2020-12-10 01:55:40 +01:00
|
|
|
package getproviders
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
|
|
|
"encoding/json"
|
|
|
|
"errors"
|
|
|
|
"fmt"
|
|
|
|
"net/http"
|
|
|
|
"net/url"
|
|
|
|
"path"
|
|
|
|
|
|
|
|
"github.com/hashicorp/go-retryablehttp"
|
|
|
|
svchost "github.com/hashicorp/terraform-svchost"
|
2021-05-17 21:00:50 +02:00
|
|
|
"github.com/hashicorp/terraform/internal/addrs"
|
2020-12-10 01:55:40 +01:00
|
|
|
)
|
|
|
|
|
|
|
|
// MissingProviderSuggestion takes a provider address that failed installation
|
|
|
|
// due to the remote registry reporting that it didn't exist, and attempts
|
|
|
|
// to find another provider that the user might have meant to select.
|
|
|
|
//
|
|
|
|
// If the result is equal to the given address then that indicates that there
|
|
|
|
// is no suggested alternative to offer, either because the function
|
|
|
|
// successfully determined there is no recorded alternative or because the
|
|
|
|
// lookup failed somehow. We don't consider a failure to find a suggestion
|
|
|
|
// as an installation failure, because the caller should already be reporting
|
|
|
|
// that the provider didn't exist anyway and this is only extra context for
|
|
|
|
// that error message.
|
|
|
|
//
|
|
|
|
// The result of this is a best effort, so any UI presenting it should be
|
|
|
|
// careful to give it only as a possibility and not necessarily a suitable
|
|
|
|
// replacement for the given provider.
|
|
|
|
//
|
|
|
|
// In practice today this function only knows how to suggest alternatives for
|
|
|
|
// "default" providers, which is to say ones that are in the hashicorp
|
|
|
|
// namespace in the Terraform registry. It will always return no result for
|
|
|
|
// any other provider. That might change in future if we introduce other ways
|
|
|
|
// to discover provider suggestions.
|
|
|
|
//
|
|
|
|
// If the given context is cancelled then this function might not return a
|
|
|
|
// renaming suggestion even if one would've been available for a completed
|
|
|
|
// request.
|
2021-03-11 14:54:18 +01:00
|
|
|
func MissingProviderSuggestion(ctx context.Context, addr addrs.Provider, source Source, reqs Requirements) addrs.Provider {
|
2020-12-10 01:55:40 +01:00
|
|
|
if !addr.IsDefault() {
|
|
|
|
return addr
|
|
|
|
}
|
|
|
|
|
2021-03-11 14:54:18 +01:00
|
|
|
// Before possibly looking up legacy naming, see if the user has another provider
|
|
|
|
// named in their requirements that is of the same type, and offer that
|
|
|
|
// as a suggestion
|
|
|
|
for req := range reqs {
|
|
|
|
if req != addr && req.Type == addr.Type {
|
|
|
|
return req
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-12-10 01:55:40 +01:00
|
|
|
// Our strategy here, for a default provider, is to use the default
|
|
|
|
// registry's special API for looking up "legacy" providers and try looking
|
|
|
|
// for a legacy provider whose type name matches the type of the given
|
|
|
|
// provider. This should then find a suitable answer for any provider
|
|
|
|
// that was originally auto-installable in v0.12 and earlier but moved
|
2021-02-05 15:11:38 +01:00
|
|
|
// into a non-default namespace as part of introducing the hierarchical
|
2020-12-10 01:55:40 +01:00
|
|
|
// provider namespace.
|
|
|
|
//
|
|
|
|
// To achieve that, we need to find the direct registry client in
|
|
|
|
// particular from the given source, because that is the only Source
|
|
|
|
// implementation that can actually handle a legacy provider lookup.
|
|
|
|
regSource := findLegacyProviderLookupSource(addr.Hostname, source)
|
|
|
|
if regSource == nil {
|
|
|
|
// If there's no direct registry source in the installation config
|
|
|
|
// then we can't provide a renaming suggestion.
|
|
|
|
return addr
|
|
|
|
}
|
|
|
|
|
|
|
|
defaultNS, redirectNS, err := regSource.lookupLegacyProviderNamespace(ctx, addr.Hostname, addr.Type)
|
|
|
|
if err != nil {
|
|
|
|
return addr
|
|
|
|
}
|
|
|
|
|
|
|
|
switch {
|
|
|
|
case redirectNS != "":
|
|
|
|
return addrs.Provider{
|
|
|
|
Hostname: addr.Hostname,
|
|
|
|
Namespace: redirectNS,
|
|
|
|
Type: addr.Type,
|
|
|
|
}
|
|
|
|
default:
|
|
|
|
return addrs.Provider{
|
|
|
|
Hostname: addr.Hostname,
|
|
|
|
Namespace: defaultNS,
|
|
|
|
Type: addr.Type,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// findLegacyProviderLookupSource tries to find a *RegistrySource that can talk
|
|
|
|
// to the given registry host in the given Source. It might be given directly,
|
|
|
|
// or it might be given indirectly via a MultiSource where the selector
|
|
|
|
// includes a wildcard for registry.terraform.io.
|
|
|
|
//
|
|
|
|
// Returns nil if the given source does not have any configured way to talk
|
|
|
|
// directly to the given host.
|
|
|
|
//
|
|
|
|
// If the given source contains multiple sources that can talk to the given
|
|
|
|
// host directly, the first one in the sequence takes preference. In practice
|
|
|
|
// it's pointless to have two direct installation sources that match the same
|
|
|
|
// hostname anyway, so this shouldn't arise in normal use.
|
|
|
|
func findLegacyProviderLookupSource(host svchost.Hostname, source Source) *RegistrySource {
|
|
|
|
switch source := source.(type) {
|
|
|
|
|
|
|
|
case *RegistrySource:
|
|
|
|
// Easy case: the source is a registry source directly, and so we'll
|
|
|
|
// just use it.
|
|
|
|
return source
|
|
|
|
|
|
|
|
case *MemoizeSource:
|
|
|
|
// Also easy: the source is a memoize wrapper, so defer to its
|
|
|
|
// underlying source.
|
|
|
|
return findLegacyProviderLookupSource(host, source.underlying)
|
|
|
|
|
|
|
|
case MultiSource:
|
|
|
|
// Trickier case: if it's a multisource then we need to scan over
|
|
|
|
// its selectors until we find one that is a *RegistrySource _and_
|
|
|
|
// that is configured to accept arbitrary providers from the
|
|
|
|
// given hostname.
|
|
|
|
|
|
|
|
// For our matching purposes we'll use an address that would not be
|
|
|
|
// valid as a real provider FQN and thus can only match a selector
|
|
|
|
// that has no filters at all or a selector that wildcards everything
|
|
|
|
// except the hostname, like "registry.terraform.io/*/*"
|
|
|
|
matchAddr := addrs.Provider{
|
|
|
|
Hostname: host,
|
|
|
|
// Other fields are intentionally left empty, to make this invalid
|
|
|
|
// as a specific provider address.
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, selector := range source {
|
|
|
|
// If this source has suitable matching patterns to install from
|
|
|
|
// the given hostname then we'll recursively search inside it
|
|
|
|
// for *RegistrySource objects.
|
|
|
|
if selector.CanHandleProvider(matchAddr) {
|
|
|
|
ret := findLegacyProviderLookupSource(host, selector.Source)
|
|
|
|
if ret != nil {
|
|
|
|
return ret
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// If we get here then there were no selectors that are both configured
|
|
|
|
// to handle modules from the given hostname and that are registry
|
|
|
|
// sources, so we fail.
|
|
|
|
return nil
|
|
|
|
|
|
|
|
default:
|
|
|
|
// This source cannot be and cannot contain a *RegistrySource, so
|
|
|
|
// we fail.
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// lookupLegacyProviderNamespace is a special method available only on
|
|
|
|
// RegistrySource which can deal with legacy provider addresses that contain
|
|
|
|
// only a type and leave the namespace implied.
|
|
|
|
//
|
|
|
|
// It asks the registry at the given hostname to provide a default namespace
|
|
|
|
// for the given provider type, which can be combined with the given hostname
|
|
|
|
// and type name to produce a fully-qualified provider address.
|
|
|
|
//
|
|
|
|
// Not all unqualified type names can be resolved to a default namespace. If
|
|
|
|
// the request fails, this method returns an error describing the failure.
|
|
|
|
//
|
|
|
|
// This method exists only to allow compatibility with unqualified names
|
|
|
|
// in older configurations. New configurations should be written so as not to
|
|
|
|
// depend on it, and this fallback mechanism will likely be removed altogether
|
|
|
|
// in a future Terraform version.
|
|
|
|
func (s *RegistrySource) lookupLegacyProviderNamespace(ctx context.Context, hostname svchost.Hostname, typeName string) (string, string, error) {
|
|
|
|
client, err := s.registryClient(hostname)
|
|
|
|
if err != nil {
|
|
|
|
return "", "", err
|
|
|
|
}
|
|
|
|
return client.legacyProviderDefaultNamespace(ctx, typeName)
|
|
|
|
}
|
|
|
|
|
|
|
|
// legacyProviderDefaultNamespace returns the raw address strings produced by
|
|
|
|
// the registry when asked about the given unqualified provider type name.
|
|
|
|
// The returned namespace string is taken verbatim from the registry's response.
|
|
|
|
//
|
|
|
|
// This method exists only to allow compatibility with unqualified names
|
|
|
|
// in older configurations. New configurations should be written so as not to
|
|
|
|
// depend on it.
|
|
|
|
func (c *registryClient) legacyProviderDefaultNamespace(ctx context.Context, typeName string) (string, string, error) {
|
|
|
|
endpointPath, err := url.Parse(path.Join("-", typeName, "versions"))
|
|
|
|
if err != nil {
|
|
|
|
// Should never happen because we're constructing this from
|
|
|
|
// already-validated components.
|
|
|
|
return "", "", err
|
|
|
|
}
|
|
|
|
endpointURL := c.baseURL.ResolveReference(endpointPath)
|
|
|
|
|
|
|
|
req, err := retryablehttp.NewRequest("GET", endpointURL.String(), nil)
|
|
|
|
if err != nil {
|
|
|
|
return "", "", err
|
|
|
|
}
|
|
|
|
req = req.WithContext(ctx)
|
|
|
|
c.addHeadersToRequest(req.Request)
|
|
|
|
|
|
|
|
// This is just to give us something to return in error messages. It's
|
|
|
|
// not a proper provider address.
|
|
|
|
placeholderProviderAddr := addrs.NewLegacyProvider(typeName)
|
|
|
|
|
|
|
|
resp, err := c.httpClient.Do(req)
|
|
|
|
if err != nil {
|
|
|
|
return "", "", c.errQueryFailed(placeholderProviderAddr, err)
|
|
|
|
}
|
|
|
|
defer resp.Body.Close()
|
|
|
|
|
|
|
|
switch resp.StatusCode {
|
|
|
|
case http.StatusOK:
|
|
|
|
// Great!
|
|
|
|
case http.StatusNotFound:
|
|
|
|
return "", "", ErrProviderNotFound{
|
|
|
|
Provider: placeholderProviderAddr,
|
|
|
|
}
|
|
|
|
case http.StatusUnauthorized, http.StatusForbidden:
|
|
|
|
return "", "", c.errUnauthorized(placeholderProviderAddr.Hostname)
|
|
|
|
default:
|
|
|
|
return "", "", c.errQueryFailed(placeholderProviderAddr, errors.New(resp.Status))
|
|
|
|
}
|
|
|
|
|
|
|
|
type ResponseBody struct {
|
|
|
|
Id string `json:"id"`
|
|
|
|
MovedTo string `json:"moved_to"`
|
|
|
|
}
|
|
|
|
var body ResponseBody
|
|
|
|
|
|
|
|
dec := json.NewDecoder(resp.Body)
|
|
|
|
if err := dec.Decode(&body); err != nil {
|
|
|
|
return "", "", c.errQueryFailed(placeholderProviderAddr, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
provider, diags := addrs.ParseProviderSourceString(body.Id)
|
|
|
|
if diags.HasErrors() {
|
|
|
|
return "", "", fmt.Errorf("Error parsing provider ID from Registry: %s", diags.Err())
|
|
|
|
}
|
|
|
|
|
|
|
|
if provider.Type != typeName {
|
|
|
|
return "", "", fmt.Errorf("Registry returned provider with type %q, expected %q", provider.Type, typeName)
|
|
|
|
}
|
|
|
|
|
|
|
|
var movedTo addrs.Provider
|
|
|
|
if body.MovedTo != "" {
|
|
|
|
movedTo, diags = addrs.ParseProviderSourceString(body.MovedTo)
|
|
|
|
if diags.HasErrors() {
|
|
|
|
return "", "", fmt.Errorf("Error parsing provider ID from Registry: %s", diags.Err())
|
|
|
|
}
|
|
|
|
|
|
|
|
if movedTo.Type != typeName {
|
|
|
|
return "", "", fmt.Errorf("Registry returned provider with type %q, expected %q", movedTo.Type, typeName)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return provider.Namespace, movedTo.Namespace, nil
|
|
|
|
}
|