2022-01-19 05:17:20 -08:00
|
|
|
/**
|
|
|
|
* Copyright 2022 Google LLC
|
|
|
|
*
|
|
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
* you may not use this file except in compliance with the License.
|
|
|
|
* You may obtain a copy of the License at
|
|
|
|
*
|
|
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
*
|
|
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
* See the License for the specific language governing permissions and
|
|
|
|
* limitations under the License.
|
|
|
|
*/
|
|
|
|
|
|
|
|
# tfdoc:file:description Security stage resources.
|
|
|
|
|
|
|
|
module "branch-security-folder" {
|
|
|
|
source = "../../../modules/folder"
|
|
|
|
parent = "organizations/${var.organization.id}"
|
|
|
|
name = "Security"
|
|
|
|
group_iam = {
|
|
|
|
(local.groups.gcp-security-admins) = [
|
|
|
|
# add any needed roles for resources/services not managed via Terraform,
|
|
|
|
# e.g.
|
|
|
|
# "roles/bigquery.admin",
|
|
|
|
# "roles/cloudasset.owner",
|
|
|
|
# "roles/cloudkms.admin",
|
|
|
|
# "roles/logging.admin",
|
|
|
|
# "roles/secretmanager.admin",
|
|
|
|
# "roles/storage.admin",
|
|
|
|
"roles/viewer"
|
|
|
|
]
|
|
|
|
}
|
|
|
|
iam = {
|
|
|
|
"roles/logging.admin" = [module.branch-security-sa.iam_email]
|
|
|
|
"roles/owner" = [module.branch-security-sa.iam_email]
|
|
|
|
"roles/resourcemanager.folderAdmin" = [module.branch-security-sa.iam_email]
|
|
|
|
"roles/resourcemanager.projectCreator" = [module.branch-security-sa.iam_email]
|
|
|
|
}
|
2022-02-20 02:26:30 -08:00
|
|
|
tag_bindings = {
|
2022-04-13 01:22:33 -07:00
|
|
|
context = try(
|
|
|
|
module.organization.tag_values["${var.tag_names.context}/security"].id, null
|
|
|
|
)
|
2022-02-20 02:26:30 -08:00
|
|
|
}
|
2022-01-19 05:17:20 -08:00
|
|
|
}
|
|
|
|
|
2022-04-11 23:17:27 -07:00
|
|
|
# automation service account and bucket
|
|
|
|
|
2022-01-19 05:17:20 -08:00
|
|
|
module "branch-security-sa" {
|
|
|
|
source = "../../../modules/iam-service-account"
|
2022-04-11 23:17:27 -07:00
|
|
|
project_id = var.automation.project_id
|
2022-02-12 04:29:22 -08:00
|
|
|
name = "prod-resman-sec-0"
|
2022-01-19 05:17:20 -08:00
|
|
|
description = "Terraform resman security service account."
|
2022-02-12 04:29:22 -08:00
|
|
|
prefix = var.prefix
|
2022-04-11 23:17:27 -07:00
|
|
|
iam = {
|
|
|
|
"roles/iam.serviceAccountTokenCreator" = compact([
|
|
|
|
try(module.branch-security-sa-cicd.0.iam_email, null)
|
|
|
|
])
|
|
|
|
}
|
|
|
|
iam_storage_roles = {
|
|
|
|
(var.automation.outputs_bucket) = ["roles/storage.admin"]
|
|
|
|
}
|
2022-01-19 05:17:20 -08:00
|
|
|
}
|
|
|
|
|
|
|
|
module "branch-security-gcs" {
|
|
|
|
source = "../../../modules/gcs"
|
2022-04-11 23:17:27 -07:00
|
|
|
project_id = var.automation.project_id
|
2022-02-12 04:29:22 -08:00
|
|
|
name = "prod-resman-sec-0"
|
|
|
|
prefix = var.prefix
|
2022-01-19 05:17:20 -08:00
|
|
|
versioning = true
|
|
|
|
iam = {
|
|
|
|
"roles/storage.objectAdmin" = [module.branch-security-sa.iam_email]
|
|
|
|
}
|
|
|
|
}
|