Ecosyste.ms: Awesome

An open API service indexing awesome lists of open source software.

Awesome Lists | Featured Topics | Projects

https://github.com/jckuester/terradozer

Terraform destroy without configuration files
https://github.com/jckuester/terradozer

aws cleanup cloud delete destroy golang terraform tfstate

Last synced: about 1 month ago
JSON representation

Terraform destroy without configuration files

Awesome Lists containing this project

README

        


terradozer

terradozer


Terraform destroy using the state only - no *.tf files needed

---
[![Release](https://img.shields.io/github/release/jckuester/terradozer.svg?style=for-the-badge)](https://github.com/jckuester/terradozer/releases/latest)
[![Software License](https://img.shields.io/badge/license-MIT-brightgreen.svg?style=for-the-badge)](/LICENSE.md)
[![Travis](https://img.shields.io/travis/jckuester/terradozer/master.svg?style=for-the-badge)](https://travis-ci.com/jckuester/terradozer)
[![Codecov branch](https://img.shields.io/codecov/c/github/jckuester/terradozer/master.svg?style=for-the-badge)](https://codecov.io/gh/jckuester/terradozer)
[![Go Doc](https://img.shields.io/badge/godoc-reference-blue.svg?style=for-the-badge)](http://godoc.org/github.com/jckuester/terradozer)

Terradozer takes a Terraform state file as input and destroys all resources it finds in it - without needing any *.tf
files. This works currently only for resources of the Terraform AWS Provider. If you need support for any other provider,
let me know, and I will try to help.

Happy (terra)dozing!

## Example

![](img/example.gif)

## Features

* Nothing will be deleted without your confirmation. Terradozer always lists all resources first and then waits for
your approval
* Using the `-force` flag (dangerous!), terradozer can run in an automated fashion without human interaction and approval,
for example, as part of your CI pipeline
* **Planned**, if you want me to implement this, [please upvote](https://github.com/jckuester/terradozer/issues/9):
Allow terradozer pointing directly to a state file stored in S3, i.e., `terradozer s3://path/to/terraform.tfstate`
* **Planned**, if you want me to implement this, [please upvote](https://github.com/jckuester/terradozer/issues/8):
A `-recursive` flag to delete resources of all states found under a given directory, i.e.,
`terradozer -recursive s3://bucket-with-states/`. This is especially helpful if
you orchestrate Terraform modules with [Terragrunt](https://github.com/gruntwork-io/terragrunt) and store all states
under the same directory or in the same S3 bucket. This way, a complete Terragrunt project could be cleaned up in an
automated fashion.

## Installation

It's recommended to install a specific version of terradozer available on the
[releases page](https://github.com/jckuester/terradozer/releases).

Here is the recommended way to install terradozer v0.1.2:

```bash
# install it into ./bin/
curl -sSfL https://raw.githubusercontent.com/jckuester/terradozer/master/install.sh | sh -s v0.1.2
```

## Usage

To delete all resources in a Terraform state file:

terradozer [flags]

To see all options, run `terradozer --help`. Provide credentials for the AWS account you want to destroy resources in
via the usual [environment variables](https://docs.aws.amazon.com/cli/latest/userguide/cli-configure-envvars.html), e.g.,
`AWS_PROFILE=` and `AWS_DEFAULT_REGION=`.

The region information is needed as it is not stored as part of the state. Having multiple providers with different
regions in one state file is not yet supported.

## How it works

Terradozer first scans a given Terraform state file (read-only) to find all resources (excluding data sources),
then downloads the necessary Terraform Provider Plugins to call the destroy function for each resource on the respective
CRUD API via GRPC (e.g., calling the Terraform AWS Provider to destroy a `aws_instance` resource).

## Tests

This section is only relevant if you want to contribute to Terradozer and therefore run the tests. Terradozer has
acceptance tests, integration tests checking against changes of behaviour in the Terraform Provider API, and of course
unit tests.

Run unit tests

make test

Run acceptance and integration tests

AWS_PROFILE= AWS_DEFAULT_REGION= make test-all