2019-11-06 21:56:29 +01:00
|
|
|
// Copyright 2016-2019, Pulumi Corporation.
|
|
|
|
//
|
|
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
// you may not use this file except in compliance with the License.
|
|
|
|
// You may obtain a copy of the License at
|
|
|
|
//
|
|
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
//
|
|
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
// See the License for the specific language governing permissions and
|
|
|
|
// limitations under the License.
|
|
|
|
|
|
|
|
package cmd
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
|
|
|
|
|
|
|
"github.com/pkg/errors"
|
|
|
|
"github.com/spf13/cobra"
|
|
|
|
|
|
|
|
"github.com/pulumi/pulumi/pkg/backend"
|
|
|
|
"github.com/pulumi/pulumi/pkg/backend/display"
|
|
|
|
"github.com/pulumi/pulumi/pkg/engine"
|
2020-03-18 23:39:00 +01:00
|
|
|
"github.com/pulumi/pulumi/sdk/go/common/util/cmdutil"
|
2020-03-18 23:45:42 +01:00
|
|
|
"github.com/pulumi/pulumi/sdk/go/common/util/result"
|
2019-11-06 21:56:29 +01:00
|
|
|
)
|
|
|
|
|
|
|
|
// intentionally disabling here for cleaner err declaration/assignment.
|
|
|
|
// nolint: vetshadow
|
|
|
|
func newWatchCmd() *cobra.Command {
|
|
|
|
var debug bool
|
|
|
|
var message string
|
|
|
|
var stack string
|
|
|
|
var configArray []string
|
|
|
|
var configPath bool
|
|
|
|
|
|
|
|
// Flags for engine.UpdateOptions.
|
|
|
|
var policyPackPaths []string
|
2020-03-08 22:11:55 +01:00
|
|
|
var policyPackConfigPaths []string
|
2019-11-06 21:56:29 +01:00
|
|
|
var parallel int
|
|
|
|
var refresh bool
|
|
|
|
var showConfig bool
|
|
|
|
var showReplacementSteps bool
|
|
|
|
var showSames bool
|
|
|
|
var secretsProvider string
|
|
|
|
|
|
|
|
var cmd = &cobra.Command{
|
|
|
|
Use: "watch",
|
|
|
|
SuggestFor: []string{"developer", "dev"},
|
2020-03-02 23:23:40 +01:00
|
|
|
Short: "[PREVIEW] Continuously update the resources in a stack",
|
2019-11-06 21:56:29 +01:00
|
|
|
Long: "Continuously update the resources in a stack.\n" +
|
|
|
|
"\n" +
|
|
|
|
"This command watches the working directory for the current project and updates the active stack whenever\n" +
|
|
|
|
"the project changes. In parallel, logs are collected for all resources in the stack and displayed along\n" +
|
|
|
|
"with update progress.\n" +
|
|
|
|
"\n" +
|
|
|
|
"The program to watch is loaded from the project in the current directory by default. Use the `-C` or\n" +
|
|
|
|
"`--cwd` flag to use a different directory.",
|
|
|
|
Args: cmdutil.MaximumNArgs(1),
|
|
|
|
Run: cmdutil.RunResultFunc(func(cmd *cobra.Command, args []string) result.Result {
|
|
|
|
|
|
|
|
opts, err := updateFlagsToOptions(false /* interactive */, true /* skippreview*/, true /* autoapprove*/)
|
|
|
|
if err != nil {
|
|
|
|
return result.FromError(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
opts.Display = display.Options{
|
|
|
|
Color: cmdutil.GetGlobalColorization(),
|
|
|
|
ShowConfig: showConfig,
|
|
|
|
ShowReplacementSteps: showReplacementSteps,
|
|
|
|
ShowSameResources: showSames,
|
|
|
|
SuppressOutputs: true,
|
|
|
|
IsInteractive: false,
|
|
|
|
Type: display.DisplayWatch,
|
|
|
|
Debug: debug,
|
|
|
|
}
|
|
|
|
|
2020-03-08 22:11:55 +01:00
|
|
|
if err := validatePolicyPackConfig(policyPackPaths, policyPackConfigPaths); err != nil {
|
|
|
|
return result.FromError(err)
|
|
|
|
}
|
|
|
|
|
2019-11-06 21:56:29 +01:00
|
|
|
s, err := requireStack(stack, true, opts.Display, true /*setCurrent*/)
|
|
|
|
if err != nil {
|
|
|
|
return result.FromError(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Save any config values passed via flags.
|
|
|
|
if err := parseAndSaveConfigArray(s, configArray, configPath); err != nil {
|
|
|
|
return result.FromError(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
proj, root, err := readProject()
|
|
|
|
if err != nil {
|
|
|
|
return result.FromError(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
m, err := getUpdateMetadata(message, root)
|
|
|
|
if err != nil {
|
|
|
|
return result.FromError(errors.Wrap(err, "gathering environment metadata"))
|
|
|
|
}
|
|
|
|
|
|
|
|
sm, err := getStackSecretsManager(s)
|
|
|
|
if err != nil {
|
|
|
|
return result.FromError(errors.Wrap(err, "getting secrets manager"))
|
|
|
|
}
|
|
|
|
|
|
|
|
cfg, err := getStackConfiguration(s, sm)
|
|
|
|
if err != nil {
|
|
|
|
return result.FromError(errors.Wrap(err, "getting stack configuration"))
|
|
|
|
}
|
|
|
|
|
|
|
|
opts.Engine = engine.UpdateOptions{
|
2020-03-08 22:11:55 +01:00
|
|
|
LocalPolicyPacks: engine.MakeLocalPolicyPacks(policyPackPaths, policyPackConfigPaths),
|
2020-01-30 22:31:41 +01:00
|
|
|
Parallel: parallel,
|
|
|
|
Debug: debug,
|
|
|
|
Refresh: refresh,
|
|
|
|
UseLegacyDiff: useLegacyDiff(),
|
2019-11-06 21:56:29 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
res := s.Watch(commandContext(), backend.UpdateOperation{
|
|
|
|
Proj: proj,
|
|
|
|
Root: root,
|
|
|
|
M: m,
|
|
|
|
Opts: opts,
|
|
|
|
StackConfiguration: cfg,
|
|
|
|
SecretsManager: sm,
|
|
|
|
Scopes: cancellationScopes,
|
|
|
|
})
|
|
|
|
switch {
|
|
|
|
case res != nil && res.Error() == context.Canceled:
|
|
|
|
return result.FromError(errors.New("update cancelled"))
|
|
|
|
case res != nil:
|
|
|
|
return PrintEngineResult(res)
|
|
|
|
default:
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
}),
|
|
|
|
}
|
|
|
|
|
|
|
|
cmd.PersistentFlags().BoolVarP(
|
|
|
|
&debug, "debug", "d", false,
|
|
|
|
"Print detailed debugging output during resource operations")
|
|
|
|
cmd.PersistentFlags().StringVarP(
|
|
|
|
&stack, "stack", "s", "",
|
|
|
|
"The name of the stack to operate on. Defaults to the current stack")
|
|
|
|
cmd.PersistentFlags().StringVar(
|
|
|
|
&stackConfigFile, "config-file", "",
|
|
|
|
"Use the configuration values in the specified file rather than detecting the file name")
|
|
|
|
cmd.PersistentFlags().StringArrayVarP(
|
|
|
|
&configArray, "config", "c", []string{},
|
|
|
|
"Config to use during the update")
|
|
|
|
cmd.PersistentFlags().BoolVar(
|
|
|
|
&configPath, "config-path", false,
|
|
|
|
"Config keys contain a path to a property in a map or list to set")
|
|
|
|
cmd.PersistentFlags().StringVar(
|
|
|
|
&secretsProvider, "secrets-provider", "default", "The type of the provider that should be used to encrypt and "+
|
|
|
|
"decrypt secrets (possible choices: default, passphrase, awskms, azurekeyvault, gcpkms, hashivault). Only"+
|
|
|
|
"used when creating a new stack from an existing template")
|
|
|
|
|
|
|
|
cmd.PersistentFlags().StringVarP(
|
|
|
|
&message, "message", "m", "",
|
|
|
|
"Optional message to associate with each update operation")
|
|
|
|
|
|
|
|
// Flags for engine.UpdateOptions.
|
2020-03-02 23:23:40 +01:00
|
|
|
cmd.PersistentFlags().StringSliceVar(
|
|
|
|
&policyPackPaths, "policy-pack", []string{},
|
|
|
|
"[PREVIEW] Run one or more policy packs as part of each update")
|
2020-03-08 22:11:55 +01:00
|
|
|
cmd.PersistentFlags().StringSliceVar(
|
|
|
|
&policyPackConfigPaths, "policy-pack-config", []string{},
|
|
|
|
`[PREVIEW] Path to JSON file containing the config for the policy pack of the corresponding "--policy-pack" flag`)
|
2019-11-06 21:56:29 +01:00
|
|
|
cmd.PersistentFlags().IntVarP(
|
|
|
|
¶llel, "parallel", "p", defaultParallel,
|
|
|
|
"Allow P resource operations to run in parallel at once (1 for no parallelism). Defaults to unbounded.")
|
|
|
|
cmd.PersistentFlags().BoolVarP(
|
|
|
|
&refresh, "refresh", "r", false,
|
|
|
|
"Refresh the state of the stack's resources before each update")
|
|
|
|
cmd.PersistentFlags().BoolVar(
|
|
|
|
&showConfig, "show-config", false,
|
|
|
|
"Show configuration keys and variables")
|
|
|
|
cmd.PersistentFlags().BoolVar(
|
|
|
|
&showReplacementSteps, "show-replacement-steps", false,
|
|
|
|
"Show detailed resource replacement creates and deletes instead of a single step")
|
|
|
|
cmd.PersistentFlags().BoolVar(
|
|
|
|
&showSames, "show-sames", false,
|
|
|
|
"Show resources that don't need be updated because they haven't changed, alongside those that do")
|
|
|
|
|
|
|
|
return cmd
|
|
|
|
}
|