terraform/modules/cloud-dns/main.tf (162 lines of code) (raw):

# # Copyright 2023 Google LLC # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # https://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. # resource "google_dns_managed_zone" "peering" { count = var.type == "peering" ? 1 : 0 provider = google-beta project = var.project_id name = var.name dns_name = var.domain description = var.description labels = var.labels visibility = "private" force_destroy = var.force_destroy private_visibility_config { dynamic "networks" { for_each = var.private_visibility_config_networks content { network_url = networks.value } } } peering_config { target_network { network_url = var.target_network } } } resource "google_dns_managed_zone" "forwarding" { count = var.type == "forwarding" ? 1 : 0 provider = google-beta project = var.project_id name = var.name dns_name = var.domain description = var.description labels = var.labels visibility = "private" force_destroy = var.force_destroy private_visibility_config { dynamic "networks" { for_each = var.private_visibility_config_networks content { network_url = networks.value } } } forwarding_config { dynamic "target_name_servers" { for_each = var.target_name_server_addresses content { ipv4_address = target_name_servers.value.ipv4_address forwarding_path = target_name_servers.value.forwarding_path } } } } resource "google_dns_managed_zone" "private" { count = var.type == "private" ? 1 : 0 project = var.project_id name = var.name dns_name = var.domain description = var.description labels = var.labels visibility = "private" force_destroy = var.force_destroy private_visibility_config { dynamic "networks" { for_each = var.private_visibility_config_networks content { network_url = networks.value } } } } resource "google_dns_managed_zone" "public" { count = var.type == "public" ? 1 : 0 project = var.project_id name = var.name dns_name = var.domain description = var.description labels = var.labels visibility = "public" force_destroy = var.force_destroy dynamic "dnssec_config" { for_each = length(var.dnssec_config) == 0 ? [] : [var.dnssec_config] iterator = config content { kind = lookup(config.value, "kind", "dns#managedZoneDnsSecConfig") non_existence = lookup(config.value, "non_existence", "nsec3") state = lookup(config.value, "state", "off") default_key_specs { algorithm = lookup(var.default_key_specs_key, "algorithm", "rsasha256") key_length = lookup(var.default_key_specs_key, "key_length", 2048) key_type = lookup(var.default_key_specs_key, "key_type", "keySigning") kind = lookup(var.default_key_specs_key, "kind", "dns#dnsKeySpec") } default_key_specs { algorithm = lookup(var.default_key_specs_zone, "algorithm", "rsasha256") key_length = lookup(var.default_key_specs_zone, "key_length", 1024) key_type = lookup(var.default_key_specs_zone, "key_type", "zoneSigning") kind = lookup(var.default_key_specs_zone, "kind", "dns#dnsKeySpec") } } } } resource "google_dns_managed_zone" "reverse_lookup" { count = var.type == "reverse_lookup" ? 1 : 0 provider = google-beta project = var.project_id name = var.name dns_name = var.domain description = var.description labels = var.labels visibility = "private" force_destroy = var.force_destroy reverse_lookup = true private_visibility_config { dynamic "networks" { for_each = var.private_visibility_config_networks content { network_url = networks.value } } } } resource "google_dns_managed_zone" "service_directory" { count = var.type == "service_directory" ? 1 : 0 provider = google-beta project = var.project_id name = var.name dns_name = var.domain description = var.description labels = var.labels visibility = "private" force_destroy = var.force_destroy private_visibility_config { dynamic "networks" { for_each = var.private_visibility_config_networks content { network_url = networks.value } } } service_directory_config { namespace { namespace_url = var.service_namespace_url } } } resource "google_dns_record_set" "cloud-static-records" { project = var.project_id managed_zone = var.name for_each = { for record in var.recordsets : join("/", [record.name, record.type]) => record } name = ( each.value.name != "" ? "${each.value.name}.${var.domain}" : var.domain ) type = each.value.type ttl = each.value.ttl rrdatas = each.value.records depends_on = [ google_dns_managed_zone.private, google_dns_managed_zone.public, ] }