cloud-foundation-fabric/examples/data-solutions/data-platform-foundations/03-orchestration.tf

178 lines
6.2 KiB
Terraform
Raw Normal View History

2022-01-17 23:58:14 -08:00
# Copyright 2022 Google LLC
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# https://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
2022-02-01 00:30:29 -08:00
# tfdoc:file:description Orchestration project and VPC.
2022-01-31 21:41:33 -08:00
2022-01-17 23:58:14 -08:00
locals {
2022-01-31 09:58:55 -08:00
group_iam_orc = {
"${local.groups.data-engineers}" = [
"roles/bigquery.dataEditor",
"roles/bigquery.jobUser",
"roles/cloudbuild.builds.editor",
"roles/composer.admin",
"roles/composer.environmentAndStorageObjectAdmin",
"roles/iap.httpsResourceAccessor",
"roles/iam.serviceAccountUser",
"roles/compute.networkUser",
"roles/storage.objectAdmin",
"roles/storage.admin",
"roles/compute.networkUser"
]
}
2022-01-17 23:58:14 -08:00
iam_orc = {
"roles/bigquery.dataEditor" = [
module.lod-sa-df-0.iam_email,
module.trf-sa-df-0.iam_email,
module.orc-sa-cmp-0.iam_email,
]
"roles/bigquery.jobUser" = [
module.lod-sa-df-0.iam_email,
module.trf-sa-df-0.iam_email,
module.orc-sa-cmp-0.iam_email,
]
"roles/composer.worker" = [
module.orc-sa-cmp-0.iam_email
]
"roles/compute.networkUser" = [
module.orc-sa-cmp-0.iam_email,
module.lod-sa-df-0.iam_email,
module.trf-sa-df-0.iam_email,
"serviceAccount:${module.orc-prj.service_accounts.robots.container-engine}",
"serviceAccount:${module.lod-prj.service_accounts.robots.dataflow}",
"serviceAccount:${module.trf-prj.service_accounts.robots.dataflow}",
"serviceAccount:${module.orc-prj.service_accounts.cloud_services}"
]
"roles/iam.serviceAccountUser" = [
module.orc-sa-cmp-0.iam_email,
]
2022-01-17 23:58:14 -08:00
"roles/storage.objectAdmin" = [
module.lod-sa-df-0.iam_email,
module.orc-sa-cmp-0.iam_email,
"serviceAccount:${module.orc-prj.service_accounts.robots.composer}",
2022-01-17 23:58:14 -08:00
]
"roles/storage.admin" = [
module.lod-sa-df-0.iam_email,
module.trf-sa-df-0.iam_email
]
}
2022-01-31 09:58:55 -08:00
2022-01-17 23:58:14 -08:00
prefix_orc = "${var.prefix}-orc"
}
module "orc-prj" {
source = "../../../modules/project"
name = var.project_id["orchestration"]
parent = try(var.project_create.parent, null)
billing_account = try(var.project_create.billing_account_id, null)
project_create = var.project_create != null
prefix = var.project_create == null ? null : var.prefix
# additive IAM bindings avoid disrupting bindings in existing project
2022-02-03 00:37:50 -08:00
iam = var.project_create != null ? local.iam_orc : {}
iam_additive = var.project_create == null ? local.iam_orc : {}
group_iam = local.group_iam_orc
oslogin = false
2022-02-05 00:04:18 -08:00
policy_boolean = var.composer_config.project_policy_boolean
2022-01-17 23:58:14 -08:00
services = concat(var.project_services, [
"artifactregistry.googleapis.com",
"bigquery.googleapis.com",
"bigqueryreservation.googleapis.com",
"bigquerystorage.googleapis.com",
"cloudkms.googleapis.com",
"composer.googleapis.com",
"container.googleapis.com",
"dataflow.googleapis.com",
"pubsub.googleapis.com",
"servicenetworking.googleapis.com",
"storage.googleapis.com",
"storage-component.googleapis.com"
])
2022-01-19 12:33:24 -08:00
service_encryption_key_ids = {
composer = [try(local.service_encryption_keys.composer, null)]
storage = [try(local.service_encryption_keys.storage, null)]
2022-01-19 12:33:24 -08:00
}
2022-02-03 05:25:46 -08:00
shared_vpc_service_config = local._shared_vpc_service_config
2022-01-17 23:58:14 -08:00
}
2022-02-01 00:30:29 -08:00
module "orc-vpc" {
count = var.network_config.network != null ? 0 : 1
source = "../../../modules/net-vpc"
project_id = module.orc-prj.project_id
name = "${local.prefix_orc}-vpc"
subnets = [
{
2022-02-05 00:04:18 -08:00
ip_cidr_range = var.network_config.vpc_subnet.orchestration.range
2022-02-01 00:30:29 -08:00
name = "${local.prefix_orc}-subnet"
region = var.location_config.region
secondary_ip_range = {}
secondary_ip_range = {
2022-02-05 00:04:18 -08:00
#TODO make keys variables
pods = var.network_config.vpc_subnet.orchestration.secondary_range.pods
services = var.network_config.vpc_subnet.orchestration.secondary_range.services
2022-02-01 00:30:29 -08:00
}
}
]
}
2022-02-05 00:04:18 -08:00
#TODO Check with Simo/Ludo
resource "google_project_iam_binding" "composer_shared_vpc_agent" {
count = var.network_config.network != null ? 1 : 0
project = var.network_config.host_project
role = "roles/composer.sharedVpcAgent"
members = [
"serviceAccount:${module.orc-prj.service_accounts.robots.composer}"
]
}
resource "google_project_iam_binding" "gke_host_service_agent_user" {
count = var.network_config.network != null ? 1 : 0
project = var.network_config.host_project
role = "roles/container.hostServiceAgentUser"
members = [
"serviceAccount:${module.orc-prj.service_accounts.robots.container-engine}"
]
}
resource "google_project_iam_binding" "composer_network_user_agent" {
count = var.network_config.network != null ? 1 : 0
project = var.network_config.host_project
role = "roles/compute.networkUser"
members = [
module.orc-sa-cmp-0.iam_email,
module.lod-sa-df-0.iam_email,
module.trf-sa-df-0.iam_email,
"serviceAccount:${module.lod-prj.service_accounts.robots.dataflow}",
"serviceAccount:${module.orc-prj.service_accounts.cloud_services}",
"serviceAccount:${module.orc-prj.service_accounts.robots.container-engine}",
"serviceAccount:${module.trf-prj.service_accounts.robots.dataflow}",
]
}
2022-02-01 00:30:29 -08:00
module "orc-vpc-firewall" {
count = var.network_config.network != null ? 0 : 1
source = "../../../modules/net-vpc-firewall"
project_id = module.orc-prj.project_id
2022-02-03 05:25:46 -08:00
network = local._networks.orchestration.network_name
admin_ranges = [local._networks.orchestration.subnet_range]
2022-02-01 00:30:29 -08:00
}
module "orc-nat" {
2022-02-03 08:37:42 -08:00
count = var.network_config.enable_cloud_nat ? 1 : 0
2022-02-01 00:30:29 -08:00
source = "../../../modules/net-cloudnat"
project_id = module.orc-prj.project_id
region = var.location_config.region
name = "${local.prefix_orc}-default"
2022-02-03 05:25:46 -08:00
router_network = local._networks.orchestration.network_name
2022-02-01 00:30:29 -08:00
}