Open source Terraform Registry.
Provides features to aid usage and discovery of modules, providing:
- Fully implemented Terraform modules API
- Completely API driven for automating all features
- Host Terraform modules internally or from an external Git source
- Analytics about the usage of modules
- All information about a module - README, inputs, outputs, provider requirements and managed resources
- Security alerts for each module, submodule and examples
- Cost estimation for each module example
- Module example source code within the UI, with automatic rewriting of 'source' arguments
- Interactive 'Usage builder', helping users build terraform to use the terraform modules
- Hooks for git SCM applications to automatically index modules
- Authentication via SSO (OpenIDConnect/SAML2) and GitHub
- Terraform provider support (very early alpha version)
If you like and use this project and are happy to let us know, please raise a GitHub issue, create a PR or contact MatthewJohn so it can be added to the README :)
For a full list of issues and pull requests, please see https://gitlab.dockstudios.co.uk/pub/terrareg
# Create secret key for session data
export SECRET_KEY=$(python -c 'import secrets; print(secrets.token_hex())')
# Run container, specifying secret key and admin password
docker run -ti -p 5000:5000 \
-e PUBLIC_URL=http://localhost:5000 \
-e MIGRATE_DATABASE=True \
-e SECRET_KEY=$SECRET_KEY \
-e ADMIN_AUTHENTICATION_TOKEN=MySuperSecretPassword \
ghcr.io/matthewjohn/terrareg:latest
The site can be accessed at http://localhost:5000, which will provide a 'Initial Setup' guide for getting started.
For information about running with docker-compose, SSL certificate generation or running without docker, see docs/LOCAL_DEVELOPMENT.md.
Warning: Terrareg downloads and analyses modules. Be careful when using untrusted modules or modules that use untrusted Terraform providers, as this can allow arbitrary code execution.
- Goto http://localhost:5000
- Login, using the button in the top-right hand corner
- Goto 'Create' -> 'Namespace' (http://localhost:5000/create-namespace)
- Provide a name for the namespace and create.
- Goto 'Create' -> 'Modules' (http://localhost:5000/create-module)
- Fill in the details for your module and 'Create'
- Use the 'Manually index version' form of your module, filling out the version and select 'Publish' and then press 'Index Version'
terrareg_root=$PWD
cd source/of/my/module
# OPTIONAL: Create an terrareg meta-data file
echo '{ "description": "My first module", "owner": "ME!", "source": "https://github.com/me/my-tf-module" }' > ./terrareg.json
# Zip up module
zip -r ../my-tf-module.zip *
# Upload to terrareg
bash $terrareg_root/scripts/upload_module.sh http://localhost:5000 helloworld my-tf-module aws 1.0.0 ../my-tf-module.zip
Navigate to http://localhost:5000 to get started, or http://localhost/modules/helloworld/my-tf-module to see the uploaded example!
NOTE: To use modules from the registry in Terraform, a valid SSL certificate is incredibly highly recommended. Terraform will not work if you supply http://
as a protocol for the module URL, as it will treat this as a direct HTTP download, rather than treating it as a registry. Whilst Terrareg does handle these types of requests, you will not be able to the module version ranges that Terraform provides.
For a full list of environment variables, please see Deployment Guide and docs/CONFIG.md
For documentation about features, deployment, configuration and using Terrareg, please see: https://matthewjohn.github.io/terrareg
The Terrareg Terraform provider can be used to create namespaces, modules and manage other aspects of Terrareg:
- https://registry.terraform.io/providers/dockstudios/terrareg
- https://github.com/DockStudios/terraform-provider-terrareg
For notes on upgrading, please see: https://matthewjohn.github.io/terrareg/UPGRADE
See the API Docs for a list of all API endpoint.
See CHANGELOG.md
For all installation about local development, see https://matthewjohn.github.io/terrareg/LOCAL_DEVELOPMENT.
Since terraform requires HTTPS with a valid SSL cert, this must be provided in local development
On linux, by default, non-privileged users cannot listen on privileged ports, so the following can be used to route requests locally to port 5000:
sudo iptables -t nat -I OUTPUT -p tcp -d 127.0.0.1 --dport 443 -j REDIRECT --to-ports 5000
Example to run in local development environment:
virtualenv -ppython3.8 venv
. venv/bin/activate
pip install -r requirements.txt
pip install -r requirements-dev.txt
# Without SSL cert
PUBLIC_URL=http://localhost:5000 ALLOW_CUSTOM_GIT_URL_MODULE_PROVIDER=False ALLOW_CUSTOM_GIT_URL_MODULE_VERSION=False GIT_PROVIDER_CONFIG='[{"name": "GitHub", "base_url": "https://github.com/{namespace}/{module}", "clone_url": "ssh://git@github.com/{namespace}/{module}.git", "browse_url": "https://github.com/{namespace}/{module}/tree/{tag}/{path}"}, {"name": "Bitbucket", "base_url": "https://bitbucket.org/{namespace}/{module}", "clone_url": "ssh://git@bitbucket.org/{namespace}/{module}-{provider}.git", "browse_url": "https://bitbucket.org/{namespace}/{module}-{provider}/src/{tag}/{path}"}, {"name": "Gitlab", "base_url": "https://gitlab.com/{namespace}/{module}", "clone_url": "ssh://git@gitlab.com/{namespace}/{module}-{provider}.git", "browse_url": "https://gitlab.com/{namespace}/{module}-{provider}/-/tree/{tag}/{path}"}]' SECRET_KEY=ec9b8cc5ed0404acb3983b7836844d828728c22c28ecbed9095edef9b7489e85 ADMIN_AUTHENTICATION_TOKEN=password ANALYTICS_AUTH_KEYS=xxxxxx.atlasv1.zzzzzzzzzzzzz:dev,xxxxxx.atlasv1.xxxxxxxxxx:prod VERIFIED_MODULE_NAMESPACES=hashicorp TRUSTED_NAMESPACES=test DEBUG=True AUTO_PUBLISH_MODULE_VERSIONS=False LISTEN_PORT=5001 python ./terrareg.py
# With SSL Cert
# Add the following argument
# --ssl-cert-private-key ./example/ssl-certs/private.pem --ssl-cert-public-key ./example/ssl-certs/public.pem
See CONTRIBUTING.md
This project and all associated code is covered by GNU General Public License v3.0.
For full license, see LICENSE.
For licenses of third party software and libraries used in this project, see LICENSE.third-party.
- @mholttech for usage builder improvements and docker-compose dev environment
- @Davidsoff for implementing GitHub hook support
- @0xken for impleenting a custom Cherry Dark theme
- @chriscunningham-trivago for fixing tfswitch bug in docker build
- @bmaximuml for fixing typos and Dockerfile improvements
- @cayce-hengeveld for grammar fixes