diff --git a/builtin/providers/terraform/data_source_state.go b/builtin/providers/terraform/data_source_state.go index 513a3c235..d8c97ebd5 100644 --- a/builtin/providers/terraform/data_source_state.go +++ b/builtin/providers/terraform/data_source_state.go @@ -13,19 +13,19 @@ func dataSourceRemoteState() *schema.Resource { Read: dataSourceRemoteStateRead, Schema: map[string]*schema.Schema{ - "backend": &schema.Schema{ + "backend": { Type: schema.TypeString, Required: true, }, - "config": &schema.Schema{ + "config": { Type: schema.TypeMap, Optional: true, }, - "output": &schema.Schema{ - Type: schema.TypeMap, - Computed: true, + "__has_dynamic_attributes": { + Type: schema.TypeString, + Optional: true, }, }, } @@ -52,16 +52,17 @@ func dataSourceRemoteStateRead(d *schema.ResourceData, meta interface{}) error { return err } - var outputs map[string]interface{} - if !state.State().Empty() { - outputValueMap := make(map[string]string) - for key, output := range state.State().RootModule().Outputs { - //This is ok for 0.6.17 as outputs will have been strings - outputValueMap[key] = output.Value.(string) - } + d.SetId(time.Now().UTC().String()) + + outputMap := make(map[string]interface{}) + for key, val := range state.State().RootModule().Outputs { + outputMap[key] = val.Value } - d.SetId(time.Now().UTC().String()) - d.Set("output", outputs) + mappedOutputs := remoteStateFlatten(outputMap) + + for key, val := range mappedOutputs { + d.UnsafeSetFieldRaw(key, val) + } return nil } diff --git a/builtin/providers/terraform/data_source_state_test.go b/builtin/providers/terraform/data_source_state_test.go index 42ad55ada..bfe81fa77 100644 --- a/builtin/providers/terraform/data_source_state_test.go +++ b/builtin/providers/terraform/data_source_state_test.go @@ -8,12 +8,13 @@ import ( "github.com/hashicorp/terraform/terraform" ) -func TestAccState_basic(t *testing.T) { +func TestState_basic(t *testing.T) { resource.Test(t, resource.TestCase{ - PreCheck: func() { testAccPreCheck(t) }, - Providers: testAccProviders, + OverrideEnvVar: true, + PreCheck: func() { testAccPreCheck(t) }, + Providers: testAccProviders, Steps: []resource.TestStep{ - resource.TestStep{ + { Config: testAccState_basic, Check: resource.ComposeTestCheckFunc( testAccCheckStateValue( @@ -24,6 +25,26 @@ func TestAccState_basic(t *testing.T) { }) } +func TestState_complexOutputs(t *testing.T) { + resource.Test(t, resource.TestCase{ + OverrideEnvVar: true, + PreCheck: func() { testAccPreCheck(t) }, + Providers: testAccProviders, + Steps: []resource.TestStep{ + { + Config: testAccState_complexOutputs, + Check: resource.ComposeTestCheckFunc( + testAccCheckStateValue("terraform_remote_state.foo", "backend", "_local"), + testAccCheckStateValue("terraform_remote_state.foo", "config.path", "./test-fixtures/complex_outputs.tfstate"), + testAccCheckStateValue("terraform_remote_state.foo", "computed_set.#", "2"), + testAccCheckStateValue("terraform_remote_state.foo", `map.%`, "2"), + testAccCheckStateValue("terraform_remote_state.foo", `map.key`, "test"), + ), + }, + }, + }) +} + func testAccCheckStateValue(id, name, value string) resource.TestCheckFunc { return func(s *terraform.State) error { rs, ok := s.RootModule().Resources[id] @@ -34,7 +55,7 @@ func testAccCheckStateValue(id, name, value string) resource.TestCheckFunc { return fmt.Errorf("No ID is set") } - v := rs.Primary.Attributes["output."+name] + v := rs.Primary.Attributes[name] if v != value { return fmt.Errorf( "Value for %s is %s, not %s", name, v, value) @@ -52,3 +73,12 @@ resource "terraform_remote_state" "foo" { path = "./test-fixtures/basic.tfstate" } }` + +const testAccState_complexOutputs = ` +resource "terraform_remote_state" "foo" { + backend = "_local" + + config { + path = "./test-fixtures/complex_outputs.tfstate" + } +}` diff --git a/builtin/providers/terraform/flatten.go b/builtin/providers/terraform/flatten.go new file mode 100644 index 000000000..4766a4f5e --- /dev/null +++ b/builtin/providers/terraform/flatten.go @@ -0,0 +1,76 @@ +package terraform + +import ( + "fmt" + "reflect" +) + +// remoteStateFlatten takes a structure and turns into a flat map[string]string. +// +// Within the "thing" parameter, only primitive values are allowed. Structs are +// not supported. Therefore, it can only be slices, maps, primitives, and +// any combination of those together. +// +// The difference between this version and the version in package flatmap is that +// we add the count key for maps in this version, and return a normal +// map[string]string instead of a flatmap.Map +func remoteStateFlatten(thing map[string]interface{}) map[string]string { + result := make(map[string]string) + + for k, raw := range thing { + flatten(result, k, reflect.ValueOf(raw)) + } + + return result +} + +func flatten(result map[string]string, prefix string, v reflect.Value) { + if v.Kind() == reflect.Interface { + v = v.Elem() + } + + switch v.Kind() { + case reflect.Bool: + if v.Bool() { + result[prefix] = "true" + } else { + result[prefix] = "false" + } + case reflect.Int: + result[prefix] = fmt.Sprintf("%d", v.Int()) + case reflect.Map: + flattenMap(result, prefix, v) + case reflect.Slice: + flattenSlice(result, prefix, v) + case reflect.String: + result[prefix] = v.String() + default: + panic(fmt.Sprintf("Unknown: %s", v)) + } +} + +func flattenMap(result map[string]string, prefix string, v reflect.Value) { + mapKeys := v.MapKeys() + + result[fmt.Sprintf("%s.%%", prefix)] = fmt.Sprintf("%d", len(mapKeys)) + for _, k := range mapKeys { + if k.Kind() == reflect.Interface { + k = k.Elem() + } + + if k.Kind() != reflect.String { + panic(fmt.Sprintf("%s: map key is not string: %s", prefix, k)) + } + + flatten(result, fmt.Sprintf("%s.%s", prefix, k.String()), v.MapIndex(k)) + } +} + +func flattenSlice(result map[string]string, prefix string, v reflect.Value) { + prefix = prefix + "." + + result[prefix+"#"] = fmt.Sprintf("%d", v.Len()) + for i := 0; i < v.Len(); i++ { + flatten(result, fmt.Sprintf("%s%d", prefix, i), v.Index(i)) + } +} diff --git a/builtin/providers/terraform/test-fixtures/basic.tfstate b/builtin/providers/terraform/test-fixtures/basic.tfstate index 49a7460d3..a10b2b6b1 100644 --- a/builtin/providers/terraform/test-fixtures/basic.tfstate +++ b/builtin/providers/terraform/test-fixtures/basic.tfstate @@ -1,4 +1,5 @@ { + "version": 1, "modules": [{ "path": ["root"], "outputs": { "foo": "bar" } diff --git a/builtin/providers/terraform/test-fixtures/complex_outputs.tfstate b/builtin/providers/terraform/test-fixtures/complex_outputs.tfstate new file mode 100644 index 000000000..ab50e427f --- /dev/null +++ b/builtin/providers/terraform/test-fixtures/complex_outputs.tfstate @@ -0,0 +1,88 @@ +{ + "version": 3, + "terraform_version": "0.7.0", + "serial": 3, + "modules": [ + { + "path": [ + "root" + ], + "outputs": { + "computed_map": { + "sensitive": false, + "type": "map", + "value": { + "key1": "value1" + } + }, + "computed_set": { + "sensitive": false, + "type": "list", + "value": [ + "setval1", + "setval2" + ] + }, + "map": { + "sensitive": false, + "type": "map", + "value": { + "key": "test", + "test": "test" + } + }, + "set": { + "sensitive": false, + "type": "list", + "value": [ + "test1", + "test2" + ] + } + }, + "resources": { + "test_resource.main": { + "type": "test_resource", + "primary": { + "id": "testId", + "attributes": { + "computed_list.#": "2", + "computed_list.0": "listval1", + "computed_list.1": "listval2", + "computed_map.%": "1", + "computed_map.key1": "value1", + "computed_read_only": "value_from_api", + "computed_read_only_force_new": "value_from_api", + "computed_set.#": "2", + "computed_set.2337322984": "setval1", + "computed_set.307881554": "setval2", + "id": "testId", + "list_of_map.#": "2", + "list_of_map.0.%": "2", + "list_of_map.0.key1": "value1", + "list_of_map.0.key2": "value2", + "list_of_map.1.%": "2", + "list_of_map.1.key3": "value3", + "list_of_map.1.key4": "value4", + "map.%": "2", + "map.key": "test", + "map.test": "test", + "map_that_look_like_set.%": "2", + "map_that_look_like_set.12352223": "hello", + "map_that_look_like_set.36234341": "world", + "optional_computed_map.%": "0", + "required": "Hello World", + "required_map.%": "3", + "required_map.key1": "value1", + "required_map.key2": "value2", + "required_map.key3": "value3", + "set.#": "2", + "set.2326977762": "test1", + "set.331058520": "test2" + } + } + } + } + } + ] +} diff --git a/helper/schema/field_writer_map.go b/helper/schema/field_writer_map.go index 4b0efb7d4..689ed8d1c 100644 --- a/helper/schema/field_writer_map.go +++ b/helper/schema/field_writer_map.go @@ -29,6 +29,16 @@ func (w *MapFieldWriter) Map() map[string]string { return w.result } +func (w *MapFieldWriter) unsafeWriteField(addr string, value string) { + w.lock.Lock() + defer w.lock.Unlock() + if w.result == nil { + w.result = make(map[string]string) + } + + w.result[addr] = value +} + func (w *MapFieldWriter) WriteField(addr []string, value interface{}) error { w.lock.Lock() defer w.lock.Unlock() diff --git a/helper/schema/resource_data.go b/helper/schema/resource_data.go index 500de0a3d..b040b63ee 100644 --- a/helper/schema/resource_data.go +++ b/helper/schema/resource_data.go @@ -1,6 +1,7 @@ package schema import ( + "log" "reflect" "strings" "sync" @@ -44,7 +45,14 @@ type getResult struct { Schema *Schema } -var getResultEmpty getResult +// UnsafeSetFieldRaw allows setting arbitrary values in state to arbitrary +// values, bypassing schema. This MUST NOT be used in normal circumstances - +// it exists only to support the remote_state data source. +func (d *ResourceData) UnsafeSetFieldRaw(key string, value string) { + d.once.Do(d.init) + + d.setWriter.unsafeWriteField(key, value) +} // Get returns the data for the given key, or nil if the key doesn't exist // in the schema. @@ -242,6 +250,17 @@ func (d *ResourceData) State() *terraform.InstanceState { return nil } + // Look for a magic key in the schema that determines we skip the + // integrity check of fields existing in the schema, allowing dynamic + // keys to be created. + hasDynamicAttributes := false + for k, _ := range d.schema { + if k == "__has_dynamic_attributes" { + hasDynamicAttributes = true + log.Printf("[INFO] Resource %s has dynamic attributes", result.ID) + } + } + // In order to build the final state attributes, we read the full // attribute set as a map[string]interface{}, write it to a MapFieldWriter, // and then use that map. @@ -263,12 +282,27 @@ func (d *ResourceData) State() *terraform.InstanceState { } } } + mapW := &MapFieldWriter{Schema: d.schema} if err := mapW.WriteField(nil, rawMap); err != nil { return nil } result.Attributes = mapW.Map() + + if hasDynamicAttributes { + // If we have dynamic attributes, just copy the attributes map + // one for one into the result attributes. + for k, v := range d.setWriter.Map() { + // Don't clobber schema values. This limits usage of dynamic + // attributes to names which _do not_ conflict with schema + // keys! + if _, ok := result.Attributes[k]; !ok { + result.Attributes[k] = v + } + } + } + if d.newState != nil { result.Ephemeral = d.newState.Ephemeral } diff --git a/helper/schema/resource_data_test.go b/helper/schema/resource_data_test.go index 643a60a1a..0e6d1b2dc 100644 --- a/helper/schema/resource_data_test.go +++ b/helper/schema/resource_data_test.go @@ -1755,7 +1755,87 @@ func TestResourceDataSet(t *testing.T) { } } -func TestResourceDataState(t *testing.T) { +func TestResourceDataState_dynamicAttributes(t *testing.T) { + cases := []struct { + Schema map[string]*Schema + State *terraform.InstanceState + Diff *terraform.InstanceDiff + Set map[string]interface{} + UnsafeSet map[string]string + Result *terraform.InstanceState + }{ + { + Schema: map[string]*Schema{ + "__has_dynamic_attributes": { + Type: TypeString, + Optional: true, + }, + + "schema_field": { + Type: TypeString, + Required: true, + }, + }, + + State: nil, + + Diff: nil, + + Set: map[string]interface{}{ + "schema_field": "present", + }, + + UnsafeSet: map[string]string{ + "test1": "value", + "test2": "value", + }, + + Result: &terraform.InstanceState{ + Attributes: map[string]string{ + "schema_field": "present", + "test1": "value", + "test2": "value", + }, + }, + }, + } + + for i, tc := range cases { + d, err := schemaMap(tc.Schema).Data(tc.State, tc.Diff) + if err != nil { + t.Fatalf("err: %s", err) + } + + for k, v := range tc.Set { + d.Set(k, v) + } + + for k, v := range tc.UnsafeSet { + d.UnsafeSetFieldRaw(k, v) + } + + // Set an ID so that the state returned is not nil + idSet := false + if d.Id() == "" { + idSet = true + d.SetId("foo") + } + + actual := d.State() + + // If we set an ID, then undo what we did so the comparison works + if actual != nil && idSet { + actual.ID = "" + delete(actual.Attributes, "id") + } + + if !reflect.DeepEqual(actual, tc.Result) { + t.Fatalf("Bad: %d\n\n%#v\n\nExpected:\n\n%#v", i, actual, tc.Result) + } + } +} + +func TestResourceDataState_schema(t *testing.T) { cases := []struct { Schema map[string]*Schema State *terraform.InstanceState diff --git a/terraform/interpolate.go b/terraform/interpolate.go index 9593080d6..bb0d22144 100644 --- a/terraform/interpolate.go +++ b/terraform/interpolate.go @@ -13,6 +13,7 @@ import ( "github.com/hashicorp/hil/ast" "github.com/hashicorp/terraform/config" "github.com/hashicorp/terraform/config/module" + "github.com/hashicorp/terraform/flatmap" ) const ( @@ -589,21 +590,19 @@ func (i *Interpolater) interpolateComplexTypeAttribute( return unknownVariable(), nil } - var keys []string + keys := make([]string, 0) listElementKey := regexp.MustCompile("^" + resourceID + "\\.[0-9]+$") for id, _ := range attributes { if listElementKey.MatchString(id) { keys = append(keys, id) } } + sort.Strings(keys) var members []string for _, key := range keys { members = append(members, attributes[key]) } - // This behaviour still seems very broken to me... it retains BC but is - // probably going to cause problems in future - sort.Strings(members) return hil.InterfaceToVariable(members) } @@ -620,19 +619,16 @@ func (i *Interpolater) interpolateComplexTypeAttribute( return unknownVariable(), nil } - var keys []string + resourceFlatMap := make(map[string]string) mapElementKey := regexp.MustCompile("^" + resourceID + "\\.([^%]+)$") - for id, _ := range attributes { - if submatches := mapElementKey.FindAllStringSubmatch(id, -1); len(submatches) > 0 { - keys = append(keys, submatches[0][1]) + for id, val := range attributes { + if mapElementKey.MatchString(id) { + resourceFlatMap[id] = val } } - members := make(map[string]interface{}) - for _, key := range keys { - members[key] = attributes[resourceID+"."+key] - } - return hil.InterfaceToVariable(members) + expanded := flatmap.Expand(resourceFlatMap, resourceID) + return hil.InterfaceToVariable(expanded) } return ast.Variable{}, fmt.Errorf("No complex type %s found", resourceID) diff --git a/terraform/interpolate_test.go b/terraform/interpolate_test.go index 7d25aacf6..8012e16af 100644 --- a/terraform/interpolate_test.go +++ b/terraform/interpolate_test.go @@ -141,6 +141,95 @@ func TestInterpolater_pathRoot(t *testing.T) { }) } +func TestInterpolater_resourceVariableMap(t *testing.T) { + lock := new(sync.RWMutex) + state := &State{ + Modules: []*ModuleState{ + &ModuleState{ + Path: rootModulePath, + Resources: map[string]*ResourceState{ + "aws_instance.web": &ResourceState{ + Type: "aws_instance", + Primary: &InstanceState{ + ID: "bar", + Attributes: map[string]string{ + "amap.%": "3", + "amap.key1": "value1", + "amap.key2": "value2", + "amap.key3": "value3", + }, + }, + }, + }, + }, + }, + } + + i := &Interpolater{ + Module: testModule(t, "interpolate-resource-variable"), + State: state, + StateLock: lock, + } + + scope := &InterpolationScope{ + Path: rootModulePath, + } + + expected := map[string]interface{}{ + "key1": "value1", + "key2": "value2", + "key3": "value3", + } + + testInterpolate(t, i, scope, "aws_instance.web.amap", + interfaceToVariableSwallowError(expected)) +} + +func TestInterpolater_resourceVariableComplexMap(t *testing.T) { + lock := new(sync.RWMutex) + state := &State{ + Modules: []*ModuleState{ + &ModuleState{ + Path: rootModulePath, + Resources: map[string]*ResourceState{ + "aws_instance.web": &ResourceState{ + Type: "aws_instance", + Primary: &InstanceState{ + ID: "bar", + Attributes: map[string]string{ + "amap.%": "2", + "amap.key1.#": "2", + "amap.key1.0": "hello", + "amap.key1.1": "world", + "amap.key2.#": "1", + "amap.key2.0": "foo", + }, + }, + }, + }, + }, + }, + } + + i := &Interpolater{ + Module: testModule(t, "interpolate-resource-variable"), + State: state, + StateLock: lock, + } + + scope := &InterpolationScope{ + Path: rootModulePath, + } + + expected := map[string]interface{}{ + "key1": []interface{}{"hello", "world"}, + "key2": []interface{}{"foo"}, + } + + testInterpolate(t, i, scope, "aws_instance.web.amap", + interfaceToVariableSwallowError(expected)) +} + func TestInterpolater_resourceVariable(t *testing.T) { lock := new(sync.RWMutex) state := &State{ @@ -278,10 +367,10 @@ func TestInterpolator_resourceMultiAttributes(t *testing.T) { lock := new(sync.RWMutex) state := &State{ Modules: []*ModuleState{ - &ModuleState{ + { Path: rootModulePath, Resources: map[string]*ResourceState{ - "aws_route53_zone.yada": &ResourceState{ + "aws_route53_zone.yada": { Type: "aws_route53_zone", Dependencies: []string{}, Primary: &InstanceState{ @@ -354,8 +443,8 @@ func TestInterpolator_resourceMultiAttributesWithResourceCount(t *testing.T) { "ns-601.awsdns-11.net", "ns-000.awsdns-38.org", "ns-444.awsdns-18.co.uk", - "ns-666.awsdns-11.net", "ns-999.awsdns-62.com", + "ns-666.awsdns-11.net", } // More than 1 element