mirror of
https://github.com/opentofu/opentofu.git
synced 2024-12-26 00:41:27 -06:00
8560f50cbc
This means it’s shown correctly in a plan and takes into account any actions that are dependant on the tainted resource and, vice verse, any actions that the tainted resource depends on. So this changes the behaviour from saying this resource is tainted so just forget about it and make sure it gets deleted in the background, to saying I want that resource to be recreated (taking into account the existing resource and it’s place in the graph).
172 lines
4.7 KiB
Go
172 lines
4.7 KiB
Go
package command
|
|
|
|
import (
|
|
"fmt"
|
|
"log"
|
|
"strings"
|
|
)
|
|
|
|
// UntaintCommand is a cli.Command implementation that manually untaints
|
|
// a resource, marking it as primary and ready for service.
|
|
type UntaintCommand struct {
|
|
Meta
|
|
}
|
|
|
|
func (c *UntaintCommand) Run(args []string) int {
|
|
args = c.Meta.process(args, false)
|
|
|
|
var allowMissing bool
|
|
var module string
|
|
cmdFlags := c.Meta.flagSet("untaint")
|
|
cmdFlags.BoolVar(&allowMissing, "allow-missing", false, "module")
|
|
cmdFlags.StringVar(&module, "module", "", "module")
|
|
cmdFlags.StringVar(&c.Meta.statePath, "state", DefaultStateFilename, "path")
|
|
cmdFlags.StringVar(&c.Meta.stateOutPath, "state-out", "", "path")
|
|
cmdFlags.StringVar(&c.Meta.backupPath, "backup", "", "path")
|
|
cmdFlags.Usage = func() { c.Ui.Error(c.Help()) }
|
|
if err := cmdFlags.Parse(args); err != nil {
|
|
return 1
|
|
}
|
|
|
|
// Require the one argument for the resource to untaint
|
|
args = cmdFlags.Args()
|
|
if len(args) != 1 {
|
|
c.Ui.Error("The untaint command expects exactly one argument.")
|
|
cmdFlags.Usage()
|
|
return 1
|
|
}
|
|
|
|
name := args[0]
|
|
if module == "" {
|
|
module = "root"
|
|
} else {
|
|
module = "root." + module
|
|
}
|
|
|
|
// Get the state that we'll be modifying
|
|
state, err := c.State()
|
|
if err != nil {
|
|
c.Ui.Error(fmt.Sprintf("Failed to load state: %s", err))
|
|
return 1
|
|
}
|
|
|
|
// Get the actual state structure
|
|
s := state.State()
|
|
if s.Empty() {
|
|
if allowMissing {
|
|
return c.allowMissingExit(name, module)
|
|
}
|
|
|
|
c.Ui.Error(fmt.Sprintf(
|
|
"The state is empty. The most common reason for this is that\n" +
|
|
"an invalid state file path was given or Terraform has never\n " +
|
|
"been run for this infrastructure. Infrastructure must exist\n" +
|
|
"for it to be untainted."))
|
|
return 1
|
|
}
|
|
|
|
// Get the proper module holding the resource we want to untaint
|
|
modPath := strings.Split(module, ".")
|
|
mod := s.ModuleByPath(modPath)
|
|
if mod == nil {
|
|
if allowMissing {
|
|
return c.allowMissingExit(name, module)
|
|
}
|
|
|
|
c.Ui.Error(fmt.Sprintf(
|
|
"The module %s could not be found. There is nothing to untaint.",
|
|
module))
|
|
return 1
|
|
}
|
|
|
|
// If there are no resources in this module, it is an error
|
|
if len(mod.Resources) == 0 {
|
|
if allowMissing {
|
|
return c.allowMissingExit(name, module)
|
|
}
|
|
|
|
c.Ui.Error(fmt.Sprintf(
|
|
"The module %s has no resources. There is nothing to untaint.",
|
|
module))
|
|
return 1
|
|
}
|
|
|
|
// Get the resource we're looking for
|
|
rs, ok := mod.Resources[name]
|
|
if !ok {
|
|
if allowMissing {
|
|
return c.allowMissingExit(name, module)
|
|
}
|
|
|
|
c.Ui.Error(fmt.Sprintf(
|
|
"The resource %s couldn't be found in the module %s.",
|
|
name,
|
|
module))
|
|
return 1
|
|
}
|
|
|
|
// Untaint the resource
|
|
rs.Untaint()
|
|
|
|
log.Printf("[INFO] Writing state output to: %s", c.Meta.StateOutPath())
|
|
if err := c.Meta.PersistState(s); err != nil {
|
|
c.Ui.Error(fmt.Sprintf("Error writing state file: %s", err))
|
|
return 1
|
|
}
|
|
|
|
c.Ui.Output(fmt.Sprintf(
|
|
"The resource %s in the module %s has been successfully untainted!",
|
|
name, module))
|
|
return 0
|
|
}
|
|
|
|
func (c *UntaintCommand) Help() string {
|
|
helpText := `
|
|
Usage: terraform untaint [options] name
|
|
|
|
Manually unmark a resource as tainted, restoring it as the primary
|
|
instance in the state. This reverses either a manual 'terraform taint'
|
|
or the result of provisioners failing on a resource.
|
|
|
|
This will not modify your infrastructure. This command changes your
|
|
state to unmark a resource as tainted. This command can be undone by
|
|
reverting the state backup file that is created, or by running
|
|
'terraform taint' on the resource.
|
|
|
|
Options:
|
|
|
|
-allow-missing If specified, the command will succeed (exit code 0)
|
|
even if the resource is missing.
|
|
|
|
-backup=path Path to backup the existing state file before
|
|
modifying. Defaults to the "-state-out" path with
|
|
".backup" extension. Set to "-" to disable backup.
|
|
|
|
-module=path The module path where the resource lives. By
|
|
default this will be root. Child modules can be specified
|
|
by names. Ex. "consul" or "consul.vpc" (nested modules).
|
|
|
|
-no-color If specified, output won't contain any color.
|
|
|
|
-state=path Path to read and save state (unless state-out
|
|
is specified). Defaults to "terraform.tfstate".
|
|
|
|
-state-out=path Path to write updated state file. By default, the
|
|
"-state" path will be used.
|
|
|
|
`
|
|
return strings.TrimSpace(helpText)
|
|
}
|
|
|
|
func (c *UntaintCommand) Synopsis() string {
|
|
return "Manually unmark a resource as tainted"
|
|
}
|
|
|
|
func (c *UntaintCommand) allowMissingExit(name, module string) int {
|
|
c.Ui.Output(fmt.Sprintf(
|
|
"The resource %s in the module %s was not found, but\n"+
|
|
"-allow-missing is set, so we're exiting successfully.",
|
|
name, module))
|
|
return 0
|
|
}
|