2020-04-07 09:47:07 -07:00
/ * *
2023-02-21 03:24:40 -08:00
* Copyright 2023 Google LLC
2020-04-07 09:47:07 -07:00
*
* Licensed under the Apache License , Version 2 . 0 ( the " License " ) ;
* you may not use this file except in compliance with the License .
* You may obtain a copy of the License at
*
* http : //www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing , software
* distributed under the License is distributed on an " AS IS " BASIS ,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND , either express or implied .
* See the License for the specific language governing permissions and
* limitations under the License .
* /
2021-10-08 09:26:04 -07:00
variable " contacts " {
2022-01-31 01:45:34 -08:00
description = " List of essential contacts for this resource. Must be in the form EMAIL -> [NOTIFICATION_TYPES]. Valid notification types are ALL, SUSPENSION, SECURITY, TECHNICAL, BILLING, LEGAL, PRODUCT_UPDATES. "
2021-10-08 09:26:04 -07:00
type = map ( list ( string ) )
default = { }
2022-01-29 01:08:17 -08:00
nullable = false
2021-10-08 09:26:04 -07:00
}
2020-04-07 09:47:07 -07:00
variable " custom_roles " {
description = " Map of role name => list of permissions to create in this project. "
type = map ( list ( string ) )
default = { }
2022-01-29 01:08:17 -08:00
nullable = false
2020-04-07 09:47:07 -07:00
}
2023-12-11 06:16:39 -08:00
variable " factories_config " {
description = " Paths to data files and folders that enable factory functionality. "
type = object ( {
custom_roles = optional ( string )
org_policies = optional ( string )
org_policy_custom_constraints = optional ( string )
} )
nullable = false
default = { }
}
2023-08-28 05:39:48 -07:00
variable " firewall_policy " {
description = " Hierarchical firewall policies to associate to the organization. "
type = object ( {
name = string
policy = string
} )
default = null
2021-12-12 23:41:02 -08:00
}
2021-04-11 05:48:16 -07:00
variable " group_iam " {
description = " Authoritative IAM binding for organization groups, in {GROUP_EMAIL => [ROLES]} format. Group emails need to be static. Can be used in combination with the `iam` variable. "
type = map ( list ( string ) )
default = { }
2022-01-29 01:08:17 -08:00
nullable = false
2021-04-11 05:48:16 -07:00
}
2020-11-04 06:44:28 -08:00
variable " iam " {
description = " IAM bindings, in {ROLE => [MEMBERS]} format. "
2020-04-07 09:47:07 -07:00
type = map ( list ( string ) )
default = { }
2022-01-29 01:08:17 -08:00
nullable = false
2020-04-07 09:47:07 -07:00
}
2023-08-20 00:44:20 -07:00
variable " iam_bindings " {
2023-09-07 23:56:31 -07:00
description = " Authoritative IAM bindings in {KEY => {role = ROLE, members = [], condition = {}}}. Keys are arbitrary. "
2023-08-20 00:44:20 -07:00
type = map ( object ( {
members = list ( string )
2023-09-07 23:56:31 -07:00
role = string
2023-08-20 00:44:20 -07:00
condition = optional ( object ( {
expression = string
title = string
description = optional ( string )
} ) )
} ) )
nullable = false
default = { }
2020-04-07 09:47:07 -07:00
}
2023-08-20 00:44:20 -07:00
variable " iam_bindings_additive " {
description = " Individual additive IAM bindings. Keys are arbitrary. "
2023-08-14 02:54:50 -07:00
type = map ( object ( {
member = string
role = string
2023-08-15 07:28:23 -07:00
condition = optional ( object ( {
expression = string
title = string
description = optional ( string )
} ) )
2023-08-14 02:54:50 -07:00
} ) )
nullable = false
default = { }
}
2023-07-10 01:08:02 -07:00
variable " logging_data_access " {
description = " Control activation of data access logs. Format is service => { log type => [exempted members]}. The special 'allServices' key denotes configuration for all services. "
type = map ( map ( list ( string ) ) )
nullable = false
default = { }
validation {
condition = alltrue ( flatten ( [
for k , v in var . logging_data_access : [
for kk , vv in v : contains ( [ " DATA_READ " , " DATA_WRITE " , " ADMIN_READ " ] , kk )
]
] ) )
error_message = " Log type keys for each service can only be one of 'DATA_READ', 'DATA_WRITE', 'ADMIN_READ'. "
}
2021-04-11 05:48:16 -07:00
}
2021-10-08 09:26:04 -07:00
variable " logging_exclusions " {
description = " Logging exclusions for this organization in the form {NAME -> FILTER}. "
type = map ( string )
default = { }
2022-01-29 01:08:17 -08:00
nullable = false
2021-10-08 09:26:04 -07:00
}
variable " logging_sinks " {
2022-11-11 10:05:39 -08:00
description = " Logging sinks to create for the organization. "
2021-10-08 09:26:04 -07:00
type = map ( object ( {
2022-11-12 02:30:34 -08:00
bq_partitioned_table = optional ( bool )
description = optional ( string )
2022-11-12 10:24:41 -08:00
destination = string
disabled = optional ( bool , false )
exclusions = optional ( map ( string ) , { } )
filter = string
2023-11-06 23:11:23 -08:00
iam = optional ( bool , true )
2022-11-12 10:24:41 -08:00
include_children = optional ( bool , true )
type = string
2021-10-08 09:26:04 -07:00
} ) )
2022-11-11 10:05:39 -08:00
default = { }
nullable = false
2021-12-12 23:41:02 -08:00
validation {
condition = alltrue ( [
2022-11-11 10:05:39 -08:00
for k , v in var . logging_sinks :
2022-11-12 10:24:41 -08:00
contains ( [ " bigquery " , " logging " , " pubsub " , " storage " ] , v . type )
2021-12-12 23:41:02 -08:00
] )
2022-11-12 10:24:41 -08:00
error_message = " Type must be one of 'bigquery', 'logging', 'pubsub', 'storage'. "
2022-11-11 10:05:39 -08:00
}
validation {
condition = alltrue ( [
for k , v in var . logging_sinks :
2022-11-12 10:24:41 -08:00
v . bq_partitioned_table ! = true | | v . type == " bigquery "
2022-11-11 10:05:39 -08:00
] )
2022-11-12 10:24:41 -08:00
error_message = " Can only set bq_partitioned_table when type is `bigquery`. "
2021-12-12 23:41:02 -08:00
}
2021-10-08 09:26:04 -07:00
}
2022-10-28 03:55:16 -07:00
variable " org_policies " {
description = " Organization policies applied to this organization keyed by policy name. "
2020-04-07 09:47:07 -07:00
type = map ( object ( {
2022-10-28 03:55:16 -07:00
inherit_from_parent = optional ( bool ) # for list policies only.
reset = optional ( bool )
rules = optional ( list ( object ( {
allow = optional ( object ( {
all = optional ( bool )
values = optional ( list ( string ) )
} ) )
deny = optional ( object ( {
all = optional ( bool )
values = optional ( list ( string ) )
} ) )
2023-02-21 03:24:40 -08:00
enforce = optional ( bool ) # for boolean policies only.
condition = optional ( object ( {
2022-10-28 03:55:16 -07:00
description = optional ( string )
expression = optional ( string )
location = optional ( string )
title = optional ( string )
2023-02-21 03:24:40 -08:00
} ) , { } )
2022-10-28 03:55:16 -07:00
} ) ) , [ ] )
2020-04-07 09:47:07 -07:00
} ) )
2022-01-29 01:08:17 -08:00
default = { }
nullable = false
2020-04-07 09:47:07 -07:00
}
2022-02-20 02:14:18 -08:00
2022-11-08 00:34:38 -08:00
variable " org_policy_custom_constraints " {
2023-06-22 21:14:02 -07:00
description = " Organization policy custom constraints keyed by constraint name. "
2022-11-08 00:34:38 -08:00
type = map ( object ( {
display_name = optional ( string )
description = optional ( string )
action_type = string
condition = string
method_types = list ( string )
resource_types = list ( string )
} ) )
default = { }
nullable = false
}
2022-10-28 08:27:33 -07:00
variable " organization_id " {
description = " Organization id in organizations/nnnnnn format. "
type = string
validation {
condition = can ( regex ( " ^organizations/[0-9]+ " , var . organization_id ) )
error_message = " The organization_id must in the form organizations/nnn. "
}
}