1use std::path::{Path, PathBuf};
6
7use anyhow::Context;
8use serde_json::Value;
9use sha2::{Digest, Sha256};
10
11use crate::plan::{ResolvedPackInfo, SetupPlanMetadata};
12use crate::{bundle, bundle_source::BundleSource, discovery};
13
14use super::plan_builders::compute_simple_hash;
15use super::types::SetupConfig;
16
17pub fn execute_create_bundle(
19 bundle_path: &Path,
20 metadata: &SetupPlanMetadata,
21) -> anyhow::Result<()> {
22 bundle::create_demo_bundle_structure(bundle_path, metadata.bundle_name.as_deref())
23 .context("failed to create bundle structure")
24}
25
26pub fn execute_resolve_packs(
28 _bundle_path: &Path,
29 metadata: &SetupPlanMetadata,
30) -> anyhow::Result<Vec<ResolvedPackInfo>> {
31 let mut resolved = Vec::new();
32 let mut failures = Vec::new();
33
34 for pack_ref in &metadata.pack_refs {
35 match resolve_pack_ref(pack_ref) {
36 Ok(resolved_path) => {
37 let canonical = resolved_path
38 .canonicalize()
39 .unwrap_or(resolved_path.clone());
40 let pack_meta = discovery::read_pack_meta(&canonical)?;
41 resolved.push(ResolvedPackInfo {
42 source_ref: pack_ref.clone(),
43 mapped_ref: canonical.display().to_string(),
44 resolved_digest: compute_file_digest(&canonical)
45 .unwrap_or_else(|_| format!("sha256:{}", compute_simple_hash(pack_ref))),
46 pack_id: pack_meta.map(|meta| meta.pack_id).unwrap_or_else(|| {
47 canonical
48 .file_stem()
49 .and_then(|s| s.to_str())
50 .unwrap_or("unknown")
51 .to_string()
52 }),
53 entry_flows: Vec::new(),
54 cached_path: canonical.clone(),
55 output_path: canonical,
56 });
57 }
58 Err(err) => {
59 failures.push(format!("{pack_ref}: {err}"));
60 }
61 }
62 }
63
64 if !failures.is_empty() {
65 anyhow::bail!(
66 "failed to resolve {} pack ref(s):\n{}",
67 failures.len(),
68 failures.join("\n")
69 );
70 }
71
72 Ok(resolved)
73}
74
75pub fn execute_add_packs_to_bundle(
77 bundle_path: &Path,
78 resolved_packs: &[ResolvedPackInfo],
79) -> anyhow::Result<()> {
80 let mut metadata_entries = Vec::new();
81
82 for pack in resolved_packs {
83 let target_dir = get_pack_target_dir(bundle_path, &pack.pack_id);
85 std::fs::create_dir_all(&target_dir)?;
86
87 let target_path = target_dir.join(format!("{}.gtpack", pack.pack_id));
88 if pack.cached_path.exists() && !target_path.exists() {
89 std::fs::copy(&pack.cached_path, &target_path).with_context(|| {
90 format!(
91 "failed to copy pack {} to {}",
92 pack.cached_path.display(),
93 target_path.display()
94 )
95 })?;
96 }
97
98 let reference = target_path
99 .strip_prefix(bundle_path)
100 .unwrap_or(&target_path)
101 .to_string_lossy()
102 .replace('\\', "/");
103 let kind = if reference.starts_with("providers/") {
104 bundle::BundleReferenceKind::ExtensionProvider
105 } else {
106 bundle::BundleReferenceKind::AppPack
107 };
108 metadata_entries.push(bundle::BundleReference {
109 kind,
110 reference,
111 digest: Some(pack.resolved_digest.clone()),
112 });
113 }
114
115 bundle::register_bundle_references(bundle_path, &metadata_entries, None)?;
116 Ok(())
117}
118
119pub fn get_pack_target_dir(bundle_path: &Path, pack_id: &str) -> PathBuf {
124 const DOMAIN_PREFIXES: &[&str] = &[
125 "messaging-",
126 "events-",
127 "oauth-",
128 "secrets-",
129 "mcp-",
130 "state-",
131 ];
132
133 for prefix in DOMAIN_PREFIXES {
134 if pack_id.starts_with(prefix) {
135 let domain = prefix.trim_end_matches('-');
136 return bundle_path.join("providers").join(domain);
137 }
138 }
139
140 bundle_path.join("packs")
142}
143
144pub fn execute_apply_pack_setup(
146 bundle_path: &Path,
147 metadata: &SetupPlanMetadata,
148 config: &SetupConfig,
149) -> anyhow::Result<usize> {
150 let mut count = 0;
151
152 if !metadata.providers_remove.is_empty() {
153 count += execute_remove_provider_artifacts(bundle_path, &metadata.providers_remove)?;
154 }
155
156 auto_install_provider_packs(bundle_path, metadata);
159
160 let discovered = if bundle_path.exists() {
162 discovery::discover(bundle_path).ok()
163 } else {
164 None
165 };
166
167 for (provider_id, answers) in &metadata.setup_answers {
169 let config_dir = bundle_path.join("state").join("config").join(provider_id);
171 std::fs::create_dir_all(&config_dir)?;
172
173 let config_path = config_dir.join("setup-answers.json");
174 let content =
175 serde_json::to_string_pretty(answers).context("failed to serialize setup answers")?;
176 std::fs::write(&config_path, content).with_context(|| {
177 format!(
178 "failed to write setup answers to: {}",
179 config_path.display()
180 )
181 })?;
182
183 let pack_path = discovered.as_ref().and_then(|d| {
186 d.find_setup_target(provider_id)
187 .map(|p| p.pack_path.as_path())
188 });
189 let env = crate::resolve_env(Some(&config.env));
190 if config.verbose {
191 let team_display = config.team.as_deref().unwrap_or("(none)");
192 println!(
193 " [secrets] scope: env={env}, tenant={}, team={team_display}, provider={provider_id}",
194 config.tenant
195 );
196 let example_uri = crate::canonical_secret_uri(
197 &env,
198 &config.tenant,
199 config.team.as_deref(),
200 provider_id,
201 "_example_key",
202 );
203 println!(" [secrets] URI pattern: {example_uri}");
204 if let Some(config_map) = answers.as_object() {
205 let keys: Vec<&String> = config_map.keys().collect();
206 println!(" [secrets] answer keys: {keys:?}");
207 }
208 }
209 let rt = tokio::runtime::Runtime::new()
210 .context("failed to create tokio runtime for secrets persistence")?;
211 let persisted = rt.block_on(crate::qa::persist::persist_all_config_as_secrets(
212 bundle_path,
213 &env,
214 &config.tenant,
215 config.team.as_deref(),
216 provider_id,
217 answers,
218 pack_path,
219 ))?;
220 if config.verbose {
221 if persisted.is_empty() {
222 println!(
223 " [secrets] WARNING: 0 key(s) persisted for {provider_id} (all values empty?)"
224 );
225 } else {
226 println!(
227 " [secrets] persisted {} key(s) for {provider_id}: {:?}",
228 persisted.len(),
229 persisted
230 );
231 }
232 }
233
234 match crate::tenant_config::sync_oauth_to_tenant_config(
236 bundle_path,
237 &config.tenant,
238 provider_id,
239 answers,
240 ) {
241 Ok(true) => {
242 if config.verbose {
243 println!(" [oauth] updated tenant config for {provider_id}");
244 }
245 }
246 Ok(false) => {}
247 Err(e) => {
248 println!(" [oauth] WARNING: failed to update tenant config: {e}");
249 }
250 }
251
252 if let Some(result) = crate::webhook::register_webhook(
254 provider_id,
255 answers,
256 &config.tenant,
257 config.team.as_deref(),
258 ) {
259 let ok = result.get("ok").and_then(Value::as_bool).unwrap_or(false);
260 if ok {
261 println!(" [webhook] registered for {provider_id}");
262 } else {
263 let err = result
264 .get("error")
265 .and_then(Value::as_str)
266 .unwrap_or("unknown");
267 println!(" [webhook] WARNING: registration failed for {provider_id}: {err}");
268 }
269 }
270
271 count += 1;
272 }
273
274 crate::platform_setup::persist_static_routes_artifact(bundle_path, &metadata.static_routes)?;
275 let _ = crate::deployment_targets::persist_explicit_deployment_targets(
276 bundle_path,
277 &metadata.deployment_targets,
278 );
279
280 let provider_configs: Vec<(String, Value)> = metadata
282 .setup_answers
283 .iter()
284 .map(|(id, val)| (id.clone(), val.clone()))
285 .collect();
286 let team = config.team.as_deref().unwrap_or("default");
287 crate::webhook::print_post_setup_instructions(&provider_configs, &config.tenant, team);
288
289 Ok(count)
290}
291
292fn compute_file_digest(path: &Path) -> anyhow::Result<String> {
293 let bytes = std::fs::read(path).with_context(|| format!("read {}", path.display()))?;
294 let digest = Sha256::digest(bytes);
295 let encoded = digest
296 .iter()
297 .map(|byte| format!("{byte:02x}"))
298 .collect::<String>();
299 Ok(format!("sha256:{encoded}"))
300}
301
302fn resolve_pack_ref(pack_ref: &str) -> anyhow::Result<PathBuf> {
303 let source = BundleSource::parse(pack_ref)?;
304 let resolved = source.resolve()?;
305
306 if resolved.extension().and_then(|ext| ext.to_str()) != Some("gtpack") {
307 anyhow::bail!(
308 "resolved pack ref is not a .gtpack file: {}",
309 resolved.display()
310 );
311 }
312
313 Ok(resolved)
314}
315
316pub fn execute_remove_provider_artifacts(
318 bundle_path: &Path,
319 providers_remove: &[String],
320) -> anyhow::Result<usize> {
321 let mut removed = 0usize;
322 let discovered = discovery::discover(bundle_path).ok();
323 for provider_id in providers_remove {
324 if let Some(discovered) = discovered.as_ref()
325 && let Some(provider) = discovered
326 .providers
327 .iter()
328 .find(|provider| provider.provider_id == *provider_id)
329 {
330 if provider.pack_path.exists() {
331 std::fs::remove_file(&provider.pack_path).with_context(|| {
332 format!(
333 "failed to remove provider pack {}",
334 provider.pack_path.display()
335 )
336 })?;
337 }
338 removed += 1;
339 } else {
340 let target_dir = get_pack_target_dir(bundle_path, provider_id);
341 let target_path = target_dir.join(format!("{provider_id}.gtpack"));
342 if target_path.exists() {
343 std::fs::remove_file(&target_path).with_context(|| {
344 format!("failed to remove provider pack {}", target_path.display())
345 })?;
346 removed += 1;
347 }
348 }
349
350 let config_dir = bundle_path.join("state").join("config").join(provider_id);
351 if config_dir.exists() {
352 std::fs::remove_dir_all(&config_dir).with_context(|| {
353 format!(
354 "failed to remove provider config dir {}",
355 config_dir.display()
356 )
357 })?;
358 }
359 }
360 Ok(removed)
361}
362
363pub fn auto_install_provider_packs(bundle_path: &Path, metadata: &SetupPlanMetadata) {
366 let bundle_abs =
367 std::fs::canonicalize(bundle_path).unwrap_or_else(|_| bundle_path.to_path_buf());
368
369 for provider_id in metadata.setup_answers.keys() {
370 let target_dir = get_pack_target_dir(bundle_path, provider_id);
371 let target_path = target_dir.join(format!("{provider_id}.gtpack"));
372 if target_path.exists() {
373 continue;
374 }
375
376 let domain = domain_from_provider_id(provider_id);
378
379 if let Some(source) = find_provider_pack_source(provider_id, domain, &bundle_abs) {
381 if let Err(err) = std::fs::create_dir_all(&target_dir) {
382 eprintln!(
383 " [provider] WARNING: failed to create {}: {err}",
384 target_dir.display()
385 );
386 continue;
387 }
388 match std::fs::copy(&source, &target_path) {
389 Ok(_) => println!(
390 " [provider] installed {provider_id}.gtpack from {}",
391 source.display()
392 ),
393 Err(err) => eprintln!(
394 " [provider] WARNING: failed to copy {}: {err}",
395 source.display()
396 ),
397 }
398 } else {
399 eprintln!(" [provider] WARNING: {provider_id}.gtpack not found in sibling bundles");
400 }
401 }
402}
403
404pub fn domain_from_provider_id(provider_id: &str) -> &str {
406 const DOMAIN_PREFIXES: &[&str] = &[
407 "messaging-",
408 "events-",
409 "oauth-",
410 "secrets-",
411 "mcp-",
412 "state-",
413 "telemetry-",
414 ];
415 for prefix in DOMAIN_PREFIXES {
416 if provider_id.starts_with(prefix) {
417 return prefix.trim_end_matches('-');
418 }
419 }
420 "messaging" }
422
423pub fn find_provider_pack_source(
429 provider_id: &str,
430 domain: &str,
431 bundle_abs: &Path,
432) -> Option<PathBuf> {
433 let parent = bundle_abs.parent()?;
434 let filename = format!("{provider_id}.gtpack");
435
436 if let Ok(entries) = std::fs::read_dir(parent) {
438 for entry in entries.flatten() {
439 let sibling = entry.path();
440 if sibling == *bundle_abs || !sibling.is_dir() {
441 continue;
442 }
443 let candidate = sibling.join("providers").join(domain).join(&filename);
444 if candidate.is_file() {
445 return Some(candidate);
446 }
447 }
448 }
449
450 for ancestor in parent.ancestors().take(4) {
452 let candidate = ancestor
453 .join("greentic-messaging-providers")
454 .join("target")
455 .join("packs")
456 .join(&filename);
457 if candidate.is_file() {
458 return Some(candidate);
459 }
460 }
461
462 None
463}
464
465pub fn execute_write_gmap_rules(
467 bundle_path: &Path,
468 metadata: &SetupPlanMetadata,
469) -> anyhow::Result<()> {
470 for tenant_sel in &metadata.tenants {
471 let gmap_path =
472 bundle::gmap_path(bundle_path, &tenant_sel.tenant, tenant_sel.team.as_deref());
473
474 if let Some(parent) = gmap_path.parent() {
475 std::fs::create_dir_all(parent)?;
476 }
477
478 let mut content = String::new();
480 if tenant_sel.allow_paths.is_empty() {
481 content.push_str("_ = forbidden\n");
482 } else {
483 for path in &tenant_sel.allow_paths {
484 content.push_str(&format!("{} = allowed\n", path));
485 }
486 content.push_str("_ = forbidden\n");
487 }
488
489 std::fs::write(&gmap_path, content)
490 .with_context(|| format!("failed to write gmap: {}", gmap_path.display()))?;
491 }
492 Ok(())
493}
494
495pub fn execute_copy_resolved_manifests(
497 bundle_path: &Path,
498 metadata: &SetupPlanMetadata,
499) -> anyhow::Result<Vec<PathBuf>> {
500 let mut manifests = Vec::new();
501 let resolved_dir = bundle_path.join("resolved");
502 std::fs::create_dir_all(&resolved_dir)?;
503
504 for tenant_sel in &metadata.tenants {
505 let filename =
506 bundle::resolved_manifest_filename(&tenant_sel.tenant, tenant_sel.team.as_deref());
507 let manifest_path = resolved_dir.join(&filename);
508
509 if !manifest_path.exists() {
511 std::fs::write(&manifest_path, "# Resolved manifest placeholder\n")?;
512 }
513 manifests.push(manifest_path);
514 }
515
516 Ok(manifests)
517}
518
519pub fn execute_validate_bundle(bundle_path: &Path) -> anyhow::Result<()> {
521 bundle::validate_bundle_exists(bundle_path)
522}
523
524pub fn execute_build_flow_index(_bundle_path: &Path, _config: &SetupConfig) -> anyhow::Result<()> {
534 tracing::debug!("fast2flow indexing skipped (fast2flow-bundle not available)");
535 Ok(())
536}
537
538#[cfg(test)]
539mod tests {
540 use super::*;
541 use crate::platform_setup::StaticRoutesPolicy;
542 use std::collections::BTreeSet;
543
544 fn empty_metadata(pack_refs: Vec<String>) -> SetupPlanMetadata {
545 SetupPlanMetadata {
546 bundle_name: None,
547 pack_refs,
548 tenants: Vec::new(),
549 default_assignments: Vec::new(),
550 providers: Vec::new(),
551 update_ops: BTreeSet::new(),
552 remove_targets: BTreeSet::new(),
553 packs_remove: Vec::new(),
554 providers_remove: Vec::new(),
555 tenants_remove: Vec::new(),
556 access_changes: Vec::new(),
557 static_routes: StaticRoutesPolicy::default(),
558 deployment_targets: Vec::new(),
559 setup_answers: serde_json::Map::new(),
560 tunnel: None,
561 }
562 }
563
564 #[test]
565 fn resolve_packs_errors_when_any_pack_ref_fails() {
566 let metadata = empty_metadata(vec!["/definitely/missing/example.gtpack".to_string()]);
567 let err = execute_resolve_packs(Path::new("."), &metadata).unwrap_err();
568 let message = err.to_string();
569
570 assert!(message.contains("failed to resolve 1 pack ref"));
571 assert!(message.contains("/definitely/missing/example.gtpack"));
572 }
573}