- Jan 27, 2021
-
-
Monty Dawson authored
-
Monty Dawson authored
-
Monty Dawson authored
-
- Jan 08, 2021
-
-
Dr Rich Wareham authored
It would appear that the "run.googleapis.com/ingress" annotation can be set to "all" without having to enable the beta launch stage. Indeed it *has* to be set to "all" since attempting to unset it causes Cloud Run to immediately reset it.
-
Dr Rich Wareham authored
The "run.googleapis.com/ingress-status" annotation is maintained by the infrastructure Google-side so ignore changes to it.
-
Dr Abraham Martin authored
-
Dr Rich Wareham authored
Provide a variable which allows ingress type to be specified. This allows placing the service behind Cloud Load Balancer. Provide variables which allow extra annotations to be added to the Cloud Run service and the service template.
-
- Dec 10, 2020
-
-
Dr Rich Wareham authored
As noted in #11, we do not support the common case where a single Stackdriver workspace hosts multiple projects. Do this by requiring a Google provider for the Stackdriver workspace be passed to the module is alerting is enabled. We use a separate provider because the provider used must be able to create monitoring resources *in the host project*. In the case of our standard deployment, this implies it needs *product admin* credentials. We no longer need to enable the monitoring service since this service a) needs to be enabled in the *host* project and b) the service will have been enabled as a necessary side-effect of creating the Stackdriver workspace. Closes #11
-
- Dec 09, 2020
-
-
Dr Abraham Martin authored
Also remove the alerting_enabled default to false for two reasons: 1) To force the developer to make a decision on monitoring 2) If alerting_enabled is true but alerting_email_address is not set up, then there is not much point as we don't have any other channel set up.
-
- Aug 04, 2020
-
-
- Jul 29, 2020
-
-
- Jun 16, 2020
-
-
Dr Rich Wareham authored
-
- Jun 11, 2020
-
-
Dr Rich Wareham authored
Sometimes we don't need a SQL instance for the webapp. Allow sql_instance_connection_name to be empty and, if so, don't add the Cloud SQL connection roles to the service account or add the SQL instance annotation to the webapp. Closes #5
-
Dr Rich Wareham authored
As noted in #6, we were hard-coding the service account id used for the webapp to "webapp-run". This meant it was impossible to deploy more than one webapp in a project. Form a better default from the "name" variable. For existing deployments the service account id will be unchanged if the "name" variable is at its default value. Allow the service account id to be specified explicitly via the optional "service_account_id" variable. Closes #6
-
- Apr 17, 2020
-
-
Dr Rich Wareham authored
We no longer need the random id hack for generating Cloud Run resource names as the provider now supports a autogenerate_revision_name flag which allows Google to generate the appropriate resource name for us. Closes #4
-
- Mar 27, 2020
-
-
Dr Rich Wareham authored
Ignoring changes in name means that one can never run terraform deployments beyond the initial creation of the webapp service. Terraform will always modify a service in-place but try to use the same name which negates the point of *setting* the name in the google_cloud_run_service.webapp resource. The downside of this is that one can't then deploy changes without deleting and re-creating random_id.webapp_revision_name resource but that is at least documented in the README.
-
- Mar 26, 2020
-
-
Robin Goodall authored
-
- Mar 25, 2020
-
-
Dr Rich Wareham authored
-
- Mar 24, 2020
-
-
Dr Rich Wareham authored
Allow an optional domain mapping to be configured for the webapp. If a domain mapping is configured, appropriate DNS records are provided as outputs. Closes #2
-
- Mar 23, 2020
-
-
Dr Abraham Martin authored
-
Dr Abraham Martin authored
This module manages a Cloud Run-hosted container. It takes care of making sure the container is connected to a Cloud SQL instance and sets environment variables on the application.
-