Hooks
HCP Terraform Agents support running custom programs, or hooks, during strategic points of a Terraform run. These hooks allow you to extend the functionality of Terraform runs. For example, you may create a hook to dynamically download software required by the Terraform run or send an HTTP request to a system to kick off an external workflow.
Supported Hooks
HCP Terraform Agents support the following hooks:
pre-plan
- Runs beforeterraform init
during aplan
operation.post-plan
- Runs afterterraform plan
during aplan
operation regardless of whether or notterraform plan
completed successfully.pre-apply
- Runs beforeterraform init
during anapply
operation.post-apply
- Runs afterterraform apply
during anapply
operation regardless of whether or notterraform apply
completed successfully.
Hook Behavior
Please note the following behavior when using hooks:
- If a hook exits with a non-zero exit code, the Terraform run will fail immediately.
- The standard output and standard error from the hook will be printed alongside the Terraform run output in the HCP Terraform or Terraform Enterprise user interface.
- The hook name must match one of the supported hooks. You
cannot customize or change these names. Because of this, there can only be
one hook of each type configured for each agent. For example, you could
create a
pre-plan
andpre-apply
hook, but you cannot create twopre-plan
hooks. - Each hook must have the execute permission set.
- Each hook has a 60 second timeout. If a hook times out the Terraform run will fail immediately.
- Environment variables do not persist across hooks. For example, if a
pre-plan
hook exports environment variables, they will not be available during thepost-plan
hook. Similarly, ifterraform plan
exports environment variables, they will not be available during thepost-plan
hook.
Setting environment variables
Hooks may be used to set environment variables for subsequent terraform
commands to use. To set an environment variable, write lines in KEY=value
format to the file pointed to by the $TFC_AGENT_ENV
environment variable.
Newlines are used to separate multiple environment variables. For example, to
set the FOO
and BAR
environment variables for the terraform plan
operation
to consume, write the following in a pre-plan
hook script:
Environment variables set by a hook script in this way are only applicable to
the current operation, and are not persisted for later operations. For example,
if FOO=bar
is set in the pre-plan
hook, then FOO=bar
will be set during
the terraform plan
command, but will not be set during terraform apply
. To
use the variable during the apply phase, write the variable to the
$TFC_AGENT_ENV
file again in the pre-apply
hook script.
Configuration
Hooks are stored within the hooks
subdirectory of the agent's data directory.
By default, that's ~/.tfc-agent/hooks
.
To configure a hook, create a file named terraform-${HOOK}
where ${HOOK}
is one of the hooks listed above. Then store that file within the hooks
subdirectory and make it executable. The agent will trigger configured hooks
at the appropriate points during Terraform runs.
For example, a pre-plan
hook is an executable file named
~/.tfc-agent/hooks/terraform-pre-plan
. When this hook is configured, an agent
will run this hook before terraform init
during a plan
operation.
Running an Agent as a Binary
To configure hooks when running the tfc-agent
binary directly on a Linux
instance:
Create the
hooks
directory within the agent's data directory.Create one or more hooks inside the
hooks
directory. The following example creates apre-plan
hook that prints a message when it runs.Make the hooks executable.
Start the agent.
The agent will now trigger configured hooks at the appropriate points during Terraform runs. The standard output and standard error from the hook will be printed alongside the Terraform run in the HCP Terraform or Terraform Enterprise user interface.
Running an Agent with Docker
When running tfc-agent
using Docker, you must build a new Docker image
containing the hooks. To configure hooks:
Create a new directory and navigate into it. This limits the Docker build context to this new directory.
Create a
hooks
directory.Create one or more hooks inside the
hooks
directory. The following example creates apre-plan
hook that prints a message when it runs.Make the hooks executable.
Create a
Dockerfile
with the following content.Build a new
hashicorp/tfc-agent
Docker image using theDockerfile
.Start the agent using the Docker image.
The agent will now trigger configured hooks at the appropriate points during Terraform runs. The standard output and standard error from the hook will be printed alongside the Terraform run in the HCP Terraform or Terraform Enterprise user interface.