everything-dev
Version:
A consolidated product package for building Module Federation apps with oRPC APIs.
138 lines (136 loc) • 5.28 kB
JavaScript
const require_runtime = require('../_virtual/_rolldown/runtime.cjs');
let node_fs = require("node:fs");
let node_path = require("node:path");
let node_crypto = require("node:crypto");
let _clack_prompts = require("@clack/prompts");
_clack_prompts = require_runtime.__toESM(_clack_prompts, 1);
let dotenv = require("dotenv");
//#region src/cli/infra.ts
const POSTGRES_USER = "everythingdev";
const POSTGRES_PASSWORD = "everythingdev";
const API_DATABASE_SECRET = "API_DATABASE_URL";
const AUTH_DATABASE_SECRET = "AUTH_DATABASE_URL";
const BASE_DATABASE_PORT = 5434;
function uniqueSecrets(values) {
const secrets = [];
const seen = /* @__PURE__ */ new Set();
for (const value of values) {
if (!value || seen.has(value)) continue;
seen.add(value);
secrets.push(value);
}
return secrets;
}
function getRuntimeSecrets(runtimeConfig) {
const pluginSecrets = Object.values(runtimeConfig.plugins ?? {}).flatMap((plugin) => plugin.secrets ?? []);
return uniqueSecrets([
API_DATABASE_SECRET,
AUTH_DATABASE_SECRET,
...runtimeConfig.api.secrets ?? [],
...runtimeConfig.auth?.secrets ?? [],
...pluginSecrets
]);
}
function normalizeDatabaseSlug(secret) {
return secret.replace(/_DATABASE_URL$/, "").toLowerCase();
}
function buildDatabaseConfigs(secrets) {
return [
API_DATABASE_SECRET,
AUTH_DATABASE_SECRET,
...uniqueSecrets(secrets.filter((secret) => secret.endsWith("_DATABASE_URL"))).filter((secret) => secret !== API_DATABASE_SECRET && secret !== AUTH_DATABASE_SECRET).sort((a, b) => a.localeCompare(b))
].map((secret, index) => {
const slug = normalizeDatabaseSlug(secret);
const port = secret === API_DATABASE_SECRET ? 5432 : secret === AUTH_DATABASE_SECRET ? 5433 : BASE_DATABASE_PORT + index - 2;
return {
secret,
slug,
port,
serviceName: `postgres-${slug.replace(/_/g, "-")}`,
databaseName: `${slug}_db`,
volumeName: `postgres_${slug}_data`,
url: `postgres://${POSTGRES_USER}:${POSTGRES_PASSWORD}@localhost:${port}/${slug}_db`
};
});
}
function defaultSecretValue(secret, databases, options) {
if (secret === "BETTER_AUTH_SECRET") return options.forExample ? "" : (0, node_crypto.randomBytes)(32).toString("base64url");
if (secret === "CORS_ORIGIN") return "http://localhost:3000";
return databases.get(secret)?.url ?? "";
}
function renderEnvFile(secrets, databases, options) {
const databaseMap = new Map(databases.map((entry) => [entry.secret, entry]));
const lines = [
"# Generated from configured bos secrets",
"# Update values as needed for your local environment",
""
];
for (const secret of secrets) lines.push(`${secret}=${defaultSecretValue(secret, databaseMap, options)}`);
return `${lines.join("\n")}\n`;
}
function renderDockerCompose(databases) {
const lines = [
"x-pg-common: &pg-common",
" image: postgres:17-alpine",
" environment: &pg-env",
` POSTGRES_USER: ${POSTGRES_USER}`,
` POSTGRES_PASSWORD: ${POSTGRES_PASSWORD}`,
" healthcheck:",
" test: [\"CMD-SHELL\", \"pg_isready -U everythingdev\"]",
" interval: 3s",
" timeout: 3s",
" retries: 5",
"",
"services:"
];
for (const database of databases) {
lines.push(` ${database.serviceName}:`);
lines.push(" <<: *pg-common");
lines.push(" environment:");
lines.push(" <<: *pg-env");
lines.push(` POSTGRES_DB: ${database.databaseName}`);
lines.push(" ports:");
lines.push(` - "${database.port}:5432"`);
lines.push(" volumes:");
lines.push(` - ${database.volumeName}:/var/lib/postgresql/data`);
lines.push("");
}
lines.push("volumes:");
for (const database of databases) lines.push(` ${database.volumeName}:`);
return `${lines.join("\n")}\n`;
}
function writeGeneratedInfra(configDir, runtimeConfig) {
const secrets = getRuntimeSecrets(runtimeConfig);
const databases = buildDatabaseConfigs(secrets);
const envExamplePath = (0, node_path.join)(configDir, ".env.example");
const dockerComposePath = (0, node_path.join)(configDir, "docker-compose.yml");
(0, node_fs.writeFileSync)(envExamplePath, renderEnvFile(secrets, databases, { forExample: true }));
(0, node_fs.writeFileSync)(dockerComposePath, renderDockerCompose(databases));
return secrets;
}
function ensureEnvFile(configDir) {
const envPath = (0, node_path.join)(configDir, ".env");
const examplePath = (0, node_path.join)(configDir, ".env.example");
if ((0, node_fs.existsSync)(envPath) || !(0, node_fs.existsSync)(examplePath)) return;
const lines = (0, node_fs.readFileSync)(examplePath, "utf-8").split("\n");
const secret = (0, node_crypto.randomBytes)(32).toString("base64url");
(0, node_fs.writeFileSync)(envPath, lines.map((line) => {
if (/^BETTER_AUTH_SECRET=/.test(line)) return `BETTER_AUTH_SECRET=${secret}`;
return line;
}).join("\n"));
_clack_prompts.log.info("Created .env from generated .env.example with generated BETTER_AUTH_SECRET");
}
function loadProjectEnv(configDir) {
const envPath = (0, node_path.join)(configDir, ".env");
if (!(0, node_fs.existsSync)(envPath)) return;
(0, dotenv.config)({
path: envPath,
processEnv: process.env,
quiet: true
});
}
//#endregion
exports.ensureEnvFile = ensureEnvFile;
exports.loadProjectEnv = loadProjectEnv;
exports.writeGeneratedInfra = writeGeneratedInfra;
//# sourceMappingURL=infra.cjs.map