modules/alloydb/main.tf (387 lines of code) (raw):

/** * Copyright 2024 Google LLC * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ locals { prefix = var.prefix == null ? "" : "${var.prefix}-" is_regional = var.availability_type == "REGIONAL" # secondary instance type is aligned with cluster type unless apply is targeting a promotion, in that # case cluster will be 'primary' while instance still 'secondary'. primary_cluster_name = "${local.prefix}${var.cluster_name}" primary_instance_name = "${local.prefix}${var.instance_name}" secondary_cluster_name = coalesce(var.cross_region_replication.secondary_cluster_name, "${var.cluster_name}-sec") secondary_instance_name = coalesce(var.cross_region_replication.secondary_instance_name, "${var.instance_name}-sec") secondary_instance_type = try( var.cross_region_replication.promote_secondary && google_alloydb_cluster.secondary[0].cluster_type == "SECONDARY" ? "SECONDARY" : google_alloydb_cluster.secondary[0].cluster_type, null ) users = { for k, v in coalesce(var.users, {}) : k => { name = k password = try(v.type, "ALLOYDB_BUILT_IN") == "ALLOYDB_BUILT_IN" ? try(random_password.passwords[k].result, v.password) : null roles = v.roles type = coalesce(v.type, "ALLOYDB_BUILT_IN") } } } resource "google_alloydb_cluster" "primary" { project = var.project_id annotations = var.annotations cluster_id = local.primary_cluster_name cluster_type = var.cross_region_replication.switchover_mode ? "SECONDARY" : "PRIMARY" database_version = var.database_version deletion_policy = var.deletion_policy display_name = coalesce(var.cluster_display_name, local.primary_cluster_name) labels = var.labels location = var.location network_config { network = try(var.network_config.psa_config.network, null) allocated_ip_range = try(var.network_config.psa_config.allocated_ip_range, null) } dynamic "automated_backup_policy" { for_each = var.automated_backup_configuration.enabled ? [""] : [] content { enabled = true location = try(var.automated_backup_configuration.location, var.location) backup_window = var.automated_backup_configuration.backup_window labels = var.labels dynamic "encryption_config" { for_each = var.encryption_config != null ? [""] : [] content { kms_key_name = var.encryption_config.primary_kms_key_name } } weekly_schedule { days_of_week = var.automated_backup_configuration.weekly_schedule.days_of_week start_times { hours = var.automated_backup_configuration.weekly_schedule.start_times.hours minutes = var.automated_backup_configuration.weekly_schedule.start_times.minutes seconds = var.automated_backup_configuration.weekly_schedule.start_times.seconds nanos = var.automated_backup_configuration.weekly_schedule.start_times.nanos } } dynamic "quantity_based_retention" { for_each = var.automated_backup_configuration.retention_count != null ? [""] : [] content { count = var.automated_backup_configuration.retention_count } } dynamic "time_based_retention" { for_each = var.automated_backup_configuration.retention_period != null ? [""] : [] content { retention_period = var.automated_backup_configuration.retention_period } } } } dynamic "continuous_backup_config" { for_each = var.continuous_backup_configuration.enabled ? [""] : [] content { enabled = true recovery_window_days = var.continuous_backup_configuration.recovery_window_days dynamic "encryption_config" { for_each = var.encryption_config != null ? [""] : [] content { kms_key_name = var.encryption_config.primary_kms_key_name } } } } dynamic "encryption_config" { for_each = var.encryption_config != null ? [""] : [] content { kms_key_name = var.encryption_config.primary_kms_key_name } } dynamic "initial_user" { for_each = var.initial_user != null ? [""] : [] content { user = var.initial_user.user password = var.initial_user.password } } dynamic "maintenance_update_policy" { for_each = var.maintenance_config.enabled ? [""] : [] content { maintenance_windows { day = var.maintenance_config.day start_time { hours = var.maintenance_config.start_time.hours minutes = var.maintenance_config.start_time.minutes seconds = var.maintenance_config.start_time.seconds nanos = var.maintenance_config.start_time.nanos } } } } psc_config { psc_enabled = var.network_config.psc_config != null ? true : null } dynamic "secondary_config" { for_each = var.cross_region_replication.switchover_mode ? [""] : [] content { primary_cluster_name = "projects/${var.project_id}/locations/${var.cross_region_replication.region}/clusters/${local.secondary_cluster_name}" } } # waiting to fix this issue https://github.com/hashicorp/terraform-provider-google/issues/14944 lifecycle { ignore_changes = [ display_name, network_config, psc_config ] } } resource "google_alloydb_instance" "primary" { annotations = var.annotations availability_type = var.availability_type cluster = google_alloydb_cluster.primary.id database_flags = var.flags display_name = coalesce(var.display_name, local.primary_instance_name) instance_id = local.primary_instance_name instance_type = var.cross_region_replication.switchover_mode ? "SECONDARY" : "PRIMARY" gce_zone = local.is_regional ? null : var.gce_zone labels = var.labels dynamic "client_connection_config" { for_each = var.client_connection_config != null ? [""] : [] content { require_connectors = var.client_connection_config.require_connectors dynamic "ssl_config" { for_each = var.client_connection_config.ssl_config != null ? [""] : [] content { ssl_mode = var.client_connection_config.ssl_config.ssl_mode } } } } dynamic "machine_config" { for_each = var.machine_config != null ? [""] : [] content { cpu_count = var.machine_config.cpu_count } } dynamic "network_config" { for_each = var.network_config.psa_config != null ? [""] : [] content { dynamic "authorized_external_networks" { for_each = coalesce(var.network_config.psa_config.authorized_external_networks, []) content { cidr_range = authorized_external_networks.value } } enable_public_ip = var.network_config.psa_config.enable_public_ip } } dynamic "psc_instance_config" { for_each = var.network_config.psc_config != null ? [""] : [] content { allowed_consumer_projects = var.network_config.psc_config.allowed_consumer_projects } } dynamic "query_insights_config" { for_each = var.query_insights_config != null ? [""] : [] content { query_string_length = var.query_insights_config.query_string_length record_application_tags = var.query_insights_config.record_application_tags record_client_address = var.query_insights_config.record_client_address query_plans_per_minute = var.query_insights_config.query_plans_per_minute } } # waiting to fix this issue https://github.com/hashicorp/terraform-provider-google/issues/14944 lifecycle { ignore_changes = [ network_config ] } } resource "google_alloydb_cluster" "secondary" { count = var.cross_region_replication.enabled ? 1 : 0 project = var.project_id annotations = var.annotations cluster_id = local.secondary_cluster_name cluster_type = var.cross_region_replication.promote_secondary || var.cross_region_replication.switchover_mode ? "PRIMARY" : "SECONDARY" database_version = var.database_version deletion_policy = "FORCE" display_name = coalesce(var.cross_region_replication.secondary_cluster_display_name, local.secondary_cluster_name) labels = var.labels location = var.cross_region_replication.region network_config { network = try(var.network_config.psa_config.network, null) allocated_ip_range = try(var.network_config.psa_config.allocated_ip_range, null) } dynamic "automated_backup_policy" { for_each = var.automated_backup_configuration.enabled ? [""] : [] content { enabled = true location = var.cross_region_replication.region backup_window = var.automated_backup_configuration.backup_window labels = var.labels dynamic "encryption_config" { for_each = var.encryption_config != null ? [""] : [] content { kms_key_name = var.encryption_config.secondary_kms_key_name } } weekly_schedule { days_of_week = var.automated_backup_configuration.weekly_schedule.days_of_week start_times { hours = var.automated_backup_configuration.weekly_schedule.start_times.hours minutes = var.automated_backup_configuration.weekly_schedule.start_times.minutes seconds = var.automated_backup_configuration.weekly_schedule.start_times.seconds nanos = var.automated_backup_configuration.weekly_schedule.start_times.nanos } } dynamic "quantity_based_retention" { for_each = var.automated_backup_configuration.retention_count != null ? [""] : [] content { count = var.automated_backup_configuration.retention_count } } dynamic "time_based_retention" { for_each = var.automated_backup_configuration.retention_period != null ? [""] : [] content { retention_period = var.automated_backup_configuration.retention_period } } } } dynamic "continuous_backup_config" { for_each = var.continuous_backup_configuration.enabled ? [""] : [] content { enabled = true recovery_window_days = var.continuous_backup_configuration.recovery_window_days dynamic "encryption_config" { for_each = var.encryption_config != null ? [""] : [] content { kms_key_name = var.encryption_config.secondary_kms_key_name } } } } dynamic "encryption_config" { for_each = var.encryption_config != null ? [""] : [] content { kms_key_name = var.encryption_config.secondary_kms_key_name } } dynamic "maintenance_update_policy" { for_each = var.maintenance_config.enabled ? [""] : [] content { maintenance_windows { day = var.maintenance_config.day start_time { hours = var.maintenance_config.start_time.hours minutes = var.maintenance_config.start_time.minutes seconds = var.maintenance_config.start_time.seconds nanos = var.maintenance_config.start_time.nanos } } } } psc_config { psc_enabled = var.network_config.psc_config != null ? true : null } dynamic "secondary_config" { for_each = var.cross_region_replication.promote_secondary || var.cross_region_replication.switchover_mode ? [] : [""] content { primary_cluster_name = google_alloydb_cluster.primary.id } } depends_on = [google_alloydb_instance.primary] # waiting to fix this issue https://github.com/hashicorp/terraform-provider-google/issues/14944 lifecycle { ignore_changes = [ display_name, network_config, psc_config ] } } resource "google_alloydb_instance" "secondary" { count = var.cross_region_replication.enabled ? 1 : 0 annotations = var.annotations availability_type = var.availability_type cluster = google_alloydb_cluster.secondary[0].id database_flags = var.cross_region_replication.promote_secondary || var.cross_region_replication.switchover_mode ? var.flags : null display_name = coalesce(var.cross_region_replication.secondary_instance_name, local.secondary_instance_name) gce_zone = local.is_regional ? null : var.gce_zone instance_id = local.secondary_instance_name instance_type = local.secondary_instance_type labels = var.labels dynamic "client_connection_config" { for_each = var.client_connection_config != null ? [""] : [] content { require_connectors = var.client_connection_config.require_connectors dynamic "ssl_config" { for_each = var.client_connection_config.ssl_config != null ? [""] : [] content { ssl_mode = var.client_connection_config.ssl_config.ssl_mode } } } } dynamic "machine_config" { for_each = var.machine_config != null || var.cross_region_replication.secondary_machine_config != null ? [""] : [] content { cpu_count = coalesce(try(var.cross_region_replication.secondary_machine_config.cpu_count, null), try(var.machine_config.cpu_count, null)) } } dynamic "network_config" { for_each = var.network_config.psa_config != null ? [""] : [] content { dynamic "authorized_external_networks" { for_each = coalesce(var.network_config.psa_config.authorized_external_networks, []) content { cidr_range = authorized_external_networks.value } } enable_public_ip = var.network_config.psa_config.enable_public_ip } } dynamic "psc_instance_config" { for_each = var.network_config.psc_config != null ? [""] : [] content { allowed_consumer_projects = var.network_config.psc_config.allowed_consumer_projects } } dynamic "query_insights_config" { for_each = var.query_insights_config != null ? [""] : [] content { query_string_length = var.query_insights_config.query_string_length record_application_tags = var.query_insights_config.record_application_tags record_client_address = var.query_insights_config.record_client_address query_plans_per_minute = var.query_insights_config.query_plans_per_minute } } # waiting to fix this issue https://github.com/hashicorp/terraform-provider-google/issues/14944 lifecycle { ignore_changes = [ network_config ] } } resource "random_password" "passwords" { for_each = toset([ for k, v in coalesce(var.users, {}) : k if v.password == null ]) length = 16 special = true } resource "google_alloydb_user" "users" { for_each = local.users cluster = google_alloydb_cluster.primary.id user_id = each.value.name user_type = each.value.type password = each.value.password database_roles = each.value.roles depends_on = [google_alloydb_instance.primary] }