introduce --verbosity flag rather than mixed logging settings; correct color misnaming to ANSI convention; added sanity-check; simplified hello-world; created FZF_USER_INPUT to replace the confusing FZF_HEAD and FZF_TAIL swap INFO for DEBUG v3-to-v4 upgrade docs bring some much-needed tender love and care to the scwrypts runner improved i/o handling on the run executable means this is no longer relevant FINALLY fix the weird cases for zsh/read builtin (particularly around reading one character from tty/pipe/file); also gave a --force-user-input flag in case you want to require user input on a yn prompt update ZLE plugin so it no more make errors FZF_(HEAD|TAIL) refactor to FZF_USER_INPUT plugins/kubectl migration from v3 to v4 plugins/ci migration from v3 to v4 refactor py/lib into python-scwrypts subproject verbosity is stupid lets call it log-level fix bug with virtualenv loading mergedeep to slow so I made my options dict shallow hokay first iteration of python-dudes is ready circleci configuration for python builds npm package for scwrypts 3.9.1 initial build/test steps for nodejs go go ok ok fix output ok ok finalize publish steps
136 lines
3.1 KiB
Bash
136 lines
3.1 KiB
Bash
#####################################################################
|
|
|
|
DEPENDENCIES+=(
|
|
docker
|
|
)
|
|
|
|
REQUIRED_ENV+=(
|
|
AWS_ACCOUNT
|
|
AWS_REGION
|
|
)
|
|
|
|
use cloud/aws/cli
|
|
|
|
#####################################################################
|
|
|
|
RDS__SELECT_DATABASE() {
|
|
local DATABASES=$(_RDS__GET_AVAILABLE_DATABASES)
|
|
[ ! $DATABASES ] && FAIL 1 'no databases available'
|
|
|
|
local ID=$(\
|
|
echo $DATABASES | jq -r '.instance + " @ " + .cluster' \
|
|
| FZF 'select a database (instance@cluster)' \
|
|
)
|
|
[ ! $ID ] && ABORT
|
|
|
|
local INSTANCE=$(echo $ID | sed 's/ @ .*$//')
|
|
local CLUSTER=$(echo $ID | sed 's/^.* @ //')
|
|
|
|
echo $DATABASES | jq "select (.instance == \"$INSTANCE\" and .cluster == \"$CLUSTER\")"
|
|
}
|
|
|
|
_RDS__GET_AVAILABLE_DATABASES() {
|
|
AWS rds describe-db-instances \
|
|
| jq -r '.[] | .[] | {
|
|
instance: .DBInstanceIdentifier,
|
|
cluster: .DBClusterIdentifier,
|
|
type: .Engine,
|
|
host: .Endpoint.Address,
|
|
port: .Endpoint.Port,
|
|
user: .MasterUsername,
|
|
database: .DBName
|
|
}'
|
|
}
|
|
|
|
RDS__GET_DATABASE_CREDENTIALS() {
|
|
local PRINT_PASSWORD=0
|
|
local ERRORS=0
|
|
|
|
while [[ $# -gt 0 ]]
|
|
do
|
|
case $1 in
|
|
--print-password ) PRINT_PASSWORD=1 ;;
|
|
* )
|
|
WARNING "unrecognized argument $1"
|
|
ERRORS+=1
|
|
;;
|
|
esac
|
|
shift 1
|
|
done
|
|
|
|
CHECK_ERRORS
|
|
|
|
##########################################
|
|
|
|
local DATABASE=$(RDS__SELECT_DATABASE)
|
|
[ ! $DATABASE ] && ABORT
|
|
|
|
DB_HOST="$(echo $DATABASE | jq -r '.host')"
|
|
[ ! $DB_HOST ] && { ERROR 'unable to find host'; return 2; }
|
|
|
|
DB_PORT="$(echo $DATABASE | jq -r '.port')"
|
|
[ ! $DB_PORT ] && DB_PORT=5432
|
|
[[ $DB_PORT =~ ^null$ ]] && DB_PORT=5432
|
|
|
|
##########################################
|
|
|
|
local AUTH_METHOD=$(\
|
|
echo "iam\nsecretsmanager\nuser-input" \
|
|
| FZF 'select an authentication method' \
|
|
)
|
|
[ ! $AUTH_METHOD ] && ABORT
|
|
|
|
case $AUTH_METHOD in
|
|
iam ) _RDS_AUTH__iam ;;
|
|
secretsmanager ) _RDS_AUTH__secretsmanager ;;
|
|
user-input ) _RDS_AUTH__userinput ;;
|
|
esac
|
|
|
|
[[ $PRINT_PASSWORD -eq 1 ]] && DEBUG "password : $DB_PASS"
|
|
|
|
return 0
|
|
}
|
|
|
|
_RDS_AUTH__iam() {
|
|
DB_PASS=$(\
|
|
AWS rds generate-db-auth-token \
|
|
--hostname $DB_HOST \
|
|
--port $DB_PORT \
|
|
--username $DB_USER \
|
|
)
|
|
}
|
|
|
|
_RDS_AUTH__secretsmanager() {
|
|
local CREDENTIALS=$(_RDS__GET_SECRETSMANAGER_CREDENTIALS)
|
|
echo $CREDENTIALS | jq -e '.pass' >/dev/null 2>&1 \
|
|
&& DB_PASS="$(echo $CREDENTIALS | jq -r '.pass')"
|
|
|
|
echo $CREDENTIALS | jq -e '.password' >/dev/null 2>&1 \
|
|
&& DB_PASS="$(echo $CREDENTIALS | jq -r '.password')"
|
|
|
|
echo $CREDENTIALS | jq -e '.user' >/dev/null 2>&1 \
|
|
&& DB_USER=$(echo $CREDENTIALS | jq -r '.user')
|
|
|
|
echo $CREDENTIALS | jq -e '.username' >/dev/null 2>&1 \
|
|
&& DB_USER=$(echo $CREDENTIALS | jq -r '.username')
|
|
|
|
echo $CREDENTIALS | jq -e '.name' >/dev/null 2>&1 \
|
|
&& DB_NAME=$(echo $CREDENTIALS | jq -r '.name')
|
|
|
|
echo $CREDENTIALS | jq -e '.dbname' >/dev/null 2>&1 \
|
|
&& DB_NAME=$(echo $CREDENTIALS | jq -r '.dbname')
|
|
}
|
|
|
|
_RDS__GET_SECRETSMANAGER_CREDENTIALS() {
|
|
local ID=$(\
|
|
AWS secretsmanager list-secrets \
|
|
| jq -r '.[] | .[] | .Name' \
|
|
| FZF 'select a secret' \
|
|
)
|
|
[ ! $ID ] && return 1
|
|
|
|
AWS secretsmanager get-secret-value --secret-id "$ID" \
|
|
| jq -r '.SecretString' | jq
|
|
}
|
|
|