Skip to content

Commit 1db29d7

Browse files
committed
unmark planned data source values
1 parent 0c8b4ce commit 1db29d7

File tree

2 files changed

+122
-6
lines changed

2 files changed

+122
-6
lines changed

terraform/context_plan2_test.go

+115
Original file line numberDiff line numberDiff line change
@@ -515,3 +515,118 @@ output "root" {
515515
t.Fatalf("wrong error:\ngot: %s\nwant: message containing %q", got, want)
516516
}
517517
}
518+
519+
func TestContext2Plan_planDataSourceSensitiveNested(t *testing.T) {
520+
m := testModuleInline(t, map[string]string{
521+
"main.tf": `
522+
resource "test_instance" "bar" {
523+
}
524+
525+
data "test_data_source" "foo" {
526+
foo {
527+
bar = test_instance.bar.sensitive
528+
}
529+
}
530+
`,
531+
})
532+
533+
p := new(MockProvider)
534+
p.PlanResourceChangeFn = func(req providers.PlanResourceChangeRequest) (resp providers.PlanResourceChangeResponse) {
535+
resp.PlannedState = cty.ObjectVal(map[string]cty.Value{
536+
"sensitive": cty.UnknownVal(cty.String),
537+
})
538+
return resp
539+
}
540+
p.GetProviderSchemaResponse = getProviderSchemaResponseFromProviderSchema(&ProviderSchema{
541+
ResourceTypes: map[string]*configschema.Block{
542+
"test_instance": {
543+
Attributes: map[string]*configschema.Attribute{
544+
"sensitive": {
545+
Type: cty.String,
546+
Computed: true,
547+
Sensitive: true,
548+
},
549+
},
550+
},
551+
},
552+
DataSources: map[string]*configschema.Block{
553+
"test_data_source": {
554+
Attributes: map[string]*configschema.Attribute{
555+
"id": {
556+
Type: cty.String,
557+
Computed: true,
558+
},
559+
},
560+
BlockTypes: map[string]*configschema.NestedBlock{
561+
"foo": {
562+
Block: configschema.Block{
563+
Attributes: map[string]*configschema.Attribute{
564+
"bar": {Type: cty.String, Optional: true},
565+
},
566+
},
567+
Nesting: configschema.NestingSet,
568+
},
569+
},
570+
},
571+
},
572+
})
573+
574+
state := states.NewState()
575+
root := state.EnsureModule(addrs.RootModuleInstance)
576+
root.SetResourceInstanceCurrent(
577+
mustResourceInstanceAddr("data.test_data_source.foo").Resource,
578+
&states.ResourceInstanceObjectSrc{
579+
Status: states.ObjectReady,
580+
AttrsJSON: []byte(`{"string":"data_id", "foo":[{"bar":"old"}]}`),
581+
AttrSensitivePaths: []cty.PathValueMarks{
582+
{
583+
Path: cty.GetAttrPath("foo"),
584+
Marks: cty.NewValueMarks("sensitive"),
585+
},
586+
},
587+
},
588+
mustProviderConfig(`provider["registry.terraform.io/hashicorp/test"]`),
589+
)
590+
root.SetResourceInstanceCurrent(
591+
mustResourceInstanceAddr("test_instance.bar").Resource,
592+
&states.ResourceInstanceObjectSrc{
593+
Status: states.ObjectReady,
594+
AttrsJSON: []byte(`{"sensitive":"old"}`),
595+
AttrSensitivePaths: []cty.PathValueMarks{
596+
{
597+
Path: cty.GetAttrPath("sensitive"),
598+
Marks: cty.NewValueMarks("sensitive"),
599+
},
600+
},
601+
},
602+
mustProviderConfig(`provider["registry.terraform.io/hashicorp/test"]`),
603+
)
604+
605+
ctx := testContext2(t, &ContextOpts{
606+
Config: m,
607+
Providers: map[addrs.Provider]providers.Factory{
608+
addrs.NewDefaultProvider("test"): testProviderFuncFixed(p),
609+
},
610+
State: state,
611+
})
612+
613+
plan, diags := ctx.Plan()
614+
if diags.HasErrors() {
615+
t.Fatal(diags.ErrWithWarnings())
616+
}
617+
618+
for _, res := range plan.Changes.Resources {
619+
switch res.Addr.String() {
620+
case "test_instance.bar":
621+
if res.Action != plans.Update {
622+
t.Fatalf("unexpected %s change for %s", res.Action, res.Addr)
623+
}
624+
case "data.test_data_source.foo":
625+
if res.Action != plans.Read {
626+
t.Fatalf("unexpected %s change for %s", res.Action, res.Addr)
627+
}
628+
default:
629+
t.Fatalf("unexpected %s change for %s", res.Action, res.Addr)
630+
}
631+
}
632+
}

terraform/node_resource_abstract_instance.go

+7-6
Original file line numberDiff line numberDiff line change
@@ -1346,6 +1346,11 @@ func (n *NodeAbstractResourceInstance) planDataSource(ctx EvalContext, currentSt
13461346
return nil, nil, diags
13471347
}
13481348

1349+
unmarkedConfigVal, configMarkPaths := configVal.UnmarkDeepWithPaths()
1350+
// We drop marks on the values used here as the result is only
1351+
// temporarily used for validation.
1352+
unmarkedPriorVal, _ := priorVal.UnmarkDeep()
1353+
13491354
configKnown := configVal.IsWhollyKnown()
13501355
// If our configuration contains any unknown values, or we depend on any
13511356
// unknown values then we must defer the read to the apply phase by
@@ -1358,14 +1363,15 @@ func (n *NodeAbstractResourceInstance) planDataSource(ctx EvalContext, currentSt
13581363
log.Printf("[TRACE] planDataSource: %s configuration not fully known yet, so deferring to apply phase", n.Addr)
13591364
}
13601365

1361-
proposedNewVal := objchange.PlannedDataResourceObject(schema, configVal)
1366+
proposedNewVal := objchange.PlannedDataResourceObject(schema, unmarkedConfigVal)
13621367

13631368
diags = diags.Append(ctx.Hook(func(h Hook) (HookAction, error) {
13641369
return h.PreDiff(n.Addr, states.CurrentGen, priorVal, proposedNewVal)
13651370
}))
13661371
if diags.HasErrors() {
13671372
return nil, nil, diags
13681373
}
1374+
proposedNewVal = proposedNewVal.MarkWithPaths(configMarkPaths)
13691375

13701376
// Apply detects that the data source will need to be read by the After
13711377
// value containing unknowns from PlanDataResourceObject.
@@ -1408,11 +1414,6 @@ func (n *NodeAbstractResourceInstance) planDataSource(ctx EvalContext, currentSt
14081414

14091415
// if we have a prior value, we can check for any irregularities in the response
14101416
if !priorVal.IsNull() {
1411-
// We drop marks on the values used here as the result is only
1412-
// temporarily used for validation.
1413-
unmarkedConfigVal, _ := configVal.UnmarkDeep()
1414-
unmarkedPriorVal, _ := priorVal.UnmarkDeep()
1415-
14161417
// While we don't propose planned changes for data sources, we can
14171418
// generate a proposed value for comparison to ensure the data source
14181419
// is returning a result following the rules of the provider contract.

0 commit comments

Comments
 (0)