kubeform.dev/terraform-backend-sdk@v0.0.0-20220310143633-45f07fe731c5/plans/planfile/tfplan.go (about) 1 package planfile 2 3 import ( 4 "fmt" 5 "io" 6 "io/ioutil" 7 8 "google.golang.org/protobuf/proto" 9 10 "kubeform.dev/terraform-backend-sdk/addrs" 11 "kubeform.dev/terraform-backend-sdk/lang/marks" 12 "kubeform.dev/terraform-backend-sdk/plans" 13 "kubeform.dev/terraform-backend-sdk/plans/internal/planproto" 14 "kubeform.dev/terraform-backend-sdk/states" 15 "kubeform.dev/terraform-backend-sdk/version" 16 "github.com/zclconf/go-cty/cty" 17 ) 18 19 const tfplanFormatVersion = 3 20 const tfplanFilename = "tfplan" 21 22 // --------------------------------------------------------------------------- 23 // This file deals with the internal structure of the "tfplan" sub-file within 24 // the plan file format. It's all private API, wrapped by methods defined 25 // elsewhere. This is the only file that should import the 26 // ../internal/planproto package, which contains the ugly stubs generated 27 // by the protobuf compiler. 28 // --------------------------------------------------------------------------- 29 30 // readTfplan reads a protobuf-encoded description from the plan portion of 31 // a plan file, which is stored in a special file in the archive called 32 // "tfplan". 33 func readTfplan(r io.Reader) (*plans.Plan, error) { 34 src, err := ioutil.ReadAll(r) 35 if err != nil { 36 return nil, err 37 } 38 39 var rawPlan planproto.Plan 40 err = proto.Unmarshal(src, &rawPlan) 41 if err != nil { 42 return nil, fmt.Errorf("parse error: %s", err) 43 } 44 45 if rawPlan.Version != tfplanFormatVersion { 46 return nil, fmt.Errorf("unsupported plan file format version %d; only version %d is supported", rawPlan.Version, tfplanFormatVersion) 47 } 48 49 if rawPlan.TerraformVersion != version.String() { 50 return nil, fmt.Errorf("plan file was created by Terraform %s, but this is %s; plan files cannot be transferred between different Terraform versions", rawPlan.TerraformVersion, version.String()) 51 } 52 53 plan := &plans.Plan{ 54 VariableValues: map[string]plans.DynamicValue{}, 55 Changes: &plans.Changes{ 56 Outputs: []*plans.OutputChangeSrc{}, 57 Resources: []*plans.ResourceInstanceChangeSrc{}, 58 }, 59 DriftedResources: []*plans.ResourceInstanceChangeSrc{}, 60 61 ProviderSHA256s: map[string][]byte{}, 62 } 63 64 switch rawPlan.UiMode { 65 case planproto.Mode_NORMAL: 66 plan.UIMode = plans.NormalMode 67 case planproto.Mode_DESTROY: 68 plan.UIMode = plans.DestroyMode 69 case planproto.Mode_REFRESH_ONLY: 70 plan.UIMode = plans.RefreshOnlyMode 71 default: 72 return nil, fmt.Errorf("plan has invalid mode %s", rawPlan.UiMode) 73 } 74 75 for _, rawOC := range rawPlan.OutputChanges { 76 name := rawOC.Name 77 change, err := changeFromTfplan(rawOC.Change) 78 if err != nil { 79 return nil, fmt.Errorf("invalid plan for output %q: %s", name, err) 80 } 81 82 plan.Changes.Outputs = append(plan.Changes.Outputs, &plans.OutputChangeSrc{ 83 // All output values saved in the plan file are root module outputs, 84 // since we don't retain others. (They can be easily recomputed 85 // during apply). 86 Addr: addrs.OutputValue{Name: name}.Absolute(addrs.RootModuleInstance), 87 ChangeSrc: *change, 88 Sensitive: rawOC.Sensitive, 89 }) 90 } 91 92 for _, rawRC := range rawPlan.ResourceChanges { 93 change, err := resourceChangeFromTfplan(rawRC) 94 if err != nil { 95 // errors from resourceChangeFromTfplan already include context 96 return nil, err 97 } 98 99 plan.Changes.Resources = append(plan.Changes.Resources, change) 100 } 101 102 for _, rawRC := range rawPlan.ResourceDrift { 103 change, err := resourceChangeFromTfplan(rawRC) 104 if err != nil { 105 // errors from resourceChangeFromTfplan already include context 106 return nil, err 107 } 108 109 plan.DriftedResources = append(plan.DriftedResources, change) 110 } 111 112 for _, rawTargetAddr := range rawPlan.TargetAddrs { 113 target, diags := addrs.ParseTargetStr(rawTargetAddr) 114 if diags.HasErrors() { 115 return nil, fmt.Errorf("plan contains invalid target address %q: %s", target, diags.Err()) 116 } 117 plan.TargetAddrs = append(plan.TargetAddrs, target.Subject) 118 } 119 120 for _, rawReplaceAddr := range rawPlan.ForceReplaceAddrs { 121 addr, diags := addrs.ParseAbsResourceInstanceStr(rawReplaceAddr) 122 if diags.HasErrors() { 123 return nil, fmt.Errorf("plan contains invalid force-replace address %q: %s", addr, diags.Err()) 124 } 125 plan.ForceReplaceAddrs = append(plan.ForceReplaceAddrs, addr) 126 } 127 128 for name, rawHashObj := range rawPlan.ProviderHashes { 129 if len(rawHashObj.Sha256) == 0 { 130 return nil, fmt.Errorf("no SHA256 hash for provider %q plugin", name) 131 } 132 133 plan.ProviderSHA256s[name] = rawHashObj.Sha256 134 } 135 136 for name, rawVal := range rawPlan.Variables { 137 val, err := valueFromTfplan(rawVal) 138 if err != nil { 139 return nil, fmt.Errorf("invalid value for input variable %q: %s", name, err) 140 } 141 plan.VariableValues[name] = val 142 } 143 144 if rawBackend := rawPlan.Backend; rawBackend == nil { 145 return nil, fmt.Errorf("plan file has no backend settings; backend settings are required") 146 } else { 147 config, err := valueFromTfplan(rawBackend.Config) 148 if err != nil { 149 return nil, fmt.Errorf("plan file has invalid backend configuration: %s", err) 150 } 151 plan.Backend = plans.Backend{ 152 Type: rawBackend.Type, 153 Config: config, 154 Workspace: rawBackend.Workspace, 155 } 156 } 157 158 return plan, nil 159 } 160 161 func resourceChangeFromTfplan(rawChange *planproto.ResourceInstanceChange) (*plans.ResourceInstanceChangeSrc, error) { 162 if rawChange == nil { 163 // Should never happen in practice, since protobuf can't represent 164 // a nil value in a list. 165 return nil, fmt.Errorf("resource change object is absent") 166 } 167 168 ret := &plans.ResourceInstanceChangeSrc{} 169 170 if rawChange.Addr == "" { 171 // If "Addr" isn't populated then seems likely that this is a plan 172 // file created by an earlier version of Terraform, which had the 173 // same information spread over various other fields: 174 // ModulePath, Mode, Name, Type, and InstanceKey. 175 return nil, fmt.Errorf("no instance address for resource instance change; perhaps this plan was created by a different version of Terraform?") 176 } 177 178 instAddr, diags := addrs.ParseAbsResourceInstanceStr(rawChange.Addr) 179 if diags.HasErrors() { 180 return nil, fmt.Errorf("invalid resource instance address %q: %w", rawChange.Addr, diags.Err()) 181 } 182 prevRunAddr := instAddr 183 if rawChange.PrevRunAddr != "" { 184 prevRunAddr, diags = addrs.ParseAbsResourceInstanceStr(rawChange.PrevRunAddr) 185 if diags.HasErrors() { 186 return nil, fmt.Errorf("invalid resource instance previous run address %q: %w", rawChange.PrevRunAddr, diags.Err()) 187 } 188 } 189 190 providerAddr, diags := addrs.ParseAbsProviderConfigStr(rawChange.Provider) 191 if diags.HasErrors() { 192 return nil, diags.Err() 193 } 194 ret.ProviderAddr = providerAddr 195 196 ret.Addr = instAddr 197 ret.PrevRunAddr = prevRunAddr 198 199 if rawChange.DeposedKey != "" { 200 if len(rawChange.DeposedKey) != 8 { 201 return nil, fmt.Errorf("deposed object for %s has invalid deposed key %q", ret.Addr, rawChange.DeposedKey) 202 } 203 ret.DeposedKey = states.DeposedKey(rawChange.DeposedKey) 204 } 205 206 ret.RequiredReplace = cty.NewPathSet() 207 for _, p := range rawChange.RequiredReplace { 208 path, err := pathFromTfplan(p) 209 if err != nil { 210 return nil, fmt.Errorf("invalid path in required replace: %s", err) 211 } 212 ret.RequiredReplace.Add(path) 213 } 214 215 change, err := changeFromTfplan(rawChange.Change) 216 if err != nil { 217 return nil, fmt.Errorf("invalid plan for resource %s: %s", ret.Addr, err) 218 } 219 220 ret.ChangeSrc = *change 221 222 switch rawChange.ActionReason { 223 case planproto.ResourceInstanceActionReason_NONE: 224 ret.ActionReason = plans.ResourceInstanceChangeNoReason 225 case planproto.ResourceInstanceActionReason_REPLACE_BECAUSE_CANNOT_UPDATE: 226 ret.ActionReason = plans.ResourceInstanceReplaceBecauseCannotUpdate 227 case planproto.ResourceInstanceActionReason_REPLACE_BECAUSE_TAINTED: 228 ret.ActionReason = plans.ResourceInstanceReplaceBecauseTainted 229 case planproto.ResourceInstanceActionReason_REPLACE_BY_REQUEST: 230 ret.ActionReason = plans.ResourceInstanceReplaceByRequest 231 default: 232 return nil, fmt.Errorf("resource has invalid action reason %s", rawChange.ActionReason) 233 } 234 235 if len(rawChange.Private) != 0 { 236 ret.Private = rawChange.Private 237 } 238 239 return ret, nil 240 } 241 242 func changeFromTfplan(rawChange *planproto.Change) (*plans.ChangeSrc, error) { 243 if rawChange == nil { 244 return nil, fmt.Errorf("change object is absent") 245 } 246 247 ret := &plans.ChangeSrc{} 248 249 // -1 indicates that there is no index. We'll customize these below 250 // depending on the change action, and then decode. 251 beforeIdx, afterIdx := -1, -1 252 253 switch rawChange.Action { 254 case planproto.Action_NOOP: 255 ret.Action = plans.NoOp 256 beforeIdx = 0 257 afterIdx = 0 258 case planproto.Action_CREATE: 259 ret.Action = plans.Create 260 afterIdx = 0 261 case planproto.Action_READ: 262 ret.Action = plans.Read 263 beforeIdx = 0 264 afterIdx = 1 265 case planproto.Action_UPDATE: 266 ret.Action = plans.Update 267 beforeIdx = 0 268 afterIdx = 1 269 case planproto.Action_DELETE: 270 ret.Action = plans.Delete 271 beforeIdx = 0 272 case planproto.Action_CREATE_THEN_DELETE: 273 ret.Action = plans.CreateThenDelete 274 beforeIdx = 0 275 afterIdx = 1 276 case planproto.Action_DELETE_THEN_CREATE: 277 ret.Action = plans.DeleteThenCreate 278 beforeIdx = 0 279 afterIdx = 1 280 default: 281 return nil, fmt.Errorf("invalid change action %s", rawChange.Action) 282 } 283 284 if beforeIdx != -1 { 285 if l := len(rawChange.Values); l <= beforeIdx { 286 return nil, fmt.Errorf("incorrect number of values (%d) for %s change", l, rawChange.Action) 287 } 288 var err error 289 ret.Before, err = valueFromTfplan(rawChange.Values[beforeIdx]) 290 if err != nil { 291 return nil, fmt.Errorf("invalid \"before\" value: %s", err) 292 } 293 if ret.Before == nil { 294 return nil, fmt.Errorf("missing \"before\" value: %s", err) 295 } 296 } 297 if afterIdx != -1 { 298 if l := len(rawChange.Values); l <= afterIdx { 299 return nil, fmt.Errorf("incorrect number of values (%d) for %s change", l, rawChange.Action) 300 } 301 var err error 302 ret.After, err = valueFromTfplan(rawChange.Values[afterIdx]) 303 if err != nil { 304 return nil, fmt.Errorf("invalid \"after\" value: %s", err) 305 } 306 if ret.After == nil { 307 return nil, fmt.Errorf("missing \"after\" value: %s", err) 308 } 309 } 310 311 sensitive := cty.NewValueMarks(marks.Sensitive) 312 beforeValMarks, err := pathValueMarksFromTfplan(rawChange.BeforeSensitivePaths, sensitive) 313 if err != nil { 314 return nil, fmt.Errorf("failed to decode before sensitive paths: %s", err) 315 } 316 afterValMarks, err := pathValueMarksFromTfplan(rawChange.AfterSensitivePaths, sensitive) 317 if err != nil { 318 return nil, fmt.Errorf("failed to decode after sensitive paths: %s", err) 319 } 320 if len(beforeValMarks) > 0 { 321 ret.BeforeValMarks = beforeValMarks 322 } 323 if len(afterValMarks) > 0 { 324 ret.AfterValMarks = afterValMarks 325 } 326 327 return ret, nil 328 } 329 330 func valueFromTfplan(rawV *planproto.DynamicValue) (plans.DynamicValue, error) { 331 if len(rawV.Msgpack) == 0 { // len(0) because that's the default value for a "bytes" in protobuf 332 return nil, fmt.Errorf("dynamic value does not have msgpack serialization") 333 } 334 335 return plans.DynamicValue(rawV.Msgpack), nil 336 } 337 338 // writeTfplan serializes the given plan into the protobuf-based format used 339 // for the "tfplan" portion of a plan file. 340 func writeTfplan(plan *plans.Plan, w io.Writer) error { 341 if plan == nil { 342 return fmt.Errorf("cannot write plan file for nil plan") 343 } 344 if plan.Changes == nil { 345 return fmt.Errorf("cannot write plan file with nil changeset") 346 } 347 348 rawPlan := &planproto.Plan{ 349 Version: tfplanFormatVersion, 350 TerraformVersion: version.String(), 351 ProviderHashes: map[string]*planproto.Hash{}, 352 353 Variables: map[string]*planproto.DynamicValue{}, 354 OutputChanges: []*planproto.OutputChange{}, 355 ResourceChanges: []*planproto.ResourceInstanceChange{}, 356 ResourceDrift: []*planproto.ResourceInstanceChange{}, 357 } 358 359 switch plan.UIMode { 360 case plans.NormalMode: 361 rawPlan.UiMode = planproto.Mode_NORMAL 362 case plans.DestroyMode: 363 rawPlan.UiMode = planproto.Mode_DESTROY 364 case plans.RefreshOnlyMode: 365 rawPlan.UiMode = planproto.Mode_REFRESH_ONLY 366 default: 367 return fmt.Errorf("plan has unsupported mode %s", plan.UIMode) 368 } 369 370 for _, oc := range plan.Changes.Outputs { 371 // When serializing a plan we only retain the root outputs, since 372 // changes to these are externally-visible side effects (e.g. via 373 // terraform_remote_state). 374 if !oc.Addr.Module.IsRoot() { 375 continue 376 } 377 378 name := oc.Addr.OutputValue.Name 379 380 // Writing outputs as cty.DynamicPseudoType forces the stored values 381 // to also contain dynamic type information, so we can recover the 382 // original type when we read the values back in readTFPlan. 383 protoChange, err := changeToTfplan(&oc.ChangeSrc) 384 if err != nil { 385 return fmt.Errorf("cannot write output value %q: %s", name, err) 386 } 387 388 rawPlan.OutputChanges = append(rawPlan.OutputChanges, &planproto.OutputChange{ 389 Name: name, 390 Change: protoChange, 391 Sensitive: oc.Sensitive, 392 }) 393 } 394 395 for _, rc := range plan.Changes.Resources { 396 rawRC, err := resourceChangeToTfplan(rc) 397 if err != nil { 398 return err 399 } 400 rawPlan.ResourceChanges = append(rawPlan.ResourceChanges, rawRC) 401 } 402 403 for _, rc := range plan.DriftedResources { 404 rawRC, err := resourceChangeToTfplan(rc) 405 if err != nil { 406 return err 407 } 408 rawPlan.ResourceDrift = append(rawPlan.ResourceDrift, rawRC) 409 } 410 411 for _, targetAddr := range plan.TargetAddrs { 412 rawPlan.TargetAddrs = append(rawPlan.TargetAddrs, targetAddr.String()) 413 } 414 415 for _, replaceAddr := range plan.ForceReplaceAddrs { 416 rawPlan.ForceReplaceAddrs = append(rawPlan.ForceReplaceAddrs, replaceAddr.String()) 417 } 418 419 for name, hash := range plan.ProviderSHA256s { 420 rawPlan.ProviderHashes[name] = &planproto.Hash{ 421 Sha256: hash, 422 } 423 } 424 425 for name, val := range plan.VariableValues { 426 rawPlan.Variables[name] = valueToTfplan(val) 427 } 428 429 if plan.Backend.Type == "" || plan.Backend.Config == nil { 430 // This suggests a bug in the code that created the plan, since it 431 // ought to always have a backend populated, even if it's the default 432 // "local" backend with a local state file. 433 return fmt.Errorf("plan does not have a backend configuration") 434 } 435 436 rawPlan.Backend = &planproto.Backend{ 437 Type: plan.Backend.Type, 438 Config: valueToTfplan(plan.Backend.Config), 439 Workspace: plan.Backend.Workspace, 440 } 441 442 src, err := proto.Marshal(rawPlan) 443 if err != nil { 444 return fmt.Errorf("serialization error: %s", err) 445 } 446 447 _, err = w.Write(src) 448 if err != nil { 449 return fmt.Errorf("failed to write plan to plan file: %s", err) 450 } 451 452 return nil 453 } 454 455 func resourceChangeToTfplan(change *plans.ResourceInstanceChangeSrc) (*planproto.ResourceInstanceChange, error) { 456 ret := &planproto.ResourceInstanceChange{} 457 458 if change.PrevRunAddr.Resource.Resource.Type == "" { 459 // Suggests that an old caller wasn't yet updated to populate this 460 // properly. All code that generates plans should populate this field, 461 // even if it's just to write in the same value as in change.Addr. 462 change.PrevRunAddr = change.Addr 463 } 464 465 ret.Addr = change.Addr.String() 466 ret.PrevRunAddr = change.PrevRunAddr.String() 467 if ret.PrevRunAddr == ret.Addr { 468 // In the on-disk format we leave PrevRunAddr unpopulated in the common 469 // case where it's the same as Addr, and then fill it back in again on 470 // read. 471 ret.PrevRunAddr = "" 472 } 473 474 ret.DeposedKey = string(change.DeposedKey) 475 ret.Provider = change.ProviderAddr.String() 476 477 requiredReplace := change.RequiredReplace.List() 478 ret.RequiredReplace = make([]*planproto.Path, 0, len(requiredReplace)) 479 for _, p := range requiredReplace { 480 path, err := pathToTfplan(p) 481 if err != nil { 482 return nil, fmt.Errorf("invalid path in required replace: %s", err) 483 } 484 ret.RequiredReplace = append(ret.RequiredReplace, path) 485 } 486 487 valChange, err := changeToTfplan(&change.ChangeSrc) 488 if err != nil { 489 return nil, fmt.Errorf("failed to serialize resource %s change: %s", change.Addr, err) 490 } 491 ret.Change = valChange 492 493 switch change.ActionReason { 494 case plans.ResourceInstanceChangeNoReason: 495 ret.ActionReason = planproto.ResourceInstanceActionReason_NONE 496 case plans.ResourceInstanceReplaceBecauseCannotUpdate: 497 ret.ActionReason = planproto.ResourceInstanceActionReason_REPLACE_BECAUSE_CANNOT_UPDATE 498 case plans.ResourceInstanceReplaceBecauseTainted: 499 ret.ActionReason = planproto.ResourceInstanceActionReason_REPLACE_BECAUSE_TAINTED 500 case plans.ResourceInstanceReplaceByRequest: 501 ret.ActionReason = planproto.ResourceInstanceActionReason_REPLACE_BY_REQUEST 502 default: 503 return nil, fmt.Errorf("resource %s has unsupported action reason %s", change.Addr, change.ActionReason) 504 } 505 506 if len(change.Private) > 0 { 507 ret.Private = change.Private 508 } 509 510 return ret, nil 511 } 512 513 func changeToTfplan(change *plans.ChangeSrc) (*planproto.Change, error) { 514 ret := &planproto.Change{} 515 516 before := valueToTfplan(change.Before) 517 after := valueToTfplan(change.After) 518 519 beforeSensitivePaths, err := pathValueMarksToTfplan(change.BeforeValMarks) 520 if err != nil { 521 return nil, err 522 } 523 afterSensitivePaths, err := pathValueMarksToTfplan(change.AfterValMarks) 524 if err != nil { 525 return nil, err 526 } 527 ret.BeforeSensitivePaths = beforeSensitivePaths 528 ret.AfterSensitivePaths = afterSensitivePaths 529 530 switch change.Action { 531 case plans.NoOp: 532 ret.Action = planproto.Action_NOOP 533 ret.Values = []*planproto.DynamicValue{before} // before and after should be identical 534 case plans.Create: 535 ret.Action = planproto.Action_CREATE 536 ret.Values = []*planproto.DynamicValue{after} 537 case plans.Read: 538 ret.Action = planproto.Action_READ 539 ret.Values = []*planproto.DynamicValue{before, after} 540 case plans.Update: 541 ret.Action = planproto.Action_UPDATE 542 ret.Values = []*planproto.DynamicValue{before, after} 543 case plans.Delete: 544 ret.Action = planproto.Action_DELETE 545 ret.Values = []*planproto.DynamicValue{before} 546 case plans.DeleteThenCreate: 547 ret.Action = planproto.Action_DELETE_THEN_CREATE 548 ret.Values = []*planproto.DynamicValue{before, after} 549 case plans.CreateThenDelete: 550 ret.Action = planproto.Action_CREATE_THEN_DELETE 551 ret.Values = []*planproto.DynamicValue{before, after} 552 default: 553 return nil, fmt.Errorf("invalid change action %s", change.Action) 554 } 555 556 return ret, nil 557 } 558 559 func valueToTfplan(val plans.DynamicValue) *planproto.DynamicValue { 560 if val == nil { 561 // protobuf can't represent nil, so we'll represent it as a 562 // DynamicValue that has no serializations at all. 563 return &planproto.DynamicValue{} 564 } 565 return &planproto.DynamicValue{ 566 Msgpack: []byte(val), 567 } 568 } 569 570 func pathValueMarksFromTfplan(paths []*planproto.Path, marks cty.ValueMarks) ([]cty.PathValueMarks, error) { 571 ret := make([]cty.PathValueMarks, 0, len(paths)) 572 for _, p := range paths { 573 path, err := pathFromTfplan(p) 574 if err != nil { 575 return nil, err 576 } 577 ret = append(ret, cty.PathValueMarks{ 578 Path: path, 579 Marks: marks, 580 }) 581 } 582 return ret, nil 583 } 584 585 func pathValueMarksToTfplan(pvm []cty.PathValueMarks) ([]*planproto.Path, error) { 586 ret := make([]*planproto.Path, 0, len(pvm)) 587 for _, p := range pvm { 588 path, err := pathToTfplan(p.Path) 589 if err != nil { 590 return nil, err 591 } 592 ret = append(ret, path) 593 } 594 return ret, nil 595 } 596 597 func pathFromTfplan(path *planproto.Path) (cty.Path, error) { 598 ret := make([]cty.PathStep, 0, len(path.Steps)) 599 for _, step := range path.Steps { 600 switch s := step.Selector.(type) { 601 case *planproto.Path_Step_ElementKey: 602 dynamicVal, err := valueFromTfplan(s.ElementKey) 603 if err != nil { 604 return nil, fmt.Errorf("error decoding path index step: %s", err) 605 } 606 ty, err := dynamicVal.ImpliedType() 607 if err != nil { 608 return nil, fmt.Errorf("error determining path index type: %s", err) 609 } 610 val, err := dynamicVal.Decode(ty) 611 if err != nil { 612 return nil, fmt.Errorf("error decoding path index value: %s", err) 613 } 614 ret = append(ret, cty.IndexStep{Key: val}) 615 case *planproto.Path_Step_AttributeName: 616 ret = append(ret, cty.GetAttrStep{Name: s.AttributeName}) 617 default: 618 return nil, fmt.Errorf("Unsupported path step %t", step.Selector) 619 } 620 } 621 return ret, nil 622 } 623 624 func pathToTfplan(path cty.Path) (*planproto.Path, error) { 625 steps := make([]*planproto.Path_Step, 0, len(path)) 626 for _, step := range path { 627 switch s := step.(type) { 628 case cty.IndexStep: 629 value, err := plans.NewDynamicValue(s.Key, s.Key.Type()) 630 if err != nil { 631 return nil, fmt.Errorf("Error encoding path step: %s", err) 632 } 633 steps = append(steps, &planproto.Path_Step{ 634 Selector: &planproto.Path_Step_ElementKey{ 635 ElementKey: valueToTfplan(value), 636 }, 637 }) 638 case cty.GetAttrStep: 639 steps = append(steps, &planproto.Path_Step{ 640 Selector: &planproto.Path_Step_AttributeName{ 641 AttributeName: s.Name, 642 }, 643 }) 644 default: 645 return nil, fmt.Errorf("Unsupported path step %#v (%t)", step, step) 646 } 647 } 648 return &planproto.Path{ 649 Steps: steps, 650 }, nil 651 }