/** * Copyright 2022 Google LLC * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ # tfdoc:file:description Networking stage resources. module "branch-network-folder" { source = "../../../modules/folder" parent = "organizations/${var.organization.id}" name = "Networking" group_iam = { (local.groups.gcp-network-admins) = [ # add any needed roles for resources/services not managed via Terraform, # or replace editor with ~viewer if no broad resource management needed # e.g. # "roles/compute.networkAdmin", # "roles/dns.admin", # "roles/compute.securityAdmin", "roles/editor", ] } iam = { "roles/logging.admin" = [module.branch-network-sa.iam_email] "roles/owner" = [module.branch-network-sa.iam_email] "roles/resourcemanager.folderAdmin" = [module.branch-network-sa.iam_email] "roles/resourcemanager.projectCreator" = [module.branch-network-sa.iam_email] "roles/compute.xpnAdmin" = [module.branch-network-sa.iam_email] } tag_bindings = { context = try(module.organization.tag_values["context/networking"].id, null) } } module "branch-network-prod-folder" { source = "../../../modules/folder" parent = module.branch-network-folder.id name = "Production" iam = { "roles/compute.xpnAdmin" = [ module.branch-dp-prod-sa.iam_email, module.branch-teams-prod-pf-sa.iam_email ] } tag_bindings = { environment = try(module.organization.tag_values["environment/production"].id, null) } } module "branch-network-dev-folder" { source = "../../../modules/folder" parent = module.branch-network-folder.id name = "Development" iam = { (local.custom_roles.service_project_network_admin) = [ module.branch-dp-dev-sa.iam_email, module.branch-teams-dev-pf-sa.iam_email ] } tag_bindings = { environment = try(module.organization.tag_values["environment/development"].id, null) } } # automation service account and bucket module "branch-network-sa" { source = "../../../modules/iam-service-account" project_id = var.automation.project_id name = "prod-resman-net-0" description = "Terraform resman networking service account." prefix = var.prefix iam = { "roles/iam.serviceAccountTokenCreator" = compact([ try(module.branch-network-sa-cicd.0.iam_email, null) ]) } iam_storage_roles = { (var.automation.outputs_bucket) = ["roles/storage.admin"] } } module "branch-network-gcs" { source = "../../../modules/gcs" project_id = var.automation.project_id name = "prod-resman-net-0" prefix = var.prefix versioning = true iam = { "roles/storage.objectAdmin" = [module.branch-network-sa.iam_email] } } # ci/cd service account module "branch-network-sa-cicd" { source = "../../../modules/iam-service-account" for_each = ( lookup(local.cicd_repositories, "networking", null) == null ? {} : { 0 = local.cicd_repositories.networking } ) project_id = var.automation.project_id name = "prod-resman-net-1" description = "Terraform CI/CD stage 2 networking service account." prefix = var.prefix iam = { "roles/iam.workloadIdentityUser" = [ each.value.branch == null ? format( local.identity_providers[each.value.identity_provider].principalset_tpl, var.automation.federated_identity_pool, each.value.name ) : format( local.identity_providers[each.value.identity_provider].principal_tpl, var.automation.federated_identity_pool, each.value.name, each.value.branch ) ] } iam_storage_roles = { (var.automation.outputs_bucket) = ["roles/storage.objectViewer"] } }