terraform-station-module — community terraform-station-module, station, community, ide skills, Claude Code, Cursor, Windsurf

v1.0.0
GitHub

About this Skill

Essential for Infrastructure-as-Code Agents automating secure Azure environment deployments. Use Station to create secure and automated environments for your workloads in Azure

blinqas blinqas
[9]
[1]
Updated: 2/27/2026

Agent Capability Analysis

The terraform-station-module skill by blinqas is an open-source community AI agent skill for Claude Code and other IDE workflows, helping agents execute tasks with better context, repeatability, and domain-specific guidance.

Ideal Agent Persona

Essential for Infrastructure-as-Code Agents automating secure Azure environment deployments.

Core Value

Enables direct modification of Terraform module logic for Station implementations, including root module files (`*.tf`), child modules (`application/`, `group/`, `user_assigned_identity/`), and interface definitions (`variables.tf`). Provides specialized capabilities for Azure workload environment automation.

Capabilities Granted for terraform-station-module

Adding new behavior to root module Terraform configurations
Updating child module logic for application, group, or user-assigned identity resources
Modifying module interface definitions in variables.tf

! Prerequisites & Limits

  • Exclusively for module code changes (not Terraform test authoring/execution)
  • Requires existing Station module implementation knowledge
  • Azure-specific environment automation focus
Labs Demo

Browser Sandbox Environment

⚡️ Ready to unleash?

Experience this Agent in a zero-setup browser environment powered by WebContainers. No installation required.

Boot Container Sandbox

terraform-station-module

Install terraform-station-module, an AI agent skill for AI agent workflows and automation. Works with Claude Code, Cursor, and Windsurf with one-command...

SKILL.md
Readonly

Terraform Station Module Skill

Use this skill when working on Station module implementation logic.

This skill is for module code changes. For Terraform test authoring/execution in tests/*.tftest.hcl, use terraform-station-test.

What this skill covers

  • Adding/changing behavior in root module files (*.tf at repo root)
  • Updating child modules:
    • application/
    • group/
    • user_assigned_identity/
    • hashicorp/tfe/
  • Updating module interfaces:
    • variables.tf
    • variables.applications.tf
    • variables.identity.tf
    • outputs.tf
  • Keeping Station compatible as a called module (consumer-facing contract)
  • Updating documentation where interface/behavior changes

Station module invariants

  1. Treat Station as a module consumed by parent configurations.
  2. Preserve backward compatibility unless the user explicitly requests a breaking change.
  3. Keep variable schemas, validation rules, and defaults aligned with actual implementation.
  4. Keep outputs aligned with resources and child module wiring.
  5. Prefer extending existing patterns over introducing new structure.
  6. Keep changes focused and minimal.

Required discovery before changing code

Always inspect these first for impact analysis:

  • variables.tf
  • variables.applications.tf
  • variables.identity.tf
  • outputs.tf
  • relevant feature files (for example applications.tf, groups.tf, connectivity.tf, tfe.tf)
  • relevant child module variables.tf and outputs.tf

Then map your change to:

  • inputs consumed
  • resources/data affected
  • outputs exposed
  • tests likely impacted

Implementation workflow

  1. Locate feature entry points in root module files.
  2. Identify whether behavior belongs in root module or child module.
  3. Update variable definitions/validations if interface changed.
  4. Update implementation (resource, data, locals, module calls).
  5. Update outputs if exposed behavior changed.
  6. Update docs/examples if user-visible behavior changed.
  7. Run formatting.
  8. Run relevant tests (or hand off to terraform-station-test flow).

Validation and formatting rules

  • Run:
bash
1terraform fmt -recursive
  • Do not rely on terraform validate for this repository due provider alias/module limitations.

  • Prefer targeted Terraform tests for affected feature areas:

    • tests/application.tftest.hcl
    • tests/group.tftest.hcl
    • tests/tfe.tftest.hcl
    • tests/connectivity.tftest.hcl
    • tests/identity.tftest.hcl
    • tests/user_assigned_identities.tftest.hcl

Compatibility checklist for module changes

Before finishing a change, verify:

  • Input object shape matches actual references in code
  • Optional fields are guarded with try(...), lookup(...), coalesce(...), or conditional logic where needed
  • Validation error messages still describe the true constraint
  • Resource naming/location/tag defaults still follow Station conventions
  • Identity and role-assignment side effects remain correct for enabled feature blocks
  • Outputs still reference valid resource/module attributes

Common Station-specific pitfalls

  • Adding new required fields to existing input objects without defaults
  • Changing map keys that tests/consumers depend on
  • Forgetting to propagate variable changes into child modules
  • Breaking app/group/identity auto-assignment behavior
  • Updating logic but not adjusting outputs/docs

CI-aware change planning

Station uses selective test execution in CI.

When changing module files, anticipate which tests are triggered using:

  • .github/scripts/README.md
  • .github/workflows/terraform.yaml

If core/shared files are touched, expect full-suite runs.

Use with testing skill

After module edits:

  1. format with terraform fmt -recursive
  2. invoke terraform-station-test for test updates/execution
  3. ensure feature tests cover minimum + maximum scenarios when behavior changed

Done criteria for module tasks

  • Code change implemented at correct module boundary
  • Variable/validation/output updates included where needed
  • Formatting completed
  • Relevant tests run (or explicitly delegated)
  • No unrelated refactors bundled into the change

FAQ & Installation Steps

These questions and steps mirror the structured data on this page for better search understanding.

? Frequently Asked Questions

What is terraform-station-module?

Essential for Infrastructure-as-Code Agents automating secure Azure environment deployments. Use Station to create secure and automated environments for your workloads in Azure

How do I install terraform-station-module?

Run the command: npx killer-skills add blinqas/station/terraform-station-module. It works with Cursor, Windsurf, VS Code, Claude Code, and 19+ other IDEs.

What are the use cases for terraform-station-module?

Key use cases include: Adding new behavior to root module Terraform configurations, Updating child module logic for application, group, or user-assigned identity resources, Modifying module interface definitions in variables.tf.

Which IDEs are compatible with terraform-station-module?

This skill is compatible with Cursor, Windsurf, VS Code, Trae, Claude Code, OpenClaw, Aider, Codex, OpenCode, Goose, Cline, Roo Code, Kiro, Augment Code, Continue, GitHub Copilot, Sourcegraph Cody, and Amazon Q Developer. Use the Killer-Skills CLI for universal one-command installation.

Are there any limitations for terraform-station-module?

Exclusively for module code changes (not Terraform test authoring/execution). Requires existing Station module implementation knowledge. Azure-specific environment automation focus.

How To Install

  1. 1. Open your terminal

    Open the terminal or command line in your project directory.

  2. 2. Run the install command

    Run: npx killer-skills add blinqas/station/terraform-station-module. The CLI will automatically detect your IDE or AI agent and configure the skill.

  3. 3. Start using the skill

    The skill is now active. Your AI agent can use terraform-station-module immediately in the current project.

Related Skills

Looking for an alternative to terraform-station-module or another community skill for your workflow? Explore these related open-source skills.

View All

widget-generator

Logo of f
f

f.k.a. Awesome ChatGPT Prompts. Share, discover, and collect prompts from the community. Free and open source — self-host for your organization with complete privacy.

149.6k
0
AI

flags

Logo of vercel
vercel

flags is a Next.js feature management skill that enables developers to efficiently add or modify framework feature flags, streamlining React application development.

138.4k
0
Browser

zustand

Logo of lobehub
lobehub

The ultimate space for work and life — to find, build, and collaborate with agent teammates that grow with you. We are taking agent harness to the next level — enabling multi-agent collaboration, effortless agent team design, and introducing agents as the unit of work interaction.

72.8k
0
AI

data-fetching

Logo of lobehub
lobehub

The ultimate space for work and life — to find, build, and collaborate with agent teammates that grow with you. We are taking agent harness to the next level — enabling multi-agent collaboration, effortless agent team design, and introducing agents as the unit of work interaction.

72.8k
0
AI