This module handles opinionated VPC Service Controls and Access Context Manager configuration and deployments.
This module is meant for use with Terraform 0.13+ and tested using Terraform 1.0+. If you find incompatibilities using Terraform >=0.13, please open an issue. If you haven't upgraded and need a Terraform 0.12.x-compatible version of this module, the last released version intended for Terraform 0.12.x is v2.1.0.
The root module only handles the configuration of the access_context_manager_policy resource. For examples on how to use the root module with along with other submodules to configure all of VPC Service Controls and Access Context Manager resources, see the examples folder and the modules folder
provider "google" {
version = "~> 3.19.0"
}
module "org_policy" {
source = "terraform-google-modules/vpc-service-controls/google"
parent_id = var.parent_id
policy_name = var.policy_name
}
module "access_level_members" {
source = "terraform-google-modules/vpc-service-controls/google//modules/access_level"
policy = module.org_policy.policy_id
name = "terraform_members"
members = var.members
}
module "regular_service_perimeter_1" {
source = "terraform-google-modules/vpc-service-controls/google//modules/regular_service_perimeter"
policy = module.org_policy.policy_id
perimeter_name = "regular_perimeter_1"
description = "Perimeter shielding projects"
resources = ["1111111"]
access_levels = [module.access_level_members.name]
restricted_services = ["bigquery.googleapis.com", "storage.googleapis.com"]
shared_resources = {
all = ["11111111"]
}
}
Then perform the following commands on the root folder:
terraform init
to get the pluginsterraform plan
to see the infrastructure planterraform apply
to apply the infrastructure buildterraform destroy
to destroy the built infrastructure
The Access Context Manager API guarantees that resources will be created, but there may be a delay between a successful response and the change taking effect. For example, "after you create a service perimeter, it may take up to 30 minutes for the changes to propagate and take effect".
Because of these limitations in the API, you may first get an error when running terraform apply
for the first time. However, for the examples you should be able to succesfully deploy all resources by running terraform apply
a second about 15 seconds after running it for the first time.
You can add a delay using terraform's null_resource
- check example in the tests.
Name | Description | Type | Default | Required |
---|---|---|---|---|
parent_id | The parent of this AccessPolicy in the Cloud Resource Hierarchy. As of now, only organization are accepted as parent. | string |
n/a | yes |
policy_name | The policy's name. | string |
n/a | yes |
Name | Description |
---|---|
policy_id | Resource name of the AccessPolicy. |
policy_name | The policy's name. |
Before this module can be used on a project, you must ensure that the following pre-requisites are fulfilled:
- Terraform is installed on the machine where Terraform is executed.
- The Service Account you execute the module with has the right permissions.
- The necessary APIs are active on the project.
The project factory can be used to provision projects with the correct APIs active.
- Terraform >= 0.13.0
- terraform-provider-google >= v3.19.0
In order to create a policy, you need to grant your service account the Access Context Manager Admin role at the organization level:
- roles/accesscontextmanager.policyAdmin
You may use the following command:
gcloud organizations add-iam-policy-binding ORGANIZATION_ID \ --member="serviceAccount:example@project_id.iam.gserviceaccount.com" \ --role="roles/accesscontextmanager.policyAdmin"
In order to view VPC Service Controls and Access Context Manger using the Google Cloud Platform Console, your user accounts will need to be granted the Resource Manager Organization Viewer:
- roles/resourcemanager.organizationViewer
You may use the following command:
gcloud projects add-iam-policy-binding <my project id> \ --member="user:[email protected]" \ --role="roles/resourcemanager.organizationViewer"
For more information see the Access Context Manager ACL Page
To use this module you must enable Access Context Manager API (accesscontextmanager.googleapis.com) on project.
In order to operate with the Service Account you must activate the following APIs on the project where the Service Account was created:
- Storage JSON API - storage-api.googleapis.com
- Big Query API - bigquery.googleapis.com
Be sure you have the correct Terraform version (0.12.x), you can choose the binary here: