cloud-foundation-fabric/modules
Julio Castillo de704110c9 Update api-gateway tests 2023-01-19 17:47:14 +01:00
..
__experimental Bump versions EVERYWHERE 2022-12-23 00:06:42 +01:00
api-gateway Update api-gateway tests 2023-01-19 17:47:14 +01:00
apigee Bump versions EVERYWHERE 2022-12-23 00:06:42 +01:00
artifact-registry Bump versions EVERYWHERE 2022-12-23 00:06:42 +01:00
bigquery-dataset Bump versions EVERYWHERE 2022-12-23 00:06:42 +01:00
bigtable-instance Use map for local clusters variable 2022-12-30 11:27:37 +01:00
billing-budget Bump versions EVERYWHERE 2022-12-23 00:06:42 +01:00
binauthz Bump versions EVERYWHERE 2022-12-23 00:06:42 +01:00
cloud-config-container Bump versions EVERYWHERE 2022-12-23 00:06:42 +01:00
cloud-function Bump versions EVERYWHERE 2022-12-23 00:06:42 +01:00
cloud-identity-group Bump versions EVERYWHERE 2022-12-23 00:06:42 +01:00
cloud-run Bump versions EVERYWHERE 2022-12-23 00:06:42 +01:00
cloudsql-instance Bump versions EVERYWHERE 2022-12-23 00:06:42 +01:00
compute-mig Fixed delete_rule in compute-mig module for stateful disks. 2023-01-03 21:53:31 +01:00
compute-vm Added device_name field to compute-vm attached_disks parameter (for stateful disks). 2023-01-03 16:55:54 +01:00
container-registry Bump versions EVERYWHERE 2022-12-23 00:06:42 +01:00
data-catalog-policy-tag Bump versions EVERYWHERE 2022-12-23 00:06:42 +01:00
datafusion Bump versions EVERYWHERE 2022-12-23 00:06:42 +01:00
dns Bump versions EVERYWHERE 2022-12-23 00:06:42 +01:00
endpoints Bump versions EVERYWHERE 2022-12-23 00:06:42 +01:00
folder Update folder tests 2023-01-03 16:52:31 +01:00
gcs Bump versions EVERYWHERE 2022-12-23 00:06:42 +01:00
gke-cluster Added tags to gke-cluster module 2023-01-13 12:58:40 +01:00
gke-hub Bump versions EVERYWHERE 2022-12-23 00:06:42 +01:00
gke-nodepool Bump versions EVERYWHERE 2022-12-23 00:06:42 +01:00
iam-service-account Bump versions EVERYWHERE 2022-12-23 00:06:42 +01:00
kms Bump versions EVERYWHERE 2022-12-23 00:06:42 +01:00
logging-bucket Bump versions EVERYWHERE 2022-12-23 00:06:42 +01:00
net-address Bump versions EVERYWHERE 2022-12-23 00:06:42 +01:00
net-cloudnat Bump versions EVERYWHERE 2022-12-23 00:06:42 +01:00
net-glb Bump versions EVERYWHERE 2022-12-23 00:06:42 +01:00
net-ilb Bump versions EVERYWHERE 2022-12-23 00:06:42 +01:00
net-ilb-l7 Bump versions EVERYWHERE 2022-12-23 00:06:42 +01:00
net-interconnect-attachment-direct Bump versions EVERYWHERE 2022-12-23 00:06:42 +01:00
net-vpc Fix service account prefix after provider version bump 2022-12-23 00:45:37 +01:00
net-vpc-firewall Allow setting no ranges in firewall module custom rules (#1073) 2022-12-23 09:03:31 +01:00
net-vpc-peering Bump versions EVERYWHERE 2022-12-23 00:06:42 +01:00
net-vpn-dynamic Bump versions EVERYWHERE 2022-12-23 00:06:42 +01:00
net-vpn-ha Bump versions EVERYWHERE 2022-12-23 00:06:42 +01:00
net-vpn-static Bump versions EVERYWHERE 2022-12-23 00:06:42 +01:00
organization Reorder org policy rules 2023-01-03 16:52:31 +01:00
project Add shared-vpc support on Data Playgroud blueprint 2023-01-19 00:33:31 +01:00
projects-data-source Bump versions EVERYWHERE 2022-12-23 00:06:42 +01:00
pubsub Bump versions EVERYWHERE 2022-12-23 00:06:42 +01:00
secret-manager Bump versions EVERYWHERE 2022-12-23 00:06:42 +01:00
service-directory Bump versions EVERYWHERE 2022-12-23 00:06:42 +01:00
source-repository Bump versions EVERYWHERE 2022-12-23 00:06:42 +01:00
vpc-sc First commit 2023-01-17 13:39:28 +01:00
README.md Apigee module and blueprint 2022-11-16 19:49:26 +01:00

README.md

Terraform modules suite for Google Cloud

The modules collected in this folder are designed as a suite: they are meant to be composed together, and are designed to be forked and modified where use of third party code and sources is not allowed.

Modules try to stay close to the low level provider resources they encapsulate, and they all share a similar interface that combines management of one resource or set or resources, and the corresponding IAM bindings.

Authoritative IAM bindings are primarily used (e.g. google_storage_bucket_iam_binding for GCS buckets) so that each module is authoritative for specific roles on the resources it manages, and can neutralize or reconcile IAM changes made elsewhere.

Specific modules also offer support for non-authoritative bindings (e.g. google_storage_bucket_iam_member for service accounts), to allow granular permission management on resources that they don't manage directly.

These modules are not necessarily backward compatible. Changes breaking compatibility in modules are marked by major releases (but not all major releases contain breaking changes). Please be mindful when upgrading Fabric modules in existing Terraform setups, and always try to use versioned references in module sources so you can easily revert back to a previous version. Since the introduction of the moved block in Terraform we try to use it whenever possible to make updates non-breaking, but that does not cover all changes we might need to make.

These modules are used in the examples included in this repository. If you are using any of those examples in your own Terraform configuration, make sure that you are using the same version for all the modules, and switch module sources to GitHub format using references. The recommended approach to working with Fabric modules is the following:

  • Fork the repository and own the fork. This will allow you to:

    • Evolve the existing modules.
    • Create your own modules.
    • Sync from the upstream repository to get all the updates.
  • Use GitHub sources with refs to reference the modules. See an example below:

    module "project" {
        source              = "github.com/GoogleCloudPlatform/cloud-foundation-fabric//modules/project?ref=v13.0.0"
        name                = "my-project"
        billing_account     = "123456-123456-123456"
        parent              = "organizations/123456"
    }
    

Foundational modules

Networking modules

Compute/Container

Data

Development

Security

Serverless