components/doc-registry/terraform/main.tf (81 lines of code) (raw):
# Copyright 2024 Google LLC
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# https://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
locals {
eks_label = {
goog-packaged-solution : "eks-solution"
}
service_account_name = var.doc_registry_service_cloud_run_job_name
}
# Enable APIs
# See github.com/terraform-google-modules/terraform-google-project-factory
# The modules/project_services
module "project_services" {
source = "github.com/terraform-google-modules/terraform-google-project-factory.git//modules/project_services?ref=ff00ab5032e7f520eb3961f133966c6ced4fd5ee" # commit hash of version 17.0.0
project_id = var.project_id
disable_services_on_destroy = false
disable_dependent_services = false
activate_apis = [
# General container build and registry
"bigquery.googleapis.com",
"artifactregistry.googleapis.com",
"cloudbuild.googleapis.com",
"run.googleapis.com",
"compute.googleapis.com",
"containerscanning.googleapis.com"
]
# Provide more access to the cloudbuild service account
activate_api_identities = [{
"api" : "cloudbuild.googleapis.com",
"roles" : [
"roles/run.admin",
# Required for Cloud Run to launch as the normal compute service account
"roles/iam.serviceAccountUser",
]
},
{
"api" : "pubsub.googleapis.com",
# PubSub publish to Cloud Run
"roles" : [
"roles/iam.serviceAccountTokenCreator",
],
}
]
}
module "doc_registry_service_account" {
source = "github.com/terraform-google-modules/terraform-google-service-accounts?ref=a11d4127eab9b51ec9c9afdaf51b902cd2c240d9" #commit hash of version 4.0.0
project_id = var.project_id
prefix = "eks"
names = [local.service_account_name]
project_roles = [
"${var.project_id}=>roles/storage.objectUser",
"${var.project_id}=>roles/bigquery.dataEditor",
"${var.project_id}=>roles/bigquery.jobUser"
]
display_name = "Document Registry Service Account"
description = "Account used to run the document registry service jobs"
}
resource "google_cloud_run_v2_job" "doc-registry-service-job" {
name = var.doc_registry_service_cloud_run_job_name
location = var.region
template {
template {
service_account = module.doc_registry_service_account.email
vpc_access {
network_interfaces {
network = var.vpc_network_name
subnetwork = var.serverless_connector_subnet
}
egress = "ALL_TRAFFIC"
}
containers {
image = local.image_name_and_tag
env {
name = "BQ_DOC_REGISTRY_TABLE"
value = "${var.project_id}.${module.docs_registry_dataset.bigquery_dataset.dataset_id}.${module.docs_registry_dataset.table_ids[0]}"
}
}
}
}
lifecycle {
ignore_changes = [
effective_labels["goog-packaged-solution"],
terraform_labels["goog-packaged-solution"],
labels["goog-packaged-solution"]
]
}
depends_on = [
module.gcloud_build_doc_registry.wait
]
deletion_protection = false
}