Open source Terraform module registry with UI, Git integration, security alerts, and cost estimation.
Terrareg is an open-source Terraform module registry that allows organizations to host, discover, and analyze Terraform modules internally. It provides a web UI, deep module analysis, security scanning, and cost estimation to improve infrastructure-as-code governance and reuse. It solves the problem of managing private Terraform modules without relying on public registries.
DevOps engineers, platform teams, and infrastructure developers who need to manage and share Terraform modules within their organization.
Developers choose Terrareg because it offers a fully self-hosted, feature-rich alternative to Terraform Cloud's private registry, with unique capabilities like security alerts, cost estimation, and Git automation hooks.
Open source Terraform module registry with UI, optional Git integration and deep analysis. Demo: https://terrareg-main.gitlab-pr.dockstudios.co.uk
Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.
Implements the Terraform registry protocol, allowing seamless integration with Terraform CLI for module discovery and usage without modifications.
Extracts READMEs, inputs, outputs, provider requirements, and managed resources automatically, providing deep insights into module functionality.
Scans modules for security vulnerabilities and provides cost estimates for examples, enhancing governance and budget planning.
Supports hooks for SCM applications to automatically index modules on changes, reducing manual effort in module management.
Offers authentication via OpenIDConnect/SAML2 and GitHub, enabling secure access control for organizational use.
Requires valid SSL certificates for Terraform integration, and the README notes that without HTTPS, module version ranges won't work properly, adding deployment overhead.
The warning about arbitrary code execution during module analysis poses a significant risk if used with untrusted sources, limiting its use in high-security environments.
Designed exclusively for Terraform modules, making it unsuitable for organizations using other infrastructure-as-code tools or needing a broader registry.
The Terraform provider for managing Terrareg is labeled as 'very early alpha,' indicating potential instability and limited functionality for automation.