package consul import ( "fmt" "strings" "github.com/hashicorp/terraform/internal/backend" "github.com/hashicorp/terraform/internal/states" "github.com/hashicorp/terraform/internal/states/remote" "github.com/hashicorp/terraform/internal/states/statemgr" ) const ( keyEnvPrefix = "-env:" ) func (b *Backend) Workspaces() ([]string, error) { // List our raw path prefix := b.configData.Get("path").(string) + keyEnvPrefix keys, _, err := b.client.KV().Keys(prefix, "/", nil) if err != nil { return nil, err } // Find the envs, we use a map since we can get duplicates with // path suffixes. envs := map[string]struct{}{} for _, key := range keys { // Consul should ensure this but it doesn't hurt to check again if strings.HasPrefix(key, prefix) { key = strings.TrimPrefix(key, prefix) // Ignore anything with a "/" in it since we store the state // directly in a key not a directory. if idx := strings.IndexRune(key, '/'); idx >= 0 { continue } envs[key] = struct{}{} } } result := make([]string, 1, len(envs)+1) result[0] = backend.DefaultStateName for k, _ := range envs { result = append(result, k) } return result, nil } func (b *Backend) DeleteWorkspace(name string) error { if name == backend.DefaultStateName || name == "" { return fmt.Errorf("can't delete default state") } // Determine the path of the data path := b.path(name) // Delete it. We just delete it without any locking since // the DeleteState API is documented as such. _, err := b.client.KV().Delete(path, nil) return err } func (b *Backend) StateMgr(name string) (statemgr.Full, error) { // Determine the path of the data path := b.path(name) // Determine whether to gzip or not gzip := b.configData.Get("gzip").(bool) // Build the state client var stateMgr = &remote.State{ Client: &RemoteClient{ Client: b.client, Path: path, GZip: gzip, lockState: b.lock, }, } if !b.lock { stateMgr.DisableLocks() } // the default state always exists if name == backend.DefaultStateName { return stateMgr, nil } // Grab a lock, we use this to write an empty state if one doesn't // exist already. We have to write an empty state as a sentinel value // so States() knows it exists. lockInfo := statemgr.NewLockInfo() lockInfo.Operation = "init" lockId, err := stateMgr.Lock(lockInfo) if err != nil { return nil, fmt.Errorf("failed to lock state in Consul: %s", err) } // Local helper function so we can call it multiple places lockUnlock := func(parent error) error { if err := stateMgr.Unlock(lockId); err != nil { return fmt.Errorf(strings.TrimSpace(errStateUnlock), lockId, err) } return parent } // Grab the value if err := stateMgr.RefreshState(); err != nil { err = lockUnlock(err) return nil, err } // If we have no state, we have to create an empty state if v := stateMgr.State(); v == nil { if err := stateMgr.WriteState(states.NewState()); err != nil { err = lockUnlock(err) return nil, err } if err := stateMgr.PersistState(); err != nil { err = lockUnlock(err) return nil, err } } // Unlock, the state should now be initialized if err := lockUnlock(nil); err != nil { return nil, err } return stateMgr, nil } func (b *Backend) path(name string) string { path := b.configData.Get("path").(string) if name != backend.DefaultStateName { path += fmt.Sprintf("%s%s", keyEnvPrefix, name) } return path } const errStateUnlock = ` Error unlocking Consul state. Lock ID: %s Error: %s You may have to force-unlock this state in order to use it again. The Consul backend acquires a lock during initialization to ensure the minimum required key/values are prepared. `