terraform-module-builder

Terraform Module Builder

Safety Notice

This listing is imported from skills.sh public index metadata. Review upstream SKILL.md and repository scripts before running.

Copy this and send it to your AI assistant to learn

Install skill "terraform-module-builder" with this command: npx skills add monkey1sai/openai-cli/monkey1sai-openai-cli-terraform-module-builder

Terraform Module Builder

Build reusable, production-ready Terraform modules for cloud infrastructure.

Core Workflow

  • Define module structure: Organize files properly

  • Declare variables: Input parameters with validation

  • Create resources: Infrastructure definitions

  • Configure outputs: Export useful values

  • Setup state: Remote backend configuration

  • Document: README and examples

Module Structure

modules/ └── vpc/ ├── main.tf # Primary resources ├── variables.tf # Input variables ├── outputs.tf # Output values ├── versions.tf # Provider versions ├── locals.tf # Local values ├── data.tf # Data sources ├── README.md # Documentation └── examples/ └── complete/ ├── main.tf └── outputs.tf

VPC Module Example

Main Configuration

modules/vpc/main.tf

resource "aws_vpc" "main" { cidr_block = var.cidr_block enable_dns_hostnames = var.enable_dns_hostnames enable_dns_support = var.enable_dns_support

tags = merge( var.tags, { Name = var.name } ) }

resource "aws_internet_gateway" "main" { count = var.create_igw ? 1 : 0

vpc_id = aws_vpc.main.id

tags = merge( var.tags, { Name = "${var.name}-igw" } ) }

resource "aws_subnet" "public" { count = length(var.public_subnets)

vpc_id = aws_vpc.main.id cidr_block = var.public_subnets[count.index] availability_zone = var.availability_zones[count.index] map_public_ip_on_launch = true

tags = merge( var.tags, { Name = "${var.name}-public-${var.availability_zones[count.index]}" Tier = "public" } ) }

resource "aws_subnet" "private" { count = length(var.private_subnets)

vpc_id = aws_vpc.main.id cidr_block = var.private_subnets[count.index] availability_zone = var.availability_zones[count.index]

tags = merge( var.tags, { Name = "${var.name}-private-${var.availability_zones[count.index]}" Tier = "private" } ) }

resource "aws_eip" "nat" { count = var.enable_nat_gateway ? (var.single_nat_gateway ? 1 : length(var.public_subnets)) : 0

domain = "vpc"

tags = merge( var.tags, { Name = "${var.name}-nat-${count.index + 1}" } )

depends_on = [aws_internet_gateway.main] }

resource "aws_nat_gateway" "main" { count = var.enable_nat_gateway ? (var.single_nat_gateway ? 1 : length(var.public_subnets)) : 0

allocation_id = aws_eip.nat[count.index].id subnet_id = aws_subnet.public[count.index].id

tags = merge( var.tags, { Name = "${var.name}-nat-${count.index + 1}" } )

depends_on = [aws_internet_gateway.main] }

resource "aws_route_table" "public" { vpc_id = aws_vpc.main.id

tags = merge( var.tags, { Name = "${var.name}-public-rt" } ) }

resource "aws_route" "public_internet" { count = var.create_igw ? 1 : 0

route_table_id = aws_route_table.public.id destination_cidr_block = "0.0.0.0/0" gateway_id = aws_internet_gateway.main[0].id }

resource "aws_route_table_association" "public" { count = length(var.public_subnets)

subnet_id = aws_subnet.public[count.index].id route_table_id = aws_route_table.public.id }

resource "aws_route_table" "private" { count = var.enable_nat_gateway ? (var.single_nat_gateway ? 1 : length(var.private_subnets)) : 0

vpc_id = aws_vpc.main.id

tags = merge( var.tags, { Name = "${var.name}-private-rt-${count.index + 1}" } ) }

resource "aws_route" "private_nat" { count = var.enable_nat_gateway ? (var.single_nat_gateway ? 1 : length(var.private_subnets)) : 0

route_table_id = aws_route_table.private[count.index].id destination_cidr_block = "0.0.0.0/0" nat_gateway_id = aws_nat_gateway.main[var.single_nat_gateway ? 0 : count.index].id }

resource "aws_route_table_association" "private" { count = length(var.private_subnets)

subnet_id = aws_subnet.private[count.index].id route_table_id = aws_route_table.private[var.single_nat_gateway ? 0 : count.index].id }

Variables

modules/vpc/variables.tf

variable "name" { description = "Name prefix for all resources" type = string

validation { condition = length(var.name) <= 32 error_message = "Name must be 32 characters or less." } }

variable "cidr_block" { description = "CIDR block for the VPC" type = string default = "10.0.0.0/16"

validation { condition = can(cidrhost(var.cidr_block, 0)) error_message = "Must be a valid CIDR block." } }

variable "availability_zones" { description = "List of availability zones" type = list(string) }

variable "public_subnets" { description = "List of public subnet CIDR blocks" type = list(string) default = []

validation { condition = alltrue([for cidr in var.public_subnets : can(cidrhost(cidr, 0))]) error_message = "All public subnets must be valid CIDR blocks." } }

variable "private_subnets" { description = "List of private subnet CIDR blocks" type = list(string) default = [] }

variable "enable_dns_hostnames" { description = "Enable DNS hostnames in the VPC" type = bool default = true }

variable "enable_dns_support" { description = "Enable DNS support in the VPC" type = bool default = true }

variable "create_igw" { description = "Create Internet Gateway" type = bool default = true }

variable "enable_nat_gateway" { description = "Enable NAT Gateway for private subnets" type = bool default = true }

variable "single_nat_gateway" { description = "Use a single NAT Gateway (cost savings)" type = bool default = false }

variable "tags" { description = "Tags to apply to all resources" type = map(string) default = {} }

Outputs

modules/vpc/outputs.tf

output "vpc_id" { description = "The ID of the VPC" value = aws_vpc.main.id }

output "vpc_cidr_block" { description = "The CIDR block of the VPC" value = aws_vpc.main.cidr_block }

output "public_subnet_ids" { description = "List of public subnet IDs" value = aws_subnet.public[*].id }

output "private_subnet_ids" { description = "List of private subnet IDs" value = aws_subnet.private[*].id }

output "public_subnet_cidr_blocks" { description = "List of public subnet CIDR blocks" value = aws_subnet.public[*].cidr_block }

output "private_subnet_cidr_blocks" { description = "List of private subnet CIDR blocks" value = aws_subnet.private[*].cidr_block }

output "nat_gateway_ids" { description = "List of NAT Gateway IDs" value = aws_nat_gateway.main[*].id }

output "internet_gateway_id" { description = "The ID of the Internet Gateway" value = try(aws_internet_gateway.main[0].id, null) }

Versions

modules/vpc/versions.tf

terraform { required_version = ">= 1.0"

required_providers { aws = { source = "hashicorp/aws" version = ">= 5.0" } } }

Remote State Configuration

backend.tf

terraform { backend "s3" { bucket = "my-terraform-state" key = "production/vpc/terraform.tfstate" region = "us-east-1" encrypt = true dynamodb_table = "terraform-locks" } }

State locking table

resource "aws_dynamodb_table" "terraform_locks" { name = "terraform-locks" billing_mode = "PAY_PER_REQUEST" hash_key = "LockID"

attribute { name = "LockID" type = "S" } }

EKS Module Example

modules/eks/main.tf

resource "aws_eks_cluster" "main" { name = var.cluster_name version = var.cluster_version role_arn = aws_iam_role.cluster.arn

vpc_config { subnet_ids = var.subnet_ids endpoint_private_access = var.endpoint_private_access endpoint_public_access = var.endpoint_public_access security_group_ids = [aws_security_group.cluster.id] }

encryption_config { provider { key_arn = var.kms_key_arn } resources = ["secrets"] }

enabled_cluster_log_types = var.enabled_log_types

depends_on = [ aws_iam_role_policy_attachment.cluster_policy, aws_iam_role_policy_attachment.vpc_resource_controller, ]

tags = var.tags }

resource "aws_eks_node_group" "main" { for_each = var.node_groups

cluster_name = aws_eks_cluster.main.name node_group_name = each.key node_role_arn = aws_iam_role.node.arn subnet_ids = var.subnet_ids

instance_types = each.value.instance_types capacity_type = each.value.capacity_type disk_size = each.value.disk_size

scaling_config { desired_size = each.value.desired_size max_size = each.value.max_size min_size = each.value.min_size }

update_config { max_unavailable_percentage = 25 }

labels = each.value.labels

dynamic "taint" { for_each = each.value.taints content { key = taint.value.key value = taint.value.value effect = taint.value.effect } }

tags = merge(var.tags, each.value.tags)

depends_on = [ aws_iam_role_policy_attachment.node_policy, aws_iam_role_policy_attachment.cni_policy, aws_iam_role_policy_attachment.ecr_policy, ]

lifecycle { ignore_changes = [scaling_config[0].desired_size] } }

modules/eks/variables.tf

variable "cluster_name" { description = "Name of the EKS cluster" type = string }

variable "cluster_version" { description = "Kubernetes version" type = string default = "1.28" }

variable "node_groups" { description = "Map of node group configurations" type = map(object({ instance_types = list(string) capacity_type = string disk_size = number desired_size = number max_size = number min_size = number labels = map(string) taints = list(object({ key = string value = string effect = string })) tags = map(string) })) }

Environment Configuration

environments/production/main.tf

terraform { required_version = ">= 1.0"

backend "s3" { bucket = "company-terraform-state" key = "production/main.tfstate" region = "us-east-1" encrypt = true dynamodb_table = "terraform-locks" } }

provider "aws" { region = var.region

default_tags { tags = { Environment = "production" ManagedBy = "terraform" Project = var.project_name } } }

module "vpc" { source = "../../modules/vpc"

name = "${var.project_name}-production" cidr_block = "10.0.0.0/16" availability_zones = ["us-east-1a", "us-east-1b", "us-east-1c"] public_subnets = ["10.0.1.0/24", "10.0.2.0/24", "10.0.3.0/24"] private_subnets = ["10.0.11.0/24", "10.0.12.0/24", "10.0.13.0/24"] enable_nat_gateway = true single_nat_gateway = false

tags = var.tags }

module "eks" { source = "../../modules/eks"

cluster_name = "${var.project_name}-production" cluster_version = "1.28" subnet_ids = module.vpc.private_subnet_ids

node_groups = { general = { instance_types = ["m6i.xlarge"] capacity_type = "ON_DEMAND" disk_size = 100 desired_size = 3 max_size = 10 min_size = 2 labels = { workload = "general" } taints = [] tags = {} } spot = { instance_types = ["m6i.xlarge", "m5.xlarge"] capacity_type = "SPOT" disk_size = 50 desired_size = 2 max_size = 20 min_size = 0 labels = { workload = "batch" } taints = [{ key = "spot" value = "true" effect = "NO_SCHEDULE" }] tags = {} } }

tags = var.tags }

Locals and Data Sources

modules/vpc/locals.tf

locals { az_count = length(var.availability_zones)

subnet_bits = ceil(log(local.az_count * 2, 2))

public_subnet_cidrs = [ for i in range(local.az_count) : cidrsubnet(var.cidr_block, local.subnet_bits, i) ]

private_subnet_cidrs = [ for i in range(local.az_count) : cidrsubnet(var.cidr_block, local.subnet_bits, i + local.az_count) ]

common_tags = merge( var.tags, { Module = "vpc" CreatedBy = "terraform" } ) }

modules/vpc/data.tf

data "aws_region" "current" {}

data "aws_availability_zones" "available" { state = "available" }

data "aws_caller_identity" "current" {}

Best Practices

  • Version constraints: Pin provider versions

  • Variable validation: Add validation rules

  • Consistent naming: Use name prefixes

  • Default tags: Apply common tags

  • Remote state: Use S3 + DynamoDB locking

  • Module composition: Small, focused modules

  • Documentation: README with examples

  • Output everything: Useful values for consumers

Output Checklist

Every Terraform module should include:

  • Proper file structure (main, variables, outputs, versions)

  • Variable validation rules

  • Meaningful default values

  • Comprehensive outputs

  • Version constraints

  • Remote state configuration

  • Tags for all resources

  • README with examples

  • Locals for computed values

  • Data sources for dynamic values

Source Transparency

This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.

Related Skills

Related by shared tags or category signals.

Coding

eslint-prettier-config

No summary provided by upstream source.

Repository SourceNeeds Review
Coding

websocket-realtime-builder

No summary provided by upstream source.

Repository SourceNeeds Review
Coding

webhook-receiver-hardener

No summary provided by upstream source.

Repository SourceNeeds Review
Coding

bruno-collection-generator

No summary provided by upstream source.

Repository SourceNeeds Review