@colisweb/rescript-toolkit 4.18.6 → 4.19.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -100,17 +100,16 @@ delete_images() {
100
100
  REPO=$1
101
101
  WEEKS=${2:-16}
102
102
 
103
- WEEKS_AGO=$(date -j -v-${WEEKS}w +%s)
103
+ WEEKS_AGO=$(date -v-${WEEKS}w +%F)
104
104
 
105
105
  #Get all ecr images
106
106
  IMAGES=$(aws ecr describe-images --repository-name $REPO --output json)
107
107
 
108
108
  #Filter unnecessary values and map `imagePushedAt` to EPOCH
109
- TIMED_IMAGES=$(echo $IMAGES | jq .'[]' | jq "map({imagePushedAt: (.imagePushedAt[0:19]+\"Z\" | fromdateiso8601), imageDigest: .imageDigest}) | sort_by(.imagePushedAt) | .[:-1]")
109
+ NON_LATEST_IMAGES=$(echo $IMAGES | jq '[.imageDetails[] | select(.imageTags | any(endswith("latest")) | not)]')
110
110
 
111
111
  #Filter on EPOCH
112
- OLD_IMAGES=$(echo $TIMED_IMAGES | jq "map(select (.imagePushedAt < $WEEKS_AGO)) | .[] " | jq -r '.imageDigest')
113
-
112
+ OLD_IMAGES=$(echo $NON_LATEST_IMAGES | jq --arg date $WEEKS_AGO '.[] | select(.imagePushedAt[0:10] < $date).imageDigest')
114
113
  while IFS= read -r IMAGE; do
115
114
  if [ "$IMAGE" != "" ]; then
116
115
  echo "Deleting $IMAGE from $REPO"
@@ -130,6 +129,27 @@ delete_images_all_repos() {
130
129
  done <<< "$REPOSITORIES"
131
130
  }
132
131
 
132
+ delete_old_cache() {
133
+ DATE=${1:-$(date -v-1m +%F)}
134
+ CACHE_BUCKET=${2:-"s3://gitlab-colisweb-distributed-cache/project/"}
135
+
136
+ echo "deleting from cache $CACHE_BUCKET all older than $DATE"
137
+
138
+ aws_ecr_login
139
+
140
+ while read -r line; do
141
+ datum=$(echo $line | cut -c1-10)
142
+ if [[ "$datum" < "$DATE" ]] ; then
143
+ # Shell Parameter Expansion: ${parameter##word}
144
+ # Allow to return the result from "word" to the end of "parameters"
145
+ # Here we need the end of the string after "project/" (corresponding to the S3 gitlab project id and filename)
146
+ TO_DELETE="$CACHE_BUCKET${line##* project/}"
147
+ echo $TO_DELETE
148
+ aws s3 rm $TO_DELETE
149
+ fi
150
+ done < <(aws s3 ls $CACHE_BUCKET --recursive)
151
+ }
152
+
133
153
  #!/usr/bin/env bash
134
154
 
135
155
  # If gitlab is down or pipeline are stuck, hotfixes need to be available
@@ -515,28 +535,29 @@ database_k8s() {
515
535
  HostName 127.0.0.1
516
536
  Port 2225
517
537
  LocalForward 24441 toutatis-testing-db.ca0rjdmnxf1x.eu-west-1.rds.amazonaws.com:5432
518
- LocalForward 25431 testapirds.ca0rjdmnxf1x.eu-west-1.rds.amazonaws.com:3306
538
+ LocalForward 25431 toutatis-testing-mysql-db.ca0rjdmnxf1x.eu-west-1.rds.amazonaws.com:3306
539
+ LocalForward 25531 testapirds.ca0rjdmnxf1x.eu-west-1.rds.amazonaws.com:3306
519
540
  Host bastion_staging
520
541
  HostName 127.0.0.1
521
542
  Port 2226
522
543
  LocalForward 24442 toutatis-staging-db.ca0rjdmnxf1x.eu-west-1.rds.amazonaws.com:5432
523
- LocalForward 25432 testapirds.ca0rjdmnxf1x.eu-west-1.rds.amazonaws.com:3306
544
+ LocalForward 25432 toutatis-staging-mysql-db.ca0rjdmnxf1x.eu-west-1.rds.amazonaws.com:3306
524
545
  Host bastion_recette
525
546
  HostName 127.0.0.1
526
547
  Port 2228
527
548
  LocalForward 24446 toutatis-recette-db.ca0rjdmnxf1x.eu-west-1.rds.amazonaws.com:5432
528
- LocalForward 25436 testapirds.ca0rjdmnxf1x.eu-west-1.rds.amazonaws.com:3306
549
+ LocalForward 25436 toutatis-recette-mysql-db.ca0rjdmnxf1x.eu-west-1.rds.amazonaws.com:3306
550
+ LocalForward 25536 testapirds.ca0rjdmnxf1x.eu-west-1.rds.amazonaws.com:3306
529
551
  Host bastion_production
530
552
  HostName 127.0.0.1
531
553
  Port 2227
532
554
  LocalForward 24443 toutatis-production-db-replica.ca0rjdmnxf1x.eu-west-1.rds.amazonaws.com:5432
533
- LocalForward 25433 api-production-rds-read-replica.ca0rjdmnxf1x.eu-west-1.rds.amazonaws.com:3306
534
- LocalForward 25435 archive-ca.ca0rjdmnxf1x.eu-west-1.rds.amazonaws.com:3306
555
+ LocalForward 25433 toutatis-production-mysql-db-replica.ca0rjdmnxf1x.eu-west-1.rds.amazonaws.com:3306
535
556
  EOF
536
557
  if [ "$MODE" = "production_rw" ] ; then
537
558
  cat >> "$bastion_config" <<EOF
538
559
  LocalForward 24444 toutatis-production-db.ca0rjdmnxf1x.eu-west-1.rds.amazonaws.com:5432
539
- LocalForward 25434 api-production-rds.ca0rjdmnxf1x.eu-west-1.rds.amazonaws.com:3306
560
+ LocalForward 25434 toutatis-production-mysql-db.ca0rjdmnxf1x.eu-west-1.rds.amazonaws.com:3306
540
561
  EOF
541
562
  fi
542
563
 
@@ -556,7 +577,7 @@ psql_on_k8() {
556
577
  CONNECTION=$3
557
578
  shift 3
558
579
 
559
- kubectl -n $NAMESPACE run ${SERVICE}-database-init \
580
+ kubectl -n $NAMESPACE run ${SERVICE}-postgres-init \
560
581
  --image jbergknoff/postgresql-client \
561
582
  --restart=Never \
562
583
  --attach --rm \
@@ -567,13 +588,14 @@ psql_on_k8() {
567
588
 
568
589
  mysql_on_k8() {
569
590
  local namespace=$1
570
- local db_host=$2
571
- local db_port=$3
572
- local db_init_username=$4
573
- local db_init_password=$5
574
- local query=$6
575
-
576
- kubectl -n ${namespace} run datadog-database-init \
591
+ local service=$2
592
+ local db_host=$3
593
+ local db_port=$4
594
+ local db_init_username=$5
595
+ local db_init_password=$6
596
+ local query=$7
597
+
598
+ kubectl -n ${namespace} run ${service}-mysql-init \
577
599
  --image widdpim/mysql-client \
578
600
  --restart=Never \
579
601
  --attach --rm \
@@ -657,11 +679,11 @@ kube_init_datadog_in_database() {
657
679
  echo " Initializing Datadog Agent Requiement for namespace $namespace"
658
680
  echo "======================="
659
681
 
660
- set -x
661
-
662
682
  echo "Checking if User '$db_datadog_username' exists"
683
+ local service="datadog"
684
+ found_db_users=$(mysql_on_k8 $namespace $service $db_host $db_port $db_init_username $db_init_password 'SELECT user FROM mysql.user;')
663
685
  set +e
664
- mysql_on_k8 $namespace $db_host $db_port $db_init_username $db_init_password 'SELECT user FROM mysql.user;' | grep "^$db_datadog_username$"
686
+ echo $found_db_users | grep "^$db_datadog_username$"
665
687
  return_code=$?
666
688
  set -e
667
689
 
@@ -672,29 +694,29 @@ kube_init_datadog_in_database() {
672
694
 
673
695
  # All the query come from this docs : https://docs.datadoghq.com/fr/database_monitoring/setup_mysql/selfhosted/?tab=mysql56
674
696
 
675
- mysql_on_k8 $namespace $db_host $db_port $db_init_username $db_init_password 'CREATE USER '"$db_datadog_username"'@"%" IDENTIFIED BY '"'$db_datadog_password'"';'
697
+ mysql_on_k8 $namespace $service $db_host $db_port $db_init_username $db_init_password 'CREATE USER '"$db_datadog_username"'@"%" IDENTIFIED BY '"'$db_datadog_password'"';'
676
698
  echo "USER created $db_datadog_username"
677
699
 
678
- mysql_on_k8 $namespace $db_host $db_port $db_init_username $db_init_password 'GRANT REPLICATION CLIENT ON *.* TO datadog@"%" WITH MAX_USER_CONNECTIONS 5;'
700
+ mysql_on_k8 $namespace $service $db_host $db_port $db_init_username $db_init_password 'GRANT REPLICATION CLIENT ON *.* TO datadog@"%" WITH MAX_USER_CONNECTIONS 5;'
679
701
  echo "ALTER USER $db_datadog_username"
680
702
 
681
- mysql_on_k8 $namespace $db_host $db_port $db_init_username $db_init_password 'GRANT PROCESS ON *.* TO '"$db_datadog_username"'@"%";'
703
+ mysql_on_k8 $namespace $service $db_host $db_port $db_init_username $db_init_password 'GRANT PROCESS ON *.* TO '"$db_datadog_username"'@"%";'
682
704
  echo "Granted PROCESS for $db_datadog_username"
683
705
 
684
- mysql_on_k8 $namespace $db_host $db_port $db_init_username $db_init_password 'GRANT SELECT ON performance_schema.* TO '"$db_datadog_username"'@"%";'
706
+ mysql_on_k8 $namespace $service $db_host $db_port $db_init_username $db_init_password 'GRANT SELECT ON performance_schema.* TO '"$db_datadog_username"'@"%";'
685
707
  echo "Granted SELECT on performance_schema for $db_datadog_username"
686
708
 
687
- mysql_on_k8 $namespace $db_host $db_port $db_init_username $db_init_password 'CREATE SCHEMA IF NOT EXISTS datadog;'
709
+ mysql_on_k8 $namespace $service $db_host $db_port $db_init_username $db_init_password 'CREATE SCHEMA IF NOT EXISTS datadog;'
688
710
  echo "CREATE SCHEMA datadog"
689
711
 
690
- mysql_on_k8 $namespace $db_host $db_port $db_init_username $db_init_password 'GRANT EXECUTE ON datadog.* to '"$db_datadog_username"'@"%";'
712
+ mysql_on_k8 $namespace $service $db_host $db_port $db_init_username $db_init_password 'GRANT EXECUTE ON datadog.* to '"$db_datadog_username"'@"%";'
691
713
  echo "Granted 'GRANT EXECUTE for $db_datadog_username on datadog"
692
714
 
693
- mysql_on_k8 $namespace $db_host $db_port $db_init_username $db_init_password 'GRANT CREATE TEMPORARY TABLES ON datadog.* TO '"$db_datadog_username"'@"%";'
715
+ mysql_on_k8 $namespace $service $db_host $db_port $db_init_username $db_init_password 'GRANT CREATE TEMPORARY TABLES ON datadog.* TO '"$db_datadog_username"'@"%";'
694
716
  echo "Granted CREATE TEMPORARY TABLES for $db_datadog_username"
695
717
 
696
718
 
697
- mysql_on_k8 $namespace $db_host $db_port $db_init_username $db_init_password 'DROP PROCEDURE IF EXISTS datadog.explain_statement;
719
+ mysql_on_k8 $namespace $service $db_host $db_port $db_init_username $db_init_password 'DROP PROCEDURE IF EXISTS datadog.explain_statement;
698
720
  DELIMITER $$
699
721
  CREATE PROCEDURE datadog.explain_statement(IN query TEXT)
700
722
  SQL SECURITY DEFINER
@@ -707,7 +729,7 @@ kube_init_datadog_in_database() {
707
729
  DELIMITER ;'
708
730
  echo "CREATE PROCEDURE PROCEDURE datadog.explain_statement"
709
731
 
710
- mysql_on_k8 $namespace $db_host $db_port $db_init_username $db_init_password 'DROP PROCEDURE IF EXISTS '"$db_datadog_username"'.explain_statement;
732
+ mysql_on_k8 $namespace $service $db_host $db_port $db_init_username $db_init_password 'DROP PROCEDURE IF EXISTS '"$db_datadog_username"'.explain_statement;
711
733
  DELIMITER $$
712
734
  CREATE PROCEDURE '"$db_datadog_username"'.explain_statement(IN query TEXT)
713
735
  SQL SECURITY DEFINER
@@ -721,7 +743,7 @@ kube_init_datadog_in_database() {
721
743
  GRANT EXECUTE ON PROCEDURE '"$db_datadog_username"'.explain_statement TO datadog@"%";'
722
744
  echo "CREATE PROCEDURE on SCHEMA $db_datadog_schema for $db_datadog_username"
723
745
 
724
- mysql_on_k8 $namespace $db_host $db_port $db_init_username $db_init_password 'DROP PROCEDURE IF EXISTS datadog.enable_events_statements_consumers;
746
+ mysql_on_k8 $namespace $service $db_host $db_port $db_init_username $db_init_password 'DROP PROCEDURE IF EXISTS datadog.enable_events_statements_consumers;
725
747
  DELIMITER $$
726
748
  CREATE PROCEDURE datadog.enable_events_statements_consumers()
727
749
  SQL SECURITY DEFINER
@@ -739,6 +761,82 @@ kube_init_datadog_in_database() {
739
761
  echo "======================="
740
762
  }
741
763
 
764
+ kube_init_datadog_in_postgres_database() {
765
+ extract_args 7 namespace db_host db_port db_init_username db_init_password db_datadog_username db_datadog_password $*
766
+
767
+ local service="datadog"
768
+ local db_connection="$db_init_username:$db_init_password@$db_host:$db_port"
769
+
770
+ echo "======================="
771
+ echo " Initializing $service Agent On PostgresSQL Database Requirement for namespace $namespace"
772
+ echo "======================="
773
+
774
+ echo "Checking if User '$db_datadog_username' exists"
775
+
776
+ set +e
777
+ if psql_on_k8 $namespace $service $db_connection -qtAc 'SELECT usename FROM pg_catalog.pg_user;' | grep "^$db_datadog_username$";
778
+ then
779
+ echo "User $db_datadog_username already exists - nothing to do"
780
+ else
781
+ echo "User $db_datadog_username does not exist - initializing"
782
+
783
+ set -e
784
+ psql_on_k8 $namespace $service $db_connection -qc 'CREATE USER '"$db_datadog_username"' WITH password '"'$db_datadog_password'"';'
785
+ echo "User created $db_datadog_username"
786
+
787
+ psql_on_k8 $namespace $service $db_connection -qc 'CREATE SCHEMA datadog;'
788
+ echo "Schema datadog created"
789
+
790
+ psql_on_k8 $namespace $service $db_connection -qc 'GRANT USAGE ON SCHEMA datadog TO datadog;'
791
+ echo "Granted usage for datadog schema to datadog"
792
+
793
+ psql_on_k8 $namespace $service $db_connection -qc 'GRANT USAGE ON SCHEMA public TO datadog;'
794
+ echo "Granted usage for public schema to datadog"
795
+
796
+ psql_on_k8 $namespace $service $db_connection -qc 'GRANT pg_monitor TO datadog;'
797
+ echo "Granted pg_monitor to datadog"
798
+
799
+ psql_on_k8 $namespace $service $db_connection -qc 'CREATE EXTENSION IF NOT EXISTS pg_stat_statements schema public;'
800
+ echo "Extension pg_stat_statements created"
801
+
802
+ local datadog_function_path="/tmp/datatog-explain-statement-function.sql"
803
+ local datadog_function="CREATE OR REPLACE FUNCTION datadog.explain_statement(
804
+ l_query TEXT,
805
+ OUT explain JSON
806
+ )
807
+ RETURNS SETOF JSON AS
808
+ \\$\\$
809
+ DECLARE
810
+ curs REFCURSOR;
811
+ plan JSON;
812
+
813
+ BEGIN
814
+ OPEN curs FOR EXECUTE pg_catalog.concat('EXPLAIN (FORMAT JSON) ', l_query);
815
+ FETCH curs INTO plan;
816
+ CLOSE curs;
817
+ RETURN QUERY SELECT plan;
818
+ END;
819
+ \\$\\$
820
+ LANGUAGE 'plpgsql'
821
+ RETURNS NULL ON NULL INPUT
822
+ SECURITY DEFINER;"
823
+
824
+ kubectl -n $namespace run $service-postgres-init \
825
+ --image jbergknoff/postgresql-client \
826
+ --restart=Never \
827
+ --attach --rm \
828
+ --command \
829
+ -- \
830
+ /bin/sh -c "echo -e \"$datadog_function\" > $datadog_function_path; psql postgresql://$db_connection -qf $datadog_function_path"
831
+
832
+ echo "Function datadog.explain_statement created"
833
+ fi
834
+
835
+ echo "======================="
836
+ echo " Database $service Initialization complete for namespace $namespace"
837
+ echo "======================="
838
+ }
839
+
742
840
  kube_init_service_database() {
743
841
 
744
842
  extract_args 9 namespace service db_host db_port db_init_username db_init_password db_database db_username db_password $*
@@ -761,17 +859,18 @@ kube_init_service_database() {
761
859
  psql_on_k8 $namespace $service $db_connection -c 'CREATE DATABASE '"$db_database"';'
762
860
  echo "DB created $db_database"
763
861
 
764
- psql_on_k8 $namespace $service $db_connection -c 'CREATE USER '"$db_datadog_username"' WITH ENCRYPTED PASSWORD '"'$db_password'"';'
765
- echo "USER created $db_datadog_username"
862
+ psql_on_k8 $namespace $service $db_connection -c 'CREATE USER '"$db_username"' WITH ENCRYPTED PASSWORD '"'$db_password'"';'
863
+ echo "USER created $db_username"
766
864
 
767
- psql_on_k8 $namespace $service $db_connection -c 'GRANT ALL PRIVILEGES ON DATABASE '"$db_database"' TO '"$db_datadog_username"';'
768
- echo "Granted all privileges for $db_datadog_username on $db_database"
865
+ psql_on_k8 $namespace $service $db_connection -c 'GRANT ALL PRIVILEGES ON DATABASE '"$db_database"' TO '"$db_username"';'
866
+ echo "Granted all privileges for $db_username on $db_database"
769
867
  fi
770
868
 
771
869
  echo "======================="
772
- echo " Database '$db_database' Initialization complete for namespace $namespace"
870
+ echo " Database '$db_database' Initialization complete for namespace $namespace"
773
871
  echo "======================="
774
872
  }
873
+
775
874
  #!/usr/bin/env bash
776
875
 
777
876
  # Port forward on the first matching pod
@@ -851,12 +950,58 @@ pick_pod() {
851
950
 
852
951
  #!/usr/bin/env bash
853
952
 
953
+ bastion_config_for_redis_ca() {
954
+ ssh_config xufte6.0001.euw1.cache.amazonaws.com redis 2223 63789 tests testing recette-001 sandbox prod > $1
955
+ }
956
+
957
+ bastion_config_for_redis_toutatis() {
958
+ ssh_config xufte6.0001.euw1.cache.amazonaws.com toutatis 2223 63789 tests testing recette staging production > $1
959
+ }
960
+
961
+ ssh_config() {
962
+ host=$1
963
+ host_prefix=$2
964
+ port0=$3
965
+ forward0=$4
966
+ shift 4
967
+ instance_names=("$@") # /!\ indices start at 1 with zsh
968
+ ssh_header
969
+
970
+ environments=(tests testing recette staging production)
971
+
972
+ length=${#environments[@]}
973
+ for (( i=1; i<=${length}; i++ ));
974
+ do
975
+ bastion_block bastion_${environments[$i]} $(($port0 + $i)) $(($forward0 + $i)) ${host_prefix}-${instance_names[$i]}.$host
976
+ done
977
+ }
978
+
979
+ ssh_header() {
980
+ cat <<EOF
981
+ UserKnownHostsFile /dev/null
982
+ StrictHostKeyChecking no
983
+ User root
984
+ EOF
985
+ }
986
+
987
+ bastion_block() {
988
+ cat <<EOF
989
+ Host $1
990
+ HostName 127.0.0.1
991
+ Port $2
992
+ LocalForward $3 $4:6379
993
+ EOF
994
+ }
995
+
854
996
  redis_k8s() {
855
997
  MODE=$1
998
+ REDIS_INSTANCE=${2:-ca}
856
999
  case $MODE in
1000
+ "tests") SSH_LOCAL_PORT=2224;REDIS_LOCAL_PORT=63790;ENV="tests";;
857
1001
  "testing") SSH_LOCAL_PORT=2225;REDIS_LOCAL_PORT=63791;ENV="testing";;
858
- "staging") SSH_LOCAL_PORT=2226;REDIS_LOCAL_PORT=63792;ENV="staging";;
859
- "production") SSH_LOCAL_PORT=2227;REDIS_LOCAL_PORT=63793;ENV="production";;
1002
+ "recette") SSH_LOCAL_PORT=2226;REDIS_LOCAL_PORT=63792;ENV="recette";;
1003
+ "staging") SSH_LOCAL_PORT=2227;REDIS_LOCAL_PORT=63793;ENV="staging";;
1004
+ "production") SSH_LOCAL_PORT=2228;REDIS_LOCAL_PORT=63794;ENV="production";;
860
1005
  *) echo "Unsupported ENV : $MODE"; return 1 ;;
861
1006
  esac
862
1007
 
@@ -865,23 +1010,11 @@ redis_k8s() {
865
1010
  lsof -ti tcp:$REDIS_LOCAL_PORT | xargs kill
866
1011
 
867
1012
  bastion_config=$(mktemp)
868
- cat > "$bastion_config" <<EOF
869
- UserKnownHostsFile /dev/null
870
- StrictHostKeyChecking no
871
- User root
872
- Host bastion_testing
873
- HostName 127.0.0.1
874
- Port 2225
875
- LocalForward 63791 redis-testing.xufte6.0001.euw1.cache.amazonaws.com:6379
876
- Host bastion_staging
877
- HostName 127.0.0.1
878
- Port 2226
879
- LocalForward 63792 redis-sandbox.xufte6.0001.euw1.cache.amazonaws.com:6379
880
- Host bastion_production
881
- HostName 127.0.0.1
882
- Port 2227
883
- LocalForward 63793 redis-prod.xufte6.0001.euw1.cache.amazonaws.com:6379
884
- EOF
1013
+ case $REDIS_INSTANCE in
1014
+ "ca") bastion_config_for_redis_ca "$bastion_config";;
1015
+ "toutatis") bastion_config_for_redis_toutatis "$bastion_config";;
1016
+ *) echo "Unsupported redis instance (ca or toutatis available) : $REDIS_INSTANCE"; return 1;;
1017
+ esac
885
1018
 
886
1019
  ssh -f -N \
887
1020
  -F "$bastion_config" \
@@ -1289,6 +1422,36 @@ search_business() {
1289
1422
  curl $URL
1290
1423
  }
1291
1424
 
1425
+ #!/bin/bash
1426
+
1427
+ # source tolls.sh ; tolls antoine.thomas@colisweb.com
1428
+ function tolls() {
1429
+ USER=${1:-first.last@colisweb.com}
1430
+ FROM_DATE=${2:-"2023-02-01"}
1431
+ TO_DATE=${3:-"2023-02-28"}
1432
+
1433
+ USER=$(gum input --prompt "username : " --value $USER)
1434
+ TOKEN=$(./tour_details.sc login --user $USER --password $(gum input --password --placeholder password))
1435
+ [ "$TOKEN" != "" ] && echo "connected" || return 1
1436
+
1437
+ FROM_DATE=$(gum input --prompt "Date start : " --value $FROM_DATE)
1438
+ TO_DATE=$(gum input --prompt "Date end : " --value $TO_DATE)
1439
+ FILENAME="tours-${FROM_DATE}-TO-${TO_DATE}.json"
1440
+ curl --cookie "session=$TOKEN" "https://api.production.colisweb.com/api/v6/routes-plans/external?from=${FROM_DATE}&to=${TO_DATE}" > ~/Downloads/$FILENAME
1441
+ echo "Tournées téléchargées"
1442
+
1443
+ projectIds=$(./tour_details.sc allProjects --file ~/Downloads/$FILENAME | gum choose --no-limit | cut -d "," -f 2)
1444
+ echo "projets sélectionnés : $projectIds"
1445
+ tourIds=$(./tour_details.sc allTours --file ~/Downloads/$FILENAME --projectIds "$projectIds")
1446
+ echo "tournées sélectionnées : $tourIds"
1447
+
1448
+ TARGET="${FROM_DATE}-TO-${TO_DATE}.csv"
1449
+ echo "appels à HERE, écriture dans $TARGET"
1450
+ ./tour_details.sc allToursDetails --token $TOKEN --hereApiKey $HERE_API_KEY --routeIds "$tourIds" > "$TARGET"
1451
+
1452
+ echo "terminé"
1453
+ }
1454
+
1292
1455
  #!/usr/bin/env bash
1293
1456
 
1294
1457
  # possible syntax:
@@ -1393,24 +1556,13 @@ jconsole_k8s() {
1393
1556
 
1394
1557
  #!/usr/bin/env bash
1395
1558
 
1396
- # Interactive console on an existing pod. See also run_ruby_k8s
1397
- # Ex :
1398
- # railsc_k8s_old production
1399
- # railsc_k8s_old production "User.where(email:'toni@colisweb.com')"
1400
- railsc_k8s_old() {
1401
- ENV=$1
1402
- COMMAND=$2
1403
- configure_kubectl_for $ENV
1404
- POD=$(kubectl -n $ENV get pods -o=name | grep colisweb-api-web | head -1 | sed -e 's/pod\///')
1405
- KUBERAILS="kubectl -n $ENV exec -ti $POD -- /usr/src/app/bin/rails c"
1406
- [ -z "$COMMAND" ] && eval $KUBERAILS || echo $COMMAND | eval $KUBERAILS
1407
- }
1408
-
1409
1559
  # Interactive console on an new pod. See also run_ruby_k8s
1410
1560
  # Ex :
1411
1561
  # railsc_k8s production
1562
+ # railsc_k8s production "User.where(email:'toni@colisweb.com')"
1412
1563
  railsc_k8s() {
1413
1564
  ENV=$1
1565
+ COMMAND=$2
1414
1566
  [[ $ENV = "production" || $ENV = "staging" ]] && default_tag="master-latest" || default_tag="${ENV}-latest"
1415
1567
  local image_tag=${5:-$default_tag}
1416
1568
  local IMAGE="949316342391.dkr.ecr.eu-west-1.amazonaws.com/colisweb-api:$image_tag"
@@ -1460,7 +1612,8 @@ railsc_k8s() {
1460
1612
  '
1461
1613
 
1462
1614
  sleep 5
1463
- kubectl -n $ENV exec -it $POD_NAME -- /usr/src/app/bin/rails c
1615
+ KUBERAILS="kubectl -n $ENV exec -ti $POD_NAME -- /usr/src/app/bin/rails c"
1616
+ [ -z "$COMMAND" ] && eval $KUBERAILS || echo $COMMAND | eval $KUBERAILS
1464
1617
 
1465
1618
  print "End of $POD_NAME "
1466
1619
  kubectl -n $ENV delete pods $POD_NAME
@@ -1730,11 +1883,18 @@ docker_build_push() {
1730
1883
 
1731
1884
  if ! image_exists $DOCKER_REGISTRY_ID $APPLICATION $CI_COMMIT_SHORT_SHA ; then
1732
1885
  docker pull $DOCKER_IMAGE || true
1733
- docker build $DOCKER_BUILD_ARGS -t $DOCKER_IMAGE_SHA --cache-from $DOCKER_IMAGE $DOCKER_STAGE_PATH
1886
+ SOURCE_URL=${CI_PROJECT_URL:8} # without "https://" protocol, like gitlab.com/colisweb-idl/colisweb/back/packing
1887
+ docker build $DOCKER_BUILD_ARGS \
1888
+ -t $DOCKER_IMAGE_SHA \
1889
+ --label org.opencontainers.image.revision=$(git rev-parse HEAD) \
1890
+ --label org.opencontainers.image.source=$SOURCE_URL \
1891
+ --cache-from $DOCKER_IMAGE \
1892
+ $DOCKER_STAGE_PATH
1734
1893
  docker push $DOCKER_IMAGE_SHA
1735
1894
  fi
1736
1895
  }
1737
1896
 
1897
+
1738
1898
  docker_promote() {
1739
1899
  # inspired by https://dille.name/blog/2018/09/20/how-to-tag-docker-images-without-pulling-them/
1740
1900
  OLD_TAG=${1//[^0-9a-zA-Z-.]/_}
@@ -1761,6 +1921,7 @@ docker_promote() {
1761
1921
  image_exists ${DOCKER_REGISTRY_ID} ${IMAGE_TO_CHECK} ${VERSION} || return 1
1762
1922
  done
1763
1923
  }
1924
+
1764
1925
  #!/usr/bin/env bash
1765
1926
 
1766
1927
  extract_yaml_config_variable() {
@@ -1837,7 +1998,7 @@ flyway_clean() {
1837
1998
 
1838
1999
  #!/usr/bin/env bash
1839
2000
 
1840
- FLYWAY_VERSION="5.2.4"
2001
+ FLYWAY_VERSION="7.4.0"
1841
2002
 
1842
2003
 
1843
2004
  get_yaml_variable() {
@@ -1923,7 +2084,7 @@ flyway_migrate() {
1923
2084
  "containers":[
1924
2085
  {
1925
2086
  "name":"'$POD_NAME'",
1926
- "image":"boxfuse/flyway:'$flyway_version'",
2087
+ "image":"flyway/flyway:'$flyway_version'",
1927
2088
  "command":["flyway", "-url='$db_url'", "-user='$db_user'", "-password='$db_password'", "migrate"],
1928
2089
  "volumeMounts":[
1929
2090
  {
@@ -1948,6 +2109,63 @@ flyway_migrate() {
1948
2109
  kubectl -n $namespace delete configmap $CONFIGMAP_NAME
1949
2110
  }
1950
2111
 
2112
+ #!/usr/bin/env bash
2113
+ flyway_repair() {
2114
+ set -e
2115
+ check_env_vars 4 "APPLICATION" "ENVIRONMENT" "FLYWAY_VERSION" "MIGRATION_SQL_PATH"
2116
+
2117
+ PG_YAML_PATH=".${APPLICATION}config.postgres"
2118
+
2119
+ DB_PORT="5432"
2120
+ DB_HOST=$(get_yaml_variable "${PG_YAML_PATH}.host")
2121
+ DB_DATABASE=$(get_yaml_variable "${PG_YAML_PATH}.database")
2122
+ DB_USER=$(get_yaml_variable "${PG_YAML_PATH}.user")
2123
+ DB_PASSWORD=$(get_yaml_variable "${PG_YAML_PATH}.password")
2124
+ DB_URL="jdbc:postgresql://${DB_HOST}:${DB_PORT}/${DB_DATABASE}"
2125
+
2126
+ flyway_sql_folder=$(pwd)/${MIGRATION_SQL_PATH}
2127
+
2128
+ configure_kubectl_for_ci "${ENVIRONMENT}"
2129
+ POD_NAME="${APPLICATION}-flyway-repair"
2130
+ CONFIGMAP_NAME="${APPLICATION}-flyway-repair-sql"
2131
+
2132
+ kubectl -n "${ENVIRONMENT}" delete configmap $CONFIGMAP_NAME --ignore-not-found
2133
+ kubectl -n "${ENVIRONMENT}" delete pod $POD_NAME --ignore-not-found
2134
+ kubectl -n "${ENVIRONMENT}" create configmap $CONFIGMAP_NAME --from-file="${flyway_sql_folder}"
2135
+
2136
+ kubectl -n "${ENVIRONMENT}" run --rm -it "${POD_NAME}" \
2137
+ --image=flyway/flyway \
2138
+ --restart=Never \
2139
+ --overrides='
2140
+ {
2141
+ "spec":{
2142
+ "containers":[
2143
+ {
2144
+ "name":"'$POD_NAME'",
2145
+ "image":"flyway/flyway:'${FLYWAY_VERSION}'",
2146
+ "command":["flyway", "-url='$DB_URL'", "-user='$DB_USER'", "-password='$DB_PASSWORD'", "repair"],
2147
+ "volumeMounts":[
2148
+ {
2149
+ "name":"sql",
2150
+ "mountPath":"/flyway/sql"
2151
+ }
2152
+ ]
2153
+ }
2154
+ ],
2155
+ "volumes":[
2156
+ {
2157
+ "name":"sql",
2158
+ "configMap":{
2159
+ "name":"'$CONFIGMAP_NAME'"
2160
+ }
2161
+ }
2162
+ ]
2163
+ }
2164
+ }
2165
+ '
2166
+ kubectl -n "${ENVIRONMENT}" delete configmap $CONFIGMAP_NAME
2167
+ }
2168
+
1951
2169
  #!/usr/bin/env bash
1952
2170
 
1953
2171
  record_git_commit() {