9 Commits

Author SHA1 Message Date
Ryan Boehning
9bd7b66a98 Update a Postgres 13 ref in the README to v14 2022-02-05 18:39:47 -08:00
Ryan Boehning
81d77bacb4 Bump terraform, postgres, and plugins
* terraform v1.0.0 -> v1.1.5
* hashicorp/google 3.80.0 -> 4.9.0
* hashicorp/tfe 0.25.3 -> 0.28.1
* postgres 13 -> 14
2022-02-05 18:37:11 -08:00
Ryan Boehning
53550926a5 Bump terraform version 1.0.0 -> 1.0.5 and update provider plugins 2021-08-22 12:20:55 -07:00
Ryan Boehning
0203377079 Update to terraform v1.0.0 (#4)
* add hashes for both linux and macOS to the lock file
* update google provider v3.70.0 -> v3.71.0
2021-06-08 07:25:53 -07:00
Ryan Boehning
f4e906ee0c feat: Upgrade to terraform 0.15 (#3)
* Upgrade provider plugins to latest release
* Improve README instructions
* Convert locals in main.tf to vars
* Add output for db proxy public IP to make connecting easier
* Add plan and crash.log to .gitignore
* Move backend config to backend.tf
* Move provider config to providers.tf
* Move required_versions to versions.tf
2021-06-06 13:33:00 -07:00
Ryan Boehning
70c7fff926 Add sensitive flag to vars and outputs that are secrets (#2)
By setting `sensitive = true` on a variable or output, Terraform will
redact it from the plan/apply output. This prevents secrets from being
logged. This is a new feature in Terraform v0.14.
2020-12-05 21:03:33 -08:00
Ryan Boehning
20a7c64c9a Update files for Terraform v0.14 (#1)
* Upgrade db from Postgres 11 -> 13
* Upgrade tfe and google provider plugins
* Remove google-beta provider since it's no longer needed
* Add .terraform-version file to support tfenv
* Add .vscode/ settings to play nice with VSCode
* Clean up .gitignore
2020-12-05 17:47:36 -08:00
Ryan Boehning
cc9f4fe692 Fix bad permissions on service account key in dbproxy startup script
The Cloud SQL Proxy container needs to mount the cloud-sql-proxy service
account key as a file so it can connect to the db. I was incorrectly
setting the permissions on this file to 400. Inside the container, the
proxy binary is being run by the `nonroot` user. This user has a
different uid compared to the user running `docker` outside the
container, so it can't read the file. The solution is to change the
permissions on the key to 444, so it's readable by `nonroot`.
2020-05-01 16:43:23 -07:00
Ryan Boehning
f7ef3d241a Initial commit 2020-04-19 03:40:44 -07:00