@colisweb/rescript-toolkit 4.18.7 → 4.20.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
|
@@ -100,17 +100,16 @@ delete_images() {
|
|
|
100
100
|
REPO=$1
|
|
101
101
|
WEEKS=${2:-16}
|
|
102
102
|
|
|
103
|
-
WEEKS_AGO=$(date -
|
|
103
|
+
WEEKS_AGO=$(date -v-${WEEKS}w +%F)
|
|
104
104
|
|
|
105
105
|
#Get all ecr images
|
|
106
106
|
IMAGES=$(aws ecr describe-images --repository-name $REPO --output json)
|
|
107
107
|
|
|
108
108
|
#Filter unnecessary values and map `imagePushedAt` to EPOCH
|
|
109
|
-
|
|
109
|
+
NON_LATEST_IMAGES=$(echo $IMAGES | jq '[.imageDetails[] | select(.imageTags | any(endswith("latest")) | not)]')
|
|
110
110
|
|
|
111
111
|
#Filter on EPOCH
|
|
112
|
-
OLD_IMAGES=$(echo $
|
|
113
|
-
|
|
112
|
+
OLD_IMAGES=$(echo $NON_LATEST_IMAGES | jq --arg date $WEEKS_AGO '.[] | select(.imagePushedAt[0:10] < $date).imageDigest')
|
|
114
113
|
while IFS= read -r IMAGE; do
|
|
115
114
|
if [ "$IMAGE" != "" ]; then
|
|
116
115
|
echo "Deleting $IMAGE from $REPO"
|
|
@@ -130,6 +129,27 @@ delete_images_all_repos() {
|
|
|
130
129
|
done <<< "$REPOSITORIES"
|
|
131
130
|
}
|
|
132
131
|
|
|
132
|
+
delete_old_cache() {
|
|
133
|
+
DATE=${1:-$(date -v-1m +%F)}
|
|
134
|
+
CACHE_BUCKET=${2:-"s3://gitlab-colisweb-distributed-cache/project/"}
|
|
135
|
+
|
|
136
|
+
echo "deleting from cache $CACHE_BUCKET all older than $DATE"
|
|
137
|
+
|
|
138
|
+
aws_ecr_login
|
|
139
|
+
|
|
140
|
+
while read -r line; do
|
|
141
|
+
datum=$(echo $line | cut -c1-10)
|
|
142
|
+
if [[ "$datum" < "$DATE" ]] ; then
|
|
143
|
+
# Shell Parameter Expansion: ${parameter##word}
|
|
144
|
+
# Allow to return the result from "word" to the end of "parameters"
|
|
145
|
+
# Here we need the end of the string after "project/" (corresponding to the S3 gitlab project id and filename)
|
|
146
|
+
TO_DELETE="$CACHE_BUCKET${line##* project/}"
|
|
147
|
+
echo $TO_DELETE
|
|
148
|
+
aws s3 rm $TO_DELETE
|
|
149
|
+
fi
|
|
150
|
+
done < <(aws s3 ls $CACHE_BUCKET --recursive)
|
|
151
|
+
}
|
|
152
|
+
|
|
133
153
|
#!/usr/bin/env bash
|
|
134
154
|
|
|
135
155
|
# If gitlab is down or pipeline are stuck, hotfixes need to be available
|
|
@@ -515,28 +535,29 @@ database_k8s() {
|
|
|
515
535
|
HostName 127.0.0.1
|
|
516
536
|
Port 2225
|
|
517
537
|
LocalForward 24441 toutatis-testing-db.ca0rjdmnxf1x.eu-west-1.rds.amazonaws.com:5432
|
|
518
|
-
LocalForward 25431
|
|
538
|
+
LocalForward 25431 toutatis-testing-mysql-db.ca0rjdmnxf1x.eu-west-1.rds.amazonaws.com:3306
|
|
539
|
+
LocalForward 25531 testapirds.ca0rjdmnxf1x.eu-west-1.rds.amazonaws.com:3306
|
|
519
540
|
Host bastion_staging
|
|
520
541
|
HostName 127.0.0.1
|
|
521
542
|
Port 2226
|
|
522
543
|
LocalForward 24442 toutatis-staging-db.ca0rjdmnxf1x.eu-west-1.rds.amazonaws.com:5432
|
|
523
|
-
LocalForward 25432
|
|
544
|
+
LocalForward 25432 toutatis-staging-mysql-db.ca0rjdmnxf1x.eu-west-1.rds.amazonaws.com:3306
|
|
524
545
|
Host bastion_recette
|
|
525
546
|
HostName 127.0.0.1
|
|
526
547
|
Port 2228
|
|
527
548
|
LocalForward 24446 toutatis-recette-db.ca0rjdmnxf1x.eu-west-1.rds.amazonaws.com:5432
|
|
528
|
-
LocalForward 25436
|
|
549
|
+
LocalForward 25436 toutatis-recette-mysql-db.ca0rjdmnxf1x.eu-west-1.rds.amazonaws.com:3306
|
|
550
|
+
LocalForward 25536 testapirds.ca0rjdmnxf1x.eu-west-1.rds.amazonaws.com:3306
|
|
529
551
|
Host bastion_production
|
|
530
552
|
HostName 127.0.0.1
|
|
531
553
|
Port 2227
|
|
532
554
|
LocalForward 24443 toutatis-production-db-replica.ca0rjdmnxf1x.eu-west-1.rds.amazonaws.com:5432
|
|
533
|
-
LocalForward 25433
|
|
534
|
-
LocalForward 25435 archive-ca.ca0rjdmnxf1x.eu-west-1.rds.amazonaws.com:3306
|
|
555
|
+
LocalForward 25433 toutatis-production-mysql-db-replica.ca0rjdmnxf1x.eu-west-1.rds.amazonaws.com:3306
|
|
535
556
|
EOF
|
|
536
557
|
if [ "$MODE" = "production_rw" ] ; then
|
|
537
558
|
cat >> "$bastion_config" <<EOF
|
|
538
559
|
LocalForward 24444 toutatis-production-db.ca0rjdmnxf1x.eu-west-1.rds.amazonaws.com:5432
|
|
539
|
-
LocalForward 25434
|
|
560
|
+
LocalForward 25434 toutatis-production-mysql-db.ca0rjdmnxf1x.eu-west-1.rds.amazonaws.com:3306
|
|
540
561
|
EOF
|
|
541
562
|
fi
|
|
542
563
|
|
|
@@ -556,7 +577,7 @@ psql_on_k8() {
|
|
|
556
577
|
CONNECTION=$3
|
|
557
578
|
shift 3
|
|
558
579
|
|
|
559
|
-
kubectl -n $NAMESPACE run ${SERVICE}-
|
|
580
|
+
kubectl -n $NAMESPACE run ${SERVICE}-postgres-init \
|
|
560
581
|
--image jbergknoff/postgresql-client \
|
|
561
582
|
--restart=Never \
|
|
562
583
|
--attach --rm \
|
|
@@ -567,13 +588,14 @@ psql_on_k8() {
|
|
|
567
588
|
|
|
568
589
|
mysql_on_k8() {
|
|
569
590
|
local namespace=$1
|
|
570
|
-
local
|
|
571
|
-
local
|
|
572
|
-
local
|
|
573
|
-
local
|
|
574
|
-
local
|
|
575
|
-
|
|
576
|
-
|
|
591
|
+
local service=$2
|
|
592
|
+
local db_host=$3
|
|
593
|
+
local db_port=$4
|
|
594
|
+
local db_init_username=$5
|
|
595
|
+
local db_init_password=$6
|
|
596
|
+
local query=$7
|
|
597
|
+
|
|
598
|
+
kubectl -n ${namespace} run ${service}-mysql-init \
|
|
577
599
|
--image widdpim/mysql-client \
|
|
578
600
|
--restart=Never \
|
|
579
601
|
--attach --rm \
|
|
@@ -657,11 +679,11 @@ kube_init_datadog_in_database() {
|
|
|
657
679
|
echo " Initializing Datadog Agent Requiement for namespace $namespace"
|
|
658
680
|
echo "======================="
|
|
659
681
|
|
|
660
|
-
set -x
|
|
661
|
-
|
|
662
682
|
echo "Checking if User '$db_datadog_username' exists"
|
|
683
|
+
local service="datadog"
|
|
684
|
+
found_db_users=$(mysql_on_k8 $namespace $service $db_host $db_port $db_init_username $db_init_password 'SELECT user FROM mysql.user;')
|
|
663
685
|
set +e
|
|
664
|
-
|
|
686
|
+
echo $found_db_users | grep "^$db_datadog_username$"
|
|
665
687
|
return_code=$?
|
|
666
688
|
set -e
|
|
667
689
|
|
|
@@ -672,29 +694,29 @@ kube_init_datadog_in_database() {
|
|
|
672
694
|
|
|
673
695
|
# All the query come from this docs : https://docs.datadoghq.com/fr/database_monitoring/setup_mysql/selfhosted/?tab=mysql56
|
|
674
696
|
|
|
675
|
-
mysql_on_k8 $namespace $db_host $db_port $db_init_username $db_init_password 'CREATE USER '"$db_datadog_username"'@"%" IDENTIFIED BY '"'$db_datadog_password'"';'
|
|
697
|
+
mysql_on_k8 $namespace $service $db_host $db_port $db_init_username $db_init_password 'CREATE USER '"$db_datadog_username"'@"%" IDENTIFIED BY '"'$db_datadog_password'"';'
|
|
676
698
|
echo "USER created $db_datadog_username"
|
|
677
699
|
|
|
678
|
-
mysql_on_k8 $namespace $db_host $db_port $db_init_username $db_init_password 'GRANT REPLICATION CLIENT ON *.* TO datadog@"%" WITH MAX_USER_CONNECTIONS 5;'
|
|
700
|
+
mysql_on_k8 $namespace $service $db_host $db_port $db_init_username $db_init_password 'GRANT REPLICATION CLIENT ON *.* TO datadog@"%" WITH MAX_USER_CONNECTIONS 5;'
|
|
679
701
|
echo "ALTER USER $db_datadog_username"
|
|
680
702
|
|
|
681
|
-
mysql_on_k8 $namespace $db_host $db_port $db_init_username $db_init_password 'GRANT PROCESS ON *.* TO '"$db_datadog_username"'@"%";'
|
|
703
|
+
mysql_on_k8 $namespace $service $db_host $db_port $db_init_username $db_init_password 'GRANT PROCESS ON *.* TO '"$db_datadog_username"'@"%";'
|
|
682
704
|
echo "Granted PROCESS for $db_datadog_username"
|
|
683
705
|
|
|
684
|
-
mysql_on_k8 $namespace $db_host $db_port $db_init_username $db_init_password 'GRANT SELECT ON performance_schema.* TO '"$db_datadog_username"'@"%";'
|
|
706
|
+
mysql_on_k8 $namespace $service $db_host $db_port $db_init_username $db_init_password 'GRANT SELECT ON performance_schema.* TO '"$db_datadog_username"'@"%";'
|
|
685
707
|
echo "Granted SELECT on performance_schema for $db_datadog_username"
|
|
686
708
|
|
|
687
|
-
mysql_on_k8 $namespace $db_host $db_port $db_init_username $db_init_password 'CREATE SCHEMA IF NOT EXISTS datadog;'
|
|
709
|
+
mysql_on_k8 $namespace $service $db_host $db_port $db_init_username $db_init_password 'CREATE SCHEMA IF NOT EXISTS datadog;'
|
|
688
710
|
echo "CREATE SCHEMA datadog"
|
|
689
711
|
|
|
690
|
-
mysql_on_k8 $namespace $db_host $db_port $db_init_username $db_init_password 'GRANT EXECUTE ON datadog.* to '"$db_datadog_username"'@"%";'
|
|
712
|
+
mysql_on_k8 $namespace $service $db_host $db_port $db_init_username $db_init_password 'GRANT EXECUTE ON datadog.* to '"$db_datadog_username"'@"%";'
|
|
691
713
|
echo "Granted 'GRANT EXECUTE for $db_datadog_username on datadog"
|
|
692
714
|
|
|
693
|
-
mysql_on_k8 $namespace $db_host $db_port $db_init_username $db_init_password 'GRANT CREATE TEMPORARY TABLES ON datadog.* TO '"$db_datadog_username"'@"%";'
|
|
715
|
+
mysql_on_k8 $namespace $service $db_host $db_port $db_init_username $db_init_password 'GRANT CREATE TEMPORARY TABLES ON datadog.* TO '"$db_datadog_username"'@"%";'
|
|
694
716
|
echo "Granted CREATE TEMPORARY TABLES for $db_datadog_username"
|
|
695
717
|
|
|
696
718
|
|
|
697
|
-
mysql_on_k8 $namespace $db_host $db_port $db_init_username $db_init_password 'DROP PROCEDURE IF EXISTS datadog.explain_statement;
|
|
719
|
+
mysql_on_k8 $namespace $service $db_host $db_port $db_init_username $db_init_password 'DROP PROCEDURE IF EXISTS datadog.explain_statement;
|
|
698
720
|
DELIMITER $$
|
|
699
721
|
CREATE PROCEDURE datadog.explain_statement(IN query TEXT)
|
|
700
722
|
SQL SECURITY DEFINER
|
|
@@ -707,7 +729,7 @@ kube_init_datadog_in_database() {
|
|
|
707
729
|
DELIMITER ;'
|
|
708
730
|
echo "CREATE PROCEDURE PROCEDURE datadog.explain_statement"
|
|
709
731
|
|
|
710
|
-
mysql_on_k8 $namespace $db_host $db_port $db_init_username $db_init_password 'DROP PROCEDURE IF EXISTS '"$db_datadog_username"'.explain_statement;
|
|
732
|
+
mysql_on_k8 $namespace $service $db_host $db_port $db_init_username $db_init_password 'DROP PROCEDURE IF EXISTS '"$db_datadog_username"'.explain_statement;
|
|
711
733
|
DELIMITER $$
|
|
712
734
|
CREATE PROCEDURE '"$db_datadog_username"'.explain_statement(IN query TEXT)
|
|
713
735
|
SQL SECURITY DEFINER
|
|
@@ -721,7 +743,7 @@ kube_init_datadog_in_database() {
|
|
|
721
743
|
GRANT EXECUTE ON PROCEDURE '"$db_datadog_username"'.explain_statement TO datadog@"%";'
|
|
722
744
|
echo "CREATE PROCEDURE on SCHEMA $db_datadog_schema for $db_datadog_username"
|
|
723
745
|
|
|
724
|
-
mysql_on_k8 $namespace $db_host $db_port $db_init_username $db_init_password 'DROP PROCEDURE IF EXISTS datadog.enable_events_statements_consumers;
|
|
746
|
+
mysql_on_k8 $namespace $service $db_host $db_port $db_init_username $db_init_password 'DROP PROCEDURE IF EXISTS datadog.enable_events_statements_consumers;
|
|
725
747
|
DELIMITER $$
|
|
726
748
|
CREATE PROCEDURE datadog.enable_events_statements_consumers()
|
|
727
749
|
SQL SECURITY DEFINER
|
|
@@ -739,6 +761,82 @@ kube_init_datadog_in_database() {
|
|
|
739
761
|
echo "======================="
|
|
740
762
|
}
|
|
741
763
|
|
|
764
|
+
kube_init_datadog_in_postgres_database() {
|
|
765
|
+
extract_args 7 namespace db_host db_port db_init_username db_init_password db_datadog_username db_datadog_password $*
|
|
766
|
+
|
|
767
|
+
local service="datadog"
|
|
768
|
+
local db_connection="$db_init_username:$db_init_password@$db_host:$db_port"
|
|
769
|
+
|
|
770
|
+
echo "======================="
|
|
771
|
+
echo " Initializing $service Agent On PostgresSQL Database Requirement for namespace $namespace"
|
|
772
|
+
echo "======================="
|
|
773
|
+
|
|
774
|
+
echo "Checking if User '$db_datadog_username' exists"
|
|
775
|
+
|
|
776
|
+
set +e
|
|
777
|
+
if psql_on_k8 $namespace $service $db_connection -qtAc 'SELECT usename FROM pg_catalog.pg_user;' | grep "^$db_datadog_username$";
|
|
778
|
+
then
|
|
779
|
+
echo "User $db_datadog_username already exists - nothing to do"
|
|
780
|
+
else
|
|
781
|
+
echo "User $db_datadog_username does not exist - initializing"
|
|
782
|
+
|
|
783
|
+
set -e
|
|
784
|
+
psql_on_k8 $namespace $service $db_connection -qc 'CREATE USER '"$db_datadog_username"' WITH password '"'$db_datadog_password'"';'
|
|
785
|
+
echo "User created $db_datadog_username"
|
|
786
|
+
|
|
787
|
+
psql_on_k8 $namespace $service $db_connection -qc 'CREATE SCHEMA datadog;'
|
|
788
|
+
echo "Schema datadog created"
|
|
789
|
+
|
|
790
|
+
psql_on_k8 $namespace $service $db_connection -qc 'GRANT USAGE ON SCHEMA datadog TO datadog;'
|
|
791
|
+
echo "Granted usage for datadog schema to datadog"
|
|
792
|
+
|
|
793
|
+
psql_on_k8 $namespace $service $db_connection -qc 'GRANT USAGE ON SCHEMA public TO datadog;'
|
|
794
|
+
echo "Granted usage for public schema to datadog"
|
|
795
|
+
|
|
796
|
+
psql_on_k8 $namespace $service $db_connection -qc 'GRANT pg_monitor TO datadog;'
|
|
797
|
+
echo "Granted pg_monitor to datadog"
|
|
798
|
+
|
|
799
|
+
psql_on_k8 $namespace $service $db_connection -qc 'CREATE EXTENSION IF NOT EXISTS pg_stat_statements schema public;'
|
|
800
|
+
echo "Extension pg_stat_statements created"
|
|
801
|
+
|
|
802
|
+
local datadog_function_path="/tmp/datatog-explain-statement-function.sql"
|
|
803
|
+
local datadog_function="CREATE OR REPLACE FUNCTION datadog.explain_statement(
|
|
804
|
+
l_query TEXT,
|
|
805
|
+
OUT explain JSON
|
|
806
|
+
)
|
|
807
|
+
RETURNS SETOF JSON AS
|
|
808
|
+
\\$\\$
|
|
809
|
+
DECLARE
|
|
810
|
+
curs REFCURSOR;
|
|
811
|
+
plan JSON;
|
|
812
|
+
|
|
813
|
+
BEGIN
|
|
814
|
+
OPEN curs FOR EXECUTE pg_catalog.concat('EXPLAIN (FORMAT JSON) ', l_query);
|
|
815
|
+
FETCH curs INTO plan;
|
|
816
|
+
CLOSE curs;
|
|
817
|
+
RETURN QUERY SELECT plan;
|
|
818
|
+
END;
|
|
819
|
+
\\$\\$
|
|
820
|
+
LANGUAGE 'plpgsql'
|
|
821
|
+
RETURNS NULL ON NULL INPUT
|
|
822
|
+
SECURITY DEFINER;"
|
|
823
|
+
|
|
824
|
+
kubectl -n $namespace run $service-postgres-init \
|
|
825
|
+
--image jbergknoff/postgresql-client \
|
|
826
|
+
--restart=Never \
|
|
827
|
+
--attach --rm \
|
|
828
|
+
--command \
|
|
829
|
+
-- \
|
|
830
|
+
/bin/sh -c "echo -e \"$datadog_function\" > $datadog_function_path; psql postgresql://$db_connection -qf $datadog_function_path"
|
|
831
|
+
|
|
832
|
+
echo "Function datadog.explain_statement created"
|
|
833
|
+
fi
|
|
834
|
+
|
|
835
|
+
echo "======================="
|
|
836
|
+
echo " Database $service Initialization complete for namespace $namespace"
|
|
837
|
+
echo "======================="
|
|
838
|
+
}
|
|
839
|
+
|
|
742
840
|
kube_init_service_database() {
|
|
743
841
|
|
|
744
842
|
extract_args 9 namespace service db_host db_port db_init_username db_init_password db_database db_username db_password $*
|
|
@@ -761,17 +859,18 @@ kube_init_service_database() {
|
|
|
761
859
|
psql_on_k8 $namespace $service $db_connection -c 'CREATE DATABASE '"$db_database"';'
|
|
762
860
|
echo "DB created $db_database"
|
|
763
861
|
|
|
764
|
-
psql_on_k8 $namespace $service $db_connection -c 'CREATE USER '"$
|
|
765
|
-
echo "USER created $
|
|
862
|
+
psql_on_k8 $namespace $service $db_connection -c 'CREATE USER '"$db_username"' WITH ENCRYPTED PASSWORD '"'$db_password'"';'
|
|
863
|
+
echo "USER created $db_username"
|
|
766
864
|
|
|
767
|
-
psql_on_k8 $namespace $service $db_connection -c 'GRANT ALL PRIVILEGES ON DATABASE '"$db_database"' TO '"$
|
|
768
|
-
echo "Granted all privileges for $
|
|
865
|
+
psql_on_k8 $namespace $service $db_connection -c 'GRANT ALL PRIVILEGES ON DATABASE '"$db_database"' TO '"$db_username"';'
|
|
866
|
+
echo "Granted all privileges for $db_username on $db_database"
|
|
769
867
|
fi
|
|
770
868
|
|
|
771
869
|
echo "======================="
|
|
772
|
-
echo " Database '$db_database' Initialization complete for
|
|
870
|
+
echo " Database '$db_database' Initialization complete for namespace $namespace"
|
|
773
871
|
echo "======================="
|
|
774
872
|
}
|
|
873
|
+
|
|
775
874
|
#!/usr/bin/env bash
|
|
776
875
|
|
|
777
876
|
# Port forward on the first matching pod
|
|
@@ -851,12 +950,58 @@ pick_pod() {
|
|
|
851
950
|
|
|
852
951
|
#!/usr/bin/env bash
|
|
853
952
|
|
|
953
|
+
bastion_config_for_redis_ca() {
|
|
954
|
+
ssh_config xufte6.0001.euw1.cache.amazonaws.com redis 2223 63789 tests testing recette-001 sandbox prod > $1
|
|
955
|
+
}
|
|
956
|
+
|
|
957
|
+
bastion_config_for_redis_toutatis() {
|
|
958
|
+
ssh_config xufte6.0001.euw1.cache.amazonaws.com toutatis 2223 63789 tests testing recette staging production > $1
|
|
959
|
+
}
|
|
960
|
+
|
|
961
|
+
ssh_config() {
|
|
962
|
+
host=$1
|
|
963
|
+
host_prefix=$2
|
|
964
|
+
port0=$3
|
|
965
|
+
forward0=$4
|
|
966
|
+
shift 4
|
|
967
|
+
instance_names=("$@") # /!\ indices start at 1 with zsh
|
|
968
|
+
ssh_header
|
|
969
|
+
|
|
970
|
+
environments=(tests testing recette staging production)
|
|
971
|
+
|
|
972
|
+
length=${#environments[@]}
|
|
973
|
+
for (( i=1; i<=${length}; i++ ));
|
|
974
|
+
do
|
|
975
|
+
bastion_block bastion_${environments[$i]} $(($port0 + $i)) $(($forward0 + $i)) ${host_prefix}-${instance_names[$i]}.$host
|
|
976
|
+
done
|
|
977
|
+
}
|
|
978
|
+
|
|
979
|
+
ssh_header() {
|
|
980
|
+
cat <<EOF
|
|
981
|
+
UserKnownHostsFile /dev/null
|
|
982
|
+
StrictHostKeyChecking no
|
|
983
|
+
User root
|
|
984
|
+
EOF
|
|
985
|
+
}
|
|
986
|
+
|
|
987
|
+
bastion_block() {
|
|
988
|
+
cat <<EOF
|
|
989
|
+
Host $1
|
|
990
|
+
HostName 127.0.0.1
|
|
991
|
+
Port $2
|
|
992
|
+
LocalForward $3 $4:6379
|
|
993
|
+
EOF
|
|
994
|
+
}
|
|
995
|
+
|
|
854
996
|
redis_k8s() {
|
|
855
997
|
MODE=$1
|
|
998
|
+
REDIS_INSTANCE=${2:-ca}
|
|
856
999
|
case $MODE in
|
|
1000
|
+
"tests") SSH_LOCAL_PORT=2224;REDIS_LOCAL_PORT=63790;ENV="tests";;
|
|
857
1001
|
"testing") SSH_LOCAL_PORT=2225;REDIS_LOCAL_PORT=63791;ENV="testing";;
|
|
858
|
-
"
|
|
859
|
-
"
|
|
1002
|
+
"recette") SSH_LOCAL_PORT=2226;REDIS_LOCAL_PORT=63792;ENV="recette";;
|
|
1003
|
+
"staging") SSH_LOCAL_PORT=2227;REDIS_LOCAL_PORT=63793;ENV="staging";;
|
|
1004
|
+
"production") SSH_LOCAL_PORT=2228;REDIS_LOCAL_PORT=63794;ENV="production";;
|
|
860
1005
|
*) echo "Unsupported ENV : $MODE"; return 1 ;;
|
|
861
1006
|
esac
|
|
862
1007
|
|
|
@@ -865,23 +1010,11 @@ redis_k8s() {
|
|
|
865
1010
|
lsof -ti tcp:$REDIS_LOCAL_PORT | xargs kill
|
|
866
1011
|
|
|
867
1012
|
bastion_config=$(mktemp)
|
|
868
|
-
|
|
869
|
-
|
|
870
|
-
|
|
871
|
-
|
|
872
|
-
|
|
873
|
-
HostName 127.0.0.1
|
|
874
|
-
Port 2225
|
|
875
|
-
LocalForward 63791 redis-testing.xufte6.0001.euw1.cache.amazonaws.com:6379
|
|
876
|
-
Host bastion_staging
|
|
877
|
-
HostName 127.0.0.1
|
|
878
|
-
Port 2226
|
|
879
|
-
LocalForward 63792 redis-sandbox.xufte6.0001.euw1.cache.amazonaws.com:6379
|
|
880
|
-
Host bastion_production
|
|
881
|
-
HostName 127.0.0.1
|
|
882
|
-
Port 2227
|
|
883
|
-
LocalForward 63793 redis-prod.xufte6.0001.euw1.cache.amazonaws.com:6379
|
|
884
|
-
EOF
|
|
1013
|
+
case $REDIS_INSTANCE in
|
|
1014
|
+
"ca") bastion_config_for_redis_ca "$bastion_config";;
|
|
1015
|
+
"toutatis") bastion_config_for_redis_toutatis "$bastion_config";;
|
|
1016
|
+
*) echo "Unsupported redis instance (ca or toutatis available) : $REDIS_INSTANCE"; return 1;;
|
|
1017
|
+
esac
|
|
885
1018
|
|
|
886
1019
|
ssh -f -N \
|
|
887
1020
|
-F "$bastion_config" \
|
|
@@ -1289,6 +1422,36 @@ search_business() {
|
|
|
1289
1422
|
curl $URL
|
|
1290
1423
|
}
|
|
1291
1424
|
|
|
1425
|
+
#!/bin/bash
|
|
1426
|
+
|
|
1427
|
+
# source tolls.sh ; tolls antoine.thomas@colisweb.com
|
|
1428
|
+
function tolls() {
|
|
1429
|
+
USER=${1:-first.last@colisweb.com}
|
|
1430
|
+
FROM_DATE=${2:-"2023-02-01"}
|
|
1431
|
+
TO_DATE=${3:-"2023-02-28"}
|
|
1432
|
+
|
|
1433
|
+
USER=$(gum input --prompt "username : " --value $USER)
|
|
1434
|
+
TOKEN=$(./tour_details.sc login --user $USER --password $(gum input --password --placeholder password))
|
|
1435
|
+
[ "$TOKEN" != "" ] && echo "connected" || return 1
|
|
1436
|
+
|
|
1437
|
+
FROM_DATE=$(gum input --prompt "Date start : " --value $FROM_DATE)
|
|
1438
|
+
TO_DATE=$(gum input --prompt "Date end : " --value $TO_DATE)
|
|
1439
|
+
FILENAME="tours-${FROM_DATE}-TO-${TO_DATE}.json"
|
|
1440
|
+
curl --cookie "session=$TOKEN" "https://api.production.colisweb.com/api/v6/routes-plans/external?from=${FROM_DATE}&to=${TO_DATE}" > ~/Downloads/$FILENAME
|
|
1441
|
+
echo "Tournées téléchargées"
|
|
1442
|
+
|
|
1443
|
+
projectIds=$(./tour_details.sc allProjects --file ~/Downloads/$FILENAME | gum choose --no-limit | cut -d "," -f 2)
|
|
1444
|
+
echo "projets sélectionnés : $projectIds"
|
|
1445
|
+
tourIds=$(./tour_details.sc allTours --file ~/Downloads/$FILENAME --projectIds "$projectIds")
|
|
1446
|
+
echo "tournées sélectionnées : $tourIds"
|
|
1447
|
+
|
|
1448
|
+
TARGET="${FROM_DATE}-TO-${TO_DATE}.csv"
|
|
1449
|
+
echo "appels à HERE, écriture dans $TARGET"
|
|
1450
|
+
./tour_details.sc allToursDetails --token $TOKEN --hereApiKey $HERE_API_KEY --routeIds "$tourIds" > "$TARGET"
|
|
1451
|
+
|
|
1452
|
+
echo "terminé"
|
|
1453
|
+
}
|
|
1454
|
+
|
|
1292
1455
|
#!/usr/bin/env bash
|
|
1293
1456
|
|
|
1294
1457
|
# possible syntax:
|
|
@@ -1393,24 +1556,13 @@ jconsole_k8s() {
|
|
|
1393
1556
|
|
|
1394
1557
|
#!/usr/bin/env bash
|
|
1395
1558
|
|
|
1396
|
-
# Interactive console on an existing pod. See also run_ruby_k8s
|
|
1397
|
-
# Ex :
|
|
1398
|
-
# railsc_k8s_old production
|
|
1399
|
-
# railsc_k8s_old production "User.where(email:'toni@colisweb.com')"
|
|
1400
|
-
railsc_k8s_old() {
|
|
1401
|
-
ENV=$1
|
|
1402
|
-
COMMAND=$2
|
|
1403
|
-
configure_kubectl_for $ENV
|
|
1404
|
-
POD=$(kubectl -n $ENV get pods -o=name | grep colisweb-api-web | head -1 | sed -e 's/pod\///')
|
|
1405
|
-
KUBERAILS="kubectl -n $ENV exec -ti $POD -- /usr/src/app/bin/rails c"
|
|
1406
|
-
[ -z "$COMMAND" ] && eval $KUBERAILS || echo $COMMAND | eval $KUBERAILS
|
|
1407
|
-
}
|
|
1408
|
-
|
|
1409
1559
|
# Interactive console on an new pod. See also run_ruby_k8s
|
|
1410
1560
|
# Ex :
|
|
1411
1561
|
# railsc_k8s production
|
|
1562
|
+
# railsc_k8s production "User.where(email:'toni@colisweb.com')"
|
|
1412
1563
|
railsc_k8s() {
|
|
1413
1564
|
ENV=$1
|
|
1565
|
+
COMMAND=$2
|
|
1414
1566
|
[[ $ENV = "production" || $ENV = "staging" ]] && default_tag="master-latest" || default_tag="${ENV}-latest"
|
|
1415
1567
|
local image_tag=${5:-$default_tag}
|
|
1416
1568
|
local IMAGE="949316342391.dkr.ecr.eu-west-1.amazonaws.com/colisweb-api:$image_tag"
|
|
@@ -1460,7 +1612,8 @@ railsc_k8s() {
|
|
|
1460
1612
|
'
|
|
1461
1613
|
|
|
1462
1614
|
sleep 5
|
|
1463
|
-
kubectl -n $ENV exec -
|
|
1615
|
+
KUBERAILS="kubectl -n $ENV exec -ti $POD_NAME -- /usr/src/app/bin/rails c"
|
|
1616
|
+
[ -z "$COMMAND" ] && eval $KUBERAILS || echo $COMMAND | eval $KUBERAILS
|
|
1464
1617
|
|
|
1465
1618
|
print "End of $POD_NAME "
|
|
1466
1619
|
kubectl -n $ENV delete pods $POD_NAME
|
|
@@ -1730,11 +1883,18 @@ docker_build_push() {
|
|
|
1730
1883
|
|
|
1731
1884
|
if ! image_exists $DOCKER_REGISTRY_ID $APPLICATION $CI_COMMIT_SHORT_SHA ; then
|
|
1732
1885
|
docker pull $DOCKER_IMAGE || true
|
|
1733
|
-
|
|
1886
|
+
SOURCE_URL=${CI_PROJECT_URL:8} # without "https://" protocol, like gitlab.com/colisweb-idl/colisweb/back/packing
|
|
1887
|
+
docker build $DOCKER_BUILD_ARGS \
|
|
1888
|
+
-t $DOCKER_IMAGE_SHA \
|
|
1889
|
+
--label org.opencontainers.image.revision=$(git rev-parse HEAD) \
|
|
1890
|
+
--label org.opencontainers.image.source=$SOURCE_URL \
|
|
1891
|
+
--cache-from $DOCKER_IMAGE \
|
|
1892
|
+
$DOCKER_STAGE_PATH
|
|
1734
1893
|
docker push $DOCKER_IMAGE_SHA
|
|
1735
1894
|
fi
|
|
1736
1895
|
}
|
|
1737
1896
|
|
|
1897
|
+
|
|
1738
1898
|
docker_promote() {
|
|
1739
1899
|
# inspired by https://dille.name/blog/2018/09/20/how-to-tag-docker-images-without-pulling-them/
|
|
1740
1900
|
OLD_TAG=${1//[^0-9a-zA-Z-.]/_}
|
|
@@ -1761,6 +1921,7 @@ docker_promote() {
|
|
|
1761
1921
|
image_exists ${DOCKER_REGISTRY_ID} ${IMAGE_TO_CHECK} ${VERSION} || return 1
|
|
1762
1922
|
done
|
|
1763
1923
|
}
|
|
1924
|
+
|
|
1764
1925
|
#!/usr/bin/env bash
|
|
1765
1926
|
|
|
1766
1927
|
extract_yaml_config_variable() {
|
|
@@ -1837,7 +1998,7 @@ flyway_clean() {
|
|
|
1837
1998
|
|
|
1838
1999
|
#!/usr/bin/env bash
|
|
1839
2000
|
|
|
1840
|
-
FLYWAY_VERSION="
|
|
2001
|
+
FLYWAY_VERSION="7.4.0"
|
|
1841
2002
|
|
|
1842
2003
|
|
|
1843
2004
|
get_yaml_variable() {
|
|
@@ -1923,7 +2084,7 @@ flyway_migrate() {
|
|
|
1923
2084
|
"containers":[
|
|
1924
2085
|
{
|
|
1925
2086
|
"name":"'$POD_NAME'",
|
|
1926
|
-
"image":"
|
|
2087
|
+
"image":"flyway/flyway:'$flyway_version'",
|
|
1927
2088
|
"command":["flyway", "-url='$db_url'", "-user='$db_user'", "-password='$db_password'", "migrate"],
|
|
1928
2089
|
"volumeMounts":[
|
|
1929
2090
|
{
|
|
@@ -1948,6 +2109,63 @@ flyway_migrate() {
|
|
|
1948
2109
|
kubectl -n $namespace delete configmap $CONFIGMAP_NAME
|
|
1949
2110
|
}
|
|
1950
2111
|
|
|
2112
|
+
#!/usr/bin/env bash
|
|
2113
|
+
flyway_repair() {
|
|
2114
|
+
set -e
|
|
2115
|
+
check_env_vars 4 "APPLICATION" "ENVIRONMENT" "FLYWAY_VERSION" "MIGRATION_SQL_PATH"
|
|
2116
|
+
|
|
2117
|
+
PG_YAML_PATH=".${APPLICATION}config.postgres"
|
|
2118
|
+
|
|
2119
|
+
DB_PORT="5432"
|
|
2120
|
+
DB_HOST=$(get_yaml_variable "${PG_YAML_PATH}.host")
|
|
2121
|
+
DB_DATABASE=$(get_yaml_variable "${PG_YAML_PATH}.database")
|
|
2122
|
+
DB_USER=$(get_yaml_variable "${PG_YAML_PATH}.user")
|
|
2123
|
+
DB_PASSWORD=$(get_yaml_variable "${PG_YAML_PATH}.password")
|
|
2124
|
+
DB_URL="jdbc:postgresql://${DB_HOST}:${DB_PORT}/${DB_DATABASE}"
|
|
2125
|
+
|
|
2126
|
+
flyway_sql_folder=$(pwd)/${MIGRATION_SQL_PATH}
|
|
2127
|
+
|
|
2128
|
+
configure_kubectl_for_ci "${ENVIRONMENT}"
|
|
2129
|
+
POD_NAME="${APPLICATION}-flyway-repair"
|
|
2130
|
+
CONFIGMAP_NAME="${APPLICATION}-flyway-repair-sql"
|
|
2131
|
+
|
|
2132
|
+
kubectl -n "${ENVIRONMENT}" delete configmap $CONFIGMAP_NAME --ignore-not-found
|
|
2133
|
+
kubectl -n "${ENVIRONMENT}" delete pod $POD_NAME --ignore-not-found
|
|
2134
|
+
kubectl -n "${ENVIRONMENT}" create configmap $CONFIGMAP_NAME --from-file="${flyway_sql_folder}"
|
|
2135
|
+
|
|
2136
|
+
kubectl -n "${ENVIRONMENT}" run --rm -it "${POD_NAME}" \
|
|
2137
|
+
--image=flyway/flyway \
|
|
2138
|
+
--restart=Never \
|
|
2139
|
+
--overrides='
|
|
2140
|
+
{
|
|
2141
|
+
"spec":{
|
|
2142
|
+
"containers":[
|
|
2143
|
+
{
|
|
2144
|
+
"name":"'$POD_NAME'",
|
|
2145
|
+
"image":"flyway/flyway:'${FLYWAY_VERSION}'",
|
|
2146
|
+
"command":["flyway", "-url='$DB_URL'", "-user='$DB_USER'", "-password='$DB_PASSWORD'", "repair"],
|
|
2147
|
+
"volumeMounts":[
|
|
2148
|
+
{
|
|
2149
|
+
"name":"sql",
|
|
2150
|
+
"mountPath":"/flyway/sql"
|
|
2151
|
+
}
|
|
2152
|
+
]
|
|
2153
|
+
}
|
|
2154
|
+
],
|
|
2155
|
+
"volumes":[
|
|
2156
|
+
{
|
|
2157
|
+
"name":"sql",
|
|
2158
|
+
"configMap":{
|
|
2159
|
+
"name":"'$CONFIGMAP_NAME'"
|
|
2160
|
+
}
|
|
2161
|
+
}
|
|
2162
|
+
]
|
|
2163
|
+
}
|
|
2164
|
+
}
|
|
2165
|
+
'
|
|
2166
|
+
kubectl -n "${ENVIRONMENT}" delete configmap $CONFIGMAP_NAME
|
|
2167
|
+
}
|
|
2168
|
+
|
|
1951
2169
|
#!/usr/bin/env bash
|
|
1952
2170
|
|
|
1953
2171
|
record_git_commit() {
|