-
Notifications
You must be signed in to change notification settings - Fork 77
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add Binary Releases #57
Comments
@osterman We do not intend to add releases to this project. However, it would be helpful if you shared a bit more about the use cases why/where you're using terraform-config-inspect and why a binary release would be helpful to that workflow. |
Thanks @pselle for the update. Here's our use-case. Cloud Posse is a massive user of Terraform, as well as dozens of other tools. We distribute our toolchain as alpine, debian, and redhat packages so we have a consistent way for each distribution to install the tools. These are tools we use in our docker images, local development and test infrastructure. Having a package management system makes that very easy for our community and customers. We now rely on problemEvery package management system out there relies on semver. In order to release a package for Additionally, without releases, it's hard to pin to a version. Granted we could pin to a SHA, the sha is not a valid semver. Depending on solutionOur solution to releases is very easy and could be adopted by this project. The gist of it is always cut a release on merge to master. I could also share how we do it, but sounds like GitHub actions like the one we use are not in scope. =) It'd be helpful to understand what the opposition is to cutting releases and distributing binaries? =) |
Code for PR is already there. |
hello @osterman we also use terraform a lot at Claranet and I use terraform-config-inspect in some of our CIs also to check some things but more to "parse" hcl module config (i.e. to get default value of variables). I also would prefer to rely on release but I use a docker image (https://hub.docker.com/repository/docker/claranet/terraform-ci) to workaround this (CI uses this image ensuring the "version" is the always the same even if it does not point to any tag/release while the docker image is not updated itself). To check if a module is pinned I use https://github.com/terraform-linters/tflint/ with the rule |
Thanks @xp-1000 that's a good tip! |
I too would like to know what the opposition is to cutting releases? R. |
Same need for a release. We use terraform-config-inspect to generate a web page with all the Terraform projects at our organization for tracking purpose. This web page contains for each project the list of modules and providers used. |
Any update? |
👀 |
what
why
The text was updated successfully, but these errors were encountered: