A @hashicorp Terraform provider for managing GSuite resources.
Clone or download
DeviaVir Group member: update role (#33)
* Release v0.1.9-dev171020181110

Signed-off-by: Chase Sillevis <chase@sillevis.net>

* group member: update role

* update travis

* Release v0.1.9-dev171020181300

Signed-off-by: Chase Sillevis <chase@sillevis.net>

* add sign

* switch to version 0.1.9

* restore arch

* Release v0.1.9

Signed-off-by: Chase Sillevis <chase@sillevis.net>
Latest commit 1850abf Oct 17, 2018


Terraform GSuite Provider

This is a terraform provider for managing GSuite (Admin SDK) resources on Google


There are two possible authentication mechanisms for using this provider. Using a service account, or a personal admin account. The latter requires user interaction, whereas a service account could be used in an automated workflow.

See the necessary oauth scopes both for service accounts and users below:

You could also provide the minimal set of scopes using the oauth_scopes variable in the provider configuration.

provider "gsuite" {
  oauth_scopes = [

Using a service account

Service accounts are great for automated workflows.

Only users with access to the Admin APIs can access the Admin SDK Directory API, therefore the service account needs to impersonate one of those users to access the Admin SDK Directory API.

Follow the instruction at https://developers.google.com/admin-sdk/directory/v1/guides/delegation.

Add credentials and impersonated_user_email when initializing the provider.

provider "gsuite" {
  credentials = "/full/path/service-account.json"
  impersonated_user_email = "admin@xxx.com"

Credentials can also be provided via the following environment variables:


Using a personal administrator account

In order to use the Admin SDK with a project, we will first need to create credentials for that project, you can do so here:


Please make sure to create an OAuth 2.0 client, and download the file to your local directory.

You can now use that credential to authenticate:

$ gcloud auth application-default login \
  --client-id-file=client_id.json \
  --scopes \

Now that you have a credential that is allowed to the Admin SDK, you can use the GSuite provider.


  1. Download the latest compiled binary from GitHub releases.

  2. Unzip/untar the archive.

  3. Move it into $HOME/.terraform.d/plugins:

    $ mkdir -p $HOME/.terraform.d/plugins
    $ mv terraform-provider-gsuite $HOME/.terraform.d/plugins/terraform-provider-gsuite
  4. Create your Terraform configurations as normal, and run terraform init:

    $ terraform init

    This will find the plugin locally.


  1. cd into $HOME/.terraform.d/plugins/terraform-provider-gsuite

  2. Run dep ensure to fetch the go vendor files

  3. Make your changes

  4. Run make dev and in your terraform directory, remove the current .terraform and re-run terraform init

  5. Next time you run terraform plan it'll use your updated version

Some useful resources:


  • Asking too many permissions right now, but rather start out with too much and tone down later on
  • Quite limited, as it is a huge API, I have only added the parts I plan on using
    • Open for PR's to extend functionality
  • Documentation is still to be written, you can refer to the examples directory for now