terraform/terraform/state.go

629 lines
15 KiB
Go
Raw Normal View History

package terraform
import (
"bufio"
2014-09-16 23:26:27 +02:00
"bytes"
"encoding/json"
2014-06-19 01:38:08 +02:00
"fmt"
"io"
"log"
2014-09-16 21:34:08 +02:00
"reflect"
2014-09-16 23:26:27 +02:00
"sort"
"strings"
2014-09-16 21:12:15 +02:00
"github.com/hashicorp/terraform/config"
)
2014-09-16 23:26:27 +02:00
const (
// textStateVersion is the current version for our state file
textStateVersion = 1
)
// rootModulePath is the path of the root module
var rootModulePath = []string{"root"}
// State keeps track of a snapshot state-of-the-world that Terraform
// can use to keep track of what real world resources it is actually
2014-09-16 00:31:17 +02:00
// managing. This is the latest format as of Terraform 0.3
type State struct {
2014-09-16 00:31:17 +02:00
// Version is the protocol version. Currently only "1".
Version int `json:"version"`
2014-09-16 00:31:17 +02:00
// Serial is incremented on any operation that modifies
// the State file. It is used to detect potentially conflicting
// updates.
Serial int64 `json:"serial"`
2014-09-16 00:31:17 +02:00
// Modules contains all the modules in a breadth-first order
Modules []*ModuleState `json:"modules"`
}
// ModuleByPath is used to lookup the module state for the given path.
// This should be the prefered lookup mechanism as it allows for future
// lookup optimizations.
func (s *State) ModuleByPath(path []string) *ModuleState {
2014-09-17 01:21:09 +02:00
if s == nil {
return nil
}
for _, mod := range s.Modules {
2014-09-17 01:55:10 +02:00
if mod.Path == nil {
panic("missing module path")
}
2014-09-16 21:34:08 +02:00
if reflect.DeepEqual(mod.Path, path) {
return mod
}
}
return nil
}
// RootModule returns the ModuleState for the root module
func (s *State) RootModule() *ModuleState {
2014-09-17 00:09:40 +02:00
root := s.ModuleByPath(rootModulePath)
if root == nil {
panic("missing root module")
}
return root
}
2014-09-16 23:26:27 +02:00
func (s *State) init() {
if s.Version == 0 {
s.Version = textStateVersion
}
if len(s.Modules) == 0 {
2014-09-17 00:09:40 +02:00
root := &ModuleState{
Path: rootModulePath,
}
2014-09-16 23:26:27 +02:00
root.init()
s.Modules = []*ModuleState{root}
}
}
func (s *State) deepcopy() *State {
2014-09-16 21:34:08 +02:00
if s == nil {
return nil
}
n := &State{
2014-09-16 21:34:08 +02:00
Version: s.Version,
Serial: s.Serial,
Modules: make([]*ModuleState, 0, len(s.Modules)),
}
for _, mod := range s.Modules {
n.Modules = append(n.Modules, mod.deepcopy())
}
return n
}
2014-09-16 02:06:32 +02:00
// prune is used to remove any resources that are no longer required
func (s *State) prune() {
if s == nil {
return
}
2014-09-16 21:34:08 +02:00
for _, mod := range s.Modules {
2014-09-16 02:06:32 +02:00
mod.prune()
}
}
2014-09-16 21:34:08 +02:00
func (s *State) GoString() string {
return fmt.Sprintf("*%#v", *s)
}
2014-09-16 23:26:27 +02:00
func (s *State) String() string {
var buf bytes.Buffer
for _, m := range s.Modules {
mStr := m.String()
2014-09-16 23:26:27 +02:00
// If we're the root module, we just write the output directly.
if reflect.DeepEqual(m.Path, rootModulePath) {
buf.WriteString(mStr)
continue
2014-09-16 23:26:27 +02:00
}
buf.WriteString(fmt.Sprintf("%s:\n", strings.Join(m.Path, ".")))
2014-09-16 23:26:27 +02:00
s := bufio.NewScanner(strings.NewReader(mStr))
for s.Scan() {
buf.WriteString(fmt.Sprintf(" %s\n", s.Text()))
2014-09-16 23:26:27 +02:00
}
}
return strings.TrimSpace(buf.String())
2014-09-16 23:26:27 +02:00
}
2014-09-16 00:31:17 +02:00
// ModuleState is used to track all the state relevant to a single
// module. Previous to Terraform 0.3, all state belonged to the "root"
// module.
type ModuleState struct {
// Path is the import path from the root module. Modules imports are
// always disjoint, so the path represents amodule tree
Path []string `json:"path"`
// Outputs declared by the module and maintained for each module
// even though only the root module technically needs to be kept.
// This allows operators to inspect values at the boundaries.
Outputs map[string]string `json:"outputs"`
// Resources is a mapping of the logically named resource to
// the state of the resource. Each resource may actually have
// N instances underneath, although a user only needs to think
// about the 1:1 case.
Resources map[string]*ResourceState `json:"resources"`
}
2014-09-16 21:34:08 +02:00
// Orphans returns a list of keys of resources that are in the State
// but aren't present in the configuration itself. Hence, these keys
// represent the state of resources that are orphans.
func (m *ModuleState) Orphans(c *config.Config) []string {
keys := make(map[string]struct{})
for k, _ := range m.Resources {
keys[k] = struct{}{}
}
for _, r := range c.Resources {
delete(keys, r.Id())
// Mark all the counts as not orphans.
for i := 0; i < r.Count; i++ {
delete(keys, fmt.Sprintf("%s.%d", r.Id(), i))
}
}
result := make([]string, 0, len(keys))
for k, _ := range keys {
result = append(result, k)
}
return result
}
2014-09-16 21:12:15 +02:00
func (m *ModuleState) init() {
if m.Outputs == nil {
2014-09-16 21:34:08 +02:00
m.Outputs = make(map[string]string)
2014-09-16 21:12:15 +02:00
}
if m.Resources == nil {
m.Resources = make(map[string]*ResourceState)
}
}
func (m *ModuleState) deepcopy() *ModuleState {
2014-09-16 21:34:08 +02:00
if m == nil {
return nil
}
n := &ModuleState{
Path: make([]string, len(m.Path)),
Outputs: make(map[string]string, len(m.Outputs)),
Resources: make(map[string]*ResourceState, len(m.Resources)),
}
copy(n.Path, m.Path)
for k, v := range m.Outputs {
n.Outputs[k] = v
}
for k, v := range m.Resources {
n.Resources[k] = v.deepcopy()
}
return n
}
2014-09-16 02:06:32 +02:00
// prune is used to remove any resources that are no longer required
func (m *ModuleState) prune() {
for k, v := range m.Resources {
v.prune()
2014-09-16 21:34:08 +02:00
if (v.Primary == nil || v.Primary.ID == "") && len(v.Tainted) == 0 {
2014-09-16 02:06:32 +02:00
delete(m.Resources, k)
}
}
}
2014-09-16 21:34:08 +02:00
func (m *ModuleState) GoString() string {
return fmt.Sprintf("*%#v", *m)
}
func (m *ModuleState) String() string {
if len(m.Resources) == 0 {
return "<no state>"
}
var buf bytes.Buffer
names := make([]string, 0, len(m.Resources))
for name, _ := range m.Resources {
names = append(names, name)
}
sort.Strings(names)
for _, k := range names {
rs := m.Resources[k]
var id string
if rs.Primary != nil {
id = rs.Primary.ID
}
if id == "" {
id = "<not created>"
}
taintStr := ""
if len(rs.Tainted) > 0 {
taintStr = fmt.Sprintf(" (%d tainted)", len(rs.Tainted))
}
buf.WriteString(fmt.Sprintf("%s:%s\n", k, taintStr))
buf.WriteString(fmt.Sprintf(" ID = %s\n", id))
var attributes map[string]string
if rs.Primary != nil {
attributes = rs.Primary.Attributes
}
attrKeys := make([]string, 0, len(attributes))
for ak, _ := range attributes {
if ak == "id" {
continue
}
attrKeys = append(attrKeys, ak)
}
sort.Strings(attrKeys)
for _, ak := range attrKeys {
av := attributes[ak]
buf.WriteString(fmt.Sprintf(" %s = %s\n", ak, av))
}
for idx, t := range rs.Tainted {
buf.WriteString(fmt.Sprintf(" Tainted ID %d = %s\n", idx+1, t.ID))
}
if len(rs.Dependencies) > 0 {
buf.WriteString(fmt.Sprintf("\n Dependencies:\n"))
for _, dep := range rs.Dependencies {
buf.WriteString(fmt.Sprintf(" %s\n", dep))
}
}
}
if len(m.Outputs) > 0 {
buf.WriteString("\nOutputs:\n\n")
ks := make([]string, 0, len(m.Outputs))
for k, _ := range m.Outputs {
ks = append(ks, k)
}
sort.Strings(ks)
for _, k := range ks {
v := m.Outputs[k]
buf.WriteString(fmt.Sprintf("%s = %s\n", k, v))
}
}
return buf.String()
}
2014-09-16 00:31:17 +02:00
// ResourceState holds the state of a resource that is used so that
// a provider can find and manage an existing resource as well as for
// storing attributes that are used to populate variables of child
// resources.
//
// Attributes has attributes about the created resource that are
// queryable in interpolation: "${type.id.attr}"
//
// Extra is just extra data that a provider can return that we store
// for later, but is not exposed in any way to the user.
//
type ResourceState struct {
// This is filled in and managed by Terraform, and is the resource
// type itself such as "mycloud_instance". If a resource provider sets
// this value, it won't be persisted.
Type string `json:"type"`
2014-09-16 00:31:17 +02:00
// Dependencies are a list of things that this resource relies on
// existing to remain intact. For example: an AWS instance might
// depend on a subnet (which itself might depend on a VPC, and so
// on).
//
// Terraform uses this information to build valid destruction
// orders and to warn the user if they're destroying a resource that
// another resource depends on.
//
// Things can be put into this list that may not be managed by
// Terraform. If Terraform doesn't find a matching ID in the
// overall state, then it assumes it isn't managed and doesn't
// worry about it.
Dependencies []string `json:"depends_on,omitempty"`
// Primary is the current active instance for this resource.
// It can be replaced but only after a successful creation.
// This is the instances on which providers will act.
Primary *InstanceState `json:"primary"`
// Tainted is used to track any underlying instances that
// have been created but are in a bad or unknown state and
// need to be cleaned up subsequently. In the
// standard case, there is only at most a single instance.
2014-09-16 00:31:17 +02:00
// However, in pathological cases, it is possible for the number
// of instances to accumulate.
Tainted []*InstanceState `json:"tainted,omitempty"`
2014-09-16 02:30:18 +02:00
}
2014-09-16 21:12:15 +02:00
func (r *ResourceState) init() {
2014-09-16 21:34:08 +02:00
if r.Primary == nil {
r.Primary = &InstanceState{}
2014-09-16 21:12:15 +02:00
}
2014-09-17 01:21:09 +02:00
r.Primary.init()
2014-09-16 21:12:15 +02:00
}
func (r *ResourceState) deepcopy() *ResourceState {
2014-09-16 21:34:08 +02:00
if r == nil {
return nil
}
n := &ResourceState{
Type: r.Type,
Dependencies: make([]string, len(r.Dependencies)),
2014-09-16 21:34:08 +02:00
Primary: r.Primary.deepcopy(),
Tainted: make([]*InstanceState, 0, len(r.Tainted)),
}
copy(n.Dependencies, r.Dependencies)
2014-09-16 21:34:08 +02:00
for _, inst := range r.Tainted {
n.Tainted = append(n.Tainted, inst.deepcopy())
}
return n
}
2014-09-16 02:06:32 +02:00
// prune is used to remove any instances that are no longer required
func (r *ResourceState) prune() {
2014-09-16 21:34:08 +02:00
n := len(r.Tainted)
2014-09-16 02:06:32 +02:00
for i := 0; i < n; i++ {
2014-09-16 21:34:08 +02:00
inst := r.Tainted[i]
2014-09-16 02:06:32 +02:00
if inst.ID == "" {
2014-09-16 21:34:08 +02:00
copy(r.Tainted[i:], r.Tainted[i+1:])
r.Tainted[n-1] = nil
2014-09-16 02:06:32 +02:00
n--
}
}
2014-09-16 21:34:08 +02:00
r.Tainted = r.Tainted[:n]
}
func (s *ResourceState) GoString() string {
return fmt.Sprintf("*%#v", *s)
2014-09-16 02:06:32 +02:00
}
func (s *ResourceState) String() string {
var buf bytes.Buffer
buf.WriteString(fmt.Sprintf("Type = %s", s.Type))
return buf.String()
}
2014-09-16 00:31:17 +02:00
// InstanceState is used to track the unique state information belonging
// to a given instance.
type InstanceState struct {
// A unique ID for this resource. This is opaque to Terraform
// and is only meant as a lookup mechanism for the providers.
ID string `json:"id"`
2014-09-16 00:31:17 +02:00
// Attributes are basic information about the resource. Any keys here
// are accessible in variable format within Terraform configurations:
// ${resourcetype.name.attribute}.
Attributes map[string]string `json:"attributes,omitempty"`
2014-09-16 00:31:17 +02:00
// Ephemeral is used to store any state associated with this instance
// that is necessary for the Terraform run to complete, but is not
// persisted to a state file.
Ephemeral EphemeralState `json:"-"`
}
2014-09-16 21:12:15 +02:00
func (i *InstanceState) init() {
if i.Attributes == nil {
i.Attributes = make(map[string]string)
}
i.Ephemeral.init()
}
func (i *InstanceState) deepcopy() *InstanceState {
2014-09-16 21:34:08 +02:00
if i == nil {
return nil
}
n := &InstanceState{
ID: i.ID,
Ephemeral: *i.Ephemeral.deepcopy(),
}
if i.Attributes != nil {
n.Attributes = make(map[string]string, len(i.Attributes))
for k, v := range i.Attributes {
n.Attributes[k] = v
}
}
return n
}
// MergeDiff takes a ResourceDiff and merges the attributes into
// this resource state in order to generate a new state. This new
// state can be used to provide updated attribute lookups for
// variable interpolation.
//
// If the diff attribute requires computing the value, and hence
// won't be available until apply, the value is replaced with the
// computeID.
2014-09-18 01:33:24 +02:00
func (s *InstanceState) MergeDiff(d *InstanceDiff) *InstanceState {
2014-09-18 02:18:03 +02:00
result := s.deepcopy()
if result == nil {
result = new(InstanceState)
}
result.init()
if s != nil {
for k, v := range s.Attributes {
result.Attributes[k] = v
}
}
if d != nil {
for k, diff := range d.Attributes {
if diff.NewRemoved {
delete(result.Attributes, k)
continue
}
if diff.NewComputed {
result.Attributes[k] = config.UnknownVariableValue
continue
}
result.Attributes[k] = diff.New
}
}
2014-09-18 02:18:03 +02:00
return result
}
2014-09-16 21:34:08 +02:00
func (i *InstanceState) GoString() string {
return fmt.Sprintf("*%#v", *i)
}
2014-09-18 19:40:23 +02:00
func (i *InstanceState) String() string {
var buf bytes.Buffer
if i == nil || i.ID == "" {
2014-09-18 19:40:23 +02:00
return "<not created>"
}
buf.WriteString(fmt.Sprintf("ID = %s\n", i.ID))
attributes := i.Attributes
attrKeys := make([]string, 0, len(attributes))
for ak, _ := range attributes {
if ak == "id" {
continue
}
attrKeys = append(attrKeys, ak)
}
sort.Strings(attrKeys)
for _, ak := range attrKeys {
av := attributes[ak]
buf.WriteString(fmt.Sprintf("%s = %s\n", ak, av))
}
return buf.String()
}
2014-09-16 00:31:17 +02:00
// EphemeralState is used for transient state that is only kept in-memory
type EphemeralState struct {
// ConnInfo is used for the providers to export information which is
// used to connect to the resource for provisioning. For example,
// this could contain SSH or WinRM credentials.
ConnInfo map[string]string `json:"-"`
}
func (e *EphemeralState) init() {
if e.ConnInfo == nil {
e.ConnInfo = make(map[string]string)
}
}
func (e *EphemeralState) deepcopy() *EphemeralState {
2014-09-16 21:34:08 +02:00
if e == nil {
return nil
}
n := &EphemeralState{}
if e.ConnInfo != nil {
n.ConnInfo = make(map[string]string, len(e.ConnInfo))
for k, v := range e.ConnInfo {
n.ConnInfo[k] = v
}
}
return n
}
// ReadState reads a state structure out of a reader in the format that
// was written by WriteState.
func ReadState(src io.Reader) (*State, error) {
buf := bufio.NewReader(src)
// Check if this is a V1 format
start, err := buf.Peek(len(stateFormatMagic))
if err != nil {
return nil, fmt.Errorf("Failed to check for magic bytes: %v", err)
}
if string(start) == stateFormatMagic {
// Read the old state
old, err := ReadStateV1(buf)
if err != nil {
return nil, err
}
return upgradeV1State(old)
}
// Otherwise, must be V2
dec := json.NewDecoder(buf)
state := &State{}
if err := dec.Decode(state); err != nil {
return nil, fmt.Errorf("Decoding state file failed: %v", err)
}
// Check the version, this to ensure we don't read a future
// version that we don't understand
if state.Version > textStateVersion {
return nil, fmt.Errorf("State version %d not supported, please update.",
state.Version)
}
return state, nil
}
// WriteState writes a state somewhere in a binary format.
func WriteState(d *State, dst io.Writer) error {
// Ensure the version is set
d.Version = textStateVersion
// Always increment the serial number
d.Serial++
enc := json.NewEncoder(dst)
if err := enc.Encode(d); err != nil {
return fmt.Errorf("Failed to write state: %v", err)
}
2014-09-16 21:34:08 +02:00
return nil
}
// upgradeV1State is used to upgrade a V1 state representation
// into a proper State representation.
func upgradeV1State(old *StateV1) (*State, error) {
s := &State{}
s.init()
// Old format had no modules, so we migrate everything
// directly into the root module.
root := s.RootModule()
// Copy the outputs
root.Outputs = old.Outputs
// Upgrade the resources
for id, rs := range old.Resources {
newRs := &ResourceState{
Type: rs.Type,
}
root.Resources[id] = newRs
// Migrate to an instance state
instance := &InstanceState{
ID: rs.ID,
Attributes: rs.Attributes,
}
// Check if this is the primary or tainted instance
if _, ok := old.Tainted[id]; ok {
newRs.Tainted = append(newRs.Tainted, instance)
} else {
newRs.Primary = instance
}
// Warn if the resource uses Extra, as there is
// no upgrade path for this! Now totally deprecated.
if len(rs.Extra) > 0 {
2014-09-22 07:36:34 +02:00
log.Printf(
"[WARN] Resource %s uses deprecated attribute "+
"storage, state file upgrade may be incomplete.",
rs.ID,
)
}
}
return s, nil
}