247 lines
8.7 KiB
HCL
247 lines
8.7 KiB
HCL
/**
|
|
* Copyright 2023 Google LLC
|
|
*
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
* you may not use this file except in compliance with the License.
|
|
* You may obtain a copy of the License at
|
|
*
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
*
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
* See the License for the specific language governing permissions and
|
|
* limitations under the License.
|
|
*/
|
|
|
|
# tfdoc:file:description Subnet resources.
|
|
|
|
locals {
|
|
_factory_data = {
|
|
for f in try(fileset(var.factories_config.subnets_folder, "**/*.yaml"), []) :
|
|
trimsuffix(basename(f), ".yaml") => yamldecode(file("${var.factories_config.subnets_folder}/${f}"))
|
|
}
|
|
_factory_subnets = {
|
|
for k, v in local._factory_data :
|
|
"${v.region}/${try(v.name, k)}" => {
|
|
active = try(v.active, true)
|
|
description = try(v.description, null)
|
|
enable_private_access = try(v.enable_private_access, true)
|
|
flow_logs_config = can(v.flow_logs_config) ? {
|
|
aggregation_interval = try(v.flow_logs_config.aggregation_interval, null)
|
|
filter_expression = try(v.flow_logs_config.filter_expression, null)
|
|
flow_sampling = try(v.flow_logs_config.flow_sampling, null)
|
|
metadata = try(v.flow_logs_config.metadata, null)
|
|
metadata_fields = try(v.flow_logs_config.metadata_fields, null)
|
|
} : null
|
|
global = try(v.global, false)
|
|
ip_cidr_range = v.ip_cidr_range
|
|
ipv6 = !can(v.ipv6) ? null : {
|
|
access_type = try(v.ipv6.access_type, "INTERNAL")
|
|
}
|
|
name = try(v.name, k)
|
|
region = v.region
|
|
secondary_ip_ranges = try(v.secondary_ip_ranges, null)
|
|
iam = try(v.iam, {})
|
|
iam_bindings = !can(v.iam_bindings) ? {} : {
|
|
for k2, v2 in v.iam_bindings :
|
|
k2 => {
|
|
role = v2.role
|
|
members = v2.members
|
|
condition = !can(v2.condition) ? null : {
|
|
expression = v2.condition.expression
|
|
title = v2.condition.title
|
|
description = try(v2.condition.description, null)
|
|
}
|
|
}
|
|
}
|
|
iam_bindings_additive = !can(v.iam_bindings_additive) ? {} : {
|
|
for k2, v2 in v.iam_bindings_additive :
|
|
k2 => {
|
|
member = v2.member
|
|
role = v2.role
|
|
condition = !can(v2.condition) ? null : {
|
|
expression = v2.condition.expression
|
|
title = v2.condition.title
|
|
description = try(v2.condition.description, null)
|
|
}
|
|
}
|
|
}
|
|
_is_regular = !try(v.psc == true, false) && !try(v.proxy_only == true, false)
|
|
_is_psc = try(v.psc == true, false)
|
|
_is_proxy_only = try(v.proxy_only == true, false)
|
|
}
|
|
}
|
|
|
|
all_subnets = merge(
|
|
{ for k, v in google_compute_subnetwork.subnetwork : k => v },
|
|
{ for k, v in google_compute_subnetwork.proxy_only : k => v },
|
|
{ for k, v in google_compute_subnetwork.psc : k => v }
|
|
)
|
|
subnet_iam = flatten(concat(
|
|
[
|
|
for s in concat(var.subnets, var.subnets_psc, var.subnets_proxy_only, values(local._factory_subnets)) : [
|
|
for role, members in s.iam :
|
|
{
|
|
role = role
|
|
members = members
|
|
subnet = "${s.region}/${s.name}"
|
|
}
|
|
]
|
|
],
|
|
))
|
|
subnet_iam_bindings = merge([
|
|
for s in concat(var.subnets, var.subnets_psc, var.subnets_proxy_only, values(local._factory_subnets)) : {
|
|
for key, data in s.iam_bindings :
|
|
key => {
|
|
role = data.role
|
|
subnet = "${s.region}/${s.name}"
|
|
members = data.members
|
|
condition = data.condition
|
|
}
|
|
}
|
|
]...)
|
|
# note: all additive bindings share a single namespace for the key.
|
|
# In other words, if you have multiple additive bindings with the
|
|
# same name, only one will be used
|
|
subnet_iam_bindings_additive = merge([
|
|
for s in concat(var.subnets, var.subnets_psc, var.subnets_proxy_only, values(local._factory_subnets)) : {
|
|
for key, data in s.iam_bindings_additive :
|
|
key => {
|
|
role = data.role
|
|
subnet = "${s.region}/${s.name}"
|
|
member = data.member
|
|
condition = data.condition
|
|
}
|
|
}
|
|
]...)
|
|
subnets = merge(
|
|
{ for s in var.subnets : "${s.region}/${s.name}" => s },
|
|
{ for k, v in local._factory_subnets : k => v if v._is_regular }
|
|
)
|
|
subnets_proxy_only = merge(
|
|
{ for s in var.subnets_proxy_only : "${s.region}/${s.name}" => s },
|
|
{ for k, v in local._factory_subnets : k => v if v._is_proxy_only },
|
|
)
|
|
subnets_psc = merge(
|
|
{ for s in var.subnets_psc : "${s.region}/${s.name}" => s },
|
|
{ for k, v in local._factory_subnets : k => v if v._is_psc }
|
|
)
|
|
}
|
|
|
|
resource "google_compute_subnetwork" "subnetwork" {
|
|
for_each = local.subnets
|
|
project = var.project_id
|
|
network = local.network.name
|
|
name = each.value.name
|
|
region = each.value.region
|
|
ip_cidr_range = each.value.ip_cidr_range
|
|
description = (
|
|
each.value.description == null
|
|
? "Terraform-managed."
|
|
: each.value.description
|
|
)
|
|
private_ip_google_access = each.value.enable_private_access
|
|
secondary_ip_range = each.value.secondary_ip_ranges == null ? [] : [
|
|
for name, range in each.value.secondary_ip_ranges :
|
|
{ range_name = name, ip_cidr_range = range }
|
|
]
|
|
stack_type = (
|
|
try(each.value.ipv6, null) != null ? "IPV4_IPV6" : null
|
|
)
|
|
ipv6_access_type = (
|
|
try(each.value.ipv6, null) != null ? each.value.ipv6.access_type : null
|
|
)
|
|
# private_ipv6_google_access = try(each.value.ipv6.enable_private_access, null)
|
|
dynamic "log_config" {
|
|
for_each = each.value.flow_logs_config != null ? [""] : []
|
|
content {
|
|
aggregation_interval = each.value.flow_logs_config.aggregation_interval
|
|
filter_expr = each.value.flow_logs_config.filter_expression
|
|
flow_sampling = each.value.flow_logs_config.flow_sampling
|
|
metadata = each.value.flow_logs_config.metadata
|
|
metadata_fields = (
|
|
each.value.flow_logs_config.metadata == "CUSTOM_METADATA"
|
|
? each.value.flow_logs_config.metadata_fields
|
|
: null
|
|
)
|
|
}
|
|
}
|
|
}
|
|
|
|
resource "google_compute_subnetwork" "proxy_only" {
|
|
for_each = local.subnets_proxy_only
|
|
project = var.project_id
|
|
network = local.network.name
|
|
name = each.value.name
|
|
region = each.value.region
|
|
ip_cidr_range = each.value.ip_cidr_range
|
|
description = coalesce(
|
|
each.value.description,
|
|
"Terraform-managed proxy-only subnet for Regional HTTPS, Internal HTTPS or Cross-Regional HTTPS Internal LB."
|
|
)
|
|
purpose = each.value.global ? "GLOBAL_MANAGED_PROXY" : "REGIONAL_MANAGED_PROXY"
|
|
role = each.value.active ? "ACTIVE" : "BACKUP"
|
|
}
|
|
|
|
resource "google_compute_subnetwork" "psc" {
|
|
for_each = local.subnets_psc
|
|
project = var.project_id
|
|
network = local.network.name
|
|
name = each.value.name
|
|
region = each.value.region
|
|
ip_cidr_range = each.value.ip_cidr_range
|
|
description = coalesce(
|
|
each.value.description,
|
|
"Terraform-managed subnet for Private Service Connect (PSC NAT)."
|
|
)
|
|
purpose = "PRIVATE_SERVICE_CONNECT"
|
|
}
|
|
|
|
|
|
resource "google_compute_subnetwork_iam_binding" "authoritative" {
|
|
for_each = {
|
|
for binding in local.subnet_iam :
|
|
"${binding.subnet}.${binding.role}" => binding
|
|
}
|
|
project = var.project_id
|
|
subnetwork = local.all_subnets[each.value.subnet].name
|
|
region = local.all_subnets[each.value.subnet].region
|
|
role = each.value.role
|
|
members = each.value.members
|
|
}
|
|
|
|
resource "google_compute_subnetwork_iam_binding" "bindings" {
|
|
for_each = local.subnet_iam_bindings
|
|
project = var.project_id
|
|
subnetwork = local.all_subnets[each.value.subnet].name
|
|
region = local.all_subnets[each.value.subnet].region
|
|
role = each.value.role
|
|
members = each.value.members
|
|
dynamic "condition" {
|
|
for_each = each.value.condition == null ? [] : [""]
|
|
content {
|
|
expression = each.value.condition.expression
|
|
title = each.value.condition.title
|
|
description = each.value.condition.description
|
|
}
|
|
}
|
|
}
|
|
|
|
resource "google_compute_subnetwork_iam_member" "bindings" {
|
|
for_each = local.subnet_iam_bindings_additive
|
|
project = var.project_id
|
|
subnetwork = local.all_subnets[each.value.subnet].name
|
|
region = local.all_subnets[each.value.subnet].region
|
|
role = each.value.role
|
|
member = each.value.member
|
|
dynamic "condition" {
|
|
for_each = each.value.condition == null ? [] : [""]
|
|
content {
|
|
expression = each.value.condition.expression
|
|
title = each.value.condition.title
|
|
description = each.value.condition.description
|
|
}
|
|
}
|
|
}
|