Remove lock command and rename lock/force-unlock
Remove the lock command for now to avoid confusion about the behavior of locks. Rename lock to force-unlock to make it more aparent what it does. Add a success message, and chose red because it can be a dangerous operation. Add confirmation akin to `destroy`, and a `-force` option for automation and testing.
This commit is contained in:
parent
015198ca11
commit
65abe98047
|
@ -1,78 +0,0 @@
|
||||||
package command
|
|
||||||
|
|
||||||
import (
|
|
||||||
"fmt"
|
|
||||||
"strings"
|
|
||||||
|
|
||||||
"github.com/hashicorp/terraform/state"
|
|
||||||
)
|
|
||||||
|
|
||||||
// LockCommand is a cli.Command implementation that manually locks
|
|
||||||
// the state.
|
|
||||||
type LockCommand struct {
|
|
||||||
Meta
|
|
||||||
}
|
|
||||||
|
|
||||||
func (c *LockCommand) Run(args []string) int {
|
|
||||||
args = c.Meta.process(args, false)
|
|
||||||
|
|
||||||
cmdFlags := c.Meta.flagSet("lock")
|
|
||||||
cmdFlags.Usage = func() { c.Ui.Error(c.Help()) }
|
|
||||||
if err := cmdFlags.Parse(args); err != nil {
|
|
||||||
return 1
|
|
||||||
}
|
|
||||||
|
|
||||||
// assume everything is initialized. The user can manually init if this is
|
|
||||||
// required.
|
|
||||||
configPath, err := ModulePath(cmdFlags.Args())
|
|
||||||
if err != nil {
|
|
||||||
c.Ui.Error(err.Error())
|
|
||||||
return 1
|
|
||||||
}
|
|
||||||
|
|
||||||
// Load the backend
|
|
||||||
b, err := c.Backend(&BackendOpts{
|
|
||||||
ConfigPath: configPath,
|
|
||||||
})
|
|
||||||
if err != nil {
|
|
||||||
c.Ui.Error(fmt.Sprintf("Failed to load backend: %s", err))
|
|
||||||
return 1
|
|
||||||
}
|
|
||||||
|
|
||||||
st, err := b.State()
|
|
||||||
if err != nil {
|
|
||||||
c.Ui.Error(fmt.Sprintf("Failed to load state: %s", err))
|
|
||||||
return 1
|
|
||||||
}
|
|
||||||
|
|
||||||
s, ok := st.(state.Locker)
|
|
||||||
if !ok {
|
|
||||||
c.Ui.Error("Current state does not support locking")
|
|
||||||
return 1
|
|
||||||
}
|
|
||||||
|
|
||||||
if err := s.Lock("lock"); err != nil {
|
|
||||||
c.Ui.Error(fmt.Sprintf("Failed to lock state: %s", err))
|
|
||||||
return 1
|
|
||||||
}
|
|
||||||
|
|
||||||
return 0
|
|
||||||
}
|
|
||||||
|
|
||||||
func (c *LockCommand) Help() string {
|
|
||||||
helpText := `
|
|
||||||
Usage: terraform lock [DIR]
|
|
||||||
|
|
||||||
Manually lock the state for the defined configuration.
|
|
||||||
|
|
||||||
This will not modify your infrastructure. This command obtains a lock on the
|
|
||||||
state for the current configuration. The behavior of this lock is dependent
|
|
||||||
on the backend being used. A lock on a local state file only lasts for the
|
|
||||||
duration of the calling process.
|
|
||||||
`
|
|
||||||
return strings.TrimSpace(helpText)
|
|
||||||
}
|
|
||||||
|
|
||||||
func (c *LockCommand) Synopsis() string {
|
|
||||||
return "Manually lock the terraform state"
|
|
||||||
}
|
|
|
@ -1,97 +0,0 @@
|
||||||
package command
|
|
||||||
|
|
||||||
import (
|
|
||||||
"os"
|
|
||||||
"path/filepath"
|
|
||||||
"strings"
|
|
||||||
"testing"
|
|
||||||
|
|
||||||
"github.com/hashicorp/terraform/terraform"
|
|
||||||
"github.com/mitchellh/cli"
|
|
||||||
)
|
|
||||||
|
|
||||||
func TestLock(t *testing.T) {
|
|
||||||
testData, _ := filepath.Abs("./testdata")
|
|
||||||
|
|
||||||
td := tempDir(t)
|
|
||||||
os.MkdirAll(td, 0755)
|
|
||||||
defer os.RemoveAll(td)
|
|
||||||
defer testChdir(t, td)()
|
|
||||||
|
|
||||||
// Write the legacy state
|
|
||||||
statePath := DefaultStateFilename
|
|
||||||
{
|
|
||||||
f, err := os.Create(statePath)
|
|
||||||
if err != nil {
|
|
||||||
t.Fatalf("err: %s", err)
|
|
||||||
}
|
|
||||||
err = terraform.WriteState(testState(), f)
|
|
||||||
f.Close()
|
|
||||||
if err != nil {
|
|
||||||
t.Fatalf("err: %s", err)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
p := testProvider()
|
|
||||||
ui := new(cli.MockUi)
|
|
||||||
c := &LockCommand{
|
|
||||||
Meta: Meta{
|
|
||||||
ContextOpts: testCtxConfig(p),
|
|
||||||
Ui: ui,
|
|
||||||
},
|
|
||||||
}
|
|
||||||
|
|
||||||
if code := c.Run(nil); code != 0 {
|
|
||||||
t.Fatalf("bad: %d\n\n%s", code, ui.ErrorWriter.String())
|
|
||||||
}
|
|
||||||
|
|
||||||
unlock, err := testLockState(testData, statePath)
|
|
||||||
if err == nil {
|
|
||||||
unlock()
|
|
||||||
t.Fatal("expected error locking state")
|
|
||||||
} else if !strings.Contains(err.Error(), "locked") {
|
|
||||||
t.Fatal("does not appear to be a lock error:", err)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
func TestLock_lockedState(t *testing.T) {
|
|
||||||
testData, _ := filepath.Abs("./testdata")
|
|
||||||
|
|
||||||
td := tempDir(t)
|
|
||||||
os.MkdirAll(td, 0755)
|
|
||||||
defer os.RemoveAll(td)
|
|
||||||
defer testChdir(t, td)()
|
|
||||||
|
|
||||||
// Write the legacy state
|
|
||||||
statePath := DefaultStateFilename
|
|
||||||
{
|
|
||||||
f, err := os.Create(statePath)
|
|
||||||
if err != nil {
|
|
||||||
t.Fatalf("err: %s", err)
|
|
||||||
}
|
|
||||||
err = terraform.WriteState(testState(), f)
|
|
||||||
f.Close()
|
|
||||||
if err != nil {
|
|
||||||
t.Fatalf("err: %s", err)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
p := testProvider()
|
|
||||||
ui := new(cli.MockUi)
|
|
||||||
c := &LockCommand{
|
|
||||||
Meta: Meta{
|
|
||||||
ContextOpts: testCtxConfig(p),
|
|
||||||
Ui: ui,
|
|
||||||
},
|
|
||||||
}
|
|
||||||
|
|
||||||
unlock, err := testLockState(testData, statePath)
|
|
||||||
if err != nil {
|
|
||||||
t.Fatal(err)
|
|
||||||
}
|
|
||||||
defer unlock()
|
|
||||||
|
|
||||||
if code := c.Run(nil); code == 0 {
|
|
||||||
t.Fatal("expected error when locking a locked state")
|
|
||||||
}
|
|
||||||
}
|
|
|
@ -5,6 +5,7 @@ import (
|
||||||
"strings"
|
"strings"
|
||||||
|
|
||||||
"github.com/hashicorp/terraform/state"
|
"github.com/hashicorp/terraform/state"
|
||||||
|
"github.com/hashicorp/terraform/terraform"
|
||||||
)
|
)
|
||||||
|
|
||||||
// UnlockCommand is a cli.Command implementation that manually unlocks
|
// UnlockCommand is a cli.Command implementation that manually unlocks
|
||||||
|
@ -16,7 +17,9 @@ type UnlockCommand struct {
|
||||||
func (c *UnlockCommand) Run(args []string) int {
|
func (c *UnlockCommand) Run(args []string) int {
|
||||||
args = c.Meta.process(args, false)
|
args = c.Meta.process(args, false)
|
||||||
|
|
||||||
cmdFlags := c.Meta.flagSet("unlock")
|
force := false
|
||||||
|
cmdFlags := c.Meta.flagSet("force-unlock")
|
||||||
|
cmdFlags.BoolVar(&force, "force", false, "force")
|
||||||
cmdFlags.Usage = func() { c.Ui.Error(c.Help()) }
|
cmdFlags.Usage = func() { c.Ui.Error(c.Help()) }
|
||||||
if err := cmdFlags.Parse(args); err != nil {
|
if err := cmdFlags.Parse(args); err != nil {
|
||||||
return 1
|
return 1
|
||||||
|
@ -47,21 +50,60 @@ func (c *UnlockCommand) Run(args []string) int {
|
||||||
|
|
||||||
s, ok := st.(state.Locker)
|
s, ok := st.(state.Locker)
|
||||||
if !ok {
|
if !ok {
|
||||||
c.Ui.Error("Current state does not support locking")
|
c.Ui.Error("The remote state backend in use does not support locking, and therefor\n" +
|
||||||
|
"cannot be unlocked.")
|
||||||
return 1
|
return 1
|
||||||
}
|
}
|
||||||
|
|
||||||
|
isLocal := false
|
||||||
|
switch s := st.(type) {
|
||||||
|
case *state.BackupState:
|
||||||
|
if _, ok := s.Real.(*state.LocalState); ok {
|
||||||
|
isLocal = true
|
||||||
|
}
|
||||||
|
case *state.LocalState:
|
||||||
|
isLocal = true
|
||||||
|
}
|
||||||
|
|
||||||
|
if !force {
|
||||||
|
// Forcing this doesn't do anything, but doesn't break anything either,
|
||||||
|
// and allows us to run the basic command test too.
|
||||||
|
if isLocal {
|
||||||
|
c.Ui.Error("Local state cannot be unlocked by another process")
|
||||||
|
return 1
|
||||||
|
}
|
||||||
|
|
||||||
|
desc := "Terraform will remove the lock on the remote state.\n" +
|
||||||
|
"This will allow local Terraform commands to modify this state, even though it\n" +
|
||||||
|
"may be still be in use. Only 'yes' will be accepted to confirm."
|
||||||
|
|
||||||
|
v, err := c.UIInput().Input(&terraform.InputOpts{
|
||||||
|
Id: "force-unlock",
|
||||||
|
Query: "Do you really want to force-unlock?",
|
||||||
|
Description: desc,
|
||||||
|
})
|
||||||
|
if err != nil {
|
||||||
|
c.Ui.Error(fmt.Sprintf("Error asking for confirmation: %s", err))
|
||||||
|
return 1
|
||||||
|
}
|
||||||
|
if v != "yes" {
|
||||||
|
c.Ui.Output("force-unlock cancelled.")
|
||||||
|
return 1
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
if err := s.Unlock(); err != nil {
|
if err := s.Unlock(); err != nil {
|
||||||
c.Ui.Error(fmt.Sprintf("Failed to unlock state: %s", err))
|
c.Ui.Error(fmt.Sprintf("Failed to unlock state: %s", err))
|
||||||
return 1
|
return 1
|
||||||
}
|
}
|
||||||
|
|
||||||
|
c.Ui.Output(c.Colorize().Color(strings.TrimSpace(outputUnlockSuccess)))
|
||||||
return 0
|
return 0
|
||||||
}
|
}
|
||||||
|
|
||||||
func (c *UnlockCommand) Help() string {
|
func (c *UnlockCommand) Help() string {
|
||||||
helpText := `
|
helpText := `
|
||||||
Usage: terraform unlock [DIR]
|
Usage: terraform force-unlock [DIR]
|
||||||
|
|
||||||
Manually unlock the state for the defined configuration.
|
Manually unlock the state for the defined configuration.
|
||||||
|
|
||||||
|
@ -69,6 +111,10 @@ Usage: terraform unlock [DIR]
|
||||||
state for the current configuration. The behavior of this lock is dependent
|
state for the current configuration. The behavior of this lock is dependent
|
||||||
on the backend being used. Local state files cannot be unlocked by another
|
on the backend being used. Local state files cannot be unlocked by another
|
||||||
process.
|
process.
|
||||||
|
|
||||||
|
Options:
|
||||||
|
|
||||||
|
-force Don't ask for input for unlock confirmation.
|
||||||
`
|
`
|
||||||
return strings.TrimSpace(helpText)
|
return strings.TrimSpace(helpText)
|
||||||
}
|
}
|
||||||
|
@ -76,3 +122,10 @@ Usage: terraform unlock [DIR]
|
||||||
func (c *UnlockCommand) Synopsis() string {
|
func (c *UnlockCommand) Synopsis() string {
|
||||||
return "Manually unlock the terraform state"
|
return "Manually unlock the terraform state"
|
||||||
}
|
}
|
||||||
|
|
||||||
|
const outputUnlockSuccess = `
|
||||||
|
[reset][bold][red]Terraform state has been successfully unlocked![reset][red]
|
||||||
|
|
||||||
|
The state has been unlocked, and Terraform commands should now be able to
|
||||||
|
obtain a new lock on the remote state.
|
||||||
|
`
|
||||||
|
|
|
@ -40,7 +40,7 @@ func TestUnlock(t *testing.T) {
|
||||||
},
|
},
|
||||||
}
|
}
|
||||||
|
|
||||||
if code := c.Run(nil); code != 0 {
|
if code := c.Run([]string{"-force"}); code != 0 {
|
||||||
t.Fatalf("bad: %d\n\n%s", code, ui.ErrorWriter.String())
|
t.Fatalf("bad: %d\n\n%s", code, ui.ErrorWriter.String())
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
|
@ -75,6 +75,12 @@ func init() {
|
||||||
}, nil
|
}, nil
|
||||||
},
|
},
|
||||||
|
|
||||||
|
"force-unlock": func() (cli.Command, error) {
|
||||||
|
return &command.UnlockCommand{
|
||||||
|
Meta: meta,
|
||||||
|
}, nil
|
||||||
|
},
|
||||||
|
|
||||||
"get": func() (cli.Command, error) {
|
"get": func() (cli.Command, error) {
|
||||||
return &command.GetCommand{
|
return &command.GetCommand{
|
||||||
Meta: meta,
|
Meta: meta,
|
||||||
|
|
Loading…
Reference in New Issue