You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
terraform/internal/command/validate.go

369 lines
12 KiB

// Copyright (c) HashiCorp, Inc.
// SPDX-License-Identifier: BUSL-1.1
package command
import (
"fmt"
"maps"
"path/filepath"
"slices"
"strings"
"github.com/hashicorp/hcl/v2"
"github.com/hashicorp/hcl/v2/hcldec"
"github.com/hashicorp/terraform/internal/addrs"
backendInit "github.com/hashicorp/terraform/internal/backend/init"
backendPluggable "github.com/hashicorp/terraform/internal/backend/pluggable"
"github.com/hashicorp/terraform/internal/command/arguments"
"github.com/hashicorp/terraform/internal/command/views"
"github.com/hashicorp/terraform/internal/configs"
"github.com/hashicorp/terraform/internal/didyoumean"
"github.com/hashicorp/terraform/internal/providers"
"github.com/hashicorp/terraform/internal/terraform"
"github.com/hashicorp/terraform/internal/tfdiags"
)
// ValidateCommand is a Command implementation that validates the terraform files
type ValidateCommand struct {
Meta
ParsedArgs *arguments.Validate
}
func (c *ValidateCommand) Run(rawArgs []string) int {
// Parse and apply global view arguments
common, rawArgs := arguments.ParseView(rawArgs)
c.View.Configure(common)
// Parse and validate flags
args, diags := arguments.ParseValidate(rawArgs)
if diags.HasErrors() {
c.View.Diagnostics(diags)
c.View.HelpPrompt("validate")
return 1
}
c.ParsedArgs = args
view := views.NewValidate(args.ViewType, c.View)
// After this point, we must only produce JSON output if JSON mode is
// enabled, so all errors should be accumulated into diags and we'll
// print out a suitable result at the end, depending on the format
// selection. All returns from this point on must be tail-calls into
// view.Results in order to produce the expected output.
dir, err := filepath.Abs(args.Path)
if err != nil {
diags = diags.Append(fmt.Errorf("unable to locate module: %s", err))
return view.Results(diags)
}
// Check for user-supplied plugin path
if c.pluginPath, err = c.loadPluginPath(); err != nil {
diags = diags.Append(fmt.Errorf("error loading plugin path: %s", err))
return view.Results(diags)
}
validateDiags := c.validate(dir)
diags = diags.Append(validateDiags)
// Validating with dev overrides in effect means that the result might
// not be valid for a stable release, so we'll warn about that in case
// the user is trying to use "terraform validate" as a sort of pre-flight
// check before submitting a change.
diags = diags.Append(c.providerDevOverrideRuntimeWarnings())
return view.Results(diags)
}
func (c *ValidateCommand) validate(dir string) tfdiags.Diagnostics {
var diags tfdiags.Diagnostics
var cfg *configs.Config
// If the query flag is set, include query files in the validation.
c.includeQueryFiles = c.ParsedArgs.Query
if c.ParsedArgs.NoTests {
cfg, diags = c.loadConfig(dir)
} else {
cfg, diags = c.loadConfigWithTests(dir, c.ParsedArgs.TestDirectory)
}
if diags.HasErrors() {
return diags
}
diags = diags.Append(c.validateConfig(cfg))
// Validation of backend block, if present
// Backend blocks live outside the Terraform graph so we have to do this separately.
switch {
case cfg.Module.Backend != nil:
diags = diags.Append(c.validateBackend(cfg.Module.Backend))
case cfg.Module.StateStore != nil:
diags = diags.Append(c.validateStateStore(cfg.Module.StateStore))
}
// Unless excluded, we'll also do a quick validation of the Terraform test files. These live
// outside the Terraform graph so we have to do this separately.
if !c.ParsedArgs.NoTests {
diags = diags.Append(c.validateTestFiles(cfg))
}
return diags
}
func (c *ValidateCommand) validateConfig(cfg *configs.Config) tfdiags.Diagnostics {
var diags tfdiags.Diagnostics
opts, err := c.contextOpts()
if err != nil {
diags = diags.Append(err)
return diags
}
tfCtx, ctxDiags := terraform.NewContext(opts)
diags = diags.Append(ctxDiags)
if ctxDiags.HasErrors() {
return diags
}
return diags.Append(tfCtx.Validate(cfg, nil))
}
func (c *ValidateCommand) validateTestFiles(cfg *configs.Config) tfdiags.Diagnostics {
diags := tfdiags.Diagnostics{}
validatedModules := make(map[string]bool)
for _, file := range cfg.Module.Tests {
// The file validation only returns warnings so we'll just add them
// without checking anything about them.
diags = diags.Append(file.Validate(cfg))
for _, run := range file.Runs {
if run.Module != nil {
// Then we can also validate the referenced modules, but we are
// only going to do this is if they are local modules.
//
// Basically, local testing modules are something the user can
// reasonably go and fix. If it's a module being downloaded from
// the registry, the expectation is that the author of the
// module should have ran `terraform validate` themselves.
if _, ok := run.Module.Source.(addrs.ModuleSourceLocal); ok {
if validated := validatedModules[run.Module.Source.String()]; !validated {
// Since we can reference the same module twice, let's
// not validate the same thing multiple times.
validatedModules[run.Module.Source.String()] = true
diags = diags.Append(c.validateConfig(run.ConfigUnderTest))
}
}
diags = diags.Append(run.Validate(run.ConfigUnderTest))
} else {
diags = diags.Append(run.Validate(cfg))
}
}
}
return diags
}
// We validate the backend in an offline manner, so we use PrepareConfig to validate the configuration (and ENVs present),
// but we never use the Configure method, as that will interact with third-party systems.
//
// The code in this method is very similar to the `backendInitFromConfig` method, expect it doesn't configure the backend.
func (c *ValidateCommand) validateBackend(cfg *configs.Backend) tfdiags.Diagnostics {
var diags tfdiags.Diagnostics
bf := backendInit.Backend(cfg.Type)
if bf == nil {
detail := fmt.Sprintf("There is no backend type named %q.", cfg.Type)
if msg, removed := backendInit.RemovedBackends[cfg.Type]; removed {
detail = msg
}
diags = diags.Append(&hcl.Diagnostic{
Severity: hcl.DiagError,
Summary: "Unsupported backend type",
Detail: detail,
Subject: &cfg.TypeRange,
})
return diags
}
b := bf()
backendSchema := b.ConfigSchema()
decSpec := backendSchema.DecoderSpec()
configVal, hclDiags := hcldec.Decode(cfg.Config, decSpec, nil)
diags = diags.Append(hclDiags)
if hclDiags.HasErrors() {
return diags
}
_, validateDiags := b.PrepareConfig(configVal)
diags = diags.Append(validateDiags)
if validateDiags.HasErrors() {
return diags
}
return diags
}
// We validate the state store in an offline manner, so we use:
// - State store's PrepareConfig method to validate the state_store block.
// - Provider's ValidateProviderConfig to validate the nested provider block.
// We don't use the Configure method, as that will interact with third-party systems.
//
// The code in this method is very similar to the `stateStoreInitFromConfig` method,
// expect it doesn't configure the provider or the state store.
func (c *ValidateCommand) validateStateStore(cfg *configs.StateStore) tfdiags.Diagnostics {
var diags tfdiags.Diagnostics
locks, depsDiags := c.Meta.lockedDependencies()
if depsDiags.HasErrors() {
// Add some context to the error so it's obvious that it's related to the state store.
newDiag := &hcl.Diagnostic{
Severity: hcl.DiagError,
Summary: "Unable to validate state store configuration",
Detail: fmt.Sprintf("An unexpected error was encountered when loading the dependency locks file. Make sure the working directory has been initialized and try again. Error: %s", diags.Err()),
Subject: &cfg.DeclRange,
}
return diags.Append(newDiag)
}
diags = diags.Append(depsDiags) // Preserve any warnings
factory, pDiags := c.Meta.StateStoreProviderFactoryFromConfig(cfg, locks)
diags = diags.Append(pDiags)
if pDiags.HasErrors() {
return diags
}
provider, err := factory()
if err != nil {
diags = diags.Append(fmt.Errorf("Unable to validate state store configuration. Terraform was unable to obtain a provider instance during state store initialization: %w", err))
return diags
}
defer provider.Close()
resp := provider.GetProviderSchema()
if len(resp.StateStores) == 0 {
diags = diags.Append(&hcl.Diagnostic{
Severity: hcl.DiagError,
Summary: "Provider does not support pluggable state storage",
Detail: fmt.Sprintf("There are no state stores implemented by provider %s (%q)",
cfg.Provider.Name,
cfg.ProviderAddr),
Subject: &cfg.DeclRange,
})
return diags
}
schema, exists := resp.StateStores[cfg.Type]
if !exists {
suggestions := slices.Sorted(maps.Keys(resp.StateStores))
suggestion := didyoumean.NameSuggestion(cfg.Type, suggestions)
if suggestion != "" {
suggestion = fmt.Sprintf(" Did you mean %q?", suggestion)
}
diags = diags.Append(&hcl.Diagnostic{
Severity: hcl.DiagError,
Summary: "State store not implemented by the provider",
Detail: fmt.Sprintf("State store %q is not implemented by provider %s (%q)%s",
cfg.Type, cfg.Provider.Name,
cfg.ProviderAddr, suggestion),
Subject: &cfg.DeclRange,
})
return diags
}
// Handle the nested provider block.
pDecSpec := resp.Provider.Body.DecoderSpec()
pConfig := cfg.Provider.Config
providerConfigVal, pDecDiags := hcldec.Decode(pConfig, pDecSpec, nil)
diags = diags.Append(pDecDiags)
if pDecDiags.HasErrors() {
return diags
}
// Handle the schema for the state store itself, excluding the provider block.
ssdecSpec := schema.Body.DecoderSpec()
stateStoreConfigVal, ssDecDiags := hcldec.Decode(cfg.Config, ssdecSpec, nil)
diags = diags.Append(ssDecDiags)
if ssDecDiags.HasErrors() {
return diags
}
// Validate the provider config
//
// NOTE: We don't configure the provider because the validate command is offline-only.
validateResp := provider.ValidateProviderConfig(providers.ValidateProviderConfigRequest{
Config: providerConfigVal,
})
diags = diags.Append(validateResp.Diagnostics)
if validateResp.Diagnostics.HasErrors() {
return diags
}
// Validate the state store config
//
// NOTE: We don't configure the state store because the validate command is offline-only.
p, err := backendPluggable.NewPluggable(provider, cfg.Type)
if err != nil {
diags = diags.Append(err)
}
_, validateDiags := p.PrepareConfig(stateStoreConfigVal)
diags = diags.Append(validateDiags)
return diags
}
func (c *ValidateCommand) Synopsis() string {
return "Check whether the configuration is valid"
}
func (c *ValidateCommand) Help() string {
helpText := `
Usage: terraform [global options] validate [options]
Validate the configuration files in a directory, referring only to the
configuration and not accessing any remote services such as remote state,
provider APIs, etc.
Validate runs checks that verify whether a configuration is syntactically
valid and internally consistent, regardless of any provided variables or
existing state. It is thus primarily useful for general verification of
reusable modules, including correctness of attribute names and value types.
It is safe to run this command automatically, for example as a post-save
check in a text editor or as a test step for a re-usable module in a CI
system.
Validation requires an initialized working directory with any referenced
plugins and modules installed. To initialize a working directory for
validation without accessing any configured remote backend, use:
terraform init -backend=false
To verify configuration in the context of a particular run (a particular
target workspace, input variable values, etc), use the 'terraform plan'
command instead, which includes an implied validation check.
Options:
-json Produce output in a machine-readable JSON format,
suitable for use in text editor integrations and other
automated systems. Always disables color.
-no-color If specified, output won't contain any color.
-no-tests If specified, Terraform will not validate test files.
-test-directory=path Set the Terraform test directory, defaults to "tests".
-query If specified, the command will also validate .tfquery.hcl files.
`
return strings.TrimSpace(helpText)
}