4-projects/modules/composer_env/crypto.tf (53 lines of code) (raw):

/** * Copyright 2022 Google LLC * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ locals { service_agents = [ "artifactregistry.googleapis.com", "pubsub.googleapis.com", "storage.googleapis.com", "secretmanager.googleapis.com", ] kms_secret_sa_accounts = [ "serviceAccount:${google_service_account.composer.email}", "serviceAccount:service-${module.app_cloudbuild_project.project_number}@cloudcomposer-accounts.iam.gserviceaccount.com", "serviceAccount:service-${module.app_cloudbuild_project.project_number}@gcp-sa-artifactregistry.iam.gserviceaccount.com", "serviceAccount:service-${module.app_cloudbuild_project.project_number}@container-engine-robot.iam.gserviceaccount.com", "serviceAccount:service-${module.app_cloudbuild_project.project_number}@gcp-sa-pubsub.iam.gserviceaccount.com", "serviceAccount:service-${module.app_cloudbuild_project.project_number}@gs-project-accounts.iam.gserviceaccount.com", "serviceAccount:service-${module.app_cloudbuild_project.project_number}@compute-system.iam.gserviceaccount.com", "serviceAccount:service-${module.app_cloudbuild_project.project_number}@compute-system.iam.gserviceaccount.com", ] # sa_account_to_crypto_key_id = [ # for key, value in module.app_cloudbuild_project.crypto_key : [ # for sa in local.kms_secret_sa_accounts : { # id = value.id # sa_account = sa # } # ] # ] } // Grab Service Agent for Secret Manager resource "google_project_service_identity" "service_agents_kms" { for_each = toset(local.service_agents) provider = google-beta project = module.app_cloudbuild_project.project_id service = each.key } resource "google_kms_crypto_key_iam_member" "app_key" { for_each = module.app_cloudbuild_project.kms_keys crypto_key_id = each.value.id role = "roles/cloudkms.admin" member = "serviceAccount:${local.app_infra_pipeline_service_accounts[var.repo_name]}" } // Add Secret Manager Service Agent to key with encrypt/decrypt permissions resource "google_kms_crypto_key_iam_binding" "secretmanager_agent" { for_each = module.app_cloudbuild_project.kms_keys crypto_key_id = each.value.id role = "roles/cloudkms.cryptoKeyEncrypterDecrypter" members = local.kms_secret_sa_accounts }