# Google Cloud Folder Module This module allows the creation and management of folders, including support for IAM bindings, organization policies, and hierarchical firewall rules. - [Basic example with IAM bindings](#basic-example-with-iam-bindings) - [IAM](#iam) - [Organization policies](#organization-policies) - [Organization Policy Factory](#organization-policy-factory) - [Hierarchical Firewall Policy Attachments](#hierarchical-firewall-policy-attachments) - [Log Sinks](#log-sinks) - [Data Access Logs](#data-access-logs) - [Tags](#tags) - [Files](#files) - [Variables](#variables) - [Outputs](#outputs) ## Basic example with IAM bindings ```hcl module "folder" { source = "./fabric/modules/folder" parent = var.folder_id name = "Folder name" iam_by_principals = { "group:${var.group_email}" = [ "roles/owner", "roles/resourcemanager.folderAdmin", "roles/resourcemanager.projectCreator" ] } iam = { "roles/owner" = ["serviceAccount:${var.service_account.email}"] } iam_bindings_additive = { am1-storage-admin = { member = "serviceAccount:${var.service_account.email}" role = "roles/storage.admin" } } } # tftest modules=1 resources=5 inventory=iam.yaml e2e ``` ## IAM IAM is managed via several variables that implement different features and levels of control: - `iam` and `iam_by_principals` configure authoritative bindings that manage individual roles exclusively, and are internally merged - `iam_bindings` configure authoritative bindings with optional support for conditions, and are not internally merged with the previous two variables - `iam_bindings_additive` configure additive bindings via individual role/member pairs with optional support conditions The authoritative and additive approaches can be used together, provided different roles are managed by each. Some care must also be taken with the `iam_by_principals` variable to ensure that variable keys are static values, so that Terraform is able to compute the dependency graph. Refer to the [project module](../project/README.md#iam) for examples of the IAM interface. ## Organization policies To manage organization policies, the `orgpolicy.googleapis.com` service should be enabled in the quota project. ```hcl module "folder" { source = "./fabric/modules/folder" parent = var.folder_id name = "Folder name" org_policies = { "compute.disableGuestAttributesAccess" = { rules = [{ enforce = true }] } "compute.skipDefaultNetworkCreation" = { rules = [{ enforce = true }] } "iam.disableServiceAccountKeyCreation" = { rules = [{ enforce = true }] } "iam.disableServiceAccountKeyUpload" = { rules = [ { condition = { expression = "resource.matchTagId('tagKeys/1234', 'tagValues/1234')" title = "condition" description = "test condition" location = "somewhere" } enforce = true }, { enforce = false } ] } "iam.allowedPolicyMemberDomains" = { rules = [{ allow = { values = ["C0xxxxxxx", "C0yyyyyyy"] } }] } "compute.trustedImageProjects" = { rules = [{ allow = { values = ["projects/my-project"] } }] } "compute.vmExternalIpAccess" = { rules = [{ deny = { all = true } }] } } } # tftest modules=1 resources=8 inventory=org-policies.yaml e2e ``` ### Organization Policy Factory Organization policies can be loaded from a directory containing YAML files where each file defines one or more constraints. The structure of the YAML files is exactly the same as the org_policies variable. Note that constraints defined via org_policies take precedence over those in org_policies_data_path. In other words, if you specify the same constraint in a YAML file and in the org_policies variable, the latter will take priority. The example below deploys a few organization policies split between two YAML files. ```hcl module "folder" { source = "./fabric/modules/folder" parent = var.folder_id name = "Folder name" factories_config = { org_policies = "configs/org-policies/" } } # tftest modules=1 resources=8 files=boolean,list inventory=org-policies.yaml e2e ``` ```yaml # tftest-file id=boolean path=configs/org-policies/boolean.yaml compute.disableGuestAttributesAccess: rules: - enforce: true compute.skipDefaultNetworkCreation: rules: - enforce: true iam.disableServiceAccountKeyCreation: rules: - enforce: true iam.disableServiceAccountKeyUpload: rules: - condition: description: test condition expression: resource.matchTagId('tagKeys/1234', 'tagValues/1234') location: somewhere title: condition enforce: true - enforce: false ``` ```yaml # tftest-file id=list path=configs/org-policies/list.yaml compute.trustedImageProjects: rules: - allow: values: - projects/my-project compute.vmExternalIpAccess: rules: - deny: all: true iam.allowedPolicyMemberDomains: rules: - allow: values: - C0xxxxxxx - C0yyyyyyy ``` ## Hierarchical Firewall Policy Attachments Hierarchical firewall policies can be managed via the [`net-firewall-policy`](../net-firewall-policy/) module, including support for factories. Once a policy is available, attaching it to the organization can be done either in the firewall policy module itself, or here: ```hcl module "firewall-policy" { source = "./fabric/modules/net-firewall-policy" name = "test-1" parent_id = module.folder.id # attachment via the firewall policy module # attachments = { # folder-1 = module.folder.id # } } module "folder" { source = "./fabric/modules/folder" parent = var.folder_id name = "Folder name" # attachment via the organization module firewall_policy = { name = "test-1" policy = module.firewall-policy.id } } # tftest modules=2 resources=3 e2e serial ``` ## Log Sinks ```hcl module "gcs" { source = "./fabric/modules/gcs" project_id = var.project_id prefix = var.prefix name = "gcs_sink" force_destroy = true } module "dataset" { source = "./fabric/modules/bigquery-dataset" project_id = var.project_id id = "bq_sink" } module "pubsub" { source = "./fabric/modules/pubsub" project_id = var.project_id name = "pubsub_sink" } module "bucket" { source = "./fabric/modules/logging-bucket" parent_type = "project" parent = var.project_id id = "${var.prefix}-bucket" } module "destination-project" { source = "./fabric/modules/project" name = "dest-prj" billing_account = var.billing_account_id parent = var.folder_id prefix = var.prefix services = [ "logging.googleapis.com" ] } module "folder-sink" { source = "./fabric/modules/folder" name = "Folder name" parent = var.folder_id logging_sinks = { warnings = { destination = module.gcs.id filter = "severity=WARNING" type = "storage" } info = { destination = module.dataset.id filter = "severity=INFO" type = "bigquery" } notice = { destination = module.pubsub.id filter = "severity=NOTICE" type = "pubsub" } debug = { destination = module.bucket.id filter = "severity=DEBUG" exclusions = { no-compute = "logName:compute" } type = "logging" } alert = { destination = module.destination-project.id filter = "severity=ALERT" type = "project" } } logging_exclusions = { no-gce-instances = "resource.type=gce_instance" } } # tftest modules=6 resources=18 inventory=logging.yaml e2e ``` ## Data Access Logs Activation of data access logs can be controlled via the `logging_data_access` variable. If the `iam_bindings_authoritative` variable is used to set a resource-level IAM policy, the data access log configuration will also be authoritative as part of the policy. This example shows how to set a non-authoritative access log configuration: ```hcl module "folder" { source = "./fabric/modules/folder" parent = var.folder_id name = "Folder name" logging_data_access = { allServices = { # logs for principals listed here will be excluded ADMIN_READ = ["group:${var.group_email}"] } "storage.googleapis.com" = { DATA_READ = [] DATA_WRITE = [] } } } # tftest modules=1 resources=3 inventory=logging-data-access.yaml e2e ``` ## Tags Refer to the [Creating and managing tags](https://cloud.google.com/resource-manager/docs/tags/tags-creating-and-managing) documentation for details on usage. ```hcl module "org" { source = "./fabric/modules/organization" organization_id = var.organization_id tags = { environment = { description = "Environment specification." values = { dev = {} prod = {} } } } } module "folder" { source = "./fabric/modules/folder" name = "Folder name" parent = var.folder_id tag_bindings = { env-prod = module.org.tag_values["environment/prod"].id } } # tftest modules=2 resources=5 inventory=tags.yaml e2e serial ``` ## Files | name | description | resources | |---|---|---| | [iam.tf](./iam.tf) | IAM bindings. | google_folder_iam_binding · google_folder_iam_member | | [logging.tf](./logging.tf) | Log sinks and supporting resources. | google_bigquery_dataset_iam_member · google_folder_iam_audit_config · google_logging_folder_exclusion · google_logging_folder_sink · google_project_iam_member · google_pubsub_topic_iam_member · google_storage_bucket_iam_member | | [main.tf](./main.tf) | Module-level locals and resources. | google_compute_firewall_policy_association · google_essential_contacts_contact · google_folder | | [organization-policies.tf](./organization-policies.tf) | Folder-level organization policies. | google_org_policy_policy | | [outputs.tf](./outputs.tf) | Module outputs. | | | [tags.tf](./tags.tf) | None | google_tags_tag_binding | | [variables-iam.tf](./variables-iam.tf) | None | | | [variables.tf](./variables.tf) | Module variables. | | | [versions.tf](./versions.tf) | Version pins. | | ## Variables | name | description | type | required | default | |---|---|:---:|:---:|:---:| | [contacts](variables.tf#L17) | List of essential contacts for this resource. Must be in the form EMAIL -> [NOTIFICATION_TYPES]. Valid notification types are ALL, SUSPENSION, SECURITY, TECHNICAL, BILLING, LEGAL, PRODUCT_UPDATES. | map(list(string)) | | {} | | [factories_config](variables.tf#L24) | Paths to data files and folders that enable factory functionality. | object({…}) | | {} | | [firewall_policy](variables.tf#L33) | Hierarchical firewall policy to associate to this folder. | object({…}) | | null | | [folder_create](variables.tf#L42) | Create folder. When set to false, uses id to reference an existing folder. | bool | | true | | [iam](variables-iam.tf#L17) | IAM bindings in {ROLE => [MEMBERS]} format. | map(list(string)) | | {} | | [iam_bindings](variables-iam.tf#L24) | Authoritative IAM bindings in {KEY => {role = ROLE, members = [], condition = {}}}. Keys are arbitrary. | map(object({…})) | | {} | | [iam_bindings_additive](variables-iam.tf#L39) | Individual additive IAM bindings. Keys are arbitrary. | map(object({…})) | | {} | | [iam_by_principals](variables-iam.tf#L54) | Authoritative IAM binding in {PRINCIPAL => [ROLES]} format. Principals need to be statically defined to avoid cycle errors. Merged internally with the `iam` variable. | map(list(string)) | | {} | | [id](variables.tf#L48) | Folder ID in case you use folder_create=false. | string | | null | | [logging_data_access](variables.tf#L54) | Control activation of data access logs. Format is service => { log type => [exempted members]}. The special 'allServices' key denotes configuration for all services. | map(map(list(string))) | | {} | | [logging_exclusions](variables.tf#L69) | Logging exclusions for this folder in the form {NAME -> FILTER}. | map(string) | | {} | | [logging_sinks](variables.tf#L76) | Logging sinks to create for the folder. | map(object({…})) | | {} | | [name](variables.tf#L107) | Folder name. | string | | null | | [org_policies](variables.tf#L113) | Organization policies applied to this folder keyed by policy name. | map(object({…})) | | {} | | [parent](variables.tf#L140) | Parent in folders/folder_id or organizations/org_id format. | string | | null | | [tag_bindings](variables.tf#L150) | Tag bindings for this folder, in key => tag value id format. | map(string) | | null | ## Outputs | name | description | sensitive | |---|---|:---:| | [folder](outputs.tf#L17) | Folder resource. | | | [id](outputs.tf#L22) | Fully qualified folder id. | | | [name](outputs.tf#L33) | Folder name. | | | [sink_writer_identities](outputs.tf#L38) | Writer identities created for each sink. | |