Skip to content

Latest commit

 

History

History
38 lines (34 loc) · 2.77 KB

File metadata and controls

38 lines (34 loc) · 2.77 KB

Inputs

Name Description Type Default Required
access_context_manager_policy_id The ID of the access context manager policy the perimeter lies in. Can be obtained by running gcloud access-context-manager policies list --organization YOUR_ORGANIZATION_ID --format="value(name)". string n/a yes
app_infra_pipeline_cloudbuild_sa Cloud Build SA used for deploying infrastructure string n/a yes
billing_account The ID of the billing account to associated this project with string n/a yes
enable_hub_and_spoke Enable Hub-and-Spoke architecture. bool false no
folder_prefix Name prefix to use for folders created. Should be the same in all steps. string "fldr" no
org_id The organization id for the associated services string n/a yes
parent_folder Optional - for an organization with existing projects or for development/validation. It will place all the example foundation resources under the provided folder instead of the root organization. The value is the numeric folder ID. The folder must already exist. Must be the same value used in previous step. string "" no
peering_module_depends_on List of modules or resources peering module depends on. list(any) [] no
perimeter_name Access context manager service perimeter name to attach the restricted svpc project. string n/a yes
project_prefix Name prefix to use for projects created. Should be the same in all steps. Max size is 3 characters. string "prj" no
terraform_service_account Service account email of the account to impersonate to run Terraform string n/a yes

Outputs

Name Description
access_context_manager_policy_id Access Context Manager Policy ID.
base_shared_vpc_project Project sample base project.
base_shared_vpc_project_sa Project sample base project SA.
bucket The created storage bucket
env_secrets_project Project sample peering project id.
floating_project Project sample floating project.
keyring The name of the keyring.
keys List of created key names.
peering_complete Output to be used as a module dependency.
peering_network Peer network peering resource.
peering_project Project sample peering project id.
restricted_enabled_apis Activated APIs.
restricted_shared_vpc_project Project sample restricted project id.
restricted_shared_vpc_project_number Project sample restricted project.
vpc_service_control_perimeter_name VPC Service Control name.