Remove lock command and rename lock/force-unlock

Remove the lock command for now to avoid confusion about the behavior of
locks. Rename lock to force-unlock to make it more aparent what it does.

Add a success message, and chose red because it can be a dangerous
operation.

Add confirmation akin to `destroy`, and a `-force` option for
automation and testing.
This commit is contained in:
James Bardin 2017-02-07 18:00:09 -05:00
parent 015198ca11
commit 65abe98047
5 changed files with 63 additions and 179 deletions

View File

@ -1,78 +0,0 @@
package command
import (
"fmt"
"strings"
"github.com/hashicorp/terraform/state"
)
// LockCommand is a cli.Command implementation that manually locks
// the state.
type LockCommand struct {
Meta
}
func (c *LockCommand) Run(args []string) int {
args = c.Meta.process(args, false)
cmdFlags := c.Meta.flagSet("lock")
cmdFlags.Usage = func() { c.Ui.Error(c.Help()) }
if err := cmdFlags.Parse(args); err != nil {
return 1
}
// assume everything is initialized. The user can manually init if this is
// required.
configPath, err := ModulePath(cmdFlags.Args())
if err != nil {
c.Ui.Error(err.Error())
return 1
}
// Load the backend
b, err := c.Backend(&BackendOpts{
ConfigPath: configPath,
})
if err != nil {
c.Ui.Error(fmt.Sprintf("Failed to load backend: %s", err))
return 1
}
st, err := b.State()
if err != nil {
c.Ui.Error(fmt.Sprintf("Failed to load state: %s", err))
return 1
}
s, ok := st.(state.Locker)
if !ok {
c.Ui.Error("Current state does not support locking")
return 1
}
if err := s.Lock("lock"); err != nil {
c.Ui.Error(fmt.Sprintf("Failed to lock state: %s", err))
return 1
}
return 0
}
func (c *LockCommand) Help() string {
helpText := `
Usage: terraform lock [DIR]
Manually lock the state for the defined configuration.
This will not modify your infrastructure. This command obtains a lock on the
state for the current configuration. The behavior of this lock is dependent
on the backend being used. A lock on a local state file only lasts for the
duration of the calling process.
`
return strings.TrimSpace(helpText)
}
func (c *LockCommand) Synopsis() string {
return "Manually lock the terraform state"
}

View File

@ -1,97 +0,0 @@
package command
import (
"os"
"path/filepath"
"strings"
"testing"
"github.com/hashicorp/terraform/terraform"
"github.com/mitchellh/cli"
)
func TestLock(t *testing.T) {
testData, _ := filepath.Abs("./testdata")
td := tempDir(t)
os.MkdirAll(td, 0755)
defer os.RemoveAll(td)
defer testChdir(t, td)()
// Write the legacy state
statePath := DefaultStateFilename
{
f, err := os.Create(statePath)
if err != nil {
t.Fatalf("err: %s", err)
}
err = terraform.WriteState(testState(), f)
f.Close()
if err != nil {
t.Fatalf("err: %s", err)
}
}
p := testProvider()
ui := new(cli.MockUi)
c := &LockCommand{
Meta: Meta{
ContextOpts: testCtxConfig(p),
Ui: ui,
},
}
if code := c.Run(nil); code != 0 {
t.Fatalf("bad: %d\n\n%s", code, ui.ErrorWriter.String())
}
unlock, err := testLockState(testData, statePath)
if err == nil {
unlock()
t.Fatal("expected error locking state")
} else if !strings.Contains(err.Error(), "locked") {
t.Fatal("does not appear to be a lock error:", err)
}
}
func TestLock_lockedState(t *testing.T) {
testData, _ := filepath.Abs("./testdata")
td := tempDir(t)
os.MkdirAll(td, 0755)
defer os.RemoveAll(td)
defer testChdir(t, td)()
// Write the legacy state
statePath := DefaultStateFilename
{
f, err := os.Create(statePath)
if err != nil {
t.Fatalf("err: %s", err)
}
err = terraform.WriteState(testState(), f)
f.Close()
if err != nil {
t.Fatalf("err: %s", err)
}
}
p := testProvider()
ui := new(cli.MockUi)
c := &LockCommand{
Meta: Meta{
ContextOpts: testCtxConfig(p),
Ui: ui,
},
}
unlock, err := testLockState(testData, statePath)
if err != nil {
t.Fatal(err)
}
defer unlock()
if code := c.Run(nil); code == 0 {
t.Fatal("expected error when locking a locked state")
}
}

View File

@ -5,6 +5,7 @@ import (
"strings" "strings"
"github.com/hashicorp/terraform/state" "github.com/hashicorp/terraform/state"
"github.com/hashicorp/terraform/terraform"
) )
// UnlockCommand is a cli.Command implementation that manually unlocks // UnlockCommand is a cli.Command implementation that manually unlocks
@ -16,7 +17,9 @@ type UnlockCommand struct {
func (c *UnlockCommand) Run(args []string) int { func (c *UnlockCommand) Run(args []string) int {
args = c.Meta.process(args, false) args = c.Meta.process(args, false)
cmdFlags := c.Meta.flagSet("unlock") force := false
cmdFlags := c.Meta.flagSet("force-unlock")
cmdFlags.BoolVar(&force, "force", false, "force")
cmdFlags.Usage = func() { c.Ui.Error(c.Help()) } cmdFlags.Usage = func() { c.Ui.Error(c.Help()) }
if err := cmdFlags.Parse(args); err != nil { if err := cmdFlags.Parse(args); err != nil {
return 1 return 1
@ -47,21 +50,60 @@ func (c *UnlockCommand) Run(args []string) int {
s, ok := st.(state.Locker) s, ok := st.(state.Locker)
if !ok { if !ok {
c.Ui.Error("Current state does not support locking") c.Ui.Error("The remote state backend in use does not support locking, and therefor\n" +
"cannot be unlocked.")
return 1 return 1
} }
isLocal := false
switch s := st.(type) {
case *state.BackupState:
if _, ok := s.Real.(*state.LocalState); ok {
isLocal = true
}
case *state.LocalState:
isLocal = true
}
if !force {
// Forcing this doesn't do anything, but doesn't break anything either,
// and allows us to run the basic command test too.
if isLocal {
c.Ui.Error("Local state cannot be unlocked by another process")
return 1
}
desc := "Terraform will remove the lock on the remote state.\n" +
"This will allow local Terraform commands to modify this state, even though it\n" +
"may be still be in use. Only 'yes' will be accepted to confirm."
v, err := c.UIInput().Input(&terraform.InputOpts{
Id: "force-unlock",
Query: "Do you really want to force-unlock?",
Description: desc,
})
if err != nil {
c.Ui.Error(fmt.Sprintf("Error asking for confirmation: %s", err))
return 1
}
if v != "yes" {
c.Ui.Output("force-unlock cancelled.")
return 1
}
}
if err := s.Unlock(); err != nil { if err := s.Unlock(); err != nil {
c.Ui.Error(fmt.Sprintf("Failed to unlock state: %s", err)) c.Ui.Error(fmt.Sprintf("Failed to unlock state: %s", err))
return 1 return 1
} }
c.Ui.Output(c.Colorize().Color(strings.TrimSpace(outputUnlockSuccess)))
return 0 return 0
} }
func (c *UnlockCommand) Help() string { func (c *UnlockCommand) Help() string {
helpText := ` helpText := `
Usage: terraform unlock [DIR] Usage: terraform force-unlock [DIR]
Manually unlock the state for the defined configuration. Manually unlock the state for the defined configuration.
@ -69,6 +111,10 @@ Usage: terraform unlock [DIR]
state for the current configuration. The behavior of this lock is dependent state for the current configuration. The behavior of this lock is dependent
on the backend being used. Local state files cannot be unlocked by another on the backend being used. Local state files cannot be unlocked by another
process. process.
Options:
-force Don't ask for input for unlock confirmation.
` `
return strings.TrimSpace(helpText) return strings.TrimSpace(helpText)
} }
@ -76,3 +122,10 @@ Usage: terraform unlock [DIR]
func (c *UnlockCommand) Synopsis() string { func (c *UnlockCommand) Synopsis() string {
return "Manually unlock the terraform state" return "Manually unlock the terraform state"
} }
const outputUnlockSuccess = `
[reset][bold][red]Terraform state has been successfully unlocked![reset][red]
The state has been unlocked, and Terraform commands should now be able to
obtain a new lock on the remote state.
`

View File

@ -40,7 +40,7 @@ func TestUnlock(t *testing.T) {
}, },
} }
if code := c.Run(nil); code != 0 { if code := c.Run([]string{"-force"}); code != 0 {
t.Fatalf("bad: %d\n\n%s", code, ui.ErrorWriter.String()) t.Fatalf("bad: %d\n\n%s", code, ui.ErrorWriter.String())
} }
} }

View File

@ -75,6 +75,12 @@ func init() {
}, nil }, nil
}, },
"force-unlock": func() (cli.Command, error) {
return &command.UnlockCommand{
Meta: meta,
}, nil
},
"get": func() (cli.Command, error) { "get": func() (cli.Command, error) {
return &command.GetCommand{ return &command.GetCommand{
Meta: meta, Meta: meta,