terraform/command/remote.go

340 lines
9.6 KiB
Go
Raw Normal View History

2014-10-10 00:05:53 +02:00
package command
2014-10-10 01:31:56 +02:00
import (
"flag"
"fmt"
"log"
"os"
"strings"
2015-02-23 19:20:40 +01:00
"github.com/hashicorp/terraform/state"
"github.com/hashicorp/terraform/state/remote"
2014-10-10 01:31:56 +02:00
"github.com/hashicorp/terraform/terraform"
)
// remoteCommandConfig is used to encapsulate our configuration
type remoteCommandConfig struct {
disableRemote bool
pullOnDisable bool
statePath string
backupPath string
}
2014-10-10 00:05:53 +02:00
// RemoteCommand is a Command implementation that is used to
// enable and disable remote state management
type RemoteCommand struct {
Meta
2014-10-10 01:31:56 +02:00
conf remoteCommandConfig
remoteConf terraform.RemoteState
2014-10-10 00:05:53 +02:00
}
func (c *RemoteCommand) Run(args []string) int {
2014-10-10 01:31:56 +02:00
args = c.Meta.process(args, false)
2015-02-23 19:51:31 +01:00
config := make(map[string]string)
2014-10-10 01:31:56 +02:00
cmdFlags := flag.NewFlagSet("remote", flag.ContinueOnError)
cmdFlags.BoolVar(&c.conf.disableRemote, "disable", false, "")
cmdFlags.BoolVar(&c.conf.pullOnDisable, "pull", true, "")
cmdFlags.StringVar(&c.conf.statePath, "state", DefaultStateFilename, "path")
2014-10-10 01:31:56 +02:00
cmdFlags.StringVar(&c.conf.backupPath, "backup", "", "path")
cmdFlags.StringVar(&c.remoteConf.Type, "backend", "atlas", "")
2015-02-23 19:58:39 +01:00
cmdFlags.Var((*FlagKV)(&config), "backend-config", "config")
2014-10-10 01:31:56 +02:00
cmdFlags.Usage = func() { c.Ui.Error(c.Help()) }
if err := cmdFlags.Parse(args); err != nil {
return 1
}
// Show help if given no inputs
2015-02-23 19:51:31 +01:00
if !c.conf.disableRemote && c.remoteConf.Type == "atlas" && len(config) == 0 {
cmdFlags.Usage()
return 1
}
2015-02-23 19:20:40 +01:00
// Set the local state path
c.statePath = c.conf.statePath
// Populate the various configurations
2015-02-23 19:51:31 +01:00
c.remoteConf.Config = config
2015-02-23 19:20:40 +01:00
// Get the state information. We specifically request the cache only
// for the remote state here because it is possible the remote state
// is invalid and we don't want to error.
stateOpts := c.StateOpts()
stateOpts.RemoteCacheOnly = true
if _, err := c.StateRaw(stateOpts); err != nil {
c.Ui.Error(fmt.Sprintf("Error loading local state: %s", err))
2014-10-10 01:31:56 +02:00
return 1
}
2015-02-23 19:20:40 +01:00
// Get the local and remote [cached] state
localState := c.stateResult.Local.State()
var remoteState *terraform.State
if remote := c.stateResult.Remote; remote != nil {
remoteState = remote.State()
2014-10-10 01:31:56 +02:00
}
// Check if remote state is being disabled
if c.conf.disableRemote {
2015-02-23 19:20:40 +01:00
if !remoteState.IsRemote() {
2014-10-10 01:31:56 +02:00
c.Ui.Error(fmt.Sprintf("Remote state management not enabled! Aborting."))
return 1
}
2015-02-23 19:20:40 +01:00
if !localState.Empty() {
2014-10-10 01:31:56 +02:00
c.Ui.Error(fmt.Sprintf("State file already exists at '%s'. Aborting.",
c.conf.statePath))
return 1
}
2015-02-23 19:20:40 +01:00
2014-10-10 01:31:56 +02:00
return c.disableRemoteState()
}
// Ensure there is no conflict
2015-02-23 19:20:40 +01:00
haveCache := !remoteState.Empty()
haveLocal := !localState.Empty()
2014-10-10 01:31:56 +02:00
switch {
2015-02-23 19:20:40 +01:00
case haveCache && haveLocal:
2014-10-10 01:31:56 +02:00
c.Ui.Error(fmt.Sprintf("Remote state is enabled, but non-managed state file '%s' is also present!",
c.conf.statePath))
return 1
2015-02-23 19:20:40 +01:00
case !haveCache && !haveLocal:
2014-10-10 01:31:56 +02:00
// If we don't have either state file, initialize a blank state file
return c.initBlankState()
2015-02-23 19:20:40 +01:00
case haveCache && !haveLocal:
2014-10-10 01:31:56 +02:00
// Update the remote state target potentially
return c.updateRemoteConfig()
2015-02-23 19:20:40 +01:00
case !haveCache && haveLocal:
2014-10-10 01:31:56 +02:00
// Enable remote state management
return c.enableRemoteState()
}
2015-02-18 19:25:07 +01:00
panic("unhandled case")
2014-10-10 01:31:56 +02:00
}
// disableRemoteState is used to disable remote state management,
// and move the state file into place.
func (c *RemoteCommand) disableRemoteState() int {
2015-02-23 19:20:40 +01:00
if c.stateResult == nil {
c.Ui.Error(fmt.Sprintf(
"Internal error. State() must be called internally before remote\n" +
"state can be disabled. Please report this as a bug."))
2014-10-10 01:31:56 +02:00
return 1
}
2015-02-23 19:20:40 +01:00
if !c.stateResult.State.State().IsRemote() {
c.Ui.Error(fmt.Sprintf(
"Remote state is not enabled. Can't disable remote state."))
return 1
}
local := c.stateResult.Local
remote := c.stateResult.Remote
2014-10-10 01:31:56 +02:00
// Ensure we have the latest state before disabling
if c.conf.pullOnDisable {
2014-10-11 01:20:42 +02:00
log.Printf("[INFO] Refreshing local state from remote server")
2015-02-23 19:20:40 +01:00
if err := remote.RefreshState(); err != nil {
c.Ui.Error(fmt.Sprintf(
2015-02-23 19:20:40 +01:00
"Failed to refresh from remote state: %s", err))
return 1
}
// Exit if we were unable to update
2015-02-23 19:20:40 +01:00
if change := remote.RefreshResult(); !change.SuccessfulPull() {
c.Ui.Error(fmt.Sprintf("%s", change))
return 1
} else {
2014-10-11 01:20:42 +02:00
log.Printf("[INFO] %s", change)
}
}
2014-10-10 01:31:56 +02:00
// Clear the remote management, and copy into place
2015-02-23 19:20:40 +01:00
newState := remote.State()
newState.Remote = nil
if err := local.WriteState(newState); err != nil {
c.Ui.Error(fmt.Sprintf("Failed to encode state file '%s': %s",
2014-10-10 01:31:56 +02:00
c.conf.statePath, err))
return 1
}
2015-02-23 19:20:40 +01:00
if err := local.PersistState(); err != nil {
c.Ui.Error(fmt.Sprintf("Failed to encode state file '%s': %s",
2014-10-10 01:31:56 +02:00
c.conf.statePath, err))
return 1
}
// Remove the old state file
2015-02-23 19:20:40 +01:00
if err := os.Remove(c.stateResult.RemotePath); err != nil {
2014-10-10 01:31:56 +02:00
c.Ui.Error(fmt.Sprintf("Failed to remove the local state file: %v", err))
return 1
}
2015-02-23 19:20:40 +01:00
2014-10-10 01:31:56 +02:00
return 0
}
// validateRemoteConfig is used to verify that the remote configuration
// we have is valid
func (c *RemoteCommand) validateRemoteConfig() error {
2015-02-23 19:20:40 +01:00
conf := c.remoteConf
_, err := remote.NewClient(conf.Type, conf.Config)
2014-10-10 01:31:56 +02:00
if err != nil {
c.Ui.Error(fmt.Sprintf("%s", err))
}
return err
}
// initBlank state is used to initialize a blank state that is
// remote enabled
func (c *RemoteCommand) initBlankState() int {
// Validate the remote configuration
if err := c.validateRemoteConfig(); err != nil {
return 1
}
// Make a blank state, attach the remote configuration
blank := terraform.NewState()
blank.Remote = &c.remoteConf
// Persist the state
2015-02-23 19:20:40 +01:00
remote := &state.LocalState{Path: c.stateResult.RemotePath}
if err := remote.WriteState(blank); err != nil {
c.Ui.Error(fmt.Sprintf("Failed to initialize state file: %v", err))
return 1
}
if err := remote.PersistState(); err != nil {
2014-10-10 01:31:56 +02:00
c.Ui.Error(fmt.Sprintf("Failed to initialize state file: %v", err))
return 1
}
// Success!
c.Ui.Output("Initialized blank state with remote state enabled!")
return 0
}
// updateRemoteConfig is used to update the configuration of the
// remote state store
func (c *RemoteCommand) updateRemoteConfig() int {
// Validate the remote configuration
if err := c.validateRemoteConfig(); err != nil {
return 1
}
2015-02-23 19:20:40 +01:00
// Read in the local state, which is just the cache of the remote state
remote := c.stateResult.Remote.Cache
2014-10-10 01:31:56 +02:00
// Update the configuration
2015-02-23 19:20:40 +01:00
state := remote.State()
state.Remote = &c.remoteConf
if err := remote.WriteState(state); err != nil {
c.Ui.Error(fmt.Sprintf("%s", err))
return 1
}
if err := remote.PersistState(); err != nil {
2014-10-10 01:31:56 +02:00
c.Ui.Error(fmt.Sprintf("%s", err))
return 1
}
// Success!
c.Ui.Output("Remote configuration updated")
return 0
}
// enableRemoteState is used to enable remote state management
// and to move a state file into place
func (c *RemoteCommand) enableRemoteState() int {
// Validate the remote configuration
if err := c.validateRemoteConfig(); err != nil {
return 1
}
2015-02-23 19:20:40 +01:00
// Read the local state
local := c.stateResult.Local
if err := local.RefreshState(); err != nil {
c.Ui.Error(fmt.Sprintf("Failed to read local state: %s", err))
2014-10-10 01:31:56 +02:00
return 1
}
// Backup the state file before we modify it
backupPath := c.conf.backupPath
if backupPath != "-" {
// Provide default backup path if none provided
if backupPath == "" {
backupPath = c.conf.statePath + DefaultBackupExtention
}
log.Printf("[INFO] Writing backup state to: %s", backupPath)
2015-02-23 19:20:40 +01:00
backup := &state.LocalState{Path: backupPath}
if err := backup.WriteState(local.State()); err != nil {
c.Ui.Error(fmt.Sprintf("Error writing backup state file: %s", err))
return 1
2014-10-10 01:31:56 +02:00
}
2015-02-23 19:20:40 +01:00
if err := backup.PersistState(); err != nil {
2014-10-10 01:31:56 +02:00
c.Ui.Error(fmt.Sprintf("Error writing backup state file: %s", err))
return 1
}
}
// Update the local configuration, move into place
2015-02-23 19:20:40 +01:00
state := local.State()
2014-10-10 01:31:56 +02:00
state.Remote = &c.remoteConf
2015-02-23 19:20:40 +01:00
remote := c.stateResult.Remote
if err := remote.WriteState(state); err != nil {
c.Ui.Error(fmt.Sprintf("%s", err))
return 1
}
if err := remote.PersistState(); err != nil {
2014-10-10 01:31:56 +02:00
c.Ui.Error(fmt.Sprintf("%s", err))
return 1
}
2015-02-23 19:20:40 +01:00
// Remove the original, local state file
2014-10-10 01:31:56 +02:00
log.Printf("[INFO] Removing state file: %s", c.conf.statePath)
if err := os.Remove(c.conf.statePath); err != nil {
c.Ui.Error(fmt.Sprintf("Failed to remove state file '%s': %v",
c.conf.statePath, err))
return 1
}
// Success!
c.Ui.Output("Remote state management enabled")
2014-10-10 00:05:53 +02:00
return 0
}
func (c *RemoteCommand) Help() string {
helpText := `
Usage: terraform remote [options]
Configures Terraform to use a remote state server. This allows state
to be pulled down when necessary and then pushed to the server when
updated. In this mode, the state file does not need to be stored durably
since the remote server provides the durability.
Options:
-backend=Atlas Specifies the type of remote backend. Must be one
of Atlas, Consul, or HTTP. Defaults to Atlas.
2014-10-10 01:31:56 +02:00
2015-02-23 19:58:39 +01:00
-backend-config="k=v" Specifies configuration for the remote storage
backend. This can be specified multiple times.
2014-10-10 01:31:56 +02:00
-backup=path Path to backup the existing state file before
modifying. Defaults to the "-state" path with
".backup" extension. Set to "-" to disable backup.
-disable Disables remote state management and migrates the state
to the -state path.
-pull=true Controls if the remote state is pulled before disabling.
This defaults to true to ensure the latest state is cached
2015-02-23 19:58:39 +01:00
before disabling.
2014-10-10 01:31:56 +02:00
-state=path Path to read state. Defaults to "terraform.tfstate"
unless remote state is enabled.
2014-10-10 00:05:53 +02:00
`
return strings.TrimSpace(helpText)
}
func (c *RemoteCommand) Synopsis() string {
return "Configures remote state management"
}