ndr_dev_support 7.3.0 → 7.3.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 5084b3677de82f1613b2a3d95e2290ca79128285da4a004636ee67d23d1546d5
|
4
|
+
data.tar.gz: 13561b93f13f6739c072382faf65968f59a5b82898ccbbb9b3a3c55a006744c3
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 656ead5b1726958c845ba2eda14afc1e548e1a012a813aff524dc78953630bae0f119bacdaed63b3621c4da6bfd41439f3022c8ab260a43470408b0f1ef51080
|
7
|
+
data.tar.gz: 541c54385afa983aaa6087302f92318d425556aaf5d9de534c685e52e7dc770e799bc318f0983d83c73053c1d81fe4b7937f14d91143b156292b4387481b5201
|
data/CHANGELOG.md
CHANGED
@@ -1,6 +1,10 @@
|
|
1
1
|
## [Unreleased]
|
2
2
|
*no unreleased changes*
|
3
3
|
|
4
|
+
## 7.3.1 / 2025-01-02
|
5
|
+
### Added
|
6
|
+
* Capistrano: deploy application secrets from a subversion or git repository
|
7
|
+
|
4
8
|
## 7.3.0 / 2024-12-19
|
5
9
|
### Added
|
6
10
|
* Capistrano: install rbenv and ruby from /opt/rbenv.tar.gz or vendor/rbenv/
|
@@ -0,0 +1,166 @@
|
|
1
|
+
# Add a git or svn secrets respository for ndr_dev_support:deploy_secrets
|
2
|
+
def add_secrets_repo(name:, url:, scm:, branch: nil)
|
3
|
+
raise "Invalid repo name #{name}" unless /\A[A-Z0-9_-]+\z/i.match?(name)
|
4
|
+
raise "Unknown scm #{scm}" unless %w[svn git].include?(scm)
|
5
|
+
raise "Expected branch for repo #{name}" if scm == 'git' && branch.to_s.empty?
|
6
|
+
|
7
|
+
secrets_repositories = fetch(:secrets_repositories, {})
|
8
|
+
secrets_repositories[name] = { url: url, scm: scm, branch: branch }
|
9
|
+
set :secrets_repositories, secrets_repositories
|
10
|
+
end
|
11
|
+
|
12
|
+
# Add a secret to be deployed by ndr_dev_support:deploy_secrets
|
13
|
+
def add_secret(repo:, repo_path:, shared_dest:)
|
14
|
+
secrets = fetch(:secrets, [])
|
15
|
+
raise "Unknown repo #{repo}" unless fetch(:secrets_repositories, {}).key?(repo)
|
16
|
+
|
17
|
+
secrets << { repo: repo, repo_path: repo_path, shared_dest: shared_dest }
|
18
|
+
set :secrets, secrets
|
19
|
+
end
|
20
|
+
|
21
|
+
Capistrano::Configuration.instance(:must_exist).load do
|
22
|
+
namespace :ndr_dev_support do
|
23
|
+
desc <<~DESC
|
24
|
+
Deploy updated application secrets to shared folders on application servers
|
25
|
+
|
26
|
+
To use this in a project, add something like the code below to your
|
27
|
+
Capistrano file config/deploy.rb, then run:
|
28
|
+
$ cap target app:update_secrets
|
29
|
+
|
30
|
+
namespace :app do
|
31
|
+
desc 'Update application secrets'
|
32
|
+
task :update_secrets do
|
33
|
+
add_secrets_repo(name: 'userlists',
|
34
|
+
url: 'https://github.com/example/users.git',
|
35
|
+
branch: 'main',
|
36
|
+
scm: 'git')
|
37
|
+
add_secrets_repo(name: 'encrypted_credentials_store',
|
38
|
+
url: 'https://svn-server.example.org/svn/creds', scm: 'svn')
|
39
|
+
|
40
|
+
add_secret(repo: 'encrypted_credentials_store',
|
41
|
+
repo_path: 'path/to/credentials.yml.enc',
|
42
|
+
shared_dest: 'config/credentials.yml.enc')
|
43
|
+
add_secret(repo: 'userlists',
|
44
|
+
repo_path: 'config/userlist.yml',
|
45
|
+
shared_dest: 'config/userlist.yml')
|
46
|
+
end
|
47
|
+
end
|
48
|
+
after 'app:update_secrets', 'ndr_dev_support:deploy_secrets'
|
49
|
+
DESC
|
50
|
+
task :deploy_secrets do
|
51
|
+
# List of repositories used for secrets
|
52
|
+
secrets_repositories = fetch(:secrets_repositories, {})
|
53
|
+
secrets = fetch(:secrets, [])
|
54
|
+
secrets_repo_base = Pathname.new('tmp/deployment-secrets')
|
55
|
+
|
56
|
+
if secrets.empty?
|
57
|
+
Capistrano::CLI.ui.say 'Warning: No secret files configured to upload'
|
58
|
+
next
|
59
|
+
end
|
60
|
+
|
61
|
+
# Allow quick indexing by filename
|
62
|
+
secrets_map = secrets.to_h { |secret| [secret[:shared_dest], secret] } # rubocop:disable Rails/IndexBy
|
63
|
+
changed = [] # List of changed files updated
|
64
|
+
Dir.mktmpdir do |secret_dir|
|
65
|
+
# Clone git secrets repositories if required
|
66
|
+
used_repos = secrets.collect { |secret| secret[:repo] }.uniq
|
67
|
+
repo_dirs = {}
|
68
|
+
used_repos.each do |repo|
|
69
|
+
repository = secrets_repositories[repo]
|
70
|
+
next unless repository[:scm] == 'git'
|
71
|
+
|
72
|
+
repo_dir = Pathname.new(secrets_repo_base).join(".git-#{repo}").to_s
|
73
|
+
if File.directory?(repo_dir)
|
74
|
+
ok = system("cd #{Shellwords.escape(repo_dir)} && git fetch")
|
75
|
+
raise "Error: cannot fetch secrets repository #{repo}: aborting" unless ok
|
76
|
+
else
|
77
|
+
ok = system('git', 'clone', '--mirror', '--filter=blob:none', repository[:url], repo_dir)
|
78
|
+
raise "Error: cannot clone secrets repository #{repo}: aborting" unless ok
|
79
|
+
end
|
80
|
+
repo_dirs[repo] = repo_dir
|
81
|
+
end
|
82
|
+
|
83
|
+
# Set up a temporary secrets directory of exported secrets,
|
84
|
+
# creating nested structure if necessary
|
85
|
+
secrets_map.each_value do |secret|
|
86
|
+
repo = secret[:repo]
|
87
|
+
repository = secrets_repositories[repo]
|
88
|
+
raise "Unknown repository #{secret[:repo]}" unless repository
|
89
|
+
|
90
|
+
repo_root = repository[:url]
|
91
|
+
raise 'Unknown / unsupported repository' unless repo_root&.start_with?('https://')
|
92
|
+
|
93
|
+
dest_fname = File.join(secret_dir, secret[:shared_dest])
|
94
|
+
dest_dir = File.dirname(dest_fname)
|
95
|
+
FileUtils.mkdir_p(dest_dir)
|
96
|
+
case repository[:scm]
|
97
|
+
when 'git'
|
98
|
+
repo_dir = Pathname.new(secrets_repo_base).join(".git-#{repo}").to_s
|
99
|
+
ok = system("GIT_DIR=#{Shellwords.escape(repo_dir)} git archive --format=tar " \
|
100
|
+
"#{Shellwords.escape(repository[:branch])} " \
|
101
|
+
"#{Shellwords.escape(secret[:repo_path])} | " \
|
102
|
+
"tar x -Ps %#{Shellwords.escape(secret[:repo_path])}%" \
|
103
|
+
"#{Shellwords.escape(File.join(secret_dir, secret[:shared_dest]))}% " \
|
104
|
+
"#{Shellwords.escape(secret[:repo_path])}")
|
105
|
+
when 'svn'
|
106
|
+
ok = system('svn', 'export', '--quiet', "#{repo_root}/#{secret[:repo_path]}",
|
107
|
+
File.join(secret_dir, secret[:shared_dest]))
|
108
|
+
# TODO: use --non-interactive, and then run again interactively if there's an eror
|
109
|
+
else
|
110
|
+
raise "Error: unsupported scm #{repository[:scm]}"
|
111
|
+
end
|
112
|
+
|
113
|
+
raise 'Error: cannot export secrets files: aborting' unless ok
|
114
|
+
|
115
|
+
secret[:digest] = Digest::SHA256.file(dest_fname).hexdigest
|
116
|
+
end
|
117
|
+
|
118
|
+
# Retrieve digests of secrets from application server
|
119
|
+
escaped_fnames = secrets_map.keys.collect { |fname| Shellwords.escape(fname) }
|
120
|
+
capture("cd #{shared_path.shellescape}; " \
|
121
|
+
"sha256sum #{escaped_fnames.join(' ')} || true").split("\n").each do |digest_line|
|
122
|
+
match = digest_line.match(/([0-9a-f]{64}) [ *](.*)/)
|
123
|
+
raise "Invalid digest returned: #{digest_line}" unless match && secrets_map.key?(match[2])
|
124
|
+
|
125
|
+
secrets_map[match[2]][:server_digest] = match[1]
|
126
|
+
end
|
127
|
+
|
128
|
+
# Upload replacements for all changed files
|
129
|
+
secrets_map.each_value do |secret|
|
130
|
+
if secret[:digest] == secret[:server_digest]
|
131
|
+
# Capistrano::CLI.ui.say "Unchanged secret: #{secret[:shared_dest]}"
|
132
|
+
next
|
133
|
+
end
|
134
|
+
|
135
|
+
Capistrano::CLI.ui.say "Uploading changed secret file: #{secret[:shared_dest]}"
|
136
|
+
changed << secret[:shared_dest]
|
137
|
+
# Capistrano does an in-place overwrite of the file, so use a temporary name,
|
138
|
+
# then move it into place
|
139
|
+
temp_dest = capture("mktemp -p #{shared_path.shellescape}").chomp
|
140
|
+
dest_fname = File.join(secret_dir, secret[:shared_dest])
|
141
|
+
put File.read(dest_fname), temp_dest
|
142
|
+
escape_shared_dest = Shellwords.escape(secret[:shared_dest])
|
143
|
+
escape_temp_dest = Shellwords.escape(temp_dest)
|
144
|
+
capture("cd #{shared_path.shellescape}; " \
|
145
|
+
"chmod 664 #{escape_temp_dest}; " \
|
146
|
+
"if [ -e #{escape_shared_dest} ]; then cp -p #{escape_shared_dest}{,.orig}; fi; " \
|
147
|
+
"mv #{escape_temp_dest} #{escape_shared_dest}")
|
148
|
+
end
|
149
|
+
end
|
150
|
+
|
151
|
+
if changed.empty?
|
152
|
+
Capistrano::CLI.ui.say 'No changed secret files to upload'
|
153
|
+
else
|
154
|
+
Capistrano::CLI.ui.say "Uploaded #{changed.size} changed secret files: #{changed.join(', ')}"
|
155
|
+
end
|
156
|
+
# TODO: Support logging of changes, so that a calling script can report changes
|
157
|
+
|
158
|
+
# TODO: maintain a per-target local cache of latest revisions uploaded / file checksums
|
159
|
+
# then we don't need to re-connect to the remote servers, if nothing changed,
|
160
|
+
# We could also then only need to do "svn ls" instead of "svn export"
|
161
|
+
|
162
|
+
# TODO: Warn if some repos are inaccessible?
|
163
|
+
# TODO: Add notes for passwordless SSH deployment, using ssh-agent
|
164
|
+
end
|
165
|
+
end
|
166
|
+
end
|
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: ndr_dev_support
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 7.3.
|
4
|
+
version: 7.3.1
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- NCRS Development Team
|
8
8
|
autorequire:
|
9
9
|
bindir: exe
|
10
10
|
cert_chain: []
|
11
|
-
date:
|
11
|
+
date: 2025-01-03 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: pry
|
@@ -409,6 +409,7 @@ files:
|
|
409
409
|
- lib/minitest/rake_ci_plugin.rb
|
410
410
|
- lib/ndr_dev_support.rb
|
411
411
|
- lib/ndr_dev_support/capistrano/assets.rb
|
412
|
+
- lib/ndr_dev_support/capistrano/deploy_secrets.rb
|
412
413
|
- lib/ndr_dev_support/capistrano/install_ruby.rb
|
413
414
|
- lib/ndr_dev_support/capistrano/ndr_model.rb
|
414
415
|
- lib/ndr_dev_support/capistrano/restart.rb
|