Protoconf integration with Terraform
Prerequists
- The
terraform
binray in your$PATH
- The
protoconf
binary in your$PATH
Prepare
Create a providers.tf
file containing the providers declarations you need.
provider "random" {}
provider "tls" {}
Initialize Terraform
$ terraform init
Generate the terraform protos
$ protoconf import terraform
Validate the outputs
$ find src/terraform
src/terraform
src/terraform/v1
src/terraform/v1/terraform.proto
src/terraform/v1/meta.proto
src/terraform/tls
src/terraform/tls/datasources
src/terraform/tls/datasources/v3
src/terraform/tls/datasources/v3/public.proto
src/terraform/tls/datasources/v3/certificate.proto
src/terraform/tls/resources
src/terraform/tls/resources/v3
src/terraform/tls/resources/v3/private.proto
src/terraform/tls/resources/v3/self.proto
src/terraform/tls/resources/v3/cert.proto
src/terraform/tls/resources/v3/locally.proto
src/terraform/tls/provider
src/terraform/tls/provider/v3
src/terraform/tls/provider/v3/tls.proto
src/terraform/random
src/terraform/random/resources
src/terraform/random/resources/v3
src/terraform/random/resources/v3/password.proto
src/terraform/random/resources/v3/integer.proto
src/terraform/random/resources/v3/string.proto
src/terraform/random/resources/v3/pet.proto
src/terraform/random/resources/v3/shuffle.proto
src/terraform/random/resources/v3/id.proto
src/terraform/random/resources/v3/uuid.proto
src/terraform/random/provider
src/terraform/random/provider/v3
src/terraform/random/provider/v3/random.proto
The src/terraform/terraform.proto
should looks like this:
syntax = "proto3";
package terraform.v1;
import "terraform/random/provider/v3/random.proto";
import "terraform/random/resources/v3/id.proto";
import "terraform/random/resources/v3/integer.proto";
import "terraform/random/resources/v3/password.proto";
import "terraform/random/resources/v3/pet.proto";
import "terraform/random/resources/v3/shuffle.proto";
import "terraform/random/resources/v3/string.proto";
import "terraform/random/resources/v3/uuid.proto";
import "terraform/tls/datasources/v3/certificate.proto";
import "terraform/tls/datasources/v3/public.proto";
import "terraform/tls/provider/v3/tls.proto";
import "terraform/tls/resources/v3/cert.proto";
import "terraform/tls/resources/v3/locally.proto";
import "terraform/tls/resources/v3/private.proto";
import "terraform/tls/resources/v3/self.proto";
message Terraform {
Resources resource = 1;
Datasources data = 2;
Providers provider = 3;
map<string, Variable> variable = 4;
map<string, Output> output = 5;
map<string, string> locals = 6;
Module module = 7;
TerraformSettings terraform = 8;
message Resources {
map<string, terraform.random.resources.v3.RandomId> random_id = 1 [json_name = "random_id"];
map<string, terraform.random.resources.v3.RandomInteger> random_integer = 2 [json_name = "random_integer"];
map<string, terraform.random.resources.v3.RandomPassword> random_password = 3 [json_name = "random_password"];
map<string, terraform.random.resources.v3.RandomPet> random_pet = 4 [json_name = "random_pet"];
map<string, terraform.random.resources.v3.RandomShuffle> random_shuffle = 5 [json_name = "random_shuffle"];
map<string, terraform.random.resources.v3.RandomString> random_string = 6 [json_name = "random_string"];
map<string, terraform.random.resources.v3.RandomUuid> random_uuid = 7 [json_name = "random_uuid"];
map<string, terraform.tls.resources.v3.TlsCertRequest> tls_cert_request = 8 [json_name = "tls_cert_request"];
map<string, terraform.tls.resources.v3.TlsLocallySignedCert> tls_locally_signed_cert = 9 [json_name = "tls_locally_signed_cert"];
map<string, terraform.tls.resources.v3.TlsPrivateKey> tls_private_key = 10 [json_name = "tls_private_key"];
map<string, terraform.tls.resources.v3.TlsSelfSignedCert> tls_self_signed_cert = 11 [json_name = "tls_self_signed_cert"];
}
message Datasources {
map<string, terraform.tls.datasources.v3.TlsCertificate> tls_certificate = 1 [json_name = "tls_certificate"];
map<string, terraform.tls.datasources.v3.TlsPublicKey> tls_public_key = 2 [json_name = "tls_public_key"];
}
message Providers {
repeated terraform.random.provider.v3.Random random = 1;
repeated terraform.tls.provider.v3.Tls tls = 2;
}
message Variable {
string type = 1;
string description = 2;
string default = 3;
}
message Output {
string value = 1;
}
message Module {
}
message TerraformSettings {
string required_version = 1 [json_name = "required_version"];
map<string, Provider> required_providers = 2 [json_name = "required_providers"];
Backend backend = 3;
message Provider {
string source = 1;
string version = 2;
}
message Backend {
oneof config {
BackendLocal local = 1;
BackendRemote remote = 2;
BackendS3 s3 = 3;
}
message BackendLocal {
string path = 1;
string workspace_dir = 2 [json_name = "workspace_dir"];
}
message BackendRemote {
//(Optional) The remote backend hostname to connect to. Defaults to app.terraform.io.
string hostname = 1;
//(Required) The name of the organization containing the targeted workspace(s).
string organization = 2;
//(Optional) The token used to authenticate with the remote backend. We recommend omitting the token from the configuration, and instead using `terraform login` or manually configuring `credentials` in the CLI config file.
string token = 3;
//(Required) A block specifying which remote workspace(s) to use. The workspaces block supports the following keys
Workspace workspaces = 4;
message Workspace {
//(Optional) The full name of one remote workspace. When configured, only the default workspace can be used. This option conflicts with prefix.
string name = 1;
//(Optional) A prefix used in the names of one or more remote workspaces, all of which can be used with this configuration. The full workspace names are used in Terraform Cloud, and the short names (minus the prefix) are used on the command line for Terraform CLI workspaces. If omitted, only the default workspace can be used. This option conflicts with name.
string prefix = 2;
}
}
message BackendS3 {
string region = 1;
string access_key = 2 [json_name = "access_key"];
string secret_key = 3 [json_name = "secret_key"];
string iam_endpoint = 4 [json_name = "iam_endpoint"];
string max_retries = 5 [json_name = "max_retries"];
string profile = 6;
string shared_credentials_file = 7 [json_name = "shared_credentials_file"];
string skip_credentials_validation = 8 [json_name = "skip_credentials_validation"];
string skip_region_validation = 9 [json_name = "skip_region_validation"];
string skip_metadata_api_check = 10 [json_name = "skip_metadata_api_check"];
string sts_endpoint = 11 [json_name = "sts_endpoint"];
string token = 12;
string assume_role_duration_seconds = 13 [json_name = "assume_role_duration_seconds"];
string assume_role_policy = 14 [json_name = "assume_role_policy"];
string assume_role_policy_arns = 15 [json_name = "assume_role_policy_arns"];
string assume_role_tags = 16 [json_name = "assume_role_tags"];
string assume_role_transitive_tag_keys = 17 [json_name = "assume_role_transitive_tag_keys"];
string external_id = 18 [json_name = "external_id"];
string role_arn = 19 [json_name = "role_arn"];
string session_name = 20 [json_name = "session_name"];
string bucket = 21;
string key = 22;
string acl = 23;
string encrypt = 24;
string endpoint = 25;
string force_path_style = 26 [json_name = "force_path_style"];
string kms_key_id = 27 [json_name = "kms_key_id"];
string sse_customer_key = 28 [json_name = "sse_customer_key"];
string workspace_key_prefix = 29 [json_name = "workspace_key_prefix"];
string dynamodb_endpoint = 30 [json_name = "dynamodb_endpoint"];
string dynamodb_table = 31 [json_name = "dynamodb_table"];
}
}
}
}
Create a .tf.pconf
file
# vim: filetype=python
# ./src/tfdemo/tfdemo.tf.pconf
load("//terraform/v1/terraform.proto", "Terraform")
load("//terraform/random/provider/v3/random.proto", "Random")
load("//terraform/random/resources/v3/pet.proto", "RandomPet")
tf = Terraform(
provider=Terraform.Providers(random=[Random()]),
resource=Terraform.Resources(),
output={},
)
tf.resource.random_pet["my_dog_name"] = RandomPet()
tf.output["my_dog_name"] = Terraform.Output(value="${random_pet.my_dog_name.id}")
def main():
return tf
compile the config
$ protoconf compile .
Check the output
cat materialized_config/tfdemo/tfdemo.tf.materialized_JSON
{
"protoFile": "terraform/terraform.proto",
"value": {
"@type": "type.googleapis.com/terraform.Terraform",
"output": {
"my_dog_name": {
"value": "${random_pet.my_dog_name.id}"
}
},
"provider": {
"random": [{}]
},
"resource": {
"random_pet": {
"my_dog_name": {}
}
}
}
}
prepare to run terraform
$ mkdir tf
$ cat materialized_config/tfdemo/tfdemo.tf.materialized_JSON | jq '.value | del(.["@type"])' > tf/test.tf.json
$ terraform -chdir=tf init
$ terraform -chdir=tf plan
An execution plan has been generated and is shown below.
Resource actions are indicated with the following symbols:
+ create
Terraform will perform the following actions:
# random_pet.my_dog_name will be created
+ resource "random_pet" "my_dog_name" {
+ id = (known after apply)
+ length = 2
+ separator = "-"
}
Plan: 1 to add, 0 to change, 0 to destroy.
Changes to Outputs:
+ my_dog_name = (known after apply)
------------------------------------------------------------------------
Note: You didn't specify an "-out" parameter to save this plan, so Terraform
can't guarantee that exactly these actions will be performed if
"terraform apply" is subsequently run.
$ terraform -chdir=tf apply -auto-approve
random_pet.my_dog_name: Creating...
random_pet.my_dog_name: Creation complete after 0s [id=key-zebra]
Apply complete! Resources: 1 added, 0 changed, 0 destroyed.
Outputs:
my_dog_name = "key-zebra"