You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
We are using terraform at our company to build a full environment on AWS. This includes IAM, security groups, databases, instances, firing a nomad cluster and putting settings on consul. As we have tight security requirements (credit card processing), the inbound rules of all resources are strictly locked.
On environments like ours, we end up with the following situation: I want to use the provider X (consul, docker, nomad...), but the machine that is running terraform doesn't- and wont ever- have access to that provider server.
Currently, we saw two ways of solving this:
For simple configurations, use a provisioner connected through the bastion and execute a script on a machine that has access. The downside is that you don't use terraform state management here.
For more complex situations, give the bastion direct access to the service and execute terraform inside it. Downside: Bastion shouldn't have access to that service and you need to have AWS + Git credentials inside the bastion.
Proposal
Terraform should have a way to "proxy" the requests made by supported providers through some kind of connection. At first I would imagine something like this:
I think this is the same idea as was discussed in #8367. There was some discussion over there as to different ways to approach the design of this, though the original proposal looks a lot like what you proposed here. I suggested a few different formulations over there which I thought might fit better into Terraform's existing architecture; I'd be interested to hear what you think about those.
I'm going to close this to consolidate the discussion over there. I personally am pretty excited to have a feature like this.
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues.
If you have found a problem that seems similar to this, please open a new issue and complete the issue template so we can capture all the details necessary to investigate further.
ghost
locked and limited conversation to collaborators
Apr 16, 2020
Sign up for freeto subscribe to this conversation on GitHub.
Already have an account?
Sign in.
Use case
We are using terraform at our company to build a full environment on AWS. This includes IAM, security groups, databases, instances, firing a nomad cluster and putting settings on consul. As we have tight security requirements (credit card processing), the inbound rules of all resources are strictly locked.
On environments like ours, we end up with the following situation: I want to use the provider X (consul, docker, nomad...), but the machine that is running terraform doesn't- and wont ever- have access to that provider server.
Currently, we saw two ways of solving this:
Proposal
Terraform should have a way to "proxy" the requests made by supported providers through some kind of connection. At first I would imagine something like this:
In this case we could start SSH forwarding and the provider will connect through it.
What are your thoughts about this? If we agree on some solution like this I will be happy to start a pull request.
The text was updated successfully, but these errors were encountered: