405 lines
12 KiB
HCL
405 lines
12 KiB
HCL
/**
|
|
* Copyright 2021 Google LLC
|
|
*
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
* you may not use this file except in compliance with the License.
|
|
* You may obtain a copy of the License at
|
|
*
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
*
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
* See the License for the specific language governing permissions and
|
|
* limitations under the License.
|
|
*/
|
|
|
|
locals {
|
|
attached_disks = {
|
|
for disk in var.attached_disks :
|
|
disk.name => merge(disk, {
|
|
options = disk.options == null ? var.attached_disk_defaults : disk.options
|
|
})
|
|
}
|
|
attached_disks_pairs = {
|
|
for pair in setproduct(keys(local.names), keys(local.attached_disks)) :
|
|
"${pair[0]}-${pair[1]}" => { disk_name = pair[1], name = pair[0] }
|
|
}
|
|
attached_region_disks_pairs = {
|
|
for k, v in local.attached_disks_pairs :
|
|
k => v if local.attached_disks[v.disk_name].options.regional
|
|
}
|
|
attached_zone_disks_pairs = {
|
|
for k, v in local.attached_disks_pairs :
|
|
k => v if !local.attached_disks[v.disk_name].options.regional
|
|
}
|
|
on_host_maintenance = (
|
|
var.options.preemptible || var.confidential_compute
|
|
? "TERMINATE"
|
|
: "MIGRATE"
|
|
)
|
|
iam_members = var.use_instance_template ? {} : {
|
|
for pair in setproduct(keys(var.iam), keys(local.names)) :
|
|
"${pair.0}/${pair.1}" => { role = pair.0, name = pair.1, members = var.iam[pair.0] }
|
|
}
|
|
names = (
|
|
var.use_instance_template
|
|
? { (var.name) = 0 }
|
|
: (
|
|
var.single_name && var.instance_count == 1
|
|
? { (var.name) = 0 }
|
|
: { for i in range(0, var.instance_count) : "${var.name}-${i + 1}" => i }
|
|
)
|
|
)
|
|
service_account_email = (
|
|
var.service_account_create
|
|
? (
|
|
length(google_service_account.service_account) > 0
|
|
? google_service_account.service_account[0].email
|
|
: null
|
|
)
|
|
: var.service_account
|
|
)
|
|
service_account_scopes = (
|
|
length(var.service_account_scopes) > 0
|
|
? var.service_account_scopes
|
|
: (
|
|
var.service_account_create
|
|
? [
|
|
"https://www.googleapis.com/auth/cloud-platform",
|
|
"https://www.googleapis.com/auth/userinfo.email"
|
|
]
|
|
: [
|
|
"https://www.googleapis.com/auth/devstorage.read_only",
|
|
"https://www.googleapis.com/auth/logging.write",
|
|
"https://www.googleapis.com/auth/monitoring.write"
|
|
]
|
|
)
|
|
)
|
|
zones_list = length(var.zones) == 0 ? ["${var.region}-b"] : var.zones
|
|
zones = {
|
|
for name, i in local.names : name => element(local.zones_list, i)
|
|
}
|
|
}
|
|
|
|
resource "google_compute_disk" "disks" {
|
|
for_each = var.use_instance_template ? {} : {
|
|
for k, v in local.attached_zone_disks_pairs :
|
|
k => v if local.attached_disks[v.disk_name].source_type != "attach"
|
|
}
|
|
project = var.project_id
|
|
zone = local.zones[each.value.name]
|
|
name = each.key
|
|
type = local.attached_disks[each.value.disk_name].options.type
|
|
size = local.attached_disks[each.value.disk_name].size
|
|
image = (
|
|
local.attached_disks[each.value.disk_name].source_type == "image"
|
|
? local.attached_disks[each.value.disk_name].source
|
|
: null
|
|
)
|
|
snapshot = (
|
|
local.attached_disks[each.value.disk_name].source_type == "snapshot"
|
|
? local.attached_disks[each.value.disk_name].source
|
|
: null
|
|
)
|
|
labels = merge(var.labels, {
|
|
disk_name = local.attached_disks[each.value.disk_name].name
|
|
disk_type = local.attached_disks[each.value.disk_name].options.type
|
|
# Disk images usually have slashes, which is against label
|
|
# restrictions
|
|
# image = local.attached_disks[each.value.disk_name].image
|
|
})
|
|
dynamic "disk_encryption_key" {
|
|
for_each = var.encryption != null ? [""] : []
|
|
content {
|
|
raw_key = var.encryption.disk_encryption_key_raw
|
|
kms_key_self_link = var.encryption.kms_key_self_link
|
|
}
|
|
}
|
|
}
|
|
|
|
resource "google_compute_region_disk" "disks" {
|
|
provider = google-beta
|
|
for_each = var.use_instance_template ? {} : {
|
|
for k, v in local.attached_region_disks_pairs :
|
|
k => v if local.attached_disks[v.disk_name].source_type != "attach"
|
|
}
|
|
project = var.project_id
|
|
region = var.region
|
|
replica_zones = var.zones
|
|
name = each.key
|
|
type = local.attached_disks[each.value.disk_name].options.type
|
|
size = local.attached_disks[each.value.disk_name].size
|
|
snapshot = (
|
|
local.attached_disks[each.value.disk_name].source_type == "snapshot"
|
|
? local.attached_disks[each.value.disk_name].source
|
|
: null
|
|
)
|
|
labels = merge(var.labels, {
|
|
disk_name = local.attached_disks[each.value.disk_name].name
|
|
disk_type = local.attached_disks[each.value.disk_name].options.type
|
|
})
|
|
dynamic "disk_encryption_key" {
|
|
for_each = var.encryption != null ? [""] : []
|
|
content {
|
|
raw_key = var.encryption.disk_encryption_key_raw
|
|
kms_key_name = var.encryption.kms_key_self_link
|
|
}
|
|
}
|
|
}
|
|
|
|
resource "google_compute_instance" "default" {
|
|
provider = google-beta
|
|
for_each = var.use_instance_template ? {} : local.names
|
|
project = var.project_id
|
|
zone = local.zones[each.key]
|
|
name = each.key
|
|
hostname = var.hostname
|
|
description = "Managed by the compute-vm Terraform module."
|
|
tags = var.tags
|
|
machine_type = var.instance_type
|
|
min_cpu_platform = var.min_cpu_platform
|
|
can_ip_forward = var.can_ip_forward
|
|
allow_stopping_for_update = var.options.allow_stopping_for_update
|
|
deletion_protection = var.options.deletion_protection
|
|
enable_display = var.enable_display
|
|
labels = var.labels
|
|
metadata = merge(
|
|
var.metadata, try(element(var.metadata_list, each.value), {})
|
|
)
|
|
|
|
dynamic "attached_disk" {
|
|
for_each = {
|
|
for resource_name, pair in local.attached_disks_pairs :
|
|
resource_name => local.attached_disks[pair.disk_name]
|
|
if pair.name == each.key
|
|
}
|
|
iterator = config
|
|
content {
|
|
device_name = config.value.name
|
|
mode = config.value.options.mode
|
|
source = (
|
|
config.value.source_type == "attach"
|
|
? config.value.source
|
|
: (
|
|
config.value.options.regional
|
|
? google_compute_region_disk.disks[config.key].id
|
|
: google_compute_disk.disks[config.key].name
|
|
)
|
|
)
|
|
}
|
|
}
|
|
|
|
boot_disk {
|
|
initialize_params {
|
|
type = var.boot_disk.type
|
|
image = var.boot_disk.image
|
|
size = var.boot_disk.size
|
|
}
|
|
disk_encryption_key_raw = var.encryption != null ? var.encryption.disk_encryption_key_raw : null
|
|
kms_key_self_link = var.encryption != null ? var.encryption.kms_key_self_link : null
|
|
}
|
|
|
|
dynamic "confidential_instance_config" {
|
|
for_each = var.confidential_compute ? [""] : []
|
|
content {
|
|
enable_confidential_compute = true
|
|
}
|
|
}
|
|
|
|
dynamic "network_interface" {
|
|
for_each = var.network_interfaces
|
|
iterator = config
|
|
content {
|
|
network = config.value.network
|
|
subnetwork = config.value.subnetwork
|
|
network_ip = config.value.addresses == null ? null : (
|
|
length(config.value.addresses.internal) == 0
|
|
? null
|
|
: config.value.addresses.internal[each.value]
|
|
)
|
|
dynamic "access_config" {
|
|
for_each = config.value.nat ? [config.value.addresses] : []
|
|
iterator = addresses
|
|
content {
|
|
nat_ip = addresses.value == null ? null : (
|
|
length(addresses.value.external) == 0 ? null : addresses.value.external[each.value]
|
|
)
|
|
}
|
|
}
|
|
dynamic "alias_ip_range" {
|
|
for_each = config.value.alias_ips != null ? config.value.alias_ips : {}
|
|
iterator = alias_ips
|
|
content {
|
|
subnetwork_range_name = alias_ips.key
|
|
ip_cidr_range = alias_ips.value[each.value]
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
scheduling {
|
|
automatic_restart = !var.options.preemptible
|
|
on_host_maintenance = local.on_host_maintenance
|
|
preemptible = var.options.preemptible
|
|
}
|
|
|
|
dynamic "scratch_disk" {
|
|
for_each = [
|
|
for i in range(0, var.scratch_disks.count) : var.scratch_disks.interface
|
|
]
|
|
iterator = config
|
|
content {
|
|
interface = config.value
|
|
}
|
|
}
|
|
|
|
service_account {
|
|
email = local.service_account_email
|
|
scopes = local.service_account_scopes
|
|
}
|
|
|
|
dynamic "shielded_instance_config" {
|
|
for_each = var.shielded_config != null ? [var.shielded_config] : []
|
|
iterator = config
|
|
content {
|
|
enable_secure_boot = config.value.enable_secure_boot
|
|
enable_vtpm = config.value.enable_vtpm
|
|
enable_integrity_monitoring = config.value.enable_integrity_monitoring
|
|
}
|
|
}
|
|
|
|
# guest_accelerator
|
|
}
|
|
|
|
resource "google_compute_instance_iam_binding" "default" {
|
|
for_each = local.iam_members
|
|
project = var.project_id
|
|
zone = local.zones[each.value.name]
|
|
instance_name = each.value.name
|
|
role = each.value.role
|
|
members = each.value.members
|
|
depends_on = [google_compute_instance.default]
|
|
}
|
|
|
|
resource "google_compute_instance_template" "default" {
|
|
provider = google-beta
|
|
count = var.use_instance_template ? 1 : 0
|
|
project = var.project_id
|
|
region = var.region
|
|
name_prefix = "${var.name}-"
|
|
description = "Managed by the compute-vm Terraform module."
|
|
tags = var.tags
|
|
machine_type = var.instance_type
|
|
min_cpu_platform = var.min_cpu_platform
|
|
can_ip_forward = var.can_ip_forward
|
|
metadata = var.metadata
|
|
labels = var.labels
|
|
|
|
disk {
|
|
source_image = var.boot_disk.image
|
|
disk_type = var.boot_disk.type
|
|
disk_size_gb = var.boot_disk.size
|
|
boot = true
|
|
}
|
|
|
|
dynamic "confidential_instance_config" {
|
|
for_each = var.confidential_compute ? [""] : []
|
|
content {
|
|
enable_confidential_compute = true
|
|
}
|
|
}
|
|
|
|
dynamic "disk" {
|
|
for_each = local.attached_disks
|
|
iterator = config
|
|
content {
|
|
auto_delete = config.value.options.auto_delete
|
|
device_name = config.value.name
|
|
# Cannot use `source` with any of the fields in
|
|
# [disk_size_gb disk_name disk_type source_image labels]
|
|
disk_type = (
|
|
config.value.source_type != "attach" ? config.value.options.type : null
|
|
)
|
|
disk_size_gb = (
|
|
config.value.source_type != "attach" ? config.value.size : null
|
|
)
|
|
mode = config.value.options.mode
|
|
source_image = (
|
|
config.value.source_type == "image" ? config.value.source : null
|
|
)
|
|
source = (
|
|
config.value.source_type == "attach" ? config.value.source : null
|
|
)
|
|
disk_name = (
|
|
config.value.source_type != "attach" ? config.value.name : null
|
|
)
|
|
type = "PERSISTENT"
|
|
}
|
|
}
|
|
|
|
dynamic "network_interface" {
|
|
for_each = var.network_interfaces
|
|
iterator = config
|
|
content {
|
|
network = config.value.network
|
|
subnetwork = config.value.subnetwork
|
|
dynamic "access_config" {
|
|
for_each = config.value.nat ? [""] : []
|
|
content {}
|
|
}
|
|
}
|
|
}
|
|
|
|
scheduling {
|
|
automatic_restart = !var.options.preemptible
|
|
on_host_maintenance = local.on_host_maintenance
|
|
preemptible = var.options.preemptible
|
|
}
|
|
|
|
service_account {
|
|
email = local.service_account_email
|
|
scopes = local.service_account_scopes
|
|
}
|
|
|
|
lifecycle {
|
|
create_before_destroy = true
|
|
}
|
|
}
|
|
|
|
resource "google_compute_instance_group" "unmanaged" {
|
|
for_each = toset(
|
|
var.group != null && !var.use_instance_template
|
|
? local.zones_list
|
|
: []
|
|
)
|
|
project = var.project_id
|
|
network = (
|
|
length(var.network_interfaces) > 0
|
|
? var.network_interfaces.0.network
|
|
: ""
|
|
)
|
|
zone = each.key
|
|
name = "${var.name}-${each.key}"
|
|
description = "Terraform-managed."
|
|
instances = [
|
|
for name, instance in google_compute_instance.default :
|
|
instance.self_link if instance.zone == each.key
|
|
]
|
|
dynamic "named_port" {
|
|
for_each = var.group.named_ports != null ? var.group.named_ports : {}
|
|
iterator = config
|
|
content {
|
|
name = config.key
|
|
port = config.value
|
|
}
|
|
}
|
|
}
|
|
|
|
resource "google_service_account" "service_account" {
|
|
count = var.service_account_create ? 1 : 0
|
|
project = var.project_id
|
|
account_id = "tf-vm-${var.name}"
|
|
display_name = "Terraform VM ${var.name}."
|
|
}
|