Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/cloudnationhq/terraform-azure-ca
Terraform module which creates container app resources used by workloads and accelerators.
https://github.com/cloudnationhq/terraform-azure-ca
azure terraform wam
Last synced: 7 days ago
JSON representation
Terraform module which creates container app resources used by workloads and accelerators.
- Host: GitHub
- URL: https://github.com/cloudnationhq/terraform-azure-ca
- Owner: CloudNationHQ
- License: mit
- Created: 2024-05-13T09:19:25.000Z (6 months ago)
- Default Branch: main
- Last Pushed: 2024-11-11T11:12:24.000Z (9 days ago)
- Last Synced: 2024-11-11T12:21:58.302Z (9 days ago)
- Topics: azure, terraform, wam
- Language: HCL
- Homepage: https://library.tf/modules/CloudNationHQ/ca/azure/latest
- Size: 224 KB
- Stars: 0
- Watchers: 1
- Forks: 1
- Open Issues: 1
-
Metadata Files:
- Readme: README.md
- Changelog: CHANGELOG.md
- Contributing: CONTRIBUTING.md
- License: LICENSE
- Code of conduct: CODE_OF_CONDUCT.md
- Codeowners: .github/CODEOWNERS
- Security: SECURITY.md
Awesome Lists containing this project
README
# Container Apps
This terraform module automates the creation of container app resources on the azure cloud platform, enabling easier deployment and management of container apps within a container app environment.
## Goals
The main objective is to create a more logic data structure, achieved by combining and grouping related resources together in a complex object.
The structure of the module promotes reusability. It's intended to be a repeatable component, simplifying the process of building diverse workloads and platform accelerators consistently.
A primary goal is to utilize keys and values in the object that correspond to the REST API's structure. This enables us to carry out iterations, increasing its practical value as time goes on.
A last key goal is to separate logic from configuration in the module, thereby enhancing its scalability, ease of customization, and manageability.
## Non-Goals
These modules are not intended to be complete, ready-to-use solutions; they are designed as components for creating your own patterns.
They are not tailored for a single use case but are meant to be versatile and applicable to a range of scenarios.
Security standardization is applied at the pattern level, while the modules include default values based on best practices but do not enforce specific security standards.
End-to-end testing is not conducted on these modules, as they are individual components and do not undergo the extensive testing reserved for complete patterns or solutions.
## Features
- provides support for retrieval of container images from the registry using user-assigned identities
- provides support for secrets to retrieve from a key vault backend scope
- offers possibility to integrate the container app environment to your own vnet (vnet integration)
- allows for ingress to be set to external (limited to container app environment), limited to the vnet or wide open
- facilitates the use of custom domain names for your container apps
- provides support for certificates for custom domain names
- allows for multiple container apps to be deployed within a container app environment
- enables multiple container app jobs
- utilization of terratest for robust validation## Requirements
| Name | Version |
|------|---------|
| [terraform](#requirement\_terraform) | ~> 1.0 |
| [azurerm](#requirement\_azurerm) | ~> 4.0 |## Providers
| Name | Version |
|------|---------|
| [azurerm](#provider\_azurerm) | ~> 4.0 |## Resources
| Name | Type |
|------|------|
| [azurerm_container_app.ca](https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/container_app) | resource |
| [azurerm_container_app_custom_domain.domain](https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/container_app_custom_domain) | resource |
| [azurerm_container_app_environment.cae](https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/container_app_environment) | resource |
| [azurerm_container_app_environment_certificate.certificate](https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/container_app_environment_certificate) | resource |
| [azurerm_container_app_job.job](https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/container_app_job) | resource |
| [azurerm_role_assignment.role_acr_pull](https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/role_assignment) | resource |
| [azurerm_role_assignment.role_acr_pull_jobs](https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/role_assignment) | resource |
| [azurerm_role_assignment.role_secret_user](https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/role_assignment) | resource |
| [azurerm_role_assignment.role_secret_user_jobs](https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/role_assignment) | resource |
| [azurerm_user_assigned_identity.identity](https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/user_assigned_identity) | resource |
| [azurerm_user_assigned_identity.identity_jobs](https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/user_assigned_identity) | resource |## Inputs
| Name | Description | Type | Default | Required |
|------|-------------|------|---------|:--------:|
| [environment](#input\_environment) | describes container apps configuration | `any` | n/a | yes |
| [location](#input\_location) | default azure region and can be used if location is not specified inside the object. | `string` | `null` | no |
| [naming](#input\_naming) | contains naming convention | `map(string)` | `{}` | no |
| [resource\_group](#input\_resource\_group) | default resource group and can be used if resourcegroup is not specified inside the object. | `string` | `null` | no |
| [tags](#input\_tags) | default tags and can be used if tags are not specified inside the object. | `map(string)` | `{}` | no |## Outputs
| Name | Description |
|------|-------------|
| [certificates](#output\_certificates) | contains all container app environment certificate(s) configuration |
| [container\_app\_jobs](#output\_container\_app\_jobs) | contains all container app jobs configuration |
| [container\_apps](#output\_container\_apps) | contains all container app(s) configuration |
| [custom\_domains](#output\_custom\_domains) | contains all container app custom domain(s) configuration |
| [environment](#output\_environment) | contains all container app environment configuration |
| [user\_assigned\_identities](#output\_user\_assigned\_identities) | contains all user assigned identities configuration |## Testing
Ensure go and terraform are installed.
Run tests for different usage scenarios by specifying the EXAMPLE environment variable. Usage examples are in the examples directory.
To execute a test, run `make test EXAMPLE=default`
Replace default with the specific example you want to test. These tests ensure the module performs reliably across various configurations.
## Notes
Using a dedicated module, we've developed a naming convention for resources that's based on specific regular expressions for each type, ensuring correct abbreviations and offering flexibility with multiple prefixes and suffixes.
Full examples detailing all usages, along with integrations with dependency modules, are located in the examples directory.
To update the module's documentation run `make doc`
**Recommended Identity for Image Retrieval from Azure Container Registry (ACR):**
While it's technically possible to use a system-assigned identity for pulling images from an Azure Container Registry (ACR), we strongly recommend using user-assigned identities. Here's why:The system-assigned identity requires 'AcrPull' permissions on the registry. However, you cannot assign this role until after the resource (in this case, the container app) has been deployed. This creates a catch-22, because the container app cannot be deployed without first retrieving an image.
By using a user-assigned identity, this issue can be avoided. The deployment order within the module would be as follows:
- deploy ACR
- deploy user-assigned identity
- assign the 'AcrPull' role
- deploy the container appThis way, the module ensures that all the necessary permissions are in place before the container app deployment. It is a smoother, first time right deployment and more reliable process that we strongly recommend for most use cases.
See also [here](https://learn.microsoft.com/en-us/azure/container-apps/managed-identity?tabs=portal%2Cdotnet#common-use-cases)## Authors
Module is maintained by [these awesome contributors](https://github.com/cloudnationhq/terraform-azure-ca/graphs/contributors).
## Contributing
We welcome contributions from the community! Whether it's reporting a bug, suggesting a new feature, or submitting a pull request, your input is highly valued.
For more information, please see our contribution [guidelines](./CONTRIBUTING.md).
## License
MIT Licensed. See [LICENSE](./LICENSE) for full details.
## Reference
- [Documentation](https://learn.microsoft.com/en-us/azure/container-apps/)
- [Rest Api](https://learn.microsoft.com/en-us/rest/api/containerapps/)