@colisweb/rescript-toolkit 4.14.12 → 4.14.14

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -0,0 +1,2603 @@
1
+ #!/usr/bin/env bash
2
+
3
+ #VARIABLES
4
+ export SCRIPT_FULL_PATH=$(dirname "$0")
5
+
6
+ ##FUNCTIONS
7
+ # https://stackoverflow.com/questions/1527049/how-can-i-join-elements-of-an-array-in-bash
8
+ join_by() {
9
+ local d=${1-} f=${2-}
10
+ if shift 2; then
11
+ printf %s "$f" "${@/#/$d}"
12
+ fi
13
+ }
14
+
15
+ mkstring() {
16
+ local start=$1
17
+ local separator=$2
18
+ local end=$3
19
+ shift 3
20
+
21
+ if [ $# -gt 0 ]; then
22
+ printf $start
23
+ join_by $separator $*
24
+ printf $end
25
+ fi
26
+ }
27
+
28
+ md5all() {
29
+ all_hash=$(mktemp)
30
+ for name in $*; do
31
+ find $name -type f -exec cat {} \; | md5sum | cut -f1 -d ' ' >> $all_hash
32
+ done;
33
+ cat $all_hash | md5sum | cut -f1 -d ' '
34
+ }
35
+
36
+ log() {
37
+ echo "$*" >&2
38
+ }
39
+ #!/usr/bin/env bash
40
+
41
+ check_args() {
42
+ if [ -z $2 ] || [ "$1" != "$2" ]; then
43
+ echo >&2 "missing argument $1"
44
+ return 1
45
+ fi
46
+ }
47
+
48
+ check_env_vars() {
49
+ ArgsCount=$1 && shift
50
+ for ((i = 0; i < $ArgsCount; i++)); do
51
+ if [[ -z "${!1}" ]]; then
52
+ echo >&2 "missing ENV $1"
53
+ return 1
54
+ fi
55
+ shift
56
+ done
57
+ }
58
+
59
+ extract_arg() {
60
+ name=$1
61
+ passed=$2
62
+ value=$3
63
+ if [ "--$name" != "$passed" ]; then
64
+ echo "missing argument $name"
65
+ exit 1
66
+ fi
67
+ eval $name='$value'
68
+ }
69
+
70
+ extract_args() {
71
+ declare -a Array_Args
72
+ ArgsCount=$1 && shift
73
+ for ((i = 0; i < $ArgsCount; i++)); do
74
+ Array_Args[i]=$1 && shift
75
+ done
76
+ for ArgName in "${Array_Args[@]}"; do
77
+ extract_arg "$ArgName" $* && shift 2
78
+ done
79
+ }
80
+
81
+ #!/usr/bin/env bash
82
+
83
+ aws_ecr_login() {
84
+ PATH=/root/.local/bin:$PATH
85
+
86
+ aws ecr get-login-password \
87
+ | docker login --username AWS --password-stdin 949316342391.dkr.ecr.eu-west-1.amazonaws.com \
88
+ || (echo "you should update to AWS CLI version 2 https://docs.aws.amazon.com/cli/latest/userguide/install-cliv2-mac.html " $(aws ecr get-login --region=eu-west-1 --no-include-email) )
89
+ }
90
+
91
+ aws_ecr_token() {
92
+ aws ecr get-authorization-token --region=eu-west-1 --output text --query 'authorizationData[].authorizationToken'
93
+ }
94
+
95
+ # you will need jq to use these commands. You can install it using "brew install jq"
96
+ # delete_images colisweb_api 8
97
+ # will delete images older than 8 weeks
98
+ delete_images() {
99
+
100
+ REPO=$1
101
+ WEEKS=${2:-16}
102
+
103
+ WEEKS_AGO=$(date -v-${WEEKS}w +%F)
104
+
105
+ #Get all ecr images
106
+ IMAGES=$(aws ecr describe-images --repository-name $REPO --output json)
107
+
108
+ #Filter unnecessary values and map `imagePushedAt` to EPOCH
109
+ NON_LATEST_IMAGES=$(echo $IMAGES | jq '[.imageDetails[] | select(.imageTags | any(endswith("latest")) | not)]')
110
+
111
+ #Filter on EPOCH
112
+ OLD_IMAGES=$(echo $NON_LATEST_IMAGES | jq --arg date $WEEKS_AGO '.[] | select(.imagePushedAt[0:10] < $date).imageDigest')
113
+ while IFS= read -r IMAGE; do
114
+ if [ "$IMAGE" != "" ]; then
115
+ echo "Deleting $IMAGE from $REPO"
116
+ AWS_PAGER="" aws ecr batch-delete-image --repository-name $REPO --image-ids imageDigest=$IMAGE
117
+ fi
118
+ done <<< "$OLD_IMAGES"
119
+ }
120
+
121
+ # delete_images_all_repos 12
122
+ # will delete images in all repositories older than 12 weeks
123
+ delete_images_all_repos() {
124
+ REPOSITORIES=$(aws ecr describe-repositories --output json | jq -r '.[]|.[].repositoryName')
125
+
126
+ while IFS= read -r REPO; do
127
+ echo "processing ECR repository $REPO"
128
+ delete_images $REPO $1
129
+ done <<< "$REPOSITORIES"
130
+ }
131
+
132
+ delete_old_cache() {
133
+ DATE=${1:-$(date -v-1m +%F)}
134
+ CACHE_BUCKET=${2:-"s3://gitlab-colisweb-distributed-cache/project/"}
135
+
136
+ echo "deleting from cache $CACHE_BUCKET all older than $DATE"
137
+
138
+ aws_ecr_login
139
+
140
+ while read -r line; do
141
+ datum=$(echo $line | cut -c1-10)
142
+ if [[ "$datum" < "$DATE" ]] ; then
143
+ # Shell Parameter Expansion: ${parameter##word}
144
+ # Allow to return the result from "word" to the end of "parameters"
145
+ # Here we need the end of the string after "project/" (corresponding to the S3 gitlab project id and filename)
146
+ TO_DELETE="$CACHE_BUCKET${line##* project/}"
147
+ echo $TO_DELETE
148
+ aws s3 rm $TO_DELETE
149
+ fi
150
+ done < <(aws s3 ls $CACHE_BUCKET --recursive)
151
+ }
152
+
153
+ #!/usr/bin/env bash
154
+
155
+ # If gitlab is down or pipeline are stuck, hotfixes need to be available
156
+ # This script will publish docker images to ECR using your current git HEAD, then deploy them to a given environment.
157
+ # Some local files (git-commit.conf and sentry.properties) will be updated, take caution.
158
+ # No trace of this will appear on Gitlab (no releases, no pipelines, no tags).
159
+ # create_hotfix_scala $ENVIRONMENT $CHART_NAME [ $MODULE_NAME $MODULE_PATH $DEPLOYMENT ]
160
+ # create_hotfix_scala testing crm main modules/3-executables/main crm
161
+ # create_hotfix_scala testing notification \
162
+ # main-http modules/3-executables/main-http notification-http \
163
+ # main-consumer modules/3-executables/main-consumer notification-consumer
164
+
165
+ create_hotfix_scala() {
166
+
167
+ ENVIRONMENT=$1
168
+ CHART_NAME=$2
169
+ shift 2
170
+
171
+ SHORT_SHA=$(git rev-parse --short HEAD)
172
+ HOTFIX_TAG="hotfix-$SHORT_SHA"
173
+
174
+ gum confirm "Preparing $HOTFIX_TAG for $CHART_NAME ?" || exit
175
+ prepare_hotfix_scala $HOTFIX_TAG
176
+
177
+ gum confirm "Building $HOTFIX_TAG for $CHART_NAME ?" || exit
178
+ while [[ $# -gt 2 ]] ; do
179
+ build_hotfix_scala $HOTFIX_TAG "$1" "$2" "$3"
180
+ shift 3
181
+ done
182
+
183
+ gum confirm "Deploying $HOTFIX_TAG for $CHART_NAME ?" || exit
184
+ deploy_hotfix $CHART_NAME $ENVIRONMENT $HOTFIX_TAG
185
+ }
186
+
187
+ # Update local git-commit.conf and sentry.properties files using git short sha
188
+ prepare_hotfix_scala() {
189
+ HOTFIX_TAG=$1
190
+
191
+ git secret reveal -f
192
+ aws_ecr_login
193
+
194
+ COMMIT_CONF_FILES=$(find . -name "git-commit.conf")
195
+ SENTRY_PROPERTIES_FILES=$(find . -name "sentry.properties")
196
+
197
+ for file in $(echo "$COMMIT_CONF_FILES\n$SENTRY_PROPERTIES_FILES"); do
198
+ sed -i '' -e 's&GIT_COMMIT&'"$HOTFIX_TAG&" $file
199
+ done
200
+
201
+ }
202
+
203
+ # Build docker images locally and publish them to AWS ECR.
204
+ build_hotfix_scala() {
205
+
206
+ HOTFIX_TAG=$1
207
+ SBT_MODULE=$2
208
+ DOCKER_PATH=$3
209
+ DEPLOYMENT=$4
210
+
211
+ DOCKER_REGISTRY_ID="949316342391"
212
+ DOCKER_REGISTRY="$DOCKER_REGISTRY_ID.dkr.ecr.eu-west-1.amazonaws.com"
213
+ DOCKER_IMAGE=$DOCKER_REGISTRY/$DEPLOYMENT
214
+ HOTFIX_IMAGE=$DOCKER_IMAGE:$HOTFIX_TAG
215
+
216
+ #Build
217
+ sbt "project $SBT_MODULE" "Docker / stage"
218
+
219
+ #Publish
220
+ docker build --platform "linux/amd64" -t $HOTFIX_IMAGE --cache-from $DOCKER_IMAGE "$DOCKER_PATH/target/docker/stage"
221
+ docker push $HOTFIX_IMAGE
222
+
223
+ echo "Created hotfix $HOTFIX_IMAGE"
224
+ }
225
+
226
+ # Deploy the project in the given environment
227
+ deploy_hotfix() {
228
+ source $colisweb_scripts/ci/helm.sh
229
+
230
+ CHART_NAME=$1
231
+ ENVIRONMENT=$2
232
+ HOTFIX_TAG=$3
233
+
234
+ CONFIG_PATH=deploy
235
+ CHART_PATH=$CONFIG_PATH/$CHART_NAME
236
+ ROOT_PATH=$(pwd)
237
+
238
+ # Unset Kubectl configuration made via the KUBECONFIG env variable
239
+ # it would override the config made by configure_kubectl_for
240
+ # for example, using Gitlab runners in Kubernetes sets this variable and causes conflict
241
+ unset KUBECONFIG
242
+
243
+ # Configure Kubectl
244
+ configure_kubectl_for $ENVIRONMENT
245
+
246
+ # Avoiding "no local-index.yaml" or "empty local-index.yaml" error
247
+ cat > $HOME/Library/Caches/helm/repository/local-index.yaml <<EOT
248
+ apiVersion: v1
249
+ entries:
250
+ cronjob:
251
+ EOT
252
+
253
+ # helm3 stable repo have changed and must be updated manually, in versions < v2.17.0
254
+ helm3 repo add colisweb s3://colisweb-helm-charts/colisweb --force-update
255
+ helm3 repo add stable https://charts.helm.sh/stable --force-update
256
+ helm3 repo update
257
+ helm3 dependency update ${ROOT_PATH}/${CHART_PATH}
258
+
259
+ # Gather values/*.yaml files
260
+ VALUES_PATH="${ROOT_PATH}/${CHART_NAME}/values"
261
+ VALUES_FILES=''
262
+ [ -d $VALUES_PATH ] && VALUES_FILES=$(find $VALUES_PATH -type f -maxdepth 1 -name "*.yaml" | sed 's/^/ -f /' | tr -d \\n | sed 's/%//')
263
+
264
+ # Deploy
265
+ helm3 upgrade --install \
266
+ --namespace ${ENVIRONMENT} \
267
+ ${VALUES_FILES} \
268
+ -f ${ROOT_PATH}/${CONFIG_PATH}/common.yaml \
269
+ -f ${ROOT_PATH}/${CONFIG_PATH}/${ENVIRONMENT}.yaml \
270
+ -f ${ROOT_PATH}/${CONFIG_PATH}/${ENVIRONMENT}-secrets.yaml \
271
+ --set global.version=$HOTFIX_TAG \
272
+ ${CHART_NAME} ${ROOT_PATH}/${CHART_PATH}
273
+
274
+
275
+ verify_deployments_v3 -t 10m $ENVIRONMENT $CHART_NAME
276
+
277
+ }
278
+
279
+ #!/usr/bin/env bash
280
+
281
+ image_exists() {
282
+ set -e
283
+
284
+ REGISTRY=$1
285
+ REPOSITORY=$2
286
+ IMAGE=$3
287
+
288
+ TAGGED_IMAGE="$REGISTRY/$REPOSITORY:$IMAGE"
289
+
290
+ aws ecr describe-images --registry-id $REGISTRY --repository-name $REPOSITORY --image-ids "imageTag=$IMAGE"
291
+
292
+ if [ $? -eq 0 ]
293
+ then
294
+ echo "Image $TAGGED_IMAGE already present in distant repo"
295
+ return 0
296
+ else
297
+ echo "Image $TAGGED_IMAGE NOT present in distant repo"
298
+ return 1
299
+ fi
300
+ }
301
+ #!/usr/bin/env bash
302
+
303
+ gmm() {
304
+ git checkout $1
305
+ git pull
306
+ git checkout $2
307
+ git pull
308
+ git merge $1
309
+ git push
310
+ }
311
+
312
+ git_damn_merge() {
313
+ git checkout $1
314
+ git pull
315
+ git checkout $2
316
+ git dammit
317
+ git merge $1
318
+ git push
319
+ }
320
+
321
+ git_prune_local_branches() {
322
+ git branch -r |
323
+ awk '{print $1}' |
324
+ egrep -v -f /dev/fd/0 <(git branch -vv | grep origin) |
325
+ awk '{print $1}' |
326
+ xargs git branch -d
327
+ }
328
+
329
+ gum_checkout() {
330
+ git branch -a | cut -f3- -d "/" | gum filter | xargs git checkout
331
+ }
332
+
333
+ # useful option :
334
+ # export GIT_SUBLINE_MERGE_NON_INTERACTIVE_MODE=TRUE
335
+ # see https://github.com/paulaltin/git-subline-merge
336
+ setup_subline_merge() {
337
+ location=${1:-"--local"}
338
+
339
+ case $location in
340
+ --local)
341
+ if [ -d ".git" ]; then
342
+ echo "* merge=subline" >>.git/info/attributes
343
+ else
344
+ echo "Cannot use local option, not in a git repository"
345
+ return 1
346
+ fi
347
+ ;;
348
+ --global)
349
+ echo "* merge=subline" >>~/.gitattributes
350
+ ;;
351
+ *)
352
+ echo "unknown argument $location"
353
+ return 2
354
+ ;;
355
+ esac
356
+
357
+ git config $location merge.conflictStyle diff3
358
+ git config $location merge.subline.driver "$colisweb_scripts/shell-session/shell/dev/git-subline-merge %O %A %B %L %P"
359
+ git config $location merge.subline.recursive binary
360
+ }
361
+
362
+ rebase_from_ancestor() {
363
+ set -x
364
+ branch=$1
365
+ tip=$(git rev-parse HEAD)
366
+ ancestor=$(git merge-base $branch $tip)
367
+ commits=$(git log $ancestor..$tip)
368
+ git reset --hard $ancestor
369
+ git merge --squash $tip
370
+ git commit -m "squashed commmits $commits" || echo "nothing committed"
371
+ git rebase $branch -Xtheirs
372
+ }
373
+
374
+ #!/usr/bin/env bash
375
+
376
+ import_all_pgp_keys() {
377
+ echo "importing all PGP keys"
378
+ gpg --import $SCRIPT_FULL_PATH/pgp_keys/*.key
379
+ }
380
+
381
+ remove_all_persons_from_secrets() {
382
+ echo "cleanup git secret"
383
+ WHO_KNOWS=($(git secret whoknows))
384
+ git secret removeperson $WHO_KNOWS
385
+ echo "Removed secrets access for $WHO_KNOWS"
386
+ }
387
+
388
+ all_pgp_emails() {
389
+ gpg --show-key $SCRIPT_FULL_PATH/pgp_keys/*.key | sed -rn "s/.*<(.*)>/\1/p"
390
+ }
391
+
392
+ set_all_secret_keys() {
393
+
394
+ import_all_pgp_keys
395
+
396
+ git secret reveal -f
397
+
398
+ remove_all_persons_from_secrets
399
+
400
+ if [ $# -eq 0 ]; then
401
+ echo "No emails supplied, using dev-tools pgp keys as source"
402
+ IN_THE_KNOW=($(gum choose --no-limit $(all_pgp_emails)))
403
+ else
404
+ IN_THE_KNOW=($*)
405
+ fi
406
+
407
+ git secret tell $IN_THE_KNOW
408
+ git secret hide
409
+ git secret whoknows
410
+
411
+ echo "all secrets updated, you'll need to commit the changes"
412
+ }
413
+
414
+ #!/usr/bin/env bash
415
+
416
+ start_ssh_bastion() {
417
+ ENV=$1
418
+ SSH_LOCAL_PORT=$2
419
+ POD_NAME=ssh-bastion-$USERNAME
420
+ CONFIG_MAP_NAME=ssh-bastion-$USERNAME
421
+ configure_kubectl_for $ENV
422
+ kubectl get pods -o name | grep pod/$POD_NAME
423
+ if [ $? -eq 0 ]; then
424
+ echo "$POD_NAME is already running"
425
+ else
426
+ #configmap
427
+ kubectl get configmap $CONFIG_MAP_NAME && kubectl delete configmap $CONFIG_MAP_NAME
428
+ tempdir=$(mktemp -d)
429
+ cat <<EOF > $tempdir/sshd_config
430
+ AllowTcpForwarding yes
431
+ Port 2222
432
+ PermitRootLogin yes
433
+ AuthorizedKeysFile /etc/ssh/authorized_keys
434
+ EOF
435
+ cp ~/.ssh/id_rsa.pub $tempdir/authorized_keys
436
+ kubectl create configmap $CONFIG_MAP_NAME --from-file=$tempdir
437
+
438
+ #pod
439
+ kubectl get pod $POD_NAME && kubectl delete pod $POD_NAME
440
+ cat <<EOF | kubectl create -f -
441
+
442
+ apiVersion: v1
443
+ kind: Pod
444
+ metadata:
445
+ name: $POD_NAME
446
+ spec:
447
+ containers:
448
+ - name: $POD_NAME
449
+ image: sickp/alpine-sshd:7.4
450
+ ports:
451
+ - containerPort: 2222
452
+ volumeMounts:
453
+ - mountPath: /etc/ssh/sshd_config
454
+ name: ssh-config
455
+ subPath: sshd_config
456
+ - mountPath: /etc/ssh/authorized_keys
457
+ name: ssh-config
458
+ subPath: authorized_keys
459
+ volumes:
460
+ - name: ssh-config
461
+ configMap:
462
+ name: $CONFIG_MAP_NAME
463
+ EOF
464
+
465
+ fi
466
+
467
+ # You need a recent kubectl for wait to work (1.15 works), install or upgrade
468
+ # with brew :
469
+ # brew install kubernetes-cli
470
+ # brew upgrade kubernetes-cli
471
+ kubectl wait --for=condition=Ready pod/$POD_NAME
472
+
473
+ # kube port-forward
474
+ lsof -ti tcp:$SSH_LOCAL_PORT | xargs kill
475
+ kubectl port-forward $POD_NAME $SSH_LOCAL_PORT:2222 &
476
+ while ! nc -z 127.0.0.1 $SSH_LOCAL_PORT; do
477
+ sleep 1
478
+ done
479
+ echo "forwarding ssh via local port $SSH_LOCAL_PORT"
480
+ echo "remember to terminate the bastion with 'stop_ssh_bastion'"
481
+ }
482
+
483
+ stop_ssh_bastion() {
484
+ POD_NAME=ssh-bastion-$USERNAME
485
+ kubectl delete pod $POD_NAME
486
+ }
487
+
488
+ #!/usr/bin/env bash
489
+
490
+ configure_kubectl_for() {
491
+ local infra_env="$1"
492
+ local valid_envs="[testing][staging][production][performance][tests][recette]"
493
+ echo "$valid_envs" | grep -q "\[$infra_env\]"
494
+
495
+ if [ $? -ne 0 ]; then
496
+ echo "Cannot configure kubectl for invalid env : $infra_env"
497
+ echo "choose one of $valid_envs"
498
+ return 1
499
+ fi
500
+
501
+ aws eks update-kubeconfig --name "toutatis-$infra_env-eks" >&2
502
+ }
503
+
504
+ #!/usr/bin/env bash
505
+
506
+ # WARNING : never try to do a dump directly from the database_production_ca
507
+ # this could cause lot of lock database issues.
508
+ # always use database_production_read_replica_ca instead
509
+ database_k8s() {
510
+ MODE=$1
511
+ case $MODE in
512
+ "tests") SSH_LOCAL_PORT=2224;PG_LOCAL_PORT=24440;CA_LOCAL_PORT=25430;ENV="tests";;
513
+ "testing") SSH_LOCAL_PORT=2225;PG_LOCAL_PORT=24441;CA_LOCAL_PORT=25431;ENV="testing";;
514
+ "staging") SSH_LOCAL_PORT=2226;PG_LOCAL_PORT=24442;CA_LOCAL_PORT=25432;ENV="staging";;
515
+ "production") SSH_LOCAL_PORT=2227;PG_LOCAL_PORT=24443;CA_LOCAL_PORT=25433;ENV="production";;
516
+ "production_rw") SSH_LOCAL_PORT=2227;PG_LOCAL_PORT=24444;CA_LOCAL_PORT=25434;ENV="production";;
517
+ "recette") SSH_LOCAL_PORT=2228;PG_LOCAL_PORT=24446;CA_LOCAL_PORT=25436;ENV="recette";;
518
+ *) echo "Unsupported ENV : $MODE"; return 1 ;;
519
+ esac
520
+
521
+ start_ssh_bastion $ENV $SSH_LOCAL_PORT
522
+
523
+ lsof -ti tcp:$PG_LOCAL_PORT | xargs kill
524
+
525
+ bastion_config=$(mktemp)
526
+ cat > "$bastion_config" <<EOF
527
+ UserKnownHostsFile /dev/null
528
+ StrictHostKeyChecking no
529
+ User root
530
+ Host bastion_tests
531
+ HostName 127.0.0.1
532
+ Port 2224
533
+ LocalForward 24440 toutatis-tests-db.ca0rjdmnxf1x.eu-west-1.rds.amazonaws.com:5432
534
+ Host bastion_testing
535
+ HostName 127.0.0.1
536
+ Port 2225
537
+ LocalForward 24441 toutatis-testing-db.ca0rjdmnxf1x.eu-west-1.rds.amazonaws.com:5432
538
+ LocalForward 25431 toutatis-testing-mysql-db.ca0rjdmnxf1x.eu-west-1.rds.amazonaws.com:3306
539
+ LocalForward 25531 testapirds.ca0rjdmnxf1x.eu-west-1.rds.amazonaws.com:3306
540
+ Host bastion_staging
541
+ HostName 127.0.0.1
542
+ Port 2226
543
+ LocalForward 24442 toutatis-staging-db.ca0rjdmnxf1x.eu-west-1.rds.amazonaws.com:5432
544
+ LocalForward 25432 toutatis-staging-mysql-db.ca0rjdmnxf1x.eu-west-1.rds.amazonaws.com:3306
545
+ Host bastion_recette
546
+ HostName 127.0.0.1
547
+ Port 2228
548
+ LocalForward 24446 toutatis-recette-db.ca0rjdmnxf1x.eu-west-1.rds.amazonaws.com:5432
549
+ LocalForward 25436 toutatis-recette-mysql-db.ca0rjdmnxf1x.eu-west-1.rds.amazonaws.com:3306
550
+ LocalForward 25536 testapirds.ca0rjdmnxf1x.eu-west-1.rds.amazonaws.com:3306
551
+ Host bastion_production
552
+ HostName 127.0.0.1
553
+ Port 2227
554
+ LocalForward 24443 toutatis-production-db-replica.ca0rjdmnxf1x.eu-west-1.rds.amazonaws.com:5432
555
+ LocalForward 25433 toutatis-production-mysql-db-replica.ca0rjdmnxf1x.eu-west-1.rds.amazonaws.com:3306
556
+ EOF
557
+ if [ "$MODE" = "production_rw" ] ; then
558
+ cat >> "$bastion_config" <<EOF
559
+ LocalForward 24444 toutatis-production-db.ca0rjdmnxf1x.eu-west-1.rds.amazonaws.com:5432
560
+ LocalForward 25434 toutatis-production-mysql-db.ca0rjdmnxf1x.eu-west-1.rds.amazonaws.com:3306
561
+ EOF
562
+ fi
563
+
564
+ ssh -f -N \
565
+ -F "$bastion_config" \
566
+ "bastion_$ENV"
567
+
568
+ echo "sample command : 'psql postgres://postgres@127.0.0.1:$PG_LOCAL_PORT'"
569
+ echo "sample command : 'mysql -u colisweb -h 127.0.0.1 -P $CA_LOCAL_PORT -p db_name'"
570
+
571
+ echo "run 'kubectl delete pod $POD_NAME' when you have finished"
572
+ }
573
+
574
+ psql_on_k8() {
575
+ NAMESPACE=$1
576
+ SERVICE=$2
577
+ CONNECTION=$3
578
+ shift 3
579
+
580
+ kubectl -n $NAMESPACE run ${SERVICE}-database-init \
581
+ --image jbergknoff/postgresql-client \
582
+ --restart=Never \
583
+ --attach --rm \
584
+ -- \
585
+ postgresql://${CONNECTION} \
586
+ "$*"
587
+ }
588
+
589
+ mysql_on_k8() {
590
+ local namespace=$1
591
+ local db_host=$2
592
+ local db_port=$3
593
+ local db_init_username=$4
594
+ local db_init_password=$5
595
+ local query=$6
596
+
597
+ kubectl -n ${namespace} run datadog-database-init \
598
+ --image widdpim/mysql-client \
599
+ --restart=Never \
600
+ --attach --rm \
601
+ -- \
602
+ mysql --host=$db_host --user=$db_init_username --password=$db_init_password --port=$db_port --execute="$query"
603
+ }
604
+ #!/usr/bin/env bash
605
+
606
+ kube_init_database_once() {
607
+
608
+ extract_args 8 namespace db_host db_port db_init_username db_init_password db_database db_username db_password $*
609
+
610
+ echo "======================="
611
+ echo " Initializing Database '$db_database' for namespace $namespace"
612
+ echo "======================="
613
+
614
+ set -x
615
+
616
+ echo "Checking if Database '$db_database' exists"
617
+ set +e
618
+ psql_on_k8 $namespace once "$db_init_username:$db_init_password@$db_host:$db_port" -lqtA | cut -d\| -f1 | grep "^$db_database$"
619
+ return_code=$?
620
+ set -e
621
+
622
+ if [ ${return_code} -eq 0 ]; then
623
+ echo "Database $db_database already exists - nothing to do"
624
+ else
625
+ echo "Database $db_database does not exist - initializing"
626
+
627
+ psql_on_k8 $namespace once "$db_init_username:$db_init_password@$db_host:$db_port" -c 'CREATE DATABASE '"$db_database"';'
628
+ echo "DB created $db_database"
629
+
630
+ psql_on_k8 $namespace once "$db_init_username:$db_init_password@$db_host:$db_port" -c 'CREATE USER '"$db_username"' WITH ENCRYPTED PASSWORD '"'$db_password'"';'
631
+ echo "USER created $db_username"
632
+
633
+ psql_on_k8 $namespace once "$db_init_username:$db_init_password@$db_host:$db_port" -c 'GRANT ALL PRIVILEGES ON DATABASE '"$db_database"' TO '"$db_username"';'
634
+ echo "Granted all privileges for $db_username on $db_database"
635
+ fi
636
+
637
+ echo "======================="
638
+ echo " Database '$db_database' Initialization complete for namespace $namespace"
639
+ echo "======================="
640
+ }
641
+
642
+ kube_init_database_readonly_account() {
643
+
644
+ extract_args 6 namespace service db_connection db_database db_readonly_username db_readonly_password $*
645
+
646
+ echo "======================="
647
+ echo " Initializing Readonly Account '$db_readonly_username' for '$db_database' for namespace $namespace"
648
+ echo "======================="
649
+
650
+ # Print commands before execution, except echo
651
+ trap '[[ $BASH_COMMAND != echo* ]] && echo $BASH_COMMAND' DEBUG
652
+
653
+ echo "Checking if Readonly account '$db_readonly_username' for '$db_database' exists"
654
+ set +e
655
+ psql_on_k8 $namespace $service $db_connection -qtAc 'SELECT rolname FROM pg_roles;' | grep "^$db_readonly_username$"
656
+ return_code=$?
657
+ set -e
658
+
659
+ if [ ${return_code} -eq 0 ]; then
660
+ echo "Account $db_readonly_username already exists - nothing to do"
661
+ else
662
+ echo "Account $db_readonly_username does not exist - creating"
663
+
664
+ psql_on_k8 $namespace $service $db_connection -c 'CREATE USER '"$db_readonly_username"' WITH ENCRYPTED PASSWORD '"'$db_readonly_password'"';'
665
+ psql_on_k8 $namespace $service $db_connection -c 'GRANT CONNECT ON DATABASE '"$db_database"' TO '"$db_readonly_username"';'
666
+ psql_on_k8 $namespace $service $db_connection -c 'GRANT USAGE ON SCHEMA public TO '"$db_readonly_username"';'
667
+ psql_on_k8 $namespace $service $db_connection -c 'GRANT SELECT ON ALL TABLES IN SCHEMA public TO '"$db_readonly_username"';'
668
+ psql_on_k8 $namespace $service $db_connection -c 'ALTER DEFAULT PRIVILEGES IN SCHEMA public GRANT SELECT ON TABLES TO '"$db_readonly_username"';'
669
+
670
+ echo "Created user with read-only permissions for $db_readonly_username on $db_database (schema public)"
671
+ fi
672
+ }
673
+
674
+ kube_init_datadog_in_database() {
675
+ extract_args 8 namespace db_host db_port db_init_username db_init_password db_datadog_username db_datadog_password db_datadog_schema $*
676
+
677
+ echo "======================="
678
+ echo " Initializing Datadog Agent Requiement for namespace $namespace"
679
+ echo "======================="
680
+
681
+ echo "Checking if User '$db_datadog_username' exists"
682
+ set +e
683
+ mysql_on_k8 $namespace $db_host $db_port $db_init_username $db_init_password 'SELECT user FROM mysql.user;' | grep "^$db_datadog_username$"
684
+ return_code=$?
685
+ set -e
686
+
687
+ if [ ${return_code} -eq 0 ]; then
688
+ echo "User $db_datadog_username already exists - nothing to do"
689
+ else
690
+ echo "User $db_datadog_username does not exist - initializing"
691
+
692
+ # All the query come from this docs : https://docs.datadoghq.com/fr/database_monitoring/setup_mysql/selfhosted/?tab=mysql56
693
+
694
+ mysql_on_k8 $namespace $db_host $db_port $db_init_username $db_init_password 'CREATE USER '"$db_datadog_username"'@"%" IDENTIFIED BY '"'$db_datadog_password'"';'
695
+ echo "USER created $db_datadog_username"
696
+
697
+ mysql_on_k8 $namespace $db_host $db_port $db_init_username $db_init_password 'GRANT REPLICATION CLIENT ON *.* TO datadog@"%" WITH MAX_USER_CONNECTIONS 5;'
698
+ echo "ALTER USER $db_datadog_username"
699
+
700
+ mysql_on_k8 $namespace $db_host $db_port $db_init_username $db_init_password 'GRANT PROCESS ON *.* TO '"$db_datadog_username"'@"%";'
701
+ echo "Granted PROCESS for $db_datadog_username"
702
+
703
+ mysql_on_k8 $namespace $db_host $db_port $db_init_username $db_init_password 'GRANT SELECT ON performance_schema.* TO '"$db_datadog_username"'@"%";'
704
+ echo "Granted SELECT on performance_schema for $db_datadog_username"
705
+
706
+ mysql_on_k8 $namespace $db_host $db_port $db_init_username $db_init_password 'CREATE SCHEMA IF NOT EXISTS datadog;'
707
+ echo "CREATE SCHEMA datadog"
708
+
709
+ mysql_on_k8 $namespace $db_host $db_port $db_init_username $db_init_password 'GRANT EXECUTE ON datadog.* to '"$db_datadog_username"'@"%";'
710
+ echo "Granted 'GRANT EXECUTE for $db_datadog_username on datadog"
711
+
712
+ mysql_on_k8 $namespace $db_host $db_port $db_init_username $db_init_password 'GRANT CREATE TEMPORARY TABLES ON datadog.* TO '"$db_datadog_username"'@"%";'
713
+ echo "Granted CREATE TEMPORARY TABLES for $db_datadog_username"
714
+
715
+
716
+ mysql_on_k8 $namespace $db_host $db_port $db_init_username $db_init_password 'DROP PROCEDURE IF EXISTS datadog.explain_statement;
717
+ DELIMITER $$
718
+ CREATE PROCEDURE datadog.explain_statement(IN query TEXT)
719
+ SQL SECURITY DEFINER
720
+ BEGIN
721
+ SET @explain := CONCAT("EXPLAIN FORMAT=json ", query);
722
+ PREPARE stmt FROM @explain;
723
+ EXECUTE stmt;
724
+ DEALLOCATE PREPARE stmt;
725
+ END $$
726
+ DELIMITER ;'
727
+ echo "CREATE PROCEDURE PROCEDURE datadog.explain_statement"
728
+
729
+ mysql_on_k8 $namespace $db_host $db_port $db_init_username $db_init_password 'DROP PROCEDURE IF EXISTS '"$db_datadog_username"'.explain_statement;
730
+ DELIMITER $$
731
+ CREATE PROCEDURE '"$db_datadog_username"'.explain_statement(IN query TEXT)
732
+ SQL SECURITY DEFINER
733
+ BEGIN
734
+ SET @explain := CONCAT("EXPLAIN FORMAT=json ", query);
735
+ PREPARE stmt FROM @explain;
736
+ EXECUTE stmt;
737
+ DEALLOCATE PREPARE stmt;
738
+ END $$
739
+ DELIMITER ;
740
+ GRANT EXECUTE ON PROCEDURE '"$db_datadog_username"'.explain_statement TO datadog@"%";'
741
+ echo "CREATE PROCEDURE on SCHEMA $db_datadog_schema for $db_datadog_username"
742
+
743
+ mysql_on_k8 $namespace $db_host $db_port $db_init_username $db_init_password 'DROP PROCEDURE IF EXISTS datadog.enable_events_statements_consumers;
744
+ DELIMITER $$
745
+ CREATE PROCEDURE datadog.enable_events_statements_consumers()
746
+ SQL SECURITY DEFINER
747
+ BEGIN
748
+ UPDATE performance_schema.setup_consumers SET enabled="YES" WHERE name LIKE "events_statements_%";
749
+ END $$
750
+ DELIMITER ;
751
+ GRANT EXECUTE ON PROCEDURE datadog.enable_events_statements_consumers TO datadog@"%";'
752
+
753
+ echo "CREATE PROCEDURE on datadog.enable_events_statements_consumers"
754
+ fi
755
+
756
+ echo "======================="
757
+ echo " Database '$db_datadog_schema' Initialization complete for namespace $namespace"
758
+ echo "======================="
759
+ }
760
+
761
+ kube_init_datadog_in_postgres_database() {
762
+ extract_args 7 namespace db_host db_port db_init_username db_init_password db_datadog_username db_datadog_password $*
763
+
764
+ local service="datadog"
765
+ local db_connection="$db_init_username:$db_init_password@$db_host:$db_port"
766
+
767
+ echo "======================="
768
+ echo " Initializing $service Agent On PostgresSQL Database Requirement for namespace $namespace"
769
+ echo "======================="
770
+
771
+ echo "Checking if User '$db_datadog_username' exists"
772
+
773
+ set +e
774
+ if psql_on_k8 $namespace $service $db_connection -qtAc 'SELECT usename FROM pg_catalog.pg_user;' | grep "^$db_datadog_username$";
775
+ then
776
+ echo "User $db_datadog_username already exists - nothing to do"
777
+ else
778
+ echo "User $db_datadog_username does not exist - initializing"
779
+
780
+ set -e
781
+ psql_on_k8 $namespace $service $db_connection -qc 'CREATE USER '"$db_datadog_username"' WITH password '"'$db_datadog_password'"';'
782
+ echo "User created $db_datadog_username"
783
+
784
+ psql_on_k8 $namespace $service $db_connection -qc 'CREATE SCHEMA datadog;'
785
+ echo "Schema datadog created"
786
+
787
+ psql_on_k8 $namespace $service $db_connection -qc 'GRANT USAGE ON SCHEMA datadog TO datadog;'
788
+ echo "Granted usage for datadog schema to datadog"
789
+
790
+ psql_on_k8 $namespace $service $db_connection -qc 'GRANT USAGE ON SCHEMA public TO datadog;'
791
+ echo "Granted usage for public schema to datadog"
792
+
793
+ psql_on_k8 $namespace $service $db_connection -qc 'GRANT pg_monitor TO datadog;'
794
+ echo "Granted pg_monitor to datadog"
795
+
796
+ psql_on_k8 $namespace $service $db_connection -qc 'CREATE EXTENSION IF NOT EXISTS pg_stat_statements schema public;'
797
+ echo "Extension pg_stat_statements created"
798
+
799
+ local datadog_function_path="/tmp/datatog-explain-statement-function.sql"
800
+ local datadog_function="CREATE OR REPLACE FUNCTION datadog.explain_statement(
801
+ l_query TEXT,
802
+ OUT explain JSON
803
+ )
804
+ RETURNS SETOF JSON AS
805
+ \\$\\$
806
+ DECLARE
807
+ curs REFCURSOR;
808
+ plan JSON;
809
+
810
+ BEGIN
811
+ OPEN curs FOR EXECUTE pg_catalog.concat('EXPLAIN (FORMAT JSON) ', l_query);
812
+ FETCH curs INTO plan;
813
+ CLOSE curs;
814
+ RETURN QUERY SELECT plan;
815
+ END;
816
+ \\$\\$
817
+ LANGUAGE 'plpgsql'
818
+ RETURNS NULL ON NULL INPUT
819
+ SECURITY DEFINER;"
820
+
821
+ kubectl -n $namespace run $service-database-init \
822
+ --image jbergknoff/postgresql-client \
823
+ --restart=Never \
824
+ --attach --rm \
825
+ --command \
826
+ -- \
827
+ /bin/sh -c "echo -e \"$datadog_function\" > $datadog_function_path; psql postgresql://$db_connection -qf $datadog_function_path"
828
+
829
+ echo "Function datadog.explain_statement created"
830
+ fi
831
+
832
+ echo "======================="
833
+ echo " Database $service Initialization complete for namespace $namespace"
834
+ echo "======================="
835
+ }
836
+
837
+ kube_init_service_database() {
838
+
839
+ extract_args 9 namespace service db_host db_port db_init_username db_init_password db_database db_username db_password $*
840
+
841
+ local db_connection="$db_init_username:$db_init_password@$db_host:$db_port"
842
+
843
+ set -x
844
+
845
+ echo "Checking if Database '$db_database' exists"
846
+ set +e
847
+ psql_on_k8 $namespace $service $db_connection -lqtA | cut -d\| -f1 | grep "^$db_database$"
848
+ return_code=$?
849
+ set -e
850
+
851
+ if [ ${return_code} -eq 0 ]; then
852
+ echo "Database $db_database already exists - nothing to do"
853
+ else
854
+ echo "Database $db_database does not exist - initializing"
855
+
856
+ psql_on_k8 $namespace $service $db_connection -c 'CREATE DATABASE '"$db_database"';'
857
+ echo "DB created $db_database"
858
+
859
+ psql_on_k8 $namespace $service $db_connection -c 'CREATE USER '"$db_username"' WITH ENCRYPTED PASSWORD '"'$db_password'"';'
860
+ echo "USER created $db_username"
861
+
862
+ psql_on_k8 $namespace $service $db_connection -c 'GRANT ALL PRIVILEGES ON DATABASE '"$db_database"' TO '"$db_username"';'
863
+ echo "Granted all privileges for $db_username on $db_database"
864
+ fi
865
+
866
+ echo "======================="
867
+ echo " Database '$db_database' Initialization complete for namespace $namespace"
868
+ echo "======================="
869
+ }
870
+
871
+ #!/usr/bin/env bash
872
+
873
+ # Port forward on the first matching pod
874
+ # Ex :
875
+ # pod_forward testing notification-http
876
+ # pod_forward testing colisweb-api-web 3333 3000
877
+ pod_forward() {
878
+ ENV=$1
879
+ POD_FILTER=$2
880
+ LOCAL_PORT=${3:-8080}
881
+ POD_PORT=${4:-8080}
882
+
883
+ if PID=$(lsof -ti tcp:$LOCAL_PORT); then
884
+ echo "killing process $PID which uses port $LOCAL_PORT"
885
+ kill $PID
886
+ fi
887
+
888
+ configure_kubectl_for $ENV
889
+
890
+ POD=`pick_pod $ENV $POD_FILTER`
891
+
892
+ echo "setting up forwarding to $POD"
893
+ kubectl -n $ENV port-forward $POD $LOCAL_PORT:$POD_PORT &
894
+ PID=$!
895
+
896
+ while ! echo exit | nc localhost $LOCAL_PORT > /dev/null; do
897
+ sleep 1
898
+ echo "waiting for port $LOCAL_PORT to be open locally"
899
+ done
900
+ echo "port $LOCAL_PORT is now available on localhost, forwarding to $ENV $POD:$POD_PORT"
901
+ echo 'you can terminate it with "kill '$PID'" or "kill $(lsof -ti tcp:'$LOCAL_PORT')"'
902
+ }
903
+
904
+ # prompts to pick a pod and run a command like bash inside
905
+ # pod_exec testing
906
+ # pod_exec testing bash
907
+ # pod_exec testing bash colisweb-api
908
+ pod_exec() {
909
+ ENV=$1
910
+ COMMAND=${2:-bash}
911
+ configure_kubectl_for $ENV
912
+ POD_FILTER=$3
913
+ POD=`pick_pod $ENV $POD_FILTER`
914
+ echo "running $COMMAND inside $POD"
915
+ kubectl -n $ENV exec -ti $POD -- $COMMAND
916
+ }
917
+
918
+ # prompts to pick a pod and copy from a local file to the pod
919
+ # pod_copy_to testing localfile remotefile
920
+ # pod_copy_to testing localfile remotefile colisweb-api
921
+ pod_copy_to() {
922
+ ENV=$1
923
+ LOCAL_FILE=$2
924
+ REMOTE_FILE=$3
925
+ configure_kubectl_for $ENV
926
+ POD_FILTER=$4
927
+ POD=`pick_pod $ENV $POD_FILTER`
928
+ kubectl cp $LOCAL_FILE $ENV/$POD:$REMOTE_FILE
929
+ }
930
+
931
+
932
+ pick_pod() {
933
+ ENV=$1
934
+ POD_FILTER="pod/$2"
935
+ configure_kubectl_for $ENV
936
+
937
+ if [ -z "$2" ] ; then
938
+ kubectl -n $ENV get pods | gum filter | cut -f1 -d" "
939
+ else
940
+ if PODS=$(kubectl -n $ENV get pods -o=name | grep "$POD_FILTER"); then
941
+ echo $PODS | head -1 | sed -e 's/pod\///'
942
+ else
943
+ echo "no pods found on $ENV matching $POD_FILTER" >&2
944
+ fi
945
+ fi
946
+ }
947
+
948
+ #!/usr/bin/env bash
949
+
950
+ redis_k8s() {
951
+ MODE=$1
952
+ case $MODE in
953
+ "testing") SSH_LOCAL_PORT=2225;REDIS_LOCAL_PORT=63791;ENV="testing";;
954
+ "staging") SSH_LOCAL_PORT=2226;REDIS_LOCAL_PORT=63792;ENV="staging";;
955
+ "production") SSH_LOCAL_PORT=2227;REDIS_LOCAL_PORT=63793;ENV="production";;
956
+ *) echo "Unsupported ENV : $MODE"; return 1 ;;
957
+ esac
958
+
959
+ start_ssh_bastion $ENV $SSH_LOCAL_PORT
960
+
961
+ lsof -ti tcp:$REDIS_LOCAL_PORT | xargs kill
962
+
963
+ bastion_config=$(mktemp)
964
+ cat > "$bastion_config" <<EOF
965
+ UserKnownHostsFile /dev/null
966
+ StrictHostKeyChecking no
967
+ User root
968
+ Host bastion_testing
969
+ HostName 127.0.0.1
970
+ Port 2225
971
+ LocalForward 63791 redis-testing.xufte6.0001.euw1.cache.amazonaws.com:6379
972
+ Host bastion_staging
973
+ HostName 127.0.0.1
974
+ Port 2226
975
+ LocalForward 63792 redis-sandbox.xufte6.0001.euw1.cache.amazonaws.com:6379
976
+ Host bastion_production
977
+ HostName 127.0.0.1
978
+ Port 2227
979
+ LocalForward 63793 redis-prod.xufte6.0001.euw1.cache.amazonaws.com:6379
980
+ EOF
981
+
982
+ ssh -f -N \
983
+ -F "$bastion_config" \
984
+ "bastion_$ENV"
985
+
986
+ echo "sample command : 'redis-cli -p $REDIS_LOCAL_PORT'"
987
+ echo "run 'kubectl delete pod $POD_NAME' when you have finished"
988
+
989
+ redis-cli -p $REDIS_LOCAL_PORT
990
+ }
991
+
992
+ #!/usr/bin/env bash
993
+
994
+ #Create a k8s cron jobs that will be run regularly
995
+ #See run_cron_job_k8s -h for more details
996
+
997
+ run_cron_job_k8s() {
998
+
999
+ #default values
1000
+ local namespace="testing"
1001
+ local name="$USERNAME"
1002
+ local SCHEDULE="00 05 * * *"
1003
+ local secret=""
1004
+ local amm_folder=""
1005
+ local amm_script=""
1006
+
1007
+ while getopts ":e:c:p:f:s:t:h" opt; do
1008
+ case $opt in
1009
+ e)
1010
+ namespace="$OPTARG" >&2
1011
+ ;;
1012
+ t)
1013
+ SCHEDULE="$OPTARG" >&2
1014
+ ;;
1015
+ p)
1016
+ name="$OPTARG" >&2
1017
+ ;;
1018
+ c)
1019
+ secret="$OPTARG" >&2
1020
+ ;;
1021
+ f)
1022
+ amm_folder="$OPTARG" >&2
1023
+ ;;
1024
+ s)
1025
+ amm_script="$OPTARG" >&2
1026
+ ;;
1027
+ h)
1028
+ show_help_cron_job
1029
+ return 0
1030
+ ;;
1031
+ :)
1032
+ echo "Option -$OPTARG requires an argument. Run run_cron_job_k8s -h for help" >&2
1033
+ return 0
1034
+ ;;
1035
+ \?)
1036
+ echo "Invalid option: -$OPTARG. Run run_cron_job_k8s -h for help" >&2
1037
+ return 0
1038
+ ;;
1039
+ esac
1040
+ done
1041
+
1042
+ if [ -z "$amm_script" ]; then
1043
+ echo 'Missing -s. Run run_cron_job_k8s -h for help' >&2
1044
+ return 0
1045
+ fi
1046
+
1047
+ shift "$((OPTIND-1))"
1048
+
1049
+ local script_args=$(
1050
+ if [ "$#" -gt 0 ] ; then
1051
+ printf '"'
1052
+ join_by '", "' $*
1053
+ printf '"'
1054
+ fi
1055
+ )
1056
+
1057
+ local IMAGE="lolhens/ammonite:2.5.4"
1058
+ local CRONJOB_NAME="cronjob-ammonite-$name"
1059
+
1060
+
1061
+ configure_kubectl_for $namespace
1062
+
1063
+ if [[ ! -r "$amm_script" ]]; then
1064
+ echo "ammonite script not found $amm_script"
1065
+ return 2
1066
+ else
1067
+ local CONFIG_MAP="config-$CRONJOB_NAME"
1068
+ local SECRET_MAP="secret-$CRONJOB_NAME"
1069
+ local CONFIG_MAP_DIR="$(mktemp -d)"
1070
+
1071
+ if [[ ! -z $amm_folder && -d $amm_folder ]] ; then
1072
+ cp -r "$amm_folder/" "$CONFIG_MAP_DIR"
1073
+ fi
1074
+ cp "$amm_script" "$CONFIG_MAP_DIR/script.sc"
1075
+
1076
+ kubectl -n $namespace get configmap $CONFIG_MAP && kubectl -n $namespace delete configmap $CONFIG_MAP
1077
+ kubectl -n $namespace create configmap $CONFIG_MAP --from-file="$CONFIG_MAP_DIR"
1078
+
1079
+ kubectl -n $namespace get secret $SECRET_MAP && kubectl -n $namespace delete secret $SECRET_MAP
1080
+ kubectl -n $namespace create secret generic $SECRET_MAP --from-file="$secret"
1081
+
1082
+ kubectl -n $namespace get cronjob $CRONJOB_NAME && kubectl -n $namespace delete cronjob $CRONJOB_NAME
1083
+
1084
+ echo "starting $CRONJOB_NAME with $IMAGE"
1085
+
1086
+ JOB_DEFINITION='
1087
+ apiVersion: batch/v1
1088
+ kind: CronJob
1089
+ metadata:
1090
+ name: '$CRONJOB_NAME'
1091
+ namespace: '$namespace'
1092
+ spec:
1093
+ schedule: "'$SCHEDULE'"
1094
+ concurrencyPolicy: Forbid
1095
+ jobTemplate:
1096
+ spec:
1097
+ backoffLimit: 0
1098
+ template:
1099
+ spec:
1100
+ nodeSelector:
1101
+ workType: "workers"
1102
+ restartPolicy: Never
1103
+ volumes:
1104
+ - name: config
1105
+ configMap:
1106
+ name: '$CONFIG_MAP'
1107
+ - name: secret
1108
+ secret:
1109
+ secretName: '$SECRET_MAP'
1110
+ containers:
1111
+ - name: '$CRONJOB_NAME'
1112
+ command: ["amm", "/code/script.sc"]
1113
+ image: '$IMAGE'
1114
+ imagePullPolicy: IfNotPresent
1115
+ args: ['$script_args']
1116
+ env:
1117
+ - name: POD_NAME
1118
+ valueFrom:
1119
+ fieldRef:
1120
+ apiVersion: v1
1121
+ fieldPath: metadata.name
1122
+ - name: POD_NAMESPACE
1123
+ valueFrom:
1124
+ fieldRef:
1125
+ apiVersion: v1
1126
+ fieldPath: metadata.namespace
1127
+ - name: HOST_IP
1128
+ valueFrom:
1129
+ fieldRef:
1130
+ apiVersion: v1
1131
+ fieldPath: status.hostIP
1132
+ volumeMounts:
1133
+ - name: config
1134
+ mountPath: /code
1135
+ - name: secret
1136
+ mountPath: /conf
1137
+ readOnly: true
1138
+ resources:
1139
+ requests:
1140
+ cpu: 500m
1141
+ memory: 256Mi
1142
+ limits:
1143
+ cpu: 4000m
1144
+ memory: 512Mi
1145
+ envFrom:
1146
+ - configMapRef:
1147
+ name: '$CONFIG_MAP'
1148
+ - secretRef:
1149
+ name: '$SECRET_MAP'
1150
+ '
1151
+
1152
+ echo $JOB_DEFINITION > /tmp/job.yaml
1153
+
1154
+ kubectl -n $namespace apply -f /tmp/job.yaml
1155
+
1156
+ fi
1157
+ }
1158
+
1159
+ # Usage info
1160
+ show_help_cron_job() {
1161
+ #p:f:s
1162
+ local help="""Usage: run_cron_job_k8s -s SCRIPT [-t TIME] [-e ENV] [-c CONFIG] [-p POD] [-f FOLDER] [ARGS]
1163
+ Create a k8s cron job that will be run a script regularly
1164
+
1165
+ -h display this help and exit
1166
+ -s SCRIPT run script SCRIPT on a pod (SCRIPT must be a .sc file)
1167
+ -t TIME opt. time when the job will be launched. TIME should be in CRON syntax (default to 00 05 * * *, ie 5AM UTC)
1168
+ -e ENV opt. set execution environment (default to testing)
1169
+ -c CONFIG opt. secret file needed for the script (must be a .sc file, not a .secret file)
1170
+ -p POD opt. name of the pod to create (default to $USERNAME)
1171
+ -f FOLDER opt. name of the folder containing the scripts to execute (if SCRIPT needs other files)
1172
+ ARGS opt. additional arguments for SCRIPT
1173
+ """
1174
+ echo "$help"
1175
+ }
1176
+
1177
+ #!/usr/bin/env bash
1178
+
1179
+ # Usage info
1180
+ show_help_job() {
1181
+ local help="""Usage: run_job_k8s -s SCRIPT [-e ENV] [-c CONFIG] [-p POD] [-f FOLDER] [ARGS]
1182
+ Create a k8s job executing a script
1183
+
1184
+ -h display this help and exit
1185
+ -s SCRIPT run script SCRIPT on a pod (SCRIPT must be a .sc file)
1186
+ -e ENV opt. set execution environment (default to testing)
1187
+ -c CONFIG opt. secret file needed for the script (must be a .sc file, not a .secret file)
1188
+ -p POD opt. name of the pod to create (default to $USERNAME)
1189
+ -f FOLDER opt. name of the folder containing the scripts to execute (if SCRIPT needs other files)
1190
+ ARGS opt. additional arguments for SCRIPT
1191
+
1192
+ The organisation of the files must be the same locally as on the pod :
1193
+ - /code containing the script to execute (arg -s) and the other needed files (if the arg -f is used, it must reference this directory)
1194
+ - /conf containing the secret file (arg -c if used)
1195
+ E.g. in the script \"/code/script.sc\", to use a secret file \"/conf/secret.sc\", the import should look like \"import \$file.^.conf.secret.sc\"
1196
+ """
1197
+ echo "$help"
1198
+ }
1199
+
1200
+ run_job_k8s() {
1201
+
1202
+ #default values
1203
+ local namespace="testing"
1204
+ local name="$USERNAME"
1205
+ local secret=""
1206
+ local amm_folder=""
1207
+ local amm_script=""
1208
+
1209
+ while getopts ":e:c:p:f:s:h" opt; do
1210
+ case $opt in
1211
+ e)
1212
+ namespace="$OPTARG" >&2
1213
+ ;;
1214
+ p)
1215
+ name="$OPTARG" >&2
1216
+ ;;
1217
+ c)
1218
+ secret="$OPTARG" >&2
1219
+ ;;
1220
+ f)
1221
+ amm_folder="$OPTARG" >&2
1222
+ ;;
1223
+ s)
1224
+ amm_script="$OPTARG" >&2
1225
+ ;;
1226
+ h)
1227
+ show_help_job
1228
+ return 0
1229
+ ;;
1230
+ :)
1231
+ echo "Option -$OPTARG requires an argument. Run run_cron_job_k8s -h for help" >&2
1232
+ return 0
1233
+ ;;
1234
+ \?)
1235
+ echo "Invalid option: -$OPTARG. Run run_cron_job_k8s -h for help" >&2
1236
+ return 0
1237
+ ;;
1238
+ esac
1239
+ done
1240
+
1241
+ if [ -z "$amm_script" ]; then
1242
+ echo 'Missing -s. Run run_job_k8s -h for help' >&2
1243
+ return 0
1244
+ fi
1245
+
1246
+ shift "$((OPTIND-1))"
1247
+
1248
+ local script_args=$(
1249
+ if [ "$#" -gt 0 ] ; then
1250
+ printf '"'
1251
+ join_by '", "' $*
1252
+ printf '"'
1253
+ fi
1254
+ )
1255
+
1256
+ local IMAGE="lolhens/ammonite:2.5.4"
1257
+ local JOB_NAME="job-ammonite-$name"
1258
+
1259
+ if [[ ! -r "$amm_script" ]]; then
1260
+ echo "ammonite script not found $amm_script"
1261
+ return 2
1262
+ else
1263
+ local CONFIG_MAP="config-$JOB_NAME"
1264
+ local CONFIG_MAP_DIR="$(mktemp -d)"
1265
+ local SECRET_MAP="secret-$JOB_NAME"
1266
+
1267
+ configure_kubectl_for $namespace
1268
+
1269
+ if [[ ! -z $amm_folder && -d $amm_folder ]] ; then
1270
+ cp -r "$amm_folder/" "$CONFIG_MAP_DIR"
1271
+ fi
1272
+ cp "$amm_script" "$CONFIG_MAP_DIR/script.sc"
1273
+
1274
+ kubectl -n $namespace get configmap $CONFIG_MAP && kubectl -n $namespace delete configmap $CONFIG_MAP
1275
+ kubectl -n $namespace create configmap $CONFIG_MAP --from-file="$CONFIG_MAP_DIR"
1276
+
1277
+ kubectl -n $namespace get secret $SECRET_MAP && kubectl -n $namespace delete secret $SECRET_MAP
1278
+ kubectl -n $namespace create secret generic $SECRET_MAP --from-file="$secret"
1279
+
1280
+ kubectl -n $namespace get job $JOB_NAME && kubectl -n $namespace delete job $JOB_NAME
1281
+
1282
+ echo "starting $JOB_NAME with $IMAGE"
1283
+ fi
1284
+
1285
+ JOB_DEFINITION='
1286
+ apiVersion: batch/v1
1287
+ kind: Job
1288
+ metadata:
1289
+ name: '$JOB_NAME'
1290
+ namespace: '$namespace'
1291
+ spec:
1292
+ template:
1293
+ spec:
1294
+ containers:
1295
+ - name: '$JOB_NAME'
1296
+ command: ["amm", "/code/script.sc"]
1297
+ image: '$IMAGE'
1298
+ args: ['$script_args']
1299
+ env:
1300
+ - name: POD_NAME
1301
+ valueFrom:
1302
+ fieldRef:
1303
+ apiVersion: v1
1304
+ fieldPath: metadata.name
1305
+ - name: POD_NAMESPACE
1306
+ valueFrom:
1307
+ fieldRef:
1308
+ apiVersion: v1
1309
+ fieldPath: metadata.namespace
1310
+ - name: HOST_IP
1311
+ valueFrom:
1312
+ fieldRef:
1313
+ apiVersion: v1
1314
+ fieldPath: status.hostIP
1315
+ volumeMounts:
1316
+ - name: config
1317
+ mountPath: /code
1318
+ - name: secret
1319
+ mountPath: /conf
1320
+ readOnly: true
1321
+ resources:
1322
+ requests:
1323
+ cpu: 500m
1324
+ memory: 256Mi
1325
+ limits:
1326
+ cpu: 4000m
1327
+ memory: 1Gi
1328
+ nodeSelector:
1329
+ workType: workers
1330
+ restartPolicy: Never
1331
+ volumes:
1332
+ - name: config
1333
+ configMap:
1334
+ name: '$CONFIG_MAP'
1335
+ - name: secret
1336
+ secret:
1337
+ secretName: '$SECRET_MAP'
1338
+ '
1339
+
1340
+
1341
+ echo $JOB_DEFINITION > /tmp/job.yaml
1342
+
1343
+ kubectl -n $namespace apply -f /tmp/job.yaml
1344
+
1345
+ }
1346
+
1347
+
1348
+ #!/usr/bin/env bash
1349
+
1350
+ run_task() {
1351
+ set -e
1352
+
1353
+ check_args "--namespace" $1
1354
+ shift
1355
+ NAMESPACE=$1
1356
+ shift
1357
+ check_args "--image" $1
1358
+ shift
1359
+ IMAGE=$1
1360
+ shift
1361
+ check_args "--name" $1
1362
+ shift
1363
+ NAME=$1
1364
+ shift
1365
+
1366
+ set -x
1367
+
1368
+ kubectl -n ${NAMESPACE} run ${NAME} \
1369
+ --image ${IMAGE} \
1370
+ --restart=Never \
1371
+ --attach --rm \
1372
+ $*
1373
+ }
1374
+ geocode_address() {
1375
+ ADDRESS=$(sed -e 's: :%20:g' <(echo "$*"))
1376
+ URL="https://maps.googleapis.com/maps/api/geocode/json?address=${ADDRESS}&key=${GOOGLE_API_KEY}"
1377
+ curl $URL
1378
+ }
1379
+
1380
+ search_business() {
1381
+ SIREN=$1
1382
+ shift
1383
+ QUERY=$(sed -e 's: :+:g' <(echo "$*"))
1384
+ URL="https://data.opendatasoft.com/api/records/1.0/search/?dataset=sirene_v3%40public&q=${QUERY}&sort=datederniertraitementetablissement&facet=trancheeffectifsetablissement&facet=libellecommuneetablissement&facet=departementetablissementi&refine.siren=${SIREN}"
1385
+ curl $URL
1386
+ }
1387
+
1388
+ #!/bin/bash
1389
+
1390
+ # source tolls.sh ; tolls antoine.thomas@colisweb.com
1391
+ function tolls() {
1392
+ USER=${1:-first.last@colisweb.com}
1393
+ FROM_DATE=${2:-"2023-02-01"}
1394
+ TO_DATE=${3:-"2023-02-28"}
1395
+
1396
+ USER=$(gum input --prompt "username : " --value $USER)
1397
+ TOKEN=$(./tour_details.sc login --user $USER --password $(gum input --password --placeholder password))
1398
+ [ "$TOKEN" != "" ] && echo "connected" || return 1
1399
+
1400
+ FROM_DATE=$(gum input --prompt "Date start : " --value $FROM_DATE)
1401
+ TO_DATE=$(gum input --prompt "Date end : " --value $TO_DATE)
1402
+ FILENAME="tours-${FROM_DATE}-TO-${TO_DATE}.json"
1403
+ curl --cookie "session=$TOKEN" "https://api.production.colisweb.com/api/v6/routes-plans/external?from=${FROM_DATE}&to=${TO_DATE}" > ~/Downloads/$FILENAME
1404
+ echo "Tournées téléchargées"
1405
+
1406
+ projectIds=$(./tour_details.sc allProjects --file ~/Downloads/$FILENAME | gum choose --no-limit | cut -d "," -f 2)
1407
+ echo "projets sélectionnés : $projectIds"
1408
+ tourIds=$(./tour_details.sc allTours --file ~/Downloads/$FILENAME --projectIds "$projectIds")
1409
+ echo "tournées sélectionnées : $tourIds"
1410
+
1411
+ TARGET="${FROM_DATE}-TO-${TO_DATE}.csv"
1412
+ echo "appels à HERE, écriture dans $TARGET"
1413
+ ./tour_details.sc allToursDetails --token $TOKEN --hereApiKey $HERE_API_KEY --routeIds "$tourIds" > "$TARGET"
1414
+
1415
+ echo "terminé"
1416
+ }
1417
+
1418
+ #!/usr/bin/env bash
1419
+
1420
+ # possible syntax:
1421
+ # login
1422
+ # login testing
1423
+ # login testing userid
1424
+ login() {
1425
+ ENV=${1:-`gum choose testing staging production recette`} && \
1426
+ USER=${2:-`gum input --placeholder username`} && \
1427
+ PASSWORD=`gum input --password --placeholder password` && \
1428
+ TOKEN=`$SCRIPT_FULL_PATH/scala/auth.sc login --env $ENV --user $USER --password $PASSWORD` && \
1429
+ export TOKEN_$ENV=$TOKEN && \
1430
+ echo "login success for $USER on $ENV" >&2
1431
+ }
1432
+
1433
+ # you need to call login first (see above)
1434
+ # possible syntax:
1435
+ # recompute_tour
1436
+ # recompute_tour testing
1437
+ # recompute_tour testing draft
1438
+ # recompute_tour testing draft 28bf9967-b5f3-4294-8855-cfd2fa36ec09
1439
+ # recompute_tour testing draft 28bf9967-b5f3-4294-8855-cfd2fa36ec09 TODAY
1440
+ # recompute_tour testing draft 28bf9967-b5f3-4294-8855-cfd2fa36ec09 FRIDAY
1441
+ recompute_tour() {
1442
+ ENV=${1:-`gum choose testing staging production recette`}
1443
+ MODE=${2:-`gum choose draft definitive`}
1444
+ PROJECT_ID=${3:-`pick_project $ENV`}
1445
+ DAY=${4:-`gum choose TODAY MONDAY TUESDAY WEDNESDAY THURSDAY FRIDAY SATURDAY SUNDAY`}
1446
+ jwt_token $ENV
1447
+ scala/tour_config.sc $MODE -t $TOKEN -p $PROJECT_ID -d $DAY
1448
+ }
1449
+
1450
+ pick_project() {
1451
+ ENV=${1:-`gum choose testing staging production recette`}
1452
+ jwt_token $ENV
1453
+ scala/tour_config.sc list -t $TOKEN -e $ENV | gum filter | cut -f1
1454
+ }
1455
+
1456
+ jwt_token() {
1457
+ ENV=${1:-`gum choose testing staging production recette`}
1458
+ eval 'TOKEN=$TOKEN_'$ENV
1459
+ if ! $SCRIPT_FULL_PATH/scala/auth.sc check -t $TOKEN -e $ENV ; then
1460
+ login $ENV
1461
+ fi
1462
+ }
1463
+
1464
+ #!/usr/bin/env bash
1465
+
1466
+ ftp_ikea_k8s() {
1467
+ SSH_LOCAL_PORT=2230
1468
+ FTP_LOCAL_PORT=25500
1469
+ start_ssh_bastion testing $SSH_LOCAL_PORT
1470
+
1471
+ lsof -ti tcp:$FTP_LOCAL_PORT | xargs kill
1472
+
1473
+ bastion_config=$(mktemp)
1474
+ cat > "$bastion_config" <<EOF
1475
+ UserKnownHostsFile /dev/null
1476
+ StrictHostKeyChecking no
1477
+ User root
1478
+ Host bastion_ftp
1479
+ HostName 127.0.0.1
1480
+ Port 2230
1481
+ LocalForward 25500 ft.centiro.ikea.com:22
1482
+ EOF
1483
+
1484
+ ssh -f -N \
1485
+ -F "$bastion_config" \
1486
+ "bastion_ftp"
1487
+
1488
+ sftp -P $FTP_LOCAL_PORT colisweb.fr@127.0.0.1
1489
+ }
1490
+
1491
+ #!/usr/bin/env bash
1492
+
1493
+ # usage:
1494
+ # jconsole_k8s testing colisweb-api-web
1495
+
1496
+ jconsole_k8s() {
1497
+ ENV=$1
1498
+ NAME=$2
1499
+
1500
+ start_ssh_bastion $ENV 2242
1501
+ POD_IP=$( \
1502
+ kubectl -n $ENV get pods -o jsonpath='{range .items[*]}{.metadata.name}{" "}{.status.podIP}{"\n"}{end}' \
1503
+ | grep "$NAME" | cut -d' ' -f2 | head -1 \
1504
+ )
1505
+ echo "selected POD with ip $POD_IP"
1506
+ echo "use 'root' as password"
1507
+ ssh -f -N -oUserKnownHostsFile=/dev/null -oStrictHostKeyChecking=no -D 7777 root@127.0.0.1 -p 2242
1508
+
1509
+ jconsole \
1510
+ -J-DsocksProxyHost=localhost \
1511
+ -J-DsocksProxyPort=7777 \
1512
+ -J-DsocksNonProxyHosts= \
1513
+ service:jmx:rmi:///jndi/rmi://$POD_IP:7199/jmxrmi \
1514
+ &
1515
+
1516
+ echo "remember to stop with 'stop_ssh_bastion'"
1517
+
1518
+ }
1519
+
1520
+ #!/usr/bin/env bash
1521
+
1522
+ # Interactive console on an new pod. See also run_ruby_k8s
1523
+ # Ex :
1524
+ # railsc_k8s production
1525
+ # railsc_k8s production "User.where(email:'toni@colisweb.com')"
1526
+ railsc_k8s() {
1527
+ ENV=$1
1528
+ COMMAND=$2
1529
+ [[ $ENV = "production" || $ENV = "staging" ]] && default_tag="master-latest" || default_tag="${ENV}-latest"
1530
+ local image_tag=${5:-$default_tag}
1531
+ local IMAGE="949316342391.dkr.ecr.eu-west-1.amazonaws.com/colisweb-api:$image_tag"
1532
+ local POD_NAME="colisweb-api-rails-console-$image_tag-$USERNAME"
1533
+
1534
+ kubectl -n $ENV get pod $POD_NAME && kubectl -n $ENV delete pod $POD_NAME
1535
+
1536
+ configure_kubectl_for $ENV
1537
+ echo "starting with $IMAGE"
1538
+
1539
+ kubectl -n $ENV run $POD_NAME \
1540
+ --image $IMAGE \
1541
+ --restart=Never \
1542
+ --overrides='{
1543
+ "spec":{
1544
+ "nodeSelector":{
1545
+ "workType": "workers"
1546
+ },
1547
+ "containers":[
1548
+ {
1549
+ "name":"'$POD_NAME'",
1550
+ "image":"'$IMAGE'",
1551
+ "imagePullPolicy":"Always",
1552
+ "command":[
1553
+ "sleep",
1554
+ "infinity"
1555
+ ],
1556
+ "resources":{
1557
+ "limits":{
1558
+ "memory": "2048Mi"
1559
+ }
1560
+ },
1561
+ "envFrom": [ {
1562
+ "configMapRef": {
1563
+ "name": "colisweb-api"
1564
+ }
1565
+ }, {
1566
+ "secretRef": {
1567
+ "name": "colisweb-api"
1568
+ }
1569
+ }
1570
+ ]
1571
+ }
1572
+ ]
1573
+ }
1574
+ }
1575
+ '
1576
+
1577
+ sleep 5
1578
+ KUBERAILS="kubectl -n $ENV exec -ti $POD_NAME -- /usr/src/app/bin/rails c"
1579
+ [ -z "$COMMAND" ] && eval $KUBERAILS || echo $COMMAND | eval $KUBERAILS
1580
+
1581
+ print "End of $POD_NAME "
1582
+ kubectl -n $ENV delete pods $POD_NAME
1583
+ }
1584
+
1585
+ # Ex :
1586
+ # create_user testing claire.lien@colisweb.com super_admin clairemdp
1587
+ create_user() {
1588
+ ENV=$1
1589
+ EMAIL=$2
1590
+ ROLE=$3
1591
+ PASSWORD=$4
1592
+ railsc_k8s $ENV "User.where(email:'$EMAIL', role:'$ROLE').first_or_create.update_attributes!(password: '$PASSWORD')"
1593
+ }
1594
+
1595
+ # Ex :
1596
+ # delete_user testing claire.lien@colisweb.com
1597
+ delete_user() {
1598
+ ENV=$1
1599
+ EMAIL=$2
1600
+ railsc_k8s $ENV "User.find_by(email:'$EMAIL').destroy"
1601
+ }
1602
+
1603
+ # NON Interactive console on an new pod, for long-running tasks (a few minutes)
1604
+ # See also railsc_k8s
1605
+ # file.txt will be available from /conf/data.txt in the ruby code
1606
+ # examples :
1607
+ # run_ruby_k8s testing demo <(echo "pp JSON.parse(File.read('/conf/data.txt'))") <(echo '{ "content": 123 }')
1608
+ # run_ruby_k8s testing demo ~/.oh-my-zsh/custom/dev-tools/shell-session/ruby/demo.rb <(echo '{ "content": 123 }')
1609
+ run_ruby_k8s() {
1610
+ if [ $# -lt 4 ]; then
1611
+ echo "usage : run_ruby_k8s production name-for-pod script.rb file.txt"
1612
+ return 1
1613
+ fi
1614
+ local namespace=$1
1615
+ local name=$2
1616
+ local ruby_script=$3
1617
+ local input_data=$4
1618
+ [[ $namespace = "production" || $namespace = "staging" ]] && default_tag="master-latest" || default_tag="${namespace}-latest"
1619
+ local image_tag=${5:-$default_tag}
1620
+
1621
+ if [ ! -r "$ruby_script" ]; then
1622
+ echo "ruby script not found $ruby_script"
1623
+ return 2
1624
+ fi
1625
+
1626
+ if [ ! -r "$input_data" ]; then
1627
+ echo "data not found $input_data"
1628
+ return 3
1629
+ fi
1630
+
1631
+
1632
+ local IMAGE="949316342391.dkr.ecr.eu-west-1.amazonaws.com/colisweb-api:$image_tag"
1633
+ local POD_NAME="colisweb-api-script-$name"
1634
+ local CONFIG_MAP="config-$POD_NAME"
1635
+ local CONFIG_MAP_DIR="$(mktemp -d)"
1636
+
1637
+
1638
+ configure_kubectl_for $namespace
1639
+
1640
+
1641
+ cp "$ruby_script" "$CONFIG_MAP_DIR/script.rb"
1642
+ cp "$input_data" "$CONFIG_MAP_DIR/data.txt"
1643
+
1644
+ kubectl -n $namespace get configmap $CONFIG_MAP && kubectl -n $namespace delete configmap $CONFIG_MAP
1645
+ kubectl -n $namespace create configmap $CONFIG_MAP --from-file="$CONFIG_MAP_DIR"
1646
+
1647
+ kubectl -n $namespace get pod $POD_NAME && kubectl -n $namespace delete pod $POD_NAME
1648
+
1649
+ echo "starting with $IMAGE"
1650
+ kubectl -n $namespace run $POD_NAME \
1651
+ --image $IMAGE \
1652
+ -ti \
1653
+ --restart=Never \
1654
+ --attach \
1655
+ --rm \
1656
+ --overrides='{
1657
+ "spec":{
1658
+ "nodeSelector":{
1659
+ "workType": "workers"
1660
+ },
1661
+ "containers":[
1662
+ {
1663
+ "name":"'$POD_NAME'",
1664
+ "image":"'$IMAGE'",
1665
+ "imagePullPolicy":"Always",
1666
+ "command":[
1667
+ "/usr/src/app/bin/rails",
1668
+ "r",
1669
+ "/conf/script.rb"
1670
+ ],
1671
+ "resources":{
1672
+ "limits":{
1673
+ "memory": "4096Mi"
1674
+ }
1675
+ },
1676
+ "volumeMounts":[
1677
+ {
1678
+ "name":"conf",
1679
+ "mountPath":"/conf"
1680
+ }
1681
+ ],
1682
+ "envFrom": [ {
1683
+ "configMapRef": {
1684
+ "name": "colisweb-api"
1685
+ }
1686
+ }, {
1687
+ "secretRef": {
1688
+ "name": "colisweb-api"
1689
+ }
1690
+ }
1691
+ ]
1692
+ }
1693
+ ],
1694
+ "volumes":[
1695
+ {
1696
+ "name":"conf",
1697
+ "configMap":{ "name":"'$CONFIG_MAP'" }
1698
+ }
1699
+ ]
1700
+ }
1701
+ }
1702
+ '
1703
+
1704
+ kubectl -n $namespace delete configmap $CONFIG_MAP
1705
+ }
1706
+
1707
+ # example:
1708
+ # update_pickup_cp testing <( echo '{"wrong_cp": "59123", "corrected_cp": "59223", "delivery_ids": ["4192421", "4192425"]}' )
1709
+ update_pickup_cp() {
1710
+ run_ruby_k8s $1 update-pickup-cp "$SCRIPT_FULL_PATH/ruby/update_pickup_cp.rb" $2
1711
+ }
1712
+
1713
+
1714
+
1715
+ update_all_prices() {
1716
+ local namespace=$1
1717
+ local json_prices=$2
1718
+
1719
+ local json_size=$(wc -c < "$json_prices")
1720
+
1721
+ if ((json_size > 940000)); then
1722
+ command -v jq || (echo "jq not found (use brew install jq)" && return 1)
1723
+ local max_lines=3000
1724
+ local total_lines=$(jq '. | length' $json_prices)
1725
+ local iterations=$((total_lines / max_lines + 1))
1726
+ echo "$json_prices is too big, I'll split it for you in blocks of $max_lines lines. It will take $iterations runs"
1727
+ for (( i = 0 ; i < iterations ; i++ )) ; do
1728
+ local start=$((i * max_lines))
1729
+ local end=$(( (i + 1) * max_lines))
1730
+ local split_file=$(mktemp)
1731
+ jq -c ".[$start:$end]" $json_prices > $split_file
1732
+ local split_lines=$(jq '. | length' $split_file)
1733
+ echo "starting iteration $i from $start to $end with $split_file command -v has $split_lines lines"
1734
+ run_ruby_k8s $namespace "update-prices-$i" "$SCRIPT_FULL_PATH/ruby/update_prices.rb" $split_file
1735
+ done
1736
+ else
1737
+ run_ruby_k8s $namespace "update-prices" "$SCRIPT_FULL_PATH/ruby/update_prices.rb" $json_prices
1738
+ fi
1739
+ }
1740
+
1741
+
1742
+ update_surveys() {
1743
+ local namespace=$1
1744
+ local csv_surveys=$2
1745
+
1746
+ local csv_size=$(wc -c < "$csv_surveys")
1747
+
1748
+
1749
+ if ((csv_size > 940000)); then
1750
+ local max_lines=400
1751
+ local total_lines=$(wc -l < $csv_surveys)
1752
+ local iterations=$((total_lines / max_lines + 1))
1753
+ echo "$csv_surveys is too big, I'll split it for you in blocks of $max_lines lines. It will take $iterations runs"
1754
+ for (( i = 0 ; i < iterations ; i++ )) ; do
1755
+ local start=$((i * max_lines + 2))
1756
+ local end=$(( (i + 1) * max_lines + 1))
1757
+ local split_file=$(mktemp)
1758
+ head -1 $csv_surveys > $split_file
1759
+ sed -n ''"$start,${end}p" $csv_surveys >> $split_file
1760
+
1761
+
1762
+ local split_lines=$(wc -l < $split_file)
1763
+ echo "starting iteration $i from $start to $end with $split_file command -v has $split_lines lines"
1764
+ run_ruby_k8s $namespace "reimport-surveys-$i" "$SCRIPT_FULL_PATH/ruby/feedback_kpi_reuploader.rb" $split_file
1765
+ done
1766
+ else
1767
+ run_ruby_k8s $namespace "reimport-surveys" "$SCRIPT_FULL_PATH/ruby/feedback_kpi_reuploader.rb" $csv_surveys
1768
+ fi
1769
+ }
1770
+
1771
+ #!/usr/bin/env bash
1772
+
1773
+ configure_gitlab_ssh() {
1774
+ tmp_dir=$(mktemp -d)
1775
+ ssh-keyscan gitlab.com > $tmp_dir/known_hosts
1776
+ echo "$SSH_PRIVATE_KEY" > $tmp_dir/id_rsa
1777
+ chmod 600 $tmp_dir/id_rsa
1778
+ ssh -i $tmp_dir/id_rsa -T git@gitlab.com
1779
+ rm -Rf $tmp_dir
1780
+ }
1781
+
1782
+
1783
+ configure_gitlab_ssh_home() {
1784
+ mkdir ~/.ssh
1785
+ ssh-keyscan gitlab.com >> ~/.ssh/known_hosts
1786
+ echo "$SSH_PRIVATE_KEY" > ~/.ssh/id_rsa
1787
+ chmod 600 ~/.ssh/id_rsa
1788
+ ssh -T git@gitlab.com
1789
+ }
1790
+ #!/usr/bin/env bash
1791
+
1792
+ datadog_schedule_downtime() {
1793
+ SERVICES=$1
1794
+ DOWNTIME_MINUTES=${2:-30}
1795
+
1796
+ if [[ "$ENVIRONMENT" == "production" ]] ; then
1797
+ log "scheduling downtime for $SERVICES in $ENVIRONMENT"
1798
+ else
1799
+ return 0
1800
+ fi
1801
+
1802
+ for SERVICE in $SERVICES ; do
1803
+ datadog_schedule_downtime_single $SERVICE $DOWNTIME_MINUTES
1804
+ done
1805
+ }
1806
+
1807
+ datadog_schedule_downtime_single() {
1808
+ local SERVICE=$1
1809
+ local DOWNTIME_MINUTES=$2
1810
+
1811
+ START=$(date +%s)
1812
+ END=$((START + 60 * DOWNTIME_MINUTES))
1813
+
1814
+ log "scheduling a downtime on datadog for $SERVICE ($DOWNTIME_MINUTES minutes)"
1815
+ curl -X POST "https://api.datadoghq.com/api/v1/downtime" \
1816
+ -H "Content-Type: application/json" \
1817
+ -H "DD-API-KEY: ${DD_API_KEY}" \
1818
+ -H "DD-APPLICATION-KEY: ${DD_APP_KEY}" \
1819
+ -d '
1820
+ {
1821
+ "active": true,
1822
+ "downtime_type": 0,
1823
+ "start": $START,
1824
+ "end": $END,
1825
+ "message": "CA Deployment - performance for $SERVICE may be lower for next $DOWNTIME_MINUTES min",
1826
+ "monitor_tags": [
1827
+ "service:$SERVICE",
1828
+ "performance"
1829
+ ],
1830
+ "scope": [
1831
+ "env:production"
1832
+ ],
1833
+ "timezone": "Europe/Paris"
1834
+ }
1835
+ '
1836
+ }
1837
+ #!/usr/bin/env bash
1838
+
1839
+ docker_build_push() {
1840
+ read -r -a BUILD_ARGS <<< "$1"
1841
+ DOCKER_BUILD_ARGS="--build-arg VCS_REF=$(git rev-parse --short HEAD)"
1842
+ for ARG_NAME in "${BUILD_ARGS[@]}"
1843
+ do
1844
+ DOCKER_BUILD_ARGS="$DOCKER_BUILD_ARGS --build-arg $ARG_NAME=${!ARG_NAME}"
1845
+ done
1846
+
1847
+ if ! image_exists $DOCKER_REGISTRY_ID $APPLICATION $CI_COMMIT_SHORT_SHA ; then
1848
+ docker pull $DOCKER_IMAGE || true
1849
+ SOURCE_URL=${CI_PROJECT_URL:8} # without "https://" protocol, like gitlab.com/colisweb-idl/colisweb/back/packing
1850
+ docker build $DOCKER_BUILD_ARGS \
1851
+ -t $DOCKER_IMAGE_SHA \
1852
+ --label org.opencontainers.image.revision=$(git rev-parse HEAD) \
1853
+ --label org.opencontainers.image.source=$SOURCE_URL \
1854
+ --cache-from $DOCKER_IMAGE \
1855
+ $DOCKER_STAGE_PATH
1856
+ docker push $DOCKER_IMAGE_SHA
1857
+ fi
1858
+ }
1859
+
1860
+
1861
+ docker_promote() {
1862
+ # inspired by https://dille.name/blog/2018/09/20/how-to-tag-docker-images-without-pulling-them/
1863
+ OLD_TAG=${1//[^0-9a-zA-Z-.]/_}
1864
+ NEW_TAG=${2//[^0-9a-zA-Z-.]/_}
1865
+ echo "promoting from $OLD_TAG to $NEW_TAG"
1866
+ TOKEN=$(aws_ecr_token)
1867
+ CONTENT_TYPE="application/vnd.docker.distribution.manifest.v2+json"
1868
+ MANIFESTS_API="https://${DOCKER_REGISTRY}/v2/${APPLICATION}/manifests"
1869
+
1870
+ if MANIFEST=$(curl --fail -H "Authorization: Basic $TOKEN" -H "Accept: ${CONTENT_TYPE}" "$MANIFESTS_API/${OLD_TAG}"); then
1871
+ echo "authenticated on $MANIFESTS_API"
1872
+ else
1873
+ return 1
1874
+ fi
1875
+ if curl --fail -H "Authorization: Basic $TOKEN" -X PUT -H "Content-Type: ${CONTENT_TYPE}" -d "${MANIFEST}" "$MANIFESTS_API/$NEW_TAG" ; then
1876
+ echo "promoted ${APPLICATION} from $OLD_TAG to $NEW_TAG"
1877
+ else
1878
+ return 2
1879
+ fi
1880
+ }
1881
+
1882
+ ensure_images_exists() {
1883
+ for IMAGE_TO_CHECK in $(echo $1 | tr "," "\n"); do
1884
+ image_exists ${DOCKER_REGISTRY_ID} ${IMAGE_TO_CHECK} ${VERSION} || return 1
1885
+ done
1886
+ }
1887
+
1888
+ #!/usr/bin/env bash
1889
+
1890
+ extract_yaml_config_variable() {
1891
+ set +e
1892
+ set +x
1893
+
1894
+ check_args "--environment" $1
1895
+ shift
1896
+ ENVIRONMENT=$1
1897
+ shift
1898
+
1899
+ check_args "--configs-path" $1
1900
+ shift
1901
+ CONFIGS_PATH=$1
1902
+ shift
1903
+
1904
+ check_args "--variable" $1
1905
+ shift
1906
+ VARIABLE=$1
1907
+ shift
1908
+
1909
+ [[ "$1" == "--optional" ]] && OPTIONAL=true || OPTIONAL=false
1910
+
1911
+ if [ ! -f ${CONFIGS_PATH}/common.yaml ]; then
1912
+ echo >&2 "Missing $CONFIGS_PATH/common.yaml configuration file"
1913
+ exit 1
1914
+ fi
1915
+ if [ ! -f ${CONFIGS_PATH}/${ENVIRONMENT}.yaml ]; then
1916
+ echo >&2 "Missing $CONFIGS_PATH/$ENVIRONMENT.yaml configuration file"
1917
+ exit 1
1918
+ fi
1919
+ if [ ! -f ${CONFIGS_PATH}/${ENVIRONMENT}-secrets.yaml ]; then
1920
+ echo >&2 "Missing $CONFIGS_PATH/$ENVIRONMENT-secrets.yaml configuration file"
1921
+ exit 1
1922
+ fi
1923
+
1924
+ result=$(yq -r ${VARIABLE} "$CONFIGS_PATH/$ENVIRONMENT-secrets.yaml")
1925
+ if [ $? -ne 0 ] || [ "$result" = "null" ]; then
1926
+ result=$(yq -r ${VARIABLE} "$CONFIGS_PATH/$ENVIRONMENT.yaml")
1927
+ if [ $? -ne 0 ] || [ "$result" = "null" ]; then
1928
+ result=$(yq -r ${VARIABLE} "$CONFIGS_PATH/common.yaml")
1929
+ if [ $? -ne 0 ] || [ "$result" = "null" ]; then
1930
+ if [ $OPTIONAL = true ]; then
1931
+ echo ""
1932
+ exit 0
1933
+ else
1934
+ echo >&2 "Missing path $VARIABLE in $CONFIGS_PATH/$ENVIRONMENT-secrets.yaml, $CONFIGS_PATH/$ENVIRONMENT.yaml or $CONFIGS_PATH/common.yaml"
1935
+ exit 1
1936
+ fi
1937
+ fi
1938
+ fi
1939
+ fi
1940
+ echo ${result}
1941
+ }
1942
+ #!/usr/bin/env bash
1943
+
1944
+ flyway_clean() {
1945
+ HOST="$1"
1946
+ PORT="$2"
1947
+ DATABASE="$3"
1948
+ USER="$4"
1949
+ PASSWORD="$5"
1950
+
1951
+ kubectl run -it --rm flywayclean \
1952
+ --image=flyway/flyway \
1953
+ --restart=Never \
1954
+ -- \
1955
+ -cleanDisabled=false \
1956
+ -url="jdbc:postgresql://$HOST:$PORT/$DATABASE" \
1957
+ -user="$USER" \
1958
+ -password="$PASSWORD" \
1959
+ clean
1960
+ }
1961
+
1962
+ #!/usr/bin/env bash
1963
+
1964
+ FLYWAY_VERSION="7.4.0"
1965
+
1966
+
1967
+ get_yaml_variable() {
1968
+ extract_yaml_config_variable --environment ${ENVIRONMENT} --configs-path $(pwd)/deploy --variable $@
1969
+ }
1970
+
1971
+ init_migrate_db() {
1972
+ set -e
1973
+
1974
+ check_env_vars 4 "APPLICATION" "ENVIRONMENT" "FLYWAY_VERSION" "MIGRATION_SQL_PATH"
1975
+
1976
+ PG_YAML_PATH=".${APPLICATION}config.postgres"
1977
+
1978
+ DB_PORT="5432"
1979
+ DB_HOST=$(get_yaml_variable "${PG_YAML_PATH}.host")
1980
+ DB_INIT_USERNAME=$(get_yaml_variable "${PG_YAML_PATH}.initUsername")
1981
+ DB_INIT_PASSWORD=$(get_yaml_variable "${PG_YAML_PATH}.initPassword")
1982
+ DB_DATABASE=$(get_yaml_variable "${PG_YAML_PATH}.database")
1983
+ DB_USER=$(get_yaml_variable "${PG_YAML_PATH}.user")
1984
+ DB_PASSWORD=$(get_yaml_variable "${PG_YAML_PATH}.password")
1985
+ DB_URL="jdbc:postgresql://${DB_HOST}:${DB_PORT}/${DB_DATABASE}"
1986
+
1987
+ DB_RO_USER=$(get_yaml_variable "${PG_YAML_PATH}.readOnlyUser" --optional)
1988
+ DB_RO_PASSWORD=$(get_yaml_variable "${PG_YAML_PATH}.readOnlyPassword" --optional)
1989
+
1990
+ unset KUBECONFIG
1991
+
1992
+ configure_kubectl_for_ci ${ENVIRONMENT}
1993
+
1994
+ kube_init_service_database \
1995
+ --namespace ${ENVIRONMENT} \
1996
+ --service ${APPLICATION} \
1997
+ --db_host ${DB_HOST} \
1998
+ --db_port ${DB_PORT} \
1999
+ --db_init_username ${DB_INIT_USERNAME} \
2000
+ --db_init_password ${DB_INIT_PASSWORD} \
2001
+ --db_database ${DB_DATABASE} \
2002
+ --db_username ${DB_USER} \
2003
+ --db_password ${DB_PASSWORD}
2004
+
2005
+ if [[ ! -z "$DB_RO_USER" ]] && [[ ! -z "$DB_RO_USER" ]]; then
2006
+ kube_init_database_readonly_account \
2007
+ --namespace ${ENVIRONMENT} \
2008
+ --service ${APPLICATION} \
2009
+ --db_connection "$DB_INIT_USERNAME:$DB_INIT_PASSWORD@$DB_HOST:$DB_PORT" \
2010
+ --db_database ${DB_DATABASE} \
2011
+ --db_readonly_username ${DB_RO_USER} \
2012
+ --db_readonly_password ${DB_RO_PASSWORD}
2013
+ fi
2014
+
2015
+ flyway_migrate \
2016
+ --environment ${ENVIRONMENT} \
2017
+ --namespace ${ENVIRONMENT} \
2018
+ --service ${APPLICATION} \
2019
+ --db_url ${DB_URL} \
2020
+ --db_user ${DB_USER} \
2021
+ --db_password ${DB_PASSWORD} \
2022
+ --flyway_version ${FLYWAY_VERSION} \
2023
+ --flyway_sql_folder $(pwd)/${MIGRATION_SQL_PATH}
2024
+ }
2025
+
2026
+ flyway_migrate() {
2027
+ set -e
2028
+
2029
+ extract_args 8 \
2030
+ environment namespace service db_url db_user db_password flyway_version flyway_sql_folder $*
2031
+
2032
+ echo "running flyway migrations for service $service in environment $environment namespace $namespace for db_url $db_url with user $db_user"
2033
+ echo "migration files expected in $flyway_sql_folder"
2034
+
2035
+ CONFIGMAP_NAME="$service-flyway-migration-sql"
2036
+ POD_NAME="$service-flyway-migration"
2037
+
2038
+ configure_kubectl_for_ci $environment
2039
+
2040
+ kubectl -n $namespace delete configmap $CONFIGMAP_NAME --ignore-not-found
2041
+ kubectl -n $namespace delete pod $POD_NAME --ignore-not-found
2042
+ kubectl -n $namespace create configmap $CONFIGMAP_NAME --from-file=$flyway_sql_folder
2043
+
2044
+ kubectl -n $namespace run $POD_NAME --image ignored -ti --restart=Never --attach --rm --overrides='
2045
+ {
2046
+ "spec":{
2047
+ "containers":[
2048
+ {
2049
+ "name":"'$POD_NAME'",
2050
+ "image":"flyway/flyway:'$flyway_version'",
2051
+ "command":["flyway", "-url='$db_url'", "-user='$db_user'", "-password='$db_password'", "migrate"],
2052
+ "volumeMounts":[
2053
+ {
2054
+ "name":"sql",
2055
+ "mountPath":"/flyway/sql"
2056
+ }
2057
+ ]
2058
+ }
2059
+ ],
2060
+ "volumes":[
2061
+ {
2062
+ "name":"sql",
2063
+ "configMap":{
2064
+ "name":"'$CONFIGMAP_NAME'"
2065
+ }
2066
+ }
2067
+ ]
2068
+ }
2069
+ }
2070
+ '
2071
+
2072
+ kubectl -n $namespace delete configmap $CONFIGMAP_NAME
2073
+ }
2074
+
2075
+ #!/usr/bin/env bash
2076
+ flyway_repair() {
2077
+ set -e
2078
+ check_env_vars 4 "APPLICATION" "ENVIRONMENT" "FLYWAY_VERSION" "MIGRATION_SQL_PATH"
2079
+
2080
+ PG_YAML_PATH=".${APPLICATION}config.postgres"
2081
+
2082
+ DB_PORT="5432"
2083
+ DB_HOST=$(get_yaml_variable "${PG_YAML_PATH}.host")
2084
+ DB_DATABASE=$(get_yaml_variable "${PG_YAML_PATH}.database")
2085
+ DB_USER=$(get_yaml_variable "${PG_YAML_PATH}.user")
2086
+ DB_PASSWORD=$(get_yaml_variable "${PG_YAML_PATH}.password")
2087
+ DB_URL="jdbc:postgresql://${DB_HOST}:${DB_PORT}/${DB_DATABASE}"
2088
+
2089
+ flyway_sql_folder=$(pwd)/${MIGRATION_SQL_PATH}
2090
+
2091
+ configure_kubectl_for_ci "${ENVIRONMENT}"
2092
+ POD_NAME="${APPLICATION}-flyway-repair"
2093
+ CONFIGMAP_NAME="${APPLICATION}-flyway-repair-sql"
2094
+
2095
+ kubectl -n "${ENVIRONMENT}" delete configmap $CONFIGMAP_NAME --ignore-not-found
2096
+ kubectl -n "${ENVIRONMENT}" delete pod $POD_NAME --ignore-not-found
2097
+ kubectl -n "${ENVIRONMENT}" create configmap $CONFIGMAP_NAME --from-file="${flyway_sql_folder}"
2098
+
2099
+ kubectl -n "${ENVIRONMENT}" run --rm -it "${POD_NAME}" \
2100
+ --image=flyway/flyway \
2101
+ --restart=Never \
2102
+ --overrides='
2103
+ {
2104
+ "spec":{
2105
+ "containers":[
2106
+ {
2107
+ "name":"'$POD_NAME'",
2108
+ "image":"flyway/flyway:'${FLYWAY_VERSION}'",
2109
+ "command":["flyway", "-url='$DB_URL'", "-user='$DB_USER'", "-password='$DB_PASSWORD'", "repair"],
2110
+ "volumeMounts":[
2111
+ {
2112
+ "name":"sql",
2113
+ "mountPath":"/flyway/sql"
2114
+ }
2115
+ ]
2116
+ }
2117
+ ],
2118
+ "volumes":[
2119
+ {
2120
+ "name":"sql",
2121
+ "configMap":{
2122
+ "name":"'$CONFIGMAP_NAME'"
2123
+ }
2124
+ }
2125
+ ]
2126
+ }
2127
+ }
2128
+ '
2129
+ kubectl -n "${ENVIRONMENT}" delete configmap $CONFIGMAP_NAME
2130
+ }
2131
+
2132
+ #!/usr/bin/env bash
2133
+
2134
+ record_git_commit() {
2135
+ for file in $GIT_COMMIT_FILES; do
2136
+ sed -i 's&GIT_COMMIT&'"${CI_COMMIT_REF_SLUG}-${CI_COMMIT_SHORT_SHA}&" "$file"
2137
+ done
2138
+ }
2139
+
2140
+ gitlab_import_pgp_key() {
2141
+ if [ "$GITLAB_PGP_PRIVATE_KEY" != "" ]
2142
+ then
2143
+ KEY_FOLDER=<(echo "$GITLAB_PGP_PRIVATE_KEY")
2144
+ gpg --import $KEY_FOLDER > /dev/null
2145
+ else
2146
+ echo '$GITLAB_PGP_PRIVATE_KEY is not set'
2147
+ return 1
2148
+ fi
2149
+ }
2150
+
2151
+ git_reveal() {
2152
+ gitlab_import_pgp_key
2153
+ gpg --decrypt $1
2154
+ }
2155
+ #!/usr/bin/env bash
2156
+
2157
+ helm_deploy_v3() {
2158
+ APPLICATION=$1
2159
+ ENVIRONMENT=$2
2160
+ VERSION=$3
2161
+ deploy_chart_v3 \
2162
+ --path_configs deploy \
2163
+ --path_chart deploy/$APPLICATION \
2164
+ --application $APPLICATION \
2165
+ --environment $ENVIRONMENT \
2166
+ --namespace $ENVIRONMENT \
2167
+ --helm_extra_args --set global.version=$VERSION
2168
+ }
2169
+
2170
+ deploy_chart_v3() {
2171
+ set -e
2172
+ set -x
2173
+
2174
+ # Rigid parsing, but all args are mandatory (expect last) and flexible order is unnecessary
2175
+ check_args "--path_configs" $1; shift
2176
+ path_configs=$1; shift
2177
+ check_args "--path_chart" $1; shift
2178
+ path_chart=$1; shift
2179
+ check_args "--application" $1; shift
2180
+ application=$1; shift
2181
+ check_args "--environment" $1; shift
2182
+ environment=$1; shift
2183
+ check_args "--namespace" $1; shift
2184
+ namespace=$1; shift
2185
+ if [ $# -ne 0 ]; then
2186
+ check_args "--helm_extra_args" $1; shift
2187
+ helm_extra_args=$*
2188
+ fi
2189
+
2190
+ echo "================================"
2191
+ echo " Deploying $application"
2192
+ echo " - Environment: $environment"
2193
+ echo " - Namespace: $namespace"
2194
+ echo "================================"
2195
+
2196
+ root_path=$(pwd)
2197
+
2198
+ # Check the configs exists
2199
+
2200
+ check_config_file ${root_path}/${path_configs}/common.yaml
2201
+ check_config_file ${root_path}/${path_configs}/${namespace}.yaml
2202
+ check_config_file ${root_path}/${path_configs}/${namespace}-secrets.yaml
2203
+
2204
+ # Check the chart exists
2205
+ if [ ! -d ${root_path}/${path_chart} ] || [ ! -f ${root_path}/${path_chart}/Chart.yaml ]; then
2206
+ echo "Bad Chart $root_path/$path_chart : does not exists or missing Chart.yaml"
2207
+ print_usage
2208
+ exit 1
2209
+ fi
2210
+
2211
+ # Unset Kubectl configuration made via the KUBECONFIG env variable
2212
+ # it would override the config made by configure_kubectl_for
2213
+ # for example, using Gitlab runners in Kubernetes sets this variable and causes conflict
2214
+ unset KUBECONFIG
2215
+
2216
+ # Configure Kubectl
2217
+ configure_kubectl_for_ci ${environment}
2218
+
2219
+ # Configure helm3
2220
+ helm3 version --namespace ${namespace} || true
2221
+ # helm3 stable repo have changed and must be updated manually, in versions < v2.17.0
2222
+ helm3 repo add colisweb s3://colisweb-helm-charts/colisweb
2223
+ helm3 repo add stable https://charts.helm.sh/stable
2224
+ helm3 repo update
2225
+ helm3 dependency update ${root_path}/${path_chart}
2226
+
2227
+ # Gather values/*.yaml files
2228
+ values_path="${root_path}/${path_chart}/values"
2229
+ values_files=''
2230
+ [ -d $values_path ] && values_files=$(find $values_path -type f -maxdepth 1 -name "*.yaml" | sed 's/^/ -f /' | tr -d \\n | sed 's/%//')
2231
+
2232
+ # Deploy
2233
+ helm3 upgrade --install \
2234
+ --namespace ${namespace} \
2235
+ ${values_files} \
2236
+ -f ${root_path}/${path_configs}/common.yaml \
2237
+ -f ${root_path}/${path_configs}/${namespace}.yaml \
2238
+ -f ${root_path}/${path_configs}/${namespace}-secrets.yaml \
2239
+ ${helm_extra_args} \
2240
+ ${application} ${root_path}/${path_chart}
2241
+
2242
+ #send event to dd
2243
+ PUBLISHED_VERSION="$CI_COMMIT_REF_NAME-$CI_COMMIT_SHA"
2244
+ emit_datadog_deploy_event --environment $environment --service $application --version $PUBLISHED_VERSION
2245
+
2246
+ echo "================================"
2247
+ echo " Deployed $application"
2248
+ echo " - Environment: $environment"
2249
+ echo " - Namespace: $namespace"
2250
+ echo "================================"
2251
+
2252
+ set +x
2253
+ }
2254
+
2255
+ verify_deployments_v3() {
2256
+ set -e
2257
+
2258
+ # usage :
2259
+ # verify_deployments staging price
2260
+ # verify_deployments -t 15m testing price
2261
+
2262
+ if [ "$1" = "-t" ] ; then
2263
+ TIMEOUT=$2
2264
+ shift
2265
+ shift
2266
+ else
2267
+ TIMEOUT=5m
2268
+ fi
2269
+
2270
+ NAMESPACE=$1
2271
+ RELEASE=$2
2272
+
2273
+ # Get all Deployments names from the deployed chart
2274
+ DEPLOYMENTS=(
2275
+ $(helm3 get manifest --namespace $NAMESPACE $RELEASE | yq -rs '.[] | select(.kind=="Deployment") | .metadata.name')
2276
+ )
2277
+
2278
+ echo "verifying on $NAMESPACE deployments ${DEPLOYMENTS[@]} with a timeout of $TIMEOUT"
2279
+
2280
+ PIDS=()
2281
+ for D in "${DEPLOYMENTS[@]}"; do
2282
+ kubectl -n ${NAMESPACE} rollout status deployment ${D} --timeout=${TIMEOUT} &
2283
+ PIDS+=($!)
2284
+ done
2285
+
2286
+ for P in ${PIDS[@]}; do
2287
+ wait $P
2288
+
2289
+ if [ $? -ne 0 ]; then
2290
+ echo "at least one deployment failed or timed out (after $TIMEOUT)"
2291
+ exit 1
2292
+ fi
2293
+ done
2294
+
2295
+ }
2296
+
2297
+ print_usage() {
2298
+ echo "Usage:"
2299
+ echo "deploy_chart \\"
2300
+ echo " --path_configs <path to .yaml namespaces and secret config files>"
2301
+ echo " --path_chart <path to Helm Chart>"
2302
+ echo " --application <application name used by Helm>"
2303
+ echo " --environment <infrastructure environment>"
2304
+ echo " --namespace <namespace>"
2305
+ echo " --helm-extra-args <extra args to pass to helm, ex: --set my.value=42 --set your.setting=on>"
2306
+ echo ""
2307
+ }
2308
+
2309
+ check_config_file() {
2310
+ local filename=$1
2311
+ if [ ! -f ${filename} ]; then
2312
+ echo "Missing $filename configuration file"
2313
+ print_usage
2314
+ exit 1
2315
+ fi
2316
+ }
2317
+
2318
+ #!/usr/bin/env bash
2319
+
2320
+ configure_kubectl_for_ci() {
2321
+ if [ -z ${GITLAB_PAT} ]; then
2322
+ echo "Cannot configure kubectl: no GITLAB_PAT configured"
2323
+ exit 1
2324
+ fi
2325
+
2326
+ infra_env="$1"
2327
+ valid_envs="[testing][staging][production][performance][tests][recette]"
2328
+ echo "$valid_envs" | grep -q "\[$infra_env\]"
2329
+
2330
+ if [ $? -ne 0 ]; then
2331
+ echo "Cannot configure kubectl for invalid env : $infra_env"
2332
+ echo "choose one of $valid_envs"
2333
+ exit 1
2334
+ fi
2335
+
2336
+ mkdir -p ~/.kube
2337
+ curl -fsS \
2338
+ --header "PRIVATE-TOKEN: $GITLAB_PAT" \
2339
+ "https://gitlab.com/api/v4/projects/8141053/jobs/artifacts/$infra_env/raw/$infra_env.kubeconfig?job=4_kubernetes_config_output" \
2340
+ > ~/.kube/$infra_env.kubeconfig
2341
+
2342
+ curl_return_code=$?
2343
+ if [ ${curl_return_code} -ne 0 ]; then
2344
+ echo "Cannot configure kubectl for $infra_env, get configuration failed with code $curl_return_code"
2345
+ exit ${curl_return_code}
2346
+ fi
2347
+
2348
+ rm -f ~/.kube/config
2349
+ ln -s ~/.kube/$infra_env.kubeconfig ~/.kube/config
2350
+ echo "Configured kubectl for env : $infra_env"
2351
+ }
2352
+ notify_new_deployment() {
2353
+ jq --version || (apt update && apt install -y jq)
2354
+
2355
+ CHAT_URL=${1:-$DEFAULT_CHAT_URL}
2356
+
2357
+ STATUS=$(echo $CI_JOB_STATUS | tr '[:lower:]' '[:upper:]' )
2358
+ ENV_NAME=$(echo $ENVIRONMENT | tr '[:lower:]' '[:upper:]' )
2359
+
2360
+ JOB_LINK="<$CI_JOB_URL| $CI_JOB_NAME $CI_JOB_ID>"
2361
+
2362
+ DESCRIPTION="
2363
+ $STATUS : Deployment for $CI_PROJECT_NAME on $ENV_NAME
2364
+ $JOB_LINK
2365
+ $CI_COMMIT_TITLE
2366
+ "
2367
+
2368
+ JSON_MESSAGE=$(jq -n --arg text "$DESCRIPTION" '{text: $text }')
2369
+ curl -X POST $CHAT_URL \
2370
+ --header "Content-Type: application/json" \
2371
+ --data "$JSON_MESSAGE"
2372
+ }
2373
+ notify_new_version() {
2374
+
2375
+ ! test -z $CI_COMMIT_TAG || exit 0
2376
+
2377
+ jq --version || (apt update && apt install -y jq)
2378
+
2379
+ KIND=$1
2380
+ CHAT_URL=${2:-$DEFAULT_CHAT_URL}
2381
+
2382
+ STATUS=$(echo $CI_JOB_STATUS | tr '[:lower:]' '[:upper:]' )
2383
+ ENV_NAME=$(echo $ENVIRONMENT | tr '[:lower:]' '[:upper:]' )
2384
+ TITLE="$ENV_NAME *$STATUS* $KIND for version *$CI_COMMIT_TAG* of *$CI_PROJECT_NAME* "
2385
+
2386
+ RELEASE_URL="https://gitlab.com/api/v4/projects/$CI_PROJECT_ID/releases/$CI_COMMIT_TAG"
2387
+
2388
+ NOTES=$(curl --header "PRIVATE-TOKEN: $GITLAB_TOKEN" $RELEASE_URL |
2389
+ jq .description |
2390
+ sed -e 's/^"//' -e 's/"$//' |
2391
+ sed -E 's/\[([^]]+)\]\(([^)]+)\)/<\2|\1>/g' |
2392
+ sed -E 's/\\n/\'$'\n/g')
2393
+
2394
+ JOB_LINK="<$CI_JOB_URL| $CI_JOB_NAME $CI_JOB_ID>"
2395
+
2396
+ DESCRIPTION="
2397
+ $TITLE
2398
+ $JOB_LINK
2399
+ $NOTES
2400
+ "
2401
+
2402
+ JSON_MESSAGE=$(jq -n --arg text "$DESCRIPTION" '{text: $text }')
2403
+ curl -X POST $CHAT_URL \
2404
+ --header "Content-Type: application/json" \
2405
+ --data "$JSON_MESSAGE"
2406
+ }
2407
+ #!/usr/bin/env bash
2408
+
2409
+ skip_sbt_compile_cache() {
2410
+ COMPARED_BRANCH="${CI_MERGE_REQUEST_TARGET_BRANCH_NAME:-$CI_DEFAULT_BRANCH}"
2411
+ echo "branch to compare to: $COMPARED_BRANCH"
2412
+ git fetch origin $COMPARED_BRANCH
2413
+ echo "fetched $COMPARED_BRANCH"
2414
+ [[ "$CI_COMMIT_REF_NAME" =~ ^(master|develop)$ || $(git diff origin/$COMPARED_BRANCH --exit-code -- project) ]]
2415
+ }
2416
+ #!/usr/bin/env bash
2417
+
2418
+ # in case of trouble with functions for update history during import
2419
+ # https://stackoverflow.com/questions/56729192/pg-restore-fails-when-trying-to-create-function-referencing-table-that-does-not
2420
+
2421
+ # example: clone_databases --source_env testing --destination_env recette --services "order,notification,parcel,ikea"
2422
+ clone_databases() {
2423
+ export USERNAME="database-cloner"
2424
+
2425
+ set -e
2426
+
2427
+ extract_args 3 source_env destination_env services $*
2428
+
2429
+ dump_databases "$source_env" "$services"
2430
+ import_databases "$destination_env" "$services"
2431
+ }
2432
+
2433
+ dump_databases() {
2434
+ local env="$1"
2435
+ local services=$(echo -n "$2" | tr ',' '\n')
2436
+
2437
+ database_k8s_output_dump_path="/tmp/database_k8s_output_dump"
2438
+
2439
+ configure_kubectl_for "$env"
2440
+ set +e
2441
+ database_k8s "$env" > "$database_k8s_output_dump_path"
2442
+ set -e
2443
+
2444
+ source_pg_local_port=$(extract_pg_local_port "$database_k8s_output_dump_path")
2445
+
2446
+ for service in $services
2447
+ do
2448
+ service_path="/tmp/$service"
2449
+
2450
+ set +e
2451
+ git clone "git@gitlab.com:colisweb/back/$service.git" "$service_path"
2452
+ set -e
2453
+
2454
+ if cd "$service_path"; then
2455
+ echo "dump the database for service $service.."
2456
+
2457
+ git secret reveal -f
2458
+
2459
+ PG_YAML_PATH=".${service}config.postgres"
2460
+
2461
+ SOURCE_DB_DATABASE=$(extract_yaml_config_variable --environment "$env" --configsPath ./deploy --variable "${PG_YAML_PATH}.database")
2462
+ SOURCE_DB_USER=$(extract_yaml_config_variable --environment "$env" --configsPath ./deploy --variable "${PG_YAML_PATH}.user")
2463
+ SOURCE_DB_PASSWORD=$(extract_yaml_config_variable --environment "$env" --configsPath ./deploy --variable "${PG_YAML_PATH}.password")
2464
+
2465
+ export PGPASSWORD="$SOURCE_DB_PASSWORD"
2466
+
2467
+ DUMP_PATH="/tmp/db_dump_${service}.sql"
2468
+ pg_dump --no-owner -h localhost -p "$source_pg_local_port" -U "$SOURCE_DB_USER" "$SOURCE_DB_DATABASE" > "$DUMP_PATH"
2469
+
2470
+ cd ..
2471
+ rm -rf "$service_path"
2472
+ else
2473
+ echo "WARN: failed to clone $service - skipping"
2474
+ fi
2475
+ done
2476
+ }
2477
+
2478
+ import_databases() {
2479
+ local env="$1"
2480
+ local services=$(echo -n "$2" | tr ',' '\n')
2481
+
2482
+ database_k8s_output_import_path="/tmp/database_k8s_output_import"
2483
+
2484
+ configure_kubectl_for "$env"
2485
+ set +e
2486
+ database_k8s "$env" > "$database_k8s_output_import_path"
2487
+ set -e
2488
+
2489
+ destination_pg_local_port=$(extract_pg_local_port "$database_k8s_output_import_path")
2490
+
2491
+ for service in $services
2492
+ do
2493
+ service_path="/tmp/$service"
2494
+
2495
+ set +e
2496
+ git clone "git@gitlab.com:colisweb/back/$service.git" "$service_path"
2497
+ set -e
2498
+
2499
+ if cd "$service_path"; then
2500
+ echo "create and import database for $service.."
2501
+
2502
+ git secret reveal -f
2503
+
2504
+ PG_YAML_PATH=".${service}config.postgres"
2505
+
2506
+ DB_PORT="5432"
2507
+ DB_HOST=$(extract_yaml_config_variable --environment "$env" --configsPath ./deploy --variable "${PG_YAML_PATH}.host")
2508
+ DB_INIT_USERNAME=$(extract_yaml_config_variable --environment "$env" --configsPath ./deploy --variable "${PG_YAML_PATH}.initUsername")
2509
+ DB_INIT_PASSWORD=$(extract_yaml_config_variable --environment "$env" --configsPath ./deploy --variable "${PG_YAML_PATH}.initPassword")
2510
+ DB_DATABASE=$(extract_yaml_config_variable --environment "$env" --configsPath ./deploy --variable "${PG_YAML_PATH}.database")
2511
+ DB_USER=$(extract_yaml_config_variable --environment "$env" --configsPath ./deploy --variable "${PG_YAML_PATH}.user")
2512
+ DB_PASSWORD=$(extract_yaml_config_variable --environment "$env" --configsPath ./deploy --variable "${PG_YAML_PATH}.password")
2513
+
2514
+ kube_init_service_database \
2515
+ --namespace ${env} \
2516
+ --service ${service} \
2517
+ --db_host ${DB_HOST} \
2518
+ --db_port ${DB_PORT} \
2519
+ --db_init_username ${DB_INIT_USERNAME} \
2520
+ --db_init_password ${DB_INIT_PASSWORD} \
2521
+ --db_database ${DB_DATABASE} \
2522
+ --db_username ${DB_USER} \
2523
+ --db_password ${DB_PASSWORD}
2524
+
2525
+ echo "WARN: A complete clean of $DB_DATABASE on $DB_HOST will be operated"
2526
+ read -rsn1 -p"Press any key to continue";echo
2527
+ flyway_clean "$DB_HOST" "$DB_PORT" "$DB_DATABASE" "$DB_USER" "$DB_PASSWORD"
2528
+
2529
+ DUMP_PATH="/tmp/db_dump_${service}.sql"
2530
+ export PGPASSWORD="$DB_PASSWORD"
2531
+ set +e
2532
+ psql "postgres://$DB_USER@127.0.0.1:$destination_pg_local_port" -p "$DB_DATABASE" -f "$DUMP_PATH"
2533
+ set -e
2534
+
2535
+ cd ..
2536
+ rm -rf "$service_path"
2537
+ else
2538
+ echo "WARN: failed to clone $service - skipping"
2539
+ fi
2540
+ done
2541
+ }
2542
+
2543
+ extract_pg_local_port() {
2544
+ cat "$1" | grep 'postgres@127.0.0.1:' | sed 's/.*postgres@127.0.0.1:\(.*[0-9]\).*/\1/g'
2545
+ }
2546
+ #!/usr/bin/env bash
2547
+
2548
+ emit_datadog_deploy_event() {
2549
+ extract_args 3 environment service version $*
2550
+ check_env_vars 1 "DD_API_KEY"
2551
+
2552
+ response=$(
2553
+ curl -X POST -H "Content-type: application/json" \
2554
+ -d '{
2555
+ "title": "deploying '"$service"' to '"$environment"'",
2556
+ "text": "deploying '"$service"' version '"$version"' to '"$environment"'",
2557
+ "priority": "normal",
2558
+ "tags": ["service:'"$service"' ", "env:'"$environment"'" ,"action:'"deployment"'"] ,
2559
+
2560
+ "alert_type": "Info"
2561
+ }' \
2562
+ "https://api.datadoghq.com/api/v1/events?api_key=$DD_API_KEY"
2563
+ )
2564
+
2565
+ #echo $response
2566
+ EventID=$(echo $response | jq ".event.id")
2567
+ url=$(echo $response | jq ".event.url")
2568
+
2569
+ if [[ $EventID -ne 0 ]]; then
2570
+ echo "event successfully created check in datadog UI : $url"
2571
+ else
2572
+ echo " failed to create event "
2573
+ exit 1
2574
+ fi
2575
+ }
2576
+
2577
+ #!/usr/bin/env bash
2578
+
2579
+ # DEPRECATED
2580
+ emit_datadog_error_events() {
2581
+ set -e
2582
+ extract_args 4 title text priority environment $*
2583
+ check_env_vars 1 "DD_API_KEY"
2584
+
2585
+ curl -X POST -H "Content-type: application/json" \
2586
+ -d '{
2587
+ "title": "'"$title"'",
2588
+ "text": "'"$text"'",
2589
+ "priority": "'"$priority"'",
2590
+ "tags": ["environment:'"$environment"'"],
2591
+ "alert_type": "Error"
2592
+ }' \
2593
+ "https://api.datadoghq.com/api/v1/events?api_key=$DD_API_KEY"
2594
+ }
2595
+
2596
+ #!/usr/bin/env bash
2597
+ terraform_init() {
2598
+ SECTION=$1
2599
+ ENV=$2
2600
+ cd $SECTION
2601
+ terraform init -input=false
2602
+ terraform workspace select $ENV || terraform workspace new $ENV
2603
+ }