This is a Terraform provider to copy files, run commands remotely and capture results via SSH. Unlike the Terraform provisioners which are described as a "last resort" this provider embraces the concept of pushing and executing content to compute instances over SSH. Apart from bastion hosts it also supports tunneling over HTTP proxies. This is very useful if you are running Terraform from inside a corporate network and need to reach out to your instances.
To install this provider, copy and paste this code into your Terraform configuration. Then, run terraform init.
terraform {
required_providers {
ssh = {
source = "loafoe/ssh"
}
}
}
resource "ssh_resource" "example" {
host = "remote-server.test"
bastion_host = "jumpgate.remote-host.com"
user = "alpine"
agent = true
file {
content = "echo '{\"hello\":\"world\"}' && exit 0"
destination = "/home/alpine/test.sh"
permissions = "0700"
}
timeout = "3m"
commands = [
"/home/alpine/test.sh",
]
}
output "result" {
value = try(jsondecode(ssh_resource.example.result), {})
}
The above example snippet uploads a generated shell script, executes it remotely and captures the output for further use in Terraform.
resource "ssh_resource" "deploy-kubevip" {
count = local.deploy_kubevip == true ? 1 : 0
triggers = {
template = data.template_file.kubevip_config[count.index].rendered
}
file {
content = data.template_file.kubevip_config[count.index].rendered
destination = "/tmp/deploy-kubevip.sh"
permissions = "0644"
}
commands = [
"chmod +x /tmp/deploy-kubevip.sh",
"sudo /tmp/deploy-kubevip.sh"
]
user = local.ssh_user_server
private_key = local.ssh_key_server
host = local.servernodes.0
}
- If you have an issue: report it on the issue tracker
License is MIT