terraform/backend/remote-state/consul/backend_state.go

155 lines
3.6 KiB
Go
Raw Normal View History

2017-03-02 07:15:08 +01:00
package consul
import (
2017-03-02 07:58:51 +01:00
"fmt"
"strings"
2017-03-02 07:15:08 +01:00
"github.com/hashicorp/terraform/backend"
"github.com/hashicorp/terraform/states"
"github.com/hashicorp/terraform/states/remote"
"github.com/hashicorp/terraform/states/statemgr"
2017-03-02 07:58:51 +01:00
)
const (
keyEnvPrefix = "-env:"
2017-03-02 07:15:08 +01:00
)
func (b *Backend) Workspaces() ([]string, error) {
2017-03-02 07:58:51 +01:00
// List our raw path
prefix := b.configData.Get("path").(string) + keyEnvPrefix
keys, _, err := b.client.KV().Keys(prefix, "/", nil)
2017-03-02 07:58:51 +01:00
if err != nil {
return nil, err
}
// Find the envs, we use a map since we can get duplicates with
// path suffixes.
envs := map[string]struct{}{}
for _, key := range keys {
// Consul should ensure this but it doesn't hurt to check again
if strings.HasPrefix(key, prefix) {
key = strings.TrimPrefix(key, prefix)
// Ignore anything with a "/" in it since we store the state
// directly in a key not a directory.
if idx := strings.IndexRune(key, '/'); idx >= 0 {
continue
}
envs[key] = struct{}{}
}
}
result := make([]string, 1, len(envs)+1)
result[0] = backend.DefaultStateName
for k, _ := range envs {
result = append(result, k)
}
return result, nil
2017-03-02 07:15:08 +01:00
}
func (b *Backend) DeleteWorkspace(name string) error {
if name == backend.DefaultStateName || name == "" {
2017-03-02 07:58:51 +01:00
return fmt.Errorf("can't delete default state")
}
2017-03-02 07:15:08 +01:00
2017-03-02 07:58:51 +01:00
// Determine the path of the data
path := b.path(name)
2017-03-02 08:01:28 +01:00
// Delete it. We just delete it without any locking since
// the DeleteState API is documented as such.
_, err := b.client.KV().Delete(path, nil)
2017-03-02 07:58:51 +01:00
return err
}
func (b *Backend) StateMgr(name string) (statemgr.Full, error) {
2017-03-02 07:15:08 +01:00
// Determine the path of the data
2017-03-02 07:58:51 +01:00
path := b.path(name)
2017-03-02 07:15:08 +01:00
// Determine whether to gzip or not
gzip := b.configData.Get("gzip").(bool)
2017-03-02 07:58:51 +01:00
// Build the state client
var stateMgr = &remote.State{
2017-03-02 07:15:08 +01:00
Client: &RemoteClient{
Client: b.client,
Path: path,
GZip: gzip,
lockState: b.lock,
2017-03-02 07:15:08 +01:00
},
2017-03-02 07:58:51 +01:00
}
if !b.lock {
stateMgr.DisableLocks()
}
// the default state always exists
if name == backend.DefaultStateName {
return stateMgr, nil
}
2017-03-02 07:58:51 +01:00
// Grab a lock, we use this to write an empty state if one doesn't
// exist already. We have to write an empty state as a sentinel value
// so States() knows it exists.
lockInfo := statemgr.NewLockInfo()
2017-03-02 07:58:51 +01:00
lockInfo.Operation = "init"
lockId, err := stateMgr.Lock(lockInfo)
2017-03-02 07:58:51 +01:00
if err != nil {
return nil, fmt.Errorf("failed to lock state in Consul: %s", err)
}
// Local helper function so we can call it multiple places
lockUnlock := func(parent error) error {
if err := stateMgr.Unlock(lockId); err != nil {
2017-03-02 07:58:51 +01:00
return fmt.Errorf(strings.TrimSpace(errStateUnlock), lockId, err)
}
return parent
}
// Grab the value
if err := stateMgr.RefreshState(); err != nil {
err = lockUnlock(err)
return nil, err
}
// If we have no state, we have to create an empty state
if v := stateMgr.State(); v == nil {
if err := stateMgr.WriteState(states.NewState()); err != nil {
2017-03-02 07:58:51 +01:00
err = lockUnlock(err)
return nil, err
}
if err := stateMgr.PersistState(); err != nil {
err = lockUnlock(err)
return nil, err
}
}
// Unlock, the state should now be initialized
if err := lockUnlock(nil); err != nil {
return nil, err
}
return stateMgr, nil
}
func (b *Backend) path(name string) string {
path := b.configData.Get("path").(string)
if name != backend.DefaultStateName {
path += fmt.Sprintf("%s%s", keyEnvPrefix, name)
}
return path
2017-03-02 07:15:08 +01:00
}
2017-03-02 07:58:51 +01:00
const errStateUnlock = `
Error unlocking Consul state. Lock ID: %s
Error: %s
You may have to force-unlock this state in order to use it again.
The Consul backend acquires a lock during initialization to ensure
the minimum required key/values are prepared.
`