Skip to content

Commit 5c7ce58

Browse files
authored
feat: Wrapper for terragrunt (#23)
1 parent fcca2fc commit 5c7ce58

File tree

6 files changed

+155
-0
lines changed

6 files changed

+155
-0
lines changed

.pre-commit-config.yaml

+1
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,7 @@ repos:
33
rev: v1.86.0
44
hooks:
55
- id: terraform_fmt
6+
- id: terraform_wrapper_module_for_each
67
- id: terraform_validate
78
- id: terraform_docs
89
args:

wrappers/README.md

+100
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,100 @@
1+
# Wrapper for the root module
2+
3+
The configuration in this directory contains an implementation of a single module wrapper pattern, which allows managing several copies of a module in places where using the native Terraform 0.13+ `for_each` feature is not feasible (e.g., with Terragrunt).
4+
5+
You may want to use a single Terragrunt configuration file to manage multiple resources without duplicating `terragrunt.hcl` files for each copy of the same module.
6+
7+
This wrapper does not implement any extra functionality.
8+
9+
## Usage with Terragrunt
10+
11+
`terragrunt.hcl`:
12+
13+
```hcl
14+
terraform {
15+
source = "tfr:///terraform-aws-modules/efs/aws//wrappers"
16+
# Alternative source:
17+
# source = "git::[email protected]:terraform-aws-modules/terraform-aws-efs.git//wrappers?ref=master"
18+
}
19+
20+
inputs = {
21+
defaults = { # Default values
22+
create = true
23+
tags = {
24+
Terraform = "true"
25+
Environment = "dev"
26+
}
27+
}
28+
29+
items = {
30+
my-item = {
31+
# omitted... can be any argument supported by the module
32+
}
33+
my-second-item = {
34+
# omitted... can be any argument supported by the module
35+
}
36+
# omitted...
37+
}
38+
}
39+
```
40+
41+
## Usage with Terraform
42+
43+
```hcl
44+
module "wrapper" {
45+
source = "terraform-aws-modules/efs/aws//wrappers"
46+
47+
defaults = { # Default values
48+
create = true
49+
tags = {
50+
Terraform = "true"
51+
Environment = "dev"
52+
}
53+
}
54+
55+
items = {
56+
my-item = {
57+
# omitted... can be any argument supported by the module
58+
}
59+
my-second-item = {
60+
# omitted... can be any argument supported by the module
61+
}
62+
# omitted...
63+
}
64+
}
65+
```
66+
67+
## Example: Manage multiple S3 buckets in one Terragrunt layer
68+
69+
`eu-west-1/s3-buckets/terragrunt.hcl`:
70+
71+
```hcl
72+
terraform {
73+
source = "tfr:///terraform-aws-modules/s3-bucket/aws//wrappers"
74+
# Alternative source:
75+
# source = "git::[email protected]:terraform-aws-modules/terraform-aws-s3-bucket.git//wrappers?ref=master"
76+
}
77+
78+
inputs = {
79+
defaults = {
80+
force_destroy = true
81+
82+
attach_elb_log_delivery_policy = true
83+
attach_lb_log_delivery_policy = true
84+
attach_deny_insecure_transport_policy = true
85+
attach_require_latest_tls_policy = true
86+
}
87+
88+
items = {
89+
bucket1 = {
90+
bucket = "my-random-bucket-1"
91+
}
92+
bucket2 = {
93+
bucket = "my-random-bucket-2"
94+
tags = {
95+
Secure = "probably"
96+
}
97+
}
98+
}
99+
}
100+
```

wrappers/main.tf

+35
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,35 @@
1+
module "wrapper" {
2+
source = "../"
3+
4+
for_each = var.items
5+
6+
access_points = try(each.value.access_points, var.defaults.access_points, {})
7+
attach_policy = try(each.value.attach_policy, var.defaults.attach_policy, true)
8+
availability_zone_name = try(each.value.availability_zone_name, var.defaults.availability_zone_name, null)
9+
bypass_policy_lockout_safety_check = try(each.value.bypass_policy_lockout_safety_check, var.defaults.bypass_policy_lockout_safety_check, null)
10+
create = try(each.value.create, var.defaults.create, true)
11+
create_backup_policy = try(each.value.create_backup_policy, var.defaults.create_backup_policy, true)
12+
create_replication_configuration = try(each.value.create_replication_configuration, var.defaults.create_replication_configuration, false)
13+
create_security_group = try(each.value.create_security_group, var.defaults.create_security_group, true)
14+
creation_token = try(each.value.creation_token, var.defaults.creation_token, null)
15+
deny_nonsecure_transport = try(each.value.deny_nonsecure_transport, var.defaults.deny_nonsecure_transport, true)
16+
enable_backup_policy = try(each.value.enable_backup_policy, var.defaults.enable_backup_policy, true)
17+
encrypted = try(each.value.encrypted, var.defaults.encrypted, true)
18+
kms_key_arn = try(each.value.kms_key_arn, var.defaults.kms_key_arn, null)
19+
lifecycle_policy = try(each.value.lifecycle_policy, var.defaults.lifecycle_policy, {})
20+
mount_targets = try(each.value.mount_targets, var.defaults.mount_targets, {})
21+
name = try(each.value.name, var.defaults.name, "")
22+
override_policy_documents = try(each.value.override_policy_documents, var.defaults.override_policy_documents, [])
23+
performance_mode = try(each.value.performance_mode, var.defaults.performance_mode, null)
24+
policy_statements = try(each.value.policy_statements, var.defaults.policy_statements, [])
25+
provisioned_throughput_in_mibps = try(each.value.provisioned_throughput_in_mibps, var.defaults.provisioned_throughput_in_mibps, null)
26+
replication_configuration_destination = try(each.value.replication_configuration_destination, var.defaults.replication_configuration_destination, {})
27+
security_group_description = try(each.value.security_group_description, var.defaults.security_group_description, null)
28+
security_group_name = try(each.value.security_group_name, var.defaults.security_group_name, null)
29+
security_group_rules = try(each.value.security_group_rules, var.defaults.security_group_rules, {})
30+
security_group_use_name_prefix = try(each.value.security_group_use_name_prefix, var.defaults.security_group_use_name_prefix, false)
31+
security_group_vpc_id = try(each.value.security_group_vpc_id, var.defaults.security_group_vpc_id, null)
32+
source_policy_documents = try(each.value.source_policy_documents, var.defaults.source_policy_documents, [])
33+
tags = try(each.value.tags, var.defaults.tags, {})
34+
throughput_mode = try(each.value.throughput_mode, var.defaults.throughput_mode, null)
35+
}

wrappers/outputs.tf

+5
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,5 @@
1+
output "wrapper" {
2+
description = "Map of outputs of a wrapper."
3+
value = module.wrapper
4+
# sensitive = false # No sensitive module output found
5+
}

wrappers/variables.tf

+11
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,11 @@
1+
variable "defaults" {
2+
description = "Map of default values which will be used for each item."
3+
type = any
4+
default = {}
5+
}
6+
7+
variable "items" {
8+
description = "Maps of items to create a wrapper from. Values are passed through to the module."
9+
type = any
10+
default = {}
11+
}

wrappers/versions.tf

+3
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,3 @@
1+
terraform {
2+
required_version = ">= 0.13.1"
3+
}

0 commit comments

Comments
 (0)