2014-09-27 01:03:39 +02:00
|
|
|
package command
|
|
|
|
|
|
|
|
import (
|
|
|
|
"fmt"
|
2017-06-09 18:42:45 +02:00
|
|
|
"log"
|
2014-09-27 01:03:39 +02:00
|
|
|
"os"
|
2016-01-20 02:13:19 +01:00
|
|
|
"path/filepath"
|
2017-06-02 02:57:43 +02:00
|
|
|
"sort"
|
2014-09-27 01:03:39 +02:00
|
|
|
"strings"
|
|
|
|
|
2017-06-09 18:42:45 +02:00
|
|
|
multierror "github.com/hashicorp/go-multierror"
|
2017-05-03 17:02:47 +02:00
|
|
|
"github.com/hashicorp/terraform/backend"
|
2014-09-27 01:03:39 +02:00
|
|
|
"github.com/hashicorp/terraform/config"
|
|
|
|
"github.com/hashicorp/terraform/config/module"
|
2017-03-17 07:27:05 +01:00
|
|
|
"github.com/hashicorp/terraform/helper/variables"
|
2017-06-01 20:36:30 +02:00
|
|
|
"github.com/hashicorp/terraform/plugin"
|
2017-05-03 17:02:47 +02:00
|
|
|
"github.com/hashicorp/terraform/plugin/discovery"
|
|
|
|
"github.com/hashicorp/terraform/terraform"
|
2014-09-27 01:03:39 +02:00
|
|
|
)
|
|
|
|
|
|
|
|
// InitCommand is a Command implementation that takes a Terraform
|
|
|
|
// module and clones it to the working directory.
|
|
|
|
type InitCommand struct {
|
|
|
|
Meta
|
2017-05-04 19:01:05 +02:00
|
|
|
|
|
|
|
// getProvider fetches providers that aren't found locally, and unpacks
|
|
|
|
// them into the dst directory.
|
|
|
|
// This uses discovery.GetProvider by default, but it provided here as a
|
|
|
|
// way to mock fetching providers for tests.
|
2017-06-01 20:36:30 +02:00
|
|
|
getProvider func(dst, provider string, req discovery.Constraints, protoVersion uint) error
|
2014-09-27 01:03:39 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
func (c *InitCommand) Run(args []string) int {
|
2017-05-03 17:02:47 +02:00
|
|
|
var flagBackend, flagGet, flagGetPlugins bool
|
2017-03-17 07:27:05 +01:00
|
|
|
var flagConfigExtra map[string]interface{}
|
2017-03-21 20:05:51 +01:00
|
|
|
|
2014-09-27 01:03:39 +02:00
|
|
|
args = c.Meta.process(args, false)
|
2017-01-19 05:50:45 +01:00
|
|
|
cmdFlags := c.flagSet("init")
|
|
|
|
cmdFlags.BoolVar(&flagBackend, "backend", true, "")
|
2017-03-17 07:27:05 +01:00
|
|
|
cmdFlags.Var((*variables.FlagAny)(&flagConfigExtra), "backend-config", "")
|
2017-01-19 05:50:45 +01:00
|
|
|
cmdFlags.BoolVar(&flagGet, "get", true, "")
|
2017-05-03 17:02:47 +02:00
|
|
|
cmdFlags.BoolVar(&flagGetPlugins, "get-plugins", true, "")
|
2017-03-21 20:05:51 +01:00
|
|
|
cmdFlags.BoolVar(&c.forceInitCopy, "force-copy", false, "suppress prompts about copying state data")
|
2017-04-01 22:19:59 +02:00
|
|
|
cmdFlags.BoolVar(&c.Meta.stateLock, "lock", true, "lock state")
|
|
|
|
cmdFlags.DurationVar(&c.Meta.stateLockTimeout, "lock-timeout", 0, "lock timeout")
|
2017-04-20 23:26:50 +02:00
|
|
|
cmdFlags.BoolVar(&c.reconfigure, "reconfigure", false, "reconfigure")
|
2017-03-21 20:05:51 +01:00
|
|
|
|
2014-09-27 01:03:39 +02:00
|
|
|
cmdFlags.Usage = func() { c.Ui.Error(c.Help()) }
|
|
|
|
if err := cmdFlags.Parse(args); err != nil {
|
|
|
|
return 1
|
|
|
|
}
|
|
|
|
|
2017-05-04 19:01:05 +02:00
|
|
|
// set getProvider if we don't have a test version already
|
|
|
|
if c.getProvider == nil {
|
|
|
|
c.getProvider = discovery.GetProvider
|
|
|
|
}
|
|
|
|
|
2017-01-19 05:50:45 +01:00
|
|
|
// Validate the arg count
|
2014-09-27 01:03:39 +02:00
|
|
|
args = cmdFlags.Args()
|
2017-06-02 22:13:11 +02:00
|
|
|
if len(args) > 1 {
|
|
|
|
c.Ui.Error("The init command expects at most one argument.\n")
|
2014-09-27 01:03:39 +02:00
|
|
|
cmdFlags.Usage()
|
|
|
|
return 1
|
2017-01-19 05:50:45 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
// Get our pwd. We don't always need it but always getting it is easier
|
|
|
|
// than the logic to determine if it is or isn't needed.
|
|
|
|
pwd, err := os.Getwd()
|
|
|
|
if err != nil {
|
|
|
|
c.Ui.Error(fmt.Sprintf("Error getting pwd: %s", err))
|
2014-09-27 01:03:39 +02:00
|
|
|
return 1
|
|
|
|
}
|
|
|
|
|
2017-01-19 05:50:45 +01:00
|
|
|
// Get the path and source module to copy
|
2017-06-02 22:13:11 +02:00
|
|
|
path := pwd
|
|
|
|
if len(args) == 1 {
|
|
|
|
path = args[0]
|
2014-09-27 01:03:39 +02:00
|
|
|
}
|
2016-01-20 02:13:19 +01:00
|
|
|
// Set the state out path to be the path requested for the module
|
|
|
|
// to be copied. This ensures any remote states gets setup in the
|
|
|
|
// proper directory.
|
2016-07-21 00:55:05 +02:00
|
|
|
c.Meta.dataDir = filepath.Join(path, DefaultDataDir)
|
2016-01-20 02:13:19 +01:00
|
|
|
|
2017-01-19 05:50:45 +01:00
|
|
|
// This will track whether we outputted anything so that we know whether
|
|
|
|
// to output a newline before the success message
|
|
|
|
var header bool
|
|
|
|
|
|
|
|
// If our directory is empty, then we're done. We can't get or setup
|
|
|
|
// the backend with an empty directory.
|
2014-09-27 01:03:39 +02:00
|
|
|
if empty, err := config.IsEmptyDir(path); err != nil {
|
|
|
|
c.Ui.Error(fmt.Sprintf(
|
2017-01-19 05:50:45 +01:00
|
|
|
"Error checking configuration: %s", err))
|
2014-09-27 01:03:39 +02:00
|
|
|
return 1
|
2017-01-19 05:50:45 +01:00
|
|
|
} else if empty {
|
|
|
|
c.Ui.Output(c.Colorize().Color(strings.TrimSpace(outputInitEmpty)))
|
|
|
|
return 0
|
2014-09-27 01:03:39 +02:00
|
|
|
}
|
|
|
|
|
2017-05-03 17:02:47 +02:00
|
|
|
var back backend.Backend
|
|
|
|
|
2017-01-19 05:50:45 +01:00
|
|
|
// If we're performing a get or loading the backend, then we perform
|
|
|
|
// some extra tasks.
|
|
|
|
if flagGet || flagBackend {
|
2017-05-01 23:47:53 +02:00
|
|
|
conf, err := c.Config(path)
|
2014-10-01 01:05:40 +02:00
|
|
|
if err != nil {
|
2017-01-19 05:50:45 +01:00
|
|
|
c.Ui.Error(fmt.Sprintf(
|
|
|
|
"Error loading configuration: %s", err))
|
2014-10-10 02:16:17 +02:00
|
|
|
return 1
|
|
|
|
}
|
2017-01-19 05:50:45 +01:00
|
|
|
|
|
|
|
// If we requested downloading modules and have modules in the config
|
|
|
|
if flagGet && len(conf.Modules) > 0 {
|
|
|
|
header = true
|
|
|
|
|
|
|
|
c.Ui.Output(c.Colorize().Color(fmt.Sprintf(
|
|
|
|
"[reset][bold]" +
|
|
|
|
"Downloading modules (if any)...")))
|
|
|
|
if err := getModules(&c.Meta, path, module.GetModeGet); err != nil {
|
2015-02-22 19:49:31 +01:00
|
|
|
c.Ui.Error(fmt.Sprintf(
|
2017-01-19 05:50:45 +01:00
|
|
|
"Error downloading modules: %s", err))
|
2015-02-22 19:49:31 +01:00
|
|
|
return 1
|
|
|
|
}
|
2017-05-03 17:02:47 +02:00
|
|
|
|
2017-01-19 05:50:45 +01:00
|
|
|
}
|
|
|
|
|
2017-05-03 17:02:47 +02:00
|
|
|
// If we're requesting backend configuration or looking for required
|
|
|
|
// plugins, load the backend
|
|
|
|
if flagBackend || flagGetPlugins {
|
2017-01-19 05:50:45 +01:00
|
|
|
header = true
|
|
|
|
|
2017-02-16 00:44:53 +01:00
|
|
|
// Only output that we're initializing a backend if we have
|
|
|
|
// something in the config. We can be UNSETTING a backend as well
|
|
|
|
// in which case we choose not to show this.
|
|
|
|
if conf.Terraform != nil && conf.Terraform.Backend != nil {
|
|
|
|
c.Ui.Output(c.Colorize().Color(fmt.Sprintf(
|
|
|
|
"[reset][bold]" +
|
|
|
|
"Initializing the backend...")))
|
|
|
|
}
|
2017-01-19 05:50:45 +01:00
|
|
|
|
|
|
|
opts := &BackendOpts{
|
2017-05-01 23:47:53 +02:00
|
|
|
Config: conf,
|
2017-03-17 07:27:05 +01:00
|
|
|
ConfigExtra: flagConfigExtra,
|
|
|
|
Init: true,
|
2017-01-19 05:50:45 +01:00
|
|
|
}
|
2017-05-03 17:02:47 +02:00
|
|
|
if back, err = c.Backend(opts); err != nil {
|
2017-01-19 05:50:45 +01:00
|
|
|
c.Ui.Error(err.Error())
|
2015-02-22 19:49:31 +01:00
|
|
|
return 1
|
|
|
|
}
|
2014-10-01 01:05:40 +02:00
|
|
|
}
|
2017-01-19 05:50:45 +01:00
|
|
|
}
|
2014-10-10 02:16:17 +02:00
|
|
|
|
2017-05-03 17:02:47 +02:00
|
|
|
// Now that we have loaded all modules, check the module tree for missing providers
|
|
|
|
if flagGetPlugins {
|
2017-05-31 02:13:43 +02:00
|
|
|
sMgr, err := back.State(c.Workspace())
|
2017-05-03 17:02:47 +02:00
|
|
|
if err != nil {
|
|
|
|
c.Ui.Error(fmt.Sprintf(
|
|
|
|
"Error loading state: %s", err))
|
|
|
|
return 1
|
|
|
|
}
|
|
|
|
|
|
|
|
if err := sMgr.RefreshState(); err != nil {
|
|
|
|
c.Ui.Error(fmt.Sprintf(
|
|
|
|
"Error refreshing state: %s", err))
|
|
|
|
return 1
|
|
|
|
}
|
|
|
|
|
2017-06-02 02:57:43 +02:00
|
|
|
c.Ui.Output(c.Colorize().Color(
|
|
|
|
"[reset][bold]Initializing provider plugins...",
|
|
|
|
))
|
|
|
|
|
2017-05-03 17:02:47 +02:00
|
|
|
err = c.getProviders(path, sMgr.State())
|
|
|
|
if err != nil {
|
2017-06-09 18:42:45 +02:00
|
|
|
// this function provides its own output
|
|
|
|
log.Printf("[ERROR] %s", err)
|
2017-05-03 17:02:47 +02:00
|
|
|
return 1
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-01-19 05:50:45 +01:00
|
|
|
// If we outputted information, then we need to output a newline
|
|
|
|
// so that our success message is nicely spaced out from prior text.
|
|
|
|
if header {
|
|
|
|
c.Ui.Output("")
|
2014-10-01 01:05:40 +02:00
|
|
|
}
|
2017-01-19 05:50:45 +01:00
|
|
|
|
|
|
|
c.Ui.Output(c.Colorize().Color(strings.TrimSpace(outputInitSuccess)))
|
|
|
|
|
2014-09-27 01:03:39 +02:00
|
|
|
return 0
|
|
|
|
}
|
|
|
|
|
2017-06-09 18:42:45 +02:00
|
|
|
// Load the complete module tree, and fetch any missing providers.
|
|
|
|
// This method outputs its own Ui.
|
2017-05-03 17:02:47 +02:00
|
|
|
func (c *InitCommand) getProviders(path string, state *terraform.State) error {
|
|
|
|
mod, err := c.Module(path)
|
|
|
|
if err != nil {
|
2017-06-09 18:42:45 +02:00
|
|
|
c.Ui.Error(fmt.Sprintf("Error getting plugins: %s", err))
|
2017-05-03 17:02:47 +02:00
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
if err := mod.Validate(); err != nil {
|
2017-06-09 18:42:45 +02:00
|
|
|
c.Ui.Error(fmt.Sprintf("Error getting plugins: %s", err))
|
2017-05-03 17:02:47 +02:00
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2017-05-25 02:35:46 +02:00
|
|
|
available := c.providerPluginSet()
|
2017-05-03 17:02:47 +02:00
|
|
|
requirements := terraform.ModuleTreeDependencies(mod, state).AllPluginRequirements()
|
2017-05-25 02:35:46 +02:00
|
|
|
missing := c.missingPlugins(available, requirements)
|
2017-05-03 17:02:47 +02:00
|
|
|
|
|
|
|
dst := c.pluginDir()
|
2017-06-09 18:42:45 +02:00
|
|
|
var errs error
|
2017-05-03 17:02:47 +02:00
|
|
|
for provider, reqd := range missing {
|
2017-06-03 01:49:08 +02:00
|
|
|
c.Ui.Output(fmt.Sprintf("- downloading plugin for provider %q...", provider))
|
2017-06-01 20:36:30 +02:00
|
|
|
err := c.getProvider(dst, provider, reqd.Versions, plugin.Handshake.ProtocolVersion)
|
2017-06-09 18:42:45 +02:00
|
|
|
|
2017-05-03 17:02:47 +02:00
|
|
|
if err != nil {
|
2017-06-09 18:42:45 +02:00
|
|
|
c.Ui.Error(fmt.Sprintf(errProviderNotFound, err, provider, reqd.Versions))
|
|
|
|
errs = multierror.Append(errs, err)
|
2017-05-03 17:02:47 +02:00
|
|
|
}
|
|
|
|
}
|
2017-05-25 02:35:46 +02:00
|
|
|
|
2017-06-09 18:42:45 +02:00
|
|
|
if errs != nil {
|
|
|
|
return errs
|
|
|
|
}
|
|
|
|
|
2017-05-25 02:35:46 +02:00
|
|
|
// With all the providers downloaded, we'll generate our lock file
|
|
|
|
// that ensures the provider binaries remain unchanged until we init
|
|
|
|
// again. If anything changes, other commands that use providers will
|
|
|
|
// fail with an error instructing the user to re-run this command.
|
|
|
|
available = c.providerPluginSet() // re-discover to see newly-installed plugins
|
|
|
|
chosen := choosePlugins(available, requirements)
|
|
|
|
digests := map[string][]byte{}
|
|
|
|
for name, meta := range chosen {
|
|
|
|
digest, err := meta.SHA256()
|
|
|
|
if err != nil {
|
2017-06-09 18:42:45 +02:00
|
|
|
c.Ui.Error(fmt.Sprintf("failed to read provider plugin %s: %s", meta.Path, err))
|
|
|
|
return err
|
2017-05-25 02:35:46 +02:00
|
|
|
}
|
|
|
|
digests[name] = digest
|
|
|
|
}
|
|
|
|
err = c.providerPluginsLock().Write(digests)
|
|
|
|
if err != nil {
|
2017-06-09 18:42:45 +02:00
|
|
|
c.Ui.Error(fmt.Sprintf("failed to save provider manifest: %s", err))
|
|
|
|
return err
|
2017-05-25 02:35:46 +02:00
|
|
|
}
|
|
|
|
|
2017-06-02 02:57:43 +02:00
|
|
|
// If any providers have "floating" versions (completely unconstrained)
|
|
|
|
// we'll suggest the user constrain with a pessimistic constraint to
|
|
|
|
// avoid implicitly adopting a later major release.
|
|
|
|
constraintSuggestions := make(map[string]discovery.ConstraintStr)
|
|
|
|
for name, meta := range chosen {
|
|
|
|
req := requirements[name]
|
|
|
|
if req == nil {
|
|
|
|
// should never happen, but we don't want to crash here, so we'll
|
|
|
|
// be cautious.
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
if req.Versions.Unconstrained() {
|
|
|
|
// meta.Version.MustParse is safe here because our "chosen" metas
|
|
|
|
// were already filtered for validity of versions.
|
|
|
|
constraintSuggestions[name] = meta.Version.MustParse().MinorUpgradeConstraintStr()
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if len(constraintSuggestions) != 0 {
|
|
|
|
names := make([]string, 0, len(constraintSuggestions))
|
|
|
|
for name := range constraintSuggestions {
|
|
|
|
names = append(names, name)
|
|
|
|
}
|
|
|
|
sort.Strings(names)
|
|
|
|
|
|
|
|
c.Ui.Output(outputInitProvidersUnconstrained)
|
|
|
|
for _, name := range names {
|
|
|
|
c.Ui.Output(fmt.Sprintf("* provider.%s: version = %q", name, constraintSuggestions[name]))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-05-03 17:02:47 +02:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2014-09-27 01:03:39 +02:00
|
|
|
func (c *InitCommand) Help() string {
|
|
|
|
helpText := `
|
2017-06-02 22:13:11 +02:00
|
|
|
Usage: terraform init [options] [DIR]
|
2017-01-19 05:50:45 +01:00
|
|
|
|
2017-06-03 01:59:52 +02:00
|
|
|
Initialize a new or existing Terraform working directory by creating
|
2017-01-19 05:50:45 +01:00
|
|
|
initial files, loading any remote state, downloading modules, etc.
|
|
|
|
|
|
|
|
This is the first command that should be run for any new or existing
|
|
|
|
Terraform configuration per machine. This sets up all the local data
|
2017-04-26 16:10:04 +02:00
|
|
|
necessary to run Terraform that is typically not committed to version
|
2017-01-19 05:50:45 +01:00
|
|
|
control.
|
|
|
|
|
|
|
|
This command is always safe to run multiple times. Though subsequent runs
|
2017-06-03 01:59:52 +02:00
|
|
|
may give errors, this command will never delete your configuration or
|
|
|
|
state. Even so, if you have important information, please back it up prior
|
|
|
|
to running this command, just in case.
|
2014-09-27 01:03:39 +02:00
|
|
|
|
2017-01-19 05:50:45 +01:00
|
|
|
If no arguments are given, the configuration in this working directory
|
|
|
|
is initialized.
|
2014-09-27 01:03:39 +02:00
|
|
|
|
2014-10-01 01:05:40 +02:00
|
|
|
Options:
|
|
|
|
|
2017-06-03 01:59:52 +02:00
|
|
|
-backend=true Configure the backend for this configuration.
|
2014-12-05 04:06:47 +01:00
|
|
|
|
2017-03-17 07:27:05 +01:00
|
|
|
-backend-config=path This can be either a path to an HCL file with key/value
|
|
|
|
assignments (same format as terraform.tfvars) or a
|
|
|
|
'key=value' format. This is merged with what is in the
|
|
|
|
configuration file. This can be specified multiple
|
|
|
|
times. The backend type must be in the configuration
|
|
|
|
itself.
|
2014-10-01 01:05:40 +02:00
|
|
|
|
2017-04-20 23:26:50 +02:00
|
|
|
-force-copy Suppress prompts about copying state data. This is
|
|
|
|
equivalent to providing a "yes" to all confirmation
|
|
|
|
prompts.
|
|
|
|
|
2017-01-19 05:50:45 +01:00
|
|
|
-get=true Download any modules for this configuration.
|
|
|
|
|
2017-05-03 17:02:47 +02:00
|
|
|
-get-plugins=true Download any missing plugins for this configuration.
|
|
|
|
|
2017-01-19 05:50:45 +01:00
|
|
|
-input=true Ask for input if necessary. If false, will error if
|
|
|
|
input was required.
|
|
|
|
|
2017-04-01 22:19:59 +02:00
|
|
|
-lock=true Lock the state file when locking is supported.
|
|
|
|
|
|
|
|
-lock-timeout=0s Duration to retry a state lock.
|
|
|
|
|
2017-01-19 05:50:45 +01:00
|
|
|
-no-color If specified, output won't contain any color.
|
2015-06-22 14:14:01 +02:00
|
|
|
|
2017-04-20 23:26:50 +02:00
|
|
|
-reconfigure Reconfigure the backend, ignoring any saved configuration.
|
2014-09-27 01:03:39 +02:00
|
|
|
`
|
|
|
|
return strings.TrimSpace(helpText)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *InitCommand) Synopsis() string {
|
2017-01-19 05:50:45 +01:00
|
|
|
return "Initialize a new or existing Terraform configuration"
|
2014-09-27 01:03:39 +02:00
|
|
|
}
|
2017-01-19 05:50:45 +01:00
|
|
|
|
|
|
|
const errInitCopyNotEmpty = `
|
|
|
|
The destination path contains Terraform configuration files. The init command
|
|
|
|
with a SOURCE parameter can only be used on a directory without existing
|
|
|
|
Terraform files.
|
|
|
|
|
|
|
|
Please resolve this issue and try again.
|
|
|
|
`
|
|
|
|
|
|
|
|
const outputInitEmpty = `
|
|
|
|
[reset][bold]Terraform initialized in an empty directory![reset]
|
|
|
|
|
|
|
|
The directory has no Terraform configuration files. You may begin working
|
|
|
|
with Terraform immediately by creating Terraform configuration files.
|
|
|
|
`
|
|
|
|
|
|
|
|
const outputInitSuccess = `
|
|
|
|
[reset][bold][green]Terraform has been successfully initialized![reset][green]
|
|
|
|
|
|
|
|
You may now begin working with Terraform. Try running "terraform plan" to see
|
|
|
|
any changes that are required for your infrastructure. All Terraform commands
|
|
|
|
should now work.
|
|
|
|
|
|
|
|
If you ever set or change modules or backend configuration for Terraform,
|
2017-06-03 01:59:52 +02:00
|
|
|
rerun this command to reinitialize your working directory. If you forget, other
|
2017-01-19 05:50:45 +01:00
|
|
|
commands will detect it and remind you to do so if necessary.
|
|
|
|
`
|
2017-06-02 02:57:43 +02:00
|
|
|
|
|
|
|
const outputInitProvidersUnconstrained = `
|
|
|
|
The following providers do not have any version constraints in configuration,
|
|
|
|
so the latest version was installed.
|
|
|
|
|
|
|
|
To prevent automatic upgrades to new major versions that may contain breaking
|
|
|
|
changes, it is recommended to add version = "..." constraints to the
|
|
|
|
corresponding provider blocks in configuration, with the constraint strings
|
|
|
|
suggested below.
|
|
|
|
`
|
2017-06-09 18:42:45 +02:00
|
|
|
|
|
|
|
const errProviderNotFound = `
|
|
|
|
[reset][red]%[1]s
|
|
|
|
|
|
|
|
[reset][bold][red]Error: Satisfying %[2]q, provider not found
|
|
|
|
|
|
|
|
[reset][red]A version of the %[2]q provider that satisfies all version
|
|
|
|
constraints could not be found. The requested version
|
|
|
|
constraints are shown below.
|
|
|
|
|
|
|
|
%[2]s = %[3]q[reset]
|
|
|
|
`
|