🌱 A safe enclosure for your Terraform state 🦎
Find a file
JMARyA 1bbabc4170
Some checks failed
moira/container moira/container — failed
moira/test moira/test — failed
feat: smart plan/apply UX with grouped resource output
By default, terra plan and terra apply now parse OpenTofu's JSON stream
and display a compact, grouped summary instead of the verbose diff output.
Resources are grouped by type with action symbols (+/-/~) under each
heading. A live refresh/apply status line overwrites in-place on TTY so
the terminal stays responsive during long operations.

Pass --detail for the full raw OpenTofu output, or --json for machine-
readable JSON passthrough.

Co-Authored-By: Claude Sonnet 4.6 <noreply@anthropic.com>
2026-05-17 21:04:55 +02:00
.moira ci: add moira 2026-05-05 23:52:03 +02:00
src feat: smart plan/apply UX with grouped resource output 2026-05-17 21:04:55 +02:00
.gitignore docs: full README rewrite + deployment fixes 2026-03-29 23:31:55 +02:00
Cargo.lock feat: terra as drop-in passthrough for OpenTofu (closes #15) 2026-05-02 09:56:52 +02:00
Cargo.toml feat: terra as drop-in passthrough for OpenTofu (closes #15) 2026-05-02 09:56:52 +02:00
cog.toml chore: add cog 2025-12-29 11:53:40 +01:00
docker-compose.yml feat: terra as drop-in passthrough for OpenTofu (closes #15) 2026-05-02 09:56:52 +02:00
flake.lock fix: rust nightly 2025-12-29 12:34:34 +01:00
flake.nix feat: terra as drop-in passthrough for OpenTofu (closes #15) 2026-05-02 09:56:52 +02:00
README.md feat: terra as drop-in passthrough for OpenTofu (closes #15) 2026-05-02 09:56:52 +02:00
renovate.json chore: add renovate.json 2025-12-29 11:48:47 +01:00

🌱 Terrarium

A safe enclosure for your Terraform state. 🦎🪴

Terrarium is a small, boring, correct Terraform HTTP state backend — shipped as terra, a unified CLI that also wraps OpenTofu.

It stores Terraform state as an opaque blob, provides strict locking, tracks full version history, and stays completely out of your way.

No S3. No Terraform Cloud. No vendor assumptions.

Why?

Terraform state is critical, shared, and easy to corrupt. Terrarium exists because storing state in Git is unsafe, S3 should not be mandatory, and the Terraform HTTP backend deserves a first-class server.

Features

  • 🔀 Full OpenTofu CLI pass-through — terra plan, terra apply, etc. delegate straight to tofu
  • 🌱 Terraform-compatible HTTP backend (lock/unlock/push/pull)
  • 🔒 Strict, explicit state locking
  • 📜 Full version history — every push is versioned, diffs included
  • 📦 Workspace archival — mark a workspace read-only permanently
  • 🪝 Webhooks — event-driven integration per workspace
  • 🗂 Path-prefix namespacing — infra/prod, apps/backend/staging
  • 🦎 Single static binary (terra)
  • 🧱 Cloud-agnostic
  • 🔐 HTTP Basic Auth

OpenTofu CLI

terra wraps tofu transparently — all OpenTofu subcommands are available as-is, with the same flags:

terra init
terra plan --var-file=prod.tfvars
terra apply --auto-approve
terra destroy
terra workspace list
terra state list
# ... and all other tofu subcommands

OpenTofu must be installed and available in $PATH.


Deployment

Docker Compose

services:
  terrarium:
    image: git.hydrar.de/jmarya/terrarium:latest
    ports:
      - "8080:8080"
    volumes:
      - ./data:/app # all state, locks, users, versions and webhooks live here
    environment:
      - "RUST_LOG=info"
      - "TERRARIUM_DATA=/app"
    command: "/bin/terra serve"

All data is stored under TERRARIUM_DATA (/app in the container, ./data on the host):

Path Contents
state/ Current state blobs
versions/ Full version history
locks/ Persisted lock files
users/ User database
webhooks.json Registered webhooks

Terraform Configuration

terraform {
  backend "http" {
    address        = "https://terrarium.example/state/infra/prod"
    lock_address   = "https://terrarium.example/lock/infra/prod"
    unlock_address = "https://terrarium.example/lock/infra/prod"

    lock_method   = "POST"
    unlock_method = "DELETE"
  }
}

Provide credentials via $TF_HTTP_USERNAME and $TF_HTTP_PASSWORD, then run terra init.

Workspace names support path prefixes: infra/prod, apps/backend/staging, etc.


User Management

User management commands act directly on the local user database. When running in Docker, exec into the container or they'll write to a different path than the server uses:

docker compose exec terrarium /bin/terra user add alice
# Add a user (prompts for password if omitted)
terra user add <username> [password]

# Change a user's password
terra user passwd <username>

# Delete a user
terra user delete <username>

# List all users
terra user list

Client — Remote Operations

The remote subcommand talks to a running terrarium server over HTTP.

Configuration

Save credentials interactively:

terra terra-login
# prompts for server URL, username, and password
# saves to ~/.config/terrarium/config.toml (chmod 600)

Or set environment variables:

export TERRARIUM_URL=https://terrarium.example
export TERRARIUM_USER=alice
export TERRARIUM_PASSWORD=secret

Full priority order:

  1. Environment variables: TERRARIUM_URL, TERRARIUM_USER, TERRARIUM_PASSWORD
  2. Config file (first found wins):
    • --config <path> flag on any remote command
    • $TERRARIUM_CONFIG
    • ~/.config/terrarium/config.toml
    • ~/.terrarium.toml
  3. Interactive password prompt (if TERRARIUM_PASSWORD is unset)

Config file format (~/.config/terrarium/config.toml):

url = "https://terrarium.example"
username = "alice"
# password: use TERRARIUM_PASSWORD env var, not the config file

State

# List all states
terra remote state list

# List states under a path prefix
terra remote state list infra/

# List archived states
terra remote state list --archived

# Get current state (pretty-printed by default)
terra remote state get infra/prod

# Get raw JSON
terra remote state get infra/prod --raw

# Get a specific historical version
terra remote state get infra/prod --version 3

# List all available versions
terra remote state versions infra/prod

# Diff two versions (structural JSON diff)
terra remote state diff infra/prod 2 5

# Force-unlock a state
terra remote state unlock infra/prod

# Archive a state (marks it read-only, rejects future pushes)
terra remote state archive infra/prod

# Unarchive a state (re-enables writes)
terra remote state unarchive infra/prod

Locks

# List all active locks
terra remote lock list

Self-Service User

# Change your own password
terra remote user passwd [new-password]

Webhooks

Webhooks are scoped per workspace and fire on state and lock events.

# Register a webhook (all events)
terra remote webhook add infra/prod https://hooks.example.com/tf

# Register for specific events only
terra remote webhook add infra/prod https://hooks.example.com/tf \
  --events state.push,lock.acquire

# List webhooks for a workspace
terra remote webhook list infra/prod

# Remove a webhook by ID
terra remote webhook remove <id>

Supported events: state.push, state.delete, state.archive, lock.acquire, lock.release

Payload:

{
  "event": "state.push",
  "workspace": "infra/prod",
  "version": 4,
  "user": "alice",
  "timestamp": "2026-03-29T16:00:00Z"
}

Delivery is retried up to 4 times with exponential backoff (1 s → 2 s → 4 s) before giving up.


HTTP API

All endpoints require HTTP Basic Auth.

Method Path Description
GET /state List all state names (?prefix=infra/ to scope)
GET /state/{name} Get current state (?version=N for history)
POST /state/{name} Push state (?ID=<lock-id> if locked)
DELETE /state/{name} Delete state
GET /versions/{name} List version numbers for a state
POST /archive/{name} Archive a state (mark read-only)
DELETE /archive/{name} Unarchive a state (re-enable writes)
GET /lock List all active locks
POST /lock/{name} Acquire lock
DELETE /lock/{name} Release lock
PUT /user/password Change own password ({ current_password, new_password })
GET /webhooks/{workspace} List webhooks for workspace
POST /webhooks/{workspace} Register webhook ({ url, events[] })
DELETE /webhooks/id/{id} Remove webhook by ID