@colisweb/rescript-toolkit 4.18.7 → 4.20.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -0,0 +1,2641 @@
1
+ #!/usr/bin/env bash
2
+
3
+ #VARIABLES
4
+ export SCRIPT_FULL_PATH=$(dirname "$0")
5
+
6
+ ##FUNCTIONS
7
+ # https://stackoverflow.com/questions/1527049/how-can-i-join-elements-of-an-array-in-bash
8
+ join_by() {
9
+ local d=${1-} f=${2-}
10
+ if shift 2; then
11
+ printf %s "$f" "${@/#/$d}"
12
+ fi
13
+ }
14
+
15
+ mkstring() {
16
+ local start=$1
17
+ local separator=$2
18
+ local end=$3
19
+ shift 3
20
+
21
+ if [ $# -gt 0 ]; then
22
+ printf $start
23
+ join_by $separator $*
24
+ printf $end
25
+ fi
26
+ }
27
+
28
+ md5all() {
29
+ all_hash=$(mktemp)
30
+ for name in $*; do
31
+ find $name -type f -exec cat {} \; | md5sum | cut -f1 -d ' ' >> $all_hash
32
+ done;
33
+ cat $all_hash | md5sum | cut -f1 -d ' '
34
+ }
35
+
36
+ log() {
37
+ echo "$*" >&2
38
+ }
39
+ #!/usr/bin/env bash
40
+
41
+ check_args() {
42
+ if [ -z $2 ] || [ "$1" != "$2" ]; then
43
+ echo >&2 "missing argument $1"
44
+ return 1
45
+ fi
46
+ }
47
+
48
+ check_env_vars() {
49
+ ArgsCount=$1 && shift
50
+ for ((i = 0; i < $ArgsCount; i++)); do
51
+ if [[ -z "${!1}" ]]; then
52
+ echo >&2 "missing ENV $1"
53
+ return 1
54
+ fi
55
+ shift
56
+ done
57
+ }
58
+
59
+ extract_arg() {
60
+ name=$1
61
+ passed=$2
62
+ value=$3
63
+ if [ "--$name" != "$passed" ]; then
64
+ echo "missing argument $name"
65
+ exit 1
66
+ fi
67
+ eval $name='$value'
68
+ }
69
+
70
+ extract_args() {
71
+ declare -a Array_Args
72
+ ArgsCount=$1 && shift
73
+ for ((i = 0; i < $ArgsCount; i++)); do
74
+ Array_Args[i]=$1 && shift
75
+ done
76
+ for ArgName in "${Array_Args[@]}"; do
77
+ extract_arg "$ArgName" $* && shift 2
78
+ done
79
+ }
80
+
81
+ #!/usr/bin/env bash
82
+
83
+ aws_ecr_login() {
84
+ PATH=/root/.local/bin:$PATH
85
+
86
+ aws ecr get-login-password \
87
+ | docker login --username AWS --password-stdin 949316342391.dkr.ecr.eu-west-1.amazonaws.com \
88
+ || (echo "you should update to AWS CLI version 2 https://docs.aws.amazon.com/cli/latest/userguide/install-cliv2-mac.html " $(aws ecr get-login --region=eu-west-1 --no-include-email) )
89
+ }
90
+
91
+ aws_ecr_token() {
92
+ aws ecr get-authorization-token --region=eu-west-1 --output text --query 'authorizationData[].authorizationToken'
93
+ }
94
+
95
+ # you will need jq to use these commands. You can install it using "brew install jq"
96
+ # delete_images colisweb_api 8
97
+ # will delete images older than 8 weeks
98
+ delete_images() {
99
+
100
+ REPO=$1
101
+ WEEKS=${2:-16}
102
+
103
+ WEEKS_AGO=$(date -v-${WEEKS}w +%F)
104
+
105
+ #Get all ecr images
106
+ IMAGES=$(aws ecr describe-images --repository-name $REPO --output json)
107
+
108
+ #Filter unnecessary values and map `imagePushedAt` to EPOCH
109
+ NON_LATEST_IMAGES=$(echo $IMAGES | jq '[.imageDetails[] | select(.imageTags | any(endswith("latest")) | not)]')
110
+
111
+ #Filter on EPOCH
112
+ OLD_IMAGES=$(echo $NON_LATEST_IMAGES | jq --arg date $WEEKS_AGO '.[] | select(.imagePushedAt[0:10] < $date).imageDigest')
113
+ while IFS= read -r IMAGE; do
114
+ if [ "$IMAGE" != "" ]; then
115
+ echo "Deleting $IMAGE from $REPO"
116
+ AWS_PAGER="" aws ecr batch-delete-image --repository-name $REPO --image-ids imageDigest=$IMAGE
117
+ fi
118
+ done <<< "$OLD_IMAGES"
119
+ }
120
+
121
+ # delete_images_all_repos 12
122
+ # will delete images in all repositories older than 12 weeks
123
+ delete_images_all_repos() {
124
+ REPOSITORIES=$(aws ecr describe-repositories --output json | jq -r '.[]|.[].repositoryName')
125
+
126
+ while IFS= read -r REPO; do
127
+ echo "processing ECR repository $REPO"
128
+ delete_images $REPO $1
129
+ done <<< "$REPOSITORIES"
130
+ }
131
+
132
+ delete_old_cache() {
133
+ DATE=${1:-$(date -v-1m +%F)}
134
+ CACHE_BUCKET=${2:-"s3://gitlab-colisweb-distributed-cache/project/"}
135
+
136
+ echo "deleting from cache $CACHE_BUCKET all older than $DATE"
137
+
138
+ aws_ecr_login
139
+
140
+ while read -r line; do
141
+ datum=$(echo $line | cut -c1-10)
142
+ if [[ "$datum" < "$DATE" ]] ; then
143
+ # Shell Parameter Expansion: ${parameter##word}
144
+ # Allow to return the result from "word" to the end of "parameters"
145
+ # Here we need the end of the string after "project/" (corresponding to the S3 gitlab project id and filename)
146
+ TO_DELETE="$CACHE_BUCKET${line##* project/}"
147
+ echo $TO_DELETE
148
+ aws s3 rm $TO_DELETE
149
+ fi
150
+ done < <(aws s3 ls $CACHE_BUCKET --recursive)
151
+ }
152
+
153
+ #!/usr/bin/env bash
154
+
155
+ # If gitlab is down or pipeline are stuck, hotfixes need to be available
156
+ # This script will publish docker images to ECR using your current git HEAD, then deploy them to a given environment.
157
+ # Some local files (git-commit.conf and sentry.properties) will be updated, take caution.
158
+ # No trace of this will appear on Gitlab (no releases, no pipelines, no tags).
159
+ # create_hotfix_scala $ENVIRONMENT $CHART_NAME [ $MODULE_NAME $MODULE_PATH $DEPLOYMENT ]
160
+ # create_hotfix_scala testing crm main modules/3-executables/main crm
161
+ # create_hotfix_scala testing notification \
162
+ # main-http modules/3-executables/main-http notification-http \
163
+ # main-consumer modules/3-executables/main-consumer notification-consumer
164
+
165
+ create_hotfix_scala() {
166
+
167
+ ENVIRONMENT=$1
168
+ CHART_NAME=$2
169
+ shift 2
170
+
171
+ SHORT_SHA=$(git rev-parse --short HEAD)
172
+ HOTFIX_TAG="hotfix-$SHORT_SHA"
173
+
174
+ gum confirm "Preparing $HOTFIX_TAG for $CHART_NAME ?" || exit
175
+ prepare_hotfix_scala $HOTFIX_TAG
176
+
177
+ gum confirm "Building $HOTFIX_TAG for $CHART_NAME ?" || exit
178
+ while [[ $# -gt 2 ]] ; do
179
+ build_hotfix_scala $HOTFIX_TAG "$1" "$2" "$3"
180
+ shift 3
181
+ done
182
+
183
+ gum confirm "Deploying $HOTFIX_TAG for $CHART_NAME ?" || exit
184
+ deploy_hotfix $CHART_NAME $ENVIRONMENT $HOTFIX_TAG
185
+ }
186
+
187
+ # Update local git-commit.conf and sentry.properties files using git short sha
188
+ prepare_hotfix_scala() {
189
+ HOTFIX_TAG=$1
190
+
191
+ git secret reveal -f
192
+ aws_ecr_login
193
+
194
+ COMMIT_CONF_FILES=$(find . -name "git-commit.conf")
195
+ SENTRY_PROPERTIES_FILES=$(find . -name "sentry.properties")
196
+
197
+ for file in $(echo "$COMMIT_CONF_FILES\n$SENTRY_PROPERTIES_FILES"); do
198
+ sed -i '' -e 's&GIT_COMMIT&'"$HOTFIX_TAG&" $file
199
+ done
200
+
201
+ }
202
+
203
+ # Build docker images locally and publish them to AWS ECR.
204
+ build_hotfix_scala() {
205
+
206
+ HOTFIX_TAG=$1
207
+ SBT_MODULE=$2
208
+ DOCKER_PATH=$3
209
+ DEPLOYMENT=$4
210
+
211
+ DOCKER_REGISTRY_ID="949316342391"
212
+ DOCKER_REGISTRY="$DOCKER_REGISTRY_ID.dkr.ecr.eu-west-1.amazonaws.com"
213
+ DOCKER_IMAGE=$DOCKER_REGISTRY/$DEPLOYMENT
214
+ HOTFIX_IMAGE=$DOCKER_IMAGE:$HOTFIX_TAG
215
+
216
+ #Build
217
+ sbt "project $SBT_MODULE" "Docker / stage"
218
+
219
+ #Publish
220
+ docker build --platform "linux/amd64" -t $HOTFIX_IMAGE --cache-from $DOCKER_IMAGE "$DOCKER_PATH/target/docker/stage"
221
+ docker push $HOTFIX_IMAGE
222
+
223
+ echo "Created hotfix $HOTFIX_IMAGE"
224
+ }
225
+
226
+ # Deploy the project in the given environment
227
+ deploy_hotfix() {
228
+ source $colisweb_scripts/ci/helm.sh
229
+
230
+ CHART_NAME=$1
231
+ ENVIRONMENT=$2
232
+ HOTFIX_TAG=$3
233
+
234
+ CONFIG_PATH=deploy
235
+ CHART_PATH=$CONFIG_PATH/$CHART_NAME
236
+ ROOT_PATH=$(pwd)
237
+
238
+ # Unset Kubectl configuration made via the KUBECONFIG env variable
239
+ # it would override the config made by configure_kubectl_for
240
+ # for example, using Gitlab runners in Kubernetes sets this variable and causes conflict
241
+ unset KUBECONFIG
242
+
243
+ # Configure Kubectl
244
+ configure_kubectl_for $ENVIRONMENT
245
+
246
+ # Avoiding "no local-index.yaml" or "empty local-index.yaml" error
247
+ cat > $HOME/Library/Caches/helm/repository/local-index.yaml <<EOT
248
+ apiVersion: v1
249
+ entries:
250
+ cronjob:
251
+ EOT
252
+
253
+ # helm3 stable repo have changed and must be updated manually, in versions < v2.17.0
254
+ helm3 repo add colisweb s3://colisweb-helm-charts/colisweb --force-update
255
+ helm3 repo add stable https://charts.helm.sh/stable --force-update
256
+ helm3 repo update
257
+ helm3 dependency update ${ROOT_PATH}/${CHART_PATH}
258
+
259
+ # Gather values/*.yaml files
260
+ VALUES_PATH="${ROOT_PATH}/${CHART_NAME}/values"
261
+ VALUES_FILES=''
262
+ [ -d $VALUES_PATH ] && VALUES_FILES=$(find $VALUES_PATH -type f -maxdepth 1 -name "*.yaml" | sed 's/^/ -f /' | tr -d \\n | sed 's/%//')
263
+
264
+ # Deploy
265
+ helm3 upgrade --install \
266
+ --namespace ${ENVIRONMENT} \
267
+ ${VALUES_FILES} \
268
+ -f ${ROOT_PATH}/${CONFIG_PATH}/common.yaml \
269
+ -f ${ROOT_PATH}/${CONFIG_PATH}/${ENVIRONMENT}.yaml \
270
+ -f ${ROOT_PATH}/${CONFIG_PATH}/${ENVIRONMENT}-secrets.yaml \
271
+ --set global.version=$HOTFIX_TAG \
272
+ ${CHART_NAME} ${ROOT_PATH}/${CHART_PATH}
273
+
274
+
275
+ verify_deployments_v3 -t 10m $ENVIRONMENT $CHART_NAME
276
+
277
+ }
278
+
279
+ #!/usr/bin/env bash
280
+
281
+ image_exists() {
282
+ set -e
283
+
284
+ REGISTRY=$1
285
+ REPOSITORY=$2
286
+ IMAGE=$3
287
+
288
+ TAGGED_IMAGE="$REGISTRY/$REPOSITORY:$IMAGE"
289
+
290
+ aws ecr describe-images --registry-id $REGISTRY --repository-name $REPOSITORY --image-ids "imageTag=$IMAGE"
291
+
292
+ if [ $? -eq 0 ]
293
+ then
294
+ echo "Image $TAGGED_IMAGE already present in distant repo"
295
+ return 0
296
+ else
297
+ echo "Image $TAGGED_IMAGE NOT present in distant repo"
298
+ return 1
299
+ fi
300
+ }
301
+ #!/usr/bin/env bash
302
+
303
+ gmm() {
304
+ git checkout $1
305
+ git pull
306
+ git checkout $2
307
+ git pull
308
+ git merge $1
309
+ git push
310
+ }
311
+
312
+ git_damn_merge() {
313
+ git checkout $1
314
+ git pull
315
+ git checkout $2
316
+ git dammit
317
+ git merge $1
318
+ git push
319
+ }
320
+
321
+ git_prune_local_branches() {
322
+ git branch -r |
323
+ awk '{print $1}' |
324
+ egrep -v -f /dev/fd/0 <(git branch -vv | grep origin) |
325
+ awk '{print $1}' |
326
+ xargs git branch -d
327
+ }
328
+
329
+ gum_checkout() {
330
+ git branch -a | cut -f3- -d "/" | gum filter | xargs git checkout
331
+ }
332
+
333
+ # useful option :
334
+ # export GIT_SUBLINE_MERGE_NON_INTERACTIVE_MODE=TRUE
335
+ # see https://github.com/paulaltin/git-subline-merge
336
+ setup_subline_merge() {
337
+ location=${1:-"--local"}
338
+
339
+ case $location in
340
+ --local)
341
+ if [ -d ".git" ]; then
342
+ echo "* merge=subline" >>.git/info/attributes
343
+ else
344
+ echo "Cannot use local option, not in a git repository"
345
+ return 1
346
+ fi
347
+ ;;
348
+ --global)
349
+ echo "* merge=subline" >>~/.gitattributes
350
+ ;;
351
+ *)
352
+ echo "unknown argument $location"
353
+ return 2
354
+ ;;
355
+ esac
356
+
357
+ git config $location merge.conflictStyle diff3
358
+ git config $location merge.subline.driver "$colisweb_scripts/shell-session/shell/dev/git-subline-merge %O %A %B %L %P"
359
+ git config $location merge.subline.recursive binary
360
+ }
361
+
362
+ rebase_from_ancestor() {
363
+ set -x
364
+ branch=$1
365
+ tip=$(git rev-parse HEAD)
366
+ ancestor=$(git merge-base $branch $tip)
367
+ commits=$(git log $ancestor..$tip)
368
+ git reset --hard $ancestor
369
+ git merge --squash $tip
370
+ git commit -m "squashed commmits $commits" || echo "nothing committed"
371
+ git rebase $branch -Xtheirs
372
+ }
373
+
374
+ #!/usr/bin/env bash
375
+
376
+ import_all_pgp_keys() {
377
+ echo "importing all PGP keys"
378
+ gpg --import $SCRIPT_FULL_PATH/pgp_keys/*.key
379
+ }
380
+
381
+ remove_all_persons_from_secrets() {
382
+ echo "cleanup git secret"
383
+ WHO_KNOWS=($(git secret whoknows))
384
+ git secret removeperson $WHO_KNOWS
385
+ echo "Removed secrets access for $WHO_KNOWS"
386
+ }
387
+
388
+ all_pgp_emails() {
389
+ gpg --show-key $SCRIPT_FULL_PATH/pgp_keys/*.key | sed -rn "s/.*<(.*)>/\1/p"
390
+ }
391
+
392
+ set_all_secret_keys() {
393
+
394
+ import_all_pgp_keys
395
+
396
+ git secret reveal -f
397
+
398
+ remove_all_persons_from_secrets
399
+
400
+ if [ $# -eq 0 ]; then
401
+ echo "No emails supplied, using dev-tools pgp keys as source"
402
+ IN_THE_KNOW=($(gum choose --no-limit $(all_pgp_emails)))
403
+ else
404
+ IN_THE_KNOW=($*)
405
+ fi
406
+
407
+ git secret tell $IN_THE_KNOW
408
+ git secret hide
409
+ git secret whoknows
410
+
411
+ echo "all secrets updated, you'll need to commit the changes"
412
+ }
413
+
414
+ #!/usr/bin/env bash
415
+
416
+ start_ssh_bastion() {
417
+ ENV=$1
418
+ SSH_LOCAL_PORT=$2
419
+ POD_NAME=ssh-bastion-$USERNAME
420
+ CONFIG_MAP_NAME=ssh-bastion-$USERNAME
421
+ configure_kubectl_for $ENV
422
+ kubectl get pods -o name | grep pod/$POD_NAME
423
+ if [ $? -eq 0 ]; then
424
+ echo "$POD_NAME is already running"
425
+ else
426
+ #configmap
427
+ kubectl get configmap $CONFIG_MAP_NAME && kubectl delete configmap $CONFIG_MAP_NAME
428
+ tempdir=$(mktemp -d)
429
+ cat <<EOF > $tempdir/sshd_config
430
+ AllowTcpForwarding yes
431
+ Port 2222
432
+ PermitRootLogin yes
433
+ AuthorizedKeysFile /etc/ssh/authorized_keys
434
+ EOF
435
+ cp ~/.ssh/id_rsa.pub $tempdir/authorized_keys
436
+ kubectl create configmap $CONFIG_MAP_NAME --from-file=$tempdir
437
+
438
+ #pod
439
+ kubectl get pod $POD_NAME && kubectl delete pod $POD_NAME
440
+ cat <<EOF | kubectl create -f -
441
+
442
+ apiVersion: v1
443
+ kind: Pod
444
+ metadata:
445
+ name: $POD_NAME
446
+ spec:
447
+ containers:
448
+ - name: $POD_NAME
449
+ image: sickp/alpine-sshd:7.4
450
+ ports:
451
+ - containerPort: 2222
452
+ volumeMounts:
453
+ - mountPath: /etc/ssh/sshd_config
454
+ name: ssh-config
455
+ subPath: sshd_config
456
+ - mountPath: /etc/ssh/authorized_keys
457
+ name: ssh-config
458
+ subPath: authorized_keys
459
+ volumes:
460
+ - name: ssh-config
461
+ configMap:
462
+ name: $CONFIG_MAP_NAME
463
+ EOF
464
+
465
+ fi
466
+
467
+ # You need a recent kubectl for wait to work (1.15 works), install or upgrade
468
+ # with brew :
469
+ # brew install kubernetes-cli
470
+ # brew upgrade kubernetes-cli
471
+ kubectl wait --for=condition=Ready pod/$POD_NAME
472
+
473
+ # kube port-forward
474
+ lsof -ti tcp:$SSH_LOCAL_PORT | xargs kill
475
+ kubectl port-forward $POD_NAME $SSH_LOCAL_PORT:2222 &
476
+ while ! nc -z 127.0.0.1 $SSH_LOCAL_PORT; do
477
+ sleep 1
478
+ done
479
+ echo "forwarding ssh via local port $SSH_LOCAL_PORT"
480
+ echo "remember to terminate the bastion with 'stop_ssh_bastion'"
481
+ }
482
+
483
+ stop_ssh_bastion() {
484
+ POD_NAME=ssh-bastion-$USERNAME
485
+ kubectl delete pod $POD_NAME
486
+ }
487
+
488
+ #!/usr/bin/env bash
489
+
490
+ configure_kubectl_for() {
491
+ local infra_env="$1"
492
+ local valid_envs="[testing][staging][production][performance][tests][recette]"
493
+ echo "$valid_envs" | grep -q "\[$infra_env\]"
494
+
495
+ if [ $? -ne 0 ]; then
496
+ echo "Cannot configure kubectl for invalid env : $infra_env"
497
+ echo "choose one of $valid_envs"
498
+ return 1
499
+ fi
500
+
501
+ aws eks update-kubeconfig --name "toutatis-$infra_env-eks" >&2
502
+ }
503
+
504
+ #!/usr/bin/env bash
505
+
506
+ # WARNING : never try to do a dump directly from the database_production_ca
507
+ # this could cause lot of lock database issues.
508
+ # always use database_production_read_replica_ca instead
509
+ database_k8s() {
510
+ MODE=$1
511
+ case $MODE in
512
+ "tests") SSH_LOCAL_PORT=2224;PG_LOCAL_PORT=24440;CA_LOCAL_PORT=25430;ENV="tests";;
513
+ "testing") SSH_LOCAL_PORT=2225;PG_LOCAL_PORT=24441;CA_LOCAL_PORT=25431;ENV="testing";;
514
+ "staging") SSH_LOCAL_PORT=2226;PG_LOCAL_PORT=24442;CA_LOCAL_PORT=25432;ENV="staging";;
515
+ "production") SSH_LOCAL_PORT=2227;PG_LOCAL_PORT=24443;CA_LOCAL_PORT=25433;ENV="production";;
516
+ "production_rw") SSH_LOCAL_PORT=2227;PG_LOCAL_PORT=24444;CA_LOCAL_PORT=25434;ENV="production";;
517
+ "recette") SSH_LOCAL_PORT=2228;PG_LOCAL_PORT=24446;CA_LOCAL_PORT=25436;ENV="recette";;
518
+ *) echo "Unsupported ENV : $MODE"; return 1 ;;
519
+ esac
520
+
521
+ start_ssh_bastion $ENV $SSH_LOCAL_PORT
522
+
523
+ lsof -ti tcp:$PG_LOCAL_PORT | xargs kill
524
+
525
+ bastion_config=$(mktemp)
526
+ cat > "$bastion_config" <<EOF
527
+ UserKnownHostsFile /dev/null
528
+ StrictHostKeyChecking no
529
+ User root
530
+ Host bastion_tests
531
+ HostName 127.0.0.1
532
+ Port 2224
533
+ LocalForward 24440 toutatis-tests-db.ca0rjdmnxf1x.eu-west-1.rds.amazonaws.com:5432
534
+ Host bastion_testing
535
+ HostName 127.0.0.1
536
+ Port 2225
537
+ LocalForward 24441 toutatis-testing-db.ca0rjdmnxf1x.eu-west-1.rds.amazonaws.com:5432
538
+ LocalForward 25431 toutatis-testing-mysql-db.ca0rjdmnxf1x.eu-west-1.rds.amazonaws.com:3306
539
+ LocalForward 25531 testapirds.ca0rjdmnxf1x.eu-west-1.rds.amazonaws.com:3306
540
+ Host bastion_staging
541
+ HostName 127.0.0.1
542
+ Port 2226
543
+ LocalForward 24442 toutatis-staging-db.ca0rjdmnxf1x.eu-west-1.rds.amazonaws.com:5432
544
+ LocalForward 25432 toutatis-staging-mysql-db.ca0rjdmnxf1x.eu-west-1.rds.amazonaws.com:3306
545
+ Host bastion_recette
546
+ HostName 127.0.0.1
547
+ Port 2228
548
+ LocalForward 24446 toutatis-recette-db.ca0rjdmnxf1x.eu-west-1.rds.amazonaws.com:5432
549
+ LocalForward 25436 toutatis-recette-mysql-db.ca0rjdmnxf1x.eu-west-1.rds.amazonaws.com:3306
550
+ LocalForward 25536 testapirds.ca0rjdmnxf1x.eu-west-1.rds.amazonaws.com:3306
551
+ Host bastion_production
552
+ HostName 127.0.0.1
553
+ Port 2227
554
+ LocalForward 24443 toutatis-production-db-replica.ca0rjdmnxf1x.eu-west-1.rds.amazonaws.com:5432
555
+ LocalForward 25433 toutatis-production-mysql-db-replica.ca0rjdmnxf1x.eu-west-1.rds.amazonaws.com:3306
556
+ EOF
557
+ if [ "$MODE" = "production_rw" ] ; then
558
+ cat >> "$bastion_config" <<EOF
559
+ LocalForward 24444 toutatis-production-db.ca0rjdmnxf1x.eu-west-1.rds.amazonaws.com:5432
560
+ LocalForward 25434 toutatis-production-mysql-db.ca0rjdmnxf1x.eu-west-1.rds.amazonaws.com:3306
561
+ EOF
562
+ fi
563
+
564
+ ssh -f -N \
565
+ -F "$bastion_config" \
566
+ "bastion_$ENV"
567
+
568
+ echo "sample command : 'psql postgres://postgres@127.0.0.1:$PG_LOCAL_PORT'"
569
+ echo "sample command : 'mysql -u colisweb -h 127.0.0.1 -P $CA_LOCAL_PORT -p db_name'"
570
+
571
+ echo "run 'kubectl delete pod $POD_NAME' when you have finished"
572
+ }
573
+
574
+ psql_on_k8() {
575
+ NAMESPACE=$1
576
+ SERVICE=$2
577
+ CONNECTION=$3
578
+ shift 3
579
+
580
+ kubectl -n $NAMESPACE run ${SERVICE}-postgres-init \
581
+ --image jbergknoff/postgresql-client \
582
+ --restart=Never \
583
+ --attach --rm \
584
+ -- \
585
+ postgresql://${CONNECTION} \
586
+ "$*"
587
+ }
588
+
589
+ mysql_on_k8() {
590
+ local namespace=$1
591
+ local service=$2
592
+ local db_host=$3
593
+ local db_port=$4
594
+ local db_init_username=$5
595
+ local db_init_password=$6
596
+ local query=$7
597
+
598
+ kubectl -n ${namespace} run ${service}-mysql-init \
599
+ --image widdpim/mysql-client \
600
+ --restart=Never \
601
+ --attach --rm \
602
+ -- \
603
+ mysql --host=$db_host --user=$db_init_username --password=$db_init_password --port=$db_port --execute="$query"
604
+ }
605
+ #!/usr/bin/env bash
606
+
607
+ kube_init_database_once() {
608
+
609
+ extract_args 8 namespace db_host db_port db_init_username db_init_password db_database db_username db_password $*
610
+
611
+ echo "======================="
612
+ echo " Initializing Database '$db_database' for namespace $namespace"
613
+ echo "======================="
614
+
615
+ set -x
616
+
617
+ echo "Checking if Database '$db_database' exists"
618
+ set +e
619
+ psql_on_k8 $namespace once "$db_init_username:$db_init_password@$db_host:$db_port" -lqtA | cut -d\| -f1 | grep "^$db_database$"
620
+ return_code=$?
621
+ set -e
622
+
623
+ if [ ${return_code} -eq 0 ]; then
624
+ echo "Database $db_database already exists - nothing to do"
625
+ else
626
+ echo "Database $db_database does not exist - initializing"
627
+
628
+ psql_on_k8 $namespace once "$db_init_username:$db_init_password@$db_host:$db_port" -c 'CREATE DATABASE '"$db_database"';'
629
+ echo "DB created $db_database"
630
+
631
+ psql_on_k8 $namespace once "$db_init_username:$db_init_password@$db_host:$db_port" -c 'CREATE USER '"$db_username"' WITH ENCRYPTED PASSWORD '"'$db_password'"';'
632
+ echo "USER created $db_username"
633
+
634
+ psql_on_k8 $namespace once "$db_init_username:$db_init_password@$db_host:$db_port" -c 'GRANT ALL PRIVILEGES ON DATABASE '"$db_database"' TO '"$db_username"';'
635
+ echo "Granted all privileges for $db_username on $db_database"
636
+ fi
637
+
638
+ echo "======================="
639
+ echo " Database '$db_database' Initialization complete for namespace $namespace"
640
+ echo "======================="
641
+ }
642
+
643
+ kube_init_database_readonly_account() {
644
+
645
+ extract_args 6 namespace service db_connection db_database db_readonly_username db_readonly_password $*
646
+
647
+ echo "======================="
648
+ echo " Initializing Readonly Account '$db_readonly_username' for '$db_database' for namespace $namespace"
649
+ echo "======================="
650
+
651
+ # Print commands before execution, except echo
652
+ trap '[[ $BASH_COMMAND != echo* ]] && echo $BASH_COMMAND' DEBUG
653
+
654
+ echo "Checking if Readonly account '$db_readonly_username' for '$db_database' exists"
655
+ set +e
656
+ psql_on_k8 $namespace $service $db_connection -qtAc 'SELECT rolname FROM pg_roles;' | grep "^$db_readonly_username$"
657
+ return_code=$?
658
+ set -e
659
+
660
+ if [ ${return_code} -eq 0 ]; then
661
+ echo "Account $db_readonly_username already exists - nothing to do"
662
+ else
663
+ echo "Account $db_readonly_username does not exist - creating"
664
+
665
+ psql_on_k8 $namespace $service $db_connection -c 'CREATE USER '"$db_readonly_username"' WITH ENCRYPTED PASSWORD '"'$db_readonly_password'"';'
666
+ psql_on_k8 $namespace $service $db_connection -c 'GRANT CONNECT ON DATABASE '"$db_database"' TO '"$db_readonly_username"';'
667
+ psql_on_k8 $namespace $service $db_connection -c 'GRANT USAGE ON SCHEMA public TO '"$db_readonly_username"';'
668
+ psql_on_k8 $namespace $service $db_connection -c 'GRANT SELECT ON ALL TABLES IN SCHEMA public TO '"$db_readonly_username"';'
669
+ psql_on_k8 $namespace $service $db_connection -c 'ALTER DEFAULT PRIVILEGES IN SCHEMA public GRANT SELECT ON TABLES TO '"$db_readonly_username"';'
670
+
671
+ echo "Created user with read-only permissions for $db_readonly_username on $db_database (schema public)"
672
+ fi
673
+ }
674
+
675
+ kube_init_datadog_in_database() {
676
+ extract_args 8 namespace db_host db_port db_init_username db_init_password db_datadog_username db_datadog_password db_datadog_schema $*
677
+
678
+ echo "======================="
679
+ echo " Initializing Datadog Agent Requiement for namespace $namespace"
680
+ echo "======================="
681
+
682
+ echo "Checking if User '$db_datadog_username' exists"
683
+ local service="datadog"
684
+ found_db_users=$(mysql_on_k8 $namespace $service $db_host $db_port $db_init_username $db_init_password 'SELECT user FROM mysql.user;')
685
+ set +e
686
+ echo $found_db_users | grep "^$db_datadog_username$"
687
+ return_code=$?
688
+ set -e
689
+
690
+ if [ ${return_code} -eq 0 ]; then
691
+ echo "User $db_datadog_username already exists - nothing to do"
692
+ else
693
+ echo "User $db_datadog_username does not exist - initializing"
694
+
695
+ # All the query come from this docs : https://docs.datadoghq.com/fr/database_monitoring/setup_mysql/selfhosted/?tab=mysql56
696
+
697
+ mysql_on_k8 $namespace $service $db_host $db_port $db_init_username $db_init_password 'CREATE USER '"$db_datadog_username"'@"%" IDENTIFIED BY '"'$db_datadog_password'"';'
698
+ echo "USER created $db_datadog_username"
699
+
700
+ mysql_on_k8 $namespace $service $db_host $db_port $db_init_username $db_init_password 'GRANT REPLICATION CLIENT ON *.* TO datadog@"%" WITH MAX_USER_CONNECTIONS 5;'
701
+ echo "ALTER USER $db_datadog_username"
702
+
703
+ mysql_on_k8 $namespace $service $db_host $db_port $db_init_username $db_init_password 'GRANT PROCESS ON *.* TO '"$db_datadog_username"'@"%";'
704
+ echo "Granted PROCESS for $db_datadog_username"
705
+
706
+ mysql_on_k8 $namespace $service $db_host $db_port $db_init_username $db_init_password 'GRANT SELECT ON performance_schema.* TO '"$db_datadog_username"'@"%";'
707
+ echo "Granted SELECT on performance_schema for $db_datadog_username"
708
+
709
+ mysql_on_k8 $namespace $service $db_host $db_port $db_init_username $db_init_password 'CREATE SCHEMA IF NOT EXISTS datadog;'
710
+ echo "CREATE SCHEMA datadog"
711
+
712
+ mysql_on_k8 $namespace $service $db_host $db_port $db_init_username $db_init_password 'GRANT EXECUTE ON datadog.* to '"$db_datadog_username"'@"%";'
713
+ echo "Granted 'GRANT EXECUTE for $db_datadog_username on datadog"
714
+
715
+ mysql_on_k8 $namespace $service $db_host $db_port $db_init_username $db_init_password 'GRANT CREATE TEMPORARY TABLES ON datadog.* TO '"$db_datadog_username"'@"%";'
716
+ echo "Granted CREATE TEMPORARY TABLES for $db_datadog_username"
717
+
718
+
719
+ mysql_on_k8 $namespace $service $db_host $db_port $db_init_username $db_init_password 'DROP PROCEDURE IF EXISTS datadog.explain_statement;
720
+ DELIMITER $$
721
+ CREATE PROCEDURE datadog.explain_statement(IN query TEXT)
722
+ SQL SECURITY DEFINER
723
+ BEGIN
724
+ SET @explain := CONCAT("EXPLAIN FORMAT=json ", query);
725
+ PREPARE stmt FROM @explain;
726
+ EXECUTE stmt;
727
+ DEALLOCATE PREPARE stmt;
728
+ END $$
729
+ DELIMITER ;'
730
+ echo "CREATE PROCEDURE PROCEDURE datadog.explain_statement"
731
+
732
+ mysql_on_k8 $namespace $service $db_host $db_port $db_init_username $db_init_password 'DROP PROCEDURE IF EXISTS '"$db_datadog_username"'.explain_statement;
733
+ DELIMITER $$
734
+ CREATE PROCEDURE '"$db_datadog_username"'.explain_statement(IN query TEXT)
735
+ SQL SECURITY DEFINER
736
+ BEGIN
737
+ SET @explain := CONCAT("EXPLAIN FORMAT=json ", query);
738
+ PREPARE stmt FROM @explain;
739
+ EXECUTE stmt;
740
+ DEALLOCATE PREPARE stmt;
741
+ END $$
742
+ DELIMITER ;
743
+ GRANT EXECUTE ON PROCEDURE '"$db_datadog_username"'.explain_statement TO datadog@"%";'
744
+ echo "CREATE PROCEDURE on SCHEMA $db_datadog_schema for $db_datadog_username"
745
+
746
+ mysql_on_k8 $namespace $service $db_host $db_port $db_init_username $db_init_password 'DROP PROCEDURE IF EXISTS datadog.enable_events_statements_consumers;
747
+ DELIMITER $$
748
+ CREATE PROCEDURE datadog.enable_events_statements_consumers()
749
+ SQL SECURITY DEFINER
750
+ BEGIN
751
+ UPDATE performance_schema.setup_consumers SET enabled="YES" WHERE name LIKE "events_statements_%";
752
+ END $$
753
+ DELIMITER ;
754
+ GRANT EXECUTE ON PROCEDURE datadog.enable_events_statements_consumers TO datadog@"%";'
755
+
756
+ echo "CREATE PROCEDURE on datadog.enable_events_statements_consumers"
757
+ fi
758
+
759
+ echo "======================="
760
+ echo " Database '$db_datadog_schema' Initialization complete for namespace $namespace"
761
+ echo "======================="
762
+ }
763
+
764
+ kube_init_datadog_in_postgres_database() {
765
+ extract_args 7 namespace db_host db_port db_init_username db_init_password db_datadog_username db_datadog_password $*
766
+
767
+ local service="datadog"
768
+ local db_connection="$db_init_username:$db_init_password@$db_host:$db_port"
769
+
770
+ echo "======================="
771
+ echo " Initializing $service Agent On PostgresSQL Database Requirement for namespace $namespace"
772
+ echo "======================="
773
+
774
+ echo "Checking if User '$db_datadog_username' exists"
775
+
776
+ set +e
777
+ if psql_on_k8 $namespace $service $db_connection -qtAc 'SELECT usename FROM pg_catalog.pg_user;' | grep "^$db_datadog_username$";
778
+ then
779
+ echo "User $db_datadog_username already exists - nothing to do"
780
+ else
781
+ echo "User $db_datadog_username does not exist - initializing"
782
+
783
+ set -e
784
+ psql_on_k8 $namespace $service $db_connection -qc 'CREATE USER '"$db_datadog_username"' WITH password '"'$db_datadog_password'"';'
785
+ echo "User created $db_datadog_username"
786
+
787
+ psql_on_k8 $namespace $service $db_connection -qc 'CREATE SCHEMA datadog;'
788
+ echo "Schema datadog created"
789
+
790
+ psql_on_k8 $namespace $service $db_connection -qc 'GRANT USAGE ON SCHEMA datadog TO datadog;'
791
+ echo "Granted usage for datadog schema to datadog"
792
+
793
+ psql_on_k8 $namespace $service $db_connection -qc 'GRANT USAGE ON SCHEMA public TO datadog;'
794
+ echo "Granted usage for public schema to datadog"
795
+
796
+ psql_on_k8 $namespace $service $db_connection -qc 'GRANT pg_monitor TO datadog;'
797
+ echo "Granted pg_monitor to datadog"
798
+
799
+ psql_on_k8 $namespace $service $db_connection -qc 'CREATE EXTENSION IF NOT EXISTS pg_stat_statements schema public;'
800
+ echo "Extension pg_stat_statements created"
801
+
802
+ local datadog_function_path="/tmp/datatog-explain-statement-function.sql"
803
+ local datadog_function="CREATE OR REPLACE FUNCTION datadog.explain_statement(
804
+ l_query TEXT,
805
+ OUT explain JSON
806
+ )
807
+ RETURNS SETOF JSON AS
808
+ \\$\\$
809
+ DECLARE
810
+ curs REFCURSOR;
811
+ plan JSON;
812
+
813
+ BEGIN
814
+ OPEN curs FOR EXECUTE pg_catalog.concat('EXPLAIN (FORMAT JSON) ', l_query);
815
+ FETCH curs INTO plan;
816
+ CLOSE curs;
817
+ RETURN QUERY SELECT plan;
818
+ END;
819
+ \\$\\$
820
+ LANGUAGE 'plpgsql'
821
+ RETURNS NULL ON NULL INPUT
822
+ SECURITY DEFINER;"
823
+
824
+ kubectl -n $namespace run $service-postgres-init \
825
+ --image jbergknoff/postgresql-client \
826
+ --restart=Never \
827
+ --attach --rm \
828
+ --command \
829
+ -- \
830
+ /bin/sh -c "echo -e \"$datadog_function\" > $datadog_function_path; psql postgresql://$db_connection -qf $datadog_function_path"
831
+
832
+ echo "Function datadog.explain_statement created"
833
+ fi
834
+
835
+ echo "======================="
836
+ echo " Database $service Initialization complete for namespace $namespace"
837
+ echo "======================="
838
+ }
839
+
840
+ kube_init_service_database() {
841
+
842
+ extract_args 9 namespace service db_host db_port db_init_username db_init_password db_database db_username db_password $*
843
+
844
+ local db_connection="$db_init_username:$db_init_password@$db_host:$db_port"
845
+
846
+ set -x
847
+
848
+ echo "Checking if Database '$db_database' exists"
849
+ set +e
850
+ psql_on_k8 $namespace $service $db_connection -lqtA | cut -d\| -f1 | grep "^$db_database$"
851
+ return_code=$?
852
+ set -e
853
+
854
+ if [ ${return_code} -eq 0 ]; then
855
+ echo "Database $db_database already exists - nothing to do"
856
+ else
857
+ echo "Database $db_database does not exist - initializing"
858
+
859
+ psql_on_k8 $namespace $service $db_connection -c 'CREATE DATABASE '"$db_database"';'
860
+ echo "DB created $db_database"
861
+
862
+ psql_on_k8 $namespace $service $db_connection -c 'CREATE USER '"$db_username"' WITH ENCRYPTED PASSWORD '"'$db_password'"';'
863
+ echo "USER created $db_username"
864
+
865
+ psql_on_k8 $namespace $service $db_connection -c 'GRANT ALL PRIVILEGES ON DATABASE '"$db_database"' TO '"$db_username"';'
866
+ echo "Granted all privileges for $db_username on $db_database"
867
+ fi
868
+
869
+ echo "======================="
870
+ echo " Database '$db_database' Initialization complete for namespace $namespace"
871
+ echo "======================="
872
+ }
873
+
874
+ #!/usr/bin/env bash
875
+
876
+ # Port forward on the first matching pod
877
+ # Ex :
878
+ # pod_forward testing notification-http
879
+ # pod_forward testing colisweb-api-web 3333 3000
880
+ pod_forward() {
881
+ ENV=$1
882
+ POD_FILTER=$2
883
+ LOCAL_PORT=${3:-8080}
884
+ POD_PORT=${4:-8080}
885
+
886
+ if PID=$(lsof -ti tcp:$LOCAL_PORT); then
887
+ echo "killing process $PID which uses port $LOCAL_PORT"
888
+ kill $PID
889
+ fi
890
+
891
+ configure_kubectl_for $ENV
892
+
893
+ POD=`pick_pod $ENV $POD_FILTER`
894
+
895
+ echo "setting up forwarding to $POD"
896
+ kubectl -n $ENV port-forward $POD $LOCAL_PORT:$POD_PORT &
897
+ PID=$!
898
+
899
+ while ! echo exit | nc localhost $LOCAL_PORT > /dev/null; do
900
+ sleep 1
901
+ echo "waiting for port $LOCAL_PORT to be open locally"
902
+ done
903
+ echo "port $LOCAL_PORT is now available on localhost, forwarding to $ENV $POD:$POD_PORT"
904
+ echo 'you can terminate it with "kill '$PID'" or "kill $(lsof -ti tcp:'$LOCAL_PORT')"'
905
+ }
906
+
907
+ # prompts to pick a pod and run a command like bash inside
908
+ # pod_exec testing
909
+ # pod_exec testing bash
910
+ # pod_exec testing bash colisweb-api
911
+ pod_exec() {
912
+ ENV=$1
913
+ COMMAND=${2:-bash}
914
+ configure_kubectl_for $ENV
915
+ POD_FILTER=$3
916
+ POD=`pick_pod $ENV $POD_FILTER`
917
+ echo "running $COMMAND inside $POD"
918
+ kubectl -n $ENV exec -ti $POD -- $COMMAND
919
+ }
920
+
921
+ # prompts to pick a pod and copy from a local file to the pod
922
+ # pod_copy_to testing localfile remotefile
923
+ # pod_copy_to testing localfile remotefile colisweb-api
924
+ pod_copy_to() {
925
+ ENV=$1
926
+ LOCAL_FILE=$2
927
+ REMOTE_FILE=$3
928
+ configure_kubectl_for $ENV
929
+ POD_FILTER=$4
930
+ POD=`pick_pod $ENV $POD_FILTER`
931
+ kubectl cp $LOCAL_FILE $ENV/$POD:$REMOTE_FILE
932
+ }
933
+
934
+
935
+ pick_pod() {
936
+ ENV=$1
937
+ POD_FILTER="pod/$2"
938
+ configure_kubectl_for $ENV
939
+
940
+ if [ -z "$2" ] ; then
941
+ kubectl -n $ENV get pods | gum filter | cut -f1 -d" "
942
+ else
943
+ if PODS=$(kubectl -n $ENV get pods -o=name | grep "$POD_FILTER"); then
944
+ echo $PODS | head -1 | sed -e 's/pod\///'
945
+ else
946
+ echo "no pods found on $ENV matching $POD_FILTER" >&2
947
+ fi
948
+ fi
949
+ }
950
+
951
+ #!/usr/bin/env bash
952
+
953
+ bastion_config_for_redis_ca() {
954
+ ssh_config xufte6.0001.euw1.cache.amazonaws.com redis 2223 63789 tests testing recette-001 sandbox prod > $1
955
+ }
956
+
957
+ bastion_config_for_redis_toutatis() {
958
+ ssh_config xufte6.0001.euw1.cache.amazonaws.com toutatis 2223 63789 tests testing recette staging production > $1
959
+ }
960
+
961
+ ssh_config() {
962
+ host=$1
963
+ host_prefix=$2
964
+ port0=$3
965
+ forward0=$4
966
+ shift 4
967
+ instance_names=("$@") # /!\ indices start at 1 with zsh
968
+ ssh_header
969
+
970
+ environments=(tests testing recette staging production)
971
+
972
+ length=${#environments[@]}
973
+ for (( i=1; i<=${length}; i++ ));
974
+ do
975
+ bastion_block bastion_${environments[$i]} $(($port0 + $i)) $(($forward0 + $i)) ${host_prefix}-${instance_names[$i]}.$host
976
+ done
977
+ }
978
+
979
+ ssh_header() {
980
+ cat <<EOF
981
+ UserKnownHostsFile /dev/null
982
+ StrictHostKeyChecking no
983
+ User root
984
+ EOF
985
+ }
986
+
987
+ bastion_block() {
988
+ cat <<EOF
989
+ Host $1
990
+ HostName 127.0.0.1
991
+ Port $2
992
+ LocalForward $3 $4:6379
993
+ EOF
994
+ }
995
+
996
+ redis_k8s() {
997
+ MODE=$1
998
+ REDIS_INSTANCE=${2:-ca}
999
+ case $MODE in
1000
+ "tests") SSH_LOCAL_PORT=2224;REDIS_LOCAL_PORT=63790;ENV="tests";;
1001
+ "testing") SSH_LOCAL_PORT=2225;REDIS_LOCAL_PORT=63791;ENV="testing";;
1002
+ "recette") SSH_LOCAL_PORT=2226;REDIS_LOCAL_PORT=63792;ENV="recette";;
1003
+ "staging") SSH_LOCAL_PORT=2227;REDIS_LOCAL_PORT=63793;ENV="staging";;
1004
+ "production") SSH_LOCAL_PORT=2228;REDIS_LOCAL_PORT=63794;ENV="production";;
1005
+ *) echo "Unsupported ENV : $MODE"; return 1 ;;
1006
+ esac
1007
+
1008
+ start_ssh_bastion $ENV $SSH_LOCAL_PORT
1009
+
1010
+ lsof -ti tcp:$REDIS_LOCAL_PORT | xargs kill
1011
+
1012
+ bastion_config=$(mktemp)
1013
+ case $REDIS_INSTANCE in
1014
+ "ca") bastion_config_for_redis_ca "$bastion_config";;
1015
+ "toutatis") bastion_config_for_redis_toutatis "$bastion_config";;
1016
+ *) echo "Unsupported redis instance (ca or toutatis available) : $REDIS_INSTANCE"; return 1;;
1017
+ esac
1018
+
1019
+ ssh -f -N \
1020
+ -F "$bastion_config" \
1021
+ "bastion_$ENV"
1022
+
1023
+ echo "sample command : 'redis-cli -p $REDIS_LOCAL_PORT'"
1024
+ echo "run 'kubectl delete pod $POD_NAME' when you have finished"
1025
+
1026
+ redis-cli -p $REDIS_LOCAL_PORT
1027
+ }
1028
+
1029
+ #!/usr/bin/env bash
1030
+
1031
+ #Create a k8s cron jobs that will be run regularly
1032
+ #See run_cron_job_k8s -h for more details
1033
+
1034
+ run_cron_job_k8s() {
1035
+
1036
+ #default values
1037
+ local namespace="testing"
1038
+ local name="$USERNAME"
1039
+ local SCHEDULE="00 05 * * *"
1040
+ local secret=""
1041
+ local amm_folder=""
1042
+ local amm_script=""
1043
+
1044
+ while getopts ":e:c:p:f:s:t:h" opt; do
1045
+ case $opt in
1046
+ e)
1047
+ namespace="$OPTARG" >&2
1048
+ ;;
1049
+ t)
1050
+ SCHEDULE="$OPTARG" >&2
1051
+ ;;
1052
+ p)
1053
+ name="$OPTARG" >&2
1054
+ ;;
1055
+ c)
1056
+ secret="$OPTARG" >&2
1057
+ ;;
1058
+ f)
1059
+ amm_folder="$OPTARG" >&2
1060
+ ;;
1061
+ s)
1062
+ amm_script="$OPTARG" >&2
1063
+ ;;
1064
+ h)
1065
+ show_help_cron_job
1066
+ return 0
1067
+ ;;
1068
+ :)
1069
+ echo "Option -$OPTARG requires an argument. Run run_cron_job_k8s -h for help" >&2
1070
+ return 0
1071
+ ;;
1072
+ \?)
1073
+ echo "Invalid option: -$OPTARG. Run run_cron_job_k8s -h for help" >&2
1074
+ return 0
1075
+ ;;
1076
+ esac
1077
+ done
1078
+
1079
+ if [ -z "$amm_script" ]; then
1080
+ echo 'Missing -s. Run run_cron_job_k8s -h for help' >&2
1081
+ return 0
1082
+ fi
1083
+
1084
+ shift "$((OPTIND-1))"
1085
+
1086
+ local script_args=$(
1087
+ if [ "$#" -gt 0 ] ; then
1088
+ printf '"'
1089
+ join_by '", "' $*
1090
+ printf '"'
1091
+ fi
1092
+ )
1093
+
1094
+ local IMAGE="lolhens/ammonite:2.5.4"
1095
+ local CRONJOB_NAME="cronjob-ammonite-$name"
1096
+
1097
+
1098
+ configure_kubectl_for $namespace
1099
+
1100
+ if [[ ! -r "$amm_script" ]]; then
1101
+ echo "ammonite script not found $amm_script"
1102
+ return 2
1103
+ else
1104
+ local CONFIG_MAP="config-$CRONJOB_NAME"
1105
+ local SECRET_MAP="secret-$CRONJOB_NAME"
1106
+ local CONFIG_MAP_DIR="$(mktemp -d)"
1107
+
1108
+ if [[ ! -z $amm_folder && -d $amm_folder ]] ; then
1109
+ cp -r "$amm_folder/" "$CONFIG_MAP_DIR"
1110
+ fi
1111
+ cp "$amm_script" "$CONFIG_MAP_DIR/script.sc"
1112
+
1113
+ kubectl -n $namespace get configmap $CONFIG_MAP && kubectl -n $namespace delete configmap $CONFIG_MAP
1114
+ kubectl -n $namespace create configmap $CONFIG_MAP --from-file="$CONFIG_MAP_DIR"
1115
+
1116
+ kubectl -n $namespace get secret $SECRET_MAP && kubectl -n $namespace delete secret $SECRET_MAP
1117
+ kubectl -n $namespace create secret generic $SECRET_MAP --from-file="$secret"
1118
+
1119
+ kubectl -n $namespace get cronjob $CRONJOB_NAME && kubectl -n $namespace delete cronjob $CRONJOB_NAME
1120
+
1121
+ echo "starting $CRONJOB_NAME with $IMAGE"
1122
+
1123
+ JOB_DEFINITION='
1124
+ apiVersion: batch/v1
1125
+ kind: CronJob
1126
+ metadata:
1127
+ name: '$CRONJOB_NAME'
1128
+ namespace: '$namespace'
1129
+ spec:
1130
+ schedule: "'$SCHEDULE'"
1131
+ concurrencyPolicy: Forbid
1132
+ jobTemplate:
1133
+ spec:
1134
+ backoffLimit: 0
1135
+ template:
1136
+ spec:
1137
+ nodeSelector:
1138
+ workType: "workers"
1139
+ restartPolicy: Never
1140
+ volumes:
1141
+ - name: config
1142
+ configMap:
1143
+ name: '$CONFIG_MAP'
1144
+ - name: secret
1145
+ secret:
1146
+ secretName: '$SECRET_MAP'
1147
+ containers:
1148
+ - name: '$CRONJOB_NAME'
1149
+ command: ["amm", "/code/script.sc"]
1150
+ image: '$IMAGE'
1151
+ imagePullPolicy: IfNotPresent
1152
+ args: ['$script_args']
1153
+ env:
1154
+ - name: POD_NAME
1155
+ valueFrom:
1156
+ fieldRef:
1157
+ apiVersion: v1
1158
+ fieldPath: metadata.name
1159
+ - name: POD_NAMESPACE
1160
+ valueFrom:
1161
+ fieldRef:
1162
+ apiVersion: v1
1163
+ fieldPath: metadata.namespace
1164
+ - name: HOST_IP
1165
+ valueFrom:
1166
+ fieldRef:
1167
+ apiVersion: v1
1168
+ fieldPath: status.hostIP
1169
+ volumeMounts:
1170
+ - name: config
1171
+ mountPath: /code
1172
+ - name: secret
1173
+ mountPath: /conf
1174
+ readOnly: true
1175
+ resources:
1176
+ requests:
1177
+ cpu: 500m
1178
+ memory: 256Mi
1179
+ limits:
1180
+ cpu: 4000m
1181
+ memory: 512Mi
1182
+ envFrom:
1183
+ - configMapRef:
1184
+ name: '$CONFIG_MAP'
1185
+ - secretRef:
1186
+ name: '$SECRET_MAP'
1187
+ '
1188
+
1189
+ echo $JOB_DEFINITION > /tmp/job.yaml
1190
+
1191
+ kubectl -n $namespace apply -f /tmp/job.yaml
1192
+
1193
+ fi
1194
+ }
1195
+
1196
+ # Usage info
1197
+ show_help_cron_job() {
1198
+ #p:f:s
1199
+ local help="""Usage: run_cron_job_k8s -s SCRIPT [-t TIME] [-e ENV] [-c CONFIG] [-p POD] [-f FOLDER] [ARGS]
1200
+ Create a k8s cron job that will be run a script regularly
1201
+
1202
+ -h display this help and exit
1203
+ -s SCRIPT run script SCRIPT on a pod (SCRIPT must be a .sc file)
1204
+ -t TIME opt. time when the job will be launched. TIME should be in CRON syntax (default to 00 05 * * *, ie 5AM UTC)
1205
+ -e ENV opt. set execution environment (default to testing)
1206
+ -c CONFIG opt. secret file needed for the script (must be a .sc file, not a .secret file)
1207
+ -p POD opt. name of the pod to create (default to $USERNAME)
1208
+ -f FOLDER opt. name of the folder containing the scripts to execute (if SCRIPT needs other files)
1209
+ ARGS opt. additional arguments for SCRIPT
1210
+ """
1211
+ echo "$help"
1212
+ }
1213
+
1214
+ #!/usr/bin/env bash
1215
+
1216
+ # Usage info
1217
+ show_help_job() {
1218
+ local help="""Usage: run_job_k8s -s SCRIPT [-e ENV] [-c CONFIG] [-p POD] [-f FOLDER] [ARGS]
1219
+ Create a k8s job executing a script
1220
+
1221
+ -h display this help and exit
1222
+ -s SCRIPT run script SCRIPT on a pod (SCRIPT must be a .sc file)
1223
+ -e ENV opt. set execution environment (default to testing)
1224
+ -c CONFIG opt. secret file needed for the script (must be a .sc file, not a .secret file)
1225
+ -p POD opt. name of the pod to create (default to $USERNAME)
1226
+ -f FOLDER opt. name of the folder containing the scripts to execute (if SCRIPT needs other files)
1227
+ ARGS opt. additional arguments for SCRIPT
1228
+
1229
+ The organisation of the files must be the same locally as on the pod :
1230
+ - /code containing the script to execute (arg -s) and the other needed files (if the arg -f is used, it must reference this directory)
1231
+ - /conf containing the secret file (arg -c if used)
1232
+ E.g. in the script \"/code/script.sc\", to use a secret file \"/conf/secret.sc\", the import should look like \"import \$file.^.conf.secret.sc\"
1233
+ """
1234
+ echo "$help"
1235
+ }
1236
+
1237
+ run_job_k8s() {
1238
+
1239
+ #default values
1240
+ local namespace="testing"
1241
+ local name="$USERNAME"
1242
+ local secret=""
1243
+ local amm_folder=""
1244
+ local amm_script=""
1245
+
1246
+ while getopts ":e:c:p:f:s:h" opt; do
1247
+ case $opt in
1248
+ e)
1249
+ namespace="$OPTARG" >&2
1250
+ ;;
1251
+ p)
1252
+ name="$OPTARG" >&2
1253
+ ;;
1254
+ c)
1255
+ secret="$OPTARG" >&2
1256
+ ;;
1257
+ f)
1258
+ amm_folder="$OPTARG" >&2
1259
+ ;;
1260
+ s)
1261
+ amm_script="$OPTARG" >&2
1262
+ ;;
1263
+ h)
1264
+ show_help_job
1265
+ return 0
1266
+ ;;
1267
+ :)
1268
+ echo "Option -$OPTARG requires an argument. Run run_cron_job_k8s -h for help" >&2
1269
+ return 0
1270
+ ;;
1271
+ \?)
1272
+ echo "Invalid option: -$OPTARG. Run run_cron_job_k8s -h for help" >&2
1273
+ return 0
1274
+ ;;
1275
+ esac
1276
+ done
1277
+
1278
+ if [ -z "$amm_script" ]; then
1279
+ echo 'Missing -s. Run run_job_k8s -h for help' >&2
1280
+ return 0
1281
+ fi
1282
+
1283
+ shift "$((OPTIND-1))"
1284
+
1285
+ local script_args=$(
1286
+ if [ "$#" -gt 0 ] ; then
1287
+ printf '"'
1288
+ join_by '", "' $*
1289
+ printf '"'
1290
+ fi
1291
+ )
1292
+
1293
+ local IMAGE="lolhens/ammonite:2.5.4"
1294
+ local JOB_NAME="job-ammonite-$name"
1295
+
1296
+ if [[ ! -r "$amm_script" ]]; then
1297
+ echo "ammonite script not found $amm_script"
1298
+ return 2
1299
+ else
1300
+ local CONFIG_MAP="config-$JOB_NAME"
1301
+ local CONFIG_MAP_DIR="$(mktemp -d)"
1302
+ local SECRET_MAP="secret-$JOB_NAME"
1303
+
1304
+ configure_kubectl_for $namespace
1305
+
1306
+ if [[ ! -z $amm_folder && -d $amm_folder ]] ; then
1307
+ cp -r "$amm_folder/" "$CONFIG_MAP_DIR"
1308
+ fi
1309
+ cp "$amm_script" "$CONFIG_MAP_DIR/script.sc"
1310
+
1311
+ kubectl -n $namespace get configmap $CONFIG_MAP && kubectl -n $namespace delete configmap $CONFIG_MAP
1312
+ kubectl -n $namespace create configmap $CONFIG_MAP --from-file="$CONFIG_MAP_DIR"
1313
+
1314
+ kubectl -n $namespace get secret $SECRET_MAP && kubectl -n $namespace delete secret $SECRET_MAP
1315
+ kubectl -n $namespace create secret generic $SECRET_MAP --from-file="$secret"
1316
+
1317
+ kubectl -n $namespace get job $JOB_NAME && kubectl -n $namespace delete job $JOB_NAME
1318
+
1319
+ echo "starting $JOB_NAME with $IMAGE"
1320
+ fi
1321
+
1322
+ JOB_DEFINITION='
1323
+ apiVersion: batch/v1
1324
+ kind: Job
1325
+ metadata:
1326
+ name: '$JOB_NAME'
1327
+ namespace: '$namespace'
1328
+ spec:
1329
+ template:
1330
+ spec:
1331
+ containers:
1332
+ - name: '$JOB_NAME'
1333
+ command: ["amm", "/code/script.sc"]
1334
+ image: '$IMAGE'
1335
+ args: ['$script_args']
1336
+ env:
1337
+ - name: POD_NAME
1338
+ valueFrom:
1339
+ fieldRef:
1340
+ apiVersion: v1
1341
+ fieldPath: metadata.name
1342
+ - name: POD_NAMESPACE
1343
+ valueFrom:
1344
+ fieldRef:
1345
+ apiVersion: v1
1346
+ fieldPath: metadata.namespace
1347
+ - name: HOST_IP
1348
+ valueFrom:
1349
+ fieldRef:
1350
+ apiVersion: v1
1351
+ fieldPath: status.hostIP
1352
+ volumeMounts:
1353
+ - name: config
1354
+ mountPath: /code
1355
+ - name: secret
1356
+ mountPath: /conf
1357
+ readOnly: true
1358
+ resources:
1359
+ requests:
1360
+ cpu: 500m
1361
+ memory: 256Mi
1362
+ limits:
1363
+ cpu: 4000m
1364
+ memory: 1Gi
1365
+ nodeSelector:
1366
+ workType: workers
1367
+ restartPolicy: Never
1368
+ volumes:
1369
+ - name: config
1370
+ configMap:
1371
+ name: '$CONFIG_MAP'
1372
+ - name: secret
1373
+ secret:
1374
+ secretName: '$SECRET_MAP'
1375
+ '
1376
+
1377
+
1378
+ echo $JOB_DEFINITION > /tmp/job.yaml
1379
+
1380
+ kubectl -n $namespace apply -f /tmp/job.yaml
1381
+
1382
+ }
1383
+
1384
+
1385
+ #!/usr/bin/env bash
1386
+
1387
+ run_task() {
1388
+ set -e
1389
+
1390
+ check_args "--namespace" $1
1391
+ shift
1392
+ NAMESPACE=$1
1393
+ shift
1394
+ check_args "--image" $1
1395
+ shift
1396
+ IMAGE=$1
1397
+ shift
1398
+ check_args "--name" $1
1399
+ shift
1400
+ NAME=$1
1401
+ shift
1402
+
1403
+ set -x
1404
+
1405
+ kubectl -n ${NAMESPACE} run ${NAME} \
1406
+ --image ${IMAGE} \
1407
+ --restart=Never \
1408
+ --attach --rm \
1409
+ $*
1410
+ }
1411
+ geocode_address() {
1412
+ ADDRESS=$(sed -e 's: :%20:g' <(echo "$*"))
1413
+ URL="https://maps.googleapis.com/maps/api/geocode/json?address=${ADDRESS}&key=${GOOGLE_API_KEY}"
1414
+ curl $URL
1415
+ }
1416
+
1417
+ search_business() {
1418
+ SIREN=$1
1419
+ shift
1420
+ QUERY=$(sed -e 's: :+:g' <(echo "$*"))
1421
+ URL="https://data.opendatasoft.com/api/records/1.0/search/?dataset=sirene_v3%40public&q=${QUERY}&sort=datederniertraitementetablissement&facet=trancheeffectifsetablissement&facet=libellecommuneetablissement&facet=departementetablissementi&refine.siren=${SIREN}"
1422
+ curl $URL
1423
+ }
1424
+
1425
+ #!/bin/bash
1426
+
1427
+ # source tolls.sh ; tolls antoine.thomas@colisweb.com
1428
+ function tolls() {
1429
+ USER=${1:-first.last@colisweb.com}
1430
+ FROM_DATE=${2:-"2023-02-01"}
1431
+ TO_DATE=${3:-"2023-02-28"}
1432
+
1433
+ USER=$(gum input --prompt "username : " --value $USER)
1434
+ TOKEN=$(./tour_details.sc login --user $USER --password $(gum input --password --placeholder password))
1435
+ [ "$TOKEN" != "" ] && echo "connected" || return 1
1436
+
1437
+ FROM_DATE=$(gum input --prompt "Date start : " --value $FROM_DATE)
1438
+ TO_DATE=$(gum input --prompt "Date end : " --value $TO_DATE)
1439
+ FILENAME="tours-${FROM_DATE}-TO-${TO_DATE}.json"
1440
+ curl --cookie "session=$TOKEN" "https://api.production.colisweb.com/api/v6/routes-plans/external?from=${FROM_DATE}&to=${TO_DATE}" > ~/Downloads/$FILENAME
1441
+ echo "Tournées téléchargées"
1442
+
1443
+ projectIds=$(./tour_details.sc allProjects --file ~/Downloads/$FILENAME | gum choose --no-limit | cut -d "," -f 2)
1444
+ echo "projets sélectionnés : $projectIds"
1445
+ tourIds=$(./tour_details.sc allTours --file ~/Downloads/$FILENAME --projectIds "$projectIds")
1446
+ echo "tournées sélectionnées : $tourIds"
1447
+
1448
+ TARGET="${FROM_DATE}-TO-${TO_DATE}.csv"
1449
+ echo "appels à HERE, écriture dans $TARGET"
1450
+ ./tour_details.sc allToursDetails --token $TOKEN --hereApiKey $HERE_API_KEY --routeIds "$tourIds" > "$TARGET"
1451
+
1452
+ echo "terminé"
1453
+ }
1454
+
1455
+ #!/usr/bin/env bash
1456
+
1457
+ # possible syntax:
1458
+ # login
1459
+ # login testing
1460
+ # login testing userid
1461
+ login() {
1462
+ ENV=${1:-`gum choose testing staging production recette`} && \
1463
+ USER=${2:-`gum input --placeholder username`} && \
1464
+ PASSWORD=`gum input --password --placeholder password` && \
1465
+ TOKEN=`$SCRIPT_FULL_PATH/scala/auth.sc login --env $ENV --user $USER --password $PASSWORD` && \
1466
+ export TOKEN_$ENV=$TOKEN && \
1467
+ echo "login success for $USER on $ENV" >&2
1468
+ }
1469
+
1470
+ # you need to call login first (see above)
1471
+ # possible syntax:
1472
+ # recompute_tour
1473
+ # recompute_tour testing
1474
+ # recompute_tour testing draft
1475
+ # recompute_tour testing draft 28bf9967-b5f3-4294-8855-cfd2fa36ec09
1476
+ # recompute_tour testing draft 28bf9967-b5f3-4294-8855-cfd2fa36ec09 TODAY
1477
+ # recompute_tour testing draft 28bf9967-b5f3-4294-8855-cfd2fa36ec09 FRIDAY
1478
+ recompute_tour() {
1479
+ ENV=${1:-`gum choose testing staging production recette`}
1480
+ MODE=${2:-`gum choose draft definitive`}
1481
+ PROJECT_ID=${3:-`pick_project $ENV`}
1482
+ DAY=${4:-`gum choose TODAY MONDAY TUESDAY WEDNESDAY THURSDAY FRIDAY SATURDAY SUNDAY`}
1483
+ jwt_token $ENV
1484
+ scala/tour_config.sc $MODE -t $TOKEN -p $PROJECT_ID -d $DAY
1485
+ }
1486
+
1487
+ pick_project() {
1488
+ ENV=${1:-`gum choose testing staging production recette`}
1489
+ jwt_token $ENV
1490
+ scala/tour_config.sc list -t $TOKEN -e $ENV | gum filter | cut -f1
1491
+ }
1492
+
1493
+ jwt_token() {
1494
+ ENV=${1:-`gum choose testing staging production recette`}
1495
+ eval 'TOKEN=$TOKEN_'$ENV
1496
+ if ! $SCRIPT_FULL_PATH/scala/auth.sc check -t $TOKEN -e $ENV ; then
1497
+ login $ENV
1498
+ fi
1499
+ }
1500
+
1501
+ #!/usr/bin/env bash
1502
+
1503
+ ftp_ikea_k8s() {
1504
+ SSH_LOCAL_PORT=2230
1505
+ FTP_LOCAL_PORT=25500
1506
+ start_ssh_bastion testing $SSH_LOCAL_PORT
1507
+
1508
+ lsof -ti tcp:$FTP_LOCAL_PORT | xargs kill
1509
+
1510
+ bastion_config=$(mktemp)
1511
+ cat > "$bastion_config" <<EOF
1512
+ UserKnownHostsFile /dev/null
1513
+ StrictHostKeyChecking no
1514
+ User root
1515
+ Host bastion_ftp
1516
+ HostName 127.0.0.1
1517
+ Port 2230
1518
+ LocalForward 25500 ft.centiro.ikea.com:22
1519
+ EOF
1520
+
1521
+ ssh -f -N \
1522
+ -F "$bastion_config" \
1523
+ "bastion_ftp"
1524
+
1525
+ sftp -P $FTP_LOCAL_PORT colisweb.fr@127.0.0.1
1526
+ }
1527
+
1528
+ #!/usr/bin/env bash
1529
+
1530
+ # usage:
1531
+ # jconsole_k8s testing colisweb-api-web
1532
+
1533
+ jconsole_k8s() {
1534
+ ENV=$1
1535
+ NAME=$2
1536
+
1537
+ start_ssh_bastion $ENV 2242
1538
+ POD_IP=$( \
1539
+ kubectl -n $ENV get pods -o jsonpath='{range .items[*]}{.metadata.name}{" "}{.status.podIP}{"\n"}{end}' \
1540
+ | grep "$NAME" | cut -d' ' -f2 | head -1 \
1541
+ )
1542
+ echo "selected POD with ip $POD_IP"
1543
+ echo "use 'root' as password"
1544
+ ssh -f -N -oUserKnownHostsFile=/dev/null -oStrictHostKeyChecking=no -D 7777 root@127.0.0.1 -p 2242
1545
+
1546
+ jconsole \
1547
+ -J-DsocksProxyHost=localhost \
1548
+ -J-DsocksProxyPort=7777 \
1549
+ -J-DsocksNonProxyHosts= \
1550
+ service:jmx:rmi:///jndi/rmi://$POD_IP:7199/jmxrmi \
1551
+ &
1552
+
1553
+ echo "remember to stop with 'stop_ssh_bastion'"
1554
+
1555
+ }
1556
+
1557
+ #!/usr/bin/env bash
1558
+
1559
+ # Interactive console on an new pod. See also run_ruby_k8s
1560
+ # Ex :
1561
+ # railsc_k8s production
1562
+ # railsc_k8s production "User.where(email:'toni@colisweb.com')"
1563
+ railsc_k8s() {
1564
+ ENV=$1
1565
+ COMMAND=$2
1566
+ [[ $ENV = "production" || $ENV = "staging" ]] && default_tag="master-latest" || default_tag="${ENV}-latest"
1567
+ local image_tag=${5:-$default_tag}
1568
+ local IMAGE="949316342391.dkr.ecr.eu-west-1.amazonaws.com/colisweb-api:$image_tag"
1569
+ local POD_NAME="colisweb-api-rails-console-$image_tag-$USERNAME"
1570
+
1571
+ kubectl -n $ENV get pod $POD_NAME && kubectl -n $ENV delete pod $POD_NAME
1572
+
1573
+ configure_kubectl_for $ENV
1574
+ echo "starting with $IMAGE"
1575
+
1576
+ kubectl -n $ENV run $POD_NAME \
1577
+ --image $IMAGE \
1578
+ --restart=Never \
1579
+ --overrides='{
1580
+ "spec":{
1581
+ "nodeSelector":{
1582
+ "workType": "workers"
1583
+ },
1584
+ "containers":[
1585
+ {
1586
+ "name":"'$POD_NAME'",
1587
+ "image":"'$IMAGE'",
1588
+ "imagePullPolicy":"Always",
1589
+ "command":[
1590
+ "sleep",
1591
+ "infinity"
1592
+ ],
1593
+ "resources":{
1594
+ "limits":{
1595
+ "memory": "2048Mi"
1596
+ }
1597
+ },
1598
+ "envFrom": [ {
1599
+ "configMapRef": {
1600
+ "name": "colisweb-api"
1601
+ }
1602
+ }, {
1603
+ "secretRef": {
1604
+ "name": "colisweb-api"
1605
+ }
1606
+ }
1607
+ ]
1608
+ }
1609
+ ]
1610
+ }
1611
+ }
1612
+ '
1613
+
1614
+ sleep 5
1615
+ KUBERAILS="kubectl -n $ENV exec -ti $POD_NAME -- /usr/src/app/bin/rails c"
1616
+ [ -z "$COMMAND" ] && eval $KUBERAILS || echo $COMMAND | eval $KUBERAILS
1617
+
1618
+ print "End of $POD_NAME "
1619
+ kubectl -n $ENV delete pods $POD_NAME
1620
+ }
1621
+
1622
+ # Ex :
1623
+ # create_user testing claire.lien@colisweb.com super_admin clairemdp
1624
+ create_user() {
1625
+ ENV=$1
1626
+ EMAIL=$2
1627
+ ROLE=$3
1628
+ PASSWORD=$4
1629
+ railsc_k8s $ENV "User.where(email:'$EMAIL', role:'$ROLE').first_or_create.update_attributes!(password: '$PASSWORD')"
1630
+ }
1631
+
1632
+ # Ex :
1633
+ # delete_user testing claire.lien@colisweb.com
1634
+ delete_user() {
1635
+ ENV=$1
1636
+ EMAIL=$2
1637
+ railsc_k8s $ENV "User.find_by(email:'$EMAIL').destroy"
1638
+ }
1639
+
1640
+ # NON Interactive console on an new pod, for long-running tasks (a few minutes)
1641
+ # See also railsc_k8s
1642
+ # file.txt will be available from /conf/data.txt in the ruby code
1643
+ # examples :
1644
+ # run_ruby_k8s testing demo <(echo "pp JSON.parse(File.read('/conf/data.txt'))") <(echo '{ "content": 123 }')
1645
+ # run_ruby_k8s testing demo ~/.oh-my-zsh/custom/dev-tools/shell-session/ruby/demo.rb <(echo '{ "content": 123 }')
1646
+ run_ruby_k8s() {
1647
+ if [ $# -lt 4 ]; then
1648
+ echo "usage : run_ruby_k8s production name-for-pod script.rb file.txt"
1649
+ return 1
1650
+ fi
1651
+ local namespace=$1
1652
+ local name=$2
1653
+ local ruby_script=$3
1654
+ local input_data=$4
1655
+ [[ $namespace = "production" || $namespace = "staging" ]] && default_tag="master-latest" || default_tag="${namespace}-latest"
1656
+ local image_tag=${5:-$default_tag}
1657
+
1658
+ if [ ! -r "$ruby_script" ]; then
1659
+ echo "ruby script not found $ruby_script"
1660
+ return 2
1661
+ fi
1662
+
1663
+ if [ ! -r "$input_data" ]; then
1664
+ echo "data not found $input_data"
1665
+ return 3
1666
+ fi
1667
+
1668
+
1669
+ local IMAGE="949316342391.dkr.ecr.eu-west-1.amazonaws.com/colisweb-api:$image_tag"
1670
+ local POD_NAME="colisweb-api-script-$name"
1671
+ local CONFIG_MAP="config-$POD_NAME"
1672
+ local CONFIG_MAP_DIR="$(mktemp -d)"
1673
+
1674
+
1675
+ configure_kubectl_for $namespace
1676
+
1677
+
1678
+ cp "$ruby_script" "$CONFIG_MAP_DIR/script.rb"
1679
+ cp "$input_data" "$CONFIG_MAP_DIR/data.txt"
1680
+
1681
+ kubectl -n $namespace get configmap $CONFIG_MAP && kubectl -n $namespace delete configmap $CONFIG_MAP
1682
+ kubectl -n $namespace create configmap $CONFIG_MAP --from-file="$CONFIG_MAP_DIR"
1683
+
1684
+ kubectl -n $namespace get pod $POD_NAME && kubectl -n $namespace delete pod $POD_NAME
1685
+
1686
+ echo "starting with $IMAGE"
1687
+ kubectl -n $namespace run $POD_NAME \
1688
+ --image $IMAGE \
1689
+ -ti \
1690
+ --restart=Never \
1691
+ --attach \
1692
+ --rm \
1693
+ --overrides='{
1694
+ "spec":{
1695
+ "nodeSelector":{
1696
+ "workType": "workers"
1697
+ },
1698
+ "containers":[
1699
+ {
1700
+ "name":"'$POD_NAME'",
1701
+ "image":"'$IMAGE'",
1702
+ "imagePullPolicy":"Always",
1703
+ "command":[
1704
+ "/usr/src/app/bin/rails",
1705
+ "r",
1706
+ "/conf/script.rb"
1707
+ ],
1708
+ "resources":{
1709
+ "limits":{
1710
+ "memory": "4096Mi"
1711
+ }
1712
+ },
1713
+ "volumeMounts":[
1714
+ {
1715
+ "name":"conf",
1716
+ "mountPath":"/conf"
1717
+ }
1718
+ ],
1719
+ "envFrom": [ {
1720
+ "configMapRef": {
1721
+ "name": "colisweb-api"
1722
+ }
1723
+ }, {
1724
+ "secretRef": {
1725
+ "name": "colisweb-api"
1726
+ }
1727
+ }
1728
+ ]
1729
+ }
1730
+ ],
1731
+ "volumes":[
1732
+ {
1733
+ "name":"conf",
1734
+ "configMap":{ "name":"'$CONFIG_MAP'" }
1735
+ }
1736
+ ]
1737
+ }
1738
+ }
1739
+ '
1740
+
1741
+ kubectl -n $namespace delete configmap $CONFIG_MAP
1742
+ }
1743
+
1744
+ # example:
1745
+ # update_pickup_cp testing <( echo '{"wrong_cp": "59123", "corrected_cp": "59223", "delivery_ids": ["4192421", "4192425"]}' )
1746
+ update_pickup_cp() {
1747
+ run_ruby_k8s $1 update-pickup-cp "$SCRIPT_FULL_PATH/ruby/update_pickup_cp.rb" $2
1748
+ }
1749
+
1750
+
1751
+
1752
+ update_all_prices() {
1753
+ local namespace=$1
1754
+ local json_prices=$2
1755
+
1756
+ local json_size=$(wc -c < "$json_prices")
1757
+
1758
+ if ((json_size > 940000)); then
1759
+ command -v jq || (echo "jq not found (use brew install jq)" && return 1)
1760
+ local max_lines=3000
1761
+ local total_lines=$(jq '. | length' $json_prices)
1762
+ local iterations=$((total_lines / max_lines + 1))
1763
+ echo "$json_prices is too big, I'll split it for you in blocks of $max_lines lines. It will take $iterations runs"
1764
+ for (( i = 0 ; i < iterations ; i++ )) ; do
1765
+ local start=$((i * max_lines))
1766
+ local end=$(( (i + 1) * max_lines))
1767
+ local split_file=$(mktemp)
1768
+ jq -c ".[$start:$end]" $json_prices > $split_file
1769
+ local split_lines=$(jq '. | length' $split_file)
1770
+ echo "starting iteration $i from $start to $end with $split_file command -v has $split_lines lines"
1771
+ run_ruby_k8s $namespace "update-prices-$i" "$SCRIPT_FULL_PATH/ruby/update_prices.rb" $split_file
1772
+ done
1773
+ else
1774
+ run_ruby_k8s $namespace "update-prices" "$SCRIPT_FULL_PATH/ruby/update_prices.rb" $json_prices
1775
+ fi
1776
+ }
1777
+
1778
+
1779
+ update_surveys() {
1780
+ local namespace=$1
1781
+ local csv_surveys=$2
1782
+
1783
+ local csv_size=$(wc -c < "$csv_surveys")
1784
+
1785
+
1786
+ if ((csv_size > 940000)); then
1787
+ local max_lines=400
1788
+ local total_lines=$(wc -l < $csv_surveys)
1789
+ local iterations=$((total_lines / max_lines + 1))
1790
+ echo "$csv_surveys is too big, I'll split it for you in blocks of $max_lines lines. It will take $iterations runs"
1791
+ for (( i = 0 ; i < iterations ; i++ )) ; do
1792
+ local start=$((i * max_lines + 2))
1793
+ local end=$(( (i + 1) * max_lines + 1))
1794
+ local split_file=$(mktemp)
1795
+ head -1 $csv_surveys > $split_file
1796
+ sed -n ''"$start,${end}p" $csv_surveys >> $split_file
1797
+
1798
+
1799
+ local split_lines=$(wc -l < $split_file)
1800
+ echo "starting iteration $i from $start to $end with $split_file command -v has $split_lines lines"
1801
+ run_ruby_k8s $namespace "reimport-surveys-$i" "$SCRIPT_FULL_PATH/ruby/feedback_kpi_reuploader.rb" $split_file
1802
+ done
1803
+ else
1804
+ run_ruby_k8s $namespace "reimport-surveys" "$SCRIPT_FULL_PATH/ruby/feedback_kpi_reuploader.rb" $csv_surveys
1805
+ fi
1806
+ }
1807
+
1808
+ #!/usr/bin/env bash
1809
+
1810
+ configure_gitlab_ssh() {
1811
+ tmp_dir=$(mktemp -d)
1812
+ ssh-keyscan gitlab.com > $tmp_dir/known_hosts
1813
+ echo "$SSH_PRIVATE_KEY" > $tmp_dir/id_rsa
1814
+ chmod 600 $tmp_dir/id_rsa
1815
+ ssh -i $tmp_dir/id_rsa -T git@gitlab.com
1816
+ rm -Rf $tmp_dir
1817
+ }
1818
+
1819
+
1820
+ configure_gitlab_ssh_home() {
1821
+ mkdir ~/.ssh
1822
+ ssh-keyscan gitlab.com >> ~/.ssh/known_hosts
1823
+ echo "$SSH_PRIVATE_KEY" > ~/.ssh/id_rsa
1824
+ chmod 600 ~/.ssh/id_rsa
1825
+ ssh -T git@gitlab.com
1826
+ }
1827
+ #!/usr/bin/env bash
1828
+
1829
+ datadog_schedule_downtime() {
1830
+ SERVICES=$1
1831
+ DOWNTIME_MINUTES=${2:-30}
1832
+
1833
+ if [[ "$ENVIRONMENT" == "production" ]] ; then
1834
+ log "scheduling downtime for $SERVICES in $ENVIRONMENT"
1835
+ else
1836
+ return 0
1837
+ fi
1838
+
1839
+ for SERVICE in $SERVICES ; do
1840
+ datadog_schedule_downtime_single $SERVICE $DOWNTIME_MINUTES
1841
+ done
1842
+ }
1843
+
1844
+ datadog_schedule_downtime_single() {
1845
+ local SERVICE=$1
1846
+ local DOWNTIME_MINUTES=$2
1847
+
1848
+ START=$(date +%s)
1849
+ END=$((START + 60 * DOWNTIME_MINUTES))
1850
+
1851
+ log "scheduling a downtime on datadog for $SERVICE ($DOWNTIME_MINUTES minutes)"
1852
+ curl -X POST "https://api.datadoghq.com/api/v1/downtime" \
1853
+ -H "Content-Type: application/json" \
1854
+ -H "DD-API-KEY: ${DD_API_KEY}" \
1855
+ -H "DD-APPLICATION-KEY: ${DD_APP_KEY}" \
1856
+ -d '
1857
+ {
1858
+ "active": true,
1859
+ "downtime_type": 0,
1860
+ "start": '$START',
1861
+ "end": '$END',
1862
+ "message": "CA Deployment - performance for '$SERVICE' may be lower for next '$DOWNTIME_MINUTES' min",
1863
+ "monitor_tags": [
1864
+ "service:'$SERVICE'",
1865
+ "performance"
1866
+ ],
1867
+ "scope": [
1868
+ "env:production"
1869
+ ],
1870
+ "timezone": "Europe/Paris"
1871
+ }
1872
+ '
1873
+ }
1874
+
1875
+ #!/usr/bin/env bash
1876
+
1877
+ docker_build_push() {
1878
+ read -r -a BUILD_ARGS <<< "$1"
1879
+ DOCKER_BUILD_ARGS="--build-arg VCS_REF=$(git rev-parse --short HEAD)"
1880
+ for ARG_NAME in "${BUILD_ARGS[@]}"
1881
+ do
1882
+ DOCKER_BUILD_ARGS="$DOCKER_BUILD_ARGS --build-arg $ARG_NAME=${!ARG_NAME}"
1883
+ done
1884
+
1885
+ if ! image_exists $DOCKER_REGISTRY_ID $APPLICATION $CI_COMMIT_SHORT_SHA ; then
1886
+ docker pull $DOCKER_IMAGE || true
1887
+ SOURCE_URL=${CI_PROJECT_URL:8} # without "https://" protocol, like gitlab.com/colisweb-idl/colisweb/back/packing
1888
+ docker build $DOCKER_BUILD_ARGS \
1889
+ -t $DOCKER_IMAGE_SHA \
1890
+ --label org.opencontainers.image.revision=$(git rev-parse HEAD) \
1891
+ --label org.opencontainers.image.source=$SOURCE_URL \
1892
+ --cache-from $DOCKER_IMAGE \
1893
+ $DOCKER_STAGE_PATH
1894
+ docker push $DOCKER_IMAGE_SHA
1895
+ fi
1896
+ }
1897
+
1898
+
1899
+ docker_promote() {
1900
+ # inspired by https://dille.name/blog/2018/09/20/how-to-tag-docker-images-without-pulling-them/
1901
+ OLD_TAG=${1//[^0-9a-zA-Z-.]/_}
1902
+ NEW_TAG=${2//[^0-9a-zA-Z-.]/_}
1903
+ echo "promoting from $OLD_TAG to $NEW_TAG"
1904
+ TOKEN=$(aws_ecr_token)
1905
+ CONTENT_TYPE="application/vnd.docker.distribution.manifest.v2+json"
1906
+ MANIFESTS_API="https://${DOCKER_REGISTRY}/v2/${APPLICATION}/manifests"
1907
+
1908
+ if MANIFEST=$(curl --fail -H "Authorization: Basic $TOKEN" -H "Accept: ${CONTENT_TYPE}" "$MANIFESTS_API/${OLD_TAG}"); then
1909
+ echo "authenticated on $MANIFESTS_API"
1910
+ else
1911
+ return 1
1912
+ fi
1913
+ if curl --fail -H "Authorization: Basic $TOKEN" -X PUT -H "Content-Type: ${CONTENT_TYPE}" -d "${MANIFEST}" "$MANIFESTS_API/$NEW_TAG" ; then
1914
+ echo "promoted ${APPLICATION} from $OLD_TAG to $NEW_TAG"
1915
+ else
1916
+ return 2
1917
+ fi
1918
+ }
1919
+
1920
+ ensure_images_exists() {
1921
+ for IMAGE_TO_CHECK in $(echo $1 | tr "," "\n"); do
1922
+ image_exists ${DOCKER_REGISTRY_ID} ${IMAGE_TO_CHECK} ${VERSION} || return 1
1923
+ done
1924
+ }
1925
+
1926
+ #!/usr/bin/env bash
1927
+
1928
+ extract_yaml_config_variable() {
1929
+ set +e
1930
+ set +x
1931
+
1932
+ check_args "--environment" $1
1933
+ shift
1934
+ ENVIRONMENT=$1
1935
+ shift
1936
+
1937
+ check_args "--configs-path" $1
1938
+ shift
1939
+ CONFIGS_PATH=$1
1940
+ shift
1941
+
1942
+ check_args "--variable" $1
1943
+ shift
1944
+ VARIABLE=$1
1945
+ shift
1946
+
1947
+ [[ "$1" == "--optional" ]] && OPTIONAL=true || OPTIONAL=false
1948
+
1949
+ if [ ! -f ${CONFIGS_PATH}/common.yaml ]; then
1950
+ echo >&2 "Missing $CONFIGS_PATH/common.yaml configuration file"
1951
+ exit 1
1952
+ fi
1953
+ if [ ! -f ${CONFIGS_PATH}/${ENVIRONMENT}.yaml ]; then
1954
+ echo >&2 "Missing $CONFIGS_PATH/$ENVIRONMENT.yaml configuration file"
1955
+ exit 1
1956
+ fi
1957
+ if [ ! -f ${CONFIGS_PATH}/${ENVIRONMENT}-secrets.yaml ]; then
1958
+ echo >&2 "Missing $CONFIGS_PATH/$ENVIRONMENT-secrets.yaml configuration file"
1959
+ exit 1
1960
+ fi
1961
+
1962
+ result=$(yq -r ${VARIABLE} "$CONFIGS_PATH/$ENVIRONMENT-secrets.yaml")
1963
+ if [ $? -ne 0 ] || [ "$result" = "null" ]; then
1964
+ result=$(yq -r ${VARIABLE} "$CONFIGS_PATH/$ENVIRONMENT.yaml")
1965
+ if [ $? -ne 0 ] || [ "$result" = "null" ]; then
1966
+ result=$(yq -r ${VARIABLE} "$CONFIGS_PATH/common.yaml")
1967
+ if [ $? -ne 0 ] || [ "$result" = "null" ]; then
1968
+ if [ $OPTIONAL = true ]; then
1969
+ echo ""
1970
+ exit 0
1971
+ else
1972
+ echo >&2 "Missing path $VARIABLE in $CONFIGS_PATH/$ENVIRONMENT-secrets.yaml, $CONFIGS_PATH/$ENVIRONMENT.yaml or $CONFIGS_PATH/common.yaml"
1973
+ exit 1
1974
+ fi
1975
+ fi
1976
+ fi
1977
+ fi
1978
+ echo ${result}
1979
+ }
1980
+ #!/usr/bin/env bash
1981
+
1982
+ flyway_clean() {
1983
+ HOST="$1"
1984
+ PORT="$2"
1985
+ DATABASE="$3"
1986
+ USER="$4"
1987
+ PASSWORD="$5"
1988
+
1989
+ kubectl run -it --rm flywayclean \
1990
+ --image=flyway/flyway \
1991
+ --restart=Never \
1992
+ -- \
1993
+ -cleanDisabled=false \
1994
+ -url="jdbc:postgresql://$HOST:$PORT/$DATABASE" \
1995
+ -user="$USER" \
1996
+ -password="$PASSWORD" \
1997
+ clean
1998
+ }
1999
+
2000
+ #!/usr/bin/env bash
2001
+
2002
+ FLYWAY_VERSION="7.4.0"
2003
+
2004
+
2005
+ get_yaml_variable() {
2006
+ extract_yaml_config_variable --environment ${ENVIRONMENT} --configs-path $(pwd)/deploy --variable $@
2007
+ }
2008
+
2009
+ init_migrate_db() {
2010
+ set -e
2011
+
2012
+ check_env_vars 4 "APPLICATION" "ENVIRONMENT" "FLYWAY_VERSION" "MIGRATION_SQL_PATH"
2013
+
2014
+ PG_YAML_PATH=".${APPLICATION}config.postgres"
2015
+
2016
+ DB_PORT="5432"
2017
+ DB_HOST=$(get_yaml_variable "${PG_YAML_PATH}.host")
2018
+ DB_INIT_USERNAME=$(get_yaml_variable "${PG_YAML_PATH}.initUsername")
2019
+ DB_INIT_PASSWORD=$(get_yaml_variable "${PG_YAML_PATH}.initPassword")
2020
+ DB_DATABASE=$(get_yaml_variable "${PG_YAML_PATH}.database")
2021
+ DB_USER=$(get_yaml_variable "${PG_YAML_PATH}.user")
2022
+ DB_PASSWORD=$(get_yaml_variable "${PG_YAML_PATH}.password")
2023
+ DB_URL="jdbc:postgresql://${DB_HOST}:${DB_PORT}/${DB_DATABASE}"
2024
+
2025
+ DB_RO_USER=$(get_yaml_variable "${PG_YAML_PATH}.readOnlyUser" --optional)
2026
+ DB_RO_PASSWORD=$(get_yaml_variable "${PG_YAML_PATH}.readOnlyPassword" --optional)
2027
+
2028
+ unset KUBECONFIG
2029
+
2030
+ configure_kubectl_for_ci ${ENVIRONMENT}
2031
+
2032
+ kube_init_service_database \
2033
+ --namespace ${ENVIRONMENT} \
2034
+ --service ${APPLICATION} \
2035
+ --db_host ${DB_HOST} \
2036
+ --db_port ${DB_PORT} \
2037
+ --db_init_username ${DB_INIT_USERNAME} \
2038
+ --db_init_password ${DB_INIT_PASSWORD} \
2039
+ --db_database ${DB_DATABASE} \
2040
+ --db_username ${DB_USER} \
2041
+ --db_password ${DB_PASSWORD}
2042
+
2043
+ if [[ ! -z "$DB_RO_USER" ]] && [[ ! -z "$DB_RO_USER" ]]; then
2044
+ kube_init_database_readonly_account \
2045
+ --namespace ${ENVIRONMENT} \
2046
+ --service ${APPLICATION} \
2047
+ --db_connection "$DB_INIT_USERNAME:$DB_INIT_PASSWORD@$DB_HOST:$DB_PORT" \
2048
+ --db_database ${DB_DATABASE} \
2049
+ --db_readonly_username ${DB_RO_USER} \
2050
+ --db_readonly_password ${DB_RO_PASSWORD}
2051
+ fi
2052
+
2053
+ flyway_migrate \
2054
+ --environment ${ENVIRONMENT} \
2055
+ --namespace ${ENVIRONMENT} \
2056
+ --service ${APPLICATION} \
2057
+ --db_url ${DB_URL} \
2058
+ --db_user ${DB_USER} \
2059
+ --db_password ${DB_PASSWORD} \
2060
+ --flyway_version ${FLYWAY_VERSION} \
2061
+ --flyway_sql_folder $(pwd)/${MIGRATION_SQL_PATH}
2062
+ }
2063
+
2064
+ flyway_migrate() {
2065
+ set -e
2066
+
2067
+ extract_args 8 \
2068
+ environment namespace service db_url db_user db_password flyway_version flyway_sql_folder $*
2069
+
2070
+ echo "running flyway migrations for service $service in environment $environment namespace $namespace for db_url $db_url with user $db_user"
2071
+ echo "migration files expected in $flyway_sql_folder"
2072
+
2073
+ CONFIGMAP_NAME="$service-flyway-migration-sql"
2074
+ POD_NAME="$service-flyway-migration"
2075
+
2076
+ configure_kubectl_for_ci $environment
2077
+
2078
+ kubectl -n $namespace delete configmap $CONFIGMAP_NAME --ignore-not-found
2079
+ kubectl -n $namespace delete pod $POD_NAME --ignore-not-found
2080
+ kubectl -n $namespace create configmap $CONFIGMAP_NAME --from-file=$flyway_sql_folder
2081
+
2082
+ kubectl -n $namespace run $POD_NAME --image ignored -ti --restart=Never --attach --rm --overrides='
2083
+ {
2084
+ "spec":{
2085
+ "containers":[
2086
+ {
2087
+ "name":"'$POD_NAME'",
2088
+ "image":"flyway/flyway:'$flyway_version'",
2089
+ "command":["flyway", "-url='$db_url'", "-user='$db_user'", "-password='$db_password'", "migrate"],
2090
+ "volumeMounts":[
2091
+ {
2092
+ "name":"sql",
2093
+ "mountPath":"/flyway/sql"
2094
+ }
2095
+ ]
2096
+ }
2097
+ ],
2098
+ "volumes":[
2099
+ {
2100
+ "name":"sql",
2101
+ "configMap":{
2102
+ "name":"'$CONFIGMAP_NAME'"
2103
+ }
2104
+ }
2105
+ ]
2106
+ }
2107
+ }
2108
+ '
2109
+
2110
+ kubectl -n $namespace delete configmap $CONFIGMAP_NAME
2111
+ }
2112
+
2113
+ #!/usr/bin/env bash
2114
+ flyway_repair() {
2115
+ set -e
2116
+ check_env_vars 4 "APPLICATION" "ENVIRONMENT" "FLYWAY_VERSION" "MIGRATION_SQL_PATH"
2117
+
2118
+ PG_YAML_PATH=".${APPLICATION}config.postgres"
2119
+
2120
+ DB_PORT="5432"
2121
+ DB_HOST=$(get_yaml_variable "${PG_YAML_PATH}.host")
2122
+ DB_DATABASE=$(get_yaml_variable "${PG_YAML_PATH}.database")
2123
+ DB_USER=$(get_yaml_variable "${PG_YAML_PATH}.user")
2124
+ DB_PASSWORD=$(get_yaml_variable "${PG_YAML_PATH}.password")
2125
+ DB_URL="jdbc:postgresql://${DB_HOST}:${DB_PORT}/${DB_DATABASE}"
2126
+
2127
+ flyway_sql_folder=$(pwd)/${MIGRATION_SQL_PATH}
2128
+
2129
+ configure_kubectl_for_ci "${ENVIRONMENT}"
2130
+ POD_NAME="${APPLICATION}-flyway-repair"
2131
+ CONFIGMAP_NAME="${APPLICATION}-flyway-repair-sql"
2132
+
2133
+ kubectl -n "${ENVIRONMENT}" delete configmap $CONFIGMAP_NAME --ignore-not-found
2134
+ kubectl -n "${ENVIRONMENT}" delete pod $POD_NAME --ignore-not-found
2135
+ kubectl -n "${ENVIRONMENT}" create configmap $CONFIGMAP_NAME --from-file="${flyway_sql_folder}"
2136
+
2137
+ kubectl -n "${ENVIRONMENT}" run --rm -it "${POD_NAME}" \
2138
+ --image=flyway/flyway \
2139
+ --restart=Never \
2140
+ --overrides='
2141
+ {
2142
+ "spec":{
2143
+ "containers":[
2144
+ {
2145
+ "name":"'$POD_NAME'",
2146
+ "image":"flyway/flyway:'${FLYWAY_VERSION}'",
2147
+ "command":["flyway", "-url='$DB_URL'", "-user='$DB_USER'", "-password='$DB_PASSWORD'", "repair"],
2148
+ "volumeMounts":[
2149
+ {
2150
+ "name":"sql",
2151
+ "mountPath":"/flyway/sql"
2152
+ }
2153
+ ]
2154
+ }
2155
+ ],
2156
+ "volumes":[
2157
+ {
2158
+ "name":"sql",
2159
+ "configMap":{
2160
+ "name":"'$CONFIGMAP_NAME'"
2161
+ }
2162
+ }
2163
+ ]
2164
+ }
2165
+ }
2166
+ '
2167
+ kubectl -n "${ENVIRONMENT}" delete configmap $CONFIGMAP_NAME
2168
+ }
2169
+
2170
+ #!/usr/bin/env bash
2171
+
2172
+ record_git_commit() {
2173
+ for file in $GIT_COMMIT_FILES; do
2174
+ sed -i 's&GIT_COMMIT&'"${CI_COMMIT_REF_SLUG}-${CI_COMMIT_SHORT_SHA}&" "$file"
2175
+ done
2176
+ }
2177
+
2178
+ gitlab_import_pgp_key() {
2179
+ if [ "$GITLAB_PGP_PRIVATE_KEY" != "" ]
2180
+ then
2181
+ KEY_FOLDER=<(echo "$GITLAB_PGP_PRIVATE_KEY")
2182
+ gpg --import $KEY_FOLDER > /dev/null
2183
+ else
2184
+ echo '$GITLAB_PGP_PRIVATE_KEY is not set'
2185
+ return 1
2186
+ fi
2187
+ }
2188
+
2189
+ git_reveal() {
2190
+ gitlab_import_pgp_key
2191
+ gpg --decrypt $1
2192
+ }
2193
+ #!/usr/bin/env bash
2194
+
2195
+ helm_deploy_v3() {
2196
+ APPLICATION=$1
2197
+ ENVIRONMENT=$2
2198
+ VERSION=$3
2199
+ deploy_chart_v3 \
2200
+ --path_configs deploy \
2201
+ --path_chart deploy/$APPLICATION \
2202
+ --application $APPLICATION \
2203
+ --environment $ENVIRONMENT \
2204
+ --namespace $ENVIRONMENT \
2205
+ --helm_extra_args --set global.version=$VERSION
2206
+ }
2207
+
2208
+ deploy_chart_v3() {
2209
+ set -e
2210
+ set -x
2211
+
2212
+ # Rigid parsing, but all args are mandatory (expect last) and flexible order is unnecessary
2213
+ check_args "--path_configs" $1; shift
2214
+ path_configs=$1; shift
2215
+ check_args "--path_chart" $1; shift
2216
+ path_chart=$1; shift
2217
+ check_args "--application" $1; shift
2218
+ application=$1; shift
2219
+ check_args "--environment" $1; shift
2220
+ environment=$1; shift
2221
+ check_args "--namespace" $1; shift
2222
+ namespace=$1; shift
2223
+ if [ $# -ne 0 ]; then
2224
+ check_args "--helm_extra_args" $1; shift
2225
+ helm_extra_args=$*
2226
+ fi
2227
+
2228
+ echo "================================"
2229
+ echo " Deploying $application"
2230
+ echo " - Environment: $environment"
2231
+ echo " - Namespace: $namespace"
2232
+ echo "================================"
2233
+
2234
+ root_path=$(pwd)
2235
+
2236
+ # Check the configs exists
2237
+
2238
+ check_config_file ${root_path}/${path_configs}/common.yaml
2239
+ check_config_file ${root_path}/${path_configs}/${namespace}.yaml
2240
+ check_config_file ${root_path}/${path_configs}/${namespace}-secrets.yaml
2241
+
2242
+ # Check the chart exists
2243
+ if [ ! -d ${root_path}/${path_chart} ] || [ ! -f ${root_path}/${path_chart}/Chart.yaml ]; then
2244
+ echo "Bad Chart $root_path/$path_chart : does not exists or missing Chart.yaml"
2245
+ print_usage
2246
+ exit 1
2247
+ fi
2248
+
2249
+ # Unset Kubectl configuration made via the KUBECONFIG env variable
2250
+ # it would override the config made by configure_kubectl_for
2251
+ # for example, using Gitlab runners in Kubernetes sets this variable and causes conflict
2252
+ unset KUBECONFIG
2253
+
2254
+ # Configure Kubectl
2255
+ configure_kubectl_for_ci ${environment}
2256
+
2257
+ # Configure helm3
2258
+ helm3 version --namespace ${namespace} || true
2259
+ # helm3 stable repo have changed and must be updated manually, in versions < v2.17.0
2260
+ helm3 repo add colisweb s3://colisweb-helm-charts/colisweb
2261
+ helm3 repo add stable https://charts.helm.sh/stable
2262
+ helm3 repo update
2263
+ helm3 dependency update ${root_path}/${path_chart}
2264
+
2265
+ # Gather values/*.yaml files
2266
+ values_path="${root_path}/${path_chart}/values"
2267
+ values_files=''
2268
+ [ -d $values_path ] && values_files=$(find $values_path -type f -maxdepth 1 -name "*.yaml" | sed 's/^/ -f /' | tr -d \\n | sed 's/%//')
2269
+
2270
+ # Deploy
2271
+ helm3 upgrade --install \
2272
+ --namespace ${namespace} \
2273
+ ${values_files} \
2274
+ -f ${root_path}/${path_configs}/common.yaml \
2275
+ -f ${root_path}/${path_configs}/${namespace}.yaml \
2276
+ -f ${root_path}/${path_configs}/${namespace}-secrets.yaml \
2277
+ ${helm_extra_args} \
2278
+ ${application} ${root_path}/${path_chart}
2279
+
2280
+ #send event to dd
2281
+ PUBLISHED_VERSION="$CI_COMMIT_REF_NAME-$CI_COMMIT_SHA"
2282
+ emit_datadog_deploy_event --environment $environment --service $application --version $PUBLISHED_VERSION
2283
+
2284
+ echo "================================"
2285
+ echo " Deployed $application"
2286
+ echo " - Environment: $environment"
2287
+ echo " - Namespace: $namespace"
2288
+ echo "================================"
2289
+
2290
+ set +x
2291
+ }
2292
+
2293
+ verify_deployments_v3() {
2294
+ set -e
2295
+
2296
+ # usage :
2297
+ # verify_deployments staging price
2298
+ # verify_deployments -t 15m testing price
2299
+
2300
+ if [ "$1" = "-t" ] ; then
2301
+ TIMEOUT=$2
2302
+ shift
2303
+ shift
2304
+ else
2305
+ TIMEOUT=5m
2306
+ fi
2307
+
2308
+ NAMESPACE=$1
2309
+ RELEASE=$2
2310
+
2311
+ # Get all Deployments names from the deployed chart
2312
+ DEPLOYMENTS=(
2313
+ $(helm3 get manifest --namespace $NAMESPACE $RELEASE | yq -rs '.[] | select(.kind=="Deployment") | .metadata.name')
2314
+ )
2315
+
2316
+ echo "verifying on $NAMESPACE deployments ${DEPLOYMENTS[@]} with a timeout of $TIMEOUT"
2317
+
2318
+ PIDS=()
2319
+ for D in "${DEPLOYMENTS[@]}"; do
2320
+ kubectl -n ${NAMESPACE} rollout status deployment ${D} --timeout=${TIMEOUT} &
2321
+ PIDS+=($!)
2322
+ done
2323
+
2324
+ for P in ${PIDS[@]}; do
2325
+ wait $P
2326
+
2327
+ if [ $? -ne 0 ]; then
2328
+ echo "at least one deployment failed or timed out (after $TIMEOUT)"
2329
+ exit 1
2330
+ fi
2331
+ done
2332
+
2333
+ }
2334
+
2335
+ print_usage() {
2336
+ echo "Usage:"
2337
+ echo "deploy_chart \\"
2338
+ echo " --path_configs <path to .yaml namespaces and secret config files>"
2339
+ echo " --path_chart <path to Helm Chart>"
2340
+ echo " --application <application name used by Helm>"
2341
+ echo " --environment <infrastructure environment>"
2342
+ echo " --namespace <namespace>"
2343
+ echo " --helm-extra-args <extra args to pass to helm, ex: --set my.value=42 --set your.setting=on>"
2344
+ echo ""
2345
+ }
2346
+
2347
+ check_config_file() {
2348
+ local filename=$1
2349
+ if [ ! -f ${filename} ]; then
2350
+ echo "Missing $filename configuration file"
2351
+ print_usage
2352
+ exit 1
2353
+ fi
2354
+ }
2355
+
2356
+ #!/usr/bin/env bash
2357
+
2358
+ configure_kubectl_for_ci() {
2359
+ if [ -z ${GITLAB_PAT} ]; then
2360
+ echo "Cannot configure kubectl: no GITLAB_PAT configured"
2361
+ exit 1
2362
+ fi
2363
+
2364
+ infra_env="$1"
2365
+ valid_envs="[testing][staging][production][performance][tests][recette]"
2366
+ echo "$valid_envs" | grep -q "\[$infra_env\]"
2367
+
2368
+ if [ $? -ne 0 ]; then
2369
+ echo "Cannot configure kubectl for invalid env : $infra_env"
2370
+ echo "choose one of $valid_envs"
2371
+ exit 1
2372
+ fi
2373
+
2374
+ mkdir -p ~/.kube
2375
+ curl -fsS \
2376
+ --header "PRIVATE-TOKEN: $GITLAB_PAT" \
2377
+ "https://gitlab.com/api/v4/projects/8141053/jobs/artifacts/$infra_env/raw/$infra_env.kubeconfig?job=4_kubernetes_config_output" \
2378
+ > ~/.kube/$infra_env.kubeconfig
2379
+
2380
+ curl_return_code=$?
2381
+ if [ ${curl_return_code} -ne 0 ]; then
2382
+ echo "Cannot configure kubectl for $infra_env, get configuration failed with code $curl_return_code"
2383
+ exit ${curl_return_code}
2384
+ fi
2385
+
2386
+ rm -f ~/.kube/config
2387
+ ln -s ~/.kube/$infra_env.kubeconfig ~/.kube/config
2388
+ echo "Configured kubectl for env : $infra_env"
2389
+ }
2390
+ notify_new_deployment() {
2391
+ jq --version || (apt update && apt install -y jq)
2392
+
2393
+ CHAT_URL=${1:-$DEFAULT_CHAT_URL}
2394
+
2395
+ STATUS=$(echo $CI_JOB_STATUS | tr '[:lower:]' '[:upper:]' )
2396
+ ENV_NAME=$(echo $ENVIRONMENT | tr '[:lower:]' '[:upper:]' )
2397
+
2398
+ JOB_LINK="<$CI_JOB_URL| $CI_JOB_NAME $CI_JOB_ID>"
2399
+
2400
+ DESCRIPTION="
2401
+ $STATUS : Deployment for $CI_PROJECT_NAME on $ENV_NAME
2402
+ $JOB_LINK
2403
+ $CI_COMMIT_TITLE
2404
+ "
2405
+
2406
+ JSON_MESSAGE=$(jq -n --arg text "$DESCRIPTION" '{text: $text }')
2407
+ curl -X POST $CHAT_URL \
2408
+ --header "Content-Type: application/json" \
2409
+ --data "$JSON_MESSAGE"
2410
+ }
2411
+ notify_new_version() {
2412
+
2413
+ ! test -z $CI_COMMIT_TAG || exit 0
2414
+
2415
+ jq --version || (apt update && apt install -y jq)
2416
+
2417
+ KIND=$1
2418
+ CHAT_URL=${2:-$DEFAULT_CHAT_URL}
2419
+
2420
+ STATUS=$(echo $CI_JOB_STATUS | tr '[:lower:]' '[:upper:]' )
2421
+ ENV_NAME=$(echo $ENVIRONMENT | tr '[:lower:]' '[:upper:]' )
2422
+ TITLE="$ENV_NAME *$STATUS* $KIND for version *$CI_COMMIT_TAG* of *$CI_PROJECT_NAME* "
2423
+
2424
+ RELEASE_URL="https://gitlab.com/api/v4/projects/$CI_PROJECT_ID/releases/$CI_COMMIT_TAG"
2425
+
2426
+ NOTES=$(curl --header "PRIVATE-TOKEN: $GITLAB_TOKEN" $RELEASE_URL |
2427
+ jq .description |
2428
+ sed -e 's/^"//' -e 's/"$//' |
2429
+ sed -E 's/\[([^]]+)\]\(([^)]+)\)/<\2|\1>/g' |
2430
+ sed -E 's/\\n/\'$'\n/g')
2431
+
2432
+ JOB_LINK="<$CI_JOB_URL| $CI_JOB_NAME $CI_JOB_ID>"
2433
+
2434
+ DESCRIPTION="
2435
+ $TITLE
2436
+ $JOB_LINK
2437
+ $NOTES
2438
+ "
2439
+
2440
+ JSON_MESSAGE=$(jq -n --arg text "$DESCRIPTION" '{text: $text }')
2441
+ curl -X POST $CHAT_URL \
2442
+ --header "Content-Type: application/json" \
2443
+ --data "$JSON_MESSAGE"
2444
+ }
2445
+ #!/usr/bin/env bash
2446
+
2447
+ skip_sbt_compile_cache() {
2448
+ COMPARED_BRANCH="${CI_MERGE_REQUEST_TARGET_BRANCH_NAME:-$CI_DEFAULT_BRANCH}"
2449
+ echo "branch to compare to: $COMPARED_BRANCH"
2450
+ git fetch origin $COMPARED_BRANCH
2451
+ echo "fetched $COMPARED_BRANCH"
2452
+ [[ "$CI_COMMIT_REF_NAME" =~ ^(master|develop)$ || $(git diff origin/$COMPARED_BRANCH --exit-code -- project) ]]
2453
+ }
2454
+ #!/usr/bin/env bash
2455
+
2456
+ # in case of trouble with functions for update history during import
2457
+ # https://stackoverflow.com/questions/56729192/pg-restore-fails-when-trying-to-create-function-referencing-table-that-does-not
2458
+
2459
+ # example: clone_databases --source_env testing --destination_env recette --services "order,notification,parcel,ikea"
2460
+ clone_databases() {
2461
+ export USERNAME="database-cloner"
2462
+
2463
+ set -e
2464
+
2465
+ extract_args 3 source_env destination_env services $*
2466
+
2467
+ dump_databases "$source_env" "$services"
2468
+ import_databases "$destination_env" "$services"
2469
+ }
2470
+
2471
+ dump_databases() {
2472
+ local env="$1"
2473
+ local services=$(echo -n "$2" | tr ',' '\n')
2474
+
2475
+ database_k8s_output_dump_path="/tmp/database_k8s_output_dump"
2476
+
2477
+ configure_kubectl_for "$env"
2478
+ set +e
2479
+ database_k8s "$env" > "$database_k8s_output_dump_path"
2480
+ set -e
2481
+
2482
+ source_pg_local_port=$(extract_pg_local_port "$database_k8s_output_dump_path")
2483
+
2484
+ for service in $services
2485
+ do
2486
+ service_path="/tmp/$service"
2487
+
2488
+ set +e
2489
+ git clone "git@gitlab.com:colisweb/back/$service.git" "$service_path"
2490
+ set -e
2491
+
2492
+ if cd "$service_path"; then
2493
+ echo "dump the database for service $service.."
2494
+
2495
+ git secret reveal -f
2496
+
2497
+ PG_YAML_PATH=".${service}config.postgres"
2498
+
2499
+ SOURCE_DB_DATABASE=$(extract_yaml_config_variable --environment "$env" --configsPath ./deploy --variable "${PG_YAML_PATH}.database")
2500
+ SOURCE_DB_USER=$(extract_yaml_config_variable --environment "$env" --configsPath ./deploy --variable "${PG_YAML_PATH}.user")
2501
+ SOURCE_DB_PASSWORD=$(extract_yaml_config_variable --environment "$env" --configsPath ./deploy --variable "${PG_YAML_PATH}.password")
2502
+
2503
+ export PGPASSWORD="$SOURCE_DB_PASSWORD"
2504
+
2505
+ DUMP_PATH="/tmp/db_dump_${service}.sql"
2506
+ pg_dump --no-owner -h localhost -p "$source_pg_local_port" -U "$SOURCE_DB_USER" "$SOURCE_DB_DATABASE" > "$DUMP_PATH"
2507
+
2508
+ cd ..
2509
+ rm -rf "$service_path"
2510
+ else
2511
+ echo "WARN: failed to clone $service - skipping"
2512
+ fi
2513
+ done
2514
+ }
2515
+
2516
+ import_databases() {
2517
+ local env="$1"
2518
+ local services=$(echo -n "$2" | tr ',' '\n')
2519
+
2520
+ database_k8s_output_import_path="/tmp/database_k8s_output_import"
2521
+
2522
+ configure_kubectl_for "$env"
2523
+ set +e
2524
+ database_k8s "$env" > "$database_k8s_output_import_path"
2525
+ set -e
2526
+
2527
+ destination_pg_local_port=$(extract_pg_local_port "$database_k8s_output_import_path")
2528
+
2529
+ for service in $services
2530
+ do
2531
+ service_path="/tmp/$service"
2532
+
2533
+ set +e
2534
+ git clone "git@gitlab.com:colisweb/back/$service.git" "$service_path"
2535
+ set -e
2536
+
2537
+ if cd "$service_path"; then
2538
+ echo "create and import database for $service.."
2539
+
2540
+ git secret reveal -f
2541
+
2542
+ PG_YAML_PATH=".${service}config.postgres"
2543
+
2544
+ DB_PORT="5432"
2545
+ DB_HOST=$(extract_yaml_config_variable --environment "$env" --configsPath ./deploy --variable "${PG_YAML_PATH}.host")
2546
+ DB_INIT_USERNAME=$(extract_yaml_config_variable --environment "$env" --configsPath ./deploy --variable "${PG_YAML_PATH}.initUsername")
2547
+ DB_INIT_PASSWORD=$(extract_yaml_config_variable --environment "$env" --configsPath ./deploy --variable "${PG_YAML_PATH}.initPassword")
2548
+ DB_DATABASE=$(extract_yaml_config_variable --environment "$env" --configsPath ./deploy --variable "${PG_YAML_PATH}.database")
2549
+ DB_USER=$(extract_yaml_config_variable --environment "$env" --configsPath ./deploy --variable "${PG_YAML_PATH}.user")
2550
+ DB_PASSWORD=$(extract_yaml_config_variable --environment "$env" --configsPath ./deploy --variable "${PG_YAML_PATH}.password")
2551
+
2552
+ kube_init_service_database \
2553
+ --namespace ${env} \
2554
+ --service ${service} \
2555
+ --db_host ${DB_HOST} \
2556
+ --db_port ${DB_PORT} \
2557
+ --db_init_username ${DB_INIT_USERNAME} \
2558
+ --db_init_password ${DB_INIT_PASSWORD} \
2559
+ --db_database ${DB_DATABASE} \
2560
+ --db_username ${DB_USER} \
2561
+ --db_password ${DB_PASSWORD}
2562
+
2563
+ echo "WARN: A complete clean of $DB_DATABASE on $DB_HOST will be operated"
2564
+ read -rsn1 -p"Press any key to continue";echo
2565
+ flyway_clean "$DB_HOST" "$DB_PORT" "$DB_DATABASE" "$DB_USER" "$DB_PASSWORD"
2566
+
2567
+ DUMP_PATH="/tmp/db_dump_${service}.sql"
2568
+ export PGPASSWORD="$DB_PASSWORD"
2569
+ set +e
2570
+ psql "postgres://$DB_USER@127.0.0.1:$destination_pg_local_port" -p "$DB_DATABASE" -f "$DUMP_PATH"
2571
+ set -e
2572
+
2573
+ cd ..
2574
+ rm -rf "$service_path"
2575
+ else
2576
+ echo "WARN: failed to clone $service - skipping"
2577
+ fi
2578
+ done
2579
+ }
2580
+
2581
+ extract_pg_local_port() {
2582
+ cat "$1" | grep 'postgres@127.0.0.1:' | sed 's/.*postgres@127.0.0.1:\(.*[0-9]\).*/\1/g'
2583
+ }
2584
+ #!/usr/bin/env bash
2585
+
2586
+ emit_datadog_deploy_event() {
2587
+ extract_args 3 environment service version $*
2588
+ check_env_vars 1 "DD_API_KEY"
2589
+
2590
+ response=$(
2591
+ curl -X POST -H "Content-type: application/json" \
2592
+ -d '{
2593
+ "title": "deploying '"$service"' to '"$environment"'",
2594
+ "text": "deploying '"$service"' version '"$version"' to '"$environment"'",
2595
+ "priority": "normal",
2596
+ "tags": ["service:'"$service"' ", "env:'"$environment"'" ,"action:'"deployment"'"] ,
2597
+
2598
+ "alert_type": "Info"
2599
+ }' \
2600
+ "https://api.datadoghq.com/api/v1/events?api_key=$DD_API_KEY"
2601
+ )
2602
+
2603
+ #echo $response
2604
+ EventID=$(echo $response | jq ".event.id")
2605
+ url=$(echo $response | jq ".event.url")
2606
+
2607
+ if [[ $EventID -ne 0 ]]; then
2608
+ echo "event successfully created check in datadog UI : $url"
2609
+ else
2610
+ echo " failed to create event "
2611
+ exit 1
2612
+ fi
2613
+ }
2614
+
2615
+ #!/usr/bin/env bash
2616
+
2617
+ # DEPRECATED
2618
+ emit_datadog_error_events() {
2619
+ set -e
2620
+ extract_args 4 title text priority environment $*
2621
+ check_env_vars 1 "DD_API_KEY"
2622
+
2623
+ curl -X POST -H "Content-type: application/json" \
2624
+ -d '{
2625
+ "title": "'"$title"'",
2626
+ "text": "'"$text"'",
2627
+ "priority": "'"$priority"'",
2628
+ "tags": ["environment:'"$environment"'"],
2629
+ "alert_type": "Error"
2630
+ }' \
2631
+ "https://api.datadoghq.com/api/v1/events?api_key=$DD_API_KEY"
2632
+ }
2633
+
2634
+ #!/usr/bin/env bash
2635
+ terraform_init() {
2636
+ SECTION=$1
2637
+ ENV=$2
2638
+ cd $SECTION
2639
+ terraform init -input=false
2640
+ terraform workspace select $ENV || terraform workspace new $ENV
2641
+ }