2018-06-08 02:27:57 +02:00
|
|
|
package states
|
|
|
|
|
|
|
|
import (
|
2021-05-17 21:00:50 +02:00
|
|
|
"github.com/hashicorp/terraform/internal/addrs"
|
2018-06-08 02:27:57 +02:00
|
|
|
"github.com/zclconf/go-cty/cty"
|
|
|
|
)
|
|
|
|
|
|
|
|
// Taking deep copies of states is an important operation because state is
|
|
|
|
// otherwise a mutable data structure that is challenging to share across
|
|
|
|
// many separate callers. It is important that the DeepCopy implementations
|
|
|
|
// in this file comprehensively copy all parts of the state data structure
|
|
|
|
// that could be mutated via pointers.
|
|
|
|
|
|
|
|
// DeepCopy returns a new state that contains equivalent data to the reciever
|
|
|
|
// but shares no backing memory in common.
|
|
|
|
//
|
|
|
|
// As with all methods on State, this method is not safe to use concurrently
|
|
|
|
// with writing to any portion of the recieving data structure. It is the
|
|
|
|
// caller's responsibility to ensure mutual exclusion for the duration of the
|
|
|
|
// operation, but may then freely modify the receiver and the returned copy
|
|
|
|
// independently once this method returns.
|
|
|
|
func (s *State) DeepCopy() *State {
|
|
|
|
if s == nil {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
modules := make(map[string]*Module, len(s.Modules))
|
|
|
|
for k, m := range s.Modules {
|
|
|
|
modules[k] = m.DeepCopy()
|
|
|
|
}
|
|
|
|
return &State{
|
|
|
|
Modules: modules,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// DeepCopy returns a new module state that contains equivalent data to the
|
|
|
|
// receiver but shares no backing memory in common.
|
|
|
|
//
|
|
|
|
// As with all methods on Module, this method is not safe to use concurrently
|
|
|
|
// with writing to any portion of the recieving data structure. It is the
|
|
|
|
// caller's responsibility to ensure mutual exclusion for the duration of the
|
|
|
|
// operation, but may then freely modify the receiver and the returned copy
|
|
|
|
// independently once this method returns.
|
|
|
|
func (ms *Module) DeepCopy() *Module {
|
|
|
|
if ms == nil {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
resources := make(map[string]*Resource, len(ms.Resources))
|
|
|
|
for k, r := range ms.Resources {
|
|
|
|
resources[k] = r.DeepCopy()
|
|
|
|
}
|
|
|
|
outputValues := make(map[string]*OutputValue, len(ms.OutputValues))
|
|
|
|
for k, v := range ms.OutputValues {
|
|
|
|
outputValues[k] = v.DeepCopy()
|
|
|
|
}
|
|
|
|
localValues := make(map[string]cty.Value, len(ms.LocalValues))
|
|
|
|
for k, v := range ms.LocalValues {
|
|
|
|
// cty.Value is immutable, so we don't need to copy these.
|
|
|
|
localValues[k] = v
|
|
|
|
}
|
|
|
|
|
|
|
|
return &Module{
|
|
|
|
Addr: ms.Addr, // technically mutable, but immutable by convention
|
|
|
|
Resources: resources,
|
|
|
|
OutputValues: outputValues,
|
|
|
|
LocalValues: localValues,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// DeepCopy returns a new resource state that contains equivalent data to the
|
|
|
|
// receiver but shares no backing memory in common.
|
|
|
|
//
|
|
|
|
// As with all methods on Resource, this method is not safe to use concurrently
|
|
|
|
// with writing to any portion of the recieving data structure. It is the
|
|
|
|
// caller's responsibility to ensure mutual exclusion for the duration of the
|
|
|
|
// operation, but may then freely modify the receiver and the returned copy
|
|
|
|
// independently once this method returns.
|
|
|
|
func (rs *Resource) DeepCopy() *Resource {
|
|
|
|
if rs == nil {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
instances := make(map[addrs.InstanceKey]*ResourceInstance, len(rs.Instances))
|
|
|
|
for k, i := range rs.Instances {
|
|
|
|
instances[k] = i.DeepCopy()
|
|
|
|
}
|
|
|
|
|
|
|
|
return &Resource{
|
|
|
|
Addr: rs.Addr,
|
|
|
|
Instances: instances,
|
|
|
|
ProviderConfig: rs.ProviderConfig, // technically mutable, but immutable by convention
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// DeepCopy returns a new resource instance state that contains equivalent data
|
|
|
|
// to the receiver but shares no backing memory in common.
|
|
|
|
//
|
|
|
|
// As with all methods on ResourceInstance, this method is not safe to use
|
|
|
|
// concurrently with writing to any portion of the recieving data structure. It
|
|
|
|
// is the caller's responsibility to ensure mutual exclusion for the duration
|
|
|
|
// of the operation, but may then freely modify the receiver and the returned
|
|
|
|
// copy independently once this method returns.
|
2020-11-30 23:20:50 +01:00
|
|
|
func (i *ResourceInstance) DeepCopy() *ResourceInstance {
|
|
|
|
if i == nil {
|
2018-06-08 02:27:57 +02:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2020-11-30 23:20:50 +01:00
|
|
|
deposed := make(map[DeposedKey]*ResourceInstanceObjectSrc, len(i.Deposed))
|
|
|
|
for k, obj := range i.Deposed {
|
2018-06-08 02:27:57 +02:00
|
|
|
deposed[k] = obj.DeepCopy()
|
|
|
|
}
|
|
|
|
|
|
|
|
return &ResourceInstance{
|
2020-11-30 23:20:50 +01:00
|
|
|
Current: i.Current.DeepCopy(),
|
2018-06-08 02:27:57 +02:00
|
|
|
Deposed: deposed,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// DeepCopy returns a new resource instance object that contains equivalent data
|
|
|
|
// to the receiver but shares no backing memory in common.
|
|
|
|
//
|
2018-09-12 20:02:14 +02:00
|
|
|
// As with all methods on ResourceInstanceObjectSrc, this method is not safe to
|
|
|
|
// use concurrently with writing to any portion of the recieving data structure.
|
|
|
|
// It is the caller's responsibility to ensure mutual exclusion for the duration
|
2018-06-08 02:27:57 +02:00
|
|
|
// of the operation, but may then freely modify the receiver and the returned
|
|
|
|
// copy independently once this method returns.
|
2020-11-30 23:20:50 +01:00
|
|
|
func (os *ResourceInstanceObjectSrc) DeepCopy() *ResourceInstanceObjectSrc {
|
|
|
|
if os == nil {
|
2018-06-08 02:27:57 +02:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
var attrsFlat map[string]string
|
2020-11-30 23:20:50 +01:00
|
|
|
if os.AttrsFlat != nil {
|
|
|
|
attrsFlat = make(map[string]string, len(os.AttrsFlat))
|
|
|
|
for k, v := range os.AttrsFlat {
|
2018-06-08 02:27:57 +02:00
|
|
|
attrsFlat[k] = v
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
var attrsJSON []byte
|
2020-11-30 23:20:50 +01:00
|
|
|
if os.AttrsJSON != nil {
|
|
|
|
attrsJSON = make([]byte, len(os.AttrsJSON))
|
|
|
|
copy(attrsJSON, os.AttrsJSON)
|
2018-06-08 02:27:57 +02:00
|
|
|
}
|
|
|
|
|
Store sensitive attribute paths in state (#26338)
* Add creation test and simplify in-place test
* Add deletion test
* Start adding marking from state
Start storing paths that should be marked
when pulled out of state. Implements deep
copy for attr paths. This commit also includes some
comment noise from investigations, and fixing the diff test
* Fix apply stripping marks
* Expand diff tests
* Basic apply test
* Update comments on equality checks to clarify current understanding
* Add JSON serialization for sensitive paths
We need to serialize a slice of cty.Path values to be used to re-mark
the sensitive values of a resource instance when loading the state file.
Paths consist of a list of steps, each of which may be either getting an
attribute value by name, or indexing into a collection by string or
number.
To serialize these without building a complex parser for a compact
string form, we render a nested array of small objects, like so:
[
[
{ type: "get_attr", value: "foo" },
{ type: "index", value: { "type": "number", "value": 2 } }
]
]
The above example is equivalent to a path `foo[2]`.
* Format diffs with map types
Comparisons need unmarked values to operate on,
so create unmarked values for those operations. Additionally,
change diff to cover map types
* Remove debugging printing
* Fix bug with marking non-sensitive values
When pulling a sensitive value from state,
we were previously using those marks to remark
the planned new value, but that new value
might *not* be sensitive, so let's not do that
* Fix apply test
Apply was not passing the second state
through to the third pass at apply
* Consistency in checking for length of paths vs inspecting into value
* In apply, don't mark with before paths
* AttrPaths test coverage for DeepCopy
* Revert format changes
Reverts format changes in format/diff for this
branch so those changes can be discussed on a separate PR
* Refactor name of AttrPaths to AttrSensitivePaths
* Rename AttributePaths/attributePaths for naming consistency
Co-authored-by: Alisdair McDiarmid <alisdair@users.noreply.github.com>
2020-09-24 18:40:17 +02:00
|
|
|
var attrPaths []cty.PathValueMarks
|
2020-11-30 23:20:50 +01:00
|
|
|
if os.AttrSensitivePaths != nil {
|
|
|
|
attrPaths = make([]cty.PathValueMarks, len(os.AttrSensitivePaths))
|
|
|
|
copy(attrPaths, os.AttrSensitivePaths)
|
Store sensitive attribute paths in state (#26338)
* Add creation test and simplify in-place test
* Add deletion test
* Start adding marking from state
Start storing paths that should be marked
when pulled out of state. Implements deep
copy for attr paths. This commit also includes some
comment noise from investigations, and fixing the diff test
* Fix apply stripping marks
* Expand diff tests
* Basic apply test
* Update comments on equality checks to clarify current understanding
* Add JSON serialization for sensitive paths
We need to serialize a slice of cty.Path values to be used to re-mark
the sensitive values of a resource instance when loading the state file.
Paths consist of a list of steps, each of which may be either getting an
attribute value by name, or indexing into a collection by string or
number.
To serialize these without building a complex parser for a compact
string form, we render a nested array of small objects, like so:
[
[
{ type: "get_attr", value: "foo" },
{ type: "index", value: { "type": "number", "value": 2 } }
]
]
The above example is equivalent to a path `foo[2]`.
* Format diffs with map types
Comparisons need unmarked values to operate on,
so create unmarked values for those operations. Additionally,
change diff to cover map types
* Remove debugging printing
* Fix bug with marking non-sensitive values
When pulling a sensitive value from state,
we were previously using those marks to remark
the planned new value, but that new value
might *not* be sensitive, so let's not do that
* Fix apply test
Apply was not passing the second state
through to the third pass at apply
* Consistency in checking for length of paths vs inspecting into value
* In apply, don't mark with before paths
* AttrPaths test coverage for DeepCopy
* Revert format changes
Reverts format changes in format/diff for this
branch so those changes can be discussed on a separate PR
* Refactor name of AttrPaths to AttrSensitivePaths
* Rename AttributePaths/attributePaths for naming consistency
Co-authored-by: Alisdair McDiarmid <alisdair@users.noreply.github.com>
2020-09-24 18:40:17 +02:00
|
|
|
}
|
|
|
|
|
2018-09-12 20:02:14 +02:00
|
|
|
var private []byte
|
2020-11-30 23:20:50 +01:00
|
|
|
if os.Private != nil {
|
|
|
|
private = make([]byte, len(os.Private))
|
|
|
|
copy(private, os.Private)
|
2018-09-12 20:02:14 +02:00
|
|
|
}
|
|
|
|
|
2018-06-08 02:27:57 +02:00
|
|
|
// Some addrs.Referencable implementations are technically mutable, but
|
|
|
|
// we treat them as immutable by convention and so we don't deep-copy here.
|
2020-03-23 20:26:18 +01:00
|
|
|
var dependencies []addrs.ConfigResource
|
2020-11-30 23:20:50 +01:00
|
|
|
if os.Dependencies != nil {
|
|
|
|
dependencies = make([]addrs.ConfigResource, len(os.Dependencies))
|
|
|
|
copy(dependencies, os.Dependencies)
|
2019-10-08 20:11:02 +02:00
|
|
|
}
|
|
|
|
|
2018-07-21 02:15:29 +02:00
|
|
|
return &ResourceInstanceObjectSrc{
|
2020-11-30 23:20:50 +01:00
|
|
|
Status: os.Status,
|
|
|
|
SchemaVersion: os.SchemaVersion,
|
2019-12-12 20:59:18 +01:00
|
|
|
Private: private,
|
|
|
|
AttrsFlat: attrsFlat,
|
|
|
|
AttrsJSON: attrsJSON,
|
Store sensitive attribute paths in state (#26338)
* Add creation test and simplify in-place test
* Add deletion test
* Start adding marking from state
Start storing paths that should be marked
when pulled out of state. Implements deep
copy for attr paths. This commit also includes some
comment noise from investigations, and fixing the diff test
* Fix apply stripping marks
* Expand diff tests
* Basic apply test
* Update comments on equality checks to clarify current understanding
* Add JSON serialization for sensitive paths
We need to serialize a slice of cty.Path values to be used to re-mark
the sensitive values of a resource instance when loading the state file.
Paths consist of a list of steps, each of which may be either getting an
attribute value by name, or indexing into a collection by string or
number.
To serialize these without building a complex parser for a compact
string form, we render a nested array of small objects, like so:
[
[
{ type: "get_attr", value: "foo" },
{ type: "index", value: { "type": "number", "value": 2 } }
]
]
The above example is equivalent to a path `foo[2]`.
* Format diffs with map types
Comparisons need unmarked values to operate on,
so create unmarked values for those operations. Additionally,
change diff to cover map types
* Remove debugging printing
* Fix bug with marking non-sensitive values
When pulling a sensitive value from state,
we were previously using those marks to remark
the planned new value, but that new value
might *not* be sensitive, so let's not do that
* Fix apply test
Apply was not passing the second state
through to the third pass at apply
* Consistency in checking for length of paths vs inspecting into value
* In apply, don't mark with before paths
* AttrPaths test coverage for DeepCopy
* Revert format changes
Reverts format changes in format/diff for this
branch so those changes can be discussed on a separate PR
* Refactor name of AttrPaths to AttrSensitivePaths
* Rename AttributePaths/attributePaths for naming consistency
Co-authored-by: Alisdair McDiarmid <alisdair@users.noreply.github.com>
2020-09-24 18:40:17 +02:00
|
|
|
AttrSensitivePaths: attrPaths,
|
2019-12-12 20:59:18 +01:00
|
|
|
Dependencies: dependencies,
|
2020-11-30 23:20:50 +01:00
|
|
|
CreateBeforeDestroy: os.CreateBeforeDestroy,
|
2018-06-08 02:27:57 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-09-12 20:02:14 +02:00
|
|
|
// DeepCopy returns a new resource instance object that contains equivalent data
|
|
|
|
// to the receiver but shares no backing memory in common.
|
|
|
|
//
|
|
|
|
// As with all methods on ResourceInstanceObject, this method is not safe to use
|
|
|
|
// concurrently with writing to any portion of the recieving data structure. It
|
|
|
|
// is the caller's responsibility to ensure mutual exclusion for the duration
|
|
|
|
// of the operation, but may then freely modify the receiver and the returned
|
|
|
|
// copy independently once this method returns.
|
2020-11-30 23:20:50 +01:00
|
|
|
func (o *ResourceInstanceObject) DeepCopy() *ResourceInstanceObject {
|
|
|
|
if o == nil {
|
2018-09-12 20:02:14 +02:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
var private []byte
|
2020-11-30 23:20:50 +01:00
|
|
|
if o.Private != nil {
|
|
|
|
private = make([]byte, len(o.Private))
|
|
|
|
copy(private, o.Private)
|
2018-09-12 20:02:14 +02:00
|
|
|
}
|
|
|
|
|
2019-06-04 16:32:12 +02:00
|
|
|
// Some addrs.Referenceable implementations are technically mutable, but
|
2018-09-12 20:02:14 +02:00
|
|
|
// we treat them as immutable by convention and so we don't deep-copy here.
|
2020-03-23 20:26:18 +01:00
|
|
|
var dependencies []addrs.ConfigResource
|
2020-11-30 23:20:50 +01:00
|
|
|
if o.Dependencies != nil {
|
|
|
|
dependencies = make([]addrs.ConfigResource, len(o.Dependencies))
|
|
|
|
copy(dependencies, o.Dependencies)
|
2019-06-04 16:32:12 +02:00
|
|
|
}
|
2018-09-12 20:02:14 +02:00
|
|
|
|
|
|
|
return &ResourceInstanceObject{
|
2021-03-25 17:57:21 +01:00
|
|
|
Value: o.Value,
|
|
|
|
Status: o.Status,
|
|
|
|
Private: private,
|
|
|
|
Dependencies: dependencies,
|
|
|
|
CreateBeforeDestroy: o.CreateBeforeDestroy,
|
2018-09-12 20:02:14 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-06-08 02:27:57 +02:00
|
|
|
// DeepCopy returns a new output value state that contains equivalent data
|
|
|
|
// to the receiver but shares no backing memory in common.
|
|
|
|
//
|
|
|
|
// As with all methods on OutputValue, this method is not safe to use
|
|
|
|
// concurrently with writing to any portion of the recieving data structure. It
|
|
|
|
// is the caller's responsibility to ensure mutual exclusion for the duration
|
|
|
|
// of the operation, but may then freely modify the receiver and the returned
|
|
|
|
// copy independently once this method returns.
|
|
|
|
func (os *OutputValue) DeepCopy() *OutputValue {
|
|
|
|
if os == nil {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
return &OutputValue{
|
2020-04-13 22:37:59 +02:00
|
|
|
Addr: os.Addr,
|
2018-06-08 02:27:57 +02:00
|
|
|
Value: os.Value,
|
|
|
|
Sensitive: os.Sensitive,
|
|
|
|
}
|
|
|
|
}
|