Downloads:

376,184

Downloads of v 0.5.2:

310

Last Update:

03 Jun 2015

Package Maintainer(s):

Software Author(s):

  • Mitchell Hashimoto
  • HashiCorp

Tags:

terraform

Terraform

This is not the latest version of Terraform available.

0.5.2 | Updated: 03 Jun 2015

Downloads:

376,184

Downloads of v 0.5.2:

310

Maintainer(s):

Software Author(s):

  • Mitchell Hashimoto
  • HashiCorp

Tags:

terraform

Terraform 0.5.2

This is not the latest version of Terraform available.

All Checks are Unknown

2 Test of Unknown Status


Validation Testing Unknown


Verification Testing Unknown

To install Terraform, run the following command from the command line or from PowerShell:

>

To upgrade Terraform, run the following command from the command line or from PowerShell:

>

To uninstall Terraform, run the following command from the command line or from PowerShell:

>

NOTE: This applies to both open source and commercial editions of Chocolatey.

1. Ensure you are set for organizational deployment

Please see the organizational deployment guide

  • Open Source or Commercial:
    • Proxy Repository - Create a proxy nuget repository on Nexus, Artifactory Pro, or a proxy Chocolatey repository on ProGet. Point your upstream to https://chocolatey.org/api/v2. Packages cache on first access automatically. Make sure your choco clients are using your proxy repository as a source and NOT the default community repository. See source command for more information.
    • You can also just download the package and push it to a repository Download

3. Enter your internal repository url

(this should look similar to https://chocolatey.org/api/v2)

4. Choose your deployment method:


choco upgrade terraform -y --source="'STEP 3 URL'" [other options]

See options you can pass to upgrade.

See best practices for scripting.

Add this to a PowerShell script or use a Batch script with tools and in places where you are calling directly to Chocolatey. If you are integrating, keep in mind enhanced exit codes.

If you do use a PowerShell script, use the following to ensure bad exit codes are shown as failures:


choco upgrade terraform -y --source="'STEP 3 URL'"
$exitCode = $LASTEXITCODE

Write-Verbose "Exit code was $exitCode"
$validExitCodes = @(0, 1605, 1614, 1641, 3010)
if ($validExitCodes -contains $exitCode) {
  Exit 0
}

Exit $exitCode

- name: Ensure terraform installed
  win_chocolatey:
    name: terraform
    state: present
    version: 0.5.2
    source: STEP 3 URL

See docs at https://docs.ansible.com/ansible/latest/modules/win_chocolatey_module.html.

Coming early 2020! Central Managment Reporting available now! More information...


chocolatey_package 'terraform' do
  action    :install
  version  '0.5.2'
  source   'STEP 3 URL'
end

See docs at https://docs.chef.io/resource_chocolatey_package.html.


Chocolatey::Ensure-Package
(
    Name: terraform,
    Version: 0.5.2,
    Source: STEP 3 URL
);

Requires Otter Chocolatey Extension. See docs at https://inedo.com/den/otter/chocolatey.


cChocoPackageInstaller terraform
{
   Name     = 'terraform'
   Ensure   = 'Present'
   Version  = '0.5.2'
   Source   = 'STEP 3 URL'
}

Requires cChoco DSC Resource. See docs at https://github.com/chocolatey/cChoco.


package { 'terraform':
  provider => 'chocolatey',
  ensure   => '0.5.2',
  source   => 'STEP 3 URL',
}

Requires Puppet Chocolatey Provider module. See docs at https://forge.puppet.com/puppetlabs/chocolatey.


salt '*' chocolatey.install terraform version="0.5.2" source="STEP 3 URL"

See docs at https://docs.saltstack.com/en/latest/ref/modules/all/salt.modules.chocolatey.html.

5. If applicable - Chocolatey configuration/installation

See infrastructure management matrix for Chocolatey configuration elements and examples.

This package was approved by moderator alexinslc on 04 Jun 2015.

Description

Terraform is a tool for building, changing, and versioning infrastructure safely and efficiently. Terraform can manage existing and popular service providers as well as custom in-house solutions.

The key features of Terraform are:

  • Infrastructure as Code: Infrastructure is described using a high-level configuration syntax. This allows a blueprint of your datacenter to be versioned and treated as you would any other code. Additionally, infrastructure can be shared and re-used.
  • Execution Plans: Terraform has a "planning" step where it generates an execution plan. The execution plan shows what Terraform will do when you call apply. This lets you avoid any surprises when Terraform manipulates infrastructure.
  • Resource Graph: Terraform builds a graph of all your resources, and parallelizes the creation and modification of any non-dependent resources. Because of this, Terraform builds infrastructure as efficiently as possible, and operators get insight into dependencies in their infrastructure.
  • Change Automation: Complex changesets can be applied to your infrastructure with minimal human interaction. With the previously mentioned execution plan and resource graph, you know exactly what Terraform will change and in what order, avoiding many possible human errors.

For more information, see the introduction section of the Terraform website.


tools\chocolateyInstall.ps1
$url = 'https://dl.bintray.com/mitchellh/terraform/terraform_0.5.2_windows_386.zip'
$url64bit = 'https://dl.bintray.com/mitchellh/terraform/terraform_0.5.2_windows_amd64.zip'
$unzipLocation = "$(Split-Path -parent $MyInvocation.MyCommand.Definition)"

Install-ChocolateyZipPackage "terraform" "$url" "$unzipLocation" "$url64bit"
tools\chocolateyUninstall.ps1
UnInstall-ChocolateyZipPackage "terraform" "terraformInstall.zip"

Log in or click on link to see number of positives.

In cases where actual malware is found, the packages are subject to removal. Software sometimes has false positives. Moderators do not necessarily validate the safety of the underlying software, only that a package retrieves software from the official distribution point and/or validate embedded software against official distribution point (where distribution rights allow redistribution).

Chocolatey Pro provides runtime protection from possible malware.

Version Downloads Last Updated Status
Terraform 0.14.6 3381 Wednesday, February 10, 2021 Approved
Terraform 0.14.5 4881 Wednesday, January 27, 2021 Approved
Terraform 0.14.4 5338 Sunday, January 10, 2021 Approved
Terraform 0.14.3 4498 Sunday, December 20, 2020 Approved
Terraform 0.14.2 3799 Wednesday, December 9, 2020 Approved
Terraform 0.14.1 55 Wednesday, December 9, 2020 Approved
Terraform 0.14.0 1498 Tuesday, December 8, 2020 Approved
Terraform 0.13.6 416 Sunday, January 10, 2021 Approved
Terraform 0.13.5 13409 Thursday, November 5, 2020 Approved

0.5.2 (May 15, 2015)

FEATURES:

  • Chef provisioning: You can now provision new hosts (both Linux and
    Windows) with Chef using a native provisioner [GH-1868]

IMPROVEMENTS:

  • New config function: formatlist - Format lists in a similar way to format.
    Useful for creating URLs from a list of IPs. [GH-1829]
  • New resource: aws_route53_zone_association
  • provider/aws: aws_autoscaling_group can wait for capacity in ELB
    via min_elb_capacity [GH-1970]
  • provider/aws: aws_db_instances supports license_model [GH-1966]
  • provider/aws: aws_elasticache_cluster add support for Tags [GH-1965]
  • provider/aws: aws_network_acl Network ACLs can be applied to multiple subnets [GH-1931]
  • provider/aws: aws_s3_bucket exports hosted_zone_id and region [GH-1865]
  • provider/aws: aws_s3_bucket add support for website redirect_all_requests_to [GH-1909]
  • provider/aws: aws_route53_record exports fqdn [GH-1847]
  • provider/aws: aws_route53_zone can create private hosted zones [GH-1526]
  • provider/google: google_compute_instance scratch attribute added [GH-1920]

BUG FIXES:

  • core: fix "resource not found" for interpolation issues with modules
  • core: fix unflattenable error for orphans [GH-1922]
  • core: fix deadlock with create-before-destroy + modules [GH-1949]
  • core: fix "no roots found" error with create-before-destroy [GH-1953]
  • core: variables set with environment variables won't validate as
    not set without a default [GH-1930]
  • core: resources with a blank ID in the state are now assumed to not exist [GH-1905]
  • command/push: local vars override remote ones [GH-1881]
  • provider/aws: Mark aws_security_group description as ForceNew [GH-1871]
  • provider/aws: aws_db_instance ARN value is correct [GH-1910]
  • provider/aws: aws_db_instance only submit modify request if there
    is a change. [GH-1906]
  • provider/aws: aws_elasticache_cluster export missing information on cluster nodes [GH-1965]
  • provider/aws: bad AMI on a launch configuration won't block refresh [GH-1901]
  • provider/aws: aws_security_group + aws_subnet - destroy timeout increased
    to prevent DependencyViolation errors. [GH-1886]
  • provider/google: google_compute_instance Local SSDs no-longer cause crash
    [GH-1088]
  • provider/google: google_http_health_check Defaults now driven from Terraform,
    avoids errors on update [GH-1894]
  • provider/google: google_compute_template Update Instance Template network
    definition to match changes to Instance [GH-980]
  • provider/template: Fix infinite diff [GH-1898]

0.5.0 (May 7, 2015)

BACKWARDS INCOMPATIBILITIES:

  • provider/aws: Terraform now remove the default egress rule created by AWS in
    a new security group.

FEATURES:

  • Multi-provider (a.k.a multi-region): Multiple instances of a single
    provider can be configured so resources can apply to different settings.
    As an example, this allows Terraform to manage multiple regions with AWS.
  • Environmental variables to set variables: Environment variables can be
    used to set variables. The environment variables must be in the format
    TF_VAR_name and this will be checked last for a value.
  • New remote state backend: s3: You can now store remote state in
    an S3 bucket. [GH-1723]
  • Automatic AWS retries: This release includes a lot of improvement
    around automatic retries of transient errors in AWS. The number of
    retry attempts is also configurable.
  • Templates: A new template_file resource allows long strings needing
    variable interpolation to be moved into files. [GH-1778]
  • Provision with WinRM: Provisioners can now run remote commands on
    Windows hosts. [GH-1483]

IMPROVEMENTS:

  • New config function: length - Get the length of a string or a list.
    Useful in conjunction with split. [GH-1495]
  • New resource: aws_app_cookie_stickiness_policy
  • New resource: aws_customer_gateway
  • New resource: aws_ebs_volume
  • New resource: aws_elasticache_cluster
  • New resource: aws_elasticache_security_group
  • New resource: aws_elasticache_subnet_group
  • New resource: aws_iam_access_key
  • New resource: aws_iam_group_policy
  • New resource: aws_iam_group
  • New resource: aws_iam_instance_profile
  • New resource: aws_iam_policy
  • New resource: aws_iam_role_policy
  • New resource: aws_iam_role
  • New resource: aws_iam_user_policy
  • New resource: aws_iam_user
  • New resource: aws_lb_cookie_stickiness_policy
  • New resource: aws_proxy_protocol_policy
  • New resource: aws_security_group_rule
  • New resource: aws_vpc_dhcp_options_association
  • New resource: aws_vpc_dhcp_options
  • New resource: aws_vpn_connection_route
  • New resource: google_dns_managed_zone
  • New resource: google_dns_record_set
  • Migrate to upstream AWS SDK: Migrate the AWS provider to
    awslabs/aws-sdk-go,
    the official awslabs library. Previously we had forked the library for
    stability while awslabs refactored. Now that work has completed, and we've
    migrated back to the upstream version.
  • core: Improve error message on diff mismatch [GH-1501]
  • provisioner/file: expand ~ in source path [GH-1569]
  • provider/aws: Better retry logic, now retries up to 11 times by default
    with exponentional backoff. This number is configurable. [GH-1787]
  • provider/aws: Improved credential detection [GH-1470]
  • provider/aws: Can specify a token via the config file [GH-1601]
  • provider/aws: Added new vpc_security_group_ids attribute for AWS
    Instances. If using a VPC, you can now modify the security groups for that
    Instance without destroying it [GH-1539]
  • provider/aws: White or blacklist account IDs that can be used to
    protect against accidents. [GH-1595]
  • provider/aws: Add a subset of IAM resources [GH-939]
  • provider/aws: aws_autoscaling_group retries deletes through "in progress"
    errors [GH-1840]
  • provider/aws: aws_autoscaling_group waits for healthy capacity during
    ASG creation [GH-1839]
  • provider/aws: aws_instance supports placement groups [GH-1358]
  • provider/aws: aws_eip supports network interface attachment [GH-1681]
  • provider/aws: aws_elb supports in-place changing of listeners [GH-1619]
  • provider/aws: aws_elb supports connection draining settings [GH-1502]
  • provider/aws: aws_elb increase default idle timeout to 60s [GH-1646]
  • provider/aws: aws_key_pair name can be omitted and generated [GH-1751]
  • provider/aws: aws_network_acl improved validation for network ACL ports
    and protocols [GH-1798] [GH-1808]
  • provider/aws: aws_route_table can target network interfaces [GH-968]
  • provider/aws: aws_route_table can specify propagating VGWs [GH-1516]
  • provider/aws: aws_route53_record supports weighted sets [GH-1578]
  • provider/aws: aws_route53_zone exports nameservers [GH-1525]
  • provider/aws: aws_s3_bucket website support [GH-1738]
  • provider/aws: aws_security_group name becomes optional and can be
    automatically set to a unique identifier; this helps with
    create_before_destroy scenarios [GH-1632]
  • provider/aws: aws_security_group description becomes optional with a
    static default value [GH-1632]
  • provider/aws: automatically set the private IP as the SSH address
    if not specified and no public IP is available [GH-1623]
  • provider/aws: aws_elb exports source_security_group field [GH-1708]
  • provider/aws: aws_route53_record supports alias targeting [GH-1775]
  • provider/aws: Remove default AWS egress rule for newly created Security Groups [GH-1765]
  • provider/consul: add scheme configuration argument [GH-1838]
  • provider/docker: docker_container can specify links [GH-1564]
  • provider/google: resource_compute_disk supports snapshots [GH-1426]
  • provider/google: resource_compute_instance supports specifying the
    device name [GH-1426]
  • provider/openstack: Floating IP support for LBaaS [GH-1550]
  • provider/openstack: Add AZ to openstack_blockstorage_volume_v1 [GH-1726]

BUG FIXES:

  • core: Fix graph cycle issues surrounding modules [GH-1582] [GH-1637]
  • core: math on arbitrary variables works if first operand isn't a
    numeric primitive. [GH-1381]
  • core: avoid unnecessary cycles by pruning tainted destroys from
    graph if there are no tainted resources [GH-1475]
  • core: fix issue where destroy nodes weren't pruned in specific
    edge cases around matching prefixes, which could cause cycles [GH-1527]
  • core: fix issue causing diff mismatch errors in certain scenarios during
    resource replacement [GH-1515]
  • core: dependencies on resources with a different index work when
    count > 1 [GH-1540]
  • core: don't panic if variable default type is invalid [GH-1344]
  • core: fix perpetual diff issue for computed maps that are empty [GH-1607]
  • core: validation added to check for self variables in modules [GH-1609]
  • core: fix edge case where validation didn't pick up unknown fields
    if the value was computed [GH-1507]
  • core: Fix issue where values in sets on resources couldn't contain
    hyphens. [GH-1641]
  • core: Outputs removed from the config are removed from the state [GH-1714]
  • core: Validate against the worst-case graph during plan phase to catch cycles
    that would previously only show up during apply [GH-1655]
  • core: Referencing invalid module output in module validates [GH-1448]
  • command: remote states with uppercase types work [GH-1356]
  • provider/aws: Support AWS_SECURITY_TOKEN env var again [GH-1785]
  • provider/aws: Don't save "instance" for EIP if association fails [GH-1776]
  • provider/aws: launch configuration ID set after create success [GH-1518]
  • provider/aws: Fixed an issue with creating ELBs without any tags [GH-1580]
  • provider/aws: Fix issue in Security Groups with empty IPRanges [GH-1612]
  • provider/aws: manually deleted S3 buckets are refreshed properly [GH-1574]
  • provider/aws: only check for EIP allocation ID in VPC [GH-1555]
  • provider/aws: raw protocol numbers work in aws_network_acl [GH-1435]
  • provider/aws: Block devices can be encrypted [GH-1718]
  • provider/aws: ASG health check grace period can be updated in-place [GH-1682]
  • provider/aws: ELB security groups can be updated in-place [GH-1662]
  • provider/aws: aws_main_route_table_association can be deleted
    manually [GH-1806]
  • provider/docker: image can reference more complex image addresses,
    such as with private repos with ports [GH-1818]
  • provider/openstack: region config is not required [GH-1441]
  • provider/openstack: enable_dhcp for networking subnet should be bool [GH-1741]
  • provisioner/remote-exec: add random number to uploaded script path so
    that parallel provisions work [GH-1588]
  • provisioner/remote-exec: chmod the script to 0755 properly [GH-1796]

This package has no dependencies.

Discussion for the Terraform Package

Ground Rules:

  • This discussion is only about Terraform and the Terraform package. If you have feedback for Chocolatey, please contact the Google Group.
  • This discussion will carry over multiple versions. If you have a comment about a particular version, please note that in your comments.
  • The maintainers of this Chocolatey Package will be notified about new comments that are posted to this Disqus thread, however, it is NOT a guarantee that you will get a response. If you do not hear back from the maintainers after posting a message below, please follow up by using the link on the left side of this page or follow this link to contact maintainers. If you still hear nothing back, please follow the package triage process.
  • Tell us what you love about the package or Terraform, or tell us what needs improvement.
  • Share your experiences with the package, or extra configuration or gotchas that you've found.
  • If you use a url, the comment will be flagged for moderation until you've been whitelisted. Disqus moderated comments are approved on a weekly schedule if not sooner. It could take between 1-5 days for your comment to show up.
comments powered by Disqus