2017-05-03 17:02:47 +02:00
|
|
|
package discovery
|
|
|
|
|
|
|
|
import (
|
|
|
|
"errors"
|
|
|
|
"fmt"
|
|
|
|
"io/ioutil"
|
|
|
|
"log"
|
|
|
|
"net/http"
|
2017-06-13 03:27:13 +02:00
|
|
|
"os"
|
2017-05-03 17:02:47 +02:00
|
|
|
"runtime"
|
2017-05-31 23:38:55 +02:00
|
|
|
"strconv"
|
2017-05-03 17:02:47 +02:00
|
|
|
"strings"
|
|
|
|
|
|
|
|
"golang.org/x/net/html"
|
|
|
|
|
2017-05-31 23:38:55 +02:00
|
|
|
cleanhttp "github.com/hashicorp/go-cleanhttp"
|
2017-05-03 17:02:47 +02:00
|
|
|
getter "github.com/hashicorp/go-getter"
|
2017-06-13 03:27:13 +02:00
|
|
|
multierror "github.com/hashicorp/go-multierror"
|
2017-05-03 17:02:47 +02:00
|
|
|
)
|
|
|
|
|
2017-06-01 20:32:33 +02:00
|
|
|
// Releases are located by parsing the html listing from releases.hashicorp.com.
|
2017-05-03 17:02:47 +02:00
|
|
|
//
|
|
|
|
// The URL for releases follows the pattern:
|
2017-06-09 19:56:31 +02:00
|
|
|
// https://releases.hashicorp.com/terraform-provider-name/<x.y.z>/terraform-provider-name_<x.y.z>_<os>_<arch>.<ext>
|
2017-06-01 20:32:33 +02:00
|
|
|
//
|
|
|
|
// The plugin protocol version will be saved with the release and returned in
|
|
|
|
// the header X-TERRAFORM_PROTOCOL_VERSION.
|
2017-05-03 17:02:47 +02:00
|
|
|
|
2017-06-09 19:56:31 +02:00
|
|
|
const protocolVersionHeader = "x-terraform-protocol-version"
|
2017-05-03 17:02:47 +02:00
|
|
|
|
2017-06-01 20:32:33 +02:00
|
|
|
var releaseHost = "https://releases.hashicorp.com"
|
2017-05-03 17:02:47 +02:00
|
|
|
|
2017-06-01 20:32:33 +02:00
|
|
|
var httpClient = cleanhttp.DefaultClient()
|
|
|
|
|
|
|
|
// Plugins are referred to by the short name, but all URLs and files will use
|
|
|
|
// the full name prefixed with terraform-<plugin_type>-
|
|
|
|
func providerName(name string) string {
|
|
|
|
return "terraform-provider-" + name
|
2017-05-03 17:02:47 +02:00
|
|
|
}
|
|
|
|
|
2017-06-17 16:52:30 +02:00
|
|
|
func providerFileName(name, version string) string {
|
|
|
|
return fmt.Sprintf("%s_%s_%s_%s.zip", providerName(name), version, runtime.GOOS, runtime.GOARCH)
|
|
|
|
}
|
|
|
|
|
2017-06-01 20:32:33 +02:00
|
|
|
// providerVersionsURL returns the path to the released versions directory for the provider:
|
2017-06-09 19:56:31 +02:00
|
|
|
// https://releases.hashicorp.com/terraform-provider-name/
|
2017-06-01 20:32:33 +02:00
|
|
|
func providerVersionsURL(name string) string {
|
2017-06-09 19:56:31 +02:00
|
|
|
return releaseHost + "/" + providerName(name) + "/"
|
2017-05-04 20:32:18 +02:00
|
|
|
}
|
|
|
|
|
2017-06-01 20:32:33 +02:00
|
|
|
// providerURL returns the full path to the provider file, using the current OS
|
|
|
|
// and ARCH:
|
|
|
|
// .../terraform-provider-name_<x.y.z>/terraform-provider-name_<x.y.z>_<os>_<arch>.<ext>
|
|
|
|
func providerURL(name, version string) string {
|
2017-06-17 16:52:30 +02:00
|
|
|
return fmt.Sprintf("%s%s/%s", providerVersionsURL(name), version, providerFileName(name, version))
|
|
|
|
}
|
|
|
|
|
|
|
|
func providerChecksumURL(name, version string) string {
|
|
|
|
fileName := fmt.Sprintf("%s_%s_SHA256SUMS", providerName(name), version)
|
2017-06-09 19:56:31 +02:00
|
|
|
u := fmt.Sprintf("%s%s/%s", providerVersionsURL(name), version, fileName)
|
2017-06-01 20:32:33 +02:00
|
|
|
return u
|
2017-05-04 20:32:18 +02:00
|
|
|
}
|
2017-05-03 17:02:47 +02:00
|
|
|
|
2017-06-13 03:22:47 +02:00
|
|
|
// An Installer maintains a local cache of plugins by downloading plugins
|
|
|
|
// from an online repository.
|
|
|
|
type Installer interface {
|
|
|
|
Get(name string, req Constraints) (PluginMeta, error)
|
2017-06-13 03:27:13 +02:00
|
|
|
PurgeUnused(used map[string]PluginMeta) (removed PluginMetaSet, err error)
|
2017-06-13 03:22:47 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
// ProviderInstaller is an Installer implementation that knows how to
|
|
|
|
// download Terraform providers from the official HashiCorp releases service
|
|
|
|
// into a local directory. The files downloaded are compliant with the
|
|
|
|
// naming scheme expected by FindPlugins, so the target directory of a
|
|
|
|
// provider installer can be used as one of several plugin discovery sources.
|
|
|
|
type ProviderInstaller struct {
|
|
|
|
Dir string
|
|
|
|
|
|
|
|
PluginProtocolVersion uint
|
2017-06-17 16:52:30 +02:00
|
|
|
|
|
|
|
// Skip checksum and signature verification
|
|
|
|
SkipVerify bool
|
2017-06-13 03:22:47 +02:00
|
|
|
}
|
|
|
|
|
2017-06-20 03:48:42 +02:00
|
|
|
// Get is part of an implementation of type Installer, and attempts to download
|
|
|
|
// and install a Terraform provider matching the given constraints.
|
|
|
|
//
|
|
|
|
// This method may return one of a number of sentinel errors from this
|
|
|
|
// package to indicate issues that are likely to be resolvable via user action:
|
|
|
|
//
|
|
|
|
// ErrorNoSuchProvider: no provider with the given name exists in the repository.
|
|
|
|
// ErrorNoSuitableVersion: the provider exists but no available version matches constraints.
|
|
|
|
// ErrorNoVersionCompatible: a plugin was found within the constraints but it is
|
|
|
|
// incompatible with the current Terraform version.
|
|
|
|
//
|
|
|
|
// These errors should be recognized and handled as special cases by the caller
|
|
|
|
// to present a suitable user-oriented error message.
|
|
|
|
//
|
|
|
|
// All other errors indicate an internal problem that is likely _not_ solvable
|
|
|
|
// through user action, or at least not within Terraform's scope. Error messages
|
|
|
|
// are produced under the assumption that if presented to the user they will
|
|
|
|
// be presented alongside context about what is being installed, and thus the
|
|
|
|
// error messages do not redundantly include such information.
|
2017-06-13 03:22:47 +02:00
|
|
|
func (i *ProviderInstaller) Get(provider string, req Constraints) (PluginMeta, error) {
|
2017-05-03 17:02:47 +02:00
|
|
|
versions, err := listProviderVersions(provider)
|
|
|
|
// TODO: return multiple errors
|
|
|
|
if err != nil {
|
2017-06-13 03:22:47 +02:00
|
|
|
return PluginMeta{}, err
|
2017-05-03 17:02:47 +02:00
|
|
|
}
|
|
|
|
|
2017-05-31 23:38:55 +02:00
|
|
|
if len(versions) == 0 {
|
2017-06-20 03:48:42 +02:00
|
|
|
return PluginMeta{}, ErrorNoSuitableVersion
|
2017-05-31 23:38:55 +02:00
|
|
|
}
|
|
|
|
|
2017-06-01 23:17:14 +02:00
|
|
|
versions = allowedVersions(versions, req)
|
2017-05-31 23:38:55 +02:00
|
|
|
if len(versions) == 0 {
|
2017-06-20 03:48:42 +02:00
|
|
|
return PluginMeta{}, ErrorNoSuitableVersion
|
2017-05-03 17:02:47 +02:00
|
|
|
}
|
|
|
|
|
2017-06-01 23:17:14 +02:00
|
|
|
// sort them newest to oldest
|
|
|
|
Versions(versions).Sort()
|
2017-05-03 17:02:47 +02:00
|
|
|
|
2017-06-01 23:17:14 +02:00
|
|
|
// take the first matching plugin we find
|
2017-05-31 23:38:55 +02:00
|
|
|
for _, v := range versions {
|
2017-06-01 20:32:33 +02:00
|
|
|
url := providerURL(provider, v.String())
|
2017-06-17 16:52:30 +02:00
|
|
|
|
|
|
|
if !i.SkipVerify {
|
|
|
|
sha256, err := getProviderChecksum(provider, v.String())
|
|
|
|
if err != nil {
|
2017-06-21 18:57:51 +02:00
|
|
|
return PluginMeta{}, err
|
2017-06-17 16:52:30 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
// add the checksum parameter for go-getter to verify the download for us.
|
|
|
|
if sha256 != "" {
|
|
|
|
url = url + "?checksum=sha256:" + sha256
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-06-01 23:17:14 +02:00
|
|
|
log.Printf("[DEBUG] fetching provider info for %s version %s", provider, v)
|
2017-06-13 03:22:47 +02:00
|
|
|
if checkPlugin(url, i.PluginProtocolVersion) {
|
2017-06-01 23:17:14 +02:00
|
|
|
log.Printf("[DEBUG] getting provider %q version %q at %s", provider, v, url)
|
2017-06-13 03:22:47 +02:00
|
|
|
err := getter.Get(i.Dir, url)
|
|
|
|
if err != nil {
|
|
|
|
return PluginMeta{}, err
|
|
|
|
}
|
|
|
|
|
|
|
|
// Find what we just installed
|
|
|
|
// (This is weird, because go-getter doesn't directly return
|
|
|
|
// information about what was extracted, and we just extracted
|
|
|
|
// the archive directly into a shared dir here.)
|
|
|
|
log.Printf("[DEBUG] looking for the %s %s plugin we just installed", provider, v)
|
|
|
|
metas := FindPlugins("provider", []string{i.Dir})
|
2017-06-17 16:52:30 +02:00
|
|
|
log.Printf("[DEBUG] all plugins found %#v", metas)
|
2017-06-13 03:22:47 +02:00
|
|
|
metas, _ = metas.ValidateVersions()
|
|
|
|
metas = metas.WithName(provider).WithVersion(v)
|
2017-06-17 16:52:30 +02:00
|
|
|
log.Printf("[DEBUG] filtered plugins %#v", metas)
|
2017-06-13 03:22:47 +02:00
|
|
|
if metas.Count() == 0 {
|
|
|
|
// This should never happen. Suggests that the release archive
|
|
|
|
// contains an executable file whose name doesn't match the
|
|
|
|
// expected convention.
|
|
|
|
return PluginMeta{}, fmt.Errorf(
|
2017-06-20 03:48:42 +02:00
|
|
|
"failed to find installed plugin version %s; this is a bug in Terraform and should be reported",
|
|
|
|
v,
|
2017-06-13 03:22:47 +02:00
|
|
|
)
|
|
|
|
}
|
|
|
|
|
|
|
|
if metas.Count() > 1 {
|
|
|
|
// This should also never happen, and suggests that a
|
|
|
|
// particular version was re-released with a different
|
|
|
|
// executable filename. We consider releases as immutable, so
|
|
|
|
// this is an error.
|
|
|
|
return PluginMeta{}, fmt.Errorf(
|
2017-06-20 03:48:42 +02:00
|
|
|
"multiple plugins installed for version %s; this is a bug in Terraform and should be reported",
|
|
|
|
v,
|
2017-06-13 03:22:47 +02:00
|
|
|
)
|
|
|
|
}
|
|
|
|
|
|
|
|
// By now we know we have exactly one meta, and so "Newest" will
|
|
|
|
// return that one.
|
|
|
|
return metas.Newest(), nil
|
2017-05-31 23:38:55 +02:00
|
|
|
}
|
|
|
|
|
2017-06-01 23:17:14 +02:00
|
|
|
log.Printf("[INFO] incompatible ProtocolVersion for %s version %s", provider, v)
|
|
|
|
}
|
2017-05-31 23:38:55 +02:00
|
|
|
|
2017-06-20 03:48:42 +02:00
|
|
|
return PluginMeta{}, ErrorNoVersionCompatible
|
2017-06-01 23:17:14 +02:00
|
|
|
}
|
2017-05-31 23:38:55 +02:00
|
|
|
|
2017-06-13 03:27:13 +02:00
|
|
|
func (i *ProviderInstaller) PurgeUnused(used map[string]PluginMeta) (PluginMetaSet, error) {
|
|
|
|
purge := make(PluginMetaSet)
|
|
|
|
|
|
|
|
present := FindPlugins("provider", []string{i.Dir})
|
|
|
|
for meta := range present {
|
|
|
|
chosen, ok := used[meta.Name]
|
|
|
|
if !ok {
|
|
|
|
purge.Add(meta)
|
|
|
|
}
|
|
|
|
if chosen.Path != meta.Path {
|
|
|
|
purge.Add(meta)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
removed := make(PluginMetaSet)
|
|
|
|
var errs error
|
|
|
|
for meta := range purge {
|
|
|
|
path := meta.Path
|
|
|
|
err := os.Remove(path)
|
|
|
|
if err != nil {
|
|
|
|
errs = multierror.Append(errs, fmt.Errorf(
|
|
|
|
"failed to remove unused provider plugin %s: %s",
|
|
|
|
path, err,
|
|
|
|
))
|
|
|
|
} else {
|
|
|
|
removed.Add(meta)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return removed, errs
|
|
|
|
}
|
|
|
|
|
2017-06-01 23:17:14 +02:00
|
|
|
// Return the plugin version by making a HEAD request to the provided url
|
|
|
|
func checkPlugin(url string, pluginProtocolVersion uint) bool {
|
|
|
|
resp, err := httpClient.Head(url)
|
|
|
|
if err != nil {
|
|
|
|
log.Printf("[ERROR] error fetching plugin headers: %s", err)
|
|
|
|
return false
|
|
|
|
}
|
2017-05-31 23:38:55 +02:00
|
|
|
|
2017-06-01 23:17:14 +02:00
|
|
|
if resp.StatusCode != http.StatusOK {
|
|
|
|
log.Println("[ERROR] non-200 status fetching plugin headers:", resp.Status)
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
proto := resp.Header.Get(protocolVersionHeader)
|
|
|
|
if proto == "" {
|
|
|
|
log.Printf("[WARNING] missing %s from: %s", protocolVersionHeader, url)
|
|
|
|
return false
|
|
|
|
}
|
2017-05-31 23:38:55 +02:00
|
|
|
|
2017-06-01 23:17:14 +02:00
|
|
|
protoVersion, err := strconv.Atoi(proto)
|
|
|
|
if err != nil {
|
|
|
|
log.Printf("[ERROR] invalid ProtocolVersion: %s", proto)
|
|
|
|
return false
|
2017-05-31 23:38:55 +02:00
|
|
|
}
|
|
|
|
|
2017-06-01 23:17:14 +02:00
|
|
|
return protoVersion == int(pluginProtocolVersion)
|
2017-05-31 23:38:55 +02:00
|
|
|
}
|
|
|
|
|
2017-05-04 20:37:16 +02:00
|
|
|
var errVersionNotFound = errors.New("version not found")
|
|
|
|
|
2017-06-01 23:17:14 +02:00
|
|
|
// take the list of available versions for a plugin, and filter out those that
|
|
|
|
// don't fit the constraints.
|
|
|
|
func allowedVersions(available []Version, required Constraints) []Version {
|
|
|
|
var allowed []Version
|
2017-05-04 20:37:16 +02:00
|
|
|
|
2017-05-03 17:02:47 +02:00
|
|
|
for _, v := range available {
|
2017-05-05 00:53:02 +02:00
|
|
|
if required.Allows(v) {
|
2017-06-01 23:17:14 +02:00
|
|
|
allowed = append(allowed, v)
|
2017-05-03 17:02:47 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-06-01 23:17:14 +02:00
|
|
|
return allowed
|
2017-05-03 17:02:47 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
// list the version available for the named plugin
|
2017-05-04 20:37:16 +02:00
|
|
|
func listProviderVersions(name string) ([]Version, error) {
|
2017-06-01 20:32:33 +02:00
|
|
|
versions, err := listPluginVersions(providerVersionsURL(name))
|
2017-05-03 17:02:47 +02:00
|
|
|
if err != nil {
|
2017-06-20 03:48:42 +02:00
|
|
|
// listPluginVersions returns a verbose error message indicating
|
|
|
|
// what was being accessed and what failed
|
|
|
|
return nil, err
|
2017-05-03 17:02:47 +02:00
|
|
|
}
|
|
|
|
return versions, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// return a list of the plugin versions at the given URL
|
2017-05-04 20:37:16 +02:00
|
|
|
func listPluginVersions(url string) ([]Version, error) {
|
2017-05-31 23:38:55 +02:00
|
|
|
resp, err := httpClient.Get(url)
|
2017-05-03 17:02:47 +02:00
|
|
|
if err != nil {
|
2017-06-20 03:48:42 +02:00
|
|
|
// http library produces a verbose error message that includes the
|
|
|
|
// URL being accessed, etc.
|
2017-05-03 17:02:47 +02:00
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
defer resp.Body.Close()
|
|
|
|
|
|
|
|
if resp.StatusCode != http.StatusOK {
|
|
|
|
body, _ := ioutil.ReadAll(resp.Body)
|
|
|
|
log.Printf("[ERROR] failed to fetch plugin versions from %s\n%s\n%s", url, resp.Status, body)
|
2017-06-20 03:48:42 +02:00
|
|
|
|
|
|
|
switch resp.StatusCode {
|
|
|
|
case http.StatusNotFound, http.StatusForbidden:
|
|
|
|
// These are treated as indicative of the given name not being
|
|
|
|
// a valid provider name at all.
|
|
|
|
return nil, ErrorNoSuchProvider
|
|
|
|
|
|
|
|
default:
|
|
|
|
// All other errors are assumed to be operational problems.
|
|
|
|
return nil, fmt.Errorf("error accessing %s: %s", url, resp.Status)
|
|
|
|
}
|
|
|
|
|
2017-05-03 17:02:47 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
body, err := html.Parse(resp.Body)
|
|
|
|
if err != nil {
|
|
|
|
log.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
names := []string{}
|
|
|
|
|
|
|
|
// all we need to do is list links on the directory listing page that look like plugins
|
|
|
|
var f func(*html.Node)
|
|
|
|
f = func(n *html.Node) {
|
|
|
|
if n.Type == html.ElementNode && n.Data == "a" {
|
|
|
|
c := n.FirstChild
|
|
|
|
if c != nil && c.Type == html.TextNode && strings.HasPrefix(c.Data, "terraform-") {
|
|
|
|
names = append(names, c.Data)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
for c := n.FirstChild; c != nil; c = c.NextSibling {
|
|
|
|
f(c)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
f(body)
|
|
|
|
|
2017-05-31 23:38:55 +02:00
|
|
|
return versionsFromNames(names), nil
|
|
|
|
}
|
2017-05-03 17:02:47 +02:00
|
|
|
|
2017-05-31 23:38:55 +02:00
|
|
|
// parse the list of directory names into a sorted list of available versions
|
|
|
|
func versionsFromNames(names []string) []Version {
|
|
|
|
var versions []Version
|
2017-05-03 17:02:47 +02:00
|
|
|
for _, name := range names {
|
|
|
|
parts := strings.SplitN(name, "_", 2)
|
|
|
|
if len(parts) == 2 && parts[1] != "" {
|
|
|
|
v, err := VersionStr(parts[1]).Parse()
|
|
|
|
if err != nil {
|
|
|
|
// filter invalid versions scraped from the page
|
|
|
|
log.Printf("[WARN] invalid version found for %q: %s", name, err)
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
2017-05-04 20:37:16 +02:00
|
|
|
versions = append(versions, v)
|
2017-05-03 17:02:47 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-05-31 23:38:55 +02:00
|
|
|
return versions
|
2017-05-03 17:02:47 +02:00
|
|
|
}
|
2017-06-17 16:52:30 +02:00
|
|
|
|
|
|
|
func getProviderChecksum(name, version string) (string, error) {
|
|
|
|
checksums, err := getPluginSHA256SUMs(providerChecksumURL(name, version))
|
|
|
|
if err != nil {
|
|
|
|
return "", err
|
|
|
|
}
|
|
|
|
|
|
|
|
return checksumForFile(checksums, providerFileName(name, version)), nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func checksumForFile(sums []byte, name string) string {
|
|
|
|
for _, line := range strings.Split(string(sums), "\n") {
|
|
|
|
parts := strings.Fields(line)
|
|
|
|
if len(parts) > 1 && parts[1] == name {
|
|
|
|
return parts[0]
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return ""
|
|
|
|
}
|
|
|
|
|
|
|
|
// fetch the SHA256SUMS file provided, and verify its signature.
|
|
|
|
func getPluginSHA256SUMs(sumsURL string) ([]byte, error) {
|
|
|
|
sigURL := sumsURL + ".sig"
|
|
|
|
|
|
|
|
sums, err := getFile(sumsURL)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("error fetching checksums: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
sig, err := getFile(sigURL)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("error fetching checksums signature: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if err := verifySig(sums, sig); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
return sums, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func getFile(url string) ([]byte, error) {
|
|
|
|
resp, err := httpClient.Get(url)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
defer resp.Body.Close()
|
|
|
|
|
|
|
|
if resp.StatusCode != http.StatusOK {
|
|
|
|
return nil, fmt.Errorf("%s", resp.Status)
|
|
|
|
}
|
|
|
|
|
|
|
|
data, err := ioutil.ReadAll(resp.Body)
|
|
|
|
if err != nil {
|
|
|
|
return data, err
|
|
|
|
}
|
|
|
|
return data, nil
|
|
|
|
}
|