Make project creation optional in project module (#99)
* make project creation optional in project module * add variable to optionally configure project activation * add explicit dependency on custom roles to additive bindings * make parent variable optional * add test for null parent * fix custom roles output
This commit is contained in:
parent
1dfc1f5954
commit
ec765857cb
|
@ -58,9 +58,8 @@ module "project" {
|
|||
| name | description | type | required | default |
|
||||
|---|---|:---: |:---:|:---:|
|
||||
| name | Project name and id suffix. | <code title="">string</code> | ✓ | |
|
||||
| parent | The resource name of the parent Folder or Organization. Must be of the form folders/folder_id or organizations/org_id. | <code title="">string</code> | ✓ | |
|
||||
| *auto_create_network* | Whether to create the default network for the project | <code title="">bool</code> | | <code title="">false</code> |
|
||||
| *billing_account* | Billing account id. | <code title="">string</code> | | <code title=""></code> |
|
||||
| *billing_account* | Billing account id. | <code title="">string</code> | | <code title="">null</code> |
|
||||
| *custom_roles* | Map of role name => list of permissions to create in this project. | <code title="map(list(string))">map(list(string))</code> | | <code title="">{}</code> |
|
||||
| *iam_additive_members* | Map of member lists used to set non authoritative bindings, keyed by role. | <code title="map(list(string))">map(list(string))</code> | | <code title="">{}</code> |
|
||||
| *iam_additive_roles* | List of roles used to set non authoritative bindings. | <code title="list(string)">list(string)</code> | | <code title="">[]</code> |
|
||||
|
@ -71,9 +70,12 @@ module "project" {
|
|||
| *oslogin* | Enable OS Login. | <code title="">bool</code> | | <code title="">false</code> |
|
||||
| *oslogin_admins* | List of IAM-style identities that will be granted roles necessary for OS Login administrators. | <code title="list(string)">list(string)</code> | | <code title="">[]</code> |
|
||||
| *oslogin_users* | List of IAM-style identities that will be granted roles necessary for OS Login users. | <code title="list(string)">list(string)</code> | | <code title="">[]</code> |
|
||||
| *parent* | Parent folder or organization in 'folders/folder_id' or 'organizations/org_id' format. | <code title="">string</code> | | <code title="">null</code> |
|
||||
| *policy_boolean* | Map of boolean org policies and enforcement value, set value to null for policy restore. | <code title="map(bool)">map(bool)</code> | | <code title="">{}</code> |
|
||||
| *policy_list* | Map of list org policies, status is true for allow, false for deny, null for restore. Values can only be used for allow or deny. | <code title="map(object({ inherit_from_parent = bool suggested_value = string status = bool values = list(string) }))">map(object({...}))</code> | | <code title="">{}</code> |
|
||||
| *prefix* | Prefix used to generate project id and name. | <code title="">string</code> | | <code title="">null</code> |
|
||||
| *project_create* | Create project. When set to false, uses a data source to reference existing project. | <code title="">bool</code> | | <code title="">true</code> |
|
||||
| *service_config* | Configure service API activation. | <code title="object({ disable_on_destroy = bool disable_dependent_services = bool })">object({...})</code> | | <code title="{ disable_on_destroy = true disable_dependent_services = true }">...</code> |
|
||||
| *services* | Service APIs to enable. | <code title="list(string)">list(string)</code> | | <code title="">[]</code> |
|
||||
|
||||
## Outputs
|
||||
|
@ -81,7 +83,7 @@ module "project" {
|
|||
| name | description | sensitive |
|
||||
|---|---|:---:|
|
||||
| custom_roles | Ids of the created custom roles. | |
|
||||
| name | Project ame. | |
|
||||
| name | Project name. | |
|
||||
| number | Project number. | |
|
||||
| project_id | Project id. | |
|
||||
| service_accounts | Product robot service accounts in project. | |
|
||||
|
|
|
@ -25,12 +25,21 @@ locals {
|
|||
for pair in local.iam_additive_pairs :
|
||||
"${pair.role}-${pair.member}" => pair
|
||||
}
|
||||
parent_type = split("/", var.parent)[0]
|
||||
parent_id = split("/", var.parent)[1]
|
||||
parent_type = var.parent == null ? null : split("/", var.parent)[0]
|
||||
parent_id = var.parent == null ? null : split("/", var.parent)[1]
|
||||
prefix = var.prefix == null ? "" : "${var.prefix}-"
|
||||
project = (
|
||||
var.project_create ? google_project.project.0 : data.google_project.project.0
|
||||
)
|
||||
}
|
||||
|
||||
data "google_project" "project" {
|
||||
count = var.project_create ? 0 : 1
|
||||
project_id = "${local.prefix}${var.name}"
|
||||
}
|
||||
|
||||
resource "google_project" "project" {
|
||||
count = var.project_create ? 1 : 0
|
||||
org_id = local.parent_type == "organizations" ? local.parent_id : null
|
||||
folder_id = local.parent_type == "folders" ? local.parent_id : null
|
||||
project_id = "${local.prefix}${var.name}"
|
||||
|
@ -42,7 +51,7 @@ resource "google_project" "project" {
|
|||
|
||||
resource "google_project_iam_custom_role" "roles" {
|
||||
for_each = var.custom_roles
|
||||
project = google_project.project.project_id
|
||||
project = local.project.project_id
|
||||
role_id = each.key
|
||||
title = "Custom role ${each.key}"
|
||||
description = "Terraform-managed"
|
||||
|
@ -51,7 +60,7 @@ resource "google_project_iam_custom_role" "roles" {
|
|||
|
||||
resource "google_compute_project_metadata_item" "oslogin_meta" {
|
||||
count = var.oslogin ? 1 : 0
|
||||
project = google_project.project.project_id
|
||||
project = local.project.project_id
|
||||
key = "enable-oslogin"
|
||||
value = "TRUE"
|
||||
# depend on services or it will fail on destroy
|
||||
|
@ -60,7 +69,7 @@ resource "google_compute_project_metadata_item" "oslogin_meta" {
|
|||
|
||||
resource "google_resource_manager_lien" "lien" {
|
||||
count = var.lien_reason != "" ? 1 : 0
|
||||
parent = "projects/${google_project.project.number}"
|
||||
parent = "projects/${local.project.number}"
|
||||
restrictions = ["resourcemanager.projects.delete"]
|
||||
origin = "created-by-terraform"
|
||||
reason = var.lien_reason
|
||||
|
@ -68,10 +77,10 @@ resource "google_resource_manager_lien" "lien" {
|
|||
|
||||
resource "google_project_service" "project_services" {
|
||||
for_each = toset(var.services)
|
||||
project = google_project.project.project_id
|
||||
project = local.project.project_id
|
||||
service = each.value
|
||||
disable_on_destroy = true
|
||||
disable_dependent_services = true
|
||||
disable_on_destroy = var.service_config.disable_on_destroy
|
||||
disable_dependent_services = var.service_config.disable_dependent_services
|
||||
}
|
||||
|
||||
# IAM notes:
|
||||
|
@ -81,7 +90,7 @@ resource "google_project_service" "project_services" {
|
|||
|
||||
resource "google_project_iam_binding" "authoritative" {
|
||||
for_each = toset(var.iam_roles)
|
||||
project = google_project.project.project_id
|
||||
project = local.project.project_id
|
||||
role = each.value
|
||||
members = lookup(var.iam_members, each.value, [])
|
||||
depends_on = [
|
||||
|
@ -92,42 +101,46 @@ resource "google_project_iam_binding" "authoritative" {
|
|||
|
||||
resource "google_project_iam_member" "additive" {
|
||||
for_each = length(var.iam_additive_roles) > 0 ? local.iam_additive : {}
|
||||
project = google_project.project.project_id
|
||||
project = local.project.project_id
|
||||
role = each.value.role
|
||||
member = each.value.member
|
||||
depends_on = [
|
||||
google_project_service.project_services,
|
||||
google_project_iam_custom_role.roles
|
||||
]
|
||||
}
|
||||
|
||||
resource "google_project_iam_member" "oslogin_iam_serviceaccountuser" {
|
||||
for_each = var.oslogin ? toset(distinct(concat(var.oslogin_admins, var.oslogin_users))) : toset([])
|
||||
project = google_project.project.project_id
|
||||
project = local.project.project_id
|
||||
role = "roles/iam.serviceAccountUser"
|
||||
member = each.value
|
||||
}
|
||||
|
||||
resource "google_project_iam_member" "oslogin_compute_viewer" {
|
||||
for_each = var.oslogin ? toset(distinct(concat(var.oslogin_admins, var.oslogin_users))) : toset([])
|
||||
project = google_project.project.project_id
|
||||
project = local.project.project_id
|
||||
role = "roles/compute.viewer"
|
||||
member = each.value
|
||||
}
|
||||
|
||||
resource "google_project_iam_member" "oslogin_admins" {
|
||||
for_each = var.oslogin ? toset(var.oslogin_admins) : toset([])
|
||||
project = google_project.project.project_id
|
||||
project = local.project.project_id
|
||||
role = "roles/compute.osAdminLogin"
|
||||
member = each.value
|
||||
}
|
||||
|
||||
resource "google_project_iam_member" "oslogin_users" {
|
||||
for_each = var.oslogin ? toset(var.oslogin_users) : toset([])
|
||||
project = google_project.project.project_id
|
||||
project = local.project.project_id
|
||||
role = "roles/compute.osLogin"
|
||||
member = each.value
|
||||
}
|
||||
|
||||
resource "google_project_organization_policy" "boolean" {
|
||||
for_each = var.policy_boolean
|
||||
project = google_project.project.project_id
|
||||
project = local.project.project_id
|
||||
constraint = each.key
|
||||
|
||||
dynamic boolean_policy {
|
||||
|
@ -148,7 +161,7 @@ resource "google_project_organization_policy" "boolean" {
|
|||
|
||||
resource "google_project_organization_policy" "list" {
|
||||
for_each = var.policy_list
|
||||
project = google_project.project.project_id
|
||||
project = local.project.project_id
|
||||
constraint = each.key
|
||||
|
||||
dynamic list_policy {
|
||||
|
|
|
@ -16,7 +16,7 @@
|
|||
|
||||
output "project_id" {
|
||||
description = "Project id."
|
||||
value = google_project.project.project_id
|
||||
value = local.project.project_id
|
||||
depends_on = [
|
||||
google_project_organization_policy.boolean,
|
||||
google_project_organization_policy.list,
|
||||
|
@ -25,8 +25,8 @@ output "project_id" {
|
|||
}
|
||||
|
||||
output "name" {
|
||||
description = "Project ame."
|
||||
value = google_project.project.name
|
||||
description = "Project name."
|
||||
value = local.project.name
|
||||
depends_on = [
|
||||
google_project_organization_policy.boolean,
|
||||
google_project_organization_policy.list,
|
||||
|
@ -36,7 +36,7 @@ output "name" {
|
|||
|
||||
output "number" {
|
||||
description = "Project number."
|
||||
value = google_project.project.number
|
||||
value = local.project.number
|
||||
depends_on = [
|
||||
google_project_organization_policy.boolean,
|
||||
google_project_organization_policy.list,
|
||||
|
@ -56,5 +56,8 @@ output "service_accounts" {
|
|||
|
||||
output "custom_roles" {
|
||||
description = "Ids of the created custom roles."
|
||||
value = [for role in google_project_iam_custom_role.roles : role.role_id]
|
||||
value = {
|
||||
for name, role in google_project_iam_custom_role.roles :
|
||||
name => role.id
|
||||
}
|
||||
}
|
||||
|
|
|
@ -15,10 +15,10 @@
|
|||
*/
|
||||
|
||||
locals {
|
||||
service_account_cloud_services = "${google_project.project.number}@cloudservices.gserviceaccount.com"
|
||||
service_account_cloud_services = "${local.project.number}@cloudservices.gserviceaccount.com"
|
||||
service_accounts_default = {
|
||||
compute = "${google_project.project.number}-compute@developer.gserviceaccount.com"
|
||||
gae = "${google_project.project.project_id}@appspot.gserviceaccount.com"
|
||||
compute = "${local.project.number}-compute@developer.gserviceaccount.com"
|
||||
gae = "${local.project.project_id}@appspot.gserviceaccount.com"
|
||||
}
|
||||
service_accounts_robot_services = {
|
||||
cloudasset = "gcp-sa-cloudasset"
|
||||
|
@ -34,6 +34,6 @@ locals {
|
|||
}
|
||||
service_accounts_robots = {
|
||||
for service, name in local.service_accounts_robot_services :
|
||||
service => "service-${google_project.project.number}@${name}.iam.gserviceaccount.com"
|
||||
service => "service-${local.project.number}@${name}.iam.gserviceaccount.com"
|
||||
}
|
||||
}
|
||||
|
|
|
@ -23,7 +23,7 @@ variable "auto_create_network" {
|
|||
variable "billing_account" {
|
||||
description = "Billing account id."
|
||||
type = string
|
||||
default = ""
|
||||
default = null
|
||||
}
|
||||
|
||||
variable "custom_roles" {
|
||||
|
@ -92,8 +92,9 @@ variable "oslogin_users" {
|
|||
}
|
||||
|
||||
variable "parent" {
|
||||
description = "The resource name of the parent Folder or Organization. Must be of the form folders/folder_id or organizations/org_id."
|
||||
description = "Parent folder or organization in 'folders/folder_id' or 'organizations/org_id' format."
|
||||
type = string
|
||||
default = null
|
||||
}
|
||||
|
||||
variable "policy_boolean" {
|
||||
|
@ -119,8 +120,26 @@ variable "prefix" {
|
|||
default = null
|
||||
}
|
||||
|
||||
variable "project_create" {
|
||||
description = "Create project. When set to false, uses a data source to reference existing project."
|
||||
type = bool
|
||||
default = true
|
||||
}
|
||||
|
||||
variable "services" {
|
||||
description = "Service APIs to enable."
|
||||
type = list(string)
|
||||
default = []
|
||||
}
|
||||
|
||||
variable "service_config" {
|
||||
description = "Configure service API activation."
|
||||
type = object({
|
||||
disable_on_destroy = bool
|
||||
disable_dependent_services = bool
|
||||
})
|
||||
default = {
|
||||
disable_on_destroy = true
|
||||
disable_dependent_services = true
|
||||
}
|
||||
}
|
||||
|
|
|
@ -71,7 +71,7 @@ variable "oslogin_users" {
|
|||
|
||||
variable "parent" {
|
||||
type = string
|
||||
default = "folders/12345678"
|
||||
default = null
|
||||
}
|
||||
|
||||
variable "policy_boolean" {
|
||||
|
|
|
@ -32,7 +32,7 @@ def test_prefix(plan_runner):
|
|||
|
||||
def test_parent(plan_runner):
|
||||
"Test project parent."
|
||||
_, resources = plan_runner(FIXTURES_DIR)
|
||||
_, resources = plan_runner(FIXTURES_DIR, parent='folders/12345678')
|
||||
assert len(resources) == 1
|
||||
assert resources[0]['values']['folder_id'] == '12345678'
|
||||
assert resources[0]['values'].get('org_id') == None
|
||||
|
@ -40,3 +40,11 @@ def test_parent(plan_runner):
|
|||
assert len(resources) == 1
|
||||
assert resources[0]['values']['org_id'] == '12345678'
|
||||
assert resources[0]['values'].get('folder_id') == None
|
||||
|
||||
|
||||
def test_no_parent(plan_runner):
|
||||
"Test null project parent."
|
||||
_, resources = plan_runner(FIXTURES_DIR)
|
||||
assert len(resources) == 1
|
||||
assert resources[0]['values'].get('folder_id') == None
|
||||
assert resources[0]['values'].get('org_id') == None
|
||||
|
|
Loading…
Reference in New Issue