
Security News
NVD Concedes Inability to Keep Pace with Surging CVE Disclosures in 2025
Security experts warn that recent classification changes obscure the true scope of the NVD backlog as CVE volume hits all-time highs.
@cdktf/provider-google
Advanced tools
This repo builds and publishes the Terraform google Provider bindings for cdktf.
Current build targets are:
This project is explicitly not tracking the Terraform google Provider version 1:1. In fact, it always tracks latest
of ~> 3.0
with every release. If there scenarios where you explicitly have to pin your provider version, you can do so by generating the provider constructs manually.
These are the upstream dependencies:
If there are breaking changes (backward incompatible) in any of the above, the major version of this project will be bumped. While the Terraform Engine and the Terraform google Provider are relatively stable, the Terraform CDK is in an early stage. Therefore, it's likely that there will be breaking changes.
Please report bugs and issues to the terraform cdk project:
This is mostly based on projen, which takes care of generating the entire repository.
There's a custom project builder which encapsulate the common settings for all cdktf
providers.
The provider version can be adjusted in ./.projenrc.js.
FAQs
Prebuilt google Provider for Terraform CDK (cdktf)
The npm package @cdktf/provider-google receives a total of 11,348 weekly downloads. As such, @cdktf/provider-google popularity was classified as popular.
We found that @cdktf/provider-google demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 4 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
Security experts warn that recent classification changes obscure the true scope of the NVD backlog as CVE volume hits all-time highs.
Security Fundamentals
Attackers use obfuscation to hide malware in open source packages. Learn how to spot these techniques across npm, PyPI, Maven, and more.
Security News
Join Socket for exclusive networking events, rooftop gatherings, and one-on-one meetings during BSidesSF and RSA 2025 in San Francisco.