cloud-foundation-fabric/modules
Ludovico Magnocavallo 7bd6e5d57b
Small fixes (#1425)
* fix serverless connector plugin outputs

* add internal and lb to allowed ingress org policy

* add validation condition on cloud run ingress settings

* tfdoc

* plugin tfdoc

* allow disabling googleapis routes with a single instruction in net-vpc

* fix variable def

* fix variable description

* fix cr variable validation

* fix usage of   create_googleapis_routes in examples and stages
2023-06-07 17:37:46 +00:00
..
__experimental bump provider versions 2023-04-11 22:18:31 +10:00
alloydb-instance add alloydb module (#1403) 2023-06-04 10:12:32 +00:00
api-gateway bump provider versions 2023-04-11 22:18:31 +10:00
apigee bump provider versions 2023-04-11 22:18:31 +10:00
artifact-registry Ensure all modules have an `id` output (#1410) 2023-06-02 16:07:22 +02:00
bigquery-dataset Migrate bigquery-dataset tests 2023-04-21 17:51:20 +02:00
bigtable-instance Ensure all modules have an `id` output (#1410) 2023-06-02 16:07:22 +02:00
billing-budget Ensure all modules have an `id` output (#1410) 2023-06-02 16:07:22 +02:00
binauthz Ensure all modules have an `id` output (#1410) 2023-06-02 16:07:22 +02:00
cloud-config-container Several updates 2023-05-13 23:51:46 -04:00
cloud-dataplex Ensure all modules have an `id` output (#1410) 2023-06-02 16:07:22 +02:00
cloud-function Ensure all modules have an `id` output (#1410) 2023-06-02 16:07:22 +02:00
cloud-identity-group Ensure all modules have an `id` output (#1410) 2023-06-02 16:07:22 +02:00
cloud-run Small fixes (#1425) 2023-06-07 17:37:46 +00:00
cloudsql-instance Ensure all modules have an `id` output (#1410) 2023-06-02 16:07:22 +02:00
compute-mig Ensure all modules have an `id` output (#1410) 2023-06-02 16:07:22 +02:00
compute-vm Ensure all modules have an `id` output (#1410) 2023-06-02 16:07:22 +02:00
container-registry Ensure all modules have an `id` output (#1410) 2023-06-02 16:07:22 +02:00
data-catalog-policy-tag Ensure all modules have an `id` output (#1410) 2023-06-02 16:07:22 +02:00
datafusion Ensure all modules have an `id` output (#1410) 2023-06-02 16:07:22 +02:00
dataproc Ensure all modules have an `id` output (#1410) 2023-06-02 16:07:22 +02:00
dns Ensure all modules have an `id` output (#1410) 2023-06-02 16:07:22 +02:00
dns-response-policy Ensure all modules have an `id` output (#1410) 2023-06-02 16:07:22 +02:00
endpoints Several updates 2023-05-13 23:51:46 -04:00
folder Ensure all modules have an `id` output (#1410) 2023-06-02 16:07:22 +02:00
gcs Ensure all modules have an `id` output (#1410) 2023-06-02 16:07:22 +02:00
gke-cluster-autopilot Ensure all modules have an `id` output (#1410) 2023-06-02 16:07:22 +02:00
gke-cluster-standard Ensure all modules have an `id` output (#1410) 2023-06-02 16:07:22 +02:00
gke-hub Ensure all modules have an `id` output (#1410) 2023-06-02 16:07:22 +02:00
gke-nodepool Ensure all modules have an `id` output (#1410) 2023-06-02 16:07:22 +02:00
iam-service-account Ensure all modules have an `id` output (#1410) 2023-06-02 16:07:22 +02:00
kms Ensure all modules have an `id` output (#1410) 2023-06-02 16:07:22 +02:00
logging-bucket Ensure all modules have an `id` output (#1410) 2023-06-02 16:07:22 +02:00
ncc-spoke-ra Ensure all modules have an `id` output (#1410) 2023-06-02 16:07:22 +02:00
net-address Migrate net-address tests 2023-04-21 17:51:19 +02:00
net-cloudnat Ensure all modules have an `id` output (#1410) 2023-06-02 16:07:22 +02:00
net-dedicated-vlan-attachment Ensure all modules have an `id` output (#1410) 2023-06-02 16:07:22 +02:00
net-glb Ensure all modules have an `id` output (#1410) 2023-06-02 16:07:22 +02:00
net-ilb Remove hardcoded description from instance groups created under net-ilb (#1417) 2023-06-05 09:35:17 +00:00
net-ilb-l7 Ensure all modules have an `id` output (#1410) 2023-06-02 16:07:22 +02:00
net-ipsec-over-interconnect Ensure all modules have an `id` output (#1410) 2023-06-02 16:07:22 +02:00
net-nlb Fix NLB module (#1419) 2023-06-05 19:42:32 +02:00
net-vpc Small fixes (#1425) 2023-06-07 17:37:46 +00:00
net-vpc-firewall Add inventories to net-vpc-firewall tests 2023-04-12 14:04:58 +02:00
net-vpc-firewall-policy Ensure all modules have an `id` output (#1410) 2023-06-02 16:07:22 +02:00
net-vpc-peering added the export_public_ip_routes variable in the net-vpc-peering mod… (#1374) 2023-05-14 15:29:24 +02:00
net-vpn-dynamic Ensure all modules have an `id` output (#1410) 2023-06-02 16:07:22 +02:00
net-vpn-ha Ensure all modules have an `id` output (#1410) 2023-06-02 16:07:22 +02:00
net-vpn-static Ensure all modules have an `id` output (#1410) 2023-06-02 16:07:22 +02:00
organization Ensure all modules have an `id` output (#1410) 2023-06-02 16:07:22 +02:00
project Add networksecurity to JIT identity list. 2023-06-02 16:11:16 +02:00
projects-data-source Several updates 2023-05-13 23:51:46 -04:00
pubsub Ensure all modules have an `id` output (#1410) 2023-06-02 16:07:22 +02:00
secret-manager Ensure all modules have an `id` output (#1410) 2023-06-02 16:07:22 +02:00
service-directory Ensure all modules have an `id` output (#1410) 2023-06-02 16:07:22 +02:00
source-repository Ensure all modules have an `id` output (#1410) 2023-06-02 16:07:22 +02:00
vpc-sc Ensure all modules have an `id` output (#1410) 2023-06-02 16:07:22 +02:00
README.md Network Load Balancer module (#1418) 2023-06-05 13:21:40 +02:00

README.md

Terraform modules suite for Google Cloud

The modules collected in this folder are designed as a suite: they are meant to be composed together, and are designed to be forked and modified where use of third party code and sources is not allowed.

Modules try to stay close to the low level provider resources they encapsulate, and they all share a similar interface that combines management of one resource or set or resources, and the corresponding IAM bindings.

Authoritative IAM bindings are primarily used (e.g. google_storage_bucket_iam_binding for GCS buckets) so that each module is authoritative for specific roles on the resources it manages, and can neutralize or reconcile IAM changes made elsewhere.

Specific modules also offer support for non-authoritative bindings (e.g. google_storage_bucket_iam_member for service accounts), to allow granular permission management on resources that they don't manage directly.

These modules are not necessarily backward compatible. Changes breaking compatibility in modules are marked by major releases (but not all major releases contain breaking changes). Please be mindful when upgrading Fabric modules in existing Terraform setups, and always try to use versioned references in module sources so you can easily revert back to a previous version. Since the introduction of the moved block in Terraform we try to use it whenever possible to make updates non-breaking, but that does not cover all changes we might need to make.

These modules are used in the examples included in this repository. If you are using any of those examples in your own Terraform configuration, make sure that you are using the same version for all the modules, and switch module sources to GitHub format using references. The recommended approach to working with Fabric modules is the following:

  • Fork the repository and own the fork. This will allow you to:

    • Evolve the existing modules.
    • Create your own modules.
    • Sync from the upstream repository to get all the updates.
  • Use GitHub sources with refs to reference the modules. See an example below:

    module "project" {
        source              = "github.com/GoogleCloudPlatform/cloud-foundation-fabric//modules/project?ref=v13.0.0"
        name                = "my-project"
        billing_account     = "123456-123456-123456"
        parent              = "organizations/123456"
    }
    

Foundational modules

Networking modules

Compute/Container

Data

Development

Security

Serverless