internal/getproviders: Allow basedir for local search to be symlink
The SearchLocalDirectory function was intentionally written to only support symlinks at the leaves so that it wouldn't risk getting into an infinite loop traversing intermediate symlinks, but that rule was also applying to the base directory itself. It's pretty reasonable to put your local plugins in some location Terraform wouldn't normally search (e.g. because you want to get them from a shared filesystem mounted somewhere) and creating a symlink from one of the locations Terraform _does_ search is a convenient way to help Terraform find those without going all in on the explicit provider installation methods configuration that is intended for more complicated situations. To allow for that, here we make a special exception for the base directory, resolving that first before we do any directory walking. In order to help with debugging a situation where there are for some reason symlinks at intermediate levels inside the search tree, we also now emit a WARN log line in that case to be explicit that symlinks are not supported there and to hint to put the symlink at the top-level if you want to use symlinks at all. (The support for symlinks at the deepest level of search is not mentioned in this message because we allow it primarily for our own cache linking behavior.)
This commit is contained in:
parent
daa112b566
commit
ce67a818db
|
@ -21,6 +21,25 @@ import (
|
||||||
// directory structure conventions.
|
// directory structure conventions.
|
||||||
func SearchLocalDirectory(baseDir string) (map[addrs.Provider]PackageMetaList, error) {
|
func SearchLocalDirectory(baseDir string) (map[addrs.Provider]PackageMetaList, error) {
|
||||||
ret := make(map[addrs.Provider]PackageMetaList)
|
ret := make(map[addrs.Provider]PackageMetaList)
|
||||||
|
|
||||||
|
// We don't support symlinks at intermediate points inside the directory
|
||||||
|
// heirarchy because that could potentially cause our walk to get into
|
||||||
|
// an infinite loop, but as a measure of pragmatism we'll allow the
|
||||||
|
// top-level location itself to be a symlink, so that a user can
|
||||||
|
// potentially keep their plugins in a non-standard location but use a
|
||||||
|
// symlink to help Terraform find them anyway.
|
||||||
|
originalBaseDir := baseDir
|
||||||
|
if finalDir, err := filepath.EvalSymlinks(baseDir); err == nil {
|
||||||
|
log.Printf("[TRACE] getproviders.SearchLocalDirectory: %s is a symlink to %s", baseDir, finalDir)
|
||||||
|
baseDir = finalDir
|
||||||
|
} else {
|
||||||
|
// We'll eat this particular error because if we're somehow able to
|
||||||
|
// find plugins via baseDir below anyway then we'd rather do that than
|
||||||
|
// hard fail, but we'll log it in case it's useful for diagnosing why
|
||||||
|
// discovery didn't produce the expected outcome.
|
||||||
|
log.Printf("[TRACE] getproviders.SearchLocalDirectory: failed to resolve symlinks for %s: %s", baseDir, err)
|
||||||
|
}
|
||||||
|
|
||||||
err := filepath.Walk(baseDir, func(fullPath string, info os.FileInfo, err error) error {
|
err := filepath.Walk(baseDir, func(fullPath string, info os.FileInfo, err error) error {
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return fmt.Errorf("cannot search %s: %s", fullPath, err)
|
return fmt.Errorf("cannot search %s: %s", fullPath, err)
|
||||||
|
@ -45,6 +64,15 @@ func SearchLocalDirectory(baseDir string) (map[addrs.Provider]PackageMetaList, e
|
||||||
if len(parts) < 3 {
|
if len(parts) < 3 {
|
||||||
// Likely a prefix of a valid path, so we'll ignore it and visit
|
// Likely a prefix of a valid path, so we'll ignore it and visit
|
||||||
// the full valid path on a later call.
|
// the full valid path on a later call.
|
||||||
|
|
||||||
|
if (info.Mode() & os.ModeSymlink) != 0 {
|
||||||
|
// We don't allow symlinks for intermediate steps in the
|
||||||
|
// heirarchy because otherwise this walk would risk getting
|
||||||
|
// itself into an infinite loop, but if we do find one then
|
||||||
|
// we'll warn about it to help with debugging.
|
||||||
|
log.Printf("[WARN] Provider plugin search ignored symlink %s: only the base directory %s may be a symlink", fullPath, originalBaseDir)
|
||||||
|
}
|
||||||
|
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -0,0 +1,52 @@
|
||||||
|
package getproviders
|
||||||
|
|
||||||
|
import (
|
||||||
|
"path/filepath"
|
||||||
|
"testing"
|
||||||
|
|
||||||
|
"github.com/google/go-cmp/cmp"
|
||||||
|
"github.com/hashicorp/terraform/addrs"
|
||||||
|
)
|
||||||
|
|
||||||
|
func TestSearchLocalDirectory(t *testing.T) {
|
||||||
|
tests := []struct {
|
||||||
|
Fixture string
|
||||||
|
Subdir string
|
||||||
|
Want map[addrs.Provider]PackageMetaList
|
||||||
|
}{
|
||||||
|
{
|
||||||
|
"symlinks",
|
||||||
|
"symlink",
|
||||||
|
map[addrs.Provider]PackageMetaList{
|
||||||
|
addrs.MustParseProviderSourceString("example.com/foo/bar"): {
|
||||||
|
{
|
||||||
|
Provider: addrs.MustParseProviderSourceString("example.com/foo/bar"),
|
||||||
|
Version: MustParseVersion("1.0.0"),
|
||||||
|
TargetPlatform: Platform{OS: "linux", Arch: "amd64"},
|
||||||
|
Filename: "terraform-provider-bar_1.0.0_linux_amd64.zip",
|
||||||
|
Location: PackageLocalDir("testdata/search-local-directory/symlinks/real/example.com/foo/bar/1.0.0/linux_amd64"),
|
||||||
|
},
|
||||||
|
},
|
||||||
|
// This search doesn't find example.net/foo/bar because only
|
||||||
|
// the top-level search directory is supported as being a
|
||||||
|
// symlink, and so we ignore the example.net symlink to
|
||||||
|
// example.com that is one level deeper.
|
||||||
|
},
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, test := range tests {
|
||||||
|
t.Run(test.Fixture, func(t *testing.T) {
|
||||||
|
fullDir := filepath.Join("testdata/search-local-directory", test.Fixture, test.Subdir)
|
||||||
|
got, err := SearchLocalDirectory(fullDir)
|
||||||
|
if err != nil {
|
||||||
|
t.Errorf("unexpected error: %s", err)
|
||||||
|
}
|
||||||
|
want := test.Want
|
||||||
|
|
||||||
|
if diff := cmp.Diff(want, got); diff != "" {
|
||||||
|
t.Errorf("wrong result\n%s", diff)
|
||||||
|
}
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
1
internal/getproviders/testdata/search-local-directory/symlinks/real/example.net
vendored
Symbolic link
1
internal/getproviders/testdata/search-local-directory/symlinks/real/example.net
vendored
Symbolic link
|
@ -0,0 +1 @@
|
||||||
|
example.com
|
|
@ -0,0 +1 @@
|
||||||
|
real
|
Loading…
Reference in New Issue