# Data Catalog Module This module simplifies the creation of [Data Catalog](https://cloud.google.com/data-catalog) Policy Tags. Policy Tags can be used to configure [Bigquery column-level access](https://cloud.google.com/bigquery/docs/best-practices-policy-tags). Note: Data Catalog is still in beta, hence this module currently uses the beta provider. - [IAM](#iam) - [Examples](#examples) - [Simple Taxonomy with policy tags](#simple-taxonomy-with-policy-tags) - [Taxonomy with IAM binding](#taxonomy-with-iam-binding) - [Variables](#variables) - [Outputs](#outputs) - [TODO](#todo) ## IAM IAM is managed via several variables that implement different features and levels of control: - `iam` and `group_iam` configure authoritative bindings that manage individual roles exclusively, and are internally merged - `iam_bindings` configure authoritative bindings with optional support for conditions, and are not internally merged with the previous two variables - `iam_bindings_additive` configure additive bindings via individual role/member pairs with optional support conditions The authoritative and additive approaches can be used together, provided different roles are managed by each. Some care must also be taken with the `groups_iam` variable to ensure that variable keys are static values, so that Terraform is able to compute the dependency graph. Refer to the [project module](../project/README.md#iam) for examples of the IAM interface. ## Examples ### Simple Taxonomy with policy tags ```hcl module "cmn-dc" { source = "./fabric/modules/data-catalog-policy-tag" name = "my-datacatalog-policy-tags" project_id = "my-project" tags = { low = {} medium = {} high = {} } } # tftest modules=1 resources=4 ``` ### Taxonomy with IAM binding ```hcl module "cmn-dc" { source = "./fabric/modules/data-catalog-policy-tag" name = "my-datacatalog-policy-tags" project_id = "my-project" tags = { low = {} medium = {} high = { iam = { "roles/datacatalog.categoryFineGrainedReader" = [ "group:GROUP_NAME@example.com" ] } } } iam = { "roles/datacatalog.categoryAdmin" = ["group:GROUP_NAME@example.com"] } iam_bindings_additive = { am1-admin = { member = "user:am1@example.com" role = "roles/datacatalog.categoryAdmin" } } } # tftest modules=1 resources=7 ``` ## Variables | name | description | type | required | default | |---|---|:---:|:---:|:---:| | [name](variables.tf#L77) | Name of this taxonomy. | string | ✓ | | | [project_id](variables.tf#L92) | GCP project id. | string | ✓ | | | [activated_policy_types](variables.tf#L17) | A list of policy types that are activated for this taxonomy. | list(string) | | ["FINE_GRAINED_ACCESS_CONTROL"] | | [description](variables.tf#L23) | Description of this taxonomy. | string | | "Taxonomy - Terraform managed" | | [group_iam](variables.tf#L29) | Authoritative IAM binding for organization groups, in {GROUP_EMAIL => [ROLES]} format. Group emails need to be static. Can be used in combination with the `iam` variable. | map(list(string)) | | {} | | [iam](variables.tf#L35) | IAM bindings in {ROLE => [MEMBERS]} format. | map(list(string)) | | {} | | [iam_bindings](variables.tf#L41) | Authoritative IAM bindings in {KEY => {role = ROLE, members = [], condition = {}}}. Keys are arbitrary. | map(object({…})) | | {} | | [iam_bindings_additive](variables.tf#L56) | Individual additive IAM bindings. Keys are arbitrary. | map(object({…})) | | {} | | [location](variables.tf#L71) | Data Catalog Taxonomy location. | string | | "eu" | | [prefix](variables.tf#L82) | Optional prefix used to generate project id and name. | string | | null | | [tags](variables.tf#L97) | List of Data Catalog Policy tags to be created with optional IAM binging configuration in {tag => {ROLE => [MEMBERS]}} format. | map(object({…})) | | {} | ## Outputs | name | description | sensitive | |---|---|:---:| | [id](outputs.tf#L17) | Fully qualified taxonomy id. | | | [tags](outputs.tf#L22) | Policy Tags. | | ## TODO - Support IAM at tag level. - Support Child policy tags