infra/modules/real_time_enforcer_roles/main.tf (64 lines of code) (raw):
/**
* Copyright 2018 Google LLC
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
locals {
role_id_suffix = "${var.suffix == "" ? "" : "_${var.suffix}"}"
}
resource "google_organization_iam_custom_role" "forseti-enforcer-viewer" {
org_id = "${var.org_id}"
role_id = "forseti.enforcerViewer${local.role_id_suffix}"
title = "Forseti real time enforcer viewer"
description = "Read-only access to check for policy violations with the Forseti real time enforcer."
permissions = [
"storage.buckets.get",
"storage.buckets.getIamPolicy",
"bigquery.datasets.get",
"bigquery.datasets.getIamPolicy",
"cloudsql.instances.get",
"resourcemanager.projects.get",
"resourcemanager.projects.getIamPolicy"
]
}
resource "google_organization_iam_custom_role" "forseti-enforcer-writer" {
org_id = "${var.org_id}"
role_id = "forseti.enforcerWriter${local.role_id_suffix}"
title = "Forseti real time enforcer writer"
description = "Write access to remediate policy violations with the Forseti real time enforcer."
permissions = [
"storage.buckets.setIamPolicy",
"storage.buckets.update",
"bigquery.datasets.setIamPolicy",
"cloudsql.instances.update",
"resourcemanager.projects.setIamPolicy"
]
}
// Use an optional resource to prevent the destruction of the viewer and writer resources.
//
// Due to [3116] resources cannot interpolate variables within the `lifecycle` block,
// So we use an optional resource to contain the lifecycle expression and propagate the
// lifecycle behavior via a dependency to the protected resources.
//
// [3116]: https://github.com/hashicorp/terraform/issues/3116
resource "random_id" "prevent_destroy" {
count = "${var.prevent_destroy ? 1 : 0}"
byte_length = 8
keepers = {
viewer = "${google_organization_iam_custom_role.forseti-enforcer-viewer.role_id}"
writer = "${google_organization_iam_custom_role.forseti-enforcer-writer.role_id}"
}
lifecycle {
prevent_destroy = true
}
}