components/doc-deletion/terraform/doc-deletion.tf (101 lines of code) (raw):
# Copyright 2024 Google LLC
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# https://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
locals {
# specification of the alloy db docs of removing the .gserviceaccount.com part: https://cloud.google.com/alloydb/docs/manage-iam-authn#create-user
alloydb_username = replace(module.doc_deletion_account.email, ".gserviceaccount.com", "")
service_account_name = var.doc_deletion_cloud_run_job_name
}
resource "google_cloud_run_v2_job" "doc_deletion_job" {
name = var.doc_deletion_cloud_run_job_name
location = var.region
template {
template {
service_account = module.doc_deletion_account.email
vpc_access {
network_interfaces {
network = var.vpc_network_name
subnetwork = var.serverless_connector_subnet
}
egress = "ALL_TRAFFIC"
}
containers {
image = local.image_name_and_tag
name = var.doc_deletion_cloud_run_job_name
resources {
limits = {
cpu = "2"
memory = "2048Mi"
}
}
env {
name = "ALLOYDB_INSTANCE"
value = var.alloydb_primary_instance
}
env {
name = "ALLOYDB_DATABASE"
value = var.alloydb_database
}
env {
name = "ALLOYDB_USER_CONFIG"
value = local.alloydb_username
}
env {
name = "DATA_STORE_PROJECT_ID"
value = var.data_store_project_id
}
env {
name = "DATA_STORE_REGION"
value = var.data_store_region
}
env {
name = "DATA_STORE_COLLECTION"
value = var.data_store_collection
}
env {
name = "DATA_STORE_ID"
value = var.data_store_id
}
env {
name = "DATA_STORE_BRANCH"
value = var.data_store_branch
}
}
}
}
lifecycle {
ignore_changes = [
effective_labels["goog-packaged-solution"],
terraform_labels["goog-packaged-solution"],
labels["goog-packaged-solution"]
]
}
deletion_protection = false
}
module "doc_deletion_account" {
source = "github.com/terraform-google-modules/terraform-google-service-accounts?ref=a11d4127eab9b51ec9c9afdaf51b902cd2c240d9" #commit hash of version 4.0.0
project_id = var.project_id
prefix = "eks"
names = [local.service_account_name]
project_roles = [
"${var.project_id}=>roles/alloydb.databaseUser",
"${var.project_id}=>roles/alloydb.client",
"${var.project_id}=>roles/serviceusage.serviceUsageConsumer",
"${var.project_id}=>roles/bigquery.dataEditor",
"${var.project_id}=>roles/bigquery.jobUser",
"${var.project_id}=>roles/storage.admin",
"${var.project_id}=>roles/discoveryengine.editor",
]
display_name = "Doc Deletion Job Account"
description = "Account used to run doc deletion in Agent Builder, BigQuery, AlloyDB and other storage services"
}
resource "terraform_data" "dbrole_deployment_trigger" {
# workaround to explicitly retrigger module.gcloud_build_job_to_configure_alloydb_schema if terraform reverts the db roles on specialized_parser_role (flaky)
input = google_alloydb_user.doc_deletion_db_user
triggers_replace = google_alloydb_user.doc_deletion_db_user.database_roles
}
resource "google_alloydb_user" "doc_deletion_db_user" {
cluster = var.alloy_db_cluster_id
user_id = local.alloydb_username
user_type = "ALLOYDB_IAM_USER"
database_roles = ["alloydbiamuser"]
depends_on = [var.alloydb_cluster_ready]
lifecycle {
ignore_changes = [database_roles]
}
}