pulumi/pkg/resource/deploy/deploytest/resourcemonitor.go
Ian Wahbe 272c4643b2
Update error handling (#8406)
This is the result of a change applied via `go-rewrap-errors`.
2021-11-12 18:37:17 -08:00

365 lines
10 KiB
Go

// Copyright 2016-2018, Pulumi Corporation.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package deploytest
import (
"context"
"fmt"
"github.com/pulumi/pulumi/sdk/v3/go/common/resource"
"github.com/pulumi/pulumi/sdk/v3/go/common/resource/plugin"
"github.com/pulumi/pulumi/sdk/v3/go/common/tokens"
"github.com/pulumi/pulumi/sdk/v3/go/common/util/contract"
"github.com/pulumi/pulumi/sdk/v3/go/common/util/rpcutil"
pulumirpc "github.com/pulumi/pulumi/sdk/v3/proto/go"
"google.golang.org/grpc"
)
type ResourceMonitor struct {
conn *grpc.ClientConn
resmon pulumirpc.ResourceMonitorClient
supportsSecrets bool
supportsResourceReferences bool
}
func dialMonitor(ctx context.Context, endpoint string) (*ResourceMonitor, error) {
// Connect to the resource monitor and create an appropriate client.
conn, err := grpc.Dial(
endpoint,
grpc.WithInsecure(),
rpcutil.GrpcChannelOptions(),
)
if err != nil {
return nil, fmt.Errorf("could not connect to resource monitor: %w", err)
}
resmon := pulumirpc.NewResourceMonitorClient(conn)
// Check feature support.
supportsSecrets, err := supportsFeature(ctx, resmon, "secrets")
if err != nil {
contract.IgnoreError(conn.Close())
return nil, err
}
supportsResourceReferences, err := supportsFeature(ctx, resmon, "resourceReferences")
if err != nil {
contract.IgnoreError(conn.Close())
return nil, err
}
// Fire up a resource monitor client and return.
return &ResourceMonitor{
conn: conn,
resmon: resmon,
supportsSecrets: supportsSecrets,
supportsResourceReferences: supportsResourceReferences,
}, nil
}
func supportsFeature(ctx context.Context, resmon pulumirpc.ResourceMonitorClient, id string) (bool, error) {
resp, err := resmon.SupportsFeature(ctx, &pulumirpc.SupportsFeatureRequest{Id: id})
if err != nil {
return false, err
}
return resp.GetHasSupport(), nil
}
func (rm *ResourceMonitor) Close() error {
return rm.conn.Close()
}
func NewResourceMonitor(resmon pulumirpc.ResourceMonitorClient) *ResourceMonitor {
return &ResourceMonitor{resmon: resmon}
}
type ResourceOptions struct {
Parent resource.URN
Protect bool
Dependencies []resource.URN
Provider string
Inputs resource.PropertyMap
PropertyDeps map[resource.PropertyKey][]resource.URN
DeleteBeforeReplace *bool
Version string
IgnoreChanges []string
ReplaceOnChanges []string
Aliases []resource.URN
ImportID resource.ID
CustomTimeouts *resource.CustomTimeouts
SupportsPartialValues *bool
Remote bool
Providers map[string]string
DisableSecrets bool
DisableResourceReferences bool
}
func (rm *ResourceMonitor) RegisterResource(t tokens.Type, name string, custom bool,
options ...ResourceOptions) (resource.URN, resource.ID, resource.PropertyMap, error) {
var opts ResourceOptions
if len(options) > 0 {
opts = options[0]
}
if opts.Inputs == nil {
opts.Inputs = resource.PropertyMap{}
}
// marshal inputs
ins, err := plugin.MarshalProperties(opts.Inputs, plugin.MarshalOptions{
KeepUnknowns: true,
KeepSecrets: rm.supportsSecrets,
KeepResources: rm.supportsResourceReferences,
})
if err != nil {
return "", "", nil, err
}
// marshal dependencies
deps := []string{}
for _, d := range opts.Dependencies {
deps = append(deps, string(d))
}
// marshal aliases
aliasStrings := []string{}
for _, a := range opts.Aliases {
aliasStrings = append(aliasStrings, string(a))
}
inputDeps := make(map[string]*pulumirpc.RegisterResourceRequest_PropertyDependencies)
for pk, pd := range opts.PropertyDeps {
pdeps := []string{}
for _, d := range pd {
pdeps = append(pdeps, string(d))
}
inputDeps[string(pk)] = &pulumirpc.RegisterResourceRequest_PropertyDependencies{
Urns: pdeps,
}
}
var timeouts pulumirpc.RegisterResourceRequest_CustomTimeouts
if opts.CustomTimeouts != nil {
timeouts.Create = prepareTestTimeout(opts.CustomTimeouts.Create)
timeouts.Update = prepareTestTimeout(opts.CustomTimeouts.Update)
timeouts.Delete = prepareTestTimeout(opts.CustomTimeouts.Delete)
}
deleteBeforeReplace := false
if opts.DeleteBeforeReplace != nil {
deleteBeforeReplace = *opts.DeleteBeforeReplace
}
supportsPartialValues := true
if opts.SupportsPartialValues != nil {
supportsPartialValues = *opts.SupportsPartialValues
}
requestInput := &pulumirpc.RegisterResourceRequest{
Type: string(t),
Name: name,
Custom: custom,
Parent: string(opts.Parent),
Protect: opts.Protect,
Dependencies: deps,
Provider: opts.Provider,
Object: ins,
PropertyDependencies: inputDeps,
DeleteBeforeReplace: deleteBeforeReplace,
DeleteBeforeReplaceDefined: opts.DeleteBeforeReplace != nil,
IgnoreChanges: opts.IgnoreChanges,
AcceptSecrets: !opts.DisableSecrets,
AcceptResources: !opts.DisableResourceReferences,
Version: opts.Version,
Aliases: aliasStrings,
ImportId: string(opts.ImportID),
CustomTimeouts: &timeouts,
SupportsPartialValues: supportsPartialValues,
Remote: opts.Remote,
ReplaceOnChanges: opts.ReplaceOnChanges,
Providers: opts.Providers,
}
// submit request
resp, err := rm.resmon.RegisterResource(context.Background(), requestInput)
if err != nil {
return "", "", nil, err
}
// unmarshal outputs
//
// Note that `KeepSecrets` and `KeepResources` are set to `true` so the caller can detect secrets and resource refs
// that are erroneously returned (e.g. secrets/resource refs that are returned even though the caller has not set
// `AcceptSecrets` or `AcceptResources` to `true` above).
outs, err := plugin.UnmarshalProperties(resp.Object, plugin.MarshalOptions{
KeepUnknowns: true,
KeepSecrets: true,
KeepResources: true,
})
if err != nil {
return "", "", nil, err
}
return resource.URN(resp.Urn), resource.ID(resp.Id), outs, nil
}
func (rm *ResourceMonitor) RegisterResourceOutputs(urn resource.URN, outputs resource.PropertyMap) error {
// marshal outputs
outs, err := plugin.MarshalProperties(outputs, plugin.MarshalOptions{
KeepUnknowns: true,
})
if err != nil {
return err
}
// submit request
_, err = rm.resmon.RegisterResourceOutputs(context.Background(), &pulumirpc.RegisterResourceOutputsRequest{
Urn: string(urn),
Outputs: outs,
})
return err
}
func (rm *ResourceMonitor) ReadResource(t tokens.Type, name string, id resource.ID, parent resource.URN,
inputs resource.PropertyMap, provider string, version string) (resource.URN, resource.PropertyMap, error) {
// marshal inputs
ins, err := plugin.MarshalProperties(inputs, plugin.MarshalOptions{
KeepUnknowns: true,
KeepResources: true,
})
if err != nil {
return "", nil, err
}
// submit request
resp, err := rm.resmon.ReadResource(context.Background(), &pulumirpc.ReadResourceRequest{
Type: string(t),
Name: name,
Id: string(id),
Parent: string(parent),
Provider: provider,
Properties: ins,
Version: version,
})
if err != nil {
return "", nil, err
}
// unmarshal outputs
outs, err := plugin.UnmarshalProperties(resp.Properties, plugin.MarshalOptions{
KeepUnknowns: true,
KeepResources: true,
})
if err != nil {
return "", nil, err
}
return resource.URN(resp.Urn), outs, nil
}
func (rm *ResourceMonitor) Invoke(tok tokens.ModuleMember, inputs resource.PropertyMap,
provider string, version string) (resource.PropertyMap, []*pulumirpc.CheckFailure, error) {
// marshal inputs
ins, err := plugin.MarshalProperties(inputs, plugin.MarshalOptions{
KeepUnknowns: true,
KeepResources: true,
})
if err != nil {
return nil, nil, err
}
// submit request
resp, err := rm.resmon.Invoke(context.Background(), &pulumirpc.InvokeRequest{
Tok: string(tok),
Provider: provider,
Args: ins,
Version: version,
})
if err != nil {
return nil, nil, err
}
// handle failures
if len(resp.Failures) != 0 {
return nil, resp.Failures, nil
}
// unmarshal outputs
outs, err := plugin.UnmarshalProperties(resp.Return, plugin.MarshalOptions{
KeepUnknowns: true,
KeepResources: true,
})
if err != nil {
return nil, nil, err
}
return outs, nil, nil
}
func (rm *ResourceMonitor) Call(tok tokens.ModuleMember, inputs resource.PropertyMap,
provider string, version string) (resource.PropertyMap, map[resource.PropertyKey][]resource.URN,
[]*pulumirpc.CheckFailure, error) {
// marshal inputs
ins, err := plugin.MarshalProperties(inputs, plugin.MarshalOptions{
KeepUnknowns: true,
KeepResources: true,
})
if err != nil {
return nil, nil, nil, err
}
// submit request
resp, err := rm.resmon.Call(context.Background(), &pulumirpc.CallRequest{
Tok: string(tok),
Provider: provider,
Args: ins,
Version: version,
})
if err != nil {
return nil, nil, nil, err
}
// handle failures
if len(resp.Failures) != 0 {
return nil, nil, resp.Failures, nil
}
// unmarshal outputs
outs, err := plugin.UnmarshalProperties(resp.Return, plugin.MarshalOptions{
KeepUnknowns: true,
KeepResources: true,
})
if err != nil {
return nil, nil, nil, err
}
// unmarshal return deps
deps := make(map[resource.PropertyKey][]resource.URN)
for _, p := range resp.ReturnDependencies {
var urns []resource.URN
for _, urn := range p.Urns {
urns = append(urns, resource.URN(urn))
}
}
return outs, deps, nil, nil
}
func prepareTestTimeout(timeout float64) string {
mins := int(timeout) / 60
return fmt.Sprintf("%dm", mins)
}