cad1949dba
When creating a new stack using the local backend, the default checkpoint has no deployment. That means there's a nil snapshot created, which means our strategy of using the base snapshot's secrets manager was not going to work. Trying to do so would result in a panic because the baseSnapshot is nil in this case. Using the secrets manager we are going to use to persist the snapshot is a better idea anyhow, as that's what's actually going to be burned into the deployment when we serialize the snapshot, so let's use that instead.
65 lines
2.2 KiB
Go
65 lines
2.2 KiB
Go
// Copyright 2016-2018, Pulumi Corporation.
|
|
//
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
// you may not use this file except in compliance with the License.
|
|
// You may obtain a copy of the License at
|
|
//
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
//
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
// See the License for the specific language governing permissions and
|
|
// limitations under the License.
|
|
|
|
package httpstate
|
|
|
|
import (
|
|
"context"
|
|
|
|
"github.com/pkg/errors"
|
|
"github.com/pulumi/pulumi/pkg/backend"
|
|
"github.com/pulumi/pulumi/pkg/backend/httpstate/client"
|
|
"github.com/pulumi/pulumi/pkg/resource/deploy"
|
|
"github.com/pulumi/pulumi/pkg/resource/stack"
|
|
"github.com/pulumi/pulumi/pkg/secrets"
|
|
)
|
|
|
|
// cloudSnapshotPersister persists snapshots to the Pulumi service.
|
|
type cloudSnapshotPersister struct {
|
|
context context.Context // The context to use for client requests.
|
|
update client.UpdateIdentifier // The UpdateIdentifier for this update sequence.
|
|
tokenSource *tokenSource // A token source for interacting with the service.
|
|
backend *cloudBackend // A backend for communicating with the service
|
|
sm secrets.Manager
|
|
}
|
|
|
|
func (persister *cloudSnapshotPersister) SecretsManager() secrets.Manager {
|
|
return persister.sm
|
|
}
|
|
|
|
func (persister *cloudSnapshotPersister) Save(snapshot *deploy.Snapshot) error {
|
|
token, err := persister.tokenSource.GetToken()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
deployment, err := stack.SerializeDeployment(snapshot, persister.sm)
|
|
if err != nil {
|
|
return errors.Wrap(err, "serializing deployment")
|
|
}
|
|
return persister.backend.client.PatchUpdateCheckpoint(persister.context, persister.update, deployment, token)
|
|
}
|
|
|
|
var _ backend.SnapshotPersister = (*cloudSnapshotPersister)(nil)
|
|
|
|
func (cb *cloudBackend) newSnapshotPersister(ctx context.Context, update client.UpdateIdentifier,
|
|
tokenSource *tokenSource, sm secrets.Manager) *cloudSnapshotPersister {
|
|
return &cloudSnapshotPersister{
|
|
context: ctx,
|
|
update: update,
|
|
tokenSource: tokenSource,
|
|
backend: cb,
|
|
sm: sm,
|
|
}
|
|
}
|