2022-01-19 05:17:20 -08:00
|
|
|
/**
|
2024-02-12 05:35:30 -08:00
|
|
|
* Copyright 2024 Google LLC
|
2022-01-19 05:17:20 -08:00
|
|
|
*
|
|
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
* you may not use this file except in compliance with the License.
|
|
|
|
* You may obtain a copy of the License at
|
|
|
|
*
|
|
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
*
|
|
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
* See the License for the specific language governing permissions and
|
|
|
|
* limitations under the License.
|
|
|
|
*/
|
|
|
|
|
|
|
|
# tfdoc:file:description Automation project and resources.
|
|
|
|
|
2023-08-20 00:44:20 -07:00
|
|
|
locals {
|
2023-12-27 03:33:16 -08:00
|
|
|
cicd_resman_sa = try(module.automation-tf-cicd-sa["resman"].iam_email, "")
|
|
|
|
cicd_resman_r_sa = try(module.automation-tf-cicd-r-sa["resman"].iam_email, "")
|
2023-08-20 00:44:20 -07:00
|
|
|
}
|
|
|
|
|
2022-01-19 05:17:20 -08:00
|
|
|
module "automation-project" {
|
|
|
|
source = "../../../modules/project"
|
|
|
|
billing_account = var.billing_account.id
|
|
|
|
name = "iac-core-0"
|
2022-09-08 06:11:46 -07:00
|
|
|
parent = coalesce(
|
|
|
|
var.project_parent_ids.automation, "organizations/${var.organization.id}"
|
|
|
|
)
|
|
|
|
prefix = local.prefix
|
2024-02-12 05:35:30 -08:00
|
|
|
contacts = (
|
|
|
|
var.bootstrap_user != null || var.essential_contacts == null
|
|
|
|
? {}
|
|
|
|
: { (var.essential_contacts) = ["ALL"] }
|
|
|
|
)
|
2022-01-19 05:17:20 -08:00
|
|
|
# human (groups) IAM bindings
|
2024-02-12 05:35:30 -08:00
|
|
|
iam_by_principals = {
|
|
|
|
(local.principals.gcp-devops) = [
|
2022-01-19 05:17:20 -08:00
|
|
|
"roles/iam.serviceAccountAdmin",
|
|
|
|
"roles/iam.serviceAccountTokenCreator",
|
|
|
|
]
|
2024-02-12 05:35:30 -08:00
|
|
|
(local.principals.gcp-organization-admins) = [
|
2022-01-19 05:17:20 -08:00
|
|
|
"roles/iam.serviceAccountTokenCreator",
|
2022-04-11 23:17:27 -07:00
|
|
|
"roles/iam.workloadIdentityPoolAdmin"
|
2022-01-19 05:17:20 -08:00
|
|
|
]
|
|
|
|
}
|
|
|
|
# machine (service accounts) IAM bindings
|
|
|
|
iam = {
|
2023-12-27 03:33:16 -08:00
|
|
|
"roles/browser" = [
|
|
|
|
module.automation-tf-resman-r-sa.iam_email
|
|
|
|
]
|
2022-02-06 00:47:40 -08:00
|
|
|
"roles/owner" = [
|
|
|
|
module.automation-tf-bootstrap-sa.iam_email
|
|
|
|
]
|
2022-06-16 12:56:18 -07:00
|
|
|
"roles/cloudbuild.builds.editor" = [
|
2022-06-15 17:12:11 -07:00
|
|
|
module.automation-tf-resman-sa.iam_email
|
2022-02-06 00:47:40 -08:00
|
|
|
]
|
2023-12-27 03:33:16 -08:00
|
|
|
"roles/cloudbuild.builds.viewer" = [
|
|
|
|
module.automation-tf-resman-r-sa.iam_email
|
|
|
|
]
|
2022-01-19 05:17:20 -08:00
|
|
|
"roles/iam.serviceAccountAdmin" = [
|
|
|
|
module.automation-tf-resman-sa.iam_email
|
|
|
|
]
|
2023-12-27 03:33:16 -08:00
|
|
|
"roles/iam.serviceAccountViewer" = [
|
|
|
|
module.automation-tf-resman-r-sa.iam_email
|
|
|
|
]
|
2022-04-11 23:17:27 -07:00
|
|
|
"roles/iam.workloadIdentityPoolAdmin" = [
|
|
|
|
module.automation-tf-resman-sa.iam_email
|
|
|
|
]
|
2023-12-27 03:33:16 -08:00
|
|
|
"roles/iam.workloadIdentityPoolViewer" = [
|
|
|
|
module.automation-tf-resman-r-sa.iam_email
|
|
|
|
]
|
2022-06-16 12:56:18 -07:00
|
|
|
"roles/source.admin" = [
|
|
|
|
module.automation-tf-resman-sa.iam_email
|
|
|
|
]
|
2023-12-27 03:33:16 -08:00
|
|
|
"roles/source.reader" = [
|
|
|
|
module.automation-tf-resman-r-sa.iam_email
|
|
|
|
]
|
2022-01-19 05:17:20 -08:00
|
|
|
"roles/storage.admin" = [
|
|
|
|
module.automation-tf-resman-sa.iam_email
|
|
|
|
]
|
2023-12-27 03:33:16 -08:00
|
|
|
(module.organization.custom_role_id["storage_viewer"]) = [
|
|
|
|
module.automation-tf-bootstrap-r-sa.iam_email,
|
|
|
|
module.automation-tf-resman-r-sa.iam_email
|
|
|
|
]
|
|
|
|
"roles/viewer" = [
|
|
|
|
module.automation-tf-bootstrap-r-sa.iam_email,
|
|
|
|
module.automation-tf-resman-r-sa.iam_email
|
|
|
|
]
|
2022-01-19 05:17:20 -08:00
|
|
|
}
|
2023-10-18 05:18:31 -07:00
|
|
|
iam_bindings = {
|
|
|
|
delegated_grants_resman = {
|
|
|
|
members = [module.automation-tf-resman-sa.iam_email]
|
|
|
|
role = "roles/resourcemanager.projectIamAdmin"
|
|
|
|
condition = {
|
|
|
|
title = "resman_delegated_grant"
|
|
|
|
description = "Resource manager service account delegated grant."
|
|
|
|
expression = format(
|
|
|
|
"api.getAttribute('iam.googleapis.com/modifiedGrantsByRole', []).hasOnly(['%s'])",
|
|
|
|
"roles/serviceusage.serviceUsageConsumer"
|
|
|
|
)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
iam_bindings_additive = {
|
|
|
|
serviceusage_resman = {
|
|
|
|
member = module.automation-tf-resman-sa.iam_email
|
|
|
|
role = "roles/serviceusage.serviceUsageConsumer"
|
|
|
|
}
|
2023-12-27 03:33:16 -08:00
|
|
|
serviceusage_resman_r = {
|
|
|
|
member = module.automation-tf-resman-r-sa.iam_email
|
|
|
|
role = "roles/serviceusage.serviceUsageViewer"
|
|
|
|
}
|
2023-10-18 05:18:31 -07:00
|
|
|
}
|
2024-01-24 10:40:36 -08:00
|
|
|
org_policies = var.bootstrap_user != null ? {} : {
|
|
|
|
"compute.skipDefaultNetworkCreation" = {
|
|
|
|
rules = [{ enforce = true }]
|
|
|
|
}
|
|
|
|
"iam.automaticIamGrantsForDefaultServiceAccounts" = {
|
|
|
|
rules = [{ enforce = true }]
|
|
|
|
}
|
|
|
|
"iam.disableServiceAccountKeyCreation" = {
|
|
|
|
rules = [{ enforce = true }]
|
|
|
|
}
|
|
|
|
}
|
|
|
|
services = concat(
|
|
|
|
[
|
|
|
|
"accesscontextmanager.googleapis.com",
|
|
|
|
"bigquery.googleapis.com",
|
|
|
|
"bigqueryreservation.googleapis.com",
|
|
|
|
"bigquerystorage.googleapis.com",
|
|
|
|
"billingbudgets.googleapis.com",
|
|
|
|
"cloudbilling.googleapis.com",
|
|
|
|
"cloudkms.googleapis.com",
|
|
|
|
"cloudresourcemanager.googleapis.com",
|
|
|
|
"essentialcontacts.googleapis.com",
|
|
|
|
"iam.googleapis.com",
|
|
|
|
"iamcredentials.googleapis.com",
|
|
|
|
"orgpolicy.googleapis.com",
|
|
|
|
"pubsub.googleapis.com",
|
|
|
|
"servicenetworking.googleapis.com",
|
|
|
|
"serviceusage.googleapis.com",
|
|
|
|
"sourcerepo.googleapis.com",
|
|
|
|
"stackdriver.googleapis.com",
|
|
|
|
"storage-component.googleapis.com",
|
|
|
|
"storage.googleapis.com",
|
|
|
|
"sts.googleapis.com"
|
|
|
|
],
|
|
|
|
# enable specific service only after org policies have been applied
|
|
|
|
var.bootstrap_user != null ? [] : [
|
|
|
|
"cloudbuild.googleapis.com",
|
|
|
|
"compute.googleapis.com",
|
|
|
|
"container.googleapis.com",
|
|
|
|
]
|
|
|
|
)
|
2022-01-19 05:17:20 -08:00
|
|
|
}
|
|
|
|
|
2022-06-08 02:34:08 -07:00
|
|
|
# output files bucket
|
2022-04-11 23:17:27 -07:00
|
|
|
|
|
|
|
module "automation-tf-output-gcs" {
|
2022-09-08 06:24:42 -07:00
|
|
|
source = "../../../modules/gcs"
|
|
|
|
project_id = module.automation-project.project_id
|
|
|
|
name = "iac-core-outputs-0"
|
|
|
|
prefix = local.prefix
|
2024-01-17 20:45:29 -08:00
|
|
|
location = local.locations.gcs
|
2022-09-08 06:24:42 -07:00
|
|
|
storage_class = local.gcs_storage_class
|
|
|
|
versioning = true
|
|
|
|
depends_on = [module.organization]
|
2022-04-11 23:17:27 -07:00
|
|
|
}
|
|
|
|
|
2022-01-19 05:17:20 -08:00
|
|
|
# this stage's bucket and service account
|
|
|
|
|
|
|
|
module "automation-tf-bootstrap-gcs" {
|
2022-09-08 06:24:42 -07:00
|
|
|
source = "../../../modules/gcs"
|
|
|
|
project_id = module.automation-project.project_id
|
|
|
|
name = "iac-core-bootstrap-0"
|
|
|
|
prefix = local.prefix
|
2024-01-17 20:45:29 -08:00
|
|
|
location = local.locations.gcs
|
2022-09-08 06:24:42 -07:00
|
|
|
storage_class = local.gcs_storage_class
|
|
|
|
versioning = true
|
|
|
|
depends_on = [module.organization]
|
2022-01-19 05:17:20 -08:00
|
|
|
}
|
|
|
|
|
|
|
|
module "automation-tf-bootstrap-sa" {
|
2022-11-03 08:23:48 -07:00
|
|
|
source = "../../../modules/iam-service-account"
|
|
|
|
project_id = module.automation-project.project_id
|
|
|
|
name = "bootstrap-0"
|
|
|
|
display_name = "Terraform organization bootstrap service account."
|
|
|
|
prefix = local.prefix
|
2022-06-08 02:34:08 -07:00
|
|
|
# allow SA used by CI/CD workflow to impersonate this SA
|
2022-04-11 23:17:27 -07:00
|
|
|
iam = {
|
|
|
|
"roles/iam.serviceAccountTokenCreator" = compact([
|
|
|
|
try(module.automation-tf-cicd-sa["bootstrap"].iam_email, null)
|
|
|
|
])
|
|
|
|
}
|
|
|
|
iam_storage_roles = {
|
|
|
|
(module.automation-tf-output-gcs.name) = ["roles/storage.admin"]
|
2022-06-21 01:45:27 -07:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-12-27 03:33:16 -08:00
|
|
|
module "automation-tf-bootstrap-r-sa" {
|
|
|
|
source = "../../../modules/iam-service-account"
|
|
|
|
project_id = module.automation-project.project_id
|
|
|
|
name = "bootstrap-0r"
|
|
|
|
display_name = "Terraform organization bootstrap service account (read-only)."
|
|
|
|
prefix = local.prefix
|
|
|
|
# allow SA used by CI/CD workflow to impersonate this SA
|
|
|
|
iam = {
|
|
|
|
"roles/iam.serviceAccountTokenCreator" = compact([
|
|
|
|
try(module.automation-tf-cicd-r-sa["bootstrap"].iam_email, null)
|
|
|
|
])
|
|
|
|
}
|
|
|
|
# we grant organization roles here as IAM bindings have precedence over
|
|
|
|
# custom roles in the organization module, so these need to depend on it
|
|
|
|
iam_organization_roles = {
|
|
|
|
(var.organization.id) = [
|
|
|
|
module.organization.custom_role_id["organization_admin_viewer"],
|
|
|
|
module.organization.custom_role_id["tag_viewer"]
|
|
|
|
]
|
|
|
|
}
|
|
|
|
iam_storage_roles = {
|
|
|
|
(module.automation-tf-output-gcs.name) = [module.organization.custom_role_id["storage_viewer"]]
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-01-19 05:17:20 -08:00
|
|
|
# resource hierarchy stage's bucket and service account
|
|
|
|
|
|
|
|
module "automation-tf-resman-gcs" {
|
2022-09-08 06:24:42 -07:00
|
|
|
source = "../../../modules/gcs"
|
|
|
|
project_id = module.automation-project.project_id
|
|
|
|
name = "iac-core-resman-0"
|
|
|
|
prefix = local.prefix
|
2024-01-17 20:45:29 -08:00
|
|
|
location = local.locations.gcs
|
2022-09-08 06:24:42 -07:00
|
|
|
storage_class = local.gcs_storage_class
|
|
|
|
versioning = true
|
2022-01-19 05:17:20 -08:00
|
|
|
iam = {
|
2023-12-27 03:33:16 -08:00
|
|
|
"roles/storage.objectAdmin" = [module.automation-tf-resman-sa.iam_email]
|
|
|
|
"roles/storage.objectViewer" = [module.automation-tf-resman-r-sa.iam_email]
|
2022-01-19 05:17:20 -08:00
|
|
|
}
|
|
|
|
depends_on = [module.organization]
|
|
|
|
}
|
|
|
|
|
|
|
|
module "automation-tf-resman-sa" {
|
2022-11-03 08:23:48 -07:00
|
|
|
source = "../../../modules/iam-service-account"
|
|
|
|
project_id = module.automation-project.project_id
|
|
|
|
name = "resman-0"
|
|
|
|
display_name = "Terraform stage 1 resman service account."
|
|
|
|
prefix = local.prefix
|
2022-06-08 02:34:08 -07:00
|
|
|
# allow SA used by CI/CD workflow to impersonate this SA
|
FAST multitenant bootstrap and resource management, rename org-level FAST stages (#1052)
* rename stages
* remove support for external org billing, rename output files
* resman: make groups optional, align on new billing account variable
* bootstrap: multitenant outputs
* tenant bootstrap stage, untested
* fix folder name
* fix stage 0 output names
* optional creation for tag keys in organization module
* single tenant bootstrap minus tag
* rename output files, add tenant tag key
* fix organization module tag values output
* test skipping creation for tags in organization module
* single tenant bootstrap plan working
* multitenant bootstrap
* tfdoc
* fix check links error messages
* fix links
* tfdoc
* fix links
* rename fast tests, fix bootstrap tests
* multitenant stages have their own folder, simplify stage numbering
* stage renumbering
* wip
* rename tests
* exclude fast providers in fixture
* stage 0 tests
* stage 1 tests
* network stages tests
* stage tests
* tfdoc
* fix links
* tfdoc
* multitenant tests
* remove local files
* stage links command
* fix links script, TODO
* wip
* wip single tenant bootstrap
* working tenant bootstrap
* update gitignore
* remove local files
* tfdoc
* remove local files
* allow tests for tenant bootstrap stage
* tenant bootstrap proxies stage 1 tfvars
* stage 2 and 3 service accounts and IAM in tenant bootstrap
* wip
* wip
* wip
* drop multitenant bootstrap
* tfdoc
* add missing stage 2 SAs, fix org-level IAM condition
* wip
* wip
* optional tag value creation in organization module
* stage 1 working
* linting
* linting
* READMEs
* wip
* Make stage-links script work in old macos bash
* stage links command help
* fix output file names
* diagrams
* fix svg
* stage 0 skeleton and diagram
* test svg
* test svg
* test diagram
* diagram
* readme
* fix stage links script
* stage 0 readme
* README changes
* stage readmes
* fix outputs order
* fix link
* fix tests
* stage 1 test
* skip stage example
* boilerplate
* fix tftest skip
* default bootstrap stage log sinks to log buckets
* add logging to tenant bootstrap
* move iam variables out of tenant config
* fix cicd, reintroduce missing variable
* use optional in stage 1 cicd variable
* rename extras stage
* rename and move identity providers local, use optional for cicd variable
* tfdoc
* add support for wif pool and providers, ci/cd
* tfdoc
* fix links
* better handling of modules repository
* add missing role on logging project
* fix cicd pools in locals, test cicd
* fix workflow extension
* fix module source replacement
* allow tenant bootstrap cicd sa to impersonate resman sa
* tenant workflow templates fix for no providers file
* fix output files, push github workflow template to new repository
* remove try from outpout files
* align stage 1 cicd internals to stage 0
* tfdoc
* tests
* fix tests
* tests
* improve variable descriptions
* use optional in fast features
* actually create tenant log sinks, and allow the resman sa to do it
* test
* tests
* aaaand tests again
* fast features tenant override
* fast features tenant override
* fix wording
* add missing comment
* configure pf service accounts
* add missing comment
* tfdoc
* tests
* IAM docs
* update copyright
---------
Co-authored-by: Julio Castillo <jccb@google.com>
2023-02-04 06:00:45 -08:00
|
|
|
# we use additive IAM to allow tenant CI/CD SAs to impersonate it
|
2023-08-20 00:44:20 -07:00
|
|
|
iam_bindings_additive = (
|
|
|
|
local.cicd_resman_sa == "" ? {} : {
|
|
|
|
cicd_token_creator = {
|
|
|
|
member = local.cicd_resman_sa
|
|
|
|
role = "roles/iam.serviceAccountTokenCreator"
|
|
|
|
}
|
|
|
|
}
|
|
|
|
)
|
2022-04-11 23:17:27 -07:00
|
|
|
iam_storage_roles = {
|
|
|
|
(module.automation-tf-output-gcs.name) = ["roles/storage.admin"]
|
|
|
|
}
|
2022-01-19 05:17:20 -08:00
|
|
|
}
|
2023-12-27 03:33:16 -08:00
|
|
|
|
|
|
|
module "automation-tf-resman-r-sa" {
|
|
|
|
source = "../../../modules/iam-service-account"
|
|
|
|
project_id = module.automation-project.project_id
|
|
|
|
name = "resman-0r"
|
|
|
|
display_name = "Terraform stage 1 resman service account (read-only)."
|
|
|
|
prefix = local.prefix
|
|
|
|
# allow SA used by CI/CD workflow to impersonate this SA
|
|
|
|
# we use additive IAM to allow tenant CI/CD SAs to impersonate it
|
|
|
|
iam_bindings_additive = (
|
|
|
|
local.cicd_resman_r_sa == "" ? {} : {
|
|
|
|
cicd_token_creator = {
|
|
|
|
member = local.cicd_resman_r_sa
|
|
|
|
role = "roles/iam.serviceAccountTokenCreator"
|
|
|
|
}
|
|
|
|
}
|
|
|
|
)
|
|
|
|
# we grant organization roles here as IAM bindings have precedence over
|
|
|
|
# custom roles in the organization module, so these need to depend on it
|
|
|
|
iam_organization_roles = {
|
|
|
|
(var.organization.id) = [
|
|
|
|
module.organization.custom_role_id["organization_admin_viewer"],
|
|
|
|
module.organization.custom_role_id["tag_viewer"]
|
|
|
|
]
|
|
|
|
}
|
|
|
|
iam_storage_roles = {
|
|
|
|
(module.automation-tf-output-gcs.name) = [module.organization.custom_role_id["storage_viewer"]]
|
|
|
|
}
|
|
|
|
}
|