Merge pull request #16 from hashicorp/f-provisioners
Adding support for provisioners
This commit is contained in:
commit
d9dda40957
|
@ -0,0 +1,10 @@
|
||||||
|
package main
|
||||||
|
|
||||||
|
import (
|
||||||
|
"github.com/hashicorp/terraform/builtin/provisioners/local-exec"
|
||||||
|
"github.com/hashicorp/terraform/plugin"
|
||||||
|
)
|
||||||
|
|
||||||
|
func main() {
|
||||||
|
plugin.Serve(new(localexec.ResourceProvisioner))
|
||||||
|
}
|
|
@ -0,0 +1 @@
|
||||||
|
package main
|
|
@ -0,0 +1,65 @@
|
||||||
|
package localexec
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
"os/exec"
|
||||||
|
"runtime"
|
||||||
|
|
||||||
|
"github.com/armon/circbuf"
|
||||||
|
"github.com/hashicorp/terraform/helper/config"
|
||||||
|
"github.com/hashicorp/terraform/terraform"
|
||||||
|
)
|
||||||
|
|
||||||
|
const (
|
||||||
|
// maxBufSize limits how much output we collect from a local
|
||||||
|
// invocation. This is to prevent TF memory usage from growing
|
||||||
|
// to an enormous amount due to a faulty process.
|
||||||
|
maxBufSize = 8 * 1024
|
||||||
|
)
|
||||||
|
|
||||||
|
type ResourceProvisioner struct{}
|
||||||
|
|
||||||
|
func (p *ResourceProvisioner) Apply(
|
||||||
|
s *terraform.ResourceState,
|
||||||
|
c *terraform.ResourceConfig) (*terraform.ResourceState, error) {
|
||||||
|
|
||||||
|
// Get the command
|
||||||
|
commandRaw, ok := c.Config["command"]
|
||||||
|
if !ok {
|
||||||
|
return s, fmt.Errorf("local-exec provisioner missing 'command'")
|
||||||
|
}
|
||||||
|
command, ok := commandRaw.(string)
|
||||||
|
if !ok {
|
||||||
|
return s, fmt.Errorf("local-exec provisioner command must be a string")
|
||||||
|
}
|
||||||
|
|
||||||
|
// Execute the command using a shell
|
||||||
|
var shell, flag string
|
||||||
|
if runtime.GOOS == "windows" {
|
||||||
|
shell = "cmd"
|
||||||
|
flag = "/C"
|
||||||
|
} else {
|
||||||
|
shell = "/bin/sh"
|
||||||
|
flag = "-c"
|
||||||
|
}
|
||||||
|
|
||||||
|
// Setup the command
|
||||||
|
cmd := exec.Command(shell, flag, command)
|
||||||
|
output, _ := circbuf.NewBuffer(maxBufSize)
|
||||||
|
cmd.Stderr = output
|
||||||
|
cmd.Stdout = output
|
||||||
|
|
||||||
|
// Run the command to completion
|
||||||
|
if err := cmd.Run(); err != nil {
|
||||||
|
return s, fmt.Errorf("Error running command '%s': %v. Output: %s",
|
||||||
|
command, err, output.Bytes())
|
||||||
|
}
|
||||||
|
return s, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (p *ResourceProvisioner) Validate(c *terraform.ResourceConfig) ([]string, []error) {
|
||||||
|
validator := config.Validator{
|
||||||
|
Required: []string{"command"},
|
||||||
|
}
|
||||||
|
return validator.Validate(c)
|
||||||
|
}
|
|
@ -0,0 +1,74 @@
|
||||||
|
package localexec
|
||||||
|
|
||||||
|
import (
|
||||||
|
"io/ioutil"
|
||||||
|
"os"
|
||||||
|
"testing"
|
||||||
|
|
||||||
|
"github.com/hashicorp/terraform/config"
|
||||||
|
"github.com/hashicorp/terraform/terraform"
|
||||||
|
)
|
||||||
|
|
||||||
|
func TestResourceProvisioner_impl(t *testing.T) {
|
||||||
|
var _ terraform.ResourceProvisioner = new(ResourceProvisioner)
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestResourceProvider_Apply(t *testing.T) {
|
||||||
|
defer os.Remove("test_out")
|
||||||
|
c := testConfig(t, map[string]interface{}{
|
||||||
|
"command": "echo foo > test_out",
|
||||||
|
})
|
||||||
|
|
||||||
|
p := new(ResourceProvisioner)
|
||||||
|
_, err := p.Apply(nil, c)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("err: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Check the file
|
||||||
|
raw, err := ioutil.ReadFile("test_out")
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("err: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
if string(raw) != "foo\n" {
|
||||||
|
t.Fatalf("bad: %s", raw)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestResourceProvider_Validate_good(t *testing.T) {
|
||||||
|
c := testConfig(t, map[string]interface{}{
|
||||||
|
"command": "echo foo",
|
||||||
|
})
|
||||||
|
p := new(ResourceProvisioner)
|
||||||
|
warn, errs := p.Validate(c)
|
||||||
|
if len(warn) > 0 {
|
||||||
|
t.Fatalf("Warnings: %v", warn)
|
||||||
|
}
|
||||||
|
if len(errs) > 0 {
|
||||||
|
t.Fatalf("Errors: %v", errs)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestResourceProvider_Validate_missing(t *testing.T) {
|
||||||
|
c := testConfig(t, map[string]interface{}{})
|
||||||
|
p := new(ResourceProvisioner)
|
||||||
|
warn, errs := p.Validate(c)
|
||||||
|
if len(warn) > 0 {
|
||||||
|
t.Fatalf("Warnings: %v", warn)
|
||||||
|
}
|
||||||
|
if len(errs) == 0 {
|
||||||
|
t.Fatalf("Should have errors")
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func testConfig(
|
||||||
|
t *testing.T,
|
||||||
|
c map[string]interface{}) *terraform.ResourceConfig {
|
||||||
|
r, err := config.NewRawConfig(c)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("bad: %s", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
return terraform.NewResourceConfig(r)
|
||||||
|
}
|
71
config.go
71
config.go
|
@ -17,6 +17,7 @@ import (
|
||||||
// "config" package.
|
// "config" package.
|
||||||
type Config struct {
|
type Config struct {
|
||||||
Providers map[string]string
|
Providers map[string]string
|
||||||
|
Provisioners map[string]string
|
||||||
}
|
}
|
||||||
|
|
||||||
// BuiltinConfig is the built-in defaults for the configuration. These
|
// BuiltinConfig is the built-in defaults for the configuration. These
|
||||||
|
@ -34,6 +35,9 @@ func init() {
|
||||||
BuiltinConfig.Providers = map[string]string{
|
BuiltinConfig.Providers = map[string]string{
|
||||||
"aws": "terraform-provider-aws",
|
"aws": "terraform-provider-aws",
|
||||||
}
|
}
|
||||||
|
BuiltinConfig.Provisioners = map[string]string{
|
||||||
|
"local-exec": "terraform-provisioner-local-exec",
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
// LoadConfig loads the CLI configuration from ".terraformrc" files.
|
// LoadConfig loads the CLI configuration from ".terraformrc" files.
|
||||||
|
@ -69,12 +73,19 @@ func LoadConfig(path string) (*Config, error) {
|
||||||
func (c1 *Config) Merge(c2 *Config) *Config {
|
func (c1 *Config) Merge(c2 *Config) *Config {
|
||||||
var result Config
|
var result Config
|
||||||
result.Providers = make(map[string]string)
|
result.Providers = make(map[string]string)
|
||||||
|
result.Provisioners = make(map[string]string)
|
||||||
for k, v := range c1.Providers {
|
for k, v := range c1.Providers {
|
||||||
result.Providers[k] = v
|
result.Providers[k] = v
|
||||||
}
|
}
|
||||||
for k, v := range c2.Providers {
|
for k, v := range c2.Providers {
|
||||||
result.Providers[k] = v
|
result.Providers[k] = v
|
||||||
}
|
}
|
||||||
|
for k, v := range c1.Provisioners {
|
||||||
|
result.Provisioners[k] = v
|
||||||
|
}
|
||||||
|
for k, v := range c2.Provisioners {
|
||||||
|
result.Provisioners[k] = v
|
||||||
|
}
|
||||||
|
|
||||||
return &result
|
return &result
|
||||||
}
|
}
|
||||||
|
@ -138,3 +149,63 @@ func (c *Config) providerFactory(path string) terraform.ResourceProviderFactory
|
||||||
}, nil
|
}, nil
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// ProvisionerFactories returns the mapping of prefixes to
|
||||||
|
// ResourceProvisionerFactory that can be used to instantiate a
|
||||||
|
// binary-based plugin.
|
||||||
|
func (c *Config) ProvisionerFactories() map[string]terraform.ResourceProvisionerFactory {
|
||||||
|
result := make(map[string]terraform.ResourceProvisionerFactory)
|
||||||
|
for k, v := range c.Provisioners {
|
||||||
|
result[k] = c.provisionerFactory(v)
|
||||||
|
}
|
||||||
|
|
||||||
|
return result
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *Config) provisionerFactory(path string) terraform.ResourceProvisionerFactory {
|
||||||
|
originalPath := path
|
||||||
|
|
||||||
|
return func() (terraform.ResourceProvisioner, error) {
|
||||||
|
// First look for the provider on the PATH.
|
||||||
|
path, err := exec.LookPath(path)
|
||||||
|
if err != nil {
|
||||||
|
// If that doesn't work, look for it in the same directory
|
||||||
|
// as the executable that is running.
|
||||||
|
exePath, err := osext.Executable()
|
||||||
|
if err == nil {
|
||||||
|
path = filepath.Join(
|
||||||
|
filepath.Dir(exePath),
|
||||||
|
filepath.Base(originalPath))
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// If we still don't have a path set, then set it to the
|
||||||
|
// original path and let any errors that happen bubble out.
|
||||||
|
if path == "" {
|
||||||
|
path = originalPath
|
||||||
|
}
|
||||||
|
|
||||||
|
// Build the plugin client configuration and init the plugin
|
||||||
|
var config plugin.ClientConfig
|
||||||
|
config.Cmd = exec.Command(path)
|
||||||
|
config.Managed = true
|
||||||
|
client := plugin.NewClient(&config)
|
||||||
|
|
||||||
|
// Request the RPC client and service name from the client
|
||||||
|
// so we can build the actual RPC-implemented provider.
|
||||||
|
rpcClient, err := client.Client()
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
service, err := client.Service()
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
return &rpc.ResourceProvisioner{
|
||||||
|
Client: rpcClient,
|
||||||
|
Name: service,
|
||||||
|
}, nil
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
|
@ -35,6 +35,13 @@ type Resource struct {
|
||||||
Type string
|
Type string
|
||||||
Count int
|
Count int
|
||||||
RawConfig *RawConfig
|
RawConfig *RawConfig
|
||||||
|
Provisioners []*Provisioner
|
||||||
|
}
|
||||||
|
|
||||||
|
// Provisioner is a configured provisioner step on a resource.
|
||||||
|
type Provisioner struct {
|
||||||
|
Type string
|
||||||
|
RawConfig *RawConfig
|
||||||
}
|
}
|
||||||
|
|
||||||
// Variable is a variable defined within the configuration.
|
// Variable is a variable defined within the configuration.
|
||||||
|
|
|
@ -312,6 +312,10 @@ func loadResourcesLibucl(o *libucl.Object) ([]*Resource, error) {
|
||||||
// Remove the "count" from the config, since we treat that special
|
// Remove the "count" from the config, since we treat that special
|
||||||
delete(config, "count")
|
delete(config, "count")
|
||||||
|
|
||||||
|
// Delete the "provisioner" section from the config since
|
||||||
|
// that is treated specially.
|
||||||
|
delete(config, "provisioner")
|
||||||
|
|
||||||
rawConfig, err := NewRawConfig(config)
|
rawConfig, err := NewRawConfig(config)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, fmt.Errorf(
|
return nil, fmt.Errorf(
|
||||||
|
@ -335,14 +339,86 @@ func loadResourcesLibucl(o *libucl.Object) ([]*Resource, error) {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// If we have provisioners, then parse those out
|
||||||
|
var provisioners []*Provisioner
|
||||||
|
if po := r.Get("provisioner"); po != nil {
|
||||||
|
var err error
|
||||||
|
provisioners, err = loadProvisionersLibucl(po)
|
||||||
|
po.Close()
|
||||||
|
if err != nil {
|
||||||
|
return nil, fmt.Errorf(
|
||||||
|
"Error reading provisioners for %s[%s]: %s",
|
||||||
|
t.Key(),
|
||||||
|
r.Key(),
|
||||||
|
err)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
result = append(result, &Resource{
|
result = append(result, &Resource{
|
||||||
Name: r.Key(),
|
Name: r.Key(),
|
||||||
Type: t.Key(),
|
Type: t.Key(),
|
||||||
Count: count,
|
Count: count,
|
||||||
RawConfig: rawConfig,
|
RawConfig: rawConfig,
|
||||||
|
Provisioners: provisioners,
|
||||||
})
|
})
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
return result, nil
|
return result, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func loadProvisionersLibucl(o *libucl.Object) ([]*Provisioner, error) {
|
||||||
|
pos := make([]*libucl.Object, 0, int(o.Len()))
|
||||||
|
|
||||||
|
// Accumulate all the actual provisioner configuration objects. We
|
||||||
|
// have to iterate twice here:
|
||||||
|
//
|
||||||
|
// 1. The first iteration is of the list of `provisioner` blocks.
|
||||||
|
// 2. The second iteration is of the dictionary within the
|
||||||
|
// provisioner which will have only one element which is the
|
||||||
|
// type of provisioner to use along with tis config.
|
||||||
|
//
|
||||||
|
// In JSON it looks kind of like this:
|
||||||
|
//
|
||||||
|
// [
|
||||||
|
// {
|
||||||
|
// "shell": {
|
||||||
|
// ...
|
||||||
|
// }
|
||||||
|
// }
|
||||||
|
// ]
|
||||||
|
//
|
||||||
|
iter := o.Iterate(false)
|
||||||
|
for o1 := iter.Next(); o1 != nil; o1 = iter.Next() {
|
||||||
|
iter2 := o1.Iterate(true)
|
||||||
|
for o2 := iter2.Next(); o2 != nil; o2 = iter2.Next() {
|
||||||
|
pos = append(pos, o2)
|
||||||
|
}
|
||||||
|
|
||||||
|
o1.Close()
|
||||||
|
iter2.Close()
|
||||||
|
}
|
||||||
|
iter.Close()
|
||||||
|
|
||||||
|
result := make([]*Provisioner, 0, len(pos))
|
||||||
|
for _, po := range pos {
|
||||||
|
defer po.Close()
|
||||||
|
|
||||||
|
var config map[string]interface{}
|
||||||
|
if err := po.Decode(&config); err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
rawConfig, err := NewRawConfig(config)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
result = append(result, &Provisioner{
|
||||||
|
Type: po.Key(),
|
||||||
|
RawConfig: rawConfig,
|
||||||
|
})
|
||||||
|
}
|
||||||
|
|
||||||
|
return result, nil
|
||||||
|
}
|
||||||
|
|
|
@ -131,6 +131,22 @@ func outputsStr(os map[string]*Output) string {
|
||||||
return strings.TrimSpace(result)
|
return strings.TrimSpace(result)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func TestLoad_provisioners(t *testing.T) {
|
||||||
|
c, err := Load(filepath.Join(fixtureDir, "provisioners.tf"))
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("err: %s", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
if c == nil {
|
||||||
|
t.Fatal("config should not be nil")
|
||||||
|
}
|
||||||
|
|
||||||
|
actual := resourcesStr(c.Resources)
|
||||||
|
if actual != strings.TrimSpace(provisionerResourcesStr) {
|
||||||
|
t.Fatalf("bad:\n%s", actual)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
// This helper turns a provider configs field into a deterministic
|
// This helper turns a provider configs field into a deterministic
|
||||||
// string value for comparison in tests.
|
// string value for comparison in tests.
|
||||||
func providerConfigsStr(pcs map[string]*ProviderConfig) string {
|
func providerConfigsStr(pcs map[string]*ProviderConfig) string {
|
||||||
|
@ -213,6 +229,23 @@ func resourcesStr(rs []*Resource) string {
|
||||||
result += fmt.Sprintf(" %s\n", k)
|
result += fmt.Sprintf(" %s\n", k)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if len(r.Provisioners) > 0 {
|
||||||
|
result += fmt.Sprintf(" provisioners\n")
|
||||||
|
for _, p := range r.Provisioners {
|
||||||
|
result += fmt.Sprintf(" %s\n", p.Type)
|
||||||
|
|
||||||
|
ks := make([]string, 0, len(p.RawConfig.Raw))
|
||||||
|
for k, _ := range p.RawConfig.Raw {
|
||||||
|
ks = append(ks, k)
|
||||||
|
}
|
||||||
|
sort.Strings(ks)
|
||||||
|
|
||||||
|
for _, k := range ks {
|
||||||
|
result += fmt.Sprintf(" %s\n", k)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
if len(r.RawConfig.Variables) > 0 {
|
if len(r.RawConfig.Variables) > 0 {
|
||||||
result += fmt.Sprintf(" vars\n")
|
result += fmt.Sprintf(" vars\n")
|
||||||
|
|
||||||
|
@ -328,6 +361,18 @@ foo
|
||||||
bar
|
bar
|
||||||
`
|
`
|
||||||
|
|
||||||
|
const provisionerResourcesStr = `
|
||||||
|
aws_instance[web] (x1)
|
||||||
|
ami
|
||||||
|
security_groups
|
||||||
|
provisioners
|
||||||
|
shell
|
||||||
|
path
|
||||||
|
vars
|
||||||
|
resource: aws_security_group.firewall.foo
|
||||||
|
user: var.foo
|
||||||
|
`
|
||||||
|
|
||||||
const variablesVariablesStr = `
|
const variablesVariablesStr = `
|
||||||
bar
|
bar
|
||||||
<>
|
<>
|
||||||
|
|
|
@ -0,0 +1,11 @@
|
||||||
|
resource "aws_instance" "web" {
|
||||||
|
ami = "${var.foo}"
|
||||||
|
security_groups = [
|
||||||
|
"foo",
|
||||||
|
"${aws_security_group.firewall.foo}"
|
||||||
|
]
|
||||||
|
|
||||||
|
provisioner "shell" {
|
||||||
|
path = "foo"
|
||||||
|
}
|
||||||
|
}
|
|
@ -33,6 +33,10 @@ func TestConfig_Merge(t *testing.T) {
|
||||||
"foo": "bar",
|
"foo": "bar",
|
||||||
"bar": "blah",
|
"bar": "blah",
|
||||||
},
|
},
|
||||||
|
Provisioners: map[string]string{
|
||||||
|
"local": "local",
|
||||||
|
"remote": "bad",
|
||||||
|
},
|
||||||
}
|
}
|
||||||
|
|
||||||
c2 := &Config{
|
c2 := &Config{
|
||||||
|
@ -40,6 +44,9 @@ func TestConfig_Merge(t *testing.T) {
|
||||||
"bar": "baz",
|
"bar": "baz",
|
||||||
"baz": "what",
|
"baz": "what",
|
||||||
},
|
},
|
||||||
|
Provisioners: map[string]string{
|
||||||
|
"remote": "remote",
|
||||||
|
},
|
||||||
}
|
}
|
||||||
|
|
||||||
expected := &Config{
|
expected := &Config{
|
||||||
|
@ -48,6 +55,10 @@ func TestConfig_Merge(t *testing.T) {
|
||||||
"bar": "baz",
|
"bar": "baz",
|
||||||
"baz": "what",
|
"baz": "what",
|
||||||
},
|
},
|
||||||
|
Provisioners: map[string]string{
|
||||||
|
"local": "local",
|
||||||
|
"remote": "remote",
|
||||||
|
},
|
||||||
}
|
}
|
||||||
|
|
||||||
actual := c1.Merge(c2)
|
actual := c1.Merge(c2)
|
||||||
|
|
1
main.go
1
main.go
|
@ -85,6 +85,7 @@ func wrappedMain() int {
|
||||||
|
|
||||||
// Initialize the TFConfig settings for the commands...
|
// Initialize the TFConfig settings for the commands...
|
||||||
ContextOpts.Providers = config.ProviderFactories()
|
ContextOpts.Providers = config.ProviderFactories()
|
||||||
|
ContextOpts.Provisioners = config.ProvisionerFactories()
|
||||||
|
|
||||||
// Get the command line args. We shortcut "--version" and "-v" to
|
// Get the command line args. We shortcut "--version" and "-v" to
|
||||||
// just show the version.
|
// just show the version.
|
||||||
|
|
|
@ -60,6 +60,12 @@ func TestHelperProcess(*testing.T) {
|
||||||
log.Printf("[ERR] %s", err)
|
log.Printf("[ERR] %s", err)
|
||||||
os.Exit(1)
|
os.Exit(1)
|
||||||
}
|
}
|
||||||
|
case "resource-provisioner":
|
||||||
|
err := Serve(new(terraform.MockResourceProvisioner))
|
||||||
|
if err != nil {
|
||||||
|
log.Printf("[ERR] %s", err)
|
||||||
|
os.Exit(1)
|
||||||
|
}
|
||||||
case "invalid-rpc-address":
|
case "invalid-rpc-address":
|
||||||
fmt.Println("lolinvalid")
|
fmt.Println("lolinvalid")
|
||||||
case "mock":
|
case "mock":
|
||||||
|
|
|
@ -0,0 +1,35 @@
|
||||||
|
package plugin
|
||||||
|
|
||||||
|
import (
|
||||||
|
"os/exec"
|
||||||
|
|
||||||
|
tfrpc "github.com/hashicorp/terraform/rpc"
|
||||||
|
"github.com/hashicorp/terraform/terraform"
|
||||||
|
)
|
||||||
|
|
||||||
|
// ResourceProvisionerFactory returns a Terraform ResourceProvisionerFactory
|
||||||
|
// that executes a plugin and connects to it.
|
||||||
|
func ResourceProvisionerFactory(cmd *exec.Cmd) terraform.ResourceProvisionerFactory {
|
||||||
|
return func() (terraform.ResourceProvisioner, error) {
|
||||||
|
config := &ClientConfig{
|
||||||
|
Cmd: cmd,
|
||||||
|
Managed: true,
|
||||||
|
}
|
||||||
|
|
||||||
|
client := NewClient(config)
|
||||||
|
rpcClient, err := client.Client()
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
rpcName, err := client.Service()
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
return &tfrpc.ResourceProvisioner{
|
||||||
|
Client: rpcClient,
|
||||||
|
Name: rpcName,
|
||||||
|
}, nil
|
||||||
|
}
|
||||||
|
}
|
|
@ -0,0 +1,23 @@
|
||||||
|
package plugin
|
||||||
|
|
||||||
|
import (
|
||||||
|
"testing"
|
||||||
|
)
|
||||||
|
|
||||||
|
func TestResourceProvisioner(t *testing.T) {
|
||||||
|
c := NewClient(&ClientConfig{Cmd: helperProcess("resource-provisioner")})
|
||||||
|
defer c.Kill()
|
||||||
|
|
||||||
|
_, err := c.Client()
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("should not have error: %s", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
service, err := c.Service()
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("err: %s", err)
|
||||||
|
}
|
||||||
|
if service == "" {
|
||||||
|
t.Fatal("service should not be blank")
|
||||||
|
}
|
||||||
|
}
|
|
@ -0,0 +1,107 @@
|
||||||
|
package rpc
|
||||||
|
|
||||||
|
import (
|
||||||
|
"net/rpc"
|
||||||
|
|
||||||
|
"github.com/hashicorp/terraform/terraform"
|
||||||
|
)
|
||||||
|
|
||||||
|
// ResourceProvisioner is an implementation of terraform.ResourceProvisioner
|
||||||
|
// that communicates over RPC.
|
||||||
|
type ResourceProvisioner struct {
|
||||||
|
Client *rpc.Client
|
||||||
|
Name string
|
||||||
|
}
|
||||||
|
|
||||||
|
func (p *ResourceProvisioner) Validate(c *terraform.ResourceConfig) ([]string, []error) {
|
||||||
|
var resp ResourceProvisionerValidateResponse
|
||||||
|
args := ResourceProvisionerValidateArgs{
|
||||||
|
Config: c,
|
||||||
|
}
|
||||||
|
|
||||||
|
err := p.Client.Call(p.Name+".Validate", &args, &resp)
|
||||||
|
if err != nil {
|
||||||
|
return nil, []error{err}
|
||||||
|
}
|
||||||
|
|
||||||
|
var errs []error
|
||||||
|
if len(resp.Errors) > 0 {
|
||||||
|
errs = make([]error, len(resp.Errors))
|
||||||
|
for i, err := range resp.Errors {
|
||||||
|
errs[i] = err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return resp.Warnings, errs
|
||||||
|
}
|
||||||
|
|
||||||
|
func (p *ResourceProvisioner) Apply(
|
||||||
|
s *terraform.ResourceState,
|
||||||
|
c *terraform.ResourceConfig) (*terraform.ResourceState, error) {
|
||||||
|
var resp ResourceProvisionerApplyResponse
|
||||||
|
args := &ResourceProvisionerApplyArgs{
|
||||||
|
State: s,
|
||||||
|
Config: c,
|
||||||
|
}
|
||||||
|
|
||||||
|
err := p.Client.Call(p.Name+".Apply", args, &resp)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
if resp.Error != nil {
|
||||||
|
err = resp.Error
|
||||||
|
}
|
||||||
|
|
||||||
|
return resp.State, err
|
||||||
|
}
|
||||||
|
|
||||||
|
type ResourceProvisionerValidateArgs struct {
|
||||||
|
Config *terraform.ResourceConfig
|
||||||
|
}
|
||||||
|
|
||||||
|
type ResourceProvisionerValidateResponse struct {
|
||||||
|
Warnings []string
|
||||||
|
Errors []*BasicError
|
||||||
|
}
|
||||||
|
|
||||||
|
type ResourceProvisionerApplyArgs struct {
|
||||||
|
State *terraform.ResourceState
|
||||||
|
Config *terraform.ResourceConfig
|
||||||
|
}
|
||||||
|
|
||||||
|
type ResourceProvisionerApplyResponse struct {
|
||||||
|
State *terraform.ResourceState
|
||||||
|
Error *BasicError
|
||||||
|
}
|
||||||
|
|
||||||
|
// ResourceProvisionerServer is a net/rpc compatible structure for serving
|
||||||
|
// a ResourceProvisioner. This should not be used directly.
|
||||||
|
type ResourceProvisionerServer struct {
|
||||||
|
Provisioner terraform.ResourceProvisioner
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *ResourceProvisionerServer) Apply(
|
||||||
|
args *ResourceProvisionerApplyArgs,
|
||||||
|
result *ResourceProvisionerApplyResponse) error {
|
||||||
|
state, err := s.Provisioner.Apply(args.State, args.Config)
|
||||||
|
*result = ResourceProvisionerApplyResponse{
|
||||||
|
State: state,
|
||||||
|
Error: NewBasicError(err),
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *ResourceProvisionerServer) Validate(
|
||||||
|
args *ResourceProvisionerValidateArgs,
|
||||||
|
reply *ResourceProvisionerValidateResponse) error {
|
||||||
|
warns, errs := s.Provisioner.Validate(args.Config)
|
||||||
|
berrs := make([]*BasicError, len(errs))
|
||||||
|
for i, err := range errs {
|
||||||
|
berrs[i] = NewBasicError(err)
|
||||||
|
}
|
||||||
|
*reply = ResourceProvisionerValidateResponse{
|
||||||
|
Warnings: warns,
|
||||||
|
Errors: berrs,
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
|
@ -0,0 +1,138 @@
|
||||||
|
package rpc
|
||||||
|
|
||||||
|
import (
|
||||||
|
"errors"
|
||||||
|
"reflect"
|
||||||
|
"testing"
|
||||||
|
|
||||||
|
"github.com/hashicorp/terraform/terraform"
|
||||||
|
)
|
||||||
|
|
||||||
|
func TestResourceProvisioner_impl(t *testing.T) {
|
||||||
|
var _ terraform.ResourceProvisioner = new(ResourceProvisioner)
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestResourceProvisioner_apply(t *testing.T) {
|
||||||
|
p := new(terraform.MockResourceProvisioner)
|
||||||
|
client, server := testClientServer(t)
|
||||||
|
name, err := Register(server, p)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("err: %s", err)
|
||||||
|
}
|
||||||
|
provisioner := &ResourceProvisioner{Client: client, Name: name}
|
||||||
|
|
||||||
|
p.ApplyReturn = &terraform.ResourceState{
|
||||||
|
ID: "bob",
|
||||||
|
}
|
||||||
|
|
||||||
|
// Apply
|
||||||
|
state := &terraform.ResourceState{}
|
||||||
|
conf := &terraform.ResourceConfig{}
|
||||||
|
newState, err := provisioner.Apply(state, conf)
|
||||||
|
if !p.ApplyCalled {
|
||||||
|
t.Fatal("apply should be called")
|
||||||
|
}
|
||||||
|
if !reflect.DeepEqual(p.ApplyConfig, conf) {
|
||||||
|
t.Fatalf("bad: %#v", p.ApplyConfig)
|
||||||
|
}
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("bad: %#v", err)
|
||||||
|
}
|
||||||
|
if !reflect.DeepEqual(p.ApplyReturn, newState) {
|
||||||
|
t.Fatalf("bad: %#v", newState)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestResourceProvisioner_validate(t *testing.T) {
|
||||||
|
p := new(terraform.MockResourceProvisioner)
|
||||||
|
client, server := testClientServer(t)
|
||||||
|
name, err := Register(server, p)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("err: %s", err)
|
||||||
|
}
|
||||||
|
provisioner := &ResourceProvisioner{Client: client, Name: name}
|
||||||
|
|
||||||
|
// Configure
|
||||||
|
config := &terraform.ResourceConfig{
|
||||||
|
Raw: map[string]interface{}{"foo": "bar"},
|
||||||
|
}
|
||||||
|
w, e := provisioner.Validate(config)
|
||||||
|
if !p.ValidateCalled {
|
||||||
|
t.Fatal("configure should be called")
|
||||||
|
}
|
||||||
|
if !reflect.DeepEqual(p.ValidateConfig, config) {
|
||||||
|
t.Fatalf("bad: %#v", p.ValidateConfig)
|
||||||
|
}
|
||||||
|
if w != nil {
|
||||||
|
t.Fatalf("bad: %#v", w)
|
||||||
|
}
|
||||||
|
if e != nil {
|
||||||
|
t.Fatalf("bad: %#v", e)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestResourceProvisioner_validate_errors(t *testing.T) {
|
||||||
|
p := new(terraform.MockResourceProvisioner)
|
||||||
|
p.ValidateReturnErrors = []error{errors.New("foo")}
|
||||||
|
|
||||||
|
client, server := testClientServer(t)
|
||||||
|
name, err := Register(server, p)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("err: %s", err)
|
||||||
|
}
|
||||||
|
provisioner := &ResourceProvisioner{Client: client, Name: name}
|
||||||
|
|
||||||
|
// Configure
|
||||||
|
config := &terraform.ResourceConfig{
|
||||||
|
Raw: map[string]interface{}{"foo": "bar"},
|
||||||
|
}
|
||||||
|
w, e := provisioner.Validate(config)
|
||||||
|
if !p.ValidateCalled {
|
||||||
|
t.Fatal("configure should be called")
|
||||||
|
}
|
||||||
|
if !reflect.DeepEqual(p.ValidateConfig, config) {
|
||||||
|
t.Fatalf("bad: %#v", p.ValidateConfig)
|
||||||
|
}
|
||||||
|
if w != nil {
|
||||||
|
t.Fatalf("bad: %#v", w)
|
||||||
|
}
|
||||||
|
|
||||||
|
if len(e) != 1 {
|
||||||
|
t.Fatalf("bad: %#v", e)
|
||||||
|
}
|
||||||
|
if e[0].Error() != "foo" {
|
||||||
|
t.Fatalf("bad: %#v", e)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestResourceProvisioner_validate_warns(t *testing.T) {
|
||||||
|
p := new(terraform.MockResourceProvisioner)
|
||||||
|
p.ValidateReturnWarns = []string{"foo"}
|
||||||
|
|
||||||
|
client, server := testClientServer(t)
|
||||||
|
name, err := Register(server, p)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("err: %s", err)
|
||||||
|
}
|
||||||
|
provisioner := &ResourceProvisioner{Client: client, Name: name}
|
||||||
|
|
||||||
|
// Configure
|
||||||
|
config := &terraform.ResourceConfig{
|
||||||
|
Raw: map[string]interface{}{"foo": "bar"},
|
||||||
|
}
|
||||||
|
w, e := provisioner.Validate(config)
|
||||||
|
if !p.ValidateCalled {
|
||||||
|
t.Fatal("configure should be called")
|
||||||
|
}
|
||||||
|
if !reflect.DeepEqual(p.ValidateConfig, config) {
|
||||||
|
t.Fatalf("bad: %#v", p.ValidateConfig)
|
||||||
|
}
|
||||||
|
if e != nil {
|
||||||
|
t.Fatalf("bad: %#v", e)
|
||||||
|
}
|
||||||
|
|
||||||
|
expected := []string{"foo"}
|
||||||
|
if !reflect.DeepEqual(w, expected) {
|
||||||
|
t.Fatalf("bad: %#v", w)
|
||||||
|
}
|
||||||
|
}
|
|
@ -23,6 +23,9 @@ func Register(server *rpc.Server, thing interface{}) (name string, err error) {
|
||||||
case terraform.ResourceProvider:
|
case terraform.ResourceProvider:
|
||||||
name = fmt.Sprintf("Terraform%d", nextId)
|
name = fmt.Sprintf("Terraform%d", nextId)
|
||||||
err = server.RegisterName(name, &ResourceProviderServer{Provider: t})
|
err = server.RegisterName(name, &ResourceProviderServer{Provider: t})
|
||||||
|
case terraform.ResourceProvisioner:
|
||||||
|
name = fmt.Sprintf("Terraform%d", nextId)
|
||||||
|
err = server.RegisterName(name, &ResourceProvisionerServer{Provisioner: t})
|
||||||
default:
|
default:
|
||||||
return "", errors.New("Unknown type to register for RPC server.")
|
return "", errors.New("Unknown type to register for RPC server.")
|
||||||
}
|
}
|
||||||
|
|
|
@ -27,6 +27,7 @@ type Context struct {
|
||||||
hooks []Hook
|
hooks []Hook
|
||||||
state *State
|
state *State
|
||||||
providers map[string]ResourceProviderFactory
|
providers map[string]ResourceProviderFactory
|
||||||
|
provisioners map[string]ResourceProvisionerFactory
|
||||||
variables map[string]string
|
variables map[string]string
|
||||||
|
|
||||||
l sync.Mutex // Lock acquired during any task
|
l sync.Mutex // Lock acquired during any task
|
||||||
|
@ -45,6 +46,7 @@ type ContextOpts struct {
|
||||||
Parallelism int
|
Parallelism int
|
||||||
State *State
|
State *State
|
||||||
Providers map[string]ResourceProviderFactory
|
Providers map[string]ResourceProviderFactory
|
||||||
|
Provisioners map[string]ResourceProvisionerFactory
|
||||||
Variables map[string]string
|
Variables map[string]string
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -75,6 +77,7 @@ func NewContext(opts *ContextOpts) *Context {
|
||||||
hooks: hooks,
|
hooks: hooks,
|
||||||
state: opts.State,
|
state: opts.State,
|
||||||
providers: opts.Providers,
|
providers: opts.Providers,
|
||||||
|
provisioners: opts.Provisioners,
|
||||||
variables: opts.Variables,
|
variables: opts.Variables,
|
||||||
|
|
||||||
parCh: parCh,
|
parCh: parCh,
|
||||||
|
@ -95,6 +98,7 @@ func (c *Context) Apply() (*State, error) {
|
||||||
Config: c.config,
|
Config: c.config,
|
||||||
Diff: c.diff,
|
Diff: c.diff,
|
||||||
Providers: c.providers,
|
Providers: c.providers,
|
||||||
|
Provisioners: c.provisioners,
|
||||||
State: c.state,
|
State: c.state,
|
||||||
})
|
})
|
||||||
if err != nil {
|
if err != nil {
|
||||||
|
@ -137,6 +141,7 @@ func (c *Context) Plan(opts *PlanOpts) (*Plan, error) {
|
||||||
g, err := Graph(&GraphOpts{
|
g, err := Graph(&GraphOpts{
|
||||||
Config: c.config,
|
Config: c.config,
|
||||||
Providers: c.providers,
|
Providers: c.providers,
|
||||||
|
Provisioners: c.provisioners,
|
||||||
State: c.state,
|
State: c.state,
|
||||||
})
|
})
|
||||||
if err != nil {
|
if err != nil {
|
||||||
|
@ -190,6 +195,7 @@ func (c *Context) Refresh() (*State, error) {
|
||||||
g, err := Graph(&GraphOpts{
|
g, err := Graph(&GraphOpts{
|
||||||
Config: c.config,
|
Config: c.config,
|
||||||
Providers: c.providers,
|
Providers: c.providers,
|
||||||
|
Provisioners: c.provisioners,
|
||||||
State: c.state,
|
State: c.state,
|
||||||
})
|
})
|
||||||
if err != nil {
|
if err != nil {
|
||||||
|
@ -392,6 +398,7 @@ func (c *Context) graph() (*depgraph.Graph, error) {
|
||||||
Config: c.config,
|
Config: c.config,
|
||||||
Diff: c.diff,
|
Diff: c.diff,
|
||||||
Providers: c.providers,
|
Providers: c.providers,
|
||||||
|
Provisioners: c.provisioners,
|
||||||
State: c.state,
|
State: c.state,
|
||||||
})
|
})
|
||||||
}
|
}
|
||||||
|
@ -485,6 +492,16 @@ func (c *Context) applyWalkFn() depgraph.WalkFunc {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// Invoke any provisioners we have defined. This is only done
|
||||||
|
// if the resource was created, as updates or deletes do not
|
||||||
|
// invoke provisioners.
|
||||||
|
if r.State.ID == "" && len(r.Provisioners) > 0 {
|
||||||
|
rs, err = c.applyProvisioners(r, rs)
|
||||||
|
if err != nil {
|
||||||
|
errs = append(errs, err)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
// Update the resulting diff
|
// Update the resulting diff
|
||||||
c.sl.Lock()
|
c.sl.Lock()
|
||||||
if rs.ID == "" {
|
if rs.ID == "" {
|
||||||
|
@ -513,6 +530,26 @@ func (c *Context) applyWalkFn() depgraph.WalkFunc {
|
||||||
return c.genericWalkFn(cb)
|
return c.genericWalkFn(cb)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// applyProvisioners is used to run any provisioners a resource has
|
||||||
|
// defined after the resource creation has already completed.
|
||||||
|
func (c *Context) applyProvisioners(r *Resource, rs *ResourceState) (*ResourceState, error) {
|
||||||
|
var err error
|
||||||
|
for _, prov := range r.Provisioners {
|
||||||
|
// Interpolate since we may have variables that depend on the
|
||||||
|
// local resource.
|
||||||
|
if err := prov.Config.interpolate(c); err != nil {
|
||||||
|
return rs, err
|
||||||
|
}
|
||||||
|
|
||||||
|
// Invoke the Provisioner
|
||||||
|
rs, err = prov.Provisioner.Apply(rs, prov.Config)
|
||||||
|
if err != nil {
|
||||||
|
return rs, err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return rs, nil
|
||||||
|
}
|
||||||
|
|
||||||
func (c *Context) planWalkFn(result *Plan) depgraph.WalkFunc {
|
func (c *Context) planWalkFn(result *Plan) depgraph.WalkFunc {
|
||||||
var l sync.Mutex
|
var l sync.Mutex
|
||||||
|
|
||||||
|
@ -682,9 +719,21 @@ func (c *Context) validateWalkFn(rws *[]string, res *[]error) depgraph.WalkFunc
|
||||||
for i, e := range es {
|
for i, e := range es {
|
||||||
es[i] = fmt.Errorf("'%s' error: %s", rn.Resource.Id, e)
|
es[i] = fmt.Errorf("'%s' error: %s", rn.Resource.Id, e)
|
||||||
}
|
}
|
||||||
|
|
||||||
*rws = append(*rws, ws...)
|
*rws = append(*rws, ws...)
|
||||||
*res = append(*res, es...)
|
*res = append(*res, es...)
|
||||||
|
|
||||||
|
for idx, p := range rn.Resource.Provisioners {
|
||||||
|
ws, es := p.Provisioner.Validate(p.Config)
|
||||||
|
for i, w := range ws {
|
||||||
|
ws[i] = fmt.Sprintf("'%s.provisioner.%d' warning: %s", rn.Resource.Id, idx, w)
|
||||||
|
}
|
||||||
|
for i, e := range es {
|
||||||
|
es[i] = fmt.Errorf("'%s.provisioner.%d' error: %s", rn.Resource.Id, idx, e)
|
||||||
|
}
|
||||||
|
*rws = append(*rws, ws...)
|
||||||
|
*res = append(*res, es...)
|
||||||
|
}
|
||||||
|
|
||||||
case *GraphNodeResourceProvider:
|
case *GraphNodeResourceProvider:
|
||||||
if rn.Config == nil {
|
if rn.Config == nil {
|
||||||
return nil
|
return nil
|
||||||
|
|
|
@ -132,6 +132,60 @@ func TestContextValidate_requiredVar(t *testing.T) {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func TestContextValidate_provisionerConfig_bad(t *testing.T) {
|
||||||
|
config := testConfig(t, "validate-bad-prov-conf")
|
||||||
|
p := testProvider("aws")
|
||||||
|
pr := testProvisioner()
|
||||||
|
c := testContext(t, &ContextOpts{
|
||||||
|
Config: config,
|
||||||
|
Providers: map[string]ResourceProviderFactory{
|
||||||
|
"aws": testProviderFuncFixed(p),
|
||||||
|
},
|
||||||
|
Provisioners: map[string]ResourceProvisionerFactory{
|
||||||
|
"shell": testProvisionerFuncFixed(pr),
|
||||||
|
},
|
||||||
|
})
|
||||||
|
|
||||||
|
pr.ValidateReturnErrors = []error{fmt.Errorf("bad")}
|
||||||
|
|
||||||
|
w, e := c.Validate()
|
||||||
|
if len(w) > 0 {
|
||||||
|
t.Fatalf("bad: %#v", w)
|
||||||
|
}
|
||||||
|
if len(e) == 0 {
|
||||||
|
t.Fatalf("bad: %#v", e)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestContextValidate_provisionerConfig_good(t *testing.T) {
|
||||||
|
config := testConfig(t, "validate-bad-prov-conf")
|
||||||
|
p := testProvider("aws")
|
||||||
|
pr := testProvisioner()
|
||||||
|
pr.ValidateFn = func(c *ResourceConfig) ([]string, []error) {
|
||||||
|
if c == nil {
|
||||||
|
t.Fatalf("missing resource config for provisioner")
|
||||||
|
}
|
||||||
|
return nil, nil
|
||||||
|
}
|
||||||
|
c := testContext(t, &ContextOpts{
|
||||||
|
Config: config,
|
||||||
|
Providers: map[string]ResourceProviderFactory{
|
||||||
|
"aws": testProviderFuncFixed(p),
|
||||||
|
},
|
||||||
|
Provisioners: map[string]ResourceProvisionerFactory{
|
||||||
|
"shell": testProvisionerFuncFixed(pr),
|
||||||
|
},
|
||||||
|
})
|
||||||
|
|
||||||
|
w, e := c.Validate()
|
||||||
|
if len(w) > 0 {
|
||||||
|
t.Fatalf("bad: %#v", w)
|
||||||
|
}
|
||||||
|
if len(e) > 0 {
|
||||||
|
t.Fatalf("bad: %#v", e)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
func TestContextApply(t *testing.T) {
|
func TestContextApply(t *testing.T) {
|
||||||
c := testConfig(t, "apply-good")
|
c := testConfig(t, "apply-good")
|
||||||
p := testProvider("aws")
|
p := testProvider("aws")
|
||||||
|
@ -291,6 +345,53 @@ func TestContextApply_compute(t *testing.T) {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func TestContextApply_Provisioner_compute(t *testing.T) {
|
||||||
|
c := testConfig(t, "apply-provisioner-compute")
|
||||||
|
p := testProvider("aws")
|
||||||
|
pr := testProvisioner()
|
||||||
|
p.ApplyFn = testApplyFn
|
||||||
|
p.DiffFn = testDiffFn
|
||||||
|
pr.ApplyFn = func(rs *ResourceState, c *ResourceConfig) (*ResourceState, error) {
|
||||||
|
val, ok := c.Config["foo"]
|
||||||
|
if !ok || val != "computed_dynamical" {
|
||||||
|
t.Fatalf("bad value for foo: %v %#v", val, c)
|
||||||
|
}
|
||||||
|
return rs, nil
|
||||||
|
}
|
||||||
|
ctx := testContext(t, &ContextOpts{
|
||||||
|
Config: c,
|
||||||
|
Providers: map[string]ResourceProviderFactory{
|
||||||
|
"aws": testProviderFuncFixed(p),
|
||||||
|
},
|
||||||
|
Provisioners: map[string]ResourceProvisionerFactory{
|
||||||
|
"shell": testProvisionerFuncFixed(pr),
|
||||||
|
},
|
||||||
|
Variables: map[string]string{
|
||||||
|
"value": "1",
|
||||||
|
},
|
||||||
|
})
|
||||||
|
|
||||||
|
if _, err := ctx.Plan(nil); err != nil {
|
||||||
|
t.Fatalf("err: %s", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
state, err := ctx.Apply()
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("err: %s", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
actual := strings.TrimSpace(state.String())
|
||||||
|
expected := strings.TrimSpace(testTerraformApplyProvisionerStr)
|
||||||
|
if actual != expected {
|
||||||
|
t.Fatalf("bad: \n%s", actual)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Verify apply was invoked
|
||||||
|
if !pr.ApplyCalled {
|
||||||
|
t.Fatalf("provisioner not invoked")
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
func TestContextApply_destroy(t *testing.T) {
|
func TestContextApply_destroy(t *testing.T) {
|
||||||
c := testConfig(t, "apply-destroy")
|
c := testConfig(t, "apply-destroy")
|
||||||
h := new(HookRecordApplyOrder)
|
h := new(HookRecordApplyOrder)
|
||||||
|
@ -1406,3 +1507,8 @@ func testProvider(prefix string) *MockResourceProvider {
|
||||||
|
|
||||||
return p
|
return p
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func testProvisioner() *MockResourceProvisioner {
|
||||||
|
p := new(MockResourceProvisioner)
|
||||||
|
return p
|
||||||
|
}
|
||||||
|
|
|
@ -39,6 +39,10 @@ type GraphOpts struct {
|
||||||
// This will also potentially insert new nodes into the graph for
|
// This will also potentially insert new nodes into the graph for
|
||||||
// the configuration of resource providers.
|
// the configuration of resource providers.
|
||||||
Providers map[string]ResourceProviderFactory
|
Providers map[string]ResourceProviderFactory
|
||||||
|
|
||||||
|
// Provisioners is a mapping of names to a resource provisioner.
|
||||||
|
// These must be provided to support resource provisioners.
|
||||||
|
Provisioners map[string]ResourceProvisionerFactory
|
||||||
}
|
}
|
||||||
|
|
||||||
// GraphRootNode is the name of the root node in the Terraform resource
|
// GraphRootNode is the name of the root node in the Terraform resource
|
||||||
|
@ -110,6 +114,12 @@ func Graph(opts *GraphOpts) (*depgraph.Graph, error) {
|
||||||
// Map the provider configurations to all of the resources
|
// Map the provider configurations to all of the resources
|
||||||
graphAddProviderConfigs(g, opts.Config)
|
graphAddProviderConfigs(g, opts.Config)
|
||||||
|
|
||||||
|
// Setup the provisioners. These may have variable dependencies,
|
||||||
|
// and must be done before dependency setup
|
||||||
|
if err := graphMapResourceProvisioners(g, opts.Provisioners); err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
// Add all the variable dependencies
|
// Add all the variable dependencies
|
||||||
graphAddVariableDeps(g)
|
graphAddVariableDeps(g)
|
||||||
|
|
||||||
|
@ -523,15 +533,34 @@ func graphAddVariableDeps(g *depgraph.Graph) {
|
||||||
var vars map[string]config.InterpolatedVariable
|
var vars map[string]config.InterpolatedVariable
|
||||||
switch m := n.Meta.(type) {
|
switch m := n.Meta.(type) {
|
||||||
case *GraphNodeResource:
|
case *GraphNodeResource:
|
||||||
if !m.Orphan {
|
// Ignore orphan nodes
|
||||||
vars = m.Config.RawConfig.Variables
|
if m.Orphan {
|
||||||
}
|
|
||||||
case *GraphNodeResourceProvider:
|
|
||||||
vars = m.Config.RawConfig.Variables
|
|
||||||
default:
|
|
||||||
continue
|
continue
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// Handle the resource variables
|
||||||
|
vars = m.Config.RawConfig.Variables
|
||||||
|
nounAddVariableDeps(g, n, vars)
|
||||||
|
|
||||||
|
// Handle the variables of the resource provisioners
|
||||||
|
for _, p := range m.Resource.Provisioners {
|
||||||
|
vars = p.RawConfig.Variables
|
||||||
|
nounAddVariableDeps(g, n, vars)
|
||||||
|
}
|
||||||
|
|
||||||
|
case *GraphNodeResourceProvider:
|
||||||
|
vars = m.Config.RawConfig.Variables
|
||||||
|
nounAddVariableDeps(g, n, vars)
|
||||||
|
|
||||||
|
default:
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// nounAddVariableDeps updates the dependencies of a noun given
|
||||||
|
// a set of associated variable values
|
||||||
|
func nounAddVariableDeps(g *depgraph.Graph, n *depgraph.Noun, vars map[string]config.InterpolatedVariable) {
|
||||||
for _, v := range vars {
|
for _, v := range vars {
|
||||||
// Only resource variables impose dependencies
|
// Only resource variables impose dependencies
|
||||||
rv, ok := v.(*config.ResourceVariable)
|
rv, ok := v.(*config.ResourceVariable)
|
||||||
|
@ -555,7 +584,6 @@ func graphAddVariableDeps(g *depgraph.Graph) {
|
||||||
n.Deps = append(n.Deps, dep)
|
n.Deps = append(n.Deps, dep)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
|
||||||
|
|
||||||
// graphInitResourceProviders maps the resource providers onto the graph
|
// graphInitResourceProviders maps the resource providers onto the graph
|
||||||
// given a mapping of prefixes to resource providers.
|
// given a mapping of prefixes to resource providers.
|
||||||
|
@ -691,6 +719,71 @@ func graphMapResourceProviders(g *depgraph.Graph) error {
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// graphMapResourceProvisioners takes a graph that already has
|
||||||
|
// the resources and maps the resource provisioners to the resources themselves.
|
||||||
|
func graphMapResourceProvisioners(g *depgraph.Graph,
|
||||||
|
provisioners map[string]ResourceProvisionerFactory) error {
|
||||||
|
var errs []error
|
||||||
|
|
||||||
|
// Create a cache of resource provisioners, avoids duplicate
|
||||||
|
// initialization of the instances
|
||||||
|
cache := make(map[string]ResourceProvisioner)
|
||||||
|
|
||||||
|
// Go through each of the resources and find a matching provisioners
|
||||||
|
for _, n := range g.Nouns {
|
||||||
|
rn, ok := n.Meta.(*GraphNodeResource)
|
||||||
|
if !ok {
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
|
||||||
|
// Ignore orphan nodes with no provisioners
|
||||||
|
if rn.Config == nil {
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
|
||||||
|
// Check each provisioner
|
||||||
|
for _, p := range rn.Config.Provisioners {
|
||||||
|
// Check for a cached provisioner
|
||||||
|
provisioner, ok := cache[p.Type]
|
||||||
|
if !ok {
|
||||||
|
// Lookup the factory method
|
||||||
|
factory, ok := provisioners[p.Type]
|
||||||
|
if !ok {
|
||||||
|
errs = append(errs, fmt.Errorf(
|
||||||
|
"Resource provisioner not found for provisioner type '%s'",
|
||||||
|
p.Type))
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
|
||||||
|
// Initialize the provisioner
|
||||||
|
prov, err := factory()
|
||||||
|
if err != nil {
|
||||||
|
errs = append(errs, fmt.Errorf(
|
||||||
|
"Failed to instantiate provisioner type '%s': %v",
|
||||||
|
p.Type, err))
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
provisioner = prov
|
||||||
|
|
||||||
|
// Cache this type of provisioner
|
||||||
|
cache[p.Type] = prov
|
||||||
|
}
|
||||||
|
|
||||||
|
// Save the provisioner
|
||||||
|
rn.Resource.Provisioners = append(rn.Resource.Provisioners, &ResourceProvisionerConfig{
|
||||||
|
Provisioner: provisioner,
|
||||||
|
Config: NewResourceConfig(p.RawConfig),
|
||||||
|
RawConfig: p.RawConfig,
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if len(errs) > 0 {
|
||||||
|
return &multierror.Error{Errors: errs}
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
// matchingPrefixes takes a resource type and a set of resource
|
// matchingPrefixes takes a resource type and a set of resource
|
||||||
// providers we know about by prefix and returns a list of prefixes
|
// providers we know about by prefix and returns a list of prefixes
|
||||||
// that might be valid for that resource.
|
// that might be valid for that resource.
|
||||||
|
|
|
@ -128,6 +128,80 @@ func TestGraphFull(t *testing.T) {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func TestGraphProvisioners(t *testing.T) {
|
||||||
|
rpAws := new(MockResourceProvider)
|
||||||
|
provShell := new(MockResourceProvisioner)
|
||||||
|
provWinRM := new(MockResourceProvisioner)
|
||||||
|
|
||||||
|
rpAws.ResourcesReturn = []ResourceType{
|
||||||
|
ResourceType{Name: "aws_instance"},
|
||||||
|
ResourceType{Name: "aws_load_balancer"},
|
||||||
|
ResourceType{Name: "aws_security_group"},
|
||||||
|
}
|
||||||
|
|
||||||
|
ps := map[string]ResourceProvisionerFactory{
|
||||||
|
"shell": testProvisionerFuncFixed(provShell),
|
||||||
|
"winrm": testProvisionerFuncFixed(provWinRM),
|
||||||
|
}
|
||||||
|
|
||||||
|
pf := map[string]ResourceProviderFactory{
|
||||||
|
"aws": testProviderFuncFixed(rpAws),
|
||||||
|
}
|
||||||
|
|
||||||
|
c := testConfig(t, "graph-provisioners")
|
||||||
|
g, err := Graph(&GraphOpts{Config: c, Providers: pf, Provisioners: ps})
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("err: %s", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
// A helper to help get us the provider for a resource.
|
||||||
|
graphProvisioner := func(n string, idx int) *ResourceProvisionerConfig {
|
||||||
|
return g.Noun(n).Meta.(*GraphNodeResource).Resource.Provisioners[idx]
|
||||||
|
}
|
||||||
|
|
||||||
|
// A helper to verify depedencies
|
||||||
|
depends := func(a, b string) bool {
|
||||||
|
aNoun := g.Noun(a)
|
||||||
|
bNoun := g.Noun(b)
|
||||||
|
for _, dep := range aNoun.Deps {
|
||||||
|
if dep.Source == aNoun && dep.Target == bNoun {
|
||||||
|
return true
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
|
||||||
|
// Test a couple
|
||||||
|
prov := graphProvisioner("aws_instance.web", 0)
|
||||||
|
if prov.Provisioner != provWinRM {
|
||||||
|
t.Fatalf("bad: %#v", prov)
|
||||||
|
}
|
||||||
|
if prov.RawConfig.Config()["cmd"] != "echo foo" {
|
||||||
|
t.Fatalf("bad: %#v", prov)
|
||||||
|
}
|
||||||
|
|
||||||
|
prov = graphProvisioner("aws_instance.web", 1)
|
||||||
|
if prov.Provisioner != provWinRM {
|
||||||
|
t.Fatalf("bad: %#v", prov)
|
||||||
|
}
|
||||||
|
if prov.RawConfig.Config()["cmd"] != "echo bar" {
|
||||||
|
t.Fatalf("bad: %#v", prov)
|
||||||
|
}
|
||||||
|
|
||||||
|
prov = graphProvisioner("aws_load_balancer.weblb", 0)
|
||||||
|
if prov.Provisioner != provShell {
|
||||||
|
t.Fatalf("bad: %#v", prov)
|
||||||
|
}
|
||||||
|
if prov.RawConfig.Config()["cmd"] != "add ${aws_instance.web.id}" {
|
||||||
|
t.Fatalf("bad: %#v", prov)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Check that the variable dependency is handled
|
||||||
|
if !depends("aws_load_balancer.weblb", "aws_instance.web") {
|
||||||
|
t.Fatalf("missing dependency from provisioner variable")
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
func TestGraphAddDiff(t *testing.T) {
|
func TestGraphAddDiff(t *testing.T) {
|
||||||
config := testConfig(t, "graph-diff")
|
config := testConfig(t, "graph-diff")
|
||||||
diff := &Diff{
|
diff := &Diff{
|
||||||
|
|
|
@ -9,6 +9,17 @@ import (
|
||||||
"github.com/hashicorp/terraform/config"
|
"github.com/hashicorp/terraform/config"
|
||||||
)
|
)
|
||||||
|
|
||||||
|
// ResourceProvisionerConfig is used to pair a provisioner
|
||||||
|
// with it's provided configuration. This allows us to use singleton
|
||||||
|
// instances of each ResourceProvisioner and to keep the relevant
|
||||||
|
// configuration instead of instantiating a new Provisioner for each
|
||||||
|
// resource.
|
||||||
|
type ResourceProvisionerConfig struct {
|
||||||
|
Provisioner ResourceProvisioner
|
||||||
|
Config *ResourceConfig
|
||||||
|
RawConfig *config.RawConfig
|
||||||
|
}
|
||||||
|
|
||||||
// Resource encapsulates a resource, its configuration, its provider,
|
// Resource encapsulates a resource, its configuration, its provider,
|
||||||
// its current state, and potentially a desired diff from the state it
|
// its current state, and potentially a desired diff from the state it
|
||||||
// wants to reach.
|
// wants to reach.
|
||||||
|
@ -18,6 +29,7 @@ type Resource struct {
|
||||||
Diff *ResourceDiff
|
Diff *ResourceDiff
|
||||||
Provider ResourceProvider
|
Provider ResourceProvider
|
||||||
State *ResourceState
|
State *ResourceState
|
||||||
|
Provisioners []*ResourceProvisionerConfig
|
||||||
}
|
}
|
||||||
|
|
||||||
// Vars returns the mapping of variables that should be replaced in
|
// Vars returns the mapping of variables that should be replaced in
|
||||||
|
|
|
@ -0,0 +1,28 @@
|
||||||
|
package terraform
|
||||||
|
|
||||||
|
// ResourceProvisioner is an interface that must be implemented by any
|
||||||
|
// resource provisioner: the thing that initializes resources in
|
||||||
|
// a Terraform configuration.
|
||||||
|
type ResourceProvisioner interface {
|
||||||
|
// Validate is called once at the beginning with the raw
|
||||||
|
// configuration (no interpolation done) and can return a list of warnings
|
||||||
|
// and/or errors.
|
||||||
|
//
|
||||||
|
// This is called once per resource.
|
||||||
|
//
|
||||||
|
// This should not assume any of the values in the resource configuration
|
||||||
|
// are valid since it is possible they have to be interpolated still.
|
||||||
|
// The primary use case of this call is to check that the required keys
|
||||||
|
// are set and that the general structure is correct.
|
||||||
|
Validate(*ResourceConfig) ([]string, []error)
|
||||||
|
|
||||||
|
// Apply runs the provisioner on a specific resource and returns the new
|
||||||
|
// resource state along with an error. Instead of a diff, the ResourceConfig
|
||||||
|
// is provided since provisioners only run after a resource has been
|
||||||
|
// newly created.
|
||||||
|
Apply(*ResourceState, *ResourceConfig) (*ResourceState, error)
|
||||||
|
}
|
||||||
|
|
||||||
|
// ResourceProvisionerFactory is a function type that creates a new instance
|
||||||
|
// of a resource provisioner.
|
||||||
|
type ResourceProvisionerFactory func() (ResourceProvisioner, error)
|
|
@ -0,0 +1,40 @@
|
||||||
|
package terraform
|
||||||
|
|
||||||
|
// MockResourceProvisioner implements ResourceProvisioner but mocks out all the
|
||||||
|
// calls for testing purposes.
|
||||||
|
type MockResourceProvisioner struct {
|
||||||
|
// Anything you want, in case you need to store extra data with the mock.
|
||||||
|
Meta interface{}
|
||||||
|
|
||||||
|
ApplyCalled bool
|
||||||
|
ApplyState *ResourceState
|
||||||
|
ApplyConfig *ResourceConfig
|
||||||
|
ApplyFn func(*ResourceState, *ResourceConfig) (*ResourceState, error)
|
||||||
|
ApplyReturn *ResourceState
|
||||||
|
ApplyReturnError error
|
||||||
|
|
||||||
|
ValidateCalled bool
|
||||||
|
ValidateConfig *ResourceConfig
|
||||||
|
ValidateFn func(c *ResourceConfig) ([]string, []error)
|
||||||
|
ValidateReturnWarns []string
|
||||||
|
ValidateReturnErrors []error
|
||||||
|
}
|
||||||
|
|
||||||
|
func (p *MockResourceProvisioner) Validate(c *ResourceConfig) ([]string, []error) {
|
||||||
|
p.ValidateCalled = true
|
||||||
|
p.ValidateConfig = c
|
||||||
|
if p.ValidateFn != nil {
|
||||||
|
return p.ValidateFn(c)
|
||||||
|
}
|
||||||
|
return p.ValidateReturnWarns, p.ValidateReturnErrors
|
||||||
|
}
|
||||||
|
|
||||||
|
func (p *MockResourceProvisioner) Apply(state *ResourceState, c *ResourceConfig) (*ResourceState, error) {
|
||||||
|
p.ApplyCalled = true
|
||||||
|
p.ApplyState = state
|
||||||
|
p.ApplyConfig = c
|
||||||
|
if p.ApplyFn != nil {
|
||||||
|
return p.ApplyFn(state, c)
|
||||||
|
}
|
||||||
|
return p.ApplyReturn, p.ApplyReturnError
|
||||||
|
}
|
|
@ -0,0 +1,9 @@
|
||||||
|
package terraform
|
||||||
|
|
||||||
|
import (
|
||||||
|
"testing"
|
||||||
|
)
|
||||||
|
|
||||||
|
func TestMockResourceProvisioner_impl(t *testing.T) {
|
||||||
|
var _ ResourceProvisioner = new(MockResourceProvisioner)
|
||||||
|
}
|
|
@ -131,6 +131,21 @@ func (s *State) String() string {
|
||||||
return buf.String()
|
return buf.String()
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// sensitiveState is used to store sensitive state information
|
||||||
|
// that should not be serialized. This is only used temporarily
|
||||||
|
// and is restored into the state.
|
||||||
|
type sensitiveState struct {
|
||||||
|
ConnInfo map[string]*ResourceConnectionInfo
|
||||||
|
|
||||||
|
once sync.Once
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *sensitiveState) init() {
|
||||||
|
s.once.Do(func() {
|
||||||
|
s.ConnInfo = make(map[string]*ResourceConnectionInfo)
|
||||||
|
})
|
||||||
|
}
|
||||||
|
|
||||||
// The format byte is prefixed into the state file format so that we have
|
// The format byte is prefixed into the state file format so that we have
|
||||||
// the ability in the future to change the file format if we want for any
|
// the ability in the future to change the file format if we want for any
|
||||||
// reason.
|
// reason.
|
||||||
|
@ -172,7 +187,40 @@ func WriteState(d *State, dst io.Writer) error {
|
||||||
return errors.New("failed to write state version byte")
|
return errors.New("failed to write state version byte")
|
||||||
}
|
}
|
||||||
|
|
||||||
return gob.NewEncoder(dst).Encode(d)
|
// Prevent sensitive information from being serialized
|
||||||
|
sensitive := &sensitiveState{}
|
||||||
|
sensitive.init()
|
||||||
|
for name, r := range d.Resources {
|
||||||
|
if r.ConnInfo != nil {
|
||||||
|
sensitive.ConnInfo[name] = r.ConnInfo
|
||||||
|
r.ConnInfo = nil
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// Serialize the state
|
||||||
|
err = gob.NewEncoder(dst).Encode(d)
|
||||||
|
|
||||||
|
// Restore the state
|
||||||
|
for name, info := range sensitive.ConnInfo {
|
||||||
|
d.Resources[name].ConnInfo = info
|
||||||
|
}
|
||||||
|
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
// ResourceConnectionInfo holds addresses, credentials and configuration
|
||||||
|
// information require to connect to a resource. This is populated
|
||||||
|
// by a provider so that provisioners can connect and run on the
|
||||||
|
// resource.
|
||||||
|
type ResourceConnectionInfo struct {
|
||||||
|
// Type is set so that an appropriate connection can be formed.
|
||||||
|
// As an example, for a Linux machine, the Type may be "ssh"
|
||||||
|
Type string
|
||||||
|
|
||||||
|
// Raw is used to store any relevant keys for the given Type
|
||||||
|
// so that a provisioner can connect to the resource. This could
|
||||||
|
// contain credentials or address information.
|
||||||
|
Raw map[string]string
|
||||||
}
|
}
|
||||||
|
|
||||||
// ResourceState holds the state of a resource that is used so that
|
// ResourceState holds the state of a resource that is used so that
|
||||||
|
@ -204,6 +252,11 @@ type ResourceState struct {
|
||||||
// ${resourcetype.name.attribute}.
|
// ${resourcetype.name.attribute}.
|
||||||
Attributes map[string]string
|
Attributes map[string]string
|
||||||
|
|
||||||
|
// ConnInfo is used for the providers to export information which is
|
||||||
|
// used to connect to the resource for provisioning. For example,
|
||||||
|
// this could contain SSH or WinRM credentials.
|
||||||
|
ConnInfo *ResourceConnectionInfo
|
||||||
|
|
||||||
// Extra information that the provider can store about a resource.
|
// Extra information that the provider can store about a resource.
|
||||||
// This data is opaque, never shown to the user, and is sent back to
|
// This data is opaque, never shown to the user, and is sent back to
|
||||||
// the provider as-is for whatever purpose appropriate.
|
// the provider as-is for whatever purpose appropriate.
|
||||||
|
|
|
@ -98,20 +98,39 @@ func TestReadWriteState(t *testing.T) {
|
||||||
Resources: map[string]*ResourceState{
|
Resources: map[string]*ResourceState{
|
||||||
"foo": &ResourceState{
|
"foo": &ResourceState{
|
||||||
ID: "bar",
|
ID: "bar",
|
||||||
|
ConnInfo: &ResourceConnectionInfo{
|
||||||
|
Type: "ssh",
|
||||||
|
Raw: map[string]string{
|
||||||
|
"user": "root",
|
||||||
|
"password": "supersecret",
|
||||||
|
},
|
||||||
|
},
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// Checksum before the write
|
||||||
|
chksum := checksumStruct(t, state)
|
||||||
|
|
||||||
buf := new(bytes.Buffer)
|
buf := new(bytes.Buffer)
|
||||||
if err := WriteState(state, buf); err != nil {
|
if err := WriteState(state, buf); err != nil {
|
||||||
t.Fatalf("err: %s", err)
|
t.Fatalf("err: %s", err)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// Checksum after the write
|
||||||
|
chksumAfter := checksumStruct(t, state)
|
||||||
|
if chksumAfter != chksum {
|
||||||
|
t.Fatalf("structure changed during serialization!")
|
||||||
|
}
|
||||||
|
|
||||||
actual, err := ReadState(buf)
|
actual, err := ReadState(buf)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
t.Fatalf("err: %s", err)
|
t.Fatalf("err: %s", err)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// ReadState should not restore sensitive information!
|
||||||
|
state.Resources["foo"].ConnInfo = nil
|
||||||
|
|
||||||
if !reflect.DeepEqual(actual, state) {
|
if !reflect.DeepEqual(actual, state) {
|
||||||
t.Fatalf("bad: %#v", actual)
|
t.Fatalf("bad: %#v", actual)
|
||||||
}
|
}
|
||||||
|
|
|
@ -45,6 +45,12 @@ func testProviderFuncFixed(rp ResourceProvider) ResourceProviderFactory {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func testProvisionerFuncFixed(rp ResourceProvisioner) ResourceProvisionerFactory {
|
||||||
|
return func() (ResourceProvisioner, error) {
|
||||||
|
return rp, nil
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
// HookRecordApplyOrder is a test hook that records the order of applies
|
// HookRecordApplyOrder is a test hook that records the order of applies
|
||||||
// by recording the PreApply event.
|
// by recording the PreApply event.
|
||||||
type HookRecordApplyOrder struct {
|
type HookRecordApplyOrder struct {
|
||||||
|
@ -114,6 +120,16 @@ aws_instance.foo:
|
||||||
ID = foo
|
ID = foo
|
||||||
`
|
`
|
||||||
|
|
||||||
|
const testTerraformApplyProvisionerStr = `
|
||||||
|
aws_instance.bar:
|
||||||
|
ID = foo
|
||||||
|
aws_instance.foo:
|
||||||
|
ID = foo
|
||||||
|
dynamical = computed_dynamical
|
||||||
|
num = 2
|
||||||
|
type = aws_instance
|
||||||
|
`
|
||||||
|
|
||||||
const testTerraformApplyDestroyStr = `
|
const testTerraformApplyDestroyStr = `
|
||||||
<no state>
|
<no state>
|
||||||
`
|
`
|
||||||
|
|
|
@ -0,0 +1,11 @@
|
||||||
|
resource "aws_instance" "foo" {
|
||||||
|
num = "2"
|
||||||
|
compute = "dynamical"
|
||||||
|
compute_value = "${var.value}"
|
||||||
|
}
|
||||||
|
|
||||||
|
resource "aws_instance" "bar" {
|
||||||
|
provisioner "shell" {
|
||||||
|
foo = "${aws_instance.foo.dynamical}"
|
||||||
|
}
|
||||||
|
}
|
|
@ -0,0 +1,28 @@
|
||||||
|
variable "foo" {
|
||||||
|
default = "bar";
|
||||||
|
description = "bar";
|
||||||
|
}
|
||||||
|
|
||||||
|
provider "aws" {}
|
||||||
|
|
||||||
|
resource "aws_security_group" "firewall" {}
|
||||||
|
|
||||||
|
resource "aws_instance" "web" {
|
||||||
|
ami = "${var.foo}"
|
||||||
|
security_groups = [
|
||||||
|
"foo",
|
||||||
|
"${aws_security_group.firewall.foo}"
|
||||||
|
]
|
||||||
|
provisioner "winrm" {
|
||||||
|
cmd = "echo foo"
|
||||||
|
}
|
||||||
|
provisioner "winrm" {
|
||||||
|
cmd = "echo bar"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
resource "aws_load_balancer" "weblb" {
|
||||||
|
provisioner "shell" {
|
||||||
|
cmd = "add ${aws_instance.web.id}"
|
||||||
|
}
|
||||||
|
}
|
|
@ -0,0 +1,7 @@
|
||||||
|
provider "aws" {
|
||||||
|
foo = "bar"
|
||||||
|
}
|
||||||
|
|
||||||
|
resource "aws_instance" "test" {
|
||||||
|
provisioner "shell" {}
|
||||||
|
}
|
Loading…
Reference in New Issue