A Terraform module for the Google Cloud Platform that simplifies the creation & configuration of a Cloud Run (Fully Managed) service.
- This module is designed to provision Cloud Run with Terraform and update the images using CI/CD pipelines.
- For Terraform-only managed deployments and updates please use simplycubed/terraform-google-cloud-run or the source project.
This module is wrapper around the creation & configuration of Google Cloud Run (Fully managed) services, and provides sensible defaults for many of the options.
It attempts to be as complete as possible, and expose as much functionality as is available. As a result, some functionality might only be provided as part of BETA releases. Google's SLA support for this level of functionality is often not as solid as with Generally-Available releases. If you require absolute stability, this module might not be the best for you.
- Terraform 0.14 or higher.
google
provider 3.67.0 or higher.google-beta
provider 3.67.0 or higher.
module my_cloud_run_service {
source = "simplycubed/cloud-run-cicd-updates/google"
version = "~> 2"
# Required parameters
name = "my-cloud-run-service"
image = "us-docker.pkg.dev/cloudrun/container/hello"
location = "europe-west4"
# Optional parameters
allow_public_access = true
args = []
cloudsql_connections = []
concurrency = 80
cpu_throttling = true
execution_environment = "gen2"
cpus = 1
entrypoint = []
env = [{ key = "ENV_VAR_KEY", value = "ENV_VAR_VALUE" }]
execution_environment = "gen1"
ingress = "all"
labels = {}
map_domains = []
max_instances = 1000
memory = 256
min_instances = 0
port = 8080
project = null
revision = null
service_account_email = null
timeout = 60
volumes = [{ path = "/mnt", secret = "my-secret", filenames = { "latest" = "latest" }}]
vpc_access = { connector = null, egress = null }
}
If your service requires the use of sensitive values, it is possible to store them in Google Secret Manager and reference those secrets in your service. This will prevent the values of those secrets from being exposed to anyone that might have access your service but not to the contents of the secrets.
Secrets can either be exposed as files through mounted volumes, or through environment variables. This can be configured
through the volumes
and env
input variables respectively.
Note: Environment variables using the latest secret version will not be updated when a new version is added. Volumes using the latest version will have their contents automatically updated to reflect the latest secret version.
Refer to Cloud Run > Documentation > Guides > Using secrets for further reading on secrets in Cloud Run.
Name | Description | Type |
---|---|---|
name | Name of the service. | string |
image | Docker image name. Must be hosted in Google Container Registry or Artifact Registry. | string |
location | Location of the service. | string |
Name | Description | Type | Default | Required |
---|---|---|---|---|
allow_public_access | Allow unauthenticated access to the service. | bool | true |
No |
args | Arguments to pass to the entrypoint. | list(string) | [] |
No |
cloudsql_connections | Cloud SQL connections to attach to container instances. | set(string) | [] |
No |
concurrency | Maximum allowed concurrent requests per container for this revision. | number | null |
No |
cpu_throttling | Configure CPU throttling outside of request processing. | bool | true |
No |
cpus | Number of CPUs to allocate per container. | number | 1 |
No |
entrypoint | Entrypoint command. Defaults to the image's ENTRYPOINT if not provided. | list(string) | [] |
No |
env | Environment variables to inject into container instances. Exactly one of value or secret must be specified. |
set(object({ key = string, value = optional(string), secret = optional(string), version = optional(string) })) | [] |
No |
env.*.key | Name of the environment variable. | string | Yes | |
env.*.value | Raw string value of the environment variable. | optional(string) | null |
No |
env.*.secret | Secret to populate the environment variable from. Secrets in other projects should use the projects/{{project}}/secrets/{{secret}} format. |
optional(string) | null |
No |
env.*.version | Version to use when populating with a secret. Defaults to the latest version. | string | "latest" |
No |
execution_environment | Execution environment to run under. Allowed values: ["gen1" , "gen2" ] |
string | "gen1" |
No |
http2 | Enable use of HTTP/2 end-to-end. | bool | false |
No |
ingress | Ingress settings for the service. Allowed values: ["all" , "internal" , "internal-and-cloud-load-balancing" ] |
string | all |
No |
labels | Labels to apply to the service. | map(string) | {} |
No |
map_domains | Domain names to map to the service. | set(string) | [] |
No |
max_instances | Maximum number of container instances allowed to start. | number | 1000 |
No |
memory | Memory (in Mi) to allocate to containers. If execution_environment is "gen2" , this needs to be >= 512. |
number | 256 |
No |
min_instances | Minimum number of container instances to keep running. | number | 0 |
No |
port | Port on which the container is listening for incoming HTTP requests. | number | 8080 |
No |
project | Google Cloud project in which to create resources. | string | null |
No |
revision | Revision name to use. When null , revision names are automatically generated. |
string | null |
No |
service_account_email | IAM service account email to assign to container instances. | string | null |
No |
timeout | Maximum duration (in seconds) allowed for responding to requests. | number | 60 |
No |
volumes | Volumes to be mounted & populated from secrets. | set(object({ path = string, secret = string, versions = optional(map(string)) })) | [] |
No |
volumes.*.path | Path into which the secret will be mounted. The same path cannot be specified for multiple volumes. | string | Yes | |
volumes.*.secret | The secret to mount into the service container. Secrets in other projects should use the projects/{{project}}/secrets/{{secret}} format. |
string | Yes | |
volumes.*.versions | A map of files and versions to be mounted into the path. Keys are file names to be created, and the value is the version of the secret to use ("latest" for the latest version). |
map(string) | { latest = "latest" } |
No |
vpc_access | Control VPC access for the service. | object({ connector = optional(string), egress = optional(string) }) | { connector = null, egress = null } |
No |
vpc_access.connector | Name of the VPC connector to use. Connectors in other projects should use the projects/{{projects}}/locations/${var.location}/connectors/{{connector}} format. |
string | null |
No |
vpc_access.egress | Configure behaviour of egress traffic from this service. Can be one of "all-traffic" or "private-ranges-only" . |
string | "private-ranges-only" |
No |
In addition to the inputs documented above, the following values are available as outputs:
Name | Description | Type |
---|---|---|
latest_ready_revision_name | Latest revision ready for use. | string |
latest_created_revision_name | Last revision created. | string |
url | URL at which the service is available. | string |
id | ID of the created service. | string |
dns | DNS records to populate for mapped domains. Keys are the domains that were specified in var.map_domains . |
map(list(object({ name = optional(string), root = string, type = string, rrdatas = set(string) }))) |
-
2.2.2
- Updated README, Fix tables
-
2.2.1
- Updated README
-
2.2.0
- Updated
lifecycle
ignore_changes
block to support image updates via CI/CD pipeline.
- Updated
Issues containing possible future enhancements can be found here.
All the credit to making this great module goes to garbetjie/terraform-google-cloud-run