do not merge: Show that planning for one workspace, switching, and then applying the plan in the wrong workspace doesn't fail #37919
+433
−0
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Context
This:
terraform/internal/command/meta_backend.go
Lines 330 to 332 in 64015ca
Currently isn't the case.
Bug description
Assume that a plan was raised against workspace A and a user tries to apply it against workspace B.
The actual behaviour varies depending on the type of plan and what state already exists for workspace B.
Saved plan is stale.different state lineageerror.In case 2 & 3 the apply stops before making any changes to state, however the error messages don't clearly point out that mismatched workspaces are the underlying cause.
In case 1 users will find that the new state file is persisted in a different location than they expected. The output from the apply command doesn't say which workspace the apply affected, so the user might not notice the issue immediately.
In this PR:
TestPrimarySeparatePlan_incorrectWorkspace_noPriorStateTestPrimarySeparatePlan_incorrectWorkspace_withPriorStateTestPrimarySeparatePlan_incorrectWorkspace_planChangingExistingResources_noPriorStateTarget Release
N/A
Rollback Plan
Changes to Security Controls
Are there any changes to security controls (access controls, encryption, logging) in this pull request? If so, explain.
CHANGELOG entry