Compare commits
3 Commits
feature/cp
...
fix/js-for
| Author | SHA1 | Date | |
|---|---|---|---|
| d22daf1f0a | |||
| 602046b329 | |||
|
|
7920e723a6 |
@@ -9,7 +9,6 @@ A simple self-hosted PaaS that auto-deploys Docker containers from Git repositor
|
|||||||
- Per-app UUID-based webhook URLs for Gitea integration
|
- Per-app UUID-based webhook URLs for Gitea integration
|
||||||
- Branch filtering - only deploy on configured branch changes
|
- Branch filtering - only deploy on configured branch changes
|
||||||
- Environment variables, labels, and volume mounts per app
|
- Environment variables, labels, and volume mounts per app
|
||||||
- CPU and memory resource limits per app
|
|
||||||
- Docker builds via socket access
|
- Docker builds via socket access
|
||||||
- Notifications via ntfy and Slack-compatible webhooks
|
- Notifications via ntfy and Slack-compatible webhooks
|
||||||
- Simple server-rendered UI with Tailwind CSS
|
- Simple server-rendered UI with Tailwind CSS
|
||||||
|
|||||||
@@ -1,3 +0,0 @@
|
|||||||
-- Add CPU and memory resource limits per app
|
|
||||||
ALTER TABLE apps ADD COLUMN cpu_limit REAL;
|
|
||||||
ALTER TABLE apps ADD COLUMN memory_limit INTEGER;
|
|
||||||
@@ -138,15 +138,13 @@ func (c *Client) BuildImage(
|
|||||||
|
|
||||||
// CreateContainerOptions contains options for creating a container.
|
// CreateContainerOptions contains options for creating a container.
|
||||||
type CreateContainerOptions struct {
|
type CreateContainerOptions struct {
|
||||||
Name string
|
Name string
|
||||||
Image string
|
Image string
|
||||||
Env map[string]string
|
Env map[string]string
|
||||||
Labels map[string]string
|
Labels map[string]string
|
||||||
Volumes []VolumeMount
|
Volumes []VolumeMount
|
||||||
Ports []PortMapping
|
Ports []PortMapping
|
||||||
Network string
|
Network string
|
||||||
CPULimit float64 // CPU cores (e.g. 0.5 = half a core, 2.0 = two cores). 0 means unlimited.
|
|
||||||
MemoryLimit int64 // Memory in bytes. 0 means unlimited.
|
|
||||||
}
|
}
|
||||||
|
|
||||||
// VolumeMount represents a volume mount.
|
// VolumeMount represents a volume mount.
|
||||||
@@ -163,14 +161,6 @@ type PortMapping struct {
|
|||||||
Protocol string // "tcp" or "udp"
|
Protocol string // "tcp" or "udp"
|
||||||
}
|
}
|
||||||
|
|
||||||
// nanoCPUsPerCPU is the number of NanoCPUs per CPU core.
|
|
||||||
const nanoCPUsPerCPU = 1e9
|
|
||||||
|
|
||||||
// cpuLimitToNanoCPUs converts a CPU limit (e.g. 0.5 cores) to Docker NanoCPUs.
|
|
||||||
func cpuLimitToNanoCPUs(cpuLimit float64) int64 {
|
|
||||||
return int64(cpuLimit * nanoCPUsPerCPU)
|
|
||||||
}
|
|
||||||
|
|
||||||
// buildPortConfig converts port mappings to Docker port configuration.
|
// buildPortConfig converts port mappings to Docker port configuration.
|
||||||
func buildPortConfig(ports []PortMapping) (nat.PortSet, nat.PortMap) {
|
func buildPortConfig(ports []PortMapping) (nat.PortSet, nat.PortMap) {
|
||||||
exposedPorts := make(nat.PortSet)
|
exposedPorts := make(nat.PortSet)
|
||||||
@@ -195,48 +185,6 @@ func buildPortConfig(ports []PortMapping) (nat.PortSet, nat.PortMap) {
|
|||||||
return exposedPorts, portBindings
|
return exposedPorts, portBindings
|
||||||
}
|
}
|
||||||
|
|
||||||
// buildEnvSlice converts an env map to a Docker-compatible env slice.
|
|
||||||
func buildEnvSlice(env map[string]string) []string {
|
|
||||||
envSlice := make([]string, 0, len(env))
|
|
||||||
|
|
||||||
for key, val := range env {
|
|
||||||
envSlice = append(envSlice, key+"="+val)
|
|
||||||
}
|
|
||||||
|
|
||||||
return envSlice
|
|
||||||
}
|
|
||||||
|
|
||||||
// buildMounts converts volume mounts to Docker mount configuration.
|
|
||||||
func buildMounts(volumes []VolumeMount) []mount.Mount {
|
|
||||||
mounts := make([]mount.Mount, 0, len(volumes))
|
|
||||||
|
|
||||||
for _, vol := range volumes {
|
|
||||||
mounts = append(mounts, mount.Mount{
|
|
||||||
Type: mount.TypeBind,
|
|
||||||
Source: vol.HostPath,
|
|
||||||
Target: vol.ContainerPath,
|
|
||||||
ReadOnly: vol.ReadOnly,
|
|
||||||
})
|
|
||||||
}
|
|
||||||
|
|
||||||
return mounts
|
|
||||||
}
|
|
||||||
|
|
||||||
// buildResources builds Docker resource constraints from container options.
|
|
||||||
func buildResources(opts CreateContainerOptions) container.Resources {
|
|
||||||
resources := container.Resources{}
|
|
||||||
|
|
||||||
if opts.CPULimit > 0 {
|
|
||||||
resources.NanoCPUs = cpuLimitToNanoCPUs(opts.CPULimit)
|
|
||||||
}
|
|
||||||
|
|
||||||
if opts.MemoryLimit > 0 {
|
|
||||||
resources.Memory = opts.MemoryLimit
|
|
||||||
}
|
|
||||||
|
|
||||||
return resources
|
|
||||||
}
|
|
||||||
|
|
||||||
// CreateContainer creates a new container.
|
// CreateContainer creates a new container.
|
||||||
func (c *Client) CreateContainer(
|
func (c *Client) CreateContainer(
|
||||||
ctx context.Context,
|
ctx context.Context,
|
||||||
@@ -248,20 +196,40 @@ func (c *Client) CreateContainer(
|
|||||||
|
|
||||||
c.log.Info("creating container", "name", opts.Name, "image", opts.Image)
|
c.log.Info("creating container", "name", opts.Name, "image", opts.Image)
|
||||||
|
|
||||||
|
// Convert env map to slice
|
||||||
|
envSlice := make([]string, 0, len(opts.Env))
|
||||||
|
|
||||||
|
for key, val := range opts.Env {
|
||||||
|
envSlice = append(envSlice, key+"="+val)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Convert volumes to mounts
|
||||||
|
mounts := make([]mount.Mount, 0, len(opts.Volumes))
|
||||||
|
|
||||||
|
for _, vol := range opts.Volumes {
|
||||||
|
mounts = append(mounts, mount.Mount{
|
||||||
|
Type: mount.TypeBind,
|
||||||
|
Source: vol.HostPath,
|
||||||
|
Target: vol.ContainerPath,
|
||||||
|
ReadOnly: vol.ReadOnly,
|
||||||
|
})
|
||||||
|
}
|
||||||
|
|
||||||
|
// Convert ports to exposed ports and port bindings
|
||||||
exposedPorts, portBindings := buildPortConfig(opts.Ports)
|
exposedPorts, portBindings := buildPortConfig(opts.Ports)
|
||||||
|
|
||||||
|
// Create container
|
||||||
resp, err := c.docker.ContainerCreate(ctx,
|
resp, err := c.docker.ContainerCreate(ctx,
|
||||||
&container.Config{
|
&container.Config{
|
||||||
Image: opts.Image,
|
Image: opts.Image,
|
||||||
Env: buildEnvSlice(opts.Env),
|
Env: envSlice,
|
||||||
Labels: opts.Labels,
|
Labels: opts.Labels,
|
||||||
ExposedPorts: exposedPorts,
|
ExposedPorts: exposedPorts,
|
||||||
},
|
},
|
||||||
&container.HostConfig{
|
&container.HostConfig{
|
||||||
Mounts: buildMounts(opts.Volumes),
|
Mounts: mounts,
|
||||||
PortBindings: portBindings,
|
PortBindings: portBindings,
|
||||||
NetworkMode: container.NetworkMode(opts.Network),
|
NetworkMode: container.NetworkMode(opts.Network),
|
||||||
Resources: buildResources(opts),
|
|
||||||
RestartPolicy: container.RestartPolicy{
|
RestartPolicy: container.RestartPolicy{
|
||||||
Name: container.RestartPolicyUnlessStopped,
|
Name: container.RestartPolicyUnlessStopped,
|
||||||
},
|
},
|
||||||
|
|||||||
@@ -1,31 +0,0 @@
|
|||||||
package docker //nolint:testpackage // tests unexported cpuLimitToNanoCPUs
|
|
||||||
|
|
||||||
import (
|
|
||||||
"testing"
|
|
||||||
)
|
|
||||||
|
|
||||||
func TestCpuLimitToNanoCPUs(t *testing.T) {
|
|
||||||
t.Parallel()
|
|
||||||
|
|
||||||
tests := []struct {
|
|
||||||
name string
|
|
||||||
cpuLimit float64
|
|
||||||
expected int64
|
|
||||||
}{
|
|
||||||
{"one core", 1.0, 1_000_000_000},
|
|
||||||
{"half core", 0.5, 500_000_000},
|
|
||||||
{"two cores", 2.0, 2_000_000_000},
|
|
||||||
{"quarter core", 0.25, 250_000_000},
|
|
||||||
}
|
|
||||||
|
|
||||||
for _, tt := range tests {
|
|
||||||
t.Run(tt.name, func(t *testing.T) {
|
|
||||||
t.Parallel()
|
|
||||||
|
|
||||||
got := cpuLimitToNanoCPUs(tt.cpuLimit)
|
|
||||||
if got != tt.expected {
|
|
||||||
t.Errorf("cpuLimitToNanoCPUs(%v) = %d, want %d", tt.cpuLimit, got, tt.expected)
|
|
||||||
}
|
|
||||||
})
|
|
||||||
}
|
|
||||||
}
|
|
||||||
@@ -257,19 +257,23 @@ func (h *Handlers) HandleAppUpdate() http.HandlerFunc { //nolint:funlen // valid
|
|||||||
application.RepoURL = request.FormValue("repo_url")
|
application.RepoURL = request.FormValue("repo_url")
|
||||||
application.Branch = request.FormValue("branch")
|
application.Branch = request.FormValue("branch")
|
||||||
application.DockerfilePath = request.FormValue("dockerfile_path")
|
application.DockerfilePath = request.FormValue("dockerfile_path")
|
||||||
application.DockerNetwork = optionalNullString(request.FormValue("docker_network"))
|
|
||||||
application.NtfyTopic = optionalNullString(request.FormValue("ntfy_topic"))
|
|
||||||
application.SlackWebhook = optionalNullString(request.FormValue("slack_webhook"))
|
|
||||||
|
|
||||||
limitsErr := applyResourceLimits(application, request)
|
if network := request.FormValue("docker_network"); network != "" {
|
||||||
if limitsErr != "" {
|
application.DockerNetwork = sql.NullString{String: network, Valid: true}
|
||||||
data := h.addGlobals(map[string]any{
|
} else {
|
||||||
"App": application,
|
application.DockerNetwork = sql.NullString{}
|
||||||
"Error": limitsErr,
|
}
|
||||||
}, request)
|
|
||||||
h.renderTemplate(writer, tmpl, "app_edit.html", data)
|
|
||||||
|
|
||||||
return
|
if ntfy := request.FormValue("ntfy_topic"); ntfy != "" {
|
||||||
|
application.NtfyTopic = sql.NullString{String: ntfy, Valid: true}
|
||||||
|
} else {
|
||||||
|
application.NtfyTopic = sql.NullString{}
|
||||||
|
}
|
||||||
|
|
||||||
|
if slack := request.FormValue("slack_webhook"); slack != "" {
|
||||||
|
application.SlackWebhook = sql.NullString{String: slack, Valid: true}
|
||||||
|
} else {
|
||||||
|
application.SlackWebhook = sql.NullString{}
|
||||||
}
|
}
|
||||||
|
|
||||||
saveErr := application.Save(request.Context())
|
saveErr := application.Save(request.Context())
|
||||||
@@ -899,92 +903,50 @@ func (h *Handlers) addKeyValueToApp(
|
|||||||
http.Redirect(writer, request, "/apps/"+application.ID, http.StatusSeeOther)
|
http.Redirect(writer, request, "/apps/"+application.ID, http.StatusSeeOther)
|
||||||
}
|
}
|
||||||
|
|
||||||
// envPairJSON represents a key-value pair in the JSON request body.
|
// HandleEnvVarAdd handles adding an environment variable.
|
||||||
type envPairJSON struct {
|
func (h *Handlers) HandleEnvVarAdd() http.HandlerFunc {
|
||||||
Key string `json:"key"`
|
return func(writer http.ResponseWriter, request *http.Request) {
|
||||||
Value string `json:"value"`
|
h.addKeyValueToApp(
|
||||||
}
|
writer,
|
||||||
|
request,
|
||||||
|
func(ctx context.Context, application *models.App, key, value string) error {
|
||||||
|
envVar := models.NewEnvVar(h.db)
|
||||||
|
envVar.AppID = application.ID
|
||||||
|
envVar.Key = key
|
||||||
|
envVar.Value = value
|
||||||
|
|
||||||
// envVarMaxBodyBytes is the maximum allowed request body size for env var saves (1 MB).
|
return envVar.Save(ctx)
|
||||||
const envVarMaxBodyBytes = 1 << 20
|
},
|
||||||
|
)
|
||||||
// validateEnvPairs validates env var pairs.
|
|
||||||
// It rejects empty keys and duplicate keys (returns a non-empty error string).
|
|
||||||
func validateEnvPairs(pairs []envPairJSON) ([]models.EnvVarPair, string) {
|
|
||||||
seen := make(map[string]bool, len(pairs))
|
|
||||||
|
|
||||||
result := make([]models.EnvVarPair, 0, len(pairs))
|
|
||||||
|
|
||||||
for _, p := range pairs {
|
|
||||||
trimmedKey := strings.TrimSpace(p.Key)
|
|
||||||
if trimmedKey == "" {
|
|
||||||
return nil, "empty environment variable key is not allowed"
|
|
||||||
}
|
|
||||||
|
|
||||||
if seen[trimmedKey] {
|
|
||||||
return nil, "duplicate environment variable key: " + trimmedKey
|
|
||||||
}
|
|
||||||
|
|
||||||
seen[trimmedKey] = true
|
|
||||||
|
|
||||||
result = append(result, models.EnvVarPair{Key: trimmedKey, Value: p.Value})
|
|
||||||
}
|
}
|
||||||
|
|
||||||
return result, ""
|
|
||||||
}
|
}
|
||||||
|
|
||||||
// HandleEnvVarSave handles bulk saving of all environment variables.
|
// HandleEnvVarDelete handles deleting an environment variable.
|
||||||
// It reads a JSON array of {key, value} objects from the request body,
|
func (h *Handlers) HandleEnvVarDelete() http.HandlerFunc {
|
||||||
// deletes all existing env vars for the app, and inserts the full
|
|
||||||
// submitted set atomically within a database transaction.
|
|
||||||
// Duplicate keys are rejected with a 400 Bad Request error.
|
|
||||||
func (h *Handlers) HandleEnvVarSave() http.HandlerFunc {
|
|
||||||
return func(writer http.ResponseWriter, request *http.Request) {
|
return func(writer http.ResponseWriter, request *http.Request) {
|
||||||
appID := chi.URLParam(request, "id")
|
appID := chi.URLParam(request, "id")
|
||||||
|
envVarIDStr := chi.URLParam(request, "varID")
|
||||||
|
|
||||||
application, findErr := models.FindApp(request.Context(), h.db, appID)
|
envVarID, parseErr := strconv.ParseInt(envVarIDStr, 10, 64)
|
||||||
if findErr != nil || application == nil {
|
if parseErr != nil {
|
||||||
http.NotFound(writer, request)
|
http.NotFound(writer, request)
|
||||||
|
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
// Limit request body size to prevent abuse
|
envVar, findErr := models.FindEnvVar(request.Context(), h.db, envVarID)
|
||||||
request.Body = http.MaxBytesReader(writer, request.Body, envVarMaxBodyBytes)
|
if findErr != nil || envVar == nil || envVar.AppID != appID {
|
||||||
|
http.NotFound(writer, request)
|
||||||
var pairs []envPairJSON
|
|
||||||
|
|
||||||
decodeErr := json.NewDecoder(request.Body).Decode(&pairs)
|
|
||||||
if decodeErr != nil {
|
|
||||||
h.respondJSON(writer, request, map[string]string{
|
|
||||||
"error": "invalid request body",
|
|
||||||
}, http.StatusBadRequest)
|
|
||||||
|
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
modelPairs, validationErr := validateEnvPairs(pairs)
|
deleteErr := envVar.Delete(request.Context())
|
||||||
if validationErr != "" {
|
if deleteErr != nil {
|
||||||
h.respondJSON(writer, request, map[string]string{
|
h.log.Error("failed to delete env var", "error", deleteErr)
|
||||||
"error": validationErr,
|
|
||||||
}, http.StatusBadRequest)
|
|
||||||
|
|
||||||
return
|
|
||||||
}
|
}
|
||||||
|
|
||||||
replaceErr := models.ReplaceEnvVarsByAppID(
|
http.Redirect(writer, request, "/apps/"+appID, http.StatusSeeOther)
|
||||||
request.Context(), h.db, application.ID, modelPairs,
|
|
||||||
)
|
|
||||||
if replaceErr != nil {
|
|
||||||
h.log.Error("failed to replace env vars", "error", replaceErr)
|
|
||||||
h.respondJSON(writer, request, map[string]string{
|
|
||||||
"error": "failed to save environment variables",
|
|
||||||
}, http.StatusInternalServerError)
|
|
||||||
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
h.respondJSON(writer, request, map[string]bool{"ok": true}, http.StatusOK)
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -1243,6 +1205,59 @@ func ValidateVolumePath(p string) error {
|
|||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// HandleEnvVarEdit handles editing an existing environment variable.
|
||||||
|
func (h *Handlers) HandleEnvVarEdit() http.HandlerFunc {
|
||||||
|
return func(writer http.ResponseWriter, request *http.Request) {
|
||||||
|
appID := chi.URLParam(request, "id")
|
||||||
|
envVarIDStr := chi.URLParam(request, "varID")
|
||||||
|
|
||||||
|
envVarID, parseErr := strconv.ParseInt(envVarIDStr, 10, 64)
|
||||||
|
if parseErr != nil {
|
||||||
|
http.NotFound(writer, request)
|
||||||
|
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
envVar, findErr := models.FindEnvVar(request.Context(), h.db, envVarID)
|
||||||
|
if findErr != nil || envVar == nil || envVar.AppID != appID {
|
||||||
|
http.NotFound(writer, request)
|
||||||
|
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
formErr := request.ParseForm()
|
||||||
|
if formErr != nil {
|
||||||
|
http.Error(writer, "Bad Request", http.StatusBadRequest)
|
||||||
|
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
key := request.FormValue("key")
|
||||||
|
value := request.FormValue("value")
|
||||||
|
|
||||||
|
if key == "" || value == "" {
|
||||||
|
http.Redirect(writer, request, "/apps/"+appID, http.StatusSeeOther)
|
||||||
|
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
envVar.Key = key
|
||||||
|
envVar.Value = value
|
||||||
|
|
||||||
|
saveErr := envVar.Save(request.Context())
|
||||||
|
if saveErr != nil {
|
||||||
|
h.log.Error("failed to update env var", "error", saveErr)
|
||||||
|
}
|
||||||
|
|
||||||
|
http.Redirect(
|
||||||
|
writer,
|
||||||
|
request,
|
||||||
|
"/apps/"+appID+"?success=env-updated",
|
||||||
|
http.StatusSeeOther,
|
||||||
|
)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
// HandleLabelEdit handles editing an existing label.
|
// HandleLabelEdit handles editing an existing label.
|
||||||
func (h *Handlers) HandleLabelEdit() http.HandlerFunc {
|
func (h *Handlers) HandleLabelEdit() http.HandlerFunc {
|
||||||
return func(writer http.ResponseWriter, request *http.Request) {
|
return func(writer http.ResponseWriter, request *http.Request) {
|
||||||
@@ -1364,129 +1379,6 @@ func validateVolumePaths(hostPath, containerPath string) error {
|
|||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
// ErrInvalidMemoryFormat is returned when a memory limit string cannot be parsed.
|
|
||||||
var ErrInvalidMemoryFormat = errors.New(
|
|
||||||
"must be a number with optional unit suffix (e.g. 256m, 1g, 512000000)",
|
|
||||||
)
|
|
||||||
|
|
||||||
// ErrNegativeValue is returned when a resource limit is negative.
|
|
||||||
var ErrNegativeValue = errors.New("value must be positive")
|
|
||||||
|
|
||||||
// Memory unit byte multipliers.
|
|
||||||
const (
|
|
||||||
kilobyte = 1024
|
|
||||||
megabyte = 1024 * 1024
|
|
||||||
gigabyte = 1024 * 1024 * 1024
|
|
||||||
)
|
|
||||||
|
|
||||||
// optionalNullString converts a form value to a sql.NullString.
|
|
||||||
// Returns a valid NullString if non-empty, invalid (NULL) if empty.
|
|
||||||
func optionalNullString(s string) sql.NullString {
|
|
||||||
if s != "" {
|
|
||||||
return sql.NullString{String: s, Valid: true}
|
|
||||||
}
|
|
||||||
|
|
||||||
return sql.NullString{}
|
|
||||||
}
|
|
||||||
|
|
||||||
// applyResourceLimits parses CPU and memory limit form values and applies them to the app.
|
|
||||||
// Returns an error message string if validation fails, or empty string on success.
|
|
||||||
func applyResourceLimits(application *models.App, request *http.Request) string {
|
|
||||||
cpuLimit, cpuErr := parseOptionalFloat64(request.FormValue("cpu_limit"))
|
|
||||||
if cpuErr != nil {
|
|
||||||
return "Invalid CPU limit: must be a positive number (e.g. 0.5, 1, 2)"
|
|
||||||
}
|
|
||||||
|
|
||||||
application.CPULimit = cpuLimit
|
|
||||||
|
|
||||||
memoryLimit, memErr := parseOptionalMemoryBytes(request.FormValue("memory_limit"))
|
|
||||||
if memErr != nil {
|
|
||||||
return "Invalid memory limit: " + memErr.Error()
|
|
||||||
}
|
|
||||||
|
|
||||||
application.MemoryLimit = memoryLimit
|
|
||||||
|
|
||||||
return ""
|
|
||||||
}
|
|
||||||
|
|
||||||
// memoryUnitMultiplier returns the byte multiplier for a memory unit suffix.
|
|
||||||
// Returns 0 if the suffix is not recognized.
|
|
||||||
func memoryUnitMultiplier(suffix byte) int64 {
|
|
||||||
switch suffix {
|
|
||||||
case 'k':
|
|
||||||
return kilobyte
|
|
||||||
case 'm':
|
|
||||||
return megabyte
|
|
||||||
case 'g':
|
|
||||||
return gigabyte
|
|
||||||
default:
|
|
||||||
return 0
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// parseOptionalFloat64 parses an optional float64 form field.
|
|
||||||
// Returns a valid NullFloat64 if the string is non-empty and parses to a positive number.
|
|
||||||
// Returns an empty NullFloat64 if the string is empty.
|
|
||||||
// Returns an error if the string is non-empty but invalid or non-positive.
|
|
||||||
func parseOptionalFloat64(s string) (sql.NullFloat64, error) {
|
|
||||||
s = strings.TrimSpace(s)
|
|
||||||
if s == "" {
|
|
||||||
return sql.NullFloat64{}, nil
|
|
||||||
}
|
|
||||||
|
|
||||||
val, err := strconv.ParseFloat(s, 64)
|
|
||||||
if err != nil {
|
|
||||||
return sql.NullFloat64{}, fmt.Errorf("invalid number: %w", err)
|
|
||||||
}
|
|
||||||
|
|
||||||
if val <= 0 {
|
|
||||||
return sql.NullFloat64{}, ErrNegativeValue
|
|
||||||
}
|
|
||||||
|
|
||||||
return sql.NullFloat64{Float64: val, Valid: true}, nil
|
|
||||||
}
|
|
||||||
|
|
||||||
// parseOptionalMemoryBytes parses an optional memory limit string into bytes.
|
|
||||||
// Accepts plain bytes (e.g. "536870912") or suffixed values (e.g. "512m", "1g", "256k").
|
|
||||||
// Returns a valid NullInt64 with bytes if non-empty, empty NullInt64 if blank.
|
|
||||||
func parseOptionalMemoryBytes(s string) (sql.NullInt64, error) {
|
|
||||||
s = strings.TrimSpace(s)
|
|
||||||
if s == "" {
|
|
||||||
return sql.NullInt64{}, nil
|
|
||||||
}
|
|
||||||
|
|
||||||
s = strings.ToLower(s)
|
|
||||||
|
|
||||||
// Check for unit suffix
|
|
||||||
multiplier := memoryUnitMultiplier(s[len(s)-1])
|
|
||||||
if multiplier > 0 {
|
|
||||||
numStr := s[:len(s)-1]
|
|
||||||
|
|
||||||
val, err := strconv.ParseFloat(numStr, 64)
|
|
||||||
if err != nil {
|
|
||||||
return sql.NullInt64{}, ErrInvalidMemoryFormat
|
|
||||||
}
|
|
||||||
|
|
||||||
if val <= 0 {
|
|
||||||
return sql.NullInt64{}, ErrNegativeValue
|
|
||||||
}
|
|
||||||
|
|
||||||
return sql.NullInt64{Int64: int64(val * float64(multiplier)), Valid: true}, nil
|
|
||||||
}
|
|
||||||
|
|
||||||
// Plain bytes
|
|
||||||
val, err := strconv.ParseInt(s, 10, 64)
|
|
||||||
if err != nil {
|
|
||||||
return sql.NullInt64{}, ErrInvalidMemoryFormat
|
|
||||||
}
|
|
||||||
|
|
||||||
if val <= 0 {
|
|
||||||
return sql.NullInt64{}, ErrNegativeValue
|
|
||||||
}
|
|
||||||
|
|
||||||
return sql.NullInt64{Int64: val, Valid: true}, nil
|
|
||||||
}
|
|
||||||
|
|
||||||
// formatDeployKey formats an SSH public key with a descriptive comment.
|
// formatDeployKey formats an SSH public key with a descriptive comment.
|
||||||
// Format: ssh-ed25519 AAAA... upaas_2025-01-15_myapp
|
// Format: ssh-ed25519 AAAA... upaas_2025-01-15_myapp
|
||||||
func formatDeployKey(pubKey string, createdAt time.Time, appName string) string {
|
func formatDeployKey(pubKey string, createdAt time.Time, appName string) string {
|
||||||
|
|||||||
@@ -560,242 +560,45 @@ func testOwnershipVerification(t *testing.T, cfg ownedResourceTestConfig) {
|
|||||||
cfg.verifyFn(t, testCtx, resourceID)
|
cfg.verifyFn(t, testCtx, resourceID)
|
||||||
}
|
}
|
||||||
|
|
||||||
// TestHandleEnvVarSaveBulk tests that HandleEnvVarSave replaces all env vars
|
// TestDeleteEnvVarOwnershipVerification tests that deleting an env var
|
||||||
// for an app with the submitted set (monolithic delete-all + insert-all).
|
// via another app's URL path returns 404 (IDOR prevention).
|
||||||
func TestHandleEnvVarSaveBulk(t *testing.T) {
|
func TestDeleteEnvVarOwnershipVerification(t *testing.T) { //nolint:dupl // intentionally similar IDOR test pattern
|
||||||
t.Parallel()
|
t.Parallel()
|
||||||
|
|
||||||
testCtx := setupTestHandlers(t)
|
testOwnershipVerification(t, ownedResourceTestConfig{
|
||||||
createdApp := createTestApp(t, testCtx, "envvar-bulk-app")
|
appPrefix1: "envvar-owner-app",
|
||||||
|
appPrefix2: "envvar-other-app",
|
||||||
|
createFn: func(t *testing.T, tc *testContext, ownerApp *models.App) int64 {
|
||||||
|
t.Helper()
|
||||||
|
|
||||||
// Create some pre-existing env vars
|
envVar := models.NewEnvVar(tc.database)
|
||||||
for _, kv := range [][2]string{{"OLD_KEY", "old_value"}, {"REMOVE_ME", "gone"}} {
|
envVar.AppID = ownerApp.ID
|
||||||
ev := models.NewEnvVar(testCtx.database)
|
envVar.Key = "SECRET"
|
||||||
ev.AppID = createdApp.ID
|
envVar.Value = "hunter2"
|
||||||
ev.Key = kv[0]
|
require.NoError(t, envVar.Save(context.Background()))
|
||||||
ev.Value = kv[1]
|
|
||||||
require.NoError(t, ev.Save(context.Background()))
|
|
||||||
}
|
|
||||||
|
|
||||||
// Submit a new set as a JSON array of key/value objects
|
return envVar.ID
|
||||||
body := `[{"key":"NEW_KEY","value":"new_value"},{"key":"ANOTHER","value":"42"}]`
|
},
|
||||||
|
deletePath: func(appID string, resourceID int64) string {
|
||||||
|
return "/apps/" + appID + "/env/" + strconv.FormatInt(resourceID, 10) + "/delete"
|
||||||
|
},
|
||||||
|
chiParams: func(appID string, resourceID int64) map[string]string {
|
||||||
|
return map[string]string{"id": appID, "varID": strconv.FormatInt(resourceID, 10)}
|
||||||
|
},
|
||||||
|
handler: func(h *handlers.Handlers) http.HandlerFunc { return h.HandleEnvVarDelete() },
|
||||||
|
verifyFn: func(t *testing.T, tc *testContext, resourceID int64) {
|
||||||
|
t.Helper()
|
||||||
|
|
||||||
r := chi.NewRouter()
|
found, findErr := models.FindEnvVar(context.Background(), tc.database, resourceID)
|
||||||
r.Post("/apps/{id}/env", testCtx.handlers.HandleEnvVarSave())
|
require.NoError(t, findErr)
|
||||||
|
assert.NotNil(t, found, "env var should still exist after IDOR attempt")
|
||||||
request := httptest.NewRequest(
|
},
|
||||||
http.MethodPost,
|
})
|
||||||
"/apps/"+createdApp.ID+"/env",
|
|
||||||
strings.NewReader(body),
|
|
||||||
)
|
|
||||||
request.Header.Set("Content-Type", "application/json")
|
|
||||||
|
|
||||||
recorder := httptest.NewRecorder()
|
|
||||||
r.ServeHTTP(recorder, request)
|
|
||||||
|
|
||||||
assert.Equal(t, http.StatusOK, recorder.Code)
|
|
||||||
|
|
||||||
// Verify old env vars are gone and new ones exist
|
|
||||||
envVars, err := models.FindEnvVarsByAppID(
|
|
||||||
context.Background(), testCtx.database, createdApp.ID,
|
|
||||||
)
|
|
||||||
require.NoError(t, err)
|
|
||||||
assert.Len(t, envVars, 2)
|
|
||||||
|
|
||||||
keys := make(map[string]string)
|
|
||||||
for _, ev := range envVars {
|
|
||||||
keys[ev.Key] = ev.Value
|
|
||||||
}
|
|
||||||
|
|
||||||
assert.Equal(t, "new_value", keys["NEW_KEY"])
|
|
||||||
assert.Equal(t, "42", keys["ANOTHER"])
|
|
||||||
assert.Empty(t, keys["OLD_KEY"], "old env vars should be deleted")
|
|
||||||
assert.Empty(t, keys["REMOVE_ME"], "old env vars should be deleted")
|
|
||||||
}
|
|
||||||
|
|
||||||
// TestHandleEnvVarSaveAppNotFound tests that HandleEnvVarSave returns 404
|
|
||||||
// for a non-existent app.
|
|
||||||
func TestHandleEnvVarSaveAppNotFound(t *testing.T) {
|
|
||||||
t.Parallel()
|
|
||||||
|
|
||||||
testCtx := setupTestHandlers(t)
|
|
||||||
|
|
||||||
body := `[{"key":"KEY","value":"value"}]`
|
|
||||||
|
|
||||||
r := chi.NewRouter()
|
|
||||||
r.Post("/apps/{id}/env", testCtx.handlers.HandleEnvVarSave())
|
|
||||||
|
|
||||||
request := httptest.NewRequest(
|
|
||||||
http.MethodPost,
|
|
||||||
"/apps/nonexistent-id/env",
|
|
||||||
strings.NewReader(body),
|
|
||||||
)
|
|
||||||
request.Header.Set("Content-Type", "application/json")
|
|
||||||
|
|
||||||
recorder := httptest.NewRecorder()
|
|
||||||
r.ServeHTTP(recorder, request)
|
|
||||||
|
|
||||||
assert.Equal(t, http.StatusNotFound, recorder.Code)
|
|
||||||
}
|
|
||||||
|
|
||||||
// TestHandleEnvVarSaveEmptyKeyRejected verifies that submitting a JSON
|
|
||||||
// array containing an entry with an empty key returns 400.
|
|
||||||
func TestHandleEnvVarSaveEmptyKeyRejected(t *testing.T) {
|
|
||||||
t.Parallel()
|
|
||||||
|
|
||||||
testCtx := setupTestHandlers(t)
|
|
||||||
createdApp := createTestApp(t, testCtx, "envvar-emptykey-app")
|
|
||||||
|
|
||||||
body := `[{"key":"VALID_KEY","value":"ok"},{"key":"","value":"bad"}]`
|
|
||||||
|
|
||||||
r := chi.NewRouter()
|
|
||||||
r.Post("/apps/{id}/env", testCtx.handlers.HandleEnvVarSave())
|
|
||||||
|
|
||||||
request := httptest.NewRequest(
|
|
||||||
http.MethodPost,
|
|
||||||
"/apps/"+createdApp.ID+"/env",
|
|
||||||
strings.NewReader(body),
|
|
||||||
)
|
|
||||||
request.Header.Set("Content-Type", "application/json")
|
|
||||||
|
|
||||||
recorder := httptest.NewRecorder()
|
|
||||||
r.ServeHTTP(recorder, request)
|
|
||||||
|
|
||||||
assert.Equal(t, http.StatusBadRequest, recorder.Code)
|
|
||||||
}
|
|
||||||
|
|
||||||
// TestHandleEnvVarSaveDuplicateKeyRejected verifies that when the client
|
|
||||||
// sends duplicate keys, the server rejects them with 400 Bad Request.
|
|
||||||
func TestHandleEnvVarSaveDuplicateKeyRejected(t *testing.T) {
|
|
||||||
t.Parallel()
|
|
||||||
|
|
||||||
testCtx := setupTestHandlers(t)
|
|
||||||
createdApp := createTestApp(t, testCtx, "envvar-dedup-app")
|
|
||||||
|
|
||||||
// Send two entries with the same key — should be rejected
|
|
||||||
body := `[{"key":"FOO","value":"first"},{"key":"BAR","value":"bar"},{"key":"FOO","value":"second"}]`
|
|
||||||
|
|
||||||
r := chi.NewRouter()
|
|
||||||
r.Post("/apps/{id}/env", testCtx.handlers.HandleEnvVarSave())
|
|
||||||
|
|
||||||
request := httptest.NewRequest(
|
|
||||||
http.MethodPost,
|
|
||||||
"/apps/"+createdApp.ID+"/env",
|
|
||||||
strings.NewReader(body),
|
|
||||||
)
|
|
||||||
request.Header.Set("Content-Type", "application/json")
|
|
||||||
|
|
||||||
recorder := httptest.NewRecorder()
|
|
||||||
r.ServeHTTP(recorder, request)
|
|
||||||
|
|
||||||
assert.Equal(t, http.StatusBadRequest, recorder.Code)
|
|
||||||
assert.Contains(t, recorder.Body.String(), "duplicate environment variable key: FOO")
|
|
||||||
}
|
|
||||||
|
|
||||||
// TestHandleEnvVarSaveCrossAppIsolation verifies that posting env vars
|
|
||||||
// to appA's endpoint does not affect appB's env vars (IDOR prevention).
|
|
||||||
func TestHandleEnvVarSaveCrossAppIsolation(t *testing.T) {
|
|
||||||
t.Parallel()
|
|
||||||
|
|
||||||
testCtx := setupTestHandlers(t)
|
|
||||||
appA := createTestApp(t, testCtx, "envvar-iso-appA")
|
|
||||||
appB := createTestApp(t, testCtx, "envvar-iso-appB")
|
|
||||||
|
|
||||||
// Give appB some env vars
|
|
||||||
for _, kv := range [][2]string{{"B_KEY1", "b_val1"}, {"B_KEY2", "b_val2"}} {
|
|
||||||
ev := models.NewEnvVar(testCtx.database)
|
|
||||||
ev.AppID = appB.ID
|
|
||||||
ev.Key = kv[0]
|
|
||||||
ev.Value = kv[1]
|
|
||||||
require.NoError(t, ev.Save(context.Background()))
|
|
||||||
}
|
|
||||||
|
|
||||||
// POST new env vars to appA's endpoint
|
|
||||||
body := `[{"key":"A_KEY","value":"a_val"}]`
|
|
||||||
|
|
||||||
r := chi.NewRouter()
|
|
||||||
r.Post("/apps/{id}/env", testCtx.handlers.HandleEnvVarSave())
|
|
||||||
|
|
||||||
request := httptest.NewRequest(
|
|
||||||
http.MethodPost,
|
|
||||||
"/apps/"+appA.ID+"/env",
|
|
||||||
strings.NewReader(body),
|
|
||||||
)
|
|
||||||
request.Header.Set("Content-Type", "application/json")
|
|
||||||
|
|
||||||
recorder := httptest.NewRecorder()
|
|
||||||
r.ServeHTTP(recorder, request)
|
|
||||||
|
|
||||||
assert.Equal(t, http.StatusOK, recorder.Code)
|
|
||||||
|
|
||||||
// Verify appA has exactly what we sent
|
|
||||||
appAVars, err := models.FindEnvVarsByAppID(
|
|
||||||
context.Background(), testCtx.database, appA.ID,
|
|
||||||
)
|
|
||||||
require.NoError(t, err)
|
|
||||||
assert.Len(t, appAVars, 1)
|
|
||||||
assert.Equal(t, "A_KEY", appAVars[0].Key)
|
|
||||||
|
|
||||||
// Verify appB's env vars are completely untouched
|
|
||||||
appBVars, err := models.FindEnvVarsByAppID(
|
|
||||||
context.Background(), testCtx.database, appB.ID,
|
|
||||||
)
|
|
||||||
require.NoError(t, err)
|
|
||||||
assert.Len(t, appBVars, 2, "appB env vars must not be affected")
|
|
||||||
|
|
||||||
bKeys := make(map[string]string)
|
|
||||||
for _, ev := range appBVars {
|
|
||||||
bKeys[ev.Key] = ev.Value
|
|
||||||
}
|
|
||||||
|
|
||||||
assert.Equal(t, "b_val1", bKeys["B_KEY1"])
|
|
||||||
assert.Equal(t, "b_val2", bKeys["B_KEY2"])
|
|
||||||
}
|
|
||||||
|
|
||||||
// TestHandleEnvVarSaveBodySizeLimit verifies that a request body
|
|
||||||
// exceeding the 1 MB limit is rejected.
|
|
||||||
func TestHandleEnvVarSaveBodySizeLimit(t *testing.T) {
|
|
||||||
t.Parallel()
|
|
||||||
|
|
||||||
testCtx := setupTestHandlers(t)
|
|
||||||
createdApp := createTestApp(t, testCtx, "envvar-sizelimit-app")
|
|
||||||
|
|
||||||
// Build a JSON body that exceeds 1 MB
|
|
||||||
// Each entry is ~30 bytes; 40000 entries ≈ 1.2 MB
|
|
||||||
var sb strings.Builder
|
|
||||||
|
|
||||||
sb.WriteString("[")
|
|
||||||
|
|
||||||
for i := range 40000 {
|
|
||||||
if i > 0 {
|
|
||||||
sb.WriteString(",")
|
|
||||||
}
|
|
||||||
|
|
||||||
sb.WriteString(`{"key":"K` + strconv.Itoa(i) + `","value":"val"}`)
|
|
||||||
}
|
|
||||||
|
|
||||||
sb.WriteString("]")
|
|
||||||
|
|
||||||
r := chi.NewRouter()
|
|
||||||
r.Post("/apps/{id}/env", testCtx.handlers.HandleEnvVarSave())
|
|
||||||
|
|
||||||
request := httptest.NewRequest(
|
|
||||||
http.MethodPost,
|
|
||||||
"/apps/"+createdApp.ID+"/env",
|
|
||||||
strings.NewReader(sb.String()),
|
|
||||||
)
|
|
||||||
request.Header.Set("Content-Type", "application/json")
|
|
||||||
|
|
||||||
recorder := httptest.NewRecorder()
|
|
||||||
r.ServeHTTP(recorder, request)
|
|
||||||
|
|
||||||
assert.Equal(t, http.StatusBadRequest, recorder.Code,
|
|
||||||
"oversized body should be rejected with 400")
|
|
||||||
}
|
}
|
||||||
|
|
||||||
// TestDeleteLabelOwnershipVerification tests that deleting a label
|
// TestDeleteLabelOwnershipVerification tests that deleting a label
|
||||||
// via another app's URL path returns 404 (IDOR prevention).
|
// via another app's URL path returns 404 (IDOR prevention).
|
||||||
func TestDeleteLabelOwnershipVerification(t *testing.T) {
|
func TestDeleteLabelOwnershipVerification(t *testing.T) { //nolint:dupl // intentionally similar IDOR test pattern
|
||||||
t.Parallel()
|
t.Parallel()
|
||||||
|
|
||||||
testOwnershipVerification(t, ownedResourceTestConfig{
|
testOwnershipVerification(t, ownedResourceTestConfig{
|
||||||
@@ -911,43 +714,41 @@ func TestDeletePortOwnershipVerification(t *testing.T) {
|
|||||||
assert.NotNil(t, found, "port should still exist after IDOR attempt")
|
assert.NotNil(t, found, "port should still exist after IDOR attempt")
|
||||||
}
|
}
|
||||||
|
|
||||||
// TestHandleEnvVarSaveEmptyClears verifies that submitting an empty JSON
|
// TestHandleEnvVarDeleteUsesCorrectRouteParam verifies that HandleEnvVarDelete
|
||||||
// array deletes all existing env vars for the app.
|
// reads the "varID" chi URL parameter (matching the route definition {varID}),
|
||||||
func TestHandleEnvVarSaveEmptyClears(t *testing.T) {
|
// not a mismatched name like "envID".
|
||||||
|
func TestHandleEnvVarDeleteUsesCorrectRouteParam(t *testing.T) {
|
||||||
t.Parallel()
|
t.Parallel()
|
||||||
|
|
||||||
testCtx := setupTestHandlers(t)
|
testCtx := setupTestHandlers(t)
|
||||||
createdApp := createTestApp(t, testCtx, "envvar-clear-app")
|
|
||||||
|
|
||||||
// Create a pre-existing env var
|
createdApp := createTestApp(t, testCtx, "envdelete-param-app")
|
||||||
ev := models.NewEnvVar(testCtx.database)
|
|
||||||
ev.AppID = createdApp.ID
|
|
||||||
ev.Key = "DELETE_ME"
|
|
||||||
ev.Value = "gone"
|
|
||||||
require.NoError(t, ev.Save(context.Background()))
|
|
||||||
|
|
||||||
// Submit empty JSON array
|
envVar := models.NewEnvVar(testCtx.database)
|
||||||
|
envVar.AppID = createdApp.ID
|
||||||
|
envVar.Key = "DELETE_ME"
|
||||||
|
envVar.Value = "gone"
|
||||||
|
require.NoError(t, envVar.Save(context.Background()))
|
||||||
|
|
||||||
|
// Use chi router with the real route pattern to test param name
|
||||||
r := chi.NewRouter()
|
r := chi.NewRouter()
|
||||||
r.Post("/apps/{id}/env", testCtx.handlers.HandleEnvVarSave())
|
r.Post("/apps/{id}/env-vars/{varID}/delete", testCtx.handlers.HandleEnvVarDelete())
|
||||||
|
|
||||||
request := httptest.NewRequest(
|
request := httptest.NewRequest(
|
||||||
http.MethodPost,
|
http.MethodPost,
|
||||||
"/apps/"+createdApp.ID+"/env",
|
"/apps/"+createdApp.ID+"/env-vars/"+strconv.FormatInt(envVar.ID, 10)+"/delete",
|
||||||
strings.NewReader("[]"),
|
nil,
|
||||||
)
|
)
|
||||||
request.Header.Set("Content-Type", "application/json")
|
|
||||||
|
|
||||||
recorder := httptest.NewRecorder()
|
recorder := httptest.NewRecorder()
|
||||||
|
|
||||||
r.ServeHTTP(recorder, request)
|
r.ServeHTTP(recorder, request)
|
||||||
|
|
||||||
assert.Equal(t, http.StatusOK, recorder.Code)
|
assert.Equal(t, http.StatusSeeOther, recorder.Code)
|
||||||
|
|
||||||
// Verify all env vars are gone
|
// Verify the env var was actually deleted
|
||||||
envVars, err := models.FindEnvVarsByAppID(
|
found, findErr := models.FindEnvVar(context.Background(), testCtx.database, envVar.ID)
|
||||||
context.Background(), testCtx.database, createdApp.ID,
|
require.NoError(t, findErr)
|
||||||
)
|
assert.Nil(t, found, "env var should be deleted when using correct route param")
|
||||||
require.NoError(t, err)
|
|
||||||
assert.Empty(t, envVars, "all env vars should be deleted")
|
|
||||||
}
|
}
|
||||||
|
|
||||||
// TestHandleVolumeAddValidatesPaths verifies that HandleVolumeAdd validates
|
// TestHandleVolumeAddValidatesPaths verifies that HandleVolumeAdd validates
|
||||||
|
|||||||
@@ -1,195 +0,0 @@
|
|||||||
package handlers //nolint:testpackage // tests unexported parsing functions
|
|
||||||
|
|
||||||
import (
|
|
||||||
"database/sql"
|
|
||||||
"testing"
|
|
||||||
|
|
||||||
"github.com/stretchr/testify/assert"
|
|
||||||
"github.com/stretchr/testify/require"
|
|
||||||
)
|
|
||||||
|
|
||||||
func TestParseOptionalFloat64(t *testing.T) {
|
|
||||||
t.Parallel()
|
|
||||||
|
|
||||||
t.Run("empty string returns invalid", func(t *testing.T) {
|
|
||||||
t.Parallel()
|
|
||||||
|
|
||||||
result, err := parseOptionalFloat64("")
|
|
||||||
require.NoError(t, err)
|
|
||||||
assert.False(t, result.Valid)
|
|
||||||
})
|
|
||||||
|
|
||||||
t.Run("whitespace only returns invalid", func(t *testing.T) {
|
|
||||||
t.Parallel()
|
|
||||||
|
|
||||||
result, err := parseOptionalFloat64(" ")
|
|
||||||
require.NoError(t, err)
|
|
||||||
assert.False(t, result.Valid)
|
|
||||||
})
|
|
||||||
|
|
||||||
t.Run("valid float", func(t *testing.T) {
|
|
||||||
t.Parallel()
|
|
||||||
|
|
||||||
result, err := parseOptionalFloat64("0.5")
|
|
||||||
require.NoError(t, err)
|
|
||||||
assert.True(t, result.Valid)
|
|
||||||
assert.InDelta(t, 0.5, result.Float64, 0.001)
|
|
||||||
})
|
|
||||||
|
|
||||||
t.Run("valid integer", func(t *testing.T) {
|
|
||||||
t.Parallel()
|
|
||||||
|
|
||||||
result, err := parseOptionalFloat64("2")
|
|
||||||
require.NoError(t, err)
|
|
||||||
assert.True(t, result.Valid)
|
|
||||||
assert.InDelta(t, 2.0, result.Float64, 0.001)
|
|
||||||
})
|
|
||||||
|
|
||||||
t.Run("negative value rejected", func(t *testing.T) {
|
|
||||||
t.Parallel()
|
|
||||||
|
|
||||||
_, err := parseOptionalFloat64("-1")
|
|
||||||
require.Error(t, err)
|
|
||||||
})
|
|
||||||
|
|
||||||
t.Run("zero value rejected", func(t *testing.T) {
|
|
||||||
t.Parallel()
|
|
||||||
|
|
||||||
_, err := parseOptionalFloat64("0")
|
|
||||||
require.Error(t, err)
|
|
||||||
})
|
|
||||||
|
|
||||||
t.Run("non-numeric rejected", func(t *testing.T) {
|
|
||||||
t.Parallel()
|
|
||||||
|
|
||||||
_, err := parseOptionalFloat64("abc")
|
|
||||||
require.Error(t, err)
|
|
||||||
})
|
|
||||||
}
|
|
||||||
|
|
||||||
func TestParseOptionalMemoryBytes(t *testing.T) { //nolint:funlen // table-driven test
|
|
||||||
t.Parallel()
|
|
||||||
|
|
||||||
t.Run("empty string returns invalid", func(t *testing.T) {
|
|
||||||
t.Parallel()
|
|
||||||
|
|
||||||
result, err := parseOptionalMemoryBytes("")
|
|
||||||
require.NoError(t, err)
|
|
||||||
assert.False(t, result.Valid)
|
|
||||||
})
|
|
||||||
|
|
||||||
t.Run("whitespace only returns invalid", func(t *testing.T) {
|
|
||||||
t.Parallel()
|
|
||||||
|
|
||||||
result, err := parseOptionalMemoryBytes(" ")
|
|
||||||
require.NoError(t, err)
|
|
||||||
assert.False(t, result.Valid)
|
|
||||||
})
|
|
||||||
|
|
||||||
t.Run("plain bytes", func(t *testing.T) {
|
|
||||||
t.Parallel()
|
|
||||||
|
|
||||||
result, err := parseOptionalMemoryBytes("536870912")
|
|
||||||
require.NoError(t, err)
|
|
||||||
assert.True(t, result.Valid)
|
|
||||||
assert.Equal(t, int64(536870912), result.Int64)
|
|
||||||
})
|
|
||||||
|
|
||||||
t.Run("megabytes suffix", func(t *testing.T) {
|
|
||||||
t.Parallel()
|
|
||||||
|
|
||||||
result, err := parseOptionalMemoryBytes("256m")
|
|
||||||
require.NoError(t, err)
|
|
||||||
assert.True(t, result.Valid)
|
|
||||||
assert.Equal(t, int64(256*1024*1024), result.Int64)
|
|
||||||
})
|
|
||||||
|
|
||||||
t.Run("megabytes suffix uppercase", func(t *testing.T) {
|
|
||||||
t.Parallel()
|
|
||||||
|
|
||||||
result, err := parseOptionalMemoryBytes("256M")
|
|
||||||
require.NoError(t, err)
|
|
||||||
assert.True(t, result.Valid)
|
|
||||||
assert.Equal(t, int64(256*1024*1024), result.Int64)
|
|
||||||
})
|
|
||||||
|
|
||||||
t.Run("gigabytes suffix", func(t *testing.T) {
|
|
||||||
t.Parallel()
|
|
||||||
|
|
||||||
result, err := parseOptionalMemoryBytes("1g")
|
|
||||||
require.NoError(t, err)
|
|
||||||
assert.True(t, result.Valid)
|
|
||||||
assert.Equal(t, int64(1024*1024*1024), result.Int64)
|
|
||||||
})
|
|
||||||
|
|
||||||
t.Run("kilobytes suffix", func(t *testing.T) {
|
|
||||||
t.Parallel()
|
|
||||||
|
|
||||||
result, err := parseOptionalMemoryBytes("512k")
|
|
||||||
require.NoError(t, err)
|
|
||||||
assert.True(t, result.Valid)
|
|
||||||
assert.Equal(t, int64(512*1024), result.Int64)
|
|
||||||
})
|
|
||||||
|
|
||||||
t.Run("fractional gigabytes", func(t *testing.T) {
|
|
||||||
t.Parallel()
|
|
||||||
|
|
||||||
result, err := parseOptionalMemoryBytes("1.5g")
|
|
||||||
require.NoError(t, err)
|
|
||||||
assert.True(t, result.Valid)
|
|
||||||
assert.Equal(t, int64(1.5*1024*1024*1024), result.Int64)
|
|
||||||
})
|
|
||||||
|
|
||||||
t.Run("negative value rejected", func(t *testing.T) {
|
|
||||||
t.Parallel()
|
|
||||||
|
|
||||||
_, err := parseOptionalMemoryBytes("-256m")
|
|
||||||
require.Error(t, err)
|
|
||||||
})
|
|
||||||
|
|
||||||
t.Run("zero value rejected", func(t *testing.T) {
|
|
||||||
t.Parallel()
|
|
||||||
|
|
||||||
_, err := parseOptionalMemoryBytes("0")
|
|
||||||
require.Error(t, err)
|
|
||||||
})
|
|
||||||
|
|
||||||
t.Run("invalid string rejected", func(t *testing.T) {
|
|
||||||
t.Parallel()
|
|
||||||
|
|
||||||
_, err := parseOptionalMemoryBytes("abc")
|
|
||||||
require.Error(t, err)
|
|
||||||
})
|
|
||||||
|
|
||||||
t.Run("negative plain bytes rejected", func(t *testing.T) {
|
|
||||||
t.Parallel()
|
|
||||||
|
|
||||||
_, err := parseOptionalMemoryBytes("-100")
|
|
||||||
require.Error(t, err)
|
|
||||||
})
|
|
||||||
}
|
|
||||||
|
|
||||||
func TestAppResourceLimitsRoundTrip(t *testing.T) {
|
|
||||||
t.Parallel()
|
|
||||||
|
|
||||||
// Test that parsing and formatting are consistent
|
|
||||||
tests := []struct {
|
|
||||||
input string
|
|
||||||
expected sql.NullInt64
|
|
||||||
format string
|
|
||||||
}{
|
|
||||||
{"256m", sql.NullInt64{Int64: 256 * 1024 * 1024, Valid: true}, "256m"},
|
|
||||||
{"1g", sql.NullInt64{Int64: 1024 * 1024 * 1024, Valid: true}, "1g"},
|
|
||||||
{"512k", sql.NullInt64{Int64: 512 * 1024, Valid: true}, "512k"},
|
|
||||||
}
|
|
||||||
|
|
||||||
for _, tt := range tests {
|
|
||||||
t.Run(tt.input, func(t *testing.T) {
|
|
||||||
t.Parallel()
|
|
||||||
|
|
||||||
result, err := parseOptionalMemoryBytes(tt.input)
|
|
||||||
require.NoError(t, err)
|
|
||||||
assert.Equal(t, tt.expected, result)
|
|
||||||
})
|
|
||||||
}
|
|
||||||
}
|
|
||||||
@@ -14,8 +14,7 @@ import (
|
|||||||
const appColumns = `id, name, repo_url, branch, dockerfile_path, webhook_secret,
|
const appColumns = `id, name, repo_url, branch, dockerfile_path, webhook_secret,
|
||||||
ssh_private_key, ssh_public_key, image_id, status,
|
ssh_private_key, ssh_public_key, image_id, status,
|
||||||
docker_network, ntfy_topic, slack_webhook, webhook_secret_hash,
|
docker_network, ntfy_topic, slack_webhook, webhook_secret_hash,
|
||||||
previous_image_id, cpu_limit, memory_limit,
|
previous_image_id, created_at, updated_at`
|
||||||
created_at, updated_at`
|
|
||||||
|
|
||||||
// AppStatus represents the status of an app.
|
// AppStatus represents the status of an app.
|
||||||
type AppStatus string
|
type AppStatus string
|
||||||
@@ -48,8 +47,6 @@ type App struct {
|
|||||||
DockerNetwork sql.NullString
|
DockerNetwork sql.NullString
|
||||||
NtfyTopic sql.NullString
|
NtfyTopic sql.NullString
|
||||||
SlackWebhook sql.NullString
|
SlackWebhook sql.NullString
|
||||||
CPULimit sql.NullFloat64
|
|
||||||
MemoryLimit sql.NullInt64
|
|
||||||
CreatedAt time.Time
|
CreatedAt time.Time
|
||||||
UpdatedAt time.Time
|
UpdatedAt time.Time
|
||||||
}
|
}
|
||||||
@@ -145,14 +142,14 @@ func (a *App) insert(ctx context.Context) error {
|
|||||||
id, name, repo_url, branch, dockerfile_path, webhook_secret,
|
id, name, repo_url, branch, dockerfile_path, webhook_secret,
|
||||||
ssh_private_key, ssh_public_key, image_id, status,
|
ssh_private_key, ssh_public_key, image_id, status,
|
||||||
docker_network, ntfy_topic, slack_webhook, webhook_secret_hash,
|
docker_network, ntfy_topic, slack_webhook, webhook_secret_hash,
|
||||||
previous_image_id, cpu_limit, memory_limit
|
previous_image_id
|
||||||
) VALUES (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?)`
|
) VALUES (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?)`
|
||||||
|
|
||||||
_, err := a.db.Exec(ctx, query,
|
_, err := a.db.Exec(ctx, query,
|
||||||
a.ID, a.Name, a.RepoURL, a.Branch, a.DockerfilePath, a.WebhookSecret,
|
a.ID, a.Name, a.RepoURL, a.Branch, a.DockerfilePath, a.WebhookSecret,
|
||||||
a.SSHPrivateKey, a.SSHPublicKey, a.ImageID, a.Status,
|
a.SSHPrivateKey, a.SSHPublicKey, a.ImageID, a.Status,
|
||||||
a.DockerNetwork, a.NtfyTopic, a.SlackWebhook, a.WebhookSecretHash,
|
a.DockerNetwork, a.NtfyTopic, a.SlackWebhook, a.WebhookSecretHash,
|
||||||
a.PreviousImageID, a.CPULimit, a.MemoryLimit,
|
a.PreviousImageID,
|
||||||
)
|
)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return err
|
return err
|
||||||
@@ -168,7 +165,6 @@ func (a *App) update(ctx context.Context) error {
|
|||||||
image_id = ?, status = ?,
|
image_id = ?, status = ?,
|
||||||
docker_network = ?, ntfy_topic = ?, slack_webhook = ?,
|
docker_network = ?, ntfy_topic = ?, slack_webhook = ?,
|
||||||
previous_image_id = ?,
|
previous_image_id = ?,
|
||||||
cpu_limit = ?, memory_limit = ?,
|
|
||||||
updated_at = CURRENT_TIMESTAMP
|
updated_at = CURRENT_TIMESTAMP
|
||||||
WHERE id = ?`
|
WHERE id = ?`
|
||||||
|
|
||||||
@@ -177,7 +173,6 @@ func (a *App) update(ctx context.Context) error {
|
|||||||
a.ImageID, a.Status,
|
a.ImageID, a.Status,
|
||||||
a.DockerNetwork, a.NtfyTopic, a.SlackWebhook,
|
a.DockerNetwork, a.NtfyTopic, a.SlackWebhook,
|
||||||
a.PreviousImageID,
|
a.PreviousImageID,
|
||||||
a.CPULimit, a.MemoryLimit,
|
|
||||||
a.ID,
|
a.ID,
|
||||||
)
|
)
|
||||||
|
|
||||||
@@ -193,7 +188,6 @@ func (a *App) scan(row *sql.Row) error {
|
|||||||
&a.DockerNetwork, &a.NtfyTopic, &a.SlackWebhook,
|
&a.DockerNetwork, &a.NtfyTopic, &a.SlackWebhook,
|
||||||
&a.WebhookSecretHash,
|
&a.WebhookSecretHash,
|
||||||
&a.PreviousImageID,
|
&a.PreviousImageID,
|
||||||
&a.CPULimit, &a.MemoryLimit,
|
|
||||||
&a.CreatedAt, &a.UpdatedAt,
|
&a.CreatedAt, &a.UpdatedAt,
|
||||||
)
|
)
|
||||||
}
|
}
|
||||||
@@ -212,7 +206,6 @@ func scanApps(appDB *database.Database, rows *sql.Rows) ([]*App, error) {
|
|||||||
&app.DockerNetwork, &app.NtfyTopic, &app.SlackWebhook,
|
&app.DockerNetwork, &app.NtfyTopic, &app.SlackWebhook,
|
||||||
&app.WebhookSecretHash,
|
&app.WebhookSecretHash,
|
||||||
&app.PreviousImageID,
|
&app.PreviousImageID,
|
||||||
&app.CPULimit, &app.MemoryLimit,
|
|
||||||
&app.CreatedAt, &app.UpdatedAt,
|
&app.CreatedAt, &app.UpdatedAt,
|
||||||
)
|
)
|
||||||
if scanErr != nil {
|
if scanErr != nil {
|
||||||
|
|||||||
@@ -1,3 +1,4 @@
|
|||||||
|
//nolint:dupl // Active Record pattern - similar structure to label.go is intentional
|
||||||
package models
|
package models
|
||||||
|
|
||||||
import (
|
import (
|
||||||
@@ -128,48 +129,13 @@ func FindEnvVarsByAppID(
|
|||||||
return envVars, rows.Err()
|
return envVars, rows.Err()
|
||||||
}
|
}
|
||||||
|
|
||||||
// EnvVarPair is a key-value pair for bulk env var operations.
|
// DeleteEnvVarsByAppID deletes all env vars for an app.
|
||||||
type EnvVarPair struct {
|
func DeleteEnvVarsByAppID(
|
||||||
Key string
|
|
||||||
Value string
|
|
||||||
}
|
|
||||||
|
|
||||||
// ReplaceEnvVarsByAppID atomically replaces all env vars for an app
|
|
||||||
// within a single database transaction. It deletes all existing env
|
|
||||||
// vars and inserts the provided pairs. If any operation fails, the
|
|
||||||
// entire transaction is rolled back.
|
|
||||||
func ReplaceEnvVarsByAppID(
|
|
||||||
ctx context.Context,
|
ctx context.Context,
|
||||||
db *database.Database,
|
db *database.Database,
|
||||||
appID string,
|
appID string,
|
||||||
pairs []EnvVarPair,
|
|
||||||
) error {
|
) error {
|
||||||
tx, err := db.BeginTx(ctx, nil)
|
_, err := db.Exec(ctx, "DELETE FROM app_env_vars WHERE app_id = ?", appID)
|
||||||
if err != nil {
|
|
||||||
return fmt.Errorf("beginning transaction: %w", err)
|
|
||||||
}
|
|
||||||
|
|
||||||
defer func() { _ = tx.Rollback() }()
|
return err
|
||||||
|
|
||||||
_, err = tx.ExecContext(ctx, "DELETE FROM app_env_vars WHERE app_id = ?", appID)
|
|
||||||
if err != nil {
|
|
||||||
return fmt.Errorf("deleting env vars: %w", err)
|
|
||||||
}
|
|
||||||
|
|
||||||
for _, p := range pairs {
|
|
||||||
_, err = tx.ExecContext(ctx,
|
|
||||||
"INSERT INTO app_env_vars (app_id, key, value) VALUES (?, ?, ?)",
|
|
||||||
appID, p.Key, p.Value,
|
|
||||||
)
|
|
||||||
if err != nil {
|
|
||||||
return fmt.Errorf("inserting env var %q: %w", p.Key, err)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
err = tx.Commit()
|
|
||||||
if err != nil {
|
|
||||||
return fmt.Errorf("committing transaction: %w", err)
|
|
||||||
}
|
|
||||||
|
|
||||||
return nil
|
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -1,3 +1,4 @@
|
|||||||
|
//nolint:dupl // Active Record pattern - similar structure to env_var.go is intentional
|
||||||
package models
|
package models
|
||||||
|
|
||||||
import (
|
import (
|
||||||
|
|||||||
@@ -781,96 +781,6 @@ func TestCascadeDelete(t *testing.T) {
|
|||||||
})
|
})
|
||||||
}
|
}
|
||||||
|
|
||||||
// Resource Limits Tests.
|
|
||||||
|
|
||||||
func TestAppResourceLimits(t *testing.T) { //nolint:funlen // integration test with multiple subtests
|
|
||||||
t.Parallel()
|
|
||||||
|
|
||||||
t.Run("saves and loads CPU limit", func(t *testing.T) {
|
|
||||||
t.Parallel()
|
|
||||||
|
|
||||||
testDB, cleanup := setupTestDB(t)
|
|
||||||
defer cleanup()
|
|
||||||
|
|
||||||
app := createTestApp(t, testDB)
|
|
||||||
|
|
||||||
app.CPULimit = sql.NullFloat64{Float64: 0.5, Valid: true}
|
|
||||||
|
|
||||||
err := app.Save(context.Background())
|
|
||||||
require.NoError(t, err)
|
|
||||||
|
|
||||||
found, err := models.FindApp(context.Background(), testDB, app.ID)
|
|
||||||
require.NoError(t, err)
|
|
||||||
require.NotNil(t, found)
|
|
||||||
assert.True(t, found.CPULimit.Valid)
|
|
||||||
assert.InDelta(t, 0.5, found.CPULimit.Float64, 0.001)
|
|
||||||
})
|
|
||||||
|
|
||||||
t.Run("saves and loads memory limit", func(t *testing.T) {
|
|
||||||
t.Parallel()
|
|
||||||
|
|
||||||
testDB, cleanup := setupTestDB(t)
|
|
||||||
defer cleanup()
|
|
||||||
|
|
||||||
app := createTestApp(t, testDB)
|
|
||||||
|
|
||||||
app.MemoryLimit = sql.NullInt64{Int64: 536870912, Valid: true} // 512m
|
|
||||||
|
|
||||||
err := app.Save(context.Background())
|
|
||||||
require.NoError(t, err)
|
|
||||||
|
|
||||||
found, err := models.FindApp(context.Background(), testDB, app.ID)
|
|
||||||
require.NoError(t, err)
|
|
||||||
require.NotNil(t, found)
|
|
||||||
assert.True(t, found.MemoryLimit.Valid)
|
|
||||||
assert.Equal(t, int64(536870912), found.MemoryLimit.Int64)
|
|
||||||
})
|
|
||||||
|
|
||||||
t.Run("null limits by default", func(t *testing.T) {
|
|
||||||
t.Parallel()
|
|
||||||
|
|
||||||
testDB, cleanup := setupTestDB(t)
|
|
||||||
defer cleanup()
|
|
||||||
|
|
||||||
app := createTestApp(t, testDB)
|
|
||||||
|
|
||||||
found, err := models.FindApp(context.Background(), testDB, app.ID)
|
|
||||||
require.NoError(t, err)
|
|
||||||
require.NotNil(t, found)
|
|
||||||
assert.False(t, found.CPULimit.Valid)
|
|
||||||
assert.False(t, found.MemoryLimit.Valid)
|
|
||||||
})
|
|
||||||
|
|
||||||
t.Run("clears limits when set to null", func(t *testing.T) {
|
|
||||||
t.Parallel()
|
|
||||||
|
|
||||||
testDB, cleanup := setupTestDB(t)
|
|
||||||
defer cleanup()
|
|
||||||
|
|
||||||
app := createTestApp(t, testDB)
|
|
||||||
|
|
||||||
// Set limits
|
|
||||||
app.CPULimit = sql.NullFloat64{Float64: 1.0, Valid: true}
|
|
||||||
app.MemoryLimit = sql.NullInt64{Int64: 1073741824, Valid: true} // 1g
|
|
||||||
|
|
||||||
err := app.Save(context.Background())
|
|
||||||
require.NoError(t, err)
|
|
||||||
|
|
||||||
// Clear limits
|
|
||||||
app.CPULimit = sql.NullFloat64{}
|
|
||||||
app.MemoryLimit = sql.NullInt64{}
|
|
||||||
|
|
||||||
err = app.Save(context.Background())
|
|
||||||
require.NoError(t, err)
|
|
||||||
|
|
||||||
found, err := models.FindApp(context.Background(), testDB, app.ID)
|
|
||||||
require.NoError(t, err)
|
|
||||||
require.NotNil(t, found)
|
|
||||||
assert.False(t, found.CPULimit.Valid)
|
|
||||||
assert.False(t, found.MemoryLimit.Valid)
|
|
||||||
})
|
|
||||||
}
|
|
||||||
|
|
||||||
// Helper function to create a test app.
|
// Helper function to create a test app.
|
||||||
func createTestApp(t *testing.T, testDB *database.Database) *models.App {
|
func createTestApp(t *testing.T, testDB *database.Database) *models.App {
|
||||||
t.Helper()
|
t.Helper()
|
||||||
|
|||||||
@@ -82,8 +82,10 @@ func (s *Server) SetupRoutes() {
|
|||||||
r.Post("/apps/{id}/stop", s.handlers.HandleAppStop())
|
r.Post("/apps/{id}/stop", s.handlers.HandleAppStop())
|
||||||
r.Post("/apps/{id}/start", s.handlers.HandleAppStart())
|
r.Post("/apps/{id}/start", s.handlers.HandleAppStart())
|
||||||
|
|
||||||
// Environment variables (monolithic bulk save)
|
// Environment variables
|
||||||
r.Post("/apps/{id}/env", s.handlers.HandleEnvVarSave())
|
r.Post("/apps/{id}/env-vars", s.handlers.HandleEnvVarAdd())
|
||||||
|
r.Post("/apps/{id}/env-vars/{varID}/edit", s.handlers.HandleEnvVarEdit())
|
||||||
|
r.Post("/apps/{id}/env-vars/{varID}/delete", s.handlers.HandleEnvVarDelete())
|
||||||
|
|
||||||
// Labels
|
// Labels
|
||||||
r.Post("/apps/{id}/labels", s.handlers.HandleLabelAdd())
|
r.Post("/apps/{id}/labels", s.handlers.HandleLabelAdd())
|
||||||
|
|||||||
@@ -1094,28 +1094,14 @@ func (svc *Service) buildContainerOptions(
|
|||||||
network = app.DockerNetwork.String
|
network = app.DockerNetwork.String
|
||||||
}
|
}
|
||||||
|
|
||||||
var cpuLimit float64
|
|
||||||
|
|
||||||
if app.CPULimit.Valid {
|
|
||||||
cpuLimit = app.CPULimit.Float64
|
|
||||||
}
|
|
||||||
|
|
||||||
var memoryLimit int64
|
|
||||||
|
|
||||||
if app.MemoryLimit.Valid {
|
|
||||||
memoryLimit = app.MemoryLimit.Int64
|
|
||||||
}
|
|
||||||
|
|
||||||
return docker.CreateContainerOptions{
|
return docker.CreateContainerOptions{
|
||||||
Name: "upaas-" + app.Name,
|
Name: "upaas-" + app.Name,
|
||||||
Image: imageID.String(),
|
Image: imageID.String(),
|
||||||
Env: envMap,
|
Env: envMap,
|
||||||
Labels: buildLabelMap(app, labels),
|
Labels: buildLabelMap(app, labels),
|
||||||
Volumes: buildVolumeMounts(volumes),
|
Volumes: buildVolumeMounts(volumes),
|
||||||
Ports: buildPortMappings(ports),
|
Ports: buildPortMappings(ports),
|
||||||
Network: network,
|
Network: network,
|
||||||
CPULimit: cpuLimit,
|
|
||||||
MemoryLimit: memoryLimit,
|
|
||||||
}, nil
|
}, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|||||||
@@ -2,7 +2,6 @@ package deploy_test
|
|||||||
|
|
||||||
import (
|
import (
|
||||||
"context"
|
"context"
|
||||||
"database/sql"
|
|
||||||
"log/slog"
|
"log/slog"
|
||||||
"os"
|
"os"
|
||||||
"testing"
|
"testing"
|
||||||
@@ -44,93 +43,3 @@ func TestBuildContainerOptionsUsesImageID(t *testing.T) {
|
|||||||
t.Errorf("expected Name=%q, got %q", "upaas-myapp", opts.Name)
|
t.Errorf("expected Name=%q, got %q", "upaas-myapp", opts.Name)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func TestBuildContainerOptionsNoResourceLimits(t *testing.T) {
|
|
||||||
t.Parallel()
|
|
||||||
|
|
||||||
db := database.NewTestDatabase(t)
|
|
||||||
|
|
||||||
app := models.NewApp(db)
|
|
||||||
app.Name = "nolimits"
|
|
||||||
|
|
||||||
err := app.Save(context.Background())
|
|
||||||
if err != nil {
|
|
||||||
t.Fatalf("failed to save app: %v", err)
|
|
||||||
}
|
|
||||||
|
|
||||||
log := slog.New(slog.NewTextHandler(os.Stderr, nil))
|
|
||||||
svc := deploy.NewTestService(log)
|
|
||||||
|
|
||||||
opts, err := svc.BuildContainerOptionsExported(
|
|
||||||
context.Background(), app, docker.ImageID("test:latest"),
|
|
||||||
)
|
|
||||||
if err != nil {
|
|
||||||
t.Fatalf("buildContainerOptions returned error: %v", err)
|
|
||||||
}
|
|
||||||
|
|
||||||
if opts.CPULimit != 0 {
|
|
||||||
t.Errorf("expected CPULimit=0, got %v", opts.CPULimit)
|
|
||||||
}
|
|
||||||
|
|
||||||
if opts.MemoryLimit != 0 {
|
|
||||||
t.Errorf("expected MemoryLimit=0, got %v", opts.MemoryLimit)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
func TestBuildContainerOptionsCPULimit(t *testing.T) {
|
|
||||||
t.Parallel()
|
|
||||||
|
|
||||||
db := database.NewTestDatabase(t)
|
|
||||||
|
|
||||||
app := models.NewApp(db)
|
|
||||||
app.Name = "cpulimit"
|
|
||||||
app.CPULimit = sql.NullFloat64{Float64: 0.5, Valid: true}
|
|
||||||
|
|
||||||
err := app.Save(context.Background())
|
|
||||||
if err != nil {
|
|
||||||
t.Fatalf("failed to save app: %v", err)
|
|
||||||
}
|
|
||||||
|
|
||||||
log := slog.New(slog.NewTextHandler(os.Stderr, nil))
|
|
||||||
svc := deploy.NewTestService(log)
|
|
||||||
|
|
||||||
opts, err := svc.BuildContainerOptionsExported(
|
|
||||||
context.Background(), app, docker.ImageID("test:latest"),
|
|
||||||
)
|
|
||||||
if err != nil {
|
|
||||||
t.Fatalf("buildContainerOptions returned error: %v", err)
|
|
||||||
}
|
|
||||||
|
|
||||||
if opts.CPULimit != 0.5 {
|
|
||||||
t.Errorf("expected CPULimit=0.5, got %v", opts.CPULimit)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
func TestBuildContainerOptionsMemoryLimit(t *testing.T) {
|
|
||||||
t.Parallel()
|
|
||||||
|
|
||||||
db := database.NewTestDatabase(t)
|
|
||||||
|
|
||||||
app := models.NewApp(db)
|
|
||||||
app.Name = "memlimit"
|
|
||||||
app.MemoryLimit = sql.NullInt64{Int64: 536870912, Valid: true} // 512m
|
|
||||||
|
|
||||||
err := app.Save(context.Background())
|
|
||||||
if err != nil {
|
|
||||||
t.Fatalf("failed to save app: %v", err)
|
|
||||||
}
|
|
||||||
|
|
||||||
log := slog.New(slog.NewTextHandler(os.Stderr, nil))
|
|
||||||
svc := deploy.NewTestService(log)
|
|
||||||
|
|
||||||
opts, err := svc.BuildContainerOptionsExported(
|
|
||||||
context.Background(), app, docker.ImageID("test:latest"),
|
|
||||||
)
|
|
||||||
if err != nil {
|
|
||||||
t.Fatalf("buildContainerOptions returned error: %v", err)
|
|
||||||
}
|
|
||||||
|
|
||||||
if opts.MemoryLimit != 536870912 {
|
|
||||||
t.Errorf("expected MemoryLimit=536870912, got %v", opts.MemoryLimit)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|||||||
@@ -6,103 +6,6 @@
|
|||||||
*/
|
*/
|
||||||
|
|
||||||
document.addEventListener("alpine:init", () => {
|
document.addEventListener("alpine:init", () => {
|
||||||
// ============================================
|
|
||||||
// Environment Variable Editor Component
|
|
||||||
// ============================================
|
|
||||||
Alpine.data("envVarEditor", (appId) => ({
|
|
||||||
vars: [],
|
|
||||||
editIdx: -1,
|
|
||||||
editKey: "",
|
|
||||||
editVal: "",
|
|
||||||
appId: appId,
|
|
||||||
|
|
||||||
init() {
|
|
||||||
this.vars = Array.from(this.$el.querySelectorAll(".env-init")).map(
|
|
||||||
(span) => ({
|
|
||||||
key: span.dataset.key,
|
|
||||||
value: span.dataset.value,
|
|
||||||
}),
|
|
||||||
);
|
|
||||||
},
|
|
||||||
|
|
||||||
startEdit(i) {
|
|
||||||
this.editIdx = i;
|
|
||||||
this.editKey = this.vars[i].key;
|
|
||||||
this.editVal = this.vars[i].value;
|
|
||||||
},
|
|
||||||
|
|
||||||
saveEdit(i) {
|
|
||||||
this.vars[i] = { key: this.editKey, value: this.editVal };
|
|
||||||
this.editIdx = -1;
|
|
||||||
this.submitAll();
|
|
||||||
},
|
|
||||||
|
|
||||||
removeVar(i) {
|
|
||||||
if (!window.confirm("Delete this environment variable?")) {
|
|
||||||
return;
|
|
||||||
}
|
|
||||||
|
|
||||||
this.vars.splice(i, 1);
|
|
||||||
this.submitAll();
|
|
||||||
},
|
|
||||||
|
|
||||||
addVar(keyEl, valEl) {
|
|
||||||
const k = keyEl.value.trim();
|
|
||||||
const v = valEl.value.trim();
|
|
||||||
|
|
||||||
if (!k) {
|
|
||||||
return;
|
|
||||||
}
|
|
||||||
|
|
||||||
this.vars.push({ key: k, value: v });
|
|
||||||
this.submitAll();
|
|
||||||
},
|
|
||||||
|
|
||||||
submitAll() {
|
|
||||||
const csrfInput = this.$el.querySelector(
|
|
||||||
'input[name="gorilla.csrf.Token"]',
|
|
||||||
);
|
|
||||||
const csrfToken = csrfInput ? csrfInput.value : "";
|
|
||||||
|
|
||||||
fetch("/apps/" + this.appId + "/env", {
|
|
||||||
method: "POST",
|
|
||||||
headers: {
|
|
||||||
"Content-Type": "application/json",
|
|
||||||
"X-CSRF-Token": csrfToken,
|
|
||||||
},
|
|
||||||
body: JSON.stringify(
|
|
||||||
this.vars.map((e) => ({ key: e.key, value: e.value })),
|
|
||||||
),
|
|
||||||
})
|
|
||||||
.then((res) => {
|
|
||||||
if (res.ok) {
|
|
||||||
window.location.reload();
|
|
||||||
return;
|
|
||||||
}
|
|
||||||
res.json()
|
|
||||||
.then((data) => {
|
|
||||||
window.alert(
|
|
||||||
data.error ||
|
|
||||||
"Failed to save environment variables.",
|
|
||||||
);
|
|
||||||
})
|
|
||||||
.catch(() => {
|
|
||||||
window.alert(
|
|
||||||
"Failed to save environment variables.",
|
|
||||||
);
|
|
||||||
});
|
|
||||||
})
|
|
||||||
.catch(() => {
|
|
||||||
window.alert(
|
|
||||||
"Network error: could not save environment variables.",
|
|
||||||
);
|
|
||||||
});
|
|
||||||
},
|
|
||||||
}));
|
|
||||||
|
|
||||||
// ============================================
|
|
||||||
// App Detail Page Component
|
|
||||||
// ============================================
|
|
||||||
Alpine.data("appDetail", (config) => ({
|
Alpine.data("appDetail", (config) => ({
|
||||||
appId: config.appId,
|
appId: config.appId,
|
||||||
currentDeploymentId: config.initialDeploymentId,
|
currentDeploymentId: config.initialDeploymentId,
|
||||||
|
|||||||
@@ -101,10 +101,9 @@
|
|||||||
</div>
|
</div>
|
||||||
|
|
||||||
<!-- Environment Variables -->
|
<!-- Environment Variables -->
|
||||||
<div class="card p-6 mb-6" x-data="envVarEditor('{{.App.ID}}')">
|
<div class="card p-6 mb-6">
|
||||||
<h2 class="section-title mb-4">Environment Variables</h2>
|
<h2 class="section-title mb-4">Environment Variables</h2>
|
||||||
{{range .EnvVars}}<span class="env-init hidden" data-key="{{.Key}}" data-value="{{.Value}}"></span>{{end}}
|
{{if .EnvVars}}
|
||||||
<template x-if="vars.length > 0">
|
|
||||||
<div class="overflow-x-auto mb-4">
|
<div class="overflow-x-auto mb-4">
|
||||||
<table class="table">
|
<table class="table">
|
||||||
<thead class="table-header">
|
<thead class="table-header">
|
||||||
@@ -115,43 +114,47 @@
|
|||||||
</tr>
|
</tr>
|
||||||
</thead>
|
</thead>
|
||||||
<tbody class="table-body">
|
<tbody class="table-body">
|
||||||
<template x-for="(env, idx) in vars" :key="idx">
|
{{range .EnvVars}}
|
||||||
<tr>
|
<tr x-data="{ editing: false }">
|
||||||
<template x-if="editIdx !== idx">
|
<template x-if="!editing">
|
||||||
<td class="font-mono font-medium" x-text="env.key"></td>
|
<td class="font-mono font-medium">{{.Key}}</td>
|
||||||
</template>
|
</template>
|
||||||
<template x-if="editIdx !== idx">
|
<template x-if="!editing">
|
||||||
<td class="font-mono text-gray-500" x-text="env.value"></td>
|
<td class="font-mono text-gray-500">{{.Value}}</td>
|
||||||
</template>
|
</template>
|
||||||
<template x-if="editIdx !== idx">
|
<template x-if="!editing">
|
||||||
<td class="text-right">
|
<td class="text-right">
|
||||||
<button @click="startEdit(idx)" class="text-primary-600 hover:text-primary-800 text-sm mr-2">Edit</button>
|
<button @click="editing = true" class="text-primary-600 hover:text-primary-800 text-sm mr-2">Edit</button>
|
||||||
<button @click="removeVar(idx)" class="text-error-500 hover:text-error-700 text-sm">Delete</button>
|
<form method="POST" action="/apps/{{$.App.ID}}/env-vars/{{.ID}}/delete" class="inline" x-data="confirmAction('Delete this environment variable?')" @submit="confirm($event)">
|
||||||
|
{{ $.CSRFField }}
|
||||||
|
<button type="submit" class="text-error-500 hover:text-error-700 text-sm">Delete</button>
|
||||||
|
</form>
|
||||||
</td>
|
</td>
|
||||||
</template>
|
</template>
|
||||||
<template x-if="editIdx === idx">
|
<template x-if="editing">
|
||||||
<td colspan="3">
|
<td colspan="3">
|
||||||
<form @submit.prevent="saveEdit(idx)" class="flex gap-2 items-center">
|
<form method="POST" action="/apps/{{$.App.ID}}/env-vars/{{.ID}}/edit" class="flex gap-2 items-center">
|
||||||
<input type="text" x-model="editKey" required class="input flex-1 font-mono text-sm">
|
{{ $.CSRFField }}
|
||||||
<input type="text" x-model="editVal" required class="input flex-1 font-mono text-sm">
|
<input type="text" name="key" value="{{.Key}}" required class="input flex-1 font-mono text-sm">
|
||||||
|
<input type="text" name="value" value="{{.Value}}" required class="input flex-1 font-mono text-sm">
|
||||||
<button type="submit" class="btn-primary text-sm">Save</button>
|
<button type="submit" class="btn-primary text-sm">Save</button>
|
||||||
<button type="button" @click="editIdx = -1" class="text-gray-500 hover:text-gray-700 text-sm">Cancel</button>
|
<button type="button" @click="editing = false" class="text-gray-500 hover:text-gray-700 text-sm">Cancel</button>
|
||||||
</form>
|
</form>
|
||||||
<p class="text-xs text-amber-600 mt-1">⚠ Container restart needed after env var changes.</p>
|
<p class="text-xs text-amber-600 mt-1">⚠ Container restart needed after env var changes.</p>
|
||||||
</td>
|
</td>
|
||||||
</template>
|
</template>
|
||||||
</tr>
|
</tr>
|
||||||
</template>
|
{{end}}
|
||||||
</tbody>
|
</tbody>
|
||||||
</table>
|
</table>
|
||||||
</div>
|
</div>
|
||||||
</template>
|
{{end}}
|
||||||
<form @submit.prevent="addVar($refs.newKey, $refs.newVal)" class="flex flex-col sm:flex-row gap-2">
|
<form method="POST" action="/apps/{{.App.ID}}/env" class="flex flex-col sm:flex-row gap-2">
|
||||||
<input x-ref="newKey" type="text" placeholder="KEY" required class="input flex-1 font-mono text-sm">
|
{{ .CSRFField }}
|
||||||
<input x-ref="newVal" type="text" placeholder="value" required class="input flex-1 font-mono text-sm">
|
<input type="text" name="key" placeholder="KEY" required class="input flex-1 font-mono text-sm">
|
||||||
|
<input type="text" name="value" placeholder="value" required class="input flex-1 font-mono text-sm">
|
||||||
<button type="submit" class="btn-primary">Add</button>
|
<button type="submit" class="btn-primary">Add</button>
|
||||||
</form>
|
</form>
|
||||||
<div class="hidden">{{ .CSRFField }}</div>
|
|
||||||
</div>
|
</div>
|
||||||
|
|
||||||
<!-- Labels -->
|
<!-- Labels -->
|
||||||
|
|||||||
@@ -114,38 +114,6 @@
|
|||||||
>
|
>
|
||||||
</div>
|
</div>
|
||||||
|
|
||||||
<hr class="border-gray-200">
|
|
||||||
|
|
||||||
<h3 class="text-lg font-medium text-gray-900">Resource Limits</h3>
|
|
||||||
|
|
||||||
<div class="grid grid-cols-2 gap-4">
|
|
||||||
<div class="form-group">
|
|
||||||
<label for="cpu_limit" class="label">CPU Limit (cores)</label>
|
|
||||||
<input
|
|
||||||
type="text"
|
|
||||||
id="cpu_limit"
|
|
||||||
name="cpu_limit"
|
|
||||||
value="{{if .App.CPULimit.Valid}}{{.App.CPULimit.Float64}}{{end}}"
|
|
||||||
class="input"
|
|
||||||
placeholder="e.g. 0.5, 1, 2"
|
|
||||||
>
|
|
||||||
<p class="text-sm text-gray-500 mt-1">Number of CPU cores (e.g. 0.5 = half a core)</p>
|
|
||||||
</div>
|
|
||||||
|
|
||||||
<div class="form-group">
|
|
||||||
<label for="memory_limit" class="label">Memory Limit</label>
|
|
||||||
<input
|
|
||||||
type="text"
|
|
||||||
id="memory_limit"
|
|
||||||
name="memory_limit"
|
|
||||||
value="{{if .App.MemoryLimit.Valid}}{{formatMemoryBytes .App.MemoryLimit.Int64}}{{end}}"
|
|
||||||
class="input"
|
|
||||||
placeholder="e.g. 256m, 1g"
|
|
||||||
>
|
|
||||||
<p class="text-sm text-gray-500 mt-1">Memory with unit suffix (k, m, g) or plain bytes</p>
|
|
||||||
</div>
|
|
||||||
</div>
|
|
||||||
|
|
||||||
<div class="flex justify-end gap-3 pt-4">
|
<div class="flex justify-end gap-3 pt-4">
|
||||||
<a href="/apps/{{.App.ID}}" class="btn-secondary">Cancel</a>
|
<a href="/apps/{{.App.ID}}" class="btn-secondary">Cancel</a>
|
||||||
<button type="submit" class="btn-primary">Save Changes</button>
|
<button type="submit" class="btn-primary">Save Changes</button>
|
||||||
|
|||||||
@@ -6,7 +6,6 @@ import (
|
|||||||
"fmt"
|
"fmt"
|
||||||
"html/template"
|
"html/template"
|
||||||
"io"
|
"io"
|
||||||
"strconv"
|
|
||||||
"sync"
|
"sync"
|
||||||
)
|
)
|
||||||
|
|
||||||
@@ -24,34 +23,6 @@ var (
|
|||||||
templatesMutex sync.RWMutex
|
templatesMutex sync.RWMutex
|
||||||
)
|
)
|
||||||
|
|
||||||
// templateFuncs returns the custom template function map.
|
|
||||||
func templateFuncs() template.FuncMap {
|
|
||||||
return template.FuncMap{
|
|
||||||
"formatMemoryBytes": formatMemoryBytes,
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// Memory unit constants.
|
|
||||||
const (
|
|
||||||
memGigabyte = 1024 * 1024 * 1024
|
|
||||||
memMegabyte = 1024 * 1024
|
|
||||||
memKilobyte = 1024
|
|
||||||
)
|
|
||||||
|
|
||||||
// formatMemoryBytes formats bytes into a human-readable string with unit suffix.
|
|
||||||
func formatMemoryBytes(bytes int64) string {
|
|
||||||
switch {
|
|
||||||
case bytes >= memGigabyte && bytes%memGigabyte == 0:
|
|
||||||
return strconv.FormatInt(bytes/memGigabyte, 10) + "g"
|
|
||||||
case bytes >= memMegabyte && bytes%memMegabyte == 0:
|
|
||||||
return strconv.FormatInt(bytes/memMegabyte, 10) + "m"
|
|
||||||
case bytes >= memKilobyte && bytes%memKilobyte == 0:
|
|
||||||
return strconv.FormatInt(bytes/memKilobyte, 10) + "k"
|
|
||||||
default:
|
|
||||||
return strconv.FormatInt(bytes, 10)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// initTemplates parses base template and creates cloned templates for each page.
|
// initTemplates parses base template and creates cloned templates for each page.
|
||||||
func initTemplates() {
|
func initTemplates() {
|
||||||
templatesMutex.Lock()
|
templatesMutex.Lock()
|
||||||
@@ -61,10 +32,8 @@ func initTemplates() {
|
|||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
// Parse base template with shared components and custom functions
|
// Parse base template with shared components
|
||||||
baseTemplate = template.Must(
|
baseTemplate = template.Must(template.ParseFS(templatesRaw, "base.html"))
|
||||||
template.New("base.html").Funcs(templateFuncs()).ParseFS(templatesRaw, "base.html"),
|
|
||||||
)
|
|
||||||
|
|
||||||
// Pages that extend base
|
// Pages that extend base
|
||||||
pages := []string{
|
pages := []string{
|
||||||
|
|||||||
@@ -1,34 +0,0 @@
|
|||||||
package templates //nolint:testpackage // tests unexported formatMemoryBytes
|
|
||||||
|
|
||||||
import (
|
|
||||||
"testing"
|
|
||||||
)
|
|
||||||
|
|
||||||
func TestFormatMemoryBytes(t *testing.T) {
|
|
||||||
t.Parallel()
|
|
||||||
|
|
||||||
tests := []struct {
|
|
||||||
name string
|
|
||||||
bytes int64
|
|
||||||
expected string
|
|
||||||
}{
|
|
||||||
{"gigabytes", 1024 * 1024 * 1024, "1g"},
|
|
||||||
{"two gigabytes", 2 * 1024 * 1024 * 1024, "2g"},
|
|
||||||
{"megabytes", 256 * 1024 * 1024, "256m"},
|
|
||||||
{"kilobytes", 512 * 1024, "512k"},
|
|
||||||
{"plain bytes", 12345, "12345"},
|
|
||||||
{"non-even megabytes", 256*1024*1024 + 1, "268435457"},
|
|
||||||
{"zero", 0, "0"},
|
|
||||||
}
|
|
||||||
|
|
||||||
for _, tt := range tests {
|
|
||||||
t.Run(tt.name, func(t *testing.T) {
|
|
||||||
t.Parallel()
|
|
||||||
|
|
||||||
got := formatMemoryBytes(tt.bytes)
|
|
||||||
if got != tt.expected {
|
|
||||||
t.Errorf("formatMemoryBytes(%d) = %q, want %q", tt.bytes, got, tt.expected)
|
|
||||||
}
|
|
||||||
})
|
|
||||||
}
|
|
||||||
}
|
|
||||||
Reference in New Issue
Block a user