infra/terraform/test-org/org/locals.tf (964 lines of code) (raw):

/** * Copyright 2019-2025 Google LLC * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ locals { org_id = "943740911108" old_billing_account = "01D904-DAF6EC-F34EF7" billing_account = "0138EF-C93849-98B0B5" lr_billing_account = "01108A-537F1E-A5BFFC" cft_ci_group = "cft-ci-robots@test.blueprints.joonix.net" gcp_admins_group = "gcp-admins@test.blueprints.joonix.net" ci_project_id = "cloud-foundation-cicd" folders = { "ci-projects" = module.folders-root.ids["ci-projects"] "ci-shared" = module.folders-root.ids["ci-shared"] } ci_folders = module.folders-ci.ids ci_repos_folders = { for repo in local.repos : try(repo.short_name, trimprefix(repo.name, "terraform-google-")) => { folder_name = "ci-${try(repo.short_name, trimprefix(repo.name, "terraform-google-"))}", folder_id = replace(module.folders-ci.ids["ci-${try(repo.short_name, trimprefix(repo.name, "terraform-google-"))}"], "folders/", ""), gh_org = repo.org } } jss_common_group = "jump-start-solutions-admins" adc_common_admins = ["q2w", "ayushmjain"] common_topics = { hcls = "healthcare-life-sciences", e2e = "end-to-end" serverless = "serverless-computing", compute = "compute" containers = "containers", db = "databases", da = "data-analytics", storage = "storage", ops = "operations", net = "networking", security = "security-identity", devtools = "developer-tools" workspace = "workspace" } /* * repos schema * name = "string" (required for modules) * short_name = "string" (optional for modules, if not prefixed with 'terraform-google-') * org = "terraform-google-modules" or "GoogleCloudPlatform" (required) * description = "string" (required) * maintainers = "list(string)" ["user1", "user2", "CASE SENSATIVE"] (optional) * admins = "list(string)" ["user1", "user2", "CASE SENSATIVE"] (optional) * groups = "list(string)" ["group1", "group1"] (optional) * homepage_url = "string" (optional, overrides default) * module = BOOL (optional, default is true which includes GH repo configuration) * topics = "string1,string2,string3" (one or more of local.common_topics required if module = true) * lint_env = "map(string)" (optional) * disable_lint_yaml = BOOL (optional, default is true) * enable_periodic = BOOL (optional, if enabled runs a daily periodic test. Defaults to false ) * add_checks = "list(string)" ["check name"] (optional) * */ repos = [ { name = "cloud-foundation-training" org = "terraform-google-modules" description = "" maintainers = ["marine675"] }, { name = "terraform-google-healthcare" org = "terraform-google-modules" description = "Handles opinionated Google Cloud Healthcare datasets and stores" maintainers = ["yeweidaniel"] topics = local.common_topics.hcls }, { name = "terraform-google-cloud-run" org = "GoogleCloudPlatform" description = "Deploys apps to Cloud Run, along with option to map custom domain" maintainers = concat(["prabhu34", "anamer", "gtsorbo"], local.adc_common_admins) topics = "cloudrun,google-cloud-platform,terraform-modules,${local.common_topics.serverless}" lint_env = { ENABLE_BPMETADATA = "1" } }, { name = "terraform-google-secured-data-warehouse" org = "GoogleCloudPlatform" description = "Deploys a secured BigQuery data warehouse" maintainers = ["lanre-OG"] topics = join(",", [local.common_topics.da, local.common_topics.e2e]) lint_env = { SHELLCHECK_OPTS = "-e SC2154 -e SC2171 -e SC2086" } }, { name = "terraform-google-anthos-vm" org = "GoogleCloudPlatform" description = "Creates VMs on Anthos Bare Metal clusters" maintainers = ["zhuchenwang"] topics = "anthos,kubernetes,terraform-module,vm,${local.common_topics.compute}" }, { name = "terraform-google-kubernetes-engine" org = "terraform-google-modules" description = "Configures opinionated GKE clusters" maintainers = ["ericyz"] admins = ["apeabody"] topics = join(",", [local.common_topics.compute, local.common_topics.containers]) }, { name = "terraform-ecommerce-microservices-on-gke" short_name = "ecommerce-microservices" org = "GoogleCloudPlatform" description = "Deploys a web-based ecommerce app into a multi-cluster Google Kubernetes Engine setup." groups = ["dee-platform-ops", local.jss_common_group] enable_periodic = true lint_env = { ENABLE_BPMETADATA = "1" } }, { name = "terraform-example-java-dynamic-point-of-sale" short_name = "java-dynamic-point-of-sale" org = "GoogleCloudPlatform" description = "Deploys a dynamic Java webapp into a Google Kubernetes Engine cluster." maintainers = ["Shabirmean", "Mukamik"] groups = ["dee-platform-ops", local.jss_common_group] lint_env = { "EXCLUDE_HEADER_CHECK" = "\\./infra/sql-schema" } enable_periodic = true }, { name = "terraform-example-foundation" short_name = "example-foundation" org = "terraform-google-modules" description = "Shows how the CFT modules can be composed to build a secure cloud foundation" maintainers = ["rjerrems", "gtsorbo", "eeaton", "sleighton2022"] homepage_url = "https://cloud.google.com/architecture/security-foundations" topics = join(",", [local.common_topics.e2e, local.common_topics.ops]) lint_env = { "EXCLUDE_LINT_DIRS" = "\\./3-networks/modules/transitivity/assets", "ENABLE_PARALLEL" = "0", "DISABLE_TFLINT" = "1" } add_checks = ["terraform-example-foundation-int-trigger-default (cloud-foundation-cicd)"] }, { name = "terraform-google-log-analysis" org = "GoogleCloudPlatform" description = "Stores and analyzes log data" maintainers = ["ryotat7"] topics = local.common_topics.da groups = [local.jss_common_group] enable_periodic = true }, { name = "terraform-google-three-tier-web-app" org = "GoogleCloudPlatform" description = "Deploys a three tier web application using Cloud Run and Cloud SQL" maintainers = ["tpryan"] topics = join(",", [local.common_topics.serverless, local.common_topics.db]) groups = [local.jss_common_group] enable_periodic = true lint_env = { ENABLE_BPMETADATA = "1" } }, { name = "terraform-google-load-balanced-vms" org = "GoogleCloudPlatform" description = "Creates a Managed Instance Group with a loadbalancer" maintainers = ["tpryan"] topics = local.common_topics.net lint_env = { ENABLE_BPMETADATA = "1" } }, { name = "terraform-google-secure-cicd" org = "GoogleCloudPlatform" description = "Builds a secure CI/CD pipeline on Google Cloud" maintainers = ["gtsorbo"] topics = join(",", [local.common_topics.security, local.common_topics.devtools, local.common_topics.e2e]) enable_periodic = true groups = [local.jss_common_group] lint_env = { ENABLE_BPMETADATA = "1" } }, { name = "terraform-google-media-cdn-vod" org = "GoogleCloudPlatform" description = "Deploys Media CDN video-on-demand" maintainers = ["roddzurcher"] topics = local.common_topics.ops groups = [local.jss_common_group] enable_periodic = true }, { name = "terraform-example-foundation-app" short_name = "example-foundation-app" org = "GoogleCloudPlatform" description = "" }, { name = "terraform-google-network-forensics" org = "GoogleCloudPlatform" description = "Deploys Zeek on Google Cloud" maintainers = ["gtsorbo"] topics = local.common_topics.net }, { name = "terraform-google-secret-manager" org = "GoogleCloudPlatform" description = "Creates one or more Google Secret Manager secrets and manages basic permissions for them" maintainers = local.adc_common_admins topics = "gcp,kms,pubsub,terraform-module,${local.common_topics.security}" }, { name = "terraform-google-address" org = "terraform-google-modules" description = "Manages Google Cloud IP addresses" topics = local.common_topics.net }, { name = "terraform-google-bastion-host" org = "terraform-google-modules" description = "Generates a bastion host VM compatible with OS Login and IAP Tunneling that can be used to access internal VMs" topics = join(",", [local.common_topics.security, local.common_topics.ops, local.common_topics.devtools]) }, { name = "terraform-google-bigquery" org = "terraform-google-modules" description = "Creates opinionated BigQuery datasets and tables" topics = local.common_topics.da maintainers = concat(["davenportjw", "bradmiro"], local.adc_common_admins) groups = [local.jss_common_group] lint_env = { ENABLE_BPMETADATA = "1" } }, { name = "terraform-google-bootstrap" org = "terraform-google-modules" description = "Bootstraps Terraform usage and related CI/CD in a new Google Cloud organization" topics = join(",", [local.common_topics.ops, local.common_topics.devtools]) maintainers = ["josephdt12"] }, { name = "terraform-google-cloud-datastore" org = "terraform-google-modules" description = "Manages Datastore" topics = local.common_topics.db }, { name = "terraform-google-cloud-dns" org = "terraform-google-modules" description = "Creates and manages Cloud DNS public or private zones and their records" topics = local.common_topics.net maintainers = ["imrannayer"] }, { name = "terraform-google-cloud-nat" org = "terraform-google-modules" description = "Creates and configures Cloud NAT" topics = local.common_topics.net maintainers = ["imrannayer"] }, { name = "terraform-google-cloud-operations" org = "terraform-google-modules" description = "Manages Cloud Logging and Cloud Monitoring" topics = local.common_topics.ops maintainers = ["imrannayer"] groups = ["stackdriver-committers"] }, { name = "terraform-google-cloud-router" org = "terraform-google-modules" description = "Manages a Cloud Router on Google Cloud" topics = local.common_topics.net maintainers = ["imrannayer"] }, { name = "terraform-google-cloud-storage" org = "terraform-google-modules" description = "Creates one or more Cloud Storage buckets and assigns basic permissions on them to arbitrary users" topics = local.common_topics.storage maintainers = local.adc_common_admins lint_env = { ENABLE_BPMETADATA = "1" } }, { name = "terraform-google-composer" org = "terraform-google-modules" description = "Manages Cloud Composer v1 and v2 along with option to manage networking" topics = join(",", [local.common_topics.da, local.common_topics.ops]) maintainers = ["imrannayer"] }, { name = "terraform-google-container-vm" org = "terraform-google-modules" description = "Deploys containers on Compute Engine instances" topics = join(",", [local.common_topics.containers, local.common_topics.compute]) }, { name = "terraform-google-data-fusion" org = "terraform-google-modules" description = "Manages Cloud Data Fusion" topics = local.common_topics.da }, { name = "terraform-google-dataflow" org = "terraform-google-modules" description = "Handles opinionated Dataflow job configuration and deployments" topics = local.common_topics.da maintainers = local.adc_common_admins lint_env = { ENABLE_BPMETADATA = "1" } }, { name = "terraform-google-datalab" org = "terraform-google-modules" description = "Creates DataLab instances with support for GPU instances" topics = local.common_topics.da }, { name = "terraform-google-event-function" org = "terraform-google-modules" description = "Responds to logging events with a Cloud Function" topics = local.common_topics.serverless }, { name = "terraform-google-folders" org = "terraform-google-modules" description = "Creates several Google Cloud folders under the same parent" topics = local.common_topics.devtools }, { name = "terraform-google-gcloud" org = "terraform-google-modules" description = "Executes Google Cloud CLI commands within Terraform" topics = local.common_topics.devtools lint_env = { "EXCLUDE_LINT_DIRS" = "\\./cache" } }, { name = "terraform-google-github-actions-runners" org = "terraform-google-modules" description = "Creates self-hosted GitHub Actions Runners on Google Cloud" topics = local.common_topics.devtools maintainers = ["gtsorbo"] }, { name = "terraform-google-gke-gitlab" org = "terraform-google-modules" description = "Installs GitLab on Kubernetes Engine" topics = local.common_topics.devtools }, { name = "terraform-google-group" org = "terraform-google-modules" description = "Manages Google Groups" topics = local.common_topics.workspace }, { name = "terraform-google-gsuite-export" org = "terraform-google-modules" description = "Creates a Compute Engine VM instance and sets up a cronjob to export GSuite Admin SDK data to Cloud Logging on a schedule" topics = join(",", [local.common_topics.ops, local.common_topics.workspace]) }, { name = "terraform-google-iam" org = "terraform-google-modules" description = "Manages multiple IAM roles for resources on Google Cloud" topics = local.common_topics.security maintainers = ["imrannayer"] }, { name = "terraform-google-jenkins" org = "terraform-google-modules" description = "Creates a Compute Engine instance running Jenkins" topics = local.common_topics.devtools }, { name = "terraform-google-kms" org = "terraform-google-modules" description = "Allows managing a keyring, zero or more keys in the keyring, and IAM role bindings on individual keys" topics = local.common_topics.security }, { name = "terraform-google-lb" org = "terraform-google-modules" description = "Creates a regional TCP proxy load balancer for Compute Engine by using target pools and forwarding rules" topics = local.common_topics.net maintainers = ["imrannayer"] }, { name = "terraform-google-lb-http" org = "terraform-google-modules" description = "Creates a global HTTP load balancer for Compute Engine by using forwarding rules" topics = local.common_topics.net maintainers = concat(["imrannayer"], local.adc_common_admins) lint_env = { ENABLE_BPMETADATA = "1" } }, { name = "terraform-google-lb-internal" org = "terraform-google-modules" description = "Creates an internal load balancer for Compute Engine by using forwarding rules" topics = local.common_topics.net maintainers = ["imrannayer"] }, { name = "terraform-google-log-export" org = "terraform-google-modules" description = "Creates log exports at the project, folder, or organization level" topics = local.common_topics.ops maintainers = ["imrannayer"] }, { name = "terraform-google-memorystore" org = "terraform-google-modules" description = "Creates a fully functional Google Memorystore (redis) instance" topics = local.common_topics.db maintainers = concat(["imrannayer"], local.adc_common_admins) lint_env = { ENABLE_BPMETADATA = "1" } }, { name = "terraform-google-module-template" org = "terraform-google-modules" description = "Provides a template for creating a Cloud Foundation Toolkit Terraform module" disable_lint_yaml = true }, { name = "terraform-google-network" org = "terraform-google-modules" description = "Sets up a new VPC network on Google Cloud" topics = local.common_topics.net maintainers = ["imrannayer"] }, { name = "terraform-google-org-policy" org = "terraform-google-modules" description = "Manages Google Cloud organization policies" topics = local.common_topics.security maintainers = ["nehalk-tf"] lint_env = { ENABLE_BPMETADATA = "1" } }, { name = "terraform-google-project-factory" org = "terraform-google-modules" description = "Creates an opinionated Google Cloud project by using Shared VPC, IAM, and Google Cloud APIs" topics = local.common_topics.ops lint_env = { ENABLE_BPMETADATA = "1" } }, { name = "terraform-google-pubsub" org = "terraform-google-modules" description = "Creates Pub/Sub topic and subscriptions associated with the topic" topics = local.common_topics.da maintainers = concat(["imrannayer"], local.adc_common_admins) groups = ["api-pubsub-and-pubsublite"] lint_env = { ENABLE_BPMETADATA = "1" } }, { name = "terraform-google-sap" org = "terraform-google-modules" description = "Deploys SAP products" topics = local.common_topics.compute maintainers = ["sjswerdlow", "megelatim", "dfellmeth-google"] }, { name = "terraform-google-scheduled-function" org = "terraform-google-modules" description = "Sets up a scheduled job to trigger events and run functions" topics = local.common_topics.serverless }, { name = "terraform-google-service-accounts" org = "terraform-google-modules" description = "Creates one or more service accounts and grants them basic roles" maintainers = local.adc_common_admins topics = local.common_topics.security lint_env = { ENABLE_BPMETADATA = "1" } }, { name = "terraform-google-slo" org = "terraform-google-modules" description = "Creates SLOs on Google Cloud from custom Stackdriver metrics capability to export SLOs to Google Cloud services and other systems" topics = local.common_topics.ops }, { name = "terraform-google-sql-db" org = "terraform-google-modules" description = "Creates a Cloud SQL database instance" topics = local.common_topics.db maintainers = concat(["isaurabhuttam", "imrannayer"], local.adc_common_admins) lint_env = { ENABLE_BPMETADATA = "1" } }, { name = "terraform-google-startup-scripts" org = "terraform-google-modules" description = "Provides a library of useful startup scripts to embed in VMs" topics = local.common_topics.compute }, { name = "terraform-google-utils" org = "terraform-google-modules" description = "Gets the short names for a given Google Cloud region" topics = local.common_topics.ops }, { name = "terraform-google-vault" org = "terraform-google-modules" description = "Deploys Vault on Compute Engine" topics = "hashicorp-vault,${local.common_topics.ops},${local.common_topics.devtools},${local.common_topics.security}" }, { name = "terraform-google-vm" org = "terraform-google-modules" description = "Provisions VMs in Google Cloud" maintainers = concat(["erlanderlo"], local.adc_common_admins) topics = local.common_topics.compute lint_env = { ENABLE_BPMETADATA = "1" } }, { name = "terraform-google-vpc-service-controls" org = "terraform-google-modules" description = "Handles opinionated VPC Service Controls and Access Context Manager configuration and deployments" topics = local.common_topics.net maintainers = ["imrannayer"] }, { name = "terraform-google-vpn" org = "terraform-google-modules" description = "Sets up a Cloud VPN gateway" topics = local.common_topics.net maintainers = ["imrannayer"] }, { short_name = "anthos-platform" org = "terraform-google-modules" module = false }, { short_name = "anthos-samples" org = "GoogleCloudPlatform" module = false }, { short_name = "blueprints" org = "GoogleCloudPlatform" module = false }, { short_name = "docs-samples" org = "terraform-google-modules" module = false enable_periodic = true }, { short_name = "migrate" org = "terraform-google-modules" module = false }, { short_name = "policy-blueprints" org = "GoogleCloudPlatform" module = false }, { short_name = "terraform-validator" org = "terraform-google-modules" module = false }, { name = "terraform-google-waap" org = "GoogleCloudPlatform" description = "Deploys the WAAP solution on Google Cloud" maintainers = ["gtsorbo"] topics = local.common_topics.ops }, { name = "terraform-google-cloud-workflows" org = "GoogleCloudPlatform" description = "Manage Workflows with optional Scheduler or Event Arc triggers" maintainers = ["anaik91"] topics = join(",", [local.common_topics.serverless, local.common_topics.devtools]) }, { name = "terraform-google-vertex-ai" org = "GoogleCloudPlatform" description = "Deploy Vertex AI resources" maintainers = ["imrannayer"] topics = join(",", [local.common_topics.compute]) }, { name = "terraform-google-cloud-armor" org = "GoogleCloudPlatform" description = "Deploy Cloud Armor security policy" maintainers = ["imrannayer"] topics = join(",", [local.common_topics.compute, local.common_topics.net]) }, { name = "terraform-google-pam" org = "GoogleCloudPlatform" description = "Deploy Privileged Access Manager" maintainers = ["imrannayer", "mgaur10"] topics = local.common_topics.security }, { name = "terraform-google-netapp-volumes" org = "GoogleCloudPlatform" description = "Deploy NetApp Storage Volumes" maintainers = ["imrannayer"] topics = join(",", [local.common_topics.compute, local.common_topics.net]) }, { name = "terraform-google-cloud-deploy" org = "GoogleCloudPlatform" description = "Create Cloud Deploy pipelines and targets" maintainers = ["gtsorbo", "niranjankl"] topics = join(",", [local.common_topics.devtools]) }, { name = "terraform-google-cloud-functions" org = "GoogleCloudPlatform" description = "Deploys Cloud Functions (Gen 2)" maintainers = ["prabhu34", "gtsorbo"] topics = "cloudfunctions,functions,google-cloud-platform,terraform-modules,${local.common_topics.serverless}" }, { name = "terraform-dynamic-python-webapp" short_name = "dynamic-python-webapp" org = "GoogleCloudPlatform" description = "Deploy a dynamic python webapp" maintainers = ["glasnt", "donmccasland"] homepage_url = "avocano.dev" groups = [local.jss_common_group, "team-egg"] enable_periodic = true lint_env = { ENABLE_BPMETADATA = "1" } }, { name = "terraform-dynamic-javascript-webapp" short_name = "dynamic-javascript-webapp" org = "GoogleCloudPlatform" description = "Deploy a dynamic javascript webapp" maintainers = ["LukeSchlangen", "donmccasland"] homepage_url = "avocano.dev" groups = [local.jss_common_group, "team-egg", "developer-journey-app-approvers"] enable_periodic = true lint_env = { ENABLE_BPMETADATA = "1" } }, { name = "terraform-example-deploy-java-multizone" short_name = "deploy-java-multizone" org = "GoogleCloudPlatform" description = "Deploy a multizone Java application" maintainers = ["donmccasland"] groups = [local.jss_common_group] enable_periodic = false lint_env = { ENABLE_BPMETADATA = "1" } }, { name = "terraform-google-itar-architectures" org = "GoogleCloudPlatform" description = "Includes use cases for deploying ITAR-aligned architectures on Google Cloud" maintainers = ["gtsorbo"] topics = join(",", [local.common_topics.compute], ["compliance"]) }, { name = "terraform-google-analytics-lakehouse" org = "GoogleCloudPlatform" description = "Deploys a Lakehouse Architecture Solution" maintainers = ["davenportjw", "bradmiro"] topics = local.common_topics.da groups = [local.jss_common_group] enable_periodic = true lint_env = { ENABLE_BPMETADATA = "1" } }, { name = "terraform-google-alloy-db" org = "GoogleCloudPlatform" description = "Creates an Alloy DB instance" maintainers = ["anaik91", "imrannayer"] topics = local.common_topics.db }, { name = "terraform-google-cloud-ids" org = "GoogleCloudPlatform" description = "Deploys a Cloud IDS instance and associated resources." maintainers = ["gtsorbo", "mgaur10"] topics = join(",", [local.common_topics.security, local.common_topics.net]) }, { name = "terraform-example-deploy-java-gke" short_name = "deploy-java-gke" org = "GoogleCloudPlatform" description = "Deploy a Legacy Java App GKE" groups = ["dee-platform-ops", local.jss_common_group] enable_periodic = true lint_env = { ENABLE_BPMETADATA = "1" } }, { name = "terraform-google-crmint" org = "GoogleCloudPlatform" description = "Deploy the marketing analytics application, CRMint" maintainers = ["dulacp"] topics = join(",", [local.common_topics.da, local.common_topics.e2e], ["marketing"]) }, { name = "terraform-ml-image-annotation-gcf" short_name = "ml-image-annotation-gcf" org = "GoogleCloudPlatform" description = "Deploys an app for ml image annotation using gcf" maintainers = ["xsxm", "ivanmkc", "balajismaniam", "donmccasland"] groups = ["dee-data-ai", local.jss_common_group] enable_periodic = true }, { name = "terraform-google-out-of-band-security" org = "GoogleCloudPlatform" description = "Creates a 3P out-of-band security appliance deployment" maintainers = ["Saipriyavk", "ChrisBarefoot"] topics = local.common_topics.net }, { name = "notebooks-blueprint-security" short_name = "secured-notebook" org = "GoogleCloudPlatform" description = "Opinionated setup for securely using AI Platform Notebooks." maintainers = ["gtsorbo", "erlanderlo"] topics = join(",", [local.common_topics.da, local.common_topics.security]) }, { name = "terraform-genai-doc-summarization" short_name = "genai-doc-summarization" org = "GoogleCloudPlatform" description = "Summarizes document using OCR and Vertex Generative AI LLM" maintainers = ["asrivas", "davidcavazos"] groups = [local.jss_common_group] enable_periodic = true }, { name = "terraform-genai-knowledge-base" short_name = "genai-knowledge-base" org = "GoogleCloudPlatform" description = "Fine tune an LLM model to answer questions from your documents." maintainers = ["davidcavazos"] groups = [local.jss_common_group] enable_periodic = true }, { name = "terraform-google-secured-data-warehouse-onprem-ingest" short_name = "sdw-onprem-ingest" org = "GoogleCloudPlatform" description = "Deploys a secured data warehouse variant for ingesting encrypted data from on-prem sources" maintainers = ["lanre-OG"] topics = join(",", [local.common_topics.da, local.common_topics.security, local.common_topics.e2e]) }, { name = "terraform-google-tf-cloud-agents" org = "GoogleCloudPlatform" description = "Creates self-hosted Terraform Cloud Agent on Google Cloud" topics = join(",", [local.common_topics.ops, local.common_topics.security, local.common_topics.devtools]) }, { name = "terraform-google-cloud-spanner" org = "GoogleCloudPlatform" description = "Deploy Spanner instances" maintainers = concat(["anaik91", "imrannayer", "rahul2393"], local.adc_common_admins) topics = local.common_topics.db groups = [local.jss_common_group] enable_periodic = true lint_env = { ENABLE_BPMETADATA = "1" } }, { name = "terraform-pubsub-integration-golang" org = "GoogleCloudPlatform" short_name = "pubsub-golang-app" maintainers = ["Shabirmean", "Mukamik"] groups = ["dee-platform-ops", local.jss_common_group] enable_periodic = true }, { name = "terraform-pubsub-integration-java" org = "GoogleCloudPlatform" short_name = "pubsub-java-app" maintainers = ["Shabirmean", "Mukamik"] groups = ["dee-platform-ops", local.jss_common_group] enable_periodic = true }, { name = "terraform-google-backup-dr" org = "GoogleCloudPlatform" short_name = "backup-dr" description = "Deploy Backup and DR appliances" maintainers = ["umeshkumhar"] topics = join(",", [local.common_topics.compute, local.common_topics.ops]) }, { name = "terraform-google-tags" org = "GoogleCloudPlatform" description = "Create and manage Google Cloud Tags" maintainers = ["nidhi0710"] topics = join(",", [local.common_topics.security, local.common_topics.ops]) }, { name = "terraform-google-dataplex-auto-data-quality" org = "GoogleCloudPlatform" description = "Move data between environments using Dataplex" maintainers = ["bradmiro"] topics = local.common_topics.da }, { name = "terraform-google-enterprise-application" org = "GoogleCloudPlatform" description = "Deploy an enterprise developer platform on Google Cloud" maintainers = ["yliaog", "sleighton2022"] admins = ["apeabody"] topics = join(",", [local.common_topics.e2e, local.common_topics.ops]) add_checks = [ "terraform-google-enterprise-application-single-int-trigger (cloud-foundation-cicd)", "terraform-google-enterprise-application-hpc-int-trigger (cloud-foundation-cicd)", "golangci (test/integration)", "lint-terraform-min" ] }, { name = "terraform-genai-rag" short_name = "genai-rag" org = "GoogleCloudPlatform" description = "Deploys a Generative AI RAG solution" maintainers = ["davenportjw", "bradmiro"] groups = ["dee-platform-ops", "dee-data-ai", local.jss_common_group] enable_periodic = true lint_env = { ENABLE_BPMETADATA = "1" } }, { name = "terraform-google-artifact-registry" org = "GoogleCloudPlatform" description = "Create and manage Artifact Registry repositories" maintainers = ["prabhu34"] topics = join(",", [local.common_topics.containers, local.common_topics.devtools]) }, { name = "terraform-google-bigtable" org = "GoogleCloudPlatform" description = "Create and manage Google Bigtable resources" maintainers = concat(["hariprabhaam"], local.adc_common_admins) topics = local.common_topics.da lint_env = { ENABLE_BPMETADATA = "1" } }, { name = "terraform-google-secure-web-proxy" org = "GoogleCloudPlatform" description = "Create and manage Secure Web Proxy on GCP for secured egress web traffic" maintainers = ["maitreya-source"] topics = join(",", [local.common_topics.security, local.common_topics.net]) }, { name = "terraform-cloud-client-api" short_name = "cloud-client-api" org = "GoogleCloudPlatform" description = "Deploys an example application that uses Cloud Client APIs" maintainers = ["glasnt", "iennae"] groups = ["team-egg", local.jss_common_group] enable_periodic = true lint_env = { ENABLE_BPMETADATA = "1" } }, { name = "kms-solutions" org = "GoogleCloudPlatform" description = "Store Cloud KMS scripts, artifacts, code samples, and more." maintainers = ["tdbhacks", "erlanderlo", "g-swap", "nb-goog"] lint_env = { ENABLE_BPMETADATA = "1" } }, { name = "terraform-dataanalytics-eventdriven" short_name = "dataanalytics-eventdriven" org = "GoogleCloudPlatform" description = "Uses click-to-deploy to demonstrate how to load data from Cloud Storage to BigQuery using an event-driven load function." groups = [local.jss_common_group] maintainers = ["fellipeamedeiros", "sylvioneto"] }, { name = "terraform-google-apphub" org = "GoogleCloudPlatform" description = "Creates and manages AppHub resources" maintainers = ["q2w"] lint_env = { ENABLE_BPMETADATA = "1" } }, { name = "terraform-google-regional-lb-http" org = "GoogleCloudPlatform" description = "Creates a regional HTTP load balancer using forwarding rules" maintainers = concat(["qz267"], local.adc_common_admins) admins = ["q2w"] lint_env = { ENABLE_BPMETADATA = "1" } }, { name = "terraform-google-firestore" org = "GoogleCloudPlatform" description = "Create and manage Google Cloud Firestore resources" maintainers = concat(["Gautam04"], local.adc_common_admins) topics = local.common_topics.da lint_env = { ENABLE_BPMETADATA = "1" } }, ] }