5-appinfra/modules/cicd-pipeline/cloud-storage.tf (40 lines of code) (raw):

# Copyright 2024 Google LLC # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. # GCS bucket used as skaffold build cache resource "google_storage_bucket" "build_cache" { project = var.project_id name = "build-cache-${var.service_name}-${data.google_project.project.number}" uniform_bucket_level_access = true location = var.region force_destroy = var.buckets_force_destroy } resource "google_storage_bucket" "release_source_development" { project = var.project_id name = "release-source-development-${var.service_name}-${data.google_project.project.number}" uniform_bucket_level_access = true location = var.region force_destroy = var.buckets_force_destroy } # Initialize cache with empty file resource "google_storage_bucket_object" "cache" { bucket = google_storage_bucket.build_cache.name name = local.cache_filename content = " " lifecycle { # do not reset cache when running terraform ignore_changes = [ content, detect_md5hash ] } } # give CloudBuild SA access to skaffold cache resource "google_storage_bucket_iam_member" "build_cache" { bucket = google_storage_bucket.build_cache.name member = "serviceAccount:${google_service_account.cloud_build.email}" role = "roles/storage.admin" } # give CloudBuild SA access to write to source development bucket resource "google_storage_bucket_iam_member" "release_source_development_admin" { bucket = google_storage_bucket.release_source_development.name member = "serviceAccount:${google_service_account.cloud_build.email}" role = "roles/storage.admin" } # give CloudDeploy SA access to read from source development bucket resource "google_storage_bucket_iam_member" "release_source_development_objectViewer" { bucket = google_storage_bucket.release_source_development.name member = "serviceAccount:${google_service_account.cloud_deploy.email}" role = "roles/storage.objectViewer" }