/** * Copyright 2023 Google LLC * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ locals { _vpcaccess_annotation = ( local.vpc_connector_create ? { "run.googleapis.com/vpc-access-connector" = google_vpc_access_connector.connector.0.id } : ( var.revision_annotations.vpcaccess_connector == null ? {} : { "run.googleapis.com/vpc-access-connector" = ( var.revision_annotations.vpcaccess_connector ) } ) ) annotations = merge( var.ingress_settings == null ? {} : { "run.googleapis.com/ingress" = var.ingress_settings }, ) prefix = var.prefix == null ? "" : "${var.prefix}-" revision_annotations = merge( try(var.revision_annotations.autoscaling, null) == null ? {} : { "autoscaling.knative.dev/maxScale" = ( var.revision_annotations.autoscaling.max_scale ) }, try(var.revision_annotations.autoscaling.min_scale, null) == null ? {} : { "autoscaling.knative.dev/minScale" = ( var.revision_annotations.autoscaling.min_scale ) }, length(var.revision_annotations.cloudsql_instances) == 0 ? {} : { "run.googleapis.com/cloudsql-instances" = ( join(",", var.revision_annotations.cloudsql_instances) ) }, local._vpcaccess_annotation, var.revision_annotations.vpcaccess_egress == null ? {} : { "run.googleapis.com/vpc-access-egress" = ( var.revision_annotations.vpcaccess_egress ) }, var.gen2_execution_environment ? { "run.googleapis.com/execution-environment" = "gen2" } : {}, var.startup_cpu_boost ? { "run.googleapis.com/startup-cpu-boost" = "true" } : {}, ) revision_name = ( try(var.revision_name, null) == null ? null : "${var.name}-${var.revision_name}" ) service_account_email = ( var.service_account_create ? ( length(google_service_account.service_account) > 0 ? google_service_account.service_account[0].email : null ) : var.service_account ) trigger_sa_create = try( var.eventarc_triggers.service_account_create, false ) trigger_sa_email = try( google_service_account.trigger_service_account[0].email, null ) vpc_connector_create = var.vpc_connector_create != null } resource "google_vpc_access_connector" "connector" { count = local.vpc_connector_create ? 1 : 0 project = var.project_id name = ( var.vpc_connector_create.name != null ? var.vpc_connector_create.name : var.name ) region = var.region ip_cidr_range = var.vpc_connector_create.ip_cidr_range network = var.vpc_connector_create.vpc_self_link machine_type = var.vpc_connector_create.machine_type max_instances = var.vpc_connector_create.instances.max max_throughput = var.vpc_connector_create.throughput.max min_instances = var.vpc_connector_create.instances.min min_throughput = var.vpc_connector_create.throughput.min subnet { name = var.vpc_connector_create.subnet.name project_id = var.vpc_connector_create.subnet.project_id } } resource "google_cloud_run_service" "service" { provider = google-beta project = var.project_id location = var.region name = "${local.prefix}${var.name}" template { spec { container_concurrency = var.container_concurrency service_account_name = local.service_account_email timeout_seconds = var.timeout_seconds dynamic "containers" { for_each = var.containers content { image = containers.value.image args = containers.value.args command = containers.value.command dynamic "env" { for_each = containers.value.env content { name = env.key value = env.value } } dynamic "env" { for_each = containers.value.env_from_key content { name = env.key value_from { secret_key_ref { key = env.value.key name = env.value.name } } } } dynamic "liveness_probe" { for_each = containers.value.liveness_probe == null ? [] : [""] content { failure_threshold = containers.value.liveness_probe.failure_threshold initial_delay_seconds = containers.value.liveness_probe.initial_delay_seconds period_seconds = containers.value.liveness_probe.period_seconds timeout_seconds = containers.value.liveness_probe.timeout_seconds dynamic "grpc" { for_each = ( containers.value.liveness_probe.action.grpc == null ? [] : [""] ) content { port = containers.value.liveness_probe.action.grpc.port service = containers.value.liveness_probe.action.grpc.service } } dynamic "http_get" { for_each = ( containers.value.liveness_probe.action.http_get == null ? [] : [""] ) content { path = containers.value.liveness_probe.action.http_get.path dynamic "http_headers" { for_each = ( containers.value.liveness_probe.action.http_get.http_headers ) content { name = http_headers.key value = http_headers.value } } } } } } dynamic "ports" { for_each = containers.value.ports content { container_port = ports.value.container_port name = ports.value.name protocol = ports.value.protocol } } dynamic "resources" { for_each = containers.value.resources == null ? [] : [""] content { limits = containers.value.resources.limits requests = containers.value.resources.requests } } dynamic "startup_probe" { for_each = containers.value.startup_probe == null ? [] : [""] content { failure_threshold = containers.value.startup_probe.failure_threshold initial_delay_seconds = containers.value.startup_probe.initial_delay_seconds period_seconds = containers.value.startup_probe.period_seconds timeout_seconds = containers.value.startup_probe.timeout_seconds dynamic "grpc" { for_each = ( containers.value.startup_probe.action.grpc == null ? [] : [""] ) content { port = containers.value.startup_probe.action.grpc.port service = containers.value.startup_probe.action.grpc.service } } dynamic "http_get" { for_each = ( containers.value.startup_probe.action.http_get == null ? [] : [""] ) content { path = containers.value.startup_probe.action.http_get.path dynamic "http_headers" { for_each = ( containers.value.startup_probe.action.http_get.http_headers ) content { name = http_headers.key value = http_headers.value } } } } dynamic "tcp_socket" { for_each = ( containers.value.startup_probe.action.tcp_socket == null ? [] : [""] ) content { port = containers.value.startup_probe.action.tcp_socket.port } } } } dynamic "volume_mounts" { for_each = containers.value.volume_mounts content { name = volume_mounts.key mount_path = volume_mounts.value } } } } dynamic "volumes" { for_each = var.volumes content { name = volumes.key secret { secret_name = volumes.value.secret_name default_mode = volumes.value.default_mode dynamic "items" { for_each = volumes.value.items content { key = items.key path = items.value.path mode = items.value.mode } } } } } } metadata { name = local.revision_name annotations = local.revision_annotations } } metadata { annotations = local.annotations labels = var.labels } dynamic "traffic" { for_each = var.traffic content { percent = traffic.value.percent latest_revision = traffic.value.latest == true revision_name = ( traffic.value.latest == true ? null : "${var.name}-${traffic.key}" ) tag = traffic.value.tag } } lifecycle { ignore_changes = [ metadata.0.annotations["run.googleapis.com/operation-id"], template.0.metadata.0.labels["run.googleapis.com/startupProbeType"] ] } } resource "google_cloud_run_service_iam_binding" "binding" { for_each = var.iam project = google_cloud_run_service.service.project location = google_cloud_run_service.service.location service = google_cloud_run_service.service.name role = each.key members = ( each.key != "roles/run.invoker" || !local.trigger_sa_create ? each.value # if invoker role is present and we create trigger sa, add it as member : concat( each.value, ["serviceAccount:${local.trigger_sa_email}"] ) ) } resource "google_cloud_run_service_iam_member" "default" { # if authoritative invoker role is not present and we create trigger sa # use additive binding to grant it the role count = ( lookup(var.iam, "roles/run.invoker", null) == null && local.trigger_sa_create ) ? 1 : 0 project = google_cloud_run_service.service.project location = google_cloud_run_service.service.location service = google_cloud_run_service.service.name role = "roles/run.invoker" member = "serviceAccount:${local.trigger_sa_email}" } resource "google_service_account" "service_account" { count = var.service_account_create ? 1 : 0 project = var.project_id account_id = "tf-cr-${var.name}" display_name = "Terraform Cloud Run ${var.name}." } resource "google_eventarc_trigger" "audit_log_triggers" { for_each = var.eventarc_triggers.audit_log name = "${local.prefix}audit-log-${each.key}" location = google_cloud_run_service.service.location project = google_cloud_run_service.service.project matching_criteria { attribute = "type" value = "google.cloud.audit.log.v1.written" } matching_criteria { attribute = "serviceName" value = each.value.service } matching_criteria { attribute = "methodName" value = each.value.method } destination { cloud_run_service { service = google_cloud_run_service.service.name region = google_cloud_run_service.service.location } } service_account = local.trigger_sa_email } resource "google_eventarc_trigger" "pubsub_triggers" { for_each = var.eventarc_triggers.pubsub name = "${local.prefix}pubsub-${each.key}" location = google_cloud_run_service.service.location project = google_cloud_run_service.service.project matching_criteria { attribute = "type" value = "google.cloud.pubsub.topic.v1.messagePublished" } transport { pubsub { topic = each.value } } destination { cloud_run_service { service = google_cloud_run_service.service.name region = google_cloud_run_service.service.location } } service_account = local.trigger_sa_email } resource "google_service_account" "trigger_service_account" { count = local.trigger_sa_create ? 1 : 0 project = var.project_id account_id = "tf-cr-trigger-${var.name}" display_name = "Terraform trigger for Cloud Run ${var.name}." }