⚠️ DEVELOPMENT STATUS: Early Production PhaseThis project is in active development with initial cloud provider support now available.
Current Scope:
- ✅ Local LXD virtual machine provisioning
- ✅ Hetzner Cloud support for production deployments
- ✅ Development and testing workflows
- ✅ Multi-provider architecture (provider selection via configuration)
- ✅ Application deployment (Torrust Tracker stack with Docker Compose)
📋 MVP Goal: After completing the roadmap, we will have a fully automated deployment solution for Torrust Tracker with complete application stack management and multi-cloud provider support.
This Rust application provides automated deployment infrastructure for Torrust tracker projects. It supports local development with LXD and production deployments with Hetzner Cloud. The multi-provider architecture allows easy extension to additional cloud providers.
Current Development Phase:
- ✅ Create local VMs supporting cloud-init for development and CI testing
- ✅ Test cloud-init execution and verification in controlled environments
- ✅ Support Docker Compose inside VMs for application stacks
- ✅ Fast, easy to install and use local development solution
- ✅ No nested virtualization dependency (CI compatibility)
- ✅ Multi-provider support (LXD for local, Hetzner Cloud for production)
- ✅ Application stack deployment (Torrust Tracker with Docker Compose)
Future MVP Goals: (See roadmap)
- 🔄 Additional cloud providers (AWS, GCP, Azure)
- 🔄 Multi-environment management
- 🔄 Enhanced observability (monitoring, alerting, metrics)
This repository uses LXD virtual machines for local virtualization and development:
- Technology: Virtual machines with cloud-init support
- Status: ✅ Production-ready for local development and CI testing
- Best for: Local development, CI/CD environments, fast iteration
- Requirements: No special virtualization needed
📖 See detailed documentation →
| Feature | LXD Virtual Machines |
|---|---|
| GitHub Actions Support | ✅ Guaranteed |
| Nested Virtualization | ❌ Not needed |
| Boot Time | ✅ Fast (~5-10s) |
| Resource Usage | ✅ Efficient |
| Installation | ✅ Simple setup |
This is a Rust application that automates deployment infrastructure using OpenTofu and Ansible.
The project provides a dependency installer tool that automatically detects and installs required dependencies:
# Install all required dependencies
cargo run --bin dependency-installer install
# Check which dependencies are installed
cargo run --bin dependency-installer check
# List all dependencies with status
cargo run --bin dependency-installer listThe installer supports: OpenTofu, Ansible, LXD, and cargo-machete.
For detailed information, see 📖 Dependency Installer →.
If you prefer manual installation or need to troubleshoot:
Check installations:
lxd version && tofu version && ansible --version && cargo --versionMissing tools? See detailed installation guides:
Quick manual install:
# Install Rust (if not already installed)
curl --proto '=https' --tlsv1.2 -sSf https://sh.rustup.rs | sh
# Install LXD
sudo snap install lxd && sudo lxd init --auto && sudo usermod -a -G lxd $USER && newgrp lxd
# Install OpenTofu
curl -fsSL https://get.opentofu.org/install-opentofu.sh | sudo bash
# Install Ansible
sudo apt install ansibleThe main application provides usage instructions:
# Build and run the application
cargo run
# Or install and run directly
cargo install --path .
torrust-tracker-deployerFor detailed usage instructions, command reference, and examples, see the 👤 User Guide.
The application includes comprehensive logging with configurable format, output mode, and directory. See 📖 Logging Guide for details on logging configuration options.
This project includes convenient scripts for common development tasks:
# Run all linters (markdown, YAML, TOML, shell scripts, Rust)
cargo run --bin linter allOr run individual linters:
cargo run --bin linter markdown # Markdown linting
cargo run --bin linter yaml # YAML linting
cargo run --bin linter toml # TOML linting
cargo run --bin linter cspell # Spell checking
cargo run --bin linter clippy # Rust code analysis
cargo run --bin linter rustfmt # Rust formatting check
cargo run --bin linter shellcheck # Shell script lintingUse the E2E test binaries to run automated infrastructure tests with hardcoded environments:
# Run comprehensive E2E tests (LOCAL ONLY - connectivity issues in GitHub runners)
cargo run --bin e2e-complete-workflow-tests
# Run individual E2E test suites
cargo run --bin e2e-deployment-workflow-tests # Configuration, release, and run workflow tests
cargo run --bin e2e-infrastructure-lifecycle-tests # Infrastructure provisioning tests
# Keep the test environment after completion for inspection
cargo run --bin e2e-complete-workflow-tests -- --keep
cargo run --bin e2e-infrastructure-lifecycle-tests -- --keep
# Use custom templates directory
cargo run --bin e2e-complete-workflow-tests -- --templates-dir ./custom/templates
# See all available options
cargo run --bin e2e-tests-full -- --help
⚠️ Important Notes:
- E2E tests create hardcoded environments with predefined configurations
- Use
--keepflag to inspect generateddata/andbuild/directories after testse2e-tests-fullcan only run locally due to connectivity issues in GitHub runners- To see final OpenTofu and Ansible templates, check
build/directories after running with--keep
✅ Complete deployment workflow is now available! You can create, provision, configure, test, deploy, run, and destroy Torrust Tracker environments using the CLI.
Current Status:
- ✅ Environment Management: Create and manage deployment environments
- ✅ Infrastructure Provisioning: Provision VM infrastructure with LXD or Hetzner Cloud
- ✅ Configuration: Configure provisioned infrastructure (Docker, Docker Compose)
- ✅ Verification: Test deployment infrastructure
- ✅ Application Deployment: Deploy Torrust Tracker configuration and database
- ✅ Service Management: Start and manage tracker services
Available Commands:
# 1. Generate configuration template torrust-tracker-deployer create template my-env.json # 2. Edit my-env.json with your settings # 3. Create environment from configuration torrust-tracker-deployer create environment -f my-env.json # 4. Provision VM infrastructure torrust-tracker-deployer provision my-environment # 5. Configure infrastructure (install Docker, Docker Compose) torrust-tracker-deployer configure my-environment # 6. Verify deployment infrastructure torrust-tracker-deployer test my-environment # 7. Deploy tracker application configuration torrust-tracker-deployer release my-environment # 8. Start tracker services torrust-tracker-deployer run my-environment # 9. Destroy environment when done torrust-tracker-deployer destroy my-environment📖 For detailed command documentation and guides, see:
- Quick Start Guide - Complete workflow walkthrough
- Commands Reference - Detailed guide for each command (coming soon)
- Console Commands - Technical reference
📋 Reference: Manual OpenTofu and Ansible Commands (Advanced)
Note: The CLI commands above are the recommended way to manage deployments. This section is for advanced users who want to execute OpenTofu and Ansible commands directly.
If you want to experiment with OpenTofu and Ansible commands directly using the generated templates:
# Run E2E tests but keep the infrastructure for manual experimentation
cargo run --bin e2e-tests-full -- --keep
# This creates resolved templates (no variables) in build/ directories
# ✅ Verified: Creates build/e2e-full/tofu/lxd/ and build/e2e-full/ansible/# Navigate to the specific environment's resolved OpenTofu templates
cd build/e2e-full/tofu/lxd/
# Or navigate to resolved Ansible templates
cd build/e2e-full/ansible/
# Other available environments:
# cd build/e2e-provision/tofu/lxd/
# cd build/e2e-provision/ansible/
# cd build/e2e-config/ansible/ # (config tests don't create tofu resources)# From build/e2e-full/tofu/lxd/ - Execute OpenTofu commands
tofu plan -var-file=variables.tfvars # ✅ Verified: Works with resolved templates
tofu validate # Validate configuration
tofu output -json # View current outputs
# Note: tofu apply already executed during E2E test
# From build/e2e-full/ansible/ - Execute Ansible commands
ansible-playbook --list-hosts -i inventory.yml wait-cloud-init.yml # ✅ Verified: Works
ansible-playbook -i inventory.yml wait-cloud-init.yml # Run playbook
ansible-playbook -i inventory.yml install-docker.yml # Install Docker# Connect to the running LXD instance directly
lxc exec torrust-tracker-vm-e2e-full -- /bin/bash
# Or via SSH (IP may vary, check tofu output)
ssh -i fixtures/testing_rsa torrust@$(cd build/e2e-full/tofu/lxd && tofu output -json | jq -r '.instance_info.value.ip_address')# ✅ Verified: Destroy the infrastructure when done experimenting
cd build/e2e-full/tofu/lxd/
tofu destroy -var-file=variables.tfvars -auto-approve
# ✅ Verified: This removes both the VM instance and the LXD profile
# Alternative: Use LXD commands directly
# lxc delete torrust-tracker-vm-e2e-full --force
# lxc profile delete torrust-profile-e2e-full
⚠️ Important: Currently there's no application command to destroy infrastructure manually. You must use either:
- OpenTofu destroy (recommended) - Uses resolved templates in
build/directories- LXD commands - Direct LXD resource management
- Re-run E2E tests - Automatically destroys and recreates infrastructure
📖 For comprehensive LXD commands and examples, see LXD documentation
- Provision: OpenTofu creates and configures VMs with cloud-init
- Configure: Ansible connects to VMs and executes management tasks
- Verify: Automated checks ensure proper setup and functionality
| Phase | Tool | Purpose |
|---|---|---|
| Infrastructure | OpenTofu | VM provisioning and cloud-init setup |
| Configuration | Ansible | Task execution and configuration management |
| Verification | Ansible Playbooks | System checks and validation |
📖 See detailed Ansible documentation →
The repository includes comprehensive GitHub Actions workflows for CI testing:
.github/workflows/linting.yml- Code Quality - Runs all linters (markdown, YAML, TOML, Rust, shell scripts).github/workflows/testing.yml- Unit Tests - Runs Rust unit tests and basic validation.github/workflows/test-e2e-config.yml- E2E Config Tests - Tests configuration generation and validation.github/workflows/test-e2e-provision.yml- E2E Provision Tests - Tests infrastructure provisioning workflows.github/workflows/test-lxd-provision.yml- LXD Provisioning - Tests LXD VM provisioning specifically
Note: The full E2E tests (
e2e-tests-full) can only be executed locally due to connectivity issues documented indocs/github-actions-issues/.
This project follows a structured development roadmap to evolve from the current local development focus to a production-ready deployment solution.
Current Development Status:
- ✅ Local LXD Infrastructure: VM provisioning, cloud-init, E2E testing
- ✅ Development Workflows: Linting, testing, CI/CD automation
- ✅ Foundation Layer: OpenTofu + Ansible + Docker integration
Next Major Milestones:
- 🔄 Main Application Commands:
create,deploy,destroy,status - � Real Cloud Providers: Starting with Hetzner, expanding to AWS/GCP/Azure
- 🔄 Production Features: HTTPS, backups, monitoring stack
├── .github/ # CI/CD workflows and GitHub configuration
│ └── workflows/ # GitHub Actions workflow files
├── build/ # 📁 Generated runtime configs (git-ignored)
│ ├── e2e-config/ # E2E config test runtime files
│ ├── e2e-full/ # E2E full test runtime files
│ └── e2e-provision/ # E2E provision test runtime files
├── data/ # Environment-specific data and configurations
│ ├── e2e-config/ # E2E config test environment data
│ ├── e2e-full/ # E2E full test environment data
│ ├── e2e-provision/ # E2E provision test environment data
│ └── logs/ # Application logs
├── docker/ # Docker-related configurations
│ └── provisioned-instance/ # Docker setup for provisioned instances
├── docs/ # 📖 Detailed documentation
│ ├── tech-stack/ # Technology-specific documentation
│ │ ├── opentofu.md # OpenTofu installation and usage
│ │ ├── ansible.md # Ansible installation and usage
│ │ └── lxd.md # LXD virtual machines
│ ├── user-guide/ # User documentation
│ │ ├── commands/ # Command reference documentation
│ │ └── providers/ # Provider-specific guides (LXD, Hetzner)
│ ├── decisions/ # Architecture Decision Records (ADRs)
│ ├── contributing/ # Contributing guidelines and conventions
│ │ ├── README.md # Main contributing guide
│ │ ├── branching.md # Git branching conventions
│ │ ├── commit-process.md # Commit process and pre-commit checks
│ │ ├── error-handling.md # Error handling principles
│ │ ├── module-organization.md # Module organization conventions
│ │ └── testing/ # Testing conventions and guides
│ ├── features/ # Feature specifications and documentation
│ ├── research/ # Research and analysis documents
│ └── *.md # Various documentation files
├── examples/ # Example configurations and usage
├── fixtures/ # Test fixtures and sample data
│ ├── testing_rsa* # SSH key pair for testing
│ └── tofu/ # OpenTofu test fixtures
├── packages/ # Rust workspace packages
│ ├── dependency-installer/ # Dependency detection and installation
│ └── linting/ # Linting utilities package
│ └── src/ # Linting implementation source code
├── scripts/ # Development and utility scripts
│ └── setup/ # Installation scripts for dependencies
├── src/ # 🦀 Main Rust application source code (DDD Architecture)
│ ├── main.rs # Main application binary entry point
│ ├── lib.rs # Library root module
│ ├── container.rs # Dependency injection container
│ ├── logging.rs # Logging configuration
│ ├── bin/ # Binary executables
│ │ ├── linter.rs # Unified linting command interface
│ │ └── e2e*.rs # End-to-end testing binaries
│ ├── application/ # Application layer (use cases, commands)
│ ├── domain/ # Domain layer (business logic, entities)
│ │ └── provider/ # Provider types (LXD, Hetzner)
│ ├── infrastructure/ # Infrastructure layer (external systems)
│ ├── presentation/ # Presentation layer (CLI interface)
│ ├── adapters/ # External tool adapters (OpenTofu, Ansible, SSH, LXD)
│ ├── shared/ # Shared utilities and common code
│ ├── testing/ # Testing utilities and mocks
│ ├── config/ # Configuration handling
│ ├── bootstrap/ # Application bootstrapping
│ └── e2e/ # End-to-end testing infrastructure
├── templates/ # 📁 Template configurations (git-tracked)
│ ├── tofu/ # 🏗️ OpenTofu/Terraform templates
│ │ ├── lxd/ # LXD VM template configuration
│ │ └── hetzner/ # Hetzner Cloud template configuration
│ └── ansible/ # 🤖 Ansible playbook templates
├── tests/ # Integration and system tests
├── target/ # 🦀 Rust build artifacts (git-ignored)
├── Cargo.toml # Rust workspace configuration
├── Cargo.lock # Rust dependency lock file
├── cspell.json # Spell checking configuration
├── project-words.txt # Custom dictionary for spell checking
├── .markdownlint.json # Markdown linting configuration
├── .prettierignore # Prettier ignore rules (for Tera templates)
├── .taplo.toml # TOML formatting configuration
├── .yamllint-ci.yml # YAML linting configuration for CI
├── README.md # This file - project overview
├── LICENSE # Project license
└── .gitignore # Git ignore rules
- 👤 User Guide - Getting started, command reference, and usage examples
- ☁️ Provider Guides - LXD and Hetzner Cloud provider configuration
- 🤝 Contributing Guide - Git workflow, commit process, and linting conventions
- 🗺️ Roadmap - Development roadmap and MVP goals
- 📖 Documentation Organization Guide - How documentation is organized and where to contribute
- 📖 OpenTofu Setup Guide - Installation, common commands, and best practices
- 📖 Ansible Setup Guide - Installation, configuration, and project usage
- 📖 VM Providers Comparison - Detailed comparison and decision rationale
This project now supports multiple infrastructure providers. The path to production-ready deployment is outlined in our 📋 Roadmap.
Recent achievements:
- ✅ Multi-Provider Support: LXD for local development, Hetzner Cloud for production deployments
- ✅ Provider Selection: Choose your provider via
provider_configin environment configuration - ✅ Complete CLI Commands:
create,provision,configure,test, anddestroycommands
Key upcoming milestones:
- Application Stack Management: Complete Docker Compose stacks with Torrust Tracker, MySQL, Prometheus, and Grafana
- HTTPS Support: SSL/TLS configuration for all services
- Backup & Recovery: Database backups and disaster recovery procedures
- Additional Cloud Providers: AWS, GCP, and Azure support