Skip to content

Commit 531bb6b

Browse files
committed
add rm dry run config when enforced perimeter
1 parent 5c2f8c6 commit 531bb6b

File tree

2 files changed

+59
-13
lines changed

2 files changed

+59
-13
lines changed

1-org/envs/shared/service_control.tf

Lines changed: 48 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -177,8 +177,27 @@ locals {
177177
module.scc_notifications.project_number,
178178
], local.shared_vpc_projects_numbers))
179179

180+
projects_dry_run = var.enable_hub_and_spoke ? (concat([
181+
local.seed_project_number,
182+
module.org_audit_logs.project_number,
183+
module.org_billing_export.project_number,
184+
module.common_kms.project_number,
185+
module.org_secrets.project_number,
186+
module.interconnect.project_number,
187+
module.network_hub[0].project_number,
188+
module.scc_notifications.project_number,
189+
], local.shared_vpc_projects_numbers)) : (concat([
190+
local.seed_project_number,
191+
module.org_audit_logs.project_number,
192+
module.org_billing_export.project_number,
193+
module.common_kms.project_number,
194+
module.org_secrets.project_number,
195+
module.interconnect.project_number,
196+
module.scc_notifications.project_number,
197+
], local.shared_vpc_projects_numbers))
198+
180199
project_keys = var.enable_hub_and_spoke ? [
181-
"prj-org-seed",
200+
"prj-b-seed",
182201
"prj-org-audit",
183202
"prj-org-billing",
184203
"prj-org-kms",
@@ -190,7 +209,32 @@ locals {
190209
"prj-net-d-svpc",
191210
"prj-net-n-svpc",
192211
] : [
193-
"prj-org-seed",
212+
"prj-b-seed",
213+
"prj-org-audit",
214+
"prj-org-billing",
215+
"prj-org-kms",
216+
"prj-org-secrets",
217+
"prj-org-interconnect",
218+
"prj-org-scc",
219+
"prj-net-p-svpc",
220+
"prj-net-d-svpc",
221+
"prj-net-n-svpc",
222+
]
223+
224+
project_keys_dry_run = var.enable_hub_and_spoke ? [
225+
"prj-b-seed",
226+
"prj-org-audit",
227+
"prj-org-billing",
228+
"prj-org-kms",
229+
"prj-org-secrets",
230+
"prj-org-interconnect",
231+
"prj-org-scc",
232+
"prj-net-hub-svpc",
233+
"prj-net-p-svpc",
234+
"prj-net-d-svpc",
235+
"prj-net-n-svpc",
236+
] : [
237+
"prj-b-seed",
194238
"prj-org-audit",
195239
"prj-org-billing",
196240
"prj-org-kms",
@@ -208,7 +252,7 @@ locals {
208252
)
209253

210254
projects_map_dry_run = zipmap(
211-
local.project_keys,
255+
local.project_keys_dry_run,
212256
[for p in local.projects : "${p}"]
213257
)
214258

@@ -801,7 +845,7 @@ module "service_control" {
801845
"serviceAccount:${local.environment_service_account}",
802846
], var.perimeter_additional_members))
803847
resources_dry_run = concat(values(local.projects_map_dry_run), var.resources_dry_run)
804-
resource_keys_dry_run = local.project_keys
848+
resource_keys_dry_run = local.project_keys_dry_run
805849
ingress_policies_keys_dry_run = local.ingress_policies_keys_dry_run
806850
egress_policies_keys_dry_run = local.egress_policies_keys_dry_run
807851
ingress_policies_keys = local.ingress_policies_keys

1-org/modules/service_control/main.tf

Lines changed: 11 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -36,6 +36,8 @@ module "access_level" {
3636
}
3737

3838
module "access_level_dry_run" {
39+
count = !var.enforce_vpcsc ? 1 : 0
40+
3941
source = "terraform-google-modules/vpc-service-controls/google//modules/access_level"
4042
version = "~> 7.1.3"
4143

@@ -65,15 +67,15 @@ module "regular_service_perimeter" {
6567
egress_policies_keys = var.enforce_vpcsc ? var.egress_policies_keys : []
6668

6769
# configurations for a perimeter in dry run mode.
68-
resources_dry_run = var.resources_dry_run
69-
resource_keys_dry_run = var.resource_keys_dry_run
70-
access_levels_dry_run = [module.access_level_dry_run.name]
71-
restricted_services_dry_run = var.restricted_services_dry_run
72-
vpc_accessible_services_dry_run = ["*"]
73-
ingress_policies_dry_run = var.ingress_policies_dry_run
74-
ingress_policies_keys_dry_run = var.ingress_policies_keys_dry_run
75-
egress_policies_dry_run = var.egress_policies_dry_run
76-
egress_policies_keys_dry_run = var.egress_policies_keys_dry_run
70+
resources_dry_run = !var.enforce_vpcsc ? var.resources_dry_run : []
71+
resource_keys_dry_run = !var.enforce_vpcsc ? var.resource_keys_dry_run : []
72+
access_levels_dry_run = !var.enforce_vpcsc && length(module.access_level_dry_run) > 0 ? [module.access_level_dry_run[0].name] : []
73+
restricted_services_dry_run = !var.enforce_vpcsc ? var.restricted_services_dry_run : []
74+
vpc_accessible_services_dry_run = !var.enforce_vpcsc ? ["*"] : []
75+
ingress_policies_dry_run = !var.enforce_vpcsc ? var.ingress_policies_dry_run : []
76+
ingress_policies_keys_dry_run = !var.enforce_vpcsc ? var.ingress_policies_keys_dry_run : []
77+
egress_policies_dry_run = !var.enforce_vpcsc ? var.egress_policies_dry_run : []
78+
egress_policies_keys_dry_run = !var.enforce_vpcsc ? var.egress_policies_keys_dry_run : []
7779
}
7880

7981
resource "time_sleep" "wait_vpc_sc_propagation" {

0 commit comments

Comments
 (0)