mirror of https://github.com/databricks/cli.git
343 lines
10 KiB
Go
343 lines
10 KiB
Go
package terraform
|
|
|
|
import (
|
|
"encoding/json"
|
|
"fmt"
|
|
"reflect"
|
|
|
|
"github.com/databricks/cli/bundle/config"
|
|
"github.com/databricks/cli/bundle/config/resources"
|
|
"github.com/databricks/cli/bundle/internal/tf/schema"
|
|
tfjson "github.com/hashicorp/terraform-json"
|
|
)
|
|
|
|
func conv(from any, to any) {
|
|
buf, _ := json.Marshal(from)
|
|
json.Unmarshal(buf, &to)
|
|
}
|
|
|
|
func convRemoteToLocal(remote any, local any) resources.ModifiedStatus {
|
|
var modifiedStatus resources.ModifiedStatus
|
|
if reflect.ValueOf(local).Elem().IsNil() {
|
|
modifiedStatus = resources.ModifiedStatusDeleted
|
|
}
|
|
conv(remote, local)
|
|
return modifiedStatus
|
|
}
|
|
|
|
func convPermissions(acl []resources.Permission) *schema.ResourcePermissions {
|
|
if len(acl) == 0 {
|
|
return nil
|
|
}
|
|
|
|
resource := schema.ResourcePermissions{}
|
|
for _, ac := range acl {
|
|
resource.AccessControl = append(resource.AccessControl, convPermission(ac))
|
|
}
|
|
|
|
return &resource
|
|
}
|
|
|
|
func convPermission(ac resources.Permission) schema.ResourcePermissionsAccessControl {
|
|
dst := schema.ResourcePermissionsAccessControl{
|
|
PermissionLevel: ac.Level,
|
|
}
|
|
if ac.UserName != "" {
|
|
dst.UserName = ac.UserName
|
|
}
|
|
if ac.GroupName != "" {
|
|
dst.GroupName = ac.GroupName
|
|
}
|
|
if ac.ServicePrincipalName != "" {
|
|
dst.ServicePrincipalName = ac.ServicePrincipalName
|
|
}
|
|
return dst
|
|
}
|
|
|
|
func convGrants(acl []resources.Grant) *schema.ResourceGrants {
|
|
if len(acl) == 0 {
|
|
return nil
|
|
}
|
|
|
|
resource := schema.ResourceGrants{}
|
|
for _, ac := range acl {
|
|
resource.Grant = append(resource.Grant, schema.ResourceGrantsGrant{
|
|
Privileges: ac.Privileges,
|
|
Principal: ac.Principal,
|
|
})
|
|
}
|
|
|
|
return &resource
|
|
}
|
|
|
|
// BundleToTerraform converts resources in a bundle configuration
|
|
// to the equivalent Terraform JSON representation.
|
|
//
|
|
// NOTE: THIS IS CURRENTLY A HACK. WE NEED A BETTER WAY TO
|
|
// CONVERT TO/FROM TERRAFORM COMPATIBLE FORMAT.
|
|
func BundleToTerraform(config *config.Root) *schema.Root {
|
|
tfroot := schema.NewRoot()
|
|
tfroot.Provider = schema.NewProviders()
|
|
tfroot.Resource = schema.NewResources()
|
|
noResources := true
|
|
|
|
for k, src := range config.Resources.Jobs {
|
|
noResources = false
|
|
var dst schema.ResourceJob
|
|
conv(src, &dst)
|
|
|
|
if src.JobSettings != nil {
|
|
for _, v := range src.Tasks {
|
|
var t schema.ResourceJobTask
|
|
conv(v, &t)
|
|
|
|
for _, v_ := range v.Libraries {
|
|
var l schema.ResourceJobTaskLibrary
|
|
conv(v_, &l)
|
|
t.Library = append(t.Library, l)
|
|
}
|
|
|
|
dst.Task = append(dst.Task, t)
|
|
}
|
|
|
|
for _, v := range src.JobClusters {
|
|
var t schema.ResourceJobJobCluster
|
|
conv(v, &t)
|
|
dst.JobCluster = append(dst.JobCluster, t)
|
|
}
|
|
|
|
// Unblock downstream work. To be addressed more generally later.
|
|
if git := src.GitSource; git != nil {
|
|
dst.GitSource = &schema.ResourceJobGitSource{
|
|
Url: git.GitUrl,
|
|
Branch: git.GitBranch,
|
|
Commit: git.GitCommit,
|
|
Provider: string(git.GitProvider),
|
|
Tag: git.GitTag,
|
|
}
|
|
}
|
|
|
|
for _, v := range src.Parameters {
|
|
var t schema.ResourceJobParameter
|
|
conv(v, &t)
|
|
dst.Parameter = append(dst.Parameter, t)
|
|
}
|
|
}
|
|
|
|
tfroot.Resource.Job[k] = &dst
|
|
|
|
// Configure permissions for this resource.
|
|
if rp := convPermissions(src.Permissions); rp != nil {
|
|
rp.JobId = fmt.Sprintf("${databricks_job.%s.id}", k)
|
|
tfroot.Resource.Permissions["job_"+k] = rp
|
|
}
|
|
}
|
|
|
|
for k, src := range config.Resources.Pipelines {
|
|
noResources = false
|
|
var dst schema.ResourcePipeline
|
|
conv(src, &dst)
|
|
|
|
if src.PipelineSpec != nil {
|
|
for _, v := range src.Libraries {
|
|
var l schema.ResourcePipelineLibrary
|
|
conv(v, &l)
|
|
dst.Library = append(dst.Library, l)
|
|
}
|
|
|
|
for _, v := range src.Clusters {
|
|
var l schema.ResourcePipelineCluster
|
|
conv(v, &l)
|
|
dst.Cluster = append(dst.Cluster, l)
|
|
}
|
|
|
|
for _, v := range src.Notifications {
|
|
var l schema.ResourcePipelineNotification
|
|
conv(v, &l)
|
|
dst.Notification = append(dst.Notification, l)
|
|
}
|
|
}
|
|
|
|
tfroot.Resource.Pipeline[k] = &dst
|
|
|
|
// Configure permissions for this resource.
|
|
if rp := convPermissions(src.Permissions); rp != nil {
|
|
rp.PipelineId = fmt.Sprintf("${databricks_pipeline.%s.id}", k)
|
|
tfroot.Resource.Permissions["pipeline_"+k] = rp
|
|
}
|
|
}
|
|
|
|
for k, src := range config.Resources.Models {
|
|
noResources = false
|
|
var dst schema.ResourceMlflowModel
|
|
conv(src, &dst)
|
|
tfroot.Resource.MlflowModel[k] = &dst
|
|
|
|
// Configure permissions for this resource.
|
|
if rp := convPermissions(src.Permissions); rp != nil {
|
|
rp.RegisteredModelId = fmt.Sprintf("${databricks_mlflow_model.%s.registered_model_id}", k)
|
|
tfroot.Resource.Permissions["mlflow_model_"+k] = rp
|
|
}
|
|
}
|
|
|
|
for k, src := range config.Resources.Experiments {
|
|
noResources = false
|
|
var dst schema.ResourceMlflowExperiment
|
|
conv(src, &dst)
|
|
tfroot.Resource.MlflowExperiment[k] = &dst
|
|
|
|
// Configure permissions for this resource.
|
|
if rp := convPermissions(src.Permissions); rp != nil {
|
|
rp.ExperimentId = fmt.Sprintf("${databricks_mlflow_experiment.%s.id}", k)
|
|
tfroot.Resource.Permissions["mlflow_experiment_"+k] = rp
|
|
}
|
|
}
|
|
|
|
for k, src := range config.Resources.ModelServingEndpoints {
|
|
noResources = false
|
|
var dst schema.ResourceModelServing
|
|
conv(src, &dst)
|
|
tfroot.Resource.ModelServing[k] = &dst
|
|
|
|
// Configure permissions for this resource.
|
|
if rp := convPermissions(src.Permissions); rp != nil {
|
|
rp.ServingEndpointId = fmt.Sprintf("${databricks_model_serving.%s.serving_endpoint_id}", k)
|
|
tfroot.Resource.Permissions["model_serving_"+k] = rp
|
|
}
|
|
}
|
|
|
|
for k, src := range config.Resources.RegisteredModels {
|
|
noResources = false
|
|
var dst schema.ResourceRegisteredModel
|
|
conv(src, &dst)
|
|
tfroot.Resource.RegisteredModel[k] = &dst
|
|
|
|
// Configure permissions for this resource.
|
|
if rp := convGrants(src.Grants); rp != nil {
|
|
rp.Function = fmt.Sprintf("${databricks_registered_model.%s.id}", k)
|
|
tfroot.Resource.Grants["registered_model_"+k] = rp
|
|
}
|
|
}
|
|
|
|
// We explicitly set "resource" to nil to omit it from a JSON encoding.
|
|
// This is required because the terraform CLI requires >= 1 resources defined
|
|
// if the "resource" property is used in a .tf.json file.
|
|
if noResources {
|
|
tfroot.Resource = nil
|
|
}
|
|
return tfroot
|
|
}
|
|
|
|
func TerraformToBundle(state *tfjson.State, config *config.Root) error {
|
|
if state.Values != nil && state.Values.RootModule != nil {
|
|
for _, resource := range state.Values.RootModule.Resources {
|
|
// Limit to resources.
|
|
if resource.Mode != tfjson.ManagedResourceMode {
|
|
continue
|
|
}
|
|
|
|
switch resource.Type {
|
|
case "databricks_job":
|
|
var tmp schema.ResourceJob
|
|
conv(resource.AttributeValues, &tmp)
|
|
if config.Resources.Jobs == nil {
|
|
config.Resources.Jobs = make(map[string]*resources.Job)
|
|
}
|
|
cur := config.Resources.Jobs[resource.Name]
|
|
// TODO: make sure we can unmarshall tf state properly and don't swallow errors
|
|
modifiedStatus := convRemoteToLocal(tmp, &cur)
|
|
cur.ModifiedStatus = modifiedStatus
|
|
config.Resources.Jobs[resource.Name] = cur
|
|
case "databricks_pipeline":
|
|
var tmp schema.ResourcePipeline
|
|
conv(resource.AttributeValues, &tmp)
|
|
if config.Resources.Pipelines == nil {
|
|
config.Resources.Pipelines = make(map[string]*resources.Pipeline)
|
|
}
|
|
cur := config.Resources.Pipelines[resource.Name]
|
|
modifiedStatus := convRemoteToLocal(tmp, &cur)
|
|
cur.ModifiedStatus = modifiedStatus
|
|
config.Resources.Pipelines[resource.Name] = cur
|
|
case "databricks_mlflow_model":
|
|
var tmp schema.ResourceMlflowModel
|
|
conv(resource.AttributeValues, &tmp)
|
|
if config.Resources.Models == nil {
|
|
config.Resources.Models = make(map[string]*resources.MlflowModel)
|
|
}
|
|
cur := config.Resources.Models[resource.Name]
|
|
modifiedStatus := convRemoteToLocal(tmp, &cur)
|
|
cur.ModifiedStatus = modifiedStatus
|
|
config.Resources.Models[resource.Name] = cur
|
|
case "databricks_mlflow_experiment":
|
|
var tmp schema.ResourceMlflowExperiment
|
|
conv(resource.AttributeValues, &tmp)
|
|
if config.Resources.Experiments == nil {
|
|
config.Resources.Experiments = make(map[string]*resources.MlflowExperiment)
|
|
}
|
|
cur := config.Resources.Experiments[resource.Name]
|
|
modifiedStatus := convRemoteToLocal(tmp, &cur)
|
|
cur.ModifiedStatus = modifiedStatus
|
|
config.Resources.Experiments[resource.Name] = cur
|
|
case "databricks_model_serving":
|
|
var tmp schema.ResourceModelServing
|
|
conv(resource.AttributeValues, &tmp)
|
|
if config.Resources.ModelServingEndpoints == nil {
|
|
config.Resources.ModelServingEndpoints = make(map[string]*resources.ModelServingEndpoint)
|
|
}
|
|
cur := config.Resources.ModelServingEndpoints[resource.Name]
|
|
modifiedStatus := convRemoteToLocal(tmp, &cur)
|
|
cur.ModifiedStatus = modifiedStatus
|
|
config.Resources.ModelServingEndpoints[resource.Name] = cur
|
|
case "databricks_registered_model":
|
|
var tmp schema.ResourceRegisteredModel
|
|
conv(resource.AttributeValues, &tmp)
|
|
if config.Resources.RegisteredModels == nil {
|
|
config.Resources.RegisteredModels = make(map[string]*resources.RegisteredModel)
|
|
}
|
|
cur := config.Resources.RegisteredModels[resource.Name]
|
|
modifiedStatus := convRemoteToLocal(tmp, &cur)
|
|
cur.ModifiedStatus = modifiedStatus
|
|
config.Resources.RegisteredModels[resource.Name] = cur
|
|
case "databricks_permissions":
|
|
case "databricks_grants":
|
|
// Ignore; no need to pull these back into the configuration.
|
|
default:
|
|
return fmt.Errorf("missing mapping for %s", resource.Type)
|
|
}
|
|
}
|
|
}
|
|
|
|
for _, src := range config.Resources.Jobs {
|
|
if src.ModifiedStatus == "" && src.ID == "" {
|
|
src.ModifiedStatus = resources.ModifiedStatusCreated
|
|
}
|
|
}
|
|
for _, src := range config.Resources.Pipelines {
|
|
if src.ModifiedStatus == "" && src.ID == "" {
|
|
src.ModifiedStatus = resources.ModifiedStatusCreated
|
|
}
|
|
}
|
|
for _, src := range config.Resources.Models {
|
|
if src.ModifiedStatus == "" && src.ID == "" {
|
|
src.ModifiedStatus = resources.ModifiedStatusCreated
|
|
}
|
|
}
|
|
for _, src := range config.Resources.Experiments {
|
|
if src.ModifiedStatus == "" && src.ID == "" {
|
|
src.ModifiedStatus = resources.ModifiedStatusCreated
|
|
}
|
|
}
|
|
for _, src := range config.Resources.ModelServingEndpoints {
|
|
if src.ModifiedStatus == "" && src.ID == "" {
|
|
src.ModifiedStatus = resources.ModifiedStatusCreated
|
|
}
|
|
}
|
|
for _, src := range config.Resources.RegisteredModels {
|
|
if src.ModifiedStatus == "" && src.ID == "" {
|
|
src.ModifiedStatus = resources.ModifiedStatusCreated
|
|
}
|
|
}
|
|
|
|
return nil
|
|
}
|