cloud-foundation-fabric/modules
Ludovico Magnocavallo e3a03a76ff
Add support for rePD and existing disk attachment to compute VM (#194)
* initial untested support for repd in compute-vm

* fix repd reference in instance disks

* add support for snapshot source, change disk variable

* fix attach existing disk to instance

* fix examples, add documentation on disk sources

* fix attaching disk for instance templates, add examples

* fix data e2e examples

* update vars table in README
2021-02-03 08:00:08 +01:00
..
__experimental/net-neg Bump Terraform version used in tests, increase pytest verbosity (#147) 2020-09-27 15:31:19 +02:00
artifact-registry Make examples in READMEs runnable and testable 2020-11-07 10:28:33 +01:00
bigquery-dataset refactor access in bq module, add iam (#172) 2020-11-21 09:45:56 +01:00
bigtable-instance Make examples in READMEs runnable and testable 2020-11-07 10:28:33 +01:00
cloud-config-container Adjusting second region for on-prem-in-a-box for testing more use cases 2021-01-29 18:43:53 +01:00
cloud-function Make examples in READMEs runnable and testable 2020-11-07 10:28:33 +01:00
compute-mig Fix tests for 0.14 compatibility (#191) 2021-01-29 14:55:50 +01:00
compute-vm Add support for rePD and existing disk attachment to compute VM (#194) 2021-02-03 08:00:08 +01:00
container-registry Make examples in READMEs runnable and testable 2020-11-07 10:28:33 +01:00
datafusion Make examples in READMEs runnable and testable 2020-11-07 10:28:33 +01:00
dns fix dns peering example in doc 2021-01-11 12:29:29 +01:00
endpoints Make examples in READMEs runnable and testable 2020-11-07 10:28:33 +01:00
folder Add include_children option folder and organization sinks 2020-12-06 17:56:27 +01:00
folders-unit Make examples in READMEs runnable and testable 2020-11-07 10:28:33 +01:00
gcs Make examples in READMEs runnable and testable 2020-11-07 10:28:33 +01:00
gke-cluster Make examples in READMEs runnable and testable 2020-11-07 10:28:33 +01:00
gke-nodepool monitoring is automatically enabled when monitoring.writer is enabled (#177) 2020-11-25 17:32:53 +01:00
iam-service-account Fix tests for 0.14 compatibility (#191) 2021-01-29 14:55:50 +01:00
kms Make examples in READMEs runnable and testable 2020-11-07 10:28:33 +01:00
net-address fix provider version pinning 2020-11-14 17:47:07 +01:00
net-cloudnat Make examples in READMEs runnable and testable 2020-11-07 10:28:33 +01:00
net-ilb Make examples in READMEs runnable and testable 2020-11-07 10:28:33 +01:00
net-vpc add provider constraint for net-vpc, fixes #185 2021-01-15 19:01:28 +01:00
net-vpc-firewall align firewall module README with variables 2020-11-16 17:39:51 +01:00
net-vpc-peering Make examples in READMEs runnable and testable 2020-11-07 10:28:33 +01:00
net-vpn-dynamic Fix tests for 0.14 compatibility (#191) 2021-01-29 14:55:50 +01:00
net-vpn-ha Fix tests for 0.14 compatibility (#191) 2021-01-29 14:55:50 +01:00
net-vpn-static Fix tests for 0.14 compatibility (#191) 2021-01-29 14:55:50 +01:00
organization update README.md for org module with new parameters 2020-12-10 09:36:32 +00:00
project Rename "grant" to "iam" in sink variables 2020-12-05 12:39:06 +01:00
pubsub Make examples in READMEs runnable and testable 2020-11-07 10:28:33 +01:00
secret-manager Make examples in READMEs runnable and testable 2020-11-07 10:28:33 +01:00
service-directory Make examples in READMEs runnable and testable 2020-11-07 10:28:33 +01:00
source-repository Make examples in READMEs runnable and testable 2020-11-07 10:28:33 +01:00
vpc-sc Minor vpc-sc module corrections (#167) 2020-11-16 18:04:12 +01:00
README.md Update README and CHANGELOG 2020-12-06 18:05:57 +01:00

README.md

Terraform modules suite for Google Cloud

The modules collected in this folder are designed as a suite: they are meant to be composed together, and are designed to be forked and modified where use of third party code and sources is not allowed.

Modules try to stay close to the low level provider resources they encapsulate, and they all share a similar interface that combines management of one resource or set or resources, and the corresponding IAM bindings.

Authoritative IAM bindings are primarily used (e.g. google_storage_bucket_iam_binding for GCS buckets) so that each module is authoritative for specific roles on the resources it manages, and can neutralize or reconcile IAM changes made elsewhere.

Specific modules also offer support for non-authoritative bindings (e.g. google_storage_bucket_iam_member for service accounts), to allow granular permission management on resources that they don't manage directly.

Foundational modules

Networking modules

Compute/Container

Data

Development

Security

Serverless