Skip to content

Utilities for working with Curve25519 keys. It offers resources that enable the creation of private keys and the corresponding public keys as part of a Terraform deployment.

Notifications You must be signed in to change notification settings

jackivanov/terraform-provider-x25519

Repository files navigation

Terraform Provider: x25519

The x25519 provider offers functionalities for handling Curve25519 keys, specifically for generating private and public keys. It facilitates the creation of private x25519 keys and the corresponding public keys, primarily designed for use in scenarios like generating WireGuard VPN keys.

It provides resources that enable the seamless integration of private x25519 keys and the associated public keys into your Terraform deployments.

Documentation, questions and discussions

Official documentation on how to use this provider can be found on the Terraform Registry.

Requirements

Development

Building

  1. git clone this repository and cd into its directory
  2. make will trigger the Golang build

The provided GNUmakefile defines additional commands generally useful during development, like for running tests, generating documentation, code formatting and linting. Taking a look at it's content is recommended.

Testing

In order to test the provider, you can run

  • make testacc to run provider acceptance tests

It's important to note that acceptance tests (testacc) will actually spawn terraform and the provider. Read more about they work on the official page.

Generating documentation

This provider uses terraform-plugin-docs to generate documentation and store it in the docs/ directory. Once a release is cut, the Terraform Registry will download the documentation from docs/ and associate it with the release version. Read more about how this works on the official page.

Use make generate to ensure the documentation is regenerated with any changes.

Using a development build

If running tests and acceptance tests isn't enough, it's possible to set up a local terraform configuration to use a development builds of the provider. This can be achieved by leveraging the Terraform CLI configuration file development overrides.

First, use make install to place a fresh development build of the provider in your ${GOBIN} (defaults to ${GOPATH}/bin or ${HOME}/go/bin if ${GOPATH} is not set). Repeat this every time you make changes to the provider locally.

Then, setup your environment following these instructions to make your local terraform use your local build.

Testing GitHub Actions

This project uses GitHub Actions to realize its CI.

Sometimes it might be helpful to locally reproduce the behaviour of those actions, and for this we use act. Once installed, you can simulate the actions executed when opening a PR with:

# List of workflows for the 'pull_request' action
$ act -l pull_request

# Execute the workflows associated with the `pull_request' action
$ act pull_request

Releasing

The release process is automated via GitHub Actions, and it's defined in the Workflow release.yml.

Each release is cut by pushing a semantically versioned tag to the default branch.

License

Mozilla Public License v2.0

About

Utilities for working with Curve25519 keys. It offers resources that enable the creation of private keys and the corresponding public keys as part of a Terraform deployment.

Topics

Resources

Code of conduct

Stars

Watchers

Forks

Packages

No packages published