2014-07-23 18:40:15 +02:00
|
|
|
---
|
|
|
|
layout: "docs"
|
|
|
|
page_title: "Provisioner Connections"
|
|
|
|
sidebar_current: "docs-provisioners-connection"
|
2014-10-22 05:21:56 +02:00
|
|
|
description: |-
|
2016-10-09 17:42:43 +02:00
|
|
|
Managing connection defaults for SSH and WinRM using the `connection` block.
|
2014-07-23 18:40:15 +02:00
|
|
|
---
|
|
|
|
|
|
|
|
# Provisioner Connections
|
|
|
|
|
|
|
|
Many provisioners require access to the remote resource. For example,
|
2015-04-10 21:28:28 +02:00
|
|
|
a provisioner may need to use SSH or WinRM to connect to the resource.
|
2014-07-23 18:40:15 +02:00
|
|
|
|
|
|
|
Terraform uses a number of defaults when connecting to a resource, but these
|
2016-10-09 17:42:43 +02:00
|
|
|
can be overridden using a `connection` block in either a `resource` or `provisioner`.
|
2014-07-23 18:40:15 +02:00
|
|
|
Any `connection` information provided in a `resource` will apply to all the
|
|
|
|
provisioners, but it can be scoped to a single provisioner as well. One use case
|
2016-10-09 17:42:43 +02:00
|
|
|
is to have an initial provisioner connect as the `root` user to setup user accounts, and have
|
2014-07-23 18:40:15 +02:00
|
|
|
subsequent provisioners connect as a user with more limited permissions.
|
|
|
|
|
|
|
|
## Example usage
|
|
|
|
|
|
|
|
```
|
2015-04-10 21:28:28 +02:00
|
|
|
# Copies the file as the root user using SSH
|
2014-07-23 18:40:15 +02:00
|
|
|
provisioner "file" {
|
|
|
|
source = "conf/myapp.conf"
|
|
|
|
destination = "/etc/myapp.conf"
|
|
|
|
connection {
|
2016-10-09 17:42:43 +02:00
|
|
|
type = "ssh"
|
2014-07-23 18:40:15 +02:00
|
|
|
user = "root"
|
|
|
|
password = "${var.root_password}"
|
|
|
|
}
|
|
|
|
}
|
2015-04-10 21:28:28 +02:00
|
|
|
|
|
|
|
# Copies the file as the Administrator user using WinRM
|
|
|
|
provisioner "file" {
|
|
|
|
source = "conf/myapp.conf"
|
|
|
|
destination = "C:/App/myapp.conf"
|
|
|
|
connection {
|
|
|
|
type = "winrm"
|
|
|
|
user = "Administrator"
|
|
|
|
password = "${var.admin_password}"
|
|
|
|
}
|
|
|
|
}
|
2014-07-23 18:40:15 +02:00
|
|
|
```
|
|
|
|
|
|
|
|
## Argument Reference
|
|
|
|
|
2015-04-10 21:28:28 +02:00
|
|
|
**The following arguments are supported by all connection types:**
|
2014-07-23 18:40:15 +02:00
|
|
|
|
2016-10-09 17:42:43 +02:00
|
|
|
* `type` - The connection type that should be used. Valid types are `ssh` and `winrm`
|
|
|
|
Defaults to `ssh`.
|
2014-07-23 18:40:15 +02:00
|
|
|
|
2016-10-09 17:42:43 +02:00
|
|
|
* `user` - The user that we should use for the connection. Defaults to `root` when
|
|
|
|
using type `ssh` and defaults to `Administrator` when using type `winrm`.
|
2014-07-23 18:40:15 +02:00
|
|
|
|
2015-04-10 21:28:28 +02:00
|
|
|
* `password` - The password we should use for the connection. In some cases this is
|
2016-10-09 17:42:43 +02:00
|
|
|
specified by the provider.
|
2015-04-10 21:28:28 +02:00
|
|
|
|
2016-10-09 17:42:43 +02:00
|
|
|
* `host` - The address of the resource to connect to. This is usually specified by the provider.
|
2015-04-10 21:28:28 +02:00
|
|
|
|
2016-10-09 17:42:43 +02:00
|
|
|
* `port` - The port to connect to. Defaults to `22` when using type `ssh` and defaults
|
|
|
|
to `5985` when using type `winrm`.
|
2015-04-10 21:28:28 +02:00
|
|
|
|
|
|
|
* `timeout` - The timeout to wait for the connection to become available. This defaults
|
2016-10-09 17:42:43 +02:00
|
|
|
to 5 minutes. Should be provided as a string like `30s` or `5m`.
|
2015-04-10 21:28:28 +02:00
|
|
|
|
2016-04-16 00:05:49 +02:00
|
|
|
* `script_path` - The path used to copy scripts meant for remote execution.
|
2015-04-10 21:28:28 +02:00
|
|
|
|
2016-10-09 17:42:43 +02:00
|
|
|
**Additional arguments only supported by the `ssh` connection type:**
|
2014-07-23 18:40:15 +02:00
|
|
|
|
2015-11-12 21:39:41 +01:00
|
|
|
* `private_key` - The contents of an SSH key to use for the connection. These can
|
|
|
|
be loaded from a file on disk using the [`file()` interpolation
|
|
|
|
function](/docs/configuration/interpolation.html#file_path_). This takes
|
|
|
|
preference over the password if provided.
|
2014-07-23 18:40:15 +02:00
|
|
|
|
2016-10-09 17:42:43 +02:00
|
|
|
* `agent` - Set to `false` to disable using `ssh-agent` to authenticate. On Windows the
|
2015-12-15 16:39:23 +01:00
|
|
|
only supported SSH authentication agent is
|
2016-10-09 17:42:43 +02:00
|
|
|
[Pageant](http://the.earth.li/~sgtatham/putty/0.66/htmldoc/Chapter9.html#pageant).
|
2015-03-16 00:37:33 +01:00
|
|
|
|
2016-10-09 17:42:43 +02:00
|
|
|
**Additional arguments only supported by the `winrm` connection type:**
|
2014-07-23 18:40:15 +02:00
|
|
|
|
2016-10-09 17:42:43 +02:00
|
|
|
* `https` - Set to `true` to connect using HTTPS instead of HTTP.
|
2014-07-23 18:40:15 +02:00
|
|
|
|
2016-10-09 17:42:43 +02:00
|
|
|
* `insecure` - Set to `true` to not validate the HTTPS certificate chain.
|
2014-07-23 18:40:15 +02:00
|
|
|
|
2015-04-10 21:28:28 +02:00
|
|
|
* `cacert` - The CA certificate to validate against.
|
2015-06-22 18:34:02 +02:00
|
|
|
|
|
|
|
<a id="bastion"></a>
|
|
|
|
## Connecting through a Bastion Host with SSH
|
|
|
|
|
2016-10-09 17:42:43 +02:00
|
|
|
The `ssh` connection also supports the following fields to facilitate connnections via a
|
|
|
|
[bastion host](https://en.wikipedia.org/wiki/Bastion_host).
|
2015-06-22 18:34:02 +02:00
|
|
|
|
|
|
|
* `bastion_host` - Setting this enables the bastion Host connection. This host
|
2016-10-09 17:42:43 +02:00
|
|
|
will be connected to first, and then the `host` connection will be made from there.
|
2015-06-22 18:34:02 +02:00
|
|
|
|
|
|
|
* `bastion_port` - The port to use connect to the bastion host. Defaults to the
|
2016-10-09 17:42:43 +02:00
|
|
|
value of the `port` field.
|
2015-06-22 18:34:02 +02:00
|
|
|
|
2016-10-09 17:42:43 +02:00
|
|
|
* `bastion_user` - The user for the connection to the bastion host. Defaults to
|
|
|
|
the value of the `user` field.
|
2015-06-22 18:34:02 +02:00
|
|
|
|
|
|
|
* `bastion_password` - The password we should use for the bastion host.
|
2016-10-09 17:42:43 +02:00
|
|
|
Defaults to the value of the `password` field.
|
2015-06-22 18:34:02 +02:00
|
|
|
|
2015-11-12 21:39:41 +01:00
|
|
|
* `bastion_private_key` - The contents of an SSH key file to use for the bastion
|
|
|
|
host. These can be loaded from a file on disk using the [`file()`
|
|
|
|
interpolation function](/docs/configuration/interpolation.html#file_path_).
|
2016-10-09 17:42:43 +02:00
|
|
|
Defaults to the value of the `private_key` field.
|
2015-11-12 21:39:41 +01:00
|
|
|
|
|
|
|
## Deprecations
|
|
|
|
|
2016-10-09 17:42:43 +02:00
|
|
|
These fields are supported for backwards compatibility and may be removed in a
|
2015-11-12 21:39:41 +01:00
|
|
|
future version:
|
|
|
|
|
|
|
|
* `key_file` - A path to or the contents of an SSH key to use for the
|
|
|
|
connection. These can be loaded from a file on disk using the [`file()`
|
|
|
|
interpolation function](/docs/configuration/interpolation.html#file_path_).
|
2016-10-09 17:42:43 +02:00
|
|
|
This takes preference over the password, if provided.
|
2015-11-12 21:39:41 +01:00
|
|
|
|
|
|
|
* `bastion_key_file` - The contents of an SSH key file to use for the bastion
|
|
|
|
host. These can be loaded from a file on disk using the [`file()`
|
|
|
|
interpolation function](/docs/configuration/interpolation.html#file_path_).
|
2016-10-09 17:42:43 +02:00
|
|
|
Defaults to the value of the `key_file` field.
|