Closed mcanevet closed 5 years ago
@radekg any thought on this?
Hey @mcanevet, apologies. Last few days were pretty busy. Looks really good. Thank you!
@radekg thanks for merging this.
I have another idea to implement but I don't really know how to do it.
I'd like to have an option to not mark the resource as created if check mode is enabled and the playbook has some changes to apply.
AFAIK, Ansible does not have some kind of --detailed-exitcode
, the only way I found to check if there is some changes to apply is to search for the changed=0
string in the output.
Currently I have to do something like this:
$ terraform taint null_resource.provisioner
$ terraform apply -target null_resource.provisioner | tee /dev/stderr | grep -q changed=0 || terraform taint null_resource.provisioner # dry-run with tainting again if something has to be applied
$ TF_VAR_ansible_check=false terraform apply
That works as long as I have only one null_resource
in my Terraform project, but I usually have 2 (one generic playbook to apply to all my instances, and sometimes one specific module to do some specific stuffs on one instance). In that case, dependencies makes hard to know which null_resource
have to be marked as tainted again.
It would be easier (and more logical I think), if the Ansible provisioner would return in failure if there is some changes to apply and we are in check mode. In that case, my workflow would be:
$ terraform taint null_resource.provisioner
$ terraform apply -target null_resource.provisioner # dry-run, null_resource will not be marked as created if something has to be applied
$ TF_VAR_ansible_check=false terraform apply
Thus if the ansible playbook hasn't converged yet, it will be re-applied.
Maybe I should create an issue for that instead of adding a comment on this PR
When tainting the resource where the provisioning is attached, I'd like to be able to run Ansible in check mode first.
My workflow is:
So that I can conditionally apply/re-apply the playbook with: