This repository has been deprecated as David Ford is maintaining a more advanced fork which takes this code and gives it the love I haven't been able to give.
To use the updated the updated version head over to the fork here
This was originally proposed as a PR to add a YAML resource into the official Terraform provider.
While the work is ongoing to provide a better experience in the official provider I've pulled the code out into a standalone provider which just provides the YAML resource. This allows for it to be used alongside the existing providers.
Currently the code has been tried on a limited number of use cases. I would expect wider use to find issue, please raise them on the repository and make contributions to resolve them if you can.
When a change is detected between the yaml
defined in yourhcl
and the resource in the cluster the provider will, assuming you approve the change, execute a delete
followed by a create
on the resource. IT DOESN'T PATCH THE EXISTING RESOURCE it will remove and then recreate it.
For lots of use cases this is fine, for others it's not. I'd be interested in accepting a PR to enable Patch support but have no plans to work on it myself.
There is no support around this provider. If it missing a feature or it has a bug feel free to raise an issue but there is no time allocated to maintian and resolve issues.
Likewise PRs are welcome but the time to review and merge may vary based on my availability.
Download a binary for your system from the release page and remove the -os-arch
details so you're left with terraform-provider-k8sraw
. Use chmod +x
to make it executable and then either place it at the root of your Terraform folder or in the Terraform plugin folder on your system.
Then you can create a YAML resources by using the following Terraform:
provider "k8sraw" {}
resource "k8sraw_yaml" "test" {
yaml_body = <<YAML
apiVersion: extensions/v1beta1
kind: Ingress
metadata:
name: test-ingress
annotations:
nginx.ingress.kubernetes.io/rewrite-target: /
azure/frontdoor: enabled
spec:
rules:
- http:
paths:
- path: /testpath
backend:
serviceName: test
servicePort: 80
YAML
}
The provider also support a retry when creating the resource create_retry_count = 15
. This is useful for CRD
s who's operators are also being created during the terraform
operation to allow time for the CRD
definition to be created in the cluster.
provider "k8sraw" {
create_retry_count = 15
}
resource "k8sraw_yaml" "test" {
yaml_body = <<YAML
apiVersion: couchbase.com/v1
kind: CouchbaseCluster
metadata:
name: name-here-cluster
spec:
baseImage: name-here-image
version: name-here-image-version
authSecret: name-here-operator-secret-name
exposeAdminConsole: true
adminConsoleServices:
- data
cluster:
dataServiceMemoryQuota: 256
indexServiceMemoryQuota: 256
searchServiceMemoryQuota: 256
eventingServiceMemoryQuota: 256
analyticsServiceMemoryQuota: 1024
indexStorageSetting: memory_optimized
autoFailoverTimeout: 120
autoFailoverMaxCount: 3
autoFailoverOnDataDiskIssues: true
autoFailoverOnDataDiskIssuesTimePeriod: 120
autoFailoverServerGroup: false
YAML
}
Clone repository to: $GOPATH/src/github.com/terraform-providers/terraform-provider-kubernetes
$ mkdir -p $GOPATH/src/github.com/lawrencegripper; cd $GOPATH/src/github.com/lawrencegripper
$ git clone git@github.com:lawrencegripper/terraform-provider-kubernetes-yaml
Enter the provider directory and build the provider
$ cd $GOPATH/src/github.com/lawrencegripper/terraform-provider-kubernetes-yaml
$ make build
The provide uses MiniKube to run integration tests. These tests look for any *.tf
files in the _examples
folder and run an plan
, apply
, refresh
and plan
loop over each file.
Inside each file the string name-here
is replaced with a unique name during test execution. This is a simple string replace before the TF is applied to ensure that tests don't fail due to naming clashes.
Each scenario can be placed in a folder, to help others navigate and use the examples, and added to the README.MD.
Note: The test infrastructure doesn't support multi-file TF configurations so ensure your test scenario is in a single file.
Using vscode
with delve
and golang
configured the launch task in the repo will start a debugging session for the tests. Open the repo and press F5
to get started.
If you wish to work on the provider, you'll first need Go installed on your machine (version 1.9+ is required). You'll also need to correctly setup a GOPATH, as well as adding $GOPATH/bin
to your $PATH
.
To compile the provider, run make build
. This will build the provider and put the provider binary in the $GOPATH/bin
directory.
$ make build
...
$ $GOPATH/bin/terraform-provider-kubernetes
...
In order to test the provider, you can simply run make test
.
$ make test
In order to run the full suite of Acceptance tests, run make testacc
.
Note: Acceptance tests create real resources, and often cost money to run.
$ make testacc