Manage the Terraform Provider for Juju

Install the Terraform Provider for Juju

To install the Terraform Provider for Juju on Linux, macOS, or Windows, you need to install the terraform CLI.

For example, on a Linux that supports snaps:

sudo snap install terraform --classic

Set up the Terraform Provider for Juju

The provider supports two modes: controller mode (for bootstrapping) and regular mode (for using existing controllers).

In controller mode (bootstrapping)

To set up the provider in controller mode for the purpose of bootstrapping a new controller, in your Terraform plan (e.g., main.tf) define the provider with controller_mode = true:

provider "juju" {
  controller_mode = true
}

In the same plan, define a juju_controller resource to bootstrap your controller. No other resources can be created when this flag is set.

In regular mode (using existing controllers)

To set up the provider in regular mode, i.e., using an existing controller, choose one of three authentication methods:

  1. Static credentials in your Terraform plan;

  2. Environment variables;

  3. The juju CLI (not supported for JAAS controllers).

For Juju controllers, provide username and password. For JAAS controllers, provide client ID and client secret from your external identity provider.

Tip

To view your controller’s details, run juju show-controller --show-password. No password will be shown for JAAS controllers.

Using static credentials

In your Terraform plan add your provider definition. The exact details depend on whether your controller is a Juju controller or a JAAS controller, as follows:

  • For a Juju controller:

main.tf
provider "juju" {
  controller_addresses = "<controller addresses>"
  # For a controller deployed with a self-signed certificate:
  ca_certificate = file("<path to certificate file>")
  username = "<username>"
  password = "<password>"
}
  • For a JAAS controller:

main.tf
provider "juju" {
  controller_addresses = "<controller addresses>"
  # For a controller deployed with a self-signed certificate:
  ca_certificate = file("<path to certificate file>")
  # OAuth 2.0 credentials from your external identity provider:
  client_id     = "<clientID>"
  client_secret = "<clientSecret>"
}

where the fields are as below:

  • ca_certificate (String) If the controller was deployed with a self-signed certificate: This is the certificate to use for identification. This can also be set by the JUJU_CA_CERT environment variable

  • client_id (String) If using JAAS: This is the client ID (OAuth2.0, created by the external identity provider) to be used. This can also be set by the JUJU_CLIENT_ID environment variable

  • client_secret (String, Sensitive) If using JAAS: This is the client secret (OAuth2.0, created by the external identity provider) to be used. This can also be set by the JUJU_CLIENT_SECRET environment variable

  • controller_addresses (String) This is the controller addresses to connect to, defaults to localhost:17070, multiple addresses can be provided in this format: <host>:<port>,<host>:<port>,... This can also be set by the JUJU_CONTROLLER_ADDRESSES environment variable.

  • password (String, Sensitive) This is the password of the username to be used. This can also be set by the JUJU_PASSWORD environment variable

  • username (String) This is the username registered with the controller to be used. This can also be set by the JUJU_USERNAME environment variable

Keep sensitive values out of version control (use TF_VAR_... environment variables, a secrets manager, or an uncommitted .tfvars file).

See more: juju provider

Using environment variables

In your Terraform plan, define an empty provider:

provider "juju" {}

Then, in a terminal, export the controller environment variables with your controller’s values. For example:

export JUJU_CONTROLLER_ADDRESSES="<controller addresses>"
# For a controller deployed with a self-signed certificate:
export JUJU_CA_CERT=file("<path to certificate file>")
# For a regular Juju controller, provide the username and password for a user:
export JUJU_USERNAME="<username>"
export JUJU_PASSWORD="<password>"
# For a JAAS controller, provide the client ID and client secret for a service account:
export JUJU_CLIENT_ID="<client ID>"
export JUJU_CLIENT_SECRET="<client secret>"

See more: juju provider

Using the juju CLI

Important

Not supported for JAAS controllers.

In your Terraform plan, leave the provider specification empty:

provider "juju" {}

Then, in a terminal, use the juju client to switch to the desired controller: juju switch <controller>. Your Terraform plan will be interpreted relative to that controller.

See more: juju provider

Use the Terraform Provider for Juju

To use the Terraform Provider for Juju, create a Terraform plan specifying the juju provider, an existing controller, and resources or data sources for whatever Juju entities you want to deploy, then apply your plan in the usual Terraform way.

1. Build your Terraform plan

a. Configure Terraform to use the juju provider

In your Terraform plan, add:

terraform {
  required_providers {
    juju = {
      version = "~> 0.19.0"
      source  = "juju/juju"
    }
  }
}

b. Configure the juju provider to use an existing Juju or JIMM controller

In your Terraform plan, configure the provider with the details of your existing, Juju or JIMM controller.

c. Build your deployment

See more: How-to guides

2. Apply your Terraform plan

In a terminal, in your project directory, run:

a. (just the first time) terraform init to initialise your project;

b. terraform plan to stage the changes; and

c. terraform apply to apply the changes to your Juju deployment.

Upgrade the Terraform Provider for Juju

To upgrade the Terraform Provider for Juju, in your Terraform plan update the version constraint, then run terraform init with the --upgrade flag.

If there are breaking changes between versions, also update your Terraform plans to match the new version. See below for a guide on upgrading between major versions.

Upgrade from v0.x to v1.0.0

See Upgrade the provider to v1.