cloud-foundation-fabric/modules
Alex Lo 307bda4fed
apigee-x-instance.ip_range cannot take Support CIDR (#727)
* Instance.ip_range cannot take Support CIDR

Current docs are incorrect. It is not possible to specify the Support range.

See https://cloud.google.com/apigee/docs/reference/apis/apigee/rest/v1/organizations.instances#Instance

> ipRange	
> string
> Optional. IP range represents the customer-provided CIDR block of length 22 that will be used for the Apigee instance creation. This optional range, if provided, should be freely available as part of larger named range the customer has allocated to the Service Networking peering. If this is not provided, Apigee will automatically request for any available /22 CIDR block from Service Networking. The customer should use this CIDR block for configuring their firewall needs to allow traffic from Apigee. Input format: "a.b.c.d/22", Output format: a.b.c.d/22, e.f.g.h/28"

* tfdoc

Co-authored-by: Ludovico Magnocavallo <ludomagno@google.com>
2022-08-11 09:55:39 +02:00
..
__experimental GKE hub module refactor (#760) 2022-07-29 08:39:25 +02:00
api-gateway GKE hub module refactor (#760) 2022-07-29 08:39:25 +02:00
apigee-organization GKE hub module refactor (#760) 2022-07-29 08:39:25 +02:00
apigee-x-instance apigee-x-instance.ip_range cannot take Support CIDR (#727) 2022-08-11 09:55:39 +02:00
artifact-registry GKE hub module refactor (#760) 2022-07-29 08:39:25 +02:00
bigquery-dataset GKE hub module refactor (#760) 2022-07-29 08:39:25 +02:00
bigtable-instance GKE hub module refactor (#760) 2022-07-29 08:39:25 +02:00
billing-budget GKE hub module refactor (#760) 2022-07-29 08:39:25 +02:00
binauthz GKE hub module refactor (#760) 2022-07-29 08:39:25 +02:00
cloud-config-container GKE hub module refactor (#760) 2022-07-29 08:39:25 +02:00
cloud-function GKE hub module refactor (#760) 2022-07-29 08:39:25 +02:00
cloud-identity-group GKE hub module refactor (#760) 2022-07-29 08:39:25 +02:00
cloud-run refactor cloud run module (#773) 2022-08-09 14:06:30 +02:00
cloudsql-instance Add support to a public access to cloudsql-instance (#754) 2022-08-09 13:42:42 +02:00
compute-mig GKE hub module refactor (#760) 2022-07-29 08:39:25 +02:00
compute-vm GKE hub module refactor (#760) 2022-07-29 08:39:25 +02:00
container-registry GKE hub module refactor (#760) 2022-07-29 08:39:25 +02:00
data-catalog-policy-tag GKE hub module refactor (#760) 2022-07-29 08:39:25 +02:00
datafusion GKE hub module refactor (#760) 2022-07-29 08:39:25 +02:00
dns GKE hub module refactor (#760) 2022-07-29 08:39:25 +02:00
endpoints GKE hub module refactor (#760) 2022-07-29 08:39:25 +02:00
folder GKE hub module refactor (#760) 2022-07-29 08:39:25 +02:00
folders-unit GKE hub module refactor (#760) 2022-07-29 08:39:25 +02:00
gcs GKE hub module refactor (#760) 2022-07-29 08:39:25 +02:00
gke-cluster GKE hub module refactor (#760) 2022-07-29 08:39:25 +02:00
gke-hub Fix gke hub module features condition (#761) 2022-07-30 15:53:05 +02:00
gke-nodepool GKE hub module refactor (#760) 2022-07-29 08:39:25 +02:00
iam-service-account GKE hub module refactor (#760) 2022-07-29 08:39:25 +02:00
iot-core Simplify link checker and recurse into all elements with children (#599) 2022-03-28 16:54:06 +02:00
kms GKE hub module refactor (#760) 2022-07-29 08:39:25 +02:00
logging-bucket GKE hub module refactor (#760) 2022-07-29 08:39:25 +02:00
naming-convention GKE hub module refactor (#760) 2022-07-29 08:39:25 +02:00
net-address GKE hub module refactor (#760) 2022-07-29 08:39:25 +02:00
net-cloudnat GKE hub module refactor (#760) 2022-07-29 08:39:25 +02:00
net-glb GKE hub module refactor (#760) 2022-07-29 08:39:25 +02:00
net-ilb GKE hub module refactor (#760) 2022-07-29 08:39:25 +02:00
net-ilb-l7 GKE hub module refactor (#760) 2022-07-29 08:39:25 +02:00
net-interconnect-attachment-direct GKE hub module refactor (#760) 2022-07-29 08:39:25 +02:00
net-vpc GKE hub module refactor (#760) 2022-07-29 08:39:25 +02:00
net-vpc-firewall GKE hub module refactor (#760) 2022-07-29 08:39:25 +02:00
net-vpc-peering GKE hub module refactor (#760) 2022-07-29 08:39:25 +02:00
net-vpn-dynamic GKE hub module refactor (#760) 2022-07-29 08:39:25 +02:00
net-vpn-ha GKE hub module refactor (#760) 2022-07-29 08:39:25 +02:00
net-vpn-static GKE hub module refactor (#760) 2022-07-29 08:39:25 +02:00
organization GKE hub module refactor (#760) 2022-07-29 08:39:25 +02:00
organization-policy GKE hub module refactor (#760) 2022-07-29 08:39:25 +02:00
project Shared vpc service fixes 2022-08-02 18:22:31 +02:00
projects-data-source GKE hub module refactor (#760) 2022-07-29 08:39:25 +02:00
pubsub GKE hub module refactor (#760) 2022-07-29 08:39:25 +02:00
secret-manager GKE hub module refactor (#760) 2022-07-29 08:39:25 +02:00
service-directory GKE hub module refactor (#760) 2022-07-29 08:39:25 +02:00
source-repository GKE hub module refactor (#760) 2022-07-29 08:39:25 +02:00
vpc-sc add egress / ingress policy example (#768) 2022-08-04 17:00:14 +02:00
README.md Add refs to the readme files. 2022-07-06 20:05:38 +02:00

README.md

Terraform modules suite for Google Cloud

The modules collected in this folder are designed as a suite: they are meant to be composed together, and are designed to be forked and modified where use of third party code and sources is not allowed.

Modules try to stay close to the low level provider resources they encapsulate, and they all share a similar interface that combines management of one resource or set or resources, and the corresponding IAM bindings.

Authoritative IAM bindings are primarily used (e.g. google_storage_bucket_iam_binding for GCS buckets) so that each module is authoritative for specific roles on the resources it manages, and can neutralize or reconcile IAM changes made elsewhere.

Specific modules also offer support for non-authoritative bindings (e.g. google_storage_bucket_iam_member for service accounts), to allow granular permission management on resources that they don't manage directly.

These modules are not necessarily backward compatible. Changes breaking compatibility in modules are marked by major releases (but not all major releases contain breaking changes). Please be mindful when upgrading Fabric modules in existing Terraform setups, and always try to use versioned references in module sources so you can easily revert back to a previous version. Since the introduction of the moved block in Terraform we try to use it whenever possible to make updates non-breaking, but that does not cover all changes we might need to make.

These modules are used in the examples included in this repository. If you are using any of those examples in your own Terraform configuration, make sure that you are using the same version for all the modules, and switch module sources to GitHub format using references. The recommended approach to working with Fabric modules is the following:

  • Fork the repository and own the fork. This will allow you to:

    • Evolve the existing modules.
    • Create your own modules.
    • Sync from the upstream repository to get all the updates.
  • Use GitHub sources with refs to reference the modules. See an example below:

    module "project" {
        source              = "github.com/GoogleCloudPlatform/cloud-foundation-fabric//modules/project?ref=v13.0.0"
        name                = "my-project"
        billing_account     = "123456-123456-123456"
        parent              = "organizations/123456"
    }
    

Foundational modules

Networking modules

Compute/Container

Data

Development

Security

Serverless