4-projects/modules/artifacts/main.tf (196 lines of code) (raw):

/** * Copyright 2024 Google LLC * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ locals { artifact_tf_sa_roles = [ "roles/artifactregistry.admin", "roles/cloudbuild.builds.editor", "roles/cloudbuild.connectionAdmin", "roles/iam.serviceAccountAdmin", "roles/secretmanager.admin", "roles/storage.admin", ] common_secrets = { "PROJECT_ID" : module.app_infra_artifacts[0].project_id, "TF_VAR_gh_token" : var.github_app_infra_token } sa_secrets = [ for k, v in var.gh_artifact_repos.artifact_project_repos : { repository = var.create_github_artifact_repositories ? github_repository.artifact_repo[k].name : v secret_name = "SERVICE_ACCOUNT_EMAIL" plaintext_value = google_project_service_identity.artifact_registry_cloudbuild_sa[0].email config = k } ] secrets_list = flatten([ for k, v in var.gh_artifact_repos.artifact_project_repos : [ for secret, plaintext in local.common_secrets : { config = k secret_name = secret plaintext_value = plaintext repository = var.create_github_artifact_repositories ? github_repository.artifact_repo[k].name : v } ] ]) gh_secrets = { for v in concat(local.sa_secrets, local.secrets_list) : "${v.config}.${v.secret_name}" => v } secret_ids = [ data.google_secret_manager_secret.gh_infra_token.secret_id, data.google_secret_manager_secret.tag_engine_token.secret_id ] } ###################### # Data sources ###################### data "google_secret_manager_secret" "gh_infra_token" { project = var.secrets_project_id secret_id = var.gh_token_secret } data "google_secret_manager_secret" "tag_engine_token" { project = var.secrets_project_id secret_id = var.tag_engine_oauth_secret } data "github_repository" "artifact_repo" { for_each = var.gh_artifact_repos.artifact_project_repos name = each.value depends_on = [github_repository.artifact_repo] } ###################### # Project creation ###################### module "app_infra_artifacts" { source = "../../modules/single_project" count = var.gh_artifact_repos != null ? 1 : 0 org_id = var.org_id billing_account = var.billing_account folder_id = var.folder_id environment = "common" project_budget = var.project_budget project_prefix = var.project_prefix enable_cloudbuild_deploy = true activate_apis = [ "cloudresourcemanager.googleapis.com", "compute.googleapis.com", "storage-api.googleapis.com", "serviceusage.googleapis.com", "iam.googleapis.com", "cloudbilling.googleapis.com", "artifactregistry.googleapis.com", "cloudbuild.googleapis.com" ] # Metadata project_suffix = var.project_suffix application_name = var.application_name billing_code = var.billing_code primary_contact = var.primary_contact secondary_contact = var.secondary_contact business_code = var.business_code } ################### # Github ################### resource "github_repository" "artifact_repo" { for_each = var.create_github_artifact_repositories ? var.gh_artifact_repos.artifact_project_repos : {} provider = github name = each.value description = "Repository for ${each.key}" visibility = "private" has_issues = true has_wiki = true has_downloads = true topics = ["github", "docker", "python"] auto_init = true } resource "github_actions_secret" "secrets" { for_each = local.gh_secrets provider = github repository = each.value.repository secret_name = each.value.secret_name plaintext_value = each.value.plaintext_value depends_on = [github_repository.artifact_repo] } # ######## # # IAM # ######## resource "google_project_iam_member" "artifact_tf_sa_roles" { for_each = toset(local.artifact_tf_sa_roles) project = module.app_infra_artifacts[0].project_id role = each.key member = "serviceAccount:${var.app_infra_pipeline_service_accounts["artifacts"]}" } resource "google_project_service_identity" "artifact_registry_cloudbuild_sa" { count = var.gh_common_project_repos != null ? 1 : 0 provider = google-beta project = module.app_infra_artifacts[0].project_id service = "cloudbuild.googleapis.com" } resource "google_project_service_identity" "artifact_registry_service_identity" { count = var.gh_common_project_repos != null ? 1 : 0 provider = google-beta project = module.app_infra_artifacts[0].project_id service = "artifactregistry.googleapis.com" } resource "google_project_service_identity" "storage_service_identity" { count = var.gh_common_project_repos != null ? 1 : 0 provider = google-beta project = module.app_infra_artifacts[0].project_id service = "storage.googleapis.com" } resource "google_project_iam_member" "cloud_build_builder" { count = var.gh_common_project_repos != null ? 1 : 0 project = module.app_infra_artifacts[0].project_id role = "roles/cloudbuild.builds.builder" member = "serviceAccount:${google_project_service_identity.artifact_registry_cloudbuild_sa[0].email}" } resource "google_service_account_iam_member" "artifact_registry_cloudbuild_sa" { count = var.gh_common_project_repos != null ? 1 : 0 service_account_id = google_service_account.cloudbuild_service_account[0].id role = "roles/iam.serviceAccountUser" member = "serviceAccount:${var.app_infra_pipeline_service_accounts["artifacts"]}" } resource "google_secret_manager_secret_iam_member" "artifacts" { for_each = toset(local.secret_ids) project = var.secrets_project_id secret_id = each.key role = "roles/secretmanager.secretAccessor" member = "serviceAccount:${var.app_infra_pipeline_service_accounts["artifacts"]}" } resource "google_secret_manager_secret_iam_member" "cloudbuild" { for_each = toset(local.secret_ids) project = var.secrets_project_id secret_id = each.key role = "roles/secretmanager.secretAccessor" member = "serviceAccount:${google_service_account.cloudbuild_service_account[0].email}" } resource "google_secret_manager_secret_iam_member" "cloudbuild_agent" { for_each = toset(local.secret_ids) project = var.secrets_project_id secret_id = each.key role = "roles/secretmanager.secretAccessor" member = "serviceAccount:service-${module.app_infra_artifacts[0].project_number}@gcp-sa-cloudbuild.iam.gserviceaccount.com" } resource "google_secret_manager_secret_iam_member" "secrets_viewer" { for_each = toset(local.secret_ids) project = var.secrets_project_id secret_id = each.key role = "roles/secretmanager.viewer" member = "serviceAccount:${var.app_infra_pipeline_service_accounts["artifacts"]}" } # ################################ # Cloudbuild # ################################ resource "google_service_account" "cloudbuild_service_account" { count = var.gh_artifact_repos != null ? 1 : 0 project = module.app_infra_artifacts[0].project_id account_id = "cloudbuild-artifacts" display_name = "Cloudbuild service account" } resource "google_project_iam_member" "act_as" { count = var.gh_artifact_repos != null ? 1 : 0 project = module.app_infra_artifacts[0].project_id role = "roles/iam.serviceAccountUser" member = "serviceAccount:${google_service_account.cloudbuild_service_account[0].email}" } resource "google_project_iam_member" "logs_writer" { count = var.gh_artifact_repos != null ? 1 : 0 project = module.app_infra_artifacts[0].project_id role = "roles/logging.logWriter" member = "serviceAccount:${google_service_account.cloudbuild_service_account[0].email}" }