": {
input: manifest.HealthCheckArgsOrString{
Union: manifest.AdvancedToUnion[string](manifest.HTTPHealthCheckArgs{
Path: aws.String("/road/to/nowhere"),
Port: aws.Int(8080),
SuccessCodes: aws.String("200-299"),
HealthyThreshold: aws.Int64(3),
UnhealthyThreshold: aws.Int64(3),
Interval: &duration60Seconds,
Timeout: &duration60Seconds,
GracePeriod: &duration15Seconds,
}),
},
wantedOpts: template.HTTPHealthCheckOpts{
HealthCheckPath: "/road/to/nowhere",
Port: "8080",
SuccessCodes: "200-299",
HealthyThreshold: aws.Int64(3),
UnhealthyThreshold: aws.Int64(3),
Interval: aws.Int64(60),
Timeout: aws.Int64(60),
GracePeriod: 15,
},
},
}
for name, tc := range testCases {
t.Run(name, func(t *testing.T) {
require.Equal(t, tc.wantedOpts, convertHTTPHealthCheck(&tc.input))
})
}
}
func Test_convertManagedFSInfo(t *testing.T) {
testCases := map[string]struct {
inVolumes map[string]*manifest.Volume
wantManagedConfig *template.ManagedVolumeCreationInfo
wantVolumes map[string]manifest.Volume
}{
"no managed config": {
inVolumes: map[string]*manifest.Volume{
"wordpress": {
EFS: manifest.EFSConfigOrBool{
Advanced: manifest.EFSVolumeConfiguration{
FileSystemID: aws.String("fs-1234"),
},
},
MountPointOpts: manifest.MountPointOpts{
ContainerPath: aws.String("/var/www"),
},
},
},
wantManagedConfig: nil,
wantVolumes: map[string]manifest.Volume{
"wordpress": {
EFS: manifest.EFSConfigOrBool{
Advanced: manifest.EFSVolumeConfiguration{
FileSystemID: aws.String("fs-1234"),
},
},
MountPointOpts: manifest.MountPointOpts{
ContainerPath: aws.String("/var/www"),
},
},
},
},
"with managed config": {
inVolumes: map[string]*manifest.Volume{
"wordpress": {
EFS: manifest.EFSConfigOrBool{
Enabled: aws.Bool(true),
},
MountPointOpts: manifest.MountPointOpts{
ContainerPath: aws.String("/var/www"),
},
},
},
wantManagedConfig: &template.ManagedVolumeCreationInfo{
Name: aws.String("wordpress"),
DirName: aws.String("fe"),
UID: aws.Uint32(1336298249),
GID: aws.Uint32(1336298249),
},
wantVolumes: map[string]manifest.Volume{},
},
"with custom UID": {
inVolumes: map[string]*manifest.Volume{
"wordpress": {
EFS: manifest.EFSConfigOrBool{
Advanced: manifest.EFSVolumeConfiguration{
UID: aws.Uint32(10000),
GID: aws.Uint32(100000),
},
},
MountPointOpts: manifest.MountPointOpts{
ContainerPath: aws.String("/var/www"),
},
},
},
wantManagedConfig: &template.ManagedVolumeCreationInfo{
Name: aws.String("wordpress"),
DirName: aws.String("fe"),
UID: aws.Uint32(10000),
GID: aws.Uint32(100000),
},
wantVolumes: map[string]manifest.Volume{},
},
}
for name, tc := range testCases {
t.Run(name, func(t *testing.T) {
// WHEN
gotManaged := convertManagedFSInfo(aws.String("fe"), tc.inVolumes)
// THEN
require.Equal(t, tc.wantManagedConfig, gotManaged)
})
}
}
func Test_convertStorageOpts(t *testing.T) {
testCases := map[string]struct {
inVolumes map[string]*manifest.Volume
inEphemeral *int
wantOpts template.StorageOpts
}{
"minimal configuration": {
inVolumes: map[string]*manifest.Volume{
"wordpress": {
EFS: manifest.EFSConfigOrBool{
Advanced: manifest.EFSVolumeConfiguration{
FileSystemID: aws.String("fs-1234"),
},
},
MountPointOpts: manifest.MountPointOpts{
ContainerPath: aws.String("/var/www"),
},
},
},
wantOpts: template.StorageOpts{
Volumes: []*template.Volume{
{
Name: aws.String("wordpress"),
EFS: &template.EFSVolumeConfiguration{
Filesystem: aws.String("fs-1234"),
RootDirectory: aws.String("/"),
IAM: aws.String("DISABLED"),
},
},
},
MountPoints: []*template.MountPoint{
{
ContainerPath: aws.String("/var/www"),
ReadOnly: aws.Bool(true),
SourceVolume: aws.String("wordpress"),
},
},
EFSPerms: []*template.EFSPermission{
{
FilesystemID: aws.String("fs-1234"),
Write: false,
},
},
},
},
"empty volume for shareable storage between sidecar and main container": {
inVolumes: map[string]*manifest.Volume{
"scratch": {
MountPointOpts: manifest.MountPointOpts{
ContainerPath: aws.String("/var/scratch"),
},
EFS: manifest.EFSConfigOrBool{
Enabled: aws.Bool(false),
},
},
},
wantOpts: template.StorageOpts{
Volumes: []*template.Volume{
{
Name: aws.String("scratch"),
},
},
MountPoints: []*template.MountPoint{
{
ContainerPath: aws.String("/var/scratch"),
ReadOnly: aws.Bool(true),
SourceVolume: aws.String("scratch"),
},
},
},
},
"full specification with access point renders correctly": {
inVolumes: map[string]*manifest.Volume{
"wordpress": {
EFS: manifest.EFSConfigOrBool{
Advanced: manifest.EFSVolumeConfiguration{
FileSystemID: aws.String("fs-1234"),
RootDirectory: aws.String("/"),
AuthConfig: manifest.AuthorizationConfig{
IAM: aws.Bool(true),
AccessPointID: aws.String("ap-1234"),
},
},
},
MountPointOpts: manifest.MountPointOpts{
ContainerPath: aws.String("/var/www"),
ReadOnly: aws.Bool(false),
},
},
},
wantOpts: template.StorageOpts{
Volumes: []*template.Volume{
{
Name: aws.String("wordpress"),
EFS: &template.EFSVolumeConfiguration{
Filesystem: aws.String("fs-1234"),
RootDirectory: aws.String("/"),
IAM: aws.String("ENABLED"),
AccessPointID: aws.String("ap-1234"),
},
},
},
MountPoints: []*template.MountPoint{
{
ContainerPath: aws.String("/var/www"),
ReadOnly: aws.Bool(false),
SourceVolume: aws.String("wordpress"),
},
},
EFSPerms: []*template.EFSPermission{
{
FilesystemID: aws.String("fs-1234"),
AccessPointID: aws.String("ap-1234"),
Write: true,
},
},
},
},
"full specification without access point renders correctly": {
inVolumes: map[string]*manifest.Volume{
"wordpress": {
EFS: manifest.EFSConfigOrBool{
Advanced: manifest.EFSVolumeConfiguration{
FileSystemID: aws.String("fs-1234"),
RootDirectory: aws.String("/wordpress"),
AuthConfig: manifest.AuthorizationConfig{
IAM: aws.Bool(true),
},
},
},
MountPointOpts: manifest.MountPointOpts{
ContainerPath: aws.String("/var/www"),
ReadOnly: aws.Bool(false),
},
},
},
wantOpts: template.StorageOpts{
Volumes: []*template.Volume{
{
Name: aws.String("wordpress"),
EFS: &template.EFSVolumeConfiguration{
Filesystem: aws.String("fs-1234"),
RootDirectory: aws.String("/wordpress"),
IAM: aws.String("ENABLED"),
},
},
},
MountPoints: []*template.MountPoint{
{
ContainerPath: aws.String("/var/www"),
ReadOnly: aws.Bool(false),
SourceVolume: aws.String("wordpress"),
},
},
EFSPerms: []*template.EFSPermission{
{
FilesystemID: aws.String("fs-1234"),
Write: true,
},
},
},
},
"managed EFS": {
inVolumes: map[string]*manifest.Volume{
"efs": {
EFS: manifest.EFSConfigOrBool{
Enabled: aws.Bool(true),
},
MountPointOpts: manifest.MountPointOpts{
ContainerPath: aws.String("/var/www"),
ReadOnly: aws.Bool(true),
},
},
},
wantOpts: template.StorageOpts{
ManagedVolumeInfo: &template.ManagedVolumeCreationInfo{
Name: aws.String("efs"),
DirName: aws.String("fe"),
UID: aws.Uint32(1336298249),
GID: aws.Uint32(1336298249),
},
MountPoints: []*template.MountPoint{
{
ContainerPath: aws.String("/var/www"),
ReadOnly: aws.Bool(true),
SourceVolume: aws.String("efs"),
},
},
},
},
"managed EFS with config": {
inVolumes: map[string]*manifest.Volume{
"efs": {
EFS: manifest.EFSConfigOrBool{
Advanced: manifest.EFSVolumeConfiguration{
UID: aws.Uint32(1000),
GID: aws.Uint32(10000),
},
},
MountPointOpts: manifest.MountPointOpts{
ContainerPath: aws.String("/var/www"),
ReadOnly: aws.Bool(true),
},
},
},
wantOpts: template.StorageOpts{
ManagedVolumeInfo: &template.ManagedVolumeCreationInfo{
Name: aws.String("efs"),
DirName: aws.String("fe"),
UID: aws.Uint32(1000),
GID: aws.Uint32(10000),
},
MountPoints: []*template.MountPoint{
{
ContainerPath: aws.String("/var/www"),
ReadOnly: aws.Bool(true),
SourceVolume: aws.String("efs"),
},
},
},
},
"managed EFS and BYO": {
inVolumes: map[string]*manifest.Volume{
"efs": {
EFS: manifest.EFSConfigOrBool{
Enabled: aws.Bool(true),
},
MountPointOpts: manifest.MountPointOpts{
ContainerPath: aws.String("/var/www"),
ReadOnly: aws.Bool(true),
},
},
"otherefs": {
EFS: manifest.EFSConfigOrBool{
Advanced: manifest.EFSVolumeConfiguration{
FileSystemID: aws.String("fs-1234"),
},
},
MountPointOpts: manifest.MountPointOpts{
ContainerPath: aws.String("/var/stuff"),
ReadOnly: aws.Bool(false),
},
},
"ephemeral": {
EFS: manifest.EFSConfigOrBool{},
MountPointOpts: manifest.MountPointOpts{
ContainerPath: aws.String("/var/ephemeral"),
ReadOnly: aws.Bool(false),
},
},
},
wantOpts: template.StorageOpts{
ManagedVolumeInfo: &template.ManagedVolumeCreationInfo{
Name: aws.String("efs"),
DirName: aws.String("fe"),
UID: aws.Uint32(1336298249),
GID: aws.Uint32(1336298249),
},
Volumes: []*template.Volume{
{
Name: aws.String("otherefs"),
EFS: &template.EFSVolumeConfiguration{
Filesystem: aws.String("fs-1234"),
RootDirectory: aws.String("/"),
IAM: aws.String("DISABLED"),
},
},
{
Name: aws.String("ephemeral"),
},
},
MountPoints: []*template.MountPoint{
{
ContainerPath: aws.String("/var/www"),
ReadOnly: aws.Bool(true),
SourceVolume: aws.String("efs"),
},
{
ContainerPath: aws.String("/var/stuff"),
ReadOnly: aws.Bool(false),
SourceVolume: aws.String("otherefs"),
},
{
ContainerPath: aws.String("/var/ephemeral"),
ReadOnly: aws.Bool(false),
SourceVolume: aws.String("ephemeral"),
},
},
EFSPerms: []*template.EFSPermission{
{
FilesystemID: aws.String("fs-1234"),
Write: true,
},
},
},
},
"efs specified with just ID": {
inVolumes: map[string]*manifest.Volume{
"wordpress": {
EFS: manifest.EFSConfigOrBool{
Advanced: manifest.EFSVolumeConfiguration{
FileSystemID: aws.String("fs-1234"),
},
},
MountPointOpts: manifest.MountPointOpts{
ContainerPath: aws.String("/var/www"),
ReadOnly: aws.Bool(true),
},
},
},
wantOpts: template.StorageOpts{
Volumes: []*template.Volume{
{
Name: aws.String("wordpress"),
EFS: &template.EFSVolumeConfiguration{
Filesystem: aws.String("fs-1234"),
RootDirectory: aws.String("/"),
IAM: aws.String("DISABLED"),
},
},
},
MountPoints: []*template.MountPoint{
{
ContainerPath: aws.String("/var/www"),
ReadOnly: aws.Bool(true),
SourceVolume: aws.String("wordpress"),
},
},
EFSPerms: []*template.EFSPermission{
{
FilesystemID: aws.String("fs-1234"),
Write: false,
},
},
},
},
}
for name, tc := range testCases {
t.Run(name, func(t *testing.T) {
// GIVEN
s := manifest.Storage{
Volumes: tc.inVolumes,
Ephemeral: tc.inEphemeral,
}
// WHEN
got := convertStorageOpts(aws.String("fe"), s)
// THEN
require.ElementsMatch(t, tc.wantOpts.EFSPerms, got.EFSPerms)
require.ElementsMatch(t, tc.wantOpts.MountPoints, got.MountPoints)
require.ElementsMatch(t, tc.wantOpts.Volumes, got.Volumes)
require.Equal(t, tc.wantOpts.ManagedVolumeInfo, got.ManagedVolumeInfo)
})
}
}
func Test_convertExecuteCommand(t *testing.T) {
testCases := map[string]struct {
inConfig manifest.ExecuteCommand
wanted *template.ExecuteCommandOpts
}{
"without exec enabled": {
inConfig: manifest.ExecuteCommand{},
wanted: nil,
},
"exec enabled": {
inConfig: manifest.ExecuteCommand{
Enable: aws.Bool(true),
},
wanted: &template.ExecuteCommandOpts{},
},
"exec enabled with config": {
inConfig: manifest.ExecuteCommand{
Config: manifest.ExecuteCommandConfig{
Enable: aws.Bool(true),
},
},
wanted: &template.ExecuteCommandOpts{},
},
}
for name, tc := range testCases {
t.Run(name, func(t *testing.T) {
exec := tc.inConfig
got := convertExecuteCommand(&exec)
require.Equal(t, tc.wanted, got)
})
}
}
func Test_convertSidecarMountPoints(t *testing.T) {
testCases := map[string]struct {
inMountPoints []manifest.SidecarMountPoint
wantMountPoint []*template.MountPoint
}{
"fully specified": {
inMountPoints: []manifest.SidecarMountPoint{
{
SourceVolume: aws.String("wordpress"),
MountPointOpts: manifest.MountPointOpts{
ContainerPath: aws.String("/var/www/wp-content"),
ReadOnly: aws.Bool(false),
},
},
},
wantMountPoint: []*template.MountPoint{
{
ContainerPath: aws.String("/var/www/wp-content"),
ReadOnly: aws.Bool(false),
SourceVolume: aws.String("wordpress"),
},
},
},
"readonly defaults to true": {
inMountPoints: []manifest.SidecarMountPoint{
{
SourceVolume: aws.String("wordpress"),
MountPointOpts: manifest.MountPointOpts{
ContainerPath: aws.String("/var/www/wp-content"),
},
},
},
wantMountPoint: []*template.MountPoint{
{
ContainerPath: aws.String("/var/www/wp-content"),
ReadOnly: aws.Bool(true),
SourceVolume: aws.String("wordpress"),
},
},
},
}
for name, tc := range testCases {
t.Run(name, func(t *testing.T) {
got := convertSidecarMountPoints(tc.inMountPoints)
require.Equal(t, tc.wantMountPoint, got)
})
}
}
func Test_convertEphemeral(t *testing.T) {
testCases := map[string]struct {
inEphemeral *int
wanted *int
wantedError error
}{
"without storage enabled": {
inEphemeral: nil,
wanted: nil,
},
"ephemeral specified correctly": {
inEphemeral: aws.Int(100),
wanted: aws.Int(100),
},
"ephemeral specified at 20 GiB": {
inEphemeral: aws.Int(20),
wanted: nil,
},
}
for name, tc := range testCases {
t.Run(name, func(t *testing.T) {
got := convertEphemeral(tc.inEphemeral)
require.Equal(t, got, tc.wanted)
})
}
}
func Test_convertPublish(t *testing.T) {
accountId := "123456789123"
partition := "aws"
region := "us-west-2"
app := "testapp"
env := "testenv"
svc := "hello"
testCases := map[string]struct {
inTopics []manifest.Topic
wanted *template.PublishOpts
wantedError error
}{
"no manifest publishers should return nil": {
inTopics: nil,
wanted: nil,
},
"empty manifest publishers should return nil": {
inTopics: []manifest.Topic{},
wanted: nil,
},
"valid publish": {
inTopics: []manifest.Topic{
{
Name: aws.String("topic1"),
},
{
Name: aws.String("topic2"),
},
},
wanted: &template.PublishOpts{
Topics: []*template.Topic{
{
Name: aws.String("topic1"),
AccountID: accountId,
Partition: partition,
Region: region,
App: app,
Env: env,
Svc: svc,
},
{
Name: aws.String("topic2"),
AccountID: accountId,
Partition: partition,
Region: region,
App: app,
Env: env,
Svc: svc,
},
},
},
},
"valid publish with fifo enabled and standard topics": {
inTopics: []manifest.Topic{
{
Name: aws.String("topic1.fifo"),
FIFO: manifest.FIFOTopicAdvanceConfigOrBool{Enable: aws.Bool(true)},
},
{
Name: aws.String("topic2"),
},
},
wanted: &template.PublishOpts{
Topics: []*template.Topic{
{
Name: aws.String("topic1.fifo"),
FIFOTopicConfig: &template.FIFOTopicConfig{},
AccountID: accountId,
Partition: partition,
Region: region,
App: app,
Env: env,
Svc: svc,
},
{
Name: aws.String("topic2"),
FIFOTopicConfig: nil,
AccountID: accountId,
Partition: partition,
Region: region,
App: app,
Env: env,
Svc: svc,
},
},
},
},
"valid publish with advanced fifo and standard topics": {
inTopics: []manifest.Topic{
{
Name: aws.String("topic1.fifo"),
FIFO: manifest.FIFOTopicAdvanceConfigOrBool{
Advanced: manifest.FIFOTopicAdvanceConfig{
ContentBasedDeduplication: aws.Bool(true),
},
},
},
{
Name: aws.String("topic2"),
},
},
wanted: &template.PublishOpts{
Topics: []*template.Topic{
{
Name: aws.String("topic1.fifo"),
FIFOTopicConfig: &template.FIFOTopicConfig{
ContentBasedDeduplication: aws.Bool(true),
},
AccountID: accountId,
Partition: partition,
Region: region,
App: app,
Env: env,
Svc: svc,
},
{
Name: aws.String("topic2"),
AccountID: accountId,
Partition: partition,
Region: region,
App: app,
Env: env,
Svc: svc,
},
},
},
},
}
for name, tc := range testCases {
t.Run(name, func(t *testing.T) {
got, err := convertPublish(tc.inTopics, accountId, region, app, env, svc)
if tc.wantedError != nil {
require.EqualError(t, err, tc.wantedError.Error())
} else {
require.Equal(t, got, tc.wanted)
}
})
}
}
func Test_convertSubscribe(t *testing.T) {
duration111Seconds := 111 * time.Second
mockStruct := map[string]interface{}{
"store": []string{"example_corp"},
}
testCases := map[string]struct {
inSubscribe *manifest.WorkerService
wanted *template.SubscribeOpts
}{
"empty subscription": { // 1
inSubscribe: &manifest.WorkerService{},
wanted: nil,
},
"valid subscribe": { // 2
inSubscribe: &manifest.WorkerService{
WorkerServiceConfig: manifest.WorkerServiceConfig{
Subscribe: manifest.SubscribeConfig{
Topics: []manifest.TopicSubscription{
{
Name: aws.String("name"),
Service: aws.String("svc"),
},
},
Queue: manifest.SQSQueue{
Retention: &duration111Seconds,
Delay: &duration111Seconds,
Timeout: &duration111Seconds,
DeadLetter: manifest.DeadLetterQueue{
Tries: aws.Uint16(35),
},
},
},
},
},
wanted: &template.SubscribeOpts{
Topics: []*template.TopicSubscription{
{
Name: aws.String("name"),
Service: aws.String("svc"),
},
},
Queue: &template.SQSQueue{
Retention: aws.Int64(111),
Delay: aws.Int64(111),
Timeout: aws.Int64(111),
DeadLetter: &template.DeadLetterQueue{
Tries: aws.Uint16(35),
},
},
},
},
"valid subscribe with default queue configs": { // 3
inSubscribe: &manifest.WorkerService{
WorkerServiceConfig: manifest.WorkerServiceConfig{
Subscribe: manifest.SubscribeConfig{
Topics: []manifest.TopicSubscription{
{
Name: aws.String("name"),
Service: aws.String("svc"),
},
},
Queue: manifest.SQSQueue{},
},
},
},
wanted: &template.SubscribeOpts{
Topics: []*template.TopicSubscription{
{
Name: aws.String("name"),
Service: aws.String("svc"),
},
},
Queue: nil,
},
},
"valid subscribe with queue enabled": { // 4
inSubscribe: &manifest.WorkerService{
WorkerServiceConfig: manifest.WorkerServiceConfig{
Subscribe: manifest.SubscribeConfig{
Topics: []manifest.TopicSubscription{
{
Name: aws.String("name"),
Service: aws.String("svc"),
Queue: manifest.SQSQueueOrBool{
Enabled: aws.Bool(true),
},
FilterPolicy: mockStruct,
},
},
Queue: manifest.SQSQueue{},
},
},
},
wanted: &template.SubscribeOpts{
Topics: []*template.TopicSubscription{
{
Name: aws.String("name"),
Service: aws.String("svc"),
Queue: &template.SQSQueue{},
FilterPolicy: aws.String(`{"store":["example_corp"]}`),
},
},
Queue: nil,
},
},
"valid subscribe with minimal queue": { // 5
inSubscribe: &manifest.WorkerService{
WorkerServiceConfig: manifest.WorkerServiceConfig{
Subscribe: manifest.SubscribeConfig{
Topics: []manifest.TopicSubscription{
{
Name: aws.String("name"),
Service: aws.String("svc"),
Queue: manifest.SQSQueueOrBool{
Advanced: manifest.SQSQueue{
Retention: &duration111Seconds,
Delay: &duration111Seconds,
Timeout: &duration111Seconds,
DeadLetter: manifest.DeadLetterQueue{
Tries: aws.Uint16(35),
},
},
},
FilterPolicy: mockStruct,
},
},
Queue: manifest.SQSQueue{},
},
},
},
wanted: &template.SubscribeOpts{
Topics: []*template.TopicSubscription{
{
Name: aws.String("name"),
Service: aws.String("svc"),
Queue: &template.SQSQueue{
Retention: aws.Int64(111),
Delay: aws.Int64(111),
Timeout: aws.Int64(111),
DeadLetter: &template.DeadLetterQueue{
Tries: aws.Uint16(35),
},
},
FilterPolicy: aws.String(`{"store":["example_corp"]}`),
},
},
Queue: nil,
},
},
"valid subscribe with high throughput fifo sqs": { // 6
inSubscribe: &manifest.WorkerService{
WorkerServiceConfig: manifest.WorkerServiceConfig{
Subscribe: manifest.SubscribeConfig{
Topics: []manifest.TopicSubscription{
{
Name: aws.String("name"),
Service: aws.String("svc"),
Queue: manifest.SQSQueueOrBool{
Advanced: manifest.SQSQueue{
Retention: &duration111Seconds,
Delay: &duration111Seconds,
Timeout: &duration111Seconds,
DeadLetter: manifest.DeadLetterQueue{
Tries: aws.Uint16(35),
},
FIFO: manifest.FIFOAdvanceConfigOrBool{Advanced: manifest.FIFOAdvanceConfig{HighThroughputFifo: aws.Bool(true)}},
},
},
FilterPolicy: mockStruct,
},
},
Queue: manifest.SQSQueue{},
},
},
},
wanted: &template.SubscribeOpts{
Topics: []*template.TopicSubscription{
{
Name: aws.String("name.fifo"),
Service: aws.String("svc"),
Queue: &template.SQSQueue{
Retention: aws.Int64(111),
Delay: aws.Int64(111),
Timeout: aws.Int64(111),
DeadLetter: &template.DeadLetterQueue{
Tries: aws.Uint16(35),
},
FIFOQueueConfig: &template.FIFOQueueConfig{
FIFOThroughputLimit: aws.String("perMessageGroupId"),
DeduplicationScope: aws.String("messageGroup"),
},
},
FilterPolicy: aws.String(`{"store":["example_corp"]}`),
},
},
Queue: nil,
},
},
"valid subscribe with custom minimal fifo sqs config values": {
inSubscribe: &manifest.WorkerService{
WorkerServiceConfig: manifest.WorkerServiceConfig{
Subscribe: manifest.SubscribeConfig{
Topics: []manifest.TopicSubscription{
{
Name: aws.String("name"),
Service: aws.String("svc"),
Queue: manifest.SQSQueueOrBool{
Advanced: manifest.SQSQueue{
Retention: &duration111Seconds,
Delay: &duration111Seconds,
Timeout: &duration111Seconds,
DeadLetter: manifest.DeadLetterQueue{
Tries: aws.Uint16(35),
},
FIFO: manifest.FIFOAdvanceConfigOrBool{Enable: aws.Bool(true)},
},
},
FilterPolicy: mockStruct,
},
},
Queue: manifest.SQSQueue{},
},
},
},
wanted: &template.SubscribeOpts{
Topics: []*template.TopicSubscription{
{
Name: aws.String("name.fifo"),
Service: aws.String("svc"),
Queue: &template.SQSQueue{
Retention: aws.Int64(111),
Delay: aws.Int64(111),
Timeout: aws.Int64(111),
DeadLetter: &template.DeadLetterQueue{
Tries: aws.Uint16(35),
},
FIFOQueueConfig: &template.FIFOQueueConfig{},
},
FilterPolicy: aws.String(`{"store":["example_corp"]}`),
},
},
Queue: nil,
},
},
"valid subscribe with custom complete fifo sqs config values": { // 7
inSubscribe: &manifest.WorkerService{
WorkerServiceConfig: manifest.WorkerServiceConfig{
Subscribe: manifest.SubscribeConfig{
Topics: []manifest.TopicSubscription{
{
Name: aws.String("name"),
Service: aws.String("svc"),
Queue: manifest.SQSQueueOrBool{
Advanced: manifest.SQSQueue{
Retention: &duration111Seconds,
Delay: &duration111Seconds,
Timeout: &duration111Seconds,
DeadLetter: manifest.DeadLetterQueue{
Tries: aws.Uint16(35),
},
FIFO: manifest.FIFOAdvanceConfigOrBool{
Advanced: manifest.FIFOAdvanceConfig{
FIFOThroughputLimit: aws.String("queue"),
DeduplicationScope: aws.String("perQueue"),
ContentBasedDeduplication: aws.Bool(true),
},
},
},
},
FilterPolicy: mockStruct,
},
},
Queue: manifest.SQSQueue{},
},
},
},
wanted: &template.SubscribeOpts{
Topics: []*template.TopicSubscription{
{
Name: aws.String("name.fifo"),
Service: aws.String("svc"),
Queue: &template.SQSQueue{
Retention: aws.Int64(111),
Delay: aws.Int64(111),
Timeout: aws.Int64(111),
DeadLetter: &template.DeadLetterQueue{
Tries: aws.Uint16(35),
},
FIFOQueueConfig: &template.FIFOQueueConfig{
FIFOThroughputLimit: aws.String("queue"),
DeduplicationScope: aws.String("perQueue"),
ContentBasedDeduplication: aws.Bool(true),
},
},
FilterPolicy: aws.String(`{"store":["example_corp"]}`),
},
},
Queue: nil,
},
},
"valid subscribe with custom complete fifo sqs config and standard topic subscription to a default standard queue": { // 8
inSubscribe: &manifest.WorkerService{
WorkerServiceConfig: manifest.WorkerServiceConfig{
Subscribe: manifest.SubscribeConfig{
Topics: []manifest.TopicSubscription{
{
Name: aws.String("name"),
Service: aws.String("svc"),
Queue: manifest.SQSQueueOrBool{
Advanced: manifest.SQSQueue{
Retention: &duration111Seconds,
Delay: &duration111Seconds,
Timeout: &duration111Seconds,
DeadLetter: manifest.DeadLetterQueue{
Tries: aws.Uint16(35),
},
FIFO: manifest.FIFOAdvanceConfigOrBool{
Advanced: manifest.FIFOAdvanceConfig{
FIFOThroughputLimit: aws.String("queue"),
DeduplicationScope: aws.String("perQueue"),
ContentBasedDeduplication: aws.Bool(true),
},
},
},
},
FilterPolicy: mockStruct,
},
{
Name: aws.String("name"),
Service: aws.String("svc"),
},
},
Queue: manifest.SQSQueue{},
},
},
},
wanted: &template.SubscribeOpts{
Topics: []*template.TopicSubscription{
{
Name: aws.String("name.fifo"),
Service: aws.String("svc"),
Queue: &template.SQSQueue{
Retention: aws.Int64(111),
Delay: aws.Int64(111),
Timeout: aws.Int64(111),
DeadLetter: &template.DeadLetterQueue{
Tries: aws.Uint16(35),
},
FIFOQueueConfig: &template.FIFOQueueConfig{
FIFOThroughputLimit: aws.String("queue"),
DeduplicationScope: aws.String("perQueue"),
ContentBasedDeduplication: aws.Bool(true),
},
},
FilterPolicy: aws.String(`{"store":["example_corp"]}`),
},
{
Name: aws.String("name"),
Service: aws.String("svc"),
},
},
Queue: nil,
},
},
"valid subscribe with custom complete fifo sqs config and multiple standard topic subscriptions to a default standard queue": { // 9
inSubscribe: &manifest.WorkerService{
WorkerServiceConfig: manifest.WorkerServiceConfig{
Subscribe: manifest.SubscribeConfig{
Topics: []manifest.TopicSubscription{
{
Name: aws.String("name"),
Service: aws.String("svc"),
Queue: manifest.SQSQueueOrBool{
Advanced: manifest.SQSQueue{
Retention: &duration111Seconds,
Delay: &duration111Seconds,
Timeout: &duration111Seconds,
DeadLetter: manifest.DeadLetterQueue{
Tries: aws.Uint16(35),
},
FIFO: manifest.FIFOAdvanceConfigOrBool{
Advanced: manifest.FIFOAdvanceConfig{
FIFOThroughputLimit: aws.String("queue"),
DeduplicationScope: aws.String("perQueue"),
ContentBasedDeduplication: aws.Bool(true),
},
},
},
},
FilterPolicy: mockStruct,
},
{
Name: aws.String("name"),
Service: aws.String("svc"),
},
{
Name: aws.String("name1"),
Service: aws.String("svc"),
},
},
Queue: manifest.SQSQueue{},
},
},
},
wanted: &template.SubscribeOpts{
Topics: []*template.TopicSubscription{
{
Name: aws.String("name.fifo"),
Service: aws.String("svc"),
Queue: &template.SQSQueue{
Retention: aws.Int64(111),
Delay: aws.Int64(111),
Timeout: aws.Int64(111),
DeadLetter: &template.DeadLetterQueue{
Tries: aws.Uint16(35),
},
FIFOQueueConfig: &template.FIFOQueueConfig{
FIFOThroughputLimit: aws.String("queue"),
DeduplicationScope: aws.String("perQueue"),
ContentBasedDeduplication: aws.Bool(true),
},
},
FilterPolicy: aws.String(`{"store":["example_corp"]}`),
},
{
Name: aws.String("name"),
Service: aws.String("svc"),
},
{
Name: aws.String("name1"),
Service: aws.String("svc"),
},
},
Queue: nil,
},
},
"valid subscribe with standard sqs config and fifo topic subscription to a default fifo queue": { // 10
inSubscribe: &manifest.WorkerService{
WorkerServiceConfig: manifest.WorkerServiceConfig{
Subscribe: manifest.SubscribeConfig{
Topics: []manifest.TopicSubscription{
{
Name: aws.String("name"),
Service: aws.String("svc"),
Queue: manifest.SQSQueueOrBool{
Advanced: manifest.SQSQueue{
Retention: &duration111Seconds,
Delay: &duration111Seconds,
Timeout: &duration111Seconds,
DeadLetter: manifest.DeadLetterQueue{
Tries: aws.Uint16(35),
},
},
},
FilterPolicy: mockStruct,
},
{
Name: aws.String("name"),
Service: aws.String("svc"),
},
},
Queue: manifest.SQSQueue{
FIFO: manifest.FIFOAdvanceConfigOrBool{Enable: aws.Bool(true)},
},
},
},
},
wanted: &template.SubscribeOpts{
Topics: []*template.TopicSubscription{
{
Name: aws.String("name"),
Service: aws.String("svc"),
Queue: &template.SQSQueue{
Retention: aws.Int64(111),
Delay: aws.Int64(111),
Timeout: aws.Int64(111),
DeadLetter: &template.DeadLetterQueue{
Tries: aws.Uint16(35),
},
},
FilterPolicy: aws.String(`{"store":["example_corp"]}`),
},
{
Name: aws.String("name.fifo"),
Service: aws.String("svc"),
},
},
Queue: &template.SQSQueue{
FIFOQueueConfig: &template.FIFOQueueConfig{},
},
},
},
"valid subscribe with standard sqs config and multiple fifo topic subscriptions to a default fifo queue": { // 11
inSubscribe: &manifest.WorkerService{
WorkerServiceConfig: manifest.WorkerServiceConfig{
Subscribe: manifest.SubscribeConfig{
Topics: []manifest.TopicSubscription{
{
Name: aws.String("name"),
Service: aws.String("svc"),
Queue: manifest.SQSQueueOrBool{
Advanced: manifest.SQSQueue{
Retention: &duration111Seconds,
Delay: &duration111Seconds,
Timeout: &duration111Seconds,
DeadLetter: manifest.DeadLetterQueue{
Tries: aws.Uint16(35),
},
},
},
FilterPolicy: mockStruct,
},
{
Name: aws.String("name"),
Service: aws.String("svc"),
},
{
Name: aws.String("name1"),
Service: aws.String("svc"),
},
},
Queue: manifest.SQSQueue{
FIFO: manifest.FIFOAdvanceConfigOrBool{Enable: aws.Bool(true)},
},
},
},
},
wanted: &template.SubscribeOpts{
Topics: []*template.TopicSubscription{
{
Name: aws.String("name"),
Service: aws.String("svc"),
Queue: &template.SQSQueue{
Retention: aws.Int64(111),
Delay: aws.Int64(111),
Timeout: aws.Int64(111),
DeadLetter: &template.DeadLetterQueue{
Tries: aws.Uint16(35),
},
},
FilterPolicy: aws.String(`{"store":["example_corp"]}`),
},
{
Name: aws.String("name.fifo"),
Service: aws.String("svc"),
},
{
Name: aws.String("name1.fifo"),
Service: aws.String("svc"),
},
},
Queue: &template.SQSQueue{
FIFOQueueConfig: &template.FIFOQueueConfig{},
},
},
},
}
for name, tc := range testCases {
t.Run(name, func(t *testing.T) {
got, err := convertSubscribe(tc.inSubscribe)
require.Equal(t, tc.wanted, got)
require.NoError(t, err)
})
}
}
func Test_convertDeploymentConfig(t *testing.T) {
testCases := map[string]struct {
in manifest.DeploymentConfig
out template.DeploymentConfigurationOpts
}{
"if 'recreate' strategy indicated, populate with replacement defaults": {
in: manifest.DeploymentConfig{
DeploymentControllerConfig: manifest.DeploymentControllerConfig{
Rolling: aws.String("recreate"),
}},
out: template.DeploymentConfigurationOpts{
MinHealthyPercent: minHealthyPercentRecreate,
MaxPercent: maxPercentRecreate,
},
},
"if 'default' strategy indicated, populate with rolling defaults": {
in: manifest.DeploymentConfig{
DeploymentControllerConfig: manifest.DeploymentControllerConfig{
Rolling: aws.String("default"),
}},
out: template.DeploymentConfigurationOpts{
MinHealthyPercent: minHealthyPercentDefault,
MaxPercent: maxPercentDefault,
},
},
"if nothing indicated, populate with rolling defaults": {
in: manifest.DeploymentConfig{},
out: template.DeploymentConfigurationOpts{
MinHealthyPercent: minHealthyPercentDefault,
MaxPercent: maxPercentDefault,
},
},
"if alarm names entered, format and populate": {
in: manifest.DeploymentConfig{
RollbackAlarms: manifest.BasicToUnion[[]string, manifest.AlarmArgs](
[]string{"alarmName1", "alarmName2"}),
},
out: template.DeploymentConfigurationOpts{
MinHealthyPercent: minHealthyPercentDefault,
MaxPercent: maxPercentDefault,
Rollback: template.RollingUpdateRollbackConfig{
AlarmNames: []string{"alarmName1", "alarmName2"},
},
},
},
"if alarm args entered, transform": {
in: manifest.DeploymentConfig{
RollbackAlarms: manifest.AdvancedToUnion[[]string, manifest.AlarmArgs](
manifest.AlarmArgs{
CPUUtilization: aws.Float64(34),
MemoryUtilization: aws.Float64(56),
}),
},
out: template.DeploymentConfigurationOpts{
MinHealthyPercent: minHealthyPercentDefault,
MaxPercent: maxPercentDefault,
Rollback: template.RollingUpdateRollbackConfig{
CPUUtilization: aws.Float64(34),
MemoryUtilization: aws.Float64(56),
},
},
},
}
for name, tc := range testCases {
t.Run(name, func(t *testing.T) {
require.Equal(t, tc.out, convertDeploymentConfig(tc.in))
})
}
}
func Test_convertWorkerDeploymentConfig(t *testing.T) {
testCases := map[string]struct {
in manifest.WorkerDeploymentConfig
out template.DeploymentConfigurationOpts
}{
"if alarm names entered, format and populate": {
in: manifest.WorkerDeploymentConfig{
WorkerRollbackAlarms: manifest.BasicToUnion[[]string, manifest.WorkerAlarmArgs](
[]string{"alarmName1", "alarmName2"}),
},
out: template.DeploymentConfigurationOpts{
MinHealthyPercent: minHealthyPercentDefault,
MaxPercent: maxPercentDefault,
Rollback: template.RollingUpdateRollbackConfig{
AlarmNames: []string{"alarmName1", "alarmName2"},
},
},
},
"if alarm args entered, transform": {
in: manifest.WorkerDeploymentConfig{
WorkerRollbackAlarms: manifest.AdvancedToUnion[[]string, manifest.WorkerAlarmArgs](
manifest.WorkerAlarmArgs{
AlarmArgs: manifest.AlarmArgs{
CPUUtilization: aws.Float64(34),
MemoryUtilization: aws.Float64(56),
},
MessagesDelayed: aws.Int(10),
}),
},
out: template.DeploymentConfigurationOpts{
MinHealthyPercent: minHealthyPercentDefault,
MaxPercent: maxPercentDefault,
Rollback: template.RollingUpdateRollbackConfig{
CPUUtilization: aws.Float64(34),
MemoryUtilization: aws.Float64(56),
MessagesDelayed: aws.Int(10),
},
},
},
}
for name, tc := range testCases {
t.Run(name, func(t *testing.T) {
require.Equal(t, tc.out, convertWorkerDeploymentConfig(tc.in))
})
}
}
func Test_convertPlatform(t *testing.T) {
testCases := map[string]struct {
in manifest.PlatformArgsOrString
out template.RuntimePlatformOpts
}{
"should return empty struct if user did not set a platform field in the manifest": {},
"should return windows server 2019 full and x86_64 when advanced config specifies 2019 full": {
in: manifest.PlatformArgsOrString{
PlatformArgs: manifest.PlatformArgs{
OSFamily: aws.String(manifest.OSWindowsServer2019Full),
Arch: aws.String(manifest.ArchX86),
},
},
out: template.RuntimePlatformOpts{
OS: template.OSWindowsServer2019Full,
Arch: template.ArchX86,
},
},
"should return windows server 2019 core and x86_64 when advanced config specifies 2019 core": {
in: manifest.PlatformArgsOrString{
PlatformArgs: manifest.PlatformArgs{
OSFamily: aws.String(manifest.OSWindowsServer2019Core),
Arch: aws.String(manifest.ArchX86),
},
},
out: template.RuntimePlatformOpts{
OS: template.OSWindowsServer2019Core,
Arch: template.ArchX86,
},
},
"should return windows server 2022 full and x86_64 when advanced config specifies 2022 full": {
in: manifest.PlatformArgsOrString{
PlatformArgs: manifest.PlatformArgs{
OSFamily: aws.String(manifest.OSWindowsServer2022Full),
Arch: aws.String(manifest.ArchX86),
},
},
out: template.RuntimePlatformOpts{
OS: template.OSWindowsServer2022Full,
Arch: template.ArchX86,
},
},
"should return windows server 2022 core and x86_64 when advanced config specifies 2022 core": {
in: manifest.PlatformArgsOrString{
PlatformArgs: manifest.PlatformArgs{
OSFamily: aws.String(manifest.OSWindowsServer2022Core),
Arch: aws.String(manifest.ArchX86),
},
},
out: template.RuntimePlatformOpts{
OS: template.OSWindowsServer2022Core,
Arch: template.ArchX86,
},
},
"should return windows server core 2019 and x86_64 when platform is 'windows/x86_64'": {
in: manifest.PlatformArgsOrString{
PlatformString: (*manifest.PlatformString)(aws.String("windows/amd64")),
},
out: template.RuntimePlatformOpts{
OS: template.OSWindowsServer2019Core,
Arch: template.ArchX86,
},
},
"should return linux and x86_64 when platform is 'linux/amd64'": {
in: manifest.PlatformArgsOrString{
PlatformString: (*manifest.PlatformString)(aws.String("linux/amd64")),
},
out: template.RuntimePlatformOpts{
OS: template.OSLinux,
Arch: template.ArchX86,
},
},
"should return linux and arm when platform is 'linux/arm'": {
in: manifest.PlatformArgsOrString{
PlatformString: (*manifest.PlatformString)(aws.String("linux/arm")),
},
out: template.RuntimePlatformOpts{
OS: template.OSLinux,
Arch: template.ArchARM64,
},
},
}
for name, tc := range testCases {
t.Run(name, func(t *testing.T) {
require.Equal(t, tc.out, convertPlatform(tc.in))
})
}
}
func Test_convertHTTPVersion(t *testing.T) {
testCases := map[string]struct {
in *string
wanted *string
}{
"should return nil if there is no user input": {},
"should return as uppercase on any user input": {
in: aws.String("gRPC"),
wanted: aws.String("GRPC"),
},
}
for name, tc := range testCases {
t.Run(name, func(t *testing.T) {
require.Equal(t, tc.wanted, convertHTTPVersion(tc.in))
})
}
}
func Test_convertCustomResources(t *testing.T) {
testCases := map[string]struct {
in map[string]string
wanted map[string]template.S3ObjectLocation
wantedErr error
}{
"returns a wrapped error if a url cannot be parsed": {
in: map[string]string{
"EnvControllerFunction": "https://my-bucket.s3.us-west-2.amazonaws.com/puppy.png",
"DynamicDesiredCountFunction": "bad",
},
wantedErr: errors.New(`convert custom resource "DynamicDesiredCountFunction" url: cannot parse S3 URL bad into bucket name and key`),
},
"transforms custom resources with valid urls": {
in: map[string]string{
"EnvControllerFunction": "https://my-bucket.s3.us-west-2.amazonaws.com/good/dogs/puppy.png",
},
wanted: map[string]template.S3ObjectLocation{
"EnvControllerFunction": {
Bucket: "my-bucket",
Key: "good/dogs/puppy.png",
},
},
},
}
for name, tc := range testCases {
t.Run(name, func(t *testing.T) {
out, err := convertCustomResources(tc.in)
if tc.wantedErr != nil {
require.EqualError(t, err, tc.wantedErr.Error())
} else {
require.NoError(t, err)
require.Equal(t, tc.wanted, out)
}
})
}
}
| 2,438 |
copilot-cli | aws | Go | //go:build integration
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
// SPDX-License-Identifier: Apache-2.0
package stack_test
import (
"fmt"
"os"
"path/filepath"
"testing"
"github.com/aws/aws-sdk-go/aws"
"github.com/aws/aws-sdk-go/service/cloudformation"
"github.com/aws/copilot-cli/internal/pkg/addon"
"github.com/aws/copilot-cli/internal/pkg/aws/sessions"
"github.com/aws/copilot-cli/internal/pkg/config"
"github.com/aws/copilot-cli/internal/pkg/deploy/cloudformation/stack"
"github.com/aws/copilot-cli/internal/pkg/manifest"
"github.com/aws/copilot-cli/internal/pkg/workspace"
"github.com/spf13/afero"
"github.com/stretchr/testify/require"
)
func TestAutoscalingIntegration_Validate(t *testing.T) {
path := filepath.Join("testdata", "stacklocal", autoScalingManifestPath)
wantedManifestBytes, err := os.ReadFile(path)
require.NoError(t, err)
mft, err := manifest.UnmarshalWorkload(wantedManifestBytes)
require.NoError(t, err)
content := mft.Manifest()
v, ok := content.(*manifest.LoadBalancedWebService)
require.Equal(t, ok, true)
// Create in-memory mock file system.
wd, err := os.Getwd()
require.NoError(t, err)
fs := afero.NewMemMapFs()
_ = fs.MkdirAll(fmt.Sprintf("%s/copilot", wd), 0755)
_ = afero.WriteFile(fs, fmt.Sprintf("%s/copilot/.workspace", wd), []byte(fmt.Sprintf("---\napplication: %s", "DavidsApp")), 0644)
require.NoError(t, err)
ws, err := workspace.Use(fs)
require.NoError(t, err)
_, err = addon.ParseFromWorkload(aws.StringValue(v.Name), ws)
var notFound *addon.ErrAddonsNotFound
require.ErrorAs(t, err, ¬Found)
serializer, err := stack.NewLoadBalancedWebService(stack.LoadBalancedWebServiceConfig{
App: &config.Application{Name: appName},
EnvManifest: &manifest.Environment{
Workload: manifest.Workload{
Name: &envName,
},
},
Manifest: v,
RuntimeConfig: stack.RuntimeConfig{
PushedImages: map[string]stack.ECRImage{
aws.StringValue(v.Name): {
RepoURL: imageURL,
ImageTag: imageTag,
},
},
ServiceDiscoveryEndpoint: "test.app.local",
CustomResourcesURL: map[string]string{
"EnvControllerFunction": "https://my-bucket.s3.us-west-2.amazonaws.com/code.zip",
"DynamicDesiredCountFunction": "https://my-bucket.s3.us-west-2.amazonaws.com/code.zip",
"RulePriorityFunction": "https://my-bucket.s3.us-west-2.amazonaws.com/code.zip",
},
EnvVersion: "v1.42.0",
},
})
require.NoError(t, err)
tpl, err := serializer.Template()
require.NoError(t, err)
sess, err := sessions.ImmutableProvider().Default()
require.NoError(t, err)
cfn := cloudformation.New(sess)
t.Run("CloudFormation template must be valid", func(t *testing.T) {
_, err := cfn.ValidateTemplate(&cloudformation.ValidateTemplateInput{
TemplateBody: aws.String(tpl),
})
require.NoError(t, err)
})
}
func TestScheduledJob_Validate(t *testing.T) {
path := filepath.Join("testdata", "workloads", jobManifestPath)
manifestBytes, err := os.ReadFile(path)
require.NoError(t, err)
mft, err := manifest.UnmarshalWorkload(manifestBytes)
require.NoError(t, err)
content := mft.Manifest()
v, ok := content.(*manifest.ScheduledJob)
require.True(t, ok)
// Create in-memory mock file system.
wd, err := os.Getwd()
require.NoError(t, err)
fs := afero.NewMemMapFs()
_ = fs.MkdirAll(fmt.Sprintf("%s/copilot", wd), 0755)
_ = afero.WriteFile(fs, fmt.Sprintf("%s/copilot/.workspace", wd), []byte(fmt.Sprintf("---\napplication: %s", "DavidsApp")), 0644)
require.NoError(t, err)
ws, err := workspace.Use(fs)
require.NoError(t, err)
_, err = addon.ParseFromWorkload(aws.StringValue(v.Name), ws)
var notFound *addon.ErrAddonsNotFound
require.ErrorAs(t, err, ¬Found)
serializer, err := stack.NewScheduledJob(stack.ScheduledJobConfig{
App: &config.Application{
Name: appName,
},
Env: envName,
Manifest: v,
RuntimeConfig: stack.RuntimeConfig{
ServiceDiscoveryEndpoint: "test.app.local",
CustomResourcesURL: map[string]string{
"EnvControllerFunction": "https://my-bucket.s3.us-west-2.amazonaws.com/code.zip",
},
AccountID: "123456789123",
Region: "us-west-2",
EnvVersion: "v1.42.0",
},
})
tpl, err := serializer.Template()
require.NoError(t, err, "template should render")
sess, err := sessions.ImmutableProvider().Default()
require.NoError(t, err)
cfn := cloudformation.New(sess)
t.Run("CF template should be valid", func(t *testing.T) {
_, err := cfn.ValidateTemplate(&cloudformation.ValidateTemplateInput{
TemplateBody: aws.String(tpl),
})
require.NoError(t, err)
})
}
| 144 |
copilot-cli | aws | Go | //go:build integration || localintegration
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
// SPDX-License-Identifier: Apache-2.0
package stack_test
import (
"fmt"
"os"
"path/filepath"
"regexp"
"testing"
"github.com/aws/aws-sdk-go/aws"
"github.com/aws/aws-sdk-go/aws/session"
"github.com/aws/copilot-cli/internal/pkg/addon"
"github.com/aws/copilot-cli/internal/pkg/config"
"github.com/aws/copilot-cli/internal/pkg/deploy/cloudformation/stack"
"github.com/aws/copilot-cli/internal/pkg/manifest"
"github.com/aws/copilot-cli/internal/pkg/workspace"
"github.com/spf13/afero"
"github.com/stretchr/testify/require"
"gopkg.in/yaml.v3"
)
const (
windowsSvcManifestPath = "windows-svc-manifest.yml"
windowsSvcStackPath = "windows-svc-test.stack.yml"
windowsSvcParamsPath = "windows-svc-test.params.json"
)
func TestWindowsLoadBalancedWebService_Template(t *testing.T) {
path := filepath.Join("testdata", "workloads", windowsSvcManifestPath)
manifestBytes, err := os.ReadFile(path)
require.NoError(t, err)
mft, err := manifest.UnmarshalWorkload([]byte(manifestBytes))
require.NoError(t, err)
envMft, err := mft.ApplyEnv(envName)
require.NoError(t, err)
err = envMft.Validate()
require.NoError(t, err)
err = envMft.Load(session.New())
require.NoError(t, err)
content := envMft.Manifest()
v, ok := content.(*manifest.LoadBalancedWebService)
require.True(t, ok)
// Create in-memory mock file system.
wd, err := os.Getwd()
require.NoError(t, err)
fs := afero.NewMemMapFs()
_ = fs.MkdirAll(fmt.Sprintf("%s/copilot", wd), 0755)
_ = afero.WriteFile(fs, fmt.Sprintf("%s/copilot/.workspace", wd), []byte(fmt.Sprintf("---\napplication: %s", "DavidsApp")), 0644)
require.NoError(t, err)
ws, err := workspace.Use(fs)
require.NoError(t, err)
_, err = addon.ParseFromWorkload(aws.StringValue(v.Name), ws)
var notFound *addon.ErrAddonsNotFound
require.ErrorAs(t, err, ¬Found)
svcDiscoveryEndpointName := fmt.Sprintf("%s.%s.local", envName, appName)
serializer, err := stack.NewLoadBalancedWebService(stack.LoadBalancedWebServiceConfig{
App: &config.Application{Name: appName},
EnvManifest: &manifest.Environment{
Workload: manifest.Workload{
Name: &envName,
},
},
ArtifactBucketName: "bucket",
Manifest: v,
RuntimeConfig: stack.RuntimeConfig{
AccountID: "123456789123",
Region: "us-west-2",
ServiceDiscoveryEndpoint: svcDiscoveryEndpointName,
EnvVersion: "v1.42.0",
},
})
tpl, err := serializer.Template()
require.NoError(t, err, "template should render")
regExpGUID := regexp.MustCompile(`([a-f\d]{8}-)([a-f\d]{4}-){3}([a-f\d]{12})`) // Matches random guids
t.Run("CF template should be equal", func(t *testing.T) {
actualBytes := []byte(tpl)
// Cut random GUID from template.
actualBytes = regExpGUID.ReplaceAll(actualBytes, []byte("RandomGUID"))
mActual := make(map[interface{}]interface{})
require.NoError(t, yaml.Unmarshal(actualBytes, mActual))
expected, err := os.ReadFile(filepath.Join("testdata", "workloads", windowsSvcStackPath))
require.NoError(t, err, "should be able to read expected bytes")
expectedBytes := []byte(expected)
mExpected := make(map[interface{}]interface{})
require.NoError(t, yaml.Unmarshal(expectedBytes, mExpected))
resetCustomResourceLocations(mActual)
compareStackTemplate(t, mExpected, mActual)
})
t.Run("Parameter values should render properly", func(t *testing.T) {
actualParams, err := serializer.SerializedParameters()
require.NoError(t, err)
path := filepath.Join("testdata", "workloads", windowsSvcParamsPath)
wantedCFNParamsBytes, error := os.ReadFile(path)
require.NoError(t, error)
require.Equal(t, string(wantedCFNParamsBytes), actualParams)
})
}
| 115 |
copilot-cli | aws | Go | //go:build integration || localintegration
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
// SPDX-License-Identifier: Apache-2.0
package stack_test
import (
"fmt"
"os"
"path/filepath"
"regexp"
"testing"
"github.com/aws/aws-sdk-go/aws"
"github.com/aws/aws-sdk-go/aws/session"
"github.com/aws/copilot-cli/internal/pkg/addon"
"github.com/aws/copilot-cli/internal/pkg/config"
"github.com/aws/copilot-cli/internal/pkg/deploy/cloudformation/stack"
"github.com/aws/copilot-cli/internal/pkg/manifest"
"github.com/aws/copilot-cli/internal/pkg/workspace"
"github.com/spf13/afero"
"github.com/stretchr/testify/require"
"gopkg.in/yaml.v3"
)
const (
workerManifestPath = "worker-manifest.yml"
workerStackPath = "worker-test.stack.yml"
workerParamsPath = "worker-test.params.json"
)
func TestWorkerService_Template(t *testing.T) {
path := filepath.Join("testdata", "workloads", workerManifestPath)
manifestBytes, err := os.ReadFile(path)
require.NoError(t, err)
mft, err := manifest.UnmarshalWorkload(manifestBytes)
require.NoError(t, err)
envMft, err := mft.ApplyEnv(envName)
require.NoError(t, err)
err = envMft.Validate()
require.NoError(t, err)
err = envMft.Load(session.New())
require.NoError(t, err)
content := envMft.Manifest()
v, ok := content.(*manifest.WorkerService)
require.True(t, ok)
// Create in-memory mock file system.
wd, err := os.Getwd()
require.NoError(t, err)
fs := afero.NewMemMapFs()
_ = fs.MkdirAll(fmt.Sprintf("%s/copilot", wd), 0755)
_ = afero.WriteFile(fs, fmt.Sprintf("%s/copilot/.workspace", wd), []byte(fmt.Sprintf("---\napplication: %s", "DavidsApp")), 0644)
require.NoError(t, err)
ws, err := workspace.Use(fs)
require.NoError(t, err)
_, err = addon.ParseFromWorkload(aws.StringValue(v.Name), ws)
var notFound *addon.ErrAddonsNotFound
require.ErrorAs(t, err, ¬Found)
serializer, err := stack.NewWorkerService(stack.WorkerServiceConfig{
App: &config.Application{
Name: appName,
},
Env: envName,
Manifest: v,
ArtifactBucketName: "bucket",
RawManifest: manifestBytes,
RuntimeConfig: stack.RuntimeConfig{
ServiceDiscoveryEndpoint: "test.my-app.local",
AccountID: "123456789123",
Region: "us-west-2",
EnvVersion: "v1.42.0",
},
})
tpl, err := serializer.Template()
require.NoError(t, err, "template should render")
regExpGUID := regexp.MustCompile(`([a-f\d]{8}-)([a-f\d]{4}-){3}([a-f\d]{12})`) // Matches random guids
t.Run("CF Template should be equal", func(t *testing.T) {
actualBytes := []byte(tpl)
// Cut random GUID from template.
actualBytes = regExpGUID.ReplaceAll(actualBytes, []byte("RandomGUID"))
mActual := make(map[interface{}]interface{})
require.NoError(t, yaml.Unmarshal(actualBytes, mActual))
expected, err := os.ReadFile(filepath.Join("testdata", "workloads", workerStackPath))
require.NoError(t, err, "should be able to read expected bytes")
mExpected := make(map[interface{}]interface{})
require.NoError(t, yaml.Unmarshal(expected, mExpected))
resetCustomResourceLocations(mActual)
compareStackTemplate(t, mExpected, mActual)
})
t.Run("Parameter values should render properly", func(t *testing.T) {
actualParams, err := serializer.SerializedParameters()
require.NoError(t, err)
path := filepath.Join("testdata", "workloads", workerParamsPath)
wantedCFNParamsBytes, err := os.ReadFile(path)
require.NoError(t, err)
require.Equal(t, string(wantedCFNParamsBytes), actualParams)
})
}
| 113 |
copilot-cli | aws | Go | // Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
// SPDX-License-Identifier: Apache-2.0
package stack
import (
"fmt"
"strings"
"github.com/aws/copilot-cli/internal/pkg/deploy/upload/customresource"
"github.com/aws/aws-sdk-go/aws"
"github.com/aws/aws-sdk-go/service/cloudformation"
"github.com/aws/copilot-cli/internal/pkg/config"
"github.com/aws/copilot-cli/internal/pkg/manifest"
"github.com/aws/copilot-cli/internal/pkg/manifest/manifestinfo"
"github.com/aws/copilot-cli/internal/pkg/template"
"github.com/aws/copilot-cli/internal/pkg/template/override"
)
// WorkerService represents the configuration needed to create a CloudFormation stack from a worker service manifest.
type WorkerService struct {
*ecsWkld
manifest *manifest.WorkerService
parser workerSvcReadParser
}
// WorkerServiceConfig contains data required to initialize a scheduled job stack.
type WorkerServiceConfig struct {
App *config.Application
Env string
Manifest *manifest.WorkerService
ArtifactBucketName string
RawManifest []byte
RuntimeConfig RuntimeConfig
Addons NestedStackConfigurer
}
// NewWorkerService creates a new WorkerService stack from a manifest file.
func NewWorkerService(cfg WorkerServiceConfig) (*WorkerService, error) {
crs, err := customresource.Worker(fs)
if err != nil {
return nil, fmt.Errorf("worker service custom resources: %w", err)
}
cfg.RuntimeConfig.loadCustomResourceURLs(cfg.ArtifactBucketName, uploadableCRs(crs).convert())
return &WorkerService{
ecsWkld: &ecsWkld{
wkld: &wkld{
name: aws.StringValue(cfg.Manifest.Name),
env: cfg.Env,
app: cfg.App.Name,
permBound: cfg.App.PermissionsBoundary,
artifactBucketName: cfg.ArtifactBucketName,
rc: cfg.RuntimeConfig,
image: cfg.Manifest.ImageConfig.Image,
rawManifest: cfg.RawManifest,
parser: fs,
addons: cfg.Addons,
},
logging: cfg.Manifest.Logging,
sidecars: cfg.Manifest.Sidecars,
tc: cfg.Manifest.TaskConfig,
taskDefOverrideFunc: override.CloudFormationTemplate,
},
manifest: cfg.Manifest,
parser: fs,
}, nil
}
// Template returns the CloudFormation template for the worker service.
func (s *WorkerService) Template() (string, error) {
crs, err := convertCustomResources(s.rc.CustomResourcesURL)
if err != nil {
return "", err
}
addonsParams, err := s.addonsParameters()
if err != nil {
return "", err
}
addonsOutputs, err := s.addonsOutputs()
if err != nil {
return "", err
}
exposedPorts, err := s.manifest.ExposedPorts()
if err != nil {
return "", fmt.Errorf("parse exposed ports in service manifest %s: %w", s.name, err)
}
sidecars, err := convertSidecars(s.manifest.Sidecars, exposedPorts.PortsForContainer, s.rc)
if err != nil {
return "", fmt.Errorf("convert the sidecar configuration for service %s: %w", s.name, err)
}
advancedCount, err := convertAdvancedCount(s.manifest.Count.AdvancedCount)
if err != nil {
return "", fmt.Errorf("convert the advanced count configuration for service %s: %w", s.name, err)
}
var autoscaling *template.AutoscalingOpts
var desiredCountOnSpot *int
var capacityProviders []*template.CapacityProviderStrategy
if advancedCount != nil {
autoscaling = advancedCount.Autoscaling
desiredCountOnSpot = advancedCount.Spot
capacityProviders = advancedCount.Cps
}
entrypoint, err := convertEntryPoint(s.manifest.EntryPoint)
if err != nil {
return "", err
}
command, err := convertCommand(s.manifest.Command)
if err != nil {
return "", err
}
subscribe, err := convertSubscribe(s.manifest)
if err != nil {
return "", err
}
publishers, err := convertPublish(s.manifest.Publish(), s.rc.AccountID, s.rc.Region, s.app, s.env, s.name)
if err != nil {
return "", fmt.Errorf(`convert "publish" field for service %s: %w`, s.name, err)
}
var scConfig *template.ServiceConnect
if s.manifest.Network.Connect.Enabled() {
scConfig = convertServiceConnect(s.manifest.Network.Connect)
}
content, err := s.parser.ParseWorkerService(template.WorkloadOpts{
AppName: s.app,
EnvName: s.env,
WorkloadName: s.name,
SerializedManifest: string(s.rawManifest),
EnvVersion: s.rc.EnvVersion,
Variables: convertEnvVars(s.manifest.WorkerServiceConfig.Variables),
Secrets: convertSecrets(s.manifest.WorkerServiceConfig.Secrets),
NestedStack: addonsOutputs,
AddonsExtraParams: addonsParams,
Sidecars: sidecars,
Autoscaling: autoscaling,
CapacityProviders: capacityProviders,
DesiredCountOnSpot: desiredCountOnSpot,
ExecuteCommand: convertExecuteCommand(&s.manifest.ExecuteCommand),
WorkloadType: manifestinfo.WorkerServiceType,
HealthCheck: convertContainerHealthCheck(s.manifest.WorkerServiceConfig.ImageConfig.HealthCheck),
LogConfig: convertLogging(s.manifest.Logging),
DockerLabels: s.manifest.ImageConfig.Image.DockerLabels,
CustomResources: crs,
Storage: convertStorageOpts(s.manifest.Name, s.manifest.Storage),
Network: convertNetworkConfig(s.manifest.Network),
DeploymentConfiguration: convertWorkerDeploymentConfig(s.manifest.WorkerServiceConfig.DeployConfig),
EntryPoint: entrypoint,
ServiceConnect: scConfig,
Command: command,
DependsOn: convertDependsOn(s.manifest.ImageConfig.Image.DependsOn),
CredentialsParameter: aws.StringValue(s.manifest.ImageConfig.Image.Credentials),
ServiceDiscoveryEndpoint: s.rc.ServiceDiscoveryEndpoint,
Subscribe: subscribe,
Publish: publishers,
Platform: convertPlatform(s.manifest.Platform),
Observability: template.ObservabilityOpts{
Tracing: strings.ToUpper(aws.StringValue(s.manifest.Observability.Tracing)),
},
PermissionsBoundary: s.permBound,
})
if err != nil {
return "", fmt.Errorf("parse worker service template: %w", err)
}
overriddenTpl, err := s.taskDefOverrideFunc(convertTaskDefOverrideRules(s.manifest.TaskDefOverrides), content.Bytes())
if err != nil {
return "", fmt.Errorf("apply task definition overrides: %w", err)
}
return string(overriddenTpl), nil
}
// Parameters returns the list of CloudFormation parameters used by the template.
func (s *WorkerService) Parameters() ([]*cloudformation.Parameter, error) {
wkldParams, err := s.ecsWkld.Parameters()
if err != nil {
return nil, err
}
return wkldParams, nil
}
// SerializedParameters returns the CloudFormation stack's parameters serialized to a JSON document.
func (s *WorkerService) SerializedParameters() (string, error) {
return serializeTemplateConfig(s.wkld.parser, s)
}
| 190 |
copilot-cli | aws | Go | // Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
// SPDX-License-Identifier: Apache-2.0
package stack
import (
"bytes"
"errors"
"fmt"
"testing"
"github.com/aws/copilot-cli/internal/pkg/addon"
"github.com/aws/copilot-cli/internal/pkg/manifest/manifestinfo"
"github.com/aws/aws-sdk-go/aws"
"github.com/aws/aws-sdk-go/service/cloudformation"
"github.com/aws/copilot-cli/internal/pkg/deploy/cloudformation/stack/mocks"
"github.com/aws/copilot-cli/internal/pkg/manifest"
"github.com/aws/copilot-cli/internal/pkg/template"
"github.com/golang/mock/gomock"
"github.com/stretchr/testify/require"
)
func TestWorkerService_Template(t *testing.T) {
baseProps := manifest.WorkerServiceProps{
WorkloadProps: manifest.WorkloadProps{
Name: testServiceName,
Dockerfile: testDockerfile,
},
}
testCases := map[string]struct {
mockDependencies func(t *testing.T, ctrl *gomock.Controller, svc *WorkerService)
setUpManifest func(svc *WorkerService)
wantedTemplate string
wantedErr error
}{
"unexpected addons template parsing error": {
mockDependencies: func(t *testing.T, ctrl *gomock.Controller, svc *WorkerService) {
svc.addons = mockAddons{tplErr: errors.New("some error")}
},
wantedErr: fmt.Errorf("generate addons template for %s: %w", testServiceName, errors.New("some error")),
},
"unexpected addons params parsing error": {
mockDependencies: func(t *testing.T, ctrl *gomock.Controller, svc *WorkerService) {
svc.addons = mockAddons{paramsErr: errors.New("some error")}
},
wantedErr: fmt.Errorf("parse addons parameters for %s: %w", testServiceName, errors.New("some error")),
},
"failed parsing sidecars template": {
setUpManifest: func(svc *WorkerService) {
testWorkerSvcManifestWithBadSidecar := manifest.NewWorkerService(baseProps)
testWorkerSvcManifestWithBadSidecar.Sidecars = map[string]*manifest.SidecarConfig{
"xray": {
Port: aws.String("80/80/80"),
},
}
svc.manifest = testWorkerSvcManifestWithBadSidecar
},
mockDependencies: func(t *testing.T, ctrl *gomock.Controller, svc *WorkerService) {
svc.addons = mockAddons{
tpl: `
Resources:
AdditionalResourcesPolicy:
Type: AWS::IAM::ManagedPolicy
Outputs:
AdditionalResourcesPolicyArn:
Value: hello`,
}
},
wantedErr: fmt.Errorf("parse exposed ports in service manifest frontend: cannot parse port mapping from 80/80/80"),
},
"failed parsing Auto Scaling template": {
setUpManifest: func(svc *WorkerService) {
testWorkerSvcManifestWithBadAutoScaling := manifest.NewWorkerService(baseProps)
badRange := manifest.IntRangeBand("badRange")
testWorkerSvcManifestWithBadAutoScaling.Count.AdvancedCount = manifest.AdvancedCount{
Range: manifest.Range{
Value: &badRange,
},
}
svc.manifest = testWorkerSvcManifestWithBadAutoScaling
},
mockDependencies: func(t *testing.T, ctrl *gomock.Controller, svc *WorkerService) {
svc.addons = mockAddons{
tpl: `
Resources:
AdditionalResourcesPolicy:
Type: AWS::IAM::ManagedPolicy
Outputs:
AdditionalResourcesPolicyArn:
Value: hello`,
}
},
wantedErr: fmt.Errorf("convert the advanced count configuration for service frontend: %w", errors.New("invalid range value badRange. Should be in format of ${min}-${max}")),
},
"failed parsing svc template": {
setUpManifest: func(svc *WorkerService) {
svc.manifest = manifest.NewWorkerService(baseProps)
},
mockDependencies: func(t *testing.T, ctrl *gomock.Controller, svc *WorkerService) {
m := mocks.NewMockworkerSvcReadParser(ctrl)
m.EXPECT().ParseWorkerService(gomock.Any()).Return(nil, errors.New("some error"))
svc.parser = m
svc.addons = mockAddons{
tpl: `
Resources:
AdditionalResourcesPolicy:
Type: AWS::IAM::ManagedPolicy
Outputs:
AdditionalResourcesPolicyArn:
Value: hello`,
}
},
wantedErr: fmt.Errorf("parse worker service template: %w", errors.New("some error")),
},
"render template": {
setUpManifest: func(svc *WorkerService) {
svc.manifest = manifest.NewWorkerService(manifest.WorkerServiceProps{
WorkloadProps: manifest.WorkloadProps{
Name: testServiceName,
Dockerfile: testDockerfile,
},
HealthCheck: manifest.ContainerHealthCheck{
Command: []string{"CMD-SHELL", "curl -f http://localhost/ || exit 1"},
Interval: &testInterval,
Retries: &testRetries,
Timeout: &testTimeout,
StartPeriod: &testStartPeriod,
},
})
svc.manifest.EntryPoint = manifest.EntryPointOverride{
String: nil,
StringSlice: []string{"enter", "from"},
}
svc.manifest.Command = manifest.CommandOverride{
String: nil,
StringSlice: []string{"here"},
}
svc.manifest.ExecuteCommand = manifest.ExecuteCommand{Enable: aws.Bool(true)}
svc.manifest.DeployConfig = manifest.WorkerDeploymentConfig{
DeploymentControllerConfig: manifest.DeploymentControllerConfig{
Rolling: aws.String("default"),
},
WorkerRollbackAlarms: manifest.AdvancedToUnion[[]string, manifest.WorkerAlarmArgs](
manifest.WorkerAlarmArgs{
MessagesDelayed: aws.Int(10),
})}
},
mockDependencies: func(t *testing.T, ctrl *gomock.Controller, svc *WorkerService) {
m := mocks.NewMockworkerSvcReadParser(ctrl)
m.EXPECT().ParseWorkerService(gomock.Any()).DoAndReturn(func(actual template.WorkloadOpts) (*template.Content, error) {
require.Equal(t, template.WorkloadOpts{
AppName: "phonetool",
EnvName: "test",
WorkloadName: "frontend",
WorkloadType: manifestinfo.WorkerServiceType,
HealthCheck: &template.ContainerHealthCheck{
Command: []string{"CMD-SHELL", "curl -f http://localhost/ || exit 1"},
Interval: aws.Int64(5),
Retries: aws.Int64(3),
StartPeriod: aws.Int64(0),
Timeout: aws.Int64(10),
},
CustomResources: make(map[string]template.S3ObjectLocation),
ExecuteCommand: &template.ExecuteCommandOpts{},
NestedStack: &template.WorkloadNestedStackOpts{
StackName: addon.StackName,
VariableOutputs: []string{"MyTable"},
},
Network: template.NetworkOpts{
AssignPublicIP: template.DisablePublicIP,
SubnetsType: template.PrivateSubnetsPlacement,
SecurityGroups: []template.SecurityGroup{},
},
DeploymentConfiguration: template.DeploymentConfigurationOpts{
MinHealthyPercent: 100,
MaxPercent: 200,
Rollback: template.RollingUpdateRollbackConfig{MessagesDelayed: aws.Int(10)},
},
EntryPoint: []string{"enter", "from"},
Command: []string{"here"},
}, actual)
return &template.Content{Buffer: bytes.NewBufferString("template")}, nil
})
svc.parser = m
svc.addons = mockAddons{
tpl: `
Resources:
MyTable:
Type: AWS::DynamoDB::Table
Outputs:
MyTable:
Value: !Ref MyTable`,
}
},
wantedTemplate: "template",
},
}
for name, tc := range testCases {
t.Run(name, func(t *testing.T) {
// GIVEN
ctrl := gomock.NewController(t)
defer ctrl.Finish()
conf := &WorkerService{
ecsWkld: &ecsWkld{
wkld: &wkld{
name: testServiceName,
env: testEnvName,
app: testAppName,
rc: RuntimeConfig{
PushedImages: map[string]ECRImage{
testServiceName: {
RepoURL: testImageRepoURL,
ImageTag: testImageTag,
},
},
AccountID: "0123456789012",
Region: "us-west-2",
},
},
taskDefOverrideFunc: mockCloudFormationOverrideFunc,
},
}
if tc.setUpManifest != nil {
tc.setUpManifest(conf)
conf.manifest.Network.VPC.Placement = manifest.PlacementArgOrString{
PlacementString: &testPrivatePlacement,
}
conf.manifest.Network.VPC.SecurityGroups = manifest.SecurityGroupsIDsOrConfig{}
}
tc.mockDependencies(t, ctrl, conf)
// WHEN
template, err := conf.Template()
// THEN
if tc.wantedErr != nil {
require.EqualError(t, err, tc.wantedErr.Error())
} else {
require.NoError(t, err)
require.Equal(t, tc.wantedTemplate, template)
}
})
}
}
func TestWorkerService_Parameters(t *testing.T) {
testWorkerSvcManifest := manifest.NewWorkerService(manifest.WorkerServiceProps{
WorkloadProps: manifest.WorkloadProps{
Name: testServiceName,
Dockerfile: testDockerfile,
},
HealthCheck: manifest.ContainerHealthCheck{
Command: []string{"CMD-SHELL", "curl -f http://localhost/ || exit 1"},
Interval: &testInterval,
Retries: &testRetries,
Timeout: &testTimeout,
StartPeriod: &testStartPeriod,
},
})
conf := &WorkerService{
ecsWkld: &ecsWkld{
wkld: &wkld{
name: aws.StringValue(testWorkerSvcManifest.Name),
env: testEnvName,
app: testAppName,
image: manifest.Image{
ImageLocationOrBuild: manifest.ImageLocationOrBuild{
Location: aws.String("mockLocation"),
},
},
},
tc: testWorkerSvcManifest.WorkerServiceConfig.TaskConfig,
},
manifest: testWorkerSvcManifest,
}
// WHEN
params, _ := conf.Parameters()
// THEN
require.ElementsMatch(t, []*cloudformation.Parameter{
{
ParameterKey: aws.String(WorkloadAppNameParamKey),
ParameterValue: aws.String("phonetool"),
},
{
ParameterKey: aws.String(WorkloadEnvNameParamKey),
ParameterValue: aws.String("test"),
},
{
ParameterKey: aws.String(WorkloadNameParamKey),
ParameterValue: aws.String("frontend"),
},
{
ParameterKey: aws.String(WorkloadContainerImageParamKey),
ParameterValue: aws.String("mockLocation"),
},
{
ParameterKey: aws.String(WorkloadTaskCPUParamKey),
ParameterValue: aws.String("256"),
},
{
ParameterKey: aws.String(WorkloadTaskMemoryParamKey),
ParameterValue: aws.String("512"),
},
{
ParameterKey: aws.String(WorkloadTaskCountParamKey),
ParameterValue: aws.String("1"),
},
{
ParameterKey: aws.String(WorkloadLogRetentionParamKey),
ParameterValue: aws.String("30"),
},
{
ParameterKey: aws.String(WorkloadAddonsTemplateURLParamKey),
ParameterValue: aws.String(""),
},
{
ParameterKey: aws.String(WorkloadEnvFileARNParamKey),
ParameterValue: aws.String(""),
},
}, params)
}
| 330 |
copilot-cli | aws | Go | // Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
// SPDX-License-Identifier: Apache-2.0
package stack
import (
"encoding/json"
"fmt"
"strconv"
"github.com/aws/copilot-cli/internal/pkg/aws/s3"
"github.com/aws/aws-sdk-go/aws"
"github.com/aws/aws-sdk-go/service/cloudformation"
"github.com/aws/copilot-cli/internal/pkg/addon"
"github.com/aws/copilot-cli/internal/pkg/aws/apprunner"
"github.com/aws/copilot-cli/internal/pkg/deploy"
"github.com/aws/copilot-cli/internal/pkg/manifest"
"github.com/aws/copilot-cli/internal/pkg/template"
"github.com/aws/copilot-cli/internal/pkg/template/override"
)
// Parameter logical IDs common across workloads.
const (
WorkloadAppNameParamKey = "AppName"
WorkloadEnvNameParamKey = "EnvName"
WorkloadNameParamKey = "WorkloadName"
WorkloadContainerImageParamKey = "ContainerImage"
WorkloadContainerPortParamKey = "ContainerPort"
WorkloadAddonsTemplateURLParamKey = "AddonsTemplateURL"
)
// Parameter logical IDs for workloads on ECS.
const (
WorkloadTaskCPUParamKey = "TaskCPU"
WorkloadTaskMemoryParamKey = "TaskMemory"
WorkloadTaskCountParamKey = "TaskCount"
WorkloadLogRetentionParamKey = "LogRetention"
WorkloadEnvFileARNParamKey = "EnvFileARN"
WorkloadLoggingEnvFileARNParamKey = "LoggingEnvFileARN"
FmtSidecarEnvFileARNParamKey = "EnvFileARNFor%s"
)
// Parameter logical IDs for workloads on ECS with a Load Balancer.
const (
WorkloadTargetContainerParamKey = "TargetContainer"
WorkloadTargetPortParamKey = "TargetPort"
WorkloadHTTPSParamKey = "HTTPSEnabled"
WorkloadRulePathParamKey = "RulePath"
WorkloadStickinessParamKey = "Stickiness"
)
// Parameter logical IDs for workloads on App Runner.
const (
RDWkldImageRepositoryType = "ImageRepositoryType"
RDWkldInstanceCPUParamKey = "InstanceCPU"
RDWkldInstanceMemoryParamKey = "InstanceMemory"
RDWkldInstanceRoleParamKey = "InstanceRole"
RDWkldHealthCheckPathParamKey = "HealthCheckPath"
RDWkldHealthCheckIntervalParamKey = "HealthCheckInterval"
RDWkldHealthCheckTimeoutParamKey = "HealthCheckTimeout"
RDWkldHealthCheckHealthyThresholdParamKey = "HealthCheckHealthyThreshold"
RDWkldHealthCheckUnhealthyThresholdParamKey = "HealthCheckUnhealthyThreshold"
)
const (
ecsWkldLogRetentionDefault = 30
)
// RuntimeConfig represents configuration that's defined outside of the manifest file
// that is needed to create a CloudFormation stack.
type RuntimeConfig struct {
PushedImages map[string]ECRImage // Optional. Image location in an ECR repository.
AddonsTemplateURL string // Optional. S3 object URL for the addons template.
EnvFileARNs map[string]string // Optional. S3 object ARNs for any env files. Map keys are container names.
AdditionalTags map[string]string // AdditionalTags are labels applied to resources in the workload stack.
CustomResourcesURL map[string]string // Mapping of Custom Resource Function Name to the S3 URL where the function zip file is stored.
// The target environment metadata.
ServiceDiscoveryEndpoint string // Endpoint for the service discovery namespace in the environment.
AccountID string
Region string
EnvVersion string
}
func (cfg *RuntimeConfig) loadCustomResourceURLs(bucket string, crs []uploadable) {
if len(cfg.CustomResourcesURL) != 0 {
return
}
cfg.CustomResourcesURL = make(map[string]string, len(crs))
for _, cr := range crs {
cfg.CustomResourcesURL[cr.Name()] = s3.URL(cfg.Region, bucket, cr.ArtifactPath())
}
}
// ECRImage represents configuration about the pushed ECR image that is needed to
// create a CloudFormation stack.
type ECRImage struct {
RepoURL string // RepoURL is the ECR repository URL the container image should be pushed to.
ImageTag string // Tag is the container image's unique tag.
Digest string // The image digest.
ContainerName string // The container name.
MainContainerName string // The workload's container name.
}
// URI returns the ECR image URI.
// If a tag is provided by the user or discovered from git then prioritize referring to the image via the tag.
// Otherwise, each image after a push to ECR will get a digest and we refer to the image via the digest.
// Finally, if no digest or tag is present, this occurs with the "package" commands, we default to the "latest" tag.
func (i ECRImage) URI() string {
if i.ContainerName == i.MainContainerName {
if i.ImageTag != "" {
return fmt.Sprintf("%s:%s", i.RepoURL, i.ImageTag)
}
if i.Digest != "" {
return fmt.Sprintf("%s@%s", i.RepoURL, i.Digest)
}
return fmt.Sprintf("%s:%s", i.RepoURL, "latest")
}
if i.ImageTag != "" {
return fmt.Sprintf("%s:%s-%s", i.RepoURL, i.ContainerName, i.ImageTag)
}
if i.Digest != "" {
return fmt.Sprintf("%s@%s", i.RepoURL, i.Digest)
}
return fmt.Sprintf("%s:%s-%s", i.RepoURL, i.ContainerName, "latest")
}
// NestedStackConfigurer configures a nested stack that deploys addons.
type NestedStackConfigurer interface {
Template() (string, error)
Parameters() (string, error)
}
type location interface {
GetLocation() string
}
// uploadable is the interface for an object that can be uploaded to an S3 bucket.
type uploadable interface {
Name() string
ArtifactPath() string
}
// wkld represents a generic containerized workload.
// A workload can be a long-running service, an ephemeral task, or a periodic task.
type wkld struct {
name string
env string
app string
permBound string
artifactBucketName string
rc RuntimeConfig
image location
rawManifest []byte // Content of the manifest file without any transformations.
parser template.Parser
addons NestedStackConfigurer
}
// StackName returns the name of the stack.
func (w *wkld) StackName() string {
return NameForWorkload(w.app, w.env, w.name)
}
// Parameters returns the list of CloudFormation parameters used by the template.
func (w *wkld) Parameters() ([]*cloudformation.Parameter, error) {
var img string
if w.image != nil {
img = w.image.GetLocation()
}
if w.rc.PushedImages != nil {
img = w.rc.PushedImages[w.name].URI()
}
return []*cloudformation.Parameter{
{
ParameterKey: aws.String(WorkloadAppNameParamKey),
ParameterValue: aws.String(w.app),
},
{
ParameterKey: aws.String(WorkloadEnvNameParamKey),
ParameterValue: aws.String(w.env),
},
{
ParameterKey: aws.String(WorkloadNameParamKey),
ParameterValue: aws.String(w.name),
},
{
ParameterKey: aws.String(WorkloadContainerImageParamKey),
ParameterValue: aws.String(img),
},
{
ParameterKey: aws.String(WorkloadAddonsTemplateURLParamKey),
ParameterValue: aws.String(w.rc.AddonsTemplateURL),
},
}, nil
}
// Tags returns the list of tags to apply to the CloudFormation stack.
func (w *wkld) Tags() []*cloudformation.Tag {
return mergeAndFlattenTags(w.rc.AdditionalTags, map[string]string{
deploy.AppTagKey: w.app,
deploy.EnvTagKey: w.env,
deploy.ServiceTagKey: w.name,
})
}
type templateConfigurer interface {
Parameters() ([]*cloudformation.Parameter, error)
Tags() []*cloudformation.Tag
}
func serializeTemplateConfig(parser template.Parser, stack templateConfigurer) (string, error) {
params, err := stack.Parameters()
if err != nil {
return "", err
}
tags := stack.Tags()
config := struct {
Parameters map[string]*string `json:"Parameters"`
Tags map[string]*string `json:"Tags,omitempty"`
}{
Parameters: make(map[string]*string, len(params)),
Tags: make(map[string]*string, len(tags)),
}
for _, param := range params {
config.Parameters[aws.StringValue(param.ParameterKey)] = param.ParameterValue
}
for _, tag := range tags {
config.Tags[aws.StringValue(tag.Key)] = tag.Value
}
str, err := json.MarshalIndent(config, "", " ")
if err != nil {
return "", fmt.Errorf("marshal stack parameters to JSON: %v", err)
}
return string(str), nil
}
func (w *wkld) addonsOutputs() (*template.WorkloadNestedStackOpts, error) {
if w.addons == nil {
return nil, nil
}
tmpl, err := w.addons.Template()
switch {
case err != nil:
return nil, fmt.Errorf("generate addons template for %s: %w", w.name, err)
case tmpl == "":
return nil, nil
}
out, err := addon.Outputs(tmpl)
if err != nil {
return nil, fmt.Errorf("get addons outputs for %s: %w", w.name, err)
}
return &template.WorkloadNestedStackOpts{
StackName: addon.StackName,
VariableOutputs: envVarOutputNames(out),
SecretOutputs: secretOutputNames(out),
PolicyOutputs: managedPolicyOutputNames(out),
SecurityGroupOutputs: securityGroupOutputNames(out),
}, nil
}
func (w *wkld) addonsParameters() (string, error) {
if w.addons == nil {
return "", nil
}
params, err := w.addons.Parameters()
if err != nil {
return "", fmt.Errorf("parse addons parameters for %s: %w", w.name, err)
}
return params, nil
}
func securityGroupOutputNames(outputs []addon.Output) []string {
var securityGroups []string
for _, out := range outputs {
if out.IsSecurityGroup {
securityGroups = append(securityGroups, out.Name)
}
}
return securityGroups
}
func secretOutputNames(outputs []addon.Output) []string {
var secrets []string
for _, out := range outputs {
if out.IsSecret {
secrets = append(secrets, out.Name)
}
}
return secrets
}
func managedPolicyOutputNames(outputs []addon.Output) []string {
var policies []string
for _, out := range outputs {
if out.IsManagedPolicy {
policies = append(policies, out.Name)
}
}
return policies
}
func envVarOutputNames(outputs []addon.Output) []string {
var envVars []string
for _, out := range outputs {
if !out.IsSecret && !out.IsManagedPolicy {
envVars = append(envVars, out.Name)
}
}
return envVars
}
type ecsWkld struct {
*wkld
tc manifest.TaskConfig
logging manifest.Logging
sidecars map[string]*manifest.SidecarConfig
// Overriden in unit tests.
taskDefOverrideFunc func(overrideRules []override.Rule, origTemp []byte) ([]byte, error)
}
// Parameters returns the list of CloudFormation parameters used by the template.
func (w *ecsWkld) Parameters() ([]*cloudformation.Parameter, error) {
wkldParameters, err := w.wkld.Parameters()
if err != nil {
return nil, err
}
envFileParameters := append(wkldParameters, w.envFileParams()...)
desiredCount, err := w.tc.Count.Desired()
if err != nil {
return nil, err
}
logRetention := ecsWkldLogRetentionDefault
if w.logging.Retention != nil {
logRetention = aws.IntValue(w.logging.Retention)
}
return append(envFileParameters, []*cloudformation.Parameter{
{
ParameterKey: aws.String(WorkloadTaskCPUParamKey),
ParameterValue: aws.String(strconv.Itoa(aws.IntValue(w.tc.CPU))),
},
{
ParameterKey: aws.String(WorkloadTaskMemoryParamKey),
ParameterValue: aws.String(strconv.Itoa(aws.IntValue(w.tc.Memory))),
},
{
ParameterKey: aws.String(WorkloadTaskCountParamKey),
ParameterValue: aws.String(strconv.Itoa(*desiredCount)),
},
{
ParameterKey: aws.String(WorkloadLogRetentionParamKey),
ParameterValue: aws.String(strconv.Itoa(logRetention)),
},
}...), nil
}
// envFileParams decides which containers have Environment files and gets the appropriate Environment File ARN.
// This will always at least contain the `EnvFileARN` parameter for the main workload container.
func (w *ecsWkld) envFileParams() []*cloudformation.Parameter {
params := []*cloudformation.Parameter{
{
ParameterKey: aws.String(WorkloadEnvFileARNParamKey),
ParameterValue: aws.String(w.rc.EnvFileARNs[w.name]),
},
}
// Decide whether to inject a Log container env file. If there is log configuration
// in the manifest, we should inject either an empty string or the configured env file arn,
// if it exists.
if !w.logging.IsEmpty() {
params = append(params, &cloudformation.Parameter{
ParameterKey: aws.String(WorkloadLoggingEnvFileARNParamKey),
ParameterValue: aws.String(w.rc.EnvFileARNs[manifest.FirelensContainerName]), // String maps return "" if a key doesn't exist.
})
}
for containerName := range w.sidecars {
params = append(params, &cloudformation.Parameter{
ParameterKey: aws.String(fmt.Sprintf(FmtSidecarEnvFileARNParamKey, template.StripNonAlphaNumFunc(containerName))),
ParameterValue: aws.String(w.rc.EnvFileARNs[containerName]),
})
}
return params
}
type appRunnerWkld struct {
*wkld
instanceConfig manifest.AppRunnerInstanceConfig
imageConfig manifest.ImageWithPort
healthCheckConfig manifest.HealthCheckArgsOrString
}
// Parameters returns the list of CloudFormation parameters used by the template.
func (w *appRunnerWkld) Parameters() ([]*cloudformation.Parameter, error) {
wkldParameters, err := w.wkld.Parameters()
if err != nil {
return nil, err
}
var img string
if w.image != nil {
img = w.image.GetLocation()
}
if w.rc.PushedImages != nil {
img = w.rc.PushedImages[w.name].URI()
}
imageRepositoryType, err := apprunner.DetermineImageRepositoryType(img)
if err != nil {
return nil, fmt.Errorf("determine image repository type: %w", err)
}
if w.imageConfig.Port == nil {
return nil, fmt.Errorf("field `image.port` is required for Request Driven Web Services")
}
if w.instanceConfig.CPU == nil {
return nil, fmt.Errorf("field `cpu` is required for Request Driven Web Services")
}
if w.instanceConfig.Memory == nil {
return nil, fmt.Errorf("field `memory` is required for Request Driven Web Services")
}
appRunnerParameters := []*cloudformation.Parameter{
{
ParameterKey: aws.String(RDWkldImageRepositoryType),
ParameterValue: aws.String(imageRepositoryType),
},
{
ParameterKey: aws.String(WorkloadContainerPortParamKey),
ParameterValue: aws.String(strconv.Itoa(int(aws.Uint16Value(w.imageConfig.Port)))),
},
{
ParameterKey: aws.String(RDWkldInstanceCPUParamKey),
ParameterValue: aws.String(strconv.Itoa(aws.IntValue(w.instanceConfig.CPU))),
},
{
ParameterKey: aws.String(RDWkldInstanceMemoryParamKey),
ParameterValue: aws.String(strconv.Itoa(aws.IntValue(w.instanceConfig.Memory))),
},
}
// Optional HealthCheckPath parameter
if w.healthCheckConfig.Path() != nil {
appRunnerParameters = append(appRunnerParameters, &cloudformation.Parameter{
ParameterKey: aws.String(RDWkldHealthCheckPathParamKey),
ParameterValue: aws.String(*w.healthCheckConfig.Path()),
})
}
// Optional HealthCheckInterval parameter
if w.healthCheckConfig.Advanced.Interval != nil {
appRunnerParameters = append(appRunnerParameters, &cloudformation.Parameter{
ParameterKey: aws.String(RDWkldHealthCheckIntervalParamKey),
ParameterValue: aws.String(strconv.Itoa(int(w.healthCheckConfig.Advanced.Interval.Seconds()))),
})
}
// Optional HealthCheckTimeout parameter
if w.healthCheckConfig.Advanced.Timeout != nil {
appRunnerParameters = append(appRunnerParameters, &cloudformation.Parameter{
ParameterKey: aws.String(RDWkldHealthCheckTimeoutParamKey),
ParameterValue: aws.String(strconv.Itoa(int(w.healthCheckConfig.Advanced.Timeout.Seconds()))),
})
}
// Optional HealthCheckHealthyThreshold parameter
if w.healthCheckConfig.Advanced.HealthyThreshold != nil {
appRunnerParameters = append(appRunnerParameters, &cloudformation.Parameter{
ParameterKey: aws.String(RDWkldHealthCheckHealthyThresholdParamKey),
ParameterValue: aws.String(strconv.Itoa(int(*w.healthCheckConfig.Advanced.HealthyThreshold))),
})
}
// Optional HealthCheckUnhealthyThreshold parameter
if w.healthCheckConfig.Advanced.UnhealthyThreshold != nil {
appRunnerParameters = append(appRunnerParameters, &cloudformation.Parameter{
ParameterKey: aws.String(RDWkldHealthCheckUnhealthyThresholdParamKey),
ParameterValue: aws.String(strconv.Itoa(int(*w.healthCheckConfig.Advanced.UnhealthyThreshold))),
})
}
return append(wkldParameters, appRunnerParameters...), nil
}
| 494 |
copilot-cli | aws | Go | // Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
// SPDX-License-Identifier: Apache-2.0
package stack
import (
"testing"
"github.com/stretchr/testify/require"
)
func TestECRImage_GetLocation(t *testing.T) {
testCases := map[string]struct {
in ECRImage
wanted string
}{
"should use the image tag over anything else": {
in: ECRImage{
RepoURL: "aws_account_id.dkr.ecr.us-west-2.amazonaws.com/amazonlinux",
ImageTag: "ab1f5575",
Digest: "sha256:f1d4ae3f7261a72e98c6ebefe9985cf10a0ea5bd762585a43e0700ed99863807",
},
wanted: "aws_account_id.dkr.ecr.us-west-2.amazonaws.com/amazonlinux:ab1f5575",
},
"should use the digest if no tag is provided": {
in: ECRImage{
RepoURL: "aws_account_id.dkr.ecr.us-west-2.amazonaws.com/amazonlinux",
Digest: "sha256:f1d4ae3f7261a72e98c6ebefe9985cf10a0ea5bd762585a43e0700ed99863807",
},
wanted: "aws_account_id.dkr.ecr.us-west-2.amazonaws.com/amazonlinux@sha256:f1d4ae3f7261a72e98c6ebefe9985cf10a0ea5bd762585a43e0700ed99863807",
},
"should use the latest image if nothing is provided": {
in: ECRImage{
RepoURL: "aws_account_id.dkr.ecr.us-west-2.amazonaws.com/amazonlinux",
},
wanted: "aws_account_id.dkr.ecr.us-west-2.amazonaws.com/amazonlinux:latest",
},
}
for name, tc := range testCases {
t.Run(name, func(t *testing.T) {
require.Equal(t, tc.wanted, tc.in.URI())
})
}
}
| 47 |
copilot-cli | aws | Go | // Code generated by MockGen. DO NOT EDIT.
// Source: ./internal/pkg/deploy/cloudformation/stack/embed.go
// Package mocks is a generated GoMock package.
package mocks
import (
reflect "reflect"
template "github.com/aws/copilot-cli/internal/pkg/template"
gomock "github.com/golang/mock/gomock"
)
// MockloadBalancedWebSvcReadParser is a mock of loadBalancedWebSvcReadParser interface.
type MockloadBalancedWebSvcReadParser struct {
ctrl *gomock.Controller
recorder *MockloadBalancedWebSvcReadParserMockRecorder
}
// MockloadBalancedWebSvcReadParserMockRecorder is the mock recorder for MockloadBalancedWebSvcReadParser.
type MockloadBalancedWebSvcReadParserMockRecorder struct {
mock *MockloadBalancedWebSvcReadParser
}
// NewMockloadBalancedWebSvcReadParser creates a new mock instance.
func NewMockloadBalancedWebSvcReadParser(ctrl *gomock.Controller) *MockloadBalancedWebSvcReadParser {
mock := &MockloadBalancedWebSvcReadParser{ctrl: ctrl}
mock.recorder = &MockloadBalancedWebSvcReadParserMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockloadBalancedWebSvcReadParser) EXPECT() *MockloadBalancedWebSvcReadParserMockRecorder {
return m.recorder
}
// Parse mocks base method.
func (m *MockloadBalancedWebSvcReadParser) Parse(path string, data interface{}, options ...template.ParseOption) (*template.Content, error) {
m.ctrl.T.Helper()
varargs := []interface{}{path, data}
for _, a := range options {
varargs = append(varargs, a)
}
ret := m.ctrl.Call(m, "Parse", varargs...)
ret0, _ := ret[0].(*template.Content)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// Parse indicates an expected call of Parse.
func (mr *MockloadBalancedWebSvcReadParserMockRecorder) Parse(path, data interface{}, options ...interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
varargs := append([]interface{}{path, data}, options...)
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Parse", reflect.TypeOf((*MockloadBalancedWebSvcReadParser)(nil).Parse), varargs...)
}
// ParseLoadBalancedWebService mocks base method.
func (m *MockloadBalancedWebSvcReadParser) ParseLoadBalancedWebService(arg0 template.WorkloadOpts) (*template.Content, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "ParseLoadBalancedWebService", arg0)
ret0, _ := ret[0].(*template.Content)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// ParseLoadBalancedWebService indicates an expected call of ParseLoadBalancedWebService.
func (mr *MockloadBalancedWebSvcReadParserMockRecorder) ParseLoadBalancedWebService(arg0 interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ParseLoadBalancedWebService", reflect.TypeOf((*MockloadBalancedWebSvcReadParser)(nil).ParseLoadBalancedWebService), arg0)
}
// Read mocks base method.
func (m *MockloadBalancedWebSvcReadParser) Read(path string) (*template.Content, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "Read", path)
ret0, _ := ret[0].(*template.Content)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// Read indicates an expected call of Read.
func (mr *MockloadBalancedWebSvcReadParserMockRecorder) Read(path interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Read", reflect.TypeOf((*MockloadBalancedWebSvcReadParser)(nil).Read), path)
}
// MockbackendSvcReadParser is a mock of backendSvcReadParser interface.
type MockbackendSvcReadParser struct {
ctrl *gomock.Controller
recorder *MockbackendSvcReadParserMockRecorder
}
// MockbackendSvcReadParserMockRecorder is the mock recorder for MockbackendSvcReadParser.
type MockbackendSvcReadParserMockRecorder struct {
mock *MockbackendSvcReadParser
}
// NewMockbackendSvcReadParser creates a new mock instance.
func NewMockbackendSvcReadParser(ctrl *gomock.Controller) *MockbackendSvcReadParser {
mock := &MockbackendSvcReadParser{ctrl: ctrl}
mock.recorder = &MockbackendSvcReadParserMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockbackendSvcReadParser) EXPECT() *MockbackendSvcReadParserMockRecorder {
return m.recorder
}
// Parse mocks base method.
func (m *MockbackendSvcReadParser) Parse(path string, data interface{}, options ...template.ParseOption) (*template.Content, error) {
m.ctrl.T.Helper()
varargs := []interface{}{path, data}
for _, a := range options {
varargs = append(varargs, a)
}
ret := m.ctrl.Call(m, "Parse", varargs...)
ret0, _ := ret[0].(*template.Content)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// Parse indicates an expected call of Parse.
func (mr *MockbackendSvcReadParserMockRecorder) Parse(path, data interface{}, options ...interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
varargs := append([]interface{}{path, data}, options...)
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Parse", reflect.TypeOf((*MockbackendSvcReadParser)(nil).Parse), varargs...)
}
// ParseBackendService mocks base method.
func (m *MockbackendSvcReadParser) ParseBackendService(arg0 template.WorkloadOpts) (*template.Content, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "ParseBackendService", arg0)
ret0, _ := ret[0].(*template.Content)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// ParseBackendService indicates an expected call of ParseBackendService.
func (mr *MockbackendSvcReadParserMockRecorder) ParseBackendService(arg0 interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ParseBackendService", reflect.TypeOf((*MockbackendSvcReadParser)(nil).ParseBackendService), arg0)
}
// Read mocks base method.
func (m *MockbackendSvcReadParser) Read(path string) (*template.Content, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "Read", path)
ret0, _ := ret[0].(*template.Content)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// Read indicates an expected call of Read.
func (mr *MockbackendSvcReadParserMockRecorder) Read(path interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Read", reflect.TypeOf((*MockbackendSvcReadParser)(nil).Read), path)
}
// MockrequestDrivenWebSvcReadParser is a mock of requestDrivenWebSvcReadParser interface.
type MockrequestDrivenWebSvcReadParser struct {
ctrl *gomock.Controller
recorder *MockrequestDrivenWebSvcReadParserMockRecorder
}
// MockrequestDrivenWebSvcReadParserMockRecorder is the mock recorder for MockrequestDrivenWebSvcReadParser.
type MockrequestDrivenWebSvcReadParserMockRecorder struct {
mock *MockrequestDrivenWebSvcReadParser
}
// NewMockrequestDrivenWebSvcReadParser creates a new mock instance.
func NewMockrequestDrivenWebSvcReadParser(ctrl *gomock.Controller) *MockrequestDrivenWebSvcReadParser {
mock := &MockrequestDrivenWebSvcReadParser{ctrl: ctrl}
mock.recorder = &MockrequestDrivenWebSvcReadParserMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockrequestDrivenWebSvcReadParser) EXPECT() *MockrequestDrivenWebSvcReadParserMockRecorder {
return m.recorder
}
// Parse mocks base method.
func (m *MockrequestDrivenWebSvcReadParser) Parse(path string, data interface{}, options ...template.ParseOption) (*template.Content, error) {
m.ctrl.T.Helper()
varargs := []interface{}{path, data}
for _, a := range options {
varargs = append(varargs, a)
}
ret := m.ctrl.Call(m, "Parse", varargs...)
ret0, _ := ret[0].(*template.Content)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// Parse indicates an expected call of Parse.
func (mr *MockrequestDrivenWebSvcReadParserMockRecorder) Parse(path, data interface{}, options ...interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
varargs := append([]interface{}{path, data}, options...)
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Parse", reflect.TypeOf((*MockrequestDrivenWebSvcReadParser)(nil).Parse), varargs...)
}
// ParseRequestDrivenWebService mocks base method.
func (m *MockrequestDrivenWebSvcReadParser) ParseRequestDrivenWebService(arg0 template.WorkloadOpts) (*template.Content, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "ParseRequestDrivenWebService", arg0)
ret0, _ := ret[0].(*template.Content)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// ParseRequestDrivenWebService indicates an expected call of ParseRequestDrivenWebService.
func (mr *MockrequestDrivenWebSvcReadParserMockRecorder) ParseRequestDrivenWebService(arg0 interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ParseRequestDrivenWebService", reflect.TypeOf((*MockrequestDrivenWebSvcReadParser)(nil).ParseRequestDrivenWebService), arg0)
}
// Read mocks base method.
func (m *MockrequestDrivenWebSvcReadParser) Read(path string) (*template.Content, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "Read", path)
ret0, _ := ret[0].(*template.Content)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// Read indicates an expected call of Read.
func (mr *MockrequestDrivenWebSvcReadParserMockRecorder) Read(path interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Read", reflect.TypeOf((*MockrequestDrivenWebSvcReadParser)(nil).Read), path)
}
// MockworkerSvcReadParser is a mock of workerSvcReadParser interface.
type MockworkerSvcReadParser struct {
ctrl *gomock.Controller
recorder *MockworkerSvcReadParserMockRecorder
}
// MockworkerSvcReadParserMockRecorder is the mock recorder for MockworkerSvcReadParser.
type MockworkerSvcReadParserMockRecorder struct {
mock *MockworkerSvcReadParser
}
// NewMockworkerSvcReadParser creates a new mock instance.
func NewMockworkerSvcReadParser(ctrl *gomock.Controller) *MockworkerSvcReadParser {
mock := &MockworkerSvcReadParser{ctrl: ctrl}
mock.recorder = &MockworkerSvcReadParserMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockworkerSvcReadParser) EXPECT() *MockworkerSvcReadParserMockRecorder {
return m.recorder
}
// Parse mocks base method.
func (m *MockworkerSvcReadParser) Parse(path string, data interface{}, options ...template.ParseOption) (*template.Content, error) {
m.ctrl.T.Helper()
varargs := []interface{}{path, data}
for _, a := range options {
varargs = append(varargs, a)
}
ret := m.ctrl.Call(m, "Parse", varargs...)
ret0, _ := ret[0].(*template.Content)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// Parse indicates an expected call of Parse.
func (mr *MockworkerSvcReadParserMockRecorder) Parse(path, data interface{}, options ...interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
varargs := append([]interface{}{path, data}, options...)
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Parse", reflect.TypeOf((*MockworkerSvcReadParser)(nil).Parse), varargs...)
}
// ParseWorkerService mocks base method.
func (m *MockworkerSvcReadParser) ParseWorkerService(arg0 template.WorkloadOpts) (*template.Content, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "ParseWorkerService", arg0)
ret0, _ := ret[0].(*template.Content)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// ParseWorkerService indicates an expected call of ParseWorkerService.
func (mr *MockworkerSvcReadParserMockRecorder) ParseWorkerService(arg0 interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ParseWorkerService", reflect.TypeOf((*MockworkerSvcReadParser)(nil).ParseWorkerService), arg0)
}
// Read mocks base method.
func (m *MockworkerSvcReadParser) Read(path string) (*template.Content, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "Read", path)
ret0, _ := ret[0].(*template.Content)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// Read indicates an expected call of Read.
func (mr *MockworkerSvcReadParserMockRecorder) Read(path interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Read", reflect.TypeOf((*MockworkerSvcReadParser)(nil).Read), path)
}
// MockstaticSiteReadParser is a mock of staticSiteReadParser interface.
type MockstaticSiteReadParser struct {
ctrl *gomock.Controller
recorder *MockstaticSiteReadParserMockRecorder
}
// MockstaticSiteReadParserMockRecorder is the mock recorder for MockstaticSiteReadParser.
type MockstaticSiteReadParserMockRecorder struct {
mock *MockstaticSiteReadParser
}
// NewMockstaticSiteReadParser creates a new mock instance.
func NewMockstaticSiteReadParser(ctrl *gomock.Controller) *MockstaticSiteReadParser {
mock := &MockstaticSiteReadParser{ctrl: ctrl}
mock.recorder = &MockstaticSiteReadParserMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockstaticSiteReadParser) EXPECT() *MockstaticSiteReadParserMockRecorder {
return m.recorder
}
// Parse mocks base method.
func (m *MockstaticSiteReadParser) Parse(path string, data interface{}, options ...template.ParseOption) (*template.Content, error) {
m.ctrl.T.Helper()
varargs := []interface{}{path, data}
for _, a := range options {
varargs = append(varargs, a)
}
ret := m.ctrl.Call(m, "Parse", varargs...)
ret0, _ := ret[0].(*template.Content)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// Parse indicates an expected call of Parse.
func (mr *MockstaticSiteReadParserMockRecorder) Parse(path, data interface{}, options ...interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
varargs := append([]interface{}{path, data}, options...)
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Parse", reflect.TypeOf((*MockstaticSiteReadParser)(nil).Parse), varargs...)
}
// ParseStaticSite mocks base method.
func (m *MockstaticSiteReadParser) ParseStaticSite(arg0 template.WorkloadOpts) (*template.Content, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "ParseStaticSite", arg0)
ret0, _ := ret[0].(*template.Content)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// ParseStaticSite indicates an expected call of ParseStaticSite.
func (mr *MockstaticSiteReadParserMockRecorder) ParseStaticSite(arg0 interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ParseStaticSite", reflect.TypeOf((*MockstaticSiteReadParser)(nil).ParseStaticSite), arg0)
}
// Read mocks base method.
func (m *MockstaticSiteReadParser) Read(path string) (*template.Content, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "Read", path)
ret0, _ := ret[0].(*template.Content)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// Read indicates an expected call of Read.
func (mr *MockstaticSiteReadParserMockRecorder) Read(path interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Read", reflect.TypeOf((*MockstaticSiteReadParser)(nil).Read), path)
}
// MockscheduledJobReadParser is a mock of scheduledJobReadParser interface.
type MockscheduledJobReadParser struct {
ctrl *gomock.Controller
recorder *MockscheduledJobReadParserMockRecorder
}
// MockscheduledJobReadParserMockRecorder is the mock recorder for MockscheduledJobReadParser.
type MockscheduledJobReadParserMockRecorder struct {
mock *MockscheduledJobReadParser
}
// NewMockscheduledJobReadParser creates a new mock instance.
func NewMockscheduledJobReadParser(ctrl *gomock.Controller) *MockscheduledJobReadParser {
mock := &MockscheduledJobReadParser{ctrl: ctrl}
mock.recorder = &MockscheduledJobReadParserMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockscheduledJobReadParser) EXPECT() *MockscheduledJobReadParserMockRecorder {
return m.recorder
}
// Parse mocks base method.
func (m *MockscheduledJobReadParser) Parse(path string, data interface{}, options ...template.ParseOption) (*template.Content, error) {
m.ctrl.T.Helper()
varargs := []interface{}{path, data}
for _, a := range options {
varargs = append(varargs, a)
}
ret := m.ctrl.Call(m, "Parse", varargs...)
ret0, _ := ret[0].(*template.Content)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// Parse indicates an expected call of Parse.
func (mr *MockscheduledJobReadParserMockRecorder) Parse(path, data interface{}, options ...interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
varargs := append([]interface{}{path, data}, options...)
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Parse", reflect.TypeOf((*MockscheduledJobReadParser)(nil).Parse), varargs...)
}
// ParseScheduledJob mocks base method.
func (m *MockscheduledJobReadParser) ParseScheduledJob(arg0 template.WorkloadOpts) (*template.Content, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "ParseScheduledJob", arg0)
ret0, _ := ret[0].(*template.Content)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// ParseScheduledJob indicates an expected call of ParseScheduledJob.
func (mr *MockscheduledJobReadParserMockRecorder) ParseScheduledJob(arg0 interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ParseScheduledJob", reflect.TypeOf((*MockscheduledJobReadParser)(nil).ParseScheduledJob), arg0)
}
// Read mocks base method.
func (m *MockscheduledJobReadParser) Read(path string) (*template.Content, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "Read", path)
ret0, _ := ret[0].(*template.Content)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// Read indicates an expected call of Read.
func (mr *MockscheduledJobReadParserMockRecorder) Read(path interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Read", reflect.TypeOf((*MockscheduledJobReadParser)(nil).Read), path)
}
// MockenvReadParser is a mock of envReadParser interface.
type MockenvReadParser struct {
ctrl *gomock.Controller
recorder *MockenvReadParserMockRecorder
}
// MockenvReadParserMockRecorder is the mock recorder for MockenvReadParser.
type MockenvReadParserMockRecorder struct {
mock *MockenvReadParser
}
// NewMockenvReadParser creates a new mock instance.
func NewMockenvReadParser(ctrl *gomock.Controller) *MockenvReadParser {
mock := &MockenvReadParser{ctrl: ctrl}
mock.recorder = &MockenvReadParserMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockenvReadParser) EXPECT() *MockenvReadParserMockRecorder {
return m.recorder
}
// Parse mocks base method.
func (m *MockenvReadParser) Parse(path string, data interface{}, options ...template.ParseOption) (*template.Content, error) {
m.ctrl.T.Helper()
varargs := []interface{}{path, data}
for _, a := range options {
varargs = append(varargs, a)
}
ret := m.ctrl.Call(m, "Parse", varargs...)
ret0, _ := ret[0].(*template.Content)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// Parse indicates an expected call of Parse.
func (mr *MockenvReadParserMockRecorder) Parse(path, data interface{}, options ...interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
varargs := append([]interface{}{path, data}, options...)
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Parse", reflect.TypeOf((*MockenvReadParser)(nil).Parse), varargs...)
}
// ParseEnv mocks base method.
func (m *MockenvReadParser) ParseEnv(data *template.EnvOpts) (*template.Content, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "ParseEnv", data)
ret0, _ := ret[0].(*template.Content)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// ParseEnv indicates an expected call of ParseEnv.
func (mr *MockenvReadParserMockRecorder) ParseEnv(data interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ParseEnv", reflect.TypeOf((*MockenvReadParser)(nil).ParseEnv), data)
}
// ParseEnvBootstrap mocks base method.
func (m *MockenvReadParser) ParseEnvBootstrap(data *template.EnvOpts, options ...template.ParseOption) (*template.Content, error) {
m.ctrl.T.Helper()
varargs := []interface{}{data}
for _, a := range options {
varargs = append(varargs, a)
}
ret := m.ctrl.Call(m, "ParseEnvBootstrap", varargs...)
ret0, _ := ret[0].(*template.Content)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// ParseEnvBootstrap indicates an expected call of ParseEnvBootstrap.
func (mr *MockenvReadParserMockRecorder) ParseEnvBootstrap(data interface{}, options ...interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
varargs := append([]interface{}{data}, options...)
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ParseEnvBootstrap", reflect.TypeOf((*MockenvReadParser)(nil).ParseEnvBootstrap), varargs...)
}
// Read mocks base method.
func (m *MockenvReadParser) Read(path string) (*template.Content, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "Read", path)
ret0, _ := ret[0].(*template.Content)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// Read indicates an expected call of Read.
func (mr *MockenvReadParserMockRecorder) Read(path interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Read", reflect.TypeOf((*MockenvReadParser)(nil).Read), path)
}
// MockembedFS is a mock of embedFS interface.
type MockembedFS struct {
ctrl *gomock.Controller
recorder *MockembedFSMockRecorder
}
// MockembedFSMockRecorder is the mock recorder for MockembedFS.
type MockembedFSMockRecorder struct {
mock *MockembedFS
}
// NewMockembedFS creates a new mock instance.
func NewMockembedFS(ctrl *gomock.Controller) *MockembedFS {
mock := &MockembedFS{ctrl: ctrl}
mock.recorder = &MockembedFSMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockembedFS) EXPECT() *MockembedFSMockRecorder {
return m.recorder
}
// Parse mocks base method.
func (m *MockembedFS) Parse(path string, data interface{}, options ...template.ParseOption) (*template.Content, error) {
m.ctrl.T.Helper()
varargs := []interface{}{path, data}
for _, a := range options {
varargs = append(varargs, a)
}
ret := m.ctrl.Call(m, "Parse", varargs...)
ret0, _ := ret[0].(*template.Content)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// Parse indicates an expected call of Parse.
func (mr *MockembedFSMockRecorder) Parse(path, data interface{}, options ...interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
varargs := append([]interface{}{path, data}, options...)
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Parse", reflect.TypeOf((*MockembedFS)(nil).Parse), varargs...)
}
// ParseBackendService mocks base method.
func (m *MockembedFS) ParseBackendService(arg0 template.WorkloadOpts) (*template.Content, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "ParseBackendService", arg0)
ret0, _ := ret[0].(*template.Content)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// ParseBackendService indicates an expected call of ParseBackendService.
func (mr *MockembedFSMockRecorder) ParseBackendService(arg0 interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ParseBackendService", reflect.TypeOf((*MockembedFS)(nil).ParseBackendService), arg0)
}
// ParseEnv mocks base method.
func (m *MockembedFS) ParseEnv(data *template.EnvOpts) (*template.Content, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "ParseEnv", data)
ret0, _ := ret[0].(*template.Content)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// ParseEnv indicates an expected call of ParseEnv.
func (mr *MockembedFSMockRecorder) ParseEnv(data interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ParseEnv", reflect.TypeOf((*MockembedFS)(nil).ParseEnv), data)
}
// ParseEnvBootstrap mocks base method.
func (m *MockembedFS) ParseEnvBootstrap(data *template.EnvOpts, options ...template.ParseOption) (*template.Content, error) {
m.ctrl.T.Helper()
varargs := []interface{}{data}
for _, a := range options {
varargs = append(varargs, a)
}
ret := m.ctrl.Call(m, "ParseEnvBootstrap", varargs...)
ret0, _ := ret[0].(*template.Content)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// ParseEnvBootstrap indicates an expected call of ParseEnvBootstrap.
func (mr *MockembedFSMockRecorder) ParseEnvBootstrap(data interface{}, options ...interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
varargs := append([]interface{}{data}, options...)
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ParseEnvBootstrap", reflect.TypeOf((*MockembedFS)(nil).ParseEnvBootstrap), varargs...)
}
// ParseLoadBalancedWebService mocks base method.
func (m *MockembedFS) ParseLoadBalancedWebService(arg0 template.WorkloadOpts) (*template.Content, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "ParseLoadBalancedWebService", arg0)
ret0, _ := ret[0].(*template.Content)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// ParseLoadBalancedWebService indicates an expected call of ParseLoadBalancedWebService.
func (mr *MockembedFSMockRecorder) ParseLoadBalancedWebService(arg0 interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ParseLoadBalancedWebService", reflect.TypeOf((*MockembedFS)(nil).ParseLoadBalancedWebService), arg0)
}
// ParseRequestDrivenWebService mocks base method.
func (m *MockembedFS) ParseRequestDrivenWebService(arg0 template.WorkloadOpts) (*template.Content, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "ParseRequestDrivenWebService", arg0)
ret0, _ := ret[0].(*template.Content)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// ParseRequestDrivenWebService indicates an expected call of ParseRequestDrivenWebService.
func (mr *MockembedFSMockRecorder) ParseRequestDrivenWebService(arg0 interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ParseRequestDrivenWebService", reflect.TypeOf((*MockembedFS)(nil).ParseRequestDrivenWebService), arg0)
}
// ParseScheduledJob mocks base method.
func (m *MockembedFS) ParseScheduledJob(arg0 template.WorkloadOpts) (*template.Content, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "ParseScheduledJob", arg0)
ret0, _ := ret[0].(*template.Content)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// ParseScheduledJob indicates an expected call of ParseScheduledJob.
func (mr *MockembedFSMockRecorder) ParseScheduledJob(arg0 interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ParseScheduledJob", reflect.TypeOf((*MockembedFS)(nil).ParseScheduledJob), arg0)
}
// ParseStaticSite mocks base method.
func (m *MockembedFS) ParseStaticSite(arg0 template.WorkloadOpts) (*template.Content, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "ParseStaticSite", arg0)
ret0, _ := ret[0].(*template.Content)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// ParseStaticSite indicates an expected call of ParseStaticSite.
func (mr *MockembedFSMockRecorder) ParseStaticSite(arg0 interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ParseStaticSite", reflect.TypeOf((*MockembedFS)(nil).ParseStaticSite), arg0)
}
// ParseWorkerService mocks base method.
func (m *MockembedFS) ParseWorkerService(arg0 template.WorkloadOpts) (*template.Content, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "ParseWorkerService", arg0)
ret0, _ := ret[0].(*template.Content)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// ParseWorkerService indicates an expected call of ParseWorkerService.
func (mr *MockembedFSMockRecorder) ParseWorkerService(arg0 interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ParseWorkerService", reflect.TypeOf((*MockembedFS)(nil).ParseWorkerService), arg0)
}
// Read mocks base method.
func (m *MockembedFS) Read(path string) (*template.Content, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "Read", path)
ret0, _ := ret[0].(*template.Content)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// Read indicates an expected call of Read.
func (mr *MockembedFSMockRecorder) Read(path interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Read", reflect.TypeOf((*MockembedFS)(nil).Read), path)
}
| 727 |
copilot-cli | aws | Go | // Code generated by MockGen. DO NOT EDIT.
// Source: ./internal/pkg/deploy/cloudformation/stack/workload.go
// Package mocks is a generated GoMock package.
package mocks
import (
reflect "reflect"
cloudformation "github.com/aws/aws-sdk-go/service/cloudformation"
gomock "github.com/golang/mock/gomock"
)
// MockNestedStackConfigurer is a mock of NestedStackConfigurer interface.
type MockNestedStackConfigurer struct {
ctrl *gomock.Controller
recorder *MockNestedStackConfigurerMockRecorder
}
// MockNestedStackConfigurerMockRecorder is the mock recorder for MockNestedStackConfigurer.
type MockNestedStackConfigurerMockRecorder struct {
mock *MockNestedStackConfigurer
}
// NewMockNestedStackConfigurer creates a new mock instance.
func NewMockNestedStackConfigurer(ctrl *gomock.Controller) *MockNestedStackConfigurer {
mock := &MockNestedStackConfigurer{ctrl: ctrl}
mock.recorder = &MockNestedStackConfigurerMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockNestedStackConfigurer) EXPECT() *MockNestedStackConfigurerMockRecorder {
return m.recorder
}
// Parameters mocks base method.
func (m *MockNestedStackConfigurer) Parameters() (string, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "Parameters")
ret0, _ := ret[0].(string)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// Parameters indicates an expected call of Parameters.
func (mr *MockNestedStackConfigurerMockRecorder) Parameters() *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Parameters", reflect.TypeOf((*MockNestedStackConfigurer)(nil).Parameters))
}
// Template mocks base method.
func (m *MockNestedStackConfigurer) Template() (string, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "Template")
ret0, _ := ret[0].(string)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// Template indicates an expected call of Template.
func (mr *MockNestedStackConfigurerMockRecorder) Template() *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Template", reflect.TypeOf((*MockNestedStackConfigurer)(nil).Template))
}
// Mocklocation is a mock of location interface.
type Mocklocation struct {
ctrl *gomock.Controller
recorder *MocklocationMockRecorder
}
// MocklocationMockRecorder is the mock recorder for Mocklocation.
type MocklocationMockRecorder struct {
mock *Mocklocation
}
// NewMocklocation creates a new mock instance.
func NewMocklocation(ctrl *gomock.Controller) *Mocklocation {
mock := &Mocklocation{ctrl: ctrl}
mock.recorder = &MocklocationMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *Mocklocation) EXPECT() *MocklocationMockRecorder {
return m.recorder
}
// GetLocation mocks base method.
func (m *Mocklocation) GetLocation() string {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "GetLocation")
ret0, _ := ret[0].(string)
return ret0
}
// GetLocation indicates an expected call of GetLocation.
func (mr *MocklocationMockRecorder) GetLocation() *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetLocation", reflect.TypeOf((*Mocklocation)(nil).GetLocation))
}
// Mockuploadable is a mock of uploadable interface.
type Mockuploadable struct {
ctrl *gomock.Controller
recorder *MockuploadableMockRecorder
}
// MockuploadableMockRecorder is the mock recorder for Mockuploadable.
type MockuploadableMockRecorder struct {
mock *Mockuploadable
}
// NewMockuploadable creates a new mock instance.
func NewMockuploadable(ctrl *gomock.Controller) *Mockuploadable {
mock := &Mockuploadable{ctrl: ctrl}
mock.recorder = &MockuploadableMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *Mockuploadable) EXPECT() *MockuploadableMockRecorder {
return m.recorder
}
// ArtifactPath mocks base method.
func (m *Mockuploadable) ArtifactPath() string {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "ArtifactPath")
ret0, _ := ret[0].(string)
return ret0
}
// ArtifactPath indicates an expected call of ArtifactPath.
func (mr *MockuploadableMockRecorder) ArtifactPath() *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ArtifactPath", reflect.TypeOf((*Mockuploadable)(nil).ArtifactPath))
}
// Name mocks base method.
func (m *Mockuploadable) Name() string {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "Name")
ret0, _ := ret[0].(string)
return ret0
}
// Name indicates an expected call of Name.
func (mr *MockuploadableMockRecorder) Name() *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Name", reflect.TypeOf((*Mockuploadable)(nil).Name))
}
// MocktemplateConfigurer is a mock of templateConfigurer interface.
type MocktemplateConfigurer struct {
ctrl *gomock.Controller
recorder *MocktemplateConfigurerMockRecorder
}
// MocktemplateConfigurerMockRecorder is the mock recorder for MocktemplateConfigurer.
type MocktemplateConfigurerMockRecorder struct {
mock *MocktemplateConfigurer
}
// NewMocktemplateConfigurer creates a new mock instance.
func NewMocktemplateConfigurer(ctrl *gomock.Controller) *MocktemplateConfigurer {
mock := &MocktemplateConfigurer{ctrl: ctrl}
mock.recorder = &MocktemplateConfigurerMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MocktemplateConfigurer) EXPECT() *MocktemplateConfigurerMockRecorder {
return m.recorder
}
// Parameters mocks base method.
func (m *MocktemplateConfigurer) Parameters() ([]*cloudformation.Parameter, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "Parameters")
ret0, _ := ret[0].([]*cloudformation.Parameter)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// Parameters indicates an expected call of Parameters.
func (mr *MocktemplateConfigurerMockRecorder) Parameters() *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Parameters", reflect.TypeOf((*MocktemplateConfigurer)(nil).Parameters))
}
// Tags mocks base method.
func (m *MocktemplateConfigurer) Tags() []*cloudformation.Tag {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "Tags")
ret0, _ := ret[0].([]*cloudformation.Tag)
return ret0
}
// Tags indicates an expected call of Tags.
func (mr *MocktemplateConfigurerMockRecorder) Tags() *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Tags", reflect.TypeOf((*MocktemplateConfigurer)(nil).Tags))
}
| 206 |
copilot-cli | aws | Go | // Code generated by MockGen. DO NOT EDIT.
// Source: ./internal/pkg/deploy/deploy.go
// Package mocks is a generated GoMock package.
package mocks
import (
reflect "reflect"
session "github.com/aws/aws-sdk-go/aws/session"
resourcegroups "github.com/aws/copilot-cli/internal/pkg/aws/resourcegroups"
config "github.com/aws/copilot-cli/internal/pkg/config"
gomock "github.com/golang/mock/gomock"
)
// MockResourceGetter is a mock of ResourceGetter interface.
type MockResourceGetter struct {
ctrl *gomock.Controller
recorder *MockResourceGetterMockRecorder
}
// MockResourceGetterMockRecorder is the mock recorder for MockResourceGetter.
type MockResourceGetterMockRecorder struct {
mock *MockResourceGetter
}
// NewMockResourceGetter creates a new mock instance.
func NewMockResourceGetter(ctrl *gomock.Controller) *MockResourceGetter {
mock := &MockResourceGetter{ctrl: ctrl}
mock.recorder = &MockResourceGetterMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockResourceGetter) EXPECT() *MockResourceGetterMockRecorder {
return m.recorder
}
// GetResourcesByTags mocks base method.
func (m *MockResourceGetter) GetResourcesByTags(resourceType string, tags map[string]string) ([]*resourcegroups.Resource, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "GetResourcesByTags", resourceType, tags)
ret0, _ := ret[0].([]*resourcegroups.Resource)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// GetResourcesByTags indicates an expected call of GetResourcesByTags.
func (mr *MockResourceGetterMockRecorder) GetResourcesByTags(resourceType, tags interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetResourcesByTags", reflect.TypeOf((*MockResourceGetter)(nil).GetResourcesByTags), resourceType, tags)
}
// MockConfigStoreClient is a mock of ConfigStoreClient interface.
type MockConfigStoreClient struct {
ctrl *gomock.Controller
recorder *MockConfigStoreClientMockRecorder
}
// MockConfigStoreClientMockRecorder is the mock recorder for MockConfigStoreClient.
type MockConfigStoreClientMockRecorder struct {
mock *MockConfigStoreClient
}
// NewMockConfigStoreClient creates a new mock instance.
func NewMockConfigStoreClient(ctrl *gomock.Controller) *MockConfigStoreClient {
mock := &MockConfigStoreClient{ctrl: ctrl}
mock.recorder = &MockConfigStoreClientMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockConfigStoreClient) EXPECT() *MockConfigStoreClientMockRecorder {
return m.recorder
}
// GetEnvironment mocks base method.
func (m *MockConfigStoreClient) GetEnvironment(appName, environmentName string) (*config.Environment, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "GetEnvironment", appName, environmentName)
ret0, _ := ret[0].(*config.Environment)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// GetEnvironment indicates an expected call of GetEnvironment.
func (mr *MockConfigStoreClientMockRecorder) GetEnvironment(appName, environmentName interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetEnvironment", reflect.TypeOf((*MockConfigStoreClient)(nil).GetEnvironment), appName, environmentName)
}
// GetJob mocks base method.
func (m *MockConfigStoreClient) GetJob(appName, jobname string) (*config.Workload, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "GetJob", appName, jobname)
ret0, _ := ret[0].(*config.Workload)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// GetJob indicates an expected call of GetJob.
func (mr *MockConfigStoreClientMockRecorder) GetJob(appName, jobname interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetJob", reflect.TypeOf((*MockConfigStoreClient)(nil).GetJob), appName, jobname)
}
// GetService mocks base method.
func (m *MockConfigStoreClient) GetService(appName, svcName string) (*config.Workload, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "GetService", appName, svcName)
ret0, _ := ret[0].(*config.Workload)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// GetService indicates an expected call of GetService.
func (mr *MockConfigStoreClientMockRecorder) GetService(appName, svcName interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetService", reflect.TypeOf((*MockConfigStoreClient)(nil).GetService), appName, svcName)
}
// ListEnvironments mocks base method.
func (m *MockConfigStoreClient) ListEnvironments(appName string) ([]*config.Environment, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "ListEnvironments", appName)
ret0, _ := ret[0].([]*config.Environment)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// ListEnvironments indicates an expected call of ListEnvironments.
func (mr *MockConfigStoreClientMockRecorder) ListEnvironments(appName interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ListEnvironments", reflect.TypeOf((*MockConfigStoreClient)(nil).ListEnvironments), appName)
}
// ListWorkloads mocks base method.
func (m *MockConfigStoreClient) ListWorkloads(appName string) ([]*config.Workload, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "ListWorkloads", appName)
ret0, _ := ret[0].([]*config.Workload)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// ListWorkloads indicates an expected call of ListWorkloads.
func (mr *MockConfigStoreClientMockRecorder) ListWorkloads(appName interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ListWorkloads", reflect.TypeOf((*MockConfigStoreClient)(nil).ListWorkloads), appName)
}
// MockSessionProvider is a mock of SessionProvider interface.
type MockSessionProvider struct {
ctrl *gomock.Controller
recorder *MockSessionProviderMockRecorder
}
// MockSessionProviderMockRecorder is the mock recorder for MockSessionProvider.
type MockSessionProviderMockRecorder struct {
mock *MockSessionProvider
}
// NewMockSessionProvider creates a new mock instance.
func NewMockSessionProvider(ctrl *gomock.Controller) *MockSessionProvider {
mock := &MockSessionProvider{ctrl: ctrl}
mock.recorder = &MockSessionProviderMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockSessionProvider) EXPECT() *MockSessionProviderMockRecorder {
return m.recorder
}
// FromRole mocks base method.
func (m *MockSessionProvider) FromRole(roleARN, region string) (*session.Session, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "FromRole", roleARN, region)
ret0, _ := ret[0].(*session.Session)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// FromRole indicates an expected call of FromRole.
func (mr *MockSessionProviderMockRecorder) FromRole(roleARN, region interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "FromRole", reflect.TypeOf((*MockSessionProvider)(nil).FromRole), roleARN, region)
}
| 189 |
copilot-cli | aws | Go | // Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
// SPDX-License-Identifier: Apache-2.0
// Package asset provides functionality to manage static assets.
package asset
import (
"bytes"
"context"
"crypto/sha256"
"encoding/hex"
"encoding/json"
"fmt"
"io"
"io/fs"
"mime"
"path"
"path/filepath"
"sort"
"github.com/aws/copilot-cli/internal/pkg/manifest"
"github.com/spf13/afero"
"golang.org/x/sync/errgroup"
)
// ArtifactBucketUploader uploads local asset files.
type ArtifactBucketUploader struct {
// FS is the file system to use.
FS afero.Fs
// Upload is the function called when uploading a file.
Upload func(path string, contents io.Reader) error
// AssetDir is the directory to upload the hashed files to.
AssetDir string
// AssetMappingFileDir is the directory to upload the asset mapping file to.
AssetMappingFileDir string
}
type asset struct {
localPath string
content io.Reader
ArtifactBucketPath string `json:"path"`
ServiceBucketPath string `json:"destPath"`
ContentType string `json:"contentType"`
}
// UploadFiles hashes each of the files specified in files and uploads
// them to the path "{AssetDir}/{hash}". After, it uploads a JSON file
// to AssetDir that maps the location of every file in the artifact bucket to its
// intended destination path in the service bucket. The path to the mapping file
// is returned along with an error, if any.
func (u *ArtifactBucketUploader) UploadFiles(files []manifest.FileUpload) (string, error) {
var assets []asset
for _, f := range files {
matcher := buildCompositeMatchers(buildReincludeMatchers(f.Reinclude.ToStringSlice()), buildExcludeMatchers(f.Exclude.ToStringSlice()))
if err := afero.Walk(u.FS, f.Source, u.walkFn(f.Source, f.Destination, f.Recursive, matcher, &assets)); err != nil {
return "", fmt.Errorf("walk the file tree rooted at %q: %s", f.Source, err)
}
}
if err := u.uploadAssets(assets); err != nil {
return "", fmt.Errorf("upload assets: %s", err)
}
path, err := u.uploadAssetMappingFile(assets)
if err != nil {
return "", fmt.Errorf("upload asset mapping file: %s", err)
}
return path, nil
}
func (u *ArtifactBucketUploader) walkFn(sourcePath, destPath string, recursive bool, matcher filepathMatcher, assets *[]asset) filepath.WalkFunc {
return func(fpath string, info fs.FileInfo, err error) error {
if err != nil {
return err
}
if info.IsDir() {
// if path == sourcePath, then path is the directory they want uploaded.
// if path != sourcePath, then path is a _subdirectory_ of the directory they want uploaded.
if !recursive && fpath != sourcePath {
return fs.SkipDir
}
return nil
}
ok, err := matcher.match(fpath)
if err != nil {
return err
}
if !ok {
return nil
}
hash := sha256.New()
buf := &bytes.Buffer{}
file, err := u.FS.Open(fpath)
if err != nil {
return fmt.Errorf("open %q: %w", fpath, err)
}
defer file.Close()
_, err = io.Copy(io.MultiWriter(buf, hash), file)
if err != nil {
return fmt.Errorf("copy %q: %w", fpath, err)
}
// rel is "." when sourcePath == path
rel, err := filepath.Rel(sourcePath, fpath)
if err != nil {
return fmt.Errorf("get relative path for %q against %q: %w", fpath, sourcePath, err)
}
dest := filepath.Join(destPath, rel)
if dest == "." { // happens when sourcePath is a file and destPath is unset
dest = info.Name()
}
*assets = append(*assets, asset{
localPath: fpath,
content: buf,
ArtifactBucketPath: path.Join(u.AssetDir, hex.EncodeToString(hash.Sum(nil))),
ServiceBucketPath: filepath.ToSlash(dest),
ContentType: mime.TypeByExtension(filepath.Ext(fpath)),
})
return nil
}
}
func (u *ArtifactBucketUploader) uploadAssets(assets []asset) error {
g, _ := errgroup.WithContext(context.Background())
for i := range assets {
asset := assets[i]
g.Go(func() error {
if err := u.Upload(asset.ArtifactBucketPath, asset.content); err != nil {
return fmt.Errorf("upload %q: %w", asset.localPath, err)
}
return nil
})
}
return g.Wait()
}
// uploadAssetMappingFile uploads a JSON file containing the location
// of each file in the artifact bucket and the desired location
// of the file in the destination bucket. It has the format:
//
// [{
// "path": "local-assets/12345asdf",
// "destPath": "index.html",
// "contentType": "text/html"
// }]
//
// The path returned is u.AssetMappingDir/a hash of the mapping file's content.
// This makes it so the file path is constant as long as the
// content and destination of the uploaded assets do not change.
func (u *ArtifactBucketUploader) uploadAssetMappingFile(assets []asset) (string, error) {
assets = dedupe(assets)
sort.Slice(assets, func(i, j int) bool {
if assets[i].ArtifactBucketPath != assets[j].ArtifactBucketPath {
return assets[i].ArtifactBucketPath < assets[j].ArtifactBucketPath
}
return assets[i].ServiceBucketPath < assets[j].ServiceBucketPath
})
data, err := json.Marshal(assets)
if err != nil {
return "", fmt.Errorf("encode uploaded assets: %w", err)
}
hash := sha256.New()
hash.Write(data) // hash.Write is documented to never return an error
uploadedPath := path.Join(u.AssetMappingFileDir, hex.EncodeToString(hash.Sum(nil)))
if err := u.Upload(uploadedPath, bytes.NewBuffer(data)); err != nil {
return "", fmt.Errorf("upload to %q: %w", u.AssetMappingFileDir, err)
}
return uploadedPath, nil
}
// dedupe returns a copy of assets with duplicate entries removed.
func dedupe(assets []asset) []asset {
type key struct{ field1, field2, field3 string }
has := make(map[key]bool)
out := make([]asset, 0, len(assets))
for i := range assets {
key := key{assets[i].ArtifactBucketPath, assets[i].ServiceBucketPath, assets[i].ContentType}
if has[key] {
continue
}
has[key] = true
out = append(out, assets[i])
}
return out
}
| 202 |
copilot-cli | aws | Go | // Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
// SPDX-License-Identifier: Apache-2.0
package asset
import (
"bytes"
"crypto/sha256"
"encoding/hex"
"encoding/json"
"errors"
"fmt"
"io"
"mime"
"path"
"sync"
"testing"
"github.com/aws/copilot-cli/internal/pkg/manifest"
"github.com/spf13/afero"
"github.com/stretchr/testify/require"
)
type fakeS3 struct {
mu sync.Mutex
data map[string][]byte
err error
}
func (f *fakeS3) Upload(path string, data io.Reader) error {
f.mu.Lock()
defer f.mu.Unlock()
if f.err != nil {
return f.err
}
b, err := io.ReadAll(data)
if err != nil {
return err
}
if f.data == nil {
f.data = make(map[string][]byte)
}
f.data[path] = b
return nil
}
func Test_UploadFiles(t *testing.T) {
const mockMappingDir, mockPrefix = "mockMappingDir", "mockPrefix"
const mockContent1, mockContent2, mockContent3 = "mockContent1", "mockContent2", "mockContent3"
hash := func(content string) string {
hash := sha256.New()
hash.Write([]byte(content))
return hex.EncodeToString(hash.Sum(nil))
}
newAsset := func(dstPath string, content string, contentType string) asset {
return asset{
ArtifactBucketPath: path.Join(mockPrefix, hash(content)),
content: bytes.NewBufferString(content),
ServiceBucketPath: dstPath,
ContentType: contentType,
}
}
testCases := map[string]struct {
files []manifest.FileUpload
mockS3Error error
mockFileSystem func(fs afero.Fs)
expected []asset
expectedError error
}{
"error if failed to upload": {
files: []manifest.FileUpload{
{
Source: "test",
Recursive: true,
},
},
mockFileSystem: func(fs afero.Fs) {
afero.WriteFile(fs, "test/copilot/.workspace", []byte(mockContent1), 0644)
afero.WriteFile(fs, "copilot/prod/manifest.yaml", []byte(mockContent2), 0644)
},
mockS3Error: errors.New("mock error"),
expectedError: fmt.Errorf(`upload assets: upload "test/copilot/.workspace": mock error`),
},
"success without include and exclude": {
// source=directory, dest unset
files: []manifest.FileUpload{
{
Source: "test",
Recursive: true,
},
},
mockFileSystem: func(fs afero.Fs) {
afero.WriteFile(fs, "test/copilot/.workspace", []byte(mockContent1), 0644)
afero.WriteFile(fs, "copilot/prod/manifest.yaml", []byte(mockContent2), 0644)
},
expected: []asset{
newAsset("copilot/.workspace", mockContent1, ""),
},
},
"success without recursive": {
// source=directory, dest unset
files: []manifest.FileUpload{
{
Source: "test",
},
},
mockFileSystem: func(fs afero.Fs) {
afero.WriteFile(fs, "test/copilot/.workspace", []byte(mockContent1), 0644)
afero.WriteFile(fs, "test/manifest.yaml", []byte(mockContent2), 0644)
afero.WriteFile(fs, "test/foo", []byte(mockContent3), 0644)
},
expected: []asset{
newAsset("foo", mockContent3, ""),
newAsset("manifest.yaml", mockContent2, mime.TypeByExtension(".yaml")),
},
},
"success with include only": {
// source=directory, dest set
files: []manifest.FileUpload{
{
Source: "test",
Destination: "ws",
Recursive: true,
Reinclude: manifest.StringSliceOrString{
StringSlice: []string{"copilot/prod/manifest.yaml"},
},
},
},
mockFileSystem: func(fs afero.Fs) {
afero.WriteFile(fs, "test/copilot/.workspace", []byte(mockContent1), 0644)
afero.WriteFile(fs, "copilot/prod/manifest.yaml", []byte(mockContent2), 0644)
},
expected: []asset{
newAsset("ws/copilot/.workspace", mockContent1, ""),
},
},
"success with exclude only": {
// source=directory, dest unset
files: []manifest.FileUpload{
{
Recursive: true,
Exclude: manifest.StringSliceOrString{
StringSlice: []string{"copilot/prod/*.yaml"},
},
},
},
mockFileSystem: func(fs afero.Fs) {
afero.WriteFile(fs, "test/copilot/.workspace", []byte(mockContent1), 0644)
afero.WriteFile(fs, "copilot/prod/manifest.yaml", []byte(mockContent2), 0644)
},
expected: []asset{
newAsset("test/copilot/.workspace", mockContent1, ""),
},
},
"success with both include and exclude": {
// source=directory, dest set
files: []manifest.FileUpload{
{
Destination: "files",
Recursive: true,
Exclude: manifest.StringSliceOrString{
StringSlice: []string{"copilot/prod/*.yaml"},
},
Reinclude: manifest.StringSliceOrString{
StringSlice: []string{"copilot/prod/manifest.yaml"},
},
},
},
mockFileSystem: func(fs afero.Fs) {
afero.WriteFile(fs, "test/copilot/.workspace", []byte(mockContent1), 0644)
afero.WriteFile(fs, "copilot/prod/manifest.yaml", []byte(mockContent2), 0644)
afero.WriteFile(fs, "copilot/prod/foo.yaml", []byte(mockContent3), 0644)
},
expected: []asset{
newAsset("files/copilot/prod/manifest.yaml", mockContent2, mime.TypeByExtension(".yaml")),
newAsset("files/test/copilot/.workspace", mockContent1, ""),
},
},
"success with file as source": {
// source=file, dest unset
files: []manifest.FileUpload{
{
Source: "test/copilot/.workspace",
},
},
mockFileSystem: func(fs afero.Fs) {
afero.WriteFile(fs, "test/copilot/.workspace", []byte(mockContent1), 0644)
},
expected: []asset{
newAsset(".workspace", mockContent1, ""),
},
},
"success with file as source and destination set": {
// source=file, dest set
files: []manifest.FileUpload{
{
Source: "test/copilot/.workspace",
Destination: "/is/a/file",
},
},
mockFileSystem: func(fs afero.Fs) {
afero.WriteFile(fs, "test/copilot/.workspace", []byte(mockContent1), 0644)
},
expected: []asset{
newAsset("/is/a/file", mockContent1, ""),
},
},
"duplicate file mappings dedupe'd": {
files: []manifest.FileUpload{
{
Source: "dir/file.json",
Destination: "dir/file.json",
},
{
Source: "dir/file.txt",
Destination: "dir/file.txt",
},
{
Source: "dir",
Destination: "dir",
},
},
mockFileSystem: func(fs afero.Fs) {
afero.WriteFile(fs, "dir/file.json", []byte(mockContent1), 0644)
afero.WriteFile(fs, "dir/file.txt", []byte(mockContent1), 0644)
},
expected: []asset{
newAsset("dir/file.json", mockContent1, mime.TypeByExtension(".json")),
newAsset("dir/file.txt", mockContent1, mime.TypeByExtension(".txt")),
},
},
"duplicate content to separate destinations sorted": {
files: []manifest.FileUpload{
{
Source: "dir/file.txt",
Destination: "dir/file.txt",
},
{
Source: "dir",
},
},
mockFileSystem: func(fs afero.Fs) {
afero.WriteFile(fs, "dir/file.txt", []byte(mockContent1), 0644)
},
expected: []asset{
// dir/file.txt sorts before file.txt
newAsset("dir/file.txt", mockContent1, mime.TypeByExtension(".txt")),
newAsset("file.txt", mockContent1, mime.TypeByExtension(".txt")),
},
},
}
for name, tc := range testCases {
t.Run(name, func(t *testing.T) {
// build the expected s3 bucket
expected := make(map[string][]byte)
for _, asset := range tc.expected {
expected[asset.ArtifactBucketPath] = asset.content.(*bytes.Buffer).Bytes()
}
// add in the mapping file
b, err := json.Marshal(tc.expected)
require.NoError(t, err)
hash := sha256.New()
hash.Write(b)
expectedMappingFilePath := path.Join(mockMappingDir, hex.EncodeToString(hash.Sum(nil)))
expected[expectedMappingFilePath] = b
// Create an empty FileSystem
fs := afero.NewMemMapFs()
// Set it up
tc.mockFileSystem(fs)
mockS3 := &fakeS3{
err: tc.mockS3Error,
}
u := ArtifactBucketUploader{
FS: fs,
Upload: mockS3.Upload,
AssetDir: mockPrefix,
AssetMappingFileDir: mockMappingDir,
}
mappingFilePath, err := u.UploadFiles(tc.files)
if tc.expectedError != nil {
require.Error(t, err)
require.Equal(t, tc.expectedError.Error(), err.Error())
return
}
require.NoError(t, err)
require.Equal(t, expectedMappingFilePath, mappingFilePath)
require.Equal(t, expected, mockS3.data)
})
}
}
| 305 |
copilot-cli | aws | Go | // Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
// SPDX-License-Identifier: Apache-2.0
package asset
import (
"fmt"
"path/filepath"
)
type filepathMatcher interface {
match(path string) (bool, error)
}
type reincludeMatcher string
func buildReincludeMatchers(reincludes []string) []filepathMatcher {
var matchers []filepathMatcher
for _, reinclude := range reincludes {
matchers = append(matchers, reincludeMatcher(reinclude))
}
return matchers
}
func (m reincludeMatcher) match(path string) (bool, error) {
return match(string(m), path)
}
type excludeMatcher string
func buildExcludeMatchers(excludes []string) []filepathMatcher {
var matchers []filepathMatcher
for _, exclude := range excludes {
matchers = append(matchers, excludeMatcher(exclude))
}
return matchers
}
func (m excludeMatcher) match(path string) (bool, error) {
return match(string(m), path)
}
// compositeMatcher is a composite matcher consisting of reinclude matchers and exclude matchers.
// Note that exclude matchers will be applied before reinclude matchers.
type compositeMatcher struct {
reincludeMatchers []filepathMatcher
excludeMatchers []filepathMatcher
}
func buildCompositeMatchers(reincludeMatchers, excludeMatchers []filepathMatcher) compositeMatcher {
return compositeMatcher{
reincludeMatchers: reincludeMatchers,
excludeMatchers: excludeMatchers,
}
}
func (m compositeMatcher) match(path string) (bool, error) {
shouldInclude := true
for _, matcher := range m.excludeMatchers {
isMatch, err := matcher.match(path)
if err != nil {
return false, err
}
if isMatch {
shouldInclude = false
}
}
for _, matcher := range m.reincludeMatchers {
isMatch, err := matcher.match(path)
if err != nil {
return false, err
}
if isMatch {
shouldInclude = true
}
}
return shouldInclude, nil
}
func match(pattern, path string) (bool, error) {
isMatch, err := filepath.Match(pattern, path)
if err != nil {
return false, fmt.Errorf("match file path %s against pattern %s: %w", path, pattern, err)
}
return isMatch, nil
}
| 87 |
copilot-cli | aws | Go | // Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
// SPDX-License-Identifier: Apache-2.0
// Package customresource provides functionality to upload Copilot custom resources.
package customresource
import (
"archive/zip"
"bytes"
"fmt"
"io"
"path"
"strings"
"github.com/aws/copilot-cli/internal/pkg/template/artifactpath"
"github.com/aws/copilot-cli/internal/pkg/template"
)
// Directory under which all custom resources are minified and packaged.
const customResourcesDir = "custom-resources"
// All custom resource scripts will be copied under this path in the zip file.
const handlerFileName = "index.js"
// Function names.
const (
envControllerFnName = "EnvControllerFunction"
dynamicDesiredCountFnName = "DynamicDesiredCountFunction"
backlogPerTaskFnName = "BacklogPerTaskCalculatorFunction"
rulePriorityFnName = "RulePriorityFunction"
nlbCustomDomainFnName = "NLBCustomDomainFunction"
nlbCertValidatorFnName = "NLBCertValidatorFunction"
customDomainFnName = "CustomDomainFunction"
certValidationFnName = "CertificateValidationFunction"
dnsDelegationFnName = "DNSDelegationFunction"
certReplicatorFnName = "CertificateReplicatorFunction"
uniqueJsonValuesFnName = "UniqueJSONValuesFunction"
triggerStateMachineFnName = "TriggerStateMachineFunction"
)
// Function source file locations.
var (
albRulePriorityGeneratorFilePath = path.Join(customResourcesDir, "alb-rule-priority-generator.js")
backlogPerTaskCalculatorFilePath = path.Join(customResourcesDir, "backlog-per-task-calculator.js")
customDomainFilePath = path.Join(customResourcesDir, "custom-domain.js")
customDomainAppRunnerFilePath = path.Join(customResourcesDir, "custom-domain-app-runner.js")
desiredCountDelegationFilePath = path.Join(customResourcesDir, "desired-count-delegation.js")
dnsCertValidationFilePath = path.Join(customResourcesDir, "dns-cert-validator.js")
certReplicatorFilePath = path.Join(customResourcesDir, "cert-replicator.js")
dnsDelegationFilePath = path.Join(customResourcesDir, "dns-delegation.js")
envControllerFilePath = path.Join(customResourcesDir, "env-controller.js")
wkldCertValidatorFilePath = path.Join(customResourcesDir, "wkld-cert-validator.js")
wkldCustomDomainFilePath = path.Join(customResourcesDir, "wkld-custom-domain.js")
uniqueJSONValuesFilePath = path.Join(customResourcesDir, "unique-json-values.js")
triggerStateMachineFilePath = path.Join(customResourcesDir, "trigger-state-machine.js")
)
// CustomResource represents a CloudFormation custom resource backed by a Lambda function.
type CustomResource struct {
name string
files []file
// Post-initialization cached fields.
zip *bytes.Buffer
}
// Name returns the name of the custom resource.
func (cr *CustomResource) Name() string {
return cr.name
}
// ArtifactPath returns the S3 object key where the custom resource should be stored.
func (cr *CustomResource) ArtifactPath() string {
return artifactpath.CustomResource(strings.ToLower(cr.Name()), cr.zip.Bytes())
}
// zipReader returns a reader for the zip archive from all the files in the custom resource.
func (cr *CustomResource) zipReader() io.Reader {
return bytes.NewBuffer(cr.zip.Bytes())
}
func (cr *CustomResource) init() error {
buf := new(bytes.Buffer)
w := zip.NewWriter(buf)
for _, file := range cr.files {
f, err := w.Create(file.name)
if err != nil {
return fmt.Errorf("create zip file %q for custom resource %q: %v", file.name, cr.Name(), err)
}
_, err = f.Write(file.content)
if err != nil {
return fmt.Errorf("write zip file %q for custom resource %q: %v", file.name, cr.Name(), err)
}
}
if err := w.Close(); err != nil {
return fmt.Errorf("close zip file for custom resource %q: %v", cr.Name(), err)
}
cr.zip = buf
return nil
}
type file struct {
name string
content []byte
}
// RDWS returns the custom resources for a request-driven web service.
func RDWS(fs template.Reader) ([]*CustomResource, error) {
return buildCustomResources(fs, map[string]string{
envControllerFnName: envControllerFilePath,
customDomainFnName: customDomainAppRunnerFilePath,
})
}
// LBWS returns the custom resources for a load-balanced web service.
func LBWS(fs template.Reader) ([]*CustomResource, error) {
return buildCustomResources(fs, map[string]string{
dynamicDesiredCountFnName: desiredCountDelegationFilePath,
envControllerFnName: envControllerFilePath,
rulePriorityFnName: albRulePriorityGeneratorFilePath,
nlbCustomDomainFnName: wkldCustomDomainFilePath,
nlbCertValidatorFnName: wkldCertValidatorFilePath,
})
}
// Worker returns the custom resources for a worker service.
func Worker(fs template.Reader) ([]*CustomResource, error) {
return buildCustomResources(fs, map[string]string{
dynamicDesiredCountFnName: desiredCountDelegationFilePath,
backlogPerTaskFnName: backlogPerTaskCalculatorFilePath,
envControllerFnName: envControllerFilePath,
})
}
// Backend returns the custom resources for a backend service.
func Backend(fs template.Reader) ([]*CustomResource, error) {
return buildCustomResources(fs, map[string]string{
dynamicDesiredCountFnName: desiredCountDelegationFilePath,
rulePriorityFnName: albRulePriorityGeneratorFilePath,
envControllerFnName: envControllerFilePath,
})
}
// StaticSite returns the custom resources for a static site service.
func StaticSite(fs template.Reader) ([]*CustomResource, error) {
return buildCustomResources(fs, map[string]string{
triggerStateMachineFnName: triggerStateMachineFilePath,
certValidationFnName: wkldCertValidatorFilePath,
customDomainFnName: wkldCustomDomainFilePath,
})
}
// ScheduledJob returns the custom resources for a scheduled job.
func ScheduledJob(fs template.Reader) ([]*CustomResource, error) {
return buildCustomResources(fs, map[string]string{
envControllerFnName: envControllerFilePath,
})
}
// Env returns the custom resources for an environment.
func Env(fs template.Reader) ([]*CustomResource, error) {
return buildCustomResources(fs, map[string]string{
certValidationFnName: dnsCertValidationFilePath,
customDomainFnName: customDomainFilePath,
dnsDelegationFnName: dnsDelegationFilePath,
certReplicatorFnName: certReplicatorFilePath,
uniqueJsonValuesFnName: uniqueJSONValuesFilePath,
})
}
// UploadFunc is the function signature to upload contents under a key within a S3 bucket.
type UploadFunc func(key string, contents io.Reader) (url string, err error)
// Upload zips all the Files for each CustomResource and uploads the zip files individually to S3.
// Returns a map of the CustomResource FunctionName to the S3 URL where the zip file is stored.
func Upload(upload UploadFunc, crs []*CustomResource) (map[string]string, error) {
urls := make(map[string]string)
for _, cr := range crs {
url, err := upload(cr.ArtifactPath(), cr.zipReader())
if err != nil {
return nil, fmt.Errorf("upload custom resource %q: %w", cr.Name(), err)
}
urls[cr.Name()] = url
}
return urls, nil
}
func buildCustomResources(fs template.Reader, pathForFn map[string]string) ([]*CustomResource, error) {
var idx int
crs := make([]*CustomResource, len(pathForFn))
for fn, path := range pathForFn {
content, err := fs.Read(path)
if err != nil {
return nil, fmt.Errorf("read custom resource %s at path %s: %v", fn, path, err)
}
crs[idx] = &CustomResource{
name: fn,
files: []file{
{
name: handlerFileName,
content: content.Bytes(),
},
},
}
if err := crs[idx].init(); err != nil {
return nil, err
}
idx += 1
}
return crs, nil
}
| 213 |
copilot-cli | aws | Go | // Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
// SPDX-License-Identifier: Apache-2.0
package customresource
import (
"archive/zip"
"bytes"
"errors"
"fmt"
"io"
"testing"
"github.com/stretchr/testify/require"
"github.com/aws/copilot-cli/internal/pkg/template"
)
type fakeTemplateReader struct {
files map[string]*template.Content
matchCount int
}
func (fr *fakeTemplateReader) Read(path string) (*template.Content, error) {
content, ok := fr.files[path]
if !ok {
return nil, fmt.Errorf("unexpected read %s", path)
}
fr.matchCount += 1
return content, nil
}
func TestRDWS(t *testing.T) {
// GIVEN
fakeFS := &fakeTemplateReader{
files: map[string]*template.Content{
"custom-resources/custom-domain-app-runner.js": {
Buffer: bytes.NewBufferString("custom domain app runner"),
},
"custom-resources/env-controller.js": {
Buffer: bytes.NewBufferString("env controller"),
},
},
}
fakePaths := map[string]string{
"CustomDomainFunction": "manual/scripts/custom-resources/customdomainfunction/2611784f21e91e499306dac066aae5fd8f2ba664b38073bdd3198d2e041c076e.zip",
"EnvControllerFunction": "manual/scripts/custom-resources/envcontrollerfunction/72297cacaeab3a267e371c17ea3f0235905b0da51410eb31c10f7c66ba944044.zip",
}
// WHEN
crs, err := RDWS(fakeFS)
// THEN
require.NoError(t, err)
require.Equal(t, fakeFS.matchCount, 2, "expected path calls do not match")
// ensure custom resource names match.
actualFnNames := make([]string, len(crs))
for i, cr := range crs {
actualFnNames[i] = cr.Name()
}
require.ElementsMatch(t, []string{"CustomDomainFunction", "EnvControllerFunction"}, actualFnNames, "function names must match")
// ensure the zip files contain an index.js file.
for _, cr := range crs {
buf := new(bytes.Buffer)
size, err := buf.ReadFrom(cr.zipReader())
require.NoError(t, err)
r, err := zip.NewReader(bytes.NewReader(buf.Bytes()), size)
require.NoError(t, err)
_, err = r.Open("index.js")
require.NoError(t, err, "an index.js file must be present in all custom resources")
}
// ensure artifact paths match.
for _, cr := range crs {
require.Equal(t, fakePaths[cr.Name()], cr.ArtifactPath())
}
}
func TestLBWS(t *testing.T) {
// GIVEN
fakeFS := &fakeTemplateReader{
files: map[string]*template.Content{
"custom-resources/desired-count-delegation.js": {
Buffer: bytes.NewBufferString("custom domain app runner"),
},
"custom-resources/env-controller.js": {
Buffer: bytes.NewBufferString("env controller"),
},
"custom-resources/alb-rule-priority-generator.js": {
Buffer: bytes.NewBufferString("rule priority"),
},
"custom-resources/wkld-custom-domain.js": {
Buffer: bytes.NewBufferString("service-level custom domain"),
},
"custom-resources/wkld-cert-validator.js": {
Buffer: bytes.NewBufferString("service-level cert"),
},
},
}
fakePaths := map[string]string{
"DynamicDesiredCountFunction": "manual/scripts/custom-resources/dynamicdesiredcountfunction/2611784f21e91e499306dac066aae5fd8f2ba664b38073bdd3198d2e041c076e.zip",
"EnvControllerFunction": "manual/scripts/custom-resources/envcontrollerfunction/72297cacaeab3a267e371c17ea3f0235905b0da51410eb31c10f7c66ba944044.zip",
"RulePriorityFunction": "manual/scripts/custom-resources/rulepriorityfunction/1385d258950a50faf4b5cd7deeecbc4bcc79a0d41d631e3977cffa0332e6f0c6.zip",
"NLBCustomDomainFunction": "manual/scripts/custom-resources/nlbcustomdomainfunction/ac1c96e7f0823f3167b4e74c8b286ffe8f9d43279dc232d9478837327e57905e.zip",
"NLBCertValidatorFunction": "manual/scripts/custom-resources/nlbcertvalidatorfunction/41aeafc64f18f82c452432a214ae83d8c8de4aba2d5df6a752b7e9a2c86833f1.zip",
}
// WHEN
crs, err := LBWS(fakeFS)
// THEN
require.NoError(t, err)
require.Equal(t, fakeFS.matchCount, 5, "expected path calls do not match")
actualFnNames := make([]string, len(crs))
for i, cr := range crs {
actualFnNames[i] = cr.Name()
}
require.ElementsMatch(t,
[]string{"DynamicDesiredCountFunction", "EnvControllerFunction", "RulePriorityFunction", "NLBCustomDomainFunction", "NLBCertValidatorFunction"},
actualFnNames, "function names must match")
// ensure the zip files contain an index.js file.
for _, cr := range crs {
buf := new(bytes.Buffer)
size, err := buf.ReadFrom(cr.zipReader())
require.NoError(t, err)
r, err := zip.NewReader(bytes.NewReader(buf.Bytes()), size)
require.NoError(t, err)
_, err = r.Open("index.js")
require.NoError(t, err, "an index.js file must be present in all custom resources")
}
// ensure artifact paths match.
for _, cr := range crs {
require.Equal(t, fakePaths[cr.Name()], cr.ArtifactPath())
}
}
func TestWorker(t *testing.T) {
// GIVEN
fakeFS := &fakeTemplateReader{
files: map[string]*template.Content{
"custom-resources/desired-count-delegation.js": {
Buffer: bytes.NewBufferString("custom domain app runner"),
},
"custom-resources/backlog-per-task-calculator.js": {
Buffer: bytes.NewBufferString("backlog calc"),
},
"custom-resources/env-controller.js": {
Buffer: bytes.NewBufferString("env controller"),
},
},
}
fakePaths := map[string]string{
"DynamicDesiredCountFunction": "manual/scripts/custom-resources/dynamicdesiredcountfunction/2611784f21e91e499306dac066aae5fd8f2ba664b38073bdd3198d2e041c076e.zip",
"BacklogPerTaskCalculatorFunction": "manual/scripts/custom-resources/backlogpertaskcalculatorfunction/bc925d682cb47de9c65ed9cc5438ee51d9e2b9b39ca6b57bb9adda81b0091b30.zip",
"EnvControllerFunction": "manual/scripts/custom-resources/envcontrollerfunction/72297cacaeab3a267e371c17ea3f0235905b0da51410eb31c10f7c66ba944044.zip",
}
// WHEN
crs, err := Worker(fakeFS)
// THEN
require.NoError(t, err)
require.Equal(t, fakeFS.matchCount, 3, "expected path calls do not match")
actualFnNames := make([]string, len(crs))
for i, cr := range crs {
actualFnNames[i] = cr.Name()
}
require.ElementsMatch(t,
[]string{"DynamicDesiredCountFunction", "BacklogPerTaskCalculatorFunction", "EnvControllerFunction"},
actualFnNames, "function names must match")
// ensure the zip files contain an index.js file.
for _, cr := range crs {
buf := new(bytes.Buffer)
size, err := buf.ReadFrom(cr.zipReader())
require.NoError(t, err)
r, err := zip.NewReader(bytes.NewReader(buf.Bytes()), size)
require.NoError(t, err)
_, err = r.Open("index.js")
require.NoError(t, err, "an index.js file must be present in all custom resources")
}
// ensure artifact paths match.
for _, cr := range crs {
require.Equal(t, fakePaths[cr.Name()], cr.ArtifactPath())
}
}
func TestBackend(t *testing.T) {
// GIVEN
fakeFS := &fakeTemplateReader{
files: map[string]*template.Content{
"custom-resources/desired-count-delegation.js": {
Buffer: bytes.NewBufferString("custom domain app runner"),
},
"custom-resources/alb-rule-priority-generator.js": {
Buffer: bytes.NewBufferString("rule priority"),
},
"custom-resources/env-controller.js": {
Buffer: bytes.NewBufferString("env controller"),
},
},
}
fakePaths := map[string]string{
"DynamicDesiredCountFunction": "manual/scripts/custom-resources/dynamicdesiredcountfunction/2611784f21e91e499306dac066aae5fd8f2ba664b38073bdd3198d2e041c076e.zip",
"EnvControllerFunction": "manual/scripts/custom-resources/envcontrollerfunction/72297cacaeab3a267e371c17ea3f0235905b0da51410eb31c10f7c66ba944044.zip",
"RulePriorityFunction": "manual/scripts/custom-resources/rulepriorityfunction/1385d258950a50faf4b5cd7deeecbc4bcc79a0d41d631e3977cffa0332e6f0c6.zip",
}
// WHEN
crs, err := Backend(fakeFS)
// THEN
require.NoError(t, err)
require.Equal(t, fakeFS.matchCount, 3, "expected path calls do not match")
actualFnNames := make([]string, len(crs))
for i, cr := range crs {
actualFnNames[i] = cr.Name()
}
require.ElementsMatch(t,
[]string{"DynamicDesiredCountFunction", "RulePriorityFunction", "EnvControllerFunction"},
actualFnNames, "function names must match")
// ensure the zip files contain an index.js file.
for _, cr := range crs {
buf := new(bytes.Buffer)
size, err := buf.ReadFrom(cr.zipReader())
require.NoError(t, err)
r, err := zip.NewReader(bytes.NewReader(buf.Bytes()), size)
require.NoError(t, err)
_, err = r.Open("index.js")
require.NoError(t, err, "an index.js file must be present in all custom resources")
}
// ensure artifact paths match.
for _, cr := range crs {
require.Equal(t, fakePaths[cr.Name()], cr.ArtifactPath())
}
}
func TestStaticSite(t *testing.T) {
// GIVEN
fakeFS := &fakeTemplateReader{
files: map[string]*template.Content{
"custom-resources/trigger-state-machine.js": {
Buffer: bytes.NewBufferString("trigger state machine"),
},
"custom-resources/wkld-custom-domain.js": {
Buffer: bytes.NewBufferString("service-level custom domain"),
},
"custom-resources/wkld-cert-validator.js": {
Buffer: bytes.NewBufferString("service-level cert"),
},
},
}
fakePaths := map[string]string{
"TriggerStateMachineFunction": "manual/scripts/custom-resources/triggerstatemachinefunction/edfa40b595a5a4a6d24bfb7ad6e173560a29b7d720651ccc9c87eda76b93c7dd.zip",
"CustomDomainFunction": "manual/scripts/custom-resources/customdomainfunction/ac1c96e7f0823f3167b4e74c8b286ffe8f9d43279dc232d9478837327e57905e.zip",
"CertificateValidationFunction": "manual/scripts/custom-resources/certificatevalidationfunction/41aeafc64f18f82c452432a214ae83d8c8de4aba2d5df6a752b7e9a2c86833f1.zip",
}
// WHEN
crs, err := StaticSite(fakeFS)
// THEN
require.NoError(t, err)
require.Equal(t, fakeFS.matchCount, 3, "expected path calls do not match")
actualFnNames := make([]string, len(crs))
for i, cr := range crs {
actualFnNames[i] = cr.Name()
}
require.ElementsMatch(t,
[]string{"TriggerStateMachineFunction", "CustomDomainFunction", "CertificateValidationFunction"},
actualFnNames, "function names must match")
// ensure the zip files contain an index.js file.
for _, cr := range crs {
buf := new(bytes.Buffer)
size, err := buf.ReadFrom(cr.zipReader())
require.NoError(t, err)
r, err := zip.NewReader(bytes.NewReader(buf.Bytes()), size)
require.NoError(t, err)
_, err = r.Open("index.js")
require.NoError(t, err, "an index.js file must be present in all custom resources")
}
// ensure artifact paths match.
for _, cr := range crs {
require.Equal(t, fakePaths[cr.Name()], cr.ArtifactPath())
}
}
func TestScheduledJob(t *testing.T) {
// GIVEN
fakeFS := &fakeTemplateReader{
files: map[string]*template.Content{
"custom-resources/env-controller.js": {
Buffer: bytes.NewBufferString("env controller"),
},
},
}
fakePaths := map[string]string{
"EnvControllerFunction": "manual/scripts/custom-resources/envcontrollerfunction/72297cacaeab3a267e371c17ea3f0235905b0da51410eb31c10f7c66ba944044.zip",
}
// WHEN
crs, err := ScheduledJob(fakeFS)
// THEN
require.NoError(t, err)
require.Equal(t, fakeFS.matchCount, 1, "expected path calls do not match")
actualFnNames := make([]string, len(crs))
for i, cr := range crs {
actualFnNames[i] = cr.Name()
}
require.ElementsMatch(t,
[]string{"EnvControllerFunction"},
actualFnNames, "function names must match")
// ensure the zip files contain an index.js file.
for _, cr := range crs {
buf := new(bytes.Buffer)
size, err := buf.ReadFrom(cr.zipReader())
require.NoError(t, err)
r, err := zip.NewReader(bytes.NewReader(buf.Bytes()), size)
require.NoError(t, err)
_, err = r.Open("index.js")
require.NoError(t, err, "an index.js file must be present in all custom resources")
}
// ensure artifact paths match.
for _, cr := range crs {
require.Equal(t, fakePaths[cr.Name()], cr.ArtifactPath())
}
}
func TestEnv(t *testing.T) {
// GIVEN
fakeFS := &fakeTemplateReader{
files: map[string]*template.Content{
"custom-resources/dns-cert-validator.js": {
Buffer: bytes.NewBufferString("cert validator"),
},
"custom-resources/custom-domain.js": {
Buffer: bytes.NewBufferString("custom domain"),
},
"custom-resources/dns-delegation.js": {
Buffer: bytes.NewBufferString("dns delegation"),
},
"custom-resources/cert-replicator.js": {
Buffer: bytes.NewBufferString("cert replication"),
},
"custom-resources/unique-json-values.js": {
Buffer: bytes.NewBufferString("unique json values"),
},
},
}
fakePaths := map[string]string{
"CertificateValidationFunction": "manual/scripts/custom-resources/certificatevalidationfunction/ef49fd0cefe5525c1b98ab66614bfaebdf57dfa513a7de0d0677fc024b2f0a2b.zip",
"CustomDomainFunction": "manual/scripts/custom-resources/customdomainfunction/01baf83827dca2ff7df3cdf24f6ad354b3fa4f9b7cda39b5bf91de378f81c791.zip",
"DNSDelegationFunction": "manual/scripts/custom-resources/dnsdelegationfunction/17ec5f580cdb9c1d7c6b5b91decee031592547629a6bfed7cd33b9229f61ab19.zip",
"CertificateReplicatorFunction": "manual/scripts/custom-resources/certificatereplicatorfunction/647f83437e4736ddf2915784e13d023a7d342d162ffb42a9eec3d7c842072030.zip",
"UniqueJSONValuesFunction": "manual/scripts/custom-resources/uniquejsonvaluesfunction/68c7ace14491d82ac4bb5ad81b3371743d669a26638f419265c18e9bdfca8dd1.zip",
}
// WHEN
crs, err := Env(fakeFS)
// THEN
require.NoError(t, err)
require.Equal(t, fakeFS.matchCount, 5, "expected path calls do not match")
actualFnNames := make([]string, len(crs))
for i, cr := range crs {
actualFnNames[i] = cr.Name()
}
require.ElementsMatch(t,
[]string{"CertificateValidationFunction", "CustomDomainFunction", "DNSDelegationFunction", "CertificateReplicatorFunction", "UniqueJSONValuesFunction"},
actualFnNames, "function names must match")
// ensure the zip files contain an index.js file.
for _, cr := range crs {
buf := new(bytes.Buffer)
size, err := buf.ReadFrom(cr.zipReader())
require.NoError(t, err)
r, err := zip.NewReader(bytes.NewReader(buf.Bytes()), size)
require.NoError(t, err)
_, err = r.Open("index.js")
require.NoError(t, err, "an index.js file must be present in all custom resources")
}
// ensure artifact paths match.
for _, cr := range crs {
require.Equal(t, fakePaths[cr.Name()], cr.ArtifactPath())
}
}
type fakeS3 struct {
objects map[string]string
err error
}
func (f *fakeS3) UploadFunc() func(string, io.Reader) (string, error) {
return func(key string, dat io.Reader) (url string, err error) {
if f.err != nil {
return "", f.err
}
url, ok := f.objects[key]
if !ok {
return "", fmt.Errorf("key %q does not exist in fakeS3", key)
}
return url, nil
}
}
func TestUpload(t *testing.T) {
testCases := map[string]struct {
s3 *fakeS3
crs []*CustomResource
wantedURLs map[string]string
wantedErr error
}{
"should return a wrapped error if a custom resource cannot be uploaded": {
s3: &fakeS3{
err: errors.New("some err"),
},
crs: []*CustomResource{
{
name: "fn1",
zip: bytes.NewBufferString("hello"),
},
},
wantedErr: errors.New(`upload custom resource "fn1": some err`),
},
"should zip and upload all custom resources": {
s3: &fakeS3{
objects: map[string]string{
"manual/scripts/custom-resources/func1/e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855.zip": "url1",
"manual/scripts/custom-resources/func2/e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855.zip": "url2",
},
},
crs: []*CustomResource{
{
name: "Func1",
zip: new(bytes.Buffer),
},
{
name: "Func2",
zip: new(bytes.Buffer),
},
},
wantedURLs: map[string]string{
"Func1": "url1",
"Func2": "url2",
},
},
}
for name, tc := range testCases {
t.Run(name, func(t *testing.T) {
urls, err := Upload(tc.s3.UploadFunc(), tc.crs)
if tc.wantedErr != nil {
require.EqualError(t, err, tc.wantedErr.Error(), "errors do not match")
} else {
require.NoError(t, err)
require.Equal(t, tc.wantedURLs, urls)
}
})
}
}
| 490 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.