cpflow 4.0.1 → 4.1.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (55) hide show
  1. checksums.yaml +4 -4
  2. data/.gitignore +4 -0
  3. data/CHANGELOG.md +15 -2
  4. data/COMM-LICENSE.txt +9 -0
  5. data/Gemfile.lock +1 -1
  6. data/LICENSE +6 -19
  7. data/README.md +23 -20
  8. data/docs/commands.md +19 -3
  9. data/docs/postgres.md +2 -2
  10. data/docs/terraform/details.md +415 -0
  11. data/docs/terraform/example/.controlplane/controlplane.yml +29 -0
  12. data/docs/terraform/example/.controlplane/templates/app.yml +38 -0
  13. data/docs/terraform/example/.controlplane/templates/postgres.yml +30 -0
  14. data/docs/terraform/example/.controlplane/templates/rails.yml +26 -0
  15. data/docs/terraform/overview.md +105 -0
  16. data/lib/command/base.rb +40 -5
  17. data/lib/command/base_sub_command.rb +15 -0
  18. data/lib/command/build_image.rb +6 -2
  19. data/lib/command/delete.rb +3 -3
  20. data/lib/command/deploy_image.rb +2 -0
  21. data/lib/command/generate.rb +1 -1
  22. data/lib/command/ps.rb +1 -1
  23. data/lib/command/ps_stop.rb +2 -1
  24. data/lib/command/run.rb +1 -1
  25. data/lib/command/setup_app.rb +2 -2
  26. data/lib/command/terraform/base.rb +35 -0
  27. data/lib/command/terraform/generate.rb +99 -0
  28. data/lib/command/terraform/import.rb +79 -0
  29. data/lib/core/controlplane.rb +5 -5
  30. data/lib/core/shell.rb +9 -4
  31. data/lib/core/terraform_config/agent.rb +31 -0
  32. data/lib/core/terraform_config/audit_context.rb +31 -0
  33. data/lib/core/terraform_config/base.rb +25 -0
  34. data/lib/core/terraform_config/dsl.rb +102 -0
  35. data/lib/core/terraform_config/generator.rb +184 -0
  36. data/lib/core/terraform_config/gvc.rb +63 -0
  37. data/lib/core/terraform_config/identity.rb +35 -0
  38. data/lib/core/terraform_config/local_variable.rb +30 -0
  39. data/lib/core/terraform_config/policy.rb +151 -0
  40. data/lib/core/terraform_config/provider.rb +22 -0
  41. data/lib/core/terraform_config/required_provider.rb +23 -0
  42. data/lib/core/terraform_config/secret.rb +138 -0
  43. data/lib/core/terraform_config/volume_set.rb +155 -0
  44. data/lib/core/terraform_config/workload/main.tf +316 -0
  45. data/lib/core/terraform_config/workload/required_providers.tf +8 -0
  46. data/lib/core/terraform_config/workload/variables.tf +263 -0
  47. data/lib/core/terraform_config/workload.rb +132 -0
  48. data/lib/cpflow/version.rb +1 -1
  49. data/lib/cpflow.rb +50 -9
  50. data/lib/generator_templates/templates/postgres.yml +1 -1
  51. data/lib/patches/array.rb +8 -0
  52. data/lib/patches/hash.rb +47 -0
  53. data/lib/patches/string.rb +34 -0
  54. data/script/update_command_docs +7 -3
  55. metadata +34 -3
data/lib/core/shell.rb CHANGED
@@ -5,10 +5,6 @@ class Shell
5
5
  attr_reader :tmp_stderr, :verbose
6
6
  end
7
7
 
8
- def self.shell
9
- @shell ||= Thor::Shell::Color.new
10
- end
11
-
12
8
  def self.use_tmp_stderr
13
9
  @tmp_stderr = Tempfile.create
14
10
 
@@ -35,6 +31,10 @@ class Shell
35
31
  shell.yes?("#{message} (y/N)")
36
32
  end
37
33
 
34
+ def self.info(message)
35
+ shell.say(message)
36
+ end
37
+
38
38
  def self.warn(message)
39
39
  Kernel.warn(color("WARNING: #{message}", :yellow))
40
40
  end
@@ -97,4 +97,9 @@ class Shell
97
97
  exit(ExitCode::INTERRUPT)
98
98
  end
99
99
  end
100
+
101
+ def self.shell
102
+ @shell ||= Thor::Shell::Color.new
103
+ end
104
+ private_class_method :shell
100
105
  end
@@ -0,0 +1,31 @@
1
+ # frozen_string_literal: true
2
+
3
+ module TerraformConfig
4
+ class Agent < Base
5
+ attr_reader :name, :description, :tags
6
+
7
+ def initialize(name:, description: nil, tags: nil)
8
+ super()
9
+
10
+ @name = name
11
+ @description = description
12
+ @tags = tags
13
+ end
14
+
15
+ def importable?
16
+ true
17
+ end
18
+
19
+ def reference
20
+ "cpln_agent.#{name}"
21
+ end
22
+
23
+ def to_tf
24
+ block :resource, :cpln_agent, name do
25
+ argument :name, name
26
+ argument :description, description, optional: true
27
+ argument :tags, tags, optional: true
28
+ end
29
+ end
30
+ end
31
+ end
@@ -0,0 +1,31 @@
1
+ # frozen_string_literal: true
2
+
3
+ module TerraformConfig
4
+ class AuditContext < Base
5
+ attr_reader :name, :description, :tags
6
+
7
+ def initialize(name:, description: nil, tags: nil)
8
+ super()
9
+
10
+ @name = name
11
+ @description = description
12
+ @tags = tags
13
+ end
14
+
15
+ def importable?
16
+ true
17
+ end
18
+
19
+ def reference
20
+ "cpln_audit_context.#{name}"
21
+ end
22
+
23
+ def to_tf
24
+ block :resource, :cpln_audit_context, name do
25
+ argument :name, name
26
+ argument :description, description, optional: true
27
+ argument :tags, tags, optional: true
28
+ end
29
+ end
30
+ end
31
+ end
@@ -0,0 +1,25 @@
1
+ # frozen_string_literal: true
2
+
3
+ require_relative "dsl"
4
+
5
+ module TerraformConfig
6
+ class Base
7
+ include Dsl
8
+
9
+ def importable?
10
+ false
11
+ end
12
+
13
+ def reference
14
+ raise NotImplementedError if importable?
15
+ end
16
+
17
+ def to_tf
18
+ raise NotImplementedError
19
+ end
20
+
21
+ def locals
22
+ {}
23
+ end
24
+ end
25
+ end
@@ -0,0 +1,102 @@
1
+ # frozen_string_literal: true
2
+
3
+ module TerraformConfig
4
+ module Dsl
5
+ extend Forwardable
6
+
7
+ EXPRESSION_PATTERN = /(var|local|cpln_\w+)\./.freeze
8
+
9
+ def_delegators :current_context, :put, :output
10
+
11
+ def block(name, *labels)
12
+ switch_context do
13
+ put("#{block_declaration(name, labels)} {\n")
14
+ yield
15
+ put("}\n")
16
+ end
17
+
18
+ # There is extra indent for whole output that needs to be removed
19
+ output.unindent
20
+ end
21
+
22
+ def argument(name, value, optional: false, raw: false)
23
+ return if value.nil? && optional
24
+
25
+ content =
26
+ if value.is_a?(Hash)
27
+ operator = raw ? ": " : " = "
28
+ "{\n#{value.map { |n, v| "#{n}#{operator}#{tf_value(v)}" }.join("\n").indent(2)}\n}\n"
29
+ else
30
+ "#{tf_value(value)}\n"
31
+ end
32
+
33
+ # remove quotes from expression values
34
+ content = content.gsub(/("#{EXPRESSION_PATTERN}.*")/) { ::Regexp.last_match(1)[1...-1] }
35
+
36
+ put("#{name} = #{content}", indent: 2)
37
+ end
38
+
39
+ private
40
+
41
+ def tf_value(value)
42
+ value = value.to_s if value.is_a?(Symbol)
43
+
44
+ case value
45
+ when String
46
+ tf_string_value(value)
47
+ when Hash
48
+ tf_hash_value(value)
49
+ else
50
+ value
51
+ end
52
+ end
53
+
54
+ def tf_string_value(value)
55
+ return value if expression?(value)
56
+ return "\"#{value}\"" unless value.include?("\n")
57
+
58
+ "EOF\n#{value.indent(2)}\nEOF"
59
+ end
60
+
61
+ def tf_hash_value(value)
62
+ JSON.pretty_generate(value.crush)
63
+ .gsub(/"(\w+)":/) { "#{::Regexp.last_match(1)}:" } # remove quotes from keys
64
+ end
65
+
66
+ def expression?(value)
67
+ value.match?(/^#{EXPRESSION_PATTERN}/)
68
+ end
69
+
70
+ def block_declaration(name, labels)
71
+ result = name.to_s
72
+ return result unless labels.any?
73
+
74
+ result + " #{labels.map { |label| tf_value(label) }.join(' ')}"
75
+ end
76
+
77
+ class Context
78
+ attr_accessor :output
79
+
80
+ def initialize
81
+ @output = ""
82
+ end
83
+
84
+ def put(content, indent: 0)
85
+ @output += content.to_s.indent(indent)
86
+ end
87
+ end
88
+
89
+ def switch_context
90
+ old_context = current_context
91
+ @current_context = Context.new
92
+ yield
93
+ ensure
94
+ old_context.put(current_context.output, indent: 2)
95
+ @current_context = old_context
96
+ end
97
+
98
+ def current_context
99
+ @current_context ||= Context.new
100
+ end
101
+ end
102
+ end
@@ -0,0 +1,184 @@
1
+ # frozen_string_literal: true
2
+
3
+ module TerraformConfig
4
+ class Generator # rubocop:disable Metrics/ClassLength
5
+ SUPPORTED_TEMPLATE_KINDS = %w[gvc secret identity policy volumeset workload auditctx agent].freeze
6
+ WORKLOAD_SPEC_KEYS = %i[
7
+ type
8
+ containers
9
+ identity_link
10
+ default_options
11
+ local_options
12
+ rollout_options
13
+ security_options
14
+ load_balancer
15
+ firewall_config
16
+ support_dynamic_tags
17
+ job
18
+ ].freeze
19
+
20
+ class InvalidTemplateError < ArgumentError; end
21
+
22
+ attr_reader :config, :template
23
+
24
+ def initialize(config:, template:)
25
+ @config = config
26
+ @template = template.deep_underscore_keys.deep_symbolize_keys
27
+ validate_template_kind!
28
+ end
29
+
30
+ def tf_configs
31
+ tf_config.locals.merge(filename => tf_config)
32
+ end
33
+
34
+ private
35
+
36
+ def validate_template_kind!
37
+ return if SUPPORTED_TEMPLATE_KINDS.include?(kind)
38
+
39
+ raise InvalidTemplateError, "Unsupported template kind: #{kind}"
40
+ end
41
+
42
+ def filename
43
+ case kind
44
+ when "gvc"
45
+ "gvc.tf"
46
+ when "workload"
47
+ "#{template[:name]}.tf"
48
+ when "auditctx"
49
+ "audit_contexts.tf"
50
+ else
51
+ "#{kind.pluralize}.tf"
52
+ end
53
+ end
54
+
55
+ def tf_config
56
+ @tf_config ||= config_class.new(**config_params)
57
+ end
58
+
59
+ def config_class
60
+ case kind
61
+ when "volumeset"
62
+ TerraformConfig::VolumeSet
63
+ when "auditctx"
64
+ TerraformConfig::AuditContext
65
+ else
66
+ TerraformConfig.const_get(kind.capitalize)
67
+ end
68
+ end
69
+
70
+ def config_params
71
+ send("#{kind}_config_params")
72
+ end
73
+
74
+ def gvc_config_params
75
+ template
76
+ .slice(:name, :description, :tags)
77
+ .merge(
78
+ env: gvc_env,
79
+ pull_secrets: gvc_pull_secrets,
80
+ locations: gvc_locations,
81
+ domain: template.dig(:spec, :domain),
82
+ load_balancer: template.dig(:spec, :load_balancer)
83
+ )
84
+ end
85
+
86
+ def identity_config_params
87
+ template.slice(:name, :description, :tags).merge(gvc: gvc)
88
+ end
89
+
90
+ def secret_config_params
91
+ template.slice(:name, :description, :type, :data, :tags)
92
+ end
93
+
94
+ def policy_config_params
95
+ template
96
+ .slice(:name, :description, :tags, :target, :target_kind, :target_query)
97
+ .merge(gvc: gvc, target_links: policy_target_links, bindings: policy_bindings)
98
+ end
99
+
100
+ def volumeset_config_params
101
+ specs = %i[
102
+ initial_capacity
103
+ performance_class
104
+ file_system_type
105
+ storage_class_suffix
106
+ snapshots
107
+ autoscaling
108
+ ].to_h { |key| [key, template.dig(:spec, key)] }
109
+
110
+ template.slice(:name, :description, :tags).merge(gvc: gvc).merge(specs)
111
+ end
112
+
113
+ def auditctx_config_params
114
+ template.slice(:name, :description, :tags)
115
+ end
116
+
117
+ def agent_config_params
118
+ template.slice(:name, :description, :tags)
119
+ end
120
+
121
+ def workload_config_params
122
+ template
123
+ .slice(:name, :description, :tags)
124
+ .merge(gvc: gvc)
125
+ .merge(workload_spec_params)
126
+ end
127
+
128
+ def workload_spec_params # rubocop:disable Metrics/MethodLength
129
+ WORKLOAD_SPEC_KEYS.to_h do |key|
130
+ arg_name =
131
+ case key
132
+ when :default_options then :options
133
+ when :firewall_config then :firewall_spec
134
+ else key
135
+ end
136
+
137
+ value = template.dig(:spec, key)
138
+
139
+ if value
140
+ case key
141
+ when :local_options
142
+ value[:location] = value.delete(:location).split("/").last
143
+ when :security_options
144
+ value[:file_system_group_id] = value.delete(:filesystem_group_id)
145
+ end
146
+ end
147
+
148
+ [arg_name, value]
149
+ end
150
+ end
151
+
152
+ # GVC name matches application name
153
+ def gvc
154
+ "cpln_gvc.#{config.app}.name"
155
+ end
156
+
157
+ def gvc_pull_secrets
158
+ template.dig(:spec, :pull_secret_links)&.map { |secret_link| "cpln_secret.#{secret_link.split('/').last}.name" }
159
+ end
160
+
161
+ def gvc_env
162
+ template.dig(:spec, :env).to_h { |env_var| [env_var[:name], env_var[:value]] }
163
+ end
164
+
165
+ def gvc_locations
166
+ template.dig(:spec, :static_placement, :location_links)&.map { |location_link| location_link.split("/").last }
167
+ end
168
+
169
+ def policy_target_links
170
+ template[:target_links]&.map { |target_link| target_link.split("/").last }
171
+ end
172
+
173
+ def policy_bindings
174
+ template[:bindings]&.map do |data|
175
+ principal_links = data.delete(:principal_links)&.map { |link| link.delete_prefix("//") }
176
+ data.merge(principal_links: principal_links)
177
+ end
178
+ end
179
+
180
+ def kind
181
+ @kind ||= template[:kind]
182
+ end
183
+ end
184
+ end
@@ -0,0 +1,63 @@
1
+ # frozen_string_literal: true
2
+
3
+ module TerraformConfig
4
+ class Gvc < Base
5
+ attr_reader :name, :description, :tags, :domain, :locations, :pull_secrets, :env, :load_balancer
6
+
7
+ def initialize( # rubocop:disable Metrics/ParameterLists
8
+ name:,
9
+ description: nil,
10
+ tags: nil,
11
+ domain: nil,
12
+ locations: nil,
13
+ pull_secrets: nil,
14
+ env: nil,
15
+ load_balancer: nil
16
+ )
17
+ super()
18
+
19
+ @name = name
20
+ @description = description
21
+ @tags = tags
22
+ @domain = domain
23
+ @locations = locations
24
+ @pull_secrets = pull_secrets
25
+ @env = env
26
+ @load_balancer = load_balancer&.deep_underscore_keys&.deep_symbolize_keys
27
+ end
28
+
29
+ def importable?
30
+ true
31
+ end
32
+
33
+ def reference
34
+ "cpln_gvc.#{name}"
35
+ end
36
+
37
+ def to_tf
38
+ block :resource, :cpln_gvc, name do
39
+ argument :name, name
40
+ argument :description, description, optional: true
41
+ argument :tags, tags, optional: true
42
+
43
+ argument :domain, domain, optional: true
44
+ argument :locations, locations, optional: true
45
+ argument :pull_secrets, pull_secrets, optional: true
46
+ argument :env, env, optional: true
47
+
48
+ load_balancer_tf
49
+ end
50
+ end
51
+
52
+ private
53
+
54
+ def load_balancer_tf
55
+ return if load_balancer.nil?
56
+
57
+ block :load_balancer do
58
+ argument :dedicated, load_balancer.fetch(:dedicated)
59
+ argument :trusted_proxies, load_balancer.fetch(:trusted_proxies, nil), optional: true
60
+ end
61
+ end
62
+ end
63
+ end
@@ -0,0 +1,35 @@
1
+ # frozen_string_literal: true
2
+
3
+ module TerraformConfig
4
+ class Identity < Base
5
+ attr_reader :gvc, :name, :description, :tags
6
+
7
+ def initialize(gvc:, name:, description: nil, tags: nil)
8
+ super()
9
+
10
+ @gvc = gvc
11
+ @name = name
12
+ @description = description
13
+ @tags = tags
14
+ end
15
+
16
+ def importable?
17
+ true
18
+ end
19
+
20
+ def reference
21
+ "cpln_identity.#{name}"
22
+ end
23
+
24
+ def to_tf
25
+ block :resource, :cpln_identity, name do
26
+ argument :gvc, gvc
27
+
28
+ argument :name, name
29
+ argument :description, description, optional: true
30
+
31
+ argument :tags, tags, optional: true
32
+ end
33
+ end
34
+ end
35
+ end
@@ -0,0 +1,30 @@
1
+ # frozen_string_literal: true
2
+
3
+ module TerraformConfig
4
+ class LocalVariable < Base
5
+ VARIABLE_NAME_REGEX = /\A[a-zA-Z][a-zA-Z0-9_]*\z/.freeze
6
+
7
+ attr_reader :variables
8
+
9
+ def initialize(**variables)
10
+ super()
11
+
12
+ @variables = variables
13
+ validate_variables!
14
+ end
15
+
16
+ def to_tf
17
+ block :locals do
18
+ variables.each do |var, value|
19
+ argument var, value
20
+ end
21
+ end
22
+ end
23
+
24
+ private
25
+
26
+ def validate_variables!
27
+ raise ArgumentError, "Variables cannot be empty" if variables.empty?
28
+ end
29
+ end
30
+ end
@@ -0,0 +1,151 @@
1
+ # frozen_string_literal: true
2
+
3
+ module TerraformConfig
4
+ class Policy < Base # rubocop:disable Metrics/ClassLength
5
+ TARGET_KINDS = %w[
6
+ agent auditctx cloudaccount domain group gvc identity image ipset kubernetes location
7
+ org policy quota secret serviceaccount task user volumeset workload
8
+ ].freeze
9
+
10
+ GVC_REQUIRED_TARGET_KINDS = %w[identity workload volumeset].freeze
11
+
12
+ attr_reader :name, :description, :tags, :target_kind, :gvc, :target, :target_links, :target_query, :bindings
13
+
14
+ def initialize( # rubocop:disable Metrics/ParameterLists, Metrics/MethodLength
15
+ name:,
16
+ description: nil,
17
+ tags: nil,
18
+ target_kind: nil,
19
+ gvc: nil,
20
+ target: nil,
21
+ target_links: nil,
22
+ target_query: nil,
23
+ bindings: nil
24
+ )
25
+ super()
26
+
27
+ @name = name
28
+ @description = description
29
+ @tags = tags
30
+
31
+ @target_kind = target_kind
32
+ validate_target_kind!
33
+
34
+ @gvc = gvc
35
+ validate_gvc!
36
+
37
+ @target = target
38
+ @target_links = target_links
39
+
40
+ @target_query = target_query&.deep_underscore_keys&.deep_symbolize_keys
41
+ @bindings = bindings&.map { |data| data.deep_underscore_keys.deep_symbolize_keys }
42
+ end
43
+
44
+ def importable?
45
+ true
46
+ end
47
+
48
+ def reference
49
+ "cpln_policy.#{name}"
50
+ end
51
+
52
+ def to_tf
53
+ block :resource, :cpln_policy, name do
54
+ argument :name, name
55
+
56
+ %i[description tags target_kind gvc target target_links].each do |arg_name|
57
+ argument arg_name, send(arg_name), optional: true
58
+ end
59
+
60
+ bindings_tf
61
+ target_query_tf
62
+ end
63
+ end
64
+
65
+ private
66
+
67
+ def validate_target_kind!
68
+ return if target_kind.nil? || TARGET_KINDS.include?(target_kind.to_s)
69
+
70
+ raise ArgumentError, "Invalid target kind given - #{target_kind}"
71
+ end
72
+
73
+ def validate_gvc!
74
+ return unless GVC_REQUIRED_TARGET_KINDS.include?(target_kind.to_s) && gvc.nil?
75
+
76
+ raise ArgumentError, "`gvc` is required for `#{target_kind}` target kind"
77
+ end
78
+
79
+ def bindings_tf
80
+ return if bindings.nil?
81
+
82
+ bindings.each do |binding_data|
83
+ block :binding do
84
+ argument :permissions, binding_data.fetch(:permissions, nil), optional: true
85
+ argument :principal_links, binding_data.fetch(:principal_links, nil), optional: true
86
+ end
87
+ end
88
+ end
89
+
90
+ def target_query_tf
91
+ return if target_query.nil?
92
+
93
+ fetch_type = target_query.fetch(:fetch, nil)
94
+ validate_fetch_type!(fetch_type) if fetch_type
95
+
96
+ block :target_query do
97
+ argument :fetch, fetch_type, optional: true
98
+ target_query_spec_tf
99
+ end
100
+ end
101
+
102
+ def validate_fetch_type!(fetch_type)
103
+ return if %w[links items].include?(fetch_type.to_s)
104
+
105
+ raise ArgumentError, "Invalid fetch type - #{fetch_type}. Should be either `links` or `items`"
106
+ end
107
+
108
+ def target_query_spec_tf
109
+ spec = target_query.fetch(:spec, nil)
110
+ return if spec.nil?
111
+
112
+ match_type = spec.fetch(:match, nil)
113
+ validate_match_type!(match_type) if match_type
114
+
115
+ block :spec do
116
+ argument :match, match_type, optional: true
117
+
118
+ target_query_spec_terms_tf(spec)
119
+ end
120
+ end
121
+
122
+ def validate_match_type!(match_type)
123
+ return if %w[all any none].include?(match_type.to_s)
124
+
125
+ raise ArgumentError, "Invalid match type - #{match_type}. Should be either `all`, `any` or `none`"
126
+ end
127
+
128
+ def target_query_spec_terms_tf(spec)
129
+ terms = spec.fetch(:terms, nil)
130
+ return if terms.nil?
131
+
132
+ terms.each do |term|
133
+ validate_term!(term)
134
+
135
+ block :terms do
136
+ %i[op property rel tag value].each do |arg_name|
137
+ argument arg_name, term.fetch(arg_name, nil), optional: true
138
+ end
139
+ end
140
+ end
141
+ end
142
+
143
+ def validate_term!(term)
144
+ return if (%i[property rel tag] & term.keys).count == 1
145
+
146
+ raise ArgumentError,
147
+ "Each term in `target_query.spec.terms` must contain exactly one of the following attributes: " \
148
+ "`property`, `rel`, or `tag`."
149
+ end
150
+ end
151
+ end
@@ -0,0 +1,22 @@
1
+ # frozen_string_literal: true
2
+
3
+ module TerraformConfig
4
+ class Provider < Base
5
+ attr_reader :name, :options
6
+
7
+ def initialize(name:, **options)
8
+ super()
9
+
10
+ @name = name
11
+ @options = options
12
+ end
13
+
14
+ def to_tf
15
+ block :provider, name do
16
+ options.each do |option, value|
17
+ argument option, value
18
+ end
19
+ end
20
+ end
21
+ end
22
+ end