2017-01-19 05:47:56 +01:00
|
|
|
package local
|
|
|
|
|
|
|
|
import (
|
2017-09-01 04:19:06 +02:00
|
|
|
"bytes"
|
2017-01-19 05:47:56 +01:00
|
|
|
"context"
|
|
|
|
"fmt"
|
|
|
|
"log"
|
|
|
|
"os"
|
|
|
|
"strings"
|
|
|
|
|
|
|
|
"github.com/hashicorp/errwrap"
|
2017-02-14 20:17:28 +01:00
|
|
|
"github.com/hashicorp/go-multierror"
|
2017-01-19 05:47:56 +01:00
|
|
|
"github.com/hashicorp/terraform/backend"
|
2017-04-01 20:58:19 +02:00
|
|
|
"github.com/hashicorp/terraform/command/clistate"
|
2017-01-19 05:47:56 +01:00
|
|
|
"github.com/hashicorp/terraform/command/format"
|
2017-01-30 04:51:54 +01:00
|
|
|
"github.com/hashicorp/terraform/config/module"
|
2017-02-15 17:53:19 +01:00
|
|
|
"github.com/hashicorp/terraform/state"
|
2017-01-19 05:47:56 +01:00
|
|
|
"github.com/hashicorp/terraform/terraform"
|
|
|
|
)
|
|
|
|
|
|
|
|
func (b *Local) opPlan(
|
2018-02-10 00:10:52 +01:00
|
|
|
stopCtx context.Context,
|
|
|
|
cancelCtx context.Context,
|
2017-01-19 05:47:56 +01:00
|
|
|
op *backend.Operation,
|
|
|
|
runningOp *backend.RunningOperation) {
|
|
|
|
log.Printf("[INFO] backend/local: starting Plan operation")
|
|
|
|
|
|
|
|
if b.CLI != nil && op.Plan != nil {
|
|
|
|
b.CLI.Output(b.Colorize().Color(
|
|
|
|
"[reset][bold][yellow]" +
|
|
|
|
"The plan command received a saved plan file as input. This command\n" +
|
|
|
|
"will output the saved plan. This will not modify the already-existing\n" +
|
|
|
|
"plan. If you wish to generate a new plan, please pass in a configuration\n" +
|
|
|
|
"directory as an argument.\n\n"))
|
|
|
|
}
|
|
|
|
|
2017-01-30 04:51:54 +01:00
|
|
|
// A local plan requires either a plan or a module
|
|
|
|
if op.Plan == nil && op.Module == nil && !op.Destroy {
|
|
|
|
runningOp.Err = fmt.Errorf(strings.TrimSpace(planErrNoConfig))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// If we have a nil module at this point, then set it to an empty tree
|
|
|
|
// to avoid any potential crashes.
|
|
|
|
if op.Module == nil {
|
|
|
|
op.Module = module.NewEmptyTree()
|
|
|
|
}
|
|
|
|
|
2017-01-19 05:47:56 +01:00
|
|
|
// Setup our count hook that keeps track of resource changes
|
|
|
|
countHook := new(CountHook)
|
|
|
|
if b.ContextOpts == nil {
|
|
|
|
b.ContextOpts = new(terraform.ContextOpts)
|
|
|
|
}
|
|
|
|
old := b.ContextOpts.Hooks
|
|
|
|
defer func() { b.ContextOpts.Hooks = old }()
|
|
|
|
b.ContextOpts.Hooks = append(b.ContextOpts.Hooks, countHook)
|
|
|
|
|
|
|
|
// Get our context
|
2017-02-02 00:16:16 +01:00
|
|
|
tfCtx, opState, err := b.context(op)
|
2017-01-19 05:47:56 +01:00
|
|
|
if err != nil {
|
|
|
|
runningOp.Err = err
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2017-02-14 20:17:28 +01:00
|
|
|
if op.LockState {
|
2018-02-10 00:10:52 +01:00
|
|
|
lockCtx, cancel := context.WithTimeout(stopCtx, op.StateLockTimeout)
|
2017-04-01 21:42:13 +02:00
|
|
|
defer cancel()
|
|
|
|
|
2017-02-15 17:53:19 +01:00
|
|
|
lockInfo := state.NewLockInfo()
|
|
|
|
lockInfo.Operation = op.Type.String()
|
2017-04-01 21:42:13 +02:00
|
|
|
lockID, err := clistate.Lock(lockCtx, opState, lockInfo, b.CLI, b.Colorize())
|
2017-02-15 17:53:19 +01:00
|
|
|
if err != nil {
|
|
|
|
runningOp.Err = errwrap.Wrapf("Error locking state: {{err}}", err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2017-02-14 20:17:28 +01:00
|
|
|
defer func() {
|
2017-02-15 17:53:19 +01:00
|
|
|
if err := clistate.Unlock(opState, lockID, b.CLI, b.Colorize()); err != nil {
|
2017-02-14 20:17:28 +01:00
|
|
|
runningOp.Err = multierror.Append(runningOp.Err, err)
|
2017-02-02 00:16:16 +01:00
|
|
|
}
|
2017-02-14 20:17:28 +01:00
|
|
|
}()
|
|
|
|
}
|
2017-02-02 00:16:16 +01:00
|
|
|
|
2017-01-19 05:47:56 +01:00
|
|
|
// Setup the state
|
|
|
|
runningOp.State = tfCtx.State()
|
|
|
|
|
|
|
|
// If we're refreshing before plan, perform that
|
|
|
|
if op.PlanRefresh {
|
|
|
|
log.Printf("[INFO] backend/local: plan calling Refresh")
|
|
|
|
|
2017-01-19 06:41:59 +01:00
|
|
|
if b.CLI != nil {
|
|
|
|
b.CLI.Output(b.Colorize().Color(strings.TrimSpace(planRefreshing) + "\n"))
|
|
|
|
}
|
|
|
|
|
2017-01-19 05:47:56 +01:00
|
|
|
_, err := tfCtx.Refresh()
|
|
|
|
if err != nil {
|
|
|
|
runningOp.Err = errwrap.Wrapf("Error refreshing state: {{err}}", err)
|
|
|
|
return
|
|
|
|
}
|
2017-09-01 04:19:06 +02:00
|
|
|
if b.CLI != nil {
|
|
|
|
b.CLI.Output("\n------------------------------------------------------------------------")
|
|
|
|
}
|
2017-01-19 05:47:56 +01:00
|
|
|
}
|
|
|
|
|
2017-12-02 23:31:28 +01:00
|
|
|
// Perform the plan in a goroutine so we can be interrupted
|
|
|
|
var plan *terraform.Plan
|
|
|
|
var planErr error
|
|
|
|
doneCh := make(chan struct{})
|
|
|
|
go func() {
|
|
|
|
defer close(doneCh)
|
|
|
|
log.Printf("[INFO] backend/local: plan calling Plan")
|
|
|
|
plan, planErr = tfCtx.Plan()
|
|
|
|
}()
|
|
|
|
|
|
|
|
select {
|
2018-02-10 00:10:52 +01:00
|
|
|
case <-stopCtx.Done():
|
2017-12-02 23:31:28 +01:00
|
|
|
if b.CLI != nil {
|
|
|
|
b.CLI.Output("stopping plan operation...")
|
|
|
|
}
|
|
|
|
|
|
|
|
// Stop execution
|
|
|
|
go tfCtx.Stop()
|
|
|
|
|
2018-02-10 00:10:52 +01:00
|
|
|
select {
|
|
|
|
case <-cancelCtx.Done():
|
|
|
|
log.Println("[WARN] running operation canceled")
|
|
|
|
// if the operation was canceled, we need to return immediately
|
|
|
|
return
|
|
|
|
case <-doneCh:
|
|
|
|
}
|
|
|
|
case <-cancelCtx.Done():
|
|
|
|
// this should not be called without first attempting to stop the
|
|
|
|
// operation
|
|
|
|
log.Println("[ERROR] running operation canceled without Stop")
|
|
|
|
return
|
2017-12-02 23:31:28 +01:00
|
|
|
case <-doneCh:
|
2017-01-19 05:47:56 +01:00
|
|
|
}
|
|
|
|
|
2017-12-02 23:31:28 +01:00
|
|
|
if planErr != nil {
|
|
|
|
runningOp.Err = errwrap.Wrapf("Error running plan: {{err}}", planErr)
|
|
|
|
return
|
|
|
|
}
|
2017-01-19 05:47:56 +01:00
|
|
|
// Record state
|
|
|
|
runningOp.PlanEmpty = plan.Diff.Empty()
|
|
|
|
|
|
|
|
// Save the plan to disk
|
|
|
|
if path := op.PlanOutPath; path != "" {
|
|
|
|
// Write the backend if we have one
|
|
|
|
plan.Backend = op.PlanOutBackend
|
|
|
|
|
2017-03-20 18:05:24 +01:00
|
|
|
// This works around a bug (#12871) which is no longer possible to
|
|
|
|
// trigger but will exist for already corrupted upgrades.
|
|
|
|
if plan.Backend != nil && plan.State != nil {
|
|
|
|
plan.State.Remote = nil
|
|
|
|
}
|
|
|
|
|
2017-01-19 05:47:56 +01:00
|
|
|
log.Printf("[INFO] backend/local: writing plan output to: %s", path)
|
|
|
|
f, err := os.Create(path)
|
|
|
|
if err == nil {
|
|
|
|
err = terraform.WritePlan(plan, f)
|
|
|
|
}
|
|
|
|
f.Close()
|
|
|
|
if err != nil {
|
|
|
|
runningOp.Err = fmt.Errorf("Error writing plan file: %s", err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Perform some output tasks if we have a CLI to output to.
|
|
|
|
if b.CLI != nil {
|
command/format: improve consistency of plan results
Previously the rendered plan output was constructed directly from the
core plan and then annotated with counts derived from the count hook.
At various places we applied little adjustments to deal with the fact that
the user-facing diff model is not identical to the internal diff model,
including the special handling of data source reads and destroys. Since
this logic was just muddled into the rendering code, it behaved
inconsistently with the tally of adds, updates and deletes.
This change reworks the plan formatter so that it happens in two stages:
- First, we produce a specialized Plan object that is tailored for use
in the UI. This applies all the relevant logic to transform the
physical model into the user model.
- Second, we do a straightforward visual rendering of the display-oriented
plan object.
For the moment this is slightly overkill since there's only one rendering
path, but it does give us the benefit of letting the counts be derived
from the same data as the full detailed diff, ensuring that they'll stay
consistent.
Later we may choose to have other UIs for plans, such as a
machine-readable output intended to drive a web UI. In that case, we'd
want the web UI to consume a serialization of the _display-oriented_ plan
so that it doesn't need to re-implement all of these UI special cases.
This introduces to core a new diff action type for "refresh". Currently
this is used _only_ in the UI layer, to represent data source reads.
Later it would be good to use this type for the core diff as well, to
improve consistency, but that is left for another day to keep this change
focused on the UI.
2017-08-24 01:23:02 +02:00
|
|
|
dispPlan := format.NewPlan(plan)
|
|
|
|
if dispPlan.Empty() {
|
2017-09-01 04:19:06 +02:00
|
|
|
b.CLI.Output("\n" + b.Colorize().Color(strings.TrimSpace(planNoChanges)))
|
2017-01-19 05:47:56 +01:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2017-09-01 04:19:06 +02:00
|
|
|
b.renderPlan(dispPlan)
|
|
|
|
|
2017-09-09 02:14:37 +02:00
|
|
|
// Give the user some next-steps, unless we're running in an automation
|
|
|
|
// tool which is presumed to provide its own UI for further actions.
|
|
|
|
if !b.RunningInAutomation {
|
|
|
|
|
|
|
|
b.CLI.Output("\n------------------------------------------------------------------------")
|
|
|
|
|
|
|
|
if path := op.PlanOutPath; path == "" {
|
|
|
|
b.CLI.Output(fmt.Sprintf(
|
|
|
|
"\n" + strings.TrimSpace(planHeaderNoOutput) + "\n",
|
|
|
|
))
|
|
|
|
} else {
|
|
|
|
b.CLI.Output(fmt.Sprintf(
|
|
|
|
"\n"+strings.TrimSpace(planHeaderYesOutput)+"\n",
|
|
|
|
path, path,
|
|
|
|
))
|
|
|
|
}
|
|
|
|
|
2017-01-19 05:47:56 +01:00
|
|
|
}
|
2017-09-01 04:19:06 +02:00
|
|
|
}
|
|
|
|
}
|
2017-01-19 05:47:56 +01:00
|
|
|
|
2017-09-01 04:19:06 +02:00
|
|
|
func (b *Local) renderPlan(dispPlan *format.Plan) {
|
2017-01-19 05:47:56 +01:00
|
|
|
|
2017-09-01 04:19:06 +02:00
|
|
|
headerBuf := &bytes.Buffer{}
|
|
|
|
fmt.Fprintf(headerBuf, "\n%s\n", strings.TrimSpace(planHeaderIntro))
|
|
|
|
counts := dispPlan.ActionCounts()
|
|
|
|
if counts[terraform.DiffCreate] > 0 {
|
|
|
|
fmt.Fprintf(headerBuf, "%s create\n", format.DiffActionSymbol(terraform.DiffCreate))
|
|
|
|
}
|
|
|
|
if counts[terraform.DiffUpdate] > 0 {
|
|
|
|
fmt.Fprintf(headerBuf, "%s update in-place\n", format.DiffActionSymbol(terraform.DiffUpdate))
|
|
|
|
}
|
|
|
|
if counts[terraform.DiffDestroy] > 0 {
|
|
|
|
fmt.Fprintf(headerBuf, "%s destroy\n", format.DiffActionSymbol(terraform.DiffDestroy))
|
2017-01-19 05:47:56 +01:00
|
|
|
}
|
2017-09-01 04:19:06 +02:00
|
|
|
if counts[terraform.DiffDestroyCreate] > 0 {
|
|
|
|
fmt.Fprintf(headerBuf, "%s destroy and then create replacement\n", format.DiffActionSymbol(terraform.DiffDestroyCreate))
|
|
|
|
}
|
|
|
|
if counts[terraform.DiffRefresh] > 0 {
|
|
|
|
fmt.Fprintf(headerBuf, "%s read (data resources)\n", format.DiffActionSymbol(terraform.DiffRefresh))
|
|
|
|
}
|
|
|
|
|
|
|
|
b.CLI.Output(b.Colorize().Color(headerBuf.String()))
|
|
|
|
|
|
|
|
b.CLI.Output("Terraform will perform the following actions:\n")
|
|
|
|
|
|
|
|
b.CLI.Output(dispPlan.Format(b.Colorize()))
|
|
|
|
|
|
|
|
stats := dispPlan.Stats()
|
|
|
|
b.CLI.Output(b.Colorize().Color(fmt.Sprintf(
|
|
|
|
"[reset][bold]Plan:[reset] "+
|
|
|
|
"%d to add, %d to change, %d to destroy.",
|
|
|
|
stats.ToAdd, stats.ToChange, stats.ToDestroy,
|
|
|
|
)))
|
2017-01-19 05:47:56 +01:00
|
|
|
}
|
|
|
|
|
2017-01-30 04:51:54 +01:00
|
|
|
const planErrNoConfig = `
|
|
|
|
No configuration files found!
|
|
|
|
|
|
|
|
Plan requires configuration to be present. Planning without a configuration
|
|
|
|
would mark everything for destruction, which is normally not what is desired.
|
|
|
|
If you would like to destroy everything, please run plan with the "-destroy"
|
|
|
|
flag or create a single empty configuration file. Otherwise, please create
|
|
|
|
a Terraform configuration file in the path being executed and try again.
|
|
|
|
`
|
|
|
|
|
2017-09-01 04:19:06 +02:00
|
|
|
const planHeaderIntro = `
|
|
|
|
An execution plan has been generated and is shown below.
|
|
|
|
Resource actions are indicated with the following symbols:
|
|
|
|
`
|
|
|
|
|
2017-01-19 05:47:56 +01:00
|
|
|
const planHeaderNoOutput = `
|
2017-09-01 04:19:06 +02:00
|
|
|
Note: You didn't specify an "-out" parameter to save this plan, so Terraform
|
|
|
|
can't guarantee that exactly these actions will be performed if
|
|
|
|
"terraform apply" is subsequently run.
|
2017-01-19 05:47:56 +01:00
|
|
|
`
|
|
|
|
|
|
|
|
const planHeaderYesOutput = `
|
2017-09-01 04:19:06 +02:00
|
|
|
This plan was saved to: %s
|
2017-01-19 05:47:56 +01:00
|
|
|
|
2017-09-01 04:19:06 +02:00
|
|
|
To perform exactly these actions, run the following command to apply:
|
|
|
|
terraform apply %q
|
2017-01-19 05:47:56 +01:00
|
|
|
`
|
|
|
|
|
|
|
|
const planNoChanges = `
|
|
|
|
[reset][bold][green]No changes. Infrastructure is up-to-date.[reset][green]
|
|
|
|
|
2017-02-14 21:09:45 +01:00
|
|
|
This means that Terraform did not detect any differences between your
|
2017-09-01 04:19:06 +02:00
|
|
|
configuration and real physical resources that exist. As a result, no
|
|
|
|
actions need to be performed.
|
2017-01-19 05:47:56 +01:00
|
|
|
`
|
|
|
|
|
|
|
|
const planRefreshing = `
|
|
|
|
[reset][bold]Refreshing Terraform state in-memory prior to plan...[reset]
|
|
|
|
The refreshed state will be used to calculate this plan, but will not be
|
|
|
|
persisted to local or remote state storage.
|
|
|
|
`
|