cloud-foundation-fabric/blueprints/data-solutions/shielded-folder/kms.tf

103 lines
3.0 KiB
Terraform
Raw Normal View History

2023-01-20 16:08:51 -08:00
/**
2023-02-01 00:30:28 -08:00
* Copyright 2023 Google LLC
2023-01-20 16:08:51 -08:00
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
2023-01-30 14:32:13 -08:00
# tfdoc:file:description Security project, Cloud KMS and Secret Manager resources.
2023-01-20 16:08:51 -08:00
locals {
kms_locations = distinct(flatten([
for k, v in var.kms_keys : v.locations
]))
kms_locations_keys = {
for loc in local.kms_locations : loc => {
for k, v in var.kms_keys : k => v if contains(v.locations, loc)
}
}
kms_log_locations = distinct(flatten([
for k, v in local.kms_log_sink_keys : compact(v.locations)
]))
# Log sink keys
kms_log_sink_keys = {
2023-01-25 03:32:10 -08:00
"storage" = {
2023-01-20 16:08:51 -08:00
labels = {}
2023-01-25 09:22:43 -08:00
locations = [var.log_locations.storage]
2023-01-20 16:08:51 -08:00
rotation_period = "7776000s"
}
2023-01-25 03:32:10 -08:00
"bq" = {
2023-01-20 16:08:51 -08:00
labels = {}
locations = [var.log_locations.bq]
rotation_period = "7776000s"
}
2023-01-25 03:32:10 -08:00
"pubsub" = {
2023-01-20 16:08:51 -08:00
labels = {}
locations = [var.log_locations.pubsub]
rotation_period = "7776000s"
}
}
kms_log_locations_keys = {
for loc in local.kms_log_locations : loc => {
for k, v in local.kms_log_sink_keys : k => v if contains(v.locations, loc)
}
}
}
module "sec-project" {
2023-01-31 15:50:22 -08:00
count = var.enable_features.encryption ? 1 : 0
2023-01-20 16:08:51 -08:00
source = "../../../modules/project"
2023-02-05 13:41:57 -08:00
name = var.project_config.project_ids["sec-core"]
2023-01-20 16:08:51 -08:00
parent = module.folder.id
2023-02-05 13:41:57 -08:00
billing_account = var.project_config.billing_account_id
project_create = var.project_config.billing_account_id != null && var.enable_features.encryption
prefix = var.project_config.billing_account_id == null ? null : var.prefix
2023-01-20 16:08:51 -08:00
group_iam = {
2023-01-31 23:55:33 -08:00
(local.groups.workload-security) = [
"roles/editor"
2023-01-20 16:08:51 -08:00
]
}
services = [
"cloudkms.googleapis.com",
"secretmanager.googleapis.com",
"stackdriver.googleapis.com"
]
}
module "sec-kms" {
2023-01-31 15:50:22 -08:00
for_each = var.enable_features.encryption ? toset(local.kms_locations) : toset([])
2023-01-20 16:08:51 -08:00
source = "../../../modules/kms"
2023-01-25 09:22:43 -08:00
project_id = module.sec-project[0].project_id
2023-01-20 16:08:51 -08:00
keyring = {
location = each.key
name = "${each.key}"
}
# rename to `key_iam` to switch to authoritative bindings
key_iam_additive = {
for k, v in local.kms_locations_keys[each.key] : k => v.iam
}
keys = local.kms_locations_keys[each.key]
}
module "log-kms" {
2023-01-31 15:50:22 -08:00
for_each = var.enable_features.encryption ? toset(local.kms_log_locations) : toset([])
2023-01-20 16:08:51 -08:00
source = "../../../modules/kms"
2023-01-25 09:22:43 -08:00
project_id = module.sec-project[0].project_id
2023-01-20 16:08:51 -08:00
keyring = {
location = each.key
2023-01-25 09:22:43 -08:00
name = "${each.key}"
2023-01-20 16:08:51 -08:00
}
keys = local.kms_log_locations_keys[each.key]
}