blob: 932c36da774fe4e822f15a6c808a45c3b83b2f7a [file] [log] [blame]
// Copyright (c) HashiCorp, Inc.
// SPDX-License-Identifier: BUSL-1.1
package funcs
import (
"fmt"
"regexp"
"strings"
"github.com/hashicorp/hcl/v2"
"github.com/hashicorp/hcl/v2/ext/customdecode"
"github.com/hashicorp/hcl/v2/hclsyntax"
"github.com/zclconf/go-cty/cty"
"github.com/zclconf/go-cty/cty/convert"
"github.com/zclconf/go-cty/cty/function"
"github.com/hashicorp/terraform/internal/collections"
)
// StartsWithFunc constructs a function that checks if a string starts with
// a specific prefix using strings.HasPrefix
var StartsWithFunc = function.New(&function.Spec{
Params: []function.Parameter{
{
Name: "str",
Type: cty.String,
AllowUnknown: true,
},
{
Name: "prefix",
Type: cty.String,
},
},
Type: function.StaticReturnType(cty.Bool),
RefineResult: refineNotNull,
Impl: func(args []cty.Value, retType cty.Type) (cty.Value, error) {
prefix := args[1].AsString()
if !args[0].IsKnown() {
// If the unknown value has a known prefix then we might be
// able to still produce a known result.
if prefix == "" {
// The empty string is a prefix of any string.
return cty.True, nil
}
if knownPrefix := args[0].Range().StringPrefix(); knownPrefix != "" {
if strings.HasPrefix(knownPrefix, prefix) {
return cty.True, nil
}
if len(knownPrefix) >= len(prefix) {
// If the prefix we're testing is no longer than the known
// prefix and it didn't match then the full string with
// that same prefix can't match either.
return cty.False, nil
}
}
return cty.UnknownVal(cty.Bool), nil
}
str := args[0].AsString()
if strings.HasPrefix(str, prefix) {
return cty.True, nil
}
return cty.False, nil
},
})
// EndsWithFunc constructs a function that checks if a string ends with
// a specific suffix using strings.HasSuffix
var EndsWithFunc = function.New(&function.Spec{
Params: []function.Parameter{
{
Name: "str",
Type: cty.String,
},
{
Name: "suffix",
Type: cty.String,
},
},
Type: function.StaticReturnType(cty.Bool),
RefineResult: refineNotNull,
Impl: func(args []cty.Value, retType cty.Type) (cty.Value, error) {
str := args[0].AsString()
suffix := args[1].AsString()
if strings.HasSuffix(str, suffix) {
return cty.True, nil
}
return cty.False, nil
},
})
// ReplaceFunc constructs a function that searches a given string for another
// given substring, and replaces each occurence with a given replacement string.
var ReplaceFunc = function.New(&function.Spec{
Params: []function.Parameter{
{
Name: "str",
Type: cty.String,
},
{
Name: "substr",
Type: cty.String,
},
{
Name: "replace",
Type: cty.String,
},
},
Type: function.StaticReturnType(cty.String),
RefineResult: refineNotNull,
Impl: func(args []cty.Value, retType cty.Type) (ret cty.Value, err error) {
str := args[0].AsString()
substr := args[1].AsString()
replace := args[2].AsString()
// We search/replace using a regexp if the string is surrounded
// in forward slashes.
if len(substr) > 1 && substr[0] == '/' && substr[len(substr)-1] == '/' {
re, err := regexp.Compile(substr[1 : len(substr)-1])
if err != nil {
return cty.UnknownVal(cty.String), err
}
return cty.StringVal(re.ReplaceAllString(str, replace)), nil
}
return cty.StringVal(strings.Replace(str, substr, replace, -1)), nil
},
})
// StrContainsFunc searches a given string for another given substring,
// if found the function returns true, otherwise returns false.
var StrContainsFunc = function.New(&function.Spec{
Params: []function.Parameter{
{
Name: "str",
Type: cty.String,
},
{
Name: "substr",
Type: cty.String,
},
},
Type: function.StaticReturnType(cty.Bool),
Impl: func(args []cty.Value, retType cty.Type) (ret cty.Value, err error) {
str := args[0].AsString()
substr := args[1].AsString()
if strings.Contains(str, substr) {
return cty.True, nil
}
return cty.False, nil
},
})
// TemplateStringFunc renders a template presented either as a literal string
// or as a reference to a string from elsewhere.
func MakeTemplateStringFunc(funcsCb func() (funcs map[string]function.Function, fsFuncs collections.Set[string], templateFuncs collections.Set[string])) function.Function {
return function.New(&function.Spec{
Params: []function.Parameter{
{
Name: "template",
Type: customdecode.ExpressionClosureType,
},
{
Name: "vars",
Type: cty.DynamicPseudoType,
},
},
Type: function.StaticReturnType(cty.String),
RefineResult: refineNotNull,
Impl: func(args []cty.Value, retType cty.Type) (cty.Value, error) {
templateClosure := customdecode.ExpressionClosureFromVal(args[0])
varsVal := args[1]
// Our historical experience with the hashicorp/template provider's
// template_file data source tells us that situations where authors
// must write a string template that generates a string template
// cause all sorts of confusion, because the same syntax ends up
// being evaluated in two different contexts with different variables
// in scope, and new authors tend to be attracted to a function
// named "template" and so miss that the language has built-in
// support for inline template expressions.
//
// As a compromise to try to meet the (relatively unusual) use-cases
// where dynamic template fetching is needed without creating an
// attractive nuisance for those who would be better off just writing
// a plain inline template, this function imposes constraints on how
// the template argument may be provided and thus allows us
// to return slightly more helpful error messages.
//
// The only valid way to provide the template argument is as a
// simple, direct reference to some other value in scope that is
// of type string:
// templatestring(local.greeting_template, { name = "Alex" })
//
// Those with more unusual desires, such as dynamically generating
// a template at runtime by trying to concatenate template chunks
// together, can still do such things by placing the template
// construction expression in a separate local value and then passing
// that local value to the template argument. But the restriction is
// intended to intentionally add an extra "roadbump" so that
// anyone who mistakenly thinks they need templatestring to render
// an inline template (a common mistake for new authors with
// template_file) will hopefully hit this roadblock and refer to
// the function documentation to learn about the other options that
// are probably more suitable for what they need.
switch expr := templateClosure.Expression.(type) {
case *hclsyntax.TemplateWrapExpr:
// This situation occurs when someone writes an interpolation-only
// expression as was required in Terraform v0.11 and earlier.
// Because older versions of Terraform required this and this
// habit has been sticky for some authors, we'll return a
// special error message.
return cty.UnknownVal(retType), function.NewArgErrorf(
0, "invalid template expression: templatestring is only for rendering templates retrieved dynamically from elsewhere; to treat the inner expression as template syntax, write the reference expression directly without any template interpolation syntax",
)
case *hclsyntax.TemplateExpr:
// This is the more general case of someone trying to write
// an inline template as the argument. In this case we'll
// distinguish between an entirely-literal template, which
// probably suggests someone was trying to escape their template
// for the function to consume, vs. a template with other
// sequences that suggests someone was just trying to write
// an inline template and so probably doesn't need to call
// this function at all.
literal := true
if len(expr.Parts) != 1 {
literal = false
} else if _, ok := expr.Parts[0].(*hclsyntax.LiteralValueExpr); !ok {
literal = false
}
if literal {
return cty.UnknownVal(retType), function.NewArgErrorf(
0, "invalid template expression: templatestring is only for rendering templates retrieved dynamically from elsewhere, and so does not support providing a literal template; consider using a template string expression instead",
)
} else {
return cty.UnknownVal(retType), function.NewArgErrorf(
0, "invalid template expression: templatestring is only for rendering templates retrieved dynamically from elsewhere; to render an inline template, consider using a plain template string expression",
)
}
default:
if !isValidTemplateStringExpr(expr) {
// Someone who really does want to construct a template dynamically
// can factor out that construction into a local value and refer
// to it in the templatestring call, but it's not really feasible
// to explain that clearly in a short error message so we'll deal
// with that option on the function's documentation page instead,
// where we can show a full example.
return cty.UnknownVal(retType), function.NewArgErrorf(
0, "invalid template expression: must be a direct reference to a single string from elsewhere, containing valid Terraform template syntax",
)
}
}
templateVal, diags := templateClosure.Value()
if diags.HasErrors() {
// With the constraints we imposed above the possible errors
// here are pretty limited: it must be some kind of invalid
// traversal. As usual HCL diagnostics don't make for very
// good function errors but we've already filtered out many
// common reasons for error here, so we should get here pretty
// rarely.
return cty.UnknownVal(retType), function.NewArgErrorf(
0, "invalid template expression: %s",
diags.Error(),
)
}
if !templateVal.IsKnown() {
// We'll need to wait until we actually know what the template is.
return cty.UnknownVal(retType), nil
}
if templateVal.Type() != cty.String || templateVal.IsNull() {
// We're being a little stricter than usual here and requiring
// exactly a string, rather than just anything that can convert
// to one. This is because the stringification of a number or
// boolean value cannot be a useful template (it wouldn't have
// any template sequences in it) and so far more likely to be
// a mistake than actually intentional.
return cty.UnknownVal(retType), function.NewArgErrorf(
0, "invalid template value: a string is required",
)
}
templateVal, templateMarks := templateVal.Unmark()
templateStr := templateVal.AsString()
expr, diags := hclsyntax.ParseTemplate([]byte(templateStr), "<templatestring argument>", hcl.Pos{Line: 1, Column: 1})
if diags.HasErrors() {
return cty.UnknownVal(retType), function.NewArgErrorf(
0, "invalid template: %s",
diags.Error(),
)
}
render := makeRenderTemplateFunc(funcsCb, false)
retVal, err := render(expr, varsVal)
if err != nil {
return cty.UnknownVal(retType), err
}
retVal, err = convert.Convert(retVal, cty.String)
if err != nil {
return cty.UnknownVal(retType), fmt.Errorf("invalid template result: %s", err)
}
return retVal.WithMarks(templateMarks), nil
},
})
}
func makeRenderTemplateFunc(funcsCb func() (funcs map[string]function.Function, fsFuncs collections.Set[string], templateFuncs collections.Set[string]), allowFS bool) func(expr hcl.Expression, varsVal cty.Value) (cty.Value, error) {
return func(expr hcl.Expression, varsVal cty.Value) (cty.Value, error) {
if varsTy := varsVal.Type(); !(varsTy.IsMapType() || varsTy.IsObjectType()) {
return cty.DynamicVal, function.NewArgErrorf(1, "invalid vars value: must be a map") // or an object, but we don't strongly distinguish these most of the time
}
ctx := &hcl.EvalContext{
Variables: varsVal.AsValueMap(),
}
// We require all of the variables to be valid HCL identifiers, because
// otherwise there would be no way to refer to them in the template
// anyway. Rejecting this here gives better feedback to the user
// than a syntax error somewhere in the template itself.
for n := range ctx.Variables {
if !hclsyntax.ValidIdentifier(n) {
// This error message intentionally doesn't describe _all_ of
// the different permutations that are technically valid as an
// HCL identifier, but rather focuses on what we might
// consider to be an "idiomatic" variable name.
return cty.DynamicVal, function.NewArgErrorf(1, "invalid template variable name %q: must start with a letter, followed by zero or more letters, digits, and underscores", n)
}
}
// We'll pre-check references in the template here so we can give a
// more specialized error message than HCL would by default, so it's
// clearer that this problem is coming from a templatefile call.
for _, traversal := range expr.Variables() {
root := traversal.RootName()
if _, ok := ctx.Variables[root]; !ok {
return cty.DynamicVal, function.NewArgErrorf(1, "vars map does not contain key %q, referenced at %s", root, traversal[0].SourceRange())
}
}
givenFuncs, fsFuncs, templateFuncs := funcsCb() // this callback indirection is to avoid chicken/egg problems
funcs := make(map[string]function.Function, len(givenFuncs))
for name, fn := range givenFuncs {
plainName := strings.TrimPrefix(name, "core::")
switch {
case templateFuncs.Has(plainName):
funcs[name] = function.New(&function.Spec{
Params: fn.Params(),
VarParam: fn.VarParam(),
Type: func(args []cty.Value) (cty.Type, error) {
return cty.NilType, fmt.Errorf("cannot recursively call %s from inside another template function", plainName)
},
})
case !allowFS && fsFuncs.Has(plainName):
// Note: for now this assumes that allowFS is false only for
// the templatestring function, and so mentions that name
// directly in the error message.
funcs[name] = function.New(&function.Spec{
Params: fn.Params(),
VarParam: fn.VarParam(),
Type: func(args []cty.Value) (cty.Type, error) {
return cty.NilType, fmt.Errorf("cannot use filesystem access functions like %s in templatestring templates; consider passing the function result as a template variable instead", plainName)
},
})
default:
funcs[name] = fn
}
}
ctx.Functions = funcs
val, diags := expr.Value(ctx)
if diags.HasErrors() {
return cty.DynamicVal, diags
}
if val.IsNull() {
return cty.DynamicVal, &hcl.Diagnostic{
Severity: hcl.DiagError,
Summary: "Template result is null",
Detail: "The result of the template is null, which is not a valid result for a templatestring call.",
Subject: expr.Range().Ptr(),
}
}
return val, nil
}
}
func isValidTemplateStringExpr(expr hcl.Expression) bool {
// Our goal with this heuristic is to be as permissive as possible with
// allowing things that authors might try to use as references to a
// template string defined elsewhere, while rejecting complex expressions
// that seem like they might be trying to construct templates dynamically
// or might have resulted from a misunderstanding that "templatestring" is
// the only way to render a template, because someone hasn't learned
// about template expressions yet.
//
// This is here only to give better feedback to folks who seem to be using
// templatestring for something other than what it's intended for, and not
// to block dynamic template generation altogether. Authors who have a
// genuine need for dynamic template generation can always assert that to
// Terraform by factoring out their dynamic generation into a local value
// and referring to it; this rule is just a little speedbump to prompt
// the author to consider whether there's a better way to solve their
// problem, as opposed to just using the first solution they found.
switch expr := expr.(type) {
case *hclsyntax.ScopeTraversalExpr:
// A simple static reference from the current scope is always valid.
return true
case *hclsyntax.RelativeTraversalExpr:
// Relative traversals are allowed as long as they begin from
// something that would otherwise be allowed.
return isValidTemplateStringExpr(expr.Source)
case *hclsyntax.IndexExpr:
// Index expressions are allowed as long as the collection is
// also specified using an expression that conforms to these rules.
// The key operand is intentionally unconstrained because that
// is a rule for how to select an element, and so doesn't represent
// a source from which the template string is being retrieved.
return isValidTemplateStringExpr(expr.Collection)
case *hclsyntax.SplatExpr:
// Splat expressions would be weird to use because they'd typically
// return a tuple and that wouldn't be valid as a template string,
// but we allow it here (as long as the operand would otherwise have
// been allowed) because then we'll let the type mismatch error
// show through, and that's likely a more helpful error message.
return isValidTemplateStringExpr(expr.Source)
default:
// Nothing else is allowed.
return false
}
}
// Replace searches a given string for another given substring,
// and replaces all occurences with a given replacement string.
func Replace(str, substr, replace cty.Value) (cty.Value, error) {
return ReplaceFunc.Call([]cty.Value{str, substr, replace})
}
func StrContains(str, substr cty.Value) (cty.Value, error) {
return StrContainsFunc.Call([]cty.Value{str, substr})
}