-
Notifications
You must be signed in to change notification settings - Fork 2
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[feat] Add a guide on how to auto-generate Terraform config. Update home page with token scopes and env variables #35
Merged
Merged
Changes from all commits
Commits
File filter
Filter by extension
Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,178 @@ | ||
--- | ||
page_title: Auto-generating Terraform config from existing Retool organization | ||
description: |- | ||
How to auto-generate Terraform configuration files from your Retool organization | ||
--- | ||
|
||
# Auto-generating Terraform config files | ||
|
||
You can use [Retool CLI](https://www.npmjs.com/package/retool-cli) to automatically generate Terraform configuration based on existing Retool organization. | ||
This can be useful for controlling that organization via Terraform or copying its configuration to some other organization. | ||
|
||
**NOTE** Auto-generation functionality is _experimental_ and is primarily intended to generate a best-effort approximation of Terraform config, which in many cases will still need to be manually tweaked in order to work properly. Use with caution. | ||
|
||
## 1. Install Retool CLI tool | ||
Follow the instructions [here](https://www.npmjs.com/package/retool-cli). You'll need version 1.0.29 or newer. | ||
|
||
## 2. Create API access token in your org and set environment variables | ||
|
||
Go to **Settings** > **Retool API** in your Retool organization and create access token with the following scopes: | ||
- source_control:read | ||
- groups:read | ||
- spaces:read | ||
- folders:read | ||
- permissions:all:read | ||
|
||
Add `write` scopes if you plan to reuse the token in Retool Terraform provider later. | ||
|
||
Set the following environment variables in your terminal: | ||
```sh | ||
export RETOOL_HOST=retool.example.com # domain name of the Retool org | ||
export RETOOL_ACCESS_TOKEN=retool_123sdkfjsld # API access token | ||
export RETOOL_SCHEME=http # Only if your Retool instance is using HTTP instead of HTTPS | ||
``` | ||
|
||
## 3. Generate Terraform configuration | ||
You can now run Retool CLI in your terminal: | ||
|
||
```sh | ||
retool terraform -c generated.tf -i import.tf | ||
``` | ||
|
||
The file `generated.tf` will contain Terraform resource definitions. For example: | ||
```hcl | ||
resource "retool_folder" "production_apps" { | ||
name = "Production Apps" | ||
folder_type = "app" | ||
} | ||
|
||
resource "retool_group" "production_apps_user" { | ||
name = "Production Apps User" | ||
universal_app_access = "none" | ||
universal_resource_access = "none" | ||
universal_workflow_access = "none" | ||
universal_query_library_access = "none" | ||
user_list_access = false | ||
audit_log_access = false | ||
unpublished_release_access = false | ||
usage_analytics_access = false | ||
account_details_access = false | ||
} | ||
``` | ||
|
||
The file `import.tf` will map Terraform resources to ids of the objects in your Retool organization, so that Terraform knows not to create new ones: | ||
```hcl | ||
import { | ||
to = retool_folder.production_apps | ||
id = "app_74" | ||
} | ||
|
||
import { | ||
to = retool_group.production_apps_user | ||
id = "55" | ||
} | ||
``` | ||
|
||
## 4. Configure Retool Terraform provider and apply your configuration | ||
Create a file `main.tf` and add the following code to it: | ||
```hcl | ||
terraform { | ||
required_providers { | ||
retool = { | ||
source = "tryretool/retool" | ||
} | ||
} | ||
} | ||
|
||
# Configure the Retool provider with the access token. | ||
provider "retool" { | ||
} | ||
``` | ||
|
||
Note that in this example, the provider will use the environment variables you defined earlier to get the hostname and API access token. | ||
Depending on your scenario, you might want to tweak this configuration to use non-default Terraform backend, read the API access token from a secret manager etc. | ||
|
||
## 5. Apply the configuration your Retool organization | ||
You can now run: | ||
```sh | ||
terraform init | ||
terraform plan | ||
``` | ||
|
||
Carefully inspect Terraform output to make sure it will not inadvertently modify or destroy objects in your Retool organization. | ||
Once you're happy with the plan, you can apply it: | ||
```sh | ||
terraform apply | ||
``` | ||
|
||
# Other scenarios and common pitfalls | ||
|
||
## Copying your configuration to another Retool organization | ||
You can follow the process described above with the following modifications: | ||
- You don't need to generate `imports.tf` file - just drop the `-i` option when running Retool CLI in step 3. | ||
- You'll need to provide the hostname of your target organization when configuring Retool provider in step 4. | ||
|
||
## Sensitive values | ||
Retool CLI can't read unecrypted secrets from Retool org, so any sensitive values will be set to `null` in the generated Terraform config. | ||
|
||
## Hardcoded object ids | ||
Retool CLI makes the best effort to generate "portable" Terraform configuration that can be applied to other Retool organizations. | ||
However, in some scenarios the generated configuration will contain object IDs (app and workflow UUIDs, for example) from the source Retool organization. | ||
Since these ids won't exist in the target Retool organization, you'd need to remove or update them in the config before trying to apply it to another Retool organization. | ||
|
||
For example, the generated config may look like this: | ||
```hcl | ||
resource "retool_folder" "production_apps" { | ||
name = "Production Apps" | ||
folder_type = "app" | ||
} | ||
|
||
resource "retool_group" "production_apps_user" { | ||
name = "Production Apps User" | ||
universal_app_access = "none" | ||
universal_resource_access = "none" | ||
universal_workflow_access = "none" | ||
universal_query_library_access = "none" | ||
user_list_access = false | ||
audit_log_access = false | ||
unpublished_release_access = false | ||
usage_analytics_access = false | ||
account_details_access = false | ||
} | ||
|
||
resource "retool_permissions" "production_apps_user_permissions" { | ||
subject = { | ||
type = "group" | ||
id = retool_group.production_apps_user.id | ||
} | ||
permissions = [ | ||
{ | ||
object = { | ||
type = "folder" | ||
id = retool_folder.production_apps.id | ||
} | ||
access_level = "use" | ||
}, | ||
{ | ||
object = { | ||
type = "app" | ||
id = "123-29384-abcdef" | ||
} | ||
access_level = "use" | ||
}, | ||
] | ||
} | ||
``` | ||
|
||
This fragment is not portable, since it refers to UUID of an app that only exists in the source Retool organization: | ||
```hcl | ||
... | ||
{ | ||
object = { | ||
type = "app" | ||
id = "123-29384-abcdef" | ||
} | ||
access_level = "use" | ||
}, | ||
... | ||
``` |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -12,6 +12,13 @@ self-hosted Retool instance or Retool Cloud organization using [Retool Platform | |
|
||
## Prerequisites | ||
Your [Retool plan](https://retool.com/pricing) should support Platform APIs. You'll need to create an API token on **Settings > Retool API** . | ||
The access token should have the following scopes: | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Auto-generated from the template below |
||
- source_control:read, source_control:write | ||
- groups:read, groups:write | ||
- spaces:read, spaces:write | ||
- folders:read, folders:write | ||
- permissions:all:read, permissions:all:write | ||
|
||
|
||
## Example Usage | ||
|
||
|
@@ -137,3 +144,13 @@ provider "retool" { | |
requests_per_minute = -1 | ||
} | ||
``` | ||
|
||
## Provisioning new Retool instance | ||
If you're using Retool Terraform provider to configure a new Retool instance, and you don't want to manually log in to the instance in order to create API token, you can use the following environment variables | ||
in your Retool instance configuration: | ||
```sh | ||
export CREATE_FIRST_ORG="true" # Will automatically create the first organization on the instance | ||
export ADMIN_USER_EMAIL="[email protected]" # Email of the admin user | ||
export ADMIN_API_ACCESS_TOKEN="retool_01j33n67seh459gds2n5xjyrfx" # You can use any random string here | ||
export ADMIN_API_ACCESS_TOKEN_SCOPES="source_control:read,source_control:write,groups:read,groups:write,spaces:read,spaces:write,folders:read,folders:write,permissions:all:read,permissions:all:write," | ||
``` |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,178 @@ | ||
--- | ||
page_title: Auto-generating Terraform config from existing Retool organization | ||
description: |- | ||
How to auto-generate Terraform configuration files from your Retool organization | ||
--- | ||
|
||
# Auto-generating Terraform config files | ||
|
||
You can use [Retool CLI](https://www.npmjs.com/package/retool-cli) to automatically generate Terraform configuration based on existing Retool organization. | ||
This can be useful for controlling that organization via Terraform or copying its configuration to some other organization. | ||
|
||
**NOTE** Auto-generation functionality is _experimental_ and is primarily intended to generate a best-effort approximation of Terraform config, which in many cases will still need to be manually tweaked in order to work properly. Use with caution. | ||
|
||
## 1. Install Retool CLI tool | ||
Follow the instructions [here](https://www.npmjs.com/package/retool-cli). You'll need version 1.0.29 or newer. | ||
|
||
## 2. Create API access token in your org and set environment variables | ||
|
||
Go to **Settings** > **Retool API** in your Retool organization and create access token with the following scopes: | ||
- source_control:read | ||
- groups:read | ||
- spaces:read | ||
- folders:read | ||
- permissions:all:read | ||
|
||
Add `write` scopes if you plan to reuse the token in Retool Terraform provider later. | ||
|
||
Set the following environment variables in your terminal: | ||
```sh | ||
export RETOOL_HOST=retool.example.com # domain name of the Retool org | ||
export RETOOL_ACCESS_TOKEN=retool_123sdkfjsld # API access token | ||
export RETOOL_SCHEME=http # Only if your Retool instance is using HTTP instead of HTTPS | ||
``` | ||
|
||
## 3. Generate Terraform configuration | ||
You can now run Retool CLI in your terminal: | ||
|
||
```sh | ||
retool terraform -c generated.tf -i import.tf | ||
``` | ||
|
||
The file `generated.tf` will contain Terraform resource definitions. For example: | ||
```hcl | ||
resource "retool_folder" "production_apps" { | ||
name = "Production Apps" | ||
folder_type = "app" | ||
} | ||
|
||
resource "retool_group" "production_apps_user" { | ||
name = "Production Apps User" | ||
universal_app_access = "none" | ||
universal_resource_access = "none" | ||
universal_workflow_access = "none" | ||
universal_query_library_access = "none" | ||
user_list_access = false | ||
audit_log_access = false | ||
unpublished_release_access = false | ||
usage_analytics_access = false | ||
account_details_access = false | ||
} | ||
``` | ||
|
||
The file `import.tf` will map Terraform resources to ids of the objects in your Retool organization, so that Terraform knows not to create new ones: | ||
```hcl | ||
import { | ||
to = retool_folder.production_apps | ||
id = "app_74" | ||
} | ||
|
||
import { | ||
to = retool_group.production_apps_user | ||
id = "55" | ||
} | ||
``` | ||
|
||
## 4. Configure Retool Terraform provider and apply your configuration | ||
Create a file `main.tf` and add the following code to it: | ||
```hcl | ||
terraform { | ||
required_providers { | ||
retool = { | ||
source = "tryretool/retool" | ||
} | ||
} | ||
} | ||
|
||
# Configure the Retool provider with the access token. | ||
provider "retool" { | ||
} | ||
``` | ||
|
||
Note that in this example, the provider will use the environment variables you defined earlier to get the hostname and API access token. | ||
Depending on your scenario, you might want to tweak this configuration to use non-default Terraform backend, read the API access token from a secret manager etc. | ||
|
||
## 5. Apply the configuration your Retool organization | ||
You can now run: | ||
```sh | ||
terraform init | ||
terraform plan | ||
``` | ||
|
||
Carefully inspect Terraform output to make sure it will not inadvertently modify or destroy objects in your Retool organization. | ||
Once you're happy with the plan, you can apply it: | ||
```sh | ||
terraform apply | ||
``` | ||
|
||
# Other scenarios and common pitfalls | ||
|
||
## Copying your configuration to another Retool organization | ||
You can follow the process described above with the following modifications: | ||
- You don't need to generate `imports.tf` file - just drop the `-i` option when running Retool CLI in step 3. | ||
- You'll need to provide the hostname of your target organization when configuring Retool provider in step 4. | ||
|
||
## Sensitive values | ||
Retool CLI can't read unecrypted secrets from Retool org, so any sensitive values will be set to `null` in the generated Terraform config. | ||
|
||
## Hardcoded object ids | ||
Retool CLI makes the best effort to generate "portable" Terraform configuration that can be applied to other Retool organizations. | ||
However, in some scenarios the generated configuration will contain object IDs (app and workflow UUIDs, for example) from the source Retool organization. | ||
Since these ids won't exist in the target Retool organization, you'd need to remove or update them in the config before trying to apply it to another Retool organization. | ||
|
||
For example, the generated config may look like this: | ||
```hcl | ||
resource "retool_folder" "production_apps" { | ||
name = "Production Apps" | ||
folder_type = "app" | ||
} | ||
|
||
resource "retool_group" "production_apps_user" { | ||
name = "Production Apps User" | ||
universal_app_access = "none" | ||
universal_resource_access = "none" | ||
universal_workflow_access = "none" | ||
universal_query_library_access = "none" | ||
user_list_access = false | ||
audit_log_access = false | ||
unpublished_release_access = false | ||
usage_analytics_access = false | ||
account_details_access = false | ||
} | ||
|
||
resource "retool_permissions" "production_apps_user_permissions" { | ||
subject = { | ||
type = "group" | ||
id = retool_group.production_apps_user.id | ||
} | ||
permissions = [ | ||
{ | ||
object = { | ||
type = "folder" | ||
id = retool_folder.production_apps.id | ||
} | ||
access_level = "use" | ||
}, | ||
{ | ||
object = { | ||
type = "app" | ||
id = "123-29384-abcdef" | ||
} | ||
access_level = "use" | ||
}, | ||
] | ||
} | ||
``` | ||
|
||
This fragment is not portable, since it refers to UUID of an app that only exists in the source Retool organization: | ||
```hcl | ||
... | ||
{ | ||
object = { | ||
type = "app" | ||
id = "123-29384-abcdef" | ||
} | ||
access_level = "use" | ||
}, | ||
... | ||
``` |
Oops, something went wrong.
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This file is auto-generated from the template below.