2022-01-19 05:17:20 -08:00
|
|
|
/**
|
|
|
|
* Copyright 2022 Google LLC
|
|
|
|
*
|
|
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
* you may not use this file except in compliance with the License.
|
|
|
|
* You may obtain a copy of the License at
|
|
|
|
*
|
|
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
*
|
|
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
* See the License for the specific language governing permissions and
|
|
|
|
* limitations under the License.
|
|
|
|
*/
|
|
|
|
|
2022-04-11 23:17:27 -07:00
|
|
|
# tfdoc:file:description Team stage resources.
|
2022-01-19 05:17:20 -08:00
|
|
|
|
|
|
|
module "branch-teams-folder" {
|
|
|
|
source = "../../../modules/folder"
|
|
|
|
parent = "organizations/${var.organization.id}"
|
|
|
|
name = "Teams"
|
2022-02-20 02:26:30 -08:00
|
|
|
tag_bindings = {
|
2022-04-11 22:35:31 -07:00
|
|
|
context = try(module.organization.tag_values["context/teams"].id, null)
|
2022-02-20 02:26:30 -08:00
|
|
|
}
|
2022-01-19 05:17:20 -08:00
|
|
|
}
|
|
|
|
|
|
|
|
module "branch-teams-prod-sa" {
|
|
|
|
source = "../../../modules/iam-service-account"
|
2022-04-11 23:17:27 -07:00
|
|
|
project_id = var.automation.project_id
|
2022-02-12 04:29:22 -08:00
|
|
|
name = "prod-resman-teams-0"
|
2022-01-19 05:17:20 -08:00
|
|
|
description = "Terraform resman production service account."
|
2022-02-12 04:29:22 -08:00
|
|
|
prefix = var.prefix
|
2022-01-19 05:17:20 -08:00
|
|
|
}
|
|
|
|
|
|
|
|
# Team-level folders, service accounts and buckets for each individual team
|
|
|
|
|
|
|
|
module "branch-teams-team-folder" {
|
|
|
|
source = "../../../modules/folder"
|
|
|
|
for_each = coalesce(var.team_folders, {})
|
|
|
|
parent = module.branch-teams-folder.id
|
|
|
|
name = each.value.descriptive_name
|
|
|
|
group_iam = each.value.group_iam == null ? {} : each.value.group_iam
|
|
|
|
}
|
|
|
|
|
|
|
|
module "branch-teams-team-sa" {
|
|
|
|
source = "../../../modules/iam-service-account"
|
|
|
|
for_each = coalesce(var.team_folders, {})
|
2022-04-11 23:17:27 -07:00
|
|
|
project_id = var.automation.project_id
|
2022-02-12 04:29:22 -08:00
|
|
|
name = "prod-teams-${each.key}-0"
|
2022-01-19 05:17:20 -08:00
|
|
|
description = "Terraform team ${each.key} service account."
|
2022-02-12 04:29:22 -08:00
|
|
|
prefix = var.prefix
|
2022-01-19 05:17:20 -08:00
|
|
|
iam = {
|
|
|
|
"roles/iam.serviceAccountTokenCreator" = (
|
|
|
|
each.value.impersonation_groups == null
|
|
|
|
? []
|
|
|
|
: [for g in each.value.impersonation_groups : "group:${g}"]
|
|
|
|
)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
module "branch-teams-team-gcs" {
|
|
|
|
source = "../../../modules/gcs"
|
|
|
|
for_each = coalesce(var.team_folders, {})
|
2022-04-11 23:17:27 -07:00
|
|
|
project_id = var.automation.project_id
|
2022-02-12 04:29:22 -08:00
|
|
|
name = "prod-teams-${each.key}-0"
|
|
|
|
prefix = var.prefix
|
2022-01-19 05:17:20 -08:00
|
|
|
versioning = true
|
|
|
|
iam = {
|
|
|
|
"roles/storage.objectAdmin" = [module.branch-teams-team-sa[each.key].iam_email]
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-04-11 23:17:27 -07:00
|
|
|
# project factory per-team environment folders
|
2022-01-19 05:17:20 -08:00
|
|
|
|
|
|
|
module "branch-teams-team-dev-folder" {
|
|
|
|
source = "../../../modules/folder"
|
|
|
|
for_each = coalesce(var.team_folders, {})
|
|
|
|
parent = module.branch-teams-team-folder[each.key].id
|
|
|
|
# naming: environment descriptive name
|
2022-02-15 03:22:08 -08:00
|
|
|
name = "Development"
|
2022-01-19 05:17:20 -08:00
|
|
|
# environment-wide human permissions on the whole teams environment
|
|
|
|
group_iam = {}
|
|
|
|
iam = {
|
2022-02-25 03:19:10 -08:00
|
|
|
(local.custom_roles.service_project_network_admin) = [module.branch-teams-dev-pf-sa.iam_email]
|
2022-01-19 05:17:20 -08:00
|
|
|
# remove owner here and at project level if SA does not manage project resources
|
2022-02-25 03:19:10 -08:00
|
|
|
"roles/owner" = [module.branch-teams-dev-pf-sa.iam_email]
|
|
|
|
"roles/logging.admin" = [module.branch-teams-dev-pf-sa.iam_email]
|
|
|
|
"roles/resourcemanager.folderAdmin" = [module.branch-teams-dev-pf-sa.iam_email]
|
|
|
|
"roles/resourcemanager.projectCreator" = [module.branch-teams-dev-pf-sa.iam_email]
|
2022-01-19 05:17:20 -08:00
|
|
|
}
|
2022-02-20 02:26:30 -08:00
|
|
|
tag_bindings = {
|
2022-04-11 22:35:31 -07:00
|
|
|
environment = try(module.organization.tag_values["environment/development"].id, null)
|
2022-02-20 02:26:30 -08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-01-19 05:17:20 -08:00
|
|
|
module "branch-teams-team-prod-folder" {
|
|
|
|
source = "../../../modules/folder"
|
|
|
|
for_each = coalesce(var.team_folders, {})
|
|
|
|
parent = module.branch-teams-team-folder[each.key].id
|
|
|
|
# naming: environment descriptive name
|
2022-02-15 03:22:08 -08:00
|
|
|
name = "Production"
|
2022-01-19 05:17:20 -08:00
|
|
|
# environment-wide human permissions on the whole teams environment
|
|
|
|
group_iam = {}
|
|
|
|
iam = {
|
2022-02-25 03:19:10 -08:00
|
|
|
(local.custom_roles.service_project_network_admin) = [module.branch-teams-prod-pf-sa.iam_email]
|
2022-01-19 05:17:20 -08:00
|
|
|
# remove owner here and at project level if SA does not manage project resources
|
2022-02-25 03:19:10 -08:00
|
|
|
"roles/owner" = [module.branch-teams-prod-pf-sa.iam_email]
|
|
|
|
"roles/logging.admin" = [module.branch-teams-prod-pf-sa.iam_email]
|
|
|
|
"roles/resourcemanager.folderAdmin" = [module.branch-teams-prod-pf-sa.iam_email]
|
|
|
|
"roles/resourcemanager.projectCreator" = [module.branch-teams-prod-pf-sa.iam_email]
|
2022-01-19 05:17:20 -08:00
|
|
|
}
|
2022-02-20 02:26:30 -08:00
|
|
|
tag_bindings = {
|
2022-04-11 22:35:31 -07:00
|
|
|
environment = try(module.organization.tag_values["environment/production"].id, null)
|
2022-02-20 02:26:30 -08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-04-11 23:17:27 -07:00
|
|
|
# project factory per-team environment service accounts
|
|
|
|
|
|
|
|
module "branch-teams-dev-pf-sa" {
|
|
|
|
source = "../../../modules/iam-service-account"
|
|
|
|
project_id = var.automation.project_id
|
|
|
|
name = "dev-resman-pf-0"
|
|
|
|
# naming: environment in description
|
|
|
|
description = "Terraform project factory development service account."
|
|
|
|
prefix = var.prefix
|
|
|
|
iam = {
|
|
|
|
"roles/iam.serviceAccountTokenCreator" = compact([
|
|
|
|
try(module.branch-pf-dev-sa-cicd.0.iam_email, null)
|
|
|
|
])
|
|
|
|
}
|
|
|
|
iam_storage_roles = {
|
|
|
|
(var.automation.outputs_bucket) = ["roles/storage.admin"]
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-02-20 02:26:30 -08:00
|
|
|
module "branch-teams-prod-pf-sa" {
|
2022-01-19 05:17:20 -08:00
|
|
|
source = "../../../modules/iam-service-account"
|
2022-04-11 23:17:27 -07:00
|
|
|
project_id = var.automation.project_id
|
2022-02-12 04:29:22 -08:00
|
|
|
name = "prod-resman-pf-0"
|
2022-01-19 05:17:20 -08:00
|
|
|
# naming: environment in description
|
|
|
|
description = "Terraform project factory production service account."
|
2022-02-12 04:29:22 -08:00
|
|
|
prefix = var.prefix
|
2022-04-11 23:17:27 -07:00
|
|
|
iam = {
|
|
|
|
"roles/iam.serviceAccountTokenCreator" = compact([
|
|
|
|
try(module.branch-pf-prod-sa-cicd.0.iam_email, null)
|
|
|
|
])
|
|
|
|
}
|
|
|
|
iam_storage_roles = {
|
|
|
|
(var.automation.outputs_bucket) = ["roles/storage.admin"]
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
# project factory per-team environment GCS buckets
|
|
|
|
|
|
|
|
module "branch-teams-dev-pf-gcs" {
|
|
|
|
source = "../../../modules/gcs"
|
|
|
|
project_id = var.automation.project_id
|
|
|
|
name = "dev-resman-pf-0"
|
|
|
|
prefix = var.prefix
|
|
|
|
versioning = true
|
|
|
|
iam = {
|
|
|
|
"roles/storage.objectAdmin" = [module.branch-teams-dev-pf-sa.iam_email]
|
|
|
|
}
|
2022-01-19 05:17:20 -08:00
|
|
|
}
|
|
|
|
|
2022-02-20 02:26:30 -08:00
|
|
|
module "branch-teams-prod-pf-gcs" {
|
2022-01-19 05:17:20 -08:00
|
|
|
source = "../../../modules/gcs"
|
2022-04-11 23:17:27 -07:00
|
|
|
project_id = var.automation.project_id
|
2022-02-12 04:29:22 -08:00
|
|
|
name = "prod-resman-pf-0"
|
|
|
|
prefix = var.prefix
|
2022-01-19 05:17:20 -08:00
|
|
|
versioning = true
|
|
|
|
iam = {
|
2022-02-20 02:26:30 -08:00
|
|
|
"roles/storage.objectAdmin" = [module.branch-teams-prod-pf-sa.iam_email]
|
2022-01-19 05:17:20 -08:00
|
|
|
}
|
|
|
|
}
|
2022-04-11 23:17:27 -07:00
|
|
|
|
|
|
|
# project factory per-team environment CI/CD service accounts
|
|
|
|
|
|
|
|
module "branch-pf-dev-sa-cicd" {
|
|
|
|
source = "../../../modules/iam-service-account"
|
|
|
|
for_each = (
|
|
|
|
lookup(local.cicd_repositories, "pf_dev", null) == null
|
|
|
|
? {}
|
|
|
|
: { 0 = local.cicd_repositories.pf_dev }
|
|
|
|
)
|
|
|
|
project_id = var.automation.project_id
|
|
|
|
name = "dev-resman-pf-1"
|
|
|
|
description = "Terraform CI/CD project factory development service account."
|
|
|
|
prefix = var.prefix
|
|
|
|
iam = {
|
|
|
|
"roles/iam.workloadIdentityUser" = [
|
|
|
|
each.value.branch == null
|
|
|
|
? format(
|
|
|
|
local.identity_providers[each.value.identity_provider].principalset_tpl,
|
|
|
|
each.value.name
|
|
|
|
)
|
|
|
|
: format(
|
|
|
|
local.identity_providers[each.value.identity_provider].principal_tpl,
|
|
|
|
each.value.name,
|
|
|
|
each.value.branch
|
|
|
|
)
|
|
|
|
]
|
|
|
|
}
|
|
|
|
iam_storage_roles = {
|
|
|
|
(var.automation.outputs_bucket) = ["roles/storage.objectViewer"]
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
module "branch-pf-prod-sa-cicd" {
|
|
|
|
source = "../../../modules/iam-service-account"
|
|
|
|
for_each = (
|
|
|
|
lookup(local.cicd_repositories, "pf_prod", null) == null
|
|
|
|
? {}
|
|
|
|
: { 0 = local.cicd_repositories.pf_prod }
|
|
|
|
)
|
|
|
|
project_id = var.automation.project_id
|
|
|
|
name = "prod-resman-pf-1"
|
|
|
|
description = "Terraform CI/CD project factory production service account."
|
|
|
|
prefix = var.prefix
|
|
|
|
iam = {
|
|
|
|
"roles/iam.workloadIdentityUser" = [
|
|
|
|
each.value.branch == null
|
|
|
|
? format(
|
|
|
|
local.identity_providers[each.value.identity_provider].principalset_tpl,
|
|
|
|
var.automation.federated_identity_pool,
|
|
|
|
each.value.name
|
|
|
|
)
|
|
|
|
: format(
|
|
|
|
local.identity_providers[each.value.identity_provider].principal_tpl,
|
|
|
|
var.automation.federated_identity_pool,
|
|
|
|
each.value.name,
|
|
|
|
each.value.branch
|
|
|
|
)
|
|
|
|
]
|
|
|
|
}
|
|
|
|
iam_storage_roles = {
|
|
|
|
(var.automation.outputs_bucket) = ["roles/storage.objectViewer"]
|
|
|
|
}
|
|
|
|
}
|