=====================================================================
Big day! V4 is finally live. This INCLUDES some BREAKING CHANGES to ZSH
TYPE scwrypts! Please refer to the readme for upgrade details
                     (more specifically docs/upgrade/v3-to-v4.md)
Upgrade is SUPER EASY, so please take the time to do so.
--- New Features ----------------------------------------------------
- zsh type scwrypts have an upgraded runstring to improve context setup
  and simplicity to the scwrypt-writer
- scwrypts now publishes the package (scwrypts) to PyPi; this provides a
  simple way to invoke scwrypts from python-based environments as well
  as the entire scwrypts python library suite
  pip install scwrypts
- scwrypts now publishes the package (scwrypts) to npm; this provides a
  simple way to invoke scwrypts from nodesjs environments
  npm install scwrypts
--- Bug Fixes -------------------------------------------------------
- scwrypts runner prompts which use the zshbuiltin "read" now
  appropriately read input from tty, pipe, files, and user input
- virtualenv refresh now loads and prepares the scwrypts virtual
  environments correctly
--- Changes ---------------------------------------------------------
- created the (-v, --log-level) scwrypts arguments as improvements of
  and replacements to the --verbose and --no-log flags
     - (-n) is now an alias for (--log-level 0)
     - (--no-log) is the same as (-n) for compatibility, but will be removed in 4.2
- zsh/lib/utils/io print functions now *interact with log-level* various
  log levels will now only display the appropriate console prints for
  the specified log level
- zsh/lib/utils/io:INFO has been renamed to DEBUG to align with
  log-level output; please use DEBUG for debug messages and REMINDER for
  important user messages
- created zsh/lib/utils/io:FZF_USER_INPUT as a *drop-in replacement* for
  the confusing FZF_HEAD and FZF_TAIL commands. Update by literally
  changing any instances of FZF_HEAD or FZF_TAIL with FZF_USER_INPUT
     - FZF_HEAD and FZF_TAIL will be removed in 4.2
- zsh/lib/utils/io:READ (and other zshbuiltin/read-based prompts) now
  accept a --force-user-input flag in case important checks should
  require an admin's approval. This flag will ensure that piped input
  and the `scwrypts -y` flag are ignored for the single prompt.
- zsh/lib/utils/color has been updated to use color names which match
  the ANSI color names
- zsh/hello-world has been reduced to a minimal example; this is to
  emphasize ease-of-use with v4
- zsh/sanity-check is a scwrypts/run testing helper and detailed
  starting reference (helpful since hello-world is now minimal)
- various refactor, updates, and improvements to the scwrypts runner
- migrated all zsh scwrypts and plugins to use v4 runner syntax
     - zsh
     - plugins/kubectl
     - plugins/ci
- refactored py/lib into py/lib/scwrypts (PyPi)
		
	
		
			
				
	
	
		
			136 lines
		
	
	
		
			3.1 KiB
		
	
	
	
		
			Bash
		
	
	
	
	
	
			
		
		
	
	
			136 lines
		
	
	
		
			3.1 KiB
		
	
	
	
		
			Bash
		
	
	
	
	
	
| #####################################################################
 | |
| 
 | |
| DEPENDENCIES+=(
 | |
| 	docker
 | |
| )
 | |
| 
 | |
| REQUIRED_ENV+=(
 | |
| 	AWS_ACCOUNT
 | |
| 	AWS_REGION
 | |
| )
 | |
| 
 | |
| use cloud/aws/cli
 | |
| 
 | |
| #####################################################################
 | |
| 
 | |
| RDS__SELECT_DATABASE() {
 | |
| 	local DATABASES=$(_RDS__GET_AVAILABLE_DATABASES)
 | |
| 	[ ! $DATABASES ] && FAIL 1 'no databases available'
 | |
| 
 | |
| 	local ID=$(\
 | |
| 		echo $DATABASES | jq -r '.instance + " @ " + .cluster' \
 | |
| 			| FZF 'select a database (instance@cluster)' \
 | |
| 	)
 | |
| 	[ ! $ID ] && ABORT
 | |
| 
 | |
| 	local INSTANCE=$(echo $ID | sed 's/ @ .*$//')
 | |
| 	local CLUSTER=$(echo $ID  | sed 's/^.* @ //')
 | |
| 
 | |
| 	echo $DATABASES | jq "select (.instance == \"$INSTANCE\" and .cluster == \"$CLUSTER\")"
 | |
| }
 | |
| 
 | |
| _RDS__GET_AVAILABLE_DATABASES() {
 | |
| 	AWS rds describe-db-instances \
 | |
| 		| jq -r '.[] | .[] | {
 | |
| 			instance: .DBInstanceIdentifier,
 | |
| 			cluster:  .DBClusterIdentifier,
 | |
| 			type:     .Engine,
 | |
| 			host:     .Endpoint.Address,
 | |
| 			port:     .Endpoint.Port,
 | |
| 			user:     .MasterUsername,
 | |
| 			database: .DBName
 | |
| 		}'
 | |
| }
 | |
| 
 | |
| RDS__GET_DATABASE_CREDENTIALS() {
 | |
| 	local PRINT_PASSWORD=0
 | |
| 	local ERRORS=0
 | |
| 
 | |
| 	while [[ $# -gt 0 ]]
 | |
| 	do
 | |
| 		case $1 in
 | |
| 			--print-password ) PRINT_PASSWORD=1 ;;
 | |
| 			* )
 | |
| 				WARNING "unrecognized argument $1"
 | |
| 				ERRORS+=1
 | |
| 				;;
 | |
| 		esac
 | |
| 		shift 1
 | |
| 	done
 | |
| 
 | |
| 	CHECK_ERRORS
 | |
| 
 | |
| 	##########################################
 | |
| 
 | |
| 	local DATABASE=$(RDS__SELECT_DATABASE)
 | |
| 	[ ! $DATABASE ] && ABORT
 | |
| 
 | |
| 	DB_HOST="$(echo $DATABASE | jq -r '.host')"
 | |
| 	[ ! $DB_HOST ] && { ERROR 'unable to find host'; return 2; }
 | |
| 
 | |
| 	DB_PORT="$(echo $DATABASE | jq -r '.port')"
 | |
| 	[ ! $DB_PORT ] && DB_PORT=5432
 | |
| 	[[ $DB_PORT =~ ^null$ ]] && DB_PORT=5432
 | |
| 
 | |
| 	##########################################
 | |
| 
 | |
| 	local AUTH_METHOD=$(\
 | |
| 		echo "iam\nsecretsmanager\nuser-input" \
 | |
| 			| FZF 'select an authentication method' \
 | |
| 	)
 | |
| 	[ ! $AUTH_METHOD ] && ABORT
 | |
| 
 | |
| 	case $AUTH_METHOD in
 | |
| 		iam            ) _RDS_AUTH__iam ;;
 | |
| 		secretsmanager ) _RDS_AUTH__secretsmanager ;;
 | |
| 		user-input     ) _RDS_AUTH__userinput ;;
 | |
| 	esac
 | |
| 
 | |
| 	[[ $PRINT_PASSWORD -eq 1 ]] && DEBUG "password : $DB_PASS"
 | |
| 
 | |
| 	return 0
 | |
| }
 | |
| 
 | |
| _RDS_AUTH__iam() {
 | |
| 	DB_PASS=$(\
 | |
| 		AWS rds generate-db-auth-token \
 | |
| 		--hostname $DB_HOST \
 | |
| 		--port $DB_PORT \
 | |
| 		--username $DB_USER \
 | |
| 	)
 | |
| }
 | |
| 
 | |
| _RDS_AUTH__secretsmanager() {
 | |
| 	local CREDENTIALS=$(_RDS__GET_SECRETSMANAGER_CREDENTIALS)
 | |
| 	echo $CREDENTIALS | jq -e '.pass' >/dev/null 2>&1 \
 | |
| 		&& DB_PASS="$(echo $CREDENTIALS | jq -r '.pass')"
 | |
| 	
 | |
| 	echo $CREDENTIALS | jq -e '.password' >/dev/null 2>&1 \
 | |
| 		&& DB_PASS="$(echo $CREDENTIALS | jq -r '.password')"
 | |
| 	
 | |
| 	echo $CREDENTIALS | jq -e '.user' >/dev/null 2>&1 \
 | |
| 		&& DB_USER=$(echo $CREDENTIALS | jq -r '.user')
 | |
| 	
 | |
| 	echo $CREDENTIALS | jq -e '.username' >/dev/null 2>&1 \
 | |
| 		&& DB_USER=$(echo $CREDENTIALS | jq -r '.username')
 | |
| 	
 | |
| 	echo $CREDENTIALS | jq -e '.name' >/dev/null 2>&1 \
 | |
| 		&& DB_NAME=$(echo $CREDENTIALS | jq -r '.name')
 | |
| 	
 | |
| 	echo $CREDENTIALS | jq -e '.dbname' >/dev/null 2>&1 \
 | |
| 		&& DB_NAME=$(echo $CREDENTIALS | jq -r '.dbname')
 | |
| }
 | |
| 
 | |
| _RDS__GET_SECRETSMANAGER_CREDENTIALS() {
 | |
| 	local ID=$(\
 | |
| 		AWS secretsmanager list-secrets \
 | |
| 			| jq -r '.[] | .[] | .Name' \
 | |
| 			| FZF 'select a secret' \
 | |
| 	)
 | |
| 	[ ! $ID ] && return 1
 | |
| 
 | |
| 	AWS secretsmanager get-secret-value --secret-id "$ID" \
 | |
| 		| jq -r '.SecretString' | jq
 | |
| }
 | |
| 
 |