2017-03-21 18:43:31 +01:00
|
|
|
package s3
|
|
|
|
|
|
|
|
import (
|
2017-04-12 19:30:49 +02:00
|
|
|
"errors"
|
2017-03-22 20:52:55 +01:00
|
|
|
"fmt"
|
2017-03-22 21:33:41 +01:00
|
|
|
"sort"
|
2017-03-22 20:52:55 +01:00
|
|
|
"strings"
|
|
|
|
|
2017-03-22 21:33:41 +01:00
|
|
|
"github.com/aws/aws-sdk-go/aws"
|
|
|
|
"github.com/aws/aws-sdk-go/service/s3"
|
2017-03-21 18:43:31 +01:00
|
|
|
"github.com/hashicorp/terraform/backend"
|
|
|
|
"github.com/hashicorp/terraform/state"
|
|
|
|
"github.com/hashicorp/terraform/state/remote"
|
2017-03-22 21:45:21 +01:00
|
|
|
"github.com/hashicorp/terraform/terraform"
|
2017-03-21 18:43:31 +01:00
|
|
|
)
|
|
|
|
|
|
|
|
func (b *Backend) States() ([]string, error) {
|
2017-12-19 19:14:31 +01:00
|
|
|
prefix := b.workspaceKeyPrefix + "/"
|
|
|
|
|
|
|
|
// List bucket root if there is no workspaceKeyPrefix
|
|
|
|
if b.workspaceKeyPrefix == "" {
|
|
|
|
prefix = ""
|
|
|
|
}
|
2017-03-22 21:33:41 +01:00
|
|
|
params := &s3.ListObjectsInput{
|
|
|
|
Bucket: &b.bucketName,
|
2017-12-19 19:14:31 +01:00
|
|
|
Prefix: aws.String(prefix),
|
2017-03-22 21:33:41 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
resp, err := b.s3Client.ListObjects(params)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2017-12-16 03:04:15 +01:00
|
|
|
wss := []string{backend.DefaultStateName}
|
2017-03-22 21:33:41 +01:00
|
|
|
for _, obj := range resp.Contents {
|
2017-12-19 19:14:31 +01:00
|
|
|
ws := b.keyEnv(*obj.Key)
|
2017-12-16 03:04:15 +01:00
|
|
|
if ws != "" {
|
|
|
|
wss = append(wss, ws)
|
2017-03-22 21:33:41 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-12-16 03:04:15 +01:00
|
|
|
sort.Strings(wss[1:])
|
|
|
|
return wss, nil
|
2017-03-22 21:33:41 +01:00
|
|
|
}
|
|
|
|
|
2017-12-19 19:14:31 +01:00
|
|
|
func (b *Backend) keyEnv(key string) string {
|
2017-12-15 23:50:36 +01:00
|
|
|
if b.workspaceKeyPrefix == "" {
|
2017-12-19 15:31:53 +01:00
|
|
|
parts := strings.SplitN(key, "/", 2)
|
|
|
|
if len(parts) > 1 && parts[1] == b.keyName {
|
2017-12-16 03:04:15 +01:00
|
|
|
return parts[0]
|
|
|
|
} else {
|
|
|
|
return ""
|
|
|
|
}
|
2017-12-15 23:50:36 +01:00
|
|
|
}
|
2017-12-16 03:04:15 +01:00
|
|
|
|
2018-01-11 15:33:20 +01:00
|
|
|
parts := strings.SplitAfterN(key, b.workspaceKeyPrefix, 2)
|
2017-12-15 23:50:36 +01:00
|
|
|
|
|
|
|
if len(parts) < 2 {
|
2017-03-22 21:33:41 +01:00
|
|
|
return ""
|
|
|
|
}
|
|
|
|
|
2017-04-12 19:30:49 +02:00
|
|
|
// shouldn't happen since we listed by prefix
|
2017-06-22 19:17:37 +02:00
|
|
|
if parts[0] != b.workspaceKeyPrefix {
|
2017-04-12 19:30:49 +02:00
|
|
|
return ""
|
|
|
|
}
|
|
|
|
|
2017-12-18 22:24:34 +01:00
|
|
|
parts = strings.SplitN(parts[1], "/", 3)
|
2017-12-15 23:50:36 +01:00
|
|
|
|
|
|
|
if len(parts) < 3 {
|
|
|
|
return ""
|
|
|
|
}
|
|
|
|
|
2017-04-12 19:30:49 +02:00
|
|
|
// not our key, so don't include it in our listing
|
|
|
|
if parts[2] != b.keyName {
|
2017-03-22 21:33:41 +01:00
|
|
|
return ""
|
|
|
|
}
|
|
|
|
|
|
|
|
return parts[1]
|
2017-03-21 18:43:31 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
func (b *Backend) DeleteState(name string) error {
|
2017-03-22 20:52:55 +01:00
|
|
|
if name == backend.DefaultStateName || name == "" {
|
|
|
|
return fmt.Errorf("can't delete default state")
|
|
|
|
}
|
|
|
|
|
2017-06-23 16:19:50 +02:00
|
|
|
client, err := b.remoteClient(name)
|
2017-03-22 21:33:41 +01:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2017-06-23 16:19:50 +02:00
|
|
|
return client.Delete()
|
2017-03-21 18:43:31 +01:00
|
|
|
}
|
|
|
|
|
2017-06-23 16:19:50 +02:00
|
|
|
// get a remote client configured for this state
|
|
|
|
func (b *Backend) remoteClient(name string) (*RemoteClient, error) {
|
2017-04-12 19:30:49 +02:00
|
|
|
if name == "" {
|
|
|
|
return nil, errors.New("missing state name")
|
|
|
|
}
|
|
|
|
|
2017-03-22 20:52:55 +01:00
|
|
|
client := &RemoteClient{
|
|
|
|
s3Client: b.s3Client,
|
|
|
|
dynClient: b.dynClient,
|
|
|
|
bucketName: b.bucketName,
|
|
|
|
path: b.path(name),
|
|
|
|
serverSideEncryption: b.serverSideEncryption,
|
|
|
|
acl: b.acl,
|
|
|
|
kmsKeyID: b.kmsKeyID,
|
2017-05-26 01:12:20 +02:00
|
|
|
ddbTable: b.ddbTable,
|
2017-03-22 20:52:55 +01:00
|
|
|
}
|
|
|
|
|
2017-06-23 16:19:50 +02:00
|
|
|
return client, nil
|
|
|
|
}
|
2017-03-22 21:45:21 +01:00
|
|
|
|
2017-06-23 16:19:50 +02:00
|
|
|
func (b *Backend) State(name string) (state.State, error) {
|
|
|
|
client, err := b.remoteClient(name)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
stateMgr := &remote.State{Client: client}
|
2017-05-19 20:40:59 +02:00
|
|
|
// Check to see if this state already exists.
|
|
|
|
// If we're trying to force-unlock a state, we can't take the lock before
|
|
|
|
// fetching the state. If the state doesn't exist, we have to assume this
|
|
|
|
// is a normal create operation, and take the lock at that point.
|
|
|
|
//
|
|
|
|
// If we need to force-unlock, but for some reason the state no longer
|
|
|
|
// exists, the user will have to use aws tools to manually fix the
|
|
|
|
// situation.
|
|
|
|
existing, err := b.States()
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
exists := false
|
|
|
|
for _, s := range existing {
|
|
|
|
if s == name {
|
|
|
|
exists = true
|
|
|
|
break
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// We need to create the object so it's listed by States.
|
|
|
|
if !exists {
|
2017-03-22 21:45:21 +01:00
|
|
|
// take a lock on this state while we write it
|
|
|
|
lockInfo := state.NewLockInfo()
|
|
|
|
lockInfo.Operation = "init"
|
|
|
|
lockId, err := client.Lock(lockInfo)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("failed to lock s3 state: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Local helper function so we can call it multiple places
|
|
|
|
lockUnlock := func(parent error) error {
|
|
|
|
if err := stateMgr.Unlock(lockId); err != nil {
|
|
|
|
return fmt.Errorf(strings.TrimSpace(errStateUnlock), lockId, err)
|
|
|
|
}
|
|
|
|
return parent
|
|
|
|
}
|
|
|
|
|
|
|
|
// Grab the value
|
2017-05-19 20:40:59 +02:00
|
|
|
// This is to ensure that no one beat us to writing a state between
|
|
|
|
// the `exists` check and taking the lock.
|
2017-03-22 21:45:21 +01:00
|
|
|
if err := stateMgr.RefreshState(); err != nil {
|
|
|
|
err = lockUnlock(err)
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
// If we have no state, we have to create an empty state
|
|
|
|
if v := stateMgr.State(); v == nil {
|
|
|
|
if err := stateMgr.WriteState(terraform.NewState()); err != nil {
|
|
|
|
err = lockUnlock(err)
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
if err := stateMgr.PersistState(); err != nil {
|
|
|
|
err = lockUnlock(err)
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Unlock, the state should now be initialized
|
|
|
|
if err := lockUnlock(nil); err != nil {
|
2017-03-22 21:33:41 +01:00
|
|
|
return nil, err
|
|
|
|
}
|
2017-03-22 21:45:21 +01:00
|
|
|
|
2017-03-22 21:33:41 +01:00
|
|
|
}
|
2017-03-22 20:52:55 +01:00
|
|
|
|
2017-03-22 21:45:21 +01:00
|
|
|
return stateMgr, nil
|
2017-03-22 20:52:55 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
func (b *Backend) client() *RemoteClient {
|
|
|
|
return &RemoteClient{}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (b *Backend) path(name string) string {
|
|
|
|
if name == backend.DefaultStateName {
|
|
|
|
return b.keyName
|
|
|
|
}
|
|
|
|
|
2017-12-19 19:14:31 +01:00
|
|
|
if b.workspaceKeyPrefix != "" {
|
|
|
|
return strings.Join([]string{b.workspaceKeyPrefix, name, b.keyName}, "/")
|
|
|
|
} else {
|
|
|
|
// Trim the leading / for no workspace prefix
|
|
|
|
return strings.Join([]string{b.workspaceKeyPrefix, name, b.keyName}, "/")[1:]
|
|
|
|
}
|
2017-03-21 18:43:31 +01:00
|
|
|
}
|
2017-03-22 21:45:21 +01:00
|
|
|
|
|
|
|
const errStateUnlock = `
|
|
|
|
Error unlocking S3 state. Lock ID: %s
|
|
|
|
|
|
|
|
Error: %s
|
|
|
|
|
|
|
|
You may have to force-unlock this state in order to use it again.
|
|
|
|
`
|