repo_name
stringlengths
1
52
repo_creator
stringclasses
6 values
programming_language
stringclasses
4 values
code
stringlengths
0
9.68M
num_lines
int64
1
234k
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 // Package groups contains the names of command groups. package group // Categories for each top level command in the CLI. const ( GettingStarted = "Getting Started" Develop = "Develop" Settings = "Settings" Release = "Release" Extend = "Extend" Debug = "Debug" )
16
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package list import ( "encoding/json" "fmt" "io" "strings" "text/tabwriter" "github.com/aws/copilot-cli/internal/pkg/config" ) const ( // Display settings. minCellWidth = 20 // minimum number of characters in a table's cell. tabWidth = 4 // number of characters in between columns. cellPaddingWidth = 2 // number of padding characters added by default to a cell. paddingChar = ' ' // character in between columns. noAdditionalFormatting = 0 // Workload types. jobWorkloadType = "job" svcWorkloadType = "service" ) // Store wraps the methods required for interacting with config stores. type Store interface { GetApplication(appName string) (*config.Application, error) ListJobs(appName string) ([]*config.Workload, error) ListServices(appName string) ([]*config.Workload, error) } // Workspace wraps the methods required to interact with a local workspace. type Workspace interface { ListJobs() ([]string, error) ListServices() ([]string, error) } // JobListWriter holds all the metadata and clients needed to list all jobs in a given // workspace or app in a human- or machine-readable format. type JobListWriter struct { // Output configuration options. ShowLocalJobs bool OutputJSON bool Store Store // Client to retrieve application configuration and job metadata. Ws Workspace // Client to retrieve local jobs. Out io.Writer // The writer where output will be written. } // SvcListWriter holds all the metadata and clients needed to list all services in a given // workspace or app in a human- or machine-readable format. type SvcListWriter struct { ShowLocalSvcs bool OutputJSON bool Store Store // Client to retrieve application configuration and service metadata. Ws Workspace // Client to retrieve local jobs. Out io.Writer // The writer where output will be written. } // ServiceJSONOutput is the output struct for service list. type ServiceJSONOutput struct { Services []*config.Workload `json:"services"` } // JobJSONOutput is the output struct for job list. type JobJSONOutput struct { Jobs []*config.Workload `json:"jobs"` } // Jobs lists all jobs, either locally or in the workspace, and writes the output to a writer. func (l *JobListWriter) Write(appName string) error { if _, err := l.Store.GetApplication(appName); err != nil { return fmt.Errorf("get application: %w", err) } wklds, err := l.Store.ListJobs(appName) if err != nil { return fmt.Errorf("get %s names: %w", jobWorkloadType, err) } if l.ShowLocalJobs { localWklds, err := l.Ws.ListJobs() if err != nil { return fmt.Errorf("get local %s names: %w", jobWorkloadType, err) } wklds = filterByName(wklds, localWklds) } if l.OutputJSON { data, err := l.jsonOutputJobs(wklds) if err != nil { return err } fmt.Fprint(l.Out, data) } else { humanOutput(wklds, l.Out) } return nil } // Write lists all services, either locally or in the workspace, and writes the output to a writer. func (l *SvcListWriter) Write(appName string) error { if _, err := l.Store.GetApplication(appName); err != nil { return fmt.Errorf("get application: %w", err) } wklds, err := l.Store.ListServices(appName) if err != nil { return fmt.Errorf("get %s names: %w", svcWorkloadType, err) } if l.ShowLocalSvcs { localWklds, err := l.Ws.ListServices() if err != nil { return fmt.Errorf("get local %s names: %w", svcWorkloadType, err) } wklds = filterByName(wklds, localWklds) } if l.OutputJSON { data, err := l.jsonOutputSvcs(wklds) if err != nil { return err } fmt.Fprint(l.Out, data) } else { humanOutput(wklds, l.Out) } return nil } func filterByName(wklds []*config.Workload, wantedNames []string) []*config.Workload { isWanted := make(map[string]bool) for _, name := range wantedNames { isWanted[name] = true } var filtered []*config.Workload for _, wkld := range wklds { if isWanted[wkld.Name] { filtered = append(filtered, wkld) } } return filtered } func underline(headings []string) []string { var lines []string for _, heading := range headings { line := strings.Repeat("-", len(heading)) lines = append(lines, line) } return lines } func humanOutput(wklds []*config.Workload, w io.Writer) { writer := tabwriter.NewWriter(w, minCellWidth, tabWidth, cellPaddingWidth, paddingChar, noAdditionalFormatting) headers := []string{"Name", "Type"} fmt.Fprintf(writer, "%s\n", strings.Join(headers, "\t")) fmt.Fprintf(writer, "%s\n", strings.Join(underline(headers), "\t")) for _, wkld := range wklds { fmt.Fprintf(writer, "%s\t%s\n", wkld.Name, wkld.Type) } writer.Flush() } func (l *SvcListWriter) jsonOutputSvcs(svcs []*config.Workload) (string, error) { b, err := json.Marshal(ServiceJSONOutput{Services: svcs}) if err != nil { return "", fmt.Errorf("marshal services: %w", err) } return fmt.Sprintf("%s\n", b), nil } func (l *JobListWriter) jsonOutputJobs(jobs []*config.Workload) (string, error) { b, err := json.Marshal(JobJSONOutput{Jobs: jobs}) if err != nil { return "", fmt.Errorf("marshal jobs: %w", err) } return fmt.Sprintf("%s\n", b), nil }
180
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package list import ( "bytes" "fmt" "testing" "github.com/aws/copilot-cli/internal/pkg/cli/list/mocks" "github.com/aws/copilot-cli/internal/pkg/config" "github.com/golang/mock/gomock" "github.com/stretchr/testify/require" ) func TestList_JobListWriter(t *testing.T) { ctrl := gomock.NewController(t) mockError := fmt.Errorf("error") mockStore := mocks.NewMockStore(ctrl) mockWs := mocks.NewMockWorkspace(ctrl) mockAppName := "barnyard" testCases := map[string]struct { inputAppName string inputWriteJSON bool inputListLocal bool wantedError error wantedContent string mocking func() }{ "should succeed writing human readable": { inputAppName: mockAppName, inputWriteJSON: false, wantedContent: `Name Type ---- ---- badgoose Scheduled Job farmer Scheduled Job `, mocking: func() { mockStore.EXPECT(). GetApplication(gomock.Eq("barnyard")). Return(&config.Application{}, nil) mockStore. EXPECT(). ListJobs(gomock.Eq("barnyard")). Return([]*config.Workload{ {Name: "badgoose", Type: "Scheduled Job"}, {Name: "farmer", Type: "Scheduled Job"}, }, nil) }, }, "should succeed writing json": { inputAppName: mockAppName, inputWriteJSON: true, wantedContent: `{"jobs":[{"app":"","name":"badgoose","type":"Scheduled Job"},{"app":"","name":"farmer","type":"Scheduled Job"}]} `, mocking: func() { mockStore.EXPECT(). GetApplication(gomock.Eq("barnyard")). Return(&config.Application{}, nil) mockStore. EXPECT(). ListJobs(gomock.Eq("barnyard")). Return([]*config.Workload{ {Name: "badgoose", Type: "Scheduled Job"}, {Name: "farmer", Type: "Scheduled Job"}, }, nil) }, }, "with bad application name": { inputAppName: mockAppName, wantedError: fmt.Errorf("get application: error"), mocking: func() { mockStore.EXPECT(). GetApplication(gomock.Eq("barnyard")). Return(nil, mockError) mockStore. EXPECT(). ListJobs(gomock.Eq("barnyard")). Times(0) }, }, "listing local jobs": { inputAppName: mockAppName, inputListLocal: true, wantedContent: "Name Type\n---- ----\nbadgoose Scheduled Job\n", mocking: func() { mockStore.EXPECT().GetApplication("barnyard"). Return(&config.Application{}, nil) mockStore.EXPECT().ListJobs("barnyard"). Return([]*config.Workload{ {Name: "badgoose", Type: "Scheduled Job"}, {Name: "farmer", Type: "Scheduled Job"}, }, nil) mockWs.EXPECT().ListJobs().Return([]string{"badgoose"}, nil) }, }, "with failed call to ListJobs": { inputAppName: mockAppName, wantedError: fmt.Errorf("get job names: error"), mocking: func() { mockStore.EXPECT().GetApplication("barnyard"). Return(&config.Application{}, nil) mockStore.EXPECT().ListJobs("barnyard"). Return(nil, mockError) }, }, "with no local jobs": { inputAppName: mockAppName, inputListLocal: true, wantedContent: "Name Type\n---- ----\n", mocking: func() { mockStore.EXPECT().GetApplication("barnyard"). Return(&config.Application{}, nil) mockStore.EXPECT().ListJobs("barnyard"). Return([]*config.Workload{ {Name: "badgoose", Type: "Scheduled Job"}, {Name: "farmer", Type: "Scheduled Job"}, }, nil) mockWs.EXPECT().ListJobs().Return([]string{}, nil) }, }, "with no local jobs json": { inputAppName: mockAppName, inputWriteJSON: true, inputListLocal: true, wantedContent: "{\"jobs\":null}\n", mocking: func() { mockStore.EXPECT().GetApplication("barnyard"). Return(&config.Application{}, nil) mockStore.EXPECT().ListJobs("barnyard"). Return([]*config.Workload{ {Name: "badgoose", Type: "Scheduled Job"}, {Name: "farmer", Type: "Scheduled Job"}, }, nil) mockWs.EXPECT().ListJobs().Return([]string{""}, nil) }, }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { b := &bytes.Buffer{} tc.mocking() list := &JobListWriter{ Ws: mockWs, Store: mockStore, Out: b, ShowLocalJobs: tc.inputListLocal, OutputJSON: tc.inputWriteJSON, } // WHEN err := list.Write(tc.inputAppName) if tc.wantedError != nil { require.EqualError(t, tc.wantedError, err.Error()) } else { require.Equal(t, tc.wantedContent, b.String()) } }) } } func TestList_SvcListWriter(t *testing.T) { ctrl := gomock.NewController(t) mockError := fmt.Errorf("error") mockStore := mocks.NewMockStore(ctrl) mockWs := mocks.NewMockWorkspace(ctrl) mockAppName := "barnyard" testCases := map[string]struct { inputAppName string inputWriteJSON bool inputListLocal bool wantedError error wantedContent string mocking func() }{ "should succeed writing human readable": { inputAppName: mockAppName, inputWriteJSON: false, wantedContent: "Name Type\n---- ----\ntrough Backend Service\ngaggle Load Balanced Web Service\n", mocking: func() { mockStore.EXPECT(). GetApplication(gomock.Eq("barnyard")). Return(&config.Application{}, nil) mockStore. EXPECT(). ListServices(gomock.Eq("barnyard")). Return([]*config.Workload{ {Name: "trough", Type: "Backend Service"}, {Name: "gaggle", Type: "Load Balanced Web Service"}, }, nil) }, }, "should succeed writing json": { inputAppName: mockAppName, inputWriteJSON: true, wantedContent: `{"services":[{"app":"","name":"trough","type":"Backend Service"},{"app":"","name":"gaggle","type":"Load Balanced Web Service"}]} `, mocking: func() { mockStore.EXPECT(). GetApplication(gomock.Eq("barnyard")). Return(&config.Application{}, nil) mockStore. EXPECT(). ListServices(gomock.Eq("barnyard")). Return([]*config.Workload{ {Name: "trough", Type: "Backend Service"}, {Name: "gaggle", Type: "Load Balanced Web Service"}, }, nil) }, }, "with bad application name": { inputAppName: mockAppName, wantedError: fmt.Errorf("get application: error"), mocking: func() { mockStore.EXPECT(). GetApplication(gomock.Eq("barnyard")). Return(nil, mockError) mockStore. EXPECT(). ListServices(gomock.Eq("barnyard")). Times(0) }, }, "listing local services": { inputAppName: mockAppName, inputListLocal: true, wantedContent: "Name Type\n---- ----\ntrough Backend Service\n", mocking: func() { mockStore.EXPECT().GetApplication("barnyard"). Return(&config.Application{}, nil) mockStore.EXPECT().ListServices("barnyard"). Return([]*config.Workload{ {Name: "trough", Type: "Backend Service"}, {Name: "gaggle", Type: "Load Balanced Web Service"}, }, nil) mockWs.EXPECT().ListServices().Return([]string{"trough"}, nil) }, }, "with failed call to ListJobs": { inputAppName: mockAppName, wantedError: fmt.Errorf("get service names: error"), mocking: func() { mockStore.EXPECT().GetApplication("barnyard"). Return(&config.Application{}, nil) mockStore.EXPECT().ListServices("barnyard"). Return(nil, mockError) }, }, "with no local services": { inputAppName: mockAppName, inputListLocal: true, wantedContent: "Name Type\n---- ----\n", mocking: func() { mockStore.EXPECT().GetApplication("barnyard"). Return(&config.Application{}, nil) mockStore.EXPECT().ListServices("barnyard"). Return([]*config.Workload{ {Name: "trough", Type: "Backend Service"}, {Name: "gaggle", Type: "Load Balanced Web Service"}, }, nil) mockWs.EXPECT().ListServices().Return([]string{}, nil) }, }, "with no local services json": { inputAppName: mockAppName, inputWriteJSON: true, inputListLocal: true, wantedContent: "{\"services\":null}\n", mocking: func() { mockStore.EXPECT().GetApplication("barnyard"). Return(&config.Application{}, nil) mockStore.EXPECT().ListServices("barnyard"). Return([]*config.Workload{ {Name: "trough", Type: "Backend Service"}, {Name: "gaggle", Type: "Load Balanced Web Service"}, }, nil) mockWs.EXPECT().ListServices().Return([]string{}, nil) }, }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { b := &bytes.Buffer{} tc.mocking() list := &SvcListWriter{ Ws: mockWs, Store: mockStore, Out: b, ShowLocalSvcs: tc.inputListLocal, OutputJSON: tc.inputWriteJSON, } // WHEN err := list.Write(tc.inputAppName) if tc.wantedError != nil { require.EqualError(t, tc.wantedError, err.Error()) } else { require.Equal(t, tc.wantedContent, b.String()) } }) } }
342
copilot-cli
aws
Go
// Code generated by MockGen. DO NOT EDIT. // Source: ./internal/pkg/cli/list/list.go // Package mocks is a generated GoMock package. package mocks import ( reflect "reflect" config "github.com/aws/copilot-cli/internal/pkg/config" gomock "github.com/golang/mock/gomock" ) // MockStore is a mock of Store interface. type MockStore struct { ctrl *gomock.Controller recorder *MockStoreMockRecorder } // MockStoreMockRecorder is the mock recorder for MockStore. type MockStoreMockRecorder struct { mock *MockStore } // NewMockStore creates a new mock instance. func NewMockStore(ctrl *gomock.Controller) *MockStore { mock := &MockStore{ctrl: ctrl} mock.recorder = &MockStoreMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockStore) EXPECT() *MockStoreMockRecorder { return m.recorder } // GetApplication mocks base method. func (m *MockStore) GetApplication(appName string) (*config.Application, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "GetApplication", appName) ret0, _ := ret[0].(*config.Application) ret1, _ := ret[1].(error) return ret0, ret1 } // GetApplication indicates an expected call of GetApplication. func (mr *MockStoreMockRecorder) GetApplication(appName interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetApplication", reflect.TypeOf((*MockStore)(nil).GetApplication), appName) } // ListJobs mocks base method. func (m *MockStore) ListJobs(appName string) ([]*config.Workload, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "ListJobs", appName) ret0, _ := ret[0].([]*config.Workload) ret1, _ := ret[1].(error) return ret0, ret1 } // ListJobs indicates an expected call of ListJobs. func (mr *MockStoreMockRecorder) ListJobs(appName interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ListJobs", reflect.TypeOf((*MockStore)(nil).ListJobs), appName) } // ListServices mocks base method. func (m *MockStore) ListServices(appName string) ([]*config.Workload, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "ListServices", appName) ret0, _ := ret[0].([]*config.Workload) ret1, _ := ret[1].(error) return ret0, ret1 } // ListServices indicates an expected call of ListServices. func (mr *MockStoreMockRecorder) ListServices(appName interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ListServices", reflect.TypeOf((*MockStore)(nil).ListServices), appName) } // MockWorkspace is a mock of Workspace interface. type MockWorkspace struct { ctrl *gomock.Controller recorder *MockWorkspaceMockRecorder } // MockWorkspaceMockRecorder is the mock recorder for MockWorkspace. type MockWorkspaceMockRecorder struct { mock *MockWorkspace } // NewMockWorkspace creates a new mock instance. func NewMockWorkspace(ctrl *gomock.Controller) *MockWorkspace { mock := &MockWorkspace{ctrl: ctrl} mock.recorder = &MockWorkspaceMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockWorkspace) EXPECT() *MockWorkspaceMockRecorder { return m.recorder } // ListJobs mocks base method. func (m *MockWorkspace) ListJobs() ([]string, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "ListJobs") ret0, _ := ret[0].([]string) ret1, _ := ret[1].(error) return ret0, ret1 } // ListJobs indicates an expected call of ListJobs. func (mr *MockWorkspaceMockRecorder) ListJobs() *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ListJobs", reflect.TypeOf((*MockWorkspace)(nil).ListJobs)) } // ListServices mocks base method. func (m *MockWorkspace) ListServices() ([]string, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "ListServices") ret0, _ := ret[0].([]string) ret1, _ := ret[1].(error) return ret0, ret1 } // ListServices indicates an expected call of ListServices. func (mr *MockWorkspaceMockRecorder) ListServices() *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ListServices", reflect.TypeOf((*MockWorkspace)(nil).ListServices)) }
134
copilot-cli
aws
Go
// Code generated by MockGen. DO NOT EDIT. // Source: ./internal/pkg/cli/completion.go // Package mocks is a generated GoMock package. package mocks import ( io "io" reflect "reflect" gomock "github.com/golang/mock/gomock" ) // MockshellCompleter is a mock of shellCompleter interface. type MockshellCompleter struct { ctrl *gomock.Controller recorder *MockshellCompleterMockRecorder } // MockshellCompleterMockRecorder is the mock recorder for MockshellCompleter. type MockshellCompleterMockRecorder struct { mock *MockshellCompleter } // NewMockshellCompleter creates a new mock instance. func NewMockshellCompleter(ctrl *gomock.Controller) *MockshellCompleter { mock := &MockshellCompleter{ctrl: ctrl} mock.recorder = &MockshellCompleterMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockshellCompleter) EXPECT() *MockshellCompleterMockRecorder { return m.recorder } // GenBashCompletion mocks base method. func (m *MockshellCompleter) GenBashCompletion(w io.Writer) error { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "GenBashCompletion", w) ret0, _ := ret[0].(error) return ret0 } // GenBashCompletion indicates an expected call of GenBashCompletion. func (mr *MockshellCompleterMockRecorder) GenBashCompletion(w interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GenBashCompletion", reflect.TypeOf((*MockshellCompleter)(nil).GenBashCompletion), w) } // GenFishCompletion mocks base method. func (m *MockshellCompleter) GenFishCompletion(w io.Writer, includeDesc bool) error { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "GenFishCompletion", w, includeDesc) ret0, _ := ret[0].(error) return ret0 } // GenFishCompletion indicates an expected call of GenFishCompletion. func (mr *MockshellCompleterMockRecorder) GenFishCompletion(w, includeDesc interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GenFishCompletion", reflect.TypeOf((*MockshellCompleter)(nil).GenFishCompletion), w, includeDesc) } // GenZshCompletion mocks base method. func (m *MockshellCompleter) GenZshCompletion(w io.Writer) error { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "GenZshCompletion", w) ret0, _ := ret[0].(error) return ret0 } // GenZshCompletion indicates an expected call of GenZshCompletion. func (mr *MockshellCompleterMockRecorder) GenZshCompletion(w interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GenZshCompletion", reflect.TypeOf((*MockshellCompleter)(nil).GenZshCompletion), w) }
78
copilot-cli
aws
Go
// Code generated by MockGen. DO NOT EDIT. // Source: ./internal/pkg/cli/identity.go // Package mocks is a generated GoMock package. package mocks import ( reflect "reflect" identity "github.com/aws/copilot-cli/internal/pkg/aws/identity" gomock "github.com/golang/mock/gomock" ) // MockidentityService is a mock of identityService interface. type MockidentityService struct { ctrl *gomock.Controller recorder *MockidentityServiceMockRecorder } // MockidentityServiceMockRecorder is the mock recorder for MockidentityService. type MockidentityServiceMockRecorder struct { mock *MockidentityService } // NewMockidentityService creates a new mock instance. func NewMockidentityService(ctrl *gomock.Controller) *MockidentityService { mock := &MockidentityService{ctrl: ctrl} mock.recorder = &MockidentityServiceMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockidentityService) EXPECT() *MockidentityServiceMockRecorder { return m.recorder } // Get mocks base method. func (m *MockidentityService) Get() (identity.Caller, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "Get") ret0, _ := ret[0].(identity.Caller) ret1, _ := ret[1].(error) return ret0, ret1 } // Get indicates an expected call of Get. func (mr *MockidentityServiceMockRecorder) Get() *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Get", reflect.TypeOf((*MockidentityService)(nil).Get)) }
51
copilot-cli
aws
Go
// Code generated by MockGen. DO NOT EDIT. // Source: ./internal/pkg/cli/interfaces.go // Package mocks is a generated GoMock package. package mocks import ( context "context" encoding "encoding" io "io" reflect "reflect" session "github.com/aws/aws-sdk-go/aws/session" cloudformation "github.com/aws/copilot-cli/internal/pkg/aws/cloudformation" codepipeline "github.com/aws/copilot-cli/internal/pkg/aws/codepipeline" ec2 "github.com/aws/copilot-cli/internal/pkg/aws/ec2" ecs "github.com/aws/copilot-cli/internal/pkg/aws/ecs" secretsmanager "github.com/aws/copilot-cli/internal/pkg/aws/secretsmanager" ssm "github.com/aws/copilot-cli/internal/pkg/aws/ssm" deploy "github.com/aws/copilot-cli/internal/pkg/cli/deploy" config "github.com/aws/copilot-cli/internal/pkg/config" deploy0 "github.com/aws/copilot-cli/internal/pkg/deploy" cloudformation0 "github.com/aws/copilot-cli/internal/pkg/deploy/cloudformation" stack "github.com/aws/copilot-cli/internal/pkg/deploy/cloudformation/stack" describe "github.com/aws/copilot-cli/internal/pkg/describe" dockerengine "github.com/aws/copilot-cli/internal/pkg/docker/dockerengine" dockerfile "github.com/aws/copilot-cli/internal/pkg/docker/dockerfile" ecs0 "github.com/aws/copilot-cli/internal/pkg/ecs" exec "github.com/aws/copilot-cli/internal/pkg/exec" initialize "github.com/aws/copilot-cli/internal/pkg/initialize" logging "github.com/aws/copilot-cli/internal/pkg/logging" manifest "github.com/aws/copilot-cli/internal/pkg/manifest" task "github.com/aws/copilot-cli/internal/pkg/task" template "github.com/aws/copilot-cli/internal/pkg/template" prompt "github.com/aws/copilot-cli/internal/pkg/term/prompt" selector "github.com/aws/copilot-cli/internal/pkg/term/selector" workspace "github.com/aws/copilot-cli/internal/pkg/workspace" gomock "github.com/golang/mock/gomock" ) // Mockcmd is a mock of cmd interface. type Mockcmd struct { ctrl *gomock.Controller recorder *MockcmdMockRecorder } // MockcmdMockRecorder is the mock recorder for Mockcmd. type MockcmdMockRecorder struct { mock *Mockcmd } // NewMockcmd creates a new mock instance. func NewMockcmd(ctrl *gomock.Controller) *Mockcmd { mock := &Mockcmd{ctrl: ctrl} mock.recorder = &MockcmdMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *Mockcmd) EXPECT() *MockcmdMockRecorder { return m.recorder } // Ask mocks base method. func (m *Mockcmd) Ask() error { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "Ask") ret0, _ := ret[0].(error) return ret0 } // Ask indicates an expected call of Ask. func (mr *MockcmdMockRecorder) Ask() *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Ask", reflect.TypeOf((*Mockcmd)(nil).Ask)) } // Execute mocks base method. func (m *Mockcmd) Execute() error { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "Execute") ret0, _ := ret[0].(error) return ret0 } // Execute indicates an expected call of Execute. func (mr *MockcmdMockRecorder) Execute() *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Execute", reflect.TypeOf((*Mockcmd)(nil).Execute)) } // Validate mocks base method. func (m *Mockcmd) Validate() error { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "Validate") ret0, _ := ret[0].(error) return ret0 } // Validate indicates an expected call of Validate. func (mr *MockcmdMockRecorder) Validate() *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Validate", reflect.TypeOf((*Mockcmd)(nil).Validate)) } // MockactionCommand is a mock of actionCommand interface. type MockactionCommand struct { ctrl *gomock.Controller recorder *MockactionCommandMockRecorder } // MockactionCommandMockRecorder is the mock recorder for MockactionCommand. type MockactionCommandMockRecorder struct { mock *MockactionCommand } // NewMockactionCommand creates a new mock instance. func NewMockactionCommand(ctrl *gomock.Controller) *MockactionCommand { mock := &MockactionCommand{ctrl: ctrl} mock.recorder = &MockactionCommandMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockactionCommand) EXPECT() *MockactionCommandMockRecorder { return m.recorder } // Ask mocks base method. func (m *MockactionCommand) Ask() error { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "Ask") ret0, _ := ret[0].(error) return ret0 } // Ask indicates an expected call of Ask. func (mr *MockactionCommandMockRecorder) Ask() *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Ask", reflect.TypeOf((*MockactionCommand)(nil).Ask)) } // Execute mocks base method. func (m *MockactionCommand) Execute() error { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "Execute") ret0, _ := ret[0].(error) return ret0 } // Execute indicates an expected call of Execute. func (mr *MockactionCommandMockRecorder) Execute() *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Execute", reflect.TypeOf((*MockactionCommand)(nil).Execute)) } // RecommendActions mocks base method. func (m *MockactionCommand) RecommendActions() error { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "RecommendActions") ret0, _ := ret[0].(error) return ret0 } // RecommendActions indicates an expected call of RecommendActions. func (mr *MockactionCommandMockRecorder) RecommendActions() *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "RecommendActions", reflect.TypeOf((*MockactionCommand)(nil).RecommendActions)) } // Validate mocks base method. func (m *MockactionCommand) Validate() error { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "Validate") ret0, _ := ret[0].(error) return ret0 } // Validate indicates an expected call of Validate. func (mr *MockactionCommandMockRecorder) Validate() *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Validate", reflect.TypeOf((*MockactionCommand)(nil).Validate)) } // MockserviceStore is a mock of serviceStore interface. type MockserviceStore struct { ctrl *gomock.Controller recorder *MockserviceStoreMockRecorder } // MockserviceStoreMockRecorder is the mock recorder for MockserviceStore. type MockserviceStoreMockRecorder struct { mock *MockserviceStore } // NewMockserviceStore creates a new mock instance. func NewMockserviceStore(ctrl *gomock.Controller) *MockserviceStore { mock := &MockserviceStore{ctrl: ctrl} mock.recorder = &MockserviceStoreMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockserviceStore) EXPECT() *MockserviceStoreMockRecorder { return m.recorder } // CreateService mocks base method. func (m *MockserviceStore) CreateService(svc *config.Workload) error { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "CreateService", svc) ret0, _ := ret[0].(error) return ret0 } // CreateService indicates an expected call of CreateService. func (mr *MockserviceStoreMockRecorder) CreateService(svc interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "CreateService", reflect.TypeOf((*MockserviceStore)(nil).CreateService), svc) } // DeleteService mocks base method. func (m *MockserviceStore) DeleteService(appName, svcName string) error { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "DeleteService", appName, svcName) ret0, _ := ret[0].(error) return ret0 } // DeleteService indicates an expected call of DeleteService. func (mr *MockserviceStoreMockRecorder) DeleteService(appName, svcName interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DeleteService", reflect.TypeOf((*MockserviceStore)(nil).DeleteService), appName, svcName) } // GetService mocks base method. func (m *MockserviceStore) GetService(appName, svcName string) (*config.Workload, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "GetService", appName, svcName) ret0, _ := ret[0].(*config.Workload) ret1, _ := ret[1].(error) return ret0, ret1 } // GetService indicates an expected call of GetService. func (mr *MockserviceStoreMockRecorder) GetService(appName, svcName interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetService", reflect.TypeOf((*MockserviceStore)(nil).GetService), appName, svcName) } // ListServices mocks base method. func (m *MockserviceStore) ListServices(appName string) ([]*config.Workload, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "ListServices", appName) ret0, _ := ret[0].([]*config.Workload) ret1, _ := ret[1].(error) return ret0, ret1 } // ListServices indicates an expected call of ListServices. func (mr *MockserviceStoreMockRecorder) ListServices(appName interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ListServices", reflect.TypeOf((*MockserviceStore)(nil).ListServices), appName) } // MockjobStore is a mock of jobStore interface. type MockjobStore struct { ctrl *gomock.Controller recorder *MockjobStoreMockRecorder } // MockjobStoreMockRecorder is the mock recorder for MockjobStore. type MockjobStoreMockRecorder struct { mock *MockjobStore } // NewMockjobStore creates a new mock instance. func NewMockjobStore(ctrl *gomock.Controller) *MockjobStore { mock := &MockjobStore{ctrl: ctrl} mock.recorder = &MockjobStoreMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockjobStore) EXPECT() *MockjobStoreMockRecorder { return m.recorder } // CreateJob mocks base method. func (m *MockjobStore) CreateJob(job *config.Workload) error { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "CreateJob", job) ret0, _ := ret[0].(error) return ret0 } // CreateJob indicates an expected call of CreateJob. func (mr *MockjobStoreMockRecorder) CreateJob(job interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "CreateJob", reflect.TypeOf((*MockjobStore)(nil).CreateJob), job) } // DeleteJob mocks base method. func (m *MockjobStore) DeleteJob(appName, jobName string) error { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "DeleteJob", appName, jobName) ret0, _ := ret[0].(error) return ret0 } // DeleteJob indicates an expected call of DeleteJob. func (mr *MockjobStoreMockRecorder) DeleteJob(appName, jobName interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DeleteJob", reflect.TypeOf((*MockjobStore)(nil).DeleteJob), appName, jobName) } // GetJob mocks base method. func (m *MockjobStore) GetJob(appName, jobName string) (*config.Workload, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "GetJob", appName, jobName) ret0, _ := ret[0].(*config.Workload) ret1, _ := ret[1].(error) return ret0, ret1 } // GetJob indicates an expected call of GetJob. func (mr *MockjobStoreMockRecorder) GetJob(appName, jobName interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetJob", reflect.TypeOf((*MockjobStore)(nil).GetJob), appName, jobName) } // ListJobs mocks base method. func (m *MockjobStore) ListJobs(appName string) ([]*config.Workload, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "ListJobs", appName) ret0, _ := ret[0].([]*config.Workload) ret1, _ := ret[1].(error) return ret0, ret1 } // ListJobs indicates an expected call of ListJobs. func (mr *MockjobStoreMockRecorder) ListJobs(appName interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ListJobs", reflect.TypeOf((*MockjobStore)(nil).ListJobs), appName) } // MockwlStore is a mock of wlStore interface. type MockwlStore struct { ctrl *gomock.Controller recorder *MockwlStoreMockRecorder } // MockwlStoreMockRecorder is the mock recorder for MockwlStore. type MockwlStoreMockRecorder struct { mock *MockwlStore } // NewMockwlStore creates a new mock instance. func NewMockwlStore(ctrl *gomock.Controller) *MockwlStore { mock := &MockwlStore{ctrl: ctrl} mock.recorder = &MockwlStoreMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockwlStore) EXPECT() *MockwlStoreMockRecorder { return m.recorder } // GetWorkload mocks base method. func (m *MockwlStore) GetWorkload(appName, name string) (*config.Workload, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "GetWorkload", appName, name) ret0, _ := ret[0].(*config.Workload) ret1, _ := ret[1].(error) return ret0, ret1 } // GetWorkload indicates an expected call of GetWorkload. func (mr *MockwlStoreMockRecorder) GetWorkload(appName, name interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetWorkload", reflect.TypeOf((*MockwlStore)(nil).GetWorkload), appName, name) } // ListWorkloads mocks base method. func (m *MockwlStore) ListWorkloads(appName string) ([]*config.Workload, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "ListWorkloads", appName) ret0, _ := ret[0].([]*config.Workload) ret1, _ := ret[1].(error) return ret0, ret1 } // ListWorkloads indicates an expected call of ListWorkloads. func (mr *MockwlStoreMockRecorder) ListWorkloads(appName interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ListWorkloads", reflect.TypeOf((*MockwlStore)(nil).ListWorkloads), appName) } // MockworkloadListWriter is a mock of workloadListWriter interface. type MockworkloadListWriter struct { ctrl *gomock.Controller recorder *MockworkloadListWriterMockRecorder } // MockworkloadListWriterMockRecorder is the mock recorder for MockworkloadListWriter. type MockworkloadListWriterMockRecorder struct { mock *MockworkloadListWriter } // NewMockworkloadListWriter creates a new mock instance. func NewMockworkloadListWriter(ctrl *gomock.Controller) *MockworkloadListWriter { mock := &MockworkloadListWriter{ctrl: ctrl} mock.recorder = &MockworkloadListWriterMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockworkloadListWriter) EXPECT() *MockworkloadListWriterMockRecorder { return m.recorder } // Write mocks base method. func (m *MockworkloadListWriter) Write(appName string) error { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "Write", appName) ret0, _ := ret[0].(error) return ret0 } // Write indicates an expected call of Write. func (mr *MockworkloadListWriterMockRecorder) Write(appName interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Write", reflect.TypeOf((*MockworkloadListWriter)(nil).Write), appName) } // MockapplicationStore is a mock of applicationStore interface. type MockapplicationStore struct { ctrl *gomock.Controller recorder *MockapplicationStoreMockRecorder } // MockapplicationStoreMockRecorder is the mock recorder for MockapplicationStore. type MockapplicationStoreMockRecorder struct { mock *MockapplicationStore } // NewMockapplicationStore creates a new mock instance. func NewMockapplicationStore(ctrl *gomock.Controller) *MockapplicationStore { mock := &MockapplicationStore{ctrl: ctrl} mock.recorder = &MockapplicationStoreMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockapplicationStore) EXPECT() *MockapplicationStoreMockRecorder { return m.recorder } // CreateApplication mocks base method. func (m *MockapplicationStore) CreateApplication(app *config.Application) error { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "CreateApplication", app) ret0, _ := ret[0].(error) return ret0 } // CreateApplication indicates an expected call of CreateApplication. func (mr *MockapplicationStoreMockRecorder) CreateApplication(app interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "CreateApplication", reflect.TypeOf((*MockapplicationStore)(nil).CreateApplication), app) } // DeleteApplication mocks base method. func (m *MockapplicationStore) DeleteApplication(name string) error { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "DeleteApplication", name) ret0, _ := ret[0].(error) return ret0 } // DeleteApplication indicates an expected call of DeleteApplication. func (mr *MockapplicationStoreMockRecorder) DeleteApplication(name interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DeleteApplication", reflect.TypeOf((*MockapplicationStore)(nil).DeleteApplication), name) } // GetApplication mocks base method. func (m *MockapplicationStore) GetApplication(appName string) (*config.Application, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "GetApplication", appName) ret0, _ := ret[0].(*config.Application) ret1, _ := ret[1].(error) return ret0, ret1 } // GetApplication indicates an expected call of GetApplication. func (mr *MockapplicationStoreMockRecorder) GetApplication(appName interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetApplication", reflect.TypeOf((*MockapplicationStore)(nil).GetApplication), appName) } // ListApplications mocks base method. func (m *MockapplicationStore) ListApplications() ([]*config.Application, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "ListApplications") ret0, _ := ret[0].([]*config.Application) ret1, _ := ret[1].(error) return ret0, ret1 } // ListApplications indicates an expected call of ListApplications. func (mr *MockapplicationStoreMockRecorder) ListApplications() *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ListApplications", reflect.TypeOf((*MockapplicationStore)(nil).ListApplications)) } // UpdateApplication mocks base method. func (m *MockapplicationStore) UpdateApplication(app *config.Application) error { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "UpdateApplication", app) ret0, _ := ret[0].(error) return ret0 } // UpdateApplication indicates an expected call of UpdateApplication. func (mr *MockapplicationStoreMockRecorder) UpdateApplication(app interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "UpdateApplication", reflect.TypeOf((*MockapplicationStore)(nil).UpdateApplication), app) } // MockapplicationCreator is a mock of applicationCreator interface. type MockapplicationCreator struct { ctrl *gomock.Controller recorder *MockapplicationCreatorMockRecorder } // MockapplicationCreatorMockRecorder is the mock recorder for MockapplicationCreator. type MockapplicationCreatorMockRecorder struct { mock *MockapplicationCreator } // NewMockapplicationCreator creates a new mock instance. func NewMockapplicationCreator(ctrl *gomock.Controller) *MockapplicationCreator { mock := &MockapplicationCreator{ctrl: ctrl} mock.recorder = &MockapplicationCreatorMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockapplicationCreator) EXPECT() *MockapplicationCreatorMockRecorder { return m.recorder } // CreateApplication mocks base method. func (m *MockapplicationCreator) CreateApplication(app *config.Application) error { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "CreateApplication", app) ret0, _ := ret[0].(error) return ret0 } // CreateApplication indicates an expected call of CreateApplication. func (mr *MockapplicationCreatorMockRecorder) CreateApplication(app interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "CreateApplication", reflect.TypeOf((*MockapplicationCreator)(nil).CreateApplication), app) } // MockapplicationUpdater is a mock of applicationUpdater interface. type MockapplicationUpdater struct { ctrl *gomock.Controller recorder *MockapplicationUpdaterMockRecorder } // MockapplicationUpdaterMockRecorder is the mock recorder for MockapplicationUpdater. type MockapplicationUpdaterMockRecorder struct { mock *MockapplicationUpdater } // NewMockapplicationUpdater creates a new mock instance. func NewMockapplicationUpdater(ctrl *gomock.Controller) *MockapplicationUpdater { mock := &MockapplicationUpdater{ctrl: ctrl} mock.recorder = &MockapplicationUpdaterMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockapplicationUpdater) EXPECT() *MockapplicationUpdaterMockRecorder { return m.recorder } // UpdateApplication mocks base method. func (m *MockapplicationUpdater) UpdateApplication(app *config.Application) error { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "UpdateApplication", app) ret0, _ := ret[0].(error) return ret0 } // UpdateApplication indicates an expected call of UpdateApplication. func (mr *MockapplicationUpdaterMockRecorder) UpdateApplication(app interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "UpdateApplication", reflect.TypeOf((*MockapplicationUpdater)(nil).UpdateApplication), app) } // MockapplicationGetter is a mock of applicationGetter interface. type MockapplicationGetter struct { ctrl *gomock.Controller recorder *MockapplicationGetterMockRecorder } // MockapplicationGetterMockRecorder is the mock recorder for MockapplicationGetter. type MockapplicationGetterMockRecorder struct { mock *MockapplicationGetter } // NewMockapplicationGetter creates a new mock instance. func NewMockapplicationGetter(ctrl *gomock.Controller) *MockapplicationGetter { mock := &MockapplicationGetter{ctrl: ctrl} mock.recorder = &MockapplicationGetterMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockapplicationGetter) EXPECT() *MockapplicationGetterMockRecorder { return m.recorder } // GetApplication mocks base method. func (m *MockapplicationGetter) GetApplication(appName string) (*config.Application, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "GetApplication", appName) ret0, _ := ret[0].(*config.Application) ret1, _ := ret[1].(error) return ret0, ret1 } // GetApplication indicates an expected call of GetApplication. func (mr *MockapplicationGetterMockRecorder) GetApplication(appName interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetApplication", reflect.TypeOf((*MockapplicationGetter)(nil).GetApplication), appName) } // MockapplicationLister is a mock of applicationLister interface. type MockapplicationLister struct { ctrl *gomock.Controller recorder *MockapplicationListerMockRecorder } // MockapplicationListerMockRecorder is the mock recorder for MockapplicationLister. type MockapplicationListerMockRecorder struct { mock *MockapplicationLister } // NewMockapplicationLister creates a new mock instance. func NewMockapplicationLister(ctrl *gomock.Controller) *MockapplicationLister { mock := &MockapplicationLister{ctrl: ctrl} mock.recorder = &MockapplicationListerMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockapplicationLister) EXPECT() *MockapplicationListerMockRecorder { return m.recorder } // ListApplications mocks base method. func (m *MockapplicationLister) ListApplications() ([]*config.Application, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "ListApplications") ret0, _ := ret[0].([]*config.Application) ret1, _ := ret[1].(error) return ret0, ret1 } // ListApplications indicates an expected call of ListApplications. func (mr *MockapplicationListerMockRecorder) ListApplications() *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ListApplications", reflect.TypeOf((*MockapplicationLister)(nil).ListApplications)) } // MockapplicationDeleter is a mock of applicationDeleter interface. type MockapplicationDeleter struct { ctrl *gomock.Controller recorder *MockapplicationDeleterMockRecorder } // MockapplicationDeleterMockRecorder is the mock recorder for MockapplicationDeleter. type MockapplicationDeleterMockRecorder struct { mock *MockapplicationDeleter } // NewMockapplicationDeleter creates a new mock instance. func NewMockapplicationDeleter(ctrl *gomock.Controller) *MockapplicationDeleter { mock := &MockapplicationDeleter{ctrl: ctrl} mock.recorder = &MockapplicationDeleterMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockapplicationDeleter) EXPECT() *MockapplicationDeleterMockRecorder { return m.recorder } // DeleteApplication mocks base method. func (m *MockapplicationDeleter) DeleteApplication(name string) error { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "DeleteApplication", name) ret0, _ := ret[0].(error) return ret0 } // DeleteApplication indicates an expected call of DeleteApplication. func (mr *MockapplicationDeleterMockRecorder) DeleteApplication(name interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DeleteApplication", reflect.TypeOf((*MockapplicationDeleter)(nil).DeleteApplication), name) } // MockenvironmentStore is a mock of environmentStore interface. type MockenvironmentStore struct { ctrl *gomock.Controller recorder *MockenvironmentStoreMockRecorder } // MockenvironmentStoreMockRecorder is the mock recorder for MockenvironmentStore. type MockenvironmentStoreMockRecorder struct { mock *MockenvironmentStore } // NewMockenvironmentStore creates a new mock instance. func NewMockenvironmentStore(ctrl *gomock.Controller) *MockenvironmentStore { mock := &MockenvironmentStore{ctrl: ctrl} mock.recorder = &MockenvironmentStoreMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockenvironmentStore) EXPECT() *MockenvironmentStoreMockRecorder { return m.recorder } // CreateEnvironment mocks base method. func (m *MockenvironmentStore) CreateEnvironment(env *config.Environment) error { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "CreateEnvironment", env) ret0, _ := ret[0].(error) return ret0 } // CreateEnvironment indicates an expected call of CreateEnvironment. func (mr *MockenvironmentStoreMockRecorder) CreateEnvironment(env interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "CreateEnvironment", reflect.TypeOf((*MockenvironmentStore)(nil).CreateEnvironment), env) } // DeleteEnvironment mocks base method. func (m *MockenvironmentStore) DeleteEnvironment(appName, environmentName string) error { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "DeleteEnvironment", appName, environmentName) ret0, _ := ret[0].(error) return ret0 } // DeleteEnvironment indicates an expected call of DeleteEnvironment. func (mr *MockenvironmentStoreMockRecorder) DeleteEnvironment(appName, environmentName interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DeleteEnvironment", reflect.TypeOf((*MockenvironmentStore)(nil).DeleteEnvironment), appName, environmentName) } // GetEnvironment mocks base method. func (m *MockenvironmentStore) GetEnvironment(appName, environmentName string) (*config.Environment, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "GetEnvironment", appName, environmentName) ret0, _ := ret[0].(*config.Environment) ret1, _ := ret[1].(error) return ret0, ret1 } // GetEnvironment indicates an expected call of GetEnvironment. func (mr *MockenvironmentStoreMockRecorder) GetEnvironment(appName, environmentName interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetEnvironment", reflect.TypeOf((*MockenvironmentStore)(nil).GetEnvironment), appName, environmentName) } // ListEnvironments mocks base method. func (m *MockenvironmentStore) ListEnvironments(appName string) ([]*config.Environment, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "ListEnvironments", appName) ret0, _ := ret[0].([]*config.Environment) ret1, _ := ret[1].(error) return ret0, ret1 } // ListEnvironments indicates an expected call of ListEnvironments. func (mr *MockenvironmentStoreMockRecorder) ListEnvironments(appName interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ListEnvironments", reflect.TypeOf((*MockenvironmentStore)(nil).ListEnvironments), appName) } // MockenvironmentCreator is a mock of environmentCreator interface. type MockenvironmentCreator struct { ctrl *gomock.Controller recorder *MockenvironmentCreatorMockRecorder } // MockenvironmentCreatorMockRecorder is the mock recorder for MockenvironmentCreator. type MockenvironmentCreatorMockRecorder struct { mock *MockenvironmentCreator } // NewMockenvironmentCreator creates a new mock instance. func NewMockenvironmentCreator(ctrl *gomock.Controller) *MockenvironmentCreator { mock := &MockenvironmentCreator{ctrl: ctrl} mock.recorder = &MockenvironmentCreatorMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockenvironmentCreator) EXPECT() *MockenvironmentCreatorMockRecorder { return m.recorder } // CreateEnvironment mocks base method. func (m *MockenvironmentCreator) CreateEnvironment(env *config.Environment) error { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "CreateEnvironment", env) ret0, _ := ret[0].(error) return ret0 } // CreateEnvironment indicates an expected call of CreateEnvironment. func (mr *MockenvironmentCreatorMockRecorder) CreateEnvironment(env interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "CreateEnvironment", reflect.TypeOf((*MockenvironmentCreator)(nil).CreateEnvironment), env) } // MockenvironmentGetter is a mock of environmentGetter interface. type MockenvironmentGetter struct { ctrl *gomock.Controller recorder *MockenvironmentGetterMockRecorder } // MockenvironmentGetterMockRecorder is the mock recorder for MockenvironmentGetter. type MockenvironmentGetterMockRecorder struct { mock *MockenvironmentGetter } // NewMockenvironmentGetter creates a new mock instance. func NewMockenvironmentGetter(ctrl *gomock.Controller) *MockenvironmentGetter { mock := &MockenvironmentGetter{ctrl: ctrl} mock.recorder = &MockenvironmentGetterMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockenvironmentGetter) EXPECT() *MockenvironmentGetterMockRecorder { return m.recorder } // GetEnvironment mocks base method. func (m *MockenvironmentGetter) GetEnvironment(appName, environmentName string) (*config.Environment, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "GetEnvironment", appName, environmentName) ret0, _ := ret[0].(*config.Environment) ret1, _ := ret[1].(error) return ret0, ret1 } // GetEnvironment indicates an expected call of GetEnvironment. func (mr *MockenvironmentGetterMockRecorder) GetEnvironment(appName, environmentName interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetEnvironment", reflect.TypeOf((*MockenvironmentGetter)(nil).GetEnvironment), appName, environmentName) } // MockenvironmentLister is a mock of environmentLister interface. type MockenvironmentLister struct { ctrl *gomock.Controller recorder *MockenvironmentListerMockRecorder } // MockenvironmentListerMockRecorder is the mock recorder for MockenvironmentLister. type MockenvironmentListerMockRecorder struct { mock *MockenvironmentLister } // NewMockenvironmentLister creates a new mock instance. func NewMockenvironmentLister(ctrl *gomock.Controller) *MockenvironmentLister { mock := &MockenvironmentLister{ctrl: ctrl} mock.recorder = &MockenvironmentListerMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockenvironmentLister) EXPECT() *MockenvironmentListerMockRecorder { return m.recorder } // ListEnvironments mocks base method. func (m *MockenvironmentLister) ListEnvironments(appName string) ([]*config.Environment, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "ListEnvironments", appName) ret0, _ := ret[0].([]*config.Environment) ret1, _ := ret[1].(error) return ret0, ret1 } // ListEnvironments indicates an expected call of ListEnvironments. func (mr *MockenvironmentListerMockRecorder) ListEnvironments(appName interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ListEnvironments", reflect.TypeOf((*MockenvironmentLister)(nil).ListEnvironments), appName) } // MockwsEnvironmentsLister is a mock of wsEnvironmentsLister interface. type MockwsEnvironmentsLister struct { ctrl *gomock.Controller recorder *MockwsEnvironmentsListerMockRecorder } // MockwsEnvironmentsListerMockRecorder is the mock recorder for MockwsEnvironmentsLister. type MockwsEnvironmentsListerMockRecorder struct { mock *MockwsEnvironmentsLister } // NewMockwsEnvironmentsLister creates a new mock instance. func NewMockwsEnvironmentsLister(ctrl *gomock.Controller) *MockwsEnvironmentsLister { mock := &MockwsEnvironmentsLister{ctrl: ctrl} mock.recorder = &MockwsEnvironmentsListerMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockwsEnvironmentsLister) EXPECT() *MockwsEnvironmentsListerMockRecorder { return m.recorder } // ListEnvironments mocks base method. func (m *MockwsEnvironmentsLister) ListEnvironments() ([]string, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "ListEnvironments") ret0, _ := ret[0].([]string) ret1, _ := ret[1].(error) return ret0, ret1 } // ListEnvironments indicates an expected call of ListEnvironments. func (mr *MockwsEnvironmentsListerMockRecorder) ListEnvironments() *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ListEnvironments", reflect.TypeOf((*MockwsEnvironmentsLister)(nil).ListEnvironments)) } // MockenvironmentDeleter is a mock of environmentDeleter interface. type MockenvironmentDeleter struct { ctrl *gomock.Controller recorder *MockenvironmentDeleterMockRecorder } // MockenvironmentDeleterMockRecorder is the mock recorder for MockenvironmentDeleter. type MockenvironmentDeleterMockRecorder struct { mock *MockenvironmentDeleter } // NewMockenvironmentDeleter creates a new mock instance. func NewMockenvironmentDeleter(ctrl *gomock.Controller) *MockenvironmentDeleter { mock := &MockenvironmentDeleter{ctrl: ctrl} mock.recorder = &MockenvironmentDeleterMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockenvironmentDeleter) EXPECT() *MockenvironmentDeleterMockRecorder { return m.recorder } // DeleteEnvironment mocks base method. func (m *MockenvironmentDeleter) DeleteEnvironment(appName, environmentName string) error { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "DeleteEnvironment", appName, environmentName) ret0, _ := ret[0].(error) return ret0 } // DeleteEnvironment indicates an expected call of DeleteEnvironment. func (mr *MockenvironmentDeleterMockRecorder) DeleteEnvironment(appName, environmentName interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DeleteEnvironment", reflect.TypeOf((*MockenvironmentDeleter)(nil).DeleteEnvironment), appName, environmentName) } // Mockstore is a mock of store interface. type Mockstore struct { ctrl *gomock.Controller recorder *MockstoreMockRecorder } // MockstoreMockRecorder is the mock recorder for Mockstore. type MockstoreMockRecorder struct { mock *Mockstore } // NewMockstore creates a new mock instance. func NewMockstore(ctrl *gomock.Controller) *Mockstore { mock := &Mockstore{ctrl: ctrl} mock.recorder = &MockstoreMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *Mockstore) EXPECT() *MockstoreMockRecorder { return m.recorder } // CreateApplication mocks base method. func (m *Mockstore) CreateApplication(app *config.Application) error { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "CreateApplication", app) ret0, _ := ret[0].(error) return ret0 } // CreateApplication indicates an expected call of CreateApplication. func (mr *MockstoreMockRecorder) CreateApplication(app interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "CreateApplication", reflect.TypeOf((*Mockstore)(nil).CreateApplication), app) } // CreateEnvironment mocks base method. func (m *Mockstore) CreateEnvironment(env *config.Environment) error { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "CreateEnvironment", env) ret0, _ := ret[0].(error) return ret0 } // CreateEnvironment indicates an expected call of CreateEnvironment. func (mr *MockstoreMockRecorder) CreateEnvironment(env interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "CreateEnvironment", reflect.TypeOf((*Mockstore)(nil).CreateEnvironment), env) } // CreateJob mocks base method. func (m *Mockstore) CreateJob(job *config.Workload) error { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "CreateJob", job) ret0, _ := ret[0].(error) return ret0 } // CreateJob indicates an expected call of CreateJob. func (mr *MockstoreMockRecorder) CreateJob(job interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "CreateJob", reflect.TypeOf((*Mockstore)(nil).CreateJob), job) } // CreateService mocks base method. func (m *Mockstore) CreateService(svc *config.Workload) error { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "CreateService", svc) ret0, _ := ret[0].(error) return ret0 } // CreateService indicates an expected call of CreateService. func (mr *MockstoreMockRecorder) CreateService(svc interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "CreateService", reflect.TypeOf((*Mockstore)(nil).CreateService), svc) } // DeleteApplication mocks base method. func (m *Mockstore) DeleteApplication(name string) error { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "DeleteApplication", name) ret0, _ := ret[0].(error) return ret0 } // DeleteApplication indicates an expected call of DeleteApplication. func (mr *MockstoreMockRecorder) DeleteApplication(name interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DeleteApplication", reflect.TypeOf((*Mockstore)(nil).DeleteApplication), name) } // DeleteEnvironment mocks base method. func (m *Mockstore) DeleteEnvironment(appName, environmentName string) error { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "DeleteEnvironment", appName, environmentName) ret0, _ := ret[0].(error) return ret0 } // DeleteEnvironment indicates an expected call of DeleteEnvironment. func (mr *MockstoreMockRecorder) DeleteEnvironment(appName, environmentName interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DeleteEnvironment", reflect.TypeOf((*Mockstore)(nil).DeleteEnvironment), appName, environmentName) } // DeleteJob mocks base method. func (m *Mockstore) DeleteJob(appName, jobName string) error { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "DeleteJob", appName, jobName) ret0, _ := ret[0].(error) return ret0 } // DeleteJob indicates an expected call of DeleteJob. func (mr *MockstoreMockRecorder) DeleteJob(appName, jobName interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DeleteJob", reflect.TypeOf((*Mockstore)(nil).DeleteJob), appName, jobName) } // DeleteService mocks base method. func (m *Mockstore) DeleteService(appName, svcName string) error { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "DeleteService", appName, svcName) ret0, _ := ret[0].(error) return ret0 } // DeleteService indicates an expected call of DeleteService. func (mr *MockstoreMockRecorder) DeleteService(appName, svcName interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DeleteService", reflect.TypeOf((*Mockstore)(nil).DeleteService), appName, svcName) } // GetApplication mocks base method. func (m *Mockstore) GetApplication(appName string) (*config.Application, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "GetApplication", appName) ret0, _ := ret[0].(*config.Application) ret1, _ := ret[1].(error) return ret0, ret1 } // GetApplication indicates an expected call of GetApplication. func (mr *MockstoreMockRecorder) GetApplication(appName interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetApplication", reflect.TypeOf((*Mockstore)(nil).GetApplication), appName) } // GetEnvironment mocks base method. func (m *Mockstore) GetEnvironment(appName, environmentName string) (*config.Environment, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "GetEnvironment", appName, environmentName) ret0, _ := ret[0].(*config.Environment) ret1, _ := ret[1].(error) return ret0, ret1 } // GetEnvironment indicates an expected call of GetEnvironment. func (mr *MockstoreMockRecorder) GetEnvironment(appName, environmentName interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetEnvironment", reflect.TypeOf((*Mockstore)(nil).GetEnvironment), appName, environmentName) } // GetJob mocks base method. func (m *Mockstore) GetJob(appName, jobName string) (*config.Workload, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "GetJob", appName, jobName) ret0, _ := ret[0].(*config.Workload) ret1, _ := ret[1].(error) return ret0, ret1 } // GetJob indicates an expected call of GetJob. func (mr *MockstoreMockRecorder) GetJob(appName, jobName interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetJob", reflect.TypeOf((*Mockstore)(nil).GetJob), appName, jobName) } // GetService mocks base method. func (m *Mockstore) GetService(appName, svcName string) (*config.Workload, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "GetService", appName, svcName) ret0, _ := ret[0].(*config.Workload) ret1, _ := ret[1].(error) return ret0, ret1 } // GetService indicates an expected call of GetService. func (mr *MockstoreMockRecorder) GetService(appName, svcName interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetService", reflect.TypeOf((*Mockstore)(nil).GetService), appName, svcName) } // GetWorkload mocks base method. func (m *Mockstore) GetWorkload(appName, name string) (*config.Workload, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "GetWorkload", appName, name) ret0, _ := ret[0].(*config.Workload) ret1, _ := ret[1].(error) return ret0, ret1 } // GetWorkload indicates an expected call of GetWorkload. func (mr *MockstoreMockRecorder) GetWorkload(appName, name interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetWorkload", reflect.TypeOf((*Mockstore)(nil).GetWorkload), appName, name) } // ListApplications mocks base method. func (m *Mockstore) ListApplications() ([]*config.Application, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "ListApplications") ret0, _ := ret[0].([]*config.Application) ret1, _ := ret[1].(error) return ret0, ret1 } // ListApplications indicates an expected call of ListApplications. func (mr *MockstoreMockRecorder) ListApplications() *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ListApplications", reflect.TypeOf((*Mockstore)(nil).ListApplications)) } // ListEnvironments mocks base method. func (m *Mockstore) ListEnvironments(appName string) ([]*config.Environment, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "ListEnvironments", appName) ret0, _ := ret[0].([]*config.Environment) ret1, _ := ret[1].(error) return ret0, ret1 } // ListEnvironments indicates an expected call of ListEnvironments. func (mr *MockstoreMockRecorder) ListEnvironments(appName interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ListEnvironments", reflect.TypeOf((*Mockstore)(nil).ListEnvironments), appName) } // ListJobs mocks base method. func (m *Mockstore) ListJobs(appName string) ([]*config.Workload, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "ListJobs", appName) ret0, _ := ret[0].([]*config.Workload) ret1, _ := ret[1].(error) return ret0, ret1 } // ListJobs indicates an expected call of ListJobs. func (mr *MockstoreMockRecorder) ListJobs(appName interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ListJobs", reflect.TypeOf((*Mockstore)(nil).ListJobs), appName) } // ListServices mocks base method. func (m *Mockstore) ListServices(appName string) ([]*config.Workload, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "ListServices", appName) ret0, _ := ret[0].([]*config.Workload) ret1, _ := ret[1].(error) return ret0, ret1 } // ListServices indicates an expected call of ListServices. func (mr *MockstoreMockRecorder) ListServices(appName interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ListServices", reflect.TypeOf((*Mockstore)(nil).ListServices), appName) } // ListWorkloads mocks base method. func (m *Mockstore) ListWorkloads(appName string) ([]*config.Workload, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "ListWorkloads", appName) ret0, _ := ret[0].([]*config.Workload) ret1, _ := ret[1].(error) return ret0, ret1 } // ListWorkloads indicates an expected call of ListWorkloads. func (mr *MockstoreMockRecorder) ListWorkloads(appName interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ListWorkloads", reflect.TypeOf((*Mockstore)(nil).ListWorkloads), appName) } // UpdateApplication mocks base method. func (m *Mockstore) UpdateApplication(app *config.Application) error { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "UpdateApplication", app) ret0, _ := ret[0].(error) return ret0 } // UpdateApplication indicates an expected call of UpdateApplication. func (mr *MockstoreMockRecorder) UpdateApplication(app interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "UpdateApplication", reflect.TypeOf((*Mockstore)(nil).UpdateApplication), app) } // MockdeployedEnvironmentLister is a mock of deployedEnvironmentLister interface. type MockdeployedEnvironmentLister struct { ctrl *gomock.Controller recorder *MockdeployedEnvironmentListerMockRecorder } // MockdeployedEnvironmentListerMockRecorder is the mock recorder for MockdeployedEnvironmentLister. type MockdeployedEnvironmentListerMockRecorder struct { mock *MockdeployedEnvironmentLister } // NewMockdeployedEnvironmentLister creates a new mock instance. func NewMockdeployedEnvironmentLister(ctrl *gomock.Controller) *MockdeployedEnvironmentLister { mock := &MockdeployedEnvironmentLister{ctrl: ctrl} mock.recorder = &MockdeployedEnvironmentListerMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockdeployedEnvironmentLister) EXPECT() *MockdeployedEnvironmentListerMockRecorder { return m.recorder } // IsServiceDeployed mocks base method. func (m *MockdeployedEnvironmentLister) IsServiceDeployed(appName, envName, svcName string) (bool, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "IsServiceDeployed", appName, envName, svcName) ret0, _ := ret[0].(bool) ret1, _ := ret[1].(error) return ret0, ret1 } // IsServiceDeployed indicates an expected call of IsServiceDeployed. func (mr *MockdeployedEnvironmentListerMockRecorder) IsServiceDeployed(appName, envName, svcName interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "IsServiceDeployed", reflect.TypeOf((*MockdeployedEnvironmentLister)(nil).IsServiceDeployed), appName, envName, svcName) } // ListDeployedJobs mocks base method. func (m *MockdeployedEnvironmentLister) ListDeployedJobs(appName, envName string) ([]string, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "ListDeployedJobs", appName, envName) ret0, _ := ret[0].([]string) ret1, _ := ret[1].(error) return ret0, ret1 } // ListDeployedJobs indicates an expected call of ListDeployedJobs. func (mr *MockdeployedEnvironmentListerMockRecorder) ListDeployedJobs(appName, envName interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ListDeployedJobs", reflect.TypeOf((*MockdeployedEnvironmentLister)(nil).ListDeployedJobs), appName, envName) } // ListDeployedServices mocks base method. func (m *MockdeployedEnvironmentLister) ListDeployedServices(appName, envName string) ([]string, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "ListDeployedServices", appName, envName) ret0, _ := ret[0].([]string) ret1, _ := ret[1].(error) return ret0, ret1 } // ListDeployedServices indicates an expected call of ListDeployedServices. func (mr *MockdeployedEnvironmentListerMockRecorder) ListDeployedServices(appName, envName interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ListDeployedServices", reflect.TypeOf((*MockdeployedEnvironmentLister)(nil).ListDeployedServices), appName, envName) } // ListEnvironmentsDeployedTo mocks base method. func (m *MockdeployedEnvironmentLister) ListEnvironmentsDeployedTo(appName, svcName string) ([]string, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "ListEnvironmentsDeployedTo", appName, svcName) ret0, _ := ret[0].([]string) ret1, _ := ret[1].(error) return ret0, ret1 } // ListEnvironmentsDeployedTo indicates an expected call of ListEnvironmentsDeployedTo. func (mr *MockdeployedEnvironmentListerMockRecorder) ListEnvironmentsDeployedTo(appName, svcName interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ListEnvironmentsDeployedTo", reflect.TypeOf((*MockdeployedEnvironmentLister)(nil).ListEnvironmentsDeployedTo), appName, svcName) } // ListSNSTopics mocks base method. func (m *MockdeployedEnvironmentLister) ListSNSTopics(appName, envName string) ([]deploy0.Topic, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "ListSNSTopics", appName, envName) ret0, _ := ret[0].([]deploy0.Topic) ret1, _ := ret[1].(error) return ret0, ret1 } // ListSNSTopics indicates an expected call of ListSNSTopics. func (mr *MockdeployedEnvironmentListerMockRecorder) ListSNSTopics(appName, envName interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ListSNSTopics", reflect.TypeOf((*MockdeployedEnvironmentLister)(nil).ListSNSTopics), appName, envName) } // MocksecretsManager is a mock of secretsManager interface. type MocksecretsManager struct { ctrl *gomock.Controller recorder *MocksecretsManagerMockRecorder } // MocksecretsManagerMockRecorder is the mock recorder for MocksecretsManager. type MocksecretsManagerMockRecorder struct { mock *MocksecretsManager } // NewMocksecretsManager creates a new mock instance. func NewMocksecretsManager(ctrl *gomock.Controller) *MocksecretsManager { mock := &MocksecretsManager{ctrl: ctrl} mock.recorder = &MocksecretsManagerMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MocksecretsManager) EXPECT() *MocksecretsManagerMockRecorder { return m.recorder } // CreateSecret mocks base method. func (m *MocksecretsManager) CreateSecret(secretName, secretString string) (string, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "CreateSecret", secretName, secretString) ret0, _ := ret[0].(string) ret1, _ := ret[1].(error) return ret0, ret1 } // CreateSecret indicates an expected call of CreateSecret. func (mr *MocksecretsManagerMockRecorder) CreateSecret(secretName, secretString interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "CreateSecret", reflect.TypeOf((*MocksecretsManager)(nil).CreateSecret), secretName, secretString) } // DeleteSecret mocks base method. func (m *MocksecretsManager) DeleteSecret(secretName string) error { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "DeleteSecret", secretName) ret0, _ := ret[0].(error) return ret0 } // DeleteSecret indicates an expected call of DeleteSecret. func (mr *MocksecretsManagerMockRecorder) DeleteSecret(secretName interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DeleteSecret", reflect.TypeOf((*MocksecretsManager)(nil).DeleteSecret), secretName) } // DescribeSecret mocks base method. func (m *MocksecretsManager) DescribeSecret(secretName string) (*secretsmanager.DescribeSecretOutput, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "DescribeSecret", secretName) ret0, _ := ret[0].(*secretsmanager.DescribeSecretOutput) ret1, _ := ret[1].(error) return ret0, ret1 } // DescribeSecret indicates an expected call of DescribeSecret. func (mr *MocksecretsManagerMockRecorder) DescribeSecret(secretName interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DescribeSecret", reflect.TypeOf((*MocksecretsManager)(nil).DescribeSecret), secretName) } // MocksecretCreator is a mock of secretCreator interface. type MocksecretCreator struct { ctrl *gomock.Controller recorder *MocksecretCreatorMockRecorder } // MocksecretCreatorMockRecorder is the mock recorder for MocksecretCreator. type MocksecretCreatorMockRecorder struct { mock *MocksecretCreator } // NewMocksecretCreator creates a new mock instance. func NewMocksecretCreator(ctrl *gomock.Controller) *MocksecretCreator { mock := &MocksecretCreator{ctrl: ctrl} mock.recorder = &MocksecretCreatorMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MocksecretCreator) EXPECT() *MocksecretCreatorMockRecorder { return m.recorder } // CreateSecret mocks base method. func (m *MocksecretCreator) CreateSecret(secretName, secretString string) (string, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "CreateSecret", secretName, secretString) ret0, _ := ret[0].(string) ret1, _ := ret[1].(error) return ret0, ret1 } // CreateSecret indicates an expected call of CreateSecret. func (mr *MocksecretCreatorMockRecorder) CreateSecret(secretName, secretString interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "CreateSecret", reflect.TypeOf((*MocksecretCreator)(nil).CreateSecret), secretName, secretString) } // MocksecretDeleter is a mock of secretDeleter interface. type MocksecretDeleter struct { ctrl *gomock.Controller recorder *MocksecretDeleterMockRecorder } // MocksecretDeleterMockRecorder is the mock recorder for MocksecretDeleter. type MocksecretDeleterMockRecorder struct { mock *MocksecretDeleter } // NewMocksecretDeleter creates a new mock instance. func NewMocksecretDeleter(ctrl *gomock.Controller) *MocksecretDeleter { mock := &MocksecretDeleter{ctrl: ctrl} mock.recorder = &MocksecretDeleterMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MocksecretDeleter) EXPECT() *MocksecretDeleterMockRecorder { return m.recorder } // DeleteSecret mocks base method. func (m *MocksecretDeleter) DeleteSecret(secretName string) error { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "DeleteSecret", secretName) ret0, _ := ret[0].(error) return ret0 } // DeleteSecret indicates an expected call of DeleteSecret. func (mr *MocksecretDeleterMockRecorder) DeleteSecret(secretName interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DeleteSecret", reflect.TypeOf((*MocksecretDeleter)(nil).DeleteSecret), secretName) } // DescribeSecret mocks base method. func (m *MocksecretDeleter) DescribeSecret(secretName string) (*secretsmanager.DescribeSecretOutput, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "DescribeSecret", secretName) ret0, _ := ret[0].(*secretsmanager.DescribeSecretOutput) ret1, _ := ret[1].(error) return ret0, ret1 } // DescribeSecret indicates an expected call of DescribeSecret. func (mr *MocksecretDeleterMockRecorder) DescribeSecret(secretName interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DescribeSecret", reflect.TypeOf((*MocksecretDeleter)(nil).DescribeSecret), secretName) } // MockimageBuilderPusher is a mock of imageBuilderPusher interface. type MockimageBuilderPusher struct { ctrl *gomock.Controller recorder *MockimageBuilderPusherMockRecorder } // MockimageBuilderPusherMockRecorder is the mock recorder for MockimageBuilderPusher. type MockimageBuilderPusherMockRecorder struct { mock *MockimageBuilderPusher } // NewMockimageBuilderPusher creates a new mock instance. func NewMockimageBuilderPusher(ctrl *gomock.Controller) *MockimageBuilderPusher { mock := &MockimageBuilderPusher{ctrl: ctrl} mock.recorder = &MockimageBuilderPusherMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockimageBuilderPusher) EXPECT() *MockimageBuilderPusherMockRecorder { return m.recorder } // BuildAndPush mocks base method. func (m *MockimageBuilderPusher) BuildAndPush(ctx context.Context, args *dockerengine.BuildArguments, w io.Writer) (string, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "BuildAndPush", ctx, args, w) ret0, _ := ret[0].(string) ret1, _ := ret[1].(error) return ret0, ret1 } // BuildAndPush indicates an expected call of BuildAndPush. func (mr *MockimageBuilderPusherMockRecorder) BuildAndPush(ctx, args, w interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "BuildAndPush", reflect.TypeOf((*MockimageBuilderPusher)(nil).BuildAndPush), ctx, args, w) } // MockrepositoryLogin is a mock of repositoryLogin interface. type MockrepositoryLogin struct { ctrl *gomock.Controller recorder *MockrepositoryLoginMockRecorder } // MockrepositoryLoginMockRecorder is the mock recorder for MockrepositoryLogin. type MockrepositoryLoginMockRecorder struct { mock *MockrepositoryLogin } // NewMockrepositoryLogin creates a new mock instance. func NewMockrepositoryLogin(ctrl *gomock.Controller) *MockrepositoryLogin { mock := &MockrepositoryLogin{ctrl: ctrl} mock.recorder = &MockrepositoryLoginMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockrepositoryLogin) EXPECT() *MockrepositoryLoginMockRecorder { return m.recorder } // Login mocks base method. func (m *MockrepositoryLogin) Login() (string, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "Login") ret0, _ := ret[0].(string) ret1, _ := ret[1].(error) return ret0, ret1 } // Login indicates an expected call of Login. func (mr *MockrepositoryLoginMockRecorder) Login() *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Login", reflect.TypeOf((*MockrepositoryLogin)(nil).Login)) } // MockrepositoryService is a mock of repositoryService interface. type MockrepositoryService struct { ctrl *gomock.Controller recorder *MockrepositoryServiceMockRecorder } // MockrepositoryServiceMockRecorder is the mock recorder for MockrepositoryService. type MockrepositoryServiceMockRecorder struct { mock *MockrepositoryService } // NewMockrepositoryService creates a new mock instance. func NewMockrepositoryService(ctrl *gomock.Controller) *MockrepositoryService { mock := &MockrepositoryService{ctrl: ctrl} mock.recorder = &MockrepositoryServiceMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockrepositoryService) EXPECT() *MockrepositoryServiceMockRecorder { return m.recorder } // BuildAndPush mocks base method. func (m *MockrepositoryService) BuildAndPush(ctx context.Context, args *dockerengine.BuildArguments, w io.Writer) (string, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "BuildAndPush", ctx, args, w) ret0, _ := ret[0].(string) ret1, _ := ret[1].(error) return ret0, ret1 } // BuildAndPush indicates an expected call of BuildAndPush. func (mr *MockrepositoryServiceMockRecorder) BuildAndPush(ctx, args, w interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "BuildAndPush", reflect.TypeOf((*MockrepositoryService)(nil).BuildAndPush), ctx, args, w) } // Login mocks base method. func (m *MockrepositoryService) Login() (string, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "Login") ret0, _ := ret[0].(string) ret1, _ := ret[1].(error) return ret0, ret1 } // Login indicates an expected call of Login. func (mr *MockrepositoryServiceMockRecorder) Login() *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Login", reflect.TypeOf((*MockrepositoryService)(nil).Login)) } // MocklogEventsWriter is a mock of logEventsWriter interface. type MocklogEventsWriter struct { ctrl *gomock.Controller recorder *MocklogEventsWriterMockRecorder } // MocklogEventsWriterMockRecorder is the mock recorder for MocklogEventsWriter. type MocklogEventsWriterMockRecorder struct { mock *MocklogEventsWriter } // NewMocklogEventsWriter creates a new mock instance. func NewMocklogEventsWriter(ctrl *gomock.Controller) *MocklogEventsWriter { mock := &MocklogEventsWriter{ctrl: ctrl} mock.recorder = &MocklogEventsWriterMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MocklogEventsWriter) EXPECT() *MocklogEventsWriterMockRecorder { return m.recorder } // WriteLogEvents mocks base method. func (m *MocklogEventsWriter) WriteLogEvents(opts logging.WriteLogEventsOpts) error { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "WriteLogEvents", opts) ret0, _ := ret[0].(error) return ret0 } // WriteLogEvents indicates an expected call of WriteLogEvents. func (mr *MocklogEventsWriterMockRecorder) WriteLogEvents(opts interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "WriteLogEvents", reflect.TypeOf((*MocklogEventsWriter)(nil).WriteLogEvents), opts) } // MockexecRunner is a mock of execRunner interface. type MockexecRunner struct { ctrl *gomock.Controller recorder *MockexecRunnerMockRecorder } // MockexecRunnerMockRecorder is the mock recorder for MockexecRunner. type MockexecRunnerMockRecorder struct { mock *MockexecRunner } // NewMockexecRunner creates a new mock instance. func NewMockexecRunner(ctrl *gomock.Controller) *MockexecRunner { mock := &MockexecRunner{ctrl: ctrl} mock.recorder = &MockexecRunnerMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockexecRunner) EXPECT() *MockexecRunnerMockRecorder { return m.recorder } // Run mocks base method. func (m *MockexecRunner) Run(name string, args []string, options ...exec.CmdOption) error { m.ctrl.T.Helper() varargs := []interface{}{name, args} for _, a := range options { varargs = append(varargs, a) } ret := m.ctrl.Call(m, "Run", varargs...) ret0, _ := ret[0].(error) return ret0 } // Run indicates an expected call of Run. func (mr *MockexecRunnerMockRecorder) Run(name, args interface{}, options ...interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() varargs := append([]interface{}{name, args}, options...) return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Run", reflect.TypeOf((*MockexecRunner)(nil).Run), varargs...) } // MockeventsWriter is a mock of eventsWriter interface. type MockeventsWriter struct { ctrl *gomock.Controller recorder *MockeventsWriterMockRecorder } // MockeventsWriterMockRecorder is the mock recorder for MockeventsWriter. type MockeventsWriterMockRecorder struct { mock *MockeventsWriter } // NewMockeventsWriter creates a new mock instance. func NewMockeventsWriter(ctrl *gomock.Controller) *MockeventsWriter { mock := &MockeventsWriter{ctrl: ctrl} mock.recorder = &MockeventsWriterMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockeventsWriter) EXPECT() *MockeventsWriterMockRecorder { return m.recorder } // WriteEventsUntilStopped mocks base method. func (m *MockeventsWriter) WriteEventsUntilStopped() error { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "WriteEventsUntilStopped") ret0, _ := ret[0].(error) return ret0 } // WriteEventsUntilStopped indicates an expected call of WriteEventsUntilStopped. func (mr *MockeventsWriterMockRecorder) WriteEventsUntilStopped() *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "WriteEventsUntilStopped", reflect.TypeOf((*MockeventsWriter)(nil).WriteEventsUntilStopped)) } // MockdefaultSessionProvider is a mock of defaultSessionProvider interface. type MockdefaultSessionProvider struct { ctrl *gomock.Controller recorder *MockdefaultSessionProviderMockRecorder } // MockdefaultSessionProviderMockRecorder is the mock recorder for MockdefaultSessionProvider. type MockdefaultSessionProviderMockRecorder struct { mock *MockdefaultSessionProvider } // NewMockdefaultSessionProvider creates a new mock instance. func NewMockdefaultSessionProvider(ctrl *gomock.Controller) *MockdefaultSessionProvider { mock := &MockdefaultSessionProvider{ctrl: ctrl} mock.recorder = &MockdefaultSessionProviderMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockdefaultSessionProvider) EXPECT() *MockdefaultSessionProviderMockRecorder { return m.recorder } // Default mocks base method. func (m *MockdefaultSessionProvider) Default() (*session.Session, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "Default") ret0, _ := ret[0].(*session.Session) ret1, _ := ret[1].(error) return ret0, ret1 } // Default indicates an expected call of Default. func (mr *MockdefaultSessionProviderMockRecorder) Default() *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Default", reflect.TypeOf((*MockdefaultSessionProvider)(nil).Default)) } // MockregionalSessionProvider is a mock of regionalSessionProvider interface. type MockregionalSessionProvider struct { ctrl *gomock.Controller recorder *MockregionalSessionProviderMockRecorder } // MockregionalSessionProviderMockRecorder is the mock recorder for MockregionalSessionProvider. type MockregionalSessionProviderMockRecorder struct { mock *MockregionalSessionProvider } // NewMockregionalSessionProvider creates a new mock instance. func NewMockregionalSessionProvider(ctrl *gomock.Controller) *MockregionalSessionProvider { mock := &MockregionalSessionProvider{ctrl: ctrl} mock.recorder = &MockregionalSessionProviderMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockregionalSessionProvider) EXPECT() *MockregionalSessionProviderMockRecorder { return m.recorder } // DefaultWithRegion mocks base method. func (m *MockregionalSessionProvider) DefaultWithRegion(region string) (*session.Session, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "DefaultWithRegion", region) ret0, _ := ret[0].(*session.Session) ret1, _ := ret[1].(error) return ret0, ret1 } // DefaultWithRegion indicates an expected call of DefaultWithRegion. func (mr *MockregionalSessionProviderMockRecorder) DefaultWithRegion(region interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DefaultWithRegion", reflect.TypeOf((*MockregionalSessionProvider)(nil).DefaultWithRegion), region) } // MocksessionFromRoleProvider is a mock of sessionFromRoleProvider interface. type MocksessionFromRoleProvider struct { ctrl *gomock.Controller recorder *MocksessionFromRoleProviderMockRecorder } // MocksessionFromRoleProviderMockRecorder is the mock recorder for MocksessionFromRoleProvider. type MocksessionFromRoleProviderMockRecorder struct { mock *MocksessionFromRoleProvider } // NewMocksessionFromRoleProvider creates a new mock instance. func NewMocksessionFromRoleProvider(ctrl *gomock.Controller) *MocksessionFromRoleProvider { mock := &MocksessionFromRoleProvider{ctrl: ctrl} mock.recorder = &MocksessionFromRoleProviderMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MocksessionFromRoleProvider) EXPECT() *MocksessionFromRoleProviderMockRecorder { return m.recorder } // FromRole mocks base method. func (m *MocksessionFromRoleProvider) FromRole(roleARN, region string) (*session.Session, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "FromRole", roleARN, region) ret0, _ := ret[0].(*session.Session) ret1, _ := ret[1].(error) return ret0, ret1 } // FromRole indicates an expected call of FromRole. func (mr *MocksessionFromRoleProviderMockRecorder) FromRole(roleARN, region interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "FromRole", reflect.TypeOf((*MocksessionFromRoleProvider)(nil).FromRole), roleARN, region) } // MocksessionFromStaticProvider is a mock of sessionFromStaticProvider interface. type MocksessionFromStaticProvider struct { ctrl *gomock.Controller recorder *MocksessionFromStaticProviderMockRecorder } // MocksessionFromStaticProviderMockRecorder is the mock recorder for MocksessionFromStaticProvider. type MocksessionFromStaticProviderMockRecorder struct { mock *MocksessionFromStaticProvider } // NewMocksessionFromStaticProvider creates a new mock instance. func NewMocksessionFromStaticProvider(ctrl *gomock.Controller) *MocksessionFromStaticProvider { mock := &MocksessionFromStaticProvider{ctrl: ctrl} mock.recorder = &MocksessionFromStaticProviderMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MocksessionFromStaticProvider) EXPECT() *MocksessionFromStaticProviderMockRecorder { return m.recorder } // FromStaticCreds mocks base method. func (m *MocksessionFromStaticProvider) FromStaticCreds(accessKeyID, secretAccessKey, sessionToken string) (*session.Session, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "FromStaticCreds", accessKeyID, secretAccessKey, sessionToken) ret0, _ := ret[0].(*session.Session) ret1, _ := ret[1].(error) return ret0, ret1 } // FromStaticCreds indicates an expected call of FromStaticCreds. func (mr *MocksessionFromStaticProviderMockRecorder) FromStaticCreds(accessKeyID, secretAccessKey, sessionToken interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "FromStaticCreds", reflect.TypeOf((*MocksessionFromStaticProvider)(nil).FromStaticCreds), accessKeyID, secretAccessKey, sessionToken) } // MocksessionFromProfileProvider is a mock of sessionFromProfileProvider interface. type MocksessionFromProfileProvider struct { ctrl *gomock.Controller recorder *MocksessionFromProfileProviderMockRecorder } // MocksessionFromProfileProviderMockRecorder is the mock recorder for MocksessionFromProfileProvider. type MocksessionFromProfileProviderMockRecorder struct { mock *MocksessionFromProfileProvider } // NewMocksessionFromProfileProvider creates a new mock instance. func NewMocksessionFromProfileProvider(ctrl *gomock.Controller) *MocksessionFromProfileProvider { mock := &MocksessionFromProfileProvider{ctrl: ctrl} mock.recorder = &MocksessionFromProfileProviderMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MocksessionFromProfileProvider) EXPECT() *MocksessionFromProfileProviderMockRecorder { return m.recorder } // FromProfile mocks base method. func (m *MocksessionFromProfileProvider) FromProfile(name string) (*session.Session, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "FromProfile", name) ret0, _ := ret[0].(*session.Session) ret1, _ := ret[1].(error) return ret0, ret1 } // FromProfile indicates an expected call of FromProfile. func (mr *MocksessionFromProfileProviderMockRecorder) FromProfile(name interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "FromProfile", reflect.TypeOf((*MocksessionFromProfileProvider)(nil).FromProfile), name) } // MocksessionProvider is a mock of sessionProvider interface. type MocksessionProvider struct { ctrl *gomock.Controller recorder *MocksessionProviderMockRecorder } // MocksessionProviderMockRecorder is the mock recorder for MocksessionProvider. type MocksessionProviderMockRecorder struct { mock *MocksessionProvider } // NewMocksessionProvider creates a new mock instance. func NewMocksessionProvider(ctrl *gomock.Controller) *MocksessionProvider { mock := &MocksessionProvider{ctrl: ctrl} mock.recorder = &MocksessionProviderMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MocksessionProvider) EXPECT() *MocksessionProviderMockRecorder { return m.recorder } // Default mocks base method. func (m *MocksessionProvider) Default() (*session.Session, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "Default") ret0, _ := ret[0].(*session.Session) ret1, _ := ret[1].(error) return ret0, ret1 } // Default indicates an expected call of Default. func (mr *MocksessionProviderMockRecorder) Default() *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Default", reflect.TypeOf((*MocksessionProvider)(nil).Default)) } // DefaultWithRegion mocks base method. func (m *MocksessionProvider) DefaultWithRegion(region string) (*session.Session, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "DefaultWithRegion", region) ret0, _ := ret[0].(*session.Session) ret1, _ := ret[1].(error) return ret0, ret1 } // DefaultWithRegion indicates an expected call of DefaultWithRegion. func (mr *MocksessionProviderMockRecorder) DefaultWithRegion(region interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DefaultWithRegion", reflect.TypeOf((*MocksessionProvider)(nil).DefaultWithRegion), region) } // FromProfile mocks base method. func (m *MocksessionProvider) FromProfile(name string) (*session.Session, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "FromProfile", name) ret0, _ := ret[0].(*session.Session) ret1, _ := ret[1].(error) return ret0, ret1 } // FromProfile indicates an expected call of FromProfile. func (mr *MocksessionProviderMockRecorder) FromProfile(name interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "FromProfile", reflect.TypeOf((*MocksessionProvider)(nil).FromProfile), name) } // FromRole mocks base method. func (m *MocksessionProvider) FromRole(roleARN, region string) (*session.Session, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "FromRole", roleARN, region) ret0, _ := ret[0].(*session.Session) ret1, _ := ret[1].(error) return ret0, ret1 } // FromRole indicates an expected call of FromRole. func (mr *MocksessionProviderMockRecorder) FromRole(roleARN, region interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "FromRole", reflect.TypeOf((*MocksessionProvider)(nil).FromRole), roleARN, region) } // FromStaticCreds mocks base method. func (m *MocksessionProvider) FromStaticCreds(accessKeyID, secretAccessKey, sessionToken string) (*session.Session, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "FromStaticCreds", accessKeyID, secretAccessKey, sessionToken) ret0, _ := ret[0].(*session.Session) ret1, _ := ret[1].(error) return ret0, ret1 } // FromStaticCreds indicates an expected call of FromStaticCreds. func (mr *MocksessionProviderMockRecorder) FromStaticCreds(accessKeyID, secretAccessKey, sessionToken interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "FromStaticCreds", reflect.TypeOf((*MocksessionProvider)(nil).FromStaticCreds), accessKeyID, secretAccessKey, sessionToken) } // Mockdescriber is a mock of describer interface. type Mockdescriber struct { ctrl *gomock.Controller recorder *MockdescriberMockRecorder } // MockdescriberMockRecorder is the mock recorder for Mockdescriber. type MockdescriberMockRecorder struct { mock *Mockdescriber } // NewMockdescriber creates a new mock instance. func NewMockdescriber(ctrl *gomock.Controller) *Mockdescriber { mock := &Mockdescriber{ctrl: ctrl} mock.recorder = &MockdescriberMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *Mockdescriber) EXPECT() *MockdescriberMockRecorder { return m.recorder } // Describe mocks base method. func (m *Mockdescriber) Describe() (describe.HumanJSONStringer, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "Describe") ret0, _ := ret[0].(describe.HumanJSONStringer) ret1, _ := ret[1].(error) return ret0, ret1 } // Describe indicates an expected call of Describe. func (mr *MockdescriberMockRecorder) Describe() *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Describe", reflect.TypeOf((*Mockdescriber)(nil).Describe)) } // MockworkloadDescriber is a mock of workloadDescriber interface. type MockworkloadDescriber struct { ctrl *gomock.Controller recorder *MockworkloadDescriberMockRecorder } // MockworkloadDescriberMockRecorder is the mock recorder for MockworkloadDescriber. type MockworkloadDescriberMockRecorder struct { mock *MockworkloadDescriber } // NewMockworkloadDescriber creates a new mock instance. func NewMockworkloadDescriber(ctrl *gomock.Controller) *MockworkloadDescriber { mock := &MockworkloadDescriber{ctrl: ctrl} mock.recorder = &MockworkloadDescriberMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockworkloadDescriber) EXPECT() *MockworkloadDescriberMockRecorder { return m.recorder } // Describe mocks base method. func (m *MockworkloadDescriber) Describe() (describe.HumanJSONStringer, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "Describe") ret0, _ := ret[0].(describe.HumanJSONStringer) ret1, _ := ret[1].(error) return ret0, ret1 } // Describe indicates an expected call of Describe. func (mr *MockworkloadDescriberMockRecorder) Describe() *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Describe", reflect.TypeOf((*MockworkloadDescriber)(nil).Describe)) } // Manifest mocks base method. func (m *MockworkloadDescriber) Manifest(arg0 string) ([]byte, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "Manifest", arg0) ret0, _ := ret[0].([]byte) ret1, _ := ret[1].(error) return ret0, ret1 } // Manifest indicates an expected call of Manifest. func (mr *MockworkloadDescriberMockRecorder) Manifest(arg0 interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Manifest", reflect.TypeOf((*MockworkloadDescriber)(nil).Manifest), arg0) } // MockwsFileDeleter is a mock of wsFileDeleter interface. type MockwsFileDeleter struct { ctrl *gomock.Controller recorder *MockwsFileDeleterMockRecorder } // MockwsFileDeleterMockRecorder is the mock recorder for MockwsFileDeleter. type MockwsFileDeleterMockRecorder struct { mock *MockwsFileDeleter } // NewMockwsFileDeleter creates a new mock instance. func NewMockwsFileDeleter(ctrl *gomock.Controller) *MockwsFileDeleter { mock := &MockwsFileDeleter{ctrl: ctrl} mock.recorder = &MockwsFileDeleterMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockwsFileDeleter) EXPECT() *MockwsFileDeleterMockRecorder { return m.recorder } // DeleteWorkspaceFile mocks base method. func (m *MockwsFileDeleter) DeleteWorkspaceFile() error { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "DeleteWorkspaceFile") ret0, _ := ret[0].(error) return ret0 } // DeleteWorkspaceFile indicates an expected call of DeleteWorkspaceFile. func (mr *MockwsFileDeleterMockRecorder) DeleteWorkspaceFile() *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DeleteWorkspaceFile", reflect.TypeOf((*MockwsFileDeleter)(nil).DeleteWorkspaceFile)) } // MockmanifestReader is a mock of manifestReader interface. type MockmanifestReader struct { ctrl *gomock.Controller recorder *MockmanifestReaderMockRecorder } // MockmanifestReaderMockRecorder is the mock recorder for MockmanifestReader. type MockmanifestReaderMockRecorder struct { mock *MockmanifestReader } // NewMockmanifestReader creates a new mock instance. func NewMockmanifestReader(ctrl *gomock.Controller) *MockmanifestReader { mock := &MockmanifestReader{ctrl: ctrl} mock.recorder = &MockmanifestReaderMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockmanifestReader) EXPECT() *MockmanifestReaderMockRecorder { return m.recorder } // ReadWorkloadManifest mocks base method. func (m *MockmanifestReader) ReadWorkloadManifest(name string) (workspace.WorkloadManifest, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "ReadWorkloadManifest", name) ret0, _ := ret[0].(workspace.WorkloadManifest) ret1, _ := ret[1].(error) return ret0, ret1 } // ReadWorkloadManifest indicates an expected call of ReadWorkloadManifest. func (mr *MockmanifestReaderMockRecorder) ReadWorkloadManifest(name interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ReadWorkloadManifest", reflect.TypeOf((*MockmanifestReader)(nil).ReadWorkloadManifest), name) } // MockenvironmentManifestWriter is a mock of environmentManifestWriter interface. type MockenvironmentManifestWriter struct { ctrl *gomock.Controller recorder *MockenvironmentManifestWriterMockRecorder } // MockenvironmentManifestWriterMockRecorder is the mock recorder for MockenvironmentManifestWriter. type MockenvironmentManifestWriterMockRecorder struct { mock *MockenvironmentManifestWriter } // NewMockenvironmentManifestWriter creates a new mock instance. func NewMockenvironmentManifestWriter(ctrl *gomock.Controller) *MockenvironmentManifestWriter { mock := &MockenvironmentManifestWriter{ctrl: ctrl} mock.recorder = &MockenvironmentManifestWriterMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockenvironmentManifestWriter) EXPECT() *MockenvironmentManifestWriterMockRecorder { return m.recorder } // WriteEnvironmentManifest mocks base method. func (m *MockenvironmentManifestWriter) WriteEnvironmentManifest(arg0 encoding.BinaryMarshaler, arg1 string) (string, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "WriteEnvironmentManifest", arg0, arg1) ret0, _ := ret[0].(string) ret1, _ := ret[1].(error) return ret0, ret1 } // WriteEnvironmentManifest indicates an expected call of WriteEnvironmentManifest. func (mr *MockenvironmentManifestWriterMockRecorder) WriteEnvironmentManifest(arg0, arg1 interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "WriteEnvironmentManifest", reflect.TypeOf((*MockenvironmentManifestWriter)(nil).WriteEnvironmentManifest), arg0, arg1) } // MockworkspacePathGetter is a mock of workspacePathGetter interface. type MockworkspacePathGetter struct { ctrl *gomock.Controller recorder *MockworkspacePathGetterMockRecorder } // MockworkspacePathGetterMockRecorder is the mock recorder for MockworkspacePathGetter. type MockworkspacePathGetterMockRecorder struct { mock *MockworkspacePathGetter } // NewMockworkspacePathGetter creates a new mock instance. func NewMockworkspacePathGetter(ctrl *gomock.Controller) *MockworkspacePathGetter { mock := &MockworkspacePathGetter{ctrl: ctrl} mock.recorder = &MockworkspacePathGetterMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockworkspacePathGetter) EXPECT() *MockworkspacePathGetterMockRecorder { return m.recorder } // Path mocks base method. func (m *MockworkspacePathGetter) Path() string { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "Path") ret0, _ := ret[0].(string) return ret0 } // Path indicates an expected call of Path. func (mr *MockworkspacePathGetterMockRecorder) Path() *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Path", reflect.TypeOf((*MockworkspacePathGetter)(nil).Path)) } // MockwsPipelineManifestReader is a mock of wsPipelineManifestReader interface. type MockwsPipelineManifestReader struct { ctrl *gomock.Controller recorder *MockwsPipelineManifestReaderMockRecorder } // MockwsPipelineManifestReaderMockRecorder is the mock recorder for MockwsPipelineManifestReader. type MockwsPipelineManifestReaderMockRecorder struct { mock *MockwsPipelineManifestReader } // NewMockwsPipelineManifestReader creates a new mock instance. func NewMockwsPipelineManifestReader(ctrl *gomock.Controller) *MockwsPipelineManifestReader { mock := &MockwsPipelineManifestReader{ctrl: ctrl} mock.recorder = &MockwsPipelineManifestReaderMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockwsPipelineManifestReader) EXPECT() *MockwsPipelineManifestReaderMockRecorder { return m.recorder } // ReadPipelineManifest mocks base method. func (m *MockwsPipelineManifestReader) ReadPipelineManifest(path string) (*manifest.Pipeline, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "ReadPipelineManifest", path) ret0, _ := ret[0].(*manifest.Pipeline) ret1, _ := ret[1].(error) return ret0, ret1 } // ReadPipelineManifest indicates an expected call of ReadPipelineManifest. func (mr *MockwsPipelineManifestReaderMockRecorder) ReadPipelineManifest(path interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ReadPipelineManifest", reflect.TypeOf((*MockwsPipelineManifestReader)(nil).ReadPipelineManifest), path) } // MockrelPath is a mock of relPath interface. type MockrelPath struct { ctrl *gomock.Controller recorder *MockrelPathMockRecorder } // MockrelPathMockRecorder is the mock recorder for MockrelPath. type MockrelPathMockRecorder struct { mock *MockrelPath } // NewMockrelPath creates a new mock instance. func NewMockrelPath(ctrl *gomock.Controller) *MockrelPath { mock := &MockrelPath{ctrl: ctrl} mock.recorder = &MockrelPathMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockrelPath) EXPECT() *MockrelPathMockRecorder { return m.recorder } // Rel mocks base method. func (m *MockrelPath) Rel(path string) (string, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "Rel", path) ret0, _ := ret[0].(string) ret1, _ := ret[1].(error) return ret0, ret1 } // Rel indicates an expected call of Rel. func (mr *MockrelPathMockRecorder) Rel(path interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Rel", reflect.TypeOf((*MockrelPath)(nil).Rel), path) } // MockwsPipelineIniter is a mock of wsPipelineIniter interface. type MockwsPipelineIniter struct { ctrl *gomock.Controller recorder *MockwsPipelineIniterMockRecorder } // MockwsPipelineIniterMockRecorder is the mock recorder for MockwsPipelineIniter. type MockwsPipelineIniterMockRecorder struct { mock *MockwsPipelineIniter } // NewMockwsPipelineIniter creates a new mock instance. func NewMockwsPipelineIniter(ctrl *gomock.Controller) *MockwsPipelineIniter { mock := &MockwsPipelineIniter{ctrl: ctrl} mock.recorder = &MockwsPipelineIniterMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockwsPipelineIniter) EXPECT() *MockwsPipelineIniterMockRecorder { return m.recorder } // ListPipelines mocks base method. func (m *MockwsPipelineIniter) ListPipelines() ([]workspace.PipelineManifest, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "ListPipelines") ret0, _ := ret[0].([]workspace.PipelineManifest) ret1, _ := ret[1].(error) return ret0, ret1 } // ListPipelines indicates an expected call of ListPipelines. func (mr *MockwsPipelineIniterMockRecorder) ListPipelines() *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ListPipelines", reflect.TypeOf((*MockwsPipelineIniter)(nil).ListPipelines)) } // Rel mocks base method. func (m *MockwsPipelineIniter) Rel(path string) (string, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "Rel", path) ret0, _ := ret[0].(string) ret1, _ := ret[1].(error) return ret0, ret1 } // Rel indicates an expected call of Rel. func (mr *MockwsPipelineIniterMockRecorder) Rel(path interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Rel", reflect.TypeOf((*MockwsPipelineIniter)(nil).Rel), path) } // WritePipelineBuildspec mocks base method. func (m *MockwsPipelineIniter) WritePipelineBuildspec(marshaler encoding.BinaryMarshaler, name string) (string, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "WritePipelineBuildspec", marshaler, name) ret0, _ := ret[0].(string) ret1, _ := ret[1].(error) return ret0, ret1 } // WritePipelineBuildspec indicates an expected call of WritePipelineBuildspec. func (mr *MockwsPipelineIniterMockRecorder) WritePipelineBuildspec(marshaler, name interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "WritePipelineBuildspec", reflect.TypeOf((*MockwsPipelineIniter)(nil).WritePipelineBuildspec), marshaler, name) } // WritePipelineManifest mocks base method. func (m *MockwsPipelineIniter) WritePipelineManifest(marshaler encoding.BinaryMarshaler, name string) (string, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "WritePipelineManifest", marshaler, name) ret0, _ := ret[0].(string) ret1, _ := ret[1].(error) return ret0, ret1 } // WritePipelineManifest indicates an expected call of WritePipelineManifest. func (mr *MockwsPipelineIniterMockRecorder) WritePipelineManifest(marshaler, name interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "WritePipelineManifest", reflect.TypeOf((*MockwsPipelineIniter)(nil).WritePipelineManifest), marshaler, name) } // MockserviceLister is a mock of serviceLister interface. type MockserviceLister struct { ctrl *gomock.Controller recorder *MockserviceListerMockRecorder } // MockserviceListerMockRecorder is the mock recorder for MockserviceLister. type MockserviceListerMockRecorder struct { mock *MockserviceLister } // NewMockserviceLister creates a new mock instance. func NewMockserviceLister(ctrl *gomock.Controller) *MockserviceLister { mock := &MockserviceLister{ctrl: ctrl} mock.recorder = &MockserviceListerMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockserviceLister) EXPECT() *MockserviceListerMockRecorder { return m.recorder } // ListServices mocks base method. func (m *MockserviceLister) ListServices() ([]string, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "ListServices") ret0, _ := ret[0].([]string) ret1, _ := ret[1].(error) return ret0, ret1 } // ListServices indicates an expected call of ListServices. func (mr *MockserviceListerMockRecorder) ListServices() *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ListServices", reflect.TypeOf((*MockserviceLister)(nil).ListServices)) } // MockwsSvcReader is a mock of wsSvcReader interface. type MockwsSvcReader struct { ctrl *gomock.Controller recorder *MockwsSvcReaderMockRecorder } // MockwsSvcReaderMockRecorder is the mock recorder for MockwsSvcReader. type MockwsSvcReaderMockRecorder struct { mock *MockwsSvcReader } // NewMockwsSvcReader creates a new mock instance. func NewMockwsSvcReader(ctrl *gomock.Controller) *MockwsSvcReader { mock := &MockwsSvcReader{ctrl: ctrl} mock.recorder = &MockwsSvcReaderMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockwsSvcReader) EXPECT() *MockwsSvcReaderMockRecorder { return m.recorder } // ListServices mocks base method. func (m *MockwsSvcReader) ListServices() ([]string, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "ListServices") ret0, _ := ret[0].([]string) ret1, _ := ret[1].(error) return ret0, ret1 } // ListServices indicates an expected call of ListServices. func (mr *MockwsSvcReaderMockRecorder) ListServices() *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ListServices", reflect.TypeOf((*MockwsSvcReader)(nil).ListServices)) } // ReadWorkloadManifest mocks base method. func (m *MockwsSvcReader) ReadWorkloadManifest(name string) (workspace.WorkloadManifest, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "ReadWorkloadManifest", name) ret0, _ := ret[0].(workspace.WorkloadManifest) ret1, _ := ret[1].(error) return ret0, ret1 } // ReadWorkloadManifest indicates an expected call of ReadWorkloadManifest. func (mr *MockwsSvcReaderMockRecorder) ReadWorkloadManifest(name interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ReadWorkloadManifest", reflect.TypeOf((*MockwsSvcReader)(nil).ReadWorkloadManifest), name) } // MockjobLister is a mock of jobLister interface. type MockjobLister struct { ctrl *gomock.Controller recorder *MockjobListerMockRecorder } // MockjobListerMockRecorder is the mock recorder for MockjobLister. type MockjobListerMockRecorder struct { mock *MockjobLister } // NewMockjobLister creates a new mock instance. func NewMockjobLister(ctrl *gomock.Controller) *MockjobLister { mock := &MockjobLister{ctrl: ctrl} mock.recorder = &MockjobListerMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockjobLister) EXPECT() *MockjobListerMockRecorder { return m.recorder } // ListJobs mocks base method. func (m *MockjobLister) ListJobs() ([]string, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "ListJobs") ret0, _ := ret[0].([]string) ret1, _ := ret[1].(error) return ret0, ret1 } // ListJobs indicates an expected call of ListJobs. func (mr *MockjobListerMockRecorder) ListJobs() *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ListJobs", reflect.TypeOf((*MockjobLister)(nil).ListJobs)) } // MockwsJobReader is a mock of wsJobReader interface. type MockwsJobReader struct { ctrl *gomock.Controller recorder *MockwsJobReaderMockRecorder } // MockwsJobReaderMockRecorder is the mock recorder for MockwsJobReader. type MockwsJobReaderMockRecorder struct { mock *MockwsJobReader } // NewMockwsJobReader creates a new mock instance. func NewMockwsJobReader(ctrl *gomock.Controller) *MockwsJobReader { mock := &MockwsJobReader{ctrl: ctrl} mock.recorder = &MockwsJobReaderMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockwsJobReader) EXPECT() *MockwsJobReaderMockRecorder { return m.recorder } // ListJobs mocks base method. func (m *MockwsJobReader) ListJobs() ([]string, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "ListJobs") ret0, _ := ret[0].([]string) ret1, _ := ret[1].(error) return ret0, ret1 } // ListJobs indicates an expected call of ListJobs. func (mr *MockwsJobReaderMockRecorder) ListJobs() *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ListJobs", reflect.TypeOf((*MockwsJobReader)(nil).ListJobs)) } // ReadWorkloadManifest mocks base method. func (m *MockwsJobReader) ReadWorkloadManifest(name string) (workspace.WorkloadManifest, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "ReadWorkloadManifest", name) ret0, _ := ret[0].(workspace.WorkloadManifest) ret1, _ := ret[1].(error) return ret0, ret1 } // ReadWorkloadManifest indicates an expected call of ReadWorkloadManifest. func (mr *MockwsJobReaderMockRecorder) ReadWorkloadManifest(name interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ReadWorkloadManifest", reflect.TypeOf((*MockwsJobReader)(nil).ReadWorkloadManifest), name) } // MockwlLister is a mock of wlLister interface. type MockwlLister struct { ctrl *gomock.Controller recorder *MockwlListerMockRecorder } // MockwlListerMockRecorder is the mock recorder for MockwlLister. type MockwlListerMockRecorder struct { mock *MockwlLister } // NewMockwlLister creates a new mock instance. func NewMockwlLister(ctrl *gomock.Controller) *MockwlLister { mock := &MockwlLister{ctrl: ctrl} mock.recorder = &MockwlListerMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockwlLister) EXPECT() *MockwlListerMockRecorder { return m.recorder } // ListWorkloads mocks base method. func (m *MockwlLister) ListWorkloads() ([]string, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "ListWorkloads") ret0, _ := ret[0].([]string) ret1, _ := ret[1].(error) return ret0, ret1 } // ListWorkloads indicates an expected call of ListWorkloads. func (mr *MockwlListerMockRecorder) ListWorkloads() *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ListWorkloads", reflect.TypeOf((*MockwlLister)(nil).ListWorkloads)) } // MockwsWorkloadReader is a mock of wsWorkloadReader interface. type MockwsWorkloadReader struct { ctrl *gomock.Controller recorder *MockwsWorkloadReaderMockRecorder } // MockwsWorkloadReaderMockRecorder is the mock recorder for MockwsWorkloadReader. type MockwsWorkloadReaderMockRecorder struct { mock *MockwsWorkloadReader } // NewMockwsWorkloadReader creates a new mock instance. func NewMockwsWorkloadReader(ctrl *gomock.Controller) *MockwsWorkloadReader { mock := &MockwsWorkloadReader{ctrl: ctrl} mock.recorder = &MockwsWorkloadReaderMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockwsWorkloadReader) EXPECT() *MockwsWorkloadReaderMockRecorder { return m.recorder } // ReadFile mocks base method. func (m *MockwsWorkloadReader) ReadFile(path string) ([]byte, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "ReadFile", path) ret0, _ := ret[0].([]byte) ret1, _ := ret[1].(error) return ret0, ret1 } // ReadFile indicates an expected call of ReadFile. func (mr *MockwsWorkloadReaderMockRecorder) ReadFile(path interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ReadFile", reflect.TypeOf((*MockwsWorkloadReader)(nil).ReadFile), path) } // ReadWorkloadManifest mocks base method. func (m *MockwsWorkloadReader) ReadWorkloadManifest(name string) (workspace.WorkloadManifest, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "ReadWorkloadManifest", name) ret0, _ := ret[0].(workspace.WorkloadManifest) ret1, _ := ret[1].(error) return ret0, ret1 } // ReadWorkloadManifest indicates an expected call of ReadWorkloadManifest. func (mr *MockwsWorkloadReaderMockRecorder) ReadWorkloadManifest(name interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ReadWorkloadManifest", reflect.TypeOf((*MockwsWorkloadReader)(nil).ReadWorkloadManifest), name) } // WorkloadAddonFileAbsPath mocks base method. func (m *MockwsWorkloadReader) WorkloadAddonFileAbsPath(wkldName, fName string) string { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "WorkloadAddonFileAbsPath", wkldName, fName) ret0, _ := ret[0].(string) return ret0 } // WorkloadAddonFileAbsPath indicates an expected call of WorkloadAddonFileAbsPath. func (mr *MockwsWorkloadReaderMockRecorder) WorkloadAddonFileAbsPath(wkldName, fName interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "WorkloadAddonFileAbsPath", reflect.TypeOf((*MockwsWorkloadReader)(nil).WorkloadAddonFileAbsPath), wkldName, fName) } // WorkloadAddonFilePath mocks base method. func (m *MockwsWorkloadReader) WorkloadAddonFilePath(wkldName, fName string) string { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "WorkloadAddonFilePath", wkldName, fName) ret0, _ := ret[0].(string) return ret0 } // WorkloadAddonFilePath indicates an expected call of WorkloadAddonFilePath. func (mr *MockwsWorkloadReaderMockRecorder) WorkloadAddonFilePath(wkldName, fName interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "WorkloadAddonFilePath", reflect.TypeOf((*MockwsWorkloadReader)(nil).WorkloadAddonFilePath), wkldName, fName) } // WorkloadExists mocks base method. func (m *MockwsWorkloadReader) WorkloadExists(name string) (bool, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "WorkloadExists", name) ret0, _ := ret[0].(bool) ret1, _ := ret[1].(error) return ret0, ret1 } // WorkloadExists indicates an expected call of WorkloadExists. func (mr *MockwsWorkloadReaderMockRecorder) WorkloadExists(name interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "WorkloadExists", reflect.TypeOf((*MockwsWorkloadReader)(nil).WorkloadExists), name) } // MockwsWorkloadReadWriter is a mock of wsWorkloadReadWriter interface. type MockwsWorkloadReadWriter struct { ctrl *gomock.Controller recorder *MockwsWorkloadReadWriterMockRecorder } // MockwsWorkloadReadWriterMockRecorder is the mock recorder for MockwsWorkloadReadWriter. type MockwsWorkloadReadWriterMockRecorder struct { mock *MockwsWorkloadReadWriter } // NewMockwsWorkloadReadWriter creates a new mock instance. func NewMockwsWorkloadReadWriter(ctrl *gomock.Controller) *MockwsWorkloadReadWriter { mock := &MockwsWorkloadReadWriter{ctrl: ctrl} mock.recorder = &MockwsWorkloadReadWriterMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockwsWorkloadReadWriter) EXPECT() *MockwsWorkloadReadWriterMockRecorder { return m.recorder } // ReadFile mocks base method. func (m *MockwsWorkloadReadWriter) ReadFile(path string) ([]byte, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "ReadFile", path) ret0, _ := ret[0].([]byte) ret1, _ := ret[1].(error) return ret0, ret1 } // ReadFile indicates an expected call of ReadFile. func (mr *MockwsWorkloadReadWriterMockRecorder) ReadFile(path interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ReadFile", reflect.TypeOf((*MockwsWorkloadReadWriter)(nil).ReadFile), path) } // ReadWorkloadManifest mocks base method. func (m *MockwsWorkloadReadWriter) ReadWorkloadManifest(name string) (workspace.WorkloadManifest, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "ReadWorkloadManifest", name) ret0, _ := ret[0].(workspace.WorkloadManifest) ret1, _ := ret[1].(error) return ret0, ret1 } // ReadWorkloadManifest indicates an expected call of ReadWorkloadManifest. func (mr *MockwsWorkloadReadWriterMockRecorder) ReadWorkloadManifest(name interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ReadWorkloadManifest", reflect.TypeOf((*MockwsWorkloadReadWriter)(nil).ReadWorkloadManifest), name) } // WorkloadAddonFileAbsPath mocks base method. func (m *MockwsWorkloadReadWriter) WorkloadAddonFileAbsPath(wkldName, fName string) string { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "WorkloadAddonFileAbsPath", wkldName, fName) ret0, _ := ret[0].(string) return ret0 } // WorkloadAddonFileAbsPath indicates an expected call of WorkloadAddonFileAbsPath. func (mr *MockwsWorkloadReadWriterMockRecorder) WorkloadAddonFileAbsPath(wkldName, fName interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "WorkloadAddonFileAbsPath", reflect.TypeOf((*MockwsWorkloadReadWriter)(nil).WorkloadAddonFileAbsPath), wkldName, fName) } // WorkloadAddonFilePath mocks base method. func (m *MockwsWorkloadReadWriter) WorkloadAddonFilePath(wkldName, fName string) string { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "WorkloadAddonFilePath", wkldName, fName) ret0, _ := ret[0].(string) return ret0 } // WorkloadAddonFilePath indicates an expected call of WorkloadAddonFilePath. func (mr *MockwsWorkloadReadWriterMockRecorder) WorkloadAddonFilePath(wkldName, fName interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "WorkloadAddonFilePath", reflect.TypeOf((*MockwsWorkloadReadWriter)(nil).WorkloadAddonFilePath), wkldName, fName) } // WorkloadExists mocks base method. func (m *MockwsWorkloadReadWriter) WorkloadExists(name string) (bool, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "WorkloadExists", name) ret0, _ := ret[0].(bool) ret1, _ := ret[1].(error) return ret0, ret1 } // WorkloadExists indicates an expected call of WorkloadExists. func (mr *MockwsWorkloadReadWriterMockRecorder) WorkloadExists(name interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "WorkloadExists", reflect.TypeOf((*MockwsWorkloadReadWriter)(nil).WorkloadExists), name) } // Write mocks base method. func (m *MockwsWorkloadReadWriter) Write(content encoding.BinaryMarshaler, path string) (string, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "Write", content, path) ret0, _ := ret[0].(string) ret1, _ := ret[1].(error) return ret0, ret1 } // Write indicates an expected call of Write. func (mr *MockwsWorkloadReadWriterMockRecorder) Write(content, path interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Write", reflect.TypeOf((*MockwsWorkloadReadWriter)(nil).Write), content, path) } // MockwsReadWriter is a mock of wsReadWriter interface. type MockwsReadWriter struct { ctrl *gomock.Controller recorder *MockwsReadWriterMockRecorder } // MockwsReadWriterMockRecorder is the mock recorder for MockwsReadWriter. type MockwsReadWriterMockRecorder struct { mock *MockwsReadWriter } // NewMockwsReadWriter creates a new mock instance. func NewMockwsReadWriter(ctrl *gomock.Controller) *MockwsReadWriter { mock := &MockwsReadWriter{ctrl: ctrl} mock.recorder = &MockwsReadWriterMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockwsReadWriter) EXPECT() *MockwsReadWriterMockRecorder { return m.recorder } // EnvAddonFileAbsPath mocks base method. func (m *MockwsReadWriter) EnvAddonFileAbsPath(fName string) string { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "EnvAddonFileAbsPath", fName) ret0, _ := ret[0].(string) return ret0 } // EnvAddonFileAbsPath indicates an expected call of EnvAddonFileAbsPath. func (mr *MockwsReadWriterMockRecorder) EnvAddonFileAbsPath(fName interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "EnvAddonFileAbsPath", reflect.TypeOf((*MockwsReadWriter)(nil).EnvAddonFileAbsPath), fName) } // EnvAddonFilePath mocks base method. func (m *MockwsReadWriter) EnvAddonFilePath(fName string) string { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "EnvAddonFilePath", fName) ret0, _ := ret[0].(string) return ret0 } // EnvAddonFilePath indicates an expected call of EnvAddonFilePath. func (mr *MockwsReadWriterMockRecorder) EnvAddonFilePath(fName interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "EnvAddonFilePath", reflect.TypeOf((*MockwsReadWriter)(nil).EnvAddonFilePath), fName) } // EnvOverridesPath mocks base method. func (m *MockwsReadWriter) EnvOverridesPath() string { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "EnvOverridesPath") ret0, _ := ret[0].(string) return ret0 } // EnvOverridesPath indicates an expected call of EnvOverridesPath. func (mr *MockwsReadWriterMockRecorder) EnvOverridesPath() *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "EnvOverridesPath", reflect.TypeOf((*MockwsReadWriter)(nil).EnvOverridesPath)) } // HasEnvironments mocks base method. func (m *MockwsReadWriter) HasEnvironments() (bool, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "HasEnvironments") ret0, _ := ret[0].(bool) ret1, _ := ret[1].(error) return ret0, ret1 } // HasEnvironments indicates an expected call of HasEnvironments. func (mr *MockwsReadWriterMockRecorder) HasEnvironments() *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "HasEnvironments", reflect.TypeOf((*MockwsReadWriter)(nil).HasEnvironments)) } // ListEnvironments mocks base method. func (m *MockwsReadWriter) ListEnvironments() ([]string, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "ListEnvironments") ret0, _ := ret[0].([]string) ret1, _ := ret[1].(error) return ret0, ret1 } // ListEnvironments indicates an expected call of ListEnvironments. func (mr *MockwsReadWriterMockRecorder) ListEnvironments() *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ListEnvironments", reflect.TypeOf((*MockwsReadWriter)(nil).ListEnvironments)) } // ReadEnvironmentManifest mocks base method. func (m *MockwsReadWriter) ReadEnvironmentManifest(mftDirName string) (workspace.EnvironmentManifest, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "ReadEnvironmentManifest", mftDirName) ret0, _ := ret[0].(workspace.EnvironmentManifest) ret1, _ := ret[1].(error) return ret0, ret1 } // ReadEnvironmentManifest indicates an expected call of ReadEnvironmentManifest. func (mr *MockwsReadWriterMockRecorder) ReadEnvironmentManifest(mftDirName interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ReadEnvironmentManifest", reflect.TypeOf((*MockwsReadWriter)(nil).ReadEnvironmentManifest), mftDirName) } // ReadFile mocks base method. func (m *MockwsReadWriter) ReadFile(path string) ([]byte, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "ReadFile", path) ret0, _ := ret[0].([]byte) ret1, _ := ret[1].(error) return ret0, ret1 } // ReadFile indicates an expected call of ReadFile. func (mr *MockwsReadWriterMockRecorder) ReadFile(path interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ReadFile", reflect.TypeOf((*MockwsReadWriter)(nil).ReadFile), path) } // ReadWorkloadManifest mocks base method. func (m *MockwsReadWriter) ReadWorkloadManifest(name string) (workspace.WorkloadManifest, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "ReadWorkloadManifest", name) ret0, _ := ret[0].(workspace.WorkloadManifest) ret1, _ := ret[1].(error) return ret0, ret1 } // ReadWorkloadManifest indicates an expected call of ReadWorkloadManifest. func (mr *MockwsReadWriterMockRecorder) ReadWorkloadManifest(name interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ReadWorkloadManifest", reflect.TypeOf((*MockwsReadWriter)(nil).ReadWorkloadManifest), name) } // WorkloadAddonFileAbsPath mocks base method. func (m *MockwsReadWriter) WorkloadAddonFileAbsPath(wkldName, fName string) string { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "WorkloadAddonFileAbsPath", wkldName, fName) ret0, _ := ret[0].(string) return ret0 } // WorkloadAddonFileAbsPath indicates an expected call of WorkloadAddonFileAbsPath. func (mr *MockwsReadWriterMockRecorder) WorkloadAddonFileAbsPath(wkldName, fName interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "WorkloadAddonFileAbsPath", reflect.TypeOf((*MockwsReadWriter)(nil).WorkloadAddonFileAbsPath), wkldName, fName) } // WorkloadAddonFilePath mocks base method. func (m *MockwsReadWriter) WorkloadAddonFilePath(wkldName, fName string) string { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "WorkloadAddonFilePath", wkldName, fName) ret0, _ := ret[0].(string) return ret0 } // WorkloadAddonFilePath indicates an expected call of WorkloadAddonFilePath. func (mr *MockwsReadWriterMockRecorder) WorkloadAddonFilePath(wkldName, fName interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "WorkloadAddonFilePath", reflect.TypeOf((*MockwsReadWriter)(nil).WorkloadAddonFilePath), wkldName, fName) } // WorkloadExists mocks base method. func (m *MockwsReadWriter) WorkloadExists(name string) (bool, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "WorkloadExists", name) ret0, _ := ret[0].(bool) ret1, _ := ret[1].(error) return ret0, ret1 } // WorkloadExists indicates an expected call of WorkloadExists. func (mr *MockwsReadWriterMockRecorder) WorkloadExists(name interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "WorkloadExists", reflect.TypeOf((*MockwsReadWriter)(nil).WorkloadExists), name) } // Write mocks base method. func (m *MockwsReadWriter) Write(content encoding.BinaryMarshaler, path string) (string, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "Write", content, path) ret0, _ := ret[0].(string) ret1, _ := ret[1].(error) return ret0, ret1 } // Write indicates an expected call of Write. func (mr *MockwsReadWriterMockRecorder) Write(content, path interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Write", reflect.TypeOf((*MockwsReadWriter)(nil).Write), content, path) } // MockwsJobDirReader is a mock of wsJobDirReader interface. type MockwsJobDirReader struct { ctrl *gomock.Controller recorder *MockwsJobDirReaderMockRecorder } // MockwsJobDirReaderMockRecorder is the mock recorder for MockwsJobDirReader. type MockwsJobDirReaderMockRecorder struct { mock *MockwsJobDirReader } // NewMockwsJobDirReader creates a new mock instance. func NewMockwsJobDirReader(ctrl *gomock.Controller) *MockwsJobDirReader { mock := &MockwsJobDirReader{ctrl: ctrl} mock.recorder = &MockwsJobDirReaderMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockwsJobDirReader) EXPECT() *MockwsJobDirReaderMockRecorder { return m.recorder } // ListJobs mocks base method. func (m *MockwsJobDirReader) ListJobs() ([]string, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "ListJobs") ret0, _ := ret[0].([]string) ret1, _ := ret[1].(error) return ret0, ret1 } // ListJobs indicates an expected call of ListJobs. func (mr *MockwsJobDirReaderMockRecorder) ListJobs() *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ListJobs", reflect.TypeOf((*MockwsJobDirReader)(nil).ListJobs)) } // Path mocks base method. func (m *MockwsJobDirReader) Path() string { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "Path") ret0, _ := ret[0].(string) return ret0 } // Path indicates an expected call of Path. func (mr *MockwsJobDirReaderMockRecorder) Path() *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Path", reflect.TypeOf((*MockwsJobDirReader)(nil).Path)) } // ReadWorkloadManifest mocks base method. func (m *MockwsJobDirReader) ReadWorkloadManifest(name string) (workspace.WorkloadManifest, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "ReadWorkloadManifest", name) ret0, _ := ret[0].(workspace.WorkloadManifest) ret1, _ := ret[1].(error) return ret0, ret1 } // ReadWorkloadManifest indicates an expected call of ReadWorkloadManifest. func (mr *MockwsJobDirReaderMockRecorder) ReadWorkloadManifest(name interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ReadWorkloadManifest", reflect.TypeOf((*MockwsJobDirReader)(nil).ReadWorkloadManifest), name) } // MockwsWlDirReader is a mock of wsWlDirReader interface. type MockwsWlDirReader struct { ctrl *gomock.Controller recorder *MockwsWlDirReaderMockRecorder } // MockwsWlDirReaderMockRecorder is the mock recorder for MockwsWlDirReader. type MockwsWlDirReaderMockRecorder struct { mock *MockwsWlDirReader } // NewMockwsWlDirReader creates a new mock instance. func NewMockwsWlDirReader(ctrl *gomock.Controller) *MockwsWlDirReader { mock := &MockwsWlDirReader{ctrl: ctrl} mock.recorder = &MockwsWlDirReaderMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockwsWlDirReader) EXPECT() *MockwsWlDirReaderMockRecorder { return m.recorder } // ListEnvironments mocks base method. func (m *MockwsWlDirReader) ListEnvironments() ([]string, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "ListEnvironments") ret0, _ := ret[0].([]string) ret1, _ := ret[1].(error) return ret0, ret1 } // ListEnvironments indicates an expected call of ListEnvironments. func (mr *MockwsWlDirReaderMockRecorder) ListEnvironments() *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ListEnvironments", reflect.TypeOf((*MockwsWlDirReader)(nil).ListEnvironments)) } // ListJobs mocks base method. func (m *MockwsWlDirReader) ListJobs() ([]string, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "ListJobs") ret0, _ := ret[0].([]string) ret1, _ := ret[1].(error) return ret0, ret1 } // ListJobs indicates an expected call of ListJobs. func (mr *MockwsWlDirReaderMockRecorder) ListJobs() *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ListJobs", reflect.TypeOf((*MockwsWlDirReader)(nil).ListJobs)) } // ListServices mocks base method. func (m *MockwsWlDirReader) ListServices() ([]string, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "ListServices") ret0, _ := ret[0].([]string) ret1, _ := ret[1].(error) return ret0, ret1 } // ListServices indicates an expected call of ListServices. func (mr *MockwsWlDirReaderMockRecorder) ListServices() *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ListServices", reflect.TypeOf((*MockwsWlDirReader)(nil).ListServices)) } // ListWorkloads mocks base method. func (m *MockwsWlDirReader) ListWorkloads() ([]string, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "ListWorkloads") ret0, _ := ret[0].([]string) ret1, _ := ret[1].(error) return ret0, ret1 } // ListWorkloads indicates an expected call of ListWorkloads. func (mr *MockwsWlDirReaderMockRecorder) ListWorkloads() *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ListWorkloads", reflect.TypeOf((*MockwsWlDirReader)(nil).ListWorkloads)) } // Path mocks base method. func (m *MockwsWlDirReader) Path() string { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "Path") ret0, _ := ret[0].(string) return ret0 } // Path indicates an expected call of Path. func (mr *MockwsWlDirReaderMockRecorder) Path() *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Path", reflect.TypeOf((*MockwsWlDirReader)(nil).Path)) } // ReadWorkloadManifest mocks base method. func (m *MockwsWlDirReader) ReadWorkloadManifest(name string) (workspace.WorkloadManifest, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "ReadWorkloadManifest", name) ret0, _ := ret[0].(workspace.WorkloadManifest) ret1, _ := ret[1].(error) return ret0, ret1 } // ReadWorkloadManifest indicates an expected call of ReadWorkloadManifest. func (mr *MockwsWlDirReaderMockRecorder) ReadWorkloadManifest(name interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ReadWorkloadManifest", reflect.TypeOf((*MockwsWlDirReader)(nil).ReadWorkloadManifest), name) } // Summary mocks base method. func (m *MockwsWlDirReader) Summary() (*workspace.Summary, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "Summary") ret0, _ := ret[0].(*workspace.Summary) ret1, _ := ret[1].(error) return ret0, ret1 } // Summary indicates an expected call of Summary. func (mr *MockwsWlDirReaderMockRecorder) Summary() *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Summary", reflect.TypeOf((*MockwsWlDirReader)(nil).Summary)) } // WorkloadOverridesPath mocks base method. func (m *MockwsWlDirReader) WorkloadOverridesPath(arg0 string) string { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "WorkloadOverridesPath", arg0) ret0, _ := ret[0].(string) return ret0 } // WorkloadOverridesPath indicates an expected call of WorkloadOverridesPath. func (mr *MockwsWlDirReaderMockRecorder) WorkloadOverridesPath(arg0 interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "WorkloadOverridesPath", reflect.TypeOf((*MockwsWlDirReader)(nil).WorkloadOverridesPath), arg0) } // MockwsEnvironmentReader is a mock of wsEnvironmentReader interface. type MockwsEnvironmentReader struct { ctrl *gomock.Controller recorder *MockwsEnvironmentReaderMockRecorder } // MockwsEnvironmentReaderMockRecorder is the mock recorder for MockwsEnvironmentReader. type MockwsEnvironmentReaderMockRecorder struct { mock *MockwsEnvironmentReader } // NewMockwsEnvironmentReader creates a new mock instance. func NewMockwsEnvironmentReader(ctrl *gomock.Controller) *MockwsEnvironmentReader { mock := &MockwsEnvironmentReader{ctrl: ctrl} mock.recorder = &MockwsEnvironmentReaderMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockwsEnvironmentReader) EXPECT() *MockwsEnvironmentReaderMockRecorder { return m.recorder } // EnvAddonFileAbsPath mocks base method. func (m *MockwsEnvironmentReader) EnvAddonFileAbsPath(fName string) string { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "EnvAddonFileAbsPath", fName) ret0, _ := ret[0].(string) return ret0 } // EnvAddonFileAbsPath indicates an expected call of EnvAddonFileAbsPath. func (mr *MockwsEnvironmentReaderMockRecorder) EnvAddonFileAbsPath(fName interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "EnvAddonFileAbsPath", reflect.TypeOf((*MockwsEnvironmentReader)(nil).EnvAddonFileAbsPath), fName) } // EnvAddonFilePath mocks base method. func (m *MockwsEnvironmentReader) EnvAddonFilePath(fName string) string { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "EnvAddonFilePath", fName) ret0, _ := ret[0].(string) return ret0 } // EnvAddonFilePath indicates an expected call of EnvAddonFilePath. func (mr *MockwsEnvironmentReaderMockRecorder) EnvAddonFilePath(fName interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "EnvAddonFilePath", reflect.TypeOf((*MockwsEnvironmentReader)(nil).EnvAddonFilePath), fName) } // EnvOverridesPath mocks base method. func (m *MockwsEnvironmentReader) EnvOverridesPath() string { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "EnvOverridesPath") ret0, _ := ret[0].(string) return ret0 } // EnvOverridesPath indicates an expected call of EnvOverridesPath. func (mr *MockwsEnvironmentReaderMockRecorder) EnvOverridesPath() *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "EnvOverridesPath", reflect.TypeOf((*MockwsEnvironmentReader)(nil).EnvOverridesPath)) } // HasEnvironments mocks base method. func (m *MockwsEnvironmentReader) HasEnvironments() (bool, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "HasEnvironments") ret0, _ := ret[0].(bool) ret1, _ := ret[1].(error) return ret0, ret1 } // HasEnvironments indicates an expected call of HasEnvironments. func (mr *MockwsEnvironmentReaderMockRecorder) HasEnvironments() *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "HasEnvironments", reflect.TypeOf((*MockwsEnvironmentReader)(nil).HasEnvironments)) } // ListEnvironments mocks base method. func (m *MockwsEnvironmentReader) ListEnvironments() ([]string, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "ListEnvironments") ret0, _ := ret[0].([]string) ret1, _ := ret[1].(error) return ret0, ret1 } // ListEnvironments indicates an expected call of ListEnvironments. func (mr *MockwsEnvironmentReaderMockRecorder) ListEnvironments() *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ListEnvironments", reflect.TypeOf((*MockwsEnvironmentReader)(nil).ListEnvironments)) } // ReadEnvironmentManifest mocks base method. func (m *MockwsEnvironmentReader) ReadEnvironmentManifest(mftDirName string) (workspace.EnvironmentManifest, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "ReadEnvironmentManifest", mftDirName) ret0, _ := ret[0].(workspace.EnvironmentManifest) ret1, _ := ret[1].(error) return ret0, ret1 } // ReadEnvironmentManifest indicates an expected call of ReadEnvironmentManifest. func (mr *MockwsEnvironmentReaderMockRecorder) ReadEnvironmentManifest(mftDirName interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ReadEnvironmentManifest", reflect.TypeOf((*MockwsEnvironmentReader)(nil).ReadEnvironmentManifest), mftDirName) } // MockwsPipelineReader is a mock of wsPipelineReader interface. type MockwsPipelineReader struct { ctrl *gomock.Controller recorder *MockwsPipelineReaderMockRecorder } // MockwsPipelineReaderMockRecorder is the mock recorder for MockwsPipelineReader. type MockwsPipelineReaderMockRecorder struct { mock *MockwsPipelineReader } // NewMockwsPipelineReader creates a new mock instance. func NewMockwsPipelineReader(ctrl *gomock.Controller) *MockwsPipelineReader { mock := &MockwsPipelineReader{ctrl: ctrl} mock.recorder = &MockwsPipelineReaderMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockwsPipelineReader) EXPECT() *MockwsPipelineReaderMockRecorder { return m.recorder } // ListPipelines mocks base method. func (m *MockwsPipelineReader) ListPipelines() ([]workspace.PipelineManifest, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "ListPipelines") ret0, _ := ret[0].([]workspace.PipelineManifest) ret1, _ := ret[1].(error) return ret0, ret1 } // ListPipelines indicates an expected call of ListPipelines. func (mr *MockwsPipelineReaderMockRecorder) ListPipelines() *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ListPipelines", reflect.TypeOf((*MockwsPipelineReader)(nil).ListPipelines)) } // ListWorkloads mocks base method. func (m *MockwsPipelineReader) ListWorkloads() ([]string, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "ListWorkloads") ret0, _ := ret[0].([]string) ret1, _ := ret[1].(error) return ret0, ret1 } // ListWorkloads indicates an expected call of ListWorkloads. func (mr *MockwsPipelineReaderMockRecorder) ListWorkloads() *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ListWorkloads", reflect.TypeOf((*MockwsPipelineReader)(nil).ListWorkloads)) } // ReadPipelineManifest mocks base method. func (m *MockwsPipelineReader) ReadPipelineManifest(path string) (*manifest.Pipeline, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "ReadPipelineManifest", path) ret0, _ := ret[0].(*manifest.Pipeline) ret1, _ := ret[1].(error) return ret0, ret1 } // ReadPipelineManifest indicates an expected call of ReadPipelineManifest. func (mr *MockwsPipelineReaderMockRecorder) ReadPipelineManifest(path interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ReadPipelineManifest", reflect.TypeOf((*MockwsPipelineReader)(nil).ReadPipelineManifest), path) } // Rel mocks base method. func (m *MockwsPipelineReader) Rel(path string) (string, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "Rel", path) ret0, _ := ret[0].(string) ret1, _ := ret[1].(error) return ret0, ret1 } // Rel indicates an expected call of Rel. func (mr *MockwsPipelineReaderMockRecorder) Rel(path interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Rel", reflect.TypeOf((*MockwsPipelineReader)(nil).Rel), path) } // MockwsPipelineGetter is a mock of wsPipelineGetter interface. type MockwsPipelineGetter struct { ctrl *gomock.Controller recorder *MockwsPipelineGetterMockRecorder } // MockwsPipelineGetterMockRecorder is the mock recorder for MockwsPipelineGetter. type MockwsPipelineGetterMockRecorder struct { mock *MockwsPipelineGetter } // NewMockwsPipelineGetter creates a new mock instance. func NewMockwsPipelineGetter(ctrl *gomock.Controller) *MockwsPipelineGetter { mock := &MockwsPipelineGetter{ctrl: ctrl} mock.recorder = &MockwsPipelineGetterMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockwsPipelineGetter) EXPECT() *MockwsPipelineGetterMockRecorder { return m.recorder } // ListPipelines mocks base method. func (m *MockwsPipelineGetter) ListPipelines() ([]workspace.PipelineManifest, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "ListPipelines") ret0, _ := ret[0].([]workspace.PipelineManifest) ret1, _ := ret[1].(error) return ret0, ret1 } // ListPipelines indicates an expected call of ListPipelines. func (mr *MockwsPipelineGetterMockRecorder) ListPipelines() *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ListPipelines", reflect.TypeOf((*MockwsPipelineGetter)(nil).ListPipelines)) } // ListWorkloads mocks base method. func (m *MockwsPipelineGetter) ListWorkloads() ([]string, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "ListWorkloads") ret0, _ := ret[0].([]string) ret1, _ := ret[1].(error) return ret0, ret1 } // ListWorkloads indicates an expected call of ListWorkloads. func (mr *MockwsPipelineGetterMockRecorder) ListWorkloads() *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ListWorkloads", reflect.TypeOf((*MockwsPipelineGetter)(nil).ListWorkloads)) } // ReadPipelineManifest mocks base method. func (m *MockwsPipelineGetter) ReadPipelineManifest(path string) (*manifest.Pipeline, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "ReadPipelineManifest", path) ret0, _ := ret[0].(*manifest.Pipeline) ret1, _ := ret[1].(error) return ret0, ret1 } // ReadPipelineManifest indicates an expected call of ReadPipelineManifest. func (mr *MockwsPipelineGetterMockRecorder) ReadPipelineManifest(path interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ReadPipelineManifest", reflect.TypeOf((*MockwsPipelineGetter)(nil).ReadPipelineManifest), path) } // MockwsAppManager is a mock of wsAppManager interface. type MockwsAppManager struct { ctrl *gomock.Controller recorder *MockwsAppManagerMockRecorder } // MockwsAppManagerMockRecorder is the mock recorder for MockwsAppManager. type MockwsAppManagerMockRecorder struct { mock *MockwsAppManager } // NewMockwsAppManager creates a new mock instance. func NewMockwsAppManager(ctrl *gomock.Controller) *MockwsAppManager { mock := &MockwsAppManager{ctrl: ctrl} mock.recorder = &MockwsAppManagerMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockwsAppManager) EXPECT() *MockwsAppManagerMockRecorder { return m.recorder } // Summary mocks base method. func (m *MockwsAppManager) Summary() (*workspace.Summary, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "Summary") ret0, _ := ret[0].(*workspace.Summary) ret1, _ := ret[1].(error) return ret0, ret1 } // Summary indicates an expected call of Summary. func (mr *MockwsAppManagerMockRecorder) Summary() *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Summary", reflect.TypeOf((*MockwsAppManager)(nil).Summary)) } // MockwsAppManagerDeleter is a mock of wsAppManagerDeleter interface. type MockwsAppManagerDeleter struct { ctrl *gomock.Controller recorder *MockwsAppManagerDeleterMockRecorder } // MockwsAppManagerDeleterMockRecorder is the mock recorder for MockwsAppManagerDeleter. type MockwsAppManagerDeleterMockRecorder struct { mock *MockwsAppManagerDeleter } // NewMockwsAppManagerDeleter creates a new mock instance. func NewMockwsAppManagerDeleter(ctrl *gomock.Controller) *MockwsAppManagerDeleter { mock := &MockwsAppManagerDeleter{ctrl: ctrl} mock.recorder = &MockwsAppManagerDeleterMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockwsAppManagerDeleter) EXPECT() *MockwsAppManagerDeleterMockRecorder { return m.recorder } // DeleteWorkspaceFile mocks base method. func (m *MockwsAppManagerDeleter) DeleteWorkspaceFile() error { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "DeleteWorkspaceFile") ret0, _ := ret[0].(error) return ret0 } // DeleteWorkspaceFile indicates an expected call of DeleteWorkspaceFile. func (mr *MockwsAppManagerDeleterMockRecorder) DeleteWorkspaceFile() *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DeleteWorkspaceFile", reflect.TypeOf((*MockwsAppManagerDeleter)(nil).DeleteWorkspaceFile)) } // Summary mocks base method. func (m *MockwsAppManagerDeleter) Summary() (*workspace.Summary, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "Summary") ret0, _ := ret[0].(*workspace.Summary) ret1, _ := ret[1].(error) return ret0, ret1 } // Summary indicates an expected call of Summary. func (mr *MockwsAppManagerDeleterMockRecorder) Summary() *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Summary", reflect.TypeOf((*MockwsAppManagerDeleter)(nil).Summary)) } // MockwsWriter is a mock of wsWriter interface. type MockwsWriter struct { ctrl *gomock.Controller recorder *MockwsWriterMockRecorder } // MockwsWriterMockRecorder is the mock recorder for MockwsWriter. type MockwsWriterMockRecorder struct { mock *MockwsWriter } // NewMockwsWriter creates a new mock instance. func NewMockwsWriter(ctrl *gomock.Controller) *MockwsWriter { mock := &MockwsWriter{ctrl: ctrl} mock.recorder = &MockwsWriterMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockwsWriter) EXPECT() *MockwsWriterMockRecorder { return m.recorder } // Write mocks base method. func (m *MockwsWriter) Write(content encoding.BinaryMarshaler, path string) (string, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "Write", content, path) ret0, _ := ret[0].(string) ret1, _ := ret[1].(error) return ret0, ret1 } // Write indicates an expected call of Write. func (mr *MockwsWriterMockRecorder) Write(content, path interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Write", reflect.TypeOf((*MockwsWriter)(nil).Write), content, path) } // Mockuploader is a mock of uploader interface. type Mockuploader struct { ctrl *gomock.Controller recorder *MockuploaderMockRecorder } // MockuploaderMockRecorder is the mock recorder for Mockuploader. type MockuploaderMockRecorder struct { mock *Mockuploader } // NewMockuploader creates a new mock instance. func NewMockuploader(ctrl *gomock.Controller) *Mockuploader { mock := &Mockuploader{ctrl: ctrl} mock.recorder = &MockuploaderMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *Mockuploader) EXPECT() *MockuploaderMockRecorder { return m.recorder } // Upload mocks base method. func (m *Mockuploader) Upload(bucket, key string, data io.Reader) (string, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "Upload", bucket, key, data) ret0, _ := ret[0].(string) ret1, _ := ret[1].(error) return ret0, ret1 } // Upload indicates an expected call of Upload. func (mr *MockuploaderMockRecorder) Upload(bucket, key, data interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Upload", reflect.TypeOf((*Mockuploader)(nil).Upload), bucket, key, data) } // MockbucketEmptier is a mock of bucketEmptier interface. type MockbucketEmptier struct { ctrl *gomock.Controller recorder *MockbucketEmptierMockRecorder } // MockbucketEmptierMockRecorder is the mock recorder for MockbucketEmptier. type MockbucketEmptierMockRecorder struct { mock *MockbucketEmptier } // NewMockbucketEmptier creates a new mock instance. func NewMockbucketEmptier(ctrl *gomock.Controller) *MockbucketEmptier { mock := &MockbucketEmptier{ctrl: ctrl} mock.recorder = &MockbucketEmptierMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockbucketEmptier) EXPECT() *MockbucketEmptierMockRecorder { return m.recorder } // EmptyBucket mocks base method. func (m *MockbucketEmptier) EmptyBucket(bucket string) error { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "EmptyBucket", bucket) ret0, _ := ret[0].(error) return ret0 } // EmptyBucket indicates an expected call of EmptyBucket. func (mr *MockbucketEmptierMockRecorder) EmptyBucket(bucket interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "EmptyBucket", reflect.TypeOf((*MockbucketEmptier)(nil).EmptyBucket), bucket) } // MockenvironmentDeployer is a mock of environmentDeployer interface. type MockenvironmentDeployer struct { ctrl *gomock.Controller recorder *MockenvironmentDeployerMockRecorder } // MockenvironmentDeployerMockRecorder is the mock recorder for MockenvironmentDeployer. type MockenvironmentDeployerMockRecorder struct { mock *MockenvironmentDeployer } // NewMockenvironmentDeployer creates a new mock instance. func NewMockenvironmentDeployer(ctrl *gomock.Controller) *MockenvironmentDeployer { mock := &MockenvironmentDeployer{ctrl: ctrl} mock.recorder = &MockenvironmentDeployerMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockenvironmentDeployer) EXPECT() *MockenvironmentDeployerMockRecorder { return m.recorder } // CreateAndRenderEnvironment mocks base method. func (m *MockenvironmentDeployer) CreateAndRenderEnvironment(conf cloudformation0.StackConfiguration, bucketARN string) error { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "CreateAndRenderEnvironment", conf, bucketARN) ret0, _ := ret[0].(error) return ret0 } // CreateAndRenderEnvironment indicates an expected call of CreateAndRenderEnvironment. func (mr *MockenvironmentDeployerMockRecorder) CreateAndRenderEnvironment(conf, bucketARN interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "CreateAndRenderEnvironment", reflect.TypeOf((*MockenvironmentDeployer)(nil).CreateAndRenderEnvironment), conf, bucketARN) } // DeleteEnvironment mocks base method. func (m *MockenvironmentDeployer) DeleteEnvironment(appName, envName, cfnExecRoleARN string) error { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "DeleteEnvironment", appName, envName, cfnExecRoleARN) ret0, _ := ret[0].(error) return ret0 } // DeleteEnvironment indicates an expected call of DeleteEnvironment. func (mr *MockenvironmentDeployerMockRecorder) DeleteEnvironment(appName, envName, cfnExecRoleARN interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DeleteEnvironment", reflect.TypeOf((*MockenvironmentDeployer)(nil).DeleteEnvironment), appName, envName, cfnExecRoleARN) } // GetEnvironment mocks base method. func (m *MockenvironmentDeployer) GetEnvironment(appName, envName string) (*config.Environment, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "GetEnvironment", appName, envName) ret0, _ := ret[0].(*config.Environment) ret1, _ := ret[1].(error) return ret0, ret1 } // GetEnvironment indicates an expected call of GetEnvironment. func (mr *MockenvironmentDeployerMockRecorder) GetEnvironment(appName, envName interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetEnvironment", reflect.TypeOf((*MockenvironmentDeployer)(nil).GetEnvironment), appName, envName) } // Template mocks base method. func (m *MockenvironmentDeployer) Template(stackName string) (string, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "Template", stackName) ret0, _ := ret[0].(string) ret1, _ := ret[1].(error) return ret0, ret1 } // Template indicates an expected call of Template. func (mr *MockenvironmentDeployerMockRecorder) Template(stackName interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Template", reflect.TypeOf((*MockenvironmentDeployer)(nil).Template), stackName) } // UpdateEnvironmentTemplate mocks base method. func (m *MockenvironmentDeployer) UpdateEnvironmentTemplate(appName, envName, templateBody, cfnExecRoleARN string) error { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "UpdateEnvironmentTemplate", appName, envName, templateBody, cfnExecRoleARN) ret0, _ := ret[0].(error) return ret0 } // UpdateEnvironmentTemplate indicates an expected call of UpdateEnvironmentTemplate. func (mr *MockenvironmentDeployerMockRecorder) UpdateEnvironmentTemplate(appName, envName, templateBody, cfnExecRoleARN interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "UpdateEnvironmentTemplate", reflect.TypeOf((*MockenvironmentDeployer)(nil).UpdateEnvironmentTemplate), appName, envName, templateBody, cfnExecRoleARN) } // MockwlDeleter is a mock of wlDeleter interface. type MockwlDeleter struct { ctrl *gomock.Controller recorder *MockwlDeleterMockRecorder } // MockwlDeleterMockRecorder is the mock recorder for MockwlDeleter. type MockwlDeleterMockRecorder struct { mock *MockwlDeleter } // NewMockwlDeleter creates a new mock instance. func NewMockwlDeleter(ctrl *gomock.Controller) *MockwlDeleter { mock := &MockwlDeleter{ctrl: ctrl} mock.recorder = &MockwlDeleterMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockwlDeleter) EXPECT() *MockwlDeleterMockRecorder { return m.recorder } // DeleteWorkload mocks base method. func (m *MockwlDeleter) DeleteWorkload(in deploy0.DeleteWorkloadInput) error { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "DeleteWorkload", in) ret0, _ := ret[0].(error) return ret0 } // DeleteWorkload indicates an expected call of DeleteWorkload. func (mr *MockwlDeleterMockRecorder) DeleteWorkload(in interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DeleteWorkload", reflect.TypeOf((*MockwlDeleter)(nil).DeleteWorkload), in) } // MocksvcRemoverFromApp is a mock of svcRemoverFromApp interface. type MocksvcRemoverFromApp struct { ctrl *gomock.Controller recorder *MocksvcRemoverFromAppMockRecorder } // MocksvcRemoverFromAppMockRecorder is the mock recorder for MocksvcRemoverFromApp. type MocksvcRemoverFromAppMockRecorder struct { mock *MocksvcRemoverFromApp } // NewMocksvcRemoverFromApp creates a new mock instance. func NewMocksvcRemoverFromApp(ctrl *gomock.Controller) *MocksvcRemoverFromApp { mock := &MocksvcRemoverFromApp{ctrl: ctrl} mock.recorder = &MocksvcRemoverFromAppMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MocksvcRemoverFromApp) EXPECT() *MocksvcRemoverFromAppMockRecorder { return m.recorder } // RemoveServiceFromApp mocks base method. func (m *MocksvcRemoverFromApp) RemoveServiceFromApp(app *config.Application, svcName string) error { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "RemoveServiceFromApp", app, svcName) ret0, _ := ret[0].(error) return ret0 } // RemoveServiceFromApp indicates an expected call of RemoveServiceFromApp. func (mr *MocksvcRemoverFromAppMockRecorder) RemoveServiceFromApp(app, svcName interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "RemoveServiceFromApp", reflect.TypeOf((*MocksvcRemoverFromApp)(nil).RemoveServiceFromApp), app, svcName) } // MockjobRemoverFromApp is a mock of jobRemoverFromApp interface. type MockjobRemoverFromApp struct { ctrl *gomock.Controller recorder *MockjobRemoverFromAppMockRecorder } // MockjobRemoverFromAppMockRecorder is the mock recorder for MockjobRemoverFromApp. type MockjobRemoverFromAppMockRecorder struct { mock *MockjobRemoverFromApp } // NewMockjobRemoverFromApp creates a new mock instance. func NewMockjobRemoverFromApp(ctrl *gomock.Controller) *MockjobRemoverFromApp { mock := &MockjobRemoverFromApp{ctrl: ctrl} mock.recorder = &MockjobRemoverFromAppMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockjobRemoverFromApp) EXPECT() *MockjobRemoverFromAppMockRecorder { return m.recorder } // RemoveJobFromApp mocks base method. func (m *MockjobRemoverFromApp) RemoveJobFromApp(app *config.Application, jobName string) error { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "RemoveJobFromApp", app, jobName) ret0, _ := ret[0].(error) return ret0 } // RemoveJobFromApp indicates an expected call of RemoveJobFromApp. func (mr *MockjobRemoverFromAppMockRecorder) RemoveJobFromApp(app, jobName interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "RemoveJobFromApp", reflect.TypeOf((*MockjobRemoverFromApp)(nil).RemoveJobFromApp), app, jobName) } // MockimageRemover is a mock of imageRemover interface. type MockimageRemover struct { ctrl *gomock.Controller recorder *MockimageRemoverMockRecorder } // MockimageRemoverMockRecorder is the mock recorder for MockimageRemover. type MockimageRemoverMockRecorder struct { mock *MockimageRemover } // NewMockimageRemover creates a new mock instance. func NewMockimageRemover(ctrl *gomock.Controller) *MockimageRemover { mock := &MockimageRemover{ctrl: ctrl} mock.recorder = &MockimageRemoverMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockimageRemover) EXPECT() *MockimageRemoverMockRecorder { return m.recorder } // ClearRepository mocks base method. func (m *MockimageRemover) ClearRepository(repoName string) error { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "ClearRepository", repoName) ret0, _ := ret[0].(error) return ret0 } // ClearRepository indicates an expected call of ClearRepository. func (mr *MockimageRemoverMockRecorder) ClearRepository(repoName interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ClearRepository", reflect.TypeOf((*MockimageRemover)(nil).ClearRepository), repoName) } // MockpipelineDeployer is a mock of pipelineDeployer interface. type MockpipelineDeployer struct { ctrl *gomock.Controller recorder *MockpipelineDeployerMockRecorder } // MockpipelineDeployerMockRecorder is the mock recorder for MockpipelineDeployer. type MockpipelineDeployerMockRecorder struct { mock *MockpipelineDeployer } // NewMockpipelineDeployer creates a new mock instance. func NewMockpipelineDeployer(ctrl *gomock.Controller) *MockpipelineDeployer { mock := &MockpipelineDeployer{ctrl: ctrl} mock.recorder = &MockpipelineDeployerMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockpipelineDeployer) EXPECT() *MockpipelineDeployerMockRecorder { return m.recorder } // AddPipelineResourcesToApp mocks base method. func (m *MockpipelineDeployer) AddPipelineResourcesToApp(app *config.Application, region string) error { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "AddPipelineResourcesToApp", app, region) ret0, _ := ret[0].(error) return ret0 } // AddPipelineResourcesToApp indicates an expected call of AddPipelineResourcesToApp. func (mr *MockpipelineDeployerMockRecorder) AddPipelineResourcesToApp(app, region interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "AddPipelineResourcesToApp", reflect.TypeOf((*MockpipelineDeployer)(nil).AddPipelineResourcesToApp), app, region) } // CreatePipeline mocks base method. func (m *MockpipelineDeployer) CreatePipeline(env *deploy0.CreatePipelineInput, bucketName string) error { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "CreatePipeline", env, bucketName) ret0, _ := ret[0].(error) return ret0 } // CreatePipeline indicates an expected call of CreatePipeline. func (mr *MockpipelineDeployerMockRecorder) CreatePipeline(env, bucketName interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "CreatePipeline", reflect.TypeOf((*MockpipelineDeployer)(nil).CreatePipeline), env, bucketName) } // DeletePipeline mocks base method. func (m *MockpipelineDeployer) DeletePipeline(pipeline deploy0.Pipeline) error { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "DeletePipeline", pipeline) ret0, _ := ret[0].(error) return ret0 } // DeletePipeline indicates an expected call of DeletePipeline. func (mr *MockpipelineDeployerMockRecorder) DeletePipeline(pipeline interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DeletePipeline", reflect.TypeOf((*MockpipelineDeployer)(nil).DeletePipeline), pipeline) } // GetAppResourcesByRegion mocks base method. func (m *MockpipelineDeployer) GetAppResourcesByRegion(app *config.Application, region string) (*stack.AppRegionalResources, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "GetAppResourcesByRegion", app, region) ret0, _ := ret[0].(*stack.AppRegionalResources) ret1, _ := ret[1].(error) return ret0, ret1 } // GetAppResourcesByRegion indicates an expected call of GetAppResourcesByRegion. func (mr *MockpipelineDeployerMockRecorder) GetAppResourcesByRegion(app, region interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetAppResourcesByRegion", reflect.TypeOf((*MockpipelineDeployer)(nil).GetAppResourcesByRegion), app, region) } // GetRegionalAppResources mocks base method. func (m *MockpipelineDeployer) GetRegionalAppResources(app *config.Application) ([]*stack.AppRegionalResources, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "GetRegionalAppResources", app) ret0, _ := ret[0].([]*stack.AppRegionalResources) ret1, _ := ret[1].(error) return ret0, ret1 } // GetRegionalAppResources indicates an expected call of GetRegionalAppResources. func (mr *MockpipelineDeployerMockRecorder) GetRegionalAppResources(app interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetRegionalAppResources", reflect.TypeOf((*MockpipelineDeployer)(nil).GetRegionalAppResources), app) } // PipelineExists mocks base method. func (m *MockpipelineDeployer) PipelineExists(env *deploy0.CreatePipelineInput) (bool, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "PipelineExists", env) ret0, _ := ret[0].(bool) ret1, _ := ret[1].(error) return ret0, ret1 } // PipelineExists indicates an expected call of PipelineExists. func (mr *MockpipelineDeployerMockRecorder) PipelineExists(env interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "PipelineExists", reflect.TypeOf((*MockpipelineDeployer)(nil).PipelineExists), env) } // Template mocks base method. func (m *MockpipelineDeployer) Template(stackName string) (string, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "Template", stackName) ret0, _ := ret[0].(string) ret1, _ := ret[1].(error) return ret0, ret1 } // Template indicates an expected call of Template. func (mr *MockpipelineDeployerMockRecorder) Template(stackName interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Template", reflect.TypeOf((*MockpipelineDeployer)(nil).Template), stackName) } // UpdatePipeline mocks base method. func (m *MockpipelineDeployer) UpdatePipeline(env *deploy0.CreatePipelineInput, bucketName string) error { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "UpdatePipeline", env, bucketName) ret0, _ := ret[0].(error) return ret0 } // UpdatePipeline indicates an expected call of UpdatePipeline. func (mr *MockpipelineDeployerMockRecorder) UpdatePipeline(env, bucketName interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "UpdatePipeline", reflect.TypeOf((*MockpipelineDeployer)(nil).UpdatePipeline), env, bucketName) } // MockappDeployer is a mock of appDeployer interface. type MockappDeployer struct { ctrl *gomock.Controller recorder *MockappDeployerMockRecorder } // MockappDeployerMockRecorder is the mock recorder for MockappDeployer. type MockappDeployerMockRecorder struct { mock *MockappDeployer } // NewMockappDeployer creates a new mock instance. func NewMockappDeployer(ctrl *gomock.Controller) *MockappDeployer { mock := &MockappDeployer{ctrl: ctrl} mock.recorder = &MockappDeployerMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockappDeployer) EXPECT() *MockappDeployerMockRecorder { return m.recorder } // AddEnvToApp mocks base method. func (m *MockappDeployer) AddEnvToApp(opts *cloudformation0.AddEnvToAppOpts) error { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "AddEnvToApp", opts) ret0, _ := ret[0].(error) return ret0 } // AddEnvToApp indicates an expected call of AddEnvToApp. func (mr *MockappDeployerMockRecorder) AddEnvToApp(opts interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "AddEnvToApp", reflect.TypeOf((*MockappDeployer)(nil).AddEnvToApp), opts) } // AddJobToApp mocks base method. func (m *MockappDeployer) AddJobToApp(app *config.Application, jobName string, opts ...cloudformation0.AddWorkloadToAppOpt) error { m.ctrl.T.Helper() varargs := []interface{}{app, jobName} for _, a := range opts { varargs = append(varargs, a) } ret := m.ctrl.Call(m, "AddJobToApp", varargs...) ret0, _ := ret[0].(error) return ret0 } // AddJobToApp indicates an expected call of AddJobToApp. func (mr *MockappDeployerMockRecorder) AddJobToApp(app, jobName interface{}, opts ...interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() varargs := append([]interface{}{app, jobName}, opts...) return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "AddJobToApp", reflect.TypeOf((*MockappDeployer)(nil).AddJobToApp), varargs...) } // AddServiceToApp mocks base method. func (m *MockappDeployer) AddServiceToApp(app *config.Application, svcName string, opts ...cloudformation0.AddWorkloadToAppOpt) error { m.ctrl.T.Helper() varargs := []interface{}{app, svcName} for _, a := range opts { varargs = append(varargs, a) } ret := m.ctrl.Call(m, "AddServiceToApp", varargs...) ret0, _ := ret[0].(error) return ret0 } // AddServiceToApp indicates an expected call of AddServiceToApp. func (mr *MockappDeployerMockRecorder) AddServiceToApp(app, svcName interface{}, opts ...interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() varargs := append([]interface{}{app, svcName}, opts...) return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "AddServiceToApp", reflect.TypeOf((*MockappDeployer)(nil).AddServiceToApp), varargs...) } // DelegateDNSPermissions mocks base method. func (m *MockappDeployer) DelegateDNSPermissions(app *config.Application, accountID string) error { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "DelegateDNSPermissions", app, accountID) ret0, _ := ret[0].(error) return ret0 } // DelegateDNSPermissions indicates an expected call of DelegateDNSPermissions. func (mr *MockappDeployerMockRecorder) DelegateDNSPermissions(app, accountID interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DelegateDNSPermissions", reflect.TypeOf((*MockappDeployer)(nil).DelegateDNSPermissions), app, accountID) } // DeleteApp mocks base method. func (m *MockappDeployer) DeleteApp(name string) error { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "DeleteApp", name) ret0, _ := ret[0].(error) return ret0 } // DeleteApp indicates an expected call of DeleteApp. func (mr *MockappDeployerMockRecorder) DeleteApp(name interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DeleteApp", reflect.TypeOf((*MockappDeployer)(nil).DeleteApp), name) } // DeployApp mocks base method. func (m *MockappDeployer) DeployApp(in *deploy0.CreateAppInput) error { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "DeployApp", in) ret0, _ := ret[0].(error) return ret0 } // DeployApp indicates an expected call of DeployApp. func (mr *MockappDeployerMockRecorder) DeployApp(in interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DeployApp", reflect.TypeOf((*MockappDeployer)(nil).DeployApp), in) } // MockappResourcesGetter is a mock of appResourcesGetter interface. type MockappResourcesGetter struct { ctrl *gomock.Controller recorder *MockappResourcesGetterMockRecorder } // MockappResourcesGetterMockRecorder is the mock recorder for MockappResourcesGetter. type MockappResourcesGetterMockRecorder struct { mock *MockappResourcesGetter } // NewMockappResourcesGetter creates a new mock instance. func NewMockappResourcesGetter(ctrl *gomock.Controller) *MockappResourcesGetter { mock := &MockappResourcesGetter{ctrl: ctrl} mock.recorder = &MockappResourcesGetterMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockappResourcesGetter) EXPECT() *MockappResourcesGetterMockRecorder { return m.recorder } // GetAppResourcesByRegion mocks base method. func (m *MockappResourcesGetter) GetAppResourcesByRegion(app *config.Application, region string) (*stack.AppRegionalResources, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "GetAppResourcesByRegion", app, region) ret0, _ := ret[0].(*stack.AppRegionalResources) ret1, _ := ret[1].(error) return ret0, ret1 } // GetAppResourcesByRegion indicates an expected call of GetAppResourcesByRegion. func (mr *MockappResourcesGetterMockRecorder) GetAppResourcesByRegion(app, region interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetAppResourcesByRegion", reflect.TypeOf((*MockappResourcesGetter)(nil).GetAppResourcesByRegion), app, region) } // GetRegionalAppResources mocks base method. func (m *MockappResourcesGetter) GetRegionalAppResources(app *config.Application) ([]*stack.AppRegionalResources, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "GetRegionalAppResources", app) ret0, _ := ret[0].([]*stack.AppRegionalResources) ret1, _ := ret[1].(error) return ret0, ret1 } // GetRegionalAppResources indicates an expected call of GetRegionalAppResources. func (mr *MockappResourcesGetterMockRecorder) GetRegionalAppResources(app interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetRegionalAppResources", reflect.TypeOf((*MockappResourcesGetter)(nil).GetRegionalAppResources), app) } // MocktaskDeployer is a mock of taskDeployer interface. type MocktaskDeployer struct { ctrl *gomock.Controller recorder *MocktaskDeployerMockRecorder } // MocktaskDeployerMockRecorder is the mock recorder for MocktaskDeployer. type MocktaskDeployerMockRecorder struct { mock *MocktaskDeployer } // NewMocktaskDeployer creates a new mock instance. func NewMocktaskDeployer(ctrl *gomock.Controller) *MocktaskDeployer { mock := &MocktaskDeployer{ctrl: ctrl} mock.recorder = &MocktaskDeployerMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MocktaskDeployer) EXPECT() *MocktaskDeployerMockRecorder { return m.recorder } // DeployTask mocks base method. func (m *MocktaskDeployer) DeployTask(input *deploy0.CreateTaskResourcesInput, opts ...cloudformation.StackOption) error { m.ctrl.T.Helper() varargs := []interface{}{input} for _, a := range opts { varargs = append(varargs, a) } ret := m.ctrl.Call(m, "DeployTask", varargs...) ret0, _ := ret[0].(error) return ret0 } // DeployTask indicates an expected call of DeployTask. func (mr *MocktaskDeployerMockRecorder) DeployTask(input interface{}, opts ...interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() varargs := append([]interface{}{input}, opts...) return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DeployTask", reflect.TypeOf((*MocktaskDeployer)(nil).DeployTask), varargs...) } // GetTaskStack mocks base method. func (m *MocktaskDeployer) GetTaskStack(taskName string) (*deploy0.TaskStackInfo, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "GetTaskStack", taskName) ret0, _ := ret[0].(*deploy0.TaskStackInfo) ret1, _ := ret[1].(error) return ret0, ret1 } // GetTaskStack indicates an expected call of GetTaskStack. func (mr *MocktaskDeployerMockRecorder) GetTaskStack(taskName interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetTaskStack", reflect.TypeOf((*MocktaskDeployer)(nil).GetTaskStack), taskName) } // MocktaskStackManager is a mock of taskStackManager interface. type MocktaskStackManager struct { ctrl *gomock.Controller recorder *MocktaskStackManagerMockRecorder } // MocktaskStackManagerMockRecorder is the mock recorder for MocktaskStackManager. type MocktaskStackManagerMockRecorder struct { mock *MocktaskStackManager } // NewMocktaskStackManager creates a new mock instance. func NewMocktaskStackManager(ctrl *gomock.Controller) *MocktaskStackManager { mock := &MocktaskStackManager{ctrl: ctrl} mock.recorder = &MocktaskStackManagerMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MocktaskStackManager) EXPECT() *MocktaskStackManagerMockRecorder { return m.recorder } // DeleteTask mocks base method. func (m *MocktaskStackManager) DeleteTask(task deploy0.TaskStackInfo) error { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "DeleteTask", task) ret0, _ := ret[0].(error) return ret0 } // DeleteTask indicates an expected call of DeleteTask. func (mr *MocktaskStackManagerMockRecorder) DeleteTask(task interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DeleteTask", reflect.TypeOf((*MocktaskStackManager)(nil).DeleteTask), task) } // GetTaskStack mocks base method. func (m *MocktaskStackManager) GetTaskStack(taskName string) (*deploy0.TaskStackInfo, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "GetTaskStack", taskName) ret0, _ := ret[0].(*deploy0.TaskStackInfo) ret1, _ := ret[1].(error) return ret0, ret1 } // GetTaskStack indicates an expected call of GetTaskStack. func (mr *MocktaskStackManagerMockRecorder) GetTaskStack(taskName interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetTaskStack", reflect.TypeOf((*MocktaskStackManager)(nil).GetTaskStack), taskName) } // MocktaskRunner is a mock of taskRunner interface. type MocktaskRunner struct { ctrl *gomock.Controller recorder *MocktaskRunnerMockRecorder } // MocktaskRunnerMockRecorder is the mock recorder for MocktaskRunner. type MocktaskRunnerMockRecorder struct { mock *MocktaskRunner } // NewMocktaskRunner creates a new mock instance. func NewMocktaskRunner(ctrl *gomock.Controller) *MocktaskRunner { mock := &MocktaskRunner{ctrl: ctrl} mock.recorder = &MocktaskRunnerMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MocktaskRunner) EXPECT() *MocktaskRunnerMockRecorder { return m.recorder } // CheckNonZeroExitCode mocks base method. func (m *MocktaskRunner) CheckNonZeroExitCode(arg0 []*task.Task) error { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "CheckNonZeroExitCode", arg0) ret0, _ := ret[0].(error) return ret0 } // CheckNonZeroExitCode indicates an expected call of CheckNonZeroExitCode. func (mr *MocktaskRunnerMockRecorder) CheckNonZeroExitCode(arg0 interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "CheckNonZeroExitCode", reflect.TypeOf((*MocktaskRunner)(nil).CheckNonZeroExitCode), arg0) } // Run mocks base method. func (m *MocktaskRunner) Run() ([]*task.Task, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "Run") ret0, _ := ret[0].([]*task.Task) ret1, _ := ret[1].(error) return ret0, ret1 } // Run indicates an expected call of Run. func (mr *MocktaskRunnerMockRecorder) Run() *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Run", reflect.TypeOf((*MocktaskRunner)(nil).Run)) } // MockdefaultClusterGetter is a mock of defaultClusterGetter interface. type MockdefaultClusterGetter struct { ctrl *gomock.Controller recorder *MockdefaultClusterGetterMockRecorder } // MockdefaultClusterGetterMockRecorder is the mock recorder for MockdefaultClusterGetter. type MockdefaultClusterGetterMockRecorder struct { mock *MockdefaultClusterGetter } // NewMockdefaultClusterGetter creates a new mock instance. func NewMockdefaultClusterGetter(ctrl *gomock.Controller) *MockdefaultClusterGetter { mock := &MockdefaultClusterGetter{ctrl: ctrl} mock.recorder = &MockdefaultClusterGetterMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockdefaultClusterGetter) EXPECT() *MockdefaultClusterGetterMockRecorder { return m.recorder } // HasDefaultCluster mocks base method. func (m *MockdefaultClusterGetter) HasDefaultCluster() (bool, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "HasDefaultCluster") ret0, _ := ret[0].(bool) ret1, _ := ret[1].(error) return ret0, ret1 } // HasDefaultCluster indicates an expected call of HasDefaultCluster. func (mr *MockdefaultClusterGetterMockRecorder) HasDefaultCluster() *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "HasDefaultCluster", reflect.TypeOf((*MockdefaultClusterGetter)(nil).HasDefaultCluster)) } // Mockdeployer is a mock of deployer interface. type Mockdeployer struct { ctrl *gomock.Controller recorder *MockdeployerMockRecorder } // MockdeployerMockRecorder is the mock recorder for Mockdeployer. type MockdeployerMockRecorder struct { mock *Mockdeployer } // NewMockdeployer creates a new mock instance. func NewMockdeployer(ctrl *gomock.Controller) *Mockdeployer { mock := &Mockdeployer{ctrl: ctrl} mock.recorder = &MockdeployerMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *Mockdeployer) EXPECT() *MockdeployerMockRecorder { return m.recorder } // AddEnvToApp mocks base method. func (m *Mockdeployer) AddEnvToApp(opts *cloudformation0.AddEnvToAppOpts) error { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "AddEnvToApp", opts) ret0, _ := ret[0].(error) return ret0 } // AddEnvToApp indicates an expected call of AddEnvToApp. func (mr *MockdeployerMockRecorder) AddEnvToApp(opts interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "AddEnvToApp", reflect.TypeOf((*Mockdeployer)(nil).AddEnvToApp), opts) } // AddJobToApp mocks base method. func (m *Mockdeployer) AddJobToApp(app *config.Application, jobName string, opts ...cloudformation0.AddWorkloadToAppOpt) error { m.ctrl.T.Helper() varargs := []interface{}{app, jobName} for _, a := range opts { varargs = append(varargs, a) } ret := m.ctrl.Call(m, "AddJobToApp", varargs...) ret0, _ := ret[0].(error) return ret0 } // AddJobToApp indicates an expected call of AddJobToApp. func (mr *MockdeployerMockRecorder) AddJobToApp(app, jobName interface{}, opts ...interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() varargs := append([]interface{}{app, jobName}, opts...) return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "AddJobToApp", reflect.TypeOf((*Mockdeployer)(nil).AddJobToApp), varargs...) } // AddPipelineResourcesToApp mocks base method. func (m *Mockdeployer) AddPipelineResourcesToApp(app *config.Application, region string) error { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "AddPipelineResourcesToApp", app, region) ret0, _ := ret[0].(error) return ret0 } // AddPipelineResourcesToApp indicates an expected call of AddPipelineResourcesToApp. func (mr *MockdeployerMockRecorder) AddPipelineResourcesToApp(app, region interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "AddPipelineResourcesToApp", reflect.TypeOf((*Mockdeployer)(nil).AddPipelineResourcesToApp), app, region) } // AddServiceToApp mocks base method. func (m *Mockdeployer) AddServiceToApp(app *config.Application, svcName string, opts ...cloudformation0.AddWorkloadToAppOpt) error { m.ctrl.T.Helper() varargs := []interface{}{app, svcName} for _, a := range opts { varargs = append(varargs, a) } ret := m.ctrl.Call(m, "AddServiceToApp", varargs...) ret0, _ := ret[0].(error) return ret0 } // AddServiceToApp indicates an expected call of AddServiceToApp. func (mr *MockdeployerMockRecorder) AddServiceToApp(app, svcName interface{}, opts ...interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() varargs := append([]interface{}{app, svcName}, opts...) return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "AddServiceToApp", reflect.TypeOf((*Mockdeployer)(nil).AddServiceToApp), varargs...) } // CreateAndRenderEnvironment mocks base method. func (m *Mockdeployer) CreateAndRenderEnvironment(conf cloudformation0.StackConfiguration, bucketARN string) error { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "CreateAndRenderEnvironment", conf, bucketARN) ret0, _ := ret[0].(error) return ret0 } // CreateAndRenderEnvironment indicates an expected call of CreateAndRenderEnvironment. func (mr *MockdeployerMockRecorder) CreateAndRenderEnvironment(conf, bucketARN interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "CreateAndRenderEnvironment", reflect.TypeOf((*Mockdeployer)(nil).CreateAndRenderEnvironment), conf, bucketARN) } // CreatePipeline mocks base method. func (m *Mockdeployer) CreatePipeline(env *deploy0.CreatePipelineInput, bucketName string) error { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "CreatePipeline", env, bucketName) ret0, _ := ret[0].(error) return ret0 } // CreatePipeline indicates an expected call of CreatePipeline. func (mr *MockdeployerMockRecorder) CreatePipeline(env, bucketName interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "CreatePipeline", reflect.TypeOf((*Mockdeployer)(nil).CreatePipeline), env, bucketName) } // DelegateDNSPermissions mocks base method. func (m *Mockdeployer) DelegateDNSPermissions(app *config.Application, accountID string) error { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "DelegateDNSPermissions", app, accountID) ret0, _ := ret[0].(error) return ret0 } // DelegateDNSPermissions indicates an expected call of DelegateDNSPermissions. func (mr *MockdeployerMockRecorder) DelegateDNSPermissions(app, accountID interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DelegateDNSPermissions", reflect.TypeOf((*Mockdeployer)(nil).DelegateDNSPermissions), app, accountID) } // DeleteApp mocks base method. func (m *Mockdeployer) DeleteApp(name string) error { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "DeleteApp", name) ret0, _ := ret[0].(error) return ret0 } // DeleteApp indicates an expected call of DeleteApp. func (mr *MockdeployerMockRecorder) DeleteApp(name interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DeleteApp", reflect.TypeOf((*Mockdeployer)(nil).DeleteApp), name) } // DeleteEnvironment mocks base method. func (m *Mockdeployer) DeleteEnvironment(appName, envName, cfnExecRoleARN string) error { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "DeleteEnvironment", appName, envName, cfnExecRoleARN) ret0, _ := ret[0].(error) return ret0 } // DeleteEnvironment indicates an expected call of DeleteEnvironment. func (mr *MockdeployerMockRecorder) DeleteEnvironment(appName, envName, cfnExecRoleARN interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DeleteEnvironment", reflect.TypeOf((*Mockdeployer)(nil).DeleteEnvironment), appName, envName, cfnExecRoleARN) } // DeletePipeline mocks base method. func (m *Mockdeployer) DeletePipeline(pipeline deploy0.Pipeline) error { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "DeletePipeline", pipeline) ret0, _ := ret[0].(error) return ret0 } // DeletePipeline indicates an expected call of DeletePipeline. func (mr *MockdeployerMockRecorder) DeletePipeline(pipeline interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DeletePipeline", reflect.TypeOf((*Mockdeployer)(nil).DeletePipeline), pipeline) } // DeployApp mocks base method. func (m *Mockdeployer) DeployApp(in *deploy0.CreateAppInput) error { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "DeployApp", in) ret0, _ := ret[0].(error) return ret0 } // DeployApp indicates an expected call of DeployApp. func (mr *MockdeployerMockRecorder) DeployApp(in interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DeployApp", reflect.TypeOf((*Mockdeployer)(nil).DeployApp), in) } // GetAppResourcesByRegion mocks base method. func (m *Mockdeployer) GetAppResourcesByRegion(app *config.Application, region string) (*stack.AppRegionalResources, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "GetAppResourcesByRegion", app, region) ret0, _ := ret[0].(*stack.AppRegionalResources) ret1, _ := ret[1].(error) return ret0, ret1 } // GetAppResourcesByRegion indicates an expected call of GetAppResourcesByRegion. func (mr *MockdeployerMockRecorder) GetAppResourcesByRegion(app, region interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetAppResourcesByRegion", reflect.TypeOf((*Mockdeployer)(nil).GetAppResourcesByRegion), app, region) } // GetEnvironment mocks base method. func (m *Mockdeployer) GetEnvironment(appName, envName string) (*config.Environment, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "GetEnvironment", appName, envName) ret0, _ := ret[0].(*config.Environment) ret1, _ := ret[1].(error) return ret0, ret1 } // GetEnvironment indicates an expected call of GetEnvironment. func (mr *MockdeployerMockRecorder) GetEnvironment(appName, envName interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetEnvironment", reflect.TypeOf((*Mockdeployer)(nil).GetEnvironment), appName, envName) } // GetRegionalAppResources mocks base method. func (m *Mockdeployer) GetRegionalAppResources(app *config.Application) ([]*stack.AppRegionalResources, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "GetRegionalAppResources", app) ret0, _ := ret[0].([]*stack.AppRegionalResources) ret1, _ := ret[1].(error) return ret0, ret1 } // GetRegionalAppResources indicates an expected call of GetRegionalAppResources. func (mr *MockdeployerMockRecorder) GetRegionalAppResources(app interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetRegionalAppResources", reflect.TypeOf((*Mockdeployer)(nil).GetRegionalAppResources), app) } // ListTaskStacks mocks base method. func (m *Mockdeployer) ListTaskStacks(appName, envName string) ([]deploy0.TaskStackInfo, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "ListTaskStacks", appName, envName) ret0, _ := ret[0].([]deploy0.TaskStackInfo) ret1, _ := ret[1].(error) return ret0, ret1 } // ListTaskStacks indicates an expected call of ListTaskStacks. func (mr *MockdeployerMockRecorder) ListTaskStacks(appName, envName interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ListTaskStacks", reflect.TypeOf((*Mockdeployer)(nil).ListTaskStacks), appName, envName) } // PipelineExists mocks base method. func (m *Mockdeployer) PipelineExists(env *deploy0.CreatePipelineInput) (bool, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "PipelineExists", env) ret0, _ := ret[0].(bool) ret1, _ := ret[1].(error) return ret0, ret1 } // PipelineExists indicates an expected call of PipelineExists. func (mr *MockdeployerMockRecorder) PipelineExists(env interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "PipelineExists", reflect.TypeOf((*Mockdeployer)(nil).PipelineExists), env) } // Template mocks base method. func (m *Mockdeployer) Template(stackName string) (string, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "Template", stackName) ret0, _ := ret[0].(string) ret1, _ := ret[1].(error) return ret0, ret1 } // Template indicates an expected call of Template. func (mr *MockdeployerMockRecorder) Template(stackName interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Template", reflect.TypeOf((*Mockdeployer)(nil).Template), stackName) } // UpdateEnvironmentTemplate mocks base method. func (m *Mockdeployer) UpdateEnvironmentTemplate(appName, envName, templateBody, cfnExecRoleARN string) error { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "UpdateEnvironmentTemplate", appName, envName, templateBody, cfnExecRoleARN) ret0, _ := ret[0].(error) return ret0 } // UpdateEnvironmentTemplate indicates an expected call of UpdateEnvironmentTemplate. func (mr *MockdeployerMockRecorder) UpdateEnvironmentTemplate(appName, envName, templateBody, cfnExecRoleARN interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "UpdateEnvironmentTemplate", reflect.TypeOf((*Mockdeployer)(nil).UpdateEnvironmentTemplate), appName, envName, templateBody, cfnExecRoleARN) } // UpdatePipeline mocks base method. func (m *Mockdeployer) UpdatePipeline(env *deploy0.CreatePipelineInput, bucketName string) error { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "UpdatePipeline", env, bucketName) ret0, _ := ret[0].(error) return ret0 } // UpdatePipeline indicates an expected call of UpdatePipeline. func (mr *MockdeployerMockRecorder) UpdatePipeline(env, bucketName interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "UpdatePipeline", reflect.TypeOf((*Mockdeployer)(nil).UpdatePipeline), env, bucketName) } // MockdomainHostedZoneGetter is a mock of domainHostedZoneGetter interface. type MockdomainHostedZoneGetter struct { ctrl *gomock.Controller recorder *MockdomainHostedZoneGetterMockRecorder } // MockdomainHostedZoneGetterMockRecorder is the mock recorder for MockdomainHostedZoneGetter. type MockdomainHostedZoneGetterMockRecorder struct { mock *MockdomainHostedZoneGetter } // NewMockdomainHostedZoneGetter creates a new mock instance. func NewMockdomainHostedZoneGetter(ctrl *gomock.Controller) *MockdomainHostedZoneGetter { mock := &MockdomainHostedZoneGetter{ctrl: ctrl} mock.recorder = &MockdomainHostedZoneGetterMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockdomainHostedZoneGetter) EXPECT() *MockdomainHostedZoneGetterMockRecorder { return m.recorder } // DomainHostedZoneID mocks base method. func (m *MockdomainHostedZoneGetter) DomainHostedZoneID(domainName string) (string, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "DomainHostedZoneID", domainName) ret0, _ := ret[0].(string) ret1, _ := ret[1].(error) return ret0, ret1 } // DomainHostedZoneID indicates an expected call of DomainHostedZoneID. func (mr *MockdomainHostedZoneGetterMockRecorder) DomainHostedZoneID(domainName interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DomainHostedZoneID", reflect.TypeOf((*MockdomainHostedZoneGetter)(nil).DomainHostedZoneID), domainName) } // ValidateDomainOwnership mocks base method. func (m *MockdomainHostedZoneGetter) ValidateDomainOwnership(domainName string) error { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "ValidateDomainOwnership", domainName) ret0, _ := ret[0].(error) return ret0 } // ValidateDomainOwnership indicates an expected call of ValidateDomainOwnership. func (mr *MockdomainHostedZoneGetterMockRecorder) ValidateDomainOwnership(domainName interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ValidateDomainOwnership", reflect.TypeOf((*MockdomainHostedZoneGetter)(nil).ValidateDomainOwnership), domainName) } // MockdockerfileParser is a mock of dockerfileParser interface. type MockdockerfileParser struct { ctrl *gomock.Controller recorder *MockdockerfileParserMockRecorder } // MockdockerfileParserMockRecorder is the mock recorder for MockdockerfileParser. type MockdockerfileParserMockRecorder struct { mock *MockdockerfileParser } // NewMockdockerfileParser creates a new mock instance. func NewMockdockerfileParser(ctrl *gomock.Controller) *MockdockerfileParser { mock := &MockdockerfileParser{ctrl: ctrl} mock.recorder = &MockdockerfileParserMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockdockerfileParser) EXPECT() *MockdockerfileParserMockRecorder { return m.recorder } // GetExposedPorts mocks base method. func (m *MockdockerfileParser) GetExposedPorts() ([]dockerfile.Port, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "GetExposedPorts") ret0, _ := ret[0].([]dockerfile.Port) ret1, _ := ret[1].(error) return ret0, ret1 } // GetExposedPorts indicates an expected call of GetExposedPorts. func (mr *MockdockerfileParserMockRecorder) GetExposedPorts() *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetExposedPorts", reflect.TypeOf((*MockdockerfileParser)(nil).GetExposedPorts)) } // GetHealthCheck mocks base method. func (m *MockdockerfileParser) GetHealthCheck() (*dockerfile.HealthCheck, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "GetHealthCheck") ret0, _ := ret[0].(*dockerfile.HealthCheck) ret1, _ := ret[1].(error) return ret0, ret1 } // GetHealthCheck indicates an expected call of GetHealthCheck. func (mr *MockdockerfileParserMockRecorder) GetHealthCheck() *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetHealthCheck", reflect.TypeOf((*MockdockerfileParser)(nil).GetHealthCheck)) } // MockstatusDescriber is a mock of statusDescriber interface. type MockstatusDescriber struct { ctrl *gomock.Controller recorder *MockstatusDescriberMockRecorder } // MockstatusDescriberMockRecorder is the mock recorder for MockstatusDescriber. type MockstatusDescriberMockRecorder struct { mock *MockstatusDescriber } // NewMockstatusDescriber creates a new mock instance. func NewMockstatusDescriber(ctrl *gomock.Controller) *MockstatusDescriber { mock := &MockstatusDescriber{ctrl: ctrl} mock.recorder = &MockstatusDescriberMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockstatusDescriber) EXPECT() *MockstatusDescriberMockRecorder { return m.recorder } // Describe mocks base method. func (m *MockstatusDescriber) Describe() (describe.HumanJSONStringer, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "Describe") ret0, _ := ret[0].(describe.HumanJSONStringer) ret1, _ := ret[1].(error) return ret0, ret1 } // Describe indicates an expected call of Describe. func (mr *MockstatusDescriberMockRecorder) Describe() *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Describe", reflect.TypeOf((*MockstatusDescriber)(nil).Describe)) } // MockenvDescriber is a mock of envDescriber interface. type MockenvDescriber struct { ctrl *gomock.Controller recorder *MockenvDescriberMockRecorder } // MockenvDescriberMockRecorder is the mock recorder for MockenvDescriber. type MockenvDescriberMockRecorder struct { mock *MockenvDescriber } // NewMockenvDescriber creates a new mock instance. func NewMockenvDescriber(ctrl *gomock.Controller) *MockenvDescriber { mock := &MockenvDescriber{ctrl: ctrl} mock.recorder = &MockenvDescriberMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockenvDescriber) EXPECT() *MockenvDescriberMockRecorder { return m.recorder } // Describe mocks base method. func (m *MockenvDescriber) Describe() (*describe.EnvDescription, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "Describe") ret0, _ := ret[0].(*describe.EnvDescription) ret1, _ := ret[1].(error) return ret0, ret1 } // Describe indicates an expected call of Describe. func (mr *MockenvDescriberMockRecorder) Describe() *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Describe", reflect.TypeOf((*MockenvDescriber)(nil).Describe)) } // Manifest mocks base method. func (m *MockenvDescriber) Manifest() ([]byte, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "Manifest") ret0, _ := ret[0].([]byte) ret1, _ := ret[1].(error) return ret0, ret1 } // Manifest indicates an expected call of Manifest. func (mr *MockenvDescriberMockRecorder) Manifest() *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Manifest", reflect.TypeOf((*MockenvDescriber)(nil).Manifest)) } // PublicCIDRBlocks mocks base method. func (m *MockenvDescriber) PublicCIDRBlocks() ([]string, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "PublicCIDRBlocks") ret0, _ := ret[0].([]string) ret1, _ := ret[1].(error) return ret0, ret1 } // PublicCIDRBlocks indicates an expected call of PublicCIDRBlocks. func (mr *MockenvDescriberMockRecorder) PublicCIDRBlocks() *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "PublicCIDRBlocks", reflect.TypeOf((*MockenvDescriber)(nil).PublicCIDRBlocks)) } // ValidateCFServiceDomainAliases mocks base method. func (m *MockenvDescriber) ValidateCFServiceDomainAliases() error { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "ValidateCFServiceDomainAliases") ret0, _ := ret[0].(error) return ret0 } // ValidateCFServiceDomainAliases indicates an expected call of ValidateCFServiceDomainAliases. func (mr *MockenvDescriberMockRecorder) ValidateCFServiceDomainAliases() *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ValidateCFServiceDomainAliases", reflect.TypeOf((*MockenvDescriber)(nil).ValidateCFServiceDomainAliases)) } // MockversionCompatibilityChecker is a mock of versionCompatibilityChecker interface. type MockversionCompatibilityChecker struct { ctrl *gomock.Controller recorder *MockversionCompatibilityCheckerMockRecorder } // MockversionCompatibilityCheckerMockRecorder is the mock recorder for MockversionCompatibilityChecker. type MockversionCompatibilityCheckerMockRecorder struct { mock *MockversionCompatibilityChecker } // NewMockversionCompatibilityChecker creates a new mock instance. func NewMockversionCompatibilityChecker(ctrl *gomock.Controller) *MockversionCompatibilityChecker { mock := &MockversionCompatibilityChecker{ctrl: ctrl} mock.recorder = &MockversionCompatibilityCheckerMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockversionCompatibilityChecker) EXPECT() *MockversionCompatibilityCheckerMockRecorder { return m.recorder } // AvailableFeatures mocks base method. func (m *MockversionCompatibilityChecker) AvailableFeatures() ([]string, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "AvailableFeatures") ret0, _ := ret[0].([]string) ret1, _ := ret[1].(error) return ret0, ret1 } // AvailableFeatures indicates an expected call of AvailableFeatures. func (mr *MockversionCompatibilityCheckerMockRecorder) AvailableFeatures() *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "AvailableFeatures", reflect.TypeOf((*MockversionCompatibilityChecker)(nil).AvailableFeatures)) } // Version mocks base method. func (m *MockversionCompatibilityChecker) Version() (string, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "Version") ret0, _ := ret[0].(string) ret1, _ := ret[1].(error) return ret0, ret1 } // Version indicates an expected call of Version. func (mr *MockversionCompatibilityCheckerMockRecorder) Version() *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Version", reflect.TypeOf((*MockversionCompatibilityChecker)(nil).Version)) } // MockversionGetter is a mock of versionGetter interface. type MockversionGetter struct { ctrl *gomock.Controller recorder *MockversionGetterMockRecorder } // MockversionGetterMockRecorder is the mock recorder for MockversionGetter. type MockversionGetterMockRecorder struct { mock *MockversionGetter } // NewMockversionGetter creates a new mock instance. func NewMockversionGetter(ctrl *gomock.Controller) *MockversionGetter { mock := &MockversionGetter{ctrl: ctrl} mock.recorder = &MockversionGetterMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockversionGetter) EXPECT() *MockversionGetterMockRecorder { return m.recorder } // Version mocks base method. func (m *MockversionGetter) Version() (string, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "Version") ret0, _ := ret[0].(string) ret1, _ := ret[1].(error) return ret0, ret1 } // Version indicates an expected call of Version. func (mr *MockversionGetterMockRecorder) Version() *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Version", reflect.TypeOf((*MockversionGetter)(nil).Version)) } // MockappUpgrader is a mock of appUpgrader interface. type MockappUpgrader struct { ctrl *gomock.Controller recorder *MockappUpgraderMockRecorder } // MockappUpgraderMockRecorder is the mock recorder for MockappUpgrader. type MockappUpgraderMockRecorder struct { mock *MockappUpgrader } // NewMockappUpgrader creates a new mock instance. func NewMockappUpgrader(ctrl *gomock.Controller) *MockappUpgrader { mock := &MockappUpgrader{ctrl: ctrl} mock.recorder = &MockappUpgraderMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockappUpgrader) EXPECT() *MockappUpgraderMockRecorder { return m.recorder } // UpgradeApplication mocks base method. func (m *MockappUpgrader) UpgradeApplication(in *deploy0.CreateAppInput) error { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "UpgradeApplication", in) ret0, _ := ret[0].(error) return ret0 } // UpgradeApplication indicates an expected call of UpgradeApplication. func (mr *MockappUpgraderMockRecorder) UpgradeApplication(in interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "UpgradeApplication", reflect.TypeOf((*MockappUpgrader)(nil).UpgradeApplication), in) } // MockpipelineGetter is a mock of pipelineGetter interface. type MockpipelineGetter struct { ctrl *gomock.Controller recorder *MockpipelineGetterMockRecorder } // MockpipelineGetterMockRecorder is the mock recorder for MockpipelineGetter. type MockpipelineGetterMockRecorder struct { mock *MockpipelineGetter } // NewMockpipelineGetter creates a new mock instance. func NewMockpipelineGetter(ctrl *gomock.Controller) *MockpipelineGetter { mock := &MockpipelineGetter{ctrl: ctrl} mock.recorder = &MockpipelineGetterMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockpipelineGetter) EXPECT() *MockpipelineGetterMockRecorder { return m.recorder } // GetPipeline mocks base method. func (m *MockpipelineGetter) GetPipeline(pipelineName string) (*codepipeline.Pipeline, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "GetPipeline", pipelineName) ret0, _ := ret[0].(*codepipeline.Pipeline) ret1, _ := ret[1].(error) return ret0, ret1 } // GetPipeline indicates an expected call of GetPipeline. func (mr *MockpipelineGetterMockRecorder) GetPipeline(pipelineName interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetPipeline", reflect.TypeOf((*MockpipelineGetter)(nil).GetPipeline), pipelineName) } // MockdeployedPipelineLister is a mock of deployedPipelineLister interface. type MockdeployedPipelineLister struct { ctrl *gomock.Controller recorder *MockdeployedPipelineListerMockRecorder } // MockdeployedPipelineListerMockRecorder is the mock recorder for MockdeployedPipelineLister. type MockdeployedPipelineListerMockRecorder struct { mock *MockdeployedPipelineLister } // NewMockdeployedPipelineLister creates a new mock instance. func NewMockdeployedPipelineLister(ctrl *gomock.Controller) *MockdeployedPipelineLister { mock := &MockdeployedPipelineLister{ctrl: ctrl} mock.recorder = &MockdeployedPipelineListerMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockdeployedPipelineLister) EXPECT() *MockdeployedPipelineListerMockRecorder { return m.recorder } // ListDeployedPipelines mocks base method. func (m *MockdeployedPipelineLister) ListDeployedPipelines(appName string) ([]deploy0.Pipeline, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "ListDeployedPipelines", appName) ret0, _ := ret[0].([]deploy0.Pipeline) ret1, _ := ret[1].(error) return ret0, ret1 } // ListDeployedPipelines indicates an expected call of ListDeployedPipelines. func (mr *MockdeployedPipelineListerMockRecorder) ListDeployedPipelines(appName interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ListDeployedPipelines", reflect.TypeOf((*MockdeployedPipelineLister)(nil).ListDeployedPipelines), appName) } // Mockexecutor is a mock of executor interface. type Mockexecutor struct { ctrl *gomock.Controller recorder *MockexecutorMockRecorder } // MockexecutorMockRecorder is the mock recorder for Mockexecutor. type MockexecutorMockRecorder struct { mock *Mockexecutor } // NewMockexecutor creates a new mock instance. func NewMockexecutor(ctrl *gomock.Controller) *Mockexecutor { mock := &Mockexecutor{ctrl: ctrl} mock.recorder = &MockexecutorMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *Mockexecutor) EXPECT() *MockexecutorMockRecorder { return m.recorder } // Execute mocks base method. func (m *Mockexecutor) Execute() error { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "Execute") ret0, _ := ret[0].(error) return ret0 } // Execute indicates an expected call of Execute. func (mr *MockexecutorMockRecorder) Execute() *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Execute", reflect.TypeOf((*Mockexecutor)(nil).Execute)) } // MockexecuteAsker is a mock of executeAsker interface. type MockexecuteAsker struct { ctrl *gomock.Controller recorder *MockexecuteAskerMockRecorder } // MockexecuteAskerMockRecorder is the mock recorder for MockexecuteAsker. type MockexecuteAskerMockRecorder struct { mock *MockexecuteAsker } // NewMockexecuteAsker creates a new mock instance. func NewMockexecuteAsker(ctrl *gomock.Controller) *MockexecuteAsker { mock := &MockexecuteAsker{ctrl: ctrl} mock.recorder = &MockexecuteAskerMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockexecuteAsker) EXPECT() *MockexecuteAskerMockRecorder { return m.recorder } // Ask mocks base method. func (m *MockexecuteAsker) Ask() error { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "Ask") ret0, _ := ret[0].(error) return ret0 } // Ask indicates an expected call of Ask. func (mr *MockexecuteAskerMockRecorder) Ask() *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Ask", reflect.TypeOf((*MockexecuteAsker)(nil).Ask)) } // Execute mocks base method. func (m *MockexecuteAsker) Execute() error { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "Execute") ret0, _ := ret[0].(error) return ret0 } // Execute indicates an expected call of Execute. func (mr *MockexecuteAskerMockRecorder) Execute() *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Execute", reflect.TypeOf((*MockexecuteAsker)(nil).Execute)) } // MockappSelector is a mock of appSelector interface. type MockappSelector struct { ctrl *gomock.Controller recorder *MockappSelectorMockRecorder } // MockappSelectorMockRecorder is the mock recorder for MockappSelector. type MockappSelectorMockRecorder struct { mock *MockappSelector } // NewMockappSelector creates a new mock instance. func NewMockappSelector(ctrl *gomock.Controller) *MockappSelector { mock := &MockappSelector{ctrl: ctrl} mock.recorder = &MockappSelectorMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockappSelector) EXPECT() *MockappSelectorMockRecorder { return m.recorder } // Application mocks base method. func (m *MockappSelector) Application(prompt, help string, additionalOpts ...string) (string, error) { m.ctrl.T.Helper() varargs := []interface{}{prompt, help} for _, a := range additionalOpts { varargs = append(varargs, a) } ret := m.ctrl.Call(m, "Application", varargs...) ret0, _ := ret[0].(string) ret1, _ := ret[1].(error) return ret0, ret1 } // Application indicates an expected call of Application. func (mr *MockappSelectorMockRecorder) Application(prompt, help interface{}, additionalOpts ...interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() varargs := append([]interface{}{prompt, help}, additionalOpts...) return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Application", reflect.TypeOf((*MockappSelector)(nil).Application), varargs...) } // MockappEnvSelector is a mock of appEnvSelector interface. type MockappEnvSelector struct { ctrl *gomock.Controller recorder *MockappEnvSelectorMockRecorder } // MockappEnvSelectorMockRecorder is the mock recorder for MockappEnvSelector. type MockappEnvSelectorMockRecorder struct { mock *MockappEnvSelector } // NewMockappEnvSelector creates a new mock instance. func NewMockappEnvSelector(ctrl *gomock.Controller) *MockappEnvSelector { mock := &MockappEnvSelector{ctrl: ctrl} mock.recorder = &MockappEnvSelectorMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockappEnvSelector) EXPECT() *MockappEnvSelectorMockRecorder { return m.recorder } // Application mocks base method. func (m *MockappEnvSelector) Application(prompt, help string, additionalOpts ...string) (string, error) { m.ctrl.T.Helper() varargs := []interface{}{prompt, help} for _, a := range additionalOpts { varargs = append(varargs, a) } ret := m.ctrl.Call(m, "Application", varargs...) ret0, _ := ret[0].(string) ret1, _ := ret[1].(error) return ret0, ret1 } // Application indicates an expected call of Application. func (mr *MockappEnvSelectorMockRecorder) Application(prompt, help interface{}, additionalOpts ...interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() varargs := append([]interface{}{prompt, help}, additionalOpts...) return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Application", reflect.TypeOf((*MockappEnvSelector)(nil).Application), varargs...) } // Environment mocks base method. func (m *MockappEnvSelector) Environment(prompt, help, app string, additionalOpts ...string) (string, error) { m.ctrl.T.Helper() varargs := []interface{}{prompt, help, app} for _, a := range additionalOpts { varargs = append(varargs, a) } ret := m.ctrl.Call(m, "Environment", varargs...) ret0, _ := ret[0].(string) ret1, _ := ret[1].(error) return ret0, ret1 } // Environment indicates an expected call of Environment. func (mr *MockappEnvSelectorMockRecorder) Environment(prompt, help, app interface{}, additionalOpts ...interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() varargs := append([]interface{}{prompt, help, app}, additionalOpts...) return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Environment", reflect.TypeOf((*MockappEnvSelector)(nil).Environment), varargs...) } // MockcfnSelector is a mock of cfnSelector interface. type MockcfnSelector struct { ctrl *gomock.Controller recorder *MockcfnSelectorMockRecorder } // MockcfnSelectorMockRecorder is the mock recorder for MockcfnSelector. type MockcfnSelectorMockRecorder struct { mock *MockcfnSelector } // NewMockcfnSelector creates a new mock instance. func NewMockcfnSelector(ctrl *gomock.Controller) *MockcfnSelector { mock := &MockcfnSelector{ctrl: ctrl} mock.recorder = &MockcfnSelectorMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockcfnSelector) EXPECT() *MockcfnSelectorMockRecorder { return m.recorder } // Resources mocks base method. func (m *MockcfnSelector) Resources(msg, finalMsg, help, body string) ([]template.CFNResource, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "Resources", msg, finalMsg, help, body) ret0, _ := ret[0].([]template.CFNResource) ret1, _ := ret[1].(error) return ret0, ret1 } // Resources indicates an expected call of Resources. func (mr *MockcfnSelectorMockRecorder) Resources(msg, finalMsg, help, body interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Resources", reflect.TypeOf((*MockcfnSelector)(nil).Resources), msg, finalMsg, help, body) } // MockconfigSelector is a mock of configSelector interface. type MockconfigSelector struct { ctrl *gomock.Controller recorder *MockconfigSelectorMockRecorder } // MockconfigSelectorMockRecorder is the mock recorder for MockconfigSelector. type MockconfigSelectorMockRecorder struct { mock *MockconfigSelector } // NewMockconfigSelector creates a new mock instance. func NewMockconfigSelector(ctrl *gomock.Controller) *MockconfigSelector { mock := &MockconfigSelector{ctrl: ctrl} mock.recorder = &MockconfigSelectorMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockconfigSelector) EXPECT() *MockconfigSelectorMockRecorder { return m.recorder } // Application mocks base method. func (m *MockconfigSelector) Application(prompt, help string, additionalOpts ...string) (string, error) { m.ctrl.T.Helper() varargs := []interface{}{prompt, help} for _, a := range additionalOpts { varargs = append(varargs, a) } ret := m.ctrl.Call(m, "Application", varargs...) ret0, _ := ret[0].(string) ret1, _ := ret[1].(error) return ret0, ret1 } // Application indicates an expected call of Application. func (mr *MockconfigSelectorMockRecorder) Application(prompt, help interface{}, additionalOpts ...interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() varargs := append([]interface{}{prompt, help}, additionalOpts...) return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Application", reflect.TypeOf((*MockconfigSelector)(nil).Application), varargs...) } // Environment mocks base method. func (m *MockconfigSelector) Environment(prompt, help, app string, additionalOpts ...string) (string, error) { m.ctrl.T.Helper() varargs := []interface{}{prompt, help, app} for _, a := range additionalOpts { varargs = append(varargs, a) } ret := m.ctrl.Call(m, "Environment", varargs...) ret0, _ := ret[0].(string) ret1, _ := ret[1].(error) return ret0, ret1 } // Environment indicates an expected call of Environment. func (mr *MockconfigSelectorMockRecorder) Environment(prompt, help, app interface{}, additionalOpts ...interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() varargs := append([]interface{}{prompt, help, app}, additionalOpts...) return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Environment", reflect.TypeOf((*MockconfigSelector)(nil).Environment), varargs...) } // Job mocks base method. func (m *MockconfigSelector) Job(prompt, help, app string) (string, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "Job", prompt, help, app) ret0, _ := ret[0].(string) ret1, _ := ret[1].(error) return ret0, ret1 } // Job indicates an expected call of Job. func (mr *MockconfigSelectorMockRecorder) Job(prompt, help, app interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Job", reflect.TypeOf((*MockconfigSelector)(nil).Job), prompt, help, app) } // Service mocks base method. func (m *MockconfigSelector) Service(prompt, help, app string) (string, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "Service", prompt, help, app) ret0, _ := ret[0].(string) ret1, _ := ret[1].(error) return ret0, ret1 } // Service indicates an expected call of Service. func (mr *MockconfigSelectorMockRecorder) Service(prompt, help, app interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Service", reflect.TypeOf((*MockconfigSelector)(nil).Service), prompt, help, app) } // Workload mocks base method. func (m *MockconfigSelector) Workload(prompt, help, app string) (string, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "Workload", prompt, help, app) ret0, _ := ret[0].(string) ret1, _ := ret[1].(error) return ret0, ret1 } // Workload indicates an expected call of Workload. func (mr *MockconfigSelectorMockRecorder) Workload(prompt, help, app interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Workload", reflect.TypeOf((*MockconfigSelector)(nil).Workload), prompt, help, app) } // MockdeploySelector is a mock of deploySelector interface. type MockdeploySelector struct { ctrl *gomock.Controller recorder *MockdeploySelectorMockRecorder } // MockdeploySelectorMockRecorder is the mock recorder for MockdeploySelector. type MockdeploySelectorMockRecorder struct { mock *MockdeploySelector } // NewMockdeploySelector creates a new mock instance. func NewMockdeploySelector(ctrl *gomock.Controller) *MockdeploySelector { mock := &MockdeploySelector{ctrl: ctrl} mock.recorder = &MockdeploySelectorMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockdeploySelector) EXPECT() *MockdeploySelectorMockRecorder { return m.recorder } // Application mocks base method. func (m *MockdeploySelector) Application(prompt, help string, additionalOpts ...string) (string, error) { m.ctrl.T.Helper() varargs := []interface{}{prompt, help} for _, a := range additionalOpts { varargs = append(varargs, a) } ret := m.ctrl.Call(m, "Application", varargs...) ret0, _ := ret[0].(string) ret1, _ := ret[1].(error) return ret0, ret1 } // Application indicates an expected call of Application. func (mr *MockdeploySelectorMockRecorder) Application(prompt, help interface{}, additionalOpts ...interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() varargs := append([]interface{}{prompt, help}, additionalOpts...) return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Application", reflect.TypeOf((*MockdeploySelector)(nil).Application), varargs...) } // DeployedJob mocks base method. func (m *MockdeploySelector) DeployedJob(prompt, help, app string, opts ...selector.GetDeployedWorkloadOpts) (*selector.DeployedJob, error) { m.ctrl.T.Helper() varargs := []interface{}{prompt, help, app} for _, a := range opts { varargs = append(varargs, a) } ret := m.ctrl.Call(m, "DeployedJob", varargs...) ret0, _ := ret[0].(*selector.DeployedJob) ret1, _ := ret[1].(error) return ret0, ret1 } // DeployedJob indicates an expected call of DeployedJob. func (mr *MockdeploySelectorMockRecorder) DeployedJob(prompt, help, app interface{}, opts ...interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() varargs := append([]interface{}{prompt, help, app}, opts...) return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DeployedJob", reflect.TypeOf((*MockdeploySelector)(nil).DeployedJob), varargs...) } // DeployedService mocks base method. func (m *MockdeploySelector) DeployedService(prompt, help, app string, opts ...selector.GetDeployedWorkloadOpts) (*selector.DeployedService, error) { m.ctrl.T.Helper() varargs := []interface{}{prompt, help, app} for _, a := range opts { varargs = append(varargs, a) } ret := m.ctrl.Call(m, "DeployedService", varargs...) ret0, _ := ret[0].(*selector.DeployedService) ret1, _ := ret[1].(error) return ret0, ret1 } // DeployedService indicates an expected call of DeployedService. func (mr *MockdeploySelectorMockRecorder) DeployedService(prompt, help, app interface{}, opts ...interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() varargs := append([]interface{}{prompt, help, app}, opts...) return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DeployedService", reflect.TypeOf((*MockdeploySelector)(nil).DeployedService), varargs...) } // MockpipelineEnvSelector is a mock of pipelineEnvSelector interface. type MockpipelineEnvSelector struct { ctrl *gomock.Controller recorder *MockpipelineEnvSelectorMockRecorder } // MockpipelineEnvSelectorMockRecorder is the mock recorder for MockpipelineEnvSelector. type MockpipelineEnvSelectorMockRecorder struct { mock *MockpipelineEnvSelector } // NewMockpipelineEnvSelector creates a new mock instance. func NewMockpipelineEnvSelector(ctrl *gomock.Controller) *MockpipelineEnvSelector { mock := &MockpipelineEnvSelector{ctrl: ctrl} mock.recorder = &MockpipelineEnvSelectorMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockpipelineEnvSelector) EXPECT() *MockpipelineEnvSelectorMockRecorder { return m.recorder } // Environments mocks base method. func (m *MockpipelineEnvSelector) Environments(prompt, help, app string, finalMsgFunc func(int) prompt.PromptConfig) ([]string, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "Environments", prompt, help, app, finalMsgFunc) ret0, _ := ret[0].([]string) ret1, _ := ret[1].(error) return ret0, ret1 } // Environments indicates an expected call of Environments. func (mr *MockpipelineEnvSelectorMockRecorder) Environments(prompt, help, app, finalMsgFunc interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Environments", reflect.TypeOf((*MockpipelineEnvSelector)(nil).Environments), prompt, help, app, finalMsgFunc) } // MockwsPipelineSelector is a mock of wsPipelineSelector interface. type MockwsPipelineSelector struct { ctrl *gomock.Controller recorder *MockwsPipelineSelectorMockRecorder } // MockwsPipelineSelectorMockRecorder is the mock recorder for MockwsPipelineSelector. type MockwsPipelineSelectorMockRecorder struct { mock *MockwsPipelineSelector } // NewMockwsPipelineSelector creates a new mock instance. func NewMockwsPipelineSelector(ctrl *gomock.Controller) *MockwsPipelineSelector { mock := &MockwsPipelineSelector{ctrl: ctrl} mock.recorder = &MockwsPipelineSelectorMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockwsPipelineSelector) EXPECT() *MockwsPipelineSelectorMockRecorder { return m.recorder } // WsPipeline mocks base method. func (m *MockwsPipelineSelector) WsPipeline(prompt, help string) (*workspace.PipelineManifest, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "WsPipeline", prompt, help) ret0, _ := ret[0].(*workspace.PipelineManifest) ret1, _ := ret[1].(error) return ret0, ret1 } // WsPipeline indicates an expected call of WsPipeline. func (mr *MockwsPipelineSelectorMockRecorder) WsPipeline(prompt, help interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "WsPipeline", reflect.TypeOf((*MockwsPipelineSelector)(nil).WsPipeline), prompt, help) } // MockwsEnvironmentSelector is a mock of wsEnvironmentSelector interface. type MockwsEnvironmentSelector struct { ctrl *gomock.Controller recorder *MockwsEnvironmentSelectorMockRecorder } // MockwsEnvironmentSelectorMockRecorder is the mock recorder for MockwsEnvironmentSelector. type MockwsEnvironmentSelectorMockRecorder struct { mock *MockwsEnvironmentSelector } // NewMockwsEnvironmentSelector creates a new mock instance. func NewMockwsEnvironmentSelector(ctrl *gomock.Controller) *MockwsEnvironmentSelector { mock := &MockwsEnvironmentSelector{ctrl: ctrl} mock.recorder = &MockwsEnvironmentSelectorMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockwsEnvironmentSelector) EXPECT() *MockwsEnvironmentSelectorMockRecorder { return m.recorder } // LocalEnvironment mocks base method. func (m *MockwsEnvironmentSelector) LocalEnvironment(msg, help string) (string, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "LocalEnvironment", msg, help) ret0, _ := ret[0].(string) ret1, _ := ret[1].(error) return ret0, ret1 } // LocalEnvironment indicates an expected call of LocalEnvironment. func (mr *MockwsEnvironmentSelectorMockRecorder) LocalEnvironment(msg, help interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "LocalEnvironment", reflect.TypeOf((*MockwsEnvironmentSelector)(nil).LocalEnvironment), msg, help) } // MockcodePipelineSelector is a mock of codePipelineSelector interface. type MockcodePipelineSelector struct { ctrl *gomock.Controller recorder *MockcodePipelineSelectorMockRecorder } // MockcodePipelineSelectorMockRecorder is the mock recorder for MockcodePipelineSelector. type MockcodePipelineSelectorMockRecorder struct { mock *MockcodePipelineSelector } // NewMockcodePipelineSelector creates a new mock instance. func NewMockcodePipelineSelector(ctrl *gomock.Controller) *MockcodePipelineSelector { mock := &MockcodePipelineSelector{ctrl: ctrl} mock.recorder = &MockcodePipelineSelectorMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockcodePipelineSelector) EXPECT() *MockcodePipelineSelectorMockRecorder { return m.recorder } // Application mocks base method. func (m *MockcodePipelineSelector) Application(prompt, help string, additionalOpts ...string) (string, error) { m.ctrl.T.Helper() varargs := []interface{}{prompt, help} for _, a := range additionalOpts { varargs = append(varargs, a) } ret := m.ctrl.Call(m, "Application", varargs...) ret0, _ := ret[0].(string) ret1, _ := ret[1].(error) return ret0, ret1 } // Application indicates an expected call of Application. func (mr *MockcodePipelineSelectorMockRecorder) Application(prompt, help interface{}, additionalOpts ...interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() varargs := append([]interface{}{prompt, help}, additionalOpts...) return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Application", reflect.TypeOf((*MockcodePipelineSelector)(nil).Application), varargs...) } // DeployedPipeline mocks base method. func (m *MockcodePipelineSelector) DeployedPipeline(prompt, help, app string) (deploy0.Pipeline, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "DeployedPipeline", prompt, help, app) ret0, _ := ret[0].(deploy0.Pipeline) ret1, _ := ret[1].(error) return ret0, ret1 } // DeployedPipeline indicates an expected call of DeployedPipeline. func (mr *MockcodePipelineSelectorMockRecorder) DeployedPipeline(prompt, help, app interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DeployedPipeline", reflect.TypeOf((*MockcodePipelineSelector)(nil).DeployedPipeline), prompt, help, app) } // MockwsSelector is a mock of wsSelector interface. type MockwsSelector struct { ctrl *gomock.Controller recorder *MockwsSelectorMockRecorder } // MockwsSelectorMockRecorder is the mock recorder for MockwsSelector. type MockwsSelectorMockRecorder struct { mock *MockwsSelector } // NewMockwsSelector creates a new mock instance. func NewMockwsSelector(ctrl *gomock.Controller) *MockwsSelector { mock := &MockwsSelector{ctrl: ctrl} mock.recorder = &MockwsSelectorMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockwsSelector) EXPECT() *MockwsSelectorMockRecorder { return m.recorder } // Application mocks base method. func (m *MockwsSelector) Application(prompt, help string, additionalOpts ...string) (string, error) { m.ctrl.T.Helper() varargs := []interface{}{prompt, help} for _, a := range additionalOpts { varargs = append(varargs, a) } ret := m.ctrl.Call(m, "Application", varargs...) ret0, _ := ret[0].(string) ret1, _ := ret[1].(error) return ret0, ret1 } // Application indicates an expected call of Application. func (mr *MockwsSelectorMockRecorder) Application(prompt, help interface{}, additionalOpts ...interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() varargs := append([]interface{}{prompt, help}, additionalOpts...) return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Application", reflect.TypeOf((*MockwsSelector)(nil).Application), varargs...) } // Environment mocks base method. func (m *MockwsSelector) Environment(prompt, help, app string, additionalOpts ...string) (string, error) { m.ctrl.T.Helper() varargs := []interface{}{prompt, help, app} for _, a := range additionalOpts { varargs = append(varargs, a) } ret := m.ctrl.Call(m, "Environment", varargs...) ret0, _ := ret[0].(string) ret1, _ := ret[1].(error) return ret0, ret1 } // Environment indicates an expected call of Environment. func (mr *MockwsSelectorMockRecorder) Environment(prompt, help, app interface{}, additionalOpts ...interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() varargs := append([]interface{}{prompt, help, app}, additionalOpts...) return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Environment", reflect.TypeOf((*MockwsSelector)(nil).Environment), varargs...) } // Job mocks base method. func (m *MockwsSelector) Job(prompt, help string) (string, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "Job", prompt, help) ret0, _ := ret[0].(string) ret1, _ := ret[1].(error) return ret0, ret1 } // Job indicates an expected call of Job. func (mr *MockwsSelectorMockRecorder) Job(prompt, help interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Job", reflect.TypeOf((*MockwsSelector)(nil).Job), prompt, help) } // Service mocks base method. func (m *MockwsSelector) Service(prompt, help string) (string, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "Service", prompt, help) ret0, _ := ret[0].(string) ret1, _ := ret[1].(error) return ret0, ret1 } // Service indicates an expected call of Service. func (mr *MockwsSelectorMockRecorder) Service(prompt, help interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Service", reflect.TypeOf((*MockwsSelector)(nil).Service), prompt, help) } // Workload mocks base method. func (m *MockwsSelector) Workload(msg, help string) (string, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "Workload", msg, help) ret0, _ := ret[0].(string) ret1, _ := ret[1].(error) return ret0, ret1 } // Workload indicates an expected call of Workload. func (mr *MockwsSelectorMockRecorder) Workload(msg, help interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Workload", reflect.TypeOf((*MockwsSelector)(nil).Workload), msg, help) } // MockstaticSourceSelector is a mock of staticSourceSelector interface. type MockstaticSourceSelector struct { ctrl *gomock.Controller recorder *MockstaticSourceSelectorMockRecorder } // MockstaticSourceSelectorMockRecorder is the mock recorder for MockstaticSourceSelector. type MockstaticSourceSelectorMockRecorder struct { mock *MockstaticSourceSelector } // NewMockstaticSourceSelector creates a new mock instance. func NewMockstaticSourceSelector(ctrl *gomock.Controller) *MockstaticSourceSelector { mock := &MockstaticSourceSelector{ctrl: ctrl} mock.recorder = &MockstaticSourceSelectorMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockstaticSourceSelector) EXPECT() *MockstaticSourceSelectorMockRecorder { return m.recorder } // StaticSources mocks base method. func (m *MockstaticSourceSelector) StaticSources(selPrompt, selHelp, anotherPathPrompt, anotherPathHelp string, pathValidator prompt.ValidatorFunc) ([]string, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "StaticSources", selPrompt, selHelp, anotherPathPrompt, anotherPathHelp, pathValidator) ret0, _ := ret[0].([]string) ret1, _ := ret[1].(error) return ret0, ret1 } // StaticSources indicates an expected call of StaticSources. func (mr *MockstaticSourceSelectorMockRecorder) StaticSources(selPrompt, selHelp, anotherPathPrompt, anotherPathHelp, pathValidator interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "StaticSources", reflect.TypeOf((*MockstaticSourceSelector)(nil).StaticSources), selPrompt, selHelp, anotherPathPrompt, anotherPathHelp, pathValidator) } // MockscheduleSelector is a mock of scheduleSelector interface. type MockscheduleSelector struct { ctrl *gomock.Controller recorder *MockscheduleSelectorMockRecorder } // MockscheduleSelectorMockRecorder is the mock recorder for MockscheduleSelector. type MockscheduleSelectorMockRecorder struct { mock *MockscheduleSelector } // NewMockscheduleSelector creates a new mock instance. func NewMockscheduleSelector(ctrl *gomock.Controller) *MockscheduleSelector { mock := &MockscheduleSelector{ctrl: ctrl} mock.recorder = &MockscheduleSelectorMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockscheduleSelector) EXPECT() *MockscheduleSelectorMockRecorder { return m.recorder } // Schedule mocks base method. func (m *MockscheduleSelector) Schedule(scheduleTypePrompt, scheduleTypeHelp string, scheduleValidator, rateValidator prompt.ValidatorFunc) (string, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "Schedule", scheduleTypePrompt, scheduleTypeHelp, scheduleValidator, rateValidator) ret0, _ := ret[0].(string) ret1, _ := ret[1].(error) return ret0, ret1 } // Schedule indicates an expected call of Schedule. func (mr *MockscheduleSelectorMockRecorder) Schedule(scheduleTypePrompt, scheduleTypeHelp, scheduleValidator, rateValidator interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Schedule", reflect.TypeOf((*MockscheduleSelector)(nil).Schedule), scheduleTypePrompt, scheduleTypeHelp, scheduleValidator, rateValidator) } // MockcfTaskSelector is a mock of cfTaskSelector interface. type MockcfTaskSelector struct { ctrl *gomock.Controller recorder *MockcfTaskSelectorMockRecorder } // MockcfTaskSelectorMockRecorder is the mock recorder for MockcfTaskSelector. type MockcfTaskSelectorMockRecorder struct { mock *MockcfTaskSelector } // NewMockcfTaskSelector creates a new mock instance. func NewMockcfTaskSelector(ctrl *gomock.Controller) *MockcfTaskSelector { mock := &MockcfTaskSelector{ctrl: ctrl} mock.recorder = &MockcfTaskSelectorMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockcfTaskSelector) EXPECT() *MockcfTaskSelectorMockRecorder { return m.recorder } // Task mocks base method. func (m *MockcfTaskSelector) Task(prompt, help string, opts ...selector.GetDeployedTaskOpts) (string, error) { m.ctrl.T.Helper() varargs := []interface{}{prompt, help} for _, a := range opts { varargs = append(varargs, a) } ret := m.ctrl.Call(m, "Task", varargs...) ret0, _ := ret[0].(string) ret1, _ := ret[1].(error) return ret0, ret1 } // Task indicates an expected call of Task. func (mr *MockcfTaskSelectorMockRecorder) Task(prompt, help interface{}, opts ...interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() varargs := append([]interface{}{prompt, help}, opts...) return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Task", reflect.TypeOf((*MockcfTaskSelector)(nil).Task), varargs...) } // MockdockerfileSelector is a mock of dockerfileSelector interface. type MockdockerfileSelector struct { ctrl *gomock.Controller recorder *MockdockerfileSelectorMockRecorder } // MockdockerfileSelectorMockRecorder is the mock recorder for MockdockerfileSelector. type MockdockerfileSelectorMockRecorder struct { mock *MockdockerfileSelector } // NewMockdockerfileSelector creates a new mock instance. func NewMockdockerfileSelector(ctrl *gomock.Controller) *MockdockerfileSelector { mock := &MockdockerfileSelector{ctrl: ctrl} mock.recorder = &MockdockerfileSelectorMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockdockerfileSelector) EXPECT() *MockdockerfileSelectorMockRecorder { return m.recorder } // Dockerfile mocks base method. func (m *MockdockerfileSelector) Dockerfile(selPrompt, notFoundPrompt, selHelp, notFoundHelp string, pv prompt.ValidatorFunc) (string, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "Dockerfile", selPrompt, notFoundPrompt, selHelp, notFoundHelp, pv) ret0, _ := ret[0].(string) ret1, _ := ret[1].(error) return ret0, ret1 } // Dockerfile indicates an expected call of Dockerfile. func (mr *MockdockerfileSelectorMockRecorder) Dockerfile(selPrompt, notFoundPrompt, selHelp, notFoundHelp, pv interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Dockerfile", reflect.TypeOf((*MockdockerfileSelector)(nil).Dockerfile), selPrompt, notFoundPrompt, selHelp, notFoundHelp, pv) } // MocktopicSelector is a mock of topicSelector interface. type MocktopicSelector struct { ctrl *gomock.Controller recorder *MocktopicSelectorMockRecorder } // MocktopicSelectorMockRecorder is the mock recorder for MocktopicSelector. type MocktopicSelectorMockRecorder struct { mock *MocktopicSelector } // NewMocktopicSelector creates a new mock instance. func NewMocktopicSelector(ctrl *gomock.Controller) *MocktopicSelector { mock := &MocktopicSelector{ctrl: ctrl} mock.recorder = &MocktopicSelectorMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MocktopicSelector) EXPECT() *MocktopicSelectorMockRecorder { return m.recorder } // Topics mocks base method. func (m *MocktopicSelector) Topics(prompt, help, app string) ([]deploy0.Topic, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "Topics", prompt, help, app) ret0, _ := ret[0].([]deploy0.Topic) ret1, _ := ret[1].(error) return ret0, ret1 } // Topics indicates an expected call of Topics. func (mr *MocktopicSelectorMockRecorder) Topics(prompt, help, app interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Topics", reflect.TypeOf((*MocktopicSelector)(nil).Topics), prompt, help, app) } // Mockec2Selector is a mock of ec2Selector interface. type Mockec2Selector struct { ctrl *gomock.Controller recorder *Mockec2SelectorMockRecorder } // Mockec2SelectorMockRecorder is the mock recorder for Mockec2Selector. type Mockec2SelectorMockRecorder struct { mock *Mockec2Selector } // NewMockec2Selector creates a new mock instance. func NewMockec2Selector(ctrl *gomock.Controller) *Mockec2Selector { mock := &Mockec2Selector{ctrl: ctrl} mock.recorder = &Mockec2SelectorMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *Mockec2Selector) EXPECT() *Mockec2SelectorMockRecorder { return m.recorder } // Subnets mocks base method. func (m *Mockec2Selector) Subnets(input selector.SubnetsInput) ([]string, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "Subnets", input) ret0, _ := ret[0].([]string) ret1, _ := ret[1].(error) return ret0, ret1 } // Subnets indicates an expected call of Subnets. func (mr *Mockec2SelectorMockRecorder) Subnets(input interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Subnets", reflect.TypeOf((*Mockec2Selector)(nil).Subnets), input) } // VPC mocks base method. func (m *Mockec2Selector) VPC(prompt, help string) (string, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "VPC", prompt, help) ret0, _ := ret[0].(string) ret1, _ := ret[1].(error) return ret0, ret1 } // VPC indicates an expected call of VPC. func (mr *Mockec2SelectorMockRecorder) VPC(prompt, help interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "VPC", reflect.TypeOf((*Mockec2Selector)(nil).VPC), prompt, help) } // MockcredsSelector is a mock of credsSelector interface. type MockcredsSelector struct { ctrl *gomock.Controller recorder *MockcredsSelectorMockRecorder } // MockcredsSelectorMockRecorder is the mock recorder for MockcredsSelector. type MockcredsSelectorMockRecorder struct { mock *MockcredsSelector } // NewMockcredsSelector creates a new mock instance. func NewMockcredsSelector(ctrl *gomock.Controller) *MockcredsSelector { mock := &MockcredsSelector{ctrl: ctrl} mock.recorder = &MockcredsSelectorMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockcredsSelector) EXPECT() *MockcredsSelectorMockRecorder { return m.recorder } // Creds mocks base method. func (m *MockcredsSelector) Creds(prompt, help string) (*session.Session, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "Creds", prompt, help) ret0, _ := ret[0].(*session.Session) ret1, _ := ret[1].(error) return ret0, ret1 } // Creds indicates an expected call of Creds. func (mr *MockcredsSelectorMockRecorder) Creds(prompt, help interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Creds", reflect.TypeOf((*MockcredsSelector)(nil).Creds), prompt, help) } // Mockec2Client is a mock of ec2Client interface. type Mockec2Client struct { ctrl *gomock.Controller recorder *Mockec2ClientMockRecorder } // Mockec2ClientMockRecorder is the mock recorder for Mockec2Client. type Mockec2ClientMockRecorder struct { mock *Mockec2Client } // NewMockec2Client creates a new mock instance. func NewMockec2Client(ctrl *gomock.Controller) *Mockec2Client { mock := &Mockec2Client{ctrl: ctrl} mock.recorder = &Mockec2ClientMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *Mockec2Client) EXPECT() *Mockec2ClientMockRecorder { return m.recorder } // HasDNSSupport mocks base method. func (m *Mockec2Client) HasDNSSupport(vpcID string) (bool, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "HasDNSSupport", vpcID) ret0, _ := ret[0].(bool) ret1, _ := ret[1].(error) return ret0, ret1 } // HasDNSSupport indicates an expected call of HasDNSSupport. func (mr *Mockec2ClientMockRecorder) HasDNSSupport(vpcID interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "HasDNSSupport", reflect.TypeOf((*Mockec2Client)(nil).HasDNSSupport), vpcID) } // ListAZs mocks base method. func (m *Mockec2Client) ListAZs() ([]ec2.AZ, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "ListAZs") ret0, _ := ret[0].([]ec2.AZ) ret1, _ := ret[1].(error) return ret0, ret1 } // ListAZs indicates an expected call of ListAZs. func (mr *Mockec2ClientMockRecorder) ListAZs() *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ListAZs", reflect.TypeOf((*Mockec2Client)(nil).ListAZs)) } // MockserviceResumer is a mock of serviceResumer interface. type MockserviceResumer struct { ctrl *gomock.Controller recorder *MockserviceResumerMockRecorder } // MockserviceResumerMockRecorder is the mock recorder for MockserviceResumer. type MockserviceResumerMockRecorder struct { mock *MockserviceResumer } // NewMockserviceResumer creates a new mock instance. func NewMockserviceResumer(ctrl *gomock.Controller) *MockserviceResumer { mock := &MockserviceResumer{ctrl: ctrl} mock.recorder = &MockserviceResumerMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockserviceResumer) EXPECT() *MockserviceResumerMockRecorder { return m.recorder } // ResumeService mocks base method. func (m *MockserviceResumer) ResumeService(arg0 string) error { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "ResumeService", arg0) ret0, _ := ret[0].(error) return ret0 } // ResumeService indicates an expected call of ResumeService. func (mr *MockserviceResumerMockRecorder) ResumeService(arg0 interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ResumeService", reflect.TypeOf((*MockserviceResumer)(nil).ResumeService), arg0) } // MockjobInitializer is a mock of jobInitializer interface. type MockjobInitializer struct { ctrl *gomock.Controller recorder *MockjobInitializerMockRecorder } // MockjobInitializerMockRecorder is the mock recorder for MockjobInitializer. type MockjobInitializerMockRecorder struct { mock *MockjobInitializer } // NewMockjobInitializer creates a new mock instance. func NewMockjobInitializer(ctrl *gomock.Controller) *MockjobInitializer { mock := &MockjobInitializer{ctrl: ctrl} mock.recorder = &MockjobInitializerMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockjobInitializer) EXPECT() *MockjobInitializerMockRecorder { return m.recorder } // Job mocks base method. func (m *MockjobInitializer) Job(props *initialize.JobProps) (string, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "Job", props) ret0, _ := ret[0].(string) ret1, _ := ret[1].(error) return ret0, ret1 } // Job indicates an expected call of Job. func (mr *MockjobInitializerMockRecorder) Job(props interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Job", reflect.TypeOf((*MockjobInitializer)(nil).Job), props) } // MocksvcInitializer is a mock of svcInitializer interface. type MocksvcInitializer struct { ctrl *gomock.Controller recorder *MocksvcInitializerMockRecorder } // MocksvcInitializerMockRecorder is the mock recorder for MocksvcInitializer. type MocksvcInitializerMockRecorder struct { mock *MocksvcInitializer } // NewMocksvcInitializer creates a new mock instance. func NewMocksvcInitializer(ctrl *gomock.Controller) *MocksvcInitializer { mock := &MocksvcInitializer{ctrl: ctrl} mock.recorder = &MocksvcInitializerMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MocksvcInitializer) EXPECT() *MocksvcInitializerMockRecorder { return m.recorder } // Service mocks base method. func (m *MocksvcInitializer) Service(props *initialize.ServiceProps) (string, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "Service", props) ret0, _ := ret[0].(string) ret1, _ := ret[1].(error) return ret0, ret1 } // Service indicates an expected call of Service. func (mr *MocksvcInitializerMockRecorder) Service(props interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Service", reflect.TypeOf((*MocksvcInitializer)(nil).Service), props) } // MockroleDeleter is a mock of roleDeleter interface. type MockroleDeleter struct { ctrl *gomock.Controller recorder *MockroleDeleterMockRecorder } // MockroleDeleterMockRecorder is the mock recorder for MockroleDeleter. type MockroleDeleterMockRecorder struct { mock *MockroleDeleter } // NewMockroleDeleter creates a new mock instance. func NewMockroleDeleter(ctrl *gomock.Controller) *MockroleDeleter { mock := &MockroleDeleter{ctrl: ctrl} mock.recorder = &MockroleDeleterMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockroleDeleter) EXPECT() *MockroleDeleterMockRecorder { return m.recorder } // DeleteRole mocks base method. func (m *MockroleDeleter) DeleteRole(arg0 string) error { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "DeleteRole", arg0) ret0, _ := ret[0].(error) return ret0 } // DeleteRole indicates an expected call of DeleteRole. func (mr *MockroleDeleterMockRecorder) DeleteRole(arg0 interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DeleteRole", reflect.TypeOf((*MockroleDeleter)(nil).DeleteRole), arg0) } // MockpolicyLister is a mock of policyLister interface. type MockpolicyLister struct { ctrl *gomock.Controller recorder *MockpolicyListerMockRecorder } // MockpolicyListerMockRecorder is the mock recorder for MockpolicyLister. type MockpolicyListerMockRecorder struct { mock *MockpolicyLister } // NewMockpolicyLister creates a new mock instance. func NewMockpolicyLister(ctrl *gomock.Controller) *MockpolicyLister { mock := &MockpolicyLister{ctrl: ctrl} mock.recorder = &MockpolicyListerMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockpolicyLister) EXPECT() *MockpolicyListerMockRecorder { return m.recorder } // ListPolicyNames mocks base method. func (m *MockpolicyLister) ListPolicyNames() ([]string, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "ListPolicyNames") ret0, _ := ret[0].([]string) ret1, _ := ret[1].(error) return ret0, ret1 } // ListPolicyNames indicates an expected call of ListPolicyNames. func (mr *MockpolicyListerMockRecorder) ListPolicyNames() *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ListPolicyNames", reflect.TypeOf((*MockpolicyLister)(nil).ListPolicyNames)) } // MockserviceDescriber is a mock of serviceDescriber interface. type MockserviceDescriber struct { ctrl *gomock.Controller recorder *MockserviceDescriberMockRecorder } // MockserviceDescriberMockRecorder is the mock recorder for MockserviceDescriber. type MockserviceDescriberMockRecorder struct { mock *MockserviceDescriber } // NewMockserviceDescriber creates a new mock instance. func NewMockserviceDescriber(ctrl *gomock.Controller) *MockserviceDescriber { mock := &MockserviceDescriber{ctrl: ctrl} mock.recorder = &MockserviceDescriberMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockserviceDescriber) EXPECT() *MockserviceDescriberMockRecorder { return m.recorder } // DescribeService mocks base method. func (m *MockserviceDescriber) DescribeService(app, env, svc string) (*ecs0.ServiceDesc, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "DescribeService", app, env, svc) ret0, _ := ret[0].(*ecs0.ServiceDesc) ret1, _ := ret[1].(error) return ret0, ret1 } // DescribeService indicates an expected call of DescribeService. func (mr *MockserviceDescriberMockRecorder) DescribeService(app, env, svc interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DescribeService", reflect.TypeOf((*MockserviceDescriber)(nil).DescribeService), app, env, svc) } // MockapprunnerServiceDescriber is a mock of apprunnerServiceDescriber interface. type MockapprunnerServiceDescriber struct { ctrl *gomock.Controller recorder *MockapprunnerServiceDescriberMockRecorder } // MockapprunnerServiceDescriberMockRecorder is the mock recorder for MockapprunnerServiceDescriber. type MockapprunnerServiceDescriberMockRecorder struct { mock *MockapprunnerServiceDescriber } // NewMockapprunnerServiceDescriber creates a new mock instance. func NewMockapprunnerServiceDescriber(ctrl *gomock.Controller) *MockapprunnerServiceDescriber { mock := &MockapprunnerServiceDescriber{ctrl: ctrl} mock.recorder = &MockapprunnerServiceDescriberMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockapprunnerServiceDescriber) EXPECT() *MockapprunnerServiceDescriberMockRecorder { return m.recorder } // ServiceARN mocks base method. func (m *MockapprunnerServiceDescriber) ServiceARN(env string) (string, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "ServiceARN", env) ret0, _ := ret[0].(string) ret1, _ := ret[1].(error) return ret0, ret1 } // ServiceARN indicates an expected call of ServiceARN. func (mr *MockapprunnerServiceDescriberMockRecorder) ServiceARN(env interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ServiceARN", reflect.TypeOf((*MockapprunnerServiceDescriber)(nil).ServiceARN), env) } // MockecsCommandExecutor is a mock of ecsCommandExecutor interface. type MockecsCommandExecutor struct { ctrl *gomock.Controller recorder *MockecsCommandExecutorMockRecorder } // MockecsCommandExecutorMockRecorder is the mock recorder for MockecsCommandExecutor. type MockecsCommandExecutorMockRecorder struct { mock *MockecsCommandExecutor } // NewMockecsCommandExecutor creates a new mock instance. func NewMockecsCommandExecutor(ctrl *gomock.Controller) *MockecsCommandExecutor { mock := &MockecsCommandExecutor{ctrl: ctrl} mock.recorder = &MockecsCommandExecutorMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockecsCommandExecutor) EXPECT() *MockecsCommandExecutorMockRecorder { return m.recorder } // ExecuteCommand mocks base method. func (m *MockecsCommandExecutor) ExecuteCommand(in ecs.ExecuteCommandInput) error { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "ExecuteCommand", in) ret0, _ := ret[0].(error) return ret0 } // ExecuteCommand indicates an expected call of ExecuteCommand. func (mr *MockecsCommandExecutorMockRecorder) ExecuteCommand(in interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ExecuteCommand", reflect.TypeOf((*MockecsCommandExecutor)(nil).ExecuteCommand), in) } // MockssmPluginManager is a mock of ssmPluginManager interface. type MockssmPluginManager struct { ctrl *gomock.Controller recorder *MockssmPluginManagerMockRecorder } // MockssmPluginManagerMockRecorder is the mock recorder for MockssmPluginManager. type MockssmPluginManagerMockRecorder struct { mock *MockssmPluginManager } // NewMockssmPluginManager creates a new mock instance. func NewMockssmPluginManager(ctrl *gomock.Controller) *MockssmPluginManager { mock := &MockssmPluginManager{ctrl: ctrl} mock.recorder = &MockssmPluginManagerMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockssmPluginManager) EXPECT() *MockssmPluginManagerMockRecorder { return m.recorder } // InstallLatestBinary mocks base method. func (m *MockssmPluginManager) InstallLatestBinary() error { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "InstallLatestBinary") ret0, _ := ret[0].(error) return ret0 } // InstallLatestBinary indicates an expected call of InstallLatestBinary. func (mr *MockssmPluginManagerMockRecorder) InstallLatestBinary() *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "InstallLatestBinary", reflect.TypeOf((*MockssmPluginManager)(nil).InstallLatestBinary)) } // ValidateBinary mocks base method. func (m *MockssmPluginManager) ValidateBinary() error { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "ValidateBinary") ret0, _ := ret[0].(error) return ret0 } // ValidateBinary indicates an expected call of ValidateBinary. func (mr *MockssmPluginManagerMockRecorder) ValidateBinary() *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ValidateBinary", reflect.TypeOf((*MockssmPluginManager)(nil).ValidateBinary)) } // MocktaskStopper is a mock of taskStopper interface. type MocktaskStopper struct { ctrl *gomock.Controller recorder *MocktaskStopperMockRecorder } // MocktaskStopperMockRecorder is the mock recorder for MocktaskStopper. type MocktaskStopperMockRecorder struct { mock *MocktaskStopper } // NewMocktaskStopper creates a new mock instance. func NewMocktaskStopper(ctrl *gomock.Controller) *MocktaskStopper { mock := &MocktaskStopper{ctrl: ctrl} mock.recorder = &MocktaskStopperMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MocktaskStopper) EXPECT() *MocktaskStopperMockRecorder { return m.recorder } // StopDefaultClusterTasks mocks base method. func (m *MocktaskStopper) StopDefaultClusterTasks(familyName string) error { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "StopDefaultClusterTasks", familyName) ret0, _ := ret[0].(error) return ret0 } // StopDefaultClusterTasks indicates an expected call of StopDefaultClusterTasks. func (mr *MocktaskStopperMockRecorder) StopDefaultClusterTasks(familyName interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "StopDefaultClusterTasks", reflect.TypeOf((*MocktaskStopper)(nil).StopDefaultClusterTasks), familyName) } // StopOneOffTasks mocks base method. func (m *MocktaskStopper) StopOneOffTasks(app, env, family string) error { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "StopOneOffTasks", app, env, family) ret0, _ := ret[0].(error) return ret0 } // StopOneOffTasks indicates an expected call of StopOneOffTasks. func (mr *MocktaskStopperMockRecorder) StopOneOffTasks(app, env, family interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "StopOneOffTasks", reflect.TypeOf((*MocktaskStopper)(nil).StopOneOffTasks), app, env, family) } // StopWorkloadTasks mocks base method. func (m *MocktaskStopper) StopWorkloadTasks(app, env, workload string) error { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "StopWorkloadTasks", app, env, workload) ret0, _ := ret[0].(error) return ret0 } // StopWorkloadTasks indicates an expected call of StopWorkloadTasks. func (mr *MocktaskStopperMockRecorder) StopWorkloadTasks(app, env, workload interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "StopWorkloadTasks", reflect.TypeOf((*MocktaskStopper)(nil).StopWorkloadTasks), app, env, workload) } // MockserviceLinkedRoleCreator is a mock of serviceLinkedRoleCreator interface. type MockserviceLinkedRoleCreator struct { ctrl *gomock.Controller recorder *MockserviceLinkedRoleCreatorMockRecorder } // MockserviceLinkedRoleCreatorMockRecorder is the mock recorder for MockserviceLinkedRoleCreator. type MockserviceLinkedRoleCreatorMockRecorder struct { mock *MockserviceLinkedRoleCreator } // NewMockserviceLinkedRoleCreator creates a new mock instance. func NewMockserviceLinkedRoleCreator(ctrl *gomock.Controller) *MockserviceLinkedRoleCreator { mock := &MockserviceLinkedRoleCreator{ctrl: ctrl} mock.recorder = &MockserviceLinkedRoleCreatorMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockserviceLinkedRoleCreator) EXPECT() *MockserviceLinkedRoleCreatorMockRecorder { return m.recorder } // CreateECSServiceLinkedRole mocks base method. func (m *MockserviceLinkedRoleCreator) CreateECSServiceLinkedRole() error { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "CreateECSServiceLinkedRole") ret0, _ := ret[0].(error) return ret0 } // CreateECSServiceLinkedRole indicates an expected call of CreateECSServiceLinkedRole. func (mr *MockserviceLinkedRoleCreatorMockRecorder) CreateECSServiceLinkedRole() *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "CreateECSServiceLinkedRole", reflect.TypeOf((*MockserviceLinkedRoleCreator)(nil).CreateECSServiceLinkedRole)) } // MockroleTagsLister is a mock of roleTagsLister interface. type MockroleTagsLister struct { ctrl *gomock.Controller recorder *MockroleTagsListerMockRecorder } // MockroleTagsListerMockRecorder is the mock recorder for MockroleTagsLister. type MockroleTagsListerMockRecorder struct { mock *MockroleTagsLister } // NewMockroleTagsLister creates a new mock instance. func NewMockroleTagsLister(ctrl *gomock.Controller) *MockroleTagsLister { mock := &MockroleTagsLister{ctrl: ctrl} mock.recorder = &MockroleTagsListerMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockroleTagsLister) EXPECT() *MockroleTagsListerMockRecorder { return m.recorder } // ListRoleTags mocks base method. func (m *MockroleTagsLister) ListRoleTags(arg0 string) (map[string]string, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "ListRoleTags", arg0) ret0, _ := ret[0].(map[string]string) ret1, _ := ret[1].(error) return ret0, ret1 } // ListRoleTags indicates an expected call of ListRoleTags. func (mr *MockroleTagsListerMockRecorder) ListRoleTags(arg0 interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ListRoleTags", reflect.TypeOf((*MockroleTagsLister)(nil).ListRoleTags), arg0) } // MockroleManager is a mock of roleManager interface. type MockroleManager struct { ctrl *gomock.Controller recorder *MockroleManagerMockRecorder } // MockroleManagerMockRecorder is the mock recorder for MockroleManager. type MockroleManagerMockRecorder struct { mock *MockroleManager } // NewMockroleManager creates a new mock instance. func NewMockroleManager(ctrl *gomock.Controller) *MockroleManager { mock := &MockroleManager{ctrl: ctrl} mock.recorder = &MockroleManagerMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockroleManager) EXPECT() *MockroleManagerMockRecorder { return m.recorder } // CreateECSServiceLinkedRole mocks base method. func (m *MockroleManager) CreateECSServiceLinkedRole() error { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "CreateECSServiceLinkedRole") ret0, _ := ret[0].(error) return ret0 } // CreateECSServiceLinkedRole indicates an expected call of CreateECSServiceLinkedRole. func (mr *MockroleManagerMockRecorder) CreateECSServiceLinkedRole() *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "CreateECSServiceLinkedRole", reflect.TypeOf((*MockroleManager)(nil).CreateECSServiceLinkedRole)) } // DeleteRole mocks base method. func (m *MockroleManager) DeleteRole(arg0 string) error { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "DeleteRole", arg0) ret0, _ := ret[0].(error) return ret0 } // DeleteRole indicates an expected call of DeleteRole. func (mr *MockroleManagerMockRecorder) DeleteRole(arg0 interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DeleteRole", reflect.TypeOf((*MockroleManager)(nil).DeleteRole), arg0) } // ListRoleTags mocks base method. func (m *MockroleManager) ListRoleTags(arg0 string) (map[string]string, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "ListRoleTags", arg0) ret0, _ := ret[0].(map[string]string) ret1, _ := ret[1].(error) return ret0, ret1 } // ListRoleTags indicates an expected call of ListRoleTags. func (mr *MockroleManagerMockRecorder) ListRoleTags(arg0 interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ListRoleTags", reflect.TypeOf((*MockroleManager)(nil).ListRoleTags), arg0) } // MockstackExistChecker is a mock of stackExistChecker interface. type MockstackExistChecker struct { ctrl *gomock.Controller recorder *MockstackExistCheckerMockRecorder } // MockstackExistCheckerMockRecorder is the mock recorder for MockstackExistChecker. type MockstackExistCheckerMockRecorder struct { mock *MockstackExistChecker } // NewMockstackExistChecker creates a new mock instance. func NewMockstackExistChecker(ctrl *gomock.Controller) *MockstackExistChecker { mock := &MockstackExistChecker{ctrl: ctrl} mock.recorder = &MockstackExistCheckerMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockstackExistChecker) EXPECT() *MockstackExistCheckerMockRecorder { return m.recorder } // Exists mocks base method. func (m *MockstackExistChecker) Exists(arg0 string) (bool, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "Exists", arg0) ret0, _ := ret[0].(bool) ret1, _ := ret[1].(error) return ret0, ret1 } // Exists indicates an expected call of Exists. func (mr *MockstackExistCheckerMockRecorder) Exists(arg0 interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Exists", reflect.TypeOf((*MockstackExistChecker)(nil).Exists), arg0) } // MockrunningTaskSelector is a mock of runningTaskSelector interface. type MockrunningTaskSelector struct { ctrl *gomock.Controller recorder *MockrunningTaskSelectorMockRecorder } // MockrunningTaskSelectorMockRecorder is the mock recorder for MockrunningTaskSelector. type MockrunningTaskSelectorMockRecorder struct { mock *MockrunningTaskSelector } // NewMockrunningTaskSelector creates a new mock instance. func NewMockrunningTaskSelector(ctrl *gomock.Controller) *MockrunningTaskSelector { mock := &MockrunningTaskSelector{ctrl: ctrl} mock.recorder = &MockrunningTaskSelectorMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockrunningTaskSelector) EXPECT() *MockrunningTaskSelectorMockRecorder { return m.recorder } // RunningTask mocks base method. func (m *MockrunningTaskSelector) RunningTask(prompt, help string, opts ...selector.TaskOpts) (*ecs.Task, error) { m.ctrl.T.Helper() varargs := []interface{}{prompt, help} for _, a := range opts { varargs = append(varargs, a) } ret := m.ctrl.Call(m, "RunningTask", varargs...) ret0, _ := ret[0].(*ecs.Task) ret1, _ := ret[1].(error) return ret0, ret1 } // RunningTask indicates an expected call of RunningTask. func (mr *MockrunningTaskSelectorMockRecorder) RunningTask(prompt, help interface{}, opts ...interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() varargs := append([]interface{}{prompt, help}, opts...) return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "RunningTask", reflect.TypeOf((*MockrunningTaskSelector)(nil).RunningTask), varargs...) } // MockdockerEngine is a mock of dockerEngine interface. type MockdockerEngine struct { ctrl *gomock.Controller recorder *MockdockerEngineMockRecorder } // MockdockerEngineMockRecorder is the mock recorder for MockdockerEngine. type MockdockerEngineMockRecorder struct { mock *MockdockerEngine } // NewMockdockerEngine creates a new mock instance. func NewMockdockerEngine(ctrl *gomock.Controller) *MockdockerEngine { mock := &MockdockerEngine{ctrl: ctrl} mock.recorder = &MockdockerEngineMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockdockerEngine) EXPECT() *MockdockerEngineMockRecorder { return m.recorder } // CheckDockerEngineRunning mocks base method. func (m *MockdockerEngine) CheckDockerEngineRunning() error { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "CheckDockerEngineRunning") ret0, _ := ret[0].(error) return ret0 } // CheckDockerEngineRunning indicates an expected call of CheckDockerEngineRunning. func (mr *MockdockerEngineMockRecorder) CheckDockerEngineRunning() *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "CheckDockerEngineRunning", reflect.TypeOf((*MockdockerEngine)(nil).CheckDockerEngineRunning)) } // GetPlatform mocks base method. func (m *MockdockerEngine) GetPlatform() (string, string, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "GetPlatform") ret0, _ := ret[0].(string) ret1, _ := ret[1].(string) ret2, _ := ret[2].(error) return ret0, ret1, ret2 } // GetPlatform indicates an expected call of GetPlatform. func (mr *MockdockerEngineMockRecorder) GetPlatform() *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetPlatform", reflect.TypeOf((*MockdockerEngine)(nil).GetPlatform)) } // Mockcodestar is a mock of codestar interface. type Mockcodestar struct { ctrl *gomock.Controller recorder *MockcodestarMockRecorder } // MockcodestarMockRecorder is the mock recorder for Mockcodestar. type MockcodestarMockRecorder struct { mock *Mockcodestar } // NewMockcodestar creates a new mock instance. func NewMockcodestar(ctrl *gomock.Controller) *Mockcodestar { mock := &Mockcodestar{ctrl: ctrl} mock.recorder = &MockcodestarMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *Mockcodestar) EXPECT() *MockcodestarMockRecorder { return m.recorder } // GetConnectionARN mocks base method. func (m *Mockcodestar) GetConnectionARN(arg0 string) (string, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "GetConnectionARN", arg0) ret0, _ := ret[0].(string) ret1, _ := ret[1].(error) return ret0, ret1 } // GetConnectionARN indicates an expected call of GetConnectionARN. func (mr *MockcodestarMockRecorder) GetConnectionARN(arg0 interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetConnectionARN", reflect.TypeOf((*Mockcodestar)(nil).GetConnectionARN), arg0) } // MockpublicIPGetter is a mock of publicIPGetter interface. type MockpublicIPGetter struct { ctrl *gomock.Controller recorder *MockpublicIPGetterMockRecorder } // MockpublicIPGetterMockRecorder is the mock recorder for MockpublicIPGetter. type MockpublicIPGetterMockRecorder struct { mock *MockpublicIPGetter } // NewMockpublicIPGetter creates a new mock instance. func NewMockpublicIPGetter(ctrl *gomock.Controller) *MockpublicIPGetter { mock := &MockpublicIPGetter{ctrl: ctrl} mock.recorder = &MockpublicIPGetterMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockpublicIPGetter) EXPECT() *MockpublicIPGetterMockRecorder { return m.recorder } // PublicIP mocks base method. func (m *MockpublicIPGetter) PublicIP(ENI string) (string, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "PublicIP", ENI) ret0, _ := ret[0].(string) ret1, _ := ret[1].(error) return ret0, ret1 } // PublicIP indicates an expected call of PublicIP. func (mr *MockpublicIPGetterMockRecorder) PublicIP(ENI interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "PublicIP", reflect.TypeOf((*MockpublicIPGetter)(nil).PublicIP), ENI) } // MockcliStringer is a mock of cliStringer interface. type MockcliStringer struct { ctrl *gomock.Controller recorder *MockcliStringerMockRecorder } // MockcliStringerMockRecorder is the mock recorder for MockcliStringer. type MockcliStringerMockRecorder struct { mock *MockcliStringer } // NewMockcliStringer creates a new mock instance. func NewMockcliStringer(ctrl *gomock.Controller) *MockcliStringer { mock := &MockcliStringer{ctrl: ctrl} mock.recorder = &MockcliStringerMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockcliStringer) EXPECT() *MockcliStringerMockRecorder { return m.recorder } // CLIString mocks base method. func (m *MockcliStringer) CLIString() (string, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "CLIString") ret0, _ := ret[0].(string) ret1, _ := ret[1].(error) return ret0, ret1 } // CLIString indicates an expected call of CLIString. func (mr *MockcliStringerMockRecorder) CLIString() *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "CLIString", reflect.TypeOf((*MockcliStringer)(nil).CLIString)) } // MocksecretPutter is a mock of secretPutter interface. type MocksecretPutter struct { ctrl *gomock.Controller recorder *MocksecretPutterMockRecorder } // MocksecretPutterMockRecorder is the mock recorder for MocksecretPutter. type MocksecretPutterMockRecorder struct { mock *MocksecretPutter } // NewMocksecretPutter creates a new mock instance. func NewMocksecretPutter(ctrl *gomock.Controller) *MocksecretPutter { mock := &MocksecretPutter{ctrl: ctrl} mock.recorder = &MocksecretPutterMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MocksecretPutter) EXPECT() *MocksecretPutterMockRecorder { return m.recorder } // PutSecret mocks base method. func (m *MocksecretPutter) PutSecret(in ssm.PutSecretInput) (*ssm.PutSecretOutput, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "PutSecret", in) ret0, _ := ret[0].(*ssm.PutSecretOutput) ret1, _ := ret[1].(error) return ret0, ret1 } // PutSecret indicates an expected call of PutSecret. func (mr *MocksecretPutterMockRecorder) PutSecret(in interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "PutSecret", reflect.TypeOf((*MocksecretPutter)(nil).PutSecret), in) } // MockservicePauser is a mock of servicePauser interface. type MockservicePauser struct { ctrl *gomock.Controller recorder *MockservicePauserMockRecorder } // MockservicePauserMockRecorder is the mock recorder for MockservicePauser. type MockservicePauserMockRecorder struct { mock *MockservicePauser } // NewMockservicePauser creates a new mock instance. func NewMockservicePauser(ctrl *gomock.Controller) *MockservicePauser { mock := &MockservicePauser{ctrl: ctrl} mock.recorder = &MockservicePauserMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockservicePauser) EXPECT() *MockservicePauserMockRecorder { return m.recorder } // PauseService mocks base method. func (m *MockservicePauser) PauseService(svcARN string) error { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "PauseService", svcARN) ret0, _ := ret[0].(error) return ret0 } // PauseService indicates an expected call of PauseService. func (mr *MockservicePauserMockRecorder) PauseService(svcARN interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "PauseService", reflect.TypeOf((*MockservicePauser)(nil).PauseService), svcARN) } // Mockinterpolator is a mock of interpolator interface. type Mockinterpolator struct { ctrl *gomock.Controller recorder *MockinterpolatorMockRecorder } // MockinterpolatorMockRecorder is the mock recorder for Mockinterpolator. type MockinterpolatorMockRecorder struct { mock *Mockinterpolator } // NewMockinterpolator creates a new mock instance. func NewMockinterpolator(ctrl *gomock.Controller) *Mockinterpolator { mock := &Mockinterpolator{ctrl: ctrl} mock.recorder = &MockinterpolatorMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *Mockinterpolator) EXPECT() *MockinterpolatorMockRecorder { return m.recorder } // Interpolate mocks base method. func (m *Mockinterpolator) Interpolate(s string) (string, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "Interpolate", s) ret0, _ := ret[0].(string) ret1, _ := ret[1].(error) return ret0, ret1 } // Interpolate indicates an expected call of Interpolate. func (mr *MockinterpolatorMockRecorder) Interpolate(s interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Interpolate", reflect.TypeOf((*Mockinterpolator)(nil).Interpolate), s) } // MockworkloadDeployer is a mock of workloadDeployer interface. type MockworkloadDeployer struct { ctrl *gomock.Controller recorder *MockworkloadDeployerMockRecorder } // MockworkloadDeployerMockRecorder is the mock recorder for MockworkloadDeployer. type MockworkloadDeployerMockRecorder struct { mock *MockworkloadDeployer } // NewMockworkloadDeployer creates a new mock instance. func NewMockworkloadDeployer(ctrl *gomock.Controller) *MockworkloadDeployer { mock := &MockworkloadDeployer{ctrl: ctrl} mock.recorder = &MockworkloadDeployerMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockworkloadDeployer) EXPECT() *MockworkloadDeployerMockRecorder { return m.recorder } // DeployDiff mocks base method. func (m *MockworkloadDeployer) DeployDiff(inTmpl string) (string, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "DeployDiff", inTmpl) ret0, _ := ret[0].(string) ret1, _ := ret[1].(error) return ret0, ret1 } // DeployDiff indicates an expected call of DeployDiff. func (mr *MockworkloadDeployerMockRecorder) DeployDiff(inTmpl interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DeployDiff", reflect.TypeOf((*MockworkloadDeployer)(nil).DeployDiff), inTmpl) } // DeployWorkload mocks base method. func (m *MockworkloadDeployer) DeployWorkload(in *deploy.DeployWorkloadInput) (deploy.ActionRecommender, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "DeployWorkload", in) ret0, _ := ret[0].(deploy.ActionRecommender) ret1, _ := ret[1].(error) return ret0, ret1 } // DeployWorkload indicates an expected call of DeployWorkload. func (mr *MockworkloadDeployerMockRecorder) DeployWorkload(in interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DeployWorkload", reflect.TypeOf((*MockworkloadDeployer)(nil).DeployWorkload), in) } // GenerateCloudFormationTemplate mocks base method. func (m *MockworkloadDeployer) GenerateCloudFormationTemplate(in *deploy.GenerateCloudFormationTemplateInput) (*deploy.GenerateCloudFormationTemplateOutput, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "GenerateCloudFormationTemplate", in) ret0, _ := ret[0].(*deploy.GenerateCloudFormationTemplateOutput) ret1, _ := ret[1].(error) return ret0, ret1 } // GenerateCloudFormationTemplate indicates an expected call of GenerateCloudFormationTemplate. func (mr *MockworkloadDeployerMockRecorder) GenerateCloudFormationTemplate(in interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GenerateCloudFormationTemplate", reflect.TypeOf((*MockworkloadDeployer)(nil).GenerateCloudFormationTemplate), in) } // IsServiceAvailableInRegion mocks base method. func (m *MockworkloadDeployer) IsServiceAvailableInRegion(region string) (bool, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "IsServiceAvailableInRegion", region) ret0, _ := ret[0].(bool) ret1, _ := ret[1].(error) return ret0, ret1 } // IsServiceAvailableInRegion indicates an expected call of IsServiceAvailableInRegion. func (mr *MockworkloadDeployerMockRecorder) IsServiceAvailableInRegion(region interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "IsServiceAvailableInRegion", reflect.TypeOf((*MockworkloadDeployer)(nil).IsServiceAvailableInRegion), region) } // UploadArtifacts mocks base method. func (m *MockworkloadDeployer) UploadArtifacts() (*deploy.UploadArtifactsOutput, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "UploadArtifacts") ret0, _ := ret[0].(*deploy.UploadArtifactsOutput) ret1, _ := ret[1].(error) return ret0, ret1 } // UploadArtifacts indicates an expected call of UploadArtifacts. func (mr *MockworkloadDeployerMockRecorder) UploadArtifacts() *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "UploadArtifacts", reflect.TypeOf((*MockworkloadDeployer)(nil).UploadArtifacts)) } // MocktemplateDiffer is a mock of templateDiffer interface. type MocktemplateDiffer struct { ctrl *gomock.Controller recorder *MocktemplateDifferMockRecorder } // MocktemplateDifferMockRecorder is the mock recorder for MocktemplateDiffer. type MocktemplateDifferMockRecorder struct { mock *MocktemplateDiffer } // NewMocktemplateDiffer creates a new mock instance. func NewMocktemplateDiffer(ctrl *gomock.Controller) *MocktemplateDiffer { mock := &MocktemplateDiffer{ctrl: ctrl} mock.recorder = &MocktemplateDifferMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MocktemplateDiffer) EXPECT() *MocktemplateDifferMockRecorder { return m.recorder } // DeployDiff mocks base method. func (m *MocktemplateDiffer) DeployDiff(inTmpl string) (string, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "DeployDiff", inTmpl) ret0, _ := ret[0].(string) ret1, _ := ret[1].(error) return ret0, ret1 } // DeployDiff indicates an expected call of DeployDiff. func (mr *MocktemplateDifferMockRecorder) DeployDiff(inTmpl interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DeployDiff", reflect.TypeOf((*MocktemplateDiffer)(nil).DeployDiff), inTmpl) } // MockworkloadStackGenerator is a mock of workloadStackGenerator interface. type MockworkloadStackGenerator struct { ctrl *gomock.Controller recorder *MockworkloadStackGeneratorMockRecorder } // MockworkloadStackGeneratorMockRecorder is the mock recorder for MockworkloadStackGenerator. type MockworkloadStackGeneratorMockRecorder struct { mock *MockworkloadStackGenerator } // NewMockworkloadStackGenerator creates a new mock instance. func NewMockworkloadStackGenerator(ctrl *gomock.Controller) *MockworkloadStackGenerator { mock := &MockworkloadStackGenerator{ctrl: ctrl} mock.recorder = &MockworkloadStackGeneratorMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockworkloadStackGenerator) EXPECT() *MockworkloadStackGeneratorMockRecorder { return m.recorder } // AddonsTemplate mocks base method. func (m *MockworkloadStackGenerator) AddonsTemplate() (string, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "AddonsTemplate") ret0, _ := ret[0].(string) ret1, _ := ret[1].(error) return ret0, ret1 } // AddonsTemplate indicates an expected call of AddonsTemplate. func (mr *MockworkloadStackGeneratorMockRecorder) AddonsTemplate() *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "AddonsTemplate", reflect.TypeOf((*MockworkloadStackGenerator)(nil).AddonsTemplate)) } // DeployDiff mocks base method. func (m *MockworkloadStackGenerator) DeployDiff(inTmpl string) (string, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "DeployDiff", inTmpl) ret0, _ := ret[0].(string) ret1, _ := ret[1].(error) return ret0, ret1 } // DeployDiff indicates an expected call of DeployDiff. func (mr *MockworkloadStackGeneratorMockRecorder) DeployDiff(inTmpl interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DeployDiff", reflect.TypeOf((*MockworkloadStackGenerator)(nil).DeployDiff), inTmpl) } // GenerateCloudFormationTemplate mocks base method. func (m *MockworkloadStackGenerator) GenerateCloudFormationTemplate(in *deploy.GenerateCloudFormationTemplateInput) (*deploy.GenerateCloudFormationTemplateOutput, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "GenerateCloudFormationTemplate", in) ret0, _ := ret[0].(*deploy.GenerateCloudFormationTemplateOutput) ret1, _ := ret[1].(error) return ret0, ret1 } // GenerateCloudFormationTemplate indicates an expected call of GenerateCloudFormationTemplate. func (mr *MockworkloadStackGeneratorMockRecorder) GenerateCloudFormationTemplate(in interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GenerateCloudFormationTemplate", reflect.TypeOf((*MockworkloadStackGenerator)(nil).GenerateCloudFormationTemplate), in) } // UploadArtifacts mocks base method. func (m *MockworkloadStackGenerator) UploadArtifacts() (*deploy.UploadArtifactsOutput, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "UploadArtifacts") ret0, _ := ret[0].(*deploy.UploadArtifactsOutput) ret1, _ := ret[1].(error) return ret0, ret1 } // UploadArtifacts indicates an expected call of UploadArtifacts. func (mr *MockworkloadStackGeneratorMockRecorder) UploadArtifacts() *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "UploadArtifacts", reflect.TypeOf((*MockworkloadStackGenerator)(nil).UploadArtifacts)) } // Mockrunner is a mock of runner interface. type Mockrunner struct { ctrl *gomock.Controller recorder *MockrunnerMockRecorder } // MockrunnerMockRecorder is the mock recorder for Mockrunner. type MockrunnerMockRecorder struct { mock *Mockrunner } // NewMockrunner creates a new mock instance. func NewMockrunner(ctrl *gomock.Controller) *Mockrunner { mock := &Mockrunner{ctrl: ctrl} mock.recorder = &MockrunnerMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *Mockrunner) EXPECT() *MockrunnerMockRecorder { return m.recorder } // Run mocks base method. func (m *Mockrunner) Run() error { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "Run") ret0, _ := ret[0].(error) return ret0 } // Run indicates an expected call of Run. func (mr *MockrunnerMockRecorder) Run() *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Run", reflect.TypeOf((*Mockrunner)(nil).Run)) } // MockenvDeployer is a mock of envDeployer interface. type MockenvDeployer struct { ctrl *gomock.Controller recorder *MockenvDeployerMockRecorder } // MockenvDeployerMockRecorder is the mock recorder for MockenvDeployer. type MockenvDeployerMockRecorder struct { mock *MockenvDeployer } // NewMockenvDeployer creates a new mock instance. func NewMockenvDeployer(ctrl *gomock.Controller) *MockenvDeployer { mock := &MockenvDeployer{ctrl: ctrl} mock.recorder = &MockenvDeployerMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockenvDeployer) EXPECT() *MockenvDeployerMockRecorder { return m.recorder } // DeployDiff mocks base method. func (m *MockenvDeployer) DeployDiff(inTmpl string) (string, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "DeployDiff", inTmpl) ret0, _ := ret[0].(string) ret1, _ := ret[1].(error) return ret0, ret1 } // DeployDiff indicates an expected call of DeployDiff. func (mr *MockenvDeployerMockRecorder) DeployDiff(inTmpl interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DeployDiff", reflect.TypeOf((*MockenvDeployer)(nil).DeployDiff), inTmpl) } // DeployEnvironment mocks base method. func (m *MockenvDeployer) DeployEnvironment(in *deploy.DeployEnvironmentInput) error { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "DeployEnvironment", in) ret0, _ := ret[0].(error) return ret0 } // DeployEnvironment indicates an expected call of DeployEnvironment. func (mr *MockenvDeployerMockRecorder) DeployEnvironment(in interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DeployEnvironment", reflect.TypeOf((*MockenvDeployer)(nil).DeployEnvironment), in) } // GenerateCloudFormationTemplate mocks base method. func (m *MockenvDeployer) GenerateCloudFormationTemplate(in *deploy.DeployEnvironmentInput) (*deploy.GenerateCloudFormationTemplateOutput, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "GenerateCloudFormationTemplate", in) ret0, _ := ret[0].(*deploy.GenerateCloudFormationTemplateOutput) ret1, _ := ret[1].(error) return ret0, ret1 } // GenerateCloudFormationTemplate indicates an expected call of GenerateCloudFormationTemplate. func (mr *MockenvDeployerMockRecorder) GenerateCloudFormationTemplate(in interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GenerateCloudFormationTemplate", reflect.TypeOf((*MockenvDeployer)(nil).GenerateCloudFormationTemplate), in) } // UploadArtifacts mocks base method. func (m *MockenvDeployer) UploadArtifacts() (*deploy.UploadEnvArtifactsOutput, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "UploadArtifacts") ret0, _ := ret[0].(*deploy.UploadEnvArtifactsOutput) ret1, _ := ret[1].(error) return ret0, ret1 } // UploadArtifacts indicates an expected call of UploadArtifacts. func (mr *MockenvDeployerMockRecorder) UploadArtifacts() *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "UploadArtifacts", reflect.TypeOf((*MockenvDeployer)(nil).UploadArtifacts)) } // Validate mocks base method. func (m *MockenvDeployer) Validate(arg0 *manifest.Environment) error { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "Validate", arg0) ret0, _ := ret[0].(error) return ret0 } // Validate indicates an expected call of Validate. func (mr *MockenvDeployerMockRecorder) Validate(arg0 interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Validate", reflect.TypeOf((*MockenvDeployer)(nil).Validate), arg0) } // MockenvPackager is a mock of envPackager interface. type MockenvPackager struct { ctrl *gomock.Controller recorder *MockenvPackagerMockRecorder } // MockenvPackagerMockRecorder is the mock recorder for MockenvPackager. type MockenvPackagerMockRecorder struct { mock *MockenvPackager } // NewMockenvPackager creates a new mock instance. func NewMockenvPackager(ctrl *gomock.Controller) *MockenvPackager { mock := &MockenvPackager{ctrl: ctrl} mock.recorder = &MockenvPackagerMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockenvPackager) EXPECT() *MockenvPackagerMockRecorder { return m.recorder } // AddonsTemplate mocks base method. func (m *MockenvPackager) AddonsTemplate() (string, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "AddonsTemplate") ret0, _ := ret[0].(string) ret1, _ := ret[1].(error) return ret0, ret1 } // AddonsTemplate indicates an expected call of AddonsTemplate. func (mr *MockenvPackagerMockRecorder) AddonsTemplate() *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "AddonsTemplate", reflect.TypeOf((*MockenvPackager)(nil).AddonsTemplate)) } // DeployDiff mocks base method. func (m *MockenvPackager) DeployDiff(inTmpl string) (string, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "DeployDiff", inTmpl) ret0, _ := ret[0].(string) ret1, _ := ret[1].(error) return ret0, ret1 } // DeployDiff indicates an expected call of DeployDiff. func (mr *MockenvPackagerMockRecorder) DeployDiff(inTmpl interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DeployDiff", reflect.TypeOf((*MockenvPackager)(nil).DeployDiff), inTmpl) } // GenerateCloudFormationTemplate mocks base method. func (m *MockenvPackager) GenerateCloudFormationTemplate(in *deploy.DeployEnvironmentInput) (*deploy.GenerateCloudFormationTemplateOutput, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "GenerateCloudFormationTemplate", in) ret0, _ := ret[0].(*deploy.GenerateCloudFormationTemplateOutput) ret1, _ := ret[1].(error) return ret0, ret1 } // GenerateCloudFormationTemplate indicates an expected call of GenerateCloudFormationTemplate. func (mr *MockenvPackagerMockRecorder) GenerateCloudFormationTemplate(in interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GenerateCloudFormationTemplate", reflect.TypeOf((*MockenvPackager)(nil).GenerateCloudFormationTemplate), in) } // UploadArtifacts mocks base method. func (m *MockenvPackager) UploadArtifacts() (*deploy.UploadEnvArtifactsOutput, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "UploadArtifacts") ret0, _ := ret[0].(*deploy.UploadEnvArtifactsOutput) ret1, _ := ret[1].(error) return ret0, ret1 } // UploadArtifacts indicates an expected call of UploadArtifacts. func (mr *MockenvPackagerMockRecorder) UploadArtifacts() *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "UploadArtifacts", reflect.TypeOf((*MockenvPackager)(nil).UploadArtifacts)) } // Validate mocks base method. func (m *MockenvPackager) Validate(arg0 *manifest.Environment) error { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "Validate", arg0) ret0, _ := ret[0].(error) return ret0 } // Validate indicates an expected call of Validate. func (mr *MockenvPackagerMockRecorder) Validate(arg0 interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Validate", reflect.TypeOf((*MockenvPackager)(nil).Validate), arg0) } // MockpipelineStackConfig is a mock of pipelineStackConfig interface. type MockpipelineStackConfig struct { ctrl *gomock.Controller recorder *MockpipelineStackConfigMockRecorder } // MockpipelineStackConfigMockRecorder is the mock recorder for MockpipelineStackConfig. type MockpipelineStackConfigMockRecorder struct { mock *MockpipelineStackConfig } // NewMockpipelineStackConfig creates a new mock instance. func NewMockpipelineStackConfig(ctrl *gomock.Controller) *MockpipelineStackConfig { mock := &MockpipelineStackConfig{ctrl: ctrl} mock.recorder = &MockpipelineStackConfigMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockpipelineStackConfig) EXPECT() *MockpipelineStackConfigMockRecorder { return m.recorder } // Template mocks base method. func (m *MockpipelineStackConfig) Template() (string, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "Template") ret0, _ := ret[0].(string) ret1, _ := ret[1].(error) return ret0, ret1 } // Template indicates an expected call of Template. func (mr *MockpipelineStackConfigMockRecorder) Template() *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Template", reflect.TypeOf((*MockpipelineStackConfig)(nil).Template)) }
7,704
copilot-cli
aws
Go
// Code generated by MockGen. DO NOT EDIT. // Source: ./internal/pkg/cli/progress.go // Package mocks is a generated GoMock package. package mocks import ( reflect "reflect" gomock "github.com/golang/mock/gomock" ) // Mockprogress is a mock of progress interface. type Mockprogress struct { ctrl *gomock.Controller recorder *MockprogressMockRecorder } // MockprogressMockRecorder is the mock recorder for Mockprogress. type MockprogressMockRecorder struct { mock *Mockprogress } // NewMockprogress creates a new mock instance. func NewMockprogress(ctrl *gomock.Controller) *Mockprogress { mock := &Mockprogress{ctrl: ctrl} mock.recorder = &MockprogressMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *Mockprogress) EXPECT() *MockprogressMockRecorder { return m.recorder } // Start mocks base method. func (m *Mockprogress) Start(label string) { m.ctrl.T.Helper() m.ctrl.Call(m, "Start", label) } // Start indicates an expected call of Start. func (mr *MockprogressMockRecorder) Start(label interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Start", reflect.TypeOf((*Mockprogress)(nil).Start), label) } // Stop mocks base method. func (m *Mockprogress) Stop(label string) { m.ctrl.T.Helper() m.ctrl.Call(m, "Stop", label) } // Stop indicates an expected call of Stop. func (mr *MockprogressMockRecorder) Stop(label interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Stop", reflect.TypeOf((*Mockprogress)(nil).Stop), label) }
59
copilot-cli
aws
Go
// Code generated by MockGen. DO NOT EDIT. // Source: ./internal/pkg/cli/prompter.go // Package mocks is a generated GoMock package. package mocks import ( reflect "reflect" prompt "github.com/aws/copilot-cli/internal/pkg/term/prompt" gomock "github.com/golang/mock/gomock" ) // Mockprompter is a mock of prompter interface. type Mockprompter struct { ctrl *gomock.Controller recorder *MockprompterMockRecorder } // MockprompterMockRecorder is the mock recorder for Mockprompter. type MockprompterMockRecorder struct { mock *Mockprompter } // NewMockprompter creates a new mock instance. func NewMockprompter(ctrl *gomock.Controller) *Mockprompter { mock := &Mockprompter{ctrl: ctrl} mock.recorder = &MockprompterMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *Mockprompter) EXPECT() *MockprompterMockRecorder { return m.recorder } // Confirm mocks base method. func (m *Mockprompter) Confirm(message, help string, promptOpts ...prompt.PromptConfig) (bool, error) { m.ctrl.T.Helper() varargs := []interface{}{message, help} for _, a := range promptOpts { varargs = append(varargs, a) } ret := m.ctrl.Call(m, "Confirm", varargs...) ret0, _ := ret[0].(bool) ret1, _ := ret[1].(error) return ret0, ret1 } // Confirm indicates an expected call of Confirm. func (mr *MockprompterMockRecorder) Confirm(message, help interface{}, promptOpts ...interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() varargs := append([]interface{}{message, help}, promptOpts...) return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Confirm", reflect.TypeOf((*Mockprompter)(nil).Confirm), varargs...) } // Get mocks base method. func (m *Mockprompter) Get(message, help string, validator prompt.ValidatorFunc, promptOpts ...prompt.PromptConfig) (string, error) { m.ctrl.T.Helper() varargs := []interface{}{message, help, validator} for _, a := range promptOpts { varargs = append(varargs, a) } ret := m.ctrl.Call(m, "Get", varargs...) ret0, _ := ret[0].(string) ret1, _ := ret[1].(error) return ret0, ret1 } // Get indicates an expected call of Get. func (mr *MockprompterMockRecorder) Get(message, help, validator interface{}, promptOpts ...interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() varargs := append([]interface{}{message, help, validator}, promptOpts...) return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Get", reflect.TypeOf((*Mockprompter)(nil).Get), varargs...) } // GetSecret mocks base method. func (m *Mockprompter) GetSecret(message, help string, promptOpts ...prompt.PromptConfig) (string, error) { m.ctrl.T.Helper() varargs := []interface{}{message, help} for _, a := range promptOpts { varargs = append(varargs, a) } ret := m.ctrl.Call(m, "GetSecret", varargs...) ret0, _ := ret[0].(string) ret1, _ := ret[1].(error) return ret0, ret1 } // GetSecret indicates an expected call of GetSecret. func (mr *MockprompterMockRecorder) GetSecret(message, help interface{}, promptOpts ...interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() varargs := append([]interface{}{message, help}, promptOpts...) return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetSecret", reflect.TypeOf((*Mockprompter)(nil).GetSecret), varargs...) } // MultiSelect mocks base method. func (m *Mockprompter) MultiSelect(message, help string, options []string, validator prompt.ValidatorFunc, promptOpts ...prompt.PromptConfig) ([]string, error) { m.ctrl.T.Helper() varargs := []interface{}{message, help, options, validator} for _, a := range promptOpts { varargs = append(varargs, a) } ret := m.ctrl.Call(m, "MultiSelect", varargs...) ret0, _ := ret[0].([]string) ret1, _ := ret[1].(error) return ret0, ret1 } // MultiSelect indicates an expected call of MultiSelect. func (mr *MockprompterMockRecorder) MultiSelect(message, help, options, validator interface{}, promptOpts ...interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() varargs := append([]interface{}{message, help, options, validator}, promptOpts...) return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "MultiSelect", reflect.TypeOf((*Mockprompter)(nil).MultiSelect), varargs...) } // MultiSelectOptions mocks base method. func (m *Mockprompter) MultiSelectOptions(message, help string, opts []prompt.Option, promptCfgs ...prompt.PromptConfig) ([]string, error) { m.ctrl.T.Helper() varargs := []interface{}{message, help, opts} for _, a := range promptCfgs { varargs = append(varargs, a) } ret := m.ctrl.Call(m, "MultiSelectOptions", varargs...) ret0, _ := ret[0].([]string) ret1, _ := ret[1].(error) return ret0, ret1 } // MultiSelectOptions indicates an expected call of MultiSelectOptions. func (mr *MockprompterMockRecorder) MultiSelectOptions(message, help, opts interface{}, promptCfgs ...interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() varargs := append([]interface{}{message, help, opts}, promptCfgs...) return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "MultiSelectOptions", reflect.TypeOf((*Mockprompter)(nil).MultiSelectOptions), varargs...) } // SelectOne mocks base method. func (m *Mockprompter) SelectOne(message, help string, options []string, promptOpts ...prompt.PromptConfig) (string, error) { m.ctrl.T.Helper() varargs := []interface{}{message, help, options} for _, a := range promptOpts { varargs = append(varargs, a) } ret := m.ctrl.Call(m, "SelectOne", varargs...) ret0, _ := ret[0].(string) ret1, _ := ret[1].(error) return ret0, ret1 } // SelectOne indicates an expected call of SelectOne. func (mr *MockprompterMockRecorder) SelectOne(message, help, options interface{}, promptOpts ...interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() varargs := append([]interface{}{message, help, options}, promptOpts...) return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "SelectOne", reflect.TypeOf((*Mockprompter)(nil).SelectOne), varargs...) } // SelectOption mocks base method. func (m *Mockprompter) SelectOption(message, help string, opts []prompt.Option, promptCfgs ...prompt.PromptConfig) (string, error) { m.ctrl.T.Helper() varargs := []interface{}{message, help, opts} for _, a := range promptCfgs { varargs = append(varargs, a) } ret := m.ctrl.Call(m, "SelectOption", varargs...) ret0, _ := ret[0].(string) ret1, _ := ret[1].(error) return ret0, ret1 } // SelectOption indicates an expected call of SelectOption. func (mr *MockprompterMockRecorder) SelectOption(message, help, opts interface{}, promptCfgs ...interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() varargs := append([]interface{}{message, help, opts}, promptCfgs...) return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "SelectOption", reflect.TypeOf((*Mockprompter)(nil).SelectOption), varargs...) }
176
copilot-cli
aws
Go
// Code generated by MockGen. DO NOT EDIT. // Source: ./internal/pkg/cli/env_delete.go // Package mocks is a generated GoMock package. package mocks import ( reflect "reflect" resourcegroupstaggingapi "github.com/aws/aws-sdk-go/service/resourcegroupstaggingapi" gomock "github.com/golang/mock/gomock" ) // MockresourceGetter is a mock of resourceGetter interface. type MockresourceGetter struct { ctrl *gomock.Controller recorder *MockresourceGetterMockRecorder } // MockresourceGetterMockRecorder is the mock recorder for MockresourceGetter. type MockresourceGetterMockRecorder struct { mock *MockresourceGetter } // NewMockresourceGetter creates a new mock instance. func NewMockresourceGetter(ctrl *gomock.Controller) *MockresourceGetter { mock := &MockresourceGetter{ctrl: ctrl} mock.recorder = &MockresourceGetterMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockresourceGetter) EXPECT() *MockresourceGetterMockRecorder { return m.recorder } // GetResources mocks base method. func (m *MockresourceGetter) GetResources(arg0 *resourcegroupstaggingapi.GetResourcesInput) (*resourcegroupstaggingapi.GetResourcesOutput, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "GetResources", arg0) ret0, _ := ret[0].(*resourcegroupstaggingapi.GetResourcesOutput) ret1, _ := ret[1].(error) return ret0, ret1 } // GetResources indicates an expected call of GetResources. func (mr *MockresourceGetterMockRecorder) GetResources(arg0 interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetResources", reflect.TypeOf((*MockresourceGetter)(nil).GetResources), arg0) }
51
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package config import ( "encoding/json" "fmt" "github.com/aws/aws-sdk-go/aws" "github.com/aws/aws-sdk-go/aws/awserr" "github.com/aws/aws-sdk-go/service/ssm" ) // Application is a named collection of environments and services. type Application struct { Name string `json:"name"` // Name of an Application. Must be unique amongst other apps in the same account. AccountID string `json:"account"` // AccountID this app is mastered in. PermissionsBoundary string `json:"permissionsBoundary,omitempty"` // Existing IAM permissions boundary. Domain string `json:"domain"` // Existing domain name in Route53. An empty domain name means the user does not have one. DomainHostedZoneID string `json:"domainHostedZoneID"` // Existing domain hosted zone in Route53. An empty domain name means the user does not have one. Version string `json:"version"` // The version of the app layout in the underlying datastore (e.g. SSM). Tags map[string]string `json:"tags,omitempty"` // Labels to apply to resources created within the app. } // CreateApplication instantiates a new application, validates its uniqueness and stores it in SSM. func (s *Store) CreateApplication(application *Application) error { applicationPath := fmt.Sprintf(fmtApplicationPath, application.Name) application.Version = schemaVersion data, err := marshal(application) if err != nil { return fmt.Errorf("serializing application %s: %w", application.Name, err) } _, err = s.ssm.PutParameter(&ssm.PutParameterInput{ Name: aws.String(applicationPath), Description: aws.String("Copilot Application"), Type: aws.String(ssm.ParameterTypeString), Value: aws.String(data), Tags: []*ssm.Tag{ { Key: aws.String("copilot-application"), Value: aws.String(application.Name), }, }, }) if err != nil { if aerr, ok := err.(awserr.Error); ok { switch aerr.Code() { case ssm.ErrCodeParameterAlreadyExists: return nil } } return fmt.Errorf("create application %s: %w", application.Name, err) } return nil } // UpdateApplication updates the data in SSM about an application. func (s *Store) UpdateApplication(application *Application) error { applicationPath := fmt.Sprintf(fmtApplicationPath, application.Name) application.Version = schemaVersion data, err := marshal(application) if err != nil { return fmt.Errorf("serializing application %s: %w", application.Name, err) } if _, err = s.ssm.PutParameter(&ssm.PutParameterInput{ Name: aws.String(applicationPath), Description: aws.String("Copilot Application"), Type: aws.String(ssm.ParameterTypeString), Value: aws.String(data), Overwrite: aws.Bool(true), }); err != nil { return fmt.Errorf("update application %s: %w", application.Name, err) } return nil } // GetApplication fetches an application by name. If it can't be found, return a ErrNoSuchApplication func (s *Store) GetApplication(applicationName string) (*Application, error) { applicationPath := fmt.Sprintf(fmtApplicationPath, applicationName) applicationParam, err := s.ssm.GetParameter(&ssm.GetParameterInput{ Name: aws.String(applicationPath), }) if err != nil { if aerr, ok := err.(awserr.Error); ok { switch aerr.Code() { case ssm.ErrCodeParameterNotFound: account, region := s.getCallerAccountAndRegion() return nil, &ErrNoSuchApplication{ ApplicationName: applicationName, AccountID: account, Region: region, } } } return nil, fmt.Errorf("get application %s: %w", applicationName, err) } var application Application if err := json.Unmarshal([]byte(*applicationParam.Parameter.Value), &application); err != nil { return nil, fmt.Errorf("read configuration for application %s: %w", applicationName, err) } return &application, nil } // ListApplications returns the list of existing applications in the customer's account and region. func (s *Store) ListApplications() ([]*Application, error) { var applications []*Application serializedApplications, err := s.listParams(rootApplicationPath) if err != nil { return nil, fmt.Errorf("list applications: %w", err) } for _, serializedApplication := range serializedApplications { var application Application if err := json.Unmarshal([]byte(*serializedApplication), &application); err != nil { return nil, fmt.Errorf("read application configuration: %w", err) } applications = append(applications, &application) } return applications, nil } // DeleteApplication deletes the SSM parameter related to the application. func (s *Store) DeleteApplication(name string) error { paramName := fmt.Sprintf(fmtApplicationPath, name) _, err := s.ssm.DeleteParameter(&ssm.DeleteParameterInput{ Name: aws.String(paramName), }) if err != nil { awserr, ok := err.(awserr.Error) if !ok { return err } if awserr.Code() == ssm.ErrCodeParameterNotFound { return nil } return fmt.Errorf("delete SSM param %s: %w", paramName, awserr) } return nil }
153
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package config import ( "errors" "fmt" "testing" "github.com/aws/aws-sdk-go/aws" "github.com/aws/aws-sdk-go/aws/awserr" "github.com/aws/aws-sdk-go/service/ssm" "github.com/aws/copilot-cli/internal/pkg/aws/identity" "github.com/stretchr/testify/require" ) func TestStore_ListApplications(t *testing.T) { testApplication := Application{Name: "chicken", Version: "1.0"} testApplicationString, err := marshal(testApplication) require.NoError(t, err, "Marshal application should not fail") cowApplication := Application{Name: "cow", Version: "1.0"} cowApplicationString, err := marshal(cowApplication) require.NoError(t, err, "Marshal application should not fail") lastPageInPaginatedResp := false testCases := map[string]struct { mockGetParametersByPath func(t *testing.T, param *ssm.GetParametersByPathInput) (*ssm.GetParametersByPathOutput, error) wantedApplicationNames []string wantedErr error }{ "with multiple existing applications": { mockGetParametersByPath: func(t *testing.T, param *ssm.GetParametersByPathInput) (output *ssm.GetParametersByPathOutput, e error) { require.Equal(t, rootApplicationPath, *param.Path) return &ssm.GetParametersByPathOutput{ Parameters: []*ssm.Parameter{ { Name: aws.String("/copilot/applications/chicken"), Value: aws.String(testApplicationString), }, { Name: aws.String("/copilot/applications/cow"), Value: aws.String(cowApplicationString), }, }, }, nil }, wantedApplicationNames: []string{"chicken", "cow"}, wantedErr: nil, }, "with malformed json": { mockGetParametersByPath: func(t *testing.T, param *ssm.GetParametersByPathInput) (output *ssm.GetParametersByPathOutput, e error) { require.Equal(t, rootApplicationPath, *param.Path) return &ssm.GetParametersByPathOutput{ Parameters: []*ssm.Parameter{ { Name: aws.String("/copilot/applications/chicken"), Value: aws.String("oops"), }, }, }, nil }, wantedErr: fmt.Errorf("read application configuration: invalid character 'o' looking for beginning of value"), }, "with SSM error": { mockGetParametersByPath: func(t *testing.T, param *ssm.GetParametersByPathInput) (output *ssm.GetParametersByPathOutput, e error) { require.Equal(t, rootApplicationPath, *param.Path) return nil, fmt.Errorf("broken") }, wantedApplicationNames: nil, wantedErr: fmt.Errorf("list applications: broken"), }, "with paginated response": { mockGetParametersByPath: func(t *testing.T, param *ssm.GetParametersByPathInput) (output *ssm.GetParametersByPathOutput, e error) { require.Equal(t, rootApplicationPath, *param.Path) // this closure references the `lastPageInPaginatedResp` variable // in order to determine the content of the response. if !lastPageInPaginatedResp { lastPageInPaginatedResp = true return &ssm.GetParametersByPathOutput{ Parameters: []*ssm.Parameter{ { Name: aws.String("/copilot/applications/chicken"), Value: aws.String(testApplicationString), }, }, NextToken: aws.String("more"), }, nil } return &ssm.GetParametersByPathOutput{ Parameters: []*ssm.Parameter{ { Name: aws.String("/copilot/applications/cow"), Value: aws.String(cowApplicationString), }, }, }, nil }, wantedApplicationNames: []string{"chicken", "cow"}, wantedErr: nil, }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { // GIVEN lastPageInPaginatedResp = false store := &Store{ ssm: &mockSSM{ t: t, mockGetParametersByPath: tc.mockGetParametersByPath, }, } // WHEN apps, err := store.ListApplications() // THEN if tc.wantedErr != nil { require.EqualError(t, err, tc.wantedErr.Error()) } else { var names []string for _, a := range apps { names = append(names, a.Name) } require.ElementsMatch(t, tc.wantedApplicationNames, names) } }) } } func TestStore_GetApplication(t *testing.T) { testApplication := Application{Name: "chicken", AccountID: "1234", Version: "1.0"} testApplicationString, err := marshal(testApplication) testApplicationPath := fmt.Sprintf(fmtApplicationPath, testApplication.Name) require.NoError(t, err, "Marshal application should not fail") testCases := map[string]struct { mockGetParameter func(t *testing.T, param *ssm.GetParameterInput) (*ssm.GetParameterOutput, error) mockIdentityServiceGet func() (identity.Caller, error) wantedApplication Application wantedErr error }{ "with existing application": { mockGetParameter: func(t *testing.T, param *ssm.GetParameterInput) (*ssm.GetParameterOutput, error) { require.Equal(t, testApplicationPath, *param.Name) return &ssm.GetParameterOutput{ Parameter: &ssm.Parameter{ Name: aws.String(testApplicationPath), Value: aws.String(testApplicationString), }, }, nil }, wantedApplication: testApplication, wantedErr: nil, }, "with no existing application": { mockGetParameter: func(t *testing.T, param *ssm.GetParameterInput) (*ssm.GetParameterOutput, error) { require.Equal(t, testApplicationPath, *param.Name) return nil, awserr.New(ssm.ErrCodeParameterNotFound, "No Parameter", fmt.Errorf("No Parameter")) }, mockIdentityServiceGet: func() (identity.Caller, error) { return identity.Caller{ Account: "12345", }, nil }, wantedErr: &ErrNoSuchApplication{ ApplicationName: "chicken", AccountID: "12345", Region: "us-west-2", }, }, "with no existing application and failed STS call": { mockGetParameter: func(t *testing.T, param *ssm.GetParameterInput) (*ssm.GetParameterOutput, error) { require.Equal(t, testApplicationPath, *param.Name) return nil, awserr.New(ssm.ErrCodeParameterNotFound, "No Parameter", fmt.Errorf("No Parameter")) }, mockIdentityServiceGet: func() (identity.Caller, error) { return identity.Caller{}, fmt.Errorf("Error") }, wantedErr: &ErrNoSuchApplication{ ApplicationName: "chicken", AccountID: "unknown", Region: "us-west-2", }, }, "with malformed json": { mockGetParameter: func(t *testing.T, param *ssm.GetParameterInput) (*ssm.GetParameterOutput, error) { require.Equal(t, testApplicationPath, *param.Name) return &ssm.GetParameterOutput{ Parameter: &ssm.Parameter{ Name: aws.String(testApplicationPath), Value: aws.String("oops"), }, }, nil }, wantedErr: fmt.Errorf("read configuration for application chicken: invalid character 'o' looking for beginning of value"), }, "with SSM error": { mockGetParameter: func(t *testing.T, param *ssm.GetParameterInput) (*ssm.GetParameterOutput, error) { require.Equal(t, testApplicationPath, *param.Name) return nil, fmt.Errorf("broken") }, wantedErr: fmt.Errorf("get application chicken: broken"), }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { // GIVEN store := &Store{ ssm: &mockSSM{ t: t, mockGetParameter: tc.mockGetParameter, }, sts: mockIdentityService{ mockIdentityServiceGet: tc.mockIdentityServiceGet, }, appRegion: "us-west-2", } // WHEN app, err := store.GetApplication("chicken") // THEN if tc.wantedErr != nil { require.EqualError(t, err, tc.wantedErr.Error()) } else { require.Equal(t, tc.wantedApplication, *app) } }) } } func TestStore_CreateApplication(t *testing.T) { tagForApplicationParam := []*ssm.Tag{ { Key: aws.String("copilot-application"), Value: aws.String("phonetool"), }, } testCases := map[string]struct { inApplication *Application mockPutParameter func(t *testing.T, param *ssm.PutParameterInput) (*ssm.PutParameterOutput, error) wantedErr error }{ "with no existing application": { inApplication: &Application{Name: "phonetool", AccountID: "1234", Domain: "phonetool.com", DomainHostedZoneID: "mockHostedZoneID", Tags: map[string]string{"owner": "boss"}}, mockPutParameter: func(t *testing.T, param *ssm.PutParameterInput) (*ssm.PutParameterOutput, error) { require.Equal(t, fmt.Sprintf(fmtApplicationPath, "phonetool"), *param.Name) require.Equal(t, fmt.Sprintf(`{"name":"phonetool","account":"1234","domain":"phonetool.com","domainHostedZoneID":"mockHostedZoneID","version":"%s","tags":{"owner":"boss"}}`, schemaVersion), *param.Value) require.Equal(t, tagForApplicationParam, param.Tags) return &ssm.PutParameterOutput{ Version: aws.Int64(1), }, nil }, wantedErr: nil, }, "with existing application": { inApplication: &Application{Name: "phonetool", AccountID: "1234"}, mockPutParameter: func(t *testing.T, param *ssm.PutParameterInput) (*ssm.PutParameterOutput, error) { require.Equal(t, tagForApplicationParam, param.Tags) return nil, awserr.New(ssm.ErrCodeParameterAlreadyExists, "Already exists", fmt.Errorf("Already Exists")) }, wantedErr: nil, }, "with SSM error": { inApplication: &Application{Name: "phonetool", AccountID: "1234"}, mockPutParameter: func(t *testing.T, param *ssm.PutParameterInput) (*ssm.PutParameterOutput, error) { require.Equal(t, tagForApplicationParam, param.Tags) return nil, fmt.Errorf("broken") }, wantedErr: fmt.Errorf("create application phonetool: broken"), }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { store := &Store{ ssm: &mockSSM{ t: t, mockPutParameter: tc.mockPutParameter, }, } // WHEN err := store.CreateApplication(tc.inApplication) // THEN if tc.wantedErr != nil { require.EqualError(t, err, tc.wantedErr.Error()) } else { require.NoError(t, err) } }) } } func TestStore_UpdateApplication(t *testing.T) { testCases := map[string]struct { inApplication *Application mockPutParameter func(t *testing.T, param *ssm.PutParameterInput) (*ssm.PutParameterOutput, error) wantedErr error }{ "success": { inApplication: &Application{Name: "phonetool", AccountID: "1234", Domain: "phonetool.com", DomainHostedZoneID: "mockHostedZoneID", Tags: map[string]string{"owner": "boss"}}, mockPutParameter: func(t *testing.T, param *ssm.PutParameterInput) (*ssm.PutParameterOutput, error) { require.Equal(t, fmt.Sprintf(fmtApplicationPath, "phonetool"), *param.Name) require.Equal(t, fmt.Sprintf(`{"name":"phonetool","account":"1234","domain":"phonetool.com","domainHostedZoneID":"mockHostedZoneID","version":"%s","tags":{"owner":"boss"}}`, schemaVersion), *param.Value) return &ssm.PutParameterOutput{ Version: aws.Int64(1), }, nil }, wantedErr: nil, }, "with SSM error": { inApplication: &Application{Name: "phonetool", AccountID: "1234"}, mockPutParameter: func(t *testing.T, param *ssm.PutParameterInput) (*ssm.PutParameterOutput, error) { return nil, fmt.Errorf("broken") }, wantedErr: fmt.Errorf("update application phonetool: broken"), }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { store := &Store{ ssm: &mockSSM{ t: t, mockPutParameter: tc.mockPutParameter, }, } // WHEN err := store.UpdateApplication(tc.inApplication) // THEN if tc.wantedErr != nil { require.EqualError(t, err, tc.wantedErr.Error()) } else { require.NoError(t, err) } }) } } func TestDeleteApplication(t *testing.T) { mockApplicationName := "mockApplicationName" mockError := errors.New("mockError") tests := map[string]struct { mockDeleteParameter func(t *testing.T, in *ssm.DeleteParameterInput) (*ssm.DeleteParameterOutput, error) want error }{ "should return nil given success": { mockDeleteParameter: func(t *testing.T, in *ssm.DeleteParameterInput) (*ssm.DeleteParameterOutput, error) { require.Equal(t, fmt.Sprintf(fmtApplicationPath, mockApplicationName), *in.Name) return &ssm.DeleteParameterOutput{}, nil }, want: nil, }, "should return nil given paramter not found error code": { mockDeleteParameter: func(t *testing.T, in *ssm.DeleteParameterInput) (*ssm.DeleteParameterOutput, error) { require.Equal(t, fmt.Sprintf(fmtApplicationPath, mockApplicationName), *in.Name) return nil, awserr.New(ssm.ErrCodeParameterNotFound, "whatevs", mockError) }, want: nil, }, "should return unhandled non-awserr": { mockDeleteParameter: func(t *testing.T, in *ssm.DeleteParameterInput) (*ssm.DeleteParameterOutput, error) { require.Equal(t, fmt.Sprintf(fmtApplicationPath, mockApplicationName), *in.Name) return nil, mockError }, want: mockError, }, } for name, test := range tests { t.Run(name, func(t *testing.T) { store := &Store{ ssm: &mockSSM{ t: t, mockDeleteParameter: test.mockDeleteParameter, }, } got := store.DeleteApplication(mockApplicationName) require.Equal(t, test.want, got) }) } }
409
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package config import ( "encoding/json" "fmt" "sort" "github.com/aws/aws-sdk-go/aws" "github.com/aws/aws-sdk-go/aws/awserr" "github.com/aws/aws-sdk-go/service/ssm" ) // Environment represents a deployment environment in an application. type Environment struct { App string `json:"app"` // Name of the app this environment belongs to. Name string `json:"name"` // Name of the environment, must be unique within a App. Region string `json:"region"` // Name of the region this environment is stored in. AccountID string `json:"accountID"` // Account ID of the account this environment is stored in. RegistryURL string `json:"registryURL"` // URL For ECR Registry for this environment. ExecutionRoleARN string `json:"executionRoleARN"` // ARN used by CloudFormation to make modification to the environment stack. ManagerRoleARN string `json:"managerRoleARN"` // ARN for the manager role assumed to manipulate the environment and its services. // Fields that store user configuration is no longer updated, but kept for retrofitting purpose. CustomConfig *CustomizeEnv `json:"customConfig,omitempty"` // Deprecated. Custom environment configuration by users. This configuration is now available in the env manifest. Telemetry *Telemetry `json:"telemetry,omitempty"` // Deprecated. Optional environment telemetry features. This configuration is now available in the env manifest. } // CustomizeEnv represents the custom environment config. type CustomizeEnv struct { ImportVPC *ImportVPC `json:"importVPC,omitempty"` VPCConfig *AdjustVPC `json:"adjustVPC,omitempty"` ImportCertARNs []string `json:"importCertARNs,omitempty"` InternalALBSubnets []string `json:"internalALBSubnets,omitempty"` EnableInternalALBVPCIngress bool `json:"enableInternalALBVPCIngress,omitempty"` } // IsEmpty returns true if CustomizeEnv is an empty struct. func (c *CustomizeEnv) IsEmpty() bool { if c == nil { return true } return c.ImportVPC == nil && c.VPCConfig == nil && len(c.ImportCertARNs) == 0 && len(c.InternalALBSubnets) == 0 && !c.EnableInternalALBVPCIngress } // ImportVPC holds the fields to import VPC resources. type ImportVPC struct { ID string `json:"id"` // ID for the VPC. PublicSubnetIDs []string `json:"publicSubnetIDs"` PrivateSubnetIDs []string `json:"privateSubnetIDs"` } // AdjustVPC holds the fields to adjust default VPC resources. type AdjustVPC struct { CIDR string `json:"cidr"` // CIDR range for the VPC. AZs []string `json:"availabilityZoneNames"` PublicSubnetCIDRs []string `json:"publicSubnetCIDRs"` PrivateSubnetCIDRs []string `json:"privateSubnetCIDRs"` } // Telemetry represents optional observability and monitoring configuration. type Telemetry struct { EnableContainerInsights bool `json:"containerInsights"` } // CreateEnvironment instantiates a new environment within an existing App. Skip if // the environment already exists in the App. func (s *Store) CreateEnvironment(environment *Environment) error { if _, err := s.GetApplication(environment.App); err != nil { return err } environmentPath := fmt.Sprintf(fmtEnvParamPath, environment.App, environment.Name) data, err := marshal(environment) if err != nil { return fmt.Errorf("serializing environment %s: %w", environment.Name, err) } _, err = s.ssm.PutParameter(&ssm.PutParameterInput{ Name: aws.String(environmentPath), Description: aws.String(fmt.Sprintf("The %s deployment stage", environment.Name)), Type: aws.String(ssm.ParameterTypeString), Value: aws.String(data), Tags: []*ssm.Tag{ { Key: aws.String("copilot-application"), Value: aws.String(environment.App), }, { Key: aws.String("copilot-environment"), Value: aws.String(environment.Name), }, }, }) if err != nil { if aerr, ok := err.(awserr.Error); ok { switch aerr.Code() { case ssm.ErrCodeParameterAlreadyExists: return nil } } return fmt.Errorf("create environment %s in application %s: %w", environment.Name, environment.App, err) } return nil } // GetEnvironment gets an environment belonging to a particular application by name. If no environment is found // it returns ErrNoSuchEnvironment. func (s *Store) GetEnvironment(appName string, environmentName string) (*Environment, error) { environmentPath := fmt.Sprintf(fmtEnvParamPath, appName, environmentName) environmentParam, err := s.ssm.GetParameter(&ssm.GetParameterInput{ Name: aws.String(environmentPath), }) if err != nil { if aerr, ok := err.(awserr.Error); ok { switch aerr.Code() { case ssm.ErrCodeParameterNotFound: return nil, &ErrNoSuchEnvironment{ ApplicationName: appName, EnvironmentName: environmentName, } } } return nil, fmt.Errorf("get environment %s in application %s: %w", environmentName, appName, err) } var env Environment err = json.Unmarshal([]byte(*environmentParam.Parameter.Value), &env) if err != nil { return nil, fmt.Errorf("read configuration for environment %s in application %s: %w", environmentName, appName, err) } return &env, nil } // ListEnvironments returns all environments belonging to a particular application. func (s *Store) ListEnvironments(appName string) ([]*Environment, error) { var environments []*Environment environmentsPath := fmt.Sprintf(rootEnvParamPath, appName) serializedEnvs, err := s.listParams(environmentsPath) if err != nil { return nil, fmt.Errorf("list environments for application %s: %w", appName, err) } for _, serializedEnv := range serializedEnvs { var env Environment if err := json.Unmarshal([]byte(*serializedEnv), &env); err != nil { return nil, fmt.Errorf("read environment configuration for application %s: %w", appName, err) } environments = append(environments, &env) } sort.SliceStable(environments, func(i, j int) bool { return environments[i].Name < environments[j].Name }) return environments, nil } // DeleteEnvironment removes an environment from SSM. // If the environment does not exist in the store or is successfully deleted then returns nil. Otherwise, returns an error. func (s *Store) DeleteEnvironment(appName, environmentName string) error { paramName := fmt.Sprintf(fmtEnvParamPath, appName, environmentName) _, err := s.ssm.DeleteParameter(&ssm.DeleteParameterInput{ Name: aws.String(paramName), }) if err != nil { if aerr, ok := err.(awserr.Error); ok { switch aerr.Code() { case ssm.ErrCodeParameterNotFound: return nil } } return fmt.Errorf("delete environment %s from application %s: %w", environmentName, appName, err) } return nil }
178
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package config import ( "errors" "fmt" "testing" "github.com/aws/aws-sdk-go/aws" "github.com/aws/aws-sdk-go/aws/awserr" "github.com/aws/aws-sdk-go/service/ssm" "github.com/stretchr/testify/require" ) func TestStore_ListEnvironments(t *testing.T) { testEnvironment := Environment{Name: "test", AccountID: "12345", App: "chicken", Region: "us-west-2s"} testEnvironmentString, err := marshal(testEnvironment) testEnvironmentPath := fmt.Sprintf(fmtEnvParamPath, testEnvironment.App, testEnvironment.Name) require.NoError(t, err, "Marshal test environment should not fail") prodPDXEnv := Environment{Name: "prod-pdx", AccountID: "12345", App: "chicken", Region: "us-west-2"} prodPDXEnvString, err := marshal(prodPDXEnv) prodPDXEnvPath := fmt.Sprintf(fmtEnvParamPath, prodPDXEnv.App, prodPDXEnv.Name) require.NoError(t, err, "Marshal pdx environment should not fail") prodIADEnv := Environment{Name: "prod-iad", AccountID: "12345", App: "chicken", Region: "us-east-1"} prodIADEnvString, err := marshal(prodIADEnv) prodIADEnvPath := fmt.Sprintf(fmtEnvParamPath, prodIADEnv.App, prodIADEnv.Name) require.NoError(t, err, "Marshal iad environment should not fail") environmentPath := fmt.Sprintf(rootEnvParamPath, testEnvironment.App) lastPageInPaginatedResp := false testCases := map[string]struct { mockGetParametersByPath func(t *testing.T, param *ssm.GetParametersByPathInput) (*ssm.GetParametersByPathOutput, error) wantedEnvironments []Environment wantedErr error }{ "with multiple existing environments": { mockGetParametersByPath: func(t *testing.T, param *ssm.GetParametersByPathInput) (output *ssm.GetParametersByPathOutput, e error) { require.Equal(t, environmentPath, *param.Path) return &ssm.GetParametersByPathOutput{ Parameters: []*ssm.Parameter{ { Name: aws.String(prodIADEnvPath), Value: aws.String(prodIADEnvString), }, { Name: aws.String(testEnvironmentPath), Value: aws.String(testEnvironmentString), }, }, }, nil }, wantedEnvironments: []Environment{prodIADEnv, testEnvironment}, wantedErr: nil, }, "with malformed json": { mockGetParametersByPath: func(t *testing.T, param *ssm.GetParametersByPathInput) (output *ssm.GetParametersByPathOutput, e error) { require.Equal(t, environmentPath, *param.Path) return &ssm.GetParametersByPathOutput{ Parameters: []*ssm.Parameter{ { Name: aws.String(testEnvironmentPath), Value: aws.String("oops"), }, }, }, nil }, wantedErr: fmt.Errorf("read environment configuration for application chicken: invalid character 'o' looking for beginning of value"), }, "with SSM error": { mockGetParametersByPath: func(t *testing.T, param *ssm.GetParametersByPathInput) (output *ssm.GetParametersByPathOutput, e error) { require.Equal(t, environmentPath, *param.Path) return nil, fmt.Errorf("broken") }, wantedErr: fmt.Errorf("list environments for application chicken: broken"), }, "with paginated response": { mockGetParametersByPath: func(t *testing.T, param *ssm.GetParametersByPathInput) (output *ssm.GetParametersByPathOutput, e error) { require.Equal(t, environmentPath, *param.Path) if !lastPageInPaginatedResp { lastPageInPaginatedResp = true return &ssm.GetParametersByPathOutput{ Parameters: []*ssm.Parameter{ { Name: aws.String(prodPDXEnvPath), // Return "pdx" first on purpose to test if alphabetical ordering is maintained. Value: aws.String(prodPDXEnvString), }, }, NextToken: aws.String("more"), }, nil } return &ssm.GetParametersByPathOutput{ Parameters: []*ssm.Parameter{ { Name: aws.String(prodIADEnvPath), Value: aws.String(prodIADEnvString), }, { Name: aws.String(testEnvironmentPath), // Return "test" at the end to make sure prod environments are listed last. Value: aws.String(testEnvironmentString), }, }, }, nil }, wantedEnvironments: []Environment{prodIADEnv, prodPDXEnv, testEnvironment}, wantedErr: nil, }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { // GIVEN lastPageInPaginatedResp = false store := &Store{ ssm: &mockSSM{ t: t, mockGetParametersByPath: tc.mockGetParametersByPath, }, } // WHEN envPointers, err := store.ListEnvironments("chicken") // THEN if tc.wantedErr != nil { require.EqualError(t, err, tc.wantedErr.Error()) } else { var environments []Environment for _, e := range envPointers { environments = append(environments, *e) } require.Equal(t, tc.wantedEnvironments, environments) } }) } } func TestStore_GetEnvironment(t *testing.T) { testEnvironment := Environment{Name: "test", AccountID: "12345", App: "chicken", Region: "us-west-2s"} testEnvironmentString, err := marshal(testEnvironment) testEnvironmentPath := fmt.Sprintf(fmtEnvParamPath, testEnvironment.App, testEnvironment.Name) require.NoError(t, err, "Marshal environment should not fail") testCases := map[string]struct { mockGetParameter func(t *testing.T, param *ssm.GetParameterInput) (*ssm.GetParameterOutput, error) wantedEnvironment Environment wantedErr error }{ "with existing environment": { mockGetParameter: func(t *testing.T, param *ssm.GetParameterInput) (*ssm.GetParameterOutput, error) { require.Equal(t, testEnvironmentPath, *param.Name) return &ssm.GetParameterOutput{ Parameter: &ssm.Parameter{ Name: aws.String(testEnvironmentPath), Value: aws.String(testEnvironmentString), }, }, nil }, wantedEnvironment: testEnvironment, wantedErr: nil, }, "with no existing environment": { mockGetParameter: func(t *testing.T, param *ssm.GetParameterInput) (*ssm.GetParameterOutput, error) { require.Equal(t, testEnvironmentPath, *param.Name) return nil, awserr.New(ssm.ErrCodeParameterNotFound, "bloop", nil) }, wantedErr: &ErrNoSuchEnvironment{ ApplicationName: testEnvironment.App, EnvironmentName: testEnvironment.Name, }, }, "with malformed json": { mockGetParameter: func(t *testing.T, param *ssm.GetParameterInput) (*ssm.GetParameterOutput, error) { require.Equal(t, testEnvironmentPath, *param.Name) return &ssm.GetParameterOutput{ Parameter: &ssm.Parameter{ Name: aws.String(testEnvironmentPath), Value: aws.String("oops"), }, }, nil }, wantedErr: fmt.Errorf("read configuration for environment test in application chicken: invalid character 'o' looking for beginning of value"), }, "with SSM error": { mockGetParameter: func(t *testing.T, param *ssm.GetParameterInput) (*ssm.GetParameterOutput, error) { return nil, fmt.Errorf("broken") }, wantedErr: fmt.Errorf("get environment test in application chicken: broken"), }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { // GIVEN store := &Store{ ssm: &mockSSM{ t: t, mockGetParameter: tc.mockGetParameter, }, } // WHEN env, err := store.GetEnvironment("chicken", "test") // THEN if tc.wantedErr != nil { require.EqualError(t, err, tc.wantedErr.Error()) } else { require.Equal(t, tc.wantedEnvironment, *env) } }) } } func TestStore_CreateEnvironment(t *testing.T) { testApplication := Application{Name: "chicken", Version: "1.0"} testApplicationString, err := marshal(testApplication) testApplicationPath := fmt.Sprintf(fmtApplicationPath, testApplication.Name) require.NoError(t, err, "Marshal application should not fail") testCustomConfig := &CustomizeEnv{ ImportVPC: &ImportVPC{ ID: "mockID", PrivateSubnetIDs: []string{"mockPrivateSubnet"}, PublicSubnetIDs: []string{"mockPublicSubnet"}, }, VPCConfig: &AdjustVPC{ CIDR: "mockCIDR", PrivateSubnetCIDRs: []string{"mockSubnetCIDR"}, PublicSubnetCIDRs: []string{"mockSubnetCIDR"}, }, } testEnvironment := Environment{Name: "test", App: testApplication.Name, AccountID: "1234", Region: "us-west-2", CustomConfig: testCustomConfig} testEnvironmentString, err := marshal(testEnvironment) testEnvironmentPath := fmt.Sprintf(fmtEnvParamPath, testEnvironment.App, testEnvironment.Name) require.NoError(t, err, "Marshal environment should not fail") tagsForEnvParam := []*ssm.Tag{ { Key: aws.String("copilot-application"), Value: aws.String(testEnvironment.App), }, { Key: aws.String("copilot-environment"), Value: aws.String(testEnvironment.Name), }, } testCases := map[string]struct { mockGetParameter func(t *testing.T, param *ssm.GetParameterInput) (*ssm.GetParameterOutput, error) mockPutParameter func(t *testing.T, param *ssm.PutParameterInput) (*ssm.PutParameterOutput, error) wantedErr error }{ "with no existing environment": { mockPutParameter: func(t *testing.T, param *ssm.PutParameterInput) (*ssm.PutParameterOutput, error) { require.Equal(t, testEnvironmentPath, *param.Name) require.Equal(t, testEnvironmentString, *param.Value) require.Equal(t, tagsForEnvParam, param.Tags) return &ssm.PutParameterOutput{ Version: aws.Int64(1), }, nil }, mockGetParameter: func(t *testing.T, param *ssm.GetParameterInput) (*ssm.GetParameterOutput, error) { require.Equal(t, testApplicationPath, *param.Name) return &ssm.GetParameterOutput{ Parameter: &ssm.Parameter{ Name: aws.String(testApplicationPath), Value: aws.String(testApplicationString), }, }, nil }, wantedErr: nil, }, "with existing environment": { mockPutParameter: func(t *testing.T, param *ssm.PutParameterInput) (*ssm.PutParameterOutput, error) { require.Equal(t, testEnvironmentPath, *param.Name) require.Equal(t, tagsForEnvParam, param.Tags) return nil, awserr.New(ssm.ErrCodeParameterAlreadyExists, "Already exists", fmt.Errorf("Already Exists")) }, mockGetParameter: func(t *testing.T, param *ssm.GetParameterInput) (*ssm.GetParameterOutput, error) { require.Equal(t, testApplicationPath, *param.Name) return &ssm.GetParameterOutput{ Parameter: &ssm.Parameter{ Name: aws.String(testApplicationPath), Value: aws.String(testApplicationString), }, }, nil }, wantedErr: nil, }, "with SSM error": { mockPutParameter: func(t *testing.T, param *ssm.PutParameterInput) (*ssm.PutParameterOutput, error) { require.Equal(t, tagsForEnvParam, param.Tags) return nil, fmt.Errorf("broken") }, mockGetParameter: func(t *testing.T, param *ssm.GetParameterInput) (*ssm.GetParameterOutput, error) { require.Equal(t, testApplicationPath, *param.Name) return &ssm.GetParameterOutput{ Parameter: &ssm.Parameter{ Name: aws.String(testApplicationPath), Value: aws.String(testApplicationString), }, }, nil }, wantedErr: fmt.Errorf("create environment test in application chicken: broken"), }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { // GIVEN store := &Store{ ssm: &mockSSM{ t: t, mockPutParameter: tc.mockPutParameter, mockGetParameter: tc.mockGetParameter, }, } // WHEN err := store.CreateEnvironment(&Environment{ Name: testEnvironment.Name, App: testEnvironment.App, AccountID: testEnvironment.AccountID, Region: testEnvironment.Region, CustomConfig: testEnvironment.CustomConfig, }) // THEN if tc.wantedErr != nil { require.EqualError(t, err, tc.wantedErr.Error()) } }) } } func TestStore_DeleteEnvironment(t *testing.T) { testCases := map[string]struct { inApplicationName string inEnvName string mockDeleteParam func(t *testing.T, in *ssm.DeleteParameterInput) (*ssm.DeleteParameterOutput, error) wantedError error }{ "parameter is already deleted": { inApplicationName: "phonetool", inEnvName: "test", mockDeleteParam: func(t *testing.T, in *ssm.DeleteParameterInput) (*ssm.DeleteParameterOutput, error) { return nil, awserr.New(ssm.ErrCodeParameterNotFound, "Not found", nil) }, }, "unexpected error": { inApplicationName: "phonetool", inEnvName: "test", mockDeleteParam: func(t *testing.T, in *ssm.DeleteParameterInput) (*ssm.DeleteParameterOutput, error) { return nil, errors.New("some error") }, wantedError: errors.New("delete environment test from application phonetool: some error"), }, "successfully deleted param": { inApplicationName: "phonetool", inEnvName: "test", mockDeleteParam: func(t *testing.T, in *ssm.DeleteParameterInput) (*ssm.DeleteParameterOutput, error) { wantedPath := fmt.Sprintf(fmtEnvParamPath, "phonetool", "test") require.Equal(t, wantedPath, *in.Name) return nil, nil }, }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { // GIVEN store := &Store{ ssm: &mockSSM{ t: t, mockDeleteParameter: tc.mockDeleteParam, }, } // WHEN err := store.DeleteEnvironment(tc.inApplicationName, tc.inEnvName) // THEN if tc.wantedError != nil { require.EqualError(t, err, tc.wantedError.Error()) } else { require.NoError(t, err) } }) } }
403
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package config import "fmt" // ErrNoSuchApplication means an application couldn't be found within a specific account and region. type ErrNoSuchApplication struct { ApplicationName string AccountID string Region string } // Is returns whether the provided error equals this error. func (e *ErrNoSuchApplication) Is(target error) bool { t, ok := target.(*ErrNoSuchApplication) if !ok { return false } return e.ApplicationName == t.ApplicationName && e.AccountID == t.AccountID && e.Region == t.Region } func (e *ErrNoSuchApplication) Error() string { return fmt.Sprintf("couldn't find an application named %s in account %s and region %s", e.ApplicationName, e.AccountID, e.Region) } // ErrNoSuchEnvironment means a specific environment couldn't be found in a specific project. type ErrNoSuchEnvironment struct { ApplicationName string EnvironmentName string } // Is returns whether the provided error equals this error. func (e *ErrNoSuchEnvironment) Is(target error) bool { t, ok := target.(*ErrNoSuchEnvironment) if !ok { return false } return e.ApplicationName == t.ApplicationName && e.EnvironmentName == t.EnvironmentName } func (e *ErrNoSuchEnvironment) Error() string { return fmt.Sprintf("couldn't find environment %s in the application %s", e.EnvironmentName, e.ApplicationName) } // ErrNoSuchService means a specific service couldn't be found in a specific application. type ErrNoSuchService struct { App string Name string } // Is returns whether the provided error equals this error. func (e *ErrNoSuchService) Is(target error) bool { t, ok := target.(*ErrNoSuchService) if !ok { return false } return e.App == t.App && e.Name == t.Name } func (e *ErrNoSuchService) Error() string { return fmt.Sprintf("couldn't find service %s in the application %s", e.Name, e.App) } // ErrNoSuchJob means a specific job couldn't be found in a specific application. type ErrNoSuchJob struct { App string Name string } // Is returns whether the provided error equals this error. func (e *ErrNoSuchJob) Is(target error) bool { t, ok := target.(*ErrNoSuchJob) if !ok { return false } return e.App == t.App && e.Name == t.Name } func (e *ErrNoSuchJob) Error() string { return fmt.Sprintf("couldn't find job %s in the application %s", e.Name, e.App) } // errNoSuchWorkload means a workload couldn't be found in a specific application. type errNoSuchWorkload struct { App string Name string } // Is returns whether the provided error equals this error func (e *errNoSuchWorkload) Is(target error) bool { t, ok := target.(*errNoSuchWorkload) if !ok { return false } return e.App == t.App && e.Name == t.Name } func (e *errNoSuchWorkload) Error() string { return fmt.Sprintf("couldn't find %s in the application %s", e.Name, e.App) }
113
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package config import ( "errors" "testing" "github.com/stretchr/testify/require" ) func TestErrNoSuchApplication(t *testing.T) { err := &ErrNoSuchApplication{ApplicationName: "chicken", AccountID: "12345", Region: "us-west-2"} require.EqualError(t, err, "couldn't find an application named chicken in account 12345 and region us-west-2") } func TestErrNoSuchApplication_Is(t *testing.T) { err := &ErrNoSuchApplication{ApplicationName: "chicken", AccountID: "12345", Region: "us-west-2"} testCases := map[string]struct { wantedSame bool otherError error }{ "errors are same": { wantedSame: true, otherError: &ErrNoSuchApplication{ApplicationName: "chicken", AccountID: "12345", Region: "us-west-2"}, }, "errors have different values": { wantedSame: false, otherError: &ErrNoSuchApplication{ApplicationName: "rooster", AccountID: "12345", Region: "us-west-2"}, }, "errors are different type": { wantedSame: false, otherError: errors.New("different error"), }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { require.Equal(t, err.Is(tc.otherError), tc.wantedSame) }) } } func TestErrNoSuchEnvironment(t *testing.T) { err := &ErrNoSuchEnvironment{EnvironmentName: "test", ApplicationName: "chicken"} require.EqualError(t, err, "couldn't find environment test in the application chicken") } func TestErrNoSuchEnvironment_Is(t *testing.T) { err := &ErrNoSuchEnvironment{EnvironmentName: "test", ApplicationName: "chicken"} testCases := map[string]struct { wantedSame bool otherError error }{ "errors are same": { wantedSame: true, otherError: &ErrNoSuchEnvironment{EnvironmentName: "test", ApplicationName: "chicken"}, }, "errors have different values": { wantedSame: false, otherError: &ErrNoSuchEnvironment{EnvironmentName: "test", ApplicationName: "rooster"}, }, "errors are different type": { wantedSame: false, otherError: errors.New("different error"), }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { require.Equal(t, err.Is(tc.otherError), tc.wantedSame) }) } } func TestErrNoSuchService(t *testing.T) { err := &ErrNoSuchService{Name: "api", App: "chicken"} require.EqualError(t, err, "couldn't find service api in the application chicken") } func TestErrNoSuchService_Is(t *testing.T) { err := &ErrNoSuchService{Name: "api", App: "chicken"} testCases := map[string]struct { wantedSame bool otherError error }{ "errors are same": { wantedSame: true, otherError: &ErrNoSuchService{Name: "api", App: "chicken"}, }, "errors have different values": { wantedSame: false, otherError: &ErrNoSuchService{Name: "api", App: "rooster"}, }, "errors are different type": { wantedSame: false, otherError: errors.New("different error"), }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { require.Equal(t, err.Is(tc.otherError), tc.wantedSame) }) } } func TestErrNoSuchJob(t *testing.T) { err := &ErrNoSuchJob{Name: "mailer", App: "cool"} require.EqualError(t, err, "couldn't find job mailer in the application cool") } func TestErrNoSuchJob_Is(t *testing.T) { err := &ErrNoSuchJob{Name: "mailer", App: "cool"} testCases := map[string]struct { wantedSame bool otherError error }{ "errors are same": { wantedSame: true, otherError: &ErrNoSuchJob{Name: "mailer", App: "cool"}, }, "errors have different values": { wantedSame: false, otherError: &ErrNoSuchJob{Name: "ranker", App: "cool"}, }, "errors are different types": { wantedSame: false, otherError: errors.New("something else broke"), }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { require.Equal(t, err.Is(tc.otherError), tc.wantedSame) }) } }
135
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 /* Package config implements CRUD operations for application, environment, service and pipeline configuration. This configuration contains the Copilot applications a customer has, and the environments and pipelines associated with each application. */ package config import ( "encoding/json" "log" "github.com/aws/aws-sdk-go/aws" "github.com/aws/aws-sdk-go/service/ssm" "github.com/aws/copilot-cli/internal/pkg/aws/identity" ) // Parameter name formats for resources in an application. Applications are laid out in SSM // based on path - each parameter's key has a certain format, and you can have // hierarchies based on that format. Applications are at the root of the hierarchy. // Searching SSM for all parameters with the `rootApplicationPath` key will give you // all the application keys, for example. // current schema Version for Apps. const schemaVersion = "1.0" // schema formats supported in current schemaVersion. NOTE: May change to map in the future. const ( rootApplicationPath = "/copilot/applications/" fmtApplicationPath = "/copilot/applications/%s" rootEnvParamPath = "/copilot/applications/%s/environments/" fmtEnvParamPath = "/copilot/applications/%s/environments/%s" // path for an environment in an application rootWkldParamPath = "/copilot/applications/%s/components/" fmtWkldParamPath = "/copilot/applications/%s/components/%s" // path for a workload in an application ) // IAMIdentityGetter is the interface to get information about the IAM user or role whose credentials are used to make AWS requests. type IAMIdentityGetter interface { Get() (identity.Caller, error) } // SSM is the interface for the AWS SSM client. type SSM interface { PutParameter(in *ssm.PutParameterInput) (*ssm.PutParameterOutput, error) GetParametersByPath(in *ssm.GetParametersByPathInput) (*ssm.GetParametersByPathOutput, error) GetParameter(in *ssm.GetParameterInput) (*ssm.GetParameterOutput, error) DeleteParameter(in *ssm.DeleteParameterInput) (*ssm.DeleteParameterOutput, error) } // Store is in charge of fetching and creating applications, environment, services and other workloads, and pipeline configuration in SSM. type Store struct { sts IAMIdentityGetter ssm SSM appRegion string } // NewSSMStore returns a new store, allowing you to query or create Applications, Environments, Services, and other workloads. func NewSSMStore(sts IAMIdentityGetter, ssm SSM, appRegion string) *Store { return &Store{ sts: sts, ssm: ssm, appRegion: appRegion, } } func (s *Store) listParams(path string) ([]*string, error) { var serializedParams []*string var nextToken *string for { params, err := s.ssm.GetParametersByPath(&ssm.GetParametersByPathInput{ Path: aws.String(path), Recursive: aws.Bool(false), NextToken: nextToken, }) if err != nil { return nil, err } for _, param := range params.Parameters { serializedParams = append(serializedParams, param.Value) } nextToken = params.NextToken if nextToken == nil { break } } return serializedParams, nil } // Retrieves the caller's Account ID with a best effort. If it fails to fetch the Account ID, // this returns "unknown". func (s *Store) getCallerAccountAndRegion() (string, string) { identity, err := s.sts.Get() region := s.appRegion if err != nil { log.Printf("Failed to get caller's Account ID %v", err) return "unknown", region } return identity.Account, region } func marshal(e interface{}) (string, error) { b, err := json.Marshal(e) if err != nil { return "", err } return string(b), nil }
115
copilot-cli
aws
Go
//go:build integration // Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package config_test import ( "math/rand" "testing" "time" "github.com/aws/aws-sdk-go/aws" "github.com/aws/aws-sdk-go/service/ssm" "github.com/aws/copilot-cli/internal/pkg/aws/identity" "github.com/aws/copilot-cli/internal/pkg/aws/sessions" "github.com/aws/copilot-cli/internal/pkg/config" "github.com/stretchr/testify/require" ) func init() { rand.Seed(time.Now().UnixNano()) } func Test_SSM_Application_Integration(t *testing.T) { defaultSess, err := sessions.ImmutableProvider().Default() require.NoError(t, err) store := config.NewSSMStore(identity.New(defaultSess), ssm.New(defaultSess), aws.StringValue(defaultSess.Config.Region)) applicationToCreate := config.Application{Name: randStringBytes(10), Version: "1.0"} defer store.DeleteApplication(applicationToCreate.Name) t.Run("Create, Get and List Applications", func(t *testing.T) { // Create our first application err := store.CreateApplication(&applicationToCreate) require.NoError(t, err) // Can't overwrite an existing application err = store.CreateApplication(&applicationToCreate) require.NoError(t, err) // Fetch the application back from SSM application, err := store.GetApplication(applicationToCreate.Name) require.NoError(t, err) require.Equal(t, applicationToCreate, *application) // List returns a non-empty list of applications applications, err := store.ListApplications() require.NoError(t, err) require.NotEmpty(t, applications) }) } func Test_SSM_Environment_Integration(t *testing.T) { defaultSess, err := sessions.ImmutableProvider().Default() require.NoError(t, err) store := config.NewSSMStore(identity.New(defaultSess), ssm.New(defaultSess), aws.StringValue(defaultSess.Config.Region)) applicationToCreate := config.Application{Name: randStringBytes(10), Version: "1.0"} testEnvironment := config.Environment{Name: "test", App: applicationToCreate.Name, Region: "us-west-2", AccountID: " 1234"} prodEnvironment := config.Environment{Name: "prod", App: applicationToCreate.Name, Region: "us-west-2", AccountID: " 1234"} defer func() { store.DeleteEnvironment(applicationToCreate.Name, testEnvironment.Name) store.DeleteEnvironment(applicationToCreate.Name, prodEnvironment.Name) store.DeleteApplication(applicationToCreate.Name) }() t.Run("Create, Get and List Environments", func(t *testing.T) { // Create our first application err := store.CreateApplication(&applicationToCreate) require.NoError(t, err) // Make sure there are no envs with our new application envs, err := store.ListEnvironments(applicationToCreate.Name) require.NoError(t, err) require.Empty(t, envs) // Add our environments err = store.CreateEnvironment(&testEnvironment) require.NoError(t, err) err = store.CreateEnvironment(&prodEnvironment) require.NoError(t, err) // Skip and do not return error if environment already exists err = store.CreateEnvironment(&prodEnvironment) require.NoError(t, err) // Wait for consistency to kick in (ssm path commands are eventually consistent) time.Sleep(5 * time.Second) // Make sure all the environments are under our application envs, err = store.ListEnvironments(applicationToCreate.Name) require.NoError(t, err) var environments []config.Environment for _, e := range envs { environments = append(environments, *e) } require.ElementsMatch(t, environments, []config.Environment{testEnvironment, prodEnvironment}) // Fetch our saved environments, one by one env, err := store.GetEnvironment(applicationToCreate.Name, testEnvironment.Name) require.NoError(t, err) require.Equal(t, testEnvironment, *env) env, err = store.GetEnvironment(applicationToCreate.Name, prodEnvironment.Name) require.NoError(t, err) require.Equal(t, prodEnvironment, *env) }) } func Test_SSM_Service_Integration(t *testing.T) { defaultSess, err := sessions.ImmutableProvider().Default() require.NoError(t, err) store := config.NewSSMStore(identity.New(defaultSess), ssm.New(defaultSess), aws.StringValue(defaultSess.Config.Region)) applicationToCreate := config.Application{Name: randStringBytes(10), Version: "1.0"} apiService := config.Workload{Name: "api", App: applicationToCreate.Name, Type: "Load Balanced Web Service"} feService := config.Workload{Name: "front-end", App: applicationToCreate.Name, Type: "Load Balanced Web Service"} defer func() { store.DeleteService(applicationToCreate.Name, apiService.Name) store.DeleteService(applicationToCreate.Name, feService.Name) store.DeleteApplication(applicationToCreate.Name) }() t.Run("Create, Get and List Applications", func(t *testing.T) { // Create our first application err := store.CreateApplication(&applicationToCreate) require.NoError(t, err) // Make sure there are no svcs with our new application svcs, err := store.ListServices(applicationToCreate.Name) require.NoError(t, err) require.Empty(t, svcs) // Add our services err = store.CreateService(&apiService) require.NoError(t, err) err = store.CreateService(&feService) require.NoError(t, err) // Skip and do not return error if services already exists err = store.CreateService(&feService) require.NoError(t, err) // Wait for consistency to kick in (ssm path commands are eventually consistent) time.Sleep(5 * time.Second) // Make sure all the svcs are under our application svcs, err = store.ListServices(applicationToCreate.Name) require.NoError(t, err) var services []config.Workload for _, s := range svcs { services = append(services, *s) } require.ElementsMatch(t, services, []config.Workload{apiService, feService}) // Fetch our saved svcs, one by one svc, err := store.GetService(applicationToCreate.Name, apiService.Name) require.NoError(t, err) require.Equal(t, apiService, *svc) svc, err = store.GetService(applicationToCreate.Name, feService.Name) require.NoError(t, err) require.Equal(t, feService, *svc) }) } const letterBytes = "abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ" func randStringBytes(n int) string { b := make([]byte, n) for i := range b { b[i] = letterBytes[rand.Intn(len(letterBytes))] } return string(b) }
181
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package config import ( "testing" "github.com/aws/aws-sdk-go/service/ssm" "github.com/aws/aws-sdk-go/service/ssm/ssmiface" "github.com/aws/copilot-cli/internal/pkg/aws/identity" ) type mockSSM struct { ssmiface.SSMAPI t *testing.T mockPutParameter func(t *testing.T, param *ssm.PutParameterInput) (*ssm.PutParameterOutput, error) mockGetParametersByPath func(t *testing.T, param *ssm.GetParametersByPathInput) (*ssm.GetParametersByPathOutput, error) mockGetParameter func(t *testing.T, param *ssm.GetParameterInput) (*ssm.GetParameterOutput, error) mockDeleteParameter func(t *testing.T, param *ssm.DeleteParameterInput) (*ssm.DeleteParameterOutput, error) } func (m *mockSSM) PutParameter(in *ssm.PutParameterInput) (*ssm.PutParameterOutput, error) { return m.mockPutParameter(m.t, in) } func (m *mockSSM) GetParametersByPath(in *ssm.GetParametersByPathInput) (*ssm.GetParametersByPathOutput, error) { return m.mockGetParametersByPath(m.t, in) } func (m *mockSSM) GetParameter(in *ssm.GetParameterInput) (*ssm.GetParameterOutput, error) { return m.mockGetParameter(m.t, in) } func (m *mockSSM) DeleteParameter(in *ssm.DeleteParameterInput) (*ssm.DeleteParameterOutput, error) { return m.mockDeleteParameter(m.t, in) } type mockIdentityService struct { mockIdentityServiceGet func() (identity.Caller, error) } func (m mockIdentityService) Get() (identity.Caller, error) { return m.mockIdentityServiceGet() }
46
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package config import ( "encoding/json" "errors" "fmt" "github.com/aws/aws-sdk-go/aws" "github.com/aws/aws-sdk-go/aws/awserr" "github.com/aws/aws-sdk-go/service/ssm" "github.com/aws/copilot-cli/internal/pkg/manifest/manifestinfo" ) // Workload represents a deployable long-running service or task. type Workload struct { App string `json:"app"` // Name of the app this workload belongs to. Name string `json:"name"` // Name of the workload, which must be unique within an app. Type string `json:"type"` // Type of the workload (ex: Load Balanced Web Service, etc) } // CreateService instantiates a new service within an existing application. Skip if // the service already exists in the application. func (s *Store) CreateService(svc *Workload) error { if err := s.createWorkload(svc); err != nil { return fmt.Errorf("create service %s in application %s: %w", svc.Name, svc.App, err) } return nil } // CreateJob instantiates a new job within an existing application. Skip if the job already // exists in the application. func (s *Store) CreateJob(job *Workload) error { if err := s.createWorkload(job); err != nil { return fmt.Errorf("create job %s in application %s: %w", job.Name, job.App, err) } return nil } func (s *Store) createWorkload(wkld *Workload) error { if _, err := s.GetApplication(wkld.App); err != nil { return err } wkldPath := fmt.Sprintf(fmtWkldParamPath, wkld.App, wkld.Name) data, err := marshal(wkld) if err != nil { return fmt.Errorf("serialize data: %w", err) } _, err = s.ssm.PutParameter(&ssm.PutParameterInput{ Name: aws.String(wkldPath), Description: aws.String(fmt.Sprintf("Copilot %s %s", wkld.Type, wkld.Name)), Type: aws.String(ssm.ParameterTypeString), Value: aws.String(data), Tags: []*ssm.Tag{ { Key: aws.String("copilot-application"), Value: aws.String(wkld.App), }, { Key: aws.String("copilot-service"), Value: aws.String(wkld.Name), }, }, }) if err != nil { if aerr, ok := err.(awserr.Error); ok { switch aerr.Code() { case ssm.ErrCodeParameterAlreadyExists: return nil } } return err } return nil } // GetService gets a service belonging to a particular application by name. If no job or svc is found // it returns ErrNoSuchService. func (s *Store) GetService(appName, svcName string) (*Workload, error) { param, err := s.getWorkloadParam(appName, svcName) if err != nil { var errNoSuchWkld *errNoSuchWorkload if errors.As(err, &errNoSuchWkld) { return nil, &ErrNoSuchService{ App: appName, Name: svcName, } } return nil, err } var svc Workload err = json.Unmarshal(param, &svc) if err != nil { return nil, fmt.Errorf("read configuration for service %s in application %s: %w", svcName, appName, err) } if !manifestinfo.IsTypeAService(svc.Type) { return nil, &ErrNoSuchService{ App: appName, Name: svcName, } } return &svc, nil } // GetJob gets a job belonging to a particular application by name. If no job by that name is found, // it returns ErrNoSuchJob. func (s *Store) GetJob(appName, jobName string) (*Workload, error) { param, err := s.getWorkloadParam(appName, jobName) if err != nil { var errNoSuchWkld *errNoSuchWorkload if errors.As(err, &errNoSuchWkld) { return nil, &ErrNoSuchJob{ App: appName, Name: jobName, } } return nil, err } var job Workload err = json.Unmarshal(param, &job) if err != nil { return nil, fmt.Errorf("read configuration for job %s in application %s: %w", jobName, appName, err) } if !manifestinfo.IsTypeAJob(job.Type) { return nil, &ErrNoSuchJob{ App: appName, Name: jobName, } } return &job, nil } // GetWorkload gets a workload belonging to an application by name. func (s *Store) GetWorkload(appName, name string) (*Workload, error) { param, err := s.getWorkloadParam(appName, name) if err != nil { return nil, err } var wl Workload err = json.Unmarshal(param, &wl) if err != nil { return nil, fmt.Errorf("read configuration for %s in application %s: %w", name, appName, err) } return &wl, nil } func (s *Store) getWorkloadParam(appName, name string) ([]byte, error) { wlPath := fmt.Sprintf(fmtWkldParamPath, appName, name) wlParam, err := s.ssm.GetParameter(&ssm.GetParameterInput{ Name: aws.String(wlPath), }) if err != nil { if aerr, ok := err.(awserr.Error); ok { switch aerr.Code() { case ssm.ErrCodeParameterNotFound: return nil, &errNoSuchWorkload{ App: appName, Name: name, } } } return nil, err } return []byte(*wlParam.Parameter.Value), nil } // ListServices returns all services belonging to a particular application. func (s *Store) ListServices(appName string) ([]*Workload, error) { wklds, err := s.listWorkloads(appName) if err != nil { return nil, fmt.Errorf("read service configuration for application %s: %w", appName, err) } var services []*Workload for _, wkld := range wklds { if manifestinfo.IsTypeAService(wkld.Type) { services = append(services, wkld) } } return services, nil } // ListJobs returns all jobs belonging to a particular application. func (s *Store) ListJobs(appName string) ([]*Workload, error) { wklds, err := s.listWorkloads(appName) if err != nil { return nil, fmt.Errorf("read job configuration for application %s: %w", appName, err) } var jobs []*Workload for _, wkld := range wklds { if manifestinfo.IsTypeAJob(wkld.Type) { jobs = append(jobs, wkld) } } return jobs, nil } // ListWorkloads returns all workloads belonging to a particular application. func (s *Store) ListWorkloads(appName string) ([]*Workload, error) { wklds, err := s.listWorkloads(appName) if err != nil { return nil, fmt.Errorf("read workload configuration for application %s: %w", appName, err) } return wklds, nil } func (s *Store) listWorkloads(appName string) ([]*Workload, error) { var workloads []*Workload workloadsPath := fmt.Sprintf(rootWkldParamPath, appName) serializedWklds, err := s.listParams(workloadsPath) if err != nil { return nil, err } for _, serializedWkld := range serializedWklds { var wkld Workload if err := json.Unmarshal([]byte(*serializedWkld), &wkld); err != nil { return nil, err } workloads = append(workloads, &wkld) } return workloads, nil } // DeleteService removes a service from SSM. // If the service does not exist in the store or is successfully deleted then returns nil. Otherwise, returns an error. func (s *Store) DeleteService(appName, svcName string) error { if err := s.deleteWorkload(appName, svcName); err != nil { return fmt.Errorf("delete service %s from application %s: %w", svcName, appName, err) } return nil } // DeleteJob removes a job from SSM. // If the job does not exist in the store or is successfully deleted then returns nil. Otherwise, returns an error. func (s *Store) DeleteJob(appName, jobName string) error { if err := s.deleteWorkload(appName, jobName); err != nil { return fmt.Errorf("delete job %s from application %s: %w", jobName, appName, err) } return nil } func (s *Store) deleteWorkload(appName, wkldName string) error { paramName := fmt.Sprintf(fmtWkldParamPath, appName, wkldName) _, err := s.ssm.DeleteParameter(&ssm.DeleteParameterInput{ Name: aws.String(paramName), }) if err != nil { if aerr, ok := err.(awserr.Error); ok { switch aerr.Code() { case ssm.ErrCodeParameterNotFound: return nil } } return err } return nil }
271
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package config import ( "errors" "fmt" "testing" "github.com/aws/aws-sdk-go/aws" "github.com/aws/aws-sdk-go/aws/awserr" "github.com/aws/aws-sdk-go/service/ssm" "github.com/stretchr/testify/require" ) func TestStore_ListServices(t *testing.T) { frontendService := Workload{Name: "fe", App: "chicken", Type: "Load Balanced Web Service"} frontendServiceString, err := marshal(frontendService) frontendServicePath := fmt.Sprintf(fmtWkldParamPath, frontendService.App, frontendService.Name) require.NoError(t, err, "Marshal svc should not fail") apiService := Workload{Name: "api", App: "chicken", Type: "Load Balanced Web Service"} apiServiceString, err := marshal(apiService) apiServicePath := fmt.Sprintf(fmtWkldParamPath, apiService.App, apiService.Name) require.NoError(t, err, "Marshal svc should not fail") servicePath := fmt.Sprintf(rootWkldParamPath, frontendService.App) lastPageInPaginatedResp := false testCases := map[string]struct { mockGetParametersByPath func(t *testing.T, param *ssm.GetParametersByPathInput) (*ssm.GetParametersByPathOutput, error) wantedSvcs []Workload wantedErr error }{ "with multiple existing svcs": { mockGetParametersByPath: func(t *testing.T, param *ssm.GetParametersByPathInput) (output *ssm.GetParametersByPathOutput, e error) { require.Equal(t, servicePath, *param.Path) return &ssm.GetParametersByPathOutput{ Parameters: []*ssm.Parameter{ { Name: aws.String(frontendServicePath), Value: aws.String(frontendServiceString), }, { Name: aws.String(apiServicePath), Value: aws.String(apiServiceString), }, }, }, nil }, wantedSvcs: []Workload{apiService, frontendService}, wantedErr: nil, }, "with malformed json": { mockGetParametersByPath: func(t *testing.T, param *ssm.GetParametersByPathInput) (output *ssm.GetParametersByPathOutput, e error) { require.Equal(t, servicePath, *param.Path) return &ssm.GetParametersByPathOutput{ Parameters: []*ssm.Parameter{ { Name: aws.String(apiServicePath), Value: aws.String("oops"), }, }, }, nil }, wantedErr: fmt.Errorf("read service configuration for application chicken: invalid character 'o' looking for beginning of value"), }, "with SSM error": { mockGetParametersByPath: func(t *testing.T, param *ssm.GetParametersByPathInput) (output *ssm.GetParametersByPathOutput, e error) { require.Equal(t, servicePath, *param.Path) return nil, fmt.Errorf("broken") }, wantedErr: fmt.Errorf("read service configuration for application chicken: broken"), }, "with paginated response": { mockGetParametersByPath: func(t *testing.T, param *ssm.GetParametersByPathInput) (output *ssm.GetParametersByPathOutput, e error) { require.Equal(t, servicePath, *param.Path) if !lastPageInPaginatedResp { lastPageInPaginatedResp = true return &ssm.GetParametersByPathOutput{ Parameters: []*ssm.Parameter{ { Name: aws.String(frontendServicePath), Value: aws.String(frontendServiceString), }, }, NextToken: aws.String("more"), }, nil } return &ssm.GetParametersByPathOutput{ Parameters: []*ssm.Parameter{ { Name: aws.String(apiServicePath), Value: aws.String(apiServiceString), }, }, }, nil }, wantedSvcs: []Workload{apiService, frontendService}, wantedErr: nil, }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { // GIVEN lastPageInPaginatedResp = false store := &Store{ ssm: &mockSSM{ t: t, mockGetParametersByPath: tc.mockGetParametersByPath, }, } // WHEN svcPointers, err := store.ListServices("chicken") // THEN if tc.wantedErr != nil { require.EqualError(t, err, tc.wantedErr.Error()) } else { var services []Workload for _, s := range svcPointers { services = append(services, *s) } require.ElementsMatch(t, tc.wantedSvcs, services) } }) } } func TestStore_ListWorkloads(t *testing.T) { frontendService := Workload{Name: "fe", App: "chicken", Type: "Load Balanced Fargate Service"} frontendServiceString, err := marshal(frontendService) frontendServicePath := fmt.Sprintf(fmtWkldParamPath, frontendService.App, frontendService.Name) require.NoError(t, err, "Marshal svc should not fail") mailerJob := Workload{Name: "mailer", App: "chicken", Type: "Scheduled Job"} mailerJobString, err := marshal(mailerJob) mailerJobPath := fmt.Sprintf(fmtWkldParamPath, mailerJob.App, mailerJob.Name) require.NoError(t, err, "Marshal job should not fail") workloadPath := fmt.Sprintf(rootWkldParamPath, mailerJob.App) testCases := map[string]struct { mockGetParametersByPath func(t *testing.T, param *ssm.GetParametersByPathInput) (*ssm.GetParametersByPathOutput, error) wantedWls []Workload wantedErr error }{ "with existing workloads": { mockGetParametersByPath: func(t *testing.T, param *ssm.GetParametersByPathInput) (output *ssm.GetParametersByPathOutput, e error) { require.Equal(t, workloadPath, *param.Path) return &ssm.GetParametersByPathOutput{ Parameters: []*ssm.Parameter{ { Name: aws.String(mailerJobPath), Value: aws.String(mailerJobString), }, { Name: aws.String(frontendServicePath), Value: aws.String(frontendServiceString), }, }, }, nil }, wantedWls: []Workload{mailerJob, frontendService}, wantedErr: nil, }, "with job": { mockGetParametersByPath: func(t *testing.T, param *ssm.GetParametersByPathInput) (output *ssm.GetParametersByPathOutput, e error) { require.Equal(t, workloadPath, *param.Path) return &ssm.GetParametersByPathOutput{ Parameters: []*ssm.Parameter{ { Name: aws.String(mailerJobPath), Value: aws.String(mailerJobString), }, }, }, nil }, wantedWls: []Workload{mailerJob}, wantedErr: nil, }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { //GIVEN store := &Store{ ssm: &mockSSM{ t: t, mockGetParametersByPath: tc.mockGetParametersByPath, }, } // WHEN wlPointers, err := store.ListWorkloads("chicken") // THEN if tc.wantedErr != nil { require.EqualError(t, err, tc.wantedErr.Error()) } else { var wls []Workload for _, w := range wlPointers { wls = append(wls, *w) } require.ElementsMatch(t, tc.wantedWls, wls) } }) } } func TestStore_ListJobs(t *testing.T) { frontendService := Workload{Name: "fe", App: "chicken", Type: "Load Balanced Fargate Service"} frontendServiceString, err := marshal(frontendService) frontendServicePath := fmt.Sprintf(fmtWkldParamPath, frontendService.App, frontendService.Name) require.NoError(t, err, "Marshal svc should not fail") mailerJob := Workload{Name: "mailer", App: "chicken", Type: "Scheduled Job"} mailerJobString, err := marshal(mailerJob) mailerJobPath := fmt.Sprintf(fmtWkldParamPath, mailerJob.App, mailerJob.Name) require.NoError(t, err, "Marshal job should not fail") analyticsJob := Workload{Name: "analyzer", App: "chicken", Type: "Scheduled Job"} analyticsJobString, err := marshal(analyticsJob) analyticsJobPath := fmt.Sprintf(fmtWkldParamPath, analyticsJob.App, analyticsJob.Name) require.NoError(t, err, "Marshal job should not fail") workloadPath := fmt.Sprintf(rootWkldParamPath, mailerJob.App) testCases := map[string]struct { mockGetParametersByPath func(t *testing.T, param *ssm.GetParametersByPathInput) (*ssm.GetParametersByPathOutput, error) wantedJobs []Workload wantedErr error }{ "with existing jobs": { mockGetParametersByPath: func(t *testing.T, param *ssm.GetParametersByPathInput) (output *ssm.GetParametersByPathOutput, e error) { require.Equal(t, workloadPath, *param.Path) return &ssm.GetParametersByPathOutput{ Parameters: []*ssm.Parameter{ { Name: aws.String(mailerJobPath), Value: aws.String(mailerJobString), }, { Name: aws.String(analyticsJobPath), Value: aws.String(analyticsJobString), }, }, }, nil }, wantedJobs: []Workload{mailerJob, analyticsJob}, wantedErr: nil, }, "with service and job": { mockGetParametersByPath: func(t *testing.T, param *ssm.GetParametersByPathInput) (output *ssm.GetParametersByPathOutput, e error) { require.Equal(t, workloadPath, *param.Path) return &ssm.GetParametersByPathOutput{ Parameters: []*ssm.Parameter{ { Name: aws.String(mailerJobPath), Value: aws.String(mailerJobString), }, { Name: aws.String(frontendServicePath), Value: aws.String(frontendServiceString), }, }, }, nil }, wantedJobs: []Workload{mailerJob}, wantedErr: nil, }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { //GIVEN store := &Store{ ssm: &mockSSM{ t: t, mockGetParametersByPath: tc.mockGetParametersByPath, }, } // WHEN jobPointers, err := store.ListJobs("chicken") // THEN if tc.wantedErr != nil { require.EqualError(t, err, tc.wantedErr.Error()) } else { var jobs []Workload for _, j := range jobPointers { jobs = append(jobs, *j) } require.ElementsMatch(t, tc.wantedJobs, jobs) } }) } } func TestStore_GetService(t *testing.T) { testService := Workload{Name: "api", App: "chicken", Type: "Load Balanced Web Service"} testServiceString, err := marshal(testService) testServicePath := fmt.Sprintf(fmtWkldParamPath, testService.App, testService.Name) require.NoError(t, err, "Marshal svc should not fail") testCases := map[string]struct { mockGetParameter func(t *testing.T, param *ssm.GetParameterInput) (*ssm.GetParameterOutput, error) wantedSvc Workload wantedErr error }{ "with existing service": { mockGetParameter: func(t *testing.T, param *ssm.GetParameterInput) (*ssm.GetParameterOutput, error) { require.Equal(t, testServicePath, *param.Name) return &ssm.GetParameterOutput{ Parameter: &ssm.Parameter{ Name: aws.String(testServicePath), Value: aws.String(testServiceString), }, }, nil }, wantedSvc: testService, wantedErr: nil, }, "with no existing svc": { mockGetParameter: func(t *testing.T, param *ssm.GetParameterInput) (*ssm.GetParameterOutput, error) { require.Equal(t, testServicePath, *param.Name) return nil, awserr.New(ssm.ErrCodeParameterNotFound, "bloop", nil) }, wantedErr: errors.New("couldn't find service api in the application chicken"), }, "with malformed json": { mockGetParameter: func(t *testing.T, param *ssm.GetParameterInput) (*ssm.GetParameterOutput, error) { require.Equal(t, testServicePath, *param.Name) return &ssm.GetParameterOutput{ Parameter: &ssm.Parameter{ Name: aws.String(testServicePath), Value: aws.String("oops"), }, }, nil }, wantedErr: fmt.Errorf("read configuration for service api in application chicken: invalid character 'o' looking for beginning of value"), }, "with SSM error": { mockGetParameter: func(t *testing.T, param *ssm.GetParameterInput) (*ssm.GetParameterOutput, error) { return nil, fmt.Errorf("broken") }, wantedErr: fmt.Errorf("broken"), }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { // GIVEN store := &Store{ ssm: &mockSSM{ t: t, mockGetParameter: tc.mockGetParameter, }, } // WHEN svc, err := store.GetService("chicken", "api") // THEN if tc.wantedErr != nil { require.EqualError(t, err, tc.wantedErr.Error()) } else { require.Equal(t, tc.wantedSvc, *svc) } }) } } func TestStore_GetJob(t *testing.T) { mailerJob := Workload{Name: "mailer", App: "chicken", Type: "Scheduled Job"} mailerJobString, err := marshal(mailerJob) mailerJobPath := fmt.Sprintf(fmtWkldParamPath, mailerJob.App, mailerJob.Name) require.NoError(t, err, "Marshal job should not fail") testService := Workload{Name: "mailer", App: "chicken", Type: "Load Balanced Fargate Service"} testServiceString, err := marshal(testService) testServicePath := fmt.Sprintf(fmtWkldParamPath, testService.App, testService.Name) require.NoError(t, err, "Marshal svc should not fail") testCases := map[string]struct { mockGetParameter func(t *testing.T, param *ssm.GetParameterInput) (*ssm.GetParameterOutput, error) wantedJob Workload wantedErr error }{ "with existing job": { mockGetParameter: func(t *testing.T, param *ssm.GetParameterInput) (*ssm.GetParameterOutput, error) { require.Equal(t, mailerJobPath, *param.Name) return &ssm.GetParameterOutput{ Parameter: &ssm.Parameter{ Name: aws.String(mailerJobPath), Value: aws.String(mailerJobString), }, }, nil }, wantedJob: mailerJob, wantedErr: nil, }, "with no existing job": { mockGetParameter: func(t *testing.T, param *ssm.GetParameterInput) (*ssm.GetParameterOutput, error) { require.Equal(t, mailerJobPath, *param.Name) return nil, awserr.New(ssm.ErrCodeParameterNotFound, "bloop", nil) }, wantedErr: errors.New("couldn't find job mailer in the application chicken"), }, "with existing service": { mockGetParameter: func(t *testing.T, param *ssm.GetParameterInput) (*ssm.GetParameterOutput, error) { require.Equal(t, mailerJobPath, *param.Name) return &ssm.GetParameterOutput{ Parameter: &ssm.Parameter{ Name: aws.String(testServicePath), Value: aws.String(testServiceString), }, }, nil }, wantedErr: &ErrNoSuchJob{ App: mailerJob.App, Name: mailerJob.Name, }, }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { // GIVEN store := &Store{ ssm: &mockSSM{ t: t, mockGetParameter: tc.mockGetParameter, }, } // WHEN job, err := store.GetJob("chicken", "mailer") // THEN if tc.wantedErr != nil { require.EqualError(t, err, tc.wantedErr.Error()) } else { require.Equal(t, tc.wantedJob, *job) } }) } } func TestStore_CreateService(t *testing.T) { testApplication := Application{Name: "chicken", Version: "1.0"} testApplicationString, err := marshal(testApplication) testApplicationPath := fmt.Sprintf(fmtApplicationPath, testApplication.Name) require.NoError(t, err, "Marshal app should not fail") testService := Workload{Name: "api", App: testApplication.Name, Type: "Load Balanced Fargate Service"} testServiceString, err := marshal(testService) testServicePath := fmt.Sprintf(fmtWkldParamPath, testService.App, testService.Name) require.NoError(t, err, "Marshal svc should not fail") tagsForServiceParam := []*ssm.Tag{ { Key: aws.String("copilot-application"), Value: aws.String(testApplication.Name), }, { Key: aws.String("copilot-service"), Value: aws.String(testService.Name), }, } testCases := map[string]struct { mockGetParameter func(t *testing.T, param *ssm.GetParameterInput) (*ssm.GetParameterOutput, error) mockPutParameter func(t *testing.T, param *ssm.PutParameterInput) (*ssm.PutParameterOutput, error) wantedErr error }{ "with no existing svc": { mockPutParameter: func(t *testing.T, param *ssm.PutParameterInput) (*ssm.PutParameterOutput, error) { require.Equal(t, testServicePath, *param.Name) require.Equal(t, testServiceString, *param.Value) require.Equal(t, tagsForServiceParam, param.Tags) return &ssm.PutParameterOutput{ Version: aws.Int64(1), }, nil }, mockGetParameter: func(t *testing.T, param *ssm.GetParameterInput) (*ssm.GetParameterOutput, error) { require.Equal(t, testApplicationPath, *param.Name) return &ssm.GetParameterOutput{ Parameter: &ssm.Parameter{ Name: aws.String(testApplicationPath), Value: aws.String(testApplicationString), }, }, nil }, }, "with existing svc": { mockPutParameter: func(t *testing.T, param *ssm.PutParameterInput) (*ssm.PutParameterOutput, error) { require.Equal(t, testServicePath, *param.Name) require.Equal(t, tagsForServiceParam, param.Tags) return nil, awserr.New(ssm.ErrCodeParameterAlreadyExists, "Already exists", fmt.Errorf("Already Exists")) }, mockGetParameter: func(t *testing.T, param *ssm.GetParameterInput) (*ssm.GetParameterOutput, error) { require.Equal(t, testApplicationPath, *param.Name) return &ssm.GetParameterOutput{ Parameter: &ssm.Parameter{ Name: aws.String(testApplicationPath), Value: aws.String(testApplicationString), }, }, nil }, wantedErr: nil, }, "with SSM error": { mockPutParameter: func(t *testing.T, param *ssm.PutParameterInput) (*ssm.PutParameterOutput, error) { require.Equal(t, tagsForServiceParam, param.Tags) return nil, fmt.Errorf("broken") }, mockGetParameter: func(t *testing.T, param *ssm.GetParameterInput) (*ssm.GetParameterOutput, error) { require.Equal(t, testApplicationPath, *param.Name) return &ssm.GetParameterOutput{ Parameter: &ssm.Parameter{ Name: aws.String(testApplicationPath), Value: aws.String(testApplicationString), }, }, nil }, wantedErr: fmt.Errorf("create service api in application chicken: broken"), }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { // GIVEN store := &Store{ ssm: &mockSSM{ t: t, mockPutParameter: tc.mockPutParameter, mockGetParameter: tc.mockGetParameter, }, } // WHEN err := store.CreateService(&Workload{ Name: testService.Name, App: testService.App, Type: testService.Type}) // THEN if tc.wantedErr != nil { require.EqualError(t, err, tc.wantedErr.Error()) } }) } } func TestDeleteService(t *testing.T) { mockApplicationName := "mockApplicationName" mockSvcName := "mockSvcName" mockError := errors.New("mockError") tests := map[string]struct { mockDeleteParam func(t *testing.T, in *ssm.DeleteParameterInput) (*ssm.DeleteParameterOutput, error) want error }{ "parameter is already deleted": { mockDeleteParam: func(t *testing.T, in *ssm.DeleteParameterInput) (*ssm.DeleteParameterOutput, error) { return nil, awserr.New(ssm.ErrCodeParameterNotFound, "Not found", nil) }, }, "unexpected error": { mockDeleteParam: func(t *testing.T, in *ssm.DeleteParameterInput) (*ssm.DeleteParameterOutput, error) { return nil, mockError }, want: fmt.Errorf("delete service %s from application %s: %w", mockSvcName, mockApplicationName, mockError), }, "successfully deleted param": { mockDeleteParam: func(t *testing.T, in *ssm.DeleteParameterInput) (*ssm.DeleteParameterOutput, error) { wantedPath := fmt.Sprintf(fmtWkldParamPath, mockApplicationName, mockSvcName) require.Equal(t, wantedPath, *in.Name) return nil, nil }, }, } for name, test := range tests { t.Run(name, func(t *testing.T) { s := &Store{ ssm: &mockSSM{ t: t, mockDeleteParameter: test.mockDeleteParam, }, } got := s.DeleteService(mockApplicationName, mockSvcName) require.Equal(t, test.want, got) }) } }
608
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 // Package deploy holds the structures to deploy infrastructure resources. // This file defines application deployment resources. package deploy import ( "fmt" "github.com/aws/aws-sdk-go/aws/arn" ) const appDNSDelegationRoleName = "DNSDelegationRole" // CreateAppInput holds the fields required to create an application stack set. type CreateAppInput struct { Name string // Name of the application that needs to be created. AccountID string // AWS account ID to administrate the application. DNSDelegationAccounts []string // Accounts to grant DNS access to for this application. DomainName string // DNS Name used for this application. DomainHostedZoneID string // Hosted Zone ID for the domain. PermissionsBoundary string // Name of the IAM Managed Policy to set a permissions boundary. AdditionalTags map[string]string // AdditionalTags are labels applied to resources under the application. Version string // The version of the application template to create the stack/stackset. If empty, creates the legacy stack/stackset. } // AppInformation holds information about the application that need to be propagated to the env stacks and workload stacks. type AppInformation struct { AccountPrincipalARN string Domain string Name string PermissionsBoundary string } // DNSDelegationRole returns the ARN of the app's DNS delegation role. func (a *AppInformation) DNSDelegationRole() string { if a.AccountPrincipalARN == "" || a.Domain == "" { return "" } appRole, err := arn.Parse(a.AccountPrincipalARN) if err != nil { return "" } return fmt.Sprintf("arn:%s:iam::%s:role/%s", appRole.Partition, appRole.AccountID, DNSDelegationRoleName(a.Name)) } // DNSDelegationRoleName returns the DNSDelegation role name of the app. func DNSDelegationRoleName(appName string) string { return fmt.Sprintf("%s-%s", appName, appDNSDelegationRoleName) }
53
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package deploy import ( "testing" "github.com/stretchr/testify/require" ) func TestAppInformation_DNSDelegationRole(t *testing.T) { testCases := map[string]struct { in *AppInformation want string }{ "without tools account ARN": { want: "", in: &AppInformation{ AccountPrincipalARN: "", Domain: "ecs.aws", }, }, "without DNS": { want: "", in: &AppInformation{ AccountPrincipalARN: "", Domain: "ecs.aws", }, }, "with invalid tools principal": { want: "", in: &AppInformation{ AccountPrincipalARN: "0000000", Domain: "ecs.aws", }, }, "with dns and tools principal": { want: "arn:aws:iam::0000000:role/-DNSDelegationRole", in: &AppInformation{ AccountPrincipalARN: "arn:aws:iam::0000000:root", Domain: "ecs.aws", }, }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { require.Equal(t, tc.want, tc.in.DNSDelegationRole()) }) } }
54
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 // Package deploy holds the structures to deploy infrastructure resources. package deploy import ( "fmt" "sort" "github.com/aws/aws-sdk-go/aws/arn" "github.com/aws/aws-sdk-go/aws/session" "github.com/aws/copilot-cli/internal/pkg/manifest/manifestinfo" rg "github.com/aws/copilot-cli/internal/pkg/aws/resourcegroups" "github.com/aws/copilot-cli/internal/pkg/config" ) const ( // AppTagKey is tag key for Copilot app. AppTagKey = "copilot-application" // EnvTagKey is tag key for Copilot env. EnvTagKey = "copilot-environment" // ServiceTagKey is tag key for Copilot service. ServiceTagKey = "copilot-service" // PipelineTagKey is tag key for Copilot pipeline. PipelineTagKey = "copilot-pipeline" // TaskTagKey is tag key for Copilot task. TaskTagKey = "copilot-task" ) const ( stackResourceType = "cloudformation:stack" pipelineResourceType = "codepipeline:pipeline" snsResourceType = "sns" // fmtSNSTopicNamePrefix holds the App-Env-Workload- components of a topic name fmtSNSTopicNamePrefix = "%s-%s-%s-" snsServiceName = "sns" ) // ResourceGetter retrieves a group of resources that satisfy certain conditions, such as tags. type ResourceGetter interface { GetResourcesByTags(resourceType string, tags map[string]string) ([]*rg.Resource, error) } // ConfigStoreClient wraps config store methods utilized by deploy store. type ConfigStoreClient interface { GetEnvironment(appName string, environmentName string) (*config.Environment, error) ListEnvironments(appName string) ([]*config.Environment, error) ListWorkloads(appName string) ([]*config.Workload, error) GetService(appName, svcName string) (*config.Workload, error) GetJob(appName, jobname string) (*config.Workload, error) } // SessionProvider is the interface to provide configuration for the AWS SDK's service clients. type SessionProvider interface { FromRole(roleARN, region string) (*session.Session, error) } // Store fetches information on deployed services. type Store struct { configStore ConfigStoreClient newRgClientFromIDs func(string, string) (ResourceGetter, error) newRgClientFromRole func(string, string) (ResourceGetter, error) } // NewStore returns a new store. func NewStore(sessProvider SessionProvider, store ConfigStoreClient) (*Store, error) { s := &Store{ configStore: store, } s.newRgClientFromIDs = func(appName, envName string) (ResourceGetter, error) { env, err := s.configStore.GetEnvironment(appName, envName) if err != nil { return nil, fmt.Errorf("get environment config %s: %w", envName, err) } sess, err := sessProvider.FromRole(env.ManagerRoleARN, env.Region) if err != nil { return nil, fmt.Errorf("create new session from env role: %w", err) } return rg.New(sess), nil } s.newRgClientFromRole = func(roleARN, region string) (ResourceGetter, error) { sess, err := sessProvider.FromRole(roleARN, region) if err != nil { return nil, fmt.Errorf("create new session from env role: %w", err) } return rg.New(sess), nil } return s, nil } // Pipeline is a deployed pipeline. type Pipeline struct { // The name of the application that the pipeline is associated with. AppName string // The pipeline resource name (physical resource ID) generated by CloudFormation. ResourceName string // The name given by user in the pipeline manifest. Name string // Whether the pipeline follows legacy-naming, i.e. not namespaced with "pipeline-app-". IsLegacy bool } // PipelineStore fetches information on deployed pipelines. type PipelineStore struct { getter ResourceGetter } // NewPipelineStore returns a new PipelineStore. func NewPipelineStore(getter ResourceGetter) *PipelineStore { return &PipelineStore{ getter: getter, } } // ListDeployedPipelines returns a list of names of deployed pipelines by looking up // pipeline resources with tags. func (p *PipelineStore) ListDeployedPipelines(appName string) ([]Pipeline, error) { var pipelines []Pipeline pipelineResources, err := p.getter.GetResourcesByTags(pipelineResourceType, map[string]string{ AppTagKey: appName, }) if err != nil { return nil, fmt.Errorf("get pipeline resources by tags for app %s: %w", appName, err) } for _, pipelineRes := range pipelineResources { resourceName, err := getPipelineResourceName(pipelineRes.ARN) if err != nil { return nil, err } pipeline := Pipeline{ ResourceName: resourceName, AppName: appName, } if name, ok := pipelineRes.Tags[PipelineTagKey]; !ok { pipeline.IsLegacy = true pipeline.Name = resourceName // A legacy-named pipeline's resource name is the same as pipeline name. } else { pipeline.Name = name } pipelines = append(pipelines, pipeline) } return pipelines, nil } // ListDeployedServices returns the names of deployed services in an environment. func (s *Store) ListDeployedServices(appName string, envName string) ([]string, error) { return s.listDeployedWorkloads(appName, envName, manifestinfo.ServiceTypes()) } // ListDeployedJobs returns the names of deployed jobs in an environment. func (s *Store) ListDeployedJobs(appName string, envName string) ([]string, error) { return s.listDeployedWorkloads(appName, envName, manifestinfo.JobTypes()) } func (s *Store) listDeployedWorkloads(appName string, envName string, workloadType []string) ([]string, error) { allWorkloads, err := s.configStore.ListWorkloads(appName) if err != nil { return nil, fmt.Errorf("list all workloads in application %s: %w", appName, err) } filteredWorkloadNames := make(map[string]bool) for _, wkld := range allWorkloads { for _, t := range workloadType { if wkld.Type != t { continue } filteredWorkloadNames[wkld.Name] = true } } rgClient, err := s.newRgClientFromIDs(appName, envName) if err != nil { return nil, err } resources, err := rgClient.GetResourcesByTags(stackResourceType, map[string]string{ AppTagKey: appName, EnvTagKey: envName, }) if err != nil { return nil, fmt.Errorf("get resources by Copilot tags: %w", err) } var wklds []string for _, resource := range resources { name := resource.Tags[ServiceTagKey] if name == "" || contains(name, wklds) { // To avoid listing duplicate service entry in a case when service has addons stack. continue } if _, ok := filteredWorkloadNames[name]; ok { wklds = append(wklds, name) } } sort.Strings(wklds) return wklds, nil } // ListSNSTopics returns a list of SNS topics deployed to the current environment and tagged with // Copilot identifiers. func (s *Store) ListSNSTopics(appName string, envName string) ([]Topic, error) { rgClient, err := s.newRgClientFromIDs(appName, envName) if err != nil { return nil, err } topics, err := rgClient.GetResourcesByTags(snsResourceType, map[string]string{ AppTagKey: appName, EnvTagKey: envName, }) if err != nil { return nil, err } var out []Topic for _, r := range topics { // If the topic doesn't have a specific workload tag, don't return it. if _, ok := r.Tags[ServiceTagKey]; !ok { continue } t, err := NewTopic(r.ARN, appName, envName, r.Tags[ServiceTagKey]) if err != nil { // If there's an error parsing the topic ARN, don't include it in the list of topics. // This includes times where the topic name does not match its tags, or the name // is invalid. switch err { case errInvalidARN: // This error indicates that the returned ARN is not parseable. return nil, err default: continue } } out = append(out, *t) } return out, nil } func contains(name string, names []string) bool { for _, n := range names { if name == n { return true } } return false } type result struct { name string err error } func (s *Store) deployedServices(rgClient ResourceGetter, app, env, svc string) result { resources, err := rgClient.GetResourcesByTags(stackResourceType, map[string]string{ AppTagKey: app, EnvTagKey: env, ServiceTagKey: svc, }) if err != nil { return result{err: fmt.Errorf("get resources by Copilot tags: %w", err)} } // If no resources found, the resp length is 0. var res result if len(resources) != 0 { res.name = env } return res } // ListEnvironmentsDeployedTo returns all the environment that a service is deployed in. func (s *Store) ListEnvironmentsDeployedTo(appName string, svcName string) ([]string, error) { envs, err := s.configStore.ListEnvironments(appName) if err != nil { return nil, fmt.Errorf("list environment for app %s: %w", appName, err) } deployedEnv := make(chan result, len(envs)) defer close(deployedEnv) for _, env := range envs { go func(env *config.Environment) { rgClient, err := s.newRgClientFromRole(env.ManagerRoleARN, env.Region) if err != nil { deployedEnv <- result{err: err} return } deployedEnv <- s.deployedServices(rgClient, appName, env.Name, svcName) }(env) } var envsWithDeployment []string for i := 0; i < len(envs); i++ { env := <-deployedEnv if env.err != nil { return nil, env.err } if env.name != "" { envsWithDeployment = append(envsWithDeployment, env.name) } } return envsWithDeployment, nil } // IsServiceDeployed returns whether a service is deployed in an environment or not. func (s *Store) IsServiceDeployed(appName string, envName string, svcName string) (bool, error) { return s.isWorkloadDeployed(appName, envName, svcName) } // IsJobDeployed returns whether a job is deployed in an environment or not by checking for a state machine. func (s *Store) IsJobDeployed(appName, envName, jobName string) (bool, error) { return s.isWorkloadDeployed(appName, envName, jobName) } func (s *Store) isWorkloadDeployed(appName, envName, name string) (bool, error) { rgClient, err := s.newRgClientFromIDs(appName, envName) if err != nil { return false, err } stacks, err := rgClient.GetResourcesByTags(stackResourceType, map[string]string{ AppTagKey: appName, EnvTagKey: envName, ServiceTagKey: name, }) if err != nil { return false, fmt.Errorf("get resources by Copilot tags: %w", err) } if len(stacks) != 0 { return true, nil } return false, nil } func getPipelineResourceName(resourceArn string) (string, error) { parsedArn, err := arn.Parse(resourceArn) if err != nil { return "", fmt.Errorf("parse pipeline ARN: %s", resourceArn) } return parsedArn.Resource, nil }
342
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package deploy import ( "errors" "fmt" "testing" "github.com/aws/aws-sdk-go/aws/arn" "github.com/aws/copilot-cli/internal/pkg/manifest/manifestinfo" rg "github.com/aws/copilot-cli/internal/pkg/aws/resourcegroups" "github.com/aws/copilot-cli/internal/pkg/config" "github.com/aws/copilot-cli/internal/pkg/deploy/mocks" "github.com/golang/mock/gomock" "github.com/stretchr/testify/require" ) type storeMock struct { rgGetter *mocks.MockResourceGetter configStore *mocks.MockConfigStoreClient } func TestStore_ListDeployedServices(t *testing.T) { testCases := map[string]struct { inputApp string inputEnv string setupMocks func(mocks storeMock) wantedError error wantedSvcs []string }{ "return error if fail to get resources by tag": { inputApp: "mockApp", inputEnv: "mockEnv", setupMocks: func(m storeMock) { gomock.InOrder( m.configStore.EXPECT().ListWorkloads("mockApp").Return([]*config.Workload{}, nil), m.rgGetter.EXPECT().GetResourcesByTags(stackResourceType, map[string]string{ AppTagKey: "mockApp", EnvTagKey: "mockEnv", }).Return(nil, errors.New("some error")), ) }, wantedError: fmt.Errorf("get resources by Copilot tags: some error"), }, "return nil if no services are found": { inputApp: "mockApp", inputEnv: "mockEnv", setupMocks: func(m storeMock) { gomock.InOrder( m.configStore.EXPECT().ListWorkloads("mockApp").Return([]*config.Workload{}, nil), m.rgGetter.EXPECT().GetResourcesByTags(stackResourceType, map[string]string{ AppTagKey: "mockApp", EnvTagKey: "mockEnv", }).Return([]*rg.Resource{{ARN: "mockARN", Tags: map[string]string{}}}, nil), ) }, wantedSvcs: nil, }, "return error if fail to get config service": { inputApp: "mockApp", inputEnv: "mockEnv", setupMocks: func(m storeMock) { gomock.InOrder( m.configStore.EXPECT().ListWorkloads("mockApp").Return(nil, errors.New("some error")), m.rgGetter.EXPECT().GetResourcesByTags(stackResourceType, map[string]string{ AppTagKey: "mockApp", EnvTagKey: "mockEnv", }).Times(0), ) }, wantedError: fmt.Errorf("list all workloads in application mockApp: some error"), }, "success": { inputApp: "mockApp", inputEnv: "mockEnv", setupMocks: func(m storeMock) { gomock.InOrder( m.configStore.EXPECT().ListWorkloads("mockApp").Return([]*config.Workload{ { App: "mockApp", Name: "mockSvc1", Type: manifestinfo.LoadBalancedWebServiceType, }, { App: "mockApp", Name: "mockSvc2", Type: manifestinfo.RequestDrivenWebServiceType, }, { App: "mockApp", Name: "mockJob", Type: manifestinfo.ScheduledJobType, }, }, nil), m.rgGetter.EXPECT().GetResourcesByTags(stackResourceType, map[string]string{ AppTagKey: "mockApp", EnvTagKey: "mockEnv", }).Return([]*rg.Resource{{ARN: "mockARN1", Tags: map[string]string{ServiceTagKey: "mockSvc1"}}, {ARN: "mockARN2", Tags: map[string]string{ServiceTagKey: "mockSvc2"}}}, nil), ) }, wantedSvcs: []string{"mockSvc1", "mockSvc2"}, }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { ctrl := gomock.NewController(t) defer ctrl.Finish() mockConfigStore := mocks.NewMockConfigStoreClient(ctrl) mockRgGetter := mocks.NewMockResourceGetter(ctrl) mocks := storeMock{ rgGetter: mockRgGetter, configStore: mockConfigStore, } tc.setupMocks(mocks) store := &Store{ configStore: mockConfigStore, newRgClientFromIDs: func(string, string) (ResourceGetter, error) { return mockRgGetter, nil }, } // WHEN svcs, err := store.ListDeployedServices(tc.inputApp, tc.inputEnv) // THEN if tc.wantedError != nil { require.EqualError(t, err, tc.wantedError.Error()) require.ElementsMatch(t, svcs, tc.wantedSvcs) } else { require.NoError(t, err) } }) } } func TestStore_ListDeployedJobs(t *testing.T) { testCases := map[string]struct { inputApp string inputEnv string setupMocks func(mocks storeMock) wantedError error wantedSvcs []string }{ "success": { inputApp: "mockApp", inputEnv: "mockEnv", setupMocks: func(m storeMock) { gomock.InOrder( m.configStore.EXPECT().ListWorkloads("mockApp").Return([]*config.Workload{ { App: "mockApp", Name: "mockSvc1", Type: manifestinfo.LoadBalancedWebServiceType, }, { App: "mockApp", Name: "mockSvc2", Type: manifestinfo.RequestDrivenWebServiceType, }, { App: "mockApp", Name: "mockJob1", Type: manifestinfo.ScheduledJobType, }, { App: "mockApp", Name: "mockJob2", Type: manifestinfo.ScheduledJobType, }, }, nil), m.rgGetter.EXPECT().GetResourcesByTags(stackResourceType, map[string]string{ AppTagKey: "mockApp", EnvTagKey: "mockEnv", }).Return([]*rg.Resource{{ARN: "mockARN1", Tags: map[string]string{ServiceTagKey: "mockJob1"}}, {ARN: "mockARN2", Tags: map[string]string{ServiceTagKey: "mockJob2"}}}, nil), ) }, wantedSvcs: []string{"mockJob1", "mockJob2"}, }, "return nil if no jobs are found": { inputApp: "mockApp", inputEnv: "mockEnv", setupMocks: func(m storeMock) { gomock.InOrder( m.configStore.EXPECT().ListWorkloads("mockApp").Return([]*config.Workload{}, nil), m.rgGetter.EXPECT().GetResourcesByTags(stackResourceType, map[string]string{ AppTagKey: "mockApp", EnvTagKey: "mockEnv", }).Return([]*rg.Resource{{ARN: "mockARN", Tags: map[string]string{}}}, nil), ) }, }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { ctrl := gomock.NewController(t) defer ctrl.Finish() mockConfigStore := mocks.NewMockConfigStoreClient(ctrl) mockRgGetter := mocks.NewMockResourceGetter(ctrl) mocks := storeMock{ rgGetter: mockRgGetter, configStore: mockConfigStore, } tc.setupMocks(mocks) store := &Store{ configStore: mockConfigStore, newRgClientFromIDs: func(string, string) (ResourceGetter, error) { return mockRgGetter, nil }, } // WHEN jobs, err := store.ListDeployedJobs(tc.inputApp, tc.inputEnv) // THEN if tc.wantedError != nil { require.EqualError(t, err, tc.wantedError.Error()) require.ElementsMatch(t, jobs, tc.wantedSvcs) } else { require.NoError(t, err) } }) } } func TestStore_ListEnvironmentsDeployedTo(t *testing.T) { testCases := map[string]struct { inputApp string inputSvc string setupMocks func(mocks storeMock) wantedError error wantedEnvs []string }{ "return error if fail to list all config environments": { inputApp: "mockApp", inputSvc: "mockSvc", setupMocks: func(m storeMock) { gomock.InOrder( m.configStore.EXPECT().ListEnvironments("mockApp").Return(nil, errors.New("some error")), ) }, wantedError: fmt.Errorf("list environment for app mockApp: some error"), }, "return error if fail to get resources by tags": { inputApp: "mockApp", inputSvc: "mockSvc", setupMocks: func(m storeMock) { gomock.InOrder( m.configStore.EXPECT().ListEnvironments("mockApp").Return([]*config.Environment{ { App: "mockApp", Name: "mockEnv", }, }, nil), m.rgGetter.EXPECT().GetResourcesByTags(stackResourceType, map[string]string{ AppTagKey: "mockApp", EnvTagKey: "mockEnv", ServiceTagKey: "mockSvc", }).Return(nil, errors.New("some error")), ) }, wantedError: fmt.Errorf("get resources by Copilot tags: some error"), }, "success": { inputApp: "mockApp", inputSvc: "mockSvc", setupMocks: func(m storeMock) { m.configStore.EXPECT().ListEnvironments("mockApp").Return([]*config.Environment{ { App: "mockApp", Name: "mockEnv1", }, { App: "mockApp", Name: "mockEnv2", }, }, nil) m.rgGetter.EXPECT().GetResourcesByTags(stackResourceType, map[string]string{ AppTagKey: "mockApp", EnvTagKey: "mockEnv1", ServiceTagKey: "mockSvc", }).Return([]*rg.Resource{{ARN: "mockSvcARN"}}, nil) m.rgGetter.EXPECT().GetResourcesByTags(stackResourceType, map[string]string{ AppTagKey: "mockApp", EnvTagKey: "mockEnv2", ServiceTagKey: "mockSvc", }).Return([]*rg.Resource{}, nil) }, wantedEnvs: []string{"mockEnv1"}, }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { ctrl := gomock.NewController(t) defer ctrl.Finish() mockConfigStore := mocks.NewMockConfigStoreClient(ctrl) mockRgGetter := mocks.NewMockResourceGetter(ctrl) mocks := storeMock{ rgGetter: mockRgGetter, configStore: mockConfigStore, } tc.setupMocks(mocks) store := &Store{ configStore: mockConfigStore, newRgClientFromRole: func(string, string) (ResourceGetter, error) { return mockRgGetter, nil }, } // WHEN envs, err := store.ListEnvironmentsDeployedTo(tc.inputApp, tc.inputSvc) // THEN if tc.wantedError != nil { require.EqualError(t, err, tc.wantedError.Error()) require.ElementsMatch(t, envs, tc.wantedEnvs) } else { require.NoError(t, err) } }) } } func TestStore_IsServiceDeployed(t *testing.T) { testCases := map[string]struct { inputApp string inputEnv string inputSvc string setupMocks func(mocks storeMock) wantedError error wantedDeployed bool }{ "return error if fail to get resources by tags": { inputApp: "mockApp", inputEnv: "mockEnv", inputSvc: "mockSvc", setupMocks: func(m storeMock) { gomock.InOrder( m.rgGetter.EXPECT().GetResourcesByTags(stackResourceType, map[string]string{ AppTagKey: "mockApp", EnvTagKey: "mockEnv", ServiceTagKey: "mockSvc", }).Return(nil, errors.New("some error")), ) }, wantedError: fmt.Errorf("get resources by Copilot tags: some error"), }, "success with false": { inputApp: "mockApp", inputEnv: "mockEnv", inputSvc: "mockSvc", setupMocks: func(m storeMock) { gomock.InOrder( m.rgGetter.EXPECT().GetResourcesByTags(stackResourceType, map[string]string{ AppTagKey: "mockApp", EnvTagKey: "mockEnv", ServiceTagKey: "mockSvc", }).Return([]*rg.Resource{}, nil), ) }, wantedDeployed: false, }, "success with true": { inputApp: "mockApp", inputEnv: "mockEnv", inputSvc: "mockSvc", setupMocks: func(m storeMock) { gomock.InOrder( m.rgGetter.EXPECT().GetResourcesByTags(stackResourceType, map[string]string{ AppTagKey: "mockApp", EnvTagKey: "mockEnv", ServiceTagKey: "mockSvc", }).Return([]*rg.Resource{{ARN: "mockSvcARN"}}, nil), ) }, wantedDeployed: true, }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { ctrl := gomock.NewController(t) defer ctrl.Finish() mockConfigStore := mocks.NewMockConfigStoreClient(ctrl) mockRgGetter := mocks.NewMockResourceGetter(ctrl) mocks := storeMock{ rgGetter: mockRgGetter, configStore: mockConfigStore, } tc.setupMocks(mocks) store := &Store{ configStore: mockConfigStore, newRgClientFromIDs: func(string, string) (ResourceGetter, error) { return mockRgGetter, nil }, } // WHEN deployed, err := store.IsServiceDeployed(tc.inputApp, tc.inputEnv, tc.inputSvc) // THEN if tc.wantedError != nil { require.EqualError(t, err, tc.wantedError.Error()) require.Equal(t, deployed, tc.wantedDeployed) } else { require.NoError(t, err) } }) } } func Test_IsJobDeployed(t *testing.T) { testCases := map[string]struct { inputApp string inputEnv string inputJob string setupMocks func(mocks storeMock) wantedError error wantedDeployed bool }{ "return error if fail to get resources by tags": { inputApp: "mockApp", inputEnv: "mockEnv", inputJob: "mockJob", setupMocks: func(m storeMock) { gomock.InOrder( m.rgGetter.EXPECT().GetResourcesByTags(stackResourceType, map[string]string{ AppTagKey: "mockApp", EnvTagKey: "mockEnv", ServiceTagKey: "mockJob", }).Return(nil, errors.New("some error")), ) }, wantedError: fmt.Errorf("get resources by Copilot tags: some error"), }, "success with false": { inputApp: "mockApp", inputEnv: "mockEnv", inputJob: "mockJob", setupMocks: func(m storeMock) { gomock.InOrder( m.rgGetter.EXPECT().GetResourcesByTags(stackResourceType, map[string]string{ AppTagKey: "mockApp", EnvTagKey: "mockEnv", ServiceTagKey: "mockJob", }).Return([]*rg.Resource{}, nil), ) }, wantedDeployed: false, }, "success with true": { inputApp: "mockApp", inputEnv: "mockEnv", inputJob: "mockJob", setupMocks: func(m storeMock) { gomock.InOrder( m.rgGetter.EXPECT().GetResourcesByTags(stackResourceType, map[string]string{ AppTagKey: "mockApp", EnvTagKey: "mockEnv", ServiceTagKey: "mockJob", }).Return([]*rg.Resource{{ARN: "mockJobARN"}}, nil), ) }, wantedDeployed: true, }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { ctrl := gomock.NewController(t) defer ctrl.Finish() mockConfigStore := mocks.NewMockConfigStoreClient(ctrl) mockRgGetter := mocks.NewMockResourceGetter(ctrl) mocks := storeMock{ rgGetter: mockRgGetter, configStore: mockConfigStore, } tc.setupMocks(mocks) store := &Store{ configStore: mockConfigStore, newRgClientFromIDs: func(string, string) (ResourceGetter, error) { return mockRgGetter, nil }, } // WHEN deployed, err := store.IsJobDeployed(tc.inputApp, tc.inputEnv, tc.inputJob) // THEN if tc.wantedError != nil { require.EqualError(t, err, tc.wantedError.Error()) require.Equal(t, deployed, tc.wantedDeployed) } else { require.NoError(t, err) } }) } } func TestStore_ListSNSTopics(t *testing.T) { testCases := map[string]struct { inputApp string inputEnv string setupMocks func(mocks storeMock) wantedError error wantedTopics []Topic }{ "return error if fail to get resources by tag": { inputApp: "mockApp", inputEnv: "mockEnv", setupMocks: func(m storeMock) { gomock.InOrder( m.rgGetter.EXPECT().GetResourcesByTags(snsResourceType, map[string]string{ AppTagKey: "mockApp", EnvTagKey: "mockEnv", }).Return(nil, errors.New("some error")), ) }, wantedError: fmt.Errorf("some error"), }, "return nil if no topics are found": { inputApp: "mockApp", inputEnv: "mockEnv", setupMocks: func(m storeMock) { gomock.InOrder( m.rgGetter.EXPECT().GetResourcesByTags(snsResourceType, map[string]string{ AppTagKey: "mockApp", EnvTagKey: "mockEnv", }).Return([]*rg.Resource{{ARN: "mockARN", Tags: map[string]string{}}}, nil), ) }, wantedTopics: nil, }, "return nil if the only topic doesn't have workload tag": { inputApp: "mockApp", inputEnv: "mockEnv", setupMocks: func(m storeMock) { gomock.InOrder( m.rgGetter.EXPECT().GetResourcesByTags(snsResourceType, map[string]string{ AppTagKey: "mockApp", EnvTagKey: "mockEnv", }).Return([]*rg.Resource{ { ARN: "arn:aws:sns:us-west-2:012345678912:mockApp-mockEnv-mockSvc1-topic", Tags: map[string]string{}, }, }, nil), ) }, wantedTopics: []Topic{}, }, "success": { inputApp: "mockApp", inputEnv: "mockEnv", setupMocks: func(m storeMock) { m.rgGetter.EXPECT().GetResourcesByTags( snsResourceType, map[string]string{ AppTagKey: "mockApp", EnvTagKey: "mockEnv", }, ).Return( []*rg.Resource{ { ARN: "arn:aws:sns:us-west-2:012345678912:mockApp-mockEnv-mockSvc1-topic", Tags: map[string]string{ServiceTagKey: "mockSvc1"}, }, { ARN: "arn:aws:sns:us-west-2:012345678912:mockApp-mockEnv-mockSvc2-events", Tags: map[string]string{ServiceTagKey: "mockSvc2"}, }, }, nil, ) }, wantedTopics: []Topic{ { awsARN: arn.ARN{ Partition: "aws", Region: "us-west-2", Service: "sns", AccountID: "012345678912", Resource: "mockApp-mockEnv-mockSvc1-topic", }, prefix: "mockApp-mockEnv-mockSvc1-", wkld: "mockSvc1", name: "topic", }, { awsARN: arn.ARN{ Partition: "aws", Region: "us-west-2", Service: "sns", AccountID: "012345678912", Resource: "mockApp-mockEnv-mockSvc2-events", }, prefix: "mockApp-mockEnv-mockSvc2-", wkld: "mockSvc2", name: "events", }, }, }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { ctrl := gomock.NewController(t) defer ctrl.Finish() mockConfigStore := mocks.NewMockConfigStoreClient(ctrl) mockRgGetter := mocks.NewMockResourceGetter(ctrl) mocks := storeMock{ rgGetter: mockRgGetter, configStore: mockConfigStore, } tc.setupMocks(mocks) store := &Store{ configStore: mockConfigStore, newRgClientFromIDs: func(string, string) (ResourceGetter, error) { return mockRgGetter, nil }, } // WHEN topics, err := store.ListSNSTopics(tc.inputApp, tc.inputEnv) // THEN if tc.wantedError != nil { require.EqualError(t, err, tc.wantedError.Error()) require.ElementsMatch(t, topics, tc.wantedTopics) } else { require.NoError(t, err) } }) } } func TestPipelineStore_ListDeployedPipelines(t *testing.T) { const ( mockAppName = "mockApp" mockLegacyPipelineARN = "arn:aws:codepipeline:us-west-2:1234567890:pipeline-dinder-badgoose-repo" mockPipelineARN = "arn:aws:codepipeline:us-west-2:1234567890:pipeline-my-pipeline-repo" ) testCases := map[string]struct { setupMocks func(mocks storeMock) wantedError error wantedPipelines []Pipeline }{ "return error if fail to get resources by tag": { setupMocks: func(m storeMock) { m.rgGetter.EXPECT().GetResourcesByTags(pipelineResourceType, map[string]string{ AppTagKey: "mockApp", }).Return(nil, errors.New("some error")) }, wantedError: fmt.Errorf("get pipeline resources by tags for app mockApp: some error"), }, "return error if fail to parse pipeline ARN": { setupMocks: func(m storeMock) { m.rgGetter.EXPECT().GetResourcesByTags(pipelineResourceType, map[string]string{ AppTagKey: "mockApp", }).Return([]*rg.Resource{ { ARN: "badARN", }, }, nil) }, wantedError: fmt.Errorf("parse pipeline ARN: badARN"), }, "success": { setupMocks: func(m storeMock) { m.rgGetter.EXPECT().GetResourcesByTags(pipelineResourceType, map[string]string{ AppTagKey: "mockApp", }).Return([]*rg.Resource{ { ARN: mockLegacyPipelineARN, Tags: map[string]string{ AppTagKey: mockAppName, }, }, { ARN: mockPipelineARN, Tags: map[string]string{ AppTagKey: mockAppName, PipelineTagKey: "my-pipeline-repo", }, }, }, nil) }, wantedPipelines: []Pipeline{ { ResourceName: "pipeline-dinder-badgoose-repo", IsLegacy: true, AppName: mockAppName, }, { ResourceName: "my-pipeline-repo", IsLegacy: false, AppName: mockAppName, }, }, }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { ctrl := gomock.NewController(t) defer ctrl.Finish() mockRgGetter := mocks.NewMockResourceGetter(ctrl) mocks := storeMock{ rgGetter: mockRgGetter, } tc.setupMocks(mocks) store := &PipelineStore{ getter: mocks.rgGetter, } // WHEN pipelines, err := store.ListDeployedPipelines(mockAppName) // THEN if tc.wantedError != nil { require.EqualError(t, err, tc.wantedError.Error()) require.ElementsMatch(t, pipelines, tc.wantedPipelines) } else { require.NoError(t, err) } }) } }
792
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 // Package deploy holds the structures to deploy infrastructure resources. // This file defines environment deployment resources. package deploy import ( "github.com/aws/copilot-cli/internal/pkg/config" ) // CreateEnvironmentResponse holds the created environment on successful deployment. // Otherwise, the environment is set to nil and a descriptive error is returned. type CreateEnvironmentResponse struct { Env *config.Environment Err error }
18
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 // Package deploy holds the structures to deploy infrastructure resources. // This file defines pipeline deployment resources. package deploy import ( "errors" "fmt" "path" "path/filepath" "regexp" "sort" "strings" "gopkg.in/yaml.v3" "github.com/aws/copilot-cli/internal/pkg/graph" "github.com/aws/copilot-cli/internal/pkg/config" "github.com/aws/copilot-cli/internal/pkg/manifest" "github.com/aws/aws-sdk-go/aws/arn" ) // DefaultPipelineBranch is the default repository branch to use for pipeline. const DefaultPipelineBranch = "main" const ( fmtInvalidRepo = "unable to parse the repository from the URL %+v" fmtErrMissingProperty = "missing `%s` in properties" fmtErrPropertyNotAString = "property `%s` is not a string" defaultPipelineBuildImage = "aws/codebuild/amazonlinux2-x86_64-standard:4.0" defaultPipelineEnvironmentType = "LINUX_CONTAINER" // DefaultPipelineArtifactsDir is the default folder to output Copilot-generated templates. DefaultPipelineArtifactsDir = "infrastructure" ) var ( // NOTE: this is duplicated from validate.go // Ex: https://github.com/koke/grit ghRepoExp = regexp.MustCompile(`(https:\/\/github\.com\/|)(?P<owner>.+)\/(?P<repo>.+)`) // Ex: https://git-codecommit.us-west-2.amazonaws.com/v1/repos/aws-sample/browse ccRepoExp = regexp.MustCompile(`(https:\/\/(?P<region>.+).console.aws.amazon.com\/codesuite\/codecommit\/repositories\/(?P<repo>.+)(\/browse))`) // Ex: https://bitbucket.org/repoOwner/repoName bbRepoExp = regexp.MustCompile(`(https:\/\/bitbucket.org\/)(?P<owner>.+)\/(?P<repo>.+)`) ) // CreatePipelineInput represents the fields required to deploy a pipeline. type CreatePipelineInput struct { // Name of the application this pipeline belongs to AppName string // Name of the pipeline Name string // IsLegacy should be set to true if the pipeline has been deployed using a legacy non-namespaced name; otherwise it is false. IsLegacy bool // The source code provider for this pipeline Source interface{} // The build project settings for this pipeline Build *Build // The stages of the pipeline. The order of stages in this list // will be the order we deploy to. Stages []PipelineStage // A list of artifact buckets and corresponding KMS keys that will // be used in this pipeline. ArtifactBuckets []ArtifactBucket // AdditionalTags are labels applied to resources under the application. AdditionalTags map[string]string // PermissionsBoundary is the name of an IAM policy to set a permissions boundary. PermissionsBoundary string } // Build represents CodeBuild project used in the CodePipeline // to build and test Docker image. type Build struct { // The URI that identifies the Docker image to use for this build project. Image string EnvironmentType string BuildspecPath string AdditionalPolicyDocument string } // Init populates the fields in Build by parsing the manifest file's "build" section. func (b *Build) Init(mfBuild *manifest.Build, mfDirPath string) error { image := defaultPipelineBuildImage environmentType := defaultPipelineEnvironmentType path := filepath.Join(mfDirPath, "buildspec.yml") if mfBuild != nil && mfBuild.Image != "" { image = mfBuild.Image } if mfBuild != nil && mfBuild.Buildspec != "" { path = mfBuild.Buildspec } if strings.Contains(image, "aarch64") { environmentType = "ARM_CONTAINER" } if mfBuild != nil && !mfBuild.AdditionalPolicy.Document.IsZero() { additionalPolicy, err := yaml.Marshal(&mfBuild.AdditionalPolicy.Document) if err != nil { return fmt.Errorf("marshal `additional_policy.PolicyDocument` in pipeline manifest: %v", err) } b.AdditionalPolicyDocument = strings.TrimSpace(string(additionalPolicy)) } b.Image = image b.EnvironmentType = environmentType b.BuildspecPath = filepath.ToSlash(path) // Buildspec path must be with '/' because CloudFormation expects forward-slash separated file path. return nil } // ArtifactBucket represents an S3 bucket used by the CodePipeline to store // intermediate artifacts produced by the pipeline. type ArtifactBucket struct { // The name of the S3 bucket. BucketName string // The ARN of the KMS key used to en/decrypt artifacts stored in this bucket. KeyArn string } // Region parses out the region from the ARN of the KMS key associated with // the artifact bucket. func (a *ArtifactBucket) Region() (string, error) { // We assume the bucket and the key are in the same AWS region. parsedArn, err := arn.Parse(a.KeyArn) if err != nil { return "", fmt.Errorf("failed to parse region out of key ARN: %s, error: %w", a.BucketName, err) } return parsedArn.Region, nil } // GitHubV1Source defines the source of the artifacts to be built and deployed. This version uses personal access tokens // and is not recommended. https://docs.aws.amazon.com/codepipeline/latest/userguide/update-github-action-connections.html type GitHubV1Source struct { ProviderName string Branch string RepositoryURL GitHubURL PersonalAccessTokenSecretID string } // GitHubSource (version 2) defines the source of the artifacts to be built and deployed. This version uses CodeStar // Connections to authenticate access to the remote repo. type GitHubSource struct { ProviderName string Branch string RepositoryURL GitHubURL ConnectionARN string OutputArtifactFormat string } // GitHubURL is the common type for repo URLs for both GitHubSource versions: // GitHubV1 (w/ access tokens) and GitHub (V2 w CodeStar Connections). type GitHubURL string // CodeCommitSource defines the (CC) source of the artifacts to be built and deployed. type CodeCommitSource struct { ProviderName string Branch string RepositoryURL string OutputArtifactFormat string } // BitbucketSource defines the (BB) source of the artifacts to be built and deployed. type BitbucketSource struct { ProviderName string Branch string RepositoryURL string ConnectionARN string OutputArtifactFormat string } func convertRequiredProperty(properties map[string]interface{}, key string) (string, error) { v, ok := properties[key] if !ok { return "", fmt.Errorf(fmtErrMissingProperty, key) } vStr, ok := v.(string) if !ok { return "", fmt.Errorf(fmtErrPropertyNotAString, key) } return vStr, nil } func convertOptionalProperty(properties map[string]interface{}, key string, defaultValue string) (string, error) { v, ok := properties[key] if !ok { return defaultValue, nil } vStr, ok := v.(string) if !ok { return "", fmt.Errorf(fmtErrPropertyNotAString, key) } return vStr, nil } // PipelineSourceFromManifest processes manifest info about the source based on provider type. // The return boolean is true for CodeStar Connections sources that require a polling prompt. func PipelineSourceFromManifest(mfSource *manifest.Source) (source interface{}, shouldPrompt bool, err error) { branch, err := convertOptionalProperty(mfSource.Properties, "branch", DefaultPipelineBranch) if err != nil { return nil, false, err } repository, err := convertRequiredProperty(mfSource.Properties, "repository") if err != nil { return nil, false, err } outputFormat, err := convertOptionalProperty(mfSource.Properties, "output_artifact_format", "") if err != nil { return nil, false, err } switch mfSource.ProviderName { case manifest.GithubV1ProviderName: token, err := convertRequiredProperty(mfSource.Properties, "access_token_secret") if err != nil { return nil, false, err } return &GitHubV1Source{ ProviderName: manifest.GithubV1ProviderName, Branch: branch, RepositoryURL: GitHubURL(repository), PersonalAccessTokenSecretID: token, }, false, nil case manifest.GithubProviderName: // If the creation of the user's pipeline manifest predates Copilot's conversion to GHv2/CSC, the provider // listed in the manifest will be "GitHub," not "GitHubV1." To differentiate it from the new default // "GitHub," which refers to v2, we check for the presence of a secret, indicating a v1 GitHub connection. if mfSource.Properties["access_token_secret"] != nil { return &GitHubV1Source{ ProviderName: manifest.GithubV1ProviderName, Branch: branch, RepositoryURL: GitHubURL(repository), PersonalAccessTokenSecretID: (mfSource.Properties["access_token_secret"]).(string), }, false, nil } else { // If an existing CSC connection is being used, don't prompt to update connection from 'PENDING' to 'AVAILABLE'. connection, ok := mfSource.Properties["connection_arn"] repo := &GitHubSource{ ProviderName: manifest.GithubProviderName, Branch: branch, RepositoryURL: GitHubURL(repository), OutputArtifactFormat: outputFormat, } if !ok { return repo, true, nil } repo.ConnectionARN = connection.(string) return repo, false, nil } case manifest.CodeCommitProviderName: return &CodeCommitSource{ ProviderName: manifest.CodeCommitProviderName, Branch: branch, RepositoryURL: repository, OutputArtifactFormat: outputFormat, }, false, nil case manifest.BitbucketProviderName: // If an existing CSC connection is being used, don't prompt to update connection from 'PENDING' to 'AVAILABLE'. connection, ok := mfSource.Properties["connection_arn"] repo := &BitbucketSource{ ProviderName: manifest.BitbucketProviderName, Branch: branch, RepositoryURL: repository, OutputArtifactFormat: outputFormat, } if !ok { return repo, true, nil } repo.ConnectionARN = connection.(string) return repo, false, nil default: return nil, false, fmt.Errorf("invalid repo source provider: %s", mfSource.ProviderName) } } // GitHubPersonalAccessTokenSecretID returns the ID of the secret in the // Secrets manager, which stores the GitHub Personal Access token if the // provider is "GitHubV1". func (s *GitHubV1Source) GitHubPersonalAccessTokenSecretID() (string, error) { if s.PersonalAccessTokenSecretID == "" { return "", errors.New("the GitHub token secretID is not configured") } return s.PersonalAccessTokenSecretID, nil } // Connection returns the ARN correlated with a ConnectionName in the pipeline manifest. func (s *BitbucketSource) Connection() string { return s.ConnectionARN } // Connection returns the ARN correlated with a ConnectionName in the pipeline manifest. func (s *GitHubSource) Connection() string { return s.ConnectionARN } // parse parses the owner and repo name from the GH repo URL, which was formatted and assigned in cli/pipeline_init.go. func (url GitHubURL) parse() (owner, repo string, err error) { if url == "" { return "", "", fmt.Errorf("unable to locate the repository") } match := ghRepoExp.FindStringSubmatch(string(url)) if len(match) == 0 { return "", "", fmt.Errorf(fmtInvalidRepo, url) } matches := make(map[string]string) for i, name := range ghRepoExp.SubexpNames() { if i != 0 && name != "" { matches[name] = match[i] } } return matches["owner"], matches["repo"], nil } // parseRepo parses the region (not returned) and repo name from the CC repo URL, which was formatted and assigned in cli/pipeline_init.go. func (s *CodeCommitSource) parseRepo() (string, error) { // NOTE: 'region' is not currently parsed out as a Source property, but this enables that possibility. if s.RepositoryURL == "" { return "", fmt.Errorf("unable to locate the repository") } match := ccRepoExp.FindStringSubmatch(s.RepositoryURL) if len(match) == 0 { return "", fmt.Errorf(fmtInvalidRepo, s.RepositoryURL) } matches := make(map[string]string) for i, name := range ccRepoExp.SubexpNames() { if i != 0 && name != "" { matches[name] = match[i] } } return matches["repo"], nil } // parseOwnerAndRepo parses the owner and repo name from the BB repo URL, which was formatted and assigned in cli/pipeline_init.go. func (s *BitbucketSource) parseOwnerAndRepo() (owner, repo string, err error) { if s.RepositoryURL == "" { return "", "", fmt.Errorf("unable to locate the repository") } match := bbRepoExp.FindStringSubmatch(s.RepositoryURL) if len(match) == 0 { return "", "", fmt.Errorf(fmtInvalidRepo, s.RepositoryURL) } matches := make(map[string]string) for i, name := range bbRepoExp.SubexpNames() { if i != 0 && name != "" { matches[name] = match[i] } } return matches["owner"], matches["repo"], nil } // ConnectionName generates a string of maximum length 32 to be used as a CodeStar Connections ConnectionName. // If there is a duplicate ConnectionName generated by CFN, the previous one is replaced. (Duplicate names // generated by the aws cli don't have to be unique for some reason.) // See https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-codestarconnections-connection.html#cfn-codestarconnections-connection-connectionname const ( maxOwnerLength = 5 maxRepoLength = 18 fmtConnectionName = "copilot-%s-%s" ) // ConnectionName generates a recognizable string by which the connection may be identified. func (s *BitbucketSource) ConnectionName() (string, error) { owner, repo, err := s.parseOwnerAndRepo() if err != nil { return "", fmt.Errorf("parse owner and repo to generate connection name: %w", err) } return formatConnectionName(owner, repo), nil } // ConnectionName generates a recognizable string by which the connection may be identified. func (s *GitHubSource) ConnectionName() (string, error) { owner, repo, err := s.RepositoryURL.parse() if err != nil { return "", fmt.Errorf("parse owner and repo to generate connection name: %w", err) } return formatConnectionName(owner, repo), nil } func formatConnectionName(owner, repo string) string { if len(owner) > maxOwnerLength { owner = owner[:maxOwnerLength] } if len(repo) > maxRepoLength { repo = repo[:maxRepoLength] } return fmt.Sprintf(fmtConnectionName, owner, repo) } // Repository returns the repository portion. For example, // given "aws/amazon-copilot", this function returns "amazon-copilot". func (s *GitHubV1Source) Repository() (string, error) { _, repo, err := s.RepositoryURL.parse() if err != nil { return "", err } return repo, nil } // Repository returns the repository portion. For CodeStar Connections, // this needs to be in the format "some-user/my-repo." func (s *BitbucketSource) Repository() (string, error) { owner, repo, err := s.parseOwnerAndRepo() if err != nil { return "", err } return fmt.Sprintf("%s/%s", owner, repo), nil } // Repository returns the repository portion. For CodeStar Connections, // this needs to be in the format "some-user/my-repo." func (s *GitHubSource) Repository() (string, error) { owner, repo, err := s.RepositoryURL.parse() if err != nil { return "", err } return fmt.Sprintf("%s/%s", owner, repo), nil } // Repository returns the repository portion. For example, // given "aws/amazon-copilot", this function returns "amazon-copilot". func (s *CodeCommitSource) Repository() (string, error) { repo, err := s.parseRepo() if err != nil { return "", err } return repo, nil } // Owner returns the repository owner portion. For example, // given "aws/amazon-copilot", this function returns "aws". func (s *GitHubSource) Owner() (string, error) { owner, _, err := s.RepositoryURL.parse() if err != nil { return "", err } return owner, nil } // Owner returns the repository owner portion. For example, // given "aws/amazon-copilot", this function returns "aws". func (s *GitHubV1Source) Owner() (string, error) { owner, _, err := s.RepositoryURL.parse() if err != nil { return "", err } return owner, nil } type associatedEnvironment struct { // Name of the environment, must be unique within an application. // This is also the name of the pipeline stage. Name string // The region this environment is created in. Region string // AppName represents the application name the environment is part of. AppName string // AccountID of the account this environment is stored in. AccountID string } // PipelineStage represents configuration for each deployment stage // of a workspace. A stage consists of the Config Environment the pipeline // is deploying to, the containerized services that will be deployed, and // test commands, if the user has opted to add any. type PipelineStage struct { *associatedEnvironment requiresApproval bool testCommands []string execRoleARN string envManagerRoleARN string deployments manifest.Deployments } // Init populates the fields in PipelineStage against a target environment, // the user's manifest config, and any local workload names. func (stg *PipelineStage) Init(env *config.Environment, mftStage *manifest.PipelineStage, workloads []string) { stg.associatedEnvironment = &associatedEnvironment{ AppName: env.App, Name: mftStage.Name, Region: env.Region, AccountID: env.AccountID, } deployments := mftStage.Deployments if len(deployments) == 0 { // Transform local workloads into the manifest.Deployments format if the manifest doesn't have any deployment config. deployments = make(manifest.Deployments) for _, workload := range workloads { deployments[workload] = nil } } stg.deployments = deployments stg.requiresApproval = mftStage.RequiresApproval stg.testCommands = mftStage.TestCommands stg.execRoleARN = env.ExecutionRoleARN stg.envManagerRoleARN = env.ManagerRoleARN } // Name returns the stage's name. func (stg *PipelineStage) Name() string { return stg.associatedEnvironment.Name } // Approval returns a manual approval action for the stage. // If the stage does not require approval, then returns nil. func (stg *PipelineStage) Approval() *ManualApprovalAction { if !stg.requiresApproval { return nil } return &ManualApprovalAction{ name: stg.associatedEnvironment.Name, } } // Region returns the AWS region name, such as "us-west-2", where the deployments will occur. func (stg *PipelineStage) Region() string { return stg.associatedEnvironment.Region } // ExecRoleARN returns the IAM role assumed by CloudFormation to create or update resources defined in a template. func (stg *PipelineStage) ExecRoleARN() string { return stg.execRoleARN } // EnvManagerRoleARN returns the IAM role used to create or update CloudFormation stacks in an environment. func (stg *PipelineStage) EnvManagerRoleARN() string { return stg.envManagerRoleARN } // Test returns a test for the stage. // If the stage does not have any test commands, then returns nil. func (stg *PipelineStage) Test() (*TestCommandsAction, error) { if len(stg.testCommands) == 0 { return nil, nil } var prevActions []orderedRunner deployActions, err := stg.Deployments() if err != nil { return nil, err } for i := range deployActions { prevActions = append(prevActions, &deployActions[i]) } return &TestCommandsAction{ action: action{ prevActions: prevActions, }, commands: stg.testCommands, }, nil } // Deployments returns a list of deploy actions for the pipeline. func (stg *PipelineStage) Deployments() ([]DeployAction, error) { var prevActions []orderedRunner if approval := stg.Approval(); approval != nil { prevActions = append(prevActions, approval) } topo, err := graph.TopologicalOrder(stg.buildDeploymentsGraph()) if err != nil { return nil, fmt.Errorf("find an ordering for deployments: %v", err) } var actions []DeployAction for name, conf := range stg.deployments { actions = append(actions, DeployAction{ action: action{ prevActions: prevActions, }, name: name, envName: stg.associatedEnvironment.Name, appName: stg.AppName, override: conf, ranker: topo, }) } sort.Slice(actions, func(i, j int) bool { return actions[i].Name() < actions[j].Name() }) return actions, nil } func (stg *PipelineStage) buildDeploymentsGraph() *graph.Graph[string] { var names []string for name := range stg.deployments { names = append(names, name) } digraph := graph.New(names...) for name, conf := range stg.deployments { if conf == nil { continue } for _, dependency := range conf.DependsOn { digraph.Add(graph.Edge[string]{ From: dependency, // Dependency must be completed before name. To: name, }) } } return digraph } type orderedRunner interface { RunOrder() int } // action represents a generic CodePipeline action. type action struct { prevActions []orderedRunner // The last actions to be executed immediately before this action. } // RunOrder returns the order in which the action should run. A higher numbers means the action is run later. // Actions with the same RunOrder run in parallel. func (a *action) RunOrder() int { max := 0 for _, prevAction := range a.prevActions { if cur := prevAction.RunOrder(); cur > max { max = cur } } return max + 1 } // ManualApprovalAction represents a stage approval action. type ManualApprovalAction struct { action name string // Name of the stage to approve. } // Name returns the name of the CodePipeline approval action for the stage. func (a *ManualApprovalAction) Name() string { return fmt.Sprintf("ApprovePromotionTo-%s", a.name) } type ranker interface { Rank(name string) (int, bool) } // DeployAction represents a CodePipeline action of category "Deploy" for a cloudformation stack. type DeployAction struct { action name string envName string appName string override *manifest.Deployment // User defined settings over Copilot's defaults. ranker ranker // Interface to rank this deployment action against others in the same stage. } // Name returns the name of the CodePipeline deploy action for a workload. func (a *DeployAction) Name() string { return fmt.Sprintf("CreateOrUpdate-%s-%s", a.name, a.envName) } // StackName returns the name of the workload stack to create or update. func (a *DeployAction) StackName() string { if a.override != nil && a.override.StackName != "" { return a.override.StackName } return fmt.Sprintf("%s-%s-%s", a.appName, a.envName, a.name) } // TemplatePath returns the path of the CloudFormation template file generated during the build phase. func (a *DeployAction) TemplatePath() string { if a.override != nil && a.override.TemplatePath != "" { return a.override.TemplatePath } // Use path.Join instead of filepath to join with "/" instead of OS-specific file separators. return path.Join(DefaultPipelineArtifactsDir, fmt.Sprintf(WorkloadCfnTemplateNameFormat, a.name, a.envName)) } // TemplateConfigPath returns the path of the CloudFormation template config file generated during the build phase. func (a *DeployAction) TemplateConfigPath() string { if a.override != nil && a.override.TemplateConfig != "" { return a.override.TemplateConfig } // Use path.Join instead of filepath to join with "/" instead of OS-specific file separators. return path.Join(DefaultPipelineArtifactsDir, fmt.Sprintf(WorkloadCfnTemplateConfigurationNameFormat, a.name, a.envName)) } // RunOrder returns the order in which the action should run. func (a *DeployAction) RunOrder() int { rank, _ := a.ranker.Rank(a.name) // The deployment is guaranteed to be in the ranker. return a.action.RunOrder() /* baseline */ + rank } // TestCommandsAction represents a CodePipeline action of category "Test" to validate deployments. type TestCommandsAction struct { action commands []string } // Name returns the name of the test action. func (a *TestCommandsAction) Name() string { return "TestCommands" } // Commands returns the list commands to run part of the test action. func (a *TestCommandsAction) Commands() []string { return a.commands }
729
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package deploy import ( "errors" "testing" "gopkg.in/yaml.v3" "github.com/aws/copilot-cli/internal/pkg/config" "github.com/aws/copilot-cli/internal/pkg/manifest" "github.com/aws/aws-sdk-go/aws" "github.com/stretchr/testify/require" ) func TestPipelineSourceFromManifest(t *testing.T) { testCases := map[string]struct { mfSource *manifest.Source expectedDeploySource interface{} expectedShouldPrompt bool expectedErr error }{ "transforms GitHubV1 source": { mfSource: &manifest.Source{ ProviderName: manifest.GithubV1ProviderName, Properties: map[string]interface{}{ "branch": "test", "repository": "some/repository/URL", "access_token_secret": "secretiveSecret", }, }, expectedDeploySource: &GitHubV1Source{ ProviderName: manifest.GithubV1ProviderName, Branch: "test", RepositoryURL: "some/repository/URL", PersonalAccessTokenSecretID: "secretiveSecret", }, expectedShouldPrompt: false, expectedErr: nil, }, "error out if using GitHubV1 while not having access token secret": { mfSource: &manifest.Source{ ProviderName: manifest.GithubV1ProviderName, Properties: map[string]interface{}{ "branch": "test", "repository": "some/repository/URL", }, }, expectedShouldPrompt: false, expectedErr: errors.New("missing `access_token_secret` in properties"), }, "error out if a string property is not a string": { mfSource: &manifest.Source{ ProviderName: manifest.GithubV1ProviderName, Properties: map[string]interface{}{ "branch": "test", "repository": []int{1, 2, 3}, }, }, expectedShouldPrompt: false, expectedErr: errors.New("property `repository` is not a string"), }, "transforms GitHub (v2) source without existing connection": { mfSource: &manifest.Source{ ProviderName: manifest.GithubProviderName, Properties: map[string]interface{}{ "branch": "test", "repository": "some/repository/URL", }, }, expectedDeploySource: &GitHubSource{ ProviderName: manifest.GithubProviderName, Branch: "test", RepositoryURL: "some/repository/URL", }, expectedShouldPrompt: true, expectedErr: nil, }, "transforms GitHub (v2) source with existing connection": { mfSource: &manifest.Source{ ProviderName: manifest.GithubProviderName, Properties: map[string]interface{}{ "branch": "test", "repository": "some/repository/URL", "connection_arn": "barnARN", }, }, expectedDeploySource: &GitHubSource{ ProviderName: manifest.GithubProviderName, Branch: "test", RepositoryURL: "some/repository/URL", ConnectionARN: "barnARN", }, expectedShouldPrompt: false, expectedErr: nil, }, "transforms Bitbucket source without existing connection": { mfSource: &manifest.Source{ ProviderName: manifest.BitbucketProviderName, Properties: map[string]interface{}{ "branch": "test", "repository": "some/repository/URL", }, }, expectedDeploySource: &BitbucketSource{ ProviderName: manifest.BitbucketProviderName, Branch: "test", RepositoryURL: "some/repository/URL", }, expectedShouldPrompt: true, expectedErr: nil, }, "transforms Bitbucket source with existing connection": { mfSource: &manifest.Source{ ProviderName: manifest.BitbucketProviderName, Properties: map[string]interface{}{ "branch": "test", "repository": "some/repository/URL", "connection_arn": "yarnARN", }, }, expectedDeploySource: &BitbucketSource{ ProviderName: manifest.BitbucketProviderName, Branch: "test", RepositoryURL: "some/repository/URL", ConnectionARN: "yarnARN", }, expectedShouldPrompt: false, expectedErr: nil, }, "transforms CodeCommit source": { mfSource: &manifest.Source{ ProviderName: manifest.CodeCommitProviderName, Properties: map[string]interface{}{ "branch": "test", "repository": "some/repository/URL", "output_artifact_format": "testFormat", }, }, expectedDeploySource: &CodeCommitSource{ ProviderName: manifest.CodeCommitProviderName, Branch: "test", RepositoryURL: "some/repository/URL", OutputArtifactFormat: "testFormat", }, expectedShouldPrompt: false, expectedErr: nil, }, "use default branch `main` if branch is not configured": { mfSource: &manifest.Source{ ProviderName: manifest.CodeCommitProviderName, Properties: map[string]interface{}{ "repository": "some/repository/URL", }, }, expectedDeploySource: &CodeCommitSource{ ProviderName: manifest.CodeCommitProviderName, Branch: "main", RepositoryURL: "some/repository/URL", }, expectedShouldPrompt: false, expectedErr: nil, }, "error out if repository is not configured": { mfSource: &manifest.Source{ ProviderName: manifest.CodeCommitProviderName, Properties: map[string]interface{}{}, }, expectedShouldPrompt: false, expectedErr: errors.New("missing `repository` in properties"), }, "errors if user changed provider name in manifest to unsupported source": { mfSource: &manifest.Source{ ProviderName: "BitCommitHubBucket", Properties: map[string]interface{}{ "branch": "test", "repository": "some/repository/URL", }, }, expectedDeploySource: nil, expectedShouldPrompt: false, expectedErr: errors.New("invalid repo source provider: BitCommitHubBucket"), }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { source, shouldPrompt, err := PipelineSourceFromManifest(tc.mfSource) if tc.expectedErr != nil { require.EqualError(t, err, tc.expectedErr.Error()) } else { require.NoError(t, err) require.Equal(t, tc.expectedDeploySource, source, "mismatched source") require.Equal(t, tc.expectedShouldPrompt, shouldPrompt, "mismatched bool for prompting") } }) } } func TestPipelineBuild_Init(t *testing.T) { const ( defaultImage = "aws/codebuild/amazonlinux2-x86_64-standard:4.0" defaultEnvType = "LINUX_CONTAINER" ) yamlNode := yaml.Node{} policyDocument := []byte(` Statement: Action: '*' Effect: Allow Resource: '*' Version: 2012-10-17`) require.NoError(t, yaml.Unmarshal(policyDocument, &yamlNode)) testCases := map[string]struct { mfBuild *manifest.Build mfDirPath string expectedBuild Build }{ "set default image and env type if not specified in manifest; override default if buildspec path in manifest": { mfBuild: &manifest.Build{ Buildspec: "some/path", }, expectedBuild: Build{ Image: defaultImage, EnvironmentType: defaultEnvType, BuildspecPath: "some/path", }, }, "set image according to manifest": { mfBuild: &manifest.Build{ Image: "aws/codebuild/standard:3.0", Buildspec: "some/path", }, expectedBuild: Build{ Image: "aws/codebuild/standard:3.0", EnvironmentType: defaultEnvType, BuildspecPath: "some/path", }, }, "set image according to manifest (ARM based)": { mfBuild: &manifest.Build{ Image: "aws/codebuild/amazonlinux2-aarch64-standard:2.0", Buildspec: "some/path", }, expectedBuild: Build{ Image: "aws/codebuild/amazonlinux2-aarch64-standard:2.0", EnvironmentType: "ARM_CONTAINER", BuildspecPath: "some/path", }, }, "additional policy is not empty": { mfBuild: &manifest.Build{ Image: "aws/codebuild/amazonlinux2-aarch64-standard:2.0", Buildspec: "some/path", AdditionalPolicy: struct { Document yaml.Node `yaml:"PolicyDocument,omitempty"` }{ Document: yamlNode, }, }, expectedBuild: Build{ Image: "aws/codebuild/amazonlinux2-aarch64-standard:2.0", EnvironmentType: "ARM_CONTAINER", BuildspecPath: "some/path", AdditionalPolicyDocument: "Statement:\n Action: '*'\n Effect: Allow\n Resource: '*'\nVersion: 2012-10-17", }, }, "additional policy is empty": { mfBuild: &manifest.Build{ Image: "aws/codebuild/amazonlinux2-aarch64-standard:2.0", Buildspec: "some/path", }, expectedBuild: Build{ Image: "aws/codebuild/amazonlinux2-aarch64-standard:2.0", EnvironmentType: "ARM_CONTAINER", BuildspecPath: "some/path", AdditionalPolicyDocument: "", }, }, "by default convert legacy manifest path to buildspec path": { mfDirPath: "copilot/", expectedBuild: Build{ Image: defaultImage, EnvironmentType: defaultEnvType, BuildspecPath: "copilot/buildspec.yml", }, }, "by default convert non-legacy manifest path to buildspec path": { mfDirPath: "copilot/pipelines/my-pipeline/", expectedBuild: Build{ Image: defaultImage, EnvironmentType: defaultEnvType, BuildspecPath: "copilot/pipelines/my-pipeline/buildspec.yml", }, }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { var build Build build.Init(tc.mfBuild, tc.mfDirPath) require.Equal(t, tc.expectedBuild, build, "mismatched build") }) } } func TestParseOwnerAndRepo(t *testing.T) { testCases := map[string]struct { src *GitHubSource expectedErrMsg *string expectedOwner string expectedRepo string }{ "missing repository property": { src: &GitHubSource{ RepositoryURL: "", Branch: "main", }, expectedErrMsg: aws.String("unable to locate the repository"), }, "valid GH repository property": { src: &GitHubSource{ RepositoryURL: "chicken/wings", }, expectedErrMsg: nil, expectedOwner: "chicken", expectedRepo: "wings", }, "valid full GH repository name": { src: &GitHubSource{ RepositoryURL: "https://github.com/badgoose/chaOS", }, expectedErrMsg: nil, expectedOwner: "badgoose", expectedRepo: "chaOS", }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { owner, repo, err := tc.src.RepositoryURL.parse() if tc.expectedErrMsg != nil { require.Contains(t, err.Error(), *tc.expectedErrMsg) } else { require.NoError(t, err, "expected error") require.Equal(t, tc.expectedOwner, owner, "mismatched owner") require.Equal(t, tc.expectedRepo, repo, "mismatched repo") } }) } } func TestPipelineStage_Init(t *testing.T) { var stg PipelineStage stg.Init(&config.Environment{ Name: "test", App: "badgoose", Region: "us-west-2", AccountID: "123456789012", ManagerRoleARN: "arn:aws:iam::123456789012:role/badgoose-test-EnvManagerRole", ExecutionRoleARN: "arn:aws:iam::123456789012:role/badgoose-test-CFNExecutionRole", }, &manifest.PipelineStage{ Name: "test", RequiresApproval: true, TestCommands: []string{"make test", "echo \"made test\""}, }, []string{"frontend", "backend"}) t.Run("stage name matches the environment's name", func(t *testing.T) { require.Equal(t, "test", stg.Name()) }) t.Run("stage region matches the environment's region", func(t *testing.T) { require.Equal(t, "us-west-2", stg.Region()) }) t.Run("stage env manager role ARN matches the environment's config", func(t *testing.T) { require.Equal(t, "arn:aws:iam::123456789012:role/badgoose-test-EnvManagerRole", stg.EnvManagerRoleARN()) }) t.Run("stage exec role ARN matches the environment's config", func(t *testing.T) { require.Equal(t, "arn:aws:iam::123456789012:role/badgoose-test-CFNExecutionRole", stg.ExecRoleARN()) }) t.Run("number of expected deployments match", func(t *testing.T) { deployments, err := stg.Deployments() require.NoError(t, err) require.Equal(t, 2, len(deployments)) }) t.Run("manual approval button", func(t *testing.T) { require.NotNil(t, stg.Approval(), "should require approval action for stages when the manifest requires it") stg := PipelineStage{} require.Nil(t, stg.Approval(), "should return nil by default") }) } func TestPipelineStage_Deployments(t *testing.T) { testCases := map[string]struct { stg *PipelineStage wantedRunOrder map[string]int wantedTemplateOrder []string wantedErr error }{ "should return an error when the deployments contain a cycle": { stg: func() *PipelineStage { // Create a pipeline with a self-depending deployment. var stg PipelineStage stg.Init(&config.Environment{Name: "test"}, &manifest.PipelineStage{ Name: "test", Deployments: map[string]*manifest.Deployment{ "api": { DependsOn: []string{"api"}, }, }, }, nil) return &stg }(), wantedErr: errors.New("find an ordering for deployments: graph contains a cycle: api"), }, "should return the expected run orders": { stg: func() *PipelineStage { // Create a pipeline with a manual approval and 4 deployments. var stg PipelineStage stg.Init(&config.Environment{Name: "test"}, &manifest.PipelineStage{ Name: "test", RequiresApproval: true, Deployments: map[string]*manifest.Deployment{ "frontend": { DependsOn: []string{"orders", "payments"}, }, "orders": { DependsOn: []string{"warehouse"}, }, "payments": nil, "warehouse": nil, }, }, nil) return &stg }(), wantedRunOrder: map[string]int{ "CreateOrUpdate-frontend-test": 4, "CreateOrUpdate-orders-test": 3, "CreateOrUpdate-payments-test": 2, "CreateOrUpdate-warehouse-test": 2, }, }, "deployments should be alphabetically sorted so that integration tests are deterministic": { stg: func() *PipelineStage { // Create a pipeline with all local workloads deployed in parallel. var stg PipelineStage stg.Init(&config.Environment{Name: "test"}, &manifest.PipelineStage{ Name: "test", }, []string{"b", "a", "d", "c"}) return &stg }(), wantedRunOrder: map[string]int{ "CreateOrUpdate-a-test": 1, "CreateOrUpdate-b-test": 1, "CreateOrUpdate-c-test": 1, "CreateOrUpdate-d-test": 1, }, wantedTemplateOrder: []string{"CreateOrUpdate-a-test", "CreateOrUpdate-b-test", "CreateOrUpdate-c-test", "CreateOrUpdate-d-test"}, }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { deployments, err := tc.stg.Deployments() if tc.wantedErr != nil { require.EqualError(t, err, tc.wantedErr.Error()) } else { require.NoError(t, err) for _, deployment := range deployments { wanted, ok := tc.wantedRunOrder[deployment.Name()] require.True(t, ok, "expected deployment named %s to be created", deployment.Name()) require.Equal(t, wanted, deployment.RunOrder(), "order for deployment %s does not match", deployment.Name()) } for i, wanted := range tc.wantedTemplateOrder { require.Equal(t, wanted, deployments[i].Name(), "deployment name at index %d do not match", i) } } }) } } type mockAction struct { order int } func (ma mockAction) RunOrder() int { return ma.order } func TestAction_RunOrder(t *testing.T) { testCases := map[string]struct { previous []orderedRunner wanted int }{ "should return 1 when there are no previous actions": { wanted: 1, }, "should return the max of previous actions + 1": { previous: []orderedRunner{ mockAction{order: 8}, mockAction{order: 7}, mockAction{order: 9}, mockAction{order: 8}, }, wanted: 10, }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { // GIVEN action := action{ prevActions: tc.previous, } // THEN require.Equal(t, tc.wanted, action.RunOrder()) }) } } func TestManualApprovalAction_Name(t *testing.T) { action := ManualApprovalAction{ name: "test", } require.Equal(t, "ApprovePromotionTo-test", action.Name()) } func TestDeployAction_Name(t *testing.T) { action := DeployAction{ name: "frontend", envName: "test", } require.Equal(t, "CreateOrUpdate-frontend-test", action.Name()) } func TestDeployAction_StackName(t *testing.T) { testCases := map[string]struct { in DeployAction wanted string }{ "should default to app-env-name when user does not override the stack name": { in: DeployAction{ name: "frontend", envName: "test", appName: "phonetool", }, wanted: "phonetool-test-frontend", }, "should use custom user override stack name when present": { in: DeployAction{ override: &manifest.Deployment{ StackName: "other-stack", }, }, wanted: "other-stack", }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { require.Equal(t, tc.wanted, tc.in.StackName()) }) } } func TestDeployAction_TemplatePath(t *testing.T) { testCases := map[string]struct { in DeployAction wanted string }{ "default location for workload templates": { in: DeployAction{ name: "frontend", envName: "test", }, wanted: "infrastructure/frontend-test.stack.yml", }, "should use custom override template path when present": { in: DeployAction{ override: &manifest.Deployment{ TemplatePath: "infrastructure/custom.yml", }, }, wanted: "infrastructure/custom.yml", }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { require.Equal(t, tc.wanted, tc.in.TemplatePath()) }) } } func TestDeployAction_TemplateConfigPath(t *testing.T) { testCases := map[string]struct { in DeployAction wanted string }{ "default location for workload template configs": { in: DeployAction{ name: "frontend", envName: "test", }, wanted: "infrastructure/frontend-test.params.json", }, "should use custom override template config path when present": { in: DeployAction{ override: &manifest.Deployment{ TemplateConfig: "infrastructure/custom.params.json", }, }, wanted: "infrastructure/custom.params.json", }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { require.Equal(t, tc.wanted, tc.in.TemplateConfigPath()) }) } } type mockRanker struct { rank int ok bool } func (m mockRanker) Rank(name string) (int, bool) { return m.rank, m.ok } func TestDeployAction_RunOrder(t *testing.T) { // GIVEN ranker := mockRanker{rank: 2} past := []orderedRunner{ mockAction{ order: 3, }, } in := DeployAction{ action: action{prevActions: past}, ranker: ranker, } // THEN require.Equal(t, 6, in.RunOrder(), "should be past actions + 1 + rank") } func TestTestCommandsAction_Name(t *testing.T) { require.Equal(t, "TestCommands", (&TestCommandsAction{}).Name()) } func TestParseRepo(t *testing.T) { testCases := map[string]struct { src *CodeCommitSource expectedErr error expectedOwner string expectedRepo string }{ "missing repository property": { src: &CodeCommitSource{ RepositoryURL: "", }, expectedErr: errors.New("unable to locate the repository"), }, "unable to parse repository name from URL": { src: &CodeCommitSource{ RepositoryURL: "https://hahahaha.wrong.URL/repositories/wings/browse", }, expectedErr: errors.New("unable to parse the repository from the URL https://hahahaha.wrong.URL/repositories/wings/browse"), expectedOwner: "", expectedRepo: "wings", }, "valid full CC repository name": { src: &CodeCommitSource{ RepositoryURL: "https://us-west-2.console.aws.amazon.com/codesuite/codecommit/repositories/wings/browse", }, expectedOwner: "", expectedRepo: "wings", }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { repo, err := tc.src.parseRepo() if tc.expectedErr != nil { require.EqualError(t, err, tc.expectedErr.Error()) } else { require.NoError(t, err, "expected error") require.Equal(t, tc.expectedRepo, repo, "mismatched repo") } }) } }
705
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 // Package deploy holds the structures to deploy infrastructure resources. // This file defines workload deployment resources. package deploy import ( "errors" "fmt" "strings" "github.com/aws/aws-sdk-go/aws/arn" ) var ( errInvalidTopicARN = errors.New("ARN is not a Copilot SNS topic") errInvalidARN = errors.New("invalid ARN format") errInvalidARNService = errors.New("ARN is not an SNS topic") errInvalidComponent = errors.New("topic must be initialized with valid app, env, and workload") ) var ( fmtTopicDescription = "%s (%s)" ) // Topic holds information about a Copilot SNS topic and its ARN, ID, and Name. type Topic struct { awsARN arn.ARN prefix string wkld string name string } // NewTopic creates a new Topic struct, validating the ARN as a Copilot-managed SNS topic. // This function will func NewTopic(inputARN string, app, env, wkld string) (*Topic, error) { if app == "" || env == "" || wkld == "" { return nil, errInvalidComponent } parsedARN, err := arn.Parse(inputARN) if err != nil { return nil, errInvalidARN } if parsedARN.Service != snsServiceName { return nil, errInvalidARNService } t := &Topic{ prefix: fmt.Sprintf(fmtSNSTopicNamePrefix, app, env, wkld), wkld: wkld, awsARN: parsedARN, } if err = t.validateAndExtractName(); err != nil { return nil, err } return t, nil } // ARN returns the full ARN of the SNS topic. func (t Topic) ARN() string { return t.awsARN.String() } // String returns the human-readable string which contains the topic name and workload it's associated with. // Example: arn:aws:us-west-2:sns:123456789012:app-env-wkld-topic -> topic (wkld) func (t Topic) String() string { return fmt.Sprintf(fmtTopicDescription, t.name, t.wkld) } // Workload returns the workload associated with the given topic. func (t Topic) Workload() string { return t.wkld } // Name returns the name of the given topic. func (t Topic) Name() string { return t.name } // validateAndExtractName determines whether the given ARN is a Copilot-valid SNS topic ARN. // It extracts the topic name from the ARN resource field. func (t *Topic) validateAndExtractName() error { // Check that the topic name has the correct app-env-workload prefix. if !strings.HasPrefix(t.awsARN.Resource, t.prefix) { return errInvalidTopicARN } // Check that the topic resources ID has a postfix AFTER that prefix. if len(t.awsARN.Resource)-len(t.prefix) == 0 { return errInvalidTopicARN } t.name = t.awsARN.Resource[len(t.prefix):] return nil }
98
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package deploy import ( "testing" "github.com/stretchr/testify/require" ) const ( mockGoodARN = "arn:aws:sns:us-west-2:12345678012:app-env-svc-topic" mockBadARN = "arn:aws:sns:us-west-2:12345678012:topic" mockApp = "app" mockEnv = "env" mockSvc = "svc" ) func TestTopic_String(t *testing.T) { testCases := map[string]struct { inputARN string inputApp string inputEnv string inputWkld string wanted string wantedError error }{ "good arn": { inputARN: mockGoodARN, inputApp: mockApp, inputEnv: mockEnv, inputWkld: mockSvc, wanted: "topic (svc)", }, "bad arn format": { inputARN: "bad arn", wantedError: errInvalidARN, inputApp: mockApp, inputEnv: mockEnv, inputWkld: mockSvc, }, "bad arn: non-copilot topic": { inputARN: mockBadARN, inputApp: mockApp, inputEnv: mockEnv, inputWkld: mockSvc, wantedError: errInvalidTopicARN, }, "bad arn: arn for non-sns service": { inputARN: "arn:aws:s3:::bucketname", inputApp: mockApp, inputEnv: mockEnv, inputWkld: mockSvc, wantedError: errInvalidARNService, }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { topic, err := NewTopic(tc.inputARN, tc.inputApp, tc.inputEnv, tc.inputWkld) if tc.wantedError != nil { require.EqualError(t, err, tc.wantedError.Error()) } else { require.NoError(t, err) require.Equal(t, tc.wanted, topic.String()) } }) } }
73
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 // Package deploy holds the structures to deploy infrastructure resources. // This file defines service deployment resources. package deploy import ( "fmt" "strings" ) // FmtTaskECRRepoName is the pattern used to generate the ECR repository's name const FmtTaskECRRepoName = "copilot-%s" // CreateTaskResourcesInput holds the fields required to create a task stack. type CreateTaskResourcesInput struct { Name string CPU int Memory int Image string PermissionsBoundary string TaskRole string ExecutionRole string Command []string EntryPoint []string EnvVars map[string]string EnvFileARN string SSMParamSecrets map[string]string SecretsManagerSecrets map[string]string OS string Arch string App string Env string AdditionalTags map[string]string } // TaskStackInfo contains essential information about a Copilot task stack type TaskStackInfo struct { StackName string App string Env string RoleARN string BucketName string } // TaskName returns the name of the one-off task. This is the same as the value of the // copilot-task tag. For example, a stack called "task-db-migrate" will have the TaskName "db-migrate" func (t TaskStackInfo) TaskName() string { return strings.SplitN(t.StackName, "-", 2)[1] } // ECRRepoName returns the name of the ECR repo for the one-off task. func (t TaskStackInfo) ECRRepoName() string { return fmt.Sprintf(FmtTaskECRRepoName, t.TaskName()) }
63
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 // Package deploy holds the structures to deploy infrastructure resources. // This file defines workload deployment resources. package deploy const ( // WorkloadCfnTemplateNameFormat is the base output file name when `service package` // or `job package` is called. This is also used to render the pipeline CFN template. WorkloadCfnTemplateNameFormat = "%s-%s.stack.yml" // WorkloadCfnTemplateConfigurationNameFormat is the base output configuration // file name when `service package` or `job package is called. It's also used to // render the pipeline CFN template. WorkloadCfnTemplateConfigurationNameFormat = "%s-%s.params.json" // AddonsCfnTemplateNameFormat is the addons output file name when `service package` // is called. AddonsCfnTemplateNameFormat = "%s.addons.stack.yml" ) // DeleteWorkloadInput holds the fields required to delete a workload. type DeleteWorkloadInput struct { Name string EnvName string AppName string ExecutionRoleARN string }
28
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package cloudformation import ( "context" "errors" "fmt" "time" "github.com/aws/copilot-cli/internal/pkg/stream" "github.com/aws/copilot-cli/internal/pkg/version" "golang.org/x/sync/errgroup" "github.com/aws/copilot-cli/internal/pkg/term/log" "github.com/aws/copilot-cli/internal/pkg/term/progress" sdkcloudformation "github.com/aws/aws-sdk-go/service/cloudformation" sdkcloudformationiface "github.com/aws/aws-sdk-go/service/cloudformation/cloudformationiface" "github.com/aws/copilot-cli/internal/pkg/aws/cloudformation" "github.com/aws/copilot-cli/internal/pkg/aws/cloudformation/stackset" "github.com/aws/copilot-cli/internal/pkg/config" "github.com/aws/copilot-cli/internal/pkg/deploy" "github.com/aws/copilot-cli/internal/pkg/deploy/cloudformation/stack" ) // DeployApp sets up everything required for our application-wide resources. // These resources include things that are regional, rather than scoped to a particular // environment, such as ECR Repos, CodePipeline KMS keys & S3 buckets. // We deploy application resources through StackSets - that way we can have one // template that we update and all regional stacks are updated. func (cf CloudFormation) DeployApp(in *deploy.CreateAppInput) error { appConfig := stack.NewAppStackConfig(in) s, err := toStack(appConfig) if err != nil { return err } if err := cf.executeAndRenderChangeSet(cf.newCreateChangeSetInput(cf.console, s)); err != nil { var alreadyExists *cloudformation.ErrStackAlreadyExists if !errors.As(err, &alreadyExists) { return err } } blankAppTemplate, err := appConfig.ResourceTemplate(&stack.AppResourcesConfig{ App: appConfig.Name, }) if err != nil { return err } stackSetAdminRoleARN, err := appConfig.StackSetAdminRoleARN(cf.region) if err != nil { return fmt.Errorf("get stack set administrator role arn: %w", err) } return cf.appStackSet.Create(appConfig.StackSetName(), blankAppTemplate, stackset.WithDescription(appConfig.StackSetDescription()), stackset.WithExecutionRoleName(appConfig.StackSetExecutionRoleName()), stackset.WithAdministrationRoleARN(stackSetAdminRoleARN), stackset.WithTags(toMap(appConfig.Tags()))) } // UpgradeApplication upgrades the application stack to the latest version. func (cf CloudFormation) UpgradeApplication(in *deploy.CreateAppInput) error { appConfig := stack.NewAppStackConfig(in) appStack, err := cf.cfnClient.Describe(appConfig.StackName()) if err != nil { return fmt.Errorf("get existing application infrastructure stack: %w", err) } in.DNSDelegationAccounts = stack.DNSDelegatedAccountsForStack(appStack.SDK()) in.AdditionalTags = toMap(appStack.Tags) appConfig = stack.NewAppStackConfig(in) if err := cf.upgradeAppStack(appConfig); err != nil { var empty *cloudformation.ErrChangeSetEmpty if !errors.As(err, &empty) { return fmt.Errorf("upgrade stack %q: %w", appConfig.StackName(), err) } } return cf.upgradeAppStackSet(appConfig) } func (cf CloudFormation) upgradeAppStackSet(config *stack.AppStackConfig) error { for { ssName := config.StackSetName() if err := cf.appStackSet.WaitForStackSetLastOperationComplete(ssName); err != nil { return fmt.Errorf("wait for stack set %s last operation complete: %w", ssName, err) } previouslyDeployedConfig, err := cf.getLastDeployedAppConfig(config) if err != nil { return err } previouslyDeployedConfig.Version += 1 err = cf.deployAppConfig(config, previouslyDeployedConfig, true /* updating template resources should update all instances*/) if err == nil { return nil } var stackSetOutOfDateErr *stackset.ErrStackSetOutOfDate if errors.As(err, &stackSetOutOfDateErr) { continue } return err } } func (cf CloudFormation) upgradeAppStack(conf *stack.AppStackConfig) error { s, err := toStack(conf) if err != nil { return err } in := &executeAndRenderChangeSetInput{ stackName: s.Name, stackDescription: fmt.Sprintf("Creating the infrastructure for the %s app.", s.Name), } in.createChangeSet = func() (changeSetID string, err error) { spinner := progress.NewSpinner(cf.console) label := fmt.Sprintf("Proposing infrastructure changes for %s.", s.Name) spinner.Start(label) defer stopSpinner(spinner, err, label) changeSetID, err = cf.cfnClient.Update(s) if err != nil { return "", err } return changeSetID, nil } return cf.executeAndRenderChangeSet(in) } // DelegateDNSPermissions grants the provided account ID the ability to write to this application's // DNS HostedZone. This allows us to perform cross account DNS delegation. func (cf CloudFormation) DelegateDNSPermissions(app *config.Application, accountID string) error { deployApp := deploy.CreateAppInput{ Name: app.Name, AccountID: app.AccountID, DomainName: app.Domain, DomainHostedZoneID: app.DomainHostedZoneID, Version: version.LatestTemplateVersion(), } appConfig := stack.NewAppStackConfig(&deployApp) appStack, err := cf.cfnClient.Describe(appConfig.StackName()) if err != nil { return fmt.Errorf("getting existing application infrastructure stack: %w", err) } dnsDelegatedAccounts := stack.DNSDelegatedAccountsForStack(appStack.SDK()) deployApp.DNSDelegationAccounts = append(dnsDelegatedAccounts, accountID) s, err := toStack(stack.NewAppStackConfig(&deployApp)) if err != nil { return err } if err := cf.cfnClient.UpdateAndWait(s); err != nil { var errNoUpdates *cloudformation.ErrChangeSetEmpty if errors.As(err, &errNoUpdates) { return nil } return fmt.Errorf("updating application to allow DNS delegation: %w", err) } return nil } // GetAppResourcesByRegion fetches all the regional resources for a particular region. func (cf CloudFormation) GetAppResourcesByRegion(app *config.Application, region string) (*stack.AppRegionalResources, error) { resources, err := cf.getResourcesForStackInstances(app, &region) if err != nil { return nil, fmt.Errorf("describing application resources: %w", err) } if len(resources) == 0 { return nil, fmt.Errorf("no regional resources for application %s in region %s found", app.Name, region) } return resources[0], nil } // GetRegionalAppResources fetches all the regional resources for a particular application. func (cf CloudFormation) GetRegionalAppResources(app *config.Application) ([]*stack.AppRegionalResources, error) { resources, err := cf.getResourcesForStackInstances(app, nil) if err != nil { return nil, fmt.Errorf("describing application resources: %w", err) } return resources, nil } func (cf CloudFormation) getResourcesForStackInstances(app *config.Application, region *string) ([]*stack.AppRegionalResources, error) { appConfig := stack.NewAppStackConfig(&deploy.CreateAppInput{ Name: app.Name, AccountID: app.AccountID, }) opts := []stackset.InstanceSummariesOption{ stackset.FilterSummariesByAccountID(app.AccountID), } if region != nil { opts = append(opts, stackset.FilterSummariesByRegion(*region)) } summaries, err := cf.appStackSet.InstanceSummaries(appConfig.StackSetName(), opts...) if err != nil { return nil, err } var regionalResources []*stack.AppRegionalResources for _, summary := range summaries { // Since these stacks will likely be in another region, we can't use // the default cf client. Instead, we'll have to create a new client // configured with the stack's region. regionalCFClient := cf.regionalClient(summary.Region) cfStack, err := regionalCFClient.Describe(summary.StackID) if err != nil { return nil, fmt.Errorf("getting outputs for stack %s in region %s: %w", summary.StackID, summary.Region, err) } regionalResource, err := stack.ToAppRegionalResources(cfStack.SDK()) if err != nil { return nil, err } regionalResource.Region = summary.Region regionalResources = append(regionalResources, regionalResource) } return regionalResources, nil } // AddWorkloadToAppOpt allows passing optional parameters to AddServiceToApp. type AddWorkloadToAppOpt func(*stack.AppResourcesWorkload) // AddWorkloadToAppOptWithoutECR adds a workload to app without creating an ECR repo. func AddWorkloadToAppOptWithoutECR(s *stack.AppResourcesWorkload) { s.WithECR = false } // AddServiceToApp attempts to add new service specific resources to the application resource stack. // Currently, this means that we'll set up an ECR repo with a policy for all envs to be able // to pull from it. func (cf CloudFormation) AddServiceToApp(app *config.Application, svcName string, opts ...AddWorkloadToAppOpt) error { if err := cf.addWorkloadToApp(app, svcName, opts...); err != nil { return fmt.Errorf("adding service %s resources to application %s: %w", svcName, app.Name, err) } return nil } // AddJobToApp attempts to add new job-specific resources to the application resource stack. // Currently, this means that we'll set up an ECR repo with a policy for all envs to be able // to pull from it. func (cf CloudFormation) AddJobToApp(app *config.Application, jobName string, opts ...AddWorkloadToAppOpt) error { if err := cf.addWorkloadToApp(app, jobName, opts...); err != nil { return fmt.Errorf("adding job %s resources to application %s: %w", jobName, app.Name, err) } return nil } func (cf CloudFormation) addWorkloadToApp(app *config.Application, wlName string, opts ...AddWorkloadToAppOpt) error { appConfig := stack.NewAppStackConfig(&deploy.CreateAppInput{ Name: app.Name, AccountID: app.AccountID, AdditionalTags: app.Tags, Version: version.LatestTemplateVersion(), }) previouslyDeployedConfig, err := cf.getLastDeployedAppConfig(appConfig) if err != nil { return err } // We'll generate a new list of Accounts to add to our application // infrastructure by appending the environment's account if it // doesn't already exist. var wlList []stack.AppResourcesWorkload shouldAddNewWl := true for _, wl := range previouslyDeployedConfig.Workloads { wlList = append(wlList, wl) if wl.Name == wlName { shouldAddNewWl = false } } if !shouldAddNewWl { return nil } newAppResourcesService := &stack.AppResourcesWorkload{ Name: wlName, WithECR: true, } for _, opt := range opts { opt(newAppResourcesService) } wlList = append(wlList, *newAppResourcesService) newDeploymentConfig := stack.AppResourcesConfig{ Version: previouslyDeployedConfig.Version + 1, Workloads: wlList, Accounts: previouslyDeployedConfig.Accounts, App: appConfig.Name, } if err := cf.deployAppConfig(appConfig, &newDeploymentConfig, shouldAddNewWl); err != nil { return err } return nil } // RemoveServiceFromApp attempts to remove service-specific resources (ECR repositories) from the application resource stack. func (cf CloudFormation) RemoveServiceFromApp(app *config.Application, svcName string) error { if err := cf.removeWorkloadFromApp(app, svcName); err != nil { return fmt.Errorf("removing %s service resources from application: %w", svcName, err) } return nil } // RemoveJobFromApp attempts to remove job-specific resources (ECR repositories) from the application resource stack. func (cf CloudFormation) RemoveJobFromApp(app *config.Application, jobName string) error { if err := cf.removeWorkloadFromApp(app, jobName); err != nil { return fmt.Errorf("removing %s job resources from application: %w", jobName, err) } return nil } func (cf CloudFormation) removeWorkloadFromApp(app *config.Application, wlName string) error { appConfig := stack.NewAppStackConfig(&deploy.CreateAppInput{ Name: app.Name, AccountID: app.AccountID, AdditionalTags: app.Tags, Version: version.LatestTemplateVersion(), }) previouslyDeployedConfig, err := cf.getLastDeployedAppConfig(appConfig) if err != nil { return fmt.Errorf("get previous application %s config: %w", app.Name, err) } // We'll generate a new list of Accounts to remove the account associated // with the input workload to be removed. var wlList []stack.AppResourcesWorkload shouldRemoveWl := false for _, wl := range previouslyDeployedConfig.Workloads { if wl.Name == wlName { shouldRemoveWl = true continue } wlList = append(wlList, wl) } if !shouldRemoveWl { return nil } newDeploymentConfig := stack.AppResourcesConfig{ Version: previouslyDeployedConfig.Version + 1, Workloads: wlList, Accounts: previouslyDeployedConfig.Accounts, App: appConfig.Name, } if err := cf.deployAppConfig(appConfig, &newDeploymentConfig, shouldRemoveWl); err != nil { return err } return nil } // AddEnvToAppOpts contains the parameters to call AddEnvToApp. type AddEnvToAppOpts struct { App *config.Application EnvName string EnvAccountID string EnvRegion string } // AddEnvToApp takes a new environment and updates the application configuration // with new Account IDs in resource policies (KMS Keys and ECR Repos) - and // sets up a new stack instance if the environment is in a new region. func (cf CloudFormation) AddEnvToApp(opts *AddEnvToAppOpts) error { appConfig := stack.NewAppStackConfig(&deploy.CreateAppInput{ Name: opts.App.Name, AccountID: opts.App.AccountID, AdditionalTags: opts.App.Tags, Version: version.LatestTemplateVersion(), }) previouslyDeployedConfig, err := cf.getLastDeployedAppConfig(appConfig) if err != nil { return fmt.Errorf("getting previous deployed stackset %w", err) } // We'll generate a new list of Accounts to add to our application // infrastructure by appending the environment's account if it // doesn't already exist. var accountList []string shouldAddNewAccountID := true for _, accountID := range previouslyDeployedConfig.Accounts { accountList = append(accountList, accountID) if accountID == opts.EnvAccountID { shouldAddNewAccountID = false } } if shouldAddNewAccountID { accountList = append(accountList, opts.EnvAccountID) } newDeploymentConfig := stack.AppResourcesConfig{ Version: previouslyDeployedConfig.Version + 1, Workloads: previouslyDeployedConfig.Workloads, Accounts: accountList, App: appConfig.Name, } if err := cf.deployAppConfig(appConfig, &newDeploymentConfig, shouldAddNewAccountID); err != nil { return fmt.Errorf("adding %s environment resources to application: %w", opts.EnvName, err) } if err := cf.addNewAppStackInstances(appConfig, previouslyDeployedConfig, opts.EnvRegion); err != nil { return fmt.Errorf("adding new stack instance for environment %s: %w", opts.EnvName, err) } return nil } var getRegionFromClient = func(client sdkcloudformationiface.CloudFormationAPI) (string, error) { concrete, ok := client.(*sdkcloudformation.CloudFormation) if !ok { return "", errors.New("failed to retrieve the region") } return *concrete.Client.Config.Region, nil } // AddPipelineResourcesToApp conditionally adds resources needed to support // a pipeline in the application region (i.e. the same region that hosts our SSM store). // This is necessary because the application region might not contain any environment. func (cf CloudFormation) AddPipelineResourcesToApp( app *config.Application, appRegion string) error { appConfig := stack.NewAppStackConfig(&deploy.CreateAppInput{ Name: app.Name, AccountID: app.AccountID, Version: version.LatestTemplateVersion(), }) resourcesConfig, err := cf.getLastDeployedAppConfig(appConfig) if err != nil { return err } // conditionally create a new stack instance in the application region // if there's no existing stack instance. if err := cf.addNewAppStackInstances(appConfig, resourcesConfig, appRegion); err != nil { return fmt.Errorf("failed to add stack instance for pipeline, application: %s, region: %s, error: %w", app.Name, appRegion, err) } return nil } func (cf CloudFormation) deployAppConfig(appConfig *stack.AppStackConfig, resources *stack.AppResourcesConfig, hasInstanceUpdates bool) error { newTemplateToDeploy, err := appConfig.ResourceTemplate(resources) if err != nil { return err } // Every time we deploy the StackSet, we include a version field in the stack metadata. // When we go to update the StackSet, we include that version + 1 as the "Operation ID". // This ensures that we don't overwrite any changes that may have been applied between // us reading the stack and actually updating it. // As an example: // * We read the stack with Version 1 // * Someone else reads the stack with Version 1 // * We update the StackSet with Version 2, the update completes. // * Someone else tries to update the StackSet with their stale version 2. // * "2" has already been used as an operation ID, and the stale write fails. stackSetAdminRoleARN, err := appConfig.StackSetAdminRoleARN(cf.region) if err != nil { return fmt.Errorf("get stack set administrator role arn: %w", err) } renderInput := renderStackSetInput{ name: appConfig.StackSetName(), template: newTemplateToDeploy, hasInstanceUpdates: hasInstanceUpdates, createOpFn: func() (string, error) { return cf.appStackSet.Update(appConfig.StackSetName(), newTemplateToDeploy, stackset.WithOperationID(fmt.Sprintf("%d", resources.Version)), stackset.WithDescription(appConfig.StackSetDescription()), stackset.WithExecutionRoleName(appConfig.StackSetExecutionRoleName()), stackset.WithAdministrationRoleARN(stackSetAdminRoleARN), stackset.WithTags(toMap(appConfig.Tags()))) }, now: time.Now, } return cf.renderStackSet(renderInput) } // addNewAppStackInstances takes an environment and determines if we need to create a new // stack instance. We only spin up a new stack instance if the env is in a new region. func (cf CloudFormation) addNewAppStackInstances(appConfig *stack.AppStackConfig, resourcesConfig *stack.AppResourcesConfig, region string) error { summaries, err := cf.appStackSet.InstanceSummaries(appConfig.StackSetName()) if err != nil { return err } // We only want to deploy a new StackInstance if we're // adding an environment in a new region. shouldDeployNewStackInstance := true for _, summary := range summaries { if summary.Region == region { shouldDeployNewStackInstance = false } } if !shouldDeployNewStackInstance { return nil } template, err := appConfig.ResourceTemplate(resourcesConfig) if err != nil { return err } // Set up a new Stack Instance for the new region. The Stack Instance will inherit the latest StackSet template. renderInput := renderStackSetInput{ name: appConfig.StackSetName(), template: template, hasInstanceUpdates: shouldDeployNewStackInstance, createOpFn: func() (string, error) { return cf.appStackSet.CreateInstances(appConfig.StackSetName(), []string{appConfig.AccountID}, []string{region}) }, now: time.Now, } return cf.renderStackSet(renderInput) } func (cf CloudFormation) getLastDeployedAppConfig(appConfig *stack.AppStackConfig) (*stack.AppResourcesConfig, error) { // Check the existing deploy stack template. From that template, we'll parse out the list of services and accounts that // are deployed in the stack. descr, err := cf.appStackSet.Describe(appConfig.StackSetName()) if err != nil { return nil, err } previouslyDeployedConfig, err := stack.AppConfigFrom(&descr.Template) if err != nil { return nil, fmt.Errorf("parse previous deployed stackset %w", err) } previouslyDeployedConfig.App = appConfig.Name return previouslyDeployedConfig, nil } // DeleteApp deletes all application specific StackSet and Stack resources. func (cf CloudFormation) DeleteApp(appName string) error { spinner := progress.NewSpinner(cf.console) spinner.Start(fmt.Sprintf("Delete regional resources for application %q", appName)) stackSetName := fmt.Sprintf("%s-infrastructure", appName) if err := cf.deleteStackSetInstances(stackSetName); err != nil { spinner.Stop(log.Serrorf("Error deleting regional resources for application %q\n", appName)) return err } if err := cf.appStackSet.Delete(stackSetName); err != nil { spinner.Stop(log.Serrorf("Error deleting regional resources for application %q\n", appName)) return err } spinner.Stop(log.Ssuccessf("Deleted regional resources for application %q\n", appName)) stackName := fmt.Sprintf("%s-infrastructure-roles", appName) description := fmt.Sprintf("Delete application roles stack %s", stackName) return cf.deleteAndRenderStack(stackName, description, func() error { return cf.cfnClient.DeleteAndWait(stackName) }) } func (cf CloudFormation) deleteStackSetInstances(name string) error { opID, err := cf.appStackSet.DeleteAllInstances(name) if err != nil { if IsEmptyErr(err) { return nil } return err } return cf.appStackSet.WaitForOperation(name, opID) } type renderStackSetInput struct { name string // Name of the stack set. template string // Template body for stack set instances. hasInstanceUpdates bool // True when the stack set update will force instances to also be updated. createOpFn func() (string, error) // Function to create a stack set operation. now func() time.Time } func (cf CloudFormation) renderStackSetImpl(in renderStackSetInput) error { titles, err := cloudformation.ParseTemplateDescriptions(in.template) if err != nil { return fmt.Errorf("parse resource descriptions from stack set template: %w", err) } // Start the operation. timestamp := in.now() opID, err := in.createOpFn() if err != nil { return err } // Collect streamers. setStreamer := stream.NewStackSetStreamer(cf.appStackSet, in.name, opID, timestamp) var stackStreamers []*stream.StackStreamer if in.hasInstanceUpdates { stackStreamers, err = setStreamer.InstanceStreamers(func(region string) stream.StackEventsDescriber { return cf.regionalClient(region) }) if err != nil { return fmt.Errorf("retrieve stack instance streamers: %w", err) } } streamers := []stream.Streamer{setStreamer} for _, streamer := range stackStreamers { streamers = append(streamers, streamer) } // Collect renderers renderers := stackSetRenderers(setStreamer, stackStreamers, titles) // Render. waitCtx, cancelWait := context.WithTimeout(context.Background(), waitForStackTimeout) defer cancelWait() g, ctx := errgroup.WithContext(waitCtx) for _, streamer := range streamers { streamer := streamer // Create a new instance of streamer for the goroutine. g.Go(func() error { return stream.Stream(ctx, streamer) }) } g.Go(func() error { _, err := progress.Render(ctx, progress.NewTabbedFileWriter(cf.console), progress.MultiRenderer(renderers...)) return err }) if err := g.Wait(); err != nil { return fmt.Errorf("render progress of stack set %q: %w", in.name, err) } return nil } func stackSetRenderers(setStreamer *stream.StackSetStreamer, stackStreamers []*stream.StackStreamer, resourceTitles map[string]string) []progress.DynamicRenderer { noStyle := progress.RenderOptions{} renderers := []progress.DynamicRenderer{ progress.ListeningStackSetRenderer(setStreamer, fmt.Sprintf("Update regional resources with stack set %q", setStreamer.Name()), noStyle), } for _, streamer := range stackStreamers { title := fmt.Sprintf("Update stack set instance %q", streamer.Name()) if region, ok := streamer.Region(); ok { title = fmt.Sprintf("Update resources in region %q", region) } r := progress.ListeningStackRenderer(streamer, streamer.Name(), title, resourceTitles, progress.NestedRenderOptions(noStyle)) renderers = append(renderers, r) } return renderers }
648
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package cloudformation import ( "errors" "fmt" "strings" "testing" "time" "github.com/aws/aws-sdk-go/aws" awscfn "github.com/aws/aws-sdk-go/service/cloudformation" "github.com/aws/aws-sdk-go/service/cloudformation/cloudformationiface" "github.com/aws/copilot-cli/internal/pkg/aws/cloudformation" "github.com/aws/copilot-cli/internal/pkg/aws/cloudformation/cloudformationtest" "github.com/aws/copilot-cli/internal/pkg/aws/cloudformation/stackset" "github.com/aws/copilot-cli/internal/pkg/config" "github.com/aws/copilot-cli/internal/pkg/deploy" "github.com/aws/copilot-cli/internal/pkg/deploy/cloudformation/mocks" "github.com/aws/copilot-cli/internal/pkg/deploy/cloudformation/stack" "github.com/golang/mock/gomock" "github.com/stretchr/testify/require" "gopkg.in/yaml.v3" ) func TestCloudFormation_DeployApp(t *testing.T) { mockApp := &deploy.CreateAppInput{ Name: "testapp", AccountID: "1234", Version: "v1.29.0", } testCases := map[string]struct { mockStack func(ctrl *gomock.Controller) cfnClient mockStackSet func(t *testing.T, ctrl *gomock.Controller) stackSetClient region string want error }{ "should return an error if infrastructure roles stack fails": { mockStack: func(ctrl *gomock.Controller) cfnClient { m := mocks.NewMockcfnClient(ctrl) m.EXPECT().Create(gomock.Any()).Return("", errors.New("error creating stack")) m.EXPECT().ErrorEvents(gomock.Any()).Return(nil, nil) // No additional error descriptions. return m }, mockStackSet: func(t *testing.T, ctrl *gomock.Controller) stackSetClient { return nil }, want: errors.New("error creating stack"), }, "should return a wrapped error if region is invalid when populating the admin role arn": { region: "bad-region", mockStack: func(ctrl *gomock.Controller) cfnClient { m := mocks.NewMockcfnClient(ctrl) m.EXPECT().Create(gomock.Any()).Return("", &cloudformation.ErrStackAlreadyExists{}) return m }, mockStackSet: func(t *testing.T, ctrl *gomock.Controller) stackSetClient { return nil }, want: fmt.Errorf("get stack set administrator role arn: find the partition for region bad-region"), }, "should return nil if there are no updates": { region: "us-west-2", mockStack: func(ctrl *gomock.Controller) cfnClient { m := mocks.NewMockcfnClient(ctrl) m.EXPECT().Create(gomock.Any()).Return("", &cloudformation.ErrStackAlreadyExists{}) return m }, mockStackSet: func(t *testing.T, ctrl *gomock.Controller) stackSetClient { m := mocks.NewMockstackSetClient(ctrl) m.EXPECT().Create(gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any()). Return(nil) return m }, }, "should return nil if infrastructure roles stackset created for the first time": { region: "us-west-2", mockStack: func(ctrl *gomock.Controller) cfnClient { m := mocks.NewMockcfnClient(ctrl) m.EXPECT().Create(gomock.Any()).Return("", nil) return m }, mockStackSet: func(t *testing.T, ctrl *gomock.Controller) stackSetClient { m := mocks.NewMockstackSetClient(ctrl) m.EXPECT().Create(gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any()). Return(nil). Do(func(name, _ string, _ ...stackset.CreateOrUpdateOption) { require.Equal(t, "testapp-infrastructure", name) }) return m }, }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { // GIVEN ctrl := gomock.NewController(t) defer ctrl.Finish() cf := CloudFormation{ cfnClient: tc.mockStack(ctrl), appStackSet: tc.mockStackSet(t, ctrl), region: tc.region, console: new(discardFile), } // WHEN got := cf.DeployApp(mockApp) // THEN if tc.want != nil { require.EqualError(t, tc.want, got.Error()) } else { require.NoError(t, got) } }) } } func TestCloudFormation_UpgradeApplication(t *testing.T) { testCases := map[string]struct { mockDeployer func(t *testing.T, ctrl *gomock.Controller) *CloudFormation wantedErr error }{ "error if fail to get existing application infrastructure stack": { mockDeployer: func(t *testing.T, ctrl *gomock.Controller) *CloudFormation { return &CloudFormation{ cfnClient: &cloudformationtest.Double{ DescribeFn: func(string) (*cloudformation.StackDescription, error) { return nil, errors.New("some error") }, }, } }, wantedErr: fmt.Errorf("get existing application infrastructure stack: some error"), }, "error if fail to update app stack": { mockDeployer: func(t *testing.T, ctrl *gomock.Controller) *CloudFormation { return &CloudFormation{ cfnClient: &cloudformationtest.Double{ DescribeFn: func(string) (*cloudformation.StackDescription, error) { return &cloudformation.StackDescription{}, nil }, UpdateFn: func(*cloudformation.Stack) (string, error) { return "", fmt.Errorf("some error") }, }, renderStackSet: func(input renderStackSetInput) error { return nil }, } }, wantedErr: fmt.Errorf(`upgrade stack "phonetool-infrastructure-roles": some error`), }, // TODO test tags manually "error if fail to describe app change set": { mockDeployer: func(t *testing.T, ctrl *gomock.Controller) *CloudFormation { return &CloudFormation{ cfnClient: &cloudformationtest.Double{ DescribeFn: func(string) (*cloudformation.StackDescription, error) { return &cloudformation.StackDescription{}, nil }, UpdateFn: func(*cloudformation.Stack) (string, error) { return "", nil }, DescribeChangeSetFn: func(changeSetID, stackName string) (*cloudformation.ChangeSetDescription, error) { return nil, errors.New("some error") }, }, } }, wantedErr: fmt.Errorf(`upgrade stack "phonetool-infrastructure-roles": some error`), }, "error if fail to get app change set template": { mockDeployer: func(t *testing.T, ctrl *gomock.Controller) *CloudFormation { return &CloudFormation{ cfnClient: &cloudformationtest.Double{ DescribeFn: func(string) (*cloudformation.StackDescription, error) { return &cloudformation.StackDescription{}, nil }, UpdateFn: func(*cloudformation.Stack) (string, error) { return "", nil }, DescribeChangeSetFn: func(changeSetID, stackName string) (*cloudformation.ChangeSetDescription, error) { return &cloudformation.ChangeSetDescription{}, nil }, TemplateBodyFromChangeSetFn: func(changeSetID, stackName string) (string, error) { return "", errors.New("some error") }, }, } }, wantedErr: fmt.Errorf(`upgrade stack "phonetool-infrastructure-roles": some error`), }, "error if fail to wait until stack set last operation complete": { mockDeployer: func(t *testing.T, ctrl *gomock.Controller) *CloudFormation { mockAppStackSet := mocks.NewMockstackSetClient(ctrl) mockAppStackSet.EXPECT().WaitForStackSetLastOperationComplete("phonetool-infrastructure").Return(errors.New("some error")) return &CloudFormation{ console: mockFileWriter{Writer: &strings.Builder{}}, cfnClient: &cloudformationtest.Double{ DescribeFn: func(string) (*cloudformation.StackDescription, error) { return &cloudformation.StackDescription{}, nil }, UpdateFn: func(*cloudformation.Stack) (string, error) { return "", nil }, DescribeChangeSetFn: func(changeSetID, stackName string) (*cloudformation.ChangeSetDescription, error) { return &cloudformation.ChangeSetDescription{}, nil }, TemplateBodyFromChangeSetFn: func(changeSetID, stackName string) (string, error) { return ``, nil }, DescribeStackEventsFn: func(input *awscfn.DescribeStackEventsInput) (*awscfn.DescribeStackEventsOutput, error) { // just finish the renderer on the first Describe call return &awscfn.DescribeStackEventsOutput{ StackEvents: []*awscfn.StackEvent{ { Timestamp: aws.Time(time.Now().Add(1 * time.Hour)), LogicalResourceId: aws.String("phonetool-infrastructure-roles"), ResourceStatus: aws.String(awscfn.StackStatusUpdateComplete), }, }, }, nil }, }, appStackSet: mockAppStackSet, } }, wantedErr: fmt.Errorf(`wait for stack set phonetool-infrastructure last operation complete: some error`), }, "success": { mockDeployer: func(t *testing.T, ctrl *gomock.Controller) *CloudFormation { mockAppStackSet := mocks.NewMockstackSetClient(ctrl) mockAppStackSet.EXPECT().WaitForStackSetLastOperationComplete("phonetool-infrastructure").Return(nil) mockAppStackSet.EXPECT().Describe("phonetool-infrastructure").Return(stackset.Description{}, nil) mockAppStackSet.EXPECT().Update(gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any()). Return("", nil) return &CloudFormation{ console: mockFileWriter{Writer: &strings.Builder{}}, cfnClient: &cloudformationtest.Double{ DescribeFn: func(string) (*cloudformation.StackDescription, error) { return &cloudformation.StackDescription{}, nil }, UpdateFn: func(*cloudformation.Stack) (string, error) { return "", nil }, DescribeChangeSetFn: func(changeSetID, stackName string) (*cloudformation.ChangeSetDescription, error) { return &cloudformation.ChangeSetDescription{}, nil }, TemplateBodyFromChangeSetFn: func(changeSetID, stackName string) (string, error) { return ``, nil }, DescribeStackEventsFn: func(input *awscfn.DescribeStackEventsInput) (*awscfn.DescribeStackEventsOutput, error) { return &awscfn.DescribeStackEventsOutput{ StackEvents: []*awscfn.StackEvent{ { Timestamp: aws.Time(time.Now().Add(1 * time.Hour)), LogicalResourceId: aws.String("phonetool-infrastructure-roles"), ResourceStatus: aws.String(awscfn.StackStatusUpdateComplete), }, }, }, nil }, }, appStackSet: mockAppStackSet, region: "us-west-2", renderStackSet: func(input renderStackSetInput) error { _, err := input.createOpFn() return err }, } }, }, "success with multiple tries and waitings": { mockDeployer: func(t *testing.T, ctrl *gomock.Controller) *CloudFormation { mockAppStackSet := mocks.NewMockstackSetClient(ctrl) mockAppStackSet.EXPECT().WaitForStackSetLastOperationComplete("phonetool-infrastructure").Return(nil) mockAppStackSet.EXPECT().Describe("phonetool-infrastructure").Return(stackset.Description{}, nil) mockAppStackSet.EXPECT().Update(gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any()). Return("", &stackset.ErrStackSetOutOfDate{}) mockAppStackSet.EXPECT().WaitForStackSetLastOperationComplete("phonetool-infrastructure").Return(nil) mockAppStackSet.EXPECT().Describe("phonetool-infrastructure").Return(stackset.Description{}, nil) mockAppStackSet.EXPECT().Update(gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any()). Return("", nil) return &CloudFormation{ console: mockFileWriter{Writer: &strings.Builder{}}, cfnClient: &cloudformationtest.Double{ DescribeFn: func(string) (*cloudformation.StackDescription, error) { return &cloudformation.StackDescription{}, nil }, UpdateFn: func(*cloudformation.Stack) (string, error) { return "", nil }, DescribeChangeSetFn: func(changeSetID, stackName string) (*cloudformation.ChangeSetDescription, error) { return &cloudformation.ChangeSetDescription{}, nil }, TemplateBodyFromChangeSetFn: func(changeSetID, stackName string) (string, error) { return ``, nil }, DescribeStackEventsFn: func(input *awscfn.DescribeStackEventsInput) (*awscfn.DescribeStackEventsOutput, error) { return &awscfn.DescribeStackEventsOutput{ StackEvents: []*awscfn.StackEvent{ { Timestamp: aws.Time(time.Now().Add(1 * time.Hour)), LogicalResourceId: aws.String("phonetool-infrastructure-roles"), ResourceStatus: aws.String(awscfn.StackStatusUpdateComplete), }, }, }, nil }, }, appStackSet: mockAppStackSet, region: "us-west-2", renderStackSet: func(input renderStackSetInput) error { _, err := input.createOpFn() return err }, } }, }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { // GIVEN ctrl := gomock.NewController(t) defer ctrl.Finish() cf := tc.mockDeployer(t, ctrl) // WHEN err := cf.UpgradeApplication(&deploy.CreateAppInput{ Name: "phonetool", }) // THEN if tc.wantedErr != nil { require.EqualError(t, err, tc.wantedErr.Error()) } else { require.NoError(t, err) } }) } } func TestCloudFormation_AddEnvToApp(t *testing.T) { mockApp := config.Application{ Name: "testapp", AccountID: "1234", } testCases := map[string]struct { mockStackSet func(t *testing.T, ctrl *gomock.Controller) stackSetClient app *config.Application env *config.Environment want error }{ "with no existing deployments and adding an env": { app: &mockApp, env: &config.Environment{Name: "test", AccountID: "1234", Region: "us-west-2"}, mockStackSet: func(t *testing.T, ctrl *gomock.Controller) stackSetClient { m := mocks.NewMockstackSetClient(ctrl) body, err := yaml.Marshal(stack.DeployedAppMetadata{}) require.NoError(t, err) m.EXPECT().Describe(gomock.Any()).Return(stackset.Description{ Template: string(body), }, nil) m.EXPECT().Update(gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any()). Return("", nil). Do(func(_, _ string, ops ...stackset.CreateOrUpdateOption) { actual := &awscfn.UpdateStackSetInput{} ops[0](actual) wanted := &awscfn.UpdateStackSetInput{} stackset.WithOperationID("1")(wanted) require.Equal(t, actual, wanted) }) m.EXPECT().InstanceSummaries(gomock.Any()).Return([]stackset.InstanceSummary{}, nil) m.EXPECT().CreateInstances(gomock.Any(), []string{"1234"}, []string{"us-west-2"}).Return("", nil) return m }, }, "with no new account ID added": { app: &mockApp, env: &config.Environment{Name: "test", AccountID: "1234", Region: "us-west-2"}, mockStackSet: func(t *testing.T, ctrl *gomock.Controller) stackSetClient { m := mocks.NewMockstackSetClient(ctrl) body, err := yaml.Marshal(stack.DeployedAppMetadata{ Metadata: stack.AppResources{ AppResourcesConfig: stack.AppResourcesConfig{ Accounts: []string{"1234"}, }, }, }) require.NoError(t, err) m.EXPECT().Describe(gomock.Any()).Return(stackset.Description{ Template: string(body), }, nil) m.EXPECT().Update(gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any()). Return("", nil) m.EXPECT().InstanceSummaries(gomock.Any()).Return([]stackset.InstanceSummary{}, nil) m.EXPECT().CreateInstances(gomock.Any(), []string{"1234"}, []string{"us-west-2"}).Return("", nil) return m }, }, "with existing stack instances in same region but different account (no new stack instances, but update stackset)": { app: &mockApp, env: &config.Environment{Name: "test", AccountID: "1234", Region: "us-west-2"}, mockStackSet: func(t *testing.T, ctrl *gomock.Controller) stackSetClient { m := mocks.NewMockstackSetClient(ctrl) body, err := yaml.Marshal(stack.DeployedAppMetadata{ Metadata: stack.AppResources{ AppResourcesConfig: stack.AppResourcesConfig{ Accounts: []string{"1234"}, Version: 1, }, }, }) require.NoError(t, err) m.EXPECT().Describe(gomock.Any()).Return(stackset.Description{ Template: string(body), }, nil) m.EXPECT().Update(gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any()). Return("", nil). Do(func(_, _ string, ops ...stackset.CreateOrUpdateOption) { actual := &awscfn.UpdateStackSetInput{} ops[0](actual) wanted := &awscfn.UpdateStackSetInput{} stackset.WithOperationID("2")(wanted) require.Equal(t, actual, wanted) }) m.EXPECT().InstanceSummaries(gomock.Any()).Return([]stackset.InstanceSummary{ { Region: "us-west-2", Account: "1234", }, }, nil) m.EXPECT().CreateInstances(gomock.Any(), gomock.Any(), gomock.Any()).Times(0) return m }, }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { // GIVEN ctrl := gomock.NewController(t) defer ctrl.Finish() cf := CloudFormation{ appStackSet: tc.mockStackSet(t, ctrl), region: "us-west-2", renderStackSet: func(input renderStackSetInput) error { _, err := input.createOpFn() return err }, } got := cf.AddEnvToApp(&AddEnvToAppOpts{ App: tc.app, EnvName: tc.env.Name, EnvAccountID: tc.env.AccountID, EnvRegion: tc.env.Region, }) if tc.want != nil { require.EqualError(t, got, tc.want.Error()) } else { require.NoError(t, got) } }) } } func TestCloudFormation_AddPipelineResourcesToApp(t *testing.T) { mockApp := config.Application{ Name: "testapp", AccountID: "1234", } testCases := map[string]struct { app *config.Application mockStackSet func(t *testing.T, ctrl *gomock.Controller) stackSetClient getRegionFromClient func(client cloudformationiface.CloudFormationAPI) (string, error) expectedErr error }{ "with no existing account nor environment, add pipeline supporting resources": { app: &mockApp, mockStackSet: func(t *testing.T, ctrl *gomock.Controller) stackSetClient { m := mocks.NewMockstackSetClient(ctrl) m.EXPECT().InstanceSummaries(gomock.Any()).Return([]stackset.InstanceSummary{}, nil) body, err := yaml.Marshal(stack.DeployedAppMetadata{}) require.NoError(t, err) m.EXPECT().Describe(gomock.Any()).Return(stackset.Description{ Template: string(body), }, nil) m.EXPECT().CreateInstances(gomock.Any(), []string{"1234"}, []string{"us-west-2"}).Return("1", nil) return m }, getRegionFromClient: func(client cloudformationiface.CloudFormationAPI) (string, error) { return "us-west-2", nil }, }, "with existing account and existing environment in a region, should not add pipeline supporting resources": { app: &mockApp, mockStackSet: func(t *testing.T, ctrl *gomock.Controller) stackSetClient { m := mocks.NewMockstackSetClient(ctrl) m.EXPECT().InstanceSummaries(gomock.Any()).Return([]stackset.InstanceSummary{ { Region: "us-west-2", Account: mockApp.AccountID, }, }, nil) body, err := yaml.Marshal(stack.DeployedAppMetadata{}) require.NoError(t, err) m.EXPECT().Describe(gomock.Any()).Return(stackset.Description{ Template: string(body), }, nil) m.EXPECT().CreateInstances(gomock.Any(), gomock.Any(), gomock.Any()).Times(0) return m }, getRegionFromClient: func(client cloudformationiface.CloudFormationAPI) (string, error) { return "us-west-2", nil }, }, } actual := getRegionFromClient // FIXME refactor using defer func for name, tc := range testCases { t.Run(name, func(t *testing.T) { ctrl := gomock.NewController(t) defer ctrl.Finish() cf := CloudFormation{ appStackSet: tc.mockStackSet(t, ctrl), renderStackSet: func(input renderStackSetInput) error { _, err := input.createOpFn() return err }, } getRegionFromClient = tc.getRegionFromClient got := cf.AddPipelineResourcesToApp(tc.app, "us-west-2") if tc.expectedErr != nil { require.EqualError(t, got, tc.expectedErr.Error()) } else { require.NoError(t, got) } }) } getRegionFromClient = actual } func TestCloudFormation_AddServiceToApp(t *testing.T) { mockApp := config.Application{ Name: "testapp", AccountID: "1234", } testCases := map[string]struct { app *config.Application svcName string mockStackSet func(t *testing.T, ctrl *gomock.Controller) stackSetClient want error }{ "with no existing deployments and adding a service": { app: &mockApp, svcName: "TestSvc", mockStackSet: func(t *testing.T, ctrl *gomock.Controller) stackSetClient { m := mocks.NewMockstackSetClient(ctrl) m.EXPECT().Describe(gomock.Any()).Return(stackset.Description{ Template: `Metadata: Version: Services: []`, }, nil) m.EXPECT().Update(gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any()). Return("", nil). Do(func(_, template string, _ ...stackset.CreateOrUpdateOption) { configToDeploy, err := stack.AppConfigFrom(&template) require.NoError(t, err) require.ElementsMatch(t, []stack.AppResourcesWorkload{{Name: "TestSvc", WithECR: true}}, configToDeploy.Workloads) require.Empty(t, configToDeploy.Accounts, "there should be no new accounts to deploy") require.Equal(t, 1, configToDeploy.Version) }) return m }, }, "with new app to existing app with existing services": { app: &mockApp, svcName: "test", mockStackSet: func(t *testing.T, ctrl *gomock.Controller) stackSetClient { m := mocks.NewMockstackSetClient(ctrl) m.EXPECT().Describe(gomock.Any()).Return(stackset.Description{ Template: `Metadata: Version: 1 Services: - firsttest`, }, nil) m.EXPECT().Update(gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any()). Return("", nil). Do(func(_, template string, _ ...stackset.CreateOrUpdateOption) { configToDeploy, err := stack.AppConfigFrom(&template) require.NoError(t, err) require.ElementsMatch(t, []stack.AppResourcesWorkload{ {Name: "test", WithECR: true}, {Name: "firsttest", WithECR: true}, }, configToDeploy.Workloads) require.Empty(t, configToDeploy.Accounts, "there should be no new accounts to deploy") require.Equal(t, 2, configToDeploy.Version) }) return m }, }, "with existing service to existing app with existing services": { app: &mockApp, svcName: "test", mockStackSet: func(t *testing.T, ctrl *gomock.Controller) stackSetClient { m := mocks.NewMockstackSetClient(ctrl) m.EXPECT().Describe(gomock.Any()).Return(stackset.Description{ Template: `Metadata: Version: 1 Services: - test`, }, nil) m.EXPECT().Update(gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any()). Times(0) return m }, }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { ctrl := gomock.NewController(t) defer ctrl.Finish() cf := CloudFormation{ appStackSet: tc.mockStackSet(t, ctrl), region: "us-west-2", renderStackSet: func(input renderStackSetInput) error { _, err := input.createOpFn() return err }, } got := cf.AddServiceToApp(tc.app, tc.svcName) if tc.want != nil { require.EqualError(t, got, tc.want.Error()) } else { require.NoError(t, got) } }) } } func TestCloudFormation_RemoveServiceFromApp(t *testing.T) { mockApp := &config.Application{ Name: "testapp", AccountID: "1234", } tests := map[string]struct { service string mockStackSet func(t *testing.T, ctrl *gomock.Controller) stackSetClient want error }{ "should remove input service from the stack set": { service: "test", mockStackSet: func(t *testing.T, ctrl *gomock.Controller) stackSetClient { m := mocks.NewMockstackSetClient(ctrl) m.EXPECT().Describe(gomock.Any()).Return(stackset.Description{ Template: `Metadata: Version: 1 Services: - firsttest - test`, }, nil) m.EXPECT().Update(gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any()). Return("", nil). Do(func(_, template string, opts ...stackset.CreateOrUpdateOption) { configToDeploy, err := stack.AppConfigFrom(&template) require.NoError(t, err) require.ElementsMatch(t, []stack.AppResourcesWorkload{{Name: "firsttest", WithECR: true}}, configToDeploy.Workloads) require.Empty(t, configToDeploy.Accounts, "config account list should be empty") require.Equal(t, 2, configToDeploy.Version) require.Equal(t, 5, len(opts)) }) return m }, }, } for name, tc := range tests { t.Run(name, func(t *testing.T) { ctrl := gomock.NewController(t) defer ctrl.Finish() cf := CloudFormation{ appStackSet: tc.mockStackSet(t, ctrl), region: "us-west-2", renderStackSet: func(input renderStackSetInput) error { _, err := input.createOpFn() return err }, } got := cf.RemoveServiceFromApp(mockApp, tc.service) require.Equal(t, tc.want, got) }) } } func TestCloudFormation_GetRegionalAppResources(t *testing.T) { mockApp := config.Application{Name: "app", AccountID: "12345"} testCases := map[string]struct { createRegionalMockClient func(ctrl *gomock.Controller) cfnClient mockStackSet func(t *testing.T, ctrl *gomock.Controller) stackSetClient wantedResource stack.AppRegionalResources want error }{ "should describe stack instances and convert to AppRegionalResources": { wantedResource: stack.AppRegionalResources{ KMSKeyARN: "arn:aws:kms:us-west-2:01234567890:key/0000", S3Bucket: "tests3-bucket-us-west-2", Region: "us-east-9", RepositoryURLs: map[string]string{}, }, createRegionalMockClient: func(ctrl *gomock.Controller) cfnClient { m := mocks.NewMockcfnClient(ctrl) m.EXPECT().Describe("cross-region-stack").Return(mockValidAppResourceStack(), nil) return m }, mockStackSet: func(t *testing.T, ctrl *gomock.Controller) stackSetClient { m := mocks.NewMockstackSetClient(ctrl) m.EXPECT().InstanceSummaries(gomock.Any(), gomock.Any()). Return([]stackset.InstanceSummary{ { StackID: "cross-region-stack", Region: "us-east-9", }, }, nil). Do(func(_ string, opt stackset.InstanceSummariesOption) { wanted := &awscfn.ListStackInstancesInput{ StackInstanceAccount: aws.String("12345"), } actual := &awscfn.ListStackInstancesInput{} opt(actual) require.Equal(t, wanted, actual) }) return m }, }, "should propagate describe errors": { want: fmt.Errorf("describing application resources: getting outputs for stack cross-region-stack in region us-east-9: error calling cloudformation"), createRegionalMockClient: func(ctrl *gomock.Controller) cfnClient { m := mocks.NewMockcfnClient(ctrl) m.EXPECT().Describe("cross-region-stack").Return(nil, errors.New("error calling cloudformation")) return m }, mockStackSet: func(t *testing.T, ctrl *gomock.Controller) stackSetClient { m := mocks.NewMockstackSetClient(ctrl) m.EXPECT().InstanceSummaries(gomock.Any(), gomock.Any()).Return([]stackset.InstanceSummary{ { StackID: "cross-region-stack", Region: "us-east-9", }, }, nil) return m }, }, "should propagate list stack instances errors": { want: fmt.Errorf("describing application resources: error"), mockStackSet: func(t *testing.T, ctrl *gomock.Controller) stackSetClient { m := mocks.NewMockstackSetClient(ctrl) m.EXPECT().InstanceSummaries(gomock.Any(), gomock.Any()).Return(nil, errors.New("error")) return m }, }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { // GIVEN ctrl := gomock.NewController(t) defer ctrl.Finish() cf := CloudFormation{ regionalClient: func(region string) cfnClient { return tc.createRegionalMockClient(ctrl) }, appStackSet: tc.mockStackSet(t, ctrl), } // WHEN got, err := cf.GetRegionalAppResources(&mockApp) // THEN if tc.want != nil { require.Error(t, err) require.EqualError(t, err, tc.want.Error()) } else { require.True(t, len(got) == 1, "Expected only one resource") // Assert that the application resources are the same. require.Equal(t, tc.wantedResource, *got[0]) } }) } } func TestCloudFormation_GetAppResourcesByRegion(t *testing.T) { mockApp := config.Application{Name: "app", AccountID: "12345"} testCases := map[string]struct { createRegionalMockClient func(ctrl *gomock.Controller) cfnClient mockStackSet func(t *testing.T, ctrl *gomock.Controller) stackSetClient wantedResource stack.AppRegionalResources region string want error }{ "should describe stack instances and convert to AppRegionalResources": { wantedResource: stack.AppRegionalResources{ KMSKeyARN: "arn:aws:kms:us-west-2:01234567890:key/0000", S3Bucket: "tests3-bucket-us-west-2", Region: "us-east-9", RepositoryURLs: map[string]string{}, }, region: "us-east-9", createRegionalMockClient: func(ctrl *gomock.Controller) cfnClient { m := mocks.NewMockcfnClient(ctrl) m.EXPECT().Describe("cross-region-stack").Return(mockValidAppResourceStack(), nil) return m }, mockStackSet: func(t *testing.T, ctrl *gomock.Controller) stackSetClient { m := mocks.NewMockstackSetClient(ctrl) m.EXPECT().InstanceSummaries(gomock.Any(), gomock.Any(), gomock.Any()). Return([]stackset.InstanceSummary{ { StackID: "cross-region-stack", Region: "us-east-9", }, }, nil). Do(func(_ string, opts ...stackset.InstanceSummariesOption) { wanted := &awscfn.ListStackInstancesInput{ StackInstanceAccount: aws.String("12345"), StackInstanceRegion: aws.String("us-east-9"), } actual := &awscfn.ListStackInstancesInput{} optAcc, optRegion := opts[0], opts[1] optAcc(actual) optRegion(actual) require.Equal(t, wanted, actual) }) return m }, }, "should error when resources are found": { want: fmt.Errorf("no regional resources for application app in region us-east-9 found"), region: "us-east-9", mockStackSet: func(t *testing.T, ctrl *gomock.Controller) stackSetClient { m := mocks.NewMockstackSetClient(ctrl) m.EXPECT().InstanceSummaries(gomock.Any(), gomock.Any(), gomock.Any()).Return([]stackset.InstanceSummary{}, nil) return m }, }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { // GIVEN ctrl := gomock.NewController(t) defer ctrl.Finish() cf := CloudFormation{ regionalClient: func(region string) cfnClient { return tc.createRegionalMockClient(ctrl) }, appStackSet: tc.mockStackSet(t, ctrl), } // WHEN got, err := cf.GetAppResourcesByRegion(&mockApp, tc.region) // THEN if tc.want != nil { require.Error(t, err) require.EqualError(t, err, tc.want.Error()) } else { require.NotNil(t, got) // Assert that the application resources are the same. require.Equal(t, tc.wantedResource, *got) } }) } } func TestCloudFormation_DelegateDNSPermissions(t *testing.T) { testCases := map[string]struct { app *config.Application accountID string createMock func(ctrl *gomock.Controller) cfnClient want error }{ "Calls Update Stack": { app: &config.Application{ AccountID: "1234", Name: "app", Domain: "amazon.com", }, createMock: func(ctrl *gomock.Controller) cfnClient { m := mocks.NewMockcfnClient(ctrl) m.EXPECT().Describe(gomock.Any()).Return(mockAppRolesStack("stackname", map[string]string{ "AppDNSDelegatedAccounts": "1234", }), nil) m.EXPECT().UpdateAndWait(gomock.Any()).Return(nil) return m }, }, "Returns error from Describe Stack": { app: &config.Application{ AccountID: "1234", Name: "app", Domain: "amazon.com", }, want: fmt.Errorf("getting existing application infrastructure stack: error"), createMock: func(ctrl *gomock.Controller) cfnClient { m := mocks.NewMockcfnClient(ctrl) m.EXPECT().Describe(gomock.Any()).Return(nil, errors.New("error")) return m }, }, "Returns nil if there are no changeset updates from deployChangeSet": { app: &config.Application{ AccountID: "1234", Name: "app", Domain: "amazon.com", }, want: nil, createMock: func(ctrl *gomock.Controller) cfnClient { m := mocks.NewMockcfnClient(ctrl) m.EXPECT().Describe(gomock.Any()).Return(mockAppRolesStack("stackname", map[string]string{ "AppDNSDelegatedAccounts": "1234", }), nil) m.EXPECT().UpdateAndWait(gomock.Any()).Return(&cloudformation.ErrChangeSetEmpty{}) return m }, }, "Returns error from Update Stack": { app: &config.Application{ AccountID: "1234", Name: "app", Domain: "amazon.com", }, want: fmt.Errorf("updating application to allow DNS delegation: error"), createMock: func(ctrl *gomock.Controller) cfnClient { m := mocks.NewMockcfnClient(ctrl) m.EXPECT().Describe(gomock.Any()).Return(mockAppRolesStack("stackname", map[string]string{ "AppDNSDelegatedAccounts": "1234", }), nil) m.EXPECT().UpdateAndWait(gomock.Any()).Return(errors.New("error")) return m }, }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { // GIVEN ctrl := gomock.NewController(t) defer ctrl.Finish() cf := CloudFormation{ cfnClient: tc.createMock(ctrl), } // WHEN got := cf.DelegateDNSPermissions(tc.app, tc.accountID) // THEN if tc.want != nil { require.EqualError(t, tc.want, got.Error()) } else { require.NoError(t, got) } }) } } func mockValidAppResourceStack() *cloudformation.StackDescription { return mockAppResourceStack("stack", map[string]string{ "KMSKeyARN": "arn:aws:kms:us-west-2:01234567890:key/0000", "PipelineBucket": "tests3-bucket-us-west-2", }) } func mockAppResourceStack(stackArn string, outputs map[string]string) *cloudformation.StackDescription { outputList := []*awscfn.Output{} for key, val := range outputs { outputList = append(outputList, &awscfn.Output{ OutputKey: aws.String(key), OutputValue: aws.String(val), }) } return &cloudformation.StackDescription{ StackId: aws.String(stackArn), Outputs: outputList, } } func mockAppRolesStack(stackArn string, parameters map[string]string) *cloudformation.StackDescription { parametersList := []*awscfn.Parameter{} for key, val := range parameters { parametersList = append(parametersList, &awscfn.Parameter{ ParameterKey: aws.String(key), ParameterValue: aws.String(val), }) } return &cloudformation.StackDescription{ StackId: aws.String(stackArn), StackStatus: aws.String("UPDATE_COMPLETE"), Parameters: parametersList, } } func TestCloudFormation_DeleteApp(t *testing.T) { tests := map[string]struct { appName string createMock func(ctrl *gomock.Controller) cfnClient mockStackSet func(ctrl *gomock.Controller) stackSetClient want error }{ "should delete stackset and then infrastructure roles": { appName: "testApp", createMock: func(ctrl *gomock.Controller) cfnClient { m := mocks.NewMockcfnClient(ctrl) m.EXPECT().TemplateBody("testApp-infrastructure-roles").Return("", nil) m.EXPECT().Describe(gomock.Any()).Return(&cloudformation.StackDescription{ StackId: aws.String("some stack"), }, nil) m.EXPECT().DeleteAndWait("testApp-infrastructure-roles").Return(&cloudformation.ErrStackNotFound{}) m.EXPECT().DescribeStackEvents(gomock.Any()).Return(&awscfn.DescribeStackEventsOutput{}, nil).AnyTimes() return m }, mockStackSet: func(ctrl *gomock.Controller) stackSetClient { m := mocks.NewMockstackSetClient(ctrl) m.EXPECT().DeleteAllInstances("testApp-infrastructure").Return("1", nil) m.EXPECT().WaitForOperation("testApp-infrastructure", "1").Return(nil) m.EXPECT().Delete("testApp-infrastructure").Return(nil) return m }, }, "should skip waiting for delete instance operation if the stack set is already deleted": { appName: "testApp", createMock: func(ctrl *gomock.Controller) cfnClient { m := mocks.NewMockcfnClient(ctrl) m.EXPECT().TemplateBody(gomock.Any()).Return("", nil) m.EXPECT().Describe(gomock.Any()).Return(&cloudformation.StackDescription{ StackId: aws.String("some stack"), }, nil) m.EXPECT().DeleteAndWait(gomock.Any()).Return(&cloudformation.ErrStackNotFound{}) m.EXPECT().DescribeStackEvents(gomock.Any()).Return(&awscfn.DescribeStackEventsOutput{}, nil).AnyTimes() return m }, mockStackSet: func(ctrl *gomock.Controller) stackSetClient { m := mocks.NewMockstackSetClient(ctrl) m.EXPECT().DeleteAllInstances(gomock.Any()).Return("", &stackset.ErrStackSetNotFound{}) m.EXPECT().Delete(gomock.Any()).Return(nil) return m }, }, } for name, tc := range tests { t.Run(name, func(t *testing.T) { // GIVEN ctrl := gomock.NewController(t) defer ctrl.Finish() cf := CloudFormation{ cfnClient: tc.createMock(ctrl), appStackSet: tc.mockStackSet(ctrl), console: new(discardFile), } // WHEN got := cf.DeleteApp(tc.appName) // THEN require.Equal(t, tc.want, got) }) } } func TestCloudFormation_RenderStackSet(t *testing.T) { testDate := time.Date(2020, time.November, 23, 18, 0, 0, 0, time.UTC) testCases := map[string]struct { in renderStackSetInput mock func(t *testing.T, ctrl *gomock.Controller) CloudFormation wantedErr error }{ "should return the error if a stack set operation cannot be created": { in: renderStackSetInput{ hasInstanceUpdates: true, createOpFn: func() (string, error) { return "", errors.New("some error") }, now: func() time.Time { return testDate }, }, mock: func(t *testing.T, ctrl *gomock.Controller) CloudFormation { return CloudFormation{} }, wantedErr: errors.New("some error"), }, "should return a wrapped error if stack set instance streamers cannot be retrieved": { in: renderStackSetInput{ name: "demo-infra", hasInstanceUpdates: true, createOpFn: func() (string, error) { return "1", nil }, now: func() time.Time { return testDate }, }, mock: func(t *testing.T, ctrl *gomock.Controller) CloudFormation { m := mocks.NewMockstackSetClient(ctrl) m.EXPECT().InstanceSummaries(gomock.Any(), gomock.Any()).Return(nil, errors.New("some error")) return CloudFormation{ appStackSet: m, } }, wantedErr: errors.New(`retrieve stack instance streamers`), }, "cancel all goroutines if a streamer fails": { in: renderStackSetInput{ name: "demo-infra", hasInstanceUpdates: true, createOpFn: func() (string, error) { return "1", nil }, now: func() time.Time { return testDate }, }, mock: func(t *testing.T, ctrl *gomock.Controller) CloudFormation { mockStackSet := mocks.NewMockstackSetClient(ctrl) mockStackSet.EXPECT().InstanceSummaries(gomock.Any(), gomock.Any()).Return([]stackset.InstanceSummary{ { StackID: "stackset-instance-demo-infra", Account: "1111", Region: "us-west-2", Status: "RUNNING", }, }, nil) mockStackSet.EXPECT().DescribeOperation(gomock.Any(), gomock.Any()).Return(stackset.Operation{ Status: "RUNNING", }, nil).AnyTimes() mockStack := mocks.NewMockcfnClient(ctrl) mockStack.EXPECT().DescribeStackEvents(gomock.Any()). Return(nil, errors.New("some error")).AnyTimes() return CloudFormation{ appStackSet: mockStackSet, cfnClient: mockStack, regionalClient: func(_ string) cfnClient { return mockStack }, console: mockFileWriter{ Writer: new(strings.Builder), }, } }, wantedErr: errors.New(`render progress of stack set "demo-infra"`), }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { // GIVEN ctrl := gomock.NewController(t) defer ctrl.Finish() client := tc.mock(t, ctrl) // WHEN err := client.renderStackSetImpl(tc.in) // THEN if tc.wantedErr != nil { require.ErrorContains(t, err, tc.wantedErr.Error()) } else { require.NoError(t, err) } }) } }
1,207
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 // Package cloudformation provides functionality to deploy CLI concepts with AWS CloudFormation. package cloudformation import ( "context" "errors" "fmt" "io" "os" "strings" "time" "github.com/aws/aws-sdk-go/aws" "github.com/aws/aws-sdk-go/aws/session" sdkcloudformation "github.com/aws/aws-sdk-go/service/cloudformation" "github.com/aws/copilot-cli/internal/pkg/aws/cloudformation" "github.com/aws/copilot-cli/internal/pkg/aws/cloudformation/stackset" "github.com/aws/copilot-cli/internal/pkg/aws/cloudwatch" "github.com/aws/copilot-cli/internal/pkg/aws/codepipeline" "github.com/aws/copilot-cli/internal/pkg/aws/codestar" "github.com/aws/copilot-cli/internal/pkg/aws/ecs" "github.com/aws/copilot-cli/internal/pkg/aws/s3" "github.com/aws/copilot-cli/internal/pkg/deploy" "github.com/aws/copilot-cli/internal/pkg/stream" "github.com/aws/copilot-cli/internal/pkg/term/color" "github.com/aws/copilot-cli/internal/pkg/term/log" "github.com/aws/copilot-cli/internal/pkg/term/progress" "golang.org/x/sync/errgroup" ) const ( // waitForStackTimeout is how long we're willing to wait for a stack to go from in progress to a complete state. waitForStackTimeout = 1*time.Hour + 30*time.Minute // CloudFormation resource types. ecsServiceResourceType = "AWS::ECS::Service" envControllerResourceType = "Custom::EnvControllerFunction" ) // CloudFormation's error types to compare against. var ( errNotFound *cloudformation.ErrStackNotFound ) // StackConfiguration represents the set of methods needed to deploy a cloudformation stack. type StackConfiguration interface { StackName() string Template() (string, error) Parameters() ([]*sdkcloudformation.Parameter, error) Tags() []*sdkcloudformation.Tag SerializedParameters() (string, error) } // An Overrider transforms the content in body to out. type Overrider interface { Override(body []byte) (out []byte, err error) } // overridableStack is a StackConfiguration with overrides applied. type overridableStack struct { StackConfiguration overrider Overrider } // Template returns the overriden CloudFormation stack template. func (s *overridableStack) Template() (string, error) { tpl, err := s.StackConfiguration.Template() if err != nil { return "", fmt.Errorf("generate stack template: %w", err) } out, err := s.overrider.Override([]byte(tpl)) if err != nil { return "", fmt.Errorf("override template: %w", err) } return string(out), nil } // WrapWithTemplateOverrider returns a wrapped stack, such that Template calls returns an overriden stack template. func WrapWithTemplateOverrider(stack StackConfiguration, overrider Overrider) StackConfiguration { return &overridableStack{ StackConfiguration: stack, overrider: overrider, } } type ecsClient interface { stream.ECSServiceDescriber } type cwClient interface { stream.CloudWatchDescriber } type cfnClient interface { // Methods augmented by the aws wrapper struct. Create(*cloudformation.Stack) (string, error) CreateAndWait(*cloudformation.Stack) error WaitForCreate(ctx context.Context, stackName string) error Update(*cloudformation.Stack) (string, error) UpdateAndWait(*cloudformation.Stack) error WaitForUpdate(ctx context.Context, stackName string) error Delete(stackName string) error DeleteAndWait(stackName string) error DeleteAndWaitWithRoleARN(stackName, roleARN string) error Describe(stackName string) (*cloudformation.StackDescription, error) DescribeChangeSet(changeSetID, stackName string) (*cloudformation.ChangeSetDescription, error) TemplateBody(stackName string) (string, error) TemplateBodyFromChangeSet(changeSetID, stackName string) (string, error) Events(stackName string) ([]cloudformation.StackEvent, error) ListStacksWithTags(tags map[string]string) ([]cloudformation.StackDescription, error) ErrorEvents(stackName string) ([]cloudformation.StackEvent, error) Outputs(stack *cloudformation.Stack) (map[string]string, error) StackResources(name string) ([]*cloudformation.StackResource, error) Metadata(opts cloudformation.MetadataOpts) (string, error) // Methods vended by the aws sdk struct. DescribeStackEvents(*sdkcloudformation.DescribeStackEventsInput) (*sdkcloudformation.DescribeStackEventsOutput, error) } type codeStarClient interface { WaitUntilConnectionStatusAvailable(ctx context.Context, connectionARN string) error } type codePipelineClient interface { RetryStageExecution(pipelineName, stageName string) error } type s3Client interface { Upload(bucket, fileName string, data io.Reader) (string, error) } type stackSetClient interface { Create(name, template string, opts ...stackset.CreateOrUpdateOption) error CreateInstances(name string, accounts, regions []string) (string, error) CreateInstancesAndWait(name string, accounts, regions []string) error Update(name, template string, opts ...stackset.CreateOrUpdateOption) (string, error) UpdateAndWait(name, template string, opts ...stackset.CreateOrUpdateOption) error Describe(name string) (stackset.Description, error) DescribeOperation(name, opID string) (stackset.Operation, error) InstanceSummaries(name string, opts ...stackset.InstanceSummariesOption) ([]stackset.InstanceSummary, error) DeleteAllInstances(name string) (string, error) Delete(name string) error WaitForStackSetLastOperationComplete(name string) error WaitForOperation(name, opID string) error } // OptFn represents an optional configuration function for the CloudFormation client. type OptFn func(cfn *CloudFormation) // WithProgressTracker updates the CloudFormation client to write stack updates to a file. func WithProgressTracker(fw progress.FileWriter) OptFn { return func(cfn *CloudFormation) { cfn.console = fw } } // discardFile represents a fake file where all Writes succeeds and are not written anywhere. type discardFile struct{} // Write implements the io.Writer interface and discards p. func (f *discardFile) Write(p []byte) (n int, err error) { return io.Discard.Write(p) } // Fd returns stderr as the file descriptor. // The file descriptor value shouldn't matter as long as it's a valid value as all writes are gone to io.Discard. func (f *discardFile) Fd() uintptr { return os.Stderr.Fd() } // CloudFormation wraps the CloudFormationAPI interface type CloudFormation struct { cfnClient cfnClient codeStarClient codeStarClient cpClient codePipelineClient ecsClient ecsClient cwClient cwClient regionalClient func(region string) cfnClient appStackSet stackSetClient s3Client s3Client region string console progress.FileWriter // cached variables. cachedDeployedStack *cloudformation.StackDescription // Overridden in tests. renderStackSet func(input renderStackSetInput) error } // New returns a configured CloudFormation client. func New(sess *session.Session, opts ...OptFn) CloudFormation { client := CloudFormation{ cfnClient: cloudformation.New(sess), codeStarClient: codestar.New(sess), cpClient: codepipeline.New(sess), ecsClient: ecs.New(sess), cwClient: cloudwatch.New(sess), regionalClient: func(region string) cfnClient { return cloudformation.New(sess.Copy(&aws.Config{ Region: aws.String(region), })) }, appStackSet: stackset.New(sess), s3Client: s3.New(sess), region: aws.StringValue(sess.Config.Region), console: new(discardFile), } for _, opt := range opts { opt(&client) } client.renderStackSet = client.renderStackSetImpl return client } // Template returns a deployed stack's template. func (cf CloudFormation) Template(stackName string) (string, error) { return cf.cfnClient.TemplateBody(stackName) } // IsEmptyErr returns true if the error occurred because the cloudformation resource does not exist or does not contain any sub-resources. func IsEmptyErr(err error) bool { type isEmpty interface { IsEmpty() bool } var emptyErr isEmpty return errors.As(err, &emptyErr) } // errorEvents returns the list of status reasons of failed resource events func (cf CloudFormation) errorEvents(stackName string) ([]string, error) { events, err := cf.cfnClient.ErrorEvents(stackName) if err != nil { return nil, err } var reasons []string for _, event := range events { // CFN error messages end with a '. (Service' and only the first sentence is useful, the rest is error codes. reasons = append(reasons, strings.Split(aws.StringValue(event.ResourceStatusReason), ". (Service")[0]) } return reasons, nil } type executeAndRenderChangeSetInput struct { stackName string stackDescription string createChangeSet func() (string, error) } func (cf CloudFormation) newCreateChangeSetInput(w progress.FileWriter, stack *cloudformation.Stack) *executeAndRenderChangeSetInput { in := &executeAndRenderChangeSetInput{ stackName: stack.Name, stackDescription: fmt.Sprintf("Creating the infrastructure for stack %s", stack.Name), } in.createChangeSet = func() (string, error) { spinner := progress.NewSpinner(w) label := fmt.Sprintf("Proposing infrastructure changes for stack %s", stack.Name) spinner.Start(label) var errAlreadyExists *cloudformation.ErrStackAlreadyExists changeSetID, err := cf.cfnClient.Create(stack) if err != nil && !errors.As(err, &errAlreadyExists) { spinner.Stop(log.Serrorf("%s\n", label)) return "", cf.handleStackError(stack.Name, err) } spinner.Stop(log.Ssuccessf("%s\n", label)) return changeSetID, err } return in } func (cf CloudFormation) newUpsertChangeSetInput(w progress.FileWriter, stack *cloudformation.Stack) *executeAndRenderChangeSetInput { in := &executeAndRenderChangeSetInput{ stackName: stack.Name, stackDescription: fmt.Sprintf("Creating the infrastructure for stack %s", stack.Name), } in.createChangeSet = func() (changeSetID string, err error) { spinner := progress.NewSpinner(w) label := fmt.Sprintf("Proposing infrastructure changes for stack %s", stack.Name) spinner.Start(label) changeSetID, err = cf.cfnClient.Create(stack) if err == nil { // Successfully created the change set to create the stack. spinner.Stop(log.Ssuccessf("%s\n", label)) return changeSetID, nil } var errAlreadyExists *cloudformation.ErrStackAlreadyExists if !errors.As(err, &errAlreadyExists) { // Unexpected error trying to create a stack. spinner.Stop(log.Serrorf("%s\n", label)) return "", cf.handleStackError(stack.Name, err) } // We have to create an update stack change set instead. in.stackDescription = fmt.Sprintf("Updating the infrastructure for stack %s", stack.Name) changeSetID, err = cf.cfnClient.Update(stack) if err != nil { msg := log.Serrorf("%s\n", label) var errChangeSetEmpty *cloudformation.ErrChangeSetEmpty if errors.As(err, &errChangeSetEmpty) { msg = fmt.Sprintf("- No new infrastructure changes for stack %s\n", stack.Name) } spinner.Stop(msg) return "", cf.handleStackError(stack.Name, err) } spinner.Stop(log.Ssuccessf("%s\n", label)) return changeSetID, nil } return in } func (cf CloudFormation) executeAndRenderChangeSet(in *executeAndRenderChangeSetInput) error { changeSetID, err := in.createChangeSet() if err != nil { return err } if _, ok := cf.console.(*discardFile); ok { // If we don't have to render skip the additional network calls. return nil } waitCtx, cancelWait := context.WithTimeout(context.Background(), waitForStackTimeout) defer cancelWait() g, ctx := errgroup.WithContext(waitCtx) renderer, err := cf.createChangeSetRenderer(g, ctx, changeSetID, in.stackName, in.stackDescription, progress.RenderOptions{}) if err != nil { return err } g.Go(func() error { _, err := progress.Render(ctx, progress.NewTabbedFileWriter(cf.console), renderer) return err }) if err := g.Wait(); err != nil { return err } if err := cf.errOnFailedStack(in.stackName); err != nil { return err } return nil } func (cf CloudFormation) createChangeSetRenderer(group *errgroup.Group, ctx context.Context, changeSetID, stackName, description string, opts progress.RenderOptions) (progress.DynamicRenderer, error) { changeSet, err := cf.cfnClient.DescribeChangeSet(changeSetID, stackName) if err != nil { return nil, err } body, err := cf.cfnClient.TemplateBodyFromChangeSet(changeSetID, stackName) if err != nil { return nil, err } descriptions, err := cloudformation.ParseTemplateDescriptions(body) if err != nil { return nil, fmt.Errorf("parse cloudformation template for resource descriptions: %w", err) } streamer := stream.NewStackStreamer(cf.cfnClient, stackName, changeSet.CreationTime) children, err := cf.changeRenderers(changeRenderersInput{ g: group, ctx: ctx, stackName: stackName, stackStreamer: streamer, changes: changeSet.Changes, changeSetTimestamp: changeSet.CreationTime, descriptions: descriptions, opts: progress.NestedRenderOptions(opts), }) if err != nil { return nil, err } renderer := progress.ListeningChangeSetRenderer(streamer, stackName, description, children, opts) group.Go(func() error { return stream.Stream(ctx, streamer) }) return renderer, nil } type changeRenderersInput struct { g *errgroup.Group // Group that all goroutines belong. ctx context.Context // Context associated with the group. stackName string // Name of the stack. stackStreamer progress.StackSubscriber // Streamer for the stack where changes belong. changes []*sdkcloudformation.Change // List of changes that will be applied to the stack. changeSetTimestamp time.Time // ChangeSet creation time. descriptions map[string]string // Descriptions for the logical IDs of the changes. opts progress.RenderOptions // Display options that should be applied to the changes. } // changeRenderers filters changes by resources that have a description and returns the appropriate progress.Renderer for each resource type. func (cf CloudFormation) changeRenderers(in changeRenderersInput) ([]progress.Renderer, error) { var resources []progress.Renderer for _, change := range in.changes { logicalID := aws.StringValue(change.ResourceChange.LogicalResourceId) description, ok := in.descriptions[logicalID] if !ok { continue } var renderer progress.Renderer switch { case aws.StringValue(change.ResourceChange.ResourceType) == envControllerResourceType: r, err := cf.createEnvControllerRenderer(&envControllerRendererInput{ g: in.g, ctx: in.ctx, workloadStackName: in.stackName, workloadTimestamp: in.changeSetTimestamp, change: change, description: description, serviceStack: in.stackStreamer, renderOpts: in.opts, }) if err != nil { return nil, err } renderer = r case aws.StringValue(change.ResourceChange.ResourceType) == ecsServiceResourceType: renderer = progress.ListeningECSServiceResourceRenderer(progress.ECSServiceRendererCfg{ Streamer: in.stackStreamer, ECSClient: cf.ecsClient, CWClient: cf.cwClient, LogicalID: logicalID, Description: description, }, progress.ECSServiceRendererOpts{ Group: in.g, Ctx: in.ctx, RenderOpts: in.opts, }) case change.ResourceChange.ChangeSetId != nil: // The resource change is a nested stack. changeSetID := aws.StringValue(change.ResourceChange.ChangeSetId) stackName := parseStackNameFromARN(aws.StringValue(change.ResourceChange.PhysicalResourceId)) r, err := cf.createChangeSetRenderer(in.g, in.ctx, changeSetID, stackName, description, in.opts) if err != nil { return nil, err } renderer = r default: renderer = progress.ListeningResourceRenderer(in.stackStreamer, logicalID, description, progress.ResourceRendererOpts{ RenderOpts: in.opts, }) } resources = append(resources, renderer) } return resources, nil } type envControllerRendererInput struct { g *errgroup.Group ctx context.Context workloadStackName string workloadTimestamp time.Time change *sdkcloudformation.Change description string serviceStack progress.StackSubscriber renderOpts progress.RenderOptions } func (cf CloudFormation) createEnvControllerRenderer(in *envControllerRendererInput) (progress.DynamicRenderer, error) { workload, err := cf.cfnClient.Describe(in.workloadStackName) if err != nil { return nil, err } envStackName := fmt.Sprintf("%s-%s", parseAppNameFromTags(workload.Tags), parseEnvNameFromTags(workload.Tags)) body, err := cf.cfnClient.TemplateBody(envStackName) if err != nil { return nil, err } envResourceDescriptions, err := cloudformation.ParseTemplateDescriptions(body) if err != nil { return nil, fmt.Errorf("parse cloudformation template for resource descriptions: %w", err) } envStreamer := stream.NewStackStreamer(cf.cfnClient, envStackName, in.workloadTimestamp) ctx, cancel := context.WithCancel(in.ctx) in.g.Go(func() error { if err := stream.Stream(ctx, envStreamer); err != nil { if errors.Is(err, context.Canceled) { // The stack streamer was canceled on purposed, do not return an error. // This occurs if we detect that the environment stack has no updates. return nil } return err } return nil }) return progress.ListeningEnvControllerRenderer(progress.EnvControllerConfig{ Description: in.description, RenderOpts: in.renderOpts, ActionStreamer: in.serviceStack, ActionLogicalID: aws.StringValue(in.change.ResourceChange.LogicalResourceId), EnvStreamer: envStreamer, CancelEnvStream: cancel, EnvStackName: envStackName, EnvResources: envResourceDescriptions, }), nil } type renderStackInput struct { group *errgroup.Group // Group of go routines. // Stack metadata. stackName string // Name of the stack. stackID string // ID of the stack. description string // Descriptive text for the stack mutation. descriptionFor map[string]string // Descriptive text for each resource in the stack. startTime time.Time // Timestamp for when the stack mutation started. } func (cf CloudFormation) stackRenderer(ctx context.Context, in renderStackInput) progress.DynamicRenderer { streamer := stream.NewStackStreamer(cf.cfnClient, in.stackID, in.startTime) renderer := progress.ListeningStackRenderer(streamer, in.stackName, in.description, in.descriptionFor, progress.RenderOptions{}) in.group.Go(func() error { return stream.Stream(ctx, streamer) }) return renderer } func (cf CloudFormation) deleteAndRenderStack(name, description string, deleteFn func() error) error { body, err := cf.cfnClient.TemplateBody(name) if err != nil { if !errors.As(err, &errNotFound) { return fmt.Errorf("get template body of stack %q: %w", name, err) } return nil // stack already deleted. } descriptionFor, err := cloudformation.ParseTemplateDescriptions(body) if err != nil { return fmt.Errorf("parse resource descriptions in template of stack %q: %w", name, err) } stack, err := cf.cfnClient.Describe(name) if err != nil { if !errors.As(err, &errNotFound) { return fmt.Errorf("retrieve the stack ID for stack %q: %w", name, err) } return nil // stack already deleted. } waitCtx, cancelWait := context.WithTimeout(context.Background(), waitForStackTimeout) defer cancelWait() g, ctx := errgroup.WithContext(waitCtx) now := time.Now() g.Go(deleteFn) renderer := cf.stackRenderer(ctx, renderStackInput{ group: g, stackID: aws.StringValue(stack.StackId), stackName: name, description: description, descriptionFor: descriptionFor, startTime: now, }) g.Go(func() error { w := progress.NewTabbedFileWriter(cf.console) nl, err := progress.Render(ctx, w, renderer) if err != nil { return fmt.Errorf("render stack %q progress: %w", name, err) } _, err = progress.EraseAndRender(w, progress.LineRenderer(log.Ssuccess(description), 0), nl) if err != nil { return fmt.Errorf("erase and render stack %q progress: %w", name, err) } return nil }) if err := g.Wait(); err != nil { if !errors.As(err, &errNotFound) { return err } } return nil } type errFailedService struct { stackName string resourceType string status string } func (e *errFailedService) RecommendActions() string { if e.resourceType == "AWS::AppRunner::Service" { return fmt.Sprintf("You may fix the error by updating the service code or the manifest configuration.\n"+ "You can then retry deploying your service by running %s.", color.HighlightCode("copilot svc deploy")) } return "" } func (e *errFailedService) Error() string { return fmt.Sprintf("stack %s did not complete successfully and exited with status %s", e.stackName, e.status) } func (cf CloudFormation) errOnFailedStack(stackName string) error { stack, err := cf.cfnClient.Describe(stackName) if err != nil { return err } status := aws.StringValue(stack.StackStatus) if cloudformation.StackStatus(status).IsFailure() { events, _ := cf.cfnClient.ErrorEvents(stackName) var failedResourceType string if len(events) > 0 { failedResourceType = aws.StringValue(events[0].ResourceType) } return &errFailedService{ stackName: stackName, resourceType: failedResourceType, status: status, } } return nil } func toStack(config StackConfiguration) (*cloudformation.Stack, error) { template, err := config.Template() if err != nil { return nil, err } stack := cloudformation.NewStack(config.StackName(), template) stack.Parameters, err = config.Parameters() if err != nil { return nil, err } stack.Tags = config.Tags() return stack, nil } func toStackFromS3(config StackConfiguration, s3url string) (*cloudformation.Stack, error) { stack := cloudformation.NewStackWithURL(config.StackName(), s3url) var err error stack.Parameters, err = config.Parameters() if err != nil { return nil, err } stack.Tags = config.Tags() return stack, nil } func toMap(tags []*sdkcloudformation.Tag) map[string]string { m := make(map[string]string) for _, t := range tags { m[aws.StringValue(t.Key)] = aws.StringValue(t.Value) } return m } // parseStackNameFromARN retrieves "my-nested-stack" from an input like: // arn:aws:cloudformation:us-west-2:123456789012:stack/my-nested-stack/d0a825a0-e4cd-xmpl-b9fb-061c69e99205 func parseStackNameFromARN(stackARN string) string { return strings.Split(stackARN, "/")[1] } func parseAppNameFromTags(tags []*sdkcloudformation.Tag) string { for _, t := range tags { if aws.StringValue(t.Key) == deploy.AppTagKey { return aws.StringValue(t.Value) } } return "" } func parseEnvNameFromTags(tags []*sdkcloudformation.Tag) string { for _, t := range tags { if aws.StringValue(t.Key) == deploy.EnvTagKey { return aws.StringValue(t.Value) } } return "" } func stopSpinner(spinner *progress.Spinner, err error, label string) { if err == nil { spinner.Stop(log.Ssuccessf("%s\n", label)) return } var existsErr *cloudformation.ErrStackAlreadyExists if errors.As(err, &existsErr) { spinner.Stop(log.Ssuccessf("%s\n", label)) return } spinner.Stop(log.Serrorf("%s\n", label)) }
680
copilot-cli
aws
Go
//go:build integration // Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package cloudformation_test import ( "fmt" "io" "math/rand" "os" "strconv" "strings" "testing" "time" "github.com/aws/aws-sdk-go/aws" "github.com/aws/aws-sdk-go/aws/awserr" "github.com/aws/aws-sdk-go/aws/session" awsCF "github.com/aws/aws-sdk-go/service/cloudformation" "github.com/aws/aws-sdk-go/service/s3" "github.com/aws/aws-sdk-go/service/s3/s3manager" "github.com/aws/copilot-cli/internal/pkg/aws/iam" "github.com/aws/copilot-cli/internal/pkg/aws/identity" awss3 "github.com/aws/copilot-cli/internal/pkg/aws/s3" "github.com/aws/copilot-cli/internal/pkg/config" "github.com/aws/copilot-cli/internal/pkg/deploy" "github.com/aws/copilot-cli/internal/pkg/deploy/cloudformation" "github.com/aws/copilot-cli/internal/pkg/deploy/cloudformation/stack" "github.com/aws/copilot-cli/internal/pkg/deploy/upload/customresource" "github.com/aws/copilot-cli/internal/pkg/manifest" "github.com/aws/copilot-cli/internal/pkg/template" "github.com/aws/copilot-cli/internal/pkg/version" "github.com/stretchr/testify/require" ) const ( fmtIAMRoleARN = "arn:aws:iam::%s:role/%s" fmtCFNExecutionRoleID = "%s-%s-CFNExecutionRole" fmtEnvManagerRoleID = "%s-%s-EnvManagerRole" ) func init() { rand.Seed(time.Now().UnixNano()) } func Test_App_Infrastructure(t *testing.T) { sess, err := testSession(nil) require.NoError(t, err) identity := identity.New(sess) callerInfo, err := identity.Get() require.NoError(t, err) require.NoError(t, err) deployer := cloudformation.New(sess, cloudformation.WithProgressTracker(os.Stderr)) cfClient := awsCF.New(sess) require.NoError(t, err) version.Version = "v1.28.0" t.Run("Deploys Application Admin Roles to CloudFormation and Creates StackSet", func(t *testing.T) { app := config.Application{Name: randStringBytes(10), AccountID: callerInfo.Account} appRoleStackName := fmt.Sprintf("%s-infrastructure-roles", app.Name) appStackSetName := fmt.Sprintf("%s-infrastructure", app.Name) // Given our stack doesn't exist roleStackOutput, err := cfClient.DescribeStacks(&awsCF.DescribeStacksInput{ StackName: aws.String(appRoleStackName), }) require.Error(t, err) require.True(t, len(roleStackOutput.Stacks) == 0, "Stack %s should not exist.", appRoleStackName) // Make sure we delete the stacks after the test is done defer func() { cfClient.DeleteStack(&awsCF.DeleteStackInput{ StackName: aws.String(appRoleStackName), }) cfClient.DeleteStackSet(&awsCF.DeleteStackSetInput{ StackSetName: aws.String(appStackSetName), }) cfClient.WaitUntilStackDeleteComplete(&awsCF.DescribeStacksInput{ StackName: aws.String(appRoleStackName), }) }() err = deployer.DeployApp(&deploy.CreateAppInput{ Name: app.Name, AccountID: app.AccountID, Version: version.LatestTemplateVersion(), }) require.NoError(t, err) // Query using our resources as well: resources, err := deployer.GetRegionalAppResources(&app) require.NoError(t, err) require.True(t, len(resources) == 0, "No resources for %s should exist.", appRoleStackName) // We should create the application StackSet _, err = cfClient.DescribeStackSet(&awsCF.DescribeStackSetInput{ StackSetName: aws.String(appStackSetName), }) require.NoError(t, err) // We should create the application roles stack roleStackOutput, err = cfClient.DescribeStacks(&awsCF.DescribeStacksInput{ StackName: aws.String(appRoleStackName), }) require.NoError(t, err) require.True(t, len(roleStackOutput.Stacks) == 1, "Stack %s should have been deployed.", appRoleStackName) deployedStack := roleStackOutput.Stacks[0] expectedResultsForKey := map[string]func(*awsCF.Output){ "ExecutionRoleARN": func(output *awsCF.Output) { require.True(t, strings.HasSuffix(*output.OutputValue, fmt.Sprintf("role/%s-executionrole", app.Name)), fmt.Sprintf("ExecutionRoleARN should be named {app}-executionrole but was %s", *output.OutputValue)) }, "AdministrationRoleARN": func(output *awsCF.Output) { require.True(t, strings.HasSuffix(*output.OutputValue, fmt.Sprintf("role/%s-adminrole", app.Name)), fmt.Sprintf("AdministrationRoleARN should be named {app}-adminrole but was %s", *output.OutputValue)) }, "TemplateVersion": func(output *awsCF.Output) { require.Equal(t, *output.OutputValue, version.LatestTemplateVersion(), fmt.Sprintf("TemplateVersion should be %s but was %s", version.LatestTemplateVersion(), *output.OutputValue)) }, } require.True(t, len(deployedStack.Outputs) == len(expectedResultsForKey), "There should have been %d output values - instead there were %d. The value of the CF stack was %s", len(expectedResultsForKey), len(deployedStack.Outputs), deployedStack.GoString(), ) for _, output := range deployedStack.Outputs { key := *output.OutputKey validationFunction := expectedResultsForKey[key] require.NotNil(t, validationFunction, "Unexpected output key %s in stack.", key) validationFunction(output) } }) t.Run("Deploys Application Infrastructure (KMS Key, ECR Repo, S3 Bucket)", func(t *testing.T) { app := config.Application{Name: randStringBytes(10), AccountID: callerInfo.Account} appRoleStackName := fmt.Sprintf("%s-infrastructure-roles", app.Name) appStackSetName := fmt.Sprintf("%s-infrastructure", app.Name) // Make sure we delete the stacks after the test is done defer func() { // Clean up any StackInstances we may have created. if stackInstances, err := cfClient.ListStackInstances(&awsCF.ListStackInstancesInput{ StackSetName: aws.String(appStackSetName), }); err == nil && stackInstances.Summaries != nil && stackInstances.Summaries[0] != nil { appStackInstance := stackInstances.Summaries[0] cfClient.DeleteStackInstances(&awsCF.DeleteStackInstancesInput{ Accounts: []*string{appStackInstance.Account}, Regions: []*string{appStackInstance.Region}, RetainStacks: aws.Bool(false), StackSetName: appStackInstance.StackSetId, }) cfClient.WaitUntilStackDeleteComplete(&awsCF.DescribeStacksInput{ StackName: appStackInstance.StackId, }) } // Delete the StackSet once all the StackInstances are cleaned up cfClient.DeleteStackSet(&awsCF.DeleteStackSetInput{ StackSetName: aws.String(appStackSetName), }) cfClient.DeleteStack(&awsCF.DeleteStackInput{ StackName: aws.String(appRoleStackName), }) }() // Given our stack doesn't exist roleStackOutput, err := cfClient.DescribeStacks(&awsCF.DescribeStacksInput{ StackName: aws.String(appRoleStackName), }) require.Error(t, err) require.True(t, len(roleStackOutput.Stacks) == 0, "Stack %s should not exist.", appRoleStackName) err = deployer.DeployApp(&deploy.CreateAppInput{ Name: app.Name, AccountID: app.AccountID, Version: version.LatestTemplateVersion(), }) require.NoError(t, err) // Add a service only err = deployer.AddServiceToApp( &app, "mysvc", ) require.NoError(t, err) // Add a service with dash err = deployer.AddServiceToApp( &app, "mysvc-frontend", ) require.NoError(t, err) // No new substacks should be created stackInstances, err := cfClient.ListStackInstances(&awsCF.ListStackInstancesInput{ StackSetName: aws.String(appStackSetName), }) require.NoError(t, err) require.Equal(t, 0, len(stackInstances.Summaries), "Adding apps to an application without any envs shouldn't create any stack instances.") // Add an environment only err = deployer.AddEnvToApp( &cloudformation.AddEnvToAppOpts{ App: &app, EnvName: "test", EnvAccountID: callerInfo.Account, EnvRegion: *sess.Config.Region, }, ) require.NoError(t, err) // Query using our GetRegionalAppResources function. resources, err := deployer.GetRegionalAppResources(&app) require.NoError(t, err) require.True(t, len(resources) == 1, "One stack should exist.") stackResources := resources[0] require.True(t, len(stackResources.RepositoryURLs) == 2, "Two repos should exist") require.True(t, stackResources.RepositoryURLs["mysvc-frontend"] != "", "Repo URL shouldn't be blank") require.True(t, stackResources.RepositoryURLs["mysvc"] != "", "Repo URL shouldn't be blank") require.True(t, stackResources.S3Bucket != "", "S3 Bucket shouldn't be blank") require.True(t, stackResources.KMSKeyARN != "", "KMSKey ARN shouldn't be blank") // Validate resources by comparing physical output of the stacks. stackInstances, err = cfClient.ListStackInstances(&awsCF.ListStackInstancesInput{ StackSetName: aws.String(appStackSetName), }) require.NoError(t, err) require.Equal(t, 1, len(stackInstances.Summaries), "Adding an env should create a new stack instance.") appStackInstance := stackInstances.Summaries[0] // We should create the application roles stack appInfraStacks, err := cfClient.DescribeStacks(&awsCF.DescribeStacksInput{ StackName: appStackInstance.StackId, }) require.NoError(t, err) deployedStack := appInfraStacks.Stacks[0] expectedResultsForKey := map[string]func(*awsCF.Output){ "KMSKeyARN": func(output *awsCF.Output) { require.NotNil(t, *output.OutputValue, "KMSKeyARN should not be nil") }, "PipelineBucket": func(output *awsCF.Output) { require.NotNil(t, *output.OutputValue, "PipelineBucket should not be nil") }, "TemplateVersion": func(output *awsCF.Output) { require.Equal(t, *output.OutputValue, version.LatestTemplateVersion(), fmt.Sprintf("TemplateVersion should be %s but was %s", version.LatestTemplateVersion(), *output.OutputValue)) }, "ECRRepomysvc": func(output *awsCF.Output) { require.True(t, strings.HasSuffix(*output.OutputValue, fmt.Sprintf("repository/%s/mysvc", app.Name)), fmt.Sprintf("ECRRepomysvc should be suffixed with repository/{app}/mysvc but was %s", *output.OutputValue)) }, // We replace dashes with the word DASH for logical IDss "ECRRepomysvcDASHfrontend": func(output *awsCF.Output) { require.True(t, strings.HasSuffix(*output.OutputValue, fmt.Sprintf("repository/%s/mysvc-frontend", app.Name)), fmt.Sprintf("ECRRepomysvcDASHfrontend should be suffixed with repository/{app}/mysvc but was %s", *output.OutputValue)) }, "StackSetOpId": func(output *awsCF.Output) { opID, err := strconv.Atoi(*output.OutputValue) require.NoError(t, err) require.GreaterOrEqual(t, opID, 1, fmt.Sprintf("StackSetOpId should be > 1 but was %s", *output.OutputValue)) }, } require.True(t, len(deployedStack.Outputs) == len(expectedResultsForKey), "There should have been %d output values - instead there were %d. The value of the CF stack was %s", len(expectedResultsForKey), len(deployedStack.Outputs), deployedStack.GoString(), ) for _, output := range deployedStack.Outputs { key := *output.OutputKey validationFunction := expectedResultsForKey[key] require.NotNil(t, validationFunction, "Unexpected output key %s in stack.", key) validationFunction(output) } }) t.Run("Deploys supporting infrastructure for pipeline (KMS Key, S3 Bucket)", func(t *testing.T) { app := config.Application{Name: randStringBytes(10), AccountID: callerInfo.Account} appRoleStackName := fmt.Sprintf("%s-infrastructure-roles", app.Name) appStackSetName := fmt.Sprintf("%s-infrastructure", app.Name) // Make sure we delete the stacks after the test is done defer func() { // Clean up any StackInstances we may have created. if stackInstances, err := cfClient.ListStackInstances(&awsCF.ListStackInstancesInput{ StackSetName: aws.String(appStackSetName), }); err == nil && stackInstances.Summaries != nil && stackInstances.Summaries[0] != nil { appStackInstance := stackInstances.Summaries[0] cfClient.DeleteStackInstances(&awsCF.DeleteStackInstancesInput{ Accounts: []*string{appStackInstance.Account}, Regions: []*string{appStackInstance.Region}, RetainStacks: aws.Bool(false), StackSetName: appStackInstance.StackSetId, }) cfClient.WaitUntilStackDeleteComplete(&awsCF.DescribeStacksInput{ StackName: appStackInstance.StackId, }) } // Delete the StackSet once all the StackInstances are cleaned up cfClient.DeleteStackSet(&awsCF.DeleteStackSetInput{ StackSetName: aws.String(appStackSetName), }) cfClient.DeleteStack(&awsCF.DeleteStackInput{ StackName: aws.String(appRoleStackName), }) }() // Given our stack doesn't exist _, err := cfClient.DescribeStacks(&awsCF.DescribeStacksInput{ StackName: aws.String(appRoleStackName), }) require.Error(t, err, "DescribeStacks should return an error because the stack does not exist") awsErr, ok := err.(awserr.Error) require.True(t, ok, "the returned error should be an awserr") require.Equal(t, awsErr.Code(), "ValidationError") require.Contains(t, awsErr.Message(), "does not exist", "the returned error should indicate that the stack does not exist") // create a stackset err = deployer.DeployApp(&deploy.CreateAppInput{ Name: app.Name, AccountID: app.AccountID, Version: version.LatestTemplateVersion(), }) require.NoError(t, err) // Add resources needed to support a pipeline in a region err = deployer.AddPipelineResourcesToApp(&app, *sess.Config.Region) require.NoError(t, err) // Add another pipeline to the same application and region. This should not create // Additional stack instance err = deployer.AddPipelineResourcesToApp(&app, *sess.Config.Region) require.NoError(t, err) stackInstances, err := cfClient.ListStackInstances(&awsCF.ListStackInstancesInput{ StackSetName: aws.String(appStackSetName), }) require.NoError(t, err) require.Equal(t, 1, len(stackInstances.Summaries), "Adding 2 pipelines to the same application should not create 2 stack instances") // add an environment should not create new stack instance in the same region err = deployer.AddEnvToApp(&cloudformation.AddEnvToAppOpts{ App: &app, EnvName: "test", EnvAccountID: callerInfo.Account, EnvRegion: *sess.Config.Region, }) require.NoError(t, err) stackInstances, err = cfClient.ListStackInstances(&awsCF.ListStackInstancesInput{ StackSetName: aws.String(appStackSetName), }) require.NoError(t, err) require.Equal(t, 1, len(stackInstances.Summaries), "Adding 2 pipelines to the same application should not create 2 stack instances") // Ensure the bucket and KMS key were created resources, err := deployer.GetRegionalAppResources(&app) require.NoError(t, err) require.True(t, len(resources) == 1, "One stack should exist.") stackResources := resources[0] require.True(t, stackResources.S3Bucket != "", "S3 Bucket shouldn't be blank") require.True(t, stackResources.KMSKeyARN != "", "KMSKey ARN shouldn't be blank") }) } // This test can take quite long as it spins up a CloudFormation stack // and then waits for it to be deleted. If you find your CF stack // is failing to be spun up because you've reached some limits, try // switching your default region by running aws configure. func Test_Environment_Deployment_Integration(t *testing.T) { version.Version = "v1.28.0" sess, err := testSession(nil) require.NoError(t, err) deployer := cloudformation.New(sess, cloudformation.WithProgressTracker(os.Stderr)) cfClient := awsCF.New(sess) identity := identity.New(sess) s3ManagerClient := s3manager.NewUploader(sess) s3Client := awss3.New(sess) iamClient := iam.New(sess) id, err := identity.Get() require.NoError(t, err) envName := randStringBytes(10) appName := randStringBytes(10) bucketName := randStringBytes(10) environmentToDeploy := stack.EnvConfig{ Name: envName, App: deploy.AppInformation{ Name: appName, AccountPrincipalARN: id.RootUserARN, }, Version: version.LatestTemplateVersion(), } envStackName := fmt.Sprintf("%s-%s", environmentToDeploy.App.Name, environmentToDeploy.Name) // Given our stack doesn't exist output, err := cfClient.DescribeStacks(&awsCF.DescribeStacksInput{ StackName: aws.String(envStackName), }) require.Error(t, err) require.True(t, len(output.Stacks) == 0, "Stack %s should not exist.", envStackName) // Create a temporary S3 bucket to store custom resource scripts. _, err = s3ManagerClient.S3.CreateBucket(&s3.CreateBucketInput{ Bucket: aws.String(bucketName), }) require.NoError(t, err) // Make sure we delete the stack after the test is done. defer func() { _, err := cfClient.DeleteStack(&awsCF.DeleteStackInput{ StackName: aws.String(envStackName), }) require.NoError(t, err) err = deleteEnvRoles(appName, envName, id.Account, iamClient) require.NoError(t, err) err = s3Client.EmptyBucket(bucketName) require.NoError(t, err) _, err = s3ManagerClient.S3.DeleteBucket(&s3.DeleteBucketInput{ Bucket: aws.String(bucketName), }) require.NoError(t, err) }() t.Run("Deploys bootstrap resources for the environment to CloudFormation", func(t *testing.T) { bucketARN := fmt.Sprintf("arn:aws:s3:::%s", bucketName) environmentToDeploy.ArtifactBucketKeyARN = "arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab" environmentToDeploy.ArtifactBucketARN = bucketARN // Deploy the environment and wait for it to be complete require.NoError(t, deployer.CreateAndRenderEnvironment(stack.NewBootstrapEnvStackConfig(&environmentToDeploy), bucketARN)) // Ensure that the new stack exists output, err := cfClient.DescribeStacks(&awsCF.DescribeStacksInput{ StackName: aws.String(envStackName), }) require.NoError(t, err) require.True(t, len(output.Stacks) == 1, "Stack %s should have been deployed.", envStackName) deployedStack := output.Stacks[0] expectedResultsForKey := map[string]func(*awsCF.Output){ "EnvironmentManagerRoleARN": func(output *awsCF.Output) { require.Equal(t, fmt.Sprintf("%s-EnvironmentManagerRoleARN", envStackName), *output.ExportName, "Should export EnvironmentManagerRole ARN") require.True(t, strings.HasSuffix(*output.OutputValue, fmt.Sprintf("role/%s-EnvManagerRole", envStackName)), "EnvironmentManagerRole ARN value should not be nil.") }, "CFNExecutionRoleARN": func(output *awsCF.Output) { require.Equal(t, fmt.Sprintf("%s-CFNExecutionRoleARN", envStackName), *output.ExportName, "Should export CRNExecutionRole ARN") require.True(t, strings.HasSuffix(*output.OutputValue, fmt.Sprintf("role/%s-CFNExecutionRole", envStackName)), "CRNExecutionRole ARN value should not be nil.") }, } require.True(t, len(deployedStack.Outputs) == len(expectedResultsForKey), "There should have been %d output values - instead there were %d. The value of the CF stack was %s", len(expectedResultsForKey), len(deployedStack.Outputs), deployedStack.GoString(), ) for _, output := range deployedStack.Outputs { key := *output.OutputKey validationFunction := expectedResultsForKey[key] require.NotNil(t, validationFunction, "Unexpected output key %s in stack.", key) validationFunction(output) } }) t.Run("Deploys an environment to CloudFormation", func(t *testing.T) { crs, err := customresource.Env(template.New()) require.NoError(t, err) urls, err := customresource.Upload(func(key string, dat io.Reader) (url string, err error) { return s3Client.Upload(bucketName, key, dat) }, crs) require.NoError(t, err) environmentToDeploy.CustomResourcesURLs = urls environmentToDeploy.ArtifactBucketKeyARN = "arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab" environmentToDeploy.ArtifactBucketARN = fmt.Sprintf("arn:aws:s3:::%s", bucketName) environmentToDeploy.Mft = &manifest.Environment{ Workload: manifest.Workload{ Name: aws.String(envName), Type: aws.String("Environment"), }, } // Deploy the environment and wait for it to be complete. oldParams, err := deployer.DeployedEnvironmentParameters(environmentToDeploy.App.Name, environmentToDeploy.Name) require.NoError(t, err) lastForceUpdateID, err := deployer.ForceUpdateOutputID(environmentToDeploy.App.Name, environmentToDeploy.Name) require.NoError(t, err) conf, err := stack.NewEnvConfigFromExistingStack(&environmentToDeploy, lastForceUpdateID, oldParams) require.NoError(t, err) // Deploy the environment and wait for it to be complete. require.NoError(t, deployer.UpdateAndRenderEnvironment(conf, environmentToDeploy.ArtifactBucketARN)) // Ensure that the updated stack still exists. output, err := cfClient.DescribeStacks(&awsCF.DescribeStacksInput{ StackName: aws.String(envStackName), }) require.NoError(t, err) require.True(t, len(output.Stacks) == 1, "Stack %s should have been deployed.", envStackName) deployedStack := output.Stacks[0] expectedResultsForKey := map[string]func(*awsCF.Output){ "EnabledFeatures": func(output *awsCF.Output) { require.Equal(t, ",,,,,", aws.StringValue(output.OutputValue), "no env features enabled by default") }, "EnvironmentManagerRoleARN": func(output *awsCF.Output) { require.Equal(t, fmt.Sprintf("%s-EnvironmentManagerRoleARN", envStackName), *output.ExportName, "Should export EnvironmentManagerRole ARN") require.True(t, strings.HasSuffix(*output.OutputValue, fmt.Sprintf("role/%s-EnvManagerRole", envStackName)), "EnvironmentManagerRole ARN value should not be nil.") }, "CFNExecutionRoleARN": func(output *awsCF.Output) { require.Equal(t, fmt.Sprintf("%s-CFNExecutionRoleARN", envStackName), *output.ExportName, "Should export CRNExecutionRole ARN") require.True(t, strings.HasSuffix(*output.OutputValue, fmt.Sprintf("role/%s-CFNExecutionRole", envStackName)), "CRNExecutionRole ARN value should not be nil.") }, "ClusterId": func(output *awsCF.Output) { require.Equal(t, fmt.Sprintf("%s-ClusterId", envStackName), *output.ExportName, "Should export Cluster as stackname-ClusterId") require.NotNil(t, output.OutputValue, "Cluster value should not be nil") }, "PrivateSubnets": func(output *awsCF.Output) { require.Equal(t, fmt.Sprintf("%s-PrivateSubnets", envStackName), *output.ExportName, "Should PrivateSubnets as stackname-PrivateSubnets") require.NotNil(t, output.OutputValue, "Private Subnet values should not be nil") }, "VpcId": func(output *awsCF.Output) { require.Equal(t, fmt.Sprintf("%s-VpcId", envStackName), *output.ExportName, "Should export VpcId as stackname-VpcId") require.NotNil(t, output.OutputValue, "VpcId value should not be nil") }, "PublicSubnets": func(output *awsCF.Output) { require.Equal(t, fmt.Sprintf("%s-PublicSubnets", envStackName), *output.ExportName, "Should export PublicSubnets as stackname-PublicSubnets") require.NotNil(t, output.OutputValue, "PublicSubnets value should not be nil") }, "ServiceDiscoveryNamespaceID": func(output *awsCF.Output) { require.Equal(t, fmt.Sprintf("%s-ServiceDiscoveryNamespaceID", envStackName), *output.ExportName, "Should export ServiceDiscoveryNamespaceID as stackname-ServiceDiscoveryNamespaceID") require.NotNil(t, output.OutputValue, "ServiceDiscoveryNamespaceID value should not be nil") }, "InternetGatewayID": func(output *awsCF.Output) { require.Equal(t, fmt.Sprintf("%s-InternetGatewayID", envStackName), *output.ExportName, "Should export InternetGatewayID as stackname-InternetGatewayID") require.NotNil(t, output.OutputValue, "InternetGatewayID value should not be nil") }, "PublicRouteTableID": func(output *awsCF.Output) { require.Equal(t, fmt.Sprintf("%s-PublicRouteTableID", envStackName), *output.ExportName, "Should export PublicRouteTableID as stackname-PublicRouteTableID when creating environment with default VPC") require.NotNil(t, output.OutputValue, "PublicRouteTableID value should not be nil") }, "EnvironmentSecurityGroup": func(output *awsCF.Output) { require.Equal(t, fmt.Sprintf("%s-EnvironmentSecurityGroup", envStackName), *output.ExportName, "Should export EnvironmentSecurityGroup as stackname-EnvironmentSecurityGroup") require.NotNil(t, output.OutputValue, "EnvironmentSecurityGroup value should not be nil") }, "LastForceDeployID": func(output *awsCF.Output) { require.Equal(t, lastForceUpdateID, aws.StringValue(output.OutputValue), "last force update id does not change by default") }, } require.True(t, len(deployedStack.Outputs) == len(expectedResultsForKey), "There should have been %d output values - instead there were %d. The value of the CF stack was %s", len(expectedResultsForKey), len(deployedStack.Outputs), deployedStack.GoString(), ) for _, output := range deployedStack.Outputs { key := *output.OutputKey validationFunction := expectedResultsForKey[key] require.NotNil(t, validationFunction, "Unexpected output key %s in stack.", key) validationFunction(output) } }) } const letterBytes = "abcdefghijklmnopqrstuvwxyz" func testSession(region *string) (*session.Session, error) { if region == nil { return session.NewSessionWithOptions(session.Options{ SharedConfigState: session.SharedConfigEnable, }) } // override with the provided region return session.NewSessionWithOptions(session.Options{ Config: aws.Config{ CredentialsChainVerboseErrors: aws.Bool(true), Region: region, }, SharedConfigState: session.SharedConfigEnable, }) } func randStringBytes(n int) string { b := make([]byte, n) for i := range b { b[i] = letterBytes[rand.Intn(len(letterBytes))] } return string(b) } func deleteEnvRoles(app, env, accountNumber string, iam *iam.IAM) error { cfnExecRoleID := fmt.Sprintf(fmtCFNExecutionRoleID, app, env) envManagerRoleID := fmt.Sprintf(fmtEnvManagerRoleID, app, env) cfnExecutionRoleARN := fmt.Sprintf(fmtIAMRoleARN, accountNumber, cfnExecRoleID) envManagerRoleARN := fmt.Sprintf(fmtIAMRoleARN, accountNumber, envManagerRoleID) err := iam.DeleteRole(cfnExecutionRoleARN) if err != nil { return err } err = iam.DeleteRole(envManagerRoleARN) if err != nil { return err } return nil }
702
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package cloudformation import ( "errors" "fmt" "io" "strings" "testing" "time" "github.com/aws/copilot-cli/internal/pkg/aws/cloudformation/stackset" "github.com/aws/copilot-cli/internal/pkg/deploy/cloudformation/stack" "github.com/aws/aws-sdk-go/aws" sdkcloudformation "github.com/aws/aws-sdk-go/service/cloudformation" awsecs "github.com/aws/aws-sdk-go/service/ecs" "github.com/aws/copilot-cli/internal/pkg/aws/cloudformation" "github.com/aws/copilot-cli/internal/pkg/aws/ecs" "github.com/aws/copilot-cli/internal/pkg/deploy/cloudformation/mocks" "github.com/golang/mock/gomock" "github.com/stretchr/testify/require" ) type mockOverrider struct { out []byte err error } func (m *mockOverrider) Override(_ []byte) ([]byte, error) { return m.out, m.err } func TestWrapWithTemplateOverrider(t *testing.T) { t.Run("should return the overriden Template", func(t *testing.T) { // GIVEN var stack StackConfiguration = &mockStackConfig{template: "hello"} ovrdr := &mockOverrider{out: []byte("bye")} // WHEN stack = WrapWithTemplateOverrider(stack, ovrdr) tpl, err := stack.Template() // THEN require.NoError(t, err) require.Equal(t, "bye", tpl) }) t.Run("should return a wrapped error when Override call fails", func(t *testing.T) { // GIVEN var stack StackConfiguration = &mockStackConfig{template: "hello"} ovrdr := &mockOverrider{err: errors.New("some error")} // WHEN stack = WrapWithTemplateOverrider(stack, ovrdr) _, err := stack.Template() // THEN require.EqualError(t, err, "override template: some error") }) } func TestIsEmptyErr(t *testing.T) { testCases := map[string]struct { err error wanted bool }{ "should return true when the error is an ErrStackSetNotFound": { err: &stackset.ErrStackSetNotFound{}, wanted: true, }, "should return true when the error is an ErrStackSetInstancesNotFound": { err: &stackset.ErrStackSetInstancesNotFound{}, wanted: true, }, "should return false on any other error": { err: errors.New("some error"), }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { require.Equal(t, tc.wanted, IsEmptyErr(tc.err)) }) } } type mockFileWriter struct { io.Writer } func (m mockFileWriter) Fd() uintptr { return 0 } func testDeployWorkload_OnPushToS3Failure(t *testing.T, when func(cf CloudFormation) error) { // GIVEN ctrl := gomock.NewController(t) defer ctrl.Finish() wantedErr := errors.New("some error") mS3Client := mocks.NewMocks3Client(ctrl) mS3Client.EXPECT().Upload("mockBucket", gomock.Any(), gomock.Any()).Return("", wantedErr) buf := new(strings.Builder) client := CloudFormation{ s3Client: mS3Client, console: mockFileWriter{Writer: buf}, } // WHEN err := when(client) // THEN require.True(t, errors.Is(err, wantedErr), `expected returned error to be wrapped with "some error"`) } func testDeployWorkload_OnCreateChangeSetFailure(t *testing.T, when func(cf CloudFormation) error) { // GIVEN ctrl := gomock.NewController(t) defer ctrl.Finish() wantedErr := errors.New("some error") mS3Client := mocks.NewMocks3Client(ctrl) mS3Client.EXPECT().Upload(gomock.Any(), gomock.Any(), gomock.Any()).Return("", nil) m := mocks.NewMockcfnClient(ctrl) m.EXPECT().Create(gomock.Any()).Return("", wantedErr) m.EXPECT().ErrorEvents(gomock.Any()).Return(nil, nil) buf := new(strings.Builder) client := CloudFormation{cfnClient: m, s3Client: mS3Client, console: mockFileWriter{Writer: buf}} // WHEN err := when(client) // THEN require.True(t, errors.Is(err, wantedErr), `expected returned error to be wrapped with "some error"`) } func testDeployWorkload_OnUpdateChangeSetFailure(t *testing.T, when func(cf CloudFormation) error) { // GIVEN ctrl := gomock.NewController(t) defer ctrl.Finish() wantedErr := errors.New("some error") mS3Client := mocks.NewMocks3Client(ctrl) mS3Client.EXPECT().Upload(gomock.Any(), gomock.Any(), gomock.Any()).Return("", nil) m := mocks.NewMockcfnClient(ctrl) m.EXPECT().Create(gomock.Any()).Return("", &cloudformation.ErrStackAlreadyExists{}) m.EXPECT().Update(gomock.Any()).Return("", wantedErr) m.EXPECT().ErrorEvents(gomock.Any()).Return(nil, nil) buf := new(strings.Builder) client := CloudFormation{cfnClient: m, s3Client: mS3Client, console: mockFileWriter{Writer: buf}} // WHEN err := when(client) // THEN require.True(t, errors.Is(err, wantedErr), `expected returned error to be wrapped with "some error"`) } func testDeployWorkload_OnDescribeChangeSetFailure(t *testing.T, when func(cf CloudFormation) error) { // GIVEN ctrl := gomock.NewController(t) defer ctrl.Finish() mS3Client := mocks.NewMocks3Client(ctrl) mS3Client.EXPECT().Upload(gomock.Any(), gomock.Any(), gomock.Any()).Return("", nil) m := mocks.NewMockcfnClient(ctrl) m.EXPECT().Create(gomock.Any()).Return("1234", nil) m.EXPECT().DescribeChangeSet(gomock.Any(), gomock.Any()).Return(nil, errors.New("DescribeChangeSet error")) buf := new(strings.Builder) client := CloudFormation{cfnClient: m, s3Client: mS3Client, console: mockFileWriter{Writer: buf}} // WHEN err := when(client) // THEN require.EqualError(t, err, "DescribeChangeSet error") } func testDeployWorkload_OnTemplateBodyFailure(t *testing.T, when func(cf CloudFormation) error) { // GIVEN ctrl := gomock.NewController(t) defer ctrl.Finish() mS3Client := mocks.NewMocks3Client(ctrl) mS3Client.EXPECT().Upload(gomock.Any(), gomock.Any(), gomock.Any()).Return("", nil) m := mocks.NewMockcfnClient(ctrl) m.EXPECT().Create(gomock.Any()).Return("1234", nil) m.EXPECT().DescribeChangeSet(gomock.Any(), gomock.Any()).Return(&cloudformation.ChangeSetDescription{}, nil) m.EXPECT().TemplateBodyFromChangeSet(gomock.Any(), gomock.Any()).Return("", errors.New("TemplateBody error")) buf := new(strings.Builder) client := CloudFormation{cfnClient: m, s3Client: mS3Client, console: mockFileWriter{Writer: buf}} // WHEN err := when(client) // THEN require.EqualError(t, err, "TemplateBody error") } func testDeployWorkload_StackStreamerFailureShouldCancelRenderer(t *testing.T, when func(cf CloudFormation) error) { // GIVEN ctrl := gomock.NewController(t) defer ctrl.Finish() wantedErr := errors.New("streamer error") mS3Client := mocks.NewMocks3Client(ctrl) mS3Client.EXPECT().Upload(gomock.Any(), gomock.Any(), gomock.Any()).Return("", nil) m := mocks.NewMockcfnClient(ctrl) m.EXPECT().Create(gomock.Any()).Return("1234", nil) m.EXPECT().DescribeChangeSet(gomock.Any(), gomock.Any()).Return(&cloudformation.ChangeSetDescription{}, nil) m.EXPECT().TemplateBodyFromChangeSet(gomock.Any(), gomock.Any()).Return("", nil) m.EXPECT().DescribeStackEvents(gomock.Any()).Return(nil, wantedErr) buf := new(strings.Builder) client := CloudFormation{cfnClient: m, s3Client: mS3Client, console: mockFileWriter{Writer: buf}} // WHEN err := when(client) // THEN require.True(t, errors.Is(err, wantedErr), "expected streamer error to be wrapped and returned") } func testDeployWorkload_StreamUntilStackCreationFails(t *testing.T, stackName string, when func(cf CloudFormation) error) { // GIVEN ctrl := gomock.NewController(t) defer ctrl.Finish() mS3Client := mocks.NewMocks3Client(ctrl) mS3Client.EXPECT().Upload(gomock.Any(), gomock.Any(), gomock.Any()).Return("", nil) m := mocks.NewMockcfnClient(ctrl) m.EXPECT().Create(gomock.Any()).Return("1234", nil) m.EXPECT().DescribeChangeSet(gomock.Any(), gomock.Any()).Return(&cloudformation.ChangeSetDescription{}, nil) m.EXPECT().TemplateBodyFromChangeSet(gomock.Any(), gomock.Any()).Return("", nil) m.EXPECT().DescribeStackEvents(gomock.Any()).Return(&sdkcloudformation.DescribeStackEventsOutput{ StackEvents: []*sdkcloudformation.StackEvent{ { EventId: aws.String("2"), LogicalResourceId: aws.String(stackName), PhysicalResourceId: aws.String("AWS::CloudFormation::Stack"), ResourceStatus: aws.String("CREATE_FAILED"), // Send failure event for stack. Timestamp: aws.Time(time.Now()), }, }, }, nil).AnyTimes() m.EXPECT().Describe(stackName).Return(&cloudformation.StackDescription{ StackStatus: aws.String("CREATE_FAILED"), }, nil) m.EXPECT().ErrorEvents(stackName).Return( []cloudformation.StackEvent{ { EventId: aws.String("2"), LogicalResourceId: aws.String(stackName), PhysicalResourceId: aws.String("AWS::AppRunner::Service"), ResourceStatus: aws.String("CREATE_FAILED"), // Send failure event for stack. Timestamp: aws.Time(time.Now()), }, }, nil) buf := new(strings.Builder) client := CloudFormation{cfnClient: m, s3Client: mS3Client, console: mockFileWriter{Writer: buf}} // WHEN err := when(client) // THEN require.EqualError(t, err, fmt.Sprintf("stack %s did not complete successfully and exited with status CREATE_FAILED", stackName)) } func testDeployWorkload_RenderNewlyCreatedStackWithECSService(t *testing.T, stackName string, when func(cf CloudFormation) error) { // GIVEN ctrl := gomock.NewController(t) defer ctrl.Finish() mS3Client := mocks.NewMocks3Client(ctrl) mS3Client.EXPECT().Upload("mockBucket", gomock.Any(), gomock.Any()).Return("mockURL", nil) mockCFN := mocks.NewMockcfnClient(ctrl) mockECS := mocks.NewMockecsClient(ctrl) deploymentTime := time.Date(2020, time.November, 23, 18, 0, 0, 0, time.UTC) mockCFN.EXPECT().Create(gomock.Any()).Return("1234", nil) mockCFN.EXPECT().DescribeChangeSet("1234", stackName).Return(&cloudformation.ChangeSetDescription{ Changes: []*sdkcloudformation.Change{ { ResourceChange: &sdkcloudformation.ResourceChange{ LogicalResourceId: aws.String("Service"), ResourceType: aws.String("AWS::ECS::Service"), }, }, }, }, nil) mockCFN.EXPECT().TemplateBodyFromChangeSet("1234", stackName).Return(` Resources: Service: Metadata: 'aws:copilot:description': 'My ECS Service' Type: AWS::ECS::Service `, nil) mockCFN.EXPECT().DescribeStackEvents(&sdkcloudformation.DescribeStackEventsInput{ StackName: aws.String(stackName), }).Return(&sdkcloudformation.DescribeStackEventsOutput{ StackEvents: []*sdkcloudformation.StackEvent{ { EventId: aws.String("1"), LogicalResourceId: aws.String("Service"), PhysicalResourceId: aws.String("arn:aws:ecs:us-west-2:1111:service/cluster/service"), ResourceType: aws.String("AWS::ECS::Service"), ResourceStatus: aws.String("CREATE_IN_PROGRESS"), Timestamp: aws.Time(deploymentTime), }, { EventId: aws.String("2"), LogicalResourceId: aws.String("Service"), PhysicalResourceId: aws.String("arn:aws:ecs:us-west-2:1111:service/cluster/service"), ResourceType: aws.String("AWS::ECS::Service"), ResourceStatus: aws.String("CREATE_COMPLETE"), Timestamp: aws.Time(deploymentTime), }, { EventId: aws.String("3"), LogicalResourceId: aws.String(stackName), ResourceType: aws.String("AWS::CloudFormation::Stack"), ResourceStatus: aws.String("CREATE_COMPLETE"), Timestamp: aws.Time(deploymentTime), }, }, }, nil).AnyTimes() mockECS.EXPECT().Service("cluster", "service").Return(&ecs.Service{ Deployments: []*awsecs.Deployment{ { RolloutState: aws.String("COMPLETED"), Status: aws.String("PRIMARY"), TaskDefinition: aws.String("arn:aws:ecs:us-west-2:1111:task-definition/hello:10"), UpdatedAt: aws.Time(deploymentTime), }, }, }, nil) mockCFN.EXPECT().Describe(stackName).Return(&cloudformation.StackDescription{ StackStatus: aws.String("CREATE_COMPLETE"), }, nil) buf := new(strings.Builder) client := CloudFormation{cfnClient: mockCFN, ecsClient: mockECS, s3Client: mS3Client, console: mockFileWriter{Writer: buf}} // WHEN err := when(client) // THEN require.NoError(t, err) require.Contains(t, buf.String(), "My ECS Service", "resource should be rendered") require.Contains(t, buf.String(), "PRIMARY", "Status of the service should be rendered") require.Contains(t, buf.String(), "[completed]", "Rollout state of service should be rendered") } func testDeployWorkload_WithEnvControllerRenderer_NoStackUpdates(t *testing.T, svcStackName string, when func(cf CloudFormation) error) { // GIVEN ctrl := gomock.NewController(t) defer ctrl.Finish() mS3Client := mocks.NewMocks3Client(ctrl) mS3Client.EXPECT().Upload("mockBucket", gomock.Any(), gomock.Any()).Return("mockURL", nil) mockCFN := mocks.NewMockcfnClient(ctrl) deploymentTime := time.Date(2020, time.November, 23, 18, 0, 0, 0, time.UTC) mockCFN.EXPECT().Create(gomock.Any()).Return("1234", nil) mockCFN.EXPECT().DescribeChangeSet("1234", svcStackName).Return(&cloudformation.ChangeSetDescription{ Changes: []*sdkcloudformation.Change{ { ResourceChange: &sdkcloudformation.ResourceChange{ LogicalResourceId: aws.String("EnvControllerAction"), ResourceType: aws.String("Custom::EnvControllerFunction"), Action: aws.String(sdkcloudformation.ChangeActionAdd), }, }, }, }, nil) mockCFN.EXPECT().TemplateBodyFromChangeSet("1234", svcStackName).Return(` Resources: EnvControllerAction: Metadata: 'aws:copilot:description': "Updating environment" `, nil) mockCFN.EXPECT().Describe(svcStackName).Return(&cloudformation.StackDescription{ Tags: []*sdkcloudformation.Tag{ { Key: aws.String("copilot-application"), Value: aws.String("my-app"), }, { Key: aws.String("copilot-environment"), Value: aws.String("my-env"), }, }, }, nil) mockCFN.EXPECT().TemplateBody("my-app-my-env").Return(` Resources: PublicLoadBalancer: Metadata: 'aws:copilot:description': "Updating ALB" `, nil) mockCFN.EXPECT().DescribeStackEvents(&sdkcloudformation.DescribeStackEventsInput{ StackName: aws.String(svcStackName), }).Return(&sdkcloudformation.DescribeStackEventsOutput{ StackEvents: []*sdkcloudformation.StackEvent{ { EventId: aws.String("1"), LogicalResourceId: aws.String(svcStackName), ResourceType: aws.String("AWS::CloudFormation::Stack"), ResourceStatus: aws.String("CREATE_COMPLETE"), Timestamp: aws.Time(deploymentTime), }, }, }, nil).AnyTimes() mockCFN.EXPECT().DescribeStackEvents(&sdkcloudformation.DescribeStackEventsInput{ StackName: aws.String("my-app-my-env"), }).Return(&sdkcloudformation.DescribeStackEventsOutput{ StackEvents: []*sdkcloudformation.StackEvent{}, // No updates for the env stack. }, nil).AnyTimes() mockCFN.EXPECT().Describe(svcStackName).Return(&cloudformation.StackDescription{ StackStatus: aws.String("CREATE_COMPLETE"), }, nil) buf := new(strings.Builder) client := CloudFormation{cfnClient: mockCFN, s3Client: mS3Client, console: mockFileWriter{Writer: buf}} // WHEN err := when(client) // THEN require.NoError(t, err) require.Contains(t, buf.String(), "Updating environment", "env stack description is rendered") } func testDeployWorkload_RenderNewlyCreatedStackWithAddons(t *testing.T, stackName string, when func(cf CloudFormation) error) { ctrl := gomock.NewController(t) defer ctrl.Finish() m := mocks.NewMockcfnClient(ctrl) mS3Client := mocks.NewMocks3Client(ctrl) mS3Client.EXPECT().Upload("mockBucket", "manual/templates/myapp-myenv-mysvc/5cde0f1298f41f7d1c8b907a36992a7a513225a2615bd6e307bf1a9149b06b40.yml", gomock.Any()).Return("mockURL", nil) // Mocks for the parent stack. m.EXPECT().Create(gomock.Any()).Return("1234", nil) m.EXPECT().DescribeChangeSet("1234", stackName).Return(&cloudformation.ChangeSetDescription{ Changes: []*sdkcloudformation.Change{ { ResourceChange: &sdkcloudformation.ResourceChange{ LogicalResourceId: aws.String("Cluster"), PhysicalResourceId: aws.String("AWS::ECS::Cluster"), }, }, { ResourceChange: &sdkcloudformation.ResourceChange{ ChangeSetId: aws.String("5678"), LogicalResourceId: aws.String("AddonsStack"), PhysicalResourceId: aws.String("arn:aws:cloudformation:us-west-2:12345:stack/my-nested-stack/d0a825a0-e4cd-xmpl-b9fb-061c69e99205"), }, }, }, }, nil) m.EXPECT().TemplateBodyFromChangeSet("1234", stackName).Return(` Resources: Cluster: Metadata: 'aws:copilot:description': 'An ECS cluster' Type: AWS::ECS::Cluster AddonsStack: Metadata: 'aws:copilot:description': 'An Addons CloudFormation Stack for your additional AWS resources' Type: AWS::CloudFormation::Stack `, nil) m.EXPECT().DescribeStackEvents(&sdkcloudformation.DescribeStackEventsInput{ StackName: aws.String(stackName), }).Return(&sdkcloudformation.DescribeStackEventsOutput{ StackEvents: []*sdkcloudformation.StackEvent{ { EventId: aws.String("1"), LogicalResourceId: aws.String("Cluster"), PhysicalResourceId: aws.String("AWS::ECS::Cluster"), ResourceStatus: aws.String("CREATE_COMPLETE"), Timestamp: aws.Time(time.Now()), }, { EventId: aws.String("2"), LogicalResourceId: aws.String("AddonsStack"), PhysicalResourceId: aws.String("AWS::CloudFormation::Stack"), ResourceStatus: aws.String("CREATE_COMPLETE"), Timestamp: aws.Time(time.Now()), }, { EventId: aws.String("3"), LogicalResourceId: aws.String(stackName), PhysicalResourceId: aws.String("AWS::CloudFormation::Stack"), ResourceStatus: aws.String("CREATE_COMPLETE"), Timestamp: aws.Time(time.Now()), }, }, }, nil).AnyTimes() m.EXPECT().Describe(stackName).Return(&cloudformation.StackDescription{ StackStatus: aws.String("CREATE_COMPLETE"), }, nil) // Mocks for the addons stack. m.EXPECT().DescribeChangeSet("5678", "my-nested-stack").Return(&cloudformation.ChangeSetDescription{ Changes: []*sdkcloudformation.Change{ { ResourceChange: &sdkcloudformation.ResourceChange{ LogicalResourceId: aws.String("MyTable"), PhysicalResourceId: aws.String("AWS::DynamoDB::Table"), }, }, }, }, nil) m.EXPECT().TemplateBodyFromChangeSet("5678", "my-nested-stack").Return(` Resources: MyTable: Metadata: 'aws:copilot:description': 'A DynamoDB table to store data' Type: AWS::DynamoDB::Table`, nil) m.EXPECT().DescribeStackEvents(&sdkcloudformation.DescribeStackEventsInput{ StackName: aws.String("my-nested-stack"), }).Return(&sdkcloudformation.DescribeStackEventsOutput{ StackEvents: []*sdkcloudformation.StackEvent{ { EventId: aws.String("1"), LogicalResourceId: aws.String("MyTable"), PhysicalResourceId: aws.String("AWS::DynamoDB::Table"), ResourceStatus: aws.String("CREATE_COMPLETE"), Timestamp: aws.Time(time.Now()), }, { EventId: aws.String("2"), LogicalResourceId: aws.String("my-nested-stack"), PhysicalResourceId: aws.String("AWS::CloudFormation::Stack"), ResourceStatus: aws.String("CREATE_COMPLETE"), Timestamp: aws.Time(time.Now()), }, }, }, nil).AnyTimes() buf := new(strings.Builder) client := CloudFormation{cfnClient: m, s3Client: mS3Client, console: mockFileWriter{Writer: buf}} // WHEN err := when(client) // THEN require.NoError(t, err) require.Contains(t, buf.String(), "An ECS cluster") require.Contains(t, buf.String(), "An Addons CloudFormation Stack for your additional AWS resources") require.Contains(t, buf.String(), "A DynamoDB table to store data") } func testDeployTask_OnCreateChangeSetFailure(t *testing.T, when func(cf CloudFormation) error) { // GIVEN ctrl := gomock.NewController(t) defer ctrl.Finish() wantedErr := errors.New("some error") m := mocks.NewMockcfnClient(ctrl) m.EXPECT().Create(gomock.Any()).Return("", wantedErr) m.EXPECT().ErrorEvents(gomock.Any()).Return(nil, nil) buf := new(strings.Builder) client := CloudFormation{cfnClient: m, console: mockFileWriter{Writer: buf}} // WHEN err := when(client) // THEN require.True(t, errors.Is(err, wantedErr), `expected returned error to be wrapped with "some error"`) } func testDeployTask_ReturnNilOnEmptyChangeSetWhileUpdatingStack(t *testing.T, when func(cf CloudFormation) error) { // GIVEN ctrl := gomock.NewController(t) defer ctrl.Finish() wantedErr := &cloudformation.ErrChangeSetEmpty{} m := mocks.NewMockcfnClient(ctrl) m.EXPECT().Create(gomock.Any()).Return("", &cloudformation.ErrStackAlreadyExists{}) m.EXPECT().Update(gomock.Any()).Return("", wantedErr) m.EXPECT().ErrorEvents(gomock.Any()).Return(nil, nil) buf := new(strings.Builder) client := CloudFormation{cfnClient: m, console: mockFileWriter{Writer: buf}} // WHEN err := when(client) // THEN require.Nil(t, err, "should not fail if the changeset is empty") } func testDeployTask_OnUpdateChangeSetFailure(t *testing.T, when func(cf CloudFormation) error) { // GIVEN ctrl := gomock.NewController(t) defer ctrl.Finish() wantedErr := errors.New("some error") m := mocks.NewMockcfnClient(ctrl) m.EXPECT().Create(gomock.Any()).Return("", &cloudformation.ErrStackAlreadyExists{}) m.EXPECT().Update(gomock.Any()).Return("", wantedErr) m.EXPECT().ErrorEvents(gomock.Any()).Return(nil, nil) buf := new(strings.Builder) client := CloudFormation{cfnClient: m, console: mockFileWriter{Writer: buf}} // WHEN err := when(client) // THEN require.True(t, errors.Is(err, wantedErr), `expected returned error to be wrapped with "some error"`) } func testDeployTask_OnDescribeChangeSetFailure(t *testing.T, when func(cf CloudFormation) error) { // GIVEN ctrl := gomock.NewController(t) defer ctrl.Finish() m := mocks.NewMockcfnClient(ctrl) m.EXPECT().Create(gomock.Any()).Return("1234", nil) m.EXPECT().DescribeChangeSet(gomock.Any(), gomock.Any()).Return(nil, errors.New("DescribeChangeSet error")) buf := new(strings.Builder) client := CloudFormation{cfnClient: m, console: mockFileWriter{Writer: buf}} // WHEN err := when(client) // THEN require.EqualError(t, err, "DescribeChangeSet error") } func testDeployTask_OnTemplateBodyFailure(t *testing.T, when func(cf CloudFormation) error) { // GIVEN ctrl := gomock.NewController(t) defer ctrl.Finish() m := mocks.NewMockcfnClient(ctrl) m.EXPECT().Create(gomock.Any()).Return("1234", nil) m.EXPECT().DescribeChangeSet(gomock.Any(), gomock.Any()).Return(&cloudformation.ChangeSetDescription{}, nil) m.EXPECT().TemplateBodyFromChangeSet(gomock.Any(), gomock.Any()).Return("", errors.New("TemplateBody error")) buf := new(strings.Builder) client := CloudFormation{cfnClient: m, console: mockFileWriter{Writer: buf}} // WHEN err := when(client) // THEN require.EqualError(t, err, "TemplateBody error") } func testDeployTask_StackStreamerFailureShouldCancelRenderer(t *testing.T, when func(cf CloudFormation) error) { // GIVEN ctrl := gomock.NewController(t) defer ctrl.Finish() wantedErr := errors.New("streamer error") m := mocks.NewMockcfnClient(ctrl) m.EXPECT().Create(gomock.Any()).Return("1234", nil) m.EXPECT().DescribeChangeSet(gomock.Any(), gomock.Any()).Return(&cloudformation.ChangeSetDescription{}, nil) m.EXPECT().TemplateBodyFromChangeSet(gomock.Any(), gomock.Any()).Return("", nil) m.EXPECT().DescribeStackEvents(gomock.Any()).Return(nil, wantedErr) buf := new(strings.Builder) client := CloudFormation{cfnClient: m, console: mockFileWriter{Writer: buf}} // WHEN err := when(client) // THEN require.True(t, errors.Is(err, wantedErr), "expected streamer error to be wrapped and returned") } func testDeployTask_StreamUntilStackCreationFails(t *testing.T, stackName string, when func(cf CloudFormation) error) { // GIVEN ctrl := gomock.NewController(t) defer ctrl.Finish() m := mocks.NewMockcfnClient(ctrl) m.EXPECT().Create(gomock.Any()).Return("1234", nil) m.EXPECT().DescribeChangeSet(gomock.Any(), gomock.Any()).Return(&cloudformation.ChangeSetDescription{}, nil) m.EXPECT().TemplateBodyFromChangeSet(gomock.Any(), gomock.Any()).Return("", nil) m.EXPECT().DescribeStackEvents(gomock.Any()).Return(&sdkcloudformation.DescribeStackEventsOutput{ StackEvents: []*sdkcloudformation.StackEvent{ { EventId: aws.String("2"), LogicalResourceId: aws.String(stackName), PhysicalResourceId: aws.String("AWS::CloudFormation::Stack"), ResourceStatus: aws.String("CREATE_FAILED"), // Send failure event for stack. Timestamp: aws.Time(time.Now()), }, }, }, nil).AnyTimes() m.EXPECT().Describe(stackName).Return(&cloudformation.StackDescription{ StackStatus: aws.String("CREATE_FAILED"), }, nil) m.EXPECT().ErrorEvents(stackName).Return( []cloudformation.StackEvent{ { EventId: aws.String("2"), LogicalResourceId: aws.String(stackName), PhysicalResourceId: aws.String("AWS::AppRunner::Service"), ResourceStatus: aws.String("CREATE_FAILED"), // Send failure event for stack. Timestamp: aws.Time(time.Now()), }, }, nil) buf := new(strings.Builder) client := CloudFormation{cfnClient: m, console: mockFileWriter{Writer: buf}} // WHEN err := when(client) // THEN require.EqualError(t, err, fmt.Sprintf("stack %s did not complete successfully and exited with status CREATE_FAILED", stackName)) } func testDeployTask_RenderNewlyCreatedStackWithAddons(t *testing.T, stackName string, when func(cf CloudFormation) error) { ctrl := gomock.NewController(t) defer ctrl.Finish() m := mocks.NewMockcfnClient(ctrl) // Mocks for the parent stack. m.EXPECT().Create(gomock.Any()).Return("1234", nil) m.EXPECT().DescribeChangeSet("1234", stackName).Return(&cloudformation.ChangeSetDescription{ Changes: []*sdkcloudformation.Change{ { ResourceChange: &sdkcloudformation.ResourceChange{ LogicalResourceId: aws.String("Cluster"), PhysicalResourceId: aws.String("AWS::ECS::Cluster"), }, }, { ResourceChange: &sdkcloudformation.ResourceChange{ ChangeSetId: aws.String("5678"), LogicalResourceId: aws.String("AddonsStack"), PhysicalResourceId: aws.String("arn:aws:cloudformation:us-west-2:12345:stack/my-nested-stack/d0a825a0-e4cd-xmpl-b9fb-061c69e99205"), }, }, }, }, nil) m.EXPECT().TemplateBodyFromChangeSet("1234", stackName).Return(` Resources: Cluster: Metadata: 'aws:copilot:description': 'An ECS cluster' Type: AWS::ECS::Cluster AddonsStack: Metadata: 'aws:copilot:description': 'An Addons CloudFormation Stack for your additional AWS resources' Type: AWS::CloudFormation::Stack `, nil) m.EXPECT().DescribeStackEvents(&sdkcloudformation.DescribeStackEventsInput{ StackName: aws.String(stackName), }).Return(&sdkcloudformation.DescribeStackEventsOutput{ StackEvents: []*sdkcloudformation.StackEvent{ { EventId: aws.String("1"), LogicalResourceId: aws.String("Cluster"), PhysicalResourceId: aws.String("AWS::ECS::Cluster"), ResourceStatus: aws.String("CREATE_COMPLETE"), Timestamp: aws.Time(time.Now()), }, { EventId: aws.String("2"), LogicalResourceId: aws.String("AddonsStack"), PhysicalResourceId: aws.String("AWS::CloudFormation::Stack"), ResourceStatus: aws.String("CREATE_COMPLETE"), Timestamp: aws.Time(time.Now()), }, { EventId: aws.String("3"), LogicalResourceId: aws.String(stackName), PhysicalResourceId: aws.String("AWS::CloudFormation::Stack"), ResourceStatus: aws.String("CREATE_COMPLETE"), Timestamp: aws.Time(time.Now()), }, }, }, nil).AnyTimes() m.EXPECT().Describe(stackName).Return(&cloudformation.StackDescription{ StackStatus: aws.String("CREATE_COMPLETE"), }, nil) // Mocks for the addons stack. m.EXPECT().DescribeChangeSet("5678", "my-nested-stack").Return(&cloudformation.ChangeSetDescription{ Changes: []*sdkcloudformation.Change{ { ResourceChange: &sdkcloudformation.ResourceChange{ LogicalResourceId: aws.String("MyTable"), PhysicalResourceId: aws.String("AWS::DynamoDB::Table"), }, }, }, }, nil) m.EXPECT().TemplateBodyFromChangeSet("5678", "my-nested-stack").Return(` Resources: MyTable: Metadata: 'aws:copilot:description': 'A DynamoDB table to store data' Type: AWS::DynamoDB::Table`, nil) m.EXPECT().DescribeStackEvents(&sdkcloudformation.DescribeStackEventsInput{ StackName: aws.String("my-nested-stack"), }).Return(&sdkcloudformation.DescribeStackEventsOutput{ StackEvents: []*sdkcloudformation.StackEvent{ { EventId: aws.String("1"), LogicalResourceId: aws.String("MyTable"), PhysicalResourceId: aws.String("AWS::DynamoDB::Table"), ResourceStatus: aws.String("CREATE_COMPLETE"), Timestamp: aws.Time(time.Now()), }, { EventId: aws.String("2"), LogicalResourceId: aws.String("my-nested-stack"), PhysicalResourceId: aws.String("AWS::CloudFormation::Stack"), ResourceStatus: aws.String("CREATE_COMPLETE"), Timestamp: aws.Time(time.Now()), }, }, }, nil).AnyTimes() buf := new(strings.Builder) client := CloudFormation{cfnClient: m, console: mockFileWriter{Writer: buf}} // WHEN err := when(client) // THEN require.NoError(t, err) require.Contains(t, buf.String(), "An ECS cluster") require.Contains(t, buf.String(), "An Addons CloudFormation Stack for your additional AWS resources") require.Contains(t, buf.String(), "A DynamoDB table to store data") } func TestCloudFormation_Template(t *testing.T) { inStackName := stack.NameForEnv("phonetool", "test") testCases := map[string]struct { inClient func(ctrl *gomock.Controller) *mocks.MockcfnClient wantedTemplate string wantedError error }{ "error getting the template body": { inClient: func(ctrl *gomock.Controller) *mocks.MockcfnClient { m := mocks.NewMockcfnClient(ctrl) m.EXPECT().TemplateBody("phonetool-test").Return("", errors.New("some error")) return m }, wantedError: errors.New("some error"), }, "returns the template body": { inClient: func(ctrl *gomock.Controller) *mocks.MockcfnClient { m := mocks.NewMockcfnClient(ctrl) m.EXPECT().TemplateBody("phonetool-test").Return("mockTemplate", nil) return m }, wantedTemplate: "mockTemplate", }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { // GIVEN ctrl := gomock.NewController(t) defer ctrl.Finish() cf := &CloudFormation{ cfnClient: tc.inClient(ctrl), } // WHEN got, gotErr := cf.Template(inStackName) if tc.wantedError != nil { require.EqualError(t, gotErr, tc.wantedError.Error()) } else { require.NoError(t, gotErr) require.Equal(t, tc.wantedTemplate, got) } }) } }
865
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 // Package cloudformation provides functionality to deploy ECS resources with AWS CloudFormation. package cloudformation import ( "context" "fmt" "github.com/aws/aws-sdk-go/aws/arn" "github.com/aws/copilot-cli/internal/pkg/template" "github.com/aws/copilot-cli/internal/pkg/version" "gopkg.in/yaml.v3" "github.com/aws/aws-sdk-go/aws" awscfn "github.com/aws/aws-sdk-go/service/cloudformation" "github.com/aws/copilot-cli/internal/pkg/aws/cloudformation" "github.com/aws/copilot-cli/internal/pkg/config" "github.com/aws/copilot-cli/internal/pkg/deploy" "github.com/aws/copilot-cli/internal/pkg/deploy/cloudformation/stack" "github.com/aws/copilot-cli/internal/pkg/term/progress" ) // CreateAndRenderEnvironment creates the CloudFormation stack for an environment, and render the stack creation to out. func (cf CloudFormation) CreateAndRenderEnvironment(conf StackConfiguration, bucketARN string) error { cfnStack, err := cf.toUploadedStack(bucketARN, conf) if err != nil { return err } in := newRenderEnvironmentInput(cfnStack) in.createChangeSet = func() (changeSetID string, err error) { spinner := progress.NewSpinner(cf.console) label := fmt.Sprintf("Proposing infrastructure changes for the %s environment.", cfnStack.Name) spinner.Start(label) defer stopSpinner(spinner, err, label) changeSetID, err = cf.cfnClient.Create(cfnStack) if err != nil { return "", err } return changeSetID, nil } return cf.executeAndRenderChangeSet(in) } // UpdateAndRenderEnvironment updates the CloudFormation stack for an environment, and render the stack creation to out. func (cf CloudFormation) UpdateAndRenderEnvironment(conf StackConfiguration, bucketARN string, opts ...cloudformation.StackOption) error { cfnStack, err := cf.toUploadedStack(bucketARN, conf) if err != nil { return err } for _, opt := range opts { opt(cfnStack) } in := newRenderEnvironmentInput(cfnStack) in.createChangeSet = func() (changeSetID string, err error) { spinner := progress.NewSpinner(cf.console) label := fmt.Sprintf("Proposing infrastructure changes for the %s environment.", cfnStack.Name) spinner.Start(label) defer stopSpinner(spinner, err, label) changeSetID, err = cf.cfnClient.Update(cfnStack) if err != nil { return "", err } return changeSetID, nil } return cf.executeAndRenderChangeSet(in) } func newRenderEnvironmentInput(cfnStack *cloudformation.Stack) *executeAndRenderChangeSetInput { return &executeAndRenderChangeSetInput{ stackName: cfnStack.Name, stackDescription: fmt.Sprintf("Creating the infrastructure for the %s environment.", cfnStack.Name), } } // DeleteEnvironment deletes the CloudFormation stack of an environment. func (cf CloudFormation) DeleteEnvironment(appName, envName, cfnExecRoleARN string) error { stackName := stack.NameForEnv(appName, envName) description := fmt.Sprintf("Delete environment stack %s", stackName) return cf.deleteAndRenderStack(stackName, description, func() error { return cf.cfnClient.DeleteAndWaitWithRoleARN(stackName, cfnExecRoleARN) }) } // GetEnvironment returns the Environment metadata from the CloudFormation stack. func (cf CloudFormation) GetEnvironment(appName, envName string) (*config.Environment, error) { conf := stack.NewBootstrapEnvStackConfig(&stack.EnvConfig{ App: deploy.AppInformation{ Name: appName, }, Name: envName, }) descr, err := cf.cfnClient.Describe(conf.StackName()) if err != nil { return nil, err } return conf.ToEnvMetadata(descr.SDK()) } // ForceUpdateOutputID returns the environment stack's last force update ID. func (cf CloudFormation) ForceUpdateOutputID(app, env string) (string, error) { stackDescr, err := cf.cachedStack(stack.NameForEnv(app, env)) if err != nil { return "", err } for _, output := range stackDescr.Outputs { if aws.StringValue(output.OutputKey) == template.LastForceDeployIDOutputName { return aws.StringValue(output.OutputValue), nil } } return "", nil } // DeployedEnvironmentParameters returns the environment stack's parameters. func (cf CloudFormation) DeployedEnvironmentParameters(appName, envName string) ([]*awscfn.Parameter, error) { isInitial, err := cf.isInitialDeployment(appName, envName) if err != nil { return nil, err } if isInitial { return nil, nil } out, err := cf.cachedStack(stack.NameForEnv(appName, envName)) if err != nil { return nil, err } return out.Parameters, nil } // UpdateEnvironmentTemplate updates the cloudformation stack's template body while maintaining the parameters and tags. func (cf CloudFormation) UpdateEnvironmentTemplate(appName, envName, templateBody, cfnExecRoleARN string) error { stackName := stack.NameForEnv(appName, envName) descr, err := cf.cfnClient.Describe(stackName) if err != nil { return fmt.Errorf("describe stack %s: %w", stackName, err) } s := cloudformation.NewStack(stackName, templateBody) s.Parameters = descr.Parameters s.Tags = descr.Tags s.RoleARN = aws.String(cfnExecRoleARN) return cf.cfnClient.UpdateAndWait(s) } func (cf CloudFormation) toUploadedStack(artifactBucketARN string, stackConfig StackConfiguration) (*cloudformation.Stack, error) { bucketARN, err := arn.Parse(artifactBucketARN) if err != nil { return nil, err } url, err := cf.uploadStackTemplateToS3(bucketARN.Resource, stackConfig) if err != nil { return nil, err } cfnStack, err := toStackFromS3(stackConfig, url) if err != nil { return nil, err } return cfnStack, nil } func (cf CloudFormation) waitAndDescribeStack(stackName string) (*cloudformation.StackDescription, error) { var ( stackDescription *cloudformation.StackDescription err error ) for { stackDescription, err = cf.cfnClient.Describe(stackName) if err != nil { return nil, fmt.Errorf("describe stack %s: %w", stackName, err) } if cloudformation.StackStatus(aws.StringValue(stackDescription.StackStatus)).InProgress() { // There is already an update happening to the environment stack. // Best-effort try to wait for the existing update to be over before retrying. _ = cf.cfnClient.WaitForUpdate(context.Background(), stackName) continue } break } return stackDescription, err } func (cf CloudFormation) cachedStack(stackName string) (*cloudformation.StackDescription, error) { if cf.cachedDeployedStack != nil { return cf.cachedDeployedStack, nil } stackDescr, err := cf.waitAndDescribeStack(stackName) if err != nil { return nil, err } cf.cachedDeployedStack = stackDescr return cf.cachedDeployedStack, nil } // isInitialDeployment returns whether this is the first deployment of the environment stack. func (cf CloudFormation) isInitialDeployment(appName, envName string) (bool, error) { raw, err := cf.cfnClient.Metadata(cloudformation.MetadataWithStackName(stack.NameForEnv(appName, envName))) if err != nil { return false, fmt.Errorf("get metadata of stack %q: %w", stack.NameForEnv(appName, envName), err) } metadata := struct { Version string `yaml:"Version"` }{} if err := yaml.Unmarshal([]byte(raw), &metadata); err != nil { return false, fmt.Errorf("unmarshal Metadata property to read Version: %w", err) } return metadata.Version == version.EnvTemplateBootstrap, nil }
209
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package cloudformation import ( "errors" "testing" "github.com/aws/aws-sdk-go/aws" awscfn "github.com/aws/aws-sdk-go/service/cloudformation" "github.com/aws/copilot-cli/internal/pkg/aws/cloudformation" "github.com/aws/copilot-cli/internal/pkg/deploy/cloudformation/mocks" "github.com/aws/copilot-cli/internal/pkg/template" "github.com/golang/mock/gomock" "github.com/stretchr/testify/require" ) func TestCloudFormation_DeployedEnvironmentParameters(t *testing.T) { testCases := map[string]struct { inAppName string inEnvName string inClient func(ctrl *gomock.Controller) *mocks.MockcfnClient wantedParams []*awscfn.Parameter wantedErr error }{ "error retrieving metadata": { inAppName: "phonetool", inEnvName: "test", inClient: func(ctrl *gomock.Controller) *mocks.MockcfnClient { m := mocks.NewMockcfnClient(ctrl) m.EXPECT().Metadata(gomock.Any()).Return("", errors.New("some error")) return m }, wantedErr: errors.New("get metadata of stack \"phonetool-test\": some error"), }, "returns nil if the version is bootstrap": { inAppName: "phonetool", inEnvName: "test", inClient: func(ctrl *gomock.Controller) *mocks.MockcfnClient { m := mocks.NewMockcfnClient(ctrl) m.EXPECT().Metadata(gomock.Any()).Return(`Version: bootstrap`, nil) return m }, }, "should return stack parameters from a stack description": { inAppName: "phonetool", inEnvName: "test", inClient: func(ctrl *gomock.Controller) *mocks.MockcfnClient { m := mocks.NewMockcfnClient(ctrl) m.EXPECT().Metadata(gomock.Any()).Return(`Version: `, nil) m.EXPECT().Describe("phonetool-test").Return(&cloudformation.StackDescription{ Parameters: []*awscfn.Parameter{ { ParameterKey: aws.String("name"), ParameterValue: aws.String("test"), }, }, }, nil) return m }, wantedParams: []*awscfn.Parameter{ { ParameterKey: aws.String("name"), ParameterValue: aws.String("test"), }, }, }, "should return the error as is from a failed stack description": { inAppName: "phonetool", inEnvName: "test", inClient: func(ctrl *gomock.Controller) *mocks.MockcfnClient { m := mocks.NewMockcfnClient(ctrl) m.EXPECT().Metadata(gomock.Any()).Return(`Version: v1.21.0`, nil) m.EXPECT().Describe(gomock.Any()).Return(nil, errors.New("some error")) return m }, wantedErr: errors.New("describe stack phonetool-test: some error"), }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { // GIVEN ctrl := gomock.NewController(t) defer ctrl.Finish() cf := &CloudFormation{ cfnClient: tc.inClient(ctrl), } // WHEN actual, err := cf.DeployedEnvironmentParameters(tc.inAppName, tc.inEnvName) if tc.wantedErr != nil { require.EqualError(t, err, tc.wantedErr.Error()) } else { require.NoError(t, err) require.ElementsMatch(t, tc.wantedParams, actual) } }) } } func TestCloudFormation_ForceUpdateID(t *testing.T) { testCases := map[string]struct { inClient func(ctrl *gomock.Controller) *mocks.MockcfnClient wanted string wantedErr error }{ "should return stack parameters from a stack description": { inClient: func(ctrl *gomock.Controller) *mocks.MockcfnClient { m := mocks.NewMockcfnClient(ctrl) m.EXPECT().Describe("phonetool-test").Return(&cloudformation.StackDescription{ Outputs: []*awscfn.Output{ { OutputKey: aws.String(template.LastForceDeployIDOutputName), OutputValue: aws.String("mockForceUpdateID"), }, }, }, nil) return m }, wanted: "mockForceUpdateID", }, "error describing the stack": { inClient: func(ctrl *gomock.Controller) *mocks.MockcfnClient { m := mocks.NewMockcfnClient(ctrl) m.EXPECT().Describe(gomock.Any()).Return(nil, errors.New("some error")) return m }, wantedErr: errors.New("describe stack phonetool-test: some error"), }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { // GIVEN ctrl := gomock.NewController(t) defer ctrl.Finish() cf := &CloudFormation{ cfnClient: tc.inClient(ctrl), } // WHEN actual, err := cf.ForceUpdateOutputID("phonetool", "test") if tc.wantedErr != nil { require.EqualError(t, err, tc.wantedErr.Error()) } else { require.NoError(t, err) require.Equal(t, tc.wanted, actual) } }) } } func TestCloudFormation_UpdateEnvironmentTemplate(t *testing.T) { testCases := map[string]struct { inAppName string inEnvName string inTemplateBody string inExecRoleARN string inClient func(t *testing.T, ctrl *gomock.Controller) *mocks.MockcfnClient wantedError error }{ "wraps error if describe fails": { inAppName: "phonetool", inEnvName: "test", inClient: func(t *testing.T, ctrl *gomock.Controller) *mocks.MockcfnClient { m := mocks.NewMockcfnClient(ctrl) m.EXPECT().Describe(gomock.Any()).Return(nil, errors.New("some error")) return m }, wantedError: errors.New("describe stack phonetool-test: some error"), }, "uses existing parameters, tags, and passed in new template and role arn on success": { inAppName: "phonetool", inEnvName: "test", inTemplateBody: "hello", inExecRoleARN: "arn", inClient: func(t *testing.T, ctrl *gomock.Controller) *mocks.MockcfnClient { m := mocks.NewMockcfnClient(ctrl) params := []*awscfn.Parameter{ { ParameterKey: aws.String("ALBWorkloads"), ParameterValue: aws.String("frontend"), }, } tags := []*awscfn.Tag{ { Key: aws.String("copilot-application"), Value: aws.String("phonetool"), }, } m.EXPECT().Describe("phonetool-test").Return(&cloudformation.StackDescription{ Parameters: params, Tags: tags, }, nil) m.EXPECT().UpdateAndWait(gomock.Any()).Return(nil). Do(func(s *cloudformation.Stack) { require.Equal(t, "phonetool-test", s.Name) require.Equal(t, params, s.Parameters) require.Equal(t, tags, s.Tags) require.Equal(t, "hello", s.TemplateBody) require.Equal(t, aws.String("arn"), s.RoleARN) }) return m }, }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { // GIVEN ctrl := gomock.NewController(t) defer ctrl.Finish() cf := &CloudFormation{ cfnClient: tc.inClient(t, ctrl), } // WHEN err := cf.UpdateEnvironmentTemplate(tc.inAppName, tc.inEnvName, tc.inTemplateBody, tc.inExecRoleARN) // THEN if tc.wantedError != nil { require.EqualError(t, err, tc.wantedError.Error()) } else { require.NoError(t, err) } }) } }
236
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 // Package cloudformation provides functionality to deploy ECS resources with AWS CloudFormation. // This file defines API for deploying a pipeline. package cloudformation import ( "context" "errors" "fmt" "strings" "time" "github.com/aws/aws-sdk-go/aws" "github.com/aws/copilot-cli/internal/pkg/aws/cloudformation" "github.com/aws/copilot-cli/internal/pkg/deploy" "github.com/aws/copilot-cli/internal/pkg/deploy/cloudformation/stack" ) const ( sourceStage = "Source" connectionARNKey = "PipelineConnectionARN" fmtPipelineCfnTemplateName = "%s.pipeline.stack.yml" cfnLogicalResourceIDPipeline = "Pipeline" cfnResourceTypePipeline = "AWS::CodePipeline::Pipeline" ) // PipelineExists checks if the pipeline with the provided config exists. func (cf CloudFormation) PipelineExists(in *deploy.CreatePipelineInput) (bool, error) { stackConfig := stack.NewPipelineStackConfig(in) _, err := cf.cfnClient.Describe(stackConfig.StackName()) if err != nil { var stackNotFound *cloudformation.ErrStackNotFound if !errors.As(err, &stackNotFound) { return false, err } return false, nil } return true, nil } // CreatePipeline sets up a new CodePipeline for deploying services. func (cf CloudFormation) CreatePipeline(in *deploy.CreatePipelineInput, bucketName string) error { templateURL, err := cf.pushTemplateToS3Bucket(bucketName, stack.NewPipelineStackConfig(in)) if err != nil { return err } stackConfig := stack.NewPipelineStackConfig(in) s, err := toStackFromS3(stackConfig, templateURL) if err != nil { return err } err = cf.cfnClient.CreateAndWait(s) if err != nil { return err } output, err := cf.cfnClient.Outputs(s) if err != nil { return err } // If the pipeline has a PipelineConnectionARN in the output map, indicating that it is has a CodeStarConnections source provider, the user needs to update the connection status; Copilot will wait until that happens. if output[connectionARNKey] == "" { return nil } ctx, cancel := context.WithDeadline(context.Background(), time.Now().Add(45*time.Minute)) defer cancel() if err = cf.codeStarClient.WaitUntilConnectionStatusAvailable(ctx, output[connectionARNKey]); err != nil { return err } pipelineResourceName, err := cf.pipelinePhysicalResourceID(stackConfig.StackName()) if err != nil { return err } if err = cf.cpClient.RetryStageExecution(pipelineResourceName, sourceStage); err != nil { return err } return nil } func (cf CloudFormation) pipelinePhysicalResourceID(stackName string) (string, error) { stackResources, err := cf.cfnClient.StackResources(stackName) if err != nil { return "", err } for _, resource := range stackResources { if aws.StringValue(resource.LogicalResourceId) == cfnLogicalResourceIDPipeline && aws.StringValue(resource.ResourceType) == cfnResourceTypePipeline { return aws.StringValue(resource.PhysicalResourceId), nil } } return "", fmt.Errorf(`cannot find a resource in stack %s with logical ID "%s" of type "%s"`, stackName, cfnLogicalResourceIDPipeline, cfnResourceTypePipeline) } // UpdatePipeline updates an existing CodePipeline for deploying services. func (cf CloudFormation) UpdatePipeline(in *deploy.CreatePipelineInput, bucketName string) error { templateURL, err := cf.pushTemplateToS3Bucket(bucketName, stack.NewPipelineStackConfig(in)) if err != nil { return err } s, err := toStackFromS3(stack.NewPipelineStackConfig(in), templateURL) if err != nil { return err } if err := cf.cfnClient.UpdateAndWait(s); err != nil { var errNoUpdates *cloudformation.ErrChangeSetEmpty if errors.As(err, &errNoUpdates) { return nil } return fmt.Errorf("update pipeline: %w", err) } return nil } // DeletePipeline removes the CodePipeline stack. func (cf CloudFormation) DeletePipeline(pipeline deploy.Pipeline) error { return cf.cfnClient.DeleteAndWait(stack.NameForPipeline(pipeline.AppName, pipeline.Name, pipeline.IsLegacy)) } func (cf CloudFormation) pushTemplateToS3Bucket(bucket string, config StackConfiguration) (string, error) { template, err := config.Template() if err != nil { return "", fmt.Errorf("generate template: %w", err) } reader := strings.NewReader(template) url, err := cf.s3Client.Upload(bucket, fmt.Sprintf(fmtPipelineCfnTemplateName, config.StackName()), reader) if err != nil { return "", fmt.Errorf("upload pipeline template to S3 bucket %s: %w", bucket, err) } return url, nil }
134
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package cloudformation import ( "errors" "fmt" "testing" "github.com/golang/mock/gomock" "github.com/stretchr/testify/require" "github.com/aws/aws-sdk-go/aws" "github.com/aws/copilot-cli/internal/pkg/aws/cloudformation" "github.com/aws/copilot-cli/internal/pkg/deploy" "github.com/aws/copilot-cli/internal/pkg/deploy/cloudformation/mocks" ) const defaultImage = "aws/codebuild/amazonlinux2-x86_64-standard:3.0" func TestCloudFormation_PipelineExists(t *testing.T) { in := &deploy.CreatePipelineInput{ AppName: "kudos", Name: "cicd", } testCases := map[string]struct { createMock func(ctrl *gomock.Controller) cfnClient wantedExists bool wantedErr error }{ "return false and error on unexpected failure": { createMock: func(ctrl *gomock.Controller) cfnClient { m := mocks.NewMockcfnClient(ctrl) m.EXPECT().Describe(gomock.Any()).Return(nil, errors.New("some error")) return m }, wantedErr: errors.New("some error"), }, "return false if stack does not exist": { createMock: func(ctrl *gomock.Controller) cfnClient { m := mocks.NewMockcfnClient(ctrl) m.EXPECT().Describe(gomock.Any()).Return(nil, fmt.Errorf("describe stack: %w", &cloudformation.ErrStackNotFound{})) return m }, wantedExists: false, }, "returns true if stack exists": { createMock: func(ctrl *gomock.Controller) cfnClient { m := mocks.NewMockcfnClient(ctrl) m.EXPECT().Describe(gomock.Any()).Return(nil, nil) return m }, wantedExists: true, }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { // GIVEN ctrl := gomock.NewController(t) defer ctrl.Finish() c := CloudFormation{ cfnClient: tc.createMock(ctrl), } // WHEN exists, err := c.PipelineExists(in) // THEN require.Equal(t, tc.wantedExists, exists) require.Equal(t, tc.wantedErr, err) }) } } func TestCloudFormation_CreatePipeline(t *testing.T) { in := &deploy.CreatePipelineInput{ AppName: "kudos", Name: "cicd", Source: &deploy.BitbucketSource{ RepositoryURL: "https://bitbucket.org/aws/somethingCool", ProviderName: "Bitbucket", Branch: "main", }, Build: &deploy.Build{ Image: defaultImage, }, Stages: nil, ArtifactBuckets: nil, } mockS3BucketName := "BitterBucket" mockURL := "templateURL" testCases := map[string]struct { createCfnMock func(ctrl *gomock.Controller) cfnClient createCsMock func(ctrl *gomock.Controller) codeStarClient createCpMock func(ctrl *gomock.Controller) codePipelineClient createS3Mock func(ctrl *gomock.Controller) s3Client wantedErr error }{ "exits successfully with base case (no connection)": { createCfnMock: func(ctrl *gomock.Controller) cfnClient { m := mocks.NewMockcfnClient(ctrl) m.EXPECT().CreateAndWait(gomock.Any()).Times(1) m.EXPECT().Outputs(gomock.Any()).Return(nil, nil) return m }, createS3Mock: func(ctrl *gomock.Controller) s3Client { m := mocks.NewMocks3Client(ctrl) m.EXPECT().Upload(mockS3BucketName, gomock.Any(), gomock.Any()).Return(mockURL, nil) return m }, createCsMock: func(ctrl *gomock.Controller) codeStarClient { m := mocks.NewMockcodeStarClient(ctrl) m.EXPECT().WaitUntilConnectionStatusAvailable(gomock.Any(), "mockConnectionARN").Times(0) return m }, createCpMock: func(ctrl *gomock.Controller) codePipelineClient { m := mocks.NewMockcodePipelineClient(ctrl) m.EXPECT().RetryStageExecution(gomock.Any(), gomock.Any()).Times(0) return m }, wantedErr: nil, }, "exits successfully with connection update to wait for": { createCfnMock: func(ctrl *gomock.Controller) cfnClient { m := mocks.NewMockcfnClient(ctrl) m.EXPECT().CreateAndWait(gomock.Any()).Times(1) m.EXPECT().Outputs(gomock.Any()).Return( map[string]string{ "PipelineConnectionARN": "mockConnectionARN", }, nil) m.EXPECT().StackResources(gomock.Any()).Return([]*cloudformation.StackResource{ { LogicalResourceId: aws.String(cfnLogicalResourceIDPipeline), ResourceType: aws.String(cfnResourceTypePipeline), PhysicalResourceId: aws.String("mockPipelineResourceID"), }, }, nil) return m }, createS3Mock: func(ctrl *gomock.Controller) s3Client { m := mocks.NewMocks3Client(ctrl) m.EXPECT().Upload(mockS3BucketName, gomock.Any(), gomock.Any()).Return(mockURL, nil) return m }, createCsMock: func(ctrl *gomock.Controller) codeStarClient { m := mocks.NewMockcodeStarClient(ctrl) m.EXPECT().WaitUntilConnectionStatusAvailable(gomock.Any(), "mockConnectionARN").Return(nil) return m }, createCpMock: func(ctrl *gomock.Controller) codePipelineClient { m := mocks.NewMockcodePipelineClient(ctrl) m.EXPECT().RetryStageExecution("mockPipelineResourceID", gomock.Any()).Return(nil) return m }, wantedErr: nil, }, "returns err if fail to create and wait": { createCfnMock: func(ctrl *gomock.Controller) cfnClient { m := mocks.NewMockcfnClient(ctrl) m.EXPECT().CreateAndWait(gomock.Any()).Return(errors.New("some error")) m.EXPECT().Outputs(gomock.Any()).Times(0) return m }, createS3Mock: func(ctrl *gomock.Controller) s3Client { m := mocks.NewMocks3Client(ctrl) m.EXPECT().Upload(mockS3BucketName, gomock.Any(), gomock.Any()).Return(mockURL, nil) return m }, createCsMock: func(ctrl *gomock.Controller) codeStarClient { m := mocks.NewMockcodeStarClient(ctrl) m.EXPECT().WaitUntilConnectionStatusAvailable(gomock.Any(), "mockConnectionARN").Times(0) return m }, createCpMock: func(ctrl *gomock.Controller) codePipelineClient { m := mocks.NewMockcodePipelineClient(ctrl) m.EXPECT().RetryStageExecution(gomock.Any(), gomock.Any()).Times(0) return m }, wantedErr: fmt.Errorf("some error"), }, "returns error if fails to upload template to S3 bucket": { createCfnMock: func(ctrl *gomock.Controller) cfnClient { m := mocks.NewMockcfnClient(ctrl) m.EXPECT().CreateAndWait(gomock.Any()).Times(0) m.EXPECT().Outputs(gomock.Any()).Times(0) return m }, createS3Mock: func(ctrl *gomock.Controller) s3Client { m := mocks.NewMocks3Client(ctrl) m.EXPECT().Upload(mockS3BucketName, gomock.Any(), gomock.Any()).Return("", errors.New("some error")) return m }, createCsMock: func(ctrl *gomock.Controller) codeStarClient { m := mocks.NewMockcodeStarClient(ctrl) m.EXPECT().WaitUntilConnectionStatusAvailable(gomock.Any(), "mockConnectionARN").Times(0) return m }, createCpMock: func(ctrl *gomock.Controller) codePipelineClient { m := mocks.NewMockcodePipelineClient(ctrl) m.EXPECT().RetryStageExecution(gomock.Any(), gomock.Any()).Times(0) return m }, wantedErr: fmt.Errorf("upload pipeline template to S3 bucket %s: some error", "BitterBucket"), }, "returns err if retrieving outputs fails": { createCfnMock: func(ctrl *gomock.Controller) cfnClient { m := mocks.NewMockcfnClient(ctrl) m.EXPECT().CreateAndWait(gomock.Any()).Times(1) m.EXPECT().Outputs(gomock.Any()).Return(nil, errors.New("some error")) return m }, createS3Mock: func(ctrl *gomock.Controller) s3Client { m := mocks.NewMocks3Client(ctrl) m.EXPECT().Upload(mockS3BucketName, gomock.Any(), gomock.Any()).Return(mockURL, nil) return m }, createCsMock: func(ctrl *gomock.Controller) codeStarClient { m := mocks.NewMockcodeStarClient(ctrl) m.EXPECT().WaitUntilConnectionStatusAvailable(gomock.Any(), "mockConnectionARN").Times(0) return m }, createCpMock: func(ctrl *gomock.Controller) codePipelineClient { m := mocks.NewMockcodePipelineClient(ctrl) m.EXPECT().RetryStageExecution(gomock.Any(), gomock.Any()).Times(0) return m }, wantedErr: fmt.Errorf("some error"), }, "returns err if unsuccessful in waiting for status to become available": { createCfnMock: func(ctrl *gomock.Controller) cfnClient { m := mocks.NewMockcfnClient(ctrl) m.EXPECT().CreateAndWait(gomock.Any()).Times(1) m.EXPECT().Outputs(gomock.Any()).Return(map[string]string{ "PipelineConnectionARN": "mockConnectionARN", }, nil) return m }, createS3Mock: func(ctrl *gomock.Controller) s3Client { m := mocks.NewMocks3Client(ctrl) m.EXPECT().Upload(mockS3BucketName, gomock.Any(), gomock.Any()).Return(mockURL, nil) return m }, createCsMock: func(ctrl *gomock.Controller) codeStarClient { m := mocks.NewMockcodeStarClient(ctrl) m.EXPECT().WaitUntilConnectionStatusAvailable(gomock.Any(), "mockConnectionARN").Return(errors.New("some error")) return m }, createCpMock: func(ctrl *gomock.Controller) codePipelineClient { m := mocks.NewMockcodePipelineClient(ctrl) m.EXPECT().RetryStageExecution(gomock.Any(), gomock.Any()).Times(0) return m }, wantedErr: fmt.Errorf("some error"), }, "returns err if error occurs when retrieving pipeline physical id": { createCfnMock: func(ctrl *gomock.Controller) cfnClient { m := mocks.NewMockcfnClient(ctrl) m.EXPECT().CreateAndWait(gomock.Any()).Times(1) m.EXPECT().Outputs(gomock.Any()).Return(map[string]string{ "PipelineConnectionARN": "mockConnectionARN", }, nil) m.EXPECT().StackResources(gomock.Any()).Return(nil, errors.New("some error")) return m }, createS3Mock: func(ctrl *gomock.Controller) s3Client { m := mocks.NewMocks3Client(ctrl) m.EXPECT().Upload(mockS3BucketName, gomock.Any(), gomock.Any()).Return(mockURL, nil) return m }, createCsMock: func(ctrl *gomock.Controller) codeStarClient { m := mocks.NewMockcodeStarClient(ctrl) m.EXPECT().WaitUntilConnectionStatusAvailable(gomock.Any(), "mockConnectionARN").Return(nil) return m }, createCpMock: func(ctrl *gomock.Controller) codePipelineClient { m := mocks.NewMockcodePipelineClient(ctrl) m.EXPECT().RetryStageExecution(gomock.Any(), gomock.Any()).Times(0) return m }, wantedErr: fmt.Errorf("some error"), }, "returns err if unable to find pipeline resource from stack": { createCfnMock: func(ctrl *gomock.Controller) cfnClient { m := mocks.NewMockcfnClient(ctrl) m.EXPECT().CreateAndWait(gomock.Any()).Times(1) m.EXPECT().Outputs(gomock.Any()).Return(map[string]string{ "PipelineConnectionARN": "mockConnectionARN", }, nil) m.EXPECT().StackResources(gomock.Any()).Return([]*cloudformation.StackResource{}, nil) return m }, createS3Mock: func(ctrl *gomock.Controller) s3Client { m := mocks.NewMocks3Client(ctrl) m.EXPECT().Upload(mockS3BucketName, gomock.Any(), gomock.Any()).Return(mockURL, nil) return m }, createCsMock: func(ctrl *gomock.Controller) codeStarClient { m := mocks.NewMockcodeStarClient(ctrl) m.EXPECT().WaitUntilConnectionStatusAvailable(gomock.Any(), "mockConnectionARN").Return(nil) return m }, createCpMock: func(ctrl *gomock.Controller) codePipelineClient { m := mocks.NewMockcodePipelineClient(ctrl) m.EXPECT().RetryStageExecution(gomock.Any(), gomock.Any()).Times(0) return m }, wantedErr: fmt.Errorf(`cannot find a resource in stack pipeline-kudos-cicd with logical ID "Pipeline" of type "AWS::CodePipeline::Pipeline"`), }, "returns err if unsuccessful in retrying stage execution": { createCfnMock: func(ctrl *gomock.Controller) cfnClient { m := mocks.NewMockcfnClient(ctrl) m.EXPECT().CreateAndWait(gomock.Any()).Times(1) m.EXPECT().Outputs(gomock.Any()).Return(map[string]string{ "PipelineConnectionARN": "mockConnectionARN", }, nil) m.EXPECT().StackResources(gomock.Any()).Return([]*cloudformation.StackResource{ { LogicalResourceId: aws.String(cfnLogicalResourceIDPipeline), ResourceType: aws.String(cfnResourceTypePipeline), PhysicalResourceId: aws.String("mockPipelineResourceID"), }, }, nil) return m }, createS3Mock: func(ctrl *gomock.Controller) s3Client { m := mocks.NewMocks3Client(ctrl) m.EXPECT().Upload(mockS3BucketName, gomock.Any(), gomock.Any()).Return(mockURL, nil) return m }, createCsMock: func(ctrl *gomock.Controller) codeStarClient { m := mocks.NewMockcodeStarClient(ctrl) m.EXPECT().WaitUntilConnectionStatusAvailable(gomock.Any(), "mockConnectionARN").Return(nil) return m }, createCpMock: func(ctrl *gomock.Controller) codePipelineClient { m := mocks.NewMockcodePipelineClient(ctrl) m.EXPECT().RetryStageExecution("mockPipelineResourceID", gomock.Any()).Return(errors.New("some error")) return m }, wantedErr: fmt.Errorf("some error"), }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { // GIVEN ctrl := gomock.NewController(t) defer ctrl.Finish() c := CloudFormation{ cfnClient: tc.createCfnMock(ctrl), codeStarClient: tc.createCsMock(ctrl), cpClient: tc.createCpMock(ctrl), s3Client: tc.createS3Mock(ctrl), } // WHEN err := c.CreatePipeline(in, mockS3BucketName) // THEN if tc.wantedErr != nil { require.EqualError(t, err, tc.wantedErr.Error()) } else { require.NoError(t, err) } }) } } func TestCloudFormation_UpdatePipeline(t *testing.T) { in := &deploy.CreatePipelineInput{ AppName: "kudos", Name: "cicd", Source: &deploy.GitHubSource{ RepositoryURL: "aws/somethingCool", Branch: "main", }, Build: &deploy.Build{ Image: defaultImage, }, Stages: nil, ArtifactBuckets: nil, } mockS3BucketName := "BitterBucket" mockURL := "templateURL" testCases := map[string]struct { createMock func(ctrl *gomock.Controller) cfnClient createS3Mock func(ctrl *gomock.Controller) s3Client wantedErr error }{ "exits successfully if there are no updates": { createMock: func(ctrl *gomock.Controller) cfnClient { m := mocks.NewMockcfnClient(ctrl) m.EXPECT().UpdateAndWait(gomock.Any()).Return(&cloudformation.ErrChangeSetEmpty{}) return m }, createS3Mock: func(ctrl *gomock.Controller) s3Client { m := mocks.NewMocks3Client(ctrl) m.EXPECT().Upload(mockS3BucketName, gomock.Any(), gomock.Any()).Return(mockURL, nil) return m }, wantedErr: nil, }, "returns an error if can't push template to S3 bucket": { createMock: func(ctrl *gomock.Controller) cfnClient { m := mocks.NewMockcfnClient(ctrl) //m.EXPECT().UpdateAndWait(gomock.Any()).Return(&cloudformation.ErrChangeSetEmpty{}) return m }, createS3Mock: func(ctrl *gomock.Controller) s3Client { m := mocks.NewMocks3Client(ctrl) m.EXPECT().Upload(mockS3BucketName, gomock.Any(), gomock.Any()).Return("", errors.New("some error")) return m }, wantedErr: fmt.Errorf("upload pipeline template to S3 bucket %s: some error", "BitterBucket"), }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { // GIVEN ctrl := gomock.NewController(t) defer ctrl.Finish() c := CloudFormation{ cfnClient: tc.createMock(ctrl), s3Client: tc.createS3Mock(ctrl), } // WHEN err := c.UpdatePipeline(in, mockS3BucketName) // THEN if tc.wantedErr != nil { require.EqualError(t, err, tc.wantedErr.Error()) } else { require.NoError(t, err) } }) } }
443
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package cloudformation import ( "errors" "fmt" "github.com/aws/aws-sdk-go/aws" "github.com/aws/copilot-cli/internal/pkg/aws/cloudformation" "github.com/aws/copilot-cli/internal/pkg/deploy" "github.com/aws/copilot-cli/internal/pkg/deploy/cloudformation/stack" ) // DeployTask deploys a task stack, renders the deployment to out until it is done. // If the task stack doesn't exist, then it creates the stack. // If the task stack already exists, it updates the stack. // If the task stack doesn't have any changes, it returns nil func (cf CloudFormation) DeployTask(input *deploy.CreateTaskResourcesInput, opts ...cloudformation.StackOption) error { conf := stack.NewTaskStackConfig(input) stack, err := toStack(conf) if err != nil { return err } for _, opt := range opts { opt(stack) } if err := cf.executeAndRenderChangeSet(cf.newUpsertChangeSetInput(cf.console, stack)); err != nil { var errChangeSetEmpty *cloudformation.ErrChangeSetEmpty if !errors.As(err, &errChangeSetEmpty) { return err } } return nil } // ListTaskStacks returns all the CF stacks which represent one-off copilot tasks in a given application's environments. func (cf CloudFormation) ListTaskStacks(appName, envName string) ([]deploy.TaskStackInfo, error) { taskAppEnvTags := map[string]string{ deploy.TaskTagKey: "", deploy.AppTagKey: appName, deploy.EnvTagKey: envName, } tasks, err := cf.cfnClient.ListStacksWithTags(taskAppEnvTags) if err != nil { return nil, err } var outputTaskStacks []deploy.TaskStackInfo for _, task := range tasks { outputTaskStacks = append(outputTaskStacks, deploy.TaskStackInfo{ StackName: aws.StringValue(task.StackName), App: appName, Env: envName, RoleARN: aws.StringValue(task.RoleARN), }) } return outputTaskStacks, nil } // GetTaskStack grabs information about the given one-off task's cloudformation stack // and returns it to the user in a convenient struct. func (cf CloudFormation) GetTaskStack(taskName string) (*deploy.TaskStackInfo, error) { stackName := string(stack.NameForTask(taskName)) desc, err := cf.cfnClient.Describe(stackName) if err != nil { return nil, err } info := deploy.TaskStackInfo{ StackName: stackName, RoleARN: aws.StringValue(desc.RoleARN), } var isTask bool for _, tag := range desc.Tags { switch aws.StringValue(tag.Key) { case deploy.AppTagKey: info.App = aws.StringValue(tag.Value) case deploy.EnvTagKey: info.Env = aws.StringValue(tag.Value) case deploy.TaskTagKey: isTask = true } } for _, out := range desc.Outputs { switch aws.StringValue(out.OutputKey) { case stack.TaskOutputS3Bucket: info.BucketName = aws.StringValue(out.OutputValue) } } if !isTask { return nil, fmt.Errorf("%s is not a Copilot task stack", stackName) } return &info, nil } // ListDefaultTaskStacks returns all the CF stacks created by copilot but not associated with an application. func (cf CloudFormation) ListDefaultTaskStacks() ([]deploy.TaskStackInfo, error) { tasks, err := cf.cfnClient.ListStacksWithTags(map[string]string{deploy.TaskTagKey: ""}) if err != nil { return nil, err } var outputTaskStacks []deploy.TaskStackInfo for _, task := range tasks { // Eliminate tasks which are tagged for a particular copilot app or env. var hasAppTag, hasEnvTag bool for _, tag := range task.Tags { if aws.StringValue(tag.Key) == deploy.AppTagKey { hasAppTag = true } if aws.StringValue(tag.Key) == deploy.EnvTagKey { hasEnvTag = true } } if hasAppTag || hasEnvTag { continue } outputTaskStacks = append(outputTaskStacks, deploy.TaskStackInfo{ StackName: aws.StringValue(task.StackName), }) } return outputTaskStacks, nil } // DeleteTask deletes a Copilot-created one-off task stack using the RoleARN that stack was created with. // If there is no role arn specified, it tries to delete the stack using the default session. func (cf CloudFormation) DeleteTask(task deploy.TaskStackInfo) error { if task.RoleARN != "" { return cf.cfnClient.DeleteAndWaitWithRoleARN(task.StackName, task.RoleARN) } return cf.cfnClient.DeleteAndWait(task.StackName) }
136
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package cloudformation import ( "errors" "testing" "github.com/aws/aws-sdk-go/aws" awscfn "github.com/aws/aws-sdk-go/service/cloudformation" "github.com/aws/copilot-cli/internal/pkg/deploy" "github.com/aws/copilot-cli/internal/pkg/aws/cloudformation" "github.com/stretchr/testify/require" "github.com/aws/copilot-cli/internal/pkg/deploy/cloudformation/mocks" "github.com/golang/mock/gomock" ) func TestCloudFormation_DeployTask(t *testing.T) { mockTask := &deploy.CreateTaskResourcesInput{ Name: "hello", } when := func(cf CloudFormation) error { return cf.DeployTask(mockTask) } t.Run("returns a wrapped error if creating a change set fails", func(t *testing.T) { testDeployTask_OnCreateChangeSetFailure(t, when) }) t.Run("calls Update if stack is already created and returns wrapped error if Update fails", func(t *testing.T) { testDeployTask_OnUpdateChangeSetFailure(t, when) }) t.Run("returns nil if the change set is empty when calling Update", func(t *testing.T) { testDeployTask_ReturnNilOnEmptyChangeSetWhileUpdatingStack(t, when) }) t.Run("returns an error when the ChangeSet cannot be described for stack changes before rendering", func(t *testing.T) { testDeployTask_OnDescribeChangeSetFailure(t, when) }) t.Run("returns an error when stack template body cannot be retrieved to parse resource descriptions", func(t *testing.T) { testDeployTask_OnTemplateBodyFailure(t, when) }) t.Run("returns a wrapped error if a streamer fails and cancels the renderer", func(t *testing.T) { testDeployTask_StackStreamerFailureShouldCancelRenderer(t, when) }) t.Run("returns an error if stack creation fails", func(t *testing.T) { testDeployTask_StreamUntilStackCreationFails(t, "task-hello", when) }) t.Run("renders a stack with addons template if stack creation is successful", func(t *testing.T) { testDeployTask_RenderNewlyCreatedStackWithAddons(t, "task-hello", when) }) } var mockDescription1 = &cloudformation.StackDescription{ Tags: []*awscfn.Tag{ { Key: aws.String("copilot-task"), }, { Key: aws.String("copilot-application"), Value: aws.String("appname"), }, { Key: aws.String("copilot-environment"), Value: aws.String("test"), }, }, StackName: aws.String("task-database"), RoleARN: aws.String("arn:aws:iam::123456789012:role/appname-test-CFNExecutionRole"), } var mockDescription2 = &cloudformation.StackDescription{ Tags: []*awscfn.Tag{ { Key: aws.String("copilot-task"), }, { Key: aws.String("copilot-application"), Value: aws.String("otherapp"), }, { Key: aws.String("copilot-environment"), Value: aws.String("test"), }, }, StackName: aws.String("task-example"), RoleARN: aws.String("arn:aws:iam::123456789012:role/otherapp-staging-CFNExecutionRole"), } var mockDescription3 = &cloudformation.StackDescription{ Tags: []*awscfn.Tag{ { Key: aws.String("copilot-task"), }, }, StackName: aws.String("task-default"), RoleARN: aws.String(""), } func TestCloudFormation_ListTaskStacks(t *testing.T) { testCases := map[string]struct { inAppName string mockClient func(*mocks.MockcfnClient) wantedErr string wantedTasks []deploy.TaskStackInfo }{ "successfully gets task stacks while excluding wrongly tagged stack": { inAppName: "appname", mockClient: func(m *mocks.MockcfnClient) { m.EXPECT().ListStacksWithTags(map[string]string{ "copilot-application": "appname", "copilot-environment": "test", "copilot-task": "", }).Return([]cloudformation.StackDescription{ *mockDescription1, }, nil) }, wantedTasks: []deploy.TaskStackInfo{ { StackName: "task-database", App: "appname", Env: "test", RoleARN: aws.StringValue(mockDescription1.RoleARN), }, }, }, "error listing stacks": { inAppName: "appname", mockClient: func(m *mocks.MockcfnClient) { m.EXPECT().ListStacksWithTags(gomock.Any()).Return(nil, errors.New("some error")) }, wantedErr: "some error", }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { // GIVEN ctrl := gomock.NewController(t) defer ctrl.Finish() mockCf := mocks.NewMockcfnClient(ctrl) tc.mockClient(mockCf) cf := CloudFormation{cfnClient: mockCf} // WHEN tasks, err := cf.ListTaskStacks("appname", "test") if tc.wantedErr != "" { require.EqualError(t, err, tc.wantedErr) } else { require.Equal(t, tc.wantedTasks, tasks) } }) } } func TestCloudFormation_GetTaskDefaultStackInfo(t *testing.T) { testCases := map[string]struct { inAppName string mockClient func(*mocks.MockcfnClient) wantedErr string wantedTasks []deploy.TaskStackInfo }{ "successfully gets task stacks while excluding wrongly tagged stack": { inAppName: "appname", mockClient: func(m *mocks.MockcfnClient) { m.EXPECT().ListStacksWithTags(map[string]string{ "copilot-task": "", }).Return([]cloudformation.StackDescription{ *mockDescription1, *mockDescription2, *mockDescription3, }, nil) }, wantedTasks: []deploy.TaskStackInfo{ { StackName: "task-default", }, }, }, "error listing stacks": { inAppName: "appname", mockClient: func(m *mocks.MockcfnClient) { m.EXPECT().ListStacksWithTags(gomock.Any()).Return(nil, errors.New("some error")) }, wantedErr: "some error", }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { // GIVEN ctrl := gomock.NewController(t) defer ctrl.Finish() mockCf := mocks.NewMockcfnClient(ctrl) tc.mockClient(mockCf) cf := CloudFormation{cfnClient: mockCf} // WHEN tasks, err := cf.ListDefaultTaskStacks() if tc.wantedErr != "" { require.EqualError(t, err, tc.wantedErr) } else { require.Equal(t, tc.wantedTasks, tasks) } }) } }
215
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package cloudformation import ( "fmt" "strings" "github.com/aws/copilot-cli/internal/pkg/aws/cloudformation" "github.com/aws/copilot-cli/internal/pkg/deploy" "github.com/aws/copilot-cli/internal/pkg/template/artifactpath" ) // DeployService deploys a service stack and renders progress updates to out until the deployment is done. // If the service stack doesn't exist, then it creates the stack. // If the service stack already exists, it updates the stack. func (cf CloudFormation) DeployService(conf StackConfiguration, bucketName string, opts ...cloudformation.StackOption) error { templateURL, err := cf.uploadStackTemplateToS3(bucketName, conf) if err != nil { return err } stack, err := toStackFromS3(conf, templateURL) if err != nil { return err } for _, opt := range opts { opt(stack) } return cf.executeAndRenderChangeSet(cf.newUpsertChangeSetInput(cf.console, stack)) } type uploadableStack interface { StackName() string Template() (string, error) } func (cf CloudFormation) uploadStackTemplateToS3(bucket string, stack uploadableStack) (string, error) { tmpl, err := stack.Template() if err != nil { return "", fmt.Errorf("generate template: %w", err) } url, err := cf.s3Client.Upload(bucket, artifactpath.CFNTemplate(stack.StackName(), []byte(tmpl)), strings.NewReader(tmpl)) if err != nil { return "", err } return url, nil } func (cf CloudFormation) handleStackError(stackName string, err error) error { if err == nil { return nil } reasons, describeErr := cf.errorEvents(stackName) if describeErr != nil { return fmt.Errorf("%w: describe stack: %v", err, describeErr) } if len(reasons) == 0 { return err } return fmt.Errorf("%w: %s", err, reasons[0]) } // DeleteWorkload removes the CloudFormation stack of a deployed workload. func (cf CloudFormation) DeleteWorkload(in deploy.DeleteWorkloadInput) error { stackName := fmt.Sprintf("%s-%s-%s", in.AppName, in.EnvName, in.Name) description := fmt.Sprintf("Delete stack %s", stackName) return cf.deleteAndRenderStack(stackName, description, func() error { return cf.cfnClient.DeleteAndWaitWithRoleARN(stackName, in.ExecutionRoleARN) }) }
72
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package cloudformation import ( "errors" "testing" "github.com/aws/copilot-cli/internal/pkg/aws/cloudformation" "github.com/aws/aws-sdk-go/aws" sdkcloudformation "github.com/aws/aws-sdk-go/service/cloudformation" "github.com/aws/copilot-cli/internal/pkg/deploy" "github.com/aws/copilot-cli/internal/pkg/deploy/cloudformation/mocks" "github.com/golang/mock/gomock" "github.com/stretchr/testify/require" ) type mockStackConfig struct { name string template string tags map[string]string parameters map[string]string } func (m *mockStackConfig) StackName() string { return m.name } func (m *mockStackConfig) Template() (string, error) { return m.template, nil } func (m *mockStackConfig) Parameters() ([]*sdkcloudformation.Parameter, error) { var params []*sdkcloudformation.Parameter for k, v := range m.parameters { params = append(params, &sdkcloudformation.Parameter{ ParameterKey: aws.String(k), ParameterValue: aws.String(v), }) } return params, nil } func (m *mockStackConfig) SerializedParameters() (string, error) { return "", nil } func (m *mockStackConfig) Tags() []*sdkcloudformation.Tag { var tags []*sdkcloudformation.Tag for k, v := range m.tags { tags = append(tags, &sdkcloudformation.Tag{ Key: aws.String(k), Value: aws.String(v), }) } return tags } func TestCloudFormation_DeployService(t *testing.T) { serviceConfig := &mockStackConfig{ name: "myapp-myenv-mysvc", template: "template", parameters: map[string]string{ "port": "80", }, tags: map[string]string{ "app": "myapp", }, } when := func(cf CloudFormation) error { return cf.DeployService(serviceConfig, "mockBucket") } t.Run("returns a wrapped error if pushing to s3 bucket fails", func(t *testing.T) { testDeployWorkload_OnPushToS3Failure(t, when) }) t.Run("returns a wrapped error if creating a change set fails", func(t *testing.T) { testDeployWorkload_OnCreateChangeSetFailure(t, when) }) t.Run("calls Update if stack is already created and returns wrapped error if Update fails", func(t *testing.T) { testDeployWorkload_OnUpdateChangeSetFailure(t, when) }) t.Run("returns an error when the ChangeSet cannot be described for stack changes before rendering", func(t *testing.T) { testDeployWorkload_OnDescribeChangeSetFailure(t, when) }) t.Run("returns an error when stack template body cannot be retrieved to parse resource descriptions", func(t *testing.T) { testDeployWorkload_OnTemplateBodyFailure(t, when) }) t.Run("returns a wrapped error if a streamer fails and cancels the renderer", func(t *testing.T) { testDeployWorkload_StackStreamerFailureShouldCancelRenderer(t, when) }) t.Run("returns an error if stack creation fails", func(t *testing.T) { testDeployWorkload_StreamUntilStackCreationFails(t, "myapp-myenv-mysvc", when) }) t.Run("renders a stack with an EnvController that triggers no Env Stack updates", func(t *testing.T) { testDeployWorkload_WithEnvControllerRenderer_NoStackUpdates(t, "myapp-myenv-mysvc", when) }) t.Run("renders a stack with an ECS service", func(t *testing.T) { testDeployWorkload_RenderNewlyCreatedStackWithECSService(t, "myapp-myenv-mysvc", when) }) t.Run("renders a stack with addons template if stack creation is successful", func(t *testing.T) { testDeployWorkload_RenderNewlyCreatedStackWithAddons(t, "myapp-myenv-mysvc", when) }) } func TestCloudFormation_DeleteWorkload(t *testing.T) { in := deploy.DeleteWorkloadInput{ Name: "webhook", EnvName: "test", AppName: "kudos", } testCases := map[string]struct { createMock func(ctrl *gomock.Controller) cfnClient wanted error }{ "should short-circuit if the stack is already deleted when retrieving the template body": { createMock: func(ctrl *gomock.Controller) cfnClient { m := mocks.NewMockcfnClient(ctrl) m.EXPECT().TemplateBody(gomock.Any()).Return("", &cloudformation.ErrStackNotFound{}) return m }, }, "should return a wrapped error if retrieving the template body fails unexpectedly": { createMock: func(ctrl *gomock.Controller) cfnClient { m := mocks.NewMockcfnClient(ctrl) m.EXPECT().TemplateBody(gomock.Any()).Return("", errors.New("some error")) return m }, wanted: errors.New(`get template body of stack "kudos-test-webhook": some error`), }, "should short-circuit if stack is deleted while retrieving the stack ID": { createMock: func(ctrl *gomock.Controller) cfnClient { m := mocks.NewMockcfnClient(ctrl) m.EXPECT().TemplateBody(gomock.Any()).Return("", nil) m.EXPECT().Describe(gomock.Any()).Return(nil, &cloudformation.ErrStackNotFound{}) return m }, }, "should return a wrapped error if retrieving the stack ID fails unexpectedly": { createMock: func(ctrl *gomock.Controller) cfnClient { m := mocks.NewMockcfnClient(ctrl) m.EXPECT().TemplateBody(gomock.Any()).Return("", nil) m.EXPECT().Describe(gomock.Any()).Return(nil, errors.New("some error")) return m }, wanted: errors.New(`retrieve the stack ID for stack "kudos-test-webhook": some error`), }, "should return the error as is if the deletion function fails unexpectedly": { createMock: func(ctrl *gomock.Controller) cfnClient { m := mocks.NewMockcfnClient(ctrl) m.EXPECT().TemplateBody(gomock.Any()).Return("", nil) m.EXPECT().Describe(gomock.Any()).Return(&cloudformation.StackDescription{ StackId: aws.String("stack/webhook/1111"), }, nil) m.EXPECT().DeleteAndWaitWithRoleARN(gomock.Any(), gomock.Any()).Return(errors.New("some error")) m.EXPECT().DescribeStackEvents(gomock.Any()).Return(&sdkcloudformation.DescribeStackEventsOutput{}, nil).AnyTimes() return m }, wanted: errors.New("some error"), }, "should return the error as is if the progress renderer fails unexpectedly": { createMock: func(ctrl *gomock.Controller) cfnClient { m := mocks.NewMockcfnClient(ctrl) m.EXPECT().TemplateBody(gomock.Any()).Return("", nil) m.EXPECT().Describe(gomock.Any()).Return(&cloudformation.StackDescription{ StackId: aws.String("stack/webhook/1111"), }, nil) m.EXPECT().DeleteAndWaitWithRoleARN(gomock.Any(), gomock.Any()).Return(nil) m.EXPECT().DescribeStackEvents(gomock.Any()).Return(nil, errors.New("some error")) return m }, wanted: errors.New("describe stack events stack/webhook/1111: some error"), }, "should return nil if the deletion function tries to delete an already deleted stack": { createMock: func(ctrl *gomock.Controller) cfnClient { m := mocks.NewMockcfnClient(ctrl) m.EXPECT().TemplateBody(gomock.Any()).Return("", nil) m.EXPECT().Describe(gomock.Any()).Return(&cloudformation.StackDescription{ StackId: aws.String("stack/webhook/1111"), }, nil) m.EXPECT().DeleteAndWaitWithRoleARN(gomock.Any(), gomock.Any()).Return(&cloudformation.ErrStackNotFound{}) m.EXPECT().DescribeStackEvents(gomock.Any()).Return(&sdkcloudformation.DescribeStackEventsOutput{}, nil).AnyTimes() return m }, }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { // GIVEN ctrl := gomock.NewController(t) defer ctrl.Finish() c := CloudFormation{ cfnClient: tc.createMock(ctrl), console: new(discardFile), } // WHEN err := c.DeleteWorkload(in) // THEN if tc.wanted != nil { require.EqualError(t, err, tc.wanted.Error()) } else { require.NoError(t, err) } }) } }
214
copilot-cli
aws
Go
// Code generated by MockGen. DO NOT EDIT. // Source: ./internal/pkg/deploy/cloudformation/cloudformation.go // Package mocks is a generated GoMock package. package mocks import ( context "context" io "io" reflect "reflect" cloudformation "github.com/aws/aws-sdk-go/service/cloudformation" cloudformation0 "github.com/aws/copilot-cli/internal/pkg/aws/cloudformation" stackset "github.com/aws/copilot-cli/internal/pkg/aws/cloudformation/stackset" cloudwatch "github.com/aws/copilot-cli/internal/pkg/aws/cloudwatch" ecs "github.com/aws/copilot-cli/internal/pkg/aws/ecs" gomock "github.com/golang/mock/gomock" ) // MockStackConfiguration is a mock of StackConfiguration interface. type MockStackConfiguration struct { ctrl *gomock.Controller recorder *MockStackConfigurationMockRecorder } // MockStackConfigurationMockRecorder is the mock recorder for MockStackConfiguration. type MockStackConfigurationMockRecorder struct { mock *MockStackConfiguration } // NewMockStackConfiguration creates a new mock instance. func NewMockStackConfiguration(ctrl *gomock.Controller) *MockStackConfiguration { mock := &MockStackConfiguration{ctrl: ctrl} mock.recorder = &MockStackConfigurationMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockStackConfiguration) EXPECT() *MockStackConfigurationMockRecorder { return m.recorder } // Parameters mocks base method. func (m *MockStackConfiguration) Parameters() ([]*cloudformation.Parameter, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "Parameters") ret0, _ := ret[0].([]*cloudformation.Parameter) ret1, _ := ret[1].(error) return ret0, ret1 } // Parameters indicates an expected call of Parameters. func (mr *MockStackConfigurationMockRecorder) Parameters() *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Parameters", reflect.TypeOf((*MockStackConfiguration)(nil).Parameters)) } // SerializedParameters mocks base method. func (m *MockStackConfiguration) SerializedParameters() (string, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "SerializedParameters") ret0, _ := ret[0].(string) ret1, _ := ret[1].(error) return ret0, ret1 } // SerializedParameters indicates an expected call of SerializedParameters. func (mr *MockStackConfigurationMockRecorder) SerializedParameters() *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "SerializedParameters", reflect.TypeOf((*MockStackConfiguration)(nil).SerializedParameters)) } // StackName mocks base method. func (m *MockStackConfiguration) StackName() string { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "StackName") ret0, _ := ret[0].(string) return ret0 } // StackName indicates an expected call of StackName. func (mr *MockStackConfigurationMockRecorder) StackName() *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "StackName", reflect.TypeOf((*MockStackConfiguration)(nil).StackName)) } // Tags mocks base method. func (m *MockStackConfiguration) Tags() []*cloudformation.Tag { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "Tags") ret0, _ := ret[0].([]*cloudformation.Tag) return ret0 } // Tags indicates an expected call of Tags. func (mr *MockStackConfigurationMockRecorder) Tags() *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Tags", reflect.TypeOf((*MockStackConfiguration)(nil).Tags)) } // Template mocks base method. func (m *MockStackConfiguration) Template() (string, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "Template") ret0, _ := ret[0].(string) ret1, _ := ret[1].(error) return ret0, ret1 } // Template indicates an expected call of Template. func (mr *MockStackConfigurationMockRecorder) Template() *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Template", reflect.TypeOf((*MockStackConfiguration)(nil).Template)) } // MockOverrider is a mock of Overrider interface. type MockOverrider struct { ctrl *gomock.Controller recorder *MockOverriderMockRecorder } // MockOverriderMockRecorder is the mock recorder for MockOverrider. type MockOverriderMockRecorder struct { mock *MockOverrider } // NewMockOverrider creates a new mock instance. func NewMockOverrider(ctrl *gomock.Controller) *MockOverrider { mock := &MockOverrider{ctrl: ctrl} mock.recorder = &MockOverriderMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockOverrider) EXPECT() *MockOverriderMockRecorder { return m.recorder } // Override mocks base method. func (m *MockOverrider) Override(body []byte) ([]byte, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "Override", body) ret0, _ := ret[0].([]byte) ret1, _ := ret[1].(error) return ret0, ret1 } // Override indicates an expected call of Override. func (mr *MockOverriderMockRecorder) Override(body interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Override", reflect.TypeOf((*MockOverrider)(nil).Override), body) } // MockecsClient is a mock of ecsClient interface. type MockecsClient struct { ctrl *gomock.Controller recorder *MockecsClientMockRecorder } // MockecsClientMockRecorder is the mock recorder for MockecsClient. type MockecsClientMockRecorder struct { mock *MockecsClient } // NewMockecsClient creates a new mock instance. func NewMockecsClient(ctrl *gomock.Controller) *MockecsClient { mock := &MockecsClient{ctrl: ctrl} mock.recorder = &MockecsClientMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockecsClient) EXPECT() *MockecsClientMockRecorder { return m.recorder } // Service mocks base method. func (m *MockecsClient) Service(clusterName, serviceName string) (*ecs.Service, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "Service", clusterName, serviceName) ret0, _ := ret[0].(*ecs.Service) ret1, _ := ret[1].(error) return ret0, ret1 } // Service indicates an expected call of Service. func (mr *MockecsClientMockRecorder) Service(clusterName, serviceName interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Service", reflect.TypeOf((*MockecsClient)(nil).Service), clusterName, serviceName) } // MockcwClient is a mock of cwClient interface. type MockcwClient struct { ctrl *gomock.Controller recorder *MockcwClientMockRecorder } // MockcwClientMockRecorder is the mock recorder for MockcwClient. type MockcwClientMockRecorder struct { mock *MockcwClient } // NewMockcwClient creates a new mock instance. func NewMockcwClient(ctrl *gomock.Controller) *MockcwClient { mock := &MockcwClient{ctrl: ctrl} mock.recorder = &MockcwClientMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockcwClient) EXPECT() *MockcwClientMockRecorder { return m.recorder } // AlarmStatuses mocks base method. func (m *MockcwClient) AlarmStatuses(opts ...cloudwatch.DescribeAlarmOpts) ([]cloudwatch.AlarmStatus, error) { m.ctrl.T.Helper() varargs := []interface{}{} for _, a := range opts { varargs = append(varargs, a) } ret := m.ctrl.Call(m, "AlarmStatuses", varargs...) ret0, _ := ret[0].([]cloudwatch.AlarmStatus) ret1, _ := ret[1].(error) return ret0, ret1 } // AlarmStatuses indicates an expected call of AlarmStatuses. func (mr *MockcwClientMockRecorder) AlarmStatuses(opts ...interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "AlarmStatuses", reflect.TypeOf((*MockcwClient)(nil).AlarmStatuses), opts...) } // MockcfnClient is a mock of cfnClient interface. type MockcfnClient struct { ctrl *gomock.Controller recorder *MockcfnClientMockRecorder } // MockcfnClientMockRecorder is the mock recorder for MockcfnClient. type MockcfnClientMockRecorder struct { mock *MockcfnClient } // NewMockcfnClient creates a new mock instance. func NewMockcfnClient(ctrl *gomock.Controller) *MockcfnClient { mock := &MockcfnClient{ctrl: ctrl} mock.recorder = &MockcfnClientMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockcfnClient) EXPECT() *MockcfnClientMockRecorder { return m.recorder } // Create mocks base method. func (m *MockcfnClient) Create(arg0 *cloudformation0.Stack) (string, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "Create", arg0) ret0, _ := ret[0].(string) ret1, _ := ret[1].(error) return ret0, ret1 } // Create indicates an expected call of Create. func (mr *MockcfnClientMockRecorder) Create(arg0 interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Create", reflect.TypeOf((*MockcfnClient)(nil).Create), arg0) } // CreateAndWait mocks base method. func (m *MockcfnClient) CreateAndWait(arg0 *cloudformation0.Stack) error { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "CreateAndWait", arg0) ret0, _ := ret[0].(error) return ret0 } // CreateAndWait indicates an expected call of CreateAndWait. func (mr *MockcfnClientMockRecorder) CreateAndWait(arg0 interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "CreateAndWait", reflect.TypeOf((*MockcfnClient)(nil).CreateAndWait), arg0) } // Delete mocks base method. func (m *MockcfnClient) Delete(stackName string) error { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "Delete", stackName) ret0, _ := ret[0].(error) return ret0 } // Delete indicates an expected call of Delete. func (mr *MockcfnClientMockRecorder) Delete(stackName interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Delete", reflect.TypeOf((*MockcfnClient)(nil).Delete), stackName) } // DeleteAndWait mocks base method. func (m *MockcfnClient) DeleteAndWait(stackName string) error { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "DeleteAndWait", stackName) ret0, _ := ret[0].(error) return ret0 } // DeleteAndWait indicates an expected call of DeleteAndWait. func (mr *MockcfnClientMockRecorder) DeleteAndWait(stackName interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DeleteAndWait", reflect.TypeOf((*MockcfnClient)(nil).DeleteAndWait), stackName) } // DeleteAndWaitWithRoleARN mocks base method. func (m *MockcfnClient) DeleteAndWaitWithRoleARN(stackName, roleARN string) error { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "DeleteAndWaitWithRoleARN", stackName, roleARN) ret0, _ := ret[0].(error) return ret0 } // DeleteAndWaitWithRoleARN indicates an expected call of DeleteAndWaitWithRoleARN. func (mr *MockcfnClientMockRecorder) DeleteAndWaitWithRoleARN(stackName, roleARN interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DeleteAndWaitWithRoleARN", reflect.TypeOf((*MockcfnClient)(nil).DeleteAndWaitWithRoleARN), stackName, roleARN) } // Describe mocks base method. func (m *MockcfnClient) Describe(stackName string) (*cloudformation0.StackDescription, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "Describe", stackName) ret0, _ := ret[0].(*cloudformation0.StackDescription) ret1, _ := ret[1].(error) return ret0, ret1 } // Describe indicates an expected call of Describe. func (mr *MockcfnClientMockRecorder) Describe(stackName interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Describe", reflect.TypeOf((*MockcfnClient)(nil).Describe), stackName) } // DescribeChangeSet mocks base method. func (m *MockcfnClient) DescribeChangeSet(changeSetID, stackName string) (*cloudformation0.ChangeSetDescription, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "DescribeChangeSet", changeSetID, stackName) ret0, _ := ret[0].(*cloudformation0.ChangeSetDescription) ret1, _ := ret[1].(error) return ret0, ret1 } // DescribeChangeSet indicates an expected call of DescribeChangeSet. func (mr *MockcfnClientMockRecorder) DescribeChangeSet(changeSetID, stackName interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DescribeChangeSet", reflect.TypeOf((*MockcfnClient)(nil).DescribeChangeSet), changeSetID, stackName) } // DescribeStackEvents mocks base method. func (m *MockcfnClient) DescribeStackEvents(arg0 *cloudformation.DescribeStackEventsInput) (*cloudformation.DescribeStackEventsOutput, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "DescribeStackEvents", arg0) ret0, _ := ret[0].(*cloudformation.DescribeStackEventsOutput) ret1, _ := ret[1].(error) return ret0, ret1 } // DescribeStackEvents indicates an expected call of DescribeStackEvents. func (mr *MockcfnClientMockRecorder) DescribeStackEvents(arg0 interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DescribeStackEvents", reflect.TypeOf((*MockcfnClient)(nil).DescribeStackEvents), arg0) } // ErrorEvents mocks base method. func (m *MockcfnClient) ErrorEvents(stackName string) ([]cloudformation0.StackEvent, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "ErrorEvents", stackName) ret0, _ := ret[0].([]cloudformation0.StackEvent) ret1, _ := ret[1].(error) return ret0, ret1 } // ErrorEvents indicates an expected call of ErrorEvents. func (mr *MockcfnClientMockRecorder) ErrorEvents(stackName interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ErrorEvents", reflect.TypeOf((*MockcfnClient)(nil).ErrorEvents), stackName) } // Events mocks base method. func (m *MockcfnClient) Events(stackName string) ([]cloudformation0.StackEvent, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "Events", stackName) ret0, _ := ret[0].([]cloudformation0.StackEvent) ret1, _ := ret[1].(error) return ret0, ret1 } // Events indicates an expected call of Events. func (mr *MockcfnClientMockRecorder) Events(stackName interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Events", reflect.TypeOf((*MockcfnClient)(nil).Events), stackName) } // ListStacksWithTags mocks base method. func (m *MockcfnClient) ListStacksWithTags(tags map[string]string) ([]cloudformation0.StackDescription, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "ListStacksWithTags", tags) ret0, _ := ret[0].([]cloudformation0.StackDescription) ret1, _ := ret[1].(error) return ret0, ret1 } // ListStacksWithTags indicates an expected call of ListStacksWithTags. func (mr *MockcfnClientMockRecorder) ListStacksWithTags(tags interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ListStacksWithTags", reflect.TypeOf((*MockcfnClient)(nil).ListStacksWithTags), tags) } // Metadata mocks base method. func (m *MockcfnClient) Metadata(opts cloudformation0.MetadataOpts) (string, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "Metadata", opts) ret0, _ := ret[0].(string) ret1, _ := ret[1].(error) return ret0, ret1 } // Metadata indicates an expected call of Metadata. func (mr *MockcfnClientMockRecorder) Metadata(opts interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Metadata", reflect.TypeOf((*MockcfnClient)(nil).Metadata), opts) } // Outputs mocks base method. func (m *MockcfnClient) Outputs(stack *cloudformation0.Stack) (map[string]string, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "Outputs", stack) ret0, _ := ret[0].(map[string]string) ret1, _ := ret[1].(error) return ret0, ret1 } // Outputs indicates an expected call of Outputs. func (mr *MockcfnClientMockRecorder) Outputs(stack interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Outputs", reflect.TypeOf((*MockcfnClient)(nil).Outputs), stack) } // StackResources mocks base method. func (m *MockcfnClient) StackResources(name string) ([]*cloudformation0.StackResource, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "StackResources", name) ret0, _ := ret[0].([]*cloudformation0.StackResource) ret1, _ := ret[1].(error) return ret0, ret1 } // StackResources indicates an expected call of StackResources. func (mr *MockcfnClientMockRecorder) StackResources(name interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "StackResources", reflect.TypeOf((*MockcfnClient)(nil).StackResources), name) } // TemplateBody mocks base method. func (m *MockcfnClient) TemplateBody(stackName string) (string, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "TemplateBody", stackName) ret0, _ := ret[0].(string) ret1, _ := ret[1].(error) return ret0, ret1 } // TemplateBody indicates an expected call of TemplateBody. func (mr *MockcfnClientMockRecorder) TemplateBody(stackName interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "TemplateBody", reflect.TypeOf((*MockcfnClient)(nil).TemplateBody), stackName) } // TemplateBodyFromChangeSet mocks base method. func (m *MockcfnClient) TemplateBodyFromChangeSet(changeSetID, stackName string) (string, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "TemplateBodyFromChangeSet", changeSetID, stackName) ret0, _ := ret[0].(string) ret1, _ := ret[1].(error) return ret0, ret1 } // TemplateBodyFromChangeSet indicates an expected call of TemplateBodyFromChangeSet. func (mr *MockcfnClientMockRecorder) TemplateBodyFromChangeSet(changeSetID, stackName interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "TemplateBodyFromChangeSet", reflect.TypeOf((*MockcfnClient)(nil).TemplateBodyFromChangeSet), changeSetID, stackName) } // Update mocks base method. func (m *MockcfnClient) Update(arg0 *cloudformation0.Stack) (string, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "Update", arg0) ret0, _ := ret[0].(string) ret1, _ := ret[1].(error) return ret0, ret1 } // Update indicates an expected call of Update. func (mr *MockcfnClientMockRecorder) Update(arg0 interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Update", reflect.TypeOf((*MockcfnClient)(nil).Update), arg0) } // UpdateAndWait mocks base method. func (m *MockcfnClient) UpdateAndWait(arg0 *cloudformation0.Stack) error { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "UpdateAndWait", arg0) ret0, _ := ret[0].(error) return ret0 } // UpdateAndWait indicates an expected call of UpdateAndWait. func (mr *MockcfnClientMockRecorder) UpdateAndWait(arg0 interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "UpdateAndWait", reflect.TypeOf((*MockcfnClient)(nil).UpdateAndWait), arg0) } // WaitForCreate mocks base method. func (m *MockcfnClient) WaitForCreate(ctx context.Context, stackName string) error { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "WaitForCreate", ctx, stackName) ret0, _ := ret[0].(error) return ret0 } // WaitForCreate indicates an expected call of WaitForCreate. func (mr *MockcfnClientMockRecorder) WaitForCreate(ctx, stackName interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "WaitForCreate", reflect.TypeOf((*MockcfnClient)(nil).WaitForCreate), ctx, stackName) } // WaitForUpdate mocks base method. func (m *MockcfnClient) WaitForUpdate(ctx context.Context, stackName string) error { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "WaitForUpdate", ctx, stackName) ret0, _ := ret[0].(error) return ret0 } // WaitForUpdate indicates an expected call of WaitForUpdate. func (mr *MockcfnClientMockRecorder) WaitForUpdate(ctx, stackName interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "WaitForUpdate", reflect.TypeOf((*MockcfnClient)(nil).WaitForUpdate), ctx, stackName) } // MockcodeStarClient is a mock of codeStarClient interface. type MockcodeStarClient struct { ctrl *gomock.Controller recorder *MockcodeStarClientMockRecorder } // MockcodeStarClientMockRecorder is the mock recorder for MockcodeStarClient. type MockcodeStarClientMockRecorder struct { mock *MockcodeStarClient } // NewMockcodeStarClient creates a new mock instance. func NewMockcodeStarClient(ctrl *gomock.Controller) *MockcodeStarClient { mock := &MockcodeStarClient{ctrl: ctrl} mock.recorder = &MockcodeStarClientMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockcodeStarClient) EXPECT() *MockcodeStarClientMockRecorder { return m.recorder } // WaitUntilConnectionStatusAvailable mocks base method. func (m *MockcodeStarClient) WaitUntilConnectionStatusAvailable(ctx context.Context, connectionARN string) error { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "WaitUntilConnectionStatusAvailable", ctx, connectionARN) ret0, _ := ret[0].(error) return ret0 } // WaitUntilConnectionStatusAvailable indicates an expected call of WaitUntilConnectionStatusAvailable. func (mr *MockcodeStarClientMockRecorder) WaitUntilConnectionStatusAvailable(ctx, connectionARN interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "WaitUntilConnectionStatusAvailable", reflect.TypeOf((*MockcodeStarClient)(nil).WaitUntilConnectionStatusAvailable), ctx, connectionARN) } // MockcodePipelineClient is a mock of codePipelineClient interface. type MockcodePipelineClient struct { ctrl *gomock.Controller recorder *MockcodePipelineClientMockRecorder } // MockcodePipelineClientMockRecorder is the mock recorder for MockcodePipelineClient. type MockcodePipelineClientMockRecorder struct { mock *MockcodePipelineClient } // NewMockcodePipelineClient creates a new mock instance. func NewMockcodePipelineClient(ctrl *gomock.Controller) *MockcodePipelineClient { mock := &MockcodePipelineClient{ctrl: ctrl} mock.recorder = &MockcodePipelineClientMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockcodePipelineClient) EXPECT() *MockcodePipelineClientMockRecorder { return m.recorder } // RetryStageExecution mocks base method. func (m *MockcodePipelineClient) RetryStageExecution(pipelineName, stageName string) error { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "RetryStageExecution", pipelineName, stageName) ret0, _ := ret[0].(error) return ret0 } // RetryStageExecution indicates an expected call of RetryStageExecution. func (mr *MockcodePipelineClientMockRecorder) RetryStageExecution(pipelineName, stageName interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "RetryStageExecution", reflect.TypeOf((*MockcodePipelineClient)(nil).RetryStageExecution), pipelineName, stageName) } // Mocks3Client is a mock of s3Client interface. type Mocks3Client struct { ctrl *gomock.Controller recorder *Mocks3ClientMockRecorder } // Mocks3ClientMockRecorder is the mock recorder for Mocks3Client. type Mocks3ClientMockRecorder struct { mock *Mocks3Client } // NewMocks3Client creates a new mock instance. func NewMocks3Client(ctrl *gomock.Controller) *Mocks3Client { mock := &Mocks3Client{ctrl: ctrl} mock.recorder = &Mocks3ClientMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *Mocks3Client) EXPECT() *Mocks3ClientMockRecorder { return m.recorder } // Upload mocks base method. func (m *Mocks3Client) Upload(bucket, fileName string, data io.Reader) (string, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "Upload", bucket, fileName, data) ret0, _ := ret[0].(string) ret1, _ := ret[1].(error) return ret0, ret1 } // Upload indicates an expected call of Upload. func (mr *Mocks3ClientMockRecorder) Upload(bucket, fileName, data interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Upload", reflect.TypeOf((*Mocks3Client)(nil).Upload), bucket, fileName, data) } // MockstackSetClient is a mock of stackSetClient interface. type MockstackSetClient struct { ctrl *gomock.Controller recorder *MockstackSetClientMockRecorder } // MockstackSetClientMockRecorder is the mock recorder for MockstackSetClient. type MockstackSetClientMockRecorder struct { mock *MockstackSetClient } // NewMockstackSetClient creates a new mock instance. func NewMockstackSetClient(ctrl *gomock.Controller) *MockstackSetClient { mock := &MockstackSetClient{ctrl: ctrl} mock.recorder = &MockstackSetClientMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockstackSetClient) EXPECT() *MockstackSetClientMockRecorder { return m.recorder } // Create mocks base method. func (m *MockstackSetClient) Create(name, template string, opts ...stackset.CreateOrUpdateOption) error { m.ctrl.T.Helper() varargs := []interface{}{name, template} for _, a := range opts { varargs = append(varargs, a) } ret := m.ctrl.Call(m, "Create", varargs...) ret0, _ := ret[0].(error) return ret0 } // Create indicates an expected call of Create. func (mr *MockstackSetClientMockRecorder) Create(name, template interface{}, opts ...interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() varargs := append([]interface{}{name, template}, opts...) return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Create", reflect.TypeOf((*MockstackSetClient)(nil).Create), varargs...) } // CreateInstances mocks base method. func (m *MockstackSetClient) CreateInstances(name string, accounts, regions []string) (string, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "CreateInstances", name, accounts, regions) ret0, _ := ret[0].(string) ret1, _ := ret[1].(error) return ret0, ret1 } // CreateInstances indicates an expected call of CreateInstances. func (mr *MockstackSetClientMockRecorder) CreateInstances(name, accounts, regions interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "CreateInstances", reflect.TypeOf((*MockstackSetClient)(nil).CreateInstances), name, accounts, regions) } // CreateInstancesAndWait mocks base method. func (m *MockstackSetClient) CreateInstancesAndWait(name string, accounts, regions []string) error { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "CreateInstancesAndWait", name, accounts, regions) ret0, _ := ret[0].(error) return ret0 } // CreateInstancesAndWait indicates an expected call of CreateInstancesAndWait. func (mr *MockstackSetClientMockRecorder) CreateInstancesAndWait(name, accounts, regions interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "CreateInstancesAndWait", reflect.TypeOf((*MockstackSetClient)(nil).CreateInstancesAndWait), name, accounts, regions) } // Delete mocks base method. func (m *MockstackSetClient) Delete(name string) error { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "Delete", name) ret0, _ := ret[0].(error) return ret0 } // Delete indicates an expected call of Delete. func (mr *MockstackSetClientMockRecorder) Delete(name interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Delete", reflect.TypeOf((*MockstackSetClient)(nil).Delete), name) } // DeleteAllInstances mocks base method. func (m *MockstackSetClient) DeleteAllInstances(name string) (string, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "DeleteAllInstances", name) ret0, _ := ret[0].(string) ret1, _ := ret[1].(error) return ret0, ret1 } // DeleteAllInstances indicates an expected call of DeleteAllInstances. func (mr *MockstackSetClientMockRecorder) DeleteAllInstances(name interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DeleteAllInstances", reflect.TypeOf((*MockstackSetClient)(nil).DeleteAllInstances), name) } // Describe mocks base method. func (m *MockstackSetClient) Describe(name string) (stackset.Description, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "Describe", name) ret0, _ := ret[0].(stackset.Description) ret1, _ := ret[1].(error) return ret0, ret1 } // Describe indicates an expected call of Describe. func (mr *MockstackSetClientMockRecorder) Describe(name interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Describe", reflect.TypeOf((*MockstackSetClient)(nil).Describe), name) } // DescribeOperation mocks base method. func (m *MockstackSetClient) DescribeOperation(name, opID string) (stackset.Operation, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "DescribeOperation", name, opID) ret0, _ := ret[0].(stackset.Operation) ret1, _ := ret[1].(error) return ret0, ret1 } // DescribeOperation indicates an expected call of DescribeOperation. func (mr *MockstackSetClientMockRecorder) DescribeOperation(name, opID interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DescribeOperation", reflect.TypeOf((*MockstackSetClient)(nil).DescribeOperation), name, opID) } // InstanceSummaries mocks base method. func (m *MockstackSetClient) InstanceSummaries(name string, opts ...stackset.InstanceSummariesOption) ([]stackset.InstanceSummary, error) { m.ctrl.T.Helper() varargs := []interface{}{name} for _, a := range opts { varargs = append(varargs, a) } ret := m.ctrl.Call(m, "InstanceSummaries", varargs...) ret0, _ := ret[0].([]stackset.InstanceSummary) ret1, _ := ret[1].(error) return ret0, ret1 } // InstanceSummaries indicates an expected call of InstanceSummaries. func (mr *MockstackSetClientMockRecorder) InstanceSummaries(name interface{}, opts ...interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() varargs := append([]interface{}{name}, opts...) return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "InstanceSummaries", reflect.TypeOf((*MockstackSetClient)(nil).InstanceSummaries), varargs...) } // Update mocks base method. func (m *MockstackSetClient) Update(name, template string, opts ...stackset.CreateOrUpdateOption) (string, error) { m.ctrl.T.Helper() varargs := []interface{}{name, template} for _, a := range opts { varargs = append(varargs, a) } ret := m.ctrl.Call(m, "Update", varargs...) ret0, _ := ret[0].(string) ret1, _ := ret[1].(error) return ret0, ret1 } // Update indicates an expected call of Update. func (mr *MockstackSetClientMockRecorder) Update(name, template interface{}, opts ...interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() varargs := append([]interface{}{name, template}, opts...) return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Update", reflect.TypeOf((*MockstackSetClient)(nil).Update), varargs...) } // UpdateAndWait mocks base method. func (m *MockstackSetClient) UpdateAndWait(name, template string, opts ...stackset.CreateOrUpdateOption) error { m.ctrl.T.Helper() varargs := []interface{}{name, template} for _, a := range opts { varargs = append(varargs, a) } ret := m.ctrl.Call(m, "UpdateAndWait", varargs...) ret0, _ := ret[0].(error) return ret0 } // UpdateAndWait indicates an expected call of UpdateAndWait. func (mr *MockstackSetClientMockRecorder) UpdateAndWait(name, template interface{}, opts ...interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() varargs := append([]interface{}{name, template}, opts...) return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "UpdateAndWait", reflect.TypeOf((*MockstackSetClient)(nil).UpdateAndWait), varargs...) } // WaitForOperation mocks base method. func (m *MockstackSetClient) WaitForOperation(name, opID string) error { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "WaitForOperation", name, opID) ret0, _ := ret[0].(error) return ret0 } // WaitForOperation indicates an expected call of WaitForOperation. func (mr *MockstackSetClientMockRecorder) WaitForOperation(name, opID interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "WaitForOperation", reflect.TypeOf((*MockstackSetClient)(nil).WaitForOperation), name, opID) } // WaitForStackSetLastOperationComplete mocks base method. func (m *MockstackSetClient) WaitForStackSetLastOperationComplete(name string) error { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "WaitForStackSetLastOperationComplete", name) ret0, _ := ret[0].(error) return ret0 } // WaitForStackSetLastOperationComplete indicates an expected call of WaitForStackSetLastOperationComplete. func (mr *MockstackSetClientMockRecorder) WaitForStackSetLastOperationComplete(name interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "WaitForStackSetLastOperationComplete", reflect.TypeOf((*MockstackSetClient)(nil).WaitForStackSetLastOperationComplete), name) }
878
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package stack import ( "fmt" "sort" "strings" "github.com/aws/aws-sdk-go/aws" "github.com/aws/aws-sdk-go/service/cloudformation" "gopkg.in/yaml.v3" "github.com/aws/copilot-cli/internal/pkg/aws/ecr" "github.com/aws/copilot-cli/internal/pkg/aws/partitions" "github.com/aws/copilot-cli/internal/pkg/deploy" "github.com/aws/copilot-cli/internal/pkg/template" ) // DeployedAppMetadata wraps the Metadata field of a deployed // application StackSet. type DeployedAppMetadata struct { Metadata AppResources `yaml:"Metadata"` } // AppResources is a configuration for a deployed Application StackSet. type AppResources struct { AppResourcesConfig `yaml:",inline"` } // AppResourcesConfig is a configuration for a deployed Application StackSet. type AppResourcesConfig struct { Accounts []string `yaml:"Accounts"` Services []string `yaml:"Services"` // Deprecated since v1.2.0: Use Workloads instead of Services. Workloads []AppResourcesWorkload `yaml:"Workloads"` App string `yaml:"App"` Version int `yaml:"Version"` } // AppResourcesWorkload is a workload configuration for a deployed Application StackSet type AppResourcesWorkload struct { Name string `yaml:"Name"` WithECR bool `yaml:"WithECR"` } // UnmarshalYAML overrides the default YAML unmarshaling logic for the Image // struct, allowing it to perform more complex unmarshaling behavior. // This method implements the yaml.Unmarshaler (v3) interface. func (s *AppResources) UnmarshalYAML(value *yaml.Node) error { if err := value.Decode(&s.AppResourcesConfig); err != nil { return err } for _, svc := range s.AppResourcesConfig.Services { s.AppResourcesConfig.Workloads = append(s.AppResourcesConfig.Workloads, AppResourcesWorkload{ Name: svc, WithECR: true, }) } s.Services = nil return nil } // AppStackConfig is for providing all the values to set up an // environment stack and to interpret the outputs from it. type AppStackConfig struct { *deploy.CreateAppInput parser template.ReadParser } // AppRegionalResources represent application resources that are regional. type AppRegionalResources struct { Region string // The region these resources are in. KMSKeyARN string // A KMS Key ARN for encrypting Pipeline artifacts. S3Bucket string // A bucket used for any Copilot artifacts that must be stored in S3 (pipelines, env files, etc). RepositoryURLs map[string]string // The image repository URLs by service name. } const ( appTemplatePath = "app/app.yml" appResourcesTemplatePath = "app/cf.yml" appAdminRoleParamName = "AdminRoleName" appExecutionRoleParamName = "ExecutionRoleName" appDNSDelegationRoleParamName = "DNSDelegationRoleName" appOutputKMSKey = "KMSKeyARN" // Name of the CloudFormation Output that holds the KMS Key ARN to encrypt artifact buckets. appOutputS3Bucket = "PipelineBucket" // Name of the CloudFormation Output that holds the Artifact Bucket name. appOutputECRRepoPrefix = "ECRRepo" // Prefix of the CloudFormation Output name that holds the ECR image repository ARN for each service. appDNSDelegatedAccountsKey = "AppDNSDelegatedAccounts" appDomainNameKey = "AppDomainName" appDomainHostedZoneIDKey = "AppDomainHostedZoneID" appNameKey = "AppName" // arn:${partition}:iam::${account}:role/${roleName} fmtStackSetAdminRoleARN = "arn:%s:iam::%s:role/%s" ) var cfTemplateFunctions = map[string]interface{}{ "logicalIDSafe": template.ReplaceDashesFunc, } // AppConfigFrom takes a template file and extracts the metadata block, // and parses it into an AppStackConfig func AppConfigFrom(template *string) (*AppResourcesConfig, error) { resourceConfig := DeployedAppMetadata{} err := yaml.Unmarshal([]byte(*template), &resourceConfig) return &resourceConfig.Metadata.AppResourcesConfig, err } // NewAppStackConfig sets up a struct which can provide values to CloudFormation for // spinning up an environment. func NewAppStackConfig(in *deploy.CreateAppInput) *AppStackConfig { return &AppStackConfig{ CreateAppInput: in, parser: template.New(), } } // Template returns the application CloudFormation template. func (c *AppStackConfig) Template() (string, error) { content, err := c.parser.Parse(appTemplatePath, struct { TemplateVersion string AppDNSDelegatedAccounts []string Domain string Name string PermissionsBoundary string }{ c.Version, c.dnsDelegationAccounts(), c.DomainName, c.Name, c.PermissionsBoundary, }, template.WithFuncs(map[string]any{ "join": strings.Join, })) if err != nil { return "", err } return content.String(), nil } // ResourceTemplate generates a StackSet template with all the Application-wide resources (ECR Repos, KMS keys, S3 buckets) func (c *AppStackConfig) ResourceTemplate(config *AppResourcesConfig) (string, error) { // Sort the account IDs and Services so that the template we generate is deterministic sort.Strings(config.Accounts) sort.SliceStable(config.Workloads, func(i, j int) bool { return config.Workloads[i].Name < config.Workloads[j].Name }) content, err := c.parser.Parse(appResourcesTemplatePath, struct { *AppResourcesConfig ServiceTagKey string TemplateVersion string }{ config, deploy.ServiceTagKey, c.Version, }, template.WithFuncs(cfTemplateFunctions)) if err != nil { return "", err } return content.String(), err } // Parameters returns a list of parameters which accompany the app CloudFormation template. func (c *AppStackConfig) Parameters() ([]*cloudformation.Parameter, error) { return []*cloudformation.Parameter{ { ParameterKey: aws.String(appAdminRoleParamName), ParameterValue: aws.String(c.stackSetAdminRoleName()), }, { ParameterKey: aws.String(appExecutionRoleParamName), ParameterValue: aws.String(c.StackSetExecutionRoleName()), }, { ParameterKey: aws.String(appDNSDelegatedAccountsKey), ParameterValue: aws.String(strings.Join(c.dnsDelegationAccounts(), ",")), }, { ParameterKey: aws.String(appDomainNameKey), ParameterValue: aws.String(c.DomainName), }, { ParameterKey: aws.String(appDomainHostedZoneIDKey), ParameterValue: aws.String(c.DomainHostedZoneID), }, { ParameterKey: aws.String(appNameKey), ParameterValue: aws.String(c.Name), }, { ParameterKey: aws.String(appDNSDelegationRoleParamName), ParameterValue: aws.String(deploy.DNSDelegationRoleName(c.Name)), }, }, nil } // SerializedParameters returns the CloudFormation stack's parameters serialized to a JSON document. func (s *AppStackConfig) SerializedParameters() (string, error) { // No-op for now. return "", nil } // Tags returns the tags that should be applied to the Application CloudFormation stack. func (c *AppStackConfig) Tags() []*cloudformation.Tag { return mergeAndFlattenTags(c.AdditionalTags, map[string]string{ deploy.AppTagKey: c.Name, }) } // StackName returns the name of the CloudFormation stack (based on the application name). func (c *AppStackConfig) StackName() string { return NameForAppStack(c.Name) } // StackSetName returns the name of the CloudFormation StackSet (based on the application name). func (c *AppStackConfig) StackSetName() string { return NameForAppStackSet(c.Name) } // StackSetDescription returns the description of the StackSet for application resources. func (c *AppStackConfig) StackSetDescription() string { return "ECS CLI Application Resources (ECR repos, KMS keys, S3 buckets)" } func (c *AppStackConfig) stackSetAdminRoleName() string { return fmt.Sprintf("%s-adminrole", c.Name) } // StackSetAdminRoleARN returns the role ARN of the role used to administer the Application // StackSet. func (c *AppStackConfig) StackSetAdminRoleARN(region string) (string, error) { partition, err := partitions.Region(region).Partition() if err != nil { return "", err } return fmt.Sprintf(fmtStackSetAdminRoleARN, partition.ID(), c.AccountID, c.stackSetAdminRoleName()), nil } // StackSetExecutionRoleName returns the role name of the role used to actually create // Application resources. func (c *AppStackConfig) StackSetExecutionRoleName() string { return fmt.Sprintf("%s-executionrole", c.Name) } func (c *AppStackConfig) dnsDelegationAccounts() []string { accounts := append(c.CreateAppInput.DNSDelegationAccounts, c.CreateAppInput.AccountID) accountIDs := make(map[string]bool) var uniqueAccountIDs []string for _, entry := range accounts { if _, value := accountIDs[entry]; !value { accountIDs[entry] = true uniqueAccountIDs = append(uniqueAccountIDs, entry) } } return uniqueAccountIDs } // ToAppRegionalResources takes an Application Resource Stack Instance stack, reads the output resources // and returns a modeled ProjectRegionalResources. func ToAppRegionalResources(stack *cloudformation.Stack) (*AppRegionalResources, error) { regionalResources := AppRegionalResources{ RepositoryURLs: map[string]string{}, } for _, output := range stack.Outputs { key := *output.OutputKey value := *output.OutputValue switch { case key == appOutputKMSKey: regionalResources.KMSKeyARN = value case key == appOutputS3Bucket: regionalResources.S3Bucket = value case strings.HasPrefix(key, appOutputECRRepoPrefix): // If the output starts with the ECR Repo Prefix, // we'll pull the ARN out and construct a URL from it. uri, err := ecr.URIFromARN(value) if err != nil { return nil, err } // The service name for this repo is the Logical ID without // the ECR Repo prefix. safeSvcName := strings.TrimPrefix(key, appOutputECRRepoPrefix) // It's possible we had to sanitize the service name (removing dashes), // so return it back to its original form. originalSvcName := template.DashReplacedLogicalIDToOriginal(safeSvcName) regionalResources.RepositoryURLs[originalSvcName] = uri } } // Check to make sure the KMS key and S3 bucket exist in the stack. There isn't guranteed // to be any ECR repos (for a brand new env without any services), so we don't validate that. if regionalResources.KMSKeyARN == "" { return nil, fmt.Errorf("couldn't find KMS output key %s in stack %s", appOutputKMSKey, *stack.StackId) } if regionalResources.S3Bucket == "" { return nil, fmt.Errorf("couldn't find S3 bucket output key %s in stack %s", appOutputS3Bucket, *stack.StackId) } return &regionalResources, nil } // DNSDelegatedAccountsForStack looks through a stack's parameters for // the parameter which stores the comma seperated list of account IDs // which are permitted for DNS delegation. func DNSDelegatedAccountsForStack(stack *cloudformation.Stack) []string { for _, parameter := range stack.Parameters { if *parameter.ParameterKey == appDNSDelegatedAccountsKey { return strings.Split(*parameter.ParameterValue, ",") } } return []string{} }
315
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package stack import ( "bytes" "errors" "fmt" "testing" "github.com/aws/aws-sdk-go/aws" "github.com/aws/aws-sdk-go/service/cloudformation" "github.com/aws/copilot-cli/internal/pkg/deploy" "github.com/aws/copilot-cli/internal/pkg/template" "github.com/aws/copilot-cli/internal/pkg/template/mocks" "github.com/golang/mock/gomock" "github.com/stretchr/testify/require" "gopkg.in/yaml.v3" ) const ( mockTemplate = "mockTemplate" ) func TestAppTemplate(t *testing.T) { testCases := map[string]struct { inVersion string mockDependencies func(ctrl *gomock.Controller, c *AppStackConfig) wantedTemplate string wantedError error }{ "should return error given template not found": { mockDependencies: func(ctrl *gomock.Controller, c *AppStackConfig) { m := mocks.NewMockReadParser(ctrl) m.EXPECT().Parse(gomock.Any(), gomock.Any(), gomock.Any()).Return(nil, errors.New("some error")) c.parser = m }, wantedError: errors.New("some error"), }, "success": { inVersion: "v1.0.0", mockDependencies: func(ctrl *gomock.Controller, c *AppStackConfig) { m := mocks.NewMockReadParser(ctrl) m.EXPECT().Parse(appTemplatePath, struct { TemplateVersion string AppDNSDelegatedAccounts []string Domain string Name string PermissionsBoundary string }{ "v1.0.0", []string{"123456"}, "", "demo", "", }, gomock.Any()).Return(&template.Content{ Buffer: bytes.NewBufferString("template"), }, nil) c.parser = m }, wantedTemplate: "template", }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { // GIVEN ctrl := gomock.NewController(t) defer ctrl.Finish() appStack := &AppStackConfig{ CreateAppInput: &deploy.CreateAppInput{ Version: tc.inVersion, AccountID: "123456", Name: "demo", DomainName: "", PermissionsBoundary: "", }, } tc.mockDependencies(ctrl, appStack) // WHEN got, err := appStack.Template() // THEN require.Equal(t, tc.wantedError, err) require.Equal(t, tc.wantedTemplate, got) }) } } func TestDNSDelegationAccounts(t *testing.T) { testCases := map[string]struct { given *deploy.CreateAppInput want []string }{ "should append app account": { given: &deploy.CreateAppInput{ AccountID: "1234", }, want: []string{"1234"}, }, "should ignore duplicates": { given: &deploy.CreateAppInput{ AccountID: "1234", DNSDelegationAccounts: []string{"1234"}, }, want: []string{"1234"}, }, "should return a set": { given: &deploy.CreateAppInput{ AccountID: "1234", DNSDelegationAccounts: []string{"4567"}, }, want: []string{"1234", "4567"}, }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { appStack := &AppStackConfig{ CreateAppInput: tc.given, } got := appStack.dnsDelegationAccounts() require.ElementsMatch(t, tc.want, got) }) } } func TestAppResourceTemplate(t *testing.T) { testCases := map[string]struct { given *AppResourcesConfig mockDependencies func(ctrl *gomock.Controller, c *AppStackConfig) wantedTemplate string wantedError error }{ "should return error when template cannot be parsed": { given: &AppResourcesConfig{}, mockDependencies: func(ctrl *gomock.Controller, c *AppStackConfig) { m := mocks.NewMockReadParser(ctrl) m.EXPECT().Parse(gomock.Any(), gomock.Any(), gomock.Any()).Return(nil, errors.New("some error")) c.parser = m }, wantedError: errors.New("some error"), }, "should render template after sorting": { given: &AppResourcesConfig{ Accounts: []string{"4567", "1234"}, Workloads: []AppResourcesWorkload{ {Name: "svc-2"}, {Name: "svc-1"}, }, Version: 1, App: "testapp", }, mockDependencies: func(ctrl *gomock.Controller, c *AppStackConfig) { m := mocks.NewMockReadParser(ctrl) m.EXPECT().Parse(appResourcesTemplatePath, struct { *AppResourcesConfig ServiceTagKey string TemplateVersion string }{ &AppResourcesConfig{ Accounts: []string{"1234", "4567"}, Workloads: []AppResourcesWorkload{ {Name: "svc-1"}, {Name: "svc-2"}, }, Version: 1, App: "testapp", }, deploy.ServiceTagKey, "", }, gomock.Any()).Return(&template.Content{ Buffer: bytes.NewBufferString("template"), }, nil) c.parser = m }, wantedTemplate: "template", }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { ctrl := gomock.NewController(t) defer ctrl.Finish() appStack := &AppStackConfig{ CreateAppInput: &deploy.CreateAppInput{Name: "testapp", AccountID: "1234"}, } tc.mockDependencies(ctrl, appStack) got, err := appStack.ResourceTemplate(tc.given) require.Equal(t, tc.wantedError, err) require.Equal(t, tc.wantedTemplate, got) }) } } func TestAppParameters(t *testing.T) { expectedParams := []*cloudformation.Parameter{ { ParameterKey: aws.String(appAdminRoleParamName), ParameterValue: aws.String("testapp-adminrole"), }, { ParameterKey: aws.String(appExecutionRoleParamName), ParameterValue: aws.String("testapp-executionrole"), }, { ParameterKey: aws.String(appDNSDelegatedAccountsKey), ParameterValue: aws.String("1234"), }, { ParameterKey: aws.String(appDomainNameKey), ParameterValue: aws.String("amazon.com"), }, { ParameterKey: aws.String(appDomainHostedZoneIDKey), ParameterValue: aws.String("mockHostedZoneID"), }, { ParameterKey: aws.String(appDNSDelegationRoleParamName), ParameterValue: aws.String("testapp-DNSDelegationRole"), }, { ParameterKey: aws.String(appNameKey), ParameterValue: aws.String("testapp"), }, } app := &AppStackConfig{ CreateAppInput: &deploy.CreateAppInput{Name: "testapp", AccountID: "1234", DomainName: "amazon.com", DomainHostedZoneID: "mockHostedZoneID"}, } params, _ := app.Parameters() require.ElementsMatch(t, expectedParams, params) } func TestAppTags(t *testing.T) { app := &AppStackConfig{ CreateAppInput: &deploy.CreateAppInput{ Name: "testapp", AccountID: "1234", AdditionalTags: map[string]string{ "confidentiality": "public", "owner": "finance", deploy.AppTagKey: "overrideapp", }, }, } expectedTags := []*cloudformation.Tag{ { Key: aws.String(deploy.AppTagKey), Value: aws.String(app.Name), }, { Key: aws.String("confidentiality"), Value: aws.String("public"), }, { Key: aws.String("owner"), Value: aws.String("finance"), }, } require.ElementsMatch(t, expectedTags, app.Tags()) } func TestToRegionalResources(t *testing.T) { testCases := map[string]struct { givenStackOutputs map[string]string wantedResource AppRegionalResources wantedErr error }{ "should generate fully formed resource": { givenStackOutputs: map[string]string{ appOutputKMSKey: "arn:aws:kms:us-west-2:01234567890:key/0000", appOutputS3Bucket: "tests3-bucket-us-west-2", "ECRRepofrontDASHend": "arn:aws:ecr:us-west-2:0123456789:repository/app/front-end", "ECRRepobackDASHend": "arn:aws:ecr:us-west-2:0123456789:repository/app/back-end", }, wantedResource: AppRegionalResources{ KMSKeyARN: "arn:aws:kms:us-west-2:01234567890:key/0000", S3Bucket: "tests3-bucket-us-west-2", RepositoryURLs: map[string]string{ "front-end": "0123456789.dkr.ecr.us-west-2.amazonaws.com/app/front-end", "back-end": "0123456789.dkr.ecr.us-west-2.amazonaws.com/app/back-end", }, }, }, "should return error when no bucket exists": { givenStackOutputs: map[string]string{ appOutputKMSKey: "arn:aws:kms:us-west-2:01234567890:key/0000", "ECRRepofrontDASHend": "arn:aws:ecr:us-west-2:0123456789:repository/app/front-end", "ECRRepobackDASHend": "arn:aws:ecr:us-west-2:0123456789:repository/app/back-end", }, wantedErr: fmt.Errorf("couldn't find S3 bucket output key PipelineBucket in stack stack"), }, "should return error when no kms key exists": { givenStackOutputs: map[string]string{ appOutputS3Bucket: "tests3-bucket-us-west-2", "ECRRepofrontDASHend": "arn:aws:ecr:us-west-2:0123456789:repository/app/front-end", "ECRRepobackDASHend": "arn:aws:ecr:us-west-2:0123456789:repository/app/back-end", }, wantedErr: fmt.Errorf("couldn't find KMS output key KMSKeyARN in stack stack"), }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { got, err := ToAppRegionalResources(mockAppResourceStack("stack", tc.givenStackOutputs)) if tc.wantedErr != nil { require.EqualError(t, tc.wantedErr, err.Error()) } else { require.NoError(t, err) require.Equal(t, tc.wantedResource, *got) } }) } } func TestDNSDelegatedAccountsForStack(t *testing.T) { testCases := map[string]struct { given map[string]string want []string }{ "should read from parameter and parse comma seperated list": { given: map[string]string{ appDNSDelegatedAccountsKey: "1234,5678", }, want: []string{"1234", "5678"}, }, "should return empty when no field is found": { given: map[string]string{ "not a real field": "ok", }, want: []string{}, }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { got := DNSDelegatedAccountsForStack(mockAppRolesStack("stack", tc.given)) require.ElementsMatch(t, tc.want, got) }) } } func mockAppResourceStack(stackArn string, outputs map[string]string) *cloudformation.Stack { outputList := []*cloudformation.Output{} for key, val := range outputs { outputList = append(outputList, &cloudformation.Output{ OutputKey: aws.String(key), OutputValue: aws.String(val), }) } return &cloudformation.Stack{ StackId: aws.String(stackArn), Outputs: outputList, } } func mockAppRolesStack(stackArn string, parameters map[string]string) *cloudformation.Stack { parameterList := []*cloudformation.Parameter{} for key, val := range parameters { parameterList = append(parameterList, &cloudformation.Parameter{ ParameterKey: aws.String(key), ParameterValue: aws.String(val), }) } return &cloudformation.Stack{ StackId: aws.String(stackArn), Parameters: parameterList, } } func TestAppStackName(t *testing.T) { app := &AppStackConfig{ CreateAppInput: &deploy.CreateAppInput{Name: "testapp", AccountID: "1234"}, } require.Equal(t, fmt.Sprintf("%s-infrastructure-roles", app.Name), app.StackName()) } func TestAppStackSetName(t *testing.T) { app := &AppStackConfig{ CreateAppInput: &deploy.CreateAppInput{Name: "testapp", AccountID: "1234"}, } require.Equal(t, fmt.Sprintf("%s-infrastructure", app.Name), app.StackSetName()) } func TestTemplateToAppConfig(t *testing.T) { given := `AWSTemplateFormatVersion: '2010-09-09' Description: Cross-regional resources to support the CodePipeline for a workspace Metadata: Version: 7 Services: - testsvc1 - testsvc2 Accounts: - 0000000000 ` config, err := AppConfigFrom(&given) require.NoError(t, err) require.Equal(t, AppResourcesConfig{ Accounts: []string{"0000000000"}, Version: 7, Workloads: []AppResourcesWorkload{ {Name: "testsvc1", WithECR: true}, {Name: "testsvc2", WithECR: true}, }, }, *config) } func TestAppResourcesService_UnmarshalYAML(t *testing.T) { testCases := map[string]struct { in []byte wanted AppResourcesConfig wantedError error }{ "unmarshal legacy service config": { in: []byte(`Services: - frontend - backend TemplateVersion: 'v1.1.0' Version: 6 App: demo Accounts: - 1234567890`), wanted: AppResourcesConfig{ Workloads: []AppResourcesWorkload{ {Name: "frontend", WithECR: true}, {Name: "backend", WithECR: true}, }, Accounts: []string{"1234567890"}, Version: 6, App: "demo", }, }, "unmarshal new service config": { in: []byte(`Workloads: - Name: frontend WithECR: true - Name: backend WithECR: false TemplateVersion: 'v1.1.0' Version: 6 App: demo Accounts: - 1234567890`), wanted: AppResourcesConfig{ Workloads: []AppResourcesWorkload{ {Name: "frontend", WithECR: true}, {Name: "backend", WithECR: false}, }, Accounts: []string{"1234567890"}, Version: 6, App: "demo", }, }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { var s AppResources err := yaml.Unmarshal(tc.in, &s) if tc.wantedError != nil { require.EqualError(t, err, tc.wantedError.Error()) } else { require.NoError(t, err) require.Equal(t, tc.wanted, s.AppResourcesConfig) } }) } }
481
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package stack import ( "fmt" "strconv" "strings" "github.com/aws/aws-sdk-go/aws" "github.com/aws/aws-sdk-go/service/cloudformation" "github.com/aws/copilot-cli/internal/pkg/config" "github.com/aws/copilot-cli/internal/pkg/deploy/upload/customresource" "github.com/aws/copilot-cli/internal/pkg/manifest" "github.com/aws/copilot-cli/internal/pkg/manifest/manifestinfo" "github.com/aws/copilot-cli/internal/pkg/template" "github.com/aws/copilot-cli/internal/pkg/template/override" ) // BackendService represents the configuration needed to create a CloudFormation stack from a backend service manifest. type BackendService struct { *ecsWkld manifest *manifest.BackendService httpsEnabled bool albEnabled bool parser backendSvcReadParser } // BackendServiceConfig contains data required to initialize a backend service stack. type BackendServiceConfig struct { App *config.Application EnvManifest *manifest.Environment Manifest *manifest.BackendService ArtifactBucketName string RawManifest []byte // Content of the manifest file without any transformations. RuntimeConfig RuntimeConfig Addons NestedStackConfigurer } // NewBackendService creates a new BackendService stack from a manifest file. func NewBackendService(conf BackendServiceConfig) (*BackendService, error) { crs, err := customresource.Backend(fs) if err != nil { return nil, fmt.Errorf("backend service custom resources: %w", err) } conf.RuntimeConfig.loadCustomResourceURLs(conf.ArtifactBucketName, uploadableCRs(crs).convert()) b := &BackendService{ ecsWkld: &ecsWkld{ wkld: &wkld{ name: aws.StringValue(conf.Manifest.Name), env: aws.StringValue(conf.EnvManifest.Name), app: conf.App.Name, permBound: conf.App.PermissionsBoundary, artifactBucketName: conf.ArtifactBucketName, rc: conf.RuntimeConfig, image: conf.Manifest.ImageConfig.Image, rawManifest: conf.RawManifest, parser: fs, addons: conf.Addons, }, logging: conf.Manifest.Logging, sidecars: conf.Manifest.Sidecars, tc: conf.Manifest.TaskConfig, taskDefOverrideFunc: override.CloudFormationTemplate, }, manifest: conf.Manifest, parser: fs, albEnabled: !conf.Manifest.HTTP.IsEmpty(), } if len(conf.EnvManifest.HTTPConfig.Private.Certificates) != 0 { b.httpsEnabled = b.albEnabled } return b, nil } // Template returns the CloudFormation template for the backend service. func (s *BackendService) Template() (string, error) { crs, err := convertCustomResources(s.rc.CustomResourcesURL) if err != nil { return "", err } addonsParams, err := s.addonsParameters() if err != nil { return "", err } addonsOutputs, err := s.addonsOutputs() if err != nil { return "", err } exposedPorts, err := s.manifest.ExposedPorts() if err != nil { return "", fmt.Errorf("parse exposed ports in service manifest %s: %w", s.name, err) } sidecars, err := convertSidecars(s.manifest.Sidecars, exposedPorts.PortsForContainer, s.rc) if err != nil { return "", fmt.Errorf("convert the sidecar configuration for service %s: %w", s.name, err) } publishers, err := convertPublish(s.manifest.Publish(), s.rc.AccountID, s.rc.Region, s.app, s.env, s.name) if err != nil { return "", fmt.Errorf(`convert "publish" field for service %s: %w`, s.name, err) } advancedCount, err := convertAdvancedCount(s.manifest.Count.AdvancedCount) if err != nil { return "", fmt.Errorf("convert the advanced count configuration for service %s: %w", s.name, err) } var autoscaling *template.AutoscalingOpts var desiredCountOnSpot *int var capacityProviders []*template.CapacityProviderStrategy if advancedCount != nil { autoscaling = advancedCount.Autoscaling desiredCountOnSpot = advancedCount.Spot capacityProviders = advancedCount.Cps } entrypoint, err := convertEntryPoint(s.manifest.EntryPoint) if err != nil { return "", err } command, err := convertCommand(s.manifest.Command) if err != nil { return "", err } var scConfig *template.ServiceConnect if s.manifest.Network.Connect.Enabled() { scConfig = convertServiceConnect(s.manifest.Network.Connect) } targetContainer, targetContainerPort, err := s.manifest.HTTP.Main.Target(exposedPorts) if err != nil { return "", err } albListenerConfig, err := s.convertALBListener() if err != nil { return "", err } content, err := s.parser.ParseBackendService(template.WorkloadOpts{ // Workload parameters. AppName: s.app, EnvName: s.env, EnvVersion: s.rc.EnvVersion, SerializedManifest: string(s.rawManifest), WorkloadType: manifestinfo.BackendServiceType, WorkloadName: s.name, // Configuration for the main container. EntryPoint: entrypoint, Command: command, HealthCheck: convertContainerHealthCheck(s.manifest.BackendServiceConfig.ImageConfig.HealthCheck), PortMappings: convertPortMappings(exposedPorts.PortsForContainer[s.name]), Secrets: convertSecrets(s.manifest.BackendServiceConfig.Secrets), Variables: convertEnvVars(s.manifest.BackendServiceConfig.Variables), // Additional options that are common between **all** workload templates. AddonsExtraParams: addonsParams, Autoscaling: autoscaling, CapacityProviders: capacityProviders, CredentialsParameter: aws.StringValue(s.manifest.ImageConfig.Image.Credentials), DeploymentConfiguration: convertDeploymentConfig(s.manifest.DeployConfig), DesiredCountOnSpot: desiredCountOnSpot, DependsOn: convertDependsOn(s.manifest.ImageConfig.Image.DependsOn), DockerLabels: s.manifest.ImageConfig.Image.DockerLabels, ExecuteCommand: convertExecuteCommand(&s.manifest.ExecuteCommand), LogConfig: convertLogging(s.manifest.Logging), NestedStack: addonsOutputs, Network: convertNetworkConfig(s.manifest.Network), Publish: publishers, PermissionsBoundary: s.permBound, Platform: convertPlatform(s.manifest.Platform), Storage: convertStorageOpts(s.manifest.Name, s.manifest.Storage), // ALB configs. ALBEnabled: s.albEnabled, HTTPTargetContainer: template.HTTPTargetContainer{ Port: targetContainerPort, Name: targetContainer, }, GracePeriod: s.convertGracePeriod(), ALBListener: albListenerConfig, // Custom Resource Config. CustomResources: crs, // Sidecar config. Sidecars: sidecars, // service connect and service discovery options. ServiceConnect: scConfig, ServiceDiscoveryEndpoint: s.rc.ServiceDiscoveryEndpoint, // Additional options for request driven web service templates. Observability: template.ObservabilityOpts{ Tracing: strings.ToUpper(aws.StringValue(s.manifest.Observability.Tracing)), }, }) if err != nil { return "", fmt.Errorf("parse backend service template: %w", err) } overriddenTpl, err := s.taskDefOverrideFunc(convertTaskDefOverrideRules(s.manifest.TaskDefOverrides), content.Bytes()) if err != nil { return "", fmt.Errorf("apply task definition overrides: %w", err) } return string(overriddenTpl), nil } // Parameters returns the list of CloudFormation parameters used by the template. func (s *BackendService) Parameters() ([]*cloudformation.Parameter, error) { params, err := s.ecsWkld.Parameters() if err != nil { return nil, err } exposedPorts, err := s.manifest.ExposedPorts() if err != nil { return nil, fmt.Errorf("parse exposed ports in service manifest %s: %w", s.name, err) } targetContainer, targetPort, err := s.manifest.HTTP.Main.Target(exposedPorts) if err != nil { return nil, err } if targetPort == "" { targetPort = s.manifest.MainContainerPort() } params = append(params, []*cloudformation.Parameter{ { ParameterKey: aws.String(WorkloadContainerPortParamKey), ParameterValue: aws.String(s.manifest.MainContainerPort()), }, { ParameterKey: aws.String(WorkloadTargetContainerParamKey), ParameterValue: aws.String(targetContainer), }, { ParameterKey: aws.String(WorkloadTargetPortParamKey), ParameterValue: aws.String(targetPort), }, }...) if !s.manifest.HTTP.IsEmpty() { params = append(params, []*cloudformation.Parameter{ { ParameterKey: aws.String(WorkloadRulePathParamKey), ParameterValue: s.manifest.HTTP.Main.Path, }, { ParameterKey: aws.String(WorkloadHTTPSParamKey), ParameterValue: aws.String(strconv.FormatBool(s.httpsEnabled)), }, }...) } return params, nil } // SerializedParameters returns the CloudFormation stack's parameters serialized to a JSON document. func (s *BackendService) SerializedParameters() (string, error) { return serializeTemplateConfig(s.wkld.parser, s) }
265
copilot-cli
aws
Go
//go:build integration || localintegration // Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package stack_test import ( "encoding/json" "fmt" "os" "path/filepath" "testing" "github.com/aws/copilot-cli/internal/pkg/config" "github.com/aws/copilot-cli/internal/pkg/deploy/cloudformation/stack" "github.com/aws/copilot-cli/internal/pkg/manifest" "github.com/golang/mock/gomock" "github.com/stretchr/testify/require" "gopkg.in/yaml.v3" ) func TestBackendService_TemplateAndParamsGeneration(t *testing.T) { const ( appName = "my-app" ) envName := "my-env" testDir := filepath.Join("testdata", "workloads", "backend") tests := map[string]struct { ManifestPath string TemplatePath string ParamsPath string EnvImportedCertARNs []string }{ "simple": { ManifestPath: filepath.Join(testDir, "simple-manifest.yml"), TemplatePath: filepath.Join(testDir, "simple-template.yml"), ParamsPath: filepath.Join(testDir, "simple-params.json"), }, "simple without port config": { ManifestPath: filepath.Join(testDir, "simple-manifest-without-port-config.yml"), TemplatePath: filepath.Join(testDir, "simple-template-without-port-config.yml"), ParamsPath: filepath.Join(testDir, "simple-params-without-port-config.json"), }, "http only path configured": { ManifestPath: filepath.Join(testDir, "http-only-path-manifest.yml"), TemplatePath: filepath.Join(testDir, "http-only-path-template.yml"), ParamsPath: filepath.Join(testDir, "http-only-path-params.json"), }, "http full config": { ManifestPath: filepath.Join(testDir, "http-full-config-manifest.yml"), TemplatePath: filepath.Join(testDir, "http-full-config-template.yml"), ParamsPath: filepath.Join(testDir, "http-full-config-params.json"), }, "https path and alias configured": { ManifestPath: filepath.Join(testDir, "https-path-alias-manifest.yml"), TemplatePath: filepath.Join(testDir, "https-path-alias-template.yml"), ParamsPath: filepath.Join(testDir, "https-path-alias-params.json"), EnvImportedCertARNs: []string{"exampleComCertARN"}, }, "http with autoscaling by requests configured": { ManifestPath: filepath.Join(testDir, "http-autoscaling-manifest.yml"), TemplatePath: filepath.Join(testDir, "http-autoscaling-template.yml"), ParamsPath: filepath.Join(testDir, "http-autoscaling-params.json"), }, } // run tests for name, tc := range tests { t.Run(name, func(t *testing.T) { ctrl := gomock.NewController(t) defer ctrl.Finish() // parse files manifestBytes, err := os.ReadFile(tc.ManifestPath) require.NoError(t, err) tmplBytes, err := os.ReadFile(tc.TemplatePath) require.NoError(t, err) paramsBytes, err := os.ReadFile(tc.ParamsPath) require.NoError(t, err) dynamicMft, err := manifest.UnmarshalWorkload([]byte(manifestBytes)) require.NoError(t, err) require.NoError(t, dynamicMft.Validate()) mft := dynamicMft.Manifest() envConfig := &manifest.Environment{ Workload: manifest.Workload{ Name: &envName, }, } envConfig.HTTPConfig.Private.Certificates = tc.EnvImportedCertARNs serializer, err := stack.NewBackendService(stack.BackendServiceConfig{ App: &config.Application{ Name: appName, }, EnvManifest: envConfig, ArtifactBucketName: "bucket", Manifest: mft.(*manifest.BackendService), RuntimeConfig: stack.RuntimeConfig{ ServiceDiscoveryEndpoint: fmt.Sprintf("%s.%s.local", envName, appName), EnvVersion: "v1.42.0", }, }) require.NoError(t, err) // validate generated template tmpl, err := serializer.Template() require.NoError(t, err) var actualTmpl map[any]any require.NoError(t, yaml.Unmarshal([]byte(tmpl), &actualTmpl)) // change the random DynamicDesiredCountAction UpdateID to an expected value if v, ok := actualTmpl["Resources"]; ok { if v, ok := v.(map[string]any)["DynamicDesiredCountAction"]; ok { if v, ok := v.(map[string]any)["Properties"]; ok { if v, ok := v.(map[string]any); ok { v["UpdateID"] = "AVeryRandomUUID" } } } } resetCustomResourceLocations(actualTmpl) var expectedTmpl map[any]any require.NoError(t, yaml.Unmarshal(tmplBytes, &expectedTmpl)) compareStackTemplate(t, expectedTmpl, actualTmpl) // validate generated params params, err := serializer.SerializedParameters() require.NoError(t, err) var actualParams map[string]any require.NoError(t, json.Unmarshal([]byte(params), &actualParams)) var expectedParams map[string]any require.NoError(t, json.Unmarshal(paramsBytes, &expectedParams)) require.Equal(t, expectedParams, actualParams, "param mismatch") }) } }
144
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package stack import ( "bytes" "errors" "fmt" "testing" "time" "github.com/aws/copilot-cli/internal/pkg/template/templatetest" "github.com/aws/copilot-cli/internal/pkg/config" "github.com/aws/copilot-cli/internal/pkg/manifest/manifestinfo" "github.com/aws/aws-sdk-go/aws" "github.com/aws/aws-sdk-go/service/cloudformation" "github.com/aws/copilot-cli/internal/pkg/addon" "github.com/aws/copilot-cli/internal/pkg/deploy/cloudformation/stack/mocks" "github.com/aws/copilot-cli/internal/pkg/manifest" "github.com/aws/copilot-cli/internal/pkg/template" "github.com/golang/mock/gomock" "github.com/stretchr/testify/require" ) // Test settings for container healthchecks in the backend service manifest. var ( testInterval = 5 * time.Second testRetries = 3 testTimeout = 10 * time.Second testStartPeriod = 0 * time.Second testServiceName = "frontend" testDockerfile = "./frontend/Dockerfile" ) func TestBackendService_Template(t *testing.T) { t.Cleanup(func() { fs = realEmbedFS }) fs = templatetest.Stub{} t.Run("returns a wrapped error when addons template parsing fails", func(t *testing.T) { // GIVEN svc, err := NewBackendService(BackendServiceConfig{ App: &config.Application{}, EnvManifest: &manifest.Environment{}, Manifest: &manifest.BackendService{ Workload: manifest.Workload{ Name: aws.String("api"), }, }, ArtifactBucketName: "mockBucket", Addons: mockAddons{tplErr: errors.New("some error")}, }) require.NoError(t, err) // WHEN _, err = svc.Template() // THEN require.EqualError(t, err, "generate addons template for api: some error") }) t.Run("returns a wrapped error when addons parameter parsing fails", func(t *testing.T) { // GIVEN svc, err := NewBackendService(BackendServiceConfig{ App: &config.Application{}, EnvManifest: &manifest.Environment{}, Manifest: &manifest.BackendService{ Workload: manifest.Workload{ Name: aws.String("api"), }, }, ArtifactBucketName: "mockBucket", Addons: mockAddons{paramsErr: errors.New("some error")}, }) require.NoError(t, err) // WHEN _, err = svc.Template() // THEN require.EqualError(t, err, "parse addons parameters for api: some error") }) t.Run("returns an error when failed to parse sidecar's exposed port", func(t *testing.T) { // GIVEN mft := manifest.NewBackendService(manifest.BackendServiceProps{ WorkloadProps: manifest.WorkloadProps{ Name: "api", Dockerfile: testDockerfile, }, Port: 8080, }) mft.Sidecars = map[string]*manifest.SidecarConfig{ "xray": { Port: aws.String("80/80/80"), }, } svc, err := NewBackendService(BackendServiceConfig{ App: &config.Application{}, EnvManifest: &manifest.Environment{}, Manifest: mft, ArtifactBucketName: "mockBucket", Addons: mockAddons{}, }) require.NoError(t, err) // WHEN _, err = svc.Template() // THEN require.EqualError(t, err, "parse exposed ports in service manifest api: cannot parse port mapping from 80/80/80") }) t.Run("returns an error when failed to convert sidecar configuration", func(t *testing.T) { // GIVEN mft := manifest.NewBackendService(manifest.BackendServiceProps{ WorkloadProps: manifest.WorkloadProps{ Name: "api", Dockerfile: testDockerfile, }, Port: 8080, }) mft.Sidecars = map[string]*manifest.SidecarConfig{ "xray": { Port: aws.String("80"), ImageOverride: manifest.ImageOverride{ Command: manifest.CommandOverride{ String: aws.String("[bad'command]"), }, }, }, } svc, err := NewBackendService(BackendServiceConfig{ App: &config.Application{}, EnvManifest: &manifest.Environment{}, Manifest: mft, ArtifactBucketName: "mockBucket", Addons: mockAddons{}, }) require.NoError(t, err) // WHEN _, err = svc.Template() // THEN require.EqualError(t, err, `convert the sidecar configuration for service api: convert "command" to string slice: convert string into tokens using shell-style rules: EOF found when expecting closing quote`) }) t.Run("returns an error when failed to parse autoscaling template", func(t *testing.T) { // GIVEN mft := manifest.NewBackendService(manifest.BackendServiceProps{ WorkloadProps: manifest.WorkloadProps{ Name: "api", Dockerfile: testDockerfile, }, Port: 8080, }) badRange := manifest.IntRangeBand("badRange") mft.Count.AdvancedCount = manifest.AdvancedCount{ Range: manifest.Range{ Value: &badRange, }, } svc, err := NewBackendService(BackendServiceConfig{ App: &config.Application{}, EnvManifest: &manifest.Environment{}, Manifest: mft, ArtifactBucketName: "mockBucket", Addons: mockAddons{}, }) require.NoError(t, err) // WHEN _, err = svc.Template() // THEN require.EqualError(t, err, "convert the advanced count configuration for service api: invalid range value badRange. Should be in format of ${min}-${max}") }) t.Run("returns wrapped error when failed to parse the template", func(t *testing.T) { // GIVEN ctrl := gomock.NewController(t) defer ctrl.Finish() parser := mocks.NewMockbackendSvcReadParser(ctrl) parser.EXPECT().ParseBackendService(gomock.Any()).Return(nil, errors.New("some error")) mft := manifest.NewBackendService(manifest.BackendServiceProps{ WorkloadProps: manifest.WorkloadProps{ Name: "api", Dockerfile: testDockerfile, }, Port: 8080, }) svc, err := NewBackendService(BackendServiceConfig{ App: &config.Application{}, EnvManifest: &manifest.Environment{}, Manifest: mft, ArtifactBucketName: "mockBucket", Addons: mockAddons{}, }) svc.parser = parser require.NoError(t, err) // WHEN _, err = svc.Template() // THEN require.EqualError(t, err, "parse backend service template: some error") }) t.Run("renders template without a load balancer", func(t *testing.T) { // GIVEN ctrl := gomock.NewController(t) defer ctrl.Finish() mft := manifest.NewBackendService(manifest.BackendServiceProps{ WorkloadProps: manifest.WorkloadProps{ Name: "api", Dockerfile: testDockerfile, }, Port: 8080, HealthCheck: manifest.ContainerHealthCheck{ Command: []string{"CMD-SHELL", "curl -f http://localhost/ || exit 1"}, Interval: &testInterval, Retries: &testRetries, Timeout: &testTimeout, StartPeriod: &testStartPeriod, }, }) mft.EntryPoint = manifest.EntryPointOverride{ String: nil, StringSlice: []string{"enter", "from"}, } mft.Command = manifest.CommandOverride{ String: nil, StringSlice: []string{"here"}, } mft.ExecuteCommand = manifest.ExecuteCommand{Enable: aws.Bool(true)} mft.DeployConfig = manifest.DeploymentConfig{ DeploymentControllerConfig: manifest.DeploymentControllerConfig{ Rolling: aws.String("recreate"), }} privatePlacement := manifest.PrivateSubnetPlacement mft.Network.VPC.Placement = manifest.PlacementArgOrString{ PlacementString: &privatePlacement, } mft.Network.VPC.SecurityGroups = manifest.SecurityGroupsIDsOrConfig{} var actual template.WorkloadOpts parser := mocks.NewMockbackendSvcReadParser(ctrl) parser.EXPECT().ParseBackendService(gomock.Any()).DoAndReturn(func(in template.WorkloadOpts) (*template.Content, error) { actual = in // Capture the translated object. return &template.Content{Buffer: bytes.NewBufferString("template")}, nil }) addons := mockAddons{ tpl: ` Resources: MyTable: Type: AWS::DynamoDB::Table Outputs: MyTable: Value: !Ref MyTable`, params: "", } svc, err := NewBackendService(BackendServiceConfig{ App: &config.Application{ Name: "phonetool", }, EnvManifest: &manifest.Environment{ Workload: manifest.Workload{ Name: aws.String("test"), }, }, ArtifactBucketName: "mockBucket", Manifest: mft, RuntimeConfig: RuntimeConfig{ PushedImages: map[string]ECRImage{ "test": { RepoURL: testImageRepoURL, ImageTag: testImageTag, }, }, CustomResourcesURL: map[string]string{ "EnvControllerFunction": "https://my-bucket.s3.Region.amazonaws.com/sha1/envcontroller.zip", "DynamicDesiredCountFunction": "https://my-bucket.s3.Region.amazonaws.com/sha2/count.zip", }, }, Addons: addons, }) svc.parser = parser require.NoError(t, err) // WHEN _, err = svc.Template() // THEN require.NoError(t, err) require.Equal(t, template.WorkloadOpts{ AppName: "phonetool", EnvName: "test", WorkloadName: "api", WorkloadType: manifestinfo.BackendServiceType, HealthCheck: &template.ContainerHealthCheck{ Command: []string{"CMD-SHELL", "curl -f http://localhost/ || exit 1"}, Interval: aws.Int64(5), Retries: aws.Int64(3), StartPeriod: aws.Int64(0), Timeout: aws.Int64(10), }, HTTPTargetContainer: template.HTTPTargetContainer{ Port: "8080", Name: "api", }, GracePeriod: aws.Int64(manifest.DefaultHealthCheckGracePeriod), CustomResources: map[string]template.S3ObjectLocation{ "EnvControllerFunction": { Bucket: "my-bucket", Key: "sha1/envcontroller.zip", }, "DynamicDesiredCountFunction": { Bucket: "my-bucket", Key: "sha2/count.zip", }, }, ExecuteCommand: &template.ExecuteCommandOpts{}, NestedStack: &template.WorkloadNestedStackOpts{ StackName: addon.StackName, VariableOutputs: []string{"MyTable"}, }, Network: template.NetworkOpts{ AssignPublicIP: template.DisablePublicIP, SubnetsType: template.PrivateSubnetsPlacement, SecurityGroups: []template.SecurityGroup{}, }, DeploymentConfiguration: template.DeploymentConfigurationOpts{ MinHealthyPercent: 0, MaxPercent: 100, }, EntryPoint: []string{"enter", "from"}, Command: []string{"here"}, PortMappings: []*template.PortMapping{ { Protocol: "tcp", ContainerName: "api", ContainerPort: 8080, }, }, }, actual) }) t.Run("renders template with internal load balancer", func(t *testing.T) { // GIVEN ctrl := gomock.NewController(t) defer ctrl.Finish() mft := manifest.NewBackendService(manifest.BackendServiceProps{ WorkloadProps: manifest.WorkloadProps{ Name: "api", Dockerfile: testDockerfile, }, Port: 8080, HealthCheck: manifest.ContainerHealthCheck{ Command: []string{"CMD-SHELL", "curl -f http://localhost/ || exit 1"}, Interval: &testInterval, Retries: &testRetries, Timeout: &testTimeout, StartPeriod: &testStartPeriod, }, }) mft.EntryPoint = manifest.EntryPointOverride{ String: nil, StringSlice: []string{"enter", "from"}, } mft.Command = manifest.CommandOverride{ String: nil, StringSlice: []string{"here"}, } mft.ExecuteCommand = manifest.ExecuteCommand{Enable: aws.Bool(true)} mft.DeployConfig = manifest.DeploymentConfig{ DeploymentControllerConfig: manifest.DeploymentControllerConfig{ Rolling: aws.String("recreate"), }} mft.HTTP = manifest.HTTP{ Main: manifest.RoutingRule{ Path: aws.String("/albPath"), HealthCheck: manifest.HealthCheckArgsOrString{ Union: manifest.AdvancedToUnion[string](manifest.HTTPHealthCheckArgs{ Path: aws.String("/healthz"), Port: aws.Int(4200), SuccessCodes: aws.String("418"), HealthyThreshold: aws.Int64(64), UnhealthyThreshold: aws.Int64(63), Timeout: (*time.Duration)(aws.Int64(int64(62 * time.Second))), Interval: (*time.Duration)(aws.Int64(int64(61 * time.Second))), GracePeriod: (*time.Duration)(aws.Int64(int64(1 * time.Minute))), }), }, Stickiness: aws.Bool(true), DeregistrationDelay: (*time.Duration)(aws.Int64(int64(59 * time.Second))), AllowedSourceIps: []manifest.IPNet{"10.0.1.0/24"}, TargetContainer: aws.String("envoy"), }, } mft.Sidecars = map[string]*manifest.SidecarConfig{ "envoy": { Image: manifest.Union[*string, manifest.ImageLocationOrBuild]{ Advanced: manifest.ImageLocationOrBuild{ Build: manifest.BuildArgsOrString{ BuildString: aws.String("./Dockerfile"), }, }, }, Port: aws.String("443"), }, "nginx": { Image: manifest.Union[*string, manifest.ImageLocationOrBuild]{ Basic: aws.String("mockImageURL"), }, }, } privatePlacement := manifest.PrivateSubnetPlacement mft.Network.VPC.Placement = manifest.PlacementArgOrString{ PlacementString: &privatePlacement, } mft.Network.VPC.SecurityGroups = manifest.SecurityGroupsIDsOrConfig{} var actual template.WorkloadOpts parser := mocks.NewMockbackendSvcReadParser(ctrl) parser.EXPECT().ParseBackendService(gomock.Any()).DoAndReturn(func(in template.WorkloadOpts) (*template.Content, error) { actual = in // Capture the translated object. return &template.Content{Buffer: bytes.NewBufferString("template")}, nil }) addons := mockAddons{ tpl: ` Resources: MyTable: Type: AWS::DynamoDB::Table Outputs: MyTable: Value: !Ref MyTable`, params: "", } svc, err := NewBackendService(BackendServiceConfig{ App: &config.Application{ Name: "phonetool", }, EnvManifest: &manifest.Environment{ Workload: manifest.Workload{ Name: aws.String("test"), }, }, Manifest: mft, RuntimeConfig: RuntimeConfig{ PushedImages: map[string]ECRImage{ "test": { RepoURL: testImageRepoURL, ImageTag: testImageTag, MainContainerName: "test", ContainerName: "test", }, "envoy": { RepoURL: testImageRepoURL, ImageTag: testImageTag, MainContainerName: "test", ContainerName: "envoy", }, }, }, Addons: addons, ArtifactBucketName: "my-bucket", }) svc.parser = parser require.NoError(t, err) // WHEN _, err = svc.Template() // THEN require.NoError(t, err) require.Equal(t, template.WorkloadOpts{ AppName: "phonetool", EnvName: "test", WorkloadName: "api", WorkloadType: manifestinfo.BackendServiceType, HealthCheck: &template.ContainerHealthCheck{ Command: []string{"CMD-SHELL", "curl -f http://localhost/ || exit 1"}, Interval: aws.Int64(5), Retries: aws.Int64(3), StartPeriod: aws.Int64(0), Timeout: aws.Int64(10), }, Sidecars: []*template.SidecarOpts{ { Name: "envoy", Image: aws.String(fmt.Sprintf("%s:%s-%s", testImageRepoURL, "envoy", testImageTag)), PortMappings: []*template.PortMapping{ { Protocol: "tcp", ContainerName: "envoy", ContainerPort: 443, }, }, }, { Name: "nginx", Image: aws.String("mockImageURL"), PortMappings: []*template.PortMapping{}, }, }, HTTPTargetContainer: template.HTTPTargetContainer{ Name: "envoy", Port: "443", }, CustomResources: map[string]template.S3ObjectLocation{ "EnvControllerFunction": { Bucket: "my-bucket", Key: "manual/scripts/custom-resources/envcontrollerfunction/8932747ba5dbff619d89b92d0033ef1d04f7dd1b055e073254907d4e38e3976d.zip", }, "DynamicDesiredCountFunction": { Bucket: "my-bucket", Key: "manual/scripts/custom-resources/dynamicdesiredcountfunction/8932747ba5dbff619d89b92d0033ef1d04f7dd1b055e073254907d4e38e3976d.zip", }, "RulePriorityFunction": { Bucket: "my-bucket", Key: "manual/scripts/custom-resources/rulepriorityfunction/8932747ba5dbff619d89b92d0033ef1d04f7dd1b055e073254907d4e38e3976d.zip", }, }, ExecuteCommand: &template.ExecuteCommandOpts{}, NestedStack: &template.WorkloadNestedStackOpts{ StackName: addon.StackName, VariableOutputs: []string{"MyTable"}, }, Network: template.NetworkOpts{ AssignPublicIP: template.DisablePublicIP, SubnetsType: template.PrivateSubnetsPlacement, SecurityGroups: []template.SecurityGroup{}, }, DeploymentConfiguration: template.DeploymentConfigurationOpts{ MinHealthyPercent: 0, MaxPercent: 100, }, EntryPoint: []string{"enter", "from"}, Command: []string{"here"}, GracePeriod: aws.Int64(60), ALBListener: &template.ALBListener{ Rules: []template.ALBListenerRule{ { Path: "/albPath", TargetContainer: "envoy", TargetPort: "443", HTTPHealthCheck: template.HTTPHealthCheckOpts{ HealthCheckPath: "/healthz", GracePeriod: 60, Port: "4200", SuccessCodes: "418", HealthyThreshold: aws.Int64(64), UnhealthyThreshold: aws.Int64(63), Interval: aws.Int64(61), Timeout: aws.Int64(62), }, DeregistrationDelay: aws.Int64(int64(59)), AllowedSourceIps: []string{ "10.0.1.0/24", }, Stickiness: "true", }, }, HostedZoneAliases: template.AliasesForHostedZone{}, MainContainerPort: "8080", }, ALBEnabled: true, PortMappings: []*template.PortMapping{ { Protocol: "tcp", ContainerName: "api", ContainerPort: 8080, }, }, }, actual) }) } func TestBackendService_Parameters(t *testing.T) { testBackendSvcManifest := manifest.NewBackendService(manifest.BackendServiceProps{ WorkloadProps: manifest.WorkloadProps{ Name: testServiceName, Dockerfile: testDockerfile, }, Port: 8080, HealthCheck: manifest.ContainerHealthCheck{ Command: []string{"CMD-SHELL", "curl -f http://localhost/ || exit 1"}, Interval: &testInterval, Retries: &testRetries, Timeout: &testTimeout, StartPeriod: &testStartPeriod, }, }) conf := &BackendService{ ecsWkld: &ecsWkld{ wkld: &wkld{ name: aws.StringValue(testBackendSvcManifest.Name), env: testEnvName, app: testAppName, image: manifest.Image{ ImageLocationOrBuild: manifest.ImageLocationOrBuild{ Location: aws.String("mockLocation"), }, }, }, tc: testBackendSvcManifest.BackendServiceConfig.TaskConfig, }, manifest: testBackendSvcManifest, } // WHEN params, _ := conf.Parameters() // THEN require.ElementsMatch(t, []*cloudformation.Parameter{ { ParameterKey: aws.String(WorkloadAppNameParamKey), ParameterValue: aws.String("phonetool"), }, { ParameterKey: aws.String(WorkloadEnvNameParamKey), ParameterValue: aws.String("test"), }, { ParameterKey: aws.String(WorkloadNameParamKey), ParameterValue: aws.String("frontend"), }, { ParameterKey: aws.String(WorkloadContainerImageParamKey), ParameterValue: aws.String("mockLocation"), }, { ParameterKey: aws.String(WorkloadContainerPortParamKey), ParameterValue: aws.String("8080"), }, { ParameterKey: aws.String(WorkloadTaskCPUParamKey), ParameterValue: aws.String("256"), }, { ParameterKey: aws.String(WorkloadTaskMemoryParamKey), ParameterValue: aws.String("512"), }, { ParameterKey: aws.String(WorkloadTaskCountParamKey), ParameterValue: aws.String("1"), }, { ParameterKey: aws.String(WorkloadLogRetentionParamKey), ParameterValue: aws.String("30"), }, { ParameterKey: aws.String(WorkloadAddonsTemplateURLParamKey), ParameterValue: aws.String(""), }, { ParameterKey: aws.String(WorkloadEnvFileARNParamKey), ParameterValue: aws.String(""), }, { ParameterKey: aws.String(WorkloadTargetContainerParamKey), ParameterValue: aws.String("frontend"), }, { ParameterKey: aws.String(WorkloadTargetPortParamKey), ParameterValue: aws.String("8080"), }, }, params) }
683
copilot-cli
aws
Go
//go:build integration || localintegration // Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package stack_test import ( "os" "path/filepath" "testing" "github.com/aws/copilot-cli/internal/pkg/config" "github.com/aws/copilot-cli/internal/pkg/deploy" "github.com/aws/copilot-cli/internal/pkg/deploy/cloudformation/stack" "github.com/aws/copilot-cli/internal/pkg/manifest" "github.com/stretchr/testify/require" "gopkg.in/yaml.v3" ) // TestBB_Pipeline_Template ensures that the CloudFormation template generated for a pipeline matches our pre-defined template. func TestBB_Pipeline_Template(t *testing.T) { var build deploy.Build build.Init(nil, "copilot/pipelines/phonetool-pipeline/") var stage deploy.PipelineStage stage.Init(&config.Environment{ App: "phonetool", Name: "test", Region: "us-west-2", AccountID: "1111", ExecutionRoleARN: "arn:aws:iam::1111:role/phonetool-test-CFNExecutionRole", ManagerRoleARN: "arn:aws:iam::1111:role/phonetool-test-EnvManagerRole", }, &manifest.PipelineStage{ Name: "test", TestCommands: []string{`echo "test"`}, }, []string{"api"}) ps := stack.NewPipelineStackConfig(&deploy.CreatePipelineInput{ AppName: "phonetool", Name: "phonetool-pipeline", Source: &deploy.BitbucketSource{ ProviderName: manifest.BitbucketProviderName, RepositoryURL: "https://bitbucket.org/huanjani/sample", Branch: "main", OutputArtifactFormat: "CODEBUILD_CLONE_REF", }, Build: &build, Stages: []deploy.PipelineStage{stage}, ArtifactBuckets: []deploy.ArtifactBucket{ { BucketName: "fancy-bucket", KeyArn: "arn:aws:kms:us-west-2:1111:key/abcd", }, }, AdditionalTags: nil, }) actual, err := ps.Template() require.NoError(t, err, "template should have rendered successfully") actualInBytes := []byte(actual) m1 := make(map[interface{}]interface{}) require.NoError(t, yaml.Unmarshal(actualInBytes, m1)) wanted, err := os.ReadFile(filepath.Join("testdata", "pipeline", "bb_template.yaml")) require.NoError(t, err, "should be able to read expected template file") wantedInBytes := []byte(wanted) m2 := make(map[interface{}]interface{}) require.NoError(t, yaml.Unmarshal(wantedInBytes, m2)) require.Equal(t, m2, m1) }
72
copilot-cli
aws
Go
//go:build integration || localintegration // Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package stack_test import ( "os" "path/filepath" "testing" "github.com/aws/copilot-cli/internal/pkg/config" "github.com/aws/copilot-cli/internal/pkg/manifest" "github.com/stretchr/testify/require" "gopkg.in/yaml.v3" "github.com/aws/copilot-cli/internal/pkg/deploy" "github.com/aws/copilot-cli/internal/pkg/deploy/cloudformation/stack" ) // TestCC_Pipeline_Template ensures that the CloudFormation template generated for a pipeline matches our pre-defined template. func TestCC_Pipeline_Template(t *testing.T) { var build deploy.Build build.Init(nil, "copilot/pipelines/phonetool-pipeline/") var stage deploy.PipelineStage stage.Init(&config.Environment{ App: "phonetool", Name: "staging-test", Region: "us-west-2", AccountID: "1111", ExecutionRoleARN: "arn:aws:iam::1111:role/phonetool-staging-test-CFNExecutionRole", ManagerRoleARN: "arn:aws:iam::1111:role/phonetool-staging-test-EnvManagerRole", }, &manifest.PipelineStage{ Name: "staging-test", TestCommands: []string{`echo "test"`}, }, []string{"api"}) ps := stack.NewPipelineStackConfig(&deploy.CreatePipelineInput{ AppName: "phonetool", Name: "phonetool-pipeline", Source: &deploy.CodeCommitSource{ ProviderName: manifest.CodeCommitProviderName, RepositoryURL: "https://us-west-2.console.aws.amazon.com/codesuite/codecommit/repositories/aws-sample/browse", Branch: "main", OutputArtifactFormat: "CODEBUILD_CLONE_REF", }, Build: &build, Stages: []deploy.PipelineStage{stage}, ArtifactBuckets: []deploy.ArtifactBucket{ { BucketName: "fancy-bucket", KeyArn: "arn:aws:kms:us-west-2:1111:key/abcd", }, }, AdditionalTags: nil, }) actual, err := ps.Template() require.NoError(t, err, "template should have rendered successfully") actualInBytes := []byte(actual) m1 := make(map[interface{}]interface{}) require.NoError(t, yaml.Unmarshal(actualInBytes, m1)) wanted, err := os.ReadFile(filepath.Join("testdata", "pipeline", "cc_template.yaml")) require.NoError(t, err, "should be able to read expected template file") wantedInBytes := []byte(wanted) m2 := make(map[interface{}]interface{}) require.NoError(t, yaml.Unmarshal(wantedInBytes, m2)) require.Equal(t, m2, m1) }
74
copilot-cli
aws
Go
//go:build integration || localintegration // Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package stack_test import ( "os" "path/filepath" "testing" "github.com/aws/copilot-cli/internal/pkg/config" "github.com/aws/copilot-cli/internal/pkg/manifest" "github.com/stretchr/testify/require" "gopkg.in/yaml.v3" "github.com/aws/copilot-cli/internal/pkg/deploy" "github.com/aws/copilot-cli/internal/pkg/deploy/cloudformation/stack" ) const ( pipelineManifestPath = "dd_manifest.yaml" pipelineStackPath = "dd_stack_template.yaml" ) // TestDD_Pipeline_Template ensures that the CloudFormation template generated for a pipeline matches our pre-defined template. func TestDD_Pipeline_Template(t *testing.T) { path := filepath.Join("testdata", "pipeline", pipelineManifestPath) manifestBytes, err := os.ReadFile(path) require.NoError(t, err) pipelineMft, err := manifest.UnmarshalPipeline([]byte(manifestBytes)) require.NoError(t, err) var build deploy.Build if err = build.Init(pipelineMft.Build, ""); err != nil { t.Errorf("build init: %v", err) } source, _, err := deploy.PipelineSourceFromManifest(pipelineMft.Source) var stage deploy.PipelineStage stage.Init(&config.Environment{ App: "phonetool", Name: "test", Region: "us-west-2", AccountID: "1111", ExecutionRoleARN: "arn:aws:iam::1111:role/phonetool-test-CFNExecutionRole", ManagerRoleARN: "arn:aws:iam::1111:role/phonetool-test-EnvManagerRole", }, &manifest.PipelineStage{ Name: "test", TestCommands: []string{`echo "test"`}, }, []string{"api"}) serializer := stack.NewPipelineStackConfig(&deploy.CreatePipelineInput{ AppName: "phonetool", Build: &build, Source: source, Stages: []deploy.PipelineStage{stage}, ArtifactBuckets: []deploy.ArtifactBucket{ { BucketName: "fancy-bucket", KeyArn: "arn:aws:kms:us-west-2:1111:key/abcd", }, }, AdditionalTags: nil, }) actual, err := serializer.Template() require.NoError(t, err, "template should have rendered successfully") actualInBytes := []byte(actual) m1 := make(map[any]any) require.NoError(t, yaml.Unmarshal(actualInBytes, m1)) wanted, err := os.ReadFile(filepath.Join("testdata", "pipeline", pipelineStackPath)) require.NoError(t, err, "should be able to read expected template file") wantedInBytes := []byte(wanted) m2 := make(map[any]any) require.NoError(t, yaml.Unmarshal(wantedInBytes, m2)) require.Equal(t, m2, m1) }
85
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 // Package stack provides functionality to transform manifest files and additional runtime // configuration into CloudFormation stacks. package stack
7
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package stack import "github.com/aws/copilot-cli/internal/pkg/template" type loadBalancedWebSvcReadParser interface { template.ReadParser ParseLoadBalancedWebService(template.WorkloadOpts) (*template.Content, error) } type backendSvcReadParser interface { template.ReadParser ParseBackendService(template.WorkloadOpts) (*template.Content, error) } type requestDrivenWebSvcReadParser interface { template.ReadParser ParseRequestDrivenWebService(template.WorkloadOpts) (*template.Content, error) } type workerSvcReadParser interface { template.ReadParser ParseWorkerService(template.WorkloadOpts) (*template.Content, error) } type staticSiteReadParser interface { template.ReadParser ParseStaticSite(template.WorkloadOpts) (*template.Content, error) } type scheduledJobReadParser interface { template.ReadParser ParseScheduledJob(template.WorkloadOpts) (*template.Content, error) } type envReadParser interface { template.ReadParser ParseEnv(data *template.EnvOpts) (*template.Content, error) ParseEnvBootstrap(data *template.EnvOpts, options ...template.ParseOption) (*template.Content, error) } // embedFS is the interface to parse any embedded templates. type embedFS interface { backendSvcReadParser loadBalancedWebSvcReadParser requestDrivenWebSvcReadParser staticSiteReadParser scheduledJobReadParser workerSvcReadParser envReadParser } var ( realEmbedFS embedFS = template.New() fs = realEmbedFS )
59
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package stack import ( "fmt" "github.com/aws/copilot-cli/internal/pkg/aws/s3" "github.com/aws/copilot-cli/internal/pkg/deploy/upload/customresource" "github.com/aws/aws-sdk-go/aws" "github.com/aws/aws-sdk-go/aws/arn" "github.com/aws/aws-sdk-go/service/cloudformation" "github.com/aws/copilot-cli/internal/pkg/config" "github.com/aws/copilot-cli/internal/pkg/deploy" "github.com/aws/copilot-cli/internal/pkg/manifest" "github.com/aws/copilot-cli/internal/pkg/template" "github.com/google/uuid" ) // Parameter keys. const ( EnvParamAliasesKey = "Aliases" EnvParamALBWorkloadsKey = "ALBWorkloads" EnvParamServiceDiscoveryEndpoint = "ServiceDiscoveryEndpoint" envParamAppNameKey = "AppName" envParamEnvNameKey = "EnvironmentName" envParamToolsAccountPrincipalKey = "ToolsAccountPrincipalARN" envParamAppDNSKey = "AppDNSName" envParamAppDNSDelegationRoleKey = "AppDNSDelegationRole" envParamInternalALBWorkloadsKey = "InternalALBWorkloads" envParamEFSWorkloadsKey = "EFSWorkloads" envParamNATWorkloadsKey = "NATWorkloads" envParamAppRunnerPrivateWorkloadsKey = "AppRunnerPrivateWorkloads" envParamCreateHTTPSListenerKey = "CreateHTTPSListener" envParamCreateInternalHTTPSListenerKey = "CreateInternalHTTPSListener" ) // Output keys. const ( EnvOutputVPCID = "VpcId" EnvOutputPublicSubnets = "PublicSubnets" EnvOutputPrivateSubnets = "PrivateSubnets" envOutputCFNExecutionRoleARN = "CFNExecutionRoleARN" envOutputManagerRoleKey = "EnvironmentManagerRoleARN" ) const ( // DefaultVPCCIDR is the default CIDR used for a manged VPC. DefaultVPCCIDR = "10.0.0.0/16" ) var ( // DefaultPublicSubnetCIDRs contains two default CIDRs for the two managed public subnets. DefaultPublicSubnetCIDRs = []string{"10.0.0.0/24", "10.0.1.0/24"} // DefaultPrivateSubnetCIDRs contains two default CIDRs for the two managed private subnets. DefaultPrivateSubnetCIDRs = []string{"10.0.2.0/24", "10.0.3.0/24"} ) var fmtServiceDiscoveryEndpoint = "%s.%s.local" // Addons contains information about a packaged addons. type Addons struct { S3ObjectURL string // S3ObjectURL is the URL where the addons template is uploaded. Stack NestedStackConfigurer // Stack generates the template and the parameters to the addons. } // EnvConfig holds the fields required to deploy an environment. type EnvConfig struct { Name string // Name of the environment, must be unique within an application. Version string // The version of the environment template to create the stack. If empty, creates the legacy stack. // Application regional configurations. App deploy.AppInformation // Information about the application that the environment belongs to, include app name, DNS name, the principal ARN of the account. AdditionalTags map[string]string // AdditionalTags are labels applied to resources under the application. ArtifactBucketARN string // ARN of the regional application bucket. ArtifactBucketKeyARN string // ARN of the KMS key used to encrypt the contents in the regional application bucket. PermissionsBoundary string // Optional. An IAM Managed Policy name used as permissions boundary for IAM roles. // Runtime configurations. Addons *Addons CustomResourcesURLs map[string]string // Mapping of Custom Resource Function Name to the S3 URL where the function zip file is stored. // User inputs. ImportVPCConfig *config.ImportVPC // Optional configuration if users have an existing VPC. AdjustVPCConfig *config.AdjustVPC // Optional configuration if users want to override default VPC configuration. ImportCertARNs []string // Optional configuration if users want to import certificates. InternalALBSubnets []string // Optional configuration if users want to specify internal ALB placement. AllowVPCIngress bool // Optional configuration to allow access to internal ALB from ports 80/443. CIDRPrefixListIDs []string // Optional configuration to specify public security group ingress based on prefix lists. PublicALBSourceIPs []string // Optional configuration to specify public security group ingress based on customer given source IPs. InternalLBSourceIPs []string // Optional configuration to specify private security group ingress based on customer given source IPs. Telemetry *config.Telemetry // Optional observability and monitoring configuration. Mft *manifest.Environment // Unmarshaled and interpolated manifest object. RawMft []byte // Content of the environment manifest without any modifications. ForceUpdate bool } func (cfg *EnvConfig) loadCustomResourceURLs(crs []uploadable) error { if len(cfg.CustomResourcesURLs) != 0 { return nil } bucket, _, err := s3.ParseARN(cfg.ArtifactBucketARN) if err != nil { return fmt.Errorf("parse artifact bucket ARN: %w", err) } cfg.CustomResourcesURLs = make(map[string]string, len(crs)) for _, cr := range crs { cfg.CustomResourcesURLs[cr.Name()] = s3.Location(bucket, cr.ArtifactPath()) } return nil } // Env is for providing all the values to set up an // environment stack and to interpret the outputs from it. type Env struct { in *EnvConfig lastForceUpdateID string prevParams []*cloudformation.Parameter parser envReadParser } // NewEnvStackConfig returns a CloudFormation stack configuration for deploying a brand-new environment. func NewEnvStackConfig(input *EnvConfig) (*Env, error) { crs, err := customresource.Env(fs) if err != nil { return nil, fmt.Errorf("environment custom resources: %w", err) } if err := input.loadCustomResourceURLs(uploadableCRs(crs).convert()); err != nil { return nil, err } return &Env{ in: input, parser: fs, }, nil } // NewEnvConfigFromExistingStack returns a CloudFormation stack configuration for updating an environment. func NewEnvConfigFromExistingStack(in *EnvConfig, lastForceUpdateID string, prevParams []*cloudformation.Parameter) (*Env, error) { crs, err := customresource.Env(fs) if err != nil { return nil, fmt.Errorf("environment custom resources: %w", err) } if err := in.loadCustomResourceURLs(uploadableCRs(crs).convert()); err != nil { return nil, err } return &Env{ in: in, prevParams: prevParams, lastForceUpdateID: lastForceUpdateID, parser: fs, }, nil } // Template returns the environment CloudFormation template. func (e *Env) Template() (string, error) { crs, err := convertCustomResources(e.in.CustomResourcesURLs) if err != nil { return "", err } var addons *template.Addons if e.in.Addons != nil { extraParams, err := e.in.Addons.Stack.Parameters() if err != nil { return "", fmt.Errorf("parse extra parameters for environment addons: %w", err) } addons = &template.Addons{ URL: e.in.Addons.S3ObjectURL, ExtraParams: extraParams, } } vpcConfig, err := e.vpcConfig() if err != nil { return "", err } forceUpdateID := e.lastForceUpdateID if e.in.ForceUpdate { id, err := uuid.NewRandom() if err != nil { return "", fmt.Errorf("generate uuid for a forced update: %s", err) } forceUpdateID = id.String() } content, err := e.parser.ParseEnv(&template.EnvOpts{ AppName: e.in.App.Name, EnvName: e.in.Name, CustomResources: crs, Addons: addons, ArtifactBucketARN: e.in.ArtifactBucketARN, ArtifactBucketKeyARN: e.in.ArtifactBucketKeyARN, PermissionsBoundary: e.in.PermissionsBoundary, PublicHTTPConfig: e.publicHTTPConfig(), VPCConfig: vpcConfig, PrivateHTTPConfig: e.privateHTTPConfig(), Telemetry: e.telemetryConfig(), CDNConfig: e.cdnConfig(), LatestVersion: e.in.Version, SerializedManifest: string(e.in.RawMft), ForceUpdateID: forceUpdateID, DelegateDNS: e.in.App.Domain != "", }) if err != nil { return "", err } return content.String(), nil } // Parameters returns the parameters to be passed into an environment CloudFormation template. func (e *Env) Parameters() ([]*cloudformation.Parameter, error) { httpsListener := "false" if len(e.importPublicCertARNs()) != 0 || e.in.App.Domain != "" { httpsListener = "true" } internalHTTPSListener := "false" if len(e.importPrivateCertARNs()) != 0 { internalHTTPSListener = "true" } currParams := []*cloudformation.Parameter{ { ParameterKey: aws.String(envParamAppNameKey), ParameterValue: aws.String(e.in.App.Name), }, { ParameterKey: aws.String(envParamEnvNameKey), ParameterValue: aws.String(e.in.Name), }, { ParameterKey: aws.String(envParamToolsAccountPrincipalKey), ParameterValue: aws.String(e.in.App.AccountPrincipalARN), }, { ParameterKey: aws.String(envParamAppDNSKey), ParameterValue: aws.String(e.in.App.Domain), }, { ParameterKey: aws.String(envParamAppDNSDelegationRoleKey), ParameterValue: aws.String(e.in.App.DNSDelegationRole()), }, { ParameterKey: aws.String(EnvParamServiceDiscoveryEndpoint), ParameterValue: aws.String(fmt.Sprintf(fmtServiceDiscoveryEndpoint, e.in.Name, e.in.App.Name)), }, { ParameterKey: aws.String(envParamCreateHTTPSListenerKey), ParameterValue: aws.String(httpsListener), }, { ParameterKey: aws.String(envParamCreateInternalHTTPSListenerKey), ParameterValue: aws.String(internalHTTPSListener), }, { ParameterKey: aws.String(EnvParamAliasesKey), ParameterValue: aws.String(""), }, { ParameterKey: aws.String(EnvParamALBWorkloadsKey), ParameterValue: aws.String(""), }, { ParameterKey: aws.String(envParamInternalALBWorkloadsKey), ParameterValue: aws.String(""), }, { ParameterKey: aws.String(envParamEFSWorkloadsKey), ParameterValue: aws.String(""), }, { ParameterKey: aws.String(envParamNATWorkloadsKey), ParameterValue: aws.String(""), }, { ParameterKey: aws.String(envParamAppRunnerPrivateWorkloadsKey), ParameterValue: aws.String(""), }, } if e.prevParams == nil { return currParams, nil } // If we're creating a stack configuration for an existing environment stack, ensure the previous env controller // managed parameters are using the previous value. return e.transformParameters(currParams, e.prevParams, transformEnvControllerParameters, e.transformServiceDiscoveryEndpoint) } // SerializedParameters returns the CloudFormation stack's parameters serialized to a JSON document. func (e *Env) SerializedParameters() (string, error) { return serializeTemplateConfig(e.parser, e) } // Tags returns the tags that should be applied to the environment CloudFormation stack. func (e *Env) Tags() []*cloudformation.Tag { return mergeAndFlattenTags(e.in.AdditionalTags, map[string]string{ deploy.AppTagKey: e.in.App.Name, deploy.EnvTagKey: e.in.Name, }) } // StackName returns the name of the CloudFormation stack (based on the app and env names). func (e *Env) StackName() string { return NameForEnv(e.in.App.Name, e.in.Name) } type transformParameterFunc func(new, old *cloudformation.Parameter) *cloudformation.Parameter // transformParameters removes or transforms each of the current parameters and does not add any new parameters. // This means that parameters that exist only in the old template are left out. // The parameter`transformFunc` are functions that transform a parameter, given its value in the new template and the old template. // Each transform functions should keep the following in mind: // 1. It should return `nil` if the parameter should be removed. // 2. The transform functions are applied in a convolutional manner. // 3. If the parameter `old` is passed in as `nil`, the parameter does not exist in the old template. func (e *Env) transformParameters(currParams, oldParams []*cloudformation.Parameter, transformFunc ...transformParameterFunc) ([]*cloudformation.Parameter, error) { // Make a map out of `currParams` and out of `oldParams`. curr := make(map[string]*cloudformation.Parameter) for _, p := range currParams { curr[aws.StringValue(p.ParameterKey)] = p } old := make(map[string]*cloudformation.Parameter) for _, p := range oldParams { old[aws.StringValue(p.ParameterKey)] = p } // Remove or transform each of the current parameters. var params []*cloudformation.Parameter for k, p := range curr { currP := p for _, transform := range transformFunc { currP = transform(currP, old[k]) } if currP != nil { params = append(params, currP) } } return params, nil } // transformEnvControllerParameters transforms an env-controller managed parameter. // If the parameter exists in the old template, it returns the old parameter assuming that old.ParameterKey = new.ParameterKey. // Otherwise, it returns its new default value. func transformEnvControllerParameters(new, old *cloudformation.Parameter) *cloudformation.Parameter { if new == nil { return nil } isEnvControllerManaged := make(map[string]struct{}) for _, f := range template.AvailableEnvFeatures() { isEnvControllerManaged[f] = struct{}{} } if _, ok := isEnvControllerManaged[aws.StringValue(new.ParameterKey)]; !ok { return new } if old == nil { // The EnvController-managed parameter doesn't exist in the old stack. Use the new value. return new } // Ideally, we would return `&cloudformation.Parameter{ ParameterKey: new.ParameterKey, UsePreviousValue: true}`. // Unfortunately CodePipeline template config does not support it. // https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/continuous-delivery-codepipeline-cfn-artifacts.html#w2ab1c21c15c15 return old } // transformServiceDiscoveryEndpoint transforms the service discovery endpoint parameter. // If the parameter exists in the old template, it uses its previous value. // Otherwise, it uses a default value of `<app>.local`. func (e *Env) transformServiceDiscoveryEndpoint(new, old *cloudformation.Parameter) *cloudformation.Parameter { if new == nil { return nil } if aws.StringValue(new.ParameterKey) != EnvParamServiceDiscoveryEndpoint { return new } if old == nil { return &cloudformation.Parameter{ ParameterKey: new.ParameterKey, ParameterValue: aws.String(fmt.Sprintf(`%s.local`, e.in.App.Name)), } } // Ideally, we would return `&cloudformation.Parameter{ ParameterKey: new.ParameterKey, UsePreviousValue: true}`. // Unfortunately CodePipeline template config does not support it. // https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/continuous-delivery-codepipeline-cfn-artifacts.html#w2ab1c21c15c15 return old } // NewBootstrapEnvStackConfig sets up a BootstrapEnv struct. func NewBootstrapEnvStackConfig(input *EnvConfig) *BootstrapEnv { return &BootstrapEnv{ in: input, parser: template.New(), } } // BootstrapEnv contains information for creating a stack bootstrapping environment resources. type BootstrapEnv Env // Template returns the CloudFormation template to bootstrap environment resources. func (e *BootstrapEnv) Template() (string, error) { content, err := e.parser.ParseEnvBootstrap(&template.EnvOpts{ ArtifactBucketARN: e.in.ArtifactBucketARN, ArtifactBucketKeyARN: e.in.ArtifactBucketKeyARN, PermissionsBoundary: e.in.PermissionsBoundary, }) if err != nil { return "", err } return content.String(), nil } // Parameters returns the parameters to be passed into the bootstrap stack's CloudFormation template. func (e *BootstrapEnv) Parameters() ([]*cloudformation.Parameter, error) { return []*cloudformation.Parameter{ { ParameterKey: aws.String(envParamAppNameKey), ParameterValue: aws.String(e.in.App.Name), }, { ParameterKey: aws.String(envParamEnvNameKey), ParameterValue: aws.String(e.in.Name), }, { ParameterKey: aws.String(envParamToolsAccountPrincipalKey), ParameterValue: aws.String(e.in.App.AccountPrincipalARN), }, }, nil } // SerializedParameters returns the CloudFormation stack's parameters serialized // to a YAML document annotated with comments for readability to users. func (e *BootstrapEnv) SerializedParameters() (string, error) { // No-op for now. return "", nil } // Tags returns the tags that should be applied to the bootstrap CloudFormation stack. func (e *BootstrapEnv) Tags() []*cloudformation.Tag { return (*Env)(e).Tags() } // StackName returns the name of the CloudFormation stack (based on the app and env names). func (e *BootstrapEnv) StackName() string { return (*Env)(e).StackName() } // ToEnvMetadata inspects an environment cloudformation stack and constructs an environment // struct out of it (including resources like ECR Repo). func (e *BootstrapEnv) ToEnvMetadata(stack *cloudformation.Stack) (*config.Environment, error) { stackARN, err := arn.Parse(*stack.StackId) if err != nil { return nil, fmt.Errorf("couldn't extract region and account from stack ID %s: %w", *stack.StackId, err) } stackOutputs := make(map[string]string) for _, output := range stack.Outputs { stackOutputs[*output.OutputKey] = *output.OutputValue } return &config.Environment{ Name: e.in.Name, App: e.in.App.Name, Region: stackARN.Region, AccountID: stackARN.AccountID, ManagerRoleARN: stackOutputs[envOutputManagerRoleKey], ExecutionRoleARN: stackOutputs[envOutputCFNExecutionRoleARN], }, nil } func (e *Env) cdnConfig() *template.CDNConfig { if e.in.Mft == nil || !e.in.Mft.CDNEnabled() { return nil } mftConfig := e.in.Mft.CDNConfig.Config config := &template.CDNConfig{ ImportedCertificate: mftConfig.Certificate, TerminateTLS: aws.BoolValue(mftConfig.TerminateTLS), } if !mftConfig.Static.IsEmpty() { config.Static = &template.CDNStaticAssetConfig{ ImportedBucket: mftConfig.Static.Location, Path: mftConfig.Static.Path, Alias: mftConfig.Static.Alias, } } return config } func (e *Env) publicHTTPConfig() template.PublicHTTPConfig { return template.PublicHTTPConfig{ HTTPConfig: template.HTTPConfig{ ImportedCertARNs: e.importPublicCertARNs(), SSLPolicy: e.getPublicSSLPolicy(), }, PublicALBSourceIPs: e.in.PublicALBSourceIPs, CIDRPrefixListIDs: e.in.CIDRPrefixListIDs, ELBAccessLogs: convertELBAccessLogsConfig(e.in.Mft), } } func (e *Env) privateHTTPConfig() template.PrivateHTTPConfig { return template.PrivateHTTPConfig{ HTTPConfig: template.HTTPConfig{ ImportedCertARNs: e.importPrivateCertARNs(), SSLPolicy: e.getPrivateSSLPolicy(), }, CustomALBSubnets: e.internalALBSubnets(), } } func (e *Env) vpcConfig() (template.VPCConfig, error) { securityGroupConfig, err := convertEnvSecurityGroupCfg(e.in.Mft) if err != nil { return template.VPCConfig{}, err } flowLogs, err := convertFlowLogsConfig(e.in.Mft) if err != nil { return template.VPCConfig{}, err } return template.VPCConfig{ Imported: e.importVPC(), Managed: e.managedVPC(), AllowVPCIngress: e.in.Mft.HTTPConfig.Private.HasVPCIngress(), SecurityGroupConfig: securityGroupConfig, FlowLogs: flowLogs, }, nil } func (e *Env) importVPC() *template.ImportVPC { // If a manifest is present, it is the only place we look at. if e.in.Mft != nil { return e.in.Mft.Network.VPC.ImportedVPC() } // Fallthrough to SSM config. if e.in.ImportVPCConfig == nil { return nil } return &template.ImportVPC{ ID: e.in.ImportVPCConfig.ID, PublicSubnetIDs: e.in.ImportVPCConfig.PublicSubnetIDs, PrivateSubnetIDs: e.in.ImportVPCConfig.PrivateSubnetIDs, } } func (e *Env) managedVPC() template.ManagedVPC { defaultManagedVPC := template.ManagedVPC{ CIDR: DefaultVPCCIDR, PublicSubnetCIDRs: DefaultPublicSubnetCIDRs, PrivateSubnetCIDRs: DefaultPrivateSubnetCIDRs, } // If a manifest is present, it is the only place we look at. if e.in.Mft != nil { if v := e.in.Mft.Network.VPC.ManagedVPC(); v != nil { return *v } return defaultManagedVPC } // Fallthrough to SSM config. if e.in.AdjustVPCConfig == nil { return defaultManagedVPC } return template.ManagedVPC{ CIDR: e.in.AdjustVPCConfig.CIDR, AZs: e.in.AdjustVPCConfig.AZs, PublicSubnetCIDRs: e.in.AdjustVPCConfig.PublicSubnetCIDRs, PrivateSubnetCIDRs: e.in.AdjustVPCConfig.PrivateSubnetCIDRs, } } func (e *Env) telemetryConfig() *template.Telemetry { // If a manifest is present, it is the only place we look at. if e.in.Mft != nil { return &template.Telemetry{ EnableContainerInsights: aws.BoolValue(e.in.Mft.Observability.ContainerInsights), } } // Fallthrough to SSM config. if e.in.Telemetry == nil { // For environments before Copilot v1.14.0, `Telemetry` is nil. return nil } return &template.Telemetry{ // For environments after v1.14.0, and v1.20.0, `Telemetry` is never nil, // and `EnableContainerInsights` is either true or false. EnableContainerInsights: e.in.Telemetry.EnableContainerInsights, } } func (e *Env) importPublicCertARNs() []string { // If a manifest is present, it is the only place we look at. if e.in.Mft != nil { return e.in.Mft.HTTPConfig.Public.Certificates } // Fallthrough to SSM config. if e.in.ImportVPCConfig != nil && len(e.in.ImportVPCConfig.PublicSubnetIDs) == 0 { return nil } return e.in.ImportCertARNs } func (e *Env) importPrivateCertARNs() []string { // If a manifest is present, it is the only place we look at. if e.in.Mft != nil { return e.in.Mft.HTTPConfig.Private.Certificates } // Fallthrough to SSM config. if e.in.ImportVPCConfig != nil && len(e.in.ImportVPCConfig.PublicSubnetIDs) == 0 { return e.in.ImportCertARNs } return nil } func (e *Env) internalALBSubnets() []string { // If a manifest is present, it is the only place we look. if e.in.Mft != nil { return e.in.Mft.HTTPConfig.Private.InternalALBSubnets } // Fallthrough to SSM config. return e.in.InternalALBSubnets } func (e *Env) getPublicSSLPolicy() *string { return e.in.Mft.EnvironmentConfig.HTTPConfig.Public.SSLPolicy } func (e *Env) getPrivateSSLPolicy() *string { return e.in.Mft.EnvironmentConfig.HTTPConfig.Private.SSLPolicy }
628
copilot-cli
aws
Go
//go:build integration || localintegration // Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package stack_test import ( "fmt" "os" "path/filepath" "reflect" "strings" "testing" "github.com/aws/copilot-cli/internal/pkg/manifest" "gopkg.in/yaml.v3" "github.com/aws/copilot-cli/internal/pkg/deploy" "github.com/aws/copilot-cli/internal/pkg/deploy/cloudformation/stack" "github.com/stretchr/testify/require" ) func TestEnvStack_Template(t *testing.T) { testCases := map[string]struct { input *stack.EnvConfig wantedFileName string }{ "generate template with embedded manifest file with container insights and cloudfront imported bucket and advanced access logs": { input: func() *stack.EnvConfig { rawMft := `name: test type: Environment # Create the public ALB with certificates attached. cdn: certificate: viewer-cert static_assets: location: cf-s3-ecs-demo-bucket.s3.us-west-2.amazonaws.com alias: example.com path: static/* http: public: ingress: cdn: true source_ips: - 1.1.1.1 - 2.2.2.2 access_logs: bucket_name: accesslogsbucket prefix: accesslogsbucketprefix certificates: - cert-1 - cert-2 private: security_groups: ingress: from_vpc: true observability: container_insights: true # Enable container insights.` var mft manifest.Environment err := yaml.Unmarshal([]byte(rawMft), &mft) require.NoError(t, err) return &stack.EnvConfig{ Version: "1.x", App: deploy.AppInformation{ AccountPrincipalARN: "arn:aws:iam::000000000:root", Name: "demo", }, Name: "test", CIDRPrefixListIDs: []string{"pl-mockid"}, PublicALBSourceIPs: []string{"1.1.1.1", "2.2.2.2"}, ArtifactBucketARN: "arn:aws:s3:::mockbucket", ArtifactBucketKeyARN: "arn:aws:kms:us-west-2:000000000:key/1234abcd-12ab-34cd-56ef-1234567890ab", Mft: &mft, RawMft: []byte(rawMft), } }(), wantedFileName: "template-with-cloudfront-observability.yml", }, "generate template with default access logs": { input: func() *stack.EnvConfig { rawMft := `name: test type: Environment http: public: access_logs: true` var mft manifest.Environment err := yaml.Unmarshal([]byte(rawMft), &mft) require.NoError(t, err) return &stack.EnvConfig{ Version: "1.x", App: deploy.AppInformation{ AccountPrincipalARN: "arn:aws:iam::000000000:root", Name: "demo", }, Name: "test", ArtifactBucketARN: "arn:aws:s3:::mockbucket", ArtifactBucketKeyARN: "arn:aws:kms:us-west-2:000000000:key/1234abcd-12ab-34cd-56ef-1234567890ab", Mft: &mft, RawMft: []byte(rawMft), } }(), wantedFileName: "template-with-default-access-log-config.yml", }, "generate template with embedded manifest file with custom security groups rules added by the customer": { input: func() *stack.EnvConfig { rawMft := `name: test type: Environment # Create the public ALB with certificates attached. http: public: certificates: - cert-1 - cert-2 observability: container_insights: true # Enable container insights. network: vpc: security_group: ingress: - ip_protocol: tcp ports: 10 cidr: 0.0.0.0 - ip_protocol: tcp ports: 1-10 cidr: 0.0.0.0 egress: - ip_protocol: tcp ports: 0-65535 cidr: 0.0.0.0` var mft manifest.Environment err := yaml.Unmarshal([]byte(rawMft), &mft) require.NoError(t, err) return &stack.EnvConfig{ Version: "1.x", App: deploy.AppInformation{ AccountPrincipalARN: "arn:aws:iam::000000000:root", Name: "demo", }, Name: "test", ArtifactBucketARN: "arn:aws:s3:::mockbucket", ArtifactBucketKeyARN: "arn:aws:kms:us-west-2:000000000:key/1234abcd-12ab-34cd-56ef-1234567890ab", Mft: &mft, RawMft: []byte(rawMft), } }(), wantedFileName: "template-with-custom-security-group.yml", }, "generate template with embedded manifest file with imported certificates and SSL Policy and empty security groups rules added by the customer": { input: func() *stack.EnvConfig { rawMft := `name: test type: Environment # Create the public ALB with certificates attached. http: public: certificates: - cert-1 - cert-2 ssl_policy: ELBSecurityPolicy-FS-1-1-2019-08 observability: container_insights: true # Enable container insights. security_group: ingress: egress:` var mft manifest.Environment err := yaml.Unmarshal([]byte(rawMft), &mft) require.NoError(t, err) return &stack.EnvConfig{ Version: "1.x", App: deploy.AppInformation{ AccountPrincipalARN: "arn:aws:iam::000000000:root", Name: "demo", }, Name: "test", ArtifactBucketARN: "arn:aws:s3:::mockbucket", ArtifactBucketKeyARN: "arn:aws:kms:us-west-2:000000000:key/1234abcd-12ab-34cd-56ef-1234567890ab", Mft: &mft, RawMft: []byte(rawMft), } }(), wantedFileName: "template-with-imported-certs-sslpolicy-custom-empty-security-group.yml", }, "generate template with custom resources": { input: func() *stack.EnvConfig { rawMft := `name: test type: Environment` var mft manifest.Environment err := yaml.Unmarshal([]byte(rawMft), &mft) require.NoError(t, err) return &stack.EnvConfig{ Version: "1.x", App: deploy.AppInformation{ AccountPrincipalARN: "arn:aws:iam::000000000:root", Name: "demo", }, Name: "test", ArtifactBucketARN: "arn:aws:s3:::mockbucket", ArtifactBucketKeyARN: "arn:aws:kms:us-west-2:000000000:key/1234abcd-12ab-34cd-56ef-1234567890ab", Mft: &mft, RawMft: []byte(rawMft), } }(), wantedFileName: "template-with-basic-manifest.yml", }, "generate template with default vpc and flowlogs is on": { input: func() *stack.EnvConfig { rawMft := `name: test type: Environment network: vpc: flow_logs: retention: 60` var mft manifest.Environment err := yaml.Unmarshal([]byte(rawMft), &mft) require.NoError(t, err) return &stack.EnvConfig{ Version: "1.x", App: deploy.AppInformation{ AccountPrincipalARN: "arn:aws:iam::000000000:root", Name: "demo", }, Name: "test", ArtifactBucketARN: "arn:aws:s3:::mockbucket", ArtifactBucketKeyARN: "arn:aws:kms:us-west-2:000000000:key/1234abcd-12ab-34cd-56ef-1234567890ab", Mft: &mft, RawMft: []byte(rawMft), } }(), wantedFileName: "template-with-defaultvpc-flowlogs.yml", }, "generate template with imported vpc and flowlogs is on": { input: func() *stack.EnvConfig { rawMft := `name: test type: Environment network: vpc: id: 'vpc-12345' subnets: public: - id: 'subnet-11111' - id: 'subnet-22222' private: - id: 'subnet-33333' - id: 'subnet-44444' flow_logs: on` var mft manifest.Environment err := yaml.Unmarshal([]byte(rawMft), &mft) require.NoError(t, err) return &stack.EnvConfig{ Version: "1.x", App: deploy.AppInformation{ AccountPrincipalARN: "arn:aws:iam::000000000:root", Name: "demo", }, Name: "test", ArtifactBucketARN: "arn:aws:s3:::mockbucket", ArtifactBucketKeyARN: "arn:aws:kms:us-west-2:000000000:key/1234abcd-12ab-34cd-56ef-1234567890ab", Mft: &mft, RawMft: []byte(rawMft), } }(), wantedFileName: "template-with-importedvpc-flowlogs.yml", }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { // GIVEN wanted, err := os.ReadFile(filepath.Join("testdata", "environments", tc.wantedFileName)) require.NoError(t, err, "read wanted template") wantedObj := make(map[any]any) require.NoError(t, yaml.Unmarshal(wanted, wantedObj)) // WHEN envStack, err := stack.NewEnvStackConfig(tc.input) require.NoError(t, err) actual, err := envStack.Template() require.NoError(t, err, "serialize template") actualObj := make(map[any]any) require.NoError(t, yaml.Unmarshal([]byte(actual), actualObj)) actualMetadata := actualObj["Metadata"].(map[string]any) // We remove the Version from the expected template, as the latest env version always changes. delete(actualMetadata, "Version") // Strip new lines when comparing outputs. actualObj["Metadata"].(map[string]any)["Manifest"] = strings.TrimSpace(actualObj["Metadata"].(map[string]any)["Manifest"].(string)) wantedObj["Metadata"].(map[string]any)["Manifest"] = strings.TrimSpace(wantedObj["Metadata"].(map[string]any)["Manifest"].(string)) // THEN resetCustomResourceLocations(actualObj) compareStackTemplate(t, wantedObj, actualObj) }) } } func TestEnvStack_Regression(t *testing.T) { testCases := map[string]struct { originalManifest *stack.EnvConfig newManifest *stack.EnvConfig }{ "should produce the same template after migrating load balancer ingress fields": { originalManifest: func() *stack.EnvConfig { rawMft := `name: test type: Environment # Create the public ALB with certificates attached. cdn: certificate: viewer-cert http: public: security_groups: ingress: restrict_to: cdn: true access_logs: bucket_name: accesslogsbucket prefix: accesslogsbucketprefix certificates: - cert-1 - cert-2 private: security_groups: ingress: from_vpc: true observability: container_insights: true # Enable container insights.` var mft manifest.Environment err := yaml.Unmarshal([]byte(rawMft), &mft) require.NoError(t, err) return &stack.EnvConfig{ Version: "1.x", App: deploy.AppInformation{ AccountPrincipalARN: "arn:aws:iam::000000000:root", Name: "demo", }, Name: "test", CIDRPrefixListIDs: []string{"pl-mockid"}, ArtifactBucketARN: "arn:aws:s3:::mockbucket", ArtifactBucketKeyARN: "arn:aws:kms:us-west-2:000000000:key/1234abcd-12ab-34cd-56ef-1234567890ab", Mft: &mft, RawMft: []byte(rawMft), } }(), newManifest: func() *stack.EnvConfig { rawMft := `name: test type: Environment # Create the public ALB with certificates attached. cdn: certificate: viewer-cert http: public: ingress: cdn: true access_logs: bucket_name: accesslogsbucket prefix: accesslogsbucketprefix certificates: - cert-1 - cert-2 private: ingress: vpc: true observability: container_insights: true # Enable container insights.` var mft manifest.Environment err := yaml.Unmarshal([]byte(rawMft), &mft) require.NoError(t, err) return &stack.EnvConfig{ Version: "1.x", App: deploy.AppInformation{ AccountPrincipalARN: "arn:aws:iam::000000000:root", Name: "demo", }, Name: "test", CIDRPrefixListIDs: []string{"pl-mockid"}, ArtifactBucketARN: "arn:aws:s3:::mockbucket", ArtifactBucketKeyARN: "arn:aws:kms:us-west-2:000000000:key/1234abcd-12ab-34cd-56ef-1234567890ab", Mft: &mft, RawMft: []byte(rawMft), } }(), }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { // WHEN originalStack, err := stack.NewEnvStackConfig(tc.originalManifest) require.NoError(t, err) originalTmpl, err := originalStack.Template() require.NoError(t, err, "should serialize the template given the original environment manifest") originalObj := make(map[any]any) require.NoError(t, yaml.Unmarshal([]byte(originalTmpl), originalObj)) newStack, err := stack.NewEnvStackConfig(tc.newManifest) require.NoError(t, err) newTmpl, err := newStack.Template() require.NoError(t, err, "should serialize the template given a migrated environment manifest") newObj := make(map[any]any) require.NoError(t, yaml.Unmarshal([]byte(newTmpl), newObj)) // Delete because manifest could be different. delete(originalObj["Metadata"].(map[string]any), "Manifest") delete(newObj["Metadata"].(map[string]any), "Manifest") resetCustomResourceLocations(originalObj) resetCustomResourceLocations(newObj) compareStackTemplate(t, originalObj, newObj) }) } } func compareStackTemplate(t *testing.T, wantedObj, actualObj map[any]any) { actual, wanted := reflect.ValueOf(actualObj), reflect.ValueOf(wantedObj) compareStackTemplateSection(t, reflect.ValueOf("Description"), wanted, actual) compareStackTemplateSection(t, reflect.ValueOf("Metadata"), wanted, actual) compareStackTemplateSection(t, reflect.ValueOf("Parameters"), wanted, actual) compareStackTemplateSection(t, reflect.ValueOf("Conditions"), wanted, actual) compareStackTemplateSection(t, reflect.ValueOf("Outputs"), wanted, actual) // Compare each resource. actualResources, wantedResources := actual.MapIndex(reflect.ValueOf("Resources")).Elem(), wanted.MapIndex(reflect.ValueOf("Resources")).Elem() actualResourceNames, wantedResourceNames := actualResources.MapKeys(), wantedResources.MapKeys() for _, key := range actualResourceNames { compareStackTemplateSection(t, key, wantedResources, actualResources) } for _, key := range wantedResourceNames { compareStackTemplateSection(t, key, wantedResources, actualResources) } } func compareStackTemplateSection(t *testing.T, key, wanted, actual reflect.Value) { actualExist, wantedExist := actual.MapIndex(key).IsValid(), wanted.MapIndex(key).IsValid() if !actualExist && !wantedExist { return } require.True(t, actualExist, fmt.Sprintf("%q does not exist in the actual template", key.Interface())) require.True(t, wantedExist, fmt.Sprintf("%q does not exist in the expected template", key.Interface())) require.Equal(t, actual.MapIndex(key).Interface(), wanted.MapIndex(key).Interface(), fmt.Sprintf("Comparing %q", key.Interface())) } func resetCustomResourceLocations(template map[any]any) { resources := template["Resources"].(map[string]any) functions := []string{ "EnvControllerFunction", "DynamicDesiredCountFunction", "BacklogPerTaskCalculatorFunction", "RulePriorityFunction", "NLBCustomDomainFunction", "NLBCertValidatorFunction", "CustomDomainFunction", "CertificateValidationFunction", "DNSDelegationFunction", "CertificateReplicatorFunction", "UniqueJSONValuesFunction", "TriggerStateMachineFunction", } for _, fnName := range functions { resource, ok := resources[fnName] if !ok { continue } fn := resource.(map[string]any) props := fn["Properties"].(map[string]any) delete(props, "Code") } }
459
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package stack import ( "bytes" "errors" "fmt" "testing" "github.com/aws/copilot-cli/internal/pkg/template/templatetest" "github.com/aws/aws-sdk-go/aws" "github.com/aws/aws-sdk-go/service/cloudformation" "github.com/aws/copilot-cli/internal/pkg/config" "github.com/aws/copilot-cli/internal/pkg/deploy" "github.com/aws/copilot-cli/internal/pkg/deploy/cloudformation/stack/mocks" "github.com/aws/copilot-cli/internal/pkg/manifest" "github.com/aws/copilot-cli/internal/pkg/template" "github.com/golang/mock/gomock" "github.com/stretchr/testify/require" ) func TestEnv_Template(t *testing.T) { t.Cleanup(func() { fs = realEmbedFS }) t.Run("error parsing template", func(t *testing.T) { ctrl := gomock.NewController(t) defer ctrl.Finish() // GIVEN inEnvConfig := mockDeployEnvironmentInput() mockParser := mocks.NewMockembedFS(ctrl) fs = mockParser // EXPECT mockParser.EXPECT().Read(gomock.Any()).Return(&template.Content{Buffer: bytes.NewBufferString("data")}, nil).AnyTimes() mockParser.EXPECT().ParseEnv(gomock.Any()).Return(nil, errors.New("some error")) // WHEN envStack, err := NewEnvConfigFromExistingStack(inEnvConfig, "mockPreviousForceUpdateID", nil) require.NoError(t, err) _, err = envStack.Template() // THEN require.EqualError(t, errors.New("some error"), err.Error()) }) t.Run("error parsing addons extra parameters", func(t *testing.T) { ctrl := gomock.NewController(t) defer ctrl.Finish() // GIVEN inEnvConfig := mockDeployEnvironmentInput() mockAddonsConfig := mocks.NewMockNestedStackConfigurer(ctrl) inEnvConfig.Addons = &Addons{ S3ObjectURL: "mockAddonsURL", Stack: mockAddonsConfig, } fs = templatetest.Stub{} // EXPECT mockAddonsConfig.EXPECT().Parameters().Return("", errors.New("some error")) // WHEN envStack, err := NewEnvConfigFromExistingStack(inEnvConfig, "mockPreviousForceUpdateID", nil) require.NoError(t, err) _, err = envStack.Template() // THEN require.EqualError(t, errors.New("parse extra parameters for environment addons: some error"), err.Error()) }) t.Run("should contain addons information when addons are present", func(t *testing.T) { ctrl := gomock.NewController(t) defer ctrl.Finish() // GIVEN inEnvConfig := mockDeployEnvironmentInput() mockAddonsConfig := mocks.NewMockNestedStackConfigurer(ctrl) mockAddonsConfig.EXPECT().Parameters().Return("mockAddonsExtraParameters", nil) inEnvConfig.Addons = &Addons{ S3ObjectURL: "mockAddonsURL", Stack: mockAddonsConfig, } mockParser := mocks.NewMockembedFS(ctrl) mockParser.EXPECT().Read(gomock.Any()).Return(&template.Content{Buffer: bytes.NewBufferString("data")}, nil).AnyTimes() mockParser.EXPECT().ParseEnv(gomock.Any()).DoAndReturn(func(data *template.EnvOpts) (*template.Content, error) { require.Equal(t, &template.Addons{ URL: "mockAddonsURL", ExtraParams: "mockAddonsExtraParameters", }, data.Addons) return &template.Content{Buffer: bytes.NewBufferString("mockTemplate")}, nil }) fs = mockParser // WHEN envStack, err := NewEnvConfigFromExistingStack(inEnvConfig, "mockPreviousForceUpdateID", nil) require.NoError(t, err) got, err := envStack.Template() // THEN require.NoError(t, err) require.Equal(t, mockTemplate, got) }) t.Run("should use new force update ID when asked", func(t *testing.T) { ctrl := gomock.NewController(t) defer ctrl.Finish() // GIVEN inEnvConfig := mockDeployEnvironmentInput() inEnvConfig.ForceUpdate = true mockParser := mocks.NewMockembedFS(ctrl) mockParser.EXPECT().Read(gomock.Any()).Return(&template.Content{Buffer: bytes.NewBufferString("data")}, nil).AnyTimes() mockParser.EXPECT().ParseEnv(gomock.Any()).DoAndReturn(func(data *template.EnvOpts) (*template.Content, error) { require.NotEqual(t, "mockPreviousForceUpdateID", data.ForceUpdateID) return &template.Content{Buffer: bytes.NewBufferString("mockTemplate")}, nil }) fs = mockParser // WHEN envStack, err := NewEnvConfigFromExistingStack(inEnvConfig, "mockPreviousForceUpdateID", nil) require.NoError(t, err) got, err := envStack.Template() // THEN require.NoError(t, err) require.Equal(t, mockTemplate, got) }) t.Run("should return template body when present", func(t *testing.T) { ctrl := gomock.NewController(t) defer ctrl.Finish() // GIVEN inEnvConfig := mockDeployEnvironmentInput() mockParser := mocks.NewMockembedFS(ctrl) mockParser.EXPECT().Read(gomock.Any()).Return(&template.Content{Buffer: bytes.NewBufferString("data")}, nil).AnyTimes() mockParser.EXPECT().ParseEnv(gomock.Any()).DoAndReturn(func(data *template.EnvOpts) (*template.Content, error) { require.Equal(t, &template.EnvOpts{ AppName: "project", EnvName: "env", VPCConfig: template.VPCConfig{ Imported: nil, Managed: template.ManagedVPC{ CIDR: DefaultVPCCIDR, PrivateSubnetCIDRs: DefaultPrivateSubnetCIDRs, PublicSubnetCIDRs: DefaultPublicSubnetCIDRs, }, SecurityGroupConfig: nil, FlowLogs: nil, }, CustomResources: map[string]template.S3ObjectLocation{ "CertificateValidationFunction": { Bucket: "mockbucket", Key: "mockkey1", }, "DNSDelegationFunction": { Bucket: "mockbucket", Key: "mockkey2", }, "CustomDomainFunction": { Bucket: "mockbucket", Key: "mockkey4", }, }, Telemetry: &template.Telemetry{ EnableContainerInsights: false, }, ArtifactBucketARN: "arn:aws:s3:::mockbucket", SerializedManifest: "name: env\ntype: Environment\n", ForceUpdateID: "mockPreviousForceUpdateID", }, data) return &template.Content{Buffer: bytes.NewBufferString("mockTemplate")}, nil }) fs = mockParser // WHEN envStack, err := NewEnvConfigFromExistingStack(inEnvConfig, "mockPreviousForceUpdateID", nil) require.NoError(t, err) got, err := envStack.Template() // THEN require.NoError(t, err) require.Equal(t, mockTemplate, got) }) t.Run("should return template body with local custom resources when not uploaded", func(t *testing.T) { ctrl := gomock.NewController(t) defer ctrl.Finish() // GIVEN inEnvConfig := mockDeployEnvironmentInput() inEnvConfig.CustomResourcesURLs = nil mockParser := mocks.NewMockembedFS(ctrl) mockParser.EXPECT().Read(gomock.Any()).Return(&template.Content{Buffer: bytes.NewBufferString("data")}, nil).AnyTimes() mockParser.EXPECT().ParseEnv(gomock.Any()).DoAndReturn(func(data *template.EnvOpts) (*template.Content, error) { require.Equal(t, map[string]template.S3ObjectLocation{ "CertificateReplicatorFunction": { Bucket: "mockbucket", Key: "manual/scripts/custom-resources/certificatereplicatorfunction/8932747ba5dbff619d89b92d0033ef1d04f7dd1b055e073254907d4e38e3976d.zip", }, "CertificateValidationFunction": { Bucket: "mockbucket", Key: "manual/scripts/custom-resources/certificatevalidationfunction/8932747ba5dbff619d89b92d0033ef1d04f7dd1b055e073254907d4e38e3976d.zip", }, "DNSDelegationFunction": { Bucket: "mockbucket", Key: "manual/scripts/custom-resources/dnsdelegationfunction/8932747ba5dbff619d89b92d0033ef1d04f7dd1b055e073254907d4e38e3976d.zip", }, "UniqueJSONValuesFunction": { Bucket: "mockbucket", Key: "manual/scripts/custom-resources/uniquejsonvaluesfunction/8932747ba5dbff619d89b92d0033ef1d04f7dd1b055e073254907d4e38e3976d.zip", }, "CustomDomainFunction": { Bucket: "mockbucket", Key: "manual/scripts/custom-resources/customdomainfunction/8932747ba5dbff619d89b92d0033ef1d04f7dd1b055e073254907d4e38e3976d.zip", }, }, data.CustomResources) return &template.Content{Buffer: bytes.NewBufferString("mockTemplate")}, nil }) fs = mockParser // WHEN envStack, err := NewEnvConfigFromExistingStack(inEnvConfig, "mockPreviousForceUpdateID", nil) require.NoError(t, err) got, err := envStack.Template() // THEN require.NoError(t, err) require.Equal(t, mockTemplate, got) }) } func TestEnv_Parameters(t *testing.T) { t.Cleanup(func() { fs = realEmbedFS }) fs = templatetest.Stub{} deploymentInput := mockDeployEnvironmentInput() deploymentInputWithDNS := mockDeployEnvironmentInput() deploymentInputWithDNS.App.Domain = "ecs.aws" deploymentInputWithPrivateDNS := mockDeployEnvironmentInput() deploymentInputWithPrivateDNS.Mft.HTTPConfig.Private.Certificates = []string{"arn:aws:acm:us-east-1:123456789012:certificate/12345678-1234-1234-1234-123456789012"} testCases := map[string]struct { input *EnvConfig oldParams []*cloudformation.Parameter want []*cloudformation.Parameter }{ "without DNS": { input: deploymentInput, want: []*cloudformation.Parameter{ { ParameterKey: aws.String(envParamAppNameKey), ParameterValue: aws.String(deploymentInput.App.Name), }, { ParameterKey: aws.String(envParamEnvNameKey), ParameterValue: aws.String(deploymentInput.Name), }, { ParameterKey: aws.String(envParamToolsAccountPrincipalKey), ParameterValue: aws.String(deploymentInput.App.AccountPrincipalARN), }, { ParameterKey: aws.String(envParamAppDNSKey), ParameterValue: aws.String(""), }, { ParameterKey: aws.String(envParamAppDNSDelegationRoleKey), ParameterValue: aws.String(""), }, { ParameterKey: aws.String(EnvParamAliasesKey), ParameterValue: aws.String(""), }, { ParameterKey: aws.String(EnvParamALBWorkloadsKey), ParameterValue: aws.String(""), }, { ParameterKey: aws.String(envParamInternalALBWorkloadsKey), ParameterValue: aws.String(""), }, { ParameterKey: aws.String(envParamEFSWorkloadsKey), ParameterValue: aws.String(""), }, { ParameterKey: aws.String(envParamNATWorkloadsKey), ParameterValue: aws.String(""), }, { ParameterKey: aws.String(EnvParamServiceDiscoveryEndpoint), ParameterValue: aws.String("env.project.local"), }, { ParameterKey: aws.String(envParamCreateHTTPSListenerKey), ParameterValue: aws.String("false"), }, { ParameterKey: aws.String(envParamCreateInternalHTTPSListenerKey), ParameterValue: aws.String("false"), }, { ParameterKey: aws.String(envParamAppRunnerPrivateWorkloadsKey), ParameterValue: aws.String(""), }, }, }, "with DNS": { input: deploymentInputWithDNS, want: []*cloudformation.Parameter{ { ParameterKey: aws.String(envParamAppNameKey), ParameterValue: aws.String(deploymentInputWithDNS.App.Name), }, { ParameterKey: aws.String(envParamEnvNameKey), ParameterValue: aws.String(deploymentInputWithDNS.Name), }, { ParameterKey: aws.String(envParamToolsAccountPrincipalKey), ParameterValue: aws.String(deploymentInputWithDNS.App.AccountPrincipalARN), }, { ParameterKey: aws.String(envParamAppDNSKey), ParameterValue: aws.String(deploymentInputWithDNS.App.Domain), }, { ParameterKey: aws.String(envParamAppDNSDelegationRoleKey), ParameterValue: aws.String("arn:aws:iam::000000000:role/project-DNSDelegationRole"), }, { ParameterKey: aws.String(EnvParamServiceDiscoveryEndpoint), ParameterValue: aws.String("env.project.local"), }, { ParameterKey: aws.String(envParamCreateHTTPSListenerKey), ParameterValue: aws.String("true"), }, { ParameterKey: aws.String(EnvParamAliasesKey), ParameterValue: aws.String(""), }, { ParameterKey: aws.String(EnvParamALBWorkloadsKey), ParameterValue: aws.String(""), }, { ParameterKey: aws.String(envParamInternalALBWorkloadsKey), ParameterValue: aws.String(""), }, { ParameterKey: aws.String(envParamEFSWorkloadsKey), ParameterValue: aws.String(""), }, { ParameterKey: aws.String(envParamNATWorkloadsKey), ParameterValue: aws.String(""), }, { ParameterKey: aws.String(envParamCreateInternalHTTPSListenerKey), ParameterValue: aws.String("false"), }, { ParameterKey: aws.String(envParamAppRunnerPrivateWorkloadsKey), ParameterValue: aws.String(""), }, }, }, "with private DNS only": { input: deploymentInputWithPrivateDNS, want: []*cloudformation.Parameter{ { ParameterKey: aws.String(envParamAppNameKey), ParameterValue: aws.String(deploymentInput.App.Name), }, { ParameterKey: aws.String(envParamEnvNameKey), ParameterValue: aws.String(deploymentInput.Name), }, { ParameterKey: aws.String(envParamToolsAccountPrincipalKey), ParameterValue: aws.String(deploymentInput.App.AccountPrincipalARN), }, { ParameterKey: aws.String(envParamAppDNSKey), ParameterValue: aws.String(""), }, { ParameterKey: aws.String(envParamAppDNSDelegationRoleKey), ParameterValue: aws.String(""), }, { ParameterKey: aws.String(EnvParamAliasesKey), ParameterValue: aws.String(""), }, { ParameterKey: aws.String(EnvParamALBWorkloadsKey), ParameterValue: aws.String(""), }, { ParameterKey: aws.String(envParamInternalALBWorkloadsKey), ParameterValue: aws.String(""), }, { ParameterKey: aws.String(envParamEFSWorkloadsKey), ParameterValue: aws.String(""), }, { ParameterKey: aws.String(envParamNATWorkloadsKey), ParameterValue: aws.String(""), }, { ParameterKey: aws.String(EnvParamServiceDiscoveryEndpoint), ParameterValue: aws.String("env.project.local"), }, { ParameterKey: aws.String(envParamCreateHTTPSListenerKey), ParameterValue: aws.String("false"), }, { ParameterKey: aws.String(envParamCreateInternalHTTPSListenerKey), ParameterValue: aws.String("true"), }, { ParameterKey: aws.String(envParamAppRunnerPrivateWorkloadsKey), ParameterValue: aws.String(""), }, }, }, "should use default value for new EnvControllerParameters": { input: deploymentInput, oldParams: []*cloudformation.Parameter{ { ParameterKey: aws.String(EnvParamALBWorkloadsKey), ParameterValue: aws.String("frontend,backend"), }, { ParameterKey: aws.String(envParamNATWorkloadsKey), ParameterValue: aws.String("backend"), }, { ParameterKey: aws.String(EnvParamAliasesKey), ParameterValue: aws.String(""), }, { ParameterKey: aws.String(envParamEFSWorkloadsKey), ParameterValue: aws.String(""), }, { ParameterKey: aws.String(envParamAppNameKey), ParameterValue: aws.String(deploymentInput.App.Name), }, { ParameterKey: aws.String(envParamEnvNameKey), ParameterValue: aws.String(deploymentInput.Name), }, { ParameterKey: aws.String(envParamToolsAccountPrincipalKey), ParameterValue: aws.String(deploymentInput.App.AccountPrincipalARN), }, { ParameterKey: aws.String(envParamAppDNSKey), ParameterValue: aws.String(""), }, { ParameterKey: aws.String(envParamAppDNSDelegationRoleKey), ParameterValue: aws.String(""), }, { ParameterKey: aws.String(EnvParamServiceDiscoveryEndpoint), ParameterValue: aws.String("mockenv.mockapp.local"), }, { ParameterKey: aws.String(envParamCreateHTTPSListenerKey), ParameterValue: aws.String("false"), }, { ParameterKey: aws.String(envParamCreateInternalHTTPSListenerKey), ParameterValue: aws.String("false"), }, { ParameterKey: aws.String(envParamAppRunnerPrivateWorkloadsKey), ParameterValue: aws.String("rdws-backend"), }, }, want: []*cloudformation.Parameter{ { ParameterKey: aws.String(envParamAppNameKey), ParameterValue: aws.String(deploymentInput.App.Name), }, { ParameterKey: aws.String(envParamEnvNameKey), ParameterValue: aws.String(deploymentInput.Name), }, { ParameterKey: aws.String(envParamToolsAccountPrincipalKey), ParameterValue: aws.String(deploymentInput.App.AccountPrincipalARN), }, { ParameterKey: aws.String(envParamAppDNSKey), ParameterValue: aws.String(""), }, { ParameterKey: aws.String(envParamAppDNSDelegationRoleKey), ParameterValue: aws.String(""), }, { ParameterKey: aws.String(EnvParamAliasesKey), ParameterValue: aws.String(""), }, { ParameterKey: aws.String(EnvParamALBWorkloadsKey), ParameterValue: aws.String("frontend,backend"), }, { ParameterKey: aws.String(envParamInternalALBWorkloadsKey), ParameterValue: aws.String(""), }, { ParameterKey: aws.String(envParamEFSWorkloadsKey), ParameterValue: aws.String(""), }, { ParameterKey: aws.String(envParamNATWorkloadsKey), ParameterValue: aws.String("backend"), }, { ParameterKey: aws.String(EnvParamServiceDiscoveryEndpoint), ParameterValue: aws.String("mockenv.mockapp.local"), }, { ParameterKey: aws.String(envParamCreateHTTPSListenerKey), ParameterValue: aws.String("false"), }, { ParameterKey: aws.String(envParamCreateInternalHTTPSListenerKey), ParameterValue: aws.String("false"), }, { ParameterKey: aws.String(envParamAppRunnerPrivateWorkloadsKey), ParameterValue: aws.String("rdws-backend"), }, }, }, "should retain the values from EnvControllerParameters": { input: deploymentInput, oldParams: []*cloudformation.Parameter{ { ParameterKey: aws.String(EnvParamALBWorkloadsKey), ParameterValue: aws.String("frontend,backend"), }, { ParameterKey: aws.String(envParamNATWorkloadsKey), ParameterValue: aws.String("backend"), }, { ParameterKey: aws.String(envParamAppRunnerPrivateWorkloadsKey), ParameterValue: aws.String("rdws-backend"), }, { ParameterKey: aws.String(EnvParamAliasesKey), ParameterValue: aws.String(""), }, { ParameterKey: aws.String(envParamInternalALBWorkloadsKey), ParameterValue: aws.String(""), }, { ParameterKey: aws.String(envParamEFSWorkloadsKey), ParameterValue: aws.String(""), }, { ParameterKey: aws.String(envParamAppNameKey), ParameterValue: aws.String(deploymentInput.App.Name), }, { ParameterKey: aws.String(envParamEnvNameKey), ParameterValue: aws.String(deploymentInput.Name), }, { ParameterKey: aws.String(envParamToolsAccountPrincipalKey), ParameterValue: aws.String(deploymentInput.App.AccountPrincipalARN), }, { ParameterKey: aws.String(envParamAppDNSKey), ParameterValue: aws.String(""), }, { ParameterKey: aws.String(envParamAppDNSDelegationRoleKey), ParameterValue: aws.String(""), }, { ParameterKey: aws.String(EnvParamServiceDiscoveryEndpoint), ParameterValue: aws.String("mockenv.mockapp.local"), }, { ParameterKey: aws.String(envParamCreateHTTPSListenerKey), ParameterValue: aws.String("false"), }, { ParameterKey: aws.String(envParamCreateInternalHTTPSListenerKey), ParameterValue: aws.String("false"), }, }, want: []*cloudformation.Parameter{ { ParameterKey: aws.String(envParamAppNameKey), ParameterValue: aws.String(deploymentInput.App.Name), }, { ParameterKey: aws.String(envParamEnvNameKey), ParameterValue: aws.String(deploymentInput.Name), }, { ParameterKey: aws.String(envParamToolsAccountPrincipalKey), ParameterValue: aws.String(deploymentInput.App.AccountPrincipalARN), }, { ParameterKey: aws.String(envParamAppDNSKey), ParameterValue: aws.String(""), }, { ParameterKey: aws.String(envParamAppDNSDelegationRoleKey), ParameterValue: aws.String(""), }, { ParameterKey: aws.String(EnvParamAliasesKey), ParameterValue: aws.String(""), }, { ParameterKey: aws.String(EnvParamALBWorkloadsKey), ParameterValue: aws.String("frontend,backend"), }, { ParameterKey: aws.String(envParamInternalALBWorkloadsKey), ParameterValue: aws.String(""), }, { ParameterKey: aws.String(envParamEFSWorkloadsKey), ParameterValue: aws.String(""), }, { ParameterKey: aws.String(envParamNATWorkloadsKey), ParameterValue: aws.String("backend"), }, { ParameterKey: aws.String(EnvParamServiceDiscoveryEndpoint), ParameterValue: aws.String("mockenv.mockapp.local"), }, { ParameterKey: aws.String(envParamCreateHTTPSListenerKey), ParameterValue: aws.String("false"), }, { ParameterKey: aws.String(envParamCreateInternalHTTPSListenerKey), ParameterValue: aws.String("false"), }, { ParameterKey: aws.String(envParamAppRunnerPrivateWorkloadsKey), ParameterValue: aws.String("rdws-backend"), }, }, }, "should not include old parameters that are deleted": { input: deploymentInput, oldParams: []*cloudformation.Parameter{ { ParameterKey: aws.String("deprecated"), }, { ParameterKey: aws.String(EnvParamALBWorkloadsKey), ParameterValue: aws.String(""), }, { ParameterKey: aws.String(envParamNATWorkloadsKey), ParameterValue: aws.String(""), }, { ParameterKey: aws.String(EnvParamAliasesKey), ParameterValue: aws.String(""), }, { ParameterKey: aws.String(envParamInternalALBWorkloadsKey), ParameterValue: aws.String(""), }, { ParameterKey: aws.String(envParamEFSWorkloadsKey), ParameterValue: aws.String(""), }, { ParameterKey: aws.String(envParamAppNameKey), ParameterValue: aws.String(deploymentInput.App.Name), }, { ParameterKey: aws.String(envParamEnvNameKey), ParameterValue: aws.String(deploymentInput.Name), }, { ParameterKey: aws.String(envParamToolsAccountPrincipalKey), ParameterValue: aws.String(deploymentInput.App.AccountPrincipalARN), }, { ParameterKey: aws.String(envParamAppDNSKey), ParameterValue: aws.String(""), }, { ParameterKey: aws.String(envParamAppDNSDelegationRoleKey), ParameterValue: aws.String(""), }, { ParameterKey: aws.String(EnvParamServiceDiscoveryEndpoint), ParameterValue: aws.String("mockenv.mockapp.local"), }, { ParameterKey: aws.String(envParamCreateHTTPSListenerKey), ParameterValue: aws.String("false"), }, { ParameterKey: aws.String(envParamCreateInternalHTTPSListenerKey), ParameterValue: aws.String("false"), }, { ParameterKey: aws.String(envParamAppRunnerPrivateWorkloadsKey), ParameterValue: aws.String(""), }, }, want: []*cloudformation.Parameter{ { ParameterKey: aws.String(envParamAppNameKey), ParameterValue: aws.String(deploymentInput.App.Name), }, { ParameterKey: aws.String(envParamEnvNameKey), ParameterValue: aws.String(deploymentInput.Name), }, { ParameterKey: aws.String(envParamToolsAccountPrincipalKey), ParameterValue: aws.String(deploymentInput.App.AccountPrincipalARN), }, { ParameterKey: aws.String(envParamAppDNSKey), ParameterValue: aws.String(""), }, { ParameterKey: aws.String(envParamAppDNSDelegationRoleKey), ParameterValue: aws.String(""), }, { ParameterKey: aws.String(EnvParamAliasesKey), ParameterValue: aws.String(""), }, { ParameterKey: aws.String(EnvParamALBWorkloadsKey), ParameterValue: aws.String(""), }, { ParameterKey: aws.String(envParamInternalALBWorkloadsKey), ParameterValue: aws.String(""), }, { ParameterKey: aws.String(envParamEFSWorkloadsKey), ParameterValue: aws.String(""), }, { ParameterKey: aws.String(envParamNATWorkloadsKey), ParameterValue: aws.String(""), }, { ParameterKey: aws.String(EnvParamServiceDiscoveryEndpoint), ParameterValue: aws.String("mockenv.mockapp.local"), }, { ParameterKey: aws.String(envParamCreateHTTPSListenerKey), ParameterValue: aws.String("false"), }, { ParameterKey: aws.String(envParamCreateInternalHTTPSListenerKey), ParameterValue: aws.String("false"), }, { ParameterKey: aws.String(envParamAppRunnerPrivateWorkloadsKey), ParameterValue: aws.String(""), }, }, }, "should reuse old service discovery endpoint value": { input: deploymentInput, oldParams: []*cloudformation.Parameter{ { ParameterKey: aws.String(EnvParamServiceDiscoveryEndpoint), ParameterValue: aws.String("app.local"), }, { ParameterKey: aws.String(EnvParamALBWorkloadsKey), ParameterValue: aws.String(""), }, { ParameterKey: aws.String(envParamNATWorkloadsKey), ParameterValue: aws.String(""), }, { ParameterKey: aws.String(EnvParamAliasesKey), ParameterValue: aws.String(""), }, { ParameterKey: aws.String(envParamInternalALBWorkloadsKey), ParameterValue: aws.String(""), }, { ParameterKey: aws.String(envParamEFSWorkloadsKey), ParameterValue: aws.String(""), }, { ParameterKey: aws.String(envParamAppNameKey), ParameterValue: aws.String(deploymentInput.App.Name), }, { ParameterKey: aws.String(envParamEnvNameKey), ParameterValue: aws.String(deploymentInput.Name), }, { ParameterKey: aws.String(envParamToolsAccountPrincipalKey), ParameterValue: aws.String(deploymentInput.App.AccountPrincipalARN), }, { ParameterKey: aws.String(envParamAppDNSKey), ParameterValue: aws.String(""), }, { ParameterKey: aws.String(envParamAppDNSDelegationRoleKey), ParameterValue: aws.String(""), }, { ParameterKey: aws.String(envParamCreateHTTPSListenerKey), ParameterValue: aws.String("false"), }, { ParameterKey: aws.String(envParamCreateInternalHTTPSListenerKey), ParameterValue: aws.String("false"), }, { ParameterKey: aws.String(envParamAppRunnerPrivateWorkloadsKey), ParameterValue: aws.String(""), }, }, want: []*cloudformation.Parameter{ { ParameterKey: aws.String(envParamAppNameKey), ParameterValue: aws.String(deploymentInput.App.Name), }, { ParameterKey: aws.String(envParamEnvNameKey), ParameterValue: aws.String(deploymentInput.Name), }, { ParameterKey: aws.String(envParamToolsAccountPrincipalKey), ParameterValue: aws.String(deploymentInput.App.AccountPrincipalARN), }, { ParameterKey: aws.String(envParamAppDNSKey), ParameterValue: aws.String(""), }, { ParameterKey: aws.String(envParamAppDNSDelegationRoleKey), ParameterValue: aws.String(""), }, { ParameterKey: aws.String(EnvParamAliasesKey), ParameterValue: aws.String(""), }, { ParameterKey: aws.String(EnvParamALBWorkloadsKey), ParameterValue: aws.String(""), }, { ParameterKey: aws.String(envParamInternalALBWorkloadsKey), ParameterValue: aws.String(""), }, { ParameterKey: aws.String(envParamEFSWorkloadsKey), ParameterValue: aws.String(""), }, { ParameterKey: aws.String(envParamNATWorkloadsKey), ParameterValue: aws.String(""), }, { ParameterKey: aws.String(EnvParamServiceDiscoveryEndpoint), ParameterValue: aws.String("app.local"), }, { ParameterKey: aws.String(envParamCreateHTTPSListenerKey), ParameterValue: aws.String("false"), }, { ParameterKey: aws.String(envParamCreateInternalHTTPSListenerKey), ParameterValue: aws.String("false"), }, { ParameterKey: aws.String(envParamAppRunnerPrivateWorkloadsKey), ParameterValue: aws.String(""), }, }, }, "should use app.local endpoint service discovery endpoint if it is a new parameter": { input: deploymentInput, oldParams: []*cloudformation.Parameter{ { ParameterKey: aws.String(EnvParamALBWorkloadsKey), ParameterValue: aws.String(""), }, { ParameterKey: aws.String(envParamAppNameKey), ParameterValue: aws.String(deploymentInput.App.Name), }, { ParameterKey: aws.String(envParamEnvNameKey), ParameterValue: aws.String(deploymentInput.Name), }, { ParameterKey: aws.String(envParamToolsAccountPrincipalKey), ParameterValue: aws.String(deploymentInput.App.AccountPrincipalARN), }, { ParameterKey: aws.String(envParamAppDNSKey), ParameterValue: aws.String(""), }, { ParameterKey: aws.String(envParamAppDNSDelegationRoleKey), ParameterValue: aws.String(""), }, { ParameterKey: aws.String(envParamAppRunnerPrivateWorkloadsKey), ParameterValue: aws.String(""), }, }, want: []*cloudformation.Parameter{ { ParameterKey: aws.String(envParamAppNameKey), ParameterValue: aws.String(deploymentInput.App.Name), }, { ParameterKey: aws.String(envParamEnvNameKey), ParameterValue: aws.String(deploymentInput.Name), }, { ParameterKey: aws.String(envParamToolsAccountPrincipalKey), ParameterValue: aws.String(deploymentInput.App.AccountPrincipalARN), }, { ParameterKey: aws.String(envParamAppDNSKey), ParameterValue: aws.String(""), }, { ParameterKey: aws.String(envParamAppDNSDelegationRoleKey), ParameterValue: aws.String(""), }, { ParameterKey: aws.String(EnvParamAliasesKey), ParameterValue: aws.String(""), }, { ParameterKey: aws.String(EnvParamALBWorkloadsKey), ParameterValue: aws.String(""), }, { ParameterKey: aws.String(envParamInternalALBWorkloadsKey), ParameterValue: aws.String(""), }, { ParameterKey: aws.String(envParamEFSWorkloadsKey), ParameterValue: aws.String(""), }, { ParameterKey: aws.String(envParamNATWorkloadsKey), ParameterValue: aws.String(""), }, { ParameterKey: aws.String(EnvParamServiceDiscoveryEndpoint), ParameterValue: aws.String("project.local"), }, { ParameterKey: aws.String(envParamCreateHTTPSListenerKey), ParameterValue: aws.String("false"), }, { ParameterKey: aws.String(envParamCreateInternalHTTPSListenerKey), ParameterValue: aws.String("false"), }, { ParameterKey: aws.String(envParamAppRunnerPrivateWorkloadsKey), ParameterValue: aws.String(""), }, }, }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { env, err := NewEnvConfigFromExistingStack(tc.input, "", tc.oldParams) require.NoError(t, err) params, err := env.Parameters() require.NoError(t, err) require.ElementsMatch(t, tc.want, params) }) } } func TestEnv_Tags(t *testing.T) { env := &Env{ in: &EnvConfig{ Name: "env", App: deploy.AppInformation{ Name: "project", }, AdditionalTags: map[string]string{ "owner": "boss", deploy.AppTagKey: "overrideproject", }, }, } expectedTags := []*cloudformation.Tag{ { Key: aws.String(deploy.AppTagKey), Value: aws.String("project"), // Ignore user's overrides. }, { Key: aws.String(deploy.EnvTagKey), Value: aws.String("env"), }, { Key: aws.String("owner"), Value: aws.String("boss"), }, } require.ElementsMatch(t, expectedTags, env.Tags()) } func TestStackName(t *testing.T) { deploymentInput := mockDeployEnvironmentInput() env := &Env{ in: deploymentInput, } require.Equal(t, fmt.Sprintf("%s-%s", deploymentInput.App.Name, deploymentInput.Name), env.StackName()) } func TestBootstrapEnv_Template(t *testing.T) { testCases := map[string]struct { in *EnvConfig setupMock func(m *mocks.MockenvReadParser) expectedOutput string wantedError error }{ "error parsing the template": { in: &EnvConfig{}, setupMock: func(m *mocks.MockenvReadParser) { m.EXPECT().ParseEnvBootstrap(gomock.Any(), gomock.Any()).Return(nil, errors.New("some error")) }, wantedError: errors.New("some error"), }, "should return template body when present": { in: &EnvConfig{ ArtifactBucketARN: "mockBucketARN", ArtifactBucketKeyARN: "mockBucketKeyARN", }, setupMock: func(m *mocks.MockenvReadParser) { m.EXPECT().ParseEnvBootstrap(gomock.Any(), gomock.Any()).DoAndReturn(func(data *template.EnvOpts, options ...template.ParseOption) (*template.Content, error) { require.Equal(t, &template.EnvOpts{ ArtifactBucketARN: "mockBucketARN", ArtifactBucketKeyARN: "mockBucketKeyARN", }, data) return &template.Content{Buffer: bytes.NewBufferString("mockTemplate")}, nil }) }, expectedOutput: "mockTemplate", }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { // GIVEN ctrl := gomock.NewController(t) defer ctrl.Finish() mockParser := mocks.NewMockenvReadParser(ctrl) tc.setupMock(mockParser) bootstrapStack := &BootstrapEnv{ in: tc.in, parser: mockParser, } // WHEN got, err := bootstrapStack.Template() // THEN if tc.wantedError != nil { require.EqualError(t, err, tc.wantedError.Error()) } else { require.NoError(t, err) require.Equal(t, tc.expectedOutput, got) } }) } } func TestBootstrapEnv_Parameters(t *testing.T) { testCases := map[string]struct { input *EnvConfig want []*cloudformation.Parameter }{ "returns correct parameters": { input: &EnvConfig{ App: deploy.AppInformation{ Name: "mockApp", AccountPrincipalARN: "mockAccountPrincipalARN", }, Name: "mockEnv", }, want: []*cloudformation.Parameter{ { ParameterKey: aws.String(envParamAppNameKey), ParameterValue: aws.String("mockApp"), }, { ParameterKey: aws.String(envParamToolsAccountPrincipalKey), ParameterValue: aws.String("mockAccountPrincipalARN"), }, { ParameterKey: aws.String(envParamEnvNameKey), ParameterValue: aws.String("mockEnv"), }, }, }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { bootstrap := &BootstrapEnv{ in: tc.input, } params, err := bootstrap.Parameters() require.NoError(t, err) require.ElementsMatch(t, tc.want, params) }) } } func TestBootstrapEnv_Tags(t *testing.T) { bootstrap := &BootstrapEnv{ in: &EnvConfig{ Name: "env", App: deploy.AppInformation{ Name: "project", }, AdditionalTags: map[string]string{ "owner": "boss", deploy.AppTagKey: "overrideproject", }, }, } expectedTags := []*cloudformation.Tag{ { Key: aws.String(deploy.AppTagKey), Value: aws.String("project"), // Ignore user's overrides. }, { Key: aws.String(deploy.EnvTagKey), Value: aws.String("env"), }, { Key: aws.String("owner"), Value: aws.String("boss"), }, } require.ElementsMatch(t, expectedTags, bootstrap.Tags()) } func TestBootstrapEnv_StackName(t *testing.T) { bootstrap := &BootstrapEnv{ in: &EnvConfig{ App: deploy.AppInformation{ Name: "mockApp", }, Name: "mockEnv", }, } require.Equal(t, "mockApp-mockEnv", bootstrap.StackName()) } func TestBootstrapEnv_ToEnv(t *testing.T) { mockDeployInput := mockDeployEnvironmentInput() testCases := map[string]struct { expectedEnv config.Environment mockStack *cloudformation.Stack want error }{ "should return error if Stack ID is invalid": { want: fmt.Errorf("couldn't extract region and account from stack ID : arn: invalid prefix"), mockStack: mockEnvironmentStack("", "", ""), }, "should return a well formed environment": { mockStack: mockEnvironmentStack( "arn:aws:cloudformation:eu-west-3:902697171733:stack/project-env", "arn:aws:iam::902697171733:role/phonetool-test-EnvManagerRole", "arn:aws:iam::902697171733:role/phonetool-test-CFNExecutionRole"), expectedEnv: config.Environment{ Name: mockDeployInput.Name, App: mockDeployInput.App.Name, AccountID: "902697171733", Region: "eu-west-3", ManagerRoleARN: "arn:aws:iam::902697171733:role/phonetool-test-EnvManagerRole", ExecutionRoleARN: "arn:aws:iam::902697171733:role/phonetool-test-CFNExecutionRole", }, }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { envStack := &BootstrapEnv{ in: mockDeployInput, } got, err := envStack.ToEnvMetadata(tc.mockStack) if tc.want != nil { require.EqualError(t, tc.want, err.Error()) } else { require.NoError(t, err) require.Equal(t, tc.expectedEnv, *got) } }) } } func mockEnvironmentStack(stackArn, managerRoleARN, executionRoleARN string) *cloudformation.Stack { return &cloudformation.Stack{ StackId: aws.String(stackArn), Outputs: []*cloudformation.Output{ { OutputKey: aws.String(envOutputManagerRoleKey), OutputValue: aws.String(managerRoleARN), }, { OutputKey: aws.String(envOutputCFNExecutionRoleARN), OutputValue: aws.String(executionRoleARN), }, }, } } func mockDeployEnvironmentInput() *EnvConfig { return &EnvConfig{ Name: "env", App: deploy.AppInformation{ Name: "project", AccountPrincipalARN: "arn:aws:iam::000000000:root", }, CustomResourcesURLs: map[string]string{ "CertificateValidationFunction": "https://mockbucket.s3-us-west-2.amazonaws.com/mockkey1", "DNSDelegationFunction": "https://mockbucket.s3-us-west-2.amazonaws.com/mockkey2", "CustomDomainFunction": "https://mockbucket.s3-us-west-2.amazonaws.com/mockkey4", }, ArtifactBucketARN: "arn:aws:s3:::mockbucket", Mft: &manifest.Environment{ Workload: manifest.Workload{ Name: aws.String("env"), Type: aws.String("Environment"), }, }, RawMft: []byte(`name: env type: Environment `), } }
1,282
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package stack_test import ( "os" "path/filepath" "testing" "github.com/aws/copilot-cli/internal/pkg/config" "github.com/aws/copilot-cli/internal/pkg/manifest" "gopkg.in/yaml.v3" "github.com/aws/copilot-cli/internal/pkg/deploy" "github.com/aws/copilot-cli/internal/pkg/deploy/cloudformation/stack" "github.com/stretchr/testify/require" ) // TestGHv1Pipeline_Template ensures that the CloudFormation template generated for a pipeline matches our pre-defined template. func TestGHv1Pipeline_Template(t *testing.T) { var stage deploy.PipelineStage stage.Init(&config.Environment{ App: "phonetool", Name: "test", Region: "us-west-2", AccountID: "1111", ExecutionRoleARN: "arn:aws:iam::1111:role/phonetool-test-CFNExecutionRole", ManagerRoleARN: "arn:aws:iam::1111:role/phonetool-test-EnvManagerRole", }, &manifest.PipelineStage{ Name: "test", TestCommands: []string{`echo "test"`}, }, []string{"api"}) ps := stack.NewPipelineStackConfig(&deploy.CreatePipelineInput{ AppName: "phonetool", Name: "phonetool-pipeline", Source: &deploy.GitHubV1Source{ ProviderName: manifest.GithubV1ProviderName, RepositoryURL: "https://github.com/aws/phonetool", Branch: "mainline", PersonalAccessTokenSecretID: "my secret", }, Build: &deploy.Build{ Image: "aws/codebuild/amazonlinux2-x86_64-standard:3.0", EnvironmentType: "LINUX_CONTAINER", BuildspecPath: "copilot/buildspec.yml", }, Stages: []deploy.PipelineStage{stage}, ArtifactBuckets: []deploy.ArtifactBucket{ { BucketName: "fancy-bucket", KeyArn: "arn:aws:kms:us-west-2:1111:key/abcd", }, }, AdditionalTags: nil, }) actual, err := ps.Template() require.NoError(t, err, "template should have rendered successfully") actualInBytes := []byte(actual) m1 := make(map[interface{}]interface{}) require.NoError(t, yaml.Unmarshal(actualInBytes, m1)) wanted, err := os.ReadFile(filepath.Join("testdata", "pipeline", "ghv1_template.yml")) require.NoError(t, err, "should be able to read expected template file") wantedInBytes := []byte(wanted) m2 := make(map[interface{}]interface{}) require.NoError(t, yaml.Unmarshal(wantedInBytes, m2)) require.Equal(t, m2, m1) }
73
copilot-cli
aws
Go
//go:build integration || localintegration // Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package stack_test import ( "os" "path/filepath" "testing" "github.com/aws/copilot-cli/internal/pkg/config" "github.com/aws/copilot-cli/internal/pkg/manifest" "gopkg.in/yaml.v3" "github.com/aws/copilot-cli/internal/pkg/deploy" "github.com/aws/copilot-cli/internal/pkg/deploy/cloudformation/stack" "github.com/stretchr/testify/require" ) // TestGHPipeline_Template ensures that the CloudFormation template generated for a pipeline matches our pre-defined template. func TestGHPipeline_Template(t *testing.T) { var build deploy.Build build.Init(nil, "copilot/pipelines/phonetool-pipeline/") var stage deploy.PipelineStage stage.Init(&config.Environment{ App: "phonetool", Name: "test", Region: "us-west-2", AccountID: "1111", ExecutionRoleARN: "arn:aws:iam::1111:role/phonetool-test-CFNExecutionRole", ManagerRoleARN: "arn:aws:iam::1111:role/phonetool-test-EnvManagerRole", }, &manifest.PipelineStage{ Name: "test", TestCommands: []string{`echo "test"`}, RequiresApproval: true, }, []string{"api", "frontend"}) ps := stack.NewPipelineStackConfig(&deploy.CreatePipelineInput{ AppName: "phonetool", Name: "phonetool-pipeline", Source: &deploy.GitHubSource{ ProviderName: manifest.GithubProviderName, RepositoryURL: "https://github.com/aws/phonetool", Branch: "mainline", }, Build: &build, Stages: []deploy.PipelineStage{stage}, ArtifactBuckets: []deploy.ArtifactBucket{ { BucketName: "fancy-bucket", KeyArn: "arn:aws:kms:us-west-2:1111:key/abcd", }, }, AdditionalTags: nil, }) actual, err := ps.Template() require.NoError(t, err, "template should have rendered successfully") actualInBytes := []byte(actual) m1 := make(map[interface{}]interface{}) require.NoError(t, yaml.Unmarshal(actualInBytes, m1)) wanted, err := os.ReadFile(filepath.Join("testdata", "pipeline", "gh_template.yaml")) require.NoError(t, err, "should be able to read expected template file") wantedInBytes := []byte(wanted) m2 := make(map[interface{}]interface{}) require.NoError(t, yaml.Unmarshal(wantedInBytes, m2)) require.Equal(t, m2, m1) }
73
copilot-cli
aws
Go
//go:build integration || localintegration // Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package stack_test import ( "fmt" "os" "path/filepath" "regexp" "testing" "github.com/spf13/afero" "gopkg.in/yaml.v3" "github.com/aws/aws-sdk-go/aws" "github.com/aws/aws-sdk-go/aws/session" "github.com/aws/copilot-cli/internal/pkg/addon" "github.com/aws/copilot-cli/internal/pkg/config" "github.com/aws/copilot-cli/internal/pkg/deploy/cloudformation/stack" "github.com/aws/copilot-cli/internal/pkg/manifest" "github.com/aws/copilot-cli/internal/pkg/workspace" "github.com/stretchr/testify/require" ) const ( svcGrpcManifestPath = "svc-grpc-manifest.yml" ) func TestGrpcLoadBalancedWebService_Template(t *testing.T) { testCases := map[string]struct { envName string svcStackPath string svcParamsPath string }{ "default env": { envName: "test", svcStackPath: "svc-grpc-test.stack.yml", svcParamsPath: "svc-grpc-test.params.json", }, } path := filepath.Join("testdata", "workloads", svcGrpcManifestPath) manifestBytes, err := os.ReadFile(path) require.NoError(t, err) for name, tc := range testCases { interpolated, err := manifest.NewInterpolator(appName, tc.envName).Interpolate(string(manifestBytes)) require.NoError(t, err) mft, err := manifest.UnmarshalWorkload([]byte(interpolated)) require.NoError(t, err) envMft, err := mft.ApplyEnv(tc.envName) require.NoError(t, err) err = envMft.Validate() require.NoError(t, err) err = envMft.Load(session.New()) require.NoError(t, err) content := envMft.Manifest() v, ok := content.(*manifest.LoadBalancedWebService) require.True(t, ok) // Create in-memory mock file system. wd, err := os.Getwd() require.NoError(t, err) fs := afero.NewMemMapFs() _ = fs.MkdirAll(fmt.Sprintf("%s/copilot", wd), 0755) _ = afero.WriteFile(fs, fmt.Sprintf("%s/copilot/.workspace", wd), []byte(fmt.Sprintf("---\napplication: %s", "DavidsApp")), 0644) require.NoError(t, err) ws, err := workspace.Use(fs) _, err = addon.ParseFromWorkload(aws.StringValue(v.Name), ws) var notFound *addon.ErrAddonsNotFound require.ErrorAs(t, err, &notFound) envConfig := &manifest.Environment{ Workload: manifest.Workload{ Name: &tc.envName, }, } envConfig.HTTPConfig.Public.Certificates = []string{"mockCertARN"} svcDiscoveryEndpointName := fmt.Sprintf("%s.%s.local", tc.envName, appName) serializer, err := stack.NewLoadBalancedWebService(stack.LoadBalancedWebServiceConfig{ App: &config.Application{Name: appName}, EnvManifest: envConfig, Manifest: v, ArtifactBucketName: "bucket", RuntimeConfig: stack.RuntimeConfig{ ServiceDiscoveryEndpoint: svcDiscoveryEndpointName, AccountID: "123456789123", Region: "us-west-2", EnvVersion: "v1.42.0", }, }) tpl, err := serializer.Template() require.NoError(t, err, "template should render") regExpGUID := regexp.MustCompile(`([a-f\d]{8}-)([a-f\d]{4}-){3}([a-f\d]{12})`) // Matches random guids testName := fmt.Sprintf("CF Template should be equal/%s", name) t.Run(testName, func(t *testing.T) { actualBytes := []byte(tpl) // Cut random GUID from template. actualBytes = regExpGUID.ReplaceAll(actualBytes, []byte("RandomGUID")) mActual := make(map[interface{}]interface{}) require.NoError(t, yaml.Unmarshal(actualBytes, mActual)) expected, err := os.ReadFile(filepath.Join("testdata", "workloads", tc.svcStackPath)) require.NoError(t, err, "should be able to read expected bytes") expectedBytes := []byte(expected) mExpected := make(map[interface{}]interface{}) require.NoError(t, yaml.Unmarshal(expectedBytes, mExpected)) resetCustomResourceLocations(mActual) compareStackTemplate(t, mExpected, mActual) }) testName = fmt.Sprintf("Parameter values should render properly/%s", name) t.Run(testName, func(t *testing.T) { actualParams, err := serializer.SerializedParameters() require.NoError(t, err) path := filepath.Join("testdata", "workloads", tc.svcParamsPath) wantedCFNParamsBytes, err := os.ReadFile(path) require.NoError(t, err) require.Equal(t, string(wantedCFNParamsBytes), actualParams) }) } }
131
copilot-cli
aws
Go
//go:build integration || localintegration // Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package stack_test import ( "fmt" "os" "path/filepath" "regexp" "testing" "gopkg.in/yaml.v3" "github.com/aws/aws-sdk-go/aws" "github.com/aws/aws-sdk-go/aws/session" "github.com/aws/copilot-cli/internal/pkg/addon" "github.com/aws/copilot-cli/internal/pkg/config" "github.com/aws/copilot-cli/internal/pkg/deploy/cloudformation/stack" "github.com/aws/copilot-cli/internal/pkg/manifest" "github.com/aws/copilot-cli/internal/pkg/workspace" "github.com/spf13/afero" "github.com/stretchr/testify/require" ) const ( nlbSvcManifestPath = "svc-nlb-manifest.yml" ) func TestNetworkLoadBalancedWebService_Template(t *testing.T) { testCases := map[string]struct { envName string svcStackPath string svcParamsPath string }{ "test env": { envName: "test", svcStackPath: "svc-nlb-test.stack.yml", svcParamsPath: "svc-nlb-test.params.json", }, "dev env": { envName: "dev", svcStackPath: "svc-nlb-dev.stack.yml", svcParamsPath: "svc-nlb-dev.params.json", }, "prod env": { envName: "prod", svcStackPath: "svc-nlb-prod.stack.yml", svcParamsPath: "svc-nlb-prod.params.json", }, } val, exist := os.LookupEnv("TAG") require.NoError(t, os.Setenv("TAG", "cicdtest")) defer func() { if !exist { require.NoError(t, os.Unsetenv("TAG")) return } require.NoError(t, os.Setenv("TAG", val)) }() path := filepath.Join("testdata", "workloads", nlbSvcManifestPath) manifestBytes, err := os.ReadFile(path) require.NoError(t, err) for name, tc := range testCases { interpolated, err := manifest.NewInterpolator(appName, tc.envName).Interpolate(string(manifestBytes)) require.NoError(t, err) mft, err := manifest.UnmarshalWorkload([]byte(interpolated)) require.NoError(t, err) envMft, err := mft.ApplyEnv(tc.envName) require.NoError(t, err) err = envMft.Validate() require.NoError(t, err) err = envMft.Load(session.New()) require.NoError(t, err) content := envMft.Manifest() v, ok := content.(*manifest.LoadBalancedWebService) require.True(t, ok) // Create in-memory mock file system. wd, err := os.Getwd() require.NoError(t, err) fs := afero.NewMemMapFs() _ = fs.MkdirAll(fmt.Sprintf("%s/copilot", wd), 0755) _ = afero.WriteFile(fs, fmt.Sprintf("%s/copilot/.workspace", wd), []byte(fmt.Sprintf("---\napplication: %s", "DavidsApp")), 0644) require.NoError(t, err) ws, err := workspace.Use(fs) require.NoError(t, err) _, err = addon.ParseFromWorkload(aws.StringValue(v.Name), ws) var notFound *addon.ErrAddonsNotFound require.ErrorAs(t, err, &notFound) svcDiscoveryEndpointName := fmt.Sprintf("%s.%s.local", tc.envName, appName) envConfig := &manifest.Environment{ Workload: manifest.Workload{ Name: &tc.envName, }, } serializer, err := stack.NewLoadBalancedWebService(stack.LoadBalancedWebServiceConfig{ App: &config.Application{Name: appName, Domain: "example.com"}, EnvManifest: envConfig, Manifest: v, ArtifactBucketName: "bucket", RuntimeConfig: stack.RuntimeConfig{ ServiceDiscoveryEndpoint: svcDiscoveryEndpointName, AccountID: "123456789123", Region: "us-west-2", EnvVersion: "v1.42.0", }, RootUserARN: "arn:aws:iam::123456789123:root", }, stack.WithNLB([]string{"10.0.0.0/24", "10.1.0.0/24"})) tpl, err := serializer.Template() require.NoError(t, err, "template should render") regExpGUID := regexp.MustCompile(`([a-f\d]{8}-)([a-f\d]{4}-){3}([a-f\d]{12})`) // Matches random guids testName := fmt.Sprintf("CF Template should be equal/%s", name) t.Run(testName, func(t *testing.T) { actualBytes := []byte(tpl) // Cut random GUID from template. actualBytes = regExpGUID.ReplaceAll(actualBytes, []byte("RandomGUID")) mActual := make(map[interface{}]interface{}) require.NoError(t, yaml.Unmarshal(actualBytes, mActual)) expected, err := os.ReadFile(filepath.Join("testdata", "workloads", tc.svcStackPath)) require.NoError(t, err, "should be able to read expected bytes") expectedBytes := []byte(expected) mExpected := make(map[interface{}]interface{}) require.NoError(t, yaml.Unmarshal(expectedBytes, mExpected)) resetCustomResourceLocations(mActual) compareStackTemplate(t, mExpected, mActual) }) testName = fmt.Sprintf("Parameter values should render properly/%s", name) t.Run(testName, func(t *testing.T) { actualParams, err := serializer.SerializedParameters() require.NoError(t, err) path := filepath.Join("testdata", "workloads", tc.svcParamsPath) wantedCFNParamsBytes, err := os.ReadFile(path) require.NoError(t, err) require.Equal(t, string(wantedCFNParamsBytes), actualParams) }) } }
152
copilot-cli
aws
Go
//go:build integration || localintegration // Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package stack_test import ( "fmt" "os" "path/filepath" "regexp" "testing" "github.com/aws/aws-sdk-go/aws" "github.com/aws/aws-sdk-go/aws/session" "github.com/aws/copilot-cli/internal/pkg/addon" "github.com/aws/copilot-cli/internal/pkg/config" "github.com/aws/copilot-cli/internal/pkg/deploy/cloudformation/stack" "github.com/aws/copilot-cli/internal/pkg/workspace" "github.com/spf13/afero" "gopkg.in/yaml.v3" "github.com/aws/copilot-cli/internal/pkg/manifest" "github.com/stretchr/testify/require" ) const ( svcManifestPath = "svc-manifest.yml" ) func TestLoadBalancedWebService_TemplateInteg(t *testing.T) { testCases := map[string]struct { envName string svcStackPath string svcParamsPath string }{ "default env": { envName: "test", svcStackPath: "svc-test.stack.yml", svcParamsPath: "svc-test.params.json", }, "staging env": { envName: "staging", svcStackPath: "svc-staging.stack.yml", svcParamsPath: "svc-staging.params.json", }, "prod env": { envName: "prod", svcStackPath: "svc-prod.stack.yml", svcParamsPath: "svc-prod.params.json", }, } val, exist := os.LookupEnv("TAG") require.NoError(t, os.Setenv("TAG", "cicdtest")) defer func() { if !exist { require.NoError(t, os.Unsetenv("TAG")) return } require.NoError(t, os.Setenv("TAG", val)) }() path := filepath.Join("testdata", "workloads", svcManifestPath) manifestBytes, err := os.ReadFile(path) require.NoError(t, err) for name, tc := range testCases { interpolated, err := manifest.NewInterpolator(appName, tc.envName).Interpolate(string(manifestBytes)) require.NoError(t, err) mft, err := manifest.UnmarshalWorkload([]byte(interpolated)) require.NoError(t, err) envMft, err := mft.ApplyEnv(tc.envName) require.NoError(t, err) err = envMft.Validate() require.NoError(t, err) err = envMft.Load(session.New()) require.NoError(t, err) content := envMft.Manifest() v, ok := content.(*manifest.LoadBalancedWebService) require.True(t, ok) // Create in-memory mock file system. wd, err := os.Getwd() require.NoError(t, err) fs := afero.NewMemMapFs() _ = fs.MkdirAll(fmt.Sprintf("%s/copilot", wd), 0755) _ = afero.WriteFile(fs, fmt.Sprintf("%s/copilot/.workspace", wd), []byte(fmt.Sprintf("---\napplication: %s", "DavidsApp")), 0644) require.NoError(t, err) ws, err := workspace.Use(fs) require.NoError(t, err) _, err = addon.ParseFromWorkload(aws.StringValue(v.Name), ws) var notFound *addon.ErrAddonsNotFound require.ErrorAs(t, err, &notFound) svcDiscoveryEndpointName := fmt.Sprintf("%s.%s.local", tc.envName, appName) envConfig := &manifest.Environment{ Workload: manifest.Workload{ Name: &tc.envName, }, } envConfig.HTTPConfig.Public.Certificates = []string{"mockCertARN"} serializer, err := stack.NewLoadBalancedWebService(stack.LoadBalancedWebServiceConfig{ App: &config.Application{Name: appName}, EnvManifest: envConfig, Manifest: v, ArtifactBucketName: "bucket", RuntimeConfig: stack.RuntimeConfig{ ServiceDiscoveryEndpoint: svcDiscoveryEndpointName, AccountID: "123456789123", Region: "us-west-2", EnvVersion: "v1.42.0", }, }) require.NoError(t, err, "stack should be able to be initialized") tpl, err := serializer.Template() require.NoError(t, err, "template should render") regExpGUID := regexp.MustCompile(`([a-f\d]{8}-)([a-f\d]{4}-){3}([a-f\d]{12})`) // Matches random guids testName := fmt.Sprintf("CF Template should be equal/%s", name) t.Run(testName, func(t *testing.T) { actualBytes := []byte(tpl) // Cut random GUID from template. actualBytes = regExpGUID.ReplaceAll(actualBytes, []byte("RandomGUID")) mActual := make(map[interface{}]interface{}) require.NoError(t, yaml.Unmarshal(actualBytes, mActual)) expected, err := os.ReadFile(filepath.Join("testdata", "workloads", tc.svcStackPath)) require.NoError(t, err, "should be able to read expected bytes") expectedBytes := []byte(expected) mExpected := make(map[interface{}]interface{}) require.NoError(t, yaml.Unmarshal(expectedBytes, mExpected)) resetCustomResourceLocations(mActual) compareStackTemplate(t, mExpected, mActual) }) testName = fmt.Sprintf("Parameter values should render properly/%s", name) t.Run(testName, func(t *testing.T) { actualParams, err := serializer.SerializedParameters() require.NoError(t, err) path := filepath.Join("testdata", "workloads", tc.svcParamsPath) wantedCFNParamsBytes, err := os.ReadFile(path) require.NoError(t, err) require.Equal(t, string(wantedCFNParamsBytes), actualParams) }) } }
153
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package stack import ( "fmt" "strconv" "strings" "github.com/aws/aws-sdk-go/aws" "github.com/aws/aws-sdk-go/service/cloudformation" "github.com/aws/copilot-cli/internal/pkg/config" "github.com/aws/copilot-cli/internal/pkg/deploy" "github.com/aws/copilot-cli/internal/pkg/deploy/upload/customresource" "github.com/aws/copilot-cli/internal/pkg/manifest" "github.com/aws/copilot-cli/internal/pkg/manifest/manifestinfo" "github.com/aws/copilot-cli/internal/pkg/template" "github.com/aws/copilot-cli/internal/pkg/template/override" ) // Parameter logical IDs for a load balanced web service. const ( LBWebServiceDNSDelegatedParamKey = "DNSDelegated" LBWebServiceNLBAliasesParamKey = "NLBAliases" LBWebServiceNLBPortParamKey = "NLBPort" ) // LoadBalancedWebService represents the configuration needed to create a CloudFormation stack from a load balanced web service manifest. type LoadBalancedWebService struct { *ecsWkld manifest *manifest.LoadBalancedWebService httpsEnabled bool dnsDelegationEnabled bool publicSubnetCIDRBlocks []string appInfo deploy.AppInformation parser loadBalancedWebSvcReadParser } // LoadBalancedWebServiceOption is used to configuring an optional field for LoadBalancedWebService. type LoadBalancedWebServiceOption func(s *LoadBalancedWebService) // WithNLB enables Network Load Balancer in a LoadBalancedWebService. func WithNLB(cidrBlocks []string) func(s *LoadBalancedWebService) { return func(s *LoadBalancedWebService) { s.publicSubnetCIDRBlocks = cidrBlocks } } // LoadBalancedWebServiceConfig contains fields to configure LoadBalancedWebService. type LoadBalancedWebServiceConfig struct { App *config.Application EnvManifest *manifest.Environment Manifest *manifest.LoadBalancedWebService RawManifest []byte // Content of the manifest file without any transformations. RuntimeConfig RuntimeConfig RootUserARN string ArtifactBucketName string Addons NestedStackConfigurer } // NewLoadBalancedWebService creates a new CFN stack with an ECS service from a manifest file, given the options. func NewLoadBalancedWebService(conf LoadBalancedWebServiceConfig, opts ...LoadBalancedWebServiceOption) (*LoadBalancedWebService, error) { crs, err := customresource.LBWS(fs) if err != nil { return nil, fmt.Errorf("load balanced web service custom resources: %w", err) } conf.RuntimeConfig.loadCustomResourceURLs(conf.ArtifactBucketName, uploadableCRs(crs).convert()) var dnsDelegationEnabled, httpsEnabled bool var appInfo deploy.AppInformation if conf.App.Domain != "" { dnsDelegationEnabled = true appInfo = deploy.AppInformation{ Name: conf.App.Name, Domain: conf.App.Domain, AccountPrincipalARN: conf.RootUserARN, } httpsEnabled = true } certImported := len(conf.EnvManifest.HTTPConfig.Public.Certificates) != 0 if certImported { httpsEnabled = true dnsDelegationEnabled = false } if conf.Manifest.HTTPOrBool.Disabled() { httpsEnabled = false } s := &LoadBalancedWebService{ ecsWkld: &ecsWkld{ wkld: &wkld{ name: aws.StringValue(conf.Manifest.Name), env: aws.StringValue(conf.EnvManifest.Name), app: conf.App.Name, permBound: conf.App.PermissionsBoundary, artifactBucketName: conf.ArtifactBucketName, rc: conf.RuntimeConfig, image: conf.Manifest.ImageConfig.Image, rawManifest: conf.RawManifest, parser: fs, addons: conf.Addons, }, logging: conf.Manifest.Logging, sidecars: conf.Manifest.Sidecars, tc: conf.Manifest.TaskConfig, taskDefOverrideFunc: override.CloudFormationTemplate, }, manifest: conf.Manifest, httpsEnabled: httpsEnabled, appInfo: appInfo, dnsDelegationEnabled: dnsDelegationEnabled, parser: fs, } for _, opt := range opts { opt(s) } return s, nil } // Template returns the CloudFormation template for the service parametrized for the environment. func (s *LoadBalancedWebService) Template() (string, error) { crs, err := convertCustomResources(s.rc.CustomResourcesURL) if err != nil { return "", err } addonsParams, err := s.addonsParameters() if err != nil { return "", err } addonsOutputs, err := s.addonsOutputs() if err != nil { return "", err } exposedPorts, err := s.manifest.ExposedPorts() if err != nil { return "", fmt.Errorf("parse exposed ports in service manifest %s: %w", s.name, err) } sidecars, err := convertSidecars(s.manifest.Sidecars, exposedPorts.PortsForContainer, s.rc) if err != nil { return "", fmt.Errorf("convert the sidecar configuration for service %s: %w", s.name, err) } publishers, err := convertPublish(s.manifest.Publish(), s.rc.AccountID, s.rc.Region, s.app, s.env, s.name) if err != nil { return "", fmt.Errorf(`convert "publish" field for service %s: %w`, s.name, err) } advancedCount, err := convertAdvancedCount(s.manifest.Count.AdvancedCount) if err != nil { return "", fmt.Errorf("convert the advanced count configuration for service %s: %w", s.name, err) } var autoscaling *template.AutoscalingOpts var desiredCountOnSpot *int var capacityProviders []*template.CapacityProviderStrategy if advancedCount != nil { autoscaling = advancedCount.Autoscaling desiredCountOnSpot = advancedCount.Spot capacityProviders = advancedCount.Cps } entrypoint, err := convertEntryPoint(s.manifest.EntryPoint) if err != nil { return "", err } command, err := convertCommand(s.manifest.Command) if err != nil { return "", err } nlbConfig, err := s.convertNetworkLoadBalancer() if err != nil { return "", err } albListenerConfig, err := s.convertALBListener() if err != nil { return "", err } var scConfig *template.ServiceConnect if s.manifest.Network.Connect.Enabled() { scConfig = convertServiceConnect(s.manifest.Network.Connect) } targetContainer, targetContainerPort, err := s.manifest.HTTPOrBool.Main.Target(exposedPorts) if err != nil { return "", err } // Set container-level feature flag. logConfig := convertLogging(s.manifest.Logging) content, err := s.parser.ParseLoadBalancedWebService(template.WorkloadOpts{ // Workload parameters. AppName: s.app, EnvName: s.env, EnvVersion: s.rc.EnvVersion, SerializedManifest: string(s.rawManifest), WorkloadName: s.name, WorkloadType: manifestinfo.LoadBalancedWebServiceType, // Configuration for the main container. Command: command, EntryPoint: entrypoint, HealthCheck: convertContainerHealthCheck(s.manifest.ImageConfig.HealthCheck), PortMappings: convertPortMappings(exposedPorts.PortsForContainer[s.name]), Secrets: convertSecrets(s.manifest.TaskConfig.Secrets), Variables: convertEnvVars(s.manifest.TaskConfig.Variables), // Additional options that are common between **all** workload templates. AddonsExtraParams: addonsParams, Autoscaling: autoscaling, CapacityProviders: capacityProviders, CredentialsParameter: aws.StringValue(s.manifest.ImageConfig.Image.Credentials), DesiredCountOnSpot: desiredCountOnSpot, DeploymentConfiguration: convertDeploymentConfig(s.manifest.DeployConfig), DependsOn: convertDependsOn(s.manifest.ImageConfig.Image.DependsOn), DockerLabels: s.manifest.ImageConfig.Image.DockerLabels, ExecuteCommand: convertExecuteCommand(&s.manifest.ExecuteCommand), LogConfig: logConfig, NestedStack: addonsOutputs, Network: convertNetworkConfig(s.manifest.Network), Publish: publishers, PermissionsBoundary: s.permBound, Platform: convertPlatform(s.manifest.Platform), Storage: convertStorageOpts(s.manifest.Name, s.manifest.Storage), // ALB configs. ALBEnabled: !s.manifest.HTTPOrBool.Disabled(), HTTPTargetContainer: template.HTTPTargetContainer{ Port: targetContainerPort, Name: targetContainer, }, GracePeriod: s.convertGracePeriod(), ALBListener: albListenerConfig, // NLB configs. AppDNSName: nlbConfig.appDNSName, AppDNSDelegationRole: nlbConfig.appDNSDelegationRole, NLB: nlbConfig.settings, // service connect and service discovery options. ServiceConnect: scConfig, ServiceDiscoveryEndpoint: s.rc.ServiceDiscoveryEndpoint, // Additional options for request driven web service templates. Observability: template.ObservabilityOpts{ Tracing: strings.ToUpper(aws.StringValue(s.manifest.Observability.Tracing)), }, // Sidecar configs. Sidecars: sidecars, // Custom Resource Config. CustomResources: crs, }) if err != nil { return "", err } overriddenTpl, err := s.taskDefOverrideFunc(convertTaskDefOverrideRules(s.manifest.TaskDefOverrides), content.Bytes()) if err != nil { return "", fmt.Errorf("apply task definition overrides: %w", err) } return string(overriddenTpl), nil } // Parameters returns the list of CloudFormation parameters used by the template. func (s *LoadBalancedWebService) Parameters() ([]*cloudformation.Parameter, error) { wkldParams, err := s.ecsWkld.Parameters() if err != nil { return nil, err } exposedPorts, err := s.manifest.ExposedPorts() if err != nil { return nil, fmt.Errorf("parse exposed ports in service manifest %s: %w", s.name, err) } targetContainer, targetPort, err := s.manifest.HTTPOrBool.Main.Target(exposedPorts) if err != nil { return nil, err } wkldParams = append(wkldParams, []*cloudformation.Parameter{ { ParameterKey: aws.String(WorkloadContainerPortParamKey), ParameterValue: aws.String(s.manifest.MainContainerPort()), }, { ParameterKey: aws.String(LBWebServiceDNSDelegatedParamKey), ParameterValue: aws.String(strconv.FormatBool(s.dnsDelegationEnabled)), }, { ParameterKey: aws.String(WorkloadTargetContainerParamKey), ParameterValue: aws.String(targetContainer), }, { ParameterKey: aws.String(WorkloadTargetPortParamKey), ParameterValue: aws.String(targetPort), }, }...) if !s.manifest.HTTPOrBool.Disabled() { wkldParams = append(wkldParams, []*cloudformation.Parameter{ { ParameterKey: aws.String(WorkloadRulePathParamKey), ParameterValue: s.manifest.HTTPOrBool.Main.Path, }, { ParameterKey: aws.String(WorkloadHTTPSParamKey), ParameterValue: aws.String(strconv.FormatBool(s.httpsEnabled)), }, }...) } if !s.manifest.NLBConfig.IsEmpty() { port, _, err := manifest.ParsePortMapping(s.manifest.NLBConfig.Listener.Port) if err != nil { return nil, err } wkldParams = append(wkldParams, []*cloudformation.Parameter{ { ParameterKey: aws.String(LBWebServiceNLBAliasesParamKey), ParameterValue: aws.String(s.manifest.NLBConfig.Aliases.ToString()), }, { ParameterKey: aws.String(LBWebServiceNLBPortParamKey), ParameterValue: port, }, }...) } return wkldParams, nil } // SerializedParameters returns the CloudFormation stack's parameters serialized to a JSON document. func (s *LoadBalancedWebService) SerializedParameters() (string, error) { return serializeTemplateConfig(s.wkld.parser, s) }
336
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package stack import ( "bytes" "errors" "fmt" "testing" "github.com/aws/copilot-cli/internal/pkg/template/templatetest" "github.com/aws/copilot-cli/internal/pkg/config" "github.com/aws/copilot-cli/internal/pkg/manifest/manifestinfo" "github.com/aws/aws-sdk-go/aws" "github.com/aws/aws-sdk-go/service/cloudformation" "github.com/aws/copilot-cli/internal/pkg/addon" "github.com/aws/copilot-cli/internal/pkg/deploy" "github.com/aws/copilot-cli/internal/pkg/deploy/cloudformation/stack/mocks" "github.com/aws/copilot-cli/internal/pkg/manifest" "github.com/aws/copilot-cli/internal/pkg/template" "github.com/aws/copilot-cli/internal/pkg/template/override" "github.com/golang/mock/gomock" "github.com/stretchr/testify/require" ) const ( testEnvName = "test" testAppName = "phonetool" testImageRepoURL = "111111111111.dkr.ecr.us-west-2.amazonaws.com/phonetool/frontend" testImageTag = "manual-bf3678c" ) type mockAddons struct { tpl string tplErr error params string paramsErr error } func (m mockAddons) Template() (string, error) { if m.tplErr != nil { return "", m.tplErr } return m.tpl, nil } func (m mockAddons) Parameters() (string, error) { if m.paramsErr != nil { return "", m.paramsErr } return m.params, nil } var mockCloudFormationOverrideFunc = func(overrideRules []override.Rule, origTemp []byte) ([]byte, error) { return origTemp, nil } func TestLoadBalancedWebService_StackName(t *testing.T) { testCases := map[string]struct { inSvcName string inEnvName string inAppName string wantedStackName string }{ "valid stack name": { inSvcName: "frontend", inEnvName: "test", inAppName: "phonetool", wantedStackName: "phonetool-test-frontend", }, "longer than 128 characters": { inSvcName: "whatisthishorriblylongservicenamethatcantfitintocloudformationwhatarewesupposedtodoaboutthisaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa", inEnvName: "test", inAppName: "phonetool", wantedStackName: "phonetool-test-whatisthishorriblylongservicenamethatcantfitintocloudformationwhatarewesupposedtodoaboutthisaaaaaaaaaaaaaaaaaaaaa", }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { // GIVEN conf := &LoadBalancedWebService{ ecsWkld: &ecsWkld{ wkld: &wkld{ name: tc.inSvcName, env: tc.inEnvName, app: tc.inAppName, }, }, } // WHEN n := conf.StackName() // THEN require.Equal(t, tc.wantedStackName, n, "expected stack names to be equal") }) } } func TestLoadBalancedWebService_Template(t *testing.T) { t.Cleanup(func() { fs = realEmbedFS }) fs = templatetest.Stub{} t.Run("returns a wrapped error when addons template parsing fails", func(t *testing.T) { // GIVEN lbws, err := NewLoadBalancedWebService(LoadBalancedWebServiceConfig{ App: &config.Application{}, EnvManifest: &manifest.Environment{}, ArtifactBucketName: "mockBucket", Manifest: &manifest.LoadBalancedWebService{ Workload: manifest.Workload{ Name: aws.String("frontend"), }, }, Addons: mockAddons{tplErr: errors.New("some error")}, }) require.NoError(t, err) // WHEN _, err = lbws.Template() // THEN require.EqualError(t, err, "generate addons template for frontend: some error") }) t.Run("returns a wrapped error when addons parameter parsing fails", func(t *testing.T) { // GIVEN lbws, err := NewLoadBalancedWebService(LoadBalancedWebServiceConfig{ App: &config.Application{}, EnvManifest: &manifest.Environment{}, ArtifactBucketName: "mockBucket", Manifest: &manifest.LoadBalancedWebService{ Workload: manifest.Workload{ Name: aws.String("frontend"), }, }, Addons: mockAddons{paramsErr: errors.New("some error")}, }) require.NoError(t, err) // WHEN _, err = lbws.Template() // THEN require.EqualError(t, err, "parse addons parameters for frontend: some error") }) t.Run("returns the error when parsing the service template fails", func(t *testing.T) { // GIVEN ctrl := gomock.NewController(t) defer ctrl.Finish() parser := mocks.NewMockloadBalancedWebSvcReadParser(ctrl) parser.EXPECT().ParseLoadBalancedWebService(gomock.Any()).Return(nil, errors.New("some error")) addons := mockAddons{ tpl: ` Resources: AdditionalResourcesPolicy: Type: AWS::IAM::ManagedPolicy Outputs: AdditionalResourcesPolicyArn: Value: hello`, } lbws, err := NewLoadBalancedWebService(LoadBalancedWebServiceConfig{ App: &config.Application{}, EnvManifest: &manifest.Environment{}, ArtifactBucketName: "mockBucket", Manifest: &manifest.LoadBalancedWebService{}, Addons: addons, }, func(s *LoadBalancedWebService) { s.parser = parser }) require.NoError(t, err) // WHEN _, err = lbws.Template() // THEN require.EqualError(t, err, "some error") }) t.Run("renders all manifest fields into template without any addons", func(t *testing.T) { // GIVEN ctrl := gomock.NewController(t) defer ctrl.Finish() mft := manifest.NewLoadBalancedWebService(&manifest.LoadBalancedWebServiceProps{ WorkloadProps: &manifest.WorkloadProps{ Name: "frontend", Dockerfile: "frontend/Dockerfile", }, Path: "frontend", Port: 80, }) mft.ImageConfig.HealthCheck = manifest.ContainerHealthCheck{ Retries: aws.Int(5), } mft.HTTPOrBool.Main.Alias = manifest.Alias{AdvancedAliases: []manifest.AdvancedAlias{ { Alias: aws.String("mockAlias"), HostedZone: aws.String("mockHostedZone"), }, }} mft.EntryPoint = manifest.EntryPointOverride{ String: nil, StringSlice: []string{"/bin/echo", "hello"}, } mft.Command = manifest.CommandOverride{ String: nil, StringSlice: []string{"world"}, } mft.Network.Connect = manifest.ServiceConnectBoolOrArgs{ ServiceConnectArgs: manifest.ServiceConnectArgs{ Alias: aws.String("frontend"), }, } var actual template.WorkloadOpts parser := mocks.NewMockloadBalancedWebSvcReadParser(ctrl) parser.EXPECT().ParseLoadBalancedWebService(gomock.Any()).DoAndReturn(func(in template.WorkloadOpts) (*template.Content, error) { actual = in // Capture the translated object. return &template.Content{Buffer: bytes.NewBufferString("template")}, nil }) lbws, err := NewLoadBalancedWebService(LoadBalancedWebServiceConfig{ App: &config.Application{ Name: "phonetool", Domain: "phonetool.com", }, EnvManifest: &manifest.Environment{ Workload: manifest.Workload{ Name: aws.String("test"), }, }, Manifest: mft, RuntimeConfig: RuntimeConfig{ PushedImages: map[string]ECRImage{ "test": { RepoURL: testImageRepoURL, ImageTag: testImageTag, }, }, AccountID: "0123456789012", Region: "us-west-2", }, Addons: mockAddons{}, ArtifactBucketName: "bucket", }, func(s *LoadBalancedWebService) { s.parser = parser }) require.NoError(t, err) // WHEN _, err = lbws.Template() // THEN require.NoError(t, err) require.Equal(t, template.WorkloadOpts{ AppName: "phonetool", EnvName: "test", WorkloadName: "frontend", WorkloadType: manifestinfo.LoadBalancedWebServiceType, HTTPTargetContainer: template.HTTPTargetContainer{ Name: "frontend", Port: "80", }, ServiceConnect: &template.ServiceConnect{ Alias: aws.String("frontend"), }, HealthCheck: &template.ContainerHealthCheck{ Command: []string{"CMD-SHELL", "curl -f http://localhost/ || exit 1"}, Interval: aws.Int64(10), StartPeriod: aws.Int64(0), Timeout: aws.Int64(5), Retries: aws.Int64(5), }, CustomResources: map[string]template.S3ObjectLocation{ "DynamicDesiredCountFunction": { Bucket: "bucket", Key: "manual/scripts/custom-resources/dynamicdesiredcountfunction/8932747ba5dbff619d89b92d0033ef1d04f7dd1b055e073254907d4e38e3976d.zip", }, "EnvControllerFunction": { Bucket: "bucket", Key: "manual/scripts/custom-resources/envcontrollerfunction/8932747ba5dbff619d89b92d0033ef1d04f7dd1b055e073254907d4e38e3976d.zip", }, "NLBCertValidatorFunction": { Bucket: "bucket", Key: "manual/scripts/custom-resources/nlbcertvalidatorfunction/8932747ba5dbff619d89b92d0033ef1d04f7dd1b055e073254907d4e38e3976d.zip", }, "NLBCustomDomainFunction": { Bucket: "bucket", Key: "manual/scripts/custom-resources/nlbcustomdomainfunction/8932747ba5dbff619d89b92d0033ef1d04f7dd1b055e073254907d4e38e3976d.zip", }, "RulePriorityFunction": { Bucket: "bucket", Key: "manual/scripts/custom-resources/rulepriorityfunction/8932747ba5dbff619d89b92d0033ef1d04f7dd1b055e073254907d4e38e3976d.zip", }, }, Network: template.NetworkOpts{ AssignPublicIP: template.EnablePublicIP, SubnetsType: template.PublicSubnetsPlacement, SecurityGroups: []template.SecurityGroup{}, }, DeploymentConfiguration: template.DeploymentConfigurationOpts{ MinHealthyPercent: 100, MaxPercent: 200, }, EntryPoint: []string{"/bin/echo", "hello"}, Command: []string{"world"}, ALBListener: &template.ALBListener{ Rules: []template.ALBListenerRule{ { Path: "/frontend", TargetContainer: "frontend", TargetPort: "80", Aliases: []string{ "mockAlias", }, HTTPHealthCheck: template.HTTPHealthCheckOpts{ HealthCheckPath: "/", GracePeriod: 60, Port: "", SuccessCodes: "", }, Stickiness: "false", RedirectToHTTPS: true, DeregistrationDelay: aws.Int64(int64(60)), }, }, IsHTTPS: true, HostedZoneAliases: template.AliasesForHostedZone{ "mockHostedZone": { "mockAlias", }, }, }, GracePeriod: aws.Int64(int64(60)), ALBEnabled: true, PortMappings: []*template.PortMapping{ { Protocol: "tcp", ContainerPort: 80, ContainerName: "frontend", }, }, }, actual) }) t.Run("renders a template with addons", func(t *testing.T) { // GIVEN ctrl := gomock.NewController(t) defer ctrl.Finish() mft := manifest.NewLoadBalancedWebService(&manifest.LoadBalancedWebServiceProps{ WorkloadProps: &manifest.WorkloadProps{ Name: "frontend", Dockerfile: "frontend/Dockerfile", }, Path: "frontend", Port: 80, }) var actual template.WorkloadOpts parser := mocks.NewMockloadBalancedWebSvcReadParser(ctrl) parser.EXPECT().ParseLoadBalancedWebService(gomock.Any()).DoAndReturn(func(in template.WorkloadOpts) (*template.Content, error) { actual = in // Capture the translated object. return &template.Content{Buffer: bytes.NewBufferString("template")}, nil }) addons := mockAddons{ tpl: `Resources: AdditionalResourcesPolicy: Type: AWS::IAM::ManagedPolicy Properties: PolicyDocument: Statement: - Effect: Allow Action: '*' Resource: '*' MySecret: Type: AWS::SecretsManager::Secret Properties: Description: 'This is my rds instance secret' GenerateSecretString: SecretStringTemplate: '{"username": "admin"}' GenerateStringKey: 'password' PasswordLength: 16 ExcludeCharacters: '"@/\' Outputs: AdditionalResourcesPolicyArn: Value: !Ref AdditionalResourcesPolicy MySecretArn: Value: !Ref MySecret Hello: Value: hello`, params: "ServiceName: !GetAtt Service.Name", } lbws, err := NewLoadBalancedWebService(LoadBalancedWebServiceConfig{ App: &config.Application{ Name: "phonetool", }, EnvManifest: &manifest.Environment{ Workload: manifest.Workload{ Name: aws.String("test"), }, }, ArtifactBucketName: "mockBucket", Manifest: mft, Addons: addons, }, func(s *LoadBalancedWebService) { s.parser = parser }) require.NoError(t, err) // WHEN _, err = lbws.Template() // THEN require.NoError(t, err) require.Equal(t, "ServiceName: !GetAtt Service.Name", actual.AddonsExtraParams) require.Equal(t, &template.WorkloadNestedStackOpts{ StackName: addon.StackName, VariableOutputs: []string{"Hello"}, SecretOutputs: []string{"MySecretArn"}, PolicyOutputs: []string{"AdditionalResourcesPolicyArn"}, }, actual.NestedStack) }) t.Run("should set the target group container to sidecar", func(t *testing.T) { // GIVEN ctrl := gomock.NewController(t) defer ctrl.Finish() mft := manifest.NewLoadBalancedWebService(&manifest.LoadBalancedWebServiceProps{ WorkloadProps: &manifest.WorkloadProps{ Name: "frontend", Dockerfile: "frontend/Dockerfile", }, Path: "frontend", Port: 80, }) mft.HTTPOrBool.Main.TargetContainer = aws.String("envoy") mft.Sidecars = map[string]*manifest.SidecarConfig{ "envoy": { Port: aws.String("443"), }, } var actual template.WorkloadOpts parser := mocks.NewMockloadBalancedWebSvcReadParser(ctrl) parser.EXPECT().ParseLoadBalancedWebService(gomock.Any()).DoAndReturn(func(in template.WorkloadOpts) (*template.Content, error) { actual = in // Capture the translated object. return &template.Content{Buffer: bytes.NewBufferString("template")}, nil }) lbws, err := NewLoadBalancedWebService(LoadBalancedWebServiceConfig{ App: &config.Application{ Name: "phonetool", }, EnvManifest: &manifest.Environment{ Workload: manifest.Workload{ Name: aws.String("test"), }, }, ArtifactBucketName: "mockBucket", Manifest: mft, Addons: mockAddons{}, }, func(s *LoadBalancedWebService) { s.parser = parser }) require.NoError(t, err) // WHEN _, err = lbws.Template() // THEN require.NoError(t, err) require.Equal(t, template.HTTPTargetContainer{ Port: "443", Name: "envoy", }, actual.HTTPTargetContainer) }) } func TestLoadBalancedWebService_Parameters(t *testing.T) { baseProps := &manifest.LoadBalancedWebServiceProps{ WorkloadProps: &manifest.WorkloadProps{ Name: "frontend", Dockerfile: "frontend/Dockerfile", }, Path: "frontend", Port: 80, } expectedParams := []*cloudformation.Parameter{ { ParameterKey: aws.String(WorkloadAppNameParamKey), ParameterValue: aws.String("phonetool"), }, { ParameterKey: aws.String(WorkloadEnvNameParamKey), ParameterValue: aws.String("test"), }, { ParameterKey: aws.String(WorkloadNameParamKey), ParameterValue: aws.String("frontend"), }, { ParameterKey: aws.String(WorkloadContainerImageParamKey), ParameterValue: aws.String("111111111111.dkr.ecr.us-west-2.amazonaws.com/phonetool/frontend:manual-bf3678c"), }, { ParameterKey: aws.String(WorkloadContainerPortParamKey), ParameterValue: aws.String("80"), }, { ParameterKey: aws.String(WorkloadTaskCPUParamKey), ParameterValue: aws.String("256"), }, { ParameterKey: aws.String(WorkloadTaskMemoryParamKey), ParameterValue: aws.String("512"), }, { ParameterKey: aws.String(WorkloadLogRetentionParamKey), ParameterValue: aws.String("30"), }, { ParameterKey: aws.String(WorkloadAddonsTemplateURLParamKey), ParameterValue: aws.String(""), }, { ParameterKey: aws.String(WorkloadEnvFileARNParamKey), ParameterValue: aws.String(""), }, } testCases := map[string]struct { httpsEnabled bool dnsDelegationEnabled bool setupManifest func(*manifest.LoadBalancedWebService) expectedParams []*cloudformation.Parameter expectedErr error }{ "HTTPS Enabled": { httpsEnabled: true, setupManifest: func(service *manifest.LoadBalancedWebService) { countRange := manifest.IntRangeBand("2-100") service.Count = manifest.Count{ Value: aws.Int(1), AdvancedCount: manifest.AdvancedCount{ Range: manifest.Range{ Value: &countRange, }, }, } }, expectedParams: append(expectedParams, []*cloudformation.Parameter{ { ParameterKey: aws.String(WorkloadHTTPSParamKey), ParameterValue: aws.String("true"), }, { ParameterKey: aws.String(WorkloadTargetContainerParamKey), ParameterValue: aws.String("frontend"), }, { ParameterKey: aws.String(WorkloadTargetPortParamKey), ParameterValue: aws.String("80"), }, { ParameterKey: aws.String(WorkloadTaskCountParamKey), ParameterValue: aws.String("2"), }, { ParameterKey: aws.String(WorkloadRulePathParamKey), ParameterValue: aws.String("frontend"), }, { ParameterKey: aws.String(LBWebServiceDNSDelegatedParamKey), ParameterValue: aws.String("false"), }, }...), }, "HTTPS Not Enabled": { httpsEnabled: false, setupManifest: func(service *manifest.LoadBalancedWebService) { countRange := manifest.IntRangeBand("2-100") service.Count = manifest.Count{ Value: aws.Int(1), AdvancedCount: manifest.AdvancedCount{ Range: manifest.Range{ Value: &countRange, }, }, } }, expectedParams: append(expectedParams, []*cloudformation.Parameter{ { ParameterKey: aws.String(WorkloadRulePathParamKey), ParameterValue: aws.String("frontend"), }, { ParameterKey: aws.String(WorkloadHTTPSParamKey), ParameterValue: aws.String("false"), }, { ParameterKey: aws.String(WorkloadTargetContainerParamKey), ParameterValue: aws.String("frontend"), }, { ParameterKey: aws.String(WorkloadTargetPortParamKey), ParameterValue: aws.String("80"), }, { ParameterKey: aws.String(WorkloadTaskCountParamKey), ParameterValue: aws.String("2"), }, { ParameterKey: aws.String(LBWebServiceDNSDelegatedParamKey), ParameterValue: aws.String("false"), }, }...), }, "with sidecar container": { httpsEnabled: true, setupManifest: func(service *manifest.LoadBalancedWebService) { service.HTTPOrBool.Main.TargetContainer = aws.String("xray") service.Sidecars = map[string]*manifest.SidecarConfig{ "xray": { Port: aws.String("5000"), }, } }, expectedParams: append(expectedParams, []*cloudformation.Parameter{ { ParameterKey: aws.String(WorkloadRulePathParamKey), ParameterValue: aws.String("frontend"), }, { ParameterKey: aws.String(WorkloadHTTPSParamKey), ParameterValue: aws.String("true"), }, { ParameterKey: aws.String(WorkloadTargetContainerParamKey), ParameterValue: aws.String("xray"), }, { ParameterKey: aws.String(WorkloadTargetPortParamKey), ParameterValue: aws.String("5000"), }, { ParameterKey: aws.String(WorkloadTaskCountParamKey), ParameterValue: aws.String("1"), }, { ParameterKey: aws.String(LBWebServiceDNSDelegatedParamKey), ParameterValue: aws.String("false"), }, }...), }, "exec enabled": { httpsEnabled: false, setupManifest: func(service *manifest.LoadBalancedWebService) { service.ExecuteCommand = manifest.ExecuteCommand{ Enable: aws.Bool(false), Config: manifest.ExecuteCommandConfig{ Enable: aws.Bool(true), }, } }, expectedParams: append(expectedParams, []*cloudformation.Parameter{ { ParameterKey: aws.String(WorkloadRulePathParamKey), ParameterValue: aws.String("frontend"), }, { ParameterKey: aws.String(WorkloadHTTPSParamKey), ParameterValue: aws.String("false"), }, { ParameterKey: aws.String(WorkloadTargetContainerParamKey), ParameterValue: aws.String("frontend"), }, { ParameterKey: aws.String(WorkloadTargetPortParamKey), ParameterValue: aws.String("80"), }, { ParameterKey: aws.String(WorkloadTaskCountParamKey), ParameterValue: aws.String("1"), }, { ParameterKey: aws.String(LBWebServiceDNSDelegatedParamKey), ParameterValue: aws.String("false"), }, }...), }, "dns delegation enabled": { httpsEnabled: false, dnsDelegationEnabled: true, setupManifest: func(service *manifest.LoadBalancedWebService) { service.ExecuteCommand = manifest.ExecuteCommand{ Enable: aws.Bool(false), Config: manifest.ExecuteCommandConfig{ Enable: aws.Bool(true), }, } }, expectedParams: append(expectedParams, []*cloudformation.Parameter{ { ParameterKey: aws.String(WorkloadRulePathParamKey), ParameterValue: aws.String("frontend"), }, { ParameterKey: aws.String(WorkloadHTTPSParamKey), ParameterValue: aws.String("false"), }, { ParameterKey: aws.String(WorkloadTargetContainerParamKey), ParameterValue: aws.String("frontend"), }, { ParameterKey: aws.String(WorkloadTargetPortParamKey), ParameterValue: aws.String("80"), }, { ParameterKey: aws.String(WorkloadTaskCountParamKey), ParameterValue: aws.String("1"), }, { ParameterKey: aws.String(LBWebServiceDNSDelegatedParamKey), ParameterValue: aws.String("true"), }, }...), }, "nlb enabled": { setupManifest: func(service *manifest.LoadBalancedWebService) { service.NLBConfig = manifest.NetworkLoadBalancerConfiguration{ Listener: manifest.NetworkLoadBalancerListener{ Port: aws.String("443/tcp"), }, } }, expectedParams: append(expectedParams, []*cloudformation.Parameter{ { ParameterKey: aws.String(WorkloadRulePathParamKey), ParameterValue: aws.String("frontend"), }, { ParameterKey: aws.String(WorkloadHTTPSParamKey), ParameterValue: aws.String("false"), }, { ParameterKey: aws.String(WorkloadTargetContainerParamKey), ParameterValue: aws.String("frontend"), }, { ParameterKey: aws.String(WorkloadTargetPortParamKey), ParameterValue: aws.String("80"), }, { ParameterKey: aws.String(WorkloadTaskCountParamKey), ParameterValue: aws.String("1"), }, { ParameterKey: aws.String(LBWebServiceDNSDelegatedParamKey), ParameterValue: aws.String("false"), }, { ParameterKey: aws.String(LBWebServiceNLBPortParamKey), ParameterValue: aws.String("443"), }, { ParameterKey: aws.String(LBWebServiceNLBAliasesParamKey), ParameterValue: aws.String(""), }, }...), }, "nlb alias enabled": { setupManifest: func(service *manifest.LoadBalancedWebService) { service.NLBConfig = manifest.NetworkLoadBalancerConfiguration{ Listener: manifest.NetworkLoadBalancerListener{ Port: aws.String("443/tcp"), }, Aliases: manifest.Alias{ AdvancedAliases: []manifest.AdvancedAlias{ {Alias: aws.String("example.com")}, {Alias: aws.String("v1.example.com")}, }, }, } }, expectedParams: append(expectedParams, []*cloudformation.Parameter{ { ParameterKey: aws.String(WorkloadRulePathParamKey), ParameterValue: aws.String("frontend"), }, { ParameterKey: aws.String(WorkloadHTTPSParamKey), ParameterValue: aws.String("false"), }, { ParameterKey: aws.String(WorkloadTargetContainerParamKey), ParameterValue: aws.String("frontend"), }, { ParameterKey: aws.String(WorkloadTargetPortParamKey), ParameterValue: aws.String("80"), }, { ParameterKey: aws.String(WorkloadTaskCountParamKey), ParameterValue: aws.String("1"), }, { ParameterKey: aws.String(LBWebServiceDNSDelegatedParamKey), ParameterValue: aws.String("false"), }, { ParameterKey: aws.String(LBWebServiceNLBPortParamKey), ParameterValue: aws.String("443"), }, { ParameterKey: aws.String(LBWebServiceNLBAliasesParamKey), ParameterValue: aws.String("example.com,v1.example.com"), }, }...), }, "do not render http params when disabled": { setupManifest: func(service *manifest.LoadBalancedWebService) { service.HTTPOrBool = manifest.HTTPOrBool{ Enabled: aws.Bool(false), } }, expectedParams: append(expectedParams, []*cloudformation.Parameter{ { ParameterKey: aws.String(WorkloadTargetContainerParamKey), ParameterValue: aws.String("frontend"), }, { ParameterKey: aws.String(WorkloadTargetPortParamKey), ParameterValue: aws.String("80"), }, { ParameterKey: aws.String(WorkloadTaskCountParamKey), ParameterValue: aws.String("1"), }, { ParameterKey: aws.String(LBWebServiceDNSDelegatedParamKey), ParameterValue: aws.String("false"), }, }...), }, "with bad count": { httpsEnabled: true, setupManifest: func(service *manifest.LoadBalancedWebService) { badCountRange := manifest.IntRangeBand("badCount") service.Count = manifest.Count{ AdvancedCount: manifest.AdvancedCount{ Range: manifest.Range{ Value: &badCountRange, }, }, } }, expectedErr: fmt.Errorf("parse task count value badCount: invalid range value badCount. Should be in format of ${min}-${max}"), }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { testManifest := manifest.NewLoadBalancedWebService(baseProps) tc.setupManifest(testManifest) // GIVEN conf := &LoadBalancedWebService{ ecsWkld: &ecsWkld{ wkld: &wkld{ name: aws.StringValue(testManifest.Name), env: testEnvName, app: testAppName, rc: RuntimeConfig{ PushedImages: map[string]ECRImage{ aws.StringValue(testManifest.Name): { RepoURL: testImageRepoURL, ImageTag: testImageTag, }, }, }, }, tc: testManifest.TaskConfig, }, manifest: testManifest, httpsEnabled: tc.httpsEnabled, dnsDelegationEnabled: tc.dnsDelegationEnabled, } // WHEN params, err := conf.Parameters() // THEN if err == nil { require.ElementsMatch(t, tc.expectedParams, params) } else { require.EqualError(t, tc.expectedErr, err.Error()) } }) } } func TestLoadBalancedWebService_SerializedParameters(t *testing.T) { testLBWebServiceManifest := manifest.NewLoadBalancedWebService(&manifest.LoadBalancedWebServiceProps{ WorkloadProps: &manifest.WorkloadProps{ Name: "frontend", Dockerfile: "frontend/Dockerfile", }, Path: "frontend", Port: 80, }) c := &LoadBalancedWebService{ ecsWkld: &ecsWkld{ wkld: &wkld{ name: "frontend", env: testEnvName, app: testAppName, rc: RuntimeConfig{ PushedImages: map[string]ECRImage{ "frontend": { RepoURL: testImageRepoURL, ImageTag: testImageTag, }, }, AdditionalTags: map[string]string{ "owner": "boss", }, }, }, tc: testLBWebServiceManifest.TaskConfig, }, manifest: testLBWebServiceManifest, } params, err := c.SerializedParameters() require.NoError(t, err) require.Equal(t, params, `{ "Parameters": { "AddonsTemplateURL": "", "AppName": "phonetool", "ContainerImage": "111111111111.dkr.ecr.us-west-2.amazonaws.com/phonetool/frontend:manual-bf3678c", "ContainerPort": "80", "DNSDelegated": "false", "EnvFileARN": "", "EnvName": "test", "HTTPSEnabled": "false", "LogRetention": "30", "RulePath": "frontend", "TargetContainer": "frontend", "TargetPort": "80", "TaskCPU": "256", "TaskCount": "1", "TaskMemory": "512", "WorkloadName": "frontend" }, "Tags": { "copilot-application": "phonetool", "copilot-environment": "test", "copilot-service": "frontend", "owner": "boss" } }`) } func TestLoadBalancedWebService_Tags(t *testing.T) { // GIVEN var testLBWebServiceManifest = manifest.NewLoadBalancedWebService(&manifest.LoadBalancedWebServiceProps{ WorkloadProps: &manifest.WorkloadProps{ Name: "frontend", Dockerfile: "frontend/Dockerfile", }, Path: "frontend", Port: 80, }) conf := &LoadBalancedWebService{ ecsWkld: &ecsWkld{ wkld: &wkld{ name: aws.StringValue(testLBWebServiceManifest.Name), env: testEnvName, app: testAppName, rc: RuntimeConfig{ PushedImages: map[string]ECRImage{ "frontend": { RepoURL: testImageRepoURL, ImageTag: testImageTag, }, }, AdditionalTags: map[string]string{ "owner": "boss", deploy.AppTagKey: "overrideapp", deploy.EnvTagKey: "overrideenv", deploy.ServiceTagKey: "overridesvc", }, }, }, }, manifest: testLBWebServiceManifest, } // WHEN tags := conf.Tags() // THEN require.Equal(t, []*cloudformation.Tag{ { Key: aws.String(deploy.AppTagKey), Value: aws.String("phonetool"), }, { Key: aws.String(deploy.EnvTagKey), Value: aws.String("test"), }, { Key: aws.String(deploy.ServiceTagKey), Value: aws.String("frontend"), }, { Key: aws.String("owner"), Value: aws.String("boss"), }, }, tags) }
1,040
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package stack import ( "fmt" "strings" ) const ( // taskStackPrefix is used elsewhere to list CF stacks taskStackPrefix = "task-" // After v1.16, pipeline stack names are namespaced with a prefix of "pipeline-${appName}-". fmtPipelineNamespaced = "pipeline-%s-%s" ) // TaskStackName holds the name of a Copilot one-off task stack. type TaskStackName string // TaskName returns the name of the task family, generated from the stack name func (t TaskStackName) TaskName() string { return strings.SplitN(string(t), "-", 2)[1] } // NameForWorkload returns the stack name for a workload. func NameForWorkload(app, env, name string) string { // stack name limit constrained by CFN https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/cfn-using-console-create-stack-parameters.html const maxLen = 128 stackName := fmt.Sprintf("%s-%s-%s", app, env, name) if len(stackName) > maxLen { return stackName[:maxLen] } return stackName } // NameForEnv returns the stack name for an environment. func NameForEnv(app, env string) string { return fmt.Sprintf("%s-%s", app, env) } // NameForTask returns the stack name for a task. func NameForTask(task string) TaskStackName { return TaskStackName(taskStackPrefix + task) } // NameForAppStack returns the stack name for an app. func NameForAppStack(app string) string { return fmt.Sprintf("%s-infrastructure-roles", app) } // NameForAppStackSet returns the stackset name for an app. func NameForAppStackSet(app string) string { return fmt.Sprintf("%s-infrastructure", app) } // NameForPipeline returns the stack name for a pipeline, depending on whether it has been deployed using the legacy scheme. // Note that it doesn't cut name to length of 128 like service stack name. It expects CloudFormation to error out // when the name is to long. func NameForPipeline(app string, pipeline string, isLegacy bool) string { if isLegacy { return pipeline } return fmt.Sprintf(fmtPipelineNamespaced, app, pipeline) }
68
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package stack import ( "testing" "github.com/stretchr/testify/require" ) func TestTaskName(t *testing.T) { taskStackName := TaskStackName("foo-bar") name := taskStackName.TaskName() require.Equal(t, name, "bar") } func TestNameForEnv(t *testing.T) { name := NameForEnv("foo", "bar") require.Equal(t, name, "foo-bar") } func TestNameForTask(t *testing.T) { name := NameForTask("foo") require.Equal(t, name, TaskStackName("task-foo")) } func TestNameForAppStack(t *testing.T) { name := NameForAppStack("foo") require.Equal(t, name, "foo-infrastructure-roles") } func TestNameForAppStackSet(t *testing.T) { name := NameForAppStackSet("foo") require.Equal(t, name, "foo-infrastructure") }
42
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package stack import ( "github.com/aws/aws-sdk-go/service/cloudformation" "github.com/aws/copilot-cli/internal/pkg/template" "github.com/aws/copilot-cli/internal/pkg/deploy" ) const ( pipelineCfnTemplatePath = "cicd/pipeline_cfn.yml" ) type pipelineStackConfig struct { *deploy.CreatePipelineInput parser template.Parser } // NewPipelineStackConfig sets up a struct which can provide values to CloudFormation for // spinning up a pipeline. func NewPipelineStackConfig(in *deploy.CreatePipelineInput) *pipelineStackConfig { return &pipelineStackConfig{ CreatePipelineInput: in, parser: template.New(), } } // StackName returns the name of the CloudFormation stack. func (p *pipelineStackConfig) StackName() string { return NameForPipeline(p.AppName, p.Name, p.IsLegacy) } // Template returns the CloudFormation template for the service parametrized for the environment. func (p *pipelineStackConfig) Template() (string, error) { content, err := p.parser.Parse(pipelineCfnTemplatePath, p, template.WithFuncs(cfTemplateFunctions), template.WithFuncs(map[string]interface{}{ "isCodeStarConnection": func(source interface{}) bool { type connectionName interface { ConnectionName() (string, error) } _, ok := source.(connectionName) return ok }, })) if err != nil { return "", err } return content.String(), nil } // SerializedParameters returns the CloudFormation stack's parameters serialized to a JSON document. func (s *pipelineStackConfig) SerializedParameters() (string, error) { // No-op for now. return "", nil } // Parameters returns the list of CloudFormation parameters used by the template. func (p *pipelineStackConfig) Parameters() ([]*cloudformation.Parameter, error) { return nil, nil } // Tags returns the tags that should be applied to the pipeline CloudFormation stack. func (p *pipelineStackConfig) Tags() []*cloudformation.Tag { defaultTags := map[string]string{ deploy.AppTagKey: p.AppName, } if !p.IsLegacy { defaultTags[deploy.PipelineTagKey] = p.Name } return mergeAndFlattenTags(p.AdditionalTags, defaultTags) }
74
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package stack import ( "bytes" "errors" "fmt" "testing" "github.com/aws/aws-sdk-go/aws" "github.com/aws/aws-sdk-go/service/cloudformation" "github.com/aws/copilot-cli/internal/pkg/template" "github.com/aws/copilot-cli/internal/pkg/template/mocks" "github.com/golang/mock/gomock" "github.com/stretchr/testify/require" "github.com/aws/copilot-cli/internal/pkg/deploy" ) const ( projectName = "chickenProject" pipelineName = "wingspipeline" toolsAccountID = "012345678910" defaultBranch = "main" ) func TestPipelineParameters(t *testing.T) { pipeline := NewPipelineStackConfig( mockCreatePipelineInput(), ) params, _ := pipeline.Parameters() require.Nil(t, params, "pipeline cloudformation template should not expose any parameters") } func TestPipelineTags(t *testing.T) { testCases := map[string]struct { in *deploy.CreatePipelineInput wantedTags []*cloudformation.Tag }{ "pipeline with legacy naming": { in: &deploy.CreatePipelineInput{ AppName: projectName, Name: pipelineName, IsLegacy: true, }, wantedTags: []*cloudformation.Tag{ { Key: aws.String(deploy.AppTagKey), Value: aws.String(projectName), }, }, }, "pipeline with namespaced naming and additional tags": { in: mockCreatePipelineInput(), wantedTags: []*cloudformation.Tag{ { Key: aws.String(deploy.AppTagKey), Value: aws.String(projectName), }, { Key: aws.String(deploy.PipelineTagKey), Value: aws.String(pipelineName), }, { Key: aws.String("owner"), Value: aws.String("boss"), }, }, }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { pipeline := NewPipelineStackConfig( tc.in, ) require.ElementsMatch(t, tc.wantedTags, pipeline.Tags()) }) } } func TestPipelineStackName(t *testing.T) { testCases := map[string]struct { in *deploy.CreatePipelineInput wantedStackName string }{ "pipeline with legacy naming": { in: &deploy.CreatePipelineInput{ AppName: projectName, Name: pipelineName, IsLegacy: true, }, wantedStackName: pipelineName, }, "pipeline with namespaced naming and additional tags": { in: mockCreatePipelineInput(), wantedStackName: fmt.Sprintf("pipeline-%s-%s", projectName, pipelineName), }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { pipeline := NewPipelineStackConfig( tc.in, ) require.Equal(t, tc.wantedStackName, pipeline.StackName(), "unexpected StackName") }) } } func TestPipelineStackConfig_Template(t *testing.T) { testCases := map[string]struct { in *deploy.CreatePipelineInput mockDependencies func(ctrl *gomock.Controller, c *pipelineStackConfig) wantedTemplate string wantedError error }{ "error parsing file": { in: mockCreatePipelineInput(), mockDependencies: func(ctrl *gomock.Controller, c *pipelineStackConfig) { m := mocks.NewMockReadParser(ctrl) m.EXPECT().Parse(pipelineCfnTemplatePath, c, gomock.Any()).Return(nil, errors.New("some error")) c.parser = m }, wantedError: errors.New("some error"), }, "successfully parses file": { in: mockCreatePipelineInput(), mockDependencies: func(ctrl *gomock.Controller, c *pipelineStackConfig) { m := mocks.NewMockReadParser(ctrl) m.EXPECT().Parse(pipelineCfnTemplatePath, c, gomock.Any()).Return(&template.Content{ Buffer: bytes.NewBufferString("pipeline"), }, nil) c.parser = m }, wantedTemplate: "pipeline", }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { // GIVEN ctrl := gomock.NewController(t) defer ctrl.Finish() c := &pipelineStackConfig{ CreatePipelineInput: tc.in, } tc.mockDependencies(ctrl, c) // WHEN template, err := c.Template() // THEN require.Equal(t, tc.wantedError, err) require.Equal(t, tc.wantedTemplate, template) }) } } func mockCreatePipelineInput() *deploy.CreatePipelineInput { return &deploy.CreatePipelineInput{ AppName: projectName, Name: pipelineName, Source: &deploy.GitHubSource{ RepositoryURL: "hencrice/amazon-ecs-cli-v2", Branch: defaultBranch, }, Stages: []deploy.PipelineStage{}, ArtifactBuckets: []deploy.ArtifactBucket{ { BucketName: "chicken-us-east-1", KeyArn: fmt.Sprintf("arn:aws:kms:us-east-1:%s:key/30131d3f-c30f-4d49-beaa-cf4bfc07f34e", toolsAccountID), }, { BucketName: "chicken-us-west-2", KeyArn: fmt.Sprintf("arn:aws:kms:us-west-2:%s:key/80de5f7f-422d-4dff-8f4d-01f6ec5715bc", toolsAccountID), }, // assume the pipeline is hosted in a region that does not contain any copilot environment { BucketName: "chicken-us-west-1", KeyArn: fmt.Sprintf("arn:aws:kms:us-west-1:%s:key/75668c57-ec4b-4d0c-b880-8dc3fa78f6d1", toolsAccountID), }, }, AdditionalTags: map[string]string{ "owner": "boss", }, } }
194
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package stack import ( "fmt" "strings" "github.com/aws/aws-sdk-go/aws" "github.com/aws/copilot-cli/internal/pkg/deploy" "github.com/aws/copilot-cli/internal/pkg/deploy/upload/customresource" "github.com/aws/copilot-cli/internal/pkg/manifest" "github.com/aws/copilot-cli/internal/pkg/manifest/manifestinfo" "github.com/aws/copilot-cli/internal/pkg/template" ) var awsSDKLayerForRegion = map[string]*string{ "ap-northeast-1": aws.String("arn:aws:lambda:ap-northeast-1:249908578461:layer:AWSLambda-Node-AWS-SDK:15"), "us-east-1": aws.String("arn:aws:lambda:us-east-1:668099181075:layer:AWSLambda-Node-AWS-SDK:15"), "ap-southeast-1": aws.String("arn:aws:lambda:ap-southeast-1:468957933125:layer:AWSLambda-Node-AWS-SDK:14"), "eu-west-1": aws.String("arn:aws:lambda:eu-west-1:399891621064:layer:AWSLambda-Node-AWS-SDK:14"), "us-west-1": aws.String("arn:aws:lambda:us-west-1:325793726646:layer:AWSLambda-Node-AWS-SDK:15"), "ap-northeast-2": aws.String("arn:aws:lambda:ap-northeast-2:296580773974:layer:AWSLambda-Node-AWS-SDK:14"), "ap-south-1": aws.String("arn:aws:lambda:ap-south-1:631267018583:layer:AWSLambda-Node-AWS-SDK:14"), "ap-southeast-2": aws.String("arn:aws:lambda:ap-southeast-2:817496625479:layer:AWSLambda-Node-AWS-SDK:14"), "ca-central-1": aws.String("arn:aws:lambda:ca-central-1:778625758767:layer:AWSLambda-Node-AWS-SDK:14"), "eu-central-1": aws.String("arn:aws:lambda:eu-central-1:292169987271:layer:AWSLambda-Node-AWS-SDK:14"), "eu-west-2": aws.String("arn:aws:lambda:eu-west-2:142628438157:layer:AWSLambda-Node-AWS-SDK:14"), "sa-east-1": aws.String("arn:aws:lambda:sa-east-1:640010853179:layer:AWSLambda-Node-AWS-SDK:14"), "us-east-2": aws.String("arn:aws:lambda:us-east-2:259788987135:layer:AWSLambda-Node-AWS-SDK:14"), "us-west-2": aws.String("arn:aws:lambda:us-west-2:420165488524:layer:AWSLambda-Node-AWS-SDK:14"), "af-south-1": aws.String("arn:aws:lambda:af-south-1:392341123054:layer:AWSLambda-Node-AWS-SDK:7"), "ap-east-1": aws.String("arn:aws:lambda:ap-east-1:118857876118:layer:AWSLambda-Node-AWS-SDK:14"), "ap-northeast-3": aws.String("arn:aws:lambda:ap-northeast-3:961244031340:layer:AWSLambda-Node-AWS-SDK:14"), "eu-north-1": aws.String("arn:aws:lambda:eu-north-1:642425348156:layer:AWSLambda-Node-AWS-SDK:14"), "eu-south-1": aws.String("arn:aws:lambda:eu-south-1:426215560912:layer:AWSLambda-Node-AWS-SDK:7"), "eu-west-3": aws.String("arn:aws:lambda:eu-west-3:959311844005:layer:AWSLambda-Node-AWS-SDK:14"), "me-south-1": aws.String("arn:aws:lambda:me-south-1:507411403535:layer:AWSLambda-Node-AWS-SDK:10"), } // RequestDrivenWebService represents the configuration needed to create a CloudFormation stack from a request-drive web service manifest. type RequestDrivenWebService struct { *appRunnerWkld manifest *manifest.RequestDrivenWebService app deploy.AppInformation parser requestDrivenWebSvcReadParser } // RequestDrivenWebServiceConfig contains data required to initialize a request-driven web service stack. type RequestDrivenWebServiceConfig struct { App deploy.AppInformation Env string Manifest *manifest.RequestDrivenWebService RawManifest []byte ArtifactBucketName string RuntimeConfig RuntimeConfig Addons NestedStackConfigurer } // NewRequestDrivenWebService creates a new RequestDrivenWebService stack from a manifest file. func NewRequestDrivenWebService(cfg RequestDrivenWebServiceConfig) (*RequestDrivenWebService, error) { crs, err := customresource.RDWS(fs) if err != nil { return nil, fmt.Errorf("request-driven web service custom resources: %w", err) } cfg.RuntimeConfig.loadCustomResourceURLs(cfg.ArtifactBucketName, uploadableCRs(crs).convert()) return &RequestDrivenWebService{ appRunnerWkld: &appRunnerWkld{ wkld: &wkld{ name: aws.StringValue(cfg.Manifest.Name), env: cfg.Env, app: cfg.App.Name, permBound: cfg.App.PermissionsBoundary, artifactBucketName: cfg.ArtifactBucketName, rc: cfg.RuntimeConfig, image: cfg.Manifest.ImageConfig.Image, rawManifest: cfg.RawManifest, addons: cfg.Addons, parser: fs, }, instanceConfig: cfg.Manifest.InstanceConfig, imageConfig: cfg.Manifest.ImageConfig, healthCheckConfig: cfg.Manifest.HealthCheckConfiguration, }, app: cfg.App, manifest: cfg.Manifest, parser: fs, }, nil } // Template returns the CloudFormation template for the service parametrized for the environment. func (s *RequestDrivenWebService) Template() (string, error) { crs, err := convertCustomResources(s.rc.CustomResourcesURL) if err != nil { return "", err } networkConfig := convertRDWSNetworkConfig(s.manifest.Network) addonsParams, err := s.addonsParameters() if err != nil { return "", err } addonsOutputs, err := s.addonsOutputs() if err != nil { return "", err } var layerARN, dnsDelegationRole, dnsName *string if s.manifest.Alias != nil { dnsDelegationRole, dnsName = convertAppInformation(s.app) layerARN = awsSDKLayerForRegion[s.rc.Region] } publishers, err := convertPublish(s.manifest.Publish(), s.rc.AccountID, s.rc.Region, s.app.Name, s.env, s.name) if err != nil { return "", fmt.Errorf(`convert "publish" field for service %s: %w`, s.name, err) } content, err := s.parser.ParseRequestDrivenWebService(template.WorkloadOpts{ AppName: s.wkld.app, EnvName: s.env, WorkloadName: s.name, SerializedManifest: string(s.rawManifest), EnvVersion: s.rc.EnvVersion, Variables: convertEnvVars(s.manifest.Variables), StartCommand: s.manifest.StartCommand, Tags: s.manifest.Tags, NestedStack: addonsOutputs, AddonsExtraParams: addonsParams, EnableHealthCheck: !s.healthCheckConfig.IsZero(), WorkloadType: manifestinfo.RequestDrivenWebServiceType, Alias: s.manifest.Alias, CustomResources: crs, AWSSDKLayer: layerARN, AppDNSDelegationRole: dnsDelegationRole, AppDNSName: dnsName, Network: networkConfig, Publish: publishers, ServiceDiscoveryEndpoint: s.rc.ServiceDiscoveryEndpoint, Observability: template.ObservabilityOpts{ Tracing: strings.ToUpper(aws.StringValue(s.manifest.Observability.Tracing)), }, PermissionsBoundary: s.permBound, Private: aws.BoolValue(s.manifest.Private.Basic) || s.manifest.Private.Advanced.Endpoint != nil, AppRunnerVPCEndpoint: s.manifest.Private.Advanced.Endpoint, Count: s.manifest.Count, Secrets: convertSecrets(s.manifest.RequestDrivenWebServiceConfig.Secrets), }) if err != nil { return "", err } return content.String(), nil } // SerializedParameters returns the CloudFormation stack's parameters serialized to a JSON document. func (s *RequestDrivenWebService) SerializedParameters() (string, error) { return serializeTemplateConfig(s.wkld.parser, s) }
161
copilot-cli
aws
Go
//go:build integration || localintegration // Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package stack_test import ( "fmt" "os" "path/filepath" "testing" "github.com/aws/aws-sdk-go/aws" "github.com/aws/aws-sdk-go/aws/session" "github.com/aws/copilot-cli/internal/pkg/addon" "github.com/aws/copilot-cli/internal/pkg/deploy" "github.com/aws/copilot-cli/internal/pkg/deploy/cloudformation/stack" "github.com/aws/copilot-cli/internal/pkg/manifest" "github.com/aws/copilot-cli/internal/pkg/workspace" "github.com/spf13/afero" "github.com/stretchr/testify/require" "gopkg.in/yaml.v3" ) func TestRDWS_Template(t *testing.T) { const manifestFileName = "rdws-manifest.yml" testCases := map[string]struct { envName string svcStackPath string }{ "test env": { envName: "test", svcStackPath: "rdws-test.stack.yml", }, "prod env": { envName: "prod", svcStackPath: "rdws-prod.stack.yml", }, } // Read manifest. manifestBytes, err := os.ReadFile(filepath.Join("testdata", "workloads", manifestFileName)) require.NoError(t, err, "read manifest file") mft, err := manifest.UnmarshalWorkload(manifestBytes) require.NoError(t, err, "unmarshal manifest file") for _, tc := range testCases { envMft, err := mft.ApplyEnv(tc.envName) require.NoError(t, err, "apply test env to manifest") err = envMft.Validate() require.NoError(t, err) err = envMft.Load(session.New()) require.NoError(t, err) content := envMft.Manifest() v, ok := content.(*manifest.RequestDrivenWebService) require.True(t, ok) // Create in-memory mock file system. wd, err := os.Getwd() require.NoError(t, err) fs := afero.NewMemMapFs() _ = fs.MkdirAll(fmt.Sprintf("%s/copilot", wd), 0755) _ = afero.WriteFile(fs, fmt.Sprintf("%s/copilot/.workspace", wd), []byte(fmt.Sprintf("---\napplication: %s", "DavidsApp")), 0644) require.NoError(t, err) ws, err := workspace.Use(fs) require.NoError(t, err) _, err = addon.ParseFromWorkload(aws.StringValue(v.Name), ws) var notFound *addon.ErrAddonsNotFound require.ErrorAs(t, err, &notFound) // Read wanted stack template. wantedTemplate, err := os.ReadFile(filepath.Join("testdata", "workloads", tc.svcStackPath)) require.NoError(t, err, "read cloudformation stack") // Read actual stack template. serializer, err := stack.NewRequestDrivenWebService(stack.RequestDrivenWebServiceConfig{ App: deploy.AppInformation{ Name: appName, }, Env: tc.envName, Manifest: v, ArtifactBucketName: "bucket", RuntimeConfig: stack.RuntimeConfig{ AccountID: "123456789123", Region: "us-west-2", EnvVersion: "v1.42.0", }, }) require.NoError(t, err, "create rdws serializer") actualTemplate, err := serializer.Template() require.NoError(t, err, "get cloudformation template for rdws") // Compare the two. wanted := make(map[interface{}]interface{}) require.NoError(t, yaml.Unmarshal(wantedTemplate, wanted), "unmarshal wanted template to map[interface{}]interface{}") actual := make(map[interface{}]interface{}) require.NoError(t, yaml.Unmarshal([]byte(actualTemplate), actual), "unmarshal actual template to map[interface{}]interface{}") resetCustomResourceLocations(actual) compareStackTemplate(t, wanted, actual) } }
105
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package stack import ( "bytes" "errors" "fmt" "testing" "github.com/aws/copilot-cli/internal/pkg/template/templatetest" "github.com/aws/copilot-cli/internal/pkg/deploy" "github.com/aws/copilot-cli/internal/pkg/addon" "github.com/aws/copilot-cli/internal/pkg/manifest/manifestinfo" "github.com/aws/aws-sdk-go/aws" "github.com/aws/aws-sdk-go/service/cloudformation" "github.com/aws/copilot-cli/internal/pkg/deploy/cloudformation/stack/mocks" "github.com/aws/copilot-cli/internal/pkg/manifest" "github.com/aws/copilot-cli/internal/pkg/template" "github.com/golang/mock/gomock" "github.com/stretchr/testify/require" ) var ( testPrivatePlacement = manifest.PrivateSubnetPlacement ) var testRDWebServiceManifest = &manifest.RequestDrivenWebService{ Workload: manifest.Workload{ Name: aws.String(testServiceName), Type: aws.String(manifestinfo.RequestDrivenWebServiceType), }, RequestDrivenWebServiceConfig: manifest.RequestDrivenWebServiceConfig{ ImageConfig: manifest.ImageWithPort{ Port: aws.Uint16(80), }, InstanceConfig: manifest.AppRunnerInstanceConfig{ CPU: aws.Int(256), Memory: aws.Int(512), }, Variables: map[string]manifest.Variable{ "LOG_LEVEL": {}, "NODE_ENV": {}, }, Secrets: map[string]manifest.Secret{"foo": {}}, RequestDrivenWebServiceHttpConfig: manifest.RequestDrivenWebServiceHttpConfig{ HealthCheckConfiguration: manifest.HealthCheckArgsOrString{ Union: manifest.BasicToUnion[string, manifest.HTTPHealthCheckArgs]("/"), }, }, Tags: map[string]string{ "owner": "jeff", }, }, } func TestRequestDrivenWebService_NewRequestDrivenWebService(t *testing.T) { t.Cleanup(func() { fs = realEmbedFS }) fs = templatetest.Stub{} type testInput struct { mft *manifest.RequestDrivenWebService env string rc RuntimeConfig bucketName string appInfo deploy.AppInformation urls map[string]string } testCases := map[string]struct { input testInput mockDependencies func(t *testing.T, ctrl *gomock.Controller, c *RequestDrivenWebService) wantedStack *RequestDrivenWebService wantedError error }{ "should return RequestDrivenWebService": { input: testInput{ mft: testRDWebServiceManifest, env: testEnvName, rc: RuntimeConfig{ Region: "us-west-2", }, appInfo: deploy.AppInformation{ Name: testAppName, }, bucketName: "mockbucket", urls: map[string]string{ "custom-domain-app-runner": "mockURL1", "aws-sdk-layer": "mockURL2", }, }, wantedStack: &RequestDrivenWebService{ appRunnerWkld: &appRunnerWkld{ wkld: &wkld{ name: aws.StringValue(testRDWebServiceManifest.Name), env: testEnvName, app: testAppName, rc: RuntimeConfig{ CustomResourcesURL: map[string]string{ "CustomDomainFunction": "https://.s3.us-west-2.amazonaws.com/manual/scripts/custom-resources/customdomainfunction/8932747ba5dbff619d89b92d0033ef1d04f7dd1b055e073254907d4e38e3976d.zip", "EnvControllerFunction": "https://.s3.us-west-2.amazonaws.com/manual/scripts/custom-resources/envcontrollerfunction/8932747ba5dbff619d89b92d0033ef1d04f7dd1b055e073254907d4e38e3976d.zip", }, Region: "us-west-2", }, image: testRDWebServiceManifest.ImageConfig.Image, }, instanceConfig: testRDWebServiceManifest.InstanceConfig, imageConfig: testRDWebServiceManifest.ImageConfig, }, manifest: testRDWebServiceManifest, app: deploy.AppInformation{ Name: testAppName, }, }, }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { ctrl := gomock.NewController(t) defer ctrl.Finish() addons := mocks.NewMockNestedStackConfigurer(ctrl) stack, err := NewRequestDrivenWebService(RequestDrivenWebServiceConfig{ App: tc.input.appInfo, Env: tc.input.env, Manifest: tc.input.mft, RuntimeConfig: tc.input.rc, Addons: addons, }) require.Equal(t, tc.wantedError, err) require.Equal(t, tc.wantedStack.name, stack.name) require.Equal(t, tc.wantedStack.env, stack.env) require.Equal(t, tc.wantedStack.app, stack.app) require.Equal(t, tc.wantedStack.rc, stack.rc) require.Equal(t, tc.wantedStack.image, stack.image) require.Equal(t, tc.wantedStack.manifest, stack.manifest) require.Equal(t, tc.wantedStack.instanceConfig, stack.instanceConfig) require.Equal(t, tc.wantedStack.imageConfig, stack.imageConfig) require.NotNil(t, stack.addons) }) } } func TestRequestDrivenWebService_Template(t *testing.T) { const mockSD = "app.env.svc.local.com" testCases := map[string]struct { inCustomResourceURLs map[string]string inManifest func(manifest manifest.RequestDrivenWebService) manifest.RequestDrivenWebService mockDependencies func(t *testing.T, ctrl *gomock.Controller, c *RequestDrivenWebService) wantedTemplate string wantedError error }{ "should throw an error if addons template cannot be parsed": { mockDependencies: func(t *testing.T, ctrl *gomock.Controller, c *RequestDrivenWebService) { mockParser := mocks.NewMockrequestDrivenWebSvcReadParser(ctrl) addons := mockAddons{tplErr: errors.New("some error")} c.parser = mockParser c.wkld.addons = addons }, wantedError: fmt.Errorf("generate addons template for %s: %w", testServiceName, errors.New("some error")), }, "should be able to parse custom resource URLs when alias is enabled": { inManifest: func(mft manifest.RequestDrivenWebService) manifest.RequestDrivenWebService { mft.Alias = aws.String("convex.domain.com") mft.Network.VPC.Placement = manifest.PlacementArgOrString{ PlacementString: &testPrivatePlacement, } return mft }, inCustomResourceURLs: map[string]string{ template.AppRunnerCustomDomainLambdaFileName: "https://mockbucket.s3-us-east-1.amazonaws.com/mockURL1", }, mockDependencies: func(t *testing.T, ctrl *gomock.Controller, c *RequestDrivenWebService) { mockParser := mocks.NewMockrequestDrivenWebSvcReadParser(ctrl) addons := mockAddons{} mockParser.EXPECT().ParseRequestDrivenWebService(gomock.Any()).DoAndReturn(func(actual template.WorkloadOpts) (*template.Content, error) { require.Equal(t, template.WorkloadOpts{ AppName: "phonetool", EnvName: "test", WorkloadName: "frontend", WorkloadType: manifestinfo.RequestDrivenWebServiceType, Variables: map[string]template.Variable{ "LOG_LEVEL": template.PlainVariable(""), "NODE_ENV": template.PlainVariable(""), }, Secrets: map[string]template.Secret{"foo": template.SecretFromPlainSSMOrARN("")}, Tags: c.manifest.Tags, Count: c.manifest.Count, EnableHealthCheck: true, Alias: aws.String("convex.domain.com"), CustomResources: map[string]template.S3ObjectLocation{ template.AppRunnerCustomDomainLambdaFileName: { Bucket: "mockbucket", Key: "mockURL1", }, }, Network: template.NetworkOpts{ SubnetsType: "PrivateSubnets", }, ServiceDiscoveryEndpoint: mockSD, AWSSDKLayer: aws.String("arn:aws:lambda:us-west-2:420165488524:layer:AWSLambda-Node-AWS-SDK:14"), }, actual) return &template.Content{Buffer: bytes.NewBufferString("template")}, nil }) c.parser = mockParser c.wkld.addons = addons }, wantedTemplate: "template", }, "should parse template without addons/ directory": { mockDependencies: func(t *testing.T, ctrl *gomock.Controller, c *RequestDrivenWebService) { mockParser := mocks.NewMockrequestDrivenWebSvcReadParser(ctrl) addons := mockAddons{} mockParser.EXPECT().ParseRequestDrivenWebService(gomock.Any()).DoAndReturn(func(actual template.WorkloadOpts) (*template.Content, error) { require.Equal(t, template.WorkloadOpts{ AppName: "phonetool", EnvName: "test", WorkloadName: "frontend", WorkloadType: manifestinfo.RequestDrivenWebServiceType, Variables: convertEnvVars(c.manifest.Variables), Secrets: convertSecrets(c.manifest.RequestDrivenWebServiceConfig.Secrets), Tags: c.manifest.Tags, ServiceDiscoveryEndpoint: mockSD, EnableHealthCheck: true, CustomResources: make(map[string]template.S3ObjectLocation), }, actual) return &template.Content{Buffer: bytes.NewBufferString("template")}, nil }) c.parser = mockParser c.addons = addons }, wantedTemplate: "template", }, "should parse template with addons": { mockDependencies: func(t *testing.T, ctrl *gomock.Controller, c *RequestDrivenWebService) { mockParser := mocks.NewMockrequestDrivenWebSvcReadParser(ctrl) addons := mockAddons{ tpl: `Resources: AdditionalResourcesPolicy: Type: AWS::IAM::ManagedPolicy Properties: PolicyDocument: Statement: - Effect: Allow Action: '*' Resource: '*' DDBTable: Type: AWS::DynamoDB::Table Properties: TableName: 'Hello' Outputs: AdditionalResourcesPolicyArn: Value: !Ref AdditionalResourcesPolicy DDBTableName: Value: !Ref DDBTable Hello: Value: hello`, } mockParser.EXPECT().ParseRequestDrivenWebService(gomock.Any()).DoAndReturn(func(actual template.WorkloadOpts) (*template.Content, error) { require.Equal(t, template.WorkloadOpts{ AppName: "phonetool", EnvName: "test", WorkloadName: "frontend", WorkloadType: manifestinfo.RequestDrivenWebServiceType, Variables: convertEnvVars(c.manifest.Variables), Secrets: convertSecrets(c.manifest.RequestDrivenWebServiceConfig.Secrets), Tags: c.manifest.Tags, ServiceDiscoveryEndpoint: mockSD, NestedStack: &template.WorkloadNestedStackOpts{ StackName: addon.StackName, VariableOutputs: []string{"DDBTableName", "Hello"}, PolicyOutputs: []string{"AdditionalResourcesPolicyArn"}, }, CustomResources: make(map[string]template.S3ObjectLocation), EnableHealthCheck: true, }, actual) return &template.Content{Buffer: bytes.NewBufferString("template")}, nil }) c.parser = mockParser c.addons = addons }, wantedTemplate: "template", }, "should return parsing error": { mockDependencies: func(t *testing.T, ctrl *gomock.Controller, c *RequestDrivenWebService) { mockParser := mocks.NewMockrequestDrivenWebSvcReadParser(ctrl) addons := mockAddons{} mockParser.EXPECT().ParseRequestDrivenWebService(gomock.Any()).Return(nil, errors.New("parsing error")) c.parser = mockParser c.addons = addons }, wantedError: errors.New("parsing error"), }, "should return error if a custom resource url cannot be parsed when alias is enabled": { inManifest: func(manifest manifest.RequestDrivenWebService) manifest.RequestDrivenWebService { manifest.Alias = aws.String("convex.domain.com") return manifest }, inCustomResourceURLs: map[string]string{ "CustomDomainFunction": "such-a-weird-url", }, mockDependencies: func(t *testing.T, ctrl *gomock.Controller, c *RequestDrivenWebService) { addons := mockAddons{} c.wkld.addons = addons }, wantedError: errors.New(`convert custom resource "CustomDomainFunction" url: cannot parse S3 URL such-a-weird-url into bucket name and key`), }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { // GIVEN ctrl := gomock.NewController(t) defer ctrl.Finish() mft := *testRDWebServiceManifest if tc.inManifest != nil { mft = tc.inManifest(mft) } conf := &RequestDrivenWebService{ appRunnerWkld: &appRunnerWkld{ wkld: &wkld{ name: testServiceName, env: testEnvName, app: testAppName, rc: RuntimeConfig{ PushedImages: map[string]ECRImage{ "testServiceName": { RepoURL: testImageRepoURL, ImageTag: testImageTag, }, }, ServiceDiscoveryEndpoint: mockSD, AccountID: "0123456789012", Region: "us-west-2", CustomResourcesURL: tc.inCustomResourceURLs, }, }, healthCheckConfig: mft.HealthCheckConfiguration, }, manifest: &mft, } tc.mockDependencies(t, ctrl, conf) // WHEN template, err := conf.Template() // THEN if tc.wantedError != nil { require.EqualError(t, err, tc.wantedError.Error()) require.Equal(t, "", template) } else { require.NoError(t, err) require.Equal(t, tc.wantedTemplate, template) } }) } } func TestRequestDrivenWebService_Parameters(t *testing.T) { testCases := map[string]struct { imageConfig manifest.ImageWithPort instanceConfig manifest.AppRunnerInstanceConfig wantedParams []*cloudformation.Parameter wantedError error }{ "all required fields specified": { imageConfig: manifest.ImageWithPort{ Image: manifest.Image{ ImageLocationOrBuild: manifest.ImageLocationOrBuild{ Location: aws.String("public.ecr.aws/aws-containers/hello-app-runner:latest"), }, }, Port: aws.Uint16(80), }, instanceConfig: manifest.AppRunnerInstanceConfig{ CPU: aws.Int(1024), Memory: aws.Int(1024), }, wantedParams: []*cloudformation.Parameter{{ ParameterKey: aws.String("AppName"), ParameterValue: aws.String("phonetool"), }, { ParameterKey: aws.String("EnvName"), ParameterValue: aws.String("test"), }, { ParameterKey: aws.String("WorkloadName"), ParameterValue: aws.String("frontend"), }, { ParameterKey: aws.String("ContainerImage"), ParameterValue: aws.String("public.ecr.aws/aws-containers/hello-app-runner:latest"), }, { ParameterKey: aws.String("AddonsTemplateURL"), ParameterValue: aws.String(""), }, { ParameterKey: aws.String(RDWkldImageRepositoryType), ParameterValue: aws.String("ECR_PUBLIC"), }, { ParameterKey: aws.String(WorkloadContainerPortParamKey), ParameterValue: aws.String("80"), }, { ParameterKey: aws.String(RDWkldInstanceCPUParamKey), ParameterValue: aws.String("1024"), }, { ParameterKey: aws.String(RDWkldInstanceMemoryParamKey), ParameterValue: aws.String("1024"), }}, }, "error when port unspecified": { imageConfig: manifest.ImageWithPort{ Image: manifest.Image{ ImageLocationOrBuild: manifest.ImageLocationOrBuild{ Location: aws.String("public.ecr.aws/aws-containers/hello-app-runner:latest"), }, }, }, instanceConfig: manifest.AppRunnerInstanceConfig{ CPU: aws.Int(1024), Memory: aws.Int(1024), }, wantedError: errors.New("field `image.port` is required for Request Driven Web Services"), }, "error when CPU unspecified": { imageConfig: manifest.ImageWithPort{ Port: aws.Uint16(80), Image: manifest.Image{ ImageLocationOrBuild: manifest.ImageLocationOrBuild{ Location: aws.String("public.ecr.aws/aws-containers/hello-app-runner:latest"), }, }, }, instanceConfig: manifest.AppRunnerInstanceConfig{ Memory: aws.Int(1024), }, wantedError: errors.New("field `cpu` is required for Request Driven Web Services"), }, "error when memory unspecified": { imageConfig: manifest.ImageWithPort{ Port: aws.Uint16(80), Image: manifest.Image{ ImageLocationOrBuild: manifest.ImageLocationOrBuild{ Location: aws.String("public.ecr.aws/aws-containers/hello-app-runner:latest"), }, }, }, instanceConfig: manifest.AppRunnerInstanceConfig{ CPU: aws.Int(1024), }, wantedError: errors.New("field `memory` is required for Request Driven Web Services"), }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { c := &RequestDrivenWebService{ appRunnerWkld: &appRunnerWkld{ wkld: &wkld{ name: aws.StringValue(testRDWebServiceManifest.Name), env: testEnvName, app: testAppName, image: tc.imageConfig.Image, }, instanceConfig: tc.instanceConfig, imageConfig: tc.imageConfig, }, manifest: testRDWebServiceManifest, } p, err := c.Parameters() if tc.wantedError != nil { require.EqualError(t, err, tc.wantedError.Error()) } else { require.NoError(t, err) require.Equal(t, tc.wantedParams, p) } }) } } func TestRequestDrivenWebService_SerializedParameters(t *testing.T) { c := &RequestDrivenWebService{ appRunnerWkld: &appRunnerWkld{ wkld: &wkld{ name: aws.StringValue(testRDWebServiceManifest.Name), env: testEnvName, app: testAppName, rc: RuntimeConfig{ PushedImages: map[string]ECRImage{ aws.StringValue(testRDWebServiceManifest.Name): { RepoURL: testImageRepoURL, ImageTag: testImageTag, }, }, }, }, instanceConfig: testRDWebServiceManifest.InstanceConfig, imageConfig: testRDWebServiceManifest.ImageConfig, }, manifest: testRDWebServiceManifest, } params, err := c.SerializedParameters() require.NoError(t, err) require.Equal(t, params, `{ "Parameters": { "AddonsTemplateURL": "", "AppName": "phonetool", "ContainerImage": "111111111111.dkr.ecr.us-west-2.amazonaws.com/phonetool/frontend:manual-bf3678c", "ContainerPort": "80", "EnvName": "test", "ImageRepositoryType": "ECR", "InstanceCPU": "256", "InstanceMemory": "512", "WorkloadName": "frontend" }, "Tags": { "copilot-application": "phonetool", "copilot-environment": "test", "copilot-service": "frontend" } }`) }
533
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package stack import ( "errors" "fmt" "regexp" "strings" "time" "unicode" "github.com/aws/aws-sdk-go/aws" "github.com/aws/aws-sdk-go/service/cloudformation" "github.com/aws/copilot-cli/internal/pkg/config" "github.com/aws/copilot-cli/internal/pkg/deploy/upload/customresource" "github.com/aws/copilot-cli/internal/pkg/manifest" "github.com/aws/copilot-cli/internal/pkg/manifest/manifestinfo" "github.com/aws/copilot-cli/internal/pkg/template" "github.com/aws/copilot-cli/internal/pkg/template/override" "github.com/robfig/cron/v3" ) // Parameter logical IDs for a scheduled job const ( ScheduledJobScheduleParamKey = "Schedule" ) // ScheduledJob represents the configuration needed to create a Cloudformation stack from a // scheduled job manfiest. type ScheduledJob struct { *ecsWkld manifest *manifest.ScheduledJob parser scheduledJobReadParser } var ( fmtRateScheduleExpression = "rate(%d %s)" // rate({duration} {units}) fmtCronScheduleExpression = "cron(%s)" awsScheduleRegexp = regexp.MustCompile(`((?:rate|cron)\(.*\)|none)`) // Validates that an expression is of the form rate(xyz) or cron(abc) or value 'none' ) const ( // Cron expressions in AWS Cloudwatch are of the form "M H DoM Mo DoW Y" // We use these predefined schedules when a customer specifies "@daily" or "@annually" // to fulfill the predefined schedules spec defined at // https://godoc.org/github.com/robfig/cron#hdr-Predefined_schedules // AWS requires that cron expressions use a ? wildcard for either DoM or DoW // so we represent that here. // M H mD Mo wD Y cronHourly = "0 * * * ? *" // at minute 0 cronDaily = "0 0 * * ? *" // at midnight cronWeekly = "0 0 ? * 1 *" // at midnight on sunday cronMonthly = "0 0 1 * ? *" // at midnight on the first of the month cronYearly = "0 0 1 1 ? *" // at midnight on January 1 ) const ( hourly = "@hourly" daily = "@daily" midnight = "@midnight" weekly = "@weekly" monthly = "@monthly" yearly = "@yearly" annually = "@annually" every = "@every " ) type errScheduleInvalid struct { reason error } func (e errScheduleInvalid) Error() string { return fmt.Sprintf("schedule is not valid cron, rate, or preset: %v", e.reason) } type errDurationInvalid struct { reason error } func (e errDurationInvalid) Error() string { return fmt.Sprintf("parse duration: %v", e.reason) } // ScheduledJobConfig contains data required to initialize a scheduled job stack. type ScheduledJobConfig struct { App *config.Application Env string Manifest *manifest.ScheduledJob ArtifactBucketName string RawManifest []byte RuntimeConfig RuntimeConfig Addons NestedStackConfigurer } // NewScheduledJob creates a new ScheduledJob stack from a manifest file. func NewScheduledJob(cfg ScheduledJobConfig) (*ScheduledJob, error) { crs, err := customresource.ScheduledJob(fs) if err != nil { return nil, fmt.Errorf("scheduled job custom resources: %w", err) } cfg.RuntimeConfig.loadCustomResourceURLs(cfg.ArtifactBucketName, uploadableCRs(crs).convert()) return &ScheduledJob{ ecsWkld: &ecsWkld{ wkld: &wkld{ name: aws.StringValue(cfg.Manifest.Name), env: cfg.Env, app: cfg.App.Name, permBound: cfg.App.PermissionsBoundary, artifactBucketName: cfg.ArtifactBucketName, rc: cfg.RuntimeConfig, image: cfg.Manifest.ImageConfig.Image, rawManifest: cfg.RawManifest, parser: fs, addons: cfg.Addons, }, sidecars: cfg.Manifest.Sidecars, logging: cfg.Manifest.Logging, tc: cfg.Manifest.TaskConfig, taskDefOverrideFunc: override.CloudFormationTemplate, }, manifest: cfg.Manifest, parser: fs, }, nil } // Template returns the CloudFormation template for the scheduled job. func (j *ScheduledJob) Template() (string, error) { addonsParams, err := j.addonsParameters() if err != nil { return "", err } addonsOutputs, err := j.addonsOutputs() if err != nil { return "", err } exposedPorts, err := j.manifest.ExposedPorts() if err != nil { return "", fmt.Errorf("parse exposed ports in service manifest %s: %w", j.name, err) } sidecars, err := convertSidecars(j.manifest.Sidecars, exposedPorts.PortsForContainer, j.rc) if err != nil { return "", fmt.Errorf("convert the sidecar configuration for job %s: %w", j.name, err) } publishers, err := convertPublish(j.manifest.Publish(), j.rc.AccountID, j.rc.Region, j.app, j.env, j.name) if err != nil { return "", fmt.Errorf(`convert "publish" field for job %s: %w`, j.name, err) } schedule, err := j.awsSchedule() if err != nil { return "", fmt.Errorf("convert schedule for job %s: %w", j.name, err) } stateMachine, err := j.stateMachineOpts() if err != nil { return "", fmt.Errorf("convert retry/timeout config for job %s: %w", j.name, err) } crs, err := convertCustomResources(j.rc.CustomResourcesURL) if err != nil { return "", err } entrypoint, err := convertEntryPoint(j.manifest.EntryPoint) if err != nil { return "", err } command, err := convertCommand(j.manifest.Command) if err != nil { return "", err } content, err := j.parser.ParseScheduledJob(template.WorkloadOpts{ SerializedManifest: string(j.rawManifest), Variables: convertEnvVars(j.manifest.Variables), Secrets: convertSecrets(j.manifest.Secrets), WorkloadType: manifestinfo.ScheduledJobType, NestedStack: addonsOutputs, AddonsExtraParams: addonsParams, Sidecars: sidecars, ScheduleExpression: schedule, StateMachine: stateMachine, HealthCheck: convertContainerHealthCheck(j.manifest.ImageConfig.HealthCheck), LogConfig: convertLogging(j.manifest.Logging), DockerLabels: j.manifest.ImageConfig.Image.DockerLabels, Storage: convertStorageOpts(j.manifest.Name, j.manifest.Storage), Network: convertNetworkConfig(j.manifest.Network), EntryPoint: entrypoint, Command: command, DependsOn: convertDependsOn(j.manifest.ImageConfig.Image.DependsOn), CredentialsParameter: aws.StringValue(j.manifest.ImageConfig.Image.Credentials), ServiceDiscoveryEndpoint: j.rc.ServiceDiscoveryEndpoint, Publish: publishers, Platform: convertPlatform(j.manifest.Platform), EnvVersion: j.rc.EnvVersion, CustomResources: crs, PermissionsBoundary: j.permBound, }) if err != nil { return "", fmt.Errorf("parse scheduled job template: %w", err) } overriddenTpl, err := j.taskDefOverrideFunc(convertTaskDefOverrideRules(j.manifest.TaskDefOverrides), content.Bytes()) if err != nil { return "", fmt.Errorf("apply task definition overrides: %w", err) } return string(overriddenTpl), nil } // Parameters returns the list of CloudFormation parameters used by the template. func (j *ScheduledJob) Parameters() ([]*cloudformation.Parameter, error) { wkldParams, err := j.ecsWkld.Parameters() if err != nil { return nil, err } schedule, err := j.awsSchedule() if err != nil { return nil, err } return append(wkldParams, []*cloudformation.Parameter{ { ParameterKey: aws.String(ScheduledJobScheduleParamKey), ParameterValue: aws.String(schedule), }, }...), nil } // SerializedParameters returns the CloudFormation stack's parameters serialized to a JSON document. func (j *ScheduledJob) SerializedParameters() (string, error) { return serializeTemplateConfig(j.wkld.parser, j) } // awsSchedule converts the Schedule string to the format required by Cloudwatch Events // https://docs.aws.amazon.com/lambda/latest/dg/services-cloudwatchevents-expressions.html // Cron expressions must have an sixth "year" field, and must contain at least one ? (either-or) // in either day-of-month or day-of-week. // Day-of-week expressions are zero-indexed in Golang but one-indexed in AWS. // @every cron definition strings are converted to rates. // All others become cron expressions. // Exception is made for strings of the form "rate( )" or "cron( )". These are accepted as-is and // validated server-side by CloudFormation. func (j *ScheduledJob) awsSchedule() (string, error) { schedule := aws.StringValue(j.manifest.On.Schedule) if schedule == "" { return "", fmt.Errorf(`missing required field "schedule" in manifest for job %s`, j.name) } // If the schedule uses default CloudWatch Events syntax, pass it through for server-side validation. if match := awsScheduleRegexp.FindStringSubmatch(schedule); match != nil { return aws.StringValue(j.manifest.On.Schedule), nil } // Try parsing the string as a cron expression to validate it. if _, err := cron.ParseStandard(schedule); err != nil { return "", errScheduleInvalid{reason: err} } var scheduleExpression string var err error switch { case strings.HasPrefix(schedule, every): scheduleExpression, err = toRate(schedule[len(every):]) if err != nil { return "", fmt.Errorf("parse fixed interval: %w", err) } case strings.HasPrefix(schedule, "@"): scheduleExpression, err = toFixedSchedule(schedule) if err != nil { return "", fmt.Errorf("parse preset schedule: %w", err) } case schedule == "none": scheduleExpression = schedule // Keep expression as "none" when the job is disabled. default: scheduleExpression, err = toAWSCron(schedule) if err != nil { return "", fmt.Errorf("parse cron schedule: %w", err) } } return scheduleExpression, nil } // toRate converts a cron "@every" directive to a rate expression defined in minutes. // example input: @every 1h30m // // output: rate(90 minutes) func toRate(duration string) (string, error) { d, err := time.ParseDuration(duration) if err != nil { return "", errDurationInvalid{reason: err} } // Check that rates are not specified in units smaller than minutes if d != d.Truncate(time.Minute) { return "", fmt.Errorf("duration must be a whole number of minutes or hours") } if d < time.Minute*1 { return "", errors.New("duration must be greater than or equal to 1 minute") } minutes := int(d.Minutes()) if minutes == 1 { return fmt.Sprintf(fmtRateScheduleExpression, minutes, "minute"), nil } return fmt.Sprintf(fmtRateScheduleExpression, minutes, "minutes"), nil } // toFixedSchedule converts cron predefined schedules into AWS-flavored cron expressions. // (https://godoc.org/github.com/robfig/cron#hdr-Predefined_schedules) // Example input: @daily // // output: cron(0 0 * * ? *) // input: @annually // output: cron(0 0 1 1 ? *) func toFixedSchedule(schedule string) (string, error) { switch { case strings.HasPrefix(schedule, hourly): return fmt.Sprintf(fmtCronScheduleExpression, cronHourly), nil case strings.HasPrefix(schedule, midnight): fallthrough case strings.HasPrefix(schedule, daily): return fmt.Sprintf(fmtCronScheduleExpression, cronDaily), nil case strings.HasPrefix(schedule, weekly): return fmt.Sprintf(fmtCronScheduleExpression, cronWeekly), nil case strings.HasPrefix(schedule, monthly): return fmt.Sprintf(fmtCronScheduleExpression, cronMonthly), nil case strings.HasPrefix(schedule, annually): fallthrough case strings.HasPrefix(schedule, yearly): return fmt.Sprintf(fmtCronScheduleExpression, cronYearly), nil default: return "", fmt.Errorf("unrecognized preset schedule %s", schedule) } } func awsCronFieldSpecified(input string) bool { return !strings.ContainsAny(input, "*?") } // toAWSCron converts "standard" 5-element crons into the AWS preferred syntax // cron(* * * * ? *) // MIN HOU DOM MON DOW YEA // EITHER DOM or DOW must be specified as ? (either-or operator) // BOTH DOM and DOW cannot be specified // DOW numbers run 1-7, not 0-6 // Example input: 0 9 * * 1-5 (at 9 am, Monday-Friday) // // : cron(0 9 ? * 2-6 *) (adds required ? operator, increments DOW to 1-index, adds year) func toAWSCron(schedule string) (string, error) { const ( MIN = iota HOU DOM MON DOW ) // Split the cron into its components. We can do this because it'll already have been validated. // Use https://golang.org/pkg/strings/#Fields since it handles consecutive whitespace. sched := strings.Fields(schedule) // Check whether the Day of Week and Day of Month fields have a ? // Possible conversion: // * * * * * ==> * * * * ? // 0 9 * * 1 ==> 0 9 ? * 1 // 0 9 1 * * ==> 0 9 1 * ? switch { // If both are unspecified, convert DOW to a ? and DOM to * case !awsCronFieldSpecified(sched[DOM]) && !awsCronFieldSpecified(sched[DOW]): sched[DOW] = "?" sched[DOM] = "*" // If DOM is * or ? and DOW is specified, convert DOM to ? case !awsCronFieldSpecified(sched[DOM]) && awsCronFieldSpecified(sched[DOW]): sched[DOM] = "?" // If DOW is * or ? and DOM is specified, convert DOW to ? case !awsCronFieldSpecified(sched[DOW]) && awsCronFieldSpecified(sched[DOM]): sched[DOW] = "?" // Error if both DOM and DOW are specified default: return "", errors.New("cannot specify both DOW and DOM in cron expression") } // Increment the DOW by one if specified as a number // https://play.golang.org/p/_1uxt0zJneb var newDOW []rune for _, c := range sched[DOW] { if unicode.IsDigit(c) { newDOW = append(newDOW, c+1) } else { newDOW = append(newDOW, c) } } // We don't need to use a string builder here because this will only ever have a max of // about 50 characters (SUN-MON,MON-TUE,TUE-WED,... is the longest possible string here) sched[DOW] = string(newDOW) // Add "every year" to 5-element crons to comply with AWS sched = append(sched, "*") return fmt.Sprintf(fmtCronScheduleExpression, strings.Join(sched, " ")), nil } // StateMachine converts the Timeout and Retries fields to an instance of template.StateMachineOpts // It also performs basic validations to provide a fast feedback loop to the customer. func (j *ScheduledJob) stateMachineOpts() (*template.StateMachineOpts, error) { var timeoutSeconds *int if inTimeout := aws.StringValue(j.manifest.Timeout); inTimeout != "" { parsedTimeout, err := time.ParseDuration(inTimeout) if err != nil { return nil, errDurationInvalid{reason: err} } if parsedTimeout < 1*time.Second { return nil, errors.New("timeout must be greater than or equal to 1 second") } if parsedTimeout != parsedTimeout.Truncate(time.Second) { return nil, errors.New("timeout must be a whole number of seconds, minutes, or hours") } timeoutSeconds = aws.Int(int(parsedTimeout.Seconds())) } var retries *int if inRetries := aws.IntValue(j.manifest.Retries); inRetries != 0 { if inRetries < 0 { return nil, errors.New("number of retries cannot be negative") } retries = aws.Int(inRetries) } return &template.StateMachineOpts{ Timeout: timeoutSeconds, Retries: retries, }, nil }
432
copilot-cli
aws
Go
//go:build integration || localintegration // Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package stack_test import ( "fmt" "os" "path/filepath" "testing" "github.com/aws/aws-sdk-go/aws" "github.com/aws/aws-sdk-go/aws/session" "github.com/aws/copilot-cli/internal/pkg/addon" "github.com/aws/copilot-cli/internal/pkg/config" "github.com/aws/copilot-cli/internal/pkg/deploy/cloudformation/stack" "github.com/aws/copilot-cli/internal/pkg/manifest" "github.com/aws/copilot-cli/internal/pkg/workspace" "github.com/spf13/afero" "github.com/stretchr/testify/require" "gopkg.in/yaml.v3" ) const ( jobManifestPath = "job-manifest.yml" jobStackPath = "job-test.stack.yml" jobParamsPath = "job-test.params.json" envControllerPath = "custom-resources/env-controller.js" ) func TestScheduledJob_Template(t *testing.T) { path := filepath.Join("testdata", "workloads", jobManifestPath) manifestBytes, err := os.ReadFile(path) require.NoError(t, err) mft, err := manifest.UnmarshalWorkload(manifestBytes) require.NoError(t, err) envMft, err := mft.ApplyEnv(envName) require.NoError(t, err) err = envMft.Validate() require.NoError(t, err) err = envMft.Load(session.New()) require.NoError(t, err) content := envMft.Manifest() v, ok := content.(*manifest.ScheduledJob) require.True(t, ok) // Create in-memory mock file system. wd, err := os.Getwd() require.NoError(t, err) fs := afero.NewMemMapFs() _ = fs.MkdirAll(fmt.Sprintf("%s/copilot", wd), 0755) _ = afero.WriteFile(fs, fmt.Sprintf("%s/copilot/.workspace", wd), []byte(fmt.Sprintf("---\napplication: %s", "DavidsApp")), 0644) require.NoError(t, err) ws, err := workspace.Use(fs) require.NoError(t, err) _, err = addon.ParseFromWorkload(aws.StringValue(v.Name), ws) var notFound *addon.ErrAddonsNotFound require.ErrorAs(t, err, &notFound) serializer, err := stack.NewScheduledJob(stack.ScheduledJobConfig{ App: &config.Application{ Name: appName, }, Env: envName, Manifest: v, ArtifactBucketName: "bucket", RuntimeConfig: stack.RuntimeConfig{ ServiceDiscoveryEndpoint: "test.my-app.local", AccountID: "123456789123", Region: "us-west-2", EnvVersion: "v1.42.0", }, }) tpl, err := serializer.Template() require.NoError(t, err, "template should render") t.Run("CF Template should be equal", func(t *testing.T) { actualBytes := []byte(tpl) mActual := make(map[interface{}]interface{}) require.NoError(t, yaml.Unmarshal(actualBytes, mActual)) expected, err := os.ReadFile(filepath.Join("testdata", "workloads", jobStackPath)) require.NoError(t, err, "should be able to read expected bytes") expectedBytes := []byte(expected) mExpected := make(map[interface{}]interface{}) require.NoError(t, yaml.Unmarshal(expectedBytes, mExpected)) // Cut out zip file from EnvControllerAction resetCustomResourceLocations(mActual) compareStackTemplate(t, mExpected, mActual) }) t.Run("Parameter values should render properly", func(t *testing.T) { actualParams, err := serializer.SerializedParameters() require.NoError(t, err) path := filepath.Join("testdata", "workloads", jobParamsPath) wantedCFNParamsBytes, err := os.ReadFile(path) require.NoError(t, err) require.Equal(t, string(wantedCFNParamsBytes), actualParams) }) }
109
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package stack import ( "bytes" "errors" "fmt" "testing" "github.com/aws/aws-sdk-go/aws" "github.com/aws/aws-sdk-go/service/cloudformation" "github.com/aws/copilot-cli/internal/pkg/addon" "github.com/aws/copilot-cli/internal/pkg/deploy/cloudformation/stack/mocks" "github.com/aws/copilot-cli/internal/pkg/manifest" "github.com/aws/copilot-cli/internal/pkg/manifest/manifestinfo" "github.com/aws/copilot-cli/internal/pkg/template" "github.com/golang/mock/gomock" "github.com/stretchr/testify/require" ) // mockAddons is declared in lb_web_svc_test.go const ( testJobAppName = "cuteoverload" testJobEnvName = "test" testJobImageRepoURL = "123456789012.dkr.ecr.us-west-2.amazonaws.com/cuteoverload/mailer" testJobImageTag = "stable" ) func TestScheduledJob_Template(t *testing.T) { testScheduledJobManifest := manifest.NewScheduledJob(&manifest.ScheduledJobProps{ WorkloadProps: &manifest.WorkloadProps{ Name: "mailer", Dockerfile: "mailer/Dockerfile", }, Schedule: "@daily", Timeout: "1h30m", Retries: 3, }) testScheduledJobManifest.EntryPoint = manifest.EntryPointOverride{ String: nil, StringSlice: []string{"/bin/echo", "hello"}, } testScheduledJobManifest.Command = manifest.CommandOverride{ String: nil, StringSlice: []string{"world"}, } testScheduledJobManifest.Network.VPC.Placement = manifest.PlacementArgOrString{ PlacementArgs: manifest.PlacementArgs{ Subnets: manifest.SubnetListOrArgs{ IDs: []string{"id1", "id2"}, }, }, } testCases := map[string]struct { mockDependencies func(t *testing.T, ctrl *gomock.Controller, j *ScheduledJob) wantedTemplate string wantedError error }{ "render template without addons successfully": { mockDependencies: func(t *testing.T, ctrl *gomock.Controller, j *ScheduledJob) { m := mocks.NewMockscheduledJobReadParser(ctrl) m.EXPECT().ParseScheduledJob(gomock.Any()).DoAndReturn(func(actual template.WorkloadOpts) (*template.Content, error) { require.Equal(t, template.WorkloadOpts{ WorkloadType: manifestinfo.ScheduledJobType, ScheduleExpression: "cron(0 0 * * ? *)", StateMachine: &template.StateMachineOpts{ Timeout: aws.Int(5400), Retries: aws.Int(3), }, Network: template.NetworkOpts{ AssignPublicIP: template.DisablePublicIP, SubnetIDs: []string{"id1", "id2"}, SecurityGroups: []template.SecurityGroup{}, }, EntryPoint: []string{"/bin/echo", "hello"}, Command: []string{"world"}, CustomResources: make(map[string]template.S3ObjectLocation), }, actual) return &template.Content{Buffer: bytes.NewBufferString("template")}, nil }) addons := mockAddons{} j.parser = m j.wkld.addons = addons }, wantedTemplate: "template", }, "render template with addons": { mockDependencies: func(t *testing.T, ctrl *gomock.Controller, j *ScheduledJob) { m := mocks.NewMockscheduledJobReadParser(ctrl) m.EXPECT().ParseScheduledJob(gomock.Any()).DoAndReturn(func(actual template.WorkloadOpts) (*template.Content, error) { require.Equal(t, template.WorkloadOpts{ WorkloadType: manifestinfo.ScheduledJobType, NestedStack: &template.WorkloadNestedStackOpts{ StackName: addon.StackName, VariableOutputs: []string{"Hello"}, SecretOutputs: []string{"MySecretArn"}, PolicyOutputs: []string{"AdditionalResourcesPolicyArn"}, }, AddonsExtraParams: `ServiceName: !GetAtt Service.Name DiscoveryServiceArn: !GetAtt DiscoveryService.Arn`, ScheduleExpression: "cron(0 0 * * ? *)", StateMachine: &template.StateMachineOpts{ Timeout: aws.Int(5400), Retries: aws.Int(3), }, Network: template.NetworkOpts{ AssignPublicIP: template.DisablePublicIP, SubnetIDs: []string{"id1", "id2"}, SecurityGroups: []template.SecurityGroup{}, }, EntryPoint: []string{"/bin/echo", "hello"}, Command: []string{"world"}, CustomResources: make(map[string]template.S3ObjectLocation), }, actual) return &template.Content{Buffer: bytes.NewBufferString("template")}, nil }) addons := mockAddons{ tpl: `Resources: AdditionalResourcesPolicy: Type: AWS::IAM::ManagedPolicy Properties: PolicyDocument: Statement: - Effect: Allow Action: '*' Resource: '*' MySecret: Type: AWS::SecretsManager::Secret Properties: Description: 'This is my rds instance secret' GenerateSecretString: SecretStringTemplate: '{"username": "admin"}' GenerateStringKey: 'password' PasswordLength: 16 ExcludeCharacters: '"@/\' Outputs: AdditionalResourcesPolicyArn: Value: !Ref AdditionalResourcesPolicy MySecretArn: Value: !Ref MySecret Hello: Value: hello`, params: `ServiceName: !GetAtt Service.Name DiscoveryServiceArn: !GetAtt DiscoveryService.Arn`, } j.parser = m j.wkld.addons = addons }, wantedTemplate: "template", }, "error parsing addons": { mockDependencies: func(t *testing.T, ctrl *gomock.Controller, j *ScheduledJob) { addons := mockAddons{tplErr: errors.New("some error")} j.wkld.addons = addons }, wantedError: fmt.Errorf("generate addons template for %s: %w", aws.StringValue(testScheduledJobManifest.Name), errors.New("some error")), }, "template parsing error": { mockDependencies: func(t *testing.T, ctrl *gomock.Controller, j *ScheduledJob) { m := mocks.NewMockscheduledJobReadParser(ctrl) m.EXPECT().ParseScheduledJob(gomock.Any()).Return(nil, errors.New("some error")) addons := mockAddons{} j.parser = m j.wkld.addons = addons }, wantedError: fmt.Errorf("parse scheduled job template: some error"), }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { // GIVEN ctrl := gomock.NewController(t) defer ctrl.Finish() conf := &ScheduledJob{ ecsWkld: &ecsWkld{ wkld: &wkld{ name: aws.StringValue(testScheduledJobManifest.Name), env: testJobEnvName, app: testJobAppName, rc: RuntimeConfig{ PushedImages: map[string]ECRImage{ "testServiceName": { RepoURL: testImageRepoURL, ImageTag: testImageTag, }, }, AccountID: "0123456789012", Region: "us-west-2", }, }, taskDefOverrideFunc: mockCloudFormationOverrideFunc, }, manifest: testScheduledJobManifest, } tc.mockDependencies(t, ctrl, conf) // WHEN template, err := conf.Template() // THEN if tc.wantedError != nil { require.EqualError(t, err, tc.wantedError.Error()) } else { require.NoError(t, err) require.Equal(t, tc.wantedTemplate, template) } }) } } func TestScheduledJob_awsSchedule(t *testing.T) { testCases := map[string]struct { inputSchedule string wantedSchedule string wantedError error wantedErrorType interface{} }{ "simple rate": { inputSchedule: "@every 1h30m", wantedSchedule: "rate(90 minutes)", }, "missing schedule": { inputSchedule: "", wantedError: errors.New(`missing required field "schedule" in manifest for job mailer`), }, "one minute rate": { inputSchedule: "@every 1m", wantedSchedule: "rate(1 minute)", }, "round to minute if using small units": { inputSchedule: "@every 60000ms", wantedSchedule: "rate(1 minute)", }, "malformed rate": { inputSchedule: "@every 402 seconds", wantedErrorType: &errScheduleInvalid{}, }, "malformed cron": { inputSchedule: "every 4m", wantedErrorType: &errScheduleInvalid{}, }, "correctly converts predefined schedule": { inputSchedule: "@daily", wantedSchedule: "cron(0 0 * * ? *)", }, "unrecognized predefined schedule": { inputSchedule: "@minutely", wantedErrorType: &errScheduleInvalid{}, }, "correctly converts cron with all asterisks": { inputSchedule: "* * * * *", wantedSchedule: "cron(* * * * ? *)", }, "correctly converts cron with one ? in DOW": { inputSchedule: "* * * * ?", wantedSchedule: "cron(* * * * ? *)", }, "correctly converts cron with one ? in DOM": { inputSchedule: "* * ? * *", wantedSchedule: "cron(* * * * ? *)", }, "correctly convert two ? in DOW and DOM": { inputSchedule: "* * ? * ?", wantedSchedule: "cron(* * * * ? *)", }, "correctly converts cron with specified DOW": { inputSchedule: "* * * * MON-FRI", wantedSchedule: "cron(* * ? * MON-FRI *)", }, "correctly parse provided ? with DOW": { inputSchedule: "* * ? * MON", wantedSchedule: "cron(* * ? * MON *)", }, "correctly parse provided ? with DOM": { inputSchedule: "* * 1 * ?", wantedSchedule: "cron(* * 1 * ? *)", }, "correctly converts cron with specified DOM": { inputSchedule: "* * 1 * *", wantedSchedule: "cron(* * 1 * ? *)", }, "correctly increments 0-indexed DOW": { inputSchedule: "* * ? * 2-6", wantedSchedule: "cron(* * ? * 3-7 *)", }, "zero-indexed DOW with un?ed DOM": { inputSchedule: "* * * * 2-6", wantedSchedule: "cron(* * ? * 3-7 *)", }, "returns error if both DOM and DOW specified": { inputSchedule: "* * 1 * SUN", wantedError: errors.New("parse cron schedule: cannot specify both DOW and DOM in cron expression"), }, "returns error if fixed interval less than one minute": { inputSchedule: "@every -5m", wantedError: errors.New("parse fixed interval: duration must be greater than or equal to 1 minute"), }, "returns error if fixed interval is 0": { inputSchedule: "@every 0m", wantedError: errors.New("parse fixed interval: duration must be greater than or equal to 1 minute"), }, "error on non-whole-number of minutes": { inputSchedule: "@every 89s", wantedError: errors.New("parse fixed interval: duration must be a whole number of minutes or hours"), }, "error on too many inputs": { inputSchedule: "* * * * * *", wantedErrorType: &errScheduleInvalid{}, }, "cron syntax error": { inputSchedule: "* * * malformed *", wantedErrorType: &errScheduleInvalid{}, }, "passthrogh AWS flavored cron": { inputSchedule: "cron(0 * * * ? *)", wantedSchedule: "cron(0 * * * ? *)", }, "passthrough AWS flavored rate": { inputSchedule: "rate(5 minutes)", wantedSchedule: "rate(5 minutes)", }, "passthrough 'none' case": { inputSchedule: "none", wantedSchedule: "none", }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { // GIVEN job := &ScheduledJob{ ecsWkld: &ecsWkld{ wkld: &wkld{ name: "mailer", }, }, manifest: &manifest.ScheduledJob{ ScheduledJobConfig: manifest.ScheduledJobConfig{ On: manifest.JobTriggerConfig{ Schedule: aws.String(tc.inputSchedule), }, }, }, } // WHEN parsedSchedule, err := job.awsSchedule() // THEN if tc.wantedErrorType != nil { ok := errors.As(err, &tc.wantedErrorType) require.True(t, ok) require.NotEmpty(t, tc.wantedErrorType) } else if tc.wantedError != nil { require.EqualError(t, err, tc.wantedError.Error()) } else { require.NoError(t, err) require.Equal(t, tc.wantedSchedule, parsedSchedule) } }) } } func TestScheduledJob_stateMachine(t *testing.T) { testCases := map[string]struct { inputTimeout string inputRetries int wantedConfig template.StateMachineOpts wantedError error wantedErrorType interface{} }{ "timeout and retries": { inputTimeout: "3h", inputRetries: 5, wantedConfig: template.StateMachineOpts{ Timeout: aws.Int(10800), Retries: aws.Int(5), }, }, "just timeout": { inputTimeout: "1h", wantedConfig: template.StateMachineOpts{ Timeout: aws.Int(3600), Retries: nil, }, }, "just retries": { inputRetries: 2, wantedConfig: template.StateMachineOpts{ Timeout: nil, Retries: aws.Int(2), }, }, "negative retries": { inputRetries: -4, wantedError: errors.New("number of retries cannot be negative"), }, "timeout too small": { inputTimeout: "500ms", wantedError: errors.New("timeout must be greater than or equal to 1 second"), }, "invalid timeout": { inputTimeout: "5 hours", wantedErrorType: &errDurationInvalid{}, }, "timeout non-integer number of seconds": { inputTimeout: "1s40ms", wantedError: errors.New("timeout must be a whole number of seconds, minutes, or hours"), }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { // GIVEN job := &ScheduledJob{ ecsWkld: &ecsWkld{ wkld: &wkld{ name: "mailer", }, }, manifest: &manifest.ScheduledJob{ ScheduledJobConfig: manifest.ScheduledJobConfig{ JobFailureHandlerConfig: manifest.JobFailureHandlerConfig{ Retries: aws.Int(tc.inputRetries), Timeout: aws.String(tc.inputTimeout), }, }, }, } // WHEN parsedStateMachine, err := job.stateMachineOpts() // THEN if tc.wantedError != nil { require.EqualError(t, err, tc.wantedError.Error()) } else if tc.wantedErrorType != nil { require.True(t, errors.As(err, tc.wantedErrorType)) } else { require.NoError(t, err) require.Equal(t, aws.IntValue(tc.wantedConfig.Retries), aws.IntValue(parsedStateMachine.Retries)) require.Equal(t, aws.IntValue(tc.wantedConfig.Timeout), aws.IntValue(parsedStateMachine.Timeout)) } }) } } func TestScheduledJob_Parameters(t *testing.T) { baseProps := &manifest.ScheduledJobProps{ WorkloadProps: &manifest.WorkloadProps{ Name: "frontend", Dockerfile: "frontend/Dockerfile", }, Schedule: "@daily", } testScheduledJobManifest := manifest.NewScheduledJob(baseProps) testScheduledJobManifest.Count = manifest.Count{ Value: aws.Int(1), } expectedParams := []*cloudformation.Parameter{ { ParameterKey: aws.String(WorkloadAppNameParamKey), ParameterValue: aws.String("phonetool"), }, { ParameterKey: aws.String(WorkloadEnvNameParamKey), ParameterValue: aws.String("test"), }, { ParameterKey: aws.String(WorkloadNameParamKey), ParameterValue: aws.String("frontend"), }, { ParameterKey: aws.String(WorkloadContainerImageParamKey), ParameterValue: aws.String("111111111111.dkr.ecr.us-west-2.amazonaws.com/phonetool/frontend:manual-bf3678c"), }, { ParameterKey: aws.String(WorkloadTaskCPUParamKey), ParameterValue: aws.String("256"), }, { ParameterKey: aws.String(WorkloadTaskMemoryParamKey), ParameterValue: aws.String("512"), }, { ParameterKey: aws.String(WorkloadTaskCountParamKey), ParameterValue: aws.String("1"), }, { ParameterKey: aws.String(WorkloadLogRetentionParamKey), ParameterValue: aws.String("30"), }, { ParameterKey: aws.String(WorkloadAddonsTemplateURLParamKey), ParameterValue: aws.String(""), }, { ParameterKey: aws.String(WorkloadEnvFileARNParamKey), ParameterValue: aws.String(""), }, { ParameterKey: aws.String(ScheduledJobScheduleParamKey), ParameterValue: aws.String("cron(0 0 * * ? *)"), }, } testCases := map[string]struct { httpsEnabled bool manifest *manifest.ScheduledJob expectedParams []*cloudformation.Parameter expectedErr error }{ "renders all parameters": { manifest: testScheduledJobManifest, expectedParams: expectedParams, }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { // GIVEN conf := &ScheduledJob{ ecsWkld: &ecsWkld{ wkld: &wkld{ name: aws.StringValue(tc.manifest.Name), env: testEnvName, app: testAppName, rc: RuntimeConfig{ PushedImages: map[string]ECRImage{ "frontend": { RepoURL: testImageRepoURL, ImageTag: testImageTag, }, }, }, }, tc: tc.manifest.TaskConfig, }, manifest: tc.manifest, } // WHEN params, err := conf.Parameters() // THEN if err == nil { require.ElementsMatch(t, tc.expectedParams, params) } else { require.EqualError(t, tc.expectedErr, err.Error()) } }) } } func TestScheduledJob_SerializedParameters(t *testing.T) { testScheduledJobManifest := manifest.NewScheduledJob(&manifest.ScheduledJobProps{ WorkloadProps: &manifest.WorkloadProps{ Name: "mailer", Dockerfile: "mailer/Dockerfile", }, Schedule: "@daily", Timeout: "1h30m", Retries: 3, }) c := &ScheduledJob{ ecsWkld: &ecsWkld{ wkld: &wkld{ name: aws.StringValue(testScheduledJobManifest.Name), env: testEnvName, app: testAppName, rc: RuntimeConfig{ PushedImages: map[string]ECRImage{ aws.StringValue(testScheduledJobManifest.Name): { RepoURL: testImageRepoURL, ImageTag: testImageTag, }, }, AdditionalTags: map[string]string{ "owner": "boss", }, }, }, tc: testScheduledJobManifest.TaskConfig, }, manifest: testScheduledJobManifest, } params, err := c.SerializedParameters() require.NoError(t, err) require.Equal(t, params, `{ "Parameters": { "AddonsTemplateURL": "", "AppName": "phonetool", "ContainerImage": "111111111111.dkr.ecr.us-west-2.amazonaws.com/phonetool/frontend:manual-bf3678c", "EnvFileARN": "", "EnvName": "test", "LogRetention": "30", "Schedule": "cron(0 0 * * ? *)", "TaskCPU": "256", "TaskCount": "1", "TaskMemory": "512", "WorkloadName": "mailer" }, "Tags": { "copilot-application": "phonetool", "copilot-environment": "test", "copilot-service": "mailer", "owner": "boss" } }`) }
611
copilot-cli
aws
Go
//go:build integration || localintegration // Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package stack_test import ( "fmt" "os" "path/filepath" "testing" "github.com/aws/aws-sdk-go/aws" "github.com/aws/copilot-cli/internal/pkg/addon" "github.com/aws/copilot-cli/internal/pkg/config" "github.com/aws/copilot-cli/internal/pkg/deploy/cloudformation/stack" "github.com/aws/copilot-cli/internal/pkg/manifest" "github.com/aws/copilot-cli/internal/pkg/workspace" "github.com/spf13/afero" "github.com/stretchr/testify/require" ) const ( autoScalingManifestPath = "manifest.yml" appName = "my-app" imageURL = "mockImageURL" imageTag = "latest" ) var envName = "test" func Test_Stack_Local_Integration(t *testing.T) { const ( wantedAutoScalingCFNTemplatePath = "autoscaling-svc-cf.yml" wantedAutoScalingCFNParameterPath = "cf.params.json" wantedOverrideCFNTemplatePath = "override-cf.yml" ) path := filepath.Join("testdata", "stacklocal", autoScalingManifestPath) wantedManifestBytes, err := os.ReadFile(path) require.NoError(t, err) mft, err := manifest.UnmarshalWorkload(wantedManifestBytes) require.NoError(t, err) content := mft.Manifest() v, ok := content.(*manifest.LoadBalancedWebService) require.Equal(t, ok, true) // Create in-memory mock file system. wd, err := os.Getwd() require.NoError(t, err) fs := afero.NewMemMapFs() _ = fs.MkdirAll(fmt.Sprintf("%s/copilot", wd), 0755) _ = afero.WriteFile(fs, fmt.Sprintf("%s/copilot/.workspace", wd), []byte(fmt.Sprintf("---\napplication: %s", "DavidsApp")), 0644) require.NoError(t, err) ws, err := workspace.Use(fs) require.NoError(t, err) _, err = addon.ParseFromWorkload(aws.StringValue(v.Name), ws) var notFound *addon.ErrAddonsNotFound require.ErrorAs(t, err, &notFound) envConfig := &manifest.Environment{ Workload: manifest.Workload{ Name: &envName, }, } envConfig.HTTPConfig.Public.Certificates = []string{"mockCertARN"} serializer, err := stack.NewLoadBalancedWebService(stack.LoadBalancedWebServiceConfig{ App: &config.Application{Name: appName}, EnvManifest: envConfig, Manifest: v, ArtifactBucketName: "bucket", RuntimeConfig: stack.RuntimeConfig{ PushedImages: map[string]stack.ECRImage{ aws.StringValue(v.Name): { RepoURL: imageURL, ImageTag: imageTag, }, }, EnvVersion: "v1.42.0", }, }) require.NoError(t, err) tpl, err := serializer.Template() require.NoError(t, err) t.Run("CloudFormation template must contain autoscaling resources", func(t *testing.T) { path := filepath.Join("testdata", "stacklocal", wantedAutoScalingCFNTemplatePath) wantedCFNBytes, err := os.ReadFile(path) require.NoError(t, err) require.Contains(t, tpl, string(wantedCFNBytes)) }) t.Run("CloudFormation template must be overridden correctly", func(t *testing.T) { path := filepath.Join("testdata", "stacklocal", wantedOverrideCFNTemplatePath) wantedCFNBytes, err := os.ReadFile(path) require.NoError(t, err) require.Contains(t, tpl, string(wantedCFNBytes)) }) t.Run("CloudFormation template parameter values must match", func(t *testing.T) { params, err := serializer.SerializedParameters() require.NoError(t, err) path := filepath.Join("testdata", "stacklocal", wantedAutoScalingCFNParameterPath) wantedCFNParamsBytes, err := os.ReadFile(path) require.NoError(t, err) require.Equal(t, params, string(wantedCFNParamsBytes)) }) }
118
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package stack import ( "fmt" "github.com/aws/aws-sdk-go/aws" "github.com/aws/aws-sdk-go/service/cloudformation" "github.com/aws/copilot-cli/internal/pkg/aws/s3" "github.com/aws/copilot-cli/internal/pkg/config" "github.com/aws/copilot-cli/internal/pkg/deploy" "github.com/aws/copilot-cli/internal/pkg/deploy/upload/customresource" "github.com/aws/copilot-cli/internal/pkg/manifest" "github.com/aws/copilot-cli/internal/pkg/manifest/manifestinfo" "github.com/aws/copilot-cli/internal/pkg/template" ) // StaticSite represents the configuration needed to create a CloudFormation stack from a static site service manifest. type StaticSite struct { *wkld manifest *manifest.StaticSite dnsDelegationEnabled bool appInfo deploy.AppInformation parser staticSiteReadParser assetMappingURL string } // StaticSiteConfig contains fields to configure StaticSite. type StaticSiteConfig struct { App *config.Application EnvManifest *manifest.Environment Manifest *manifest.StaticSite RawManifest []byte // Content of the manifest file without any transformations. RuntimeConfig RuntimeConfig RootUserARN string ArtifactBucketName string Addons NestedStackConfigurer AssetMappingURL string } // NewStaticSite creates a new CFN stack from a manifest file, given the options. func NewStaticSite(cfg *StaticSiteConfig) (*StaticSite, error) { crs, err := customresource.StaticSite(fs) if err != nil { return nil, fmt.Errorf("static site custom resources: %w", err) } cfg.RuntimeConfig.loadCustomResourceURLs(cfg.ArtifactBucketName, uploadableCRs(crs).convert()) var dnsDelegationEnabled bool var appInfo deploy.AppInformation if cfg.App.Domain != "" { dnsDelegationEnabled = true appInfo = deploy.AppInformation{ Name: cfg.App.Name, Domain: cfg.App.Domain, AccountPrincipalARN: cfg.RootUserARN, } } return &StaticSite{ wkld: &wkld{ name: aws.StringValue(cfg.Manifest.Name), env: aws.StringValue(cfg.EnvManifest.Name), app: cfg.App.Name, permBound: cfg.App.PermissionsBoundary, artifactBucketName: cfg.ArtifactBucketName, rc: cfg.RuntimeConfig, rawManifest: cfg.RawManifest, parser: fs, addons: cfg.Addons, }, manifest: cfg.Manifest, dnsDelegationEnabled: dnsDelegationEnabled, appInfo: appInfo, parser: fs, assetMappingURL: cfg.AssetMappingURL, }, nil } // Template returns the CloudFormation template for the service parametrized for the environment. func (s *StaticSite) Template() (string, error) { crs, err := convertCustomResources(s.rc.CustomResourcesURL) if err != nil { return "", err } addonsParams, err := s.addonsParameters() if err != nil { return "", err } addonsOutputs, err := s.addonsOutputs() if err != nil { return "", err } var bucket, path string if s.assetMappingURL != "" { bucket, path, err = s3.ParseURL(s.assetMappingURL) if err != nil { return "", err } } dnsDelegationRole, dnsName := convertAppInformation(s.appInfo) content, err := s.parser.ParseStaticSite(template.WorkloadOpts{ // Workload parameters. AppName: s.app, EnvName: s.env, EnvVersion: s.rc.EnvVersion, SerializedManifest: string(s.rawManifest), WorkloadName: s.name, WorkloadType: manifestinfo.StaticSiteType, // Additional options that are common between **all** workload templates. AddonsExtraParams: addonsParams, NestedStack: addonsOutputs, PermissionsBoundary: s.permBound, // Custom Resource Config. CustomResources: crs, AppDNSName: dnsName, AppDNSDelegationRole: dnsDelegationRole, AssetMappingFileBucket: bucket, AssetMappingFilePath: path, StaticSiteAlias: s.manifest.HTTP.Alias, }) if err != nil { return "", err } return content.String(), nil } // Parameters returns the list of CloudFormation parameters used by the template. func (s *StaticSite) Parameters() ([]*cloudformation.Parameter, error) { return []*cloudformation.Parameter{ { ParameterKey: aws.String(WorkloadAppNameParamKey), ParameterValue: aws.String(s.app), }, { ParameterKey: aws.String(WorkloadEnvNameParamKey), ParameterValue: aws.String(s.env), }, { ParameterKey: aws.String(WorkloadNameParamKey), ParameterValue: aws.String(s.name), }, { ParameterKey: aws.String(WorkloadAddonsTemplateURLParamKey), ParameterValue: aws.String(s.rc.AddonsTemplateURL), }, }, nil } // SerializedParameters returns the CloudFormation stack's parameters serialized to a JSON document. func (s *StaticSite) SerializedParameters() (string, error) { return serializeTemplateConfig(s.wkld.parser, s) }
160
copilot-cli
aws
Go
//go:build integration || localintegration // Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package stack_test import ( "encoding/json" "os" "path/filepath" "testing" "github.com/aws/copilot-cli/internal/pkg/config" "github.com/aws/copilot-cli/internal/pkg/deploy/cloudformation/stack" "github.com/aws/copilot-cli/internal/pkg/manifest" "github.com/golang/mock/gomock" "github.com/stretchr/testify/require" "gopkg.in/yaml.v3" ) func TestStaticSiteService_TemplateAndParamsGeneration(t *testing.T) { const ( appName = "my-app" ) envName := "my-env" testDir := filepath.Join("testdata", "workloads") tests := map[string]struct { ManifestPath string TemplatePath string ParamsPath string EnvImportedCertARNs []string }{ "simple": { ManifestPath: filepath.Join(testDir, "static-site-manifest.yml"), TemplatePath: filepath.Join(testDir, "static-site.stack.yml"), ParamsPath: filepath.Join(testDir, "static-site.params.json"), }, } // run tests for name, tc := range tests { t.Run(name, func(t *testing.T) { ctrl := gomock.NewController(t) defer ctrl.Finish() // parse files manifestBytes, err := os.ReadFile(tc.ManifestPath) require.NoError(t, err) tmplBytes, err := os.ReadFile(tc.TemplatePath) require.NoError(t, err) paramsBytes, err := os.ReadFile(tc.ParamsPath) require.NoError(t, err) dynamicMft, err := manifest.UnmarshalWorkload([]byte(manifestBytes)) require.NoError(t, err) require.NoError(t, dynamicMft.Validate()) mft := dynamicMft.Manifest() envConfig := &manifest.Environment{ Workload: manifest.Workload{ Name: &envName, }, } serializer, err := stack.NewStaticSite(&stack.StaticSiteConfig{ App: &config.Application{ Name: appName, Domain: "example.com", }, EnvManifest: envConfig, Manifest: mft.(*manifest.StaticSite), RuntimeConfig: stack.RuntimeConfig{ EnvVersion: "v1.42.0", Region: "us-west-2", }, ArtifactBucketName: "bucket", AssetMappingURL: "s3://stackset-bucket/mappingfile", RootUserARN: "arn:aws:iam::123456789123:root", }) require.NoError(t, err) // validate generated template tmpl, err := serializer.Template() require.NoError(t, err) var actualTmpl map[any]any require.NoError(t, yaml.Unmarshal([]byte(tmpl), &actualTmpl)) resetCustomResourceLocations(actualTmpl) var expectedTmpl map[any]any require.NoError(t, yaml.Unmarshal(tmplBytes, &expectedTmpl)) compareStackTemplate(t, expectedTmpl, actualTmpl) // validate generated params params, err := serializer.SerializedParameters() require.NoError(t, err) var actualParams map[string]any require.NoError(t, json.Unmarshal([]byte(params), &actualParams)) var expectedParams map[string]any require.NoError(t, json.Unmarshal(paramsBytes, &expectedParams)) require.Equal(t, expectedParams, actualParams, "param mismatch") }) } }
107
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package stack import ( "errors" "testing" "github.com/aws/copilot-cli/internal/pkg/config" "github.com/aws/copilot-cli/internal/pkg/deploy" "github.com/aws/copilot-cli/internal/pkg/deploy/cloudformation/stack/mocks" "github.com/aws/copilot-cli/internal/pkg/manifest/manifestinfo" "github.com/aws/copilot-cli/internal/pkg/template/templatetest" "github.com/golang/mock/gomock" "github.com/aws/aws-sdk-go/aws" "github.com/aws/aws-sdk-go/service/cloudformation" "github.com/aws/copilot-cli/internal/pkg/manifest" "github.com/stretchr/testify/require" ) var testStaticSiteManifest = &manifest.StaticSite{ Workload: manifest.Workload{ Name: aws.String(testServiceName), Type: aws.String(manifestinfo.StaticSiteType), }, } func TestStaticSite_NewStaticSite(t *testing.T) { t.Cleanup(func() { fs = realEmbedFS }) fs = templatetest.Stub{} type testInput struct { mft *manifest.StaticSite env string rc RuntimeConfig app string urls map[string]string } testCases := map[string]struct { input testInput mockDependencies func(t *testing.T, ctrl *gomock.Controller, c *RequestDrivenWebService) wantedStack *StaticSite wantedError error }{ "should return StaticSite": { input: testInput{ mft: testStaticSiteManifest, env: testEnvName, rc: RuntimeConfig{ Region: "us-west-2", }, app: testAppName, urls: map[string]string{ "custom-domain-app-runner": "mockURL1", "aws-sdk-layer": "mockURL2", }, }, wantedStack: &StaticSite{ wkld: &wkld{ name: aws.StringValue(testStaticSiteManifest.Name), env: testEnvName, app: testAppName, rc: RuntimeConfig{ CustomResourcesURL: map[string]string{ "CertificateValidationFunction": "https://mockBucket.s3.us-west-2.amazonaws.com/manual/scripts/custom-resources/certificatevalidationfunction/8932747ba5dbff619d89b92d0033ef1d04f7dd1b055e073254907d4e38e3976d.zip", "CustomDomainFunction": "https://mockBucket.s3.us-west-2.amazonaws.com/manual/scripts/custom-resources/customdomainfunction/8932747ba5dbff619d89b92d0033ef1d04f7dd1b055e073254907d4e38e3976d.zip", "TriggerStateMachineFunction": "https://mockBucket.s3.us-west-2.amazonaws.com/manual/scripts/custom-resources/triggerstatemachinefunction/8932747ba5dbff619d89b92d0033ef1d04f7dd1b055e073254907d4e38e3976d.zip", }, Region: "us-west-2", }, }, manifest: testStaticSiteManifest, appInfo: deploy.AppInformation{ Name: testAppName, }, }, }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { ctrl := gomock.NewController(t) defer ctrl.Finish() addons := mocks.NewMockNestedStackConfigurer(ctrl) stack, err := NewStaticSite(&StaticSiteConfig{ EnvManifest: &manifest.Environment{ Workload: manifest.Workload{ Name: &tc.input.env, }, }, App: &config.Application{ Name: tc.input.app, }, Manifest: tc.input.mft, RuntimeConfig: tc.input.rc, ArtifactBucketName: "mockBucket", Addons: addons, }) require.Equal(t, tc.wantedError, err) require.Equal(t, tc.wantedStack.name, stack.name) require.Equal(t, tc.wantedStack.env, stack.env) require.Equal(t, tc.wantedStack.app, stack.app) require.Equal(t, tc.wantedStack.rc, stack.rc) require.Equal(t, tc.wantedStack.image, stack.image) require.Equal(t, tc.wantedStack.manifest, stack.manifest) require.NotNil(t, stack.addons) }) } } func TestStaticSite_Template(t *testing.T) { t.Cleanup(func() { fs = realEmbedFS }) fs = templatetest.Stub{} t.Run("returns a wrapped error when addons template parsing fails", func(t *testing.T) { // GIVEN static, err := NewStaticSite(&StaticSiteConfig{ App: &config.Application{}, EnvManifest: &manifest.Environment{}, Manifest: &manifest.StaticSite{ Workload: manifest.Workload{ Name: aws.String("frontend"), }, }, ArtifactBucketName: "mockBucket", RuntimeConfig: RuntimeConfig{ Region: "us-west-2", }, Addons: mockAddons{tplErr: errors.New("some error")}, }) require.NoError(t, err) // WHEN _, err = static.Template() // THEN require.EqualError(t, err, "generate addons template for frontend: some error") }) t.Run("returns a wrapped error when addons parameter parsing fails", func(t *testing.T) { // GIVEN static, err := NewStaticSite(&StaticSiteConfig{ App: &config.Application{}, EnvManifest: &manifest.Environment{}, Manifest: &manifest.StaticSite{ Workload: manifest.Workload{ Name: aws.String("frontend"), }, }, ArtifactBucketName: "mockBucket", RuntimeConfig: RuntimeConfig{ Region: "us-west-2", }, Addons: mockAddons{paramsErr: errors.New("some error")}, }) require.NoError(t, err) // WHEN _, err = static.Template() // THEN require.EqualError(t, err, "parse addons parameters for frontend: some error") }) t.Run("returns a wrapped error when asset mapping url is invalid", func(t *testing.T) { // GIVEN addons := mockAddons{ tpl: ` Resources: AdditionalResourcesPolicy: Type: AWS::IAM::ManagedPolicy Outputs: AdditionalResourcesPolicyArn: Value: hello`, } static, err := NewStaticSite(&StaticSiteConfig{ App: &config.Application{}, EnvManifest: &manifest.Environment{}, Manifest: &manifest.StaticSite{}, Addons: addons, ArtifactBucketName: "mockBucket", RuntimeConfig: RuntimeConfig{ Region: "us-west-2", }, AssetMappingURL: "notAnS3URL", }) require.NoError(t, err) // WHEN _, err = static.Template() // THEN require.EqualError(t, err, "cannot parse S3 URL notAnS3URL into bucket name and key") }) t.Run("returns the error when parsing the service template fails", func(t *testing.T) { // GIVEN ctrl := gomock.NewController(t) defer ctrl.Finish() parser := mocks.NewMockstaticSiteReadParser(ctrl) parser.EXPECT().ParseStaticSite(gomock.Any()).Return(nil, errors.New("some error")) addons := mockAddons{ tpl: ` Resources: AdditionalResourcesPolicy: Type: AWS::IAM::ManagedPolicy Outputs: AdditionalResourcesPolicyArn: Value: hello`, } static, err := NewStaticSite(&StaticSiteConfig{ App: &config.Application{}, EnvManifest: &manifest.Environment{}, Manifest: &manifest.StaticSite{}, Addons: addons, ArtifactBucketName: "mockBucket", RuntimeConfig: RuntimeConfig{ Region: "us-west-2", }, AssetMappingURL: "s3://bucket/path/to/file", }) static.parser = parser require.NoError(t, err) // WHEN _, err = static.Template() // THEN require.EqualError(t, err, "some error") }) } func TestStaticSite_Parameters(t *testing.T) { t.Cleanup(func() { fs = realEmbedFS }) fs = templatetest.Stub{} testCases := map[string]struct { expectedParams []*cloudformation.Parameter expectedErr error }{ "HTTPS Enabled": { expectedParams: []*cloudformation.Parameter{ { ParameterKey: aws.String(WorkloadAppNameParamKey), ParameterValue: aws.String("phonetool"), }, { ParameterKey: aws.String(WorkloadEnvNameParamKey), ParameterValue: aws.String("test"), }, { ParameterKey: aws.String(WorkloadNameParamKey), ParameterValue: aws.String("frontend"), }, { ParameterKey: aws.String(WorkloadAddonsTemplateURLParamKey), ParameterValue: aws.String("mockURL"), }, }, }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { testManifest := manifest.NewStaticSite(manifest.StaticSiteProps{ Name: "frontend", }) // GIVEN conf, err := NewStaticSite(&StaticSiteConfig{ App: &config.Application{ Name: testAppName, }, RuntimeConfig: RuntimeConfig{ AddonsTemplateURL: "mockURL", }, EnvManifest: &manifest.Environment{ Workload: manifest.Workload{ Name: aws.String(testEnvName), }, }, Manifest: testManifest, }) require.NoError(t, err) // WHEN params, err := conf.Parameters() // THEN if err == nil { require.ElementsMatch(t, tc.expectedParams, params) } else { require.EqualError(t, tc.expectedErr, err.Error()) } }) } } func TestStaticSite_SerializedParameters(t *testing.T) { t.Cleanup(func() { fs = realEmbedFS }) fs = templatetest.Stub{} c, _ := NewStaticSite(&StaticSiteConfig{ EnvManifest: &manifest.Environment{ Workload: manifest.Workload{ Name: aws.String(testEnvName), }, }, App: &config.Application{ Name: testAppName, }, Manifest: testStaticSiteManifest, RuntimeConfig: RuntimeConfig{ AdditionalTags: map[string]string{ "owner": "copilot", }, }, }) params, err := c.SerializedParameters() require.NoError(t, err) require.Equal(t, params, `{ "Parameters": { "AddonsTemplateURL": "", "AppName": "phonetool", "EnvName": "test", "WorkloadName": "frontend" }, "Tags": { "copilot-application": "phonetool", "copilot-environment": "test", "copilot-service": "frontend", "owner": "copilot" } }`) }
349
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package stack import ( "sort" "github.com/aws/aws-sdk-go/aws" "github.com/aws/aws-sdk-go/service/cloudformation" "github.com/aws/copilot-cli/internal/pkg/aws/tags" ) func mergeAndFlattenTags(additionalTags map[string]string, cliTags map[string]string) []*cloudformation.Tag { var flatTags []*cloudformation.Tag for k, v := range tags.Merge(additionalTags, cliTags) { flatTags = append(flatTags, &cloudformation.Tag{ Key: aws.String(k), Value: aws.String(v), }) } sort.SliceStable(flatTags, func(i, j int) bool { return aws.StringValue(flatTags[i].Key) < aws.StringValue(flatTags[j].Key) }) return flatTags }
25
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package stack import ( "fmt" "strconv" "strings" "github.com/aws/copilot-cli/internal/pkg/deploy" "github.com/aws/copilot-cli/internal/pkg/template" "github.com/aws/aws-sdk-go/aws" "github.com/aws/aws-sdk-go/service/cloudformation" ) const ( taskTemplatePath = "task/cf.yml" taskNameParamKey = "TaskName" taskCPUParamKey = "TaskCPU" taskMemoryParamKey = "TaskMemory" taskLogRetentionParamKey = "LogRetention" taskContainerImageParamKey = "ContainerImage" taskTaskRoleParamKey = "TaskRole" taskCommandParamKey = "Command" taskEntryPointParamKey = "EntryPoint" taskEnvFileARNParamKey = "EnvFileARN" taskOSParamKey = "OS" taskArchParamKey = "Arch" // TaskOutputS3Bucket is the CFN stack output logical ID for a task's S3 bucket. TaskOutputS3Bucket = "S3Bucket" taskLogRetentionInDays = "1" ) type taskStackConfig struct { *deploy.CreateTaskResourcesInput parser template.ReadParser } // NewTaskStackConfig sets up a struct that provides stack configurations for CloudFormation // to deploy the task resources stack. func NewTaskStackConfig(taskOpts *deploy.CreateTaskResourcesInput) *taskStackConfig { return &taskStackConfig{ CreateTaskResourcesInput: taskOpts, parser: template.New(), } } // StackName returns the name of the CloudFormation stack for the task. func (t *taskStackConfig) StackName() string { return string(NameForTask(t.Name)) } var cfnFuntion = map[string]interface{}{ "isARN": template.IsARNFunc, "trimSlashPrefix": template.TrimSlashPrefix, } // Template returns the task CloudFormation template. func (t *taskStackConfig) Template() (string, error) { content, err := t.parser.Parse(taskTemplatePath, struct { EnvVars map[string]string SSMParamSecrets map[string]string SecretsManagerSecrets map[string]string App string Env string ExecutionRole string PermissionsBoundary string }{ EnvVars: t.EnvVars, SSMParamSecrets: t.SSMParamSecrets, SecretsManagerSecrets: t.SecretsManagerSecrets, App: t.App, Env: t.Env, ExecutionRole: t.ExecutionRole, PermissionsBoundary: t.PermissionsBoundary, }, template.WithFuncs(cfnFuntion)) if err != nil { return "", fmt.Errorf("read template for task stack: %w", err) } return content.String(), nil } // Parameters returns the parameter values to be passed to the task CloudFormation template. func (t *taskStackConfig) Parameters() ([]*cloudformation.Parameter, error) { return []*cloudformation.Parameter{ { ParameterKey: aws.String(taskNameParamKey), ParameterValue: aws.String(t.Name), }, { ParameterKey: aws.String(taskCPUParamKey), ParameterValue: aws.String(strconv.Itoa(t.CPU)), }, { ParameterKey: aws.String(taskMemoryParamKey), ParameterValue: aws.String(strconv.Itoa(t.Memory)), }, { ParameterKey: aws.String(taskLogRetentionParamKey), ParameterValue: aws.String(taskLogRetentionInDays), }, { ParameterKey: aws.String(taskContainerImageParamKey), ParameterValue: aws.String(t.Image), }, { ParameterKey: aws.String(taskTaskRoleParamKey), ParameterValue: aws.String(t.TaskRole), }, { ParameterKey: aws.String(taskCommandParamKey), ParameterValue: aws.String(strings.Join(t.Command, ",")), }, { ParameterKey: aws.String(taskEntryPointParamKey), ParameterValue: aws.String(strings.Join(t.EntryPoint, ",")), }, { ParameterKey: aws.String(taskEnvFileARNParamKey), ParameterValue: aws.String(t.EnvFileARN), }, { ParameterKey: aws.String(taskOSParamKey), ParameterValue: aws.String(t.OS), }, { ParameterKey: aws.String(taskArchParamKey), ParameterValue: aws.String(t.Arch), }, }, nil } // SerializedParameters returns the CloudFormation stack's parameters serialized // to a YAML document annotated with comments for readability to users. func (s *taskStackConfig) SerializedParameters() (string, error) { // No-op for now. return "", nil } // Tags returns the tags that should be applied to the task CloudFormation. func (t *taskStackConfig) Tags() []*cloudformation.Tag { tags := map[string]string{ deploy.TaskTagKey: t.Name, } if t.Env != "" { tags[deploy.AppTagKey] = t.App tags[deploy.EnvTagKey] = t.Env } return mergeAndFlattenTags(t.AdditionalTags, tags) }
159
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package stack import ( "bytes" "errors" "testing" "github.com/aws/copilot-cli/internal/pkg/deploy" "github.com/aws/aws-sdk-go/aws" "github.com/aws/aws-sdk-go/service/cloudformation" "github.com/aws/copilot-cli/internal/pkg/template" "github.com/aws/copilot-cli/internal/pkg/template/mocks" "github.com/golang/mock/gomock" "github.com/stretchr/testify/require" ) const ( testTaskName = "my-task" ) func TestTaskStackConfig_Template(t *testing.T) { testCases := map[string]struct { mockReadParser func(m *mocks.MockReadParser) wantedTemplate string wantedError error }{ "should return error if unable to read": { mockReadParser: func(m *mocks.MockReadParser) { m.EXPECT().Parse(taskTemplatePath, gomock.Any(), gomock.Any()).Return(nil, errors.New("error reading template")) }, wantedError: errors.New("read template for task stack: error reading template"), }, "should return template body when present": { mockReadParser: func(m *mocks.MockReadParser) { m.EXPECT().Parse(taskTemplatePath, gomock.Any(), gomock.Any()).Return(&template.Content{ Buffer: bytes.NewBufferString("This is the task template"), }, nil) }, wantedTemplate: "This is the task template", }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { ctrl := gomock.NewController(t) defer ctrl.Finish() mockReadParser := mocks.NewMockReadParser(ctrl) if tc.mockReadParser != nil { tc.mockReadParser(mockReadParser) } taskInput := deploy.CreateTaskResourcesInput{} taskStackConfig := &taskStackConfig{ CreateTaskResourcesInput: &taskInput, parser: mockReadParser, } got, err := taskStackConfig.Template() if tc.wantedError != nil { require.EqualError(t, tc.wantedError, err.Error()) } else { require.Equal(t, tc.wantedTemplate, got) } }) } } func TestTaskStackConfig_Parameters(t *testing.T) { expectedParams := []*cloudformation.Parameter{ { ParameterKey: aws.String(taskNameParamKey), ParameterValue: aws.String("my-task"), }, { ParameterKey: aws.String(taskContainerImageParamKey), ParameterValue: aws.String("7456.dkr.ecr.us-east-2.amazonaws.com/my-task:0.1"), }, { ParameterKey: aws.String(taskCPUParamKey), ParameterValue: aws.String("256"), }, { ParameterKey: aws.String(taskMemoryParamKey), ParameterValue: aws.String("512"), }, { ParameterKey: aws.String(taskLogRetentionParamKey), ParameterValue: aws.String(taskLogRetentionInDays), }, { ParameterKey: aws.String(taskTaskRoleParamKey), ParameterValue: aws.String("task-role"), }, { ParameterKey: aws.String(taskCommandParamKey), ParameterValue: aws.String("echo hooray"), }, { ParameterKey: aws.String(taskEntryPointParamKey), ParameterValue: aws.String("exec,some command"), }, { ParameterKey: aws.String(taskEnvFileARNParamKey), ParameterValue: aws.String("arn:aws:s3:::somebucket/manual/1638391936/env"), }, { ParameterKey: aws.String(taskOSParamKey), ParameterValue: aws.String(""), }, { ParameterKey: aws.String(taskArchParamKey), ParameterValue: aws.String(""), }, } taskInput := deploy.CreateTaskResourcesInput{ Name: "my-task", CPU: 256, Memory: 512, Image: "7456.dkr.ecr.us-east-2.amazonaws.com/my-task:0.1", TaskRole: "task-role", EnvFileARN: "arn:aws:s3:::somebucket/manual/1638391936/env", Command: []string{"echo hooray"}, EntryPoint: []string{"exec", "some command"}, } task := &taskStackConfig{ CreateTaskResourcesInput: &taskInput, } params, _ := task.Parameters() require.ElementsMatch(t, expectedParams, params) } func TestTaskStackConfig_StackName(t *testing.T) { taskInput := deploy.CreateTaskResourcesInput{ Name: "my-task", } task := &taskStackConfig{ CreateTaskResourcesInput: &taskInput, } got := task.StackName() require.Equal(t, got, taskStackPrefix+testTaskName) } func TestTaskStackConfig_Tags(t *testing.T) { testCases := map[string]struct { input deploy.CreateTaskResourcesInput expectedTags []*cloudformation.Tag }{ "with app and env": { input: deploy.CreateTaskResourcesInput{ Name: "my-task", App: "my-app", Env: "test", }, expectedTags: []*cloudformation.Tag{ { Key: aws.String(deploy.TaskTagKey), Value: aws.String("my-task"), }, { Key: aws.String(deploy.AppTagKey), Value: aws.String("my-app"), }, { Key: aws.String(deploy.EnvTagKey), Value: aws.String("test"), }, }, }, "input without app or env": { input: deploy.CreateTaskResourcesInput{ Name: "my-task", Env: "", }, expectedTags: []*cloudformation.Tag{ { Key: aws.String(deploy.TaskTagKey), Value: aws.String("my-task"), }, }, }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { taskStackConfig := &taskStackConfig{ CreateTaskResourcesInput: &tc.input, } tags := taskStackConfig.Tags() require.ElementsMatch(t, tc.expectedTags, tags) }) } }
211
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package stack import ( "encoding/json" "fmt" "hash/crc32" "sort" "strconv" "strings" "time" "github.com/aws/copilot-cli/internal/pkg/deploy/upload/customresource" "github.com/aws/copilot-cli/internal/pkg/aws/partitions" "github.com/aws/copilot-cli/internal/pkg/deploy" "github.com/aws/copilot-cli/internal/pkg/template/override" "github.com/aws/copilot-cli/internal/pkg/aws/s3" "github.com/aws/aws-sdk-go/aws" "github.com/aws/copilot-cli/internal/pkg/manifest" "github.com/aws/copilot-cli/internal/pkg/template" ) const ( enabled = "ENABLED" disabled = "DISABLED" ) // SQS Queue field values. const ( sqsDedupeScopeMessageGroup = "messageGroup" sqsFIFOThroughputLimitPerMessageGroupId = "perMessageGroupId" ) // Default values for EFS options const ( defaultRootDirectory = "/" defaultIAM = disabled defaultReadOnly = true defaultWritePermission = false defaultNLBProtocol = manifest.TCP ) // Supported capacityproviders for Fargate services const ( capacityProviderFargateSpot = "FARGATE_SPOT" capacityProviderFargate = "FARGATE" ) // MinimumHealthyPercent and MaximumPercent configurations as per deployment strategy. const ( minHealthyPercentRecreate = 0 maxPercentRecreate = 100 minHealthyPercentDefault = 100 maxPercentDefault = 200 ) var ( taskDefOverrideRulePrefixes = []string{"Resources", "TaskDefinition", "Properties"} subnetPlacementForTemplate = map[manifest.PlacementString]string{ manifest.PrivateSubnetPlacement: template.PrivateSubnetsPlacement, manifest.PublicSubnetPlacement: template.PublicSubnetsPlacement, } ) func convertPortMappings(exposedPorts []manifest.ExposedPort) []*template.PortMapping { portMapping := make([]*template.PortMapping, len(exposedPorts)) for idx, exposedPort := range exposedPorts { portMapping[idx] = &template.PortMapping{ ContainerPort: exposedPort.Port, Protocol: exposedPort.Protocol, ContainerName: exposedPort.ContainerName, } } return portMapping } // convertSidecars converts the manifest sidecar configuration into a format parsable by the templates pkg. func convertSidecars(s map[string]*manifest.SidecarConfig, exposedPorts map[string][]manifest.ExposedPort, rc RuntimeConfig) ([]*template.SidecarOpts, error) { var sidecars []*template.SidecarOpts if s == nil { return nil, nil } // Sort the sidecars so that the order is consistent and the integration test won't be flaky. keys := make([]string, 0, len(s)) for k := range s { keys = append(keys, k) } sort.Strings(keys) for _, name := range keys { config := s[name] imageURI := rc.PushedImages[name].URI() if uri, hasLocation := config.ImageURI(); hasLocation { imageURI = uri } entrypoint, err := convertEntryPoint(config.EntryPoint) if err != nil { return nil, err } command, err := convertCommand(config.Command) if err != nil { return nil, err } mp := convertSidecarMountPoints(config.MountPoints) sidecars = append(sidecars, &template.SidecarOpts{ Name: name, Image: aws.String(imageURI), Essential: config.Essential, CredsParam: config.CredsParam, Secrets: convertSecrets(config.Secrets), Variables: convertEnvVars(config.Variables), Storage: template.SidecarStorageOpts{ MountPoints: mp, }, DockerLabels: config.DockerLabels, DependsOn: convertDependsOn(config.DependsOn), EntryPoint: entrypoint, HealthCheck: convertContainerHealthCheck(config.HealthCheck), Command: command, PortMappings: convertPortMappings(exposedPorts[name]), }) } return sidecars, nil } func convertContainerHealthCheck(hc manifest.ContainerHealthCheck) *template.ContainerHealthCheck { if hc.IsEmpty() { return nil } // Make sure that unset fields in the healthcheck gets a default value. hc.ApplyIfNotSet(manifest.NewDefaultContainerHealthCheck()) return &template.ContainerHealthCheck{ Command: hc.Command, Interval: aws.Int64(int64(hc.Interval.Seconds())), Retries: aws.Int64(int64(aws.IntValue(hc.Retries))), StartPeriod: aws.Int64(int64(hc.StartPeriod.Seconds())), Timeout: aws.Int64(int64(hc.Timeout.Seconds())), } } func convertHostedZone(alias manifest.Alias, defaultHostedZone *string) (template.AliasesForHostedZone, error) { aliasesFor := make(map[string][]string) if len(alias.AdvancedAliases) != 0 { for _, alias := range alias.AdvancedAliases { if alias.HostedZone != nil { if isDuplicateAliasEntry(aliasesFor[*alias.HostedZone], aws.StringValue(alias.Alias)) { continue } aliasesFor[*alias.HostedZone] = append(aliasesFor[*alias.HostedZone], *alias.Alias) continue } if defaultHostedZone != nil { if isDuplicateAliasEntry(aliasesFor[*defaultHostedZone], aws.StringValue(alias.Alias)) { continue } aliasesFor[*defaultHostedZone] = append(aliasesFor[*defaultHostedZone], *alias.Alias) } } return aliasesFor, nil } if defaultHostedZone == nil { return aliasesFor, nil } aliases, err := alias.ToStringSlice() if err != nil { return nil, err } for _, alias := range aliases { if isDuplicateAliasEntry(aliasesFor[*defaultHostedZone], alias) { continue } aliasesFor[*defaultHostedZone] = append(aliasesFor[*defaultHostedZone], alias) } return aliasesFor, nil } func isDuplicateAliasEntry(aliasList []string, alias string) bool { for _, entry := range aliasList { if entry == alias { return true } } return false } // convertDependsOn converts image and sidecar depends on fields to have upper case statuses. func convertDependsOn(d manifest.DependsOn) map[string]string { if d == nil { return nil } dependsOn := make(map[string]string) for name, status := range d { dependsOn[name] = strings.ToUpper(status) } return dependsOn } func convertAdvancedCount(a manifest.AdvancedCount) (*template.AdvancedCount, error) { if a.IsEmpty() { return nil, nil } autoscaling, err := convertAutoscaling(a) if err != nil { return nil, err } return &template.AdvancedCount{ Spot: a.Spot, Autoscaling: autoscaling, Cps: convertCapacityProviders(a), }, nil } // convertCapacityProviders transforms the manifest fields into a format // parsable by the templates pkg. func convertCapacityProviders(a manifest.AdvancedCount) []*template.CapacityProviderStrategy { if a.Spot == nil && a.Range.RangeConfig.SpotFrom == nil { return nil } var cps []*template.CapacityProviderStrategy // if Spot specified as count, then weight on Spot CPS should be 1 cps = append(cps, &template.CapacityProviderStrategy{ Weight: aws.Int(1), CapacityProvider: capacityProviderFargateSpot, }) rc := a.Range.RangeConfig // Return if only spot is specified as count if rc.SpotFrom == nil { return cps } // Scaling with spot spotFrom := aws.IntValue(rc.SpotFrom) min := aws.IntValue(rc.Min) // If spotFrom value is greater than or equal to the autoscaling min, // then the base value on the Fargate capacity provider must be set // to one less than spotFrom if spotFrom >= min { base := spotFrom - 1 if base < 0 { base = 0 } fgCapacity := &template.CapacityProviderStrategy{ Base: aws.Int(base), Weight: aws.Int(0), CapacityProvider: capacityProviderFargate, } cps = append(cps, fgCapacity) } return cps } // convertCooldown converts a service manifest cooldown struct into a format parsable // by the templates pkg. func convertCooldown(c manifest.Cooldown) template.Cooldown { if c.IsEmpty() { return template.Cooldown{} } cooldown := template.Cooldown{} if c.ScaleInCooldown != nil { scaleInTime := float64(*c.ScaleInCooldown) / float64(time.Second) cooldown.ScaleInCooldown = aws.Float64(scaleInTime) } if c.ScaleOutCooldown != nil { scaleOutTime := float64(*c.ScaleOutCooldown) / float64(time.Second) cooldown.ScaleOutCooldown = aws.Float64(scaleOutTime) } return cooldown } // convertScalingCooldown handles the logic of converting generalized and specific cooldowns set // into the scaling cooldown used in the Auto Scaling configuration. func convertScalingCooldown(specCooldown, genCooldown manifest.Cooldown) template.Cooldown { cooldown := convertCooldown(genCooldown) specTemplateCooldown := convertCooldown(specCooldown) if specCooldown.ScaleInCooldown != nil { cooldown.ScaleInCooldown = specTemplateCooldown.ScaleInCooldown } if specCooldown.ScaleOutCooldown != nil { cooldown.ScaleOutCooldown = specTemplateCooldown.ScaleOutCooldown } return cooldown } // convertAutoscaling converts the service's Auto Scaling configuration into a format parsable // by the templates pkg. func convertAutoscaling(a manifest.AdvancedCount) (*template.AutoscalingOpts, error) { if a.IsEmpty() { return nil, nil } if a.Spot != nil { return nil, nil } min, max, err := a.Range.Parse() if err != nil { return nil, err } autoscalingOpts := template.AutoscalingOpts{ MinCapacity: &min, MaxCapacity: &max, } if a.CPU.Value != nil { autoscalingOpts.CPU = aws.Float64(float64(*a.CPU.Value)) } if a.CPU.ScalingConfig.Value != nil { autoscalingOpts.CPU = aws.Float64(float64(*a.CPU.ScalingConfig.Value)) } if a.Memory.Value != nil { autoscalingOpts.Memory = aws.Float64(float64(*a.Memory.Value)) } if a.Memory.ScalingConfig.Value != nil { autoscalingOpts.Memory = aws.Float64(float64(*a.Memory.ScalingConfig.Value)) } if a.Requests.Value != nil { autoscalingOpts.Requests = aws.Float64(float64(*a.Requests.Value)) } if a.Requests.ScalingConfig.Value != nil { autoscalingOpts.Requests = aws.Float64(float64(*a.Requests.ScalingConfig.Value)) } if a.ResponseTime.Value != nil { responseTime := float64(*a.ResponseTime.Value) / float64(time.Second) autoscalingOpts.ResponseTime = aws.Float64(responseTime) } if a.ResponseTime.ScalingConfig.Value != nil { responseTime := float64(*a.ResponseTime.ScalingConfig.Value) / float64(time.Second) autoscalingOpts.ResponseTime = aws.Float64(responseTime) } autoscalingOpts.CPUCooldown = convertScalingCooldown(a.CPU.ScalingConfig.Cooldown, a.Cooldown) autoscalingOpts.MemCooldown = convertScalingCooldown(a.Memory.ScalingConfig.Cooldown, a.Cooldown) autoscalingOpts.ReqCooldown = convertScalingCooldown(a.Requests.ScalingConfig.Cooldown, a.Cooldown) autoscalingOpts.RespTimeCooldown = convertScalingCooldown(a.ResponseTime.ScalingConfig.Cooldown, a.Cooldown) autoscalingOpts.QueueDelayCooldown = convertScalingCooldown(a.QueueScaling.Cooldown, a.Cooldown) if !a.QueueScaling.IsEmpty() { acceptableBacklog, err := a.QueueScaling.AcceptableBacklogPerTask() if err != nil { return nil, err } autoscalingOpts.QueueDelay = &template.AutoscalingQueueDelayOpts{ AcceptableBacklogPerTask: acceptableBacklog, } } return &autoscalingOpts, nil } // convertHTTPHealthCheck converts the ALB health check configuration into a format parsable by the templates pkg. func convertHTTPHealthCheck(hc *manifest.HealthCheckArgsOrString) template.HTTPHealthCheckOpts { opts := template.HTTPHealthCheckOpts{ HealthCheckPath: manifest.DefaultHealthCheckPath, GracePeriod: manifest.DefaultHealthCheckGracePeriod, HealthyThreshold: hc.Advanced.HealthyThreshold, UnhealthyThreshold: hc.Advanced.UnhealthyThreshold, SuccessCodes: aws.StringValue(hc.Advanced.SuccessCodes), } if hc.IsZero() { return opts } if hc.IsBasic() { opts.HealthCheckPath = convertPath(hc.Basic) return opts } if hc.Advanced.Path != nil { opts.HealthCheckPath = convertPath(*hc.Advanced.Path) } if hc.Advanced.Port != nil { opts.Port = strconv.Itoa(aws.IntValue(hc.Advanced.Port)) } if hc.Advanced.Interval != nil { opts.Interval = aws.Int64(int64(hc.Advanced.Interval.Seconds())) } if hc.Advanced.Timeout != nil { opts.Timeout = aws.Int64(int64(hc.Advanced.Timeout.Seconds())) } if hc.Advanced.GracePeriod != nil { opts.GracePeriod = int64(hc.Advanced.GracePeriod.Seconds()) } return opts } // convertNLBHealthCheck converts the NLB health check configuration into a format parsable by the templates pkg. func convertNLBHealthCheck(nlbHC *manifest.NLBHealthCheckArgs) template.NLBHealthCheck { hc := template.NLBHealthCheck{ HealthyThreshold: nlbHC.HealthyThreshold, UnhealthyThreshold: nlbHC.UnhealthyThreshold, GracePeriod: aws.Int64(int64(manifest.DefaultHealthCheckGracePeriod)), } if nlbHC.Port != nil { hc.Port = strconv.Itoa(aws.IntValue(nlbHC.Port)) } if nlbHC.Timeout != nil { hc.Timeout = aws.Int64(int64(nlbHC.Timeout.Seconds())) } if nlbHC.Interval != nil { hc.Interval = aws.Int64(int64(nlbHC.Interval.Seconds())) } if nlbHC.GracePeriod != nil { hc.GracePeriod = aws.Int64(int64(nlbHC.GracePeriod.Seconds())) } return hc } type networkLoadBalancerConfig struct { settings *template.NetworkLoadBalancer // If a domain is associated these values are not empty. appDNSDelegationRole *string appDNSName *string } func convertELBAccessLogsConfig(mft *manifest.Environment) *template.ELBAccessLogs { elbAccessLogsArgs, isELBAccessLogsSet := mft.ELBAccessLogs() if !isELBAccessLogsSet { return nil } if elbAccessLogsArgs == nil { return &template.ELBAccessLogs{} } return &template.ELBAccessLogs{ BucketName: aws.StringValue(elbAccessLogsArgs.BucketName), Prefix: aws.StringValue(elbAccessLogsArgs.Prefix), } } // convertFlowLogsConfig converts the VPC FlowLog configuration into a format parsable by the templates pkg. func convertFlowLogsConfig(mft *manifest.Environment) (*template.VPCFlowLogs, error) { vpcFlowLogs := mft.EnvironmentConfig.Network.VPC.FlowLogs if vpcFlowLogs.IsZero() { return nil, nil } retentionInDays := aws.Int(14) if vpcFlowLogs.Advanced.Retention != nil { retentionInDays = vpcFlowLogs.Advanced.Retention } return &template.VPCFlowLogs{ Retention: retentionInDays, }, nil } func convertEnvSecurityGroupCfg(mft *manifest.Environment) (*template.SecurityGroupConfig, error) { securityGroupConfig, isSecurityConfigSet := mft.EnvSecurityGroup() if !isSecurityConfigSet { return nil, nil } var ingress = make([]template.SecurityGroupRule, len(securityGroupConfig.Ingress)) var egress = make([]template.SecurityGroupRule, len(securityGroupConfig.Egress)) for idx, ingressValue := range securityGroupConfig.Ingress { ingress[idx].IpProtocol = ingressValue.IpProtocol ingress[idx].CidrIP = ingressValue.CidrIP if fromPort, toPort, err := ingressValue.GetPorts(); err != nil { return nil, err } else { ingress[idx].ToPort = toPort ingress[idx].FromPort = fromPort } } for idx, egressValue := range securityGroupConfig.Egress { egress[idx].IpProtocol = egressValue.IpProtocol egress[idx].CidrIP = egressValue.CidrIP if fromPort, toPort, err := egressValue.GetPorts(); err != nil { return nil, err } else { egress[idx].ToPort = toPort egress[idx].FromPort = fromPort } } return &template.SecurityGroupConfig{ Ingress: ingress, Egress: egress, }, nil } func (s *LoadBalancedWebService) convertALBListener() (*template.ALBListener, error) { rrConfig := s.manifest.HTTPOrBool if rrConfig.Disabled() || rrConfig.IsEmpty() { return nil, nil } var rules []template.ALBListenerRule var aliasesFor template.AliasesForHostedZone for _, routingRule := range rrConfig.RoutingRules() { httpRedirect := true if routingRule.RedirectToHTTPS != nil { httpRedirect = aws.BoolValue(routingRule.RedirectToHTTPS) } rule, err := routingRuleConfigConverter{ rule: routingRule, manifest: s.manifest, httpsEnabled: s.httpsEnabled, redirectToHTTPS: httpRedirect, }.convert() if err != nil { return nil, err } rules = append(rules, *rule) aliasesFor, err = convertHostedZone(rrConfig.Main.Alias, rrConfig.Main.HostedZone) if err != nil { return nil, err } } return &template.ALBListener{ Rules: rules, IsHTTPS: s.httpsEnabled, HostedZoneAliases: aliasesFor, }, nil } func (s *BackendService) convertALBListener() (*template.ALBListener, error) { rrConfig := s.manifest.HTTP if rrConfig.IsEmpty() { return nil, nil } var rules []template.ALBListenerRule var hostedZoneAliases template.AliasesForHostedZone for _, routingRule := range rrConfig.RoutingRules() { rule, err := routingRuleConfigConverter{ rule: routingRule, manifest: s.manifest, httpsEnabled: s.httpsEnabled, redirectToHTTPS: s.httpsEnabled, }.convert() if err != nil { return nil, err } rules = append(rules, *rule) hostedZoneAliases, err = convertHostedZone(rrConfig.Main.Alias, rrConfig.Main.HostedZone) if err != nil { return nil, err } } return &template.ALBListener{ Rules: rules, IsHTTPS: s.httpsEnabled, MainContainerPort: s.manifest.MainContainerPort(), HostedZoneAliases: hostedZoneAliases, }, nil } func (s *BackendService) convertGracePeriod() *int64 { if s.manifest.HTTP.Main.HealthCheck.Advanced.GracePeriod != nil { return aws.Int64(int64(s.manifest.HTTP.Main.HealthCheck.Advanced.GracePeriod.Seconds())) } return aws.Int64(int64(manifest.DefaultHealthCheckGracePeriod)) } type loadBalancerTargeter interface { MainContainerPort() string ExposedPorts() (manifest.ExposedPortsIndex, error) } type routingRuleConfigConverter struct { rule manifest.RoutingRule manifest loadBalancerTargeter httpsEnabled bool redirectToHTTPS bool } // convertPath attempts to standardize manifest paths on '/path' or '/' patterns. // - If the path starts with a / (including '/'), return it unmodified. // - Otherwise, prepend a leading '/' character. // // CFN health check and path patterns expect a leading '/', so we do that here instead of in the template. // // Empty strings, if they make it to this point, are converted to '/'. func convertPath(path string) string { if path == "" { return "/" } if path[0] == '/' { return path } return "/" + path } func (conv routingRuleConfigConverter) convert() (*template.ALBListenerRule, error) { var aliases []string var err error exposedPorts, err := conv.manifest.ExposedPorts() if err != nil { return nil, err } targetContainer, targetPort, err := conv.rule.Target(exposedPorts) if err != nil { return nil, err } if conv.httpsEnabled { aliases, err = convertAlias(conv.rule.Alias) if err != nil { return nil, err } } config := &template.ALBListenerRule{ Path: convertPath(aws.StringValue(conv.rule.Path)), TargetContainer: targetContainer, TargetPort: targetPort, Aliases: aliases, HTTPHealthCheck: convertHTTPHealthCheck(&conv.rule.HealthCheck), AllowedSourceIps: convertAllowedSourceIPs(conv.rule.AllowedSourceIps), Stickiness: strconv.FormatBool(aws.BoolValue(conv.rule.Stickiness)), HTTPVersion: aws.StringValue(convertHTTPVersion(conv.rule.ProtocolVersion)), RedirectToHTTPS: conv.redirectToHTTPS, DeregistrationDelay: convertDeregistrationDelay(conv.rule.DeregistrationDelay), } return config, nil } func convertDeregistrationDelay(delay *time.Duration) *int64 { if delay == nil { return aws.Int64(int64(manifest.DefaultDeregistrationDelay)) } return aws.Int64(int64(delay.Seconds())) } type nlbListeners []template.NetworkLoadBalancerListener // isCertRequired returns true if any of the NLB listeners have protocol as TLS set. func (ls nlbListeners) isCertRequired() bool { for _, listener := range ls { if listener.Protocol == manifest.TLS { return true } } return false } func (s *LoadBalancedWebService) convertNetworkLoadBalancer() (networkLoadBalancerConfig, error) { nlbConfig := s.manifest.NLBConfig if nlbConfig.IsEmpty() { return networkLoadBalancerConfig{}, nil } exposedPorts, err := s.manifest.ExposedPorts() if err != nil { return networkLoadBalancerConfig{}, err } listeners := make(nlbListeners, len(nlbConfig.NLBListeners())) for idx, listener := range nlbConfig.NLBListeners() { // Parse targetContainer and targetPort for the Network Load Balancer targets. targetContainer, targetPort, err := listener.Target(exposedPorts) if err != nil { return networkLoadBalancerConfig{}, err } // Parse listener port and protocol. port, protocol, err := manifest.ParsePortMapping(listener.Port) if err != nil { return networkLoadBalancerConfig{}, err } if protocol == nil { protocol = aws.String(defaultNLBProtocol) } listeners[idx] = template.NetworkLoadBalancerListener{ Port: aws.StringValue(port), Protocol: strings.ToUpper(aws.StringValue(protocol)), TargetContainer: targetContainer, TargetPort: targetPort, SSLPolicy: listener.SSLPolicy, HealthCheck: convertNLBHealthCheck(&listener.HealthCheck), Stickiness: listener.Stickiness, DeregistrationDelay: convertDeregistrationDelay(listener.DeregistrationDelay), } } aliases, err := convertAlias(nlbConfig.Aliases) if err != nil { return networkLoadBalancerConfig{}, fmt.Errorf(`convert "nlb.alias" to string slice: %w`, err) } config := networkLoadBalancerConfig{ settings: &template.NetworkLoadBalancer{ PublicSubnetCIDRs: s.publicSubnetCIDRBlocks, Listener: listeners, Aliases: aliases, MainContainerPort: s.manifest.MainContainerPort(), CertificateRequired: listeners.isCertRequired(), }, } if s.dnsDelegationEnabled { dnsDelegationRole, dnsName := convertAppInformation(s.appInfo) config.appDNSName = dnsName config.appDNSDelegationRole = dnsDelegationRole } return config, nil } func (s *LoadBalancedWebService) convertGracePeriod() *int64 { if s.manifest.HTTPOrBool.Main.HealthCheck.Advanced.GracePeriod != nil { return aws.Int64(int64(s.manifest.HTTPOrBool.Main.HealthCheck.Advanced.GracePeriod.Seconds())) } if s.manifest.NLBConfig.Listener.HealthCheck.GracePeriod != nil { return aws.Int64(int64(s.manifest.NLBConfig.Listener.HealthCheck.GracePeriod.Seconds())) } return aws.Int64(int64(manifest.DefaultHealthCheckGracePeriod)) } func convertExecuteCommand(e *manifest.ExecuteCommand) *template.ExecuteCommandOpts { if e.Config.IsEmpty() && !aws.BoolValue(e.Enable) { return nil } return &template.ExecuteCommandOpts{} } func convertAllowedSourceIPs(allowedSourceIPs []manifest.IPNet) []string { var sourceIPs []string for _, ipNet := range allowedSourceIPs { sourceIPs = append(sourceIPs, string(ipNet)) } return sourceIPs } func convertServiceConnect(s manifest.ServiceConnectBoolOrArgs) *template.ServiceConnect { return &template.ServiceConnect{ Alias: s.ServiceConnectArgs.Alias, } } func convertLogging(lc manifest.Logging) *template.LogConfigOpts { if lc.IsEmpty() { return nil } return &template.LogConfigOpts{ Image: lc.LogImage(), ConfigFile: lc.ConfigFile, EnableMetadata: lc.GetEnableMetadata(), Destination: lc.Destination, SecretOptions: convertSecrets(lc.SecretOptions), Variables: convertEnvVars(lc.Variables), Secrets: convertSecrets(lc.Secrets), } } func convertTaskDefOverrideRules(inRules []manifest.OverrideRule) []override.Rule { var res []override.Rule suffixStr := strings.Join(taskDefOverrideRulePrefixes, override.PathSegmentSeparator) for _, r := range inRules { res = append(res, override.Rule{ Path: strings.Join([]string{suffixStr, r.Path}, override.PathSegmentSeparator), Value: r.Value, }) } return res } // convertStorageOpts converts a manifest Storage field into template data structures which can be used // to execute CFN templates func convertStorageOpts(wlName *string, in manifest.Storage) *template.StorageOpts { if in.IsEmpty() { return nil } return &template.StorageOpts{ Ephemeral: convertEphemeral(in.Ephemeral), ReadonlyRootFS: in.ReadonlyRootFS, Volumes: convertVolumes(in.Volumes), MountPoints: convertMountPoints(in.Volumes), EFSPerms: convertEFSPermissions(in.Volumes), ManagedVolumeInfo: convertManagedFSInfo(wlName, in.Volumes), } } func convertEphemeral(in *int) *int { // Min value for extensible ephemeral storage is 21; if customer specifies 20, which is the default size, // we shouldn't let CF error out. Instead, we'll just omit it from the config. if aws.IntValue(in) == 20 { return nil } return in } // convertSidecarMountPoints is used to convert from manifest to template objects. func convertSidecarMountPoints(in []manifest.SidecarMountPoint) []*template.MountPoint { if len(in) == 0 { return nil } var output []*template.MountPoint for _, smp := range in { output = append(output, convertMountPoint(smp.SourceVolume, smp.ContainerPath, smp.ReadOnly)) } return output } func convertMountPoint(sourceVolume, containerPath *string, readOnly *bool) *template.MountPoint { // readOnly defaults to true. oReadOnly := aws.Bool(defaultReadOnly) if readOnly != nil { oReadOnly = readOnly } return &template.MountPoint{ ReadOnly: oReadOnly, ContainerPath: containerPath, SourceVolume: sourceVolume, } } func convertMountPoints(input map[string]*manifest.Volume) []*template.MountPoint { if len(input) == 0 { return nil } var output []*template.MountPoint for name, volume := range input { output = append(output, convertMountPoint(aws.String(name), volume.ContainerPath, volume.ReadOnly)) } return output } func convertEFSPermissions(input map[string]*manifest.Volume) []*template.EFSPermission { var output []*template.EFSPermission for _, volume := range input { // If there's no EFS configuration, we don't need to generate any permissions. if volume.EmptyVolume() { continue } // If EFS is explicitly disabled, we don't need to generate permisisons. if volume.EFS.Disabled() { continue } // Managed FS permissions are rendered separately in the template. if volume.EFS.UseManagedFS() { continue } // Write defaults to false. write := defaultWritePermission if volume.ReadOnly != nil { write = !aws.BoolValue(volume.ReadOnly) } accessPointID := volume.EFS.Advanced.AuthConfig.AccessPointID output = append(output, &template.EFSPermission{ Write: write, AccessPointID: accessPointID, FilesystemID: volume.EFS.Advanced.FileSystemID, }) } return output } func convertManagedFSInfo(wlName *string, input map[string]*manifest.Volume) *template.ManagedVolumeCreationInfo { var output *template.ManagedVolumeCreationInfo for name, volume := range input { if volume.EmptyVolume() || !volume.EFS.UseManagedFS() { continue } uid := volume.EFS.Advanced.UID gid := volume.EFS.Advanced.GID if uid == nil && gid == nil { crc := aws.Uint32(getRandomUIDGID(wlName)) uid = crc gid = crc } output = &template.ManagedVolumeCreationInfo{ Name: aws.String(name), DirName: wlName, UID: uid, GID: gid, } } return output } // getRandomUIDGID returns the 32-bit checksum of the service name for use as CreationInfo in the EFS Access Point. // See https://stackoverflow.com/a/14210379/5890422 for discussion of the possibility of collisions in CRC32 with // small numbers of hashes. func getRandomUIDGID(name *string) uint32 { return crc32.ChecksumIEEE([]byte(aws.StringValue(name))) } func convertVolumes(input map[string]*manifest.Volume) []*template.Volume { var output []*template.Volume for name, volume := range input { // Volumes can contain either: // a) an EFS configuration, which must be valid // b) no EFS configuration, in which case the volume is created using task scratch storage in order to share // data between containers. // If EFS is not configured, just add the name to create an empty volume and continue. if volume.EmptyVolume() { output = append( output, &template.Volume{ Name: aws.String(name), }, ) continue } // If we're using managed EFS, continue. if volume.EFS.UseManagedFS() { continue } // Convert EFS configuration to template struct. output = append( output, &template.Volume{ Name: aws.String(name), EFS: convertEFSConfiguration(volume.EFS.Advanced), }, ) } return output } func convertEFSConfiguration(in manifest.EFSVolumeConfiguration) *template.EFSVolumeConfiguration { // Set default values correctly. rootDir := in.RootDirectory if aws.StringValue(rootDir) == "" { rootDir = aws.String(defaultRootDirectory) } // Set default values for IAM and AccessPointID iam := aws.String(defaultIAM) if in.AuthConfig.IsEmpty() { return &template.EFSVolumeConfiguration{ Filesystem: in.FileSystemID, RootDirectory: rootDir, IAM: iam, } } // AuthConfig exists; check the properties. if aws.BoolValue(in.AuthConfig.IAM) { iam = aws.String(enabled) } return &template.EFSVolumeConfiguration{ Filesystem: in.FileSystemID, RootDirectory: rootDir, IAM: iam, AccessPointID: in.AuthConfig.AccessPointID, } } func convertNetworkConfig(network manifest.NetworkConfig) template.NetworkOpts { if network.IsEmpty() { return template.NetworkOpts{ AssignPublicIP: template.EnablePublicIP, SubnetsType: template.PublicSubnetsPlacement, } } opts := template.NetworkOpts{ AssignPublicIP: template.EnablePublicIP, SubnetsType: template.PublicSubnetsPlacement, } inSGs := network.VPC.SecurityGroups.GetIDs() outSGs := make([]template.SecurityGroup, len(inSGs)) for i, sg := range inSGs { if sg.Plain != nil { outSGs[i] = template.PlainSecurityGroup(aws.StringValue(sg.Plain)) } else { outSGs[i] = template.ImportedSecurityGroup(aws.StringValue(sg.FromCFN.Name)) } } opts.SecurityGroups = outSGs opts.DenyDefaultSecurityGroup = network.VPC.SecurityGroups.IsDefaultSecurityGroupDenied() placement := network.VPC.Placement if placement.IsEmpty() { return opts } if placement.PlacementString != nil { if *placement.PlacementString == manifest.PrivateSubnetPlacement { opts.AssignPublicIP = template.DisablePublicIP } opts.SubnetsType = subnetPlacementForTemplate[*placement.PlacementString] return opts } opts.AssignPublicIP = template.DisablePublicIP opts.SubnetsType = "" opts.SubnetIDs = placement.PlacementArgs.Subnets.IDs return opts } func convertRDWSNetworkConfig(network manifest.RequestDrivenWebServiceNetworkConfig) template.NetworkOpts { opts := template.NetworkOpts{} if network.IsEmpty() { return opts } placement := network.VPC.Placement if placement.IsEmpty() { return opts } if placement.PlacementString != nil { opts.SubnetsType = subnetPlacementForTemplate[*placement.PlacementString] return opts } opts.SubnetIDs = placement.PlacementArgs.Subnets.IDs return opts } func convertAlias(alias manifest.Alias) ([]string, error) { out, err := alias.ToStringSlice() if err != nil { return nil, fmt.Errorf(`convert "http.alias" to string slice: %w`, err) } return out, nil } func convertEntryPoint(entrypoint manifest.EntryPointOverride) ([]string, error) { out, err := entrypoint.ToStringSlice() if err != nil { return nil, fmt.Errorf(`convert "entrypoint" to string slice: %w`, err) } return out, nil } func convertDeploymentControllerConfig(in manifest.DeploymentControllerConfig) template.DeploymentConfigurationOpts { out := template.DeploymentConfigurationOpts{ MinHealthyPercent: minHealthyPercentDefault, MaxPercent: maxPercentDefault, } if strings.EqualFold(aws.StringValue(in.Rolling), manifest.ECSRecreateRollingUpdateStrategy) { out.MinHealthyPercent = minHealthyPercentRecreate out.MaxPercent = maxPercentRecreate } return out } func convertDeploymentConfig(in manifest.DeploymentConfig) template.DeploymentConfigurationOpts { out := convertDeploymentControllerConfig(in.DeploymentControllerConfig) out.Rollback = template.RollingUpdateRollbackConfig{ AlarmNames: in.RollbackAlarms.Basic, CPUUtilization: in.RollbackAlarms.Advanced.CPUUtilization, MemoryUtilization: in.RollbackAlarms.Advanced.MemoryUtilization, } return out } func convertWorkerDeploymentConfig(in manifest.WorkerDeploymentConfig) template.DeploymentConfigurationOpts { out := convertDeploymentControllerConfig(in.DeploymentControllerConfig) out.Rollback = template.RollingUpdateRollbackConfig{ AlarmNames: in.WorkerRollbackAlarms.Basic, CPUUtilization: in.WorkerRollbackAlarms.Advanced.CPUUtilization, MemoryUtilization: in.WorkerRollbackAlarms.Advanced.MemoryUtilization, MessagesDelayed: in.WorkerRollbackAlarms.Advanced.MessagesDelayed, } return out } func convertCommand(command manifest.CommandOverride) ([]string, error) { out, err := command.ToStringSlice() if err != nil { return nil, fmt.Errorf(`convert "command" to string slice: %w`, err) } return out, nil } func convertPublish(topics []manifest.Topic, accountID, region, app, env, svc string) (*template.PublishOpts, error) { if len(topics) == 0 { return nil, nil } partition, err := partitions.Region(region).Partition() if err != nil { return nil, err } var publishers template.PublishOpts // convert the topics to template Topics for _, topic := range topics { var fifoConfig *template.FIFOTopicConfig if topic.FIFO.IsEnabled() { fifoConfig = &template.FIFOTopicConfig{} if !topic.FIFO.Advanced.IsEmpty() { fifoConfig = &template.FIFOTopicConfig{ ContentBasedDeduplication: topic.FIFO.Advanced.ContentBasedDeduplication, } } } publishers.Topics = append(publishers.Topics, &template.Topic{ Name: topic.Name, FIFOTopicConfig: fifoConfig, AccountID: accountID, Partition: partition.ID(), Region: region, App: app, Env: env, Svc: svc, }) } return &publishers, nil } func convertSubscribe(s *manifest.WorkerService) (*template.SubscribeOpts, error) { if s.Subscribe.Topics == nil { return nil, nil } var subscriptions template.SubscribeOpts for _, sb := range s.Subscriptions() { ts, err := convertTopicSubscription(sb) if err != nil { return nil, err } subscriptions.Topics = append(subscriptions.Topics, ts) } subscriptions.Queue = convertQueue(s.Subscribe.Queue) return &subscriptions, nil } func convertTopicSubscription(t manifest.TopicSubscription) ( *template.TopicSubscription, error) { filterPolicy, err := convertFilterPolicy(t.FilterPolicy) if err != nil { return nil, err } if aws.BoolValue(t.Queue.Enabled) { return &template.TopicSubscription{ Name: t.Name, Service: t.Service, Queue: &template.SQSQueue{}, FilterPolicy: filterPolicy, }, nil } return &template.TopicSubscription{ Name: t.Name, Service: t.Service, Queue: convertQueue(t.Queue.Advanced), FilterPolicy: filterPolicy, }, nil } func convertFilterPolicy(filterPolicy map[string]interface{}) (*string, error) { if len(filterPolicy) == 0 { return nil, nil } bytes, err := json.Marshal(filterPolicy) if err != nil { return nil, fmt.Errorf(`convert "filter_policy" to a JSON string: %w`, err) } return aws.String(string(bytes)), nil } func convertQueue(in manifest.SQSQueue) *template.SQSQueue { if in.IsEmpty() { return nil } queue := &template.SQSQueue{ Retention: convertRetention(in.Retention), Delay: convertDelay(in.Delay), Timeout: convertTimeout(in.Timeout), DeadLetter: convertDeadLetter(in.DeadLetter), } if !in.FIFO.IsEnabled() { return queue } if aws.BoolValue(in.FIFO.Enable) { queue.FIFOQueueConfig = &template.FIFOQueueConfig{} return queue } if !in.FIFO.Advanced.IsEmpty() { queue.FIFOQueueConfig = &template.FIFOQueueConfig{ ContentBasedDeduplication: in.FIFO.Advanced.ContentBasedDeduplication, DeduplicationScope: in.FIFO.Advanced.DeduplicationScope, FIFOThroughputLimit: in.FIFO.Advanced.FIFOThroughputLimit, } if aws.BoolValue(in.FIFO.Advanced.HighThroughputFifo) { queue.FIFOQueueConfig.FIFOThroughputLimit = aws.String(sqsFIFOThroughputLimitPerMessageGroupId) queue.FIFOQueueConfig.DeduplicationScope = aws.String(sqsDedupeScopeMessageGroup) } } return queue } func convertTime(t *time.Duration) *int64 { if t == nil { return nil } return aws.Int64(int64(t.Seconds())) } func convertRetention(t *time.Duration) *int64 { return convertTime(t) } func convertDelay(t *time.Duration) *int64 { return convertTime(t) } func convertTimeout(t *time.Duration) *int64 { return convertTime(t) } func convertDeadLetter(d manifest.DeadLetterQueue) *template.DeadLetterQueue { if d.IsEmpty() { return nil } return &template.DeadLetterQueue{ Tries: d.Tries, } } func convertAppInformation(app deploy.AppInformation) (delegationRole *string, domain *string) { role := app.DNSDelegationRole() if role != "" { delegationRole = &role } if app.Domain != "" { domain = &app.Domain } return } func convertPlatform(platform manifest.PlatformArgsOrString) template.RuntimePlatformOpts { if platform.IsEmpty() { return template.RuntimePlatformOpts{} } os := template.OSLinux switch platform.OS() { case manifest.OSWindows, manifest.OSWindowsServer2019Core: os = template.OSWindowsServer2019Core case manifest.OSWindowsServer2019Full: os = template.OSWindowsServer2019Full case manifest.OSWindowsServer2022Core: os = template.OSWindowsServer2022Core case manifest.OSWindowsServer2022Full: os = template.OSWindowsServer2022Full } arch := template.ArchX86 if manifest.IsArmArch(platform.Arch()) { arch = template.ArchARM64 } return template.RuntimePlatformOpts{ OS: os, Arch: arch, } } func convertHTTPVersion(protocolVersion *string) *string { if protocolVersion == nil { return nil } pv := strings.ToUpper(*protocolVersion) return &pv } func convertEnvVars(variables map[string]manifest.Variable) map[string]template.Variable { if len(variables) == 0 { return nil } m := make(map[string]template.Variable, len(variables)) for name, variable := range variables { if variable.RequiresImport() { m[name] = template.ImportedVariable(variable.Value()) continue } m[name] = template.PlainVariable(variable.Value()) } return m } // convertSecrets converts the manifest Secrets into a format parsable by the templates pkg. func convertSecrets(secrets map[string]manifest.Secret) map[string]template.Secret { if len(secrets) == 0 { return nil } m := make(map[string]template.Secret, len(secrets)) var tplSecret template.Secret for name, mftSecret := range secrets { switch { case mftSecret.IsSecretsManagerName(): tplSecret = template.SecretFromSecretsManager(mftSecret.Value()) case mftSecret.RequiresImport(): tplSecret = template.SecretFromImportedSSMOrARN(mftSecret.Value()) default: tplSecret = template.SecretFromPlainSSMOrARN(mftSecret.Value()) } m[name] = tplSecret } return m } func convertCustomResources(urlForFunc map[string]string) (map[string]template.S3ObjectLocation, error) { out := make(map[string]template.S3ObjectLocation) for fn, url := range urlForFunc { bucket, key, err := s3.ParseURL(url) if err != nil { return nil, fmt.Errorf("convert custom resource %q url: %w", fn, err) } out[fn] = template.S3ObjectLocation{ Bucket: bucket, Key: key, } } return out, nil } type uploadableCRs []*customresource.CustomResource func (in uploadableCRs) convert() []uploadable { out := make([]uploadable, len(in)) for i, cr := range in { out[i] = cr } return out }
1,320
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package stack import ( "errors" "fmt" "testing" "time" "github.com/aws/aws-sdk-go/aws" "github.com/aws/copilot-cli/internal/pkg/manifest" "github.com/aws/copilot-cli/internal/pkg/template" "github.com/aws/copilot-cli/internal/pkg/template/override" "github.com/stretchr/testify/require" "gopkg.in/yaml.v3" ) func Test_convertSidecar(t *testing.T) { mockRunTimeConfig := RuntimeConfig{ PushedImages: map[string]ECRImage{ "foo": { RepoURL: "535307839156.dkr.ecr.us-west-2.amazonaws.com/web", ImageTag: "v1.0", Digest: "abcdef", MainContainerName: "mockMainContainer", ContainerName: "foo", }, }, } mockImage := aws.String(fmt.Sprintf("%s:%s-%s", mockRunTimeConfig.PushedImages["foo"].RepoURL, "foo", mockRunTimeConfig.PushedImages["foo"].ImageTag)) mockMap := map[string]template.Variable{"foo": template.PlainVariable("")} mockSecrets := map[string]template.Secret{"foo": template.SecretFromPlainSSMOrARN("")} mockCredsParam := aws.String("mockCredsParam") mockExposedPorts := map[string][]manifest.ExposedPort{ "foo": { { Protocol: "tcp", ContainerName: "foo", Port: uint16(2000), }, }, } testCases := map[string]struct { inEssential bool inLabels map[string]string inDependsOn map[string]string inImageOverride manifest.ImageOverride inHealthCheck manifest.ContainerHealthCheck circDepContainers []string wanted *template.SidecarOpts wantedErr error }{ "good port without protocol": { inEssential: true, wanted: &template.SidecarOpts{ Name: "foo", CredsParam: mockCredsParam, Image: mockImage, Secrets: mockSecrets, Variables: mockMap, Essential: aws.Bool(true), PortMappings: []*template.PortMapping{ { Protocol: "tcp", ContainerName: "foo", ContainerPort: uint16(2000), }, }, }, }, "good port with protocol": { inEssential: true, wanted: &template.SidecarOpts{ Name: "foo", CredsParam: mockCredsParam, Image: mockImage, Secrets: mockSecrets, Variables: mockMap, Essential: aws.Bool(true), PortMappings: []*template.PortMapping{ { Protocol: "tcp", ContainerName: "foo", ContainerPort: uint16(2000), }, }, }, }, "good container dependencies": { inEssential: true, inDependsOn: map[string]string{ "frontend": "start", }, wanted: &template.SidecarOpts{ Name: "foo", CredsParam: mockCredsParam, Image: mockImage, Secrets: mockSecrets, Variables: mockMap, Essential: aws.Bool(true), DependsOn: map[string]string{ "frontend": "START", }, PortMappings: []*template.PortMapping{ { Protocol: "tcp", ContainerName: "foo", ContainerPort: uint16(2000), }, }, }, }, "specify essential as false": { inEssential: false, inLabels: map[string]string{ "com.amazonaws.ecs.copilot.sidecar.description": "wow", }, wanted: &template.SidecarOpts{ Name: "foo", CredsParam: mockCredsParam, Image: mockImage, Secrets: mockSecrets, Variables: mockMap, Essential: aws.Bool(false), DockerLabels: map[string]string{ "com.amazonaws.ecs.copilot.sidecar.description": "wow", }, PortMappings: []*template.PortMapping{ { Protocol: "tcp", ContainerName: "foo", ContainerPort: uint16(2000), }, }, }, }, "do not specify image override": { wanted: &template.SidecarOpts{ Name: "foo", CredsParam: mockCredsParam, Image: mockImage, Secrets: mockSecrets, Variables: mockMap, Essential: aws.Bool(false), EntryPoint: nil, Command: nil, PortMappings: []*template.PortMapping{ { Protocol: "tcp", ContainerName: "foo", ContainerPort: uint16(2000), }, }, }, }, "specify entrypoint as a string": { inImageOverride: manifest.ImageOverride{ EntryPoint: manifest.EntryPointOverride{String: aws.String("bin")}, }, wanted: &template.SidecarOpts{ Name: "foo", CredsParam: mockCredsParam, Image: mockImage, Secrets: mockSecrets, Variables: mockMap, Essential: aws.Bool(false), EntryPoint: []string{"bin"}, Command: nil, PortMappings: []*template.PortMapping{ { Protocol: "tcp", ContainerName: "foo", ContainerPort: uint16(2000), }, }, }, }, "specify entrypoint as a string slice": { inImageOverride: manifest.ImageOverride{ EntryPoint: manifest.EntryPointOverride{StringSlice: []string{"bin", "arg"}}, }, wanted: &template.SidecarOpts{ Name: "foo", CredsParam: mockCredsParam, Image: mockImage, Secrets: mockSecrets, Variables: mockMap, Essential: aws.Bool(false), EntryPoint: []string{"bin", "arg"}, Command: nil, PortMappings: []*template.PortMapping{ { Protocol: "tcp", ContainerName: "foo", ContainerPort: uint16(2000), }, }, }, }, "specify command as a string": { inImageOverride: manifest.ImageOverride{ Command: manifest.CommandOverride{String: aws.String("arg")}, }, wanted: &template.SidecarOpts{ Name: "foo", CredsParam: mockCredsParam, Image: mockImage, Secrets: mockSecrets, Variables: mockMap, Essential: aws.Bool(false), EntryPoint: nil, Command: []string{"arg"}, PortMappings: []*template.PortMapping{ { Protocol: "tcp", ContainerName: "foo", ContainerPort: uint16(2000), }, }, }, }, "specify command as a string slice": { inImageOverride: manifest.ImageOverride{ Command: manifest.CommandOverride{StringSlice: []string{"arg1", "arg2"}}, }, wanted: &template.SidecarOpts{ Name: "foo", CredsParam: mockCredsParam, Image: mockImage, Secrets: mockSecrets, Variables: mockMap, Essential: aws.Bool(false), EntryPoint: nil, Command: []string{"arg1", "arg2"}, PortMappings: []*template.PortMapping{ { Protocol: "tcp", ContainerName: "foo", ContainerPort: uint16(2000), }, }, }, }, "with health check": { inHealthCheck: manifest.ContainerHealthCheck{ Command: []string{"foo", "bar"}, }, wanted: &template.SidecarOpts{ Name: "foo", CredsParam: mockCredsParam, Image: mockImage, Secrets: mockSecrets, Variables: mockMap, Essential: aws.Bool(false), HealthCheck: &template.ContainerHealthCheck{ Command: []string{"foo", "bar"}, Interval: aws.Int64(10), Retries: aws.Int64(2), StartPeriod: aws.Int64(0), Timeout: aws.Int64(5), }, PortMappings: []*template.PortMapping{ { Protocol: "tcp", ContainerName: "foo", ContainerPort: uint16(2000), }, }, }, }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { sidecar := map[string]*manifest.SidecarConfig{ "foo": { CredsParam: mockCredsParam, Image: manifest.Union[*string, manifest.ImageLocationOrBuild]{ Advanced: manifest.ImageLocationOrBuild{ Build: manifest.BuildArgsOrString{ BuildString: aws.String("./Dockerfile"), }, }, }, Secrets: map[string]manifest.Secret{"foo": {}}, Variables: map[string]manifest.Variable{"foo": {}}, Essential: aws.Bool(tc.inEssential), DockerLabels: tc.inLabels, DependsOn: tc.inDependsOn, ImageOverride: tc.inImageOverride, HealthCheck: tc.inHealthCheck, }, } got, err := convertSidecars(sidecar, mockExposedPorts, mockRunTimeConfig) if tc.wantedErr != nil { require.EqualError(t, err, tc.wantedErr.Error()) } else { require.NoError(t, err) require.Equal(t, tc.wanted, got[0]) } }) } } func Test_convertAdvancedCount(t *testing.T) { mockRange := manifest.IntRangeBand("1-10") timeMinute := time.Second * 60 perc := manifest.Percentage(70) mockConfig := manifest.ScalingConfigOrT[manifest.Percentage]{ ScalingConfig: manifest.AdvancedScalingConfig[manifest.Percentage]{ Value: &perc, Cooldown: manifest.Cooldown{ ScaleInCooldown: &timeMinute, }, }, } testCases := map[string]struct { input manifest.AdvancedCount expected *template.AdvancedCount expectedErr error }{ "success with generalized cooldown": { input: manifest.AdvancedCount{ Range: manifest.Range{ Value: &mockRange, }, Cooldown: manifest.Cooldown{ ScaleInCooldown: &timeMinute, ScaleOutCooldown: &timeMinute, }, }, expected: &template.AdvancedCount{ Autoscaling: &template.AutoscalingOpts{ MinCapacity: aws.Int(1), MaxCapacity: aws.Int(10), CPUCooldown: template.Cooldown{ ScaleInCooldown: aws.Float64(60), ScaleOutCooldown: aws.Float64(60), }, MemCooldown: template.Cooldown{ ScaleInCooldown: aws.Float64(60), ScaleOutCooldown: aws.Float64(60), }, ReqCooldown: template.Cooldown{ ScaleInCooldown: aws.Float64(60), ScaleOutCooldown: aws.Float64(60), }, RespTimeCooldown: template.Cooldown{ ScaleInCooldown: aws.Float64(60), ScaleOutCooldown: aws.Float64(60), }, QueueDelayCooldown: template.Cooldown{ ScaleInCooldown: aws.Float64(60), ScaleOutCooldown: aws.Float64(60), }, }, }, }, "success with spot count": { input: manifest.AdvancedCount{ Spot: aws.Int(1), }, expected: &template.AdvancedCount{ Spot: aws.Int(1), Cps: []*template.CapacityProviderStrategy{ { Weight: aws.Int(1), CapacityProvider: capacityProviderFargateSpot, }, }, }, }, "success with fargate autoscaling": { input: manifest.AdvancedCount{ Range: manifest.Range{ Value: &mockRange, }, CPU: mockConfig, }, expected: &template.AdvancedCount{ Autoscaling: &template.AutoscalingOpts{ MinCapacity: aws.Int(1), MaxCapacity: aws.Int(10), CPU: aws.Float64(70), CPUCooldown: template.Cooldown{ ScaleInCooldown: aws.Float64(60), }, }, }, }, "success with spot autoscaling": { input: manifest.AdvancedCount{ Range: manifest.Range{ RangeConfig: manifest.RangeConfig{ Min: aws.Int(2), Max: aws.Int(20), SpotFrom: aws.Int(5), }, }, CPU: mockConfig, }, expected: &template.AdvancedCount{ Autoscaling: &template.AutoscalingOpts{ MinCapacity: aws.Int(2), MaxCapacity: aws.Int(20), CPU: aws.Float64(70), CPUCooldown: template.Cooldown{ ScaleInCooldown: aws.Float64(60), }, }, Cps: []*template.CapacityProviderStrategy{ { Weight: aws.Int(1), CapacityProvider: capacityProviderFargateSpot, }, { Base: aws.Int(4), Weight: aws.Int(0), CapacityProvider: capacityProviderFargate, }, }, }, }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { actual, err := convertAdvancedCount(tc.input) if tc.expectedErr != nil { require.EqualError(t, err, tc.expectedErr.Error()) } else { require.NoError(t, err) require.Equal(t, tc.expected, actual) } }) } } func Test_convertCapacityProviders(t *testing.T) { mockRange := manifest.IntRangeBand("1-10") minCapacity := 1 spotFrom := 3 testCases := map[string]struct { input manifest.AdvancedCount expected []*template.CapacityProviderStrategy }{ "with spot as desiredCount": { input: manifest.AdvancedCount{ Spot: aws.Int(3), }, expected: []*template.CapacityProviderStrategy{ { Weight: aws.Int(1), CapacityProvider: capacityProviderFargateSpot, }, }, }, "with scaling only on spot": { input: manifest.AdvancedCount{ Range: manifest.Range{ RangeConfig: manifest.RangeConfig{ Min: aws.Int(minCapacity), Max: aws.Int(10), SpotFrom: aws.Int(minCapacity), }, }, }, expected: []*template.CapacityProviderStrategy{ { Weight: aws.Int(1), CapacityProvider: capacityProviderFargateSpot, }, { Base: aws.Int(0), Weight: aws.Int(0), CapacityProvider: capacityProviderFargate, }, }, }, "with scaling into spot": { input: manifest.AdvancedCount{ Range: manifest.Range{ RangeConfig: manifest.RangeConfig{ Min: aws.Int(minCapacity), Max: aws.Int(10), SpotFrom: aws.Int(spotFrom), }, }, }, expected: []*template.CapacityProviderStrategy{ { Weight: aws.Int(1), CapacityProvider: capacityProviderFargateSpot, }, { Base: aws.Int(spotFrom - 1), Weight: aws.Int(0), CapacityProvider: capacityProviderFargate, }, }, }, "with min equaling spot_from": { input: manifest.AdvancedCount{ Range: manifest.Range{ RangeConfig: manifest.RangeConfig{ Min: aws.Int(2), Max: aws.Int(10), SpotFrom: aws.Int(2), }, }, }, expected: []*template.CapacityProviderStrategy{ { Weight: aws.Int(1), CapacityProvider: capacityProviderFargateSpot, }, { Base: aws.Int(1), Weight: aws.Int(0), CapacityProvider: capacityProviderFargate, }, }, }, "returns nil if no spot config specified": { input: manifest.AdvancedCount{ Range: manifest.Range{ Value: &mockRange, }, }, expected: nil, }, "returns nil if no spot config specified with min max": { input: manifest.AdvancedCount{ Range: manifest.Range{ RangeConfig: manifest.RangeConfig{ Min: aws.Int(1), Max: aws.Int(10), }, }, }, expected: nil, }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { actual := convertCapacityProviders(tc.input) require.Equal(t, tc.expected, actual) }) } } func Test_convertAutoscaling(t *testing.T) { var ( respTime = 512 * time.Millisecond mockRange = manifest.IntRangeBand("1-100") badRange = manifest.IntRangeBand("badRange") mockRequests = manifest.ScalingConfigOrT[int]{ Value: aws.Int(1000), } mockResponseTime = manifest.ScalingConfigOrT[time.Duration]{ Value: &respTime, } perc = manifest.Percentage(70) timeMinute = time.Second * 60 mockCPU = manifest.ScalingConfigOrT[manifest.Percentage]{ ScalingConfig: manifest.AdvancedScalingConfig[manifest.Percentage]{ Value: &perc, Cooldown: manifest.Cooldown{ ScaleInCooldown: &timeMinute, ScaleOutCooldown: &timeMinute, }, }, } mockMem = manifest.ScalingConfigOrT[manifest.Percentage]{ Value: &perc, } ) testAcceptableLatency := 10 * time.Minute testAvgProcessingTime := 250 * time.Millisecond testCases := map[string]struct { input manifest.AdvancedCount wanted *template.AutoscalingOpts wantedErr error }{ "invalid range": { input: manifest.AdvancedCount{ Range: manifest.Range{ Value: &badRange, }, }, wantedErr: fmt.Errorf("invalid range value badRange. Should be in format of ${min}-${max}"), }, "success": { input: manifest.AdvancedCount{ Range: manifest.Range{ Value: &mockRange, }, CPU: mockCPU, Memory: mockMem, Requests: mockRequests, ResponseTime: mockResponseTime, }, wanted: &template.AutoscalingOpts{ MaxCapacity: aws.Int(100), MinCapacity: aws.Int(1), CPU: aws.Float64(70), Memory: aws.Float64(70), CPUCooldown: template.Cooldown{ ScaleInCooldown: aws.Float64(60), ScaleOutCooldown: aws.Float64(60), }, Requests: aws.Float64(1000), ResponseTime: aws.Float64(0.512), }, }, "success with range subfields": { input: manifest.AdvancedCount{ Range: manifest.Range{ RangeConfig: manifest.RangeConfig{ Min: aws.Int(5), Max: aws.Int(10), SpotFrom: aws.Int(5), }, }, CPU: mockCPU, Memory: mockMem, Requests: mockRequests, ResponseTime: mockResponseTime, }, wanted: &template.AutoscalingOpts{ MaxCapacity: aws.Int(10), MinCapacity: aws.Int(5), CPU: aws.Float64(70), Memory: aws.Float64(70), CPUCooldown: template.Cooldown{ ScaleInCooldown: aws.Float64(60), ScaleOutCooldown: aws.Float64(60), }, Requests: aws.Float64(1000), ResponseTime: aws.Float64(0.512), }, }, "success with queue autoscaling": { input: manifest.AdvancedCount{ Range: manifest.Range{ RangeConfig: manifest.RangeConfig{ Min: aws.Int(5), Max: aws.Int(10), SpotFrom: aws.Int(5), }, }, QueueScaling: manifest.QueueScaling{ AcceptableLatency: &testAcceptableLatency, AvgProcessingTime: &testAvgProcessingTime, Cooldown: manifest.Cooldown{ ScaleInCooldown: &timeMinute, }, }, }, wanted: &template.AutoscalingOpts{ MaxCapacity: aws.Int(10), MinCapacity: aws.Int(5), QueueDelayCooldown: template.Cooldown{ ScaleInCooldown: aws.Float64(60), }, QueueDelay: &template.AutoscalingQueueDelayOpts{ AcceptableBacklogPerTask: 2400, }, }, }, "returns nil if spot specified": { input: manifest.AdvancedCount{ Spot: aws.Int(5), }, wanted: nil, }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { got, err := convertAutoscaling(tc.input) if tc.wantedErr != nil { require.EqualError(t, err, tc.wantedErr.Error()) } else { require.NoError(t, err) require.Equal(t, tc.wanted, got) } }) } } func Test_convertPath(t *testing.T) { testCases := map[string]struct { inPath string wanted string }{ "success with basic case": { inPath: "/", wanted: "/", }, "adds leading / to naked path": { inPath: "app", wanted: "/app", }, "leading / path unchanged": { inPath: "/app", wanted: "/app", }, "empty path converted to /": { inPath: "", wanted: "/", }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { got := convertPath(tc.inPath) require.Equal(t, tc.wanted, got) }) } } func Test_convertTaskDefOverrideRules(t *testing.T) { testCases := map[string]struct { inRule []manifest.OverrideRule wanted []override.Rule }{ "should have proper prefix": { inRule: []manifest.OverrideRule{ { Path: "ContainerDefinitions[0].Ulimits[-].HardLimit", Value: yaml.Node{}, }, }, wanted: []override.Rule{ { Path: "Resources.TaskDefinition.Properties.ContainerDefinitions[0].Ulimits[-].HardLimit", Value: yaml.Node{}, }, }, }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { got := convertTaskDefOverrideRules(tc.inRule) require.Equal(t, tc.wanted, got) }) } } func Test_convertHTTPHealthCheck(t *testing.T) { // These are used by reference to represent the output of the manifest.durationp function. duration15Seconds := 15 * time.Second duration60Seconds := 60 * time.Second testCases := map[string]struct { input manifest.HealthCheckArgsOrString wantedOpts template.HTTPHealthCheckOpts }{ "no fields indicated in manifest": { wantedOpts: template.HTTPHealthCheckOpts{ HealthCheckPath: "/", GracePeriod: 60, }, }, "just Path": { input: manifest.HealthCheckArgsOrString{ Union: manifest.BasicToUnion[string, manifest.HTTPHealthCheckArgs]("path"), }, wantedOpts: template.HTTPHealthCheckOpts{ HealthCheckPath: "/path", GracePeriod: 60, }, }, "path behaves correctly with leading /": { input: manifest.HealthCheckArgsOrString{ Union: manifest.BasicToUnion[string, manifest.HTTPHealthCheckArgs]("/path"), }, wantedOpts: template.HTTPHealthCheckOpts{ HealthCheckPath: "/path", GracePeriod: 60, }, }, "just HealthyThreshold": { input: manifest.HealthCheckArgsOrString{ Union: manifest.AdvancedToUnion[string](manifest.HTTPHealthCheckArgs{ HealthyThreshold: aws.Int64(5), }), }, wantedOpts: template.HTTPHealthCheckOpts{ HealthCheckPath: "/", HealthyThreshold: aws.Int64(5), GracePeriod: 60, }, }, "just UnhealthyThreshold": { input: manifest.HealthCheckArgsOrString{ Union: manifest.AdvancedToUnion[string](manifest.HTTPHealthCheckArgs{ UnhealthyThreshold: aws.Int64(5), }), }, wantedOpts: template.HTTPHealthCheckOpts{ HealthCheckPath: "/", UnhealthyThreshold: aws.Int64(5), GracePeriod: 60, }, }, "just Interval": { input: manifest.HealthCheckArgsOrString{ Union: manifest.AdvancedToUnion[string](manifest.HTTPHealthCheckArgs{ Interval: &duration15Seconds, }), }, wantedOpts: template.HTTPHealthCheckOpts{ HealthCheckPath: "/", Interval: aws.Int64(15), GracePeriod: 60, }, }, "just Timeout": { input: manifest.HealthCheckArgsOrString{ Union: manifest.AdvancedToUnion[string](manifest.HTTPHealthCheckArgs{ Timeout: &duration15Seconds, }), }, wantedOpts: template.HTTPHealthCheckOpts{ HealthCheckPath: "/", Timeout: aws.Int64(15), GracePeriod: 60, }, }, "just SuccessCodes": { input: manifest.HealthCheckArgsOrString{ Union: manifest.AdvancedToUnion[string](manifest.HTTPHealthCheckArgs{ SuccessCodes: aws.String("200,301"), }), }, wantedOpts: template.HTTPHealthCheckOpts{ HealthCheckPath: "/", SuccessCodes: "200,301", GracePeriod: 60, }, }, "just Port": { input: manifest.HealthCheckArgsOrString{ Union: manifest.AdvancedToUnion[string](manifest.HTTPHealthCheckArgs{ Port: aws.Int(8000), }), }, wantedOpts: template.HTTPHealthCheckOpts{ HealthCheckPath: "/", Port: "8000", GracePeriod: 60, }, }, "all values changed in manifest": { input: manifest.HealthCheckArgsOrString{ Union: manifest.AdvancedToUnion[string](manifest.HTTPHealthCheckArgs{ Path: aws.String("/road/to/nowhere"), Port: aws.Int(8080), SuccessCodes: aws.String("200-299"), HealthyThreshold: aws.Int64(3), UnhealthyThreshold: aws.Int64(3), Interval: &duration60Seconds, Timeout: &duration60Seconds, GracePeriod: &duration15Seconds, }), }, wantedOpts: template.HTTPHealthCheckOpts{ HealthCheckPath: "/road/to/nowhere", Port: "8080", SuccessCodes: "200-299", HealthyThreshold: aws.Int64(3), UnhealthyThreshold: aws.Int64(3), Interval: aws.Int64(60), Timeout: aws.Int64(60), GracePeriod: 15, }, }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { require.Equal(t, tc.wantedOpts, convertHTTPHealthCheck(&tc.input)) }) } } func Test_convertManagedFSInfo(t *testing.T) { testCases := map[string]struct { inVolumes map[string]*manifest.Volume wantManagedConfig *template.ManagedVolumeCreationInfo wantVolumes map[string]manifest.Volume }{ "no managed config": { inVolumes: map[string]*manifest.Volume{ "wordpress": { EFS: manifest.EFSConfigOrBool{ Advanced: manifest.EFSVolumeConfiguration{ FileSystemID: aws.String("fs-1234"), }, }, MountPointOpts: manifest.MountPointOpts{ ContainerPath: aws.String("/var/www"), }, }, }, wantManagedConfig: nil, wantVolumes: map[string]manifest.Volume{ "wordpress": { EFS: manifest.EFSConfigOrBool{ Advanced: manifest.EFSVolumeConfiguration{ FileSystemID: aws.String("fs-1234"), }, }, MountPointOpts: manifest.MountPointOpts{ ContainerPath: aws.String("/var/www"), }, }, }, }, "with managed config": { inVolumes: map[string]*manifest.Volume{ "wordpress": { EFS: manifest.EFSConfigOrBool{ Enabled: aws.Bool(true), }, MountPointOpts: manifest.MountPointOpts{ ContainerPath: aws.String("/var/www"), }, }, }, wantManagedConfig: &template.ManagedVolumeCreationInfo{ Name: aws.String("wordpress"), DirName: aws.String("fe"), UID: aws.Uint32(1336298249), GID: aws.Uint32(1336298249), }, wantVolumes: map[string]manifest.Volume{}, }, "with custom UID": { inVolumes: map[string]*manifest.Volume{ "wordpress": { EFS: manifest.EFSConfigOrBool{ Advanced: manifest.EFSVolumeConfiguration{ UID: aws.Uint32(10000), GID: aws.Uint32(100000), }, }, MountPointOpts: manifest.MountPointOpts{ ContainerPath: aws.String("/var/www"), }, }, }, wantManagedConfig: &template.ManagedVolumeCreationInfo{ Name: aws.String("wordpress"), DirName: aws.String("fe"), UID: aws.Uint32(10000), GID: aws.Uint32(100000), }, wantVolumes: map[string]manifest.Volume{}, }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { // WHEN gotManaged := convertManagedFSInfo(aws.String("fe"), tc.inVolumes) // THEN require.Equal(t, tc.wantManagedConfig, gotManaged) }) } } func Test_convertStorageOpts(t *testing.T) { testCases := map[string]struct { inVolumes map[string]*manifest.Volume inEphemeral *int wantOpts template.StorageOpts }{ "minimal configuration": { inVolumes: map[string]*manifest.Volume{ "wordpress": { EFS: manifest.EFSConfigOrBool{ Advanced: manifest.EFSVolumeConfiguration{ FileSystemID: aws.String("fs-1234"), }, }, MountPointOpts: manifest.MountPointOpts{ ContainerPath: aws.String("/var/www"), }, }, }, wantOpts: template.StorageOpts{ Volumes: []*template.Volume{ { Name: aws.String("wordpress"), EFS: &template.EFSVolumeConfiguration{ Filesystem: aws.String("fs-1234"), RootDirectory: aws.String("/"), IAM: aws.String("DISABLED"), }, }, }, MountPoints: []*template.MountPoint{ { ContainerPath: aws.String("/var/www"), ReadOnly: aws.Bool(true), SourceVolume: aws.String("wordpress"), }, }, EFSPerms: []*template.EFSPermission{ { FilesystemID: aws.String("fs-1234"), Write: false, }, }, }, }, "empty volume for shareable storage between sidecar and main container": { inVolumes: map[string]*manifest.Volume{ "scratch": { MountPointOpts: manifest.MountPointOpts{ ContainerPath: aws.String("/var/scratch"), }, EFS: manifest.EFSConfigOrBool{ Enabled: aws.Bool(false), }, }, }, wantOpts: template.StorageOpts{ Volumes: []*template.Volume{ { Name: aws.String("scratch"), }, }, MountPoints: []*template.MountPoint{ { ContainerPath: aws.String("/var/scratch"), ReadOnly: aws.Bool(true), SourceVolume: aws.String("scratch"), }, }, }, }, "full specification with access point renders correctly": { inVolumes: map[string]*manifest.Volume{ "wordpress": { EFS: manifest.EFSConfigOrBool{ Advanced: manifest.EFSVolumeConfiguration{ FileSystemID: aws.String("fs-1234"), RootDirectory: aws.String("/"), AuthConfig: manifest.AuthorizationConfig{ IAM: aws.Bool(true), AccessPointID: aws.String("ap-1234"), }, }, }, MountPointOpts: manifest.MountPointOpts{ ContainerPath: aws.String("/var/www"), ReadOnly: aws.Bool(false), }, }, }, wantOpts: template.StorageOpts{ Volumes: []*template.Volume{ { Name: aws.String("wordpress"), EFS: &template.EFSVolumeConfiguration{ Filesystem: aws.String("fs-1234"), RootDirectory: aws.String("/"), IAM: aws.String("ENABLED"), AccessPointID: aws.String("ap-1234"), }, }, }, MountPoints: []*template.MountPoint{ { ContainerPath: aws.String("/var/www"), ReadOnly: aws.Bool(false), SourceVolume: aws.String("wordpress"), }, }, EFSPerms: []*template.EFSPermission{ { FilesystemID: aws.String("fs-1234"), AccessPointID: aws.String("ap-1234"), Write: true, }, }, }, }, "full specification without access point renders correctly": { inVolumes: map[string]*manifest.Volume{ "wordpress": { EFS: manifest.EFSConfigOrBool{ Advanced: manifest.EFSVolumeConfiguration{ FileSystemID: aws.String("fs-1234"), RootDirectory: aws.String("/wordpress"), AuthConfig: manifest.AuthorizationConfig{ IAM: aws.Bool(true), }, }, }, MountPointOpts: manifest.MountPointOpts{ ContainerPath: aws.String("/var/www"), ReadOnly: aws.Bool(false), }, }, }, wantOpts: template.StorageOpts{ Volumes: []*template.Volume{ { Name: aws.String("wordpress"), EFS: &template.EFSVolumeConfiguration{ Filesystem: aws.String("fs-1234"), RootDirectory: aws.String("/wordpress"), IAM: aws.String("ENABLED"), }, }, }, MountPoints: []*template.MountPoint{ { ContainerPath: aws.String("/var/www"), ReadOnly: aws.Bool(false), SourceVolume: aws.String("wordpress"), }, }, EFSPerms: []*template.EFSPermission{ { FilesystemID: aws.String("fs-1234"), Write: true, }, }, }, }, "managed EFS": { inVolumes: map[string]*manifest.Volume{ "efs": { EFS: manifest.EFSConfigOrBool{ Enabled: aws.Bool(true), }, MountPointOpts: manifest.MountPointOpts{ ContainerPath: aws.String("/var/www"), ReadOnly: aws.Bool(true), }, }, }, wantOpts: template.StorageOpts{ ManagedVolumeInfo: &template.ManagedVolumeCreationInfo{ Name: aws.String("efs"), DirName: aws.String("fe"), UID: aws.Uint32(1336298249), GID: aws.Uint32(1336298249), }, MountPoints: []*template.MountPoint{ { ContainerPath: aws.String("/var/www"), ReadOnly: aws.Bool(true), SourceVolume: aws.String("efs"), }, }, }, }, "managed EFS with config": { inVolumes: map[string]*manifest.Volume{ "efs": { EFS: manifest.EFSConfigOrBool{ Advanced: manifest.EFSVolumeConfiguration{ UID: aws.Uint32(1000), GID: aws.Uint32(10000), }, }, MountPointOpts: manifest.MountPointOpts{ ContainerPath: aws.String("/var/www"), ReadOnly: aws.Bool(true), }, }, }, wantOpts: template.StorageOpts{ ManagedVolumeInfo: &template.ManagedVolumeCreationInfo{ Name: aws.String("efs"), DirName: aws.String("fe"), UID: aws.Uint32(1000), GID: aws.Uint32(10000), }, MountPoints: []*template.MountPoint{ { ContainerPath: aws.String("/var/www"), ReadOnly: aws.Bool(true), SourceVolume: aws.String("efs"), }, }, }, }, "managed EFS and BYO": { inVolumes: map[string]*manifest.Volume{ "efs": { EFS: manifest.EFSConfigOrBool{ Enabled: aws.Bool(true), }, MountPointOpts: manifest.MountPointOpts{ ContainerPath: aws.String("/var/www"), ReadOnly: aws.Bool(true), }, }, "otherefs": { EFS: manifest.EFSConfigOrBool{ Advanced: manifest.EFSVolumeConfiguration{ FileSystemID: aws.String("fs-1234"), }, }, MountPointOpts: manifest.MountPointOpts{ ContainerPath: aws.String("/var/stuff"), ReadOnly: aws.Bool(false), }, }, "ephemeral": { EFS: manifest.EFSConfigOrBool{}, MountPointOpts: manifest.MountPointOpts{ ContainerPath: aws.String("/var/ephemeral"), ReadOnly: aws.Bool(false), }, }, }, wantOpts: template.StorageOpts{ ManagedVolumeInfo: &template.ManagedVolumeCreationInfo{ Name: aws.String("efs"), DirName: aws.String("fe"), UID: aws.Uint32(1336298249), GID: aws.Uint32(1336298249), }, Volumes: []*template.Volume{ { Name: aws.String("otherefs"), EFS: &template.EFSVolumeConfiguration{ Filesystem: aws.String("fs-1234"), RootDirectory: aws.String("/"), IAM: aws.String("DISABLED"), }, }, { Name: aws.String("ephemeral"), }, }, MountPoints: []*template.MountPoint{ { ContainerPath: aws.String("/var/www"), ReadOnly: aws.Bool(true), SourceVolume: aws.String("efs"), }, { ContainerPath: aws.String("/var/stuff"), ReadOnly: aws.Bool(false), SourceVolume: aws.String("otherefs"), }, { ContainerPath: aws.String("/var/ephemeral"), ReadOnly: aws.Bool(false), SourceVolume: aws.String("ephemeral"), }, }, EFSPerms: []*template.EFSPermission{ { FilesystemID: aws.String("fs-1234"), Write: true, }, }, }, }, "efs specified with just ID": { inVolumes: map[string]*manifest.Volume{ "wordpress": { EFS: manifest.EFSConfigOrBool{ Advanced: manifest.EFSVolumeConfiguration{ FileSystemID: aws.String("fs-1234"), }, }, MountPointOpts: manifest.MountPointOpts{ ContainerPath: aws.String("/var/www"), ReadOnly: aws.Bool(true), }, }, }, wantOpts: template.StorageOpts{ Volumes: []*template.Volume{ { Name: aws.String("wordpress"), EFS: &template.EFSVolumeConfiguration{ Filesystem: aws.String("fs-1234"), RootDirectory: aws.String("/"), IAM: aws.String("DISABLED"), }, }, }, MountPoints: []*template.MountPoint{ { ContainerPath: aws.String("/var/www"), ReadOnly: aws.Bool(true), SourceVolume: aws.String("wordpress"), }, }, EFSPerms: []*template.EFSPermission{ { FilesystemID: aws.String("fs-1234"), Write: false, }, }, }, }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { // GIVEN s := manifest.Storage{ Volumes: tc.inVolumes, Ephemeral: tc.inEphemeral, } // WHEN got := convertStorageOpts(aws.String("fe"), s) // THEN require.ElementsMatch(t, tc.wantOpts.EFSPerms, got.EFSPerms) require.ElementsMatch(t, tc.wantOpts.MountPoints, got.MountPoints) require.ElementsMatch(t, tc.wantOpts.Volumes, got.Volumes) require.Equal(t, tc.wantOpts.ManagedVolumeInfo, got.ManagedVolumeInfo) }) } } func Test_convertExecuteCommand(t *testing.T) { testCases := map[string]struct { inConfig manifest.ExecuteCommand wanted *template.ExecuteCommandOpts }{ "without exec enabled": { inConfig: manifest.ExecuteCommand{}, wanted: nil, }, "exec enabled": { inConfig: manifest.ExecuteCommand{ Enable: aws.Bool(true), }, wanted: &template.ExecuteCommandOpts{}, }, "exec enabled with config": { inConfig: manifest.ExecuteCommand{ Config: manifest.ExecuteCommandConfig{ Enable: aws.Bool(true), }, }, wanted: &template.ExecuteCommandOpts{}, }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { exec := tc.inConfig got := convertExecuteCommand(&exec) require.Equal(t, tc.wanted, got) }) } } func Test_convertSidecarMountPoints(t *testing.T) { testCases := map[string]struct { inMountPoints []manifest.SidecarMountPoint wantMountPoint []*template.MountPoint }{ "fully specified": { inMountPoints: []manifest.SidecarMountPoint{ { SourceVolume: aws.String("wordpress"), MountPointOpts: manifest.MountPointOpts{ ContainerPath: aws.String("/var/www/wp-content"), ReadOnly: aws.Bool(false), }, }, }, wantMountPoint: []*template.MountPoint{ { ContainerPath: aws.String("/var/www/wp-content"), ReadOnly: aws.Bool(false), SourceVolume: aws.String("wordpress"), }, }, }, "readonly defaults to true": { inMountPoints: []manifest.SidecarMountPoint{ { SourceVolume: aws.String("wordpress"), MountPointOpts: manifest.MountPointOpts{ ContainerPath: aws.String("/var/www/wp-content"), }, }, }, wantMountPoint: []*template.MountPoint{ { ContainerPath: aws.String("/var/www/wp-content"), ReadOnly: aws.Bool(true), SourceVolume: aws.String("wordpress"), }, }, }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { got := convertSidecarMountPoints(tc.inMountPoints) require.Equal(t, tc.wantMountPoint, got) }) } } func Test_convertEphemeral(t *testing.T) { testCases := map[string]struct { inEphemeral *int wanted *int wantedError error }{ "without storage enabled": { inEphemeral: nil, wanted: nil, }, "ephemeral specified correctly": { inEphemeral: aws.Int(100), wanted: aws.Int(100), }, "ephemeral specified at 20 GiB": { inEphemeral: aws.Int(20), wanted: nil, }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { got := convertEphemeral(tc.inEphemeral) require.Equal(t, got, tc.wanted) }) } } func Test_convertPublish(t *testing.T) { accountId := "123456789123" partition := "aws" region := "us-west-2" app := "testapp" env := "testenv" svc := "hello" testCases := map[string]struct { inTopics []manifest.Topic wanted *template.PublishOpts wantedError error }{ "no manifest publishers should return nil": { inTopics: nil, wanted: nil, }, "empty manifest publishers should return nil": { inTopics: []manifest.Topic{}, wanted: nil, }, "valid publish": { inTopics: []manifest.Topic{ { Name: aws.String("topic1"), }, { Name: aws.String("topic2"), }, }, wanted: &template.PublishOpts{ Topics: []*template.Topic{ { Name: aws.String("topic1"), AccountID: accountId, Partition: partition, Region: region, App: app, Env: env, Svc: svc, }, { Name: aws.String("topic2"), AccountID: accountId, Partition: partition, Region: region, App: app, Env: env, Svc: svc, }, }, }, }, "valid publish with fifo enabled and standard topics": { inTopics: []manifest.Topic{ { Name: aws.String("topic1.fifo"), FIFO: manifest.FIFOTopicAdvanceConfigOrBool{Enable: aws.Bool(true)}, }, { Name: aws.String("topic2"), }, }, wanted: &template.PublishOpts{ Topics: []*template.Topic{ { Name: aws.String("topic1.fifo"), FIFOTopicConfig: &template.FIFOTopicConfig{}, AccountID: accountId, Partition: partition, Region: region, App: app, Env: env, Svc: svc, }, { Name: aws.String("topic2"), FIFOTopicConfig: nil, AccountID: accountId, Partition: partition, Region: region, App: app, Env: env, Svc: svc, }, }, }, }, "valid publish with advanced fifo and standard topics": { inTopics: []manifest.Topic{ { Name: aws.String("topic1.fifo"), FIFO: manifest.FIFOTopicAdvanceConfigOrBool{ Advanced: manifest.FIFOTopicAdvanceConfig{ ContentBasedDeduplication: aws.Bool(true), }, }, }, { Name: aws.String("topic2"), }, }, wanted: &template.PublishOpts{ Topics: []*template.Topic{ { Name: aws.String("topic1.fifo"), FIFOTopicConfig: &template.FIFOTopicConfig{ ContentBasedDeduplication: aws.Bool(true), }, AccountID: accountId, Partition: partition, Region: region, App: app, Env: env, Svc: svc, }, { Name: aws.String("topic2"), AccountID: accountId, Partition: partition, Region: region, App: app, Env: env, Svc: svc, }, }, }, }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { got, err := convertPublish(tc.inTopics, accountId, region, app, env, svc) if tc.wantedError != nil { require.EqualError(t, err, tc.wantedError.Error()) } else { require.Equal(t, got, tc.wanted) } }) } } func Test_convertSubscribe(t *testing.T) { duration111Seconds := 111 * time.Second mockStruct := map[string]interface{}{ "store": []string{"example_corp"}, } testCases := map[string]struct { inSubscribe *manifest.WorkerService wanted *template.SubscribeOpts }{ "empty subscription": { // 1 inSubscribe: &manifest.WorkerService{}, wanted: nil, }, "valid subscribe": { // 2 inSubscribe: &manifest.WorkerService{ WorkerServiceConfig: manifest.WorkerServiceConfig{ Subscribe: manifest.SubscribeConfig{ Topics: []manifest.TopicSubscription{ { Name: aws.String("name"), Service: aws.String("svc"), }, }, Queue: manifest.SQSQueue{ Retention: &duration111Seconds, Delay: &duration111Seconds, Timeout: &duration111Seconds, DeadLetter: manifest.DeadLetterQueue{ Tries: aws.Uint16(35), }, }, }, }, }, wanted: &template.SubscribeOpts{ Topics: []*template.TopicSubscription{ { Name: aws.String("name"), Service: aws.String("svc"), }, }, Queue: &template.SQSQueue{ Retention: aws.Int64(111), Delay: aws.Int64(111), Timeout: aws.Int64(111), DeadLetter: &template.DeadLetterQueue{ Tries: aws.Uint16(35), }, }, }, }, "valid subscribe with default queue configs": { // 3 inSubscribe: &manifest.WorkerService{ WorkerServiceConfig: manifest.WorkerServiceConfig{ Subscribe: manifest.SubscribeConfig{ Topics: []manifest.TopicSubscription{ { Name: aws.String("name"), Service: aws.String("svc"), }, }, Queue: manifest.SQSQueue{}, }, }, }, wanted: &template.SubscribeOpts{ Topics: []*template.TopicSubscription{ { Name: aws.String("name"), Service: aws.String("svc"), }, }, Queue: nil, }, }, "valid subscribe with queue enabled": { // 4 inSubscribe: &manifest.WorkerService{ WorkerServiceConfig: manifest.WorkerServiceConfig{ Subscribe: manifest.SubscribeConfig{ Topics: []manifest.TopicSubscription{ { Name: aws.String("name"), Service: aws.String("svc"), Queue: manifest.SQSQueueOrBool{ Enabled: aws.Bool(true), }, FilterPolicy: mockStruct, }, }, Queue: manifest.SQSQueue{}, }, }, }, wanted: &template.SubscribeOpts{ Topics: []*template.TopicSubscription{ { Name: aws.String("name"), Service: aws.String("svc"), Queue: &template.SQSQueue{}, FilterPolicy: aws.String(`{"store":["example_corp"]}`), }, }, Queue: nil, }, }, "valid subscribe with minimal queue": { // 5 inSubscribe: &manifest.WorkerService{ WorkerServiceConfig: manifest.WorkerServiceConfig{ Subscribe: manifest.SubscribeConfig{ Topics: []manifest.TopicSubscription{ { Name: aws.String("name"), Service: aws.String("svc"), Queue: manifest.SQSQueueOrBool{ Advanced: manifest.SQSQueue{ Retention: &duration111Seconds, Delay: &duration111Seconds, Timeout: &duration111Seconds, DeadLetter: manifest.DeadLetterQueue{ Tries: aws.Uint16(35), }, }, }, FilterPolicy: mockStruct, }, }, Queue: manifest.SQSQueue{}, }, }, }, wanted: &template.SubscribeOpts{ Topics: []*template.TopicSubscription{ { Name: aws.String("name"), Service: aws.String("svc"), Queue: &template.SQSQueue{ Retention: aws.Int64(111), Delay: aws.Int64(111), Timeout: aws.Int64(111), DeadLetter: &template.DeadLetterQueue{ Tries: aws.Uint16(35), }, }, FilterPolicy: aws.String(`{"store":["example_corp"]}`), }, }, Queue: nil, }, }, "valid subscribe with high throughput fifo sqs": { // 6 inSubscribe: &manifest.WorkerService{ WorkerServiceConfig: manifest.WorkerServiceConfig{ Subscribe: manifest.SubscribeConfig{ Topics: []manifest.TopicSubscription{ { Name: aws.String("name"), Service: aws.String("svc"), Queue: manifest.SQSQueueOrBool{ Advanced: manifest.SQSQueue{ Retention: &duration111Seconds, Delay: &duration111Seconds, Timeout: &duration111Seconds, DeadLetter: manifest.DeadLetterQueue{ Tries: aws.Uint16(35), }, FIFO: manifest.FIFOAdvanceConfigOrBool{Advanced: manifest.FIFOAdvanceConfig{HighThroughputFifo: aws.Bool(true)}}, }, }, FilterPolicy: mockStruct, }, }, Queue: manifest.SQSQueue{}, }, }, }, wanted: &template.SubscribeOpts{ Topics: []*template.TopicSubscription{ { Name: aws.String("name.fifo"), Service: aws.String("svc"), Queue: &template.SQSQueue{ Retention: aws.Int64(111), Delay: aws.Int64(111), Timeout: aws.Int64(111), DeadLetter: &template.DeadLetterQueue{ Tries: aws.Uint16(35), }, FIFOQueueConfig: &template.FIFOQueueConfig{ FIFOThroughputLimit: aws.String("perMessageGroupId"), DeduplicationScope: aws.String("messageGroup"), }, }, FilterPolicy: aws.String(`{"store":["example_corp"]}`), }, }, Queue: nil, }, }, "valid subscribe with custom minimal fifo sqs config values": { inSubscribe: &manifest.WorkerService{ WorkerServiceConfig: manifest.WorkerServiceConfig{ Subscribe: manifest.SubscribeConfig{ Topics: []manifest.TopicSubscription{ { Name: aws.String("name"), Service: aws.String("svc"), Queue: manifest.SQSQueueOrBool{ Advanced: manifest.SQSQueue{ Retention: &duration111Seconds, Delay: &duration111Seconds, Timeout: &duration111Seconds, DeadLetter: manifest.DeadLetterQueue{ Tries: aws.Uint16(35), }, FIFO: manifest.FIFOAdvanceConfigOrBool{Enable: aws.Bool(true)}, }, }, FilterPolicy: mockStruct, }, }, Queue: manifest.SQSQueue{}, }, }, }, wanted: &template.SubscribeOpts{ Topics: []*template.TopicSubscription{ { Name: aws.String("name.fifo"), Service: aws.String("svc"), Queue: &template.SQSQueue{ Retention: aws.Int64(111), Delay: aws.Int64(111), Timeout: aws.Int64(111), DeadLetter: &template.DeadLetterQueue{ Tries: aws.Uint16(35), }, FIFOQueueConfig: &template.FIFOQueueConfig{}, }, FilterPolicy: aws.String(`{"store":["example_corp"]}`), }, }, Queue: nil, }, }, "valid subscribe with custom complete fifo sqs config values": { // 7 inSubscribe: &manifest.WorkerService{ WorkerServiceConfig: manifest.WorkerServiceConfig{ Subscribe: manifest.SubscribeConfig{ Topics: []manifest.TopicSubscription{ { Name: aws.String("name"), Service: aws.String("svc"), Queue: manifest.SQSQueueOrBool{ Advanced: manifest.SQSQueue{ Retention: &duration111Seconds, Delay: &duration111Seconds, Timeout: &duration111Seconds, DeadLetter: manifest.DeadLetterQueue{ Tries: aws.Uint16(35), }, FIFO: manifest.FIFOAdvanceConfigOrBool{ Advanced: manifest.FIFOAdvanceConfig{ FIFOThroughputLimit: aws.String("queue"), DeduplicationScope: aws.String("perQueue"), ContentBasedDeduplication: aws.Bool(true), }, }, }, }, FilterPolicy: mockStruct, }, }, Queue: manifest.SQSQueue{}, }, }, }, wanted: &template.SubscribeOpts{ Topics: []*template.TopicSubscription{ { Name: aws.String("name.fifo"), Service: aws.String("svc"), Queue: &template.SQSQueue{ Retention: aws.Int64(111), Delay: aws.Int64(111), Timeout: aws.Int64(111), DeadLetter: &template.DeadLetterQueue{ Tries: aws.Uint16(35), }, FIFOQueueConfig: &template.FIFOQueueConfig{ FIFOThroughputLimit: aws.String("queue"), DeduplicationScope: aws.String("perQueue"), ContentBasedDeduplication: aws.Bool(true), }, }, FilterPolicy: aws.String(`{"store":["example_corp"]}`), }, }, Queue: nil, }, }, "valid subscribe with custom complete fifo sqs config and standard topic subscription to a default standard queue": { // 8 inSubscribe: &manifest.WorkerService{ WorkerServiceConfig: manifest.WorkerServiceConfig{ Subscribe: manifest.SubscribeConfig{ Topics: []manifest.TopicSubscription{ { Name: aws.String("name"), Service: aws.String("svc"), Queue: manifest.SQSQueueOrBool{ Advanced: manifest.SQSQueue{ Retention: &duration111Seconds, Delay: &duration111Seconds, Timeout: &duration111Seconds, DeadLetter: manifest.DeadLetterQueue{ Tries: aws.Uint16(35), }, FIFO: manifest.FIFOAdvanceConfigOrBool{ Advanced: manifest.FIFOAdvanceConfig{ FIFOThroughputLimit: aws.String("queue"), DeduplicationScope: aws.String("perQueue"), ContentBasedDeduplication: aws.Bool(true), }, }, }, }, FilterPolicy: mockStruct, }, { Name: aws.String("name"), Service: aws.String("svc"), }, }, Queue: manifest.SQSQueue{}, }, }, }, wanted: &template.SubscribeOpts{ Topics: []*template.TopicSubscription{ { Name: aws.String("name.fifo"), Service: aws.String("svc"), Queue: &template.SQSQueue{ Retention: aws.Int64(111), Delay: aws.Int64(111), Timeout: aws.Int64(111), DeadLetter: &template.DeadLetterQueue{ Tries: aws.Uint16(35), }, FIFOQueueConfig: &template.FIFOQueueConfig{ FIFOThroughputLimit: aws.String("queue"), DeduplicationScope: aws.String("perQueue"), ContentBasedDeduplication: aws.Bool(true), }, }, FilterPolicy: aws.String(`{"store":["example_corp"]}`), }, { Name: aws.String("name"), Service: aws.String("svc"), }, }, Queue: nil, }, }, "valid subscribe with custom complete fifo sqs config and multiple standard topic subscriptions to a default standard queue": { // 9 inSubscribe: &manifest.WorkerService{ WorkerServiceConfig: manifest.WorkerServiceConfig{ Subscribe: manifest.SubscribeConfig{ Topics: []manifest.TopicSubscription{ { Name: aws.String("name"), Service: aws.String("svc"), Queue: manifest.SQSQueueOrBool{ Advanced: manifest.SQSQueue{ Retention: &duration111Seconds, Delay: &duration111Seconds, Timeout: &duration111Seconds, DeadLetter: manifest.DeadLetterQueue{ Tries: aws.Uint16(35), }, FIFO: manifest.FIFOAdvanceConfigOrBool{ Advanced: manifest.FIFOAdvanceConfig{ FIFOThroughputLimit: aws.String("queue"), DeduplicationScope: aws.String("perQueue"), ContentBasedDeduplication: aws.Bool(true), }, }, }, }, FilterPolicy: mockStruct, }, { Name: aws.String("name"), Service: aws.String("svc"), }, { Name: aws.String("name1"), Service: aws.String("svc"), }, }, Queue: manifest.SQSQueue{}, }, }, }, wanted: &template.SubscribeOpts{ Topics: []*template.TopicSubscription{ { Name: aws.String("name.fifo"), Service: aws.String("svc"), Queue: &template.SQSQueue{ Retention: aws.Int64(111), Delay: aws.Int64(111), Timeout: aws.Int64(111), DeadLetter: &template.DeadLetterQueue{ Tries: aws.Uint16(35), }, FIFOQueueConfig: &template.FIFOQueueConfig{ FIFOThroughputLimit: aws.String("queue"), DeduplicationScope: aws.String("perQueue"), ContentBasedDeduplication: aws.Bool(true), }, }, FilterPolicy: aws.String(`{"store":["example_corp"]}`), }, { Name: aws.String("name"), Service: aws.String("svc"), }, { Name: aws.String("name1"), Service: aws.String("svc"), }, }, Queue: nil, }, }, "valid subscribe with standard sqs config and fifo topic subscription to a default fifo queue": { // 10 inSubscribe: &manifest.WorkerService{ WorkerServiceConfig: manifest.WorkerServiceConfig{ Subscribe: manifest.SubscribeConfig{ Topics: []manifest.TopicSubscription{ { Name: aws.String("name"), Service: aws.String("svc"), Queue: manifest.SQSQueueOrBool{ Advanced: manifest.SQSQueue{ Retention: &duration111Seconds, Delay: &duration111Seconds, Timeout: &duration111Seconds, DeadLetter: manifest.DeadLetterQueue{ Tries: aws.Uint16(35), }, }, }, FilterPolicy: mockStruct, }, { Name: aws.String("name"), Service: aws.String("svc"), }, }, Queue: manifest.SQSQueue{ FIFO: manifest.FIFOAdvanceConfigOrBool{Enable: aws.Bool(true)}, }, }, }, }, wanted: &template.SubscribeOpts{ Topics: []*template.TopicSubscription{ { Name: aws.String("name"), Service: aws.String("svc"), Queue: &template.SQSQueue{ Retention: aws.Int64(111), Delay: aws.Int64(111), Timeout: aws.Int64(111), DeadLetter: &template.DeadLetterQueue{ Tries: aws.Uint16(35), }, }, FilterPolicy: aws.String(`{"store":["example_corp"]}`), }, { Name: aws.String("name.fifo"), Service: aws.String("svc"), }, }, Queue: &template.SQSQueue{ FIFOQueueConfig: &template.FIFOQueueConfig{}, }, }, }, "valid subscribe with standard sqs config and multiple fifo topic subscriptions to a default fifo queue": { // 11 inSubscribe: &manifest.WorkerService{ WorkerServiceConfig: manifest.WorkerServiceConfig{ Subscribe: manifest.SubscribeConfig{ Topics: []manifest.TopicSubscription{ { Name: aws.String("name"), Service: aws.String("svc"), Queue: manifest.SQSQueueOrBool{ Advanced: manifest.SQSQueue{ Retention: &duration111Seconds, Delay: &duration111Seconds, Timeout: &duration111Seconds, DeadLetter: manifest.DeadLetterQueue{ Tries: aws.Uint16(35), }, }, }, FilterPolicy: mockStruct, }, { Name: aws.String("name"), Service: aws.String("svc"), }, { Name: aws.String("name1"), Service: aws.String("svc"), }, }, Queue: manifest.SQSQueue{ FIFO: manifest.FIFOAdvanceConfigOrBool{Enable: aws.Bool(true)}, }, }, }, }, wanted: &template.SubscribeOpts{ Topics: []*template.TopicSubscription{ { Name: aws.String("name"), Service: aws.String("svc"), Queue: &template.SQSQueue{ Retention: aws.Int64(111), Delay: aws.Int64(111), Timeout: aws.Int64(111), DeadLetter: &template.DeadLetterQueue{ Tries: aws.Uint16(35), }, }, FilterPolicy: aws.String(`{"store":["example_corp"]}`), }, { Name: aws.String("name.fifo"), Service: aws.String("svc"), }, { Name: aws.String("name1.fifo"), Service: aws.String("svc"), }, }, Queue: &template.SQSQueue{ FIFOQueueConfig: &template.FIFOQueueConfig{}, }, }, }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { got, err := convertSubscribe(tc.inSubscribe) require.Equal(t, tc.wanted, got) require.NoError(t, err) }) } } func Test_convertDeploymentConfig(t *testing.T) { testCases := map[string]struct { in manifest.DeploymentConfig out template.DeploymentConfigurationOpts }{ "if 'recreate' strategy indicated, populate with replacement defaults": { in: manifest.DeploymentConfig{ DeploymentControllerConfig: manifest.DeploymentControllerConfig{ Rolling: aws.String("recreate"), }}, out: template.DeploymentConfigurationOpts{ MinHealthyPercent: minHealthyPercentRecreate, MaxPercent: maxPercentRecreate, }, }, "if 'default' strategy indicated, populate with rolling defaults": { in: manifest.DeploymentConfig{ DeploymentControllerConfig: manifest.DeploymentControllerConfig{ Rolling: aws.String("default"), }}, out: template.DeploymentConfigurationOpts{ MinHealthyPercent: minHealthyPercentDefault, MaxPercent: maxPercentDefault, }, }, "if nothing indicated, populate with rolling defaults": { in: manifest.DeploymentConfig{}, out: template.DeploymentConfigurationOpts{ MinHealthyPercent: minHealthyPercentDefault, MaxPercent: maxPercentDefault, }, }, "if alarm names entered, format and populate": { in: manifest.DeploymentConfig{ RollbackAlarms: manifest.BasicToUnion[[]string, manifest.AlarmArgs]( []string{"alarmName1", "alarmName2"}), }, out: template.DeploymentConfigurationOpts{ MinHealthyPercent: minHealthyPercentDefault, MaxPercent: maxPercentDefault, Rollback: template.RollingUpdateRollbackConfig{ AlarmNames: []string{"alarmName1", "alarmName2"}, }, }, }, "if alarm args entered, transform": { in: manifest.DeploymentConfig{ RollbackAlarms: manifest.AdvancedToUnion[[]string, manifest.AlarmArgs]( manifest.AlarmArgs{ CPUUtilization: aws.Float64(34), MemoryUtilization: aws.Float64(56), }), }, out: template.DeploymentConfigurationOpts{ MinHealthyPercent: minHealthyPercentDefault, MaxPercent: maxPercentDefault, Rollback: template.RollingUpdateRollbackConfig{ CPUUtilization: aws.Float64(34), MemoryUtilization: aws.Float64(56), }, }, }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { require.Equal(t, tc.out, convertDeploymentConfig(tc.in)) }) } } func Test_convertWorkerDeploymentConfig(t *testing.T) { testCases := map[string]struct { in manifest.WorkerDeploymentConfig out template.DeploymentConfigurationOpts }{ "if alarm names entered, format and populate": { in: manifest.WorkerDeploymentConfig{ WorkerRollbackAlarms: manifest.BasicToUnion[[]string, manifest.WorkerAlarmArgs]( []string{"alarmName1", "alarmName2"}), }, out: template.DeploymentConfigurationOpts{ MinHealthyPercent: minHealthyPercentDefault, MaxPercent: maxPercentDefault, Rollback: template.RollingUpdateRollbackConfig{ AlarmNames: []string{"alarmName1", "alarmName2"}, }, }, }, "if alarm args entered, transform": { in: manifest.WorkerDeploymentConfig{ WorkerRollbackAlarms: manifest.AdvancedToUnion[[]string, manifest.WorkerAlarmArgs]( manifest.WorkerAlarmArgs{ AlarmArgs: manifest.AlarmArgs{ CPUUtilization: aws.Float64(34), MemoryUtilization: aws.Float64(56), }, MessagesDelayed: aws.Int(10), }), }, out: template.DeploymentConfigurationOpts{ MinHealthyPercent: minHealthyPercentDefault, MaxPercent: maxPercentDefault, Rollback: template.RollingUpdateRollbackConfig{ CPUUtilization: aws.Float64(34), MemoryUtilization: aws.Float64(56), MessagesDelayed: aws.Int(10), }, }, }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { require.Equal(t, tc.out, convertWorkerDeploymentConfig(tc.in)) }) } } func Test_convertPlatform(t *testing.T) { testCases := map[string]struct { in manifest.PlatformArgsOrString out template.RuntimePlatformOpts }{ "should return empty struct if user did not set a platform field in the manifest": {}, "should return windows server 2019 full and x86_64 when advanced config specifies 2019 full": { in: manifest.PlatformArgsOrString{ PlatformArgs: manifest.PlatformArgs{ OSFamily: aws.String(manifest.OSWindowsServer2019Full), Arch: aws.String(manifest.ArchX86), }, }, out: template.RuntimePlatformOpts{ OS: template.OSWindowsServer2019Full, Arch: template.ArchX86, }, }, "should return windows server 2019 core and x86_64 when advanced config specifies 2019 core": { in: manifest.PlatformArgsOrString{ PlatformArgs: manifest.PlatformArgs{ OSFamily: aws.String(manifest.OSWindowsServer2019Core), Arch: aws.String(manifest.ArchX86), }, }, out: template.RuntimePlatformOpts{ OS: template.OSWindowsServer2019Core, Arch: template.ArchX86, }, }, "should return windows server 2022 full and x86_64 when advanced config specifies 2022 full": { in: manifest.PlatformArgsOrString{ PlatformArgs: manifest.PlatformArgs{ OSFamily: aws.String(manifest.OSWindowsServer2022Full), Arch: aws.String(manifest.ArchX86), }, }, out: template.RuntimePlatformOpts{ OS: template.OSWindowsServer2022Full, Arch: template.ArchX86, }, }, "should return windows server 2022 core and x86_64 when advanced config specifies 2022 core": { in: manifest.PlatformArgsOrString{ PlatformArgs: manifest.PlatformArgs{ OSFamily: aws.String(manifest.OSWindowsServer2022Core), Arch: aws.String(manifest.ArchX86), }, }, out: template.RuntimePlatformOpts{ OS: template.OSWindowsServer2022Core, Arch: template.ArchX86, }, }, "should return windows server core 2019 and x86_64 when platform is 'windows/x86_64'": { in: manifest.PlatformArgsOrString{ PlatformString: (*manifest.PlatformString)(aws.String("windows/amd64")), }, out: template.RuntimePlatformOpts{ OS: template.OSWindowsServer2019Core, Arch: template.ArchX86, }, }, "should return linux and x86_64 when platform is 'linux/amd64'": { in: manifest.PlatformArgsOrString{ PlatformString: (*manifest.PlatformString)(aws.String("linux/amd64")), }, out: template.RuntimePlatformOpts{ OS: template.OSLinux, Arch: template.ArchX86, }, }, "should return linux and arm when platform is 'linux/arm'": { in: manifest.PlatformArgsOrString{ PlatformString: (*manifest.PlatformString)(aws.String("linux/arm")), }, out: template.RuntimePlatformOpts{ OS: template.OSLinux, Arch: template.ArchARM64, }, }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { require.Equal(t, tc.out, convertPlatform(tc.in)) }) } } func Test_convertHTTPVersion(t *testing.T) { testCases := map[string]struct { in *string wanted *string }{ "should return nil if there is no user input": {}, "should return as uppercase on any user input": { in: aws.String("gRPC"), wanted: aws.String("GRPC"), }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { require.Equal(t, tc.wanted, convertHTTPVersion(tc.in)) }) } } func Test_convertCustomResources(t *testing.T) { testCases := map[string]struct { in map[string]string wanted map[string]template.S3ObjectLocation wantedErr error }{ "returns a wrapped error if a url cannot be parsed": { in: map[string]string{ "EnvControllerFunction": "https://my-bucket.s3.us-west-2.amazonaws.com/puppy.png", "DynamicDesiredCountFunction": "bad", }, wantedErr: errors.New(`convert custom resource "DynamicDesiredCountFunction" url: cannot parse S3 URL bad into bucket name and key`), }, "transforms custom resources with valid urls": { in: map[string]string{ "EnvControllerFunction": "https://my-bucket.s3.us-west-2.amazonaws.com/good/dogs/puppy.png", }, wanted: map[string]template.S3ObjectLocation{ "EnvControllerFunction": { Bucket: "my-bucket", Key: "good/dogs/puppy.png", }, }, }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { out, err := convertCustomResources(tc.in) if tc.wantedErr != nil { require.EqualError(t, err, tc.wantedErr.Error()) } else { require.NoError(t, err) require.Equal(t, tc.wanted, out) } }) } }
2,438
copilot-cli
aws
Go
//go:build integration // Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package stack_test import ( "fmt" "os" "path/filepath" "testing" "github.com/aws/aws-sdk-go/aws" "github.com/aws/aws-sdk-go/service/cloudformation" "github.com/aws/copilot-cli/internal/pkg/addon" "github.com/aws/copilot-cli/internal/pkg/aws/sessions" "github.com/aws/copilot-cli/internal/pkg/config" "github.com/aws/copilot-cli/internal/pkg/deploy/cloudformation/stack" "github.com/aws/copilot-cli/internal/pkg/manifest" "github.com/aws/copilot-cli/internal/pkg/workspace" "github.com/spf13/afero" "github.com/stretchr/testify/require" ) func TestAutoscalingIntegration_Validate(t *testing.T) { path := filepath.Join("testdata", "stacklocal", autoScalingManifestPath) wantedManifestBytes, err := os.ReadFile(path) require.NoError(t, err) mft, err := manifest.UnmarshalWorkload(wantedManifestBytes) require.NoError(t, err) content := mft.Manifest() v, ok := content.(*manifest.LoadBalancedWebService) require.Equal(t, ok, true) // Create in-memory mock file system. wd, err := os.Getwd() require.NoError(t, err) fs := afero.NewMemMapFs() _ = fs.MkdirAll(fmt.Sprintf("%s/copilot", wd), 0755) _ = afero.WriteFile(fs, fmt.Sprintf("%s/copilot/.workspace", wd), []byte(fmt.Sprintf("---\napplication: %s", "DavidsApp")), 0644) require.NoError(t, err) ws, err := workspace.Use(fs) require.NoError(t, err) _, err = addon.ParseFromWorkload(aws.StringValue(v.Name), ws) var notFound *addon.ErrAddonsNotFound require.ErrorAs(t, err, &notFound) serializer, err := stack.NewLoadBalancedWebService(stack.LoadBalancedWebServiceConfig{ App: &config.Application{Name: appName}, EnvManifest: &manifest.Environment{ Workload: manifest.Workload{ Name: &envName, }, }, Manifest: v, RuntimeConfig: stack.RuntimeConfig{ PushedImages: map[string]stack.ECRImage{ aws.StringValue(v.Name): { RepoURL: imageURL, ImageTag: imageTag, }, }, ServiceDiscoveryEndpoint: "test.app.local", CustomResourcesURL: map[string]string{ "EnvControllerFunction": "https://my-bucket.s3.us-west-2.amazonaws.com/code.zip", "DynamicDesiredCountFunction": "https://my-bucket.s3.us-west-2.amazonaws.com/code.zip", "RulePriorityFunction": "https://my-bucket.s3.us-west-2.amazonaws.com/code.zip", }, EnvVersion: "v1.42.0", }, }) require.NoError(t, err) tpl, err := serializer.Template() require.NoError(t, err) sess, err := sessions.ImmutableProvider().Default() require.NoError(t, err) cfn := cloudformation.New(sess) t.Run("CloudFormation template must be valid", func(t *testing.T) { _, err := cfn.ValidateTemplate(&cloudformation.ValidateTemplateInput{ TemplateBody: aws.String(tpl), }) require.NoError(t, err) }) } func TestScheduledJob_Validate(t *testing.T) { path := filepath.Join("testdata", "workloads", jobManifestPath) manifestBytes, err := os.ReadFile(path) require.NoError(t, err) mft, err := manifest.UnmarshalWorkload(manifestBytes) require.NoError(t, err) content := mft.Manifest() v, ok := content.(*manifest.ScheduledJob) require.True(t, ok) // Create in-memory mock file system. wd, err := os.Getwd() require.NoError(t, err) fs := afero.NewMemMapFs() _ = fs.MkdirAll(fmt.Sprintf("%s/copilot", wd), 0755) _ = afero.WriteFile(fs, fmt.Sprintf("%s/copilot/.workspace", wd), []byte(fmt.Sprintf("---\napplication: %s", "DavidsApp")), 0644) require.NoError(t, err) ws, err := workspace.Use(fs) require.NoError(t, err) _, err = addon.ParseFromWorkload(aws.StringValue(v.Name), ws) var notFound *addon.ErrAddonsNotFound require.ErrorAs(t, err, &notFound) serializer, err := stack.NewScheduledJob(stack.ScheduledJobConfig{ App: &config.Application{ Name: appName, }, Env: envName, Manifest: v, RuntimeConfig: stack.RuntimeConfig{ ServiceDiscoveryEndpoint: "test.app.local", CustomResourcesURL: map[string]string{ "EnvControllerFunction": "https://my-bucket.s3.us-west-2.amazonaws.com/code.zip", }, AccountID: "123456789123", Region: "us-west-2", EnvVersion: "v1.42.0", }, }) tpl, err := serializer.Template() require.NoError(t, err, "template should render") sess, err := sessions.ImmutableProvider().Default() require.NoError(t, err) cfn := cloudformation.New(sess) t.Run("CF template should be valid", func(t *testing.T) { _, err := cfn.ValidateTemplate(&cloudformation.ValidateTemplateInput{ TemplateBody: aws.String(tpl), }) require.NoError(t, err) }) }
144
copilot-cli
aws
Go
//go:build integration || localintegration // Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package stack_test import ( "fmt" "os" "path/filepath" "regexp" "testing" "github.com/aws/aws-sdk-go/aws" "github.com/aws/aws-sdk-go/aws/session" "github.com/aws/copilot-cli/internal/pkg/addon" "github.com/aws/copilot-cli/internal/pkg/config" "github.com/aws/copilot-cli/internal/pkg/deploy/cloudformation/stack" "github.com/aws/copilot-cli/internal/pkg/manifest" "github.com/aws/copilot-cli/internal/pkg/workspace" "github.com/spf13/afero" "github.com/stretchr/testify/require" "gopkg.in/yaml.v3" ) const ( windowsSvcManifestPath = "windows-svc-manifest.yml" windowsSvcStackPath = "windows-svc-test.stack.yml" windowsSvcParamsPath = "windows-svc-test.params.json" ) func TestWindowsLoadBalancedWebService_Template(t *testing.T) { path := filepath.Join("testdata", "workloads", windowsSvcManifestPath) manifestBytes, err := os.ReadFile(path) require.NoError(t, err) mft, err := manifest.UnmarshalWorkload([]byte(manifestBytes)) require.NoError(t, err) envMft, err := mft.ApplyEnv(envName) require.NoError(t, err) err = envMft.Validate() require.NoError(t, err) err = envMft.Load(session.New()) require.NoError(t, err) content := envMft.Manifest() v, ok := content.(*manifest.LoadBalancedWebService) require.True(t, ok) // Create in-memory mock file system. wd, err := os.Getwd() require.NoError(t, err) fs := afero.NewMemMapFs() _ = fs.MkdirAll(fmt.Sprintf("%s/copilot", wd), 0755) _ = afero.WriteFile(fs, fmt.Sprintf("%s/copilot/.workspace", wd), []byte(fmt.Sprintf("---\napplication: %s", "DavidsApp")), 0644) require.NoError(t, err) ws, err := workspace.Use(fs) require.NoError(t, err) _, err = addon.ParseFromWorkload(aws.StringValue(v.Name), ws) var notFound *addon.ErrAddonsNotFound require.ErrorAs(t, err, &notFound) svcDiscoveryEndpointName := fmt.Sprintf("%s.%s.local", envName, appName) serializer, err := stack.NewLoadBalancedWebService(stack.LoadBalancedWebServiceConfig{ App: &config.Application{Name: appName}, EnvManifest: &manifest.Environment{ Workload: manifest.Workload{ Name: &envName, }, }, ArtifactBucketName: "bucket", Manifest: v, RuntimeConfig: stack.RuntimeConfig{ AccountID: "123456789123", Region: "us-west-2", ServiceDiscoveryEndpoint: svcDiscoveryEndpointName, EnvVersion: "v1.42.0", }, }) tpl, err := serializer.Template() require.NoError(t, err, "template should render") regExpGUID := regexp.MustCompile(`([a-f\d]{8}-)([a-f\d]{4}-){3}([a-f\d]{12})`) // Matches random guids t.Run("CF template should be equal", func(t *testing.T) { actualBytes := []byte(tpl) // Cut random GUID from template. actualBytes = regExpGUID.ReplaceAll(actualBytes, []byte("RandomGUID")) mActual := make(map[interface{}]interface{}) require.NoError(t, yaml.Unmarshal(actualBytes, mActual)) expected, err := os.ReadFile(filepath.Join("testdata", "workloads", windowsSvcStackPath)) require.NoError(t, err, "should be able to read expected bytes") expectedBytes := []byte(expected) mExpected := make(map[interface{}]interface{}) require.NoError(t, yaml.Unmarshal(expectedBytes, mExpected)) resetCustomResourceLocations(mActual) compareStackTemplate(t, mExpected, mActual) }) t.Run("Parameter values should render properly", func(t *testing.T) { actualParams, err := serializer.SerializedParameters() require.NoError(t, err) path := filepath.Join("testdata", "workloads", windowsSvcParamsPath) wantedCFNParamsBytes, error := os.ReadFile(path) require.NoError(t, error) require.Equal(t, string(wantedCFNParamsBytes), actualParams) }) }
115
copilot-cli
aws
Go
//go:build integration || localintegration // Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package stack_test import ( "fmt" "os" "path/filepath" "regexp" "testing" "github.com/aws/aws-sdk-go/aws" "github.com/aws/aws-sdk-go/aws/session" "github.com/aws/copilot-cli/internal/pkg/addon" "github.com/aws/copilot-cli/internal/pkg/config" "github.com/aws/copilot-cli/internal/pkg/deploy/cloudformation/stack" "github.com/aws/copilot-cli/internal/pkg/manifest" "github.com/aws/copilot-cli/internal/pkg/workspace" "github.com/spf13/afero" "github.com/stretchr/testify/require" "gopkg.in/yaml.v3" ) const ( workerManifestPath = "worker-manifest.yml" workerStackPath = "worker-test.stack.yml" workerParamsPath = "worker-test.params.json" ) func TestWorkerService_Template(t *testing.T) { path := filepath.Join("testdata", "workloads", workerManifestPath) manifestBytes, err := os.ReadFile(path) require.NoError(t, err) mft, err := manifest.UnmarshalWorkload(manifestBytes) require.NoError(t, err) envMft, err := mft.ApplyEnv(envName) require.NoError(t, err) err = envMft.Validate() require.NoError(t, err) err = envMft.Load(session.New()) require.NoError(t, err) content := envMft.Manifest() v, ok := content.(*manifest.WorkerService) require.True(t, ok) // Create in-memory mock file system. wd, err := os.Getwd() require.NoError(t, err) fs := afero.NewMemMapFs() _ = fs.MkdirAll(fmt.Sprintf("%s/copilot", wd), 0755) _ = afero.WriteFile(fs, fmt.Sprintf("%s/copilot/.workspace", wd), []byte(fmt.Sprintf("---\napplication: %s", "DavidsApp")), 0644) require.NoError(t, err) ws, err := workspace.Use(fs) require.NoError(t, err) _, err = addon.ParseFromWorkload(aws.StringValue(v.Name), ws) var notFound *addon.ErrAddonsNotFound require.ErrorAs(t, err, &notFound) serializer, err := stack.NewWorkerService(stack.WorkerServiceConfig{ App: &config.Application{ Name: appName, }, Env: envName, Manifest: v, ArtifactBucketName: "bucket", RawManifest: manifestBytes, RuntimeConfig: stack.RuntimeConfig{ ServiceDiscoveryEndpoint: "test.my-app.local", AccountID: "123456789123", Region: "us-west-2", EnvVersion: "v1.42.0", }, }) tpl, err := serializer.Template() require.NoError(t, err, "template should render") regExpGUID := regexp.MustCompile(`([a-f\d]{8}-)([a-f\d]{4}-){3}([a-f\d]{12})`) // Matches random guids t.Run("CF Template should be equal", func(t *testing.T) { actualBytes := []byte(tpl) // Cut random GUID from template. actualBytes = regExpGUID.ReplaceAll(actualBytes, []byte("RandomGUID")) mActual := make(map[interface{}]interface{}) require.NoError(t, yaml.Unmarshal(actualBytes, mActual)) expected, err := os.ReadFile(filepath.Join("testdata", "workloads", workerStackPath)) require.NoError(t, err, "should be able to read expected bytes") mExpected := make(map[interface{}]interface{}) require.NoError(t, yaml.Unmarshal(expected, mExpected)) resetCustomResourceLocations(mActual) compareStackTemplate(t, mExpected, mActual) }) t.Run("Parameter values should render properly", func(t *testing.T) { actualParams, err := serializer.SerializedParameters() require.NoError(t, err) path := filepath.Join("testdata", "workloads", workerParamsPath) wantedCFNParamsBytes, err := os.ReadFile(path) require.NoError(t, err) require.Equal(t, string(wantedCFNParamsBytes), actualParams) }) }
113
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package stack import ( "fmt" "strings" "github.com/aws/copilot-cli/internal/pkg/deploy/upload/customresource" "github.com/aws/aws-sdk-go/aws" "github.com/aws/aws-sdk-go/service/cloudformation" "github.com/aws/copilot-cli/internal/pkg/config" "github.com/aws/copilot-cli/internal/pkg/manifest" "github.com/aws/copilot-cli/internal/pkg/manifest/manifestinfo" "github.com/aws/copilot-cli/internal/pkg/template" "github.com/aws/copilot-cli/internal/pkg/template/override" ) // WorkerService represents the configuration needed to create a CloudFormation stack from a worker service manifest. type WorkerService struct { *ecsWkld manifest *manifest.WorkerService parser workerSvcReadParser } // WorkerServiceConfig contains data required to initialize a scheduled job stack. type WorkerServiceConfig struct { App *config.Application Env string Manifest *manifest.WorkerService ArtifactBucketName string RawManifest []byte RuntimeConfig RuntimeConfig Addons NestedStackConfigurer } // NewWorkerService creates a new WorkerService stack from a manifest file. func NewWorkerService(cfg WorkerServiceConfig) (*WorkerService, error) { crs, err := customresource.Worker(fs) if err != nil { return nil, fmt.Errorf("worker service custom resources: %w", err) } cfg.RuntimeConfig.loadCustomResourceURLs(cfg.ArtifactBucketName, uploadableCRs(crs).convert()) return &WorkerService{ ecsWkld: &ecsWkld{ wkld: &wkld{ name: aws.StringValue(cfg.Manifest.Name), env: cfg.Env, app: cfg.App.Name, permBound: cfg.App.PermissionsBoundary, artifactBucketName: cfg.ArtifactBucketName, rc: cfg.RuntimeConfig, image: cfg.Manifest.ImageConfig.Image, rawManifest: cfg.RawManifest, parser: fs, addons: cfg.Addons, }, logging: cfg.Manifest.Logging, sidecars: cfg.Manifest.Sidecars, tc: cfg.Manifest.TaskConfig, taskDefOverrideFunc: override.CloudFormationTemplate, }, manifest: cfg.Manifest, parser: fs, }, nil } // Template returns the CloudFormation template for the worker service. func (s *WorkerService) Template() (string, error) { crs, err := convertCustomResources(s.rc.CustomResourcesURL) if err != nil { return "", err } addonsParams, err := s.addonsParameters() if err != nil { return "", err } addonsOutputs, err := s.addonsOutputs() if err != nil { return "", err } exposedPorts, err := s.manifest.ExposedPorts() if err != nil { return "", fmt.Errorf("parse exposed ports in service manifest %s: %w", s.name, err) } sidecars, err := convertSidecars(s.manifest.Sidecars, exposedPorts.PortsForContainer, s.rc) if err != nil { return "", fmt.Errorf("convert the sidecar configuration for service %s: %w", s.name, err) } advancedCount, err := convertAdvancedCount(s.manifest.Count.AdvancedCount) if err != nil { return "", fmt.Errorf("convert the advanced count configuration for service %s: %w", s.name, err) } var autoscaling *template.AutoscalingOpts var desiredCountOnSpot *int var capacityProviders []*template.CapacityProviderStrategy if advancedCount != nil { autoscaling = advancedCount.Autoscaling desiredCountOnSpot = advancedCount.Spot capacityProviders = advancedCount.Cps } entrypoint, err := convertEntryPoint(s.manifest.EntryPoint) if err != nil { return "", err } command, err := convertCommand(s.manifest.Command) if err != nil { return "", err } subscribe, err := convertSubscribe(s.manifest) if err != nil { return "", err } publishers, err := convertPublish(s.manifest.Publish(), s.rc.AccountID, s.rc.Region, s.app, s.env, s.name) if err != nil { return "", fmt.Errorf(`convert "publish" field for service %s: %w`, s.name, err) } var scConfig *template.ServiceConnect if s.manifest.Network.Connect.Enabled() { scConfig = convertServiceConnect(s.manifest.Network.Connect) } content, err := s.parser.ParseWorkerService(template.WorkloadOpts{ AppName: s.app, EnvName: s.env, WorkloadName: s.name, SerializedManifest: string(s.rawManifest), EnvVersion: s.rc.EnvVersion, Variables: convertEnvVars(s.manifest.WorkerServiceConfig.Variables), Secrets: convertSecrets(s.manifest.WorkerServiceConfig.Secrets), NestedStack: addonsOutputs, AddonsExtraParams: addonsParams, Sidecars: sidecars, Autoscaling: autoscaling, CapacityProviders: capacityProviders, DesiredCountOnSpot: desiredCountOnSpot, ExecuteCommand: convertExecuteCommand(&s.manifest.ExecuteCommand), WorkloadType: manifestinfo.WorkerServiceType, HealthCheck: convertContainerHealthCheck(s.manifest.WorkerServiceConfig.ImageConfig.HealthCheck), LogConfig: convertLogging(s.manifest.Logging), DockerLabels: s.manifest.ImageConfig.Image.DockerLabels, CustomResources: crs, Storage: convertStorageOpts(s.manifest.Name, s.manifest.Storage), Network: convertNetworkConfig(s.manifest.Network), DeploymentConfiguration: convertWorkerDeploymentConfig(s.manifest.WorkerServiceConfig.DeployConfig), EntryPoint: entrypoint, ServiceConnect: scConfig, Command: command, DependsOn: convertDependsOn(s.manifest.ImageConfig.Image.DependsOn), CredentialsParameter: aws.StringValue(s.manifest.ImageConfig.Image.Credentials), ServiceDiscoveryEndpoint: s.rc.ServiceDiscoveryEndpoint, Subscribe: subscribe, Publish: publishers, Platform: convertPlatform(s.manifest.Platform), Observability: template.ObservabilityOpts{ Tracing: strings.ToUpper(aws.StringValue(s.manifest.Observability.Tracing)), }, PermissionsBoundary: s.permBound, }) if err != nil { return "", fmt.Errorf("parse worker service template: %w", err) } overriddenTpl, err := s.taskDefOverrideFunc(convertTaskDefOverrideRules(s.manifest.TaskDefOverrides), content.Bytes()) if err != nil { return "", fmt.Errorf("apply task definition overrides: %w", err) } return string(overriddenTpl), nil } // Parameters returns the list of CloudFormation parameters used by the template. func (s *WorkerService) Parameters() ([]*cloudformation.Parameter, error) { wkldParams, err := s.ecsWkld.Parameters() if err != nil { return nil, err } return wkldParams, nil } // SerializedParameters returns the CloudFormation stack's parameters serialized to a JSON document. func (s *WorkerService) SerializedParameters() (string, error) { return serializeTemplateConfig(s.wkld.parser, s) }
190
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package stack import ( "bytes" "errors" "fmt" "testing" "github.com/aws/copilot-cli/internal/pkg/addon" "github.com/aws/copilot-cli/internal/pkg/manifest/manifestinfo" "github.com/aws/aws-sdk-go/aws" "github.com/aws/aws-sdk-go/service/cloudformation" "github.com/aws/copilot-cli/internal/pkg/deploy/cloudformation/stack/mocks" "github.com/aws/copilot-cli/internal/pkg/manifest" "github.com/aws/copilot-cli/internal/pkg/template" "github.com/golang/mock/gomock" "github.com/stretchr/testify/require" ) func TestWorkerService_Template(t *testing.T) { baseProps := manifest.WorkerServiceProps{ WorkloadProps: manifest.WorkloadProps{ Name: testServiceName, Dockerfile: testDockerfile, }, } testCases := map[string]struct { mockDependencies func(t *testing.T, ctrl *gomock.Controller, svc *WorkerService) setUpManifest func(svc *WorkerService) wantedTemplate string wantedErr error }{ "unexpected addons template parsing error": { mockDependencies: func(t *testing.T, ctrl *gomock.Controller, svc *WorkerService) { svc.addons = mockAddons{tplErr: errors.New("some error")} }, wantedErr: fmt.Errorf("generate addons template for %s: %w", testServiceName, errors.New("some error")), }, "unexpected addons params parsing error": { mockDependencies: func(t *testing.T, ctrl *gomock.Controller, svc *WorkerService) { svc.addons = mockAddons{paramsErr: errors.New("some error")} }, wantedErr: fmt.Errorf("parse addons parameters for %s: %w", testServiceName, errors.New("some error")), }, "failed parsing sidecars template": { setUpManifest: func(svc *WorkerService) { testWorkerSvcManifestWithBadSidecar := manifest.NewWorkerService(baseProps) testWorkerSvcManifestWithBadSidecar.Sidecars = map[string]*manifest.SidecarConfig{ "xray": { Port: aws.String("80/80/80"), }, } svc.manifest = testWorkerSvcManifestWithBadSidecar }, mockDependencies: func(t *testing.T, ctrl *gomock.Controller, svc *WorkerService) { svc.addons = mockAddons{ tpl: ` Resources: AdditionalResourcesPolicy: Type: AWS::IAM::ManagedPolicy Outputs: AdditionalResourcesPolicyArn: Value: hello`, } }, wantedErr: fmt.Errorf("parse exposed ports in service manifest frontend: cannot parse port mapping from 80/80/80"), }, "failed parsing Auto Scaling template": { setUpManifest: func(svc *WorkerService) { testWorkerSvcManifestWithBadAutoScaling := manifest.NewWorkerService(baseProps) badRange := manifest.IntRangeBand("badRange") testWorkerSvcManifestWithBadAutoScaling.Count.AdvancedCount = manifest.AdvancedCount{ Range: manifest.Range{ Value: &badRange, }, } svc.manifest = testWorkerSvcManifestWithBadAutoScaling }, mockDependencies: func(t *testing.T, ctrl *gomock.Controller, svc *WorkerService) { svc.addons = mockAddons{ tpl: ` Resources: AdditionalResourcesPolicy: Type: AWS::IAM::ManagedPolicy Outputs: AdditionalResourcesPolicyArn: Value: hello`, } }, wantedErr: fmt.Errorf("convert the advanced count configuration for service frontend: %w", errors.New("invalid range value badRange. Should be in format of ${min}-${max}")), }, "failed parsing svc template": { setUpManifest: func(svc *WorkerService) { svc.manifest = manifest.NewWorkerService(baseProps) }, mockDependencies: func(t *testing.T, ctrl *gomock.Controller, svc *WorkerService) { m := mocks.NewMockworkerSvcReadParser(ctrl) m.EXPECT().ParseWorkerService(gomock.Any()).Return(nil, errors.New("some error")) svc.parser = m svc.addons = mockAddons{ tpl: ` Resources: AdditionalResourcesPolicy: Type: AWS::IAM::ManagedPolicy Outputs: AdditionalResourcesPolicyArn: Value: hello`, } }, wantedErr: fmt.Errorf("parse worker service template: %w", errors.New("some error")), }, "render template": { setUpManifest: func(svc *WorkerService) { svc.manifest = manifest.NewWorkerService(manifest.WorkerServiceProps{ WorkloadProps: manifest.WorkloadProps{ Name: testServiceName, Dockerfile: testDockerfile, }, HealthCheck: manifest.ContainerHealthCheck{ Command: []string{"CMD-SHELL", "curl -f http://localhost/ || exit 1"}, Interval: &testInterval, Retries: &testRetries, Timeout: &testTimeout, StartPeriod: &testStartPeriod, }, }) svc.manifest.EntryPoint = manifest.EntryPointOverride{ String: nil, StringSlice: []string{"enter", "from"}, } svc.manifest.Command = manifest.CommandOverride{ String: nil, StringSlice: []string{"here"}, } svc.manifest.ExecuteCommand = manifest.ExecuteCommand{Enable: aws.Bool(true)} svc.manifest.DeployConfig = manifest.WorkerDeploymentConfig{ DeploymentControllerConfig: manifest.DeploymentControllerConfig{ Rolling: aws.String("default"), }, WorkerRollbackAlarms: manifest.AdvancedToUnion[[]string, manifest.WorkerAlarmArgs]( manifest.WorkerAlarmArgs{ MessagesDelayed: aws.Int(10), })} }, mockDependencies: func(t *testing.T, ctrl *gomock.Controller, svc *WorkerService) { m := mocks.NewMockworkerSvcReadParser(ctrl) m.EXPECT().ParseWorkerService(gomock.Any()).DoAndReturn(func(actual template.WorkloadOpts) (*template.Content, error) { require.Equal(t, template.WorkloadOpts{ AppName: "phonetool", EnvName: "test", WorkloadName: "frontend", WorkloadType: manifestinfo.WorkerServiceType, HealthCheck: &template.ContainerHealthCheck{ Command: []string{"CMD-SHELL", "curl -f http://localhost/ || exit 1"}, Interval: aws.Int64(5), Retries: aws.Int64(3), StartPeriod: aws.Int64(0), Timeout: aws.Int64(10), }, CustomResources: make(map[string]template.S3ObjectLocation), ExecuteCommand: &template.ExecuteCommandOpts{}, NestedStack: &template.WorkloadNestedStackOpts{ StackName: addon.StackName, VariableOutputs: []string{"MyTable"}, }, Network: template.NetworkOpts{ AssignPublicIP: template.DisablePublicIP, SubnetsType: template.PrivateSubnetsPlacement, SecurityGroups: []template.SecurityGroup{}, }, DeploymentConfiguration: template.DeploymentConfigurationOpts{ MinHealthyPercent: 100, MaxPercent: 200, Rollback: template.RollingUpdateRollbackConfig{MessagesDelayed: aws.Int(10)}, }, EntryPoint: []string{"enter", "from"}, Command: []string{"here"}, }, actual) return &template.Content{Buffer: bytes.NewBufferString("template")}, nil }) svc.parser = m svc.addons = mockAddons{ tpl: ` Resources: MyTable: Type: AWS::DynamoDB::Table Outputs: MyTable: Value: !Ref MyTable`, } }, wantedTemplate: "template", }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { // GIVEN ctrl := gomock.NewController(t) defer ctrl.Finish() conf := &WorkerService{ ecsWkld: &ecsWkld{ wkld: &wkld{ name: testServiceName, env: testEnvName, app: testAppName, rc: RuntimeConfig{ PushedImages: map[string]ECRImage{ testServiceName: { RepoURL: testImageRepoURL, ImageTag: testImageTag, }, }, AccountID: "0123456789012", Region: "us-west-2", }, }, taskDefOverrideFunc: mockCloudFormationOverrideFunc, }, } if tc.setUpManifest != nil { tc.setUpManifest(conf) conf.manifest.Network.VPC.Placement = manifest.PlacementArgOrString{ PlacementString: &testPrivatePlacement, } conf.manifest.Network.VPC.SecurityGroups = manifest.SecurityGroupsIDsOrConfig{} } tc.mockDependencies(t, ctrl, conf) // WHEN template, err := conf.Template() // THEN if tc.wantedErr != nil { require.EqualError(t, err, tc.wantedErr.Error()) } else { require.NoError(t, err) require.Equal(t, tc.wantedTemplate, template) } }) } } func TestWorkerService_Parameters(t *testing.T) { testWorkerSvcManifest := manifest.NewWorkerService(manifest.WorkerServiceProps{ WorkloadProps: manifest.WorkloadProps{ Name: testServiceName, Dockerfile: testDockerfile, }, HealthCheck: manifest.ContainerHealthCheck{ Command: []string{"CMD-SHELL", "curl -f http://localhost/ || exit 1"}, Interval: &testInterval, Retries: &testRetries, Timeout: &testTimeout, StartPeriod: &testStartPeriod, }, }) conf := &WorkerService{ ecsWkld: &ecsWkld{ wkld: &wkld{ name: aws.StringValue(testWorkerSvcManifest.Name), env: testEnvName, app: testAppName, image: manifest.Image{ ImageLocationOrBuild: manifest.ImageLocationOrBuild{ Location: aws.String("mockLocation"), }, }, }, tc: testWorkerSvcManifest.WorkerServiceConfig.TaskConfig, }, manifest: testWorkerSvcManifest, } // WHEN params, _ := conf.Parameters() // THEN require.ElementsMatch(t, []*cloudformation.Parameter{ { ParameterKey: aws.String(WorkloadAppNameParamKey), ParameterValue: aws.String("phonetool"), }, { ParameterKey: aws.String(WorkloadEnvNameParamKey), ParameterValue: aws.String("test"), }, { ParameterKey: aws.String(WorkloadNameParamKey), ParameterValue: aws.String("frontend"), }, { ParameterKey: aws.String(WorkloadContainerImageParamKey), ParameterValue: aws.String("mockLocation"), }, { ParameterKey: aws.String(WorkloadTaskCPUParamKey), ParameterValue: aws.String("256"), }, { ParameterKey: aws.String(WorkloadTaskMemoryParamKey), ParameterValue: aws.String("512"), }, { ParameterKey: aws.String(WorkloadTaskCountParamKey), ParameterValue: aws.String("1"), }, { ParameterKey: aws.String(WorkloadLogRetentionParamKey), ParameterValue: aws.String("30"), }, { ParameterKey: aws.String(WorkloadAddonsTemplateURLParamKey), ParameterValue: aws.String(""), }, { ParameterKey: aws.String(WorkloadEnvFileARNParamKey), ParameterValue: aws.String(""), }, }, params) }
330
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package stack import ( "encoding/json" "fmt" "strconv" "github.com/aws/copilot-cli/internal/pkg/aws/s3" "github.com/aws/aws-sdk-go/aws" "github.com/aws/aws-sdk-go/service/cloudformation" "github.com/aws/copilot-cli/internal/pkg/addon" "github.com/aws/copilot-cli/internal/pkg/aws/apprunner" "github.com/aws/copilot-cli/internal/pkg/deploy" "github.com/aws/copilot-cli/internal/pkg/manifest" "github.com/aws/copilot-cli/internal/pkg/template" "github.com/aws/copilot-cli/internal/pkg/template/override" ) // Parameter logical IDs common across workloads. const ( WorkloadAppNameParamKey = "AppName" WorkloadEnvNameParamKey = "EnvName" WorkloadNameParamKey = "WorkloadName" WorkloadContainerImageParamKey = "ContainerImage" WorkloadContainerPortParamKey = "ContainerPort" WorkloadAddonsTemplateURLParamKey = "AddonsTemplateURL" ) // Parameter logical IDs for workloads on ECS. const ( WorkloadTaskCPUParamKey = "TaskCPU" WorkloadTaskMemoryParamKey = "TaskMemory" WorkloadTaskCountParamKey = "TaskCount" WorkloadLogRetentionParamKey = "LogRetention" WorkloadEnvFileARNParamKey = "EnvFileARN" WorkloadLoggingEnvFileARNParamKey = "LoggingEnvFileARN" FmtSidecarEnvFileARNParamKey = "EnvFileARNFor%s" ) // Parameter logical IDs for workloads on ECS with a Load Balancer. const ( WorkloadTargetContainerParamKey = "TargetContainer" WorkloadTargetPortParamKey = "TargetPort" WorkloadHTTPSParamKey = "HTTPSEnabled" WorkloadRulePathParamKey = "RulePath" WorkloadStickinessParamKey = "Stickiness" ) // Parameter logical IDs for workloads on App Runner. const ( RDWkldImageRepositoryType = "ImageRepositoryType" RDWkldInstanceCPUParamKey = "InstanceCPU" RDWkldInstanceMemoryParamKey = "InstanceMemory" RDWkldInstanceRoleParamKey = "InstanceRole" RDWkldHealthCheckPathParamKey = "HealthCheckPath" RDWkldHealthCheckIntervalParamKey = "HealthCheckInterval" RDWkldHealthCheckTimeoutParamKey = "HealthCheckTimeout" RDWkldHealthCheckHealthyThresholdParamKey = "HealthCheckHealthyThreshold" RDWkldHealthCheckUnhealthyThresholdParamKey = "HealthCheckUnhealthyThreshold" ) const ( ecsWkldLogRetentionDefault = 30 ) // RuntimeConfig represents configuration that's defined outside of the manifest file // that is needed to create a CloudFormation stack. type RuntimeConfig struct { PushedImages map[string]ECRImage // Optional. Image location in an ECR repository. AddonsTemplateURL string // Optional. S3 object URL for the addons template. EnvFileARNs map[string]string // Optional. S3 object ARNs for any env files. Map keys are container names. AdditionalTags map[string]string // AdditionalTags are labels applied to resources in the workload stack. CustomResourcesURL map[string]string // Mapping of Custom Resource Function Name to the S3 URL where the function zip file is stored. // The target environment metadata. ServiceDiscoveryEndpoint string // Endpoint for the service discovery namespace in the environment. AccountID string Region string EnvVersion string } func (cfg *RuntimeConfig) loadCustomResourceURLs(bucket string, crs []uploadable) { if len(cfg.CustomResourcesURL) != 0 { return } cfg.CustomResourcesURL = make(map[string]string, len(crs)) for _, cr := range crs { cfg.CustomResourcesURL[cr.Name()] = s3.URL(cfg.Region, bucket, cr.ArtifactPath()) } } // ECRImage represents configuration about the pushed ECR image that is needed to // create a CloudFormation stack. type ECRImage struct { RepoURL string // RepoURL is the ECR repository URL the container image should be pushed to. ImageTag string // Tag is the container image's unique tag. Digest string // The image digest. ContainerName string // The container name. MainContainerName string // The workload's container name. } // URI returns the ECR image URI. // If a tag is provided by the user or discovered from git then prioritize referring to the image via the tag. // Otherwise, each image after a push to ECR will get a digest and we refer to the image via the digest. // Finally, if no digest or tag is present, this occurs with the "package" commands, we default to the "latest" tag. func (i ECRImage) URI() string { if i.ContainerName == i.MainContainerName { if i.ImageTag != "" { return fmt.Sprintf("%s:%s", i.RepoURL, i.ImageTag) } if i.Digest != "" { return fmt.Sprintf("%s@%s", i.RepoURL, i.Digest) } return fmt.Sprintf("%s:%s", i.RepoURL, "latest") } if i.ImageTag != "" { return fmt.Sprintf("%s:%s-%s", i.RepoURL, i.ContainerName, i.ImageTag) } if i.Digest != "" { return fmt.Sprintf("%s@%s", i.RepoURL, i.Digest) } return fmt.Sprintf("%s:%s-%s", i.RepoURL, i.ContainerName, "latest") } // NestedStackConfigurer configures a nested stack that deploys addons. type NestedStackConfigurer interface { Template() (string, error) Parameters() (string, error) } type location interface { GetLocation() string } // uploadable is the interface for an object that can be uploaded to an S3 bucket. type uploadable interface { Name() string ArtifactPath() string } // wkld represents a generic containerized workload. // A workload can be a long-running service, an ephemeral task, or a periodic task. type wkld struct { name string env string app string permBound string artifactBucketName string rc RuntimeConfig image location rawManifest []byte // Content of the manifest file without any transformations. parser template.Parser addons NestedStackConfigurer } // StackName returns the name of the stack. func (w *wkld) StackName() string { return NameForWorkload(w.app, w.env, w.name) } // Parameters returns the list of CloudFormation parameters used by the template. func (w *wkld) Parameters() ([]*cloudformation.Parameter, error) { var img string if w.image != nil { img = w.image.GetLocation() } if w.rc.PushedImages != nil { img = w.rc.PushedImages[w.name].URI() } return []*cloudformation.Parameter{ { ParameterKey: aws.String(WorkloadAppNameParamKey), ParameterValue: aws.String(w.app), }, { ParameterKey: aws.String(WorkloadEnvNameParamKey), ParameterValue: aws.String(w.env), }, { ParameterKey: aws.String(WorkloadNameParamKey), ParameterValue: aws.String(w.name), }, { ParameterKey: aws.String(WorkloadContainerImageParamKey), ParameterValue: aws.String(img), }, { ParameterKey: aws.String(WorkloadAddonsTemplateURLParamKey), ParameterValue: aws.String(w.rc.AddonsTemplateURL), }, }, nil } // Tags returns the list of tags to apply to the CloudFormation stack. func (w *wkld) Tags() []*cloudformation.Tag { return mergeAndFlattenTags(w.rc.AdditionalTags, map[string]string{ deploy.AppTagKey: w.app, deploy.EnvTagKey: w.env, deploy.ServiceTagKey: w.name, }) } type templateConfigurer interface { Parameters() ([]*cloudformation.Parameter, error) Tags() []*cloudformation.Tag } func serializeTemplateConfig(parser template.Parser, stack templateConfigurer) (string, error) { params, err := stack.Parameters() if err != nil { return "", err } tags := stack.Tags() config := struct { Parameters map[string]*string `json:"Parameters"` Tags map[string]*string `json:"Tags,omitempty"` }{ Parameters: make(map[string]*string, len(params)), Tags: make(map[string]*string, len(tags)), } for _, param := range params { config.Parameters[aws.StringValue(param.ParameterKey)] = param.ParameterValue } for _, tag := range tags { config.Tags[aws.StringValue(tag.Key)] = tag.Value } str, err := json.MarshalIndent(config, "", " ") if err != nil { return "", fmt.Errorf("marshal stack parameters to JSON: %v", err) } return string(str), nil } func (w *wkld) addonsOutputs() (*template.WorkloadNestedStackOpts, error) { if w.addons == nil { return nil, nil } tmpl, err := w.addons.Template() switch { case err != nil: return nil, fmt.Errorf("generate addons template for %s: %w", w.name, err) case tmpl == "": return nil, nil } out, err := addon.Outputs(tmpl) if err != nil { return nil, fmt.Errorf("get addons outputs for %s: %w", w.name, err) } return &template.WorkloadNestedStackOpts{ StackName: addon.StackName, VariableOutputs: envVarOutputNames(out), SecretOutputs: secretOutputNames(out), PolicyOutputs: managedPolicyOutputNames(out), SecurityGroupOutputs: securityGroupOutputNames(out), }, nil } func (w *wkld) addonsParameters() (string, error) { if w.addons == nil { return "", nil } params, err := w.addons.Parameters() if err != nil { return "", fmt.Errorf("parse addons parameters for %s: %w", w.name, err) } return params, nil } func securityGroupOutputNames(outputs []addon.Output) []string { var securityGroups []string for _, out := range outputs { if out.IsSecurityGroup { securityGroups = append(securityGroups, out.Name) } } return securityGroups } func secretOutputNames(outputs []addon.Output) []string { var secrets []string for _, out := range outputs { if out.IsSecret { secrets = append(secrets, out.Name) } } return secrets } func managedPolicyOutputNames(outputs []addon.Output) []string { var policies []string for _, out := range outputs { if out.IsManagedPolicy { policies = append(policies, out.Name) } } return policies } func envVarOutputNames(outputs []addon.Output) []string { var envVars []string for _, out := range outputs { if !out.IsSecret && !out.IsManagedPolicy { envVars = append(envVars, out.Name) } } return envVars } type ecsWkld struct { *wkld tc manifest.TaskConfig logging manifest.Logging sidecars map[string]*manifest.SidecarConfig // Overriden in unit tests. taskDefOverrideFunc func(overrideRules []override.Rule, origTemp []byte) ([]byte, error) } // Parameters returns the list of CloudFormation parameters used by the template. func (w *ecsWkld) Parameters() ([]*cloudformation.Parameter, error) { wkldParameters, err := w.wkld.Parameters() if err != nil { return nil, err } envFileParameters := append(wkldParameters, w.envFileParams()...) desiredCount, err := w.tc.Count.Desired() if err != nil { return nil, err } logRetention := ecsWkldLogRetentionDefault if w.logging.Retention != nil { logRetention = aws.IntValue(w.logging.Retention) } return append(envFileParameters, []*cloudformation.Parameter{ { ParameterKey: aws.String(WorkloadTaskCPUParamKey), ParameterValue: aws.String(strconv.Itoa(aws.IntValue(w.tc.CPU))), }, { ParameterKey: aws.String(WorkloadTaskMemoryParamKey), ParameterValue: aws.String(strconv.Itoa(aws.IntValue(w.tc.Memory))), }, { ParameterKey: aws.String(WorkloadTaskCountParamKey), ParameterValue: aws.String(strconv.Itoa(*desiredCount)), }, { ParameterKey: aws.String(WorkloadLogRetentionParamKey), ParameterValue: aws.String(strconv.Itoa(logRetention)), }, }...), nil } // envFileParams decides which containers have Environment files and gets the appropriate Environment File ARN. // This will always at least contain the `EnvFileARN` parameter for the main workload container. func (w *ecsWkld) envFileParams() []*cloudformation.Parameter { params := []*cloudformation.Parameter{ { ParameterKey: aws.String(WorkloadEnvFileARNParamKey), ParameterValue: aws.String(w.rc.EnvFileARNs[w.name]), }, } // Decide whether to inject a Log container env file. If there is log configuration // in the manifest, we should inject either an empty string or the configured env file arn, // if it exists. if !w.logging.IsEmpty() { params = append(params, &cloudformation.Parameter{ ParameterKey: aws.String(WorkloadLoggingEnvFileARNParamKey), ParameterValue: aws.String(w.rc.EnvFileARNs[manifest.FirelensContainerName]), // String maps return "" if a key doesn't exist. }) } for containerName := range w.sidecars { params = append(params, &cloudformation.Parameter{ ParameterKey: aws.String(fmt.Sprintf(FmtSidecarEnvFileARNParamKey, template.StripNonAlphaNumFunc(containerName))), ParameterValue: aws.String(w.rc.EnvFileARNs[containerName]), }) } return params } type appRunnerWkld struct { *wkld instanceConfig manifest.AppRunnerInstanceConfig imageConfig manifest.ImageWithPort healthCheckConfig manifest.HealthCheckArgsOrString } // Parameters returns the list of CloudFormation parameters used by the template. func (w *appRunnerWkld) Parameters() ([]*cloudformation.Parameter, error) { wkldParameters, err := w.wkld.Parameters() if err != nil { return nil, err } var img string if w.image != nil { img = w.image.GetLocation() } if w.rc.PushedImages != nil { img = w.rc.PushedImages[w.name].URI() } imageRepositoryType, err := apprunner.DetermineImageRepositoryType(img) if err != nil { return nil, fmt.Errorf("determine image repository type: %w", err) } if w.imageConfig.Port == nil { return nil, fmt.Errorf("field `image.port` is required for Request Driven Web Services") } if w.instanceConfig.CPU == nil { return nil, fmt.Errorf("field `cpu` is required for Request Driven Web Services") } if w.instanceConfig.Memory == nil { return nil, fmt.Errorf("field `memory` is required for Request Driven Web Services") } appRunnerParameters := []*cloudformation.Parameter{ { ParameterKey: aws.String(RDWkldImageRepositoryType), ParameterValue: aws.String(imageRepositoryType), }, { ParameterKey: aws.String(WorkloadContainerPortParamKey), ParameterValue: aws.String(strconv.Itoa(int(aws.Uint16Value(w.imageConfig.Port)))), }, { ParameterKey: aws.String(RDWkldInstanceCPUParamKey), ParameterValue: aws.String(strconv.Itoa(aws.IntValue(w.instanceConfig.CPU))), }, { ParameterKey: aws.String(RDWkldInstanceMemoryParamKey), ParameterValue: aws.String(strconv.Itoa(aws.IntValue(w.instanceConfig.Memory))), }, } // Optional HealthCheckPath parameter if w.healthCheckConfig.Path() != nil { appRunnerParameters = append(appRunnerParameters, &cloudformation.Parameter{ ParameterKey: aws.String(RDWkldHealthCheckPathParamKey), ParameterValue: aws.String(*w.healthCheckConfig.Path()), }) } // Optional HealthCheckInterval parameter if w.healthCheckConfig.Advanced.Interval != nil { appRunnerParameters = append(appRunnerParameters, &cloudformation.Parameter{ ParameterKey: aws.String(RDWkldHealthCheckIntervalParamKey), ParameterValue: aws.String(strconv.Itoa(int(w.healthCheckConfig.Advanced.Interval.Seconds()))), }) } // Optional HealthCheckTimeout parameter if w.healthCheckConfig.Advanced.Timeout != nil { appRunnerParameters = append(appRunnerParameters, &cloudformation.Parameter{ ParameterKey: aws.String(RDWkldHealthCheckTimeoutParamKey), ParameterValue: aws.String(strconv.Itoa(int(w.healthCheckConfig.Advanced.Timeout.Seconds()))), }) } // Optional HealthCheckHealthyThreshold parameter if w.healthCheckConfig.Advanced.HealthyThreshold != nil { appRunnerParameters = append(appRunnerParameters, &cloudformation.Parameter{ ParameterKey: aws.String(RDWkldHealthCheckHealthyThresholdParamKey), ParameterValue: aws.String(strconv.Itoa(int(*w.healthCheckConfig.Advanced.HealthyThreshold))), }) } // Optional HealthCheckUnhealthyThreshold parameter if w.healthCheckConfig.Advanced.UnhealthyThreshold != nil { appRunnerParameters = append(appRunnerParameters, &cloudformation.Parameter{ ParameterKey: aws.String(RDWkldHealthCheckUnhealthyThresholdParamKey), ParameterValue: aws.String(strconv.Itoa(int(*w.healthCheckConfig.Advanced.UnhealthyThreshold))), }) } return append(wkldParameters, appRunnerParameters...), nil }
494
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package stack import ( "testing" "github.com/stretchr/testify/require" ) func TestECRImage_GetLocation(t *testing.T) { testCases := map[string]struct { in ECRImage wanted string }{ "should use the image tag over anything else": { in: ECRImage{ RepoURL: "aws_account_id.dkr.ecr.us-west-2.amazonaws.com/amazonlinux", ImageTag: "ab1f5575", Digest: "sha256:f1d4ae3f7261a72e98c6ebefe9985cf10a0ea5bd762585a43e0700ed99863807", }, wanted: "aws_account_id.dkr.ecr.us-west-2.amazonaws.com/amazonlinux:ab1f5575", }, "should use the digest if no tag is provided": { in: ECRImage{ RepoURL: "aws_account_id.dkr.ecr.us-west-2.amazonaws.com/amazonlinux", Digest: "sha256:f1d4ae3f7261a72e98c6ebefe9985cf10a0ea5bd762585a43e0700ed99863807", }, wanted: "aws_account_id.dkr.ecr.us-west-2.amazonaws.com/amazonlinux@sha256:f1d4ae3f7261a72e98c6ebefe9985cf10a0ea5bd762585a43e0700ed99863807", }, "should use the latest image if nothing is provided": { in: ECRImage{ RepoURL: "aws_account_id.dkr.ecr.us-west-2.amazonaws.com/amazonlinux", }, wanted: "aws_account_id.dkr.ecr.us-west-2.amazonaws.com/amazonlinux:latest", }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { require.Equal(t, tc.wanted, tc.in.URI()) }) } }
47
copilot-cli
aws
Go
// Code generated by MockGen. DO NOT EDIT. // Source: ./internal/pkg/deploy/cloudformation/stack/embed.go // Package mocks is a generated GoMock package. package mocks import ( reflect "reflect" template "github.com/aws/copilot-cli/internal/pkg/template" gomock "github.com/golang/mock/gomock" ) // MockloadBalancedWebSvcReadParser is a mock of loadBalancedWebSvcReadParser interface. type MockloadBalancedWebSvcReadParser struct { ctrl *gomock.Controller recorder *MockloadBalancedWebSvcReadParserMockRecorder } // MockloadBalancedWebSvcReadParserMockRecorder is the mock recorder for MockloadBalancedWebSvcReadParser. type MockloadBalancedWebSvcReadParserMockRecorder struct { mock *MockloadBalancedWebSvcReadParser } // NewMockloadBalancedWebSvcReadParser creates a new mock instance. func NewMockloadBalancedWebSvcReadParser(ctrl *gomock.Controller) *MockloadBalancedWebSvcReadParser { mock := &MockloadBalancedWebSvcReadParser{ctrl: ctrl} mock.recorder = &MockloadBalancedWebSvcReadParserMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockloadBalancedWebSvcReadParser) EXPECT() *MockloadBalancedWebSvcReadParserMockRecorder { return m.recorder } // Parse mocks base method. func (m *MockloadBalancedWebSvcReadParser) Parse(path string, data interface{}, options ...template.ParseOption) (*template.Content, error) { m.ctrl.T.Helper() varargs := []interface{}{path, data} for _, a := range options { varargs = append(varargs, a) } ret := m.ctrl.Call(m, "Parse", varargs...) ret0, _ := ret[0].(*template.Content) ret1, _ := ret[1].(error) return ret0, ret1 } // Parse indicates an expected call of Parse. func (mr *MockloadBalancedWebSvcReadParserMockRecorder) Parse(path, data interface{}, options ...interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() varargs := append([]interface{}{path, data}, options...) return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Parse", reflect.TypeOf((*MockloadBalancedWebSvcReadParser)(nil).Parse), varargs...) } // ParseLoadBalancedWebService mocks base method. func (m *MockloadBalancedWebSvcReadParser) ParseLoadBalancedWebService(arg0 template.WorkloadOpts) (*template.Content, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "ParseLoadBalancedWebService", arg0) ret0, _ := ret[0].(*template.Content) ret1, _ := ret[1].(error) return ret0, ret1 } // ParseLoadBalancedWebService indicates an expected call of ParseLoadBalancedWebService. func (mr *MockloadBalancedWebSvcReadParserMockRecorder) ParseLoadBalancedWebService(arg0 interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ParseLoadBalancedWebService", reflect.TypeOf((*MockloadBalancedWebSvcReadParser)(nil).ParseLoadBalancedWebService), arg0) } // Read mocks base method. func (m *MockloadBalancedWebSvcReadParser) Read(path string) (*template.Content, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "Read", path) ret0, _ := ret[0].(*template.Content) ret1, _ := ret[1].(error) return ret0, ret1 } // Read indicates an expected call of Read. func (mr *MockloadBalancedWebSvcReadParserMockRecorder) Read(path interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Read", reflect.TypeOf((*MockloadBalancedWebSvcReadParser)(nil).Read), path) } // MockbackendSvcReadParser is a mock of backendSvcReadParser interface. type MockbackendSvcReadParser struct { ctrl *gomock.Controller recorder *MockbackendSvcReadParserMockRecorder } // MockbackendSvcReadParserMockRecorder is the mock recorder for MockbackendSvcReadParser. type MockbackendSvcReadParserMockRecorder struct { mock *MockbackendSvcReadParser } // NewMockbackendSvcReadParser creates a new mock instance. func NewMockbackendSvcReadParser(ctrl *gomock.Controller) *MockbackendSvcReadParser { mock := &MockbackendSvcReadParser{ctrl: ctrl} mock.recorder = &MockbackendSvcReadParserMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockbackendSvcReadParser) EXPECT() *MockbackendSvcReadParserMockRecorder { return m.recorder } // Parse mocks base method. func (m *MockbackendSvcReadParser) Parse(path string, data interface{}, options ...template.ParseOption) (*template.Content, error) { m.ctrl.T.Helper() varargs := []interface{}{path, data} for _, a := range options { varargs = append(varargs, a) } ret := m.ctrl.Call(m, "Parse", varargs...) ret0, _ := ret[0].(*template.Content) ret1, _ := ret[1].(error) return ret0, ret1 } // Parse indicates an expected call of Parse. func (mr *MockbackendSvcReadParserMockRecorder) Parse(path, data interface{}, options ...interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() varargs := append([]interface{}{path, data}, options...) return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Parse", reflect.TypeOf((*MockbackendSvcReadParser)(nil).Parse), varargs...) } // ParseBackendService mocks base method. func (m *MockbackendSvcReadParser) ParseBackendService(arg0 template.WorkloadOpts) (*template.Content, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "ParseBackendService", arg0) ret0, _ := ret[0].(*template.Content) ret1, _ := ret[1].(error) return ret0, ret1 } // ParseBackendService indicates an expected call of ParseBackendService. func (mr *MockbackendSvcReadParserMockRecorder) ParseBackendService(arg0 interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ParseBackendService", reflect.TypeOf((*MockbackendSvcReadParser)(nil).ParseBackendService), arg0) } // Read mocks base method. func (m *MockbackendSvcReadParser) Read(path string) (*template.Content, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "Read", path) ret0, _ := ret[0].(*template.Content) ret1, _ := ret[1].(error) return ret0, ret1 } // Read indicates an expected call of Read. func (mr *MockbackendSvcReadParserMockRecorder) Read(path interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Read", reflect.TypeOf((*MockbackendSvcReadParser)(nil).Read), path) } // MockrequestDrivenWebSvcReadParser is a mock of requestDrivenWebSvcReadParser interface. type MockrequestDrivenWebSvcReadParser struct { ctrl *gomock.Controller recorder *MockrequestDrivenWebSvcReadParserMockRecorder } // MockrequestDrivenWebSvcReadParserMockRecorder is the mock recorder for MockrequestDrivenWebSvcReadParser. type MockrequestDrivenWebSvcReadParserMockRecorder struct { mock *MockrequestDrivenWebSvcReadParser } // NewMockrequestDrivenWebSvcReadParser creates a new mock instance. func NewMockrequestDrivenWebSvcReadParser(ctrl *gomock.Controller) *MockrequestDrivenWebSvcReadParser { mock := &MockrequestDrivenWebSvcReadParser{ctrl: ctrl} mock.recorder = &MockrequestDrivenWebSvcReadParserMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockrequestDrivenWebSvcReadParser) EXPECT() *MockrequestDrivenWebSvcReadParserMockRecorder { return m.recorder } // Parse mocks base method. func (m *MockrequestDrivenWebSvcReadParser) Parse(path string, data interface{}, options ...template.ParseOption) (*template.Content, error) { m.ctrl.T.Helper() varargs := []interface{}{path, data} for _, a := range options { varargs = append(varargs, a) } ret := m.ctrl.Call(m, "Parse", varargs...) ret0, _ := ret[0].(*template.Content) ret1, _ := ret[1].(error) return ret0, ret1 } // Parse indicates an expected call of Parse. func (mr *MockrequestDrivenWebSvcReadParserMockRecorder) Parse(path, data interface{}, options ...interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() varargs := append([]interface{}{path, data}, options...) return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Parse", reflect.TypeOf((*MockrequestDrivenWebSvcReadParser)(nil).Parse), varargs...) } // ParseRequestDrivenWebService mocks base method. func (m *MockrequestDrivenWebSvcReadParser) ParseRequestDrivenWebService(arg0 template.WorkloadOpts) (*template.Content, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "ParseRequestDrivenWebService", arg0) ret0, _ := ret[0].(*template.Content) ret1, _ := ret[1].(error) return ret0, ret1 } // ParseRequestDrivenWebService indicates an expected call of ParseRequestDrivenWebService. func (mr *MockrequestDrivenWebSvcReadParserMockRecorder) ParseRequestDrivenWebService(arg0 interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ParseRequestDrivenWebService", reflect.TypeOf((*MockrequestDrivenWebSvcReadParser)(nil).ParseRequestDrivenWebService), arg0) } // Read mocks base method. func (m *MockrequestDrivenWebSvcReadParser) Read(path string) (*template.Content, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "Read", path) ret0, _ := ret[0].(*template.Content) ret1, _ := ret[1].(error) return ret0, ret1 } // Read indicates an expected call of Read. func (mr *MockrequestDrivenWebSvcReadParserMockRecorder) Read(path interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Read", reflect.TypeOf((*MockrequestDrivenWebSvcReadParser)(nil).Read), path) } // MockworkerSvcReadParser is a mock of workerSvcReadParser interface. type MockworkerSvcReadParser struct { ctrl *gomock.Controller recorder *MockworkerSvcReadParserMockRecorder } // MockworkerSvcReadParserMockRecorder is the mock recorder for MockworkerSvcReadParser. type MockworkerSvcReadParserMockRecorder struct { mock *MockworkerSvcReadParser } // NewMockworkerSvcReadParser creates a new mock instance. func NewMockworkerSvcReadParser(ctrl *gomock.Controller) *MockworkerSvcReadParser { mock := &MockworkerSvcReadParser{ctrl: ctrl} mock.recorder = &MockworkerSvcReadParserMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockworkerSvcReadParser) EXPECT() *MockworkerSvcReadParserMockRecorder { return m.recorder } // Parse mocks base method. func (m *MockworkerSvcReadParser) Parse(path string, data interface{}, options ...template.ParseOption) (*template.Content, error) { m.ctrl.T.Helper() varargs := []interface{}{path, data} for _, a := range options { varargs = append(varargs, a) } ret := m.ctrl.Call(m, "Parse", varargs...) ret0, _ := ret[0].(*template.Content) ret1, _ := ret[1].(error) return ret0, ret1 } // Parse indicates an expected call of Parse. func (mr *MockworkerSvcReadParserMockRecorder) Parse(path, data interface{}, options ...interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() varargs := append([]interface{}{path, data}, options...) return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Parse", reflect.TypeOf((*MockworkerSvcReadParser)(nil).Parse), varargs...) } // ParseWorkerService mocks base method. func (m *MockworkerSvcReadParser) ParseWorkerService(arg0 template.WorkloadOpts) (*template.Content, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "ParseWorkerService", arg0) ret0, _ := ret[0].(*template.Content) ret1, _ := ret[1].(error) return ret0, ret1 } // ParseWorkerService indicates an expected call of ParseWorkerService. func (mr *MockworkerSvcReadParserMockRecorder) ParseWorkerService(arg0 interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ParseWorkerService", reflect.TypeOf((*MockworkerSvcReadParser)(nil).ParseWorkerService), arg0) } // Read mocks base method. func (m *MockworkerSvcReadParser) Read(path string) (*template.Content, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "Read", path) ret0, _ := ret[0].(*template.Content) ret1, _ := ret[1].(error) return ret0, ret1 } // Read indicates an expected call of Read. func (mr *MockworkerSvcReadParserMockRecorder) Read(path interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Read", reflect.TypeOf((*MockworkerSvcReadParser)(nil).Read), path) } // MockstaticSiteReadParser is a mock of staticSiteReadParser interface. type MockstaticSiteReadParser struct { ctrl *gomock.Controller recorder *MockstaticSiteReadParserMockRecorder } // MockstaticSiteReadParserMockRecorder is the mock recorder for MockstaticSiteReadParser. type MockstaticSiteReadParserMockRecorder struct { mock *MockstaticSiteReadParser } // NewMockstaticSiteReadParser creates a new mock instance. func NewMockstaticSiteReadParser(ctrl *gomock.Controller) *MockstaticSiteReadParser { mock := &MockstaticSiteReadParser{ctrl: ctrl} mock.recorder = &MockstaticSiteReadParserMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockstaticSiteReadParser) EXPECT() *MockstaticSiteReadParserMockRecorder { return m.recorder } // Parse mocks base method. func (m *MockstaticSiteReadParser) Parse(path string, data interface{}, options ...template.ParseOption) (*template.Content, error) { m.ctrl.T.Helper() varargs := []interface{}{path, data} for _, a := range options { varargs = append(varargs, a) } ret := m.ctrl.Call(m, "Parse", varargs...) ret0, _ := ret[0].(*template.Content) ret1, _ := ret[1].(error) return ret0, ret1 } // Parse indicates an expected call of Parse. func (mr *MockstaticSiteReadParserMockRecorder) Parse(path, data interface{}, options ...interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() varargs := append([]interface{}{path, data}, options...) return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Parse", reflect.TypeOf((*MockstaticSiteReadParser)(nil).Parse), varargs...) } // ParseStaticSite mocks base method. func (m *MockstaticSiteReadParser) ParseStaticSite(arg0 template.WorkloadOpts) (*template.Content, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "ParseStaticSite", arg0) ret0, _ := ret[0].(*template.Content) ret1, _ := ret[1].(error) return ret0, ret1 } // ParseStaticSite indicates an expected call of ParseStaticSite. func (mr *MockstaticSiteReadParserMockRecorder) ParseStaticSite(arg0 interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ParseStaticSite", reflect.TypeOf((*MockstaticSiteReadParser)(nil).ParseStaticSite), arg0) } // Read mocks base method. func (m *MockstaticSiteReadParser) Read(path string) (*template.Content, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "Read", path) ret0, _ := ret[0].(*template.Content) ret1, _ := ret[1].(error) return ret0, ret1 } // Read indicates an expected call of Read. func (mr *MockstaticSiteReadParserMockRecorder) Read(path interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Read", reflect.TypeOf((*MockstaticSiteReadParser)(nil).Read), path) } // MockscheduledJobReadParser is a mock of scheduledJobReadParser interface. type MockscheduledJobReadParser struct { ctrl *gomock.Controller recorder *MockscheduledJobReadParserMockRecorder } // MockscheduledJobReadParserMockRecorder is the mock recorder for MockscheduledJobReadParser. type MockscheduledJobReadParserMockRecorder struct { mock *MockscheduledJobReadParser } // NewMockscheduledJobReadParser creates a new mock instance. func NewMockscheduledJobReadParser(ctrl *gomock.Controller) *MockscheduledJobReadParser { mock := &MockscheduledJobReadParser{ctrl: ctrl} mock.recorder = &MockscheduledJobReadParserMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockscheduledJobReadParser) EXPECT() *MockscheduledJobReadParserMockRecorder { return m.recorder } // Parse mocks base method. func (m *MockscheduledJobReadParser) Parse(path string, data interface{}, options ...template.ParseOption) (*template.Content, error) { m.ctrl.T.Helper() varargs := []interface{}{path, data} for _, a := range options { varargs = append(varargs, a) } ret := m.ctrl.Call(m, "Parse", varargs...) ret0, _ := ret[0].(*template.Content) ret1, _ := ret[1].(error) return ret0, ret1 } // Parse indicates an expected call of Parse. func (mr *MockscheduledJobReadParserMockRecorder) Parse(path, data interface{}, options ...interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() varargs := append([]interface{}{path, data}, options...) return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Parse", reflect.TypeOf((*MockscheduledJobReadParser)(nil).Parse), varargs...) } // ParseScheduledJob mocks base method. func (m *MockscheduledJobReadParser) ParseScheduledJob(arg0 template.WorkloadOpts) (*template.Content, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "ParseScheduledJob", arg0) ret0, _ := ret[0].(*template.Content) ret1, _ := ret[1].(error) return ret0, ret1 } // ParseScheduledJob indicates an expected call of ParseScheduledJob. func (mr *MockscheduledJobReadParserMockRecorder) ParseScheduledJob(arg0 interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ParseScheduledJob", reflect.TypeOf((*MockscheduledJobReadParser)(nil).ParseScheduledJob), arg0) } // Read mocks base method. func (m *MockscheduledJobReadParser) Read(path string) (*template.Content, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "Read", path) ret0, _ := ret[0].(*template.Content) ret1, _ := ret[1].(error) return ret0, ret1 } // Read indicates an expected call of Read. func (mr *MockscheduledJobReadParserMockRecorder) Read(path interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Read", reflect.TypeOf((*MockscheduledJobReadParser)(nil).Read), path) } // MockenvReadParser is a mock of envReadParser interface. type MockenvReadParser struct { ctrl *gomock.Controller recorder *MockenvReadParserMockRecorder } // MockenvReadParserMockRecorder is the mock recorder for MockenvReadParser. type MockenvReadParserMockRecorder struct { mock *MockenvReadParser } // NewMockenvReadParser creates a new mock instance. func NewMockenvReadParser(ctrl *gomock.Controller) *MockenvReadParser { mock := &MockenvReadParser{ctrl: ctrl} mock.recorder = &MockenvReadParserMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockenvReadParser) EXPECT() *MockenvReadParserMockRecorder { return m.recorder } // Parse mocks base method. func (m *MockenvReadParser) Parse(path string, data interface{}, options ...template.ParseOption) (*template.Content, error) { m.ctrl.T.Helper() varargs := []interface{}{path, data} for _, a := range options { varargs = append(varargs, a) } ret := m.ctrl.Call(m, "Parse", varargs...) ret0, _ := ret[0].(*template.Content) ret1, _ := ret[1].(error) return ret0, ret1 } // Parse indicates an expected call of Parse. func (mr *MockenvReadParserMockRecorder) Parse(path, data interface{}, options ...interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() varargs := append([]interface{}{path, data}, options...) return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Parse", reflect.TypeOf((*MockenvReadParser)(nil).Parse), varargs...) } // ParseEnv mocks base method. func (m *MockenvReadParser) ParseEnv(data *template.EnvOpts) (*template.Content, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "ParseEnv", data) ret0, _ := ret[0].(*template.Content) ret1, _ := ret[1].(error) return ret0, ret1 } // ParseEnv indicates an expected call of ParseEnv. func (mr *MockenvReadParserMockRecorder) ParseEnv(data interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ParseEnv", reflect.TypeOf((*MockenvReadParser)(nil).ParseEnv), data) } // ParseEnvBootstrap mocks base method. func (m *MockenvReadParser) ParseEnvBootstrap(data *template.EnvOpts, options ...template.ParseOption) (*template.Content, error) { m.ctrl.T.Helper() varargs := []interface{}{data} for _, a := range options { varargs = append(varargs, a) } ret := m.ctrl.Call(m, "ParseEnvBootstrap", varargs...) ret0, _ := ret[0].(*template.Content) ret1, _ := ret[1].(error) return ret0, ret1 } // ParseEnvBootstrap indicates an expected call of ParseEnvBootstrap. func (mr *MockenvReadParserMockRecorder) ParseEnvBootstrap(data interface{}, options ...interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() varargs := append([]interface{}{data}, options...) return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ParseEnvBootstrap", reflect.TypeOf((*MockenvReadParser)(nil).ParseEnvBootstrap), varargs...) } // Read mocks base method. func (m *MockenvReadParser) Read(path string) (*template.Content, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "Read", path) ret0, _ := ret[0].(*template.Content) ret1, _ := ret[1].(error) return ret0, ret1 } // Read indicates an expected call of Read. func (mr *MockenvReadParserMockRecorder) Read(path interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Read", reflect.TypeOf((*MockenvReadParser)(nil).Read), path) } // MockembedFS is a mock of embedFS interface. type MockembedFS struct { ctrl *gomock.Controller recorder *MockembedFSMockRecorder } // MockembedFSMockRecorder is the mock recorder for MockembedFS. type MockembedFSMockRecorder struct { mock *MockembedFS } // NewMockembedFS creates a new mock instance. func NewMockembedFS(ctrl *gomock.Controller) *MockembedFS { mock := &MockembedFS{ctrl: ctrl} mock.recorder = &MockembedFSMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockembedFS) EXPECT() *MockembedFSMockRecorder { return m.recorder } // Parse mocks base method. func (m *MockembedFS) Parse(path string, data interface{}, options ...template.ParseOption) (*template.Content, error) { m.ctrl.T.Helper() varargs := []interface{}{path, data} for _, a := range options { varargs = append(varargs, a) } ret := m.ctrl.Call(m, "Parse", varargs...) ret0, _ := ret[0].(*template.Content) ret1, _ := ret[1].(error) return ret0, ret1 } // Parse indicates an expected call of Parse. func (mr *MockembedFSMockRecorder) Parse(path, data interface{}, options ...interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() varargs := append([]interface{}{path, data}, options...) return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Parse", reflect.TypeOf((*MockembedFS)(nil).Parse), varargs...) } // ParseBackendService mocks base method. func (m *MockembedFS) ParseBackendService(arg0 template.WorkloadOpts) (*template.Content, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "ParseBackendService", arg0) ret0, _ := ret[0].(*template.Content) ret1, _ := ret[1].(error) return ret0, ret1 } // ParseBackendService indicates an expected call of ParseBackendService. func (mr *MockembedFSMockRecorder) ParseBackendService(arg0 interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ParseBackendService", reflect.TypeOf((*MockembedFS)(nil).ParseBackendService), arg0) } // ParseEnv mocks base method. func (m *MockembedFS) ParseEnv(data *template.EnvOpts) (*template.Content, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "ParseEnv", data) ret0, _ := ret[0].(*template.Content) ret1, _ := ret[1].(error) return ret0, ret1 } // ParseEnv indicates an expected call of ParseEnv. func (mr *MockembedFSMockRecorder) ParseEnv(data interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ParseEnv", reflect.TypeOf((*MockembedFS)(nil).ParseEnv), data) } // ParseEnvBootstrap mocks base method. func (m *MockembedFS) ParseEnvBootstrap(data *template.EnvOpts, options ...template.ParseOption) (*template.Content, error) { m.ctrl.T.Helper() varargs := []interface{}{data} for _, a := range options { varargs = append(varargs, a) } ret := m.ctrl.Call(m, "ParseEnvBootstrap", varargs...) ret0, _ := ret[0].(*template.Content) ret1, _ := ret[1].(error) return ret0, ret1 } // ParseEnvBootstrap indicates an expected call of ParseEnvBootstrap. func (mr *MockembedFSMockRecorder) ParseEnvBootstrap(data interface{}, options ...interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() varargs := append([]interface{}{data}, options...) return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ParseEnvBootstrap", reflect.TypeOf((*MockembedFS)(nil).ParseEnvBootstrap), varargs...) } // ParseLoadBalancedWebService mocks base method. func (m *MockembedFS) ParseLoadBalancedWebService(arg0 template.WorkloadOpts) (*template.Content, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "ParseLoadBalancedWebService", arg0) ret0, _ := ret[0].(*template.Content) ret1, _ := ret[1].(error) return ret0, ret1 } // ParseLoadBalancedWebService indicates an expected call of ParseLoadBalancedWebService. func (mr *MockembedFSMockRecorder) ParseLoadBalancedWebService(arg0 interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ParseLoadBalancedWebService", reflect.TypeOf((*MockembedFS)(nil).ParseLoadBalancedWebService), arg0) } // ParseRequestDrivenWebService mocks base method. func (m *MockembedFS) ParseRequestDrivenWebService(arg0 template.WorkloadOpts) (*template.Content, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "ParseRequestDrivenWebService", arg0) ret0, _ := ret[0].(*template.Content) ret1, _ := ret[1].(error) return ret0, ret1 } // ParseRequestDrivenWebService indicates an expected call of ParseRequestDrivenWebService. func (mr *MockembedFSMockRecorder) ParseRequestDrivenWebService(arg0 interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ParseRequestDrivenWebService", reflect.TypeOf((*MockembedFS)(nil).ParseRequestDrivenWebService), arg0) } // ParseScheduledJob mocks base method. func (m *MockembedFS) ParseScheduledJob(arg0 template.WorkloadOpts) (*template.Content, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "ParseScheduledJob", arg0) ret0, _ := ret[0].(*template.Content) ret1, _ := ret[1].(error) return ret0, ret1 } // ParseScheduledJob indicates an expected call of ParseScheduledJob. func (mr *MockembedFSMockRecorder) ParseScheduledJob(arg0 interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ParseScheduledJob", reflect.TypeOf((*MockembedFS)(nil).ParseScheduledJob), arg0) } // ParseStaticSite mocks base method. func (m *MockembedFS) ParseStaticSite(arg0 template.WorkloadOpts) (*template.Content, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "ParseStaticSite", arg0) ret0, _ := ret[0].(*template.Content) ret1, _ := ret[1].(error) return ret0, ret1 } // ParseStaticSite indicates an expected call of ParseStaticSite. func (mr *MockembedFSMockRecorder) ParseStaticSite(arg0 interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ParseStaticSite", reflect.TypeOf((*MockembedFS)(nil).ParseStaticSite), arg0) } // ParseWorkerService mocks base method. func (m *MockembedFS) ParseWorkerService(arg0 template.WorkloadOpts) (*template.Content, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "ParseWorkerService", arg0) ret0, _ := ret[0].(*template.Content) ret1, _ := ret[1].(error) return ret0, ret1 } // ParseWorkerService indicates an expected call of ParseWorkerService. func (mr *MockembedFSMockRecorder) ParseWorkerService(arg0 interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ParseWorkerService", reflect.TypeOf((*MockembedFS)(nil).ParseWorkerService), arg0) } // Read mocks base method. func (m *MockembedFS) Read(path string) (*template.Content, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "Read", path) ret0, _ := ret[0].(*template.Content) ret1, _ := ret[1].(error) return ret0, ret1 } // Read indicates an expected call of Read. func (mr *MockembedFSMockRecorder) Read(path interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Read", reflect.TypeOf((*MockembedFS)(nil).Read), path) }
727
copilot-cli
aws
Go
// Code generated by MockGen. DO NOT EDIT. // Source: ./internal/pkg/deploy/cloudformation/stack/workload.go // Package mocks is a generated GoMock package. package mocks import ( reflect "reflect" cloudformation "github.com/aws/aws-sdk-go/service/cloudformation" gomock "github.com/golang/mock/gomock" ) // MockNestedStackConfigurer is a mock of NestedStackConfigurer interface. type MockNestedStackConfigurer struct { ctrl *gomock.Controller recorder *MockNestedStackConfigurerMockRecorder } // MockNestedStackConfigurerMockRecorder is the mock recorder for MockNestedStackConfigurer. type MockNestedStackConfigurerMockRecorder struct { mock *MockNestedStackConfigurer } // NewMockNestedStackConfigurer creates a new mock instance. func NewMockNestedStackConfigurer(ctrl *gomock.Controller) *MockNestedStackConfigurer { mock := &MockNestedStackConfigurer{ctrl: ctrl} mock.recorder = &MockNestedStackConfigurerMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockNestedStackConfigurer) EXPECT() *MockNestedStackConfigurerMockRecorder { return m.recorder } // Parameters mocks base method. func (m *MockNestedStackConfigurer) Parameters() (string, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "Parameters") ret0, _ := ret[0].(string) ret1, _ := ret[1].(error) return ret0, ret1 } // Parameters indicates an expected call of Parameters. func (mr *MockNestedStackConfigurerMockRecorder) Parameters() *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Parameters", reflect.TypeOf((*MockNestedStackConfigurer)(nil).Parameters)) } // Template mocks base method. func (m *MockNestedStackConfigurer) Template() (string, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "Template") ret0, _ := ret[0].(string) ret1, _ := ret[1].(error) return ret0, ret1 } // Template indicates an expected call of Template. func (mr *MockNestedStackConfigurerMockRecorder) Template() *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Template", reflect.TypeOf((*MockNestedStackConfigurer)(nil).Template)) } // Mocklocation is a mock of location interface. type Mocklocation struct { ctrl *gomock.Controller recorder *MocklocationMockRecorder } // MocklocationMockRecorder is the mock recorder for Mocklocation. type MocklocationMockRecorder struct { mock *Mocklocation } // NewMocklocation creates a new mock instance. func NewMocklocation(ctrl *gomock.Controller) *Mocklocation { mock := &Mocklocation{ctrl: ctrl} mock.recorder = &MocklocationMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *Mocklocation) EXPECT() *MocklocationMockRecorder { return m.recorder } // GetLocation mocks base method. func (m *Mocklocation) GetLocation() string { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "GetLocation") ret0, _ := ret[0].(string) return ret0 } // GetLocation indicates an expected call of GetLocation. func (mr *MocklocationMockRecorder) GetLocation() *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetLocation", reflect.TypeOf((*Mocklocation)(nil).GetLocation)) } // Mockuploadable is a mock of uploadable interface. type Mockuploadable struct { ctrl *gomock.Controller recorder *MockuploadableMockRecorder } // MockuploadableMockRecorder is the mock recorder for Mockuploadable. type MockuploadableMockRecorder struct { mock *Mockuploadable } // NewMockuploadable creates a new mock instance. func NewMockuploadable(ctrl *gomock.Controller) *Mockuploadable { mock := &Mockuploadable{ctrl: ctrl} mock.recorder = &MockuploadableMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *Mockuploadable) EXPECT() *MockuploadableMockRecorder { return m.recorder } // ArtifactPath mocks base method. func (m *Mockuploadable) ArtifactPath() string { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "ArtifactPath") ret0, _ := ret[0].(string) return ret0 } // ArtifactPath indicates an expected call of ArtifactPath. func (mr *MockuploadableMockRecorder) ArtifactPath() *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ArtifactPath", reflect.TypeOf((*Mockuploadable)(nil).ArtifactPath)) } // Name mocks base method. func (m *Mockuploadable) Name() string { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "Name") ret0, _ := ret[0].(string) return ret0 } // Name indicates an expected call of Name. func (mr *MockuploadableMockRecorder) Name() *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Name", reflect.TypeOf((*Mockuploadable)(nil).Name)) } // MocktemplateConfigurer is a mock of templateConfigurer interface. type MocktemplateConfigurer struct { ctrl *gomock.Controller recorder *MocktemplateConfigurerMockRecorder } // MocktemplateConfigurerMockRecorder is the mock recorder for MocktemplateConfigurer. type MocktemplateConfigurerMockRecorder struct { mock *MocktemplateConfigurer } // NewMocktemplateConfigurer creates a new mock instance. func NewMocktemplateConfigurer(ctrl *gomock.Controller) *MocktemplateConfigurer { mock := &MocktemplateConfigurer{ctrl: ctrl} mock.recorder = &MocktemplateConfigurerMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MocktemplateConfigurer) EXPECT() *MocktemplateConfigurerMockRecorder { return m.recorder } // Parameters mocks base method. func (m *MocktemplateConfigurer) Parameters() ([]*cloudformation.Parameter, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "Parameters") ret0, _ := ret[0].([]*cloudformation.Parameter) ret1, _ := ret[1].(error) return ret0, ret1 } // Parameters indicates an expected call of Parameters. func (mr *MocktemplateConfigurerMockRecorder) Parameters() *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Parameters", reflect.TypeOf((*MocktemplateConfigurer)(nil).Parameters)) } // Tags mocks base method. func (m *MocktemplateConfigurer) Tags() []*cloudformation.Tag { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "Tags") ret0, _ := ret[0].([]*cloudformation.Tag) return ret0 } // Tags indicates an expected call of Tags. func (mr *MocktemplateConfigurerMockRecorder) Tags() *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Tags", reflect.TypeOf((*MocktemplateConfigurer)(nil).Tags)) }
206
copilot-cli
aws
Go
// Code generated by MockGen. DO NOT EDIT. // Source: ./internal/pkg/deploy/deploy.go // Package mocks is a generated GoMock package. package mocks import ( reflect "reflect" session "github.com/aws/aws-sdk-go/aws/session" resourcegroups "github.com/aws/copilot-cli/internal/pkg/aws/resourcegroups" config "github.com/aws/copilot-cli/internal/pkg/config" gomock "github.com/golang/mock/gomock" ) // MockResourceGetter is a mock of ResourceGetter interface. type MockResourceGetter struct { ctrl *gomock.Controller recorder *MockResourceGetterMockRecorder } // MockResourceGetterMockRecorder is the mock recorder for MockResourceGetter. type MockResourceGetterMockRecorder struct { mock *MockResourceGetter } // NewMockResourceGetter creates a new mock instance. func NewMockResourceGetter(ctrl *gomock.Controller) *MockResourceGetter { mock := &MockResourceGetter{ctrl: ctrl} mock.recorder = &MockResourceGetterMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockResourceGetter) EXPECT() *MockResourceGetterMockRecorder { return m.recorder } // GetResourcesByTags mocks base method. func (m *MockResourceGetter) GetResourcesByTags(resourceType string, tags map[string]string) ([]*resourcegroups.Resource, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "GetResourcesByTags", resourceType, tags) ret0, _ := ret[0].([]*resourcegroups.Resource) ret1, _ := ret[1].(error) return ret0, ret1 } // GetResourcesByTags indicates an expected call of GetResourcesByTags. func (mr *MockResourceGetterMockRecorder) GetResourcesByTags(resourceType, tags interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetResourcesByTags", reflect.TypeOf((*MockResourceGetter)(nil).GetResourcesByTags), resourceType, tags) } // MockConfigStoreClient is a mock of ConfigStoreClient interface. type MockConfigStoreClient struct { ctrl *gomock.Controller recorder *MockConfigStoreClientMockRecorder } // MockConfigStoreClientMockRecorder is the mock recorder for MockConfigStoreClient. type MockConfigStoreClientMockRecorder struct { mock *MockConfigStoreClient } // NewMockConfigStoreClient creates a new mock instance. func NewMockConfigStoreClient(ctrl *gomock.Controller) *MockConfigStoreClient { mock := &MockConfigStoreClient{ctrl: ctrl} mock.recorder = &MockConfigStoreClientMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockConfigStoreClient) EXPECT() *MockConfigStoreClientMockRecorder { return m.recorder } // GetEnvironment mocks base method. func (m *MockConfigStoreClient) GetEnvironment(appName, environmentName string) (*config.Environment, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "GetEnvironment", appName, environmentName) ret0, _ := ret[0].(*config.Environment) ret1, _ := ret[1].(error) return ret0, ret1 } // GetEnvironment indicates an expected call of GetEnvironment. func (mr *MockConfigStoreClientMockRecorder) GetEnvironment(appName, environmentName interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetEnvironment", reflect.TypeOf((*MockConfigStoreClient)(nil).GetEnvironment), appName, environmentName) } // GetJob mocks base method. func (m *MockConfigStoreClient) GetJob(appName, jobname string) (*config.Workload, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "GetJob", appName, jobname) ret0, _ := ret[0].(*config.Workload) ret1, _ := ret[1].(error) return ret0, ret1 } // GetJob indicates an expected call of GetJob. func (mr *MockConfigStoreClientMockRecorder) GetJob(appName, jobname interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetJob", reflect.TypeOf((*MockConfigStoreClient)(nil).GetJob), appName, jobname) } // GetService mocks base method. func (m *MockConfigStoreClient) GetService(appName, svcName string) (*config.Workload, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "GetService", appName, svcName) ret0, _ := ret[0].(*config.Workload) ret1, _ := ret[1].(error) return ret0, ret1 } // GetService indicates an expected call of GetService. func (mr *MockConfigStoreClientMockRecorder) GetService(appName, svcName interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetService", reflect.TypeOf((*MockConfigStoreClient)(nil).GetService), appName, svcName) } // ListEnvironments mocks base method. func (m *MockConfigStoreClient) ListEnvironments(appName string) ([]*config.Environment, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "ListEnvironments", appName) ret0, _ := ret[0].([]*config.Environment) ret1, _ := ret[1].(error) return ret0, ret1 } // ListEnvironments indicates an expected call of ListEnvironments. func (mr *MockConfigStoreClientMockRecorder) ListEnvironments(appName interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ListEnvironments", reflect.TypeOf((*MockConfigStoreClient)(nil).ListEnvironments), appName) } // ListWorkloads mocks base method. func (m *MockConfigStoreClient) ListWorkloads(appName string) ([]*config.Workload, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "ListWorkloads", appName) ret0, _ := ret[0].([]*config.Workload) ret1, _ := ret[1].(error) return ret0, ret1 } // ListWorkloads indicates an expected call of ListWorkloads. func (mr *MockConfigStoreClientMockRecorder) ListWorkloads(appName interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ListWorkloads", reflect.TypeOf((*MockConfigStoreClient)(nil).ListWorkloads), appName) } // MockSessionProvider is a mock of SessionProvider interface. type MockSessionProvider struct { ctrl *gomock.Controller recorder *MockSessionProviderMockRecorder } // MockSessionProviderMockRecorder is the mock recorder for MockSessionProvider. type MockSessionProviderMockRecorder struct { mock *MockSessionProvider } // NewMockSessionProvider creates a new mock instance. func NewMockSessionProvider(ctrl *gomock.Controller) *MockSessionProvider { mock := &MockSessionProvider{ctrl: ctrl} mock.recorder = &MockSessionProviderMockRecorder{mock} return mock } // EXPECT returns an object that allows the caller to indicate expected use. func (m *MockSessionProvider) EXPECT() *MockSessionProviderMockRecorder { return m.recorder } // FromRole mocks base method. func (m *MockSessionProvider) FromRole(roleARN, region string) (*session.Session, error) { m.ctrl.T.Helper() ret := m.ctrl.Call(m, "FromRole", roleARN, region) ret0, _ := ret[0].(*session.Session) ret1, _ := ret[1].(error) return ret0, ret1 } // FromRole indicates an expected call of FromRole. func (mr *MockSessionProviderMockRecorder) FromRole(roleARN, region interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "FromRole", reflect.TypeOf((*MockSessionProvider)(nil).FromRole), roleARN, region) }
189
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 // Package asset provides functionality to manage static assets. package asset import ( "bytes" "context" "crypto/sha256" "encoding/hex" "encoding/json" "fmt" "io" "io/fs" "mime" "path" "path/filepath" "sort" "github.com/aws/copilot-cli/internal/pkg/manifest" "github.com/spf13/afero" "golang.org/x/sync/errgroup" ) // ArtifactBucketUploader uploads local asset files. type ArtifactBucketUploader struct { // FS is the file system to use. FS afero.Fs // Upload is the function called when uploading a file. Upload func(path string, contents io.Reader) error // AssetDir is the directory to upload the hashed files to. AssetDir string // AssetMappingFileDir is the directory to upload the asset mapping file to. AssetMappingFileDir string } type asset struct { localPath string content io.Reader ArtifactBucketPath string `json:"path"` ServiceBucketPath string `json:"destPath"` ContentType string `json:"contentType"` } // UploadFiles hashes each of the files specified in files and uploads // them to the path "{AssetDir}/{hash}". After, it uploads a JSON file // to AssetDir that maps the location of every file in the artifact bucket to its // intended destination path in the service bucket. The path to the mapping file // is returned along with an error, if any. func (u *ArtifactBucketUploader) UploadFiles(files []manifest.FileUpload) (string, error) { var assets []asset for _, f := range files { matcher := buildCompositeMatchers(buildReincludeMatchers(f.Reinclude.ToStringSlice()), buildExcludeMatchers(f.Exclude.ToStringSlice())) if err := afero.Walk(u.FS, f.Source, u.walkFn(f.Source, f.Destination, f.Recursive, matcher, &assets)); err != nil { return "", fmt.Errorf("walk the file tree rooted at %q: %s", f.Source, err) } } if err := u.uploadAssets(assets); err != nil { return "", fmt.Errorf("upload assets: %s", err) } path, err := u.uploadAssetMappingFile(assets) if err != nil { return "", fmt.Errorf("upload asset mapping file: %s", err) } return path, nil } func (u *ArtifactBucketUploader) walkFn(sourcePath, destPath string, recursive bool, matcher filepathMatcher, assets *[]asset) filepath.WalkFunc { return func(fpath string, info fs.FileInfo, err error) error { if err != nil { return err } if info.IsDir() { // if path == sourcePath, then path is the directory they want uploaded. // if path != sourcePath, then path is a _subdirectory_ of the directory they want uploaded. if !recursive && fpath != sourcePath { return fs.SkipDir } return nil } ok, err := matcher.match(fpath) if err != nil { return err } if !ok { return nil } hash := sha256.New() buf := &bytes.Buffer{} file, err := u.FS.Open(fpath) if err != nil { return fmt.Errorf("open %q: %w", fpath, err) } defer file.Close() _, err = io.Copy(io.MultiWriter(buf, hash), file) if err != nil { return fmt.Errorf("copy %q: %w", fpath, err) } // rel is "." when sourcePath == path rel, err := filepath.Rel(sourcePath, fpath) if err != nil { return fmt.Errorf("get relative path for %q against %q: %w", fpath, sourcePath, err) } dest := filepath.Join(destPath, rel) if dest == "." { // happens when sourcePath is a file and destPath is unset dest = info.Name() } *assets = append(*assets, asset{ localPath: fpath, content: buf, ArtifactBucketPath: path.Join(u.AssetDir, hex.EncodeToString(hash.Sum(nil))), ServiceBucketPath: filepath.ToSlash(dest), ContentType: mime.TypeByExtension(filepath.Ext(fpath)), }) return nil } } func (u *ArtifactBucketUploader) uploadAssets(assets []asset) error { g, _ := errgroup.WithContext(context.Background()) for i := range assets { asset := assets[i] g.Go(func() error { if err := u.Upload(asset.ArtifactBucketPath, asset.content); err != nil { return fmt.Errorf("upload %q: %w", asset.localPath, err) } return nil }) } return g.Wait() } // uploadAssetMappingFile uploads a JSON file containing the location // of each file in the artifact bucket and the desired location // of the file in the destination bucket. It has the format: // // [{ // "path": "local-assets/12345asdf", // "destPath": "index.html", // "contentType": "text/html" // }] // // The path returned is u.AssetMappingDir/a hash of the mapping file's content. // This makes it so the file path is constant as long as the // content and destination of the uploaded assets do not change. func (u *ArtifactBucketUploader) uploadAssetMappingFile(assets []asset) (string, error) { assets = dedupe(assets) sort.Slice(assets, func(i, j int) bool { if assets[i].ArtifactBucketPath != assets[j].ArtifactBucketPath { return assets[i].ArtifactBucketPath < assets[j].ArtifactBucketPath } return assets[i].ServiceBucketPath < assets[j].ServiceBucketPath }) data, err := json.Marshal(assets) if err != nil { return "", fmt.Errorf("encode uploaded assets: %w", err) } hash := sha256.New() hash.Write(data) // hash.Write is documented to never return an error uploadedPath := path.Join(u.AssetMappingFileDir, hex.EncodeToString(hash.Sum(nil))) if err := u.Upload(uploadedPath, bytes.NewBuffer(data)); err != nil { return "", fmt.Errorf("upload to %q: %w", u.AssetMappingFileDir, err) } return uploadedPath, nil } // dedupe returns a copy of assets with duplicate entries removed. func dedupe(assets []asset) []asset { type key struct{ field1, field2, field3 string } has := make(map[key]bool) out := make([]asset, 0, len(assets)) for i := range assets { key := key{assets[i].ArtifactBucketPath, assets[i].ServiceBucketPath, assets[i].ContentType} if has[key] { continue } has[key] = true out = append(out, assets[i]) } return out }
202
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package asset import ( "bytes" "crypto/sha256" "encoding/hex" "encoding/json" "errors" "fmt" "io" "mime" "path" "sync" "testing" "github.com/aws/copilot-cli/internal/pkg/manifest" "github.com/spf13/afero" "github.com/stretchr/testify/require" ) type fakeS3 struct { mu sync.Mutex data map[string][]byte err error } func (f *fakeS3) Upload(path string, data io.Reader) error { f.mu.Lock() defer f.mu.Unlock() if f.err != nil { return f.err } b, err := io.ReadAll(data) if err != nil { return err } if f.data == nil { f.data = make(map[string][]byte) } f.data[path] = b return nil } func Test_UploadFiles(t *testing.T) { const mockMappingDir, mockPrefix = "mockMappingDir", "mockPrefix" const mockContent1, mockContent2, mockContent3 = "mockContent1", "mockContent2", "mockContent3" hash := func(content string) string { hash := sha256.New() hash.Write([]byte(content)) return hex.EncodeToString(hash.Sum(nil)) } newAsset := func(dstPath string, content string, contentType string) asset { return asset{ ArtifactBucketPath: path.Join(mockPrefix, hash(content)), content: bytes.NewBufferString(content), ServiceBucketPath: dstPath, ContentType: contentType, } } testCases := map[string]struct { files []manifest.FileUpload mockS3Error error mockFileSystem func(fs afero.Fs) expected []asset expectedError error }{ "error if failed to upload": { files: []manifest.FileUpload{ { Source: "test", Recursive: true, }, }, mockFileSystem: func(fs afero.Fs) { afero.WriteFile(fs, "test/copilot/.workspace", []byte(mockContent1), 0644) afero.WriteFile(fs, "copilot/prod/manifest.yaml", []byte(mockContent2), 0644) }, mockS3Error: errors.New("mock error"), expectedError: fmt.Errorf(`upload assets: upload "test/copilot/.workspace": mock error`), }, "success without include and exclude": { // source=directory, dest unset files: []manifest.FileUpload{ { Source: "test", Recursive: true, }, }, mockFileSystem: func(fs afero.Fs) { afero.WriteFile(fs, "test/copilot/.workspace", []byte(mockContent1), 0644) afero.WriteFile(fs, "copilot/prod/manifest.yaml", []byte(mockContent2), 0644) }, expected: []asset{ newAsset("copilot/.workspace", mockContent1, ""), }, }, "success without recursive": { // source=directory, dest unset files: []manifest.FileUpload{ { Source: "test", }, }, mockFileSystem: func(fs afero.Fs) { afero.WriteFile(fs, "test/copilot/.workspace", []byte(mockContent1), 0644) afero.WriteFile(fs, "test/manifest.yaml", []byte(mockContent2), 0644) afero.WriteFile(fs, "test/foo", []byte(mockContent3), 0644) }, expected: []asset{ newAsset("foo", mockContent3, ""), newAsset("manifest.yaml", mockContent2, mime.TypeByExtension(".yaml")), }, }, "success with include only": { // source=directory, dest set files: []manifest.FileUpload{ { Source: "test", Destination: "ws", Recursive: true, Reinclude: manifest.StringSliceOrString{ StringSlice: []string{"copilot/prod/manifest.yaml"}, }, }, }, mockFileSystem: func(fs afero.Fs) { afero.WriteFile(fs, "test/copilot/.workspace", []byte(mockContent1), 0644) afero.WriteFile(fs, "copilot/prod/manifest.yaml", []byte(mockContent2), 0644) }, expected: []asset{ newAsset("ws/copilot/.workspace", mockContent1, ""), }, }, "success with exclude only": { // source=directory, dest unset files: []manifest.FileUpload{ { Recursive: true, Exclude: manifest.StringSliceOrString{ StringSlice: []string{"copilot/prod/*.yaml"}, }, }, }, mockFileSystem: func(fs afero.Fs) { afero.WriteFile(fs, "test/copilot/.workspace", []byte(mockContent1), 0644) afero.WriteFile(fs, "copilot/prod/manifest.yaml", []byte(mockContent2), 0644) }, expected: []asset{ newAsset("test/copilot/.workspace", mockContent1, ""), }, }, "success with both include and exclude": { // source=directory, dest set files: []manifest.FileUpload{ { Destination: "files", Recursive: true, Exclude: manifest.StringSliceOrString{ StringSlice: []string{"copilot/prod/*.yaml"}, }, Reinclude: manifest.StringSliceOrString{ StringSlice: []string{"copilot/prod/manifest.yaml"}, }, }, }, mockFileSystem: func(fs afero.Fs) { afero.WriteFile(fs, "test/copilot/.workspace", []byte(mockContent1), 0644) afero.WriteFile(fs, "copilot/prod/manifest.yaml", []byte(mockContent2), 0644) afero.WriteFile(fs, "copilot/prod/foo.yaml", []byte(mockContent3), 0644) }, expected: []asset{ newAsset("files/copilot/prod/manifest.yaml", mockContent2, mime.TypeByExtension(".yaml")), newAsset("files/test/copilot/.workspace", mockContent1, ""), }, }, "success with file as source": { // source=file, dest unset files: []manifest.FileUpload{ { Source: "test/copilot/.workspace", }, }, mockFileSystem: func(fs afero.Fs) { afero.WriteFile(fs, "test/copilot/.workspace", []byte(mockContent1), 0644) }, expected: []asset{ newAsset(".workspace", mockContent1, ""), }, }, "success with file as source and destination set": { // source=file, dest set files: []manifest.FileUpload{ { Source: "test/copilot/.workspace", Destination: "/is/a/file", }, }, mockFileSystem: func(fs afero.Fs) { afero.WriteFile(fs, "test/copilot/.workspace", []byte(mockContent1), 0644) }, expected: []asset{ newAsset("/is/a/file", mockContent1, ""), }, }, "duplicate file mappings dedupe'd": { files: []manifest.FileUpload{ { Source: "dir/file.json", Destination: "dir/file.json", }, { Source: "dir/file.txt", Destination: "dir/file.txt", }, { Source: "dir", Destination: "dir", }, }, mockFileSystem: func(fs afero.Fs) { afero.WriteFile(fs, "dir/file.json", []byte(mockContent1), 0644) afero.WriteFile(fs, "dir/file.txt", []byte(mockContent1), 0644) }, expected: []asset{ newAsset("dir/file.json", mockContent1, mime.TypeByExtension(".json")), newAsset("dir/file.txt", mockContent1, mime.TypeByExtension(".txt")), }, }, "duplicate content to separate destinations sorted": { files: []manifest.FileUpload{ { Source: "dir/file.txt", Destination: "dir/file.txt", }, { Source: "dir", }, }, mockFileSystem: func(fs afero.Fs) { afero.WriteFile(fs, "dir/file.txt", []byte(mockContent1), 0644) }, expected: []asset{ // dir/file.txt sorts before file.txt newAsset("dir/file.txt", mockContent1, mime.TypeByExtension(".txt")), newAsset("file.txt", mockContent1, mime.TypeByExtension(".txt")), }, }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { // build the expected s3 bucket expected := make(map[string][]byte) for _, asset := range tc.expected { expected[asset.ArtifactBucketPath] = asset.content.(*bytes.Buffer).Bytes() } // add in the mapping file b, err := json.Marshal(tc.expected) require.NoError(t, err) hash := sha256.New() hash.Write(b) expectedMappingFilePath := path.Join(mockMappingDir, hex.EncodeToString(hash.Sum(nil))) expected[expectedMappingFilePath] = b // Create an empty FileSystem fs := afero.NewMemMapFs() // Set it up tc.mockFileSystem(fs) mockS3 := &fakeS3{ err: tc.mockS3Error, } u := ArtifactBucketUploader{ FS: fs, Upload: mockS3.Upload, AssetDir: mockPrefix, AssetMappingFileDir: mockMappingDir, } mappingFilePath, err := u.UploadFiles(tc.files) if tc.expectedError != nil { require.Error(t, err) require.Equal(t, tc.expectedError.Error(), err.Error()) return } require.NoError(t, err) require.Equal(t, expectedMappingFilePath, mappingFilePath) require.Equal(t, expected, mockS3.data) }) } }
305
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package asset import ( "fmt" "path/filepath" ) type filepathMatcher interface { match(path string) (bool, error) } type reincludeMatcher string func buildReincludeMatchers(reincludes []string) []filepathMatcher { var matchers []filepathMatcher for _, reinclude := range reincludes { matchers = append(matchers, reincludeMatcher(reinclude)) } return matchers } func (m reincludeMatcher) match(path string) (bool, error) { return match(string(m), path) } type excludeMatcher string func buildExcludeMatchers(excludes []string) []filepathMatcher { var matchers []filepathMatcher for _, exclude := range excludes { matchers = append(matchers, excludeMatcher(exclude)) } return matchers } func (m excludeMatcher) match(path string) (bool, error) { return match(string(m), path) } // compositeMatcher is a composite matcher consisting of reinclude matchers and exclude matchers. // Note that exclude matchers will be applied before reinclude matchers. type compositeMatcher struct { reincludeMatchers []filepathMatcher excludeMatchers []filepathMatcher } func buildCompositeMatchers(reincludeMatchers, excludeMatchers []filepathMatcher) compositeMatcher { return compositeMatcher{ reincludeMatchers: reincludeMatchers, excludeMatchers: excludeMatchers, } } func (m compositeMatcher) match(path string) (bool, error) { shouldInclude := true for _, matcher := range m.excludeMatchers { isMatch, err := matcher.match(path) if err != nil { return false, err } if isMatch { shouldInclude = false } } for _, matcher := range m.reincludeMatchers { isMatch, err := matcher.match(path) if err != nil { return false, err } if isMatch { shouldInclude = true } } return shouldInclude, nil } func match(pattern, path string) (bool, error) { isMatch, err := filepath.Match(pattern, path) if err != nil { return false, fmt.Errorf("match file path %s against pattern %s: %w", path, pattern, err) } return isMatch, nil }
87
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 // Package customresource provides functionality to upload Copilot custom resources. package customresource import ( "archive/zip" "bytes" "fmt" "io" "path" "strings" "github.com/aws/copilot-cli/internal/pkg/template/artifactpath" "github.com/aws/copilot-cli/internal/pkg/template" ) // Directory under which all custom resources are minified and packaged. const customResourcesDir = "custom-resources" // All custom resource scripts will be copied under this path in the zip file. const handlerFileName = "index.js" // Function names. const ( envControllerFnName = "EnvControllerFunction" dynamicDesiredCountFnName = "DynamicDesiredCountFunction" backlogPerTaskFnName = "BacklogPerTaskCalculatorFunction" rulePriorityFnName = "RulePriorityFunction" nlbCustomDomainFnName = "NLBCustomDomainFunction" nlbCertValidatorFnName = "NLBCertValidatorFunction" customDomainFnName = "CustomDomainFunction" certValidationFnName = "CertificateValidationFunction" dnsDelegationFnName = "DNSDelegationFunction" certReplicatorFnName = "CertificateReplicatorFunction" uniqueJsonValuesFnName = "UniqueJSONValuesFunction" triggerStateMachineFnName = "TriggerStateMachineFunction" ) // Function source file locations. var ( albRulePriorityGeneratorFilePath = path.Join(customResourcesDir, "alb-rule-priority-generator.js") backlogPerTaskCalculatorFilePath = path.Join(customResourcesDir, "backlog-per-task-calculator.js") customDomainFilePath = path.Join(customResourcesDir, "custom-domain.js") customDomainAppRunnerFilePath = path.Join(customResourcesDir, "custom-domain-app-runner.js") desiredCountDelegationFilePath = path.Join(customResourcesDir, "desired-count-delegation.js") dnsCertValidationFilePath = path.Join(customResourcesDir, "dns-cert-validator.js") certReplicatorFilePath = path.Join(customResourcesDir, "cert-replicator.js") dnsDelegationFilePath = path.Join(customResourcesDir, "dns-delegation.js") envControllerFilePath = path.Join(customResourcesDir, "env-controller.js") wkldCertValidatorFilePath = path.Join(customResourcesDir, "wkld-cert-validator.js") wkldCustomDomainFilePath = path.Join(customResourcesDir, "wkld-custom-domain.js") uniqueJSONValuesFilePath = path.Join(customResourcesDir, "unique-json-values.js") triggerStateMachineFilePath = path.Join(customResourcesDir, "trigger-state-machine.js") ) // CustomResource represents a CloudFormation custom resource backed by a Lambda function. type CustomResource struct { name string files []file // Post-initialization cached fields. zip *bytes.Buffer } // Name returns the name of the custom resource. func (cr *CustomResource) Name() string { return cr.name } // ArtifactPath returns the S3 object key where the custom resource should be stored. func (cr *CustomResource) ArtifactPath() string { return artifactpath.CustomResource(strings.ToLower(cr.Name()), cr.zip.Bytes()) } // zipReader returns a reader for the zip archive from all the files in the custom resource. func (cr *CustomResource) zipReader() io.Reader { return bytes.NewBuffer(cr.zip.Bytes()) } func (cr *CustomResource) init() error { buf := new(bytes.Buffer) w := zip.NewWriter(buf) for _, file := range cr.files { f, err := w.Create(file.name) if err != nil { return fmt.Errorf("create zip file %q for custom resource %q: %v", file.name, cr.Name(), err) } _, err = f.Write(file.content) if err != nil { return fmt.Errorf("write zip file %q for custom resource %q: %v", file.name, cr.Name(), err) } } if err := w.Close(); err != nil { return fmt.Errorf("close zip file for custom resource %q: %v", cr.Name(), err) } cr.zip = buf return nil } type file struct { name string content []byte } // RDWS returns the custom resources for a request-driven web service. func RDWS(fs template.Reader) ([]*CustomResource, error) { return buildCustomResources(fs, map[string]string{ envControllerFnName: envControllerFilePath, customDomainFnName: customDomainAppRunnerFilePath, }) } // LBWS returns the custom resources for a load-balanced web service. func LBWS(fs template.Reader) ([]*CustomResource, error) { return buildCustomResources(fs, map[string]string{ dynamicDesiredCountFnName: desiredCountDelegationFilePath, envControllerFnName: envControllerFilePath, rulePriorityFnName: albRulePriorityGeneratorFilePath, nlbCustomDomainFnName: wkldCustomDomainFilePath, nlbCertValidatorFnName: wkldCertValidatorFilePath, }) } // Worker returns the custom resources for a worker service. func Worker(fs template.Reader) ([]*CustomResource, error) { return buildCustomResources(fs, map[string]string{ dynamicDesiredCountFnName: desiredCountDelegationFilePath, backlogPerTaskFnName: backlogPerTaskCalculatorFilePath, envControllerFnName: envControllerFilePath, }) } // Backend returns the custom resources for a backend service. func Backend(fs template.Reader) ([]*CustomResource, error) { return buildCustomResources(fs, map[string]string{ dynamicDesiredCountFnName: desiredCountDelegationFilePath, rulePriorityFnName: albRulePriorityGeneratorFilePath, envControllerFnName: envControllerFilePath, }) } // StaticSite returns the custom resources for a static site service. func StaticSite(fs template.Reader) ([]*CustomResource, error) { return buildCustomResources(fs, map[string]string{ triggerStateMachineFnName: triggerStateMachineFilePath, certValidationFnName: wkldCertValidatorFilePath, customDomainFnName: wkldCustomDomainFilePath, }) } // ScheduledJob returns the custom resources for a scheduled job. func ScheduledJob(fs template.Reader) ([]*CustomResource, error) { return buildCustomResources(fs, map[string]string{ envControllerFnName: envControllerFilePath, }) } // Env returns the custom resources for an environment. func Env(fs template.Reader) ([]*CustomResource, error) { return buildCustomResources(fs, map[string]string{ certValidationFnName: dnsCertValidationFilePath, customDomainFnName: customDomainFilePath, dnsDelegationFnName: dnsDelegationFilePath, certReplicatorFnName: certReplicatorFilePath, uniqueJsonValuesFnName: uniqueJSONValuesFilePath, }) } // UploadFunc is the function signature to upload contents under a key within a S3 bucket. type UploadFunc func(key string, contents io.Reader) (url string, err error) // Upload zips all the Files for each CustomResource and uploads the zip files individually to S3. // Returns a map of the CustomResource FunctionName to the S3 URL where the zip file is stored. func Upload(upload UploadFunc, crs []*CustomResource) (map[string]string, error) { urls := make(map[string]string) for _, cr := range crs { url, err := upload(cr.ArtifactPath(), cr.zipReader()) if err != nil { return nil, fmt.Errorf("upload custom resource %q: %w", cr.Name(), err) } urls[cr.Name()] = url } return urls, nil } func buildCustomResources(fs template.Reader, pathForFn map[string]string) ([]*CustomResource, error) { var idx int crs := make([]*CustomResource, len(pathForFn)) for fn, path := range pathForFn { content, err := fs.Read(path) if err != nil { return nil, fmt.Errorf("read custom resource %s at path %s: %v", fn, path, err) } crs[idx] = &CustomResource{ name: fn, files: []file{ { name: handlerFileName, content: content.Bytes(), }, }, } if err := crs[idx].init(); err != nil { return nil, err } idx += 1 } return crs, nil }
213
copilot-cli
aws
Go
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 package customresource import ( "archive/zip" "bytes" "errors" "fmt" "io" "testing" "github.com/stretchr/testify/require" "github.com/aws/copilot-cli/internal/pkg/template" ) type fakeTemplateReader struct { files map[string]*template.Content matchCount int } func (fr *fakeTemplateReader) Read(path string) (*template.Content, error) { content, ok := fr.files[path] if !ok { return nil, fmt.Errorf("unexpected read %s", path) } fr.matchCount += 1 return content, nil } func TestRDWS(t *testing.T) { // GIVEN fakeFS := &fakeTemplateReader{ files: map[string]*template.Content{ "custom-resources/custom-domain-app-runner.js": { Buffer: bytes.NewBufferString("custom domain app runner"), }, "custom-resources/env-controller.js": { Buffer: bytes.NewBufferString("env controller"), }, }, } fakePaths := map[string]string{ "CustomDomainFunction": "manual/scripts/custom-resources/customdomainfunction/2611784f21e91e499306dac066aae5fd8f2ba664b38073bdd3198d2e041c076e.zip", "EnvControllerFunction": "manual/scripts/custom-resources/envcontrollerfunction/72297cacaeab3a267e371c17ea3f0235905b0da51410eb31c10f7c66ba944044.zip", } // WHEN crs, err := RDWS(fakeFS) // THEN require.NoError(t, err) require.Equal(t, fakeFS.matchCount, 2, "expected path calls do not match") // ensure custom resource names match. actualFnNames := make([]string, len(crs)) for i, cr := range crs { actualFnNames[i] = cr.Name() } require.ElementsMatch(t, []string{"CustomDomainFunction", "EnvControllerFunction"}, actualFnNames, "function names must match") // ensure the zip files contain an index.js file. for _, cr := range crs { buf := new(bytes.Buffer) size, err := buf.ReadFrom(cr.zipReader()) require.NoError(t, err) r, err := zip.NewReader(bytes.NewReader(buf.Bytes()), size) require.NoError(t, err) _, err = r.Open("index.js") require.NoError(t, err, "an index.js file must be present in all custom resources") } // ensure artifact paths match. for _, cr := range crs { require.Equal(t, fakePaths[cr.Name()], cr.ArtifactPath()) } } func TestLBWS(t *testing.T) { // GIVEN fakeFS := &fakeTemplateReader{ files: map[string]*template.Content{ "custom-resources/desired-count-delegation.js": { Buffer: bytes.NewBufferString("custom domain app runner"), }, "custom-resources/env-controller.js": { Buffer: bytes.NewBufferString("env controller"), }, "custom-resources/alb-rule-priority-generator.js": { Buffer: bytes.NewBufferString("rule priority"), }, "custom-resources/wkld-custom-domain.js": { Buffer: bytes.NewBufferString("service-level custom domain"), }, "custom-resources/wkld-cert-validator.js": { Buffer: bytes.NewBufferString("service-level cert"), }, }, } fakePaths := map[string]string{ "DynamicDesiredCountFunction": "manual/scripts/custom-resources/dynamicdesiredcountfunction/2611784f21e91e499306dac066aae5fd8f2ba664b38073bdd3198d2e041c076e.zip", "EnvControllerFunction": "manual/scripts/custom-resources/envcontrollerfunction/72297cacaeab3a267e371c17ea3f0235905b0da51410eb31c10f7c66ba944044.zip", "RulePriorityFunction": "manual/scripts/custom-resources/rulepriorityfunction/1385d258950a50faf4b5cd7deeecbc4bcc79a0d41d631e3977cffa0332e6f0c6.zip", "NLBCustomDomainFunction": "manual/scripts/custom-resources/nlbcustomdomainfunction/ac1c96e7f0823f3167b4e74c8b286ffe8f9d43279dc232d9478837327e57905e.zip", "NLBCertValidatorFunction": "manual/scripts/custom-resources/nlbcertvalidatorfunction/41aeafc64f18f82c452432a214ae83d8c8de4aba2d5df6a752b7e9a2c86833f1.zip", } // WHEN crs, err := LBWS(fakeFS) // THEN require.NoError(t, err) require.Equal(t, fakeFS.matchCount, 5, "expected path calls do not match") actualFnNames := make([]string, len(crs)) for i, cr := range crs { actualFnNames[i] = cr.Name() } require.ElementsMatch(t, []string{"DynamicDesiredCountFunction", "EnvControllerFunction", "RulePriorityFunction", "NLBCustomDomainFunction", "NLBCertValidatorFunction"}, actualFnNames, "function names must match") // ensure the zip files contain an index.js file. for _, cr := range crs { buf := new(bytes.Buffer) size, err := buf.ReadFrom(cr.zipReader()) require.NoError(t, err) r, err := zip.NewReader(bytes.NewReader(buf.Bytes()), size) require.NoError(t, err) _, err = r.Open("index.js") require.NoError(t, err, "an index.js file must be present in all custom resources") } // ensure artifact paths match. for _, cr := range crs { require.Equal(t, fakePaths[cr.Name()], cr.ArtifactPath()) } } func TestWorker(t *testing.T) { // GIVEN fakeFS := &fakeTemplateReader{ files: map[string]*template.Content{ "custom-resources/desired-count-delegation.js": { Buffer: bytes.NewBufferString("custom domain app runner"), }, "custom-resources/backlog-per-task-calculator.js": { Buffer: bytes.NewBufferString("backlog calc"), }, "custom-resources/env-controller.js": { Buffer: bytes.NewBufferString("env controller"), }, }, } fakePaths := map[string]string{ "DynamicDesiredCountFunction": "manual/scripts/custom-resources/dynamicdesiredcountfunction/2611784f21e91e499306dac066aae5fd8f2ba664b38073bdd3198d2e041c076e.zip", "BacklogPerTaskCalculatorFunction": "manual/scripts/custom-resources/backlogpertaskcalculatorfunction/bc925d682cb47de9c65ed9cc5438ee51d9e2b9b39ca6b57bb9adda81b0091b30.zip", "EnvControllerFunction": "manual/scripts/custom-resources/envcontrollerfunction/72297cacaeab3a267e371c17ea3f0235905b0da51410eb31c10f7c66ba944044.zip", } // WHEN crs, err := Worker(fakeFS) // THEN require.NoError(t, err) require.Equal(t, fakeFS.matchCount, 3, "expected path calls do not match") actualFnNames := make([]string, len(crs)) for i, cr := range crs { actualFnNames[i] = cr.Name() } require.ElementsMatch(t, []string{"DynamicDesiredCountFunction", "BacklogPerTaskCalculatorFunction", "EnvControllerFunction"}, actualFnNames, "function names must match") // ensure the zip files contain an index.js file. for _, cr := range crs { buf := new(bytes.Buffer) size, err := buf.ReadFrom(cr.zipReader()) require.NoError(t, err) r, err := zip.NewReader(bytes.NewReader(buf.Bytes()), size) require.NoError(t, err) _, err = r.Open("index.js") require.NoError(t, err, "an index.js file must be present in all custom resources") } // ensure artifact paths match. for _, cr := range crs { require.Equal(t, fakePaths[cr.Name()], cr.ArtifactPath()) } } func TestBackend(t *testing.T) { // GIVEN fakeFS := &fakeTemplateReader{ files: map[string]*template.Content{ "custom-resources/desired-count-delegation.js": { Buffer: bytes.NewBufferString("custom domain app runner"), }, "custom-resources/alb-rule-priority-generator.js": { Buffer: bytes.NewBufferString("rule priority"), }, "custom-resources/env-controller.js": { Buffer: bytes.NewBufferString("env controller"), }, }, } fakePaths := map[string]string{ "DynamicDesiredCountFunction": "manual/scripts/custom-resources/dynamicdesiredcountfunction/2611784f21e91e499306dac066aae5fd8f2ba664b38073bdd3198d2e041c076e.zip", "EnvControllerFunction": "manual/scripts/custom-resources/envcontrollerfunction/72297cacaeab3a267e371c17ea3f0235905b0da51410eb31c10f7c66ba944044.zip", "RulePriorityFunction": "manual/scripts/custom-resources/rulepriorityfunction/1385d258950a50faf4b5cd7deeecbc4bcc79a0d41d631e3977cffa0332e6f0c6.zip", } // WHEN crs, err := Backend(fakeFS) // THEN require.NoError(t, err) require.Equal(t, fakeFS.matchCount, 3, "expected path calls do not match") actualFnNames := make([]string, len(crs)) for i, cr := range crs { actualFnNames[i] = cr.Name() } require.ElementsMatch(t, []string{"DynamicDesiredCountFunction", "RulePriorityFunction", "EnvControllerFunction"}, actualFnNames, "function names must match") // ensure the zip files contain an index.js file. for _, cr := range crs { buf := new(bytes.Buffer) size, err := buf.ReadFrom(cr.zipReader()) require.NoError(t, err) r, err := zip.NewReader(bytes.NewReader(buf.Bytes()), size) require.NoError(t, err) _, err = r.Open("index.js") require.NoError(t, err, "an index.js file must be present in all custom resources") } // ensure artifact paths match. for _, cr := range crs { require.Equal(t, fakePaths[cr.Name()], cr.ArtifactPath()) } } func TestStaticSite(t *testing.T) { // GIVEN fakeFS := &fakeTemplateReader{ files: map[string]*template.Content{ "custom-resources/trigger-state-machine.js": { Buffer: bytes.NewBufferString("trigger state machine"), }, "custom-resources/wkld-custom-domain.js": { Buffer: bytes.NewBufferString("service-level custom domain"), }, "custom-resources/wkld-cert-validator.js": { Buffer: bytes.NewBufferString("service-level cert"), }, }, } fakePaths := map[string]string{ "TriggerStateMachineFunction": "manual/scripts/custom-resources/triggerstatemachinefunction/edfa40b595a5a4a6d24bfb7ad6e173560a29b7d720651ccc9c87eda76b93c7dd.zip", "CustomDomainFunction": "manual/scripts/custom-resources/customdomainfunction/ac1c96e7f0823f3167b4e74c8b286ffe8f9d43279dc232d9478837327e57905e.zip", "CertificateValidationFunction": "manual/scripts/custom-resources/certificatevalidationfunction/41aeafc64f18f82c452432a214ae83d8c8de4aba2d5df6a752b7e9a2c86833f1.zip", } // WHEN crs, err := StaticSite(fakeFS) // THEN require.NoError(t, err) require.Equal(t, fakeFS.matchCount, 3, "expected path calls do not match") actualFnNames := make([]string, len(crs)) for i, cr := range crs { actualFnNames[i] = cr.Name() } require.ElementsMatch(t, []string{"TriggerStateMachineFunction", "CustomDomainFunction", "CertificateValidationFunction"}, actualFnNames, "function names must match") // ensure the zip files contain an index.js file. for _, cr := range crs { buf := new(bytes.Buffer) size, err := buf.ReadFrom(cr.zipReader()) require.NoError(t, err) r, err := zip.NewReader(bytes.NewReader(buf.Bytes()), size) require.NoError(t, err) _, err = r.Open("index.js") require.NoError(t, err, "an index.js file must be present in all custom resources") } // ensure artifact paths match. for _, cr := range crs { require.Equal(t, fakePaths[cr.Name()], cr.ArtifactPath()) } } func TestScheduledJob(t *testing.T) { // GIVEN fakeFS := &fakeTemplateReader{ files: map[string]*template.Content{ "custom-resources/env-controller.js": { Buffer: bytes.NewBufferString("env controller"), }, }, } fakePaths := map[string]string{ "EnvControllerFunction": "manual/scripts/custom-resources/envcontrollerfunction/72297cacaeab3a267e371c17ea3f0235905b0da51410eb31c10f7c66ba944044.zip", } // WHEN crs, err := ScheduledJob(fakeFS) // THEN require.NoError(t, err) require.Equal(t, fakeFS.matchCount, 1, "expected path calls do not match") actualFnNames := make([]string, len(crs)) for i, cr := range crs { actualFnNames[i] = cr.Name() } require.ElementsMatch(t, []string{"EnvControllerFunction"}, actualFnNames, "function names must match") // ensure the zip files contain an index.js file. for _, cr := range crs { buf := new(bytes.Buffer) size, err := buf.ReadFrom(cr.zipReader()) require.NoError(t, err) r, err := zip.NewReader(bytes.NewReader(buf.Bytes()), size) require.NoError(t, err) _, err = r.Open("index.js") require.NoError(t, err, "an index.js file must be present in all custom resources") } // ensure artifact paths match. for _, cr := range crs { require.Equal(t, fakePaths[cr.Name()], cr.ArtifactPath()) } } func TestEnv(t *testing.T) { // GIVEN fakeFS := &fakeTemplateReader{ files: map[string]*template.Content{ "custom-resources/dns-cert-validator.js": { Buffer: bytes.NewBufferString("cert validator"), }, "custom-resources/custom-domain.js": { Buffer: bytes.NewBufferString("custom domain"), }, "custom-resources/dns-delegation.js": { Buffer: bytes.NewBufferString("dns delegation"), }, "custom-resources/cert-replicator.js": { Buffer: bytes.NewBufferString("cert replication"), }, "custom-resources/unique-json-values.js": { Buffer: bytes.NewBufferString("unique json values"), }, }, } fakePaths := map[string]string{ "CertificateValidationFunction": "manual/scripts/custom-resources/certificatevalidationfunction/ef49fd0cefe5525c1b98ab66614bfaebdf57dfa513a7de0d0677fc024b2f0a2b.zip", "CustomDomainFunction": "manual/scripts/custom-resources/customdomainfunction/01baf83827dca2ff7df3cdf24f6ad354b3fa4f9b7cda39b5bf91de378f81c791.zip", "DNSDelegationFunction": "manual/scripts/custom-resources/dnsdelegationfunction/17ec5f580cdb9c1d7c6b5b91decee031592547629a6bfed7cd33b9229f61ab19.zip", "CertificateReplicatorFunction": "manual/scripts/custom-resources/certificatereplicatorfunction/647f83437e4736ddf2915784e13d023a7d342d162ffb42a9eec3d7c842072030.zip", "UniqueJSONValuesFunction": "manual/scripts/custom-resources/uniquejsonvaluesfunction/68c7ace14491d82ac4bb5ad81b3371743d669a26638f419265c18e9bdfca8dd1.zip", } // WHEN crs, err := Env(fakeFS) // THEN require.NoError(t, err) require.Equal(t, fakeFS.matchCount, 5, "expected path calls do not match") actualFnNames := make([]string, len(crs)) for i, cr := range crs { actualFnNames[i] = cr.Name() } require.ElementsMatch(t, []string{"CertificateValidationFunction", "CustomDomainFunction", "DNSDelegationFunction", "CertificateReplicatorFunction", "UniqueJSONValuesFunction"}, actualFnNames, "function names must match") // ensure the zip files contain an index.js file. for _, cr := range crs { buf := new(bytes.Buffer) size, err := buf.ReadFrom(cr.zipReader()) require.NoError(t, err) r, err := zip.NewReader(bytes.NewReader(buf.Bytes()), size) require.NoError(t, err) _, err = r.Open("index.js") require.NoError(t, err, "an index.js file must be present in all custom resources") } // ensure artifact paths match. for _, cr := range crs { require.Equal(t, fakePaths[cr.Name()], cr.ArtifactPath()) } } type fakeS3 struct { objects map[string]string err error } func (f *fakeS3) UploadFunc() func(string, io.Reader) (string, error) { return func(key string, dat io.Reader) (url string, err error) { if f.err != nil { return "", f.err } url, ok := f.objects[key] if !ok { return "", fmt.Errorf("key %q does not exist in fakeS3", key) } return url, nil } } func TestUpload(t *testing.T) { testCases := map[string]struct { s3 *fakeS3 crs []*CustomResource wantedURLs map[string]string wantedErr error }{ "should return a wrapped error if a custom resource cannot be uploaded": { s3: &fakeS3{ err: errors.New("some err"), }, crs: []*CustomResource{ { name: "fn1", zip: bytes.NewBufferString("hello"), }, }, wantedErr: errors.New(`upload custom resource "fn1": some err`), }, "should zip and upload all custom resources": { s3: &fakeS3{ objects: map[string]string{ "manual/scripts/custom-resources/func1/e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855.zip": "url1", "manual/scripts/custom-resources/func2/e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855.zip": "url2", }, }, crs: []*CustomResource{ { name: "Func1", zip: new(bytes.Buffer), }, { name: "Func2", zip: new(bytes.Buffer), }, }, wantedURLs: map[string]string{ "Func1": "url1", "Func2": "url2", }, }, } for name, tc := range testCases { t.Run(name, func(t *testing.T) { urls, err := Upload(tc.s3.UploadFunc(), tc.crs) if tc.wantedErr != nil { require.EqualError(t, err, tc.wantedErr.Error(), "errors do not match") } else { require.NoError(t, err) require.Equal(t, tc.wantedURLs, urls) } }) } }
490