bac02f1df1
This change removes the need to `pulumi init` when targeting the local backend. A fair amount of the change lays the foundation that the next set of changes to stop having `pulumi init` be used for cloud stacks as well. Previously, `pulumi init` logically did two things: 1. It created the bookkeeping directory for local stacks, this was stored in `<repository-root>/.pulumi`, where `<repository-root>` was the path to what we belived the "root" of your project was. In the case of git repositories, this was the directory that contained your `.git` folder. 2. It recorded repository information in `<repository-root>/.pulumi/repository.json`. This was used by the cloud backend when computing what project to interact with on Pulumi.com The new identity model will remove the need for (2), since we only need an owner and stack name to fully qualify a stack on pulumi.com, so it's easy enough to stop creating a folder just for that. However, for the local backend, we need to continue to retain some information about stacks (e.g. checkpoints, history, etc). In addition, we need to store our workspace settings (which today just contains the selected stack) somehere. For state stored by the local backend, we change the URL scheme from `local://` to `local://<optional-root-path>`. When `<optional-root-path>` is unset, it defaults to `$HOME`. We create our `.pulumi` folder in that directory. This is important because stack names now must be unique within the backend, but we have some tests using local stacks which use fixed stack names, so each integration test really wants its own "view" of the world. For the workspace settings, we introduce a new `workspaces` directory in `~/.pulumi`. In this folder we write the workspace settings file for each project. The file name is the name of the project, combined with the SHA1 of the path of the project file on disk, to ensure that multiple pulumi programs with the same project name have different workspace settings. This does mean that moving a project's location on disk will cause the CLI to "forget" what the selected stack was, which is unfortunate, but not the end of the world. If this ends up being a big pain point, we can certianly try to play games in the future (for example, if we saw a .git folder in a parent folder, we could store data in there). With respect to compatibility, we don't attempt to migrate older files to their newer locations. For long lived stacks managed using the local backend, we can provide information on where to move things to. For all stacks (regardless of backend) we'll require the user to `pulumi stack select` their stack again, but that seems like the correct trade-off vs writing complicated upgrade code.
128 lines
4.1 KiB
Go
128 lines
4.1 KiB
Go
// Copyright 2016-2018, Pulumi Corporation. All rights reserved.
|
|
|
|
// Package stack contains the serialized and configurable state associated with an stack; or, in other
|
|
// words, a deployment target. It pertains to resources and deployment plans, but is a package unto itself.
|
|
package stack
|
|
|
|
import (
|
|
"encoding/json"
|
|
|
|
"github.com/blang/semver"
|
|
"github.com/pkg/errors"
|
|
|
|
"github.com/pulumi/pulumi/pkg/apitype"
|
|
"github.com/pulumi/pulumi/pkg/resource"
|
|
"github.com/pulumi/pulumi/pkg/resource/config"
|
|
"github.com/pulumi/pulumi/pkg/resource/deploy"
|
|
"github.com/pulumi/pulumi/pkg/tokens"
|
|
"github.com/pulumi/pulumi/pkg/util/contract"
|
|
"github.com/pulumi/pulumi/pkg/workspace"
|
|
)
|
|
|
|
func UnmarshalVersionedCheckpointToLatestCheckpoint(bytes []byte) (*apitype.CheckpointV1, error) {
|
|
var versionedCheckpoint apitype.VersionedCheckpoint
|
|
if err := json.Unmarshal(bytes, &versionedCheckpoint); err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
switch versionedCheckpoint.Version {
|
|
case 0:
|
|
// The happens when we are loading a checkpoint file from before we started to version things. Go's
|
|
// json package did not support strict marshalling before 1.10, and we use 1.9 in our toolchain today.
|
|
// After we upgrade, we could consider rewriting this code to use DisallowUnknownFields() on the decoder
|
|
// to have the old checkpoint not even deserialize as an apitype.VersionedCheckpoint.
|
|
var checkpoint apitype.CheckpointV1
|
|
if err := json.Unmarshal(bytes, &checkpoint); err != nil {
|
|
return nil, err
|
|
}
|
|
return &checkpoint, nil
|
|
case 1:
|
|
var checkpoint apitype.CheckpointV1
|
|
if err := json.Unmarshal(versionedCheckpoint.Checkpoint, &checkpoint); err != nil {
|
|
return nil, err
|
|
}
|
|
return &checkpoint, nil
|
|
default:
|
|
return nil, errors.Errorf("unsupported checkpoint version %d", versionedCheckpoint.Version)
|
|
}
|
|
}
|
|
|
|
// SerializeCheckpoint turns a snapshot into a data structure suitable for serialization.
|
|
func SerializeCheckpoint(stack tokens.QName, config config.Map, snap *deploy.Snapshot) *apitype.VersionedCheckpoint {
|
|
// If snap is nil, that's okay, we will just create an empty deployment; otherwise, serialize the whole snapshot.
|
|
var latest *apitype.Deployment
|
|
if snap != nil {
|
|
latest = SerializeDeployment(snap)
|
|
}
|
|
|
|
b, err := json.Marshal(apitype.CheckpointV1{
|
|
Stack: stack,
|
|
Config: config,
|
|
Latest: latest,
|
|
})
|
|
contract.AssertNoError(err)
|
|
|
|
return &apitype.VersionedCheckpoint{
|
|
Version: 1,
|
|
Checkpoint: json.RawMessage(b),
|
|
}
|
|
}
|
|
|
|
// DeserializeCheckpoint takes a serialized deployment record and returns its associated snapshot.
|
|
func DeserializeCheckpoint(chkpoint *apitype.CheckpointV1) (*deploy.Snapshot, error) {
|
|
contract.Require(chkpoint != nil, "chkpoint")
|
|
|
|
var snap *deploy.Snapshot
|
|
stack := chkpoint.Stack
|
|
if latest := chkpoint.Latest; latest != nil {
|
|
// Unpack the versions.
|
|
manifest := deploy.Manifest{
|
|
Time: latest.Manifest.Time,
|
|
Magic: latest.Manifest.Magic,
|
|
Version: latest.Manifest.Version,
|
|
}
|
|
for _, plug := range latest.Manifest.Plugins {
|
|
var version *semver.Version
|
|
if v := plug.Version; v != "" {
|
|
sv, err := semver.ParseTolerant(v)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
version = &sv
|
|
}
|
|
manifest.Plugins = append(manifest.Plugins, workspace.PluginInfo{
|
|
Name: plug.Name,
|
|
Kind: plug.Type,
|
|
Version: version,
|
|
})
|
|
}
|
|
|
|
// For every serialized resource vertex, create a ResourceDeployment out of it.
|
|
var resources []*resource.State
|
|
for _, res := range latest.Resources {
|
|
desres, err := DeserializeResource(res)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
resources = append(resources, desres)
|
|
}
|
|
|
|
snap = deploy.NewSnapshot(stack, manifest, resources)
|
|
}
|
|
|
|
return snap, nil
|
|
}
|
|
|
|
// GetRootStackResource returns the root stack resource from a given snapshot, or nil if not found. If the stack
|
|
// exists, its output properties, if any, are also returned in the resulting map.
|
|
func GetRootStackResource(snap *deploy.Snapshot) (*resource.State, map[string]interface{}) {
|
|
if snap != nil {
|
|
for _, res := range snap.Resources {
|
|
if res.Type == resource.RootStackType {
|
|
return res, SerializeResource(res).Outputs
|
|
}
|
|
}
|
|
}
|
|
return nil, nil
|
|
}
|