forked from googleforgames/GenAI-quickstart
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathiam.tf
116 lines (105 loc) · 4.06 KB
/
iam.tf
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
# Copyright 2023 Google LLC All Rights Reserved.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
data "google_project" "project" {
project_id = var.project_id
}
# Create a service account for GKE cluster
resource "google_service_account" "sa_gke_cluster" {
account_id = "sa-gke-cluster"
display_name = "TF - GKE cluster SA"
project = var.project_id
}
resource "google_service_account_iam_binding" "sa_gke_cluster_wi_binding" {
service_account_id = google_service_account.sa_gke_cluster.name
role = "roles/iam.workloadIdentityUser"
members = [
"serviceAccount:${var.project_id}.svc.id.goog[genai/k8s-sa-cluster]",
]
}
module "member_roles_gke_cluster" {
source = "terraform-google-modules/iam/google//modules/member_iam"
service_account_address = google_service_account.sa_gke_cluster.email
prefix = "serviceAccount"
project_id = var.project_id
project_roles = [
"roles/artifactregistry.reader",
"roles/container.developer",
"roles/container.nodeServiceAgent",
"roles/logging.logWriter",
"roles/monitoring.metricWriter",
"roles/monitoring.viewer",
"roles/stackdriver.resourceMetadata.writer",
"roles/cloudtrace.agent",
]
}
# Create a service account for GKE AI Platform access to Vertex AI
resource "google_service_account" "sa_gke_aiplatform" {
account_id = "sa-gke-aiplatform"
display_name = "TF - GKE ai platform SA"
project = var.project_id
}
resource "google_service_account_iam_binding" "sa_gke_aiplatform_wi_binding" {
service_account_id = google_service_account.sa_gke_aiplatform.name
role = "roles/iam.workloadIdentityUser"
members = [
"serviceAccount:${var.project_id}.svc.id.goog[genai/k8s-sa-aiplatform]",
]
}
module "member_roles_gke_aiplatform" {
source = "terraform-google-modules/iam/google//modules/member_iam"
service_account_address = google_service_account.sa_gke_aiplatform.email
prefix = "serviceAccount"
project_id = var.project_id
project_roles = [
"roles/aiplatform.user",
"roles/storage.objectUser",
"roles/spanner.databaseUser",
]
}
# Create a service account for GKE telemetry collection
resource "google_service_account" "sa_gke_telemetry" {
account_id = "sa-gke-telemetry"
display_name = "TF - GKE telemetry collection SA"
project = var.project_id
}
resource "google_service_account_iam_binding" "sa_gke_telemetry_wi_binding" {
service_account_id = google_service_account.sa_gke_telemetry.name
role = "roles/iam.workloadIdentityUser"
members = [
"serviceAccount:${var.project_id}.svc.id.goog[genai/k8s-sa-telemetry]",
]
}
module "member_roles_gke_telemetry" {
source = "terraform-google-modules/iam/google//modules/member_iam"
service_account_address = google_service_account.sa_gke_telemetry.email
prefix = "serviceAccount"
project_id = var.project_id
project_roles = [
"roles/cloudtrace.agent",
]
}
# Add roles to the default Cloud Build service account
module "member_roles_cloudbuild" {
source = "terraform-google-modules/iam/google//modules/member_iam"
service_account_address = "${data.google_project.project.number}@cloudbuild.gserviceaccount.com"
prefix = "serviceAccount"
project_id = var.project_id
project_roles = [
"roles/artifactregistry.repoAdmin",
"roles/cloudbuild.connectionAdmin",
"roles/cloudbuild.builds.builder",
"roles/container.developer",
"roles/storage.objectAdmin",
]
}