magic-modules VS desktop-ansible

Compare magic-modules vs desktop-ansible and see what are their differences.

Our great sponsors
  • WorkOS - The modern identity platform for B2B SaaS
  • InfluxDB - Power Real-Time Data Analytics at Scale
  • SaaSHub - Software Alternatives and Reviews
magic-modules desktop-ansible
5 2
747 23
1.9% -
9.9 0.0
5 days ago about 2 years ago
HTML Jinja
Apache License 2.0 GNU General Public License v3.0 only
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.

magic-modules

Posts with mentions or reviews of magic-modules. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2023-10-25.
  • I think GCP is better than AWS – by Fernando Villalba
    6 projects | news.ycombinator.com | 25 Oct 2023
    Given: https://registry.terraform.io/providers/hashicorp/google/5.3...

    how would any reasonable person know what https://registry.terraform.io/providers/hashicorp/google/5.3... to enable without (a) trying it and squinting at the error message (b) clicking on the <> then realizing it, also, does not mention run.googleapis.com, click on "supported service endpoints" <https://cloud.google.com/run/docs/reference/rest#rest_endpoi...> and only then learning about https://cloud.google.com/run/docs/reference/rest#service:-ru...

    Repeat for https://registry.terraform.io/providers/hashicorp/google/5.3... although in both cases I guess the astute reader may have spotted the run.googleapis.com in the forbidden service labels and cloudidentity.googleapis.com in the example

    Since, to the best of my knowledge those bindings are auto generated <https://github.com/GoogleCloudPlatform/magic-modules#magic-m...>, I would hypothesize it is not insurmountable drop in the seemingly existing declaration of APIs required: https://github.com/GoogleCloudPlatform/magic-modules/blob/7d... https://github.com/GoogleCloudPlatform/magic-modules/blob/7d...

  • Terraform Plugin Framework Development: How to implement nested attributes?
    5 projects | /r/Terraform | 11 Apr 2022
    In the case of the Google Cloud Platform provider, folks at Google built magic modules with the explicit goal of being able to generate schemas and behaviors for a Terraform provider and for other systems with similar needs. Since the vendor was explicitly aiming to support Terraform, this was the most ideal case where the schema could be designed to contain all of the information needed to generate a functional, usable provider.
  • How to contribute/update to a Terraform provider?
    1 project | /r/Terraform | 11 Oct 2021
    I think the "Developing the provider" instructions in this provider's repository are rather stale, because they still talk about GOPATH even though that's been obsolete for several Go versions now. Note also that much of the code in that repository is auto-generated from an upstream repository googleCloudPlatform/magic-modules, and so for some changes it may be better to contribute there once you've tested the modifications more directly inside the provider repository.
  • Terraform 1.0 Release
    33 projects | news.ycombinator.com | 8 Jun 2021
    For GCP, both ansible modules and terraform modules are actually generated from https://github.com/GoogleCloudPlatform/magic-modules, so their "production readiness" are the same.

    I understand that mitchellh himself personally created a bunch of cloud modules for terraform at the beginning, and those were likely of higher quality than whatever created by some internal developers assigned by Google/Microsoft, and might be slightly better than the AWS modules maintained by community.

    Anyway, when it comes to ansible versus terraform, we shall move the discourse to states management instead. With ansible, you don't have to deal with states, but will need to clean up the cloud resources separately. With terraform, you can use the tool to clean up the cloud resources easily, but then you also have the headache of managing states. Plus, whenever you change something, there is always the nagging feeling that it will do a destroy/recreate instead of an in-place update.

  • Pulumi 3.0
    5 projects | news.ycombinator.com | 20 Apr 2021
    The Terraform provider for Google Cloud uses partial autogeneration, here is the repo that does the autogeneration for multiple automation tools:

    https://github.com/GoogleCloudPlatform/magic-modules

desktop-ansible

Posts with mentions or reviews of desktop-ansible. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2021-12-26.

What are some alternatives?

When comparing magic-modules and desktop-ansible you can also consider the following projects:

terraform-ls - Terraform Language Server

kde-sane-conf

tf2pulumi - A tool to convert Terraform projects to Pulumi

kubernetes-cluster-setup-using-terraform-and-k3s-on-digitalocean - Demonstration of how you can use set up your Kubernetes cluster on DigitalOcean using Terraform + k3s + Ansible

terraform-cdk - Define infrastructure resources using programming constructs and provision them using HashiCorp Terraform

ansible-arch-install - Ansible code for installing and configuring Arch Linux

pulumi-provider-boilerplate - Boilerplate showing how to create a native Pulumi provider

ansible-arch-setup - ansible role taking care of the "archlinux pre-install"

pulumi-terraform-bridge - A library allowing providers built with the Terraform Plugin SDK to be bridged into Pulumi.

algo - Set up a personal VPN in the cloud

terraform-lsp - Language Server Protocol for Terraform

DetectionLab - Automate the creation of a lab environment complete with security tooling and logging best practices