2014-05-24 21:04:43 +02:00
|
|
|
package main
|
|
|
|
|
|
|
|
import (
|
|
|
|
"os"
|
2014-07-03 02:01:02 +02:00
|
|
|
"os/signal"
|
2014-05-24 21:04:43 +02:00
|
|
|
|
2019-09-09 20:12:57 +02:00
|
|
|
"github.com/mitchellh/cli"
|
|
|
|
|
command: Unmanaged providers
This adds supports for "unmanaged" providers, or providers with process
lifecycles not controlled by Terraform. These providers are assumed to
be started before Terraform is launched, and are assumed to shut
themselves down after Terraform has finished running.
To do this, we must update the go-plugin dependency to v1.3.0, which
added support for the "test mode" plugin serving that powers all this.
As a side-effect of not needing to manage the process lifecycle anymore,
Terraform also no longer needs to worry about the provider's binary, as
it won't be used for anything anymore. Because of this, we can disable
the init behavior that concerns itself with downloading that provider's
binary, checking its version, and otherwise managing the binary.
This is all managed on a per-provider basis, so managed providers that
Terraform downloads, starts, and stops can be used in the same commands
as unmanaged providers. The TF_REATTACH_PROVIDERS environment variable
is added, and is a JSON encoding of the provider's address to the
information we need to connect to it.
This change enables two benefits: first, delve and other debuggers can
now be attached to provider server processes, and Terraform can connect.
This allows for attaching debuggers to provider processes, which before
was difficult to impossible. Second, it allows the SDK test framework to
host the provider in the same process as the test driver, while running
a production Terraform binary against the provider. This allows for Go's
built-in race detector and test coverage tooling to work as expected in
provider tests.
Unmanaged providers are expected to work in the exact same way as
managed providers, with one caveat: Terraform kills provider processes
and restarts them once per graph walk, meaning multiple times during
most Terraform CLI commands. As unmanaged providers can't be killed by
Terraform, and have no visibility into graph walks, unmanaged providers
are likely to have differences in how their global mutable state behaves
when compared to managed providers. Namely, unmanaged providers are
likely to retain global state when managed providers would have reset
it. Developers relying on global state should be aware of this.
2020-05-27 02:48:57 +02:00
|
|
|
"github.com/hashicorp/go-plugin"
|
2020-01-13 22:50:05 +01:00
|
|
|
svchost "github.com/hashicorp/terraform-svchost"
|
2019-10-11 11:34:26 +02:00
|
|
|
"github.com/hashicorp/terraform-svchost/auth"
|
|
|
|
"github.com/hashicorp/terraform-svchost/disco"
|
command: Unmanaged providers
This adds supports for "unmanaged" providers, or providers with process
lifecycles not controlled by Terraform. These providers are assumed to
be started before Terraform is launched, and are assumed to shut
themselves down after Terraform has finished running.
To do this, we must update the go-plugin dependency to v1.3.0, which
added support for the "test mode" plugin serving that powers all this.
As a side-effect of not needing to manage the process lifecycle anymore,
Terraform also no longer needs to worry about the provider's binary, as
it won't be used for anything anymore. Because of this, we can disable
the init behavior that concerns itself with downloading that provider's
binary, checking its version, and otherwise managing the binary.
This is all managed on a per-provider basis, so managed providers that
Terraform downloads, starts, and stops can be used in the same commands
as unmanaged providers. The TF_REATTACH_PROVIDERS environment variable
is added, and is a JSON encoding of the provider's address to the
information we need to connect to it.
This change enables two benefits: first, delve and other debuggers can
now be attached to provider server processes, and Terraform can connect.
This allows for attaching debuggers to provider processes, which before
was difficult to impossible. Second, it allows the SDK test framework to
host the provider in the same process as the test driver, while running
a production Terraform binary against the provider. This allows for Go's
built-in race detector and test coverage tooling to work as expected in
provider tests.
Unmanaged providers are expected to work in the exact same way as
managed providers, with one caveat: Terraform kills provider processes
and restarts them once per graph walk, meaning multiple times during
most Terraform CLI commands. As unmanaged providers can't be killed by
Terraform, and have no visibility into graph walks, unmanaged providers
are likely to have differences in how their global mutable state behaves
when compared to managed providers. Namely, unmanaged providers are
likely to retain global state when managed providers would have reset
it. Developers relying on global state should be aware of this.
2020-05-27 02:48:57 +02:00
|
|
|
"github.com/hashicorp/terraform/addrs"
|
2017-10-20 02:40:20 +02:00
|
|
|
"github.com/hashicorp/terraform/command"
|
2019-09-09 20:12:57 +02:00
|
|
|
"github.com/hashicorp/terraform/command/cliconfig"
|
2019-08-30 00:50:03 +02:00
|
|
|
"github.com/hashicorp/terraform/command/webbrowser"
|
2020-01-17 02:42:41 +01:00
|
|
|
"github.com/hashicorp/terraform/internal/getproviders"
|
2021-01-12 03:15:04 +01:00
|
|
|
"github.com/hashicorp/terraform/internal/terminal"
|
2017-10-20 02:40:20 +02:00
|
|
|
pluginDiscovery "github.com/hashicorp/terraform/plugin/discovery"
|
2014-05-24 21:04:43 +02:00
|
|
|
)
|
|
|
|
|
2017-09-09 02:14:37 +02:00
|
|
|
// runningInAutomationEnvName gives the name of an environment variable that
|
|
|
|
// can be set to any non-empty value in order to suppress certain messages
|
|
|
|
// that assume that Terraform is being run from a command prompt.
|
|
|
|
const runningInAutomationEnvName = "TF_IN_AUTOMATION"
|
|
|
|
|
2014-05-24 21:04:43 +02:00
|
|
|
// Commands is the mapping of all the available Terraform commands.
|
|
|
|
var Commands map[string]cli.CommandFactory
|
2020-10-24 01:13:41 +02:00
|
|
|
|
|
|
|
// PrimaryCommands is an ordered sequence of the top-level commands (not
|
|
|
|
// subcommands) that we emphasize at the top of our help output. This is
|
|
|
|
// ordered so that we can show them in the typical workflow order, rather
|
|
|
|
// than in alphabetical order. Anything not in this sequence or in the
|
|
|
|
// HiddenCommands set appears under "all other commands".
|
|
|
|
var PrimaryCommands []string
|
|
|
|
|
|
|
|
// HiddenCommands is a set of top-level commands (not subcommands) that are
|
|
|
|
// not advertised in the top-level help at all. This is typically because
|
|
|
|
// they are either just stubs that return an error message about something
|
|
|
|
// no longer being supported or backward-compatibility aliases for other
|
|
|
|
// commands.
|
|
|
|
//
|
|
|
|
// No commands in the PrimaryCommands sequence should also appear in the
|
|
|
|
// HiddenCommands set, because that would be rather silly.
|
2020-10-24 00:48:46 +02:00
|
|
|
var HiddenCommands map[string]struct{}
|
2014-05-24 21:04:43 +02:00
|
|
|
|
2014-06-27 02:05:21 +02:00
|
|
|
// Ui is the cli.Ui used for communicating to the outside world.
|
|
|
|
var Ui cli.Ui
|
|
|
|
|
2020-10-15 03:00:23 +02:00
|
|
|
func initCommands(
|
|
|
|
originalWorkingDir string,
|
2021-01-12 03:15:04 +01:00
|
|
|
streams *terminal.Streams,
|
2020-10-15 03:00:23 +02:00
|
|
|
config *cliconfig.Config,
|
|
|
|
services *disco.Disco,
|
|
|
|
providerSrc getproviders.Source,
|
|
|
|
providerDevOverrides map[addrs.Provider]getproviders.PackageLocalDir,
|
|
|
|
unmanagedProviders map[addrs.Provider]*plugin.ReattachConfig,
|
|
|
|
) {
|
2017-09-09 02:14:37 +02:00
|
|
|
var inAutomation bool
|
|
|
|
if v := os.Getenv(runningInAutomationEnvName); v != "" {
|
|
|
|
inAutomation = true
|
|
|
|
}
|
|
|
|
|
2017-10-26 01:00:08 +02:00
|
|
|
for userHost, hostConfig := range config.Hosts {
|
|
|
|
host, err := svchost.ForComparison(userHost)
|
|
|
|
if err != nil {
|
|
|
|
// We expect the config was already validated by the time we get
|
|
|
|
// here, so we'll just ignore invalid hostnames.
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
services.ForceHostServices(host, hostConfig.Services)
|
|
|
|
}
|
2017-10-18 17:52:13 +02:00
|
|
|
|
2019-09-09 20:12:57 +02:00
|
|
|
configDir, err := cliconfig.ConfigDir()
|
2019-07-09 21:06:20 +02:00
|
|
|
if err != nil {
|
|
|
|
configDir = "" // No config dir available (e.g. looking up a home directory failed)
|
|
|
|
}
|
|
|
|
|
2017-11-02 00:44:03 +01:00
|
|
|
dataDir := os.Getenv("TF_DATA_DIR")
|
|
|
|
|
2014-07-13 05:38:56 +02:00
|
|
|
meta := command.Meta{
|
main: new global option -chdir
This new option is intended to address the previous inconsistencies where
some older subcommands supported partially changing the target directory
(where Terraform would use the new directory inconsistently) where newer
commands did not support that override at all.
Instead, now Terraform will accept a -chdir command at the start of the
command line (before the subcommand) and will interpret it as a request
to direct all actions that would normally be taken in the current working
directory into the target directory instead. This is similar to options
offered by some other similar tools, such as the -C option in "make".
The new option is only accepted at the start of the command line (before
the subcommand) as a way to reflect that it is a global command (not
specific to a particular subcommand) and that it takes effect _before_
executing the subcommand. This also means it'll be forced to appear before
any other command-specific arguments that take file paths, which hopefully
communicates that those other arguments are interpreted relative to the
overridden path.
As a measure of pragmatism for existing uses, the path.cwd object in
the Terraform language will continue to return the _original_ working
directory (ignoring -chdir), in case that is important in some exceptional
workflows. The path.root object gives the root module directory, which
will always match the overriden working directory unless the user
simultaneously uses one of the legacy directory override arguments, which
is not a pattern we intend to support in the long run.
As a first step down the deprecation path, this commit adjusts the
documentation to de-emphasize the inconsistent old command line arguments,
including specific guidance on what to use instead for the main three
workflow commands, but all of those options remain supported in the same
way as they were before. In a later commit we'll make those arguments
produce a visible deprecation warning in Terraform's output, and then
in an even later commit we'll remove them entirely so that -chdir is the
single supported way to run Terraform from a directory other than the
one containing the root module configuration.
2020-09-02 00:45:12 +02:00
|
|
|
OriginalWorkingDir: originalWorkingDir,
|
2021-01-12 03:20:58 +01:00
|
|
|
Streams: streams,
|
main: new global option -chdir
This new option is intended to address the previous inconsistencies where
some older subcommands supported partially changing the target directory
(where Terraform would use the new directory inconsistently) where newer
commands did not support that override at all.
Instead, now Terraform will accept a -chdir command at the start of the
command line (before the subcommand) and will interpret it as a request
to direct all actions that would normally be taken in the current working
directory into the target directory instead. This is similar to options
offered by some other similar tools, such as the -C option in "make".
The new option is only accepted at the start of the command line (before
the subcommand) as a way to reflect that it is a global command (not
specific to a particular subcommand) and that it takes effect _before_
executing the subcommand. This also means it'll be forced to appear before
any other command-specific arguments that take file paths, which hopefully
communicates that those other arguments are interpreted relative to the
overridden path.
As a measure of pragmatism for existing uses, the path.cwd object in
the Terraform language will continue to return the _original_ working
directory (ignoring -chdir), in case that is important in some exceptional
workflows. The path.root object gives the root module directory, which
will always match the overriden working directory unless the user
simultaneously uses one of the legacy directory override arguments, which
is not a pattern we intend to support in the long run.
As a first step down the deprecation path, this commit adjusts the
documentation to de-emphasize the inconsistent old command line arguments,
including specific guidance on what to use instead for the main three
workflow commands, but all of those options remain supported in the same
way as they were before. In a later commit we'll make those arguments
produce a visible deprecation warning in Terraform's output, and then
in an even later commit we'll remove them entirely so that -chdir is the
single supported way to run Terraform from a directory other than the
one containing the root module configuration.
2020-09-02 00:45:12 +02:00
|
|
|
|
2017-04-14 03:05:58 +02:00
|
|
|
Color: true,
|
|
|
|
GlobalPluginDirs: globalPluginDirs(),
|
|
|
|
Ui: Ui,
|
2017-09-09 02:14:37 +02:00
|
|
|
|
2019-08-30 00:50:03 +02:00
|
|
|
Services: services,
|
|
|
|
BrowserLauncher: webbrowser.NewNativeLauncher(),
|
2017-10-18 17:52:13 +02:00
|
|
|
|
2017-09-09 02:14:37 +02:00
|
|
|
RunningInAutomation: inAutomation,
|
2019-07-09 21:06:20 +02:00
|
|
|
CLIConfigDir: configDir,
|
2017-09-02 01:20:25 +02:00
|
|
|
PluginCacheDir: config.PluginCacheDir,
|
2017-11-02 00:44:03 +01:00
|
|
|
OverrideDataDir: dataDir,
|
2017-12-01 17:06:39 +01:00
|
|
|
|
2020-10-15 03:00:23 +02:00
|
|
|
ShutdownCh: makeShutdownCh(),
|
|
|
|
|
|
|
|
ProviderSource: providerSrc,
|
|
|
|
ProviderDevOverrides: providerDevOverrides,
|
|
|
|
UnmanagedProviders: unmanagedProviders,
|
2014-07-13 05:38:56 +02:00
|
|
|
}
|
|
|
|
|
2016-11-24 18:22:18 +01:00
|
|
|
// The command list is included in the terraform -help
|
|
|
|
// output, which is in turn included in the docs at
|
2020-10-24 02:17:59 +02:00
|
|
|
// website/docs/commands/index.html.markdown; if you
|
2016-11-24 18:22:18 +01:00
|
|
|
// add, remove or reclassify commands then consider updating
|
|
|
|
// that to match.
|
|
|
|
|
2014-05-24 21:04:43 +02:00
|
|
|
Commands = map[string]cli.CommandFactory{
|
2014-05-24 21:27:58 +02:00
|
|
|
"apply": func() (cli.Command, error) {
|
|
|
|
return &command.ApplyCommand{
|
2017-12-01 17:06:39 +01:00
|
|
|
Meta: meta,
|
2014-05-24 21:27:58 +02:00
|
|
|
}, nil
|
|
|
|
},
|
|
|
|
|
2016-11-14 07:18:18 +01:00
|
|
|
"console": func() (cli.Command, error) {
|
|
|
|
return &command.ConsoleCommand{
|
2017-12-01 17:06:39 +01:00
|
|
|
Meta: meta,
|
2016-11-14 07:18:18 +01:00
|
|
|
}, nil
|
|
|
|
},
|
|
|
|
|
2014-10-01 06:51:45 +02:00
|
|
|
"destroy": func() (cli.Command, error) {
|
|
|
|
return &command.ApplyCommand{
|
2017-12-01 17:06:39 +01:00
|
|
|
Meta: meta,
|
|
|
|
Destroy: true,
|
2014-10-01 06:51:45 +02:00
|
|
|
}, nil
|
|
|
|
},
|
|
|
|
|
2017-02-17 00:29:19 +01:00
|
|
|
"env": func() (cli.Command, error) {
|
2017-05-31 00:06:13 +02:00
|
|
|
return &command.WorkspaceCommand{
|
|
|
|
Meta: meta,
|
|
|
|
LegacyName: true,
|
2017-02-17 00:29:19 +01:00
|
|
|
}, nil
|
|
|
|
},
|
|
|
|
|
2017-02-23 19:13:28 +01:00
|
|
|
"env list": func() (cli.Command, error) {
|
2017-05-31 00:06:13 +02:00
|
|
|
return &command.WorkspaceListCommand{
|
|
|
|
Meta: meta,
|
|
|
|
LegacyName: true,
|
2017-02-23 19:13:28 +01:00
|
|
|
}, nil
|
|
|
|
},
|
|
|
|
|
|
|
|
"env select": func() (cli.Command, error) {
|
2017-05-31 00:06:13 +02:00
|
|
|
return &command.WorkspaceSelectCommand{
|
|
|
|
Meta: meta,
|
|
|
|
LegacyName: true,
|
2017-02-23 19:13:28 +01:00
|
|
|
}, nil
|
|
|
|
},
|
|
|
|
|
|
|
|
"env new": func() (cli.Command, error) {
|
2017-05-31 00:06:13 +02:00
|
|
|
return &command.WorkspaceNewCommand{
|
|
|
|
Meta: meta,
|
|
|
|
LegacyName: true,
|
2017-02-23 19:13:28 +01:00
|
|
|
}, nil
|
|
|
|
},
|
|
|
|
|
|
|
|
"env delete": func() (cli.Command, error) {
|
2017-05-31 00:06:13 +02:00
|
|
|
return &command.WorkspaceDeleteCommand{
|
|
|
|
Meta: meta,
|
|
|
|
LegacyName: true,
|
2017-02-23 19:13:28 +01:00
|
|
|
}, nil
|
|
|
|
},
|
|
|
|
|
2016-02-02 23:10:22 +01:00
|
|
|
"fmt": func() (cli.Command, error) {
|
|
|
|
return &command.FmtCommand{
|
|
|
|
Meta: meta,
|
|
|
|
}, nil
|
|
|
|
},
|
|
|
|
|
2014-09-22 19:56:50 +02:00
|
|
|
"get": func() (cli.Command, error) {
|
|
|
|
return &command.GetCommand{
|
|
|
|
Meta: meta,
|
|
|
|
}, nil
|
|
|
|
},
|
|
|
|
|
2014-07-01 19:02:13 +02:00
|
|
|
"graph": func() (cli.Command, error) {
|
|
|
|
return &command.GraphCommand{
|
2014-07-13 05:38:56 +02:00
|
|
|
Meta: meta,
|
2014-07-01 19:02:13 +02:00
|
|
|
}, nil
|
|
|
|
},
|
|
|
|
|
2016-05-04 19:06:16 +02:00
|
|
|
"import": func() (cli.Command, error) {
|
|
|
|
return &command.ImportCommand{
|
|
|
|
Meta: meta,
|
|
|
|
}, nil
|
|
|
|
},
|
|
|
|
|
2014-09-27 21:31:38 +02:00
|
|
|
"init": func() (cli.Command, error) {
|
|
|
|
return &command.InitCommand{
|
|
|
|
Meta: meta,
|
|
|
|
}, nil
|
|
|
|
},
|
2016-04-05 04:11:11 +02:00
|
|
|
|
2020-01-24 20:43:15 +01:00
|
|
|
"login": func() (cli.Command, error) {
|
|
|
|
return &command.LoginCommand{
|
|
|
|
Meta: meta,
|
|
|
|
}, nil
|
|
|
|
},
|
2019-07-09 21:06:20 +02:00
|
|
|
|
2020-02-06 17:20:16 +01:00
|
|
|
"logout": func() (cli.Command, error) {
|
|
|
|
return &command.LogoutCommand{
|
|
|
|
Meta: meta,
|
|
|
|
}, nil
|
|
|
|
},
|
|
|
|
|
2014-07-13 19:25:42 +02:00
|
|
|
"output": func() (cli.Command, error) {
|
|
|
|
return &command.OutputCommand{
|
|
|
|
Meta: meta,
|
|
|
|
}, nil
|
|
|
|
},
|
|
|
|
|
2014-06-20 20:47:02 +02:00
|
|
|
"plan": func() (cli.Command, error) {
|
|
|
|
return &command.PlanCommand{
|
2014-07-13 05:38:56 +02:00
|
|
|
Meta: meta,
|
2014-06-09 20:53:41 +02:00
|
|
|
}, nil
|
|
|
|
},
|
|
|
|
|
2017-04-26 03:10:10 +02:00
|
|
|
"providers": func() (cli.Command, error) {
|
|
|
|
return &command.ProvidersCommand{
|
|
|
|
Meta: meta,
|
2020-04-25 00:54:43 +02:00
|
|
|
}, nil
|
|
|
|
},
|
|
|
|
|
2020-10-07 02:29:35 +02:00
|
|
|
"providers lock": func() (cli.Command, error) {
|
|
|
|
return &command.ProvidersLockCommand{
|
|
|
|
Meta: meta,
|
|
|
|
}, nil
|
|
|
|
},
|
|
|
|
|
2020-04-25 00:54:43 +02:00
|
|
|
"providers mirror": func() (cli.Command, error) {
|
|
|
|
return &command.ProvidersMirrorCommand{
|
|
|
|
Meta: meta,
|
2017-04-26 03:10:10 +02:00
|
|
|
}, nil
|
|
|
|
},
|
|
|
|
|
2019-02-25 22:32:47 +01:00
|
|
|
"providers schema": func() (cli.Command, error) {
|
|
|
|
return &command.ProvidersSchemaCommand{
|
|
|
|
Meta: meta,
|
|
|
|
}, nil
|
|
|
|
},
|
|
|
|
|
2015-03-05 05:42:26 +01:00
|
|
|
"push": func() (cli.Command, error) {
|
|
|
|
return &command.PushCommand{
|
|
|
|
Meta: meta,
|
|
|
|
}, nil
|
|
|
|
},
|
|
|
|
|
2014-06-27 20:09:01 +02:00
|
|
|
"refresh": func() (cli.Command, error) {
|
|
|
|
return &command.RefreshCommand{
|
2014-07-13 05:38:56 +02:00
|
|
|
Meta: meta,
|
2014-06-27 20:09:01 +02:00
|
|
|
}, nil
|
|
|
|
},
|
|
|
|
|
2014-07-13 04:47:31 +02:00
|
|
|
"show": func() (cli.Command, error) {
|
|
|
|
return &command.ShowCommand{
|
2014-07-13 05:38:56 +02:00
|
|
|
Meta: meta,
|
2014-07-13 04:47:31 +02:00
|
|
|
}, nil
|
|
|
|
},
|
|
|
|
|
2015-02-26 19:29:51 +01:00
|
|
|
"taint": func() (cli.Command, error) {
|
|
|
|
return &command.TaintCommand{
|
|
|
|
Meta: meta,
|
|
|
|
}, nil
|
|
|
|
},
|
|
|
|
|
2015-11-05 15:47:08 +01:00
|
|
|
"validate": func() (cli.Command, error) {
|
|
|
|
return &command.ValidateCommand{
|
|
|
|
Meta: meta,
|
|
|
|
}, nil
|
|
|
|
},
|
|
|
|
|
2014-05-24 21:04:43 +02:00
|
|
|
"version": func() (cli.Command, error) {
|
|
|
|
return &command.VersionCommand{
|
2014-07-13 19:42:18 +02:00
|
|
|
Meta: meta,
|
2014-05-24 21:04:43 +02:00
|
|
|
Version: Version,
|
|
|
|
VersionPrerelease: VersionPrerelease,
|
2020-11-19 00:43:27 +01:00
|
|
|
Platform: getproviders.CurrentPlatform,
|
2014-10-13 23:05:29 +02:00
|
|
|
CheckFunc: commandVersionCheck,
|
2014-05-24 21:04:43 +02:00
|
|
|
}, nil
|
|
|
|
},
|
2016-03-08 21:37:34 +01:00
|
|
|
|
|
|
|
"untaint": func() (cli.Command, error) {
|
|
|
|
return &command.UntaintCommand{
|
|
|
|
Meta: meta,
|
|
|
|
}, nil
|
|
|
|
},
|
2016-03-22 18:41:02 +01:00
|
|
|
|
2017-05-31 00:06:13 +02:00
|
|
|
"workspace": func() (cli.Command, error) {
|
|
|
|
return &command.WorkspaceCommand{
|
|
|
|
Meta: meta,
|
|
|
|
}, nil
|
|
|
|
},
|
|
|
|
|
|
|
|
"workspace list": func() (cli.Command, error) {
|
|
|
|
return &command.WorkspaceListCommand{
|
|
|
|
Meta: meta,
|
|
|
|
}, nil
|
|
|
|
},
|
|
|
|
|
|
|
|
"workspace select": func() (cli.Command, error) {
|
|
|
|
return &command.WorkspaceSelectCommand{
|
|
|
|
Meta: meta,
|
|
|
|
}, nil
|
|
|
|
},
|
|
|
|
|
2017-07-05 23:35:46 +02:00
|
|
|
"workspace show": func() (cli.Command, error) {
|
|
|
|
return &command.WorkspaceShowCommand{
|
|
|
|
Meta: meta,
|
|
|
|
}, nil
|
|
|
|
},
|
|
|
|
|
2017-05-31 00:06:13 +02:00
|
|
|
"workspace new": func() (cli.Command, error) {
|
|
|
|
return &command.WorkspaceNewCommand{
|
|
|
|
Meta: meta,
|
|
|
|
}, nil
|
|
|
|
},
|
|
|
|
|
|
|
|
"workspace delete": func() (cli.Command, error) {
|
|
|
|
return &command.WorkspaceDeleteCommand{
|
|
|
|
Meta: meta,
|
|
|
|
}, nil
|
|
|
|
},
|
|
|
|
|
2016-03-22 18:41:02 +01:00
|
|
|
//-----------------------------------------------------------
|
|
|
|
// Plumbing
|
|
|
|
//-----------------------------------------------------------
|
|
|
|
|
2018-06-21 04:27:14 +02:00
|
|
|
"0.12upgrade": func() (cli.Command, error) {
|
2020-06-01 22:12:30 +02:00
|
|
|
return &command.ZeroTwelveUpgradeCommand{
|
2018-06-21 04:27:14 +02:00
|
|
|
Meta: meta,
|
|
|
|
}, nil
|
|
|
|
},
|
|
|
|
|
2020-03-12 21:47:31 +01:00
|
|
|
"0.13upgrade": func() (cli.Command, error) {
|
|
|
|
return &command.ZeroThirteenUpgradeCommand{
|
|
|
|
Meta: meta,
|
|
|
|
}, nil
|
|
|
|
},
|
|
|
|
|
2017-04-01 22:06:28 +02:00
|
|
|
"force-unlock": func() (cli.Command, error) {
|
|
|
|
return &command.UnlockCommand{
|
|
|
|
Meta: meta,
|
|
|
|
}, nil
|
|
|
|
},
|
|
|
|
|
2016-03-22 18:41:02 +01:00
|
|
|
"state": func() (cli.Command, error) {
|
2017-03-01 16:10:47 +01:00
|
|
|
return &command.StateCommand{}, nil
|
2016-03-22 18:41:02 +01:00
|
|
|
},
|
|
|
|
|
|
|
|
"state list": func() (cli.Command, error) {
|
|
|
|
return &command.StateListCommand{
|
2017-03-01 16:10:47 +01:00
|
|
|
Meta: meta,
|
2016-03-22 18:41:02 +01:00
|
|
|
}, nil
|
|
|
|
},
|
2016-03-25 18:17:25 +01:00
|
|
|
|
2016-03-31 18:29:39 +02:00
|
|
|
"state rm": func() (cli.Command, error) {
|
|
|
|
return &command.StateRmCommand{
|
2017-07-27 17:54:14 +02:00
|
|
|
StateMeta: command.StateMeta{
|
|
|
|
Meta: meta,
|
|
|
|
},
|
2016-03-31 18:29:39 +02:00
|
|
|
}, nil
|
|
|
|
},
|
|
|
|
|
2016-06-22 10:46:38 +02:00
|
|
|
"state mv": func() (cli.Command, error) {
|
|
|
|
return &command.StateMvCommand{
|
2017-07-27 17:54:14 +02:00
|
|
|
StateMeta: command.StateMeta{
|
|
|
|
Meta: meta,
|
|
|
|
},
|
2016-06-22 10:46:38 +02:00
|
|
|
}, nil
|
|
|
|
},
|
|
|
|
|
2017-01-19 05:51:06 +01:00
|
|
|
"state pull": func() (cli.Command, error) {
|
|
|
|
return &command.StatePullCommand{
|
2017-03-01 16:10:47 +01:00
|
|
|
Meta: meta,
|
2017-01-19 05:51:06 +01:00
|
|
|
}, nil
|
|
|
|
},
|
|
|
|
|
|
|
|
"state push": func() (cli.Command, error) {
|
|
|
|
return &command.StatePushCommand{
|
2017-03-01 16:10:47 +01:00
|
|
|
Meta: meta,
|
2017-01-19 05:51:06 +01:00
|
|
|
}, nil
|
|
|
|
},
|
|
|
|
|
2016-03-25 18:17:25 +01:00
|
|
|
"state show": func() (cli.Command, error) {
|
|
|
|
return &command.StateShowCommand{
|
2017-03-01 16:10:47 +01:00
|
|
|
Meta: meta,
|
2016-03-25 18:17:25 +01:00
|
|
|
}, nil
|
|
|
|
},
|
2020-03-30 23:26:22 +02:00
|
|
|
|
|
|
|
"state replace-provider": func() (cli.Command, error) {
|
|
|
|
return &command.StateReplaceProviderCommand{
|
|
|
|
StateMeta: command.StateMeta{
|
|
|
|
Meta: meta,
|
|
|
|
},
|
|
|
|
}, nil
|
|
|
|
},
|
2014-05-24 21:04:43 +02:00
|
|
|
}
|
2020-10-24 01:13:41 +02:00
|
|
|
|
|
|
|
PrimaryCommands = []string{
|
|
|
|
"init",
|
|
|
|
"validate",
|
|
|
|
"plan",
|
|
|
|
"apply",
|
|
|
|
"destroy",
|
|
|
|
}
|
|
|
|
|
|
|
|
HiddenCommands = map[string]struct{}{
|
|
|
|
"0.12upgrade": struct{}{},
|
|
|
|
"0.13upgrade": struct{}{},
|
|
|
|
"env": struct{}{},
|
|
|
|
"internal-plugin": struct{}{},
|
|
|
|
"push": struct{}{},
|
|
|
|
}
|
|
|
|
|
2014-05-24 21:04:43 +02:00
|
|
|
}
|
2014-07-03 02:01:02 +02:00
|
|
|
|
|
|
|
// makeShutdownCh creates an interrupt listener and returns a channel.
|
|
|
|
// A message will be sent on the channel for every interrupt received.
|
|
|
|
func makeShutdownCh() <-chan struct{} {
|
|
|
|
resultCh := make(chan struct{})
|
|
|
|
|
|
|
|
signalCh := make(chan os.Signal, 4)
|
2016-12-08 18:10:52 +01:00
|
|
|
signal.Notify(signalCh, ignoreSignals...)
|
|
|
|
signal.Notify(signalCh, forwardSignals...)
|
2014-07-03 02:01:02 +02:00
|
|
|
go func() {
|
|
|
|
for {
|
|
|
|
<-signalCh
|
|
|
|
resultCh <- struct{}{}
|
|
|
|
}
|
|
|
|
}()
|
|
|
|
|
|
|
|
return resultCh
|
|
|
|
}
|
2017-10-20 02:40:20 +02:00
|
|
|
|
2020-01-13 22:50:05 +01:00
|
|
|
func credentialsSource(config *cliconfig.Config) (auth.CredentialsSource, error) {
|
2019-08-09 02:08:49 +02:00
|
|
|
helperPlugins := pluginDiscovery.FindPlugins("credentials", globalPluginDirs())
|
|
|
|
return config.CredentialsSource(helperPlugins)
|
2017-10-20 02:40:20 +02:00
|
|
|
}
|