-
Notifications
You must be signed in to change notification settings - Fork 930
/
Copy pathmain.tf
125 lines (112 loc) · 4.58 KB
/
main.tf
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
/**
* Copyright 2018 Google LLC
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
locals {
cloudsvc_service_account = "${google_project.project.number}@cloudservices.gserviceaccount.com"
gce_service_account = "${google_project.project.number}-compute@developer.gserviceaccount.com"
gcr_service_account = "service-${google_project.project.number}@containerregistry.iam.gserviceaccount.com"
gke_service_account = "service-${google_project.project.number}@container-engine-robot.iam.gserviceaccount.com"
iam_nonauth_pairs = flatten([
for role in var.iam_nonauth_roles : [
for member in lookup(var.iam_nonauth_members, role, []) :
{ role = role, member = member }
]
])
iam_nonauth = {
for pair in local.iam_nonauth_pairs :
"${pair.role}-${pair.member}" => pair
}
parent_type = split("/", var.parent)[0]
parent_id = split("/", var.parent)[1]
}
resource "google_project" "project" {
org_id = local.parent_type == "organizations" ? local.parent_id : ""
folder_id = local.parent_type == "folders" ? local.parent_id : ""
project_id = "${var.prefix}-${var.name}"
name = "${var.prefix}-${var.name}"
billing_account = var.billing_account
auto_create_network = var.auto_create_network
labels = var.labels
}
resource "google_project_iam_custom_role" "roles" {
for_each = var.custom_roles
project = google_project.project.project_id
role_id = each.key
title = "Custom role ${each.key}"
description = "Terraform-managed"
permissions = each.value
}
resource "google_compute_project_metadata_item" "oslogin_meta" {
count = var.oslogin ? 1 : 0
project = google_project.project.project_id
key = "enable-oslogin"
value = "TRUE"
# depend on services or it will fail on destroy
depends_on = [google_project_service.project_services]
}
resource "google_resource_manager_lien" "lien" {
count = var.lien_reason != "" ? 1 : 0
parent = "projects/${google_project.project.number}"
restrictions = ["resourcemanager.projects.delete"]
origin = "created-by-terraform"
reason = var.lien_reason
}
resource "google_project_service" "project_services" {
for_each = toset(var.services)
project = google_project.project.project_id
service = each.value
disable_on_destroy = true
disable_dependent_services = true
}
# IAM notes:
# - external users need to have accepted the invitation email to join
# - oslogin roles also require role to list instances
# - non-authoritative roles might fail due to dynamic values
resource "google_project_iam_binding" "authoritative" {
for_each = toset(var.iam_roles)
project = google_project.project.project_id
role = each.value
members = lookup(var.iam_members, each.value, [])
}
resource "google_project_iam_member" "non_authoritative" {
for_each = length(var.iam_nonauth_roles) > 0 ? local.iam_nonauth : {}
project = google_project.project.project_id
role = each.value.role
member = each.value.member
}
resource "google_project_iam_member" "oslogin_iam_serviceaccountuser" {
for_each = var.oslogin ? toset(distinct(concat(var.oslogin_admins, var.oslogin_users))) : toset([])
project = google_project.project.project_id
role = "roles/iam.serviceAccountUser"
member = each.value
}
resource "google_project_iam_member" "oslogin_compute_viewer" {
for_each = var.oslogin ? toset(distinct(concat(var.oslogin_admins, var.oslogin_users))) : toset([])
project = google_project.project.project_id
role = "roles/compute.viewer"
member = each.value
}
resource "google_project_iam_member" "oslogin_admins" {
for_each = var.oslogin ? toset(var.oslogin_admins) : toset([])
project = google_project.project.project_id
role = "roles/compute.osAdminLogin"
member = each.value
}
resource "google_project_iam_member" "oslogin_users" {
for_each = var.oslogin ? toset(var.oslogin_users) : toset([])
project = google_project.project.project_id
role = "roles/compute.osLogin"
member = each.value
}