Skip to content
This repository was archived by the owner on Jan 29, 2019. It is now read-only.

Commit 841ffb9

Browse files
committed
Start refactor to remove "generated-at-runtime" tf workspace files
1 parent 840e35e commit 841ffb9

17 files changed

+875
-60
lines changed

terraform/container.bzl

+20-7
Original file line numberDiff line numberDiff line change
@@ -12,8 +12,6 @@ image_publisher = _image_publisher
1212

1313
def _image_embedder_impl(ctx):
1414
providers = []
15-
runfiles = []
16-
transitive_runfiles = []
1715

1816
out = ctx.actions.declare_file("%s.%s" % (ctx.attr.name, ctx.file.src.extension))
1917
providers.append(_embed_images(
@@ -23,21 +21,36 @@ def _image_embedder_impl(ctx):
2321
output_format = ctx.file.src.extension,
2422
))
2523

24+
tar = ctx.actions.declare_file(ctx.attr.name + ".tar")
25+
bundle_args = ctx.actions.args()
26+
bundle_args.add("--output", tar)
27+
bundle_args.add("--file", [out.basename, out])
28+
ctx.actions.run(
29+
inputs = [out],
30+
outputs = [tar],
31+
arguments = [bundle_args],
32+
executable = ctx.executable._bundle_tool,
33+
)
34+
2635
return providers + [
27-
_ModuleInfo(files = {out.basename: out}),
36+
_ModuleInfo(
37+
files = {out.basename: out},
38+
tar = tar,
39+
),
2840
DefaultInfo(
2941
files = depset(direct = [out]),
30-
runfiles = ctx.runfiles(
31-
files = runfiles,
32-
transitive_files = depset(transitive = transitive_runfiles),
33-
),
3442
),
3543
]
3644

3745
_image_embedder = rule(
3846
implementation = _image_embedder_impl,
3947
attrs = _image_embedder_attrs + {
4048
"src": attr.label(allow_single_file = [".yaml", ".json", ".yml"]),
49+
"_bundle_tool": attr.label(
50+
default = Label("//terraform/internal:bundle"),
51+
executable = True,
52+
cfg = "host",
53+
),
4154
},
4255
)
4356

terraform/dependencies.bzl

+2-2
Original file line numberDiff line numberDiff line change
@@ -8,8 +8,8 @@ _EXTERNAL_BINARIES = {
88
version = "1.11.1",
99
),
1010
"terraform-docs": dict(
11-
url = "https://github.com/segmentio/terraform-docs/releases/download/v{version}/terraform-docs_{platform}_amd64",
12-
version = "0.3.0",
11+
url = "https://github.com/segmentio/terraform-docs/releases/download/{version}/terraform-docs-{version}-{platform}-amd64",
12+
version = "v0.5.0",
1313
),
1414
"terraform": dict(
1515
url = "https://releases.hashicorp.com/terraform/{version}/terraform_{version}_{platform}_amd64.zip",

terraform/internal/BUILD

+19
Original file line numberDiff line numberDiff line change
@@ -10,6 +10,18 @@ py_binary(
1010
visibility = ["//visibility:public"],
1111
)
1212

13+
py_binary(
14+
name = "render_workspace",
15+
srcs = ["render_workspace.py"],
16+
visibility = ["//visibility:public"],
17+
)
18+
19+
py_binary(
20+
name = "bundle",
21+
srcs = ["bundle.py"],
22+
visibility = ["//visibility:public"],
23+
)
24+
1325
py_binary(
1426
name = "stamper",
1527
srcs = ["stamper.py"],
@@ -32,3 +44,10 @@ py_binary(
3244
visibility = ["//visibility:public"],
3345
deps = ["@yaml"],
3446
)
47+
48+
py_binary(
49+
name = "k8s_manifest",
50+
srcs = ["k8s_manifest.py"],
51+
visibility = ["//visibility:public"],
52+
deps = ["@yaml"],
53+
)

terraform/internal/bundle.py

+76
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,76 @@
1+
import argparse
2+
import collections
3+
import os
4+
import tarfile
5+
6+
parser = argparse.ArgumentParser(
7+
fromfile_prefix_chars='@',
8+
description='Bundle terraform files into an archive')
9+
10+
parser.add_argument(
11+
'--file', action='append', metavar=('tgt_path', 'src'), nargs=2, default=[],
12+
help="'src' file will be added to 'tgt_path'")
13+
14+
parser.add_argument(
15+
'--embed', action='append', metavar=('embed_path', 'src_tar'), nargs=2, default=[],
16+
help="'src' archive will be embedded in 'embed_path'. If 'embed_path=.' then archive content will be merged into "
17+
"the output root")
18+
19+
parser.add_argument(
20+
'--output', action='store', required=True,
21+
help="Output path of bundled archive")
22+
23+
BundleItem = collections.namedtuple('BundleItem', 'tarinfo file')
24+
25+
26+
class Bundle:
27+
28+
def __init__(self, output):
29+
# map of paths to BundleItems
30+
self._file_map = {}
31+
self._output = tarfile.open(output, "w")
32+
33+
def add(self, src, arcname):
34+
f = open(os.path.realpath(src), 'r')
35+
tarinfo = self._output.gettarinfo(arcname=arcname, fileobj=f)
36+
if self._file_map.has_key(tarinfo.name):
37+
raise ValueError("File '%s' is already in archive" % tarinfo.name)
38+
tarinfo.mtime = 0 # zero out modification time
39+
self._file_map[tarinfo.name] = BundleItem(tarinfo, f)
40+
41+
def embed(self, archive, embed_path):
42+
tar = tarfile.open(archive)
43+
for tarinfo in tar.getmembers():
44+
f = tar.extractfile(tarinfo)
45+
if embed_path != ".":
46+
tarinfo.name = embed_path + "/" + tarinfo.name
47+
if self._file_map.has_key(tarinfo.name):
48+
raise ValueError("File '%s' is already in archive" % tarinfo.name)
49+
self._file_map[tarinfo.name] = BundleItem(tarinfo, f)
50+
51+
def finish(self):
52+
for path in sorted(self._file_map.keys()):
53+
tarinfo, f = self._file_map[path]
54+
self._output.addfile(tarinfo, fileobj=f)
55+
56+
57+
def main(args):
58+
"""
59+
60+
:return:
61+
"""
62+
63+
# output = tarfile.open(args.output, "w")
64+
bundle = Bundle(args.output)
65+
66+
# add each args.file
67+
for tgt_path, src in args.file:
68+
bundle.add(src, tgt_path)
69+
# embed each args.embed
70+
for embed_path, src_tar in args.embed:
71+
bundle.embed(src_tar, embed_path)
72+
73+
bundle.finish()
74+
75+
if __name__ == '__main__':
76+
main(parser.parse_args())

terraform/internal/image_embedder.py

+6-5
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,7 @@
33
import argparse
44
import io
55
import json
6+
import logging
67
import os
78
from collections import namedtuple
89

@@ -94,7 +95,6 @@ def publish(self, transport, threads=_THREADS):
9495
with v2_2_image.FromDisk(self._config, self._layers, legacy_base=self._tarball) as image:
9596
# todo: output more friendly error message when this raises an exception
9697
session.upload(image)
97-
print("Successfully published image '%s@%s'" % (self._name_to_publish, image.digest()))
9898

9999
def name_to_embed(self):
100100
with v2_2_image.FromDisk(self._config, self._layers, legacy_base=self._tarball) as image:
@@ -153,13 +153,13 @@ def walk(o):
153153
outputs.extend(map(walk, yaml.load_all(input_str)))
154154

155155
if len(outputs) == 0:
156-
print("ERROR: Nothing to resolve (Are you sure the input has valid json/yaml objects?)")
156+
logging.fatal("Nothing to resolve (Are you sure the input has valid json/yaml objects?)")
157157
sys.exit(1)
158158

159159
if len(unseen_strings) > 0:
160-
print('ERROR: The following image references were not found:', file=sys.stderr)
161-
for ref in unseen_strings:
162-
print(' %s' % ref, file=sys.stderr)
160+
msg = 'The following image references were not found:\n '
161+
msg = msg + "\n ".join(unseen_strings)
162+
logging.fatal(msg)
163163
sys.exit(1)
164164

165165
output_content = io.BytesIO()
@@ -192,6 +192,7 @@ def publish(args):
192192

193193

194194
def main():
195+
logging.basicConfig(stream=sys.stderr, level=logging.INFO)
195196
args = parser.parse_args()
196197

197198
if args.command == "embed":

terraform/internal/image_embedder_lib.bzl

+7-6
Original file line numberDiff line numberDiff line change
@@ -111,12 +111,13 @@ def create_image_publisher(ctx, output, aspect_targets):
111111
image_specs = []
112112

113113
for t in aspect_targets:
114-
targets = t[PublishableTargetsInfo].targets
115-
if targets != None:
116-
for target in targets.to_list():
117-
info = target[ImagePublishInfo]
118-
transitive_runfiles.append(info.runfiles)
119-
image_specs.extend(info.image_specs)
114+
if PublishableTargetsInfo in t:
115+
targets = t[PublishableTargetsInfo].targets
116+
if targets != None:
117+
for target in targets.to_list():
118+
info = target[ImagePublishInfo]
119+
transitive_runfiles.append(info.runfiles)
120+
image_specs.extend(info.image_specs)
120121

121122
# dedupe image specs
122123
image_specs = {k: None for k in image_specs}.keys()
+65
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,65 @@
1+
load("//terraform:providers.bzl", "WorkspaceInfo", "tf_workspace_files_prefix")
2+
load("//terraform/internal:image_embedder_lib.bzl", "create_image_publisher", "image_publisher_aspect", "image_publisher_attrs")
3+
4+
def _integration_test_impl(ctx):
5+
"""
6+
"""
7+
8+
runfiles = []
9+
transitive_runfiles = []
10+
11+
transitive_runfiles.append(ctx.attr._runner_template.data_runfiles.files)
12+
transitive_runfiles.append(ctx.attr._stern.data_runfiles.files)
13+
transitive_runfiles.append(ctx.attr.srctest.data_runfiles.files)
14+
transitive_runfiles.append(ctx.attr.terraform_workspace.data_runfiles.files)
15+
render_workspace = ctx.attr.terraform_workspace[WorkspaceInfo].render_workspace
16+
17+
ctx.actions.expand_template(
18+
template = ctx.file._runner_template,
19+
substitutions = {
20+
"%{render_workspace}": render_workspace.short_path,
21+
"%{srctest}": ctx.executable.srctest.short_path,
22+
"%{stern}": ctx.executable._stern.short_path,
23+
},
24+
output = ctx.outputs.executable,
25+
is_executable = True,
26+
)
27+
28+
return [DefaultInfo(
29+
runfiles = ctx.runfiles(
30+
files = runfiles,
31+
transitive_files = depset(transitive = transitive_runfiles),
32+
),
33+
)]
34+
35+
# Wraps the source test with infrastructure spinup and teardown
36+
terraform_integration_test = rule(
37+
test = True,
38+
implementation = _integration_test_impl,
39+
attrs = image_publisher_attrs + {
40+
"terraform_workspace": attr.label(
41+
doc = "TF Workspace to spin up before testing & tear down after testing.",
42+
mandatory = True,
43+
executable = True,
44+
cfg = "host",
45+
providers = [WorkspaceInfo],
46+
aspects = [image_publisher_aspect],
47+
),
48+
"srctest": attr.label(
49+
doc = "Label of source test to wrap",
50+
mandatory = True,
51+
executable = True,
52+
cfg = "target", # 'host' does not work for jvm source tests, because it launches with @embedded_jdk//:jar instead of @local_jdk//:jar
53+
aspects = [image_publisher_aspect],
54+
),
55+
"_runner_template": attr.label(
56+
default = "//terraform/internal:integration_test_runner.sh.tpl",
57+
allow_single_file = True,
58+
),
59+
"_stern": attr.label(
60+
executable = True,
61+
cfg = "host",
62+
default = "@tool_stern",
63+
),
64+
},
65+
)

terraform/internal/integration_test_runner.sh.tpl

+12-37
Original file line numberDiff line numberDiff line change
@@ -5,6 +5,9 @@ err_report() { echo "errexit on line $(caller)" >&2; }
55
trap err_report ERR
66

77
export RUNFILES=${RUNFILES_DIR}
8+
# guess the kubeconfig location if it isn't already set
9+
: ${KUBECONFIG:="/Users/$USER/.kube/config:/home/$USER/.kube/config"}
10+
export KUBECONFIG
811

912
# register cleanup traps here, then execute them on EXIT!
1013
ITS_A_TRAP=()
@@ -23,43 +26,19 @@ cleanup(){
2326
}
2427
trap cleanup EXIT
2528

26-
render_tf="%{render_tf}"
29+
render_workspace="%{render_workspace}"
2730
stern="$PWD/%{stern}"
2831
SRCTEST="%{srctest}"
29-
tf_workspace_files_prefix="%{tf_workspace_files_prefix}"
30-
PRETEST_PUBLISHERS=(%{pretest_publishers})
3132

32-
# run pretest publishers (eg docker image publisher)
33-
for publisher in "${PRETEST_PUBLISHERS[@]}"; do
34-
"$publisher"
35-
done
36-
37-
mkdir -p "$tf_workspace_files_prefix"
38-
39-
: ${TMPDIR:=/tmp}
40-
: ${TF_PLUGIN_CACHE_DIR:=$TMPDIR/rules_terraform/plugin-cache}
41-
export TF_PLUGIN_CACHE_DIR
42-
mkdir -p "$TF_PLUGIN_CACHE_DIR"
43-
44-
# guess the kubeconfig location if it isn't already set
45-
: ${KUBECONFIG:="/Users/$USER/.kube/config:/home/$USER/.kube/config"}
46-
export KUBECONFIG
47-
48-
# render the tf to a tempdir
49-
tfroot=$TEST_TMPDIR/tf/tfroot
50-
tfplan=$TEST_TMPDIR/tf/tfplan
51-
tfstate=$TEST_TMPDIR/tf/tfstate.json
52-
rm -rf "$TEST_TMPDIR/tf"
53-
mkdir -p "$TEST_TMPDIR/tf"
54-
chmod 700 $(dirname "$tfstate")
55-
"$render_tf" --output_dir "$tfroot" --plugin_dir "$tf_workspace_files_prefix/.terraform/plugins" --symlink_plugins
33+
# render the tf
34+
terraform=$("$render_workspace" --symlink_plugins "$PWD/.rules_terraform")
5635

5736
# init and validate terraform
58-
pushd "$tf_workspace_files_prefix" > /dev/null
59-
timeout 20 terraform init -input=false "$tfroot"
60-
timeout 20 terraform validate "$tfroot"
37+
timeout 20 "$terraform" init -input=false
38+
timeout 20 "$terraform" validate
39+
6140
# if the kubectl provider is used then create a namespace for the test
62-
if [ "$(find .terraform/plugins/ -type f \( -name 'terraform-provider-kubernetes_*' -o -name 'terraform-provider-kubectl_*' \)|wc -l)" -gt 0 ]; then
41+
if [ "$(find .rules_terraform/.terraform/plugins/ -type f \( -name 'terraform-provider-kubernetes_*' -o -name 'terraform-provider-kubectl_*' \)|wc -l)" -gt 0 ]; then
6342
kubectl config view --merge --raw --flatten > "$TEST_TMPDIR/kubeconfig.yaml"
6443
ITS_A_TRAP+=("rm -rf '$TEST_TMPDIR/kubeconfig.yaml'")
6544
kube_context=$(kubectl config current-context)
@@ -71,14 +50,10 @@ if [ "$(find .terraform/plugins/ -type f \( -name 'terraform-provider-kubernetes
7150
# tail stuff with stern in the background
7251
"$stern" '.*' --tail 1 --color always &
7352
fi
74-
timeout 20 terraform plan -out="$tfplan" -input=false "$tfroot"
75-
popd > /dev/null
7653

7754
# apply the terraform
78-
ITS_A_TRAP+=("cd '$PWD/$tf_workspace_files_prefix' && terraform destroy -state='$tfstate' -auto-approve -refresh=false")
79-
pushd "$tf_workspace_files_prefix" > /dev/null
80-
terraform apply -state-out="$tfstate" -auto-approve "$tfplan"
81-
popd > /dev/null
55+
ITS_A_TRAP+=("$terraform destroy -auto-approve -refresh=false")
56+
"$terraform" apply -input=false -auto-approve
8257

8358
# run the test & await its completion
8459
"$SRCTEST" "$@"

0 commit comments

Comments
 (0)