-
Notifications
You must be signed in to change notification settings - Fork 11
Expand file tree
/
Copy pathmain.tf
More file actions
142 lines (122 loc) · 5.33 KB
/
main.tf
File metadata and controls
142 lines (122 loc) · 5.33 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
locals {
project_id = length(var.project_id) > 0 ? var.project_id : data.google_project.selected[0].project_id
service_account_name = var.use_existing_service_account ? (
var.service_account_name
) : (
length(var.service_account_name) > 0 ? var.service_account_name : "${var.prefix}-${random_id.uniq.hex}"
)
service_account_json_key = jsondecode(var.use_existing_service_account ? (
base64decode(var.service_account_private_key)
) : (
base64decode(module.lacework_cfg_svc_account.private_key)
))
skip_iam_grants = var.use_existing_service_account && var.skip_iam_grants
default_roles = [
"roles/browser",
"roles/iam.securityReviewer",
"roles/cloudasset.viewer",
"roles/policyanalyzer.activityAnalysisViewer"
]
custom_role_permissions = [
"bigquery.datasets.get",
"compute.projects.get",
"pubsub.topics.get",
"storage.buckets.get",
"compute.sslPolicies.get"
]
version_file = "${abspath(path.module)}/VERSION"
module_name = "terraform-gcp-config"
module_version = fileexists(local.version_file) ? file(local.version_file) : ""
}
resource "random_id" "uniq" {
byte_length = 4
}
data "google_project" "selected" {
count = length(var.project_id) > 0 ? 0 : 1
}
module "lacework_cfg_svc_account" {
source = "lacework/service-account/gcp"
version = "~> 2.0"
create = var.use_existing_service_account ? false : true
service_account_name = local.service_account_name
project_id = local.project_id
}
resource "google_project_iam_custom_role" "lacework_project_custom_role" {
count = (!local.skip_iam_grants && !var.org_integration) ? 1 : 0
project = local.project_id
role_id = "lwComplianceRole_${random_id.uniq.hex}"
title = "Lacework Compliance Role"
description = "Lacework Compliance Role"
permissions = local.custom_role_permissions
}
resource "google_project_iam_member" "lacework_project_custom_role_binding" {
count = (!local.skip_iam_grants && !var.org_integration) ? 1 : 0
project = local.project_id
role = google_project_iam_custom_role.lacework_project_custom_role.0.name
member = "serviceAccount:${local.service_account_json_key.client_email}"
depends_on = [google_project_iam_custom_role.lacework_project_custom_role]
}
resource "google_project_iam_member" "lacework_project_roles_binding" {
for_each = toset((!local.skip_iam_grants && !var.org_integration) ? local.default_roles : [])
project = local.project_id
role = each.value
member = "serviceAccount:${local.service_account_json_key.client_email}"
depends_on = [google_project_iam_custom_role.lacework_project_custom_role]
}
resource "google_organization_iam_custom_role" "lacework_organization_custom_role" {
count = (!local.skip_iam_grants && var.org_integration) ? 1 : 0
role_id = "lwOrgComplianceRole_${random_id.uniq.hex}"
org_id = var.organization_id
title = "Lacework Org Compliance Role"
description = "Lacework Org Compliance Role"
permissions = local.custom_role_permissions
}
resource "google_organization_iam_member" "lacework_organization_custom_role_binding" {
count = (!local.skip_iam_grants && var.org_integration) ? 1 : 0
org_id = var.organization_id
role = google_organization_iam_custom_role.lacework_organization_custom_role.0.name
member = "serviceAccount:${local.service_account_json_key.client_email}"
depends_on = [google_organization_iam_custom_role.lacework_organization_custom_role]
}
resource "google_organization_iam_member" "lacework_organization_roles_binding" {
for_each = toset((!local.skip_iam_grants && var.org_integration) ? local.default_roles : [])
org_id = var.organization_id
role = each.value
member = "serviceAccount:${local.service_account_json_key.client_email}"
depends_on = [google_organization_iam_custom_role.lacework_organization_custom_role]
}
resource "google_project_service" "required_apis" {
for_each = var.required_config_apis
project = local.project_id
service = each.value
disable_on_destroy = false
}
# wait for X seconds for things to settle down in the GCP side
# before trying to create the Lacework external integration
resource "time_sleep" "wait_time" {
create_duration = var.wait_time
depends_on = [
module.lacework_cfg_svc_account,
google_project_service.required_apis,
google_organization_iam_member.lacework_organization_custom_role_binding,
google_organization_iam_member.lacework_organization_roles_binding,
google_project_iam_member.lacework_project_custom_role_binding,
google_project_iam_member.lacework_project_roles_binding,
]
}
resource "lacework_integration_gcp_cfg" "default" {
name = var.lacework_integration_name
resource_id = var.org_integration ? var.organization_id : module.lacework_cfg_svc_account.project_id
resource_level = var.org_integration ? "ORGANIZATION" : "PROJECT"
credentials {
client_id = local.service_account_json_key.client_id
private_key_id = local.service_account_json_key.private_key_id
client_email = local.service_account_json_key.client_email
private_key = local.service_account_json_key.private_key
}
depends_on = [time_sleep.wait_time]
}
data "lacework_metric_module" "lwmetrics" {
name = local.module_name
version = local.module_version
}