tink-envelope-encryption-sample/0-bootstrap/main.tf (65 lines of code) (raw):
/**
* Copyright 2024 Google LLC
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
locals {
tink_kek_uri = "gcp-kms://projects/${var.project_id}/locations/${var.location}/keyRings/${module.kms.keyring_resource.name}/cryptoKeys/${keys(module.kms.keys)[0]}"
default_suffix = var.suffix != "" ? var.suffix : random_string.suffix.result
apis_to_enable = [
"cloudkms.googleapis.com"
]
tink_keyset_file = "${var.tink_keyset_output_file}-${random_string.suffix.result}.json"
}
resource "random_string" "suffix" {
length = 4
special = false
upper = false
}
resource "google_project_service" "apis_to_enable" {
for_each = toset(local.apis_to_enable)
project = var.project_id
service = each.key
disable_on_destroy = false
}
resource "time_sleep" "enable_projects_apis_sleep" {
create_duration = "30s"
depends_on = [google_project_service.apis_to_enable]
}
module "kms" {
source = "terraform-google-modules/kms/google"
version = "4.0.0"
keyring = "${var.keyring}-${local.default_suffix}"
location = var.location
project_id = var.project_id
keys = ["${var.kek}-${local.default_suffix}"]
prevent_destroy = var.prevent_destroy
depends_on = [time_sleep.enable_projects_apis_sleep]
}
resource "null_resource" "tinkey_create_keyset" {
triggers = {
project_id = var.project_id
tink_keyset_output_file = var.tink_keyset_output_file
}
provisioner "local-exec" {
when = create
command = <<EOF
go run ${var.cli_path}/encrypted_keyset_cli.go \
--mode generate \
--output_path ${local.tink_keyset_file} \
--kek_uri ${local.tink_kek_uri} \
--gcp_credential_path ${var.tink_sa_credentials_file}
EOF
}
depends_on = [module.kms]
}