cloud-foundation-fabric/modules
Daniel Marzini 00ca59030d Update README.md 2022-03-14 17:12:56 +01:00
..
__experimental Update main.tf 2022-02-01 19:02:15 +01:00
api-gateway API gateway module and example that creates a multi-region deployment for API gateway 2022-02-22 12:00:44 +01:00
apigee-organization
apigee-x-instance Add ip_range variable to apigee-x-instance module (#485) 2022-02-02 19:32:26 +01:00
artifact-registry Add periods at the end of each description field where missing (#478) 2022-01-31 10:45:34 +01:00
bigquery-dataset
bigtable-instance
billing-budget Add periods at the end of each description field where missing (#478) 2022-01-31 10:45:34 +01:00
cloud-config-container FAST: add 02-networking-peering stage. (#561) 2022-02-28 12:27:27 +01:00
cloud-function Add periods at the end of each description field where missing (#478) 2022-01-31 10:45:34 +01:00
cloud-identity-group Add periods at the end of each description field where missing (#478) 2022-01-31 10:45:34 +01:00
cloud-run Add periods at the end of each description field where missing (#478) 2022-01-31 10:45:34 +01:00
cloudsql-instance [#576] net-vpc - Add the ability to export/import custom routes throu… (#577) 2022-03-11 14:40:44 +01:00
compute-mig
compute-vm Add support for resource management tags and tag bindings (#552) 2022-02-20 11:14:18 +01:00
container-registry Add periods at the end of each description field where missing (#478) 2022-01-31 10:45:34 +01:00
data-catalog-policy-tag Policy Tag: Add IAM at tag level (#579) 2022-03-10 19:21:54 +01:00
datafusion Add periods at the end of each description field where missing (#478) 2022-01-31 10:45:34 +01:00
dns Fix broken link (#555) 2022-02-24 06:21:43 +00:00
endpoints
folder Add support for IAM additive to folder module (#580) 2022-03-11 09:46:32 +01:00
folders-unit Align tftest syntax with tdoc 2022-01-28 21:34:15 +01:00
gcs Add periods at the end of each description field where missing (#478) 2022-01-31 10:45:34 +01:00
gke-cluster Update README.md 2022-03-14 17:12:56 +01:00
gke-hub Add GKE Hub module to fabric (#540) 2022-02-28 12:40:48 +01:00
gke-nodepool Add periods at the end of each description field where missing (#478) 2022-01-31 10:45:34 +01:00
iam-service-account
iot-core IoT module (#415) 2022-02-05 15:54:24 +01:00
kms Add support for resource management tags and tag bindings (#552) 2022-02-20 11:14:18 +01:00
logging-bucket
naming-convention
net-address
net-cloudnat
net-glb Rename tf files to use dashes 2022-02-04 08:45:49 +01:00
net-ilb Align tftest syntax with tdoc 2022-01-28 21:34:15 +01:00
net-interconnect-attachment-direct Add periods at the end of each description field where missing (#478) 2022-01-31 10:45:34 +01:00
net-vpc [#576] net-vpc - Add the ability to export/import custom routes throu… (#577) 2022-03-11 14:40:44 +01:00
net-vpc-firewall FAST: add 02-networking-peering stage. (#561) 2022-02-28 12:27:27 +01:00
net-vpc-peering
net-vpn-dynamic
net-vpn-ha Update README.md 2022-03-01 08:49:21 +01:00
net-vpn-static Align tftest syntax with tdoc 2022-01-28 21:34:15 +01:00
organization Add support for resource management tags and tag bindings (#552) 2022-02-20 11:14:18 +01:00
project Add support for resource management tags and tag bindings (#552) 2022-02-20 11:14:18 +01:00
projects-data-source Skip tests for projects-data-source module 2022-03-08 09:26:47 +01:00
pubsub Align tftest syntax with tdoc 2022-01-28 21:34:15 +01:00
secret-manager
service-directory
source-repository
vpc-sc Update README.md 2022-02-13 16:14:24 +01:00
README.md Add module for retrieving all projects/folders under a specific parent (recursively). 2022-03-07 22:02:18 +01:00

README.md

Terraform modules suite for Google Cloud

The modules collected in this folder are designed as a suite: they are meant to be composed together, and are designed to be forked and modified where use of third party code and sources is not allowed.

Modules try to stay close to the low level provider resources they encapsulate, and they all share a similar interface that combines management of one resource or set or resources, and the corresponding IAM bindings.

Authoritative IAM bindings are primarily used (e.g. google_storage_bucket_iam_binding for GCS buckets) so that each module is authoritative for specific roles on the resources it manages, and can neutralize or reconcile IAM changes made elsewhere.

Specific modules also offer support for non-authoritative bindings (e.g. google_storage_bucket_iam_member for service accounts), to allow granular permission management on resources that they don't manage directly.

These modules are not necessarily backward compatible. Changes breaking compatibility in modules are marked by major releases (but not all major releases contain breaking changes). Please be mindful when upgrading Fabric modules in existing Terraform setups, and always try to use versioned references in module sources so you can easily revert back to a previous version. Since the introduction of the moved block in Terraform we try to use it whenever possible to make updates non-breaking, but that does not cover all changes we might need to make.

These modules are used in the examples included in this repository. If you are using any of those examples in your own Terraform configuration, make sure that you are using the same version for all the modules, and switch module sources to GitHub format using references. The recommended approach to working with Fabric modules is the following:

  • Fork the repository and own the fork. This will allow you to:

    • Evolve the existing modules.
    • Create your own modules.
    • Sync from the upstream repository to get all the updates.
  • Use GitHub sources with refs to reference the modules. See an example below:

    module "project" {
        source              = "github.com/GoogleCloudPlatform/cloud-foundation-fabric//modules/project?ref=v13.0.0"
        name                = "my-project"
        billing_account     = "123456-123456-123456"
        parent              = "organizations/123456"
    }
    

Foundational modules

Networking modules

Compute/Container

Data

Development

Security

Serverless