2016-05-04 19:06:16 +02:00
|
|
|
package command
|
|
|
|
|
|
|
|
import (
|
|
|
|
"fmt"
|
|
|
|
"log"
|
2016-11-02 18:30:28 +01:00
|
|
|
"os"
|
2016-05-04 19:06:16 +02:00
|
|
|
"strings"
|
2016-05-04 19:32:08 +02:00
|
|
|
|
2017-01-19 05:50:45 +01:00
|
|
|
"github.com/hashicorp/terraform/backend"
|
2017-05-01 23:47:53 +02:00
|
|
|
"github.com/hashicorp/terraform/config"
|
2017-01-19 05:50:45 +01:00
|
|
|
"github.com/hashicorp/terraform/config/module"
|
2016-05-04 19:32:08 +02:00
|
|
|
"github.com/hashicorp/terraform/terraform"
|
2016-05-04 19:06:16 +02:00
|
|
|
)
|
|
|
|
|
|
|
|
// ImportCommand is a cli.Command implementation that imports resources
|
|
|
|
// into the Terraform state.
|
|
|
|
type ImportCommand struct {
|
|
|
|
Meta
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *ImportCommand) Run(args []string) int {
|
2016-11-02 19:11:42 +01:00
|
|
|
// Get the pwd since its our default -config flag value
|
|
|
|
pwd, err := os.Getwd()
|
|
|
|
if err != nil {
|
|
|
|
c.Ui.Error(fmt.Sprintf("Error getting pwd: %s", err))
|
|
|
|
return 1
|
|
|
|
}
|
|
|
|
|
|
|
|
var configPath string
|
2017-03-08 05:09:48 +01:00
|
|
|
args, err = c.Meta.process(args, true)
|
|
|
|
if err != nil {
|
|
|
|
return 1
|
|
|
|
}
|
2016-05-04 19:06:16 +02:00
|
|
|
|
|
|
|
cmdFlags := c.Meta.flagSet("import")
|
|
|
|
cmdFlags.IntVar(&c.Meta.parallelism, "parallelism", 0, "parallelism")
|
2016-11-02 19:08:16 +01:00
|
|
|
cmdFlags.StringVar(&c.Meta.statePath, "state", DefaultStateFilename, "path")
|
2016-05-04 19:06:16 +02:00
|
|
|
cmdFlags.StringVar(&c.Meta.stateOutPath, "state-out", "", "path")
|
|
|
|
cmdFlags.StringVar(&c.Meta.backupPath, "backup", "", "path")
|
2016-11-02 19:11:42 +01:00
|
|
|
cmdFlags.StringVar(&configPath, "config", pwd, "path")
|
2016-11-23 10:44:52 +01:00
|
|
|
cmdFlags.StringVar(&c.Meta.provider, "provider", "", "provider")
|
2017-04-01 22:19:59 +02:00
|
|
|
cmdFlags.BoolVar(&c.Meta.stateLock, "lock", true, "lock state")
|
|
|
|
cmdFlags.DurationVar(&c.Meta.stateLockTimeout, "lock-timeout", 0, "lock timeout")
|
2017-09-18 20:41:30 +02:00
|
|
|
cmdFlags.BoolVar(&c.Meta.allowMissingConfig, "allow-missing-config", false, "allow missing config")
|
2016-05-04 19:06:16 +02:00
|
|
|
cmdFlags.Usage = func() { c.Ui.Error(c.Help()) }
|
|
|
|
if err := cmdFlags.Parse(args); err != nil {
|
|
|
|
return 1
|
|
|
|
}
|
|
|
|
|
|
|
|
args = cmdFlags.Args()
|
|
|
|
if len(args) != 2 {
|
|
|
|
c.Ui.Error("The import command expects two arguments.")
|
|
|
|
cmdFlags.Usage()
|
|
|
|
return 1
|
|
|
|
}
|
|
|
|
|
2017-05-17 03:20:08 +02:00
|
|
|
// Validate the provided resource address for syntax
|
|
|
|
addr, err := terraform.ParseResourceAddress(args[0])
|
|
|
|
if err != nil {
|
|
|
|
c.Ui.Error(fmt.Sprintf(importCommandInvalidAddressFmt, err))
|
|
|
|
return 1
|
|
|
|
}
|
|
|
|
if !addr.HasResourceSpec() {
|
|
|
|
// module.foo target isn't allowed for import
|
|
|
|
c.Ui.Error(importCommandMissingResourceSpecMsg)
|
|
|
|
return 1
|
|
|
|
}
|
|
|
|
if addr.Mode != config.ManagedResourceMode {
|
|
|
|
// can't import to a data resource address
|
|
|
|
c.Ui.Error(importCommandResourceModeMsg)
|
|
|
|
return 1
|
|
|
|
}
|
|
|
|
|
2017-01-19 05:50:45 +01:00
|
|
|
// Load the module
|
|
|
|
var mod *module.Tree
|
|
|
|
if configPath != "" {
|
|
|
|
var err error
|
|
|
|
mod, err = c.Module(configPath)
|
|
|
|
if err != nil {
|
|
|
|
c.Ui.Error(fmt.Sprintf("Failed to load root config module: %s", err))
|
|
|
|
return 1
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-05-17 03:26:20 +02:00
|
|
|
// Verify that the given address points to something that exists in config.
|
|
|
|
// This is to reduce the risk that a typo in the resource address will
|
|
|
|
// import something that Terraform will want to immediately destroy on
|
|
|
|
// the next plan, and generally acts as a reassurance of user intent.
|
|
|
|
targetMod := mod.Child(addr.Path)
|
|
|
|
if targetMod == nil {
|
|
|
|
modulePath := addr.WholeModuleAddress().String()
|
|
|
|
if modulePath == "" {
|
|
|
|
c.Ui.Error(importCommandMissingConfigMsg)
|
|
|
|
} else {
|
|
|
|
c.Ui.Error(fmt.Sprintf(importCommandMissingModuleFmt, modulePath))
|
|
|
|
}
|
|
|
|
return 1
|
|
|
|
}
|
|
|
|
rcs := targetMod.Config().Resources
|
|
|
|
var rc *config.Resource
|
|
|
|
for _, thisRc := range rcs {
|
|
|
|
if addr.MatchesConfig(targetMod, thisRc) {
|
|
|
|
rc = thisRc
|
|
|
|
break
|
|
|
|
}
|
|
|
|
}
|
2017-09-18 20:41:30 +02:00
|
|
|
if !c.Meta.allowMissingConfig && rc == nil {
|
2017-05-17 03:26:20 +02:00
|
|
|
modulePath := addr.WholeModuleAddress().String()
|
|
|
|
if modulePath == "" {
|
|
|
|
modulePath = "the root module"
|
|
|
|
}
|
|
|
|
c.Ui.Error(fmt.Sprintf(
|
|
|
|
importCommandMissingResourceFmt,
|
|
|
|
addr, modulePath, addr.Type, addr.Name,
|
|
|
|
))
|
|
|
|
return 1
|
2017-05-01 23:47:53 +02:00
|
|
|
}
|
|
|
|
|
2017-06-27 00:28:45 +02:00
|
|
|
// Check for user-supplied plugin path
|
|
|
|
if c.pluginPath, err = c.loadPluginPath(); err != nil {
|
|
|
|
c.Ui.Error(fmt.Sprintf("Error loading plugin path: %s", err))
|
|
|
|
return 1
|
|
|
|
}
|
|
|
|
|
2017-01-19 05:50:45 +01:00
|
|
|
// Load the backend
|
2017-05-01 23:47:53 +02:00
|
|
|
b, err := c.Backend(&BackendOpts{
|
2017-08-09 00:41:00 +02:00
|
|
|
Config: mod.Config(),
|
2017-05-01 23:47:53 +02:00
|
|
|
})
|
2017-01-19 05:50:45 +01:00
|
|
|
if err != nil {
|
|
|
|
c.Ui.Error(fmt.Sprintf("Failed to load backend: %s", err))
|
|
|
|
return 1
|
|
|
|
}
|
|
|
|
|
2017-08-09 00:41:00 +02:00
|
|
|
// We require a backend.Local to build a context.
|
|
|
|
// This isn't necessarily a "local.Local" backend, which provides local
|
|
|
|
// operations, however that is the only current implementation. A
|
|
|
|
// "local.Local" backend also doesn't necessarily provide local state, as
|
|
|
|
// that may be delegated to a "remotestate.Backend".
|
2017-01-19 05:50:45 +01:00
|
|
|
local, ok := b.(backend.Local)
|
|
|
|
if !ok {
|
|
|
|
c.Ui.Error(ErrUnsupportedLocalOp)
|
|
|
|
return 1
|
|
|
|
}
|
|
|
|
|
|
|
|
// Build the operation
|
|
|
|
opReq := c.Operation()
|
|
|
|
opReq.Module = mod
|
|
|
|
|
|
|
|
// Get the context
|
|
|
|
ctx, state, err := local.Context(opReq)
|
2016-05-04 19:06:16 +02:00
|
|
|
if err != nil {
|
|
|
|
c.Ui.Error(err.Error())
|
|
|
|
return 1
|
|
|
|
}
|
|
|
|
|
2016-05-04 19:32:08 +02:00
|
|
|
// Perform the import. Note that as you can see it is possible for this
|
|
|
|
// API to import more than one resource at once. For now, we only allow
|
|
|
|
// one while we stabilize this feature.
|
|
|
|
newState, err := ctx.Import(&terraform.ImportOpts{
|
|
|
|
Targets: []*terraform.ImportTarget{
|
|
|
|
&terraform.ImportTarget{
|
2016-11-23 10:44:52 +01:00
|
|
|
Addr: args[0],
|
|
|
|
ID: args[1],
|
|
|
|
Provider: c.Meta.provider,
|
2016-05-04 19:32:08 +02:00
|
|
|
},
|
|
|
|
},
|
|
|
|
})
|
2016-05-04 19:06:16 +02:00
|
|
|
if err != nil {
|
2016-05-04 19:32:08 +02:00
|
|
|
c.Ui.Error(fmt.Sprintf("Error importing: %s", err))
|
2016-05-04 19:06:16 +02:00
|
|
|
return 1
|
|
|
|
}
|
|
|
|
|
2016-05-04 19:32:08 +02:00
|
|
|
// Persist the final state
|
2016-05-04 19:06:16 +02:00
|
|
|
log.Printf("[INFO] Writing state output to: %s", c.Meta.StateOutPath())
|
2017-01-19 05:50:45 +01:00
|
|
|
if err := state.WriteState(newState); err != nil {
|
|
|
|
c.Ui.Error(fmt.Sprintf("Error writing state file: %s", err))
|
|
|
|
return 1
|
|
|
|
}
|
|
|
|
if err := state.PersistState(); err != nil {
|
2016-05-04 19:06:16 +02:00
|
|
|
c.Ui.Error(fmt.Sprintf("Error writing state file: %s", err))
|
|
|
|
return 1
|
|
|
|
}
|
|
|
|
|
2017-05-17 03:26:20 +02:00
|
|
|
c.Ui.Output(c.Colorize().Color("[reset][green]\n" + importCommandSuccessMsg))
|
2016-05-04 21:05:42 +02:00
|
|
|
|
2017-09-18 20:41:30 +02:00
|
|
|
if c.Meta.allowMissingConfig && rc == nil {
|
|
|
|
c.Ui.Output(c.Colorize().Color("[reset][yellow]\n" + importCommandAllowMissingResourceMsg))
|
|
|
|
}
|
|
|
|
|
2016-05-04 19:06:16 +02:00
|
|
|
return 0
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *ImportCommand) Help() string {
|
|
|
|
helpText := `
|
|
|
|
Usage: terraform import [options] ADDR ID
|
|
|
|
|
|
|
|
Import existing infrastructure into your Terraform state.
|
|
|
|
|
|
|
|
This will find and import the specified resource into your Terraform
|
|
|
|
state, allowing existing infrastructure to come under Terraform
|
|
|
|
management without having to be initially created by Terraform.
|
|
|
|
|
|
|
|
The ADDR specified is the address to import the resource to. Please
|
|
|
|
see the documentation online for resource addresses. The ID is a
|
|
|
|
resource-specific ID to identify that resource being imported. Please
|
|
|
|
reference the documentation for the resource type you're importing to
|
|
|
|
determine the ID syntax to use. It typically matches directly to the ID
|
|
|
|
that the provider uses.
|
|
|
|
|
2017-09-18 20:41:30 +02:00
|
|
|
The current implementation of Terraform import can only import resources
|
|
|
|
into the state. It does not generate configuration. A future version of
|
|
|
|
Terraform will also generate configuration.
|
|
|
|
|
|
|
|
Because of this, prior to running terraform import it is necessary to write
|
|
|
|
a resource configuration block for the resource manually, to which the
|
|
|
|
imported object will be attached.
|
2016-05-04 19:06:16 +02:00
|
|
|
|
|
|
|
This command will not modify your infrastructure, but it will make
|
|
|
|
network requests to inspect parts of your infrastructure relevant to
|
|
|
|
the resource being imported.
|
|
|
|
|
|
|
|
Options:
|
|
|
|
|
2017-09-18 20:41:30 +02:00
|
|
|
-backup=path Path to backup the existing state file before
|
|
|
|
modifying. Defaults to the "-state-out" path with
|
|
|
|
".backup" extension. Set to "-" to disable backup.
|
2016-05-04 19:06:16 +02:00
|
|
|
|
2017-09-18 20:41:30 +02:00
|
|
|
-config=path Path to a directory of Terraform configuration files
|
|
|
|
to use to configure the provider. Defaults to pwd.
|
|
|
|
If no config files are present, they must be provided
|
|
|
|
via the input prompts or env vars.
|
2016-11-02 19:11:42 +01:00
|
|
|
|
2017-09-18 20:41:30 +02:00
|
|
|
-allow-missing-config Allow import when no resource configuration block exists.
|
2016-05-04 19:06:16 +02:00
|
|
|
|
2017-09-18 20:41:30 +02:00
|
|
|
-input=true Ask for input for variables if not directly set.
|
2017-04-01 22:19:59 +02:00
|
|
|
|
2017-09-18 20:41:30 +02:00
|
|
|
-lock=true Lock the state file when locking is supported.
|
2017-04-01 22:19:59 +02:00
|
|
|
|
2017-09-18 20:41:30 +02:00
|
|
|
-lock-timeout=0s Duration to retry a state lock.
|
2016-05-04 19:06:16 +02:00
|
|
|
|
2017-09-18 20:41:30 +02:00
|
|
|
-no-color If specified, output won't contain any color.
|
2016-11-23 18:40:11 +01:00
|
|
|
|
2017-09-18 20:41:30 +02:00
|
|
|
-provider=provider Specific provider to use for import. This is used for
|
|
|
|
specifying aliases, such as "aws.eu". Defaults to the
|
|
|
|
normal provider prefix of the resource being imported.
|
2016-05-04 19:06:16 +02:00
|
|
|
|
2017-09-18 20:41:30 +02:00
|
|
|
-state=PATH Path to the source state file. Defaults to the configured
|
|
|
|
backend, or "terraform.tfstate"
|
2016-05-04 19:06:16 +02:00
|
|
|
|
2017-09-18 20:41:30 +02:00
|
|
|
-state-out=PATH Path to the destination state file to write to. If this
|
|
|
|
isn't specified, the source state file will be used. This
|
|
|
|
can be a new or existing path.
|
2017-01-24 22:01:23 +01:00
|
|
|
|
2017-09-18 20:41:30 +02:00
|
|
|
-var 'foo=bar' Set a variable in the Terraform configuration. This
|
|
|
|
flag can be set multiple times. This is only useful
|
|
|
|
with the "-config" flag.
|
|
|
|
|
|
|
|
-var-file=foo Set variables in the Terraform configuration from
|
|
|
|
a file. If "terraform.tfvars" or any ".auto.tfvars"
|
|
|
|
files are present, they will be automatically loaded.
|
2017-01-24 22:01:23 +01:00
|
|
|
|
|
|
|
|
2016-05-04 19:06:16 +02:00
|
|
|
`
|
|
|
|
return strings.TrimSpace(helpText)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *ImportCommand) Synopsis() string {
|
|
|
|
return "Import existing infrastructure into Terraform"
|
|
|
|
}
|
2017-05-17 03:20:08 +02:00
|
|
|
|
|
|
|
const importCommandInvalidAddressFmt = `Error: %s
|
|
|
|
|
|
|
|
For information on valid syntax, see:
|
|
|
|
https://www.terraform.io/docs/internals/resource-addressing.html
|
|
|
|
`
|
|
|
|
|
|
|
|
const importCommandMissingResourceSpecMsg = `Error: resource address must include a full resource spec
|
|
|
|
|
|
|
|
For information on valid syntax, see:
|
|
|
|
https://www.terraform.io/docs/internals/resource-addressing.html
|
|
|
|
`
|
|
|
|
|
|
|
|
const importCommandResourceModeMsg = `Error: resource address must refer to a managed resource.
|
|
|
|
|
|
|
|
Data resources cannot be imported.
|
|
|
|
`
|
2017-05-17 03:26:20 +02:00
|
|
|
|
|
|
|
const importCommandMissingConfigMsg = `Error: no configuration files in this directory.
|
|
|
|
|
|
|
|
"terraform import" can only be run in a Terraform configuration directory.
|
|
|
|
Create one or more .tf files in this directory to import here.
|
|
|
|
`
|
|
|
|
|
|
|
|
const importCommandMissingModuleFmt = `Error: %s does not exist in the configuration.
|
|
|
|
|
|
|
|
Please add the configuration for the module before importing resources into it.
|
|
|
|
`
|
|
|
|
|
|
|
|
const importCommandMissingResourceFmt = `Error: resource address %q does not exist in the configuration.
|
|
|
|
|
|
|
|
Before importing this resource, please create its configuration in %s. For example:
|
|
|
|
|
|
|
|
resource %q %q {
|
|
|
|
# (resource arguments)
|
|
|
|
}
|
|
|
|
`
|
|
|
|
|
|
|
|
const importCommandSuccessMsg = `Import successful!
|
|
|
|
|
|
|
|
The resources that were imported are shown above. These resources are now in
|
|
|
|
your Terraform state and will henceforth be managed by Terraform.
|
2017-09-18 20:41:30 +02:00
|
|
|
`
|
|
|
|
|
|
|
|
const importCommandAllowMissingResourceMsg = `Import does not generate resource configuration, you must create a resource
|
|
|
|
configuration block that matches the current or desired state manually.
|
2017-05-17 03:26:20 +02:00
|
|
|
|
2017-09-18 20:41:30 +02:00
|
|
|
If there is no matching resource configuration block for the imported
|
|
|
|
resource, Terraform will delete the resource on the next "terraform apply".
|
|
|
|
It is recommended that you run "terraform plan" to verify that the
|
|
|
|
configuration is correct and complete.
|
2017-05-17 03:26:20 +02:00
|
|
|
`
|