modules/genomics_cromwell/network.tf (102 lines of code) (raw):

/** * Copyright 2023 Google LLC * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ data "google_compute_network" "default" { count = var.create_network ? 0 : 1 project = local.project.project_id name = var.network_name } data "google_compute_subnetwork" "default" { count = var.create_network ? 0 : 1 project = local.project.project_id name = var.network_name region = local.region } module "vpc_cromwell" { count = var.create_network ? 1 : 0 source = "terraform-google-modules/network/google" version = "~> 5.0" project_id = local.project.project_id network_name = var.network_name routing_mode = "GLOBAL" description = "VPC Network created via Terraform" subnets = [ { subnet_name = var.network_name subnet_ip = var.ip_cidr_range subnet_region = local.region description = "Subnetwork inside Cromwell VPC network, created via Terraform" subnet_private_access = true } ] firewall_rules = [ { name = "fw-cromwell-allow-internal" description = "Firewall rule to allow traffic on all ports inside *vpc-cromwell* VPC network." priority = 65534 ranges = ["10.0.0.0/8"] direction = "INGRESS" allow = [{ protocol = "tcp" ports = ["0-65535"] }] }, { name = "fw-cromwell-allow-iap" description = "Firewall rule to allow traffic on SSH and Cromwell port to IAP range" priority = 65534 ranges = ["35.235.240.0/20"] direction = "INGRESS" target_tags = ["cromwell-iap"] allow = [{ protocol = "tcp" ports = ["22", "${var.cromwell_port}"] }] } ] depends_on = [ module.project_radlab_gen_cromwell, google_project_service.enabled_services, time_sleep.wait_120_seconds ] } module "cloud-nat" { source = "terraform-google-modules/cloud-nat/google" version = "~> 2.0" name = "${var.network_name}-nat" project_id = local.project.project_id region = local.region network = module.vpc_cromwell.0.network_name router = "${var.network_name}-nat-router" create_router = true } resource "google_compute_global_address" "google-managed-services-range" { project = local.project.project_id name = "google-managed-services-${local.network.name}" purpose = "VPC_PEERING" address = split("/", var.db_service_network_cidr_range)[0] prefix_length = split("/", var.db_service_network_cidr_range)[1] address_type = "INTERNAL" network = local.network.name depends_on = [ google_project_service.enabled_services, time_sleep.wait_120_seconds ] } # Creates the peering with the producer network. resource "google_service_networking_connection" "private_service_access" { network = local.network.id service = "servicenetworking.googleapis.com" reserved_peering_ranges = [google_compute_global_address.google-managed-services-range.name] }