2014-06-09 20:53:41 +02:00
|
|
|
package command
|
|
|
|
|
|
|
|
import (
|
|
|
|
"fmt"
|
2014-06-27 07:23:51 +02:00
|
|
|
"log"
|
2014-06-19 22:51:05 +02:00
|
|
|
"os"
|
2014-06-09 20:53:41 +02:00
|
|
|
"strings"
|
|
|
|
|
|
|
|
"github.com/hashicorp/terraform/terraform"
|
|
|
|
)
|
|
|
|
|
2014-06-20 20:47:02 +02:00
|
|
|
// PlanCommand is a Command implementation that compares a Terraform
|
2014-06-09 20:53:41 +02:00
|
|
|
// configuration to an actual infrastructure and shows the differences.
|
2014-06-20 20:47:02 +02:00
|
|
|
type PlanCommand struct {
|
2014-07-13 05:21:46 +02:00
|
|
|
Meta
|
2014-06-09 20:53:41 +02:00
|
|
|
}
|
|
|
|
|
2014-06-20 20:47:02 +02:00
|
|
|
func (c *PlanCommand) Run(args []string) int {
|
2014-07-01 18:12:05 +02:00
|
|
|
var destroy, refresh bool
|
2014-10-12 03:47:52 +02:00
|
|
|
var outPath string
|
2014-09-25 07:54:51 +02:00
|
|
|
var moduleDepth int
|
2014-06-19 22:51:05 +02:00
|
|
|
|
2014-08-05 18:32:01 +02:00
|
|
|
args = c.Meta.process(args, true)
|
2014-07-13 05:21:46 +02:00
|
|
|
|
2014-07-18 20:37:27 +02:00
|
|
|
cmdFlags := c.Meta.flagSet("plan")
|
2014-07-01 18:12:05 +02:00
|
|
|
cmdFlags.BoolVar(&destroy, "destroy", false, "destroy")
|
2014-06-26 18:56:29 +02:00
|
|
|
cmdFlags.BoolVar(&refresh, "refresh", true, "refresh")
|
2014-09-25 07:54:51 +02:00
|
|
|
cmdFlags.IntVar(&moduleDepth, "module-depth", 0, "module-depth")
|
2014-06-27 07:23:51 +02:00
|
|
|
cmdFlags.StringVar(&outPath, "out", "", "path")
|
2014-10-12 03:47:52 +02:00
|
|
|
cmdFlags.StringVar(&c.Meta.statePath, "state", DefaultStateFilename, "path")
|
|
|
|
cmdFlags.StringVar(&c.Meta.backupPath, "backup", "", "path")
|
2014-06-09 20:53:41 +02:00
|
|
|
cmdFlags.Usage = func() { c.Ui.Error(c.Help()) }
|
|
|
|
if err := cmdFlags.Parse(args); err != nil {
|
|
|
|
return 1
|
|
|
|
}
|
|
|
|
|
2014-07-12 05:51:26 +02:00
|
|
|
var path string
|
2014-06-09 20:53:41 +02:00
|
|
|
args = cmdFlags.Args()
|
2014-07-12 05:51:26 +02:00
|
|
|
if len(args) > 1 {
|
2014-06-09 20:53:41 +02:00
|
|
|
c.Ui.Error(
|
2014-07-12 05:51:26 +02:00
|
|
|
"The plan command expects at most one argument with the path\n" +
|
2014-06-09 20:53:41 +02:00
|
|
|
"to a Terraform configuration.\n")
|
|
|
|
cmdFlags.Usage()
|
|
|
|
return 1
|
2014-07-12 05:51:26 +02:00
|
|
|
} else if len(args) == 1 {
|
|
|
|
path = args[0]
|
|
|
|
} else {
|
|
|
|
var err error
|
|
|
|
path, err = os.Getwd()
|
|
|
|
if err != nil {
|
|
|
|
c.Ui.Error(fmt.Sprintf("Error getting pwd: %s", err))
|
|
|
|
}
|
2014-06-09 20:53:41 +02:00
|
|
|
}
|
|
|
|
|
2014-09-22 19:56:50 +02:00
|
|
|
ctx, _, err := c.Context(contextOpts{
|
2015-03-24 17:18:15 +01:00
|
|
|
Destroy: destroy,
|
2014-09-22 19:56:50 +02:00
|
|
|
Path: path,
|
2014-10-12 03:47:52 +02:00
|
|
|
StatePath: c.Meta.statePath,
|
2014-09-22 19:56:50 +02:00
|
|
|
})
|
2014-06-09 20:53:41 +02:00
|
|
|
if err != nil {
|
2014-07-13 05:37:30 +02:00
|
|
|
c.Ui.Error(err.Error())
|
2014-06-09 20:53:41 +02:00
|
|
|
return 1
|
|
|
|
}
|
2014-12-09 03:32:03 +01:00
|
|
|
if !validateContext(ctx, c.Ui) {
|
2014-10-08 19:29:54 +02:00
|
|
|
return 1
|
2014-09-29 20:24:16 +02:00
|
|
|
}
|
2014-12-09 03:32:03 +01:00
|
|
|
if err := ctx.Input(c.InputMode()); err != nil {
|
|
|
|
c.Ui.Error(fmt.Sprintf("Error configuring: %s", err))
|
2014-07-03 22:12:45 +02:00
|
|
|
return 1
|
|
|
|
}
|
2014-06-09 20:53:41 +02:00
|
|
|
|
2014-06-26 18:56:29 +02:00
|
|
|
if refresh {
|
2014-07-13 02:17:03 +02:00
|
|
|
c.Ui.Output("Refreshing Terraform state prior to plan...\n")
|
2014-10-12 03:47:52 +02:00
|
|
|
state, err := ctx.Refresh()
|
|
|
|
if err != nil {
|
2014-06-26 18:56:29 +02:00
|
|
|
c.Ui.Error(fmt.Sprintf("Error refreshing state: %s", err))
|
|
|
|
return 1
|
|
|
|
}
|
2014-07-13 02:17:03 +02:00
|
|
|
c.Ui.Output("")
|
2014-10-12 03:47:52 +02:00
|
|
|
|
|
|
|
if state != nil {
|
|
|
|
log.Printf("[INFO] Writing state output to: %s", c.Meta.StateOutPath())
|
|
|
|
if err := c.Meta.PersistState(state); err != nil {
|
|
|
|
c.Ui.Error(fmt.Sprintf("Error writing state file: %s", err))
|
|
|
|
return 1
|
|
|
|
}
|
|
|
|
}
|
2014-06-26 18:56:29 +02:00
|
|
|
}
|
|
|
|
|
2015-03-24 17:18:15 +01:00
|
|
|
plan, err := ctx.Plan()
|
2014-06-10 20:34:08 +02:00
|
|
|
if err != nil {
|
2014-06-20 20:47:02 +02:00
|
|
|
c.Ui.Error(fmt.Sprintf("Error running plan: %s", err))
|
2014-06-10 20:34:08 +02:00
|
|
|
return 1
|
|
|
|
}
|
|
|
|
|
2014-06-20 20:47:02 +02:00
|
|
|
if plan.Diff.Empty() {
|
2014-07-13 01:35:59 +02:00
|
|
|
c.Ui.Output(
|
|
|
|
"No changes. Infrastructure is up-to-date. This means that Terraform\n" +
|
|
|
|
"could not detect any differences between your configuration and\n" +
|
|
|
|
"the real physical resources that exist. As a result, Terraform\n" +
|
|
|
|
"doesn't need to do anything.")
|
2014-06-27 07:23:51 +02:00
|
|
|
return 0
|
|
|
|
}
|
|
|
|
|
|
|
|
if outPath != "" {
|
|
|
|
log.Printf("[INFO] Writing plan output to: %s", outPath)
|
|
|
|
f, err := os.Create(outPath)
|
|
|
|
if err == nil {
|
|
|
|
defer f.Close()
|
|
|
|
err = terraform.WritePlan(plan, f)
|
|
|
|
}
|
|
|
|
if err != nil {
|
|
|
|
c.Ui.Error(fmt.Sprintf("Error writing plan file: %s", err))
|
|
|
|
return 1
|
|
|
|
}
|
2014-06-19 23:58:30 +02:00
|
|
|
}
|
2014-06-10 20:34:08 +02:00
|
|
|
|
2014-07-13 01:32:48 +02:00
|
|
|
if outPath == "" {
|
2014-07-13 01:35:59 +02:00
|
|
|
c.Ui.Output(strings.TrimSpace(planHeaderNoOutput) + "\n")
|
2014-07-13 01:32:48 +02:00
|
|
|
} else {
|
|
|
|
c.Ui.Output(fmt.Sprintf(
|
|
|
|
strings.TrimSpace(planHeaderYesOutput)+"\n",
|
|
|
|
outPath))
|
|
|
|
}
|
|
|
|
|
2014-09-25 07:54:51 +02:00
|
|
|
c.Ui.Output(FormatPlan(&FormatPlanOpts{
|
|
|
|
Plan: plan,
|
|
|
|
Color: c.Colorize(),
|
|
|
|
ModuleDepth: moduleDepth,
|
|
|
|
}))
|
2014-07-13 01:32:48 +02:00
|
|
|
|
2014-06-09 20:53:41 +02:00
|
|
|
return 0
|
|
|
|
}
|
|
|
|
|
2014-06-20 20:47:02 +02:00
|
|
|
func (c *PlanCommand) Help() string {
|
2014-06-09 20:53:41 +02:00
|
|
|
helpText := `
|
2014-07-12 05:51:26 +02:00
|
|
|
Usage: terraform plan [options] [dir]
|
|
|
|
|
|
|
|
Generates an execution plan for Terraform.
|
2014-06-09 20:53:41 +02:00
|
|
|
|
2014-07-12 05:51:26 +02:00
|
|
|
This execution plan can be reviewed prior to running apply to get a
|
|
|
|
sense for what Terraform will do. Optionally, the plan can be saved to
|
|
|
|
a Terraform plan file, and apply can take this plan file to execute
|
|
|
|
this plan exactly.
|
2014-06-09 20:53:41 +02:00
|
|
|
|
|
|
|
Options:
|
|
|
|
|
2014-07-28 00:09:04 +02:00
|
|
|
-backup=path Path to backup the existing state file before
|
|
|
|
modifying. Defaults to the "-state-out" path with
|
2014-08-07 09:19:56 +02:00
|
|
|
".backup" extension. Set to "-" to disable backup.
|
2014-07-28 00:09:04 +02:00
|
|
|
|
2014-07-01 18:12:35 +02:00
|
|
|
-destroy If set, a plan will be generated to destroy all resources
|
|
|
|
managed by the given configuration and state.
|
|
|
|
|
2014-09-29 20:11:35 +02:00
|
|
|
-input=true Ask for input for variables if not directly set.
|
|
|
|
|
2014-09-25 07:54:51 +02:00
|
|
|
-module-depth=n Specifies the depth of modules to show in the output.
|
|
|
|
This does not affect the plan itself, only the output
|
|
|
|
shown. By default, this is zero. -1 will expand all.
|
|
|
|
|
2014-07-13 05:21:46 +02:00
|
|
|
-no-color If specified, output won't contain any color.
|
|
|
|
|
2014-06-27 07:23:51 +02:00
|
|
|
-out=path Write a plan file to the given path. This can be used as
|
|
|
|
input to the "apply" command.
|
|
|
|
|
2014-06-26 18:56:29 +02:00
|
|
|
-refresh=true Update state prior to checking for differences.
|
|
|
|
|
2014-06-09 20:53:41 +02:00
|
|
|
-state=statefile Path to a Terraform state file to use to look
|
2014-07-12 05:51:26 +02:00
|
|
|
up Terraform-managed resources. By default it will
|
|
|
|
use the state "terraform.tfstate" if it exists.
|
2014-06-09 20:53:41 +02:00
|
|
|
|
2015-03-24 17:18:15 +01:00
|
|
|
-target=resource Resource to target. Operation will be limited to this
|
|
|
|
resource and its dependencies. This flag can be used
|
|
|
|
multiple times.
|
|
|
|
|
2014-07-18 20:37:27 +02:00
|
|
|
-var 'foo=bar' Set a variable in the Terraform configuration. This
|
|
|
|
flag can be set multiple times.
|
|
|
|
|
|
|
|
-var-file=foo Set variables in the Terraform configuration from
|
|
|
|
a file. If "terraform.tfvars" is present, it will be
|
|
|
|
automatically loaded if this flag is not specified.
|
|
|
|
|
2014-06-09 20:53:41 +02:00
|
|
|
`
|
|
|
|
return strings.TrimSpace(helpText)
|
|
|
|
}
|
|
|
|
|
2014-06-20 20:47:02 +02:00
|
|
|
func (c *PlanCommand) Synopsis() string {
|
2014-07-13 04:28:38 +02:00
|
|
|
return "Generate and show an execution plan"
|
2014-06-09 20:53:41 +02:00
|
|
|
}
|
2014-07-13 01:32:48 +02:00
|
|
|
|
|
|
|
const planHeaderNoOutput = `
|
|
|
|
The Terraform execution plan has been generated and is shown below.
|
|
|
|
Resources are shown in alphabetical order for quick scanning. Green resources
|
|
|
|
will be created (or destroyed and then created if an existing resource
|
|
|
|
exists), yellow resources are being changed in-place, and red resources
|
|
|
|
will be destroyed.
|
|
|
|
|
|
|
|
Note: You didn't specify an "-out" parameter to save this plan, so when
|
|
|
|
"apply" is called, Terraform can't guarantee this is what will execute.
|
|
|
|
`
|
|
|
|
|
|
|
|
const planHeaderYesOutput = `
|
|
|
|
The Terraform execution plan has been generated and is shown below.
|
|
|
|
Resources are shown in alphabetical order for quick scanning. Green resources
|
|
|
|
will be created (or destroyed and then created if an existing resource
|
|
|
|
exists), yellow resources are being changed in-place, and red resources
|
|
|
|
will be destroyed.
|
|
|
|
|
|
|
|
Your plan was also saved to the path below. Call the "apply" subcommand
|
|
|
|
with this plan file and Terraform will exactly execute this execution
|
|
|
|
plan.
|
|
|
|
|
|
|
|
Path: %s
|
|
|
|
`
|