2022-01-22 02:34:18 -08:00
|
|
|
/**
|
|
|
|
* Copyright 2022 Google LLC
|
|
|
|
*
|
|
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
* you may not use this file except in compliance with the License.
|
|
|
|
* You may obtain a copy of the License at
|
|
|
|
*
|
|
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
*
|
|
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
* See the License for the specific language governing permissions and
|
|
|
|
* limitations under the License.
|
|
|
|
*/
|
|
|
|
|
2022-01-29 10:35:33 -08:00
|
|
|
# tfdoc:file:description Folder-level organization policies.
|
2022-01-22 02:34:18 -08:00
|
|
|
|
2022-10-28 03:55:16 -07:00
|
|
|
locals {
|
2022-11-17 08:51:15 -08:00
|
|
|
_factory_data_raw = merge([
|
|
|
|
for f in try(fileset(var.org_policies_data_path, "*.yaml"), []) :
|
|
|
|
yamldecode(file("${var.org_policies_data_path}/${f}"))
|
|
|
|
]...)
|
2022-11-03 03:41:53 -07:00
|
|
|
|
|
|
|
# simulate applying defaults to data coming from yaml files
|
|
|
|
_factory_data = {
|
|
|
|
for k, v in local._factory_data_raw :
|
|
|
|
k => {
|
|
|
|
inherit_from_parent = try(v.inherit_from_parent, null)
|
|
|
|
reset = try(v.reset, null)
|
|
|
|
allow = can(v.allow) ? {
|
|
|
|
all = try(v.allow.all, null)
|
|
|
|
values = try(v.allow.values, null)
|
|
|
|
} : null
|
|
|
|
deny = can(v.deny) ? {
|
|
|
|
all = try(v.deny.all, null)
|
|
|
|
values = try(v.deny.values, null)
|
|
|
|
} : null
|
|
|
|
enforce = try(v.enforce, true)
|
|
|
|
|
|
|
|
rules = [
|
|
|
|
for r in try(v.rules, []) : {
|
|
|
|
allow = can(r.allow) ? {
|
|
|
|
all = try(r.allow.all, null)
|
|
|
|
values = try(r.allow.values, null)
|
|
|
|
} : null
|
|
|
|
deny = can(r.deny) ? {
|
|
|
|
all = try(r.deny.all, null)
|
|
|
|
values = try(r.deny.values, null)
|
|
|
|
} : null
|
|
|
|
enforce = try(r.enforce, true)
|
|
|
|
condition = {
|
|
|
|
description = try(r.condition.description, null)
|
|
|
|
expression = try(r.condition.expression, null)
|
|
|
|
location = try(r.condition.location, null)
|
|
|
|
title = try(r.condition.title, null)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
]
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
_org_policies = merge(local._factory_data, var.org_policies)
|
|
|
|
|
2022-10-28 03:55:16 -07:00
|
|
|
org_policies = {
|
2022-11-03 03:41:53 -07:00
|
|
|
for k, v in local._org_policies :
|
2022-10-28 03:55:16 -07:00
|
|
|
k => merge(v, {
|
2022-11-02 02:40:33 -07:00
|
|
|
name = "${local.folder.name}/policies/${k}"
|
|
|
|
parent = local.folder.name
|
|
|
|
|
2022-10-28 03:55:16 -07:00
|
|
|
is_boolean_policy = v.allow == null && v.deny == null
|
|
|
|
has_values = (
|
|
|
|
length(coalesce(try(v.allow.values, []), [])) > 0 ||
|
|
|
|
length(coalesce(try(v.deny.values, []), [])) > 0
|
|
|
|
)
|
|
|
|
rules = [
|
|
|
|
for r in v.rules :
|
|
|
|
merge(r, {
|
|
|
|
has_values = (
|
|
|
|
length(coalesce(try(r.allow.values, []), [])) > 0 ||
|
|
|
|
length(coalesce(try(r.deny.values, []), [])) > 0
|
|
|
|
)
|
|
|
|
})
|
|
|
|
]
|
|
|
|
})
|
2022-01-22 02:34:18 -08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-10-28 03:55:16 -07:00
|
|
|
resource "google_org_policy_policy" "default" {
|
|
|
|
for_each = local.org_policies
|
2022-11-02 02:40:33 -07:00
|
|
|
name = each.value.name
|
|
|
|
parent = each.value.parent
|
2022-01-22 02:34:18 -08:00
|
|
|
|
2022-10-28 03:55:16 -07:00
|
|
|
spec {
|
|
|
|
inherit_from_parent = each.value.inherit_from_parent
|
|
|
|
reset = each.value.reset
|
|
|
|
|
|
|
|
dynamic "rules" {
|
|
|
|
for_each = each.value.rules
|
|
|
|
iterator = rule
|
|
|
|
content {
|
|
|
|
allow_all = try(rule.value.allow.all, false) == true ? "TRUE" : null
|
|
|
|
deny_all = try(rule.value.deny.all, false) == true ? "TRUE" : null
|
|
|
|
enforce = (
|
|
|
|
each.value.is_boolean_policy && rule.value.enforce != null
|
|
|
|
? upper(tostring(rule.value.enforce))
|
|
|
|
: null
|
|
|
|
)
|
|
|
|
condition {
|
|
|
|
description = rule.value.condition.description
|
|
|
|
expression = rule.value.condition.expression
|
|
|
|
location = rule.value.condition.location
|
|
|
|
title = rule.value.condition.title
|
|
|
|
}
|
|
|
|
dynamic "values" {
|
2022-10-28 05:40:53 -07:00
|
|
|
for_each = rule.value.has_values ? [1] : []
|
2022-10-28 03:55:16 -07:00
|
|
|
content {
|
|
|
|
allowed_values = try(rule.value.allow.values, null)
|
|
|
|
denied_values = try(rule.value.deny.values, null)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2022-01-22 02:34:18 -08:00
|
|
|
}
|
2023-01-03 07:37:32 -08:00
|
|
|
|
|
|
|
rules {
|
|
|
|
allow_all = try(each.value.allow.all, null) == true ? "TRUE" : null
|
|
|
|
deny_all = try(each.value.deny.all, null) == true ? "TRUE" : null
|
|
|
|
enforce = (
|
|
|
|
each.value.is_boolean_policy && each.value.enforce != null
|
|
|
|
? upper(tostring(each.value.enforce))
|
|
|
|
: null
|
|
|
|
)
|
|
|
|
dynamic "values" {
|
|
|
|
for_each = each.value.has_values ? [1] : []
|
|
|
|
content {
|
|
|
|
allowed_values = try(each.value.allow.values, null)
|
|
|
|
denied_values = try(each.value.deny.values, null)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2022-01-22 02:34:18 -08:00
|
|
|
}
|
|
|
|
}
|