cpflow 4.0.1 → 4.1.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/.gitignore +4 -0
- data/CHANGELOG.md +15 -2
- data/COMM-LICENSE.txt +9 -0
- data/Gemfile.lock +1 -1
- data/LICENSE +6 -19
- data/README.md +23 -20
- data/docs/commands.md +19 -3
- data/docs/postgres.md +2 -2
- data/docs/terraform/details.md +415 -0
- data/docs/terraform/example/.controlplane/controlplane.yml +29 -0
- data/docs/terraform/example/.controlplane/templates/app.yml +38 -0
- data/docs/terraform/example/.controlplane/templates/postgres.yml +30 -0
- data/docs/terraform/example/.controlplane/templates/rails.yml +26 -0
- data/docs/terraform/overview.md +105 -0
- data/lib/command/base.rb +40 -5
- data/lib/command/base_sub_command.rb +15 -0
- data/lib/command/build_image.rb +6 -2
- data/lib/command/delete.rb +3 -3
- data/lib/command/deploy_image.rb +2 -0
- data/lib/command/generate.rb +1 -1
- data/lib/command/ps.rb +1 -1
- data/lib/command/ps_stop.rb +2 -1
- data/lib/command/run.rb +1 -1
- data/lib/command/setup_app.rb +2 -2
- data/lib/command/terraform/base.rb +35 -0
- data/lib/command/terraform/generate.rb +99 -0
- data/lib/command/terraform/import.rb +79 -0
- data/lib/core/controlplane.rb +5 -5
- data/lib/core/shell.rb +9 -4
- data/lib/core/terraform_config/agent.rb +31 -0
- data/lib/core/terraform_config/audit_context.rb +31 -0
- data/lib/core/terraform_config/base.rb +25 -0
- data/lib/core/terraform_config/dsl.rb +102 -0
- data/lib/core/terraform_config/generator.rb +184 -0
- data/lib/core/terraform_config/gvc.rb +63 -0
- data/lib/core/terraform_config/identity.rb +35 -0
- data/lib/core/terraform_config/local_variable.rb +30 -0
- data/lib/core/terraform_config/policy.rb +151 -0
- data/lib/core/terraform_config/provider.rb +22 -0
- data/lib/core/terraform_config/required_provider.rb +23 -0
- data/lib/core/terraform_config/secret.rb +138 -0
- data/lib/core/terraform_config/volume_set.rb +155 -0
- data/lib/core/terraform_config/workload/main.tf +316 -0
- data/lib/core/terraform_config/workload/required_providers.tf +8 -0
- data/lib/core/terraform_config/workload/variables.tf +263 -0
- data/lib/core/terraform_config/workload.rb +132 -0
- data/lib/cpflow/version.rb +1 -1
- data/lib/cpflow.rb +50 -9
- data/lib/generator_templates/templates/postgres.yml +1 -1
- data/lib/patches/array.rb +8 -0
- data/lib/patches/hash.rb +47 -0
- data/lib/patches/string.rb +34 -0
- data/script/update_command_docs +7 -3
- metadata +34 -3
data/lib/core/shell.rb
CHANGED
@@ -5,10 +5,6 @@ class Shell
|
|
5
5
|
attr_reader :tmp_stderr, :verbose
|
6
6
|
end
|
7
7
|
|
8
|
-
def self.shell
|
9
|
-
@shell ||= Thor::Shell::Color.new
|
10
|
-
end
|
11
|
-
|
12
8
|
def self.use_tmp_stderr
|
13
9
|
@tmp_stderr = Tempfile.create
|
14
10
|
|
@@ -35,6 +31,10 @@ class Shell
|
|
35
31
|
shell.yes?("#{message} (y/N)")
|
36
32
|
end
|
37
33
|
|
34
|
+
def self.info(message)
|
35
|
+
shell.say(message)
|
36
|
+
end
|
37
|
+
|
38
38
|
def self.warn(message)
|
39
39
|
Kernel.warn(color("WARNING: #{message}", :yellow))
|
40
40
|
end
|
@@ -97,4 +97,9 @@ class Shell
|
|
97
97
|
exit(ExitCode::INTERRUPT)
|
98
98
|
end
|
99
99
|
end
|
100
|
+
|
101
|
+
def self.shell
|
102
|
+
@shell ||= Thor::Shell::Color.new
|
103
|
+
end
|
104
|
+
private_class_method :shell
|
100
105
|
end
|
@@ -0,0 +1,31 @@
|
|
1
|
+
# frozen_string_literal: true
|
2
|
+
|
3
|
+
module TerraformConfig
|
4
|
+
class Agent < Base
|
5
|
+
attr_reader :name, :description, :tags
|
6
|
+
|
7
|
+
def initialize(name:, description: nil, tags: nil)
|
8
|
+
super()
|
9
|
+
|
10
|
+
@name = name
|
11
|
+
@description = description
|
12
|
+
@tags = tags
|
13
|
+
end
|
14
|
+
|
15
|
+
def importable?
|
16
|
+
true
|
17
|
+
end
|
18
|
+
|
19
|
+
def reference
|
20
|
+
"cpln_agent.#{name}"
|
21
|
+
end
|
22
|
+
|
23
|
+
def to_tf
|
24
|
+
block :resource, :cpln_agent, name do
|
25
|
+
argument :name, name
|
26
|
+
argument :description, description, optional: true
|
27
|
+
argument :tags, tags, optional: true
|
28
|
+
end
|
29
|
+
end
|
30
|
+
end
|
31
|
+
end
|
@@ -0,0 +1,31 @@
|
|
1
|
+
# frozen_string_literal: true
|
2
|
+
|
3
|
+
module TerraformConfig
|
4
|
+
class AuditContext < Base
|
5
|
+
attr_reader :name, :description, :tags
|
6
|
+
|
7
|
+
def initialize(name:, description: nil, tags: nil)
|
8
|
+
super()
|
9
|
+
|
10
|
+
@name = name
|
11
|
+
@description = description
|
12
|
+
@tags = tags
|
13
|
+
end
|
14
|
+
|
15
|
+
def importable?
|
16
|
+
true
|
17
|
+
end
|
18
|
+
|
19
|
+
def reference
|
20
|
+
"cpln_audit_context.#{name}"
|
21
|
+
end
|
22
|
+
|
23
|
+
def to_tf
|
24
|
+
block :resource, :cpln_audit_context, name do
|
25
|
+
argument :name, name
|
26
|
+
argument :description, description, optional: true
|
27
|
+
argument :tags, tags, optional: true
|
28
|
+
end
|
29
|
+
end
|
30
|
+
end
|
31
|
+
end
|
@@ -0,0 +1,25 @@
|
|
1
|
+
# frozen_string_literal: true
|
2
|
+
|
3
|
+
require_relative "dsl"
|
4
|
+
|
5
|
+
module TerraformConfig
|
6
|
+
class Base
|
7
|
+
include Dsl
|
8
|
+
|
9
|
+
def importable?
|
10
|
+
false
|
11
|
+
end
|
12
|
+
|
13
|
+
def reference
|
14
|
+
raise NotImplementedError if importable?
|
15
|
+
end
|
16
|
+
|
17
|
+
def to_tf
|
18
|
+
raise NotImplementedError
|
19
|
+
end
|
20
|
+
|
21
|
+
def locals
|
22
|
+
{}
|
23
|
+
end
|
24
|
+
end
|
25
|
+
end
|
@@ -0,0 +1,102 @@
|
|
1
|
+
# frozen_string_literal: true
|
2
|
+
|
3
|
+
module TerraformConfig
|
4
|
+
module Dsl
|
5
|
+
extend Forwardable
|
6
|
+
|
7
|
+
EXPRESSION_PATTERN = /(var|local|cpln_\w+)\./.freeze
|
8
|
+
|
9
|
+
def_delegators :current_context, :put, :output
|
10
|
+
|
11
|
+
def block(name, *labels)
|
12
|
+
switch_context do
|
13
|
+
put("#{block_declaration(name, labels)} {\n")
|
14
|
+
yield
|
15
|
+
put("}\n")
|
16
|
+
end
|
17
|
+
|
18
|
+
# There is extra indent for whole output that needs to be removed
|
19
|
+
output.unindent
|
20
|
+
end
|
21
|
+
|
22
|
+
def argument(name, value, optional: false, raw: false)
|
23
|
+
return if value.nil? && optional
|
24
|
+
|
25
|
+
content =
|
26
|
+
if value.is_a?(Hash)
|
27
|
+
operator = raw ? ": " : " = "
|
28
|
+
"{\n#{value.map { |n, v| "#{n}#{operator}#{tf_value(v)}" }.join("\n").indent(2)}\n}\n"
|
29
|
+
else
|
30
|
+
"#{tf_value(value)}\n"
|
31
|
+
end
|
32
|
+
|
33
|
+
# remove quotes from expression values
|
34
|
+
content = content.gsub(/("#{EXPRESSION_PATTERN}.*")/) { ::Regexp.last_match(1)[1...-1] }
|
35
|
+
|
36
|
+
put("#{name} = #{content}", indent: 2)
|
37
|
+
end
|
38
|
+
|
39
|
+
private
|
40
|
+
|
41
|
+
def tf_value(value)
|
42
|
+
value = value.to_s if value.is_a?(Symbol)
|
43
|
+
|
44
|
+
case value
|
45
|
+
when String
|
46
|
+
tf_string_value(value)
|
47
|
+
when Hash
|
48
|
+
tf_hash_value(value)
|
49
|
+
else
|
50
|
+
value
|
51
|
+
end
|
52
|
+
end
|
53
|
+
|
54
|
+
def tf_string_value(value)
|
55
|
+
return value if expression?(value)
|
56
|
+
return "\"#{value}\"" unless value.include?("\n")
|
57
|
+
|
58
|
+
"EOF\n#{value.indent(2)}\nEOF"
|
59
|
+
end
|
60
|
+
|
61
|
+
def tf_hash_value(value)
|
62
|
+
JSON.pretty_generate(value.crush)
|
63
|
+
.gsub(/"(\w+)":/) { "#{::Regexp.last_match(1)}:" } # remove quotes from keys
|
64
|
+
end
|
65
|
+
|
66
|
+
def expression?(value)
|
67
|
+
value.match?(/^#{EXPRESSION_PATTERN}/)
|
68
|
+
end
|
69
|
+
|
70
|
+
def block_declaration(name, labels)
|
71
|
+
result = name.to_s
|
72
|
+
return result unless labels.any?
|
73
|
+
|
74
|
+
result + " #{labels.map { |label| tf_value(label) }.join(' ')}"
|
75
|
+
end
|
76
|
+
|
77
|
+
class Context
|
78
|
+
attr_accessor :output
|
79
|
+
|
80
|
+
def initialize
|
81
|
+
@output = ""
|
82
|
+
end
|
83
|
+
|
84
|
+
def put(content, indent: 0)
|
85
|
+
@output += content.to_s.indent(indent)
|
86
|
+
end
|
87
|
+
end
|
88
|
+
|
89
|
+
def switch_context
|
90
|
+
old_context = current_context
|
91
|
+
@current_context = Context.new
|
92
|
+
yield
|
93
|
+
ensure
|
94
|
+
old_context.put(current_context.output, indent: 2)
|
95
|
+
@current_context = old_context
|
96
|
+
end
|
97
|
+
|
98
|
+
def current_context
|
99
|
+
@current_context ||= Context.new
|
100
|
+
end
|
101
|
+
end
|
102
|
+
end
|
@@ -0,0 +1,184 @@
|
|
1
|
+
# frozen_string_literal: true
|
2
|
+
|
3
|
+
module TerraformConfig
|
4
|
+
class Generator # rubocop:disable Metrics/ClassLength
|
5
|
+
SUPPORTED_TEMPLATE_KINDS = %w[gvc secret identity policy volumeset workload auditctx agent].freeze
|
6
|
+
WORKLOAD_SPEC_KEYS = %i[
|
7
|
+
type
|
8
|
+
containers
|
9
|
+
identity_link
|
10
|
+
default_options
|
11
|
+
local_options
|
12
|
+
rollout_options
|
13
|
+
security_options
|
14
|
+
load_balancer
|
15
|
+
firewall_config
|
16
|
+
support_dynamic_tags
|
17
|
+
job
|
18
|
+
].freeze
|
19
|
+
|
20
|
+
class InvalidTemplateError < ArgumentError; end
|
21
|
+
|
22
|
+
attr_reader :config, :template
|
23
|
+
|
24
|
+
def initialize(config:, template:)
|
25
|
+
@config = config
|
26
|
+
@template = template.deep_underscore_keys.deep_symbolize_keys
|
27
|
+
validate_template_kind!
|
28
|
+
end
|
29
|
+
|
30
|
+
def tf_configs
|
31
|
+
tf_config.locals.merge(filename => tf_config)
|
32
|
+
end
|
33
|
+
|
34
|
+
private
|
35
|
+
|
36
|
+
def validate_template_kind!
|
37
|
+
return if SUPPORTED_TEMPLATE_KINDS.include?(kind)
|
38
|
+
|
39
|
+
raise InvalidTemplateError, "Unsupported template kind: #{kind}"
|
40
|
+
end
|
41
|
+
|
42
|
+
def filename
|
43
|
+
case kind
|
44
|
+
when "gvc"
|
45
|
+
"gvc.tf"
|
46
|
+
when "workload"
|
47
|
+
"#{template[:name]}.tf"
|
48
|
+
when "auditctx"
|
49
|
+
"audit_contexts.tf"
|
50
|
+
else
|
51
|
+
"#{kind.pluralize}.tf"
|
52
|
+
end
|
53
|
+
end
|
54
|
+
|
55
|
+
def tf_config
|
56
|
+
@tf_config ||= config_class.new(**config_params)
|
57
|
+
end
|
58
|
+
|
59
|
+
def config_class
|
60
|
+
case kind
|
61
|
+
when "volumeset"
|
62
|
+
TerraformConfig::VolumeSet
|
63
|
+
when "auditctx"
|
64
|
+
TerraformConfig::AuditContext
|
65
|
+
else
|
66
|
+
TerraformConfig.const_get(kind.capitalize)
|
67
|
+
end
|
68
|
+
end
|
69
|
+
|
70
|
+
def config_params
|
71
|
+
send("#{kind}_config_params")
|
72
|
+
end
|
73
|
+
|
74
|
+
def gvc_config_params
|
75
|
+
template
|
76
|
+
.slice(:name, :description, :tags)
|
77
|
+
.merge(
|
78
|
+
env: gvc_env,
|
79
|
+
pull_secrets: gvc_pull_secrets,
|
80
|
+
locations: gvc_locations,
|
81
|
+
domain: template.dig(:spec, :domain),
|
82
|
+
load_balancer: template.dig(:spec, :load_balancer)
|
83
|
+
)
|
84
|
+
end
|
85
|
+
|
86
|
+
def identity_config_params
|
87
|
+
template.slice(:name, :description, :tags).merge(gvc: gvc)
|
88
|
+
end
|
89
|
+
|
90
|
+
def secret_config_params
|
91
|
+
template.slice(:name, :description, :type, :data, :tags)
|
92
|
+
end
|
93
|
+
|
94
|
+
def policy_config_params
|
95
|
+
template
|
96
|
+
.slice(:name, :description, :tags, :target, :target_kind, :target_query)
|
97
|
+
.merge(gvc: gvc, target_links: policy_target_links, bindings: policy_bindings)
|
98
|
+
end
|
99
|
+
|
100
|
+
def volumeset_config_params
|
101
|
+
specs = %i[
|
102
|
+
initial_capacity
|
103
|
+
performance_class
|
104
|
+
file_system_type
|
105
|
+
storage_class_suffix
|
106
|
+
snapshots
|
107
|
+
autoscaling
|
108
|
+
].to_h { |key| [key, template.dig(:spec, key)] }
|
109
|
+
|
110
|
+
template.slice(:name, :description, :tags).merge(gvc: gvc).merge(specs)
|
111
|
+
end
|
112
|
+
|
113
|
+
def auditctx_config_params
|
114
|
+
template.slice(:name, :description, :tags)
|
115
|
+
end
|
116
|
+
|
117
|
+
def agent_config_params
|
118
|
+
template.slice(:name, :description, :tags)
|
119
|
+
end
|
120
|
+
|
121
|
+
def workload_config_params
|
122
|
+
template
|
123
|
+
.slice(:name, :description, :tags)
|
124
|
+
.merge(gvc: gvc)
|
125
|
+
.merge(workload_spec_params)
|
126
|
+
end
|
127
|
+
|
128
|
+
def workload_spec_params # rubocop:disable Metrics/MethodLength
|
129
|
+
WORKLOAD_SPEC_KEYS.to_h do |key|
|
130
|
+
arg_name =
|
131
|
+
case key
|
132
|
+
when :default_options then :options
|
133
|
+
when :firewall_config then :firewall_spec
|
134
|
+
else key
|
135
|
+
end
|
136
|
+
|
137
|
+
value = template.dig(:spec, key)
|
138
|
+
|
139
|
+
if value
|
140
|
+
case key
|
141
|
+
when :local_options
|
142
|
+
value[:location] = value.delete(:location).split("/").last
|
143
|
+
when :security_options
|
144
|
+
value[:file_system_group_id] = value.delete(:filesystem_group_id)
|
145
|
+
end
|
146
|
+
end
|
147
|
+
|
148
|
+
[arg_name, value]
|
149
|
+
end
|
150
|
+
end
|
151
|
+
|
152
|
+
# GVC name matches application name
|
153
|
+
def gvc
|
154
|
+
"cpln_gvc.#{config.app}.name"
|
155
|
+
end
|
156
|
+
|
157
|
+
def gvc_pull_secrets
|
158
|
+
template.dig(:spec, :pull_secret_links)&.map { |secret_link| "cpln_secret.#{secret_link.split('/').last}.name" }
|
159
|
+
end
|
160
|
+
|
161
|
+
def gvc_env
|
162
|
+
template.dig(:spec, :env).to_h { |env_var| [env_var[:name], env_var[:value]] }
|
163
|
+
end
|
164
|
+
|
165
|
+
def gvc_locations
|
166
|
+
template.dig(:spec, :static_placement, :location_links)&.map { |location_link| location_link.split("/").last }
|
167
|
+
end
|
168
|
+
|
169
|
+
def policy_target_links
|
170
|
+
template[:target_links]&.map { |target_link| target_link.split("/").last }
|
171
|
+
end
|
172
|
+
|
173
|
+
def policy_bindings
|
174
|
+
template[:bindings]&.map do |data|
|
175
|
+
principal_links = data.delete(:principal_links)&.map { |link| link.delete_prefix("//") }
|
176
|
+
data.merge(principal_links: principal_links)
|
177
|
+
end
|
178
|
+
end
|
179
|
+
|
180
|
+
def kind
|
181
|
+
@kind ||= template[:kind]
|
182
|
+
end
|
183
|
+
end
|
184
|
+
end
|
@@ -0,0 +1,63 @@
|
|
1
|
+
# frozen_string_literal: true
|
2
|
+
|
3
|
+
module TerraformConfig
|
4
|
+
class Gvc < Base
|
5
|
+
attr_reader :name, :description, :tags, :domain, :locations, :pull_secrets, :env, :load_balancer
|
6
|
+
|
7
|
+
def initialize( # rubocop:disable Metrics/ParameterLists
|
8
|
+
name:,
|
9
|
+
description: nil,
|
10
|
+
tags: nil,
|
11
|
+
domain: nil,
|
12
|
+
locations: nil,
|
13
|
+
pull_secrets: nil,
|
14
|
+
env: nil,
|
15
|
+
load_balancer: nil
|
16
|
+
)
|
17
|
+
super()
|
18
|
+
|
19
|
+
@name = name
|
20
|
+
@description = description
|
21
|
+
@tags = tags
|
22
|
+
@domain = domain
|
23
|
+
@locations = locations
|
24
|
+
@pull_secrets = pull_secrets
|
25
|
+
@env = env
|
26
|
+
@load_balancer = load_balancer&.deep_underscore_keys&.deep_symbolize_keys
|
27
|
+
end
|
28
|
+
|
29
|
+
def importable?
|
30
|
+
true
|
31
|
+
end
|
32
|
+
|
33
|
+
def reference
|
34
|
+
"cpln_gvc.#{name}"
|
35
|
+
end
|
36
|
+
|
37
|
+
def to_tf
|
38
|
+
block :resource, :cpln_gvc, name do
|
39
|
+
argument :name, name
|
40
|
+
argument :description, description, optional: true
|
41
|
+
argument :tags, tags, optional: true
|
42
|
+
|
43
|
+
argument :domain, domain, optional: true
|
44
|
+
argument :locations, locations, optional: true
|
45
|
+
argument :pull_secrets, pull_secrets, optional: true
|
46
|
+
argument :env, env, optional: true
|
47
|
+
|
48
|
+
load_balancer_tf
|
49
|
+
end
|
50
|
+
end
|
51
|
+
|
52
|
+
private
|
53
|
+
|
54
|
+
def load_balancer_tf
|
55
|
+
return if load_balancer.nil?
|
56
|
+
|
57
|
+
block :load_balancer do
|
58
|
+
argument :dedicated, load_balancer.fetch(:dedicated)
|
59
|
+
argument :trusted_proxies, load_balancer.fetch(:trusted_proxies, nil), optional: true
|
60
|
+
end
|
61
|
+
end
|
62
|
+
end
|
63
|
+
end
|
@@ -0,0 +1,35 @@
|
|
1
|
+
# frozen_string_literal: true
|
2
|
+
|
3
|
+
module TerraformConfig
|
4
|
+
class Identity < Base
|
5
|
+
attr_reader :gvc, :name, :description, :tags
|
6
|
+
|
7
|
+
def initialize(gvc:, name:, description: nil, tags: nil)
|
8
|
+
super()
|
9
|
+
|
10
|
+
@gvc = gvc
|
11
|
+
@name = name
|
12
|
+
@description = description
|
13
|
+
@tags = tags
|
14
|
+
end
|
15
|
+
|
16
|
+
def importable?
|
17
|
+
true
|
18
|
+
end
|
19
|
+
|
20
|
+
def reference
|
21
|
+
"cpln_identity.#{name}"
|
22
|
+
end
|
23
|
+
|
24
|
+
def to_tf
|
25
|
+
block :resource, :cpln_identity, name do
|
26
|
+
argument :gvc, gvc
|
27
|
+
|
28
|
+
argument :name, name
|
29
|
+
argument :description, description, optional: true
|
30
|
+
|
31
|
+
argument :tags, tags, optional: true
|
32
|
+
end
|
33
|
+
end
|
34
|
+
end
|
35
|
+
end
|
@@ -0,0 +1,30 @@
|
|
1
|
+
# frozen_string_literal: true
|
2
|
+
|
3
|
+
module TerraformConfig
|
4
|
+
class LocalVariable < Base
|
5
|
+
VARIABLE_NAME_REGEX = /\A[a-zA-Z][a-zA-Z0-9_]*\z/.freeze
|
6
|
+
|
7
|
+
attr_reader :variables
|
8
|
+
|
9
|
+
def initialize(**variables)
|
10
|
+
super()
|
11
|
+
|
12
|
+
@variables = variables
|
13
|
+
validate_variables!
|
14
|
+
end
|
15
|
+
|
16
|
+
def to_tf
|
17
|
+
block :locals do
|
18
|
+
variables.each do |var, value|
|
19
|
+
argument var, value
|
20
|
+
end
|
21
|
+
end
|
22
|
+
end
|
23
|
+
|
24
|
+
private
|
25
|
+
|
26
|
+
def validate_variables!
|
27
|
+
raise ArgumentError, "Variables cannot be empty" if variables.empty?
|
28
|
+
end
|
29
|
+
end
|
30
|
+
end
|
@@ -0,0 +1,151 @@
|
|
1
|
+
# frozen_string_literal: true
|
2
|
+
|
3
|
+
module TerraformConfig
|
4
|
+
class Policy < Base # rubocop:disable Metrics/ClassLength
|
5
|
+
TARGET_KINDS = %w[
|
6
|
+
agent auditctx cloudaccount domain group gvc identity image ipset kubernetes location
|
7
|
+
org policy quota secret serviceaccount task user volumeset workload
|
8
|
+
].freeze
|
9
|
+
|
10
|
+
GVC_REQUIRED_TARGET_KINDS = %w[identity workload volumeset].freeze
|
11
|
+
|
12
|
+
attr_reader :name, :description, :tags, :target_kind, :gvc, :target, :target_links, :target_query, :bindings
|
13
|
+
|
14
|
+
def initialize( # rubocop:disable Metrics/ParameterLists, Metrics/MethodLength
|
15
|
+
name:,
|
16
|
+
description: nil,
|
17
|
+
tags: nil,
|
18
|
+
target_kind: nil,
|
19
|
+
gvc: nil,
|
20
|
+
target: nil,
|
21
|
+
target_links: nil,
|
22
|
+
target_query: nil,
|
23
|
+
bindings: nil
|
24
|
+
)
|
25
|
+
super()
|
26
|
+
|
27
|
+
@name = name
|
28
|
+
@description = description
|
29
|
+
@tags = tags
|
30
|
+
|
31
|
+
@target_kind = target_kind
|
32
|
+
validate_target_kind!
|
33
|
+
|
34
|
+
@gvc = gvc
|
35
|
+
validate_gvc!
|
36
|
+
|
37
|
+
@target = target
|
38
|
+
@target_links = target_links
|
39
|
+
|
40
|
+
@target_query = target_query&.deep_underscore_keys&.deep_symbolize_keys
|
41
|
+
@bindings = bindings&.map { |data| data.deep_underscore_keys.deep_symbolize_keys }
|
42
|
+
end
|
43
|
+
|
44
|
+
def importable?
|
45
|
+
true
|
46
|
+
end
|
47
|
+
|
48
|
+
def reference
|
49
|
+
"cpln_policy.#{name}"
|
50
|
+
end
|
51
|
+
|
52
|
+
def to_tf
|
53
|
+
block :resource, :cpln_policy, name do
|
54
|
+
argument :name, name
|
55
|
+
|
56
|
+
%i[description tags target_kind gvc target target_links].each do |arg_name|
|
57
|
+
argument arg_name, send(arg_name), optional: true
|
58
|
+
end
|
59
|
+
|
60
|
+
bindings_tf
|
61
|
+
target_query_tf
|
62
|
+
end
|
63
|
+
end
|
64
|
+
|
65
|
+
private
|
66
|
+
|
67
|
+
def validate_target_kind!
|
68
|
+
return if target_kind.nil? || TARGET_KINDS.include?(target_kind.to_s)
|
69
|
+
|
70
|
+
raise ArgumentError, "Invalid target kind given - #{target_kind}"
|
71
|
+
end
|
72
|
+
|
73
|
+
def validate_gvc!
|
74
|
+
return unless GVC_REQUIRED_TARGET_KINDS.include?(target_kind.to_s) && gvc.nil?
|
75
|
+
|
76
|
+
raise ArgumentError, "`gvc` is required for `#{target_kind}` target kind"
|
77
|
+
end
|
78
|
+
|
79
|
+
def bindings_tf
|
80
|
+
return if bindings.nil?
|
81
|
+
|
82
|
+
bindings.each do |binding_data|
|
83
|
+
block :binding do
|
84
|
+
argument :permissions, binding_data.fetch(:permissions, nil), optional: true
|
85
|
+
argument :principal_links, binding_data.fetch(:principal_links, nil), optional: true
|
86
|
+
end
|
87
|
+
end
|
88
|
+
end
|
89
|
+
|
90
|
+
def target_query_tf
|
91
|
+
return if target_query.nil?
|
92
|
+
|
93
|
+
fetch_type = target_query.fetch(:fetch, nil)
|
94
|
+
validate_fetch_type!(fetch_type) if fetch_type
|
95
|
+
|
96
|
+
block :target_query do
|
97
|
+
argument :fetch, fetch_type, optional: true
|
98
|
+
target_query_spec_tf
|
99
|
+
end
|
100
|
+
end
|
101
|
+
|
102
|
+
def validate_fetch_type!(fetch_type)
|
103
|
+
return if %w[links items].include?(fetch_type.to_s)
|
104
|
+
|
105
|
+
raise ArgumentError, "Invalid fetch type - #{fetch_type}. Should be either `links` or `items`"
|
106
|
+
end
|
107
|
+
|
108
|
+
def target_query_spec_tf
|
109
|
+
spec = target_query.fetch(:spec, nil)
|
110
|
+
return if spec.nil?
|
111
|
+
|
112
|
+
match_type = spec.fetch(:match, nil)
|
113
|
+
validate_match_type!(match_type) if match_type
|
114
|
+
|
115
|
+
block :spec do
|
116
|
+
argument :match, match_type, optional: true
|
117
|
+
|
118
|
+
target_query_spec_terms_tf(spec)
|
119
|
+
end
|
120
|
+
end
|
121
|
+
|
122
|
+
def validate_match_type!(match_type)
|
123
|
+
return if %w[all any none].include?(match_type.to_s)
|
124
|
+
|
125
|
+
raise ArgumentError, "Invalid match type - #{match_type}. Should be either `all`, `any` or `none`"
|
126
|
+
end
|
127
|
+
|
128
|
+
def target_query_spec_terms_tf(spec)
|
129
|
+
terms = spec.fetch(:terms, nil)
|
130
|
+
return if terms.nil?
|
131
|
+
|
132
|
+
terms.each do |term|
|
133
|
+
validate_term!(term)
|
134
|
+
|
135
|
+
block :terms do
|
136
|
+
%i[op property rel tag value].each do |arg_name|
|
137
|
+
argument arg_name, term.fetch(arg_name, nil), optional: true
|
138
|
+
end
|
139
|
+
end
|
140
|
+
end
|
141
|
+
end
|
142
|
+
|
143
|
+
def validate_term!(term)
|
144
|
+
return if (%i[property rel tag] & term.keys).count == 1
|
145
|
+
|
146
|
+
raise ArgumentError,
|
147
|
+
"Each term in `target_query.spec.terms` must contain exactly one of the following attributes: " \
|
148
|
+
"`property`, `rel`, or `tag`."
|
149
|
+
end
|
150
|
+
end
|
151
|
+
end
|
@@ -0,0 +1,22 @@
|
|
1
|
+
# frozen_string_literal: true
|
2
|
+
|
3
|
+
module TerraformConfig
|
4
|
+
class Provider < Base
|
5
|
+
attr_reader :name, :options
|
6
|
+
|
7
|
+
def initialize(name:, **options)
|
8
|
+
super()
|
9
|
+
|
10
|
+
@name = name
|
11
|
+
@options = options
|
12
|
+
end
|
13
|
+
|
14
|
+
def to_tf
|
15
|
+
block :provider, name do
|
16
|
+
options.each do |option, value|
|
17
|
+
argument option, value
|
18
|
+
end
|
19
|
+
end
|
20
|
+
end
|
21
|
+
end
|
22
|
+
end
|