742 lines
28 KiB
Go
742 lines
28 KiB
Go
package terraform
|
|
|
|
import (
|
|
"bytes"
|
|
"fmt"
|
|
"log"
|
|
"sort"
|
|
"strings"
|
|
|
|
"github.com/zclconf/go-cty/cty"
|
|
|
|
"github.com/hashicorp/terraform/internal/addrs"
|
|
"github.com/hashicorp/terraform/internal/configs"
|
|
"github.com/hashicorp/terraform/internal/instances"
|
|
"github.com/hashicorp/terraform/internal/plans"
|
|
"github.com/hashicorp/terraform/internal/refactoring"
|
|
"github.com/hashicorp/terraform/internal/states"
|
|
"github.com/hashicorp/terraform/internal/tfdiags"
|
|
)
|
|
|
|
// PlanOpts are the various options that affect the details of how Terraform
|
|
// will build a plan.
|
|
type PlanOpts struct {
|
|
// Mode defines what variety of plan the caller wishes to create.
|
|
// Refer to the documentation of the plans.Mode type and its values
|
|
// for more information.
|
|
Mode plans.Mode
|
|
|
|
// SkipRefresh specifies to trust that the current values for managed
|
|
// resource instances in the prior state are accurate and to therefore
|
|
// disable the usual step of fetching updated values for each resource
|
|
// instance using its corresponding provider.
|
|
SkipRefresh bool
|
|
|
|
// SetVariables are the raw values for root module variables as provided
|
|
// by the user who is requesting the run, prior to any normalization or
|
|
// substitution of defaults. See the documentation for the InputValue
|
|
// type for more information on how to correctly populate this.
|
|
SetVariables InputValues
|
|
|
|
// If Targets has a non-zero length then it activates targeted planning
|
|
// mode, where Terraform will take actions only for resource instances
|
|
// mentioned in this set and any other objects those resource instances
|
|
// depend on.
|
|
//
|
|
// Targeted planning mode is intended for exceptional use only,
|
|
// and so populating this field will cause Terraform to generate extra
|
|
// warnings as part of the planning result.
|
|
Targets []addrs.Targetable
|
|
|
|
// ForceReplace is a set of resource instance addresses whose corresponding
|
|
// objects should be forced planned for replacement if the provider's
|
|
// plan would otherwise have been to either update the object in-place or
|
|
// to take no action on it at all.
|
|
//
|
|
// A typical use of this argument is to ask Terraform to replace an object
|
|
// which the user has determined is somehow degraded (via information from
|
|
// outside of Terraform), thereby hopefully replacing it with a
|
|
// fully-functional new object.
|
|
ForceReplace []addrs.AbsResourceInstance
|
|
}
|
|
|
|
// Plan generates an execution plan for the given context, and returns the
|
|
// refreshed state.
|
|
//
|
|
// The execution plan encapsulates the context and can be stored
|
|
// in order to reinstantiate a context later for Apply.
|
|
//
|
|
// Plan also updates the diff of this context to be the diff generated
|
|
// by the plan, so Apply can be called after.
|
|
func (c *Context) Plan(config *configs.Config, prevRunState *states.State, opts *PlanOpts) (*plans.Plan, tfdiags.Diagnostics) {
|
|
defer c.acquireRun("plan")()
|
|
var diags tfdiags.Diagnostics
|
|
|
|
// Save the downstream functions from needing to deal with these broken situations.
|
|
// No real callers should rely on these, but we have a bunch of old and
|
|
// sloppy tests that don't always populate arguments properly.
|
|
if config == nil {
|
|
config = configs.NewEmptyConfig()
|
|
}
|
|
if prevRunState == nil {
|
|
prevRunState = states.NewState()
|
|
}
|
|
if opts == nil {
|
|
opts = &PlanOpts{
|
|
Mode: plans.NormalMode,
|
|
}
|
|
}
|
|
|
|
moreDiags := c.checkConfigDependencies(config)
|
|
diags = diags.Append(moreDiags)
|
|
// If required dependencies are not available then we'll bail early since
|
|
// otherwise we're likely to just see a bunch of other errors related to
|
|
// incompatibilities, which could be overwhelming for the user.
|
|
if diags.HasErrors() {
|
|
return nil, diags
|
|
}
|
|
|
|
switch opts.Mode {
|
|
case plans.NormalMode, plans.DestroyMode:
|
|
// OK
|
|
case plans.RefreshOnlyMode:
|
|
if opts.SkipRefresh {
|
|
// The CLI layer (and other similar callers) should prevent this
|
|
// combination of options.
|
|
diags = diags.Append(tfdiags.Sourceless(
|
|
tfdiags.Error,
|
|
"Incompatible plan options",
|
|
"Cannot skip refreshing in refresh-only mode. This is a bug in Terraform.",
|
|
))
|
|
return nil, diags
|
|
}
|
|
default:
|
|
// The CLI layer (and other similar callers) should not try to
|
|
// create a context for a mode that Terraform Core doesn't support.
|
|
diags = diags.Append(tfdiags.Sourceless(
|
|
tfdiags.Error,
|
|
"Unsupported plan mode",
|
|
fmt.Sprintf("Terraform Core doesn't know how to handle plan mode %s. This is a bug in Terraform.", opts.Mode),
|
|
))
|
|
return nil, diags
|
|
}
|
|
if len(opts.ForceReplace) > 0 && opts.Mode != plans.NormalMode {
|
|
// The other modes don't generate no-op or update actions that we might
|
|
// upgrade to be "replace", so doesn't make sense to combine those.
|
|
diags = diags.Append(tfdiags.Sourceless(
|
|
tfdiags.Error,
|
|
"Unsupported plan mode",
|
|
"Forcing resource instance replacement (with -replace=...) is allowed only in normal planning mode.",
|
|
))
|
|
return nil, diags
|
|
}
|
|
|
|
// By the time we get here, we should have values defined for all of
|
|
// the root module variables, even if some of them are "unknown". It's the
|
|
// caller's responsibility to have already handled the decoding of these
|
|
// from the various ways the CLI allows them to be set and to produce
|
|
// user-friendly error messages if they are not all present, and so
|
|
// the error message from checkInputVariables should never be seen and
|
|
// includes language asking the user to report a bug.
|
|
varDiags := checkInputVariables(config.Module.Variables, opts.SetVariables)
|
|
diags = diags.Append(varDiags)
|
|
|
|
if len(opts.Targets) > 0 {
|
|
diags = diags.Append(tfdiags.Sourceless(
|
|
tfdiags.Warning,
|
|
"Resource targeting is in effect",
|
|
`You are creating a plan with the -target option, which means that the result of this plan may not represent all of the changes requested by the current configuration.
|
|
|
|
The -target option is not for routine use, and is provided only for exceptional situations such as recovering from errors or mistakes, or when Terraform specifically suggests to use it as part of an error message.`,
|
|
))
|
|
}
|
|
|
|
var plan *plans.Plan
|
|
var planDiags tfdiags.Diagnostics
|
|
switch opts.Mode {
|
|
case plans.NormalMode:
|
|
plan, planDiags = c.plan(config, prevRunState, opts)
|
|
case plans.DestroyMode:
|
|
plan, planDiags = c.destroyPlan(config, prevRunState, opts)
|
|
case plans.RefreshOnlyMode:
|
|
plan, planDiags = c.refreshOnlyPlan(config, prevRunState, opts)
|
|
default:
|
|
panic(fmt.Sprintf("unsupported plan mode %s", opts.Mode))
|
|
}
|
|
diags = diags.Append(planDiags)
|
|
if diags.HasErrors() {
|
|
return nil, diags
|
|
}
|
|
|
|
// convert the variables into the format expected for the plan
|
|
varVals := make(map[string]plans.DynamicValue, len(opts.SetVariables))
|
|
for k, iv := range opts.SetVariables {
|
|
if iv.Value == cty.NilVal {
|
|
continue // We only record values that the caller actually set
|
|
}
|
|
|
|
// We use cty.DynamicPseudoType here so that we'll save both the
|
|
// value _and_ its dynamic type in the plan, so we can recover
|
|
// exactly the same value later.
|
|
dv, err := plans.NewDynamicValue(iv.Value, cty.DynamicPseudoType)
|
|
if err != nil {
|
|
diags = diags.Append(tfdiags.Sourceless(
|
|
tfdiags.Error,
|
|
"Failed to prepare variable value for plan",
|
|
fmt.Sprintf("The value for variable %q could not be serialized to store in the plan: %s.", k, err),
|
|
))
|
|
continue
|
|
}
|
|
varVals[k] = dv
|
|
}
|
|
|
|
// insert the run-specific data from the context into the plan; variables,
|
|
// targets and provider SHAs.
|
|
if plan != nil {
|
|
plan.VariableValues = varVals
|
|
plan.TargetAddrs = opts.Targets
|
|
} else if !diags.HasErrors() {
|
|
panic("nil plan but no errors")
|
|
}
|
|
|
|
return plan, diags
|
|
}
|
|
|
|
var DefaultPlanOpts = &PlanOpts{
|
|
Mode: plans.NormalMode,
|
|
}
|
|
|
|
// SimplePlanOpts is a constructor to help with creating "simple" values of
|
|
// PlanOpts which only specify a mode and input variables.
|
|
//
|
|
// This helper function is primarily intended for use in straightforward
|
|
// tests that don't need any of the more "esoteric" planning options. For
|
|
// handling real user requests to run Terraform, it'd probably be better
|
|
// to construct a *PlanOpts value directly and provide a way for the user
|
|
// to set values for all of its fields.
|
|
//
|
|
// The "mode" and "setVariables" arguments become the values of the "Mode"
|
|
// and "SetVariables" fields in the result. Refer to the PlanOpts type
|
|
// documentation to learn about the meanings of those fields.
|
|
func SimplePlanOpts(mode plans.Mode, setVariables InputValues) *PlanOpts {
|
|
return &PlanOpts{
|
|
Mode: mode,
|
|
SetVariables: setVariables,
|
|
}
|
|
}
|
|
|
|
func (c *Context) plan(config *configs.Config, prevRunState *states.State, opts *PlanOpts) (*plans.Plan, tfdiags.Diagnostics) {
|
|
var diags tfdiags.Diagnostics
|
|
|
|
if opts.Mode != plans.NormalMode {
|
|
panic(fmt.Sprintf("called Context.plan with %s", opts.Mode))
|
|
}
|
|
|
|
plan, walkDiags := c.planWalk(config, prevRunState, opts)
|
|
diags = diags.Append(walkDiags)
|
|
if diags.HasErrors() {
|
|
return nil, diags
|
|
}
|
|
|
|
// The refreshed state ends up with some placeholder objects in it for
|
|
// objects pending creation. We only really care about those being in
|
|
// the working state, since that's what we're going to use when applying,
|
|
// so we'll prune them all here.
|
|
plan.PriorState.SyncWrapper().RemovePlannedResourceInstanceObjects()
|
|
|
|
return plan, diags
|
|
}
|
|
|
|
func (c *Context) refreshOnlyPlan(config *configs.Config, prevRunState *states.State, opts *PlanOpts) (*plans.Plan, tfdiags.Diagnostics) {
|
|
var diags tfdiags.Diagnostics
|
|
|
|
if opts.Mode != plans.RefreshOnlyMode {
|
|
panic(fmt.Sprintf("called Context.refreshOnlyPlan with %s", opts.Mode))
|
|
}
|
|
|
|
plan, walkDiags := c.planWalk(config, prevRunState, opts)
|
|
diags = diags.Append(walkDiags)
|
|
if diags.HasErrors() {
|
|
return nil, diags
|
|
}
|
|
|
|
// If the graph builder and graph nodes correctly obeyed our directive
|
|
// to refresh only, the set of resource changes should always be empty.
|
|
// We'll safety-check that here so we can return a clear message about it,
|
|
// rather than probably just generating confusing output at the UI layer.
|
|
if len(plan.Changes.Resources) != 0 {
|
|
// Some extra context in the logs in case the user reports this message
|
|
// as a bug, as a starting point for debugging.
|
|
for _, rc := range plan.Changes.Resources {
|
|
if depKey := rc.DeposedKey; depKey == states.NotDeposed {
|
|
log.Printf("[DEBUG] Refresh-only plan includes %s change for %s", rc.Action, rc.Addr)
|
|
} else {
|
|
log.Printf("[DEBUG] Refresh-only plan includes %s change for %s deposed object %s", rc.Action, rc.Addr, depKey)
|
|
}
|
|
}
|
|
diags = diags.Append(tfdiags.Sourceless(
|
|
tfdiags.Error,
|
|
"Invalid refresh-only plan",
|
|
"Terraform generated planned resource changes in a refresh-only plan. This is a bug in Terraform.",
|
|
))
|
|
}
|
|
|
|
// Prune out any placeholder objects we put in the state to represent
|
|
// objects that would need to be created.
|
|
plan.PriorState.SyncWrapper().RemovePlannedResourceInstanceObjects()
|
|
|
|
return plan, diags
|
|
}
|
|
|
|
func (c *Context) destroyPlan(config *configs.Config, prevRunState *states.State, opts *PlanOpts) (*plans.Plan, tfdiags.Diagnostics) {
|
|
var diags tfdiags.Diagnostics
|
|
pendingPlan := &plans.Plan{}
|
|
|
|
if opts.Mode != plans.DestroyMode {
|
|
panic(fmt.Sprintf("called Context.destroyPlan with %s", opts.Mode))
|
|
}
|
|
|
|
priorState := prevRunState
|
|
|
|
// A destroy plan starts by running Refresh to read any pending data
|
|
// sources, and remove missing managed resources. This is required because
|
|
// a "destroy plan" is only creating delete changes, and is essentially a
|
|
// local operation.
|
|
//
|
|
// NOTE: if skipRefresh _is_ set then we'll rely on the destroy-plan walk
|
|
// below to upgrade the prevRunState and priorState both to the latest
|
|
// resource type schemas, so NodePlanDestroyableResourceInstance.Execute
|
|
// must coordinate with this by taking that action only when c.skipRefresh
|
|
// _is_ set. This coupling between the two is unfortunate but necessary
|
|
// to work within our current structure.
|
|
if !opts.SkipRefresh {
|
|
log.Printf("[TRACE] Context.destroyPlan: calling Context.plan to get the effect of refreshing the prior state")
|
|
normalOpts := *opts
|
|
normalOpts.Mode = plans.NormalMode
|
|
refreshPlan, refreshDiags := c.plan(config, prevRunState, &normalOpts)
|
|
if refreshDiags.HasErrors() {
|
|
// NOTE: Normally we'd append diagnostics regardless of whether
|
|
// there are errors, just in case there are warnings we'd want to
|
|
// preserve, but we're intentionally _not_ doing that here because
|
|
// if the first plan succeeded then we'll be running another plan
|
|
// in DestroyMode below, and we don't want to double-up any
|
|
// warnings that both plan walks would generate.
|
|
// (This does mean we won't show any warnings that would've been
|
|
// unique to only this walk, but we're assuming here that if the
|
|
// warnings aren't also applicable to a destroy plan then we'd
|
|
// rather not show them here, because this non-destroy plan for
|
|
// refreshing is largely an implementation detail.)
|
|
diags = diags.Append(refreshDiags)
|
|
return nil, diags
|
|
}
|
|
|
|
// insert the refreshed state into the destroy plan result, and ignore
|
|
// the changes recorded from the refresh.
|
|
pendingPlan.PriorState = refreshPlan.PriorState.DeepCopy()
|
|
pendingPlan.PrevRunState = refreshPlan.PrevRunState.DeepCopy()
|
|
log.Printf("[TRACE] Context.destroyPlan: now _really_ creating a destroy plan")
|
|
|
|
// We'll use the refreshed state -- which is the "prior state" from
|
|
// the perspective of this "pending plan" -- as the starting state
|
|
// for our destroy-plan walk, so it can take into account if we
|
|
// detected during refreshing that anything was already deleted outside
|
|
// of Terraform.
|
|
priorState = pendingPlan.PriorState
|
|
}
|
|
|
|
destroyPlan, walkDiags := c.planWalk(config, priorState, opts)
|
|
diags = diags.Append(walkDiags)
|
|
if walkDiags.HasErrors() {
|
|
return nil, diags
|
|
}
|
|
|
|
if !opts.SkipRefresh {
|
|
// If we didn't skip refreshing then we want the previous run state
|
|
// prior state to be the one we originally fed into the c.plan call
|
|
// above, not the refreshed version we used for the destroy walk.
|
|
destroyPlan.PrevRunState = pendingPlan.PrevRunState
|
|
}
|
|
|
|
return destroyPlan, diags
|
|
}
|
|
|
|
func (c *Context) prePlanFindAndApplyMoves(config *configs.Config, prevRunState *states.State, targets []addrs.Targetable) ([]refactoring.MoveStatement, refactoring.MoveResults) {
|
|
explicitMoveStmts := refactoring.FindMoveStatements(config)
|
|
implicitMoveStmts := refactoring.ImpliedMoveStatements(config, prevRunState, explicitMoveStmts)
|
|
var moveStmts []refactoring.MoveStatement
|
|
if stmtsLen := len(explicitMoveStmts) + len(implicitMoveStmts); stmtsLen > 0 {
|
|
moveStmts = make([]refactoring.MoveStatement, 0, stmtsLen)
|
|
moveStmts = append(moveStmts, explicitMoveStmts...)
|
|
moveStmts = append(moveStmts, implicitMoveStmts...)
|
|
}
|
|
moveResults := refactoring.ApplyMoves(moveStmts, prevRunState)
|
|
return moveStmts, moveResults
|
|
}
|
|
|
|
func (c *Context) prePlanVerifyTargetedMoves(moveResults refactoring.MoveResults, targets []addrs.Targetable) tfdiags.Diagnostics {
|
|
if len(targets) < 1 {
|
|
return nil // the following only matters when targeting
|
|
}
|
|
|
|
var diags tfdiags.Diagnostics
|
|
|
|
var excluded []addrs.AbsResourceInstance
|
|
for _, result := range moveResults.Changes {
|
|
fromMatchesTarget := false
|
|
toMatchesTarget := false
|
|
for _, targetAddr := range targets {
|
|
if targetAddr.TargetContains(result.From) {
|
|
fromMatchesTarget = true
|
|
}
|
|
if targetAddr.TargetContains(result.To) {
|
|
toMatchesTarget = true
|
|
}
|
|
}
|
|
if !fromMatchesTarget {
|
|
excluded = append(excluded, result.From)
|
|
}
|
|
if !toMatchesTarget {
|
|
excluded = append(excluded, result.To)
|
|
}
|
|
}
|
|
if len(excluded) > 0 {
|
|
sort.Slice(excluded, func(i, j int) bool {
|
|
return excluded[i].Less(excluded[j])
|
|
})
|
|
|
|
var listBuf strings.Builder
|
|
var prevResourceAddr addrs.AbsResource
|
|
for _, instAddr := range excluded {
|
|
// Targeting generally ends up selecting whole resources rather
|
|
// than individual instances, because we don't factor in
|
|
// individual instances until DynamicExpand, so we're going to
|
|
// always show whole resource addresses here, excluding any
|
|
// instance keys. (This also neatly avoids dealing with the
|
|
// different quoting styles required for string instance keys
|
|
// on different shells, which is handy.)
|
|
//
|
|
// To avoid showing duplicates when we have multiple instances
|
|
// of the same resource, we'll remember the most recent
|
|
// resource we rendered in prevResource, which is sufficient
|
|
// because we sorted the list of instance addresses above, and
|
|
// our sort order always groups together instances of the same
|
|
// resource.
|
|
resourceAddr := instAddr.ContainingResource()
|
|
if resourceAddr.Equal(prevResourceAddr) {
|
|
continue
|
|
}
|
|
fmt.Fprintf(&listBuf, "\n -target=%q", resourceAddr.String())
|
|
prevResourceAddr = resourceAddr
|
|
}
|
|
diags = diags.Append(tfdiags.Sourceless(
|
|
tfdiags.Error,
|
|
"Moved resource instances excluded by targeting",
|
|
fmt.Sprintf(
|
|
"Resource instances in your current state have moved to new addresses in the latest configuration. Terraform must include those resource instances while planning in order to ensure a correct result, but your -target=... options to not fully cover all of those resource instances.\n\nTo create a valid plan, either remove your -target=... options altogether or add the following additional target options:%s\n\nNote that adding these options may include further additional resource instances in your plan, in order to respect object dependencies.",
|
|
listBuf.String(),
|
|
),
|
|
))
|
|
}
|
|
|
|
return diags
|
|
}
|
|
|
|
func (c *Context) postPlanValidateMoves(config *configs.Config, stmts []refactoring.MoveStatement, allInsts instances.Set) tfdiags.Diagnostics {
|
|
return refactoring.ValidateMoves(stmts, config, allInsts)
|
|
}
|
|
|
|
func (c *Context) planWalk(config *configs.Config, prevRunState *states.State, opts *PlanOpts) (*plans.Plan, tfdiags.Diagnostics) {
|
|
var diags tfdiags.Diagnostics
|
|
log.Printf("[DEBUG] Building and walking plan graph for %s", opts.Mode)
|
|
|
|
prevRunState = prevRunState.DeepCopy() // don't modify the caller's object when we process the moves
|
|
moveStmts, moveResults := c.prePlanFindAndApplyMoves(config, prevRunState, opts.Targets)
|
|
|
|
// If resource targeting is in effect then it might conflict with the
|
|
// move result.
|
|
diags = diags.Append(c.prePlanVerifyTargetedMoves(moveResults, opts.Targets))
|
|
if diags.HasErrors() {
|
|
// We'll return early here, because if we have any moved resource
|
|
// instances excluded by targeting then planning is likely to encounter
|
|
// strange problems that may lead to confusing error messages.
|
|
return nil, diags
|
|
}
|
|
|
|
graph, walkOp, moreDiags := c.planGraph(config, prevRunState, opts, true)
|
|
diags = diags.Append(moreDiags)
|
|
if diags.HasErrors() {
|
|
return nil, diags
|
|
}
|
|
|
|
// If we get here then we should definitely have a non-nil "graph", which
|
|
// we can now walk.
|
|
changes := plans.NewChanges()
|
|
walker, walkDiags := c.walk(graph, walkOp, &graphWalkOpts{
|
|
Config: config,
|
|
InputState: prevRunState,
|
|
Changes: changes,
|
|
MoveResults: moveResults,
|
|
})
|
|
diags = diags.Append(walker.NonFatalDiagnostics)
|
|
diags = diags.Append(walkDiags)
|
|
moveValidateDiags := c.postPlanValidateMoves(config, moveStmts, walker.InstanceExpander.AllInstances())
|
|
if moveValidateDiags.HasErrors() {
|
|
// If any of the move statements are invalid then those errors take
|
|
// precedence over any other errors because an incomplete move graph
|
|
// is quite likely to be the _cause_ of various errors. This oddity
|
|
// comes from the fact that we need to apply the moves before we
|
|
// actually validate them, because validation depends on the result
|
|
// of first trying to plan.
|
|
return nil, moveValidateDiags
|
|
}
|
|
diags = diags.Append(moveValidateDiags) // might just contain warnings
|
|
|
|
if len(moveResults.Blocked) > 0 && !diags.HasErrors() {
|
|
// If we had blocked moves and we're not going to be returning errors
|
|
// then we'll report the blockers as a warning. We do this only in the
|
|
// absense of errors because invalid move statements might well be
|
|
// the root cause of the blockers, and so better to give an actionable
|
|
// error message than a less-actionable warning.
|
|
diags = diags.Append(blockedMovesWarningDiag(moveResults))
|
|
}
|
|
|
|
prevRunState = walker.PrevRunState.Close()
|
|
priorState := walker.RefreshState.Close()
|
|
driftedResources, driftDiags := c.driftedResources(config, prevRunState, priorState, moveResults)
|
|
diags = diags.Append(driftDiags)
|
|
|
|
plan := &plans.Plan{
|
|
UIMode: opts.Mode,
|
|
Changes: changes,
|
|
DriftedResources: driftedResources,
|
|
PrevRunState: prevRunState,
|
|
PriorState: priorState,
|
|
|
|
// Other fields get populated by Context.Plan after we return
|
|
}
|
|
return plan, diags
|
|
}
|
|
|
|
func (c *Context) planGraph(config *configs.Config, prevRunState *states.State, opts *PlanOpts, validate bool) (*Graph, walkOperation, tfdiags.Diagnostics) {
|
|
switch mode := opts.Mode; mode {
|
|
case plans.NormalMode:
|
|
graph, diags := (&PlanGraphBuilder{
|
|
Config: config,
|
|
State: prevRunState,
|
|
RootVariableValues: opts.SetVariables,
|
|
Plugins: c.plugins,
|
|
Targets: opts.Targets,
|
|
ForceReplace: opts.ForceReplace,
|
|
Validate: validate,
|
|
skipRefresh: opts.SkipRefresh,
|
|
}).Build(addrs.RootModuleInstance)
|
|
return graph, walkPlan, diags
|
|
case plans.RefreshOnlyMode:
|
|
graph, diags := (&PlanGraphBuilder{
|
|
Config: config,
|
|
State: prevRunState,
|
|
RootVariableValues: opts.SetVariables,
|
|
Plugins: c.plugins,
|
|
Targets: opts.Targets,
|
|
Validate: validate,
|
|
skipRefresh: opts.SkipRefresh,
|
|
skipPlanChanges: true, // this activates "refresh only" mode.
|
|
}).Build(addrs.RootModuleInstance)
|
|
return graph, walkPlan, diags
|
|
case plans.DestroyMode:
|
|
graph, diags := (&DestroyPlanGraphBuilder{
|
|
Config: config,
|
|
State: prevRunState,
|
|
RootVariableValues: opts.SetVariables,
|
|
Plugins: c.plugins,
|
|
Targets: opts.Targets,
|
|
Validate: validate,
|
|
skipRefresh: opts.SkipRefresh,
|
|
}).Build(addrs.RootModuleInstance)
|
|
return graph, walkPlanDestroy, diags
|
|
default:
|
|
// The above should cover all plans.Mode values
|
|
panic(fmt.Sprintf("unsupported plan mode %s", mode))
|
|
}
|
|
}
|
|
|
|
func (c *Context) driftedResources(config *configs.Config, oldState, newState *states.State, moves refactoring.MoveResults) ([]*plans.ResourceInstanceChangeSrc, tfdiags.Diagnostics) {
|
|
var diags tfdiags.Diagnostics
|
|
|
|
if newState.ManagedResourcesEqual(oldState) && len(moves.Changes) == 0 {
|
|
// Nothing to do, because we only detect and report drift for managed
|
|
// resource instances.
|
|
return nil, diags
|
|
}
|
|
|
|
schemas, schemaDiags := c.Schemas(config, newState)
|
|
diags = diags.Append(schemaDiags)
|
|
if diags.HasErrors() {
|
|
return nil, diags
|
|
}
|
|
|
|
var drs []*plans.ResourceInstanceChangeSrc
|
|
|
|
for _, ms := range oldState.Modules {
|
|
for _, rs := range ms.Resources {
|
|
if rs.Addr.Resource.Mode != addrs.ManagedResourceMode {
|
|
// Drift reporting is only for managed resources
|
|
continue
|
|
}
|
|
|
|
provider := rs.ProviderConfig.Provider
|
|
for key, oldIS := range rs.Instances {
|
|
if oldIS.Current == nil {
|
|
// Not interested in instances that only have deposed objects
|
|
continue
|
|
}
|
|
addr := rs.Addr.Instance(key)
|
|
|
|
// Previous run address defaults to the current address, but
|
|
// can differ if the resource moved before refreshing
|
|
prevRunAddr := addr
|
|
if move, ok := moves.Changes[addr.UniqueKey()]; ok {
|
|
prevRunAddr = move.From
|
|
}
|
|
|
|
newIS := newState.ResourceInstance(addr)
|
|
|
|
schema, _ := schemas.ResourceTypeConfig(
|
|
provider,
|
|
addr.Resource.Resource.Mode,
|
|
addr.Resource.Resource.Type,
|
|
)
|
|
if schema == nil {
|
|
// This should never happen, but just in case
|
|
return nil, diags.Append(tfdiags.Sourceless(
|
|
tfdiags.Error,
|
|
"Missing resource schema from provider",
|
|
fmt.Sprintf("No resource schema found for %s.", addr.Resource.Resource.Type),
|
|
))
|
|
}
|
|
ty := schema.ImpliedType()
|
|
|
|
oldObj, err := oldIS.Current.Decode(ty)
|
|
if err != nil {
|
|
// This should also never happen
|
|
return nil, diags.Append(tfdiags.Sourceless(
|
|
tfdiags.Error,
|
|
"Failed to decode resource from state",
|
|
fmt.Sprintf("Error decoding %q from previous state: %s", addr.String(), err),
|
|
))
|
|
}
|
|
|
|
var newObj *states.ResourceInstanceObject
|
|
if newIS != nil && newIS.Current != nil {
|
|
newObj, err = newIS.Current.Decode(ty)
|
|
if err != nil {
|
|
// This should also never happen
|
|
return nil, diags.Append(tfdiags.Sourceless(
|
|
tfdiags.Error,
|
|
"Failed to decode resource from state",
|
|
fmt.Sprintf("Error decoding %q from prior state: %s", addr.String(), err),
|
|
))
|
|
}
|
|
}
|
|
|
|
var oldVal, newVal cty.Value
|
|
oldVal = oldObj.Value
|
|
if newObj != nil {
|
|
newVal = newObj.Value
|
|
} else {
|
|
newVal = cty.NullVal(ty)
|
|
}
|
|
|
|
if oldVal.RawEquals(newVal) && addr.Equal(prevRunAddr) {
|
|
// No drift if the two values are semantically equivalent
|
|
// and no move has happened
|
|
continue
|
|
}
|
|
|
|
// We can detect three types of changes after refreshing state,
|
|
// only two of which are easily understood as "drift":
|
|
//
|
|
// - Resources which were deleted outside of Terraform;
|
|
// - Resources where the object value has changed outside of
|
|
// Terraform;
|
|
// - Resources which have been moved without other changes.
|
|
//
|
|
// All of these are returned as drift, to allow refresh-only plans
|
|
// to present a full set of changes which will be applied.
|
|
var action plans.Action
|
|
switch {
|
|
case newVal.IsNull():
|
|
action = plans.Delete
|
|
case !oldVal.RawEquals(newVal):
|
|
action = plans.Update
|
|
default:
|
|
action = plans.NoOp
|
|
}
|
|
|
|
change := &plans.ResourceInstanceChange{
|
|
Addr: addr,
|
|
PrevRunAddr: prevRunAddr,
|
|
ProviderAddr: rs.ProviderConfig,
|
|
Change: plans.Change{
|
|
Action: action,
|
|
Before: oldVal,
|
|
After: newVal,
|
|
},
|
|
}
|
|
|
|
changeSrc, err := change.Encode(ty)
|
|
if err != nil {
|
|
diags = diags.Append(err)
|
|
return nil, diags
|
|
}
|
|
|
|
drs = append(drs, changeSrc)
|
|
}
|
|
}
|
|
}
|
|
|
|
return drs, diags
|
|
}
|
|
|
|
// PlanGraphForUI is a last vestage of graphs in the public interface of Context
|
|
// (as opposed to graphs as an implementation detail) intended only for use
|
|
// by the "terraform graph" command when asked to render a plan-time graph.
|
|
//
|
|
// The result of this is intended only for rendering ot the user as a dot
|
|
// graph, and so may change in future in order to make the result more useful
|
|
// in that context, even if drifts away from the physical graph that Terraform
|
|
// Core currently uses as an implementation detail of planning.
|
|
func (c *Context) PlanGraphForUI(config *configs.Config, prevRunState *states.State, mode plans.Mode) (*Graph, tfdiags.Diagnostics) {
|
|
// For now though, this really is just the internal graph, confusing
|
|
// implementation details and all.
|
|
|
|
var diags tfdiags.Diagnostics
|
|
|
|
opts := &PlanOpts{Mode: mode}
|
|
|
|
graph, _, moreDiags := c.planGraph(config, prevRunState, opts, false)
|
|
diags = diags.Append(moreDiags)
|
|
return graph, diags
|
|
}
|
|
|
|
func blockedMovesWarningDiag(results refactoring.MoveResults) tfdiags.Diagnostic {
|
|
if len(results.Blocked) < 1 {
|
|
// Caller should check first
|
|
panic("request to render blocked moves warning without any blocked moves")
|
|
}
|
|
|
|
var itemsBuf bytes.Buffer
|
|
for _, blocked := range results.Blocked {
|
|
fmt.Fprintf(&itemsBuf, "\n - %s could not move to %s", blocked.Actual, blocked.Wanted)
|
|
}
|
|
|
|
return tfdiags.Sourceless(
|
|
tfdiags.Warning,
|
|
"Unresolved resource instance address changes",
|
|
fmt.Sprintf(
|
|
"Terraform tried to adjust resource instance addresses in the prior state based on change information recorded in the configuration, but some adjustments did not succeed due to existing objects already at the intended addresses:%s\n\nTerraform has planned to destroy these objects. If Terraform's proposed changes aren't appropriate, you must first resolve the conflicts using the \"terraform state\" subcommands and then create a new plan.",
|
|
itemsBuf.String(),
|
|
),
|
|
)
|
|
}
|