ekm-over-vpc-onboarding/modules/create_vpc_kms_project/service_controls.tf (49 lines of code) (raw):

/** * Copyright 2024 Google LLC * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ locals { create_vpc_sc_resources = var.enable_vpc_sc && var.create_kms_project && var.create_vpc_project access_context_manager_policy_id = var.access_context_manager_policy_id != "" ? var.access_context_manager_policy_id : module.access_context_manager_policy.policy_id restricted_services = distinct(concat(local.apis_to_activate_in_kms_project, local.apis_to_activate_in_vpc_project)) } module "access_context_manager_policy" { count = local.create_vpc_sc_resources && var.access_context_manager_policy_id == "" ? 1 : 0 source = "terraform-google-modules/vpc-service-controls/google" version = "~> 6.0" parent_id = var.organization_id policy_name = "default policy" } module "access_level_members" { count = local.create_vpc_sc_resources ? 1 : 0 source = "terraform-google-modules/vpc-service-controls/google//modules/access_level" version = "~> 6.0" policy = local.access_context_manager_policy_id name = var.access_level_members_name members = var.access_level_members } module "regular_service_perimeter_dry_run" { count = local.create_vpc_sc_resources ? 1 : 0 source = "terraform-google-modules/vpc-service-controls/google//modules/regular_service_perimeter" version = "~> 6.0" policy = var.access_context_manager_policy_id perimeter_name = var.perimeter_name description = "EKM Perimeter shielding projects" access_levels_dry_run = [module.access_level_members[0].name] restricted_services_dry_run = local.restricted_services resources_dry_run = [module.vpc_project[0].project_number, module.kms_project[0].project_number] shared_resources = { all = [module.vpc_project[0].project_number, module.kms_project[0].project_number] } }