2014-06-09 20:53:41 +02:00
|
|
|
package command
|
|
|
|
|
|
|
|
import (
|
|
|
|
"fmt"
|
2014-06-27 07:23:51 +02:00
|
|
|
"log"
|
2014-06-19 22:51:05 +02:00
|
|
|
"os"
|
2014-06-09 20:53:41 +02:00
|
|
|
"strings"
|
|
|
|
|
|
|
|
"github.com/hashicorp/terraform/terraform"
|
|
|
|
)
|
|
|
|
|
2014-06-20 20:47:02 +02:00
|
|
|
// PlanCommand is a Command implementation that compares a Terraform
|
2014-06-09 20:53:41 +02:00
|
|
|
// configuration to an actual infrastructure and shows the differences.
|
2014-06-20 20:47:02 +02:00
|
|
|
type PlanCommand struct {
|
2014-07-13 05:21:46 +02:00
|
|
|
Meta
|
2014-06-09 20:53:41 +02:00
|
|
|
}
|
|
|
|
|
2014-06-20 20:47:02 +02:00
|
|
|
func (c *PlanCommand) Run(args []string) int {
|
2014-07-01 18:12:05 +02:00
|
|
|
var destroy, refresh bool
|
2014-07-28 00:09:04 +02:00
|
|
|
var outPath, statePath, backupPath string
|
2014-06-19 22:51:05 +02:00
|
|
|
|
2014-07-13 05:21:46 +02:00
|
|
|
args = c.Meta.process(args)
|
|
|
|
|
2014-07-18 20:37:27 +02:00
|
|
|
cmdFlags := c.Meta.flagSet("plan")
|
2014-07-01 18:12:05 +02:00
|
|
|
cmdFlags.BoolVar(&destroy, "destroy", false, "destroy")
|
2014-06-26 18:56:29 +02:00
|
|
|
cmdFlags.BoolVar(&refresh, "refresh", true, "refresh")
|
2014-06-27 07:23:51 +02:00
|
|
|
cmdFlags.StringVar(&outPath, "out", "", "path")
|
2014-07-12 06:03:56 +02:00
|
|
|
cmdFlags.StringVar(&statePath, "state", DefaultStateFilename, "path")
|
2014-07-28 00:09:04 +02:00
|
|
|
cmdFlags.StringVar(&backupPath, "backup", "", "path")
|
2014-06-09 20:53:41 +02:00
|
|
|
cmdFlags.Usage = func() { c.Ui.Error(c.Help()) }
|
|
|
|
if err := cmdFlags.Parse(args); err != nil {
|
|
|
|
return 1
|
|
|
|
}
|
|
|
|
|
2014-07-12 05:51:26 +02:00
|
|
|
var path string
|
2014-06-09 20:53:41 +02:00
|
|
|
args = cmdFlags.Args()
|
2014-07-12 05:51:26 +02:00
|
|
|
if len(args) > 1 {
|
2014-06-09 20:53:41 +02:00
|
|
|
c.Ui.Error(
|
2014-07-12 05:51:26 +02:00
|
|
|
"The plan command expects at most one argument with the path\n" +
|
2014-06-09 20:53:41 +02:00
|
|
|
"to a Terraform configuration.\n")
|
|
|
|
cmdFlags.Usage()
|
|
|
|
return 1
|
2014-07-12 05:51:26 +02:00
|
|
|
} else if len(args) == 1 {
|
|
|
|
path = args[0]
|
|
|
|
} else {
|
|
|
|
var err error
|
|
|
|
path, err = os.Getwd()
|
|
|
|
if err != nil {
|
|
|
|
c.Ui.Error(fmt.Sprintf("Error getting pwd: %s", err))
|
|
|
|
}
|
2014-06-09 20:53:41 +02:00
|
|
|
}
|
|
|
|
|
2014-07-12 06:03:56 +02:00
|
|
|
// If the default state path doesn't exist, ignore it.
|
|
|
|
if statePath != "" {
|
|
|
|
if _, err := os.Stat(statePath); err != nil {
|
|
|
|
if os.IsNotExist(err) && statePath == DefaultStateFilename {
|
|
|
|
statePath = ""
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-07-28 00:09:04 +02:00
|
|
|
// If we don't specify a backup path, default to state out with
|
|
|
|
// the extention
|
|
|
|
if backupPath == "" {
|
|
|
|
backupPath = statePath + DefaultBackupExtention
|
|
|
|
}
|
|
|
|
|
2014-07-27 02:45:38 +02:00
|
|
|
ctx, _, err := c.Context(path, statePath)
|
2014-06-09 20:53:41 +02:00
|
|
|
if err != nil {
|
2014-07-13 05:37:30 +02:00
|
|
|
c.Ui.Error(err.Error())
|
2014-06-09 20:53:41 +02:00
|
|
|
return 1
|
|
|
|
}
|
2014-07-03 22:12:45 +02:00
|
|
|
if !validateContext(ctx, c.Ui) {
|
|
|
|
return 1
|
|
|
|
}
|
2014-06-09 20:53:41 +02:00
|
|
|
|
2014-06-26 18:56:29 +02:00
|
|
|
if refresh {
|
2014-07-28 00:09:04 +02:00
|
|
|
// Create a backup of the state before updating
|
2014-07-28 05:38:41 +02:00
|
|
|
if backupPath != "-" && c.State != nil {
|
2014-07-28 00:09:04 +02:00
|
|
|
log.Printf("[INFO] Writing backup state to: %s", backupPath)
|
|
|
|
f, err := os.Create(backupPath)
|
|
|
|
if err == nil {
|
|
|
|
defer f.Close()
|
|
|
|
err = terraform.WriteState(c.State, f)
|
|
|
|
}
|
|
|
|
if err != nil {
|
|
|
|
c.Ui.Error(fmt.Sprintf("Error writing backup state file: %s", err))
|
|
|
|
return 1
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-07-13 02:17:03 +02:00
|
|
|
c.Ui.Output("Refreshing Terraform state prior to plan...\n")
|
2014-07-03 20:46:40 +02:00
|
|
|
if _, err := ctx.Refresh(); err != nil {
|
2014-06-26 18:56:29 +02:00
|
|
|
c.Ui.Error(fmt.Sprintf("Error refreshing state: %s", err))
|
|
|
|
return 1
|
|
|
|
}
|
2014-07-13 02:17:03 +02:00
|
|
|
c.Ui.Output("")
|
2014-06-26 18:56:29 +02:00
|
|
|
}
|
|
|
|
|
2014-07-03 20:46:40 +02:00
|
|
|
plan, err := ctx.Plan(&terraform.PlanOpts{Destroy: destroy})
|
2014-06-10 20:34:08 +02:00
|
|
|
if err != nil {
|
2014-06-20 20:47:02 +02:00
|
|
|
c.Ui.Error(fmt.Sprintf("Error running plan: %s", err))
|
2014-06-10 20:34:08 +02:00
|
|
|
return 1
|
|
|
|
}
|
|
|
|
|
2014-06-20 20:47:02 +02:00
|
|
|
if plan.Diff.Empty() {
|
2014-07-13 01:35:59 +02:00
|
|
|
c.Ui.Output(
|
|
|
|
"No changes. Infrastructure is up-to-date. This means that Terraform\n" +
|
|
|
|
"could not detect any differences between your configuration and\n" +
|
|
|
|
"the real physical resources that exist. As a result, Terraform\n" +
|
|
|
|
"doesn't need to do anything.")
|
2014-06-27 07:23:51 +02:00
|
|
|
return 0
|
|
|
|
}
|
|
|
|
|
|
|
|
if outPath != "" {
|
|
|
|
log.Printf("[INFO] Writing plan output to: %s", outPath)
|
|
|
|
f, err := os.Create(outPath)
|
|
|
|
if err == nil {
|
|
|
|
defer f.Close()
|
|
|
|
err = terraform.WritePlan(plan, f)
|
|
|
|
}
|
|
|
|
if err != nil {
|
|
|
|
c.Ui.Error(fmt.Sprintf("Error writing plan file: %s", err))
|
|
|
|
return 1
|
|
|
|
}
|
2014-06-19 23:58:30 +02:00
|
|
|
}
|
2014-06-10 20:34:08 +02:00
|
|
|
|
2014-07-13 01:32:48 +02:00
|
|
|
if outPath == "" {
|
2014-07-13 01:35:59 +02:00
|
|
|
c.Ui.Output(strings.TrimSpace(planHeaderNoOutput) + "\n")
|
2014-07-13 01:32:48 +02:00
|
|
|
} else {
|
|
|
|
c.Ui.Output(fmt.Sprintf(
|
|
|
|
strings.TrimSpace(planHeaderYesOutput)+"\n",
|
|
|
|
outPath))
|
|
|
|
}
|
|
|
|
|
2014-07-13 05:21:46 +02:00
|
|
|
c.Ui.Output(FormatPlan(plan, c.Colorize()))
|
2014-07-13 01:32:48 +02:00
|
|
|
|
2014-06-09 20:53:41 +02:00
|
|
|
return 0
|
|
|
|
}
|
|
|
|
|
2014-06-20 20:47:02 +02:00
|
|
|
func (c *PlanCommand) Help() string {
|
2014-06-09 20:53:41 +02:00
|
|
|
helpText := `
|
2014-07-12 05:51:26 +02:00
|
|
|
Usage: terraform plan [options] [dir]
|
|
|
|
|
|
|
|
Generates an execution plan for Terraform.
|
2014-06-09 20:53:41 +02:00
|
|
|
|
2014-07-12 05:51:26 +02:00
|
|
|
This execution plan can be reviewed prior to running apply to get a
|
|
|
|
sense for what Terraform will do. Optionally, the plan can be saved to
|
|
|
|
a Terraform plan file, and apply can take this plan file to execute
|
|
|
|
this plan exactly.
|
2014-06-09 20:53:41 +02:00
|
|
|
|
|
|
|
Options:
|
|
|
|
|
2014-07-28 00:09:04 +02:00
|
|
|
-backup=path Path to backup the existing state file before
|
|
|
|
modifying. Defaults to the "-state-out" path with
|
|
|
|
".backup" extention. Set to "-" to disable backup.
|
|
|
|
|
2014-07-01 18:12:35 +02:00
|
|
|
-destroy If set, a plan will be generated to destroy all resources
|
|
|
|
managed by the given configuration and state.
|
|
|
|
|
2014-07-13 05:21:46 +02:00
|
|
|
-no-color If specified, output won't contain any color.
|
|
|
|
|
2014-06-27 07:23:51 +02:00
|
|
|
-out=path Write a plan file to the given path. This can be used as
|
|
|
|
input to the "apply" command.
|
|
|
|
|
2014-06-26 18:56:29 +02:00
|
|
|
-refresh=true Update state prior to checking for differences.
|
|
|
|
|
2014-06-09 20:53:41 +02:00
|
|
|
-state=statefile Path to a Terraform state file to use to look
|
2014-07-12 05:51:26 +02:00
|
|
|
up Terraform-managed resources. By default it will
|
|
|
|
use the state "terraform.tfstate" if it exists.
|
2014-06-09 20:53:41 +02:00
|
|
|
|
2014-07-18 20:37:27 +02:00
|
|
|
-var 'foo=bar' Set a variable in the Terraform configuration. This
|
|
|
|
flag can be set multiple times.
|
|
|
|
|
|
|
|
-var-file=foo Set variables in the Terraform configuration from
|
|
|
|
a file. If "terraform.tfvars" is present, it will be
|
|
|
|
automatically loaded if this flag is not specified.
|
|
|
|
|
2014-06-09 20:53:41 +02:00
|
|
|
`
|
|
|
|
return strings.TrimSpace(helpText)
|
|
|
|
}
|
|
|
|
|
2014-06-20 20:47:02 +02:00
|
|
|
func (c *PlanCommand) Synopsis() string {
|
2014-07-13 04:28:38 +02:00
|
|
|
return "Generate and show an execution plan"
|
2014-06-09 20:53:41 +02:00
|
|
|
}
|
2014-07-13 01:32:48 +02:00
|
|
|
|
|
|
|
const planHeaderNoOutput = `
|
|
|
|
The Terraform execution plan has been generated and is shown below.
|
|
|
|
Resources are shown in alphabetical order for quick scanning. Green resources
|
|
|
|
will be created (or destroyed and then created if an existing resource
|
|
|
|
exists), yellow resources are being changed in-place, and red resources
|
|
|
|
will be destroyed.
|
|
|
|
|
|
|
|
Note: You didn't specify an "-out" parameter to save this plan, so when
|
|
|
|
"apply" is called, Terraform can't guarantee this is what will execute.
|
|
|
|
`
|
|
|
|
|
|
|
|
const planHeaderYesOutput = `
|
|
|
|
The Terraform execution plan has been generated and is shown below.
|
|
|
|
Resources are shown in alphabetical order for quick scanning. Green resources
|
|
|
|
will be created (or destroyed and then created if an existing resource
|
|
|
|
exists), yellow resources are being changed in-place, and red resources
|
|
|
|
will be destroyed.
|
|
|
|
|
|
|
|
Your plan was also saved to the path below. Call the "apply" subcommand
|
|
|
|
with this plan file and Terraform will exactly execute this execution
|
|
|
|
plan.
|
|
|
|
|
|
|
|
Path: %s
|
|
|
|
`
|