2014-07-12 22:21:46 -05:00
|
|
|
package command
|
|
|
|
|
|
|
|
import (
|
2014-09-08 22:56:18 -05:00
|
|
|
"bufio"
|
2017-02-28 12:13:03 -06:00
|
|
|
"bytes"
|
2017-03-29 15:45:25 -05:00
|
|
|
"errors"
|
2014-07-18 13:37:27 -05:00
|
|
|
"flag"
|
2014-07-12 22:37:30 -05:00
|
|
|
"fmt"
|
2014-09-08 22:56:18 -05:00
|
|
|
"io"
|
2016-11-21 17:05:49 -06:00
|
|
|
"io/ioutil"
|
2016-11-02 12:30:28 -05:00
|
|
|
"log"
|
2014-07-12 22:37:30 -05:00
|
|
|
"os"
|
2014-09-22 13:15:27 -05:00
|
|
|
"path/filepath"
|
2017-07-06 10:34:47 -05:00
|
|
|
"sort"
|
2015-04-30 09:59:14 -05:00
|
|
|
"strconv"
|
2017-01-18 22:50:45 -06:00
|
|
|
"strings"
|
2016-11-21 17:05:49 -06:00
|
|
|
"time"
|
2014-07-12 22:37:30 -05:00
|
|
|
|
2017-02-28 12:13:03 -06:00
|
|
|
"github.com/hashicorp/terraform/backend"
|
|
|
|
"github.com/hashicorp/terraform/backend/local"
|
2017-10-05 13:59:08 -05:00
|
|
|
"github.com/hashicorp/terraform/command/format"
|
2017-03-07 22:09:48 -06:00
|
|
|
"github.com/hashicorp/terraform/config"
|
2017-10-27 11:58:24 -05:00
|
|
|
"github.com/hashicorp/terraform/config/module"
|
2016-10-26 14:46:22 -05:00
|
|
|
"github.com/hashicorp/terraform/helper/experiment"
|
2016-12-10 13:30:40 -06:00
|
|
|
"github.com/hashicorp/terraform/helper/variables"
|
2016-11-14 02:32:01 -06:00
|
|
|
"github.com/hashicorp/terraform/helper/wrappedstreams"
|
2017-10-18 10:52:13 -05:00
|
|
|
"github.com/hashicorp/terraform/svchost/auth"
|
|
|
|
"github.com/hashicorp/terraform/svchost/disco"
|
2014-07-12 22:37:30 -05:00
|
|
|
"github.com/hashicorp/terraform/terraform"
|
2017-10-05 13:59:08 -05:00
|
|
|
"github.com/hashicorp/terraform/tfdiags"
|
2014-07-12 22:37:30 -05:00
|
|
|
"github.com/mitchellh/cli"
|
2014-07-12 22:21:46 -05:00
|
|
|
"github.com/mitchellh/colorstring"
|
|
|
|
)
|
|
|
|
|
|
|
|
// Meta are the meta-options that are available on all or most commands.
|
|
|
|
type Meta struct {
|
2017-01-18 22:50:45 -06:00
|
|
|
// The exported fields below should be set by anyone using a
|
|
|
|
// command with a Meta field. These are expected to be set externally
|
|
|
|
// (not from within the command itself).
|
2014-07-28 00:58:35 -05:00
|
|
|
|
2017-04-13 20:05:58 -05:00
|
|
|
Color bool // True if output should be colored
|
|
|
|
GlobalPluginDirs []string // Additional paths to search for plugins
|
|
|
|
PluginOverrides *PluginOverrides // legacy overrides from .terraformrc file
|
|
|
|
Ui cli.Ui // Ui for output
|
2014-07-12 22:59:16 -05:00
|
|
|
|
2017-01-18 22:50:45 -06:00
|
|
|
// ExtraHooks are extra hooks to add to the context.
|
|
|
|
ExtraHooks []terraform.Hook
|
2014-07-17 17:14:26 -05:00
|
|
|
|
2017-10-18 10:52:13 -05:00
|
|
|
// Services provides access to remote endpoint information for
|
|
|
|
// "terraform-native' services running at a specific user-facing hostname.
|
|
|
|
Services *disco.Disco
|
|
|
|
|
|
|
|
// Credentials provides access to credentials for "terraform-native"
|
|
|
|
// services, which are accessed by a service hostname.
|
|
|
|
Credentials auth.CredentialsSource
|
|
|
|
|
2017-09-08 19:14:37 -05:00
|
|
|
// RunningInAutomation indicates that commands are being run by an
|
|
|
|
// automated system rather than directly at a command prompt.
|
|
|
|
//
|
|
|
|
// This is a hint to various command routines that it may be confusing
|
|
|
|
// to print out messages that suggest running specific follow-up
|
|
|
|
// commands, since the user consuming the output will not be
|
|
|
|
// in a position to run such commands.
|
|
|
|
//
|
|
|
|
// The intended use-case of this flag is when Terraform is running in
|
|
|
|
// some sort of workflow orchestration tool which is abstracting away
|
|
|
|
// the specific commands being run.
|
|
|
|
RunningInAutomation bool
|
|
|
|
|
2017-09-01 18:05:05 -05:00
|
|
|
// PluginCacheDir, if non-empty, enables caching of downloaded plugins
|
|
|
|
// into the given directory.
|
|
|
|
PluginCacheDir string
|
|
|
|
|
2017-01-18 22:50:45 -06:00
|
|
|
//----------------------------------------------------------
|
|
|
|
// Protected: commands can set these
|
|
|
|
//----------------------------------------------------------
|
|
|
|
|
2017-06-14 14:14:26 -05:00
|
|
|
// Modify the data directory location. This should be accessed through the
|
|
|
|
// DataDir method.
|
2014-10-13 14:05:28 -05:00
|
|
|
dataDir string
|
|
|
|
|
2017-06-15 13:26:12 -05:00
|
|
|
// pluginPath is a user defined set of directories to look for plugins.
|
|
|
|
// This is set during init with the `-plugin-dir` flag, saved to a file in
|
|
|
|
// the data directory.
|
2017-07-03 12:59:13 -05:00
|
|
|
// This overrides all other search paths when discovering plugins.
|
2017-06-15 13:26:12 -05:00
|
|
|
pluginPath []string
|
|
|
|
|
2017-07-03 12:59:13 -05:00
|
|
|
ignorePluginChecksum bool
|
|
|
|
|
2017-04-13 20:05:58 -05:00
|
|
|
// Override certain behavior for tests within this package
|
|
|
|
testingOverrides *testingOverrides
|
|
|
|
|
2017-01-18 22:50:45 -06:00
|
|
|
//----------------------------------------------------------
|
|
|
|
// Private: do not set these
|
|
|
|
//----------------------------------------------------------
|
|
|
|
|
|
|
|
// backendState is the currently active backend state
|
|
|
|
backendState *terraform.BackendState
|
|
|
|
|
2014-07-18 13:37:27 -05:00
|
|
|
// Variables for the context (private)
|
2014-08-24 23:40:58 -05:00
|
|
|
autoKey string
|
core: Allow lists and maps as variable overrides
Terraform 0.7 introduces lists and maps as first-class values for
variables, in addition to string values which were previously available.
However, there was previously no way to override the default value of a
list or map, and the functionality for overriding specific map keys was
broken.
Using the environment variable method for setting variable values, there
was previously no way to give a variable a value of a list or map. These
now support HCL for individual values - specifying:
TF_VAR_test='["Hello", "World"]'
will set the variable `test` to a two-element list containing "Hello"
and "World". Specifying
TF_VAR_test_map='{"Hello = "World", "Foo" = "bar"}'
will set the variable `test_map` to a two-element map with keys "Hello"
and "Foo", and values "World" and "bar" respectively.
The same logic is applied to `-var` flags, and the file parsed by
`-var-files` ("autoVariables").
Note that care must be taken to not run into shell expansion for `-var-`
flags and environment variables.
We also merge map keys where appropriate. The override syntax has
changed (to be noted in CHANGELOG as a breaking change), so several
tests needed their syntax updating from the old `amis.us-east-1 =
"newValue"` style to `amis = "{ "us-east-1" = "newValue"}"` style as
defined in TF-002.
In order to continue supporting the `-var "foo=bar"` type of variable
flag (which is not valid HCL), a special case error is checked after HCL
parsing fails, and the old code path runs instead.
2016-07-20 20:38:26 -05:00
|
|
|
autoVariables map[string]interface{}
|
2014-09-29 13:11:35 -05:00
|
|
|
input bool
|
core: Allow lists and maps as variable overrides
Terraform 0.7 introduces lists and maps as first-class values for
variables, in addition to string values which were previously available.
However, there was previously no way to override the default value of a
list or map, and the functionality for overriding specific map keys was
broken.
Using the environment variable method for setting variable values, there
was previously no way to give a variable a value of a list or map. These
now support HCL for individual values - specifying:
TF_VAR_test='["Hello", "World"]'
will set the variable `test` to a two-element list containing "Hello"
and "World". Specifying
TF_VAR_test_map='{"Hello = "World", "Foo" = "bar"}'
will set the variable `test_map` to a two-element map with keys "Hello"
and "Foo", and values "World" and "bar" respectively.
The same logic is applied to `-var` flags, and the file parsed by
`-var-files` ("autoVariables").
Note that care must be taken to not run into shell expansion for `-var-`
flags and environment variables.
We also merge map keys where appropriate. The override syntax has
changed (to be noted in CHANGELOG as a breaking change), so several
tests needed their syntax updating from the old `amis.us-east-1 =
"newValue"` style to `amis = "{ "us-east-1" = "newValue"}"` style as
defined in TF-002.
In order to continue supporting the `-var "foo=bar"` type of variable
flag (which is not valid HCL), a special case error is checked after HCL
parsing fails, and the old code path runs instead.
2016-07-20 20:38:26 -05:00
|
|
|
variables map[string]interface{}
|
2014-07-18 13:37:27 -05:00
|
|
|
|
2015-03-24 11:18:15 -05:00
|
|
|
// Targets for this context (private)
|
|
|
|
targets []string
|
|
|
|
|
2017-01-18 22:50:45 -06:00
|
|
|
// Internal fields
|
2014-07-17 11:34:32 -05:00
|
|
|
color bool
|
2014-07-12 22:59:16 -05:00
|
|
|
oldUi cli.Ui
|
2014-10-11 20:05:23 -05:00
|
|
|
|
2015-02-21 20:17:40 -06:00
|
|
|
// The fields below are expected to be set by the command via
|
|
|
|
// command line flags. See the Apply command for an example.
|
|
|
|
//
|
2014-10-11 20:05:23 -05:00
|
|
|
// statePath is the path to the state file. If this is empty, then
|
|
|
|
// no state will be loaded. It is also okay for this to be a path to
|
|
|
|
// a file that doesn't exist; it is assumed that this means that there
|
|
|
|
// is simply no state.
|
2015-02-21 20:17:40 -06:00
|
|
|
//
|
2014-10-11 20:05:23 -05:00
|
|
|
// stateOutPath is used to override the output path for the state.
|
|
|
|
// If not provided, the StatePath is used causing the old state to
|
|
|
|
// be overriden.
|
2015-02-21 20:17:40 -06:00
|
|
|
//
|
2014-10-11 20:05:23 -05:00
|
|
|
// backupPath is used to backup the state file before writing a modified
|
2015-09-11 13:56:20 -05:00
|
|
|
// version. It defaults to stateOutPath + DefaultBackupExtension
|
2015-05-06 10:58:42 -05:00
|
|
|
//
|
|
|
|
// parallelism is used to control the number of concurrent operations
|
|
|
|
// allowed when walking the graph
|
2016-10-21 16:25:05 -05:00
|
|
|
//
|
|
|
|
// shadow is used to enable/disable the shadow graph
|
2016-11-23 03:44:52 -06:00
|
|
|
//
|
|
|
|
// provider is to specify specific resource providers
|
2017-02-01 17:16:16 -06:00
|
|
|
//
|
2017-03-21 14:05:51 -05:00
|
|
|
// stateLock is set to false to disable state locking
|
|
|
|
//
|
2017-04-01 14:42:13 -05:00
|
|
|
// stateLockTimeout is the optional duration to retry a state locks locks
|
|
|
|
// when it is already locked by another process.
|
|
|
|
//
|
2017-03-21 14:05:51 -05:00
|
|
|
// forceInitCopy suppresses confirmation for copying state data during
|
|
|
|
// init.
|
2017-04-20 16:26:50 -05:00
|
|
|
//
|
|
|
|
// reconfigure forces init to ignore any stored configuration.
|
2017-04-01 14:42:13 -05:00
|
|
|
statePath string
|
|
|
|
stateOutPath string
|
|
|
|
backupPath string
|
|
|
|
parallelism int
|
|
|
|
shadow bool
|
|
|
|
provider string
|
|
|
|
stateLock bool
|
|
|
|
stateLockTimeout time.Duration
|
|
|
|
forceInitCopy bool
|
2017-04-20 16:26:50 -05:00
|
|
|
reconfigure bool
|
2017-06-12 12:30:19 -05:00
|
|
|
|
|
|
|
// errWriter is the write side of a pipe for the FlagSet output. We need to
|
|
|
|
// keep track of this to close previous pipes between tests. Normal
|
|
|
|
// operation never needs to close this.
|
|
|
|
errWriter *io.PipeWriter
|
|
|
|
// done chan to wait for the scanner goroutine
|
|
|
|
errScannerDone chan struct{}
|
2017-09-18 13:41:30 -05:00
|
|
|
|
|
|
|
// Used with the import command to allow import of state when no matching config exists.
|
|
|
|
allowMissingConfig bool
|
2014-10-11 20:05:23 -05:00
|
|
|
}
|
|
|
|
|
2017-04-13 20:05:58 -05:00
|
|
|
type PluginOverrides struct {
|
|
|
|
Providers map[string]string
|
|
|
|
Provisioners map[string]string
|
|
|
|
}
|
|
|
|
|
|
|
|
type testingOverrides struct {
|
2017-04-21 20:06:30 -05:00
|
|
|
ProviderResolver terraform.ResourceProviderResolver
|
|
|
|
Provisioners map[string]terraform.ResourceProvisionerFactory
|
2017-04-13 20:05:58 -05:00
|
|
|
}
|
|
|
|
|
2014-10-11 20:05:23 -05:00
|
|
|
// initStatePaths is used to initialize the default values for
|
|
|
|
// statePath, stateOutPath, and backupPath
|
|
|
|
func (m *Meta) initStatePaths() {
|
|
|
|
if m.statePath == "" {
|
|
|
|
m.statePath = DefaultStateFilename
|
|
|
|
}
|
|
|
|
if m.stateOutPath == "" {
|
|
|
|
m.stateOutPath = m.statePath
|
|
|
|
}
|
|
|
|
if m.backupPath == "" {
|
2015-09-11 13:56:20 -05:00
|
|
|
m.backupPath = m.stateOutPath + DefaultBackupExtension
|
2014-10-11 20:05:23 -05:00
|
|
|
}
|
2014-07-12 22:21:46 -05:00
|
|
|
}
|
|
|
|
|
2014-10-11 20:34:11 -05:00
|
|
|
// StateOutPath returns the true output path for the state file
|
|
|
|
func (m *Meta) StateOutPath() string {
|
|
|
|
return m.stateOutPath
|
|
|
|
}
|
|
|
|
|
2014-07-12 22:21:46 -05:00
|
|
|
// Colorize returns the colorization structure for a command.
|
|
|
|
func (m *Meta) Colorize() *colorstring.Colorize {
|
|
|
|
return &colorstring.Colorize{
|
|
|
|
Colors: colorstring.DefaultColors,
|
2014-07-17 11:34:32 -05:00
|
|
|
Disable: !m.color,
|
2014-07-12 22:21:46 -05:00
|
|
|
Reset: true,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-03-04 22:52:06 -06:00
|
|
|
// DataDir returns the directory where local data will be stored.
|
2017-06-14 14:14:26 -05:00
|
|
|
// Defaults to DefaultsDataDir in the current working directory.
|
2015-03-04 22:52:06 -06:00
|
|
|
func (m *Meta) DataDir() string {
|
2016-07-20 17:55:05 -05:00
|
|
|
dataDir := DefaultDataDir
|
2015-03-04 22:52:06 -06:00
|
|
|
if m.dataDir != "" {
|
|
|
|
dataDir = m.dataDir
|
|
|
|
}
|
|
|
|
|
|
|
|
return dataDir
|
|
|
|
}
|
|
|
|
|
2015-04-30 09:59:14 -05:00
|
|
|
const (
|
|
|
|
// InputModeEnvVar is the environment variable that, if set to "false" or
|
|
|
|
// "0", causes terraform commands to behave as if the `-input=false` flag was
|
|
|
|
// specified.
|
|
|
|
InputModeEnvVar = "TF_INPUT"
|
|
|
|
)
|
|
|
|
|
2014-10-08 12:29:54 -05:00
|
|
|
// InputMode returns the type of input we should ask for in the form of
|
|
|
|
// terraform.InputMode which is passed directly to Context.Input.
|
|
|
|
func (m *Meta) InputMode() terraform.InputMode {
|
|
|
|
if test || !m.input {
|
|
|
|
return 0
|
|
|
|
}
|
|
|
|
|
2015-04-30 09:59:14 -05:00
|
|
|
if envVar := os.Getenv(InputModeEnvVar); envVar != "" {
|
|
|
|
if v, err := strconv.ParseBool(envVar); err == nil {
|
|
|
|
if !v {
|
|
|
|
return 0
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-10-08 12:29:54 -05:00
|
|
|
var mode terraform.InputMode
|
|
|
|
mode |= terraform.InputModeProvider
|
2016-11-01 21:16:43 -05:00
|
|
|
mode |= terraform.InputModeVar
|
|
|
|
mode |= terraform.InputModeVarUnset
|
2014-10-08 12:29:54 -05:00
|
|
|
|
|
|
|
return mode
|
2014-09-29 13:11:35 -05:00
|
|
|
}
|
|
|
|
|
2015-02-21 18:04:32 -06:00
|
|
|
// UIInput returns a UIInput object to be used for asking for input.
|
|
|
|
func (m *Meta) UIInput() terraform.UIInput {
|
|
|
|
return &UIInput{
|
|
|
|
Colorize: m.Colorize(),
|
2014-10-11 20:21:20 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-11-14 00:18:18 -06:00
|
|
|
// StdinPiped returns true if the input is piped.
|
|
|
|
func (m *Meta) StdinPiped() bool {
|
2016-11-14 02:32:01 -06:00
|
|
|
fi, err := wrappedstreams.Stdin().Stat()
|
2016-11-14 00:18:18 -06:00
|
|
|
if err != nil {
|
|
|
|
// If there is an error, let's just say its not piped
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
return fi.Mode()&os.ModeNamedPipe != 0
|
|
|
|
}
|
|
|
|
|
2017-07-03 12:59:13 -05:00
|
|
|
const (
|
|
|
|
ProviderSkipVerifyEnvVar = "TF_SKIP_PROVIDER_VERIFY"
|
|
|
|
)
|
|
|
|
|
2014-07-12 22:37:30 -05:00
|
|
|
// contextOpts returns the options to use to initialize a Terraform
|
|
|
|
// context with the settings from this Meta.
|
|
|
|
func (m *Meta) contextOpts() *terraform.ContextOpts {
|
2017-01-18 22:50:45 -06:00
|
|
|
var opts terraform.ContextOpts
|
2016-11-04 10:30:51 -05:00
|
|
|
opts.Hooks = []terraform.Hook{m.uiHook(), &terraform.DebugHook{}}
|
2017-01-18 22:50:45 -06:00
|
|
|
opts.Hooks = append(opts.Hooks, m.ExtraHooks...)
|
2014-07-18 13:37:27 -05:00
|
|
|
|
2016-07-18 12:52:10 -05:00
|
|
|
vs := make(map[string]interface{})
|
2014-08-24 23:40:58 -05:00
|
|
|
for k, v := range opts.Variables {
|
|
|
|
vs[k] = v
|
|
|
|
}
|
|
|
|
for k, v := range m.autoVariables {
|
|
|
|
vs[k] = v
|
|
|
|
}
|
|
|
|
for k, v := range m.variables {
|
|
|
|
vs[k] = v
|
2014-07-18 13:37:27 -05:00
|
|
|
}
|
2014-08-24 23:40:58 -05:00
|
|
|
opts.Variables = vs
|
2017-03-13 18:25:27 -05:00
|
|
|
|
2015-03-24 11:18:15 -05:00
|
|
|
opts.Targets = m.targets
|
2014-10-01 00:01:11 -05:00
|
|
|
opts.UIInput = m.UIInput()
|
2017-01-18 22:50:45 -06:00
|
|
|
opts.Parallelism = m.parallelism
|
2016-10-21 16:25:05 -05:00
|
|
|
opts.Shadow = m.shadow
|
2014-07-18 13:37:27 -05:00
|
|
|
|
2017-04-13 20:05:58 -05:00
|
|
|
// If testingOverrides are set, we'll skip the plugin discovery process
|
|
|
|
// and just work with what we've been given, thus allowing the tests
|
|
|
|
// to provide mock providers and provisioners.
|
|
|
|
if m.testingOverrides != nil {
|
2017-04-21 20:06:30 -05:00
|
|
|
opts.ProviderResolver = m.testingOverrides.ProviderResolver
|
2017-04-13 20:05:58 -05:00
|
|
|
opts.Provisioners = m.testingOverrides.Provisioners
|
|
|
|
} else {
|
2017-04-21 20:06:30 -05:00
|
|
|
opts.ProviderResolver = m.providerResolver()
|
2017-04-13 20:05:58 -05:00
|
|
|
opts.Provisioners = m.provisionerFactories()
|
|
|
|
}
|
|
|
|
|
2017-06-05 18:37:08 -05:00
|
|
|
opts.ProviderSHA256s = m.providerPluginsLock().Read()
|
2017-07-03 12:59:13 -05:00
|
|
|
if v := os.Getenv(ProviderSkipVerifyEnvVar); v != "" {
|
|
|
|
opts.SkipProviderVerify = true
|
|
|
|
}
|
2017-05-24 18:36:19 -05:00
|
|
|
|
2017-03-13 18:25:27 -05:00
|
|
|
opts.Meta = &terraform.ContextMeta{
|
2017-05-30 19:13:43 -05:00
|
|
|
Env: m.Workspace(),
|
2017-03-13 18:25:27 -05:00
|
|
|
}
|
|
|
|
|
2014-07-12 22:37:30 -05:00
|
|
|
return &opts
|
|
|
|
}
|
|
|
|
|
2014-07-18 13:37:27 -05:00
|
|
|
// flags adds the meta flags to the given FlagSet.
|
|
|
|
func (m *Meta) flagSet(n string) *flag.FlagSet {
|
|
|
|
f := flag.NewFlagSet(n, flag.ContinueOnError)
|
2014-09-29 13:11:35 -05:00
|
|
|
f.BoolVar(&m.input, "input", true, "input")
|
2016-12-10 13:30:40 -06:00
|
|
|
f.Var((*variables.Flag)(&m.variables), "var", "variables")
|
|
|
|
f.Var((*variables.FlagFile)(&m.variables), "var-file", "variable file")
|
2015-03-24 11:18:15 -05:00
|
|
|
f.Var((*FlagStringSlice)(&m.targets), "target", "resource to target")
|
2014-08-24 23:40:58 -05:00
|
|
|
|
|
|
|
if m.autoKey != "" {
|
2016-12-10 13:30:40 -06:00
|
|
|
f.Var((*variables.FlagFile)(&m.autoVariables), m.autoKey, "variable file")
|
2014-08-24 23:40:58 -05:00
|
|
|
}
|
|
|
|
|
2016-10-21 16:25:05 -05:00
|
|
|
// Advanced (don't need documentation, or unlikely to be set)
|
|
|
|
f.BoolVar(&m.shadow, "shadow", true, "shadow graph")
|
|
|
|
|
2016-10-15 17:08:11 -05:00
|
|
|
// Experimental features
|
2016-10-26 14:46:22 -05:00
|
|
|
experiment.Flag(f)
|
2016-10-15 17:08:11 -05:00
|
|
|
|
2014-09-08 22:56:18 -05:00
|
|
|
// Create an io.Writer that writes to our Ui properly for errors.
|
|
|
|
// This is kind of a hack, but it does the job. Basically: create
|
|
|
|
// a pipe, use a scanner to break it into lines, and output each line
|
|
|
|
// to the UI. Do this forever.
|
2017-06-12 12:30:19 -05:00
|
|
|
|
|
|
|
// If a previous pipe exists, we need to close that first.
|
|
|
|
// This should only happen in testing.
|
|
|
|
if m.errWriter != nil {
|
|
|
|
m.errWriter.Close()
|
|
|
|
}
|
|
|
|
|
|
|
|
if m.errScannerDone != nil {
|
|
|
|
<-m.errScannerDone
|
|
|
|
}
|
|
|
|
|
2014-09-08 22:56:18 -05:00
|
|
|
errR, errW := io.Pipe()
|
|
|
|
errScanner := bufio.NewScanner(errR)
|
2017-06-12 12:30:19 -05:00
|
|
|
m.errWriter = errW
|
|
|
|
m.errScannerDone = make(chan struct{})
|
2014-09-08 22:56:18 -05:00
|
|
|
go func() {
|
2017-06-12 12:30:19 -05:00
|
|
|
defer close(m.errScannerDone)
|
2014-09-08 22:56:18 -05:00
|
|
|
for errScanner.Scan() {
|
|
|
|
m.Ui.Error(errScanner.Text())
|
|
|
|
}
|
|
|
|
}()
|
|
|
|
f.SetOutput(errW)
|
|
|
|
|
2016-03-22 12:41:02 -05:00
|
|
|
// Set the default Usage to empty
|
|
|
|
f.Usage = func() {}
|
|
|
|
|
2017-03-30 12:54:27 -05:00
|
|
|
// command that bypass locking will supply their own flag on this var, but
|
|
|
|
// set the initial meta value to true as a failsafe.
|
|
|
|
m.stateLock = true
|
|
|
|
|
2014-07-18 13:37:27 -05:00
|
|
|
return f
|
|
|
|
}
|
|
|
|
|
2014-09-22 13:15:27 -05:00
|
|
|
// moduleStorage returns the module.Storage implementation used to store
|
|
|
|
// modules for commands.
|
2017-10-27 12:06:50 -05:00
|
|
|
func (m *Meta) moduleStorage(root string, mode module.GetMode) *module.Storage {
|
|
|
|
return &module.Storage{
|
2017-10-27 11:58:24 -05:00
|
|
|
StorageDir: filepath.Join(root, "modules"),
|
|
|
|
Services: m.Services,
|
|
|
|
Ui: m.Ui,
|
|
|
|
Mode: mode,
|
2014-09-22 13:15:27 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-07-12 22:21:46 -05:00
|
|
|
// process will process the meta-parameters out of the arguments. This
|
|
|
|
// will potentially modify the args in-place. It will return the resulting
|
|
|
|
// slice.
|
2014-10-01 10:37:57 -05:00
|
|
|
//
|
|
|
|
// vars says whether or not we support variables.
|
2017-03-07 22:09:48 -06:00
|
|
|
func (m *Meta) process(args []string, vars bool) ([]string, error) {
|
2014-07-12 22:59:16 -05:00
|
|
|
// We do this so that we retain the ability to technically call
|
|
|
|
// process multiple times, even if we have no plans to do so
|
|
|
|
if m.oldUi != nil {
|
|
|
|
m.Ui = m.oldUi
|
|
|
|
}
|
2014-07-12 22:21:46 -05:00
|
|
|
|
2014-07-12 22:59:16 -05:00
|
|
|
// Set colorization
|
2014-07-17 11:34:32 -05:00
|
|
|
m.color = m.Color
|
2014-07-12 22:21:46 -05:00
|
|
|
for i, v := range args {
|
|
|
|
if v == "-no-color" {
|
2014-09-08 22:41:10 -05:00
|
|
|
m.color = false
|
2015-06-21 15:51:40 -05:00
|
|
|
m.Color = false
|
2014-07-12 22:59:16 -05:00
|
|
|
args = append(args[:i], args[i+1:]...)
|
|
|
|
break
|
2014-07-12 22:21:46 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-07-12 22:59:16 -05:00
|
|
|
// Set the UI
|
|
|
|
m.oldUi = m.Ui
|
2014-08-19 12:22:26 -05:00
|
|
|
m.Ui = &cli.ConcurrentUi{
|
|
|
|
Ui: &ColorizeUi{
|
|
|
|
Colorize: m.Colorize(),
|
|
|
|
ErrorColor: "[red]",
|
2015-03-05 14:22:34 -06:00
|
|
|
WarnColor: "[yellow]",
|
2014-08-19 12:22:26 -05:00
|
|
|
Ui: m.oldUi,
|
|
|
|
},
|
2014-07-12 22:59:16 -05:00
|
|
|
}
|
|
|
|
|
2014-08-05 11:32:01 -05:00
|
|
|
// If we support vars and the default var file exists, add it to
|
|
|
|
// the args...
|
2014-08-24 23:40:58 -05:00
|
|
|
m.autoKey = ""
|
2014-08-05 11:32:01 -05:00
|
|
|
if vars {
|
2017-06-21 20:52:40 -05:00
|
|
|
var preArgs []string
|
|
|
|
|
|
|
|
if _, err := os.Stat(DefaultVarsFilename); err == nil {
|
|
|
|
m.autoKey = "var-file-default"
|
|
|
|
preArgs = append(preArgs, "-"+m.autoKey, DefaultVarsFilename)
|
|
|
|
}
|
|
|
|
|
|
|
|
if _, err := os.Stat(DefaultVarsFilename + ".json"); err == nil {
|
|
|
|
m.autoKey = "var-file-default"
|
|
|
|
preArgs = append(preArgs, "-"+m.autoKey, DefaultVarsFilename+".json")
|
|
|
|
}
|
|
|
|
|
2017-03-07 22:09:48 -06:00
|
|
|
wd, err := os.Getwd()
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2017-07-06 10:34:47 -05:00
|
|
|
fis, err := ioutil.ReadDir(wd)
|
2017-03-07 22:09:48 -06:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2015-03-02 11:21:45 -06:00
|
|
|
|
2017-07-06 10:34:47 -05:00
|
|
|
// make sure we add the files in order
|
|
|
|
sort.Slice(fis, func(i, j int) bool {
|
|
|
|
return fis[i].Name() < fis[j].Name()
|
|
|
|
})
|
2017-03-07 22:09:48 -06:00
|
|
|
|
2017-07-06 10:34:47 -05:00
|
|
|
for _, fi := range fis {
|
|
|
|
name := fi.Name()
|
|
|
|
// Ignore directories, non-var-files, and ignored files
|
|
|
|
if fi.IsDir() || !isAutoVarFile(name) || config.IsIgnoredFile(name) {
|
|
|
|
continue
|
2017-03-07 22:09:48 -06:00
|
|
|
}
|
2017-07-06 10:34:47 -05:00
|
|
|
|
|
|
|
m.autoKey = "var-file-default"
|
|
|
|
preArgs = append(preArgs, "-"+m.autoKey, name)
|
2015-03-02 11:21:45 -06:00
|
|
|
}
|
2017-03-07 22:09:48 -06:00
|
|
|
|
|
|
|
args = append(preArgs, args...)
|
2014-08-05 11:32:01 -05:00
|
|
|
}
|
|
|
|
|
2017-03-07 22:09:48 -06:00
|
|
|
return args, nil
|
2014-07-12 22:21:46 -05:00
|
|
|
}
|
2014-07-12 22:37:30 -05:00
|
|
|
|
|
|
|
// uiHook returns the UiHook to use with the context.
|
|
|
|
func (m *Meta) uiHook() *UiHook {
|
|
|
|
return &UiHook{
|
|
|
|
Colorize: m.Colorize(),
|
|
|
|
Ui: m.Ui,
|
|
|
|
}
|
|
|
|
}
|
2014-09-22 12:56:50 -05:00
|
|
|
|
2017-01-18 22:50:45 -06:00
|
|
|
// confirm asks a yes/no confirmation.
|
|
|
|
func (m *Meta) confirm(opts *terraform.InputOpts) (bool, error) {
|
2017-06-23 18:11:30 -05:00
|
|
|
if !m.Input() {
|
|
|
|
return false, errors.New("input is disabled")
|
2017-03-29 15:45:25 -05:00
|
|
|
}
|
2017-01-18 22:50:45 -06:00
|
|
|
for {
|
|
|
|
v, err := m.UIInput().Input(opts)
|
|
|
|
if err != nil {
|
|
|
|
return false, fmt.Errorf(
|
|
|
|
"Error asking for confirmation: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
switch strings.ToLower(v) {
|
|
|
|
case "no":
|
|
|
|
return false, nil
|
|
|
|
case "yes":
|
|
|
|
return true, nil
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-10-05 13:59:08 -05:00
|
|
|
// showDiagnostics displays error and warning messages in the UI.
|
|
|
|
//
|
|
|
|
// "Diagnostics" here means the Diagnostics type from the tfdiag package,
|
|
|
|
// though as a convenience this function accepts anything that could be
|
|
|
|
// passed to the "Append" method on that type, converting it to Diagnostics
|
|
|
|
// before displaying it.
|
|
|
|
//
|
|
|
|
// Internally this function uses Diagnostics.Append, and so it will panic
|
|
|
|
// if given unsupported value types, just as Append does.
|
|
|
|
func (m *Meta) showDiagnostics(vals ...interface{}) {
|
|
|
|
var diags tfdiags.Diagnostics
|
|
|
|
diags = diags.Append(vals...)
|
|
|
|
|
|
|
|
for _, diag := range diags {
|
|
|
|
// TODO: Actually measure the terminal width and pass it here.
|
|
|
|
// For now, we don't have easy access to the writer that
|
|
|
|
// ui.Error (etc) are writing to and thus can't interrogate
|
|
|
|
// to see if it's a terminal and what size it is.
|
|
|
|
msg := format.Diagnostic(diag, m.Colorize(), 78)
|
|
|
|
switch diag.Severity() {
|
|
|
|
case tfdiags.Error:
|
|
|
|
m.Ui.Error(msg)
|
|
|
|
case tfdiags.Warning:
|
|
|
|
m.Ui.Warn(msg)
|
|
|
|
default:
|
|
|
|
m.Ui.Output(msg)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-04-30 14:05:39 -05:00
|
|
|
const (
|
2016-01-20 12:50:33 -06:00
|
|
|
// ModuleDepthDefault is the default value for
|
|
|
|
// module depth, which can be overridden by flag
|
|
|
|
// or env var
|
|
|
|
ModuleDepthDefault = -1
|
|
|
|
|
|
|
|
// ModuleDepthEnvVar is the name of the environment variable that can be used to set module depth.
|
2015-04-30 14:05:39 -05:00
|
|
|
ModuleDepthEnvVar = "TF_MODULE_DEPTH"
|
|
|
|
)
|
|
|
|
|
|
|
|
func (m *Meta) addModuleDepthFlag(flags *flag.FlagSet, moduleDepth *int) {
|
2016-01-20 12:50:33 -06:00
|
|
|
flags.IntVar(moduleDepth, "module-depth", ModuleDepthDefault, "module-depth")
|
2015-04-30 14:05:39 -05:00
|
|
|
if envVar := os.Getenv(ModuleDepthEnvVar); envVar != "" {
|
|
|
|
if md, err := strconv.Atoi(envVar); err == nil {
|
|
|
|
*moduleDepth = md
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-11-03 16:46:26 -05:00
|
|
|
// outputShadowError outputs the error from ctx.ShadowError. If the
|
|
|
|
// error is nil then nothing happens. If output is false then it isn't
|
|
|
|
// outputted to the user (you can define logic to guard against outputting).
|
|
|
|
func (m *Meta) outputShadowError(err error, output bool) bool {
|
|
|
|
// Do nothing if no error
|
|
|
|
if err == nil {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
// If not outputting, do nothing
|
|
|
|
if !output {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
2016-11-21 17:05:49 -06:00
|
|
|
// Write the shadow error output to a file
|
|
|
|
path := fmt.Sprintf("terraform-error-%d.log", time.Now().UTC().Unix())
|
|
|
|
if err := ioutil.WriteFile(path, []byte(err.Error()), 0644); err != nil {
|
|
|
|
// If there is an error writing it, just let it go
|
|
|
|
log.Printf("[ERROR] Error writing shadow error: %s", err)
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
2016-11-03 16:46:26 -05:00
|
|
|
// Output!
|
|
|
|
m.Ui.Output(m.Colorize().Color(fmt.Sprintf(
|
|
|
|
"[reset][bold][yellow]\nExperimental feature failure! Please report a bug.\n\n"+
|
|
|
|
"This is not an error. Your Terraform operation completed successfully.\n"+
|
|
|
|
"Your real infrastructure is unaffected by this message.\n\n"+
|
|
|
|
"[reset][yellow]While running, Terraform sometimes tests experimental features in the\n"+
|
|
|
|
"background. These features cannot affect real state and never touch\n"+
|
|
|
|
"real infrastructure. If the features work properly, you see nothing.\n"+
|
|
|
|
"If the features fail, this message appears.\n\n"+
|
|
|
|
"You can report an issue at: https://github.com/hashicorp/terraform/issues\n\n"+
|
2016-11-21 17:05:49 -06:00
|
|
|
"The failure was written to %q. Please\n"+
|
|
|
|
"double check this file contains no sensitive information and report\n"+
|
|
|
|
"it with your issue.\n\n"+
|
2016-11-03 16:46:26 -05:00
|
|
|
"This is not an error. Your terraform operation completed successfully\n"+
|
|
|
|
"and your real infrastructure is unaffected by this message.",
|
2016-11-21 17:05:49 -06:00
|
|
|
path,
|
2016-11-03 16:46:26 -05:00
|
|
|
)))
|
|
|
|
|
|
|
|
return true
|
|
|
|
}
|
2017-02-28 12:13:03 -06:00
|
|
|
|
2017-05-30 19:13:43 -05:00
|
|
|
// WorkspaceNameEnvVar is the name of the environment variable that can be used
|
|
|
|
// to set the name of the Terraform workspace, overriding the workspace chosen
|
|
|
|
// by `terraform workspace select`.
|
|
|
|
//
|
|
|
|
// Note that this environment variable is ignored by `terraform workspace new`
|
|
|
|
// and `terraform workspace delete`.
|
|
|
|
const WorkspaceNameEnvVar = "TF_WORKSPACE"
|
2017-05-12 15:53:29 -05:00
|
|
|
|
2017-05-30 19:13:43 -05:00
|
|
|
// Workspace returns the name of the currently configured workspace, corresponding
|
2017-02-28 12:13:03 -06:00
|
|
|
// to the desired named state.
|
2017-05-30 19:13:43 -05:00
|
|
|
func (m *Meta) Workspace() string {
|
|
|
|
current, _ := m.WorkspaceOverridden()
|
2017-05-12 15:53:29 -05:00
|
|
|
return current
|
|
|
|
}
|
|
|
|
|
2017-05-30 19:13:43 -05:00
|
|
|
// WorkspaceOverridden returns the name of the currently configured workspace,
|
2017-05-12 15:53:29 -05:00
|
|
|
// corresponding to the desired named state, as well as a bool saying whether
|
2017-05-30 17:06:13 -05:00
|
|
|
// this was set via the TF_WORKSPACE environment variable.
|
2017-05-30 19:13:43 -05:00
|
|
|
func (m *Meta) WorkspaceOverridden() (string, bool) {
|
|
|
|
if envVar := os.Getenv(WorkspaceNameEnvVar); envVar != "" {
|
2017-05-12 15:53:29 -05:00
|
|
|
return envVar, true
|
|
|
|
}
|
|
|
|
|
2017-06-14 14:14:26 -05:00
|
|
|
envData, err := ioutil.ReadFile(filepath.Join(m.DataDir(), local.DefaultWorkspaceFile))
|
2017-02-28 12:13:03 -06:00
|
|
|
current := string(bytes.TrimSpace(envData))
|
|
|
|
if current == "" {
|
|
|
|
current = backend.DefaultStateName
|
|
|
|
}
|
|
|
|
|
|
|
|
if err != nil && !os.IsNotExist(err) {
|
2017-05-30 17:06:13 -05:00
|
|
|
// always return the default if we can't get a workspace name
|
|
|
|
log.Printf("[ERROR] failed to read current workspace: %s", err)
|
2017-02-28 12:13:03 -06:00
|
|
|
}
|
|
|
|
|
2017-05-12 15:53:29 -05:00
|
|
|
return current, false
|
2017-02-28 12:13:03 -06:00
|
|
|
}
|
|
|
|
|
2017-05-30 19:13:43 -05:00
|
|
|
// SetWorkspace saves the given name as the current workspace in the local
|
2017-05-30 17:06:13 -05:00
|
|
|
// filesystem.
|
2017-05-30 19:13:43 -05:00
|
|
|
func (m *Meta) SetWorkspace(name string) error {
|
2017-06-14 14:14:26 -05:00
|
|
|
err := os.MkdirAll(m.DataDir(), 0755)
|
2017-02-28 12:13:03 -06:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2017-06-14 14:14:26 -05:00
|
|
|
err = ioutil.WriteFile(filepath.Join(m.DataDir(), local.DefaultWorkspaceFile), []byte(name), 0644)
|
2017-02-28 12:13:03 -06:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
2017-03-07 22:09:48 -06:00
|
|
|
|
2017-06-21 20:22:07 -05:00
|
|
|
// isAutoVarFile determines if the file ends with .auto.tfvars or .auto.tfvars.json
|
|
|
|
func isAutoVarFile(path string) bool {
|
|
|
|
return strings.HasSuffix(path, ".auto.tfvars") ||
|
|
|
|
strings.HasSuffix(path, ".auto.tfvars.json")
|
2017-03-07 22:09:48 -06:00
|
|
|
}
|