Skip to main content

Terraform Provisioner

Massdriver provisioner for managing resources with Terraform.

Structure

This provisioner expects the path to contain an Terraform module.

If you wish to use a dependency lock file (.terraform.lock.hcl) with your module, be sure it is in the module directory when you publish with the Massdriver CLI. For this reason, it's best to check this dependency lock file into source control.

Tooling

The following tools are included in this provisioner:

  • Checkov: Included to scan terraform configurations for common policy and compliance violations.
  • Open Policy Agent: Included to scan terraform configurations against custom policies.

Configuration

The following configuration options are available:

Configuration OptionTypeDefaultDescription
jsonbooleanfalseEnables JSON output for Terraform.
checkov.enablebooleantrueEnables Checkov policy evaluation. If false, Checkov will not be run.
checkov.quietbooleantrueOnly display failed checks if true (adds the --quiet flag).
checkov.halt_on_failurebooleanfalseHalt provisioning run and mark deployment as failed on a policy failure (removes the --soft-fail flag).

Inputs

Since Terraform is compatible with variables expressed in JSON syntax, both the params and connections are left unmodified and simply copied into the module directory as _params.auto.tfvars.json and _connections.auto.tfvars.json, respectively.

In order to view the structure of the params and connections fields you can run mass bundle build with the Massdriver CLI, and it will generate a _massdriver_variables.tf file with full type expressions for each parameter and connection. If modifications to fields are required, use a locals block to manipulate the data as needed.

Artifacts

Artifacts can be created two ways using this provisioner: using Terraform outputs, and using the Massdriver Terraform provider.

Terraform Outputs

After every provision, this provider will scan the module directory for files matching the pattern artifact_<name>.jq. If a file matching this pattern is present, it will be used as a JQ template to render and publish a Massdriver artifact. The inputs to the JQ template will be a JSON object with the params, connections, envs, secrets and module outputs as top level fields.

{
"params": {
...
},
"connections": {
...
},
"envs": {
...
},
"secrets": {
...
},
"outputs": {
...
}
}

To demonstrate, let's say there is a AWS S3 bucket bundle with a single param (region), a single connection (aws_iam_role), and a single artifact (bucket). The massdriver.yaml would be similar to:

params:
required:
- region
properties:
region:
type: string

connections:
required:
- aws_authentication
properties:
aws_authentication:
$ref: massdriver/aws-iam-role

artifacts:
required:
- bucket
properties:
bucket:
$ref: massdriver/aws-s3-bucket

Since the artifact is named bucket a file named artifact_bucket.jq would need to be in the module directory and the provisioner would use this file as a JQ template, passing the params, connections and outputs to it. There are two approaches to building the proper artifact structure:

  1. Fully render the artifact in the Terraform output
  2. Build the artifact using the jq template

Here are examples of each approach.

Fully Render as Terraform Output

If you choose to fully render the artifact in Terraform, it would be similar to:

output "artifact_bucket" {
value = jsonencode(
{
data = {
infrastructure = {
arn = aws_s3_bucket.main.arn
}
}
specs = {
aws = {
region = var.region
}
}
}
)
}

In this case, the input to the artifact_bucket.jq template file would be:

{
"params": {
"region": "us-east-1"
},
"connections": {
"aws_authentication": {
"data": {
"arn": "arn:aws:iam::012345678910:role/role_name",
"external_id": "s0mes3cr3tv@lue"
}
}
},
"envs": {},
"secrets": {},
"outputs": {
"artifact_bucket": {
"data": {
"infrastructure": {
"arn": "arn:aws:s3:::the_bucket_name"
}
},
"specs": {
"aws": {
"region": "us-east-1"
}
}
}
}
}

Thus, the artifact_bucket.jq file would simply be:

.outputs.artifact_bucket

Build Artifact in JQ Template

Alternatively, you can build the artifact using the JQ template. This approach is best if you are attempting to minimize changes to your Terraform module. With this approach, all you would need to output is the bucket ARN.

output "bucket_arn" {
value = aws_s3_bucket.main.arn
}

In this case, the input to the artifact_bucket.jq template file would be:

{
"params": {
"region": "us-east-1"
},
"connections": {
"aws_authentication": {
"data": {
"arn": "arn:aws:iam::012345678910:role/role_name",
"external_id": "s0mes3cr3tv@lue"
}
}
},
"outputs": {
"bucket_arn": "arn:aws:s3:::the_bucket_name"
}
}

Now the artifact structure must be built through the artifact_bucket.jq template:

{
"data": {
"infrastructure": {
"arn": .outputs.bucket_arn
}
},
"specs": {
"aws": {
"region": .params.region
}
}
}

Massdriver Terraform Provider

This is the legacy approach to creating artifacts since it is unique to Terraform and Terraform provisioners. It may be deprecated and removed in the future.

Refer to the provider documentation for the massdriver_artifact resource. An example is below:

resource "massdriver_artifact" "bucket" {
field = "bucket"
provider_resource_id = aws_s3_bucket.main.arn
name = "AWS S3 Bucket: ${aws_s3_bucket.main.arn}"
artifact = jsonencode(
{
data = {
infrastructure = {
arn = aws_s3_bucket.main.arn
}
}
specs = {
aws = {
region = var.bucket.region
}
}
}
)
}