UNPKG

everything-dev

Version:

A consolidated product package for building Module Federation apps with oRPC APIs.

134 lines (132 loc) 4.88 kB
import { existsSync, readFileSync, writeFileSync } from "node:fs"; import { join } from "node:path"; import { randomBytes } from "node:crypto"; import * as p from "@clack/prompts"; import { config } from "dotenv"; //#region src/cli/infra.ts const POSTGRES_USER = "everythingdev"; const POSTGRES_PASSWORD = "everythingdev"; const API_DATABASE_SECRET = "API_DATABASE_URL"; const AUTH_DATABASE_SECRET = "AUTH_DATABASE_URL"; const BASE_DATABASE_PORT = 5434; function uniqueSecrets(values) { const secrets = []; const seen = /* @__PURE__ */ new Set(); for (const value of values) { if (!value || seen.has(value)) continue; seen.add(value); secrets.push(value); } return secrets; } function getRuntimeSecrets(runtimeConfig) { const pluginSecrets = Object.values(runtimeConfig.plugins ?? {}).flatMap((plugin) => plugin.secrets ?? []); return uniqueSecrets([ API_DATABASE_SECRET, AUTH_DATABASE_SECRET, ...runtimeConfig.api.secrets ?? [], ...runtimeConfig.auth?.secrets ?? [], ...pluginSecrets ]); } function normalizeDatabaseSlug(secret) { return secret.replace(/_DATABASE_URL$/, "").toLowerCase(); } function buildDatabaseConfigs(secrets) { return [ API_DATABASE_SECRET, AUTH_DATABASE_SECRET, ...uniqueSecrets(secrets.filter((secret) => secret.endsWith("_DATABASE_URL"))).filter((secret) => secret !== API_DATABASE_SECRET && secret !== AUTH_DATABASE_SECRET).sort((a, b) => a.localeCompare(b)) ].map((secret, index) => { const slug = normalizeDatabaseSlug(secret); const port = secret === API_DATABASE_SECRET ? 5432 : secret === AUTH_DATABASE_SECRET ? 5433 : BASE_DATABASE_PORT + index - 2; return { secret, slug, port, serviceName: `postgres-${slug.replace(/_/g, "-")}`, databaseName: `${slug}_db`, volumeName: `postgres_${slug}_data`, url: `postgres://${POSTGRES_USER}:${POSTGRES_PASSWORD}@localhost:${port}/${slug}_db` }; }); } function defaultSecretValue(secret, databases, options) { if (secret === "BETTER_AUTH_SECRET") return options.forExample ? "" : randomBytes(32).toString("base64url"); if (secret === "CORS_ORIGIN") return "http://localhost:3000"; return databases.get(secret)?.url ?? ""; } function renderEnvFile(secrets, databases, options) { const databaseMap = new Map(databases.map((entry) => [entry.secret, entry])); const lines = [ "# Generated from configured bos secrets", "# Update values as needed for your local environment", "" ]; for (const secret of secrets) lines.push(`${secret}=${defaultSecretValue(secret, databaseMap, options)}`); return `${lines.join("\n")}\n`; } function renderDockerCompose(databases) { const lines = [ "x-pg-common: &pg-common", " image: postgres:17-alpine", " environment: &pg-env", ` POSTGRES_USER: ${POSTGRES_USER}`, ` POSTGRES_PASSWORD: ${POSTGRES_PASSWORD}`, " healthcheck:", " test: [\"CMD-SHELL\", \"pg_isready -U everythingdev\"]", " interval: 3s", " timeout: 3s", " retries: 5", "", "services:" ]; for (const database of databases) { lines.push(` ${database.serviceName}:`); lines.push(" <<: *pg-common"); lines.push(" environment:"); lines.push(" <<: *pg-env"); lines.push(` POSTGRES_DB: ${database.databaseName}`); lines.push(" ports:"); lines.push(` - "${database.port}:5432"`); lines.push(" volumes:"); lines.push(` - ${database.volumeName}:/var/lib/postgresql/data`); lines.push(""); } lines.push("volumes:"); for (const database of databases) lines.push(` ${database.volumeName}:`); return `${lines.join("\n")}\n`; } function writeGeneratedInfra(configDir, runtimeConfig) { const secrets = getRuntimeSecrets(runtimeConfig); const databases = buildDatabaseConfigs(secrets); const envExamplePath = join(configDir, ".env.example"); const dockerComposePath = join(configDir, "docker-compose.yml"); writeFileSync(envExamplePath, renderEnvFile(secrets, databases, { forExample: true })); writeFileSync(dockerComposePath, renderDockerCompose(databases)); return secrets; } function ensureEnvFile(configDir) { const envPath = join(configDir, ".env"); const examplePath = join(configDir, ".env.example"); if (existsSync(envPath) || !existsSync(examplePath)) return; const lines = readFileSync(examplePath, "utf-8").split("\n"); const secret = randomBytes(32).toString("base64url"); writeFileSync(envPath, lines.map((line) => { if (/^BETTER_AUTH_SECRET=/.test(line)) return `BETTER_AUTH_SECRET=${secret}`; return line; }).join("\n")); p.log.info("Created .env from generated .env.example with generated BETTER_AUTH_SECRET"); } function loadProjectEnv(configDir) { const envPath = join(configDir, ".env"); if (!existsSync(envPath)) return; config({ path: envPath, processEnv: process.env, quiet: true }); } //#endregion export { ensureEnvFile, loadProjectEnv, writeGeneratedInfra }; //# sourceMappingURL=infra.mjs.map