2017-02-06 19:45:30 +01:00
|
|
|
package command
|
|
|
|
|
|
|
|
import (
|
2019-03-07 21:07:13 +01:00
|
|
|
"context"
|
2017-02-06 19:45:30 +01:00
|
|
|
"fmt"
|
|
|
|
"strings"
|
|
|
|
|
terraform: Ugly huge change to weave in new State and Plan types
Due to how often the state and plan types are referenced throughout
Terraform, there isn't a great way to switch them out gradually. As a
consequence, this huge commit gets us from the old world to a _compilable_
new world, but still has a large number of known test failures due to
key functionality being stubbed out.
The stubs here are for anything that interacts with providers, since we
now need to do the follow-up work to similarly replace the old
terraform.ResourceProvider interface with its replacement in the new
"providers" package. That work, along with work to fix the remaining
failing tests, will follow in subsequent commits.
The aim here was to replace all references to terraform.State and its
downstream types with states.State, terraform.Plan with plans.Plan,
state.State with statemgr.State, and switch to the new implementations of
the state and plan file formats. However, due to the number of times those
types are used, this also ended up affecting numerous other parts of core
such as terraform.Hook, the backend.Backend interface, and most of the CLI
commands.
Just as with 5861dbf3fc49b19587a31816eb06f511ab861bb4 before, I apologize
in advance to the person who inevitably just found this huge commit while
spelunking through the commit history.
2018-08-14 23:24:45 +02:00
|
|
|
"github.com/hashicorp/terraform/states/statemgr"
|
|
|
|
|
2017-02-08 00:00:09 +01:00
|
|
|
"github.com/hashicorp/terraform/terraform"
|
2018-03-28 00:31:05 +02:00
|
|
|
"github.com/hashicorp/terraform/tfdiags"
|
2017-02-15 17:53:19 +01:00
|
|
|
"github.com/mitchellh/cli"
|
2017-02-06 19:45:30 +01:00
|
|
|
)
|
|
|
|
|
|
|
|
// UnlockCommand is a cli.Command implementation that manually unlocks
|
|
|
|
// the state.
|
|
|
|
type UnlockCommand struct {
|
|
|
|
Meta
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *UnlockCommand) Run(args []string) int {
|
2020-04-01 21:01:08 +02:00
|
|
|
args = c.Meta.process(args)
|
2018-11-21 15:35:27 +01:00
|
|
|
var force bool
|
|
|
|
cmdFlags := c.Meta.defaultFlagSet("force-unlock")
|
2017-02-08 00:00:09 +01:00
|
|
|
cmdFlags.BoolVar(&force, "force", false, "force")
|
2017-02-06 19:45:30 +01:00
|
|
|
cmdFlags.Usage = func() { c.Ui.Error(c.Help()) }
|
|
|
|
if err := cmdFlags.Parse(args); err != nil {
|
2019-08-16 14:31:21 +02:00
|
|
|
c.Ui.Error(fmt.Sprintf("Error parsing command-line flags: %s\n", err.Error()))
|
2017-02-06 19:45:30 +01:00
|
|
|
return 1
|
|
|
|
}
|
|
|
|
|
2017-02-15 17:53:19 +01:00
|
|
|
args = cmdFlags.Args()
|
|
|
|
if len(args) == 0 {
|
|
|
|
c.Ui.Error("unlock requires a lock id argument")
|
|
|
|
return cli.RunResultHelp
|
|
|
|
}
|
|
|
|
|
|
|
|
lockID := args[0]
|
2017-02-18 02:28:34 +01:00
|
|
|
args = args[1:]
|
2017-02-15 17:53:19 +01:00
|
|
|
|
2017-02-06 19:45:30 +01:00
|
|
|
// assume everything is initialized. The user can manually init if this is
|
|
|
|
// required.
|
2017-02-15 17:53:19 +01:00
|
|
|
configPath, err := ModulePath(args)
|
2017-02-06 19:45:30 +01:00
|
|
|
if err != nil {
|
|
|
|
c.Ui.Error(err.Error())
|
|
|
|
return 1
|
|
|
|
}
|
|
|
|
|
2018-03-28 00:31:05 +02:00
|
|
|
var diags tfdiags.Diagnostics
|
|
|
|
|
|
|
|
backendConfig, backendDiags := c.loadBackendConfig(configPath)
|
|
|
|
diags = diags.Append(backendDiags)
|
|
|
|
if diags.HasErrors() {
|
|
|
|
c.showDiagnostics(diags)
|
2017-05-01 23:47:53 +02:00
|
|
|
return 1
|
|
|
|
}
|
|
|
|
|
2017-02-06 19:45:30 +01:00
|
|
|
// Load the backend
|
2018-03-28 00:31:05 +02:00
|
|
|
b, backendDiags := c.Backend(&BackendOpts{
|
|
|
|
Config: backendConfig,
|
2017-02-06 19:45:30 +01:00
|
|
|
})
|
2018-03-28 00:31:05 +02:00
|
|
|
diags = diags.Append(backendDiags)
|
|
|
|
if backendDiags.HasErrors() {
|
|
|
|
c.showDiagnostics(diags)
|
2017-02-06 19:45:30 +01:00
|
|
|
return 1
|
|
|
|
}
|
|
|
|
|
2020-06-16 18:23:15 +02:00
|
|
|
env, err := c.Workspace()
|
|
|
|
if err != nil {
|
|
|
|
c.Ui.Error(fmt.Sprintf("Error selecting workspace: %s", err))
|
|
|
|
return 1
|
|
|
|
}
|
2018-11-21 15:35:27 +01:00
|
|
|
stateMgr, err := b.StateMgr(env)
|
2017-02-06 19:45:30 +01:00
|
|
|
if err != nil {
|
|
|
|
c.Ui.Error(fmt.Sprintf("Failed to load state: %s", err))
|
|
|
|
return 1
|
|
|
|
}
|
|
|
|
|
2018-11-21 15:35:27 +01:00
|
|
|
_, isLocal := stateMgr.(*statemgr.Filesystem)
|
2017-02-08 00:00:09 +01:00
|
|
|
|
|
|
|
if !force {
|
|
|
|
// Forcing this doesn't do anything, but doesn't break anything either,
|
|
|
|
// and allows us to run the basic command test too.
|
|
|
|
if isLocal {
|
|
|
|
c.Ui.Error("Local state cannot be unlocked by another process")
|
|
|
|
return 1
|
|
|
|
}
|
|
|
|
|
|
|
|
desc := "Terraform will remove the lock on the remote state.\n" +
|
|
|
|
"This will allow local Terraform commands to modify this state, even though it\n" +
|
|
|
|
"may be still be in use. Only 'yes' will be accepted to confirm."
|
|
|
|
|
2019-03-07 21:07:13 +01:00
|
|
|
v, err := c.UIInput().Input(context.Background(), &terraform.InputOpts{
|
2017-02-08 00:00:09 +01:00
|
|
|
Id: "force-unlock",
|
|
|
|
Query: "Do you really want to force-unlock?",
|
|
|
|
Description: desc,
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
c.Ui.Error(fmt.Sprintf("Error asking for confirmation: %s", err))
|
|
|
|
return 1
|
|
|
|
}
|
|
|
|
if v != "yes" {
|
|
|
|
c.Ui.Output("force-unlock cancelled.")
|
|
|
|
return 1
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-11-21 15:35:27 +01:00
|
|
|
if err := stateMgr.Unlock(lockID); err != nil {
|
2017-02-06 19:45:30 +01:00
|
|
|
c.Ui.Error(fmt.Sprintf("Failed to unlock state: %s", err))
|
|
|
|
return 1
|
|
|
|
}
|
|
|
|
|
2017-02-08 00:00:09 +01:00
|
|
|
c.Ui.Output(c.Colorize().Color(strings.TrimSpace(outputUnlockSuccess)))
|
2017-02-06 19:45:30 +01:00
|
|
|
return 0
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *UnlockCommand) Help() string {
|
|
|
|
helpText := `
|
2017-02-15 17:53:19 +01:00
|
|
|
Usage: terraform force-unlock LOCK_ID [DIR]
|
2017-02-06 19:45:30 +01:00
|
|
|
|
|
|
|
Manually unlock the state for the defined configuration.
|
|
|
|
|
|
|
|
This will not modify your infrastructure. This command removes the lock on the
|
|
|
|
state for the current configuration. The behavior of this lock is dependent
|
|
|
|
on the backend being used. Local state files cannot be unlocked by another
|
|
|
|
process.
|
2017-02-08 00:00:09 +01:00
|
|
|
|
|
|
|
Options:
|
|
|
|
|
|
|
|
-force Don't ask for input for unlock confirmation.
|
2017-02-06 19:45:30 +01:00
|
|
|
`
|
|
|
|
return strings.TrimSpace(helpText)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *UnlockCommand) Synopsis() string {
|
|
|
|
return "Manually unlock the terraform state"
|
|
|
|
}
|
2017-02-08 00:00:09 +01:00
|
|
|
|
|
|
|
const outputUnlockSuccess = `
|
2017-02-14 20:33:55 +01:00
|
|
|
[reset][bold][green]Terraform state has been successfully unlocked![reset][green]
|
2017-02-08 00:00:09 +01:00
|
|
|
|
|
|
|
The state has been unlocked, and Terraform commands should now be able to
|
|
|
|
obtain a new lock on the remote state.
|
|
|
|
`
|