3-networks-dual-svpc/modules/restricted_shared_vpc/variables.tf (164 lines of code) (raw):

/** * Copyright 2021 Google LLC * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ variable "access_context_manager_policy_id" { type = number description = "The id of the default Access Context Manager policy. Can be obtained by running `gcloud access-context-manager policies list --organization YOUR_ORGANIZATION_ID --format=\"value(name)\"`." } variable "project_id" { type = string description = "Project ID for Restricted Shared VPC." } variable "project_number" { type = number description = "Project number for Restricted Shared VPC. It is the project INSIDE the regular service perimeter." } variable "dns_hub_project_id" { type = string description = "The DNS hub project ID" } variable "environment_code" { type = string description = "A short form of the folder level resources (environment) within the Google Cloud organization." } variable "nat_enabled" { type = bool description = "Toggle creation of NAT cloud router." default = false } variable "nat_bgp_asn" { type = number description = "BGP ASN for NAT cloud routes. If NAT is enabled this variable value must be a value in ranges [64512..65534] or [4200000000..4294967294]." default = 64512 } variable "nat_num_addresses_region1" { type = number description = "Number of external IPs to reserve for region 1 Cloud NAT." default = 2 } variable "nat_num_addresses_region2" { type = number description = "Number of external IPs to reserve for region 2 Cloud NAT." default = 2 } variable "bgp_asn_subnet" { type = number description = "BGP ASN for Subnets cloud routers." } variable "default_region1" { type = string description = "First subnet region. The shared vpc modules only configures two regions." } variable "default_region2" { type = string description = "Second subnet region. The shared vpc modules only configures two regions." } variable "subnets" { type = list(object({ subnet_name = string subnet_ip = string subnet_region = string subnet_private_access = optional(string, "false") subnet_private_ipv6_access = optional(string) subnet_flow_logs = optional(string, "false") subnet_flow_logs_interval = optional(string, "INTERVAL_5_SEC") subnet_flow_logs_sampling = optional(string, "0.5") subnet_flow_logs_metadata = optional(string, "INCLUDE_ALL_METADATA") subnet_flow_logs_filter = optional(string, "true") subnet_flow_logs_metadata_fields = optional(list(string), []) description = optional(string) purpose = optional(string) role = optional(string) stack_type = optional(string) ipv6_access_type = optional(string) })) description = "The list of subnets being created" default = [] } variable "secondary_ranges" { type = map(list(object({ range_name = string, ip_cidr_range = string }))) description = "Secondary ranges that will be used in some of the subnets" default = {} } variable "dns_enable_inbound_forwarding" { type = bool description = "Toggle inbound query forwarding for VPC DNS." default = true } variable "dns_enable_logging" { type = bool description = "Toggle DNS logging for VPC DNS." default = true } variable "firewall_enable_logging" { type = bool description = "Toggle firewall logging for VPC Firewalls." default = true } variable "domain" { type = string description = "The DNS name of peering managed zone, for instance 'example.com.'" } variable "private_service_cidr" { type = string description = "CIDR range for private service networking. Used for Cloud SQL and other managed services." default = null } variable "private_service_connect_ip" { type = string description = "Internal IP to be used as the private service connect endpoint." } variable "windows_activation_enabled" { type = bool description = "Enable Windows license activation for Windows workloads." default = false } variable "members" { type = list(string) description = "An allowed list of members (users, service accounts). The signed-in identity originating the request must be a part of one of the provided members. If not specified, a request may come from any user (logged in/not logged in, etc.). Formats: user:{emailid}, serviceAccount:{emailid}" } variable "restricted_services" { type = list(string) description = "List of services to restrict." } variable "allow_all_egress_ranges" { description = "List of network ranges to which all egress traffic will be allowed" default = null } variable "allow_all_ingress_ranges" { description = "List of network ranges from which all ingress traffic will be allowed" default = null } variable "egress_policies" { description = "A list of all [egress policies](https://cloud.google.com/vpc-service-controls/docs/ingress-egress-rules#egress-rules-reference), each list object has a `from` and `to` value that describes egress_from and egress_to.\n\nExample: `[{ from={ identities=[], identity_type=\"ID_TYPE\" }, to={ resources=[], operations={ \"SRV_NAME\"={ OP_TYPE=[] }}}}]`\n\nValid Values:\n`ID_TYPE` = `null` or `IDENTITY_TYPE_UNSPECIFIED` (only allow indentities from list); `ANY_IDENTITY`; `ANY_USER_ACCOUNT`; `ANY_SERVICE_ACCOUNT`\n`SRV_NAME` = \"`*`\" (allow all services) or [Specific Services](https://cloud.google.com/vpc-service-controls/docs/supported-products#supported_products)\n`OP_TYPE` = [methods](https://cloud.google.com/vpc-service-controls/docs/supported-method-restrictions) or [permissions](https://cloud.google.com/vpc-service-controls/docs/supported-method-restrictions)" type = list(object({ from = any to = any })) default = [] } variable "ingress_policies" { description = "A list of all [ingress policies](https://cloud.google.com/vpc-service-controls/docs/ingress-egress-rules#ingress-rules-reference), each list object has a `from` and `to` value that describes ingress_from and ingress_to.\n\nExample: `[{ from={ sources={ resources=[], access_levels=[] }, identities=[], identity_type=\"ID_TYPE\" }, to={ resources=[], operations={ \"SRV_NAME\"={ OP_TYPE=[] }}}}]`\n\nValid Values:\n`ID_TYPE` = `null` or `IDENTITY_TYPE_UNSPECIFIED` (only allow indentities from list); `ANY_IDENTITY`; `ANY_USER_ACCOUNT`; `ANY_SERVICE_ACCOUNT`\n`SRV_NAME` = \"`*`\" (allow all services) or [Specific Services](https://cloud.google.com/vpc-service-controls/docs/supported-products#supported_products)\n`OP_TYPE` = [methods](https://cloud.google.com/vpc-service-controls/docs/supported-method-restrictions) or [permissions](https://cloud.google.com/vpc-service-controls/docs/supported-method-restrictions)" type = list(object({ from = any to = any })) default = [] } variable "perimeter_projects" { description = "A list of project numbers to be added to the service perimeter" type = list(number) default = [] }