mirror of https://github.com/databricks/cli.git
196 lines
6.6 KiB
Go
196 lines
6.6 KiB
Go
package mutator
|
|
|
|
import (
|
|
"context"
|
|
"strings"
|
|
|
|
"github.com/databricks/cli/bundle"
|
|
"github.com/databricks/cli/bundle/config"
|
|
"github.com/databricks/cli/libs/dbr"
|
|
"github.com/databricks/cli/libs/diag"
|
|
"github.com/databricks/cli/libs/dyn"
|
|
"github.com/databricks/cli/libs/iamutil"
|
|
"github.com/databricks/cli/libs/log"
|
|
)
|
|
|
|
type processTargetMode struct{}
|
|
|
|
const developmentConcurrentRuns = 4
|
|
|
|
func ProcessTargetMode() bundle.Mutator {
|
|
return &processTargetMode{}
|
|
}
|
|
|
|
func (m *processTargetMode) Name() string {
|
|
return "ProcessTargetMode"
|
|
}
|
|
|
|
// Mark all resources as being for 'development' purposes, i.e.
|
|
// changing their their name, adding tags, and (in the future)
|
|
// marking them as 'hidden' in the UI.
|
|
func transformDevelopmentMode(ctx context.Context, b *bundle.Bundle) {
|
|
if !b.Config.Bundle.Deployment.Lock.IsExplicitlyEnabled() {
|
|
log.Infof(ctx, "Development mode: disabling deployment lock since bundle.deployment.lock.enabled is not set to true")
|
|
disabled := false
|
|
b.Config.Bundle.Deployment.Lock.Enabled = &disabled
|
|
}
|
|
|
|
t := &b.Config.Presets
|
|
shortName := b.Config.Workspace.CurrentUser.ShortName
|
|
|
|
if t.NamePrefix == "" {
|
|
t.NamePrefix = "[dev " + shortName + "] "
|
|
}
|
|
|
|
if t.Tags == nil {
|
|
t.Tags = map[string]string{}
|
|
}
|
|
_, exists := t.Tags["dev"]
|
|
if !exists {
|
|
t.Tags["dev"] = b.Tagging.NormalizeValue(shortName)
|
|
}
|
|
|
|
if t.JobsMaxConcurrentRuns == 0 {
|
|
t.JobsMaxConcurrentRuns = developmentConcurrentRuns
|
|
}
|
|
|
|
if t.TriggerPauseStatus == "" {
|
|
t.TriggerPauseStatus = config.Paused
|
|
}
|
|
|
|
if !config.IsExplicitlyDisabled(t.SourceLinkedDeployment) {
|
|
isInWorkspace := strings.HasPrefix(b.SyncRootPath, "/Workspace/")
|
|
if isInWorkspace && dbr.RunsOnRuntime(ctx) {
|
|
enabled := true
|
|
t.SourceLinkedDeployment = &enabled
|
|
}
|
|
}
|
|
|
|
if !config.IsExplicitlyDisabled(t.PipelinesDevelopment) {
|
|
enabled := true
|
|
t.PipelinesDevelopment = &enabled
|
|
}
|
|
}
|
|
|
|
func validateDevelopmentMode(b *bundle.Bundle) diag.Diagnostics {
|
|
var diags diag.Diagnostics
|
|
p := b.Config.Presets
|
|
u := b.Config.Workspace.CurrentUser
|
|
|
|
// Make sure presets don't set the trigger status to UNPAUSED;
|
|
// this could be surprising since most users (and tools) expect triggers
|
|
// to be paused in development.
|
|
// (Note that there still is an exceptional case where users set the trigger
|
|
// status to UNPAUSED at the level of an individual object, whic hwas
|
|
// historically allowed.)
|
|
if p.TriggerPauseStatus == config.Unpaused {
|
|
diags = diags.Append(diag.Diagnostic{
|
|
Severity: diag.Error,
|
|
Summary: "target with 'mode: development' cannot set trigger pause status to UNPAUSED by default",
|
|
Locations: []dyn.Location{b.Config.GetLocation("presets.trigger_pause_status")},
|
|
})
|
|
}
|
|
|
|
// Make sure this development copy has unique names and paths to avoid conflicts
|
|
if path := findNonUserPath(b); path != "" {
|
|
if path == "artifact_path" && strings.HasPrefix(b.Config.Workspace.ArtifactPath, "/Volumes") {
|
|
// For Volumes paths we recommend including the current username as a substring
|
|
diags = diags.Extend(diag.Errorf("%s should contain the current username or ${workspace.current_user.short_name} to ensure uniqueness when using 'mode: development'", path))
|
|
} else {
|
|
// For non-Volumes paths recommend simply putting things in the home folder
|
|
diags = diags.Extend(diag.Errorf("%s must start with '~/' or contain the current username to ensure uniqueness when using 'mode: development'", path))
|
|
}
|
|
}
|
|
if p.NamePrefix != "" && !strings.Contains(p.NamePrefix, u.ShortName) && !strings.Contains(p.NamePrefix, u.UserName) {
|
|
// Resources such as pipelines require a unique name, e.g. '[dev steve] my_pipeline'.
|
|
// For this reason we require the name prefix to contain the current username;
|
|
// it's a pitfall for users if they don't include it and later find out that
|
|
// only a single user can do development deployments.
|
|
diags = diags.Append(diag.Diagnostic{
|
|
Severity: diag.Error,
|
|
Summary: "prefix should contain the current username or ${workspace.current_user.short_name} to ensure uniqueness when using 'mode: development'",
|
|
Locations: []dyn.Location{b.Config.GetLocation("presets.name_prefix")},
|
|
})
|
|
}
|
|
return diags
|
|
}
|
|
|
|
// findNonUserPath finds the first workspace path such as root_path that doesn't
|
|
// contain the current username or current user's shortname.
|
|
func findNonUserPath(b *bundle.Bundle) string {
|
|
containsName := func(path string) bool {
|
|
username := b.Config.Workspace.CurrentUser.UserName
|
|
shortname := b.Config.Workspace.CurrentUser.ShortName
|
|
return strings.Contains(path, username) || strings.Contains(path, shortname)
|
|
}
|
|
|
|
if b.Config.Workspace.RootPath != "" && !containsName(b.Config.Workspace.RootPath) {
|
|
return "root_path"
|
|
}
|
|
if b.Config.Workspace.FilePath != "" && !containsName(b.Config.Workspace.FilePath) {
|
|
return "file_path"
|
|
}
|
|
if b.Config.Workspace.ResourcePath != "" && !containsName(b.Config.Workspace.ResourcePath) {
|
|
return "resource_path"
|
|
}
|
|
if b.Config.Workspace.ArtifactPath != "" && !containsName(b.Config.Workspace.ArtifactPath) {
|
|
return "artifact_path"
|
|
}
|
|
if b.Config.Workspace.StatePath != "" && !containsName(b.Config.Workspace.StatePath) {
|
|
return "state_path"
|
|
}
|
|
return ""
|
|
}
|
|
|
|
func validateProductionMode(ctx context.Context, b *bundle.Bundle, isPrincipalUsed bool) diag.Diagnostics {
|
|
if b.Config.Bundle.Git.Inferred {
|
|
env := b.Config.Bundle.Target
|
|
log.Warnf(ctx, "target with 'mode: production' should specify an explicit 'targets.%s.git' configuration", env)
|
|
}
|
|
|
|
r := b.Config.Resources
|
|
for i := range r.Pipelines {
|
|
if r.Pipelines[i].Development {
|
|
return diag.Errorf("target with 'mode: production' cannot include a pipeline with 'development: true'")
|
|
}
|
|
}
|
|
|
|
if !isPrincipalUsed && !isRunAsSet(r) {
|
|
return diag.Errorf("'run_as' must be set for all jobs when using 'mode: production'")
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// Determines whether run_as is explicitly set for all resources.
|
|
// We do this in a best-effort fashion rather than check the top-level
|
|
// 'run_as' field because the latter is not required to be set.
|
|
func isRunAsSet(r config.Resources) bool {
|
|
for i := range r.Jobs {
|
|
if r.Jobs[i].RunAs == nil {
|
|
return false
|
|
}
|
|
}
|
|
return true
|
|
}
|
|
|
|
func (m *processTargetMode) Apply(ctx context.Context, b *bundle.Bundle) diag.Diagnostics {
|
|
switch b.Config.Bundle.Mode {
|
|
case config.Development:
|
|
diags := validateDevelopmentMode(b)
|
|
if diags.HasError() {
|
|
return diags
|
|
}
|
|
transformDevelopmentMode(ctx, b)
|
|
return diags
|
|
case config.Production:
|
|
isPrincipal := iamutil.IsServicePrincipal(b.Config.Workspace.CurrentUser.User)
|
|
return validateProductionMode(ctx, b, isPrincipal)
|
|
case "":
|
|
// No action
|
|
default:
|
|
return diag.Errorf("unsupported value '%s' specified for 'mode': must be either 'development' or 'production'", b.Config.Bundle.Mode)
|
|
}
|
|
|
|
return nil
|
|
}
|