/** * Copyright 2022 Google LLC * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ locals { data_eng_principals_iam = [ for k in var.data_eng_principals : "user:${k}" ] iam = { # GCS roles "roles/storage.objectAdmin" = [ "serviceAccount:${module.project.service_accounts.robots.sql}", module.service-account-gcs.iam_email, ] # CloudSQL "roles/cloudsql.admin" = local.data_eng_principals_iam "roles/cloudsql.client" = concat( local.data_eng_principals_iam, [module.service-account-sql.iam_email] ) "roles/cloudsql.instanceUser" = concat( local.data_eng_principals_iam, [module.service-account-sql.iam_email] ) # compute engineering "roles/compute.instanceAdmin.v1" = local.data_eng_principals_iam "roles/compute.osLogin" = local.data_eng_principals_iam "roles/compute.viewer" = local.data_eng_principals_iam "roles/iap.tunnelResourceAccessor" = local.data_eng_principals_iam # common roles "roles/logging.admin" = local.data_eng_principals_iam "roles/iam.serviceAccountUser" = concat( local.data_eng_principals_iam ) "roles/iam.serviceAccountTokenCreator" = concat( local.data_eng_principals_iam ) # network roles "roles/compute.networkUser" = [ "serviceAccount:${module.project.service_accounts.robots.sql}" ] } shared_vpc_project = try(var.network_config.host_project, null) use_shared_vpc = var.network_config != null subnet = ( local.use_shared_vpc ? var.network_config.subnet_self_link : values(module.vpc.0.subnet_self_links)[0] ) vpc_self_link = ( local.use_shared_vpc ? var.network_config.network_self_link : module.vpc.0.self_link ) } module "project" { source = "../../../modules/project" name = var.project_id parent = try(var.project_create.parent, null) billing_account = try(var.project_create.billing_account_id, null) project_create = var.project_create != null prefix = var.project_create == null ? null : var.prefix iam = var.project_create != null ? local.iam : {} iam_additive = var.project_create == null ? local.iam : {} services = [ "cloudkms.googleapis.com", "compute.googleapis.com", "iap.googleapis.com", "logging.googleapis.com", "monitoring.googleapis.com", "networkmanagement.googleapis.com", "servicenetworking.googleapis.com", "sqladmin.googleapis.com", "sql-component.googleapis.com", "storage.googleapis.com", "storage-component.googleapis.com", ] shared_vpc_service_config = local.shared_vpc_project == null ? null : { attach = true host_project = local.shared_vpc_project } service_encryption_key_ids = { compute = try(values(var.service_encryption_keys), []) sql = try(values(var.service_encryption_keys), []) storage = try(values(var.service_encryption_keys), []) } service_config = { disable_on_destroy = false, disable_dependent_services = false } } module "vpc" { source = "../../../modules/net-vpc" count = local.use_shared_vpc ? 0 : 1 project_id = module.project.project_id name = "vpc" subnets = [ { ip_cidr_range = "10.0.0.0/20" name = "subnet" region = var.regions.primary } ] psa_config = { ranges = { cloud-sql = var.sql_configuration.psa_range } routes = null } } module "firewall" { source = "../../../modules/net-vpc-firewall" count = local.use_shared_vpc ? 0 : 1 project_id = module.project.project_id network = module.vpc.0.name default_rules_config = { admin_ranges = ["10.0.0.0/20"] } } module "nat" { source = "../../../modules/net-cloudnat" count = local.use_shared_vpc ? 0 : 1 project_id = module.project.project_id region = var.regions.primary name = "${var.prefix}-default" router_network = module.vpc.0.name }