182 lines
4.4 KiB
Go
182 lines
4.4 KiB
Go
package remote
|
|
|
|
import (
|
|
"bytes"
|
|
"context"
|
|
"crypto/md5"
|
|
"encoding/base64"
|
|
"fmt"
|
|
|
|
tfe "github.com/hashicorp/go-tfe"
|
|
"github.com/hashicorp/terraform/state"
|
|
"github.com/hashicorp/terraform/state/remote"
|
|
"github.com/hashicorp/terraform/terraform"
|
|
)
|
|
|
|
type remoteClient struct {
|
|
client *tfe.Client
|
|
lockInfo *state.LockInfo
|
|
organization string
|
|
runID string
|
|
workspace string
|
|
}
|
|
|
|
// Get the remote state.
|
|
func (r *remoteClient) Get() (*remote.Payload, error) {
|
|
ctx := context.Background()
|
|
|
|
// Retrieve the workspace for which to create a new state.
|
|
w, err := r.client.Workspaces.Read(ctx, r.organization, r.workspace)
|
|
if err != nil {
|
|
if err == tfe.ErrResourceNotFound {
|
|
// If no state exists, then return nil.
|
|
return nil, nil
|
|
}
|
|
return nil, fmt.Errorf("Error retrieving workspace: %v", err)
|
|
}
|
|
|
|
sv, err := r.client.StateVersions.Current(ctx, w.ID)
|
|
if err != nil {
|
|
if err == tfe.ErrResourceNotFound {
|
|
// If no state exists, then return nil.
|
|
return nil, nil
|
|
}
|
|
return nil, fmt.Errorf("Error retrieving remote state: %v", err)
|
|
}
|
|
|
|
state, err := r.client.StateVersions.Download(ctx, sv.DownloadURL)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("Error downloading remote state: %v", err)
|
|
}
|
|
|
|
// If the state is empty, then return nil.
|
|
if len(state) == 0 {
|
|
return nil, nil
|
|
}
|
|
|
|
// Get the MD5 checksum of the state.
|
|
sum := md5.Sum(state)
|
|
|
|
return &remote.Payload{
|
|
Data: state,
|
|
MD5: sum[:],
|
|
}, nil
|
|
}
|
|
|
|
// Put the remote state.
|
|
func (r *remoteClient) Put(state []byte) error {
|
|
ctx := context.Background()
|
|
|
|
// Retrieve the workspace for which to create a new state.
|
|
w, err := r.client.Workspaces.Read(ctx, r.organization, r.workspace)
|
|
if err != nil {
|
|
return fmt.Errorf("Error retrieving workspace: %v", err)
|
|
}
|
|
|
|
// Read the raw state into a Terraform state.
|
|
tfState, err := terraform.ReadState(bytes.NewReader(state))
|
|
if err != nil {
|
|
return fmt.Errorf("Error reading state: %s", err)
|
|
}
|
|
|
|
options := tfe.StateVersionCreateOptions{
|
|
Lineage: tfe.String(tfState.Lineage),
|
|
Serial: tfe.Int64(tfState.Serial),
|
|
MD5: tfe.String(fmt.Sprintf("%x", md5.Sum(state))),
|
|
State: tfe.String(base64.StdEncoding.EncodeToString(state)),
|
|
}
|
|
|
|
// If we have a run ID, make sure to add it to the options
|
|
// so the state will be properly associated with the run.
|
|
if r.runID != "" {
|
|
options.Run = &tfe.Run{ID: r.runID}
|
|
}
|
|
|
|
// Create the new state.
|
|
_, err = r.client.StateVersions.Create(ctx, w.ID, options)
|
|
if err != nil {
|
|
return fmt.Errorf("Error creating remote state: %v", err)
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
// Delete the remote state.
|
|
func (r *remoteClient) Delete() error {
|
|
err := r.client.Workspaces.Delete(context.Background(), r.organization, r.workspace)
|
|
if err != nil && err != tfe.ErrResourceNotFound {
|
|
return fmt.Errorf("Error deleting workspace %s: %v", r.workspace, err)
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
// Lock the remote state.
|
|
func (r *remoteClient) Lock(info *state.LockInfo) (string, error) {
|
|
ctx := context.Background()
|
|
|
|
lockErr := &state.LockError{Info: r.lockInfo}
|
|
|
|
// Retrieve the workspace to lock.
|
|
w, err := r.client.Workspaces.Read(ctx, r.organization, r.workspace)
|
|
if err != nil {
|
|
lockErr.Err = err
|
|
return "", lockErr
|
|
}
|
|
|
|
// Check if the workspace is already locked.
|
|
if w.Locked {
|
|
lockErr.Err = fmt.Errorf(
|
|
"remote state already\nlocked (lock ID: \"%s/%s\")", r.organization, r.workspace)
|
|
return "", lockErr
|
|
}
|
|
|
|
// Lock the workspace.
|
|
w, err = r.client.Workspaces.Lock(ctx, w.ID, tfe.WorkspaceLockOptions{
|
|
Reason: tfe.String("Locked by Terraform"),
|
|
})
|
|
if err != nil {
|
|
lockErr.Err = err
|
|
return "", lockErr
|
|
}
|
|
|
|
r.lockInfo = info
|
|
|
|
return r.lockInfo.ID, nil
|
|
}
|
|
|
|
// Unlock the remote state.
|
|
func (r *remoteClient) Unlock(id string) error {
|
|
ctx := context.Background()
|
|
|
|
lockErr := &state.LockError{Info: r.lockInfo}
|
|
|
|
// Verify the expected lock ID.
|
|
if r.lockInfo != nil && r.lockInfo.ID != id {
|
|
lockErr.Err = fmt.Errorf("lock ID does not match existing lock")
|
|
return lockErr
|
|
}
|
|
|
|
// Verify the optional force-unlock lock ID.
|
|
if r.lockInfo == nil && r.organization+"/"+r.workspace != id {
|
|
lockErr.Err = fmt.Errorf("lock ID does not match existing lock")
|
|
return lockErr
|
|
}
|
|
|
|
// Retrieve the workspace to lock.
|
|
w, err := r.client.Workspaces.Read(ctx, r.organization, r.workspace)
|
|
if err != nil {
|
|
lockErr.Err = err
|
|
return lockErr
|
|
}
|
|
|
|
// Unlock the workspace.
|
|
w, err = r.client.Workspaces.Unlock(ctx, w.ID)
|
|
if err != nil {
|
|
lockErr.Err = err
|
|
return lockErr
|
|
}
|
|
|
|
return nil
|
|
}
|