This is a Terraform mixin for Porter.
This will install the latest mixin release via the Porter CLI.
porter mixin install terraform
Following commands build the terraform mixin.
git clone https://github.com/getporter/terraform-mixin.git
cd terraform-mixin
# Learn about Mage in our CONTRIBUTING.md
go run mage.go EnsureMage
mage build
Then, to install the resulting mixin into PORTER_HOME, execute
mage install
mixins:
- terraform:
clientVersion: 1.0.3
workingDir: myinfra
initFile: providers.tf
The Terraform client version can be specified via the clientVersion
configuration when declaring this mixin.
The workingDir
configuration setting is the relative path to your terraform files. Defaults to "terraform".
Terraform providers are installed into the bundle during porter build.
We recommend that you put your provider declarations into a single file, e.g. "terraform/providers.tf".
Then use initFile
to specify the relative path to this file within workingDir.
This will dramatically improve Docker image layer caching and performance when building, publishing and installing the bundle.
Note: this approach isn't suitable when using terraform modules as those need to be "initilized" as well but aren't specified in the
initFile
. You shouldn't specifiy aninitFile
in this situation.
When you declare the mixin, you can disable the mixin from customizing the azure user agent string
mixins:
- terraform:
userAgentOptOut: true
By default, the terraform mixin adds the porter and mixin version to the user agent string used by the azure provider. We use this to understand which version of porter and the mixin are being used by a bundle, and assist with troubleshooting. Below is an example of what the user agent string looks like:
AZURE_HTTP_USER_AGENT="getporter/porter/v1.0.0 getporter/terraform/v1.2.3"
You can add your own custom strings to the user agent string by editing your template Dockerfile and setting the AZURE_HTTP_USER_AGENT environment variable.
The simplest way to use this mixin with Porter is to let Porter track the Terraform state as actions are executed. This can be done via a parameter of type file
that has a source of a corresponding output (of the same file
type). Each time the bundle is executed, the output will capture the updated state file and inject it into the next action via its parameter correlate.
Here is an example setup that works with Porter v0.38:
parameters:
- name: tfstate
type: file
# This designates the path within the installer to place the parameter value
path: /cnab/app/terraform/terraform.tfstate
# Here we tell Porter that the value for this parameter should come from the 'tfstate' output
source:
output: tfstate
outputs:
- name: tfstate
type: file
# This designates the path within the installer to read the output from
path: /cnab/app/terraform/terraform.tfstate
If you are working with the Porter v1 prerelease, use the new state section:
state:
- name: tfstate
path: terraform/terraform.tfstate
- name: tfvars
path: terraform/terraform.tfvars.json
The TabbyCats Tracker bundle is a good example of how to use the terraform mixin with the Porter v1 prerelease.
The specified path inside the installer (/cnab/app/terraform/terraform.tfstate
) should be where Terraform will be looking to read/write its state. For a full example bundle using this approach, see the basic-tf-example.
Alternatively, state can be managed by a remote backend. When doing so, each action step needs to supply the remote backend config via backendConfig
. In the step examples below, the configuration has key/value pairs according to the Azurerm backend.
By default the mixin will create a default
terraform.tfvars.json
file from the vars
block during during the install step.
To use this file, a tfvars
file parameter and output must be added to persist it for subsequent steps.
This can be disabled by setting disableVarFile
to true
during install.
Here is an example setup using the tfvar file:
parameters:
- name: tfvars
type: file
# This designates the path within the installer to place the parameter value
path: /cnab/app/terraform/terraform.tfvars.json
# Here we tell Porter that the value for this parameter should come from the 'tfvars' output
source:
output: tfvars
- name: foo
type: string
applyTo:
- install
- name: baz
type: string
default: blaz
applyTo:
- install
outputs:
- name: tfvars
type: file
# This designates the path within the installer to read the output from
path: /cnab/app/terraform/terraform.tfvars.json
install:
- terraform:
description: "Install Azure Key Vault"
vars:
foo: bar
baz: biz
outputs:
- name: vault_uri
upgrade: # No var block required
- terraform:
description: "Install Azure Key Vault"
outputs:
- name: vault_uri
uninstall: # No var block required
- terraform:
description: "Install Azure Key Vault"
outputs:
- name: vault_uri
and with var file disabled
parameters:
- name: foo
type: string
applyTo:
- install
- name: baz
type: string
default: blaz
applyTo:
- install
install:
- terraform:
description: "Install Azure Key Vault"
disableVarFile: true
vars:
foo: bar
baz: biz
outputs:
- name: vault_uri
uninstall: # Var block required
- terraform:
description: "Install Azure Key Vault"
vars:
foo: bar
baz: biz
install:
- terraform:
description: "Install Azure Key Vault"
backendConfig:
key: "mybundle.tfstate"
storage_account_name: "mystorageacct"
container_name: "mycontainer"
access_key: "myaccesskey"
outputs:
- name: vault_uri
upgrade:
- terraform:
description: "Upgrade Azure Key Vault"
backendConfig:
key: "mybundle.tfstate"
storage_account_name: "mystorageacct"
container_name: "mycontainer"
access_key: "myaccesskey"
outputs:
- name: vault_uri
An invoke step is used for any custom action (not one of install
, upgrade
or uninstall
).
By default, the command given to terraform
will be the step name. Here it is show
,
resulting in terraform show
with the provided configuration.
show:
- terraform:
description: "Invoke 'terraform show'"
backendConfig:
key: "mybundle.tfstate"
storage_account_name: "mystorageacct"
container_name: "mycontainer"
access_key: "myaccesskey"
Or, if the step name does not match the intended terraform command, the command
can be supplied via the arguments:
section, like so:
printVersion:
- terraform:
description: "Invoke 'terraform version'"
arguments:
- version
uninstall:
- terraform:
description: "Uninstall Azure Key Vault"
backendConfig:
key: "mybundle.tfstate"
storage_account_name: "mystorageacct"
container_name: "mycontainer"
access_key: "myaccesskey"
See further examples in the Examples directory
As seen above, outputs can be declared for a step. All that is needed is the name of the output.
For each output listed, terraform output <output name>
is invoked to fetch the output value
from the state file for use by Porter. Outputs can be saved to the filesystem so that subsequent
steps can use the file by specifying the destinationFile
field. This is particularly useful
when your terraform module creates a Kubernetes cluster. In the example below, the module
creates a cluster, and then writes the kubeconfig to /root/.kube/config so that the rest of the
bundle can immediately use the cluster.
install:
- terraform:
description: "Create a Kubernetes cluster"
outputs:
- name: kubeconfig
destinationFile: /root/.kube/config
See the Porter Outputs documentation on how to wire up outputs for use in a bundle.